<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <atom:link href="https://feeds.megaphone.fm/cyberwire-daily-podcast" rel="self" type="application/rss+xml"/>
    <title>CyberWire Daily</title>
    <link>https://thecyberwire.com/podcasts/daily-podcast</link>
    <language>en</language>
    <copyright>© 2024 N2K Networks, Inc. 706761</copyright>
    <description>The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.</description>
    <image>
      <url>https://megaphone.imgix.net/podcasts/58ab7ae0-def8-11ea-b34c-b35b208b0539/image/f873f2ed2bf2868969a07ebae4846fbf.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress</url>
      <title>CyberWire Daily</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast</link>
    </image>
    <itunes:explicit>no</itunes:explicit>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>The daily cybersecurity news and analysis industry leaders depend on.</itunes:subtitle>
    <itunes:author>N2K Networks</itunes:author>
    <itunes:summary>The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.</itunes:summary>
    <content:encoded>
      <![CDATA[<p>The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.</p>]]>
    </content:encoded>
    <itunes:owner>
      <itunes:name>N2K Networks, Inc.</itunes:name>
      <itunes:email>producer@n2k.com</itunes:email>
    </itunes:owner>
    <itunes:image href="https://megaphone.imgix.net/podcasts/58ab7ae0-def8-11ea-b34c-b35b208b0539/image/f873f2ed2bf2868969a07ebae4846fbf.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
      <itunes:category text="Daily News"/>
    </itunes:category>
    <itunes:category text="Technology">
    </itunes:category>
    <item>
      <title>Adam Marrè: Learning to be a leader. [CISO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/118/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Adam Marrè, CISO from Arctic Wolf, sits down to share his story of rising through the ranks. After 9/11 he decided he wanted to make a difference in the world, and so he chose to go into the FBI. There he learned the skills that got him to where he is today. In his time at the FBI, he was able to do what he loved, which was working with computers while gaining more knowledge on cybersecurity, and he became computer forensic certified. Ultimately, he needed a change in the end and decided to leave the FBI. He was able to learn the leadership skills he needed to move past that career path and follow a new dream. He is now able to share his passion with the world and help people understand security to help protect themselves as well as helping people finding success in their careers and in their lives. We thank Adam for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 26 Apr 2026 07:00:00 -0000</pubDate>
      <itunes:title>Adam Marrè: Learning to be a leader. [CISO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>118</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/e1ef1c0c-3f1f-11f1-a705-9ba8ba9266ab/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Adam Marrè, CISO from Arctic Wolf, sits down to share his story of rising through the ranks. After 9/11 he decided he wanted to make a difference in the world, and so he chose to go into the FBI. There he learned the skills that got him to where he is today. In his time at the FBI, he was able to do what he loved, which was working with computers while gaining more knowledge on cybersecurity, and he became computer forensic certified. Ultimately, he needed a change in the end and decided to leave the FBI. He was able to learn the leadership skills he needed to move past that career path and follow a new dream. He is now able to share his passion with the world and help people understand security to help protect themselves as well as helping people finding success in their careers and in their lives. We thank Adam for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Adam Marrè, CISO from Arctic Wolf, sits down to share his story of rising through the ranks. After 9/11 he decided he wanted to make a difference in the world, and so he chose to go into the FBI. There he learned the skills that got him to where he is today. In his time at the FBI, he was able to do what he loved, which was working with computers while gaining more knowledge on cybersecurity, and he became computer forensic certified. Ultimately, he needed a change in the end and decided to leave the FBI. He was able to learn the leadership skills he needed to move past that career path and follow a new dream. He is now able to share his passion with the world and help people understand security to help protect themselves as well as helping people finding success in their careers and in their lives. We thank Adam for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>691</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e1ef1c0c-3f1f-11f1-a705-9ba8ba9266ab]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7558865542.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A QRazy clever scam. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/422/notes</link>
      <description>This week, we are joined by Juliana Testa, Senior Security Engineer from 7AI, sharing their work on "Quish Splash - When the QR Code Is the Weapon: A Multi-Wave Phishing Campaign That Slipped Past Every Filter." A large-scale “quishing” campaign used QR codes embedded in image attachments to hide phishing URLs, allowing 28 out of 33 emails to bypass SPF, DKIM, DMARC, and Microsoft Defender and land directly in inboxes. 

Each recipient received a unique QR code and tracking ID, defeating traditional detection methods and enabling attackers to scale the campaign to over 1.6 million emails across multiple organizations while shifting execution to less-secure mobile devices. The attack was ultimately uncovered through AI-driven alerting combined with human analysis and threat hunting, highlighting a major blind spot in email security and the need for QR code inspection, mobile protections, and tighter auto-reply controls.

The research and executive brief can be found here:


  Quish Splash - When the QR Code Is the Weapon: A Multi-Wave Phishing Campaign That Slipped Past Every Filter.


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Apr 2026 07:00:00 -0000</pubDate>
      <itunes:title>A QRazy clever scam. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>422</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c0a1d752-3f3c-11f1-a00b-97396a3602fa/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Juliana Testa, Senior Security Engineer from 7AI, sharing their work on "Quish Splash - When the QR Code Is the Weapon: A Multi-Wave Phishing Campaign That Slipped Past Every Filter." A large-scale “quishing” campaign used QR codes embedded in image attachments to hide phishing URLs, allowing 28 out of 33 emails to bypass SPF, DKIM, DMARC, and Microsoft Defender and land directly in inboxes. 

Each recipient received a unique QR code and tracking ID, defeating traditional detection methods and enabling attackers to scale the campaign to over 1.6 million emails across multiple organizations while shifting execution to less-secure mobile devices. The attack was ultimately uncovered through AI-driven alerting combined with human analysis and threat hunting, highlighting a major blind spot in email security and the need for QR code inspection, mobile protections, and tighter auto-reply controls.

The research and executive brief can be found here:


  Quish Splash - When the QR Code Is the Weapon: A Multi-Wave Phishing Campaign That Slipped Past Every Filter.


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/juliana-testa/">Juliana Testa</a>, Senior Security Engineer from <a href="https://7ai.com/">7AI</a>, sharing their work on "Quish Splash - When the QR Code Is the Weapon: A Multi-Wave Phishing Campaign That Slipped Past Every Filter." A large-scale “quishing” campaign used QR codes embedded in image attachments to hide phishing URLs, allowing 28 out of 33 emails to bypass SPF, DKIM, DMARC, and Microsoft Defender and land directly in inboxes. </p>
<p>Each recipient received a unique QR code and tracking ID, defeating traditional detection methods and enabling attackers to scale the campaign to over 1.6 million emails across multiple organizations while shifting execution to less-secure mobile devices. The attack was ultimately uncovered through AI-driven alerting combined with human analysis and threat hunting, highlighting a major blind spot in email security and the need for QR code inspection, mobile protections, and tighter auto-reply controls.</p>
<p><strong>The research and executive brief can be found here:</strong></p>
<ul>
  <li><a href="https://blog.7ai.com/quish-splash-when-the-qr-code-is-the-weapon-a-multi-wave-phishing-campaign-that-slipped-past-every-filter">Quish Splash - When the QR Code Is the Weapon: A Multi-Wave Phishing Campaign That Slipped Past Every Filter.</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1133</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c0a1d752-3f3c-11f1-a00b-97396a3602fa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7314895251.mp3?updated=1776965642" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A digital battlefield in practice.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2538/notes</link>
      <description>Locked Shields wraps another year. Open models challenge Mythos. CISA tracks FIRESTARTER inside a federal agency. The White House targets foreign AI model extraction. Microsoft lets admins remove Copilot. Treasury sanctions a Cambodian scam-compound senator. Breeze Cache rushes a patch. Researchers downplay OT malware hype, while NIST pushes for better OT visibility. Our guest is Eric Russo, Director, SOC Defensive Security at Barracuda, discussing the risks posed by employees downloading pirated software. Con artists charge crypto for counterfeit clearance.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest is Eric Russo, Director, SOC Defensive Security at Barracuda, discussing the risks posed by employees downloading pirated or cracked software onto corporate devices. You can learn more here.

Selected Reading

Locked Shields 2026: 41 Nations Strengthen Cyber Resilience in World's Biggest Exercise (SecurityWeek)

Open source models can find bugs as well as Mythos (The Register)

CISA: US agency breached through Cisco vulnerability, FIRESTARTER backdoor allowed access through March (The Record)

Trump Administration Vows Crackdown on Chinese Companies 'Exploiting' AI Models Made in US (SecurityWeek)

Microsoft now lets admins uninstall Copilot on enterprise devices (Bleeping Computer)

US sanctions Cambodian senator for millions earned through scam compounds (The Record)

Cloudways Patches Actively Exploited File Upload Flaw in Breeze Cache Plugin (Beyond Machines)

Dragos: Despite AI use, new malware targeting water plants is ‘hype’ (CyberScoop)

NIST cyber center to launch OT ‘visibility’ project (Federal News Network)

Crypto scam lures ships into Strait of Hormuz, falsely promising safe passage (Ars Technica)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 24 Apr 2026 20:30:00 -0000</pubDate>
      <itunes:title>A digital battlefield in practice.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2538</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Locked Shields wraps another year. Open models challenge Mythos. CISA tracks FIRESTARTER inside a federal agency. The White House targets foreign AI model extraction. Microsoft lets admins remove Copilot. Treasury sanctions a Cambodian scam-compound senator. Breeze Cache rushes a patch. Researchers downplay OT malware hype, while NIST pushes for better OT visibility. Our guest is Eric Russo, Director, SOC Defensive Security at Barracuda, discussing the risks posed by employees downloading pirated software. Con artists charge crypto for counterfeit clearance.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest is Eric Russo, Director, SOC Defensive Security at Barracuda, discussing the risks posed by employees downloading pirated or cracked software onto corporate devices. You can learn more here.

Selected Reading

Locked Shields 2026: 41 Nations Strengthen Cyber Resilience in World's Biggest Exercise (SecurityWeek)

Open source models can find bugs as well as Mythos (The Register)

CISA: US agency breached through Cisco vulnerability, FIRESTARTER backdoor allowed access through March (The Record)

Trump Administration Vows Crackdown on Chinese Companies 'Exploiting' AI Models Made in US (SecurityWeek)

Microsoft now lets admins uninstall Copilot on enterprise devices (Bleeping Computer)

US sanctions Cambodian senator for millions earned through scam compounds (The Record)

Cloudways Patches Actively Exploited File Upload Flaw in Breeze Cache Plugin (Beyond Machines)

Dragos: Despite AI use, new malware targeting water plants is ‘hype’ (CyberScoop)

NIST cyber center to launch OT ‘visibility’ project (Federal News Network)

Crypto scam lures ships into Strait of Hormuz, falsely promising safe passage (Ars Technica)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Locked Shields wraps another year. Open models challenge Mythos. CISA tracks FIRESTARTER inside a federal agency. The White House targets foreign AI model extraction. Microsoft lets admins remove Copilot. Treasury sanctions a Cambodian scam-compound senator. Breeze Cache rushes a patch. Researchers downplay OT malware hype, while NIST pushes for better OT visibility. Our guest is Eric Russo, Director, SOC Defensive Security at Barracuda, discussing the risks posed by employees downloading pirated software. Con artists charge crypto for counterfeit clearance.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Our guest is <a href="https://www.linkedin.com/in/eric-russo-380237a9/"><u>Eric Russo</u></a>, Director, SOC Defensive Security at <a href="https://www.barracuda.com/"><u>Barracuda</u></a>, discussing the risks posed by employees downloading pirated or cracked software onto corporate devices. You can learn more <a href="https://blog.barracuda.com/2026/03/04/threat-spotlight-business-risks-pirate-software"><u>here</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.securityweek.com/locked-shields-2026-41-nations-strengthen-cyber-resilience-in-worlds-biggest-exercise/"><u>Locked Shields 2026: 41 Nations Strengthen Cyber Resilience in World's Biggest Exercise</u></a> (SecurityWeek)</p>
<p><a href="https://www.theregister.com/2026/04/24/ai_bugfinding_futures/"><u>Open source models can find bugs as well as Mythos</u></a> (The Register)</p>
<p><a href="https://therecord.media/cisa-us-agency-breached-cisco-vulnerability-backdoor"><u>CISA: US agency breached through Cisco vulnerability, FIRESTARTER backdoor allowed access through March</u></a> (The Record)</p>
<p><a href="https://www.securityweek.com/trump-administration-vows-crackdown-on-chinese-companies-exploiting-ai-models-made-in-us/"><u>Trump Administration Vows Crackdown on Chinese Companies 'Exploiting' AI Models Made in US</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-now-lets-admins-uninstall-copilot-on-enterprise-devices/"><u>Microsoft now lets admins uninstall Copilot on enterprise devices</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/us-sanctions-cambodian-senator-scam-compounds"><u>US sanctions Cambodian senator for millions earned through scam compounds</u></a> (The Record)</p>
<p><a href="https://beyondmachines.net/event_details/cloudways-patches-actively-exploited-file-upload-flaw-in-breeze-cache-plugin-e-w-c-7-u/gD2P6Ple2L"><u>Cloudways Patches Actively Exploited File Upload Flaw in Breeze Cache Plugin</u></a> (Beyond Machines)</p>
<p><a href="https://cyberscoop.com/dragos-zionsiphon-ai-malware-targeting-water-sector-hype/"><u>Dragos: Despite AI use, new malware targeting water plants is ‘hype’</u></a> (CyberScoop)</p>
<p><a href="https://federalnewsnetwork.com/cybersecurity/2026/04/nist-cyber-center-to-launch-ot-visibility-project/"><u>NIST cyber center to launch OT ‘visibility’ project</u></a> (Federal News Network)</p>
<p><br><a href="https://arstechnica.com/security/2026/04/crypto-scam-lures-ships-into-strait-of-hormuz-falsely-promising-safe-passage/"><u>Crypto scam lures ships into Strait of Hormuz, falsely promising safe passage</u></a> (Ars Technica)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1569</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c0dedab0-1671-11f1-ad8a-97fbde4e33a4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3133764298.mp3?updated=1777052133" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Your signal is showing.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2537/notes</link>
      <description>Researchers expose covert telecom surveillance campaigns. Lawmakers push new national privacy rules. China-linked actors hide inside compromised device networks. A ransomware forum leak reveals a criminal marketplace. GopherWhisper blends into cloud services for espionage. Attackers poison AI with hidden web prompts. Apple patches lingering notification data. macOS admin tools become attacker pathways. CISA orders urgent fixes for a Microsoft Defender zero-day, and their Director nominee withdraws. Our guests today are Johnny Hand and Dustin Childs, hosts of TrendAI's AI Security Brief podcast. A meteorological mystery meets market manipulation.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Introducing the AI Security Brief podcast.

Our guests today are Johnny Hand and Dustin Childs, hosts of TrendAI's AI Security Brief podcast. They join Dave to introduce their new show on the N2K CyberWire Network. You can find their first episode here and catch new episodes every other Thursday on your favorite podcast app.

Selected Reading

Surveillance vendors caught abusing access to telcos to track people's phone locations, researchers say (TechCrunch)

Committees on Energy and Commerce and Financial Services Introduce Pair of Privacy Bills to Establish Comprehensive Data Protections for All Americans (Energy Commerce)

International cyber agencies share fresh advice to defend against China-linked covert networks (NCSC)

RAMP Uncovered: Anatomy of Russia’s Ransomware Marketplace (Security Affairs)

New GopherWhisper APT group abuses Outlook, Slack, Discord for comms (Bleeping Computer)

Hackers Use Hidden Website Instructions in New Attacks on AI Assistants (Hackread)

Apple fixes iPhone bug that let FBI retrieve deleted Signal messages(CVE-2026-28950) (Help Net Security)

Bad Apples: Weaponizing native macOS primitives for movement and execution (Talos Intelligence)

CISA orders feds to patch BlueHammer flaw exploited as zero-day (Bleeping Computer)

Trump’s pick to lead CISA withdraws nomination after months of political impasse (POLITICO)

A Hair Dryer May Have Gamed a Paris Weather Sensor for $34,000 on Polymarket (Bitcoin News)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 23 Apr 2026 20:30:00 -0000</pubDate>
      <itunes:title>Your signal is showing.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2537</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Researchers expose covert telecom surveillance campaigns. Lawmakers push new national privacy rules. China-linked actors hide inside compromised device networks. A ransomware forum leak reveals a criminal marketplace. GopherWhisper blends into cloud services for espionage. Attackers poison AI with hidden web prompts. Apple patches lingering notification data. macOS admin tools become attacker pathways. CISA orders urgent fixes for a Microsoft Defender zero-day, and their Director nominee withdraws. Our guests today are Johnny Hand and Dustin Childs, hosts of TrendAI's AI Security Brief podcast. A meteorological mystery meets market manipulation.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Introducing the AI Security Brief podcast.

Our guests today are Johnny Hand and Dustin Childs, hosts of TrendAI's AI Security Brief podcast. They join Dave to introduce their new show on the N2K CyberWire Network. You can find their first episode here and catch new episodes every other Thursday on your favorite podcast app.

Selected Reading

Surveillance vendors caught abusing access to telcos to track people's phone locations, researchers say (TechCrunch)

Committees on Energy and Commerce and Financial Services Introduce Pair of Privacy Bills to Establish Comprehensive Data Protections for All Americans (Energy Commerce)

International cyber agencies share fresh advice to defend against China-linked covert networks (NCSC)

RAMP Uncovered: Anatomy of Russia’s Ransomware Marketplace (Security Affairs)

New GopherWhisper APT group abuses Outlook, Slack, Discord for comms (Bleeping Computer)

Hackers Use Hidden Website Instructions in New Attacks on AI Assistants (Hackread)

Apple fixes iPhone bug that let FBI retrieve deleted Signal messages(CVE-2026-28950) (Help Net Security)

Bad Apples: Weaponizing native macOS primitives for movement and execution (Talos Intelligence)

CISA orders feds to patch BlueHammer flaw exploited as zero-day (Bleeping Computer)

Trump’s pick to lead CISA withdraws nomination after months of political impasse (POLITICO)

A Hair Dryer May Have Gamed a Paris Weather Sensor for $34,000 on Polymarket (Bitcoin News)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers expose covert telecom surveillance campaigns. Lawmakers push new national privacy rules. China-linked actors hide inside compromised device networks. A ransomware forum leak reveals a criminal marketplace. GopherWhisper blends into cloud services for espionage. Attackers poison AI with hidden web prompts. Apple patches lingering notification data. macOS admin tools become attacker pathways. CISA orders urgent fixes for a Microsoft Defender zero-day, and their Director nominee withdraws. Our guests today are Johnny Hand and Dustin Childs, hosts of TrendAI's AI Security Brief podcast. A meteorological mystery meets market manipulation.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Introducing the AI Security Brief podcast.</strong></p>
<p>Our guests today are <a href="https://www.linkedin.com/in/johnny-hand-mba-74781855"><u>Johnny Hand</u></a> and <a href="https://www.linkedin.com/in/dustincchilds"><u>Dustin Childs</u></a>, hosts of <a href="https://www.trendaisecurity.com/en-us/"><u>TrendAI</u></a>'s <a href="https://thecyberwire.com/podcasts/ai-security-brief"><u>AI Security Brief</u></a> podcast. They join Dave to introduce their new show on the N2K CyberWire Network. You can find their first episode <a href="https://thecyberwire.com/podcasts/ai-security-brief/1/notes"><u>here</u></a> and catch new episodes every other Thursday on your favorite podcast app.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://techcrunch.com/2026/04/23/surveillance-vendors-caught-abusing-access-to-telcos-to-track-peoples-phone-locations-researchers-say/"><u>Surveillance vendors caught abusing access to telcos to track people's phone locations, researchers say</u></a> (TechCrunch)</p>
<p><a href="https://energycommerce.house.gov/posts/committees-on-energy-and-commerce-and-financial-services-introduce-pair-of-privacy-bills-to-establish-comprehensive-data-protections-for-all-americans"><u>Committees on Energy and Commerce and Financial Services Introduce Pair of Privacy Bills to Establish Comprehensive Data Protections for All Americans</u></a> (Energy Commerce)</p>
<p><a href="https://www.ncsc.gov.uk/news/international-cyber-agencies-fresh-advice-defend-against-china-linked-covert-networks"><u>International cyber agencies share fresh advice to defend against China-linked covert networks</u></a> (NCSC)</p>
<p><a href="https://securityaffairs.com/191171/cyber-crime/ramp-uncovered-anatomy-of-russias-ransomware-marketplace.html"><u>RAMP Uncovered: Anatomy of Russia’s Ransomware Marketplace</u></a> (Security Affairs)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/new-gopherwhisper-apt-group-abuses-outlook-slack-discord-for-comms/"><u>New GopherWhisper APT group abuses Outlook, Slack, Discord for comms</u></a> (Bleeping Computer)</p>
<p><a href="https://hackread.com/hackers-hidden-site-instruction-attack-ai-assistants/"><u>Hackers Use Hidden Website Instructions in New Attacks on AI Assistants</u></a> (Hackread)</p>
<p><a href="https://www.helpnetsecurity.com/2026/04/23/cve-2026-28950-iphone-vulnerability-notifications-signal/"><u>Apple fixes iPhone bug that let FBI retrieve deleted Signal messages(CVE-2026-28950)</u></a> (Help Net Security)</p>
<p><a href="https://blog.talosintelligence.com/bad-apples-weaponizing-native-macos-primitives-for-movement-and-execution/"><u>Bad Apples: Weaponizing native macOS primitives for movement and execution</u></a> (Talos Intelligence)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-microsoft-defender-flaw-exploited-in-zero-day-attacks/"><u>CISA orders feds to patch BlueHammer flaw exploited as zero-day</u></a> (Bleeping Computer)</p>
<p><a href="https://www.politico.com/news/2026/04/22/sean-plankey-withdraws-nomination-cisa-00887136"><u>Trump’s pick to lead CISA withdraws nomination after months of political impasse</u></a> (POLITICO)</p>
<p><a href="https://news.bitcoin.com/a-hair-dryer-may-have-gamed-a-paris-weather-sensor-for-34000-on-polymarket/"><u>A Hair Dryer May Have Gamed a Paris Weather Sensor for $34,000 on Polymarket</u></a> (Bitcoin News)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1641</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c0b749d2-1671-11f1-ad8a-536fa10891cb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1092959391.mp3?updated=1776971405" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The leak was only a matter of time.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2536/notes</link>
      <description>Mythos leaks. The DOD preps a more aggressive cyber strategy. A former FBI cyber official urges homicide charges for hospital ransomware deaths. Lotus Wiper targeted the Venezuelan energy and utilities sector. Over 1,300 SharePoint servers remain unpatched against a spoofing vulnerability. The Harvester APT group deploys a new Linux version of its GoGra backdoor. A new LOTUSLITE backdoor targets India’s banking sector. The Mirai botnet exploits discontinued routers. Our guest is Brian Vecci, Field CTO at Varonis, discussing how organizations can safely adopt AI and autonomous agents. A satirical startup sells clean-room clones. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices, Brian Vecci, Field CTO at Varonis, discusses how organizations can safely adopt AI and autonomous agents by securing data, managing risk, and focusing on measurable outcomes. If you enjoyed this conversation, tune into the full interview here.

Selected Reading

Anthropic’s Mythos Model Is Being Accessed by Unauthorized Users (Bloomberg)

Claude Mythos Finds 271 Firefox Vulnerabilities (SecurityWeek)

New Defense Department cyber strategy imminent, official says (The Record)

Pentagon Cyber Leaders Back $1.5T Budget Request (GovInfo Security)

Ex-FBI lead urges homicide charges against ransomware scum (The Register)

New Wiper Malware Targeted Venezuelan Energy Sector Prior to US Intervention (SecurityWeek)

Over 1,300 Microsoft SharePoint servers vulnerable to spoofing attacks (Bleeping Computer)

Harvester: APT Group Expands Toolset With New GoGra Linux Backdoor (SecurityWeek)

Same packet, different magic: Mustang Panda hits India's banking sector and Korea geopolitics (Acronis)

Mirai Botnet Targets Flaw in Discontinued D-Link Routers (SecurityWeek)

This AI Tool Rips Off Open Source Software Without Violating Copyright (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 22 Apr 2026 20:30:00 -0000</pubDate>
      <itunes:title>The leak was only a matter of time.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2536</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Mythos leaks. The DOD preps a more aggressive cyber strategy. A former FBI cyber official urges homicide charges for hospital ransomware deaths. Lotus Wiper targeted the Venezuelan energy and utilities sector. Over 1,300 SharePoint servers remain unpatched against a spoofing vulnerability. The Harvester APT group deploys a new Linux version of its GoGra backdoor. A new LOTUSLITE backdoor targets India’s banking sector. The Mirai botnet exploits discontinued routers. Our guest is Brian Vecci, Field CTO at Varonis, discussing how organizations can safely adopt AI and autonomous agents. A satirical startup sells clean-room clones. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices, Brian Vecci, Field CTO at Varonis, discusses how organizations can safely adopt AI and autonomous agents by securing data, managing risk, and focusing on measurable outcomes. If you enjoyed this conversation, tune into the full interview here.

Selected Reading

Anthropic’s Mythos Model Is Being Accessed by Unauthorized Users (Bloomberg)

Claude Mythos Finds 271 Firefox Vulnerabilities (SecurityWeek)

New Defense Department cyber strategy imminent, official says (The Record)

Pentagon Cyber Leaders Back $1.5T Budget Request (GovInfo Security)

Ex-FBI lead urges homicide charges against ransomware scum (The Register)

New Wiper Malware Targeted Venezuelan Energy Sector Prior to US Intervention (SecurityWeek)

Over 1,300 Microsoft SharePoint servers vulnerable to spoofing attacks (Bleeping Computer)

Harvester: APT Group Expands Toolset With New GoGra Linux Backdoor (SecurityWeek)

Same packet, different magic: Mustang Panda hits India's banking sector and Korea geopolitics (Acronis)

Mirai Botnet Targets Flaw in Discontinued D-Link Routers (SecurityWeek)

This AI Tool Rips Off Open Source Software Without Violating Copyright (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Mythos leaks. The DOD preps a more aggressive cyber strategy. A former FBI cyber official urges homicide charges for hospital ransomware deaths. Lotus Wiper targeted the Venezuelan energy and utilities sector. Over 1,300 SharePoint servers remain unpatched against a spoofing vulnerability. The Harvester APT group deploys a new Linux version of its GoGra backdoor. A new LOTUSLITE backdoor targets India’s banking sector. The Mirai botnet exploits discontinued routers. Our guest is Brian Vecci, Field CTO at Varonis, discussing how organizations can safely adopt AI and autonomous agents. A satirical startup sells clean-room clones. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On today’s Industry Voices, <a href="https://www.linkedin.com/in/brianvecci/"><u>Brian Vecci</u></a>, Field CTO at <a href="https://www.varonis.com/"><u>Varonis</u></a>, discusses how organizations can safely adopt AI and autonomous agents by securing data, managing risk, and focusing on measurable outcomes. If you enjoyed this conversation, tune into the full interview here.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bloomberg.com/news/articles/2026-04-21/anthropic-s-mythos-model-is-being-accessed-by-unauthorized-users?accessToken=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzb3VyY2UiOiJTdWJzY3JpYmVyR2lmdGVkQXJ0aWNsZSIsImlhdCI6MTc3NjgwODg5MiwiZXhwIjoxNzc3NDEzNjkyLCJhcnRpY2xlSWQiOiJURFQ2TUJLSkg2VjQwMCIsImJjb25uZWN0SWQiOiJERDEzODM4MTc2MTc0NEYzODBBODhGRjlEQkI2MkEwOCJ9.iCMwvUqtro60hu3jMU3B5vHI4GoKl8tB32Kn3sVBUio"><u>Anthropic’s Mythos Model Is Being Accessed by Unauthorized Users</u></a> (Bloomberg)</p>
<p><a href="https://www.securityweek.com/claude-mythos-finds-271-firefox-vulnerabilities/"><u>Claude Mythos Finds 271 Firefox Vulnerabilities</u></a> (SecurityWeek)</p>
<p><a href="https://therecord.media/defense-cyber-strategy-warfare"><u>New Defense Department cyber strategy imminent, official says</u></a> (The Record)</p>
<p><a href="https://www.govinfosecurity.com/pentagon-cyber-leaders-back-15t-budget-request-a-31476"><u>Pentagon Cyber Leaders Back $1.5T Budget Request</u></a> (GovInfo Security)</p>
<p><a href="https://www.theregister.com/2026/04/21/exfbi_cyber_chief_urges_felony_charges_ransomware/"><u>Ex-FBI lead urges homicide charges against ransomware scum</u></a> (The Register)</p>
<p><a href="https://www.securityweek.com/new-wiper-malware-targeted-venezuelan-energy-sector-prior-to-us-intervention/"><u>New Wiper Malware Targeted Venezuelan Energy Sector Prior to US Intervention </u></a>(SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/over-1-300-microsoft-sharepoint-servers-vulnerable-to-ongoing-attacks/"><u>Over 1,300 Microsoft SharePoint servers vulnerable to spoofing attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.security.com/threat-intelligence/harvester-new-linux-backdoor-gogra"><u>Harvester: APT Group Expands Toolset With New GoGra Linux Backdoor</u></a> (SecurityWeek)</p>
<p><a href="https://www.acronis.com/en/tru/posts/same-packet-different-magic-mustang-panda-hits-indias-banking-sector-and-korea-geopolitics/"><u>Same packet, different magic: Mustang Panda hits India's banking sector and Korea geopolitics</u></a> (Acronis)</p>
<p><a href="https://www.securityweek.com/mirai-botnet-targets-flaw-in-discontinued-d-link-routers/"><u>Mirai Botnet Targets Flaw in Discontinued D-Link Routers</u></a> (SecurityWeek)</p>
<p><a href="https://www.404media.co/this-ai-tool-rips-off-open-source-software-without-violating-copyright/"><u>This AI Tool Rips Off Open Source Software Without Violating Copyright</u></a> (404 Media)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2105</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c08eab44-1671-11f1-ad8a-2fe98dfabe91]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3372961490.mp3?updated=1776886683" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trust lags behind technology.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2535/notes</link>
      <description>Anthropic’s Mythos proves irresistible despite claimed supply chain risks.Iran claims U.S. backdoors hit its networks. New Coast Guard rules target maritime OT security. A fresh NGate Android malware variant emerges. Thousands of ActiveMQ servers face active exploitation risk. CISA adds eight flaws to its KEV list. Progress patches MOVEit and LoadMaster bugs. Attackers impersonate IT staff over Microsoft Teams. A ransomware negotiator admits working with BlackCat. Google Gemini asks, “May we see your photos please?”

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices Elad Koren, Vice President, Product Management, Cortex Cloud at Palo Alto Networks, discusses building AI natively into platforms, managing complexity and trust, and taking a measured, experimental approach during the industry’s “messy middle” phase. If you enjoyed this conversation, tune into the full interview here. 

Selected Reading

The US NSA is using Anthropic's Claude Mythos despite supply chain risk (Security Affairs)

Anthropic secretly installs spyware when you install Claude Desktop (That Privacy Guy)

Iran claims US used backdoors in networking equipment (The Register)

Maritime Cybersecurity Rules Make Waves (GovInfoSecurity)

New NGate variant hides in a trojanized NFC payment app (We Live Security)

Actively exploited Apache ActiveMQ flaw impacts 6,400 servers (Bleeping Computer)

CISA flags another Cisco Catalyst SD-WAN Manager bug as exploited (CVE-2026-20133) (Help Net Security)

Progress Patches Multiple Vulnerabilities in MOVEit WAF, LoadMaster (SecurityWeek)

Microsoft: Teams increasingly abused in helpdesk impersonation attacks (Bleeping Computer)

Florida Man Working as a Ransomware Negotiator Pleads Guilty to Conspiracy to Deploy Ransomware and Extort U.S. Victims (United States Department of Justice)

Google Starts Scanning All Your Photos As New Update Goes Live (Forbes)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Apr 2026 20:30:00 -0000</pubDate>
      <itunes:title>Trust lags behind technology.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2535</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Anthropic’s Mythos proves irresistible despite claimed supply chain risks.Iran claims U.S. backdoors hit its networks. New Coast Guard rules target maritime OT security. A fresh NGate Android malware variant emerges. Thousands of ActiveMQ servers face active exploitation risk. CISA adds eight flaws to its KEV list. Progress patches MOVEit and LoadMaster bugs. Attackers impersonate IT staff over Microsoft Teams. A ransomware negotiator admits working with BlackCat. Google Gemini asks, “May we see your photos please?”

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices Elad Koren, Vice President, Product Management, Cortex Cloud at Palo Alto Networks, discusses building AI natively into platforms, managing complexity and trust, and taking a measured, experimental approach during the industry’s “messy middle” phase. If you enjoyed this conversation, tune into the full interview here. 

Selected Reading

The US NSA is using Anthropic's Claude Mythos despite supply chain risk (Security Affairs)

Anthropic secretly installs spyware when you install Claude Desktop (That Privacy Guy)

Iran claims US used backdoors in networking equipment (The Register)

Maritime Cybersecurity Rules Make Waves (GovInfoSecurity)

New NGate variant hides in a trojanized NFC payment app (We Live Security)

Actively exploited Apache ActiveMQ flaw impacts 6,400 servers (Bleeping Computer)

CISA flags another Cisco Catalyst SD-WAN Manager bug as exploited (CVE-2026-20133) (Help Net Security)

Progress Patches Multiple Vulnerabilities in MOVEit WAF, LoadMaster (SecurityWeek)

Microsoft: Teams increasingly abused in helpdesk impersonation attacks (Bleeping Computer)

Florida Man Working as a Ransomware Negotiator Pleads Guilty to Conspiracy to Deploy Ransomware and Extort U.S. Victims (United States Department of Justice)

Google Starts Scanning All Your Photos As New Update Goes Live (Forbes)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Anthropic’s Mythos proves irresistible despite claimed supply chain risks.Iran claims U.S. backdoors hit its networks. New Coast Guard rules target maritime OT security. A fresh NGate Android malware variant emerges. Thousands of ActiveMQ servers face active exploitation risk. CISA adds eight flaws to its KEV list. Progress patches MOVEit and LoadMaster bugs. Attackers impersonate IT staff over Microsoft Teams. A ransomware negotiator admits working with BlackCat. Google Gemini asks, “May we see your photos please?”</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On today’s Industry Voices <a href="https://www.linkedin.com/in/eladkoren/"><u>Elad Koren</u></a>, Vice President, Product Management, Cortex Cloud at <a href="https://www.linkedin.com/company/palo-alto-networks/"><u>Palo Alto Networks</u></a>, discusses building AI natively into platforms, managing complexity and trust, and taking a measured, experimental approach during the industry’s “messy middle” phase. If you enjoyed this conversation, tune into the full interview <a href="https://explore.thecyberwire.com/palo-alto">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://securityaffairs.com/191087/ai/the-us-nsa-is-using-anthropics-claude-mythos-despite-supply-chain-risk.html"><u>The US NSA is using Anthropic's Claude Mythos despite supply chain risk</u></a> (Security Affairs)</p>
<p><a href="https://www.thatprivacyguy.com/blog/anthropic-spyware/"><u>Anthropic secretly installs spyware when you install Claude Desktop</u></a> (That Privacy Guy)</p>
<p><a href="https://www.theregister.com/2026/04/21/iran_claims_us_used_backdoors/"><u>Iran claims US used backdoors in networking equipment</u></a> (The Register)</p>
<p><a href="https://www.govinfosecurity.com/maritime-cybersecurity-rules-make-waves-a-31464"><u>Maritime Cybersecurity Rules Make Waves</u></a> (GovInfoSecurity)</p>
<p><a href="https://www.welivesecurity.com/en/eset-research/new-ngate-variant-hides-in-a-trojanized-nfc-payment-app/"><u>New NGate variant hides in a trojanized NFC payment app</u></a> (We Live Security)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/actively-exploited-apache-activemq-flaw-impacts-6-400-servers/"><u>Actively exploited Apache ActiveMQ flaw impacts 6,400 servers</u></a> (Bleeping Computer)</p>
<p><a href="https://www.helpnetsecurity.com/2026/04/21/cisa-flags-another-cisco-catalyst-sd-wan-manager-bug-as-exploited-cve-2026-20133/"><u>CISA flags another Cisco Catalyst SD-WAN Manager bug as exploited (CVE-2026-20133)</u></a> (Help Net Security)</p>
<p><a href="https://www.securityweek.com/progress-patches-multiple-vulnerabilities-in-moveit-waf-loadmaster/"><u>Progress Patches Multiple Vulnerabilities in MOVEit WAF, LoadMaster</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/microsoft-teams-increasingly-abused-in-helpdesk-impersonation-attacks/"><u>Microsoft: Teams increasingly abused in helpdesk impersonation attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.justice.gov/opa/pr/florida-man-working-ransomware-negotiator-pleads-guilty-conspiracy-deploy-ransomware-and"><u>Florida Man Working as a Ransomware Negotiator Pleads Guilty to Conspiracy to Deploy Ransomware and Extort U.S. Victims</u></a> (United States Department of Justice)</p>
<p><a href="https://www.forbes.com/sites/zakdoffman/2026/04/20/google-starts-scanning-all-your-photos-as-new-update-goes-live/?streamIndex=0&amp;ref=metacurity.com"><u>Google Starts Scanning All Your Photos As New Update Goes Live</u></a> (Forbes)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1762</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c066df1a-1671-11f1-ad8a-abee8c0952c9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8962950939.mp3?updated=1776799080" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When one weak link is enough.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2534/notes</link>
      <description>Cloud platform Vercel confirms a data breach. Microsoft releases emergency updates to fix Windows Server restart loops. Bluesky gets DDoSed. Insurers keep close watch on an AI hiring discrimination suit. Cybersecurity workforce turnover rises. Scammers abuse Apple’s email notification system. A Scattered Spider member pleads guilty to SMS phishing and cryptocurrency theft. Monday business brief. Our guest is Melissa K. Smith, SVP, Global Strategic Partnerships and Initiatives at SentinelOne, discussing building a unified defense through strategic partnerships. A budget beacon briefly betrays a boat’s bearing. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today on our Industry Voices segment, we are joined by Melissa K. Smith, SVP, Global Strategic Partnerships and Initiatives at SentinelOne discussing building a unified defense through strategic partnerships. If you enjoyed this conversation, be sure to check out the full interview here.

Selected Reading

Vercel confirms breach as hackers claim to be selling stolen data (Bleeping Computer)

Microsoft releases emergency updates to fix Windows Server issues (Bleeping Computer)

Bluesky Disrupted by Sophisticated DDoS Attack (SecurityWeek)

Who is liable when artificial intelligence makes mistakes? (Financial Times)

Insurance carriers quietly back away from covering AI outputs (CSO Online)

Compensation vs. Burnout: The New Retention Calculus for Cybersecurity Leaders (Security Boulevard)

Watch out, hackers are abusing Apple account notifications to distribute malware, steal money and data (TechRadar)

British Scattered Spider Hacker Pleads Guilty in the US (SecurityWeek)

Business Briefing for 04.15.26 (CyberWire Pro)

Dutch navy frigate tracked by mailing it a Bluetooth tracker (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 20 Apr 2026 20:30:00 -0000</pubDate>
      <itunes:title>When one weak link is enough.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2534</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Cloud platform Vercel confirms a data breach. Microsoft releases emergency updates to fix Windows Server restart loops. Bluesky gets DDoSed. Insurers keep close watch on an AI hiring discrimination suit. Cybersecurity workforce turnover rises. Scammers abuse Apple’s email notification system. A Scattered Spider member pleads guilty to SMS phishing and cryptocurrency theft. Monday business brief. Our guest is Melissa K. Smith, SVP, Global Strategic Partnerships and Initiatives at SentinelOne, discussing building a unified defense through strategic partnerships. A budget beacon briefly betrays a boat’s bearing. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today on our Industry Voices segment, we are joined by Melissa K. Smith, SVP, Global Strategic Partnerships and Initiatives at SentinelOne discussing building a unified defense through strategic partnerships. If you enjoyed this conversation, be sure to check out the full interview here.

Selected Reading

Vercel confirms breach as hackers claim to be selling stolen data (Bleeping Computer)

Microsoft releases emergency updates to fix Windows Server issues (Bleeping Computer)

Bluesky Disrupted by Sophisticated DDoS Attack (SecurityWeek)

Who is liable when artificial intelligence makes mistakes? (Financial Times)

Insurance carriers quietly back away from covering AI outputs (CSO Online)

Compensation vs. Burnout: The New Retention Calculus for Cybersecurity Leaders (Security Boulevard)

Watch out, hackers are abusing Apple account notifications to distribute malware, steal money and data (TechRadar)

British Scattered Spider Hacker Pleads Guilty in the US (SecurityWeek)

Business Briefing for 04.15.26 (CyberWire Pro)

Dutch navy frigate tracked by mailing it a Bluetooth tracker (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cloud platform Vercel confirms a data breach. Microsoft releases emergency updates to fix Windows Server restart loops. Bluesky gets DDoSed. Insurers keep close watch on an AI hiring discrimination suit. Cybersecurity workforce turnover rises. Scammers abuse Apple’s email notification system. A Scattered Spider member pleads guilty to SMS phishing and cryptocurrency theft. Monday business brief. Our guest is Melissa K. Smith, SVP, Global Strategic Partnerships and Initiatives at SentinelOne, discussing building a unified defense through strategic partnerships. A budget beacon briefly betrays a boat’s bearing. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today on our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/melissa-k-smith/"><u>Melissa K. Smith</u></a>, SVP, Global Strategic Partnerships and Initiatives at <a href="https://www.sentinelone.com/"><u>SentinelOne</u></a> discussing building a unified defense through strategic partnerships. If you enjoyed this conversation, be sure to check out the full interview <a href="https://explore.thecyberwire.com/melissa-smith">here</a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/vercel-confirms-breach-as-hackers-claim-to-be-selling-stolen-data/"><u>Vercel confirms breach as hackers claim to be selling stolen data</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-emergency-updates-to-fix-windows-server-issues/"><u>Microsoft releases emergency updates to fix Windows Server issues</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/bluesky-disrupted-by-sophisticated-ddos-attack/"><u>Bluesky Disrupted by Sophisticated DDoS Attack</u></a> (SecurityWeek)</p>
<p><a href="https://www.ft.com/content/51b55431-30e8-4eb3-9730-f5e89c24ad56"><u>Who is liable when artificial intelligence makes mistakes?</u></a> (Financial Times)</p>
<p><a href="https://www.csoonline.com/article/4159292/insurance-carriers-quietly-back-away-from-covering-ai-outputs.html"><u>Insurance carriers quietly back away from covering AI outputs</u></a> (CSO Online)</p>
<p><a href="https://securityboulevard.com/2026/04/compensation-vs-burnout-the-new-retention-calculus-for-cybersecurity-leaders/"><u>Compensation vs. Burnout: The New Retention Calculus for Cybersecurity Leaders</u></a> (Security Boulevard)</p>
<p><a href="https://www.techradar.com/pro/security/watch-out-hackers-are-abusing-apple-account-notifications-to-distribute-malware-steal-money-and-data"><u>Watch out, hackers are abusing Apple account notifications to distribute malware, steal money and data</u></a> (TechRadar)</p>
<p><a href="https://www.securityweek.com/british-scattered-spider-hacker-pleads-guilty-in-the-us/"><u>British Scattered Spider Hacker Pleads Guilty in the US</u></a> (SecurityWeek)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/8/15"><u>Business Briefing for 04.15.26</u></a> (CyberWire Pro)</p>
<p><a href="https://www.theregister.com/2026/04/17/dutch_navy_frigate_tracked/"><u>Dutch navy frigate tracked by mailing it a Bluetooth tracker</u></a> (The Register)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1720</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c04235ca-1671-11f1-ad8a-07c674bc888f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7521369381.mp3?updated=1776708632" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jaya Baloo: Don't be afraid to bounce ideas off your teammates. [CISO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/117/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Jaya Baloo, a Chief Information Security Officer from Avast sits down to share her story, sharing how she got into the technology field at a younger age with being introduced to computers and games on her PS 24. She started off going to college for political science and after not knowing what to do after that, she got her first start in cybersecurity. After falling in love with cybersecurity she kept moving up the ranks in different organizations before finding herself at Avast. She shares that at Avast she leans on her team quite a bit and you should never be afraid to bounce ideas off of your teammates. She says "The best ideas come from like bouncing ideas off of each other, sharing within the group and then if I can't figure it out myself, that's why I hire these amazing individuals it's to help me figure it out." We thank Jaya for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 19 Apr 2026 07:00:00 -0000</pubDate>
      <itunes:title>Jaya Baloo: Don't be afraid to bounce ideas off your teammates. [CISO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>117</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c525c468-3a97-11f1-937a-e37779f10c26/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Jaya Baloo, a Chief Information Security Officer from Avast sits down to share her story, sharing how she got into the technology field at a younger age with being introduced to computers and games on her PS 24. She started off going to college for political science and after not knowing what to do after that, she got her first start in cybersecurity. After falling in love with cybersecurity she kept moving up the ranks in different organizations before finding herself at Avast. She shares that at Avast she leans on her team quite a bit and you should never be afraid to bounce ideas off of your teammates. She says "The best ideas come from like bouncing ideas off of each other, sharing within the group and then if I can't figure it out myself, that's why I hire these amazing individuals it's to help me figure it out." We thank Jaya for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Jaya Baloo, a Chief Information Security Officer from Avast sits down to share her story, sharing how she got into the technology field at a younger age with being introduced to computers and games on her PS 24. She started off going to college for political science and after not knowing what to do after that, she got her first start in cybersecurity. After falling in love with cybersecurity she kept moving up the ranks in different organizations before finding herself at Avast. She shares that at Avast she leans on her team quite a bit and you should never be afraid to bounce ideas off of your teammates. She says "The best ideas come from like bouncing ideas off of each other, sharing within the group and then if I can't figure it out myself, that's why I hire these amazing individuals it's to help me figure it out." We thank Jaya for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>634</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c525c468-3a97-11f1-937a-e37779f10c26]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6287637550.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A new breed of RAT. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/421/notes</link>
      <description>Today we are joined by Dr. Darren Williams, Founder and CEO of BlackFog, to discuss his team's work on "Steaelite RAT Enables Double Extortion Attacks from a Single Panel." A new remote access trojan, Steaelite, is being marketed on underground forums as an all-in-one platform that combines remote access, credential theft, surveillance, and ransomware deployment through a single browser-based dashboard. 

Unlike traditional cybercrime toolchains, it merges data exfiltration and ransomware capabilities into one interface, with automated credential harvesting beginning as soon as a victim is infected. The tool signals a growing shift toward streamlined “double extortion” attacks, where data theft and encryption happen within the same system—raising the stakes for defenders to stop threats before data is exfiltrated.

The research and executive brief can be found here:


  Steaelite RAT Enables Double Extortion Attacks from a Single Panel


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Apr 2026 07:00:00 -0000</pubDate>
      <itunes:title>A new breed of RAT. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>421</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/1a908292-3a86-11f1-afb2-0f5ca3797a44/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Today we are joined by Dr. Darren Williams, Founder and CEO of BlackFog, to discuss his team's work on "Steaelite RAT Enables Double Extortion Attacks from a Single Panel." A new remote access trojan, Steaelite, is being marketed on underground forums as an all-in-one platform that combines remote access, credential theft, surveillance, and ransomware deployment through a single browser-based dashboard. 

Unlike traditional cybercrime toolchains, it merges data exfiltration and ransomware capabilities into one interface, with automated credential harvesting beginning as soon as a victim is infected. The tool signals a growing shift toward streamlined “double extortion” attacks, where data theft and encryption happen within the same system—raising the stakes for defenders to stop threats before data is exfiltrated.

The research and executive brief can be found here:


  Steaelite RAT Enables Double Extortion Attacks from a Single Panel


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we are joined by <a href="https://www.linkedin.com/in/darrenwwilliams/">Dr. Darren Williams</a>, Founder and CEO of <a href="https://www.blackfog.com/">BlackFog</a>, to discuss his team's work on "Steaelite RAT Enables Double Extortion Attacks from a Single Panel." A new remote access trojan, Steaelite, is being marketed on underground forums as an all-in-one platform that combines remote access, credential theft, surveillance, and ransomware deployment through a single browser-based dashboard. </p>
<p>Unlike traditional cybercrime toolchains, it merges data exfiltration and ransomware capabilities into one interface, with automated credential harvesting beginning as soon as a victim is infected. The tool signals a growing shift toward streamlined “double extortion” attacks, where data theft and encryption happen within the same system—raising the stakes for defenders to stop threats before data is exfiltrated.</p>
<p><strong>The research and executive brief can be found here:</strong></p>
<ul>
  <li><a href="https://www.blackfog.com/steaelite-rat-double-extortion-from-single-panel/">Steaelite RAT Enables Double Extortion Attacks from a Single Panel</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1312</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1a908292-3a86-11f1-afb2-0f5ca3797a44]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4653324224.mp3?updated=1776448577" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Temporary fix for Section 702.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2533/notes</link>
      <description>The House extends Section 702, for now. Mythos raises fresh cyber risk concerns. CISA warns of reduced capacity. ZionSiphon targets Israeli water systems. Operation PowerOFF hits DDoS-for-hire networks. CISA flags an actively exploited ActiveMQ flaw. WordPress plugin supply chain attacks spread. China tests deep-sea cable-cutting tech. Our guest is Arvind Nithrakashyap, CTO and Co-Founder of Rubrik, discussing AI as the next frontier. Tim Starks from CyberScoop takes us Inside the FBI’s recent router takedown. A DraftKings data dealer meets his downfall. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, ⁠Daily Briefing⁠, and you’ll never miss a beat. And be sure to follow CyberWire Daily on ⁠LinkedIn⁠.

Industry Voices

On today’s Industry Voices segment, we are joined by ⁠Arvind Nithrakashyap⁠, CTO and Co-Founder of ⁠Rubrik⁠, discussing AI as the next frontier. If you enjoyed this conversation, check out the full interview here. 

CyberWire Guest

Today we have ⁠Tim Starks⁠ from ⁠CyberScoop⁠ discussing Inside the FBI’s router takedown that cut off APT28’s ‘tremendous access’. 

Selected Reading

⁠House extends surveillance powers for 10 days⁠ (NPR)

⁠White House Works to Give US Agencies Anthropic Mythos AI⁠ (Bloomberg)

⁠Lawmakers Gathered Quietly to Talk About AI. Angst and Fears of ‘Destruction’ Followed⁠ (SecurityWeek)

⁠How Anthropic Discovered Mythos AI Was Too Dangerous For Release⁠ (Bloomberg)

⁠CISA Warns of 'Detrimental Capacity Impacts' Amid Shutdown⁠ (BankInfo Security)

⁠New ZionSiphon Malware Discovered Targeting Israeli Water Systems⁠ (Hackread)

⁠Europol-supported global operation targets over 75 000 users engaged in DDoS attacks⁠ (Europol)

⁠CISA flags Apache ActiveMQ flaw as actively exploited in attacks⁠ (Bleeping Computer)

⁠30+ WordPress plugins bought on Flippa and backdoored in supply chain attack⁠ (TNW)

⁠New undersea cable cutter risks Internet’s backbone⁠ (Ars Technica)

⁠Man gets 30 months for selling thousands of hacked DraftKings accounts⁠ (Bleeping Computer)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our ⁠brief listener survey⁠. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at ⁠sponsor.thecyberwire.com⁠.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 17 Apr 2026 20:30:00 -0000</pubDate>
      <itunes:title>Temporary fix for Section 702.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2533</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The House extends Section 702, for now. Mythos raises fresh cyber risk concerns. CISA warns of reduced capacity. ZionSiphon targets Israeli water systems. Operation PowerOFF hits DDoS-for-hire networks. CISA flags an actively exploited ActiveMQ flaw. WordPress plugin supply chain attacks spread. China tests deep-sea cable-cutting tech. Our guest is Arvind Nithrakashyap, CTO and Co-Founder of Rubrik, discussing AI as the next frontier. Tim Starks from CyberScoop takes us Inside the FBI’s recent router takedown. A DraftKings data dealer meets his downfall. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, ⁠Daily Briefing⁠, and you’ll never miss a beat. And be sure to follow CyberWire Daily on ⁠LinkedIn⁠.

Industry Voices

On today’s Industry Voices segment, we are joined by ⁠Arvind Nithrakashyap⁠, CTO and Co-Founder of ⁠Rubrik⁠, discussing AI as the next frontier. If you enjoyed this conversation, check out the full interview here. 

CyberWire Guest

Today we have ⁠Tim Starks⁠ from ⁠CyberScoop⁠ discussing Inside the FBI’s router takedown that cut off APT28’s ‘tremendous access’. 

Selected Reading

⁠House extends surveillance powers for 10 days⁠ (NPR)

⁠White House Works to Give US Agencies Anthropic Mythos AI⁠ (Bloomberg)

⁠Lawmakers Gathered Quietly to Talk About AI. Angst and Fears of ‘Destruction’ Followed⁠ (SecurityWeek)

⁠How Anthropic Discovered Mythos AI Was Too Dangerous For Release⁠ (Bloomberg)

⁠CISA Warns of 'Detrimental Capacity Impacts' Amid Shutdown⁠ (BankInfo Security)

⁠New ZionSiphon Malware Discovered Targeting Israeli Water Systems⁠ (Hackread)

⁠Europol-supported global operation targets over 75 000 users engaged in DDoS attacks⁠ (Europol)

⁠CISA flags Apache ActiveMQ flaw as actively exploited in attacks⁠ (Bleeping Computer)

⁠30+ WordPress plugins bought on Flippa and backdoored in supply chain attack⁠ (TNW)

⁠New undersea cable cutter risks Internet’s backbone⁠ (Ars Technica)

⁠Man gets 30 months for selling thousands of hacked DraftKings accounts⁠ (Bleeping Computer)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our ⁠brief listener survey⁠. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at ⁠sponsor.thecyberwire.com⁠.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The House extends Section 702, for now. Mythos raises fresh cyber risk concerns. CISA warns of reduced capacity. ZionSiphon targets Israeli water systems. Operation PowerOFF hits DDoS-for-hire networks. CISA flags an actively exploited ActiveMQ flaw. WordPress plugin supply chain attacks spread. China tests deep-sea cable-cutting tech. Our guest is Arvind Nithrakashyap, CTO and Co-Founder of Rubrik, discussing AI as the next frontier. Tim Starks from CyberScoop takes us Inside the FBI’s recent router takedown. A DraftKings data dealer meets his downfall. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing">⁠<em>Daily Briefing</em>⁠</a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">⁠<u>LinkedIn</u>⁠</a>.</p>
<p><strong>Industry Voices</strong></p>
<p>On today’s Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/arvind-nithrakashyap-752280/">⁠<u>Arvind Nithrakashyap</u>⁠</a>, CTO and Co-Founder of <a href="https://www.linkedin.com/company/rubrik-inc/">⁠<u>Rubrik</u>⁠</a>, discussing AI as the next frontier. If you enjoyed this conversation, check out the full interview <a href="https://explore.thecyberwire.com/rubrik">here</a>. </p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we have <a href="https://www.linkedin.com/in/tstarks/">⁠<u>Tim Starks</u>⁠</a> from <a href="https://www.linkedin.com/company/cyberscoop/">⁠<u>CyberScoop</u>⁠</a> discussing Inside the FBI’s router takedown that cut off APT28’s ‘tremendous access’. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.npr.org/2026/04/17/nx-s1-5788573/house-extends-surveillance-powers-for-10-days">⁠<u>House extends surveillance powers for 10 days</u>⁠</a> (NPR)</p>
<p><a href="https://www.bloomberg.com/news/articles/2026-04-16/white-house-moves-to-give-us-agencies-anthropic-mythos-access">⁠<u>White House Works to Give US Agencies Anthropic Mythos AI</u>⁠</a> (Bloomberg)</p>
<p><a href="https://www.securityweek.com/lawmakers-gathered-quietly-to-talk-about-ai-angst-and-fears-of-destruction-followed/">⁠<u>Lawmakers Gathered Quietly to Talk About AI. Angst and Fears of ‘Destruction’ Followed</u>⁠</a> (SecurityWeek)</p>
<p><a href="https://www.bloomberg.com/news/features/2026-04-16/how-anthropic-discovered-mythos-ai-was-too-dangerous-for-release?embedded-checkout=true">⁠<u>How Anthropic Discovered Mythos AI Was Too Dangerous For Release</u>⁠</a> (Bloomberg)</p>
<p><a href="https://www.bankinfosecurity.com/cisa-warns-detrimental-capacity-impacts-amid-shutdown-a-31449">⁠<u>CISA Warns of 'Detrimental Capacity Impacts' Amid Shutdown</u>⁠</a> (BankInfo Security)</p>
<p><a href="https://hackread.com/zionsiphon-malware-target-israeli-water-systems/">⁠<u>New ZionSiphon Malware Discovered Targeting Israeli Water Systems</u>⁠</a> (Hackread)</p>
<p><a href="https://www.europol.europa.eu/media-press/newsroom/news/europol-supported-global-operation-targets-over-75-000-users-engaged-in-ddos-attacks">⁠<u>Europol-supported global operation targets over 75 000 users engaged in DDoS attacks</u>⁠</a> (Europol)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisa-flags-apache-activemq-flaw-as-actively-exploited-in-attacks/">⁠<u>CISA flags Apache ActiveMQ flaw as actively exploited in attacks</u>⁠</a> (Bleeping Computer)</p>
<p><a href="https://thenextweb.com/news/wordpress-plugins-backdoor-supply-chain-essential-plugin-flippa-2">⁠<u>30+ WordPress plugins bought on Flippa and backdoored in supply chain attack</u>⁠</a> (TNW)</p>
<p><a href="https://arstechnica.com/gadgets/2026/04/china-tests-an-undersea-cable-cutter-as-suspected-sabotage-incidents-grow/">⁠<u>New undersea cable cutter risks Internet’s backbone</u>⁠</a> (Ars Technica)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/man-gets-30-months-for-selling-thousands-of-hacked-draftkings-accounts/">⁠<u>Man gets 30 months for selling thousands of hacked DraftKings accounts</u>⁠</a> (Bleeping Computer)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ">⁠<u>brief listener survey</u>⁠</a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/">⁠<u>sponsor.thecyberwire.com</u>⁠</a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2135</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c01ae22c-1671-11f1-ad8a-abd75b253c22]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9868863532.mp3?updated=1776455462" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Too many flaws, not enough time.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2532/notes</link>
      <description>NIST struggles with an NVD backlog. Cisco and Splunk ship critical patches. Researchers flag a systemic flaw in Anthropic’s MCP. ShinyHunters leak 13.5 million McGraw Hill accounts. Cargo theft goes cyber. A Tennessee hospital breach hits 337,000 patients. Two Americans are sentenced in a North Korean fake-IT-worker scheme. Our guest is Rob Allen, Chief Product Officer at ThreatLocker, describing security gaps addressed by zero trust. OpenAI lets security teams take off the training wheels. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices segment we are joined by Rob Allen, Chief Product Officer at ThreatLocker, security gaps addressed by zero trust. If you enjoyed this conversation check out the full interview here.

Selected Reading

NIST Drops NVD Enrichment for Pre-March 2026 Vulnerabilities (Infosecurity Magazine)

Cisco says critical Webex Services flaw requires customer action (Bleeping Computer)

Splunk Enterprise Update Patches Code Execution Vulnerability (SecurityWeek)

Systemic Flaw in MCP Protocol Could Expose 150 Million Downloads (Infosecurity Magazine)

Data breach at edtech giant McGraw Hill affects 13.5 million accounts (Bleeping Computer)

Freight Hacker Wields Code-Signing Service to Evade Defenses (GovInfo Security)

Data Breach at Tennessee Hospital Affects 337,000 (SecurityWeek)

US nationals behind DPRK IT worker 'laptop farm' sent to prison (Bleeping Computer)

OpenAI Launches GPT-5.4 Cyber And It's Built Specifically for Defenders (TechGlow)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 16 Apr 2026 20:30:00 -0000</pubDate>
      <itunes:title>Too many flaws, not enough time.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2532</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>NIST struggles with an NVD backlog. Cisco and Splunk ship critical patches. Researchers flag a systemic flaw in Anthropic’s MCP. ShinyHunters leak 13.5 million McGraw Hill accounts. Cargo theft goes cyber. A Tennessee hospital breach hits 337,000 patients. Two Americans are sentenced in a North Korean fake-IT-worker scheme. Our guest is Rob Allen, Chief Product Officer at ThreatLocker, describing security gaps addressed by zero trust. OpenAI lets security teams take off the training wheels. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices segment we are joined by Rob Allen, Chief Product Officer at ThreatLocker, security gaps addressed by zero trust. If you enjoyed this conversation check out the full interview here.

Selected Reading

NIST Drops NVD Enrichment for Pre-March 2026 Vulnerabilities (Infosecurity Magazine)

Cisco says critical Webex Services flaw requires customer action (Bleeping Computer)

Splunk Enterprise Update Patches Code Execution Vulnerability (SecurityWeek)

Systemic Flaw in MCP Protocol Could Expose 150 Million Downloads (Infosecurity Magazine)

Data breach at edtech giant McGraw Hill affects 13.5 million accounts (Bleeping Computer)

Freight Hacker Wields Code-Signing Service to Evade Defenses (GovInfo Security)

Data Breach at Tennessee Hospital Affects 337,000 (SecurityWeek)

US nationals behind DPRK IT worker 'laptop farm' sent to prison (Bleeping Computer)

OpenAI Launches GPT-5.4 Cyber And It's Built Specifically for Defenders (TechGlow)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>NIST struggles with an NVD backlog. Cisco and Splunk ship critical patches. Researchers flag a systemic flaw in Anthropic’s MCP. ShinyHunters leak 13.5 million McGraw Hill accounts. Cargo theft goes cyber. A Tennessee hospital breach hits 337,000 patients. Two Americans are sentenced in a North Korean fake-IT-worker scheme. Our guest is Rob Allen, Chief Product Officer at ThreatLocker, describing security gaps addressed by zero trust. OpenAI lets security teams take off the training wheels. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On today’s Industry Voices segment we are joined by <a href="https://www.linkedin.com/in/threatlockerrob/"><u>Rob Allen</u></a>, Chief Product Officer at <a href="https://www.threatlocker.com/"><u>ThreatLocker</u></a>, security gaps addressed by zero trust. If you enjoyed this conversation check out the full interview <a href="https://explore.thecyberwire.com/threatlocker"><u>here</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.infosecurity-magazine.com/news/nvd-enrichment-premarch-2026/"><u>NIST Drops NVD Enrichment for Pre-March 2026 Vulnerabilities</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisco-says-critical-webex-services-flaw-requires-customer-action/"><u>Cisco says critical Webex Services flaw requires customer action</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/splunk-enterprise-update-patches-code-execution-vulnerability/"><u>Splunk Enterprise Update Patches Code Execution Vulnerability</u></a> (SecurityWeek)</p>
<p><a href="https://www.infosecurity-magazine.com/news/systemic-flaw-mcp-expose-150/"><u>Systemic Flaw in MCP Protocol Could Expose 150 Million Downloads</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/data-breach-at-edtech-giant-mcgraw-hill-affects-135-million-accounts/"><u>Data breach at edtech giant McGraw Hill affects 13.5 million accounts</u></a> (Bleeping Computer)</p>
<p><a href="https://www.govinfosecurity.com/freight-hacker-wields-code-signing-service-to-evade-defenses-a-31433"><u>Freight Hacker Wields Code-Signing Service to Evade Defenses</u></a> (GovInfo Security)</p>
<p><a href="https://www.securityweek.com/data-breach-at-tennessee-hospital-affects-337000/"><u>Data Breach at Tennessee Hospital Affects 337,000</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/us-nationals-behind-north-korean-it-worker-laptop-farm-sent-to-prison/"><u>US nationals behind DPRK IT worker 'laptop farm' sent to prison</u></a> (Bleeping Computer)</p>
<p><a href="https://techglimmer.io/what-is-gpt-5-4-and-gpt-5-4-review/"><u>OpenAI Launches GPT-5.4 Cyber And It's Built Specifically for Defenders</u></a> (TechGlow)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1884</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bff2407e-1671-11f1-ad8a-e3df1a1d1a64]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1100361287.mp3?updated=1776366976" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A heavy patch Tuesday lands.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2531/notes</link>
      <description>Patch Tuesday. CISA directs furloughed employees back to work.  Experts warn Anthropic’s Glasswing signals a new era of AI-driven vulnerability discovery. Federal prosecutors crack down on chip smuggling. Sweden says a pro-Russian cyber group attempted to disrupt power plant operations. A fake app in Apple’s App Store drains crypto wallets. Virginia bans the sale of precise geolocation data. Our guest is Johnny Hand, VP for AI Excellence at TrendAI, discussing AI operational discipline. Do you need to buy a separate seat for your AI agent?

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today on our Industry Voices segment, we are joined by ⁠Johnny Hand⁠, VP for AI Excellence at ⁠TrendAI⁠, discussing AI operational discipline and real-world cyber impact. If you enjoyed this conversation, check out the full interview here. 

Selected Reading

Microsoft Patch Tuesday for April 2026 fixed actively exploited SharePoint zero-day (Security Affairs)

ICS Patch Tuesday: 8 Industrial Giants Publish New Security Advisories (SecurityWeek)

Adobe Patches 55 Vulnerabilities Across 11 Products (SecurityWeek)

CISA Workers Recalled Despite Shutdown (GovInfoSecurity)

CISA cancels summer internships for cyber scholarship students amid DHS funding lapse (CyberScoop)

Anthropic’s Mythos signals a structural cybersecurity shift (CSO Online)

We’re only seeing the tip of the chip-smuggling iceberg (CyberScoop)

Swedish power plant targeted by pro-Russian group in 2025, government says (Reuters)

Exclusive: Russia-linked hackers compromised scores of Ukrainian prosecutors’ email accounts, data shows (Reuters)

Users lose $9.5 million to fake Ledger wallet app on the Apple App Store (web3isgoinggreat)

Virginia enacts ban on precise geolocation data sales as momentum for similar prohibitions builds (The Record)

Microsoft exec suggests AI agents will need to buy software licenses, just like employees (Business Insider)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 15 Apr 2026 20:30:00 -0000</pubDate>
      <itunes:title>A heavy patch Tuesday lands.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2531</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Patch Tuesday. CISA directs furloughed employees back to work.  Experts warn Anthropic’s Glasswing signals a new era of AI-driven vulnerability discovery. Federal prosecutors crack down on chip smuggling. Sweden says a pro-Russian cyber group attempted to disrupt power plant operations. A fake app in Apple’s App Store drains crypto wallets. Virginia bans the sale of precise geolocation data. Our guest is Johnny Hand, VP for AI Excellence at TrendAI, discussing AI operational discipline. Do you need to buy a separate seat for your AI agent?

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today on our Industry Voices segment, we are joined by ⁠Johnny Hand⁠, VP for AI Excellence at ⁠TrendAI⁠, discussing AI operational discipline and real-world cyber impact. If you enjoyed this conversation, check out the full interview here. 

Selected Reading

Microsoft Patch Tuesday for April 2026 fixed actively exploited SharePoint zero-day (Security Affairs)

ICS Patch Tuesday: 8 Industrial Giants Publish New Security Advisories (SecurityWeek)

Adobe Patches 55 Vulnerabilities Across 11 Products (SecurityWeek)

CISA Workers Recalled Despite Shutdown (GovInfoSecurity)

CISA cancels summer internships for cyber scholarship students amid DHS funding lapse (CyberScoop)

Anthropic’s Mythos signals a structural cybersecurity shift (CSO Online)

We’re only seeing the tip of the chip-smuggling iceberg (CyberScoop)

Swedish power plant targeted by pro-Russian group in 2025, government says (Reuters)

Exclusive: Russia-linked hackers compromised scores of Ukrainian prosecutors’ email accounts, data shows (Reuters)

Users lose $9.5 million to fake Ledger wallet app on the Apple App Store (web3isgoinggreat)

Virginia enacts ban on precise geolocation data sales as momentum for similar prohibitions builds (The Record)

Microsoft exec suggests AI agents will need to buy software licenses, just like employees (Business Insider)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Patch Tuesday. CISA directs furloughed employees back to work.  Experts warn Anthropic’s Glasswing signals a new era of AI-driven vulnerability discovery. Federal prosecutors crack down on chip smuggling. Sweden says a pro-Russian cyber group attempted to disrupt power plant operations. A fake app in Apple’s App Store drains crypto wallets. Virginia bans the sale of precise geolocation data. Our guest is Johnny Hand, VP for AI Excellence at TrendAI, discussing AI operational discipline. Do you need to buy a separate seat for your AI agent?</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today on our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/johnny-hand-mba-74781855/">⁠<u>Johnny Hand</u>⁠</a>, VP for AI Excellence at <a href="https://www.trendmicro.com/en_us/business.html">⁠<u>TrendAI</u>⁠</a>, discussing AI operational discipline and real-world cyber impact. If you enjoyed this conversation, check out the full interview <a href="https://explore.thecyberwire.com/johnny-hand">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://securityaffairs.com/190831/security/microsoft-patch-tuesday-for-april-2026-fixed-actively-exploited-sharepoint-zero-day.html"><u>Microsoft Patch Tuesday for April 2026 fixed actively exploited SharePoint zero-day</u></a> (Security Affairs)</p>
<p><a href="https://www.securityweek.com/ics-patch-tuesday-8-industrial-giants-publish-new-security-advisories/"><u>ICS Patch Tuesday: 8 Industrial Giants Publish New Security Advisories</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/adobe-patches-55-vulnerabilities-across-11-products/"><u>Adobe Patches 55 Vulnerabilities Across 11 Products</u></a> (SecurityWeek)</p>
<p><a href="https://www.govinfosecurity.com/cisa-workers-recalled-despite-shutdown-a-31420"><u>CISA Workers Recalled Despite Shutdown</u></a> (GovInfoSecurity)</p>
<p><a href="https://cyberscoop.com/cisa-cancels-cybercorps-internships-dhs-funding-crisis/"><u>CISA cancels summer internships for cyber scholarship students amid DHS funding lapse</u></a> (CyberScoop)</p>
<p><a href="https://www.csoonline.com/article/4158117/anthropics-mythos-signals-a-structural-cybersecurity-shift.html"><u>Anthropic’s Mythos signals a structural cybersecurity shift</u></a> (CSO Online)</p>
<p><a href="https://cyberscoop.com/ai-chip-smuggling-china-export-controls-enforcement-op-ed/"><u>We’re only seeing the tip of the chip-smuggling iceberg</u></a> (CyberScoop)</p>
<p><a href="https://www.reuters.com/world/swedish-power-plant-targeted-by-pro-russian-group-2025-government-says-2026-04-15/"><u>Swedish power plant targeted by pro-Russian group in 2025, government says</u></a> (Reuters)</p>
<p><a href="https://www.reuters.com/world/russia-linked-hackers-compromised-scores-ukrainian-prosecutors-email-accounts-2026-04-15/"><u>Exclusive: Russia-linked hackers compromised scores of Ukrainian prosecutors’ email accounts, data shows</u></a> (Reuters)</p>
<p><a href="https://www.web3isgoinggreat.com/?id=fake-ledger-app"><u>Users lose $9.5 million to fake Ledger wallet app on the Apple App Store</u></a> (web3isgoinggreat)</p>
<p><a href="https://therecord.media/virginia-enacts-ban-on-precise-geolocation-data"><u>Virginia enacts ban on precise geolocation data sales as momentum for similar prohibitions builds</u></a> (The Record)</p>
<p><a href="https://www.businessinsider.com/microsoft-executive-suggests-ai-agents-buy-software-licenses-seats-2026-4"><u>Microsoft exec suggests AI agents will need to buy software licenses, just like employees</u></a> (Business Insider)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1588</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bfc72380-1671-11f1-ad8a-a3ea36c8b728]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2051841980.mp3?updated=1776280771" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>France builds its own digital future.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2530/notes</link>
      <description>France pushes digital sovereignty. Adobe rushes an Acrobat Reader patch. Booking.com confirms a targeted breach. SAP fixes a critical SQL injection bug. A sanctions-dodging fraud network resurfaces. ViperTunnel infiltrates U.S. and U.K. firms. GlassWorm spreads across developer tools. Researchers dissect Predator spyware’s kernel engine. A lawsuit challenges AI transcription in hospitals. Ted Shorter from Keyfactor unpacks quantum computing at scale. On our Threat Vector segment, David Moulton and ⁠Elad Koren⁠ pull back the curtain on agentic-first security. Preparing for post-quantum perils. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Ted Shorter, CTO and Co-Founder of Keyfactor, discussing the advent of quantum computing at scale, known as "Q-Day".

Threat Vector

Host David Moulton speaks with returning guest ⁠Elad Koren⁠, Vice President of Product Management for Cortex Cloud at ⁠Palo Alto Networks⁠ on this Threat Vector segment. Together they pull back the curtain on what an agentic-first security experience actually looks like in practice. This isn't a vision deck. The agents are already running. To listen to the full conversation, check it out here. Catch new episodes of Threat Vector every Thursday on your favorite podcast app.

Selected Reading

France Tees Up Big Public Sector Move Away From US Tech (BankInfo Security)

Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw (Bleeping Computer)

Booking.com Confirms Data Breach as Hackers Access Customer Details (Hackread)

SAP Patches Critical ABAP Vulnerability (SecurityWeek)

Triad Nexus Evades Sanctions to Fuel Cybercrime (SecurityWeek)

Ransomware-Linked ViperTunnel Malware Hits UK and US Businesses (Hackread)

GlassWorm evolves with Zig dropper to infect multiple developer tools (Security Affairs)

Predator Spyware's iOS Kernel Exploitation Engine: PAC Bypass, NEON R/W &amp; More (Jamf Threat Labs)

Lawsuit: AI Illegally Recorded Doctor-Patient Encounters (BankInfo Security)

World Quantum Day (WorldQuantimDay)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Apr 2026 20:30:00 -0000</pubDate>
      <itunes:title>France builds its own digital future.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2530</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>France pushes digital sovereignty. Adobe rushes an Acrobat Reader patch. Booking.com confirms a targeted breach. SAP fixes a critical SQL injection bug. A sanctions-dodging fraud network resurfaces. ViperTunnel infiltrates U.S. and U.K. firms. GlassWorm spreads across developer tools. Researchers dissect Predator spyware’s kernel engine. A lawsuit challenges AI transcription in hospitals. Ted Shorter from Keyfactor unpacks quantum computing at scale. On our Threat Vector segment, David Moulton and ⁠Elad Koren⁠ pull back the curtain on agentic-first security. Preparing for post-quantum perils. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Ted Shorter, CTO and Co-Founder of Keyfactor, discussing the advent of quantum computing at scale, known as "Q-Day".

Threat Vector

Host David Moulton speaks with returning guest ⁠Elad Koren⁠, Vice President of Product Management for Cortex Cloud at ⁠Palo Alto Networks⁠ on this Threat Vector segment. Together they pull back the curtain on what an agentic-first security experience actually looks like in practice. This isn't a vision deck. The agents are already running. To listen to the full conversation, check it out here. Catch new episodes of Threat Vector every Thursday on your favorite podcast app.

Selected Reading

France Tees Up Big Public Sector Move Away From US Tech (BankInfo Security)

Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw (Bleeping Computer)

Booking.com Confirms Data Breach as Hackers Access Customer Details (Hackread)

SAP Patches Critical ABAP Vulnerability (SecurityWeek)

Triad Nexus Evades Sanctions to Fuel Cybercrime (SecurityWeek)

Ransomware-Linked ViperTunnel Malware Hits UK and US Businesses (Hackread)

GlassWorm evolves with Zig dropper to infect multiple developer tools (Security Affairs)

Predator Spyware's iOS Kernel Exploitation Engine: PAC Bypass, NEON R/W &amp; More (Jamf Threat Labs)

Lawsuit: AI Illegally Recorded Doctor-Patient Encounters (BankInfo Security)

World Quantum Day (WorldQuantimDay)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>France pushes digital sovereignty. Adobe rushes an Acrobat Reader patch. Booking.com confirms a targeted breach. SAP fixes a critical SQL injection bug. A sanctions-dodging fraud network resurfaces. ViperTunnel infiltrates U.S. and U.K. firms. GlassWorm spreads across developer tools. Researchers dissect Predator spyware’s kernel engine. A lawsuit challenges AI transcription in hospitals. Ted Shorter from Keyfactor unpacks quantum computing at scale. On our Threat Vector segment, David Moulton and ⁠Elad Koren⁠ pull back the curtain on agentic-first security. Preparing for post-quantum perils. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="http://linkedin.com/in/tedshorter"><u>Ted Shorter</u></a>, CTO and Co-Founder of <a href="https://www.keyfactor.com/"><u>Keyfactor</u></a>, discussing the advent of quantum computing at scale, known as "Q-Day".</p>
<p><strong>Threat Vector</strong></p>
<p>Host David Moulton speaks with returning guest<a href="https://www.linkedin.com/in/eladkoren/"><u> ⁠Elad Koren⁠</u></a>, Vice President of Product Management for Cortex Cloud at <a href="https://www.paloaltonetworks.com/"><u>⁠Palo Alto Networks⁠</u></a> on this Threat Vector segment. Together they pull back the curtain on what an agentic-first security experience actually looks like in practice. This isn't a vision deck. The agents are already running. To listen to the full conversation, check it out<a href="https://thecyberwire.com/podcasts/threat-vector/112/notes"><u> here</u></a>. Catch new episodes of<a href="https://thecyberwire.com/podcasts/threat-vector"><u> Threat Vector</u></a> every Thursday on your favorite podcast app.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bankinfosecurity.com/france-tees-up-big-public-sector-move-away-from-us-tech-a-31407"><u>France Tees Up Big Public Sector Move Away From US Tech</u></a> (BankInfo Security)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/adobe-rolls-out-emergency-fix-for-acrobat-reader-zero-day-flaw/"><u>Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw</u></a> (Bleeping Computer)</p>
<p><a href="https://hackread.com/booking-com-data-breach-hackers-customer-details/"><u>Booking.com Confirms Data Breach as Hackers Access Customer Details</u></a> (Hackread)</p>
<p><a href="https://www.securityweek.com/sap-patches-critical-abap-vulnerability/"><u>SAP Patches Critical ABAP Vulnerability</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/triad-nexus-evades-sanctions-to-fuel-cybercrime/"><u>Triad Nexus Evades Sanctions to Fuel Cybercrime </u></a>(SecurityWeek)</p>
<p><a href="https://hackread.com/ransomware-vipertunnel-malware-uk-us-businesses/"><u>Ransomware-Linked ViperTunnel Malware Hits UK and US Businesses</u></a> (Hackread)</p>
<p><a href="https://securityaffairs.com/190638/malware/glassworm-evolves-with-zig-dropper-to-infect-multiple-developer-tools.html"><u>GlassWorm evolves with Zig dropper to infect multiple developer tools</u></a> (Security Affairs)</p>
<p><a href="https://www.jamf.com/blog/predator-spyware-ios-kernel-exploitation-engine/"><u>Predator Spyware's iOS Kernel Exploitation Engine: PAC Bypass, NEON R/W &amp; More</u></a> (Jamf Threat Labs)</p>
<p><a href="https://www.bankinfosecurity.com/lawsuit-ai-illegally-recorded-doctor-patient-encounters-a-31408"><u>Lawsuit: AI Illegally Recorded Doctor-Patient Encounters</u></a> (BankInfo Security)</p>
<p><a href="https://worldquantumday.org/"><u>World Quantum Day</u></a> (WorldQuantimDay)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2320</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bf9bf26e-1671-11f1-ad8a-5b922c9ecc0d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7555063524.mp3?updated=1776192479" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>W3LL runs dry.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2529/notes</link>
      <description>The FBI disrupts a multi-million-dollar phishing ring. A North Korea-linked supply chain attack hits OpenAI. Developers face a Slack phishing campaign. A critical Python notebook flaw is exploited in hours. ShinyHunters target Rockstar Games. A Japanese shipping firm reports a breach. Tracking the cybersecurity winners and losers in Trump’s 2027 budget, plus a claimed cyberattack on UAE infrastructure. Business breakdown. Our guest is Justin Kohler, Chief Product Officer at SpecterOps, discussing Identity Attack Path Management. Crackdowns at home push scam networks abroad. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices, we are joined by Justin Kohler, Chief Product Officer at SpecterOps, discussing Identity Attack Path Management. If you enjoyed this conversation, tune into the full interview here. 

Selected Reading

FBI Dismantles $20m Phishing Operation W3LL (Infosecurity Magazine)

The cyber winners and losers in Trump’s 2027 budget (CSO Online)

Handala carries out unprecedented cyberattack against critical UAE Infrastructure (PressTV)

OpenSSF Flags Malware Campaign on Slack Posing as Linux Foundation Figures (HackRead)

OpenAI Impacted by North Korea-Linked Axios Supply Chain Hack (SecurityWeek)

Critical Marimo pre-auth RCE flaw now under active exploitation (Bleeping Computer)

GTA-maker Rockstar Games hacked again but downplays impact (BBC)

NYK alerts on data breach in bunker fuel procurement system (Manifold Times)

Business Briefing for 04.08.26 (The CyberWire) 

China Is Cracking Down on Scams. Just Not the Ones Hitting Americans (WIRED)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 13 Apr 2026 20:30:00 -0000</pubDate>
      <itunes:title>W3LL runs dry.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2529</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The FBI disrupts a multi-million-dollar phishing ring. A North Korea-linked supply chain attack hits OpenAI. Developers face a Slack phishing campaign. A critical Python notebook flaw is exploited in hours. ShinyHunters target Rockstar Games. A Japanese shipping firm reports a breach. Tracking the cybersecurity winners and losers in Trump’s 2027 budget, plus a claimed cyberattack on UAE infrastructure. Business breakdown. Our guest is Justin Kohler, Chief Product Officer at SpecterOps, discussing Identity Attack Path Management. Crackdowns at home push scam networks abroad. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices, we are joined by Justin Kohler, Chief Product Officer at SpecterOps, discussing Identity Attack Path Management. If you enjoyed this conversation, tune into the full interview here. 

Selected Reading

FBI Dismantles $20m Phishing Operation W3LL (Infosecurity Magazine)

The cyber winners and losers in Trump’s 2027 budget (CSO Online)

Handala carries out unprecedented cyberattack against critical UAE Infrastructure (PressTV)

OpenSSF Flags Malware Campaign on Slack Posing as Linux Foundation Figures (HackRead)

OpenAI Impacted by North Korea-Linked Axios Supply Chain Hack (SecurityWeek)

Critical Marimo pre-auth RCE flaw now under active exploitation (Bleeping Computer)

GTA-maker Rockstar Games hacked again but downplays impact (BBC)

NYK alerts on data breach in bunker fuel procurement system (Manifold Times)

Business Briefing for 04.08.26 (The CyberWire) 

China Is Cracking Down on Scams. Just Not the Ones Hitting Americans (WIRED)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FBI disrupts a multi-million-dollar phishing ring. A North Korea-linked supply chain attack hits OpenAI. Developers face a Slack phishing campaign. A critical Python notebook flaw is exploited in hours. ShinyHunters target Rockstar Games. A Japanese shipping firm reports a breach. Tracking the cybersecurity winners and losers in Trump’s 2027 budget, plus a claimed cyberattack on UAE infrastructure. Business breakdown. Our guest is Justin Kohler, Chief Product Officer at SpecterOps, discussing Identity Attack Path Management. Crackdowns at home push scam networks abroad. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On today’s Industry Voices, we are joined by <a href="https://www.linkedin.com/in/justin-kohler-49467110/"><u>Justin Kohler</u></a>, Chief Product Officer at <a href="https://www.linkedin.com/company/specterops/"><u>SpecterOps</u></a>, discussing Identity Attack Path Management. If you enjoyed this conversation, tune into the full interview <a href="https://explore.thecyberwire.com/specterops">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.infosecurity-magazine.com/news/fbi-dismantles-phishing-operation/"><u>FBI Dismantles $20m Phishing Operation W3LL</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.csoonline.com/article/4156978/the-cyber-winners-and-losers-in-trumps-2027-budget.html"><u>The cyber winners and losers in Trump’s 2027 budget</u></a> (CSO Online)</p>
<p><a href="https://www.presstv.ir/Detail/2026/04/12/766723/Handala-hacking-group-cyberattack-UAE-infrastructure-"><u>Handala carries out unprecedented cyberattack against critical UAE Infrastructure</u></a> (PressTV)</p>
<p><a href="https://hackread.com/openssf-malware-slack-linux-foundation-figures/"><u>OpenSSF Flags Malware Campaign on Slack Posing as Linux Foundation Figures</u></a> (HackRead)</p>
<p><a href="https://www.securityweek.com/openai-impacted-by-north-korea-linked-axios-supply-chain-hack/"><u>OpenAI Impacted by North Korea-Linked Axios Supply Chain Hack</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/critical-marimo-pre-auth-rce-flaw-now-under-active-exploitation/"><u>Critical Marimo pre-auth RCE flaw now under active exploitation</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bbc.com/news/articles/cx2dg5g1le7o"><u>GTA-maker Rockstar Games hacked again but downplays impact</u></a> (BBC)</p>
<p><a href="https://www.manifoldtimes.com/news/nyk-alerts-on-data-breach-in-bunker-fuel-procurement-system/"><u>NYK alerts on data breach in bunker fuel procurement system</u></a> (Manifold Times)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/8/14"><u>Business Briefing for 04.08.26</u></a> (The CyberWire) </p>
<p><a href="https://www.wired.com/story/made-in-china-inside-chinas-selective-war-on-the-scam-economy/"><u>China Is Cracking Down on Scams. Just Not the Ones Hitting Americans</u></a> (WIRED)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1762</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bf728bcc-1671-11f1-ad8a-87d2321a7839]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5443337268.mp3?updated=1776107215" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mark Logan: March towards your goals. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/116/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Mark Logan, CEO of One Identity, sits down to share his story, explaining how he fit into different roles growing up in different companies. Mark has nearly two decades of C-Suite experience at an array of different organizations, finally landing on his current position as the CEO at One Identity. Sharing his different roles, he also gives a quote from Steve Jobs, saying "it's not what I say yes to, it's what I say no to." He believes that's a key area for his workers because when he is able to make up his mind, his team and his customers have someone they can rely on. Mark says that as a CEO he wants to share the advice of always marching towards your goals, and identifying that different people have different goals because they work in different fields, but that's what makes a company work best. He says "I've found that the more you can delegate, provided you've got the right folks in place the better." We thank Mark for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 12 Apr 2026 07:00:00 -0000</pubDate>
      <itunes:title>Mark Logan: March towards your goals. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>116</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/1f366f34-3507-11f1-a382-73286788ac03/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Mark Logan, CEO of One Identity, sits down to share his story, explaining how he fit into different roles growing up in different companies. Mark has nearly two decades of C-Suite experience at an array of different organizations, finally landing on his current position as the CEO at One Identity. Sharing his different roles, he also gives a quote from Steve Jobs, saying "it's not what I say yes to, it's what I say no to." He believes that's a key area for his workers because when he is able to make up his mind, his team and his customers have someone they can rely on. Mark says that as a CEO he wants to share the advice of always marching towards your goals, and identifying that different people have different goals because they work in different fields, but that's what makes a company work best. He says "I've found that the more you can delegate, provided you've got the right folks in place the better." We thank Mark for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Mark Logan, CEO of One Identity, sits down to share his story, explaining how he fit into different roles growing up in different companies. Mark has nearly two decades of C-Suite experience at an array of different organizations, finally landing on his current position as the CEO at One Identity. Sharing his different roles, he also gives a quote from Steve Jobs, saying "it's not what I say yes to, it's what I say no to." He believes that's a key area for his workers because when he is able to make up his mind, his team and his customers have someone they can rely on. Mark says that as a CEO he wants to share the advice of always marching towards your goals, and identifying that different people have different goals because they work in different fields, but that's what makes a company work best. He says "I've found that the more you can delegate, provided you've got the right folks in place the better." We thank Mark for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>105</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1f366f34-3507-11f1-a382-73286788ac03]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7507419500.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Walking through the anatomy of a cyberattack. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/55/notes</link>
      <description>What does a modern cyberattack really look like from the inside? In this CyberWire-X episode, Dave Bittner speaks with John Anthony Smith, Founder and Chief Security Officer of Fenix24. This conversation takes us step by step as an attacker breaks into a target environment – probing for weaknesses, exploiting entry points, escalating privileges, and moving laterally until they reach their objective. While the attack unfolds, listeners are privy to a behind-the-scenes commentary that reveals the tradecraft: the scripts, misconfigurations, overlooked alerts, and the moments defenders could have stopped the intrusion and, most importantly, prepared for the day through a defense that locks down data and enables a quick and full recovery. This is not a theoretical review or a highlight reel. It's a candid, technical, and eye-opening journey through the full kill chain that will reshape listeners think about detection, incident readiness, and resilience.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 12 Apr 2026 05:00:00 -0000</pubDate>
      <itunes:title>Walking through the anatomy of a cyberattack. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>55</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/725508fe-350e-11f1-8de4-7fdaf547025b/image/cca6449db500549f3982c5870b5f89a9.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>What does a modern cyberattack really look like from the inside? In this CyberWire-X episode, Dave Bittner speaks with John Anthony Smith, Founder and Chief Security Officer of Fenix24. This conversation takes us step by step as an attacker breaks into a target environment – probing for weaknesses, exploiting entry points, escalating privileges, and moving laterally until they reach their objective. While the attack unfolds, listeners are privy to a behind-the-scenes commentary that reveals the tradecraft: the scripts, misconfigurations, overlooked alerts, and the moments defenders could have stopped the intrusion and, most importantly, prepared for the day through a defense that locks down data and enables a quick and full recovery. This is not a theoretical review or a highlight reel. It's a candid, technical, and eye-opening journey through the full kill chain that will reshape listeners think about detection, incident readiness, and resilience.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>What does a modern cyberattack really look like from the inside? In this CyberWire-X episode, Dave Bittner speaks with <a href="https://www.linkedin.com/in/japrofileus/">John Anthony Smith</a>, Founder and Chief Security Officer of <a href="https://fenix24.com/">Fenix24</a>. This conversation takes us step by step as an attacker breaks into a target environment – probing for weaknesses, exploiting entry points, escalating privileges, and moving laterally until they reach their objective. While the attack unfolds, listeners are privy to a behind-the-scenes commentary that reveals the tradecraft: the scripts, misconfigurations, overlooked alerts, and the moments defenders could have stopped the intrusion and, most importantly, prepared for the day through a defense that locks down data and enables a quick and full recovery. This is not a theoretical review or a highlight reel. It's a candid, technical, and eye-opening journey through the full kill chain that will reshape listeners think about detection, incident readiness, and resilience.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>60</itunes:duration>
      <guid isPermaLink="false"><![CDATA[725508fe-350e-11f1-8de4-7fdaf547025b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7862571595.mp3?updated=1775162718" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A wolf in admin clothing. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/420/notes</link>
      <description>Today we are joined by Selena Larson, Threat Researcher from Proofpoint  research team and co-host of Only Malware in the Building, talking about their work on "(Don't) TrustConnect: It's a RAT in an RMM hat." Proofpoint uncovered TrustConnect, a malware-as-a-service platform posing as a legitimate remote monitoring and management (RMM) tool, but actually functioning as a remote access trojan (RAT) sold to cybercriminals for $300/month. 

The operation used a fake business website, legitimate-looking certificates, and branded installers (like fake Microsoft Teams or Zoom apps) to trick victims, while providing attackers with full remote control, file transfer, and surveillance capabilities. Although parts of its infrastructure were disrupted, the threat actor quickly rebounded with new variants, highlighting both the resilience of the operation and its deep ties to the broader cybercriminal ecosystem abusing RMM tools.

The research and executive brief can be found here:


  (Don't) TrustConnect: It's a RAT in an RMM hat


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Apr 2026 07:00:00 -0000</pubDate>
      <itunes:title>A wolf in admin clothing. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>420</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/02cbf76a-3507-11f1-86dc-3fe18a6ed822/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Today we are joined by Selena Larson, Threat Researcher from Proofpoint  research team and co-host of Only Malware in the Building, talking about their work on "(Don't) TrustConnect: It's a RAT in an RMM hat." Proofpoint uncovered TrustConnect, a malware-as-a-service platform posing as a legitimate remote monitoring and management (RMM) tool, but actually functioning as a remote access trojan (RAT) sold to cybercriminals for $300/month. 

The operation used a fake business website, legitimate-looking certificates, and branded installers (like fake Microsoft Teams or Zoom apps) to trick victims, while providing attackers with full remote control, file transfer, and surveillance capabilities. Although parts of its infrastructure were disrupted, the threat actor quickly rebounded with new variants, highlighting both the resilience of the operation and its deep ties to the broader cybercriminal ecosystem abusing RMM tools.

The research and executive brief can be found here:


  (Don't) TrustConnect: It's a RAT in an RMM hat


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we are joined by <a href="https://www.linkedin.com/in/selenalarson/">Selena Larson</a>, Threat Researcher from <a href="https://www.linkedin.com/company/proofpoint/">Proofpoint</a>  research team and co-host of <a href="https://thecyberwire.com/podcasts/only-malware-in-the-building">Only Malware in the Building</a>, talking about their work on "(Don't) TrustConnect: It's a RAT in an RMM hat." Proofpoint uncovered TrustConnect, a malware-as-a-service platform posing as a legitimate remote monitoring and management (RMM) tool, but actually functioning as a remote access trojan (RAT) sold to cybercriminals for $300/month. </p>
<p>The operation used a fake business website, legitimate-looking certificates, and branded installers (like fake Microsoft Teams or Zoom apps) to trick victims, while providing attackers with full remote control, file transfer, and surveillance capabilities. Although parts of its infrastructure were disrupted, the threat actor quickly rebounded with new variants, highlighting both the resilience of the operation and its deep ties to the broader cybercriminal ecosystem abusing RMM tools.</p>
<p><strong>The research and executive brief can be found here:</strong></p>
<ul>
  <li><a href="https://www.proofpoint.com/us/blog/threat-insight/dont-trustconnect-its-a-rat">(Don't) TrustConnect: It's a RAT in an RMM hat</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1484</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[02cbf76a-3507-11f1-86dc-3fe18a6ed822]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5415458788.mp3?updated=1775842418" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The AI arms race hits finance.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2528/notes</link>
      <description>The Treasury Secretary and Fed Chair summon bankers over AI concerns. A hacker claims more than 10 petabytes stolen from China’s National Supercomputing Center. Recalibrating the quantum timeline. Researchers demo prompt injection against Apple Intelligence. Payroll Pirates target Canadians. Gmail gets end-to-end encryption on mobile devices. A Chrome update fixes critical vulnerabilities. A Pennsylvania cop admits creating more than 3,000 AI-generated pornographic deepfakes. Our guest is Henry Comfort, Co-Founder and CEO of Geordie AI, winner of this year’s RSAC Innovation Sandbox.  FCC floats firmer filters for fraudulent phone calls.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today, Dave shares coverage of the RSAC 2026 Innovation Sandbox and his conversation with Henry Comfort, Co-Founder and CEO  from the winner of “Most Innovative Startup” Geordie AI. We tip our hats to this year’s finalists.

Selected Reading

Bessent and Powell’s A.I. Anxiety  (The New York Times)

Court Backs Pentagon Anthropic Ban - But the Fight Continues (GovInfo Security)

A hacker has allegedly breached one of China’s supercomputers and is attempting to sell a trove of stolen data (CNN)

Why is the timeline to quantum-proof everything constantly shrinking? (CyberScoop)

Microsoft: Canadian employees targeted in payroll pirate attacks (Bleeping Computer)

Google rolls out Gmail end-to-end encryption on mobile devices (Bleeping Computer)

Chrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000  (SecurityWeek)

Police corporal created AI porn from driver's license pics (Ars Technica)

FCC proposes new rule to further crackdown on illegal robocalls (The Record)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 10 Apr 2026 20:30:00 -0000</pubDate>
      <itunes:title>The AI arms race hits finance.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2528</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The Treasury Secretary and Fed Chair summon bankers over AI concerns. A hacker claims more than 10 petabytes stolen from China’s National Supercomputing Center. Recalibrating the quantum timeline. Researchers demo prompt injection against Apple Intelligence. Payroll Pirates target Canadians. Gmail gets end-to-end encryption on mobile devices. A Chrome update fixes critical vulnerabilities. A Pennsylvania cop admits creating more than 3,000 AI-generated pornographic deepfakes. Our guest is Henry Comfort, Co-Founder and CEO of Geordie AI, winner of this year’s RSAC Innovation Sandbox.  FCC floats firmer filters for fraudulent phone calls.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today, Dave shares coverage of the RSAC 2026 Innovation Sandbox and his conversation with Henry Comfort, Co-Founder and CEO  from the winner of “Most Innovative Startup” Geordie AI. We tip our hats to this year’s finalists.

Selected Reading

Bessent and Powell’s A.I. Anxiety  (The New York Times)

Court Backs Pentagon Anthropic Ban - But the Fight Continues (GovInfo Security)

A hacker has allegedly breached one of China’s supercomputers and is attempting to sell a trove of stolen data (CNN)

Why is the timeline to quantum-proof everything constantly shrinking? (CyberScoop)

Microsoft: Canadian employees targeted in payroll pirate attacks (Bleeping Computer)

Google rolls out Gmail end-to-end encryption on mobile devices (Bleeping Computer)

Chrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000  (SecurityWeek)

Police corporal created AI porn from driver's license pics (Ars Technica)

FCC proposes new rule to further crackdown on illegal robocalls (The Record)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Treasury Secretary and Fed Chair summon bankers over AI concerns. A hacker claims more than 10 petabytes stolen from China’s National Supercomputing Center. Recalibrating the quantum timeline. Researchers demo prompt injection against Apple Intelligence. Payroll Pirates target Canadians. Gmail gets end-to-end encryption on mobile devices. A Chrome update fixes critical vulnerabilities. A Pennsylvania cop admits creating more than 3,000 AI-generated pornographic deepfakes. Our guest is Henry Comfort, Co-Founder and CEO of Geordie AI, winner of this year’s RSAC Innovation Sandbox.  FCC floats firmer filters for fraudulent phone calls.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today, Dave shares coverage of the <a href="https://www.rsaconference.com/usa/programs/innovation-sandbox"><u>RSAC 2026 Innovation Sandbox</u></a> and his conversation with <a href="https://www.linkedin.com/in/henry-comfort/"><u>Henry Comfort</u></a>, Co-Founder and CEO  from the winner of “<a href="https://www.rsaconference.com/library/press-release/2026-isb-winner"><u>Most Innovative Startup</u></a>” <a href="https://www.geordie.ai/"><u>Geordie AI</u></a>. We tip our hats to this year’s <a href="https://www.rsaconference.com/library/press-release/finalists-announced-for-rsac-innovation-sandbox-contest-2026"><u>finalists</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.nytimes.com/2026/04/10/business/dealbook/bessent-powell-anthropic-banking-risks.html"><u>Bessent and Powell’s A.I. Anxiety</u></a>  (The New York Times)</p>
<p><a href="https://www.govinfosecurity.com/court-backs-pentagon-anthropic-ban-but-fight-continues-a-31383"><u>Court Backs Pentagon Anthropic Ban - But the Fight Continues</u></a> (GovInfo Security)</p>
<p><a href="https://edition.cnn.com/2026/04/08/china/china-supercomputer-hackers-hnk-intl"><u>A hacker has allegedly breached one of China’s supercomputers and is attempting to sell a trove of stolen data</u></a> (CNN)</p>
<p><a href="https://cyberscoop.com/quantum-computing-industry-timeline-threat-accelerating/"><u>Why is the timeline to quantum-proof everything constantly shrinking?</u></a> (CyberScoop)</p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-canadian-employees-targeted-in-payroll-pirate-attacks/"><u>Microsoft: Canadian employees targeted in payroll pirate attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/google/google-rolls-out-gmail-end-to-end-encryption-on-mobile-devices/"><u>Google rolls out Gmail end-to-end encryption on mobile devices</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/chrome-147-patches-60-vulnerabilities-including-two-critical-flaws-worth-86000/"><u>Chrome 147 Patches 60 Vulnerabilities, Including Two Critical Flaws Worth $86,000 </u></a> (SecurityWeek)</p>
<p><a href="https://arstechnica.com/tech-policy/2026/04/state-police-corporal-created-porn-deepfakes-from-drivers-license-photos/"><u>Police corporal created AI porn from driver's license pics</u></a> (Ars Technica)</p>
<p><a href="https://therecord.media/fcc-proposes-new-rule-robocall-crackdown"><u>FCC proposes new rule to further crackdown on illegal robocalls</u></a> (The Record)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1359</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bf4bfafc-1671-11f1-ad8a-9f723d2b8180]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2304020875.mp3?updated=1775845058" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hackers ignore the ceasefire.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2527/notes</link>
      <description>Iran-linked hackers signal cyberattacks will continue despite the cease-fire. Microsoft restores access after suspending open-source developer accounts. John Deere settles its right-to-repair fight. A suspected Adobe Reader zero-day surfaces. Palo Alto Networks and SonicWall patch high-severity flaws. New macOS malware targets crypto wallets. A threat cluster abuses live chat to bypass MFA. CISA orders urgent Ivanti patching. Researchers track a stealthy DDoS-for-hire botnet. Our guest is Edgard Capdevielle, CEO of Nozomi Networks, sharing insights on threats posed by nation-states and AI on OT security. macOS has a 49 day time limit. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices, we are joined by Edgard Capdevielle, CEO of Nozomi Networks, sharing insights on threats posed by nation-states and AI on OT security. If you enjoyed this conversation, check out the full interview here. 

Selected Reading

Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long (SecurityWeek)

Microsoft suspends dev accounts for high-profile open source projects (Bleeping Computer)

John Deere to Pay $99 Million in Monumental Right-to-Repair Settlement (The Drive)

Adobe Reader Zero-Day Exploited for Months: Researcher (SecurityWeek)

Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities (SecurityWeek)

New macOS Malware notnullOSX Targets Crypto Wallets Over $10K (Hackread)

Google Warns of New Threat Group Targeting BPOs and Helpdesks (Infosecurity Magazine)

Masjesu Rising: The Commercial IoT Botnet Built for Stealth, DDoS, and IoT Evasion (Trellix)

CISA orders feds to patch exploited Ivanti EPMM flaw by Sunday (Bleeping Computer)

We Found a Ticking Time Bomb in macOS TCP Networking - It Detonates After Exactly 49 Days (Photon Blog)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 09 Apr 2026 20:30:00 -0000</pubDate>
      <itunes:title>Hackers ignore the ceasefire.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2527</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Iran-linked hackers signal cyberattacks will continue despite the cease-fire. Microsoft restores access after suspending open-source developer accounts. John Deere settles its right-to-repair fight. A suspected Adobe Reader zero-day surfaces. Palo Alto Networks and SonicWall patch high-severity flaws. New macOS malware targets crypto wallets. A threat cluster abuses live chat to bypass MFA. CISA orders urgent Ivanti patching. Researchers track a stealthy DDoS-for-hire botnet. Our guest is Edgard Capdevielle, CEO of Nozomi Networks, sharing insights on threats posed by nation-states and AI on OT security. macOS has a 49 day time limit. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices, we are joined by Edgard Capdevielle, CEO of Nozomi Networks, sharing insights on threats posed by nation-states and AI on OT security. If you enjoyed this conversation, check out the full interview here. 

Selected Reading

Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long (SecurityWeek)

Microsoft suspends dev accounts for high-profile open source projects (Bleeping Computer)

John Deere to Pay $99 Million in Monumental Right-to-Repair Settlement (The Drive)

Adobe Reader Zero-Day Exploited for Months: Researcher (SecurityWeek)

Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities (SecurityWeek)

New macOS Malware notnullOSX Targets Crypto Wallets Over $10K (Hackread)

Google Warns of New Threat Group Targeting BPOs and Helpdesks (Infosecurity Magazine)

Masjesu Rising: The Commercial IoT Botnet Built for Stealth, DDoS, and IoT Evasion (Trellix)

CISA orders feds to patch exploited Ivanti EPMM flaw by Sunday (Bleeping Computer)

We Found a Ticking Time Bomb in macOS TCP Networking - It Detonates After Exactly 49 Days (Photon Blog)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iran-linked hackers signal cyberattacks will continue despite the cease-fire. Microsoft restores access after suspending open-source developer accounts. John Deere settles its right-to-repair fight. A suspected Adobe Reader zero-day surfaces. Palo Alto Networks and SonicWall patch high-severity flaws. New macOS malware targets crypto wallets. A threat cluster abuses live chat to bypass MFA. CISA orders urgent Ivanti patching. Researchers track a stealthy DDoS-for-hire botnet. Our guest is Edgard Capdevielle, CEO of Nozomi Networks, sharing insights on threats posed by nation-states and AI on OT security. macOS has a 49 day time limit. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On today’s Industry Voices, we are joined by <a href="https://www.linkedin.com/in/edgardcapdevielle/"><u>Edgard Capdevielle</u></a>, CEO of <a href="https://www.nozominetworks.com/"><u>Nozomi Networks</u></a>, sharing insights on threats posed by nation-states and AI on OT security. If you enjoyed this conversation, check out the full interview <a href="https://explore.thecyberwire.com/edgard-capdevielle">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.securityweek.com/shaky-ceasefire-unlikely-to-stop-cyberattacks-from-iran-linked-hackers-for-long/"><u>Shaky Ceasefire Unlikely to Stop Cyberattacks From Iran-Linked Hackers for Long</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-suspends-dev-accounts-for-high-profile-open-source-projects/"><u>Microsoft suspends dev accounts for high-profile open source projects</u></a> (Bleeping Computer)</p>
<p><a href="https://www.thedrive.com/news/john-deere-to-pay-99-million-in-monumental-right-to-repair-settlement"><u>John Deere to Pay $99 Million in Monumental Right-to-Repair Settlement</u></a> (The Drive)</p>
<p><a href="https://www.securityweek.com/adobe-reader-zero-day-exploited-for-months-researcher/"><u>Adobe Reader Zero-Day Exploited for Months: Researcher</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/palo-alto-networks-sonicwall-patch-high-severity-vulnerabilities/"><u>Palo Alto Networks, SonicWall Patch High-Severity Vulnerabilities</u></a> (SecurityWeek)</p>
<p><a href="https://hackread.com/macos-malware-notnullosx-crypto-wallets/"><u>New macOS Malware notnullOSX Targets Crypto Wallets Over $10K</u></a> (Hackread)</p>
<p><a href="https://www.infosecurity-magazine.com/news/google-warns-group-targeting-bpos/"><u>Google Warns of New Threat Group Targeting BPOs and Helpdesks</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.trellix.com/blogs/research/masjesu-rising-stealth-iot-botnet-ddos-evasion/"><u>Masjesu Rising: The Commercial IoT Botnet Built for Stealth, DDoS, and IoT Evasion</u></a> (Trellix)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-exploited-ivanti-epmm-flaw-by-sunday/"><u>CISA orders feds to patch exploited Ivanti EPMM flaw by Sunday</u></a> (Bleeping Computer)</p>
<p><a href="https://photon.codes/blog/we-found-a-ticking-time-bomb-in-macos-tcp-networking"><u>We Found a Ticking Time Bomb in macOS TCP Networking - It Detonates After Exactly 49 Days</u></a> (Photon Blog)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1704</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bf24072c-1671-11f1-ad8a-8307061206bb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8537910965.mp3?updated=1775762387" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CyberAv3ngers unleashed.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2526/notes</link>
      <description>Federal agencies warn Iranian-linked hackers are probing U.S. critical infrastructure, while the DOJ disrupts a Russian router hijacking campaign. Cyberattacks hit Minnesota government systems and force a Massachusetts hospital to divert ambulances. Anthropic limits access to its new AI bug-hunting model, hackers leak terabytes of LAPD data, and researchers warn of a rise in AI recommendation poisoning. Our guest is Benny Czarny, Founder and CEO of OPSWAT, discussing his book "Cybersecurity Upside Down: Rethink Your Cybersecurity Strategy." Japan trades red tape for training data. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices, we are joined by Benny Czarny, Founder and CEO of OPSWAT, discussing his book "Cybersecurity Upside Down: Rethink Your Cybersecurity Strategy." If you enjoyed this interview, check out the full conversation here. 

Selected Reading

Iran-Linked Hackers Are Sabotaging US Energy and Water Infrastructure (WIRED)

Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure (FBI Internet Crime Complaint Center (IC3))

Pro-Iran Group Takes Credit for Cyberattacks on Chime, Pinterest (Bloomberg)

US disrupts Russian military-run DNS hijacking network, Justice Department says (Reuters)

Frostarmada forest blizzard dns hijacking (Lumen Technologies Black Lotus Labs) 

Minnesota governor orders emergency support for cyberattack disrupting county's 'critical systems' (StateScoop)

Massachusetts hospital turning ambulances away after cyberattack (The Record)

What Anthropic Glasswing reveals about the future of vulnerability discovery (CSO Online)

Sensitive LAPD records leaked in hack of L.A. city attorney's office (LA Times) 

Manipulating AI memory for profit: The rise of AI Recommendation Poisoning (Microsoft Security Blog)

Japan relaxes privacy laws to make AI development easy (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 08 Apr 2026 20:30:00 -0000</pubDate>
      <itunes:title>CyberAv3ngers unleashed.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2526</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Federal agencies warn Iranian-linked hackers are probing U.S. critical infrastructure, while the DOJ disrupts a Russian router hijacking campaign. Cyberattacks hit Minnesota government systems and force a Massachusetts hospital to divert ambulances. Anthropic limits access to its new AI bug-hunting model, hackers leak terabytes of LAPD data, and researchers warn of a rise in AI recommendation poisoning. Our guest is Benny Czarny, Founder and CEO of OPSWAT, discussing his book "Cybersecurity Upside Down: Rethink Your Cybersecurity Strategy." Japan trades red tape for training data. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices, we are joined by Benny Czarny, Founder and CEO of OPSWAT, discussing his book "Cybersecurity Upside Down: Rethink Your Cybersecurity Strategy." If you enjoyed this interview, check out the full conversation here. 

Selected Reading

Iran-Linked Hackers Are Sabotaging US Energy and Water Infrastructure (WIRED)

Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure (FBI Internet Crime Complaint Center (IC3))

Pro-Iran Group Takes Credit for Cyberattacks on Chime, Pinterest (Bloomberg)

US disrupts Russian military-run DNS hijacking network, Justice Department says (Reuters)

Frostarmada forest blizzard dns hijacking (Lumen Technologies Black Lotus Labs) 

Minnesota governor orders emergency support for cyberattack disrupting county's 'critical systems' (StateScoop)

Massachusetts hospital turning ambulances away after cyberattack (The Record)

What Anthropic Glasswing reveals about the future of vulnerability discovery (CSO Online)

Sensitive LAPD records leaked in hack of L.A. city attorney's office (LA Times) 

Manipulating AI memory for profit: The rise of AI Recommendation Poisoning (Microsoft Security Blog)

Japan relaxes privacy laws to make AI development easy (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Federal agencies warn Iranian-linked hackers are probing U.S. critical infrastructure, while the DOJ disrupts a Russian router hijacking campaign. Cyberattacks hit Minnesota government systems and force a Massachusetts hospital to divert ambulances. Anthropic limits access to its new AI bug-hunting model, hackers leak terabytes of LAPD data, and researchers warn of a rise in AI recommendation poisoning. Our guest is Benny Czarny, Founder and CEO of OPSWAT, discussing his book "Cybersecurity Upside Down: Rethink Your Cybersecurity Strategy." Japan trades red tape for training data. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On today’s Industry Voices, we are joined by <a href="https://www.linkedin.com/in/bennyczarny/"><u>Benny Czarny</u></a>, Founder and CEO of <a href="https://www.opswat.com/"><u>OPSWAT</u></a>, discussing his book "<a href="https://www.opswat.com/cybersecurity-upside-down"><u>Cybersecurity Upside Down: Rethink Your Cybersecurity Strategy</u></a>." If you enjoyed this interview, check out the full conversation <a href="https://explore.thecyberwire.com/benny-czarny">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.wired.com/story/iran-linked-hackers-are-sabotaging-us-energy-and-water-infrastructure/"><u>Iran-Linked Hackers Are Sabotaging US Energy and Water Infrastructure</u></a> (WIRED)</p>
<p><a href="https://www.ic3.gov/CSA/2026/260407.pdf"><u>Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure</u></a> (FBI Internet Crime Complaint Center (IC3))</p>
<p><a href="https://www.bloomberg.com/news/articles/2026-04-07/pro-iran-group-takes-credit-for-cyberattacks-on-chime-pinterest"><u>Pro-Iran Group Takes Credit for Cyberattacks on Chime, Pinterest</u></a> (Bloomberg)</p>
<p><a href="https://www.reuters.com/business/media-telecom/us-disrupts-russian-military-run-dns-hijacking-network-justice-department-says-2026-04-07/"><u>US disrupts Russian military-run DNS hijacking network, Justice Department says</u></a> (Reuters)</p>
<p><a href="https://www.lumen.com/blog-and-news/en-us/frostarmada-forest-blizzard-dns-hijacking"><u>Frostarmada forest blizzard dns hijacking</u></a> (Lumen Technologies Black Lotus Labs) </p>
<p><a href="https://statescoop.com/minnesota-winona-county-cyberattack-emergency-order/"><u>Minnesota governor orders emergency support for cyberattack disrupting county's 'critical systems'</u></a> (StateScoop)</p>
<p><a href="https://therecord.media/massachusetts-hospital-turning-ambulances-away-cyberattack"><u>Massachusetts hospital turning ambulances away after cyberattack</u></a> (The Record)</p>
<p><a href="https://www.csoonline.com/article/4155342/what-anthropic-glasswing-reveals-about-the-future-of-vulnerability-discovery.html"><u>What Anthropic Glasswing reveals about the future of vulnerability discovery</u></a> (CSO Online)</p>
<p><a href="https://www.latimes.com/california/story/2026-04-07/lapd-records-suspected-hack"><u>Sensitive LAPD records leaked in hack of L.A. city attorney's office</u></a> (LA Times) </p>
<p><a href="https://www.microsoft.com/en-us/security/blog/2026/02/10/ai-recommendation-poisoning/"><u>Manipulating AI memory for profit: The rise of AI Recommendation Poisoning</u></a> (Microsoft Security Blog)</p>
<p><a href="https://www.theregister.com/2026/04/08/japan_privacy_law_changes_ai/"><u>Japan relaxes privacy laws to make AI development easy</u></a> (The Register)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1439</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bef2b974-1671-11f1-ad8a-0fbf8dc90e9a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6309666441.mp3?updated=1775671237" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Proposed cuts put CISA in focus.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2525/notes</link>
      <description>CISA faces a $700 million budget cut. Russian and Iranian cyber cooperation raises concerns. New BPFDoor variants emerge. Cybercrime losses climb again. Researchers advance a GPU Rowhammer attack. Northern Ireland schools go offline after a breach. An alleged hacker-for-hire faces U.S. charges. And German police name the suspected REvil mastermind. Our guest is John Anthony Smith, Founder and Chief Security Officer at Fenix24, explaining why more technology hasn't made us more secure. A frustrated researcher drops the hammer. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices segment, John Anthony Smith, Founder and Chief Security Officer at Fenix24, discusses why more technology hasn't made us more secure. Check out the full conversation here. 

Selected Reading

White House Seeks to Slash CISA Funding by $707 Million (SecurityWeek)

Exclusive: Russia supplies Iran with cyber support, spy imagery to hone attacks, Ukraine says (Reuters)

New Whitepaper: Stealthy BPFDoor Variants are a Needle That Looks Like Hay (Rapid7)

 FBI Internet Crime Complaint Center (IC3) Report 2025 (FBI Internet Crime Complaint Center (IC3))

GPUBreach: Root Shell Access Achieved via GPU Rowhammer Attack (SecurityWeek)

Cyberattack hits Northern Ireland’s centralized school network, disrupting access for thousands (The Record)

Suspect in Hacking of Climate Activists Is Extradited to New York (New York Times) 

German Police Unmask REvil Ransomware Leader (SecurityWeek)

Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit (Bleeping Computer)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Apr 2026 20:30:00 -0000</pubDate>
      <itunes:title>Proposed cuts put CISA in focus.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2525</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA faces a $700 million budget cut. Russian and Iranian cyber cooperation raises concerns. New BPFDoor variants emerge. Cybercrime losses climb again. Researchers advance a GPU Rowhammer attack. Northern Ireland schools go offline after a breach. An alleged hacker-for-hire faces U.S. charges. And German police name the suspected REvil mastermind. Our guest is John Anthony Smith, Founder and Chief Security Officer at Fenix24, explaining why more technology hasn't made us more secure. A frustrated researcher drops the hammer. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices segment, John Anthony Smith, Founder and Chief Security Officer at Fenix24, discusses why more technology hasn't made us more secure. Check out the full conversation here. 

Selected Reading

White House Seeks to Slash CISA Funding by $707 Million (SecurityWeek)

Exclusive: Russia supplies Iran with cyber support, spy imagery to hone attacks, Ukraine says (Reuters)

New Whitepaper: Stealthy BPFDoor Variants are a Needle That Looks Like Hay (Rapid7)

 FBI Internet Crime Complaint Center (IC3) Report 2025 (FBI Internet Crime Complaint Center (IC3))

GPUBreach: Root Shell Access Achieved via GPU Rowhammer Attack (SecurityWeek)

Cyberattack hits Northern Ireland’s centralized school network, disrupting access for thousands (The Record)

Suspect in Hacking of Climate Activists Is Extradited to New York (New York Times) 

German Police Unmask REvil Ransomware Leader (SecurityWeek)

Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit (Bleeping Computer)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA faces a $700 million budget cut. Russian and Iranian cyber cooperation raises concerns. New BPFDoor variants emerge. Cybercrime losses climb again. Researchers advance a GPU Rowhammer attack. Northern Ireland schools go offline after a breach. An alleged hacker-for-hire faces U.S. charges. And German police name the suspected REvil mastermind. Our guest is John Anthony Smith, Founder and Chief Security Officer at Fenix24, explaining why more technology hasn't made us more secure. A frustrated researcher drops the hammer. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On today’s Industry Voices segment,<a href="https://www.linkedin.com/in/japrofileus/"> <u>John Anthony Smith</u></a>, Founder and Chief Security Officer at <a href="https://fenix24.com/?ki-cf-botcl=1"><u>Fenix24</u></a>, discusses why more technology hasn't made us more secure. Check out the full conversation <a href="https://explore.thecyberwire.com/john-anthony-smith"><u>here</u></a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.securityweek.com/white-house-seeks-to-slash-cisa-funding-by-707-million/"><u>White House Seeks to Slash CISA Funding by $707 Million</u></a> (SecurityWeek)</p>
<p><a href="https://www.reuters.com/world/europe/russia-supplies-iran-with-cyber-support-spy-imagery-hone-attacks-ukraine-says-2026-04-07/"><u>Exclusive: Russia supplies Iran with cyber support, spy imagery to hone attacks, Ukraine says</u></a> (Reuters)</p>
<p><a href="https://www.rapid7.com/blog/post/tr-new-whitepaper-stealthy-bpfdoor-variants/"><u>New Whitepaper: Stealthy BPFDoor Variants are a Needle That Looks Like Hay</u></a> (Rapid7)</p>
<p><a href="https://www.ic3.gov/AnnualReport/Reports/2025_IC3Report.pdf"><u> FBI Internet Crime Complaint Center (IC3) Report 2025</u></a> (FBI Internet Crime Complaint Center (IC3))</p>
<p><a href="https://www.securityweek.com/gpubreach-root-shell-access-achieved-via-gpu-rowhammer-attack/"><u>GPUBreach: Root Shell Access Achieved via GPU Rowhammer Attack</u></a> (SecurityWeek)</p>
<p><a href="https://therecord.media/cyberattack-hits-northern-ireland-schools"><u>Cyberattack hits Northern Ireland’s centralized school network, disrupting access for thousands</u></a> (The Record)</p>
<p><a href="https://www.nytimes.com/2026/04/06/climate/forlit-exxon-dci-hacking-extradition.html"><u>Suspect in Hacking of Climate Activists Is Extradited to New York</u></a> (New York Times) </p>
<p><a href="https://www.securityweek.com/german-police-unmask-revil-ransomware-leader/"><u>German Police Unmask REvil Ransomware Leader</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/disgruntled-researcher-leaks-bluehammer-windows-zero-day-exploit/#comments"><u>Disgruntled researcher leaks “BlueHammer” Windows zero-day exploit</u></a> (Bleeping Computer)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1715</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[becb1b58-1671-11f1-ad8a-27eb4e56e248]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8203048807.mp3?updated=1775590767" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patching can't wait.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2524/notes</link>
      <description>Fortinet releases an emergency update for a critical vulnerability. A major outage disrupts Russian banking apps. A new report highlights critical skills gaps. CyberCorp scholars struggle to secure jobs. Scammers use QR codes in fake traffic violation schemes. A proposed lawsuit accuses Perplexity of oversharing users’ AI transcripts. Cambodia outlaws scam centers. Scammers impersonate Harvard IT staff. With “wrench attack” threats of violence, life imitates art. Kevin Magee from Microsoft for Startups describes emerging trends. On Afternoon Cyber Tea with Ann Johnson, Ann speaks with Allie Mellen about her new book "Code War: How Nations Hack, Spy, and Shape the Digital Battlefield." Users find Copilot’s terms of use highly entertaining.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today on our Industry Voices segment, we are joined by Kevin Magee from Microsoft for Startups discussing how cybersecurity startups can succeed by focusing on real problems and navigating emerging trends. Tune into the full conversation here. 

Afternoon Cyber Tea

On this segment of Afternoon Cyber Tea with Ann Johnson, Ann speaks with Allie Mellen about her new book "Code War: How Nations Hack, Spy, and Shape the Digital Battlefield." You can listen to the full conversation here and catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app.

Selected Reading

New FortiClient EMS flaw exploited in attacks, emergency patch released (Bleeping Computer)

Major outage hits Russian banking apps, metro payments across regions (The Record)

SANS 2026 report flags cybersecurity skills crisis, putting critical infrastructure and OT sectors at measurable breach risk (Industrial Cyber)

CyberCorps grads consider private sector as fed hiring challenges persist (Federal News Network)

Traffic violation scams switch to QR codes in new phishing texts (Bleeping Computer)

Perplexity's "Incognito Mode" is a "sham," lawsuit says (Ars Technica)

Cambodian parliament passes landmark cybercrime law after scam centre scrutiny (Reuters)

Harvard Warns of Active Cyberattack Impersonating IT Staff and Targeting Affiliates (The Crimson)

Wealthy California crypto holders targeted in violent ‘wrench attacks’ (KTLA)

Security (xkcd)

Censys raises $70 million in a Series D round. (N2K Pro Business Briefing)  

Even Microsoft know Copilot can't be trusted (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our ⁠brief listener survey⁠. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at ⁠sponsor.thecyberwire.com⁠.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 06 Apr 2026 20:40:00 -0000</pubDate>
      <itunes:title>Patching can't wait.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2524</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Fortinet releases an emergency update for a critical vulnerability. A major outage disrupts Russian banking apps. A new report highlights critical skills gaps. CyberCorp scholars struggle to secure jobs. Scammers use QR codes in fake traffic violation schemes. A proposed lawsuit accuses Perplexity of oversharing users’ AI transcripts. Cambodia outlaws scam centers. Scammers impersonate Harvard IT staff. With “wrench attack” threats of violence, life imitates art. Kevin Magee from Microsoft for Startups describes emerging trends. On Afternoon Cyber Tea with Ann Johnson, Ann speaks with Allie Mellen about her new book "Code War: How Nations Hack, Spy, and Shape the Digital Battlefield." Users find Copilot’s terms of use highly entertaining.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today on our Industry Voices segment, we are joined by Kevin Magee from Microsoft for Startups discussing how cybersecurity startups can succeed by focusing on real problems and navigating emerging trends. Tune into the full conversation here. 

Afternoon Cyber Tea

On this segment of Afternoon Cyber Tea with Ann Johnson, Ann speaks with Allie Mellen about her new book "Code War: How Nations Hack, Spy, and Shape the Digital Battlefield." You can listen to the full conversation here and catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app.

Selected Reading

New FortiClient EMS flaw exploited in attacks, emergency patch released (Bleeping Computer)

Major outage hits Russian banking apps, metro payments across regions (The Record)

SANS 2026 report flags cybersecurity skills crisis, putting critical infrastructure and OT sectors at measurable breach risk (Industrial Cyber)

CyberCorps grads consider private sector as fed hiring challenges persist (Federal News Network)

Traffic violation scams switch to QR codes in new phishing texts (Bleeping Computer)

Perplexity's "Incognito Mode" is a "sham," lawsuit says (Ars Technica)

Cambodian parliament passes landmark cybercrime law after scam centre scrutiny (Reuters)

Harvard Warns of Active Cyberattack Impersonating IT Staff and Targeting Affiliates (The Crimson)

Wealthy California crypto holders targeted in violent ‘wrench attacks’ (KTLA)

Security (xkcd)

Censys raises $70 million in a Series D round. (N2K Pro Business Briefing)  

Even Microsoft know Copilot can't be trusted (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our ⁠brief listener survey⁠. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at ⁠sponsor.thecyberwire.com⁠.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Fortinet releases an emergency update for a critical vulnerability. A major outage disrupts Russian banking apps. A new report highlights critical skills gaps. CyberCorp scholars struggle to secure jobs. Scammers use QR codes in fake traffic violation schemes. A proposed lawsuit accuses Perplexity of oversharing users’ AI transcripts. Cambodia outlaws scam centers. Scammers impersonate Harvard IT staff. With “wrench attack” threats of violence, life imitates art. Kevin Magee from Microsoft for Startups describes emerging trends. On Afternoon Cyber Tea with Ann Johnson, Ann speaks with Allie Mellen about her new book "Code War: How Nations Hack, Spy, and Shape the Digital Battlefield." Users find Copilot’s terms of use highly entertaining.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today on our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/kmagee/"><u>Kevin Magee</u></a> from <a href="https://www.linkedin.com/company/microsoft/"><u>Microsoft</u></a> for Startups discussing how cybersecurity startups can succeed by focusing on real problems and navigating emerging trends. Tune into the full conversation <a href="https://explore.thecyberwire.com/microsoft-for-startups">here</a>. </p>
<p><strong>Afternoon Cyber Tea</strong></p>
<p>On this segment of Afternoon Cyber Tea with Ann Johnson, Ann speaks with Allie Mellen about her new book "Code War: How Nations Hack, Spy, and Shape the Digital Battlefield." You can listen to the full conversation<a href="https://www.thecyberwire.com/podcasts/afternoon-cyber-tea/127/notes"><u> here</u></a> and catch new episodes of<a href="https://www.thecyberwire.com/podcasts/afternoon-cyber-tea"><u> Afternoon Cyber Tea</u></a> every other Tuesday on your favorite podcast app.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/new-fortinet-forticlient-ems-flaw-cve-2026-35616-exploited-in-attacks/"><u>New FortiClient EMS flaw exploited in attacks, emergency patch released</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/outage-hits-russian-banking-apps"><u>Major outage hits Russian banking apps, metro payments across regions</u></a> (The Record)</p>
<p><a href="https://industrialcyber.co/reports/sans-2026-report-flags-cybersecurity-skills-crisis-putting-critical-infrastructure-and-ot-sectors-at-measurable-breach-risk/"><u>SANS 2026 report flags cybersecurity skills crisis, putting critical infrastructure and OT sectors at measurable breach risk</u></a> (Industrial Cyber)</p>
<p><a href="https://federalnewsnetwork.com/cybersecurity/2026/04/cybercorps-grads-consider-private-sector-as-fed-hiring-challenges-persist/"><u>CyberCorps grads consider private sector as fed hiring challenges persist</u></a> (Federal News Network)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/traffic-violation-scams-switch-to-qr-codes-in-new-phishing-texts/"><u>Traffic violation scams switch to QR codes in new phishing texts</u></a> (Bleeping Computer)</p>
<p><a href="https://arstechnica.com/tech-policy/2026/04/perplexitys-incognito-mode-is-a-sham-lawsuit-says/"><u>Perplexity's "Incognito Mode" is a "sham," lawsuit says</u></a> (Ars Technica)</p>
<p><a href="https://www.reuters.com/world/asia-pacific/cambodian-parliament-passes-landmark-cybercrime-law-after-scam-centre-scrutiny-2026-04-03/"><u>Cambodian parliament passes landmark cybercrime law after scam centre scrutiny</u></a> (Reuters)</p>
<p><a href="https://www.thecrimson.com/article/2026/4/4/harvard-cybersecurity-threat/"><u>Harvard Warns of Active Cyberattack Impersonating IT Staff and Targeting Affiliates</u></a> (The Crimson)</p>
<p><a href="https://ktla.com/news/california/violent-crypto-robberies-los-angeles-bay-area/"><u>Wealthy California crypto holders targeted in violent ‘wrench attacks’</u></a> (KTLA)</p>
<p><a href="https://xkcd.com/538/"><u>Security</u></a> (xkcd)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/8/13"><u>Censys raises $70 million in a Series D round.</u></a> (N2K Pro Business Briefing)  </p>
<p><a href="https://www.theregister.com/2026/04/02/copilot_terms_of_service/"><u>Even Microsoft know Copilot can't be trusted</u></a> (The Register)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ">⁠<u>brief listener survey</u>⁠</a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/">⁠<u>sponsor.thecyberwire.com</u>⁠</a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2084</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bea382dc-1671-11f1-ad8a-23dbf1d81a28]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9077781211.mp3?updated=1775506849" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title> Anjali Hansen: Cross team collaboration works best. [Privacy Counsel] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/115/notes</link>
      <description>Please enjoy this encore of Career Notes. 
Anjali Hansen, a Senior Privacy Counselor from Noname Security shares her story as she climbed through the ranks to get to where she is today. When Anjali started, she wanted to do international law. She started working for the International Trade Commission after law school, where she was able to gain most of her experience and real world abilities. Working with online fraud and abuse, she shares, concerned her, because it felt like governments could not protect organizations from threats occurring, which is how she got interested in cybercrime. From there, she moved to Noname Security, and in working there, she found that she is working with every group in the organization, creating a cross team collaboration, saying how much she admires that type of model. She says "We have to help other departments protect the data because the data's throughout an organization, it's in HR, it's in sales and marketing, it's in IT, it's in finance. So you have to be able to work with all these teams." We thank Anjali for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 05 Apr 2026 07:00:00 -0000</pubDate>
      <itunes:title> Anjali Hansen: Cross team collaboration works best. [Privacy Counsel] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>115</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/58a2acfc-2f7f-11f1-92a7-1f6181007796/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 
Anjali Hansen, a Senior Privacy Counselor from Noname Security shares her story as she climbed through the ranks to get to where she is today. When Anjali started, she wanted to do international law. She started working for the International Trade Commission after law school, where she was able to gain most of her experience and real world abilities. Working with online fraud and abuse, she shares, concerned her, because it felt like governments could not protect organizations from threats occurring, which is how she got interested in cybercrime. From there, she moved to Noname Security, and in working there, she found that she is working with every group in the organization, creating a cross team collaboration, saying how much she admires that type of model. She says "We have to help other departments protect the data because the data's throughout an organization, it's in HR, it's in sales and marketing, it's in IT, it's in finance. So you have to be able to work with all these teams." We thank Anjali for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[Please enjoy this encore of Career Notes. 
Anjali Hansen, a Senior Privacy Counselor from Noname Security shares her story as she climbed through the ranks to get to where she is today. When Anjali started, she wanted to do international law. She started working for the International Trade Commission after law school, where she was able to gain most of her experience and real world abilities. Working with online fraud and abuse, she shares, concerned her, because it felt like governments could not protect organizations from threats occurring, which is how she got interested in cybercrime. From there, she moved to Noname Security, and in working there, she found that she is working with every group in the organization, creating a cross team collaboration, saying how much she admires that type of model. She says "We have to help other departments protect the data because the data's throughout an organization, it's in HR, it's in sales and marketing, it's in IT, it's in finance. So you have to be able to work with all these teams." We thank Anjali for sharing her story.<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>105</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[58a2acfc-2f7f-11f1-92a7-1f6181007796]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9283791649.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Startup surge sparks spy interest. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/419/notes</link>
      <description>This week, we are joined by Santiago Pontiroli, Threat Intelligence Research Lead from Acronis TRU team, discussing their work on "New year, new sector: Transparent Tribe targets India’s startup ecosystem." The Acronis Threat Research Unit uncovered a new campaign by Transparent Tribe showing the group has expanded beyond traditional government and defense targets to India’s startup ecosystem, especially cybersecurity and OSINT-focused firms. 

The attackers use startup-themed lures delivered via ISO files and malicious shortcuts to deploy Crimson RAT, a highly obfuscated tool capable of surveillance, data theft, and system control. Despite this shift, the campaign closely mirrors the group’s long-standing espionage tactics, suggesting startups are being targeted for their connections to government, law enforcement, and sensitive intelligence networks.

The research and executive brief can be found here:


  New year, new sector: Transparent Tribe targets India’s startup ecosystem


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Apr 2026 07:00:00 -0000</pubDate>
      <itunes:title>Startup surge sparks spy interest. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>419</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/58ecf2d8-2f77-11f1-bd05-3fa25a054fdd/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Santiago Pontiroli, Threat Intelligence Research Lead from Acronis TRU team, discussing their work on "New year, new sector: Transparent Tribe targets India’s startup ecosystem." The Acronis Threat Research Unit uncovered a new campaign by Transparent Tribe showing the group has expanded beyond traditional government and defense targets to India’s startup ecosystem, especially cybersecurity and OSINT-focused firms. 

The attackers use startup-themed lures delivered via ISO files and malicious shortcuts to deploy Crimson RAT, a highly obfuscated tool capable of surveillance, data theft, and system control. Despite this shift, the campaign closely mirrors the group’s long-standing espionage tactics, suggesting startups are being targeted for their connections to government, law enforcement, and sensitive intelligence networks.

The research and executive brief can be found here:


  New year, new sector: Transparent Tribe targets India’s startup ecosystem


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/spontiroli/">Santiago Pontiroli</a>, Threat Intelligence Research Lead from <a href="https://www.linkedin.com/company/acronis/">Acronis</a> TRU team, discussing their work on "New year, new sector: Transparent Tribe targets India’s startup ecosystem." The Acronis Threat Research Unit uncovered a new campaign by Transparent Tribe showing the group has expanded beyond traditional government and defense targets to India’s startup ecosystem, especially cybersecurity and OSINT-focused firms. </p>
<p>The attackers use startup-themed lures delivered via ISO files and malicious shortcuts to deploy Crimson RAT, a highly obfuscated tool capable of surveillance, data theft, and system control. Despite this shift, the campaign closely mirrors the group’s long-standing espionage tactics, suggesting startups are being targeted for their connections to government, law enforcement, and sensitive intelligence networks.</p>
<p><strong>The research and executive brief can be found here:</strong></p>
<ul>
  <li><a href="https://www.acronis.com/en/tru/posts/new-year-new-sector-transparent-tribe-targets-indias-startup-ecosystem/">New year, new sector: Transparent Tribe targets India’s startup ecosystem</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1155</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[58ecf2d8-2f77-11f1-bd05-3fa25a054fdd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5745319681.mp3?updated=1775232742" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>War comes for the cloud.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2523/notes</link>
      <description>Cloud data centers come under fire in wartime. A massive dark web intelligence database is exposed. Chinese hackers exploit a video conferencing zero-day. The intelligence community rolls out cyber modernization plans. React2Shell attacks spread at scale. Iowa sues UnitedHealth over the Change Healthcare breach. France moves to bar kids from social media. Researchers warn about hidden risks in power regulation. An insider extortion plot locks admins out of hundreds of servers. Our guest Brandon Karpf, friend of the show, with insights on the war in Iran. Espresso exploit exposes executive emails. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Brandon Karpf, friend of the show, discussing defending critical infrastructure against Iran.

Selected Reading

What Happens When Data Centers Become Military Targets? (GovInfo Security)

Shared EnemShared Enemy: Inside a Chinese Dark Web Monitoring Database | UpGuardy: Inside a Chinese Dark Web Monitoring Database (UpGuard)

TrueConf Zero-Day Exploited in Asian Government Attacks (SecurityWeek)

ODNI tackles AI, threat hunting, app cybersecurity in year-one tech review (CyberScoop)

React2Shell Exploited in Large-Scale Credential Harvesting Campaign (SecurityWeek)

State AG Sues Change Healthcare in 2024 Ransomware Attack (GovInfo Security)

French Senate passes bill that would ban children under 15 from social media (The Record)

The silent dependency: DC power regulation in cyber‑physical security (NCC Group)

Man admits to locking thousands of Windows devices in extortion plot (Bleeping Computer)

The company's biggest security hole lived in the breakroom (The Register) 

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 03 Apr 2026 20:30:00 -0000</pubDate>
      <itunes:title>War comes for the cloud.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2523</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Cloud data centers come under fire in wartime. A massive dark web intelligence database is exposed. Chinese hackers exploit a video conferencing zero-day. The intelligence community rolls out cyber modernization plans. React2Shell attacks spread at scale. Iowa sues UnitedHealth over the Change Healthcare breach. France moves to bar kids from social media. Researchers warn about hidden risks in power regulation. An insider extortion plot locks admins out of hundreds of servers. Our guest Brandon Karpf, friend of the show, with insights on the war in Iran. Espresso exploit exposes executive emails. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Brandon Karpf, friend of the show, discussing defending critical infrastructure against Iran.

Selected Reading

What Happens When Data Centers Become Military Targets? (GovInfo Security)

Shared EnemShared Enemy: Inside a Chinese Dark Web Monitoring Database | UpGuardy: Inside a Chinese Dark Web Monitoring Database (UpGuard)

TrueConf Zero-Day Exploited in Asian Government Attacks (SecurityWeek)

ODNI tackles AI, threat hunting, app cybersecurity in year-one tech review (CyberScoop)

React2Shell Exploited in Large-Scale Credential Harvesting Campaign (SecurityWeek)

State AG Sues Change Healthcare in 2024 Ransomware Attack (GovInfo Security)

French Senate passes bill that would ban children under 15 from social media (The Record)

The silent dependency: DC power regulation in cyber‑physical security (NCC Group)

Man admits to locking thousands of Windows devices in extortion plot (Bleeping Computer)

The company's biggest security hole lived in the breakroom (The Register) 

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cloud data centers come under fire in wartime. A massive dark web intelligence database is exposed. Chinese hackers exploit a video conferencing zero-day. The intelligence community rolls out cyber modernization plans. React2Shell attacks spread at scale. Iowa sues UnitedHealth over the Change Healthcare breach. France moves to bar kids from social media. Researchers warn about hidden risks in power regulation. An insider extortion plot locks admins out of hundreds of servers. Our guest Brandon Karpf, friend of the show, with insights on the war in Iran. Espresso exploit exposes executive emails. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/brandon-karpf/"><u>Brandon Karpf</u></a>, friend of the show, discussing defending critical infrastructure against Iran.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.govinfosecurity.com/blogs/what-happens-when-data-centers-become-military-targets-p-4080"><u>What Happens When Data Centers Become Military Targets?</u></a> (GovInfo Security)</p>
<p><a href="https://www.upguard.com/breaches/shared-enemy-inside-a-chinese-dark-web-monitoring-database"><u>Shared EnemShared Enemy: Inside a Chinese Dark Web Monitoring Database | UpGuardy: Inside a Chinese Dark Web Monitoring Database</u></a> (UpGuard)</p>
<p><a href="https://www.securityweek.com/trueconf-zero-day-exploited-in-asian-government-attacks/"><u>TrueConf Zero-Day Exploited in Asian Government Attacks</u></a> (SecurityWeek)</p>
<p><a href="https://cyberscoop.com/odni-tackles-ai-threat-hunting-app-cybersecurity-in-year-one-tech-review/"><u>ODNI tackles AI, threat hunting, app cybersecurity in year-one tech review</u></a> (CyberScoop)</p>
<p><a href="https://www.securityweek.com/react2shell-exploited-in-large-scale-credential-harvesting-campaign/"><u>React2Shell Exploited in Large-Scale Credential Harvesting Campaign</u></a> (SecurityWeek)</p>
<p><a href="https://www.govinfosecurity.com/state-ag-sues-change-healthcare-in-2024-ransomware-attack-a-31326"><u>State AG Sues Change Healthcare in 2024 Ransomware Attack</u></a> (GovInfo Security)</p>
<p><a href="https://therecord.media/french-senate-passes-bill-child-ban-social-media"><u>French Senate passes bill that would ban children under 15 from social media</u></a> (The Record)</p>
<p><a href="https://www.nccgroup.com/research/the-silent-dependency-dc-power-regulation-in-cyber-physical-security/"><u>The silent dependency: DC power regulation in cyber‑physical security</u></a> (NCC Group)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/man-admits-to-extortion-plot-locking-coworkers-out-of-thousands-of-windows-devices/"><u>Man admits to locking thousands of Windows devices in extortion plot</u></a> (Bleeping Computer)</p>
<p><a href="https://www.theregister.com/2026/04/02/pwned/"><u>The company's biggest security hole lived in the breakroom</u></a> (The Register) </p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1853</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[be7c405a-1671-11f1-ad8a-ef96af76f52d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4917359789.mp3?updated=1775241154" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The WhatsApp impostor.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2522/notes</link>
      <description>A fake WhatsApp spreads spyware. The State Department pushes embassies to counter influence ops. Cisco patches critical bugs. CrystalRAT hits Telegram. A Texas hospital breach affects 250,000. HHS reshuffles IT oversight. China-linked spies target Europe. EvilTokens hijacks Microsoft accounts. Ransomware hits a North Dakota water plant. Sumedh Thakar, President and CEO of Qualys, discusses how cybersecurity is shifting toward managing real business risk. Tales of a tortoise's termination have been greatly exaggerated. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

We will be sharing a series of interviews we held at RSAC 2026 over the next few weeks. Sumedh Thakar, President and CEO of Qualys, discusses how cybersecurity is shifting toward managing real business risk amid rapid technological change. If you enjoyed this interview, check out the full conversation here. 

Selected Reading

WhatsApp notifies hundreds of users who installed a fake app made by government spyware maker (TechCrunch)

Trump Officials Try to Fight Foreign Disinformation They Once Dismissed (The New York Times)

Cisco Patches Critical and High-Severity Vulnerabilities (SecurityWeek)

New CrystalRAT malware adds RAT, stealer and prankware features (Bleeping Computer)

250,000 Affected by Data Breach at Nacogdoches Memorial Hospital (SecurityWeek)

HHS Shuffles Internal Cyber, AI Oversight Back to CIO Office (GovInfo Security)

European-Chinese geopolitical issues drive renewed cyberespionage campaign (CyberScoop)

New EvilTokens service fuels Microsoft device code phishing attacks (Bleeping Computer)

North Dakota water treatment plant reports March ransomware attack (The Record) 

World’s oldest tortoise caught in viral crypto death scam | St Helena (The Guardian)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 02 Apr 2026 20:30:00 -0000</pubDate>
      <itunes:title>The WhatsApp impostor.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2522</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A fake WhatsApp spreads spyware. The State Department pushes embassies to counter influence ops. Cisco patches critical bugs. CrystalRAT hits Telegram. A Texas hospital breach affects 250,000. HHS reshuffles IT oversight. China-linked spies target Europe. EvilTokens hijacks Microsoft accounts. Ransomware hits a North Dakota water plant. Sumedh Thakar, President and CEO of Qualys, discusses how cybersecurity is shifting toward managing real business risk. Tales of a tortoise's termination have been greatly exaggerated. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

We will be sharing a series of interviews we held at RSAC 2026 over the next few weeks. Sumedh Thakar, President and CEO of Qualys, discusses how cybersecurity is shifting toward managing real business risk amid rapid technological change. If you enjoyed this interview, check out the full conversation here. 

Selected Reading

WhatsApp notifies hundreds of users who installed a fake app made by government spyware maker (TechCrunch)

Trump Officials Try to Fight Foreign Disinformation They Once Dismissed (The New York Times)

Cisco Patches Critical and High-Severity Vulnerabilities (SecurityWeek)

New CrystalRAT malware adds RAT, stealer and prankware features (Bleeping Computer)

250,000 Affected by Data Breach at Nacogdoches Memorial Hospital (SecurityWeek)

HHS Shuffles Internal Cyber, AI Oversight Back to CIO Office (GovInfo Security)

European-Chinese geopolitical issues drive renewed cyberespionage campaign (CyberScoop)

New EvilTokens service fuels Microsoft device code phishing attacks (Bleeping Computer)

North Dakota water treatment plant reports March ransomware attack (The Record) 

World’s oldest tortoise caught in viral crypto death scam | St Helena (The Guardian)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A fake WhatsApp spreads spyware. The State Department pushes embassies to counter influence ops. Cisco patches critical bugs. CrystalRAT hits Telegram. A Texas hospital breach affects 250,000. HHS reshuffles IT oversight. China-linked spies target Europe. EvilTokens hijacks Microsoft accounts. Ransomware hits a North Dakota water plant. Sumedh Thakar, President and CEO of Qualys, discusses how cybersecurity is shifting toward managing real business risk. Tales of a tortoise's termination have been greatly exaggerated. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>We will be sharing a series of interviews we held at RSAC 2026 over the next few weeks. <a href="https://www.linkedin.com/in/sumedhthakar/">Sumedh Thaka</a>r, President and CEO of <a href="https://www.linkedin.com/company/qualys/">Qualys</a>, discusses how cybersecurity is shifting toward managing real business risk amid rapid technological change. If you enjoyed this interview, check out the full conversation <a href="https://explore.thecyberwire.com/sumedh-thakar">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="http://techcrunch.com/2026/04/01/whatsapp-notifies-hundreds-of-users-who-installed-a-fake-app-that-was-actually-government-spyware/"><u>WhatsApp notifies hundreds of users who installed a fake app made by government spyware maker</u></a> (TechCrunch)</p>
<p><a href="https://www.nytimes.com/2026/04/01/business/trump-foreign-disinformation-iran.html"><u>Trump Officials Try to Fight Foreign Disinformation They Once Dismissed</u></a> (The New York Times)</p>
<p><a href="https://www.securityweek.com/cisco-patches-critical-and-high-severity-vulnerabilities/"><u>Cisco Patches Critical and High-Severity Vulnerabilities</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/new-crystalrat-malware-adds-rat-stealer-and-prankware-features/"><u>New CrystalRAT malware adds RAT, stealer and prankware features</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/250000-affected-by-data-breach-at-nacogdoches-memorial-hospital/"><u>250,000 Affected by Data Breach at Nacogdoches Memorial Hospital</u></a> (SecurityWeek)</p>
<p><a href="https://www.govinfosecurity.com/hhs-shuffles-internal-cyber-ai-oversight-back-to-cio-office-a-31315"><u>HHS Shuffles Internal Cyber, AI Oversight Back to CIO Office</u></a> (GovInfo Security)</p>
<p><a href="https://cyberscoop.com/european-chinese-geopolitical-issues-drive-renewed-cyberespionage-campaign/"><u>European-Chinese geopolitical issues drive renewed cyberespionage campaign</u></a> (CyberScoop)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/new-eviltokens-service-fuels-microsoft-device-code-phishing-attacks/"><u>New EvilTokens service fuels Microsoft device code phishing attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/north-dakota-ransomware-water-plant"><u>North Dakota water treatment plant reports March ransomware attack</u></a> (The Record) </p>
<p><br><a href="https://www.theguardian.com/world/2026/apr/02/worlds-oldest-tortoise-crypto-death-scam?CMP=bsky_gu"><u>World’s oldest tortoise caught in viral crypto death scam | St Helena</u></a> (The Guardian)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1800</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[be567208-1671-11f1-ad8a-1ba10aae0dc4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3074564599.mp3?updated=1775155896" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A war of missiles and messages.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2521/notes</link>
      <description>Iran’s cyber campaign continues. North Korea targets the axios NPM package. Cisco suffers a Trivy-related breach. Claude’s code leak unveils broad capabilities. The DOD’s zero-trust efforts are slow-going. A proposed class action suit accuses Perplexity of oversharing. Google patches another Chrome zero-day. The FBI warns against using foreign-developed mobile apps. Christy Wyatt, CEO from Absolute Security, discussing why cyber risk is now a business continuity problem. A city circulates cameras to cultivate crime control. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

We will be sharing a series of interviews we held at RSAC 2026 over the next few weeks. Christy Wyatt, CEO from Absolute Security, discussing why cyber risk is now a business continuity problem. If you enjoyed this conversation, tune in here to listen to the full interview.

Selected Reading

Iran's hackers are on the offensive against the US and Israel (Ars Technica)

Cisco Source Code and AWS Keys Stolen in Trivy Supply Chain Attack (Beyond Machines)

Claude Code's source reveals extent of system access (The Register)

Pentagon's Zero Trust Push Faces a 2027 Reality Check (GovInfo Security)

Perplexity AI Machine Accused of Sharing Data With Meta, Google (Bloomberg)

Google fixes fourth Chrome zero-day exploited in attacks in 2026 (Bleeping Computer)

FBI warns against using Chinese mobile apps due to privacy risks (Bleeping Computer)

North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack (Google Cloud Blog) 

Silicon Valley city to give residents doorbells equipped with cameras (The Guardian)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 01 Apr 2026 20:30:00 -0000</pubDate>
      <itunes:title>A war of missiles and messages.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2521</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Iran’s cyber campaign continues. North Korea targets the axios NPM package. Cisco suffers a Trivy-related breach. Claude’s code leak unveils broad capabilities. The DOD’s zero-trust efforts are slow-going. A proposed class action suit accuses Perplexity of oversharing. Google patches another Chrome zero-day. The FBI warns against using foreign-developed mobile apps. Christy Wyatt, CEO from Absolute Security, discussing why cyber risk is now a business continuity problem. A city circulates cameras to cultivate crime control. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

We will be sharing a series of interviews we held at RSAC 2026 over the next few weeks. Christy Wyatt, CEO from Absolute Security, discussing why cyber risk is now a business continuity problem. If you enjoyed this conversation, tune in here to listen to the full interview.

Selected Reading

Iran's hackers are on the offensive against the US and Israel (Ars Technica)

Cisco Source Code and AWS Keys Stolen in Trivy Supply Chain Attack (Beyond Machines)

Claude Code's source reveals extent of system access (The Register)

Pentagon's Zero Trust Push Faces a 2027 Reality Check (GovInfo Security)

Perplexity AI Machine Accused of Sharing Data With Meta, Google (Bloomberg)

Google fixes fourth Chrome zero-day exploited in attacks in 2026 (Bleeping Computer)

FBI warns against using Chinese mobile apps due to privacy risks (Bleeping Computer)

North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack (Google Cloud Blog) 

Silicon Valley city to give residents doorbells equipped with cameras (The Guardian)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iran’s cyber campaign continues. North Korea targets the axios NPM package. Cisco suffers a Trivy-related breach. Claude’s code leak unveils broad capabilities. The DOD’s zero-trust efforts are slow-going. A proposed class action suit accuses Perplexity of oversharing. Google patches another Chrome zero-day. The FBI warns against using foreign-developed mobile apps. Christy Wyatt, CEO from Absolute Security, discussing why cyber risk is now a business continuity problem. A city circulates cameras to cultivate crime control.<strong> </strong></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>We will be sharing a series of interviews we held at RSAC 2026 over the next few weeks. <a href="https://www.linkedin.com/in/christywyatt/"><u>Christy Wyatt</u></a>, CEO from <a href="https://www.linkedin.com/company/absolute-cyberresilience/"><u>Absolute Security</u></a>, discussing why cyber risk is now a business continuity problem. If you enjoyed this conversation, tune in <a href="https://explore.thecyberwire.com/christy-wyatt">here</a> to listen to the full interview.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://arstechnica.com/security/2026/03/irans-hackers-are-on-the-offensive-against-the-us-and-israel/?utm_brand=arstechnica&amp;utm_social-type=owned&amp;utm_source=mastodon&amp;utm_medium=social"><u>Iran's hackers are on the offensive against the US and Israel</u></a> (Ars Technica)</p>
<p><a href="https://beyondmachines.net/event_details/cisco-source-code-and-aws-keys-stolen-in-trivy-supply-chain-attack-l-a-r-6-3/gD2P6Ple2L"><u>Cisco Source Code and AWS Keys Stolen in Trivy Supply Chain Attack</u></a> (Beyond Machines)</p>
<p><a href="https://www.theregister.com/2026/04/01/claude_code_source_leak_privacy_nightmare/"><u>Claude Code's source reveals extent of system access</u></a> (The Register)</p>
<p><a href="https://www.govinfosecurity.com/pentagons-zero-trust-push-faces-2027-reality-check-a-31305"><u>Pentagon's Zero Trust Push Faces a 2027 Reality Check</u></a> (GovInfo Security)</p>
<p><a href="https://www.bloomberg.com/news/articles/2026-04-01/perplexity-ai-machine-accused-of-sharing-data-with-meta-google"><u>Perplexity AI Machine Accused of Sharing Data With Meta, Google</u></a> (Bloomberg)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/google-fixes-fourth-chrome-zero-day-exploited-in-attacks-in-2026/"><u>Google fixes fourth Chrome zero-day exploited in attacks in 2026</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/fbi-warns-against-using-chinese-mobile-apps-over-to-data-security-risks/"><u>FBI warns against using Chinese mobile apps due to privacy risks</u></a> (Bleeping Computer)</p>
<p><a href="https://cloud.google.com/blog/topics/threat-intelligence/north-korea-threat-actor-targets-axios-npm-package/"><u>North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack</u></a> (Google Cloud Blog) </p>
<p><a href="https://www.theguardian.com/technology/2026/mar/31/silicon-valley-milpitas-doorbell-cameras"><u>Silicon Valley city to give residents doorbells equipped with cameras</u></a> (The Guardian)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1826</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[be314b72-1671-11f1-ad8a-4f7167549349]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9755649194.mp3?updated=1775067233" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Water sector feels the pressure.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2520/notes</link>
      <description>Iranian-linked hackers warn of possible “irreparable” attacks on U.S. water systems. CISA pushes urgent fixes for a critical Citrix flaw. The Dutch Finance Ministry takes systems offline after a breach. Space Force may scrap next-gen GPS control software. Attackers exploit a Fortinet server bug. Lloyds exposes customer transaction data. AI and regulation reshape cyber careers. The FTC settles with a dating app over data sharing. Sam Rubin, SVP, Palo Alto Networks Unit 42 Consulting and Threat Intelligence, discusses Iran's shift to identity weaponization. Wikipedia wrestles with a wayward writer.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

We will be sharing a series of interviews we held at RSAC 2026 over the next few weeks. Sam Rubin, SVP, Palo Alto Networks Unit 42 Consulting and Threat Intelligence, discussing Iran's shift to identity weaponization. If you enjoyed this conversation, tune in here to listen to the full conversation.

Selected Reading

Iranian Cyberthreats Test US Infrastructure Defenses (BankInfo Security)

CISA tells federal agencies to patch Citrix NetScaler bug by Thursday (The Record)

Dutch Ministry of Finance takes treasury systems offline amid cyber incident investigation (Security Affairs)

After 16 years and $8 billion, the military's new GPS software still doesn't work (Ars Technica)

Exploitation of Critical Fortinet FortiClient EMS Flaw Begins (SecurityWeek)

Lloyds IT Glitch Exposed Data of Nearly 500,000 Banking Customers (Infosecurity Magazine)

SANS Research: The Cybersecurity Talent Shortage Narrative Is Wrong. The Real Crisis Is Skills, and AI Just Rewrote the List. (Yahoo Finance)

FTC Takes Action Against Match and OkCupid for Deceiving Users by Sharing Personal Data with Third Party (FTC)

Business Briefing (N2K Pro) 

An AI Agent Was Banned From Creating Wikipedia Articles, Then Wrote Angry Blogs About Being Banned (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 31 Mar 2026 20:30:00 -0000</pubDate>
      <itunes:title>Water sector feels the pressure.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2520</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Iranian-linked hackers warn of possible “irreparable” attacks on U.S. water systems. CISA pushes urgent fixes for a critical Citrix flaw. The Dutch Finance Ministry takes systems offline after a breach. Space Force may scrap next-gen GPS control software. Attackers exploit a Fortinet server bug. Lloyds exposes customer transaction data. AI and regulation reshape cyber careers. The FTC settles with a dating app over data sharing. Sam Rubin, SVP, Palo Alto Networks Unit 42 Consulting and Threat Intelligence, discusses Iran's shift to identity weaponization. Wikipedia wrestles with a wayward writer.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

We will be sharing a series of interviews we held at RSAC 2026 over the next few weeks. Sam Rubin, SVP, Palo Alto Networks Unit 42 Consulting and Threat Intelligence, discussing Iran's shift to identity weaponization. If you enjoyed this conversation, tune in here to listen to the full conversation.

Selected Reading

Iranian Cyberthreats Test US Infrastructure Defenses (BankInfo Security)

CISA tells federal agencies to patch Citrix NetScaler bug by Thursday (The Record)

Dutch Ministry of Finance takes treasury systems offline amid cyber incident investigation (Security Affairs)

After 16 years and $8 billion, the military's new GPS software still doesn't work (Ars Technica)

Exploitation of Critical Fortinet FortiClient EMS Flaw Begins (SecurityWeek)

Lloyds IT Glitch Exposed Data of Nearly 500,000 Banking Customers (Infosecurity Magazine)

SANS Research: The Cybersecurity Talent Shortage Narrative Is Wrong. The Real Crisis Is Skills, and AI Just Rewrote the List. (Yahoo Finance)

FTC Takes Action Against Match and OkCupid for Deceiving Users by Sharing Personal Data with Third Party (FTC)

Business Briefing (N2K Pro) 

An AI Agent Was Banned From Creating Wikipedia Articles, Then Wrote Angry Blogs About Being Banned (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iranian-linked hackers warn of possible “irreparable” attacks on U.S. water systems. CISA pushes urgent fixes for a critical Citrix flaw. The Dutch Finance Ministry takes systems offline after a breach. Space Force may scrap next-gen GPS control software. Attackers exploit a Fortinet server bug. Lloyds exposes customer transaction data. AI and regulation reshape cyber careers. The FTC settles with a dating app over data sharing. Sam Rubin, SVP, Palo Alto Networks Unit 42 Consulting and Threat Intelligence, discusses Iran's shift to identity weaponization. Wikipedia wrestles with a wayward writer.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>We will be sharing a series of interviews we held at RSAC 2026 over the next few weeks. <a href="https://www.linkedin.com/in/samsrubin/"><u>Sam Rubin</u></a>, SVP, <a href="https://www.paloaltonetworks.com/"><u>Palo Alto Networks</u></a> Unit 42 Consulting and Threat Intelligence, discussing Iran's shift to identity weaponization. If you enjoyed this conversation, tune in <a href="https://explore.thecyberwire.com/palo-alto">here</a> to listen to the full conversation.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bankinfosecurity.com/iranian-cyberthreats-test-us-infrastructure-defenses-a-31299"><u>Iranian Cyberthreats Test US Infrastructure Defenses</u></a> (BankInfo Security)</p>
<p><a href="https://therecord.media/cisa-tells-federal-agencies-to-patch-citrix-netscaler-bug"><u>CISA tells federal agencies to patch Citrix NetScaler bug by Thursday</u></a> (The Record)</p>
<p><a href="https://securityaffairs.com/190204/hacking/dutch-ministry-of-finance-takes-treasury-systems-offline-amid-cyber-incident-investigation.html"><u>Dutch Ministry of Finance takes treasury systems offline amid cyber incident investigation</u></a> (Security Affairs)</p>
<p><a href="https://arstechnica.com/science/2026/03/after-16-years-and-8-billion-the-militarys-new-gps-software-still-doesnt-work/"><u>After 16 years and $8 billion, the military's new GPS software still doesn't work</u></a> (Ars Technica)</p>
<p><a href="https://www.securityweek.com/exploitation-of-critical-fortinet-forticlient-ems-flaw-begins/"><u>Exploitation of Critical Fortinet FortiClient EMS Flaw Begins</u></a> (SecurityWeek)</p>
<p><a href="https://www.infosecurity-magazine.com/news/lloyds-glitch-exposed-500000/"><u>Lloyds IT Glitch Exposed Data of Nearly 500,000 Banking Customers</u></a> (Infosecurity Magazine)</p>
<p><a href="https://uk.finance.yahoo.com/news/sans-research-cybersecurity-talent-shortage-110000178.html"><u>SANS Research: The Cybersecurity Talent Shortage Narrative Is Wrong. The Real Crisis Is Skills, and AI Just Rewrote the List.</u></a> (Yahoo Finance)</p>
<p><a href="https://www.ftc.gov/news-events/news/press-releases/2026/03/ftc-takes-action-against-match-okcupid-deceiving-users-sharing-personal-data-third-party"><u>FTC Takes Action Against Match and OkCupid for Deceiving Users by Sharing Personal Data with Third Party</u></a> (FTC)</p>
<p><a href="https://www.thecyberwire.com/newsletters/business-briefing/8/12"><u>Business Briefing</u></a> (N2K Pro) </p>
<p><a href="https://www.404media.co/an-ai-agent-was-banned-from-creating-wikipedia-articles-then-wrote-angry-blogs-about-being-banned/"><u>An AI Agent Was Banned From Creating Wikipedia Articles, Then Wrote Angry Blogs About Being Banned</u></a> (404 Media)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1604</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[be05af3a-1671-11f1-ad8a-bbacf3a74e31]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6987273434.mp3?updated=1774984338" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bringing it all together. [CISOP]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/132/notes</link>
      <description>Please enjoy this encore of CISO Perspectives.

In the season finale of CISOP, Kim Jones is joined by N2K’s own Ethan Cook to reflect on the conversations that shaped this season. Together, they revisit standout moments from Kim’s interviews, unpacking their significance and getting Ethan’s fresh perspective on the cybersecurity workforce challenge—as someone viewing the industry from the outside.

Since the mid-season reflection, Kim has explored a wide range of workforce issues, including skills mapping, talent identification, and the evolving strategies needed to close cybersecurity’s talent gap.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 31 Mar 2026 06:00:00 -0000</pubDate>
      <itunes:title>Bringing it all together.  [CISOP]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>132</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/eeeb8a30-23c7-11f1-ad07-cbdd6b6880c7/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of CISO Perspectives.

In the season finale of CISOP, Kim Jones is joined by N2K’s own Ethan Cook to reflect on the conversations that shaped this season. Together, they revisit standout moments from Kim’s interviews, unpacking their significance and getting Ethan’s fresh perspective on the cybersecurity workforce challenge—as someone viewing the industry from the outside.

Since the mid-season reflection, Kim has explored a wide range of workforce issues, including skills mapping, talent identification, and the evolving strategies needed to close cybersecurity’s talent gap.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of CISO Perspectives.</p>
<p>In the season finale of CISOP, Kim Jones is joined by N2K’s own Ethan Cook to reflect on the conversations that shaped this season. Together, they revisit standout moments from Kim’s interviews, unpacking their significance and getting Ethan’s fresh perspective on the cybersecurity workforce challenge—as someone viewing the industry from the outside.</p>
<p>Since the mid-season reflection, Kim has explored a wide range of workforce issues, including skills mapping, talent identification, and the evolving strategies needed to close cybersecurity’s talent gap.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3282</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eeeb8a30-23c7-11f1-ad07-cbdd6b6880c7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6952395654.mp3?updated=1770732837" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Inbox intrusion hits FBI chief.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2519/notes</link>
      <description>Iran-linked hackers claim a breach of the FBI director’s personal email. ShinyHunters hit the European Commission. F5 and Citrix warn of actively exploited flaws. A WordPress plugin exposes hundreds of thousands of sites. Infinity Stealer targets macOS users. A Russian APT adopts a new iOS exploit kit. Treasury weighs a cyber insurance backstop. DHS clears suspended CISA staff. Our guest is Brian Long, CEO and Co-Founder of Adaptive Security, discussing deepfake job hires and the new identity attack surface. Bureaucrats bless a black-box behemoth.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

We will be sharing a series of interviews we held at RSAC 2026 over the next few weeks. Today, Dave Bittner is joined by Brian Long, CEO and Co-Founder of Adaptive Security, discussing deepfake job hires and the new identity attack surface. AI-generated identities are turning the hiring process into a new entry point for attackers. The solution isn’t spotting perfect fakes — it’s building stronger identity verification into hiring. Tune into the full conversation here. 

Selected Reading

Iran-linked hackers breach FBI director's personal email, publish photos and documents

European Commission confirms data breach after Europa.eu hack

Hackers now exploit critical F5 BIG-IP flaw in attacks, patch now

Critical Citrix NetScaler Vulnerability Exploited in the Wild - Infosecurity Magazine

File read flaw in Smart Slider plugin impacts 500K WordPress sites

New Infinity Stealer malware grabs macOS data via ClickFix lures

Russian APT Star Blizzard Adopts DarkSword iOS Exploit Kit - SecurityWeek

US Treasury Weighs Cyber Insurance Backstop - GovInfoSecurity

DHS drops investigation into former acting CISA chief’s failed polygraph exam - Nextgov/FCW

Federal Cyber Experts Thought Microsoft’s Cloud Was “a Pile of Shit.” They Approved It Anyway

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 30 Mar 2026 20:30:00 -0000</pubDate>
      <itunes:title>Inbox intrusion hits FBI chief.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2519</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Iran-linked hackers claim a breach of the FBI director’s personal email. ShinyHunters hit the European Commission. F5 and Citrix warn of actively exploited flaws. A WordPress plugin exposes hundreds of thousands of sites. Infinity Stealer targets macOS users. A Russian APT adopts a new iOS exploit kit. Treasury weighs a cyber insurance backstop. DHS clears suspended CISA staff. Our guest is Brian Long, CEO and Co-Founder of Adaptive Security, discussing deepfake job hires and the new identity attack surface. Bureaucrats bless a black-box behemoth.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

We will be sharing a series of interviews we held at RSAC 2026 over the next few weeks. Today, Dave Bittner is joined by Brian Long, CEO and Co-Founder of Adaptive Security, discussing deepfake job hires and the new identity attack surface. AI-generated identities are turning the hiring process into a new entry point for attackers. The solution isn’t spotting perfect fakes — it’s building stronger identity verification into hiring. Tune into the full conversation here. 

Selected Reading

Iran-linked hackers breach FBI director's personal email, publish photos and documents

European Commission confirms data breach after Europa.eu hack

Hackers now exploit critical F5 BIG-IP flaw in attacks, patch now

Critical Citrix NetScaler Vulnerability Exploited in the Wild - Infosecurity Magazine

File read flaw in Smart Slider plugin impacts 500K WordPress sites

New Infinity Stealer malware grabs macOS data via ClickFix lures

Russian APT Star Blizzard Adopts DarkSword iOS Exploit Kit - SecurityWeek

US Treasury Weighs Cyber Insurance Backstop - GovInfoSecurity

DHS drops investigation into former acting CISA chief’s failed polygraph exam - Nextgov/FCW

Federal Cyber Experts Thought Microsoft’s Cloud Was “a Pile of Shit.” They Approved It Anyway

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iran-linked hackers claim a breach of the FBI director’s personal email. ShinyHunters hit the European Commission. F5 and Citrix warn of actively exploited flaws. A WordPress plugin exposes hundreds of thousands of sites. Infinity Stealer targets macOS users. A Russian APT adopts a new iOS exploit kit. Treasury weighs a cyber insurance backstop. DHS clears suspended CISA staff. Our guest is Brian Long, CEO and Co-Founder of Adaptive Security, discussing deepfake job hires and the new identity attack surface. Bureaucrats bless a black-box behemoth.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>We will be sharing a series of interviews we held at RSAC 2026 over the next few weeks. Today, Dave Bittner is joined by <a href="https://www.linkedin.com/in/brianclong/"><u>Brian Long</u></a>, CEO and Co-Founder of <a href="https://www.adaptivesecurity.com/"><u>Adaptive Security</u></a>, discussing deepfake job hires and the new identity attack surface. AI-generated identities are turning the hiring process into a new entry point for attackers. The solution isn’t spotting perfect fakes — it’s building stronger identity verification into hiring. Tune into the full conversation <a href="https://explore.thecyberwire.com/brian-long">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.reuters.com/world/us/iran-linked-hackers-claim-breach-of-fbi-directors-personal-email-doj-official-2026-03-27/?ref=metacurity.com"><u>Iran-linked hackers breach FBI director's personal email, publish photos and documents</u></a></p>
<p><a href="https://www.bleepingcomputer.com/news/security/european-commission-confirms-data-breach-after-europaeu-hack/"><u>European Commission confirms data breach after Europa.eu hack</u></a></p>
<p><a href="https://www.bleepingcomputer.com/news/security/hackers-now-exploit-critical-f5-big-ip-flaw-in-attacks-patch-now/"><u>Hackers now exploit critical F5 BIG-IP flaw in attacks, patch now</u></a></p>
<p><a href="https://www.infosecurity-magazine.com/news/critical-citrix-netscaler/"><u>Critical Citrix NetScaler Vulnerability Exploited in the Wild - Infosecurity Magazine</u></a></p>
<p><a href="https://www.bleepingcomputer.com/news/security/file-read-flaw-in-smart-slider-plugin-impacts-500k-wordpress-sites/"><u>File read flaw in Smart Slider plugin impacts 500K WordPress sites</u></a></p>
<p><a href="https://www.bleepingcomputer.com/news/security/new-infinity-stealer-malware-grabs-macos-data-via-clickfix-lures/"><u>New Infinity Stealer malware grabs macOS data via ClickFix lures</u></a></p>
<p><a href="https://www.securityweek.com/russian-apt-star-blizzard-adopts-darksword-ios-exploit-kit/"><u>Russian APT Star Blizzard Adopts DarkSword iOS Exploit Kit - SecurityWeek</u></a></p>
<p><a href="https://www.govinfosecurity.com/us-treasury-weighs-cyber-insurance-backstop-a-31248"><u>US Treasury Weighs Cyber Insurance Backstop - GovInfoSecurity</u></a></p>
<p><a href="https://www.nextgov.com/cybersecurity/2026/03/dhs-drops-investigation-former-acting-cisa-chiefs-failed-polygraph-exam/412473/"><u>DHS drops investigation into former acting CISA chief’s failed polygraph exam - Nextgov/FCW</u></a></p>
<p><a href="https://arstechnica.com/information-technology/2026/03/federal-cyber-experts-called-microsofts-cloud-a-pile-of-shit-approved-it-anyway/"><u>Federal Cyber Experts Thought Microsoft’s Cloud Was “a Pile of Shit.” They Approved It Anyway</u></a></p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1584</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bddb948e-1671-11f1-ad8a-8fe32a6376aa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5967145882.mp3?updated=1774898084" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>David Nosibor: Taking calculated risks. [Product Lead] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/114/notes</link>
      <description>Please enjoy this encore of Career Notes.

David Nosibor, Product Lead for SafeCyber at UL Solutions, started his career in a unique way by not letting himself be pigeonholed. Within his company, David was able to grow to the position he is in now and says that his position feels like a lot of roles tied into one. He says that on any given day he is tackling all sorts of elements, such as marketing, operations, working with the engineering team, figuring out ways to acquire customers, retain them, and also working on sales and business development capabilities. He also says that constantly learning and getting new opportunities was how he ended up being where he is today. David states that staying focused and being on the lookout for ways to accomplish the mission is the best way for him in his company to democratize product security. He quotes the famous singer Sean Carter in saying that he firmly believes in taking calculated risks to get where you need to be going. We thank David for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 29 Mar 2026 07:00:00 -0000</pubDate>
      <itunes:title>David Nosibor: Taking calculated risks. [Product Lead] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>114</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/96923564-2a20-11f1-bac8-2bbe50dee58a/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes.

David Nosibor, Product Lead for SafeCyber at UL Solutions, started his career in a unique way by not letting himself be pigeonholed. Within his company, David was able to grow to the position he is in now and says that his position feels like a lot of roles tied into one. He says that on any given day he is tackling all sorts of elements, such as marketing, operations, working with the engineering team, figuring out ways to acquire customers, retain them, and also working on sales and business development capabilities. He also says that constantly learning and getting new opportunities was how he ended up being where he is today. David states that staying focused and being on the lookout for ways to accomplish the mission is the best way for him in his company to democratize product security. He quotes the famous singer Sean Carter in saying that he firmly believes in taking calculated risks to get where you need to be going. We thank David for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes.</p>
<p>David Nosibor, Product Lead for SafeCyber at UL Solutions, started his career in a unique way by not letting himself be pigeonholed. Within his company, David was able to grow to the position he is in now and says that his position feels like a lot of roles tied into one. He says that on any given day he is tackling all sorts of elements, such as marketing, operations, working with the engineering team, figuring out ways to acquire customers, retain them, and also working on sales and business development capabilities. He also says that constantly learning and getting new opportunities was how he ended up being where he is today. David states that staying focused and being on the lookout for ways to accomplish the mission is the best way for him in his company to democratize product security. He quotes the famous singer Sean Carter in saying that he firmly believes in taking calculated risks to get where you need to be going. We thank David for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1570</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[96923564-2a20-11f1-bac8-2bbe50dee58a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6590703730.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CyberWire Daily at 10: The breaches we still talk about. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/95/notes</link>
      <description>In this special edition of CyberWire Daily’s 10th anniversary series, N2K CyberWire's Maria Varmazis and Dave Bittner discuss the biggest breaches over the past 10 years.

The foundational 2014 Sony hack kicks off our conversation, then Maria and Dave highlight:


  the 2015 OPM breach, which exposed sensitive security-clearance data and was attributed to long-term access by China amid outdated government systems and security

  2017’s WannaCry and NotPetya's global disruption and Equifax's ongoing fallout

  the 2020 SolarWinds breach underscored supply-chain risks and raised concerns about potential personal criminal liability for CISOs.


The conversation illustrates two main threat-actor categories—nation-state espionage and financially motivated criminals—and the increasingly blurred lines between them. Join us as we reflect on how the industry and cybercrime have evolved over the past decade.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 29 Mar 2026 06:00:00 -0000</pubDate>
      <itunes:title>CyberWire Daily at 10: The breaches we still talk about. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>95</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0763b4cc-29fc-11f1-b106-97d617cd6f62/image/9d064a62daa0817d3d0bde95f8f0f94f.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this special edition of CyberWire Daily’s 10th anniversary series, N2K CyberWire's Maria Varmazis and Dave Bittner discuss the biggest breaches over the past 10 years.

The foundational 2014 Sony hack kicks off our conversation, then Maria and Dave highlight:


  the 2015 OPM breach, which exposed sensitive security-clearance data and was attributed to long-term access by China amid outdated government systems and security

  2017’s WannaCry and NotPetya's global disruption and Equifax's ongoing fallout

  the 2020 SolarWinds breach underscored supply-chain risks and raised concerns about potential personal criminal liability for CISOs.


The conversation illustrates two main threat-actor categories—nation-state espionage and financially motivated criminals—and the increasingly blurred lines between them. Join us as we reflect on how the industry and cybercrime have evolved over the past decade.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this special edition of CyberWire Daily’s 10th anniversary series, N2K CyberWire's <a href="https://www.linkedin.com/in/varmazis">Maria Varmazis</a> and <a href="https://www.linkedin.com/in/dave-bittner-27231a4">Dave Bittner</a> discuss the biggest breaches over the past 10 years.</p>
<p>The foundational 2014 Sony hack kicks off our conversation, then Maria and Dave highlight:</p>
<ul>
  <li>the 2015 OPM breach, which exposed sensitive security-clearance data and was attributed to long-term access by China amid outdated government systems and security</li>
  <li>2017’s WannaCry and NotPetya's global disruption and Equifax's ongoing fallout</li>
  <li>the 2020 SolarWinds breach underscored supply-chain risks and raised concerns about potential personal criminal liability for CISOs.</li>
</ul>
<p>The conversation illustrates two main threat-actor categories—nation-state espionage and financially motivated criminals—and the increasingly blurred lines between them. Join us as we reflect on how the industry and cybercrime have evolved over the past decade.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1701</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0763b4cc-29fc-11f1-b106-97d617cd6f62]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7635776247.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When “safe” documents aren’t. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/418/notes</link>
      <description>Omer Ninburg, CTO of Novee Security, joins us on this episode of Research Saturday to discuss their work on "From PDF to Pwn: Scalable 0day Discovery in PDF Engines and Services Using Multi-Agent LLMs." Historically, Portable Document Formats – the immutable, localized PDF – was once considered a “safe” component inside enterprise environments. That is no longer the case.

To demonstrate how PDF services and engines can be exploited, the team at Novee used their proprietary, multi-agent LLM system to uncover vulnerability patterns, and systematically scale them into a broad discovery campaign across two PDF vendor ecosystems.

The research uncovered 16 verified vulnerabilities across client-side PDF viewers, embedded plugins, and server-side PDF services.



The research and executive brief can be found here:


  ⁠From PDF to Pwn: Scalable 0day Discovery in PDF Engines and Services Using Multi-Agent LLMs


  Hacker-Trained AI Discovers 16 New 0-Day Vulnerabilities in PDF Engines


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Mar 2026 05:00:00 -0000</pubDate>
      <itunes:title>When “safe” documents aren’t. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>418</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0ae1f78c-2a09-11f1-9680-93bb8035fd25/image/8f3cd4038c81bba2a8ea4ca89f3e23c4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Omer Ninburg, CTO of Novee Security, joins us on this episode of Research Saturday to discuss their work on "From PDF to Pwn: Scalable 0day Discovery in PDF Engines and Services Using Multi-Agent LLMs." Historically, Portable Document Formats – the immutable, localized PDF – was once considered a “safe” component inside enterprise environments. That is no longer the case.

To demonstrate how PDF services and engines can be exploited, the team at Novee used their proprietary, multi-agent LLM system to uncover vulnerability patterns, and systematically scale them into a broad discovery campaign across two PDF vendor ecosystems.

The research uncovered 16 verified vulnerabilities across client-side PDF viewers, embedded plugins, and server-side PDF services.



The research and executive brief can be found here:


  ⁠From PDF to Pwn: Scalable 0day Discovery in PDF Engines and Services Using Multi-Agent LLMs


  Hacker-Trained AI Discovers 16 New 0-Day Vulnerabilities in PDF Engines


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/omer-ninburg-941b4b85/">Omer Ninburg</a>, CTO of <a href="https://novee.security/">Novee Security</a>, joins us on this episode of Research Saturday to discuss their work on "From PDF to Pwn: Scalable 0day Discovery in PDF Engines and Services Using Multi-Agent LLMs." Historically, Portable Document Formats – the immutable, localized PDF – was once considered a “safe” component inside enterprise environments. That is no longer the case.</p>
<p>To demonstrate how PDF services and engines can be exploited, the team at Novee used their proprietary, multi-agent LLM system to uncover vulnerability patterns, and systematically scale them into a broad discovery campaign across two PDF vendor ecosystems.</p>
<p>The research uncovered 16 verified vulnerabilities across client-side PDF viewers, embedded plugins, and server-side PDF services.</p>
<p><br></p>
<p><strong>The research and executive brief can be found here:</strong></p>
<ul>
  <li>⁠<a href="https://novee.security/blog/from-pdf-to-pwn-scalable-0day-discovery-in-pdf-engines-and-services-using-multi-agent-llms-2/">From PDF to Pwn: Scalable 0day Discovery in PDF Engines and Services Using Multi-Agent LLMs</a>
</li>
  <li><a href="https://novee.security/blog/hacker-trained-ai-discovers-16-new-0-day-vulnerabilities-in-pdf-engines/">Hacker-Trained AI Discovers 16 New 0-Day Vulnerabilities in PDF Engines</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1263</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0ae1f78c-2a09-11f1-9680-93bb8035fd25]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1732442550.mp3?updated=1774547657" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Langflow locked and loaded.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2518/notes</link>
      <description>CISA warns of actively exploited Langflow vulnerability. CISA flags critical PTC Windchill vulnerability. Phishing activity surges amid war in Iran. Google moves up their post-quantum timeline. Alleged RedLine infostealer developer faces thirty years in a US prison. Bearlyfy hacktivists launch disruptive ransomware campaign in Russia. FCC moves to crack down on robocallers and foreign call centers. Anti-piracy group takes down AnimePlay streaming platform. N2K’s  Maria Varmazis and Dave Bittner are previewing the biggest breaches in the past 10 years. And what happens when hackers call the game?

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Daily at 10: The breaches we still talk about.  

This installment celebrating 10 years of the CyberWire Daily podcast finds N2K’s  Maria Varmazis and Dave Bittner previewing the biggest breaches in the past 10 years. You can tune in Sunday to your CyberWire Daily podcast feed to hear their full conversation. 

Selected Reading

CISA: New Langflow flaw actively exploited to hijack AI workflows (Bleeping Computer) 

CISA Flags Critical PTC Vulnerability That Had German Police Mobilized (SecurityWeek)

War in the Middle East Triggers Surge in Phishing and Malware Campaigns Targeting Gulf Countries (Bitdefender)

Google moves post-quantum encryption timeline up to 2029 (CyberScoop)

Alleged RedLine malware developer extradited to US, faces up to 30 years (The Record)

Pro-Ukraine hacker group Bearlyfy targets Russian companies with custom ransomware (The Record)

FCC pushes new rules to crack down on robocallers, foreign call centers (CyberScoop)

Anti-piracy coalition takes down AnimePlay app with 5 million users (Bleeping Computer) 

AFC Ajax drops ball as hackers transfer tickets, lift bans (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 27 Mar 2026 20:30:00 -0000</pubDate>
      <itunes:title>Langflow locked and loaded.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2518</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA warns of actively exploited Langflow vulnerability. CISA flags critical PTC Windchill vulnerability. Phishing activity surges amid war in Iran. Google moves up their post-quantum timeline. Alleged RedLine infostealer developer faces thirty years in a US prison. Bearlyfy hacktivists launch disruptive ransomware campaign in Russia. FCC moves to crack down on robocallers and foreign call centers. Anti-piracy group takes down AnimePlay streaming platform. N2K’s  Maria Varmazis and Dave Bittner are previewing the biggest breaches in the past 10 years. And what happens when hackers call the game?

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Daily at 10: The breaches we still talk about.  

This installment celebrating 10 years of the CyberWire Daily podcast finds N2K’s  Maria Varmazis and Dave Bittner previewing the biggest breaches in the past 10 years. You can tune in Sunday to your CyberWire Daily podcast feed to hear their full conversation. 

Selected Reading

CISA: New Langflow flaw actively exploited to hijack AI workflows (Bleeping Computer) 

CISA Flags Critical PTC Vulnerability That Had German Police Mobilized (SecurityWeek)

War in the Middle East Triggers Surge in Phishing and Malware Campaigns Targeting Gulf Countries (Bitdefender)

Google moves post-quantum encryption timeline up to 2029 (CyberScoop)

Alleged RedLine malware developer extradited to US, faces up to 30 years (The Record)

Pro-Ukraine hacker group Bearlyfy targets Russian companies with custom ransomware (The Record)

FCC pushes new rules to crack down on robocallers, foreign call centers (CyberScoop)

Anti-piracy coalition takes down AnimePlay app with 5 million users (Bleeping Computer) 

AFC Ajax drops ball as hackers transfer tickets, lift bans (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA warns of actively exploited Langflow vulnerability. CISA flags critical PTC Windchill vulnerability. Phishing activity surges amid war in Iran. Google moves up their post-quantum timeline. Alleged RedLine infostealer developer faces thirty years in a US prison. Bearlyfy hacktivists launch disruptive ransomware campaign in Russia. FCC moves to crack down on robocallers and foreign call centers. Anti-piracy group takes down AnimePlay streaming platform. N2K’s  Maria Varmazis and Dave Bittner are previewing the biggest breaches in the past 10 years. And what happens when hackers call the game?</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Daily at 10: The breaches we still talk about.  </strong></p>
<p>This installment celebrating 10 years of the CyberWire Daily podcast finds N2K’s  <a href="http://linkedin.com/in/varmazis?skipRedirect=true&amp;miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAACcmioBIvUOYgJj_S9Ndqn6Z6puOpcB4n0"><u>Maria Varmazis</u></a> and <a href="https://www.linkedin.com/in/dave-bittner-27231a4/"><u>Dave Bittner</u></a> previewing the biggest breaches in the past 10 years. You can tune in Sunday to your CyberWire Daily podcast feed to hear their full conversation. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisa-new-langflow-flaw-actively-exploited-to-hijack-ai-workflows/"><u>CISA: New Langflow flaw actively exploited to hijack AI workflows</u></a> (Bleeping Computer) </p>
<p><a href="https://www.securityweek.com/cisa-flags-critical-ptc-vulnerability-that-had-german-police-mobilized/"><u>CISA Flags Critical PTC Vulnerability That Had German Police Mobilized</u></a> (SecurityWeek)</p>
<p><a href="https://www.bitdefender.com/en-gb/blog/hotforsecurity/gulf-countries-phishing-surge"><u>War in the Middle East Triggers Surge in Phishing and Malware Campaigns Targeting Gulf Countries</u></a> (Bitdefender)</p>
<p><a href="https://cyberscoop.com/google-moves-post-quantum-encryption-timeline-to-2029/"><u>Google moves post-quantum encryption timeline up to 2029</u></a> (CyberScoop)</p>
<p><a href="https://therecord.media/redline-malware-developer-extradited-to-us-faces-30-years"><u>Alleged RedLine malware developer extradited to US, faces up to 30 years</u></a> (The Record)</p>
<p><a href="https://therecord.media/ransomware-ukraine-russia-bearlyfy"><u>Pro-Ukraine hacker group Bearlyfy targets Russian companies with custom ransomware</u></a> (The Record)</p>
<p><a href="https://cyberscoop.com/fcc-votes-to-crack-down-on-robcallers-foreign-call-centers/"><u>FCC pushes new rules to crack down on robocallers, foreign call centers</u></a> (CyberScoop)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/anti-piracy-coalition-takes-down-animeplay-app-with-5-million-users/"><u>Anti-piracy coalition takes down AnimePlay app with 5 million users</u></a> (Bleeping Computer) </p>
<p><a href="https://www.theregister.com/2026/03/27/afc_ajax_drops_ball_as/"><u>AFC Ajax drops ball as hackers transfer tickets, lift bans</u></a> (The Register)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1690</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bda662d2-1671-11f1-ad8a-73ad4198c1f2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7060698402.mp3?updated=1774639364" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Why is the vendor role so contentious in the cyber ecosystem? [CISOP]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/131/notes</link>
      <description>As the emphasis on improving cybersecurity has continued to grow, so has the number of vendors offering a range of cybersecurity services. However, despite the value many of these vendors bring, the relationship between vendors and clients has become strained. In this episode, Kim explores this relationship, offering his thoughts on this relationship and what both sides can do to better to improve this dynamic.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 27 Mar 2026 06:00:00 -0000</pubDate>
      <itunes:title>Why is the vendor role so contentious in the cyber ecosystem? [CISOP]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>131</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9f094374-23c5-11f1-8ce0-93b7c80c03f7/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>As the emphasis on improving cybersecurity has continued to grow, so has the number of vendors offering a range of cybersecurity services. However, despite the value many of these vendors bring, the relationship between vendors and clients has become strained. In this episode, Kim explores this relationship, offering his thoughts on this relationship and what both sides can do to better to improve this dynamic.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As the emphasis on improving cybersecurity has continued to grow, so has the number of vendors offering a range of cybersecurity services. However, despite the value many of these vendors bring, the relationship between vendors and clients has become strained. In this episode, Kim explores this relationship, offering his thoughts on this relationship and what both sides can do to better to improve this dynamic.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion ⁠⁠<a href="https://thecyberwire.com/stories/6e22b9d7763e4f8482fd9bb60192a2c1/why-is-the-vendor-role-so-contentious-in-the-cyber-ecosystem">blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>892</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9f094374-23c5-11f1-8ce0-93b7c80c03f7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1451165944.mp3?updated=1773776835" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Wrapping RSAC 2026 up with a bow. </title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2517/notes</link>
      <description>RSAC wraps. CISA warns shutdown furloughs are weakening cyber defenses. China-linked actors burrow into global telecom infrastructure. Iran’s Pay2Key resurfaces. India probes suspected Pakistan-linked CCTV spying. Florida suspends a firm over offshore medical data exposure. Cisco patches fresh flaws. Russian police arrest the alleged LeakBase operator. Intern Kevin files his latest man-on-the street report. Google gets grabby with your homepage. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest aka Intern Kevin

Intern Kevin is back from the floor at RSAC 2026. By day, he’s Global Director of Cybersecurity Startups at Microsoft for Startups, but this week, Kevin Magee is trolling the floor at RSAC to get the pulse of what is really happening in and around the Moscone Center. Kevin chats with Ann Johnson, Corporate Vice President and Executive Security Advisor at Microsoft, David Shipley, Chief Executive Officer and Field CISO at Beauceron Security , and Dr. Jessica Barker and FC, Co-Founders and Co-CEOs at Cygenta.

Selected Reading

RSAC Cryptographers' Panel Highlights AI Defense Challenges (GovInfo Security)

Only Trump can decide when cyberwar turns into real war (The Register)

Jen Easterly, cybersecurity's 'relentless optimist' (The Register)

CISA Forced Into 'Reactive' Cyber Posture Amid Shutdown (GovInfo Security)

Chinese Hackers Caught Deep Within Telecom Backbone Infrastructure (SecurityWeek)

Iran-Linked Pay2Key Ransomware Group Re-Emerges (Infosecurity Magazine)

Indian government probes CCTV espionage operation linked to Pakistan (The Register)

Florida Suspends Firm for Unlawfully Offshoring Claims Data (GovInfo Security)

Cisco Patches Multiple Vulnerabilities in IOS Software (SecurityWeek)

Russia arrests suspected owner of LeakBase cybercrime forum (Bleeping Computer)

Google Just Patented The End Of Your Website (Forbes)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 26 Mar 2026 20:30:00 -0000</pubDate>
      <itunes:title>Wrapping RSAC 2026 up with a bow. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2517</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>RSAC wraps. CISA warns shutdown furloughs are weakening cyber defenses. China-linked actors burrow into global telecom infrastructure. Iran’s Pay2Key resurfaces. India probes suspected Pakistan-linked CCTV spying. Florida suspends a firm over offshore medical data exposure. Cisco patches fresh flaws. Russian police arrest the alleged LeakBase operator. Intern Kevin files his latest man-on-the street report. Google gets grabby with your homepage. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest aka Intern Kevin

Intern Kevin is back from the floor at RSAC 2026. By day, he’s Global Director of Cybersecurity Startups at Microsoft for Startups, but this week, Kevin Magee is trolling the floor at RSAC to get the pulse of what is really happening in and around the Moscone Center. Kevin chats with Ann Johnson, Corporate Vice President and Executive Security Advisor at Microsoft, David Shipley, Chief Executive Officer and Field CISO at Beauceron Security , and Dr. Jessica Barker and FC, Co-Founders and Co-CEOs at Cygenta.

Selected Reading

RSAC Cryptographers' Panel Highlights AI Defense Challenges (GovInfo Security)

Only Trump can decide when cyberwar turns into real war (The Register)

Jen Easterly, cybersecurity's 'relentless optimist' (The Register)

CISA Forced Into 'Reactive' Cyber Posture Amid Shutdown (GovInfo Security)

Chinese Hackers Caught Deep Within Telecom Backbone Infrastructure (SecurityWeek)

Iran-Linked Pay2Key Ransomware Group Re-Emerges (Infosecurity Magazine)

Indian government probes CCTV espionage operation linked to Pakistan (The Register)

Florida Suspends Firm for Unlawfully Offshoring Claims Data (GovInfo Security)

Cisco Patches Multiple Vulnerabilities in IOS Software (SecurityWeek)

Russia arrests suspected owner of LeakBase cybercrime forum (Bleeping Computer)

Google Just Patented The End Of Your Website (Forbes)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>RSAC wraps. CISA warns shutdown furloughs are weakening cyber defenses. China-linked actors burrow into global telecom infrastructure. Iran’s Pay2Key resurfaces. India probes suspected Pakistan-linked CCTV spying. Florida suspends a firm over offshore medical data exposure. Cisco patches fresh flaws. Russian police arrest the alleged LeakBase operator. Intern Kevin files his latest man-on-the street report. Google gets grabby with your homepage. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br><strong>CyberWire Guest aka Intern Kevin</strong></p>
<p>Intern Kevin is back from the floor at RSAC 2026. By day, he’s Global Director of Cybersecurity Startups at Microsoft for Startups, but this week, <a href="https://www.linkedin.com/in/kmagee/"><u>Kevin Magee</u></a> is trolling the floor at RSAC to get the pulse of what is really happening in and around the Moscone Center. Kevin chats with <a href="https://www.linkedin.com/in/ann-johnsons/"><u>Ann Johnson</u></a>, Corporate Vice President and Executive Security Advisor at <a href="https://news.microsoft.com/source/"><u>Microsoft</u></a>, <a href="https://www.linkedin.com/in/dbshipley/"><u>David Shipley</u></a>, Chief Executive Officer and Field CISO at <a href="https://www.beauceronsecurity.com/"><u>Beauceron Security</u></a> , and <a href="https://www.linkedin.com/in/jessica-barker/"><u>Dr. Jessica Barker</u></a> and <a href="https://www.linkedin.com/in/freakyclown/"><u>FC</u></a>, Co-Founders and Co-CEOs at <a href="https://www.cygenta.co.uk/"><u>Cygenta</u></a>.</p>
<p><br><strong>Selected Reading</strong></p>
<p><a href="https://www.govinfosecurity.com/rsac-cryptographers-panel-highlights-ai-defense-challenges-a-31180"><u>RSAC Cryptographers' Panel Highlights AI Defense Challenges</u></a> (GovInfo Security)</p>
<p><a href="https://www.theregister.com/2026/03/25/whats_scarier_than_a_swarm/"><u>Only Trump can decide when cyberwar turns into real war</u></a> (The Register)</p>
<p><a href="https://www.theregister.com/2026/03/25/jen_easterly_interview/"><u>Jen Easterly, cybersecurity's 'relentless optimist'</u></a> (The Register)</p>
<p><a href="https://www.govinfosecurity.com/cisa-forced-into-reactive-cyber-posture-amid-shutdown-a-31189"><u>CISA Forced Into 'Reactive' Cyber Posture Amid Shutdown</u></a> (GovInfo Security)</p>
<p><a href="https://www.securityweek.com/chinese-hackers-caught-deep-within-telecom-backbone-infrastructure/"><u>Chinese Hackers Caught Deep Within Telecom Backbone Infrastructure</u></a> (SecurityWeek)</p>
<p><a href="https://www.infosecurity-magazine.com/news/iranlinked-pay2key-ransomware/"><u>Iran-Linked Pay2Key Ransomware Group Re-Emerges</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.theregister.com/2026/03/26/india_pakistan_cctv/"><u>Indian government probes CCTV espionage operation linked to Pakistan</u></a> (The Register)</p>
<p><a href="https://www.govinfosecurity.com/florida-suspends-firm-for-unlawfully-offshoring-claims-data-a-31177"><u>Florida Suspends Firm for Unlawfully Offshoring Claims Data</u></a> (GovInfo Security)</p>
<p><a href="https://www.securityweek.com/cisco-patches-multiple-vulnerabilities-in-ios-software/"><u>Cisco Patches Multiple Vulnerabilities in IOS Software</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/russia-arrests-suspected-owner-and-admin-of-leakbase-cybercrime-forum/"><u>Russia arrests suspected owner of LeakBase cybercrime forum</u></a> (Bleeping Computer)</p>
<p><a href="https://www.forbes.com/sites/joetoscano1/2026/03/06/google-just-patented-the-end-of-your-website"><u>Google Just Patented The End Of Your Website</u></a> (Forbes)</p>
<p><br><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  </p>
<p><br></p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1569</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bd7ee860-1671-11f1-ad8a-cb2b9c205f31]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1002277737.mp3?updated=1774543585" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Your private call isn’t so private.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2516/notes</link>
      <description>The UK’s cyber security chief urges a “full court press” against threats. RSAC highlights. The U.S. State Department has launched a Bureau of Emerging Threats. The TeamPCP cybercriminal group targets an open source library. TP-Link patches multiple router vulnerabilities. A critical vulnerability hits Windchill and FlexPLM platforms. A phishing campaign impersonates Palo Alto Networks recruiters. Malicious Chrome extensions are harvesting users’ conversations with AI tools. Intern Kevin files his latest report from the RSAC show floor. Your “private” zoom call may already have a podcast deal. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest aka Intern Kevin

Intern Kevin joins us from the floor at RSAC 2026. By day, he’s Global Director of Cybersecurity Startups at Microsoft for Startups, but this week, Kevin Magee is trolling the floor at RSAC to get the pulse of what is really going on in San Francisco. Kevin caught up with Dale Hoak, CISO at RegScale, David DellaPelle, CEO at Dune Security, and Jason Williams, Senior Director Global Solutions Architecture at Arms Cyber. 

Selected Reading

UK cyber chief urges ‘full court press’ to counter rising cyber threats (The Record)	

Operation Henhouse Nets Over 500 Arrests in UK Fraud Crackdown (Infosecurity Magazine)

State Department launches effort to counter cyberattacks, AI risks from Iran, others (ABC News)

LiteLLM PyPI packages compromised in expanding TeamPCP supply chain attacks (Help Net Security)

TP-Link warns users to patch critical router auth bypass flaw (Bleeping Computer)

PTC warns of imminent threat from critical Windchill, FlexPLM RCE bug (Bleeping Computer)

Palo Alto Networks Phishing Scam Targets Professionals (TechNadu)

Experts Sound Alarm Over “Prompt Poaching” Browser Extensions (Infosecurity Magazine)

This Company Is Secretly Turning Your Zoom Meetings into AI Podcasts (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 25 Mar 2026 20:30:00 -0000</pubDate>
      <itunes:title>Your private call isn’t so private.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2516</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The UK’s cyber security chief urges a “full court press” against threats. RSAC highlights. The U.S. State Department has launched a Bureau of Emerging Threats. The TeamPCP cybercriminal group targets an open source library. TP-Link patches multiple router vulnerabilities. A critical vulnerability hits Windchill and FlexPLM platforms. A phishing campaign impersonates Palo Alto Networks recruiters. Malicious Chrome extensions are harvesting users’ conversations with AI tools. Intern Kevin files his latest report from the RSAC show floor. Your “private” zoom call may already have a podcast deal. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest aka Intern Kevin

Intern Kevin joins us from the floor at RSAC 2026. By day, he’s Global Director of Cybersecurity Startups at Microsoft for Startups, but this week, Kevin Magee is trolling the floor at RSAC to get the pulse of what is really going on in San Francisco. Kevin caught up with Dale Hoak, CISO at RegScale, David DellaPelle, CEO at Dune Security, and Jason Williams, Senior Director Global Solutions Architecture at Arms Cyber. 

Selected Reading

UK cyber chief urges ‘full court press’ to counter rising cyber threats (The Record)	

Operation Henhouse Nets Over 500 Arrests in UK Fraud Crackdown (Infosecurity Magazine)

State Department launches effort to counter cyberattacks, AI risks from Iran, others (ABC News)

LiteLLM PyPI packages compromised in expanding TeamPCP supply chain attacks (Help Net Security)

TP-Link warns users to patch critical router auth bypass flaw (Bleeping Computer)

PTC warns of imminent threat from critical Windchill, FlexPLM RCE bug (Bleeping Computer)

Palo Alto Networks Phishing Scam Targets Professionals (TechNadu)

Experts Sound Alarm Over “Prompt Poaching” Browser Extensions (Infosecurity Magazine)

This Company Is Secretly Turning Your Zoom Meetings into AI Podcasts (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The UK’s cyber security chief urges a “full court press” against threats. RSAC highlights. The U.S. State Department has launched a Bureau of Emerging Threats. The TeamPCP cybercriminal group targets an open source library. TP-Link patches multiple router vulnerabilities. A critical vulnerability hits Windchill and FlexPLM platforms. A phishing campaign impersonates Palo Alto Networks recruiters. Malicious Chrome extensions are harvesting users’ conversations with AI tools. Intern Kevin files his latest report from the RSAC show floor. Your “private” zoom call may already have a podcast deal. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br><strong>CyberWire Guest aka Intern Kevin</strong></p>
<p>Intern Kevin joins us from the floor at RSAC 2026. By day, he’s Global Director of Cybersecurity Startups at Microsoft for Startups, but this week, <a href="https://www.linkedin.com/in/kmagee/"><u>Kevin Magee</u></a> is trolling the floor at RSAC to get the pulse of what is really going on in San Francisco. Kevin caught up with <a href="https://www.linkedin.com/in/dalehoakcyberpro/"><u>Dale Hoak</u></a>, CISO at <a href="https://regscale.com/"><u>RegScale</u></a>, <a href="https://www.linkedin.com/in/daviddellapelle/"><u>David DellaPelle</u></a>, CEO at <a href="https://www.dune.security/"><u>Dune Security</u></a>, and <a href="https://www.linkedin.com/in/jason-t-williams-cissp-csx-comptia-sec-6421834/"><u>Jason Williams</u></a>, Senior Director Global Solutions Architecture at <a href="https://www.armscyber.com/"><u>Arms Cyber</u></a>. </p>
<p><br><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/uk-cyber-chief-urges-full-court-press-to-counter-risks"><u>UK cyber chief urges ‘full court press’ to counter rising cyber threats</u></a> (The Record)	</p>
<p><a href="https://www.infosecurity-magazine.com/news/police-fraud-crackdown-leads-to/"><u>Operation Henhouse Nets Over 500 Arrests in UK Fraud Crackdown</u></a> (Infosecurity Magazine)</p>
<p><a href="https://abcnews.com/Politics/state-department-launches-effort-counter-cyberattacks-ai-risks/story?id=131265350"><u>State Department launches effort to counter cyberattacks, AI risks from Iran, others</u></a> (ABC News)</p>
<p><a href="https://www.helpnetsecurity.com/2026/03/25/teampcp-supply-chain-attacks/"><u>LiteLLM PyPI packages compromised in expanding TeamPCP supply chain attacks</u></a> (Help Net Security)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/tp-link-warns-users-to-patch-critical-router-auth-bypass-flaw/"><u>TP-Link warns users to patch critical router auth bypass flaw</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/ptc-warns-of-imminent-threat-from-critical-windchill-flexplm-rce-bug/"><u>PTC warns of imminent threat from critical Windchill, FlexPLM RCE bug</u></a> (Bleeping Computer)</p>
<p><a href="https://www.technadu.com/palo-alto-networks-phishing-scam-targets-professionals/624271/"><u>Palo Alto Networks Phishing Scam Targets Professionals</u></a> (TechNadu)</p>
<p><a href="https://www.infosecurity-magazine.com/news/experts-prompt-poaching-browser/"><u>Experts Sound Alarm Over “Prompt Poaching” Browser Extensions</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.404media.co/this-company-is-secretly-turning-your-zoom-calls-into-ai-podcasts/"><u>This Company Is Secretly Turning Your Zoom Meetings into AI Podcasts</u></a> (404 Media)</p>
<p><br><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  </p>
<p><br><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1465</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bd540294-1671-11f1-ad8a-afd6af98a560]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8950982578.mp3?updated=1774464762" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Reports from RSAC and beyond. </title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2515/notes</link>
      <description>RSAC spotlights public-private partnership gaps. DarkSword leaks to GitHub. The FCC blocks new foreign-made routers. Citrix patches a critical NetScaler flaw. DOE rolls out an energy-sector cyber strategy. CanisterWorm spreads through npm. Researchers flag suspected KACE SMA exploitation. QualDerm reports a 3.1-million-record breach. A Russian access broker gets 81 months. Intern Kevin checks in from RSAC. Maria Varmazis speaks with Jake Braun, longtime DEF CON organizer and former White House official about the DEF CON 33 Hackers' Almanack. Slow down, you vibe too fast. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

Maria Varmazis speaks with today’s guest Jake Braun, longtime DEF CON organizer, former White House official, and lead on DEF CON Franklin, about the DEF CON 33 Hackers' Almanack. You can read more about it here. 



Selected Reading

Public-private partnerships vital in disrupting China's Typhoons, says RSA panel with no government speakers (The Register)

Someone has publicly leaked an exploit kit that can hack millions of iPhones (TechCrunch)

US bans any new consumer-grade routers not made in America (The Register)

Critical Citrix NetScaler Vulnerability Poised for Exploitation, Security Firms Warn (SecurityWeek)

DOE Sets 5-Year Plan to Harden US Grid Against Cyberattacks (GovInfo Security)

New CanisterWorm Targets Kubernetes Clusters, Deploys “Kamikaze” Wiper (Hackread)

CVE-2025-32975 (Arctic Wolf)

3.1 Million Impacted by QualDerm Data Breach (SecurityWeek)

Russian hacker who helped Yanluowang ransomware gang gets nearly 7-year prison sentence (The Record)

This Web Tool Sabotages AI Chatbots By Making Them Really, Really Slow (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Mar 2026 20:30:00 -0000</pubDate>
      <itunes:title>Reports from RSAC and beyond. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2515</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>RSAC spotlights public-private partnership gaps. DarkSword leaks to GitHub. The FCC blocks new foreign-made routers. Citrix patches a critical NetScaler flaw. DOE rolls out an energy-sector cyber strategy. CanisterWorm spreads through npm. Researchers flag suspected KACE SMA exploitation. QualDerm reports a 3.1-million-record breach. A Russian access broker gets 81 months. Intern Kevin checks in from RSAC. Maria Varmazis speaks with Jake Braun, longtime DEF CON organizer and former White House official about the DEF CON 33 Hackers' Almanack. Slow down, you vibe too fast. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

Maria Varmazis speaks with today’s guest Jake Braun, longtime DEF CON organizer, former White House official, and lead on DEF CON Franklin, about the DEF CON 33 Hackers' Almanack. You can read more about it here. 



Selected Reading

Public-private partnerships vital in disrupting China's Typhoons, says RSA panel with no government speakers (The Register)

Someone has publicly leaked an exploit kit that can hack millions of iPhones (TechCrunch)

US bans any new consumer-grade routers not made in America (The Register)

Critical Citrix NetScaler Vulnerability Poised for Exploitation, Security Firms Warn (SecurityWeek)

DOE Sets 5-Year Plan to Harden US Grid Against Cyberattacks (GovInfo Security)

New CanisterWorm Targets Kubernetes Clusters, Deploys “Kamikaze” Wiper (Hackread)

CVE-2025-32975 (Arctic Wolf)

3.1 Million Impacted by QualDerm Data Breach (SecurityWeek)

Russian hacker who helped Yanluowang ransomware gang gets nearly 7-year prison sentence (The Record)

This Web Tool Sabotages AI Chatbots By Making Them Really, Really Slow (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>RSAC spotlights public-private partnership gaps. DarkSword leaks to GitHub. The FCC blocks new foreign-made routers. Citrix patches a critical NetScaler flaw. DOE rolls out an energy-sector cyber strategy. CanisterWorm spreads through npm. Researchers flag suspected KACE SMA exploitation. QualDerm reports a 3.1-million-record breach. A Russian access broker gets 81 months. Intern Kevin checks in from RSAC. Maria Varmazis speaks with Jake Braun, longtime DEF CON organizer and former White House official about the DEF CON 33 Hackers' Almanack. Slow down, you vibe too fast. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br></p>
<p><strong>CyberWire Guest</strong></p>
<p>Maria Varmazis speaks with today’s guest <a href="https://www.linkedin.com/in/jake-braun-77372539/"><u>Jake Braun</u></a>, longtime DEF CON organizer, former White House official, and lead on <a href="https://defconfranklin.com/"><u>DEF CON Franklin</u></a>, about the <a href="https://defconfranklin.com/almanack2026.htmlhttps://harris.uchicago.edu/sites/default/files/the_def_con_33_hackers_almanack.pdf"><u>DEF CON 33 Hackers' Almanack</u></a>. You can read more about it <a href="https://defconfranklin.com/almanack2026.html"><u>here</u></a>. </p>
<p><br></p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.theregister.com/2026/03/23/rsa_panel_china_threat_collaboration_call/"><u>Public-private partnerships vital in disrupting China's Typhoons, says RSA panel with no government speakers</u></a> (The Register)</p>
<p><a href="https://techcrunch.com/2026/03/23/someone-has-publicly-leaked-an-exploit-kit-that-can-hack-millions-of-iphones/"><u>Someone has publicly leaked an exploit kit that can hack millions of iPhones</u></a> (TechCrunch)</p>
<p><a href="https://www.theregister.com/2026/03/24/fcc_foreign_routers/"><u>US bans any new consumer-grade routers not made in America</u></a> (The Register)</p>
<p><a href="https://www.securityweek.com/critical-citrix-netscaler-vulnerability-poised-for-exploitation-security-firms-warn/"><u>Critical Citrix NetScaler Vulnerability Poised for Exploitation, Security Firms Warn</u></a> (SecurityWeek)</p>
<p><a href="https://www.govinfosecurity.com/doe-sets-5-year-plan-to-harden-us-grid-against-cyberattacks-a-31124"><u>DOE Sets 5-Year Plan to Harden US Grid Against Cyberattacks</u></a> (GovInfo Security)</p>
<p><a href="https://hackread.com/canisterworm-kubernetes-clusters-kamikaze-wiper/"><u>New CanisterWorm Targets Kubernetes Clusters, Deploys “Kamikaze” Wiper</u></a> (Hackread)</p>
<p><a href="https://arcticwolf.com/resources/blog/cve-2025-32975/"><u>CVE-2025-32975</u></a> (Arctic Wolf)</p>
<p><a href="https://www.securityweek.com/3-1-million-impacted-by-qualderm-data-breach/"><u>3.1 Million Impacted by QualDerm Data Breach</u></a> (SecurityWeek)</p>
<p><a href="https://therecord.media/hacker-russian-ransomware-sentenced-doj"><u>Russian hacker who helped Yanluowang ransomware gang gets nearly 7-year prison sentence</u></a> (The Record)</p>
<p><a href="https://www.404media.co/this-web-tool-sabotages-ai-chatbots-by-making-them-really-really-slow/"><u>This Web Tool Sabotages AI Chatbots By Making Them Really, Really Slow</u></a> (404 Media)</p>
<p><br><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><br></p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1991</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bd294a72-1671-11f1-ad8a-eb0583020dcf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5092050959.mp3?updated=1774377299" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>But what do you really want? [CISOP]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/130/notes</link>
      <description>Despite being adopted and prioritized by many organizations, cybersecurity still faces a significant challenge where leaders still cannot articulate their needs, and find and develop talent. Rather, organizations oftentimes follow the same strategy many others are utilizing, which involves poaching talent with enticing salaries.

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Ed Vasko, the CEO at High Wire Networks, to discuss this approach and the impacts it is having on the cyber talent ecosystem. Throughout the conversation, Ed and Kim discuss their experience when assessing talent and some of the mistakes made by the industry, and what can be done to begin correcting this approach.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Mar 2026 06:00:00 -0000</pubDate>
      <itunes:title>But what do you really want? [CISOP]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>130</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/3155cdac-23c5-11f1-83c7-a7d28b5da672/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Despite being adopted and prioritized by many organizations, cybersecurity still faces a significant challenge where leaders still cannot articulate their needs, and find and develop talent. Rather, organizations oftentimes follow the same strategy many others are utilizing, which involves poaching talent with enticing salaries.

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Ed Vasko, the CEO at High Wire Networks, to discuss this approach and the impacts it is having on the cyber talent ecosystem. Throughout the conversation, Ed and Kim discuss their experience when assessing talent and some of the mistakes made by the industry, and what can be done to begin correcting this approach.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Despite being adopted and prioritized by many organizations, cybersecurity still faces a significant challenge where leaders still cannot articulate their needs, and find and develop talent. Rather, organizations oftentimes follow the same strategy many others are utilizing, which involves poaching talent with enticing salaries.</p>
<p>In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with <a href="https://www.linkedin.com/in/ed-vasko-cissp-c-ciso-a146283/">Ed Vasko</a>, the CEO at <a href="https://www.linkedin.com/company/high-wire-networks-overwatch/">High Wire Networks</a>, to discuss this approach and the impacts it is having on the cyber talent ecosystem. Throughout the conversation, Ed and Kim discuss their experience when assessing talent and some of the mistakes made by the industry, and what can be done to begin correcting this approach.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion <a href="https://thecyberwire.com/stories/ca102f66c9de44ed8edc2f1648c0dbe8/but-what-do-you-really-want">⁠⁠blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2527</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3155cdac-23c5-11f1-83c7-a7d28b5da672]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6031970284.mp3?updated=1773773464" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Policy drops and phishing pops.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2514/notes</link>
      <description>The White House rolls out its AI legislative framework. The FBI warns Iranian actors are using Telegram for command and control, while Russian operators phish Signal users. Authorities dismantle a massive fake CSAM network, Tycoon 2FA rebounds after disruption, VoidStealer debuts a stealthy Chrome key-theft trick, QNAP patches Pwn2Own flaws, and CISA orders urgent fixes for a critical Cisco firewall bug. Plus, our Monday business breakdown. Brandon Karpf and Maria Varmazis ponder the practicality of orbital data centers. One radio to rule the range. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today, N2K CyberWire’s Dave BIttner and Maria Varmazis are joined by Brandon Karpf to discuss the practicality of orbital data centers.



Selected Reading

President Donald J. Trump Unveils National AI Legislative Framework (The White House)

FBI warns of Handala hackers using Telegram in malware attacks (Bleeping Computer)

Russian hackers target Signal users in phishing campaign, FBI and CISA warn (Cybernews)

Police Shut Down 373,000 Dark Web Sites in Single-Operator CSAM Network (Hackread)

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown (SecurityWeek)

VoidStealer Steals Chrome Secrets Without Injection or Privilege Escalation (GB Hackers)

QNAP Patches Four Vulnerabilities Exploited at Pwn2Own (SecurityWeek)

CISA Orders US Government to Patch Maximum Severity Cisco Flaw (Infosecurity Magazine)

Surf AI has emerged from stealth with $57 million in funding led by Accel. (N2K Pro Business Briefing)

Military ‘Smartphone’: Comms, Jammer, Drone Control And More In One (Forbes)



Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 23 Mar 2026 20:30:00 -0000</pubDate>
      <itunes:title>Policy drops and phishing pops.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2514</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The White House rolls out its AI legislative framework. The FBI warns Iranian actors are using Telegram for command and control, while Russian operators phish Signal users. Authorities dismantle a massive fake CSAM network, Tycoon 2FA rebounds after disruption, VoidStealer debuts a stealthy Chrome key-theft trick, QNAP patches Pwn2Own flaws, and CISA orders urgent fixes for a critical Cisco firewall bug. Plus, our Monday business breakdown. Brandon Karpf and Maria Varmazis ponder the practicality of orbital data centers. One radio to rule the range. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today, N2K CyberWire’s Dave BIttner and Maria Varmazis are joined by Brandon Karpf to discuss the practicality of orbital data centers.



Selected Reading

President Donald J. Trump Unveils National AI Legislative Framework (The White House)

FBI warns of Handala hackers using Telegram in malware attacks (Bleeping Computer)

Russian hackers target Signal users in phishing campaign, FBI and CISA warn (Cybernews)

Police Shut Down 373,000 Dark Web Sites in Single-Operator CSAM Network (Hackread)

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown (SecurityWeek)

VoidStealer Steals Chrome Secrets Without Injection or Privilege Escalation (GB Hackers)

QNAP Patches Four Vulnerabilities Exploited at Pwn2Own (SecurityWeek)

CISA Orders US Government to Patch Maximum Severity Cisco Flaw (Infosecurity Magazine)

Surf AI has emerged from stealth with $57 million in funding led by Accel. (N2K Pro Business Briefing)

Military ‘Smartphone’: Comms, Jammer, Drone Control And More In One (Forbes)



Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The White House rolls out its AI legislative framework. The FBI warns Iranian actors are using Telegram for command and control, while Russian operators phish Signal users. Authorities dismantle a massive fake CSAM network, Tycoon 2FA rebounds after disruption, VoidStealer debuts a stealthy Chrome key-theft trick, QNAP patches Pwn2Own flaws, and CISA orders urgent fixes for a critical Cisco firewall bug. Plus, our Monday business breakdown. Brandon Karpf and Maria Varmazis ponder the practicality of orbital data centers. One radio to rule the range. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br><strong>CyberWire Guest</strong></p>
<p>Today, N2K CyberWire’s <a href="https://www.linkedin.com/in/dave-bittner-27231a4/"><u>Dave BIttner</u></a> and <a href="https://www.linkedin.com/in/varmazis/"><u>Maria Varmazis</u></a> are joined by <a href="https://www.linkedin.com/in/brandon-karpf/"><u>Brandon Karpf</u></a> to discuss the practicality of orbital data centers.</p>
<p><br></p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.whitehouse.gov/articles/2026/03/president-donald-j-trump-unveils-national-ai-legislative-framework/"><u>President Donald J. Trump Unveils National AI Legislative Framework</u></a> (The White House)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/fbi-warns-of-handala-hackers-using-telegram-in-malware-attacks/"><u>FBI warns of Handala hackers using Telegram in malware attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://cybernews.com/security/russian-hackers-target-signal-users-phishing-campaign-fbi/"><u>Russian hackers target Signal users in phishing campaign, FBI and CISA warn</u></a> (Cybernews)</p>
<p><a href="https://hackread.com/police-shut-down-dark-web-sites-csam-network/"><u>Police Shut Down 373,000 Dark Web Sites in Single-Operator CSAM Network</u></a> (Hackread)</p>
<p><a href="https://www.securityweek.com/tycoon-2fa-fully-operational-despite-law-enforcement-takedown/"><u>Tycoon 2FA Fully Operational Despite Law Enforcement Takedown</u></a> (SecurityWeek)</p>
<p><a href="https://gbhackers.com/voidstealer-steals-chrome/"><u>VoidStealer Steals Chrome Secrets Without Injection or Privilege Escalation</u></a> (GB Hackers)</p>
<p><a href="https://www.securityweek.com/qnap-patches-four-vulnerabilities-exploited-at-pwn2own/"><u>QNAP Patches Four Vulnerabilities Exploited at Pwn2Own</u></a> (SecurityWeek)</p>
<p><a href="https://www.infosecurity-magazine.com/news/cisa-orders-us-government-patch/"><u>CISA Orders US Government to Patch Maximum Severity Cisco Flaw</u></a> (Infosecurity Magazine)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/8/11"><u>Surf AI has emerged from stealth with $57 million in funding led by Accel.</u></a> (N2K Pro Business Briefing)</p>
<p><a href="https://www.forbes.com/sites/davidhambling/2026/03/17/military-smartphone-comms-jammer-drone-control-and-more-in-one/"><u>Military ‘Smartphone’: Comms, Jammer, Drone Control And More In One</u></a> (Forbes)</p>
<p><br></p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  </p>
<p><br></p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1939</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bcfe84c2-1671-11f1-ad8a-e7ad3275f517]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3707608780.mp3?updated=1774290591" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Roya Gordon: Becoming a trailblazer. [Research] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/113/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Roya Gordon, a Security Research Evangelist at ICS cybersecurity firm Nozomi Networks, started her career as an intelligence specialist in the U.S. Navy. After her time serving, Roya spent time as a Control Systems Cybersecurity Analyst at the Idaho National Laboratory and then took the role of Cyber Threat Intelligence Manager at Accenture. She shares her story after the NSA accepted her and then quickly diverted, creating a new path for Roya to follow. She shares the jobs she went after along the way, leading up to Nozomi Networks and how she wishes to be a trailblazer for young black women everywhere. She hopes to shape young women's minds on what the cybersecurity industry is actually like, in hopes that she can be a figure people look up to. We thank Roya for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 22 Mar 2026 07:00:00 -0000</pubDate>
      <itunes:title>Roya Gordon: Becoming a trailblazer. [Research] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>113</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/053e5fb8-24a1-11f1-85b4-ebf5276f82c1/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Roya Gordon, a Security Research Evangelist at ICS cybersecurity firm Nozomi Networks, started her career as an intelligence specialist in the U.S. Navy. After her time serving, Roya spent time as a Control Systems Cybersecurity Analyst at the Idaho National Laboratory and then took the role of Cyber Threat Intelligence Manager at Accenture. She shares her story after the NSA accepted her and then quickly diverted, creating a new path for Roya to follow. She shares the jobs she went after along the way, leading up to Nozomi Networks and how she wishes to be a trailblazer for young black women everywhere. She hopes to shape young women's minds on what the cybersecurity industry is actually like, in hopes that she can be a figure people look up to. We thank Roya for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Roya Gordon, a Security Research Evangelist at ICS cybersecurity firm Nozomi Networks, started her career as an intelligence specialist in the U.S. Navy. After her time serving, Roya spent time as a Control Systems Cybersecurity Analyst at the Idaho National Laboratory and then took the role of Cyber Threat Intelligence Manager at Accenture. She shares her story after the NSA accepted her and then quickly diverted, creating a new path for Roya to follow. She shares the jobs she went after along the way, leading up to Nozomi Networks and how she wishes to be a trailblazer for young black women everywhere. She hopes to shape young women's minds on what the cybersecurity industry is actually like, in hopes that she can be a figure people look up to. We thank Roya for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>693</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[053e5fb8-24a1-11f1-85b4-ebf5276f82c1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9386828882.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CyberWire Daily at 10: From an idea to the airwaves. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/94/notes</link>
      <description>In this special edition of CyberWire Daily’s 10th anniversary series, Maria Varmazis hosts a thoughtful and engaging conversation with N2K CyberWire CEO Peter Kilpe and CyberWire Daily host Dave Bittner, exploring the origin story of the podcast that started it all. From early ambitions to behind-the-scenes turning points, they trace how the show found its voice and evolved from a startup experiment into a trusted cornerstone of the cybersecurity community. Along the way, they share candid anecdotes, hard-earned lessons, and reflections on how both the industry and CyberWire Daily have transformed over the past decade.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 22 Mar 2026 07:00:00 -0000</pubDate>
      <itunes:title>CyberWire Daily at 10: From an idea to the airwaves. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>94</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/883ef906-249a-11f1-94c2-63996e8a67f9/image/0216c9cea15c53e5d2c739964a38623c.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this special edition of CyberWire Daily’s 10th anniversary series, Maria Varmazis hosts a thoughtful and engaging conversation with N2K CyberWire CEO Peter Kilpe and CyberWire Daily host Dave Bittner, exploring the origin story of the podcast that started it all. From early ambitions to behind-the-scenes turning points, they trace how the show found its voice and evolved from a startup experiment into a trusted cornerstone of the cybersecurity community. Along the way, they share candid anecdotes, hard-earned lessons, and reflections on how both the industry and CyberWire Daily have transformed over the past decade.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this special edition of CyberWire Daily’s 10th anniversary series, Maria Varmazis hosts a thoughtful and engaging conversation with N2K CyberWire CEO Peter Kilpe and CyberWire Daily host Dave Bittner, exploring the origin story of the podcast that started it all. From early ambitions to behind-the-scenes turning points, they trace how the show found its voice and evolved from a startup experiment into a trusted cornerstone of the cybersecurity community. Along the way, they share candid anecdotes, hard-earned lessons, and reflections on how both the industry and CyberWire Daily have transformed over the past decade.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2348</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[883ef906-249a-11f1-94c2-63996e8a67f9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1108080918.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A subtle flaw, a massive blast radius. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/417/notes</link>
      <description>Yuval Avrahami from Wiz joins to share their work on "CodeBreach: Infiltrating the AWS Console Supply Chain and Hijacking AWS GitHub Repositories via CodeBuild."  Wiz Research uncovered “CodeBreach,” a critical supply chain vulnerability caused by a subtle misconfiguration in AWS CodeBuild pipelines that allowed attackers to take over key GitHub repositories, including the widely used AWS JavaScript SDK that powers the AWS Console. 

By exploiting an unanchored regex filter, unauthenticated attackers could trigger privileged builds, steal credentials, and potentially inject malicious code into software used across a majority of cloud environments. AWS has since remediated the issue and introduced stronger safeguards, but the incident highlights a growing trend of attackers targeting CI/CD pipelines where small misconfigurations can lead to massive downstream impact.

The research can be found here:


  CodeBreach: Infiltrating the AWS Console Supply Chain and Hijacking AWS GitHub Repositories via CodeBuild


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Mar 2026 07:00:00 -0000</pubDate>
      <itunes:title>A subtle flaw, a massive blast radius. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>417</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/2636855c-247d-11f1-ba3d-db1cae688799/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Yuval Avrahami from Wiz joins to share their work on "CodeBreach: Infiltrating the AWS Console Supply Chain and Hijacking AWS GitHub Repositories via CodeBuild."  Wiz Research uncovered “CodeBreach,” a critical supply chain vulnerability caused by a subtle misconfiguration in AWS CodeBuild pipelines that allowed attackers to take over key GitHub repositories, including the widely used AWS JavaScript SDK that powers the AWS Console. 

By exploiting an unanchored regex filter, unauthenticated attackers could trigger privileged builds, steal credentials, and potentially inject malicious code into software used across a majority of cloud environments. AWS has since remediated the issue and introduced stronger safeguards, but the incident highlights a growing trend of attackers targeting CI/CD pipelines where small misconfigurations can lead to massive downstream impact.

The research can be found here:


  CodeBreach: Infiltrating the AWS Console Supply Chain and Hijacking AWS GitHub Repositories via CodeBuild


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/yuval-avrahami-25139416b/">Yuval Avrahami</a> from <a href="https://www.linkedin.com/company/wizsecurity/">Wiz</a> joins to share their work on "CodeBreach: Infiltrating the AWS Console Supply Chain and Hijacking AWS GitHub Repositories via CodeBuild."  Wiz Research uncovered “CodeBreach,” a critical supply chain vulnerability caused by a subtle misconfiguration in AWS CodeBuild pipelines that allowed attackers to take over key GitHub repositories, including the widely used AWS JavaScript SDK that powers the AWS Console. </p>
<p>By exploiting an unanchored regex filter, unauthenticated attackers could trigger privileged builds, steal credentials, and potentially inject malicious code into software used across a majority of cloud environments. AWS has since remediated the issue and introduced stronger safeguards, but the incident highlights a growing trend of attackers targeting CI/CD pipelines where small misconfigurations can lead to massive downstream impact.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.wiz.io/blog/wiz-research-codebreach-vulnerability-aws-codebuild">CodeBreach: Infiltrating the AWS Console Supply Chain and Hijacking AWS GitHub Repositories via CodeBuild</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1038</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2636855c-247d-11f1-ba3d-db1cae688799]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7331739781.mp3?updated=1774025676" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Millions of devices still up for grabs.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2513/notes</link>
      <description>Feds take down major IoT botnets. The FBI seizes hacktivist infrastructure. A data breach hits Kaplan, while a hacker claims access to millions of law enforcement tips. Fake Zoom calls deliver malware. A crypto “security” tool turns out to be spyware. A critical AI framework flaw gets exploited in hours. An insider extortion case ends in conviction. And a streaming scam pulls in over $10 million. A look back at ten years of Cyberwire podcasts. Intern Kevin gets ready for RSAC. A cyberattack leaves breathalyzers offline. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Celebrating CyberWire Daily

Maria Varmazis leads a conversation with Peter Kilpe and Dave Bittner reflecting on the origins of the CyberWire Daily podcast as part of the 10th anniversary series, sharing behind-the-scenes insights and how it all got started.

CyberWire Guest

Today we are joined by Intern Kevin—also known as Kevin Magee—as he gets ready for RSA Conference 2026 next week.

Selected Reading

Feds disrupt IoT botnets behind record-breaking DDoS attacks (The Register)

FBI seizes Handala data leak site after Stryker cyberattack (Bleeping Computer)

Kaplan North America Reports Data Breach Impacting Nearly 195,000 Individuals (Beyond Machines)

Hacker says they compromised millions of confidential police tips held by US company (Reuters)

Fake interactive Zoom call leads to malicious ScreenConnect download | news (SC Media)

Crypto Scam "ShieldGuard" Dismantled After Malware Discovery (Infosecurity Magazine)

Hackers Exploit Critical Langflow Bug in Just 20 Hours (Infosecurity Magazine)

Ex-data analyst stole company data in $2.5M extortion scheme (Bleeping Computer)

Musician admits to $10M streaming royalty fraud using AI bots (Bleeping Computer)

Cyberattack leaves Maine drivers with breathalyzer test systems unable to start vehicles (WGME)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 20 Mar 2026 20:30:00 -0000</pubDate>
      <itunes:title>Millions of devices still up for grabs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2513</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Feds take down major IoT botnets. The FBI seizes hacktivist infrastructure. A data breach hits Kaplan, while a hacker claims access to millions of law enforcement tips. Fake Zoom calls deliver malware. A crypto “security” tool turns out to be spyware. A critical AI framework flaw gets exploited in hours. An insider extortion case ends in conviction. And a streaming scam pulls in over $10 million. A look back at ten years of Cyberwire podcasts. Intern Kevin gets ready for RSAC. A cyberattack leaves breathalyzers offline. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Celebrating CyberWire Daily

Maria Varmazis leads a conversation with Peter Kilpe and Dave Bittner reflecting on the origins of the CyberWire Daily podcast as part of the 10th anniversary series, sharing behind-the-scenes insights and how it all got started.

CyberWire Guest

Today we are joined by Intern Kevin—also known as Kevin Magee—as he gets ready for RSA Conference 2026 next week.

Selected Reading

Feds disrupt IoT botnets behind record-breaking DDoS attacks (The Register)

FBI seizes Handala data leak site after Stryker cyberattack (Bleeping Computer)

Kaplan North America Reports Data Breach Impacting Nearly 195,000 Individuals (Beyond Machines)

Hacker says they compromised millions of confidential police tips held by US company (Reuters)

Fake interactive Zoom call leads to malicious ScreenConnect download | news (SC Media)

Crypto Scam "ShieldGuard" Dismantled After Malware Discovery (Infosecurity Magazine)

Hackers Exploit Critical Langflow Bug in Just 20 Hours (Infosecurity Magazine)

Ex-data analyst stole company data in $2.5M extortion scheme (Bleeping Computer)

Musician admits to $10M streaming royalty fraud using AI bots (Bleeping Computer)

Cyberattack leaves Maine drivers with breathalyzer test systems unable to start vehicles (WGME)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Feds take down major IoT botnets. The FBI seizes hacktivist infrastructure. A data breach hits Kaplan, while a hacker claims access to millions of law enforcement tips. Fake Zoom calls deliver malware. A crypto “security” tool turns out to be spyware. A critical AI framework flaw gets exploited in hours. An insider extortion case ends in conviction. And a streaming scam pulls in over $10 million. A look back at ten years of Cyberwire podcasts. Intern Kevin gets ready for RSAC. A cyberattack leaves breathalyzers offline. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Celebrating CyberWire Daily</strong></p>
<p><a href="https://www.linkedin.com/in/varmazis/"><u>Maria Varmazis</u></a> leads a conversation with <a href="https://www.linkedin.com/in/peterkilpe/"><u>Peter Kilpe</u></a> and <a href="https://www.linkedin.com/in/dave-bittner-27231a4/"><u>Dave Bittner</u></a> reflecting on the origins of the CyberWire Daily podcast as part of the 10th anniversary series, sharing behind-the-scenes insights and how it all got started.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by Intern Kevin—also known as <a href="https://www.linkedin.com/in/kmagee/"><u>Kevin Magee</u></a>—as he gets ready for <a href="https://www.rsaconference.com/"><u>RSA Conference</u></a> 2026 next week.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.theregister.com/2026/03/20/botnet_disruption/"><u>Feds disrupt IoT botnets behind record-breaking DDoS attacks</u></a> (The Register)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/fbi-seizes-handala-data-leak-site-after-stryker-cyberattack/"><u>FBI seizes Handala data leak site after Stryker cyberattack</u></a> (Bleeping Computer)</p>
<p><a href="https://beyondmachines.net/event_details/kaplan-north-america-reports-data-breach-impacting-nearly-195000-individuals-r-0-6-c-e/gD2P6Ple2L"><u>Kaplan North America Reports Data Breach Impacting Nearly 195,000 Individuals</u></a> (Beyond Machines)</p>
<p><a href="https://www.reuters.com/legal/government/hacker-says-they-compromised-millions-confidential-police-tips-held-by-us-2026-03-18/"><u>Hacker says they compromised millions of confidential police tips held by US company</u></a> (Reuters)</p>
<p><a href="https://www.scworld.com/news/fake-interactive-zoom-call-leads-to-malicious-screenconnect-download"><u>Fake interactive Zoom call leads to malicious ScreenConnect download | news</u></a> (SC Media)</p>
<p><a href="https://www.infosecurity-magazine.com/news/crypto-scam-shieldguard-dismantled/"><u>Crypto Scam "ShieldGuard" Dismantled After Malware Discovery</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.infosecurity-magazine.com/news/hackers-exploit-critical-langflow/"><u>Hackers Exploit Critical Langflow Bug in Just 20 Hours</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/data-analyst-found-guilty-of-extorting-brightly-software-of-25-million/"><u>Ex-data analyst stole company data in $2.5M extortion scheme</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/musician-pleads-guilty-to-10m-streaming-fraud-powered-by-ai-bots/"><u>Musician admits to $10M streaming royalty fraud using AI bots</u></a> (Bleeping Computer)</p>
<p><a href="https://wgme.com/news/local/cyberattack-leaves-maine-drivers-with-breathalyzer-test-systems-unable-to-start-vehicles-oui-intoxalock"><u>Cyberattack leaves Maine drivers with breathalyzer test systems unable to start vehicles</u></a> (WGME)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2054</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bcd00930-1671-11f1-ad8a-37bba73956c4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2268005261.mp3?updated=1774028036" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Strategic approaches to talent: A practical guide. [CISOP]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/129/notes</link>
      <description>Even as cybersecurity has grown and become universially accepted, the field has continued to struggle when attempting to assess and aquire talent. Oftentimes, there is a disconnect between what organizations need and what they interview for leading vague job postings and ineffective hirings.

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Jeff Welgan, the Chief Strategist and CEO at SkillRex, to discuss how we assess talent. Throughout the conversation, Jeff and Kim will discuss the problems associated with traditional workforce management and how modernizing this approach can provide a strategic advantage.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 20 Mar 2026 06:00:00 -0000</pubDate>
      <itunes:title>Strategic approaches to talent: A practical guide. [CISOP]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>129</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/be96dc70-23a6-11f1-a0c1-efbb0655be8e/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Even as cybersecurity has grown and become universially accepted, the field has continued to struggle when attempting to assess and aquire talent. Oftentimes, there is a disconnect between what organizations need and what they interview for leading vague job postings and ineffective hirings.

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Jeff Welgan, the Chief Strategist and CEO at SkillRex, to discuss how we assess talent. Throughout the conversation, Jeff and Kim will discuss the problems associated with traditional workforce management and how modernizing this approach can provide a strategic advantage.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Even as cybersecurity has grown and become universially accepted, the field has continued to struggle when attempting to assess and aquire talent. Oftentimes, there is a disconnect between what organizations need and what they interview for leading vague job postings and ineffective hirings.</p>
<p>In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Jeff Welgan, the Chief Strategist and CEO at SkillRex, to discuss how we assess talent. Throughout the conversation, Jeff and Kim will discuss the problems associated with traditional workforce management and how modernizing this approach can provide a strategic advantage.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion <a href="https://thecyberwire.com/stories/6c3de33503314da3acbea773eaebb112/how-do-we-address-talent-strategically">⁠⁠blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2542</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[be96dc70-23a6-11f1-a0c1-efbb0655be8e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3107300325.mp3?updated=1773771039" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>iPhone exploits go mainstream.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2512/notes</link>
      <description>DarkSword targets iPhones for indiscriminate exploitation. Cybercrime and the Iran war. The FBI confirms purchasing commercially available location data. The DHS secretary nominee gets grilled on CISA funding. A Zimbra Collaboration Suite vulnerability is being used in targeted espionage. A new Android malware targets sensitive data stored in user notes. AWS warns of ongoing Interlock ransomware activity. Tracking pixels grab more than they should. Perry Carpenter and Mason Amadeus from The FAIK Files podcast speak with Hany Farid about the real-world harms of synthetic media. Do Boomers balance breaches better? 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Perry Carpenter and Mason Amadeus, hosts of The FAIK Files podcast, speaking with Hany Farid about the real-world harms of synthetic media.

Last week, the FAIK Files team sat down with Hany Farid -- digital forensics expert, professor at UC Berkeley, and co-founder of Get Real Security ( getrealsecurity.com ) -- to discuss deepfakes, authenticity metadata (C2PA), and forensic deepfake detection approaches.

And here's a link to the youtube video:  https://www.youtube.com/watch?v=RSpmRb2O7Xc

Selected Reading

Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild (WIRED)

Cybercrime has skyrocketed 245% since the start of the Iran war (The Register)

CISA official says agency has not seen uptick in cyber threats amid Iran war (The Record)

FBI is buying data that can be used to track people, Patel says (POLITICO)

DHS nominee Mullin pressed on restoring CISA staffing (The Record)

CISA Adds Exploited Zimbra Collaboration Suite Flaw to Warning List (GB Hackers)

Russian hackers exploit Zimbra flaw to breach Ukrainian maritime agency (The Record)

New ‘Perseus’ Android malware checks user notes for secrets (Bleeping Computer)

AWS Warns Hackers Have Abused Cisco Firewall Zero-Day Since January (Infosecurity Magazine)

The Collection of Commercial Intelligence: TikTok &amp; Meta Ad Pixels (Jscrambler)

Forget Millennials: why those over 65 are the real cyber security pros (The Senior)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 19 Mar 2026 20:30:00 -0000</pubDate>
      <itunes:title>iPhone exploits go mainstream.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2512</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>DarkSword targets iPhones for indiscriminate exploitation. Cybercrime and the Iran war. The FBI confirms purchasing commercially available location data. The DHS secretary nominee gets grilled on CISA funding. A Zimbra Collaboration Suite vulnerability is being used in targeted espionage. A new Android malware targets sensitive data stored in user notes. AWS warns of ongoing Interlock ransomware activity. Tracking pixels grab more than they should. Perry Carpenter and Mason Amadeus from The FAIK Files podcast speak with Hany Farid about the real-world harms of synthetic media. Do Boomers balance breaches better? 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Perry Carpenter and Mason Amadeus, hosts of The FAIK Files podcast, speaking with Hany Farid about the real-world harms of synthetic media.

Last week, the FAIK Files team sat down with Hany Farid -- digital forensics expert, professor at UC Berkeley, and co-founder of Get Real Security ( getrealsecurity.com ) -- to discuss deepfakes, authenticity metadata (C2PA), and forensic deepfake detection approaches.

And here's a link to the youtube video:  https://www.youtube.com/watch?v=RSpmRb2O7Xc

Selected Reading

Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild (WIRED)

Cybercrime has skyrocketed 245% since the start of the Iran war (The Register)

CISA official says agency has not seen uptick in cyber threats amid Iran war (The Record)

FBI is buying data that can be used to track people, Patel says (POLITICO)

DHS nominee Mullin pressed on restoring CISA staffing (The Record)

CISA Adds Exploited Zimbra Collaboration Suite Flaw to Warning List (GB Hackers)

Russian hackers exploit Zimbra flaw to breach Ukrainian maritime agency (The Record)

New ‘Perseus’ Android malware checks user notes for secrets (Bleeping Computer)

AWS Warns Hackers Have Abused Cisco Firewall Zero-Day Since January (Infosecurity Magazine)

The Collection of Commercial Intelligence: TikTok &amp; Meta Ad Pixels (Jscrambler)

Forget Millennials: why those over 65 are the real cyber security pros (The Senior)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>DarkSword targets iPhones for indiscriminate exploitation. Cybercrime and the Iran war. The FBI confirms purchasing commercially available location data. The DHS secretary nominee gets grilled on CISA funding. A Zimbra Collaboration Suite vulnerability is being used in targeted espionage. A new Android malware targets sensitive data stored in user notes. AWS warns of ongoing Interlock ransomware activity. Tracking pixels grab more than they should. Perry Carpenter and Mason Amadeus from The FAIK Files podcast speak with Hany Farid about the real-world harms of synthetic media. Do Boomers balance breaches better?<strong> </strong></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/perrycarpenter/"><u>Perry Carpenter</u></a> and <a href="https://www.linkedin.com/in/masonamadeus/"><u>Mason Amadeus</u></a>, hosts of <a href="https://thecyberwire.com/podcasts/the-faik-files"><u>The FAIK Files podcast</u></a>, speaking with <a href="https://www.linkedin.com/in/hany-farid-40a97935/"><u>Hany Farid</u></a> about the real-world harms of synthetic media.</p>
<p>Last week, the FAIK Files team sat down with Hany Farid -- digital forensics expert, professor at UC Berkeley, and co-founder of Get Real Security (<a href="http://getrealsecurity.com/"><u> getrealsecurity.com</u></a> ) -- to discuss deepfakes, authenticity metadata (C2PA), and forensic deepfake detection approaches.</p>
<p>And here's a link to the youtube video: <a href="https://www.youtube.com/watch?v=RSpmRb2O7Xc"><u> https://www.youtube.com/watch?v=RSpmRb2O7Xc</u></a></p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.wired.com/story/hundreds-of-millions-of-iphones-can-be-hacked-with-a-new-tool-found-in-the-wild/"><u>Hundreds of Millions of iPhones Can Be Hacked With a New Tool Found in the Wild</u></a> (WIRED)</p>
<p><a href="https://www.theregister.com/2026/03/16/cybercrime_iran_war_245_percent_rise/"><u>Cybercrime has skyrocketed 245% since the start of the Iran war</u></a> (The Register)</p>
<p><a href="https://therecord.media/cisa-official-says-agency-has-not-seen-uptick-cyber-threats-iran"><u>CISA official says agency has not seen uptick in cyber threats amid Iran war</u></a> (The Record)</p>
<p><a href="https://www.politico.com/news/2026/03/18/fbi-buying-data-track-people-patel-00834080"><u>FBI is buying data that can be used to track people, Patel says</u></a> (POLITICO)</p>
<p><a href="https://therecord.media/dhs-mullin-pressed-on-restoring-cisa-staffing"><u>DHS nominee Mullin pressed on restoring CISA staffing</u></a> (The Record)</p>
<p><a href="https://gbhackers.com/cisa-adds-exploited-zimbra-collaboration-suite-flaw/"><u>CISA Adds Exploited Zimbra Collaboration Suite Flaw to Warning List</u></a> (GB Hackers)</p>
<p><a href="https://therecord.media/russia-hackers-ukraine-zimbra-breach"><u>Russian hackers exploit Zimbra flaw to breach Ukrainian maritime agency</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/new-perseus-android-malware-checks-user-notes-for-secrets/"><u>New ‘Perseus’ Android malware checks user notes for secrets</u></a> (Bleeping Computer)</p>
<p><a href="https://www.infosecurity-magazine.com/news/interlock-ransomware-exploit-cisco/"><u>AWS Warns Hackers Have Abused Cisco Firewall Zero-Day Since January</u></a> (Infosecurity Magazine)</p>
<p><a href="https://jscrambler.com/blog/beyond-analytics-tiktok-meta-ad-pixels"><u>The Collection of Commercial Intelligence: TikTok &amp; Meta Ad Pixels</u></a> (Jscrambler)</p>
<p><a href="https://www.thesenior.com.au/story/9196718/baby-boomers-gen-z-and-millennials-respond-differently-to-scams/"><u>Forget Millennials: why those over 65 are the real cyber security pros</u></a> (The Senior)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1401</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bc9ee5ee-1671-11f1-ad8a-737224731dd8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4640696686.mp3?updated=1773943195" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Persistent threats in a shifting battlefield.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2511/notes</link>
      <description>Iran’s cyber ops stay resilient. U.S. lawmakers press Big Tech on EU rules. Researchers expose a Fancy Bear server. Japan moves toward offensive cyber. CISA calls for cross-agency teamwork. New malware targets network infrastructure. AI fooled by font-based attacks. Schneider Electric warns of critical flaws. Quantum cryptography earns top honors. Guest Bradon Rogers, Chief Customer Officer at Island, discusses making AI browsers safe for enterprises. Smart glasses on the witness stand.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, guest Bradon Rogers, Chief Customer Officer at Island, discusses making AI browsers safe for enterprises. You can dig into the details of what Bradon discussed in Gartner’s “Cybersecurity Must Block AI Browsers for Now.” You can hear the full interview here. 

Selected Reading

U.S Strikes Killed Iranian Cyber Chiefs, But The Hacks Continued (Forbes)

US committee demands Big Tech share private comms with EU officials (POLITICO)

FancyBear Exposed: Major OPSEC Blunder Inside Russian Espionage Ops (Ctrl-Alt-Intel)

Japan to allow ‘proactive cyber-defense’ from October 1st (The Register)

CISA official advises agencies not to get too hung up on who takes lead in critical infrastructure sectors (CyberScoop)

New Malware Highlights Increased Systematic Targeting of Network Infrastructure (Eclypsium)

Poisoned Typeface: How Simple Font Rendering Poisons Every AI Assistant, And Only Microsoft Cares (LayerX)

Schneider Electric Patches Critical RCE Vulnerability in SCADAPack RTUs (Beyond Machines)

Turing Award Goes to Inventors of Quantum Cryptography (The New York Times)

Witness Caught Using Smartglasses in Court Blames it all on ChatGPT (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 18 Mar 2026 20:30:00 -0000</pubDate>
      <itunes:title>Persistent threats in a shifting battlefield.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2511</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Iran’s cyber ops stay resilient. U.S. lawmakers press Big Tech on EU rules. Researchers expose a Fancy Bear server. Japan moves toward offensive cyber. CISA calls for cross-agency teamwork. New malware targets network infrastructure. AI fooled by font-based attacks. Schneider Electric warns of critical flaws. Quantum cryptography earns top honors. Guest Bradon Rogers, Chief Customer Officer at Island, discusses making AI browsers safe for enterprises. Smart glasses on the witness stand.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, guest Bradon Rogers, Chief Customer Officer at Island, discusses making AI browsers safe for enterprises. You can dig into the details of what Bradon discussed in Gartner’s “Cybersecurity Must Block AI Browsers for Now.” You can hear the full interview here. 

Selected Reading

U.S Strikes Killed Iranian Cyber Chiefs, But The Hacks Continued (Forbes)

US committee demands Big Tech share private comms with EU officials (POLITICO)

FancyBear Exposed: Major OPSEC Blunder Inside Russian Espionage Ops (Ctrl-Alt-Intel)

Japan to allow ‘proactive cyber-defense’ from October 1st (The Register)

CISA official advises agencies not to get too hung up on who takes lead in critical infrastructure sectors (CyberScoop)

New Malware Highlights Increased Systematic Targeting of Network Infrastructure (Eclypsium)

Poisoned Typeface: How Simple Font Rendering Poisons Every AI Assistant, And Only Microsoft Cares (LayerX)

Schneider Electric Patches Critical RCE Vulnerability in SCADAPack RTUs (Beyond Machines)

Turing Award Goes to Inventors of Quantum Cryptography (The New York Times)

Witness Caught Using Smartglasses in Court Blames it all on ChatGPT (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iran’s cyber ops stay resilient. U.S. lawmakers press Big Tech on EU rules. Researchers expose a Fancy Bear server. Japan moves toward offensive cyber. CISA calls for cross-agency teamwork. New malware targets network infrastructure. AI fooled by font-based attacks. Schneider Electric warns of critical flaws. Quantum cryptography earns top honors. Guest Bradon Rogers, Chief Customer Officer at Island, discusses making AI browsers safe for enterprises. Smart glasses on the witness stand.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment, guest <a href="https://www.linkedin.com/in/bradon/"><u>Bradon Rogers</u></a>, Chief Customer Officer at <a href="https://www.island.io/"><u>Island</u></a>, discusses making AI browsers safe for enterprises. You can dig into the details of what Bradon discussed in Gartner’s “<a href="https://www.gartner.com/en/documents/7211030"><u>Cybersecurity Must Block AI Browsers for Now.</u></a>” You can hear the full interview <a href="https://explore.thecyberwire.com/bradon-rogers">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.forbes.com/sites/the-wiretap/2026/03/17/us-strikes-killed-iranian-cyber-chiefs-but-the-hacks-continued/"><u>U.S Strikes Killed Iranian Cyber Chiefs, But The Hacks Continued</u></a> (Forbes)</p>
<p><a href="https://www.politico.eu/article/us-congress-judiciary-committee-big-tech-private-communication-eu-officials/"><u>US committee demands Big Tech share private comms with EU officials</u></a> (POLITICO)</p>
<p><a href="https://ctrlaltintel.com/threat%20research/FancyBear/#unique-victim-emails"><u>FancyBear Exposed: Major OPSEC Blunder Inside Russian Espionage Ops</u></a> (Ctrl-Alt-Intel)</p>
<p><a href="https://www.theregister.com/2026/03/18/japan_proactive_cyber_defense_enabled/"><u>Japan to allow ‘proactive cyber-defense’ from October 1st</u></a> (The Register)</p>
<p><a href="https://cyberscoop.com/cisa-srma-critical-infrastructure-flexible-partnerships-nick-andersen/"><u>CISA official advises agencies not to get too hung up on who takes lead in critical infrastructure sectors</u></a> (CyberScoop)</p>
<p><a href="https://eclypsium.com/blog/condibot-monaco-malware-network-infrastructure/"><u>New Malware Highlights Increased Systematic Targeting of Network Infrastructure</u></a> (Eclypsium)</p>
<p><a href="https://layerxsecurity.com/blog/poisoned-typeface-a-simple-font-rendering-poisons-every-ai-assistant-and-only-microsoft-cares/"><u>Poisoned Typeface: How Simple Font Rendering Poisons Every AI Assistant, And Only Microsoft Cares</u></a> (LayerX)</p>
<p><a href="https://beyondmachines.net/event_details/schneider-electric-patches-critical-rce-vulnerability-in-scadapack-rtus-b-7-l-u-g/gD2P6Ple2L"><u>Schneider Electric Patches Critical RCE Vulnerability in SCADAPack RTUs</u></a> (Beyond Machines)</p>
<p><a href="https://www.nytimes.com/2026/03/18/technology/turing-award-winners-quantum-cryptography.html"><u>Turing Award Goes to Inventors of Quantum Cryptography</u></a> (The New York Times)</p>
<p><a href="https://www.404media.co/witness-caught-using-smartglasses-in-court-blames-it-all-on-chatgpt/"><u>Witness Caught Using Smartglasses in Court Blames it all on ChatGPT</u></a> (404 Media)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1916</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bc71fe30-1671-11f1-ad8a-37365acdb3cc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2038394814.mp3?updated=1773853165" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Europe clamps down on global hackers.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2510/notes</link>
      <description>The EU imposes sanctions after cyberattacks. DHS boosts surveillance spending. AI firms recruit weapons-risk experts. Stryker disruption, no patient impact. LeakNet leans on ClickFix. Sears chatbot data spills. A Chinese security firm leaks a private key. Tech giants team up on scams. Teens sue xAI over alleged AI-generated abuse. On today’s Threat Vector segment, David Moulton and guest Erica L. Shoemate, founder of The EN Strategy Group, explore how AI is fundamentally reshaping the security landscape. Cyber crooks cause a complimentary curbside convenience. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector

What if the choices we make about AI security today determine who holds power tomorrow? On this Threat Vector segment, David Moulton and guest Erica L. Shoemate, founder of The EN Strategy Group, explore how AI is fundamentally reshaping the security landscape, from compressed decision-making timelines and asymmetric threat capabilities to the erosion of trust that creates strategic vulnerabilities. You can listen to David and Erica's full conversation here and catch new episodes of Threat Vector from Palo Alto Networks each Thursday on your favorite podcast app. 

Selected Reading

EU Sanctions Iranian and Chinese Firms for Cyberattacks Against European Networks (TechNadu)

DHS-built surveillance apparatus to surge in year ahead, documents show (FedScoop)

AI firm Anthropic seeks weapons expert to stop users from 'misuse' (BBC)

Stryker attack wiped tens of thousands of devices, no malware needed (Bleeping Computer)

LeakNet ransomware uses ClickFix and Deno runtime for stealthy attacks (Bleeping Computer)

Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web (WIRED)

China's biggest cybersecurity firm accidentally leaked an SSL key in a public installer (Neowin)

Google has signed the Industry Accord Against Online Scams and Fraud. (Google)

Teenage girls sue Musk’s xAI, accusing Grok tool of creating child sexual abuse material (The Guardian)

Free parking in Russia after Distributed Denial-of-Service attack knocks city's parking system offline (Bitdefender)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Mar 2026 20:30:00 -0000</pubDate>
      <itunes:title>Europe clamps down on global hackers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2510</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The EU imposes sanctions after cyberattacks. DHS boosts surveillance spending. AI firms recruit weapons-risk experts. Stryker disruption, no patient impact. LeakNet leans on ClickFix. Sears chatbot data spills. A Chinese security firm leaks a private key. Tech giants team up on scams. Teens sue xAI over alleged AI-generated abuse. On today’s Threat Vector segment, David Moulton and guest Erica L. Shoemate, founder of The EN Strategy Group, explore how AI is fundamentally reshaping the security landscape. Cyber crooks cause a complimentary curbside convenience. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector

What if the choices we make about AI security today determine who holds power tomorrow? On this Threat Vector segment, David Moulton and guest Erica L. Shoemate, founder of The EN Strategy Group, explore how AI is fundamentally reshaping the security landscape, from compressed decision-making timelines and asymmetric threat capabilities to the erosion of trust that creates strategic vulnerabilities. You can listen to David and Erica's full conversation here and catch new episodes of Threat Vector from Palo Alto Networks each Thursday on your favorite podcast app. 

Selected Reading

EU Sanctions Iranian and Chinese Firms for Cyberattacks Against European Networks (TechNadu)

DHS-built surveillance apparatus to surge in year ahead, documents show (FedScoop)

AI firm Anthropic seeks weapons expert to stop users from 'misuse' (BBC)

Stryker attack wiped tens of thousands of devices, no malware needed (Bleeping Computer)

LeakNet ransomware uses ClickFix and Deno runtime for stealthy attacks (Bleeping Computer)

Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web (WIRED)

China's biggest cybersecurity firm accidentally leaked an SSL key in a public installer (Neowin)

Google has signed the Industry Accord Against Online Scams and Fraud. (Google)

Teenage girls sue Musk’s xAI, accusing Grok tool of creating child sexual abuse material (The Guardian)

Free parking in Russia after Distributed Denial-of-Service attack knocks city's parking system offline (Bitdefender)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The EU imposes sanctions after cyberattacks. DHS boosts surveillance spending. AI firms recruit weapons-risk experts. Stryker disruption, no patient impact. LeakNet leans on ClickFix. Sears chatbot data spills. A Chinese security firm leaks a private key. Tech giants team up on scams. Teens sue xAI over alleged AI-generated abuse. On today’s Threat Vector segment, David Moulton and guest Erica L. Shoemate, founder of The EN Strategy Group, explore how AI is fundamentally reshaping the security landscape. Cyber crooks cause a complimentary curbside convenience. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Threat Vector</strong></p>
<p>What if the choices we make about AI security today determine who holds power tomorrow? On this Threat Vector segment,<a href="https://www.linkedin.com/in/davidmoulton/"> <u>David Moulton</u></a> and guest<a href="https://www.linkedin.com/in/ericals/"><u> Erica L. Shoemate</u></a>, founder of The EN Strategy Group, explore how AI is fundamentally reshaping the security landscape, from compressed decision-making timelines and asymmetric threat capabilities to the erosion of trust that creates strategic vulnerabilities. You can listen to David and Erica's full conversation<a href="https://www.thecyberwire.com/podcasts/threat-vector/108/notes"><u> here</u></a> and catch new episodes of<a href="https://www.thecyberwire.com/podcasts/threat-vector"><u> Threat Vector</u></a> from Palo Alto Networks each Thursday on your favorite podcast app. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.technadu.com/eu-sanctions-iranian-and-chinese-firms-for-cyberattacks-against-european-networks/623603/"><u>EU Sanctions Iranian and Chinese Firms for Cyberattacks Against European Networks</u></a> (TechNadu)</p>
<p><a href="https://fedscoop.com/dhs-surveillance-technology-ai-funding-document-spyware/?ref=metacurity.com"><u>DHS-built surveillance apparatus to surge in year ahead, documents show</u></a> (FedScoop)</p>
<p><a href="https://www.bbc.com/news/articles/c74721xyd1wo"><u>AI firm Anthropic seeks weapons expert to stop users from 'misuse'</u></a> (BBC)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/stryker-attack-wiped-tens-of-thousands-of-devices-no-malware-needed/"><u>Stryker attack wiped tens of thousands of devices, no malware needed</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/leaknet-ransomware-uses-clickfix-and-deno-runtime-for-stealthy-attacks/"><u>LeakNet ransomware uses ClickFix and Deno runtime for stealthy attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.wired.com/story/sears-exposed-ai-chatbot-phone-calls-and-text-chats-to-anyone-on-the-web/"><u>Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web</u></a> (WIRED)</p>
<p><a href="https://www.neowin.net/amp/chinas-biggest-cybersecurity-firm-accidentally-leaked-an-ssl-key-in-a-public-installer/"><u>China's biggest cybersecurity firm accidentally leaked an SSL key in a public installer</u></a> (Neowin)</p>
<p><a href="https://blog.google/innovation-and-ai/technology/safety-security/google-industry-accord-combat-scams-fraud/"><u>Google has signed the Industry Accord Against Online Scams and Fraud.</u></a> (Google)</p>
<p><a href="https://www.theguardian.com/technology/2026/mar/16/lawsuit-elon-musk-ai-grok-child-sexual-abuse"><u>Teenage girls sue Musk’s xAI, accusing Grok tool of creating child sexual abuse material</u></a> (The Guardian)</p>
<p><a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/free-parking-russia-distributed-denial-of-service-attack-parking-system"><u>Free parking in Russia after Distributed Denial-of-Service attack knocks city's parking system offline</u></a> (Bitdefender)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1636</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bc4ac25c-1671-11f1-ad8a-cbee8a73a6ec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6166857345.mp3?updated=1773768122" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mid season reflection with Kim Jones. [CISOP]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/128/notes</link>
      <description>In this mid-season episode, Kim takes a step back to reflect on the journey so far—revisiting key conversations, standout moments, and recurring themes that have shaped the season. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, uncovering deeper patterns and takeaways. Whether you're catching up or tuning in weekly, this episode offers a thoughtful recap and fresh perspective on where we've been—and what's still to come.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Mar 2026 06:00:00 -0000</pubDate>
      <itunes:title>Mid season reflection with Kim Jones. [CISOP]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>128</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/3995c5ee-181c-11f1-9795-87670bdd6683/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this mid-season episode, Kim takes a step back to reflect on the journey so far—revisiting key conversations, standout moments, and recurring themes that have shaped the season. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, uncovering deeper patterns and takeaways. Whether you're catching up or tuning in weekly, this episode offers a thoughtful recap and fresh perspective on where we've been—and what's still to come.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this mid-season episode, Kim takes a step back to reflect on the journey so far—revisiting key conversations, standout moments, and recurring themes that have shaped the season. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, uncovering deeper patterns and takeaways. Whether you're catching up or tuning in weekly, this episode offers a thoughtful recap and fresh perspective on where we've been—and what's still to come.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2487</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3995c5ee-181c-11f1-9795-87670bdd6683]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1234401863.mp3?updated=1769098338" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Watch out for cybercrime frequent flyers.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2509/notes</link>
      <description>Drone strikes hit a key chip supply chain. China-linked hackers target Southeast Asian militaries. Attackers race ahead with AI. ShinyHunters claim a massive Telus breach. Microsoft issues a hotpatch. Malware turns up on Steam. Fileless attacks grow. Airline miles become cybercrime currency. Monday business breakdown. Tim Starks from CyberScoop unpacks the Stryker attack and the nebulous nature of Iranian cyber activity. AI playmates puzzle preschoolers. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest is Tim Starks from CyberScoop discussing how the Stryker attack highlights the nebulous nature of Iranian cyber activity amid joint U.S.-Israel conflict. You can read more in Tim’s article here. 

Selected Reading

Drone strikes halt a third of the world's helium supply, threatening chip production (TechSpot)

China-Linked Hackers Hit Asian Militaries in Patient Espionage Operation (SecurityWeek)

Attackers are exploiting AI faster than defenders can keep up, new report warns (CyberScoop)

Telus Digital confirms breach after hacker claims 1 petabyte data theft (Bleeping Computer)

Microsoft releases Windows 11 OOB hotpatch to fix RRAS RCE flaw (Bleeping Computer)

The FBI is investigating malware hidden inside games hosted on Steam (TechCrunch)

New XWorm 7.1 and Remcos RAT Attacks Abuse Windows Tools to Evade Detection (Hackread)

Airline miles become underground currency in loyalty fraud schemes | brief (SC Media)

Kevin Mandia-founded Armadin launches with $190 million. (N2K Pro Business Briefing)

AI toys for young children need tighter rules, researchers warn (BBC News)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 16 Mar 2026 20:30:00 -0000</pubDate>
      <itunes:title>Watch out for cybercrime frequent flyers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2509</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Drone strikes hit a key chip supply chain. China-linked hackers target Southeast Asian militaries. Attackers race ahead with AI. ShinyHunters claim a massive Telus breach. Microsoft issues a hotpatch. Malware turns up on Steam. Fileless attacks grow. Airline miles become cybercrime currency. Monday business breakdown. Tim Starks from CyberScoop unpacks the Stryker attack and the nebulous nature of Iranian cyber activity. AI playmates puzzle preschoolers. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest is Tim Starks from CyberScoop discussing how the Stryker attack highlights the nebulous nature of Iranian cyber activity amid joint U.S.-Israel conflict. You can read more in Tim’s article here. 

Selected Reading

Drone strikes halt a third of the world's helium supply, threatening chip production (TechSpot)

China-Linked Hackers Hit Asian Militaries in Patient Espionage Operation (SecurityWeek)

Attackers are exploiting AI faster than defenders can keep up, new report warns (CyberScoop)

Telus Digital confirms breach after hacker claims 1 petabyte data theft (Bleeping Computer)

Microsoft releases Windows 11 OOB hotpatch to fix RRAS RCE flaw (Bleeping Computer)

The FBI is investigating malware hidden inside games hosted on Steam (TechCrunch)

New XWorm 7.1 and Remcos RAT Attacks Abuse Windows Tools to Evade Detection (Hackread)

Airline miles become underground currency in loyalty fraud schemes | brief (SC Media)

Kevin Mandia-founded Armadin launches with $190 million. (N2K Pro Business Briefing)

AI toys for young children need tighter rules, researchers warn (BBC News)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Drone strikes hit a key chip supply chain. China-linked hackers target Southeast Asian militaries. Attackers race ahead with AI. ShinyHunters claim a massive Telus breach. Microsoft issues a hotpatch. Malware turns up on Steam. Fileless attacks grow. Airline miles become cybercrime currency. Monday business breakdown. Tim Starks from CyberScoop unpacks the Stryker attack and the nebulous nature of Iranian cyber activity. AI playmates puzzle preschoolers. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br><strong>CyberWire Guest</strong></p>
<p>Our guest is <a href="https://www.linkedin.com/in/tstarks/"><u>Tim Starks</u></a> from <a href="https://cyberscoop.com/"><u>CyberScoop</u></a> discussing how the Stryker attack highlights the nebulous nature of Iranian cyber activity amid joint U.S.-Israel conflict. You can read more in Tim’s article <a href="https://cyberscoop.com/stryker-cyberattack-iranian-hackers-handala/"><u>here</u></a>. </p>
<p><br><strong>Selected Reading</strong></p>
<p><a href="https://www.techspot.com/news/111683-critical-semiconductor-gas-lost-third-global-supply-drone.html"><u>Drone strikes halt a third of the world's helium supply, threatening chip production</u></a> (TechSpot)</p>
<p><a href="https://www.securityweek.com/china-linked-hackers-hit-asian-militaries-in-patient-espionage-operation/"><u>China-Linked Hackers Hit Asian Militaries in Patient Espionage Operation</u></a> (SecurityWeek)</p>
<p><a href="https://cyberscoop.com/booz-allen-report-ai-helps-attackers-move-faster-than-current-defenses/"><u>Attackers are exploiting AI faster than defenders can keep up, new report warns</u></a> (CyberScoop)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/telus-digital-confirms-breach-after-hacker-claims-1-petabyte-data-theft/"><u>Telus Digital confirms breach after hacker claims 1 petabyte data theft</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-windows-11-oob-hotpatch-to-fix-rras-rce-flaw/"><u>Microsoft releases Windows 11 OOB hotpatch to fix RRAS RCE flaw</u></a> (Bleeping Computer)</p>
<p><a href="https://techcrunch.com/2026/03/13/valve-steam-malware-games-fbi/"><u>The FBI is investigating malware hidden inside games hosted on Steam</u></a> (TechCrunch)</p>
<p><a href="https://hackread.com/xworm-7-1-remcos-rat-windows-tools-evade-detection/"><u>New XWorm 7.1 and Remcos RAT Attacks Abuse Windows Tools to Evade Detection</u></a> (Hackread)</p>
<p><a href="https://www.scworld.com/brief/airline-miles-become-underground-currency-in-loyalty-fraud-schemes"><u>Airline miles become underground currency in loyalty fraud schemes | brief</u></a> (SC Media)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/8/10"><u>Kevin Mandia-founded Armadin launches with $190 million.</u></a> (N2K Pro Business Briefing)</p>
<p><a href="https://www.bbc.co.uk/news/articles/clyg4wx6nxgo"><u>AI toys for young children need tighter rules, researchers warn</u></a> (BBC News)</p>
<p><br><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  </p>
<p><br><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p>
<p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1545</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bc128df6-1671-11f1-ad8a-b7f55a83bf21]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2032835462.mp3?updated=1773680087" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Christian Lees: It's not always textbook. [CTO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/112/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Christian Lees, CTO at Resecurity, shares his story and insight on coming into the cybersecurity world. He considers himself a late bloomer because he did not go to college until he was 23. He wasn’t sure of what he wanted to do, and a family friend gave him a computer and the rest was history, he says. He fell in love with computers and started working at different companies trying to get ahead. He says it's not always textbook, and sometimes you just need to cut your teeth on something to get where you're going. Throughout his journey, he was constantly questioning whether he made the right decision, and in the end he says you have to be willing to "define friction points in it, you may join security field, not knowing what you're gonna do, but by being that curious person and breaking things and putting it back together, you'll find the right way and just never stop being curious." We thank Christian for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 15 Mar 2026 07:00:00 -0000</pubDate>
      <itunes:title>Christian Lees: It's not always textbook. [CTO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>112</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/fa6f1532-164f-11f1-924b-b7d318dc0047/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Christian Lees, CTO at Resecurity, shares his story and insight on coming into the cybersecurity world. He considers himself a late bloomer because he did not go to college until he was 23. He wasn’t sure of what he wanted to do, and a family friend gave him a computer and the rest was history, he says. He fell in love with computers and started working at different companies trying to get ahead. He says it's not always textbook, and sometimes you just need to cut your teeth on something to get where you're going. Throughout his journey, he was constantly questioning whether he made the right decision, and in the end he says you have to be willing to "define friction points in it, you may join security field, not knowing what you're gonna do, but by being that curious person and breaking things and putting it back together, you'll find the right way and just never stop being curious." We thank Christian for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Christian Lees, CTO at Resecurity, shares his story and insight on coming into the cybersecurity world. He considers himself a late bloomer because he did not go to college until he was 23. He wasn’t sure of what he wanted to do, and a family friend gave him a computer and the rest was history, he says. He fell in love with computers and started working at different companies trying to get ahead. He says it's not always textbook, and sometimes you just need to cut your teeth on something to get where you're going. Throughout his journey, he was constantly questioning whether he made the right decision, and in the end he says you have to be willing to "define friction points in it, you may join security field, not knowing what you're gonna do, but by being that curious person and breaking things and putting it back together, you'll find the right way and just never stop being curious." We thank Christian for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>593</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fa6f1532-164f-11f1-924b-b7d318dc0047]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6149788182.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Your AI sidekick might be a spy. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/416/notes</link>
      <description>This week, we are joined by Or Eshed, Co-Founder and CEO from LayerX Security, discussing their work on "How We Discovered A Campaign of 16 Malicious Extensions Built to Steal ChatGPT Accounts." Researchers uncovered a coordinated campaign of 16 malicious browser extensions posing as ChatGPT productivity tools while secretly stealing user accounts. 

The extensions intercept ChatGPT session authentication tokens and send them to attacker-controlled servers, allowing threat actors to impersonate users and access their conversations, files, and connected services like Google Drive or Slack. The findings highlight how AI-focused browser extensions are creating a new attack surface, emphasizing the need for organizations to closely monitor and restrict third-party AI tools.

The research can be found here:


  
⁠⁠⁠How We Discovered A Campaign of 16 Malicious Extensions Built to Steal ChatGPT Accounts



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Mar 2026 05:00:00 -0000</pubDate>
      <itunes:title>Your AI sidekick might be a spy. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>416</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a26d7054-1164-11f0-a530-cf9caeb70ca9/image/8f3cd4038c81bba2a8ea4ca89f3e23c4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Or Eshed, Co-Founder and CEO from LayerX Security, discussing their work on "How We Discovered A Campaign of 16 Malicious Extensions Built to Steal ChatGPT Accounts." Researchers uncovered a coordinated campaign of 16 malicious browser extensions posing as ChatGPT productivity tools while secretly stealing user accounts. 

The extensions intercept ChatGPT session authentication tokens and send them to attacker-controlled servers, allowing threat actors to impersonate users and access their conversations, files, and connected services like Google Drive or Slack. The findings highlight how AI-focused browser extensions are creating a new attack surface, emphasizing the need for organizations to closely monitor and restrict third-party AI tools.

The research can be found here:


  
⁠⁠⁠How We Discovered A Campaign of 16 Malicious Extensions Built to Steal ChatGPT Accounts



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/or-eshed/">Or Eshed</a>, Co-Founder and CEO from <a href="https://www.linkedin.com/company/layerx-security/">LayerX Security</a>, discussing their work on "How We Discovered A Campaign of 16 Malicious Extensions Built to Steal ChatGPT Accounts." Researchers uncovered a coordinated campaign of 16 malicious browser extensions posing as ChatGPT productivity tools while secretly stealing user accounts. </p>
<p>The extensions intercept ChatGPT session authentication tokens and send them to attacker-controlled servers, allowing threat actors to impersonate users and access their conversations, files, and connected services like Google Drive or Slack. The findings highlight how AI-focused browser extensions are creating a new attack surface, emphasizing the need for organizations to closely monitor and restrict third-party AI tools.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://www.infoblox.com/blog/threat-intelligence/parked-domains-become-weapons-with-direct-search-advertising/">⁠⁠⁠</a><a href="https://layerxsecurity.com/blog/how-we-discovered-a-campaign-of-16-malicious-extensions-chatgpt/">How We Discovered A Campaign of 16 Malicious Extensions Built to Steal ChatGPT Accounts</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1367</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1876112a-1e20-11f1-809b-a71270cf0931]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5499247497.mp3?updated=1773268372" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Socks pulled, patches pushed.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2508/notes</link>
      <description>Europol dismantles the SocksEscort proxy service. Cyber operations highlight imbalance in the war in Iran. Google rushes Chrome zero-day patches. Veeam fixes critical backup flaws. A former incident responder faces ransomware charges. Thomson Reuters staff push back on an ICE contract. Attackers abuse backup tools for data theft. CISA flags a critical n8n vulnerability. Maria Varmazis is joined by Jack R. Bialik, engineer and author, to discuss the hidden risks of a fully-digital society, and talk about his book "In Lost in Time: Our Forgotten and Vanishing Knowledge." A Phony photo fuels a phantom flight fiasco.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

N2K CyberWire’s Maria Varmazis is joined by Jack R. Bialik, engineer and author, to discuss the hidden risks of a fully-digital society, and talk about his book "In Lost in Time: Our Forgotten and Vanishing Knowledge." 



Selected Reading

Europol and international partners disrupt ‘SocksEscort’ proxy service - Joint operation targeted malicious proxy service exploiting residential routers worldwide (Europol)

War in Iran – asymmetry in cyberspace (IISS)

Google fixes two new Chrome zero-days exploited in attacks (Bleeping Computer) 

Veeam warns of critical flaws exposing backup servers to RCE attacks (Bleeping Computer)

Former Employee of Cybersecurity Companies Charged in ALPHV (BlackCat) Ransomware Extortion Case (TechNadu)

They Don’t Want Their Company’s Surveillance Tool Used by ICE (The New York Times)

Data Exfiltration and Threat Actor Infrastructure Exposed (Huntress)

CISA adds n8n RCE flaw to list of known exploited vulnerabilities (SC Media)

Cyber National Mission Force to get new commander amid broader leadership turnover (The Record)

AI Used to Promote Non-Existent Evacuation Flights From the Middle East (Bellingcat)



Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 13 Mar 2026 20:30:00 -0000</pubDate>
      <itunes:title>Socks pulled, patches pushed.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2508</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Europol dismantles the SocksEscort proxy service. Cyber operations highlight imbalance in the war in Iran. Google rushes Chrome zero-day patches. Veeam fixes critical backup flaws. A former incident responder faces ransomware charges. Thomson Reuters staff push back on an ICE contract. Attackers abuse backup tools for data theft. CISA flags a critical n8n vulnerability. Maria Varmazis is joined by Jack R. Bialik, engineer and author, to discuss the hidden risks of a fully-digital society, and talk about his book "In Lost in Time: Our Forgotten and Vanishing Knowledge." A Phony photo fuels a phantom flight fiasco.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

N2K CyberWire’s Maria Varmazis is joined by Jack R. Bialik, engineer and author, to discuss the hidden risks of a fully-digital society, and talk about his book "In Lost in Time: Our Forgotten and Vanishing Knowledge." 



Selected Reading

Europol and international partners disrupt ‘SocksEscort’ proxy service - Joint operation targeted malicious proxy service exploiting residential routers worldwide (Europol)

War in Iran – asymmetry in cyberspace (IISS)

Google fixes two new Chrome zero-days exploited in attacks (Bleeping Computer) 

Veeam warns of critical flaws exposing backup servers to RCE attacks (Bleeping Computer)

Former Employee of Cybersecurity Companies Charged in ALPHV (BlackCat) Ransomware Extortion Case (TechNadu)

They Don’t Want Their Company’s Surveillance Tool Used by ICE (The New York Times)

Data Exfiltration and Threat Actor Infrastructure Exposed (Huntress)

CISA adds n8n RCE flaw to list of known exploited vulnerabilities (SC Media)

Cyber National Mission Force to get new commander amid broader leadership turnover (The Record)

AI Used to Promote Non-Existent Evacuation Flights From the Middle East (Bellingcat)



Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Europol dismantles the SocksEscort proxy service. Cyber operations highlight imbalance in the war in Iran. Google rushes Chrome zero-day patches. Veeam fixes critical backup flaws. A former incident responder faces ransomware charges. Thomson Reuters staff push back on an ICE contract. Attackers abuse backup tools for data theft. CISA flags a critical n8n vulnerability. Maria Varmazis is joined by Jack R. Bialik, engineer and author, to discuss the hidden risks of a fully-digital society, and talk about his book "In Lost in Time: Our Forgotten and Vanishing Knowledge." A Phony photo fuels a phantom flight fiasco.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br><strong>CyberWire Guest</strong></p>
<p>N2K CyberWire’s <a href="http://linkedin.com/in/varmazis?skipRedirect=true&amp;miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAACcmioBIvUOYgJj_S9Ndqn6Z6puOpcB4n0"><u>Maria Varmazis</u></a> is joined by <a href="https://www.linkedin.com/in/jackbialik/"><u>Jack R. Bialik</u></a>, engineer and author, to discuss the hidden risks of a fully-digital society, and talk about his book "<a href="https://www.goodreads.com/book/show/223105146-lost-in-time"><u>In Lost in Time: Our Forgotten and Vanishing Knowledge</u></a>." </p>
<p><br></p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.europol.europa.eu/media-press/newsroom/news/europol-and-international-partners-disrupt-socksescort-proxy-service"><u>Europol and international partners disrupt ‘SocksEscort’ proxy service - Joint operation targeted malicious proxy service exploiting residential routers worldwide</u></a> (Europol)</p>
<p><a href="https://www.iiss.org/online-analysis/online-analysis/2026/03/war-in-iran--asymmetry-in-cyberspace/"><u>War in Iran – asymmetry in cyberspace</u></a> (IISS)</p>
<p><a href="https://www.bleepingcomputer.com/news/google/google-fixes-two-new-chrome-zero-days-exploited-in-attacks/"><u>Google fixes two new Chrome zero-days exploited in attacks</u></a> (Bleeping Computer) </p>
<p><a href="https://www.bleepingcomputer.com/news/security/veeam-warns-of-critical-flaws-exposing-backup-servers-to-rce-attacks/"><u>Veeam warns of critical flaws exposing backup servers to RCE attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.technadu.com/former-employee-of-cybersecurity-companies-charged-in-alphv-blackcat-ransomware-extortion-case/623198/"><u>Former Employee of Cybersecurity Companies Charged in ALPHV (BlackCat) Ransomware Extortion Case</u></a> (TechNadu)</p>
<p><a href="https://www.nytimes.com/2026/03/11/technology/thomson-reuters-ice-minnesota.html?unlocked_article_code=1.SVA.pTI7.Vtcm4lI6LPqx&amp;smid=nytcore-ios-share"><u>They Don’t Want Their Company’s Surveillance Tool Used by ICE</u></a> (The New York Times)</p>
<p><a href="https://www.huntress.com/blog/data-exfiltration-threat-actor-infrastructure-exposed"><u>Data Exfiltration and Threat Actor Infrastructure Exposed</u></a> (Huntress)</p>
<p><a href="https://www.scworld.com/news/cisa-adds-n8n-rce-flaw-to-list-of-known-exploited-vulnerabilities"><u>CISA adds n8n RCE flaw to list of known exploited vulnerabilities</u></a> (SC Media)</p>
<p><a href="https://therecord.media/cyber-national-mission-force-new-commander"><u>Cyber National Mission Force to get new commander amid broader leadership turnover</u></a> (The Record)</p>
<p><a href="https://www.bellingcat.com/news/2026/03/12/ai-used-to-promote-non-existent-evacuation-flights-from-the-middle-east/"><u>AI Used to Promote Non-Existent Evacuation Flights From the Middle East</u></a> (Bellingcat)</p>
<p><br></p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  </p>
<p><br></p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1837</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bbeb9e76-1671-11f1-ad8a-d754eb6d4fbd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8973348149.mp3?updated=1773423278" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Is the role of the CISO adding to the confusion? [CISOP]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/127/notes</link>
      <description>Show Notes:

As cybersecurity has matured, the field has become more formalized within businesses with CISOs leading the way. However, despite the value of the CISO and its widespread adoption, the role has continued to lose agency with other board members. In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Patty Ryan, the CISO at QuidelOrtho, to assess the value of the role. Throughout the conversation, Patty and Kim will discuss the challenges facing CISOs, why the role has lost its agency, and what can be done to reverse the current trajectory.

Want more CISO Perspectives?:

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 13 Mar 2026 06:00:00 -0000</pubDate>
      <itunes:title>Is the role of the CISO adding to the confusion? [CISOP]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>127</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/661dd356-181a-11f1-9603-47b518ba303e/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Show Notes:

As cybersecurity has matured, the field has become more formalized within businesses with CISOs leading the way. However, despite the value of the CISO and its widespread adoption, the role has continued to lose agency with other board members. In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Patty Ryan, the CISO at QuidelOrtho, to assess the value of the role. Throughout the conversation, Patty and Kim will discuss the challenges facing CISOs, why the role has lost its agency, and what can be done to reverse the current trajectory.

Want more CISO Perspectives?:

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Show Notes:</strong></p>
<p>As cybersecurity has matured, the field has become more formalized within businesses with CISOs leading the way. However, despite the value of the CISO and its widespread adoption, the role has continued to lose agency with other board members. In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Patty Ryan, the CISO at QuidelOrtho, to assess the value of the role. Throughout the conversation, Patty and Kim will discuss the challenges facing CISOs, why the role has lost its agency, and what can be done to reverse the current trajectory.</p>
<p><strong>Want more CISO Perspectives?:</strong></p>
<p>Check out a companion<strong> </strong><a href="https://thecyberwire.com/stories/6aa54aa33a894a1aaadf094228889423/is-the-role-of-the-ciso-adding-to-the-confusion"><strong>⁠</strong>⁠blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2687</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[661dd356-181a-11f1-9603-47b518ba303e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9641321751.mp3?updated=1772547625" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Oops, those were the FBI files.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2607/notes</link>
      <description>Iran threatens tech firms as hackers strike Stryker. The EU advances efforts toward digital sovereignty. A foreign hacker stumbles upon the FBI’s Epstein files. DOGE used ChatGPT to cull humanities grants. Meta claims increased efforts against scams. A Wisconsin ambulance provider discloses a data breach. CISA shortens the patch deadline for a critical SolarWinds vulnerability. We preview this year’s RSAC 2026 Innovation Sandbox with Cecilia Marinier and Paul Kocher. Dangerous digital diets miss the mark. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we share a RSAC 2026 Conference innovation preview with Cecilia Marinier and Innovation Sandbox judge Paul Kocher talking about this year's Top 10 Finalists. 



Selected Reading

Iran-linked hackers claim responsibility for attack on US medical device maker Stryker (Reuters)

'Legitimate targets': Iran issues warning to US tech firms including Google, Amazon, Microsoft, Nvidia (The Times of India)

Iranian trolls are flooding social media with pro-Tehran, anti-war propaganda (MS Now)

Commission announces €75 million EURO-3C Project to build a federated Telco-Edge-Cloud infrastructure for digital sovereignty (European Commission)

Hacker broke into FBI and compromised Epstein files, report says (TechCrunch)

When DOGE Unleashed ChatGPT on the Humanities (The New York Times)

Meta says it culled millions of scam ads amid accusations that it profits from them (The Record)

Bell Ambulance Ransomware Attack Impacts Over 237,000 Individuals (Beyond Machines)

CISA Mandates Emergency Patching for SolarWinds Web Help Desk Vulnerabilities (Beyond Machines)

AI Chatbots Are Giving Teens Absolutely Terrible Diet Advice, Study Warns (Gizmodo)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 12 Mar 2026 20:30:00 -0000</pubDate>
      <itunes:title>Oops, those were the FBI files.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2507</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Iran threatens tech firms as hackers strike Stryker. The EU advances efforts toward digital sovereignty. A foreign hacker stumbles upon the FBI’s Epstein files. DOGE used ChatGPT to cull humanities grants. Meta claims increased efforts against scams. A Wisconsin ambulance provider discloses a data breach. CISA shortens the patch deadline for a critical SolarWinds vulnerability. We preview this year’s RSAC 2026 Innovation Sandbox with Cecilia Marinier and Paul Kocher. Dangerous digital diets miss the mark. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we share a RSAC 2026 Conference innovation preview with Cecilia Marinier and Innovation Sandbox judge Paul Kocher talking about this year's Top 10 Finalists. 



Selected Reading

Iran-linked hackers claim responsibility for attack on US medical device maker Stryker (Reuters)

'Legitimate targets': Iran issues warning to US tech firms including Google, Amazon, Microsoft, Nvidia (The Times of India)

Iranian trolls are flooding social media with pro-Tehran, anti-war propaganda (MS Now)

Commission announces €75 million EURO-3C Project to build a federated Telco-Edge-Cloud infrastructure for digital sovereignty (European Commission)

Hacker broke into FBI and compromised Epstein files, report says (TechCrunch)

When DOGE Unleashed ChatGPT on the Humanities (The New York Times)

Meta says it culled millions of scam ads amid accusations that it profits from them (The Record)

Bell Ambulance Ransomware Attack Impacts Over 237,000 Individuals (Beyond Machines)

CISA Mandates Emergency Patching for SolarWinds Web Help Desk Vulnerabilities (Beyond Machines)

AI Chatbots Are Giving Teens Absolutely Terrible Diet Advice, Study Warns (Gizmodo)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iran threatens tech firms as hackers strike Stryker. The EU advances efforts toward digital sovereignty. A foreign hacker stumbles upon the FBI’s Epstein files. DOGE used ChatGPT to cull humanities grants. Meta claims increased efforts against scams. A Wisconsin ambulance provider discloses a data breach. CISA shortens the patch deadline for a critical SolarWinds vulnerability. We preview this year’s RSAC 2026 Innovation Sandbox with Cecilia Marinier and Paul Kocher. Dangerous digital diets miss the mark. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment, we share a RSAC 2026 Conference innovation preview with <a href="https://www.linkedin.com/in/cecilia-murtagh-marinier-14967/"><u>Cecilia Marinier</u></a> and <a href="https://www.rsaconference.com/usa/programs/innovation-sandbox"><u>Innovation Sandbox</u></a> judge <a href="https://www.linkedin.com/in/paulkocher/"><u>Paul Kocher</u></a> talking about this year's Top 10 Finalists. </p>
<p><br></p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.reuters.com/technology/stryker-shares-fall-after-report-suspected-iran-linked-cyberattack-2026-03-11/"><u>Iran-linked hackers claim responsibility for attack on US medical device maker Stryker</u></a> (Reuters)</p>
<p><a href="https://timesofindia.indiatimes.com/world/middle-east/legitimate-targets-iran-issues-warning-to-us-tech-firms-including-google-amazon-microsoft-nvidia/articleshow/129450749.cms"><u>'Legitimate targets': Iran issues warning to US tech firms including Google, Amazon, Microsoft, Nvidia</u></a> (The Times of India)</p>
<p><a href="https://www.ms.now/news/iran-propaganda-network-social-media"><u>Iranian trolls are flooding social media with pro-Tehran, anti-war propaganda</u></a> (MS Now)</p>
<p><a href="https://digital-strategy.ec.europa.eu/en/news/commission-announces-eu75-million-euro-3c-project-build-federated-telco-edge-cloud-infrastructure"><u>Commission announces €75 million EURO-3C Project to build a federated Telco-Edge-Cloud infrastructure for digital sovereignty</u></a> (European Commission)</p>
<p><a href="https://techcrunch.com/2026/03/11/hacker-broke-into-fbi-and-compromised-epstein-files-report-says/"><u>Hacker broke into FBI and compromised Epstein files, report says</u></a> (TechCrunch)</p>
<p><a href="https://www.nytimes.com/2026/03/07/arts/humanities-endowment-doge-trump.html"><u>When DOGE Unleashed ChatGPT on the Humanities</u></a> (The New York Times)</p>
<p><a href="https://therecord.media/meta-scam-advertising-crackdown"><u>Meta says it culled millions of scam ads amid accusations that it profits from them</u></a> (The Record)</p>
<p><a href="https://beyondmachines.net/event_details/bell-ambulance-ransomware-attack-impacts-over-237000-individuals-i-6-8-q-5/gD2P6Ple2L"><u>Bell Ambulance Ransomware Attack Impacts Over 237,000 Individuals</u></a> (Beyond Machines)</p>
<p><a href="https://beyondmachines.net/event_details/cisa-mandates-emergency-patching-for-solarwinds-web-help-desk-vulnerabilities-q-x-y-6-r/gD2P6Ple2L"><u>CISA Mandates Emergency Patching for SolarWinds Web Help Desk Vulnerabilities</u></a> (Beyond Machines)</p>
<p><a href="https://gizmodo.com/ai-chatbots-are-giving-teens-absolutely-terrible-diet-advice-study-warns-2000732494"><u>AI Chatbots Are Giving Teens Absolutely Terrible Diet Advice, Study Warns</u></a> (Gizmodo)</p>
<p><br><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><br></p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1695</itunes:duration>
      <guid isPermaLink="false"><![CDATA[bbbfefce-1671-11f1-ad8a-c7b2a77a9e6f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4758490802.mp3?updated=1773340287" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI as Tradecraft: How Threat Actors Are Operationalizing AI [Microsoft Threat Intelligence Podcast]</title>
      <link>https://www.thecyberwire.com/podcasts/microsoft-threat-intelligence/64/notes</link>
      <description>In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠Sherrod DeGrippo is joined by Greg Schlomer and Vlad Honyanyy to discuss new research on Jasper Sleet, a North Korean–aligned threat actor incorporating AI into active operations. 

The conversation examines how AI is being integrated across the attack lifecycle — from highly tailored phishing lures and fabricated job applicant personas to accelerating malware development and refining operational workflows. Rather than treating AI as a novelty, Jasper Sleet is using it to increase speed, scale, and adaptability while reducing many of the friction points that once slowed campaigns. 

They also explore what this shift means for defenders. As AI compresses iteration cycles and lowers barriers to entry, traditional attribution signals evolve, influence operations become more convincing, and defensive teams must tighten the loop between intelligence, detection, and response. This is less about experimentation and more about the operationalization of AI as part of modern tradecraft. 



In this episode you’ll learn:      


  
How AI is changing the speed at which cyber operations evolve 





  
Why jailbreaking AI models is often trivial for motivated adversaries 





  
 The strategic implications of AI leveling the playing field between threat actors 




Some questions we ask:     


  
Is there resistance among experienced malware authors to adopting AI? 





  
Are we seeing fully AI-written malware in the wild? 





  
What stands out about Jasper Sleet’s use of AI? 




 

Resources:  

View Greg Schloemer on LinkedIn  

View Sherrod DeGrippo on LinkedIn  

 

Related Microsoft Podcasts:                   


  
Afternoon Cyber Tea with Ann Johnson 





  
The BlueHat Podcast 





  
Uncovering Hidden Risks     






Discover and follow other Microsoft podcasts at microsoft.com/podcasts  



Get the latest threat intelligence insights and guidance at Microsoft Security Insider 

 

The Microsoft Threat Intelligence Podcast is produced by Microsoft, Hangar Studios and distributed as part of N2K media network. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 12 Mar 2026 13:00:00 -0000</pubDate>
      <itunes:title>AI as Tradecraft: How Threat Actors Are Operationalizing AI [Microsoft Threat Intelligence Podcast]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>64</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/93158ad8-19a1-11f1-bd15-7babb2c5f1d1/image/1fc7634177ae08ebc56a6f283fa9f679.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠Sherrod DeGrippo is joined by Greg Schlomer and Vlad Honyanyy to discuss new research on Jasper Sleet, a North Korean–aligned threat actor incorporating AI into active operations. 

The conversation examines how AI is being integrated across the attack lifecycle — from highly tailored phishing lures and fabricated job applicant personas to accelerating malware development and refining operational workflows. Rather than treating AI as a novelty, Jasper Sleet is using it to increase speed, scale, and adaptability while reducing many of the friction points that once slowed campaigns. 

They also explore what this shift means for defenders. As AI compresses iteration cycles and lowers barriers to entry, traditional attribution signals evolve, influence operations become more convincing, and defensive teams must tighten the loop between intelligence, detection, and response. This is less about experimentation and more about the operationalization of AI as part of modern tradecraft. 



In this episode you’ll learn:      


  
How AI is changing the speed at which cyber operations evolve 





  
Why jailbreaking AI models is often trivial for motivated adversaries 





  
 The strategic implications of AI leveling the playing field between threat actors 




Some questions we ask:     


  
Is there resistance among experienced malware authors to adopting AI? 





  
Are we seeing fully AI-written malware in the wild? 





  
What stands out about Jasper Sleet’s use of AI? 




 

Resources:  

View Greg Schloemer on LinkedIn  

View Sherrod DeGrippo on LinkedIn  

 

Related Microsoft Podcasts:                   


  
Afternoon Cyber Tea with Ann Johnson 





  
The BlueHat Podcast 





  
Uncovering Hidden Risks     






Discover and follow other Microsoft podcasts at microsoft.com/podcasts  



Get the latest threat intelligence insights and guidance at Microsoft Security Insider 

 

The Microsoft Threat Intelligence Podcast is produced by Microsoft, Hangar Studios and distributed as part of N2K media network. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠<a href="https://www.linkedin.com/in/sherroddegrippo/"><u>Sherrod DeGrippo</u></a> is joined by Greg Schlomer and Vlad Honyanyy to discuss new research on Jasper Sleet, a North Korean–aligned threat actor incorporating AI into active operations. </p>
<p>The conversation examines how AI is being integrated across the attack lifecycle — from highly tailored phishing lures and fabricated job applicant personas to accelerating malware development and refining operational workflows. Rather than treating AI as a novelty, Jasper Sleet is using it to increase speed, scale, and adaptability while reducing many of the friction points that once slowed campaigns. </p>
<p>They also explore what this shift means for defenders. As AI compresses iteration cycles and lowers barriers to entry, traditional attribution signals evolve, influence operations become more convincing, and defensive teams must tighten the loop between intelligence, detection, and response. This is less about experimentation and more about the operationalization of AI as part of modern tradecraft. </p>
<p><br></p>
<p><strong>In this episode you’ll learn: </strong>     </p>
<ul>
  <li>
<p>How AI is changing the speed at which cyber operations evolve </p>
</li>
</ul>
<ul>
  <li>
<p>Why jailbreaking AI models is often trivial for motivated adversaries </p>
</li>
</ul>
<ul>
  <li>
<p> The strategic implications of AI leveling the playing field between threat actors </p>
</li>
</ul>
<p><strong>Some questions we ask: </strong>    </p>
<ul>
  <li>
<p>Is there resistance among experienced malware authors to adopting AI? </p>
</li>
</ul>
<ul>
  <li>
<p>Are we seeing fully AI-written malware in the wild? </p>
</li>
</ul>
<ul>
  <li>
<p>What stands out about Jasper Sleet’s use of AI? </p>
</li>
</ul>
<p> </p>
<p><strong>Resources: </strong> </p>
<p><a href="https://www.linkedin.com/in/greg-schloemer/?utm_source=chatgpt.com"><u>View Greg Schloemer on LinkedIn</u></a>  </p>
<p><a href="https://www.linkedin.com/in/sherroddegrippo/"><u>View Sherrod DeGrippo on LinkedIn</u></a>  </p>
<p> </p>
<p><strong>Related Microsoft Podcasts:</strong>                   </p>
<ul>
  <li>
<p><a href="https://afternooncybertea.com/"><u>Afternoon Cyber Tea with Ann Johnson</u></a> </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://bluehatpodcast.com/"><u>The BlueHat Podcast</u></a> </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://uncoveringhiddenrisks.com/"><u>Uncovering Hidden Risks</u></a>     </p>
<p><br></p>
</li>
</ul>
<p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> </a><a href="https://news.microsoft.com/podcasts/"><u>microsoft.com/podcasts</u></a>  </p>
<p><br></p>
<p>Get the latest threat intelligence insights and guidance at Microsoft <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fsecurity-insider%2F&amp;data=05%7C02%7Cv-ropetrillo%40microsoft.com%7C81e205a6b727403624b808dc64a26e6b%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638495896032091649%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=LTpBsEuiaY5YiYn2FYDydHrHkYWl%2FBTl2uAQlkBz1N0%3D&amp;reserved=0"><u>Security Insider</u></a> </p>
<p> </p>
<p><em>The Microsoft Threat Intelligence Podcast is produced by Microsoft, Hangar Studios and distributed as part of N2K media network.</em> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1306</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[93158ad8-19a1-11f1-bd15-7babb2c5f1d1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2889675000.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI as Tradecraft: How Threat Actors Are Operationalizing AI [Microsoft Threat Intelligence Podcast]</title>
      <link>https://www.thecyberwire.com/podcasts/microsoft-threat-intelligence/64/notes</link>
      <description>In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠Sherrod DeGrippo is joined by Greg Schlomer and Vlad H. to discuss new research on Jasper Sleet, a North Korean–aligned threat actor incorporating AI into active operations. 

The conversation examines how AI is being integrated across the attack lifecycle — from highly tailored phishing lures and fabricated job applicant personas to accelerating malware development and refining operational workflows. Rather than treating AI as a novelty, Jasper Sleet is using it to increase speed, scale, and adaptability while reducing many of the friction points that once slowed campaigns. 

They also explore what this shift means for defenders. As AI compresses iteration cycles and lowers barriers to entry, traditional attribution signals evolve, influence operations become more convincing, and defensive teams must tighten the loop between intelligence, detection, and response. This is less about experimentation and more about the operationalization of AI as part of modern tradecraft. 



In this episode you’ll learn:      


  
How AI is changing the speed at which cyber operations evolve 





  
Why jailbreaking AI models is often trivial for motivated adversaries 





  
 The strategic implications of AI leveling the playing field between threat actors 




Some questions we ask:     


  
Is there resistance among experienced malware authors to adopting AI? 





  
Are we seeing fully AI-written malware in the wild? 





  
What stands out about Jasper Sleet’s use of AI? 




 

Resources:  

View Greg Schloemer on LinkedIn  

View Sherrod DeGrippo on LinkedIn  

 

Related Microsoft Podcasts:                   


  
Afternoon Cyber Tea with Ann Johnson 





  
The BlueHat Podcast 





  
Uncovering Hidden Risks     






Discover and follow other Microsoft podcasts at microsoft.com/podcasts  



Get the latest threat intelligence insights and guidance at Microsoft Security Insider 

 

The Microsoft Threat Intelligence Podcast is produced by Microsoft, Hangar Studios and distributed as part of N2K media network. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 12 Mar 2026 05:00:00 -0000</pubDate>
      <itunes:title>AI as Tradecraft: How Threat Actors Are Operationalizing AI [Microsoft Threat Intelligence Podcast]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>64</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠Sherrod DeGrippo is joined by Greg Schlomer and Vlad H. to discuss new research on Jasper Sleet, a North Korean–aligned threat actor incorporating AI into active operations. 

The conversation examines how AI is being integrated across the attack lifecycle — from highly tailored phishing lures and fabricated job applicant personas to accelerating malware development and refining operational workflows. Rather than treating AI as a novelty, Jasper Sleet is using it to increase speed, scale, and adaptability while reducing many of the friction points that once slowed campaigns. 

They also explore what this shift means for defenders. As AI compresses iteration cycles and lowers barriers to entry, traditional attribution signals evolve, influence operations become more convincing, and defensive teams must tighten the loop between intelligence, detection, and response. This is less about experimentation and more about the operationalization of AI as part of modern tradecraft. 



In this episode you’ll learn:      


  
How AI is changing the speed at which cyber operations evolve 





  
Why jailbreaking AI models is often trivial for motivated adversaries 





  
 The strategic implications of AI leveling the playing field between threat actors 




Some questions we ask:     


  
Is there resistance among experienced malware authors to adopting AI? 





  
Are we seeing fully AI-written malware in the wild? 





  
What stands out about Jasper Sleet’s use of AI? 




 

Resources:  

View Greg Schloemer on LinkedIn  

View Sherrod DeGrippo on LinkedIn  

 

Related Microsoft Podcasts:                   


  
Afternoon Cyber Tea with Ann Johnson 





  
The BlueHat Podcast 





  
Uncovering Hidden Risks     






Discover and follow other Microsoft podcasts at microsoft.com/podcasts  



Get the latest threat intelligence insights and guidance at Microsoft Security Insider 

 

The Microsoft Threat Intelligence Podcast is produced by Microsoft, Hangar Studios and distributed as part of N2K media network. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠<a href="https://www.linkedin.com/in/sherroddegrippo/"><u>Sherrod DeGrippo</u></a> is joined by Greg Schlomer and Vlad H. to discuss new research on Jasper Sleet, a North Korean–aligned threat actor incorporating AI into active operations. </p>
<p>The conversation examines how AI is being integrated across the attack lifecycle — from highly tailored phishing lures and fabricated job applicant personas to accelerating malware development and refining operational workflows. Rather than treating AI as a novelty, Jasper Sleet is using it to increase speed, scale, and adaptability while reducing many of the friction points that once slowed campaigns. </p>
<p>They also explore what this shift means for defenders. As AI compresses iteration cycles and lowers barriers to entry, traditional attribution signals evolve, influence operations become more convincing, and defensive teams must tighten the loop between intelligence, detection, and response. This is less about experimentation and more about the operationalization of AI as part of modern tradecraft. </p>
<p><br></p>
<p><strong>In this episode you’ll learn: </strong>     </p>
<ul>
  <li>
<p>How AI is changing the speed at which cyber operations evolve </p>
</li>
</ul>
<ul>
  <li>
<p>Why jailbreaking AI models is often trivial for motivated adversaries </p>
</li>
</ul>
<ul>
  <li>
<p> The strategic implications of AI leveling the playing field between threat actors </p>
</li>
</ul>
<p><strong>Some questions we ask: </strong>    </p>
<ul>
  <li>
<p>Is there resistance among experienced malware authors to adopting AI? </p>
</li>
</ul>
<ul>
  <li>
<p>Are we seeing fully AI-written malware in the wild? </p>
</li>
</ul>
<ul>
  <li>
<p>What stands out about Jasper Sleet’s use of AI? </p>
</li>
</ul>
<p> </p>
<p><strong>Resources: </strong> </p>
<p><a href="https://www.linkedin.com/in/greg-schloemer/?utm_source=chatgpt.com"><u>View Greg Schloemer on LinkedIn</u></a>  </p>
<p><a href="https://www.linkedin.com/in/sherroddegrippo/"><u>View Sherrod DeGrippo on LinkedIn</u></a>  </p>
<p> </p>
<p><strong>Related Microsoft Podcasts:</strong>                   </p>
<ul>
  <li>
<p><a href="https://afternooncybertea.com/"><u>Afternoon Cyber Tea with Ann Johnson</u></a> </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://bluehatpodcast.com/"><u>The BlueHat Podcast</u></a> </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://uncoveringhiddenrisks.com/"><u>Uncovering Hidden Risks</u></a>     </p>
<p><br></p>
</li>
</ul>
<p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> </a><a href="https://news.microsoft.com/podcasts/"><u>microsoft.com/podcasts</u></a>  </p>
<p><br></p>
<p>Get the latest threat intelligence insights and guidance at Microsoft <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fsecurity-insider%2F&amp;data=05%7C02%7Cv-ropetrillo%40microsoft.com%7C81e205a6b727403624b808dc64a26e6b%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638495896032091649%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=LTpBsEuiaY5YiYn2FYDydHrHkYWl%2FBTl2uAQlkBz1N0%3D&amp;reserved=0"><u>Security Insider</u></a> </p>
<p> </p>
<p><em>The Microsoft Threat Intelligence Podcast is produced by Microsoft, Hangar Studios and distributed as part of N2K media network.</em> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1306</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6d318f5a-1d7b-11f1-a0e9-bb603d3c3ecf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2995808191.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New command amid mounting cyber risks.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2506/notes</link>
      <description>Rudd takes the helm at NSA and Cyber Command. A watchdog probes alleged Social Security data mishandling. Patch Tuesday lands. Governments brace for cyber fallout from Iran. BeatBanker spreads via a fake Starlink app. InstallFix targets developers. ZombieZIP hides malware in archives. And DHS reassigns CBP officials in a FOIA secrecy dispute. Ben Yelin unpacks Anthropic’s lawsuit against the Pentagon. AI eyewear leads to awkward exposures.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest today is Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies and Caveat cohost talking about Anthropic suing the Pentagon. You can read more on the topic here. 

Selected Reading

Senate approves Joshua Rudd as dual-hat leader of Cyber Command, NSA (POLITICO)

Whistleblower claims ex-DOGE member says he took Social Security data to new job (Washington Post)

Microsoft Patches 83 Vulnerabilities (SecurityWeek)

Adobe Patches 80 Vulnerabilities Across Eight Products (SecurityWeek)

Fortinet, Ivanti, Intel Patch High-Severity Vulnerabilities (SecurityWeek)

ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Moxa, Mitsubishi Electric (SecurityWeek)

Iran war will bring wave of 'low-level cyber activity,' says intelligence group (StateScoop)

New BeatBanker Android malware poses as Starlink app to hijack devices (Bleeping Computer)

Fake Claude Code install guides push infostealers in InstallFix attacks (Bleeping Computer)

New 'Zombie ZIP' technique lets malware slip past security tools (Bleeping Computer)

DHS Ousts CBP Privacy Officers Who Questioned ‘Illegal’ Orders (WIRED)

Meta sued over AI smart glasses' privacy concerns, after workers reviewed nudity, sex, and other footage (TechCrunch)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 11 Mar 2026 20:30:00 -0000</pubDate>
      <itunes:title>New command amid mounting cyber risks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2506</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Rudd takes the helm at NSA and Cyber Command. A watchdog probes alleged Social Security data mishandling. Patch Tuesday lands. Governments brace for cyber fallout from Iran. BeatBanker spreads via a fake Starlink app. InstallFix targets developers. ZombieZIP hides malware in archives. And DHS reassigns CBP officials in a FOIA secrecy dispute. Ben Yelin unpacks Anthropic’s lawsuit against the Pentagon. AI eyewear leads to awkward exposures.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest today is Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies and Caveat cohost talking about Anthropic suing the Pentagon. You can read more on the topic here. 

Selected Reading

Senate approves Joshua Rudd as dual-hat leader of Cyber Command, NSA (POLITICO)

Whistleblower claims ex-DOGE member says he took Social Security data to new job (Washington Post)

Microsoft Patches 83 Vulnerabilities (SecurityWeek)

Adobe Patches 80 Vulnerabilities Across Eight Products (SecurityWeek)

Fortinet, Ivanti, Intel Patch High-Severity Vulnerabilities (SecurityWeek)

ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Moxa, Mitsubishi Electric (SecurityWeek)

Iran war will bring wave of 'low-level cyber activity,' says intelligence group (StateScoop)

New BeatBanker Android malware poses as Starlink app to hijack devices (Bleeping Computer)

Fake Claude Code install guides push infostealers in InstallFix attacks (Bleeping Computer)

New 'Zombie ZIP' technique lets malware slip past security tools (Bleeping Computer)

DHS Ousts CBP Privacy Officers Who Questioned ‘Illegal’ Orders (WIRED)

Meta sued over AI smart glasses' privacy concerns, after workers reviewed nudity, sex, and other footage (TechCrunch)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rudd takes the helm at NSA and Cyber Command. A watchdog probes alleged Social Security data mishandling. Patch Tuesday lands. Governments brace for cyber fallout from Iran. BeatBanker spreads via a fake Starlink app. InstallFix targets developers. ZombieZIP hides malware in archives. And DHS reassigns CBP officials in a FOIA secrecy dispute. Ben Yelin unpacks Anthropic’s lawsuit against the Pentagon. AI eyewear leads to awkward exposures.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br><strong>CyberWire Guest</strong></p>
<p>Our guest today is <a href="http://linkedin.com/in/benjamin-yelin-5b14114b/?lipi=urn%3Ali%3Apage%3Ad_flagship3_profile_view_base%3BS9gCEYoBRKOjRVG%2BZAKORw%3D%3D"><u>Ben Yelin</u></a> from <a href="https://www.umaryland.edu/chhs/"><u>University of Maryland Center for Cyber Health and Hazard Strategies</u></a> and <a href="https://www.thecyberwire.com/podcasts/caveat"><u>Caveat</u></a> cohost talking about Anthropic suing the Pentagon. You can read more on the topic <a href="https://www.cnn.com/2026/03/09/tech/anthropic-sues-pentagon"><u>here</u></a>. </p>
<p><br><strong>Selected Reading</strong></p>
<p><a href="https://www.politico.com/news/2026/03/10/joshua-rudd-cyber-command-nsa-confirmation-00820864"><u>Senate approves Joshua Rudd as dual-hat leader of Cyber Command, NSA</u></a> (POLITICO)</p>
<p><a href="https://www.washingtonpost.com/politics/2026/03/10/social-security-data-breach-doge-2/"><u>Whistleblower claims ex-DOGE member says he took Social Security data to new job</u></a> (Washington Post)</p>
<p><a href="https://www.securityweek.com/microsoft-patches-83-vulnerabilities/"><u>Microsoft Patches 83 Vulnerabilities</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/adobe-patches-80-vulnerabilities-across-eight-products/"><u>Adobe Patches 80 Vulnerabilities Across Eight Products</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/fortinet-ivanti-intel-patch-high-severity-vulnerabilities/"><u>Fortinet, Ivanti, Intel Patch High-Severity Vulnerabilities</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-schneider-moxa-mitsubishi-electric/"><u>ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Moxa, Mitsubishi Electric</u></a> (SecurityWeek)</p>
<p><a href="https://statescoop.com/iran-war-2026-low-level-cyber-activity-state-local-government/"><u>Iran war will bring wave of 'low-level cyber activity,' says intelligence group</u></a> (StateScoop)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/new-beatbanker-android-malware-poses-as-starlink-app-to-hijack-devices/"><u>New BeatBanker Android malware poses as Starlink app to hijack devices</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/fake-claude-code-install-guides-push-infostealers-in-installfix-attacks/"><u>Fake Claude Code install guides push infostealers in InstallFix attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/new-zombie-zip-technique-lets-malware-slip-past-security-tools/"><u>New 'Zombie ZIP' technique lets malware slip past security tools</u></a> (Bleeping Computer)</p>
<p><a href="https://www.wired.com/story/cbp-privacy-threshold-analysis-foia/"><u>DHS Ousts CBP Privacy Officers Who Questioned ‘Illegal’ Orders</u></a> (WIRED)</p>
<p><a href="https://techcrunch.com/2026/03/05/meta-sued-over-ai-smartglasses-privacy-concerns-after-workers-reviewed-nudity-sex-and-other-footage/"><u>Meta sued over AI smart glasses' privacy concerns, after workers reviewed nudity, sex, and other footage</u></a> (TechCrunch)</p>
<p><br><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><br></p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1545</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bb94164c-1671-11f1-ad8a-17d63d7321d2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2641391674.mp3?updated=1773256525" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Signals, scams, and a Salesforce snatch.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2505/notes</link>
      <description>Russian hackers target Signal and WhatsApp. Permit scammers impersonate local officials. Anthropic sues over a Pentagon blacklist. The White House moves to restore fraud victims. ShinyHunters target Salesforce data. Ericsson reports a breach. macOS users face ClickFix malware. AWS credentials are phished. And CISA warns of an exploited Ivanti flaw. Our guest is Brian Baskin, Threat Researcher at Sublime Security, discussing tax season employee impersonation scams. Who fact-checks the fact-checkers? 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

Our guest today is Brian Baskin, Threat Researcher at Sublime Security, discussing how tax season employee impersonation scams are conducted and what to look out for as we prepare our returns.



Selected Reading

Russia targets Signal and WhatsApp accounts in cyber campaign (AIVD)

FBI warns of phishing attacks impersonating US city, county officials (Bleeping Computer)

Anthropic sues Trump administration over Pentagon blacklist (CNBC)

White House floats Victims Restoration Program for millions affected by cyber fraud (The Record)

CybercrimeHundreds of Salesforce Customers Allegedly Targeted in New Data Theft Campaign (SecurityWeek)

Ericsson US discloses data breach after service provider hack (Bleeping Computer)

Fake CleanMyMac Site Uses ClickFix Trick to Install SHub Stealer on macOS (Hackread)

Behind the console: Active phishing campaign targeting AWS console credentials (Datadog Security Labs)

CISA: Recently patched Ivanti EPM flaw now actively exploited (Bleeping Computer)

AI fake-news detectors may look accurate but fail in real use, study finds (Tech Xplore)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Mar 2026 20:30:00 -0000</pubDate>
      <itunes:title>Signals, scams, and a Salesforce snatch.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>14</itunes:season>
      <itunes:episode>2505</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Russian hackers target Signal and WhatsApp. Permit scammers impersonate local officials. Anthropic sues over a Pentagon blacklist. The White House moves to restore fraud victims. ShinyHunters target Salesforce data. Ericsson reports a breach. macOS users face ClickFix malware. AWS credentials are phished. And CISA warns of an exploited Ivanti flaw. Our guest is Brian Baskin, Threat Researcher at Sublime Security, discussing tax season employee impersonation scams. Who fact-checks the fact-checkers? 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

Our guest today is Brian Baskin, Threat Researcher at Sublime Security, discussing how tax season employee impersonation scams are conducted and what to look out for as we prepare our returns.



Selected Reading

Russia targets Signal and WhatsApp accounts in cyber campaign (AIVD)

FBI warns of phishing attacks impersonating US city, county officials (Bleeping Computer)

Anthropic sues Trump administration over Pentagon blacklist (CNBC)

White House floats Victims Restoration Program for millions affected by cyber fraud (The Record)

CybercrimeHundreds of Salesforce Customers Allegedly Targeted in New Data Theft Campaign (SecurityWeek)

Ericsson US discloses data breach after service provider hack (Bleeping Computer)

Fake CleanMyMac Site Uses ClickFix Trick to Install SHub Stealer on macOS (Hackread)

Behind the console: Active phishing campaign targeting AWS console credentials (Datadog Security Labs)

CISA: Recently patched Ivanti EPM flaw now actively exploited (Bleeping Computer)

AI fake-news detectors may look accurate but fail in real use, study finds (Tech Xplore)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russian hackers target Signal and WhatsApp. Permit scammers impersonate local officials. Anthropic sues over a Pentagon blacklist. The White House moves to restore fraud victims. ShinyHunters target Salesforce data. Ericsson reports a breach. macOS users face ClickFix malware. AWS credentials are phished. And CISA warns of an exploited Ivanti flaw. Our guest is Brian Baskin, Threat Researcher at Sublime Security, discussing tax season employee impersonation scams. Who fact-checks the fact-checkers? </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br></p>
<p><strong>CyberWire Guest</strong></p>
<p>Our guest today is <a href="https://www.linkedin.com/in/brianbaskin/"><u>Brian Baskin</u></a>, Threat Researcher at <a href="https://sublime.security/"><u>Sublime Security</u></a>, discussing how tax season employee impersonation scams are conducted and what to look out for as we prepare our returns.</p>
<p><br></p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://english.aivd.nl/latest/news/2026/03/09/russia-targets-signal-and-whatsapp-accounts-in-cyber-campaign"><u>Russia targets Signal and WhatsApp accounts in cyber campaign</u></a> (AIVD)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/fbi-warns-of-phishing-attacks-impersonating-us-city-county-officials/"><u>FBI warns of phishing attacks impersonating US city, county officials</u></a> (Bleeping Computer)</p>
<p><a href="https://www.cnbc.com/2026/03/09/anthropic-trump-claude-ai-supply-chain-risk.html"><u>Anthropic sues Trump administration over Pentagon blacklist</u></a> (CNBC)</p>
<p><a href="https://therecord.media/white-house-floats-victim-restoration-program-cybercrime-executive-order"><u>White House floats Victims Restoration Program for millions affected by cyber fraud</u></a> (The Record)</p>
<p><a href="https://www.securityweek.com/hundreds-of-salesforce-customers-allegedly-targeted-in-new-data-theft-campaign/"><u>CybercrimeHundreds of Salesforce Customers Allegedly Targeted in New Data Theft Campaign</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/ericsson-us-discloses-data-breach-after-service-provider-hack/"><u>Ericsson US discloses data breach after service provider hack</u></a> (Bleeping Computer)</p>
<p><a href="https://hackread.com/fake-cleanmymac-site-clickfix-shub-stealer-macos/"><u>Fake CleanMyMac Site Uses ClickFix Trick to Install SHub Stealer on macOS</u></a> (Hackread)</p>
<p><a href="https://securitylabs.datadoghq.com/articles/behind-the-console-aws-aitm-phishing-campaign/"><u>Behind the console: Active phishing campaign targeting AWS console credentials</u></a> (Datadog Security Labs)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisa-recently-patched-ivanti-epm-flaw-now-actively-exploited/"><u>CISA: Recently patched Ivanti EPM flaw now actively exploited</u></a> (Bleeping Computer)</p>
<p><a href="https://techxplore.com/news/2026-03-ai-fake-news-detectors-accurate.html"><u>AI fake-news detectors may look accurate but fail in real use, study finds</u></a> (Tech Xplore)</p>
<p><br><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  </p>
<p><br></p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1443</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bb6615e4-1671-11f1-ad8a-a7ffa28921f6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4071194259.mp3?updated=1773167430" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What role does higher education play in cyber? [CISOP]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/126/notes</link>
      <description>Show Notes:

Cybersecurity has continued to grow and mature as a field over the past decade which has given rise to numerous degree pathways across dozens of collegiate institutions; however, the value of these degrees has continued to be a topic of debate. In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Dr. Lara Ferry, the Vice President of Research at Arizona State University, to explore higher education's role in cyber. Throughout the conversation, Lara and Kim will discuss the challenges facing degree programs, the disconnects between organizations and institutions, and how the gap can be better addressed.

Want more CISO Perspectives?:

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Mar 2026 06:00:00 -0000</pubDate>
      <itunes:title>What role does higher education play in cyber? [CISOP]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>126</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cbeb4202-17e0-11f1-b45b-efea9e365dff/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Show Notes:

Cybersecurity has continued to grow and mature as a field over the past decade which has given rise to numerous degree pathways across dozens of collegiate institutions; however, the value of these degrees has continued to be a topic of debate. In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Dr. Lara Ferry, the Vice President of Research at Arizona State University, to explore higher education's role in cyber. Throughout the conversation, Lara and Kim will discuss the challenges facing degree programs, the disconnects between organizations and institutions, and how the gap can be better addressed.

Want more CISO Perspectives?:

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Show Notes:</strong></p>
<p>Cybersecurity has continued to grow and mature as a field over the past decade which has given rise to numerous degree pathways across dozens of collegiate institutions; however, the value of these degrees has continued to be a topic of debate. In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Dr. Lara Ferry, the Vice President of Research at Arizona State University, to explore higher education's role in cyber. Throughout the conversation, Lara and Kim will discuss the challenges facing degree programs, the disconnects between organizations and institutions, and how the gap can be better addressed.</p>
<p><strong>Want more CISO Perspectives?:</strong></p>
<p>Check out a companion<strong> </strong><a href="https://thecyberwire.com/stories/95e2c74a640c462286609d13a8c87621/what-role-does-higher-education-play-in-cyber"><strong>⁠</strong>⁠blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2662</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cbeb4202-17e0-11f1-b45b-efea9e365dff]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2465479416.mp3?updated=1772547087" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From Tehran to the Apple II.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2504/notes</link>
      <description>Israel claims a strike on Iran’s cyber warfare headquarters. The Trump administration releases a new national cyber strategy.  DHS shakes up its IT and cybersecurity leadership. Velvet Tempest uses ClickFix to drop loaders and RATs. Researchers uncover a Linux cryptocurrency clipboard hijacker. The DOJ brings a Ghanaian romance scammer to justice. Online advertising enables government tracking. Monday business breakdown. Our guest is Jon France, CISO from ISC2, sharing some insights and findings from their 2025 ISC2 Cybersecurity Workforce Study. An Apple II app gets audited by AI. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest 

Joining us today is Jon France, CISO from ISC2, sharing some insights and findings from their 2025 ISC2 Cybersecurity Workforce Study. For further detail, you can also check out ISC2’s just released Women in Cybersecurity report.



Selected Reading

Iranian cyber warfare HQ allegedly hit by Israel | brief (SC Media)

Iran internet blackout reaches 6th day as rights groups call for end to digital shutdown (The Record)

The long-awaited Trump cyber strategy has arrived (CyberScoop)

DHS CISO, deputy CISO exit amid reported IT leadership overhaul (FedScoop)

Termite ransomware breaches linked to ClickFix CastleRAT attacks (Bleeping Computer)

ClipXDaemon: Autonomous X11 Clipboard Hijacker Delivered Via Bincrypter-Based Loader (Cyble)

Ghanaian Pleads Guilty to Role in $100m Romance Scam (Infosecurity Magazine)

The Government Uses Targeted Advertising to Track Your Location. Here's What We Need to Do. (Electronic Frontier Foundation)

Zurich Insurance Group intends to acquire UK cyber insurer Beazley for approximately $11 billion. (N2K Pro Business Briefing)

Microsoft Azure CTO says Claude found vulns in Apple II code (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 09 Mar 2026 20:30:00 -0000</pubDate>
      <itunes:title>From Tehran to the Apple II.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2504</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Israel claims a strike on Iran’s cyber warfare headquarters. The Trump administration releases a new national cyber strategy.  DHS shakes up its IT and cybersecurity leadership. Velvet Tempest uses ClickFix to drop loaders and RATs. Researchers uncover a Linux cryptocurrency clipboard hijacker. The DOJ brings a Ghanaian romance scammer to justice. Online advertising enables government tracking. Monday business breakdown. Our guest is Jon France, CISO from ISC2, sharing some insights and findings from their 2025 ISC2 Cybersecurity Workforce Study. An Apple II app gets audited by AI. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest 

Joining us today is Jon France, CISO from ISC2, sharing some insights and findings from their 2025 ISC2 Cybersecurity Workforce Study. For further detail, you can also check out ISC2’s just released Women in Cybersecurity report.



Selected Reading

Iranian cyber warfare HQ allegedly hit by Israel | brief (SC Media)

Iran internet blackout reaches 6th day as rights groups call for end to digital shutdown (The Record)

The long-awaited Trump cyber strategy has arrived (CyberScoop)

DHS CISO, deputy CISO exit amid reported IT leadership overhaul (FedScoop)

Termite ransomware breaches linked to ClickFix CastleRAT attacks (Bleeping Computer)

ClipXDaemon: Autonomous X11 Clipboard Hijacker Delivered Via Bincrypter-Based Loader (Cyble)

Ghanaian Pleads Guilty to Role in $100m Romance Scam (Infosecurity Magazine)

The Government Uses Targeted Advertising to Track Your Location. Here's What We Need to Do. (Electronic Frontier Foundation)

Zurich Insurance Group intends to acquire UK cyber insurer Beazley for approximately $11 billion. (N2K Pro Business Briefing)

Microsoft Azure CTO says Claude found vulns in Apple II code (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Israel claims a strike on Iran’s cyber warfare headquarters. The Trump administration releases a new national cyber strategy.  DHS shakes up its IT and cybersecurity leadership. Velvet Tempest uses ClickFix to drop loaders and RATs. Researchers uncover a Linux cryptocurrency clipboard hijacker. The DOJ brings a Ghanaian romance scammer to justice. Online advertising enables government tracking. Monday business breakdown. Our guest is Jon France, CISO from ISC2, sharing some insights and findings from their 2025 ISC2 Cybersecurity Workforce Study. An Apple II app gets audited by AI. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br></p>
<p><strong>CyberWire Guest </strong></p>
<p>Joining us today is <a href="https://www.linkedin.com/in/jonfrance/"><u>Jon France</u></a>, CISO from <a href="https://www.isc2.org/"><u>ISC2</u></a>, sharing some insights and findings from their <a href="https://www.linkedin.com/in/jonfrance/"><u>2025 ISC2 Cybersecurity Workforce Study</u></a>. For further detail, you can also check out ISC2’s just released <a href="https://www.isc2.org/insights/2026/03/isc2-women-in-cybersecurity-study-workplace-ai-skills?queryID=9f509fdb3680bd057efda34c16205e13"><u>Women in Cybersecurity</u></a> report.</p>
<p><br></p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.scworld.com/brief/iranian-cyber-warfare-hq-allegedly-hit-by-israel"><u>Iranian cyber warfare HQ allegedly hit by Israel | brief</u></a> (SC Media)</p>
<p><a href="https://therecord.media/iran-internet-outage-israel-war"><u>Iran internet blackout reaches 6th day as rights groups call for end to digital shutdown</u></a> (The Record)</p>
<p><a href="https://cyberscoop.com/trump-cybersecurity-strategy/"><u>The long-awaited Trump cyber strategy has arrived</u></a> (CyberScoop)</p>
<p><a href="https://fedscoop.com/dhs-it-leadership-overhaul-includes-ciso-deputy-ciso/"><u>DHS CISO, deputy CISO exit amid reported IT leadership overhaul</u></a> (FedScoop)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/termite-ransomware-breaches-linked-to-clickfix-castlerat-attacks/"><u>Termite ransomware breaches linked to ClickFix CastleRAT attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://cyble.com/blog/clipxdaemon-autonomous-x11-clipboard-hijacker/"><u>ClipXDaemon: Autonomous X11 Clipboard Hijacker Delivered Via Bincrypter-Based Loader</u></a> (Cyble)</p>
<p><a href="https://www.infosecurity-magazine.com/news/ghanaian-pleads-guilty-100m/"><u>Ghanaian Pleads Guilty to Role in $100m Romance Scam</u></a> (Infosecurity Magazine)</p>
<p><a href="https://eff.org/deeplinks/2026/03/targeted-advertising-gives-your-location-government-just-ask-cbp"><u>The Government Uses Targeted Advertising to Track Your Location. Here's What We Need to Do.</u></a> (Electronic Frontier Foundation)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/8/9"><u>Zurich Insurance Group intends to acquire UK cyber insurer Beazley for approximately $11 billion.</u></a> (N2K Pro Business Briefing)</p>
<p><a href="https://www.theregister.com/2026/03/09/claude_legacy_code_vulns/"><u>Microsoft Azure CTO says Claude found vulns in Apple II code</u></a> (The Register)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  </p>
<p><br></p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p>
<p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1830</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bb3ae090-1671-11f1-ad8a-c3111fd14699]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3390189201.mp3?updated=1773078728" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber without borders: Reporters notebook. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/93/notes</link>
      <description>In this special Reporter’s Notebook, Maria Varmazis⁠⁠⁠⁠, host here at N2K CyberWire, takes listeners behind the scenes of our three-part series on Cyber Coalition 2025 in Tallinn, Estonia. After exploring real-time incident response, cross-border coordination, and the broader stakes of collective cyber defense, this episode offers a more personal, behind-the-scenes look at how the reporting came together.

Hosted by the NATO Cooperative Cyber Defense Centre of Excellence, the exercise brought together allied military, government, and industry teams inside NATO’s secure cyber range. Here, Maria reflects on moments that didn’t make the final cut — the atmosphere inside the facilities, the pace of covering a live exercise, and the small, human details that added texture to the larger story.

If you haven’t yet, be sure to listen to all three episodes of the series to hear the full story from the ground at Cyber Coalition 2025.

Episode one can be found ⁠⁠here⁠⁠.

Episode two can be found ⁠here⁠. 

Episode three can be found ⁠⁠here⁠⁠. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 09 Mar 2026 07:00:00 -0000</pubDate>
      <itunes:title>Cyber without borders: Reporters notebook. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>93</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/e815f34c-1820-11f1-83c7-fb8276d5ee35/image/0216c9cea15c53e5d2c739964a38623c.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this special Reporter’s Notebook, Maria Varmazis⁠⁠⁠⁠, host here at N2K CyberWire, takes listeners behind the scenes of our three-part series on Cyber Coalition 2025 in Tallinn, Estonia. After exploring real-time incident response, cross-border coordination, and the broader stakes of collective cyber defense, this episode offers a more personal, behind-the-scenes look at how the reporting came together.

Hosted by the NATO Cooperative Cyber Defense Centre of Excellence, the exercise brought together allied military, government, and industry teams inside NATO’s secure cyber range. Here, Maria reflects on moments that didn’t make the final cut — the atmosphere inside the facilities, the pace of covering a live exercise, and the small, human details that added texture to the larger story.

If you haven’t yet, be sure to listen to all three episodes of the series to hear the full story from the ground at Cyber Coalition 2025.

Episode one can be found ⁠⁠here⁠⁠.

Episode two can be found ⁠here⁠. 

Episode three can be found ⁠⁠here⁠⁠. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this special Reporter’s Notebook, <a href="https://www.linkedin.com/in/varmazis/"><u>Maria Varmazis</u>⁠⁠⁠⁠</a>, host here at N2K CyberWire, takes listeners behind the scenes of our three-part series on Cyber Coalition 2025 in Tallinn, Estonia. After exploring real-time incident response, cross-border coordination, and the broader stakes of collective cyber defense, this episode offers a more personal, behind-the-scenes look at how the reporting came together.</p>
<p>Hosted by the NATO Cooperative Cyber Defense Centre of Excellence, the exercise brought together allied military, government, and industry teams inside NATO’s secure cyber range. Here, Maria reflects on moments that didn’t make the final cut — the atmosphere inside the facilities, the pace of covering a live exercise, and the small, human details that added texture to the larger story.</p>
<p>If you haven’t yet, be sure to listen to all three episodes of the series to hear the full story from the ground at Cyber Coalition 2025.</p>
<p>Episode one can be found <a href="https://thecyberwire.com/podcasts/special-edition/90/notes">⁠⁠here⁠⁠</a>.</p>
<p>Episode two can be found <a href="https://thecyberwire.com/podcasts/special-edition/91/notes">⁠here⁠</a>. </p>
<p>Episode three can be found ⁠<a href="https://thecyberwire.com/podcasts/special-edition/92/notes">⁠here⁠</a>⁠. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1383</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e815f34c-1820-11f1-83c7-fb8276d5ee35]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6296371352.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Anna Belak: Acquiring skills to make you into a unicorn. [Thought Leadership] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/111/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Anna Belak, Director of Thought Leadership at Sysdig, shares her story from physics to cyber. Anna explains how she went into college with the thinking of getting a physics degree and then for her PhD decided to switch to material science and engineering. Both were not something she enjoyed and ultimately decided to go into cyber. She shares some advice on how you should never limit yourself to your degree, as well as always learning new skills and honing in on skills you already have. She say's by doing these things it will make you into a unicorn, meaning if you are good at one thing and teach yourself to be good at something else, you will become that much more valuable. Anna hopes she makes an impact with the people she works with, she hopes they will want to work with her even long after she leaves a company. We thank Anna for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 08 Mar 2026 07:00:00 -0000</pubDate>
      <itunes:title>Anna Belak: Acquiring skills to make you into a unicorn. [Thought Leadership] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>111</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bfb4504c-164f-11f1-a5e2-1f27b8956ac5/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Anna Belak, Director of Thought Leadership at Sysdig, shares her story from physics to cyber. Anna explains how she went into college with the thinking of getting a physics degree and then for her PhD decided to switch to material science and engineering. Both were not something she enjoyed and ultimately decided to go into cyber. She shares some advice on how you should never limit yourself to your degree, as well as always learning new skills and honing in on skills you already have. She say's by doing these things it will make you into a unicorn, meaning if you are good at one thing and teach yourself to be good at something else, you will become that much more valuable. Anna hopes she makes an impact with the people she works with, she hopes they will want to work with her even long after she leaves a company. We thank Anna for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Anna Belak, Director of Thought Leadership at Sysdig, shares her story from physics to cyber. Anna explains how she went into college with the thinking of getting a physics degree and then for her PhD decided to switch to material science and engineering. Both were not something she enjoyed and ultimately decided to go into cyber. She shares some advice on how you should never limit yourself to your degree, as well as always learning new skills and honing in on skills you already have. She say's by doing these things it will make you into a unicorn, meaning if you are good at one thing and teach yourself to be good at something else, you will become that much more valuable. Anna hopes she makes an impact with the people she works with, she hopes they will want to work with her even long after she leaves a company. We thank Anna for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>623</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bfb4504c-164f-11f1-a5e2-1f27b8956ac5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3375553495.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The scareware rabbit hole. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/415/notes</link>
      <description>This week we are joined by Marcelle Lee, cybersecurity consultant and researcher, discussing "CTI tradecraft: Investigating a mobile scareware campaign." She details how a routine click on a Google News story led to a mobile scareware pop-up—and a deeper investigation into a broader campaign.

Using free tools like Censys, URLScan, VirusTotal, and CyberChef, she pivoted from two domains to uncover more than 100 related domains, shared infrastructure, and links to questionable antivirus apps in the Google Play Store. The findings are mapped to the MITRE ATT&amp;CK framework, showing how freely available resources can power meaningful, actionable threat intelligence.

The research can be found here:


  
⁠CTI tradecraft: Investigating a mobile scareware campaign



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Mar 2026 08:00:00 -0000</pubDate>
      <itunes:title>The scareware rabbit hole. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>415</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/86c01aaa-18c0-11f1-8446-5b64b9c48f49/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by Marcelle Lee, cybersecurity consultant and researcher, discussing "CTI tradecraft: Investigating a mobile scareware campaign." She details how a routine click on a Google News story led to a mobile scareware pop-up—and a deeper investigation into a broader campaign.

Using free tools like Censys, URLScan, VirusTotal, and CyberChef, she pivoted from two domains to uncover more than 100 related domains, shared infrastructure, and links to questionable antivirus apps in the Google Play Store. The findings are mapped to the MITRE ATT&amp;CK framework, showing how freely available resources can power meaningful, actionable threat intelligence.

The research can be found here:


  
⁠CTI tradecraft: Investigating a mobile scareware campaign



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by <a href="https://www.linkedin.com/in/marcellelee/">Marcelle Lee</a>, cybersecurity consultant and researcher, discussing "CTI tradecraft: Investigating a mobile scareware campaign." She details how a routine click on a Google News story led to a mobile scareware pop-up—and a deeper investigation into a broader campaign.</p>
<p>Using free tools like Censys, URLScan, VirusTotal, and CyberChef, she pivoted from two domains to uncover more than 100 related domains, shared infrastructure, and links to questionable antivirus apps in the Google Play Store. The findings are mapped to the MITRE ATT&amp;CK framework, showing how freely available resources can power meaningful, actionable threat intelligence.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://www.infoblox.com/blog/threat-intelligence/parked-domains-become-weapons-with-direct-search-advertising/">⁠</a><a href="https://feedly.com/ti-essentials/posts/cti-tradecraft-investigating-a-mobile-scareware-campaign?utm_campaign=31864603-q425_ML_campaign_investigation&amp;utm_source=marcelle_post">CTI tradecraft: Investigating a mobile scareware campaign</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1673</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[86c01aaa-18c0-11f1-8446-5b64b9c48f49]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1139463335.mp3?updated=1772735397" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Iran is muddying the waters. </title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2503/notes</link>
      <description>Iran’s MuddyWater breaches multiple U.S. organizations. The FBI probes a breach of wiretap management systems. A China-linked threat actor targets South American telecoms. Cisco patches critical firewall flaws. CISA flags actively exploited bugs in Hikvision cameras and Rockwell industrial systems. A House committee advances the controversial KIDS online safety bill. The FBI arrests a suspect accused of stealing millions in seized crypto from the U.S. Marshals Service. Ben Yelin and Ethan Cook unpack the dispute between Anthropic and the Pentagon. Wikimedia worm wreaks widespread wiki woes. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today, we’re bringing you a featured conversation from our Caveat podcast, where Ben Yelin sits down with N2K Lead Analyst Ethan Cook to unpack the fallout between the Pentagon and Anthropic, what led to the deal unraveling, and what it means as the government pivots to a similar AI contracting agreement with OpenAI. You can listen to their full conversation here and catch new episodes of Caveat featuring Dave and Ben every Thursday with special appearances by Ethan.

Selected Reading

Iranian APT Hacked US Airport, Bank, Software Company (SecurityWeek)

Tech Giants, Washington Rally for Anthropic in Pentagon Feud (GovInfo Security)

FBI investigates breach of surveillance and wiretap systems (Bleeping Computer)

Chinese state hackers target telcos with new malware toolkit (Bleeping Computer)

Cisco Patches 48 Firewall Vulnerabilities with Two CVSS 10 Flaws (Hackread)

CISA Flags Hikvision Camera &amp; Rockwell Logix Vulnerabilities as Actively Exploited (SOCRadar)

House panel marks up kids digital safety act amid Democrat backlash (The Record)

US contractor's son arrested over alleged $46M crypto theft (The Register)

Wikipedia hit by self-propagating JavaScript worm that vandalized pages (Bleeping Computer)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 06 Mar 2026 21:30:00 -0000</pubDate>
      <itunes:title>Iran is muddying the waters. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2503</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Iran’s MuddyWater breaches multiple U.S. organizations. The FBI probes a breach of wiretap management systems. A China-linked threat actor targets South American telecoms. Cisco patches critical firewall flaws. CISA flags actively exploited bugs in Hikvision cameras and Rockwell industrial systems. A House committee advances the controversial KIDS online safety bill. The FBI arrests a suspect accused of stealing millions in seized crypto from the U.S. Marshals Service. Ben Yelin and Ethan Cook unpack the dispute between Anthropic and the Pentagon. Wikimedia worm wreaks widespread wiki woes. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today, we’re bringing you a featured conversation from our Caveat podcast, where Ben Yelin sits down with N2K Lead Analyst Ethan Cook to unpack the fallout between the Pentagon and Anthropic, what led to the deal unraveling, and what it means as the government pivots to a similar AI contracting agreement with OpenAI. You can listen to their full conversation here and catch new episodes of Caveat featuring Dave and Ben every Thursday with special appearances by Ethan.

Selected Reading

Iranian APT Hacked US Airport, Bank, Software Company (SecurityWeek)

Tech Giants, Washington Rally for Anthropic in Pentagon Feud (GovInfo Security)

FBI investigates breach of surveillance and wiretap systems (Bleeping Computer)

Chinese state hackers target telcos with new malware toolkit (Bleeping Computer)

Cisco Patches 48 Firewall Vulnerabilities with Two CVSS 10 Flaws (Hackread)

CISA Flags Hikvision Camera &amp; Rockwell Logix Vulnerabilities as Actively Exploited (SOCRadar)

House panel marks up kids digital safety act amid Democrat backlash (The Record)

US contractor's son arrested over alleged $46M crypto theft (The Register)

Wikipedia hit by self-propagating JavaScript worm that vandalized pages (Bleeping Computer)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iran’s MuddyWater breaches multiple U.S. organizations. The FBI probes a breach of wiretap management systems. A China-linked threat actor targets South American telecoms. Cisco patches critical firewall flaws. CISA flags actively exploited bugs in Hikvision cameras and Rockwell industrial systems. A House committee advances the controversial KIDS online safety bill. The FBI arrests a suspect accused of stealing millions in seized crypto from the U.S. Marshals Service. Ben Yelin and Ethan Cook unpack the dispute between Anthropic and the Pentagon. Wikimedia worm wreaks widespread wiki woes. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today, we’re bringing you a featured conversation from our Caveat podcast, where Ben Yelin sits down with N2K Lead Analyst Ethan Cook to unpack the fallout between the Pentagon and Anthropic, what led to the deal unraveling, and what it means as the government pivots to a similar AI contracting agreement with OpenAI. You can listen to their full conversation <a href="https://www.thecyberwire.com/podcasts/caveat/298/notes"><u>here</u></a> and catch new episodes of <a href="https://www.thecyberwire.com/podcasts/caveat"><u>Caveat</u></a> featuring Dave and Ben every Thursday with special appearances by Ethan.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.securityweek.com/iranian-apt-hacks-us-airport-bank-software-company/"><u>Iranian APT Hacked US Airport, Bank, Software Company</u></a> (SecurityWeek)</p>
<p><a href="https://www.govinfosecurity.com/tech-giants-washington-rally-for-anthropic-in-pentagon-feud-a-30929"><u>Tech Giants, Washington Rally for Anthropic in Pentagon Feud</u></a> (GovInfo Security)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/fbi-investigates-breach-of-surveillance-and-wiretap-systems/"><u>FBI investigates breach of surveillance and wiretap systems</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/chinese-state-hackers-target-telcos-with-new-malware-toolkit/"><u>Chinese state hackers target telcos with new malware toolkit</u></a> (Bleeping Computer)</p>
<p><a href="https://hackread.com/cisco-patches-firewall-vulnerabilities-cvss-10-flaws/"><u>Cisco Patches 48 Firewall Vulnerabilities with Two CVSS 10 Flaws</u></a> (Hackread)</p>
<p><a href="https://socradar.io/blog/hikvision-camera-rockwell-logix-cisa/"><u>CISA Flags Hikvision Camera &amp; Rockwell Logix Vulnerabilities as Actively Exploited</u></a> (SOCRadar)</p>
<p><a href="https://therecord.media/house-panel-marks-up-kids-digital-safety-act"><u>House panel marks up kids digital safety act amid Democrat backlash</u></a> (The Record)</p>
<p><a href="https://www.theregister.com/2026/03/06/contractor_son_crypto_arrest/"><u>US contractor's son arrested over alleged $46M crypto theft</u></a> (The Register)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/wikipedia-hit-by-self-propagating-javascript-worm-that-vandalized-pages/"><u>Wikipedia hit by self-propagating JavaScript worm that vandalized pages</u></a> (Bleeping Computer)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2010</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bb0e134e-1671-11f1-ad8a-573bfdabb72b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7067048397.mp3?updated=1772813646" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Do certifications matter? [CISOP]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/125/notes</link>
      <description>Show Notes:

As the cybersecurity industry has grown, the field has struggled to answer the question: do certifications matter? In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with N2K's own, ⁠Simone Petrella, to answer this question and discuss why the value of certifications continue to be debated. Throughout the conversation, Simone and Kim will discuss the challenges associated with certifications, and how the industry can adjust the ways it sees and utilizes them.

Got cybersecurity, IT, or project management certification goals?

For the past 25 years, N2K's practice tests have helped more than half a million professionals reach certification success. Grow your career and reach your goals faster with N2K’s full exam prep of practice tests, labs, and training courses for Microsoft, CompTIA, PMI, Amazon, and more at n2k.com/certify.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 06 Mar 2026 07:00:00 -0000</pubDate>
      <itunes:title>Do certifications matter? [CISOP]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>125</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/de2594f8-1719-11f1-8c8d-23d92ea96235/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Show Notes:

As the cybersecurity industry has grown, the field has struggled to answer the question: do certifications matter? In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with N2K's own, ⁠Simone Petrella, to answer this question and discuss why the value of certifications continue to be debated. Throughout the conversation, Simone and Kim will discuss the challenges associated with certifications, and how the industry can adjust the ways it sees and utilizes them.

Got cybersecurity, IT, or project management certification goals?

For the past 25 years, N2K's practice tests have helped more than half a million professionals reach certification success. Grow your career and reach your goals faster with N2K’s full exam prep of practice tests, labs, and training courses for Microsoft, CompTIA, PMI, Amazon, and more at n2k.com/certify.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Show Notes:</strong></p>
<p>As the cybersecurity industry has grown, the field has struggled to answer the question: do certifications matter? In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with N2K's own, ⁠Simone Petrella, to answer this question and discuss why the value of certifications continue to be debated. Throughout the conversation, Simone and Kim will discuss the challenges associated with certifications, and how the industry can adjust the ways it sees and utilizes them.</p>
<p><strong>Got cybersecurity, IT, or project management certification goals?</strong></p>
<p>For the past 25 years, N2K's practice tests have helped more than half a million professionals reach certification success. Grow your career and reach your goals faster with N2K’s full exam prep of practice tests, labs, and training courses for Microsoft, CompTIA, PMI, Amazon, and more at <a href="http://n2k.com/certify">n2k.com/certify</a>.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion<strong> ⁠</strong>⁠<a href="https://thecyberwire.com/stories/dd36acad8fa24aa98eec3513ff5584d3/do-certifications-matter">blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2733</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[de2594f8-1719-11f1-8c8d-23d92ea96235]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8398167385.mp3?updated=1772486807" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unit 42's Iran Threat Brief: What We're Seeing [Threat Vector]</title>
      <link>https://www.thecyberwire.com/podcasts/threat-vector/905/notes</link>
      <description>Unit 42 is tracking more than 60 active hacktivist groups and Iran-linked threat actors right now. What are they actually doing, what should you believe, and what should you do about it?

In this episode of Threat Vector, David Moulton sits down with Justin Moore, Senior Manager of Threat Intelligence Research at Unit 42, and Andy Piazza, Senior Director of Threat Intelligence at Unit 42, to walk through the Unit 42 Iran Threat Brief and what the observed activity means for defenders.

You'll learn:

- What Unit 42 is actually observing from groups like Handala Hack, FAD Team, and Dark Storm, and what claims remain unverified

- Why Iran's reduced internet connectivity changes the threat picture in ways that aren't obvious

- What dispersed operators and proxy groups mean for organizations far outside the Middle East

- Which defensive actions matter most against the TTPs and IOCs Unit 42 has documented

- How to handle hacktivist claims that may be exaggerated or false



Justin Moore brings nine years of intelligence officer experience plus senior threat intel roles at Mandiant, Google, and TikTok before joining Unit 42. Andy Piazza has more than 20 years in security operations and threat intelligence, including leading IBM X-Force's global threat intel team.



Read the threat brief from Unit 42: 

- Escalation of Cyber Risk Related to Iran (March 2026)

- Escalation of Cyber Risk Related to Iran (June 2025)



This episode is essential listening if you're: a CISO assessing current exposure, a threat analyst tracking Iran-linked groups, or a security leader who needs to explain the actual observed risk to your board.



Related Episodes:

- Inside the Mind of State-Sponsored Cyberattackers

- Frenemies With Benefits

- From Policy to Cyber Interference



#Cybersecurity #ThreatIntelligence



About Threat Vector

Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.



Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠http://paloaltonetworks.com.⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 05 Mar 2026 23:00:00 -0000</pubDate>
      <itunes:title>Unit 42's Iran Threat Brief: What We're Seeing [Threat Vector]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>905</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/31bce398-1817-11f1-847a-1fca8751cfda/image/bc8bc8c30974a8c105e99695740c62e5.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Unit 42 is tracking more than 60 active hacktivist groups and Iran-linked threat actors right now. What are they actually doing, what should you believe, and what should you do about it?

In this episode of Threat Vector, David Moulton sits down with Justin Moore, Senior Manager of Threat Intelligence Research at Unit 42, and Andy Piazza, Senior Director of Threat Intelligence at Unit 42, to walk through the Unit 42 Iran Threat Brief and what the observed activity means for defenders.

You'll learn:

- What Unit 42 is actually observing from groups like Handala Hack, FAD Team, and Dark Storm, and what claims remain unverified

- Why Iran's reduced internet connectivity changes the threat picture in ways that aren't obvious

- What dispersed operators and proxy groups mean for organizations far outside the Middle East

- Which defensive actions matter most against the TTPs and IOCs Unit 42 has documented

- How to handle hacktivist claims that may be exaggerated or false



Justin Moore brings nine years of intelligence officer experience plus senior threat intel roles at Mandiant, Google, and TikTok before joining Unit 42. Andy Piazza has more than 20 years in security operations and threat intelligence, including leading IBM X-Force's global threat intel team.



Read the threat brief from Unit 42: 

- Escalation of Cyber Risk Related to Iran (March 2026)

- Escalation of Cyber Risk Related to Iran (June 2025)



This episode is essential listening if you're: a CISO assessing current exposure, a threat analyst tracking Iran-linked groups, or a security leader who needs to explain the actual observed risk to your board.



Related Episodes:

- Inside the Mind of State-Sponsored Cyberattackers

- Frenemies With Benefits

- From Policy to Cyber Interference



#Cybersecurity #ThreatIntelligence



About Threat Vector

Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.



Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠http://paloaltonetworks.com.⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Unit 42 is tracking more than 60 active hacktivist groups and Iran-linked threat actors right now. What are they actually doing, what should you believe, and what should you do about it?</p>
<p>In this episode of Threat Vector, David Moulton sits down with <a href="https://www.linkedin.com/in/justin-moore-00/">Justin Moore</a>, Senior Manager of Threat Intelligence Research at Unit 42, and <a href="https://www.linkedin.com/in/andypiazza">Andy Piazza</a>, Senior Director of Threat Intelligence at Unit 42, to walk through the Unit 42 Iran Threat Brief and what the observed activity means for defenders.</p>
<p><strong>You'll learn:</strong></p>
<p>- What Unit 42 is actually observing from groups like Handala Hack, FAD Team, and Dark Storm, and what claims remain unverified</p>
<p>- Why Iran's reduced internet connectivity changes the threat picture in ways that aren't obvious</p>
<p>- What dispersed operators and proxy groups mean for organizations far outside the Middle East</p>
<p>- Which defensive actions matter most against the TTPs and IOCs Unit 42 has documented</p>
<p>- How to handle hacktivist claims that may be exaggerated or false</p>
<p><br></p>
<p><a href="https://www.linkedin.com/in/justinmoore-00"><u>Justin Moore</u></a> brings nine years of intelligence officer experience plus senior threat intel roles at Mandiant, Google, and TikTok before joining Unit 42. <a href="https://www.linkedin.com/in/andypiazza"><u>Andy Piazza</u></a> has more than 20 years in security operations and threat intelligence, including leading IBM X-Force's global threat intel team.</p>
<p><br></p>
<p><strong>Read the threat brief from Unit 42: </strong></p>
<p>- <a href="https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/"><u>Escalation of Cyber Risk Related to Iran</u></a> (March 2026)</p>
<p>- <a href="https://unit42.paloaltonetworks.com/iranian-cyberattacks-2025/"><u>Escalation of Cyber Risk Related to Iran</u></a> (June 2025)</p>
<p><br></p>
<p>This episode is essential listening if you're: a CISO assessing current exposure, a threat analyst tracking Iran-linked groups, or a security leader who needs to explain the actual observed risk to your board.</p>
<p><br></p>
<p><strong>Related Episodes:</strong></p>
<p><strong>- </strong><a href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-inside-the-mind-of-statesponsored-cyberattackers"><u>Inside the Mind of State-Sponsored Cyberattackers</u></a></p>
<p>- <a href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-frenemies-with-benefits"><u>Frenemies With Benefits</u></a></p>
<p>- <a href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector"><u>From Policy to Cyber Interference</u></a></p>
<p><br></p>
<p>#Cybersecurity #ThreatIntelligence</p>
<p><br></p>
<p><strong>About Threat Vector</strong></p>
<p>Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.</p>
<p>The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.</p>
<p>Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.</p>
<p><br></p>
<p><strong>Palo Alto Networks</strong></p>
<p>Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.<a href="http://paloaltonetworks.com/">⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ <u>⁠http://paloaltonetworks.com.</u>⁠</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2034</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[31bce398-1817-11f1-847a-1fca8751cfda]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5819370022.mp3?updated=1772653248" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The internet joins the war.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2502/notes</link>
      <description>Hacktivist activity surges in the Middle East. Defense tech firms distance themselves from Claude. International law enforcement take down the Leakbase cybercrime forum. A pair of Cisco SD-WAN vulnerabilities are under active exploitation. Google releases an urgent Chrome security update. Age-verification is put under the microscope. TikTok is leaving end-to-end encryption out of your DMs. Our guest is Daniel Barbu, Director of EMEA Security from Adobe, discussing fostering a human‑centered, enablement‑driven, and collaborative approach to AI. Clever code catches cardiac clues.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today on our Industry Voices segment, we are joined by ⁠Daniel Barbu⁠, Director of EMEA Security from ⁠Adobe⁠, discussing how fostering a human‑centered, enablement‑driven, and collaborative approach to AI through the security guild, trainings, and other initiatives. Tune into the full conversation here. 

Selected Reading

Retaliatory Hacktivist DDoS Activity Following Operation Epic Fury/Roaring Lion (Radware)

Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran (Palo Alto Networks)

Unit 42's Iran Threat Brief: What We're Seeing (Threat Vector podcast special edition by Palo Alto Networks)

Defense tech companies are dropping Claude after Pentagon's Anthropic blacklist (NBC)

Sen. Wyden Warns of Mass Surveillance Amid Pentagon's Fight With Anthropic (Gizmodo)

Sprawling FBI, European operation takes down Leakbase cybercriminal forum (The Record)

Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild (SecurityWeek) 

Google Rolls Out Emergency Chrome Update to Patch 10 Critical Security Vulnerabilities (GB Hackers)

Hackers Expose The Massive Surveillance Stack Hiding Inside Your “Age Verification” Check (Techdirt)

TikTok says it won't encrypt DMs claiming it puts users at risk (BBC)

WiFi signals can measure heart rate—no wearables needed - News (UCSC)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 05 Mar 2026 21:30:00 -0000</pubDate>
      <itunes:title>The internet joins the war.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2502</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Hacktivist activity surges in the Middle East. Defense tech firms distance themselves from Claude. International law enforcement take down the Leakbase cybercrime forum. A pair of Cisco SD-WAN vulnerabilities are under active exploitation. Google releases an urgent Chrome security update. Age-verification is put under the microscope. TikTok is leaving end-to-end encryption out of your DMs. Our guest is Daniel Barbu, Director of EMEA Security from Adobe, discussing fostering a human‑centered, enablement‑driven, and collaborative approach to AI. Clever code catches cardiac clues.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today on our Industry Voices segment, we are joined by ⁠Daniel Barbu⁠, Director of EMEA Security from ⁠Adobe⁠, discussing how fostering a human‑centered, enablement‑driven, and collaborative approach to AI through the security guild, trainings, and other initiatives. Tune into the full conversation here. 

Selected Reading

Retaliatory Hacktivist DDoS Activity Following Operation Epic Fury/Roaring Lion (Radware)

Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran (Palo Alto Networks)

Unit 42's Iran Threat Brief: What We're Seeing (Threat Vector podcast special edition by Palo Alto Networks)

Defense tech companies are dropping Claude after Pentagon's Anthropic blacklist (NBC)

Sen. Wyden Warns of Mass Surveillance Amid Pentagon's Fight With Anthropic (Gizmodo)

Sprawling FBI, European operation takes down Leakbase cybercriminal forum (The Record)

Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild (SecurityWeek) 

Google Rolls Out Emergency Chrome Update to Patch 10 Critical Security Vulnerabilities (GB Hackers)

Hackers Expose The Massive Surveillance Stack Hiding Inside Your “Age Verification” Check (Techdirt)

TikTok says it won't encrypt DMs claiming it puts users at risk (BBC)

WiFi signals can measure heart rate—no wearables needed - News (UCSC)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hacktivist activity surges in the Middle East. Defense tech firms distance themselves from Claude. International law enforcement take down the Leakbase cybercrime forum. A pair of Cisco SD-WAN vulnerabilities are under active exploitation. Google releases an urgent Chrome security update. Age-verification is put under the microscope. TikTok is leaving end-to-end encryption out of your DMs. Our guest is Daniel Barbu, Director of EMEA Security from Adobe, discussing fostering a human‑centered, enablement‑driven, and collaborative approach to AI. Clever code catches cardiac clues.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today on our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/barbuionutdaniel/">⁠<u>Daniel Barbu</u>⁠</a>, Director of EMEA Security from <a href="https://www.linkedin.com/company/adobe/">⁠<u>Adobe</u>⁠</a>, discussing how fostering a human‑centered, enablement‑driven, and collaborative approach to AI through the security guild, trainings, and other initiatives. Tune into the full conversation <a href="https://explore.thecyberwire.com/daniel-barbu">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.radware.com/security/threat-advisories-and-attack-reports/ddos-activity-following-operation-epic-fury-roaring-lion"><u>Retaliatory Hacktivist DDoS Activity Following Operation Epic Fury/Roaring Lion</u></a> (Radware)</p>
<p><a href="https://unit42.paloaltonetworks.com/iranian-cyberattacks-2026/"><u>Threat Brief: March 2026 Escalation of Cyber Risk Related to Iran</u></a> (Palo Alto Networks)</p>
<p><a href="https://www.thecyberwire.com/podcasts/threat-vector/905/notes"><u>Unit 42's Iran Threat Brief: What We're Seeing</u></a> (Threat Vector podcast special edition by Palo Alto Networks)</p>
<p><a href="https://www.cnbc.com/2026/03/04/pentagon-blacklist-anthropic-defense-tech-claude.html"><u>Defense tech companies are dropping Claude after Pentagon's Anthropic blacklist</u></a> (NBC)</p>
<p><a href="https://gizmodo.com/sen-wyden-warns-of-mass-surveillance-amid-pentagons-fight-with-anthropic-2000728971"><u>Sen. Wyden Warns of Mass Surveillance Amid Pentagon's Fight With Anthropic</u></a> (Gizmodo)</p>
<p><a href="https://therecord.media/leakbase-cybercrime-fbi-europe-takedown"><u>Sprawling FBI, European operation takes down Leakbase cybercriminal forum</u></a> (The Record)</p>
<p><a href="https://www.securityweek.com/cisco-warns-of-more-catalyst-sd-wan-flaws-exploited-in-the-wild/"><u>Cisco Warns of More Catalyst SD-WAN Flaws Exploited in the Wild</u></a> (SecurityWeek) </p>
<p><a href="https://gbhackers.com/google-rolls-out-emergency-chrome-update/"><u>Google Rolls Out Emergency Chrome Update to Patch 10 Critical Security Vulnerabilities</u></a> (GB Hackers)</p>
<p><a href="https://www.techdirt.com/2026/02/25/hackers-expose-the-massive-surveillance-stack-hiding-inside-your-age-verification-check/"><u>Hackers Expose The Massive Surveillance Stack Hiding Inside Your “Age Verification” Check</u></a> (Techdirt)</p>
<p><a href="https://www.bbc.com/news/articles/cly2m5e5ke4o"><u>TikTok says it won't encrypt DMs claiming it puts users at risk</u></a> (BBC)</p>
<p><a href="https://news.ucsc.edu/2025/09/pulse-fi-wifi-heart-rate/"><u>WiFi signals can measure heart rate—no wearables needed - News</u></a> (UCSC)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1878</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bae55c6a-1671-11f1-ad8a-7fb2177edf9f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1367121681.mp3?updated=1772738010" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When zero-days escape the lab.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2501/notes</link>
      <description>A suspected U.S. exploit kit shows up in global iOS attacks. Facebook goes down briefly worldwide. A critical help-desk flaw enables remote code execution. Juniper PTX routers face a major bug. LastPass warns of phishing. Telegram becomes a cybercrime marketplace. Healthcare groups fight relaxed IT rules. A stolen Gemini API key runs up massive bills. CISA’s CIO departs. Our guest is Brian Long, CEO and Co-Founder of Adaptive Security, discussing how AI is reshaping social engineering. The problem of posthumous profiles. 

CyberWire Guest

Today on our Industry Voices segment we are joined by Brian Long, CEO and Co-Founder of Adaptive Security, discussing how AI is reshaping social engineering. If you want to hear the full conversation, listen to it here. 

Selected Reading

Possible U.S.-developed exploits linked to first known ‘mass’ iOS attack (CyberScoop)

Facebook accounts unavailable in worldwide outage (Bleeping Computer)

Critical FreeScout Vulnerability Leads to Full Server Compromise (SecurityWeek)

Juniper PTX Routers at Risk, Critical Takeover Flaw Disclosed (BankInfo Security)

LastPass Warns of New Phishing Campaign (SecurityWeek)

Telegram Increasingly Used to Sell Access, Malware and Stolen Logs Hackread)

Groups Push Back on HHS' Proposed Health IT Rollbacks (BankInfo Security)

Dev stunned by $82K Gemini API key bill after theft (The Register)

CISA CIO Robert Costello exits agency (CyberScoop)

Calls for Global Digital Estate Standard as Posthumous Deepfake Fraud Risk Grows (Infosecurity Magazine)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 04 Mar 2026 21:30:00 -0000</pubDate>
      <itunes:title>When zero-days escape the lab.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2501</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A suspected U.S. exploit kit shows up in global iOS attacks. Facebook goes down briefly worldwide. A critical help-desk flaw enables remote code execution. Juniper PTX routers face a major bug. LastPass warns of phishing. Telegram becomes a cybercrime marketplace. Healthcare groups fight relaxed IT rules. A stolen Gemini API key runs up massive bills. CISA’s CIO departs. Our guest is Brian Long, CEO and Co-Founder of Adaptive Security, discussing how AI is reshaping social engineering. The problem of posthumous profiles. 

CyberWire Guest

Today on our Industry Voices segment we are joined by Brian Long, CEO and Co-Founder of Adaptive Security, discussing how AI is reshaping social engineering. If you want to hear the full conversation, listen to it here. 

Selected Reading

Possible U.S.-developed exploits linked to first known ‘mass’ iOS attack (CyberScoop)

Facebook accounts unavailable in worldwide outage (Bleeping Computer)

Critical FreeScout Vulnerability Leads to Full Server Compromise (SecurityWeek)

Juniper PTX Routers at Risk, Critical Takeover Flaw Disclosed (BankInfo Security)

LastPass Warns of New Phishing Campaign (SecurityWeek)

Telegram Increasingly Used to Sell Access, Malware and Stolen Logs Hackread)

Groups Push Back on HHS' Proposed Health IT Rollbacks (BankInfo Security)

Dev stunned by $82K Gemini API key bill after theft (The Register)

CISA CIO Robert Costello exits agency (CyberScoop)

Calls for Global Digital Estate Standard as Posthumous Deepfake Fraud Risk Grows (Infosecurity Magazine)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A suspected U.S. exploit kit shows up in global iOS attacks. Facebook goes down briefly worldwide. A critical help-desk flaw enables remote code execution. Juniper PTX routers face a major bug. LastPass warns of phishing. Telegram becomes a cybercrime marketplace. Healthcare groups fight relaxed IT rules. A stolen Gemini API key runs up massive bills. CISA’s CIO departs. Our guest is Brian Long, CEO and Co-Founder of Adaptive Security, discussing how AI is reshaping social engineering. The problem of posthumous profiles.<strong> </strong></p>
<p><strong>CyberWire Guest</strong></p>
<p>Today on our Industry Voices segment we are joined by <a href="https://www.linkedin.com/in/brianclong/"><u>Brian Long</u></a>, CEO and Co-Founder of <a href="https://www.linkedin.com/company/adaptivesecurity/"><u>Adaptive Security</u></a>, discussing how AI is reshaping social engineering. If you want to hear the full conversation, listen to it <a href="https://explore.thecyberwire.com/brian-long">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://cyberscoop.com/coruna-ios-exploit-kit-leaked-us-framework/"><u>Possible U.S.-developed exploits linked to first known ‘mass’ iOS attack</u></a> (CyberScoop)</p>
<p><a href="https://www.bleepingcomputer.com/news/technology/facebook-hit-with-worldwide-outage-stating-accounts-are-unavailable/"><u>Facebook accounts unavailable in worldwide outage</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/critical-freescout-vulnerability-leads-to-full-server-compromise/"><u>Critical FreeScout Vulnerability Leads to Full Server Compromise</u></a> (SecurityWeek)</p>
<p><a href="https://www.bankinfosecurity.com/juniper-ptx-routers-at-risk-critical-takeover-flaw-disclosed-a-30904"><u>Juniper PTX Routers at Risk, Critical Takeover Flaw Disclosed</u></a> (BankInfo Security)</p>
<p><a href="https://www.securityweek.com/lastpass-warns-of-new-phishing-campaign/"><u>LastPass Warns of New Phishing Campaign</u></a> (SecurityWeek)</p>
<p><a href="https://hackread.com/telegram-used-sell-access-malware-stolen-logs/"><u>Telegram Increasingly Used to Sell Access, Malware and Stolen Logs</u></a> Hackread)</p>
<p><a href="https://www.bankinfosecurity.com/groups-push-back-on-hhs-proposed-health-rollbacks-a-30900"><u>Groups Push Back on HHS' Proposed Health IT Rollbacks</u></a> (BankInfo Security)</p>
<p><a href="https://www.theregister.com/2026/03/03/gemini_api_key_82314_dollar_charge/"><u>Dev stunned by $82K Gemini API key bill after theft</u></a> (The Register)</p>
<p><a href="https://cyberscoop.com/cisa-cio-robert-costello-exits-agency/"><u>CISA CIO Robert Costello exits agency</u></a> (CyberScoop)</p>
<p><a href="https://www.infosecurity-magazine.com/news/digital-estate-post-death-deepfake/"><u>Calls for Global Digital Estate Standard as Posthumous Deepfake Fraud Risk Grows</u></a> (Infosecurity Magazine)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1631</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[baba68ca-1671-11f1-ad8a-8b476388bbc2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3473795557.mp3?updated=1772643001" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When the map lies at sea.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2500/notes</link>
      <description>GPS jamming hits the Strait of Hormuz. An Iran linked threat actor uses AI to target Iraqi government officials. Hacktivists leak thousands of DHS contract records. A Hawaii cancer center suffers a data breach. Google patches over a hundred Android vulnerabilities. A new report tallies the scale of third party breaches. An MS-Agent AI framework flaw allows full system compromise. On today's Threat Vector segment, Evan Gordenker, Director of AI Security and DPRK Operations at Unit 42, joins David Moulton to unpack North Korea’s hiring scams. Tire tech turns tattletale. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

North Korea has turned your hiring pipeline into a revenue machine. And most organizations have no idea. Evan Gordenker, Director of AI Security and DPRK Operations at Unit 42, joins David Moulton on today’s Threat Vector segment to unpack how this operation actually works. Listen to their full conversation to get more detail and catch new episodes of Threat Vector every Thursday on your favorite podcast app. 

Selected Reading

Attacks on GPS Spike Amid US and Israeli War on Iran (WIRED)

Amazon: Drone strikes damaged AWS data centers in Middle East (Bleeping Computer)

Iranian Cyber Threat Actor Targets Iraqi Government Officials in AI-Powered Campaign (Infosecurity Magazine)

Hacktivists claim to have hacked Homeland Security to release ICE contract data (TechCrunch)

UH Cancer Center data breach affects nearly 1.2 million people (Bleeping Computer)

Android gets patches for Qualcomm zero-day exploited in attacks (Bleeping Computer)

Chrome Gemini panel became privilege escalator for rogue extensions (The Register)

Huge “Shadow Layer” of Organizations Hit by Supply Chain Attacks (Infosecurity Magazine)

Vulnerability in MS-Agent AI Framework Can Allow Full System Compromise (SecurityWeek)

Researchers Uncover Method to Track Cars via Tire Sensors (SecurityWeek)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Mar 2026 21:30:00 -0000</pubDate>
      <itunes:title>When the map lies at sea.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2500</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>GPS jamming hits the Strait of Hormuz. An Iran linked threat actor uses AI to target Iraqi government officials. Hacktivists leak thousands of DHS contract records. A Hawaii cancer center suffers a data breach. Google patches over a hundred Android vulnerabilities. A new report tallies the scale of third party breaches. An MS-Agent AI framework flaw allows full system compromise. On today's Threat Vector segment, Evan Gordenker, Director of AI Security and DPRK Operations at Unit 42, joins David Moulton to unpack North Korea’s hiring scams. Tire tech turns tattletale. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

North Korea has turned your hiring pipeline into a revenue machine. And most organizations have no idea. Evan Gordenker, Director of AI Security and DPRK Operations at Unit 42, joins David Moulton on today’s Threat Vector segment to unpack how this operation actually works. Listen to their full conversation to get more detail and catch new episodes of Threat Vector every Thursday on your favorite podcast app. 

Selected Reading

Attacks on GPS Spike Amid US and Israeli War on Iran (WIRED)

Amazon: Drone strikes damaged AWS data centers in Middle East (Bleeping Computer)

Iranian Cyber Threat Actor Targets Iraqi Government Officials in AI-Powered Campaign (Infosecurity Magazine)

Hacktivists claim to have hacked Homeland Security to release ICE contract data (TechCrunch)

UH Cancer Center data breach affects nearly 1.2 million people (Bleeping Computer)

Android gets patches for Qualcomm zero-day exploited in attacks (Bleeping Computer)

Chrome Gemini panel became privilege escalator for rogue extensions (The Register)

Huge “Shadow Layer” of Organizations Hit by Supply Chain Attacks (Infosecurity Magazine)

Vulnerability in MS-Agent AI Framework Can Allow Full System Compromise (SecurityWeek)

Researchers Uncover Method to Track Cars via Tire Sensors (SecurityWeek)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>GPS jamming hits the Strait of Hormuz. An Iran linked threat actor uses AI to target Iraqi government officials. Hacktivists leak thousands of DHS contract records. A Hawaii cancer center suffers a data breach. Google patches over a hundred Android vulnerabilities. A new report tallies the scale of third party breaches. An MS-Agent AI framework flaw allows full system compromise. On today's Threat Vector segment, Evan Gordenker, Director of AI Security and DPRK Operations at Unit 42, joins David Moulton to unpack North Korea’s hiring scams. Tire tech turns tattletale. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>North Korea has turned your hiring pipeline into a revenue machine. And most organizations have no idea. <a href="https://www.linkedin.com/in/evangordenker/"><u>Evan Gordenker</u></a>, Director of AI Security and DPRK Operations at Unit 42, joins <a href="https://www.linkedin.com/in/davidmoulton/"><u>David Moulton</u></a> on today’s Threat Vector segment to unpack how this operation actually works. Listen to their full conversation to get more detail and catch new episodes of Threat Vector every Thursday on your favorite podcast app. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.wired.com/story/gps-attacks-on-ships-spike-amid-the-us-and-israeli-war-on-iran/"><u>Attacks on GPS Spike Amid US and Israeli War on Iran</u></a> (WIRED)</p>
<p><a href="https://www.bleepingcomputer.com/news/technology/amazon-drone-strikes-damaged-aws-data-centers-in-middle-east/"><u>Amazon: Drone strikes damaged AWS data centers in Middle East</u></a> (Bleeping Computer)</p>
<p><a href="https://www.infosecurity-magazine.com/news/iran-cyber-threat-actor-iraq/"><u>Iranian Cyber Threat Actor Targets Iraqi Government Officials in AI-Powered Campaign</u></a> (Infosecurity Magazine)</p>
<p><a href="http://techcrunch.com/2026/03/02/hacktivists-claim-to-have-hacked-homeland-security-to-release-ice-contract-data/"><u>Hacktivists claim to have hacked Homeland Security to release ICE contract data</u></a> (TechCrunch)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/university-of-hawaii-cancer-center-ransomware-attack-affects-nearly-12-million-people/"><u>UH Cancer Center data breach affects nearly 1.2 million people</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/google-patches-android-zero-day-actively-exploited-in-attacks/"><u>Android gets patches for Qualcomm zero-day exploited in attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.theregister.com/2026/03/03/google_chrome_bug_gemini/"><u>Chrome Gemini panel became privilege escalator for rogue extensions</u></a> (The Register)</p>
<p><a href="https://www.infosecurity-magazine.com/news/shadow-layer-organizations-supply/"><u>Huge “Shadow Layer” of Organizations Hit by Supply Chain Attacks</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.securityweek.com/vulnerability-in-ms-agent-ai-framework-can-allow-full-system-compromise/"><u>Vulnerability in MS-Agent AI Framework Can Allow Full System Compromise</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/researchers-uncover-method-to-track-cars-via-tire-sensors/"><u>Researchers Uncover Method to Track Cars via Tire Sensors</u></a> (SecurityWeek)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1575</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ba8f3826-1671-11f1-ad8a-2b08e87c5fec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2947033869.mp3?updated=1772563772" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Does diversity matter in cyber? [CISOP]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/124/notes</link>
      <description>Show Notes:

As cybersecurity matures, one area still lags: diversity. In this thought-provoking episode of CISO Perspectives, host Kim Jones takes the mic solo to address a topic that remains both critical and controversial. Kim explores the current state of diversity in the cybersecurity field, why progress has been slow, and how inclusive teams drive greater innovation and resilience. Tune in for an honest conversation that challenges the status quo and pushes the industry forward.

Want more CISO Perspectives?:

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Mar 2026 07:00:00 -0000</pubDate>
      <itunes:title>Does diversity matter in cyber? [CISOP]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>124</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7a9256ca-1678-11f1-8390-27a445a77e6b/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Show Notes:

As cybersecurity matures, one area still lags: diversity. In this thought-provoking episode of CISO Perspectives, host Kim Jones takes the mic solo to address a topic that remains both critical and controversial. Kim explores the current state of diversity in the cybersecurity field, why progress has been slow, and how inclusive teams drive greater innovation and resilience. Tune in for an honest conversation that challenges the status quo and pushes the industry forward.

Want more CISO Perspectives?:

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Show Notes:</strong></p>
<p>As cybersecurity matures, one area still lags: diversity. In this thought-provoking episode of <em>CISO Perspectives</em>, host Kim Jones takes the mic solo to address a topic that remains both critical and controversial. Kim explores the current state of diversity in the cybersecurity field, why progress has been slow, and how inclusive teams drive greater innovation and resilience. Tune in for an honest conversation that challenges the status quo and pushes the industry forward.</p>
<p><strong>Want more CISO Perspectives?:</strong></p>
<p>Check out a companion<strong> ⁠</strong>⁠<a href="https://thecyberwire.com/stories/a2f62e4860e342ec820c3b1a7c36ef52/does-diversity-matter-in-cyber">blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1215</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7a9256ca-1678-11f1-8390-27a445a77e6b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6521663702.mp3?updated=1772474347" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The parallel war online.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2499/notes</link>
      <description>Cyberwar shadows the US Israel attack on Iran. Hackers hijack Pakistani news broadcasts. President Trump orders all federal agencies to stop using AI technology from Anthropic. The Health Care Cybersecurity and Resiliency Act clears a hurdle. A new RAT streamlines double extortion attacks against Windows systems. CISA updates warnings on a zero-day targeting Ivanti Connect Secure devices. A North Korea-linked group targets air-gapped systems. Monday business breakdown. On our Afternoon Cyber Tea segment from Microsoft Security, host Ann Johnson speaks with Rob Suárez, Vice President and Chief Information Security Officer at CareFirst BlueCross BlueShield, about cybersecurity in healthcare. Tim Starks from CyberScoop has the latest goings on at CISA. Microsoft says the slop stops here. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Tim Starks from CyberScoop as he is discussing ongoing challenges at CISA. If you are interested in this topic, you can learn more here. 

Afternoon Cyber Tea

On our Afternoon Cyber Tea segment from Microsoft Security, host Ann Johnson speaks with Rob Suárez, Vice President and Chief Information Security Officer at CareFirst BlueCross BlueShield, about cybersecurity in healthcare. You can hear the full conversation here, and catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app. 

Selected Reading

US-Israel and Iran Trade Cyberattacks: Pro-West Hacks Cause Disruption as Tehran Retaliates (SecurityWeek)

Western Cybersecurity Experts Brace for Iranian Reprisal (BankInfo Security)

Pakistan’s Top News Channels Hacked and Hijacked With Anti-Military Messages (Hackread)

Anthropic confirms Claude is down in a worldwide outage (Bleeping Computer)

Trump Orders Government to Stop Using Anthropic After Pentagon Standoff (New York Times)

OpenAI Will Deploy AI in US Military Classified Networks (GovInfo Security)

Senate Health Cyber Bill Clears Committee Hurdle (GovInfo Security)

Double whammy: Steaelite RAT bundles data theft, ransomware (The Register)

CISA warns that RESURGE malware can be dormant on Ivanti devices (Bleeping Computer)

North Korean APT Targets Air-Gapped Systems in Recent Campaign (SecurityWeek)

Astelia secures $35 million in combined seed and Series A funding. (N2K Pro Business Briefing)

Microsoft gets tired of “Microslop,” bans the word on its Discord, then locks the server after backlash (Windows Latest)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 02 Mar 2026 21:30:00 -0000</pubDate>
      <itunes:title>The parallel war online.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2496</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Cyberwar shadows the US Israel attack on Iran. Hackers hijack Pakistani news broadcasts. President Trump orders all federal agencies to stop using AI technology from Anthropic. The Health Care Cybersecurity and Resiliency Act clears a hurdle. A new RAT streamlines double extortion attacks against Windows systems. CISA updates warnings on a zero-day targeting Ivanti Connect Secure devices. A North Korea-linked group targets air-gapped systems. Monday business breakdown. On our Afternoon Cyber Tea segment from Microsoft Security, host Ann Johnson speaks with Rob Suárez, Vice President and Chief Information Security Officer at CareFirst BlueCross BlueShield, about cybersecurity in healthcare. Tim Starks from CyberScoop has the latest goings on at CISA. Microsoft says the slop stops here. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Tim Starks from CyberScoop as he is discussing ongoing challenges at CISA. If you are interested in this topic, you can learn more here. 

Afternoon Cyber Tea

On our Afternoon Cyber Tea segment from Microsoft Security, host Ann Johnson speaks with Rob Suárez, Vice President and Chief Information Security Officer at CareFirst BlueCross BlueShield, about cybersecurity in healthcare. You can hear the full conversation here, and catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app. 

Selected Reading

US-Israel and Iran Trade Cyberattacks: Pro-West Hacks Cause Disruption as Tehran Retaliates (SecurityWeek)

Western Cybersecurity Experts Brace for Iranian Reprisal (BankInfo Security)

Pakistan’s Top News Channels Hacked and Hijacked With Anti-Military Messages (Hackread)

Anthropic confirms Claude is down in a worldwide outage (Bleeping Computer)

Trump Orders Government to Stop Using Anthropic After Pentagon Standoff (New York Times)

OpenAI Will Deploy AI in US Military Classified Networks (GovInfo Security)

Senate Health Cyber Bill Clears Committee Hurdle (GovInfo Security)

Double whammy: Steaelite RAT bundles data theft, ransomware (The Register)

CISA warns that RESURGE malware can be dormant on Ivanti devices (Bleeping Computer)

North Korean APT Targets Air-Gapped Systems in Recent Campaign (SecurityWeek)

Astelia secures $35 million in combined seed and Series A funding. (N2K Pro Business Briefing)

Microsoft gets tired of “Microslop,” bans the word on its Discord, then locks the server after backlash (Windows Latest)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyberwar shadows the US Israel attack on Iran. Hackers hijack Pakistani news broadcasts. President Trump orders all federal agencies to stop using AI technology from Anthropic. The Health Care Cybersecurity and Resiliency Act clears a hurdle. A new RAT streamlines double extortion attacks against Windows systems. CISA updates warnings on a zero-day targeting Ivanti Connect Secure devices. A North Korea-linked group targets air-gapped systems. Monday business breakdown. On our Afternoon Cyber Tea segment from Microsoft Security, host Ann Johnson speaks with Rob Suárez, Vice President and Chief Information Security Officer at CareFirst BlueCross BlueShield, about cybersecurity in healthcare. Tim Starks from CyberScoop has the latest goings on at CISA. Microsoft says the slop stops here.<strong> </strong></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/tstarks/"><u>Tim Starks</u></a> from <a href="https://www.linkedin.com/company/cyberscoop/"><u>CyberScoop</u></a> as he is discussing ongoing challenges at CISA. If you are interested in this topic, you can learn more <a href="https://cyberscoop.com/cisa-leadership-change-madhu-gottumukkala-nick-andersen/"><u>here</u></a>. </p>
<p><strong>Afternoon Cyber Tea</strong></p>
<p>On our<a href="https://www.thecyberwire.com/podcasts/afternoon-cyber-tea"><u> Afternoon Cyber Tea</u></a> segment from Microsoft Security, host Ann Johnson speaks with Rob Suárez, Vice President and Chief Information Security Officer at CareFirst BlueCross BlueShield, about cybersecurity in healthcare. You can hear the full conversation<a href="https://www.thecyberwire.com/podcasts/afternoon-cyber-tea/124/notes"><u> here</u></a>, and catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.securityweek.com/us-israel-and-iran-trade-cyberattacks-pro-west-hacks-cause-disruption-as-tehran-retaliates/"><u>US-Israel and Iran Trade Cyberattacks: Pro-West Hacks Cause Disruption as Tehran Retaliates</u></a> (SecurityWeek)</p>
<p><a href="https://www.bankinfosecurity.com/western-cybersecurity-experts-brace-for-iranian-reprisal-a-30890"><u>Western Cybersecurity Experts Brace for Iranian Reprisal</u></a> (BankInfo Security)</p>
<p><a href="https://hackread.com/pakistan-news-channels-hacked-anti-military-messages/"><u>Pakistan’s Top News Channels Hacked and Hijacked With Anti-Military Messages</u></a> (Hackread)</p>
<p><a href="https://www.bleepingcomputer.com/news/artificial-intelligence/anthropic-confirms-claude-is-down-in-a-worldwide-outage/"><u>Anthropic confirms Claude is down in a worldwide outage</u></a> (Bleeping Computer)</p>
<p><a href="https://www.nytimes.com/2026/02/27/us/politics/anthropic-military-ai.html"><u>Trump Orders Government to Stop Using Anthropic After Pentagon Standoff</u></a> (New York Times)</p>
<p><a href="https://www.govinfosecurity.com/openai-will-deploy-ai-in-us-military-classified-networks-a-30888"><u>OpenAI Will Deploy AI in US Military Classified Networks</u></a> (GovInfo Security)</p>
<p><a href="https://www.govinfosecurity.com/senate-health-cyber-bill-clears-committee-hurdle-a-30880"><u>Senate Health Cyber Bill Clears Committee Hurdle</u></a> (GovInfo Security)</p>
<p><a href="https://www.theregister.com/2026/02/27/double_extortion_whammy_steaelite_rat/"><u>Double whammy: Steaelite RAT bundles data theft, ransomware</u></a> (The Register)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-that-resurge-malware-can-be-dormant-on-ivanti-devices/"><u>CISA warns that RESURGE malware can be dormant on Ivanti devices</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/north-korean-apt-targets-air-gapped-systems-in-recent-campaign/"><u>North Korean APT Targets Air-Gapped Systems in Recent Campaign</u></a> (SecurityWeek)</p>
<p><a href="https://www.thecyberwire.com/newsletters/business-briefing/8/8"><u>Astelia secures $35 million in combined seed and Series A funding.</u></a> (N2K Pro Business Briefing)</p>
<p><a href="https://www.windowslatest.com/2026/03/02/microsoft-gets-tired-of-microslop-bans-the-word-on-its-discord-then-locks-the-server-after-backlash/"><u>Microsoft gets tired of “Microslop,” bans the word on its Discord, then locks the server after backlash</u></a> (Windows Latest)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2238</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ba31538c-1671-11f1-ad8a-e3ef3d8e0479]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7888461334.mp3?updated=1772485176" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber Without Borders: Standing guard 210 kilometers from risk. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/92/notes</link>
      <description>In the final installment of our three-part series on ⁠Cyber Coalition 2025⁠⁠, ⁠⁠Maria Varmazis⁠⁠⁠, host here at N2K CyberWire, and ⁠⁠⁠Liz Stokes, CyberWire Producer, step back from the cyber range to reflect on what their time in Tallinn really meant. This episode moves beyond the mechanics of the exercise and into the broader stakes of collective cyber defense in an increasingly uncertain geopolitical moment.

Recorded two months after their visit, the conversation blends field tape and personal reflections — from standing outside the Russian Embassy in Old Town to recalling the weight inside NATO’s secure facilities. Estonia’s history, including the 2007 cyberattacks, and its visible solidarity with Ukraine underscore just how real and proximate the risks remain.

Be sure to check out the first two episodes of this three part series, you can find them below.

Episode one can be found ⁠here⁠.

Episode two can be found here. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 02 Mar 2026 08:00:00 -0000</pubDate>
      <itunes:title>Cyber Without Borders: Standing guard 210 kilometers from risk. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>92</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9f141e0a-135f-11f1-a7be-b7b1a6cb4b27/image/0216c9cea15c53e5d2c739964a38623c.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In the final installment of our three-part series on ⁠Cyber Coalition 2025⁠⁠, ⁠⁠Maria Varmazis⁠⁠⁠, host here at N2K CyberWire, and ⁠⁠⁠Liz Stokes, CyberWire Producer, step back from the cyber range to reflect on what their time in Tallinn really meant. This episode moves beyond the mechanics of the exercise and into the broader stakes of collective cyber defense in an increasingly uncertain geopolitical moment.

Recorded two months after their visit, the conversation blends field tape and personal reflections — from standing outside the Russian Embassy in Old Town to recalling the weight inside NATO’s secure facilities. Estonia’s history, including the 2007 cyberattacks, and its visible solidarity with Ukraine underscore just how real and proximate the risks remain.

Be sure to check out the first two episodes of this three part series, you can find them below.

Episode one can be found ⁠here⁠.

Episode two can be found here. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In the final installment of our three-part series on <a href="https://www.ncia.nato.int/newsroom/news/ncia-facilitates-and-participates-in-cyber-coalition-2025-in-tallinn--estonia?utm_source=chatgpt.com">⁠Cyber Coalition 2025⁠⁠</a>, <a href="https://www.linkedin.com/in/varmazis/">⁠⁠<u>Maria Varmazis</u>⁠⁠⁠</a>, host here at N2K CyberWire, and <a href="https://www.linkedin.com/in/elizabeth-stokes-183925181/">⁠⁠⁠<u>Liz Stokes</u></a>, CyberWire Producer, step back from the cyber range to reflect on what their time in Tallinn really meant. This episode moves beyond the mechanics of the exercise and into the broader stakes of collective cyber defense in an increasingly uncertain geopolitical moment.</p>
<p>Recorded two months after their visit, the conversation blends field tape and personal reflections — from standing outside the Russian Embassy in Old Town to recalling the weight inside NATO’s secure facilities. Estonia’s history, including the 2007 cyberattacks, and its visible solidarity with Ukraine underscore just how real and proximate the risks remain.</p>
<p>Be sure to check out the first two episodes of this three part series, you can find them below.</p>
<p>Episode one can be found <a href="https://thecyberwire.com/podcasts/special-edition/90/notes">⁠here⁠</a>.</p>
<p>Episode two can be found <a href="https://thecyberwire.com/podcasts/special-edition/91/notes">here</a>. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1559</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9f141e0a-135f-11f1-a7be-b7b1a6cb4b27]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3394161756.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Larry Cashdollar: Always learning new technology. [Intelligence response engineer]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/110/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Larry Cashdollar, Principal Security Intelligence Response Engineer at Akamai Technologies, sits down with Dave Bittner to discuss his life leading up to working at Akamai. He shares his story from his beginnings to now, describing what college life was like as a young computer enthusiast. He says "If you look at my 1986 yearbook, I think it was my sixth grade class, it says computer scientist for my career path. So I had a love of computers when I was really young. I guess I knew what field I wanted to get into right off the bat." He describes different career paths that all led him to his current position. He also shares his love for computers and technology through the decades of his youth, and how he is learning, even now. We thank Larry for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 01 Mar 2026 08:00:00 -0000</pubDate>
      <itunes:title>Larry Cashdollar: Always learning new technology. [Intelligence response engineer]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>110</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/be29414a-140d-11f1-9799-6f90e8b5cca9/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Larry Cashdollar, Principal Security Intelligence Response Engineer at Akamai Technologies, sits down with Dave Bittner to discuss his life leading up to working at Akamai. He shares his story from his beginnings to now, describing what college life was like as a young computer enthusiast. He says "If you look at my 1986 yearbook, I think it was my sixth grade class, it says computer scientist for my career path. So I had a love of computers when I was really young. I guess I knew what field I wanted to get into right off the bat." He describes different career paths that all led him to his current position. He also shares his love for computers and technology through the decades of his youth, and how he is learning, even now. We thank Larry for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Larry Cashdollar, Principal Security Intelligence Response Engineer at Akamai Technologies, sits down with Dave Bittner to discuss his life leading up to working at Akamai. He shares his story from his beginnings to now, describing what college life was like as a young computer enthusiast. He says "If you look at my 1986 yearbook, I think it was my sixth grade class, it says computer scientist for my career path. So I had a love of computers when I was really young. I guess I knew what field I wanted to get into right off the bat." He describes different career paths that all led him to his current position. He also shares his love for computers and technology through the decades of his youth, and how he is learning, even now. We thank Larry for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>559</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[be29414a-140d-11f1-9799-6f90e8b5cca9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1264357291.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The parking lot of digital danger. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/414/notes</link>
      <description>This week we are joined by Dr. Renée Burton, Vice President of Infoblox Threat Intel, discussing "Parked Domains and Direct Search: An Underreported Security Risk." Parked domains are no longer harmless ad pages — new research finds that in today’s “direct search” or zero-click parking ecosystem, more than 90% of visits to certain parked lookalike domains lead to scams, malware, or deceptive content, often hidden behind layers of traffic distribution systems and device fingerprinting. 

The report details three previously unpublished domain portfolio actors who weaponize typosquatting, DNS manipulation — including rare “double fast flux” techniques highlighted in a 2025 advisory from Cybersecurity and Infrastructure Security Agency — and even misconfigured name server records to evade detection and funnel real users toward malicious advertisers. Beyond malvertising, some parked lookalike domains collect misdirected email, fuel business email compromise, and exploit outdated links — including those surfaced by generative AI — underscoring how a simple typo can expose users and enterprises to significant risk.

The research can be found here:


  Parked Domains Become Weapons with Direct Search Advertising


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Feb 2026 08:00:00 -0000</pubDate>
      <itunes:title>The parking lot of digital danger. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>414</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/88887ef4-1410-11f1-b12a-5752fb0c7cd0/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by Dr. Renée Burton, Vice President of Infoblox Threat Intel, discussing "Parked Domains and Direct Search: An Underreported Security Risk." Parked domains are no longer harmless ad pages — new research finds that in today’s “direct search” or zero-click parking ecosystem, more than 90% of visits to certain parked lookalike domains lead to scams, malware, or deceptive content, often hidden behind layers of traffic distribution systems and device fingerprinting. 

The report details three previously unpublished domain portfolio actors who weaponize typosquatting, DNS manipulation — including rare “double fast flux” techniques highlighted in a 2025 advisory from Cybersecurity and Infrastructure Security Agency — and even misconfigured name server records to evade detection and funnel real users toward malicious advertisers. Beyond malvertising, some parked lookalike domains collect misdirected email, fuel business email compromise, and exploit outdated links — including those surfaced by generative AI — underscoring how a simple typo can expose users and enterprises to significant risk.

The research can be found here:


  Parked Domains Become Weapons with Direct Search Advertising


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by <a href="https://www.linkedin.com/in/ren%C3%A9e-burton-b7161110b/">Dr. Renée Burton</a>, Vice President of <a href="https://www.linkedin.com/company/infoblox/">Infoblox</a> Threat Intel, discussing "Parked Domains and Direct Search: An Underreported Security Risk." Parked domains are no longer harmless ad pages — new research finds that in today’s “direct search” or zero-click parking ecosystem, more than 90% of visits to certain parked lookalike domains lead to scams, malware, or deceptive content, often hidden behind layers of traffic distribution systems and device fingerprinting. </p>
<p>The report details three previously unpublished domain portfolio actors who weaponize typosquatting, DNS manipulation — including rare “double fast flux” techniques highlighted in a 2025 advisory from Cybersecurity and Infrastructure Security Agency — and even misconfigured name server records to evade detection and funnel real users toward malicious advertisers. Beyond malvertising, some parked lookalike domains collect misdirected email, fuel business email compromise, and exploit outdated links — including those surfaced by generative AI — underscoring how a simple typo can expose users and enterprises to significant risk.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.infoblox.com/blog/threat-intelligence/parked-domains-become-weapons-with-direct-search-advertising/">Parked Domains Become Weapons with Direct Search Advertising</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1273</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[88887ef4-1410-11f1-b12a-5752fb0c7cd0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4189248133.mp3?updated=1772139699" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leadership shakeup at CISA.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2498/notes</link>
      <description>CISA’s acting director exits. Trump’s pick to lead the NSA hits Senate headwinds. The Pentagon pressures Anthropic over AI guardrails. A new WiFi attack sidesteps encryption. CISA flags flaws in EV chargers. Juniper patches a critical router bug. ManoMano discloses a massive breach. Europol cracks down on The Com. Greece delivers verdicts in Predatorgate. An alleged carding kingpin lands in U.S. custody. Jeff Williams, Founder of OWASP and Co-Founder/CTO of Contrast Security, shares how NIST is rethinking its role in analyzing software vulnerabilities as EU launches GCVE. Meta’s mischievous monocles meet their match. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we have Jeff Williams, Founder of OWASP and Co-Founder/CTO of Contrast Security, sharing how NIST is rethinking its role in analyzing software vulnerabilities as EU launches GCVE. If you enjoyed this conversation, you can hear the full interview over on the Caveat podcast.

Selected Reading

Gottumukkala out, Andersen in as acting CISA director (CyberScoop)

Senator seeks to block Trump’s NSA pick, citing civil liberties concerns (The Washington Post)

Anthropic Refuses to Bend to Pentagon on AI Safeguards as Dispute Nears Deadline (SecurityWeek)

New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises (Ars Technica)

Critical Vulnerabilities in SWITCH EV Charging Platform Allow Station Impersonation (Beyond Machines)

Juniper Networks PTX Routers Affected by Critical Vulnerability (SecurityWeek)

38 Million Allegedly Impacted by ManoMano Data Breach (SecurityWeek)

‘Project Compass’ Cracks Down on ‘The Com’: 30 Members Arrested (Infosecurity Magazine)

Greek court sentences Predator spyware gang (POLITICO)

Chilean Carding Shop Operator Extradited to US (SecurityWeek)

This App Warns You if Someone Is Wearing Smart Glasses Nearby  (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 27 Feb 2026 21:30:00 -0000</pubDate>
      <itunes:title>Leadership shakeup at CISA.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2498</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA’s acting director exits. Trump’s pick to lead the NSA hits Senate headwinds. The Pentagon pressures Anthropic over AI guardrails. A new WiFi attack sidesteps encryption. CISA flags flaws in EV chargers. Juniper patches a critical router bug. ManoMano discloses a massive breach. Europol cracks down on The Com. Greece delivers verdicts in Predatorgate. An alleged carding kingpin lands in U.S. custody. Jeff Williams, Founder of OWASP and Co-Founder/CTO of Contrast Security, shares how NIST is rethinking its role in analyzing software vulnerabilities as EU launches GCVE. Meta’s mischievous monocles meet their match. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we have Jeff Williams, Founder of OWASP and Co-Founder/CTO of Contrast Security, sharing how NIST is rethinking its role in analyzing software vulnerabilities as EU launches GCVE. If you enjoyed this conversation, you can hear the full interview over on the Caveat podcast.

Selected Reading

Gottumukkala out, Andersen in as acting CISA director (CyberScoop)

Senator seeks to block Trump’s NSA pick, citing civil liberties concerns (The Washington Post)

Anthropic Refuses to Bend to Pentagon on AI Safeguards as Dispute Nears Deadline (SecurityWeek)

New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises (Ars Technica)

Critical Vulnerabilities in SWITCH EV Charging Platform Allow Station Impersonation (Beyond Machines)

Juniper Networks PTX Routers Affected by Critical Vulnerability (SecurityWeek)

38 Million Allegedly Impacted by ManoMano Data Breach (SecurityWeek)

‘Project Compass’ Cracks Down on ‘The Com’: 30 Members Arrested (Infosecurity Magazine)

Greek court sentences Predator spyware gang (POLITICO)

Chilean Carding Shop Operator Extradited to US (SecurityWeek)

This App Warns You if Someone Is Wearing Smart Glasses Nearby  (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA’s acting director exits. Trump’s pick to lead the NSA hits Senate headwinds. The Pentagon pressures Anthropic over AI guardrails. A new WiFi attack sidesteps encryption. CISA flags flaws in EV chargers. Juniper patches a critical router bug. ManoMano discloses a massive breach. Europol cracks down on The Com. Greece delivers verdicts in Predatorgate. An alleged carding kingpin lands in U.S. custody. Jeff Williams, Founder of OWASP and Co-Founder/CTO of Contrast Security, shares how NIST is rethinking its role in analyzing software vulnerabilities as EU launches GCVE. Meta’s mischievous monocles meet their match. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we have<a href="https://www.linkedin.com/in/planetlevel/"><u> Jeff Williams</u></a>, Founder of OWASP and Co-Founder/CTO of<a href="https://www.linkedin.com/company/contrast-security/"><u> Contrast Security</u></a>, sharing how NIST is rethinking its role in analyzing software vulnerabilities as EU launches GCVE. If you enjoyed this conversation, you can hear the full interview over on the<a href="https://thecyberwire.com/podcasts/caveat/297/notes"><u> Caveat</u></a> podcast.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://cyberscoop.com/cisa-leadership-change-madhu-gottumukkala-nick-andersen/"><u>Gottumukkala out, Andersen in as acting CISA director</u></a> (CyberScoop)</p>
<p><a href="https://wapo.st/3ZZ397Q"><u>Senator seeks to block Trump’s NSA pick, citing civil liberties concerns</u></a> (The Washington Post)</p>
<p><a href="https://www.securityweek.com/anthropic-refuses-to-bend-to-pentagon-on-ai-safeguards-as-dispute-nears-deadline/"><u>Anthropic Refuses to Bend to Pentagon on AI Safeguards as Dispute Nears Deadline</u></a> (SecurityWeek)</p>
<p><a href="https://arstechnica.com/security/2026/02/new-airsnitch-attack-breaks-wi-fi-encryption-in-homes-offices-and-enterprises/"><u>New AirSnitch attack bypasses Wi-Fi encryption in homes, offices, and enterprises</u></a> (Ars Technica)</p>
<p><a href="https://beyondmachines.net/event_details/critical-vulnerabilities-in-switch-ev-charging-platform-allow-station-impersonation-e-g-h-5-x/gD2P6Ple2L"><u>Critical Vulnerabilities in SWITCH EV Charging Platform Allow Station Impersonation</u></a> (Beyond Machines)</p>
<p><a href="https://www.securityweek.com/juniper-networks-ptx-routers-affected-by-critical-vulnerability/"><u>Juniper Networks PTX Routers Affected by Critical Vulnerability</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/38-million-allegedly-impacted-by-manomano-data-breach/"><u>38 Million Allegedly Impacted by ManoMano Data Breach</u></a> (SecurityWeek)</p>
<p><a href="https://www.infosecurity-magazine.com/news/project-compass-com-arrests/"><u>‘Project Compass’ Cracks Down on ‘The Com’: 30 Members Arrested</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.politico.eu/article/predatorgate-greece-court-sentences-predator-spyware-gang/"><u>Greek court sentences Predator spyware gang</u></a> (POLITICO)</p>
<p><a href="https://www.securityweek.com/chilean-carding-shop-operator-extradited-to-us/"><u>Chilean Carding Shop Operator Extradited to US</u></a> (SecurityWeek)</p>
<p><a href="https://www.404media.co/this-app-warns-you-if-someone-is-wearing-smart-glasses-nearby/"><u>This App Warns You if Someone Is Wearing Smart Glasses Nearby</u></a>  (404 Media)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1576</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10733432-fae2-11f0-8b3b-eb4ca441d893]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4835510101.mp3?updated=1772220910" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rogue peers and hidden exploits.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2497/notes</link>
      <description>Five Eyes flags active exploitation of Cisco SD-WAN flaws. Ransomware incidents surge, but fewer victims are paying. The FTC eases its stance on COPPA to encourage age verification. Authorities in Poland and Germany charge 11 in a Facebook credential harvesting scheme. Top UK news outlets unite on AI licensing standards, as the UK touts gains in cyber resilience. Researchers say a hacker abused Anthropic’s Claude to breach Mexican government networks. Gamers revolt over AI in game development. On our Industry Voices, we are joined by Linda Gray Martin, Chief of Staff and SVP, and Britta Glade, SVP of Content and Communities, from RSAC sharing what is new at RSAC 2026. In Moscow, a man is accused of impersonating an FSB officer to shake down the Conti ransomware gang. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today on our Industry Voices, we are joined by Linda Gray Martin, Chief of Staff and SVP, and Britta Glade, SVP of Content and Communities, from RSAC sharing what is new at RSAC 2026.

Selected Reading

Cisco SD-WAN Is Actively Exploited by UAT-8616, Five Eyes Alliance Agencies Issue Warning (TechNadu)

Ransomware payments dropped in 2025 as attack numbers reached record levels: Chainalysis (The Record)

FTC Softens Enforcement of Rule Protecting Children Online, Ostensibly to Protect Children Online (Gizmodo)

Poland Cybercrime Unit Uncovers Scheme Stealing 100,000 Facebook Logins (The 420)

UK news giants form 'NATO for news' group to control AI scraping (Press Gazette)

Government cuts cyber-attack fix times by 84% and launches new profession to protect public services (GOV.UK)

Hacker Used Anthropic’s Claude to Steal Sensitive Mexican Data (Bloomberg)

AI Mistakes Are Infuriating Gamers as Developers Seek Savings (Bloomberg)

Moscow man accused of posing as FSB officer to extort Conti ransomware gang (The Record)

AIs can’t stop recommending nuclear strikes in war game simulations (New Scientist)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 26 Feb 2026 21:30:00 -0000</pubDate>
      <itunes:title>Rogue peers and hidden exploits.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2497</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Five Eyes flags active exploitation of Cisco SD-WAN flaws. Ransomware incidents surge, but fewer victims are paying. The FTC eases its stance on COPPA to encourage age verification. Authorities in Poland and Germany charge 11 in a Facebook credential harvesting scheme. Top UK news outlets unite on AI licensing standards, as the UK touts gains in cyber resilience. Researchers say a hacker abused Anthropic’s Claude to breach Mexican government networks. Gamers revolt over AI in game development. On our Industry Voices, we are joined by Linda Gray Martin, Chief of Staff and SVP, and Britta Glade, SVP of Content and Communities, from RSAC sharing what is new at RSAC 2026. In Moscow, a man is accused of impersonating an FSB officer to shake down the Conti ransomware gang. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today on our Industry Voices, we are joined by Linda Gray Martin, Chief of Staff and SVP, and Britta Glade, SVP of Content and Communities, from RSAC sharing what is new at RSAC 2026.

Selected Reading

Cisco SD-WAN Is Actively Exploited by UAT-8616, Five Eyes Alliance Agencies Issue Warning (TechNadu)

Ransomware payments dropped in 2025 as attack numbers reached record levels: Chainalysis (The Record)

FTC Softens Enforcement of Rule Protecting Children Online, Ostensibly to Protect Children Online (Gizmodo)

Poland Cybercrime Unit Uncovers Scheme Stealing 100,000 Facebook Logins (The 420)

UK news giants form 'NATO for news' group to control AI scraping (Press Gazette)

Government cuts cyber-attack fix times by 84% and launches new profession to protect public services (GOV.UK)

Hacker Used Anthropic’s Claude to Steal Sensitive Mexican Data (Bloomberg)

AI Mistakes Are Infuriating Gamers as Developers Seek Savings (Bloomberg)

Moscow man accused of posing as FSB officer to extort Conti ransomware gang (The Record)

AIs can’t stop recommending nuclear strikes in war game simulations (New Scientist)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Five Eyes flags active exploitation of Cisco SD-WAN flaws. Ransomware incidents surge, but fewer victims are paying. The FTC eases its stance on COPPA to encourage age verification. Authorities in Poland and Germany charge 11 in a Facebook credential harvesting scheme. Top UK news outlets unite on AI licensing standards, as the UK touts gains in cyber resilience. Researchers say a hacker abused Anthropic’s Claude to breach Mexican government networks. Gamers revolt over AI in game development. On our Industry Voices, we are joined by Linda Gray Martin, Chief of Staff and SVP, and Britta Glade, SVP of Content and Communities, from RSAC sharing what is new at RSAC 2026. In Moscow, a man is accused of impersonating an FSB officer to shake down the Conti ransomware gang. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today on our Industry Voices, we are joined by <a href="https://www.linkedin.com/in/linda-gray-martin-223708/"><u>Linda Gray Martin</u></a>, Chief of Staff and SVP, and <a href="https://www.linkedin.com/in/britta-glade-5251003/"><u>Britta Glade</u></a>, SVP of Content and Communities, from <a href="https://www.linkedin.com/company/one-rsac/"><u>RSAC</u></a> sharing what is new at RSAC 2026.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.technadu.com/cisco-sd-wan-is-actively-exploited-by-uat-8616-five-eyes-alliance-agencies-issue-warning/621036/"><u>Cisco SD-WAN Is Actively Exploited by UAT-8616, Five Eyes Alliance Agencies Issue Warning</u></a> (TechNadu)</p>
<p><a href="https://therecord.media/ransomware-payments-chainalysis-cybercrime"><u>Ransomware payments dropped in 2025 as attack numbers reached record levels: Chainalysis</u></a> (The Record)</p>
<p><a href="https://gizmodo.com/ftc-softens-enforcement-of-rule-protecting-children-online-ostensibly-to-protect-children-online-2000726886"><u>FTC Softens Enforcement of Rule Protecting Children Online, Ostensibly to Protect Children Online</u></a> (Gizmodo)</p>
<p><a href="https://the420.in/poland-cybercrime-bureau-facebook-phishing-100k-logins-germany-case/"><u>Poland Cybercrime Unit Uncovers Scheme Stealing 100,000 Facebook Logins</u></a> (The 420)</p>
<p><a href="https://pressgazette.co.uk/news/uk-news-giants-form-nato-for-news-group-to-defend-against-ai/"><u>UK news giants form 'NATO for news' group to control AI scraping</u></a> (Press Gazette)</p>
<p><a href="https://www.gov.uk/government/news/government-cuts-cyber-attack-fix-times-by-84-and-launches-new-profession-to-protect-public-services"><u>Government cuts cyber-attack fix times by 84% and launches new profession to protect public services</u></a> (GOV.UK)</p>
<p><a href="https://www.bloomberg.com/news/articles/2026-02-25/hacker-used-anthropic-s-claude-to-steal-sensitive-mexican-data"><u>Hacker Used Anthropic’s Claude to Steal Sensitive Mexican Data</u></a> (Bloomberg)</p>
<p><a href="https://www.bloomberg.com/news/articles/2026-02-25/ai-mistakes-are-infuriating-gamers-as-developers-seek-savings?accessToken=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzb3VyY2UiOiJTdWJzY3JpYmVyR2lmdGVkQXJ0aWNsZSIsImlhdCI6MTc3MjA3ODcwNiwiZXhwIjoxNzcyNjgzNTA2LCJhcnRpY2xlSWQiOiJUQjFCUzRLR0NUTkYwMCIsImJjb25uZWN0SWQiOiJERDEzODM4MTc2MTc0NEYzODBBODhGRjlEQkI2MkEwOCJ9.oHnSZQ7q7B3tT_wkY1G5nd9qu94YLTR958tv7qhKAEU"><u>AI Mistakes Are Infuriating Gamers as Developers Seek Savings</u></a> (Bloomberg)</p>
<p><a href="https://therecord.media/moscow-man-accused-of-extorting-conti-gang"><u>Moscow man accused of posing as FSB officer to extort Conti ransomware gang</u></a> (The Record)</p>
<p><a href="https://www.newscientist.com/article/2516885-ais-cant-stop-recommending-nuclear-strikes-in-war-game-simulations/"><u>AIs can’t stop recommending nuclear strikes in war game simulations</u></a> (New Scientist)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1719</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[109bec2e-fae2-11f0-8b3b-a31e5782fcb4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9051775060.mp3?updated=1772136553" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A new front in the data sovereignty debate.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2496/notes</link>
      <description>Trump tells diplomats to fight digital sovereignty. DeepSeek allegedly trains on banned Nvidia chips. Google knocks out Gallium. Hackers tamper with patient records in New Zealand. Popular mental health apps leak risk. Wynn confirms a ShinyHunters breach. Telecoms dodge New York cyber rules. Russia targets Telegram’s founder. And a defense insider heads to prison for selling cyber weapons to Moscow. Andrew Dunbar, CISO of Shopify, discusses how identity and trust become the new perimeter and how commerce needs both. Barking backlash brews beneath big-game broadcast.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Andrew Dunbar, CISO of Shopify, to discuss how identity and trust become the new perimeter and how commerce needs both to be engineered into the platform.

Selected Reading

Exclusive: US orders diplomats to fight data sovereignty initiatives (Reuters)

Exclusive: China's DeepSeek trained AI model on Nvidia's best chip despite US ban, official says (Reuters)

Google disrupts Chinese-linked hackers that attacked 53 groups globally (Reuters)

Patient data changed as major NZ health app MediMap hacked (RNZ News)

Android mental health apps with 14.7M installs filled with security flaws (Bleeping Computer)

Wynn Resorts Confirms Cyberattack &amp; Extortion Threat, Claims Data Deleted (Casino.org)

Verizon successfully dodged data security rules from state regulators (Times Union)

Russia opens probe of Telegram chief, claiming app has been used for terrorism (Washington Post) 

Former Defense Contractor Sentenced to 87 Months in Prison for Selling Secrets to Russia: Peter Williams Trade Secrets Case Concludes (TechNadu)

$10,000 bounty offered if you can hack Ring cameras to stop them sharing your data with Amazon (Bitdefender)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 25 Feb 2026 21:30:00 -0000</pubDate>
      <itunes:title>A new front in the data sovereignty debate.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2496</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Trump tells diplomats to fight digital sovereignty. DeepSeek allegedly trains on banned Nvidia chips. Google knocks out Gallium. Hackers tamper with patient records in New Zealand. Popular mental health apps leak risk. Wynn confirms a ShinyHunters breach. Telecoms dodge New York cyber rules. Russia targets Telegram’s founder. And a defense insider heads to prison for selling cyber weapons to Moscow. Andrew Dunbar, CISO of Shopify, discusses how identity and trust become the new perimeter and how commerce needs both. Barking backlash brews beneath big-game broadcast.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Andrew Dunbar, CISO of Shopify, to discuss how identity and trust become the new perimeter and how commerce needs both to be engineered into the platform.

Selected Reading

Exclusive: US orders diplomats to fight data sovereignty initiatives (Reuters)

Exclusive: China's DeepSeek trained AI model on Nvidia's best chip despite US ban, official says (Reuters)

Google disrupts Chinese-linked hackers that attacked 53 groups globally (Reuters)

Patient data changed as major NZ health app MediMap hacked (RNZ News)

Android mental health apps with 14.7M installs filled with security flaws (Bleeping Computer)

Wynn Resorts Confirms Cyberattack &amp; Extortion Threat, Claims Data Deleted (Casino.org)

Verizon successfully dodged data security rules from state regulators (Times Union)

Russia opens probe of Telegram chief, claiming app has been used for terrorism (Washington Post) 

Former Defense Contractor Sentenced to 87 Months in Prison for Selling Secrets to Russia: Peter Williams Trade Secrets Case Concludes (TechNadu)

$10,000 bounty offered if you can hack Ring cameras to stop them sharing your data with Amazon (Bitdefender)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Trump tells diplomats to fight digital sovereignty. DeepSeek allegedly trains on banned Nvidia chips. Google knocks out Gallium. Hackers tamper with patient records in New Zealand. Popular mental health apps leak risk. Wynn confirms a ShinyHunters breach. Telecoms dodge New York cyber rules. Russia targets Telegram’s founder. And a defense insider heads to prison for selling cyber weapons to Moscow. Andrew Dunbar, CISO of Shopify, discusses how identity and trust become the new perimeter and how commerce needs both. Barking backlash brews beneath big-game broadcast.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/andrew-dunbar-37605911/?originalSubdomain=ca"><u>Andrew Dunbar</u></a>, CISO of <a href="https://www.linkedin.com/company/shopify/"><u>Shopify</u></a>, to discuss how identity and trust become the new perimeter and how commerce needs both to be engineered into the platform.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.reuters.com/sustainability/boards-policy-regulation/us-orders-diplomats-fight-data-sovereignty-initiatives-2026-02-25/"><u>Exclusive: US orders diplomats to fight data sovereignty initiatives</u></a> (Reuters)</p>
<p><a href="https://www.reuters.com/world/china/chinas-deepseek-trained-ai-model-nvidias-best-chip-despite-us-ban-official-says-2026-02-24/"><u>Exclusive: China's DeepSeek trained AI model on Nvidia's best chip despite US ban, official says</u></a> (Reuters)</p>
<p><a href="https://www.reuters.com/sustainability/boards-policy-regulation/google-disrupts-chinese-linked-hackers-that-attacked-53-groups-globally-2026-02-25/"><u>Google disrupts Chinese-linked hackers that attacked 53 groups globally</u></a> (Reuters)</p>
<p><a href="https://www.rnz.co.nz/news/national/587773/patient-data-changed-as-major-nz-health-app-medimap-hacked"><u>Patient data changed as major NZ health app MediMap hacked</u></a> (RNZ News)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/android-mental-health-apps-with-147m-installs-filled-with-security-flaws/amp/"><u>Android mental health apps with 14.7M installs filled with security flaws</u></a> (Bleeping Computer)</p>
<p><a href="https://www.casino.org/news/wynn-resorts-confirms-cyberattack-extortion-threat-claims-data-deleted/"><u>Wynn Resorts Confirms Cyberattack &amp; Extortion Threat, Claims Data Deleted</u></a> (Casino.org)</p>
<p><a href="https://www.timesunion.com/capitol/article/phone-companies-won-t-meet-cyber-security-21343573.php"><u>Verizon successfully dodged data security rules from state regulators</u></a> (Times Union)</p>
<p><a href="https://www.washingtonpost.com/world/2026/02/24/russia-telegram-pavel-durov-investigation/"><u>Russia opens probe of Telegram chief, claiming app has been used for terrorism</u></a> (Washington Post) </p>
<p><a href="https://www.technadu.com/former-defense-contractor-sentenced-to-87-months-in-prison-for-selling-secrets-to-russia-peter-williams-trade-secrets-case-concludes/620787/"><u>Former Defense Contractor Sentenced to 87 Months in Prison for Selling Secrets to Russia: Peter Williams Trade Secrets Case Concludes</u></a> (TechNadu)</p>
<p><a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/10-000-bounty-hack-ring-cameras"><u>$10,000 bounty offered if you can hack Ring cameras to stop them sharing your data with Amazon</u></a><em> </em>(Bitdefender)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1768</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10c0878c-fae2-11f0-8b3b-4345a444c97f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4150794179.mp3?updated=1772051937" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Multiple root-level risks resolved.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2495/notes</link>
      <description>SolarWinds patches four critical remote code execution vulnerabilities. A ransomware attack on Conduant puts the data of over 25 million Americans at risk. RoguePilot enables Github repository takeovers. ZeroDayRat targets Android and iOS devices. North Korea’s Lazarus group deploy Medusa ransomware against organizations in the U.S. and the Middle East. Attackers’ breakout times drop to under half an hour.  CISA maintains its mission despite staffing challenges. Russian satellites draw fresh scrutiny. Two South Korean teenagers are charged with breaching Seoul’s public bike service. Krishna Sai, CTO at SolarWinds, discusses why leaders should focus less on speculating about an AI bubble, and more on how to quantify AI’s tangible contributions. The Pope pushes prayerful priests past predictable programs. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Krishna Sai, CTO at SolarWinds, discussing why leaders should focus less on speculating about an AI bubble, and more on how to quantify AI’s tangible contributions.

Selected Reading

Critical SolarWinds Serv-U flaws offer root access to servers (Bleeping Computer)

Massive Conduent Data Breach Exfiltrates 8 TB Affects Over 25 Million Americans (GB Hackers)

GitHub Issues Abused in Copilot Attack Leading to Repository Takeover (SecurityWeek)

New ZeroDayRAT Malware Claims Full Monitoring of Android and iOS Devices (Hackread)

North Korean state hackers seen using Medusa ransomware in attacks on US, Middle East (The Record)

CrowdStrike says attackers are moving through networks in under 30 minutes (CyberScoop)

Shutdown at D.H.S. Extends to Cyber Agency, Adding to Setbacks (The New York Times)

From Cold War interceptors to Ukraine: how Russia came to park spy satellites next to the West’s most sensitive tech in orbit (Meduza)

Korean cops charge two teens over Seoul bike hire breach (The Register)

Pope tells priests to use their brains, not AI, to write homilies (EWTN News)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Feb 2026 21:10:00 -0000</pubDate>
      <itunes:title>Multiple root-level risks resolved.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2495</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>SolarWinds patches four critical remote code execution vulnerabilities. A ransomware attack on Conduant puts the data of over 25 million Americans at risk. RoguePilot enables Github repository takeovers. ZeroDayRat targets Android and iOS devices. North Korea’s Lazarus group deploy Medusa ransomware against organizations in the U.S. and the Middle East. Attackers’ breakout times drop to under half an hour.  CISA maintains its mission despite staffing challenges. Russian satellites draw fresh scrutiny. Two South Korean teenagers are charged with breaching Seoul’s public bike service. Krishna Sai, CTO at SolarWinds, discusses why leaders should focus less on speculating about an AI bubble, and more on how to quantify AI’s tangible contributions. The Pope pushes prayerful priests past predictable programs. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Krishna Sai, CTO at SolarWinds, discussing why leaders should focus less on speculating about an AI bubble, and more on how to quantify AI’s tangible contributions.

Selected Reading

Critical SolarWinds Serv-U flaws offer root access to servers (Bleeping Computer)

Massive Conduent Data Breach Exfiltrates 8 TB Affects Over 25 Million Americans (GB Hackers)

GitHub Issues Abused in Copilot Attack Leading to Repository Takeover (SecurityWeek)

New ZeroDayRAT Malware Claims Full Monitoring of Android and iOS Devices (Hackread)

North Korean state hackers seen using Medusa ransomware in attacks on US, Middle East (The Record)

CrowdStrike says attackers are moving through networks in under 30 minutes (CyberScoop)

Shutdown at D.H.S. Extends to Cyber Agency, Adding to Setbacks (The New York Times)

From Cold War interceptors to Ukraine: how Russia came to park spy satellites next to the West’s most sensitive tech in orbit (Meduza)

Korean cops charge two teens over Seoul bike hire breach (The Register)

Pope tells priests to use their brains, not AI, to write homilies (EWTN News)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>SolarWinds patches four critical remote code execution vulnerabilities. A ransomware attack on Conduant puts the data of over 25 million Americans at risk. RoguePilot enables Github repository takeovers. ZeroDayRat targets Android and iOS devices. North Korea’s Lazarus group deploy Medusa ransomware against organizations in the U.S. and the Middle East. Attackers’ breakout times drop to under half an hour.  CISA maintains its mission despite staffing challenges. Russian satellites draw fresh scrutiny. Two South Korean teenagers are charged with breaching Seoul’s public bike service. Krishna Sai, CTO at SolarWinds, discusses why leaders should focus less on speculating about an AI bubble, and more on how to quantify AI’s tangible contributions. The Pope pushes prayerful priests past predictable programs. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/krishnasai/"><u>Krishna Sai</u></a>, CTO at <a href="https://www.linkedin.com/company/solarwinds/"><u>SolarWinds</u></a>, discussing why leaders should focus less on speculating about an AI bubble, and more on how to quantify AI’s tangible contributions.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/critical-solarwinds-serv-u-flaws-offer-root-access-to-servers/"><u>Critical SolarWinds Serv-U flaws offer root access to servers</u></a> (Bleeping Computer)</p>
<p><a href="https://gbhackers.com/massive-conduent-data-breach/"><u>Massive Conduent Data Breach Exfiltrates 8 TB Affects Over 25 Million Americans</u></a> (GB Hackers)</p>
<p><a href="https://www.securityweek.com/github-issues-abused-in-copilot-attack-leading-to-repository-takeover/"><u>GitHub Issues Abused in Copilot Attack Leading to Repository Takeover</u></a> (SecurityWeek)</p>
<p><a href="https://hackread.com/zerodayrat-malware-monitoring-android-ios-devices/"><u>New ZeroDayRAT Malware Claims Full Monitoring of Android and iOS Devices</u></a> (Hackread)</p>
<p><a href="https://therecord.media/north-korean-hackers-using-medusa-ransomware"><u>North Korean state hackers seen using Medusa ransomware in attacks on US, Middle East</u></a> (The Record)</p>
<p><a href="https://cyberscoop.com/crowdstrike-annual-global-threat-report-attack-breakout-time/"><u>CrowdStrike says attackers are moving through networks in under 30 minutes</u></a> (CyberScoop)</p>
<p><a href="https://www.nytimes.com/2026/02/22/us/politics/cyber-agency-dhs-security-setbacks.html"><u>Shutdown at D.H.S. Extends to Cyber Agency, Adding to Setbacks</u></a> (The New York Times)</p>
<p><a href="https://meduza.io/en/feature/2026/02/23/from-cold-war-interceptors-to-ukraine-how-russia-came-to-park-spy-satellites-next-to-the-west-s-most-sensitive-tech-in-orbit"><u>From Cold War interceptors to Ukraine: how Russia came to park spy satellites next to the West’s most sensitive tech in orbit</u></a> (Meduza)</p>
<p><a href="https://www.theregister.com/2026/02/24/korean_bike_breach_charges/"><u>Korean cops charge two teens over Seoul bike hire breach</u></a> (The Register)</p>
<p><a href="https://www.ewtnnews.com/vatican/pope-leo-xiv-tells-priests-to-use-their-brains-not-ai-to-write-homilies"><u>Pope tells priests to use their brains, not AI, to write homilies</u></a> (EWTN News)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1692</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10e928e0-fae2-11f0-8b3b-8bee049e7605]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1676309412.mp3?updated=1771965252" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The basics broke telecom.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2494/notes</link>
      <description>A senior FBI cyber official warns Salt Typhoon remains an ongoing threat. Data protection authorities issue a joint statement raising serious concerns about AI image creation. A Japanese semiconductor equipment maker confirms a ransomware attack. New number formats seek to reduce AI overhead. A low-skilled Russian-speaking threat actor compromised more than 600 Fortinet FortiGate firewalls. Spanish authorities have arrested four alleged members of Anonymous. CISA tags a pair of Roundcube Webmail flaws. Cybersecurity stocks fell sharply on news of a new security feature in Claude AI. Monday business breakdown. Brandon Karpf, friend of the show discussing sovereignty in space and cyber. Digital disruption drains drumsticks.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today Dave sits down with Brandon Karpf, friend of the show, and Maria Varmazis, host of T-Minus, as they are discussing sovereignty in space and cyber.

Selected Reading

FBI: Threats from Salt Typhoon are ‘still very much ongoing’ (CyberScoop)

Joint Statement on AI-Generated Imagery and the Protection of Privacy (International Enforcement Cooperation Working Group (IEWG))

Japanese chip-testing toolmaker Advantest suffers ransomware attack (Help Net Security)

AI's Math Tricks Don't Work for Scientific Computing (IEEE)

Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls (Infosecurity Magazine)

Suspected Anonymous members cuffed in Spain over DDoS attack (The Register)

CISA: Recently patched RoundCube flaws now exploited in attacks (Bleeping Computer)

Anthropic Unveils 'Claude Code Security,' Sending Cyber Stocks Lower (Bloomberg)

RSAC Innovation Sandbox finalists secure $5 million each. (N2K Pro Business Briefing)

Cyber attack takes major chicken processor Hazeldenes offline leaving businesses without meat (ABC News)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 23 Feb 2026 21:30:00 -0000</pubDate>
      <itunes:title>The basics broke telecom.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2494</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A senior FBI cyber official warns Salt Typhoon remains an ongoing threat. Data protection authorities issue a joint statement raising serious concerns about AI image creation. A Japanese semiconductor equipment maker confirms a ransomware attack. New number formats seek to reduce AI overhead. A low-skilled Russian-speaking threat actor compromised more than 600 Fortinet FortiGate firewalls. Spanish authorities have arrested four alleged members of Anonymous. CISA tags a pair of Roundcube Webmail flaws. Cybersecurity stocks fell sharply on news of a new security feature in Claude AI. Monday business breakdown. Brandon Karpf, friend of the show discussing sovereignty in space and cyber. Digital disruption drains drumsticks.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today Dave sits down with Brandon Karpf, friend of the show, and Maria Varmazis, host of T-Minus, as they are discussing sovereignty in space and cyber.

Selected Reading

FBI: Threats from Salt Typhoon are ‘still very much ongoing’ (CyberScoop)

Joint Statement on AI-Generated Imagery and the Protection of Privacy (International Enforcement Cooperation Working Group (IEWG))

Japanese chip-testing toolmaker Advantest suffers ransomware attack (Help Net Security)

AI's Math Tricks Don't Work for Scientific Computing (IEEE)

Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls (Infosecurity Magazine)

Suspected Anonymous members cuffed in Spain over DDoS attack (The Register)

CISA: Recently patched RoundCube flaws now exploited in attacks (Bleeping Computer)

Anthropic Unveils 'Claude Code Security,' Sending Cyber Stocks Lower (Bloomberg)

RSAC Innovation Sandbox finalists secure $5 million each. (N2K Pro Business Briefing)

Cyber attack takes major chicken processor Hazeldenes offline leaving businesses without meat (ABC News)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A senior FBI cyber official warns Salt Typhoon remains an ongoing threat. Data protection authorities issue a joint statement raising serious concerns about AI image creation. A Japanese semiconductor equipment maker confirms a ransomware attack. New number formats seek to reduce AI overhead. A low-skilled Russian-speaking threat actor compromised more than 600 Fortinet FortiGate firewalls. Spanish authorities have arrested four alleged members of Anonymous. CISA tags a pair of Roundcube Webmail flaws. Cybersecurity stocks fell sharply on news of a new security feature in Claude AI. Monday business breakdown. Brandon Karpf, friend of the show discussing sovereignty in space and cyber. Digital disruption drains drumsticks.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today Dave sits down with <a href="https://www.linkedin.com/in/brandon-karpf/"><u>Brandon Karpf</u></a>, friend of the show, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a>, host of <a href="https://www.linkedin.com/company/n2k-space/">T-Minus</a>, as they are discussing sovereignty in space and cyber.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://cyberscoop.com/fbi-salt-typhoon-ongoing-threat-cybertalks-2026/"><u>FBI: Threats from Salt Typhoon are ‘still very much ongoing’</u></a> (CyberScoop)</p>
<p><a href="https://ico.org.uk/media2/fb1br3d4/20260223-iewg-joint-statement-on-ai-generated-imagery.pdf"><u>Joint Statement on AI-Generated Imagery and the Protection of Privacy</u></a> (International Enforcement Cooperation Working Group (IEWG))</p>
<p><a href="https://www.helpnetsecurity.com/2026/02/23/advantest-suffers-ransomware-attack/"><u>Japanese chip-testing toolmaker Advantest suffers ransomware attack</u></a> (Help Net Security)</p>
<p><a href="https://spectrum.ieee.org/number-formats-ai-scientific-computing"><u>AI's Math Tricks Don't Work for Scientific Computing</u></a> (IEEE)</p>
<p><a href="https://www.infosecurity-magazine.com/news/russian-threat-actor-genai/"><u>Russian Cyber Threat Actor Uses GenAI to Compromise Fortinet Firewalls</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.theregister.com/2026/02/23/anonymous_arrests_spain/"><u>Suspected Anonymous members cuffed in Spain over DDoS attack</u></a> (The Register)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisa-recently-patched-roundcube-flaws-now-exploited-in-attacks/"><u>CISA: Recently patched RoundCube flaws now exploited in attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bloomberg.com/news/articles/2026-02-20/cyber-stocks-slide-as-anthropic-unveils-claude-code-security"><u>Anthropic Unveils 'Claude Code Security,' Sending Cyber Stocks Lower</u></a> (Bloomberg)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/8/7"><u>RSAC Innovation Sandbox finalists secure $5 million each.</u></a> (N2K Pro Business Briefing)</p>
<p><br><a href="https://www.abc.net.au/news/2026-02-23/cyber-attack-takes-major-chicken-processor-hazeldenes-offline/106376184"><u>Cyber attack takes major chicken processor Hazeldenes offline leaving businesses without meat</u></a> (ABC News)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1888</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[110f85b2-fae2-11f0-8b3b-efe125046b2d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3670194911.mp3?updated=1771877649" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber without borders: The human side of cyber defense. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/91/notes</link>
      <description>In this second installment of our three-part series on ⁠⁠Cyber Coalition 2025⁠⁠, ⁠⁠Maria Varmazis⁠⁠⁠, host of ⁠⁠⁠T-Minus⁠⁠⁠ Space Daily and CyberWire Producer ⁠⁠⁠Liz Stokes,⁠⁠ take listeners inside a single day at NATO’s cyber headquarters in Tallinn, Estonia — focusing on the human side of cyber defense.

Hosted by the NATO Cooperative Cyber Defence Centre of Excellence and led by NATO Allied Command Transformation, Cyber Coalition is a defensive-only exercise built around collaboration, coordination, and information sharing across allied nations. This episode highlights how that plays out in practice, from legal teams working through cross-border policy questions to military defenders coordinating with civilian infrastructure partners inside NATO’s secure cyber range.

In case you missed the first episode of this three part series, check it out ⁠here⁠.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 23 Feb 2026 08:00:00 -0000</pubDate>
      <itunes:title>Cyber without borders: The human side of cyber defense. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>91</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/f77d4ea2-0ea2-11f1-86b2-17a3b0d34c34/image/0216c9cea15c53e5d2c739964a38623c.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this second installment of our three-part series on ⁠⁠Cyber Coalition 2025⁠⁠, ⁠⁠Maria Varmazis⁠⁠⁠, host of ⁠⁠⁠T-Minus⁠⁠⁠ Space Daily and CyberWire Producer ⁠⁠⁠Liz Stokes,⁠⁠ take listeners inside a single day at NATO’s cyber headquarters in Tallinn, Estonia — focusing on the human side of cyber defense.

Hosted by the NATO Cooperative Cyber Defence Centre of Excellence and led by NATO Allied Command Transformation, Cyber Coalition is a defensive-only exercise built around collaboration, coordination, and information sharing across allied nations. This episode highlights how that plays out in practice, from legal teams working through cross-border policy questions to military defenders coordinating with civilian infrastructure partners inside NATO’s secure cyber range.

In case you missed the first episode of this three part series, check it out ⁠here⁠.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this second installment of our three-part series on <a href="https://www.ncia.nato.int/newsroom/news/ncia-facilitates-and-participates-in-cyber-coalition-2025-in-tallinn--estonia?utm_source=chatgpt.com">⁠⁠Cyber Coalition 2025⁠⁠</a>, <a href="https://www.linkedin.com/in/varmazis/">⁠⁠<u>Maria Varmazis</u>⁠⁠⁠</a>, host of <a href="https://space.n2k.com/podcasts/t-minus">⁠⁠⁠<u>T-Minus</u>⁠⁠⁠</a> Space Daily and CyberWire Producer <a href="https://www.linkedin.com/in/elizabeth-stokes-183925181/">⁠⁠⁠<u>Liz Stokes,</u>⁠⁠</a> take listeners inside a single day at NATO’s cyber headquarters in Tallinn, Estonia — focusing on the human side of cyber defense.</p>
<p>Hosted by the NATO Cooperative Cyber Defence Centre of Excellence and led by NATO Allied Command Transformation, Cyber Coalition is a defensive-only exercise built around collaboration, coordination, and information sharing across allied nations. This episode highlights how that plays out in practice, from legal teams working through cross-border policy questions to military defenders coordinating with civilian infrastructure partners inside NATO’s secure cyber range.</p>
<p>In case you missed the first episode of this three part series, check it out <a href="https://thecyberwire.com/podcasts/special-edition/90/notes">⁠here⁠</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1724</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f77d4ea2-0ea2-11f1-86b2-17a3b0d34c34]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3058909688.mp3?updated=1771623860" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mary Writz: Take a negative and make it into a positive. [VP Product Strategy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/109/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Mary Writz, Vice President of Product Strategy at ForgeRock, shares how each career path she has taken has led her to where she is now. Mary describes how she has been a woman working in a male dominated field for most of her career and how she had to take charge, and she had to get the men to take charge with her. She says "I was often leading people, mostly men older than me, potentially smarter than me, more well paid than me. So I had to learn how to think about galvanizing this group to charge forward with me, even though I was a bit of a minority in that way." She also states that she tells herself to always make a positive out of a negative by showing people how you can respond to what's happening with a lot of energy, focus, and care and that's what got her to where she is today.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 22 Feb 2026 08:00:00 -0000</pubDate>
      <itunes:title>Mary Writz: Take a negative and make it into a positive. [VP Product Strategy] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>109</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8f890442-0e9f-11f1-87fa-039a73f0ea35/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Mary Writz, Vice President of Product Strategy at ForgeRock, shares how each career path she has taken has led her to where she is now. Mary describes how she has been a woman working in a male dominated field for most of her career and how she had to take charge, and she had to get the men to take charge with her. She says "I was often leading people, mostly men older than me, potentially smarter than me, more well paid than me. So I had to learn how to think about galvanizing this group to charge forward with me, even though I was a bit of a minority in that way." She also states that she tells herself to always make a positive out of a negative by showing people how you can respond to what's happening with a lot of energy, focus, and care and that's what got her to where she is today.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Mary Writz, Vice President of Product Strategy at ForgeRock, shares how each career path she has taken has led her to where she is now. Mary describes how she has been a woman working in a male dominated field for most of her career and how she had to take charge, and she had to get the men to take charge with her. She says "I was often leading people, mostly men older than me, potentially smarter than me, more well paid than me. So I had to learn how to think about galvanizing this group to charge forward with me, even though I was a bit of a minority in that way." She also states that she tells herself to always make a positive out of a negative by showing people how you can respond to what's happening with a lot of energy, focus, and care and that's what got her to where she is today.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>511</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8f890442-0e9f-11f1-87fa-039a73f0ea35]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9937287755.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Telegram for the throne. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/413/notes</link>
      <description>Today we have Tomer Bar, VP of Security Research at SafeBreach Labs, discussing their work on "Prince of Persia: A Decade of Iranian Nation-State APT Campaign Activity under the Microscope". In this first installment of SafeBreach’s deep dive into the Iranian-linked APT known as “Prince of Persia,” originally exposed by Palo Alto Networks Unit 42, researchers reveal that the group never truly went dark after 2022—but instead evolved. 

Led by Tomer, the investigation uncovers new variants of Foudre and Tonnerre malware, expanded campaign scale, active C2 infrastructure through late 2025, and a shift toward Telegram-based command-and-control. The research provides rare, sustained visibility into nearly a decade of Iranian nation-state cyber operations, offering fresh indicators of compromise and insight into how the group continues to refine its tooling, obfuscation, and targeting.

The research can be found here:


  Prince of Persia, Part 1: A Decade of Iranian Nation-State APT Campaign Activity under the Microscope


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Feb 2026 08:00:00 -0000</pubDate>
      <itunes:title>Telegram for the throne. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>413</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/04b8967a-0de1-11f1-ba55-27b4129a90a8/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Today we have Tomer Bar, VP of Security Research at SafeBreach Labs, discussing their work on "Prince of Persia: A Decade of Iranian Nation-State APT Campaign Activity under the Microscope". In this first installment of SafeBreach’s deep dive into the Iranian-linked APT known as “Prince of Persia,” originally exposed by Palo Alto Networks Unit 42, researchers reveal that the group never truly went dark after 2022—but instead evolved. 

Led by Tomer, the investigation uncovers new variants of Foudre and Tonnerre malware, expanded campaign scale, active C2 infrastructure through late 2025, and a shift toward Telegram-based command-and-control. The research provides rare, sustained visibility into nearly a decade of Iranian nation-state cyber operations, offering fresh indicators of compromise and insight into how the group continues to refine its tooling, obfuscation, and targeting.

The research can be found here:


  Prince of Persia, Part 1: A Decade of Iranian Nation-State APT Campaign Activity under the Microscope


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we have <a href="https://www.linkedin.com/in/tomer-bar-878a348b/">Tomer Bar</a>, VP of Security Research at <a href="https://www.linkedin.com/company/safebreach/">SafeBreach</a> Labs, discussing their work on "Prince of Persia: A Decade of Iranian Nation-State APT Campaign Activity under the Microscope". In this first installment of SafeBreach’s deep dive into the Iranian-linked APT known as “Prince of Persia,” originally exposed by Palo Alto Networks Unit 42, researchers reveal that the group never truly went dark after 2022—but instead evolved. </p>
<p>Led by Tomer, the investigation uncovers new variants of Foudre and Tonnerre malware, expanded campaign scale, active C2 infrastructure through late 2025, and a shift toward Telegram-based command-and-control. The research provides rare, sustained visibility into nearly a decade of Iranian nation-state cyber operations, offering fresh indicators of compromise and insight into how the group continues to refine its tooling, obfuscation, and targeting.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.safebreach.com/blog/prince-of-persia-a-decade-of-an-iranian-nation-state-apt-campaign-activity">Prince of Persia, Part 1: A Decade of Iranian Nation-State APT Campaign Activity under the Microscope</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1281</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04b8967a-0de1-11f1-ba55-27b4129a90a8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4656475202.mp3?updated=1771539670" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Facing a slow-burn confrontation.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2493/notes</link>
      <description>Dutch authorities warn Russia is escalating hybrid operations across Europe. Ransomware shuts down the University of Mississippi Medical Center. PayPal notifies customers of a data breach. The FBI says ATM jackpotting is on the rise. An FBI confidential informant had a hand in online fentanyl sales. TrustConnect malware masquerades as a legitimate remote monitoring and management tool. Researchers uncover the first Android malware to integrate generative AI. A critical zero-day hits Grandstream VOIP phones. The IRS slashes IT staff and technology executives. Our guest is James Turgal, a 22-year FBI vet and VP of global cyber risk and board relations at Optiv, discussing the latest wave of tax scams and IRS fraud. DOGE dudes deliver DEI deathblows.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by James Turgal, a 22-year FBI vet and VP of global cyber risk and board relations at Optiv, discussing the latest wave of tax scams and IRS fraud.

Selected Reading

Russia stepping up hybrid attacks, preparing for long standoff with West, Dutch intelligence warns (The Record)

University of Mississippi Medical Center Suffers Cyberattack, Closes All Clinics, Cancels Services (Mississippi Free Press)

PayPal discloses data breach that exposed user info for 6 months (Bleeping Computer)

FBI: Over $20 million stolen in surge of ATM malware attacks in 2025 (Bleeping Computer)

An FBI ‘Asset’ Helped Run a Dark Web Site That Sold Fentanyl-Laced Drugs for Years (WIRED)

(Don't) TrustConnect: It's a RAT in an RMM hat (Proofpoint US)

PromptSpy ushers in the era of Android threats using GenAI (We Live Security)

CVE-2026-2329: Critical Unauthenticated Stack Buffer Overflow in Grandstream GXP1600 VoIP Phones (FIXED) (Rapid 7)

DOGE bites taxman (The Register)

DOGE Bro’s Grant Review Process Was Literally Just Asking ChatGPT ‘Is This DEI?’ (Techdirt)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 20 Feb 2026 21:30:00 -0000</pubDate>
      <itunes:title>Facing a slow-burn confrontation.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2493</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Dutch authorities warn Russia is escalating hybrid operations across Europe. Ransomware shuts down the University of Mississippi Medical Center. PayPal notifies customers of a data breach. The FBI says ATM jackpotting is on the rise. An FBI confidential informant had a hand in online fentanyl sales. TrustConnect malware masquerades as a legitimate remote monitoring and management tool. Researchers uncover the first Android malware to integrate generative AI. A critical zero-day hits Grandstream VOIP phones. The IRS slashes IT staff and technology executives. Our guest is James Turgal, a 22-year FBI vet and VP of global cyber risk and board relations at Optiv, discussing the latest wave of tax scams and IRS fraud. DOGE dudes deliver DEI deathblows.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by James Turgal, a 22-year FBI vet and VP of global cyber risk and board relations at Optiv, discussing the latest wave of tax scams and IRS fraud.

Selected Reading

Russia stepping up hybrid attacks, preparing for long standoff with West, Dutch intelligence warns (The Record)

University of Mississippi Medical Center Suffers Cyberattack, Closes All Clinics, Cancels Services (Mississippi Free Press)

PayPal discloses data breach that exposed user info for 6 months (Bleeping Computer)

FBI: Over $20 million stolen in surge of ATM malware attacks in 2025 (Bleeping Computer)

An FBI ‘Asset’ Helped Run a Dark Web Site That Sold Fentanyl-Laced Drugs for Years (WIRED)

(Don't) TrustConnect: It's a RAT in an RMM hat (Proofpoint US)

PromptSpy ushers in the era of Android threats using GenAI (We Live Security)

CVE-2026-2329: Critical Unauthenticated Stack Buffer Overflow in Grandstream GXP1600 VoIP Phones (FIXED) (Rapid 7)

DOGE bites taxman (The Register)

DOGE Bro’s Grant Review Process Was Literally Just Asking ChatGPT ‘Is This DEI?’ (Techdirt)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dutch authorities warn Russia is escalating hybrid operations across Europe. Ransomware shuts down the University of Mississippi Medical Center. PayPal notifies customers of a data breach. The FBI says ATM jackpotting is on the rise. An FBI confidential informant had a hand in online fentanyl sales. TrustConnect malware masquerades as a legitimate remote monitoring and management tool. Researchers uncover the first Android malware to integrate generative AI. A critical zero-day hits Grandstream VOIP phones. The IRS slashes IT staff and technology executives. Our guest is James Turgal, a 22-year FBI vet and VP of global cyber risk and board relations at Optiv, discussing the latest wave of tax scams and IRS fraud. DOGE dudes deliver DEI deathblows.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/james-turgal/"><u>James Turgal</u></a>, a 22-year FBI vet and VP of global cyber risk and board relations at <a href="http://www.optiv.com/"><u>Optiv</u></a>, discussing the latest wave of tax scams and IRS fraud.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/russia-cyberattacks-europe-warfare"><u>Russia stepping up hybrid attacks, preparing for long standoff with West, Dutch intelligence warns</u></a> (The Record)</p>
<p><a href="https://www.mississippifreepress.org/university-of-mississippi-suffers-cyberattack-closes-all-clinics-cancels-services/"><u>University of Mississippi Medical Center Suffers Cyberattack, Closes All Clinics, Cancels Services</u></a> (Mississippi Free Press)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/paypal-discloses-data-breach-exposing-users-personal-information/"><u>PayPal discloses data breach that exposed user info for 6 months</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/fbi-over-20-million-stolen-in-surge-of-atm-malware-attacks-in-2025/"><u>FBI: Over $20 million stolen in surge of ATM malware attacks in 2025</u></a> (Bleeping Computer)</p>
<p><a href="https://www.wired.com/story/an-fbi-asset-helped-run-a-dark-web-site-that-sold-fentanyl-laced-drugs-for-years/"><u>An FBI ‘Asset’ Helped Run a Dark Web Site That Sold Fentanyl-Laced Drugs for Years</u></a> (WIRED)</p>
<p><a href="https://www.proofpoint.com/us/blog/threat-insight/dont-trustconnect-its-a-rat"><u>(Don't) TrustConnect: It's a RAT in an RMM hat</u></a> (Proofpoint US)</p>
<p><a href="https://www.welivesecurity.com/en/eset-research/promptspy-ushers-in-era-android-threats-using-genai/"><u>PromptSpy ushers in the era of Android threats using GenAI</u></a> (We Live Security)</p>
<p><a href="https://www.rapid7.com/blog/post/ve-cve-2026-2329-critical-unauthenticated-stack-buffer-overflow-in-grandstream-gxp1600-voip-phones-fixed/"><u>CVE-2026-2329: Critical Unauthenticated Stack Buffer Overflow in Grandstream GXP1600 VoIP Phones (FIXED)</u></a> (Rapid 7)</p>
<p><a href="https://www.theregister.com/2026/02/19/irs_job_cuts/"><u>DOGE bites taxman</u></a> (The Register)</p>
<p><a href="https://www.techdirt.com/2026/02/19/doge-bros-grant-review-process-was-literally-just-asking-chatgpt-is-this-dei/"><u>DOGE Bro’s Grant Review Process Was Literally Just Asking ChatGPT ‘Is This DEI?’</u></a> (Techdirt)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1688</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[104afa94-fae2-11f0-8b3b-f3df67dafdb8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9637646647.mp3?updated=1771611253" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>MFA meets its match.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2492/notes</link>
      <description>Starkiller represents a significant escalation in phishing infrastructure. A blockchain lender breach affects nearly a million users. The Kimwolf botnet disrupts a peer-to-peer privacy network. Researchers identifiy vulnerabilities in widely used Visual Studio Code extensions. DEF CON bans three men named in the Epstein files. Texas sues TP-Link over supply chain security. Experts question the impact of cyber versus kinetic damage in Venezuela. African law enforcement arrest hundreds of suspected scammers. Tim Starks from CyberScoop explains CISA’s upcoming town hall meetings over ICS reporting rules. Warsaw walls off Wi-Fi-wired wheels. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Tim Starks from CyberScoop discussing “CISA to host industry feedback sessions on cyber incident reporting regulation.”

Selected Reading

Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA (Infosecurity Magazine)

Nearly 1 Million User Records Compromised in Figure Data Breach (SecurityWeek)

Kimwolf Botnet Swamps Anonymity Network I2P (Krebs on Security)

Flaws in Popular IDE Extensions Allow Data Exfiltration (Infosecurity Magazine)

DEF CON bans three Epstein-linked men from future events (The Register)

Texas sues TP-Link over Chinese hacking risks, user deception (Bleeping Computer)

The Caracas operation suggests cyber was part of the plan – just not the whole operation (CyberScoop)

Police arrests 651 suspects in African cybercrime crackdown (Bleeping Computer)

Nigerian man gets eight years in prison for hacking tax firms (Bleeping Computer)

Poland bans camera-packing cars made in China from military bases (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 19 Feb 2026 21:45:00 -0000</pubDate>
      <itunes:title>MFA meets its match.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2492</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Starkiller represents a significant escalation in phishing infrastructure. A blockchain lender breach affects nearly a million users. The Kimwolf botnet disrupts a peer-to-peer privacy network. Researchers identifiy vulnerabilities in widely used Visual Studio Code extensions. DEF CON bans three men named in the Epstein files. Texas sues TP-Link over supply chain security. Experts question the impact of cyber versus kinetic damage in Venezuela. African law enforcement arrest hundreds of suspected scammers. Tim Starks from CyberScoop explains CISA’s upcoming town hall meetings over ICS reporting rules. Warsaw walls off Wi-Fi-wired wheels. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Tim Starks from CyberScoop discussing “CISA to host industry feedback sessions on cyber incident reporting regulation.”

Selected Reading

Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA (Infosecurity Magazine)

Nearly 1 Million User Records Compromised in Figure Data Breach (SecurityWeek)

Kimwolf Botnet Swamps Anonymity Network I2P (Krebs on Security)

Flaws in Popular IDE Extensions Allow Data Exfiltration (Infosecurity Magazine)

DEF CON bans three Epstein-linked men from future events (The Register)

Texas sues TP-Link over Chinese hacking risks, user deception (Bleeping Computer)

The Caracas operation suggests cyber was part of the plan – just not the whole operation (CyberScoop)

Police arrests 651 suspects in African cybercrime crackdown (Bleeping Computer)

Nigerian man gets eight years in prison for hacking tax firms (Bleeping Computer)

Poland bans camera-packing cars made in China from military bases (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Starkiller represents a significant escalation in phishing infrastructure. A blockchain lender breach affects nearly a million users. The Kimwolf botnet disrupts a peer-to-peer privacy network. Researchers identifiy vulnerabilities in widely used Visual Studio Code extensions. DEF CON bans three men named in the Epstein files. Texas sues TP-Link over supply chain security. Experts question the impact of cyber versus kinetic damage in Venezuela. African law enforcement arrest hundreds of suspected scammers. Tim Starks from CyberScoop explains CISA’s upcoming town hall meetings over ICS reporting rules. Warsaw walls off Wi-Fi-wired wheels.<strong> </strong></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/tstarks/"><u>Tim Starks</u></a> from <a href="https://www.linkedin.com/company/cyberscoop/"><u>CyberScoop</u></a> discussing “<a href="https://cyberscoop.com/cisa-circia-town-halls-cyber-incident-reporting-rule/"><u>CISA to host industry feedback sessions on cyber incident reporting regulation.</u></a>”</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.infosecurity-magazine.com/news/starkiller-phishing-kit-bypasses/"><u>Starkiller: New ‘Commercial-Grade’ Phishing Kit Bypasses MFA</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.securityweek.com/nearly-1-million-user-records-compromised-in-figure-data-breach/"><u>Nearly 1 Million User Records Compromised in Figure Data Breach</u></a> (SecurityWeek)</p>
<p><a href="https://krebsonsecurity.com/2026/02/kimwolf-botnet-swamps-anonymity-network-i2p/"><u>Kimwolf Botnet Swamps Anonymity Network I2P</u></a> (Krebs on Security)</p>
<p><a href="https://www.infosecurity-magazine.com/news/vulnerabilities-vs-code-cursor/"><u>Flaws in Popular IDE Extensions Allow Data Exfiltration</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.theregister.com/2026/02/19/def_con_epstein_bans/"><u>DEF CON bans three Epstein-linked men from future events</u></a> (The Register)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/texas-sues-tp-link-over-chinese-hacking-risks-user-deception/"><u>Texas sues TP-Link over Chinese hacking risks, user deception</u></a> (Bleeping Computer)</p>
<p><a href="https://cyberscoop.com/venezuela-blackout-cyberattack-vs-kinetic-damage-operation-absolute-resolve/"><u>The Caracas operation suggests cyber was part of the plan – just not the whole operation</u></a> (CyberScoop)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/police-arrests-651-suspects-in-african-cybercrime-crackdown/"><u>Police arrests 651 suspects in African cybercrime crackdown</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/nigerian-man-gets-eight-years-in-prison-for-hacking-tax-firms/"><u>Nigerian man gets eight years in prison for hacking tax firms</u></a> (Bleeping Computer)</p>
<p><a href="https://www.theregister.com/2026/02/19/poland_china_car_ban/"><u>Poland bans camera-packing cars made in China from military bases</u></a> (The Register)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1480</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[102153ba-fae2-11f0-8b3b-2fa19eabea82]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5328579575.mp3?updated=1771536399" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rooted and patient.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2491/notes</link>
      <description>A China-linked group exploits a critical Dell zero-day for 18 months. A Microsoft 365 Copilot bug risks sensitive email oversharing. A new Linux botnet leans on old-school IRC for command and control. Switzerland tightens critical infrastructure rules with mandatory cyber reporting. AstarionRAT emerges as a custom post-exploitation implant. Researchers find serious flaws in popular PDF platforms. A suspected Iranian-aligned campaign targets protest supporters. Notepad++ rolls out a “double-lock” update fix. And a Spanish court orders NordVPN and ProtonVPN to block illegal football streams. Our guest is Keith Mularski, Former FBI Special Agent and Chief Global Ambassador at Qintel, reflecting on the 25th anniversary of notorious spy Robert Hanssen's arrest. Dutch Defense flaunt F-35 firmware freedom. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Keith Mularski, Former FBI Special Agent and Chief Global Ambassador at Qintel, to talk about the 25th anniversary of Robert Hanssen's arrest. If you enjoyed Keith’s conversation, you can hear more from him over on the Only Malware in the Building podcast.

Selected Reading

Chinese hackers exploited a Dell zero-day for 18 months before anyone noticed (CyberScoop) 

Microsoft says bug causes Copilot to summarize confidential emails (Bleeping Computer)

New Linux Botnet Discovered (Linux Magazine)

Switzerland’s NCSC boosts operational capabilities, mandates cyberattack reporting on critical infrastructure (Industrial Cyber)

ClickFix Won't Die. Neither Will Matanbuchus. A New RAT and a Hands-on-Keyboard Intrusion (Huntress)

Vulnerabilities in Popular PDF Platforms Allowed Account Takeover, Data Exfiltration (SecurityWeek)

CRESCENTHARVEST: Iranian protestors and dissidents targeted in cyberespionage campaign (Acronis)

Notepad++ boosts update security with ‘double-lock’ mechanism (Bleeping Computer)

Spain orders NordVPN, ProtonVPN to block LaLiga piracy sites (Bleeping Computer)

Dutch defense chief: F-35s can be jailbroken like iPhones (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 18 Feb 2026 21:30:00 -0000</pubDate>
      <itunes:title>Rooted and patient.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2491</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A China-linked group exploits a critical Dell zero-day for 18 months. A Microsoft 365 Copilot bug risks sensitive email oversharing. A new Linux botnet leans on old-school IRC for command and control. Switzerland tightens critical infrastructure rules with mandatory cyber reporting. AstarionRAT emerges as a custom post-exploitation implant. Researchers find serious flaws in popular PDF platforms. A suspected Iranian-aligned campaign targets protest supporters. Notepad++ rolls out a “double-lock” update fix. And a Spanish court orders NordVPN and ProtonVPN to block illegal football streams. Our guest is Keith Mularski, Former FBI Special Agent and Chief Global Ambassador at Qintel, reflecting on the 25th anniversary of notorious spy Robert Hanssen's arrest. Dutch Defense flaunt F-35 firmware freedom. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Keith Mularski, Former FBI Special Agent and Chief Global Ambassador at Qintel, to talk about the 25th anniversary of Robert Hanssen's arrest. If you enjoyed Keith’s conversation, you can hear more from him over on the Only Malware in the Building podcast.

Selected Reading

Chinese hackers exploited a Dell zero-day for 18 months before anyone noticed (CyberScoop) 

Microsoft says bug causes Copilot to summarize confidential emails (Bleeping Computer)

New Linux Botnet Discovered (Linux Magazine)

Switzerland’s NCSC boosts operational capabilities, mandates cyberattack reporting on critical infrastructure (Industrial Cyber)

ClickFix Won't Die. Neither Will Matanbuchus. A New RAT and a Hands-on-Keyboard Intrusion (Huntress)

Vulnerabilities in Popular PDF Platforms Allowed Account Takeover, Data Exfiltration (SecurityWeek)

CRESCENTHARVEST: Iranian protestors and dissidents targeted in cyberespionage campaign (Acronis)

Notepad++ boosts update security with ‘double-lock’ mechanism (Bleeping Computer)

Spain orders NordVPN, ProtonVPN to block LaLiga piracy sites (Bleeping Computer)

Dutch defense chief: F-35s can be jailbroken like iPhones (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A China-linked group exploits a critical Dell zero-day for 18 months. A Microsoft 365 Copilot bug risks sensitive email oversharing. A new Linux botnet leans on old-school IRC for command and control. Switzerland tightens critical infrastructure rules with mandatory cyber reporting. AstarionRAT emerges as a custom post-exploitation implant. Researchers find serious flaws in popular PDF platforms. A suspected Iranian-aligned campaign targets protest supporters. Notepad++ rolls out a “double-lock” update fix. And a Spanish court orders NordVPN and ProtonVPN to block illegal football streams. Our guest is Keith Mularski, Former FBI Special Agent and Chief Global Ambassador at Qintel, reflecting on the 25th anniversary of notorious spy Robert Hanssen's arrest. Dutch Defense flaunt F-35 firmware freedom. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/keithmularski/"><u>Keith Mularski</u></a>, Former FBI Special Agent and Chief Global Ambassador at <a href="https://www.linkedin.com/company/qintel/"><u>Qintel</u></a>, to talk about the 25th anniversary of <a href="https://www.fbi.gov/history/famous-cases/robert-hanssen"><u>Robert Hanssen</u></a>'s arrest. If you enjoyed Keith’s conversation, you can hear more from him over on the <a href="https://thecyberwire.com/podcasts/only-malware-in-the-building"><u>Only Malware in the Building</u></a> podcast.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://cyberscoop.com/china-brickstorm-grimbolt-dell-zero-day/"><u>Chinese hackers exploited a Dell zero-day for 18 months before anyone noticed</u></a> (CyberScoop) </p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-says-bug-causes-copilot-to-summarize-confidential-emails/"><u>Microsoft says bug causes Copilot to summarize confidential emails</u></a> (Bleeping Computer)</p>
<p><a href="https://www.linux-magazine.com/Online/News/New-Linux-Botnet-Discovered"><u>New Linux Botnet Discovered</u></a> (Linux Magazine)</p>
<p><a href="https://industrialcyber.co/reports/switzerlands-ncsc-boosts-operational-capabilities-mandates-cyberattack-reporting-on-critical-infrastructure/"><u>Switzerland’s NCSC boosts operational capabilities, mandates cyberattack reporting on critical infrastructure</u></a> (Industrial Cyber)</p>
<p><a href="https://www.huntress.com/blog/clickfix-matanbuchus-astarionrat-analysis"><u>ClickFix Won't Die. Neither Will Matanbuchus. A New RAT and a Hands-on-Keyboard Intrusion</u></a> (Huntress)</p>
<p><a href="https://www.securityweek.com/vulnerabilities-in-popular-pdf-platforms-allowed-account-takeover-data-exfiltration/"><u>Vulnerabilities in Popular PDF Platforms Allowed Account Takeover, Data Exfiltration</u></a> (SecurityWeek)</p>
<p><a href="https://www.acronis.com/en/tru/posts/crescentharvest-iranian-protestors-and-dissidents-targeted-in-cyberespionage-campaign/"><u>CRESCENTHARVEST: Iranian protestors and dissidents targeted in cyberespionage campaign</u></a> (Acronis)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/notepad-plus-plus-boosts-update-security-with-double-lock-mechanism/"><u>Notepad++ boosts update security with ‘double-lock’ mechanism</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/legal/spain-orders-nordvpn-protonvpn-to-block-laliga-piracy-sites/"><u>Spain orders NordVPN, ProtonVPN to block LaLiga piracy sites</u></a> (Bleeping Computer)</p>
<p><a href="https://www.theregister.com/2026/02/18/jailbreak_an_f35/"><u>Dutch defense chief: F-35s can be jailbroken like iPhones</u></a> (The Register)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2002</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0ffc948a-fae2-11f0-8b3b-eff362411c7b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7209885132.mp3?updated=1771447794" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The lights stay on, but dimmer.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2490/notes</link>
      <description>The government shutdown leaves CISA at reduced capacity. Ransomware and misconfigured AI threaten cyber-physical infrastructure. Operation DoppelBrand targets Fortune 500 financial and technology firms. Researchers uncover infostealers targeting OpenClaw AI. Identity-based attacks accounted for nearly two-thirds of initial intrusions last year. Researchers compromise popular cloud-based password managers. Authorities have arrested a man suspected of links to Phobos ransomware. Monday business breakdown. On Threat Vector, host David Moulton talks with Steve Elovitz about the 750 major breaches his team analyzed in a single year. Digital detour delivers a Dutchman to detention.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector

On today’s Threat Vector segment, David Moulton is joined by Steve Elovitz from Unit 42's North America consulting and incident response practice. After analyzing 750+ major breaches in a single year, he's seen exactly which security investments save companies and which ones fail when attackers strike. You can hear David and Steve’s full conversation on Thursday’s episode of Threat Vector and listen to new episodes each Thursday on your favorite podcast app. 

Selected Reading

CISA Navigates DHS Shutdown With Reduced Staff (SecurityWeek)

Significant Rise in Ransomware Attacks Targeting Industrial Operations (Infosecurity Magazine)

A Misconfigured AI Could Trigger Infrastructure Collapse (BankInfo Security)

Operation DoppelBrand Weaponizes Trusted Brands For Credential Theft (Infosecurity Magazine)

Infostealer malware found stealing OpenClaw secrets for first time (Bleeping Computer)

Unit 42: Nearly two-thirds of breaches now start with identity abuse (CyberScoop)

Password Managers Vulnerable to Vault Compromise Under Malicious Server (SecurityWeek)

Poland arrests suspect linked to Phobos ransomware operation (Bleeping Computer)

Vega raises $120 million in a Series B round led by existing investor Accel (N2K Pro Business Briefing)

Dutch police arrest man who refused to delete confidential files shared by mistake (The Record)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Feb 2026 21:30:00 -0000</pubDate>
      <itunes:title>The lights stay on, but dimmer.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2490</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The government shutdown leaves CISA at reduced capacity. Ransomware and misconfigured AI threaten cyber-physical infrastructure. Operation DoppelBrand targets Fortune 500 financial and technology firms. Researchers uncover infostealers targeting OpenClaw AI. Identity-based attacks accounted for nearly two-thirds of initial intrusions last year. Researchers compromise popular cloud-based password managers. Authorities have arrested a man suspected of links to Phobos ransomware. Monday business breakdown. On Threat Vector, host David Moulton talks with Steve Elovitz about the 750 major breaches his team analyzed in a single year. Digital detour delivers a Dutchman to detention.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector

On today’s Threat Vector segment, David Moulton is joined by Steve Elovitz from Unit 42's North America consulting and incident response practice. After analyzing 750+ major breaches in a single year, he's seen exactly which security investments save companies and which ones fail when attackers strike. You can hear David and Steve’s full conversation on Thursday’s episode of Threat Vector and listen to new episodes each Thursday on your favorite podcast app. 

Selected Reading

CISA Navigates DHS Shutdown With Reduced Staff (SecurityWeek)

Significant Rise in Ransomware Attacks Targeting Industrial Operations (Infosecurity Magazine)

A Misconfigured AI Could Trigger Infrastructure Collapse (BankInfo Security)

Operation DoppelBrand Weaponizes Trusted Brands For Credential Theft (Infosecurity Magazine)

Infostealer malware found stealing OpenClaw secrets for first time (Bleeping Computer)

Unit 42: Nearly two-thirds of breaches now start with identity abuse (CyberScoop)

Password Managers Vulnerable to Vault Compromise Under Malicious Server (SecurityWeek)

Poland arrests suspect linked to Phobos ransomware operation (Bleeping Computer)

Vega raises $120 million in a Series B round led by existing investor Accel (N2K Pro Business Briefing)

Dutch police arrest man who refused to delete confidential files shared by mistake (The Record)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The government shutdown leaves CISA at reduced capacity. Ransomware and misconfigured AI threaten cyber-physical infrastructure. Operation DoppelBrand targets Fortune 500 financial and technology firms. Researchers uncover infostealers targeting OpenClaw AI. Identity-based attacks accounted for nearly two-thirds of initial intrusions last year. Researchers compromise popular cloud-based password managers. Authorities have arrested a man suspected of links to Phobos ransomware. Monday business breakdown. On Threat Vector, host David Moulton talks with Steve Elovitz about the 750 major breaches his team analyzed in a single year. Digital detour delivers a Dutchman to detention.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Threat Vector</strong></p>
<p>On today’s Threat Vector segment, <a href="https://www.linkedin.com/in/davidrmoulton/"><u>David Moulton</u></a> is joined by <a href="https://www.linkedin.com/in/elovitz/"><u>Steve Elovitz</u></a> from Unit 42's North America consulting and incident response practice. After analyzing 750+ major breaches in a single year, he's seen exactly which security investments save companies and which ones fail when attackers strike. You can hear David and Steve’s full conversation on Thursday’s episode of <a href="https://www.thecyberwire.com/podcasts/threat-vector"><u>Threat Vector</u></a> and listen to new episodes each Thursday on your favorite podcast app. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.securityweek.com/cisa-navigates-dhs-shutdown-with-reduced-staff/"><u>CISA Navigates DHS Shutdown With Reduced Staff</u></a> (SecurityWeek)</p>
<p><a href="https://www.infosecurity-magazine.com/news/rise-in-ransomware-targeting/"><u>Significant Rise in Ransomware Attacks Targeting Industrial Operations</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.bankinfosecurity.com/misconfigured-ai-could-trigger-infrastructure-collapse-a-30767"><u>A Misconfigured AI Could Trigger Infrastructure Collapse</u></a> (BankInfo Security)</p>
<p><a href="https://www.infosecurity-magazine.com/news/operation-doppelbrand-trusted/"><u>Operation DoppelBrand Weaponizes Trusted Brands For Credential Theft</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/infostealer-malware-found-stealing-openclaw-secrets-for-first-time/"><u>Infostealer malware found stealing OpenClaw secrets for first time</u></a> (Bleeping Computer)</p>
<p><a href="https://cyberscoop.com/attackers-abuse-identity-unit42-palo-alto-networks-incident-response-report/"><u>Unit 42: Nearly two-thirds of breaches now start with identity abuse</u></a> (CyberScoop)</p>
<p><a href="https://www.securityweek.com/password-managers-vulnerable-to-vault-compromise-under-malicious-server/"><u>Password Managers Vulnerable to Vault Compromise Under Malicious Server</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/poland-arrests-suspect-linked-to-phobos-ransomware-operation/"><u>Poland arrests suspect linked to Phobos ransomware operation</u></a> (Bleeping Computer)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/8/6"><u>Vega raises $120 million in a Series B round led by existing investor Accel</u></a> (N2K Pro Business Briefing)</p>
<p><a href="https://therecord.media/netherlands-arrest-confidential-files-police"><u>Dutch police arrest man who refused to delete confidential files shared by mistake</u></a> (The Record)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1677</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0fd278ee-fae2-11f0-8b3b-733fb4457842]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4518040117.mp3?updated=1771357342" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber without borders: How Estonia turned crisis into cyber power. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/90/notes</link>
      <description>In this three-part series, ⁠Maria Varmazis⁠, host of ⁠T-Minus⁠ Space Daily and CyberWire Producer ⁠Liz Stokes⁠, take you inside NATO’s flagship cyber defense exercise, ⁠Cyber Coalition 2025⁠. Hosted by the NATO Cooperative Cyber Defence Centre of Excellence in Tallinn, Estonia, the exercise brings together military, government, and industry teams from across the alliance to respond to realistic, high-pressure cyberattack scenarios targeting critical infrastructure and operational networks.

Throughout the series, Maria and Liz will guide you through what they witnessed on the ground — from real-time threat detection and incident response to the strategic collaboration shaping NATO’s cyber resilience in an increasingly contested digital landscape.

Please follow along with the next episode of our three part series ⁠here⁠. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 16 Feb 2026 08:00:00 -0000</pubDate>
      <itunes:title>Cyber without borders: How Estonia turned crisis into cyber power. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>90</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7d4d448a-090b-11f1-9381-4bc71041fde8/image/0216c9cea15c53e5d2c739964a38623c.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this three-part series, ⁠Maria Varmazis⁠, host of ⁠T-Minus⁠ Space Daily and CyberWire Producer ⁠Liz Stokes⁠, take you inside NATO’s flagship cyber defense exercise, ⁠Cyber Coalition 2025⁠. Hosted by the NATO Cooperative Cyber Defence Centre of Excellence in Tallinn, Estonia, the exercise brings together military, government, and industry teams from across the alliance to respond to realistic, high-pressure cyberattack scenarios targeting critical infrastructure and operational networks.

Throughout the series, Maria and Liz will guide you through what they witnessed on the ground — from real-time threat detection and incident response to the strategic collaboration shaping NATO’s cyber resilience in an increasingly contested digital landscape.

Please follow along with the next episode of our three part series ⁠here⁠. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this three-part series, <a href="https://www.linkedin.com/in/varmazis/">⁠<u>Maria Varmazis</u>⁠</a>, host of <a href="https://space.n2k.com/podcasts/t-minus">⁠<u>T-Minus</u>⁠</a> Space Daily and CyberWire Producer <a href="https://www.linkedin.com/in/elizabeth-stokes-183925181/">⁠<u>Liz Stokes</u>⁠</a>, take you inside NATO’s flagship cyber defense exercise, <a href="https://www.ncia.nato.int/newsroom/news/ncia-facilitates-and-participates-in-cyber-coalition-2025-in-tallinn--estonia?utm_source=chatgpt.com">⁠Cyber Coalition 2025⁠</a>. Hosted by the NATO Cooperative Cyber Defence Centre of Excellence in Tallinn, Estonia, the exercise brings together military, government, and industry teams from across the alliance to respond to realistic, high-pressure cyberattack scenarios targeting critical infrastructure and operational networks.</p>
<p>Throughout the series, Maria and Liz will guide you through what they witnessed on the ground — from real-time threat detection and incident response to the strategic collaboration shaping NATO’s cyber resilience in an increasingly contested digital landscape.</p>
<p>Please follow along with the next episode of our three part series <a href="https://thecyberwire.com/podcasts/special-edition/91/notes">⁠here⁠</a>. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1487</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7d4d448a-090b-11f1-9381-4bc71041fde8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9986818667.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mike Arrowsmith: Facing adversity in the workplace. [CTrO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/108/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Mike Arrowsmith, Chief Trust Officer at NinjaOne, leads the organization’s IT, security, and support infrastructure to ensure they meet customers’ security and data privacy demands as it scales. Mike discusses how his career path has led him to the position he currently holds and how exciting the world of cybersecurity can be. He mentioned how he mentored students in college thinking of going into the field, and he used a metaphor to help describe the industry, saying "We are working against adversaries that are always typically one step ahead. Figuratively, if you could imagine, you're trying to chase a ball, but you never can quite get your hands on it." He shares how he loves the evolving field and that he thrives in a situation where things are constantly changing. We thank Mike for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 15 Feb 2026 08:00:00 -0000</pubDate>
      <itunes:title>Mike Arrowsmith: Facing adversity in the workplace. [CTrO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>108</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a0b600a4-08f9-11f1-becd-cf2fcd0189e4/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Mike Arrowsmith, Chief Trust Officer at NinjaOne, leads the organization’s IT, security, and support infrastructure to ensure they meet customers’ security and data privacy demands as it scales. Mike discusses how his career path has led him to the position he currently holds and how exciting the world of cybersecurity can be. He mentioned how he mentored students in college thinking of going into the field, and he used a metaphor to help describe the industry, saying "We are working against adversaries that are always typically one step ahead. Figuratively, if you could imagine, you're trying to chase a ball, but you never can quite get your hands on it." He shares how he loves the evolving field and that he thrives in a situation where things are constantly changing. We thank Mike for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Mike Arrowsmith, Chief Trust Officer at NinjaOne, leads the organization’s IT, security, and support infrastructure to ensure they meet customers’ security and data privacy demands as it scales. Mike discusses how his career path has led him to the position he currently holds and how exciting the world of cybersecurity can be. He mentioned how he mentored students in college thinking of going into the field, and he used a metaphor to help describe the industry, saying "We are working against adversaries that are always typically one step ahead. Figuratively, if you could imagine, you're trying to chase a ball, but you never can quite get your hands on it." He shares how he loves the evolving field and that he thrives in a situation where things are constantly changing. We thank Mike for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>471</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a0b600a4-08f9-11f1-becd-cf2fcd0189e4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6279875992.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stealer in the status bar. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/412/notes</link>
      <description>Today we have Ziv Mador, VP of Security Research from LevelBlue SpiderLabs discussing their work on "SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp." Researchers at LevelBlue SpiderLabs have identified a new Brazilian banking Trojan dubbed Eternidade Stealer, spread through WhatsApp hijacking and social engineering campaigns that use a Python-based worm to steal contacts and distribute malicious MSI installers. 

The Delphi-compiled malware targets Brazilian victims, profiles infected systems, dynamically retrieves its command-and-control server via IMAP email, and deploys banking overlays to harvest credentials from financial institutions and cryptocurrency platforms. The campaign reflects the continued evolution of Brazil’s cybercrime ecosystem, combining WhatsApp propagation, geofencing, encrypted C2 communications, and process injection to maintain stealth and persistence.

The research can be found here:


  SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Feb 2026 08:00:00 -0000</pubDate>
      <itunes:title>Stealer in the status bar. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>412</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/39abdd28-08f6-11f1-868a-7ff52e2147f8/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Today we have Ziv Mador, VP of Security Research from LevelBlue SpiderLabs discussing their work on "SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp." Researchers at LevelBlue SpiderLabs have identified a new Brazilian banking Trojan dubbed Eternidade Stealer, spread through WhatsApp hijacking and social engineering campaigns that use a Python-based worm to steal contacts and distribute malicious MSI installers. 

The Delphi-compiled malware targets Brazilian victims, profiles infected systems, dynamically retrieves its command-and-control server via IMAP email, and deploys banking overlays to harvest credentials from financial institutions and cryptocurrency platforms. The campaign reflects the continued evolution of Brazil’s cybercrime ecosystem, combining WhatsApp propagation, geofencing, encrypted C2 communications, and process injection to maintain stealth and persistence.

The research can be found here:


  SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we have <a href="https://www.linkedin.com/in/ziv-mador-a9bab2/">Ziv Mador</a>, VP of Security Research from <a href="https://www.linkedin.com/company/levelbluecyber/">LevelBlue</a> SpiderLabs discussing their work on "SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp." Researchers at LevelBlue SpiderLabs have identified a new Brazilian banking Trojan dubbed Eternidade Stealer, spread through WhatsApp hijacking and social engineering campaigns that use a Python-based worm to steal contacts and distribute malicious MSI installers. </p>
<p>The Delphi-compiled malware targets Brazilian victims, profiles infected systems, dynamically retrieves its command-and-control server via IMAP email, and deploys banking overlays to harvest credentials from financial institutions and cryptocurrency platforms. The campaign reflects the continued evolution of Brazil’s cybercrime ecosystem, combining WhatsApp propagation, geofencing, encrypted C2 communications, and process injection to maintain stealth and persistence.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.levelblue.com/blogs/spiderlabs-blog/spiderlabs-ids-new-banking-trojan-distributed-through-whatsapp/">SpiderLabs IDs New Banking Trojan Distributed Through WhatsApp</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>934</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[39abdd28-08f6-11f1-868a-7ff52e2147f8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1793592680.mp3?updated=1770998742" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Total defense meets total threat.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2489/notes</link>
      <description>Global leaders call for collaboration at the Munich Cyber Security Conference. Phishing campaigns exploit fake video conference invitations. Italian authorities say cyber attacks on the Winter Olympics have met overall mitigation. AI reshapes the economics of ransomware attacks. CISA tags a critical Microsoft Configuration Manager vulnerability. Foxveil is a new malware loader targeting legitimate platforms. Researchers examine macOS infostealers. California fines Disney $2.75 million for violating the Consumer Privacy Act. Maria Varmazis, host of T-Minus space daily and CyberWire Producer Liz Stokes preview their coverage of the NATO Cyber Coalition 2025 Cyber Exercise in Tallinn, Estonia. When pull requests get personal.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Maria Varmazis, host of T-Minus space daily and CyberWire Producer Liz Stokes as they share  their coverage of the NATO Cyber Coalition 2025 Cyber Exercise in Tallinn, Estonia.

Selected Reading

US wants cyber partnerships to send ‘coordinated, strategic message’ to adversaries (The Record) 

Europe must adapt to ‘permanent’ cyber and hybrid threats, Sweden warns (The Record) 

Attackers Weaponize Signed RMM Tools via Zoom, Meet, &amp; Teams Lures (Netskope)

Winter Olympics 2026: Hacktivism Surges Ahead of Protests and Suspected Sabotage (Intel 471)

How AI is and is Not Changing Ransomware (Halcyon)

CISA flags critical Microsoft SCCM flaw as exploited in attacks (Bleeping Computer)

Foxveil malware loader abuses Discord, Cloudflare, Netlify for staging (SC Media)

AMOS infostealer targets macOS through a popular AI app (Bleeping Computer)

California fines Disney $2.75 million for data privacy violations (The Record)

An AI Agent Published a Hit Piece on Me (The Shamblog)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 13 Feb 2026 21:10:00 -0000</pubDate>
      <itunes:title>Total defense meets total threat.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2489</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Global leaders call for collaboration at the Munich Cyber Security Conference. Phishing campaigns exploit fake video conference invitations. Italian authorities say cyber attacks on the Winter Olympics have met overall mitigation. AI reshapes the economics of ransomware attacks. CISA tags a critical Microsoft Configuration Manager vulnerability. Foxveil is a new malware loader targeting legitimate platforms. Researchers examine macOS infostealers. California fines Disney $2.75 million for violating the Consumer Privacy Act. Maria Varmazis, host of T-Minus space daily and CyberWire Producer Liz Stokes preview their coverage of the NATO Cyber Coalition 2025 Cyber Exercise in Tallinn, Estonia. When pull requests get personal.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Maria Varmazis, host of T-Minus space daily and CyberWire Producer Liz Stokes as they share  their coverage of the NATO Cyber Coalition 2025 Cyber Exercise in Tallinn, Estonia.

Selected Reading

US wants cyber partnerships to send ‘coordinated, strategic message’ to adversaries (The Record) 

Europe must adapt to ‘permanent’ cyber and hybrid threats, Sweden warns (The Record) 

Attackers Weaponize Signed RMM Tools via Zoom, Meet, &amp; Teams Lures (Netskope)

Winter Olympics 2026: Hacktivism Surges Ahead of Protests and Suspected Sabotage (Intel 471)

How AI is and is Not Changing Ransomware (Halcyon)

CISA flags critical Microsoft SCCM flaw as exploited in attacks (Bleeping Computer)

Foxveil malware loader abuses Discord, Cloudflare, Netlify for staging (SC Media)

AMOS infostealer targets macOS through a popular AI app (Bleeping Computer)

California fines Disney $2.75 million for data privacy violations (The Record)

An AI Agent Published a Hit Piece on Me (The Shamblog)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Global leaders call for collaboration at the Munich Cyber Security Conference. Phishing campaigns exploit fake video conference invitations. Italian authorities say cyber attacks on the Winter Olympics have met overall mitigation. AI reshapes the economics of ransomware attacks. CISA tags a critical Microsoft Configuration Manager vulnerability. Foxveil is a new malware loader targeting legitimate platforms. Researchers examine macOS infostealers. California fines Disney $2.75 million for violating the Consumer Privacy Act. Maria Varmazis, host of T-Minus space daily and CyberWire Producer Liz Stokes preview their coverage of the NATO Cyber Coalition 2025 Cyber Exercise in Tallinn, Estonia. When pull requests get personal.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/varmazis/"><u>Maria Varmazis</u></a>, host of <a href="https://space.n2k.com/podcasts/t-minus"><u>T-Minus</u></a> space daily and CyberWire Producer <a href="https://www.linkedin.com/in/elizabeth-stokes-183925181/"><u>Liz Stokes</u></a> as they share  their coverage of the NATO Cyber Coalition 2025 Cyber Exercise in Tallinn, Estonia.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/us-wants-cyber-partnerships-to-send-message-to-adversaries"><u>US wants cyber partnerships to send ‘coordinated, strategic message’ to adversaries</u></a> (The Record) </p>
<p><a href="https://therecord.media/sweden-cyber-threats-europe-permanent"><u>Europe must adapt to ‘permanent’ cyber and hybrid threats, Sweden warns</u></a> (The Record) </p>
<p><a href="https://www.netskope.com/blog/attackers-weaponize-signed-rmm-tools-via-zoom-meet-teams-lures"><u>Attackers Weaponize Signed RMM Tools via Zoom, Meet, &amp; Teams Lures</u></a> (Netskope)</p>
<p><a href="https://www.intel471.com/blog/winter-olympics-2026-hacktivism-surges-ahead-of-protests-and-suspected-sabotage/"><u>Winter Olympics 2026: Hacktivism Surges Ahead of Protests and Suspected Sabotage</u></a> (Intel 471)</p>
<p><a href="https://www.halcyon.ai/ransomware-research-reports/how-ai-is-and-is-not-changing-ransomware"><u>How AI is and is Not Changing Ransomware</u></a> (Halcyon)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisa-flags-microsoft-configmgr-rce-flaw-as-exploited-in-attacks/"><u>CISA flags critical Microsoft SCCM flaw as exploited in attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.scworld.com/news/foxveil-malware-loader-abuses-discord-cloudflare-netlify-for-staging"><u>Foxveil malware loader abuses Discord, Cloudflare, Netlify for staging</u></a> (SC Media)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/amos-infostealer-targets-macos-through-a-popular-ai-app/"><u>AMOS infostealer targets macOS through a popular AI app</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/california-fines-disney-data-privacy"><u>California fines Disney $2.75 million for data privacy violations</u></a> (The Record)</p>
<p><a href="https://theshamblog.com/an-ai-agent-published-a-hit-piece-on-me/"><u>An AI Agent Published a Hit Piece on Me</u></a> (The Shamblog)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1653</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0f0644a4-fae2-11f0-8b3b-bfdea8c41ede]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9990618987.mp3?updated=1771265346" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI or I-Spy?</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2488/notes</link>
      <description>Malicious Chrome extensions pose as AI tools. Google says nation-states are increasingly abusing its Gemini artificial intelligence tool.  Data extortion group World Leaks deploys a new malware tool called RustyRocket. An Atlanta healthcare provider data breach affects over 625,000. Apple patches an iOS zero-day that’s been around since version 1.0. A government shutdown would furlough more than half of CISA’s staff. Dutch police arrest the alleged seller of the JokerOTP phishing automation service. Our guest is Simon Horswell, Senior Fraud Specialist at Entrust, discussing evolving romance scams for Valentine's Day. Fun with filters provides fuel for phishers. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Simon Horswell, Senior Fraud Specialist at Entrust, discussing evolving romance scams for Valentine's Day. If you enjoyed this conversation, tune into Hacking Humans to hear the full interview. 

Selected Reading

Fake AI Chrome extensions with 300K users steal credentials, emails (Bleeping Computer)

Nation-state hackers ramping up use of Gemini for target reconnaissance, malware coding, Google says (The Record)

World Leaks Ransomware Adds Custom Malware ‘RustyRocket' to Attacks (Infosecurity Magazine)

ApolloMD Data Breach Impacts 626,000 Individuals (SecurityWeek)

Apple patches decade-old iOS zero-day exploited in the wild (The Register)

CISA: DHS Funding Lapse Would Sideline Federal Cyber Staff (Gov Infosecurity)

CISA Shares Lessons Learned from an Incident Response Engagement (CISA.gov)

Police arrest seller of JokerOTP MFA passcode capturing tool (Bleeping Computer)

What Can the AI Work Caricature Trend Teach Us About the Risks of Shadow AI? (Fortra)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 12 Feb 2026 21:10:00 -0000</pubDate>
      <itunes:title>AI or I-Spy?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2488</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Malicious Chrome extensions pose as AI tools. Google says nation-states are increasingly abusing its Gemini artificial intelligence tool.  Data extortion group World Leaks deploys a new malware tool called RustyRocket. An Atlanta healthcare provider data breach affects over 625,000. Apple patches an iOS zero-day that’s been around since version 1.0. A government shutdown would furlough more than half of CISA’s staff. Dutch police arrest the alleged seller of the JokerOTP phishing automation service. Our guest is Simon Horswell, Senior Fraud Specialist at Entrust, discussing evolving romance scams for Valentine's Day. Fun with filters provides fuel for phishers. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Simon Horswell, Senior Fraud Specialist at Entrust, discussing evolving romance scams for Valentine's Day. If you enjoyed this conversation, tune into Hacking Humans to hear the full interview. 

Selected Reading

Fake AI Chrome extensions with 300K users steal credentials, emails (Bleeping Computer)

Nation-state hackers ramping up use of Gemini for target reconnaissance, malware coding, Google says (The Record)

World Leaks Ransomware Adds Custom Malware ‘RustyRocket' to Attacks (Infosecurity Magazine)

ApolloMD Data Breach Impacts 626,000 Individuals (SecurityWeek)

Apple patches decade-old iOS zero-day exploited in the wild (The Register)

CISA: DHS Funding Lapse Would Sideline Federal Cyber Staff (Gov Infosecurity)

CISA Shares Lessons Learned from an Incident Response Engagement (CISA.gov)

Police arrest seller of JokerOTP MFA passcode capturing tool (Bleeping Computer)

What Can the AI Work Caricature Trend Teach Us About the Risks of Shadow AI? (Fortra)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Malicious Chrome extensions pose as AI tools. Google says nation-states are increasingly abusing its Gemini artificial intelligence tool.  Data extortion group World Leaks deploys a new malware tool called RustyRocket. An Atlanta healthcare provider data breach affects over 625,000. Apple patches an iOS zero-day that’s been around since version 1.0. A government shutdown would furlough more than half of CISA’s staff. Dutch police arrest the alleged seller of the JokerOTP phishing automation service. Our guest is Simon Horswell, Senior Fraud Specialist at Entrust, discussing evolving romance scams for Valentine's Day. Fun with filters provides fuel for phishers.<strong> </strong></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/simon-horswell-72b2052a/"><u>Simon Horswell</u></a>, Senior Fraud Specialist at <a href="https://www.linkedin.com/company/entrust/"><u>Entrust</u></a>, discussing evolving romance scams for Valentine's Day. If you enjoyed this conversation, tune into <a href="https://thecyberwire.com/podcasts/hacking-humans/373/notes"><u>Hacking Humans</u></a> to hear the full interview. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/fake-ai-chrome-extensions-with-300k-users-steal-credentials-emails/"><u>Fake AI Chrome extensions with 300K users steal credentials, emails</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/nation-state-hackers-using-gemini-for-malicious-campaigns"><u>Nation-state hackers ramping up use of Gemini for target reconnaissance, malware coding, Google says</u></a> (The Record)</p>
<p><a href="https://www.infosecurity-magazine.com/news/world-leaks-ransomware-rustyrocket/"><u>World Leaks Ransomware Adds Custom Malware ‘RustyRocket' to Attacks</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.securityweek.com/apollomd-data-breach-impacts-626000-individuals/"><u>ApolloMD Data Breach Impacts 626,000 Individuals</u></a> (SecurityWeek)</p>
<p><a href="https://www.theregister.com/2026/02/12/apple_ios_263/"><u>Apple patches decade-old iOS zero-day exploited in the wild</u></a> (The Register)</p>
<p><a href="https://www.govinfosecurity.com/cisa-dhs-funding-lapse-would-sideline-federal-cyber-staff-a-30740"><u>CISA: DHS Funding Lapse Would Sideline Federal Cyber Staff</u></a> (Gov Infosecurity)</p>
<p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-266a"><u>CISA Shares Lessons Learned from an Incident Response Engagement</u></a> (CISA.gov)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/police-arrest-seller-of-jokerotp-mfa-passcode-capturing-tool/"><u>Police arrest seller of JokerOTP MFA passcode capturing tool</u></a> (Bleeping Computer)</p>
<p><a href="https://www.fortra.com/blog/what-can-ai-work-caricature-trend-teach-us-about-risks-shadow-ai"><u>What Can the AI Work Caricature Trend Teach Us About the Risks of Shadow AI?</u></a> (Fortra)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1609</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0f5a0d46-fae2-11f0-8b3b-bb1edeb5bf3f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9709570350.mp3?updated=1770925813" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When Windows breaks and chips crack.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2487/notes</link>
      <description>Patch Tuesday. Preliminary findings from the European Commission come down on TikTok. Switzerland’s military cancels its contract with Palantir. Social engineering leads to payroll fraud. Google hands over extensive personal data on a British student activist. Researchers unearth a global espionage operation called “The Shadow Campaigns.” Notepad’s newest features could lead to remote code execution. Our guest is Hazel Cerra, Resident Agent in Charge of the Atlantic City Office for the United States Secret Service. Ring says it’s all about dogs, but critics hear the whistle.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today, we’re joined by Hazel Cerra, Resident Agent in Charge of the Atlantic City Office for the United States Secret Service, as she discusses the evolution of the Secret Service’s investigative mission—from its early focus on financial crimes such as counterfeit currency and credit card fraud to the growing challenges posed by cryptocurrency-related crime.

Selected Reading

Microsoft February 2026 Patch Tuesday Fixes 58 Vulnerabilities, Six actively Exploited Flaws (Beyond Machines)

Adobe Releases February 2026 Patches for Multiple Products (Beyond Machines)

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, Phoenix Contact (SecurityWeek)

Chipmaker Patch Tuesday: Over 80 Vulnerabilities Addressed by Intel and AMD (SecurityWeek)

Commission preliminarily finds TikTok's addictive design in breach of the Digital Services Act (European Commission)

Palantir's Swiss Exit Highlights Global Data Sovereignty Challenge (NewsCase)

Payroll pirates conned the help desk, stole employee’s pay (The Register)

Google Fulfilled ICE Subpoena Demanding Student Journalist’s Bank and Credit Card Numbers (The Intercept)

The Shadow Campaigns: Uncovering Global Espionage (Palo Alto Networks Unit 42)

Notepad's new Markdown powers served with a side of RCE (The Register)

With Ring, American Consumers Built a Surveillance Dragnet (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 11 Feb 2026 21:10:00 -0000</pubDate>
      <itunes:title>When Windows breaks and chips crack.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2487</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Patch Tuesday. Preliminary findings from the European Commission come down on TikTok. Switzerland’s military cancels its contract with Palantir. Social engineering leads to payroll fraud. Google hands over extensive personal data on a British student activist. Researchers unearth a global espionage operation called “The Shadow Campaigns.” Notepad’s newest features could lead to remote code execution. Our guest is Hazel Cerra, Resident Agent in Charge of the Atlantic City Office for the United States Secret Service. Ring says it’s all about dogs, but critics hear the whistle.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today, we’re joined by Hazel Cerra, Resident Agent in Charge of the Atlantic City Office for the United States Secret Service, as she discusses the evolution of the Secret Service’s investigative mission—from its early focus on financial crimes such as counterfeit currency and credit card fraud to the growing challenges posed by cryptocurrency-related crime.

Selected Reading

Microsoft February 2026 Patch Tuesday Fixes 58 Vulnerabilities, Six actively Exploited Flaws (Beyond Machines)

Adobe Releases February 2026 Patches for Multiple Products (Beyond Machines)

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, Phoenix Contact (SecurityWeek)

Chipmaker Patch Tuesday: Over 80 Vulnerabilities Addressed by Intel and AMD (SecurityWeek)

Commission preliminarily finds TikTok's addictive design in breach of the Digital Services Act (European Commission)

Palantir's Swiss Exit Highlights Global Data Sovereignty Challenge (NewsCase)

Payroll pirates conned the help desk, stole employee’s pay (The Register)

Google Fulfilled ICE Subpoena Demanding Student Journalist’s Bank and Credit Card Numbers (The Intercept)

The Shadow Campaigns: Uncovering Global Espionage (Palo Alto Networks Unit 42)

Notepad's new Markdown powers served with a side of RCE (The Register)

With Ring, American Consumers Built a Surveillance Dragnet (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Patch Tuesday. Preliminary findings from the European Commission come down on TikTok. Switzerland’s military cancels its contract with Palantir. Social engineering leads to payroll fraud. Google hands over extensive personal data on a British student activist. Researchers unearth a global espionage operation called “The Shadow Campaigns.” Notepad’s newest features could lead to remote code execution. Our guest is Hazel Cerra, Resident Agent in Charge of the Atlantic City Office for the United States Secret Service. Ring says it’s all about dogs, but critics hear the whistle.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today, we’re joined by <a href="https://www.linkedin.com/in/hazelcerra/"><u>Hazel Cerra</u></a>, Resident Agent in Charge of the Atlantic City Office for the <a href="https://www.linkedin.com/company/us-secret-service/"><u>United States Secret Service</u></a>, as she discusses the evolution of the Secret Service’s investigative mission—from its early focus on financial crimes such as counterfeit currency and credit card fraud to the growing challenges posed by cryptocurrency-related crime.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://beyondmachines.net/event_details/microsoft-february-2026-patch-tuesday-fixes-58-vulnerabilities-six-actively-exploited-flaws-0-y-l-t-j/gD2P6Ple2L"><u>Microsoft February 2026 Patch Tuesday Fixes 58 Vulnerabilities, Six actively Exploited Flaws</u></a> (Beyond Machines)</p>
<p><a href="https://beyondmachines.net/event_details/adobe-releases-february-2026-patches-for-multiple-products-5-q-6-7-r/gD2P6Ple2L"><u>Adobe Releases February 2026 Patches for Multiple Products</u></a> (Beyond Machines)</p>
<p><a href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-siemens-schneider-aveva-phoenix-contact/"><u>ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, Phoenix Contact</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/chipmaker-patch-tuesday-over-80-vulnerabilities-addressed-by-intel-and-amd/"><u>Chipmaker Patch Tuesday: Over 80 Vulnerabilities Addressed by Intel and AMD</u></a> (SecurityWeek)</p>
<p><a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_26_312"><u>Commission preliminarily finds TikTok's addictive design in breach of the Digital Services Act</u></a> (European Commission)</p>
<p><a href="https://www.newscase.com/palantirs-swiss-exit-highlights-global-data-sovereignty-challenge/"><u>Palantir's Swiss Exit Highlights Global Data Sovereignty Challenge</u></a> (NewsCase)</p>
<p><a href="https://www.theregister.com/2026/02/11/payroll_pirates_business_social_engineering/"><u>Payroll pirates conned the help desk, stole employee’s pay</u></a> (The Register)</p>
<p><a href="https://theintercept.com/2026/02/10/google-ice-subpoena-student-journalist/?mid=1#cid=3384744"><u>Google Fulfilled ICE Subpoena Demanding Student Journalist’s Bank and Credit Card Numbers</u></a> (The Intercept)</p>
<p><a href="https://unit42.paloaltonetworks.com/shadow-campaigns-uncovering-global-espionage/"><u>The Shadow Campaigns: Uncovering Global Espionage</u></a> (Palo Alto Networks Unit 42)</p>
<p><a href="https://www.theregister.com/2026/02/11/notepad_rce_flaw/"><u>Notepad's new Markdown powers served with a side of RCE</u></a> (The Register)</p>
<p><a href="https://www.404media.co/with-ring-american-consumers-built-a-surveillance-dragnet/?ref=daily-stories-newsletter&amp;attribution_id=698b47cbe724d10001786209&amp;attribution_type=post"><u>With Ring, American Consumers Built a Surveillance Dragnet</u></a> (404 Media)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1960</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0f3004e2-fae2-11f0-8b3b-ef7f9ce8f0a6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1996983851.mp3?updated=1770841543" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A spyware swiss army knife.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2486/notes</link>
      <description>ZeroDayRAT delivers full mobile compromise on Android and iOS. The UK warns infrastructure operators to act now as severe cyber threats mount. Russia moves to block Telegram. The FTC draws a line on data sales to foreign adversaries. Researchers unpack DeadVax, a stealthy new malware campaign, while an old-school Linux botnet resurfaces. BeyondTrust fixes a critical flaw. And in AI, are we moving too fast? One mild training prompt may be enough to knock down safety guardrails. Our guest is Omer Akgul, Researcher at RSA Conference, discussing his work on "The Case for LLM Consistency Metrics in Cybersecurity (and Beyond)." A pair of penned pentesters provoke a pricey payout. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. 

CyberWire Guest

Today we are joined by Omer Akgul, PhD, Researcher at RSA Conference, discussing his work on "The Case for LLM Consistency Metrics in Cybersecurity (and Beyond)."

Selected Reading

New ‘ZeroDayRAT’ Spyware Kit Enables Total Compromise of iOS, Android Devices (SecurityWeek)

NCSC Issues Warning Over “Severe” Cyber-Attacks Targeting Critical National Infrastructure (Infosecurity Magazine)

Russian Watchdog Starts Limiting Access to Telegram, RBC Reports (Bloomberg)

FTC Reminds Data Brokers of Their Obligations to Comply with PADFAA (FTC)

Dead#Vax: Analyzing Multi-Stage VHD Delivery and Self-Parsing Batch Scripts to Deploy In-Memory Shellcode (secureonix)

New ‘SSHStalker’ Linux Botnet Uses Old Techniques (SecurityWeek)

BeyondTrust Patches Critical RCE Vulnerability (SecurityWeek)

Critics warn America’s 'move fast' AI strategy could cost it the global market  (CyberScoop)

Microsoft boffins figured out how to break LLM safety guardrails with one simple prompt (The Register)

County pays $600,000 to pentesters it arrested for assessing courthouse security (Ars Technica)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Feb 2026 21:10:00 -0000</pubDate>
      <itunes:title>A spyware swiss army knife.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2486</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>ZeroDayRAT delivers full mobile compromise on Android and iOS. The UK warns infrastructure operators to act now as severe cyber threats mount. Russia moves to block Telegram. The FTC draws a line on data sales to foreign adversaries. Researchers unpack DeadVax, a stealthy new malware campaign, while an old-school Linux botnet resurfaces. BeyondTrust fixes a critical flaw. And in AI, are we moving too fast? One mild training prompt may be enough to knock down safety guardrails. Our guest is Omer Akgul, Researcher at RSA Conference, discussing his work on "The Case for LLM Consistency Metrics in Cybersecurity (and Beyond)." A pair of penned pentesters provoke a pricey payout. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. 

CyberWire Guest

Today we are joined by Omer Akgul, PhD, Researcher at RSA Conference, discussing his work on "The Case for LLM Consistency Metrics in Cybersecurity (and Beyond)."

Selected Reading

New ‘ZeroDayRAT’ Spyware Kit Enables Total Compromise of iOS, Android Devices (SecurityWeek)

NCSC Issues Warning Over “Severe” Cyber-Attacks Targeting Critical National Infrastructure (Infosecurity Magazine)

Russian Watchdog Starts Limiting Access to Telegram, RBC Reports (Bloomberg)

FTC Reminds Data Brokers of Their Obligations to Comply with PADFAA (FTC)

Dead#Vax: Analyzing Multi-Stage VHD Delivery and Self-Parsing Batch Scripts to Deploy In-Memory Shellcode (secureonix)

New ‘SSHStalker’ Linux Botnet Uses Old Techniques (SecurityWeek)

BeyondTrust Patches Critical RCE Vulnerability (SecurityWeek)

Critics warn America’s 'move fast' AI strategy could cost it the global market  (CyberScoop)

Microsoft boffins figured out how to break LLM safety guardrails with one simple prompt (The Register)

County pays $600,000 to pentesters it arrested for assessing courthouse security (Ars Technica)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>ZeroDayRAT delivers full mobile compromise on Android and iOS. The UK warns infrastructure operators to act now as severe cyber threats mount. Russia moves to block Telegram. The FTC draws a line on data sales to foreign adversaries. Researchers unpack DeadVax, a stealthy new malware campaign, while an old-school Linux botnet resurfaces. BeyondTrust fixes a critical flaw. And in AI, are we moving too fast? One mild training prompt may be enough to knock down safety guardrails. Our guest is Omer Akgul, Researcher at RSA Conference, discussing his work on "The Case for LLM Consistency Metrics in Cybersecurity (and Beyond)." A pair of penned pentesters provoke a pricey payout. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>. </p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/omer-akgul-51031bb3/"><u>Omer Akgul</u></a>, PhD, Researcher at <a href="https://www.linkedin.com/company/one-rsac/"><u>RSA Conference</u></a>, discussing his work on "<a href="https://www.rsaconference.com/library/blog/the-case-for-llm-consistency-metrics-in-cybersecurity-and-beyond"><u>The Case for LLM Consistency Metrics in Cybersecurity (and Beyond)</u></a>."</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.securityweek.com/new-zerodayrat-spyware-kit-enables-total-compromise-of-ios-android-devices/"><u>New ‘ZeroDayRAT’ Spyware Kit Enables Total Compromise of iOS, Android Devices</u></a> (SecurityWeek)</p>
<p><a href="https://www.infosecurity-magazine.com/news/ncsc-warning-severe-cyberattacks/"><u>NCSC Issues Warning Over “Severe” Cyber-Attacks Targeting Critical National Infrastructure</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.bloomberg.com/news/articles/2026-02-10/russian-watchdog-starts-limiting-access-to-telegram-rbc-reports"><u>Russian Watchdog Starts Limiting Access to Telegram, RBC Reports</u></a> (Bloomberg)</p>
<p><a href="https://www.ftc.gov/news-events/news/press-releases/2026/02/ftc-reminds-data-brokers-their-obligations-comply-padfaa"><u>FTC Reminds Data Brokers of Their Obligations to Comply with PADFAA</u></a> (FTC)</p>
<p><a href="https://www.securonix.com/blog/deadvax-threat-research-security-advisory/"><u>Dead#Vax: Analyzing Multi-Stage VHD Delivery and Self-Parsing Batch Scripts to Deploy In-Memory Shellcode</u></a> (secureonix)</p>
<p><a href="https://www.securityweek.com/new-sshstalker-linux-botnet-uses-old-techniques/"><u>New ‘SSHStalker’ Linux Botnet Uses Old Techniques</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/beyondtrust-patches-critical-rce-vulnerability/"><u>BeyondTrust Patches Critical RCE Vulnerability</u></a> (SecurityWeek)</p>
<p><a href="https://cyberscoop.com/trump-ai-policy-global-adoption-safety-regulation-critics/"><u>Critics warn America’s 'move fast' AI strategy could cost it the global market </u></a> (CyberScoop)</p>
<p><a href="https://www.theregister.com/2026/02/09/microsoft_one_prompt_attack/"><u>Microsoft boffins figured out how to break LLM safety guardrails with one simple prompt</u></a> (The Register)</p>
<p><a href="https://arstechnica.com/security/2026/01/county-pays-600000-to-pentesters-it-arrested-for-assessing-courthouse-security/"><u>County pays $600,000 to pentesters it arrested for assessing courthouse security</u></a> (Ars Technica)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1719</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0f81d7a4-fae2-11f0-8b3b-a33598ffffd0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6767848751.mp3?updated=1770755403" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bringing it all together. [CISO Persepctives]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/111/notes</link>
      <description>Please enjoy this encore of CISO Perspectives.

In the season finale of CISOP, Kim Jones is joined by N2K’s own Ethan Cook to reflect on the conversations that shaped this season. Together, they revisit standout moments from Kim’s interviews, unpacking their significance and getting Ethan’s fresh perspective on the cybersecurity workforce challenge—as someone viewing the industry from the outside.

Since the mid-season reflection, Kim has explored a wide range of workforce issues, including skills mapping, talent identification, and the evolving strategies needed to close cybersecurity’s talent gap.

Survey: 

We want to hear your perspectives on this season, fill out our audience survey before August 31st. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Feb 2026 07:00:00 -0000</pubDate>
      <itunes:title>Bringing it all together. [CISO Persepctives]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>111</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/57e23afe-f7ac-11f0-970f-efc977a05d89/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of CISO Perspectives.

In the season finale of CISOP, Kim Jones is joined by N2K’s own Ethan Cook to reflect on the conversations that shaped this season. Together, they revisit standout moments from Kim’s interviews, unpacking their significance and getting Ethan’s fresh perspective on the cybersecurity workforce challenge—as someone viewing the industry from the outside.

Since the mid-season reflection, Kim has explored a wide range of workforce issues, including skills mapping, talent identification, and the evolving strategies needed to close cybersecurity’s talent gap.

Survey: 

We want to hear your perspectives on this season, fill out our audience survey before August 31st. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of CISO Perspectives.</p>
<p>In the season finale of CISOP, Kim Jones is joined by N2K’s own Ethan Cook to reflect on the conversations that shaped this season. Together, they revisit standout moments from Kim’s interviews, unpacking their significance and getting Ethan’s fresh perspective on the cybersecurity workforce challenge—as someone viewing the industry from the outside.</p>
<p>Since the mid-season reflection, Kim has explored a wide range of workforce issues, including skills mapping, talent identification, and the evolving strategies needed to close cybersecurity’s talent gap.</p>
<p><strong>Survey: </strong></p>
<p>We want to hear your perspectives on this season, fill out our <a href="https://www.surveymonkey.com/r/LK95MVV">audience survey</a> before August 31st. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3282</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[57e23afe-f7ac-11f0-970f-efc977a05d89]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5240853332.mp3?updated=1770732837" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Your phone works for them now.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2485/notes</link>
      <description>Ivanti zero-days trigger emergency warnings around the globe. Singapore blames a China-linked spy crew for hitting all four major telcos. DHS opens a privacy probe into ICE surveillance. Researchers flag a zero-click RCE lurking in LLM workflows. Ransomware knocks local government payment systems offline in Florida and Texas. Chrome extensions get nosy with your URLs. BeyondTrust scrambles to patch a critical RCE. A Polish data breach suspect is caught eight years later. It’s the Monday Business Breakdown. Ben Yelin gives us the 101 on subpoenas. And federal prosecutors say two Connecticut men bet big on fraud, and lost.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest is Ben Yelin, Program Director for Public Policy &amp; External Affairs at the University of Maryland Center for Cyber Health and Hazard Strategies, talking about weaponized administrative subpoenas.

Selected Reading

EU, Dutch government announce hacks following Ivanti zero-days (The Record)

Singapore says China-linked hackers targeted telecom providers in major spying campaign (The Record)

Inspector General Investigating Whether ICE's Surveillance Tech Breaks the Law (404 Media)

Critical 0-Click RCE Vulnerability in Claude Desktop Extensions Exposes 10,000+ Users to Remote Attacks (Cyber Security News) 

Payment tech provider for Texas, Florida governments working with FBI to resolve ransomware attack (The Record)

Chrome extensions can use unfixable time-channel to leak tab URLs (CyberInsider)

BeyondTrust warns of critical RCE flaw in remote support software (Bleeping Computer)

Hacker Poland’s largest data leaks arrested (TVP World)

LevelBlue will acquire MDR provider Alert Logic from Fortra. (N2K Pro Business Briefing)

Men charged in FanDuel scheme fueled by thousands of stolen identities (Bleeping Computer) 

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 09 Feb 2026 21:10:00 -0000</pubDate>
      <itunes:title>Your phone works for them now.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2485</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Ivanti zero-days trigger emergency warnings around the globe. Singapore blames a China-linked spy crew for hitting all four major telcos. DHS opens a privacy probe into ICE surveillance. Researchers flag a zero-click RCE lurking in LLM workflows. Ransomware knocks local government payment systems offline in Florida and Texas. Chrome extensions get nosy with your URLs. BeyondTrust scrambles to patch a critical RCE. A Polish data breach suspect is caught eight years later. It’s the Monday Business Breakdown. Ben Yelin gives us the 101 on subpoenas. And federal prosecutors say two Connecticut men bet big on fraud, and lost.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest is Ben Yelin, Program Director for Public Policy &amp; External Affairs at the University of Maryland Center for Cyber Health and Hazard Strategies, talking about weaponized administrative subpoenas.

Selected Reading

EU, Dutch government announce hacks following Ivanti zero-days (The Record)

Singapore says China-linked hackers targeted telecom providers in major spying campaign (The Record)

Inspector General Investigating Whether ICE's Surveillance Tech Breaks the Law (404 Media)

Critical 0-Click RCE Vulnerability in Claude Desktop Extensions Exposes 10,000+ Users to Remote Attacks (Cyber Security News) 

Payment tech provider for Texas, Florida governments working with FBI to resolve ransomware attack (The Record)

Chrome extensions can use unfixable time-channel to leak tab URLs (CyberInsider)

BeyondTrust warns of critical RCE flaw in remote support software (Bleeping Computer)

Hacker Poland’s largest data leaks arrested (TVP World)

LevelBlue will acquire MDR provider Alert Logic from Fortra. (N2K Pro Business Briefing)

Men charged in FanDuel scheme fueled by thousands of stolen identities (Bleeping Computer) 

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ivanti zero-days trigger emergency warnings around the globe. Singapore blames a China-linked spy crew for hitting all four major telcos. DHS opens a privacy probe into ICE surveillance. Researchers flag a zero-click RCE lurking in LLM workflows. Ransomware knocks local government payment systems offline in Florida and Texas. Chrome extensions get nosy with your URLs. BeyondTrust scrambles to patch a critical RCE. A Polish data breach suspect is caught eight years later. It’s the Monday Business Breakdown. Ben Yelin gives us the 101 on subpoenas. And federal prosecutors say two Connecticut men bet big on fraud, and lost.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Our guest is <a href="https://www.linkedin.com/in/benjamin-yelin-5b14114b/"><u>Ben Yelin</u></a>, Program Director for Public Policy &amp; External Affairs at the <a href="https://www.umaryland.edu/chhs/"><u>University of Maryland Center for Cyber Health and Hazard Strategies</u></a>, talking about <a href="https://www.washingtonpost.com/investigations/2026/02/03/homeland-security-administrative-subpoena/"><u>weaponized administrative subpoenas</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/eu-dutch-government-announce-hacks-ivanti-zero-days"><u>EU, Dutch government announce hacks following Ivanti zero-days</u></a> (The Record)</p>
<p><a href="https://therecord.media/singapore-attributes-telecoms-hacks-unc3886"><u>Singapore says China-linked hackers targeted telecom providers in major spying campaign</u></a> (The Record)</p>
<p><a href="https://www.404media.co/inspector-general-investigating-whether-ices-surveillance-tech-breaks-the-law/"><u>Inspector General Investigating Whether ICE's Surveillance Tech Breaks the Law</u></a> (404 Media)</p>
<p><a href="https://cybersecuritynews.com/claude-desktop-extensions-0-click-vulnerability/"><u>Critical 0-Click RCE Vulnerability in Claude Desktop Extensions Exposes 10,000+ Users to Remote Attacks</u></a> (Cyber Security News) </p>
<p><a href="https://therecord.media/payment-tech-provider-texas-florida-govs-ransomware-attack"><u>Payment tech provider for Texas, Florida governments working with FBI to resolve ransomware attack</u></a> (The Record)</p>
<p><a href="https://cyberinsider.com/chrome-extensions-can-use-unfixable-time-channel-to-leak-tab-urls/"><u>Chrome extensions can use unfixable time-channel to leak tab URLs</u></a> (CyberInsider)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/beyondtrust-warns-of-critical-rce-flaw-in-remote-support-software/"><u>BeyondTrust warns of critical RCE flaw in remote support software</u></a> (Bleeping Computer)</p>
<p><a href="https://tvpworld.com/91491418/man-behind-one-of-polands-largest-data-leaks-caught"><u>Hacker Poland’s largest data leaks arrested</u></a> (TVP World)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/8/5"><u>LevelBlue will acquire MDR provider Alert Logic from Fortra.</u></a> (N2K Pro Business Briefing)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/men-charged-in-massive-fanduel-fraud-scheme-fueled-by-thousands-of-stolen-identities/"><u>Men charged in FanDuel scheme fueled by thousands of stolen identities</u></a> (Bleeping Computer) </p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1584</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0faac8c6-fae2-11f0-8b3b-3bed78b1db08]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1530970864.mp3?updated=1770666572" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Simone Petrella: Fake it, until you make it. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/107/notes</link>
      <description>Simone Petrella, CEO of cybersecurity training workforce firm CyberVista, spent her career in the Department of Defense as a threat intelligence analyst before founding CyberVista. She says that running a company has a new set of challenges each day thrown at you. She explains that the way she finds the most success is by letting her team contribute to each matter, and having a say in the decisions made as they pertain to each department. Simone says "I would say is I am a firm firm believer in the idea of empowering people to really own and kind of run with the things that they're passionate about." She notes that people will do amazing things when they are passionate and that faking it until you make it is true, because you will get where you're going by having that passion and that inspiration. We thank Simone for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 08 Feb 2026 08:00:00 -0000</pubDate>
      <itunes:title>Simone Petrella: Fake it, until you make it. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>107</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/e95c1890-037f-11f1-a43f-670f051f8afd/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Simone Petrella, CEO of cybersecurity training workforce firm CyberVista, spent her career in the Department of Defense as a threat intelligence analyst before founding CyberVista. She says that running a company has a new set of challenges each day thrown at you. She explains that the way she finds the most success is by letting her team contribute to each matter, and having a say in the decisions made as they pertain to each department. Simone says "I would say is I am a firm firm believer in the idea of empowering people to really own and kind of run with the things that they're passionate about." She notes that people will do amazing things when they are passionate and that faking it until you make it is true, because you will get where you're going by having that passion and that inspiration. We thank Simone for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Simone Petrella, CEO of cybersecurity training workforce firm CyberVista, spent her career in the Department of Defense as a threat intelligence analyst before founding CyberVista. She says that running a company has a new set of challenges each day thrown at you. She explains that the way she finds the most success is by letting her team contribute to each matter, and having a say in the decisions made as they pertain to each department. Simone says "I would say is I am a firm firm believer in the idea of empowering people to really own and kind of run with the things that they're passionate about." She notes that people will do amazing things when they are passionate and that faking it until you make it is true, because you will get where you're going by having that passion and that inspiration. We thank Simone for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>547</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e95c1890-037f-11f1-a43f-670f051f8afd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3456190712.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The phishing kit that thinks like a human. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/411/notes</link>
      <description>Piotr Wojtyla, Head of Threat Intel and Platform at Abnormal AI, is discussing their work on "InboxPrime AI: New Phishing Kit Fueling Scalable, AI-Powered Cybercrime." A new AI-powered phishing kit called InboxPrime AI is rapidly gaining traction in underground forums, automating the creation and delivery of highly believable phishing emails that mimic legitimate business communications and leverage Gmail’s web interface to evade detection. 

First spotted in October 2025, the kit combines AI-generated content, template variation, sender identity spoofing, and built-in spam checks to maximize inbox placement and dramatically lower the barrier to running large-scale phishing campaigns. Its shift to a one-time $1,000 purchase and growing user base underscore the industrialization of phishing and highlight how quickly AI-driven attack tools are outpacing legacy email defenses.

The research can be found here:


  
⁠⁠⁠InboxPrime AI: New Phishing Kit Fueling Scalable, AI-Powered Cybercrime



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Feb 2026 08:00:00 -0000</pubDate>
      <itunes:title>The phishing kit that thinks like a human. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>411</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/de738ca4-0377-11f1-9a1d-2b93a66444c7/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Piotr Wojtyla, Head of Threat Intel and Platform at Abnormal AI, is discussing their work on "InboxPrime AI: New Phishing Kit Fueling Scalable, AI-Powered Cybercrime." A new AI-powered phishing kit called InboxPrime AI is rapidly gaining traction in underground forums, automating the creation and delivery of highly believable phishing emails that mimic legitimate business communications and leverage Gmail’s web interface to evade detection. 

First spotted in October 2025, the kit combines AI-generated content, template variation, sender identity spoofing, and built-in spam checks to maximize inbox placement and dramatically lower the barrier to running large-scale phishing campaigns. Its shift to a one-time $1,000 purchase and growing user base underscore the industrialization of phishing and highlight how quickly AI-driven attack tools are outpacing legacy email defenses.

The research can be found here:


  
⁠⁠⁠InboxPrime AI: New Phishing Kit Fueling Scalable, AI-Powered Cybercrime



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/piotr-wojtyla/">Piotr Wojtyla</a>, Head of Threat Intel and Platform at <a href="https://www.linkedin.com/company/abnormal-ai/">Abnormal AI</a>, is discussing their work on "InboxPrime AI: New Phishing Kit Fueling Scalable, AI-Powered Cybercrime." A new AI-powered phishing kit called InboxPrime AI is rapidly gaining traction in underground forums, automating the creation and delivery of highly believable phishing emails that mimic legitimate business communications and leverage Gmail’s web interface to evade detection. </p>
<p>First spotted in October 2025, the kit combines AI-generated content, template variation, sender identity spoofing, and built-in spam checks to maximize inbox placement and dramatically lower the barrier to running large-scale phishing campaigns. Its shift to a one-time $1,000 purchase and growing user base underscore the industrialization of phishing and highlight how quickly AI-driven attack tools are outpacing legacy email defenses.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://censys.com/blog/exploiting-funneling-behavior-of-injects">⁠⁠⁠</a><a href="https://abnormal.ai/blog/inboxprime-ai-phishing-kit">InboxPrime AI: New Phishing Kit Fueling Scalable, AI-Powered Cybercrime</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1552</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[de738ca4-0377-11f1-9a1d-2b93a66444c7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8555864606.mp3?updated=1770394301" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patch or pull the plug.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2484/notes</link>
      <description>CISA cracks down on aging edge devices. Congress looks to sure up energy sector security. DHS facial recognition software may fall short. Romania’s national oil pipeline operator suffers a cyberattack. The European Commission may fine TikTok for being addictive. DKnife is a China-linked threat actor operating a long-running adversary-in-the-middle framework. Researchers say OpenClaw is being abused at scale. Our guest is Mike Carr, Field CTO at Xona, talking about how Italy should be thinking about protecting the 2026 Winter Olympics. A BASE jumper attempts a daring AI alibi.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Mike Carr, Field CTO at Xona, talking about how Italy should be thinking about protecting the 2026 Winter Olympics.

Selected Reading

CISA: Remove EOL edge kit before cybercriminals strike (The Register)

5 Bills to Boost Energy Sector Cyber Defenses Clear House Panel (SecurityWeek)

ICE and CBP’s Face-Recognition App Can’t Actually Verify Who People Are (WIRED)

Romania’s oil pipeline operator confirms cyberattack as hackers claim data theft (The Record) 

Flickr discloses potential data breach exposing users' names, emails (Bleeping Computer)

17% of 3rd-Party Add-Ons for OpenClaw Used in Crypto Theft and macOS Malware (Hackread)

EU says TikTok faces large fine over "addictive design" (Bleeping Computer)

'DKnife' Implant Used by Chinese Threat Actor for Adversary-in-the-Middle Attacks (SecurityWeek)

All gas, no brakes: Time to come to AI church (Talos Intelligence) 

Man who videotaped himself BASE jumping in Yosemite arrested, federal officials say. He says it was AI (LA Times)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 06 Feb 2026 21:10:00 -0000</pubDate>
      <itunes:title>Patch or pull the plug.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2481</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA cracks down on aging edge devices. Congress looks to sure up energy sector security. DHS facial recognition software may fall short. Romania’s national oil pipeline operator suffers a cyberattack. The European Commission may fine TikTok for being addictive. DKnife is a China-linked threat actor operating a long-running adversary-in-the-middle framework. Researchers say OpenClaw is being abused at scale. Our guest is Mike Carr, Field CTO at Xona, talking about how Italy should be thinking about protecting the 2026 Winter Olympics. A BASE jumper attempts a daring AI alibi.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Mike Carr, Field CTO at Xona, talking about how Italy should be thinking about protecting the 2026 Winter Olympics.

Selected Reading

CISA: Remove EOL edge kit before cybercriminals strike (The Register)

5 Bills to Boost Energy Sector Cyber Defenses Clear House Panel (SecurityWeek)

ICE and CBP’s Face-Recognition App Can’t Actually Verify Who People Are (WIRED)

Romania’s oil pipeline operator confirms cyberattack as hackers claim data theft (The Record) 

Flickr discloses potential data breach exposing users' names, emails (Bleeping Computer)

17% of 3rd-Party Add-Ons for OpenClaw Used in Crypto Theft and macOS Malware (Hackread)

EU says TikTok faces large fine over "addictive design" (Bleeping Computer)

'DKnife' Implant Used by Chinese Threat Actor for Adversary-in-the-Middle Attacks (SecurityWeek)

All gas, no brakes: Time to come to AI church (Talos Intelligence) 

Man who videotaped himself BASE jumping in Yosemite arrested, federal officials say. He says it was AI (LA Times)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA cracks down on aging edge devices. Congress looks to sure up energy sector security. DHS facial recognition software may fall short. Romania’s national oil pipeline operator suffers a cyberattack. The European Commission may fine TikTok for being addictive. DKnife is a China-linked threat actor operating a long-running adversary-in-the-middle framework. Researchers say OpenClaw is being abused at scale. Our guest is Mike Carr, Field CTO at Xona, talking about how Italy should be thinking about protecting the 2026 Winter Olympics. A BASE jumper attempts a daring AI alibi.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/themichaelcarr/"><u>Mike Carr</u></a>, Field CTO at <a href="https://www.linkedin.com/company/xona-systems/"><u>Xona</u></a>, talking about how Italy should be thinking about protecting the <a href="https://www.olympics.com/en/milano-cortina-2026"><u>2026 Winter Olympics</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.theregister.com/2026/02/06/cisa_eol_edge_order/"><u>CISA: Remove EOL edge kit before cybercriminals strike</u></a> (The Register)</p>
<p><a href="https://www.securityweek.com/5-bills-to-boost-energy-sector-cyber-defenses-clear-house-panel/"><u>5 Bills to Boost Energy Sector Cyber Defenses Clear House Panel</u></a> (SecurityWeek)</p>
<p><a href="https://www.wired.com/story/cbp-ice-dhs-mobile-fortify-face-recognition-verify-identity/"><u>ICE and CBP’s Face-Recognition App Can’t Actually Verify Who People Are</u></a> (WIRED)</p>
<p><a href="https://therecord.media/romania-conpet-oil-pipeline-ransomware-attack"><u>Romania’s oil pipeline operator confirms cyberattack as hackers claim data theft</u></a> (The Record) </p>
<p><a href="https://www.bleepingcomputer.com/news/security/flickr-discloses-potential-data-breach-exposing-users-names-emails/"><u>Flickr discloses potential data breach exposing users' names, emails</u></a> (Bleeping Computer)</p>
<p><a href="https://hackread.com/openclaw-add-ons-crypto-theft-macos-malware/"><u>17% of 3rd-Party Add-Ons for OpenClaw Used in Crypto Theft and macOS Malware</u></a> (Hackread)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/european-commission-says-tiktok-facing-fine-over-addictive-design/"><u>EU says TikTok faces large fine over "addictive design"</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/dknife-implant-used-by-chinese-threat-actor-for-adversary-in-the-middle-attacks/"><u>'DKnife' Implant Used by Chinese Threat Actor for Adversary-in-the-Middle Attacks</u></a> (SecurityWeek)</p>
<p><a href="https://blog.talosintelligence.com/all-gas-no-brakes-time-to-come-to-ai-church/"><u>All gas, no brakes: Time to come to AI church</u></a> (Talos Intelligence) </p>
<p><a href="https://www.latimes.com/california/story/2026-02-05/man-videotaped-himself-base-jumping-in-yosemite-federal-officials-say-he-says-it-was-ai"><u>Man who videotaped himself BASE jumping in Yosemite arrested, federal officials say. He says it was AI</u></a> (LA Times)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1610</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0edcef0a-fae2-11f0-8b3b-03b36d3e5491]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8070132806.mp3?updated=1770406311" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The quietest weapon in America’s loudest strike.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2483/notes</link>
      <description>Cyber weapons knock out Iranian air defenses during strikes on nuclear sites. ShinyHunters dump more than a million stolen records from Harvard and Penn. Betterment confirms a breach exposing data from roughly 1.4 million accounts. Researchers uncover a sprawling scam network impersonating law firms. Italy blocks cyberattacks aimed at Olympics infrastructure. Critical bugs put n8n and Google Looker servers at risk of full takeover. A state-backed Shadow Campaign hits governments worldwide. OpenClaw shows how AI-powered attacks are becoming faster, cheaper, and harder to stop. Our guest is Tony Scott, CEO of Intrusion and former federal CIO, sharing his perspective on evolving regulation and the realities behind critical policy shifts. Your smartphone may testify against you.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest today comes as a segment from our Caveat podcast. Tony Scott, CEO of Intrusion and former federal CIO, joins Dave Bittner to share his perspective on evolving regulation and the realities behind critical policy shifts. You can listen to Tony and Dave’s full conversation on this week’s episode of Caveat, and catch new episodes of Caveat every Thursday on your favorite podcast app. 

Selected Reading

Exclusive: US used cyber weapons to disrupt Iranian air defenses during 2025 strikes (The Record)

Personal data stolen during Harvard and UPenn data breaches leaked online - over a million details, including emails, home addresses and more, all published (TechRadar)

Data breach at fintech firm Betterment exposes 1.4 million accounts (Bleeping Computer)

Researchers Expose Network of 150 Cloned Law Firm Websites in AI-Powered Scam Campaign (SecurityWeek)

Italy Averted Russian-Linked Cyberattacks Targeting Winter Olympics Websites, Foreign Minister Says (SecurityWeek)

n8n security woes roll on as new critical flaws bypass December fix (The Register)

LookOut: Discovering RCE and Internal Access on Looker (Google Cloud &amp; On-Prem) (Tenable)

Cyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries (SecurityWeek)

The Rise of OpenClaw (SECURITY.COM)

Smartphones Now Involved in Nearly Every Police Investigation (Infosecurity Magazine)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 05 Feb 2026 21:20:00 -0000</pubDate>
      <itunes:title>The quietest weapon in America’s loudest strike.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2483</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Cyber weapons knock out Iranian air defenses during strikes on nuclear sites. ShinyHunters dump more than a million stolen records from Harvard and Penn. Betterment confirms a breach exposing data from roughly 1.4 million accounts. Researchers uncover a sprawling scam network impersonating law firms. Italy blocks cyberattacks aimed at Olympics infrastructure. Critical bugs put n8n and Google Looker servers at risk of full takeover. A state-backed Shadow Campaign hits governments worldwide. OpenClaw shows how AI-powered attacks are becoming faster, cheaper, and harder to stop. Our guest is Tony Scott, CEO of Intrusion and former federal CIO, sharing his perspective on evolving regulation and the realities behind critical policy shifts. Your smartphone may testify against you.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest today comes as a segment from our Caveat podcast. Tony Scott, CEO of Intrusion and former federal CIO, joins Dave Bittner to share his perspective on evolving regulation and the realities behind critical policy shifts. You can listen to Tony and Dave’s full conversation on this week’s episode of Caveat, and catch new episodes of Caveat every Thursday on your favorite podcast app. 

Selected Reading

Exclusive: US used cyber weapons to disrupt Iranian air defenses during 2025 strikes (The Record)

Personal data stolen during Harvard and UPenn data breaches leaked online - over a million details, including emails, home addresses and more, all published (TechRadar)

Data breach at fintech firm Betterment exposes 1.4 million accounts (Bleeping Computer)

Researchers Expose Network of 150 Cloned Law Firm Websites in AI-Powered Scam Campaign (SecurityWeek)

Italy Averted Russian-Linked Cyberattacks Targeting Winter Olympics Websites, Foreign Minister Says (SecurityWeek)

n8n security woes roll on as new critical flaws bypass December fix (The Register)

LookOut: Discovering RCE and Internal Access on Looker (Google Cloud &amp; On-Prem) (Tenable)

Cyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries (SecurityWeek)

The Rise of OpenClaw (SECURITY.COM)

Smartphones Now Involved in Nearly Every Police Investigation (Infosecurity Magazine)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber weapons knock out Iranian air defenses during strikes on nuclear sites. ShinyHunters dump more than a million stolen records from Harvard and Penn. Betterment confirms a breach exposing data from roughly 1.4 million accounts. Researchers uncover a sprawling scam network impersonating law firms. Italy blocks cyberattacks aimed at Olympics infrastructure. Critical bugs put n8n and Google Looker servers at risk of full takeover. A state-backed Shadow Campaign hits governments worldwide. OpenClaw shows how AI-powered attacks are becoming faster, cheaper, and harder to stop. Our guest is Tony Scott, CEO of Intrusion and former federal CIO, sharing his perspective on evolving regulation and the realities behind critical policy shifts. Your smartphone may testify against you.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Our guest today comes as a segment from our <a href="https://www.thecyberwire.com/podcasts/caveat"><u>Caveat</u></a> podcast. <a href="https://www.linkedin.com/in/tony-scott-intrusion/"><u>Tony Scott</u></a>, CEO of <a href="https://www.intrusion.com/"><u>Intrusion</u></a> and former federal CIO, joins Dave Bittner to share his perspective on evolving regulation and the realities behind critical policy shifts. You can listen to Tony and Dave’s full conversation on this week’s <a href="https://www.thecyberwire.com/podcasts/caveat/294/notes"><u>episode of Caveat</u></a>, and catch new episodes of Caveat every Thursday on your favorite podcast app. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/iran-nuclear-cyber-strikes-us"><u>Exclusive: US used cyber weapons to disrupt Iranian air defenses during 2025 strikes</u></a> (The Record)</p>
<p><a href="https://www.techradar.com/pro/security/personal-data-stolen-during-harvard-and-upenn-data-breaches-leaked-online-emails-home-addresses-and-more-all-published"><u>Personal data stolen during Harvard and UPenn data breaches leaked online - over a million details, including emails, home addresses and more, all published</u></a> (TechRadar)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/data-breach-at-fintech-firm-betterment-exposes-14-million-accounts/"><u>Data breach at fintech firm Betterment exposes 1.4 million accounts</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/researchers-expose-network-of-150-cloned-law-firm-websites-in-ai-powered-scam-campaign/"><u>Researchers Expose Network of 150 Cloned Law Firm Websites in AI-Powered Scam Campaign</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/italy-averted-russian-linked-cyberattacks-targeting-winter-olympics-websites-foreign-minister-says/"><u>Italy Averted Russian-Linked Cyberattacks Targeting Winter Olympics Websites, Foreign Minister Says</u></a> (SecurityWeek)</p>
<p><a href="https://www.theregister.com/2026/02/05/n8n_security_woes_roll_on/"><u>n8n security woes roll on as new critical flaws bypass December fix</u></a> (The Register)</p>
<p><a href="https://www.tenable.com/blog/google-looker-vulnerabilities-rce-internal-access-lookout"><u>LookOut: Discovering RCE and Internal Access on Looker (Google Cloud &amp; On-Prem)</u></a> (Tenable)</p>
<p><a href="https://www.securityweek.com/cyberspy-group-hacked-governments-and-critical-infrastructure-in-37-countries/"><u>Cyberspy Group Hacked Governments and Critical Infrastructure in 37 Countries</u></a> (SecurityWeek)</p>
<p><a href="https://www.security.com/expert-perspectives/rise-openclaw"><u>The Rise of OpenClaw</u></a> (SECURITY.COM)</p>
<p><a href="https://www.infosecurity-magazine.com/news/smartphones-involved-every-police/"><u>Smartphones Now Involved in Nearly Every Police Investigation</u></a> (Infosecurity Magazine)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1902</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0eb0a198-fae2-11f0-8b3b-437cf1d35b83]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7035325638.mp3?updated=1770324799" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A softer touch on cyber.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2482/notes</link>
      <description>The White House preps a major overhaul of U.S. cybersecurity policy. A key Commerce security office loses staff as regulatory guardrails weaken. Lawmakers Press AT&amp;T and Verizon after months of silence on Salt Typhoon. A vulnerability in the React Native Metro development server is under active exploitation. Amaranth Dragon leverages a WinRAR flaw. A coordinated reconnaissance campaign targets Citrix NetScaler infrastructure. CISA warns a SolarWinds Web Help Desk flaw is under active exploitation. Zach Edwards, Senior Threat Researcher at Silent Push, is discussing a hole in the kill chain leaving law enforcement empty-handed. Cops in Northern Ireland get an unwanted data breach encore. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest 

Today we are joined by Zach Edwards, Senior Threat Researcher at Silent Push, discussing a hole in the kill chain leaving law enforcement empty-handed. You can read more from Zach’s team here. 

Selected Reading

White House Cyber Director Charts New Course for Digital Defense Through Private Sector Partnership (Web Pro News)

Another Misstep in U.S.-China Tech Security Policy (Lawfare)

Cantwell claims telecoms blocked release of Salt Typhoon report (Cyberscoop)

Hackers exploit critical React Native Metro bug to breach dev systems (Bleeping Computer)

New Amaranth Dragon cyberespionage group exploits WinRAR flaw (Bleeping Computer)

Wave of Citrix NetScaler scans use thousands of residential proxies (Bleeping Computer)

Fresh SolarWinds Vulnerability Exploited in Attacks (SecurityWeek)

‘It defies belief’: Names of PSNI officers published on court website in new breach (Belfast Telegraph)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 04 Feb 2026 21:10:00 -0000</pubDate>
      <itunes:title>A softer touch on cyber.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2482</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The White House preps a major overhaul of U.S. cybersecurity policy. A key Commerce security office loses staff as regulatory guardrails weaken. Lawmakers Press AT&amp;T and Verizon after months of silence on Salt Typhoon. A vulnerability in the React Native Metro development server is under active exploitation. Amaranth Dragon leverages a WinRAR flaw. A coordinated reconnaissance campaign targets Citrix NetScaler infrastructure. CISA warns a SolarWinds Web Help Desk flaw is under active exploitation. Zach Edwards, Senior Threat Researcher at Silent Push, is discussing a hole in the kill chain leaving law enforcement empty-handed. Cops in Northern Ireland get an unwanted data breach encore. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest 

Today we are joined by Zach Edwards, Senior Threat Researcher at Silent Push, discussing a hole in the kill chain leaving law enforcement empty-handed. You can read more from Zach’s team here. 

Selected Reading

White House Cyber Director Charts New Course for Digital Defense Through Private Sector Partnership (Web Pro News)

Another Misstep in U.S.-China Tech Security Policy (Lawfare)

Cantwell claims telecoms blocked release of Salt Typhoon report (Cyberscoop)

Hackers exploit critical React Native Metro bug to breach dev systems (Bleeping Computer)

New Amaranth Dragon cyberespionage group exploits WinRAR flaw (Bleeping Computer)

Wave of Citrix NetScaler scans use thousands of residential proxies (Bleeping Computer)

Fresh SolarWinds Vulnerability Exploited in Attacks (SecurityWeek)

‘It defies belief’: Names of PSNI officers published on court website in new breach (Belfast Telegraph)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The White House preps a major overhaul of U.S. cybersecurity policy. A key Commerce security office loses staff as regulatory guardrails weaken. Lawmakers Press AT&amp;T and Verizon after months of silence on Salt Typhoon. A vulnerability in the React Native Metro development server is under active exploitation. Amaranth Dragon leverages a WinRAR flaw. A coordinated reconnaissance campaign targets Citrix NetScaler infrastructure. CISA warns a SolarWinds Web Help Desk flaw is under active exploitation. Zach Edwards, Senior Threat Researcher at Silent Push, is discussing a hole in the kill chain leaving law enforcement empty-handed. Cops in Northern Ireland get an unwanted data breach encore. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest </strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/zedwards/"><u>Zach Edward</u></a>s, Senior Threat Researcher at <a href="https://www.linkedin.com/company/silent-push/"><u>Silent Push</u></a>, discussing a hole in the kill chain leaving law enforcement empty-handed. You can read more from Zach’s team <a href="https://www.silentpush.com/white-papers-and-reports/bph-white-paper-2025/"><u>here</u></a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.webpronews.com/white-house-cyber-director-charts-new-course-for-digital-defense-through-private-sector-partnership/"><u>White House Cyber Director Charts New Course for Digital Defense Through Private Sector Partnership</u></a> (Web Pro News)</p>
<p><a href="https://www.lawfaremedia.org/article/another-misstep-in-u.s.-china-tech-security-policy"><u>Another Misstep in U.S.-China Tech Security Policy</u></a> (Lawfare)</p>
<p><a href="https://cyberscoop.com/cantwell-claims-telecoms-blocked-release-of-salt-typhoon-report/"><u>Cantwell claims telecoms blocked release of Salt Typhoon report </u></a>(Cyberscoop)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-critical-react-native-metro-bug-to-breach-dev-systems/"><u>Hackers exploit critical React Native Metro bug to breach dev systems</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/new-amaranth-dragon-cyberespionage-group-exploits-winrar-flaw/"><u>New Amaranth Dragon cyberespionage group exploits WinRAR flaw</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/wave-of-citrix-netscaler-scans-use-thousands-of-residential-proxies/"><u>Wave of Citrix NetScaler scans use thousands of residential proxies</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/fresh-solarwinds-vulnerability-exploited-in-attacks/"><u>Fresh SolarWinds Vulnerability Exploited in Attacks</u></a> (SecurityWeek)</p>
<p><a href="https://www.belfasttelegraph.co.uk/news/northern-ireland/it-defies-belief-names-of-psni-officers-published-on-court-website-in-new-breach/a122899735.html"><u>‘It defies belief’: Names of PSNI officers published on court website in new breach</u></a> (Belfast Telegraph)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1687</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0e860794-fae2-11f0-8b3b-638918135f7f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3050768161.mp3?updated=1770235438" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The algorithm gets questioned.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2481/notes</link>
      <description>French police raid X’s Paris offices. The Feds take over $400 million from a dark web cryptocurrency mixer. The NSA says zero-trust goes beyond authentication. Researchers warn of a multi-stage phishing campaign targeting Dropbox credentials. A new GlassWorn campaign targets macOS developers. Critical zero-day vulnerabilities in Ivanti Endpoint Manager Mobile are under active exploitation. Researchers disclose a major data exposure on Moltbook, a social network built for AI agents. States bridge the gaps in election security. Nitrogen ransomware has a fatal flaw that permanently destroys data. Supersize your passwords — you want fries with that?

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector

Aaron Isaksen leads AI Research and Engineering at Palo Alto Networks, where he advances state-of-the-art AI in cybersecurity while overseeing Cortex Xpanse's teams automating attack surface management across some of the world's largest networks. In this episode of Threat Vector, host David Moulton sits down with Dr. Aaron Isaksen to explore why engineering excellence must precede ethical AI debates, how adversarial AI is reshaping cybersecurity, and what it actually takes to build AI systems resilient enough to operate in hostile environments.

Selected Reading

French cops raid X's Paris office in algorithmic bias probe (The Register)

US seizes over $400 million in assets from dark web money laundering operation Helix (SC Media)

NSA Tells Feds: Zero Trust Must Go Beyond Login (GovInfo Security)

New Password-Stealing Phishing Campaign Targets Corporate Dropbox Credentials (Infosecurity Magazine)

New GlassWorm attack targets macOS via compromised OpenVSX extensions (Bleeping Computer)

Ivanti Issues Urgent Fix for Critical Zero-Day Flaws Under Active Attack (Hackread)

Vibe-Coded Moltbook Exposes User Data, API Keys and More (Infosecurity Magazine)

As feds pull back, states look inward for election security support (CyberScoop)

Nitrogen Ransomware: ESXi malware has a bug! (Coveware)

McDonald's is not lovin' your bigmac, happymeal, and mcnuggets passwords (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Feb 2026 21:10:00 -0000</pubDate>
      <itunes:title>The algorithm gets questioned.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2481</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>French police raid X’s Paris offices. The Feds take over $400 million from a dark web cryptocurrency mixer. The NSA says zero-trust goes beyond authentication. Researchers warn of a multi-stage phishing campaign targeting Dropbox credentials. A new GlassWorn campaign targets macOS developers. Critical zero-day vulnerabilities in Ivanti Endpoint Manager Mobile are under active exploitation. Researchers disclose a major data exposure on Moltbook, a social network built for AI agents. States bridge the gaps in election security. Nitrogen ransomware has a fatal flaw that permanently destroys data. Supersize your passwords — you want fries with that?

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector

Aaron Isaksen leads AI Research and Engineering at Palo Alto Networks, where he advances state-of-the-art AI in cybersecurity while overseeing Cortex Xpanse's teams automating attack surface management across some of the world's largest networks. In this episode of Threat Vector, host David Moulton sits down with Dr. Aaron Isaksen to explore why engineering excellence must precede ethical AI debates, how adversarial AI is reshaping cybersecurity, and what it actually takes to build AI systems resilient enough to operate in hostile environments.

Selected Reading

French cops raid X's Paris office in algorithmic bias probe (The Register)

US seizes over $400 million in assets from dark web money laundering operation Helix (SC Media)

NSA Tells Feds: Zero Trust Must Go Beyond Login (GovInfo Security)

New Password-Stealing Phishing Campaign Targets Corporate Dropbox Credentials (Infosecurity Magazine)

New GlassWorm attack targets macOS via compromised OpenVSX extensions (Bleeping Computer)

Ivanti Issues Urgent Fix for Critical Zero-Day Flaws Under Active Attack (Hackread)

Vibe-Coded Moltbook Exposes User Data, API Keys and More (Infosecurity Magazine)

As feds pull back, states look inward for election security support (CyberScoop)

Nitrogen Ransomware: ESXi malware has a bug! (Coveware)

McDonald's is not lovin' your bigmac, happymeal, and mcnuggets passwords (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>French police raid X’s Paris offices. The Feds take over $400 million from a dark web cryptocurrency mixer. The NSA says zero-trust goes beyond authentication. Researchers warn of a multi-stage phishing campaign targeting Dropbox credentials. A new GlassWorn campaign targets macOS developers. Critical zero-day vulnerabilities in Ivanti Endpoint Manager Mobile are under active exploitation. Researchers disclose a major data exposure on Moltbook, a social network built for AI agents. States bridge the gaps in election security. Nitrogen ransomware has a fatal flaw that permanently destroys data. Supersize your passwords — you want fries with that?</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Threat Vector</strong></p>
<p>Aaron Isaksen leads AI Research and Engineering at Palo Alto Networks, where he advances state-of-the-art AI in cybersecurity while overseeing Cortex Xpanse's teams automating attack surface management across some of the world's largest networks. In this episode of Threat Vector, host<a href="https://www.linkedin.com/in/davidrmoulton/"><u> David Moulton</u></a> sits down with<a href="https://www.linkedin.com/in/aaronisaksen-19a437/"><u> Dr. Aaron Isaksen</u></a> to explore why engineering excellence must precede ethical AI debates, how adversarial AI is reshaping cybersecurity, and what it actually takes to build AI systems resilient enough to operate in hostile environments.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.theregister.com/2026/02/03/french_police_raid_x/"><u>French cops raid X's Paris office in algorithmic bias probe</u></a> (The Register)</p>
<p><a href="https://www.scworld.com/brief/us-seizes-over-400-million-in-assets-from-dark-web-money-laundering-operation-helix"><u>US seizes over $400 million in assets from dark web money laundering operation Helix</u></a> (SC Media)</p>
<p><a href="https://www.govinfosecurity.com/nsa-tells-feds-zero-trust-must-go-beyond-login-a-30663"><u>NSA Tells Feds: Zero Trust Must Go Beyond Login</u></a> (GovInfo Security)</p>
<p><a href="https://www.infosecurity-magazine.com/news/password-stealing-phishing-pdf/"><u>New Password-Stealing Phishing Campaign Targets Corporate Dropbox Credentials</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/new-glassworm-attack-targets-macos-via-compromised-openvsx-extensions/"><u>New GlassWorm attack targets macOS via compromised OpenVSX extensions</u></a> (Bleeping Computer)</p>
<p><a href="https://hackread.com/ivanti-urgent-fix-critical-zero-day-vulnerabilities/"><u>Ivanti Issues Urgent Fix for Critical Zero-Day Flaws Under Active Attack</u></a> (Hackread)</p>
<p><a href="https://www.infosecurity-magazine.com/news/moltbook-exposes-user-data-api/"><u>Vibe-Coded Moltbook Exposes User Data, API Keys and More</u></a> (Infosecurity Magazine)</p>
<p><a href="https://cyberscoop.com/cisa-election-security-cutbacks-states-trump-administration/"><u>As feds pull back, states look inward for election security support</u></a> (CyberScoop)</p>
<p><a href="https://www.coveware.com/blog/2026/2/2/nitrogen-ransomware-esxi-malware-has-a-bug"><u>Nitrogen Ransomware: ESXi malware has a bug!</u></a> (Coveware)</p>
<p><a href="https://www.theregister.com/2026/02/02/mcdonalds_password_advice/"><u>McDonald's is not lovin' your bigmac, happymeal, and mcnuggets passwords</u></a> (The Register)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1610</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0e5c7000-fae2-11f0-8b3b-3307419ffeb8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7126004327.mp3?updated=1770148898" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mid season reflection with Kim Jones. [CISO Perspectives]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/110/notes</link>
      <description>Please enjoy this encore of CISO Perspectives.

In this mid-season episode, Kim takes a step back to reflect on the journey so far—revisiting key conversations, standout moments, and recurring themes that have shaped the season. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, uncovering deeper patterns and takeaways. Whether you're catching up or tuning in weekly, this episode offers a thoughtful recap and fresh perspective on where we've been—and what's still to come.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Feb 2026 07:00:00 -0000</pubDate>
      <itunes:title>Mid season reflection with Kim Jones. [CISO Perspectives]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>110</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/1dbba220-f7ac-11f0-878a-4b5e0a72f77f/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of CISO Perspectives.

In this mid-season episode, Kim takes a step back to reflect on the journey so far—revisiting key conversations, standout moments, and recurring themes that have shaped the season. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, uncovering deeper patterns and takeaways. Whether you're catching up or tuning in weekly, this episode offers a thoughtful recap and fresh perspective on where we've been—and what's still to come.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of CISO Perspectives.</p>
<p>In this mid-season episode, Kim takes a step back to reflect on the journey so far—revisiting key conversations, standout moments, and recurring themes that have shaped the season. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, uncovering deeper patterns and takeaways. Whether you're catching up or tuning in weekly, this episode offers a thoughtful recap and fresh perspective on where we've been—and what's still to come.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2487</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1dbba220-f7ac-11f0-878a-4b5e0a72f77f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2343588648.mp3?updated=1769098338" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Wind and solar take a cyber hit.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2480/notes</link>
      <description>Poland says weak security left parts of its power grid exposed. A Russian-linked hacker alliance threatens Denmark with a promised cyber offensive. Fancy Bear moves fast on a new Microsoft Office flaw, hitting Ukrainian and EU targets. Researchers find a sprawling supply chain attack buried in the ClawdBot AI ecosystem. A new report looks at how threats are shaping the work of journalists and security researchers. A stealthy Windows malware campaign blends Pulsar RAT with Stealerv37. A former Google engineer is convicted of stealing AI trade secrets for China. The latest cybersecurity funding and deal news. On our Afternoon Cyber Tea segment, Microsoft’s Ann Johnson chats with Dr. Lorrie Cranor from Carnegie Mellon about security design. The AI dinosaur that knew too much. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Afternoon Cyber Tea

Dr. Lorrie Cranor⁠, Director of the CyLab Security and Privacy Institute at Carnegie Mellon University joins Ann Johnson, Corporate Vice President, Microsoft, on this month's segment of Afternoon Cyber Tea to discuss the critical gap between security design and real-world usability. They explore why security tools often fail users, the ongoing challenges with passwords and password less authentication, and how privacy expectations have evolved in an era of constant data collection. You can listen to Ann and Lorrie's full conversation here, and catch new episodes Afternoon Cyber Tea every other Tuesday on your favorite podcast app.

Selected Reading

Russian hackers breached Polish power grid thanks to bad security, report says (TechCrunch)

Newly Established Russian Hacker Alliance Threatens Denmark (Truesec)

Fancy Bear Exploits Microsoft Office Flaw in Ukraine, EU Cyber-Attacks (Infosecurity Magazine)

Notepad++ Hijacked by State-Sponsored Hackers (Notepad++)

ClawdBot Skills Just Ganked Your Crypto (OpenSource Malware Blog)

Under Pressure: Exploring the effect of legal and criminal threats on security researchers and journalists (DataBreaches.Net)

Windows Malware Uses Pulsar RAT for Live Chats While Stealing Data (Hackread)

U.S. convicts ex-Google engineer for sending AI tech data to China (Bleeping Computer)

Upwind secures $250 million in a Series B round. (N2K Pro Business Briefing) 

Don't Buy Internet-Connected Toys For Your Kids (Blackout VPN) 

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 02 Feb 2026 21:10:00 -0000</pubDate>
      <itunes:title>Wind and solar take a cyber hit.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2480</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Poland says weak security left parts of its power grid exposed. A Russian-linked hacker alliance threatens Denmark with a promised cyber offensive. Fancy Bear moves fast on a new Microsoft Office flaw, hitting Ukrainian and EU targets. Researchers find a sprawling supply chain attack buried in the ClawdBot AI ecosystem. A new report looks at how threats are shaping the work of journalists and security researchers. A stealthy Windows malware campaign blends Pulsar RAT with Stealerv37. A former Google engineer is convicted of stealing AI trade secrets for China. The latest cybersecurity funding and deal news. On our Afternoon Cyber Tea segment, Microsoft’s Ann Johnson chats with Dr. Lorrie Cranor from Carnegie Mellon about security design. The AI dinosaur that knew too much. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Afternoon Cyber Tea

Dr. Lorrie Cranor⁠, Director of the CyLab Security and Privacy Institute at Carnegie Mellon University joins Ann Johnson, Corporate Vice President, Microsoft, on this month's segment of Afternoon Cyber Tea to discuss the critical gap between security design and real-world usability. They explore why security tools often fail users, the ongoing challenges with passwords and password less authentication, and how privacy expectations have evolved in an era of constant data collection. You can listen to Ann and Lorrie's full conversation here, and catch new episodes Afternoon Cyber Tea every other Tuesday on your favorite podcast app.

Selected Reading

Russian hackers breached Polish power grid thanks to bad security, report says (TechCrunch)

Newly Established Russian Hacker Alliance Threatens Denmark (Truesec)

Fancy Bear Exploits Microsoft Office Flaw in Ukraine, EU Cyber-Attacks (Infosecurity Magazine)

Notepad++ Hijacked by State-Sponsored Hackers (Notepad++)

ClawdBot Skills Just Ganked Your Crypto (OpenSource Malware Blog)

Under Pressure: Exploring the effect of legal and criminal threats on security researchers and journalists (DataBreaches.Net)

Windows Malware Uses Pulsar RAT for Live Chats While Stealing Data (Hackread)

U.S. convicts ex-Google engineer for sending AI tech data to China (Bleeping Computer)

Upwind secures $250 million in a Series B round. (N2K Pro Business Briefing) 

Don't Buy Internet-Connected Toys For Your Kids (Blackout VPN) 

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Poland says weak security left parts of its power grid exposed. A Russian-linked hacker alliance threatens Denmark with a promised cyber offensive. Fancy Bear moves fast on a new Microsoft Office flaw, hitting Ukrainian and EU targets. Researchers find a sprawling supply chain attack buried in the ClawdBot AI ecosystem. A new report looks at how threats are shaping the work of journalists and security researchers. A stealthy Windows malware campaign blends Pulsar RAT with Stealerv37. A former Google engineer is convicted of stealing AI trade secrets for China. The latest cybersecurity funding and deal news. On our Afternoon Cyber Tea segment, Microsoft’s Ann Johnson chats with Dr. Lorrie Cranor from Carnegie Mellon about security design. The AI dinosaur that knew too much. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Afternoon Cyber Tea</strong></p>
<p><a href="https://www.linkedin.com/in/lorriecranor/"><u>Dr. Lorrie Cranor⁠</u></a>, Director of the CyLab Security and Privacy Institute at Carnegie Mellon University joins<a href="https://www.linkedin.com/in/ann-johnsons"><u> Ann Johnson</u></a>, Corporate Vice President, Microsoft, on this month's segment of Afternoon Cyber Tea to discuss the critical gap between security design and real-world usability. They explore why security tools often fail users, the ongoing challenges with passwords and password less authentication, and how privacy expectations have evolved in an era of constant data collection. You can listen to Ann and Lorrie's full conversation<a href="https://www.thecyberwire.com/podcasts/afternoon-cyber-tea/121/notes"><u> here</u></a>, and catch new episodes Afternoon Cyber Tea every other Tuesday on your favorite podcast app.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://techcrunch.com/2026/01/30/russian-hackers-breached-polish-power-grid-thanks-to-bad-security-report-says/"><u>Russian hackers breached Polish power grid thanks to bad security, report says</u></a> (TechCrunch)</p>
<p><a href="https://www.truesec.com/hub/blog/newly-established-russian-hacker-alliance-threatens-denmark"><u>Newly Established Russian Hacker Alliance Threatens Denmark</u></a> (Truesec)</p>
<p><a href="https://www.infosecurity-magazine.com/news/fancy-bear-exploits-office-flaw/"><u>Fancy Bear Exploits Microsoft Office Flaw in Ukraine, EU Cyber-Attacks</u></a> (Infosecurity Magazine)</p>
<p><a href="https://notepad-plus-plus.org/news/hijacked-incident-info-update/"><u>Notepad++ Hijacked by State-Sponsored Hackers</u></a> (Notepad++)</p>
<p><a href="https://opensourcemalware.com/blog/clawdbot-skills-ganked-your-crypto"><u>ClawdBot Skills Just Ganked Your Crypto</u></a> (OpenSource Malware Blog)</p>
<p><a href="https://databreaches.net/2026/02/02/under-pressure-exploring-the-effect-of-legal-and-criminal-threats-on-security-researchers-and-journalists/"><u>Under Pressure: Exploring the effect of legal and criminal threats on security researchers and journalists</u></a> (DataBreaches.Net)</p>
<p><a href="https://hackread.com/windows-malware-pulsar-rat-live-chats-steal-data/"><u>Windows Malware Uses Pulsar RAT for Live Chats While Stealing Data</u></a> (Hackread)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/us-convicts-ex-google-engineer-for-sending-ai-tech-data-to-china/"><u>U.S. convicts ex-Google engineer for sending AI tech data to China</u></a> (Bleeping Computer)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/8/4"><u>Upwind secures $250 million in a Series B round.</u></a> (N2K Pro Business Briefing) </p>
<p><br><a href="https://blackoutvpn.au/blog/dont-buy-internet-connected-toys"><u>Don't Buy Internet-Connected Toys For Your Kids</u></a> (Blackout VPN) </p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1517</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0e2dbf4e-fae2-11f0-8b3b-430be4cbef53]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4271724364.mp3?updated=1770062557" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Richard Melick: Finding the right pattern to solve the problem. [Threat reporting] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/106/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Richard Melick, Director of Threat Reporting for Zimperium, talks about his journey, from working in the military to moving up to the big screens. He shares that he's been in the business of solving unique cybersecurity problems for so long that he has found his own path that works very well for him. He says, "if I go to a unique problem and try to solve it, I find that I'm solving it the same way that I would've solved it five years ago, because I found my pattern." Richard reflects on his time working in the industry, from moving away from the military and into different roles over the years. He notes that giving credit where credit is due, to those who deserve it, is how you keep the audience engaged as a storyteller. We thank Richard for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 01 Feb 2026 08:00:00 -0000</pubDate>
      <itunes:title>Richard Melick: Finding the right pattern to solve the problem. [Threat reporting] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>106</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a31e8aaa-f87d-11f0-89da-131878c70bed/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Richard Melick, Director of Threat Reporting for Zimperium, talks about his journey, from working in the military to moving up to the big screens. He shares that he's been in the business of solving unique cybersecurity problems for so long that he has found his own path that works very well for him. He says, "if I go to a unique problem and try to solve it, I find that I'm solving it the same way that I would've solved it five years ago, because I found my pattern." Richard reflects on his time working in the industry, from moving away from the military and into different roles over the years. He notes that giving credit where credit is due, to those who deserve it, is how you keep the audience engaged as a storyteller. We thank Richard for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Richard Melick, Director of Threat Reporting for Zimperium, talks about his journey, from working in the military to moving up to the big screens. He shares that he's been in the business of solving unique cybersecurity problems for so long that he has found his own path that works very well for him. He says, "if I go to a unique problem and try to solve it, I find that I'm solving it the same way that I would've solved it five years ago, because I found my pattern." Richard reflects on his time working in the industry, from moving away from the military and into different roles over the years. He notes that giving credit where credit is due, to those who deserve it, is how you keep the audience engaged as a storyteller. We thank Richard for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>581</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a31e8aaa-f87d-11f0-89da-131878c70bed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5192618819.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leaky chats collide with shifting security standards.</title>
      <link>https://www.thecyberwire.com/podcasts/daily-podcast/2479/notes</link>
      <description>A popular chatbot exposes millions of private user messages. The White House rescinds Biden-era federal software security guidance. A senior Secret Service official urges more scrutiny of domain registration. The President’s NSA pick champions section 702. France looks to reduce reliance on U.S. digital infrastructure. CISA shares guidance on insider threats. Hugging Face infrastructure was abused to distribute an Android RAT. Ivanti discloses a pair of critical zero-days. Popular dating sites suffer a data breach. Our guest is Tim Starks from CyberScoop, discussing how the US looks to push its view of AI cybersecurity standards to the rest of the world. The Nobel Committee blames hackers for a spoiler alert. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest is Tim Starks from CyberScoop discussing how the US looks to push its view of AI cybersecurity standards to the rest of the world. You can read Tim’s coverage here. 

Selected Reading

Massive AI Chat App Leaked Millions of Users Private Conversations (404 Media)

White House Scraps 'Burdensome' Software Security Rules (SecurityWeek)

The 'staggering' cybersecurity weakness that isn't getting enough focus, according to a top Secret Service official (CyberScoop)

NSA pick champions foreign spying law as nomination advances (The Record)

French Government To Replace Zoom and Teams With Visio, a Local Alternative (The New York Times)

CISA Urges Critical Infrastructure Organizations to Take Action Against Insider Threats (HSToday)

Hugging Face Abused to Deploy Android RAT (SecurityWeek)

Ivanti warns of two EPMM flaws exploited in zero-day attacks (Bleeping Computer)

Match Group breach exposes data from Hinge, Tinder, OkCupid, and Match (Bleeping Computer)

Nobel Hacking Likely Leaked Peace Prize Winner Name, Probe Finds (Bloomberg)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 30 Jan 2026 20:50:00 -0000</pubDate>
      <itunes:title>Leaky chats collide with shifting security standards.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2479</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A popular chatbot exposes millions of private user messages. The White House rescinds Biden-era federal software security guidance. A senior Secret Service official urges more scrutiny of domain registration. The President’s NSA pick champions section 702. France looks to reduce reliance on U.S. digital infrastructure. CISA shares guidance on insider threats. Hugging Face infrastructure was abused to distribute an Android RAT. Ivanti discloses a pair of critical zero-days. Popular dating sites suffer a data breach. Our guest is Tim Starks from CyberScoop, discussing how the US looks to push its view of AI cybersecurity standards to the rest of the world. The Nobel Committee blames hackers for a spoiler alert. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest is Tim Starks from CyberScoop discussing how the US looks to push its view of AI cybersecurity standards to the rest of the world. You can read Tim’s coverage here. 

Selected Reading

Massive AI Chat App Leaked Millions of Users Private Conversations (404 Media)

White House Scraps 'Burdensome' Software Security Rules (SecurityWeek)

The 'staggering' cybersecurity weakness that isn't getting enough focus, according to a top Secret Service official (CyberScoop)

NSA pick champions foreign spying law as nomination advances (The Record)

French Government To Replace Zoom and Teams With Visio, a Local Alternative (The New York Times)

CISA Urges Critical Infrastructure Organizations to Take Action Against Insider Threats (HSToday)

Hugging Face Abused to Deploy Android RAT (SecurityWeek)

Ivanti warns of two EPMM flaws exploited in zero-day attacks (Bleeping Computer)

Match Group breach exposes data from Hinge, Tinder, OkCupid, and Match (Bleeping Computer)

Nobel Hacking Likely Leaked Peace Prize Winner Name, Probe Finds (Bloomberg)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A popular chatbot exposes millions of private user messages. The White House rescinds Biden-era federal software security guidance. A senior Secret Service official urges more scrutiny of domain registration. The President’s NSA pick champions section 702. France looks to reduce reliance on U.S. digital infrastructure. CISA shares guidance on insider threats. Hugging Face infrastructure was abused to distribute an Android RAT. Ivanti discloses a pair of critical zero-days. Popular dating sites suffer a data breach. Our guest is Tim Starks from CyberScoop, discussing how the US looks to push its view of AI cybersecurity standards to the rest of the world. The Nobel Committee blames hackers for a spoiler alert. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br><strong>CyberWire Guest</strong></p>
<p>Our guest is Tim Starks from CyberScoop discussing how the US looks to push its view of AI cybersecurity standards to the rest of the world. You can read Tim’s coverage <a href="https://cyberscoop.com/us-global-ai-cybersecurity-standards-push-national-cyber-director/"><u>here</u></a>. </p>
<p><br><strong>Selected Reading</strong></p>
<p><a href="https://www.404media.co/massive-ai-chat-app-leaked-millions-of-users-private-conversations/"><u>Massive AI Chat App Leaked Millions of Users Private Conversations</u></a> (404 Media)</p>
<p><a href="https://www.securityweek.com/white-house-scraps-burdensome-software-security-rules/"><u>White House Scraps 'Burdensome' Software Security Rules</u></a> (SecurityWeek)</p>
<p><a href="https://cyberscoop.com/secret-service-iana-domain-security-weakness/"><u>The 'staggering' cybersecurity weakness that isn't getting enough focus, according to a top Secret Service official</u></a> (CyberScoop)</p>
<p><a href="https://therecord.media/nsa-pick-champions-fsa-renewal-nomination-advances"><u>NSA pick champions foreign spying law as nomination advances</u></a> (The Record)</p>
<p><a href="https://www.nytimes.com/2026/01/29/world/europe/france-zoom-alternative-visio.html"><u>French Government To Replace Zoom and Teams With Visio, a Local Alternative</u></a> (The New York Times)</p>
<p><a href="https://www.hstoday.us/subject-matter-areas/cybersecurity/cisa-urges-critical-infrastructure-organizations-to-take-action-against-insider-threats/"><u>CISA Urges Critical Infrastructure Organizations to Take Action Against Insider Threats</u></a> (HSToday)</p>
<p><a href="https://www.securityweek.com/hugging-face-abused-to-deploy-android-rat/"><u>Hugging Face Abused to Deploy Android RAT</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/ivanti-warns-of-two-epmm-flaws-exploited-in-zero-day-attacks/"><u>Ivanti warns of two EPMM flaws exploited in zero-day attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/match-group-breach-exposes-data-from-hinge-tinder-okcupid-and-match/"><u>Match Group breach exposes data from Hinge, Tinder, OkCupid, and Match</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bloomberg.com/news/articles/2026-01-30/nobel-hacking-likely-leaked-peace-prize-winner-name-probe-finds?accessToken=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzb3VyY2UiOiJTdWJzY3JpYmVyR2lmdGVkQXJ0aWNsZSIsImlhdCI6MTc2OTc3OTgyMCwiZXhwIjoxNzcwMzg0NjIwLCJhcnRpY2xlSWQiOiJUOU1TWFJUOU5KTTIwMCIsImJjb25uZWN0SWQiOiJERDEzODM4MTc2MTc0NEYzODBBODhGRjlEQkI2MkEwOCJ9.AFbvFjMdcQlycgAKvwQizirBiogims7J8s2e07YSJPM"><u>Nobel Hacking Likely Leaked Peace Prize Winner Name, Probe Finds</u></a> (Bloomberg)</p>
<p><br><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  </p>
<p><br></p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1516</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ddf4347a-1c7a-11f0-85e0-87e277a27612]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9201597063.mp3?updated=1769800665" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Proxy wars and open doors.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2478/notes</link>
      <description>Google dismantles a huge residential proxy network. Did the FBI take down the notorious RAMP cybercrime forum? A long running North Korea backed cyber operation has splintered into three specialized threat groups. U.S. military cyber operators carried out a covert operation to disrupt Russian troll networks ahead of the 2024 elections. Phishing campaigns target journalists using the Signal app. SolarWinds patches vulnerabilities in its Web Help Desk product. Amazon found CSAM in its AI training data. Initial access brokers switch up their preferred bot. China executes scam center kingpins. Our guest is Tom Pace, CEO of NetRise, explaining how open-source vulnerabilities are opening doors for nation-states.  An unsecured webcam peers into Pyongyang. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today, Tom Pace, former DOE cyber analyst and CEO of NetRise, joins the show to explain how open-source vulnerabilities are opening doors for nation-states and why visibility into who maintains code repositories matters.



Selected Reading

Google Disrupted World’s Largest IPIDEA Residential Proxy Network (Cyber Security News)

Notorious Russia-based RAMP cybercrime forum apparently seized by FBI (The Record)

Long-running North Korea threat group splits into 3 distinct operations (CyberScoop)

Secret US cyber operations shielded 2024 election from foreign trolls, but now the Trump admin has gutted protections (CNN Politics)

Phishing attack: Numerous journalists targeted in attack via Signal Messenger (Netzpolitik.org)

Signal president warns AI agents are making encryption irrelevant (Cyber Insider)

SolarWinds Patches Critical Web Help Desk Vulnerabilities (SecurityWeek) 

Amazon Found ‘High Volume’ Of Child Sex Abuse Material in AI Training Data (Bloomberg)

Initial access hackers switch to Tsundere Bot for ransomware attacks (Bleeping Computer)

China Executes 11 People Linked to Cyberscam Centers in Myanmar   (Bloomberg)

North Korean Hackers' Daily Life Leaked in Video (The Chosun)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 29 Jan 2026 20:50:00 -0000</pubDate>
      <itunes:title>Proxy wars and open doors.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2478</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Google dismantles a huge residential proxy network. Did the FBI take down the notorious RAMP cybercrime forum? A long running North Korea backed cyber operation has splintered into three specialized threat groups. U.S. military cyber operators carried out a covert operation to disrupt Russian troll networks ahead of the 2024 elections. Phishing campaigns target journalists using the Signal app. SolarWinds patches vulnerabilities in its Web Help Desk product. Amazon found CSAM in its AI training data. Initial access brokers switch up their preferred bot. China executes scam center kingpins. Our guest is Tom Pace, CEO of NetRise, explaining how open-source vulnerabilities are opening doors for nation-states.  An unsecured webcam peers into Pyongyang. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today, Tom Pace, former DOE cyber analyst and CEO of NetRise, joins the show to explain how open-source vulnerabilities are opening doors for nation-states and why visibility into who maintains code repositories matters.



Selected Reading

Google Disrupted World’s Largest IPIDEA Residential Proxy Network (Cyber Security News)

Notorious Russia-based RAMP cybercrime forum apparently seized by FBI (The Record)

Long-running North Korea threat group splits into 3 distinct operations (CyberScoop)

Secret US cyber operations shielded 2024 election from foreign trolls, but now the Trump admin has gutted protections (CNN Politics)

Phishing attack: Numerous journalists targeted in attack via Signal Messenger (Netzpolitik.org)

Signal president warns AI agents are making encryption irrelevant (Cyber Insider)

SolarWinds Patches Critical Web Help Desk Vulnerabilities (SecurityWeek) 

Amazon Found ‘High Volume’ Of Child Sex Abuse Material in AI Training Data (Bloomberg)

Initial access hackers switch to Tsundere Bot for ransomware attacks (Bleeping Computer)

China Executes 11 People Linked to Cyberscam Centers in Myanmar   (Bloomberg)

North Korean Hackers' Daily Life Leaked in Video (The Chosun)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Google dismantles a huge residential proxy network. Did the FBI take down the notorious RAMP cybercrime forum? A long running North Korea backed cyber operation has splintered into three specialized threat groups. U.S. military cyber operators carried out a covert operation to disrupt Russian troll networks ahead of the 2024 elections. Phishing campaigns target journalists using the Signal app. SolarWinds patches vulnerabilities in its Web Help Desk product. Amazon found CSAM in its AI training data. Initial access brokers switch up their preferred bot. China executes scam center kingpins. Our guest is Tom Pace, CEO of NetRise, explaining how open-source vulnerabilities are opening doors for nation-states.  An unsecured webcam peers into Pyongyang. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br><strong>CyberWire Guest</strong></p>
<p>Today, <a href="https://www.linkedin.com/in/pacethomas/"><u>Tom Pace</u></a>, former DOE cyber analyst and CEO of <a href="https://www.netrise.io/"><u>NetRise</u></a>, joins the show to explain how open-source vulnerabilities are opening doors for nation-states and why visibility into who maintains code repositories matters.</p>
<p><br></p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://cybersecuritynews.com/worlds-largest-ipidea-residential-proxy-network/"><u>Google Disrupted World’s Largest IPIDEA Residential Proxy Network</u></a> (Cyber Security News)</p>
<p><a href="https://therecord.media/notorious-russia-based-ramp-forum-seized"><u>Notorious Russia-based RAMP cybercrime forum apparently seized by FBI</u></a> (The Record)</p>
<p><a href="https://cyberscoop.com/north-korea-labyrinth-chollima-splits-crowdstrike/"><u>Long-running North Korea threat group splits into 3 distinct operations</u></a> (CyberScoop)</p>
<p><a href="https://www.cnn.com/2026/01/28/politics/hacking-disinformation-election-security"><u>Secret US cyber operations shielded 2024 election from foreign trolls, but now the Trump admin has gutted protections</u></a> (CNN Politics)</p>
<p><a href="https://netzpolitik.org/2026/phishing-attack-numerous-journalists-targeted-in-attack-via-signal-messenger/"><u>Phishing attack: Numerous journalists targeted in attack via Signal Messenger</u></a> (Netzpolitik.org)</p>
<p><a href="https://cyberinsider.com/signal-president-warns-ai-agents-are-making-encryption-irrelevant/"><u>Signal president warns AI agents are making encryption irrelevant</u></a> (Cyber Insider)</p>
<p><a href="https://www.securityweek.com/solarwinds-patches-critical-web-help-desk-vulnerabilities/"><u>SolarWinds Patches Critical Web Help Desk Vulnerabilities</u> <u>(SecurityWeek) </u></a></p>
<p><a href="https://www.bloomberg.com/news/features/2026-01-29/amazon-found-child-sex-abuse-in-ai-training-data"><u>Amazon Found ‘High Volume’ Of Child Sex Abuse Material in AI Training Data</u></a> (Bloomberg)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/initial-access-hackers-switch-to-tsundere-bot-for-ransomware-attacks/"><u>Initial access hackers switch to Tsundere Bot for ransomware attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bloomberg.com/news/articles/2026-01-29/china-executes-11-people-linked-to-cyberscam-centers-in-myanmar"><u>China Executes 11 People Linked to Cyberscam Centers in Myanmar </u></a>  (Bloomberg)</p>
<p><a href="https://www.chosun.com/english/national-en/2026/01/29/PBEH25CATZCELKJLAZRGVBPXFA/"><u>North Korean Hackers' Daily Life Leaked in Video</u></a> (The Chosun)</p>
<p><br><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><br></p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1824</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ddcbf1b8-1c7a-11f0-85e0-4729ade8342c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7215806528.mp3?updated=1769716150" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When the Director uses the wrong chat window.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2477/notes</link>
      <description>CISA’s interim director uploaded sensitive government material into the public version of ChatGPT. The cyberattack on Poland’s power grid compromised roughly 30 energy facilities. The EU and India sign a new partnership that includes expanded cyber cooperation. Meta rolls out enhanced WhatsApp security features. Researchers uncover a campaign targeting LLM service endpoints. Fortinet and OpenSSL patch multiple vulnerabilities. A high-severity WinRAR vulnerability continues to see widespread exploitation six months after it was patched. The SoundCloud data breach affected nearly 30 million users. Ben Yelin explains the California lawsuit accusing social media platforms of harming kids. A Spanish resort town gets hit with low-rent ransomware.  

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today, Dave is joined by his Caveat co-host Ben Yelin, Program Director for Public Policy &amp; External Affairs at the University of Maryland Center for Cyber Health and Hazard Strategies, to discuss the upcoming trial where Meta and YouTube will make their case against accusations of social media being harmful to children. You can learn more here. 

T-Minus Guest Host

Our T-Minus Space Daily podcast team is in Orlando, FL this week covering Commercial Space Week. Yesterday while the crew was on travel making their way to the event, Dave Bittner took his first spin behind the mic on T-Minus. Tune in and let us know how Dave did!

You can follow along with host Maria Varmazis and producers Alice Carruth and Liz Stokes for event coverage via our LinkedIn profile.

Selected Reading

Trump’s acting cyber chief uploaded sensitive files into a public version of ChatGPT (POLITICO)

Cyberattack on Poland’s power grid hit around 30 energy facilities, new report says (The Record)

Europe/India • Indian 'hackers for hire' to continue to thrive under Brussels-New Dehli trade deal (Intelligence Online)

New WhatsApp lockdown feature protects high-risk users from hackers (Bleeping Computer)

Hackers hijack exposed LLM endpoints in Bizarre Bazaar operation (Bleeping Computer)

Fortinet Patches Exploited FortiCloud SSO Authentication Bypass (SecurityWeek)

High-Severity Remote Code Execution Vulnerability Patched in OpenSSL (SecurityWeek)

Cybercriminals and nation-state groups are exploiting a six-month old WinRAR defect (CyberScoop)

SoundCloud breach added to HIBP, 29.8 million accounts exposed (CyberInsider)

Spanish municipality Sanxenxo City Council calls hackers bluff as malware takes over network (Cryptopolitan)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 28 Jan 2026 20:50:00 -0000</pubDate>
      <itunes:title>When the Director uses the wrong chat window.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2477</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA’s interim director uploaded sensitive government material into the public version of ChatGPT. The cyberattack on Poland’s power grid compromised roughly 30 energy facilities. The EU and India sign a new partnership that includes expanded cyber cooperation. Meta rolls out enhanced WhatsApp security features. Researchers uncover a campaign targeting LLM service endpoints. Fortinet and OpenSSL patch multiple vulnerabilities. A high-severity WinRAR vulnerability continues to see widespread exploitation six months after it was patched. The SoundCloud data breach affected nearly 30 million users. Ben Yelin explains the California lawsuit accusing social media platforms of harming kids. A Spanish resort town gets hit with low-rent ransomware.  

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today, Dave is joined by his Caveat co-host Ben Yelin, Program Director for Public Policy &amp; External Affairs at the University of Maryland Center for Cyber Health and Hazard Strategies, to discuss the upcoming trial where Meta and YouTube will make their case against accusations of social media being harmful to children. You can learn more here. 

T-Minus Guest Host

Our T-Minus Space Daily podcast team is in Orlando, FL this week covering Commercial Space Week. Yesterday while the crew was on travel making their way to the event, Dave Bittner took his first spin behind the mic on T-Minus. Tune in and let us know how Dave did!

You can follow along with host Maria Varmazis and producers Alice Carruth and Liz Stokes for event coverage via our LinkedIn profile.

Selected Reading

Trump’s acting cyber chief uploaded sensitive files into a public version of ChatGPT (POLITICO)

Cyberattack on Poland’s power grid hit around 30 energy facilities, new report says (The Record)

Europe/India • Indian 'hackers for hire' to continue to thrive under Brussels-New Dehli trade deal (Intelligence Online)

New WhatsApp lockdown feature protects high-risk users from hackers (Bleeping Computer)

Hackers hijack exposed LLM endpoints in Bizarre Bazaar operation (Bleeping Computer)

Fortinet Patches Exploited FortiCloud SSO Authentication Bypass (SecurityWeek)

High-Severity Remote Code Execution Vulnerability Patched in OpenSSL (SecurityWeek)

Cybercriminals and nation-state groups are exploiting a six-month old WinRAR defect (CyberScoop)

SoundCloud breach added to HIBP, 29.8 million accounts exposed (CyberInsider)

Spanish municipality Sanxenxo City Council calls hackers bluff as malware takes over network (Cryptopolitan)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA’s interim director uploaded sensitive government material into the public version of ChatGPT. The cyberattack on Poland’s power grid compromised roughly 30 energy facilities. The EU and India sign a new partnership that includes expanded cyber cooperation. Meta rolls out enhanced WhatsApp security features. Researchers uncover a campaign targeting LLM service endpoints. Fortinet and OpenSSL patch multiple vulnerabilities. A high-severity WinRAR vulnerability continues to see widespread exploitation six months after it was patched. The SoundCloud data breach affected nearly 30 million users. Ben Yelin explains the California lawsuit accusing social media platforms of harming kids. A Spanish resort town gets hit with low-rent ransomware.  </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today, Dave is joined by his <a href="https://www.thecyberwire.com/podcasts/caveat"><u>Caveat</u></a> co-host <a href="https://www.linkedin.com/in/benjamin-yelin-5b14114b"><u>Ben Yelin</u></a>, Program Director for Public Policy &amp; External Affairs at the University of Maryland Center for Cyber Health and Hazard Strategies, to discuss the upcoming trial where Meta and YouTube will make their case against accusations of social media being harmful to children. You can <a href="https://www.npr.org/2026/01/27/nx-s1-5684196/social-media-kids-addiction-mental-health-trial"><u>learn more here</u></a>. </p>
<p><strong>T-Minus Guest Host</strong></p>
<p>Our <a href="https://space.n2k.com/podcasts/t-minus"><u>T-Minus Space Daily</u></a> podcast team is in Orlando, FL this week covering <a href="https://commercialspaceweek.com/"><u>Commercial Space Week</u></a>. Yesterday while the crew was on travel making their way to the event, Dave Bittner took his first spin behind the mic on T-Minus. <a href="https://space.n2k.com/podcasts/t-minus/689"><u>Tune in</u></a> and let us know how Dave did!</p>
<p>You can follow along with host Maria Varmazis and producers Alice Carruth and Liz Stokes for event coverage via our <a href="http://linkedin.com/company/93601383/"><u>LinkedIn profile</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.politico.com/news/2026/01/27/cisa-madhu-gottumukkala-chatgpt-00749361"><u>Trump’s acting cyber chief uploaded sensitive files into a public version of ChatGPT</u></a> (POLITICO)</p>
<p><a href="https://therecord.media/poland-electrical-grid-cyberattack-30-facilities-affected"><u>Cyberattack on Poland’s power grid hit around 30 energy facilities, new report says</u></a> (The Record)</p>
<p><a href="https://www.intelligenceonline.com/asia-pacific/2026/01/28/indian--hackers-for-hire--to-continue-to-thrive-under-brussels-new-dehli-trade-deal,110613714-art"><u>Europe/India • Indian 'hackers for hire' to continue to thrive under Brussels-New Dehli trade deal</u></a> (Intelligence Online)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/whatsapp-gets-new-lockdown-feature-that-blocks-cyberattacks/"><u>New WhatsApp lockdown feature protects high-risk users from hackers</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/hackers-hijack-exposed-llm-endpoints-in-bizarre-bazaar-operation/"><u>Hackers hijack exposed LLM endpoints in Bizarre Bazaar operation</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/fortinet-patches-exploited-forticloud-sso-authentication-bypass/"><u>Fortinet Patches Exploited FortiCloud SSO Authentication Bypass</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/high-severity-remote-code-execution-vulnerability-patched-in-openssl/"><u>High-Severity Remote Code Execution Vulnerability Patched in OpenSSL</u></a> (SecurityWeek)</p>
<p><a href="https://cyberscoop.com/winrar-defect-active-exploits-google-threat-intel/"><u>Cybercriminals and nation-state groups are exploiting a six-month old WinRAR defect</u></a> (CyberScoop)</p>
<p><a href="https://cyberinsider.com/soundcloud-breach-added-to-hibp-29-8-million-accounts-exposed/"><u>SoundCloud breach added to HIBP, 29.8 million accounts exposed</u></a> (CyberInsider)</p>
<p><a href="https://www.cryptopolitan.com/sanxenxo-city-council-malware-takes-over/"><u>Spanish municipality Sanxenxo City Council calls hackers bluff as malware takes over network</u></a> (Cryptopolitan)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1506</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dda4a2f2-1c7a-11f0-85e0-efcb435ed67d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4298012080.mp3?updated=1769627605" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>“The hackers made me do it,” or did they?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2476/notes</link>
      <description>Microsoft rushes an emergency fix for an actively exploited Office zero-day. A suspected cyberattack halts rail service in Spain. The FBI probes Signal chats in Minnesota. The UK moves to overhaul policing for the cyber age. Romania investigates a hitman-for-hire site. A UK court awards $4.1 million in a Saudi spyware case. Google agrees to a voice assistant settlement. CISA maps post-quantum crypto readiness. Prosecutors charge an Illinois man over a Snapchat hacking scheme targeting hundreds of women. Our guest today is Cynthia Kaiser, SVP of the Ransomware Research Center at Halcyon, sharing some insight into the AI and quantum threats to cybersecurity and the national cyber strategy. A Best Buy guy tries a creative alibi. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest today is Cynthia Kaiser, SVP of the Ransomware Research Center at Halcyon, sharing some insight into the AI and quantum threats to cybersecurity and the national cyber strategy.



Selected Reading

Microsoft Issues Emergency Patch for Actively Exploited Office Zero-Day (Beyond Machines)

Catalonia travel chaos: thousands stranded as suspected cyber attack disrupts rail network (The Olive Press) 

FBI is investigating Minnesota Signal groups tracking ICE, Patel says (NBC News)

UK plans sweeping overhaul of policing amid surge in online crimes (The Record)

Romania probes two suspects over alleged hitman-for-hire website (The Record)

Judge awards British critic of Saudis $4.1 million, finds the regime hacked his devices (The Record)

Google to pay $68 million over allegations its voice assistant eavesdropped on users (CBS News)

CISA releases technology readiness list for post-quantum cryptography (CSO Online)

Illinois man charged with hacking Snapchat accounts to steal nude photos (Bleeping Computer)

Savannah BSavannah Best Buy employee says 'hacker group' blackmailed him into theft ring scheme (WJCL 22)



Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Jan 2026 20:50:00 -0000</pubDate>
      <itunes:title>“The hackers made me do it,” or did they?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2476</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Microsoft rushes an emergency fix for an actively exploited Office zero-day. A suspected cyberattack halts rail service in Spain. The FBI probes Signal chats in Minnesota. The UK moves to overhaul policing for the cyber age. Romania investigates a hitman-for-hire site. A UK court awards $4.1 million in a Saudi spyware case. Google agrees to a voice assistant settlement. CISA maps post-quantum crypto readiness. Prosecutors charge an Illinois man over a Snapchat hacking scheme targeting hundreds of women. Our guest today is Cynthia Kaiser, SVP of the Ransomware Research Center at Halcyon, sharing some insight into the AI and quantum threats to cybersecurity and the national cyber strategy. A Best Buy guy tries a creative alibi. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest today is Cynthia Kaiser, SVP of the Ransomware Research Center at Halcyon, sharing some insight into the AI and quantum threats to cybersecurity and the national cyber strategy.



Selected Reading

Microsoft Issues Emergency Patch for Actively Exploited Office Zero-Day (Beyond Machines)

Catalonia travel chaos: thousands stranded as suspected cyber attack disrupts rail network (The Olive Press) 

FBI is investigating Minnesota Signal groups tracking ICE, Patel says (NBC News)

UK plans sweeping overhaul of policing amid surge in online crimes (The Record)

Romania probes two suspects over alleged hitman-for-hire website (The Record)

Judge awards British critic of Saudis $4.1 million, finds the regime hacked his devices (The Record)

Google to pay $68 million over allegations its voice assistant eavesdropped on users (CBS News)

CISA releases technology readiness list for post-quantum cryptography (CSO Online)

Illinois man charged with hacking Snapchat accounts to steal nude photos (Bleeping Computer)

Savannah BSavannah Best Buy employee says 'hacker group' blackmailed him into theft ring scheme (WJCL 22)



Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft rushes an emergency fix for an actively exploited Office zero-day. A suspected cyberattack halts rail service in Spain. The FBI probes Signal chats in Minnesota. The UK moves to overhaul policing for the cyber age. Romania investigates a hitman-for-hire site. A UK court awards $4.1 million in a Saudi spyware case. Google agrees to a voice assistant settlement. CISA maps post-quantum crypto readiness. Prosecutors charge an Illinois man over a Snapchat hacking scheme targeting hundreds of women. Our guest today is Cynthia Kaiser, SVP of the Ransomware Research Center at Halcyon, sharing some insight into the AI and quantum threats to cybersecurity and the national cyber strategy. A Best Buy guy tries a creative alibi. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br><strong>CyberWire Guest</strong></p>
<p>Our guest today is <a href="https://www.linkedin.com/in/cynthia-kaiser-cyber/"><u>Cynthia Kaiser</u></a>, SVP of the Ransomware Research Center at <a href="https://www.google.com/aclk?sa=L&amp;pf=1&amp;ai=DChsSEwjxtc_w_quSAxU8Z0cBHU_vCkYYACICCAEQABoCcXU&amp;co=1&amp;ase=2&amp;gclid=Cj0KCQiA4eHLBhCzARIsAJ2NZoJuXWxshOXU-IMbuNJxdQ6VddS5IxlpR5qooIgd-aWxzMq5txDJzD4aAvboEALw_wcB&amp;ei=0dN4aY7sCd6y5NoPj-TO-QQ&amp;cid=CAASZeRoxJiduYARZhoec39YoEywXa9BL_5u-5N_vOAsV-8iKjxUkAXqjJ18wNdUMpyxEOqE7vZT2bUAc8KL18gnGVLkY0FfWQuiiRwkU6bTGMokkMzVwJTbWBaFr6a7TwzkhV_5lpSh&amp;cce=2&amp;category=acrcp_v1_32&amp;sig=AOD64_1ZuJ0BxhtfH9C__f3paPLEICQrUw&amp;q&amp;sqi=2&amp;nis=4&amp;adurl=https://www.halcyon.ai/?utm_source%3Dgoogle%26utm_medium%3Dcpc%26utm_campaign%3D22393858485%26utm_term%3Dhalycon%26utm_content%3D177465999356%26gad_source%3D1%26gad_campaignid%3D22393858485%26gbraid%3D0AAAAAoNJSOYOuWz_Z7NEgVfteniFg6EYr%26gclid%3DCj0KCQiA4eHLBhCzARIsAJ2NZoJuXWxshOXU-IMbuNJxdQ6VddS5IxlpR5qooIgd-aWxzMq5txDJzD4aAvboEALw_wcB&amp;ved=2ahUKEwjOmMnw_quSAxVeGVkFHQ-yM08Q0Qx6BAgWEAE"><u>Halcyon</u></a>, sharing some insight into the AI and quantum threats to cybersecurity and the national cyber strategy.</p>
<p><br></p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://beyondmachines.net/event_details/microsoft-issues-emergency-patch-for-actively-exploited-office-zero-day-v-8-i-f-4/gD2P6Ple2L"><u>Microsoft Issues Emergency Patch for Actively Exploited Office Zero-Day</u></a> (Beyond Machines)</p>
<p><a href="https://www.theolivepress.es/spain-news/2026/01/26/catalonia-travel-chaos-thousands-stranded-as-suspected-cyber-attack-disrupts-rail-network/"><u>Catalonia travel chaos: thousands stranded as suspected cyber attack disrupts rail network</u></a> (The Olive Press) </p>
<p><a href="https://www.nbcnews.com/tech/internet/fbi-investigating-minnesota-signal-minneapolis-group-ice-patel-kash-rcna256041"><u>FBI is investigating Minnesota Signal groups tracking ICE, Patel says</u></a> (NBC News)</p>
<p><a href="https://therecord.media/uk-national-policing-overhaul-cybercrime"><u>UK plans sweeping overhaul of policing amid surge in online crimes</u></a> (The Record)</p>
<p><a href="https://therecord.media/romania-assassins-for-hire-website-investigation"><u>Romania probes two suspects over alleged hitman-for-hire website</u></a> (The Record)</p>
<p><a href="https://therecord.media/london-judge-sides-with-saudi-critic-spyware-case"><u>Judge awards British critic of Saudis $4.1 million, finds the regime hacked his devices</u></a> (The Record)</p>
<p><a href="https://www.cbsnews.com/news/google-voice-assistant-lawsuit-settlement-68-million/"><u>Google to pay $68 million over allegations its voice assistant eavesdropped on users</u></a> (CBS News)</p>
<p><a href="https://www.csoonline.com/article/4122752/cisa-releases-technology-readiness-list-for-post-quantum-cryptography.html"><u>CISA releases technology readiness list for post-quantum cryptography</u></a> (CSO Online)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/illinois-man-charged-with-hacking-snapchat-accounts-to-steal-nude-photos/"><u>Illinois man charged with hacking Snapchat accounts to steal nude photos</u></a> (Bleeping Computer)</p>
<p><a href="https://www.wjcl.com/article/savannah-best-buy-theft-ring/70144185"><u>Savannah BSavannah Best Buy employee says 'hacker group' blackmailed him into theft ring scheme</u></a> (WJCL 22)</p>
<p><br></p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  </p>
<p><br><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1663</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dd7dfc4c-1c7a-11f0-85e0-df7579be7cde]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3315040870.mp3?updated=1769541637" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How do you gain “experience” in cyber without a job in cyber? [CISO Persepctives]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/109/notes</link>
      <description>Please enjoy this encore of CISO Perspectives.

We're sharing a episode from another N2K show we thought you might like. It's the third episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy!

Show Notes: 

While the cybersecurity industry has expanded and grown in recent years, newcomers still struggle to gain relevant "experience" before officially beginning their cyber careers. In this episode of CISO Perspectives, host Kim Jones sits down with Kathleen Smith, the Chief Outreach Officer at clearedjobs.net and the co-host of Security Cleared Jobs: Who’s Hiring &amp; How, to discuss this dilemma and what new entrants can do to account for these difficulties. Throughout the conversation, Kathleen and Kim will discuss the challenges associated with entry-level cyber positions, how to gain meaningful experience, and how the industry as a whole contributes to this problem.



Want more CISO Perspectives?:

Check out a companion ⁠blog post⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Jan 2026 07:00:00 -0000</pubDate>
      <itunes:title>How do you gain “experience” in cyber without a job in cyber? [CISO Persepctives]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>109</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6d749cba-2460-11f0-8017-0bc10d709bb8/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of CISO Perspectives.

We're sharing a episode from another N2K show we thought you might like. It's the third episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy!

Show Notes: 

While the cybersecurity industry has expanded and grown in recent years, newcomers still struggle to gain relevant "experience" before officially beginning their cyber careers. In this episode of CISO Perspectives, host Kim Jones sits down with Kathleen Smith, the Chief Outreach Officer at clearedjobs.net and the co-host of Security Cleared Jobs: Who’s Hiring &amp; How, to discuss this dilemma and what new entrants can do to account for these difficulties. Throughout the conversation, Kathleen and Kim will discuss the challenges associated with entry-level cyber positions, how to gain meaningful experience, and how the industry as a whole contributes to this problem.



Want more CISO Perspectives?:

Check out a companion ⁠blog post⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of CISO Perspectives.</p>
<p>We're sharing a episode from another N2K show we thought you might like. It's the third episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy!</p>
<p><strong>Show Notes: </strong></p>
<p>While the cybersecurity industry has expanded and grown in recent years, newcomers still struggle to gain relevant "experience" before officially beginning their cyber careers. In this episode of CISO Perspectives, host <a href="https://www.linkedin.com/in/kimjones-cism/">Kim Jones</a> sits down with <a href="https://www.linkedin.com/in/kathleenesmith/">Kathleen Smith</a>, the Chief Outreach Officer at <a href="https://clearedjobs.net/">clearedjobs.net</a> and the co-host of <a href="https://clearedjobs.net/podcast">Security Cleared Jobs</a>: Who’s Hiring &amp; How, to discuss this dilemma and what new entrants can do to account for these difficulties. Throughout the conversation, Kathleen and Kim will discuss the challenges associated with entry-level cyber positions, how to gain meaningful experience, and how the industry as a whole contributes to this problem.</p>
<p><br></p>
<p><strong>Want more CISO Perspectives?:</strong></p>
<p>Check out a companion ⁠<a href="https://thecyberwire.com//stories/ff8b9cc3f5ae4e33abb384915fe7cd5e/how-do-you-gain-experience-in-cyber-without-a-job-in-cyber">blog post⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2357</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6d749cba-2460-11f0-8017-0bc10d709bb8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2162297922.mp3?updated=1768340484" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When encryption meets enforcement.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2475/notes</link>
      <description>Microsoft granted the FBI access to laptops encrypted with BitLocker. The EU opens an investigation into Grok’s creation of sexually explicit images. Glimmers of access pierce Iran’s internet blackout. Koi Security warns npm fixes fall short against PackageGate exploits. Some Windows 11 devices fail to boot after installing the January Patch Tuesday updates. CISA warns of active exploitation of  multiple vulnerabilities across widely used enterprise and developer software. ESET researchers have attributed the cyberattack on Poland’s energy sector to Russia’s Sandworm. This week's business breakdown. Brandon Karpf joins us to talk space and cyber. CISA sits out RSAC. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

Our guest today is cybersecurity executive and friend of the show Brandon Karpf with Dave Bittner and T-Minus Space Daily host Maria Varmazis, for our monthly space and cyber segment. Brandon, Maria and Dave discuss “No more free rides: it’s time to pay for space safety.”



Selected Reading

FBI Accessed Windows Laptops After Microsoft Shared BitLocker Recovery Keys (Hackread)

European Commission opens new investigation into X's Grok (The Register)

Amid Two-Week Internet Blackout, Some Iranians Are Getting Back Online (New York Times)

Hackers can bypass npm’s Shai-Hulud defenses via Git dependencies (Bleeping Computer)

Microsoft investigates Windows 11 boot failures after January updates (Bleeping Computer)

CISA says critical VMware RCE flaw now actively exploited (Bleeping Computer)

CISA confirms active exploitation of four enterprise software bugs (Bleeping Computer)

ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025 (ESET) 

Aikido secures $60 million in Series B funding. (N2K Pro Business Briefing)

CISA won't attend infosec industry's biggest conference (The Register)



Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 26 Jan 2026 20:50:00 -0000</pubDate>
      <itunes:title>When encryption meets enforcement.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2475</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Microsoft granted the FBI access to laptops encrypted with BitLocker. The EU opens an investigation into Grok’s creation of sexually explicit images. Glimmers of access pierce Iran’s internet blackout. Koi Security warns npm fixes fall short against PackageGate exploits. Some Windows 11 devices fail to boot after installing the January Patch Tuesday updates. CISA warns of active exploitation of  multiple vulnerabilities across widely used enterprise and developer software. ESET researchers have attributed the cyberattack on Poland’s energy sector to Russia’s Sandworm. This week's business breakdown. Brandon Karpf joins us to talk space and cyber. CISA sits out RSAC. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

Our guest today is cybersecurity executive and friend of the show Brandon Karpf with Dave Bittner and T-Minus Space Daily host Maria Varmazis, for our monthly space and cyber segment. Brandon, Maria and Dave discuss “No more free rides: it’s time to pay for space safety.”



Selected Reading

FBI Accessed Windows Laptops After Microsoft Shared BitLocker Recovery Keys (Hackread)

European Commission opens new investigation into X's Grok (The Register)

Amid Two-Week Internet Blackout, Some Iranians Are Getting Back Online (New York Times)

Hackers can bypass npm’s Shai-Hulud defenses via Git dependencies (Bleeping Computer)

Microsoft investigates Windows 11 boot failures after January updates (Bleeping Computer)

CISA says critical VMware RCE flaw now actively exploited (Bleeping Computer)

CISA confirms active exploitation of four enterprise software bugs (Bleeping Computer)

ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025 (ESET) 

Aikido secures $60 million in Series B funding. (N2K Pro Business Briefing)

CISA won't attend infosec industry's biggest conference (The Register)



Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft granted the FBI access to laptops encrypted with BitLocker. The EU opens an investigation into Grok’s creation of sexually explicit images. Glimmers of access pierce Iran’s internet blackout. Koi Security warns npm fixes fall short against PackageGate exploits. Some Windows 11 devices fail to boot after installing the January Patch Tuesday updates. CISA warns of active exploitation of  multiple vulnerabilities across widely used enterprise and developer software. ESET researchers have attributed the cyberattack on Poland’s energy sector to Russia’s Sandworm. This week's business breakdown. Brandon Karpf joins us to talk space and cyber. CISA sits out RSAC. </p>
<p><br>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br></p>
<p><strong>CyberWire Guest</strong></p>
<p>Our guest today is cybersecurity executive and friend of the show <a href="https://www.linkedin.com/in/brandon-karpf/"><u>Brandon Karpf</u></a> with Dave Bittner and <a href="https://space.n2k.com/podcasts/t-minus"><u>T-Minus Space Daily</u></a> host Maria Varmazis, for our monthly space and cyber segment. Brandon, Maria and Dave discuss “<a href="https://spacenews.com/no-more-free-rides-its-time-to-pay-for-space-safety/"><u>No more free rides: it’s time to pay for space safety.</u></a>”</p>
<p><br></p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://hackread.com/fbi-windows-laptops-microsoft-bitlocker-recovery-keys/"><u>FBI Accessed Windows Laptops After Microsoft Shared BitLocker Recovery Keys</u></a> (Hackread)</p>
<p><a href="https://www.theregister.com/2026/01/26/ec_open_new_investigation_into/"><u>European Commission opens new investigation into X's Grok</u></a> (The Register)</p>
<p><a href="https://www.nytimes.com/2026/01/25/world/middleeast/iran-internet.html"><u>Amid Two-Week Internet Blackout, Some Iranians Are Getting Back Online</u></a> (New York Times)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/hackers-can-bypass-npms-shai-hulud-defenses-via-git-dependencies/"><u>Hackers can bypass npm’s Shai-Hulud defenses via Git dependencies</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-investigates-windows-11-boot-failures-after-january-updates/"><u>Microsoft investigates Windows 11 boot failures after January updates</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisa-says-critical-vmware-rce-flaw-now-actively-exploited/"><u>CISA says critical VMware RCE flaw now actively exploited</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisa-confirms-active-exploitation-of-four-enterprise-software-bugs/"><u>CISA confirms active exploitation of four enterprise software bugs</u></a> (Bleeping Computer)</p>
<p><a href="https://www.welivesecurity.com/en/eset-research/eset-research-sandworm-cyberattack-poland-power-grid-late-2025/"><u>ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025</u></a> (ESET) </p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/8/3"><u>Aikido secures $60 million in Series B funding.</u></a> (N2K Pro Business Briefing)</p>
<p><a href="https://www.theregister.com/2026/01/24/cisa_skipping_rsa_exclusive/"><u>CISA won't attend infosec industry's biggest conference</u></a> (The Register)</p>
<p><br></p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  </p>
<p><br><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1923</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dd53af64-1c7a-11f0-85e0-678b005fa23d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3810015789.mp3?updated=1769452146" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lauren Van Wazer: You have to be your own North Star. [CISSP] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/105/notes</link>
      <description>Please enjoy this encore of Career Notes.

Lauren Van Wazer, Vice President, Global Public Policy and Regulatory Affairs for Akamai Technologies, shares her story as she followed her own North Star and landed where she is today. She describes her career path, highlighting how she went from working at AT&amp;T to being able to work in the White House. She shares how she is a coach and a leader to the team she works with now, saying "my view is I've got their back, if they make a mistake, it's my mistake, and if they do well, they've done well." Lauren hopes she's made an impact in the world by making it a little bit better than before, and discusses how she doesn't let anyone stop her from her goals. Lauren shares her outlook on her experiences, calling attention to different roles in her life that made her journey all the better. We thank Lauren for sharing.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 25 Jan 2026 08:00:00 -0000</pubDate>
      <itunes:title>Lauren Van Wazer: You have to be your own North Star. [CISSP] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>105</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/52fc5342-f876-11f0-b68f-53112cad19d9/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes.

Lauren Van Wazer, Vice President, Global Public Policy and Regulatory Affairs for Akamai Technologies, shares her story as she followed her own North Star and landed where she is today. She describes her career path, highlighting how she went from working at AT&amp;T to being able to work in the White House. She shares how she is a coach and a leader to the team she works with now, saying "my view is I've got their back, if they make a mistake, it's my mistake, and if they do well, they've done well." Lauren hopes she's made an impact in the world by making it a little bit better than before, and discusses how she doesn't let anyone stop her from her goals. Lauren shares her outlook on her experiences, calling attention to different roles in her life that made her journey all the better. We thank Lauren for sharing.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes.</p>
<p>Lauren Van Wazer, Vice President, Global Public Policy and Regulatory Affairs for Akamai Technologies, shares her story as she followed her own North Star and landed where she is today. She describes her career path, highlighting how she went from working at AT&amp;T to being able to work in the White House. She shares how she is a coach and a leader to the team she works with now, saying "my view is I've got their back, if they make a mistake, it's my mistake, and if they do well, they've done well." Lauren hopes she's made an impact in the world by making it a little bit better than before, and discusses how she doesn't let anyone stop her from her goals. Lauren shares her outlook on her experiences, calling attention to different roles in her life that made her journey all the better. We thank Lauren for sharing.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>527</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[52fc5342-f876-11f0-b68f-53112cad19d9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7314332442.mp3?updated=1735936623" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Caught in the funnel. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/409/notes</link>
      <description>Today we have Andrew Northern, Principal Security Researcher at Censys, discussing "From Evasion to Evidence: Exploiting the Funneling Behavior of Injects". This research explains how modern web malware campaigns use multi-stage JavaScript injections, redirects, and fake CAPTCHAs to selectively deliver payloads and evade detection. 

It shows that these attack chains rely on stable redirect and traffic-distribution chokepoints that can be monitored at scale. Using the SmartApe campaign as a case study, the report demonstrates how defenders can turn those chokepoints into high-confidence detection and tracking opportunities.

The research can be found here:


  From Evasion to Evidence: Exploiting the Funneling Behavior of Injects


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Jan 2026 08:00:00 -0000</pubDate>
      <itunes:title>Caught in the funnel. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>409</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6afc0d6a-f872-11f0-b67c-5fd64c8ef79d/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Today we have Andrew Northern, Principal Security Researcher at Censys, discussing "From Evasion to Evidence: Exploiting the Funneling Behavior of Injects". This research explains how modern web malware campaigns use multi-stage JavaScript injections, redirects, and fake CAPTCHAs to selectively deliver payloads and evade detection. 

It shows that these attack chains rely on stable redirect and traffic-distribution chokepoints that can be monitored at scale. Using the SmartApe campaign as a case study, the report demonstrates how defenders can turn those chokepoints into high-confidence detection and tracking opportunities.

The research can be found here:


  From Evasion to Evidence: Exploiting the Funneling Behavior of Injects


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we have <a href="https://www.linkedin.com/in/anorthern/">Andrew Northern</a>, Principal Security Researcher at <a href="https://www.linkedin.com/company/censysio/">Censys</a>, discussing "From Evasion to Evidence: Exploiting the Funneling Behavior of Injects". This research explains how modern web malware campaigns use multi-stage JavaScript injections, redirects, and fake CAPTCHAs to selectively deliver payloads and evade detection. </p>
<p>It shows that these attack chains rely on stable redirect and traffic-distribution chokepoints that can be monitored at scale. Using the SmartApe campaign as a case study, the report demonstrates how defenders can turn those chokepoints into high-confidence detection and tracking opportunities.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://censys.com/blog/exploiting-funneling-behavior-of-injects">From Evasion to Evidence: Exploiting the Funneling Behavior of Injects</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1413</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6afc0d6a-f872-11f0-b67c-5fd64c8ef79d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4210190898.mp3?updated=1769790336" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>TikTok lives to scroll another day.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2474/notes</link>
      <description>At long last, a TikTok deal. Officials urge lawmakers to keep an eye on the quantum ball. Fortinet confirms active exploitation of a critical authentication bypass flaw. Ireland plans to authorize spyware for law enforcement. Okta warns customers of sophisticated vishing kits. Under Armour investigates data breach claims. CISA adds a Zimbra Collaboration Suite flaw to the known exploited vulnerabilities list. Poor OpSec enables recovery of data stolen by the INC ransomware gang. The DOJ deports a pair of Venezuelans convicted of ATM jackpotting. Our guest is Chris Nyhuis, Founder and CEO of Vigilant, sharing practical steps to protect money, identity, and devices.  Curl pulls the plug on bug bounties after drowning in AI slop.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Chris Nyhuis, Founder and CEO of Vigilant, sharing "practical steps consumers can take in 2026 to protect their money, identity, and devices."

Selected Reading

TikTok Strikes Deal to Create New U.S. Entity and Loosen App’s Ties to China (New York Times)

US Officials Urge Congress to Reauthorize Key Quantum Law (BankInfo Security)

Fortinet confirms critical FortiCloud auth bypass not fully patched (Bleeping Computer)

Ireland plans law allowing law enforcement to use spyware (The Record)

Okta SSO accounts targeted in vishing-based data theft attacks (Bleeping Computer)

Under Armour Investigates Data Breach (Infosecurity Magazine)

Organizations Warned of Exploited Zimbra Collaboration Vulnerability  (SecurityWeek)

INC ransomware opsec fail allowed data recovery for 12 US orgs (Bleeping Computer)

2 Venezuelans Convicted in US for Using Malware to Hack ATMs (SecurityWeek)

Curl ending bug bounty program after flood of AI slop reports (Bleeping Computer)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 23 Jan 2026 21:10:00 -0000</pubDate>
      <itunes:title>TikTok lives to scroll another day.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2474</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>At long last, a TikTok deal. Officials urge lawmakers to keep an eye on the quantum ball. Fortinet confirms active exploitation of a critical authentication bypass flaw. Ireland plans to authorize spyware for law enforcement. Okta warns customers of sophisticated vishing kits. Under Armour investigates data breach claims. CISA adds a Zimbra Collaboration Suite flaw to the known exploited vulnerabilities list. Poor OpSec enables recovery of data stolen by the INC ransomware gang. The DOJ deports a pair of Venezuelans convicted of ATM jackpotting. Our guest is Chris Nyhuis, Founder and CEO of Vigilant, sharing practical steps to protect money, identity, and devices.  Curl pulls the plug on bug bounties after drowning in AI slop.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Chris Nyhuis, Founder and CEO of Vigilant, sharing "practical steps consumers can take in 2026 to protect their money, identity, and devices."

Selected Reading

TikTok Strikes Deal to Create New U.S. Entity and Loosen App’s Ties to China (New York Times)

US Officials Urge Congress to Reauthorize Key Quantum Law (BankInfo Security)

Fortinet confirms critical FortiCloud auth bypass not fully patched (Bleeping Computer)

Ireland plans law allowing law enforcement to use spyware (The Record)

Okta SSO accounts targeted in vishing-based data theft attacks (Bleeping Computer)

Under Armour Investigates Data Breach (Infosecurity Magazine)

Organizations Warned of Exploited Zimbra Collaboration Vulnerability  (SecurityWeek)

INC ransomware opsec fail allowed data recovery for 12 US orgs (Bleeping Computer)

2 Venezuelans Convicted in US for Using Malware to Hack ATMs (SecurityWeek)

Curl ending bug bounty program after flood of AI slop reports (Bleeping Computer)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>At long last, a TikTok deal. Officials urge lawmakers to keep an eye on the quantum ball. Fortinet confirms active exploitation of a critical authentication bypass flaw. Ireland plans to authorize spyware for law enforcement. Okta warns customers of sophisticated vishing kits. Under Armour investigates data breach claims. CISA adds a Zimbra Collaboration Suite flaw to the known exploited vulnerabilities list. Poor OpSec enables recovery of data stolen by the INC ransomware gang. The DOJ deports a pair of Venezuelans convicted of ATM jackpotting. Our guest is Chris Nyhuis, Founder and CEO of Vigilant, sharing practical steps to protect money, identity, and devices.  Curl pulls the plug on bug bounties after drowning in AI slop.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/chris-nyhuis-34427550/"><u>Chris Nyhuis</u></a>, Founder and CEO of <a href="https://www.linkedin.com/company/vigilantnow/"><u>Vigilant</u></a>, sharing "practical steps consumers can take in 2026 to protect their money, identity, and devices."</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.nytimes.com/2026/01/22/technology/tiktok-deal-oracle-bytedance-china-us.html"><u>TikTok Strikes Deal to Create New U.S. Entity and Loosen App’s Ties to China</u></a> (New York Times)</p>
<p><a href="https://www.bankinfosecurity.com/us-officials-urge-congress-to-reauthorize-key-quantum-law-a-30585"><u>US Officials Urge Congress to Reauthorize Key Quantum Law</u></a> (BankInfo Security)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/fortinet-confirms-critical-forticloud-auth-bypass-not-fully-patched/"><u>Fortinet confirms critical FortiCloud auth bypass not fully patched</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/ireland-plans-law-enforcement-spyware"><u>Ireland plans law allowing law enforcement to use spyware</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/okta-sso-accounts-targeted-in-vishing-based-data-theft-attacks/"><u>Okta SSO accounts targeted in vishing-based data theft attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.infosecurity-magazine.com/news/under-armour-investigates-data/"><u>Under Armour Investigates Data Breach</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.securityweek.com/organizations-warned-of-exploited-zimbra-collaboration-vulnerability/"><u>Organizations Warned of Exploited Zimbra Collaboration Vulnerability </u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/inc-ransomware-opsec-fail-allowed-data-recovery-for-12-us-orgs/"><u>INC ransomware opsec fail allowed data recovery for 12 US orgs</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/2-venezuelans-convicted-in-us-for-using-malware-to-hack-atms/"><u>2 Venezuelans Convicted in US for Using Malware to Hack ATMs</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/curl-ending-bug-bounty-program-after-flood-of-ai-slop-reports/"><u>Curl ending bug bounty program after flood of AI slop reports</u></a> (Bleeping Computer)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1804</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dd29b01a-1c7a-11f0-85e0-7b68b74cbb3e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3224354054.mp3?updated=1769193558" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stabilized but smaller.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2473/notes</link>
      <description>CISA’s acting director assures Congress the agency has “stabilized”. Google and Cisco patch critical vulnerabilities. Fortinet firewalls are being hit by automated attacks that create rogue accounts. A global spam campaign leverages unsecured Zendesk support systems. LastPass warns of attempted account takeovers. Greek authorities make arrests in a sophisticated fake cell tower scam. Executives at Davos express concerns over AI. Pwn2Own Automotive proves profitable. Our guest is Kaushik Devireddy, AI data scientist at Fable Security, with insights on a fake ChatGPT installer. New password, same as the old password. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Kaushik Devireddy, AI data scientist at Fable Security, discussing their work on "How a fake ChatGPT installer tried to steal my password".

Selected Reading

CISA Is 'Trying to Get Back on Its Mission' After Trump Cuts (CISA)

Google Patches High-Severity V8 Race Condition in Chrome 144 published: today (Beyond Machines)

Cisco Patches Actively Exploited Flaw in Unified Communications Products (Beyond Machines)

Hackers breach Fortinet FortiGate devices, steal firewall configs (Bleeping Computer)

Zendesk ticket systems hijacked in massive global spam wave (Bleeping Computer)

LastPass Warns of Phishing Campaign Attempting to Steal Master Passwords (Infosecurity Magazine)

Greek Police Arrest Scammers in Athens Using Fake Cell Tower for SMS Phishing Operation (TechNadu)

Execs at Davos say AI's biggest problem isn't hype — it's security (Business Insider)

Hackers exploit 29 zero-days on second day of Pwn2Own Automotive (Bleeping Computer)

Analysis of 6 Billion Passwords Shows Stagnant User Behavior (SecurityWeek)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 22 Jan 2026 21:10:00 -0000</pubDate>
      <itunes:title>Stabilized but smaller.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2473</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA’s acting director assures Congress the agency has “stabilized”. Google and Cisco patch critical vulnerabilities. Fortinet firewalls are being hit by automated attacks that create rogue accounts. A global spam campaign leverages unsecured Zendesk support systems. LastPass warns of attempted account takeovers. Greek authorities make arrests in a sophisticated fake cell tower scam. Executives at Davos express concerns over AI. Pwn2Own Automotive proves profitable. Our guest is Kaushik Devireddy, AI data scientist at Fable Security, with insights on a fake ChatGPT installer. New password, same as the old password. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Kaushik Devireddy, AI data scientist at Fable Security, discussing their work on "How a fake ChatGPT installer tried to steal my password".

Selected Reading

CISA Is 'Trying to Get Back on Its Mission' After Trump Cuts (CISA)

Google Patches High-Severity V8 Race Condition in Chrome 144 published: today (Beyond Machines)

Cisco Patches Actively Exploited Flaw in Unified Communications Products (Beyond Machines)

Hackers breach Fortinet FortiGate devices, steal firewall configs (Bleeping Computer)

Zendesk ticket systems hijacked in massive global spam wave (Bleeping Computer)

LastPass Warns of Phishing Campaign Attempting to Steal Master Passwords (Infosecurity Magazine)

Greek Police Arrest Scammers in Athens Using Fake Cell Tower for SMS Phishing Operation (TechNadu)

Execs at Davos say AI's biggest problem isn't hype — it's security (Business Insider)

Hackers exploit 29 zero-days on second day of Pwn2Own Automotive (Bleeping Computer)

Analysis of 6 Billion Passwords Shows Stagnant User Behavior (SecurityWeek)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA’s acting director assures Congress the agency has “stabilized”. Google and Cisco patch critical vulnerabilities. Fortinet firewalls are being hit by automated attacks that create rogue accounts. A global spam campaign leverages unsecured Zendesk support systems. LastPass warns of attempted account takeovers. Greek authorities make arrests in a sophisticated fake cell tower scam. Executives at Davos express concerns over AI. Pwn2Own Automotive proves profitable. Our guest is Kaushik Devireddy, AI data scientist at Fable Security, with insights on a fake ChatGPT installer. New password, same as the old password. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/kaushik-devireddy/"><u>Kaushik Devireddy</u></a>, AI data scientist at <a href="https://fablesecurity.com/"><u>Fable Security</u></a>, discussing their work on "<a href="https://fablesecurity.com/blog-chatgpt-installer-stole-my-password/"><u>How a fake ChatGPT installer tried to steal my password</u></a>".</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bankinfosecurity.com/cisa-trying-to-get-back-on-its-mission-after-trump-cuts-a-30580"><u>CISA Is 'Trying to Get Back on Its Mission' After Trump Cuts</u></a> (CISA)</p>
<p><a href="https://beyondmachines.net/event_details/google-patches-high-severity-v8-race-condition-in-chrome-144-b-f-y-a-y/gD2P6Ple2L"><u>Google Patches High-Severity V8 Race Condition in Chrome 144 published: today</u></a> (Beyond Machines)</p>
<p><a href="https://beyondmachines.net/event_details/cisco-patches-actively-exploited-flaw-in-unified-communications-products-4-u-1-t-8/gD2P6Ple2L"><u>Cisco Patches Actively Exploited Flaw in Unified Communications Products</u></a> (Beyond Machines)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/hackers-breach-fortinet-fortigate-devices-steal-firewall-configs/"><u>Hackers breach Fortinet FortiGate devices, steal firewall configs</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/zendesk-ticket-systems-hijacked-in-massive-global-spam-wave/"><u>Zendesk ticket systems hijacked in massive global spam wave</u></a> (Bleeping Computer)</p>
<p><a href="https://www.infosecurity-magazine.com/news/lastpass-phishing-master-passwords/"><u>LastPass Warns of Phishing Campaign Attempting to Steal Master Passwords</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.technadu.com/greek-police-arrest-scammers-in-athens-using-fake-cell-tower-for-sms-phishing-operation/618856/"><u>Greek Police Arrest Scammers in Athens Using Fake Cell Tower for SMS Phishing Operation</u></a> (TechNadu)</p>
<p><a href="https://www.businessinsider.com/ai-security-risks-worry-ey-kpmg-execs-cybersecurity-davos-2026-1"><u>Execs at Davos say AI's biggest problem isn't hype — it's security</u></a> (Business Insider)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-29-zero-day-vulnerabilities-on-second-day-of-pwn2own-automotive/"><u>Hackers exploit 29 zero-days on second day of Pwn2Own Automotive</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/analysis-of-6-billion-passwords-shows-stagnant-user-behavior/"><u>Analysis of 6 Billion Passwords Shows Stagnant User Behavior</u></a> (SecurityWeek)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1479</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dd01f70a-1c7a-11f0-85e0-c3ba385df784]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8364653999.mp3?updated=1769110840" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DOGE and the data trail.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2472/notes</link>
      <description>DOGE staff face scrutiny over possible Hatch Act violations. GitLab fixes a serious 2FA bypass. North Korean hackers target macOS developers through Visual Studio Code. Researchers say the VoidLink malware may be largely AI-built. MITRE rolls out a new embedded systems threat matrix. Oracle drops a massive patch update. Minnesota DHS reports a breach affecting 300,000 people. Germany looks to Israel for cyber defense lessons. A major illicit marketplace goes dark. Our guest is Ashley Jess, Senior Intelligence Analyst from Intel 471, with a “crash course” on underground cyber markets. And auditors emerge as an unlikely line of cyber defense.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we have Ashley Jess, Senior Intelligence Analyst from Intel 471, sharing a “crash course” on how underground cyber markets and emerging trends.

Selected Reading

Trump administration concedes DOGE team may have misused Social Security data (POLITICO)

GitLab warns of high-severity 2FA bypass, denial-of-service flaws (Bleeping Computer)

North Korean Hackers Target macOS Developers via Malicious VS Code Projects (SecurityWeek)

Voidlink Linux Malware Was Built Using an AI Agent, Researchers Reveal (Infosecurity Magazine)

MITRE Launches New Security Framework for Embedded Systems (SecurityWeek)

Oracle's First 2026 CPU Delivers 337 New Security Patches (SecurityWeek)

Minnesota Agency Notifies 304,000 of Vendor Breach (GovInfo Security)

Germany and Israel Pledge Cybersecurity Alliance (BankInfo Security)

$12B Scam Market Tudou Guarantee Shuts Down (GovInfo Security)

Research reveals a surprising line of defence against cyber attacks: accountants (The Conversation)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 21 Jan 2026 21:10:00 -0000</pubDate>
      <itunes:title>DOGE and the data trail.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2472</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>DOGE staff face scrutiny over possible Hatch Act violations. GitLab fixes a serious 2FA bypass. North Korean hackers target macOS developers through Visual Studio Code. Researchers say the VoidLink malware may be largely AI-built. MITRE rolls out a new embedded systems threat matrix. Oracle drops a massive patch update. Minnesota DHS reports a breach affecting 300,000 people. Germany looks to Israel for cyber defense lessons. A major illicit marketplace goes dark. Our guest is Ashley Jess, Senior Intelligence Analyst from Intel 471, with a “crash course” on underground cyber markets. And auditors emerge as an unlikely line of cyber defense.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we have Ashley Jess, Senior Intelligence Analyst from Intel 471, sharing a “crash course” on how underground cyber markets and emerging trends.

Selected Reading

Trump administration concedes DOGE team may have misused Social Security data (POLITICO)

GitLab warns of high-severity 2FA bypass, denial-of-service flaws (Bleeping Computer)

North Korean Hackers Target macOS Developers via Malicious VS Code Projects (SecurityWeek)

Voidlink Linux Malware Was Built Using an AI Agent, Researchers Reveal (Infosecurity Magazine)

MITRE Launches New Security Framework for Embedded Systems (SecurityWeek)

Oracle's First 2026 CPU Delivers 337 New Security Patches (SecurityWeek)

Minnesota Agency Notifies 304,000 of Vendor Breach (GovInfo Security)

Germany and Israel Pledge Cybersecurity Alliance (BankInfo Security)

$12B Scam Market Tudou Guarantee Shuts Down (GovInfo Security)

Research reveals a surprising line of defence against cyber attacks: accountants (The Conversation)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>DOGE staff face scrutiny over possible Hatch Act violations. GitLab fixes a serious 2FA bypass. North Korean hackers target macOS developers through Visual Studio Code. Researchers say the VoidLink malware may be largely AI-built. MITRE rolls out a new embedded systems threat matrix. Oracle drops a massive patch update. Minnesota DHS reports a breach affecting 300,000 people. Germany looks to Israel for cyber defense lessons. A major illicit marketplace goes dark. Our guest is Ashley Jess, Senior Intelligence Analyst from Intel 471, with a “crash course” on underground cyber markets. And auditors emerge as an unlikely line of cyber defense.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we have <a href="https://www.linkedin.com/in/ashley-jess/"><u>Ashley Jess</u></a>, Senior Intelligence Analyst from <a href="https://www.linkedin.com/company/intel-471/"><u>Intel 471</u></a>, sharing a “crash course” on how underground cyber markets and emerging trends.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.politico.com/news/2026/01/20/trump-musk-doge-social-security-00737245"><u>Trump administration concedes DOGE team may have misused Social Security data</u></a> (POLITICO)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/gitlab-warns-of-high-severity-2fa-bypass-denial-of-service-flaws/"><u>GitLab warns of high-severity 2FA bypass, denial-of-service flaws</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/north-korean-hackers-target-macos-developers-via-malicious-vs-code-projects/"><u>North Korean Hackers Target macOS Developers via Malicious VS Code Projects</u></a> (SecurityWeek)</p>
<p><a href="https://www.infosecurity-magazine.com/news/voidlink-linux-malware-built-using/"><u>Voidlink Linux Malware Was Built Using an AI Agent, Researchers Reveal</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.securityweek.com/mitre-launches-new-security-framework-for-embedded-systems/"><u>MITRE Launches New Security Framework for Embedded Systems</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/oracles-first-2026-cpu-delivers-337-new-security-patches/"><u>Oracle's First 2026 CPU Delivers 337 New Security Patches</u> </a>(SecurityWeek)</p>
<p><a href="https://www.govinfosecurity.com/minnesota-agency-notifies-304000-vendor-breach-a-30570"><u>Minnesota Agency Notifies 304,000 of Vendor Breach</u></a> (GovInfo Security)</p>
<p><a href="https://www.bankinfosecurity.com/germany-israel-pledge-cybersecurity-alliance-a-30568"><u>Germany and Israel Pledge Cybersecurity Alliance</u></a> (BankInfo Security)</p>
<p><a href="https://www.govinfosecurity.com/12b-scam-market-tudou-guarantee-shuts-down-a-30565"><u>$12B Scam Market Tudou Guarantee Shuts Down</u></a> (GovInfo Security)</p>
<p><a href="https://theconversation.com/research-reveals-a-surprising-line-of-defence-against-cyber-attacks-accountants-272428"><u>Research reveals a surprising line of defence against cyber attacks: accountants</u></a> (The Conversation)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1622</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dcda0092-1c7a-11f0-85e0-1bf1472b8db8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1425621425.mp3?updated=1769025887" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Million-dollar hacks and a manhunt.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2471/notes</link>
      <description>Authorities pursue Black Basta. British authorities launch a new national service to fight fraud and cybercrime. LinkedIn private messages get infected with RATs. Researchers uncover a new malicious extension that intentionally crashes the browser. Ingram Micro discloses a ransomware-related data breach. A Jordanian man pleads guilty to selling stolen access to corporate networks. Business Breakdown. Tim Starks from CyberScoop discusses Sean Plankey's renomination to lead CISA.  Grave oversight in the funeral biz. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Tim Starks from CyberScoop as he is discussing Sean Plankey's renomination to lead CISA. You can use Tim’s take on it here.  

Selected Reading

Police raid homes of alleged Black Basta hackers, hunt suspected Russian ringleader (The Record)

UK launches landmark 'Report Fraud' service to tackle cybercrime and fraud (The Record)

Linkedin Phishing Campaign Exploits Open-Source Pen Testing Tool to Compromise Business Execs (Infosecurity Magazine)

Fake ad blocker extension crashes the browser for ClickFix attacks (Bleeping Computer)

Ingram Micro reveals ransomware attack hit 42,000 people - here's how to find out more (TechRadar)

Jordanian Man Pleads Fake ad blocker extension crashes the browser for ClickFix attacksGuilty to Selling Stolen Logins for 50 Companies (Hackread)

CrowdStrike agrees to acquire SGNL for $740 million and Seraphic for $420 million. (N2K Pro)

Exclusive: Funeral Industry Faces Security Gaps as Top Firms Lack Key Certifications (The Chosun Daily)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Jan 2026 21:30:00 -0000</pubDate>
      <itunes:title>Million-dollar hacks and a manhunt.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2471</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Authorities pursue Black Basta. British authorities launch a new national service to fight fraud and cybercrime. LinkedIn private messages get infected with RATs. Researchers uncover a new malicious extension that intentionally crashes the browser. Ingram Micro discloses a ransomware-related data breach. A Jordanian man pleads guilty to selling stolen access to corporate networks. Business Breakdown. Tim Starks from CyberScoop discusses Sean Plankey's renomination to lead CISA.  Grave oversight in the funeral biz. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Tim Starks from CyberScoop as he is discussing Sean Plankey's renomination to lead CISA. You can use Tim’s take on it here.  

Selected Reading

Police raid homes of alleged Black Basta hackers, hunt suspected Russian ringleader (The Record)

UK launches landmark 'Report Fraud' service to tackle cybercrime and fraud (The Record)

Linkedin Phishing Campaign Exploits Open-Source Pen Testing Tool to Compromise Business Execs (Infosecurity Magazine)

Fake ad blocker extension crashes the browser for ClickFix attacks (Bleeping Computer)

Ingram Micro reveals ransomware attack hit 42,000 people - here's how to find out more (TechRadar)

Jordanian Man Pleads Fake ad blocker extension crashes the browser for ClickFix attacksGuilty to Selling Stolen Logins for 50 Companies (Hackread)

CrowdStrike agrees to acquire SGNL for $740 million and Seraphic for $420 million. (N2K Pro)

Exclusive: Funeral Industry Faces Security Gaps as Top Firms Lack Key Certifications (The Chosun Daily)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Authorities pursue Black Basta. British authorities launch a new national service to fight fraud and cybercrime. LinkedIn private messages get infected with RATs. Researchers uncover a new malicious extension that intentionally crashes the browser. Ingram Micro discloses a ransomware-related data breach. A Jordanian man pleads guilty to selling stolen access to corporate networks. Business Breakdown. Tim Starks from CyberScoop discusses Sean Plankey's renomination to lead CISA.  Grave oversight in the funeral biz. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/tstarks/"><u>Tim Starks</u></a> from <a href="https://www.linkedin.com/company/cyberscoop/"><u>CyberScoop</u></a> as he is discussing Sean Plankey's renomination to lead CISA. You can use Tim’s take on it <a href="https://cyberscoop.com/sean-plankey-re-nominated-to-lead-cisa/"><u>here</u></a>. <em> </em></p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/police-raid-homes-of-alleged-black-basta-hackers?ref=metacurity.com"><u>Police raid homes of alleged Black Basta hackers, hunt suspected Russian ringleader</u></a> (The Record)</p>
<p><a href="https://therecord.media/uk-report-fraud-platform-launch-police-cybercrime"><u>UK launches landmark 'Report Fraud' service to tackle cybercrime and fraud</u></a> (The Record)</p>
<p><a href="https://www.infosecurity-magazine.com/news/linkedin-phishing-campaign-targets/"><u>Linkedin Phishing Campaign Exploits Open-Source Pen Testing Tool to Compromise Business Execs</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/fake-ad-blocker-extension-crashes-the-browser-for-clickfix-attacks/"><u>Fake ad blocker extension crashes the browser for ClickFix attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.techradar.com/pro/security/ingram-micro-reveals-ransomware-attack-hit-42-000-people-heres-how-to-find-out-more"><u>Ingram Micro reveals ransomware attack hit 42,000 people - here's how to find out more</u></a> (TechRadar)</p>
<p><a href="https://hackread.com/jordanian-man-pleads-guilty-sell-companies-stolen-logins/"><u>Jordanian Man Pleads </u></a><a href="https://www.bleepingcomputer.com/news/security/fake-ad-blocker-extension-crashes-the-browser-for-clickfix-attacks/"><u>Fake ad blocker extension crashes the browser for ClickFix attacks</u></a><a href="https://hackread.com/jordanian-man-pleads-guilty-sell-companies-stolen-logins/"><u>Guilty to Selling Stolen Logins for 50 Companies</u></a> (Hackread)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/8/2"><u>CrowdStrike agrees to acquire SGNL for $740 million and Seraphic for $420 million.</u></a> (N2K Pro)</p>
<p><em></em><a href="https://www.chosun.com/english/industry-en/2026/01/19/RKYJ2UZZYZBBPOLOE5PCMYGTGE"><u>Exclusive: Funeral Industry Faces Security Gaps as Top Firms Lack Key Certifications</u></a> (The Chosun Daily)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1392</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dcb12dc0-1c7a-11f0-85e0-f7cbb2c06079]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5955636918.mp3?updated=1768942667" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Are we a trade or a profession? [CISO Perspectives]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/108/notes</link>
      <description>Please enjoy this encore of CISO Perspectives.

We're sharing a episode from another N2K show we thought you might like. It's the second episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy!

Show Notes: 

Cybersecurity has an identity problem where the industry as a whole is struggling to determine whether it is a trade or a profession. In this episode of CISO Perspectives, host Kim Jones sits down with Larry Whiteside Jr., the Chief Advisory Officer for The CISO Society, to discuss this identity crisis and how the industry as a whole connects to both of these labels. Throughout the conversation, Larry and Kim will discuss the merits and drawbacks of both labels and how cybersecurity does not solely fall into one category or the other.



Want more CISO Perspectives?:

Check out a companion blog post by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Jan 2026 07:00:00 -0000</pubDate>
      <itunes:title>Are we a trade or a profession? [CISO Perspectives]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>108</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/eedd6bb0-1f92-11f0-be78-836ff2ca2321/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of CISO Perspectives.

We're sharing a episode from another N2K show we thought you might like. It's the second episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy!

Show Notes: 

Cybersecurity has an identity problem where the industry as a whole is struggling to determine whether it is a trade or a profession. In this episode of CISO Perspectives, host Kim Jones sits down with Larry Whiteside Jr., the Chief Advisory Officer for The CISO Society, to discuss this identity crisis and how the industry as a whole connects to both of these labels. Throughout the conversation, Larry and Kim will discuss the merits and drawbacks of both labels and how cybersecurity does not solely fall into one category or the other.



Want more CISO Perspectives?:

Check out a companion blog post by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of CISO Perspectives.</p>
<p>We're sharing a episode from another N2K show we thought you might like. It's the second episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy!</p>
<p>Show Notes: </p>
<p>Cybersecurity has an identity problem where the industry as a whole is struggling to determine whether it is a trade or a profession. In this episode of CISO Perspectives, host <a href="https://www.linkedin.com/in/kimjones-cism/">Kim Jones</a> sits down with <a href="https://www.linkedin.com/in/larrywhitesidejr/">Larry Whiteside Jr</a>., the Chief Advisory Officer for The CISO Society, to discuss this identity crisis and how the industry as a whole connects to both of these labels. Throughout the conversation, Larry and Kim will discuss the merits and drawbacks of both labels and how cybersecurity does not solely fall into one category or the other.</p>
<p><br></p>
<p>Want more CISO Perspectives?:</p>
<p>Check out a companion <a href="https://thecyberwire.com//stories/2634f6584cc94b04ac17aed1898724bc/are-we-a-trade-or-a-profession">blog post</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2673</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eedd6bb0-1f92-11f0-be78-836ff2ca2321]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2613866080.mp3?updated=1768340343" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Investing in the security tech market with NightDragon. [T-Minus Space Daily Special Edition]</title>
      <link>https://space.n2k.com/podcasts/t-minus/ds133</link>
      <description>While our team is away from the mic observing the Martin Luther King, Jr. holiday in the United States, we share this thoughtful discussion from our T-Minus Space Daily team. 



Signals Intelligence (SIGINT) is the practice of intercepting and analyzing electronic signals, like phone calls, emails, radar, and telemetry, to gather actionable intelligence for national security, defense, and military operations. It’s primarily conducted by agencies like NSA, but over the last decade many companies in the commercial sector have grown in this vital area of national defense, especially in space. Our guest is Dave DeWalt, CEO of NightDragon, who shared why his firm is investing in tech and space. Dave joins T-Minus Space Daily host Maria Varmazis for this special edition podcast. 

You can connect with Dave on LinkedIn, and learn more about NightDragon on their website.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Be sure to follow T-Minus on LinkedIn and Instagram.



Share your feedback.

What do you think about T-Minus Space Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  



Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.



Want to join us for an interview?

Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.

T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 19 Jan 2026 09:00:00 -0000</pubDate>
      <itunes:title>Investing in the security tech market with NightDragon. [T-Minus Space Daily Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>133</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/065fbcf0-f316-11f0-9b42-67b514f2d672/image/a02e8d762f1b74a50bcc5eb1beea22c1.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Learn more about the companies investing in the security tech market with NightDragon CEO Dave DeWalt.</itunes:subtitle>
      <itunes:summary>While our team is away from the mic observing the Martin Luther King, Jr. holiday in the United States, we share this thoughtful discussion from our T-Minus Space Daily team. 



Signals Intelligence (SIGINT) is the practice of intercepting and analyzing electronic signals, like phone calls, emails, radar, and telemetry, to gather actionable intelligence for national security, defense, and military operations. It’s primarily conducted by agencies like NSA, but over the last decade many companies in the commercial sector have grown in this vital area of national defense, especially in space. Our guest is Dave DeWalt, CEO of NightDragon, who shared why his firm is investing in tech and space. Dave joins T-Minus Space Daily host Maria Varmazis for this special edition podcast. 

You can connect with Dave on LinkedIn, and learn more about NightDragon on their website.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Be sure to follow T-Minus on LinkedIn and Instagram.



Share your feedback.

What do you think about T-Minus Space Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  



Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.



Want to join us for an interview?

Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.

T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While our team is away from the mic observing the Martin Luther King, Jr. holiday in the United States, we share this thoughtful discussion from our T-Minus Space Daily team. </strong></em></p>
<p><br></p>
<p>Signals Intelligence (SIGINT) is the practice of intercepting and analyzing electronic signals, like phone calls, emails, radar, and telemetry, to gather actionable intelligence for national security, defense, and military operations. It’s primarily conducted by agencies like NSA, but over the last decade many companies in the commercial sector have grown in this vital area of national defense, especially in space. Our guest is Dave DeWalt, CEO of NightDragon, who shared why his firm is investing in tech and space. Dave joins T-Minus Space Daily host Maria Varmazis for this special edition podcast. </p>
<p>You can connect with Dave on <a href="https://www.linkedin.com/in/ddewalt/"><u>LinkedIn</u></a>, and learn more about NightDragon on their <a href="https://www.nightdragon.com/"><u>website</u></a>.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Be sure to follow T-Minus on <a href="https://www.linkedin.com/company/n2k-space/"><u>LinkedIn</u></a> and <a href="https://www.instagram.com/n2kspace/"><u>Instagram</u></a>.</p>
<p><br></p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about T-Minus Space Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NJYCN2P"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  </p>
<p><br></p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:space@n2k.com"><u>space@n2k.com</u></a> to request more info.</p>
<p><br></p>
<p><strong>Want to join us for an interview?</strong></p>
<p>Please send your pitch to <a href="mailto:space-editor@n2k.com"><u>space-editor@n2k.com</u></a> and include your name, affiliation, and topic proposal.</p>
<p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1178</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[065fbcf0-f316-11f0-9b42-67b514f2d672]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9373091774.mp3?updated=1768507153" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pentesting at the speed of thought. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/54/notes</link>
      <description>While our team is observing the Martin Luther King, Jr. holiday in the United States, please enjoy this CyberWire-X episode featuring the team from Horizon3.ai. 



In this CyberWire-X episode, Dave Bittner speaks with Horizon3.ai co-founder and CEO Snehal Antani about how continuous autonomous penetration testing is reshaping security resilience. Antani reflects on his journey from CIO to DoD operator, where he learned that the hardest part of security isn’t patching — it’s prioritizing what matters and proving defenses work before attackers do. He explains why vulnerability scans fall short, how “AI hackers” simulate adversary behavior at machine speed, and why organizations must shift from compliance thinking to attacker-centric validation. Antani shares real-world findings, warns of 77-second domain compromise, and predicts a future of AI fighting AI, with humans by exception.

Resources: 


  Whitepaper: NodeZero® for Pentesters and Red Teams


  Whitepaper: Traditional vs. Autonomous: Why NodeZero® is the Future of Cyber Risk Assessments



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 19 Jan 2026 06:00:00 -0000</pubDate>
      <itunes:title>Pentesting at the speed of thought. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>54</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/40dfa73c-f005-11f0-8f6e-8bad0b04a827/image/cca6449db500549f3982c5870b5f89a9.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>While our team is observing the Martin Luther King, Jr. holiday in the United States, please enjoy this CyberWire-X episode featuring the team from Horizon3.ai. 



In this CyberWire-X episode, Dave Bittner speaks with Horizon3.ai co-founder and CEO Snehal Antani about how continuous autonomous penetration testing is reshaping security resilience. Antani reflects on his journey from CIO to DoD operator, where he learned that the hardest part of security isn’t patching — it’s prioritizing what matters and proving defenses work before attackers do. He explains why vulnerability scans fall short, how “AI hackers” simulate adversary behavior at machine speed, and why organizations must shift from compliance thinking to attacker-centric validation. Antani shares real-world findings, warns of 77-second domain compromise, and predicts a future of AI fighting AI, with humans by exception.

Resources: 


  Whitepaper: NodeZero® for Pentesters and Red Teams


  Whitepaper: Traditional vs. Autonomous: Why NodeZero® is the Future of Cyber Risk Assessments



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While our team is observing the Martin Luther King, Jr. holiday in the United States, please enjoy this CyberWire-X episode featuring the team from Horizon3.ai. </strong></em></p>
<p><br></p>
<p>In this CyberWire-X episode, Dave Bittner speaks with <a href="https://horizon3.ai/">Horizon3.ai</a> co-founder and CEO <a href="https://www.linkedin.com/in/snehalantani/">Snehal Antani</a> about how continuous autonomous penetration testing is reshaping security resilience. Antani reflects on his journey from CIO to DoD operator, where he learned that the hardest part of security isn’t patching — it’s prioritizing what matters and proving defenses work before attackers do. He explains why vulnerability scans fall short, how “AI hackers” simulate adversary behavior at machine speed, and why organizations must shift from compliance thinking to attacker-centric validation. Antani shares real-world findings, warns of 77-second domain compromise, and predicts a future of AI fighting AI, with humans by exception.</p>
<p><strong>Resources: </strong></p>
<ul>
  <li>Whitepaper: <a href="https://horizon3.ai/downloads/whitepapers/nodezero-for-pentesters-and-red-teams/?utm_source=podcast&amp;utm_medium=ppc&amp;utm_campaign=n2k-cyberwiredaily">NodeZero® for Pentesters and Red Teams</a>
</li>
  <li>Whitepaper: <a href="https://horizon3.ai/downloads/whitepapers/traditional-vs-autonomous-why-nodezero-is-the-future-of-cyber-risk-assessments/?utm_source=podcast&amp;utm_medium=ppc&amp;utm_campaign=n2k-cyberwiredaily">Traditional vs. Autonomous: Why NodeZero® is the Future of Cyber Risk Assessments</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1450</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[40dfa73c-f005-11f0-8f6e-8bad0b04a827]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4276579813.mp3?updated=1765310065" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Deepen Desai: A doctor in computer viruses. [CISO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/104/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Deepen Desai, Global Chief Information Security Officer at Zscaler, shares his story as a doctor that treats computer viruses. He describes how he got into the security field and his work with Zscaler. He says what it's like learning and growing in this field and shares great advice for people who are up and coming in the field. Deepen describes working with an incredible team and how much joy it brings him to see his team learning and growing beyond their roles working with him. He says he want's to be remembered as a mentor among his colleagues. He says "I still remember my first team that I built, 15 years ago. Most of those guys are leading key technologies at many of the major security vendors, and some of them are still with me." We thank Deepen for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 18 Jan 2026 08:00:00 -0000</pubDate>
      <itunes:title>Deepen Desai: A doctor in computer viruses. [CISO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>104</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/fca09f1a-f30e-11f0-aa55-ab923467d7bb/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Deepen Desai, Global Chief Information Security Officer at Zscaler, shares his story as a doctor that treats computer viruses. He describes how he got into the security field and his work with Zscaler. He says what it's like learning and growing in this field and shares great advice for people who are up and coming in the field. Deepen describes working with an incredible team and how much joy it brings him to see his team learning and growing beyond their roles working with him. He says he want's to be remembered as a mentor among his colleagues. He says "I still remember my first team that I built, 15 years ago. Most of those guys are leading key technologies at many of the major security vendors, and some of them are still with me." We thank Deepen for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Deepen Desai, Global Chief Information Security Officer at Zscaler, shares his story as a doctor that treats computer viruses. He describes how he got into the security field and his work with Zscaler. He says what it's like learning and growing in this field and shares great advice for people who are up and coming in the field. Deepen describes working with an incredible team and how much joy it brings him to see his team learning and growing beyond their roles working with him. He says he want's to be remembered as a mentor among his colleagues. He says "I still remember my first team that I built, 15 years ago. Most of those guys are leading key technologies at many of the major security vendors, and some of them are still with me." We thank Deepen for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>588</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fca09f1a-f30e-11f0-aa55-ab923467d7bb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6580339603.mp3?updated=1735936622" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Picture perfect deception. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/408/notes</link>
      <description>Today we are joined by Ben Folland, Security Operations Analyst from Huntress, discussing their work on "ClickFix Gets Creative: Malware Buried in Images." This analysis covers a ClickFix campaign that uses fake human verification checks and a realistic Windows Update screen to trick users into manually running malicious commands. 

The multi-stage attack chain leverages mshta.exe, PowerShell, and .NET loaders, ultimately delivering infostealers like LummaC2 and Rhadamanthys, with payloads hidden inside PNG images using steganography. While technically sophisticated, the campaign hinges on simple user interaction, underscoring the importance of user awareness and controls around command execution.

The research can be found here:


  ClickFix Gets Creative: Malware Buried in Images


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Jan 2026 08:00:00 -0000</pubDate>
      <itunes:title>Picture perfect deception. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>408</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/e43651aa-f303-11f0-b01a-bbff682af73e/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Today we are joined by Ben Folland, Security Operations Analyst from Huntress, discussing their work on "ClickFix Gets Creative: Malware Buried in Images." This analysis covers a ClickFix campaign that uses fake human verification checks and a realistic Windows Update screen to trick users into manually running malicious commands. 

The multi-stage attack chain leverages mshta.exe, PowerShell, and .NET loaders, ultimately delivering infostealers like LummaC2 and Rhadamanthys, with payloads hidden inside PNG images using steganography. While technically sophisticated, the campaign hinges on simple user interaction, underscoring the importance of user awareness and controls around command execution.

The research can be found here:


  ClickFix Gets Creative: Malware Buried in Images


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we are joined by <a href="https://www.linkedin.com/in/ben-f-309963233/">Ben Folland</a>, Security Operations Analyst from <a href="https://www.linkedin.com/company/huntress-labs/">Huntress</a>, discussing their work on "ClickFix Gets Creative: Malware Buried in Images." This analysis covers a ClickFix campaign that uses fake human verification checks and a realistic Windows Update screen to trick users into manually running malicious commands. </p>
<p>The multi-stage attack chain leverages mshta.exe, PowerShell, and .NET loaders, ultimately delivering infostealers like LummaC2 and Rhadamanthys, with payloads hidden inside PNG images using steganography. While technically sophisticated, the campaign hinges on simple user interaction, underscoring the importance of user awareness and controls around command execution.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.huntress.com/blog/clickfix-malware-buried-in-images">ClickFix Gets Creative: Malware Buried in Images</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1217</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e43651aa-f303-11f0-b01a-bbff682af73e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3971455014.mp3?updated=1768584073" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Who turned out the lights?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2470/notes</link>
      <description>Who turned out the lights in Venezuela? The European Space Agency confirms a series of cyberattacks. Dutch police nab the alleged operator of a notorious malware testing service. The U.S. and allies issue new guidance on OT security. Researchers warn of automated exploitation of a critical Hewlett-Packard Enterprise OneView flaw. TamperedChef cooks up trojanized PDF documents to deliver backdoor malware. A bluetooth vulnerability puts devices at risk. Cisco patches a maximum-severity zero-day exploited since November. Jen Easterly heads up RSAC. Our guest is Zak Kassas from Ohio State University, discussing GPS alternatives. Vintage phones face modern problems.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today Maria Varmazis from T-Minus pace sits down with Zak Kassas from the Ohio State University to discuss the study “Navigating the Arctic Circle with Starlink and OneWeb LEO Satellites”.This conversation is a preview of tomorrow’s Deep Space episode from T-Minus Space Daily. 

Selected Reading

Cyberattack in Venezuela Demonstrated Precision of U.S. Capabilities (The New York Times)

Sensitive European Space Agency Data Leaked to the Dark Web by String of Cyberattacks (IBTimes UK)

Operation Endgame: Dutch Police Arrest Alleged AVCheck Operator (Hackread)

CISA, Allies Sound Alarm on OT Network Exposure (GovInfo Security)

RondoDox botnet exploits critical HPE OneView bug (The Register)

TamperedChef Malvertising Campaign Drops Malware via Fake PDF Manuals (Infosecurity Magazine)

WhisperPair Attack Leaves Millions of Bluetooth Accessories Open to Hijacking (SecurityWeek)

Cisco finally fixes AsyncOS zero-day exploited since November (Bleeping Computer)

Former CISA Director Jen Easterly Appointed CEO of RSAC (SecurityWeek)

iPhone 4 makes comeback — but experts warn of security risks (New York Post)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 16 Jan 2026 21:40:00 -0000</pubDate>
      <itunes:title>Who turned out the lights?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2470</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Who turned out the lights in Venezuela? The European Space Agency confirms a series of cyberattacks. Dutch police nab the alleged operator of a notorious malware testing service. The U.S. and allies issue new guidance on OT security. Researchers warn of automated exploitation of a critical Hewlett-Packard Enterprise OneView flaw. TamperedChef cooks up trojanized PDF documents to deliver backdoor malware. A bluetooth vulnerability puts devices at risk. Cisco patches a maximum-severity zero-day exploited since November. Jen Easterly heads up RSAC. Our guest is Zak Kassas from Ohio State University, discussing GPS alternatives. Vintage phones face modern problems.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today Maria Varmazis from T-Minus pace sits down with Zak Kassas from the Ohio State University to discuss the study “Navigating the Arctic Circle with Starlink and OneWeb LEO Satellites”.This conversation is a preview of tomorrow’s Deep Space episode from T-Minus Space Daily. 

Selected Reading

Cyberattack in Venezuela Demonstrated Precision of U.S. Capabilities (The New York Times)

Sensitive European Space Agency Data Leaked to the Dark Web by String of Cyberattacks (IBTimes UK)

Operation Endgame: Dutch Police Arrest Alleged AVCheck Operator (Hackread)

CISA, Allies Sound Alarm on OT Network Exposure (GovInfo Security)

RondoDox botnet exploits critical HPE OneView bug (The Register)

TamperedChef Malvertising Campaign Drops Malware via Fake PDF Manuals (Infosecurity Magazine)

WhisperPair Attack Leaves Millions of Bluetooth Accessories Open to Hijacking (SecurityWeek)

Cisco finally fixes AsyncOS zero-day exploited since November (Bleeping Computer)

Former CISA Director Jen Easterly Appointed CEO of RSAC (SecurityWeek)

iPhone 4 makes comeback — but experts warn of security risks (New York Post)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Who turned out the lights in Venezuela? The European Space Agency confirms a series of cyberattacks. Dutch police nab the alleged operator of a notorious malware testing service. The U.S. and allies issue new guidance on OT security. Researchers warn of automated exploitation of a critical Hewlett-Packard Enterprise OneView flaw. TamperedChef cooks up trojanized PDF documents to deliver backdoor malware. A bluetooth vulnerability puts devices at risk. Cisco patches a maximum-severity zero-day exploited since November. Jen Easterly heads up RSAC. Our guest is Zak Kassas from Ohio State University, discussing GPS alternatives. Vintage phones face modern problems.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today <a href="https://www.linkedin.com/in/varmazis/"><u>Maria Varmazis</u></a> from <a href="https://www.linkedin.com/company/n2k-space/"><u>T-Minus</u></a> pace sits down with <a href="https://www.linkedin.com/in/zakkassas/"><u>Zak Kassas</u></a> from the <a href="https://www.linkedin.com/school/the-ohio-state-university/"><u>Ohio State University</u></a> to discuss the study “<a href="https://people.engineering.osu.edu/media/document/2025-09-29/kassas_navigating_the_arctic_circle_with_starlink_and_oneweb_leo_satellites.pdf"><u>Navigating the Arctic Circle with Starlink and OneWeb LEO Satellites</u></a>”.This conversation is a preview of tomorrow’s Deep Space episode from T-Minus Space Daily. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.nytimes.com/2026/01/15/us/politics/cyberattack-venezuela-military.html"><u>Cyberattack in Venezuela Demonstrated Precision of U.S. Capabilities</u></a> (The New York Times)</p>
<p><a href="https://www.ibtimes.co.uk/sensitive-european-space-agency-data-leaked-dark-web-string-cyberattacks-1771303"><u>Sensitive European Space Agency Data Leaked to the Dark Web by String of Cyberattacks</u></a> (IBTimes UK)</p>
<p><a href="https://hackread.com/operation-endgame-dutch-police-arrest-avcheck-operator/"><u>Operation Endgame: Dutch Police Arrest Alleged AVCheck Operator</u></a> (Hackread)</p>
<p><a href="https://www.govinfosecurity.com/cisa-allies-sound-alarm-on-ot-network-exposure-a-30534"><u>CISA, Allies Sound Alarm on OT Network Exposure</u></a> (GovInfo Security)</p>
<p><a href="https://www.theregister.com/2026/01/16/rondodox_botnet_hpe_oneview/"><u>RondoDox botnet exploits critical HPE OneView bug</u></a> (The Register)</p>
<p><a href="https://www.infosecurity-magazine.com/news/tamperedchef-malvertising-fake-pdf/"><u>TamperedChef Malvertising Campaign Drops Malware via Fake PDF Manuals</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.securityweek.com/whisperpair-attack-leaves-millions-of-bluetooth-accessories-open-to-hijacking/"><u>WhisperPair Attack Leaves Millions of Bluetooth Accessories Open to Hijacking</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisco-finally-fixes-asyncos-zero-day-exploited-since-november/"><u>Cisco finally fixes AsyncOS zero-day exploited since November</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/former-cisa-director-jen-easterly-appointed-ceo-of-rsac/"><u>Former CISA Director Jen Easterly Appointed CEO of RSAC</u></a> (SecurityWeek)</p>
<p><a href="https://nypost.com/2026/01/15/tech/iphone-4-makes-comeback-but-experts-warn-of-security-risks/"><u>iPhone 4 makes comeback — but experts warn of security risks</u></a> (New York Post)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1834</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dc5f758e-1c7a-11f0-85e0-7f6ca8da45ca]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6995892248.mp3?updated=1768599334" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A long day without bars.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2469/notes</link>
      <description>Verizon hit by a major wireless outage. Poland blocks an attack on its power grid. A massive database of French citizens exposed. Microsoft shuts down a cybercrime-as-a-service operation. The UK backs away from digital ID plans. California probes Grok deepfakes. The FTC settles with GM over location data. Palo Alto Networks patches a serious firewall flaw. Plus, John Serafini of HawkEye on modern signals intelligence, and federal agents seize devices from a Washington Post reporter.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today Maria Varmazis sits down with John Serafini, Founder and CEO of Hawkeye 360, on T-Minus to discuss commercial signals intelligence, advanced RF signal processing, and Hawkeye 360’s recent acquisition of Innovative Signal Analysis alongside its Series E funding. To hear the full conversation, check out the episode on T-Minus.

Selected Reading

Verizon Says Service Restored After Thousands Affected by Outage (Bloomberg)

Poland says it repelled major cyberattack on power grid, blames Russia (The Record)

Massive breach leaks 45 million French records: demographic, healthcare, and financial data all leaked, here's what we know (TechRadar)

Criminal Subscription Service Behind AI-Powered Cyber-Attacks Taken Out By Microsoft (Infosecurity Magazine)

Government drops plans for mandatory digital ID to work in UK (BBC News)

Attorney General Bonta Launches Investigation into xAI, Grok Over Undressed, Sexual AI Images of Women and Children | State of California (Department of Justice)

FTC bans GM from selling drivers' location data for five years (Bleeping Computer)

Palo Alto Networks warns of DoS bug letting hackers disable firewalls (Bleeping Computer)

FBI executes search warrant at Washington Post reporter’s home (Washington Post)

US cargo tech company publicly exposed its shipping systems and customer data to the web (TechCrunch)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 15 Jan 2026 21:10:00 -0000</pubDate>
      <itunes:title>A long day without bars.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2469</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Verizon hit by a major wireless outage. Poland blocks an attack on its power grid. A massive database of French citizens exposed. Microsoft shuts down a cybercrime-as-a-service operation. The UK backs away from digital ID plans. California probes Grok deepfakes. The FTC settles with GM over location data. Palo Alto Networks patches a serious firewall flaw. Plus, John Serafini of HawkEye on modern signals intelligence, and federal agents seize devices from a Washington Post reporter.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today Maria Varmazis sits down with John Serafini, Founder and CEO of Hawkeye 360, on T-Minus to discuss commercial signals intelligence, advanced RF signal processing, and Hawkeye 360’s recent acquisition of Innovative Signal Analysis alongside its Series E funding. To hear the full conversation, check out the episode on T-Minus.

Selected Reading

Verizon Says Service Restored After Thousands Affected by Outage (Bloomberg)

Poland says it repelled major cyberattack on power grid, blames Russia (The Record)

Massive breach leaks 45 million French records: demographic, healthcare, and financial data all leaked, here's what we know (TechRadar)

Criminal Subscription Service Behind AI-Powered Cyber-Attacks Taken Out By Microsoft (Infosecurity Magazine)

Government drops plans for mandatory digital ID to work in UK (BBC News)

Attorney General Bonta Launches Investigation into xAI, Grok Over Undressed, Sexual AI Images of Women and Children | State of California (Department of Justice)

FTC bans GM from selling drivers' location data for five years (Bleeping Computer)

Palo Alto Networks warns of DoS bug letting hackers disable firewalls (Bleeping Computer)

FBI executes search warrant at Washington Post reporter’s home (Washington Post)

US cargo tech company publicly exposed its shipping systems and customer data to the web (TechCrunch)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Verizon hit by a major wireless outage. Poland blocks an attack on its power grid. A massive database of French citizens exposed. Microsoft shuts down a cybercrime-as-a-service operation. The UK backs away from digital ID plans. California probes Grok deepfakes. The FTC settles with GM over location data. Palo Alto Networks patches a serious firewall flaw. Plus, John Serafini of HawkEye on modern signals intelligence, and federal agents seize devices from a Washington Post reporter.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today <a href="https://www.linkedin.com/in/varmazis/"><u>Maria Varmazis</u></a> sits down with <a href="https://www.linkedin.com/in/john-serafini-950793a/"><u>John Serafini</u></a>, Founder and CEO of <a href="https://www.he360.com/"><u>Hawkeye 360</u></a>, on T-Minus to discuss commercial signals intelligence, advanced RF signal processing, and Hawkeye 360’s recent acquisition of Innovative Signal Analysis alongside its Series E funding. To hear the full conversation, check out the <a href="https://space.n2k.com/podcasts/t-minus/677"><u>episode</u></a> on <a href="https://space.n2k.com/podcasts/t-minus"><u>T-Minus</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bloomberg.com/news/articles/2026-01-14/verizon-users-report-service-outage-affecting-176-000-customers"><u>Verizon Says Service Restored After Thousands Affected by Outage</u></a> (Bloomberg)</p>
<p><a href="https://therecord.media/poland-cyberattack-grid-russia"><u>Poland says it repelled major cyberattack on power grid, blames Russia</u></a> (The Record)</p>
<p><a href="https://www.techradar.com/pro/security/massive-breach-leaks-45-million-french-records-demographic-healthcare-and-financial-data-all-leaked-heres-what-we-know"><u>Massive breach leaks 45 million French records: demographic, healthcare, and financial data all leaked, here's what we know</u></a> (TechRadar)</p>
<p><a href="https://www.infosecurity-magazine.com/news/criminal-subscription-service/"><u>Criminal Subscription Service Behind AI-Powered Cyber-Attacks Taken Out By Microsoft</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.bbc.com/news/articles/c3385zrrx73o"><u>Government drops plans for mandatory digital ID to work in UK</u></a> (BBC News)</p>
<p><a href="https://oag.ca.gov/news/press-releases/attorney-general-bonta-launches-investigation-xai-grok-over-undressed-sexual-ai"><u>Attorney General Bonta Launches Investigation into xAI, Grok Over Undressed, Sexual AI Images of Women and Children | State of California</u></a> (Department of Justice)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/ftc-bans-general-motors-from-selling-drivers-location-data-for-five-years/"><u>FTC bans GM from selling drivers' location data for five years</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/palo-alto-networks-warns-of-dos-bug-letting-hackers-disable-firewalls/"><u>Palo Alto Networks warns of DoS bug letting hackers disable firewalls</u></a> (Bleeping Computer)</p>
<p><a href="https://www.washingtonpost.com/national-security/2026/01/14/washington-post-reporter-search/"><u>FBI executes search warrant at Washington Post reporter’s home</u></a> (Washington Post)</p>
<p><a href="https://techcrunch.com/2026/01/14/us-cargo-tech-company-publicly-exposed-its-shipping-systems-and-customer-data-to-the-web/"><u>US cargo tech company publicly exposed its shipping systems and customer data to the web</u></a> (TechCrunch)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1866</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dc36c94a-1c7a-11f0-85e0-5fd47e392d6e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6492589766.mp3?updated=1768504855" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CVEs don’t sleep.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2468/notes</link>
      <description>Patch Tuesday fallout, China sidelines Western security vendors, and a critical flaw puts industrial switches at risk of remote takeover. A ransomware attack disrupts a Belgian hospital, crypto scams hit investment clients, and Eurail discloses a data breach. Analysts press Congress to go on offense in cyberspace, and Sean Plankey gets another shot at leading CISA. In our Threat Vector segment, David Moulton sits down with Ian Swanson, AI Security Leader at Palo Alto Networks about supply chain security. And, an AI risk assessment cites a football match that never happened.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment

AI security is no longer optional, it’s urgent. In this segment of Threat Vector, David Moulton sits down with Ian Swanson, former CEO of Protect AI and now the AI Security Leader at Palo Alto Networks. Ian shares how securing the AI supply chain has become the next frontier in cybersecurity and why every enterprise building or integrating AI needs to treat it like any other software pipeline—rife with dependencies, blind spots, and adversaries ready to exploit them. You can catch the full conversation here and listen to new episodes of Threat Vector every Thursday on your favorite podcast app. 

Selected Reading

Patch Tuesday, January 2026 Edition (Krebs on Security)

Adobe Patches Critical Apache Tika Bug in ColdFusion (SecurityWeek)

Chrome 144, Firefox 147 Patch High-Severity Vulnerabilities (SecurityWeek)

Fortinet Patches Critical Vulnerabilities in FortiFone, FortiSIEM (SecurityWeek)

Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software, sources say (Reuters)

Critical OpenSSH flaw exposes Moxa industrial switches to remote takeover (Beyond Machines)

Cyberattack forces Belgian hospital to transfer critical care patients (The Record)

Betterment confirms data breach after wave of crypto scam emails (Bleeping Computer)

Passports, bank details compromised in Eurail data breach (The Register)

Lawmakers Urged to Let US Take on 'Offensive' Cyber Role (Bank InfoSecurity)

Sean Plankey re-nominated to lead CISA (CyberScoop)

Police chief admits misleading MPs after AI used in justification for banning Maccabi Tel Aviv fans (BBC News)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 14 Jan 2026 21:10:00 -0000</pubDate>
      <itunes:title>CVEs don’t sleep.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2468</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Patch Tuesday fallout, China sidelines Western security vendors, and a critical flaw puts industrial switches at risk of remote takeover. A ransomware attack disrupts a Belgian hospital, crypto scams hit investment clients, and Eurail discloses a data breach. Analysts press Congress to go on offense in cyberspace, and Sean Plankey gets another shot at leading CISA. In our Threat Vector segment, David Moulton sits down with Ian Swanson, AI Security Leader at Palo Alto Networks about supply chain security. And, an AI risk assessment cites a football match that never happened.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment

AI security is no longer optional, it’s urgent. In this segment of Threat Vector, David Moulton sits down with Ian Swanson, former CEO of Protect AI and now the AI Security Leader at Palo Alto Networks. Ian shares how securing the AI supply chain has become the next frontier in cybersecurity and why every enterprise building or integrating AI needs to treat it like any other software pipeline—rife with dependencies, blind spots, and adversaries ready to exploit them. You can catch the full conversation here and listen to new episodes of Threat Vector every Thursday on your favorite podcast app. 

Selected Reading

Patch Tuesday, January 2026 Edition (Krebs on Security)

Adobe Patches Critical Apache Tika Bug in ColdFusion (SecurityWeek)

Chrome 144, Firefox 147 Patch High-Severity Vulnerabilities (SecurityWeek)

Fortinet Patches Critical Vulnerabilities in FortiFone, FortiSIEM (SecurityWeek)

Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software, sources say (Reuters)

Critical OpenSSH flaw exposes Moxa industrial switches to remote takeover (Beyond Machines)

Cyberattack forces Belgian hospital to transfer critical care patients (The Record)

Betterment confirms data breach after wave of crypto scam emails (Bleeping Computer)

Passports, bank details compromised in Eurail data breach (The Register)

Lawmakers Urged to Let US Take on 'Offensive' Cyber Role (Bank InfoSecurity)

Sean Plankey re-nominated to lead CISA (CyberScoop)

Police chief admits misleading MPs after AI used in justification for banning Maccabi Tel Aviv fans (BBC News)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Patch Tuesday fallout, China sidelines Western security vendors, and a critical flaw puts industrial switches at risk of remote takeover. A ransomware attack disrupts a Belgian hospital, crypto scams hit investment clients, and Eurail discloses a data breach. Analysts press Congress to go on offense in cyberspace, and Sean Plankey gets another shot at leading CISA. In our Threat Vector segment, David Moulton sits down with Ian Swanson, AI Security Leader at Palo Alto Networks about supply chain security. And, an AI risk assessment cites a football match that never happened.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Threat Vector Segment</strong></p>
<p>AI security is no longer optional, it’s urgent. In this segment of Threat Vector,<a href="https://www.linkedin.com/in/davidrmoulton/"><u> David Moulton</u></a> sits down with<a href="https://www.linkedin.com/in/ianswanson"><u> Ian Swanson</u></a>, former CEO of Protect AI and now the AI Security Leader at Palo Alto Networks. Ian shares how securing the AI supply chain has become the next frontier in cybersecurity and why every enterprise building or integrating AI needs to treat it like any other software pipeline—rife with dependencies, blind spots, and adversaries ready to exploit them. You can catch the full conversation <a href="https://www.thecyberwire.com/podcasts/threat-vector/99/notes"><u>here</u></a> and listen to new episodes of <a href="https://www.thecyberwire.com/podcasts/threat-vector"><u>Threat Vector</u></a> every Thursday on your favorite podcast app. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://krebsonsecurity.com/2026/01/patch-tuesday-january-2026-edition/"><u>Patch Tuesday, January 2026 Edition</u></a> (Krebs on Security)</p>
<p><a href="https://www.securityweek.com/adobe-patches-critical-apache-tika-bug-in-coldfusion/"><u>Adobe Patches Critical Apache Tika Bug in ColdFusion</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/chrome-144-firefox-147-patch-high-severity-vulnerabilities/"><u>Chrome 144, Firefox 147 Patch High-Severity Vulnerabilities</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/fortinet-patches-critical-vulnerabilities-in-fortifone-fortisiem/"><u>Fortinet Patches Critical Vulnerabilities in FortiFone, FortiSIEM</u></a> (SecurityWeek)</p>
<p><a href="https://www.reuters.com/world/china/beijing-tells-chinese-firms-stop-using-us-israeli-cybersecurity-software-sources-2026-01-14/"><u>Exclusive: Beijing tells Chinese firms to stop using US and Israeli cybersecurity software, sources say</u></a> (Reuters)</p>
<p><a href="https://beyondmachines.net/event_details/critical-openssh-flaw-exposes-moxa-industrial-switches-to-remote-takeover-f-u-h-q-u/gD2P6Ple2L"><u>Critical OpenSSH flaw exposes Moxa industrial switches to remote takeover</u></a> (Beyond Machines)</p>
<p><a href="https://therecord.media/belgium-hospital-cyberattack-antwerp-az-monica"><u>Cyberattack forces Belgian hospital to transfer critical care patients</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/betterment-confirms-data-breach-after-wave-of-crypto-scam-emails/"><u>Betterment confirms data breach after wave of crypto scam emails</u></a> (Bleeping Computer)</p>
<p><a href="https://www.theregister.com/2026/01/14/eurail_breach/"><u>Passports, bank details compromised in Eurail data breach</u></a> (The Register)</p>
<p><a href="https://www.bankinfosecurity.com/lawmakers-urged-to-let-us-take-on-offensive-cyber-role-a-30511"><u>Lawmakers Urged to Let US Take on 'Offensive' Cyber Role</u></a> (Bank InfoSecurity)</p>
<p><a href="https://cyberscoop.com/sean-plankey-re-nominated-to-lead-cisa/"><u>Sean Plankey re-nominated to lead CISA</u></a> (CyberScoop)</p>
<p><a href="https://www.bbc.com/news/live/c394zlr8e12t"><u>Police chief admits misleading MPs after AI used in justification for banning Maccabi Tel Aviv fans</u></a> (BBC News)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1409</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dc0dd170-1c7a-11f0-85e0-ebb2e353e141]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9464259414.mp3?updated=1768419377" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Source code in the wild aisle.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2467/notes</link>
      <description>Stolen Target source code looks real. CISA pulls the plug on Gogs. SAP rushes patches for critical flaws. A suspected Russian spy emerges in Sweden, while Cloudflare threatens to walk away from Italy. Researchers flag a Wi-Fi chipset bug, a long-running Magecart skimming campaign, and a surge in browser-in-the-browser phishing against Facebook users. Mandiant releases a new Salesforce defense tool, and NIST asks how to secure agentic AI before it secures itself. Our guests are Christine Blake and Madison Farabaugh from Inside the Media Minds. Plus, a Dutch court says seven years is still the going rate for a USB-powered cocaine plot.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Christine Blake and Madison Farabaugh from W2 Communications and hosts of Inside the Media Minds podcast on their show joining the N2K CyberWire network. You can listen to the latest episode of Inside the Media Minds today and catch new installments every month on your favorite podcast app.

Selected Reading

Target employees confirm leaked code after ‘accelerated’ Git lockdown (Bleeping Computer)

Fed agencies urged to ditch Gogs as zero-day makes CISA list (The Register)

SAP's January 2026 Security Updates Patch Critical Vulnerabilities (SecurityWeek)

Sweden detains ex-military IT consultant suspected of spying for Russia (The Record)

Cloudflare CEO threatens to pull out of Italy  (The Register)

One Simple Trick to Knock Out the Wi-Fi Network (GovInfo Security)

Google's Mandiant releases free Salesforce access control checker (iTnews)

Global Magecart Campaign Targets Six Card Networks (Infosecurity Magazine)

Facebook login thieves now using browser-in-browser trick (Bleeping Computer)

NIST Calls for Public to Help Better Secure AI Agents (GovInfo Security)

Appeal fails for hacker who opened port to coke smugglers (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Jan 2026 21:10:00 -0000</pubDate>
      <itunes:title>Source code in the wild aisle.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2467</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Stolen Target source code looks real. CISA pulls the plug on Gogs. SAP rushes patches for critical flaws. A suspected Russian spy emerges in Sweden, while Cloudflare threatens to walk away from Italy. Researchers flag a Wi-Fi chipset bug, a long-running Magecart skimming campaign, and a surge in browser-in-the-browser phishing against Facebook users. Mandiant releases a new Salesforce defense tool, and NIST asks how to secure agentic AI before it secures itself. Our guests are Christine Blake and Madison Farabaugh from Inside the Media Minds. Plus, a Dutch court says seven years is still the going rate for a USB-powered cocaine plot.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Christine Blake and Madison Farabaugh from W2 Communications and hosts of Inside the Media Minds podcast on their show joining the N2K CyberWire network. You can listen to the latest episode of Inside the Media Minds today and catch new installments every month on your favorite podcast app.

Selected Reading

Target employees confirm leaked code after ‘accelerated’ Git lockdown (Bleeping Computer)

Fed agencies urged to ditch Gogs as zero-day makes CISA list (The Register)

SAP's January 2026 Security Updates Patch Critical Vulnerabilities (SecurityWeek)

Sweden detains ex-military IT consultant suspected of spying for Russia (The Record)

Cloudflare CEO threatens to pull out of Italy  (The Register)

One Simple Trick to Knock Out the Wi-Fi Network (GovInfo Security)

Google's Mandiant releases free Salesforce access control checker (iTnews)

Global Magecart Campaign Targets Six Card Networks (Infosecurity Magazine)

Facebook login thieves now using browser-in-browser trick (Bleeping Computer)

NIST Calls for Public to Help Better Secure AI Agents (GovInfo Security)

Appeal fails for hacker who opened port to coke smugglers (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Stolen Target source code looks real. CISA pulls the plug on Gogs. SAP rushes patches for critical flaws. A suspected Russian spy emerges in Sweden, while Cloudflare threatens to walk away from Italy. Researchers flag a Wi-Fi chipset bug, a long-running Magecart skimming campaign, and a surge in browser-in-the-browser phishing against Facebook users. Mandiant releases a new Salesforce defense tool, and NIST asks how to secure agentic AI before it secures itself. Our guests are Christine Blake and Madison Farabaugh from Inside the Media Minds. Plus, a Dutch court says seven years is still the going rate for a USB-powered cocaine plot.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/christine-blake-b8111918/"><u>Christine Blake</u></a> and <a href="https://www.linkedin.com/in/madison-farabaugh-a76885197/"><u>Madison Farabaugh</u></a> from <a href="https://w2comm.com/"><u>W2 Communications</u></a> and hosts of <a href="https://www.thecyberwire.com/podcasts/inside-the-media-minds"><u>Inside the Media Minds</u></a> podcast on their show joining the <a href="https://www.thecyberwire.com/podcasts"><u>N2K CyberWire network</u></a>. You can listen to the latest episode of Inside the Media Minds today and catch new installments every month on your favorite podcast app.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/target-employees-confirm-leaked-code-after-accelerated-git-lockdown/"><u>Target employees confirm leaked code after ‘accelerated’ Git lockdown</u></a> (Bleeping Computer)</p>
<p><a href="https://www.theregister.com/2026/01/13/cisa_gogs_exploit/"><u>Fed agencies urged to ditch Gogs as zero-day makes CISA list</u></a> (The Register)</p>
<p><a href="https://www.securityweek.com/saps-january-2026-security-updates-patch-critical-vulnerabilities/"><u>SAP's January 2026 Security Updates Patch Critical Vulnerabilities</u></a> (SecurityWeek)</p>
<p><a href="https://therecord.media/sweden-detains-it-consultant-russia"><u>Sweden detains ex-military IT consultant suspected of spying for Russia</u></a> (The Record)</p>
<p><a href="https://www.theregister.com/2026/01/12/cloudflare_vs_italy/"><u>Cloudflare CEO threatens to pull out of Italy </u></a> (The Register)</p>
<p><a href="https://www.govinfosecurity.com/one-simple-trick-to-knock-out-wi-fi-network-a-30502"><u>One Simple Trick to Knock Out the Wi-Fi Network</u></a> (GovInfo Security)</p>
<p><a href="https://www.itnews.com.au/news/googles-mandiant-releases-free-salesforce-access-control-checker-622933"><u>Google's Mandiant releases free Salesforce access control checker</u></a> (iTnews)</p>
<p><a href="https://www.infosecurity-magazine.com/news/global-magecart-campaign-six-card/"><u>Global Magecart Campaign Targets Six Card Networks</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/facebook-login-thieves-now-using-browser-in-browser-trick/"><u>Facebook login thieves now using browser-in-browser trick</u></a> (Bleeping Computer)</p>
<p><a href="https://www.govinfosecurity.com/nist-calls-for-public-to-help-better-secure-ai-agents-a-30500"><u>NIST Calls for Public to Help Better Secure AI Agents</u></a> (GovInfo Security)</p>
<p><a href="https://www.theregister.com/2026/01/13/dutch_port_hacker_appeal/"><u>Appeal fails for hacker who opened port to coke smugglers</u></a> (The Register)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1468</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dbe2f64e-1c7a-11f0-85e0-5f27ca7fb7ef]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4670241071.mp3?updated=1768332382" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Is the cyber talent ecosystem broken? [CISO Perspectives]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/107/notes</link>
      <description>Please enjoy this encore of CISO Perspectives

We're sharing an episode from another N2K show we thought you might like. It's the first episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy!



Show Notes: 

The cyber talent ecosystem faces severe indigestion, which has stifled growth and closed doors to new talent. In this episode of CISO Perspectives, host Kim Jones sits down with Ed Adams, the Head of Cybersecurity for North America at the Bureau Veritas Group, to discuss what has caused this indigestion and how leadership can better address these challenges. A key aspect of this conversation revolved around discussing Ed's book, See Yourself in Cyber: Security Careers Beyond Hacking, and how he expands the conversation surrounding traditional roles associated with cybersecurity.



Want more CISO Perspectives?:

Check out a companion blog post by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Jan 2026 19:00:00 -0000</pubDate>
      <itunes:title>Is the cyber talent ecosystem broken? [CISO Perspectives]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>16</itunes:season>
      <itunes:episode>107</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bb0954ea-1bb2-11f0-88f0-ff396191dd08/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of CISO Perspectives

We're sharing an episode from another N2K show we thought you might like. It's the first episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy!



Show Notes: 

The cyber talent ecosystem faces severe indigestion, which has stifled growth and closed doors to new talent. In this episode of CISO Perspectives, host Kim Jones sits down with Ed Adams, the Head of Cybersecurity for North America at the Bureau Veritas Group, to discuss what has caused this indigestion and how leadership can better address these challenges. A key aspect of this conversation revolved around discussing Ed's book, See Yourself in Cyber: Security Careers Beyond Hacking, and how he expands the conversation surrounding traditional roles associated with cybersecurity.



Want more CISO Perspectives?:

Check out a companion blog post by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of CISO Perspectives</p>
<p>We're sharing an episode from another N2K show we thought you might like. It's the first episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy!</p>
<p><br></p>
<p>Show Notes: </p>
<p>The cyber talent ecosystem faces severe indigestion, which has stifled growth and closed doors to new talent. In this episode of CISO Perspectives, host <a href="https://www.linkedin.com/in/kimjones-cism/">Kim Jones</a> sits down with <a href="https://www.linkedin.com/in/edadamsboston/">Ed Adams</a>, the Head of Cybersecurity for North America at the <a href="https://www.linkedin.com/company/bureau-veritas-group/">Bureau Veritas Group</a>, to discuss what has caused this indigestion and how leadership can better address these challenges. A key aspect of this conversation revolved around discussing Ed's <a href="https://www.amazon.com/See-Yourself-Cyber-Security-Careers/dp/1394225598">book</a>, See Yourself in Cyber: Security Careers Beyond Hacking, and how he expands the conversation surrounding traditional roles associated with cybersecurity.</p>
<p><br></p>
<p>Want more CISO Perspectives?:</p>
<p>Check out a companion <a href="https://thecyberwire.com/stories/b7fbcf94e07e48b08bfd6ecf881df1f8/ciso-perspectives-episode-1-is-the-cyber-talent-ecosystem-broken">blog post</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode. It’s the perfect follow-up if you’re curious about the cyber talent crunch and how we can reshape the ecosystem for future professionals.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2436</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bb0954ea-1bb2-11f0-88f0-ff396191dd08]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7646305468.mp3?updated=1768339742" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A picture worth a thousand breaches.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2466/notes</link>
      <description>The FBI warns of Kimsuky quishing. Singapore warns of a critical vulnerability in Advantech IoT management platforms. Russia’s Fancy Bear targets energy research, defense collaboration, and government communications. Malaysia and Indonesia suspend access to X. Researchers warn a large-scale fraud operation is using AI-generated personas to trap mobile users in a social engineering scam. BreachForums gets breached. The NSA names a new Deputy Director. Monday Biz Brief. Our guest is Sasha Ingber, host of the International Spy Museum's SpyCast podcast. The commuter who hacked his scooter. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Sasha Ingber, host of the International Spy Museum's SpyCast podcast, on the return of SpyCast to the N2K CyberWire network.

Selected Reading

North Korea–linked APT Kimsuky behind quishing attacks, FBI warns (Security Affairs) 

Advantech patches maximum-severity SQL injection flaw in IoT products (Beyond Machines)

Russia's APT28 Targeting Energy Research, Defense Collaboration Entities (SecurityWeek)

Malaysia and Indonesia block X over deepfake smut (The Register)

New OPCOPRO Scam Uses AI and Fake WhatsApp Groups to Defraud Victim (Hackread)

BreachForums hacking forum database leaked, exposing 324,000 accounts (Bleeping Computer)

Former NSA insider Kosiba brought back as spy agency’s No. 2 (The Record)

Vega raises $120 million in a Series B round led by Accel.

Reverse engineering my cloud-connected e-scooter and finding the master key to unlock all scooters (Rasmus Moorats)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 12 Jan 2026 21:10:00 -0000</pubDate>
      <itunes:title>A picture worth a thousand breaches.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2466</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The FBI warns of Kimsuky quishing. Singapore warns of a critical vulnerability in Advantech IoT management platforms. Russia’s Fancy Bear targets energy research, defense collaboration, and government communications. Malaysia and Indonesia suspend access to X. Researchers warn a large-scale fraud operation is using AI-generated personas to trap mobile users in a social engineering scam. BreachForums gets breached. The NSA names a new Deputy Director. Monday Biz Brief. Our guest is Sasha Ingber, host of the International Spy Museum's SpyCast podcast. The commuter who hacked his scooter. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Sasha Ingber, host of the International Spy Museum's SpyCast podcast, on the return of SpyCast to the N2K CyberWire network.

Selected Reading

North Korea–linked APT Kimsuky behind quishing attacks, FBI warns (Security Affairs) 

Advantech patches maximum-severity SQL injection flaw in IoT products (Beyond Machines)

Russia's APT28 Targeting Energy Research, Defense Collaboration Entities (SecurityWeek)

Malaysia and Indonesia block X over deepfake smut (The Register)

New OPCOPRO Scam Uses AI and Fake WhatsApp Groups to Defraud Victim (Hackread)

BreachForums hacking forum database leaked, exposing 324,000 accounts (Bleeping Computer)

Former NSA insider Kosiba brought back as spy agency’s No. 2 (The Record)

Vega raises $120 million in a Series B round led by Accel.

Reverse engineering my cloud-connected e-scooter and finding the master key to unlock all scooters (Rasmus Moorats)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FBI warns of Kimsuky quishing. Singapore warns of a critical vulnerability in Advantech IoT management platforms. Russia’s Fancy Bear targets energy research, defense collaboration, and government communications. Malaysia and Indonesia suspend access to X. Researchers warn a large-scale fraud operation is using AI-generated personas to trap mobile users in a social engineering scam. BreachForums gets breached. The NSA names a new Deputy Director. Monday Biz Brief. Our guest is Sasha Ingber, host of the International Spy Museum's SpyCast podcast. The commuter who hacked his scooter. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/sashaingber/"><u>Sasha Ingber</u></a>, host of the <a href="https://www.linkedin.com/company/international-spy-museum/"><u>International Spy Museum</u></a>'s <a href="https://www.spymuseum.org/podcast/"><u>SpyCast</u></a> podcast, on the return of SpyCast to the N2K CyberWire network.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://securityaffairs.com/186755/intelligence/north-korea-linked-apt-kimsuky-behind-quishing-attacks-fbi-warns.html"><u>North Korea–linked APT Kimsuky behind quishing attacks, FBI warns</u></a> (Security Affairs) </p>
<p><a href="https://beyondmachines.net/event_details/advantech-patches-maximum-severity-sql-injection-flaw-in-iot-products-n-q-4-8-9/gD2P6Ple2L"><u>Advantech patches maximum-severity SQL injection flaw in IoT products</u></a> (Beyond Machines)</p>
<p><a href="https://www.securityweek.com/russias-apt28-targeting-energy-research-defense-collaboration-entities/"><u>Russia's APT28 Targeting Energy Research, Defense Collaboration Entities</u> (SecurityWeek</a>)</p>
<p><a href="https://www.theregister.com/2026/01/12/asia_tech_news_roundup/"><u>Malaysia and Indonesia block X over deepfake smut</u></a> (The Register)</p>
<p><a href="https://hackread.com/opcopro-scam-ai-fake-whatsapp-groups-fraud/"><u>New OPCOPRO Scam Uses AI and Fake WhatsApp Groups to Defraud Victim</u></a> (Hackread)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/breachforums-hacking-forum-database-leaked-exposing-324-000-accounts/"><u>BreachForums hacking forum database leaked, exposing 324,000 accounts</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/timothy-kosiba-nsa-new-deputy-chief"><u>Former NSA insider Kosiba brought back as spy agency’s No. 2</u></a> (The Record)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/8/1"><u>Vega raises $120 million in a Series B round led by Accel.</u></a></p>
<p><a href="https://blog.nns.ee/2026/01/06/aike-ble/"><u>Reverse engineering my cloud-connected e-scooter and finding the master key to unlock all scooters</u></a> (Rasmus Moorats)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1675</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dbb92c7e-1c7a-11f0-85e0-1bb7e7bcfcf5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3358167015.mp3?updated=1768269330" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Laura Hoffner: Setting your sights high. [Intelligence] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/103/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Laura Hoffner, Executive Vice President at Concentric, shares her story about her time working as a Naval Intelligence Officer and supporting special operations around the globe for 12 years, to now, where she transitioned to the Naval Reserves and joined the Concentric team. Laura has known since she was in the seventh grade that she wanted to work with SEALs and work in intelligence, so she set her goals high and achieved them shortly after graduating college. She credits being a Naval Intelligence Officer to helping her get to where she is today and says how much she is enjoying working with Concentric, saying she's "ultimately just incredibly benefiting from unbelievable mentors at the company itself." We thank Laura for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 11 Jan 2026 08:00:00 -0000</pubDate>
      <itunes:title>Laura Hoffner: Setting your sights high. [Intelligence] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>103</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/55ef184e-ed97-11f0-a63d-7b6effdca3f4/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Laura Hoffner, Executive Vice President at Concentric, shares her story about her time working as a Naval Intelligence Officer and supporting special operations around the globe for 12 years, to now, where she transitioned to the Naval Reserves and joined the Concentric team. Laura has known since she was in the seventh grade that she wanted to work with SEALs and work in intelligence, so she set her goals high and achieved them shortly after graduating college. She credits being a Naval Intelligence Officer to helping her get to where she is today and says how much she is enjoying working with Concentric, saying she's "ultimately just incredibly benefiting from unbelievable mentors at the company itself." We thank Laura for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Laura Hoffner, Executive Vice President at Concentric, shares her story about her time working as a Naval Intelligence Officer and supporting special operations around the globe for 12 years, to now, where she transitioned to the Naval Reserves and joined the Concentric team. Laura has known since she was in the seventh grade that she wanted to work with SEALs and work in intelligence, so she set her goals high and achieved them shortly after graduating college. She credits being a Naval Intelligence Officer to helping her get to where she is today and says how much she is enjoying working with Concentric, saying she's "ultimately just incredibly benefiting from unbelievable mentors at the company itself." We thank Laura for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>592</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[55ef184e-ed97-11f0-a63d-7b6effdca3f4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8207390674.mp3?updated=1735936622" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Walking on EggStremes. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/407/notes</link>
      <description>This week, we are joined by Martin Zugec, Technical Solutions Director from Bitdefender, sharing their work and findings on "EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company." Built for long-term espionage, the campaign uses DLL sideloading, in-memory execution, and abused Windows services to stay stealthy and persistent.

We walk through how the multi-stage framework delivers a powerful backdoor with reconnaissance, lateral movement, data theft, and keylogging capabilities—and what this operation reveals about the evolving tactics defenders need to watch for.

The research can be found here:


  EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Jan 2026 08:00:00 -0000</pubDate>
      <itunes:title>Walking on EggStremes. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>407</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/393febf6-ed97-11f0-bfa1-9715ad6e6efb/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Martin Zugec, Technical Solutions Director from Bitdefender, sharing their work and findings on "EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company." Built for long-term espionage, the campaign uses DLL sideloading, in-memory execution, and abused Windows services to stay stealthy and persistent.

We walk through how the multi-stage framework delivers a powerful backdoor with reconnaissance, lateral movement, data theft, and keylogging capabilities—and what this operation reveals about the evolving tactics defenders need to watch for.

The research can be found here:


  EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/martinzugec/">Martin Zugec</a>, Technical Solutions Director from <a href="https://www.linkedin.com/company/bitdefender/">Bitdefender</a>, sharing their work and findings on "EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company." Built for long-term espionage, the campaign uses DLL sideloading, in-memory execution, and abused Windows services to stay stealthy and persistent.</p>
<p>We walk through how the multi-stage framework delivers a powerful backdoor with reconnaissance, lateral movement, data theft, and keylogging capabilities—and what this operation reveals about the evolving tactics defenders need to watch for.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://businessinsights.bitdefender.com/eggstreme-fileless-malware-cyberattack-apac">EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1681</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[393febf6-ed97-11f0-bfa1-9715ad6e6efb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9040670965.mp3?updated=1767985306" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Is interim the new permanent?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2465/notes</link>
      <description>The NSA reshuffles its cybersecurity leadership. A new report unmasks ICE’s latest surveillance system. CISA marks a milestone by retiring ten Emergency Directives. Trend Micro patches a critical vulnerability. Grok dials back the nudes, a bit. Cambodia extradites a cybercrime kingpin to China. Ghost Tap malware intercepts payment card data. Researchers disrupt a highly sophisticated VMware ESXi hypervisor exploit. European law enforcement arrest dozens of suspects linked to the international cybercriminal group Black Axe. Our guest is Sonali Shah, CEO of Cobalt, who says 2026 is the year AI stops being a concept and becomes the central battleground of cybersecurity. After firing the experts, DOGE hangs a help wanted sign.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today on our Industry Voices, we are joined by Sonali Shah, CEO of Cobalt, talking about 2026 is the year AI stops being a concept and becomes the central battleground of cybersecurity. Tune into the full conversation here.

Selected Reading

NSA cyber directorate gets new acting leadership (The Record)

Inside ICE’s Tool to Monitor Phones in Entire Neighborhoods (404 Media)

CISA Retires Ten Emergency Directives, Marking an Era in Federal Cybersecurity (CISA.gov)

Trend Micro warns of critical Apex Central RCE vulnerability (Bleeping Computer)

X pulls Grok images after UK ban threat over undress tool (The Register)

Alleged cyber scam kingpin arrested, extradited to China (The Record)

Chinese Hackers Use NFC-Enabled Android Malware to Steal Payment Information (GB Hackers)

The Great VM Escape: ESXi Exploitation in the Wild (Huntress)

Europol Leads Global Crackdown on Black Axe Cybercrime Gang, 34 Arrest (Infosecurity Magazine)

US DOGE Service is hiring following mass workforce losses across the government (Gov Exec)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 09 Jan 2026 21:10:00 -0000</pubDate>
      <itunes:title>Is interim the new permanent?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2465</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The NSA reshuffles its cybersecurity leadership. A new report unmasks ICE’s latest surveillance system. CISA marks a milestone by retiring ten Emergency Directives. Trend Micro patches a critical vulnerability. Grok dials back the nudes, a bit. Cambodia extradites a cybercrime kingpin to China. Ghost Tap malware intercepts payment card data. Researchers disrupt a highly sophisticated VMware ESXi hypervisor exploit. European law enforcement arrest dozens of suspects linked to the international cybercriminal group Black Axe. Our guest is Sonali Shah, CEO of Cobalt, who says 2026 is the year AI stops being a concept and becomes the central battleground of cybersecurity. After firing the experts, DOGE hangs a help wanted sign.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today on our Industry Voices, we are joined by Sonali Shah, CEO of Cobalt, talking about 2026 is the year AI stops being a concept and becomes the central battleground of cybersecurity. Tune into the full conversation here.

Selected Reading

NSA cyber directorate gets new acting leadership (The Record)

Inside ICE’s Tool to Monitor Phones in Entire Neighborhoods (404 Media)

CISA Retires Ten Emergency Directives, Marking an Era in Federal Cybersecurity (CISA.gov)

Trend Micro warns of critical Apex Central RCE vulnerability (Bleeping Computer)

X pulls Grok images after UK ban threat over undress tool (The Register)

Alleged cyber scam kingpin arrested, extradited to China (The Record)

Chinese Hackers Use NFC-Enabled Android Malware to Steal Payment Information (GB Hackers)

The Great VM Escape: ESXi Exploitation in the Wild (Huntress)

Europol Leads Global Crackdown on Black Axe Cybercrime Gang, 34 Arrest (Infosecurity Magazine)

US DOGE Service is hiring following mass workforce losses across the government (Gov Exec)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The NSA reshuffles its cybersecurity leadership. A new report unmasks ICE’s latest surveillance system. CISA marks a milestone by retiring ten Emergency Directives. Trend Micro patches a critical vulnerability. Grok dials back the nudes, a bit. Cambodia extradites a cybercrime kingpin to China. Ghost Tap malware intercepts payment card data. Researchers disrupt a highly sophisticated VMware ESXi hypervisor exploit. European law enforcement arrest dozens of suspects linked to the international cybercriminal group Black Axe. Our guest is Sonali Shah, CEO of Cobalt, who says 2026 is the year AI stops being a concept and becomes the central battleground of cybersecurity. After firing the experts, DOGE hangs a help wanted sign.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today on our Industry Voices, we are joined by <a href="https://www.linkedin.com/in/sonalinshah/"><u>Sonali Shah</u></a>, CEO of <a href="https://www.linkedin.com/company/cobalt_io/"><u>Cobalt</u></a>, talking about 2026 is the year AI stops being a concept and becomes the central battleground of cybersecurity. Tune into the full conversation <a href="https://explore.thecyberwire.com/sonali-shah"><u>here</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/nsa-cyber-directorate-new-acting-leadership"><u>NSA cyber directorate gets new acting leadership</u></a> (The Record)</p>
<p><a href="https://www.404media.co/inside-ices-tool-to-monitor-phones-in-entire-neighborhoods/"><u>Inside ICE’s Tool to Monitor Phones in Entire Neighborhoods</u></a> (404 Media)</p>
<p><a href="https://www.cisa.gov/news-events/news/cisa-retires-ten-emergency-directives-marking-era-federal-cybersecurity"><u>CISA Retires Ten Emergency Directives, Marking an Era in Federal Cybersecurity</u></a> (CISA.gov)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/trend-micro-fixes-critical-rce-flaw-in-apex-central-console/"><u>Trend Micro warns of critical Apex Central RCE vulnerability</u></a> (Bleeping Computer)</p>
<p><a href="https://www.theregister.com/2026/01/09/grok_image_generation_uk/"><u>X pulls Grok images after UK ban threat over undress tool</u></a> (The Register)</p>
<p><a href="https://therecord.media/alleged-cyber-scam-kingpin-cambodia-arrested-extradited"><u>Alleged cyber scam kingpin arrested, extradited to China</u></a> (The Record)</p>
<p><a href="https://gbhackers.com/android-malware/"><u>Chinese Hackers Use NFC-Enabled Android Malware to Steal Payment Information</u></a> (GB Hackers)</p>
<p><a href="https://www.huntress.com/blog/esxi-vm-escape-exploit"><u>The Great VM Escape: ESXi Exploitation in the Wild</u></a> (Huntress)</p>
<p><a href="https://www.infosecurity-magazine.com/news/europol-crackdown-on-black-axe/"><u>Europol Leads Global Crackdown on Black Axe Cybercrime Gang, 34 Arrest</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.govexec.com/workforce/2026/01/us-doge-service-hiring-following-mass-workforce-losses-across-government/410512/?mid=1&amp;ref=metacurity.com#cid=3328935"><u>US DOGE Service is hiring following mass workforce losses across the government</u></a> (Gov Exec)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1950</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[db901406-1c7a-11f0-85e0-3b8a159bcc5a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4778750731.mp3?updated=1767988787" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>America goes solo on cyber.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2464/notes</link>
      <description>The US withdraws from global cybersecurity institutions. A maximum-severity vulnerability called Ni8mare allows full compromise of a workflow automation platform. Cisco patches ISE. Researchers uncover a sophisticated multi-stage malware campaign targeting manufacturing and government organizations in Italy, Finland, and Saudi Arabia. The growing rift of defining AI risk. Microsoft gives 365 admins a one-month deadline to enable MFA. The Illinois Department of Human Services inadvertently exposed personal and protected health information of more than 700,000 residents. An Illinois man is charged with hacking Snapchat accounts to steal nudes. Our guest is Caitlin Clarke, Senior Director for Cybersecurity Services at Venable, with insights on CISA 2015. Facial recognition that’s bear-ly controversial. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Caitlin Clarke, Senior Director for Cybersecurity Services at Venable, for a conversation on CISA 2015 and its role in today’s cybersecurity and policy landscape. If you enjoyed this conversation, be sure to tune into the full interview on the next Caveat. 

Selected Reading

US announces withdrawal from dozens of international treaties (The Record)

US To Leave Global Forum on Cyber Expertise (Infosecurity Magazine)

Max severity Ni8mare flaw lets hackers hijack n8n servers (Bleeping Computer)

Cisco warns of Identity Service Engine flaw with exploit code (Bleeping Computer)

CISA tags max severity HPE OneView flaw as actively exploited (Bleeping Computer)

Threat Actors Exploit Commodity Loader in Targeted Email Campaigns Against Organizations (GB Hackers)

Are Copilot prompt injection flaws vulnerabilities or AI limits? (Bleeping Computer)

Microsoft to enforce MFA for Microsoft 365 admin center sign-ins (Bleeping Computer)

Illinois state agency exposed personal data of 700,000 people (The Record)

Oswego man Kyle Svara, 26, allegedly hired by college coach Steve Waithe to get Snapchat access codes from nearly 600 women: FBI (ABC7 Chicago)

How facial recognition for bears can help ecologists manage wildlife (The Conversation)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 08 Jan 2026 21:10:00 -0000</pubDate>
      <itunes:title>America goes solo on cyber.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2464</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The US withdraws from global cybersecurity institutions. A maximum-severity vulnerability called Ni8mare allows full compromise of a workflow automation platform. Cisco patches ISE. Researchers uncover a sophisticated multi-stage malware campaign targeting manufacturing and government organizations in Italy, Finland, and Saudi Arabia. The growing rift of defining AI risk. Microsoft gives 365 admins a one-month deadline to enable MFA. The Illinois Department of Human Services inadvertently exposed personal and protected health information of more than 700,000 residents. An Illinois man is charged with hacking Snapchat accounts to steal nudes. Our guest is Caitlin Clarke, Senior Director for Cybersecurity Services at Venable, with insights on CISA 2015. Facial recognition that’s bear-ly controversial. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Caitlin Clarke, Senior Director for Cybersecurity Services at Venable, for a conversation on CISA 2015 and its role in today’s cybersecurity and policy landscape. If you enjoyed this conversation, be sure to tune into the full interview on the next Caveat. 

Selected Reading

US announces withdrawal from dozens of international treaties (The Record)

US To Leave Global Forum on Cyber Expertise (Infosecurity Magazine)

Max severity Ni8mare flaw lets hackers hijack n8n servers (Bleeping Computer)

Cisco warns of Identity Service Engine flaw with exploit code (Bleeping Computer)

CISA tags max severity HPE OneView flaw as actively exploited (Bleeping Computer)

Threat Actors Exploit Commodity Loader in Targeted Email Campaigns Against Organizations (GB Hackers)

Are Copilot prompt injection flaws vulnerabilities or AI limits? (Bleeping Computer)

Microsoft to enforce MFA for Microsoft 365 admin center sign-ins (Bleeping Computer)

Illinois state agency exposed personal data of 700,000 people (The Record)

Oswego man Kyle Svara, 26, allegedly hired by college coach Steve Waithe to get Snapchat access codes from nearly 600 women: FBI (ABC7 Chicago)

How facial recognition for bears can help ecologists manage wildlife (The Conversation)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US withdraws from global cybersecurity institutions. A maximum-severity vulnerability called Ni8mare allows full compromise of a workflow automation platform. Cisco patches ISE. Researchers uncover a sophisticated multi-stage malware campaign targeting manufacturing and government organizations in Italy, Finland, and Saudi Arabia. The growing rift of defining AI risk. Microsoft gives 365 admins a one-month deadline to enable MFA. The Illinois Department of Human Services inadvertently exposed personal and protected health information of more than 700,000 residents. An Illinois man is charged with hacking Snapchat accounts to steal nudes. Our guest is Caitlin Clarke, Senior Director for Cybersecurity Services at Venable, with insights on CISA 2015. Facial recognition that’s bear-ly controversial. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.venable.com/professionals/c/clarke-caitlin"><u>Caitlin Clarke</u></a>, Senior Director for Cybersecurity Services at <a href="https://www.venable.com/"><u>Venable</u></a>, for a conversation on CISA 2015 and its role in today’s cybersecurity and policy landscape. If you enjoyed this conversation, be sure to tune into the full interview on the next <a href="https://thecyberwire.com/podcasts/caveat"><u>Caveat</u></a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/us-announces-withdrawal-from-dozens-international-orgs"><u>US announces withdrawal from dozens of international treaties</u></a> (The Record)</p>
<p><a href="https://www.infosecurity-magazine.com/news/us-leave-global-forum-on-cyber/"><u>US To Leave Global Forum on Cyber Expertise</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/max-severity-ni8mare-flaw-lets-hackers-hijack-n8n-servers/"><u>Max severity Ni8mare flaw lets hackers hijack n8n servers</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisco-warns-of-identity-service-engine-flaw-with-exploit-code/"><u>Cisco warns of Identity Service Engine flaw with exploit code</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisa-tags-max-severity-hpe-oneview-flaw-as-actively-exploited/"><u>CISA tags max severity HPE OneView flaw as actively exploited</u></a> (Bleeping Computer)</p>
<p><a href="https://gbhackers.com/commodity-loader/"><u>Threat Actors Exploit Commodity Loader in Targeted Email Campaigns Against Organizations</u></a> (GB Hackers)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/are-copilot-prompt-injection-flaws-vulnerabilities-or-ai-limits/"><u>Are Copilot prompt injection flaws vulnerabilities or AI limits?</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-to-enforce-mfa-for-microsoft-365-admin-center-sign-ins/"><u>Microsoft to enforce MFA for Microsoft 365 admin center sign-ins</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/illinois-agency-exposed-data"><u>Illinois state agency exposed personal data of 700,000 people</u></a> (The Record)</p>
<p><a href="https://abc7chicago.com/post/oswego-man-kyle-svara-26-allegedly-hired-college-coach-steve-waithe-get-snapchat-access-codes-600-women-fbi/18369697/"><u>Oswego man Kyle Svara, 26, allegedly hired by college coach Steve Waithe to get Snapchat access codes from nearly 600 women: FBI</u></a> (ABC7 Chicago)</p>
<p><a href="https://theconversation.com/how-facial-recognition-for-bears-can-help-ecologists-manage-wildlife-271371"><u>How facial recognition for bears can help ecologists manage wildlife</u></a> (The Conversation)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1488</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[db67f656-1c7a-11f0-85e0-4392ce857c61]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8503107180.mp3?updated=1767901878" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberattack in the fast lane.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2463/notes</link>
      <description>Jaguar Land Rover reveals the fiscal results of last year’s cyberattack. A Texas gas station chain suffers a data spill. Taiwan tracks China’s energy-sector attacks. Google and Veeam push patches. Threat actors target obsolete D-Link routers. Sedgwick Government Solutions confirms a data breach. The U.S. Cyber Trust Mark faces an uncertain future. Google looks to hire humans to improve AI search responses. Our guest is Deepen Desai, Chief Security Officer of Zscaler, discussing what’s powering enterprise AI in 2026. AI brings creative cartography to the weather forecast.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices, we are joined by Deepen Desai, Chief Security Officer of Zscaler, discussing what’s powering enterprise AI in 2026. To learn more on this topic, be sure to check out Zscaler’s report here. Listen to the full conversation here. 

Selected Reading

Jaguar Land Rover wholesale volumes plummet 43% in cyberattack aftermath (The Register)

Major Data Breach Hits Company Operating 150 Gas Stations in the US (Hackread)

Taiwan says China's attacks on its energy sector increased tenfold (Bleeping Computer)

Google Patches High-Severity Chrome WebView Flaw CVE-2026-0628 in the Tag Component (Tech Nadu)

Several Code Execution Flaws Patched in Veeam Backup &amp; Replication (SecurityWeek)

New D-Link flaw in legacy DSL routers actively exploited in attacks (Bleeping Computer)

Sedgwick confirms breach at government contractor subsidiary (Bleeping Computer)

FCC Loses Lead Support for Biden-Era IoT Security Labeling (GovInfoSecurity)

Google Search AI hallucinations push Google to hire "AI Answers Quality" engineers (Bleeping Computer)

‘Whata Bod’: An AI-generated NWS map invented fake towns in Idaho (The Washington Post)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 07 Jan 2026 21:10:00 -0000</pubDate>
      <itunes:title>Cyberattack in the fast lane.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2463</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Jaguar Land Rover reveals the fiscal results of last year’s cyberattack. A Texas gas station chain suffers a data spill. Taiwan tracks China’s energy-sector attacks. Google and Veeam push patches. Threat actors target obsolete D-Link routers. Sedgwick Government Solutions confirms a data breach. The U.S. Cyber Trust Mark faces an uncertain future. Google looks to hire humans to improve AI search responses. Our guest is Deepen Desai, Chief Security Officer of Zscaler, discussing what’s powering enterprise AI in 2026. AI brings creative cartography to the weather forecast.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices, we are joined by Deepen Desai, Chief Security Officer of Zscaler, discussing what’s powering enterprise AI in 2026. To learn more on this topic, be sure to check out Zscaler’s report here. Listen to the full conversation here. 

Selected Reading

Jaguar Land Rover wholesale volumes plummet 43% in cyberattack aftermath (The Register)

Major Data Breach Hits Company Operating 150 Gas Stations in the US (Hackread)

Taiwan says China's attacks on its energy sector increased tenfold (Bleeping Computer)

Google Patches High-Severity Chrome WebView Flaw CVE-2026-0628 in the Tag Component (Tech Nadu)

Several Code Execution Flaws Patched in Veeam Backup &amp; Replication (SecurityWeek)

New D-Link flaw in legacy DSL routers actively exploited in attacks (Bleeping Computer)

Sedgwick confirms breach at government contractor subsidiary (Bleeping Computer)

FCC Loses Lead Support for Biden-Era IoT Security Labeling (GovInfoSecurity)

Google Search AI hallucinations push Google to hire "AI Answers Quality" engineers (Bleeping Computer)

‘Whata Bod’: An AI-generated NWS map invented fake towns in Idaho (The Washington Post)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jaguar Land Rover reveals the fiscal results of last year’s cyberattack. A Texas gas station chain suffers a data spill. Taiwan tracks China’s energy-sector attacks. Google and Veeam push patches. Threat actors target obsolete D-Link routers. Sedgwick Government Solutions confirms a data breach. The U.S. Cyber Trust Mark faces an uncertain future. Google looks to hire humans to improve AI search responses. Our guest is Deepen Desai, Chief Security Officer of Zscaler, discussing what’s powering enterprise AI in 2026. AI brings creative cartography to the weather forecast.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On today’s Industry Voices, we are joined by <a href="https://www.linkedin.com/in/deepen-desai-48487b2/"><u>Deepen Desai</u></a>, Chief Security Officer of <a href="https://www.linkedin.com/company/zscaler/"><u>Zscaler</u></a>, discussing what’s powering enterprise AI in 2026. To learn more on this topic, be sure to check out Zscaler’s report <a href="https://www.zscaler.com/blogs/security-research/whats-powering-enterprise-ai-2025-threatlabz-report-sneak-peek"><u>here</u></a>. Listen to the full conversation <a href="https://explore.thecyberwire.com/deepen-desai">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.theregister.com/2026/01/07/jlr_wholesale_volumes/"><u>Jaguar Land Rover wholesale volumes plummet 43% in cyberattack aftermath</u></a> (The Register)</p>
<p><a href="https://hackread.com/data-breach-us-gas-stations-company/"><u>Major Data Breach Hits Company Operating 150 Gas Stations in the US</u></a> (Hackread)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/taiwan-says-chinas-attacks-on-its-energy-sector-increased-tenfold/"><u>Taiwan says China's attacks on its energy sector increased tenfold</u></a> (Bleeping Computer)</p>
<p><a href="https://www.technadu.com/google-patches-high-severity-chrome-webview-flaw-cve-2026-0628-in-the-tag-component/617762/"><u>Google Patches High-Severity Chrome WebView Flaw CVE-2026-0628 in the Tag Component</u></a> (Tech Nadu)</p>
<p><a href="https://www.securityweek.com/several-code-execution-flaws-patched-in-veeam-backup-replication/"><u>Several Code Execution Flaws Patched in Veeam Backup &amp; Replication</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/new-d-link-flaw-in-legacy-dsl-routers-actively-exploited-in-attacks/"><u>New D-Link flaw in legacy DSL routers actively exploited in attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/sedgwick-confirms-breach-at-government-contractor-subsidiary/"><u>Sedgwick confirms breach at government contractor subsidiary</u></a> (Bleeping Computer)</p>
<p><a href="https://www.govinfosecurity.com/fcc-loses-lead-support-for-biden-era-iot-security-labeling-a-30455"><u>FCC Loses Lead Support for Biden-Era IoT Security Labeling</u></a> (GovInfoSecurity)</p>
<p><a href="https://www.bleepingcomputer.com/news/google/google-search-ai-hallucinations-push-google-to-hire-ai-answers-quality-engineers/"><u>Google Search AI hallucinations push Google to hire "AI Answers Quality" engineers</u></a> (Bleeping Computer)</p>
<p><a href="https://www.washingtonpost.com/weather/2026/01/06/nws-ai-map-fake-names/?pwapi_token=eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJyZWFzb24iOiJnaWZ0IiwibmJmIjoxNzY3Njc1NjAwLCJpc3MiOiJzdWJzY3JpcHRpb25zIiwiZXhwIjoxNzY5MDU3OTk5LCJpYXQiOjE3Njc2NzU2MDAsImp0aSI6ImE1ZWRjZWVjLTNiYTItNDJmZS05YTRjLTZkMzY5YTdkNzI5MyIsInVybCI6Imh0dHBzOi8vd3d3Lndhc2hpbmd0b25wb3N0LmNvbS93ZWF0aGVyLzIwMjYvMDEvMDYvbndzLWFpLW1hcC1mYWtlLW5hbWVzLyJ9.CybIgrnRyXAsnHu0qway-x03sJq6kRY7dJ_Nn4XtVN8"><u>‘Whata Bod’: An AI-generated NWS map invented fake towns in Idaho</u></a> (The Washington Post)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1889</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[db407342-1c7a-11f0-85e0-275f97d95a92]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3469169304.mp3?updated=1767816100" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>X marks the violation.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2462/notes</link>
      <description>Grok’s non-consensual imagery draws scrutiny from the European Commission.  Researchers link several major data breaches to a single threat actor. The UK unveils a new Cyber Action Plan. A stealthy ClickFix campaign targets the hospitality sector. VVS Stealer malware targets Discord users. Covenant Health and AFLAC report data leaks. Google silences a critical Dolby flaw. Ilona Cohen, Chief Legal and Policy Officer at HackerOne discusses “What the SolarWinds Dismissal Really Means for CISOs: Less Personal Risk, More Scrutiny on Disclosures.” UK students enjoy a digital snow day. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Ilona Cohen, Chief Legal and Policy Officer at HackerOne and former senior lawyer to President Obama, as she is discussing “What the SolarWinds Dismissal Really Means for CISOs: Less Personal Risk, More Scrutiny on Disclosures.”

Selected Reading

EU looking ‘very seriously’ at taking action against X over Grok (The Record)

Grok's AI CSAM Shitshow (404 Media)

Dozens of Major Data Breaches Linked to Single Threat Actor (SecurityWeek)

UK Launches New Cyber Unit to Bolster Defences Against Cyber Threats (Infosecurity Magazine)

Sophisticated ClickFix Campaign Targeting Hospitality Sector (SecurityWeek)

New VVS Stealer Malware Targets Discord Users via Fake System Errors (Hackread)

Covenant Health Notifying 480K Patients of 2025 Data Theft (Infosecurity)

Aflac Notifies 22.6 Million People of June Data Theft Attack (Infosecurity)

Critical Dolby leak in Android patched by Google (Techzine Global)

Students bag extended Christmas break after cyber hit on school IT (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Jan 2026 21:10:00 -0000</pubDate>
      <itunes:title>X marks the violation.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2462</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Grok’s non-consensual imagery draws scrutiny from the European Commission.  Researchers link several major data breaches to a single threat actor. The UK unveils a new Cyber Action Plan. A stealthy ClickFix campaign targets the hospitality sector. VVS Stealer malware targets Discord users. Covenant Health and AFLAC report data leaks. Google silences a critical Dolby flaw. Ilona Cohen, Chief Legal and Policy Officer at HackerOne discusses “What the SolarWinds Dismissal Really Means for CISOs: Less Personal Risk, More Scrutiny on Disclosures.” UK students enjoy a digital snow day. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Ilona Cohen, Chief Legal and Policy Officer at HackerOne and former senior lawyer to President Obama, as she is discussing “What the SolarWinds Dismissal Really Means for CISOs: Less Personal Risk, More Scrutiny on Disclosures.”

Selected Reading

EU looking ‘very seriously’ at taking action against X over Grok (The Record)

Grok's AI CSAM Shitshow (404 Media)

Dozens of Major Data Breaches Linked to Single Threat Actor (SecurityWeek)

UK Launches New Cyber Unit to Bolster Defences Against Cyber Threats (Infosecurity Magazine)

Sophisticated ClickFix Campaign Targeting Hospitality Sector (SecurityWeek)

New VVS Stealer Malware Targets Discord Users via Fake System Errors (Hackread)

Covenant Health Notifying 480K Patients of 2025 Data Theft (Infosecurity)

Aflac Notifies 22.6 Million People of June Data Theft Attack (Infosecurity)

Critical Dolby leak in Android patched by Google (Techzine Global)

Students bag extended Christmas break after cyber hit on school IT (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Grok’s non-consensual imagery draws scrutiny from the European Commission.  Researchers link several major data breaches to a single threat actor. The UK unveils a new Cyber Action Plan. A stealthy ClickFix campaign targets the hospitality sector. VVS Stealer malware targets Discord users. Covenant Health and AFLAC report data leaks. Google silences a critical Dolby flaw. Ilona Cohen, Chief Legal and Policy Officer at HackerOne discusses “What the SolarWinds Dismissal Really Means for CISOs: Less Personal Risk, More Scrutiny on Disclosures.” UK students enjoy a digital snow day. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/ilona-cohen-3094b255/"><u>Ilona Cohen</u></a>, Chief Legal and Policy Officer at <a href="https://www.linkedin.com/company/hackerone/"><u>HackerOne</u></a> and former senior lawyer to President Obama, as she is discussing “What the SolarWinds Dismissal Really Means for CISOs: Less Personal Risk, More Scrutiny on Disclosures.”</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/eu-grok-regulation-deepfake"><u>EU looking ‘very seriously’ at taking action against X over Grok</u></a> (The Record)</p>
<p><a href="https://www.404media.co/groks-ai-csam-shitshow/"><u>Grok's AI CSAM Shitshow</u></a> (404 Media)</p>
<p><a href="https://www.securityweek.com/dozens-of-major-data-breaches-linked-to-single-threat-actor/"><u>Dozens of Major Data Breaches Linked to Single Threat Actor</u></a> (SecurityWeek)</p>
<p><a href="https://www.infosecurity-magazine.com/news/uk-launches-new-cyber-unit/"><u>UK Launches New Cyber Unit to Bolster Defences Against Cyber Threats </u></a>(Infosecurity Magazine)</p>
<p><a href="https://www.securityweek.com/sophisticated-clickfix-campaign-targeting-hospitality-sector/"><u>Sophisticated ClickFix Campaign Targeting Hospitality Sector</u></a> (SecurityWeek)</p>
<p><a href="https://hackread.com/vvs-stealer-malwar-discord-system-errors/"><u>New VVS Stealer Malware Targets Discord Users via Fake System Errors</u></a> (Hackread)</p>
<p><a href="https://www.bankinfosecurity.com/covenant-health-notifying-480k-patients-2025-data-theft-a-30447"><u>Covenant Health Notifying 480K Patients of 2025 Data Theft</u></a> (Infosecurity)</p>
<p><a href="https://www.govinfosecurity.com/aflac-notifies-227-million-people-june-data-theft-attack-a-30434"><u>Aflac Notifies 22.6 Million People of June Data Theft Attack</u></a> (Infosecurity)</p>
<p><a href="https://www.techzine.eu/news/security/137684/critical-dolby-leak-in-android-patched-by-google/"><u>Critical Dolby leak in Android patched by Google</u></a> (Techzine Global)</p>
<p><a href="https://www.theregister.com/2026/01/06/nuneaton_school_cyberattack/"><u>Students bag extended Christmas break after cyber hit on school IT</u></a> (The Register)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1449</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[db18ffb0-1c7a-11f0-85e0-870fdd7e5bac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6801084209.mp3?updated=1767731339" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A city goes dark as cyber questions multiply.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2461/notes</link>
      <description>Venezuela blames physical attacks for blackout as cyber questions swirl. Trump reverses a chip technology sale over national security issues, and removes sanctions linked to Predator spyware. Greek officials say an air traffic shutdown was not a cyberattack. The U.S. Army launches a new officer specialization in AI and machine learning. The Kimwolf botnet infects more than two million devices worldwide. ZoomStealer uses browser extensions to grab sensitive online meeting data. The European Space Agency confirms a cybersecurity incident. Former lawmakers and cyber policy leaders warn that U.S. cyber defenses are slipping. On today’s Afternoon Cyber Tea host Ann Johnson welcomes Troy Hunt, founder of Have I Been Pwned. A researcher swipes left on white supremacy.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On this segment of Afternoon Cyber Tea with host Ann Johnson, Ann is joined by Troy Hunt, founder of Have I Been Pwned, to explore what billions of breached records reveal about attacker behavior, human weakness, and the state of breach disclosure. To listen to Ann and Troy's full conversation, visit the episode page. You can catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app. 

Selected Reading

Trump suggests US used cyberattacks to turn off lights in Venezuela during strikes (POLITICO)

US Action in Venezuela Provokes Cyberattack Speculation (GovInfosecurity)

COMUNICADO | CORPOELEC denuncia ataque perpetrado contra el Sistema Eléctrico Nacional (MPPEE)

President Trump Orders Divestment in $2.9 Million Chips Deal to Protect US Security Interests (SecurityWeek)

Treasury removes sanctions for three executives tied to spyware maker Intellexa (The Record)

Greece says a radio failure that grounded flights is unlikely to be a cyberattack (WRAL.com)

US Army to Establish AI Officer Corps for High-Tech Military Management (ForkLog)

The Kimwolf Botnet is Stalking Your Local Network (Krebs on Security)

Zoom Stealer browser extensions harvest corporate meeting intelligence (Bleeping Computer)

European Space Agency Confirms Server Breach (Infosecurity Magazine)

Time to restore America’s cyberspace security system (CyberScoop)

Researcher Wipes White Supremacist Dating Sites, Leaks Data on okstupid.lol (Hackread)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 05 Jan 2026 21:10:00 -0000</pubDate>
      <itunes:title>A city goes dark as cyber questions multiply.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>2461</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Venezuela blames physical attacks for blackout as cyber questions swirl. Trump reverses a chip technology sale over national security issues, and removes sanctions linked to Predator spyware. Greek officials say an air traffic shutdown was not a cyberattack. The U.S. Army launches a new officer specialization in AI and machine learning. The Kimwolf botnet infects more than two million devices worldwide. ZoomStealer uses browser extensions to grab sensitive online meeting data. The European Space Agency confirms a cybersecurity incident. Former lawmakers and cyber policy leaders warn that U.S. cyber defenses are slipping. On today’s Afternoon Cyber Tea host Ann Johnson welcomes Troy Hunt, founder of Have I Been Pwned. A researcher swipes left on white supremacy.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On this segment of Afternoon Cyber Tea with host Ann Johnson, Ann is joined by Troy Hunt, founder of Have I Been Pwned, to explore what billions of breached records reveal about attacker behavior, human weakness, and the state of breach disclosure. To listen to Ann and Troy's full conversation, visit the episode page. You can catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app. 

Selected Reading

Trump suggests US used cyberattacks to turn off lights in Venezuela during strikes (POLITICO)

US Action in Venezuela Provokes Cyberattack Speculation (GovInfosecurity)

COMUNICADO | CORPOELEC denuncia ataque perpetrado contra el Sistema Eléctrico Nacional (MPPEE)

President Trump Orders Divestment in $2.9 Million Chips Deal to Protect US Security Interests (SecurityWeek)

Treasury removes sanctions for three executives tied to spyware maker Intellexa (The Record)

Greece says a radio failure that grounded flights is unlikely to be a cyberattack (WRAL.com)

US Army to Establish AI Officer Corps for High-Tech Military Management (ForkLog)

The Kimwolf Botnet is Stalking Your Local Network (Krebs on Security)

Zoom Stealer browser extensions harvest corporate meeting intelligence (Bleeping Computer)

European Space Agency Confirms Server Breach (Infosecurity Magazine)

Time to restore America’s cyberspace security system (CyberScoop)

Researcher Wipes White Supremacist Dating Sites, Leaks Data on okstupid.lol (Hackread)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Venezuela blames physical attacks for blackout as cyber questions swirl. Trump reverses a chip technology sale over national security issues, and removes sanctions linked to Predator spyware. Greek officials say an air traffic shutdown was not a cyberattack. The U.S. Army launches a new officer specialization in AI and machine learning. The Kimwolf botnet infects more than two million devices worldwide. ZoomStealer uses browser extensions to grab sensitive online meeting data. The European Space Agency confirms a cybersecurity incident. Former lawmakers and cyber policy leaders warn that U.S. cyber defenses are slipping. On today’s Afternoon Cyber Tea host Ann Johnson welcomes Troy Hunt, founder of Have I Been Pwned. A researcher swipes left on white supremacy.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On this segment of Afternoon Cyber Tea with host<a href="https://www.linkedin.com/in/ann-johnsons/"><u> Ann Johnson</u></a>, Ann is joined by<a href="https://www.linkedin.com/in/troyhunt/"><u> Troy Hunt</u></a>, founder of<a href="https://haveibeenpwned.com/"><u> Have I Been Pwned</u></a>, to explore what billions of breached records reveal about attacker behavior, human weakness, and the state of breach disclosure. To listen to Ann and Troy's full conversation, visit the<a href="https://www.thecyberwire.com/podcasts/afternoon-cyber-tea/120/notes"><u> episode page</u></a>. You can catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.politico.com/news/2026/01/03/trump-venezuela-cyber-operation-maduro-00709816"><u>Trump suggests US used cyberattacks to turn off lights in Venezuela during strikes </u></a>(POLITICO)</p>
<p><a href="https://www.govinfosecurity.com/us-action-in-venezuela-provokes-cyberattack-speculation-a-30439"><u>US Action in Venezuela Provokes Cyberattack Speculation</u></a> (GovInfosecurity)</p>
<p><a href="https://mppee.gob.ve/?p=103279"><u>COMUNICADO | CORPOELEC denuncia ataque perpetrado contra el Sistema Eléctrico Nacional</u></a> (MPPEE)</p>
<p><a href="https://www.securityweek.com/president-trump-orders-divestment-in-2-9-million-chips-deal-to-protect-us-security-interests/"><u>President Trump Orders Divestment in $2.9 Million Chips Deal to Protect US Security Interests </u></a>(SecurityWeek)</p>
<p><a href="https://therecord.media/treasury-sanctions-intellexa-removed"><u>Treasury removes sanctions for three executives tied to spyware maker Intellexa</u></a> (The Record)</p>
<p><a href="https://www.wral.com/news/ap/f2ebc-greece-says-a-radio-failure-that-grounded-flights-is-unlikely-to-be-a-cyberattack/"><u>Greece says a radio failure that grounded flights is unlikely to be a cyberattack</u></a> (WRAL.com)</p>
<p><a href="https://forklog.com/en/us-army-to-establish-ai-officer-corps-for-high-tech-military-management/"><u>US Army to Establish AI Officer Corps for High-Tech Military Management</u></a> (ForkLog)</p>
<p><a href="https://krebsonsecurity.com/2026/01/the-kimwolf-botnet-is-stalking-your-local-network/"><u>The Kimwolf Botnet is Stalking Your Local Network</u></a> (Krebs on Security)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/zoom-stealer-browser-extensions-harvest-corporate-meeting-intelligence/"><u>Zoom Stealer browser extensions harvest corporate meeting intelligence</u></a> (Bleeping Computer)</p>
<p><a href="https://www.infosecurity-magazine.com/news/european-space-agency-confirms/"><u>European Space Agency Confirms Server Breach</u></a> (Infosecurity Magazine)</p>
<p><a href="https://cyberscoop.com/us-cyber-defense-falling-behind-cisa-leadership-funding-op-ed/"><u>Time to restore America’s cyberspace security system</u></a> (CyberScoop)</p>
<p><a href="https://hackread.com/white-supremacist-dating-sites-wiped-okstupid-lol/"><u>Researcher Wipes White Supremacist Dating Sites, Leaks Data on okstupid.lol</u></a> (Hackread)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1455</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[daf1e740-1c7a-11f0-85e0-0faf7bc7efcd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5654452271.mp3?updated=1767643194" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Michael Scott: A team of humble intellects. [Information security] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/102/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Chief Information Security Officer at Immuta, Michael Scott shares his story from working at a forgotten internet service provider to leading the security fight for major food chain restaurants. Michael explains how the different roles at various companies he has worked with paved his way to where he is now at Immuta. He works with a group of colleagues and he leads in a different style, describing that "It really is just a collection of a lot of, we call humble intellects" working with him. Michael attributes adversity to being a cornerstone of existence in the security community, and explains how that helps him keep up the fight. We thank Michael for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 04 Jan 2026 08:00:00 -0000</pubDate>
      <itunes:title>Michael Scott: A team of humble intellects. [Information security] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>102</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8b1c0cc2-dd14-11f0-a060-8f86a8eb28a4/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Chief Information Security Officer at Immuta, Michael Scott shares his story from working at a forgotten internet service provider to leading the security fight for major food chain restaurants. Michael explains how the different roles at various companies he has worked with paved his way to where he is now at Immuta. He works with a group of colleagues and he leads in a different style, describing that "It really is just a collection of a lot of, we call humble intellects" working with him. Michael attributes adversity to being a cornerstone of existence in the security community, and explains how that helps him keep up the fight. We thank Michael for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Chief Information Security Officer at Immuta, Michael Scott shares his story from working at a forgotten internet service provider to leading the security fight for major food chain restaurants. Michael explains how the different roles at various companies he has worked with paved his way to where he is now at Immuta. He works with a group of colleagues and he leads in a different style, describing that "It really is just a collection of a lot of, we call humble intellects" working with him. Michael attributes adversity to being a cornerstone of existence in the security community, and explains how that helps him keep up the fight. We thank Michael for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>577</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8b1c0cc2-dd14-11f0-a060-8f86a8eb28a4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3655462748.mp3?updated=1735936622" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Don’t trust that app!</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/392/notes</link>
      <description>While our team is out on winter break, please enjoy this episode of Research Saturday.

Today we are joined by ⁠⁠Selena Larson⁠⁠, co-host of ⁠⁠Only Malware in the Building⁠⁠ and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at ⁠⁠Proofpoint⁠⁠, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth apps to impersonate services like Adobe, DocuSign, and SharePoint, stealing credentials and bypassing MFA via attacker-in-the-middle phishing kits, mainly Tycoon. 

These attacks redirect users to fake Microsoft login pages to capture credentials, 2FA tokens, and session cookies, targeting nearly 3,000 Microsoft 365 accounts across 900 environments in 2025. Microsoft’s upcoming security changes and strengthened email, cloud, and web defenses, along with user education, are recommended to reduce these risks.

The research can be found here:


  
⁠⁠⁠⁠Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Jan 2026 08:00:00 -0000</pubDate>
      <itunes:title>Don’t trust that app!</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>392</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/2c0c27a0-dc40-11f0-8fa4-3fa2283fd1d1/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>While our team is out on winter break, please enjoy this episode of Research Saturday.

Today we are joined by ⁠⁠Selena Larson⁠⁠, co-host of ⁠⁠Only Malware in the Building⁠⁠ and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at ⁠⁠Proofpoint⁠⁠, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth apps to impersonate services like Adobe, DocuSign, and SharePoint, stealing credentials and bypassing MFA via attacker-in-the-middle phishing kits, mainly Tycoon. 

These attacks redirect users to fake Microsoft login pages to capture credentials, 2FA tokens, and session cookies, targeting nearly 3,000 Microsoft 365 accounts across 900 environments in 2025. Microsoft’s upcoming security changes and strengthened email, cloud, and web defenses, along with user education, are recommended to reduce these risks.

The research can be found here:


  
⁠⁠⁠⁠Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While our team is out on winter break, please enjoy this episode of Research Saturday.</strong></em></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/selenalarson/">⁠⁠Selena Larson⁠⁠</a>, co-host of <a href="https://thecyberwire.com/podcasts/only-malware-in-the-building">⁠⁠Only Malware in the Building⁠⁠</a> and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at <a href="https://www.proofpoint.com/us">⁠⁠Proofpoint⁠⁠</a>, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth apps to impersonate services like Adobe, DocuSign, and SharePoint, stealing credentials and bypassing MFA via attacker-in-the-middle phishing kits, mainly Tycoon. </p>
<p>These attacks redirect users to fake Microsoft login pages to capture credentials, 2FA tokens, and session cookies, targeting nearly 3,000 Microsoft 365 accounts across 900 environments in 2025. Microsoft’s upcoming security changes and strengthened email, cloud, and web defenses, along with user education, are recommended to reduce these risks.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://www.huntress.com/blog/exploitation-of-sonicwall-vpn">⁠⁠⁠</a><a href="https://www.proofpoint.com/us/blog/threat-insight/microsoft-oauth-app-impersonation-campaign-leads-mfa-phishing">⁠Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1241</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2c0c27a0-dc40-11f0-8fa4-3fa2283fd1d1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2052892928.mp3?updated=1766083362" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber and its "Hive" Mind</title>
      <link>https://thecyberwire.com/podcasts/cyber-things/2/notes</link>
      <description>While our team is out on winter break, please enjoy this episode of Cyber Things from our partners at Armis.

Welcome to Episode 2 of Cyber Things, a special edition podcast produced in partnership by Armis and N2K CyberWire in an homage to Stranger Things. Host ⁠Rebecca Cradick⁠, VP of Global Communications at ⁠Armis⁠, is joined by ⁠Curtis Simpson⁠, CISO at Armis, to dive deep into the rise of the “Hive Mind”: the collective, connected threat ecosystem where attackers share tools, data, and tactics across the dark web, evolving faster than ever through AI-powered reconnaissance and automation.

This is essential listening for anyone seeking to better understand how today’s adversaries no longer operate alone, but as a distributed learning network that observes, adapts, and strikes with speed and precision. Tune in now to learn how organizations can think upside down, harness AI, and build defenses that move at the speed of today’s threats - before the shadows reach your network.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 02 Jan 2026 06:00:00 -0000</pubDate>
      <itunes:title>Cyber and its "Hive" Mind</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/dac9f74e-1c7a-11f0-85e0-c70b2581f58c/image/09ad3ff33ca5c1e4017f3c587626898c.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>While our team is out on winter break, please enjoy this episode of Cyber Things from our partners at Armis.

Welcome to Episode 2 of Cyber Things, a special edition podcast produced in partnership by Armis and N2K CyberWire in an homage to Stranger Things. Host ⁠Rebecca Cradick⁠, VP of Global Communications at ⁠Armis⁠, is joined by ⁠Curtis Simpson⁠, CISO at Armis, to dive deep into the rise of the “Hive Mind”: the collective, connected threat ecosystem where attackers share tools, data, and tactics across the dark web, evolving faster than ever through AI-powered reconnaissance and automation.

This is essential listening for anyone seeking to better understand how today’s adversaries no longer operate alone, but as a distributed learning network that observes, adapts, and strikes with speed and precision. Tune in now to learn how organizations can think upside down, harness AI, and build defenses that move at the speed of today’s threats - before the shadows reach your network.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While our team is out on winter break, please enjoy this episode of Cyber Things from our partners at Armis.</strong></em></p>
<p>Welcome to Episode 2 of Cyber Things, a special edition podcast produced in partnership by Armis and N2K CyberWire in an homage to Stranger Things. Host <a href="https://www.linkedin.com/in/rebeccacradick/">⁠Rebecca Cradick⁠</a>, VP of Global Communications at <a href="https://www.armis.com/">⁠Armis⁠</a>, is joined by <a href="https://www.linkedin.com/in/curtis-simpson-8156326b/">⁠Curtis Simpson⁠</a>, CISO at Armis, to dive deep into the rise of the “Hive Mind”: the collective, connected threat ecosystem where attackers share tools, data, and tactics across the dark web, evolving faster than ever through AI-powered reconnaissance and automation.</p>
<p>This is essential listening for anyone seeking to better understand how today’s adversaries no longer operate alone, but as a distributed learning network that observes, adapts, and strikes with speed and precision. Tune in now to learn how organizations can think upside down, harness AI, and build defenses that move at the speed of today’s threats - before the shadows reach your network.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1492</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dac9f74e-1c7a-11f0-85e0-c70b2581f58c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8303236781.mp3?updated=1769626828" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Confronting China’s Expanding Cyber Threats [Threat Vector]</title>
      <link>https://thecyberwire.com/podcasts/threat-vector/65/notes</link>
      <description>While our team is out on winter break, please enjoy this episode of Threat Vector from our partners at Palo Alto Networks. 



In this episode of Threat Vector, host David Moulton talks with Wendi Whitmore, Chief Security Intelligence Officer at Palo Alto Networks, about the increasing scale of China-linked cyber threats and the vulnerabilities in outdated OT environments. 

Wendi shares critical insights on how nation-state threats have evolved, why AI must be part of modern defense strategies, and the importance of real-time intelligence sharing. They also dive into scenario planning as a key to resilience. If you want to know how cybersecurity leaders are preparing for the next wave of threats, this episode is a must-listen.

From the show:


  
ASEAN Entities in the Spotlight: Chinese APT Group Targeting



  
Preparing for a Secure Paris 2024



  
Unit 42 Predicts the Year of Disruption and Other Top Threats in 2025



  
FBI talks about how China is testing AI in cyberattacks




Hear more from Wendi Whitmore on Threat Vector:


  
Episode 5: From Nation States to Cybercriminals




﻿Join the conversation on our social media channels:


  
Website:⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠


  
Threat Research:⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠


  
Facebook:⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠


  
LinkedIn:⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠


  
YouTube:⁠ ⁠⁠@paloaltonetworks⁠


  
Twitter:⁠ ⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠



About Threat Vector

Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.



Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠ ⁠http://paloaltonetworks.com⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 01 Jan 2026 07:00:00 -0000</pubDate>
      <itunes:title>Confronting China’s Expanding Cyber Threats [Threat Vector]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>65</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/2d1a9aa8-d9e5-11f0-a81c-f71034c38c2f/image/f3296217a0160b9e4766149adb9f702e.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>While our team is out on winter break, please enjoy this episode of Threat Vector from our partners at Palo Alto Networks. 



In this episode of Threat Vector, host David Moulton talks with Wendi Whitmore, Chief Security Intelligence Officer at Palo Alto Networks, about the increasing scale of China-linked cyber threats and the vulnerabilities in outdated OT environments. 

Wendi shares critical insights on how nation-state threats have evolved, why AI must be part of modern defense strategies, and the importance of real-time intelligence sharing. They also dive into scenario planning as a key to resilience. If you want to know how cybersecurity leaders are preparing for the next wave of threats, this episode is a must-listen.

From the show:


  
ASEAN Entities in the Spotlight: Chinese APT Group Targeting



  
Preparing for a Secure Paris 2024



  
Unit 42 Predicts the Year of Disruption and Other Top Threats in 2025



  
FBI talks about how China is testing AI in cyberattacks




Hear more from Wendi Whitmore on Threat Vector:


  
Episode 5: From Nation States to Cybercriminals




﻿Join the conversation on our social media channels:


  
Website:⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠


  
Threat Research:⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠


  
Facebook:⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠


  
LinkedIn:⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠


  
YouTube:⁠ ⁠⁠@paloaltonetworks⁠


  
Twitter:⁠ ⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠



About Threat Vector

Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.



Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠ ⁠http://paloaltonetworks.com⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While our team is out on winter break, please enjoy this episode of Threat Vector from our partners at Palo Alto Networks. </strong></em></p>
<p><br></p>
<p>In this episode of <strong>Threat Vector</strong>, host <a href="https://www.linkedin.com/in/davidrmoulton/"><u>David Moulton</u></a> talks with <a href="https://www.linkedin.com/in/wendiwhitmore2/"><u>Wendi Whitmore</u></a>, Chief Security Intelligence Officer at Palo Alto Networks, about the increasing scale of China-linked cyber threats and the vulnerabilities in outdated OT environments. </p>
<p>Wendi shares critical insights on how nation-state threats have evolved, why AI must be part of modern defense strategies, and the importance of real-time intelligence sharing. They also dive into scenario planning as a key to resilience. If you want to know how cybersecurity leaders are preparing for the next wave of threats, this episode is a must-listen.</p>
<p><strong>From the show:</strong></p>
<ul>
  <li>
<p><a href="https://unit42.paloaltonetworks.com/chinese-apts-target-asean-entities/"><u>ASEAN Entities in the Spotlight: Chinese APT Group Targeting</u></a></p>
</li>
  <li>
<p><a href="https://www.paloaltonetworks.com/unit42/threats-to-paris"><u>Preparing for a Secure Paris 2024</u></a></p>
</li>
  <li>
<p><a href="https://www.paloaltonetworks.com/blog/2024/11/unit-42-predicts-top-threats-in-2025/"><u>Unit 42 Predicts the Year of Disruption and Other Top Threats in 2025</u></a></p>
</li>
  <li>
<p><a href="https://www.theregister.com/2025/04/29/fbi_china_ai/"><u>FBI talks about how China is testing AI in cyberattacks</u></a></p>
</li>
</ul>
<p><strong>Hear more from Wendi Whitmore on Threat Vector:</strong></p>
<ul>
  <li>
<p><a href="https://thecyberwire.com/podcasts/threat-vector/5/notes"><u>Episode 5: From Nation States to Cybercriminals</u></a></p>
</li>
</ul>
<p>﻿Join the conversation on our social media channels:</p>
<ul>
  <li>
<strong>Website</strong>:<a href="https://www.paloaltonetworks.com/unit42">⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠</a>
</li>
  <li>
<strong>Threat Research:</strong><a href="https://unit42.paloaltonetworks.com/">⁠<strong> </strong>⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠</a>
</li>
  <li>
<strong>Facebook:</strong><a href="https://www.facebook.com/LifeatPaloAltoNetworks/">⁠<strong> </strong>⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠</a>
</li>
  <li>
<strong>LinkedIn:</strong><a href="https://www.linkedin.com/company/unit42/">⁠<strong> </strong>⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠</a>
</li>
  <li>
<strong>YouTube:</strong><a href="https://www.youtube.com/channel/UCvJQO11qoCHYwZ4Ah4Jf-Tw">⁠<u><strong> </strong></u>⁠</a><a href="https://www.youtube.com/paloaltonetworks">⁠@paloaltonetworks⁠</a>
</li>
  <li>
<strong>Twitter:</strong><a href="https://twitter.com/PaloAltoNtwks">⁠<strong> </strong>⁠⁠⁠⁠⁠</a><a href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0">⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠</a>
</li>
</ul>
<p><strong>About Threat Vector</strong></p>
<p>Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.</p>
<p>The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.</p>
<p>Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.</p>
<p><br></p>
<p><strong>Palo Alto Networks</strong></p>
<p>Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.<a href="http://paloaltonetworks.com/">⁠ ⁠http://paloaltonetworks.com⁠</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1375</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2d1a9aa8-d9e5-11f0-a81c-f71034c38c2f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7083624054.mp3?updated=1746030836" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lorrie Cranor: Why Security Fails Real People [Afternoon Cyber Tea]</title>
      <link>https://thecyberwire.com/podcasts/afternoon-cyber-tea/121/notes</link>
      <description>While our team is out on winter break, please enjoy this episode of Afternoon Cyber Tea with Ann Johnson from our partners at Microsoft Security.



Dr. Lorrie Cranor, Director of the CyLab Security and Privacy Institute at Carnegie Mellon University joins Ann Johnson, Corporate Vice President, Microsoft, on this week's episode of Afternoon Cyber Tea to discuss the critical gap between security design and real-world usability. They explore why security tools often fail users, the ongoing challenges with passwords and password less authentication, and how privacy expectations have evolved in an era of constant data collection. Dr. Cranor emphasizes the importance of user-centered design, practical research, behavioral insights, and simpler, more transparent systems to help CISOs build security programs that truly work for people. 

 

Resources:  

View Lorrie Cranor on LinkedIn            

View Ann Johnson on LinkedIn   

  

Related Microsoft Podcasts:  


  
Microsoft Threat Intelligence Podcast  





  
The BlueHat Podcast   





  
Uncovering Hidden Risks  




Discover and follow other Microsoft podcasts at microsoft.com/podcasts  



  

Afternoon Cyber Tea with Ann Johnson is produced by Microsoft, Hangar Studios and distributed as part of N2K media network. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 31 Dec 2025 06:00:00 -0000</pubDate>
      <itunes:title>Lorrie Cranor: Why Security Fails Real People [Afternoon Cyber Tea]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>121</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ed2dc134-db99-11f0-8781-e3dbb58b362e/image/ed00429bcecd5833f3314805321b8c25.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>While our team is out on winter break, please enjoy this episode of Afternoon Cyber Tea with Ann Johnson from our partners at Microsoft Security.



Dr. Lorrie Cranor, Director of the CyLab Security and Privacy Institute at Carnegie Mellon University joins Ann Johnson, Corporate Vice President, Microsoft, on this week's episode of Afternoon Cyber Tea to discuss the critical gap between security design and real-world usability. They explore why security tools often fail users, the ongoing challenges with passwords and password less authentication, and how privacy expectations have evolved in an era of constant data collection. Dr. Cranor emphasizes the importance of user-centered design, practical research, behavioral insights, and simpler, more transparent systems to help CISOs build security programs that truly work for people. 

 

Resources:  

View Lorrie Cranor on LinkedIn            

View Ann Johnson on LinkedIn   

  

Related Microsoft Podcasts:  


  
Microsoft Threat Intelligence Podcast  





  
The BlueHat Podcast   





  
Uncovering Hidden Risks  




Discover and follow other Microsoft podcasts at microsoft.com/podcasts  



  

Afternoon Cyber Tea with Ann Johnson is produced by Microsoft, Hangar Studios and distributed as part of N2K media network. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While our team is out on winter break, please enjoy this episode of Afternoon Cyber Tea with Ann Johnson from our partners at Microsoft Security.</strong></em></p>
<p><br></p>
<p><a href="https://www.linkedin.com/in/lorriecranor/"><u>Dr. Lorrie Cranor</u></a>, Director of the CyLab Security and Privacy Institute at Carnegie Mellon University joins Ann Johnson, Corporate Vice President, Microsoft, on this week's episode of Afternoon Cyber Tea to discuss the critical gap between security design and real-world usability. They explore why security tools often fail users, the ongoing challenges with passwords and password less authentication, and how privacy expectations have evolved in an era of constant data collection. Dr. Cranor emphasizes the importance of user-centered design, practical research, behavioral insights, and simpler, more transparent systems to help CISOs build security programs that truly work for people. </p>
<p> </p>
<p>Resources:  </p>
<p><a href="https://www.linkedin.com/in/lorriecranor/"><u>View </u></a><a href="https://www.linkedin.com/in/lorriecranor/"><u>Lorrie Cranor on LinkedIn</u></a>            </p>
<p><a href="https://www.linkedin.com/in/ann-johnsons/"><u>View Ann Johnson on LinkedIn</u></a>   </p>
<p>  </p>
<p>Related Microsoft Podcasts:  </p>
<ul>
  <li>
<p><a href="https://msthreatintelpodcast.com/"><u>Microsoft Threat Intelligence Podcast</u></a>  </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://bluehatpodcast.com/"><u>The BlueHat Podcast</u></a>   </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://uncoveringhiddenrisks.com/"><u>Uncovering Hidden Risks</u></a>  </p>
</li>
</ul>
<p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> </a><a href="https://news.microsoft.com/podcasts/"><u>microsoft.com/podcasts</u></a>  </p>
<p><br></p>
<p>  </p>
<p><em>Afternoon Cyber Tea with Ann Johnson is produced by Microsoft, Hangar Studios and distributed as part of N2K media network. </em></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1425</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ed2dc134-db99-11f0-8781-e3dbb58b362e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4042242611.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The New Frontlines of Cybersecurity: Lessons from the 2025 Digital Defense Report [Microsoft Threat Intelligence Podcast]</title>
      <description>While our team is out on winter break, please enjoy this episode of The Microsoft Threat Intelligence Podcast from our partners at Microsoft. 



In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Chloé Messdaghi and Crane Hassold to unpack the key findings of the 2025 Microsoft Digital Defense Report; a comprehensive look at how the cyber threat landscape is accelerating through AI, automation, and industrialized criminal networks. 

They explore how nation-state operations and cybercrime have fused into a continuous cycle of attack and adaptation, with actors sharing tooling, infrastructure, and even business models. The conversation also examines AI’s growing impact, from deepfakes and influence operations to the defensive promise of AI-powered detection, and how identity compromise has become the front door to most intrusions, accounting for over 99% of observed attacks. 



Listeners will gain perspective on: 


  
How AI is shaping both attacker tradecraft and defensive response. 





  
Why identity remains the cornerstone of global cyber risk. 





  
What Microsoft’s telemetry—spanning 600 million daily attacks—reveals about emerging threats and evolving defender strategies. 




Questions explored: 


  
How are threat actors using AI to scale deception and influence operations? 





  
What does industrialized cybercrime mean for organizations trying to defend at scale? 





  
How can defenders harness AI responsibly without overreliance or exposure? 




 

Resources:  


  
Download the report and executive summary 





  
Register for Microsoft Ignite 





  
View Chloé Messdaghi on LinkedIn 





  
View Crane Hassold on LinkedIn 





  
View Sherrod DeGrippo on LinkedIn  




Related Microsoft Podcasts:                   


  
Afternoon Cyber Tea with Ann Johnson 





  
The BlueHat Podcast 





  
Uncovering Hidden Risks     




 

Discover and follow other Microsoft podcasts at microsoft.com/podcasts  

 

Get the latest threat intelligence insights and guidance at Microsoft Security Insider 

 

The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Dec 2025 10:00:00 -0000</pubDate>
      <itunes:title>The New Frontlines of Cybersecurity: Lessons from the 2025 Digital Defense Report [Microsoft Threat Intelligence Podcast]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>55</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a9ecf1ec-d9fa-11f0-b6c5-77febcd7b1f8/image/de42cff255e7436f87668db0949201cb.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>While our team is out on winter break, please enjoy this episode of The Microsoft Threat Intelligence Podcast from our partners at Microsoft. 



In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Chloé Messdaghi and Crane Hassold to unpack the key findings of the 2025 Microsoft Digital Defense Report; a comprehensive look at how the cyber threat landscape is accelerating through AI, automation, and industrialized criminal networks. 

They explore how nation-state operations and cybercrime have fused into a continuous cycle of attack and adaptation, with actors sharing tooling, infrastructure, and even business models. The conversation also examines AI’s growing impact, from deepfakes and influence operations to the defensive promise of AI-powered detection, and how identity compromise has become the front door to most intrusions, accounting for over 99% of observed attacks. 



Listeners will gain perspective on: 


  
How AI is shaping both attacker tradecraft and defensive response. 





  
Why identity remains the cornerstone of global cyber risk. 





  
What Microsoft’s telemetry—spanning 600 million daily attacks—reveals about emerging threats and evolving defender strategies. 




Questions explored: 


  
How are threat actors using AI to scale deception and influence operations? 





  
What does industrialized cybercrime mean for organizations trying to defend at scale? 





  
How can defenders harness AI responsibly without overreliance or exposure? 




 

Resources:  


  
Download the report and executive summary 





  
Register for Microsoft Ignite 





  
View Chloé Messdaghi on LinkedIn 





  
View Crane Hassold on LinkedIn 





  
View Sherrod DeGrippo on LinkedIn  




Related Microsoft Podcasts:                   


  
Afternoon Cyber Tea with Ann Johnson 





  
The BlueHat Podcast 





  
Uncovering Hidden Risks     




 

Discover and follow other Microsoft podcasts at microsoft.com/podcasts  

 

Get the latest threat intelligence insights and guidance at Microsoft Security Insider 

 

The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While our team is out on winter break, please enjoy this episode of The Microsoft Threat Intelligence Podcast from our partners at Microsoft. </strong></em></p>
<p><br></p>
<p>In this episode of the <em>Microsoft Threat Intelligence Podcast</em>, host Sherrod DeGrippo is joined by Chloé Messdaghi and Crane Hassold to unpack the key findings of the 2025 Microsoft Digital Defense Report; a comprehensive look at how the cyber threat landscape is accelerating through AI, automation, and industrialized criminal networks. </p>
<p>They explore how nation-state operations and cybercrime have fused into a continuous cycle of attack and adaptation, with actors sharing tooling, infrastructure, and even business models. The conversation also examines AI’s growing impact, from deepfakes and influence operations to the defensive promise of AI-powered detection, and how identity compromise has become the front door to most intrusions, accounting for over 99% of observed attacks. </p>
<p><br></p>
<p>Listeners will gain perspective on: </p>
<ul>
  <li>
<p>How AI is shaping both attacker tradecraft and defensive response. </p>
</li>
</ul>
<ul>
  <li>
<p>Why identity remains the cornerstone of global cyber risk. </p>
</li>
</ul>
<ul>
  <li>
<p>What Microsoft’s telemetry—spanning 600 million daily attacks—reveals about emerging threats and evolving defender strategies. </p>
</li>
</ul>
<p>Questions explored: </p>
<ul>
  <li>
<p>How are threat actors using AI to scale deception and influence operations? </p>
</li>
</ul>
<ul>
  <li>
<p>What does industrialized cybercrime mean for organizations trying to defend at scale? </p>
</li>
</ul>
<ul>
  <li>
<p>How can defenders harness AI responsibly without overreliance or exposure? </p>
</li>
</ul>
<p> </p>
<p>Resources:  </p>
<ul>
  <li>
<p><a href="https://aka.ms/mddr-security"><u>Download the report and executive summary</u></a> </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://ignite.microsoft.com/"><u>Register for Microsoft Ignite</u></a> </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://www.linkedin.com/in/chloemessdaghi/?utm_source=chatgpt.com"><u>View Chloé Messdaghi on LinkedIn</u></a> </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://www.linkedin.com/in/cranehassold/?utm_source=chatgpt.com"><u>View Crane Hassold on LinkedIn</u></a> </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://www.linkedin.com/in/sherroddegrippo/"><u>View Sherrod DeGrippo on LinkedIn</u></a>  </p>
</li>
</ul>
<p>Related Microsoft Podcasts:                   </p>
<ul>
  <li>
<p><a href="https://afternooncybertea.com/"><u>Afternoon Cyber Tea with Ann Johnson</u></a> </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://bluehatpodcast.com/"><u>The BlueHat Podcast</u></a> </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://uncoveringhiddenrisks.com/"><u>Uncovering Hidden Risks</u></a>     </p>
</li>
</ul>
<p> </p>
<p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> </a><a href="https://news.microsoft.com/podcasts/"><u>microsoft.com/podcasts</u></a>  </p>
<p> </p>
<p>Get the latest threat intelligence insights and guidance at Microsoft <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fsecurity-insider%2F&amp;data=05%7C02%7Cv-ropetrillo%40microsoft.com%7C81e205a6b727403624b808dc64a26e6b%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638495896032091649%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=LTpBsEuiaY5YiYn2FYDydHrHkYWl%2FBTl2uAQlkBz1N0%3D&amp;reserved=0"><u>Security Insider</u></a> </p>
<p> </p>
<p><em>The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.</em> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2849</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a9ecf1ec-d9fa-11f0-b6c5-77febcd7b1f8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1300322603.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Season finale: Leading security in a brave new world. [CISOP]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/123/notes</link>
      <description>In the season finale of CSO Perspectives, Ethan Cook and Kim Jones reflect on a season of conversations exploring what it means to lead security in a rapidly evolving “brave new world.” From the realities behind AI hype and the slow-burn impact of quantum computing to the business forces shaping cybersecurity innovation, they revisit key lessons and lingering challenges facing today’s CISOs. The episode closes with an optimistic—but candid—look at why fundamentals, critical thinking, and leadership still matter as the industry moves forward.

Want more CISO Perspectives?

Check out companion ⁠⁠blog post⁠⁠s by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements episodes throughout the season.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Dec 2025 07:00:00 -0000</pubDate>
      <itunes:title>Season finale: Leading security in a brave new world. [CISOP]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>123</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5e86f666-d9ec-11f0-8a61-3b434edc70be/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In the season finale of CSO Perspectives, Ethan Cook and Kim Jones reflect on a season of conversations exploring what it means to lead security in a rapidly evolving “brave new world.” From the realities behind AI hype and the slow-burn impact of quantum computing to the business forces shaping cybersecurity innovation, they revisit key lessons and lingering challenges facing today’s CISOs. The episode closes with an optimistic—but candid—look at why fundamentals, critical thinking, and leadership still matter as the industry moves forward.

Want more CISO Perspectives?

Check out companion ⁠⁠blog post⁠⁠s by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements episodes throughout the season.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In the season finale of <em>CSO Perspectives</em>, Ethan Cook and Kim Jones reflect on a season of conversations exploring what it means to lead security in a rapidly evolving “brave new world.” From the realities behind AI hype and the slow-burn impact of quantum computing to the business forces shaping cybersecurity innovation, they revisit key lessons and lingering challenges facing today’s CISOs. The episode closes with an optimistic—but candid—look at why fundamentals, critical thinking, and leadership still matter as the industry moves forward.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out companion ⁠⁠<a href="https://thecyberwire.com/stories">blog post⁠⁠s</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements episodes throughout the season.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2639</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5e86f666-d9ec-11f0-8a61-3b434edc70be]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6814564670.mp3?updated=1765827134" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Hidden Risk in Your Stack [Data Security Decoded]</title>
      <link>https://thecyberwire.com/podcasts/data-security-decoded/41/notes</link>
      <description>While our team is out on winter break, please enjoy this episode of Data Security Decoded from our partners at Rubrik. 



In this episode of Data Security Decoded, host Caleb Tolin sits down with Hayden Smith, CEO of Hunted Labs, as he breaks down how software supply chain attacks really work, why open source dependencies create unseen exposure, and what modern threat actors are doing to exploit trust at scale. Caleb and Hayden dive deep into real-world attacks, emerging TTPs, AI-powered threat hunting, and what organizations must do today to keep pace. Listeners walk away with a clear picture of the problem—and a practical blueprint for reducing supply chain risk.

What You’ll Learn 


  
How modern attackers infiltrate open source ecosystems through fake accounts and counterfeit package contributions.



  
Why dependency chains dramatically amplify both exposure and attacker leverage.



  
How to use threat intelligence and threat hunting to proactively evaluate upstream packages before adoption.



  
Where AI-powered code analysis is changing the ability to discover hidden vulnerabilities and suspicious patterns.



  
Why dependency pinning, SBOM discipline, and continuous monitoring now define a strong supply chain posture.



Episode Highlights 

00:00 — Welcome + Why Software Supply Chain Risk Matters 

02:00 — Hayden’s Non-Cyber Passion + Framing Today’s Topic 

03:00 — Why Open Source Powers Everything—and Why That Creates Exposure 

06:00 — The Real Attack Vector: Contribution as Initial Access 

08:00 — Inside the Indonesian “Fake Package” Campaign 

10:30 — How to Evaluate Code + Contributor Identity Together 

12:00 — Threat Hunting and AI-Enabled Code Interrogation 

15:00 — The Challenge of Undisclosed Vulnerabilities in Widely Used Components 

16:30 — How Recovery Works When Malware Is Already in Your Stack

19:00 — Continuous Monitoring as the Foundation of Modern Supply Chain Security 

22:00 — Pinning, Maintainer Analysis, and Code Interrogation Best Practices 

24:00 — Where to Learn More About Hunted Labs



Episode Resources


  
Hunted Labs — https://huntedlabs.com



  
Hunted Labs Entercept



  
Hunted Labs “Hunting Ground” research blog



  
Open Source Malware (Paul McCarty)







Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 29 Dec 2025 07:00:00 -0000</pubDate>
      <itunes:title>The Hidden Risk in Your Stack [Data Security Decoded]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>41</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c7f31618-d9e5-11f0-9bdd-337d9801e671/image/5f1028ae9326e13e44c1be8b0d4f87e2.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle> Open Source Supply Chain Exposure</itunes:subtitle>
      <itunes:summary>While our team is out on winter break, please enjoy this episode of Data Security Decoded from our partners at Rubrik. 



In this episode of Data Security Decoded, host Caleb Tolin sits down with Hayden Smith, CEO of Hunted Labs, as he breaks down how software supply chain attacks really work, why open source dependencies create unseen exposure, and what modern threat actors are doing to exploit trust at scale. Caleb and Hayden dive deep into real-world attacks, emerging TTPs, AI-powered threat hunting, and what organizations must do today to keep pace. Listeners walk away with a clear picture of the problem—and a practical blueprint for reducing supply chain risk.

What You’ll Learn 


  
How modern attackers infiltrate open source ecosystems through fake accounts and counterfeit package contributions.



  
Why dependency chains dramatically amplify both exposure and attacker leverage.



  
How to use threat intelligence and threat hunting to proactively evaluate upstream packages before adoption.



  
Where AI-powered code analysis is changing the ability to discover hidden vulnerabilities and suspicious patterns.



  
Why dependency pinning, SBOM discipline, and continuous monitoring now define a strong supply chain posture.



Episode Highlights 

00:00 — Welcome + Why Software Supply Chain Risk Matters 

02:00 — Hayden’s Non-Cyber Passion + Framing Today’s Topic 

03:00 — Why Open Source Powers Everything—and Why That Creates Exposure 

06:00 — The Real Attack Vector: Contribution as Initial Access 

08:00 — Inside the Indonesian “Fake Package” Campaign 

10:30 — How to Evaluate Code + Contributor Identity Together 

12:00 — Threat Hunting and AI-Enabled Code Interrogation 

15:00 — The Challenge of Undisclosed Vulnerabilities in Widely Used Components 

16:30 — How Recovery Works When Malware Is Already in Your Stack

19:00 — Continuous Monitoring as the Foundation of Modern Supply Chain Security 

22:00 — Pinning, Maintainer Analysis, and Code Interrogation Best Practices 

24:00 — Where to Learn More About Hunted Labs



Episode Resources


  
Hunted Labs — https://huntedlabs.com



  
Hunted Labs Entercept



  
Hunted Labs “Hunting Ground” research blog



  
Open Source Malware (Paul McCarty)







Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While our team is out on winter break, please enjoy this episode of Data Security Decoded from our partners at Rubrik. </strong></em></p>
<p><br></p>
<p>In this episode of <em>Data Security Decoded</em>, host <a href="https://www.linkedin.com/in/calebtolin/"><u>Caleb Tolin</u></a> sits down with <a href="https://www.linkedin.com/in/hayden-smith-huntedlabs/"><u>Hayden Smith</u></a>, CEO of <a href="https://huntedlabs.com/"><u>Hunted Labs</u></a>, as he breaks down how software supply chain attacks really work, why open source dependencies create unseen exposure, and what modern threat actors are doing to exploit trust at scale. Caleb and Hayden dive deep into real-world attacks, emerging TTPs, AI-powered threat hunting, and what organizations must do today to keep pace. Listeners walk away with a clear picture of the problem—and a practical blueprint for reducing supply chain risk.</p>
<p><br><strong>What You’ll Learn </strong></p>
<ul>
  <li>
<p>How modern attackers infiltrate open source ecosystems through fake accounts and counterfeit package contributions.<br></p>
</li>
  <li>
<p>Why dependency chains dramatically amplify both exposure and attacker leverage.<br></p>
</li>
  <li>
<p>How to use threat intelligence and threat hunting to proactively evaluate upstream packages before adoption.<br></p>
</li>
  <li>
<p>Where AI-powered code analysis is changing the ability to discover hidden vulnerabilities and suspicious patterns.<br></p>
</li>
  <li>
<p>Why dependency pinning, SBOM discipline, and continuous monitoring now define a strong supply chain posture.</p>
<p><br></p>
<p><strong>Episode Highlights </strong></p>
<p>00:00 — Welcome + Why Software Supply Chain Risk Matters </p>
<p>02:00 — Hayden’s Non-Cyber Passion + Framing Today’s Topic </p>
<p>03:00 — Why Open Source Powers Everything—and Why That Creates Exposure </p>
<p>06:00 — The Real Attack Vector: Contribution as Initial Access </p>
<p>08:00 — Inside the Indonesian “Fake Package” Campaign </p>
<p>10:30 — How to Evaluate Code + Contributor Identity Together </p>
<p>12:00 — Threat Hunting and AI-Enabled Code Interrogation </p>
<p>15:00 — The Challenge of Undisclosed Vulnerabilities in Widely Used Components </p>
<p>16:30 — How Recovery Works When Malware Is Already in Your Stack</p>
<p>19:00 — Continuous Monitoring as the Foundation of Modern Supply Chain Security </p>
<p>22:00 — Pinning, Maintainer Analysis, and Code Interrogation Best Practices </p>
<p>24:00 — Where to Learn More About Hunted Labs</p>
<p><br></p>
<p><strong>Episode Resources</strong></p>
<ul>
  <li>
<p>Hunted Labs —<a href="https://huntedlabs.com"> <u>https://huntedlabs.com</u><br></a></p>
</li>
  <li>
<p><a href="https://huntedlabs.com/container-security/?gad_source=1&amp;gad_campaignid=22446051098&amp;gbraid=0AAAAAo7VeyjhRTADzEWEi_Lnf6j82Vq-z&amp;gclid=CjwKCAiAuIDJBhBoEiwAxhgyFvvxShHuPj87SP5anXULPjuYz3p_ry5NkttAYKtqBnRqoooOaGYDcxoC5bsQAvD_BwE"><u>Hunted Labs Entercept</u><br></a></p>
</li>
  <li>
<p><a href="https://huntedlabs.com/the-hunting-ground/"><u>Hunted Labs “Hunting Ground” research blog</u><br></a></p>
</li>
  <li>
<p><a href="https://opensourcemalware.com/"><u>Open Source Malware (Paul McCarty)</u></a></p>
</li>
</ul>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1632</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7f31618-d9e5-11f0-9bdd-337d9801e671]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9347632806.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Charity Wright: Pursue what you love. [Threat intelligence] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/101/notes</link>
      <description>While our team is out on winter break, please enjoy this episode of Career Notes. 

Threat intelligence analyst at Recorded Future, Charity Wright, shares her story from the army to her career today. Transitioning from the army to cybersecurity was an exciting change for her. During college she was recruited by the U.S. army where she started her journey and learned new skills paving her pathway to threat intelligence where she is now. She shares that she works with a great team of junior analysts who are constantly checking each others' biases which helps keep Charity grounded in her work. Charity spends her days keeping an eye on threats around the world where she says there is never a dull day in her line of work. We thank Charity for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 28 Dec 2025 08:00:00 -0000</pubDate>
      <itunes:title>Charity Wright: Pursue what you love. [Threat intelligence] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>101</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a8a2b778-da1c-11f0-95e0-6ffc2bf87fed/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>While our team is out on winter break, please enjoy this episode of Career Notes. 

Threat intelligence analyst at Recorded Future, Charity Wright, shares her story from the army to her career today. Transitioning from the army to cybersecurity was an exciting change for her. During college she was recruited by the U.S. army where she started her journey and learned new skills paving her pathway to threat intelligence where she is now. She shares that she works with a great team of junior analysts who are constantly checking each others' biases which helps keep Charity grounded in her work. Charity spends her days keeping an eye on threats around the world where she says there is never a dull day in her line of work. We thank Charity for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While our team is out on winter break, please enjoy this episode of Career Notes. </strong></em></p>
<p>Threat intelligence analyst at Recorded Future, Charity Wright, shares her story from the army to her career today. Transitioning from the army to cybersecurity was an exciting change for her. During college she was recruited by the U.S. army where she started her journey and learned new skills paving her pathway to threat intelligence where she is now. She shares that she works with a great team of junior analysts who are constantly checking each others' biases which helps keep Charity grounded in her work. Charity spends her days keeping an eye on threats around the world where she says there is never a dull day in her line of work. We thank Charity for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>590</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a8a2b778-da1c-11f0-95e0-6ffc2bf87fed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2805153942.mp3?updated=1735936621" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Excel-lerating cyberattacks. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/370/notes</link>
      <description>While our team is out on winter break, please enjoy this episode of Research Saturday.

This week, we are joined by ⁠Tom Hegel⁠, Principal Threat Researcher from ⁠SentinelLabs⁠ research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belarusian government espionage, is actively targeting Ukrainian military and government entities as well as Belarusian opposition activists using weaponized Excel documents. 

SentinelLabs identified new malware variants and tactics, including obfuscated VBA macros that deploy malware via DLL files, with payload delivery seemingly controlled based on a target’s location and system profile. The campaign, which began preparation in mid-2024 and became active by late 2024, appears to be an evolution of previous Ghostwriter operations, combining disinformation with cyberattacks to further political and military objectives.

The research can be found here:


  ⁠Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Dec 2025 08:00:00 -0000</pubDate>
      <itunes:title>Excel-lerating cyberattacks. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>370</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/41e40b60-da1a-11f0-9a8a-2badb896a8d6/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>While our team is out on winter break, please enjoy this episode of Research Saturday.

This week, we are joined by ⁠Tom Hegel⁠, Principal Threat Researcher from ⁠SentinelLabs⁠ research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belarusian government espionage, is actively targeting Ukrainian military and government entities as well as Belarusian opposition activists using weaponized Excel documents. 

SentinelLabs identified new malware variants and tactics, including obfuscated VBA macros that deploy malware via DLL files, with payload delivery seemingly controlled based on a target’s location and system profile. The campaign, which began preparation in mid-2024 and became active by late 2024, appears to be an evolution of previous Ghostwriter operations, combining disinformation with cyberattacks to further political and military objectives.

The research can be found here:


  ⁠Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While our team is out on winter break, please enjoy this episode of Research Saturday.</strong></em></p>
<p>This week, we are joined by <a href="https://www.linkedin.com/in/tom-hegel/">⁠Tom Hegel⁠</a>, Principal Threat Researcher from <a href="https://www.linkedin.com/company/sentinelone/">⁠SentinelLabs⁠</a> research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belarusian government espionage, is actively targeting Ukrainian military and government entities as well as Belarusian opposition activists using weaponized Excel documents. </p>
<p>SentinelLabs identified new malware variants and tactics, including obfuscated VBA macros that deploy malware via DLL files, with payload delivery seemingly controlled based on a target’s location and system profile. The campaign, which began preparation in mid-2024 and became active by late 2024, appears to be an evolution of previous Ghostwriter operations, combining disinformation with cyberattacks to further political and military objectives.</p>
<p>The research can be found here:</p>
<ul>
  <li><a href="https://www.sentinelone.com/labs/ghostwriter-new-campaign-targets-ukrainian-government-and-belarusian-opposition/">⁠Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1423</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[41e40b60-da1a-11f0-9a8a-2badb896a8d6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4854437908.mp3?updated=1765847027" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Beyond cyber: Securing the next horizon. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/83/notes</link>
      <description>While our team is out on winter break, please enjoy this Special Edition episode. 

Cybersecurity is no longer confined to the digital world or just a technical challenge, it’s a global imperative. The ⁠NightDragon Innovation Summit⁠ convened a group of industry leaders to discuss how public and private entities can work together to address emerging threats and harness the power of AI, cybersecurity, and innovation to strengthen national defense.

In this special edition podcast, we capture a glimpse into the knowledge and expertise shared at the NightDragon Innovation Summit. We are joined by ⁠NightDragon⁠ Founder and CEO ⁠Dave DeWalt⁠, ⁠DataBee⁠ CEO ⁠Nicole Bucala⁠, ⁠Liberty Mutual Insurance⁠ EVP and CISO ⁠Katie Jenkins⁠, Sophos CEO ⁠Joe Levy⁠, and ⁠Dataminr⁠ VP of Sales Engineering ⁠Michael Mastrole⁠. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 26 Dec 2025 06:00:00 -0000</pubDate>
      <itunes:title>Beyond cyber: Securing the next horizon. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>83</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/d9fecede-1c7a-11f0-85e0-97f5c0d068ec/image/0216c9cea15c53e5d2c739964a38623c.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>While our team is out on winter break, please enjoy this Special Edition episode. 

Cybersecurity is no longer confined to the digital world or just a technical challenge, it’s a global imperative. The ⁠NightDragon Innovation Summit⁠ convened a group of industry leaders to discuss how public and private entities can work together to address emerging threats and harness the power of AI, cybersecurity, and innovation to strengthen national defense.

In this special edition podcast, we capture a glimpse into the knowledge and expertise shared at the NightDragon Innovation Summit. We are joined by ⁠NightDragon⁠ Founder and CEO ⁠Dave DeWalt⁠, ⁠DataBee⁠ CEO ⁠Nicole Bucala⁠, ⁠Liberty Mutual Insurance⁠ EVP and CISO ⁠Katie Jenkins⁠, Sophos CEO ⁠Joe Levy⁠, and ⁠Dataminr⁠ VP of Sales Engineering ⁠Michael Mastrole⁠. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While our team is out on winter break, please enjoy this Special Edition episode. </strong></em></p>
<p>Cybersecurity is no longer confined to the digital world or just a technical challenge, it’s a global imperative. The <a href="https://gatsby.events/night-dragon/rsvp/register?e=night-dragon-innovation-summit-2025">⁠NightDragon Innovation Summit⁠</a> convened a group of industry leaders to discuss how public and private entities can work together to address emerging threats and harness the power of AI, cybersecurity, and innovation to strengthen national defense.</p>
<p>In this special edition podcast, we capture a glimpse into the knowledge and expertise shared at the NightDragon Innovation Summit. We are joined by <a href="https://www.nightdragon.com/">⁠NightDragon⁠</a> Founder and CEO <a href="https://www.linkedin.com/in/ddewalt/">⁠Dave DeWalt⁠</a>, <a href="https://www.databee.ai/">⁠DataBee⁠</a> CEO <a href="https://www.linkedin.com/in/nicole-bucala-33b951164/">⁠Nicole Bucala⁠</a>, <a href="https://www.libertymutualgroup.com/about-lm/corporate-information/overview">⁠Liberty Mutual Insurance⁠</a> EVP and CISO <a href="https://www.linkedin.com/in/katiec1/">⁠Katie Jenkins⁠</a>, Sophos CEO <a href="https://www.linkedin.com/in/j0313vy/">⁠Joe Levy⁠</a>, and <a href="https://www.dataminr.com/">⁠Dataminr⁠</a> VP of Sales Engineering <a href="https://www.linkedin.com/in/mastrole/">⁠Michael Mastrole⁠</a>. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3613</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d9fecede-1c7a-11f0-85e0-97f5c0d068ec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7642060461.mp3?updated=1765846779" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Yippee-ki-yay, cybercriminals! [OMITB]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/18/notes</link>
      <description>While our team is out on winter break, please enjoy this episode of Only Malware in the Building.

Welcome in! You’ve entered, Only Malware in the Building. Wrap yourself in a warm blanket, pour your favorite mug of tea, and join us each month as we unwrap the season’s juiciest cyber mysteries.  Your host is ⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we explore Remote access, real cargo: cybercriminals targeting trucking and logistics. From clever schemes to protect shipments to the tools cybercriminals use, our guests discuss how organizations can safeguard physical goods in an increasingly connected world—because even during the season of hustle and bustle, the threats don’t take a holiday.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 25 Dec 2025 06:00:00 -0000</pubDate>
      <itunes:title>Yippee-ki-yay, cybercriminals! [OMITB]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>18</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/d9d6431a-1c7a-11f0-85e0-2fef568f676e/image/14002263e169460f16ca12e04624eb3a.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>While our team is out on winter break, please enjoy this episode of Only Malware in the Building.

Welcome in! You’ve entered, Only Malware in the Building. Wrap yourself in a warm blanket, pour your favorite mug of tea, and join us each month as we unwrap the season’s juiciest cyber mysteries.  Your host is ⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we explore Remote access, real cargo: cybercriminals targeting trucking and logistics. From clever schemes to protect shipments to the tools cybercriminals use, our guests discuss how organizations can safeguard physical goods in an increasingly connected world—because even during the season of hustle and bustle, the threats don’t take a holiday.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While our team is out on winter break, please enjoy this episode of Only Malware in the Building.</strong></em></p>
<p>Welcome in! You’ve entered, Only Malware in the Building. Wrap yourself in a warm blanket, pour your favorite mug of tea, and join us each month as we unwrap the season’s juiciest cyber mysteries.  Your host is <a href="https://www.linkedin.com/in/selenalarson/">⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠</a>, <a href="https://www.proofpoint.com/">⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">⁠⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠⁠</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts <a href="https://www.n2k.com/">⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠</a> and <a href="https://www.linkedin.com/in/keith-mularski-b737551/">⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠</a>, former FBI cybercrime investigator and now Chief Global Ambassador at <a href="https://www.linkedin.com/company/qintel/">⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠</a>.</p>
<p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we explore Remote access, real cargo: cybercriminals targeting trucking and logistics. From clever schemes to protect shipments to the tools cybercriminals use, our guests discuss how organizations can safeguard physical goods in an increasingly connected world—because even during the season of hustle and bustle, the threats don’t take a holiday.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2418</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d9d6431a-1c7a-11f0-85e0-2fef568f676e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4366996059.mp3?updated=1765842418" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>And the Breachies go to…</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2460/notes</link>
      <description>In today’s episode, we dig into the Electronic Frontier Foundation’s annual Breachies, highlighting some of the year’s most avoidable, eye-opening, and sometimes head-shaking data breaches. From companies collecting far more data than they need to third-party missteps and quiet misconfigurations, the Breachies offer a revealing look at how familiar privacy failures keep repeating—and why they matter for users.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today’s we have a CyberWire holiday favorite: The 12 Days of Malware — with Dave and a lineup of cybersecurity friends gleefully rewriting The 12 Days of Christmas to celebrate malware, mishaps, and life online, one verse at a time.

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 24 Dec 2025 21:10:00 -0000</pubDate>
      <itunes:title>And the Breachies go to…</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2460</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In today’s episode, we dig into the Electronic Frontier Foundation’s annual Breachies, highlighting some of the year’s most avoidable, eye-opening, and sometimes head-shaking data breaches. From companies collecting far more data than they need to third-party missteps and quiet misconfigurations, the Breachies offer a revealing look at how familiar privacy failures keep repeating—and why they matter for users.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today’s we have a CyberWire holiday favorite: The 12 Days of Malware — with Dave and a lineup of cybersecurity friends gleefully rewriting The 12 Days of Christmas to celebrate malware, mishaps, and life online, one verse at a time.

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s episode, we dig into the Electronic Frontier Foundation’s annual <a href="https://www.eff.org/deeplinks/2025/12/breachies-2025-worst-weirdest-most-impactful-data-breaches-year"><u>Breachies</u></a>, highlighting some of the year’s most avoidable, eye-opening, and sometimes head-shaking data breaches. From companies collecting far more data than they need to third-party missteps and quiet misconfigurations, the Breachies offer a revealing look at how familiar privacy failures keep repeating—and why they matter for users.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today’s we have a CyberWire holiday favorite: <a href="https://youtu.be/t2lQDNgHru0">The 12 Days of Malware</a> — with Dave and a lineup of cybersecurity friends gleefully rewriting <em>The 12 Days of Christmas</em> to celebrate malware, mishaps, and life online, one verse at a time.</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1342</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[692cf23e-e01b-11f0-908f-ef0980d75296]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1826633127.mp3?updated=1766507726" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Eyes in the sky, red flags on the ground.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2459/notes</link>
      <description>The White House bans foreign-made drones. African law enforcement agencies crackdown on cybercrime. A new phishing campaign targets Russian military personnel and defense-related organizations. A University of Phoenix data breach affects about 3.5 million people. A pair of Chrome extensions covertly hijack user traffic. Romania’s national water authority suffered a ransomware attack. A cyberattack in France disrupts postal, identity, and banking services for millions of customers. NIST and MITRE announce a $20 million partnership for AI research centers. A think-tank says the U.S. needs to go on the cyber offensive. Tim Starks from CyberScoop discusses the passage of the defense Authorization Bill and a look back at 2025. In high school, it’s no child left unscanned.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Tim Starks from CyberScoop discussing the passage of the Defense Authorization Bill and a look back at 2025.

Selected Reading

Trump Administration Declares Foreign-Made Drones a Security Threat (The New York Times)

Hundreds of Arrests as Operation Sentinel Recovers $3m (Infosecurity Magazine)

Cyber spies use fake New Year concert invites to target Russian military (The Record)

University of Phoenix Data Breach - 3.5 Million+ Individuals Affected (CybersecurityNews)

Malicious extensions in Chrome Web store steal user credentials (BleepingComputer)

Ransomware Hits Romanian Water Authority, 1000 Systems Knocked Offline (Hackread)

Cyberattack knocks offline France's postal, banking services (BleepingComputer)

NIST, MITRE announce $20 million research effort on AI cybersecurity (CyberScoop)

US Must Go on Offense in Cyberspace, Report Warns (Govifosecurity)

AI Bathroom Monitors? Welcome To America's New Surveillance High Schools (Forbes)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Dec 2025 21:10:00 -0000</pubDate>
      <itunes:title>Eyes in the sky, red flags on the ground.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2459</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The White House bans foreign-made drones. African law enforcement agencies crackdown on cybercrime. A new phishing campaign targets Russian military personnel and defense-related organizations. A University of Phoenix data breach affects about 3.5 million people. A pair of Chrome extensions covertly hijack user traffic. Romania’s national water authority suffered a ransomware attack. A cyberattack in France disrupts postal, identity, and banking services for millions of customers. NIST and MITRE announce a $20 million partnership for AI research centers. A think-tank says the U.S. needs to go on the cyber offensive. Tim Starks from CyberScoop discusses the passage of the defense Authorization Bill and a look back at 2025. In high school, it’s no child left unscanned.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Tim Starks from CyberScoop discussing the passage of the Defense Authorization Bill and a look back at 2025.

Selected Reading

Trump Administration Declares Foreign-Made Drones a Security Threat (The New York Times)

Hundreds of Arrests as Operation Sentinel Recovers $3m (Infosecurity Magazine)

Cyber spies use fake New Year concert invites to target Russian military (The Record)

University of Phoenix Data Breach - 3.5 Million+ Individuals Affected (CybersecurityNews)

Malicious extensions in Chrome Web store steal user credentials (BleepingComputer)

Ransomware Hits Romanian Water Authority, 1000 Systems Knocked Offline (Hackread)

Cyberattack knocks offline France's postal, banking services (BleepingComputer)

NIST, MITRE announce $20 million research effort on AI cybersecurity (CyberScoop)

US Must Go on Offense in Cyberspace, Report Warns (Govifosecurity)

AI Bathroom Monitors? Welcome To America's New Surveillance High Schools (Forbes)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The White House bans foreign-made drones. African law enforcement agencies crackdown on cybercrime. A new phishing campaign targets Russian military personnel and defense-related organizations. A University of Phoenix data breach affects about 3.5 million people. A pair of Chrome extensions covertly hijack user traffic. Romania’s national water authority suffered a ransomware attack. A cyberattack in France disrupts postal, identity, and banking services for millions of customers. NIST and MITRE announce a $20 million partnership for AI research centers. A think-tank says the U.S. needs to go on the cyber offensive. Tim Starks from CyberScoop discusses the passage of the defense Authorization Bill and a look back at 2025. In high school, it’s no child left unscanned.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/tstarks/"><u>Tim Starks</u></a> from <a href="https://www.linkedin.com/company/cyberscoop/"><u>CyberScoop</u></a> discussing the passage of the Defense Authorization Bill and a look back at 2025.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.nytimes.com/2025/12/22/us/dji-drones-china-barred-us.html"><u>Trump Administration Declares Foreign-Made Drones a Security Threat</u></a> (The New York Times)</p>
<p><a href="https://www.infosecurity-magazine.com/news/hundreds-arrests-operation/"><u>Hundreds of Arrests as Operation Sentinel Recovers $3m</u></a> (Infosecurity Magazine)</p>
<p><a href="https://therecord.media/cyber-spies-fake-new-year-concert-russian-phishing"><u>Cyber spies use fake New Year concert invites to target Russian military</u></a> (The Record)</p>
<p><a href="https://cybersecuritynews.com/university-of-phoenix-data-breach/"><u>University of Phoenix Data Breach - 3.5 Million+ Individuals Affected</u></a> (CybersecurityNews)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/malicious-extensions-in-chrome-web-store-steal-user-credentials/"><u>Malicious extensions in Chrome Web store steal user credentials</u></a> (BleepingComputer)</p>
<p><a href="https://hackread.com/romanian-water-authority-ransomware-attack-systems-offline/"><u>Ransomware Hits Romanian Water Authority, 1000 Systems Knocked Offline</u> (Hackread</a>)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cyberattack-knocks-offline-frances-postal-banking-services/"><u>Cyberattack knocks offline France's postal, banking services</u></a> (BleepingComputer)</p>
<p><a href="https://cyberscoop.com/nist-mitre-announce-20-million-dollar-research-effort-on-ai-cybersecurity/"><u>NIST, MITRE announce $20 million research effort on AI cybersecurity</u></a> (CyberScoop)</p>
<p><a href="https://www.govinfosecurity.com/us-must-go-on-offense-in-cyberspace-report-warns-a-30371"><u>US Must Go on Offense in Cyberspace, Report Warns</u></a> (Govifosecurity)</p>
<p><br><a href="https://www.forbes.com/sites/thomasbrewster/2025/12/16/ai-bathroom-monitors-welcome-to-americas-new-surveillance-high-schools/"><u>AI Bathroom Monitors? Welcome To America's New Surveillance High Schools</u></a> (Forbes)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1648</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d98553c4-1c7a-11f0-85e0-3f65cf0ad641]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7267609852.mp3?updated=1766513024" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tech Investment Strategies and Overview [CISOP]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/122/notes</link>
      <description>In this CISOP episode of CSO Perspectives, Host Kim Jones sits down with John Funge, venture capitalist at DataTribe, to explore how investors view the cybersecurity landscape. Kim reflects on the tension between innovation, profit motives, and the real needs of security practitioners—raising questions about whether the industry prioritizes mitigation over true solutions. John offers a candid look inside the VC decision-making process, breaking down how teams, market fit, and long-term defensibility shape investment choices. Together, they examine how founders, investors, and CISOs can better align to drive meaningful, effective security innovation.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Dec 2025 07:00:00 -0000</pubDate>
      <itunes:title>Tech Investment Strategies and Overview [CISOP]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>122</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/714ca95e-d469-11f0-b962-03da25c0eafd/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this CISOP episode of CSO Perspectives, Host Kim Jones sits down with John Funge, venture capitalist at DataTribe, to explore how investors view the cybersecurity landscape. Kim reflects on the tension between innovation, profit motives, and the real needs of security practitioners—raising questions about whether the industry prioritizes mitigation over true solutions. John offers a candid look inside the VC decision-making process, breaking down how teams, market fit, and long-term defensibility shape investment choices. Together, they examine how founders, investors, and CISOs can better align to drive meaningful, effective security innovation.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this CISOP episode of CSO Perspectives, Host Kim Jones sits down with <a href="https://www.linkedin.com/in/johnfunge/">John Funge</a>, venture capitalist at DataTribe, to explore how investors view the cybersecurity landscape. Kim reflects on the tension between innovation, profit motives, and the real needs of security practitioners—raising questions about whether the industry prioritizes mitigation over true solutions. John offers a candid look inside the VC decision-making process, breaking down how teams, market fit, and long-term defensibility shape investment choices. Together, they examine how founders, investors, and CISOs can better align to drive meaningful, effective security innovation.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion ⁠⁠<a href="https://thecyberwire.com/stories/af2fb85904a840c292e7bde51850dfe9/tech-investment-strategies-and-overview">blog post</a>⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2919</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[714ca95e-d469-11f0-b962-03da25c0eafd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4648226861.mp3?updated=1765220902" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Everything old is new again.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2458/notes</link>
      <description>NATO suspects Russia is developing a new anti-satellite weapon to disrupt the Starlink network. A failed polygraph sparks a DHS probe and deepens turmoil at CISA. A look back at Trump’s cyber policy shifts. MacSync Stealer adopts a stealthy new delivery method.  Researchers warn a popular open-source server monitoring tool is being abused. Cyber criminals are increasingly bypassing technical defenses by recruiting insiders. Scripted Sparrow sends millions of BEC emails each month. Federal prosecutors take down a global fake ID marketplace. Monday business brief. Our guest is Eric Woodruff, Chief Identity Architect at Semperis, discussing "NoAuth Abuse Alert: Full Account Takeover." Atomic precision meets Colorado weather.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today on our Industry Voices, we are joined by Eric Woodruff, Chief Identity Architect at Semperis, discussing "NoAuth Abuse Alert: Full Account Takeover." Tune into the full conversation here. 

Selected Reading

Starlink in the crosshairs: How Russia could attack Elon Musk's conquering of space (AP News)

Project West Ford (Wikipedia)

Acting CISA director failed a polygraph. Career staff are now under investigation (POLITICO)

Dismantling Defenses: Trump 2.0 Cyber Year in Review (Krebs on Security)

MacSync macOS Malware Distributed via Signed Swift Application (SecurityWeek)

From ClickFix to code signed: the quiet shift of MacSync Stealer malware (Jamf) 

Hackers Abuse Popular Monitoring Tool Nezha as a Stealth Trojan (Hackread)

Cyber Criminals Are Recruiting Insiders in Banks, Telecoms, and Tech (Check Point)

Scripted Sparrow Sends Millions of BEC Emails Each Month (Infosecurity Magazine)

FBI Seizes Fake ID Template Domains Operating from Bangladesh (Hackread)

Adaptive Security raises $81 million in a Series B round led by Bain Capital Ventures. (N2K Pro)

NIST tried to pull the pin on NTP servers after blackout caused atomic clock drift (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 22 Dec 2025 21:10:00 -0000</pubDate>
      <itunes:title>Everything old is new again.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2458</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>NATO suspects Russia is developing a new anti-satellite weapon to disrupt the Starlink network. A failed polygraph sparks a DHS probe and deepens turmoil at CISA. A look back at Trump’s cyber policy shifts. MacSync Stealer adopts a stealthy new delivery method.  Researchers warn a popular open-source server monitoring tool is being abused. Cyber criminals are increasingly bypassing technical defenses by recruiting insiders. Scripted Sparrow sends millions of BEC emails each month. Federal prosecutors take down a global fake ID marketplace. Monday business brief. Our guest is Eric Woodruff, Chief Identity Architect at Semperis, discussing "NoAuth Abuse Alert: Full Account Takeover." Atomic precision meets Colorado weather.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today on our Industry Voices, we are joined by Eric Woodruff, Chief Identity Architect at Semperis, discussing "NoAuth Abuse Alert: Full Account Takeover." Tune into the full conversation here. 

Selected Reading

Starlink in the crosshairs: How Russia could attack Elon Musk's conquering of space (AP News)

Project West Ford (Wikipedia)

Acting CISA director failed a polygraph. Career staff are now under investigation (POLITICO)

Dismantling Defenses: Trump 2.0 Cyber Year in Review (Krebs on Security)

MacSync macOS Malware Distributed via Signed Swift Application (SecurityWeek)

From ClickFix to code signed: the quiet shift of MacSync Stealer malware (Jamf) 

Hackers Abuse Popular Monitoring Tool Nezha as a Stealth Trojan (Hackread)

Cyber Criminals Are Recruiting Insiders in Banks, Telecoms, and Tech (Check Point)

Scripted Sparrow Sends Millions of BEC Emails Each Month (Infosecurity Magazine)

FBI Seizes Fake ID Template Domains Operating from Bangladesh (Hackread)

Adaptive Security raises $81 million in a Series B round led by Bain Capital Ventures. (N2K Pro)

NIST tried to pull the pin on NTP servers after blackout caused atomic clock drift (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>NATO suspects Russia is developing a new anti-satellite weapon to disrupt the Starlink network. A failed polygraph sparks a DHS probe and deepens turmoil at CISA. A look back at Trump’s cyber policy shifts. MacSync Stealer adopts a stealthy new delivery method.  Researchers warn a popular open-source server monitoring tool is being abused. Cyber criminals are increasingly bypassing technical defenses by recruiting insiders. Scripted Sparrow sends millions of BEC emails each month. Federal prosecutors take down a global fake ID marketplace. Monday business brief. Our guest is Eric Woodruff, Chief Identity Architect at Semperis, discussing "NoAuth Abuse Alert: Full Account Takeover." Atomic precision meets Colorado weather.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today on our Industry Voices, we are joined by <a href="https://www.linkedin.com/in/ericonidentity/"><u>Eric Woodruff</u></a>, Chief Identity Architect at <a href="https://www.linkedin.com/company/semperis/"><u>Semperis</u></a>, discussing "NoAuth Abuse Alert: Full Account Takeover." Tune into the full conversation <a href="https://explore.thecyberwire.com/semperis">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://apnews.com/article/russia-starlink-musk-ukraine-space-china-canada-c69c1fda5ffc93828712ab723e606a2c"><u>Starlink in the crosshairs: How Russia could attack Elon Musk's conquering of space</u></a> (AP News)</p>
<p><a href="https://en.wikipedia.org/wiki/Project_West_Ford"><u>Project West Ford</u></a> (Wikipedia)</p>
<p><a href="https://www.politico.com/news/2025/12/21/cisa-acting-director-madhu-gottumukkala-polygraph-investigation-00701996"><u>Acting CISA director failed a polygraph. Career staff are now under investigation</u></a> (POLITICO)</p>
<p><a href="https://krebsonsecurity.com/2025/12/dismantling-defenses-trump-2-0-cyber-year-in-review/"><u>Dismantling Defenses: Trump 2.0 Cyber Year in Review</u></a> (Krebs on Security)</p>
<p><a href="https://www.securityweek.com/macsync-macos-malware-distributed-via-signed-swift-application/"><u>MacSync macOS Malware Distributed via Signed Swift Application</u></a> (SecurityWeek)</p>
<p><a href="https://www.jamf.com/blog/macsync-stealer-evolution-code-signed-swift-malware-analysis/"><u>From ClickFix to code signed: the quiet shift of MacSync Stealer malware</u></a> (Jamf) </p>
<p><a href="https://hackread.com/hackers-abuse-monitoring-tool-nezha-trojan/"><u>Hackers Abuse Popular Monitoring Tool Nezha as a Stealth Trojan</u></a> (Hackread)</p>
<p><a href="https://blog.checkpoint.com/research/cyber-criminals-are-recruiting-insiders-in-banks-telecoms-and-tech/"><u>Cyber Criminals Are Recruiting Insiders in Banks, Telecoms, and Tech</u></a> (Check Point)</p>
<p><a href="https://www.infosecurity-magazine.com/news/scripted-sparrow-millions-bec-each/"><u>Scripted Sparrow Sends Millions of BEC Emails Each Month</u></a> (Infosecurity Magazine)</p>
<p><a href="https://hackread.com/fbi-seizes-domains-us-id-templates-bangladesh/"><u>FBI Seizes Fake ID Template Domains Operating from Bangladesh</u></a> (Hackread)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/7/50"><u>Adaptive Security raises $81 million in a Series B round led by Bain Capital Ventures.</u></a> (N2K Pro)</p>
<p><a href="https://www.theregister.com/2025/12/21/nist_ntp_outage_warning/"><u>NIST tried to pull the pin on NTP servers after blackout caused atomic clock drift</u></a> (The Register)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1900</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d95cc6e8-1c7a-11f0-85e0-330fda2ba992]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3660663578.mp3?updated=1766433744" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Eric Escobar: Collaboration is key. [Pen tester] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/100/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both his bachelor and master degrees in civil engineering. Upon breaking into a network with a friend, he was bitten by the cybersecurity bug. Making the switch to the red team and basically becoming a bankrobber for hire, Eric tests the security of many companies' networks. He feels that curiosity is an essential trait for cybersecurity and collaboration is key as no one person knows everything. He advises those interested in cybersecurity to just start. We thank Eric for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 21 Dec 2025 08:00:00 -0000</pubDate>
      <itunes:title>Eric Escobar: Collaboration is key. [Pen tester] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>100</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/36095d30-dd13-11f0-aa1a-af98780e732c/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both his bachelor and master degrees in civil engineering. Upon breaking into a network with a friend, he was bitten by the cybersecurity bug. Making the switch to the red team and basically becoming a bankrobber for hire, Eric tests the security of many companies' networks. He feels that curiosity is an essential trait for cybersecurity and collaboration is key as no one person knows everything. He advises those interested in cybersecurity to just start. We thank Eric for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both his bachelor and master degrees in civil engineering. Upon breaking into a network with a friend, he was bitten by the cybersecurity bug. Making the switch to the red team and basically becoming a bankrobber for hire, Eric tests the security of many companies' networks. He feels that curiosity is an essential trait for cybersecurity and collaboration is key as no one person knows everything. He advises those interested in cybersecurity to just start. We thank Eric for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>522</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[36095d30-dd13-11f0-aa1a-af98780e732c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1375837013.mp3?updated=1735936621" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The lies that let AI run amok. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/406/notes</link>
      <description>Darren Meyer, Security Research Advocate at Checkmarx, is sharing their work on "Bypassing AI Agent Defenses with Lies-in-the-Loop." Checkmarx Zero researchers introduce “lies-in-the-loop,” a new attack technique that bypasses human‑in‑the‑loop AI safety controls by deceiving users into approving dangerous actions that appear benign. 

Using examples with AI code assistants like Claude Code, the research shows how prompt injection and manipulated context can trick both the agent and the human reviewer into enabling remote code execution. The findings highlight a growing risk as AI agents become more common in developer workflows, underscoring the limits of human oversight as a standalone security control.

The research can be found here:


  
⁠Bypassing AI Agent Defenses With Lies-In-The-Loop



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Dec 2025 08:00:00 -0000</pubDate>
      <itunes:title>The lies that let AI run amok. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>406</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/191db83e-dd0d-11f0-8122-ef489b5cb50b/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Darren Meyer, Security Research Advocate at Checkmarx, is sharing their work on "Bypassing AI Agent Defenses with Lies-in-the-Loop." Checkmarx Zero researchers introduce “lies-in-the-loop,” a new attack technique that bypasses human‑in‑the‑loop AI safety controls by deceiving users into approving dangerous actions that appear benign. 

Using examples with AI code assistants like Claude Code, the research shows how prompt injection and manipulated context can trick both the agent and the human reviewer into enabling remote code execution. The findings highlight a growing risk as AI agents become more common in developer workflows, underscoring the limits of human oversight as a standalone security control.

The research can be found here:


  
⁠Bypassing AI Agent Defenses With Lies-In-The-Loop



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/darrenmeyer/">Darren Meyer</a>, Security Research Advocate at <a href="https://www.linkedin.com/company/checkmarx/">Checkmarx</a>, is sharing their work on "Bypassing AI Agent Defenses with Lies-in-the-Loop." Checkmarx Zero researchers introduce “lies-in-the-loop,” a new attack technique that bypasses human‑in‑the‑loop AI safety controls by deceiving users into approving dangerous actions that appear benign. </p>
<p>Using examples with AI code assistants like Claude Code, the research shows how prompt injection and manipulated context can trick both the agent and the human reviewer into enabling remote code execution. The findings highlight a growing risk as AI agents become more common in developer workflows, underscoring the limits of human oversight as a standalone security control.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://dti.domaintools.com/inside-the-great-firewall-part-1-the-dump/">⁠</a><a href="https://checkmarx.com/zero-post/bypassing-ai-agent-defenses-with-lies-in-the-loop/">Bypassing AI Agent Defenses With Lies-In-The-Loop</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1476</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[191db83e-dd0d-11f0-8122-ef489b5cb50b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6661430860.mp3?updated=1766170724" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Where encryption meets executive muscle.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2457/notes</link>
      <description>Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure.  LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Amazon blocks more than 1,800 North Korean operatives from joining its workforce. CISA releases nine new Industrial Control Systems advisories. The U.S. Sentencing Commission seeks public input on deepfakes. Prosecutors indict 54 in a large-scale ATM jackpotting conspiracy. Our guest is Nitay Milner, CEO of Orion Security, discussing the issue with data leaking into AI tools, and how CISOs must prioritize DLP. Riot Games finds cheaters hiding in the BIOS.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Nitay Milner, CEO of Orion Security, discusses the issue with data leaking into AI tools, and how CISOs must prioritize DLP.

Selected Reading

Trump signs defense bill allocating millions for Cyber Command, mandating Pentagon phone security (The Record)

Denmark blames Russia for destructive cyberattack on water utility (Bleeping Computer)

New China-linked hacker group spies on governments in Southeast Asia, Japan (The Record)

'Kimwolf' Android Botnet Ensnares 1.8 Million Devices (SecurityWeek)

New critical WatchGuard Firebox firewall flaw exploited in attacks (Bleeping Computer)

Amazon blocked 1,800 suspected DPRK job applicants (The Register)

CISA Releases Nine Industrial Control Systems Advisories (CISA.gov)

U.S. Sentencing Commission seeks input on criminal penalties for deepfakes (CyberScoop)

US Charges 54 in Massive ATM Jackpotting Conspiracy (Infosecurity Magazine)

Riot Games found a motherboard security flaw that helps PC cheaters (The Verge)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 19 Dec 2025 21:10:00 -0000</pubDate>
      <itunes:title>Where encryption meets executive muscle.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2457</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure.  LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Amazon blocks more than 1,800 North Korean operatives from joining its workforce. CISA releases nine new Industrial Control Systems advisories. The U.S. Sentencing Commission seeks public input on deepfakes. Prosecutors indict 54 in a large-scale ATM jackpotting conspiracy. Our guest is Nitay Milner, CEO of Orion Security, discussing the issue with data leaking into AI tools, and how CISOs must prioritize DLP. Riot Games finds cheaters hiding in the BIOS.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Nitay Milner, CEO of Orion Security, discusses the issue with data leaking into AI tools, and how CISOs must prioritize DLP.

Selected Reading

Trump signs defense bill allocating millions for Cyber Command, mandating Pentagon phone security (The Record)

Denmark blames Russia for destructive cyberattack on water utility (Bleeping Computer)

New China-linked hacker group spies on governments in Southeast Asia, Japan (The Record)

'Kimwolf' Android Botnet Ensnares 1.8 Million Devices (SecurityWeek)

New critical WatchGuard Firebox firewall flaw exploited in attacks (Bleeping Computer)

Amazon blocked 1,800 suspected DPRK job applicants (The Register)

CISA Releases Nine Industrial Control Systems Advisories (CISA.gov)

U.S. Sentencing Commission seeks input on criminal penalties for deepfakes (CyberScoop)

US Charges 54 in Massive ATM Jackpotting Conspiracy (Infosecurity Magazine)

Riot Games found a motherboard security flaw that helps PC cheaters (The Verge)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure.  LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Amazon blocks more than 1,800 North Korean operatives from joining its workforce. CISA releases nine new Industrial Control Systems advisories. The U.S. Sentencing Commission seeks public input on deepfakes. Prosecutors indict 54 in a large-scale ATM jackpotting conspiracy. Our guest is Nitay Milner, CEO of Orion Security, discussing the issue with data leaking into AI tools, and how CISOs must prioritize DLP. Riot Games finds cheaters hiding in the BIOS.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p><strong></strong><a href="https://www.linkedin.com/in/nitay-milner/"><u>Nitay Milner</u></a>, CEO of <a href="https://www.linkedin.com/company/orionsec/"><u>Orion Security</u></a>, discusses the issue with data leaking into AI tools, and how CISOs must prioritize DLP.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/trump-signs-ndaa-cyber-command"><u>Trump signs defense bill allocating millions for Cyber Command, mandating Pentagon phone security</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/denmark-blames-russia-for-destructive-cyberattack-on-water-utility/"><u>Denmark blames Russia for destructive cyberattack on water utility</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/china-linked-hacker-group-spied-on-asian-govs"><u>New China-linked hacker group spies on governments in Southeast Asia, Japan</u></a> (The Record)</p>
<p><a href="https://www.securityweek.com/kimwolf-android-botnet-ensnares-1-8-million-devices/"><u>'Kimwolf' Android Botnet Ensnares 1.8 Million Devices</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/watchguard-warns-of-new-rce-flaw-in-firebox-firewalls-exploited-in-attacks/"><u>New critical WatchGuard Firebox firewall flaw exploited in attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.theregister.com/2025/12/18/amazon_blocked_fake_dprk_workers/"><u>Amazon blocked 1,800 suspected DPRK job applicants</u></a> (The Register)</p>
<p><a href="https://www.cisa.gov/news-events/alerts/2025/12/18/cisa-releases-nine-industrial-control-systems-advisories"><u>CISA Releases Nine Industrial Control Systems Advisories</u></a> (CISA.gov)</p>
<p><a href="https://cyberscoop.com/us-sentencing-guidelines-take-it-down-act-deepfake-law/"><u>U.S. Sentencing Commission seeks input on criminal penalties for deepfakes</u></a> (CyberScoop)</p>
<p><a href="https://www.infosecurity-magazine.com/news/us-charges-54-atm-jackpotting/"><u>US Charges 54 in Massive ATM Jackpotting Conspiracy</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.theverge.com/news/847539/riot-games-motherboard-security-flaw-pc-cheaters-anti-cheat"><u>Riot Games found a motherboard security flaw that helps PC cheaters</u></a> (The Verge)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1657</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d93345ac-1c7a-11f0-85e0-bf9bbf34b470]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7951536043.mp3?updated=1766172703" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OneView gives attackers the full tour.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2456/notes</link>
      <description>Hewlett Packard Enterprise patches a maximum-severity vulnerability in its OneView infrastructure management software. Cisco warns a critical zero-day is under active exploitation. An emergency Chrome update fixes two high-severity vulnerabilities. French authorities make multiple arrests. US authorities dismantle an unlicensed crypto exchange accused of money laundering. SonicWall highlights an exploited zero-day. Researchers earn $320,000 for demonstrating critical remote code execution flaws in cloud infrastructure components. A U.S. Senator urges electronic health record vendors to give patients greater control over who can access their medical data. Our guest is Larry Zorio, CISO from Mark43, discussing first responders and insider cyber risks. A right-to-repair group puts cash on the table. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Larry Zorio, CISO from Mark43, to discuss first responders sounding the alarm on insider cyber risks. To see the full report, check it out here.

Selected Reading

HPE warns of maximum severity RCE flaw in OneView software (Bleeping Computer)

China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear (SecurityWeek)

Google Chrome patches two high severity vulnerabilities in emergency update (Beyond Machines)

France arrests 22-year-old over Interior Ministry hack (The Record)

France arrests Latvian for installing malware on Italian ferry  (Bleeping Computer)

FBI dismantles alleged $70M crypto laundering operation (The Register)

SonicWall Patches Exploited SMA 1000 Zero-Day (SecurityWeek)

Zeroday Cloud hacking event awards $320,0000 for 11 zero days (Bleeping Computer)

Senator Presses EHR Vendors on Patient Privacy Controls (Govinfosecurity)

A nonprofit is paying hackers to unlock devices companies have abandoned (TechSpot)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 18 Dec 2025 21:10:00 -0000</pubDate>
      <itunes:title>OneView gives attackers the full tour.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2456</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Hewlett Packard Enterprise patches a maximum-severity vulnerability in its OneView infrastructure management software. Cisco warns a critical zero-day is under active exploitation. An emergency Chrome update fixes two high-severity vulnerabilities. French authorities make multiple arrests. US authorities dismantle an unlicensed crypto exchange accused of money laundering. SonicWall highlights an exploited zero-day. Researchers earn $320,000 for demonstrating critical remote code execution flaws in cloud infrastructure components. A U.S. Senator urges electronic health record vendors to give patients greater control over who can access their medical data. Our guest is Larry Zorio, CISO from Mark43, discussing first responders and insider cyber risks. A right-to-repair group puts cash on the table. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Larry Zorio, CISO from Mark43, to discuss first responders sounding the alarm on insider cyber risks. To see the full report, check it out here.

Selected Reading

HPE warns of maximum severity RCE flaw in OneView software (Bleeping Computer)

China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear (SecurityWeek)

Google Chrome patches two high severity vulnerabilities in emergency update (Beyond Machines)

France arrests 22-year-old over Interior Ministry hack (The Record)

France arrests Latvian for installing malware on Italian ferry  (Bleeping Computer)

FBI dismantles alleged $70M crypto laundering operation (The Register)

SonicWall Patches Exploited SMA 1000 Zero-Day (SecurityWeek)

Zeroday Cloud hacking event awards $320,0000 for 11 zero days (Bleeping Computer)

Senator Presses EHR Vendors on Patient Privacy Controls (Govinfosecurity)

A nonprofit is paying hackers to unlock devices companies have abandoned (TechSpot)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hewlett Packard Enterprise patches a maximum-severity vulnerability in its OneView infrastructure management software. Cisco warns a critical zero-day is under active exploitation. An emergency Chrome update fixes two high-severity vulnerabilities. French authorities make multiple arrests. US authorities dismantle an unlicensed crypto exchange accused of money laundering. SonicWall highlights an exploited zero-day. Researchers earn $320,000 for demonstrating critical remote code execution flaws in cloud infrastructure components. A U.S. Senator urges electronic health record vendors to give patients greater control over who can access their medical data. Our guest is Larry Zorio, CISO from Mark43, discussing first responders and insider cyber risks. A right-to-repair group puts cash on the table. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/lzorio/?utm_source=share_via&amp;utm_content=profile&amp;utm_medium=member_ios"><u>Larry Zorio</u></a>, CISO from <a href="https://www.linkedin.com/company/mark43/"><u>Mark43</u></a>, to discuss first responders sounding the alarm on insider cyber risks. To see the full report, check it out <a href="https://mark43.com/2026-public-safety-trends-report/"><u>here</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/hpe-warns-of-maximum-severity-rce-flaw-in-oneview-software/"><u>HPE warns of maximum severity RCE flaw in OneView software</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/china-linked-hackers-exploiting-zero-day-in-cisco-security-gear/"><u>China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear</u></a> (SecurityWeek)</p>
<p><a href="https://beyondmachines.net/event_details/google-chrome-patches-two-high-severity-vulnerabilities-in-emergency-update-0-y-0-g-n/gD2P6Ple2L"><u>Google Chrome patches two high severity vulnerabilities in emergency update</u></a> (Beyond Machines)</p>
<p><a href="https://therecord.media/france-interior-ministry-hack-arrest"><u>France arrests 22-year-old over Interior Ministry hack</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/france-arrests-latvian-for-installing-malware-on-italian-ferry/"><u>France arrests Latvian for installing malware on Italian ferry</u></a>  (Bleeping Computer)</p>
<p><a href="https://www.theregister.com/2025/12/18/e_note_takedown/"><u>FBI dismantles alleged $70M crypto laundering operation</u></a> (The Register)</p>
<p><a href="https://www.securityweek.com/sonicwall-patches-exploited-sma-1000-zero-day/"><u>SonicWall Patches Exploited SMA 1000 Zero-Day</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/zeroday-cloud-hacking-event-awards-320-0000-for-11-zero-days/"><u>Zeroday Cloud hacking event awards $320,0000 for 11 zero days</u></a> (Bleeping Computer)</p>
<p><a href="https://www.govinfosecurity.com/senator-presses-ehr-vendors-on-patient-privacy-controls-a-30323"><u>Senator Presses EHR Vendors on Patient Privacy Controls</u></a> (Govinfosecurity)</p>
<p><a href="https://www.techspot.com/news/110590-nonprofit-paying-hackers-unlock-devices-companies-have-abandoned.html"><u>A nonprofit is paying hackers to unlock devices companies have abandoned</u></a> (TechSpot)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1607</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d90b62b2-1c7a-11f0-85e0-578115526b15]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4089362822.mp3?updated=1766088027" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The cloud that spies back.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2455/notes</link>
      <description>Researchers detail a years-long Russian state-sponsored cyber espionage campaign. Israel’s cyber chief warns against complacency. Vulnerabilities affect products from Fortinet and Hitachi Energy. Studies show AI models are rapidly improving at offensive cyber tasks. MITRE expands its D3FEND cybersecurity ontology to cover operational technology. Texas sues smart TV manufacturers, alleging illegal surveillance. A fraudulent gift card locks an Apple user out of their digital life. Our guest is Doron Davidson from CyberProof Israel discussing agentic SOCs and agentic transformation of an MDR. Fat racks crack the stacks.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by ⁠Doron Davidson⁠, GM at ⁠CyberProof⁠ Israel, MD Security Operations, discussing agentic SOC and agentic transformation of an MDR. If you’d like to learn more be sure to check out ⁠CyberProof⁠. Tune into the full conversation here. 

Selected Reading

Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure (Live Threat Intelligence)

IDF warns future cyberattacks may dwarf past threats (The Jerusalem Post)

CISA reports active exploitation of critical Fortinet authentication bypass flaw (Beyond Machines)

Hitachi Energy reports BlastRADIUS flaw in AFS, AFR and AFF Series product families (Beyond Machines)

AI models are perfecting their hacking skills (Axios)

AI Hackers Are Coming Dangerously Close to Beating Humans (WSJ)

MITRE Extends D3FEND Ontology to Operational Technology Cybersecurity (Mitre)

Texas sues biggest TV makers, alleging smart TVs spy on users without consent (Ars Technica)

Locked out: How a gift card purchase destroyed an Apple account (Apple Insider)

Racks of AI chips are too damn heavy (The Verge)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 17 Dec 2025 21:10:00 -0000</pubDate>
      <itunes:title>The cloud that spies back.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2455</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Researchers detail a years-long Russian state-sponsored cyber espionage campaign. Israel’s cyber chief warns against complacency. Vulnerabilities affect products from Fortinet and Hitachi Energy. Studies show AI models are rapidly improving at offensive cyber tasks. MITRE expands its D3FEND cybersecurity ontology to cover operational technology. Texas sues smart TV manufacturers, alleging illegal surveillance. A fraudulent gift card locks an Apple user out of their digital life. Our guest is Doron Davidson from CyberProof Israel discussing agentic SOCs and agentic transformation of an MDR. Fat racks crack the stacks.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by ⁠Doron Davidson⁠, GM at ⁠CyberProof⁠ Israel, MD Security Operations, discussing agentic SOC and agentic transformation of an MDR. If you’d like to learn more be sure to check out ⁠CyberProof⁠. Tune into the full conversation here. 

Selected Reading

Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure (Live Threat Intelligence)

IDF warns future cyberattacks may dwarf past threats (The Jerusalem Post)

CISA reports active exploitation of critical Fortinet authentication bypass flaw (Beyond Machines)

Hitachi Energy reports BlastRADIUS flaw in AFS, AFR and AFF Series product families (Beyond Machines)

AI models are perfecting their hacking skills (Axios)

AI Hackers Are Coming Dangerously Close to Beating Humans (WSJ)

MITRE Extends D3FEND Ontology to Operational Technology Cybersecurity (Mitre)

Texas sues biggest TV makers, alleging smart TVs spy on users without consent (Ars Technica)

Locked out: How a gift card purchase destroyed an Apple account (Apple Insider)

Racks of AI chips are too damn heavy (The Verge)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers detail a years-long Russian state-sponsored cyber espionage campaign. Israel’s cyber chief warns against complacency. Vulnerabilities affect products from Fortinet and Hitachi Energy. Studies show AI models are rapidly improving at offensive cyber tasks. MITRE expands its D3FEND cybersecurity ontology to cover operational technology. Texas sues smart TV manufacturers, alleging illegal surveillance. A fraudulent gift card locks an Apple user out of their digital life. Our guest is Doron Davidson from CyberProof Israel discussing agentic SOCs and agentic transformation of an MDR. Fat racks crack the stacks.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/dorond/">⁠<u>Doron Davidson</u>⁠</a>, GM at <a href="https://www.linkedin.com/company/cyberproof-inc-/">⁠<u>CyberProof</u>⁠</a> Israel, MD Security Operations, discussing agentic SOC and agentic transformation of an MDR. If you’d like to learn more be sure to check out <a href="https://www.cyberproof.com/agentic-ai-for-modern-security-operations">⁠<u>CyberProof</u>⁠</a>. Tune into the full conversation <a href="https://explore.thecyberwire.com/doron-davidson">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://radar.offseq.com/threat/amazon-exposes-years-long-gru-cyber-campaign-targe-a5b9d6fd"><u>Amazon Exposes Years-Long GRU Cyber Campaign Targeting Energy and Cloud Infrastructure</u></a> (Live Threat Intelligence)</p>
<p><a href="https://www.jpost.com/israel-news/defense-news/article-880453"><u>IDF warns future cyberattacks may dwarf past threats</u></a> (The Jerusalem Post)</p>
<p><a href="https://beyondmachines.net/event_details/cisa-multiple-fortinet-products-exploited-in-attacks-rapid-patching-urged-crn-8-k-w-x-8/gD2P6Ple2L"><u>CISA reports active exploitation of critical Fortinet authentication bypass flaw</u></a> (Beyond Machines)</p>
<p><a href="https://beyondmachines.net/event_details/hitachi-energy-patches-blastradius-flaw-in-afs-afr-and-aff-series-product-families-p-0-v-x-2/gD2P6Ple2L"><u>Hitachi Energy reports BlastRADIUS flaw in AFS, AFR and AFF Series product families</u></a> (Beyond Machines)</p>
<p><a href="https://www.axios.com/2025/12/16/ai-models-hacking-stanford-openai-warnings"><u>AI models are perfecting their hacking skills</u></a> (Axios)</p>
<p><a href="https://www.wsj.com/tech/ai/ai-hackers-are-coming-dangerously-close-to-beating-humans-4afc3ad6"><u>AI Hackers Are Coming Dangerously Close to Beating Humans</u></a> (WSJ)</p>
<p><a href="https://www.mitre.org/news-insights/news-release/mitre-extends-d3fend-ontology-operational-technology-cybersecurity"><u>MITRE Extends D3FEND Ontology to Operational Technology Cybersecurity</u></a> (Mitre)</p>
<p><a href="https://arstechnica.com/tech-policy/2025/12/texas-sues-biggest-tv-makers-alleging-smart-tvs-spy-on-users-without-consent/"><u>Texas sues biggest TV makers, alleging smart TVs spy on users without consent</u></a> (Ars Technica)</p>
<p><a href="https://appleinsider.com/articles/25/12/13/locked-out-how-a-gift-card-purchase-destroyed-an-apple-account"><u>Locked out: How a gift card purchase destroyed an Apple account</u></a> (Apple Insider)</p>
<p><a href="https://www.theverge.com/ai-artificial-intelligence/844966/heavy-ai-data-center-buildout"><u>Racks of AI chips are too damn heavy</u></a> (The Verge)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1810</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d8e2e792-1c7a-11f0-85e0-676ac26912f3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9848163041.mp3?updated=1765998480" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber shock to the oil trade.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2454/notes</link>
      <description>Venezuela’s state oil company blames a cyberattack on the U.S. An Iranian hacker group offers cash bounties for doxing Israelis. Germany’s lower house of parliament suffers a major email outage. South Korea’s e-commerce breach exposes personal information of nearly all of that nation’s adults. Researchers report active exploitation of two critical Fortinet authentication bypass vulnerabilities, and three critical vulnerabilities in the FreePBX VoIP platform. An auto-industry credit reporting agency suffers a data breach. Google is shutting down its dark web reporting service. European law enforcement dismantles a Ukrainian fraud network. Our guest is Christiaan Beek, Senior Director Threat Intelligence &amp; Analytics from Rapid7, discussing how attackers are accelerating exploitation, refining ransomware, and expanding nation-state operations. A Pornhub breach proves the internet never forgets. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices segment, guest Christiaan Beek, Senior Director Threat Intelligence &amp; Analytics from Rapid7, discusses how attackers are accelerating exploitation, refining ransomware, and expanding nation-state operations. Dive into the details in Rapid7’s report. Tune into Christiaan's full conversation here. 

Selected Reading

Venezuela Says Oil Export System Down After Weekend Cyberattack (Bloomberg)

Iran-linked hackers dox Israelis, offer cash bounties (The Jerusalem Post)

German Parliament Allegedly Hit by Email Outage During US-Ukraine Talks Amid Cyberattack Suspicions (TechNadu)

Breach at South Korea’s Equivalent of Amazon Exposed Data of Almost Every Adult (Wall Street Journal)

Arctic Wolf Observes Malicious SSO Logins on FortiGate Devices Following Disclosure of CVE-2025-59718 and CVE-2025-59719 (Arctic Wolf)

Critical authentication bypass and multiple flaws discovered in FreePBX VoIP platform (Beyond Machines)

Millions Affected by Massive 700Credit Data Breach (Tech.co)

Google Is Shutting Down Its Dark Web Monitoring Tool (Technology.org) 

European authorities dismantle call center fraud ring in Ukraine (Bleeping Computer)

Porn User Data Stolen—Pornhub ‘Search, Watch And Download’ Activity (Forbes)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Dec 2025 21:20:00 -0000</pubDate>
      <itunes:title>Cyber shock to the oil trade.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2454</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Venezuela’s state oil company blames a cyberattack on the U.S. An Iranian hacker group offers cash bounties for doxing Israelis. Germany’s lower house of parliament suffers a major email outage. South Korea’s e-commerce breach exposes personal information of nearly all of that nation’s adults. Researchers report active exploitation of two critical Fortinet authentication bypass vulnerabilities, and three critical vulnerabilities in the FreePBX VoIP platform. An auto-industry credit reporting agency suffers a data breach. Google is shutting down its dark web reporting service. European law enforcement dismantles a Ukrainian fraud network. Our guest is Christiaan Beek, Senior Director Threat Intelligence &amp; Analytics from Rapid7, discussing how attackers are accelerating exploitation, refining ransomware, and expanding nation-state operations. A Pornhub breach proves the internet never forgets. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices segment, guest Christiaan Beek, Senior Director Threat Intelligence &amp; Analytics from Rapid7, discusses how attackers are accelerating exploitation, refining ransomware, and expanding nation-state operations. Dive into the details in Rapid7’s report. Tune into Christiaan's full conversation here. 

Selected Reading

Venezuela Says Oil Export System Down After Weekend Cyberattack (Bloomberg)

Iran-linked hackers dox Israelis, offer cash bounties (The Jerusalem Post)

German Parliament Allegedly Hit by Email Outage During US-Ukraine Talks Amid Cyberattack Suspicions (TechNadu)

Breach at South Korea’s Equivalent of Amazon Exposed Data of Almost Every Adult (Wall Street Journal)

Arctic Wolf Observes Malicious SSO Logins on FortiGate Devices Following Disclosure of CVE-2025-59718 and CVE-2025-59719 (Arctic Wolf)

Critical authentication bypass and multiple flaws discovered in FreePBX VoIP platform (Beyond Machines)

Millions Affected by Massive 700Credit Data Breach (Tech.co)

Google Is Shutting Down Its Dark Web Monitoring Tool (Technology.org) 

European authorities dismantle call center fraud ring in Ukraine (Bleeping Computer)

Porn User Data Stolen—Pornhub ‘Search, Watch And Download’ Activity (Forbes)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Venezuela’s state oil company blames a cyberattack on the U.S. An Iranian hacker group offers cash bounties for doxing Israelis. Germany’s lower house of parliament suffers a major email outage. South Korea’s e-commerce breach exposes personal information of nearly all of that nation’s adults. Researchers report active exploitation of two critical Fortinet authentication bypass vulnerabilities, and three critical vulnerabilities in the FreePBX VoIP platform. An auto-industry credit reporting agency suffers a data breach. Google is shutting down its dark web reporting service. European law enforcement dismantles a Ukrainian fraud network. Our guest is Christiaan Beek, Senior Director Threat Intelligence &amp; Analytics from Rapid7, discussing how attackers are accelerating exploitation, refining ransomware, and expanding nation-state operations. A Pornhub breach proves the internet never forgets. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On today’s Industry Voices segment, guest <a href="https://www.linkedin.com/in/christiaanbeek/"><u>Christiaan Beek</u></a>, Senior Director Threat Intelligence &amp; Analytics from <a href="https://www.rapid7.com/"><u>Rapid7</u></a>, discusses how attackers are accelerating exploitation, refining ransomware, and expanding nation-state operations. Dive into the details in Rapid7’s <a href="https://www.rapid7.com/research/report/threat-landscape-report-2025-q3/?utm_source=referral&amp;utm_medium=podcast&amp;utm_content=q3-2025-threat-landscape&amp;utm_term=attachment&amp;utm_campaign=global-pla-2024-q4-cyberwire-podcast-prospect-eng-etos-25"><u>report</u></a>. Tune into Christiaan's full conversation <a href="https://explore.thecyberwire.com/christiaan-beek">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bloomberg.com/news/articles/2025-12-15/venezuela-says-oil-export-system-down-after-weekend-cyberattack"><u>Venezuela Says Oil Export System Down After Weekend Cyberattack</u></a> (Bloomberg)</p>
<p><a href="https://www.jpost.com/israel-news/defense-news/article-880394"><u>Iran-linked hackers dox Israelis, offer cash bounties</u></a> (The Jerusalem Post)</p>
<p><a href="https://www.technadu.com/german-parliament-allegedly-hit-by-email-outage-during-us-ukraine-talks-amid-cyberattack-suspicions/615867/"><u>German Parliament Allegedly Hit by Email Outage During US-Ukraine Talks Amid Cyberattack Suspicions</u></a> (TechNadu)</p>
<p><a href="https://www.wsj.com/world/asia/breach-at-south-koreas-equivalent-of-amazon-exposed-data-of-almost-every-adult-ba8d9ebd?gaa_at=eafs&amp;gaa_n=AWEtsqfCuMtzOkdOfhzoR-nqV9dUfWevQ5B3f_7D1L5yd9LC2s_TXZspBqRs&amp;gaa_ts=69413fd8&amp;gaa_sig=GNxVOH1DDr_QiQA46w_dkeRzNflj2JtosI0eYjehy2ufZnv35Nd_728qrizEXQe3y1OBuWiiotx3IheZGg-JHQ%3D%3D"><u>Breach at South Korea’s Equivalent of Amazon Exposed Data of Almost Every Adult</u></a> (Wall Street Journal)</p>
<p><a href="https://arcticwolf.com/resources/blog/arctic-wolf-observes-malicious-sso-logins-following-disclosure-cve-2025-59718-cve-2025-59719/"><u>Arctic Wolf Observes Malicious SSO Logins on FortiGate Devices Following Disclosure of CVE-2025-59718 and CVE-2025-59719</u></a> (Arctic Wolf)</p>
<p><a href="https://beyondmachines.net/event_details/critical-authentication-bypass-and-multiple-flaws-discovered-in-freepbx-voip-platform-s-b-g-p-0/gD2P6Ple2L"><u>Critical authentication bypass and multiple flaws discovered in FreePBX VoIP platform</u></a> (Beyond Machines)</p>
<p><a href="https://tech.co/news/700credit-massive-data-breach"><u>Millions Affected by Massive 700Credit Data Breach</u></a> (Tech.co)</p>
<p><a href="https://www.technology.org/2025/12/16/google-is-shutting-down-its-dark-web-monitoring-tool/"><u>Google Is Shutting Down Its Dark Web Monitoring Tool</u></a> (Technology.org) </p>
<p><a href="https://www.bleepingcomputer.com/news/security/european-authorities-dismantle-call-center-fraud-ring-in-ukraine/"><u>European authorities dismantle call center fraud ring in Ukraine</u></a> (Bleeping Computer)</p>
<p><a href="https://www.forbes.com/sites/zakdoffman/2025/12/16/pornhub-confirms-breach-user-search-watch-and-download-activity-stolen/"><u>Porn User Data Stolen—Pornhub ‘Search, Watch And Download’ Activity</u></a> (Forbes)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1618</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d8bb0416-1c7a-11f0-85e0-07856b1b975c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2517038650.mp3?updated=1765918696" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Quantum [CISOP]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/121/notes</link>
      <description>In this episode, host Kim Jones tacks a topic that is rapidly moving from theoretical to operational reality: quantum computing. While classical computing will remain the backbone of our systems for years to come, quantum technologies are advancing fast enough that CISOs must begin preparing today. Kim explores what quantum computing really means, why it matters for cybersecurity, and how leaders should begin planning for its inevitable impact. To help demystify the subject, Kim is joined by longtime colleague and cybersecurity practitioner Michael Sottile—now the CSO of a quantum computing firm—who brings decades of hands-on experience across industries and a front-row seat to quantum's evolution.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Dec 2025 07:00:00 -0000</pubDate>
      <itunes:title>Quantum [CISOP]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>121</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/f9558cb0-cb06-11f0-bde7-0f479da5a13c/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode, host Kim Jones tacks a topic that is rapidly moving from theoretical to operational reality: quantum computing. While classical computing will remain the backbone of our systems for years to come, quantum technologies are advancing fast enough that CISOs must begin preparing today. Kim explores what quantum computing really means, why it matters for cybersecurity, and how leaders should begin planning for its inevitable impact. To help demystify the subject, Kim is joined by longtime colleague and cybersecurity practitioner Michael Sottile—now the CSO of a quantum computing firm—who brings decades of hands-on experience across industries and a front-row seat to quantum's evolution.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, host Kim Jones tacks a topic that is rapidly moving from theoretical to operational reality: quantum computing. While classical computing will remain the backbone of our systems for years to come, quantum technologies are advancing fast enough that CISOs must begin preparing today. Kim explores what quantum computing really means, why it matters for cybersecurity, and how leaders should begin planning for its inevitable impact. To help demystify the subject, Kim is joined by longtime colleague and cybersecurity practitioner <a href="https://www.linkedin.com/in/michaelsottile/">Michael Sottile</a>—now the CSO of a quantum computing firm—who brings decades of hands-on experience across industries and a front-row seat to quantum's evolution.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2356</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f9558cb0-cb06-11f0-bde7-0f479da5a13c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2765730994.mp3?updated=1765214998" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Another day, another emergency patch.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2453/notes</link>
      <description>Apple and Google issue emergency updates to patch zero-days.  Google links five additional Chinese state-backed hacking groups to “React2Shell.” France’s Ministry of the Interior was hit by a cyberattack. Atlassian patches roughly 30 third-party vulnerabilities. Microsoft says its December 2025 Patch Tuesday updates are breaking Message Queuing. Researchers uncovered a massive exposed database with nearly 4.3 billion professional records openly accessible online. Britain’s new MI6 chief warns of an “aggressive, expansionist, and revisionist” Russia. Monday Business Brief. On today’s Threat Vector, ⁠Michael Heller⁠ from Unit 42 chats with security leaders ⁠Greg Conti⁠ and ⁠Tom Cross⁠ to unpack the hacker mindset and the idea of “dark capabilities”. A cyber holiday gift guide for the rest of us. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment

In this segment of Threat Vector, host ⁠Michael Heller⁠, Managing Editor for Cortex and Unit 42 and Executive Producer of the podcast, sits down with long-time security leaders ⁠Greg Conti⁠ and ⁠Tom Cross⁠ to unpack the hacker mindset and the idea of “dark capabilities” inside modern technology companies. You can listen to their full discussion here. Be sure to catch new episodes of Threat Vector by Palo Alto Networks every Thursday on your favorite podcast app.

Selected Reading

Apple, Google forced to issue emergency 0-day patches (The Register)

Google links more Chinese hacking groups to React2Shell attacks (Bleeping Computer)

French Interior Ministry confirms cyberattack on email servers (Bleeping Computer)

Atlassian Patches Critical Apache Tika Flaw (SecurityWeek)

Microsoft: December security updates cause Message Queuing failures (Bleeping Computer)

16TB of MongoDB Database Exposes 4.3 Billion Lead Gen Records (Hackread)

MI6 chief warns 'front line is everywhere' and signals intent to pressure Putin (The Record)

Saviynt raises $700 million in Series B growth equity financing. (The CyberWire Business Brief)

Last-minute cybersecurity and privacy gifts your friends and family won't hate (This Week In Security)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 15 Dec 2025 21:10:00 -0000</pubDate>
      <itunes:title>Another day, another emergency patch.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2453</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Apple and Google issue emergency updates to patch zero-days.  Google links five additional Chinese state-backed hacking groups to “React2Shell.” France’s Ministry of the Interior was hit by a cyberattack. Atlassian patches roughly 30 third-party vulnerabilities. Microsoft says its December 2025 Patch Tuesday updates are breaking Message Queuing. Researchers uncovered a massive exposed database with nearly 4.3 billion professional records openly accessible online. Britain’s new MI6 chief warns of an “aggressive, expansionist, and revisionist” Russia. Monday Business Brief. On today’s Threat Vector, ⁠Michael Heller⁠ from Unit 42 chats with security leaders ⁠Greg Conti⁠ and ⁠Tom Cross⁠ to unpack the hacker mindset and the idea of “dark capabilities”. A cyber holiday gift guide for the rest of us. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment

In this segment of Threat Vector, host ⁠Michael Heller⁠, Managing Editor for Cortex and Unit 42 and Executive Producer of the podcast, sits down with long-time security leaders ⁠Greg Conti⁠ and ⁠Tom Cross⁠ to unpack the hacker mindset and the idea of “dark capabilities” inside modern technology companies. You can listen to their full discussion here. Be sure to catch new episodes of Threat Vector by Palo Alto Networks every Thursday on your favorite podcast app.

Selected Reading

Apple, Google forced to issue emergency 0-day patches (The Register)

Google links more Chinese hacking groups to React2Shell attacks (Bleeping Computer)

French Interior Ministry confirms cyberattack on email servers (Bleeping Computer)

Atlassian Patches Critical Apache Tika Flaw (SecurityWeek)

Microsoft: December security updates cause Message Queuing failures (Bleeping Computer)

16TB of MongoDB Database Exposes 4.3 Billion Lead Gen Records (Hackread)

MI6 chief warns 'front line is everywhere' and signals intent to pressure Putin (The Record)

Saviynt raises $700 million in Series B growth equity financing. (The CyberWire Business Brief)

Last-minute cybersecurity and privacy gifts your friends and family won't hate (This Week In Security)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Apple and Google issue emergency updates to patch zero-days.  Google links five additional Chinese state-backed hacking groups to “React2Shell.” France’s Ministry of the Interior was hit by a cyberattack. Atlassian patches roughly 30 third-party vulnerabilities. Microsoft says its December 2025 Patch Tuesday updates are breaking Message Queuing. Researchers uncovered a massive exposed database with nearly 4.3 billion professional records openly accessible online. Britain’s new MI6 chief warns of an “aggressive, expansionist, and revisionist” Russia. Monday Business Brief. On today’s Threat Vector, ⁠Michael Heller⁠ from Unit 42 chats with security leaders ⁠Greg Conti⁠ and ⁠Tom Cross⁠ to unpack the hacker mindset and the idea of “dark capabilities”. A cyber holiday gift guide for the rest of us. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Threat Vector Segment</strong></p>
<p>In this segment of Threat Vector, host <a href="https://www.linkedin.com/in/mtheller"><u>⁠Michael Heller⁠</u></a>, Managing Editor for Cortex and Unit 42 and Executive Producer of the podcast, sits down with long-time security leaders <a href="https://www.linkedin.com/in/greg-conti-7a8521?utm_source=chatgpt.com"><u>⁠Greg Conti⁠</u></a> and <a href="https://www.linkedin.com/in/tom-cross-71455?utm_source=chatgpt.com"><u>⁠Tom Cross⁠</u></a> to unpack the hacker mindset and the idea of “dark capabilities” inside modern technology companies. You can listen to their full discussion <a href="https://www.thecyberwire.com/podcasts/threat-vector/97/notes"><u>here</u></a>. Be sure to catch new episodes of Threat Vector by Palo Alto Networks every Thursday on your favorite podcast app.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.theregister.com/2025/12/15/apple_follows_google_by_emergency/"><u>Apple, Google forced to issue emergency 0-day patches</u></a> (The Register)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/google-links-more-chinese-hacking-groups-to-react2shell-attacks/"><u>Google links more Chinese hacking groups to React2Shell attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/france-interior-ministry-confirms-cyberattack-on-email-servers/"><u>French Interior Ministry confirms cyberattack on email servers</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/atlassian-patches-critical-apache-tika-flaw/"><u>Atlassian Patches Critical Apache Tika Flaw</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-december-security-updates-cause-message-queuing-failures/"><u>Microsoft: December security updates cause Message Queuing failures</u></a> (Bleeping Computer)</p>
<p><a href="https://hackread.com/mongodb-database-expose-lead-gen-records/"><u>16TB of MongoDB Database Exposes 4.3 Billion Lead Gen Records</u></a> (Hackread)</p>
<p><a href="https://therecord.media/mi6-chief-speech-russia-threats-warning"><u>MI6 chief warns 'front line is everywhere' and signals intent to pressure Putin</u></a> (The Record)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/7/49"><u>Saviynt raises $700 million in Series B growth equity financing.</u></a> (The CyberWire Business Brief)</p>
<p><a href="https://this.weekinsecurity.com/last-minute-cybersecurity-and-privacy-gifts-that-your-friends-and-family-will-not-hate/"><u>Last-minute cybersecurity and privacy gifts your friends and family won't hate</u></a> (This Week In Security)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1720</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d8933788-1c7a-11f0-85e0-77b322a6771b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5655452870.mp3?updated=1765829872" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Amanda Fennell: There's a cyber warrior in all of us [Information] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/99/notes</link>
      <description>Please enjoy this encore of Career Notes.

Chief security officer and chief information officer at Relativity, Amanda Fennell shares her story from archeology to cybersecurity. She shares the path that lead her towards becoming an archeologist and how it turned out not being exactly what she expected. She then shares how she got into the cyber business and how her past has impacted what she's doing now. She describes how she would like to be remembered in the cyber world, she says "I do hope that I left things better than I found them, not just the security of a product or a company, but I believe strongly that every person has a little cyber warrior inside of them." We thank Amanda for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 14 Dec 2025 08:00:00 -0000</pubDate>
      <itunes:title>Amanda Fennell: There's a cyber warrior in all of us [Information] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>99</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/691d9c94-d6de-11f0-a7a3-9f139bd71312/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes.

Chief security officer and chief information officer at Relativity, Amanda Fennell shares her story from archeology to cybersecurity. She shares the path that lead her towards becoming an archeologist and how it turned out not being exactly what she expected. She then shares how she got into the cyber business and how her past has impacted what she's doing now. She describes how she would like to be remembered in the cyber world, she says "I do hope that I left things better than I found them, not just the security of a product or a company, but I believe strongly that every person has a little cyber warrior inside of them." We thank Amanda for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes.</p>
<p>Chief security officer and chief information officer at Relativity, Amanda Fennell shares her story from archeology to cybersecurity. She shares the path that lead her towards becoming an archeologist and how it turned out not being exactly what she expected. She then shares how she got into the cyber business and how her past has impacted what she's doing now. She describes how she would like to be remembered in the cyber world, she says "I do hope that I left things better than I found them, not just the security of a product or a company, but I believe strongly that every person has a little cyber warrior inside of them." We thank Amanda for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>573</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[691d9c94-d6de-11f0-a7a3-9f139bd71312]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6971552768.mp3?updated=1735936620" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Root access to the great firewall. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/405/notes</link>
      <description>Daniel Schwalbe, DomainTools Head of Investigations and CISO, is sharing their work on "Inside the Great Firewall." This two-part research project analyzes an extraordinary 500–600GB leak that exposes the internal architecture, tooling, and human ecosystem behind China’s Great Firewall. 

Across both parts, you break down thousands of leaked documents, source code repositories, diagrams, packet captures, and telemetry that reveal how systems like the Traffic Secure Gateway, MAAT, Redis-based analytics, and modular DPI engines work together to censor, surveil, and fingerprint users at scale. Taken together, the research shows how the Great Firewall functions not just as a technical system, but as a living censorship-industrial complex that adapts, learns, and coordinates across government, telecoms, and security vendors.

The research can be found here:


  Inside the Great Firewall Part 1: The Dump

  Inside the Great Firewall Part 2: Technical Infrastructure


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Dec 2025 08:00:00 -0000</pubDate>
      <itunes:title>Root access to the great firewall. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>405</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8fa1036c-d790-11f0-8076-a71635cd192a/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Daniel Schwalbe, DomainTools Head of Investigations and CISO, is sharing their work on "Inside the Great Firewall." This two-part research project analyzes an extraordinary 500–600GB leak that exposes the internal architecture, tooling, and human ecosystem behind China’s Great Firewall. 

Across both parts, you break down thousands of leaked documents, source code repositories, diagrams, packet captures, and telemetry that reveal how systems like the Traffic Secure Gateway, MAAT, Redis-based analytics, and modular DPI engines work together to censor, surveil, and fingerprint users at scale. Taken together, the research shows how the Great Firewall functions not just as a technical system, but as a living censorship-industrial complex that adapts, learns, and coordinates across government, telecoms, and security vendors.

The research can be found here:


  Inside the Great Firewall Part 1: The Dump

  Inside the Great Firewall Part 2: Technical Infrastructure


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/schwalbe/">Daniel Schwalbe</a>, <a href="https://www.linkedin.com/company/domaintools/">DomainTools</a> Head of Investigations and CISO, is sharing their work on "Inside the Great Firewall." This two-part research project analyzes an extraordinary 500–600GB leak that exposes the internal architecture, tooling, and human ecosystem behind China’s Great Firewall. </p>
<p>Across both parts, you break down thousands of leaked documents, source code repositories, diagrams, packet captures, and telemetry that reveal how systems like the Traffic Secure Gateway, MAAT, Redis-based analytics, and modular DPI engines work together to censor, surveil, and fingerprint users at scale. Taken together, the research shows how the Great Firewall functions not just as a technical system, but as a living censorship-industrial complex that adapts, learns, and coordinates across government, telecoms, and security vendors.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://dti.domaintools.com/inside-the-great-firewall-part-1-the-dump/">Inside the Great Firewall Part 1: The Dump</a></li>
  <li><a href="https://dti.domaintools.com/inside-the-great-firewall-part-2-technical-infrastructure/">Inside the Great Firewall Part 2: Technical Infrastructure</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1566</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8fa1036c-d790-11f0-8076-a71635cd192a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1543258454.mp3?updated=1765556564" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>One rule to rule them all.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2452/notes</link>
      <description>A new executive order targets states’ AI regulations, while the White House shifts course on an NSA deputy director pick. The UK fines LastPass over inadequate security measures. Researchers warn of active attacks against Gladinet CentreStack instances. OpenAI outlines future cybersecurity plans. MITRE ranks the top 25 vulnerabilities of 2025. CISA orders U.S. federal agencies to urgently patch a critical GeoServer vulnerability. An anti-piracy coalition shuts down one of India’s most popular illegal streaming services. Our guest Mark Lance, Vice President, DFIR &amp; Threat Intelligence, GuidePoint Security, unpacks purple team table top exercises to prepare for AI-generated attacks. Hackers set their sights on DNA.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Mark Lance, Vice President, DFIR &amp; Threat Intelligence, GuidePoint Security, is discussing purple team table top exercises to prepare for AI-generated attacks.

Selected Reading

Trump Signs Executive Order to Block State AI Regulations (SecurityWeek)

Announced pick for No. 2 at NSA won’t get the job as another candidate surfaces (The Record)

LastPass Data Breach — Insufficient Security Exposed 1.6 Million Users (Forbes)

Gladinet CentreStack Flaw Exploited to Hack Organizations (SecurityWeek)

OpenAI lays out its plan for major advances in AI cybersecurity features (SC Media)

MITRE Releases 2025 List of Top 25 Most Dangerous Software Vulnerabilities (SecurityWeek)

CISA orders feds to patch actively exploited Geoserver flaw (Bleeping Computer)

MKVCinemas streaming piracy service with 142M visits shuts down (Bleeping Computer)

The Unseen Threat: DNA as Malware (BankInfoSecurity)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 12 Dec 2025 21:10:00 -0000</pubDate>
      <itunes:title>One rule to rule them all.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2452</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A new executive order targets states’ AI regulations, while the White House shifts course on an NSA deputy director pick. The UK fines LastPass over inadequate security measures. Researchers warn of active attacks against Gladinet CentreStack instances. OpenAI outlines future cybersecurity plans. MITRE ranks the top 25 vulnerabilities of 2025. CISA orders U.S. federal agencies to urgently patch a critical GeoServer vulnerability. An anti-piracy coalition shuts down one of India’s most popular illegal streaming services. Our guest Mark Lance, Vice President, DFIR &amp; Threat Intelligence, GuidePoint Security, unpacks purple team table top exercises to prepare for AI-generated attacks. Hackers set their sights on DNA.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Mark Lance, Vice President, DFIR &amp; Threat Intelligence, GuidePoint Security, is discussing purple team table top exercises to prepare for AI-generated attacks.

Selected Reading

Trump Signs Executive Order to Block State AI Regulations (SecurityWeek)

Announced pick for No. 2 at NSA won’t get the job as another candidate surfaces (The Record)

LastPass Data Breach — Insufficient Security Exposed 1.6 Million Users (Forbes)

Gladinet CentreStack Flaw Exploited to Hack Organizations (SecurityWeek)

OpenAI lays out its plan for major advances in AI cybersecurity features (SC Media)

MITRE Releases 2025 List of Top 25 Most Dangerous Software Vulnerabilities (SecurityWeek)

CISA orders feds to patch actively exploited Geoserver flaw (Bleeping Computer)

MKVCinemas streaming piracy service with 142M visits shuts down (Bleeping Computer)

The Unseen Threat: DNA as Malware (BankInfoSecurity)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A new executive order targets states’ AI regulations, while the White House shifts course on an NSA deputy director pick. The UK fines LastPass over inadequate security measures. Researchers warn of active attacks against Gladinet CentreStack instances. OpenAI outlines future cybersecurity plans. MITRE ranks the top 25 vulnerabilities of 2025. CISA orders U.S. federal agencies to urgently patch a critical GeoServer vulnerability. An anti-piracy coalition shuts down one of India’s most popular illegal streaming services. Our guest Mark Lance, Vice President, DFIR &amp; Threat Intelligence, GuidePoint Security, unpacks purple team table top exercises to prepare for AI-generated attacks. Hackers set their sights on DNA.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p><a href="https://www.linkedin.com/in/mark-lance-9594234/"><u>Mark Lance</u></a>, Vice President, DFIR &amp; Threat Intelligence, <a href="https://www.linkedin.com/company/guidepointsec/"><u>GuidePoint Security</u></a>, is discussing purple team table top exercises to prepare for AI-generated attacks.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.securityweek.com/trump-signs-executive-order-to-block-state-ai-regulations/"><u>Trump Signs Executive Order to Block State AI Regulations</u></a> (SecurityWeek)</p>
<p><a href="https://therecord.media/announced-nsa-deputy-director-pick-joe-francescon-not-taking-job"><u>Announced pick for No. 2 at NSA won’t get the job as another candidate surfaces</u></a> (The Record)</p>
<p><a href="https://www.forbes.com/sites/daveywinder/2025/12/12/lastpass-data-breach---insufficient-security-exposed-16-million-users/"><u>LastPass Data Breach — Insufficient Security Exposed 1.6 Million Users</u></a> (Forbes)</p>
<p><a href="https://www.securityweek.com/gladinet-centrestack-flaw-exploited-to-hack-organizations/"><u>Gladinet CentreStack Flaw Exploited to Hack Organizations</u></a> (SecurityWeek)</p>
<p><a href="https://www.scworld.com/news/openai-outlines-plans-to-prepare-for-future-ai-cybersecurity-capabilities"><u>OpenAI lays out its plan for major advances in AI cybersecurity features</u></a> (SC Media)</p>
<p><a href="https://www.securityweek.com/mitre-releases-2025-list-of-top-25-most-dangerous-software-vulnerabilities/"><u>MITRE Releases 2025 List of Top 25 Most Dangerous Software Vulnerabilities</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-feds-to-patch-actively-exploited-geoserver-flaw/"><u>CISA orders feds to patch actively exploited Geoserver flaw</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/mkvcinemas-streaming-piracy-service-with-142m-visits-shuts-down/"><u>MKVCinemas streaming piracy service with 142M visits shuts down</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bankinfosecurity.com/blogs/unseen-threat-dna-as-malware-p-3993"><u>The Unseen Threat: DNA as Malware</u></a> (BankInfoSecurity)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1727</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d86ea940-1c7a-11f0-85e0-f72183939c49]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5962679189.mp3?updated=1765569636" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Weak passwords meet strong motives</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2451/notes</link>
      <description>CISA warns that pro-Russia hacktivist groups are targeting US critical infrastructure. Google patches three new Chrome zero-day vulnerabilities. North Korean actors exploit React2Shell to deploy a new backdoor.  Researchers claim Docker Hub secret leakage is now a systemic problem. Attackers exploit an unpatched zero-day in Gogs, the self-hosted Git service. IBM patches more than 100 vulnerabilities across its product line. Storm-0249 abuses endpoint detection and response tools. The DOJ indicts a former Accenture employee for allegedly misleading federal customers about cloud security. Our guest is Kavitha Mariappan, Chief Transformation Officer at Rubrik, talking about understanding &amp; building resilience against identity-driven threats. A malware tutor gets schooled by the law.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices segment, we are joined by Kavitha Mariappan, Chief Transformation Officer at Knowledge Partner Rubrik, talking about understanding and building resilience against identity-driven threats. Tune into Kavitha’s full conversation here. 


  
New Rubrik Research Finds Identity Resilience is Imperative as AI Wave Floods the Workplace with AI Agents (Press release)



  
The Identity Crisis: Understanding and Building Resilience Against Identity-Driven Threats (Report) 



  
Agentic AI and Identity Sprawl (Data Security Decoded podcast episode) Host Caleb Tolin and guest ⁠Joe Hladik⁠, Head of Rubrik Zero Labs, to unpack the findings from their the report Kavitha addresses. 




Resources: Rubrik’s Data Security Decoded podcast airs semi-monthly on the N2K CyberWire network with host Caleb Tolin. You can catch new episodes twice a month on Tuesdays on your favorite podcast app. 

Selected Reading

CISA: Pro-Russia Hacktivists Target US Critical Infrastructure

New cybersecurity guidance paves the way for AI in critical infrastructure | CyberScoop

Google Releases Critical Chrome Security Update to Address Zero-Days - Infosecurity Magazine

North Korea-linked ‘EtherRAT’ backdoor used in React2Shell attacks | SC Media

Thousands of Exposed Secrets Found on Docker Hub - Flare

Hackers exploit unpatched Gogs zero-day to breach 700 servers

IBM Patches Over 100 Vulnerabilities - SecurityWeek

Ransomware IAB abuses EDR for stealthy malware execution

US charges former Accenture employee with misleading feds on cloud platform’s security - Nextgov/FCW

Man gets jail for filming malware tutorials for syndicate; 129 Singapore victims lost S$3.2m - CNA

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 11 Dec 2025 21:10:00 -0000</pubDate>
      <itunes:title>Weak passwords meet strong motives</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2451</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA warns that pro-Russia hacktivist groups are targeting US critical infrastructure. Google patches three new Chrome zero-day vulnerabilities. North Korean actors exploit React2Shell to deploy a new backdoor.  Researchers claim Docker Hub secret leakage is now a systemic problem. Attackers exploit an unpatched zero-day in Gogs, the self-hosted Git service. IBM patches more than 100 vulnerabilities across its product line. Storm-0249 abuses endpoint detection and response tools. The DOJ indicts a former Accenture employee for allegedly misleading federal customers about cloud security. Our guest is Kavitha Mariappan, Chief Transformation Officer at Rubrik, talking about understanding &amp; building resilience against identity-driven threats. A malware tutor gets schooled by the law.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices segment, we are joined by Kavitha Mariappan, Chief Transformation Officer at Knowledge Partner Rubrik, talking about understanding and building resilience against identity-driven threats. Tune into Kavitha’s full conversation here. 


  
New Rubrik Research Finds Identity Resilience is Imperative as AI Wave Floods the Workplace with AI Agents (Press release)



  
The Identity Crisis: Understanding and Building Resilience Against Identity-Driven Threats (Report) 



  
Agentic AI and Identity Sprawl (Data Security Decoded podcast episode) Host Caleb Tolin and guest ⁠Joe Hladik⁠, Head of Rubrik Zero Labs, to unpack the findings from their the report Kavitha addresses. 




Resources: Rubrik’s Data Security Decoded podcast airs semi-monthly on the N2K CyberWire network with host Caleb Tolin. You can catch new episodes twice a month on Tuesdays on your favorite podcast app. 

Selected Reading

CISA: Pro-Russia Hacktivists Target US Critical Infrastructure

New cybersecurity guidance paves the way for AI in critical infrastructure | CyberScoop

Google Releases Critical Chrome Security Update to Address Zero-Days - Infosecurity Magazine

North Korea-linked ‘EtherRAT’ backdoor used in React2Shell attacks | SC Media

Thousands of Exposed Secrets Found on Docker Hub - Flare

Hackers exploit unpatched Gogs zero-day to breach 700 servers

IBM Patches Over 100 Vulnerabilities - SecurityWeek

Ransomware IAB abuses EDR for stealthy malware execution

US charges former Accenture employee with misleading feds on cloud platform’s security - Nextgov/FCW

Man gets jail for filming malware tutorials for syndicate; 129 Singapore victims lost S$3.2m - CNA

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA warns that pro-Russia hacktivist groups are targeting US critical infrastructure. Google patches three new Chrome zero-day vulnerabilities. North Korean actors exploit React2Shell to deploy a new backdoor.  Researchers claim Docker Hub secret leakage is now a systemic problem. Attackers exploit an unpatched zero-day in Gogs, the self-hosted Git service. IBM patches more than 100 vulnerabilities across its product line. Storm-0249 abuses endpoint detection and response tools. The DOJ indicts a former Accenture employee for allegedly misleading federal customers about cloud security. Our guest is Kavitha Mariappan, Chief Transformation Officer at Rubrik, talking about understanding &amp; building resilience against identity-driven threats. A malware tutor gets schooled by the law.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On today’s Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/kmariappan/"><u>Kavitha Mariappan</u></a>, Chief Transformation Officer at Knowledge Partner <a href="https://www.rubrik.com/"><u>Rubrik</u></a>, talking about understanding and building resilience against identity-driven threats. Tune into Kavitha’s full conversation <a href="https://explore.thecyberwire.com/rubrik">here</a>. </p>
<ul>
  <li>
<p><a href="https://www.rubrik.com/company/newsroom/press-releases/25/new-rubrik-research-finds-identity-resilience-is-imperative-as-ai-wave-floods-the-workplace-with-ai-agents"><u>New Rubrik Research Finds Identity Resilience is Imperative as AI Wave Floods the Workplace with AI Agents</u></a> (Press release)</p>
</li>
  <li>
<p><a href="https://zerolabs.rubrik.com/reports/the-identity-crisis"><u>The Identity Crisis: Understanding and Building Resilience Against Identity-Driven Threats</u></a> (Report) </p>
</li>
  <li>
<p><a href="https://www.thecyberwire.com/podcasts/data-security-decoded/39/notes"><u>Agentic AI and Identity Sprawl</u></a> (Data Security Decoded podcast episode) Host Caleb Tolin and guest ⁠Joe Hladik⁠, Head of Rubrik Zero Labs, to unpack the findings from their the report Kavitha addresses. </p>
</li>
</ul>
<p><strong>Resources:</strong> Rubrik’s <a href="https://www.thecyberwire.com/podcasts/data-security-decoded"><u>Data Security Decoded</u></a> podcast airs semi-monthly on the N2K CyberWire network with host Caleb Tolin. You can catch new episodes twice a month on Tuesdays on your favorite podcast app. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.darkreading.com/threat-intelligence/hactivists-target-critical-infrastructure"><u>CISA: Pro-Russia Hacktivists Target US Critical Infrastructure</u></a></p>
<p><a href="https://cyberscoop.com/ai-cybersecurity-guidance-critical-infrastructure-op-ed/"><u>New cybersecurity guidance paves the way for AI in critical infrastructure | CyberScoop</u></a></p>
<p><a href="https://www.infosecurity-magazine.com/news/google-chrome-security-update/"><u>Google Releases Critical Chrome Security Update to Address Zero-Days - Infosecurity Magazine</u></a></p>
<p><a href="https://www.scworld.com/news/north-korea-linked-etherrat-backdoor-used-in-react2shell-attacks"><u>North Korea-linked ‘EtherRAT’ backdoor used in React2Shell attacks | SC Media</u></a></p>
<p><a href="https://flare.io/learn/resources/docker-hub-secrets-exposed/"><u>Thousands of Exposed Secrets Found on Docker Hub - Flare</u></a></p>
<p><a href="https://www.bleepingcomputer.com/news/security/unpatched-gogs-zero-day-rce-flaw-actively-exploited-in-attacks/"><u>Hackers exploit unpatched Gogs zero-day to breach 700 servers</u></a></p>
<p><a href="https://www.securityweek.com/ibm-patches-over-100-vulnerabilities/"><u>IBM Patches Over 100 Vulnerabilities - SecurityWeek</u></a></p>
<p><a href="https://www.bleepingcomputer.com/news/security/ransomware-iab-abuses-edr-for-stealthy-malware-execution/"><u>Ransomware IAB abuses EDR for stealthy malware execution</u></a></p>
<p><a href="https://www.nextgov.com/cybersecurity/2025/12/us-charges-former-accenture-employee-misleading-feds-cloud-platforms-security/410085/"><u>US charges former Accenture employee with misleading feds on cloud platform’s security - Nextgov/FCW</u></a></p>
<p><a href="https://www.channelnewsasia.com/singapore/malaysian-malware-android-phones-129-victims-singapore-32-million-5569846"><u>Man gets jail for filming malware tutorials for syndicate; 129 Singapore victims lost S$3.2m - CNA</u></a></p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1870</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d84a4a78-1c7a-11f0-85e0-bf498fae6f9f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8507005022.mp3?updated=1765482915" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When preview pane becomes preview pain.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2450/notes</link>
      <description>Patch Tuesday. Federal prosecutors charge a Houston man with smuggling Nvidia chips to China, a Ukrainian woman for targeting critical infrastructure, and an Atlanta activist for wiping his phone. The power sector sees cyber threats doubling. The new Spiderman phishing kit slings its way across the dark web. Our guest is Dick O'Brien, Principal Intelligence Analyst from Symantec and Carbon Black Threat Hunter Team, discussing “Unwanted Gifts: Major Campaign Lures Targets with Fake Party Invites.” The Pentagon unveils a killer chatbot. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Dick O'Brien, Principal Intelligence Analyst from Symantec and Carbon Black Threat Hunter Team, is discussing “Unwanted Gifts: Major Campaign Lures Targets with Fake Party Invites."

Selected Reading

Microsoft Patches 57 Vulnerabilities, Three Zero-Days (SecurityWeek)

Google Patches Gemini Enterprise Vulnerability Exposing Corporate Data (SecurityWeek)

Adobe Patches Nearly 140 Vulnerabilities (SecurityWeek)

ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Rockwell, Schneider (SecurityWeek)

Fortinet Patches Critical Authentication Bypass Vulnerabilities (SecurityWeek)

Smuggling Ring Charged as Trump Okays Nvidia Sales to China (Gov Infosecurity)

Cybersecurity in power: supply chain most vulnerable, varying confidence in resilience (Power Technology)

Spiderman Phishing Kit Targets European Banks with Real-Time Credential Theft (Hackread)

Hospice Firm, Eye Care Practice Notifying 520,000 of Hacks (Bank Infosecurity)

Ukrainian hacker charged with helping Russian hacktivist groups (Bleeping Computer)

Man Charged for Wiping Phone Before CBP Could Search It (404 Media)

Pete Hegseth Says the Pentagon's New Chatbot Will Make America 'More Lethal' (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 10 Dec 2025 21:10:00 -0000</pubDate>
      <itunes:title>When preview pane becomes preview pain.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2450</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Patch Tuesday. Federal prosecutors charge a Houston man with smuggling Nvidia chips to China, a Ukrainian woman for targeting critical infrastructure, and an Atlanta activist for wiping his phone. The power sector sees cyber threats doubling. The new Spiderman phishing kit slings its way across the dark web. Our guest is Dick O'Brien, Principal Intelligence Analyst from Symantec and Carbon Black Threat Hunter Team, discussing “Unwanted Gifts: Major Campaign Lures Targets with Fake Party Invites.” The Pentagon unveils a killer chatbot. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Dick O'Brien, Principal Intelligence Analyst from Symantec and Carbon Black Threat Hunter Team, is discussing “Unwanted Gifts: Major Campaign Lures Targets with Fake Party Invites."

Selected Reading

Microsoft Patches 57 Vulnerabilities, Three Zero-Days (SecurityWeek)

Google Patches Gemini Enterprise Vulnerability Exposing Corporate Data (SecurityWeek)

Adobe Patches Nearly 140 Vulnerabilities (SecurityWeek)

ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Rockwell, Schneider (SecurityWeek)

Fortinet Patches Critical Authentication Bypass Vulnerabilities (SecurityWeek)

Smuggling Ring Charged as Trump Okays Nvidia Sales to China (Gov Infosecurity)

Cybersecurity in power: supply chain most vulnerable, varying confidence in resilience (Power Technology)

Spiderman Phishing Kit Targets European Banks with Real-Time Credential Theft (Hackread)

Hospice Firm, Eye Care Practice Notifying 520,000 of Hacks (Bank Infosecurity)

Ukrainian hacker charged with helping Russian hacktivist groups (Bleeping Computer)

Man Charged for Wiping Phone Before CBP Could Search It (404 Media)

Pete Hegseth Says the Pentagon's New Chatbot Will Make America 'More Lethal' (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Patch Tuesday. Federal prosecutors charge a Houston man with smuggling Nvidia chips to China, a Ukrainian woman for targeting critical infrastructure, and an Atlanta activist for wiping his phone. The power sector sees cyber threats doubling. The new Spiderman phishing kit slings its way across the dark web. Our guest is Dick O'Brien, Principal Intelligence Analyst from Symantec and Carbon Black Threat Hunter Team, discussing “Unwanted Gifts: Major Campaign Lures Targets with Fake Party Invites.” The Pentagon unveils a killer chatbot. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p><strong></strong><a href="https://www.linkedin.com/in/dicko1/"><u>Dick O'Brien</u></a>, Principal Intelligence Analyst from <a href="https://www.linkedin.com/company/symantec/"><u>Symantec</u></a> and Carbon Black Threat Hunter Team, is discussing “Unwanted Gifts: Major Campaign Lures Targets with Fake Party Invites."</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.securityweek.com/microsoft-patches-57-vulnerabilities-three-zero-days/"><u>Microsoft Patches 57 Vulnerabilities, Three Zero-Days</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/google-patches-gemini-enterprise-vulnerability-exposing-corporate-data/"><u>Google Patches Gemini Enterprise Vulnerability Exposing Corporate Data </u></a>(SecurityWeek)</p>
<p><a href="https://www.securityweek.com/adobe-patches-nearly-140-vulnerabilities/"><u>Adobe Patches Nearly 140 Vulnerabilities</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-fixed-by-siemens-rockwell-schneider/"><u>ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Rockwell, Schneider</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/fortinet-patches-critical-authentication-bypass-vulnerabilities/"><u>Fortinet Patches Critical Authentication Bypass Vulnerabilities </u></a>(SecurityWeek)</p>
<p><a href="https://www.govinfosecurity.com/smuggling-ring-charged-as-trump-okays-nvidia-sales-to-china-a-30235"><u>Smuggling Ring Charged as Trump Okays Nvidia Sales to China</u></a> (Gov Infosecurity)</p>
<p><a href="https://www.power-technology.com/features/cybersecurity-in-power-supply-chain-most-vulnerable-varying-confidence-in-resilience/"><u>Cybersecurity in power: supply chain most vulnerable, varying confidence in resilience</u></a> (Power Technology)</p>
<p><a href="https://hackread.com/spiderman-phishing-kit-european-banks-credential-theft/"><u>Spiderman Phishing Kit Targets European Banks with Real-Time Credential Theft</u></a> (Hackread)</p>
<p><a href="https://www.bankinfosecurity.com/hospice-firm-eye-care-practice-notifying-520000-hacks-a-30240"><u>Hospice Firm, Eye Care Practice Notifying 520,000 of Hacks</u></a> (Bank Infosecurity)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/ukrainian-hacker-charged-with-helping-russian-hacktivist-groups/"><u>Ukrainian hacker charged with helping Russian hacktivist groups</u></a> (Bleeping Computer)</p>
<p><a href="https://www.404media.co/man-charged-for-wiping-phone-before-cbp-could-search-it/"><u>Man Charged for Wiping Phone Before CBP Could Search It</u></a> (404 Media)</p>
<p><a href="https://www.404media.co/pete-hegseth-says-the-pentagons-new-chatbot-will-make-america-more-lethal/"><u>Pete Hegseth Says the Pentagon's New Chatbot Will Make America 'More Lethal'</u></a> (404 Media)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1433</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d8257bd0-1c7a-11f0-85e0-dffe1250421e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1672505808.mp3?updated=1765393962" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The bug that got everyone’s attention.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2449/notes</link>
      <description>Organizations worldwide scramble to address the critical React2Shell vulnerability.  Major insurers look to exclude artificial intelligence risks from corporate policies. Three Chinese hacking groups converge on the same Sharepoint flaws. Ransomware crews target hypervisors. A UK hospital asks the High Court to block publication of data stolen by the Clop gang. The White House approves additional Nvidia AI chip exports to China. The ICEBlock app creator sues the feds over app store removal. The FBI warns of virtual kidnapping scams. The FTC upholds a ban on a stalkerware maker. Dave Lindner, CISO of Contrast Security, discusses nation-state adversaries targeting source code to infiltrate the government and private sector. Craigslist’s founder pledges support for cybersecurity, veterans and pigeons.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

⁠Dave Lindner⁠, CISO of ⁠Contrast Security⁠, discusses nation-state adversaries targeting source code to infiltrate the government and private sector.

Selected Reading

Researchers track dozens of organizations affected by React2Shell compromises tied to China’s MSS (The Record)

Insurers retreat from AI cover as risk of multibillion-dollar claims mounts (Financial Times)

Three hacking groups, two vulnerabilities and all eyes on China (The Record)

Researchers spot 700 percent increase in hypervisor ransomware attacks (The Register)

UK Hospital Asks Court to Stymie Ransomware Data Leak (Bank Infosecurity)

Trump says Nvidia can sell more powerful AI chips to China (The Verge)

ICEBlock developer sues Trump administration over App Store removal (The Verge)

New FBI alert urges vigilance on virtual kidnapping schemes (SC Media)

FTC upholds ban on stalkerware founder Scott Zuckerman (TechCrunch)

Craigslist founder signs the Giving Pledge, and his fortune will go to military families, fighting cyberattacks—and a pigeon rescue (Fortune)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Dec 2025 21:10:00 -0000</pubDate>
      <itunes:title>The bug that got everyone’s attention.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>244</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Organizations worldwide scramble to address the critical React2Shell vulnerability.  Major insurers look to exclude artificial intelligence risks from corporate policies. Three Chinese hacking groups converge on the same Sharepoint flaws. Ransomware crews target hypervisors. A UK hospital asks the High Court to block publication of data stolen by the Clop gang. The White House approves additional Nvidia AI chip exports to China. The ICEBlock app creator sues the feds over app store removal. The FBI warns of virtual kidnapping scams. The FTC upholds a ban on a stalkerware maker. Dave Lindner, CISO of Contrast Security, discusses nation-state adversaries targeting source code to infiltrate the government and private sector. Craigslist’s founder pledges support for cybersecurity, veterans and pigeons.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

⁠Dave Lindner⁠, CISO of ⁠Contrast Security⁠, discusses nation-state adversaries targeting source code to infiltrate the government and private sector.

Selected Reading

Researchers track dozens of organizations affected by React2Shell compromises tied to China’s MSS (The Record)

Insurers retreat from AI cover as risk of multibillion-dollar claims mounts (Financial Times)

Three hacking groups, two vulnerabilities and all eyes on China (The Record)

Researchers spot 700 percent increase in hypervisor ransomware attacks (The Register)

UK Hospital Asks Court to Stymie Ransomware Data Leak (Bank Infosecurity)

Trump says Nvidia can sell more powerful AI chips to China (The Verge)

ICEBlock developer sues Trump administration over App Store removal (The Verge)

New FBI alert urges vigilance on virtual kidnapping schemes (SC Media)

FTC upholds ban on stalkerware founder Scott Zuckerman (TechCrunch)

Craigslist founder signs the Giving Pledge, and his fortune will go to military families, fighting cyberattacks—and a pigeon rescue (Fortune)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Organizations worldwide scramble to address the critical React2Shell vulnerability.  Major insurers look to exclude artificial intelligence risks from corporate policies. Three Chinese hacking groups converge on the same Sharepoint flaws. Ransomware crews target hypervisors. A UK hospital asks the High Court to block publication of data stolen by the Clop gang. The White House approves additional Nvidia AI chip exports to China. The ICEBlock app creator sues the feds over app store removal. The FBI warns of virtual kidnapping scams. The FTC upholds a ban on a stalkerware maker. Dave Lindner, CISO of Contrast Security, discusses nation-state adversaries targeting source code to infiltrate the government and private sector. Craigslist’s founder pledges support for cybersecurity, veterans and pigeons.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p><a href="https://www.linkedin.com/in/dlindner/">⁠<u>Dave Lindner</u>⁠</a>, CISO of <a href="https://www.linkedin.com/company/contrast-security/">⁠<u>Contrast Security</u>⁠</a>, discusses nation-state adversaries targeting source code to infiltrate the government and private sector.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/researchers-track-dozens-react2shell-vuln"><u>Researchers track dozens of organizations affected by React2Shell compromises tied to China’s MSS</u></a> (The Record)</p>
<p><a href="https://www.ft.com/content/abfe9741-f438-4ed6-a673-075ec177dc62"><u>Insurers retreat from AI cover as risk of multibillion-dollar claims mounts</u></a> (Financial Times)</p>
<p><a href="https://therecord.media/three-hacking-groups-two-vulnerabilities-china-microsoft"><u>Three hacking groups, two vulnerabilities and all eyes on China</u></a> (The Record)</p>
<p><a href="https://www.theregister.com/2025/12/09/hypervisor_ransomware_attacks_increasing/"><u>Researchers spot 700 percent increase in hypervisor ransomware attacks</u></a> (The Register)</p>
<p><a href="https://www.bankinfosecurity.com/uk-hospital-asks-court-to-stymie-ransomware-data-leak-a-30222"><u>UK Hospital Asks Court to Stymie Ransomware Data Leak</u></a> (Bank Infosecurity)</p>
<p><a href="https://www.theverge.com/news/840557/nvidia-h200-ai-chips-china-exports-us"><u>Trump says Nvidia can sell more powerful AI chips to China</u> </a>(The Verge)</p>
<p><a href="https://www.theverge.com/news/840164/iceblock-joshua-aaron-sues-trump-administration-apple-app-store-removeal"><u>ICEBlock developer sues Trump administration over App Store removal</u> </a>(The Verge)</p>
<p><a href="https://www.scworld.com/brief/new-fbi-alert-urges-vigilance-on-virtual-kidnapping-schemes"><u>New FBI alert urges vigilance on virtual kidnapping schemes</u> </a>(SC Media)</p>
<p><a href="https://techcrunch.com/2025/12/08/ftc-upholds-ban-on-stalkerware-founder-scott-zuckerman/"><u>FTC upholds ban on stalkerware founder Scott Zuckerman</u> </a>(TechCrunch)</p>
<p><a href="https://fortune.com/2025/12/08/craigslist-founder-craig-newmark-signs-giving-pledge-pigeon-rescue-donation/"><u>Craigslist founder signs the Giving Pledge, and his fortune will go to military families, fighting cyberattacks—and a pigeon rescue</u></a> (Fortune)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1647</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d800d65e-1c7a-11f0-85e0-93cfc4f43fd0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1697994604.mp3?updated=1765309617" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI and cyber practicum [CISOP]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/120/notes</link>
      <description>In this episode, host Kim Jones examines the rapid rise of enterprise AI and the tension between innovation and protection, sharing an RSA anecdote that highlights both excitement and concern. He outlines the benefits organizations hope to gain from AI while calling out often-overlooked risks like data quality, governance, and accountability. Kim is joined by technologist Tony Gauda to discuss why AI represents a fundamental shift in how systems and decisions are designed. Together, they explore AI-driven operations, cultural barriers to experimentation, and how CISOs can adopt AI responsibly without compromising security.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Dec 2025 07:00:00 -0000</pubDate>
      <itunes:title>AI and cyber practicum [CISOP]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>120</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9c467642-c94e-11f0-b4e4-97c119f0cd1f/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode, host Kim Jones examines the rapid rise of enterprise AI and the tension between innovation and protection, sharing an RSA anecdote that highlights both excitement and concern. He outlines the benefits organizations hope to gain from AI while calling out often-overlooked risks like data quality, governance, and accountability. Kim is joined by technologist Tony Gauda to discuss why AI represents a fundamental shift in how systems and decisions are designed. Together, they explore AI-driven operations, cultural barriers to experimentation, and how CISOs can adopt AI responsibly without compromising security.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, host Kim Jones examines the rapid rise of enterprise AI and the tension between innovation and protection, sharing an RSA anecdote that highlights both excitement and concern. He outlines the benefits organizations hope to gain from AI while calling out often-overlooked risks like data quality, governance, and accountability. Kim is joined by technologist <a href="https://www.linkedin.com/in/tonygauda/">Tony Gauda</a> to discuss why AI represents a fundamental shift in how systems and decisions are designed. Together, they explore AI-driven operations, cultural barriers to experimentation, and how CISOs can adopt AI responsibly without compromising security.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion ⁠⁠<a href="https://thecyberwire.com/stories/f47ed2ce767e47609d8783ac0ca236b5/ai-and-cyber-practicum">blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9c467642-c94e-11f0-b4e4-97c119f0cd1f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4497985429.mp3?updated=1763997783" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>America’s tech turn.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2448/notes</link>
      <description>How might Trump’s new National Security Strategy impact cyber? The UK’s NCSC warns LLMs may never get over prompt injection. At least 18 U.S. universities were hit by a months-long phishing campaign. Russia blocks FaceTime. A bipartisan group of senators reviving efforts to strengthen protections across the health sector. Portugal provides legal safe harbor for good-faith security research. A large-scale campaign targets Palo Alto GlobalProtect portals. A Maryland man gets 15 months in prison for his part in a North Korean IT worker scam. Business Brief. Tim Starks from CyberScoop unpacks the President's pending cybersecurity strategy release. An AI image sends UK train schedules off the rails. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Tim Starks, senior reporter  from CyberScoop, discussing President Trump's pending cybersecurity strategy release and the end of Sean Plankey’s nomination process.

Selected Reading

National Security Strategy (The White House)

The National Security Strategy: The Good, the Not So Great, and the Alarm Bells (CSIS)

UK intelligence warns AI 'prompt injection' attacks might never go away (The Record)

Over 70 Domains Used in Months-Long Phishing Spree Against US Universities (Hackread)

Russia restricts FaceTime, its latest step in controlling online communications (AP News)

Bipartisan health care cybersecurity legislation returns to address a cornucopia of issues (CyberScoop)

Portugal updates cybercrime law to exempt security researchers (Bleeping Computer)

New wave of VPN login attempts targets Palo Alto GlobalProtect portals (Bleeping Computer)

Maryland man sentenced for N. Korea IT worker scheme involving US government contracts (The Record)

ServiceNow reportedly intends to acquire Veza for more than $1 billion (N2K Pro Business Briefing)

Trains cancelled over fake bridge collapse image (BBC News)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 08 Dec 2025 21:10:00 -0000</pubDate>
      <itunes:title>America’s tech turn.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2448</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>How might Trump’s new National Security Strategy impact cyber? The UK’s NCSC warns LLMs may never get over prompt injection. At least 18 U.S. universities were hit by a months-long phishing campaign. Russia blocks FaceTime. A bipartisan group of senators reviving efforts to strengthen protections across the health sector. Portugal provides legal safe harbor for good-faith security research. A large-scale campaign targets Palo Alto GlobalProtect portals. A Maryland man gets 15 months in prison for his part in a North Korean IT worker scam. Business Brief. Tim Starks from CyberScoop unpacks the President's pending cybersecurity strategy release. An AI image sends UK train schedules off the rails. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Tim Starks, senior reporter  from CyberScoop, discussing President Trump's pending cybersecurity strategy release and the end of Sean Plankey’s nomination process.

Selected Reading

National Security Strategy (The White House)

The National Security Strategy: The Good, the Not So Great, and the Alarm Bells (CSIS)

UK intelligence warns AI 'prompt injection' attacks might never go away (The Record)

Over 70 Domains Used in Months-Long Phishing Spree Against US Universities (Hackread)

Russia restricts FaceTime, its latest step in controlling online communications (AP News)

Bipartisan health care cybersecurity legislation returns to address a cornucopia of issues (CyberScoop)

Portugal updates cybercrime law to exempt security researchers (Bleeping Computer)

New wave of VPN login attempts targets Palo Alto GlobalProtect portals (Bleeping Computer)

Maryland man sentenced for N. Korea IT worker scheme involving US government contracts (The Record)

ServiceNow reportedly intends to acquire Veza for more than $1 billion (N2K Pro Business Briefing)

Trains cancelled over fake bridge collapse image (BBC News)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>How might Trump’s new National Security Strategy impact cyber? The UK’s NCSC warns LLMs may never get over prompt injection. At least 18 U.S. universities were hit by a months-long phishing campaign. Russia blocks FaceTime. A bipartisan group of senators reviving efforts to strengthen protections across the health sector. Portugal provides legal safe harbor for good-faith security research. A large-scale campaign targets Palo Alto GlobalProtect portals. A Maryland man gets 15 months in prison for his part in a North Korean IT worker scam. Business Brief. Tim Starks from CyberScoop unpacks the President's pending cybersecurity strategy release. An AI image sends UK train schedules off the rails. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/tstarks/"><u>Tim Starks</u></a>, senior reporter  from <a href="https://cyberscoop.com/"><u>CyberScoop</u></a>, discussing President Trump's <a href="https://cyberscoop.com/trump-national-cybersecurity-strategy-2025-release/"><u>pending cybersecurity strategy</u></a> release and the <a href="https://cyberscoop.com/sean-plankey-cisa-nomination-stalled-senate-holds/"><u>end of Sean Plankey’s nomination</u></a> process.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.whitehouse.gov/wp-content/uploads/2025/12/2025-National-Security-Strategy.pdf"><u>National Security Strategy</u></a> (The White House)</p>
<p><a href="https://www.csis.org/analysis/national-security-strategy-good-not-so-great-and-alarm-bells"><u>The National Security Strategy: The Good, the Not So Great, and the Alarm Bells</u></a> (CSIS)</p>
<p><a href="https://therecord.media/prompt-injection-attacks-uk-intelligence-warning"><u>UK intelligence warns AI 'prompt injection' attacks might never go away</u></a> (The Record)</p>
<p><a href="https://hackread.com/us-universities-domains-phishing-attacks/"><u>Over 70 Domains Used in Months-Long Phishing Spree Against US Universities</u></a> (Hackread)</p>
<p><a href="https://apnews.com/article/russia-internet-crackdown-facetime-restrictions-06301be480510b18ae02039c6524cd80"><u>Russia restricts FaceTime, its latest step in controlling online communications</u></a> (AP News)</p>
<p><a href="https://cyberscoop.com/bipartisan-health-care-cybersecurity-legislation-returns-to-address-a-cornucopia-of-issues/"><u>Bipartisan health care cybersecurity legislation returns to address a cornucopia of issues</u></a> (CyberScoop)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/portugal-updates-cybercrime-law-to-exempt-security-researchers/"><u>Portugal updates cybercrime law to exempt security researchers</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/new-wave-of-vpn-login-attempts-targets-palo-alto-globalprotect-portals/"><u>New wave of VPN login attempts targets Palo Alto GlobalProtect portals</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/north-korea-it-worker-scheme-maryland-man-sentenced"><u>Maryland man sentenced for N. Korea IT worker scheme involving US government contracts</u></a> (The Record)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/7/48"><u>ServiceNow reportedly intends to acquire Veza for more than $1 billion</u></a> (N2K Pro Business Briefing)</p>
<p><a href="https://www.bbc.com/news/articles/cwygqqll9k2o"><u>Trains cancelled over fake bridge collapse image</u></a> (BBC News)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1624</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d7db79f4-1c7a-11f0-85e0-cf30fd3479db]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6519634079.mp3?updated=1765223435" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jon DiMaggio: Two roads diverged. [Strategy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/98/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Chief security strategist from Analyst1, Jon DiMaggio shares his story on how he grew to become a part of the cybersecurity world. He describes different jobs that paved the way to the knowledge he has in the industry right now, and he even shares about an experience that led him to a path that split and which decision he would make, would be crucial in his career. He explains which way he ended up going and how a critical part of his career helped to determine that path. He says "there's two paths when you have that happen, you can either let it defeat you, or you know, you come back swinging." We thank Jon for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 07 Dec 2025 08:00:00 -0000</pubDate>
      <itunes:title>Jon DiMaggio: Two roads diverged. [Strategy] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>98</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a0e6ca40-d1ea-11f0-bfb7-af8fe18cd9c1/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Chief security strategist from Analyst1, Jon DiMaggio shares his story on how he grew to become a part of the cybersecurity world. He describes different jobs that paved the way to the knowledge he has in the industry right now, and he even shares about an experience that led him to a path that split and which decision he would make, would be crucial in his career. He explains which way he ended up going and how a critical part of his career helped to determine that path. He says "there's two paths when you have that happen, you can either let it defeat you, or you know, you come back swinging." We thank Jon for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Chief security strategist from Analyst1, Jon DiMaggio shares his story on how he grew to become a part of the cybersecurity world. He describes different jobs that paved the way to the knowledge he has in the industry right now, and he even shares about an experience that led him to a path that split and which decision he would make, would be crucial in his career. He explains which way he ended up going and how a critical part of his career helped to determine that path. He says "there's two paths when you have that happen, you can either let it defeat you, or you know, you come back swinging." We thank Jon for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>559</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a0e6ca40-d1ea-11f0-bfb7-af8fe18cd9c1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6975852102.mp3?updated=1735936620" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When macOS gets frostbite. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/404/notes</link>
      <description>Jaron Bradley, Director of Jamf Threat Labs, is sharing their work on "ChillyHell: A Deep Dive into a Modular macOS Backdoor." Jamf Threat Labs uncovers a newly notarized macOS backdoor called ChillyHell, tied to past UNC4487 activity and disguised as a legitimate applet. 

The malware showcases robust host profiling, multiple persistence mechanisms, timestomping, and flexible C2 communications over both DNS and HTTP. Its modular design includes reverse shells, payload delivery, self-updates, and a brute-force component targeting user credentials.

The research can be found here:


  
⁠ChillyHell: A Deep Dive into a Modular macOS Backdoor



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Dec 2025 08:00:00 -0000</pubDate>
      <itunes:title>When macOS gets frostbite. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>404</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a643e1b8-d1f8-11f0-8ec8-431f1da4b1ab/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Jaron Bradley, Director of Jamf Threat Labs, is sharing their work on "ChillyHell: A Deep Dive into a Modular macOS Backdoor." Jamf Threat Labs uncovers a newly notarized macOS backdoor called ChillyHell, tied to past UNC4487 activity and disguised as a legitimate applet. 

The malware showcases robust host profiling, multiple persistence mechanisms, timestomping, and flexible C2 communications over both DNS and HTTP. Its modular design includes reverse shells, payload delivery, self-updates, and a brute-force component targeting user credentials.

The research can be found here:


  
⁠ChillyHell: A Deep Dive into a Modular macOS Backdoor



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/jaron-bradley/">Jaron Bradley,</a> Director of <a href="https://www.linkedin.com/company/jamf-software/">Jamf </a>Threat Labs, is sharing their work on "ChillyHell: A Deep Dive into a Modular macOS Backdoor." Jamf Threat Labs uncovers a newly notarized macOS backdoor called ChillyHell, tied to past UNC4487 activity and disguised as a legitimate applet. </p>
<p>The malware showcases robust host profiling, multiple persistence mechanisms, timestomping, and flexible C2 communications over both DNS and HTTP. Its modular design includes reverse shells, payload delivery, self-updates, and a brute-force component targeting user credentials.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://redcanary.com/blog/threat-intelligence/phishing-rmm-tools/">⁠</a><a href="https://www.jamf.com/blog/chillyhell-a-modular-macos-backdoor/?nav=1">ChillyHell: A Deep Dive into a Modular macOS Backdoor</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1480</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a643e1b8-d1f8-11f0-8ec8-431f1da4b1ab]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5518585462.mp3?updated=1764952171" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>China’s quiet crawl into critical networks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2447/notes</link>
      <description>Chinese threat actors deploy Brickstorm malware. The critical React2Shell vulnerability is under active exploitation. Cloudflare’s emergency patch triggered a brief global outage. Phishing kits pivot to fake e-commerce sites. The European Commission fines X(Twitter) €120 million for violating the Digital Services Act. Predator spyware has a new bag of tricks. A Russian physicist gets 21 years in prison for cybercrimes. Twin brothers are arrested for allegedly stealing and destroying government data. Our guest is Blair Canavan, Director of Alliances - PKI &amp; PQC Portfolio from Thales, discussing post quantum cryptography. Smart toilet encryption claims don’t hold water. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today on our Industry Voices segment, we are joined by Blair Canavan, Director of Alliances - PKI &amp; PQC Portfolio from Thales, discussing post quantum cryptography (PQC). Listen to Blair’s full conversation here.

Selected Reading

Chinese hackers used Brickworm malware to breach critical US infrastructure (TechRadar)

React2Shell critical flaw actively exploited in China-linked attacks (BleepingComputer)

Cloudflare blames today's outage on emergency React2Shell patch (Bleeping Computer)

SMS Phishers Pivot to Points, Taxes, Fake Retailers (Krebs on Security)

Threat Spotlight: Introducing GhostFrame, a new super stealthy phishing kit (Barracuda)

EU issues €120 million fine to Elon Musk's X under rules to tackle disinformation  (The Record)

Predator spyware uses new infection vector for zero-click attacks (Bleeping Computer)

Russian scientist sentenced to 21 years on treason, cyber sabotage charges (The Record)

Twins with hacking history charged in insider data breach affecting multiple federal agencies (Cyberscoop)

‘End-to-end encrypted’ smart toilet camera is not actually end-to-end encrypted (TechCrunch)- kicker

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 05 Dec 2025 21:10:00 -0000</pubDate>
      <itunes:title>China’s quiet crawl into critical networks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2447</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Chinese threat actors deploy Brickstorm malware. The critical React2Shell vulnerability is under active exploitation. Cloudflare’s emergency patch triggered a brief global outage. Phishing kits pivot to fake e-commerce sites. The European Commission fines X(Twitter) €120 million for violating the Digital Services Act. Predator spyware has a new bag of tricks. A Russian physicist gets 21 years in prison for cybercrimes. Twin brothers are arrested for allegedly stealing and destroying government data. Our guest is Blair Canavan, Director of Alliances - PKI &amp; PQC Portfolio from Thales, discussing post quantum cryptography. Smart toilet encryption claims don’t hold water. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today on our Industry Voices segment, we are joined by Blair Canavan, Director of Alliances - PKI &amp; PQC Portfolio from Thales, discussing post quantum cryptography (PQC). Listen to Blair’s full conversation here.

Selected Reading

Chinese hackers used Brickworm malware to breach critical US infrastructure (TechRadar)

React2Shell critical flaw actively exploited in China-linked attacks (BleepingComputer)

Cloudflare blames today's outage on emergency React2Shell patch (Bleeping Computer)

SMS Phishers Pivot to Points, Taxes, Fake Retailers (Krebs on Security)

Threat Spotlight: Introducing GhostFrame, a new super stealthy phishing kit (Barracuda)

EU issues €120 million fine to Elon Musk's X under rules to tackle disinformation  (The Record)

Predator spyware uses new infection vector for zero-click attacks (Bleeping Computer)

Russian scientist sentenced to 21 years on treason, cyber sabotage charges (The Record)

Twins with hacking history charged in insider data breach affecting multiple federal agencies (Cyberscoop)

‘End-to-end encrypted’ smart toilet camera is not actually end-to-end encrypted (TechCrunch)- kicker

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chinese threat actors deploy Brickstorm malware. The critical React2Shell vulnerability is under active exploitation. Cloudflare’s emergency patch triggered a brief global outage. Phishing kits pivot to fake e-commerce sites. The European Commission fines X(Twitter) €120 million for violating the Digital Services Act. Predator spyware has a new bag of tricks. A Russian physicist gets 21 years in prison for cybercrimes. Twin brothers are arrested for allegedly stealing and destroying government data. Our guest is Blair Canavan, Director of Alliances - PKI &amp; PQC Portfolio from Thales, discussing post quantum cryptography. Smart toilet encryption claims don’t hold water. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today on our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/blair-canavan-5b708a2/"><u>Blair Canavan</u></a>, Director of Alliances - PKI &amp; PQC Portfolio from <a href="https://www.linkedin.com/company/thales/"><u>Thales</u></a>, discussing post quantum cryptography (PQC). Listen to Blair’s full conversation <a href="https://explore.thecyberwire.com/blair-canavan">here</a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.techradar.com/pro/security/chinese-hackers-used-brickworm-malware-to-breach-critical-us-infrastructure"><u>Chinese hackers used Brickworm malware to breach critical US infrastructure</u></a> (TechRadar)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/react2shell-critical-flaw-actively-exploited-in-china-linked-attacks/"><u>React2Shell critical flaw actively exploited in China-linked attacks</u></a> (BleepingComputer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cloudflare-blames-todays-outage-on-emergency-react2shell-patch/"><u>Cloudflare blames today's outage on emergency React2Shell patch</u></a> (Bleeping Computer)</p>
<p><a href="https://krebsonsecurity.com/2025/12/sms-phishers-pivot-to-points-taxes-fake-retailers/"><u>SMS Phishers Pivot to Points, Taxes, Fake Retailers</u></a> (Krebs on Security)</p>
<p><a href="https://blog.barracuda.com/2025/12/04/threat-spotlight-ghostframe-phishing-kit"><u>Threat Spotlight: Introducing GhostFrame, a new super stealthy phishing kit</u></a> (Barracuda)</p>
<p><a href="https://therecord.media/eu-fines-x-under-digital-services-act-disinformation-transparecy-rules"><u>EU issues €120 million fine to Elon Musk's X under rules to tackle disinformation</u></a>  (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/predator-spyware-uses-new-infection-vector-for-zero-click-attacks/"><u>Predator spyware uses new infection vector for zero-click attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/russia-sentences-physicist-treason-ddos-attacks"><u>Russian scientist sentenced to 21 years on treason, cyber sabotage charges</u></a> (The Record)</p>
<p><a href="https://cyberscoop.com/muneeb-sohaib-akhter-government-contractors-insider-attack"><u>Twins with hacking history charged in insider data breach affecting multiple federal agencies</u></a> (Cyberscoop)</p>
<p><a href="https://techcrunch.com/2025/12/03/end-to-end-encrypted-smart-toilet-camera-is-not-actually-end-to-end-encrypted/"><u>‘End-to-end encrypted’ smart toilet camera is not actually end-to-end encrypted</u></a> (TechCrunch)- kicker</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1813</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d7b6b24a-1c7a-11f0-85e0-83127c9b4d5b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3500229861.mp3?updated=1764961074" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pay cuts and a personnel freefall.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2446/notes</link>
      <description>CISA staff may see pay cuts in 2026. Threat actors advertise a full chain zero-day exploit for iOS. A US-led international coalition releases joint guidance on integrating AI into operational technology. Microsoft lowers sales growth targets for its agentic AI products. A major fintech provider suffers a ransomware-linked breach. Arizona’s Attorney General sues Temo over data collection practices. Lessons learned from Capita’s handling of Black Basta. The UK sanctions Russia’s GRU. My guest is Dave Baggett, co-founder and CEO of INKY (recently acquired by Kaseya), about the challenges of email security. A U.S. Bankruptcy Court insists on AI transparency.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today, Dave Bittner speaks with Dave Baggett, co-founder and CEO of INKY (recently acquired by Kaseya), about the need to update email security that was built on a 1971 design.

Selected Reading

US Slashes Pay Incentives at Already Weakened Cyber Agency (Bloomberg)

Zero-Day Alert: Alleged iOS 26 Full Chain Exploit for Sale (Dataminr)

Principles for the Secure Integration of Artificial Intelligence in Operational Technology (CISA)

Microsoft drops AI sales targets in half after salespeople miss their quotas (Ars Technica)

Marketing and Compliance Software Vendor to Banks Breached (Data Breach Today)

Arizona attorney general sues Chinese online retailer Temu over data theft claims (AP News)

What organisations can learn from the record breaking fine over Capita’s ransomware incident (DoublePulsar)

UK cracks down on Russian intelligence agency authorised by Putin to target Skripals (GOV.UK)

General Order 210: Filings Using Generative Artificial Intelligence (Southern District of California, United States Bankruptcy Court)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 04 Dec 2025 21:10:00 -0000</pubDate>
      <itunes:title>Pay cuts and a personnel freefall.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2446</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA staff may see pay cuts in 2026. Threat actors advertise a full chain zero-day exploit for iOS. A US-led international coalition releases joint guidance on integrating AI into operational technology. Microsoft lowers sales growth targets for its agentic AI products. A major fintech provider suffers a ransomware-linked breach. Arizona’s Attorney General sues Temo over data collection practices. Lessons learned from Capita’s handling of Black Basta. The UK sanctions Russia’s GRU. My guest is Dave Baggett, co-founder and CEO of INKY (recently acquired by Kaseya), about the challenges of email security. A U.S. Bankruptcy Court insists on AI transparency.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today, Dave Bittner speaks with Dave Baggett, co-founder and CEO of INKY (recently acquired by Kaseya), about the need to update email security that was built on a 1971 design.

Selected Reading

US Slashes Pay Incentives at Already Weakened Cyber Agency (Bloomberg)

Zero-Day Alert: Alleged iOS 26 Full Chain Exploit for Sale (Dataminr)

Principles for the Secure Integration of Artificial Intelligence in Operational Technology (CISA)

Microsoft drops AI sales targets in half after salespeople miss their quotas (Ars Technica)

Marketing and Compliance Software Vendor to Banks Breached (Data Breach Today)

Arizona attorney general sues Chinese online retailer Temu over data theft claims (AP News)

What organisations can learn from the record breaking fine over Capita’s ransomware incident (DoublePulsar)

UK cracks down on Russian intelligence agency authorised by Putin to target Skripals (GOV.UK)

General Order 210: Filings Using Generative Artificial Intelligence (Southern District of California, United States Bankruptcy Court)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA staff may see pay cuts in 2026. Threat actors advertise a full chain zero-day exploit for iOS. A US-led international coalition releases joint guidance on integrating AI into operational technology. Microsoft lowers sales growth targets for its agentic AI products. A major fintech provider suffers a ransomware-linked breach. Arizona’s Attorney General sues Temo over data collection practices. Lessons learned from Capita’s handling of Black Basta. The UK sanctions Russia’s GRU. My guest is Dave Baggett, co-founder and CEO of INKY (recently acquired by Kaseya), about the challenges of email security. A U.S. Bankruptcy Court insists on AI transparency.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today, Dave Bittner speaks with <a href="https://www.linkedin.com/in/davidbaggett"><u>Dave Baggett</u></a>, co-founder and CEO of INKY (recently acquired by <a href="https://www.kaseya.com/"><u>Kaseya</u></a>), about the need to update email security that was built on a 1971 design.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bloomberg.com/news/articles/2025-12-03/us-cyber-agency-cuts-incentive-pay-program-for-diminished-staff?accessToken=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzb3VyY2UiOiJTdWJzY3JpYmVyR2lmdGVkQXJ0aWNsZSIsImlhdCI6MTc2NDc5MjA4NywiZXhwIjoxNzY1Mzk2ODg3LCJhcnRpY2xlSWQiOiJUNk5QUU5LSzNOWUEwMCIsImJjb25uZWN0SWQiOiI0RkU5RTRCMUI3Q0I0MUREOUZFMDNDNTBCQTU2OTU3MyJ9.0ZtehZU224ipMTtFcPQo8_TvrSm2ozlUuv77SbdRxY4"><u>US Slashes Pay Incentives at Already Weakened Cyber Agency</u></a> (Bloomberg)</p>
<p><a href="https://www.dataminr.com/resources/intel-brief/zero-day-alert-alleged-ios-26-full-chain-exploit-for-sale/"><u>Zero-Day Alert: Alleged iOS 26 Full Chain Exploit for Sale</u></a> (Dataminr)</p>
<p><a href="https://media.defense.gov/2025/Dec/03/2003834257/-1/-1/0/JOINT_GUIDANCE_PRINCIPLES_FOR_THE_SECURE_INTEGRATION_OF_AI_IN_OT.PDF"><u>Principles for the Secure Integration of Artificial Intelligence in Operational Technology</u></a> (CISA)</p>
<p><a href="https://arstechnica.com/ai/2025/12/microsoft-slashes-ai-sales-growth-targets-as-customers-resist-unproven-agents/"><u>Microsoft drops AI sales targets in half after salespeople miss their quotas</u></a> (Ars Technica)</p>
<p><a href="https://www.databreachtoday.com/marketing-compliance-software-vendor-to-banks-breached-a-30184"><u>Marketing and Compliance Software Vendor to Banks Breached</u></a> (Data Breach Today)</p>
<p><a href="https://apnews.com/article/arizona-temu-lawsuit-14615cec4bb7927493a7208f9d23431b"><u>Arizona attorney general sues Chinese online retailer Temu over data theft claims</u></a> (AP News)</p>
<p><a href="https://doublepulsar.com/what-organisations-can-learn-from-the-record-breaking-fine-over-capitas-ransomware-incident-6afbdfcdd35b"><u>What organisations can learn from the record breaking fine over Capita’s ransomware incident </u></a>(DoublePulsar)</p>
<p><a href="https://www.gov.uk/government/news/uk-cracks-down-on-russian-intelligence-agency-authorised-by-putin-to-target-skripals"><u>UK cracks down on Russian intelligence agency authorised by Putin to target Skripals</u></a> (GOV.UK)</p>
<p><a href="https://www.casb.uscourts.gov/news/general-order-210-filings-using-generative-artificial-intelligence"><u>General Order 210: Filings Using Generative Artificial Intelligence</u></a> (Southern District of California, United States Bankruptcy Court)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1659</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d790db42-1c7a-11f0-85e0-3fd3e8287b33]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8460447493.mp3?updated=1764875685" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Just another day of scamming and jamming. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2445/notes</link>
      <description>The DOJ shuts down another scam center in Myanmar. OpenAI confirms a Mixpanel data breach. A new phishing campaign targets company executives. A bipartisan bill looks to preserve the State and Local Cybersecurity Grant Program. Universities suffer Oracle EBS data breaches. India reports GPS jamming at eight major airports. Kaiser Permanente settles a class action suit over tracking pixels. The FTC plans to require a cloud provider to delete unnecessary student data. An international initiative is developing guidelines for commercial spyware. Our N2K Producer Liz Stokes speaks with Kristiina Omri, Director of Special Programs for CybExer Technologies about the cyber ranges for NATO and ESA. Iranian hackers give malware a retro reboot. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

Today, we bring you a conversation our N2K Producer Liz Stokes and Kristiina Omri, Director of Special Programs for CybExer Technologies, had during Liz’s  visit to Tallinn, Estonia about the cyber ranges for NATO and ESA.

We are pleased to share that our N2K colleagues Liz Stokes and Maria Varmazis were in Tallinn, Estonia this week for the NATO Cyber Coalition 2025 Cyber Range Exercise. Their visit marks the CyberWire as the only United States podcasters invited to attend. We’ll be sharing interviews and insights from the event, starting today with our producer Liz Stokes’ conversation with  Kristiina Omri, Director of Special Programs for CybExer Technologies.



Selected ReadingDOJ takes down Myanmar scam center website spoofing TickMill trading platform (The Record)

OpenAI Confirms Mixpanel Data Breach—Was Your Data Stolen? (KnowTechie)

New “Executive Award” Scam Exploits ClickFix to Deliver Stealerium Malware (GB Hackers)

Hassan and Cornyn bring in bipartisan bill to keep state and local cyber grant program alive (Industrial Cyber)

Penn and Phoenix Universities Disclose Data Breach After Oracle Hack (SecurityWeek)

Indian government reveals GPS spoofing at eight major airports (The Register)

Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit (BankInfo Security)

FTC settlement requires Illuminate to delete unnecessary student data (Bleeping Computer)

Pall Mall Process to Define Responsible Commercial Cyber Intrusion (Infosecurity Magazine)

Iran Hackers Take Inspiration From Snake Video Game (GovInfo Security)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 03 Dec 2025 21:00:00 -0000</pubDate>
      <itunes:title>Just another day of scamming and jamming. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2445</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The DOJ shuts down another scam center in Myanmar. OpenAI confirms a Mixpanel data breach. A new phishing campaign targets company executives. A bipartisan bill looks to preserve the State and Local Cybersecurity Grant Program. Universities suffer Oracle EBS data breaches. India reports GPS jamming at eight major airports. Kaiser Permanente settles a class action suit over tracking pixels. The FTC plans to require a cloud provider to delete unnecessary student data. An international initiative is developing guidelines for commercial spyware. Our N2K Producer Liz Stokes speaks with Kristiina Omri, Director of Special Programs for CybExer Technologies about the cyber ranges for NATO and ESA. Iranian hackers give malware a retro reboot. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

Today, we bring you a conversation our N2K Producer Liz Stokes and Kristiina Omri, Director of Special Programs for CybExer Technologies, had during Liz’s  visit to Tallinn, Estonia about the cyber ranges for NATO and ESA.

We are pleased to share that our N2K colleagues Liz Stokes and Maria Varmazis were in Tallinn, Estonia this week for the NATO Cyber Coalition 2025 Cyber Range Exercise. Their visit marks the CyberWire as the only United States podcasters invited to attend. We’ll be sharing interviews and insights from the event, starting today with our producer Liz Stokes’ conversation with  Kristiina Omri, Director of Special Programs for CybExer Technologies.



Selected ReadingDOJ takes down Myanmar scam center website spoofing TickMill trading platform (The Record)

OpenAI Confirms Mixpanel Data Breach—Was Your Data Stolen? (KnowTechie)

New “Executive Award” Scam Exploits ClickFix to Deliver Stealerium Malware (GB Hackers)

Hassan and Cornyn bring in bipartisan bill to keep state and local cyber grant program alive (Industrial Cyber)

Penn and Phoenix Universities Disclose Data Breach After Oracle Hack (SecurityWeek)

Indian government reveals GPS spoofing at eight major airports (The Register)

Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit (BankInfo Security)

FTC settlement requires Illuminate to delete unnecessary student data (Bleeping Computer)

Pall Mall Process to Define Responsible Commercial Cyber Intrusion (Infosecurity Magazine)

Iran Hackers Take Inspiration From Snake Video Game (GovInfo Security)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The DOJ shuts down another scam center in Myanmar. OpenAI confirms a Mixpanel data breach. A new phishing campaign targets company executives. A bipartisan bill looks to preserve the State and Local Cybersecurity Grant Program. Universities suffer Oracle EBS data breaches. India reports GPS jamming at eight major airports. Kaiser Permanente settles a class action suit over tracking pixels. The FTC plans to require a cloud provider to delete unnecessary student data. An international initiative is developing guidelines for commercial spyware. Our N2K Producer Liz Stokes speaks with Kristiina Omri, Director of Special Programs for CybExer Technologies about the cyber ranges for NATO and ESA. Iranian hackers give malware a retro reboot. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br></p>
<p><strong>CyberWire Guest</strong></p>
<p>Today, we bring you a conversation our N2K Producer <a href="https://www.linkedin.com/in/elizabeth-stokes-183925181/"><u>Liz Stokes</u></a> and <a href="https://www.linkedin.com/in/kristiinaomri/"><u>Kristiina Omri</u></a>, Director of Special Programs for <a href="https://cybexer.com/"><u>CybExer Technologies</u></a>, had during Liz’s  visit to Tallinn, Estonia about the cyber ranges for NATO and ESA.</p>
<p>We are pleased to share that our N2K colleagues Liz Stokes and Maria Varmazis were in Tallinn, Estonia this week for the NATO Cyber Coalition 2025 Cyber Range Exercise. Their visit marks the CyberWire as the only United States podcasters invited to attend. We’ll be sharing interviews and insights from the event, starting today with our producer Liz Stokes’ conversation with  <a href="https://www.linkedin.com/in/kristiinaomri/"><u>Kristiina Omri</u></a>, Director of Special Programs for <a href="https://cybexer.com/"><u>CybExer Technologies</u></a>.</p>
<p><br></p>
<p><strong>Selected Reading</strong><br><a href="https://therecord.media/doj-takes-down-myanmar-scam-site-trickmill-spoof"><u>DOJ takes down Myanmar scam center website spoofing TickMill trading platform</u></a> (The Record)</p>
<p><a href="https://knowtechie.com/mixpanel-data-breach-openai/"><u>OpenAI Confirms Mixpanel Data Breach—Was Your Data Stolen?</u></a> (KnowTechie)</p>
<p><a href="https://gbhackers.com/stealerium-malware/"><u>New “Executive Award” Scam Exploits ClickFix to Deliver Stealerium Malware</u></a> (GB Hackers)</p>
<p><a href="https://industrialcyber.co/regulation-standards-and-compliance/hassan-and-cornyn-bring-in-bipartisan-bill-to-keep-state-and-local-cyber-grant-program-alive/"><u>Hassan and Cornyn bring in bipartisan bill to keep state and local cyber grant program alive</u></a> (Industrial Cyber)</p>
<p><a href="https://www.securityweek.com/penn-and-phoenix-universities-disclose-data-breach-after-oracle-hack/"><u>Penn and Phoenix Universities Disclose Data Breach After Oracle Hack</u></a> (SecurityWeek)</p>
<p><a href="https://www.theregister.com/2025/12/03/india_gps_spoofing/"><u>Indian government reveals GPS spoofing at eight major airports</u></a> (The Register)</p>
<p><a href="https://www.bankinfosecurity.com/kaiser-permanente-to-pay-up-to-475m-in-web-tracker-lawsuit-a-30180"><u>Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit</u></a> (BankInfo Security)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/ftc-settlement-requires-illuminate-to-delete-unnecessary-student-data/"><u>FTC settlement requires Illuminate to delete unnecessary student data</u></a> (Bleeping Computer)</p>
<p><a href="https://www.infosecurity-magazine.com/news/pall-mall-process-responsible/"><u>Pall Mall Process to Define Responsible Commercial Cyber Intrusion</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.govinfosecurity.com/iran-hackers-take-inspiration-from-snake-video-game-a-30177"><u>Iran Hackers Take Inspiration From Snake Video Game</u></a> (GovInfo Security)</p>
<p><br><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  </p>
<p><br><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1793</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d76a2556-1c7a-11f0-85e0-8f5e8533c64b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2608167027.mp3?updated=1764786379" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Unseen World [Cyber Things]</title>
      <link>https://thecyberwire.com/podcasts/cyber-things/1/notes</link>
      <description>Enjoy this episode of Cyber things from Armis. Catch the next episode on your favorite podcast app on December 15th. 



Welcome to Cyber Things, a special edition podcast produced in partnership by Armis and N2K CyberWire that plunges into the hidden world beneath our connected reality. Inspired by Stranger Things, we explore the digital realm's own Upside Down - a space teeming with unseen devices, silent intruders, and invisible threats that quietly impact our everyday lives.

In this first episode, we tackle the core challenge of modern defense: seeing the unseen. Rebecca Cradick, VP of Global Communications at Armis, is joined by Kam Chumley-Soltani, Director of OT Solutions Engineering at Armis. They discuss what it truly takes for cybersecurity professionals to achieve full visibility and how early intelligence acts as a crucial barrier, stopping a devastating cyber storm before it breaks through the gate.

Tune in now to hear how defenders are fighting back against the digital demons that lurk in the shadows.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 03 Dec 2025 06:00:00 -0000</pubDate>
      <itunes:title>The Unseen World [Cyber Things]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/26beda96-cfc4-11f0-b934-bfb99a2688e7/image/598f663001482de5bf3a04ee496ae9be.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Enjoy this episode of Cyber things from Armis. Catch the next episode on your favorite podcast app on December 15th. 



Welcome to Cyber Things, a special edition podcast produced in partnership by Armis and N2K CyberWire that plunges into the hidden world beneath our connected reality. Inspired by Stranger Things, we explore the digital realm's own Upside Down - a space teeming with unseen devices, silent intruders, and invisible threats that quietly impact our everyday lives.

In this first episode, we tackle the core challenge of modern defense: seeing the unseen. Rebecca Cradick, VP of Global Communications at Armis, is joined by Kam Chumley-Soltani, Director of OT Solutions Engineering at Armis. They discuss what it truly takes for cybersecurity professionals to achieve full visibility and how early intelligence acts as a crucial barrier, stopping a devastating cyber storm before it breaks through the gate.

Tune in now to hear how defenders are fighting back against the digital demons that lurk in the shadows.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>Enjoy this episode of Cyber things from Armis. Catch the next episode on your favorite podcast app on December 15th. </strong></em></p>
<p><br></p>
<p>Welcome to Cyber Things, a special edition podcast produced in partnership by Armis and N2K CyberWire that plunges into the hidden world beneath our connected reality. Inspired by <em>Stranger Things</em>, we explore the digital realm's own Upside Down - a space teeming with unseen devices, silent intruders, and invisible threats that quietly impact our everyday lives.</p>
<p>In this first episode, we tackle the core challenge of modern defense: seeing the unseen. Rebecca Cradick, VP of Global Communications at Armis, is joined by Kam Chumley-Soltani, Director of OT Solutions Engineering at Armis. They discuss what it truly takes for cybersecurity professionals to achieve full visibility and how early intelligence acts as a crucial barrier, stopping a devastating cyber storm before it breaks through the gate.</p>
<p>Tune in now to hear how defenders are fighting back against the digital demons that lurk in the shadows.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1595</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[26beda96-cfc4-11f0-b934-bfb99a2688e7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2282363145.mp3?updated=1769626040" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ShadyPanda’s patient poisoning.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2444/notes</link>
      <description>ShadyPanda plays the long game. India mandates tracking software on mobile devices. Korea weighs punitive damages after a massive breach. Qualcomm patches a critical boot flaw impacting millions. OpenAI patches a Codex CLI vulnerability. Google patches Android zero-days. Cybersecurity issues prompt an FDA permanent recall for an at-home ventilator system. Switzerland questions the security of hyperscale clouds and SaaS services. One of the world’s largest cyber insurers pulls back from the market. On our Threat Vector segment, ⁠David Moulton⁠ sits down with ⁠Stav Setty to unpack the Jingle Thief campaign.  In Russia, Porsches take a holiday. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



Threat Vector segment

In today’s Threat Vector segment, host ⁠David Moulton⁠, Senior Director of Thought Leadership for Unit 42, sits down with ⁠Stav Setty⁠, Principal Researcher at Palo Alto Networks, to unpack Jingle Thief a cloud-only, identity-driven campaign that turned Microsoft 365 into a gift card printing press. Stav explains how the Morocco-based group known as Atlas Lion lived off the land inside M365 for months at a time, using tailored phishing and smishing pages, URL tricks, and internal phishing to compromise one user and quietly pivot to dozens more. To listen to the full conversation on Threat Vector, listen here. You can catch new episodes of Threat Vector every Thursday on your favorite podcast app. 

Selected Reading

Browser extensions pushed malware to 4.3M Chrome, Edge users (The Register)

India plans to verify and record every smartphone in circulation (TechCrunch)

Apple to Resist India's Order to Preload Government App on iPhones (MacRumors)

President orders probe into Coupang breach (The Korea Herald)

Qualcomm Alerts Users to Critical Flaws That Compromise the Secure Boot Process (GB Hackers)

Vulnerability in OpenAI Coding Agent Could Facilitate Attacks on Developers (SecurityWeek)

Google Releases Patches for Android Zero-Day Flaws Exploited in the Wild (Infosecurity Magazine)

'Cyber Issue' Leads to FDA Recall of Baxter Respiratory Gear (GovInfoSecurity)

Swiss government bans SaaS and cloud for sensitive info (The Register)

Publication: Resolution on outsourcing data processing to the cloud (Privatim)

Insurer Beazley Steps Back From Cyber Market as Attacks Surge (PYMNTS.com)

Hundreds of Porsche Owners in Russia Unable to Start Cars After System Failure (The Moscow Times)



Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Dec 2025 21:00:00 -0000</pubDate>
      <itunes:title>ShadyPanda’s patient poisoning.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2444</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>ShadyPanda plays the long game. India mandates tracking software on mobile devices. Korea weighs punitive damages after a massive breach. Qualcomm patches a critical boot flaw impacting millions. OpenAI patches a Codex CLI vulnerability. Google patches Android zero-days. Cybersecurity issues prompt an FDA permanent recall for an at-home ventilator system. Switzerland questions the security of hyperscale clouds and SaaS services. One of the world’s largest cyber insurers pulls back from the market. On our Threat Vector segment, ⁠David Moulton⁠ sits down with ⁠Stav Setty to unpack the Jingle Thief campaign.  In Russia, Porsches take a holiday. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



Threat Vector segment

In today’s Threat Vector segment, host ⁠David Moulton⁠, Senior Director of Thought Leadership for Unit 42, sits down with ⁠Stav Setty⁠, Principal Researcher at Palo Alto Networks, to unpack Jingle Thief a cloud-only, identity-driven campaign that turned Microsoft 365 into a gift card printing press. Stav explains how the Morocco-based group known as Atlas Lion lived off the land inside M365 for months at a time, using tailored phishing and smishing pages, URL tricks, and internal phishing to compromise one user and quietly pivot to dozens more. To listen to the full conversation on Threat Vector, listen here. You can catch new episodes of Threat Vector every Thursday on your favorite podcast app. 

Selected Reading

Browser extensions pushed malware to 4.3M Chrome, Edge users (The Register)

India plans to verify and record every smartphone in circulation (TechCrunch)

Apple to Resist India's Order to Preload Government App on iPhones (MacRumors)

President orders probe into Coupang breach (The Korea Herald)

Qualcomm Alerts Users to Critical Flaws That Compromise the Secure Boot Process (GB Hackers)

Vulnerability in OpenAI Coding Agent Could Facilitate Attacks on Developers (SecurityWeek)

Google Releases Patches for Android Zero-Day Flaws Exploited in the Wild (Infosecurity Magazine)

'Cyber Issue' Leads to FDA Recall of Baxter Respiratory Gear (GovInfoSecurity)

Swiss government bans SaaS and cloud for sensitive info (The Register)

Publication: Resolution on outsourcing data processing to the cloud (Privatim)

Insurer Beazley Steps Back From Cyber Market as Attacks Surge (PYMNTS.com)

Hundreds of Porsche Owners in Russia Unable to Start Cars After System Failure (The Moscow Times)



Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>ShadyPanda plays the long game. India mandates tracking software on mobile devices. Korea weighs punitive damages after a massive breach. Qualcomm patches a critical boot flaw impacting millions. OpenAI patches a Codex CLI vulnerability. Google patches Android zero-days. Cybersecurity issues prompt an FDA permanent recall for an at-home ventilator system. Switzerland questions the security of hyperscale clouds and SaaS services. One of the world’s largest cyber insurers pulls back from the market. On our Threat Vector segment, ⁠David Moulton⁠ sits down with ⁠Stav Setty to unpack the Jingle Thief campaign.  In Russia, Porsches take a holiday. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br></p>
<p><strong>Threat Vector segment</strong></p>
<p>In today’s Threat Vector segment, host ⁠<a href="https://www.linkedin.com/in/davidrmoulton/"><u>David Moulton</u></a>⁠, Senior Director of Thought Leadership for Unit 42, sits down with ⁠<a href="https://www.linkedin.com/in/stavsetty/"><u>Stav Setty⁠</u></a>, Principal Researcher at Palo Alto Networks, to unpack Jingle Thief a cloud-only, identity-driven campaign that turned Microsoft 365 into a gift card printing press. Stav explains how the Morocco-based group known as Atlas Lion lived off the land inside M365 for months at a time, using tailored phishing and smishing pages, URL tricks, and internal phishing to compromise one user and quietly pivot to dozens more. To listen to the full conversation on Threat Vector, listen <a href="https://thecyberwire.com/podcasts/threat-vector/904/notes"><u>here</u></a>. You can catch new episodes of <a href="https://thecyberwire.com/podcasts/threat-vector"><u>Threat Vector</u></a> every Thursday on your favorite podcast app. </p>
<p><br><strong>Selected Reading</strong></p>
<p><a href="https://www.theregister.com/2025/12/01/chrome_edge_malicious_browser_extensions/"><u>Browser extensions pushed malware to 4.3M Chrome, Edge users</u></a> (The Register)</p>
<p><a href="https://techcrunch.com/2025/12/02/india-plans-to-verify-and-record-every-smartphone-in-circulation/"><u>India plans to verify and record every smartphone in circulation</u></a> (TechCrunch)</p>
<p><a href="https://www.macrumors.com/2025/12/02/apple-resists-india-order-state-app-iphones/"><u>Apple to Resist India's Order to Preload Government App on iPhones</u></a> (MacRumors)</p>
<p><a href="https://www.koreaherald.com/article/10628003"><u>President orders probe into Coupang breach</u></a> (The Korea Herald)</p>
<p><a href="https://gbhackers.com/qualcomm-alerts-users-to-critical-flaws/"><u>Qualcomm Alerts Users to Critical Flaws That Compromise the Secure Boot Process</u></a> (GB Hackers)</p>
<p><a href="https://www.securityweek.com/vulnerability-in-openai-coding-agent-could-facilitate-attacks-on-developers/"><u>Vulnerability in OpenAI Coding Agent Could Facilitate Attacks on Developers</u></a> (SecurityWeek)</p>
<p><a href="https://www.infosecurity-magazine.com/news/google-patches-android-0day/"><u>Google Releases Patches for Android Zero-Day Flaws Exploited in the Wild</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.govinfosecurity.com/cyber-issue-leads-to-fda-recall-baxter-respiratory-gear-a-30173"><u>'Cyber Issue' Leads to FDA Recall of Baxter Respiratory Gear</u></a> (GovInfoSecurity)</p>
<p><a href="https://www.theregister.com/2025/12/01/infosec_news_in_brief/"><u>Swiss government bans SaaS and cloud for sensitive info</u></a> (The Register)</p>
<p><a href="https://www.privatim.ch/de/publikation-resolution-zur-auslagerung-von-datenbearbeitungen-in-die-cloud/"><u>Publication: Resolution on outsourcing data processing to the cloud</u></a> (Privatim)</p>
<p><a href="https://www.pymnts.com/cybersecurity/2025/insurer-beazley-steps-back-from-cyber-market-as-attacks-surge"><u>Insurer Beazley Steps Back From Cyber Market as Attacks Surge </u></a>(PYMNTS.com)</p>
<p><strong></strong><a href="https://www.themoscowtimes.com/2025/12/02/hundreds-of-porsche-owners-in-russia-unable-to-start-cars-after-system-failure-a91302"><u>Hundreds of Porsche Owners in Russia Unable to Start Cars After System Failure</u></a> (The Moscow Times)</p>
<p><br></p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  </p>
<p><br></p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1333</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d74423ce-1c7a-11f0-85e0-bf7a12fb5d23]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9987701430.mp3?updated=1764706343" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI's impact on business [CISOP]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/119/notes</link>
      <description>In this episode, Kim Jones sits down with Eric Nagel, a former CISO with a rare blend of engineering, legal, and patent expertise, to unpack what responsible AI really looks like inside a modern enterprise. Eric breaks down the difference between traditional machine learning and generative AI, why nondeterministic outputs can be both powerful and risky, and how issues like bias, hallucinations, and data leakage demand new safeguards—including AI firewalls. 

He also discusses what smaller organizations can do to manage AI risk, how tools like code-generation models change expectations for developers, and the evolving regulatory landscape shaping how companies must deploy AI responsibly.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Dec 2025 07:00:00 -0000</pubDate>
      <itunes:title>AI's impact on business [CISOP]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>119</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0d5099ac-c3fb-11f0-ac1a-43f12b033f5a/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode, Kim Jones sits down with Eric Nagel, a former CISO with a rare blend of engineering, legal, and patent expertise, to unpack what responsible AI really looks like inside a modern enterprise. Eric breaks down the difference between traditional machine learning and generative AI, why nondeterministic outputs can be both powerful and risky, and how issues like bias, hallucinations, and data leakage demand new safeguards—including AI firewalls. 

He also discusses what smaller organizations can do to manage AI risk, how tools like code-generation models change expectations for developers, and the evolving regulatory landscape shaping how companies must deploy AI responsibly.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Kim Jones sits down with Eric Nagel, a former CISO with a rare blend of engineering, legal, and patent expertise, to unpack what responsible AI really looks like inside a modern enterprise. Eric breaks down the difference between traditional machine learning and generative AI, why nondeterministic outputs can be both powerful and risky, and how issues like bias, hallucinations, and data leakage demand new safeguards—including AI firewalls. </p>
<p>He also discusses what smaller organizations can do to manage AI risk, how tools like code-generation models change expectations for developers, and the evolving regulatory landscape shaping how companies must deploy AI responsibly.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion ⁠⁠<a href="https://thecyberwire.com/stories/05734e1af67c4113807b3453f635e4d7/ais-impact-on-business">blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2455</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0d5099ac-c3fb-11f0-ac1a-43f12b033f5a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2102842374.mp3?updated=1763413708" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From cryptomixers to recipe mixers.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2443/notes</link>
      <description>European authorities take down an illegal cryptomixer. An Australian man is sentenced for running an airport evil twin WiFi campaign. Researchers unmask a Scattered LAPSUS$ Hunters impresario. CISA flags a cross-site scripting flaw in OpenPLC ScadaBR. A major South Korean retailer suffers a data breach affecting over 33 million customers. Threat actors abuse digital calendar subscription features. New York’s new hospital cybersecurity mandates may raise the bar nationwide. Scammers target Cyber Monday shoppers. Monday business brief. Ann Johnson speaks with Microsoft’s Amy Hogan-Burney on the Afternoon Cyber Tea segment. Google gets caught reheating someone else’s holiday recipe. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, ⁠Daily Briefing⁠, and you’ll never miss a beat. And be sure to follow CyberWire Daily on ⁠LinkedIn⁠.

Afternoon Cyber Tea segment

Afternoon Cyber Tea host Ann Johnson speaks with Amy Hogan-Burney, Corporate Vice President of Customer Trust and Security at Microsoft, about how Microsoft Is redefining global cyber defense. Ann and Amy discuss Microsoft’s evolving approach to combating global cybercrime and the importance of collaboration across the private and public sectors. You can listen to their full conversation here and catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app. 

Selected Reading

Cryptomixer crypto laundering service taken down by law enforcement (Help Net Security)

Man behind in-flight Evil Twin WiFi attacks gets 7 years in prison (Bleeping Computer)

Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’ (Krebs on Security)

U.S. CISA adds an OpenPLC ScadaBR flaw to its Known Exploited Vulnerabilities catalog (Security Affairs)

Data breach hits 'South Korea's Amazon,' potentially affecting 65% of country’s population (The Record)

Threat Actors Exploit Calendar Subscriptions for Phishing and Malware (Infosecurity Magazine)

New York Hospital Cyber Rules to 'Raise the Bar' Nationwide (GovInfo Security)

Over 2,000 Fake Shopping Sites Spotted Before Cyber Monday (Hackread)

Guardio secures $80 million in new funding. (N2K Pro Business Briefing)

Google deletes X post after getting caught using a ‘stolen’ AI recipe infographic (Bleeping Computer)

Share your feedback.What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 01 Dec 2025 21:00:00 -0000</pubDate>
      <itunes:title>From cryptomixers to recipe mixers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2443</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>European authorities take down an illegal cryptomixer. An Australian man is sentenced for running an airport evil twin WiFi campaign. Researchers unmask a Scattered LAPSUS$ Hunters impresario. CISA flags a cross-site scripting flaw in OpenPLC ScadaBR. A major South Korean retailer suffers a data breach affecting over 33 million customers. Threat actors abuse digital calendar subscription features. New York’s new hospital cybersecurity mandates may raise the bar nationwide. Scammers target Cyber Monday shoppers. Monday business brief. Ann Johnson speaks with Microsoft’s Amy Hogan-Burney on the Afternoon Cyber Tea segment. Google gets caught reheating someone else’s holiday recipe. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, ⁠Daily Briefing⁠, and you’ll never miss a beat. And be sure to follow CyberWire Daily on ⁠LinkedIn⁠.

Afternoon Cyber Tea segment

Afternoon Cyber Tea host Ann Johnson speaks with Amy Hogan-Burney, Corporate Vice President of Customer Trust and Security at Microsoft, about how Microsoft Is redefining global cyber defense. Ann and Amy discuss Microsoft’s evolving approach to combating global cybercrime and the importance of collaboration across the private and public sectors. You can listen to their full conversation here and catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app. 

Selected Reading

Cryptomixer crypto laundering service taken down by law enforcement (Help Net Security)

Man behind in-flight Evil Twin WiFi attacks gets 7 years in prison (Bleeping Computer)

Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’ (Krebs on Security)

U.S. CISA adds an OpenPLC ScadaBR flaw to its Known Exploited Vulnerabilities catalog (Security Affairs)

Data breach hits 'South Korea's Amazon,' potentially affecting 65% of country’s population (The Record)

Threat Actors Exploit Calendar Subscriptions for Phishing and Malware (Infosecurity Magazine)

New York Hospital Cyber Rules to 'Raise the Bar' Nationwide (GovInfo Security)

Over 2,000 Fake Shopping Sites Spotted Before Cyber Monday (Hackread)

Guardio secures $80 million in new funding. (N2K Pro Business Briefing)

Google deletes X post after getting caught using a ‘stolen’ AI recipe infographic (Bleeping Computer)

Share your feedback.What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>European authorities take down an illegal cryptomixer. An Australian man is sentenced for running an airport evil twin WiFi campaign. Researchers unmask a Scattered LAPSUS$ Hunters impresario. CISA flags a cross-site scripting flaw in OpenPLC ScadaBR. A major South Korean retailer suffers a data breach affecting over 33 million customers. Threat actors abuse digital calendar subscription features. New York’s new hospital cybersecurity mandates may raise the bar nationwide. Scammers target Cyber Monday shoppers. Monday business brief. Ann Johnson speaks with Microsoft’s Amy Hogan-Burney on the Afternoon Cyber Tea segment. Google gets caught reheating someone else’s holiday recipe. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing">⁠<em>Daily Briefing</em>⁠</a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">⁠<u>LinkedIn</u>⁠</a>.</p>
<p><br><strong>Afternoon Cyber Tea segment</strong></p>
<p>Afternoon Cyber Tea host <a href="https://www.linkedin.com/in/ann-johnsons/"><u>Ann Johnson</u></a> speaks with <a href="https://www.linkedin.com/in/amy-hogan-burney-751579121/"><u>Amy Hogan-Burney</u></a>, Corporate Vice President of Customer Trust and Security at Microsoft, about how Microsoft Is redefining global cyber defense. Ann and Amy discuss Microsoft’s evolving approach to combating global cybercrime and the importance of collaboration across the private and public sectors. You can listen to their full conversation <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea/118/notes"><u>here</u></a> and catch new episodes of <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea"><u>Afternoon Cyber Tea</u></a> every other Tuesday on your favorite podcast app. </p>
<p><br><strong>Selected Reading</strong></p>
<p><a href="https://www.helpnetsecurity.com/2025/12/01/cryptomixer-takedown-seizure/"><u>Cryptomixer crypto laundering service taken down by law enforcement</u></a> (Help Net Security)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/man-behind-in-flight-evil-twin-wifi-attacks-gets-7-years-in-prison/"><u>Man behind in-flight Evil Twin WiFi attacks gets 7 years in prison</u></a> (Bleeping Computer)</p>
<p><a href="https://krebsonsecurity.com/2025/11/meet-rey-the-admin-of-scattered-lapsus-hunters/"><u>Meet Rey, the Admin of ‘Scattered Lapsus$ Hunters’</u></a> (Krebs on Security)</p>
<p><a href="https://securityaffairs.com/185185/security/u-s-cisa-adds-an-openplc-scadabr-flaw-to-its-known-exploited-vulnerabilities-catalog.html"><u>U.S. CISA adds an OpenPLC ScadaBR flaw to its Known Exploited Vulnerabilities catalog</u></a> (Security Affairs)</p>
<p><a href="https://therecord.media/coupang-south-korea-data-breach"><u>Data breach hits 'South Korea's Amazon,' potentially affecting 65% of country’s population</u></a> (The Record)</p>
<p><a href="https://www.infosecurity-magazine.com/news/threat-actors-exploit-calendar-subs/"><u>Threat Actors Exploit Calendar Subscriptions for Phishing and Malware</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.govinfosecurity.com/interviews/new-york-hospital-cyber-rules-to-raise-bar-nationwide-i-5504"><u>New York Hospital Cyber Rules to 'Raise the Bar' Nationwide</u></a> (GovInfo Security)</p>
<p><a href="https://hackread.com/fake-shopping-sites-cyber-monday/"><u>Over 2,000 Fake Shopping Sites Spotted Before Cyber Monday</u></a> (Hackread)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/7/47"><u>Guardio secures $80 million in new funding.</u></a> (N2K Pro Business Briefing)</p>
<p><a href="https://www.bleepingcomputer.com/news/artificial-intelligence/google-deletes-x-post-after-getting-caught-using-a-stolen-ai-recipe-infographic/"><u>Google deletes X post after getting caught using a ‘stolen’ AI recipe infographic</u></a> (Bleeping Computer)</p>
<p><br><strong>Share your feedback.</strong><br>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  <br></p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1540</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d71c62d0-1c7a-11f0-85e0-070f327f14f3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3534269522.mp3?updated=1764614490" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI in the GRC: What's real, what's risky and what's next. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/88/notes</link>
      <description>Join us for a timely and insightful live discussion on the evolving role of artificial intelligence in governance, risk, and compliance. Host Dave Bittner from N2K | CyberWire is joined by Kayne McGladrey from Hyperproof, Matthew Cassidy, PMP, CISA from Grant Thornton (US), and Alam Ali from Hyperproof to explore the current state of artificial intelligence in governance, risk, and compliance. The panel will discuss what AI is truly doing well today, the risks and challenges organizations need to watch for, and how AI is poised to influence the future of GRC. They will also share practical insights and real-world guidance for teams looking to adopt AI responsibly and effectively. Don’t miss this timely conversation as our experts break down what’s real, what’s risky, and what’s next in AI for GRC.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 30 Nov 2025 08:00:00 -0000</pubDate>
      <itunes:title>AI in the GRC: What's real, what's risky and what's next. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>88</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7578395e-caef-11f0-bc48-67b712467ab9/image/0216c9cea15c53e5d2c739964a38623c.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Join us for a timely and insightful live discussion on the evolving role of artificial intelligence in governance, risk, and compliance. Host Dave Bittner from N2K | CyberWire is joined by Kayne McGladrey from Hyperproof, Matthew Cassidy, PMP, CISA from Grant Thornton (US), and Alam Ali from Hyperproof to explore the current state of artificial intelligence in governance, risk, and compliance. The panel will discuss what AI is truly doing well today, the risks and challenges organizations need to watch for, and how AI is poised to influence the future of GRC. They will also share practical insights and real-world guidance for teams looking to adopt AI responsibly and effectively. Don’t miss this timely conversation as our experts break down what’s real, what’s risky, and what’s next in AI for GRC.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Join us for a timely and insightful live discussion on the evolving role of artificial intelligence in governance, risk, and compliance. Host <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> from <a href="https://www.linkedin.com/company/the-cyberwire/">N2K | CyberWire</a> is joined by <a href="https://www.linkedin.com/in/kaynemcgladrey/">Kayne McGladrey</a> from <a href="https://www.linkedin.com/company/hyperproof/">Hyperproof</a>, <a href="https://www.linkedin.com/in/matthew-cassidy-pmp-cisa-1787b06/">Matthew Cassidy, PMP, CISA</a> from <a href="https://www.linkedin.com/company/grant-thornton-us/">Grant Thornton (US)</a>, and Alam Ali from <a href="https://www.linkedin.com/company/hyperproof/">Hyperproof</a> to explore the current state of artificial intelligence in governance, risk, and compliance. The panel will discuss what AI is truly doing well today, the risks and challenges organizations need to watch for, and how AI is poised to influence the future of GRC. They will also share practical insights and real-world guidance for teams looking to adopt AI responsibly and effectively. Don’t miss this timely conversation as our experts break down what’s real, what’s risky, and what’s next in AI for GRC.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3766</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7578395e-caef-11f0-bc48-67b712467ab9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4098610118.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Danielle Jablanski: Finding the path to success [Strategy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/97/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Operational technology cybersecurity strategist from Nozomi Networks, Danielle Jablanski shares her story of building a target map to end up where she is today. She shares how she started in college and how different paths in life got her to be on the target of success where she is today. She says " you build out that kind of target of where you want to be, and understand that getting to that point might mean doing things you don't enjoy for a number of years, but figuring that out is another way to get to that target without having like a clear bullseye" She goes on to explain how this target map is helping her to create real change and ultimately makes an impact. We thank Danielle for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 30 Nov 2025 08:00:00 -0000</pubDate>
      <itunes:title>Danielle Jablanski: Finding the path to success [Strategy] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>97</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bc1f79d2-ca20-11f0-858a-bfd841859d1f/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Operational technology cybersecurity strategist from Nozomi Networks, Danielle Jablanski shares her story of building a target map to end up where she is today. She shares how she started in college and how different paths in life got her to be on the target of success where she is today. She says " you build out that kind of target of where you want to be, and understand that getting to that point might mean doing things you don't enjoy for a number of years, but figuring that out is another way to get to that target without having like a clear bullseye" She goes on to explain how this target map is helping her to create real change and ultimately makes an impact. We thank Danielle for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Operational technology cybersecurity strategist from Nozomi Networks, Danielle Jablanski shares her story of building a target map to end up where she is today. She shares how she started in college and how different paths in life got her to be on the target of success where she is today. She says " you build out that kind of target of where you want to be, and understand that getting to that point might mean doing things you don't enjoy for a number of years, but figuring that out is another way to get to that target without having like a clear bullseye" She goes on to explain how this target map is helping her to create real change and ultimately makes an impact. We thank Danielle for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>561</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bc1f79d2-ca20-11f0-858a-bfd841859d1f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6189938661.mp3?updated=1735936620" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A new stealer hiding behind AI hype. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/380/notes</link>
      <description>Please enjoy this encore of Research Saturday. 

This week, we are joined by ⁠Michael Gorelik⁠, Chief Technology Officer from ⁠Morphisec⁠, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as fake AI video generation platforms, luring users into uploading media in exchange for malware-laced downloads. 

Distributed through convincing Facebook groups and viral campaigns, the malware steals browser credentials, cryptocurrency wallets, and can deploy a remote access trojan like XWorm. The campaign uses a layered, obfuscated delivery chain disguised as legitimate video editing software, making it both deceptive and difficult to detect.

The research can be found here:


  ⁠⁠⁠New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 Nov 2025 08:00:00 -0000</pubDate>
      <itunes:title>A new stealer hiding behind AI hype. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>380</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/e1611d54-ca20-11f0-91b3-5b43508d2bbd/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Research Saturday. 

This week, we are joined by ⁠Michael Gorelik⁠, Chief Technology Officer from ⁠Morphisec⁠, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as fake AI video generation platforms, luring users into uploading media in exchange for malware-laced downloads. 

Distributed through convincing Facebook groups and viral campaigns, the malware steals browser credentials, cryptocurrency wallets, and can deploy a remote access trojan like XWorm. The campaign uses a layered, obfuscated delivery chain disguised as legitimate video editing software, making it both deceptive and difficult to detect.

The research can be found here:


  ⁠⁠⁠New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Research Saturday. </p>
<p>This week, we are joined by <a href="https://www.linkedin.com/in/smgoreli/">⁠Michael Gorelik⁠</a>, Chief Technology Officer from <a href="https://www.linkedin.com/company/morphisec/">⁠Morphisec⁠</a>, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as fake AI video generation platforms, luring users into uploading media in exchange for malware-laced downloads. </p>
<p>Distributed through convincing Facebook groups and viral campaigns, the malware steals browser credentials, cryptocurrency wallets, and can deploy a remote access trojan like XWorm. The campaign uses a layered, obfuscated delivery chain disguised as legitimate video editing software, making it both deceptive and difficult to detect.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.morphisec.com/blog/new-noodlophile-stealer-fake-ai-video-generation-platforms/">⁠⁠⁠New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1328</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e1611d54-ca20-11f0-91b3-5b43508d2bbd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6519304981.mp3?updated=1764012596" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pass the intel, please. [Only Malware in the Building]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/17/notes</link>
      <description>Please enjoy this encore of Only Malware in the Building.

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠Qintel⁠⁠⁠⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we explore what makes information sharing actually work. From public-private partnerships to actionable intelligence, our guests discuss how organizations can prioritize, process, and operationalize shared cyber threat data to stay ahead of emerging risks.

Plus, catch Dave, Selena, and Keith on their road trip adventure in our video on ⁠⁠YouTube⁠⁠ — full of laughs, unexpected detours, and plenty of sleuthing!
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 28 Nov 2025 06:00:00 -0000</pubDate>
      <itunes:title>Pass the intel, please. [Only Malware in the Building]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>17</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/d6f6c8b8-1c7a-11f0-85e0-eb4ac74eb46f/image/14002263e169460f16ca12e04624eb3a.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Only Malware in the Building.

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠Qintel⁠⁠⁠⁠.

Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we explore what makes information sharing actually work. From public-private partnerships to actionable intelligence, our guests discuss how organizations can prioritize, process, and operationalize shared cyber threat data to stay ahead of emerging risks.

Plus, catch Dave, Selena, and Keith on their road trip adventure in our video on ⁠⁠YouTube⁠⁠ — full of laughs, unexpected detours, and plenty of sleuthing!
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Only Malware in the Building.</p>
<p>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is <a href="https://www.linkedin.com/in/selenalarson/">⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠</a>, <a href="https://www.proofpoint.com/">⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts <a href="https://www.n2k.com/">⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠</a> and <a href="https://www.linkedin.com/in/keith-mularski-b737551/">⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠</a>, former FBI cybercrime investigator and now Chief Global Ambassador at <a href="https://www.linkedin.com/company/qintel/">⁠⁠⁠⁠Qintel⁠⁠⁠⁠</a>.</p>
<p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we explore what makes information sharing actually work. From public-private partnerships to actionable intelligence, our guests discuss how organizations can prioritize, process, and operationalize shared cyber threat data to stay ahead of emerging risks.</p>
<p>Plus, catch Dave, Selena, and Keith on their road trip adventure in our video on ⁠<a href="https://youtu.be/AZImtg04hGk">⁠YouTube⁠</a>⁠ — full of laughs, unexpected detours, and plenty of sleuthing!</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2286</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d6f6c8b8-1c7a-11f0-85e0-eb4ac74eb46f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2811881241.mp3?updated=1763766154" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacker Movies Then vs Now [Threat Vector]</title>
      <link>https://thecyberwire.com/podcasts/threat-vector/95/notes</link>
      <description>We dive into a nostalgic yet revealing journey through classic hacker films, from WarGames to The Net and beyond, to assess what they got right, what they wildly imagined, and what those stories say about culture, fears, and cyber reality today. David Moulton, Senior Director of Thought Leadership for Unit 42  talks with Ben Hasskamp, Global Content Leader at Palo Alto Networks, who has been writing deeply on this intersection of media, tech, and risk. Together, we’ll examine how cinematic depictions of hacking have shaped public perception, influenced policy, and sometimes eerily foreshadowed modern cyber threats. Expect a blend of film critique, security insight, and cultural reflection.

Join the conversation on our social media channels:


  
Website:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠


  
Threat Research:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠


  
Facebook:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠


  
LinkedIn:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠


  
YouTube:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@paloaltonetworks⁠⁠⁠⁠⁠


  
Twitter:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠⁠⁠⁠⁠



About Threat Vector

Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.

Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠⁠⁠⁠ ⁠http://paloaltonetworks.com.⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 27 Nov 2025 07:00:00 -0000</pubDate>
      <itunes:title>Hacker Movies Then vs Now [Threat Vector]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>95</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/2a4282fa-c978-11f0-a211-7f209a7586b9/image/3b08be1cf4934fe14bfd905c7df8eccf.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>We dive into a nostalgic yet revealing journey through classic hacker films, from WarGames to The Net and beyond, to assess what they got right, what they wildly imagined, and what those stories say about culture, fears, and cyber reality today. David Moulton, Senior Director of Thought Leadership for Unit 42  talks with Ben Hasskamp, Global Content Leader at Palo Alto Networks, who has been writing deeply on this intersection of media, tech, and risk. Together, we’ll examine how cinematic depictions of hacking have shaped public perception, influenced policy, and sometimes eerily foreshadowed modern cyber threats. Expect a blend of film critique, security insight, and cultural reflection.

Join the conversation on our social media channels:


  
Website:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠


  
Threat Research:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠


  
Facebook:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠


  
LinkedIn:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠


  
YouTube:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@paloaltonetworks⁠⁠⁠⁠⁠


  
Twitter:⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠⁠⁠⁠⁠



About Threat Vector

Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.

Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠⁠⁠⁠ ⁠http://paloaltonetworks.com.⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>We dive into a nostalgic yet revealing journey through classic hacker films, from <em>WarGames</em> to <em>The Net</em> and beyond, to assess what they got right, what they wildly imagined, and what those stories say about culture, fears, and cyber reality today.<a href="https://www.linkedin.com/in/davidrmoulton/"> David Moulton</a>, Senior Director of Thought Leadership for Unit 42  talks with<a href="https://www.linkedin.com/in/ben-hasskamp-b4799b3b"> Ben Hasskamp</a>, Global Content Leader at Palo Alto Networks, who has been writing deeply on this intersection of media, tech, and risk. Together, we’ll examine how cinematic depictions of hacking have shaped public perception, influenced policy, and sometimes eerily foreshadowed modern cyber threats. Expect a blend of film critique, security insight, and cultural reflection.</p>
<p><strong>Join the conversation on our social media channels:</strong></p>
<ul>
  <li>
<strong>Website</strong>:<a href="https://www.paloaltonetworks.com/unit42">⁠⁠⁠⁠⁠⁠ <u>⁠⁠⁠⁠https://www.paloaltonetworks.com/</u>⁠⁠⁠⁠⁠⁠</a>
</li>
  <li>
<strong>Threat Research:</strong><a href="https://unit42.paloaltonetworks.com/">⁠⁠⁠⁠⁠⁠<strong> </strong><u>⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠</u>⁠⁠⁠⁠⁠⁠</a>
</li>
  <li>
<strong>Facebook:</strong><a href="https://www.facebook.com/LifeatPaloAltoNetworks/">⁠⁠⁠⁠⁠⁠<strong> </strong><u>⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠</u>⁠⁠⁠⁠⁠⁠</a>
</li>
  <li>
<strong>LinkedIn:</strong><a href="https://www.linkedin.com/company/unit42/">⁠⁠⁠⁠⁠⁠<strong> </strong><u>⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠</u>⁠⁠⁠⁠⁠⁠</a>
</li>
  <li>
<strong>YouTube:</strong><a href="https://www.youtube.com/channel/UCvJQO11qoCHYwZ4Ah4Jf-Tw">⁠⁠⁠⁠⁠⁠<strong> </strong>⁠⁠⁠⁠⁠⁠</a><a href="https://www.youtube.com/paloaltonetworks">⁠⁠⁠⁠⁠<u>@paloaltonetworks</u>⁠⁠⁠⁠⁠</a>
</li>
  <li>
<strong>Twitter:</strong><a href="https://twitter.com/PaloAltoNtwks">⁠⁠⁠⁠⁠⁠<strong> </strong><u>⁠⁠⁠⁠</u>⁠⁠⁠⁠⁠⁠</a><a href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0">⁠⁠⁠⁠⁠⁠<u>https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠</u>⁠⁠⁠⁠⁠</a>
</li>
</ul>
<p><strong>About Threat Vector</strong></p>
<p>Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.</p>
<p>The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.</p>
<p>Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.</p>
<p><strong>Palo Alto Networks</strong></p>
<p>Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.<a href="http://paloaltonetworks.com/">⁠⁠⁠⁠⁠⁠ <u>⁠http://paloaltonetworks.com.</u>⁠</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2826</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2a4282fa-c978-11f0-a211-7f209a7586b9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4678097939.mp3?updated=1764011212" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Identifying vulnerabilities in space with Bigbear.ai. [Deep Space]</title>
      <link>https://space.n2k.com/podcasts/t-minus/ds115</link>
      <description>Please enjoy this encore of T-Minus Deep Space. 

BigBear.ai is at the forefront of innovation for national security, and is committed to supporting the critical infrastructure driving America’s competitive edge. The company deploys cutting-edge Al, machine learning, and computer vision solutions to defend critical operations and win with decision advantage. Our guests are ⁠Eric Conway,⁠ Vice President of Technology, and ⁠Joe Davis⁠, Cybersecurity Research Scientist  at ⁠Bigbear.ai.⁠ 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Be sure to follow T-Minus on ⁠LinkedIn⁠ and ⁠Instagram⁠.



Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our ⁠media kit⁠. Contact us at ⁠space@n2k.com⁠ to request more info.



Want to join us for an interview?

Please send your pitch to ⁠space-editor@n2k.com⁠ and include your name, affiliation, and topic proposal.

T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 27 Nov 2025 06:00:00 -0000</pubDate>
      <itunes:title>Identifying vulnerabilities in space with Bigbear.ai. [Deep Space]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>115</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/27f3027e-c728-11f0-bff4-4b5f071e9615/image/f4a19856889e7eaf272b3ef70e511b88.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of T-Minus Deep Space. 

BigBear.ai is at the forefront of innovation for national security, and is committed to supporting the critical infrastructure driving America’s competitive edge. The company deploys cutting-edge Al, machine learning, and computer vision solutions to defend critical operations and win with decision advantage. Our guests are ⁠Eric Conway,⁠ Vice President of Technology, and ⁠Joe Davis⁠, Cybersecurity Research Scientist  at ⁠Bigbear.ai.⁠ 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Be sure to follow T-Minus on ⁠LinkedIn⁠ and ⁠Instagram⁠.



Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our ⁠media kit⁠. Contact us at ⁠space@n2k.com⁠ to request more info.



Want to join us for an interview?

Please send your pitch to ⁠space-editor@n2k.com⁠ and include your name, affiliation, and topic proposal.

T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of T-Minus Deep Space. </p>
<p>BigBear.ai is at the forefront of innovation for national security, and is committed to supporting the critical infrastructure driving America’s competitive edge. The company deploys cutting-edge Al, machine learning, and computer vision solutions to defend critical operations and win with decision advantage. Our guests are <a href="https://www.linkedin.com/in/eric-conway29/">⁠<u>Eric Conway,</u>⁠</a> Vice President of Technology, and <a href="https://www.linkedin.com/in/joe-davis-085175245/">⁠<u>Joe Davis</u>⁠</a>, Cybersecurity Research Scientist  at <a href="http://bigbear.ai">⁠<u>Bigbear.ai.</u>⁠</a> </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Be sure to follow T-Minus on <a href="https://www.linkedin.com/company/n2k-space/">⁠<u>LinkedIn</u>⁠</a> and <a href="https://www.instagram.com/n2kspace/">⁠<u>Instagram</u>⁠</a>.</p>
<p><br></p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">⁠<u>media kit</u>⁠</a>. Contact us at <a href="mailto:space@n2k.com">⁠<u>space@n2k.com</u>⁠</a> to request more info.</p>
<p><br></p>
<p><strong>Want to join us for an interview?</strong></p>
<p>Please send your pitch to <a href="mailto:space-editor@n2k.com">⁠<u>space-editor@n2k.com</u>⁠</a> and include your name, affiliation, and topic proposal.</p>
<p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1282</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[27f3027e-c728-11f0-bff4-4b5f071e9615]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6988173151.mp3?updated=1763764670" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacktivists go galactic.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2442/notes</link>
      <description>Report sheds light on cyber activity targeting space-related organizations during the Gaza War. Russian threat actor targets US civil engineering firm. FBI says $262 million has been stolen in account takeover scams this year. HashJack attack tricks AI browser assistants. London councils disrupted by cyberattacks. Russia’s Gamaredon and North Korea’s Lazarus Group appear to be sharing infrastructure. Canon says subsidiary was breached by Oracle EBS flaw. Dave Bittner was joined by Cynthia Kaiser, SVP of the Ransomware Research Center at Halcyon, sharing a deep dive on Akira ransomware. And Campbell’s Soup CISO placed on leave following lawsuit.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Dave Bittner was joined by Cynthia Kaiser, SVP of the Ransomware Research Center at Halcyon, sharing a deep dive on Akira ransomware. Learn more on Halcyon’s threat actor profile of Akira, and how they fit into their latest Malicious Quartile Report.

Selected Reading

New Report Warns Space Sector Faces Rising Cyber Threats Amid Modern Conflicts (Orbital Today) 

Russian RomCom Utilizing SocGholish to Deliver Mythic Agent to U.S. Companies Supporting Ukraine (Arctic Wolf)

FBI says $262 million has been stolen in account takeover scams this year (IC3)

HashJack – Novel Indirect Prompt Injection Against AI Browser Assistants (Cato Networks)

Multiple London councils 'hit by cyber-attacks' (BBC)

London Cyberattacks Confirmed — Security Experts Issue Multiple Warnings (Forbes)

Russian and North Korean Hackers Forge Global Cyberattack Alliance (GB Hackers)

Canon Allegedly Breached by Clop Ransomware via Oracle E-Business Suite 0-Day Hack (Cyber Security News)  

A Campbell Soup VP is on leave after secret recording appears to show him mocking 'poor' customers, '3D-printed chicken' (Business Insider) 

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 26 Nov 2025 21:10:00 -0000</pubDate>
      <itunes:title>Hacktivists go galactic.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2442</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Report sheds light on cyber activity targeting space-related organizations during the Gaza War. Russian threat actor targets US civil engineering firm. FBI says $262 million has been stolen in account takeover scams this year. HashJack attack tricks AI browser assistants. London councils disrupted by cyberattacks. Russia’s Gamaredon and North Korea’s Lazarus Group appear to be sharing infrastructure. Canon says subsidiary was breached by Oracle EBS flaw. Dave Bittner was joined by Cynthia Kaiser, SVP of the Ransomware Research Center at Halcyon, sharing a deep dive on Akira ransomware. And Campbell’s Soup CISO placed on leave following lawsuit.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Dave Bittner was joined by Cynthia Kaiser, SVP of the Ransomware Research Center at Halcyon, sharing a deep dive on Akira ransomware. Learn more on Halcyon’s threat actor profile of Akira, and how they fit into their latest Malicious Quartile Report.

Selected Reading

New Report Warns Space Sector Faces Rising Cyber Threats Amid Modern Conflicts (Orbital Today) 

Russian RomCom Utilizing SocGholish to Deliver Mythic Agent to U.S. Companies Supporting Ukraine (Arctic Wolf)

FBI says $262 million has been stolen in account takeover scams this year (IC3)

HashJack – Novel Indirect Prompt Injection Against AI Browser Assistants (Cato Networks)

Multiple London councils 'hit by cyber-attacks' (BBC)

London Cyberattacks Confirmed — Security Experts Issue Multiple Warnings (Forbes)

Russian and North Korean Hackers Forge Global Cyberattack Alliance (GB Hackers)

Canon Allegedly Breached by Clop Ransomware via Oracle E-Business Suite 0-Day Hack (Cyber Security News)  

A Campbell Soup VP is on leave after secret recording appears to show him mocking 'poor' customers, '3D-printed chicken' (Business Insider) 

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Report sheds light on cyber activity targeting space-related organizations during the Gaza War. Russian threat actor targets US civil engineering firm. FBI says $262 million has been stolen in account takeover scams this year. HashJack attack tricks AI browser assistants. London councils disrupted by cyberattacks. Russia’s Gamaredon and North Korea’s Lazarus Group appear to be sharing infrastructure. Canon says subsidiary was breached by Oracle EBS flaw. Dave Bittner was joined by Cynthia Kaiser, SVP of the Ransomware Research Center at Halcyon, sharing a deep dive on Akira ransomware. And Campbell’s Soup CISO placed on leave following lawsuit.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Dave Bittner was joined by <a href="https://www.linkedin.com/in/cynthia-kaiser-cyber/"><u>Cynthia Kaiser</u></a>, SVP of the Ransomware Research Center at <a href="https://www.halcyon.ai/"><u>Halcyon</u></a>, sharing a deep dive on Akira ransomware. Learn more on Halcyon’s threat actor profile of <a href="https://www.halcyon.ai/threat-group/akira"><u>Akira</u></a>, and how they fit into their latest <a href="https://www.halcyon.ai/raas-mq/power-rankings-ransomware-malicious-quartile-q2-2025"><u>Malicious Quartile Report</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://orbitaltoday.com/2025/11/25/new-report-warns-space-sector-faces-rising-cyber-threats-amid-modern-conflicts/"><u>New Report Warns Space Sector Faces Rising Cyber Threats Amid Modern Conflicts</u></a> (Orbital Today) </p>
<p><a href="https://arcticwolf.com/resources/blog/romcom-utilizing-socgholish-to-deliver-mythic-agent-to-usa-companies-supporting-ukraine/"><u>Russian RomCom Utilizing SocGholish to Deliver Mythic Agent to U.S. Companies Supporting Ukraine</u></a> (Arctic Wolf)</p>
<p><a href="https://www.ic3.gov/PSA/2025/PSA251125"><u>FBI says $262 million has been stolen in account takeover scams this year</u></a> (IC3)</p>
<p><a href="https://www.catonetworks.com/blog/cato-ctrl-hashjack-first-known-indirect-prompt-injection/"><u>HashJack – Novel Indirect Prompt Injection Against AI Browser Assistants</u></a> (Cato Networks)</p>
<p><a href="https://www.bbc.com/news/articles/cdxwygkqrx0o"><u>Multiple London councils 'hit by cyber-attacks'</u></a> (BBC)</p>
<p><a href="https://www.forbes.com/sites/daveywinder/2025/11/26/london-cyberattacks-confirmed---security-experts-issue-multiple-warnings/"><u>London Cyberattacks Confirmed — Security Experts Issue Multiple Warnings</u></a> (Forbes)</p>
<p><a href="https://gbhackers.com/global-cyberattack-alliance/"><u>Russian and North Korean Hackers Forge Global Cyberattack Alliance</u></a> (GB Hackers)</p>
<p><a href="https://cybersecuritynews.com/canon-breached-clop-ransomware-oracle-ebs-hack/"><u>Canon Allegedly Breached by Clop Ransomware via Oracle E-Business Suite 0-Day Hack</u></a> (Cyber Security News)  </p>
<p><a href="https://www.businessinsider.com/campbell-soup-vp-martin-bally-leave-lawsuit-audio-recording-2025-11"><u>A Campbell Soup VP is on leave after secret recording appears to show him mocking 'poor' customers, '3D-printed chicken'</u></a> (Business Insider) </p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1532</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d6a9784c-1c7a-11f0-85e0-fbb11bc8a2c8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4764457746.mp3?updated=1764185746" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Message in the malware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2441/notes</link>
      <description>CISA warns of spyware targeting messaging apps. CodeRED, this is not a test. Infostealer campaign spreads via malicious Blender files. Shai-Hulud’s second coming. Real estate finance firm SitusAMC investigates breach. Dartmouth College discloses Oracle EBS breach. Dave Bittner is joined by Tim Starks, Senior reporter from CyberScoop, to discuss the Trump administration’s upcoming cyber strategy. And tis the season for deals — and digital deception.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Dave Bittner is joined by Tim Starks, Senior reporter from CyberScoop, to discuss the Trump administration’s upcoming cyber strategy. Read Tim’s piece on the topic “Completed draft of cyber strategy emphasizes imposing costs, industry partnership”.

Selected Reading

​​Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications​ (CISA)

CodeRED cyber attack leaves emergency notification system down, exposes user data (First Alert 4)

Morphisec Thwarts Russian-Linked StealC V2 Campaign Targeting Blender Users via Malicious .blend Files (Morphisec)

Shai-Hulud’s Second Coming: NPM Malware Attack Evolved (Checkmarx)

SitusAMC confirms breach of client data after cyberattack (The Register)

Clop's Oracle EBS rampage reaches Dartmouth College (The Register)

2025 Retail Holiday Threat Report: Scams and Impersonation Attacks Targeting Retailers (BforeAI)

The data privacy costs of Black Friday bargains: 100 Black Friday apps analyzed (Comparitech)

2025 Ransomware Holiday Risk Report (Semperis) 

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Nov 2025 21:10:00 -0000</pubDate>
      <itunes:title>Message in the malware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2441</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA warns of spyware targeting messaging apps. CodeRED, this is not a test. Infostealer campaign spreads via malicious Blender files. Shai-Hulud’s second coming. Real estate finance firm SitusAMC investigates breach. Dartmouth College discloses Oracle EBS breach. Dave Bittner is joined by Tim Starks, Senior reporter from CyberScoop, to discuss the Trump administration’s upcoming cyber strategy. And tis the season for deals — and digital deception.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Dave Bittner is joined by Tim Starks, Senior reporter from CyberScoop, to discuss the Trump administration’s upcoming cyber strategy. Read Tim’s piece on the topic “Completed draft of cyber strategy emphasizes imposing costs, industry partnership”.

Selected Reading

​​Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications​ (CISA)

CodeRED cyber attack leaves emergency notification system down, exposes user data (First Alert 4)

Morphisec Thwarts Russian-Linked StealC V2 Campaign Targeting Blender Users via Malicious .blend Files (Morphisec)

Shai-Hulud’s Second Coming: NPM Malware Attack Evolved (Checkmarx)

SitusAMC confirms breach of client data after cyberattack (The Register)

Clop's Oracle EBS rampage reaches Dartmouth College (The Register)

2025 Retail Holiday Threat Report: Scams and Impersonation Attacks Targeting Retailers (BforeAI)

The data privacy costs of Black Friday bargains: 100 Black Friday apps analyzed (Comparitech)

2025 Ransomware Holiday Risk Report (Semperis) 

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA warns of spyware targeting messaging apps. CodeRED, this is not a test. Infostealer campaign spreads via malicious Blender files. Shai-Hulud’s second coming. Real estate finance firm SitusAMC investigates breach. Dartmouth College discloses Oracle EBS breach. Dave Bittner is joined by Tim Starks, Senior reporter from CyberScoop, to discuss the Trump administration’s upcoming cyber strategy. And tis the season for deals — and digital deception.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Dave Bittner is joined by<a href="https://www.linkedin.com/in/tstarks/"><u> Tim Starks</u></a>, Senior reporter from <a href="https://cyberscoop.com/"><u>CyberScoop</u></a>, to discuss the Trump administration’s upcoming cyber strategy. Read Tim’s piece on the topic “<a href="https://cyberscoop.com/trump-cyber-strategy-six-pillars-industry-partnerships-deterrence/?_hsmi=390682439"><u>Completed draft of cyber strategy emphasizes imposing costs, industry partnership</u></a>”.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.cisa.gov/news-events/alerts/2025/11/24/spyware-allows-cyber-threat-actors-target-users-messaging-applications"><u>​​Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications​</u></a> (CISA)</p>
<p><a href="https://www.firstalert4.com/2025/11/24/codered-cyber-attack-leaves-emergency-notification-system-down-exposes-user-data/"><u>CodeRED cyber attack leaves emergency notification system down, exposes user data</u></a> (First Alert 4)</p>
<p><a href="https://www.morphisec.com/blog/morphisec-thwarts-russian-linked-stealc-v2-campaign-targeting-blender-users-via-malicious-blend-files/"><u>Morphisec Thwarts Russian-Linked StealC V2 Campaign Targeting Blender Users via Malicious .blend Files</u></a> (Morphisec)</p>
<p><a href="https://checkmarx.com/zero-post/shai-huluds-second-coming-npm-malware-attack-evolved/"><u>Shai-Hulud’s Second Coming: NPM Malware Attack Evolved</u></a> (Checkmarx)</p>
<p><a href="https://www.theregister.com/2025/11/24/situsamc_breach/"><u>SitusAMC confirms breach of client data after cyberattack</u></a> (The Register)</p>
<p><a href="https://www.theregister.com/2025/11/25/clop_dartmouth_college/"><u>Clop's Oracle EBS rampage reaches Dartmouth College</u></a> (The Register)</p>
<p><a href="https://bfore.ai/report/2025-retail-holiday-threat-report-scams-impersonation-attacks/"><u>2025 Retail Holiday Threat Report: Scams and Impersonation Attacks Targeting Retailers</u></a> (BforeAI)</p>
<p><a href="https://www.comparitech.com/news/data-privacy-black-friday-apps/"><u>The data privacy costs of Black Friday bargains: 100 Black Friday apps analyzed</u></a> (Comparitech)</p>
<p><a href="https://www.semperis.com/ransomware-holiday-risk-report/"><u>2025 Ransomware Holiday Risk Report</u></a> (Semperis) </p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1430</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d68436cc-1c7a-11f0-85e0-67d82d2b8e8a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6696360048.mp3?updated=1764100313" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A midseason takeaway. [CISO Perspectives]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/118/notes</link>
      <description>In this mid-season episode, Kim takes a step back to reflect on the conversations he has had so far. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, diving into how new technologies are impacting longstanding challenges, both from a security standpoint and from an attacker's view. Whether you're catching up or tuning in weekly, this episode offers a thoughtful recap and fresh perspective on where we've been—and what's still to come.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Nov 2025 07:00:00 -0000</pubDate>
      <itunes:title>A midseason takeaway. [CISO Perspectives]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>118</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/e60b9a5c-b8ee-11f0-9339-83476cf1cb54/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this mid-season episode, Kim takes a step back to reflect on the conversations he has had so far. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, diving into how new technologies are impacting longstanding challenges, both from a security standpoint and from an attacker's view. Whether you're catching up or tuning in weekly, this episode offers a thoughtful recap and fresh perspective on where we've been—and what's still to come.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this mid-season episode, Kim takes a step back to reflect on the conversations he has had so far. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, diving into how new technologies are impacting longstanding challenges, both from a security standpoint and from an attacker's view. Whether you're catching up or tuning in weekly, this episode offers a thoughtful recap and fresh perspective on where we've been—and what's still to come.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2797</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e60b9a5c-b8ee-11f0-9339-83476cf1cb54]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5086191473.mp3?updated=1762892635" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Inside job interrupted.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2440/notes</link>
      <description>CrowdStrike fires an insider who allegedly shared screenshots with hackers. Google agrees, it wasn’t Salesforce. Cox Enterprises confirms Oracle EBS breach. Alleged Transport for London hackers plead not guilty. Hackers exploit new WSUS bug to deploy ShadowPad backdoor. Iberia discloses breach of customer data. Harvard discloses voice-phishing breach exposing alumni and donor data. We have our Monday Business Briefing. Our guest today is Brandon Karpf, friend of the show discussing maritime GPS jamming and spoofing. And the launderers who wanted a bank for Christmas.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Brandon Karpf, friend of the show discussing maritime GPS jamming and spoofing.

Selected Reading

CrowdStrike fires 'suspicious insider' who passed information to hackers (TechCrunch)	

Google says hackers stole data from 200 companies following Gainsight breach (TechCrunch)

Cox Confirms Oracle EBS Hack as Cybercriminals Name 100 Alleged Victims (SecurityWeek)

Teens plead not guilty over TfL cyber-attack (BBC)

Attackers deliver ShadowPad via newly patched WSUS RCE bug (Security Affairs) 

Iberia discloses customer data leak after vendor security breach (Bleeping Computer) 

Harvard University discloses data breach affecting alumni, donors (Bleeping Computer) 

Doppel secures $70 million in a Series C round. (N2K Pro Business Briefing) 

Russia-linked crooks bought a bank for Christmas to launder cyber loot (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 24 Nov 2025 21:10:00 -0000</pubDate>
      <itunes:title>Inside job interrupted.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2440</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CrowdStrike fires an insider who allegedly shared screenshots with hackers. Google agrees, it wasn’t Salesforce. Cox Enterprises confirms Oracle EBS breach. Alleged Transport for London hackers plead not guilty. Hackers exploit new WSUS bug to deploy ShadowPad backdoor. Iberia discloses breach of customer data. Harvard discloses voice-phishing breach exposing alumni and donor data. We have our Monday Business Briefing. Our guest today is Brandon Karpf, friend of the show discussing maritime GPS jamming and spoofing. And the launderers who wanted a bank for Christmas.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Brandon Karpf, friend of the show discussing maritime GPS jamming and spoofing.

Selected Reading

CrowdStrike fires 'suspicious insider' who passed information to hackers (TechCrunch)	

Google says hackers stole data from 200 companies following Gainsight breach (TechCrunch)

Cox Confirms Oracle EBS Hack as Cybercriminals Name 100 Alleged Victims (SecurityWeek)

Teens plead not guilty over TfL cyber-attack (BBC)

Attackers deliver ShadowPad via newly patched WSUS RCE bug (Security Affairs) 

Iberia discloses customer data leak after vendor security breach (Bleeping Computer) 

Harvard University discloses data breach affecting alumni, donors (Bleeping Computer) 

Doppel secures $70 million in a Series C round. (N2K Pro Business Briefing) 

Russia-linked crooks bought a bank for Christmas to launder cyber loot (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CrowdStrike fires an insider who allegedly shared screenshots with hackers. Google agrees, it wasn’t Salesforce. Cox Enterprises confirms Oracle EBS breach. Alleged Transport for London hackers plead not guilty. Hackers exploit new WSUS bug to deploy ShadowPad backdoor. Iberia discloses breach of customer data. Harvard discloses voice-phishing breach exposing alumni and donor data. We have our Monday Business Briefing. Our guest today is Brandon Karpf, friend of the show discussing maritime GPS jamming and spoofing. And the launderers who wanted a bank for Christmas.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a>, friend of the show discussing maritime GPS jamming and spoofing.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://techcrunch.com/2025/11/21/crowdstrike-fires-suspicious-insider-who-passed-information-to-hackers/"><u>CrowdStrike fires 'suspicious insider' who passed information to hackers</u></a> (TechCrunch)	</p>
<p><a href="https://techcrunch.com/2025/11/21/google-says-hackers-stole-data-from-200-companies-following-gainsight-breach/"><u>Google says hackers stole data from 200 companies following Gainsight breach</u></a> (TechCrunch)</p>
<p><a href="https://www.securityweek.com/cox-confirms-oracle-ebs-hack-as-cybercriminals-name-100-alleged-victims/"><u>Cox Confirms Oracle EBS Hack as Cybercriminals Name 100 Alleged Victims</u></a> (SecurityWeek)</p>
<p><a href="https://www.bbc.com/news/articles/cvgjxlgyx87o"><u>Teens plead not guilty over TfL cyber-attack</u></a> (BBC)</p>
<p><a href="https://securityaffairs.com/185007/malware/attackers-deliver-shadowpad-via-newly-patched-wsus-rce-bug.html"><u>Attackers deliver ShadowPad via newly patched WSUS RCE bug</u></a> (Security Affairs) </p>
<p><a href="https://www.bleepingcomputer.com/news/security/iberia-discloses-customer-data-leak-after-vendor-security-breach/"><u>Iberia discloses customer data leak after vendor security breach</u></a> (Bleeping Computer) </p>
<p><a href="https://www.bleepingcomputer.com/news/security/harvard-university-discloses-data-breach-affecting-alumni-donors/"><u>Harvard University discloses data breach affecting alumni, donors</u></a> (Bleeping Computer) </p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/7/46"><u>Doppel secures $70 million in a Series C round.</u></a> (N2K Pro Business Briefing) </p>
<p><a href="https://www.theregister.com/2025/11/21/russia_cybercrime_bank_purchase/"><u>Russia-linked crooks bought a bank for Christmas to launder cyber loot</u></a><em> </em>(The Register)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2031</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d6604910-1c7a-11f0-85e0-736c784df712]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6418388995.mp3?updated=1764016527" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How realistic is A House of Dynamite? [T-Minus Deep Space]</title>
      <link>https://space.n2k.com/podcasts/t-minus/ds126</link>
      <description>The new Netflix movie A House of Dynamite, chronicles what happens when the unthinkable unfolds. How realistic is it? We ask the movie’s advisor and expert, Lieutenant General Daniel Karbler (Ret.).

Remember to leave us a 5-star rating and review in your favorite podcast app.

Be sure to follow T-Minus on LinkedIn and Instagram.



Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.



Want to join us for an interview?

Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.

T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 24 Nov 2025 07:00:00 -0000</pubDate>
      <itunes:title>How realistic is A House of Dynamite? [T-Minus Deep Space]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>126</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/feecacc6-c6ec-11f0-a5cb-3ffb4b0c5cbd/image/ad72ba49a386b651623190673146de68.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The new Netflix movie A House of Dynamite, chronicles what happens when the unthinkable unfolds. How realistic is it? We ask the movie’s advisor and expert. </itunes:subtitle>
      <itunes:summary>The new Netflix movie A House of Dynamite, chronicles what happens when the unthinkable unfolds. How realistic is it? We ask the movie’s advisor and expert, Lieutenant General Daniel Karbler (Ret.).

Remember to leave us a 5-star rating and review in your favorite podcast app.

Be sure to follow T-Minus on LinkedIn and Instagram.



Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.



Want to join us for an interview?

Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.

T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The new Netflix movie <em>A House of Dynamite</em>, chronicles what happens when the unthinkable unfolds. How realistic is it? We ask the movie’s advisor and expert, Lieutenant General Daniel Karbler (Ret.).</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Be sure to follow T-Minus on <a href="https://www.linkedin.com/company/n2k-space/"><u>LinkedIn</u></a> and <a href="https://www.instagram.com/n2kspace/"><u>Instagram</u></a>.</p>
<p><br></p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:space@n2k.com"><u>space@n2k.com</u></a> to request more info.</p>
<p><br></p>
<p><strong>Want to join us for an interview?</strong></p>
<p>Please send your pitch to <a href="mailto:space-editor@n2k.com"><u>space-editor@n2k.com</u></a> and include your name, affiliation, and topic proposal.</p>
<p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2163</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[feecacc6-c6ec-11f0-a5cb-3ffb4b0c5cbd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4624195959.mp3?updated=1763501100" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Satya Gupta: Rising to your contribution. [CTO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/96/notes</link>
      <description>Please enjoy this encore of Career Notes.

Co-founder and CTO of Virsec, Satya Gupta shares his story of how he has over 25 years of expertise in embedded systems, network security and systems architecture. He also talks about how a colleague of his told him something that resinated with him, he said " that was really a remarkable statement that I heard from that person. You rise to the point where you can actually contribute." He also discusses how he got into the startup atmosphere and how different scenarios in his life helped to lead him to the successful man he has become in the cyber community. We thank Satya for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 23 Nov 2025 08:00:00 -0000</pubDate>
      <itunes:title>Satya Gupta: Rising to your contribution. [CTO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>96</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6c1cfc56-c6ed-11f0-a3d7-afe19988c180/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes.

Co-founder and CTO of Virsec, Satya Gupta shares his story of how he has over 25 years of expertise in embedded systems, network security and systems architecture. He also talks about how a colleague of his told him something that resinated with him, he said " that was really a remarkable statement that I heard from that person. You rise to the point where you can actually contribute." He also discusses how he got into the startup atmosphere and how different scenarios in his life helped to lead him to the successful man he has become in the cyber community. We thank Satya for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes.</p>
<p>Co-founder and CTO of Virsec, Satya Gupta shares his story of how he has over 25 years of expertise in embedded systems, network security and systems architecture. He also talks about how a colleague of his told him something that resinated with him, he said " that was really a remarkable statement that I heard from that person. You rise to the point where you can actually contribute." He also discusses how he got into the startup atmosphere and how different scenarios in his life helped to lead him to the successful man he has become in the cyber community. We thank Satya for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>595</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6c1cfc56-c6ed-11f0-a3d7-afe19988c180]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6153365865.mp3?updated=1735936620" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DataTribe's Cyber Innovation Day: Cyber: The Wake of Tech Innovation. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/87/notes</link>
      <description>On this Special Edition podcast, we share a panel from DataTribe's Cyber Innovation Day 2025, "Cyber: The Wake of Tech Innovation."

The podcast tech host panel included Dave Bittner, host of  CyberWire Daily podcast, Maria Varmazis, host of T-Minus Space Daily podcast, and Daniel Whitenack, co-host of Practical AI podcast, sharing a wide-ranging discussion.

Together, Dave, Maria and Dan examine the intersection of frontier innovation and cyber innovation through the lens of cyber, space, and AI.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 23 Nov 2025 06:00:00 -0000</pubDate>
      <itunes:title>DataTribe's Cyber Innovation Day: Cyber: The Wake of Tech Innovation. [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>87</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/3d7c022c-c722-11f0-b355-5f1ae959e683/image/0216c9cea15c53e5d2c739964a38623c.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this Special Edition podcast, we share a panel from DataTribe's Cyber Innovation Day 2025, "Cyber: The Wake of Tech Innovation."

The podcast tech host panel included Dave Bittner, host of  CyberWire Daily podcast, Maria Varmazis, host of T-Minus Space Daily podcast, and Daniel Whitenack, co-host of Practical AI podcast, sharing a wide-ranging discussion.

Together, Dave, Maria and Dan examine the intersection of frontier innovation and cyber innovation through the lens of cyber, space, and AI.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this Special Edition podcast, we share a panel from <a href="https://datatribe.com/">DataTribe</a>'s <a href="https://cid.datatribe.com/">Cyber Innovation Day</a> 2025, "Cyber: The Wake of Tech Innovation."</p>
<p>The podcast tech host panel included <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a>, host of  <a href="https://thecyberwire.com/podcasts/daily-podcast">CyberWire Daily</a> podcast, <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a>, host of <a href="https://space.n2k.com/podcasts/t-minus">T-Minus Space Daily</a> podcast, and <a href="https://www.linkedin.com/in/danielwhitenack/">Daniel Whitenack</a>, co-host of <a href="https://practicalai.fm/">Practical AI</a> podcast, sharing a wide-ranging discussion.</p>
<p>Together, Dave, Maria and Dan examine the intersection of frontier innovation and cyber innovation through the lens of cyber, space, and AI.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2873</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3d7c022c-c722-11f0-b355-5f1ae959e683]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1685384443.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Two RMMs walk into a phish… [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/403/notes</link>
      <description>Alex Berninger, Senior Manager of Intelligence at Red Canary, and Mike Wylie, Director, Threat Hunting at Zscaler, join to discuss four phishing lures in campaigns dropping RMM tools. Red Canary and Zscaler uncovered phishing campaigns delivering legitimate remote monitoring and management (RMM) tools—like ITarian, PDQ, SimpleHelp, and Atera—to gain stealthy access to victim systems. Attackers used four main lures (fake browser updates, meeting invites, party invitations, and fake government forms) and often deployed multiple RMM tools in quick succession to establish persistent access and deliver additional malware. 

The report highlights detection opportunities, provides indicators of compromise, and stresses the importance of monitoring authorized RMM usage, scrutinizing trusted services like Cloudflare R2, and enforcing strict network and endpoint controls.

The research can be found here:


  You’re invited: Four phishing lures in campaigns dropping RMM tools


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Nov 2025 08:00:00 -0000</pubDate>
      <itunes:title>Two RMMs walk into a phish… [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>403</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/03f50802-c716-11f0-881c-4fa5fbd6d1da/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Alex Berninger, Senior Manager of Intelligence at Red Canary, and Mike Wylie, Director, Threat Hunting at Zscaler, join to discuss four phishing lures in campaigns dropping RMM tools. Red Canary and Zscaler uncovered phishing campaigns delivering legitimate remote monitoring and management (RMM) tools—like ITarian, PDQ, SimpleHelp, and Atera—to gain stealthy access to victim systems. Attackers used four main lures (fake browser updates, meeting invites, party invitations, and fake government forms) and often deployed multiple RMM tools in quick succession to establish persistent access and deliver additional malware. 

The report highlights detection opportunities, provides indicators of compromise, and stresses the importance of monitoring authorized RMM usage, scrutinizing trusted services like Cloudflare R2, and enforcing strict network and endpoint controls.

The research can be found here:


  You’re invited: Four phishing lures in campaigns dropping RMM tools


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/a-berninger/">Alex Berninger</a>, Senior Manager of Intelligence at <a href="https://www.linkedin.com/company/redcanary/">Red Canary</a>, and <a href="https://www.linkedin.com/in/mwylie/">Mike Wylie</a>, Director, Threat Hunting at <a href="https://www.linkedin.com/company/zscaler/">Zscaler</a>, join to discuss four phishing lures in campaigns dropping RMM tools. Red Canary and Zscaler uncovered phishing campaigns delivering legitimate remote monitoring and management (RMM) tools—like ITarian, PDQ, SimpleHelp, and Atera—to gain stealthy access to victim systems. Attackers used four main lures (fake browser updates, meeting invites, party invitations, and fake government forms) and often deployed multiple RMM tools in quick succession to establish persistent access and deliver additional malware. </p>
<p>The report highlights detection opportunities, provides indicators of compromise, and stresses the importance of monitoring authorized RMM usage, scrutinizing trusted services like Cloudflare R2, and enforcing strict network and endpoint controls.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://redcanary.com/blog/threat-intelligence/phishing-rmm-tools/">You’re invited: Four phishing lures in campaigns dropping RMM tools</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1440</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[03f50802-c716-11f0-881c-4fa5fbd6d1da]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9190634718.mp3?updated=1763755723" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI meets the chain of command.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2439/notes</link>
      <description>Cyber Command names a new head of AI. The UK introduces its long-delayed Cyber Security and Resilience Bill. Researchers highlight a critical Oracle Identity Manager flaw. Salesforce warns customers of a third-party data breach. Italy’s state-owned railway operator leaks sensitive information. SonicWall patches firewalls and email security devices. The US charges four individuals with conspiring to illegally export restricted Nvidia AI chips to China. The SEC drops its lawsuit against SolarWinds. NSO group claims a permanent injunction could cause irreparable and potentially existential harm. Maria Varmazis of the T-Minus Space Daily show sits down with General Daniel Karbler (Ret.) to discuss his consulting work for A House of Dynamite, the newly released Netflix film. Roses are red, violets are blue, this poem just jailbroke your AI too.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Maria Varmazis of the T-Minus Space Daily show sits down with Lt. General Daniel Karbler (Ret.) to discuss his consulting work for A House of Dynamite, the newly released Netflix film. This is an excerpt of T-Minus Deep Space airing tomorrow in all of your favorite podcast app. 

Selected Reading

Cyber Command Taps Reid Novotny as New AI Chief (MeriTalk)

UK's New Cybersecurity Bill Takes Aim at Ransomware Gangs and State-Backed Hackers (Fortra)

Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day (SecurityWeek)

Salesforce alerts customers of data breach traced to a supply chain partner (CXOtoday)

Massive data leak hits Italian railway operator Ferrovie dello Stato via Almaviva hack (Security Affairs)

SonicWall Patches High-Severity Flaws in Firewalls, Email Security Appliance (SecurityWeek)

Four charged with plotting to sneak Nvidia chips into China (The Register)

SEC voluntarily dismisses SolarWinds lawsuit (The Record)

NSO Group argues WhatsApp injunction threatens existence, future U.S. government work (CyberScoop)

Adversarial Poetry as a Universal Single-Turn Jailbreak Mechanism in Large Language Models (Arxiv)

Freesound Music

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 21 Nov 2025 21:10:00 -0000</pubDate>
      <itunes:title>AI meets the chain of command.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2439</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Cyber Command names a new head of AI. The UK introduces its long-delayed Cyber Security and Resilience Bill. Researchers highlight a critical Oracle Identity Manager flaw. Salesforce warns customers of a third-party data breach. Italy’s state-owned railway operator leaks sensitive information. SonicWall patches firewalls and email security devices. The US charges four individuals with conspiring to illegally export restricted Nvidia AI chips to China. The SEC drops its lawsuit against SolarWinds. NSO group claims a permanent injunction could cause irreparable and potentially existential harm. Maria Varmazis of the T-Minus Space Daily show sits down with General Daniel Karbler (Ret.) to discuss his consulting work for A House of Dynamite, the newly released Netflix film. Roses are red, violets are blue, this poem just jailbroke your AI too.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Maria Varmazis of the T-Minus Space Daily show sits down with Lt. General Daniel Karbler (Ret.) to discuss his consulting work for A House of Dynamite, the newly released Netflix film. This is an excerpt of T-Minus Deep Space airing tomorrow in all of your favorite podcast app. 

Selected Reading

Cyber Command Taps Reid Novotny as New AI Chief (MeriTalk)

UK's New Cybersecurity Bill Takes Aim at Ransomware Gangs and State-Backed Hackers (Fortra)

Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day (SecurityWeek)

Salesforce alerts customers of data breach traced to a supply chain partner (CXOtoday)

Massive data leak hits Italian railway operator Ferrovie dello Stato via Almaviva hack (Security Affairs)

SonicWall Patches High-Severity Flaws in Firewalls, Email Security Appliance (SecurityWeek)

Four charged with plotting to sneak Nvidia chips into China (The Register)

SEC voluntarily dismisses SolarWinds lawsuit (The Record)

NSO Group argues WhatsApp injunction threatens existence, future U.S. government work (CyberScoop)

Adversarial Poetry as a Universal Single-Turn Jailbreak Mechanism in Large Language Models (Arxiv)

Freesound Music

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber Command names a new head of AI. The UK introduces its long-delayed Cyber Security and Resilience Bill. Researchers highlight a critical Oracle Identity Manager flaw. Salesforce warns customers of a third-party data breach. Italy’s state-owned railway operator leaks sensitive information. SonicWall patches firewalls and email security devices. The US charges four individuals with conspiring to illegally export restricted Nvidia AI chips to China. The SEC drops its lawsuit against SolarWinds. NSO group claims a permanent injunction could cause irreparable and potentially existential harm. Maria Varmazis of the T-Minus Space Daily show sits down with General Daniel Karbler (Ret.) to discuss his consulting work for A House of Dynamite, the newly released Netflix film. Roses are red, violets are blue, this poem just jailbroke your AI too.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p><a href="https://www.linkedin.com/in/varmazis/"><u>Maria Varmazis</u></a> of the <a href="https://space.n2k.com/podcasts/t-minus"><u>T-Minus Space Daily</u></a> show sits down with <a href="https://www.linkedin.com/in/dan-karbler-350566310/"><u>Lt. General Daniel Karbler (Ret.)</u></a> to discuss his consulting work for <a href="https://www.rottentomatoes.com/m/a_house_of_dynamite"><u>A House of Dynamite</u></a>, the newly released <a href="https://www.netflix.com/"><u>Netflix</u></a> film. This is an excerpt of T-Minus Deep Space airing tomorrow in all of your favorite podcast app. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.meritalk.com/articles/cyber-command-taps-reid-novotny-as-new-ai-chief/"><u>Cyber Command Taps Reid Novotny as New AI Chief</u></a> (MeriTalk)</p>
<p><a href="https://www.fortra.com/blog/uks-new-cybersecurity-bill-takes-aim-ransomware-gangs-state-backed-hackers"><u>UK's New Cybersecurity Bill Takes Aim at Ransomware Gangs and State-Backed Hackers</u></a> (Fortra)</p>
<p><a href="https://www.securityweek.com/critical-oracle-identity-manager-flaw-possibly-exploited-as-zero-day/"><u>Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day</u></a> (SecurityWeek)</p>
<p><a href="https://cxotoday.com/news-analysis/salesforce-alerts-customers-of-data-breach-traced-to-a-supply-chain-partner/"><u>Salesforce alerts customers of data breach traced to a supply chain partner</u></a> (CXOtoday)</p>
<p><a href="https://securityaffairs.com/184907/data-breach/massive-data-leak-hits-italian-railway-operator-ferrovie-dello-stato-via-almaviva-hack.html"><u>Massive data leak hits Italian railway operator Ferrovie dello Stato via Almaviva hack</u></a> (Security Affairs)</p>
<p><a href="https://www.securityweek.com/sonicwall-patches-high-severity-flaws-in-firewalls-email-security-appliance/"><u>SonicWall Patches High-Severity Flaws in Firewalls, Email Security Appliance</u></a> (SecurityWeek)</p>
<p><a href="https://www.theregister.com/2025/11/21/nvidia_china_smuggling_charges/"><u>Four charged with plotting to sneak Nvidia chips into China</u></a> (The Register)</p>
<p><a href="https://therecord.media/solawards-lawsuit-dismissed-sec"><u>SEC voluntarily dismisses SolarWinds lawsuit</u></a> (The Record)</p>
<p><a href="https://cyberscoop.com/nso-group-whatsapp-injunction-appeal/"><u>NSO Group argues WhatsApp injunction threatens existence, future U.S. government work</u></a> (CyberScoop)</p>
<p><a href="https://arxiv.org/html/2511.15304v1"><u>Adversarial Poetry as a Universal Single-Turn Jailbreak Mechanism in Large Language Models</u></a> (Arxiv)</p>
<p><a href="https://www.youtube.com/freesoundmusic"><u>Freesound Music</u></a></p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1672</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d63bbf50-1c7a-11f0-85e0-d3de5b5ebc93]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3778007531.mp3?updated=1763754508" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Inside Jingle Thief Cloud Fraud Unwrapped [Threat Vector]</title>
      <link>https://thecyberwire.com/podcasts/threat-vector/904/notes</link>
      <description>In this special episode of Threat Vector, host David Moulton, Senior Director of Thought Leadership for Unit 42, sits down with Stav Setty, Principal Researcher at Palo Alto Networks, to unpack Jingle Thief a cloud-only, identity-driven campaign that turned Microsoft 365 into a gift card printing press. Stav explains how the Morocco based group known as Atlas Lion lived off the land inside M365 for months at a time, using tailored phishing and smishing pages, URL tricks, and internal phishing to compromise one user and quietly pivot to dozens more.

Together, David and Stav walk through how the attackers abused legitimate identity features like device registration, MFA resets, inbox forwarding rules, and ServiceNow style access requests to blend into normal business workflows and monetize “digital cash” in the form of gift cards. They dig into why MFA alone is not safety, why identity is now the real perimeter, and how behavioral analytics, UEBA, and ITDR can piece together small signals into a clear story of compromise.

You’ll come away with practical steps to harden identity posture, spot early warning signs in cloud environments, and protect high value systems where trust can be turned directly into profit. To go deeper on this campaign and the Atlas Lion threat actor, read the Unit 42 article Jingle Thief Inside a Cloud-Based Gift Card Fraud Campaign at https://unit42.paloaltonetworks.com/cloud-based-gift-card-fraud-campaign/

Join the conversation on our social media channels:


  
Website:⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠⁠⁠⁠


  
Threat Research:⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠


  
Facebook:⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠⁠⁠⁠⁠


  
LinkedIn:⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠⁠⁠⁠⁠


  
YouTube:⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠@paloaltonetworks⁠⁠⁠⁠


  
Twitter:⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠⁠⁠⁠



About Threat Vector

Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.

Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠⁠⁠ ⁠http://paloaltonetworks.com.⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 21 Nov 2025 07:00:00 -0000</pubDate>
      <itunes:title>Inside Jingle Thief Cloud Fraud Unwrapped [Threat Vector]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>904</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cc1b0e58-c649-11f0-8869-dbd2c9da9e6c/image/d1caeb4238217cbe859cb2be67fb8b36.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this special episode of Threat Vector, host David Moulton, Senior Director of Thought Leadership for Unit 42, sits down with Stav Setty, Principal Researcher at Palo Alto Networks, to unpack Jingle Thief a cloud-only, identity-driven campaign that turned Microsoft 365 into a gift card printing press. Stav explains how the Morocco based group known as Atlas Lion lived off the land inside M365 for months at a time, using tailored phishing and smishing pages, URL tricks, and internal phishing to compromise one user and quietly pivot to dozens more.

Together, David and Stav walk through how the attackers abused legitimate identity features like device registration, MFA resets, inbox forwarding rules, and ServiceNow style access requests to blend into normal business workflows and monetize “digital cash” in the form of gift cards. They dig into why MFA alone is not safety, why identity is now the real perimeter, and how behavioral analytics, UEBA, and ITDR can piece together small signals into a clear story of compromise.

You’ll come away with practical steps to harden identity posture, spot early warning signs in cloud environments, and protect high value systems where trust can be turned directly into profit. To go deeper on this campaign and the Atlas Lion threat actor, read the Unit 42 article Jingle Thief Inside a Cloud-Based Gift Card Fraud Campaign at https://unit42.paloaltonetworks.com/cloud-based-gift-card-fraud-campaign/

Join the conversation on our social media channels:


  
Website:⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠⁠⁠⁠


  
Threat Research:⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠⁠⁠


  
Facebook:⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠⁠⁠⁠⁠


  
LinkedIn:⁠⁠⁠⁠⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠⁠⁠⁠⁠


  
YouTube:⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠@paloaltonetworks⁠⁠⁠⁠


  
Twitter:⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠⁠⁠⁠



About Threat Vector

Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.

Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠⁠⁠ ⁠http://paloaltonetworks.com.⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this special episode of Threat Vector, host <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a>, Senior Director of Thought Leadership for Unit 42, sits down with <a href="https://www.linkedin.com/in/stavsetty/">Stav Setty</a>, Principal Researcher at Palo Alto Networks, to unpack Jingle Thief a cloud-only, identity-driven campaign that turned Microsoft 365 into a gift card printing press. Stav explains how the Morocco based group known as Atlas Lion lived off the land inside M365 for months at a time, using tailored phishing and smishing pages, URL tricks, and internal phishing to compromise one user and quietly pivot to dozens more.</p>
<p>Together, David and Stav walk through how the attackers abused legitimate identity features like device registration, MFA resets, inbox forwarding rules, and ServiceNow style access requests to blend into normal business workflows and monetize “digital cash” in the form of gift cards. They dig into why MFA alone is not safety, why identity is now the real perimeter, and how behavioral analytics, UEBA, and ITDR can piece together small signals into a clear story of compromise.</p>
<p>You’ll come away with practical steps to harden identity posture, spot early warning signs in cloud environments, and protect high value systems where trust can be turned directly into profit. To go deeper on this campaign and the Atlas Lion threat actor, read the Unit 42 article Jingle Thief Inside a Cloud-Based Gift Card Fraud Campaign at <a href="https://unit42.paloaltonetworks.com/cloud-based-gift-card-fraud-campaign/">https://unit42.paloaltonetworks.com/cloud-based-gift-card-fraud-campaign/</a></p>
<p><strong>Join the conversation on our social media channels:</strong></p>
<ul>
  <li>
<strong>Website</strong>:<a href="https://www.paloaltonetworks.com/unit42">⁠⁠⁠⁠⁠ <u>⁠⁠⁠⁠https://www.paloaltonetworks.com/</u>⁠⁠⁠⁠⁠</a>
</li>
  <li>
<strong>Threat Research:</strong><a href="https://unit42.paloaltonetworks.com/">⁠⁠⁠⁠⁠<strong> </strong><u>⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠</u>⁠⁠⁠⁠⁠</a>
</li>
  <li>
<strong>Facebook:</strong><a href="https://www.facebook.com/LifeatPaloAltoNetworks/">⁠⁠⁠⁠⁠<strong> </strong><u>⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠</u>⁠⁠⁠⁠⁠</a>
</li>
  <li>
<strong>LinkedIn:</strong><a href="https://www.linkedin.com/company/unit42/">⁠⁠⁠⁠⁠<strong> </strong><u>⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠</u>⁠⁠⁠⁠⁠</a>
</li>
  <li>
<strong>YouTube:</strong><a href="https://www.youtube.com/channel/UCvJQO11qoCHYwZ4Ah4Jf-Tw">⁠⁠⁠⁠⁠<strong> </strong>⁠⁠⁠⁠⁠</a><a href="https://www.youtube.com/paloaltonetworks">⁠⁠⁠⁠<u>@paloaltonetworks</u>⁠⁠⁠⁠</a>
</li>
  <li>
<strong>Twitter:</strong><a href="https://twitter.com/PaloAltoNtwks">⁠⁠⁠⁠⁠<strong> </strong><u>⁠⁠⁠⁠</u>⁠⁠⁠⁠⁠</a><a href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0">⁠⁠⁠⁠⁠<u>https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠</u>⁠⁠⁠⁠</a>
</li>
</ul>
<p><strong>About Threat Vector</strong></p>
<p>Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.</p>
<p>The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.</p>
<p>Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.</p>
<p><strong>Palo Alto Networks</strong></p>
<p>Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.<a href="http://paloaltonetworks.com/">⁠⁠⁠⁠⁠ <u>⁠http://paloaltonetworks.com.</u>⁠</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2170</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cc1b0e58-c649-11f0-8869-dbd2c9da9e6c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8170925216.mp3?updated=1763504483" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Eviction notice for Media Land.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2438/notes</link>
      <description>The US and allies sanction Russian bulletproof hosting providers. The White House looks to sue states over AI regulations. The US Border Patrol flags citizens’ “suspicious” travel patterns. Lawmakers seek to strengthen the SEC’s cybersecurity posture. A new Android banking trojan captures content from end-to-end encrypted apps. A hidden browser API raises security concerns. Fortinet patches a zero-day. A Philippine former mayor gets life in prison for scam center human trafficking. Our guest is Cliff Crosland, CEO and Co-founder at Scanner.dev, discussing why security data lakes are ideal for AI in the SOC. Green energy gets hijacked for a blockchain side-hustle. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Cliff Crosland, CEO and Co-founder at Scanner.dev, discussing why security data lakes are ideal for AI in the SOC. Listen to Cliff's full conversation here. 

Selected Reading

Russian bulletproof hosting provider sanctioned over ransomware ties (Bleeping Computer)

White House drafts order directing Justice Department to sue states that pass AI regulations (Washington Post)

Border Patrol is monitoring US drivers and detaining those with 'suspicious' travel patterns (Associated Press)

Lawmakers reintroduce bill to bolster cybersecurity at Securities and Exchange Commission (The Record)

Multi-threat Android malware Sturnus steals Signal, WhatsApp messages (Bleeping Computer)

Hidden API in Comet AI browser raises security red flags for enterprises (CSO Online)

Eternidade Stealer Trojan Fuels Aggressive Brazil Cybercrime (Infosecurity Magazine)

Fortinet Patches Actively Exploited FortiWeb Zero Day Flaw (HIPAA Journal)

Ex-Philippine mayor Alice Guo given life sentence for human trafficking (Reuters)

Wind farm worker sentenced after turning turbines into a secret crypto mine (Bitdefender)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 20 Nov 2025 21:10:00 -0000</pubDate>
      <itunes:title>Eviction notice for Media Land.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2438</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The US and allies sanction Russian bulletproof hosting providers. The White House looks to sue states over AI regulations. The US Border Patrol flags citizens’ “suspicious” travel patterns. Lawmakers seek to strengthen the SEC’s cybersecurity posture. A new Android banking trojan captures content from end-to-end encrypted apps. A hidden browser API raises security concerns. Fortinet patches a zero-day. A Philippine former mayor gets life in prison for scam center human trafficking. Our guest is Cliff Crosland, CEO and Co-founder at Scanner.dev, discussing why security data lakes are ideal for AI in the SOC. Green energy gets hijacked for a blockchain side-hustle. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Cliff Crosland, CEO and Co-founder at Scanner.dev, discussing why security data lakes are ideal for AI in the SOC. Listen to Cliff's full conversation here. 

Selected Reading

Russian bulletproof hosting provider sanctioned over ransomware ties (Bleeping Computer)

White House drafts order directing Justice Department to sue states that pass AI regulations (Washington Post)

Border Patrol is monitoring US drivers and detaining those with 'suspicious' travel patterns (Associated Press)

Lawmakers reintroduce bill to bolster cybersecurity at Securities and Exchange Commission (The Record)

Multi-threat Android malware Sturnus steals Signal, WhatsApp messages (Bleeping Computer)

Hidden API in Comet AI browser raises security red flags for enterprises (CSO Online)

Eternidade Stealer Trojan Fuels Aggressive Brazil Cybercrime (Infosecurity Magazine)

Fortinet Patches Actively Exploited FortiWeb Zero Day Flaw (HIPAA Journal)

Ex-Philippine mayor Alice Guo given life sentence for human trafficking (Reuters)

Wind farm worker sentenced after turning turbines into a secret crypto mine (Bitdefender)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US and allies sanction Russian bulletproof hosting providers. The White House looks to sue states over AI regulations. The US Border Patrol flags citizens’ “suspicious” travel patterns. Lawmakers seek to strengthen the SEC’s cybersecurity posture. A new Android banking trojan captures content from end-to-end encrypted apps. A hidden browser API raises security concerns. Fortinet patches a zero-day. A Philippine former mayor gets life in prison for scam center human trafficking. Our guest is Cliff Crosland, CEO and Co-founder at Scanner.dev, discussing why security data lakes are ideal for AI in the SOC. Green energy gets hijacked for a blockchain side-hustle. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/cliftoncrosland/"><u>Cliff Crosland</u></a>, CEO and Co-founder at <a href="https://www.linkedin.com/company/scanner-dev/"><u>Scanner.dev</u></a>, discussing why security data lakes are ideal for AI in the SOC. Listen to Cliff's full conversation <a href="https://explore.thecyberwire.com/cliff-crosland">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/us-sanctions-russian-bulletproof-hosting-provider-media-land-over-ransomware-ties"><u>Russian bulletproof hosting provider sanctioned over ransomware ties</u></a> (Bleeping Computer)</p>
<p><a href="https://www.washingtonpost.com/technology/2025/11/19/trump-order-ai-sue-states/"><u>White House drafts order directing Justice Department to sue states that pass AI regulations</u></a> (Washington Post)</p>
<p><a href="https://apnews.com/article/immigration-border-patrol-surveillance-drivers-ice-trump-9f5d05469ce8c629d6fecf32d32098cd"><u>Border Patrol is monitoring US drivers and detaining those with 'suspicious' travel patterns</u></a> (Associated Press)</p>
<p><a href="https://therecord.media/lawmakers-bill-beefs-security-sec"><u>Lawmakers reintroduce bill to bolster cybersecurity at Securities and Exchange Commission</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/multi-threat-android-malware-sturnus-steals-signal-whatsapp-messages/"><u>Multi-threat Android malware Sturnus steals Signal, WhatsApp messages</u></a> (Bleeping Computer)</p>
<p><a href="https://www.csoonline.com/article/4092995/hidden-api-in-comet-ai-browser-raises-security-red-flags-for-enterprises.html"><u>Hidden API in Comet AI browser raises security red flags for enterprises</u></a> (CSO Online)</p>
<p><a href="https://www.infosecurity-magazine.com/news/eternidade-stealer-trojan-brazil"><u>Eternidade Stealer Trojan Fuels Aggressive Brazil Cybercrime</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.hipaajournal.com/fortinet-patches-actively-exploited-fortiweb-zero-day-flaw"><u>Fortinet Patches Actively Exploited FortiWeb Zero Day Flaw</u></a> (HIPAA Journal)</p>
<p><a href="https://www.reuters.com/world/asia-pacific/ex-philippine-mayor-alice-guo-given-life-sentence-human-trafficking-2025-11-20"><u>Ex-Philippine mayor Alice Guo given life sentence for human trafficking</u></a> (Reuters)</p>
<p><a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/wind-farm-worker-sentenced-after-turning-turbines-into-a-secret-crypto-mine"><u>Wind farm worker sentenced after turning turbines into a secret crypto mine</u></a> (Bitdefender)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2029</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d617a160-1c7a-11f0-85e0-9f7457e053c2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7576553662.mp3?updated=1763671448" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The oversized file that stalled the internet.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2437/notes</link>
      <description>Cloudflare’s outage is rooted in an internal configuration error. The Trump administration is preparing a new national cyber strategy. CISA gives federal agencies a week to secure a new Fortinet flaw. MI5 warns that China is using LinkedIn headhunters and covert operatives to target lawmakers. Experts question the national security risks of TP-Link routers. The China-aligned PlushDaemon threat group hijacks software updates. Researchers discover WhatsApp’s entire global member directory accessible online without protection. LG Energy Solution confirms a ransomware attack. ShinySp1d3r makes its debut. Rotem Tsadok, Director of Security Operations and Forensics at Varonis, is sharing lessons learned from thousands of forensics investigations. A judge says Google’s claims to water use secrecy are all wet. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Rotem Tsadok, Director of Security Operations and Forensics at Varonis, sharing lessons learned from thousands of forensics investigations. Listen to Rotem's full conversation here. 

Selected Reading

Cloudflare blames this week's massive outage on database issues (Bleeping Computer)

National cyber strategy will include focus on ‘shaping adversary behavior,’ White House official says (The Record)

CISA gives govt agencies 7 days to patch new Fortinet flaw (Bleeping Computer)

Chinese Spies Are Using LinkedIn to Target U.K. Lawmakers, MI5 Warns (The New York Times)

No evidence that TP-Link routers are a Chinese security threat (CSO Online)

PlushDaemon compromises network devices for adversary-in-the-middle attacks (welivesecurity)

3.5 Billion Accounts: Complete WhatsApp Directory Retrieved and Evaluated (heise online)

LG Energy Solution reports ransomware attack, hackers claim theft of 1.7 terabytes of data (beyondmachines)

Meet ShinySp1d3r: New Ransomware-as-a-Service created by ShinyHunters (Bleeping Computer)

Google Strives To Keep Data Center Water Use Secret After Judge Orders Records Released (Roanoke Rambler)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 19 Nov 2025 21:10:00 -0000</pubDate>
      <itunes:title>The oversized file that stalled the internet.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2437</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cloudflare’s outage is rooted in an internal configuration error. The Trump administration is preparing a new national cyber strategy. CISA gives federal agencies a week to secure a new Fortinet flaw. MI5 warns that China is using LinkedIn headhunters and covert operatives to target lawmakers. Experts question the national security risks of TP-Link routers. The China-aligned PlushDaemon threat group hijacks software updates. Researchers discover WhatsApp’s entire global member directory accessible online without protection. LG Energy Solution confirms a ransomware attack. ShinySp1d3r makes its debut. Rotem Tsadok, Director of Security Operations and Forensics at Varonis, is sharing lessons learned from thousands of forensics investigations. A judge says Google’s claims to water use secrecy are all wet. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Rotem Tsadok, Director of Security Operations and Forensics at Varonis, sharing lessons learned from thousands of forensics investigations. Listen to Rotem's full conversation here. 

Selected Reading

Cloudflare blames this week's massive outage on database issues (Bleeping Computer)

National cyber strategy will include focus on ‘shaping adversary behavior,’ White House official says (The Record)

CISA gives govt agencies 7 days to patch new Fortinet flaw (Bleeping Computer)

Chinese Spies Are Using LinkedIn to Target U.K. Lawmakers, MI5 Warns (The New York Times)

No evidence that TP-Link routers are a Chinese security threat (CSO Online)

PlushDaemon compromises network devices for adversary-in-the-middle attacks (welivesecurity)

3.5 Billion Accounts: Complete WhatsApp Directory Retrieved and Evaluated (heise online)

LG Energy Solution reports ransomware attack, hackers claim theft of 1.7 terabytes of data (beyondmachines)

Meet ShinySp1d3r: New Ransomware-as-a-Service created by ShinyHunters (Bleeping Computer)

Google Strives To Keep Data Center Water Use Secret After Judge Orders Records Released (Roanoke Rambler)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cloudflare’s outage is rooted in an internal configuration error. The Trump administration is preparing a new national cyber strategy. CISA gives federal agencies a week to secure a new Fortinet flaw. MI5 warns that China is using LinkedIn headhunters and covert operatives to target lawmakers. Experts question the national security risks of TP-Link routers. The China-aligned PlushDaemon threat group hijacks software updates. Researchers discover WhatsApp’s entire global member directory accessible online without protection. LG Energy Solution confirms a ransomware attack. ShinySp1d3r makes its debut. Rotem Tsadok, Director of Security Operations and Forensics at Varonis, is sharing lessons learned from thousands of forensics investigations. A judge says Google’s claims to water use secrecy are all wet. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/rotem-tsadok/">Rotem Tsadok</a>, Director of Security Operations and Forensics at <a href="https://www.linkedin.com/company/varonis/">Varonis</a>, sharing lessons learned from thousands of forensics investigations. Listen to Rotem's full conversation <a href="https://explore.thecyberwire.com/varonis">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/technology/cloudflare-blames-this-weeks-massive-outage-on-database-issues/"><u>Cloudflare blames this week's massive outage on database issues</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/national-cyber-strategy-cairncross-shaping-enemy-behavior"><u>National cyber strategy will include focus on ‘shaping adversary behavior,’ White House official says</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisa-gives-govt-agencies-7-days-to-patch-new-fortinet-flaw/"><u>CISA gives govt agencies 7 days to patch new Fortinet flaw</u></a> (Bleeping Computer)</p>
<p><a href="https://www.nytimes.com/2025/11/18/world/europe/chinese-spies-linkedin-uk.html"><u>Chinese Spies Are Using LinkedIn to Target U.K. Lawmakers, MI5 Warns</u></a> (The New York Times)</p>
<p><a href="https://www.csoonline.com/article/3504775/no-evidence-that-tp-link-routers-are-a-chinese-security-threat.html"><u>No evidence that TP-Link routers are a Chinese security threat</u> (CSO Online</a>)</p>
<p><a href="https://www.welivesecurity.com/en/eset-research/plushdaemon-compromises-network-devices-for-adversary-in-the-middle-attacks/"><u>PlushDaemon compromises network devices for adversary-in-the-middle attacks</u></a> (welivesecurity)</p>
<p><a href="https://www.heise.de/en/news/3-5-Billion-Accounts-Complete-WhatsApp-Directory-Retrieved-and-Evaluated-11083244.html"><u>3.5 Billion Accounts: Complete WhatsApp Directory Retrieved and Evaluated</u> (heise online</a>)</p>
<p><a href="https://beyondmachines.net/event_details/lg-energy-solution-reports-ransomware-attack-hackers-claim-theft-of-1-7-terabytes-of-data-9-n-3-w-q/gD2P6Ple2L"><u>LG Energy Solution reports ransomware attack, hackers claim theft of 1.7 terabytes of data</u></a> (beyondmachines)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/meet-shinysp1d3r-new-ransomware-as-a-service-created-by-shinyhunters/"><u>Meet ShinySp1d3r: New Ransomware-as-a-Service created by ShinyHunters</u></a> (Bleeping Computer)</p>
<p><br><a href="https://www.roanokerambler.com/google-strives-keep-data-center-botetourt-county-water-use-secret-judge-orders-records-released/"><u>Google Strives To Keep Data Center Water Use Secret After Judge Orders Records Released</u></a> (Roanoke Rambler)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1786</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f0b740d4-c57b-11f0-993d-b3574d2ad49c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1942604678.mp3?updated=1763585929" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A morning without Cloudflare.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2436/notes</link>
      <description>Cloudflare suffers a major outage. Google issues an emergency Chrome update. Logitech discloses a data breach. CISA plans a major hiring push. The House renews the State and Local Cybersecurity Grant Program. The GAO warns military personnel are oversharing online. Tech groups urge governments worldwide to reject proposals that weaken or bypass encryption. Australian authorities blame outdated software for the death of a telecom customer. An alleged Void Blizzard hacker faces extradition to the US. Our guest is Kevin Kennedy from ManTech discussing the future battlefield and the importance of integrating non-kinetic effects. AI meets the IRS. What could possibly go wrong?

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by ⁠Kevin Kennedy⁠ from ⁠ManTech⁠ discussing the future battlefield and the importance of integrating non-kinetic effects. You can hear Kevin's full conversation here. 

Selected Reading

Cloudflare outage causes error messages across the internet (The Guardian)

Google releases emergency Chrome update to patch actively exploited vulnerability (Beyond Machines)

Logitech discloses data breach after Clop claims (The Record)

CISA, eyeing China, plans hiring spree to rebuild its depleted ranks (Cybersecurity Dive)

Full renewal of state and local cyber grants program passes in House (The Record)

Pentagon and soldiers let too many secrets slip on socials (The Register)

Dozens of groups call for governments to protect encryption (CyberScoop)

Australia's TPG Telecom links customer's death to outdated Samsung phone (Reuters)

Alleged Void Blizzard hacker arrested in Thailand (SC Media)

Intuit signs $100M+ deal with OpenAI to bring its apps to ChatGPT (TechCrunch)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Nov 2025 21:10:00 -0000</pubDate>
      <itunes:title>A morning without Cloudflare.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2436</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Cloudflare suffers a major outage. Google issues an emergency Chrome update. Logitech discloses a data breach. CISA plans a major hiring push. The House renews the State and Local Cybersecurity Grant Program. The GAO warns military personnel are oversharing online. Tech groups urge governments worldwide to reject proposals that weaken or bypass encryption. Australian authorities blame outdated software for the death of a telecom customer. An alleged Void Blizzard hacker faces extradition to the US. Our guest is Kevin Kennedy from ManTech discussing the future battlefield and the importance of integrating non-kinetic effects. AI meets the IRS. What could possibly go wrong?

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by ⁠Kevin Kennedy⁠ from ⁠ManTech⁠ discussing the future battlefield and the importance of integrating non-kinetic effects. You can hear Kevin's full conversation here. 

Selected Reading

Cloudflare outage causes error messages across the internet (The Guardian)

Google releases emergency Chrome update to patch actively exploited vulnerability (Beyond Machines)

Logitech discloses data breach after Clop claims (The Record)

CISA, eyeing China, plans hiring spree to rebuild its depleted ranks (Cybersecurity Dive)

Full renewal of state and local cyber grants program passes in House (The Record)

Pentagon and soldiers let too many secrets slip on socials (The Register)

Dozens of groups call for governments to protect encryption (CyberScoop)

Australia's TPG Telecom links customer's death to outdated Samsung phone (Reuters)

Alleged Void Blizzard hacker arrested in Thailand (SC Media)

Intuit signs $100M+ deal with OpenAI to bring its apps to ChatGPT (TechCrunch)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cloudflare suffers a major outage. Google issues an emergency Chrome update. Logitech discloses a data breach. CISA plans a major hiring push. The House renews the State and Local Cybersecurity Grant Program. The GAO warns military personnel are oversharing online. Tech groups urge governments worldwide to reject proposals that weaken or bypass encryption. Australian authorities blame outdated software for the death of a telecom customer. An alleged Void Blizzard hacker faces extradition to the US. Our guest is Kevin Kennedy from ManTech discussing the future battlefield and the importance of integrating non-kinetic effects. AI meets the IRS. What could possibly go wrong?</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/kevin-kennedy-7b767824/">⁠Kevin Kennedy⁠</a> from <a href="https://www.linkedin.com/company/mantech/">⁠ManTech⁠</a> discussing the future battlefield and the importance of integrating non-kinetic effects. You can hear Kevin's full conversation <a href="https://explore.thecyberwire.com/mantech">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.theguardian.com/technology/2025/nov/18/cloudflare-outage-causes-error-messages-across-the-internet"><u>Cloudflare outage causes error messages across the internet</u></a> (The Guardian)</p>
<p><a href="https://beyondmachines.net/event_details/google-releases-emergency-chrome-update-to-patch-actively-exploited-vulnerability-u-k-i-k-h/gD2P6Ple2L"><u>Google releases emergency Chrome update to patch actively exploited vulnerability</u></a> (Beyond Machines)</p>
<p><a href="https://therecord.media/logitech-discloses-data-breach-clop"><u>Logitech discloses data breach after Clop claims</u></a> (The Record)</p>
<p><a href="https://www.cybersecuritydive.com/news/cisa-hiring-workforce-strategy/805733"><u>CISA, eyeing China, plans hiring spree to rebuild its depleted ranks</u></a> (Cybersecurity Dive)</p>
<p><a href="https://therecord.media/state-local-cyber-grants-program-house-passage"><u>Full renewal of state and local cyber grants program passes in House</u></a> (The Record)</p>
<p><a href="https://www.theregister.com/2025/11/17/pentagon_soldiers_secrets_socials_whoops/"><u>Pentagon and soldiers let too many secrets slip on socials</u></a> (The Register)</p>
<p><a href="https://cyberscoop.com/encryption-sixty-groups-call-on-governments-to-oppose-backdoor-mandates/"><u>Dozens of groups call for governments to protect encryption</u></a> (CyberScoop)</p>
<p><a href="https://www.reuters.com/business/media-telecom/australias-tpg-telecom-says-customer-died-after-failed-emergency-call-due-2025-11-17/"><u>Australia's TPG Telecom links customer's death to outdated Samsung phone</u></a> (Reuters)</p>
<p><a href="https://www.scworld.com/brief/alleged-void-blizzard-hacker-arrested-in-thailand"><u>Alleged Void Blizzard hacker arrested in Thailand</u></a> (SC Media)</p>
<p><br><a href="https://techcrunch.com/2025/11/18/intuit-signs-100m-deal-with-openai-to-bring-its-apps-to-chatgpt/"><u>Intuit signs $100M+ deal with OpenAI to bring its apps to ChatGPT</u></a> (TechCrunch)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2094</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d5ccd7fc-1c7a-11f0-85e0-53ef2aea728a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7119656488.mp3?updated=1763498433" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fraud and Identity [CISO Perspectives]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/117/notes</link>
      <description>Managing identity has been an evolving challenge as networks have only continued to grow and become more sophisticated. In this current landscape, these challenges have only become further exacerbated with new emerging technologies. 

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Richard Bird from Singular AI to discuss this evolving paradigm. Throughout this conversation, Kim and Richard tackle how managing identity has evolved and how security leaders can get ahead of AI to better secure their systems and networks.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Nov 2025 07:00:00 -0000</pubDate>
      <itunes:title>Fraud and Identity [CISO Perspectives]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>117</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6b0f15de-b35f-11f0-95e4-c39668b06a85/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Managing identity has been an evolving challenge as networks have only continued to grow and become more sophisticated. In this current landscape, these challenges have only become further exacerbated with new emerging technologies. 

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Richard Bird from Singular AI to discuss this evolving paradigm. Throughout this conversation, Kim and Richard tackle how managing identity has evolved and how security leaders can get ahead of AI to better secure their systems and networks.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Managing identity has been an evolving challenge as networks have only continued to grow and become more sophisticated. In this current landscape, these challenges have only become further exacerbated with new emerging technologies. </p>
<p>In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with <a href="https://www.linkedin.com/in/rbird/">Richard Bird</a> from Singular AI to discuss this evolving paradigm. Throughout this conversation, Kim and Richard tackle how managing identity has evolved and how security leaders can get ahead of AI to better secure their systems and networks.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion ⁠⁠<a href="https://thecyberwire.com/stories/8e5c8b4d669047d69da0061240c9c4d5/fraud-and-identity">blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2414</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6b0f15de-b35f-11f0-95e4-c39668b06a85]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1328635051.mp3?updated=1762892644" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The rise of AI-driven cyber offense.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2435/notes</link>
      <description>The Pentagon is spending millions on AI hacking. The New York Times investigates illicit crypto funds. Researchers uncover widespread remote code execution flaws in AI inference engines. Police in India arrest CCTV hackers. Payroll Pirates use Google Ads to steal credentials and redirect salaries. A  large-scale brand impersonation campaign delivers Gh0st RAT to Chinese-speaking users.A bitcoin mining company CEO gets scammed. Monday biz brief. On our Industry Voices segment with our Knowledge Partner SpecterOps, Chief Technology Officer Jared Atkinson is discussing Attack Path Management: Identities in Transit. Bitcoin big wigs learn to bite through plastic.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment with our Knowledge Partner SpecterOps, Chief Technology Officer Jared Atkinson is discussing Attack Path Management: Identities in Transit. Hear more from Jared here. 

Cyber Things podcast	

Something strange has landed in all the cool podcast apps…

Cyber Things is a new three-part series from Armis that decodes real-world cyber threats through the lens of a certain Hawkins-based sci-fi phenomenon.

Just in time for the show’s final season, Rebecca Cradick leads us through a world where fiction meets cybersecurity.

Because sometimes the scariest villains aren’t in the Upside Down — they’re online.

You can check out Cyber Things on your favorite podcast app and on our website. On the site, you will find the trailer and Episode 1: The Unseen World available today! 

Selected Reading

The Pentagon Is Spending Millions On AI Hacking From Startup Twenty (Forbes)

The Crypto Industry’s $28 Billion in ‘Dirty Money’ (The New York Times)

The Coin Laundry, a global cryptocurrency investigation (International Consortium of Investigative Journalism)

"ShadowMQ" exploit pattern reported in major AI frameworks, enables remote code execution (Beyond Machines)

Gujarat: Hackers steal maternity ward CCTV videos in India cybercrime racket (BBC News)

Payroll Pirates: One Network, Hundreds of Targets (Check Point)

Digital Doppelgangers: Anatomy of Evolving Impersonation Campaigns Distributing Gh0st RAT (Unit 42, Palo Alto Networks)

Inside a Wild Bitcoin Heist: Five-Star Hotels, Cash-Stuffed Envelopes, and Vanishing Funds (WIRED)

UK prosecutors seize £4.11M in crypto from Twitter mega-hack culprit (The Register)

Tenzai emerges from stealth with $75 million in seed funding led by Greylock Partners.  (N2K Pro)

How to Not Get Kidnapped for Your Bitcoin (The New York Times)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 17 Nov 2025 21:10:00 -0000</pubDate>
      <itunes:title>The rise of AI-driven cyber offense.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2435</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The Pentagon is spending millions on AI hacking. The New York Times investigates illicit crypto funds. Researchers uncover widespread remote code execution flaws in AI inference engines. Police in India arrest CCTV hackers. Payroll Pirates use Google Ads to steal credentials and redirect salaries. A  large-scale brand impersonation campaign delivers Gh0st RAT to Chinese-speaking users.A bitcoin mining company CEO gets scammed. Monday biz brief. On our Industry Voices segment with our Knowledge Partner SpecterOps, Chief Technology Officer Jared Atkinson is discussing Attack Path Management: Identities in Transit. Bitcoin big wigs learn to bite through plastic.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment with our Knowledge Partner SpecterOps, Chief Technology Officer Jared Atkinson is discussing Attack Path Management: Identities in Transit. Hear more from Jared here. 

Cyber Things podcast	

Something strange has landed in all the cool podcast apps…

Cyber Things is a new three-part series from Armis that decodes real-world cyber threats through the lens of a certain Hawkins-based sci-fi phenomenon.

Just in time for the show’s final season, Rebecca Cradick leads us through a world where fiction meets cybersecurity.

Because sometimes the scariest villains aren’t in the Upside Down — they’re online.

You can check out Cyber Things on your favorite podcast app and on our website. On the site, you will find the trailer and Episode 1: The Unseen World available today! 

Selected Reading

The Pentagon Is Spending Millions On AI Hacking From Startup Twenty (Forbes)

The Crypto Industry’s $28 Billion in ‘Dirty Money’ (The New York Times)

The Coin Laundry, a global cryptocurrency investigation (International Consortium of Investigative Journalism)

"ShadowMQ" exploit pattern reported in major AI frameworks, enables remote code execution (Beyond Machines)

Gujarat: Hackers steal maternity ward CCTV videos in India cybercrime racket (BBC News)

Payroll Pirates: One Network, Hundreds of Targets (Check Point)

Digital Doppelgangers: Anatomy of Evolving Impersonation Campaigns Distributing Gh0st RAT (Unit 42, Palo Alto Networks)

Inside a Wild Bitcoin Heist: Five-Star Hotels, Cash-Stuffed Envelopes, and Vanishing Funds (WIRED)

UK prosecutors seize £4.11M in crypto from Twitter mega-hack culprit (The Register)

Tenzai emerges from stealth with $75 million in seed funding led by Greylock Partners.  (N2K Pro)

How to Not Get Kidnapped for Your Bitcoin (The New York Times)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Pentagon is spending millions on AI hacking. The New York Times investigates illicit crypto funds. Researchers uncover widespread remote code execution flaws in AI inference engines. Police in India arrest CCTV hackers. Payroll Pirates use Google Ads to steal credentials and redirect salaries. A  large-scale brand impersonation campaign delivers Gh0st RAT to Chinese-speaking users.A bitcoin mining company CEO gets scammed. Monday biz brief. On our Industry Voices segment with our Knowledge Partner SpecterOps, Chief Technology Officer Jared Atkinson is discussing Attack Path Management: Identities in Transit. Bitcoin big wigs learn to bite through plastic.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment with our Knowledge Partner <a href="https://www.linkedin.com/company/specterops/"><u>SpecterOps</u></a>, Chief Technology Officer <a href="https://www.linkedin.com/in/jaredcatkinson/"><u>Jared Atkinson</u></a> is discussing Attack Path Management: Identities in Transit. Hear more from Jared <a href="https://explore.thecyberwire.com/specterops?hs_preview=PinUxZMU-199602082118">here</a>. </p>
<p><strong>Cyber Things podcast	</strong></p>
<p>Something strange has landed in all the cool podcast apps…</p>
<p>Cyber Things is a new three-part series from Armis that decodes real-world cyber threats through the lens of a certain Hawkins-based sci-fi phenomenon.</p>
<p>Just in time for the show’s final season, Rebecca Cradick leads us through a world where fiction meets cybersecurity.</p>
<p>Because sometimes the scariest villains aren’t in the Upside Down — they’re online.</p>
<p>You can check out Cyber Things on your favorite podcast app and on our <a href="https://thecyberwire.com/podcasts/cyber-things"><u>website</u></a>. On the site, you will find the <a href="https://traffic.megaphone.fm/CYBW4820125731.mp3?updated=1762962387"><u>trailer</u></a> and <a href="https://thecyberwire.com/podcasts/cyber-things/1/notes"><u>Episode 1: The Unseen World</u></a> available today! </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.forbes.com/sites/thomasbrewster/2025/11/15/pentagon-spends-millions-on-ai-hackers/"><u>The Pentagon Is Spending Millions On AI Hacking From Startup Twenty</u></a> (Forbes)</p>
<p><a href="https://www.nytimes.com/2025/11/17/technology/crypto-exchanges-dirty-money.html"><u>The Crypto Industry’s $28 Billion in ‘Dirty Money’</u></a> (The New York Times)</p>
<p><a href="https://www.icij.org/investigations/coin-laundry/"><u>The Coin Laundry, a global cryptocurrency investigation</u></a> (International Consortium of Investigative Journalism)</p>
<p><a href="https://beyondmachines.net/event_details/shadowmq-exploit-pattern-reported-in-major-ai-frameworks-enables-remote-code-execution-p-b-2-b-v/gD2P6Ple2L"><u>"ShadowMQ" exploit pattern reported in major AI frameworks, enables remote code execution</u></a> (Beyond Machines)</p>
<p><a href="https://www.bbc.com/news/articles/cqjw2x10njeo"><u>Gujarat: Hackers steal maternity ward CCTV videos in India cybercrime racket</u></a> (BBC News)</p>
<p><a href="https://blog.checkpoint.com/email-security/payroll-pirates-one-network-hundreds-of-targets/"><u>Payroll Pirates: One Network, Hundreds of Targets</u></a> (Check Point)</p>
<p><a href="https://unit42.paloaltonetworks.com/impersonation-campaigns-deliver-gh0st-rat/"><u>Digital Doppelgangers: Anatomy of Evolving Impersonation Campaigns Distributing Gh0st RAT</u></a> (Unit 42, Palo Alto Networks)</p>
<p><a href="https://www.wired.com/story/bitcoin-scam-mining-as-service/"><u>Inside a Wild Bitcoin Heist: Five-Star Hotels, Cash-Stuffed Envelopes, and Vanishing Funds </u></a>(WIRED)</p>
<p><a href="https://www.theregister.com/2025/11/17/cps_41m_crypto_twitter/"><u>UK prosecutors seize £4.11M in crypto from Twitter mega-hack culprit</u></a> (The Register)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/7/45"><u>Tenzai emerges from stealth with $75 million in seed funding led by Greylock Partners.</u> </a> (N2K Pro)</p>
<p><a href="https://www.nytimes.com/2025/11/17/business/how-to-not-get-kidnapped-for-your-bitcoin.html"><u>How to Not Get Kidnapped for Your Bitcoin</u></a> (The New York Times)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2123</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d5a747e4-1c7a-11f0-85e0-4700de86e69e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2187850656.mp3?updated=1763407071" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chenxi Wang: Overcoming the obstacle of fear. [Venture Capital] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/95/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Founder and general partner of Rain Capital, Chenxi shares her story and how she conquered and got over the obstacle of fear to reach her goals in life. " I realized a lot of times my obstacle is my own fear rather than a real obstacle" Wang states, she also shares her story of breaking glass ceilings as a female founder and working in the field of cybersecurity. She hopes to be remembered for being a kind person and developing her own venture fund, as she shares her story to the top, she states what she does and how she got to be where she is today. We thank Chenxi for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 16 Nov 2025 08:00:00 -0000</pubDate>
      <itunes:title>Chenxi Wang: Overcoming the obstacle of fear. [Venture Capital] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>95</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/086d24fe-c186-11f0-9002-7bfbb28efc88/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Founder and general partner of Rain Capital, Chenxi shares her story and how she conquered and got over the obstacle of fear to reach her goals in life. " I realized a lot of times my obstacle is my own fear rather than a real obstacle" Wang states, she also shares her story of breaking glass ceilings as a female founder and working in the field of cybersecurity. She hopes to be remembered for being a kind person and developing her own venture fund, as she shares her story to the top, she states what she does and how she got to be where she is today. We thank Chenxi for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Founder and general partner of Rain Capital, Chenxi shares her story and how she conquered and got over the obstacle of fear to reach her goals in life. " I realized a lot of times my obstacle is my own fear rather than a real obstacle" Wang states, she also shares her story of breaking glass ceilings as a female founder and working in the field of cybersecurity. She hopes to be remembered for being a kind person and developing her own venture fund, as she shares her story to the top, she states what she does and how she got to be where she is today. We thank Chenxi for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>592</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[086d24fe-c186-11f0-9002-7bfbb28efc88]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6159886914.mp3?updated=1735936619" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When clicks turn criminal. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/402/notes</link>
      <description>Dr. Renée Burton, Vice President of Threat Intelligence from Infoblox, is sharing the team's work on "Deniability by Design: DNS-Driven Insights into a Malicious Ad Network." Infoblox returns with new threat actor research uncovering Vane Viper, a Cyprus-based holding company behind PropellerAds—one of the world’s largest advertising networks. The report reveals that Vane Viper isn’t just being exploited by criminals but operates as a criminal infrastructure itself, built to profit from fraud, malware, and disinformation through offshore entities and complex ownership structures. 

The findings highlight the growing convergence between adtech, cybercrime, and state-linked influence operations, suggesting that elements of the global digital advertising ecosystem are now functioning as infrastructure for large-scale cyber and disinformation campaigns.

The research can be found here:


  Deniability by Design: DNS-Driven Insights intoa Malicious Ad Network


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Nov 2025 08:00:00 -0000</pubDate>
      <itunes:title>When clicks turn criminal. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>402</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/db4b097c-c17c-11f0-90a4-d7ae7b6d096a/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Dr. Renée Burton, Vice President of Threat Intelligence from Infoblox, is sharing the team's work on "Deniability by Design: DNS-Driven Insights into a Malicious Ad Network." Infoblox returns with new threat actor research uncovering Vane Viper, a Cyprus-based holding company behind PropellerAds—one of the world’s largest advertising networks. The report reveals that Vane Viper isn’t just being exploited by criminals but operates as a criminal infrastructure itself, built to profit from fraud, malware, and disinformation through offshore entities and complex ownership structures. 

The findings highlight the growing convergence between adtech, cybercrime, and state-linked influence operations, suggesting that elements of the global digital advertising ecosystem are now functioning as infrastructure for large-scale cyber and disinformation campaigns.

The research can be found here:


  Deniability by Design: DNS-Driven Insights intoa Malicious Ad Network


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/ren%C3%A9e-burton-b7161110b/">Dr. Renée Burton</a>, Vice President of Threat Intelligence from <a href="https://www.linkedin.com/company/infoblox/">Infoblox</a>, is sharing the team's work on "Deniability by Design: DNS-Driven Insights into a Malicious Ad Network." Infoblox returns with new threat actor research uncovering <em>Vane Viper</em>, a Cyprus-based holding company behind PropellerAds—one of the world’s largest advertising networks. The report reveals that Vane Viper isn’t just being exploited by criminals but operates as a criminal infrastructure itself, built to profit from fraud, malware, and disinformation through offshore entities and complex ownership structures. </p>
<p>The findings highlight the growing convergence between adtech, cybercrime, and state-linked influence operations, suggesting that elements of the global digital advertising ecosystem are now functioning as infrastructure for large-scale cyber and disinformation campaigns.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>Deniability by Design: DNS-Driven Insights into<br>a Malicious Ad Network</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1465</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[db4b097c-c17c-11f0-90a4-d7ae7b6d096a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9054222333.mp3?updated=1763140357" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Operation spyGPT.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2434/notes</link>
      <description>Anthropic reports China-linked hackers used Claude AI in an automated espionage campaign. Google reconsiders its upcoming “Developer Verification” policy for Android. AT&amp;T customers affected by two data breaches in 2024 can now file claims. Nearly 10,000 Washington Post employees were affected by a data breach. ASUS and Imunify360 patch critical flaws. DoorDash discloses a data breach. Checkout.com donates the ransom to researchers. Kraken ransomware benchmarks systems before encryption. Mike Arrowsmith, Chief Trust Officer of NinjaOne, shares his thoughts on how cyber may be heading for its California fire insurance moment. AI ChatBot toys behave badly. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Mike Arrowsmith, Chief Trust Officer of NinjaOne, is sharing his thoughts on how cyber insurance is heading for its California fire insurance moment.

Selected Reading

Anthropic Says Chinese Hackers Used Its A.I. in Online Attack (The New York Times)

Researchers question Anthropic claim that AI-assisted attack was 90% autonomous (Ars Technica)

Google backpedals on new Android developer registration rules (Bleeping Computer)

AT&amp;T data breach settlement to pay thousands to claimants. Who is eligible, how to apply (El Paso Times)

Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack (SecurityWeek)

ASUS warns of critical auth bypass flaw in DSL series routers (Bleeping Computer)

Imunify360 Vulnerability Could Expose Millions of Sites to Hacking (SecurityWeek)

DoorDash hit by new data breach in October exposing user information (Bleeping Computer)

Protecting our Merchants: Standing up to Extortion (Checkout.com)

Kraken ransomware benchmarks systems for optimal encryption choice (Bleeping Computer)

AI-Powered Toys Caught Telling 5-Year-Olds How to Find Knives and Start Fires With Matches (Futurism)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 14 Nov 2025 21:10:00 -0000</pubDate>
      <itunes:title>Operation spyGPT.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2434</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Anthropic reports China-linked hackers used Claude AI in an automated espionage campaign. Google reconsiders its upcoming “Developer Verification” policy for Android. AT&amp;T customers affected by two data breaches in 2024 can now file claims. Nearly 10,000 Washington Post employees were affected by a data breach. ASUS and Imunify360 patch critical flaws. DoorDash discloses a data breach. Checkout.com donates the ransom to researchers. Kraken ransomware benchmarks systems before encryption. Mike Arrowsmith, Chief Trust Officer of NinjaOne, shares his thoughts on how cyber may be heading for its California fire insurance moment. AI ChatBot toys behave badly. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Mike Arrowsmith, Chief Trust Officer of NinjaOne, is sharing his thoughts on how cyber insurance is heading for its California fire insurance moment.

Selected Reading

Anthropic Says Chinese Hackers Used Its A.I. in Online Attack (The New York Times)

Researchers question Anthropic claim that AI-assisted attack was 90% autonomous (Ars Technica)

Google backpedals on new Android developer registration rules (Bleeping Computer)

AT&amp;T data breach settlement to pay thousands to claimants. Who is eligible, how to apply (El Paso Times)

Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack (SecurityWeek)

ASUS warns of critical auth bypass flaw in DSL series routers (Bleeping Computer)

Imunify360 Vulnerability Could Expose Millions of Sites to Hacking (SecurityWeek)

DoorDash hit by new data breach in October exposing user information (Bleeping Computer)

Protecting our Merchants: Standing up to Extortion (Checkout.com)

Kraken ransomware benchmarks systems for optimal encryption choice (Bleeping Computer)

AI-Powered Toys Caught Telling 5-Year-Olds How to Find Knives and Start Fires With Matches (Futurism)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Anthropic reports China-linked hackers used Claude AI in an automated espionage campaign. Google reconsiders its upcoming “Developer Verification” policy for Android. AT&amp;T customers affected by two data breaches in 2024 can now file claims. Nearly 10,000 Washington Post employees were affected by a data breach. ASUS and Imunify360 patch critical flaws. DoorDash discloses a data breach. <a href="http://checkout.com"><u>Checkout.com</u></a> donates the ransom to researchers. Kraken ransomware benchmarks systems before encryption. Mike Arrowsmith, Chief Trust Officer of NinjaOne, shares his thoughts on how cyber may be heading for its California fire insurance moment. AI ChatBot toys behave badly. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p><a href="https://www.linkedin.com/in/michael-arrowsmith-429a8367/"><u>Mike Arrowsmith</u></a>, Chief Trust Officer of <a href="https://www.linkedin.com/company/ninjaone/"><u>NinjaOne</u></a>, is sharing his thoughts on how cyber insurance is heading for its California fire insurance moment.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.nytimes.com/2025/11/14/business/chinese-hackers-artificial-intelligence.html"><u>Anthropic Says Chinese Hackers Used Its A.I. in Online Attack</u></a> (The New York Times)</p>
<p><a href="https://arstechnica.com/security/2025/11/researchers-question-anthropic-claim-that-ai-assisted-attack-was-90-autonomous/"><u>Researchers question Anthropic claim that AI-assisted attack was 90% autonomous</u></a> (Ars Technica)</p>
<p><a href="https://www.bleepingcomputer.com/news/google/google-backpedals-on-new-android-developer-registration-rules/"><u>Google backpedals on new Android developer registration rules</u></a> (Bleeping Computer)</p>
<p><a href="https://www.elpasotimes.com/story/money/2025/11/14/att-settlement-to-pay-thousands-to-claimants-how-to-apply/87267428007/"><u>AT&amp;T data breach settlement to pay thousands to claimants. Who is eligible, how to apply</u></a> (El Paso Times)</p>
<p><a href="https://www.securityweek.com/washington-post-says-nearly-10000-employees-impacted-by-oracle-hack/"><u>Washington Post Says Nearly 10,000 Employees Impacted by Oracle Hack</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/asus-warns-of-critical-auth-bypass-flaw-in-dsl-series-routers/"><u>ASUS warns of critical auth bypass flaw in DSL series routers</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/imunify360-vulnerability-could-expose-millions-of-sites-to-hacking/"><u>Imunify360 Vulnerability Could Expose Millions of Sites to Hacking</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/doordash-hit-by-new-data-breach-in-october-exposing-user-information/"><u>DoorDash hit by new data breach in October exposing user information</u></a> (Bleeping Computer)</p>
<p><a href="https://www.checkout.com/blog/protecting-our-merchants-standing-up-to-extortion"><u>Protecting our Merchants: Standing up to Extortion</u></a> (Checkout.com)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/kraken-ransomware-benchmarks-systems-for-optimal-encryption-choice/"><u>Kraken ransomware benchmarks systems for optimal encryption choice</u></a> (Bleeping Computer)</p>
<p><a href="https://futurism.com/artificial-intelligence/ai-toys-danger"><u>AI-Powered Toys Caught Telling 5-Year-Olds How to Find Knives and Start Fires With Matches</u></a> (Futurism)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1801</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d581c230-1c7a-11f0-85e0-87a562af7cac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5702158346.mp3?updated=1763148192" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>404: Cybercrime not found.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2433/notes</link>
      <description>Operation Endgame expands global takedowns. The U.S. is creating a Scam Center Strike Force. Microsoft rolls out its delayed “Prevent screen capture” feature for Teams. Proton Pass patches a clickjacking flaw. Researchers uncover previously undisclosed zero-day flaws in both Citrix and Cisco Identity Services Engine. Android-based digital picture frames contain multiple critical vulnerabilities. Lumma Stealer rebounds after last month’s doxxing campaign. Our guest is Garrett Hoffman, Senior Manager of Cloud Security Engineering from Adobe, talking about achieving cloud security at scale. X marks the spot… where your passkey stops working. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Garrett Hoffman, Senior Manager of Cloud Security Engineering from Adobe, talking about achieving cloud security at scale. You can hear the full conversation with Garrett here.

Selected Reading

End of the game for cybercrime infrastructure: 1025 servers taken down - Operation Endgame’s latest phase targeted the infostealer Rhadamanthys, Remote Access Trojan VenomRAT, and the botnet Elysium (Europol)

US announces ‘strike force’ to counter Southeast Asian cyber scams, sanctions Myanmar armed group (The Record)

Microsoft rolls out screen capture prevention for Teams users (Bleeping Computer)

Proton Pass patches DOM-based clickjacking zero-day vulnerability (Cyberinsider)

Amazon discovers APT exploiting Cisco and Citrix zero-days (AWS Security Blog)

CISA warns feds to fully patch actively exploited Cisco flaws (Bleeping Computer)

Popular Android-based photo frames download malware on boot (Bleeping Computer)

Increase in Lumma Stealer Activity Coincides with Use of Adaptive Browser Fingerprinting Tactics (Trend Micro)

Elon Musk's X botched its security key switchover, locking users out (TechCrunch)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 13 Nov 2025 21:10:00 -0000</pubDate>
      <itunes:title>404: Cybercrime not found.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2433</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Operation Endgame expands global takedowns. The U.S. is creating a Scam Center Strike Force. Microsoft rolls out its delayed “Prevent screen capture” feature for Teams. Proton Pass patches a clickjacking flaw. Researchers uncover previously undisclosed zero-day flaws in both Citrix and Cisco Identity Services Engine. Android-based digital picture frames contain multiple critical vulnerabilities. Lumma Stealer rebounds after last month’s doxxing campaign. Our guest is Garrett Hoffman, Senior Manager of Cloud Security Engineering from Adobe, talking about achieving cloud security at scale. X marks the spot… where your passkey stops working. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Garrett Hoffman, Senior Manager of Cloud Security Engineering from Adobe, talking about achieving cloud security at scale. You can hear the full conversation with Garrett here.

Selected Reading

End of the game for cybercrime infrastructure: 1025 servers taken down - Operation Endgame’s latest phase targeted the infostealer Rhadamanthys, Remote Access Trojan VenomRAT, and the botnet Elysium (Europol)

US announces ‘strike force’ to counter Southeast Asian cyber scams, sanctions Myanmar armed group (The Record)

Microsoft rolls out screen capture prevention for Teams users (Bleeping Computer)

Proton Pass patches DOM-based clickjacking zero-day vulnerability (Cyberinsider)

Amazon discovers APT exploiting Cisco and Citrix zero-days (AWS Security Blog)

CISA warns feds to fully patch actively exploited Cisco flaws (Bleeping Computer)

Popular Android-based photo frames download malware on boot (Bleeping Computer)

Increase in Lumma Stealer Activity Coincides with Use of Adaptive Browser Fingerprinting Tactics (Trend Micro)

Elon Musk's X botched its security key switchover, locking users out (TechCrunch)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Operation Endgame expands global takedowns. The U.S. is creating a Scam Center Strike Force. Microsoft rolls out its delayed “Prevent screen capture” feature for Teams. Proton Pass patches a clickjacking flaw. Researchers uncover previously undisclosed zero-day flaws in both Citrix and Cisco Identity Services Engine. Android-based digital picture frames contain multiple critical vulnerabilities. Lumma Stealer rebounds after last month’s doxxing campaign. Our guest is Garrett Hoffman, Senior Manager of Cloud Security Engineering from Adobe, talking about achieving cloud security at scale. X marks the spot… where your passkey stops working. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/garrett-hoffman-72b15b82/"><u>Garrett Hoffman</u></a>, Senior Manager of Cloud Security Engineering from <a href="https://www.linkedin.com/company/adobe/"><u>Adobe</u></a>, talking about achieving cloud security at scale. You can hear the full conversation with Garrett <a href="https://explore.thecyberwire.com/garrett-hoffman">here</a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.europol.europa.eu/media-press/newsroom/news/end-of-game-for-cybercrime-infrastructure-1025-servers-taken-down"><u>End of the game for cybercrime infrastructure: 1025 servers taken down - Operation Endgame’s latest phase targeted the infostealer Rhadamanthys, Remote Access Trojan VenomRAT, and the botnet Elysium</u></a> (Europol)</p>
<p><a href="https://therecord.media/strike-force-southeast-asia-scams"><u>US announces ‘strike force’ to counter Southeast Asian cyber scams, sanctions Myanmar armed group</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-rolls-out-screen-capture-prevention-for-teams-users/"><u>Microsoft rolls out screen capture prevention for Teams users</u></a> (Bleeping Computer)</p>
<p><a href="https://cyberinsider.com/proton-pass-patches-dom-based-clickjacking-zero-day-vulnerability/"><u>Proton Pass patches DOM-based clickjacking zero-day vulnerability</u></a> (Cyberinsider)</p>
<p><a href="https://aws.amazon.com/blogs/security/amazon-discovers-apt-exploiting-cisco-and-citrix-zero-days/"><u>Amazon discovers APT exploiting Cisco and Citrix zero-days</u></a> (AWS Security Blog)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-feds-to-fully-patch-actively-exploited-cisco-flaws/"><u>CISA warns feds to fully patch actively exploited Cisco flaws</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/popular-android-based-photo-frames-download-malware-on-boot/"><u>Popular Android-based photo frames download malware on boot</u></a> (Bleeping Computer)</p>
<p><a href="https://www.trendmicro.com/en_us/research/25/k/lumma-stealer-browser-fingerprinting.html"><u>Increase in Lumma Stealer Activity Coincides with Use of Adaptive Browser Fingerprinting Tactics</u></a> (Trend Micro)</p>
<p><a href="https://techcrunch.com/2025/11/12/elon-musks-x-botched-its-security-key-switchover-locking-users-out/"><u>Elon Musk's X botched its security key switchover, locking users out</u> </a>(TechCrunch)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1755</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d55c0504-1c7a-11f0-85e0-cbc9c3a661b8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8336672597.mp3?updated=1763060656" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Closing cracks before hackers do.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2432/notes</link>
      <description>Patch Tuesday. Google sues a “phishing-as-a-service” network linked to global SMS scams, and launches “private ai compute.” Hyundai notifies vehicle owners of a data breach.  Amazon launches a bug bounty program for its AI models. The Rhadamanthys infostealer operation has been disrupted. An initial access broker is set to plead guilty in U.S. federal court. Our guest is Bob Maley, CSO from Black Kite, discussing a new AI assessment framework. “Bitcoin Queen’s” $7.3 billion crypto laundering empire collapses.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Bob Maley, CSO from Black Kite, discussing a new AI assessment framework. You can hear Bob’s full conversation here. 

Selected Reading

Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday (Infosecurity Magazine)

Chipmaker Patch Tuesday: Over 60 Vulnerabilities Patched by Intel (SecurityWeek)

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Rockwell, Aveva, Schneider (SecurityWeek)

Adobe Patches 29 Vulnerabilities (SecurityWeek)

High-Severity Vulnerabilities Patched by Ivanti and Zoom (SecurityWeek)

Google launches a lawsuit targeting text message scammers (NPR)

Private AI Compute: our next step in building private and helpful AI (Google)

Hyundai confirms security breach after hackers access sensitive data (CBT News)

Amazon rolls out AI bug bounty program (CyberScoop)

Rhadamanthys infostealer disrupted as cybercriminals lose server access (Bleeping Computer)

Russian hacker admits helping Yanluowang ransomware infect companies (Bitdefender)

$7.3B crypto laundering: ‘Bitcoin Queen’ sentenced to 11 Years in UK (Security Affairs)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 12 Nov 2025 21:10:00 -0000</pubDate>
      <itunes:title>Closing cracks before hackers do.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2432</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Patch Tuesday. Google sues a “phishing-as-a-service” network linked to global SMS scams, and launches “private ai compute.” Hyundai notifies vehicle owners of a data breach.  Amazon launches a bug bounty program for its AI models. The Rhadamanthys infostealer operation has been disrupted. An initial access broker is set to plead guilty in U.S. federal court. Our guest is Bob Maley, CSO from Black Kite, discussing a new AI assessment framework. “Bitcoin Queen’s” $7.3 billion crypto laundering empire collapses.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Bob Maley, CSO from Black Kite, discussing a new AI assessment framework. You can hear Bob’s full conversation here. 

Selected Reading

Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday (Infosecurity Magazine)

Chipmaker Patch Tuesday: Over 60 Vulnerabilities Patched by Intel (SecurityWeek)

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Rockwell, Aveva, Schneider (SecurityWeek)

Adobe Patches 29 Vulnerabilities (SecurityWeek)

High-Severity Vulnerabilities Patched by Ivanti and Zoom (SecurityWeek)

Google launches a lawsuit targeting text message scammers (NPR)

Private AI Compute: our next step in building private and helpful AI (Google)

Hyundai confirms security breach after hackers access sensitive data (CBT News)

Amazon rolls out AI bug bounty program (CyberScoop)

Rhadamanthys infostealer disrupted as cybercriminals lose server access (Bleeping Computer)

Russian hacker admits helping Yanluowang ransomware infect companies (Bitdefender)

$7.3B crypto laundering: ‘Bitcoin Queen’ sentenced to 11 Years in UK (Security Affairs)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Patch Tuesday. Google sues a “phishing-as-a-service” network linked to global SMS scams, and launches “private ai compute.” Hyundai notifies vehicle owners of a data breach.  Amazon launches a bug bounty program for its AI models. The Rhadamanthys infostealer operation has been disrupted. An initial access broker is set to plead guilty in U.S. federal court. Our guest is Bob Maley, CSO from Black Kite, discussing a new AI assessment framework. “Bitcoin Queen’s” $7.3 billion crypto laundering empire collapses.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/strategicciso/"><u>Bob Maley</u></a>, CSO from <a href="https://www.linkedin.com/company/blackkite/"><u>Black Kite</u></a>, discussing a new AI assessment framework. You can hear Bob’s full conversation <a href="https://explore.thecyberwire.com/black-kite">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.infosecurity-magazine.com/news/microsoft-windows-kernel-zero-day/"><u>Microsoft Fixes Windows Kernel Zero Day in November Patch Tuesday</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.securityweek.com/chipmaker-patch-tuesday-over-60-vulnerabilities-patched-by-intel/"><u>Chipmaker Patch Tuesday: Over 60 Vulnerabilities Patched by Intel</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-siemens-rockwell-aveva-schneider/"><u>ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Rockwell, Aveva, Schneider</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/adobe-patches-29-vulnerabilities/"><u>Adobe Patches 29 Vulnerabilities</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/high-severity-vulnerabilities-patched-by-ivanti-and-zoom/"><u>High-Severity Vulnerabilities Patched by Ivanti and Zoom</u></a> (SecurityWeek)</p>
<p><a href="https://www.npr.org/2025/11/12/nx-s1-5604857/google-lawsuit-phishing-text-message-scammers"><u>Google launches a lawsuit targeting text message scammers</u></a> (NPR)</p>
<p><a href="https://blog.google/technology/ai/google-private-ai-compute/"><u>Private AI Compute: our next step in building private and helpful AI</u></a> (Google)</p>
<p><a href="https://www.cbtnews.com/hyundai-confirms-security-breach-after-hackers-access-sensitive-data/"><u>Hyundai confirms security breach after hackers access sensitive data</u></a> (CBT News)</p>
<p><a href="https://cyberscoop.com/amazon-bug-bounty-program-ai-nova/"><u>Amazon rolls out AI bug bounty program</u></a> (CyberScoop)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/rhadamanthys-infostealer-disrupted-as-cybercriminals-lose-server-access/"><u>Rhadamanthys infostealer disrupted as cybercriminals lose server access</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/russian-hacker-admits-helping-yanluowang-ransomware-infect-companies"><u>Russian hacker admits helping Yanluowang ransomware infect companies</u></a> (Bitdefender)</p>
<p><a href="https://securityaffairs.com/184521/cyber-crime/7-3b-crypto-laundering-bitcoin-queen-sentenced-to-11-years-in-uk.html"><u>$7.3B crypto laundering: ‘Bitcoin Queen’ sentenced to 11 Years in UK</u></a> (Security Affairs)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1865</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d53601ba-1c7a-11f0-85e0-cf18226a21e3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3275166862.mp3?updated=1762973750" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Transitioning from service to civilian life. [T-Minus Deep Space]</title>
      <link>https://space.n2k.com/podcasts/t-minus/ds80</link>
      <description>Lieutenant Rob Sarver and Alex Gendzier are the authors of Warrior to Civilian: The Field Manual for the Hero's Journey, the definitive guide to transition to civilian life for veterans and their spouses and families. The book aims to provide actionable advice to veterans looking for work, while coaching those in hiring positions to give veterans the fair shake they deserve after serving our country.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Be sure to follow T-Minus on LinkedIn and Instagram.

T-Minus Crew Survey
We want to hear from you! Please complete our 4 question survey. It’ll help us get better and deliver you the most mission-critical space intel every day.

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.

Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Nov 2025 07:00:00 -0000</pubDate>
      <itunes:title>Transitioning from service to civilian life. [T-Minus Deep Space]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>80</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bbfb5ad6-b9a2-11f0-b779-e742f9764d43/image/ad72ba49a386b651623190673146de68.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Rob Sarver and Alex Gendzier have authored ​a definitive guide to transition to civilian life for veterans and their spouses and families. </itunes:subtitle>
      <itunes:summary>Lieutenant Rob Sarver and Alex Gendzier are the authors of Warrior to Civilian: The Field Manual for the Hero's Journey, the definitive guide to transition to civilian life for veterans and their spouses and families. The book aims to provide actionable advice to veterans looking for work, while coaching those in hiring positions to give veterans the fair shake they deserve after serving our country.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Be sure to follow T-Minus on LinkedIn and Instagram.

T-Minus Crew Survey
We want to hear from you! Please complete our 4 question survey. It’ll help us get better and deliver you the most mission-critical space intel every day.

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.

Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Lieutenant Rob Sarver and Alex Gendzier are the authors of <a href="https://www.amazon.com/Warrior-Civilian-Field-Manual-Journey/dp/1538769964">Warrior to Civilian: The Field Manual for the Hero's Journey</a>, the definitive guide to transition to civilian life for veterans and their spouses and families. The book aims to provide actionable advice to veterans looking for work, while coaching those in hiring positions to give veterans the fair shake they deserve after serving our country.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Be sure to follow T-Minus on <a href="https://www.linkedin.com/company/n2k-space/">LinkedIn</a> and <a href="https://www.instagram.com/n2kspace/">Instagram</a>.</p><p><br></p><h2>T-Minus Crew Survey</h2><p>We want to hear from you! Please complete our <a href="https://www.surveymonkey.com/r/BL5NFPW">4 question survey</a>. It’ll help us get better and deliver you the most mission-critical space intel every day.</p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:space@n2k.com">space@n2k.com</a> to request more info.</p><p><br></p><h2>Want to join us for an interview?</h2><p>Please send your pitch to <a href="mailto:space-editor@n2k.com">space-editor@n2k.com</a> and include your name, affiliation, and topic proposal.</p><p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1805</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bbfb5ad6-b9a2-11f0-b779-e742f9764d43]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9191042559.mp3?updated=1736544421" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The changing face of fraud. [CISO Perspectives]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/116/notes</link>
      <description>Fraud has always been a consistent challenge. As the world has continued to become increasingly interconnected and as new technologies have become widely available, threat actors have continued to evolve their tactics. 

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Mel Lanning from the Better Business Bureau to discuss fraud and how it has been evolving in recent years. From exploiting cryptocurrencies to utilizing emerging technologies, Kim and Mel look into how threat actors are changing and refining tactics in the current threat landscape.

This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about ⁠Meter⁠.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Nov 2025 07:00:00 -0000</pubDate>
      <itunes:title>The changing face of fraud. [CISO Perspectives]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>116</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/78fd2e80-adea-11f0-818b-83f6387791db/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Fraud has always been a consistent challenge. As the world has continued to become increasingly interconnected and as new technologies have become widely available, threat actors have continued to evolve their tactics. 

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Mel Lanning from the Better Business Bureau to discuss fraud and how it has been evolving in recent years. From exploiting cryptocurrencies to utilizing emerging technologies, Kim and Mel look into how threat actors are changing and refining tactics in the current threat landscape.

This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about ⁠Meter⁠.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Fraud has always been a consistent challenge. As the world has continued to become increasingly interconnected and as new technologies have become widely available, threat actors have continued to evolve their tactics. </p>
<p>In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Mel Lanning from the Better Business Bureau to discuss fraud and how it has been evolving in recent years. From exploiting cryptocurrencies to utilizing emerging technologies, Kim and Mel look into how threat actors are changing and refining tactics in the current threat landscape.</p>
<p>This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about <a href="http://meter.com/cisop">⁠Meter⁠</a>.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion ⁠⁠<a href="https://thecyberwire.com/stories/82487a095a194f8ab0db5ea93df0027a/fraud-in-a-new-world">blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2211</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[78fd2e80-adea-11f0-818b-83f6387791db]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3212398019.mp3?updated=1762892579" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rebooting the government, one cyber law at a time.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2431/notes</link>
      <description>Ending the government shutdown revives an expired cybersecurity law. The DoD finalizes a new model for building U.S. military cyber forces. A North Korean APT exploits Google accounts for full device control. The EU dials back AI protections in response to pressure from Big Tech companies and the U.S. government. Researchers discover a critical vulnerability in the Monsta FTP web-based file management tool. The Landfall espionage campaign targets Samsung Galaxy devices in the Middle East. Five Eyes partners fret eroding cooperation on counterintelligence and counterterrorism. Israeli spyware maker NSO Group names the former U.S. ambassador to Israel as its new executive chairman. Monday Biz Roundup. Tim Starks from CyberScoop discusses uncertainty in the federal Cyber Corp program, The friendly face of digital villainy.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Tim Starks from CyberScoop discussing uncertainty in the federal Cyber Corp program.

Selected Reading

Cyber information sharing law would get extension under shutdown deal bill (CyberScoop)

Don't call it Cyber Command 2.0: Master plan for digital forces will take years to implement (The Record)

North Korean hackers hijack Google, KakaoTalk accounts to control South Korean phones: Report (The Straits Times)

EU set to water down landmark AI act after Big Tech pressure (The Financial Times)

Monsta FTP Vulnerability Exposed Thousands of Servers to Full Takeover (Hackread)

Newly identified Android spyware appears to be from a commercial vendor (The Record)

F.B.I. Director Is Said to Have Made a Pledge to Head of MI5, Then Broken It (The New York Times)

Seeking to get off US blacklist, spyware firm NSO taps ex-envoy Friedman as chairman (The Times of Israel)

Google's Wiz acquisition clears DOJ's antitrust review. (The Cyberwire)

Tank interview: A hacking kingpin reveals all to the BBC (BBC News)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 10 Nov 2025 21:10:00 -0000</pubDate>
      <itunes:title>Rebooting the government, one cyber law at a time.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2431</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Ending the government shutdown revives an expired cybersecurity law. The DoD finalizes a new model for building U.S. military cyber forces. A North Korean APT exploits Google accounts for full device control. The EU dials back AI protections in response to pressure from Big Tech companies and the U.S. government. Researchers discover a critical vulnerability in the Monsta FTP web-based file management tool. The Landfall espionage campaign targets Samsung Galaxy devices in the Middle East. Five Eyes partners fret eroding cooperation on counterintelligence and counterterrorism. Israeli spyware maker NSO Group names the former U.S. ambassador to Israel as its new executive chairman. Monday Biz Roundup. Tim Starks from CyberScoop discusses uncertainty in the federal Cyber Corp program, The friendly face of digital villainy.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Tim Starks from CyberScoop discussing uncertainty in the federal Cyber Corp program.

Selected Reading

Cyber information sharing law would get extension under shutdown deal bill (CyberScoop)

Don't call it Cyber Command 2.0: Master plan for digital forces will take years to implement (The Record)

North Korean hackers hijack Google, KakaoTalk accounts to control South Korean phones: Report (The Straits Times)

EU set to water down landmark AI act after Big Tech pressure (The Financial Times)

Monsta FTP Vulnerability Exposed Thousands of Servers to Full Takeover (Hackread)

Newly identified Android spyware appears to be from a commercial vendor (The Record)

F.B.I. Director Is Said to Have Made a Pledge to Head of MI5, Then Broken It (The New York Times)

Seeking to get off US blacklist, spyware firm NSO taps ex-envoy Friedman as chairman (The Times of Israel)

Google's Wiz acquisition clears DOJ's antitrust review. (The Cyberwire)

Tank interview: A hacking kingpin reveals all to the BBC (BBC News)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ending the government shutdown revives an expired cybersecurity law. The DoD finalizes a new model for building U.S. military cyber forces. A North Korean APT exploits Google accounts for full device control. The EU dials back AI protections in response to pressure from Big Tech companies and the U.S. government. Researchers discover a critical vulnerability in the Monsta FTP web-based file management tool. The Landfall espionage campaign targets Samsung Galaxy devices in the Middle East. Five Eyes partners fret eroding cooperation on counterintelligence and counterterrorism. Israeli spyware maker NSO Group names the former U.S. ambassador to Israel as its new executive chairman. Monday Biz Roundup. Tim Starks from CyberScoop discusses uncertainty in the federal Cyber Corp program, The friendly face of digital villainy.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/tstarks/"><u>Tim Starks</u></a> from <a href="https://www.linkedin.com/company/cyberscoop/"><u>CyberScoop</u></a> discussing uncertainty in the federal Cyber Corp program.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://cyberscoop.com/cisa-2015-shutdown-extension-continuing-resolution/"><u>Cyber information sharing law would get extension under shutdown deal bill</u></a> (CyberScoop)</p>
<p><a href="https://therecord.media/revised-cyber-command-master-plan-dod-pentagon"><u>Don't call it Cyber Command 2.0: Master plan for digital forces will take years to implement</u></a> (The Record)</p>
<p><a href="https://www.straitstimes.com/asia/east-asia/north-korean-hackers-hijack-google-kakaotalk-accounts-to-control-south-korean-phones-report"><u>North Korean hackers hijack Google, KakaoTalk accounts to control South Korean phones: Report </u></a>(The Straits Times)</p>
<p><a href="https://www.ft.com/content/af6c6dbe-ce63-47cc-8923-8bce4007f6e1"><u>EU set to water down landmark AI act after Big Tech pressure</u></a> (The Financial Times)</p>
<p><a href="https://hackread.com/monsta-ftp-flaw-web-servers-open-server-takeover/"><u>Monsta FTP Vulnerability Exposed Thousands of Servers to Full Takeover </u></a>(Hackread)</p>
<p><a href="https://therecord.media/landfall-spyware-middle-east-appears-commercial-grade"><u>Newly identified Android spyware appears to be from a commercial vendor</u></a> (The Record)</p>
<p><a href="https://www.nytimes.com/2025/11/10/world/europe/kash-patel-fbi-mi5.html?unlocked_article_code=1.0E8.vVH0.V0f5m27V4XK7"><u>F.B.I. Director Is Said to Have Made a Pledge to Head of MI5, Then Broken It </u></a>(The New York Times)</p>
<p><a href="https://www.timesofisrael.com/seeking-to-get-off-us-blacklist-spyware-firm-nso-taps-ex-envoy-friedman-as-chairman/"><u>Seeking to get off US blacklist, spyware firm NSO taps ex-envoy Friedman as chairman </u></a>(The Times of Israel)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/7/44"><u>Google's Wiz acquisition clears DOJ's antitrust review.</u></a> (The Cyberwire)</p>
<p><a href="https://www.bbc.co.uk/news/articles/cm2w0pvg4wko"><u>Tank interview: A hacking kingpin reveals all to the BBC</u></a> (BBC News)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1794</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d4eb4a3a-1c7a-11f0-85e0-13582a653ccf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2223709563.mp3?updated=1762803956" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Michael DeBolt: From acting to cyber. [Intelligence] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/94/notes</link>
      <description>Please enjoy this encore of Career Notes.

Chief intelligence officer at Intel 471, Michael shares his story where he started as an actor and quickly changed over to intelligence and what the transition was like for him. Michael grew up wanting to be an actor and even was able to land some acting jobs, after going into the Marine Corps he decided to leave acting behind and start a new path in his journey. He says looking for a purpose really helped to shape him, saying "looking back on it, I feel like my life purpose has really been all about kind of this relentless pursuit of justice" and how the risks in his life has helped to right the wrongs of the world. We thank Michael for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 09 Nov 2025 08:00:00 -0000</pubDate>
      <itunes:title>Michael DeBolt: From acting to cyber. [Intelligence] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>94</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/90d6c032-bc0b-11f0-9e0c-677ce302ae17/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes.

Chief intelligence officer at Intel 471, Michael shares his story where he started as an actor and quickly changed over to intelligence and what the transition was like for him. Michael grew up wanting to be an actor and even was able to land some acting jobs, after going into the Marine Corps he decided to leave acting behind and start a new path in his journey. He says looking for a purpose really helped to shape him, saying "looking back on it, I feel like my life purpose has really been all about kind of this relentless pursuit of justice" and how the risks in his life has helped to right the wrongs of the world. We thank Michael for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes.</p>
<p>Chief intelligence officer at Intel 471, Michael shares his story where he started as an actor and quickly changed over to intelligence and what the transition was like for him. Michael grew up wanting to be an actor and even was able to land some acting jobs, after going into the Marine Corps he decided to leave acting behind and start a new path in his journey. He says looking for a purpose really helped to shape him, saying "looking back on it, I feel like my life purpose has really been all about kind of this relentless pursuit of justice" and how the risks in his life has helped to right the wrongs of the world. We thank Michael for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>458</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[90d6c032-bc0b-11f0-9e0c-677ce302ae17]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8858488463.mp3?updated=1735936619" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A fine pearl gone rusty. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/401/notes</link>
      <description>Tal Peleg, Senior Product Manager, and Coby Abrams, Cyber Security Researcher of Varonis, discussing their work and findings on Rusty Pearl - Remote Code Execution in Postgres Instances. The flaw could allow attackers to execute arbitrary commands on a database server’s operating system, leading to potential data theft, destruction, or lateral movement across networks.

While the vulnerability existed in PostgreSQL, Amazon RDS and Aurora were not affected, thanks to built-in protections like SELinux and AWS’s automated threat detection. Still, the research underscores the importance of patching and configuration hygiene in managed database environments.

The research can be found here:


  
⁠⁠⁠⁠Rusty Pearl: Remote Code Execution in Postgres Instances



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Nov 2025 08:00:00 -0000</pubDate>
      <itunes:title>A fine pearl gone rusty. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>401</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/476dd7b4-bbf7-11f0-87e4-872937280064/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Tal Peleg, Senior Product Manager, and Coby Abrams, Cyber Security Researcher of Varonis, discussing their work and findings on Rusty Pearl - Remote Code Execution in Postgres Instances. The flaw could allow attackers to execute arbitrary commands on a database server’s operating system, leading to potential data theft, destruction, or lateral movement across networks.

While the vulnerability existed in PostgreSQL, Amazon RDS and Aurora were not affected, thanks to built-in protections like SELinux and AWS’s automated threat detection. Still, the research underscores the importance of patching and configuration hygiene in managed database environments.

The research can be found here:


  
⁠⁠⁠⁠Rusty Pearl: Remote Code Execution in Postgres Instances



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/tal-peleg-a337a6ab/">Tal Peleg</a>, Senior Product Manager, and <a href="https://www.linkedin.com/in/coby-abrams-23897a290/">Coby Abrams</a>, Cyber Security Researcher of <a href="https://www.linkedin.com/company/varonis/">Varonis</a>, discussing their work and findings on Rusty Pearl - Remote Code Execution in Postgres Instances. The flaw could allow attackers to execute arbitrary commands on a database server’s operating system, leading to potential data theft, destruction, or lateral movement across networks.</p>
<p>While the vulnerability existed in PostgreSQL, Amazon RDS and Aurora were not affected, thanks to built-in protections like SELinux and AWS’s automated threat detection. Still, the research underscores the importance of patching and configuration hygiene in managed database environments.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://claroty.com/team82/research/turning-camera-surveillance-on-its-axis">⁠⁠⁠</a><a href="https://arxiv.org/pdf/2508.06394">⁠</a><a href="https://www.varonis.com/blog/rusty-pearl">Rusty Pearl: Remote Code Execution in Postgres Instances</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1439</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[476dd7b4-bbf7-11f0-87e4-872937280064]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1446750611.mp3?updated=1762533388" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Legislating in the shadow of hackers.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2430/notes</link>
      <description>The CBO was hacked by a suspected foreign actor. Experts worry Trump’s budget cuts weaken U.S. cyber defenses. Regulation shapes expectations. ClickFix evolves on macOS. Notorious cybercrime groups form a new “federated alliance.” Congressional leaders look to counter China’s influence in 6G networks. An EdTech firm pays $5.1 million to settle data breach claims. Nevada did not pay the ransom. Our guest is CEO and Co-Founder Ben Nunez from Evercoast, winner of the 8th Annual DataTribe Challenge. The FBI tries to uncover the archivist.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Evercoast, winner of the 8th Annual DataTribe Challenge, is redefining Training Data for Embodied AI with enriched 4D spatial data from real-world environments to better train robots. CEO and Co-Founder Ben Nunez joins Dave Bittner to discuss their win and what’s next for the company.

Selected Reading

Congressional Budget Office believed to be hacked by foreign actor (The Washington Post)

Trump budget cuts, agency gutting, leave Americans and economy at greater risk of being hacked, experts warn (CNBC)

The quiet revolution: How regulation is forcing cybersecurity accountability (CyberScoop)

ClickFix Attacks Against macOS Users Evolving (SecurityWeek)

“I Paid Twice” Phishing Campaign Targets Booking.com (Infosecurity Magazine)

Scattered Spider, LAPSUS$, and ShinyHunters form extortion alliance (SC Media)

Congressional leaders want an executive branch strategy on China 6G, tech supply chain (CyberScoop)

Ed tech company fined $5.1 million for poor data security practices leading to hack (The Record)

Nevada government declined to pay ransom, says cyberattack traced to breach in May (The Record)

FBI Tries to Unmask Owner of Infamous Archive.is Site (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 07 Nov 2025 21:10:00 -0000</pubDate>
      <itunes:title>Legislating in the shadow of hackers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2430</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The CBO was hacked by a suspected foreign actor. Experts worry Trump’s budget cuts weaken U.S. cyber defenses. Regulation shapes expectations. ClickFix evolves on macOS. Notorious cybercrime groups form a new “federated alliance.” Congressional leaders look to counter China’s influence in 6G networks. An EdTech firm pays $5.1 million to settle data breach claims. Nevada did not pay the ransom. Our guest is CEO and Co-Founder Ben Nunez from Evercoast, winner of the 8th Annual DataTribe Challenge. The FBI tries to uncover the archivist.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Evercoast, winner of the 8th Annual DataTribe Challenge, is redefining Training Data for Embodied AI with enriched 4D spatial data from real-world environments to better train robots. CEO and Co-Founder Ben Nunez joins Dave Bittner to discuss their win and what’s next for the company.

Selected Reading

Congressional Budget Office believed to be hacked by foreign actor (The Washington Post)

Trump budget cuts, agency gutting, leave Americans and economy at greater risk of being hacked, experts warn (CNBC)

The quiet revolution: How regulation is forcing cybersecurity accountability (CyberScoop)

ClickFix Attacks Against macOS Users Evolving (SecurityWeek)

“I Paid Twice” Phishing Campaign Targets Booking.com (Infosecurity Magazine)

Scattered Spider, LAPSUS$, and ShinyHunters form extortion alliance (SC Media)

Congressional leaders want an executive branch strategy on China 6G, tech supply chain (CyberScoop)

Ed tech company fined $5.1 million for poor data security practices leading to hack (The Record)

Nevada government declined to pay ransom, says cyberattack traced to breach in May (The Record)

FBI Tries to Unmask Owner of Infamous Archive.is Site (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The CBO was hacked by a suspected foreign actor. Experts worry Trump’s budget cuts weaken U.S. cyber defenses. Regulation shapes expectations. ClickFix evolves on macOS. Notorious cybercrime groups form a new “federated alliance.” Congressional leaders look to counter China’s influence in 6G networks. An EdTech firm pays $5.1 million to settle data breach claims. Nevada did not pay the ransom. Our guest is CEO and Co-Founder Ben Nunez from Evercoast, winner of the 8th Annual DataTribe Challenge. The FBI tries to uncover the archivist.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p><a href="https://www.linkedin.com/company/evercoast/"><u>Evercoast</u></a>, winner of the 8th Annual <a href="https://www.linkedin.com/posts/datatribe-_announcing-the-winner-of-the-datatribe-challenge-activity-7391842636581576704-fZpl/?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAAA0gzsB7GROVStep2n6s-rXOL_qXvUEPIA"><u>DataTribe Challenge</u></a>, is redefining Training Data for Embodied AI with enriched 4D spatial data from real-world environments to better train robots. CEO and Co-Founder <a href="https://www.linkedin.com/in/nunez/"><u>Ben Nunez</u></a> joins Dave Bittner to discuss their win and what’s next for the company.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.washingtonpost.com/business/2025/11/06/cbo-hack-congress-foreign"><u>Congressional Budget Office believed to be hacked by foreign actor</u></a> (The Washington Post)</p>
<p><a href="https://www.cnbc.com/2025/11/07/trump-government-budget-cuts-cybersecurity-hacking-risks.html"><u>Trump budget cuts, agency gutting, leave Americans and economy at greater risk of being hacked, experts warn</u></a> (CNBC)</p>
<p><a href="https://cyberscoop.com/how-cybersecurity-regulation-is-driving-accountability/"><u>The quiet revolution: How regulation is forcing cybersecurity accountability</u></a> (CyberScoop)</p>
<p><a href="https://www.securityweek.com/clickfix-attacks-against-macos-users-evolving/"><u>ClickFix Attacks Against macOS Users Evolving</u></a> (SecurityWeek)</p>
<p><a href="https://www.infosecurity-magazine.com/news/i-paid-twice-phishing-campaign/"><u>“I Paid Twice” Phishing Campaign Targets </u></a><a href="http://booking.com"><u>Booking.com</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.scworld.com/news/scattered-spider-lapsus-and-shinyhunters-form-extortion-alliance"><u>Scattered Spider, LAPSUS$, and ShinyHunters form extortion alliance</u></a> (SC Media)</p>
<p><a href="https://cyberscoop.com/exclusive-china-6g-letter-krishnamoorthi-congress-state-commerce-letters/"><u>Congressional leaders want an executive branch strategy on China 6G, tech supply chain</u></a> (CyberScoop)</p>
<p><a href="https://therecord.media/ed-tech-company-fined-5-million-data-breach-security-practices"><u>Ed tech company fined $5.1 million for poor data security practices leading to hack</u></a> (The Record)</p>
<p><a href="https://therecord.media/nevada-declined-ransom-breach"><u>Nevada government declined to pay ransom, says cyberattack traced to breach in May</u></a> (The Record)</p>
<p><a href="https://www.404media.co/fbi-tries-to-unmask-owner-of-infamous-archive-is-site/"><u>FBI Tries to Unmask Owner of Infamous Archive.is Site</u></a> (404 Media)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1287</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d4c5a438-1c7a-11f0-85e0-2f1e1a38b3e9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1486154500.mp3?updated=1762541414" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The role of AI in Zero Trust. [CyberWire-X]</title>
      <link>https://thecyberwire.com/podcasts/cyberwire-x/53/notes</link>
      <description>Zero Trust has been top of mind for years, but how is AI changing what that actually looks like in practice? In this episode of CyberWire-X, Dave Bittner is joined by Deepen Desai, Chief Security Officer at Zscaler, to discuss the transformative impact of AI on Zero Trust security frameworks. 

The discussion outlines how AI enhances threat prevention, automates data discovery, and improves user experience while addressing the practical financial implications of adopting AI in security. Hear how organizations must embrace AI to stay competitive and secure against evolving threats.

For additional resources on Zero Trust + AI, visit Zscaler's Replace Legacy Systems for Better Security.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 06 Nov 2025 21:45:00 -0000</pubDate>
      <itunes:title>The role of AI in Zero Trust. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>53</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Zero Trust has been top of mind for years, but how is AI changing what that actually looks like in practice? In this episode of CyberWire-X, Dave Bittner is joined by Deepen Desai, Chief Security Officer at Zscaler, to discuss the transformative impact of AI on Zero Trust security frameworks. 

The discussion outlines how AI enhances threat prevention, automates data discovery, and improves user experience while addressing the practical financial implications of adopting AI in security. Hear how organizations must embrace AI to stay competitive and secure against evolving threats.

For additional resources on Zero Trust + AI, visit Zscaler's Replace Legacy Systems for Better Security.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Zero Trust has been top of mind for years, but how is AI changing what that actually looks like in practice? In this episode of CyberWire-X, Dave Bittner is joined by <a href="https://www.linkedin.com/in/deepen-desai-48487b2/">Deepen Desai</a>, Chief Security Officer at <a href="https://www.zscaler.com/">Zscaler</a>, to discuss the transformative impact of AI on Zero Trust security frameworks. </p>
<p>The discussion outlines how AI enhances threat prevention, automates data discovery, and improves user experience while addressing the practical financial implications of adopting AI in security. Hear how organizations must embrace AI to stay competitive and secure against evolving threats.</p>
<p>For additional resources on Zero Trust + AI, visit Zscaler's <a href="https://www.zscaler.com/security">Replace Legacy Systems for Better Security.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1405</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6e691ea8-bb59-11f0-ae2c-f317a2ef64c3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4632601377.mp3?updated=1762455834" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stomping out critical bugs. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2429/notes</link>
      <description>Cisco patches critical vulnerabilities in its Unified Contact Center Express (UCCX) software. CISA lays off 54 employees despite a federal court order halting workforce reductions. Gootloader malware returns. A South Korean telecom is accused of concealing a major malware breach. Russia’s Sandworm launches multiple wiper attacks against Ukraine. China hands out death sentences to scam compound kingpins. My guest is Dr. Sasha O'Connell, Senior Director for Cybersecurity Programs at Aspen Digital. Meta’s moral compass points to profit.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

Dr. Sasha O'Connell, Senior Director for Cybersecurity Programs at Aspen Digital, joins us to preview her Caveat podcast interview about "10 Years of Cybersecurity Progress &amp; What Comes Next." Listen to Sasha and Dave’s full conversation on this week’s Caveat episode. 



Selected Reading

Critical Cisco UCCX flaw lets attackers run commands as root (Bleeping Computer)

CISA plans to fire 54 employees despite court injunction (Metacurity)

CISA reports active exploitation of critical vulnerability in CentOS Web Panel (Beyond Machines)

Gootloader malware is back with new tricks after 7-month break (Bleeping Computer)

KT accused of concealing major malware infection, faces probe over customer data breach (The Korea Times)

Sandworm hackers use data wipers to disrupt Ukraine's grain sector (Bleeping Computer)

⁠China sentences 5 Myanmar scam kingpins to death ⁠(The Record)

⁠“Hackers” rig elections to IAN executive committee⁠ (Mumbai News)

Meta is earning a fortune on a deluge of fraudulent ads, documents show (Reuters)



Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 06 Nov 2025 20:50:00 -0000</pubDate>
      <itunes:title>Stomping out critical bugs. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2429</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Cisco patches critical vulnerabilities in its Unified Contact Center Express (UCCX) software. CISA lays off 54 employees despite a federal court order halting workforce reductions. Gootloader malware returns. A South Korean telecom is accused of concealing a major malware breach. Russia’s Sandworm launches multiple wiper attacks against Ukraine. China hands out death sentences to scam compound kingpins. My guest is Dr. Sasha O'Connell, Senior Director for Cybersecurity Programs at Aspen Digital. Meta’s moral compass points to profit.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

Dr. Sasha O'Connell, Senior Director for Cybersecurity Programs at Aspen Digital, joins us to preview her Caveat podcast interview about "10 Years of Cybersecurity Progress &amp; What Comes Next." Listen to Sasha and Dave’s full conversation on this week’s Caveat episode. 



Selected Reading

Critical Cisco UCCX flaw lets attackers run commands as root (Bleeping Computer)

CISA plans to fire 54 employees despite court injunction (Metacurity)

CISA reports active exploitation of critical vulnerability in CentOS Web Panel (Beyond Machines)

Gootloader malware is back with new tricks after 7-month break (Bleeping Computer)

KT accused of concealing major malware infection, faces probe over customer data breach (The Korea Times)

Sandworm hackers use data wipers to disrupt Ukraine's grain sector (Bleeping Computer)

⁠China sentences 5 Myanmar scam kingpins to death ⁠(The Record)

⁠“Hackers” rig elections to IAN executive committee⁠ (Mumbai News)

Meta is earning a fortune on a deluge of fraudulent ads, documents show (Reuters)



Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  



Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cisco patches critical vulnerabilities in its Unified Contact Center Express (UCCX) software. CISA lays off 54 employees despite a federal court order halting workforce reductions. Gootloader malware returns. A South Korean telecom is accused of concealing a major malware breach. Russia’s Sandworm launches multiple wiper attacks against Ukraine. China hands out death sentences to scam compound kingpins. My guest is Dr. Sasha O'Connell, Senior Director for Cybersecurity Programs at Aspen Digital. Meta’s moral compass points to profit.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br></p>
<p><strong>CyberWire Guest</strong></p>
<p><a href="https://www.linkedin.com/in/sashaoconnell/"><u>Dr. Sasha O'Connell</u></a>, Senior Director for Cybersecurity Programs at <a href="https://www.aspeninstitute.org/"><u>Aspen Digital</u></a>, joins us to preview her <a href="https://thecyberwire.com/podcasts/caveat"><u>Caveat podcast</u></a> interview about "10 Years of Cybersecurity Progress &amp; What Comes Next." Listen to Sasha and Dave’s full conversation on this week’s <a href="https://thecyberwire.com/podcasts/caveat/285/notes"><u>Caveat episode</u></a>. </p>
<p><br></p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/critical-cisco-uccx-flaw-lets-hackers-run-commands-as-root/"><u>Critical Cisco UCCX flaw lets attackers run commands as root</u></a> (Bleeping Computer)</p>
<p><a href="https://www.metacurity.com/cisa-plans-to-fire-54-employees-despite-court-injunction/"><u>CISA plans to fire 54 employees despite court injunction</u></a> (Metacurity)</p>
<p><a href="https://beyondmachines.net/event_details/cisa-reports-active-exploitation-of-critical-vulnerability-in-centos-web-panel-j-k-x-r-d/gD2P6Ple2L"><u>CISA reports active exploitation of critical vulnerability in CentOS Web Panel</u></a> (Beyond Machines)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/gootloader-malware-is-back-with-new-tricks-after-7-month-break/"><u>Gootloader malware is back with new tricks after 7-month break</u></a> (Bleeping Computer)</p>
<p><a href="https://www.koreatimes.co.kr/business/companies/20251106/kt-accused-of-concealing-major-malware-infection-faces-probe-over-customer-data-breach"><u>KT accused of concealing major malware infection, faces probe over customer data breach</u></a> (The Korea Times)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/sandworm-hackers-use-data-wipers-to-disrupt-ukraines-grain-sector/"><u>Sandworm hackers use data wipers to disrupt Ukraine's grain sector</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/china-sentences-5-myanmar-scam-kingpins-to-death">⁠<u>China sentences 5 Myanmar scam kingpins to death</u> ⁠</a>(The Record)</p>
<p><a href="https://www.hindustantimes.com/cities/mumbai-news/hackers-rig-elections-to-ian-executive-committee-101762368778011.html#google_vignette">⁠<u>“Hackers” rig elections to IAN executive committee</u>⁠</a> (Mumbai News)</p>
<p><a href="https://www.reuters.com/investigations/meta-is-earning-fortune-deluge-fraudulent-ads-documents-show-2025-11-06/"><u>Meta is earning a fortune on a deluge of fraudulent ads, documents show</u></a> (Reuters)</p>
<p><br></p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  </p>
<p><br></p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1387</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d4a04508-1c7a-11f0-85e0-6b38c90096ac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5806412748.mp3?updated=1762450969" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From small charges to big busts.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2428/notes</link>
      <description>Operation “Chargeback” takes down global fraud networks. An investigation reveals the dangers of ADINT. M&amp;S profits plunge after a cyberattack. Google patches a critical Android flaw. Asian prosecutors seize millions from an accused Cambodian scam kingpin. Ohio residents are still guessing water bills months after a cyberattack. Houston firefighters deny blame in city data breach. Nikkei reports a slack breach exposing 17,000 records.The Google–Wiz deal clears DOJ review. Ann Johnson welcomes her Microsoft colleague Frank X. Shaw⁠ to Afternoon Cyber Tea. Norway parks its Chinese Bus in a cave, just in case. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Afternoon Cyber Tea

On this month's segment from Afternoon Cyber Tea, host Ann Johnson welcomes Frank X. Shaw⁠, Chief Communications Officer at Microsoft, to explore the critical role of communication in cybersecurity. They discuss how transparency and trust shape effective response to cyber incidents, the importance of breaking down silos across teams, and how AI is transforming communication strategies. You can listen to Ann and Frank's full conversation here, and catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app. 

Selected Reading

Operation Chargeback: 4.3 million cardholders affected, EUR 300 million in damages - Three criminal networks suspected of misusing credit card data from cardholders across 193 countries; 18 suspects arrested (Europol)

Databroker Files: Targeting the EU (Netzpolitik)

M&amp;S profits almost wiped out after cyber hack left shelves empty (BBC News)

Google releases November 2025 Android patch, fixes critical zero-click flaw (Beyond Machines)

Prosecutors seize yachts, luxury cars from man accused of running Cambodia cyberscams (NPR)

Cyberattack that crippled Middletown's systems shows how hackers target smaller cities (Cincinnati.com)

Houston data breach exposes firefighters’ personal info, union says they’re being blamed (Click2Houston)

Japanese publishing company Nikkei suffers Slack compromise exposing data of over 17,000 people (Beyond Machines)

Google Clears DOJ Antitrust Hurdle for $32 Billion Wiz Deal (Bloomberg)

Dybt i et norsk fjeld blev en kinesisk bybus splittet ad. En status på vores frygt (Zetland)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 05 Nov 2025 21:10:00 -0000</pubDate>
      <itunes:title>From small charges to big busts.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2428</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Operation “Chargeback” takes down global fraud networks. An investigation reveals the dangers of ADINT. M&amp;S profits plunge after a cyberattack. Google patches a critical Android flaw. Asian prosecutors seize millions from an accused Cambodian scam kingpin. Ohio residents are still guessing water bills months after a cyberattack. Houston firefighters deny blame in city data breach. Nikkei reports a slack breach exposing 17,000 records.The Google–Wiz deal clears DOJ review. Ann Johnson welcomes her Microsoft colleague Frank X. Shaw⁠ to Afternoon Cyber Tea. Norway parks its Chinese Bus in a cave, just in case. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Afternoon Cyber Tea

On this month's segment from Afternoon Cyber Tea, host Ann Johnson welcomes Frank X. Shaw⁠, Chief Communications Officer at Microsoft, to explore the critical role of communication in cybersecurity. They discuss how transparency and trust shape effective response to cyber incidents, the importance of breaking down silos across teams, and how AI is transforming communication strategies. You can listen to Ann and Frank's full conversation here, and catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app. 

Selected Reading

Operation Chargeback: 4.3 million cardholders affected, EUR 300 million in damages - Three criminal networks suspected of misusing credit card data from cardholders across 193 countries; 18 suspects arrested (Europol)

Databroker Files: Targeting the EU (Netzpolitik)

M&amp;S profits almost wiped out after cyber hack left shelves empty (BBC News)

Google releases November 2025 Android patch, fixes critical zero-click flaw (Beyond Machines)

Prosecutors seize yachts, luxury cars from man accused of running Cambodia cyberscams (NPR)

Cyberattack that crippled Middletown's systems shows how hackers target smaller cities (Cincinnati.com)

Houston data breach exposes firefighters’ personal info, union says they’re being blamed (Click2Houston)

Japanese publishing company Nikkei suffers Slack compromise exposing data of over 17,000 people (Beyond Machines)

Google Clears DOJ Antitrust Hurdle for $32 Billion Wiz Deal (Bloomberg)

Dybt i et norsk fjeld blev en kinesisk bybus splittet ad. En status på vores frygt (Zetland)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Operation “Chargeback” takes down global fraud networks. An investigation reveals the dangers of ADINT. M&amp;S profits plunge after a cyberattack. Google patches a critical Android flaw. Asian prosecutors seize millions from an accused Cambodian scam kingpin. Ohio residents are still guessing water bills months after a cyberattack. Houston firefighters deny blame in city data breach. Nikkei reports a slack breach exposing 17,000 records.The Google–Wiz deal clears DOJ review. Ann Johnson welcomes her Microsoft colleague Frank X. Shaw⁠ to Afternoon Cyber Tea. Norway parks its Chinese Bus in a cave, just in case. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Afternoon Cyber Tea</strong></p>
<p>On this month's segment from Afternoon Cyber Tea, host<a href="https://www.linkedin.com/in/ann-johnsons/"><u> Ann Johnson</u></a> welcomes<a href="https://www.linkedin.com/in/fxshaw/"><u> Frank X. Shaw⁠</u></a>, Chief Communications Officer at Microsoft, to explore the critical role of communication in cybersecurity. They discuss how transparency and trust shape effective response to cyber incidents, the importance of breaking down silos across teams, and how AI is transforming communication strategies. You can listen to Ann and Frank's full conversation<a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea/116/notes"><u> here</u></a>, and catch new episodes of<a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea"><u> Afternoon Cyber Tea</u></a> every other Tuesday on your favorite podcast app. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.europol.europa.eu/media-press/newsroom/news/operation-chargeback-43-million-cardholders-affected-eur-300-million-in-damages"><u>Operation Chargeback: 4.3 million cardholders affected, EUR 300 million in damages - Three criminal networks suspected of misusing credit card data from cardholders across 193 countries; 18 suspects arrested</u></a> (Europol)</p>
<p><a href="https://netzpolitik.org/2025/databroker-files-targeting-the-eu/"><u>Databroker Files: Targeting the EU</u></a> (Netzpolitik)</p>
<p><a href="https://www.bbc.co.uk/news/articles/c93x16zkl9do"><u>M&amp;S profits almost wiped out after cyber hack left shelves empty</u></a> (BBC News)</p>
<p><a href="https://beyondmachines.net/event_details/google-releases-november-android-patch-fixes-critical-zero-click-flaw-1-q-0-r-g/gD2P6Ple2L"><u>Google releases November 2025 Android patch, fixes critical zero-click flaw</u></a> (Beyond Machines)</p>
<p><a href="https://www.npr.org/2025/11/05/nx-s1-5599032/prosecutors-seize-yachts-luxury-cars-from-man-accused-of-running-cambodia-cyberscams"><u>Prosecutors seize yachts, luxury cars from man accused of running Cambodia cyberscams</u></a> (NPR)</p>
<p><a href="https://www.cincinnati.com/story/news/2025/11/04/cyberattack-has-crippled-middletown-systems-for-months-what-happened/86585161007/"><u>Cyberattack that crippled Middletown's systems shows how hackers target smaller cities</u></a> (Cincinnati.com)</p>
<p><a href="https://www.click2houston.com/news/local/2025/11/05/houston-data-breach-exposes-firefighters-personal-info-union-says-theyre-being-blamed/"><u>Houston data breach exposes firefighters’ personal info, union says they’re being blamed</u></a> (Click2Houston)</p>
<p><a href="https://beyondmachines.net/event_details/japanese-publishing-company-nikkei-suffers-slack-compromise-exposing-data-of-over-17000-people-2-n-f-o-6/gD2P6Ple2L"><u>Japanese publishing company Nikkei suffers Slack compromise exposing data of over 17,000 people</u></a> (Beyond Machines)</p>
<p><a href="https://www.bloomberg.com/news/articles/2025-11-05/google-clears-doj-antitrust-hurdle-for-32-billion-wiz-deal"><u>Google Clears DOJ Antitrust Hurdle for $32 Billion Wiz Deal</u></a> (Bloomberg)</p>
<p><a href="https://www.zetland.dk/historie/svNwC3c5-aOPVxA4K-224e5"><u>Dybt i et norsk fjeld blev en kinesisk bybus splittet ad. En status på vores frygt</u></a> (Zetland)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1368</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d47afdd4-1c7a-11f0-85e0-e7ea7df81feb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3854201720.mp3?updated=1762367505" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A storm brews behind the firewall.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2427/notes</link>
      <description>China-Linked hackers target Cisco firewalls. MIT Sloan withdraws controversial “AI-Driven Ransomware” paper. A new study questions the value of cybersecurity training. Hackers exploit OpenAI’s API as a malware command channel. Apple patches over 100 Security flaws across devices. A Florida-based operator of mental health and addiction treatment centers exposes sensitive patient information. OPM plans a “mass deferment” for Cybercorps scholars affected by the government shutdown. Lawmakers urge the FTC to investigate Flock Safety’s cybersecurity gaps. Cybercriminals team with organized crime for high-tech cargo thefts. Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies discussing ICE’s controversial facial scanning initiative. A priceless theft meets a worthless password. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

We are joined by Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies discussing ICE’s controversial facial scanning initiative. You can read more about Ben’s topic from 404 Media: You Can't Refuse To Be Scanned by ICE's Facial Recognition App, DHS Document Says.

Selected Reading

China-Linked Hackers Target Cisco Firewalls in Global Campaign (Hackread)

MIT Sloan shelves paper about AI-driven ransomware (The Register)

CyberSlop — meet the new threat actor, MIT and Safe Security (DoublePulsar)

Study concludes cybersecurity training doesn’t work (KPBS Public Media)

Microsoft: OpenAI API moonlights as malware HQ (The Register)

Apple Patches 19 WebKit Vulnerabilities (SecurityWeek)

Data Theft Hits Behavioral Health Network in 3 States (Bank Infosecurity)

OPM plans to give CyberCorps members more time to find jobs after shutdown ends (CyberScoop)

Lawmakers ask FTC to probe Flock Safety’s cybersecurity practices (The Record)

Cybercriminals, OCGs team up on lucrative cargo thefts (The Register)

Louvre Robbery: Security Flaws: The (Obviously) Password Was "Louvre" (L’Unione Sarda)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Nov 2025 21:10:00 -0000</pubDate>
      <itunes:title>A storm brews behind the firewall.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2427</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>China-Linked hackers target Cisco firewalls. MIT Sloan withdraws controversial “AI-Driven Ransomware” paper. A new study questions the value of cybersecurity training. Hackers exploit OpenAI’s API as a malware command channel. Apple patches over 100 Security flaws across devices. A Florida-based operator of mental health and addiction treatment centers exposes sensitive patient information. OPM plans a “mass deferment” for Cybercorps scholars affected by the government shutdown. Lawmakers urge the FTC to investigate Flock Safety’s cybersecurity gaps. Cybercriminals team with organized crime for high-tech cargo thefts. Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies discussing ICE’s controversial facial scanning initiative. A priceless theft meets a worthless password. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

We are joined by Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies discussing ICE’s controversial facial scanning initiative. You can read more about Ben’s topic from 404 Media: You Can't Refuse To Be Scanned by ICE's Facial Recognition App, DHS Document Says.

Selected Reading

China-Linked Hackers Target Cisco Firewalls in Global Campaign (Hackread)

MIT Sloan shelves paper about AI-driven ransomware (The Register)

CyberSlop — meet the new threat actor, MIT and Safe Security (DoublePulsar)

Study concludes cybersecurity training doesn’t work (KPBS Public Media)

Microsoft: OpenAI API moonlights as malware HQ (The Register)

Apple Patches 19 WebKit Vulnerabilities (SecurityWeek)

Data Theft Hits Behavioral Health Network in 3 States (Bank Infosecurity)

OPM plans to give CyberCorps members more time to find jobs after shutdown ends (CyberScoop)

Lawmakers ask FTC to probe Flock Safety’s cybersecurity practices (The Record)

Cybercriminals, OCGs team up on lucrative cargo thefts (The Register)

Louvre Robbery: Security Flaws: The (Obviously) Password Was "Louvre" (L’Unione Sarda)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>China-Linked hackers target Cisco firewalls. MIT Sloan withdraws controversial “AI-Driven Ransomware” paper. A new study questions the value of cybersecurity training. Hackers exploit OpenAI’s API as a malware command channel. Apple patches over 100 Security flaws across devices. A Florida-based operator of mental health and addiction treatment centers exposes sensitive patient information. OPM plans a “mass deferment” for Cybercorps scholars affected by the government shutdown. Lawmakers urge the FTC to investigate Flock Safety’s cybersecurity gaps. Cybercriminals team with organized crime for high-tech cargo thefts. Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies discussing ICE’s controversial facial scanning initiative. A priceless theft meets a worthless password.<strong> </strong></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>We are joined by <a href="https://www.linkedin.com/in/benjamin-yelin-5b14114b/"><u>Ben Yelin</u></a> from <a href="https://www.umaryland.edu/chhs/"><u>University of Maryland Center for Cyber Health and Hazard Strategies</u></a> discussing ICE’s controversial facial scanning initiative. You can read more about Ben’s topic from 404 Media: <a href="https://www.404media.co/you-cant-refuse-to-be-scanned-by-ices-facial-recognition-app-dhs-document-says/"><u>You Can't Refuse To Be Scanned by ICE's Facial Recognition App, DHS Document Says</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://hackread.com/china-hackers-target-cisco-firewalls/"><u>China-Linked Hackers Target Cisco Firewalls in Global Campaign</u> </a>(Hackread)</p>
<p><a href="https://www.theregister.com/2025/11/03/mit_sloan_updates_ai_ransomware_paper/"><u>MIT Sloan shelves paper about AI-driven ransomware</u></a> (The Register)</p>
<p><a href="https://doublepulsar.com/cyberslop-meet-the-new-threat-actor-mit-and-safe-security-d250d19d02a4"><u>CyberSlop — meet the new threat actor, MIT and Safe Security</u></a> (DoublePulsar)</p>
<p><a href="https://www.kpbs.org/news/science-technology/2025/10/31/study-concludes-cybersecurity-training-doesnt-work"><u>Study concludes cybersecurity training doesn’t work</u> </a>(KPBS Public Media)</p>
<p><a href="https://www.theregister.com/2025/11/04/openai_api_moonlights_as_malware/"><u>Microsoft: OpenAI API moonlights as malware HQ</u></a> (The Register)</p>
<p><a href="https://www.securityweek.com/apple-patches-19-webkit-vulnerabilities/"><u>Apple Patches 19 WebKit Vulnerabilities</u> </a>(SecurityWeek)</p>
<p><a href="https://www.bankinfosecurity.com/data-theft-hits-behavioral-health-network-in-3-states-a-29920"><u>Data Theft Hits Behavioral Health Network in 3 States</u></a> (Bank Infosecurity)</p>
<p><a href="https://cyberscoop.com/opm-nsf-cybercorps-sfs-mass-deferment-government-shutdown/"><u>OPM plans to give CyberCorps members more time to find jobs after shutdown ends</u></a> (CyberScoop)</p>
<p><a href="https://therecord.media/wyden-letter-ftc-flock-safety-investigate-cybersecurity-practices"><u>Lawmakers ask FTC to probe Flock Safety’s cybersecurity practices</u></a> (The Record)</p>
<p><a href="https://www.theregister.com/2025/11/03/cybercriminals_team_up_with_ocgs/"><u>Cybercriminals, OCGs team up on lucrative cargo thefts</u> </a>(The Register)</p>
<p><br><a href="https://www.unionesarda.it/en/world/louvre-robbery-security-flaws-the-obviously-password-was-quot-louvrequot-ft1kkp6c"><u>Louvre Robbery: Security Flaws: The (Obviously) Password Was "Louvre"</u></a> (L’Unione Sarda)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1502</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d454bfc0-1c7a-11f0-85e0-27a2c2468a93]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5257926492.mp3?updated=1762285697" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Privacy needs where you least expect it. [CISO Perspectives]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/115/notes</link>
      <description>When discussing privacy risks, many often look to implementing strong encryption, secure data storage practices, and data sanitization processes to help ensure sensitive information remains protected. Though these practices are good and should be prioritized, many often miss other key areas that need just as much focus. As the internet of things has only continued to grow larger and larger, so has the risk these devices inherently create as they collect and store more information than many would instinctively assume.

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Merry Marwig, the Vice President of Global Communications &amp; Advocacy at Privacy4Cars, to explore how privacy risks are in places many do not think to look. Together, Merry and Kim discuss why security leaders need to rethink how they approach privacy and consider how the devices we use every day could inadvertently expose our sensitive information.

This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about ⁠Meter⁠.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Nov 2025 07:00:00 -0000</pubDate>
      <itunes:title>Privacy needs where you least expect it. [CISO Perspectives]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>115</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0dfe86b8-ade7-11f0-a2dc-07b764f5400a/image/bed1487d4770d4dc046135517c6d5ca5.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>When discussing privacy risks, many often look to implementing strong encryption, secure data storage practices, and data sanitization processes to help ensure sensitive information remains protected. Though these practices are good and should be prioritized, many often miss other key areas that need just as much focus. As the internet of things has only continued to grow larger and larger, so has the risk these devices inherently create as they collect and store more information than many would instinctively assume.

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Merry Marwig, the Vice President of Global Communications &amp; Advocacy at Privacy4Cars, to explore how privacy risks are in places many do not think to look. Together, Merry and Kim discuss why security leaders need to rethink how they approach privacy and consider how the devices we use every day could inadvertently expose our sensitive information.

This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about ⁠Meter⁠.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>When discussing privacy risks, many often look to implementing strong encryption, secure data storage practices, and data sanitization processes to help ensure sensitive information remains protected. Though these practices are good and should be prioritized, many often miss other key areas that need just as much focus. As the internet of things has only continued to grow larger and larger, so has the risk these devices inherently create as they collect and store more information than many would instinctively assume.</p>
<p>In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with <a href="https://www.linkedin.com/in/marwig/">Merry Marwig</a>, the Vice President of Global Communications &amp; Advocacy at <a href="https://www.linkedin.com/company/privacy4cars/">Privacy4Cars</a>, to explore how privacy risks are in places many do not think to look. Together, Merry and Kim discuss why security leaders need to rethink how they approach privacy and consider how the devices we use every day could inadvertently expose our sensitive information.</p>
<p>This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about <a href="http://meter.com/cisop">⁠Meter⁠</a>.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion ⁠⁠<a href="https://thecyberwire.com/stories/b07735d6ef8940a19646b5fc558aacd9/privacy-needs-where-you-least-expect-it">blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2168</itunes:duration>
      <guid isPermaLink="false"><![CDATA[0dfe86b8-ade7-11f0-a2dc-07b764f5400a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4956844052.mp3?updated=1762892536" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FCC resets cyber oversight.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2426/notes</link>
      <description>The FCC plans to roll back cybersecurity mandates that followed Salt Typhoon. The alleged cybercriminal MrICQ has been extradited to the U.S. Ransomware negotiators are accused of conducting ransomware attacks. Ernst &amp; Young accidentally exposed a 4-terabyte SQL Server backup. A hacker claims responsibility for last week’s University of Pennsylvania breach. The UK chronicles cyberattacks on Britain’s drinking water suppliers. Monday business brief. Our guest is Caleb Tolin, host of Rubrik's Data Security Decoded podcast. Hackers massage the truth. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Caleb Tolin, host of Rubrik's Data Security Decoded podcast, as he is introducing himself and his show joining the N2K CyberWire network. You can catch new episodes of Data Security Decoded the first and third Tuesdays of each month on your favorite podcast app. 

Selected Reading

FCC plans vote to remove cyber regulations installed after theft of Trump info from telecoms (The Record)

Alleged Jabber Zeus Coder ‘MrICQ’ in U.S. Custody (Krebs on Security)

Chicago firm that resolves ransomware attacks had rogue workers carrying out their own hacks, FBI says (Chicago Sun Times)

Ernst &amp; Young cloud misconfiguration leaks 4TB SQL Server backup on Microsoft Azure (Beyond Machines)

Penn hacker claims to have stolen 1.2 million donor records in data breach (Bleeping Computer)

Hackers are attacking Britain’s drinking water suppliers (The Record)

JumpCloud acquires Breez. Chainguard secures $280 million in growth financing. Sublime Security closes $150 million Series C round. (N2K Pro)

Hackers steal data, extort $350,000 from massage parlor clients (Korea JoongAng Daily)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 03 Nov 2025 21:10:00 -0000</pubDate>
      <itunes:title>FCC resets cyber oversight.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2426</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The FCC plans to roll back cybersecurity mandates that followed Salt Typhoon. The alleged cybercriminal MrICQ has been extradited to the U.S. Ransomware negotiators are accused of conducting ransomware attacks. Ernst &amp; Young accidentally exposed a 4-terabyte SQL Server backup. A hacker claims responsibility for last week’s University of Pennsylvania breach. The UK chronicles cyberattacks on Britain’s drinking water suppliers. Monday business brief. Our guest is Caleb Tolin, host of Rubrik's Data Security Decoded podcast. Hackers massage the truth. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Caleb Tolin, host of Rubrik's Data Security Decoded podcast, as he is introducing himself and his show joining the N2K CyberWire network. You can catch new episodes of Data Security Decoded the first and third Tuesdays of each month on your favorite podcast app. 

Selected Reading

FCC plans vote to remove cyber regulations installed after theft of Trump info from telecoms (The Record)

Alleged Jabber Zeus Coder ‘MrICQ’ in U.S. Custody (Krebs on Security)

Chicago firm that resolves ransomware attacks had rogue workers carrying out their own hacks, FBI says (Chicago Sun Times)

Ernst &amp; Young cloud misconfiguration leaks 4TB SQL Server backup on Microsoft Azure (Beyond Machines)

Penn hacker claims to have stolen 1.2 million donor records in data breach (Bleeping Computer)

Hackers are attacking Britain’s drinking water suppliers (The Record)

JumpCloud acquires Breez. Chainguard secures $280 million in growth financing. Sublime Security closes $150 million Series C round. (N2K Pro)

Hackers steal data, extort $350,000 from massage parlor clients (Korea JoongAng Daily)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FCC plans to roll back cybersecurity mandates that followed Salt Typhoon. The alleged cybercriminal MrICQ has been extradited to the U.S. Ransomware negotiators are accused of conducting ransomware attacks. Ernst &amp; Young accidentally exposed a 4-terabyte SQL Server backup. A hacker claims responsibility for last week’s University of Pennsylvania breach. The UK chronicles cyberattacks on Britain’s drinking water suppliers. Monday business brief. Our guest is Caleb Tolin, host of Rubrik's Data Security Decoded podcast. Hackers massage the truth.<strong> </strong></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/calebtolin/"><u>Caleb Tolin</u></a>, host of <a href="https://www.linkedin.com/company/rubrik-inc/"><u>Rubrik</u></a>'s <a href="https://thecyberwire.com/podcasts/data-security-decoded"><u>Data Security Decoded</u></a> podcast, as he is introducing himself and his show joining the N2K CyberWire network. You can catch new episodes of Data Security Decoded the first and third Tuesdays of each month on your favorite podcast app. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/fcc-plans-vote-rescind-biden-era-ruling-telecoms-cyber"><u>FCC plans vote to remove cyber regulations installed after theft of Trump info from telecoms</u></a> (The Record)</p>
<p><a href="https://krebsonsecurity.com/2025/11/alleged-jabber-zeus-coder-mricq-in-u-s-custody/"><u>Alleged Jabber Zeus Coder ‘MrICQ’ in U.S. Custody</u></a> (Krebs on Security)</p>
<p><a href="https://chicago.suntimes.com/the-watchdogs/2025/11/02/crytpo-cryptocurrency-crime-chicago-digital-mint-ransom-ransomware-hack"><u>Chicago firm that resolves ransomware attacks had rogue workers carrying out their own hacks, FBI says</u></a> (Chicago Sun Times)</p>
<p><a href="https://beyondmachines.net/event_details/ernst-young-cloud-misconfiguration-leaks-4tb-sql-server-backup-on-microsoft-azure-m-9-e-r-o/gD2P6Ple2L"><u>Ernst &amp; Young cloud misconfiguration leaks 4TB SQL Server backup on Microsoft Azure</u></a> (Beyond Machines)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/university-of-pennsylvania-hacker-claims-1.2-million-donor-data-breach/"><u>Penn hacker claims to have stolen 1.2 million donor records in data breach</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/britain-water-supply-cybersecurity-incident-reports-dwi-nis"><u>Hackers are attacking Britain’s drinking water suppliers</u></a> (The Record)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/7/43"><u>JumpCloud acquires Breez. Chainguard secures $280 million in growth financing. Sublime Security closes $150 million Series C round.</u></a> (N2K Pro)</p>
<p><a href="https://koreajoongangdaily.joins.com/news/2025-11-03/national/socialAffairs/Hackers-steal-data-extort-350000-from-massage-parlor-clients/2435276"><u>Hackers steal data, extort $350,000 from massage parlor clients</u></a> (Korea JoongAng Daily)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1562</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d42ed314-1c7a-11f0-85e0-8b4d3c9e1916]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7631050377.mp3?updated=1762197534" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Arti Lalwani: Supporting and being the change. [Risk Management] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/93/notes</link>
      <description>Risk Management and Privacy Knowledge Leader at A-LIGN, Arti Lalwani shares her story from finance to risk management and how she made the transition. Arti started her career in finance after graduating with a finance degree. Quickly learning the field was not for her, she decided to dip her toes into the tech world. She credits her mentors for helping her and said "they were able to push me up and get me there faster than I even thought." Arti says that she would like to be a part, and hopes to be apart, of the change where women are supporting women in the field. We thank Arti for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 02 Nov 2025 08:00:00 -0000</pubDate>
      <itunes:title>Arti Lalwani: Supporting and being the change. [Risk Management] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>93</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a488293e-b681-11f0-8f4a-7b2efc970cae/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Risk Management and Privacy Knowledge Leader at A-LIGN, Arti Lalwani shares her story from finance to risk management and how she made the transition. Arti started her career in finance after graduating with a finance degree. Quickly learning the field was not for her, she decided to dip her toes into the tech world. She credits her mentors for helping her and said "they were able to push me up and get me there faster than I even thought." Arti says that she would like to be a part, and hopes to be apart, of the change where women are supporting women in the field. We thank Arti for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Risk Management and Privacy Knowledge Leader at A-LIGN, Arti Lalwani shares her story from finance to risk management and how she made the transition. Arti started her career in finance after graduating with a finance degree. Quickly learning the field was not for her, she decided to dip her toes into the tech world. She credits her mentors for helping her and said "they were able to push me up and get me there faster than I even thought." Arti says that she would like to be a part, and hopes to be apart, of the change where women are supporting women in the field. We thank Arti for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>508</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a488293e-b681-11f0-8f4a-7b2efc970cae]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9863230960.mp3?updated=1735936619" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Attack of the automated ops. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/400/notes</link>
      <description>Today we are joined by Dario Pasquini, Principal Researcher at RSAC, sharing the team's work on WhenAIOpsBecome “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation. A first-of-its-kind security analysis showing that LLM-driven AIOps agents can be tricked by manipulated telemetry, turning automation itself into a new attack vector. 

The researchers introduce AIOpsDoom, an automated reconnaissance + fuzzing + LLM-driven telemetry-injection attack that performs “adversarial reward-hacking” to coerce agents into harmful remediations—even without prior knowledge of the target and even against some prompt-defense tools. They also present AIOpsShield, a telemetry-sanitization defense that reliably blocks these attacks without harming normal agent performance, underscoring the urgent need for security-aware AIOps design.

The research can be found here:


  
⁠When AIOps Become “AI Oops”:
Subverting LLM-driven IT Operations via Telemetry Manipulation



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Nov 2025 07:00:00 -0000</pubDate>
      <itunes:title>Attack of the automated ops. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>400</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ea82c3c2-b67c-11f0-ab10-03971cbe5073/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Today we are joined by Dario Pasquini, Principal Researcher at RSAC, sharing the team's work on WhenAIOpsBecome “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation. A first-of-its-kind security analysis showing that LLM-driven AIOps agents can be tricked by manipulated telemetry, turning automation itself into a new attack vector. 

The researchers introduce AIOpsDoom, an automated reconnaissance + fuzzing + LLM-driven telemetry-injection attack that performs “adversarial reward-hacking” to coerce agents into harmful remediations—even without prior knowledge of the target and even against some prompt-defense tools. They also present AIOpsShield, a telemetry-sanitization defense that reliably blocks these attacks without harming normal agent performance, underscoring the urgent need for security-aware AIOps design.

The research can be found here:


  
⁠When AIOps Become “AI Oops”:
Subverting LLM-driven IT Operations via Telemetry Manipulation



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we are joined by <a href="https://www.linkedin.com/in/dario-pasquini-a91a00269/">Dario Pasquini</a>, Principal Researcher at <a href="https://www.rsaconference.com/">RSAC</a>, sharing the team's work on WhenAIOpsBecome “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation. A first-of-its-kind security analysis showing that LLM-driven AIOps agents can be tricked by manipulated telemetry, turning automation itself into a new attack vector. </p>
<p>The researchers introduce AIOpsDoom, an automated reconnaissance + fuzzing + LLM-driven telemetry-injection attack that performs “adversarial reward-hacking” to coerce agents into harmful remediations—even without prior knowledge of the target and even against some prompt-defense tools. They also present AIOpsShield, a telemetry-sanitization defense that reliably blocks these attacks without harming normal agent performance, underscoring the urgent need for security-aware AIOps design.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://claroty.com/team82/research/turning-camera-surveillance-on-its-axis">⁠</a><a href="https://arxiv.org/pdf/2508.06394">When AIOps Become “AI Oops”:
Subverting LLM-driven IT Operations via Telemetry Manipulation</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1180</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ea82c3c2-b67c-11f0-ab10-03971cbe5073]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4694349516.mp3?updated=1761930859" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA’s steady hand in a stalled senate.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2425/notes</link>
      <description>CISA says cooperation between federal agencies and the private sector remains steady. Long-standing Linux kernel vulnerability in active ransomware campaigns confirmed. A Chinese-linked group targets diplomatic organizations in Hungary, Belgium, and other European nations. A government contractor breach exposes data of over 10 million Americans. Luxury fashion brands fall victim to impersonation scams. Phishing shifts from email to LinkedIn. Advocacy groups urge the FTC to block Meta from using chatbot interactions to target ads. A man pleads guilty to selling zero-days to the Russians. Emily Austin, Principal Security Researcher at Censys, discusses why nation state attackers continue targeting critical infrastructure. When M&amp;S went offline, shoppers hit ‘Next’.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Emily Austin, Principal Security Researcher at Censys, as she discusses why nation state attackers continue targeting critical infrastructure.

Selected Reading

Cyber info sharing ‘holding steady’ despite lapse in CISA 2015, official says (The Record)

CISA: High-severity Linux flaw now exploited by ransomware gangs (Bleeping Computer)

CISA and NSA share tips on securing Microsoft Exchange servers (Bleeping Computer)

UNC6384 Weaponizes ZDI-CAN-25373 Vulnerability to Deploy PlugX Against Hungarian and Belgian Diplomatic Entities (Arctic Wolf)

More than 10 million impacted by breach of government contractor Conduent (The Record)

Luxury Fashion Brands Face New Wave of Threats in Lead-up to 2025 Holiday Shopping Season (BforeAI)

LinkedIn phishing targets finance execs with fake board invites (Bleeping Computer)

Coalition calls on FTC to block Meta from using chatbot interactions to target ads, personalize content (The Record)

Ex-L3Harris exec pleads guilty to selling zero-day exploits to Russian broker (CyberScoop)

Business rival credits cyberattack on M&amp;S for boosting profits (The Record)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 31 Oct 2025 20:10:00 -0000</pubDate>
      <itunes:title>CISA’s steady hand in a stalled senate.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2425</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA says cooperation between federal agencies and the private sector remains steady. Long-standing Linux kernel vulnerability in active ransomware campaigns confirmed. A Chinese-linked group targets diplomatic organizations in Hungary, Belgium, and other European nations. A government contractor breach exposes data of over 10 million Americans. Luxury fashion brands fall victim to impersonation scams. Phishing shifts from email to LinkedIn. Advocacy groups urge the FTC to block Meta from using chatbot interactions to target ads. A man pleads guilty to selling zero-days to the Russians. Emily Austin, Principal Security Researcher at Censys, discusses why nation state attackers continue targeting critical infrastructure. When M&amp;S went offline, shoppers hit ‘Next’.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Emily Austin, Principal Security Researcher at Censys, as she discusses why nation state attackers continue targeting critical infrastructure.

Selected Reading

Cyber info sharing ‘holding steady’ despite lapse in CISA 2015, official says (The Record)

CISA: High-severity Linux flaw now exploited by ransomware gangs (Bleeping Computer)

CISA and NSA share tips on securing Microsoft Exchange servers (Bleeping Computer)

UNC6384 Weaponizes ZDI-CAN-25373 Vulnerability to Deploy PlugX Against Hungarian and Belgian Diplomatic Entities (Arctic Wolf)

More than 10 million impacted by breach of government contractor Conduent (The Record)

Luxury Fashion Brands Face New Wave of Threats in Lead-up to 2025 Holiday Shopping Season (BforeAI)

LinkedIn phishing targets finance execs with fake board invites (Bleeping Computer)

Coalition calls on FTC to block Meta from using chatbot interactions to target ads, personalize content (The Record)

Ex-L3Harris exec pleads guilty to selling zero-day exploits to Russian broker (CyberScoop)

Business rival credits cyberattack on M&amp;S for boosting profits (The Record)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA says cooperation between federal agencies and the private sector remains steady. Long-standing Linux kernel vulnerability in active ransomware campaigns confirmed. A Chinese-linked group targets diplomatic organizations in Hungary, Belgium, and other European nations. A government contractor breach exposes data of over 10 million Americans. Luxury fashion brands fall victim to impersonation scams. Phishing shifts from email to LinkedIn. Advocacy groups urge the FTC to block Meta from using chatbot interactions to target ads. A man pleads guilty to selling zero-days to the Russians. Emily Austin, Principal Security Researcher at Censys, discusses why nation state attackers continue targeting critical infrastructure. When M&amp;S went offline, shoppers hit ‘Next’.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/emilylaustin/"><u>Emily Austin</u></a>, Principal Security Researcher at <a href="https://www.linkedin.com/company/censysio/"><u>Censys</u></a>, as she discusses why nation state attackers continue targeting critical infrastructure.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/cyber-info-sharing-holding-steady-official-says"><u>Cyber info sharing ‘holding steady’ despite lapse in CISA 2015, official says</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisa-linux-privilege-escalation-flaw-now-exploited-in-ransomware-attacks/"><u>CISA: High-severity Linux flaw now exploited by ransomware gangs</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisa-and-nsa-share-tips-on-securing-microsoft-exchange-servers/"><u>CISA and NSA share tips on securing Microsoft Exchange servers</u></a> (Bleeping Computer)</p>
<p><a href="https://arcticwolf.com/resources/blog/unc6384-weaponizes-zdi-can-25373-vulnerability-to-deploy-plugx/"><u>UNC6384 Weaponizes ZDI-CAN-25373 Vulnerability to Deploy PlugX Against Hungarian and Belgian Diplomatic Entities</u></a> (Arctic Wolf)</p>
<p><a href="https://therecord.media/millions-impacted-breach-conduent"><u>More than 10 million impacted by breach of government contractor Conduent</u></a> (The Record)</p>
<p><a href="https://bfore.ai/report/luxury-fashion-brands-threats-in-2025-holiday-shopping-season/"><u>Luxury Fashion Brands Face New Wave of Threats in Lead-up to 2025 Holiday Shopping Season</u></a> (BforeAI)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/linkedin-phishing-targets-finance-execs-with-fake-board-invites/"><u>LinkedIn phishing targets finance execs with fake board invites</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/coalition-calls-on-ftc-to-block-meta-chatbot-privacy"><u>Coalition calls on FTC to block Meta from using chatbot interactions to target ads, personalize content</u></a> (The Record)</p>
<p><a href="https://cyberscoop.com/peter-williams-guilty-selling-zero-day-exploits-russian-broker-operation-zero/"><u>Ex-L3Harris exec pleads guilty to selling zero-day exploits to Russian broker</u></a> (CyberScoop)</p>
<p><a href="https://therecord.media/next-clothing-retailer-reports-profits-boosted-post-ms-cyberattack"><u>Business rival credits cyberattack on M&amp;S for boosting profits</u></a> (The Record)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1495</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d406ce5a-1c7a-11f0-85e0-dfb530a76549]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5928216974.mp3?updated=1761936483" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Malware Mash!</title>
      <description>Happy Halloween from the team at N2K Networks! 

We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video ⁠here⁠.  



Lyrics

I was coding in the lab late one night

when my eyes beheld an eerie sight 

for my malware threat score began to rise 

and suddenly to my surprise...



It did the Mash 

It did the Malware Mash 

The Malware Mash 

It was a botnet smash 

It did the Mash 

It caught on 'cause of Flash 

The Malware Mash 

It did the Malware Mash



From the Stuxnet worm squirming toward the near east 

to the dark web souqs where the script kiddies feast 

the APTs left their humble abodes 

to get installed from rootkit payloads. 



They did the Mash 

They did the Malware Mash 

The Malware Mash 

It was an adware smash 

They did the Mash 

It caught on 'cause of Flash 

The Malware Mash 

They did the Malware Mash



The botnets were having fun 

The DDoS had just begun 

The viruses hit the darknet, 

with ransomware yet to come. 

The keys were logging, phishing emails abound, 

Snowden on chains, backed by his Russian hounds. 

The Shadow Brokers were about to arrive 

with their vocal group, "The NotPetya Five."



They did the Mash 

They played the Malware Mash

The Malware Mash 

It was a botnet smash 

They did the Mash 

It caught on 'cause of Flash 

The Malware Mash 

They played the Malware Mash



Somewhere in Moscow Vlad's voice did ring 

Seems he was troubled by just one thing. 

He opened a shell then shook his fist 

and said, "Whatever happened to my Turla Trojan twist." 



It's now the Mash 

It's now the Malware Mash 

The Malware Mash 

And it's a botnet smash 

It's now the Mash 

It caught on 'cause of Flash 

The Malware Mash 

It's now the Malware Mash



Now everything's cool, Vlad's a part of the band 

And the Malware Mash is the hit of the land. 

For you, defenders, this mash was meant to 

when you get to my door, tell them Creeper sent you.



Then you can Mash 

Then you can Malware Mash 

The Malware Mash 

And be a botnet smash 

It is the Mash 

Don't you dare download Flash 

The Malware Mash 

Just do the Malware Mash
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 31 Oct 2025 05:00:00 -0000</pubDate>
      <itunes:title>The Malware Mash!</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/01035398-b5c7-11f0-93f8-a7008e0b14b8/image/a7bd2dc42eefee62cd5572fe3881cc20.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Happy Halloween from the team at N2K Networks! 

We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video ⁠here⁠.  



Lyrics

I was coding in the lab late one night

when my eyes beheld an eerie sight 

for my malware threat score began to rise 

and suddenly to my surprise...



It did the Mash 

It did the Malware Mash 

The Malware Mash 

It was a botnet smash 

It did the Mash 

It caught on 'cause of Flash 

The Malware Mash 

It did the Malware Mash



From the Stuxnet worm squirming toward the near east 

to the dark web souqs where the script kiddies feast 

the APTs left their humble abodes 

to get installed from rootkit payloads. 



They did the Mash 

They did the Malware Mash 

The Malware Mash 

It was an adware smash 

They did the Mash 

It caught on 'cause of Flash 

The Malware Mash 

They did the Malware Mash



The botnets were having fun 

The DDoS had just begun 

The viruses hit the darknet, 

with ransomware yet to come. 

The keys were logging, phishing emails abound, 

Snowden on chains, backed by his Russian hounds. 

The Shadow Brokers were about to arrive 

with their vocal group, "The NotPetya Five."



They did the Mash 

They played the Malware Mash

The Malware Mash 

It was a botnet smash 

They did the Mash 

It caught on 'cause of Flash 

The Malware Mash 

They played the Malware Mash



Somewhere in Moscow Vlad's voice did ring 

Seems he was troubled by just one thing. 

He opened a shell then shook his fist 

and said, "Whatever happened to my Turla Trojan twist." 



It's now the Mash 

It's now the Malware Mash 

The Malware Mash 

And it's a botnet smash 

It's now the Mash 

It caught on 'cause of Flash 

The Malware Mash 

It's now the Malware Mash



Now everything's cool, Vlad's a part of the band 

And the Malware Mash is the hit of the land. 

For you, defenders, this mash was meant to 

when you get to my door, tell them Creeper sent you.



Then you can Mash 

Then you can Malware Mash 

The Malware Mash 

And be a botnet smash 

It is the Mash 

Don't you dare download Flash 

The Malware Mash 

Just do the Malware Mash
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Happy Halloween from the team at N2K Networks! </p>
<p>We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video <a href="https://youtu.be/QBpAAhbPOk0">⁠here⁠</a>.  </p>
<p><br></p>
<p><strong>Lyrics</strong></p>
<p>I was coding in the lab late one night</p>
<p>when my eyes beheld an eerie sight </p>
<p>for my malware threat score began to rise </p>
<p>and suddenly to my surprise...</p>
<p><br></p>
<p>It did the Mash </p>
<p>It did the Malware Mash </p>
<p>The Malware Mash </p>
<p>It was a botnet smash </p>
<p>It did the Mash </p>
<p>It caught on 'cause of Flash </p>
<p>The Malware Mash </p>
<p>It did the Malware Mash</p>
<p><br></p>
<p>From the Stuxnet worm squirming toward the near east </p>
<p>to the dark web souqs where the script kiddies feast </p>
<p>the APTs left their humble abodes </p>
<p>to get installed from rootkit payloads. </p>
<p><br></p>
<p>They did the Mash </p>
<p>They did the Malware Mash </p>
<p>The Malware Mash </p>
<p>It was an adware smash </p>
<p>They did the Mash </p>
<p>It caught on 'cause of Flash </p>
<p>The Malware Mash </p>
<p>They did the Malware Mash</p>
<p><br></p>
<p>The botnets were having fun </p>
<p>The DDoS had just begun </p>
<p>The viruses hit the darknet, </p>
<p>with ransomware yet to come. </p>
<p>The keys were logging, phishing emails abound, </p>
<p>Snowden on chains, backed by his Russian hounds. </p>
<p>The Shadow Brokers were about to arrive </p>
<p>with their vocal group, "The NotPetya Five."</p>
<p><br></p>
<p>They did the Mash </p>
<p>They played the Malware Mash</p>
<p>The Malware Mash </p>
<p>It was a botnet smash </p>
<p>They did the Mash </p>
<p>It caught on 'cause of Flash </p>
<p>The Malware Mash </p>
<p>They played the Malware Mash</p>
<p><br></p>
<p>Somewhere in Moscow Vlad's voice did ring </p>
<p>Seems he was troubled by just one thing. </p>
<p>He opened a shell then shook his fist </p>
<p>and said, "Whatever happened to my Turla Trojan twist." </p>
<p><br></p>
<p>It's now the Mash </p>
<p>It's now the Malware Mash </p>
<p>The Malware Mash </p>
<p>And it's a botnet smash </p>
<p>It's now the Mash </p>
<p>It caught on 'cause of Flash </p>
<p>The Malware Mash </p>
<p>It's now the Malware Mash</p>
<p><br></p>
<p>Now everything's cool, Vlad's a part of the band </p>
<p>And the Malware Mash is the hit of the land. </p>
<p>For you, defenders, this mash was meant to </p>
<p>when you get to my door, tell them Creeper sent you.</p>
<p><br></p>
<p>Then you can Mash </p>
<p>Then you can Malware Mash </p>
<p>The Malware Mash </p>
<p>And be a botnet smash </p>
<p>It is the Mash </p>
<p>Don't you dare download Flash </p>
<p>The Malware Mash </p>
<p>Just do the Malware Mash</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>186</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01035398-b5c7-11f0-93f8-a7008e0b14b8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7007886083.mp3?updated=1761853049" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dial M for malware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2424/notes</link>
      <description>A Texas telecom confirms a nation-state attack. A global outage disrupts Azure and Microsoft 365 services.  Malicious npm packages steal sensitive data from Windows, Linux, and macOS systems.  Hacktivists have breached multiple critical infrastructure systems across Canada. Major chipmakers spill the TEE. TP-Link home routers fall under federal scrutiny. Cloud Atlas targets Russia’s agricultural sector. Israel’s cloud computing deal with Google and Amazon allegedly includes a secret “winking mechanism.”The FCC tamps down on overseas robocalls. Mike Anderson, from Netskope, discusses why CIOs should think like HR leaders when considering Agentic AI. Danes Draw the line at digital doppelgängers. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Mike Anderson, Netskope’s Chief Digital and Information Officer, to discuss why CIOs must think like HR leaders when considering Agentic AI.

Selected Reading

US company with access to biggest telecom firms uncovers breach by nation-state hackers (Reuters)

Huge Microsoft outage hit 365, Xbox, and beyond — deployment of fix for Azure breakdown rolled out (Tom's Hardware)

Malicious NPM packages fetch infostealer for Windows, Linux, macOS (Bleeping Computer)

Canada says hacktivists breached water and energy facilities (Bleeping Computer)

New physical attacks are quickly diluting secure enclave defenses from Nvidia, AMD, and Intel (Ars Technica)

U.S. agencies back banning top-selling home routers on security grounds (The Washington Post)

Cloud Atlas hackers target Russian agriculture sector ahead of industry forum (The Record)

Revealed: Israel demanded Google and Amazon use secret ‘wink’ to sidestep legal orders (The Guardian)

FCC adopts new rule targeting robocalls (The Record)

Denmark to tackle deepfakes by giving people copyright to their own features (The Guardian)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 30 Oct 2025 20:10:00 -0000</pubDate>
      <itunes:title>Dial M for malware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2424</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A Texas telecom confirms a nation-state attack. A global outage disrupts Azure and Microsoft 365 services.  Malicious npm packages steal sensitive data from Windows, Linux, and macOS systems.  Hacktivists have breached multiple critical infrastructure systems across Canada. Major chipmakers spill the TEE. TP-Link home routers fall under federal scrutiny. Cloud Atlas targets Russia’s agricultural sector. Israel’s cloud computing deal with Google and Amazon allegedly includes a secret “winking mechanism.”The FCC tamps down on overseas robocalls. Mike Anderson, from Netskope, discusses why CIOs should think like HR leaders when considering Agentic AI. Danes Draw the line at digital doppelgängers. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Mike Anderson, Netskope’s Chief Digital and Information Officer, to discuss why CIOs must think like HR leaders when considering Agentic AI.

Selected Reading

US company with access to biggest telecom firms uncovers breach by nation-state hackers (Reuters)

Huge Microsoft outage hit 365, Xbox, and beyond — deployment of fix for Azure breakdown rolled out (Tom's Hardware)

Malicious NPM packages fetch infostealer for Windows, Linux, macOS (Bleeping Computer)

Canada says hacktivists breached water and energy facilities (Bleeping Computer)

New physical attacks are quickly diluting secure enclave defenses from Nvidia, AMD, and Intel (Ars Technica)

U.S. agencies back banning top-selling home routers on security grounds (The Washington Post)

Cloud Atlas hackers target Russian agriculture sector ahead of industry forum (The Record)

Revealed: Israel demanded Google and Amazon use secret ‘wink’ to sidestep legal orders (The Guardian)

FCC adopts new rule targeting robocalls (The Record)

Denmark to tackle deepfakes by giving people copyright to their own features (The Guardian)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Texas telecom confirms a nation-state attack. A global outage disrupts Azure and Microsoft 365 services.  Malicious npm packages steal sensitive data from Windows, Linux, and macOS systems.  Hacktivists have breached multiple critical infrastructure systems across Canada. Major chipmakers spill the TEE. TP-Link home routers fall under federal scrutiny. Cloud Atlas targets Russia’s agricultural sector. Israel’s cloud computing deal with Google and Amazon allegedly includes a secret “winking mechanism.”The FCC tamps down on overseas robocalls. Mike Anderson, from Netskope, discusses why CIOs should think like HR leaders when considering Agentic AI. Danes Draw the line at digital doppelgängers. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/mianders/"><u>Mike Anderson</u></a>, <a href="https://www.linkedin.com/company/netskope/"><u>Netskope</u></a>’s Chief Digital and Information Officer, to discuss why CIOs must think like HR leaders when considering Agentic AI.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.reuters.com/business/media-telecom/us-company-with-access-biggest-telecom-firms-uncovers-breach-by-nation-state-2025-10-29/"><u>US company with access to biggest telecom firms uncovers breach by nation-state hackers</u> </a>(Reuters)</p>
<p><a href="https://www.tomshardware.com/news/live/aws-outage-strikes-again-colossal-internet-breakdown-strikes-again"><u>Huge Microsoft outage hit 365, Xbox, and beyond — deployment of fix for Azure breakdown rolled out</u> </a>(Tom's Hardware)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/malicious-npm-packages-fetch-infostealer-for-windows-linux-macos/"><u>Malicious NPM packages fetch infostealer for Windows, Linux, macOS</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/canada-says-hacktivists-breached-water-and-energy-facilities/"><u>Canada says hacktivists breached water and energy facilities</u></a> (Bleeping Computer)</p>
<p><a href="https://arstechnica.com/security/2025/10/new-physical-attacks-are-quickly-diluting-secure-enclave-defenses-from-nvidia-amd-and-intel/"><u>New physical attacks are quickly diluting secure enclave defenses from Nvidia, AMD, and Intel</u> </a>(Ars Technica)</p>
<p><a href="https://wapo.st/4oiPKBY"><u>U.S. agencies back banning top-selling home routers on security grounds</u></a> (The Washington Post)</p>
<p><a href="https://therecord.media/cloud-atlas-targets-russian-agriculture"><u>Cloud Atlas hackers target Russian agriculture sector ahead of industry forum</u></a> (The Record)</p>
<p><a href="https://www.theguardian.com/us-news/2025/oct/29/google-amazon-israel-contract-secret-code"><u>Revealed: Israel demanded Google and Amazon use secret ‘wink’ to sidestep legal orders</u> </a>(The Guardian)</p>
<p><a href="https://therecord.media/fcc-adopts-new-rule-targeting-robocalls"><u>FCC adopts new rule targeting robocalls</u></a> (The Record)</p>
<p><a href="https://www.theguardian.com/technology/2025/jun/27/deepfakes-denmark-copyright-law-artificial-intelligence"><u>Denmark to tackle deepfakes by giving people copyright to their own features</u></a> (The Guardian)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1579</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d3df38e0-1c7a-11f0-85e0-fbd02587189f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8213051305.mp3?updated=1761852227" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Logging off in Myawaddy.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2423/notes</link>
      <description>Explosions rock a shuttered Myanmar cybercrime hub. The Aisuru botnet shifts from DDoS to residential proxies. Dentsu confirms data theft at Merkle. Boston bans biometrics. Proton restores journalists’ email accounts after backlash. Memento labs admits Dante spyware is theirs. Australia accuses Microsoft of improperly forcing users into AI upgrades. CISA warns of active exploitation targeting manufacturing management software. A covert cyberattack during Trump’s first term disabled Venezuela’s intelligence network. Our guest is Ben Seri, Co-Founder and CTO of Zafran, discussing the trend of AI native attacks. New glasses deliver fashionable paranoia.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today’s guest is Ben Seri, Co-Founder and CTO of Zafran, discussing the trend of AI native attacks and how defenders should use AI to defend and remediate.

Selected Reading

Stragglers from Myanmar scam center raided by army cross into Thailand as buildings are blown up (AP News)

Aisuru Botnet Shifts from DDoS to Residential Proxies (Krebs on Security)

Advertising giant Dentsu reports data breach at subsidiary Merkle (Bleeping Computer)

Boston Police Can No Longer Use Facial Recognition Software (Built in Boston)

Proton Mail Suspended Journalist Accounts at Request of Cybersecurity Agency (The Intercept)

CEO of spyware maker Memento Labs confirms one of its government customers was caught using its malware (TechCrunch)

Australia sues Microsoft for forcing Copilot AI onto Office 365 customers (Pivot to AI)

CISA warns of actively exploited flaws in Dassault DELMIA Apriso manufacturing software (Beyond Machines)

CIA cyberattacks targeting the Maduro regime didn’t satisfy Trump in his first term. Now the US is flexing its military might (CNN Politics)

Zenni’s Anti-Facial Recognition Glasses are Eyewear for Our Paranoid Age (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 29 Oct 2025 20:10:00 -0000</pubDate>
      <itunes:title>Logging off in Myawaddy.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2423</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Explosions rock a shuttered Myanmar cybercrime hub. The Aisuru botnet shifts from DDoS to residential proxies. Dentsu confirms data theft at Merkle. Boston bans biometrics. Proton restores journalists’ email accounts after backlash. Memento labs admits Dante spyware is theirs. Australia accuses Microsoft of improperly forcing users into AI upgrades. CISA warns of active exploitation targeting manufacturing management software. A covert cyberattack during Trump’s first term disabled Venezuela’s intelligence network. Our guest is Ben Seri, Co-Founder and CTO of Zafran, discussing the trend of AI native attacks. New glasses deliver fashionable paranoia.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today’s guest is Ben Seri, Co-Founder and CTO of Zafran, discussing the trend of AI native attacks and how defenders should use AI to defend and remediate.

Selected Reading

Stragglers from Myanmar scam center raided by army cross into Thailand as buildings are blown up (AP News)

Aisuru Botnet Shifts from DDoS to Residential Proxies (Krebs on Security)

Advertising giant Dentsu reports data breach at subsidiary Merkle (Bleeping Computer)

Boston Police Can No Longer Use Facial Recognition Software (Built in Boston)

Proton Mail Suspended Journalist Accounts at Request of Cybersecurity Agency (The Intercept)

CEO of spyware maker Memento Labs confirms one of its government customers was caught using its malware (TechCrunch)

Australia sues Microsoft for forcing Copilot AI onto Office 365 customers (Pivot to AI)

CISA warns of actively exploited flaws in Dassault DELMIA Apriso manufacturing software (Beyond Machines)

CIA cyberattacks targeting the Maduro regime didn’t satisfy Trump in his first term. Now the US is flexing its military might (CNN Politics)

Zenni’s Anti-Facial Recognition Glasses are Eyewear for Our Paranoid Age (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Explosions rock a shuttered Myanmar cybercrime hub. The Aisuru botnet shifts from DDoS to residential proxies. Dentsu confirms data theft at Merkle. Boston bans biometrics. Proton restores journalists’ email accounts after backlash. Memento labs admits Dante spyware is theirs. Australia accuses Microsoft of improperly forcing users into AI upgrades. CISA warns of active exploitation targeting manufacturing management software. A covert cyberattack during Trump’s first term disabled Venezuela’s intelligence network. Our guest is Ben Seri, Co-Founder and CTO of Zafran, discussing the trend of AI native attacks. New glasses deliver fashionable paranoia.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today’s guest is <a href="https://www.linkedin.com/in/ben-seri/"><u>Ben Seri</u></a>, Co-Founder and CTO of <a href="https://www.linkedin.com/company/zafran-security/"><u>Zafran</u></a>, discussing the trend of AI native attacks and how defenders should use AI to defend and remediate.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://apnews.com/article/myanmar-scam-centers-cybercrime-thailand-border-daa90f481ea4207e7d7a891dda1161c8"><u>Stragglers from Myanmar scam center raided by army cross into Thailand as buildings are blown up</u></a> (AP News)</p>
<p><a href="https://krebsonsecurity.com/2025/10/aisuru-botnet-shifts-from-ddos-to-residential-proxies/"><u>Aisuru Botnet Shifts from DDoS to Residential Proxies</u></a> (Krebs on Security)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/advertising-giant-dentsu-reports-data-breach-at-subsidiary-merkle/"><u>Advertising giant Dentsu reports data breach at subsidiary Merkle</u></a> (Bleeping Computer)</p>
<p><a href="https://www.builtinboston.com/articles/boston-bans-facial-recognition-software"><u>Boston Police Can No Longer Use Facial Recognition Software</u></a> (Built in Boston)</p>
<p><a href="https://theintercept.com/2025/09/12/proton-mail-journalist-accounts-suspended/"><u>Proton Mail Suspended Journalist Accounts at Request of Cybersecurity Agency</u></a> (The Intercept)</p>
<p><a href="https://techcrunch.com/2025/10/28/ceo-of-spyware-maker-memento-labs-confirms-one-of-its-government-customers-was-caught-using-its-malware/"><u>CEO of spyware maker Memento Labs confirms one of its government customers was caught using its malware</u></a> (TechCrunch)</p>
<p><a href="https://pivot-to-ai.com/2025/10/28/australia-sues-microsoft-for-forcing-copilot-ai-onto-office-365-customers/"><u>Australia sues Microsoft for forcing Copilot AI onto Office 365 customers</u></a> (Pivot to AI)</p>
<p><a href="https://beyondmachines.net/event_details/cisa-warns-of-actively-exploited-flaws-in-dassault-delmia-apriso-manufacturing-software-v-w-u-u-a/gD2P6Ple2L"><u>CISA warns of actively exploited flaws in Dassault DELMIA Apriso manufacturing software</u></a> (Beyond Machines)</p>
<p><a href="https://www.cnn.com/2025/10/29/politics/maduro-cyberattack-trump-cia"><u>CIA cyberattacks targeting the Maduro regime didn’t satisfy Trump in his first term. Now the US is flexing its military might</u> </a>(CNN Politics)</p>
<p><a href="https://www.404media.co/zennis-anti-facial-recognition-glasses-are-eyewear-for-our-paranoid-age/"><u>Zenni’s Anti-Facial Recognition Glasses are Eyewear for Our Paranoid Age</u></a> (404 Media)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1707</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d3b8a950-1c7a-11f0-85e0-338e1e40d615]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9238968319.mp3?updated=1761766405" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Windows servers under siege</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2422/notes</link>
      <description>WSUS attacks escalate as emergency patch fails to fully contain exploited flaw. Schneider Electric and Emerson are listed among victims in the Oracle EBS cyberattack. Google debunks reports of a massive GMail breach. A new banking trojan mimics human behavior for stealth. Sweden’s power grid operator confirms a cyberattack. Italian spyware targets Russian and Belarusian organizations. The U.S. declines to sign the new UN cyber treaty. Ransomware payments fall to record lows. U.S. Cyber Chief calls for a “clean American tech stack” to counter China's global surveillance push. On today's Threat Vector segment, David Moulton⁠ speaks with two cybersecurity leaders from Palo Alto Networks:⁠ Sarit Tager⁠ and⁠ Krithivasan Mecheri⁠. AI mistakes Doritos for a deadly weapon. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector

On today's Threat Vector segment, David Moulton⁠ speaks with two cybersecurity leaders from Palo Alto Networks:⁠ Sarit Tager⁠ and⁠ Krithivasan Mecheri⁠ (Krithi). Together, they dive into the urgent challenges of securing modern development in the age of AI and "Shifting Security Left". You can listen to their full conversation here, and catch new episodes every Thursday on your favorite podcast app. 

Selected Reading

Microsoft WSUS attacks hit 'multiple' orgs, Google warns (The Register)

Industrial Giants Schneider Electric and Emerson Named as Victims of Oracle Hack (SecurityWeek)

Google says talk of Gmail breach impacting millions not true (The Register)

'Herodotus' Android Trojan Mimics Human Sluggishness (Gov Infosecurity)

Hackers Target Swedish Power Grid Operator  (SecurityWeek)

Italian-made spyware spotted in breaches of Russian, Belarusian systems  (The Record)

US declines to join more than 70 countries in signing UN cybercrime treaty (The Record)

Ransomware profits drop as victims stop paying hackers (Bleeping Computer)

National cyber director says U.S. needs to counter Chinese surveillance, push American tech (CyberScoop)

Armed police handcuff teen after AI mistakes crisp packet for gun in US (BBC News)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Oct 2025 20:10:00 -0000</pubDate>
      <itunes:title>Windows servers under siege</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2422</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>WSUS attacks escalate as emergency patch fails to fully contain exploited flaw. Schneider Electric and Emerson are listed among victims in the Oracle EBS cyberattack. Google debunks reports of a massive GMail breach. A new banking trojan mimics human behavior for stealth. Sweden’s power grid operator confirms a cyberattack. Italian spyware targets Russian and Belarusian organizations. The U.S. declines to sign the new UN cyber treaty. Ransomware payments fall to record lows. U.S. Cyber Chief calls for a “clean American tech stack” to counter China's global surveillance push. On today's Threat Vector segment, David Moulton⁠ speaks with two cybersecurity leaders from Palo Alto Networks:⁠ Sarit Tager⁠ and⁠ Krithivasan Mecheri⁠. AI mistakes Doritos for a deadly weapon. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector

On today's Threat Vector segment, David Moulton⁠ speaks with two cybersecurity leaders from Palo Alto Networks:⁠ Sarit Tager⁠ and⁠ Krithivasan Mecheri⁠ (Krithi). Together, they dive into the urgent challenges of securing modern development in the age of AI and "Shifting Security Left". You can listen to their full conversation here, and catch new episodes every Thursday on your favorite podcast app. 

Selected Reading

Microsoft WSUS attacks hit 'multiple' orgs, Google warns (The Register)

Industrial Giants Schneider Electric and Emerson Named as Victims of Oracle Hack (SecurityWeek)

Google says talk of Gmail breach impacting millions not true (The Register)

'Herodotus' Android Trojan Mimics Human Sluggishness (Gov Infosecurity)

Hackers Target Swedish Power Grid Operator  (SecurityWeek)

Italian-made spyware spotted in breaches of Russian, Belarusian systems  (The Record)

US declines to join more than 70 countries in signing UN cybercrime treaty (The Record)

Ransomware profits drop as victims stop paying hackers (Bleeping Computer)

National cyber director says U.S. needs to counter Chinese surveillance, push American tech (CyberScoop)

Armed police handcuff teen after AI mistakes crisp packet for gun in US (BBC News)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>WSUS attacks escalate as emergency patch fails to fully contain exploited flaw. Schneider Electric and Emerson are listed among victims in the Oracle EBS cyberattack. Google debunks reports of a massive GMail breach. A new banking trojan mimics human behavior for stealth. Sweden’s power grid operator confirms a cyberattack. Italian spyware targets Russian and Belarusian organizations. The U.S. declines to sign the new UN cyber treaty. Ransomware payments fall to record lows. U.S. Cyber Chief calls for a “clean American tech stack” to counter China's global surveillance push. On today's Threat Vector segment, David Moulton⁠ speaks with two cybersecurity leaders from Palo Alto Networks:⁠ Sarit Tager⁠ and⁠ Krithivasan Mecheri⁠. AI mistakes Doritos for a deadly weapon. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Threat Vector</strong></p>
<p>On today's Threat Vector segment,<a href="https://www.linkedin.com/in/davidrmoulton/"><u> David Moulton⁠</u></a> speaks with two cybersecurity leaders from Palo Alto Networks:<a href="https://www.linkedin.com/in/sarit/"><u>⁠ Sarit Tager⁠</u></a> and<a href="https://www.linkedin.com/in/krithivasanmecheri"><u>⁠ Krithivasan Mecheri⁠</u></a> (Krithi). Together, they dive into the urgent challenges of securing modern development in the age of AI and "Shifting Security Left". You can listen to their full conversation<a href="https://thecyberwire.com/podcasts/threat-vector/90/notes"> <u>here</u></a>, and catch new episodes every Thursday on your favorite podcast app. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.theregister.com/2025/10/27/microsoft_wsus_attacks_multiple_orgs/"><u>Microsoft WSUS attacks hit 'multiple' orgs, Google warns</u> </a>(The Register)</p>
<p><a href="https://www.securityweek.com/industrial-giants-schneider-electric-and-emerson-named-as-victims-of-oracle-hack/"><u>Industrial Giants Schneider Electric and Emerson Named as Victims of Oracle Hack</u> </a>(SecurityWeek)</p>
<p><a href="https://www.theregister.com/2025/10/28/gmail_breach_fake_news/"><u>Google says talk of Gmail breach impacting millions not true</u></a> (The Register)</p>
<p><a href="https://www.govinfosecurity.com/herodotus-android-trojan-mimics-human-sluggishness-a-29843"><u>'Herodotus' Android Trojan Mimics Human Sluggishness</u></a> (Gov Infosecurity)</p>
<p><a href="https://www.securityweek.com/hackers-target-swedish-power-grid-operator/"><u>Hackers Target Swedish Power Grid Operator</u> </a> (SecurityWeek)</p>
<p><a href="https://therecord.media/memento-labs-formerly-hacking-team-dante-spyware-russia-kaspersky"><u>Italian-made spyware spotted in breaches of Russian, Belarusian systems</u></a>  (The Record)</p>
<p><a href="https://therecord.media/us-declines-signing-cybercrime-treaty"><u>US declines to join more than 70 countries in signing UN cybercrime treaty</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/ransomware-profits-drop-as-victims-stop-paying-hackers/"><u>Ransomware profits drop as victims stop paying hackers</u></a> (Bleeping Computer)</p>
<p><a href="https://cyberscoop.com/national-cyber-director-says-u-s-needs-to-counter-chinese-surveillance-push-american-tech/"><u>National cyber director says U.S. needs to counter Chinese surveillance, push American tech</u></a> (CyberScoop)</p>
<p><br><a href="https://www.bbc.co.uk/news/articles/cgjdlx92lylo"><u>Armed police handcuff teen after AI mistakes crisp packet for gun in US</u> </a>(BBC News)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1472</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d392ab60-1c7a-11f0-85e0-2b2f749ec8d6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4776354345.mp3?updated=1761679313" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The impact of data privacy on cyber. [CISO Perspectives]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/114/notes</link>
      <description>Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. 

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Kristy Westphal, the Global Security Director of Spirent Communications, to explore data privacy's impacts on cybersecurity efforts. Together, Kristy and Kim discuss why privacy cannot be an afterthought but rather must be something actively addressed through proactive security efforts, shifting security culture mindsets, and staying ahead of rapidly changing technologies.

This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about ⁠Meter⁠.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Oct 2025 06:00:00 -0000</pubDate>
      <itunes:title>The impact of data privacy on cyber. [CISO Perspectives]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>114</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/f6eb5456-ade6-11f0-8072-ebf27e637743/image/bed1487d4770d4dc046135517c6d5ca5.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. 

In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Kristy Westphal, the Global Security Director of Spirent Communications, to explore data privacy's impacts on cybersecurity efforts. Together, Kristy and Kim discuss why privacy cannot be an afterthought but rather must be something actively addressed through proactive security efforts, shifting security culture mindsets, and staying ahead of rapidly changing technologies.

This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about ⁠Meter⁠.

Want more CISO Perspectives?

Check out a companion ⁠⁠blog post⁠⁠ by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. </p>
<p>In this episode of CISO Perspectives, host ⁠Kim Jones⁠ sits down with Kristy Westphal, the Global Security Director of Spirent Communications, to explore data privacy's impacts on cybersecurity efforts. Together, Kristy and Kim discuss why privacy cannot be an afterthought but rather must be something actively addressed through proactive security efforts, shifting security culture mindsets, and staying ahead of rapidly changing technologies.</p>
<p>This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about <a href="http://meter.com/cisop">⁠Meter⁠</a>.</p>
<p><strong>Want more CISO Perspectives?</strong></p>
<p>Check out a companion ⁠⁠<a href="https://thecyberwire.com/stories/b43484e68a394666abf7f7fb23ead0ce/the-impact-of-data-privacy-on-cyber">blog post⁠⁠</a> by our very own Ethan Cook, where he breaks down key insights, shares behind-the-scenes context, and highlights research that complements this episode.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2524</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f6eb5456-ade6-11f0-8072-ebf27e637743]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2533992905.mp3?updated=1762892514" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The UN’s big push for global cybercrime rules.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2421/notes</link>
      <description>The UN launches the world’s first global treaty to combat cybercrime. A House Democrats’ job portal left security clearance data exposed online. A new data leak exposes 183 million email addresses and passwords. Threat actors target Discord users with an open-source red-team toolkit. A new campaign targets unpatched WordPress plugins. The City of Gloversville, New York, suffers a ransomware attack. Jen Easterly hopes AI could eliminate the buggy software that fuels cybercrime. A Connecticut health system agrees to an $18 million settlement following a ransomware attack. Monday business brief. Tim Starks from CyberScoop is discussing concerns over budget cuts and visibility. Meta’s privacy safeguard goes dark.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Tim Starks from CyberScoop who is discussing concerns over budget cuts and visibility. You can read the articles Tim references here: 


  
US ‘slipping’ on cybersecurity, annual Cyberspace Solarium Commission report concludes (CyberScoop)



  
F5 vulnerability highlights weak points in DHS’s CDM program (CyberScoop)




Selected Reading⁠

UN Cybercrime Treaty wins dozens of signatories (The Register)

Hundreds of People With ‘Top Secret’ Clearance Exposed by House Democrats’ Website (WIRED)

Gmail passwords confirmed in 183 million account data breach (Tribune Online)

Hackers steal Discord accounts with RedTiger-based infostealer (Bleeping Computer)

Year-Old WordPress Plugin Flaws Exploited to Hack Websites (SecurityWeek)

Gloversville hit by ransomware attack (WNYT.com NewsChannel 13)

Ex-CISA chief says AI could mean the end of cybersecurity (The Register)

Yale New Haven Health Will Pay $18M to Settle Hack Lawsuit (GovInfo Security)

Veeam to acquire Securiti AI for $1.7 billion. (N2K Pro)

A $60 Mod to Meta’s Ray-Bans Disables Its Privacy-Protecting Recording Light (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 27 Oct 2025 20:10:00 -0000</pubDate>
      <itunes:title>The UN’s big push for global cybercrime rules.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2421</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The UN launches the world’s first global treaty to combat cybercrime. A House Democrats’ job portal left security clearance data exposed online. A new data leak exposes 183 million email addresses and passwords. Threat actors target Discord users with an open-source red-team toolkit. A new campaign targets unpatched WordPress plugins. The City of Gloversville, New York, suffers a ransomware attack. Jen Easterly hopes AI could eliminate the buggy software that fuels cybercrime. A Connecticut health system agrees to an $18 million settlement following a ransomware attack. Monday business brief. Tim Starks from CyberScoop is discussing concerns over budget cuts and visibility. Meta’s privacy safeguard goes dark.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Tim Starks from CyberScoop who is discussing concerns over budget cuts and visibility. You can read the articles Tim references here: 


  
US ‘slipping’ on cybersecurity, annual Cyberspace Solarium Commission report concludes (CyberScoop)



  
F5 vulnerability highlights weak points in DHS’s CDM program (CyberScoop)




Selected Reading⁠

UN Cybercrime Treaty wins dozens of signatories (The Register)

Hundreds of People With ‘Top Secret’ Clearance Exposed by House Democrats’ Website (WIRED)

Gmail passwords confirmed in 183 million account data breach (Tribune Online)

Hackers steal Discord accounts with RedTiger-based infostealer (Bleeping Computer)

Year-Old WordPress Plugin Flaws Exploited to Hack Websites (SecurityWeek)

Gloversville hit by ransomware attack (WNYT.com NewsChannel 13)

Ex-CISA chief says AI could mean the end of cybersecurity (The Register)

Yale New Haven Health Will Pay $18M to Settle Hack Lawsuit (GovInfo Security)

Veeam to acquire Securiti AI for $1.7 billion. (N2K Pro)

A $60 Mod to Meta’s Ray-Bans Disables Its Privacy-Protecting Recording Light (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The UN launches the world’s first global treaty to combat cybercrime. A House Democrats’ job portal left security clearance data exposed online. A new data leak exposes 183 million email addresses and passwords. Threat actors target Discord users with an open-source red-team toolkit. A new campaign targets unpatched WordPress plugins. The City of Gloversville, New York, suffers a ransomware attack. Jen Easterly hopes AI could eliminate the buggy software that fuels cybercrime. A Connecticut health system agrees to an $18 million settlement following a ransomware attack. Monday business brief. Tim Starks from CyberScoop is discussing concerns over budget cuts and visibility. Meta’s privacy safeguard goes dark.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by Tim Starks from CyberScoop who is discussing concerns over budget cuts and visibility. You can read the articles Tim references here: </p>
<ul>
  <li>
<p><a href="https://cyberscoop.com/cyberspace-solarium-commission-report-budget-workforce-cuts/"><u>US ‘slipping’ on cybersecurity, annual Cyberspace Solarium Commission report concludes</u></a> (CyberScoop)</p>
</li>
  <li>
<p><a href="https://cyberscoop.com/f5-vulnerability-highlights-weak-points-in-dhss-cdm-program/"><u>F5 vulnerability highlights weak points in DHS’s CDM program</u></a> (CyberScoop)</p>
</li>
</ul>
<p><strong>Selected Reading</strong><a href="https://www.404media.co/how-to-disable-meta-rayban-led-light/?ref=weekly-roundup-newsletter">⁠</a></p>
<p><a href="https://www.theregister.com/2025/10/27/un_cybercrime_convention_signed/"><u>UN Cybercrime Treaty wins dozens of signatories</u></a> (The Register)</p>
<p><a href="https://www.wired.com/story/hundreds-of-people-with-top-secret-clearance-exposed-by-house-democrats-website/"><u>Hundreds of People With ‘Top Secret’ Clearance Exposed by House Democrats’ Website</u></a> (WIRED)</p>
<p><a href="https://tribuneonlineng.com/gmail-passwords-confirmed-in-183-million-account-data-breach/"><u>Gmail passwords confirmed in 183 million account data breach</u></a> (Tribune Online)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/hackers-steal-discord-accounts-with-redtiger-based-infostealer/"><u>Hackers steal Discord accounts with RedTiger-based infostealer</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/year-old-wordpress-plugin-flaws-exploited-to-hack-websites/"><u>Year-Old WordPress Plugin Flaws Exploited to Hack Websites</u></a> (SecurityWeek)</p>
<p><a href="https://wnyt.com/top-stories/gloversville-hit-by-ransomware-attack/"><u>Gloversville hit by ransomware attack</u></a> (WNYT.com NewsChannel 13)</p>
<p><a href="https://www.theregister.com/2025/10/27/jen_easterly_ai_cybersecurity/"><u>Ex-CISA chief says AI could mean the end of cybersecurity</u></a> (The Register)</p>
<p><a href="https://www.govinfosecurity.com/yale-new-haven-health-will-pay-18m-to-settle-hack-lawsuit-a-29827"><u>Yale New Haven Health Will Pay $18M to Settle Hack Lawsuit</u></a> (GovInfo Security)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/7/42"><u>Veeam to acquire Securiti AI for $1.7 billion.</u></a> (N2K Pro)</p>
<p><a href="https://www.404media.co/how-to-disable-meta-rayban-led-light/?ref=weekly-roundup-newsletter"><u>A $60 Mod to Meta’s Ray-Bans Disables Its Privacy-Protecting Recording Light</u></a> (404 Media)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1481</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d36b97d2-1c7a-11f0-85e0-63a7447c19dc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5311397358.mp3?updated=1761590620" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Derek Manky: Putting the rubber to the road. [Threat Intelligence] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/92/notes</link>
      <description>Please enjoy this encore of Career Notes.

Chief Security Strategist and VP of Global Threat Intelligence at FortiGuard Labs, Derek Manky, shares his story from programmer to cybersecurity and how it all came together. Derek started his career teaching programming because he had such a passion for it. When he joined Fortinet, Derek said putting where it "really started putting the rubber to the road and connecting my previous experience with programming and debugging and knowledge of operating systems and all that with real-world applications." Derek advises that it doesn't need to be complicated getting into the cybersecurity field and that there are many avenues to enter the field. He hopes to have made a real dent, or "hopefully a crater" in cyber crime when he ends his career. We thank Derek for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 26 Oct 2025 07:00:00 -0000</pubDate>
      <itunes:title>Derek Manky: Putting the rubber to the road. [Threat Intelligence] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>92</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c78d68e8-b0f7-11f0-98fe-a71110cc2614/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes.

Chief Security Strategist and VP of Global Threat Intelligence at FortiGuard Labs, Derek Manky, shares his story from programmer to cybersecurity and how it all came together. Derek started his career teaching programming because he had such a passion for it. When he joined Fortinet, Derek said putting where it "really started putting the rubber to the road and connecting my previous experience with programming and debugging and knowledge of operating systems and all that with real-world applications." Derek advises that it doesn't need to be complicated getting into the cybersecurity field and that there are many avenues to enter the field. He hopes to have made a real dent, or "hopefully a crater" in cyber crime when he ends his career. We thank Derek for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes.</p>
<p>Chief Security Strategist and VP of Global Threat Intelligence at FortiGuard Labs, Derek Manky, shares his story from programmer to cybersecurity and how it all came together. Derek started his career teaching programming because he had such a passion for it. When he joined Fortinet, Derek said putting where it "really started putting the rubber to the road and connecting my previous experience with programming and debugging and knowledge of operating systems and all that with real-world applications." Derek advises that it doesn't need to be complicated getting into the cybersecurity field and that there are many avenues to enter the field. He hopes to have made a real dent, or "hopefully a crater" in cyber crime when he ends his career. We thank Derek for sharing his story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>578</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c78d68e8-b0f7-11f0-98fe-a71110cc2614]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5570750888.mp3?updated=1735936618" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A look behind the lens. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/399/notes</link>
      <description>Noam Moshe, Claroty’s Vulnerability Research Team Lead, joins Dave to discuss Team 82's work on "Turning Camera Surveillance on its Axis." Team82 disclosed four vulnerabilities in Axis.Remoting—deserialization, a MiTM “pass-the-challenge” NTLMSSP flaw, and an unauthenticated fallback HTTP endpoint—that enable pre-auth remote code execution against Axis Device Manager and Axis Camera Station.
They found more than 6,500 Axis.Remoting services exposed online (over half in the U.S.), letting attackers enumerate targets, install malicious Axis packages, and hijack, view, or shut down managed camera fleets.Axis published an urgent advisory, issued patches for ADM 5.32, Camera Station 5.58 and Camera Station Pro 6.9, accepted Team82’s disclosure, and organizations are urged to update.

The research can be found here:


  Turning Camera Surveillance on its Axis


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Oct 2025 07:00:00 -0000</pubDate>
      <itunes:title>A look behind the lens. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>399</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a30c3544-b0f7-11f0-96d8-6f11ce495e1a/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Noam Moshe, Claroty’s Vulnerability Research Team Lead, joins Dave to discuss Team 82's work on "Turning Camera Surveillance on its Axis." Team82 disclosed four vulnerabilities in Axis.Remoting—deserialization, a MiTM “pass-the-challenge” NTLMSSP flaw, and an unauthenticated fallback HTTP endpoint—that enable pre-auth remote code execution against Axis Device Manager and Axis Camera Station.
They found more than 6,500 Axis.Remoting services exposed online (over half in the U.S.), letting attackers enumerate targets, install malicious Axis packages, and hijack, view, or shut down managed camera fleets.Axis published an urgent advisory, issued patches for ADM 5.32, Camera Station 5.58 and Camera Station Pro 6.9, accepted Team82’s disclosure, and organizations are urged to update.

The research can be found here:


  Turning Camera Surveillance on its Axis


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/noam-moshe-9b3a61200/">Noam Moshe</a>, <a href="https://www.linkedin.com/company/claroty/">Claroty</a>’s Vulnerability Research Team Lead, joins Dave to discuss Team 82's work on "Turning Camera Surveillance on its Axis." Team82 disclosed four vulnerabilities in Axis.Remoting—deserialization, a MiTM “pass-the-challenge” NTLMSSP flaw, and an unauthenticated fallback HTTP endpoint—that enable pre-auth remote code execution against Axis Device Manager and Axis Camera Station.<br>
They found more than 6,500 Axis.Remoting services exposed online (over half in the U.S.), letting attackers enumerate targets, install malicious Axis packages, and hijack, view, or shut down managed camera fleets.Axis published an urgent advisory, issued patches for ADM 5.32, Camera Station 5.58 and Camera Station Pro 6.9, accepted Team82’s disclosure, and organizations are urged to update.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://claroty.com/team82/research/turning-camera-surveillance-on-its-axis">Turning Camera Surveillance on its Axis</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1470</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a30c3544-b0f7-11f0-96d8-6f11ce495e1a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3544306183.mp3?updated=1761240597" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The spy who sold out.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2420/notes</link>
      <description>A former defense contractor is charged with attempting to sell trade secrets to Russia. Researchers uncover critical vulnerabilities in TP-Link routers. Microsoft patches a critical Windows Server Update Service flaw. CISA issues eight new ICS advisories. “Shadow Escape” targets LLMs database connections. Halloween-themed scams spike. Our guest is Chris Inglis, first National Cyber Director, speaking on cybercrime and the upcoming documentary on cyber war, "Midnight in the War Room". WhatsApp’s missing million-dollar exploit. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Chris Inglis, first National Cyber Director, speaking on cybercrime and the upcoming documentary on cyber war, "Midnight in the War Room" presented by Semperis. Learn more and check out the trailer.

Selected Reading

Hacking Lab Boss Charged with Seeking to Sell Secrets (Bloomberg)

Dark Covenant 3.0: Controlled Impunity and Russia’s Cybercriminals (Recorded Future)

New TP-Link Router Vulnerabilities: A Primer on Rooting Routers (Forescout)

Windows Server emergency patches fix WSUS bug with PoC exploit (Bleeping Computer)

CISA Releases Eight Industrial Control Systems Advisories (CISA)

Cyberattack on Russia’s food safety agency reportedly disrupts product shipments (The Record)

Shadow Escape 0-Click Attack in AI Assistants Puts Trillions of Records at Risk (Hackread)

Trick or Treat: Bitdefender Labs Uncovers Halloween Scams Flooding Inboxes and Feeds (Bitdefender)

Pwn2Own WhatsApp Hacker Says Exploit Privately Disclosed to Meta (SecurityWeek)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 24 Oct 2025 20:10:00 -0000</pubDate>
      <itunes:title>The spy who sold out.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2420</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A former defense contractor is charged with attempting to sell trade secrets to Russia. Researchers uncover critical vulnerabilities in TP-Link routers. Microsoft patches a critical Windows Server Update Service flaw. CISA issues eight new ICS advisories. “Shadow Escape” targets LLMs database connections. Halloween-themed scams spike. Our guest is Chris Inglis, first National Cyber Director, speaking on cybercrime and the upcoming documentary on cyber war, "Midnight in the War Room". WhatsApp’s missing million-dollar exploit. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Chris Inglis, first National Cyber Director, speaking on cybercrime and the upcoming documentary on cyber war, "Midnight in the War Room" presented by Semperis. Learn more and check out the trailer.

Selected Reading

Hacking Lab Boss Charged with Seeking to Sell Secrets (Bloomberg)

Dark Covenant 3.0: Controlled Impunity and Russia’s Cybercriminals (Recorded Future)

New TP-Link Router Vulnerabilities: A Primer on Rooting Routers (Forescout)

Windows Server emergency patches fix WSUS bug with PoC exploit (Bleeping Computer)

CISA Releases Eight Industrial Control Systems Advisories (CISA)

Cyberattack on Russia’s food safety agency reportedly disrupts product shipments (The Record)

Shadow Escape 0-Click Attack in AI Assistants Puts Trillions of Records at Risk (Hackread)

Trick or Treat: Bitdefender Labs Uncovers Halloween Scams Flooding Inboxes and Feeds (Bitdefender)

Pwn2Own WhatsApp Hacker Says Exploit Privately Disclosed to Meta (SecurityWeek)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A former defense contractor is charged with attempting to sell trade secrets to Russia. Researchers uncover critical vulnerabilities in TP-Link routers. Microsoft patches a critical Windows Server Update Service flaw. CISA issues eight new ICS advisories. “Shadow Escape” targets LLMs database connections. Halloween-themed scams spike. Our guest is Chris Inglis, first National Cyber Director, speaking on cybercrime and the upcoming documentary on cyber war, "Midnight in the War Room". WhatsApp’s missing million-dollar exploit.<strong> </strong></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://en.wikipedia.org/wiki/Chris_Inglis"><u>Chris Inglis</u></a>, first National Cyber Director, speaking on cybercrime and the upcoming documentary on cyber war, "<a href="https://www.semperis.com/midnight-in-the-war-room/"><u>Midnight in the War Room</u></a>" presented by <a href="https://www.semperis.com/"><u>Semperis</u></a>. <a href="https://www.prnewswire.com/news-releases/semperis-announces-midnight-in-the-war-room-a-groundbreaking-cyberwar-documentary-featuring-the-worlds-leading-defenders-and-reformed-hackers-302585863.html"><u>Learn more</u></a> and check out the trailer.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bloomberg.com/news/articles/2025-10-23/hacking-lab-boss-charged-with-seeking-to-sell-secrets-in-russia?accessToken=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzb3VyY2UiOiJTdWJzY3JpYmVyR2lmdGVkQXJ0aWNsZSIsImlhdCI6MTc2MTIzMzg2NSwiZXhwIjoxNzYxODM4NjY1LCJhcnRpY2xlSWQiOiJUNEw1VzlHUDlWRDgwMCIsImJjb25uZWN0SWQiOiJEMjM4MzQxMTU5NTI0RjM2QkU1RUMxOTJFMDkxMTNFNCJ9.Aa3Q0vgSAMRVz_9mKzBw-tpHji_g8_DFIxnmL6ztVpg"><u>Hacking Lab Boss Charged with Seeking to Sell Secrets</u></a> (Bloomberg)</p>
<p><a href="https://www.recordedfuture.com/research/dark-covenant-3-controlled-impunity-and-russias-cybercriminals"><u>Dark Covenant 3.0: Controlled Impunity and Russia’s Cybercriminals</u></a> (Recorded Future)</p>
<p><a href="https://www.forescout.com/blog/new-tp-link-router-vulnerabilities-a-primer-on-rooting-routers/"><u>New TP-Link Router Vulnerabilities: A Primer on Rooting Routers</u></a> (Forescout)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/microsoft-releases-windows-server-emergency-updates-for-critical-wsus-rce-flaw/"><u>Windows Server emergency patches fix WSUS bug with PoC exploit</u></a> (Bleeping Computer)</p>
<p><a href="https://www.cisa.gov/news-events/alerts/2025/10/23/cisa-releases-eight-industrial-control-systems-advisories"><u>CISA Releases Eight Industrial Control Systems Advisories</u></a> (CISA)</p>
<p><a href="https://therecord.media/russia-food-safety-agency-rosselkhoznadzor-ddos-attack"><u>Cyberattack on Russia’s food safety agency reportedly disrupts product shipments</u></a> (The Record)</p>
<p><a href="https://hackread.com/shadow-escape-0-click-attack-ai-assistants-risk/"><u>Shadow Escape 0-Click Attack in AI Assistants Puts Trillions of Records at Risk</u></a> (Hackread)</p>
<p><a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/bitdefender-labs-uncovers-halloween-scams-flooding-inboxes-and-feeds"><u>Trick or Treat: Bitdefender Labs Uncovers Halloween Scams Flooding Inboxes and Feeds</u></a> (Bitdefender)</p>
<p><a href="https://www.securityweek.com/pwn2own-whatsapp-hacker-says-exploit-privately-reported-to-meta/"><u>Pwn2Own WhatsApp Hacker Says Exploit Privately Disclosed to Meta</u></a> (SecurityWeek)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1732</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d3428ba8-1c7a-11f0-85e0-2f25e3f7414c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5093338481.mp3?updated=1761330971" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber solidarity on the chopping block.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2419/notes</link>
      <description>CISA Layoffs threaten U.S. cyber coordination with states, businesses, and foreign partners. Google issues its second emergency Chrome update in a week, and puts Privacy Sandbox out of its misery. OpenAI’s new browser proves vulnerable to indirect prompt injection. SpaceX disables Starlink devices used by scam compounds. Reddit sues alleged data scrapers. Blue Cross Blue Shield of Montana suffers a data breach. A new Android infostealer abuses termux to exfiltrate data. Iran’s MuddyWater deploys a wide-ranging middle east espionage campaign. We’re joined by Lauren Zabierek and Camille Stewart Gloster discussing the next evolution of #ShareTheMicInCyber. When customer service fails, try human resources.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Lauren Zabierek and Camille Stewart Gloster, as they are discussing the next evolution of #ShareTheMicInCyber. 

Selected Reading

CISA’s international, industry and academic partnerships slashed (Cybersecurity Dive)

Google releases emergency security update for Chrome V8 Engine flaw (Beyond Machines)

Google officially shuts down Privacy Sandbox (Search Engine Land)

OpenAI defends Atlas as prompt injection attacks surface (The Register)

SpaceX disables more than 2,000 Starlink devices used in Myanmar scam compounds (The Record)

Reddit Accuses ‘Data Scraper’ Companies of Theft (The New York Times)

Blue Cross Blue Shield of Montana under investigation for data breach (NBC Montana)

Infostealer Targeting Android Devices  (SANS ISC)

Iranian hackers targeted over 100 govt orgs with Phoenix backdoor (Bleeping Computer)

This Guy Noticed A Data Breach With A Company But Couldn’t Get Them To Respond, So He Infiltrated His Way Into An Interview To Drop The News (TwistedSifter) 

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 23 Oct 2025 20:10:00 -0000</pubDate>
      <itunes:title>Cyber solidarity on the chopping block.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2419</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA Layoffs threaten U.S. cyber coordination with states, businesses, and foreign partners. Google issues its second emergency Chrome update in a week, and puts Privacy Sandbox out of its misery. OpenAI’s new browser proves vulnerable to indirect prompt injection. SpaceX disables Starlink devices used by scam compounds. Reddit sues alleged data scrapers. Blue Cross Blue Shield of Montana suffers a data breach. A new Android infostealer abuses termux to exfiltrate data. Iran’s MuddyWater deploys a wide-ranging middle east espionage campaign. We’re joined by Lauren Zabierek and Camille Stewart Gloster discussing the next evolution of #ShareTheMicInCyber. When customer service fails, try human resources.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Lauren Zabierek and Camille Stewart Gloster, as they are discussing the next evolution of #ShareTheMicInCyber. 

Selected Reading

CISA’s international, industry and academic partnerships slashed (Cybersecurity Dive)

Google releases emergency security update for Chrome V8 Engine flaw (Beyond Machines)

Google officially shuts down Privacy Sandbox (Search Engine Land)

OpenAI defends Atlas as prompt injection attacks surface (The Register)

SpaceX disables more than 2,000 Starlink devices used in Myanmar scam compounds (The Record)

Reddit Accuses ‘Data Scraper’ Companies of Theft (The New York Times)

Blue Cross Blue Shield of Montana under investigation for data breach (NBC Montana)

Infostealer Targeting Android Devices  (SANS ISC)

Iranian hackers targeted over 100 govt orgs with Phoenix backdoor (Bleeping Computer)

This Guy Noticed A Data Breach With A Company But Couldn’t Get Them To Respond, So He Infiltrated His Way Into An Interview To Drop The News (TwistedSifter) 

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA Layoffs threaten U.S. cyber coordination with states, businesses, and foreign partners. Google issues its second emergency Chrome update in a week, and puts Privacy Sandbox out of its misery. OpenAI’s new browser proves vulnerable to indirect prompt injection. SpaceX disables Starlink devices used by scam compounds. Reddit sues alleged data scrapers. Blue Cross Blue Shield of Montana suffers a data breach. A new Android infostealer abuses termux to exfiltrate data. Iran’s MuddyWater deploys a wide-ranging middle east espionage campaign. We’re joined by Lauren Zabierek and Camille Stewart Gloster discussing the next evolution of #ShareTheMicInCyber. When customer service fails, try human resources.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/laurenz1010/"><u>Lauren Zabierek</u></a> and <a href="https://www.linkedin.com/in/camillestewartesq/"><u>Camille Stewart Gloster</u></a>, as they are discussing the next evolution of <a href="https://www.newamerica.org/future-security/stmic-fellowship/blog-posts/beyond-the-sharethemicincyber-fellowship-at-new-america/"><u>#ShareTheMicInCyber</u></a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.cybersecuritydive.com/news/cisa-stakeholder-engagement-division-layoffs-critical-infrastructure-international/803433"><u>CISA’s international, industry and academic partnerships slashed</u></a> (Cybersecurity Dive)</p>
<p><a href="https://beyondmachines.net/event_details/google-releases-emergency-security-update-for-chrome-v8-engine-flaw-n-f-j-i-c/gD2P6Ple2L"><u>Google releases emergency security update for Chrome V8 Engine flaw</u></a> (Beyond Machines)</p>
<p><a href="https://searchengineland.com/google-officially-shuts-down-privacy-sandbox-463561"><u>Google officially shuts down Privacy Sandbox</u></a> (Search Engine Land)</p>
<p><a href="https://www.theregister.com/2025/10/22/openai_defends_atlas_as_prompt/"><u>OpenAI defends Atlas as prompt injection attacks surface</u></a> (The Register)</p>
<p><a href="https://therecord.media/spacex-disables-starlink-kits-in-myanmar-scam-compounds"><u>SpaceX disables more than 2,000 Starlink devices used in Myanmar scam compounds</u></a> (The Record)</p>
<p><a href="https://www.nytimes.com/2025/10/22/technology/reddit-data-scrapers-perplexity-theft.html"><u>Reddit Accuses ‘Data Scraper’ Companies of Theft</u> </a>(The New York Times)</p>
<p><a href="https://nbcmontana.com/news/local/blue-cross-blue-shield-of-montana-under-investigation-for-data-breach"><u>Blue Cross Blue Shield of Montana under investigation for data breach</u></a> (NBC Montana)</p>
<p><a href="https://isc.sans.edu/diary/32414"><u>Infostealer Targeting Android Devices </u></a> (SANS ISC)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/iranian-hackers-targeted-over-100-govt-orgs-with-phoenix-backdoor"><u>Iranian hackers targeted over 100 govt orgs with Phoenix backdoor</u></a> (Bleeping Computer)</p>
<p><a href="https://twistedsifter.com/2025/10/this-guy-noticed-a-data-breach-with-a-company-but-couldnt-get-them-to-respond-so-he-infiltrated-his-way-into-an-interview-to-drop-the-news/"><u>This Guy Noticed A Data Breach With A Company But Couldn’t Get Them To Respond, So He Infiltrated His Way Into An Interview To Drop The News</u> </a>(TwistedSifter) </p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1704</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d31b0484-1c7a-11f0-85e0-e77e8c2d88ac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9523798686.mp3?updated=1761244903" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hackers peek behind the nuclear curtain.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2418/notes</link>
      <description>A foreign threat actor breached a key U.S. nuclear weapons manufacturing site. The cyberattack on Jaguar Land Rover is the most financially damaging cyber incident in UK history. A new report from Microsoft’ warns that AI is reshaping cybersecurity at an unprecedented pace. The ToolShell vulnerability fuels Chinese cyber operations across four continents. Fake browser updates are spreading RansomHub, LockBit, and data-stealing malware. Hackers deface LA Metro bus stop displays. A Spyware developer is warned by Apple of a mercenary spyware attack. Pwn2Own payouts proceed. Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies on a Federal Whistle Blower from the SSA. When the cloud goes down, beds heat up. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies on a Federal Whistle Blower from the SSA. If you enjoyed Ben’s conversation, be sure to check out more from him over on the Caveat Podcast. 

2025 Microsoft Digital Defense Report

To learn more about the 2025 Microsoft Digital Defense Report, join our partners on The Microsoft Threat Intelligence Podcast. On today’s episode, host Sherrod DeGrippo is joined by Chloé Messdaghi and Crane Hassold to unpack the key findings of the 2025 Microsoft Digital Defense Report; a comprehensive look at how the cyber threat landscape is accelerating through AI, automation, and industrialized criminal networks. You can listen to new episodes of The Microsoft Threat Intelligence Podcast every other Wednesday on your favorite podcast app. 

Selected Reading

Foreign hackers breached a US nuclear weapons plant via SharePoint flaws (CSO Online)

JLR hack is costliest cyber attack in UK history, say analysts (BBC)

Microsoft 2025 digital defense report flags rising AI-driven threats, forces rethink of traditional defenses (Industrial Cyber)

The New Frontlines of Cybersecurity: Lessons from the 2025 Digital Defense Report (The Microsoft Threat Intelligence Podcast)  

Sharepoint ToolShell attacks targeted orgs across four continents (Bleeping Computer)

SocGholish Malware Using Compromised Sites to gDeliver Ransomware (Hackread)

LA Metro digital signs taken over by hackers (KTLA)

Apple alerts exploit developer that his iPhone was targeted with government spyware (TechCrunch)

Hackers Earn Over $520,000 on First Day of Pwn2Own Ireland 2025 (SecurityWeek)

AWS crash causes $2,000 Smart Beds to overheat and get stuck upright (Dexerto)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 22 Oct 2025 20:10:00 -0000</pubDate>
      <itunes:title>Hackers peek behind the nuclear curtain.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2418</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A foreign threat actor breached a key U.S. nuclear weapons manufacturing site. The cyberattack on Jaguar Land Rover is the most financially damaging cyber incident in UK history. A new report from Microsoft’ warns that AI is reshaping cybersecurity at an unprecedented pace. The ToolShell vulnerability fuels Chinese cyber operations across four continents. Fake browser updates are spreading RansomHub, LockBit, and data-stealing malware. Hackers deface LA Metro bus stop displays. A Spyware developer is warned by Apple of a mercenary spyware attack. Pwn2Own payouts proceed. Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies on a Federal Whistle Blower from the SSA. When the cloud goes down, beds heat up. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies on a Federal Whistle Blower from the SSA. If you enjoyed Ben’s conversation, be sure to check out more from him over on the Caveat Podcast. 

2025 Microsoft Digital Defense Report

To learn more about the 2025 Microsoft Digital Defense Report, join our partners on The Microsoft Threat Intelligence Podcast. On today’s episode, host Sherrod DeGrippo is joined by Chloé Messdaghi and Crane Hassold to unpack the key findings of the 2025 Microsoft Digital Defense Report; a comprehensive look at how the cyber threat landscape is accelerating through AI, automation, and industrialized criminal networks. You can listen to new episodes of The Microsoft Threat Intelligence Podcast every other Wednesday on your favorite podcast app. 

Selected Reading

Foreign hackers breached a US nuclear weapons plant via SharePoint flaws (CSO Online)

JLR hack is costliest cyber attack in UK history, say analysts (BBC)

Microsoft 2025 digital defense report flags rising AI-driven threats, forces rethink of traditional defenses (Industrial Cyber)

The New Frontlines of Cybersecurity: Lessons from the 2025 Digital Defense Report (The Microsoft Threat Intelligence Podcast)  

Sharepoint ToolShell attacks targeted orgs across four continents (Bleeping Computer)

SocGholish Malware Using Compromised Sites to gDeliver Ransomware (Hackread)

LA Metro digital signs taken over by hackers (KTLA)

Apple alerts exploit developer that his iPhone was targeted with government spyware (TechCrunch)

Hackers Earn Over $520,000 on First Day of Pwn2Own Ireland 2025 (SecurityWeek)

AWS crash causes $2,000 Smart Beds to overheat and get stuck upright (Dexerto)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A foreign threat actor breached a key U.S. nuclear weapons manufacturing site. The cyberattack on Jaguar Land Rover is the most financially damaging cyber incident in UK history. A new report from Microsoft’ warns that AI is reshaping cybersecurity at an unprecedented pace. The ToolShell vulnerability fuels Chinese cyber operations across four continents. Fake browser updates are spreading RansomHub, LockBit, and data-stealing malware. Hackers deface LA Metro bus stop displays. A Spyware developer is warned by Apple of a mercenary spyware attack. Pwn2Own payouts proceed. Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies on a Federal Whistle Blower from the SSA. When the cloud goes down, beds heat up. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/benjamin-yelin-5b14114b/"><u>Ben Yelin</u></a> from <a href="https://www.linkedin.com/company/university-of-maryland-center-for-cyber-health-and-hazard-strategies/"><u>University of Maryland Center for Cyber Health and Hazard Strategies</u></a> on a Federal Whistle Blower from the SSA. If you enjoyed Ben’s conversation, be sure to check out more from him over on the <a href="https://thecyberwire.com/podcasts/caveat"><u>Caveat</u></a> Podcast. </p>
<p><strong>2025 Microsoft Digital Defense Report</strong></p>
<p>To learn more about the 2025 Microsoft Digital Defense Report, join our partners on The Microsoft Threat Intelligence Podcast. <a href="https://thecyberwire.com/podcasts/microsoft-threat-intelligence/55/notes"><u>On today’s episode</u></a>, host Sherrod DeGrippo is joined by Chloé Messdaghi and Crane Hassold to unpack the key findings of the 2025 Microsoft Digital Defense Report; a comprehensive look at how the cyber threat landscape is accelerating through AI, automation, and industrialized criminal networks. You can listen to new episodes of <a href="https://thecyberwire.com/podcasts/microsoft-threat-intelligence"><u>The Microsoft Threat Intelligence Podcast</u></a> every other Wednesday on your favorite podcast app. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.csoonline.com/article/4074962/foreign-hackers-breached-a-us-nuclear-weapons-plant-via-sharepoint-flaws.html"><u>Foreign hackers breached a US nuclear weapons plant via SharePoint flaws</u> </a>(CSO Online)</p>
<p><a href="https://www.bbc.com/news/articles/cy9pdld4y81o"><u>JLR hack is costliest cyber attack in UK history, say analysts</u></a> (BBC)</p>
<p><a href="https://industrialcyber.co/reports/microsoft-2025-digital-defense-report-flags-rising-ai-driven-threats-forces-rethink-of-traditional-defenses/"><u>Microsoft 2025 digital defense report flags rising AI-driven threats, forces rethink of traditional defenses</u> </a>(Industrial Cyber)</p>
<p><a href="https://thecyberwire.com/podcasts/microsoft-threat-intelligence/55/notes"><u>The New Frontlines of Cybersecurity: Lessons from the 2025 Digital Defense Report</u></a> (The Microsoft Threat Intelligence Podcast)  </p>
<p><a href="https://www.bleepingcomputer.com/news/security/sharepoint-toolshell-attacks-targeted-orgs-across-four-continents/"><u>Sharepoint ToolShell attacks targeted orgs across four continents</u></a> (Bleeping Computer)</p>
<p><a href="https://hackread.com/socgholish-malware-compromised-sites-ransomware/"><u>SocGholish Malware Using Compromised Sites to gDeliver Ransomware</u> </a>(Hackread)</p>
<p><a href="https://ktla.com/news/california/la-metro-digital-signs-taken-over-by-hackers/"><u>LA Metro digital signs taken over by hackers</u> </a>(KTLA)</p>
<p><a href="https://techcrunch.com/2025/10/21/apple-alerts-exploit-developer-that-his-iphone-was-targeted-with-government-spyware/"><u>Apple alerts exploit developer that his iPhone was targeted with government spyware</u> </a>(TechCrunch)</p>
<p><a href="https://www.securityweek.com/hackers-earn-over-520000-on-first-day-of-pwn2own-ireland-2025/"><u>Hackers Earn Over $520,000 on First Day of Pwn2Own Ireland 2025 </u></a>(SecurityWeek)</p>
<p><a href="https://www.dexerto.com/entertainment/aws-crash-causes-2000-smart-beds-to-overheat-and-get-stuck-upright-3272251/"><u>AWS crash causes $2,000 Smart Beds to overheat and get stuck upright</u></a> (Dexerto)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1436</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d2f48502-1c7a-11f0-85e0-f37a4c44df4e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9772172240.mp3?updated=1761159036" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The SMB slip-up.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2417/notes</link>
      <description>CISA warns a Windows SMB privilege escalation flaw is under Active exploitation. Microsoft issues an out of band fix for a WinRE USB input failure. Nation state hackers had long term access to F5. Envoy Air confirms it was hit by the zero-day in Oracle’s E-Business Suite. A nonprofit hospital system in Massachusetts suffers a cyberattack. Russian’s COLDRiver group rapidly retools its malware arsenal. GlassWorm malware hides malicious logic with invisible Unicode characters. European authorities dismantle a large-scale Latvian SIM farm operation. Myanmar’s military raids a notorious cybercrime hub. Josh Kamdjou, from Sublime Security discusses how teams should get ahead of Scattered Spider's next move. Eagle Scouts are soaring into cyberspace.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Josh Kamdjou, CEO and co-founder of Sublime Security and former DOD white hat hacker, is discussing how teams should get ahead of Scattered Spider's next move.

Selected Reading

CISA warns of active exploitation of Windows SMB privilege escalation flaw (Beyond Machines)

Windows 11 KB5070773 emergency update fixes Windows Recovery issues (Bleeping Computer)

Hackers Had Been Lurking in Cyber Firm F5 Systems Since 2023 (Bloomberg)

Envoy Air (American Airlines) Confirms Oracle EBS 0-Day Breach Linked to Cl0p (Hackread)

Cyberattack Disrupts Services at 2 Massachusetts Hospitals (BankInfo Security)

Russian Coldriver Hackers Deploy New ‘NoRobot’ Malware (Infosecurity Magazine)

Self-spreading GlassWorm malware hits OpenVSX, VS Code registries (Bleeping Computer)

Police Shutter SIM Farm Provider in Latvia, Bust 7 Suspects (Data Breach Today)

Myanmar Military Shuts Down Major Cybercrime Center and Detains Over 2,000 People (SecurityWeek)

Scouts will now be able to earn badges in AI and cybersecurity (CNN Business)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Oct 2025 20:10:00 -0000</pubDate>
      <itunes:title>The SMB slip-up.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2417</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA warns a Windows SMB privilege escalation flaw is under Active exploitation. Microsoft issues an out of band fix for a WinRE USB input failure. Nation state hackers had long term access to F5. Envoy Air confirms it was hit by the zero-day in Oracle’s E-Business Suite. A nonprofit hospital system in Massachusetts suffers a cyberattack. Russian’s COLDRiver group rapidly retools its malware arsenal. GlassWorm malware hides malicious logic with invisible Unicode characters. European authorities dismantle a large-scale Latvian SIM farm operation. Myanmar’s military raids a notorious cybercrime hub. Josh Kamdjou, from Sublime Security discusses how teams should get ahead of Scattered Spider's next move. Eagle Scouts are soaring into cyberspace.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Josh Kamdjou, CEO and co-founder of Sublime Security and former DOD white hat hacker, is discussing how teams should get ahead of Scattered Spider's next move.

Selected Reading

CISA warns of active exploitation of Windows SMB privilege escalation flaw (Beyond Machines)

Windows 11 KB5070773 emergency update fixes Windows Recovery issues (Bleeping Computer)

Hackers Had Been Lurking in Cyber Firm F5 Systems Since 2023 (Bloomberg)

Envoy Air (American Airlines) Confirms Oracle EBS 0-Day Breach Linked to Cl0p (Hackread)

Cyberattack Disrupts Services at 2 Massachusetts Hospitals (BankInfo Security)

Russian Coldriver Hackers Deploy New ‘NoRobot’ Malware (Infosecurity Magazine)

Self-spreading GlassWorm malware hits OpenVSX, VS Code registries (Bleeping Computer)

Police Shutter SIM Farm Provider in Latvia, Bust 7 Suspects (Data Breach Today)

Myanmar Military Shuts Down Major Cybercrime Center and Detains Over 2,000 People (SecurityWeek)

Scouts will now be able to earn badges in AI and cybersecurity (CNN Business)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA warns a Windows SMB privilege escalation flaw is under Active exploitation. Microsoft issues an out of band fix for a WinRE USB input failure. Nation state hackers had long term access to F5. Envoy Air confirms it was hit by the zero-day in Oracle’s E-Business Suite. A nonprofit hospital system in Massachusetts suffers a cyberattack. Russian’s COLDRiver group rapidly retools its malware arsenal. GlassWorm malware hides malicious logic with invisible Unicode characters. European authorities dismantle a large-scale Latvian SIM farm operation. Myanmar’s military raids a notorious cybercrime hub. Josh Kamdjou, from Sublime Security discusses how teams should get ahead of Scattered Spider's next move. Eagle Scouts are soaring into cyberspace.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p><a href="https://www.linkedin.com/in/jkamdjou/"><u>Josh Kamdjou</u></a>, CEO and co-founder of <a href="https://www.linkedin.com/company/sublime-security/"><u>Sublime Security</u></a> and former DOD white hat hacker, is discussing how teams should get ahead of Scattered Spider's next move.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://beyondmachines.net/event_details/cisa-warns-of-active-exploitation-of-windows-smb-privilege-escalation-flaw-5-t-9-m-5/gD2P6Ple2L"><u>CISA warns of active exploitation of Windows SMB privilege escalation flaw</u></a> (Beyond Machines)</p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-usb-issue-that-made-windows-recovery-unusable/"><u>Windows 11 KB5070773 emergency update fixes Windows Recovery issues</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bloomberg.com/news/articles/2025-10-18/hackers-had-been-lurking-in-cyber-firm-f5-systems-since-2023"><u>Hackers Had Been Lurking in Cyber Firm F5 Systems Since 2023</u></a> (Bloomberg)</p>
<p><a href="https://hackread.com/envoy-air-american-airlines-oracle-ebs-0-day-breach-cl0p/"><u>Envoy Air (American Airlines) Confirms Oracle EBS 0-Day Breach Linked to Cl0p</u></a> (Hackread)</p>
<p><a href="https://www.bankinfosecurity.com/cyberattack-disrupts-services-at-2-massachusetts-hospitals-a-29765"><u>Cyberattack Disrupts Services at 2 Massachusetts Hospitals</u></a> (BankInfo Security)</p>
<p><a href="https://www.infosecurity-magazine.com/news/russian-coldriver-hackers-new/"><u>Russian Coldriver Hackers Deploy New ‘NoRobot’ Malware</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/self-spreading-glassworm-malware-hits-openvsx-vs-code-registries/"><u>Self-spreading GlassWorm malware hits OpenVSX, VS Code registries</u></a> (Bleeping Computer)</p>
<p><a href="https://www.databreachtoday.com/police-shutter-sim-farm-provider-in-latvia-bust-7-suspects-a-29762"><u>Police Shutter SIM Farm Provider in Latvia, Bust 7 Suspects</u></a> (Data Breach Today)</p>
<p><a href="https://www.securityweek.com/myanmar-military-shuts-down-major-cybercrime-center-and-detains-over-2000-people/"><u>Myanmar Military Shuts Down Major Cybercrime Center and Detains Over 2,000 People</u></a> (SecurityWeek)</p>
<p><br><a href="https://www.cnn.com/2025/10/14/tech/scouting-america-ai-cybersecurity-merit-badges"><u>Scouts will now be able to earn badges in AI and cybersecurity</u></a> (CNN Business)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1739</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d2cd43de-1c7a-11f0-85e0-e38c710f7723]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4284992572.mp3?updated=1761072271" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Regulation takeaways with Ethan Cook. [CISO Perspectives]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/113/notes</link>
      <description>On this episode, host Kim Jones is joined by Ethan Cook, N2K’s lead analyst and editor, for a deeper, more reflective conversation on cybersecurity regulation, privacy, and the future of policy. This episode steps back from the news cycle to connect the dots and explore where the regulatory landscape is heading — and why it matters.

Ethan, who will join the show regularly this season to provide big-picture analysis after major policy conversations, shares his perspective on the evolving balance between government oversight, innovation, and individual responsibility.

This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about Meter.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Oct 2025 06:00:00 -0000</pubDate>
      <itunes:title>Regulation takeaways with Ethan Cook. [CISO Perspectives]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>113</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a5b3d982-ade6-11f0-9244-83ae0821c9f6/image/bed1487d4770d4dc046135517c6d5ca5.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this episode, host Kim Jones is joined by Ethan Cook, N2K’s lead analyst and editor, for a deeper, more reflective conversation on cybersecurity regulation, privacy, and the future of policy. This episode steps back from the news cycle to connect the dots and explore where the regulatory landscape is heading — and why it matters.

Ethan, who will join the show regularly this season to provide big-picture analysis after major policy conversations, shares his perspective on the evolving balance between government oversight, innovation, and individual responsibility.

This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about Meter.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this episode, host Kim Jones is joined by Ethan Cook, N2K’s lead analyst and editor, for a deeper, more reflective conversation on cybersecurity regulation, privacy, and the future of policy. This episode steps back from the news cycle to connect the dots and explore where the regulatory landscape is heading — and why it matters.</p>
<p>Ethan, who will join the show regularly this season to provide big-picture analysis after major policy conversations, shares his perspective on the evolving balance between government oversight, innovation, and individual responsibility.</p>
<p>This episode of N2K Pro's CISO Perspectives podcast is brought to you by our sponsor, Meter. Meter provides a full-stack, enterprise-grade networking solution—wired, wireless, and cellular—designed, deployed, and managed end-to-end. From hardware to software, ISP to security, Meter delivers seamless, secure, and scalable connectivity for modern business environments. Learn more about <a href="http://meter.com/cisop">Meter</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2483</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a5b3d982-ade6-11f0-9244-83ae0821c9f6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8282674400.mp3?updated=1762892473" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The day the cloud got foggy.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2416/notes</link>
      <description>An AWS outage sparks speculation. An F5 exposure and breach raise patching and supply-chain concerns. Salt Typhoon breaches a European telecom via a Netscaler flaw. A judge bans NSO Group from Whatsapp. China alleges “irrefutable evidence” of NSA hacking. Connectwise patches adversary in the middle risks. A Dolby decoder flaw enables zero-click remote code execution on Android. A Cyber M&amp;A and funding surge signals a busy consolidation cycle.  Our guest Jeff Collins, CEO of WanAware, sharing how hospital consolidations are reshaping IT asset visibility and what it takes to close these gaps. One man’s quest to make AI art legit. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Jeff Collins, CEO of WanAware, sharing how hospital consolidations are reshaping IT asset visibility and what it takes to close these gaps.

Selected Reading

Cyberattack: Did China just bring Amazon down, along with Robinhood, Snapchat - what happened? Here's what experts are saying (The Economic Times)

F5 breach exposes 262,000 BIG-IP systems worldwide (Security Affairs)

Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack (Infosecurity Magazine)

Israeli spyware company blocked from WhatsApp (Courthouse News Service)

China Says It Found Evidence of US Cyber Attack on State Agency (Bloomberg)

ConnectWise Patches Critical Flaw in Automate RMM Tool (SecurityWeek)

Vulnerability in Dolby Decoder Can Allow Zero-Click Attacks (SecurityWeek)

NSO Group acquired by American investors. LevelBlue to acquire Cybereason. (N2K Pro Business Briefing)

Creator of Infamous AI Painting Tells Court He's a Real Artist (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 20 Oct 2025 20:10:00 -0000</pubDate>
      <itunes:title>The day the cloud got foggy.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2416</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>An AWS outage sparks speculation. An F5 exposure and breach raise patching and supply-chain concerns. Salt Typhoon breaches a European telecom via a Netscaler flaw. A judge bans NSO Group from Whatsapp. China alleges “irrefutable evidence” of NSA hacking. Connectwise patches adversary in the middle risks. A Dolby decoder flaw enables zero-click remote code execution on Android. A Cyber M&amp;A and funding surge signals a busy consolidation cycle.  Our guest Jeff Collins, CEO of WanAware, sharing how hospital consolidations are reshaping IT asset visibility and what it takes to close these gaps. One man’s quest to make AI art legit. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Jeff Collins, CEO of WanAware, sharing how hospital consolidations are reshaping IT asset visibility and what it takes to close these gaps.

Selected Reading

Cyberattack: Did China just bring Amazon down, along with Robinhood, Snapchat - what happened? Here's what experts are saying (The Economic Times)

F5 breach exposes 262,000 BIG-IP systems worldwide (Security Affairs)

Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack (Infosecurity Magazine)

Israeli spyware company blocked from WhatsApp (Courthouse News Service)

China Says It Found Evidence of US Cyber Attack on State Agency (Bloomberg)

ConnectWise Patches Critical Flaw in Automate RMM Tool (SecurityWeek)

Vulnerability in Dolby Decoder Can Allow Zero-Click Attacks (SecurityWeek)

NSO Group acquired by American investors. LevelBlue to acquire Cybereason. (N2K Pro Business Briefing)

Creator of Infamous AI Painting Tells Court He's a Real Artist (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An AWS outage sparks speculation. An F5 exposure and breach raise patching and supply-chain concerns. Salt Typhoon breaches a European telecom via a Netscaler flaw. A judge bans NSO Group from Whatsapp. China alleges “irrefutable evidence” of NSA hacking. Connectwise patches adversary in the middle risks. A Dolby decoder flaw enables zero-click remote code execution on Android. A Cyber M&amp;A and funding surge signals a busy consolidation cycle.  Our guest Jeff Collins, CEO of WanAware, sharing how hospital consolidations are reshaping IT asset visibility and what it takes to close these gaps. One man’s quest to make AI art legit. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/jmcollins/"><u>Jeff Collins</u></a>, CEO of <a href="https://www.linkedin.com/company/wanaware/"><u>WanAware</u></a>, sharing how hospital consolidations are reshaping IT asset visibility and what it takes to close these gaps.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://economictimes.indiatimes.com/news/international/us/amazon-robinhood-snapchat-cloud-crash-cyberattack-today-aws-outage-explained-did-china-just-bring-amazon-down-along-with-robinhood-snapchat-what-happened-heres-what-experts-are-saying/articleshow/124702482.cms?from=mdr"><u>Cyberattack: Did China just bring Amazon down, along with Robinhood, Snapchat - what happened? Here's what experts are saying</u> </a>(The Economic Times)</p>
<p><a href="https://securityaffairs.com/183606/security/f5-breach-exposes-262000-big-ip-systems-worldwide.html"><u>F5 breach exposes 262,000 BIG-IP systems worldwide</u></a> (Security Affairs)</p>
<p><a href="https://www.infosecurity-magazine.com/news/salt-typhoon-citrix-flaw-cyber/"><u>Salt Typhoon Uses Citrix Flaw in Global Cyber-Attack</u> </a>(Infosecurity Magazine)</p>
<p><a href="https://courthousenews.com/israeli-spyware-company-blocked-from-whatsapp/"><u>Israeli spyware company blocked from WhatsApp</u> </a>(Courthouse News Service)</p>
<p><a href="https://www.bloomberg.com/news/articles/2025-10-19/china-says-it-found-evidence-of-us-cyber-attack-on-state-agency"><u>China Says It Found Evidence of US Cyber Attack on State Agency</u> </a>(Bloomberg)</p>
<p><a href="https://www.securityweek.com/connectwise-patches-critical-flaw-in-automate-rmm-tool/"><u>ConnectWise Patches Critical Flaw in Automate RMM Tool</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/vulnerability-in-dolby-decoder-can-allow-zero-click-attacks/"><u>Vulnerability in Dolby Decoder Can Allow Zero-Click Attacks</u> </a>(SecurityWeek)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/7/41"><u>NSO Group acquired by American investors. LevelBlue to acquire Cybereason.</u></a> (N2K Pro Business Briefing)</p>
<p><a href="https://www.404media.co/creator-of-infamous-ai-painting-tells-court-hes-a-real-artist/"><u>Creator of Infamous AI Painting Tells Court He's a Real Artist</u></a> (404 Media)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1879</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d2a61c14-1c7a-11f0-85e0-cfe6c1ac762e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2313254328.mp3?updated=1760986016" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kristin Strand: Be firm in your goals. [Consultant] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/91/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Cybersecurity Associate Consultant at BARR Advisory, Kristin Strand, shares her journey from the military to teaching and now to cybersecurity. Kristin shares how she'd wanted to be a teacher since she was young. She joined the Army to help pay for college and throughout her career has taken advantage of programs to help her move on to her next challenge. From teaching, Kristin decided to transition to IT and came to cybersecurity through a Department of Labor program. She's also currently training to be a drill sergeant. Kristin advises you stand firm to your goals and know what you want. It will come around. We thank Kristin for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 19 Oct 2025 07:00:00 -0000</pubDate>
      <itunes:title>Kristin Strand: Be firm in your goals. [Consultant] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>91</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/fa7e5c4a-ab79-11f0-91ee-33c505c1259d/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Cybersecurity Associate Consultant at BARR Advisory, Kristin Strand, shares her journey from the military to teaching and now to cybersecurity. Kristin shares how she'd wanted to be a teacher since she was young. She joined the Army to help pay for college and throughout her career has taken advantage of programs to help her move on to her next challenge. From teaching, Kristin decided to transition to IT and came to cybersecurity through a Department of Labor program. She's also currently training to be a drill sergeant. Kristin advises you stand firm to your goals and know what you want. It will come around. We thank Kristin for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Cybersecurity Associate Consultant at BARR Advisory, Kristin Strand, shares her journey from the military to teaching and now to cybersecurity. Kristin shares how she'd wanted to be a teacher since she was young. She joined the Army to help pay for college and throughout her career has taken advantage of programs to help her move on to her next challenge. From teaching, Kristin decided to transition to IT and came to cybersecurity through a Department of Labor program. She's also currently training to be a drill sergeant. Kristin advises you stand firm to your goals and know what you want. It will come around. We thank Kristin for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>476</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fa7e5c4a-ab79-11f0-91ee-33c505c1259d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4015297596.mp3?updated=1735936618" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Smile for the malware. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/398/notes</link>
      <description>Eclypsium researchers Jesse Michael and Mickey Shkatov to share their work on "BadCam - Now Weaponizing Linux Webcams." Eclypsium researchers disclosed “BadCam,” a set of vulnerabilities in certain Lenovo USB webcams that run Linux and do not validate firmware signatures, allowing attackers to reflash the devices and turn them into BadUSB-style tools. 

An adversary who supplies a backdoored camera or who gains remote code execution on a host can weaponize the webcam to emulate human-interface devices, inject keystrokes, deliver payloads, and maintain persistence — even re-infecting systems after OS reinstalls. The findings were presented at DEF CON 2025, Lenovo issued updated firmware/tools in coordination with SigmaStar, and researchers warn the same vector could affect other Linux-based USB peripherals, underscoring the need for firmware signing and stronger device attestation.

The research can be found here:


  BadCam: Now Weaponizing Linux Webcams


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Oct 2025 07:00:00 -0000</pubDate>
      <itunes:title>Smile for the malware. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>398</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8a83678c-ab74-11f0-9dd6-bf08d4da2897/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Eclypsium researchers Jesse Michael and Mickey Shkatov to share their work on "BadCam - Now Weaponizing Linux Webcams." Eclypsium researchers disclosed “BadCam,” a set of vulnerabilities in certain Lenovo USB webcams that run Linux and do not validate firmware signatures, allowing attackers to reflash the devices and turn them into BadUSB-style tools. 

An adversary who supplies a backdoored camera or who gains remote code execution on a host can weaponize the webcam to emulate human-interface devices, inject keystrokes, deliver payloads, and maintain persistence — even re-infecting systems after OS reinstalls. The findings were presented at DEF CON 2025, Lenovo issued updated firmware/tools in coordination with SigmaStar, and researchers warn the same vector could affect other Linux-based USB peripherals, underscoring the need for firmware signing and stronger device attestation.

The research can be found here:


  BadCam: Now Weaponizing Linux Webcams


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/company/eclypsium/">Eclypsium</a> researchers <a href="https://www.linkedin.com/in/jesse-michael-b0a458/">Jesse Michael</a> and <a href="https://www.linkedin.com/in/myinfo/">Mickey Shkatov</a> to share their work on "BadCam - Now Weaponizing Linux Webcams." Eclypsium researchers disclosed “BadCam,” a set of vulnerabilities in certain Lenovo USB webcams that run Linux and do not validate firmware signatures, allowing attackers to reflash the devices and turn them into BadUSB-style tools. </p>
<p>An adversary who supplies a backdoored camera or who gains remote code execution on a host can weaponize the webcam to emulate human-interface devices, inject keystrokes, deliver payloads, and maintain persistence — even re-infecting systems after OS reinstalls. The findings were presented at DEF CON 2025, Lenovo issued updated firmware/tools in coordination with SigmaStar, and researchers warn the same vector could affect other Linux-based USB peripherals, underscoring the need for firmware signing and stronger device attestation.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://eclypsium.com/blog/badcam-now-weaponizing-linux-webcams/">BadCam: Now Weaponizing Linux Webcams</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1692</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8a83678c-ab74-11f0-9dd6-bf08d4da2897]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2930011530.mp3?updated=1760718047" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Prosper’s not so prosperous week.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2415/notes</link>
      <description>Prosper data breach reportedly affected more than 17 million accounts. Microsoft revokes certificates used in Rhysida ransomware operation. Threat actors exploit Cisco flaw to deploy Linux rootkits. Europol disrupts cybercrime-as-a-service operation. BeaverTail and OtterCookie merge and display new functionality. Singapore cracks down on social media. On our Industry Voices segment, we are joined by Danny Jenkins who is talking about defending against AI. And who let the bots out?

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Danny Jenkins, CEO and Co-Founder of ThreatLocker, talking about defending against AI. You can tune into Danny’s full conversation here.

Selected Reading

Have I Been Pwned: Prosper data breach impacts 17.6 million accounts (BleepingComputer)

Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign (SecurityWeek)

Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits (Trend Micro)

Critical ConnectWise Vulnerabilities Allow Attackers To Inject Malicious Updates  (Cybersecurity News)

European police bust network selling thousands of phone numbers to scammers (The Record)

North Korean operatives spotted using evasive techniques to steal data and cryptocurrency (CyberScoop)

New Singapore law empowers commission to block harmful online content (Reuters) 

Niantic’s Peridot, the Augmented Reality Alien Dog, Is Now a Talking Tour Guide (WIRED)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 17 Oct 2025 20:10:00 -0000</pubDate>
      <itunes:title>Prosper’s not so prosperous week.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2415</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Prosper data breach reportedly affected more than 17 million accounts. Microsoft revokes certificates used in Rhysida ransomware operation. Threat actors exploit Cisco flaw to deploy Linux rootkits. Europol disrupts cybercrime-as-a-service operation. BeaverTail and OtterCookie merge and display new functionality. Singapore cracks down on social media. On our Industry Voices segment, we are joined by Danny Jenkins who is talking about defending against AI. And who let the bots out?

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Danny Jenkins, CEO and Co-Founder of ThreatLocker, talking about defending against AI. You can tune into Danny’s full conversation here.

Selected Reading

Have I Been Pwned: Prosper data breach impacts 17.6 million accounts (BleepingComputer)

Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign (SecurityWeek)

Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits (Trend Micro)

Critical ConnectWise Vulnerabilities Allow Attackers To Inject Malicious Updates  (Cybersecurity News)

European police bust network selling thousands of phone numbers to scammers (The Record)

North Korean operatives spotted using evasive techniques to steal data and cryptocurrency (CyberScoop)

New Singapore law empowers commission to block harmful online content (Reuters) 

Niantic’s Peridot, the Augmented Reality Alien Dog, Is Now a Talking Tour Guide (WIRED)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Prosper data breach reportedly affected more than 17 million accounts. Microsoft revokes certificates used in Rhysida ransomware operation. Threat actors exploit Cisco flaw to deploy Linux rootkits. Europol disrupts cybercrime-as-a-service operation. BeaverTail and OtterCookie merge and display new functionality. Singapore cracks down on social media. On our Industry Voices segment, we are joined by Danny Jenkins who is talking about defending against AI. And who let the bots out?</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/dannyjenkinscyber/"><u>Danny Jenkins</u></a>, CEO and Co-Founder of <a href="https://www.linkedin.com/company/threatlockerinc/"><u>ThreatLocker</u></a>, talking about <a href="https://www.threatlocker.com/blog/ai-risks-in-cybersecurity-zero-trust-strategies-for-security-leaders?submissionguid=adab3198-bcb2-4708-b645-1721139a2d3d"><u>defending against AI</u></a>. You can tune into Danny’s full conversation <a href="https://explore.thecyberwire.com/threatlocker">here</a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/have-i-been-pwned-warns-of-prosper-data-breach-impacting-176-million-accounts/"><u>Have I Been Pwned: Prosper data breach impacts 17.6 million accounts</u></a> (BleepingComputer)</p>
<p><a href="https://www.securityweek.com/microsoft-revokes-over-200-certificates-to-disrupt-ransomware-campaign/"><u>Microsoft Revokes Over 200 Certificates to Disrupt Ransomware Campaign</u></a> (SecurityWeek)</p>
<p><a href="https://www.trendmicro.com/en_us/research/25/j/operation-zero-disco-cisco-snmp-vulnerability-exploit.html"><u>Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits</u></a> (Trend Micro)</p>
<p><a href="https://cybersecuritynews.com/connectwise-vulnerabilities/"><u>Critical ConnectWise Vulnerabilities Allow Attackers To Inject Malicious Updates</u></a>  (Cybersecurity News)</p>
<p><a href="https://therecord.media/europe-sim-farms-raided-latvia-austria-estonia"><u>European police bust network selling thousands of phone numbers to scammers</u></a> (The Record)</p>
<p><a href="https://cyberscoop.com/north-korea-attackers-evasive-techniques-malware/"><u>North Korean operatives spotted using evasive techniques to steal data and cryptocurrency</u></a> (CyberScoop)</p>
<p><a href="https://www.reuters.com/business/media-telecom/new-singapore-law-empowers-commission-block-harmful-online-content-2025-10-15/"><u>New Singapore law empowers commission to block harmful online content</u></a> (Reuters) </p>
<p><a href="https://www.wired.com/story/niantic-peridot-augmented-reality-snap-spectacles/"><u>Niantic’s Peridot, the Augmented Reality Alien Dog, Is Now a Talking Tour Guide</u></a> (WIRED)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1601</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d27e865e-1c7a-11f0-85e0-3b7e8773af15]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7619003698.mp3?updated=1760723341" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When hackers go BIG in cyber espionage.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2414/notes</link>
      <description>F5 discloses long-term breach tied to nation-state actors. PowerSchool hacker receives a four-year prison sentence. Senator scrutinizes Cisco critical firewall vulnerabilities. Phishing campaign impersonates LastPass and Bitwarden. Credential phishing with Google Careers. Reduce effort, reuse past breaches, recycle into new breach. Qilin announces new victims. Manoj Nair, from Snyk, joins us to explore the future of AI security and the emerging risks shaping this rapidly evolving landscape. And AI faces the facts.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Manoj Nair, Chief Innovation Officer at Snyk, joins us to explore the future of AI security and the emerging risks shaping this rapidly evolving landscape. In light of the recent high-severity vulnerability in Cursor, Manoj discusses how threats like tool poisoning, toxic flows, and MCP vulnerabilities are redefining what secure AI-driven development means—and why organizations must move faster to keep up.

Selected Reading

F5 disclosures breach tied to nation-state threat actor (CyberScoop)

CISA Directs Federal Agencies to Mitigate Vulnerabilities in F5 Devices (CISA)

ED 26-01: Mitigate Vulnerabilities in F5 Devices (CISA) 

PowerSchool hacker sentenced to 4 years in prison (The Record) 

Cisco faces Senate scrutiny over firewall flaws (The Register)

Fake LastPass, Bitwarden breach alerts lead to PC hijacks (Bleeping Computer) 

Google Careers impersonation credential phishing scam with endless variation (Sublime Security) 

Elasticsearch Leak Exposes 6 Billion Records from Scraping, Old and New Breaches (HackRead) 

Qilin Ransomware announced new victims (Security Affairs) 

When Face Recognition Doesn’t Know Your Face Is a Face (WIRED)

Semperis Announces Midnight in the War Room: A Groundbreaking Cyberwar Documentary Featuring the World's Leading Defenders and Reformed Hackers (PR Newswire)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 16 Oct 2025 20:10:00 -0000</pubDate>
      <itunes:title>When hackers go BIG in cyber espionage.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2414</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>F5 discloses long-term breach tied to nation-state actors. PowerSchool hacker receives a four-year prison sentence. Senator scrutinizes Cisco critical firewall vulnerabilities. Phishing campaign impersonates LastPass and Bitwarden. Credential phishing with Google Careers. Reduce effort, reuse past breaches, recycle into new breach. Qilin announces new victims. Manoj Nair, from Snyk, joins us to explore the future of AI security and the emerging risks shaping this rapidly evolving landscape. And AI faces the facts.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Manoj Nair, Chief Innovation Officer at Snyk, joins us to explore the future of AI security and the emerging risks shaping this rapidly evolving landscape. In light of the recent high-severity vulnerability in Cursor, Manoj discusses how threats like tool poisoning, toxic flows, and MCP vulnerabilities are redefining what secure AI-driven development means—and why organizations must move faster to keep up.

Selected Reading

F5 disclosures breach tied to nation-state threat actor (CyberScoop)

CISA Directs Federal Agencies to Mitigate Vulnerabilities in F5 Devices (CISA)

ED 26-01: Mitigate Vulnerabilities in F5 Devices (CISA) 

PowerSchool hacker sentenced to 4 years in prison (The Record) 

Cisco faces Senate scrutiny over firewall flaws (The Register)

Fake LastPass, Bitwarden breach alerts lead to PC hijacks (Bleeping Computer) 

Google Careers impersonation credential phishing scam with endless variation (Sublime Security) 

Elasticsearch Leak Exposes 6 Billion Records from Scraping, Old and New Breaches (HackRead) 

Qilin Ransomware announced new victims (Security Affairs) 

When Face Recognition Doesn’t Know Your Face Is a Face (WIRED)

Semperis Announces Midnight in the War Room: A Groundbreaking Cyberwar Documentary Featuring the World's Leading Defenders and Reformed Hackers (PR Newswire)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>F5 discloses long-term breach tied to nation-state actors. PowerSchool hacker receives a four-year prison sentence. Senator scrutinizes Cisco critical firewall vulnerabilities. Phishing campaign impersonates LastPass and Bitwarden. Credential phishing with Google Careers. Reduce effort, reuse past breaches, recycle into new breach. Qilin announces new victims. Manoj Nair, from Snyk, joins us to explore the future of AI security and the emerging risks shaping this rapidly evolving landscape. And AI faces the facts.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p><strong></strong><a href="https://www.linkedin.com/in/mnair1/"><u>Manoj Nair</u></a>, Chief Innovation Officer at <a href="https://www.linkedin.com/company/snyk/"><u>Snyk</u></a>, joins us to explore the future of AI security and the emerging risks shaping this rapidly evolving landscape. In light of the recent high-severity vulnerability in Cursor, Manoj discusses how threats like tool poisoning, toxic flows, and MCP vulnerabilities are redefining what secure AI-driven development means—and why organizations must move faster to keep up.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://cyberscoop.com/f5-breach-nation-state-actor-sec-8k-justice-department/"><u>F5 disclosures breach tied to nation-state threat actor</u></a> (CyberScoop)</p>
<p><a href="https://www.cisa.gov/news-events/alerts/2025/10/15/cisa-directs-federal-agencies-mitigate-vulnerabilities-f5-devices"><u>CISA Directs Federal Agencies to Mitigate Vulnerabilities in F5 Devices</u></a> (CISA)</p>
<p><a href="https://www.cisa.gov/news-events/directives/ed-26-01-mitigate-vulnerabilities-f5-devices"><u>ED 26-01: Mitigate Vulnerabilities in F5 Devices</u></a> (CISA) </p>
<p><a href="https://therecord.media/powerschool-hacker-sentenced-4-years"><u>PowerSchool hacker sentenced to 4 years in prison</u></a> (The Record) </p>
<p><a href="https://www.theregister.com/2025/10/16/cisco_senate_scrutiny/"><u>Cisco faces Senate scrutiny over firewall flaws</u></a> (The Register)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/fake-lastpass-bitwarden-breach-alerts-lead-to-pc-hijacks/"><u>Fake LastPass, Bitwarden breach alerts lead to PC hijacks</u></a> (Bleeping Computer) </p>
<p><a href="https://sublime.security/blog/google-careers-impersonation-credential-phishing-scam-with-endless-variation/"><u>Google Careers impersonation credential phishing scam with endless variation</u></a> (Sublime Security) </p>
<p><a href="https://hackread.com/elasticsearch-leak-6-billion-record-scraping-breaches/"><u>Elasticsearch Leak Exposes 6 Billion Records from Scraping, Old and New Breaches</u></a> (HackRead) </p>
<p><a href="https://securityaffairs.com/183447/security/qilin-ransomware-announced-new-victims.html"><u>Qilin Ransomware announced new victims</u></a> (Security Affairs) </p>
<p><a href="https://www.wired.com/story/when-face-recognition-doesnt-know-your-face-is-a-face/"><u>When Face Recognition Doesn’t Know Your Face Is a Face</u></a> (WIRED)</p>
<p><a href="https://www.prnewswire.com/news-releases/semperis-announces-midnight-in-the-war-room-a-groundbreaking-cyberwar-documentary-featuring-the-worlds-leading-defenders-and-reformed-hackers-302585863.html"><u>Semperis Announces Midnight in the War Room: A Groundbreaking Cyberwar Documentary Featuring the World's Leading Defenders and Reformed Hackers</u></a> (PR Newswire)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1597</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d2581fc8-1c7a-11f0-85e0-271f2fd304f0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1829336757.mp3?updated=1760639140" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Prince of fraud loses crown.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2413/notes</link>
      <description>A record-breaking Bitcoin seizure. Patch Tuesday notes. Capita fined for unlawful access to personal data. Unity site skimmed by malicious script. Vietnam Airlines breached potentially exposing 20 million passengers. An automotive giant experiences a third-party breach. Tim Starks from CyberScoop is discussing how Sen. Peters tries another approach to extend expired cyber threat information-sharing. In our latest Threat Vector, David Moulton⁠ sits down with⁠ Harish Singh about hybrid work. And inside North Korea's blueprints for deception.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Tim Starks from CyberScoop is discussing how Sen. Peters tries another approach to extend expired cyber threat information-sharing law.

Threat Vector

Hybrid work has changed the game, but has your security kept up? In this segment of Threat Vector, David Moulton⁠ sits down with⁠ Harish Singh⁠, Vice President and Global Head of Infrastructure and Application Management at Wipro, to unpack the evolving cybersecurity landscape at the intersection of digital transformation, SaaS expansion, and AI-powered operations. You can listen to their full discussion here, and catch new episodes every Thursday on your favorite podcast app.

Selected Reading

Feds Seize Record-Breaking $15 Billion in Bitcoin From Alleged Scam Empire (WIRED)

Microsoft October 2025 Patch Tuesday fixes 6 zero-days, 172 flaws (Bleeping Computer) 

Patch Tuesday, October 2025 ‘End of 10’ Edition (Krebs on Security)

Capita Fined £14m After 2023 Breach that Hit 6.6 Million People (Infosecurity Magazine)                    

Malicious Code on Unity Website Skims Information From Hundreds of Customers (SecurityWeek)

Airline with over 20 million passengers a year involved in customer data breach (Daily Mail)

Information Regarding Customer Data Breach (Vietnam Airlines)

Auto giant Stellantis discloses data breach affecting North American customers (Top Class Actions)

North Korean Scammers Are Doing Architectural Design Now (WIRED)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 15 Oct 2025 20:30:00 -0000</pubDate>
      <itunes:title>Prince of fraud loses crown.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2313</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A record-breaking Bitcoin seizure. Patch Tuesday notes. Capita fined for unlawful access to personal data. Unity site skimmed by malicious script. Vietnam Airlines breached potentially exposing 20 million passengers. An automotive giant experiences a third-party breach. Tim Starks from CyberScoop is discussing how Sen. Peters tries another approach to extend expired cyber threat information-sharing. In our latest Threat Vector, David Moulton⁠ sits down with⁠ Harish Singh about hybrid work. And inside North Korea's blueprints for deception.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Tim Starks from CyberScoop is discussing how Sen. Peters tries another approach to extend expired cyber threat information-sharing law.

Threat Vector

Hybrid work has changed the game, but has your security kept up? In this segment of Threat Vector, David Moulton⁠ sits down with⁠ Harish Singh⁠, Vice President and Global Head of Infrastructure and Application Management at Wipro, to unpack the evolving cybersecurity landscape at the intersection of digital transformation, SaaS expansion, and AI-powered operations. You can listen to their full discussion here, and catch new episodes every Thursday on your favorite podcast app.

Selected Reading

Feds Seize Record-Breaking $15 Billion in Bitcoin From Alleged Scam Empire (WIRED)

Microsoft October 2025 Patch Tuesday fixes 6 zero-days, 172 flaws (Bleeping Computer) 

Patch Tuesday, October 2025 ‘End of 10’ Edition (Krebs on Security)

Capita Fined £14m After 2023 Breach that Hit 6.6 Million People (Infosecurity Magazine)                    

Malicious Code on Unity Website Skims Information From Hundreds of Customers (SecurityWeek)

Airline with over 20 million passengers a year involved in customer data breach (Daily Mail)

Information Regarding Customer Data Breach (Vietnam Airlines)

Auto giant Stellantis discloses data breach affecting North American customers (Top Class Actions)

North Korean Scammers Are Doing Architectural Design Now (WIRED)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A record-breaking Bitcoin seizure. Patch Tuesday notes. Capita fined for unlawful access to personal data. Unity site skimmed by malicious script. Vietnam Airlines breached potentially exposing 20 million passengers. An automotive giant experiences a third-party breach. Tim Starks from CyberScoop is discussing how Sen. Peters tries another approach to extend expired cyber threat information-sharing. In our latest Threat Vector, David Moulton⁠ sits down with⁠ Harish Singh about hybrid work. And inside North Korea's blueprints for deception.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/tstarks/"><u>Tim Starks</u></a> from <a href="https://www.linkedin.com/company/cyberscoop/"><u>CyberScoop</u></a> is discussing how Sen. Peters tries another approach to extend expired cyber threat information-sharing law.</p>
<p><strong>Threat Vector</strong></p>
<p>Hybrid work has changed the game, but has your security kept up? In this segment of<a href="https://thecyberwire.com/podcasts/threat-vector"><u> Threat Vector</u></a>,<a href="https://www.linkedin.com/in/davidrmoulton/?utm_source=chatgpt.com"><u> David Moulton⁠</u></a> sits down with<a href="https://www.linkedin.com/in/harishsingh007/?utm_source=chatgpt.com"><u>⁠ Harish Singh⁠</u></a>, Vice President and Global Head of Infrastructure and Application Management at Wipro, to unpack the evolving cybersecurity landscape at the intersection of digital transformation, SaaS expansion, and AI-powered operations. You can listen to their full discussion<a href="https://thecyberwire.com/podcasts/threat-vector/88/notes"><u> here</u></a>, and catch new episodes every Thursday on your favorite podcast app.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.wired.com/story/feds-seize-record-breaking-15-billion-in-bitcoin-from-alleged-scam-empire/"><u>Feds Seize Record-Breaking $15 Billion in Bitcoin From Alleged Scam Empire</u></a> (WIRED)</p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-october-2025-patch-tuesday-fixes-6-zero-days-172-flaws/"><u>Microsoft October 2025 Patch Tuesday fixes 6 zero-days, 172 flaws</u></a> (Bleeping Computer) </p>
<p><a href="https://krebsonsecurity.com/2025/10/patch-tuesday-october-2025-end-of-10-edition/"><u>Patch Tuesday, October 2025 ‘End of 10’ Edition</u></a> (Krebs on Security)</p>
<p><a href="https://www.infosecurity-magazine.com/news/capita-fined-14m-2023-breach-66/"><u>Capita Fined £14m After 2023 Breach that Hit 6.6 Million People</u></a> (Infosecurity Magazine)                    </p>
<p><a href="https://www.securityweek.com/malicious-code-on-unity-website-skims-information-from-hundreds-of-customers/"><u>Malicious Code on Unity Website Skims Information From Hundreds of Customers</u></a> (SecurityWeek)</p>
<p><a href="https://www.dailymail.co.uk/travel/article-15190433/Airline-20-million-passengers-year-involved-customer-data-breach.html"><u>Airline with over 20 million passengers a year involved in customer data breach</u></a> (Daily Mail)</p>
<p><a href="https://www.vietnamairlines.com/vn/en/vietnam-airlines/press-room/press-release/2025/1014-EN-Information-Regarding-Customer-Data-Breach"><u>Information Regarding Customer Data Breach</u></a> (Vietnam Airlines)</p>
<p><a href="https://topclassactions.com/lawsuit-settlements/lawsuit-news/auto-giant-stellantis-discloses-data-breach-affecting-north-american-customers/"><u>Auto giant Stellantis discloses data breach affecting North American customers</u></a> (Top Class Actions)</p>
<p><a href="https://www.wired.com/story/north-korean-scammers-are-doing-architectural-design-now/"><u>North Korean Scammers Are Doing Architectural Design Now</u></a> (WIRED)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1903</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d1e2145e-1c7a-11f0-85e0-e760a685cde1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7323909699.mp3?updated=1760559864" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When GoAnywhere goes wrong.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2412/notes</link>
      <description>Fortra confirms an exploitation of the maximum-severity GoAnywhere flaw. Harvard investigates a claim of a breach. Banking Trojan targets Brazilian WhatsApp users. Reduction-in-force hits CISA. SimonMed says 1.2 million hit by Medusa ransomware. Netherlands invokes the Goods Availability Act against a Chinese company. We have our Business Breakdown. On today’s Industry Voices, we are joined by Mickey Bresman sharing insights on hybrid identity security. And, beware of the shuffler.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices, we are joined by Mickey Bresman, Semperis CEO, sharing insights on hybrid identity security and their HIP Conference. Mickey joined us as their 2025 Hybrid Identity Protection (HIP) Conference wrapped up.  If you want to hear the full conversation, you can tune in here.

Selected Reading

Fortra cops to exploitation of GoAnywhere file-transfer service defect (CyberScoop)

Harvard Investigating Security Breach After Cybercrime Group Threatens To Release Stolen Data (The Crimson)

WhatsApp Worm Targets Brazilian Banking Customers (Sophos News) 

Government Shutdown Fallout: RIF Notices Hit CISA as Cyber Threats Rise (ClearanceJobs)

SimonMed says 1.2 million patients impacted in January data breach (Bleeping Computer) 

Netherlands invokes special powers against Chinese-owned semiconductor company Nexperia (The Record)

UK fines 4chan over noncompliance with Online Safety Act (The Record)  

Synechron acquires RapDev, Calitii, and Waivgen. (N2K Pro Business Briefing)  

Hackers Rig Casino Card-Shuffling Machines for ‘Full Control’ Cheating (WIRED)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Oct 2025 20:10:00 -0000</pubDate>
      <itunes:title>When GoAnywhere goes wrong.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2412</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Fortra confirms an exploitation of the maximum-severity GoAnywhere flaw. Harvard investigates a claim of a breach. Banking Trojan targets Brazilian WhatsApp users. Reduction-in-force hits CISA. SimonMed says 1.2 million hit by Medusa ransomware. Netherlands invokes the Goods Availability Act against a Chinese company. We have our Business Breakdown. On today’s Industry Voices, we are joined by Mickey Bresman sharing insights on hybrid identity security. And, beware of the shuffler.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices, we are joined by Mickey Bresman, Semperis CEO, sharing insights on hybrid identity security and their HIP Conference. Mickey joined us as their 2025 Hybrid Identity Protection (HIP) Conference wrapped up.  If you want to hear the full conversation, you can tune in here.

Selected Reading

Fortra cops to exploitation of GoAnywhere file-transfer service defect (CyberScoop)

Harvard Investigating Security Breach After Cybercrime Group Threatens To Release Stolen Data (The Crimson)

WhatsApp Worm Targets Brazilian Banking Customers (Sophos News) 

Government Shutdown Fallout: RIF Notices Hit CISA as Cyber Threats Rise (ClearanceJobs)

SimonMed says 1.2 million patients impacted in January data breach (Bleeping Computer) 

Netherlands invokes special powers against Chinese-owned semiconductor company Nexperia (The Record)

UK fines 4chan over noncompliance with Online Safety Act (The Record)  

Synechron acquires RapDev, Calitii, and Waivgen. (N2K Pro Business Briefing)  

Hackers Rig Casino Card-Shuffling Machines for ‘Full Control’ Cheating (WIRED)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Fortra confirms an exploitation of the maximum-severity GoAnywhere flaw. Harvard investigates a claim of a breach. Banking Trojan targets Brazilian WhatsApp users. Reduction-in-force hits CISA. SimonMed says 1.2 million hit by Medusa ransomware. Netherlands invokes the Goods Availability Act against a Chinese company. We have our Business Breakdown. On today’s Industry Voices, we are joined by Mickey Bresman sharing insights on hybrid identity security. And, beware of the shuffler.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On today’s Industry Voices, we are joined by <a href="https://www.linkedin.com/in/mickey-bresman-1574923/"><u>Mickey Bresman</u></a>, <a href="https://www.semperis.com/"><u>Semperis</u></a> CEO, sharing insights on hybrid identity security and their HIP Conference. Mickey joined us as their <a href="https://www.hipconf.com/"><u>2025 Hybrid Identity Protection (HIP) Conference</u></a> wrapped up.  If you want to hear the full conversation, you can tune in <a href="https://explore.thecyberwire.com/mickey-bresman">here</a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://cyberscoop.com/fortra-goanywhere-vulnerability-exploitation/"><u>Fortra cops to exploitation of GoAnywhere file-transfer service defect</u></a> (CyberScoop)</p>
<p><a href="https://www.thecrimson.com/article/2025/10/14/harvard-security-breach-russian-cybercrime-group/"><u>Harvard Investigating Security Breach After Cybercrime Group Threatens To Release Stolen Data</u></a> (The Crimson)</p>
<p><a href="https://news.sophos.com/en-us/2025/10/10/whatsapp-worm-targets-brazilian-banking-customers/"><u>WhatsApp Worm Targets Brazilian Banking Customers</u></a> (Sophos News) </p>
<p><a href="https://news.clearancejobs.com/2025/10/14/government-shutdown-fallout-rif-notices-hit-cisa-as-cyber-threats-rise/"><u>Government Shutdown Fallout: RIF Notices Hit CISA as Cyber Threats Rise</u></a> (ClearanceJobs)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/simonmed-says-12-million-patients-impacted-in-january-data-breach/"><u>SimonMed says 1.2 million patients impacted in January data breach</u></a> (Bleeping Computer) </p>
<p><a href="https://therecord.media/netherlands-special-powers-chinese-owned-semiconductor"><u>Netherlands invokes special powers against Chinese-owned semiconductor company Nexperia</u></a> (The Record)</p>
<p><a href="https://therecord.media/4chan-fined-ofcom-uk-online-safety-act"><u>UK fines 4chan over noncompliance with Online Safety Act</u></a> (The Record)  </p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/7/40"><u>Synechron acquires RapDev, Calitii, and Waivgen.</u></a> (N2K Pro Business Briefing)  </p>
<p><br><a href="https://www.wired.com/story/card-shuffler-hack/"><u>Hackers Rig Casino Card-Shuffling Machines for ‘Full Control’ Cheating</u></a> (WIRED)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1610</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d20a76e2-1c7a-11f0-85e0-9b4d62f4332e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4623191817.mp3?updated=1760465367" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What Happened to Hacker Culture? [Threat Vector]</title>
      <link>https://thecyberwire.com/podcasts/threat-vector/86/notes</link>
      <description>While the N2K team is observing Indigenous Peoples' Day, we thought you'd enjoy this episode of the Threat Vector podcast from our N2K Cyberwire network partner, Palo Alto Networks. 

New episodes of Threat Vector release each Thursday. We hope you will explore their catalog and subscribe to the show. 



Join David Moulton, Senior Director of Thought Leadership for Unit 42, as he sits down with Kyle Wilhoit,Technical Director of Threat Research at Unit 42, for an intimate conversation about the evolution of hacker culture and cybersecurity. From picking up 2600: The Hacker Quarterly magazines at Barnes &amp; Noble and building beige boxes to leading threat research at Palo Alto Networks, Kyle shares his personal journey into the security community. This conversation explores how AI and automation are lowering barriers for attackers, the professionalization of cybersecurity, and what's been lost and gained in the industry's maturation. Kyle offers practical advice for newcomers who don't fit the traditional mold, emphasizing the importance of curiosity, soft skills, and intellectual humility. 

Kyle Wilhoit is a seasoned cybersecurity researcher, with more than 15 years of experience studying cybercrime and nation-state threats. He's a frequent speaker at global conferences like Black Hat, FIRST, and SecTor, and has authored two industry-respected books: Hacking Exposed Industrial Control Systems and Operationalizing Threat Intelligence.

As a long-standing member of the Black Hat US Review Board and an adjunct instructor, Kyle is deeply involved in shaping both cutting-edge research and the next generation of cybersecurity professionals. 


  Connect with Kyle on LinkedIn


Previous appearances on Threat Vector: 


  
Inside DeepSeek’s Security Flaws (Mar 31, 2025) https://www.paloaltonetworks.com/resources/podcasts/threat-vector-inside-deepseeks-security-flaws


  
War Room Best Practices (Nov 07, 2024)https://www.paloaltonetworks.com/resources/podcasts/threat-vector-war-room-best-practices 

  
Cybersecurity in the AI Era: Insights from Unit 42's Kyle Wilhoit, Director of Threat Research (Jan 11, 2024)https://www.paloaltonetworks.com/resources/podcasts/threat-vector-cybersecurity-in-the-ai-era-insights-from-unit-42s-kyle-wilhoit-director-of-threat-research 


Learn more about Unit 42's threat research at https://unit42.paloaltonetworks.com/. 



Related episodes: For more conversations about AI's impact on cybersecurity, career development in security, and insights from Unit 42 researchers, explore past episodes at https://www.paloaltonetworks.com/podcasts/threat-vector.



Join the conversation on our social media channels:


  
Website: http://www.paloaltonetworks.com/


  
Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠


  
Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠


  
LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/palo-alto-networks/

  
YouTube: ⁠⁠⁠⁠@paloaltonetworks

  
Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠



About Threat Vector

Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.



Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 13 Oct 2025 06:00:00 -0000</pubDate>
      <itunes:title>What Happened to Hacker Culture?</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>86</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/66bbaf26-a5de-11f0-9426-1fb9178d1127/image/7645e0a7d476d2937b2593be3e525b3a.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>While the N2K team is observing Indigenous Peoples' Day, we thought you'd enjoy this episode of the Threat Vector podcast from our N2K Cyberwire network partner, Palo Alto Networks. 

New episodes of Threat Vector release each Thursday. We hope you will explore their catalog and subscribe to the show. 



Join David Moulton, Senior Director of Thought Leadership for Unit 42, as he sits down with Kyle Wilhoit,Technical Director of Threat Research at Unit 42, for an intimate conversation about the evolution of hacker culture and cybersecurity. From picking up 2600: The Hacker Quarterly magazines at Barnes &amp; Noble and building beige boxes to leading threat research at Palo Alto Networks, Kyle shares his personal journey into the security community. This conversation explores how AI and automation are lowering barriers for attackers, the professionalization of cybersecurity, and what's been lost and gained in the industry's maturation. Kyle offers practical advice for newcomers who don't fit the traditional mold, emphasizing the importance of curiosity, soft skills, and intellectual humility. 

Kyle Wilhoit is a seasoned cybersecurity researcher, with more than 15 years of experience studying cybercrime and nation-state threats. He's a frequent speaker at global conferences like Black Hat, FIRST, and SecTor, and has authored two industry-respected books: Hacking Exposed Industrial Control Systems and Operationalizing Threat Intelligence.

As a long-standing member of the Black Hat US Review Board and an adjunct instructor, Kyle is deeply involved in shaping both cutting-edge research and the next generation of cybersecurity professionals. 


  Connect with Kyle on LinkedIn


Previous appearances on Threat Vector: 


  
Inside DeepSeek’s Security Flaws (Mar 31, 2025) https://www.paloaltonetworks.com/resources/podcasts/threat-vector-inside-deepseeks-security-flaws


  
War Room Best Practices (Nov 07, 2024)https://www.paloaltonetworks.com/resources/podcasts/threat-vector-war-room-best-practices 

  
Cybersecurity in the AI Era: Insights from Unit 42's Kyle Wilhoit, Director of Threat Research (Jan 11, 2024)https://www.paloaltonetworks.com/resources/podcasts/threat-vector-cybersecurity-in-the-ai-era-insights-from-unit-42s-kyle-wilhoit-director-of-threat-research 


Learn more about Unit 42's threat research at https://unit42.paloaltonetworks.com/. 



Related episodes: For more conversations about AI's impact on cybersecurity, career development in security, and insights from Unit 42 researchers, explore past episodes at https://www.paloaltonetworks.com/podcasts/threat-vector.



Join the conversation on our social media channels:


  
Website: http://www.paloaltonetworks.com/


  
Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠


  
Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠


  
LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/palo-alto-networks/

  
YouTube: ⁠⁠⁠⁠@paloaltonetworks

  
Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠



About Threat Vector

Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.



Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While the N2K team is observing Indigenous Peoples' Day, we thought you'd enjoy this episode of the Threat Vector podcast from our N2K Cyberwire network partner, Palo Alto Networks. </strong></em></p>
<p><em><strong>New episodes of Threat Vector release each Thursday. We hope you will explore their catalog and subscribe to the show. </strong></em></p>
<p><br></p>
<p>Join<a href="https://www.linkedin.com/in/davidrmoulton/"> David Moulton</a>, Senior Director of Thought Leadership for Unit 42, as he sits down with<a href="https://www.linkedin.com/in/kylewilhoit/"> Kyle Wilhoit</a>,Technical Director of Threat Research at <em>Unit 42</em>, for an intimate conversation about the evolution of hacker culture and cybersecurity. From picking up <a href="https://www.2600.com/">2600: The Hacker Quarterly</a> magazines at Barnes &amp; Noble and building beige boxes to leading threat research at Palo Alto Networks, Kyle shares his personal journey into the security community. This conversation explores how AI and automation are lowering barriers for attackers, the professionalization of cybersecurity, and what's been lost and gained in the industry's maturation. Kyle offers practical advice for newcomers who don't fit the traditional mold, emphasizing the importance of curiosity, soft skills, and intellectual humility. </p>
<p><strong>Kyle Wilhoit</strong> is a seasoned cybersecurity researcher, with more than 15 years of experience studying cybercrime and nation-state threats. He's a frequent speaker at global conferences like Black Hat, FIRST, and SecTor, and has authored two industry-respected books: <a href="https://www.barnesandnoble.com/w/hacking-exposed-industrial-control-systems-clint-bodungen/1123118068?ean=9781259589713"><em>Hacking Exposed Industrial Control Systems</em></a> and <a href="https://www.barnesandnoble.com/w/operationalizing-threat-intelligence-kyle-wilhoit/1141251900?ean=9781801814683"><em>Operationalizing Threat Intelligence</em></a>.</p>
<p>As a long-standing member of the Black Hat US Review Board and an adjunct instructor, Kyle is deeply involved in shaping both cutting-edge research and the next generation of cybersecurity professionals.<a href="https://www.linkedin.com/in/kylewilhoit/"> </a></p>
<ul>
  <li><a href="https://www.linkedin.com/in/kylewilhoit/">Connect with Kyle on LinkedIn</a></li>
</ul>
<p><strong>Previous appearances on Threat Vector: </strong></p>
<ul>
  <li>
<strong>Inside DeepSeek’s Security Flaws (</strong>Mar 31, 2025) <a href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-inside-deepseeks-security-flaws">https://www.paloaltonetworks.com/resources/podcasts/threat-vector-inside-deepseeks-security-flaws</a>
</li>
  <li>
<strong>War Room Best Practices</strong> (Nov 07, 2024)<br><a href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-war-room-best-practices">https://www.paloaltonetworks.com/resources/podcasts/threat-vector-war-room-best-practices</a> </li>
  <li>
<strong>Cybersecurity in the AI Era: Insights from Unit 42's Kyle Wilhoit, Director of Threat Research</strong> (Jan 11, 2024)<br><a href="https://www.paloaltonetworks.com/resources/podcasts/threat-vector-cybersecurity-in-the-ai-era-insights-from-unit-42s-kyle-wilhoit-director-of-threat-research">https://www.paloaltonetworks.com/resources/podcasts/threat-vector-cybersecurity-in-the-ai-era-insights-from-unit-42s-kyle-wilhoit-director-of-threat-research</a> </li>
</ul>
<p>Learn more about Unit 42's threat research at <a href="https://unit42.paloaltonetworks.com/">https://unit42.paloaltonetworks.com/</a>. </p>
<p><br></p>
<p>Related episodes: For more conversations about AI's impact on cybersecurity, career development in security, and insights from Unit 42 researchers, explore past episodes at<a href="https://www.paloaltonetworks.com/podcasts/threat-vector"> https://www.paloaltonetworks.com/podcasts/threat-vector</a>.</p>
<p><br></p>
<p>Join the conversation on our social media channels:</p>
<ul>
  <li>
<strong>Website</strong>:<a href="http://www.paloaltonetworks.com/"> http://www.paloaltonetworks.com/</a>
</li>
  <li>
<strong>Threat Research:</strong><a href="https://unit42.paloaltonetworks.com/"><strong> </strong>⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠</a>
</li>
  <li>
<strong>Facebook:</strong><a href="https://www.facebook.com/LifeatPaloAltoNetworks/"><strong> </strong>⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠</a>
</li>
  <li>
<strong>LinkedIn:</strong><a href="https://www.linkedin.com/company/unit42/"><strong> </strong>⁠⁠⁠⁠</a>https://www.linkedin.com/company/palo-alto-networks/</li>
  <li>
<strong>YouTube:</strong><a href="https://www.youtube.com/channel/UCvJQO11qoCHYwZ4Ah4Jf-Tw"><strong> </strong>⁠⁠⁠⁠</a>@paloaltonetworks</li>
  <li>
<strong>Twitter:</strong><a href="https://twitter.com/PaloAltoNtwks"><strong> </strong>⁠⁠⁠⁠</a><a href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0">https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠</a>
</li>
</ul>
<p><strong>About Threat Vector</strong></p>
<p>Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.</p>
<p>The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.</p>
<p>Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.</p>
<p><br></p>
<p><strong>Palo Alto Networks</strong></p>
<p>Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. <a href="http://paloaltonetworks.com/">⁠http://paloaltonetworks.com⁠</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2282</itunes:duration>
      <guid isPermaLink="false"><![CDATA[66bbaf26-a5de-11f0-9426-1fb9178d1127]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5705626484.mp3?updated=1758312610" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chetan Conikee: Create narratives of your journey. [CTO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/90/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Founder and CTO of ShiftLeft, Chetan Conikee shares his story from computer science to founding his own company. When choosing a career, Chetan notes that "the liking and doing has to matter and be in conjunction with each other." Explaining the parallels in his home country of India and where he studied his for his masters in the US, Chetan stresses the need to find someone who inspires you to follow and learn from. On being an entrepreneur, he says, "The entrepreneurial mindset is a sum total of many sufferings that lead to success." Chethan advises you take time out to write narratives so that you are remembered and so that others following a similar path may learn from you. We thank Chetan for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 12 Oct 2025 07:00:00 -0000</pubDate>
      <itunes:title>Chetan Conikee: Create narratives of your journey. [CTO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>90</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/87f6cc6a-a5f3-11f0-be8e-77a9e650cd02/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Founder and CTO of ShiftLeft, Chetan Conikee shares his story from computer science to founding his own company. When choosing a career, Chetan notes that "the liking and doing has to matter and be in conjunction with each other." Explaining the parallels in his home country of India and where he studied his for his masters in the US, Chetan stresses the need to find someone who inspires you to follow and learn from. On being an entrepreneur, he says, "The entrepreneurial mindset is a sum total of many sufferings that lead to success." Chethan advises you take time out to write narratives so that you are remembered and so that others following a similar path may learn from you. We thank Chetan for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Founder and CTO of ShiftLeft, Chetan Conikee shares his story from computer science to founding his own company. When choosing a career, Chetan notes that "the liking and doing has to matter and be in conjunction with each other." Explaining the parallels in his home country of India and where he studied his for his masters in the US, Chetan stresses the need to find someone who inspires you to follow and learn from. On being an entrepreneur, he says, "The entrepreneurial mindset is a sum total of many sufferings that lead to success." Chethan advises you take time out to write narratives so that you are remembered and so that others following a similar path may learn from you. We thank Chetan for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>629</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[87f6cc6a-a5f3-11f0-be8e-77a9e650cd02]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7383638703.mp3?updated=1735936618" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No honor among thieves. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/397/notes</link>
      <description>John Fokker, Head of Threat Intelligence at Trellix is discussing "Gang Wars: Breaking Trust Among Cyber Criminals." Trellix researchers reveal how the once-organized ransomware underworld is collapsing under its own paranoia. 

Once united through Ransomware-as-a-Service programs, gangs are now turning on each other — staging hacks, public feuds, and exit scams as trust evaporates. With affiliates jumping ship and rival crews sabotaging each other, the RaaS model is fracturing fast, signaling the beginning of the end for ransomware’s criminal empires.

The research can be found here:


  
⁠⁠⁠⁠Gang Wars: Breaking Trust Among Cyber Criminals



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Oct 2025 07:00:00 -0000</pubDate>
      <itunes:title>No honor among thieves. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>397</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/69ccc7d0-a5f3-11f0-9c6f-774ee2ca4804/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>John Fokker, Head of Threat Intelligence at Trellix is discussing "Gang Wars: Breaking Trust Among Cyber Criminals." Trellix researchers reveal how the once-organized ransomware underworld is collapsing under its own paranoia. 

Once united through Ransomware-as-a-Service programs, gangs are now turning on each other — staging hacks, public feuds, and exit scams as trust evaporates. With affiliates jumping ship and rival crews sabotaging each other, the RaaS model is fracturing fast, signaling the beginning of the end for ransomware’s criminal empires.

The research can be found here:


  
⁠⁠⁠⁠Gang Wars: Breaking Trust Among Cyber Criminals



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/john-fokker-95b614107/">John Fokker</a>, Head of Threat Intelligence at <a href="https://www.linkedin.com/company/trellixsecurity/">Trellix</a> is discussing "Gang Wars: Breaking Trust Among Cyber Criminals." Trellix researchers reveal how the once-organized ransomware underworld is collapsing under its own paranoia. </p>
<p>Once united through Ransomware-as-a-Service programs, gangs are now turning on each other — staging hacks, public feuds, and exit scams as trust evaporates. With affiliates jumping ship and rival crews sabotaging each other, the RaaS model is fracturing fast, signaling the beginning of the end for ransomware’s criminal empires.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://businessinsights.bitdefender.com/curly-comrades-new-threat-actor-targeting-geopolitical-hotbeds">⁠⁠⁠</a><a href="https://unit42.paloaltonetworks.com/phantom-taurus/">⁠</a><a href="https://www.trellix.com/blogs/research/gang-wars-breaking-trust-among-cyber-criminals/">Gang Wars: Breaking Trust Among Cyber Criminals</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1503</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[69ccc7d0-a5f3-11f0-9c6f-774ee2ca4804]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9814230349.mp3?updated=1760109367" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When the breachers get breached.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2411/notes</link>
      <description>International law enforcement take down the Breachforums domains. Researchers link exploitation campaigns targeting Cisco, Palo Alto Networks, and Fortinet. Juniper Networks patches over 200 vulnerabilities. Apple and Google update their bug bounties. Evaluating AI use in application security (AppSec) programs. Microsegmentation can contain ransomware much faster and yield better cyber insurance terms. The new RondoDox botnet exploits over 50 vulnerabilities. Researchers tag 13 unpatched Ivanti Endpoint Manager flaws. Our guest is Jason Manar, CISO of Kaseya, sharing his insight into how the private and public sectors can work together for national security. Hackers mistake a decoy for glory. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by ⁠Jason Manar⁠, CISO of ⁠Kaseya⁠, sharing his insight into how the private and public sectors can/must work together for national security.

Selected Reading

FBI takes down BreachForums portal used for Salesforce extortion (Bleeping Computer)

Cisco, Fortinet, Palo Alto Networks Devices Targeted in Coordinated Campaign (SecurityWeek)

Juniper Networks Patches Critical Junos Space Vulnerabilities (OffSeq)  

Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits (WIRED)

Google Launches AI Bug Bounty with $30,000 Top Reward (Infosecurity Magazine)

In AI We Trust? Increasing AI Adoption in AppSec Despite Limited Oversight (Fastly)

Reducing Risk: Microsegmentation Means Faster Incident Response, Lower Insurance Premiums for Organizations (Akamai)

RondoDox Botnet Takes ‘Exploit Shotgun’ Approach (SecurityWeek)

ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities (SecurityWeek)

Pro-Russian hackers caught bragging about attack on fake water utility (The Record)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 10 Oct 2025 20:10:00 -0000</pubDate>
      <itunes:title>When the breachers get breached.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2411</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>International law enforcement take down the Breachforums domains. Researchers link exploitation campaigns targeting Cisco, Palo Alto Networks, and Fortinet. Juniper Networks patches over 200 vulnerabilities. Apple and Google update their bug bounties. Evaluating AI use in application security (AppSec) programs. Microsegmentation can contain ransomware much faster and yield better cyber insurance terms. The new RondoDox botnet exploits over 50 vulnerabilities. Researchers tag 13 unpatched Ivanti Endpoint Manager flaws. Our guest is Jason Manar, CISO of Kaseya, sharing his insight into how the private and public sectors can work together for national security. Hackers mistake a decoy for glory. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by ⁠Jason Manar⁠, CISO of ⁠Kaseya⁠, sharing his insight into how the private and public sectors can/must work together for national security.

Selected Reading

FBI takes down BreachForums portal used for Salesforce extortion (Bleeping Computer)

Cisco, Fortinet, Palo Alto Networks Devices Targeted in Coordinated Campaign (SecurityWeek)

Juniper Networks Patches Critical Junos Space Vulnerabilities (OffSeq)  

Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits (WIRED)

Google Launches AI Bug Bounty with $30,000 Top Reward (Infosecurity Magazine)

In AI We Trust? Increasing AI Adoption in AppSec Despite Limited Oversight (Fastly)

Reducing Risk: Microsegmentation Means Faster Incident Response, Lower Insurance Premiums for Organizations (Akamai)

RondoDox Botnet Takes ‘Exploit Shotgun’ Approach (SecurityWeek)

ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities (SecurityWeek)

Pro-Russian hackers caught bragging about attack on fake water utility (The Record)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>International law enforcement take down the Breachforums domains. Researchers link exploitation campaigns targeting Cisco, Palo Alto Networks, and Fortinet. Juniper Networks patches over 200 vulnerabilities. Apple and Google update their bug bounties. Evaluating AI use in application security (AppSec) programs. Microsegmentation can contain ransomware much faster and yield better cyber insurance terms. The new RondoDox botnet exploits over 50 vulnerabilities. Researchers tag 13 unpatched Ivanti Endpoint Manager flaws. Our guest is Jason Manar, CISO of Kaseya, sharing his insight into how the private and public sectors can work together for national security. Hackers mistake a decoy for glory.<strong> </strong></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/jason-manar-5a92a923/">⁠<u>Jason Manar</u>⁠</a>, CISO of <a href="https://www.kaseya.com/company/jason-manar/">⁠<u>Kaseya</u>⁠</a>, sharing his insight into how the private and public sectors can/must work together for national security.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/fbi-takes-down-breachforums-portal-used-for-salesforce-extortion/"><u>FBI takes down BreachForums portal used for Salesforce extortion</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/cisco-fortinet-palo-alto-networks-devices-targeted-in-coordinated-campaign/"><u>Cisco, Fortinet, Palo Alto Networks Devices Targeted in Coordinated Campaign</u></a> (SecurityWeek)</p>
<p><a href="https://radar.offseq.com/threat/juniper-networks-patches-critical-junos-space-vuln-c5afe2ca"><u>Juniper Networks Patches Critical Junos Space Vulnerabilities</u></a> (OffSeq)  </p>
<p><a href="https://www.wired.com/story/apple-announces-2-million-bug-bounty-reward/"><u>Apple Announces $2 Million Bug Bounty Reward for the Most Dangerous Exploits</u></a> (WIRED)</p>
<p><a href="https://www.infosecurity-magazine.com/news/google-launches-ai-bug-bounty/"><u>Google Launches AI Bug Bounty with $30,000 Top Reward</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.fastly.com/blog/in-ai-we-trust-increasing-ai-adoption-in-appsec-despite-limited-oversight"><u>In AI We Trust? Increasing AI Adoption in AppSec Despite Limited Oversight</u></a> (Fastly)</p>
<p><a href="https://www.akamai.com/newsroom/press-release/microsegmentation-means-faster-incident-response-lower-insurance-premiums-for-organizations"><u>Reducing Risk: Microsegmentation Means Faster Incident Response, Lower Insurance Premiums for Organizations</u></a> (Akamai)</p>
<p><a href="https://www.securityweek.com/rondodox-botnet-takes-exploit-shotgun-approach/"><u>RondoDox Botnet Takes ‘Exploit Shotgun’ Approach</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/zdi-drops-13-unpatched-ivanti-endpoint-manager-vulnerabilities/"><u>ZDI Drops 13 Unpatched Ivanti Endpoint Manager Vulnerabilities</u></a> (SecurityWeek)</p>
<p><a href="https://therecord.media/fake-water-utility-honeypot-hacked-pro-russian-group"><u>Pro-Russian hackers caught bragging about attack on fake water utility</u></a> (The Record)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1730</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d1bc7e92-1c7a-11f0-85e0-67052ffef8c5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1729383343.mp3?updated=1760118757" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber defenders pulled into deportation duty.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2410/notes</link>
      <description>DHS reassigns cyberstaff to immigration duties. A massive DDoS attack disrupts several major gaming platforms. Discord refuses ransom after a third-party support system breach. Researchers examine Chaos ransomware and creative log-poisoning web intrusions. The FCC reconsiders its telecom data breach disclosure rule. Experts warn of teen recruitment in pro-Russian hacking operations. Ukraine’s parliament approves the establishment of Cyber Forces. Troy Hunt criticizes data breach injunctions as empty gestures. Our guest is Sarah Graham from the Atlantic Council’s Cyber Statecraft Initiative (CSI) discussing their report, "Mythical Beasts: Diving into the depths of the global spyware market." And, Spy Dog’s secret site goes off leash.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Sarah Graham from the Atlantic Council’s Cyber Statecraft Initiative (CSI) discussing their work and findings on "Mythical Beasts: Diving into the depths of the global spyware market."

Selected Reading

Homeland Security Cyber Personnel Reassigned to Jobs in Trump’s Deportation Push (Bloomberg)

Massive DDoS Attack Knocks Out Steam, Riot, and Other Services (Windows Report)

Hackers claim Discord breach exposed data of 5.5 million users (Bleeping Computer)

The Evolution of Chaos Ransomware: Faster, Smarter, and More Dangerous (FortiGuard Labs)

The Crown Prince, Nezha: A New Tool Favored by China-Nexus Threat Actors (Huntress)

Court Pauses FCC Data Breach Rules as Agency Takes New Look | Regulation (Cablefax)

Arrests Underscore Fears of Teen Cyberespionage Recruitment (Data Breach Today)

Ukraine's parliament backs creation of cyber forces in first reading (The Kyiv Independent)

Troy Hunt: Court Injunctions are the Thoughts and Prayers of Data Breach Response (Troy Hunt)

Spy Dog: Children's books pulled over explicit weblink (BBC News)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 09 Oct 2025 20:10:00 -0000</pubDate>
      <itunes:title>Cyber defenders pulled into deportation duty.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2410</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>DHS reassigns cyberstaff to immigration duties. A massive DDoS attack disrupts several major gaming platforms. Discord refuses ransom after a third-party support system breach. Researchers examine Chaos ransomware and creative log-poisoning web intrusions. The FCC reconsiders its telecom data breach disclosure rule. Experts warn of teen recruitment in pro-Russian hacking operations. Ukraine’s parliament approves the establishment of Cyber Forces. Troy Hunt criticizes data breach injunctions as empty gestures. Our guest is Sarah Graham from the Atlantic Council’s Cyber Statecraft Initiative (CSI) discussing their report, "Mythical Beasts: Diving into the depths of the global spyware market." And, Spy Dog’s secret site goes off leash.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Sarah Graham from the Atlantic Council’s Cyber Statecraft Initiative (CSI) discussing their work and findings on "Mythical Beasts: Diving into the depths of the global spyware market."

Selected Reading

Homeland Security Cyber Personnel Reassigned to Jobs in Trump’s Deportation Push (Bloomberg)

Massive DDoS Attack Knocks Out Steam, Riot, and Other Services (Windows Report)

Hackers claim Discord breach exposed data of 5.5 million users (Bleeping Computer)

The Evolution of Chaos Ransomware: Faster, Smarter, and More Dangerous (FortiGuard Labs)

The Crown Prince, Nezha: A New Tool Favored by China-Nexus Threat Actors (Huntress)

Court Pauses FCC Data Breach Rules as Agency Takes New Look | Regulation (Cablefax)

Arrests Underscore Fears of Teen Cyberespionage Recruitment (Data Breach Today)

Ukraine's parliament backs creation of cyber forces in first reading (The Kyiv Independent)

Troy Hunt: Court Injunctions are the Thoughts and Prayers of Data Breach Response (Troy Hunt)

Spy Dog: Children's books pulled over explicit weblink (BBC News)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>DHS reassigns cyberstaff to immigration duties. A massive DDoS attack disrupts several major gaming platforms. Discord refuses ransom after a third-party support system breach. Researchers examine Chaos ransomware and creative log-poisoning web intrusions. The FCC reconsiders its telecom data breach disclosure rule. Experts warn of teen recruitment in pro-Russian hacking operations. Ukraine’s parliament approves the establishment of Cyber Forces. Troy Hunt criticizes data breach injunctions as empty gestures. Our guest is Sarah Graham from the Atlantic Council’s Cyber Statecraft Initiative (CSI) discussing their report, "Mythical Beasts: Diving into the depths of the global spyware market." And, Spy Dog’s secret site goes off leash.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p><a href="https://www.linkedin.com/in/sarah-e-graham/"><u>Sarah Graham</u></a> from the <a href="https://www.linkedin.com/company/atlantic-council/"><u>Atlantic Council’s Cyber Statecraft Initiative</u></a> (CSI) discussing their work and findings on "<a href="https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/mythical-beasts-diving-into-the-depths-of-the-global-spyware-market/"><u>Mythical Beasts: Diving into the depths of the global spyware market</u></a>."</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bloomberg.com/news/articles/2025-10-08/homeland-security-cyber-personnel-reassigned-to-jobs-in-trump-s-deportation-push?accessToken=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzb3VyY2UiOiJTdWJzY3JpYmVyR2lmdGVkQXJ0aWNsZSIsImlhdCI6MTc1OTk2NDY2MCwiZXhwIjoxNzYwNTY5NDYwLCJhcnRpY2xlSWQiOiJUM0lENDlHT1QwSkswMCIsImJjb25uZWN0SWQiOiI0OEFDOEE5MkEwNTM0MkQ4OEIyRjkwQjhDMTgzMTdDMyJ9.fEwd9jBsgUGAoT50qDpnjLCajPvxwd88NzPBDDNXbNU"><u>Homeland Security Cyber Personnel Reassigned to Jobs in Trump’s Deportation Push</u></a> (Bloomberg)</p>
<p><a href="https://windowsreport.com/massive-ddos-attack-knocks-out-steam-riot-and-other-services/"><u>Massive DDoS Attack Knocks Out Steam, Riot, and Other Services</u></a> (Windows Report)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/hackers-claim-discord-breach-exposed-data-of-55-million-users/"><u>Hackers claim Discord breach exposed data of 5.5 million users</u></a> (Bleeping Computer)</p>
<p><a href="https://www.fortinet.com/blog/threat-research/evolution-of-chaos-ransomware-faster-smarter-and-more-dangerous"><u>The Evolution of Chaos Ransomware: Faster, Smarter, and More Dangerous</u></a> (FortiGuard Labs)</p>
<p><a href="https://www.huntress.com/blog/nezha-china-nexus-threat-actor-tool"><u>The Crown Prince, Nezha: A New Tool Favored by China-Nexus Threat Actors</u></a> (Huntress)</p>
<p><a href="https://www.cablefax.com/regulation/on-hold-court-pauses-fcc-data-breach-rules-as-agency-takes-new-look"><u>Court Pauses FCC Data Breach Rules as Agency Takes New Look | Regulation</u></a> (Cablefax)</p>
<p><a href="https://www.databreachtoday.com/arrests-underscore-fears-teen-cyberespionage-recruitment-a-29681"><u>Arrests Underscore Fears of Teen Cyberespionage Recruitment</u></a> (Data Breach Today)</p>
<p><a href="https://kyivindependent.com/ukraines-parliament-backs-creation-of-cyber-forces-in-first-reading/"><u>Ukraine's parliament backs creation of cyber forces in first reading</u></a> (The Kyiv Independent)</p>
<p><a href="https://www.troyhunt.com/court-injunctions-are-the-thoughts-and-prayers-of-data-breach-response/"><u>Troy Hunt: Court Injunctions are the Thoughts and Prayers of Data Breach Response</u></a> (Troy Hunt)</p>
<p><a href="https://www.bbc.co.uk/news/articles/cn7631z8343o"><u>Spy Dog: Children's books pulled over explicit weblink </u></a>(BBC News)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1789</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d1968dcc-1c7a-11f0-85e0-e7603e867952]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5619762586.mp3?updated=1760033713" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chinese hackers serve up espionage.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2409/notes</link>
      <description>Chinese hackers infiltrate a major U.S. law firm. The EU Commission President warns Russia is waging a hybrid war against Europe. Researchers say LoJax is the latest malware from Russia’s Fancy Bear. Salesforce refuses ransom demands. London Police arrest two teens over an alleged ransomware attack on a preschool. Microsoft tightens Windows 11 setup restrictions. SINET and DataTribe spotlight 2025 cybersecurity innovators. On our Industry Voices segment, we are joined by Sean Deuby, Semperis Principal Technologist, discussing identity system security and the growth of the HIP Conference. Employees overshare with ChatGPT. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by ⁠Sean Deuby⁠, ⁠Semperis⁠ Principal Technologist, discussing identity system security and the growth of the ⁠HIP Conference⁠ while highlighting some of the keynotes and presentations. If you want to hear the full conversation, you can tune in here.

Selected Reading

Chinese Hackers Said to Target U.S. Law Firms (The New York Times)

Russia is at ‘hybrid war’ with Europe, warns EU chief, calling for members ‘to take it very seriously’ (The Record)

What you need to know about “LoJax”, the new, stealthy malware from Fancy Bear (ESET)

Salesforce refuses to pay ransom over widespread data theft attacks (Bleeping Computer)

Teens arrested in London preschool ransomware attack (The Register)

Microsoft kills more Microsoft Account bypasses in Windows 11 (Bleeping Computer)

SINET Announces the 2025 SINET16 Innovator Awards (BusinessWire)

DataTribe Announces Finalists for Eighth Annual Cybersecurity Startup Challenge (DataTribe) 

Employees regularly paste company secrets into ChatGPT (The Register)

One-man spam campaign ravages EU ‘chat control’ bill (POLITICO)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 08 Oct 2025 20:20:00 -0000</pubDate>
      <itunes:title>Chinese hackers serve up espionage.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2409</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Chinese hackers infiltrate a major U.S. law firm. The EU Commission President warns Russia is waging a hybrid war against Europe. Researchers say LoJax is the latest malware from Russia’s Fancy Bear. Salesforce refuses ransom demands. London Police arrest two teens over an alleged ransomware attack on a preschool. Microsoft tightens Windows 11 setup restrictions. SINET and DataTribe spotlight 2025 cybersecurity innovators. On our Industry Voices segment, we are joined by Sean Deuby, Semperis Principal Technologist, discussing identity system security and the growth of the HIP Conference. Employees overshare with ChatGPT. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by ⁠Sean Deuby⁠, ⁠Semperis⁠ Principal Technologist, discussing identity system security and the growth of the ⁠HIP Conference⁠ while highlighting some of the keynotes and presentations. If you want to hear the full conversation, you can tune in here.

Selected Reading

Chinese Hackers Said to Target U.S. Law Firms (The New York Times)

Russia is at ‘hybrid war’ with Europe, warns EU chief, calling for members ‘to take it very seriously’ (The Record)

What you need to know about “LoJax”, the new, stealthy malware from Fancy Bear (ESET)

Salesforce refuses to pay ransom over widespread data theft attacks (Bleeping Computer)

Teens arrested in London preschool ransomware attack (The Register)

Microsoft kills more Microsoft Account bypasses in Windows 11 (Bleeping Computer)

SINET Announces the 2025 SINET16 Innovator Awards (BusinessWire)

DataTribe Announces Finalists for Eighth Annual Cybersecurity Startup Challenge (DataTribe) 

Employees regularly paste company secrets into ChatGPT (The Register)

One-man spam campaign ravages EU ‘chat control’ bill (POLITICO)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chinese hackers infiltrate a major U.S. law firm. The EU Commission President warns Russia is waging a hybrid war against Europe. Researchers say LoJax is the latest malware from Russia’s Fancy Bear. Salesforce refuses ransom demands. London Police arrest two teens over an alleged ransomware attack on a preschool. Microsoft tightens Windows 11 setup restrictions. SINET and DataTribe spotlight 2025 cybersecurity innovators. On our Industry Voices segment, we are joined by Sean Deuby, Semperis Principal Technologist, discussing identity system security and the growth of the HIP Conference. Employees overshare with ChatGPT. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/seandeuby/">⁠<u>Sean Deuby</u>⁠</a>, <a href="https://www.linkedin.com/company/semperis/">⁠<u>Semperis</u>⁠</a> Principal Technologist, discussing identity system security and the growth of the <a href="https://www.hipconf.com/why-attend/">⁠<u>HIP Conference</u>⁠</a> while highlighting some of the keynotes and presentations. If you want to hear the full conversation, you can tune in <a href="https://explore.thecyberwire.com/sean-deuby">here</a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.nytimes.com/2025/10/07/us/politics/chinese-hackers-us-law-firms.html"><u>Chinese Hackers Said to Target U.S. Law Firms</u></a> (The New York Times)</p>
<p><a href="https://therecord.media/russia-hybrid-war-europe-von-der-leyen-speech"><u>Russia is at ‘hybrid war’ with Europe, warns EU chief, calling for members ‘to take it very seriously’</u></a> (The Record)</p>
<p><a href="https://www.eset.com/us/about/newsroom/corporate-blog/what-you-need-to-know-about-lojax-the-new-stealthy-malware-from-fancy-bear/"><u>What you need to know about “LoJax”, the new, stealthy malware from Fancy Bear</u></a> (ESET)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/salesforce-refuses-to-pay-ransom-over-widespread-data-theft-attacks/"><u>Salesforce refuses to pay ransom over widespread data theft attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.theregister.com/2025/10/07/2_teens_arrested_in_london/"><u>Teens arrested in London preschool ransomware attack</u></a> (The Register)</p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-blocks-more-tricks-to-skip-microsoft-account-setup-in-windows-11/"><u>Microsoft kills more Microsoft Account bypasses in Windows 11</u></a> (Bleeping Computer)</p>
<p><a href="https://www.businesswire.com/news/home/20251007839628/en/SINET-Announces-the-2025-SINET16-Innovator-Awards"><u>SINET Announces the 2025 SINET16 Innovator Awards</u></a> (BusinessWire)</p>
<p><a href="https://datatribe.com/news/2025-challenge-finalists/"><u>DataTribe Announces Finalists for Eighth Annual Cybersecurity Startup Challenge</u></a> (DataTribe) </p>
<p><a href="https://www.theregister.com/2025/10/07/gen_ai_shadow_it_secrets/"><u>Employees regularly paste company secrets into ChatGPT</u></a> (The Register)</p>
<p><a href="https://www.politico.eu/article/one-man-spam-campaign-ravages-eu-chat-control-bill-fight-chat-control/"><u>One-man spam campaign ravages EU ‘chat control’ bill</u></a> (POLITICO)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1924</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d170871c-1c7a-11f0-85e0-4f9442177ede]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6269471852.mp3?updated=1759952078" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Critical GoAnywhere bug fuels ransomware wave.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2408/notes</link>
      <description>Microsoft tags a critical vulnerability in Fortra’s GoAnywhere software. A critical Redis vulnerability could allow remote code execution. Researchers tie BIETA to China’s MSS technology enablement. Competing narratives cloud the Oracle E-Business Suite breach. An Ohio-based vision care firm will pay $5 million to settle phishing-related data breach claims. “Trinity of Chaos” claims to be a new ransomware collective. LinkedIn files a lawsuit against an alleged data scraper. This year’s Nobel Prize in Physics recognizes pioneering research into quantum mechanical tunneling. On today’s Industry Voices segment, we are joined by Alastair Paterson from Harmonic Security, discussing shadow AI and the new era of work. Australia’s AI-authored report gets a human rewrite.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices segment, we are joined by Alastair Paterson, CEO and Co-Founder of Harmonic Security, discussing shadow AI and the new era of work. You can hear the full conversation with Alastair here.

Selected Reading

Microsoft: Critical GoAnywhere Bug Exploited in Medusa Ransomware Camp (Infosecurity Magazine)

Redis warns of critical flaw impacting thousaRends of instances (Bleeping Computer)

BIETA: A Technology Enablement Front for China's MSS (Recorded Future)

Well, Well, Well. It’s Another Day. (Oracle E-Business Suite Pre-Auth RCE Chain - CVE-2025-61882) (Labs)

EyeMed Agrees to Pay $5M to Settle Email Breach Litigation (Govinfo Security)

Ransomware Group “Trinity of Chaos” Launches Data Leak Site  (Infosecurity Magazine)

LinkedIn sues ProAPIs for using 1M fake accounts to scrape user data (Bleeping Computer)

The Nobel Prize for physics is awarded for discoveries in quantum mechanical tunneling (NPR)

Deloitte refunds Australian government over AI in report (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire Daily podcast is a production of N2K Networks, your source for critical industry insights, strategic intelligence, and performance-driven learning products. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Oct 2025 20:10:00 -0000</pubDate>
      <itunes:title>Critical GoAnywhere bug fuels ransomware wave.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2408</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Microsoft tags a critical vulnerability in Fortra’s GoAnywhere software. A critical Redis vulnerability could allow remote code execution. Researchers tie BIETA to China’s MSS technology enablement. Competing narratives cloud the Oracle E-Business Suite breach. An Ohio-based vision care firm will pay $5 million to settle phishing-related data breach claims. “Trinity of Chaos” claims to be a new ransomware collective. LinkedIn files a lawsuit against an alleged data scraper. This year’s Nobel Prize in Physics recognizes pioneering research into quantum mechanical tunneling. On today’s Industry Voices segment, we are joined by Alastair Paterson from Harmonic Security, discussing shadow AI and the new era of work. Australia’s AI-authored report gets a human rewrite.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices segment, we are joined by Alastair Paterson, CEO and Co-Founder of Harmonic Security, discussing shadow AI and the new era of work. You can hear the full conversation with Alastair here.

Selected Reading

Microsoft: Critical GoAnywhere Bug Exploited in Medusa Ransomware Camp (Infosecurity Magazine)

Redis warns of critical flaw impacting thousaRends of instances (Bleeping Computer)

BIETA: A Technology Enablement Front for China's MSS (Recorded Future)

Well, Well, Well. It’s Another Day. (Oracle E-Business Suite Pre-Auth RCE Chain - CVE-2025-61882) (Labs)

EyeMed Agrees to Pay $5M to Settle Email Breach Litigation (Govinfo Security)

Ransomware Group “Trinity of Chaos” Launches Data Leak Site  (Infosecurity Magazine)

LinkedIn sues ProAPIs for using 1M fake accounts to scrape user data (Bleeping Computer)

The Nobel Prize for physics is awarded for discoveries in quantum mechanical tunneling (NPR)

Deloitte refunds Australian government over AI in report (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire Daily podcast is a production of N2K Networks, your source for critical industry insights, strategic intelligence, and performance-driven learning products. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft tags a critical vulnerability in Fortra’s GoAnywhere software. A critical Redis vulnerability could allow remote code execution. Researchers tie BIETA to China’s MSS technology enablement. Competing narratives cloud the Oracle E-Business Suite breach. An Ohio-based vision care firm will pay $5 million to settle phishing-related data breach claims. “Trinity of Chaos” claims to be a new ransomware collective. LinkedIn files a lawsuit against an alleged data scraper. This year’s Nobel Prize in Physics recognizes pioneering research into quantum mechanical tunneling. On today’s Industry Voices segment, we are joined by Alastair Paterson from Harmonic Security, discussing shadow AI and the new era of work. Australia’s AI-authored report gets a human rewrite.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On today’s Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/alastair-paterson-2586445/"><u>Alastair Paterson</u></a>, CEO and Co-Founder of <a href="https://www.linkedin.com/company/harmonic-security/"><u>Harmonic Security</u></a>, discussing shadow AI and the new era of work. You can hear the full conversation with Alastair <a href="https://explore.thecyberwire.com/alastair-paterson">here</a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.infosecurity-magazine.com/news/microsoft-critical-goanywhere/"><u>Microsoft: Critical GoAnywhere Bug Exploited in Medusa Ransomware Camp</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/redis-warns-of-max-severity-flaw-impacting-thousands-of-instances/"><u>Redis warns of critical flaw impacting thousaRends of instances</u></a> (Bleeping Computer)</p>
<p><a href="https://www.recordedfuture.com/research/bieta-technology-enablement-front-for-chinas-mss"><u>BIETA: A Technology Enablement Front for China's MSS</u></a> (Recorded Future)</p>
<p><a href="https://labs.watchtowr.com/well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882/"><u>Well, Well, Well. It’s Another Day. (Oracle E-Business Suite Pre-Auth RCE Chain - CVE-2025-61882)</u></a> (Labs)</p>
<p><a href="https://www.govinfosecurity.com/eyemed-agrees-to-pay-5m-to-settle-email-breach-litigation-a-29659"><u>EyeMed Agrees to Pay $5M to Settle Email Breach Litigation</u></a> (Govinfo Security)</p>
<p><a href="https://www.infosecurity-magazine.com/news/trinity-chaos-launches-data-leak/"><u>Ransomware Group “Trinity of Chaos” Launches Data Leak Site </u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.bleepingcomputer.com/news/legal/linkedin-sues-proapis-for-using-1m-fake-accounts-to-scrape-user-data/"><u>LinkedIn sues ProAPIs for using 1M fake accounts to scrape user data</u></a> (Bleeping Computer)</p>
<p><a href="https://www.npr.org/2025/10/07/g-s1-92351/nobel-prize-physics-quantum-mechanical-tunneling-clarke-devoret-martinis"><u>The Nobel Prize for physics is awarded for discoveries in quantum mechanical tunneling</u></a> (NPR)</p>
<p><a href="https://www.theregister.com/2025/10/06/deloitte_ai_report_australia/"><u>Deloitte refunds Australian government over AI in report</u></a> (The Register)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire Daily podcast is a production of N2K Networks, your source for critical industry insights, strategic intelligence, and performance-driven learning products. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1943</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d13c1a40-1c7a-11f0-85e0-4f4180effd1b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5282630527.mp3?updated=1759860938" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Oracle zero-day serves up persistent access.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2407/notes</link>
      <description>A critical zero-day in Oracle E-Business Suite is under active exploitation.  ICE plans a major expansion of its social media surveillance operations. Discord confirms a third-party data breach. A critical vulnerability in the Unity game engine could allow arbitrary code execution. New variants of the XWorm remote access trojan spread through phishing campaigns. Researchers uncover a critical command injection flaw in Dell UnityVSA storage appliances. There’s been a sharp surge in reconnaissance scans targeting Palo Alto Networks login portals.  A new hacking competition offers $4.5 million in prizes for exploits targeting major cloud and AI software. Monday Business Brief. On our Afternoon Cyber Tea segment with Microsoft’s Ann Johnson, Ann and guest Volker Wagner⁠, Chief Information Security Officer at BASF, share some Lessons from the Frontlines of Industrial Security. Don’t spend that ParkMobile settlement all in one place. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Afternoon Cyber Tea Segment

Today we are highlighting Afternoon Cyber Tea with Ann Johnson. Ann and guest Volker Wagner⁠, Chief Information Security Officer at BASF, share some Lessons from the Frontlines of Industrial Security. You can listen to Ann and Volker's full conversation⁠ here⁠ and catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app.

Selected Reading

PoC Exploit Released for Remotely Exploitable Oracle E-Business Suite 0-Day Vulnerability (Cyber Security News)

ICE Wants to Build Out a 24/7 Social Media Surveillance Team (WIRED)

Discord blames third-party support outfit for data breach (The Register)

Android and Windows gamers worldwide potentially affected by bug in Unity game engine (The Record)

XWorm malware resurfaces with ransomware module, over 35 plugins (Bleeping Computer)

Patch Now: Dell UnityVSA Flaw Allows Command Execution Without Login (HackRead)

Scanning of Palo Alto Portals Surges 500% (Infosecurity Magazine)

$4.5 Million Offered in New Cloud Hacking Competition (SecurityWeek)

Accenture acquires Japanese AI and DX provider, Aidemy Inc. (N2K Pro Business Briefing)

ParkMobile pays... $1 each for 2021 data breach that hit 22 million (Bleeping Computer)

Vote for Dave!

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our ⁠brief listener survey⁠. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 06 Oct 2025 20:10:00 -0000</pubDate>
      <itunes:title>Oracle zero-day serves up persistent access.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2407</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A critical zero-day in Oracle E-Business Suite is under active exploitation.  ICE plans a major expansion of its social media surveillance operations. Discord confirms a third-party data breach. A critical vulnerability in the Unity game engine could allow arbitrary code execution. New variants of the XWorm remote access trojan spread through phishing campaigns. Researchers uncover a critical command injection flaw in Dell UnityVSA storage appliances. There’s been a sharp surge in reconnaissance scans targeting Palo Alto Networks login portals.  A new hacking competition offers $4.5 million in prizes for exploits targeting major cloud and AI software. Monday Business Brief. On our Afternoon Cyber Tea segment with Microsoft’s Ann Johnson, Ann and guest Volker Wagner⁠, Chief Information Security Officer at BASF, share some Lessons from the Frontlines of Industrial Security. Don’t spend that ParkMobile settlement all in one place. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Afternoon Cyber Tea Segment

Today we are highlighting Afternoon Cyber Tea with Ann Johnson. Ann and guest Volker Wagner⁠, Chief Information Security Officer at BASF, share some Lessons from the Frontlines of Industrial Security. You can listen to Ann and Volker's full conversation⁠ here⁠ and catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app.

Selected Reading

PoC Exploit Released for Remotely Exploitable Oracle E-Business Suite 0-Day Vulnerability (Cyber Security News)

ICE Wants to Build Out a 24/7 Social Media Surveillance Team (WIRED)

Discord blames third-party support outfit for data breach (The Register)

Android and Windows gamers worldwide potentially affected by bug in Unity game engine (The Record)

XWorm malware resurfaces with ransomware module, over 35 plugins (Bleeping Computer)

Patch Now: Dell UnityVSA Flaw Allows Command Execution Without Login (HackRead)

Scanning of Palo Alto Portals Surges 500% (Infosecurity Magazine)

$4.5 Million Offered in New Cloud Hacking Competition (SecurityWeek)

Accenture acquires Japanese AI and DX provider, Aidemy Inc. (N2K Pro Business Briefing)

ParkMobile pays... $1 each for 2021 data breach that hit 22 million (Bleeping Computer)

Vote for Dave!

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our ⁠brief listener survey⁠. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A critical zero-day in Oracle E-Business Suite is under active exploitation.  ICE plans a major expansion of its social media surveillance operations. Discord confirms a third-party data breach. A critical vulnerability in the Unity game engine could allow arbitrary code execution. New variants of the XWorm remote access trojan spread through phishing campaigns. Researchers uncover a critical command injection flaw in Dell UnityVSA storage appliances. There’s been a sharp surge in reconnaissance scans targeting Palo Alto Networks login portals.  A new hacking competition offers $4.5 million in prizes for exploits targeting major cloud and AI software. Monday Business Brief. On our Afternoon Cyber Tea segment with Microsoft’s Ann Johnson, Ann and guest Volker Wagner⁠, Chief Information Security Officer at BASF, share some Lessons from the Frontlines of Industrial Security. Don’t spend that ParkMobile settlement all in one place.<strong> </strong></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Afternoon Cyber Tea Segment</strong></p>
<p>Today we are highlighting <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea</a> with <a href="https://www.linkedin.com/in/ann-johnsons/">Ann Johnson</a>. Ann and guest <a href="https://www.linkedin.com/in/volker-wagner-881a5935/">Volker Wagner⁠</a>, Chief Information Security Officer at BASF, share some Lessons from the Frontlines of Industrial Security. You can listen to Ann and Volker's full conversation<a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea/115/notes">⁠ <u>here</u>⁠</a> and catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://cybersecuritynews.com/oracle-e-business-suite-0-day-vulnerability/"><u>PoC Exploit Released for Remotely Exploitable Oracle E-Business Suite 0-Day Vulnerability</u></a> (Cyber Security News)</p>
<p><a href="https://www.wired.com/story/ice-social-media-surveillance-24-7-contract/"><u>ICE Wants to Build Out a 24/7 Social Media Surveillance Team</u></a> (WIRED)</p>
<p><a href="https://www.theregister.com/2025/10/06/discord_support_data_breach/"><u>Discord blames third-party support outfit for data breach</u></a> (The Register)</p>
<p><a href="https://therecord.media/unity-game-engine-vulnerability-android-windows-linux-macos"><u>Android and Windows gamers worldwide potentially affected by bug in Unity game engine</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/xworm-malware-resurfaces-with-ransomware-module-over-35-plugins/"><u>XWorm malware resurfaces with ransomware module, over 35 plugins</u></a> (Bleeping Computer)</p>
<p><a href="https://hackread.com/dell-unityvsa-flaw-command-execution-without-login/"><u>Patch Now: Dell UnityVSA Flaw Allows Command Execution Without Login</u></a> (HackRead)</p>
<p><a href="https://www.infosecurity-magazine.com/news/scanning-of-palo-alto-portals/"><u>Scanning of Palo Alto Portals Surges 500%</u> </a>(Infosecurity Magazine)</p>
<p><a href="https://www.securityweek.com/4-5-million-offered-in-new-cloud-hacking-competition/"><u>$4.5 Million Offered in New Cloud Hacking Competition</u></a> (SecurityWeek)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/7/39"><u>Accenture acquires Japanese AI and DX provider, Aidemy Inc.</u></a> (N2K Pro Business Briefing)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/parkmobile-pays-1-each-for-2021-data-breach-that-hit-22-million/"><u>ParkMobile pays... $1 each for 2021 data breach that hit 22 million</u></a> (Bleeping Computer)</p>
<p><a href="https://www.sans.org/about/awards/difference-makers">Vote for Dave!</a></p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ">⁠<u>brief listener survey</u>⁠</a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1427</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d10b87c2-1c7a-11f0-85e0-9b2d92a43cec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9047184383.mp3?updated=1759777087" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sloane Menkes: What is the 2%? [Consultant] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/89/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Principal in PricewaterhouseCoopers Cyber Risk and Regulatory Practice, Sloane Menkes, shares her story of how non-linear math helped to shape her life and career. Sloane credits a high school classmate for inspiring her mantra "What is the 2%?" that she employs when she feels like things are shutting down. She talks about her experiences in calculus class at the US AIr Force Academy that helped to enlighten her and inform the intuitive problem solving skill or way of thinking that she'd been employing in her life. She joined Office of Special Investigations and working with Howard Schmidt is where Sloane first started to get interested in cybersecurity. She shares what she loves about the consulting role is that the environment is constantly changing, and she offers some advice for women interested in cybersecurity. We thank Sloane for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 05 Oct 2025 07:00:00 -0000</pubDate>
      <itunes:title>Sloane Menkes: What is the 2%? [Consultant] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>89</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/684b2a68-9faa-11f0-95f2-c7a75a5e5828/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Principal in PricewaterhouseCoopers Cyber Risk and Regulatory Practice, Sloane Menkes, shares her story of how non-linear math helped to shape her life and career. Sloane credits a high school classmate for inspiring her mantra "What is the 2%?" that she employs when she feels like things are shutting down. She talks about her experiences in calculus class at the US AIr Force Academy that helped to enlighten her and inform the intuitive problem solving skill or way of thinking that she'd been employing in her life. She joined Office of Special Investigations and working with Howard Schmidt is where Sloane first started to get interested in cybersecurity. She shares what she loves about the consulting role is that the environment is constantly changing, and she offers some advice for women interested in cybersecurity. We thank Sloane for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Principal in PricewaterhouseCoopers Cyber Risk and Regulatory Practice, Sloane Menkes, shares her story of how non-linear math helped to shape her life and career. Sloane credits a high school classmate for inspiring her mantra "What is the 2%?" that she employs when she feels like things are shutting down. She talks about her experiences in calculus class at the US AIr Force Academy that helped to enlighten her and inform the intuitive problem solving skill or way of thinking that she'd been employing in her life. She joined Office of Special Investigations and working with Howard Schmidt is where Sloane first started to get interested in cybersecurity. She shares what she loves about the consulting role is that the environment is constantly changing, and she offers some advice for women interested in cybersecurity. We thank Sloane for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>611</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[684b2a68-9faa-11f0-95f2-c7a75a5e5828]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7140676901.mp3?updated=1735936617" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>2025 DataTribe Challenge: Forging the future of cyber. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/86/notes</link>
      <description>The DataTribe Challenge is a launchpad for elite cybersecurity and cyber-adjacent startups ready to break out. 2025 marks the 8th annual edition of the event with a change in venue and some exciting new updates. 

We take you on a journey from inception with Leo Scott, Managing Director and Chief Innovation Officer at DataTribe, and 3 past DataTribe Challenge winners at different levels on their growth tracks following their participation in the event. You'll meet Anita D'Amico, former CEO of Code DX (acquired by Synopsis in 2021) and 2019 winner; Greg Baker, Co-Founder of Balance Theory and 2022 winner; and Brian Proctor, Founder and CEO of Frenos and 2024 winner.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 05 Oct 2025 07:00:00 -0000</pubDate>
      <itunes:title>2025 DataTribe Challenge: Forging the future of cyber. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>86</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/4e44bc70-9fb8-11f0-9de2-b3620ca942a4/image/0216c9cea15c53e5d2c739964a38623c.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The DataTribe Challenge is a launchpad for elite cybersecurity and cyber-adjacent startups ready to break out. 2025 marks the 8th annual edition of the event with a change in venue and some exciting new updates. 

We take you on a journey from inception with Leo Scott, Managing Director and Chief Innovation Officer at DataTribe, and 3 past DataTribe Challenge winners at different levels on their growth tracks following their participation in the event. You'll meet Anita D'Amico, former CEO of Code DX (acquired by Synopsis in 2021) and 2019 winner; Greg Baker, Co-Founder of Balance Theory and 2022 winner; and Brian Proctor, Founder and CEO of Frenos and 2024 winner.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The <a href="https://cid.datatribe.com/challenge">DataTribe Challenge</a> is a launchpad for elite cybersecurity and cyber-adjacent startups ready to break out. 2025 marks the 8th annual edition of the event with a change in venue and some exciting new updates. </p>
<p>We take you on a journey from inception with <a href="https://www.linkedin.com/in/leoscott/">Leo Scott</a>, Managing Director and Chief Innovation Officer at <a href="https://datatribe.com/">DataTribe</a>, and 3 past DataTribe Challenge winners at different levels on their growth tracks following their participation in the event. You'll meet <a href="https://www.linkedin.com/in/anita-damico/">Anita D'Amico</a>, former CEO of Code DX (acquired by <a href="https://investor.synopsys.com/news/news-details/2021/News-Release-Synopsys-Acquires-Code-Dx-to-Extend-Application-Security-Portfolio-06-08-2021/default.aspx">Synopsis</a> in 2021) and 2019 winner; <a href="https://www.linkedin.com/in/greg-baker-088606a8/">Greg Baker</a>, Co-Founder of <a href="https://www.balancetheory.io/">Balance Theory</a> and 2022 winner; and <a href="https://www.linkedin.com/in/brianproctor67/">Brian Proctor</a>, Founder and CEO of <a href="https://frenos.io/">Frenos</a> and 2024 winner.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3642</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4e44bc70-9fb8-11f0-9de2-b3620ca942a4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9761549069.mp3?updated=1759335090" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>China’s stealthiest spy operation yet. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/396/notes</link>
      <description>Assaf Dahan, Director of Threat Research, Cortex XDR, at Palo Alto Networks, discussing Phantom Taurus, a new China APT uncovered by Unit 42. Unit 42 researchers have identified Phantom Taurus, a newly designated Chinese state-aligned APT conducting long-term espionage against government and telecommunications organizations across Africa, the Middle East, and Asia. 

Distinguished by its stealth, persistence, and rare tactics, the group has recently shifted from email-focused data theft to directly targeting databases and deploying a powerful new malware suite called NET-STAR, designed to compromise IIS web servers and evade detection. This suite, featuring modular, fileless backdoors and advanced evasion capabilities, marks a significant evolution in Phantom Taurus’ operations and underscores the group’s strategic intelligence-gathering objectives.

The research can be found here:


  
⁠Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Oct 2025 07:00:00 -0000</pubDate>
      <itunes:title>China’s stealthiest spy operation yet. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>396</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/f8d395e6-a079-11f0-8102-6f677e604fe8/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Assaf Dahan, Director of Threat Research, Cortex XDR, at Palo Alto Networks, discussing Phantom Taurus, a new China APT uncovered by Unit 42. Unit 42 researchers have identified Phantom Taurus, a newly designated Chinese state-aligned APT conducting long-term espionage against government and telecommunications organizations across Africa, the Middle East, and Asia. 

Distinguished by its stealth, persistence, and rare tactics, the group has recently shifted from email-focused data theft to directly targeting databases and deploying a powerful new malware suite called NET-STAR, designed to compromise IIS web servers and evade detection. This suite, featuring modular, fileless backdoors and advanced evasion capabilities, marks a significant evolution in Phantom Taurus’ operations and underscores the group’s strategic intelligence-gathering objectives.

The research can be found here:


  
⁠Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/assaf-dahan-a98226108/">Assaf Dahan</a>, Director of Threat Research, Cortex XDR, at <a href="https://www.linkedin.com/company/palo-alto-networks/">Palo Alto Networks</a>, discussing Phantom Taurus, a new China APT uncovered by Unit 42. Unit 42 researchers have identified <em>Phantom Taurus</em>, a newly designated Chinese state-aligned APT conducting long-term espionage against government and telecommunications organizations across Africa, the Middle East, and Asia. </p>
<p>Distinguished by its stealth, persistence, and rare tactics, the group has recently shifted from email-focused data theft to directly targeting databases and deploying a powerful new malware suite called NET-STAR, designed to compromise IIS web servers and evade detection. This suite, featuring modular, fileless backdoors and advanced evasion capabilities, marks a significant evolution in Phantom Taurus’ operations and underscores the group’s strategic intelligence-gathering objectives.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://businessinsights.bitdefender.com/curly-comrades-new-threat-actor-targeting-geopolitical-hotbeds">⁠</a><a href="https://unit42.paloaltonetworks.com/phantom-taurus/">Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1372</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f8d395e6-a079-11f0-8102-6f677e604fe8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5469859005.mp3?updated=1759507466" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>WhatsApp worm spreads.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2406/notes</link>
      <description>A fast-spreading malware campaign is abusing WhatsApp as both lure and launchpad. Carmaker Renault suffers a data breach. DrayTek patches a critical router flaw. CISA alerts cover a range of vulnerabilities. A new phishing kit lowers the bar for convincing lures. A Catholic hospital network pays $7.6 million to settle data breach litigation. A major breach at FEMA exposes employee data. Google expands Gmail’s end-to-end encryption (E2EE) capabilities. On our Industry Voices segment, we are joined by Brian Vecci, Field CTO at Varonis, discussing move fast but don’t break things: Innovating at light speed without putting data at risk. The UK’s digital ID is a solution in search of a mandate.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Brian Vecci, Field CTO at Varonis, discussing move fast but don’t break things: Innovating at light speed without putting data at risk. You can listen to Brian’s full conversation here. 

Selected Reading

Threat Actors Leveraging WhatsApp Messages to Attack Windows Systems With SORVEPOTEL Malware (Cybersecurity News)

Major car maker confirms customer data stolen in cyber attack (The Independent)

Unauthenticated RCE Flaw Patched in DrayTek Routers  (SecurityWeek)

Organizations Warned of Exploited Meteobridge Vulnerability (SecurityWeek)

CISA Releases Two Industrial Control Systems Advisories (CISA.gov)

New ‘point-and-click’ phishing kit simplifies malicious attachment creation (SC Media)

Hospital Chain to Pay $7.6M to Settle Breach Litigation (Bank Inforsecurity)

FEMA cyber breach exposes employee data (SC Media)

Gmail business users can now send encrypted emails to anyone (Bleeping Computer)UK government says digital ID won't be compulsory – honest (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 03 Oct 2025 20:10:00 -0000</pubDate>
      <itunes:title>WhatsApp worm spreads.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>240</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A fast-spreading malware campaign is abusing WhatsApp as both lure and launchpad. Carmaker Renault suffers a data breach. DrayTek patches a critical router flaw. CISA alerts cover a range of vulnerabilities. A new phishing kit lowers the bar for convincing lures. A Catholic hospital network pays $7.6 million to settle data breach litigation. A major breach at FEMA exposes employee data. Google expands Gmail’s end-to-end encryption (E2EE) capabilities. On our Industry Voices segment, we are joined by Brian Vecci, Field CTO at Varonis, discussing move fast but don’t break things: Innovating at light speed without putting data at risk. The UK’s digital ID is a solution in search of a mandate.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Brian Vecci, Field CTO at Varonis, discussing move fast but don’t break things: Innovating at light speed without putting data at risk. You can listen to Brian’s full conversation here. 

Selected Reading

Threat Actors Leveraging WhatsApp Messages to Attack Windows Systems With SORVEPOTEL Malware (Cybersecurity News)

Major car maker confirms customer data stolen in cyber attack (The Independent)

Unauthenticated RCE Flaw Patched in DrayTek Routers  (SecurityWeek)

Organizations Warned of Exploited Meteobridge Vulnerability (SecurityWeek)

CISA Releases Two Industrial Control Systems Advisories (CISA.gov)

New ‘point-and-click’ phishing kit simplifies malicious attachment creation (SC Media)

Hospital Chain to Pay $7.6M to Settle Breach Litigation (Bank Inforsecurity)

FEMA cyber breach exposes employee data (SC Media)

Gmail business users can now send encrypted emails to anyone (Bleeping Computer)UK government says digital ID won't be compulsory – honest (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A fast-spreading malware campaign is abusing WhatsApp as both lure and launchpad. Carmaker Renault suffers a data breach. DrayTek patches a critical router flaw. CISA alerts cover a range of vulnerabilities. A new phishing kit lowers the bar for convincing lures. A Catholic hospital network pays $7.6 million to settle data breach litigation. A major breach at FEMA exposes employee data. Google expands Gmail’s end-to-end encryption (E2EE) capabilities. On our Industry Voices segment, we are joined by Brian Vecci, Field CTO at Varonis, discussing move fast but don’t break things: Innovating at light speed without putting data at risk. The UK’s digital ID is a solution in search of a mandate.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/brianvecci/">Brian Vecci</a>, Field CTO at <a href="https://www.linkedin.com/company/varonis/">Varonis</a>, discussing move fast but don’t break things: Innovating at light speed without putting data at risk. You can listen to Brian’s full conversation <a href="https://explore.thecyberwire.com/varonis">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://cybersecuritynews.com/threat-actors-attack-windows-systems-with-sorvepotel-malware/"><u>Threat Actors Leveraging WhatsApp Messages to Attack Windows Systems With SORVEPOTEL Malware</u></a> (Cybersecurity News)</p>
<p><a href="https://www.independent.co.uk/news/uk/home-news/renault-data-breach-cyber-attack-b2838785.html"><u>Major car maker confirms customer data stolen in cyber attack</u></a> (The Independent)</p>
<p><a href="https://www.securityweek.com/unauthenticated-rce-flaw-patched-in-draytek-routers/"><u>Unauthenticated RCE Flaw Patched in DrayTek Routers </u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/organizations-warned-of-exploited-meteobridge-vulnerability/"><u>Organizations Warned of Exploited Meteobridge Vulnerability </u></a>(SecurityWeek)</p>
<p><a href="https://www.cisa.gov/news-events/alerts/2025/10/02/cisa-releases-two-industrial-control-systems-advisories"><u>CISA Releases Two Industrial Control Systems Advisories</u></a> (CISA.gov)</p>
<p><a href="https://www.scworld.com/news/new-point-and-click-phishing-kit-simplifies-malicious-attachment-creation"><u>New ‘point-and-click’ phishing kit simplifies malicious attachment creation </u></a>(SC Media)</p>
<p><a href="https://www.bankinfosecurity.com/hospital-chain-to-pay-76m-to-settle-breach-litigation-a-29623"><u>Hospital Chain to Pay $7.6M to Settle Breach Litigation</u></a> (Bank Inforsecurity)</p>
<p><a href="https://www.scworld.com/brief/fema-cyber-breach-exposes-employee-data"><u>FEMA cyber breach exposes employee data </u></a>(SC Media)</p>
<p><a href="https://www.bleepingcomputer.com/news/google/gmail-business-users-can-now-send-encrypted-emails-to-anyone/"><u>Gmail business users can now send encrypted emails to anyone</u></a> (Bleeping Computer)<br><a href="https://www.theregister.com/2025/10/03/uk_digital_id_clarity/"><u>UK government says digital ID won't be compulsory – honest </u></a>(The Register)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1970</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d0dd203a-1c7a-11f0-85e0-ab391d73a7bf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3725589466.mp3?updated=1759517441" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA furlough sparks fears.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2405/notes</link>
      <description>CISA furloughs most of its workforce due to the government shutdown. The U.S. Air Force confirms it is investigating a SharePoint related breach. Google warns of a large-scale extortion campaign targeting executives. Researchers uncover Android spyware campaigns disguised as popular messaging apps. An extortion group claims to have breached Red Hat’s private GitHub repositories. A software provider for recreational vehicle and power sport dealers suffers a ransomware breach. Patchwork APT deploys a new Powershell loader using scheduled tasks for persistence. A Tennessee Senator urges aggressive U.S. action to prepare for a post-quantum future. Cynthia Kaiser,  SVP of Halcyon’s Ransomware Research Center and former Deputy Assistant Director at the FBI’s Cyber Division, joins us with insights on the government shutdown. A Malaysian man pleads guilty to supporting a massive crypto fraud. Protected health info is not a marketing tool. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Cynthia Kaiser,  SVP of Halcyon’s Ransomware Research Center and former Deputy Assistant Director at the FBI’s Cyber Division, joins us with insights on the government shutdown.

Selected Reading

Shutdown guts U.S. cybersecurity agency at perilous time (CISA)

Air Force admits SharePoint privacy issue; reports of breach (The Register)

Google warns executives are being targeted for extortion with leaked Oracle data (IT Pro)

Researchers uncover spyware targeting messaging app users in the UAE (The Record)

Red Hat confirms security incident after hackers claim GitHub breach (Bleeping Computer)

766,000 Impacted by Data Breach at Dealership Software Provider Motility (Security Week)

Patchwork APT: Leveraging PowerShell to Create Scheduled Tasks and Deploy Final Payload (GB Hackers)

GOP senator confirms pending White House quantum push, touts legislative alternatives (CyberScoop)

Bitcoin Fixer Convicted for Role in Money Laundering Scheme (Bank Infosecurity)Nursing Home Fined $182K for Posting Patient Photos Online  (Bank Infosecurity)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 02 Oct 2025 20:10:00 -0000</pubDate>
      <itunes:title>CISA furlough sparks fears.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2405</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA furloughs most of its workforce due to the government shutdown. The U.S. Air Force confirms it is investigating a SharePoint related breach. Google warns of a large-scale extortion campaign targeting executives. Researchers uncover Android spyware campaigns disguised as popular messaging apps. An extortion group claims to have breached Red Hat’s private GitHub repositories. A software provider for recreational vehicle and power sport dealers suffers a ransomware breach. Patchwork APT deploys a new Powershell loader using scheduled tasks for persistence. A Tennessee Senator urges aggressive U.S. action to prepare for a post-quantum future. Cynthia Kaiser,  SVP of Halcyon’s Ransomware Research Center and former Deputy Assistant Director at the FBI’s Cyber Division, joins us with insights on the government shutdown. A Malaysian man pleads guilty to supporting a massive crypto fraud. Protected health info is not a marketing tool. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Cynthia Kaiser,  SVP of Halcyon’s Ransomware Research Center and former Deputy Assistant Director at the FBI’s Cyber Division, joins us with insights on the government shutdown.

Selected Reading

Shutdown guts U.S. cybersecurity agency at perilous time (CISA)

Air Force admits SharePoint privacy issue; reports of breach (The Register)

Google warns executives are being targeted for extortion with leaked Oracle data (IT Pro)

Researchers uncover spyware targeting messaging app users in the UAE (The Record)

Red Hat confirms security incident after hackers claim GitHub breach (Bleeping Computer)

766,000 Impacted by Data Breach at Dealership Software Provider Motility (Security Week)

Patchwork APT: Leveraging PowerShell to Create Scheduled Tasks and Deploy Final Payload (GB Hackers)

GOP senator confirms pending White House quantum push, touts legislative alternatives (CyberScoop)

Bitcoin Fixer Convicted for Role in Money Laundering Scheme (Bank Infosecurity)Nursing Home Fined $182K for Posting Patient Photos Online  (Bank Infosecurity)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA furloughs most of its workforce due to the government shutdown. The U.S. Air Force confirms it is investigating a SharePoint related breach. Google warns of a large-scale extortion campaign targeting executives. Researchers uncover Android spyware campaigns disguised as popular messaging apps. An extortion group claims to have breached Red Hat’s private GitHub repositories. A software provider for recreational vehicle and power sport dealers suffers a ransomware breach. Patchwork APT deploys a new Powershell loader using scheduled tasks for persistence. A Tennessee Senator urges aggressive U.S. action to prepare for a post-quantum future. Cynthia Kaiser,  SVP of Halcyon’s Ransomware Research Center and former Deputy Assistant Director at the FBI’s Cyber Division, joins us with insights on the government shutdown. A Malaysian man pleads guilty to supporting a massive crypto fraud. Protected health info is not a marketing tool. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Cynthia Kaiser,  SVP of Halcyon’s Ransomware Research Center and former Deputy Assistant Director at the FBI’s Cyber Division, joins us with insights on the government shutdown.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.washingtonpost.com/technology/2025/10/02/cisa-shutdown-cybersecurity/"><u>Shutdown guts U.S. cybersecurity agency at perilous time</u></a> (CISA)</p>
<p><a href="https://www.theregister.com/2025/10/01/us_air_force_investigates_breach/"><u>Air Force admits SharePoint privacy issue; reports of breach </u></a>(The Register)</p>
<p><a href="https://www.itpro.com/security/google-warns-executives-are-being-targeted-for-extortion-with-leaked-oracle-data"><u>Google warns executives are being targeted for extortion with leaked Oracle data </u></a>(IT Pro)</p>
<p><a href="https://therecord.media/researchers-spyware-uae-infections"><u>Researchers uncover spyware targeting messaging app users in the UAE</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/red-hat-confirms-security-incident-after-hackers-claim-github-breach/"><u>Red Hat confirms security incident after hackers claim GitHub breach</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/766000-impacted-by-data-breach-at-dealership-software-provider-motility/"><u>766,000 Impacted by Data Breach at Dealership Software Provider Motility</u></a> (Security Week)</p>
<p><a href="https://gbhackers.com/patchwork-apt/"><u>Patchwork APT: Leveraging PowerShell to Create Scheduled Tasks and Deploy Final Payload</u></a> (GB Hackers)</p>
<p><a href="https://cyberscoop.com/blackburn-confirms-white-house-push-on-quantum-touts-own-legislation/"><u>GOP senator confirms pending White House quantum push, touts legislative alternatives </u></a>(CyberScoop)</p>
<p><a href="https://www.bankinfosecurity.com/bitcoin-fixer-convicted-for-role-in-money-laundering-scheme-a-29608"><u>Bitcoin Fixer Convicted for Role in Money Laundering Scheme</u></a> (Bank Infosecurity)<br><a href="https://www.bankinfosecurity.com/nursing-home-fined-182k-for-posting-patient-photos-online-a-29611"><u>Nursing Home Fined $182K for Posting Patient Photos Online</u></a>  (Bank Infosecurity)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1465</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d0af999e-1c7a-11f0-85e0-4b345a53ef01]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7025674727.mp3?updated=1759428880" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When politics break the firewall.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2404/notes</link>
      <description>Major federal cybersecurity programs expire amidst the government shutdown. Global leaders and experts convene in Riyadh for the Global Cybersecurity Forum. NIST tackles removable media. ICE buys vast troves of smartphone location data. Researchers claim a newly patched VMware vulnerability has been a zero-day for nearly a year. ClickFix-style attacks surge and spread across platforms. Battering RAM defeats memory encryption and boot-time defenses. A new phishing toolkit converts ordinary PDFs into interactive lures. A trio of breaches exposes data of 3.7 million across North America. Tim Starks from CyberScoop unpacks a report from Senate Democrats on DOGE. The Lone Star State proves even the internet isn’t bulletproof. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Tim Starks, Senior Reporter from CyberScoop, is back and joins Dave to discuss a report from Senate Democrats on the Department of Government Efficiency (DOGE). You can read Tim’s article on the subject here.

Selected Reading

Cyber information-sharing law and state grants set to go dark as Congress stalls over funding (The Record)

Live - Global Cybersecurity Forum in Riyadh tackles how technology can shape future of cyberspace (Euronews)

NIST Publishes Guide for Protecting ICS Against USB-Borne Threats (SecurityWeek)

ICE to Buy Tool that Tracks Locations of Hundreds of Millions of Phones Every Day (404 Media)

Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability (SecurityWeek)

Don’t Sweat the ClickFix Techniques: Variants &amp; Detection Evolution (Huntress)

Battering RAM Attack Breaks Intel and AMD Security Tech With $50 Device (SecurityWeek)

New MatrixPDF toolkit turns PDFs into phishing and malware lures (Bleeping Computer)

3.7M breach notification letters set to flood North America's mailboxes (The Register)

A Bullet Crashed the Internet in Texas (404 Media) 

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 01 Oct 2025 20:10:00 -0000</pubDate>
      <itunes:title>When politics break the firewall.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2404</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Major federal cybersecurity programs expire amidst the government shutdown. Global leaders and experts convene in Riyadh for the Global Cybersecurity Forum. NIST tackles removable media. ICE buys vast troves of smartphone location data. Researchers claim a newly patched VMware vulnerability has been a zero-day for nearly a year. ClickFix-style attacks surge and spread across platforms. Battering RAM defeats memory encryption and boot-time defenses. A new phishing toolkit converts ordinary PDFs into interactive lures. A trio of breaches exposes data of 3.7 million across North America. Tim Starks from CyberScoop unpacks a report from Senate Democrats on DOGE. The Lone Star State proves even the internet isn’t bulletproof. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Tim Starks, Senior Reporter from CyberScoop, is back and joins Dave to discuss a report from Senate Democrats on the Department of Government Efficiency (DOGE). You can read Tim’s article on the subject here.

Selected Reading

Cyber information-sharing law and state grants set to go dark as Congress stalls over funding (The Record)

Live - Global Cybersecurity Forum in Riyadh tackles how technology can shape future of cyberspace (Euronews)

NIST Publishes Guide for Protecting ICS Against USB-Borne Threats (SecurityWeek)

ICE to Buy Tool that Tracks Locations of Hundreds of Millions of Phones Every Day (404 Media)

Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability (SecurityWeek)

Don’t Sweat the ClickFix Techniques: Variants &amp; Detection Evolution (Huntress)

Battering RAM Attack Breaks Intel and AMD Security Tech With $50 Device (SecurityWeek)

New MatrixPDF toolkit turns PDFs into phishing and malware lures (Bleeping Computer)

3.7M breach notification letters set to flood North America's mailboxes (The Register)

A Bullet Crashed the Internet in Texas (404 Media) 

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Major federal cybersecurity programs expire amidst the government shutdown. Global leaders and experts convene in Riyadh for the Global Cybersecurity Forum. NIST tackles removable media. ICE buys vast troves of smartphone location data. Researchers claim a newly patched VMware vulnerability has been a zero-day for nearly a year. ClickFix-style attacks surge and spread across platforms. Battering RAM defeats memory encryption and boot-time defenses. A new phishing toolkit converts ordinary PDFs into interactive lures. A trio of breaches exposes data of 3.7 million across North America. Tim Starks from CyberScoop unpacks a report from Senate Democrats on DOGE. The Lone Star State proves even the internet isn’t bulletproof.<strong> </strong></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p><a href="https://www.linkedin.com/in/tstarks/"><u>Tim Starks</u></a>, Senior Reporter from <a href="https://cyberscoop.com/"><u>CyberScoop</u></a>, is back and joins Dave to discuss a report from Senate Democrats on the Department of Government Efficiency (DOGE). You can read Tim’s article on the subject <a href="https://cyberscoop.com/senate-democrats-report-doge-cybersecurity-privacy-violations/"><u>here</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/cisa-2015-state-cyber-grants-lapse-congress-government-shutdown"><u>Cyber information-sharing law and state grants set to go dark as Congress stalls over funding</u></a> (The Record)</p>
<p><a href="https://www.euronews.com/next/2025/10/01/euronews-at-the-global-cybersecurity-forum"><u>Live - Global Cybersecurity Forum in Riyadh tackles how technology can shape future of cyberspace</u></a> (Euronews)</p>
<p><a href="https://www.securityweek.com/nist-publishes-guide-for-protecting-ics-against-usb-borne-threats/"><u>NIST Publishes Guide for Protecting ICS Against USB-Borne Threats</u></a> (SecurityWeek)</p>
<p><a href="https://www.404media.co/ice-to-buy-tool-that-tracks-locations-of-hundreds-of-millions-of-phones-every-day/"><u>ICE to Buy Tool that Tracks Locations of Hundreds of Millions of Phones Every Day</u></a> (404 Media)</p>
<p><a href="https://www.securityweek.com/broadcom-fails-to-disclose-zero-day-exploitation-of-vmware-vulnerability/"><u>Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability</u></a> (SecurityWeek)</p>
<p><a href="https://www.huntress.com/blog/dont-sweat-clickfix-techniques"><u>Don’t Sweat the ClickFix Techniques: Variants &amp; Detection Evolution</u></a> (Huntress)</p>
<p><a href="https://www.securityweek.com/battering-ram-attack-breaks-intel-and-amd-security-tech-with-50-device/"><u>Battering RAM Attack Breaks Intel and AMD Security Tech With $50 Device</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/new-matrixpdf-toolkit-turns-pdfs-into-phishing-and-malware-lures/"><u>New MatrixPDF toolkit turns PDFs into phishing and malware lures</u></a> (Bleeping Computer)</p>
<p><a href="https://www.theregister.com/2025/10/01/north_american_data_breaches/"><u>3.7M breach notification letters set to flood North America's mailboxes</u></a> (The Register)</p>
<p><a href="https://www.404media.co/a-bullet-crashed-the-internet-in-texas/"><u>A Bullet Crashed the Internet in Texas</u></a> (404 Media) </p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>N2K CyberWire helps you reach the industry’s most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at <a href="http://sponsor.thecyberwire.com/"><u>sponsor.thecyberwire.com</u></a>.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1588</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d083e6aa-1c7a-11f0-85e0-2bb81df95ab3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1969590617.mp3?updated=1759348112" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>One flaw to rule the root.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2403/notes</link>
      <description>CISA issues an urgent warning about active exploitation of a critical vulnerability in the sudo utility. Broadcom patches two high-severity vulnerabilities in VMware NSX. South Korea raises its national cyber threat level after a datacenter fire. Formbricks patches a critical token validation flaw. Microsoft blocks a credential phishing campaign that made use of malicious SVG files. Landlords are accused of scraping sensitive payroll data. Cybercriminals lay the groundwork for large-scale FIFA fraud. Burnout takes a heavy toll on cybersecurity professionals. On our Threat Vector segment, host David Moulton⁠ is joined by⁠ Kyle Wilhoit⁠ talking about the evolution of hacker culture and cybersecurity. London police bag the biggest bitcoin bust.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On this Threat Vector segment, host David Moulton⁠ is joined by⁠ Kyle Wilhoit⁠ of Unit 42 talking about the evolution of hacker culture and cybersecurity. You can listen to the full conversation⁠ here⁠, and catch new episodes of Threat Vector each Thursday in your podcast app of choice.

Selected Reading

CISA Issues Alert on Active Exploitation of Linux and Unix Sudo Flaw (GB Hackers)

Broadcom fixes high-severity VMware NSX bugs reported by NSA (Bleeping Computer)

South Korea raises cyber threat level after huge data centre fire sparks hacking fears (The Guardian)

JWT signature verification bypass enables account takeover in Formbricks (Beyond Machines)

Microsoft Flags AI Phishing Attack Hiding in SVG Files (Hackread)

Landlords Demand Tenants’ Workplace Logins to Scrape Their Paystubs (404 Media)

Playing Offside: How Threat Actors Are Warming Up for FIFA 2026 (Check Point Blog)

Why burnout is a growing problem in cybersecurity (BBC)

Chinese woman convicted after 'world's biggest' bitcoin seizure (BBC)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Sep 2025 20:10:00 -0000</pubDate>
      <itunes:title>One flaw to rule the root.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2403</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA issues an urgent warning about active exploitation of a critical vulnerability in the sudo utility. Broadcom patches two high-severity vulnerabilities in VMware NSX. South Korea raises its national cyber threat level after a datacenter fire. Formbricks patches a critical token validation flaw. Microsoft blocks a credential phishing campaign that made use of malicious SVG files. Landlords are accused of scraping sensitive payroll data. Cybercriminals lay the groundwork for large-scale FIFA fraud. Burnout takes a heavy toll on cybersecurity professionals. On our Threat Vector segment, host David Moulton⁠ is joined by⁠ Kyle Wilhoit⁠ talking about the evolution of hacker culture and cybersecurity. London police bag the biggest bitcoin bust.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On this Threat Vector segment, host David Moulton⁠ is joined by⁠ Kyle Wilhoit⁠ of Unit 42 talking about the evolution of hacker culture and cybersecurity. You can listen to the full conversation⁠ here⁠, and catch new episodes of Threat Vector each Thursday in your podcast app of choice.

Selected Reading

CISA Issues Alert on Active Exploitation of Linux and Unix Sudo Flaw (GB Hackers)

Broadcom fixes high-severity VMware NSX bugs reported by NSA (Bleeping Computer)

South Korea raises cyber threat level after huge data centre fire sparks hacking fears (The Guardian)

JWT signature verification bypass enables account takeover in Formbricks (Beyond Machines)

Microsoft Flags AI Phishing Attack Hiding in SVG Files (Hackread)

Landlords Demand Tenants’ Workplace Logins to Scrape Their Paystubs (404 Media)

Playing Offside: How Threat Actors Are Warming Up for FIFA 2026 (Check Point Blog)

Why burnout is a growing problem in cybersecurity (BBC)

Chinese woman convicted after 'world's biggest' bitcoin seizure (BBC)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA issues an urgent warning about active exploitation of a critical vulnerability in the sudo utility. Broadcom patches two high-severity vulnerabilities in VMware NSX. South Korea raises its national cyber threat level after a datacenter fire. Formbricks patches a critical token validation flaw. Microsoft blocks a credential phishing campaign that made use of malicious SVG files. Landlords are accused of scraping sensitive payroll data. Cybercriminals lay the groundwork for large-scale FIFA fraud. Burnout takes a heavy toll on cybersecurity professionals. On our Threat Vector segment, host David Moulton⁠ is joined by⁠ Kyle Wilhoit⁠ talking about the evolution of hacker culture and cybersecurity. London police bag the biggest bitcoin bust.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On this Threat Vector segment, host <a href="https://www.linkedin.com/in/davidrmoulton/"><u>David Moulton</u></a>⁠ is joined by⁠ <a href="https://www.linkedin.com/in/kylewilhoit/"><u>Kyle Wilhoit⁠</u></a> of Unit 42 talking about the evolution of hacker culture and cybersecurity. You can listen to the full conversation<a href="https://thecyberwire.com/podcasts/threat-vector/84/noteshttps://thecyberwire.com/podcasts/threat-vector/86/notes"><u>⁠ here⁠</u></a>, and catch new episodes of Threat Vector each Thursday in your podcast app of choice.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://gbhackers.com/cisa-issues-alert-on-linux-and-unix-sudo-flaw/"><u>CISA Issues Alert on Active Exploitation of Linux and Unix Sudo Flaw</u></a> (GB Hackers)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/broadcom-fixes-high-severity-vmware-nsx-bugs-reported-by-nsa/"><u>Broadcom fixes high-severity VMware NSX bugs reported by NSA</u></a> (Bleeping Computer)</p>
<p><a href="https://www.theguardian.com/world/2025/sep/30/south-korea-raises-cyber-threat-level-after-huge-data-centre-fire-sparks-hacking-fears"><u>South Korea raises cyber threat level after huge data centre fire sparks hacking fears</u></a> (The Guardian)</p>
<p><a href="https://beyondmachines.net/event_details/jwt-signature-verification-bypass-enables-account-takeover-in-formbricks-1-1-5-3-f/gD2P6Ple2L"><u>JWT signature verification bypass enables account takeover in Formbricks</u></a> (Beyond Machines)</p>
<p><a href="https://hackread.com/microsoft-ai-phishing-attack-hiding-svg-files/"><u>Microsoft Flags AI Phishing Attack Hiding in SVG Files</u></a> (Hackread)</p>
<p><a href="https://www.404media.co/landlords-demand-tenants-workplace-logins-to-scrape-their-paystubs/"><u>Landlords Demand Tenants’ Workplace Logins to Scrape Their Paystubs</u></a> (404 Media)</p>
<p><a href="https://blog.checkpoint.com/executive-insights/playing-offside-how-threat-actors-are-warming-up-for-fifa-2026/"><u>Playing Offside: How Threat Actors Are Warming Up for FIFA 2026 </u></a>(Check Point Blog)</p>
<p><a href="https://www.bbc.com/news/articles/cgqn8e4e700o"><u>Why burnout is a growing problem in cybersecurity</u></a> (BBC)</p>
<p><a href="https://www.bbc.com/news/articles/cy0415kk3rzo"><u>Chinese woman convicted after 'world's biggest' bitcoin seizure</u></a> (BBC)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1429</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d0555e98-1c7a-11f0-85e0-47d8e1870659]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5713203838.mp3?updated=1759259365" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The November that never ended.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2402/notes</link>
      <description>A Chinese state-sponsored group exploited enterprise devices in a global espionage effort. The UK Government guarantees £1.5 billion financing to help Jaguar Land Rover’s recovery efforts. A maximum-severity flaw in Fortra’s GoAnywhere Managed File Transfer product is under active exploitation. The AI boom faces sustainability questions. Akira ransomware bypasses MFA on SonicWall devices. Dutch teens are arrested for allegedly spying for Russia. Luxury retailer Harrods confirms a data breach. An Interpol crackdown targets African cybercrime rings. We’ve got our Monday business briefing. Brandon Karpf joins us to discuss the cybersecurity ecosystem in Japan. Cyber crooks offer a BBC journalist an early retirement package.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today our guest is Brandon Karpf, friend of the show, and he joins to discuss the Cybersecurity ecosystem in Japan.

Selected Reading

Chinese hackers breached critical infrastructure globally using enterprise network gear (CSO Online)

UK government bails out Jaguar Land Rover with $2 billion loan (Metacurity)

Maximum severity GoAnywhere MFT flaw exploited as zero day (Bleeping Computer)

The AI boom is unsustainable unless tech spending goes ‘parabolic,’ Deutsche Bank warns: ‘This is highly unlikely’ (Fortune)

Akira ransomware breaching MFA-protected SonicWall VPN accounts (Bleeping Computer)

Dutch teens arrested for trying to spy on Europol for Russia (Bleeping Computer)

Harrods: Hackers contact firm after 430,000 customer records stolen (BBC)

Africa cybercrime crackdown includes hundreds of arrests, Interpol says (The Record)

Cyberbit acquires RangeForce. Terra Security raises $30 million. (N2K Pro) 

'You'll never need to work again': Criminals offer reporter money to hack BBC (BBC)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 29 Sep 2025 20:10:00 -0000</pubDate>
      <itunes:title>The November that never ended.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2402</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A Chinese state-sponsored group exploited enterprise devices in a global espionage effort. The UK Government guarantees £1.5 billion financing to help Jaguar Land Rover’s recovery efforts. A maximum-severity flaw in Fortra’s GoAnywhere Managed File Transfer product is under active exploitation. The AI boom faces sustainability questions. Akira ransomware bypasses MFA on SonicWall devices. Dutch teens are arrested for allegedly spying for Russia. Luxury retailer Harrods confirms a data breach. An Interpol crackdown targets African cybercrime rings. We’ve got our Monday business briefing. Brandon Karpf joins us to discuss the cybersecurity ecosystem in Japan. Cyber crooks offer a BBC journalist an early retirement package.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today our guest is Brandon Karpf, friend of the show, and he joins to discuss the Cybersecurity ecosystem in Japan.

Selected Reading

Chinese hackers breached critical infrastructure globally using enterprise network gear (CSO Online)

UK government bails out Jaguar Land Rover with $2 billion loan (Metacurity)

Maximum severity GoAnywhere MFT flaw exploited as zero day (Bleeping Computer)

The AI boom is unsustainable unless tech spending goes ‘parabolic,’ Deutsche Bank warns: ‘This is highly unlikely’ (Fortune)

Akira ransomware breaching MFA-protected SonicWall VPN accounts (Bleeping Computer)

Dutch teens arrested for trying to spy on Europol for Russia (Bleeping Computer)

Harrods: Hackers contact firm after 430,000 customer records stolen (BBC)

Africa cybercrime crackdown includes hundreds of arrests, Interpol says (The Record)

Cyberbit acquires RangeForce. Terra Security raises $30 million. (N2K Pro) 

'You'll never need to work again': Criminals offer reporter money to hack BBC (BBC)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Chinese state-sponsored group exploited enterprise devices in a global espionage effort. The UK Government guarantees £1.5 billion financing to help Jaguar Land Rover’s recovery efforts. A maximum-severity flaw in Fortra’s GoAnywhere Managed File Transfer product is under active exploitation. The AI boom faces sustainability questions. Akira ransomware bypasses MFA on SonicWall devices. Dutch teens are arrested for allegedly spying for Russia. Luxury retailer Harrods confirms a data breach. An Interpol crackdown targets African cybercrime rings. We’ve got our Monday business briefing. Brandon Karpf joins us to discuss the cybersecurity ecosystem in Japan. Cyber crooks offer a BBC journalist an early retirement package.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today our guest is <a href="https://www.linkedin.com/in/brandon-karpf/"><u>Brandon Karpf</u></a>, friend of the show, and he joins to discuss the Cybersecurity ecosystem in Japan.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.csoonline.com/article/4064737/chinese-hackers-breached-critical-infrastructure-globally-using-enterprise-network-gear.html"><u>Chinese hackers breached critical infrastructure globally using enterprise network gear </u></a>(CSO Online)</p>
<p><a href="https://www.metacurity.com/uk-government-bails-out-jaguar-land-rover-with-2-billion-loan/"><u>UK government bails out Jaguar Land Rover with $2 billion loan</u></a> (Metacurity)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/maximum-severity-goanywhere-mft-flaw-exploited-as-zero-day/"><u>Maximum severity GoAnywhere MFT flaw exploited as zero day</u></a> (Bleeping Computer)</p>
<p><a href="https://fortune.com/2025/09/23/ai-boom-unsustainable-tech-spending-parabolic-deutsche-bank/"><u>The AI boom is unsustainable unless tech spending goes ‘parabolic,’ Deutsche Bank warns: ‘This is highly unlikely’ </u></a>(Fortune)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/akira-ransomware-breaching-mfa-protected-sonicwall-vpn-accounts/"><u>Akira ransomware breaching MFA-protected SonicWall VPN accounts</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/dutch-teens-arrested-for-trying-to-spy-on-europol-for-russia/"><u>Dutch teens arrested for trying to spy on Europol for Russia</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bbc.com/news/articles/cpq5w324pd3o"><u>Harrods: Hackers contact firm after 430,000 customer records stolen</u></a> (BBC)</p>
<p><a href="https://therecord.media/africa-cyber-fraud-crackdown-ghana-senegal-cote-divoire-angola-interpol"><u>Africa cybercrime crackdown includes hundreds of arrests, Interpol says</u></a> (The Record)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/7/38"><u>Cyberbit acquires RangeForce. Terra Security raises $30 million.</u></a> (N2K Pro) </p>
<p><a href="https://www.bbc.co.uk/news/articles/c3w5n903447o"><u>'You'll never need to work again': Criminals offer reporter money to hack BBC </u></a>(BBC)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1781</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d028615e-1c7a-11f0-85e0-8bbee097e10c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6619756758.mp3?updated=1759346104" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Joe Carrigan: Build your network. [Security engineer] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/88/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Senior security engineer with the Johns Hopkins University Information Security Institute and the Institute for Assured Autonomy, Joe Carrigan, shares what he calls his life mistake and what spurred him to finally choose a career in technology. Throughout his life, Joe had interest in technology, he even worked at the computer lab in college, but never set his sights on that for a career. A conversation with a stranger guided him in that direction and he's been there ever since. As co-host of the CyberWire's Hacking Humans, Joe sees some heartbreaking results of scams and feels education of the public will help to prevent these. Joe reminds us to build our networks as they include people we can always go back to either when searching for a position or looking to fill one on our teams. We thank Joe for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 28 Sep 2025 07:00:00 -0000</pubDate>
      <itunes:title>Joe Carrigan: Build your network. [Security engineer] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>88</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/af311c04-9af4-11f0-93f6-fb9e440107e4/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Senior security engineer with the Johns Hopkins University Information Security Institute and the Institute for Assured Autonomy, Joe Carrigan, shares what he calls his life mistake and what spurred him to finally choose a career in technology. Throughout his life, Joe had interest in technology, he even worked at the computer lab in college, but never set his sights on that for a career. A conversation with a stranger guided him in that direction and he's been there ever since. As co-host of the CyberWire's Hacking Humans, Joe sees some heartbreaking results of scams and feels education of the public will help to prevent these. Joe reminds us to build our networks as they include people we can always go back to either when searching for a position or looking to fill one on our teams. We thank Joe for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Senior security engineer with the Johns Hopkins University Information Security Institute and the Institute for Assured Autonomy, Joe Carrigan, shares what he calls his life mistake and what spurred him to finally choose a career in technology. Throughout his life, Joe had interest in technology, he even worked at the computer lab in college, but never set his sights on that for a career. A conversation with a stranger guided him in that direction and he's been there ever since. As co-host of the CyberWire's Hacking Humans, Joe sees some heartbreaking results of scams and feels education of the public will help to prevent these. Joe reminds us to build our networks as they include people we can always go back to either when searching for a position or looking to fill one on our teams. We thank Joe for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>639</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[af311c04-9af4-11f0-93f6-fb9e440107e4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5460931099.mp3?updated=1735936617" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sunny-side spyware. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/395/notes</link>
      <description>This week, we are joined by Martin Zugec, Technical Solutions Director from Bitdefender, sharing their work and findings on "EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company. A newly identified Chinese APT group has been observed deploying a sophisticated, fileless malware framework called EggStreme against a Philippine military company. 

The multi-stage toolkit uses DLL sideloading and in-memory execution to evade detection, with its core backdoor, EggStremeAgent, enabling reconnaissance, lateral movement, keylogging, and data theft. Researchers note the campaign’s persistence and stealth highlight professional, geopolitically motivated espionage activity linked to Chinese national interests.

The research can be found here:


  EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Sep 2025 07:00:00 -0000</pubDate>
      <itunes:title>Sunny-side spyware. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>395</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8e4cee6a-9aee-11f0-8efb-7b0540705d00/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Martin Zugec, Technical Solutions Director from Bitdefender, sharing their work and findings on "EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company. A newly identified Chinese APT group has been observed deploying a sophisticated, fileless malware framework called EggStreme against a Philippine military company. 

The multi-stage toolkit uses DLL sideloading and in-memory execution to evade detection, with its core backdoor, EggStremeAgent, enabling reconnaissance, lateral movement, keylogging, and data theft. Researchers note the campaign’s persistence and stealth highlight professional, geopolitically motivated espionage activity linked to Chinese national interests.

The research can be found here:


  EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/martinzugec/">Martin Zugec</a>, Technical Solutions Director from <a href="https://www.linkedin.com/company/bitdefender/">Bitdefender</a>, sharing their work and findings on "EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company. A newly identified Chinese APT group has been observed deploying a sophisticated, fileless malware framework called EggStreme against a Philippine military company. </p>
<p>The multi-stage toolkit uses DLL sideloading and in-memory execution to evade detection, with its core backdoor, EggStremeAgent, enabling reconnaissance, lateral movement, keylogging, and data theft. Researchers note the campaign’s persistence and stealth highlight professional, geopolitically motivated espionage activity linked to Chinese national interests.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://businessinsights.bitdefender.com/eggstreme-fileless-malware-cyberattack-apac">EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1440</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8e4cee6a-9aee-11f0-8efb-7b0540705d00]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4092286885.mp3?updated=1758825544" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA sounds the alarm on Cisco flaws.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2401/notes</link>
      <description>CISA gives federal agencies 24 hours to patch a critical Cisco firewall bug. Researchers uncover the first known malicious MCP server used in a supply chain attack. The New York SIM card threat may have been overblown. Microsoft tags a new variant of the XCSSET macOS malware. An exposed auto insurance claims database puts PII at risk. Amazon will pay $2.5 billion to settle dark pattern allegations. Researchers uncover North Korea’s hybrid playbook of cybercrime and insider threats. An old Hikvision security camera vulnerability rears its ugly head. Dan Trujillo from the Air Force Research Laboratory’s Space Vehicles Directorate joins Maria Varmazis, host of T-Minus Space Daily to discuss how his team is securing satellites and space systems from cyber threats. DOGE delivers dysfunction, disarray, and disappointment.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.CyberWire Guest

Dan Trujillo from the Air Force Research Laboratory’s Space Vehicles Directorate joins Maria Varmazis, host of T-Minus Space Daily to discuss how his team is securing satellites and space systems from cyber threats and also shares advice for breaking into the fast-growing field of space cybersecurity

Selected Reading

Federal agencies given one day to patch exploited Cisco firewall bugs (The Record)

First malicious MCP Server discovered, stealing data from AI-Powered email systems (Beyond Machines)

Secret Service faces backlash over SIM farm bust as experts challenge threat claims (Metacurity)

Microsoft warns of new XCSSET macOS malware variant targeting Xcode devs (Bleeping Computer)

Microsoft cuts off cloud services to Israeli military unit after report of storing Palestinians' phone calls (CNBC)

Auto Insurance Platform Exposed Over 5 Million Records Including Documents Containing PII (Website Planet)

Amazon pays $2.5 billion to settle Prime memberships lawsuit (Bleeping Computer)

DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception (We Live Security)

Critical 8 years old Hikvision Camera flaw actively exploited again (Beyond Machines)

The Story of DOGE, as Told by Federal Workers (WIRED)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 26 Sep 2025 20:10:00 -0000</pubDate>
      <itunes:title>CISA sounds the alarm on Cisco flaws.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2401</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA gives federal agencies 24 hours to patch a critical Cisco firewall bug. Researchers uncover the first known malicious MCP server used in a supply chain attack. The New York SIM card threat may have been overblown. Microsoft tags a new variant of the XCSSET macOS malware. An exposed auto insurance claims database puts PII at risk. Amazon will pay $2.5 billion to settle dark pattern allegations. Researchers uncover North Korea’s hybrid playbook of cybercrime and insider threats. An old Hikvision security camera vulnerability rears its ugly head. Dan Trujillo from the Air Force Research Laboratory’s Space Vehicles Directorate joins Maria Varmazis, host of T-Minus Space Daily to discuss how his team is securing satellites and space systems from cyber threats. DOGE delivers dysfunction, disarray, and disappointment.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.CyberWire Guest

Dan Trujillo from the Air Force Research Laboratory’s Space Vehicles Directorate joins Maria Varmazis, host of T-Minus Space Daily to discuss how his team is securing satellites and space systems from cyber threats and also shares advice for breaking into the fast-growing field of space cybersecurity

Selected Reading

Federal agencies given one day to patch exploited Cisco firewall bugs (The Record)

First malicious MCP Server discovered, stealing data from AI-Powered email systems (Beyond Machines)

Secret Service faces backlash over SIM farm bust as experts challenge threat claims (Metacurity)

Microsoft warns of new XCSSET macOS malware variant targeting Xcode devs (Bleeping Computer)

Microsoft cuts off cloud services to Israeli military unit after report of storing Palestinians' phone calls (CNBC)

Auto Insurance Platform Exposed Over 5 Million Records Including Documents Containing PII (Website Planet)

Amazon pays $2.5 billion to settle Prime memberships lawsuit (Bleeping Computer)

DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception (We Live Security)

Critical 8 years old Hikvision Camera flaw actively exploited again (Beyond Machines)

The Story of DOGE, as Told by Federal Workers (WIRED)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA gives federal agencies 24 hours to patch a critical Cisco firewall bug. Researchers uncover the first known malicious MCP server used in a supply chain attack. The New York SIM card threat may have been overblown. Microsoft tags a new variant of the XCSSET macOS malware. An exposed auto insurance claims database puts PII at risk. Amazon will pay $2.5 billion to settle dark pattern allegations. Researchers uncover North Korea’s hybrid playbook of cybercrime and insider threats. An old Hikvision security camera vulnerability rears its ugly head. Dan Trujillo from the Air Force Research Laboratory’s Space Vehicles Directorate joins Maria Varmazis, host of T-Minus Space Daily to discuss how his team is securing satellites and space systems from cyber threats. DOGE delivers dysfunction, disarray, and disappointment.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.<br><strong>CyberWire Guest</strong></p>
<p><a href="https://www.linkedin.com/in/joseph-trujillo-8a50651/"><u>Dan Trujillo</u></a> from the <a href="https://www.linkedin.com/company/air-force-research-laboratory/"><u>Air Force Research Laboratory’s Space Vehicles Directorate</u></a> joins <a href="https://www.linkedin.com/in/varmazis/"><u>Maria Varmazis</u></a>, host of <a href="https://www.linkedin.com/company/n2k-space/"><u>T-Minus Space Daily</u></a> to discuss how his team is securing satellites and space systems from cyber threats and also shares advice for breaking into the fast-growing field of space cybersecurity</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/cisco-asa-firewall-bugs-cisa-federal-agencies-warning"><u>Federal agencies given one day to patch exploited Cisco firewall bugs</u></a> (The Record)</p>
<p><a href="https://beyondmachines.net/event_details/first-malicious-mcp-server-discovered-stealing-data-from-ai-powered-email-systems-a-5-t-c-n/gD2P6Ple2L"><u>First malicious MCP Server discovered, stealing data from AI-Powered email systems</u></a> (Beyond Machines)</p>
<p><a href="https://www.metacurity.com/secret-service-faces-backlash-over-sim-farm-bust-as-experts-challenge-threat-claims/"><u>Secret Service faces backlash over SIM farm bust as experts challenge threat claims</u></a> (Metacurity)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/microsoft-warns-of-new-xcsset-macos-malware-variant-targeting-xcode-devs/"><u>Microsoft warns of new XCSSET macOS malware variant targeting Xcode devs</u></a> (Bleeping Computer)</p>
<p><a href="https://www.cnbc.com/2025/09/25/microsoft-cuts-cloud-services-to-israeli-military-after-investigation.html"><u>Microsoft cuts off cloud services to Israeli military unit after report of storing Palestinians' phone calls</u></a> (CNBC)</p>
<p><a href="https://www.websiteplanet.com/news/claimpix-breach-report/"><u>Auto Insurance Platform Exposed Over 5 Million Records Including Documents Containing PII</u></a> (Website Planet)</p>
<p><a href="https://www.bleepingcomputer.com/news/technology/amazon-pays-25-billion-to-settle-prime-memberships-lawsuit/"><u>Amazon pays $2.5 billion to settle Prime memberships lawsuit</u></a> (Bleeping Computer)</p>
<p><a href="https://www.welivesecurity.com/en/eset-research/deceptivedevelopment-from-primitive-crypto-theft-to-sophisticated-ai-based-deception/"><u>DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception</u></a> (We Live Security)</p>
<p><a href="https://beyondmachines.net/event_details/critical-8-years-old-hikvision-camera-flaw-actively-exploited-again-c-1-4-o-2/gD2P6Ple2L"><u>Critical 8 years old Hikvision Camera flaw actively exploited again</u></a> (Beyond Machines)</p>
<p><a href="https://www.wired.com/story/oral-history-doge-federal-workers/"><u>The Story of DOGE, as Told by Federal Workers </u></a>(WIRED)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1454</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cffbdf8a-1c7a-11f0-85e0-6fef9118fccf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5128487385.mp3?updated=1758907033" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Critical GoAnywhere bug exposed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2400/notes</link>
      <description>Fortra flags a critical flaw in its GoAnywhere Managed File Transfer (MFT) solution. Cisco patches a critical vulnerability in its IOS and IOS XE software. Cloudflare thwarts yet another record DDoS attack. Rhysida ransomware gang claims the Maryland Transit cyberattack. The new “Obscura” ransomware strain spreads via domain controllers. Retailers’ use of generative AI expands attack surfaces. Researchers expose GitHub Actions misconfigurations with supply chain risk. Mandiant links the new BRICKSTORM backdoor to a China-based espionage campaign. Kansas students push back against an AI monitoring tool. Ben Yelin speaks with Michele Kellerman, Cybersecurity Engineer for Air and Missile Defense at Johns Hopkins University Applied Physics Lab, discussing Women's health apps and the legal grey zone that they create with HIPAA. Senators push the FTC to regulate your brainwaves.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Ben Yelin, co-host of Caveat, is speaking with Michele Kellerman, Cybersecurity Engineer for Air and Missile Defense at Johns Hopkins University Applied Physics Lab, about Women's health apps and the legal grey zone that they create with HIPAA. If you want to hear the full conversation, check it out on Caveat, here.

Selected Reading

Critical CVSS 10 Flaw in GoAnywhere File Transfer Threatens 20,000 Systems (HackRead)

Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability (Cisco)

Cloudflare mitigates new record-breaking 22.2 Tbps DDoS attack (Bleeping Computer)

Ransomware gang known for government attacks claims Maryland transit incident (The Record)

Obscura, an obscure new ransomware variant (Bleeping Computer)

Threat Labs Report: Retail 2025 (Netskope)

pull_request_nightmare Part 1: Exploiting GitHub Actions for RCE and Supply Chain Attacks (Orca)

China-linked hackers use ‘BRICKSTORM’ backdoor to steal IP (The Record)

AI safety tool sparks student backlash after flagging art as porn, deleting emails (The Washington Post)

Senators introduce bill directing FTC to establish standards for protecting consumers’ neural data (The Record)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 25 Sep 2025 20:10:00 -0000</pubDate>
      <itunes:title>Critical GoAnywhere bug exposed.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2400</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Fortra flags a critical flaw in its GoAnywhere Managed File Transfer (MFT) solution. Cisco patches a critical vulnerability in its IOS and IOS XE software. Cloudflare thwarts yet another record DDoS attack. Rhysida ransomware gang claims the Maryland Transit cyberattack. The new “Obscura” ransomware strain spreads via domain controllers. Retailers’ use of generative AI expands attack surfaces. Researchers expose GitHub Actions misconfigurations with supply chain risk. Mandiant links the new BRICKSTORM backdoor to a China-based espionage campaign. Kansas students push back against an AI monitoring tool. Ben Yelin speaks with Michele Kellerman, Cybersecurity Engineer for Air and Missile Defense at Johns Hopkins University Applied Physics Lab, discussing Women's health apps and the legal grey zone that they create with HIPAA. Senators push the FTC to regulate your brainwaves.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Ben Yelin, co-host of Caveat, is speaking with Michele Kellerman, Cybersecurity Engineer for Air and Missile Defense at Johns Hopkins University Applied Physics Lab, about Women's health apps and the legal grey zone that they create with HIPAA. If you want to hear the full conversation, check it out on Caveat, here.

Selected Reading

Critical CVSS 10 Flaw in GoAnywhere File Transfer Threatens 20,000 Systems (HackRead)

Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability (Cisco)

Cloudflare mitigates new record-breaking 22.2 Tbps DDoS attack (Bleeping Computer)

Ransomware gang known for government attacks claims Maryland transit incident (The Record)

Obscura, an obscure new ransomware variant (Bleeping Computer)

Threat Labs Report: Retail 2025 (Netskope)

pull_request_nightmare Part 1: Exploiting GitHub Actions for RCE and Supply Chain Attacks (Orca)

China-linked hackers use ‘BRICKSTORM’ backdoor to steal IP (The Record)

AI safety tool sparks student backlash after flagging art as porn, deleting emails (The Washington Post)

Senators introduce bill directing FTC to establish standards for protecting consumers’ neural data (The Record)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Fortra flags a critical flaw in its GoAnywhere Managed File Transfer (MFT) solution. Cisco patches a critical vulnerability in its IOS and IOS XE software. Cloudflare thwarts yet another record DDoS attack. Rhysida ransomware gang claims the Maryland Transit cyberattack. The new “Obscura” ransomware strain spreads via domain controllers. Retailers’ use of generative AI expands attack surfaces. Researchers expose GitHub Actions misconfigurations with supply chain risk. Mandiant links the new BRICKSTORM backdoor to a China-based espionage campaign. Kansas students push back against an AI monitoring tool. Ben Yelin speaks with Michele Kellerman, Cybersecurity Engineer for Air and Missile Defense at Johns Hopkins University Applied Physics Lab, discussing Women's health apps and the legal grey zone that they create with HIPAA. Senators push the FTC to regulate your brainwaves.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p><a href="https://www.linkedin.com/in/benjamin-yelin-5b14114b/"><u>Ben Yelin</u></a>, co-host of <a href="https://thecyberwire.com/podcasts/caveat"><u>Caveat</u></a>, is speaking with <a href="https://www.linkedin.com/in/michele-kellerman-cissp-b2933378/"><u>Michele Kellerman</u></a>, Cybersecurity Engineer for Air and Missile Defense at Johns Hopkins University Applied Physics Lab, about Women's health apps and the legal grey zone that they create with HIPAA. If you want to hear the full conversation, check it out on Caveat, <a href="https://thecyberwire.com/podcasts/caveat/279/notes"><u>here</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://hackread.com/critical-cvss-10-flaw-goanywhere-file-transfer/"><u>Critical CVSS 10 Flaw in GoAnywhere File Transfer Threatens 20,000 Systems</u></a> (HackRead)</p>
<p><a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte"><u>Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability</u></a> (Cisco)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cloudflare-mitigates-new-record-breaking-222-tbps-ddos-attack/"><u>Cloudflare mitigates new record-breaking 22.2 Tbps DDoS attack</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/maryland-transit-administration-data-breach-claimed-ransomware-gang"><u>Ransomware gang known for government attacks claims Maryland transit incident</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/obscura-an-obscure-new-ransomware-variant/"><u>Obscura, an obscure new ransomware variant</u></a> (Bleeping Computer)</p>
<p><a href="https://www.netskope.com/resources/threat-labs-reports/threat-labs-report-retail-2025"><u>Threat Labs Report: Retail 2025</u></a> (Netskope)</p>
<p><a href="https://orca.security/resources/blog/pull-request-nightmare-github-actions-rce/?_gl=1*dq0kw5*_gcl_au*NzY3NTkwMTA2LjE3NTYzMjM5Mjg"><u>pull_request_nightmare Part 1: Exploiting GitHub Actions for RCE and Supply Chain Attacks</u></a> (Orca)</p>
<p><a href="https://therecord.media/china-linked-hackers-brickstorm-backdoor-ip"><u>China-linked hackers use ‘BRICKSTORM’ backdoor to steal IP</u></a> (The Record)</p>
<p><a href="https://wapo.st/4gEIfSF"><u>AI safety tool sparks student backlash after flagging art as porn, deleting emails</u></a> (The Washington Post)</p>
<p><a href="https://therecord.media/senators-introduce-bill-ftc-brain-data-privacy"><u>Senators introduce bill directing FTC to establish standards for protecting consumers’ neural data</u></a> (The Record)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1753</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cfc8d202-1c7a-11f0-85e0-2f7dbe07a8f3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6714406209.mp3?updated=1758824746" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI to the rescue.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2399/notes</link>
      <description>British authorities arrest a man in connection with the Collins Aerospace ransomware attack. CISA says attackers breached a U.S. federal civilian executive branch agency last year. Researchers uncover two high-severity vulnerabilities in Supermicro server motherboards. A Las Vegas casino operator confirms a cyber attack. Analysts track multiple large-scale, automated email phishing campaigns. Libraesva issues an emergency patch for its Email Security Gateway. Our guest is Jason Clark, Chief Strategy Officer (CSO) at Cyera, tackling the security threat of Agentic AI. Robocars get misdirected by mirrors. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Jason Clark, Chief Strategy Officer (CSO) at Cyera, discussing tackling the security industry's biggest threat: Agent AI. If you want to hear the full conversation from Jason, you can check it out here. 

Selected Reading

UK police arrest man over hack that affected European airports (Reuters)

AI tool helped recover £500m lost to fraud, government says (BBC)

CISA says hackers breached federal agency using GeoServer exploit (Bleeping Computer)

Supermicro server motherboards can be infected with unremovable malware (Ars Technica)

Boyd Gaming Suffers Cyberattack, Data Breach (Casino.org)

Email Threat Radar – September 2025 (Barracuda)

Revamped Phishing Techniques: How Telegram and Front-End Hosting Platforms Scale Campaigns (Forescout)

GitHub notifications abused to impersonate Y Combinator for crypto theft (Bleeping Computer)

Libraesva ESG issues emergency fix for bug exploited by state hackers (Bleeping Computer)

Fooling a self-driving car with mirrors on traffic cones (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 24 Sep 2025 20:10:00 -0000</pubDate>
      <itunes:title>AI to the rescue.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2399</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>British authorities arrest a man in connection with the Collins Aerospace ransomware attack. CISA says attackers breached a U.S. federal civilian executive branch agency last year. Researchers uncover two high-severity vulnerabilities in Supermicro server motherboards. A Las Vegas casino operator confirms a cyber attack. Analysts track multiple large-scale, automated email phishing campaigns. Libraesva issues an emergency patch for its Email Security Gateway. Our guest is Jason Clark, Chief Strategy Officer (CSO) at Cyera, tackling the security threat of Agentic AI. Robocars get misdirected by mirrors. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Jason Clark, Chief Strategy Officer (CSO) at Cyera, discussing tackling the security industry's biggest threat: Agent AI. If you want to hear the full conversation from Jason, you can check it out here. 

Selected Reading

UK police arrest man over hack that affected European airports (Reuters)

AI tool helped recover £500m lost to fraud, government says (BBC)

CISA says hackers breached federal agency using GeoServer exploit (Bleeping Computer)

Supermicro server motherboards can be infected with unremovable malware (Ars Technica)

Boyd Gaming Suffers Cyberattack, Data Breach (Casino.org)

Email Threat Radar – September 2025 (Barracuda)

Revamped Phishing Techniques: How Telegram and Front-End Hosting Platforms Scale Campaigns (Forescout)

GitHub notifications abused to impersonate Y Combinator for crypto theft (Bleeping Computer)

Libraesva ESG issues emergency fix for bug exploited by state hackers (Bleeping Computer)

Fooling a self-driving car with mirrors on traffic cones (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>British authorities arrest a man in connection with the Collins Aerospace ransomware attack. CISA says attackers breached a U.S. federal civilian executive branch agency last year. Researchers uncover two high-severity vulnerabilities in Supermicro server motherboards. A Las Vegas casino operator confirms a cyber attack. Analysts track multiple large-scale, automated email phishing campaigns. Libraesva issues an emergency patch for its Email Security Gateway. Our guest is Jason Clark, Chief Strategy Officer (CSO) at Cyera, tackling the security threat of Agentic AI. Robocars get misdirected by mirrors.<strong> </strong></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment, we are joined by <a href="http://jasonclarkfl"><u>Jason Clark</u></a>, Chief Strategy Officer (CSO) at <a href="https://www.linkedin.com/company/cyera/"><u>Cyera</u></a>, discussing tackling the security industry's biggest threat: Agent AI. If you want to hear the full conversation from Jason, you can check it out <a href="https://explore.thecyberwire.com/jason-clark">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.reuters.com/business/aerospace-defense/uk-police-arrest-man-over-cyber-attack-that-affected-european-airports-2025-09-24/"><u>UK police arrest man over hack that affected European airports </u></a>(Reuters)</p>
<p><a href="https://www.bbc.com/news/articles/cpd92gpld0go"><u>AI tool helped recover £500m lost to fraud, government says</u></a> (BBC)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisa-says-hackers-breached-federal-agency-using-geoserver-exploit/"><u>CISA says hackers breached federal agency using GeoServer exploit</u></a> (Bleeping Computer)</p>
<p><a href="https://arstechnica.com/security/2025/09/supermicro-server-motherboards-can-be-infected-with-unremovable-malware/"><u>Supermicro server motherboards can be infected with unremovable malware </u></a>(Ars Technica)</p>
<p><a href="https://www.casino.org/news/boyd-gaming-suffers-cyberattack-data-breach/"><u>Boyd Gaming Suffers Cyberattack, Data Breach</u></a> (Casino.org)</p>
<p><a href="https://blog.barracuda.com/2025/09/23/email-threat-radar-september-2025"><u>Email Threat Radar – September 2025</u></a> (Barracuda)</p>
<p><a href="https://www.forescout.com/blog/revamped-phishing-techniques-how-telegram-and-front-end-hosting-platforms-scale-campaigns/"><u>Revamped Phishing Techniques: How Telegram and Front-End Hosting Platforms Scale Campaigns</u></a> (Forescout)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/github-notifications-abused-to-impersonate-y-combinator-for-crypto-theft/"><u>GitHub notifications abused to impersonate Y Combinator for crypto theft</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/libraesva-esg-issues-emergency-fix-for-bug-exploited-by-state-hackers/"><u>Libraesva ESG issues emergency fix for bug exploited by state hackers</u></a> (Bleeping Computer)</p>
<p><a href="https://www.theregister.com/2025/09/23/selfdriving_car_fooled_with_mirrors/"><u>Fooling a self-driving car with mirrors on traffic cones </u></a>(The Register)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1786</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cf966d26-1c7a-11f0-85e0-031a04a32824]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3608312578.mp3?updated=1758736925" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Espionage in the airwaves.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2398/notes</link>
      <description>The Secret Service dismantles an illegal network. Jaguar Land Rover (JLR) extends the shutdown production plants. The EU probes tech giants over online scams. Iranian APT Nimbus Manticore expands operations in Europe. North Korean Kimsuky deploys a shortcut-based espionage campaign. Github and Ruby Central roll out supply-chain security upgrades. Lastpass warns of macOS ClickFix campaign using fake GitHub repos. AT&amp;T’s CISO warns hackers mimic Salt Typhoon's unconventional tactics. CISO Perspectives host Kim Jones previews the upcoming season. An attorney pays $10K for AI hallucinations.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

CISO Perspectives host Kim Jones previews the upcoming season, sharing what’s ahead for listeners. From leadership challenges to the evolving role of the CISO, Kim highlights the conversations and insights you can expect this season.You can check out the season opener here.

Selected Reading

Cache of Devices Capable of Crashing Cell Network Is Found Near U.N. (The New York Times)

Secret Service Disrupts Threat Network Near UN General Assembly (YouTube)

JLR extends shutdown – again – as toll on workers laid bare (The Register)

The EU is scrutinizing how Apple, Google, and Microsoft tackle online scams (The Verge)

Nimbus Manticore Deploys New Malware Targeting Europe (Check Point Research)

Kimsuky attack disguised as sex offender notice information (Logpresso)

GitHub tightens npm security with mandatory 2FA, access tokens (Bleeping Computer)

NPM package caught using QR Code to fetch cookie-stealing malware (Bleeping Computer)

LastPass: Fake password managers infect Mac users with malware (Bleeping Computer)

Telecom exec: Salt Typhoon inspiring other hackers to use unconventional techniques (CyberScoop)

Attorney Slapped With Hefty Fine for Citing 21 Fake, AI-Generated Cases (PCMag)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Sep 2025 20:10:00 -0000</pubDate>
      <itunes:title>Espionage in the airwaves.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2398</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The Secret Service dismantles an illegal network. Jaguar Land Rover (JLR) extends the shutdown production plants. The EU probes tech giants over online scams. Iranian APT Nimbus Manticore expands operations in Europe. North Korean Kimsuky deploys a shortcut-based espionage campaign. Github and Ruby Central roll out supply-chain security upgrades. Lastpass warns of macOS ClickFix campaign using fake GitHub repos. AT&amp;T’s CISO warns hackers mimic Salt Typhoon's unconventional tactics. CISO Perspectives host Kim Jones previews the upcoming season. An attorney pays $10K for AI hallucinations.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

CISO Perspectives host Kim Jones previews the upcoming season, sharing what’s ahead for listeners. From leadership challenges to the evolving role of the CISO, Kim highlights the conversations and insights you can expect this season.You can check out the season opener here.

Selected Reading

Cache of Devices Capable of Crashing Cell Network Is Found Near U.N. (The New York Times)

Secret Service Disrupts Threat Network Near UN General Assembly (YouTube)

JLR extends shutdown – again – as toll on workers laid bare (The Register)

The EU is scrutinizing how Apple, Google, and Microsoft tackle online scams (The Verge)

Nimbus Manticore Deploys New Malware Targeting Europe (Check Point Research)

Kimsuky attack disguised as sex offender notice information (Logpresso)

GitHub tightens npm security with mandatory 2FA, access tokens (Bleeping Computer)

NPM package caught using QR Code to fetch cookie-stealing malware (Bleeping Computer)

LastPass: Fake password managers infect Mac users with malware (Bleeping Computer)

Telecom exec: Salt Typhoon inspiring other hackers to use unconventional techniques (CyberScoop)

Attorney Slapped With Hefty Fine for Citing 21 Fake, AI-Generated Cases (PCMag)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Secret Service dismantles an illegal network. Jaguar Land Rover (JLR) extends the shutdown production plants. The EU probes tech giants over online scams. Iranian APT Nimbus Manticore expands operations in Europe. North Korean Kimsuky deploys a shortcut-based espionage campaign. Github and Ruby Central roll out supply-chain security upgrades. Lastpass warns of macOS ClickFix campaign using fake GitHub repos. AT&amp;T’s CISO warns hackers mimic Salt Typhoon's unconventional tactics. CISO Perspectives host Kim Jones previews the upcoming season. An attorney pays $10K for AI hallucinations.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p><strong></strong><a href="https://thecyberwire.com/podcasts/cso-perspectives"><u>CISO Perspectives</u></a> host <a href="https://www.linkedin.com/in/kimjones-cism/"><u>Kim Jones</u></a> previews the upcoming season, sharing what’s ahead for listeners. From leadership challenges to the evolving role of the CISO, Kim highlights the conversations and insights you can expect this season.You can check out the season opener <a href="https://thecyberwire.com/podcasts/cso-perspectives/141/notes"><u>here</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.nytimes.com/2025/09/23/us/politics/secret-service-sim-cards-servers-un.html"><u>Cache of Devices Capable of Crashing Cell Network Is Found Near U.N.</u></a> (The New York Times)</p>
<p><a href="https://www.youtube.com/watch?v=xdVmp1gwyZo&amp;t=34s"><u>Secret Service Disrupts Threat Network Near UN General Assembly</u></a> (YouTube)</p>
<p><a href="https://www.theregister.com/2025/09/23/jaguar_landrover_shutdown_extended/"><u>JLR extends shutdown – again – as toll on workers laid bare</u></a> (The Register)</p>
<p><a href="https://www.theverge.com/news/783507/eu-regulators-apple-google-microsoft-online-scams"><u>The EU is scrutinizing how Apple, Google, and Microsoft tackle online scams</u></a> (The Verge)</p>
<p><a href="https://research.checkpoint.com/2025/nimbus-manticore-deploys-new-malware-targeting-europe/"><u>Nimbus Manticore Deploys New Malware Targeting Europe</u></a> (Check Point Research)</p>
<p><a href="https://logpresso.com/ko/blog/2025-09-18-Kimsuky-Attack"><u>Kimsuky attack disguised as sex offender notice information</u></a> (Logpresso)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/github-tightens-npm-security-with-mandatory-2fa-access-tokens/"><u>GitHub tightens npm security with mandatory 2FA, access tokens</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/npm-package-caught-using-qr-code-to-fetch-cookie-stealing-malware/"><u>NPM package caught using QR Code to fetch cookie-stealing malware</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/lastpass-fake-password-managers-infect-mac-users-with-malware/"><u>LastPass: Fake password managers infect Mac users with malware</u></a> (Bleeping Computer)</p>
<p><a href="https://cyberscoop.com/telecom-exec-salt-typhoon-inspiring-other-hackers-to-use-unconventional-techniques/"><u>Telecom exec: Salt Typhoon inspiring other hackers to use unconventional techniques</u></a> (CyberScoop)</p>
<p><a href="https://www.pcmag.com/news/attorney-slapped-with-hefty-fine-for-citing-21-fake-ai-generated-cases"><u>Attorney Slapped With Hefty Fine for Citing 21 Fake, AI-Generated Cases</u></a> (PCMag)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1540</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cf6df3e6-1c7a-11f0-85e0-a75b29181a7a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9287354001.mp3?updated=1758652956" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Grounded by ransomware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2397/notes</link>
      <description>A major ransomware attack disrupts airport operations across Europe. Congress is on the verge of letting major cyber legislation expire. A critical flaw nearly allowed total compromise of every Entra ID tenant. Automaker Stellantis confirms a data breach. Fortra patches a critical flaw in its GoAnywhere MFT software. Europol leads a major operation against online child sexual exploitation. Three of the cybersecurity industry’s biggest players opt out of MITRE’s 2025 ATT&amp;CK Evaluations. A compromised Steam game drains a cancer patient’s donations. Business Breakdown. Andrzej Olchawa and Milenko Starcik from VisionSpace join Maria Varmazis, host of T-Minus Space on hacking satellites. How one kid got tangled in Scattered Spider’s web.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Andrzej Olchawa and Milenko Starcik from VisionSpace are speaking with Maria Varmazis, host of T-Minus Space on hacking satellites.

Selected Reading

EU cyber agency says airport software held to ransom by criminals (BBC News)

Cyber threat information law hurtles toward expiration, with poor prospects for renewal (CyberScoop)

Microsoft Entra ID flaw allowed hijacking any company's tenant (Bleeping Computer)

Stellantis says a third-party vendor spilled customer data (The Register)

Fortra Patches Critical GoAnywhere MFT Vulnerability (SecurityWeek)

AI Forensics Help Europol Track 51 Children in Global Online Abuse Case (HackRead)

Cyber Threat Detection Vendors Pull Out of MITRE Evaluations Test (Infosecurity Magazine)

Verified Steam game steals streamer's cancer treatment donations (Bleeping Computer)

CrowdStrike and Check Point intend to acquire AI security firms. (N2K CyberWire Business Briefing) 

‘I Was a Weird Kid’: Jailhouse Confessions of a Teen Hacker (Bloomberg)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 22 Sep 2025 20:10:00 -0000</pubDate>
      <itunes:title>Grounded by ransomware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2397</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A major ransomware attack disrupts airport operations across Europe. Congress is on the verge of letting major cyber legislation expire. A critical flaw nearly allowed total compromise of every Entra ID tenant. Automaker Stellantis confirms a data breach. Fortra patches a critical flaw in its GoAnywhere MFT software. Europol leads a major operation against online child sexual exploitation. Three of the cybersecurity industry’s biggest players opt out of MITRE’s 2025 ATT&amp;CK Evaluations. A compromised Steam game drains a cancer patient’s donations. Business Breakdown. Andrzej Olchawa and Milenko Starcik from VisionSpace join Maria Varmazis, host of T-Minus Space on hacking satellites. How one kid got tangled in Scattered Spider’s web.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Andrzej Olchawa and Milenko Starcik from VisionSpace are speaking with Maria Varmazis, host of T-Minus Space on hacking satellites.

Selected Reading

EU cyber agency says airport software held to ransom by criminals (BBC News)

Cyber threat information law hurtles toward expiration, with poor prospects for renewal (CyberScoop)

Microsoft Entra ID flaw allowed hijacking any company's tenant (Bleeping Computer)

Stellantis says a third-party vendor spilled customer data (The Register)

Fortra Patches Critical GoAnywhere MFT Vulnerability (SecurityWeek)

AI Forensics Help Europol Track 51 Children in Global Online Abuse Case (HackRead)

Cyber Threat Detection Vendors Pull Out of MITRE Evaluations Test (Infosecurity Magazine)

Verified Steam game steals streamer's cancer treatment donations (Bleeping Computer)

CrowdStrike and Check Point intend to acquire AI security firms. (N2K CyberWire Business Briefing) 

‘I Was a Weird Kid’: Jailhouse Confessions of a Teen Hacker (Bloomberg)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A major ransomware attack disrupts airport operations across Europe. Congress is on the verge of letting major cyber legislation expire. A critical flaw nearly allowed total compromise of every Entra ID tenant. Automaker Stellantis confirms a data breach. Fortra patches a critical flaw in its GoAnywhere MFT software. Europol leads a major operation against online child sexual exploitation. Three of the cybersecurity industry’s biggest players opt out of MITRE’s 2025 ATT&amp;CK Evaluations. A compromised Steam game drains a cancer patient’s donations. Business Breakdown. Andrzej Olchawa and Milenko Starcik from VisionSpace join Maria Varmazis, host of T-Minus Space on hacking satellites. How one kid got tangled in Scattered Spider’s web.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p><a href="https://www.linkedin.com/in/andrzejolchawa/"><u>Andrzej Olchawa</u></a> and <a href="https://www.linkedin.com/in/milenko-starcik/"><u>Milenko Starcik</u></a> from <a href="https://visionspace.com/tales-from-def-con-33-starpwn-ctf-2025/"><u>VisionSpace</u></a> are speaking with <a href="https://www.linkedin.com/in/varmazis/"><u>Maria Varmazis</u></a>, host of <a href="https://space.n2k.com/podcasts/t-minus/606"><u>T-Minus Space</u></a> on hacking satellites.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bbc.co.uk/news/articles/cqjeej85452o"><u>EU cyber agency says airport software held to ransom by criminals</u></a> (BBC News)</p>
<p><a href="https://cyberscoop.com/cyber-threat-information-law-hurtles-toward-expiration-with-poor-prospects-for-renewal/"><u>Cyber threat information law hurtles toward expiration, with poor prospects for renewal</u></a> (CyberScoop)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/microsoft-entra-id-flaw-allowed-hijacking-any-companys-tenant/"><u>Microsoft Entra ID flaw allowed hijacking any company's tenant</u></a> (Bleeping Computer)</p>
<p><a href="https://www.theregister.com/2025/09/22/stellantis_breach/"><u>Stellantis says a third-party vendor spilled customer data</u></a> (The Register)</p>
<p><a href="https://www.securityweek.com/fortra-patches-critical-goanywhere-mft-vulnerability/"><u>Fortra Patches Critical GoAnywhere MFT Vulnerability</u></a> (SecurityWeek)</p>
<p><a href="https://hackread.com/ai-forensics-europol-track-children-online-abuse-case/"><u>AI Forensics Help Europol Track 51 Children in Global Online Abuse Case</u></a> (HackRead)</p>
<p><a href="https://www.infosecurity-magazine.com/news/cyber-vendors-pull-out-mitre/"><u>Cyber Threat Detection Vendors Pull Out of MITRE Evaluations Test</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/verified-steam-game-steals-streamers-cancer-treatment-donations/"><u>Verified Steam game steals streamer's cancer treatment donations</u></a> (Bleeping Computer)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/7/37"><u>CrowdStrike and Check Point intend to acquire AI security firms.</u></a> (N2K CyberWire Business Briefing) </p>
<p><a href="https://www.bloomberg.com/news/features/2025-09-19/multimillion-dollar-hacking-spree-scattered-spider-teen-s-jailhouse-confessions"><u>‘I Was a Weird Kid’: Jailhouse Confessions of a Teen Hacker</u></a> (Bloomberg)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1737</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cf44400a-1c7a-11f0-85e0-fb85440590eb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4458899747.mp3?updated=1758566853" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Roselle Safran: So much opportunity. [Entrepreneur] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/87/notes</link>
      <description>Please enjoy this encore of Career Notes. 

CEO and Founder of KeyCaliber, Roselle Safran, takes us on her circuitous career journey from startup to White House and back to startup again. With a degree in civil engineering, Roselle veered off into a more technical role at a startup and she says "caught the startup bug." After convincing a hiring manager that she could learn on the job, she transitioned to computer forensics and started on the path of cybersecurity. Roselle worked in government for the Department of Homeland Security and then to the Executive Office of the President leading all of the security operations. She jumped back into the world of startups and has stayed there. Roselle tells people interested in a career in cybersecurity to just apply. Learn as much as you can and go for it. We thank Roselle for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 21 Sep 2025 07:00:00 -0000</pubDate>
      <itunes:title>Roselle Safran: So much opportunity. [Entrepreneur] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>87</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/f552a2e6-9592-11f0-b483-3f033b6e4ea9/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

CEO and Founder of KeyCaliber, Roselle Safran, takes us on her circuitous career journey from startup to White House and back to startup again. With a degree in civil engineering, Roselle veered off into a more technical role at a startup and she says "caught the startup bug." After convincing a hiring manager that she could learn on the job, she transitioned to computer forensics and started on the path of cybersecurity. Roselle worked in government for the Department of Homeland Security and then to the Executive Office of the President leading all of the security operations. She jumped back into the world of startups and has stayed there. Roselle tells people interested in a career in cybersecurity to just apply. Learn as much as you can and go for it. We thank Roselle for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>CEO and Founder of KeyCaliber, Roselle Safran, takes us on her circuitous career journey from startup to White House and back to startup again. With a degree in civil engineering, Roselle veered off into a more technical role at a startup and she says "caught the startup bug." After convincing a hiring manager that she could learn on the job, she transitioned to computer forensics and started on the path of cybersecurity. Roselle worked in government for the Department of Homeland Security and then to the Executive Office of the President leading all of the security operations. She jumped back into the world of startups and has stayed there. Roselle tells people interested in a career in cybersecurity to just apply. Learn as much as you can and go for it. We thank Roselle for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>517</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f552a2e6-9592-11f0-b483-3f033b6e4ea9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2889877754.mp3?updated=1735936617" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Browser attacks without downloads. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/394/notes</link>
      <description>Today we are joined by Nati Tal, Head of Guardio Labs, discussing their work “CAPTCHAgeddon” or unmasking the viral evolution of the ClickFix browser-based threat. CAPTCHAgeddon — Shaked Chen’s deep dive into the ClickFix fake-captcha wave — reveals how a red-team trick morphed into a dominant, download-free browser threat that tricks users into pasting clipboard PowerShell/shell commands and leverages trusted infrastructure, including Google Scripts.
Guardio’s DBSCAN-based payload clustering exposes distinct attacker toolkits and distribution paths — from malvertising and compromised WordPress to social posts and Git repos — and argues defenders need behavioral, intelligence-driven protections, not just signatures.

The research can be found here:


  “CAPTCHAgeddon” Unmasking the Viral Evolution of the ClickFix Browser-Based Threat


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Sep 2025 07:00:00 -0000</pubDate>
      <itunes:title>Browser attacks without downloads. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>394</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9e316220-957b-11f0-9a31-9baca023fb9f/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Today we are joined by Nati Tal, Head of Guardio Labs, discussing their work “CAPTCHAgeddon” or unmasking the viral evolution of the ClickFix browser-based threat. CAPTCHAgeddon — Shaked Chen’s deep dive into the ClickFix fake-captcha wave — reveals how a red-team trick morphed into a dominant, download-free browser threat that tricks users into pasting clipboard PowerShell/shell commands and leverages trusted infrastructure, including Google Scripts.
Guardio’s DBSCAN-based payload clustering exposes distinct attacker toolkits and distribution paths — from malvertising and compromised WordPress to social posts and Git repos — and argues defenders need behavioral, intelligence-driven protections, not just signatures.

The research can be found here:


  “CAPTCHAgeddon” Unmasking the Viral Evolution of the ClickFix Browser-Based Threat


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we are joined by <a href="https://www.linkedin.com/in/natital/">Nati Tal</a>, Head of <a href="https://www.linkedin.com/company/guardiosec/">Guardio Labs</a>, discussing their work “CAPTCHAgeddon” or unmasking the viral evolution of the ClickFix browser-based threat. CAPTCHAgeddon — Shaked Chen’s deep dive into the ClickFix fake-captcha wave — reveals how a red-team trick morphed into a dominant, download-free browser threat that tricks users into pasting clipboard PowerShell/shell commands and leverages trusted infrastructure, including Google Scripts.<br>
Guardio’s DBSCAN-based payload clustering exposes distinct attacker toolkits and distribution paths — from malvertising and compromised WordPress to social posts and Git repos — and argues defenders need behavioral, intelligence-driven protections, not just signatures.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://guard.io/labs/captchageddon-unmasking-the-viral-evolution-of-the-clickfix-browser-based-threat">“CAPTCHAgeddon” Unmasking the Viral Evolution of the ClickFix Browser-Based Threat</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1305</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9e316220-957b-11f0-9a31-9baca023fb9f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4287317759.mp3?updated=1758302019" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The email that tricked an AI.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2396/notes</link>
      <description>OpenAI patches a ChatGPT flaw that could have exposed Gmail data. CISA documents malware exploiting two Ivanti Endpoint Manager Mobile (EPMM) flaws. WatchGuard patches a critical flaw in its Firebox firewalls. MI6 launches a dark web snitch site. The DoD looks to cut its cybersecurity job hiring time just 25 days. Researchers trick ChatGPT agents into solving CAPTCHAs. A UK teen faces accusations of being part of the Scattered Spider gang. The Senate confirms a new assistant secretary of defense for cyber policy. A former CIA officer is accused of selling classified information to private clients. Karin Ophir Zimet, Torq's Chief People Officer, is speaking with N2K Senior Workforce Analyst Will Markow about their internship program for upleveling AI skills. Russia’s AI propaganda goes prime time. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Karin Ophir Zimet, Torq's Chief People Officer, is speaking with N2K Senior Workforce Analyst Will Markow about their internship program for upleveling AI skills.

Selected Reading

OpenAI Fixed ChatGPT Security Flaw That Put Gmail Data at Risk (Bloomberg)

CISA Analyzes Malware From Ivanti EPMM Intrusions (SecurityWeek)

WatchGuard Issues Fix for 9.3-Rated Firebox Firewall Vulnerability (HackRead)

MI6 upgrades dark web portal to recruit new spies (The Register)

DOD official: We need to drop the cybersecurity talent hiring window to 25 days (CyberScoop)

ChatGPT Tricked Into Solving CAPTCHAs (SecurityWeek)

Scattered Spider teen cuffed after crypto splurge on games (The Register)

Senate confirms Sutton as Pentagon cyber policy chief (The Record)

Contractor Used Classified CIA Systems as ‘His Own Personal Google’ (404 Media)

Russian State TV Launches AI-Generated News Satire Show (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 19 Sep 2025 20:10:00 -0000</pubDate>
      <itunes:title>The email that tricked an AI.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2396</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>OpenAI patches a ChatGPT flaw that could have exposed Gmail data. CISA documents malware exploiting two Ivanti Endpoint Manager Mobile (EPMM) flaws. WatchGuard patches a critical flaw in its Firebox firewalls. MI6 launches a dark web snitch site. The DoD looks to cut its cybersecurity job hiring time just 25 days. Researchers trick ChatGPT agents into solving CAPTCHAs. A UK teen faces accusations of being part of the Scattered Spider gang. The Senate confirms a new assistant secretary of defense for cyber policy. A former CIA officer is accused of selling classified information to private clients. Karin Ophir Zimet, Torq's Chief People Officer, is speaking with N2K Senior Workforce Analyst Will Markow about their internship program for upleveling AI skills. Russia’s AI propaganda goes prime time. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Karin Ophir Zimet, Torq's Chief People Officer, is speaking with N2K Senior Workforce Analyst Will Markow about their internship program for upleveling AI skills.

Selected Reading

OpenAI Fixed ChatGPT Security Flaw That Put Gmail Data at Risk (Bloomberg)

CISA Analyzes Malware From Ivanti EPMM Intrusions (SecurityWeek)

WatchGuard Issues Fix for 9.3-Rated Firebox Firewall Vulnerability (HackRead)

MI6 upgrades dark web portal to recruit new spies (The Register)

DOD official: We need to drop the cybersecurity talent hiring window to 25 days (CyberScoop)

ChatGPT Tricked Into Solving CAPTCHAs (SecurityWeek)

Scattered Spider teen cuffed after crypto splurge on games (The Register)

Senate confirms Sutton as Pentagon cyber policy chief (The Record)

Contractor Used Classified CIA Systems as ‘His Own Personal Google’ (404 Media)

Russian State TV Launches AI-Generated News Satire Show (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>OpenAI patches a ChatGPT flaw that could have exposed Gmail data. CISA documents malware exploiting two Ivanti Endpoint Manager Mobile (EPMM) flaws. WatchGuard patches a critical flaw in its Firebox firewalls. MI6 launches a dark web snitch site. The DoD looks to cut its cybersecurity job hiring time just 25 days. Researchers trick ChatGPT agents into solving CAPTCHAs. A UK teen faces accusations of being part of the Scattered Spider gang. The Senate confirms a new assistant secretary of defense for cyber policy. A former CIA officer is accused of selling classified information to private clients. Karin Ophir Zimet, Torq's Chief People Officer, is speaking with N2K Senior Workforce Analyst Will Markow about their internship program for upleveling AI skills. Russia’s AI propaganda goes prime time. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p><a href="https://www.linkedin.com/in/karin-ophir-zimet-77912648/?originalSubdomain=il"><u>Karin Ophir Zimet</u></a>, <a href="https://www.linkedin.com/company/torqio/"><u>Torq</u></a>'s Chief People Officer, is speaking with N2K Senior Workforce Analyst <a href="https://www.linkedin.com/in/will-markow/"><u>Will Markow</u></a> about their internship program for upleveling AI skills.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bloomberg.com/news/articles/2025-09-18/openai-fixed-chatgpt-security-flaw-that-put-gmail-data-at-risk"><u>OpenAI Fixed ChatGPT Security Flaw That Put Gmail Data at Risk</u></a> (Bloomberg)</p>
<p><a href="https://www.securityweek.com/cisa-analyzes-malware-from-ivanti-epmm-intrusions/"><u>CISA Analyzes Malware From Ivanti EPMM Intrusions</u></a> (SecurityWeek)</p>
<p><a href="https://hackread.com/watchguard-fix-for-firebox-firewall-vulnerability/"><u>WatchGuard Issues Fix for 9.3-Rated Firebox Firewall Vulnerability</u></a> (HackRead)</p>
<p><a href="https://www.theregister.com/2025/09/19/mi6_darkweb_portal_upgrade/"><u>MI6 upgrades dark web portal to recruit new spies</u></a> (The Register)</p>
<p><a href="https://cyberscoop.com/dod-cyber-workforce-hiring-25-days-mark-gorak-fedtalks/"><u>DOD official: We need to drop the cybersecurity talent hiring window to 25 days</u></a> (CyberScoop)</p>
<p><a href="https://www.securityweek.com/chatgpt-tricked-into-solving-captchas/"><u>ChatGPT Tricked Into Solving CAPTCHAs</u></a> (SecurityWeek)</p>
<p><a href="https://www.theregister.com/2025/09/19/scattered_spider_teen_cuffed/"><u>Scattered Spider teen cuffed after crypto splurge on games</u></a> (The Register)</p>
<p><a href="https://therecord.media/senate-confirms-sutton-dod-cyber-policy"><u>Senate confirms Sutton as Pentagon cyber policy chief</u></a> (The Record)</p>
<p><a href="https://www.404media.co/contractor-used-classified-cia-systems-as-his-own-personal-google/"><u>Contractor Used Classified CIA Systems as ‘His Own Personal Google’</u></a> (404 Media)</p>
<p><a href="https://www.404media.co/russian-state-tv-launches-ai-generated-news-satire-show/"><u>Russian State TV Launches AI-Generated News Satire Show</u></a> (404 Media)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1655</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cf1978fc-1c7a-11f0-85e0-bfdd91dee92f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2736394901.mp3?updated=1758304674" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Brute force break-in.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2395/notes</link>
      <description>SonicWall confirms a breach in its cloud backup platform. Google patches a high-severity zero-day in Chrome. Updates on the Shai-Hulud worm. Chinese phishing emails impersonate the chair of the House China Committee. The UK’s NCA takes the reins of the Five Eyes Law Enforcement Group. RevengeHotels uses AI to deliver VenomRAT to Windows systems. A major VC shares details of a recent ransomware attack. A lawsuit targets automated license plate readers. Our guest is Brock Lupton, Product Strategist at Maltego, discussing the human side of intelligence work. From mic check to malware, a crypto phishing story.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today on our Industry Voices segment, we are joined by Brock Lupton, Product Strategist at Maltego, discussing the human side of intelligence work. You can hear the full conversation with Brock here.

Selected Reading

SonicWall MySonicWall platform breached, firewall config files exposed (Beyond Machines)

Google patches sixth Chrome zero-day exploited in attacks this year (Bleeping Computer)

"Shai-Hulud" Worm Compromises npm Ecosystem in Supply Chain Attack (Palo Alto Networks)

China-backed attackers spoof Congressman for US trade data (The Register)

NCA Singles Out “The Com” as It Chairs Five Eyes Group (Infosecurity Magazine)

New RevengeHotels attack targets Windows with VenomRAT (SC Media)

VC Firm Insight Partners Notifies Victims After Ransomware Breach (Infosecurity Magazine)

Police cameras tracked one driver 526 times in four months, lawsuit says (NBC)

Fake Empire Podcast Invites Target Crypto Industry with macOS AMOS Stealer (HackRead)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 18 Sep 2025 20:10:00 -0000</pubDate>
      <itunes:title>Brute force break-in.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2395</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>SonicWall confirms a breach in its cloud backup platform. Google patches a high-severity zero-day in Chrome. Updates on the Shai-Hulud worm. Chinese phishing emails impersonate the chair of the House China Committee. The UK’s NCA takes the reins of the Five Eyes Law Enforcement Group. RevengeHotels uses AI to deliver VenomRAT to Windows systems. A major VC shares details of a recent ransomware attack. A lawsuit targets automated license plate readers. Our guest is Brock Lupton, Product Strategist at Maltego, discussing the human side of intelligence work. From mic check to malware, a crypto phishing story.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today on our Industry Voices segment, we are joined by Brock Lupton, Product Strategist at Maltego, discussing the human side of intelligence work. You can hear the full conversation with Brock here.

Selected Reading

SonicWall MySonicWall platform breached, firewall config files exposed (Beyond Machines)

Google patches sixth Chrome zero-day exploited in attacks this year (Bleeping Computer)

"Shai-Hulud" Worm Compromises npm Ecosystem in Supply Chain Attack (Palo Alto Networks)

China-backed attackers spoof Congressman for US trade data (The Register)

NCA Singles Out “The Com” as It Chairs Five Eyes Group (Infosecurity Magazine)

New RevengeHotels attack targets Windows with VenomRAT (SC Media)

VC Firm Insight Partners Notifies Victims After Ransomware Breach (Infosecurity Magazine)

Police cameras tracked one driver 526 times in four months, lawsuit says (NBC)

Fake Empire Podcast Invites Target Crypto Industry with macOS AMOS Stealer (HackRead)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>SonicWall confirms a breach in its cloud backup platform. Google patches a high-severity zero-day in Chrome. Updates on the Shai-Hulud worm. Chinese phishing emails impersonate the chair of the House China Committee. The UK’s NCA takes the reins of the Five Eyes Law Enforcement Group. RevengeHotels uses AI to deliver VenomRAT to Windows systems. A major VC shares details of a recent ransomware attack. A lawsuit targets automated license plate readers. Our guest is Brock Lupton, Product Strategist at Maltego, discussing the human side of intelligence work. From mic check to malware, a crypto phishing story.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today on our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/brocklupton/"><u>Brock Lupton</u></a>, Product Strategist at <a href="https://www.linkedin.com/company/maltego/"><u>Maltego</u></a>, discussing the human side of intelligence work. You can hear the full conversation with Brock <a href="https://explore.thecyberwire.com/brock-lupton">here</a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://beyondmachines.net/event_details/sonicwall-mysonicwall-platform-breached-firewall-config-files-exposed-w-p-x-o-r/gD2P6Ple2L"><u>SonicWall MySonicWall platform breached, firewall config files exposed</u></a> (Beyond Machines)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/google-patches-sixth-chrome-zero-day-exploited-in-attacks-this-year/"><u>Google patches sixth Chrome zero-day exploited in attacks this year</u></a> (Bleeping Computer)</p>
<p><a href="https://unit42.paloaltonetworks.com/npm-supply-chain-attack/"><u>"Shai-Hulud" Worm Compromises npm Ecosystem in Supply Chain Attack</u></a> (Palo Alto Networks)</p>
<p><a href="https://www.theregister.com/2025/09/18/pandamonium_chinabacked_attackers_spoof_congressman/"><u>China-backed attackers spoof Congressman for US trade data</u></a> (The Register)</p>
<p><a href="https://www.infosecurity-magazine.com/news/nca-singles-out-com-chairs-five/"><u>NCA Singles Out “The Com” as It Chairs Five Eyes Group</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.scworld.com/brief/new-revengehotels-attack-targets-windows-with-venomrat"><u>New RevengeHotels attack targets Windows with VenomRAT</u></a> (SC Media)</p>
<p><a href="https://www.infosecurity-magazine.com/news/vc-insight-partners-notifies/"><u>VC Firm Insight Partners Notifies Victims After Ransomware Breach</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.nbcnews.com/tech/security/virginia-police-used-flock-cameras-track-driver-safety-lawsuit-surveil-rcna230399"><u>Police cameras tracked one driver 526 times in four months, lawsuit says</u></a> (NBC)</p>
<p><a href="https://hackread.com/fake-empire-podcast-invites-crypto-macos-amos-stealer/"><u>Fake Empire Podcast Invites Target Crypto Industry with macOS AMOS Stealer</u></a> (HackRead)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1711</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ceec5476-1c7a-11f0-85e0-ff35f3ff997b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9369649779.mp3?updated=1758220886" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Code beneath the sand.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2394/notes</link>
      <description>A new self-replicating malware infects the NPM repository. Microsoft and Cloudflare disrupt a Phishing-as-a-Service platform. Researchers uncover a new Fancy Bear backdoor campaign. The VoidProxy phishing-as-a-service (PhaaS) platform targets Microsoft 365 and Google accounts. A British telecom says its ransomware recovery may stretch into November. A new Rowhammer attack variant targets DDR5 memory. Democrats warn proposed budget cuts could slash the FBI’s cyber division staff by half at a heated Senate Judiciary Committee hearing. On our Industry Voices segment, we are joined by Abhishek Agrawal from Material security discussing challenges of securing the Google Workspace. Pompompurin heads to prison. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Abhishek Agrawal, CEO and Co-Founder of Material Security, discussing challenges of securing the Google Workspace. You can hear Abhishek’s full conversation here. 

Selected Reading

Self-Replicating Worm Hits 180+ Software Packages (Krebs on Security)

Microsoft disrupts the RaccoonO365 Phishing-as-a-Service operation, names alleged leader (Help Net Security)

Fancy Bear attacks abuse Office macros, legitimate cloud services (SC Media)

VoidProxy phishing operation targets Microsoft 365, Google accounts (SC Media)

UK telco Colt’s cyberattack recovery seeps into November (The Register)

Ruh-roh. DDR5 memory vulnerable to new Rowhammer attack (The Register)

Senators, FBI Director Patel clash over cyber division personnel, arrests (CyberScoop)

House lawmakers move to extend two key cyber programs, for now (The Record)

BreachForums founder caged after soft sentence overturned (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 17 Sep 2025 20:10:00 -0000</pubDate>
      <itunes:title>Code beneath the sand.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2394</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A new self-replicating malware infects the NPM repository. Microsoft and Cloudflare disrupt a Phishing-as-a-Service platform. Researchers uncover a new Fancy Bear backdoor campaign. The VoidProxy phishing-as-a-service (PhaaS) platform targets Microsoft 365 and Google accounts. A British telecom says its ransomware recovery may stretch into November. A new Rowhammer attack variant targets DDR5 memory. Democrats warn proposed budget cuts could slash the FBI’s cyber division staff by half at a heated Senate Judiciary Committee hearing. On our Industry Voices segment, we are joined by Abhishek Agrawal from Material security discussing challenges of securing the Google Workspace. Pompompurin heads to prison. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Abhishek Agrawal, CEO and Co-Founder of Material Security, discussing challenges of securing the Google Workspace. You can hear Abhishek’s full conversation here. 

Selected Reading

Self-Replicating Worm Hits 180+ Software Packages (Krebs on Security)

Microsoft disrupts the RaccoonO365 Phishing-as-a-Service operation, names alleged leader (Help Net Security)

Fancy Bear attacks abuse Office macros, legitimate cloud services (SC Media)

VoidProxy phishing operation targets Microsoft 365, Google accounts (SC Media)

UK telco Colt’s cyberattack recovery seeps into November (The Register)

Ruh-roh. DDR5 memory vulnerable to new Rowhammer attack (The Register)

Senators, FBI Director Patel clash over cyber division personnel, arrests (CyberScoop)

House lawmakers move to extend two key cyber programs, for now (The Record)

BreachForums founder caged after soft sentence overturned (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A new self-replicating malware infects the NPM repository. Microsoft and Cloudflare disrupt a Phishing-as-a-Service platform. Researchers uncover a new Fancy Bear backdoor campaign. The VoidProxy phishing-as-a-service (PhaaS) platform targets Microsoft 365 and Google accounts. A British telecom says its ransomware recovery may stretch into November. A new Rowhammer attack variant targets DDR5 memory. Democrats warn proposed budget cuts could slash the FBI’s cyber division staff by half at a heated Senate Judiciary Committee hearing. On our Industry Voices segment, we are joined by Abhishek Agrawal from Material security discussing challenges of securing the Google Workspace. Pompompurin heads to prison. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/abhishek--agrawal/"><u>Abhishek Agrawal</u></a>, CEO and Co-Founder of <a href="https://www.linkedin.com/company/materialsecurity/"><u>Material Security</u></a>, discussing challenges of securing the Google Workspace. You can hear Abhishek’s full conversation <a href="https://explore.thecyberwire.com/abhishek-agrawal">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://krebsonsecurity.com/2025/09/self-replicating-worm-hits-180-software-packages/"><u>Self-Replicating Worm Hits 180+ Software Packages</u></a> (Krebs on Security)</p>
<p><a href="https://www.helpnetsecurity.com/2025/09/17/microsoft-disrupts-raccoono365-phishing/"><u>Microsoft disrupts the RaccoonO365 Phishing-as-a-Service operation, names alleged leader</u></a> (Help Net Security)</p>
<p><a href="https://www.scworld.com/news/fancy-bear-attacks-abuse-office-macros-legitimate-cloud-services"><u>Fancy Bear attacks abuse Office macros, legitimate cloud services</u></a> (SC Media)</p>
<p><a href="https://www.scworld.com/news/voidproxy-phishing-operation-targets-microsoft-365-google-accounts"><u>VoidProxy phishing operation targets Microsoft 365, Google accounts</u></a> (SC Media)</p>
<p><a href="https://www.theregister.com/2025/09/17/uk_telco_colts_cyberattack_recovery/"><u>UK telco Colt’s cyberattack recovery seeps into November</u></a> (The Register)</p>
<p><a href="https://www.theregister.com/2025/09/17/ddr5_dram_rowhammer/"><u>Ruh-roh. DDR5 memory vulnerable to new Rowhammer attack</u></a> (The Register)</p>
<p><a href="https://cyberscoop.com/senators-fbi-director-patel-clash-over-cyber-division-personnel-arrests/"><u>Senators, FBI Director Patel clash over cyber division personnel, arrests</u> </a>(CyberScoop)</p>
<p><a href="https://therecord.media/house-lawmakers-move-to-extend-two-cyber-laws"><u>House lawmakers move to extend two key cyber programs, for now</u></a> (The Record)</p>
<p><a href="https://www.theregister.com/2025/09/17/breachforums_founder_prison/"><u>BreachForums founder caged after soft sentence overturned </u></a>(The Register)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1904</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ce8e4250-1c7a-11f0-85e0-137c5c5a4c28]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2118186096.mp3?updated=1758135604" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI chips flow east. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2393/notes</link>
      <description>A controversial Trump administration deal gives the U.A.E. access to cutting-edge U.S. AI chips. FlowiseAI warns of a critical account takeover vulnerability. A new social engineering campaign impersonates Meta account suspension notices. A macOS Spotlight 0-day flaw  bypasses Apple’s Transparency, Consent, and Control (TCC) protections. Are cost saving from outsourced IT services worth the risk? Poland boosts its cybersecurity budget after a surge in Russian-backed attacks. NTT Group joins the Comm-ISAC. Jaguar Land Rover’s global shutdown continues. A data breach affects millions of customers of top luxury brands. On today's Threat Vector segment, David Moulton⁠ speaks with⁠ Palo Alto Networks’ Spencer Thellmann about the dual challenges of securing employee use of generative AI tools and defending internally built AI models and agents. AI chatbots hustle seniors for science.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment

On today's segment of Threat Vector, host⁠ David Moulton⁠, Director of Thought Leadership for Unit 42, speaks with⁠ Spencer Thellmann⁠, Principal Product Manager at Palo Alto Networks. David and Spencer explore the dual challenges of securing employee use of generative AI tools and defending internally built AI models and agents. You can listen to the full conversation here﻿, and catch new episodes of Threat Vector each Thursday in your podcast app of choice. 

Selected Reading

In Giant Deals, U.A.E. Got Chips, and Trump Team Got Crypto Riches (The New York Times)

Critical FlowiseAI password reset flaw exposes accounts to complete takeover (Beyond Machines)

New FileFix attack uses steganography to drop StealC malware (Bleeping Computer)

From Spotlight to Apple Intelligence (Objective- See)

The Elephant in The Biz: outsourcing of critical IT and cybersecurity functions risks UK economic security | by Kevin Beaumont | Sep, 2025 (DoublePulsar)

Russian hackers target Polish hospitals and city water supply (The Financial Times)

NTT Group Joins the U.S. Communications-ISAC (Topics)

Jaguar Land Rover says cyberattack shutdown to last 'at least' another week (The Record)

Bags of info stolen from multiple top luxury brands - double check your data now (TechRadar)

We wanted to craft a perfect phishing scam. AI bots were happy to help (Reuters)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Sep 2025 20:10:00 -0000</pubDate>
      <itunes:title>AI chips flow east. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2393</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A controversial Trump administration deal gives the U.A.E. access to cutting-edge U.S. AI chips. FlowiseAI warns of a critical account takeover vulnerability. A new social engineering campaign impersonates Meta account suspension notices. A macOS Spotlight 0-day flaw  bypasses Apple’s Transparency, Consent, and Control (TCC) protections. Are cost saving from outsourced IT services worth the risk? Poland boosts its cybersecurity budget after a surge in Russian-backed attacks. NTT Group joins the Comm-ISAC. Jaguar Land Rover’s global shutdown continues. A data breach affects millions of customers of top luxury brands. On today's Threat Vector segment, David Moulton⁠ speaks with⁠ Palo Alto Networks’ Spencer Thellmann about the dual challenges of securing employee use of generative AI tools and defending internally built AI models and agents. AI chatbots hustle seniors for science.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment

On today's segment of Threat Vector, host⁠ David Moulton⁠, Director of Thought Leadership for Unit 42, speaks with⁠ Spencer Thellmann⁠, Principal Product Manager at Palo Alto Networks. David and Spencer explore the dual challenges of securing employee use of generative AI tools and defending internally built AI models and agents. You can listen to the full conversation here﻿, and catch new episodes of Threat Vector each Thursday in your podcast app of choice. 

Selected Reading

In Giant Deals, U.A.E. Got Chips, and Trump Team Got Crypto Riches (The New York Times)

Critical FlowiseAI password reset flaw exposes accounts to complete takeover (Beyond Machines)

New FileFix attack uses steganography to drop StealC malware (Bleeping Computer)

From Spotlight to Apple Intelligence (Objective- See)

The Elephant in The Biz: outsourcing of critical IT and cybersecurity functions risks UK economic security | by Kevin Beaumont | Sep, 2025 (DoublePulsar)

Russian hackers target Polish hospitals and city water supply (The Financial Times)

NTT Group Joins the U.S. Communications-ISAC (Topics)

Jaguar Land Rover says cyberattack shutdown to last 'at least' another week (The Record)

Bags of info stolen from multiple top luxury brands - double check your data now (TechRadar)

We wanted to craft a perfect phishing scam. AI bots were happy to help (Reuters)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A controversial Trump administration deal gives the U.A.E. access to cutting-edge U.S. AI chips. FlowiseAI warns of a critical account takeover vulnerability. A new social engineering campaign impersonates Meta account suspension notices. A macOS Spotlight 0-day flaw  bypasses Apple’s Transparency, Consent, and Control (TCC) protections. Are cost saving from outsourced IT services worth the risk? Poland boosts its cybersecurity budget after a surge in Russian-backed attacks. NTT Group joins the Comm-ISAC. Jaguar Land Rover’s global shutdown continues. A data breach affects millions of customers of top luxury brands. On today's Threat Vector segment, David Moulton⁠ speaks with⁠ Palo Alto Networks’ Spencer Thellmann about the dual challenges of securing employee use of generative AI tools and defending internally built AI models and agents. AI chatbots hustle seniors for science.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Threat Vector Segment</strong></p>
<p>On today's segment of Threat Vector, host<a href="https://www.linkedin.com/in/davidrmoulton/"><u>⁠ David Moulton⁠</u></a>, Director of Thought Leadership for Unit 42, speaks with<a href="https://www.linkedin.com/in/spencer-thellmann-444b80113/"><u>⁠ Spencer Thellmann⁠</u></a>, Principal Product Manager at Palo Alto Networks. David and Spencer explore the dual challenges of securing employee use of generative AI tools and defending internally built AI models and agents. You can listen to the full conversation<a href="https://thecyberwire.com/podcasts/threat-vector/84/notes"><u> here</u></a>﻿, and catch new episodes of Threat Vector each Thursday in your podcast app of choice. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.nytimes.com/2025/09/15/us/politics/trump-uae-chips-witkoff-world-liberty.html"><u>In Giant Deals, U.A.E. Got Chips, and Trump Team Got Crypto Riches </u></a>(The New York Times)</p>
<p><a href="https://beyondmachines.net/event_details/critical-flowiseai-password-reset-flaw-exposes-accounts-to-complete-takeover-l-l-h-0-f/gD2P6Ple2L"><u>Critical FlowiseAI password reset flaw exposes accounts to complete takeover</u></a> (Beyond Machines)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/new-filefix-attack-uses-steganography-to-drop-stealc-malware/"><u>New FileFix attack uses steganography to drop StealC malware</u></a> (Bleeping Computer)</p>
<p><a href="https://objective-see.org/blog/blog_0x81.html"><u>From Spotlight to Apple Intelligence</u></a> (Objective- See)</p>
<p><a href="https://doublepulsar.com/the-elephant-in-the-biz-outsourcing-of-critical-it-and-cybersecurity-functions-risks-uk-economic-96205e0585bf"><u>The Elephant in The Biz: outsourcing of critical IT and cybersecurity functions risks UK economic security | by Kevin Beaumont | Sep, 2025</u> </a>(DoublePulsar)</p>
<p><a href="https://www.ft.com/content/3e7c7a96-09e7-407f-98d7-a29310743d28"><u>Russian hackers target Polish hospitals and city water supply</u></a> (The Financial Times)</p>
<p><a href="https://group.ntt/en/topics/2025/09/16/comm_isac.html"><u>NTT Group Joins the U.S. Communications-ISAC</u> </a>(Topics)</p>
<p><a href="https://therecord.media/jaguar-land-rover-another-week-shutdown-cyberattack"><u>Jaguar Land Rover says cyberattack shutdown to last 'at least' another week</u></a> (The Record)</p>
<p><a href="https://www.techradar.com/pro/security/bags-of-info-stolen-from-multiple-top-luxury-brands-double-check-your-data-now"><u>Bags of info stolen from multiple top luxury brands - double check your data now </u></a><u>(</u>TechRadar)</p>
<p><a href="https://www.reuters.com/investigates/special-report/ai-chatbots-cyber/"><u>We wanted to craft a perfect phishing scam. AI bots were happy to help</u></a> (Reuters)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1567</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ceb922b8-1c7a-11f0-85e0-2b56e8e075bd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9646561812.mp3?updated=1758046718" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The return of CISO Perspectives. [CISO Perspectives]</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/112/notes</link>
      <description>This season on CISO Perspectives—your host, Kim Jones is digging into the issues shaping the future of cybersecurity leadership. From the regulations every CISO needs to understand, to the unexpected places privacy risks are emerging, to the new ways fraud and identity are colliding—these conversations will sharpen your strategies and strengthen your defenses.

Industry leaders join the discussion to share their insights, challenges, and hard-earned lessons. Together, we’ll connect the dots across regulation, privacy, fraud, leadership, and talent—helping you build a stronger, more resilient cybersecurity ecosystem.

This is CISO Perspectives. Real conversations. Real strategies. Real impact.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Sep 2025 06:00:00 -0000</pubDate>
      <itunes:title>The return of CISO Perspectives. [CISO Perspectives]</itunes:title>
      <itunes:episodeType>trailer</itunes:episodeType>
      <itunes:season>17</itunes:season>
      <itunes:episode>112</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c50b1018-9273-11f0-999a-1395058a518e/image/4576c79a6260b29daaff0ea0480913c0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This season on CISO Perspectives—your host, Kim Jones is digging into the issues shaping the future of cybersecurity leadership. From the regulations every CISO needs to understand, to the unexpected places privacy risks are emerging, to the new ways fraud and identity are colliding—these conversations will sharpen your strategies and strengthen your defenses.

Industry leaders join the discussion to share their insights, challenges, and hard-earned lessons. Together, we’ll connect the dots across regulation, privacy, fraud, leadership, and talent—helping you build a stronger, more resilient cybersecurity ecosystem.

This is CISO Perspectives. Real conversations. Real strategies. Real impact.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This season on <em>CISO Perspectives</em>—your host, Kim Jones is digging into the issues shaping the future of cybersecurity leadership. From the regulations every CISO needs to understand, to the unexpected places privacy risks are emerging, to the new ways fraud and identity are colliding—these conversations will sharpen your strategies and strengthen your defenses.</p>
<p>Industry leaders join the discussion to share their insights, challenges, and hard-earned lessons. Together, we’ll connect the dots across regulation, privacy, fraud, leadership, and talent—helping you build a stronger, more resilient cybersecurity ecosystem.</p>
<p><em>This is CISO Perspectives. Real conversations. Real strategies. Real impact.</em></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>201</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c50b1018-9273-11f0-999a-1395058a518e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2776024620.mp3?updated=1757965439" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FBI botnet cleanup backfires.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2392/notes</link>
      <description>FBI botnet disruption leaves cybercriminals scrambling to pick up the pieces. Notorious ransomware gangs announce their retirement, but don’t hold your breath. Hacktivists leak data tied to China’s Great Firewall. A new report says DHS mishandled a key program designed to retain cyber talent at CISA. GPUGate malware cleverly evades analysis. WhiteCobra targets developers with malicious extensions. North Korea’s Kimsuky group uses AI to generate fake South Korean military IDs. My guest is Tim Starks from CyberScoop, discussing offensive cyber operations. A cyberattack leaves students hung out to dry.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined once again by Tim Starks from CyberScoop discussing offensive cyber operations. You can read Tim’s article Google previews cyber ‘disruption unit’ as U.S. government, industry weigh going heavier on offense for more background.

Selected Reading

The FBI Destroyed an Internet Weapon, but Criminals Picked Up the Pieces (Wall Street Journal)

15 ransomware gangs ‘go dark’ to enjoy 'golden parachutes' (The Register)

600 GB of Alleged Great Firewall of China Data Published in Largest Leak Yet (HackRead)

China Enforces 1-Hour Cybersecurity Incident Reporting (The Cyber Express)

​​DHS watchdog finds mismanagement in critical cyber talent program (FedScoop)

GPUGate Malware: Malicious GitHub Desktop Implants Use Hardware-Specific Decryption, Abuse Google Ads to Target Western Europe (Arctic Wolf)

'WhiteCobra' floods VSCode market with crypto-stealing extensions (Bleeping Computer)

AI-Forged Military IDs Used in North Korean Phishing Attack (Infosecurity Magazine)

Mitsubishi to acquire Nozomi Networks for nearly $1 billion. (N2K CyberWire Business Briefing) 

Dutch students denied access to jailbroken laundry machines (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 15 Sep 2025 20:10:00 -0000</pubDate>
      <itunes:title>FBI botnet cleanup backfires.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2392</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>FBI botnet disruption leaves cybercriminals scrambling to pick up the pieces. Notorious ransomware gangs announce their retirement, but don’t hold your breath. Hacktivists leak data tied to China’s Great Firewall. A new report says DHS mishandled a key program designed to retain cyber talent at CISA. GPUGate malware cleverly evades analysis. WhiteCobra targets developers with malicious extensions. North Korea’s Kimsuky group uses AI to generate fake South Korean military IDs. My guest is Tim Starks from CyberScoop, discussing offensive cyber operations. A cyberattack leaves students hung out to dry.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined once again by Tim Starks from CyberScoop discussing offensive cyber operations. You can read Tim’s article Google previews cyber ‘disruption unit’ as U.S. government, industry weigh going heavier on offense for more background.

Selected Reading

The FBI Destroyed an Internet Weapon, but Criminals Picked Up the Pieces (Wall Street Journal)

15 ransomware gangs ‘go dark’ to enjoy 'golden parachutes' (The Register)

600 GB of Alleged Great Firewall of China Data Published in Largest Leak Yet (HackRead)

China Enforces 1-Hour Cybersecurity Incident Reporting (The Cyber Express)

​​DHS watchdog finds mismanagement in critical cyber talent program (FedScoop)

GPUGate Malware: Malicious GitHub Desktop Implants Use Hardware-Specific Decryption, Abuse Google Ads to Target Western Europe (Arctic Wolf)

'WhiteCobra' floods VSCode market with crypto-stealing extensions (Bleeping Computer)

AI-Forged Military IDs Used in North Korean Phishing Attack (Infosecurity Magazine)

Mitsubishi to acquire Nozomi Networks for nearly $1 billion. (N2K CyberWire Business Briefing) 

Dutch students denied access to jailbroken laundry machines (The Register)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>FBI botnet disruption leaves cybercriminals scrambling to pick up the pieces. Notorious ransomware gangs announce their retirement, but don’t hold your breath. Hacktivists leak data tied to China’s Great Firewall. A new report says DHS mishandled a key program designed to retain cyber talent at CISA. GPUGate malware cleverly evades analysis. WhiteCobra targets developers with malicious extensions. North Korea’s Kimsuky group uses AI to generate fake South Korean military IDs. My guest is Tim Starks from CyberScoop, discussing offensive cyber operations. A cyberattack leaves students hung out to dry.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined once again by <a href="https://www.linkedin.com/in/tstarks/"><u>Tim Starks</u></a> from <a href="https://www.linkedin.com/company/cyberscoop/"><u>CyberScoop</u></a> discussing offensive cyber operations. You can read Tim’s article <a href="https://cyberscoop.com/google-cybersecurity-disruption-unit-active-defense-hack-back/"><u>Google previews cyber ‘disruption unit’ as U.S. government, industry weigh going heavier on offense</u></a> for more background.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.wsj.com/tech/cybersecurity/the-fbi-destroyed-an-internet-weapon-but-criminals-picked-up-the-pieces-6a278c07"><u>The FBI Destroyed an Internet Weapon, but Criminals Picked Up the Pieces</u></a> (Wall Street Journal)</p>
<p><a href="https://www.theregister.com/2025/09/14/in_brief_infosec/"><u>15 ransomware gangs ‘go dark’ to enjoy 'golden parachutes'</u></a> (The Register)</p>
<p><a href="https://hackread.com/great-firewall-of-china-data-published-largest-leak/"><u>600 GB of Alleged Great Firewall of China Data Published in Largest Leak Yet</u></a> (HackRead)</p>
<p><a href="https://thecyberexpress.com/china-cybersecurity-incident-reporting/"><u>China Enforces 1-Hour Cybersecurity Incident Reporting</u></a> (The Cyber Express)</p>
<p><a href="https://fedscoop.com/cisa-cyber-incentive-program-dhs-inspector-general-report/"><u>​​DHS watchdog finds mismanagement in critical cyber talent program</u></a> (FedScoop)</p>
<p><a href="https://arcticwolf.com/resources/blog/gpugate-malware-malicious-github-desktop-implants-use-hardware-specific-decryption-abuse-google-ads-target-western-europe/"><u>GPUGate Malware: Malicious GitHub Desktop Implants Use Hardware-Specific Decryption, Abuse Google Ads to Target Western Europe</u></a> (Arctic Wolf)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/whitecobra-floods-vscode-market-with-crypto-stealing-extensions/"><u>'WhiteCobra' floods VSCode market with crypto-stealing extensions</u></a> (Bleeping Computer)</p>
<p><a href="https://www.infosecurity-magazine.com/news/ai-military-ids-north-korea/"><u>AI-Forged Military IDs Used in North Korean Phishing Attack</u></a> (Infosecurity Magazine)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/7/36"><u>Mitsubishi to acquire Nozomi Networks for nearly $1 billion.</u></a> (N2K CyberWire Business Briefing) </p>
<p><a href="https://www.theregister.com/2025/09/12/jailbroken_laundry_machines/"><u>Dutch students denied access to jailbroken laundry machines</u></a> (The Register)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1751</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ce6142e6-1c7a-11f0-85e0-d765f189323b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5192805624.mp3?updated=1757961445" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Helen Patton: A platform to talk about security. [CISO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/85/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Advisory CISO at Cisco, Helen Patton, shares that a combination of dumb luck, hard work and serendipity that got her to where she is today. Growing up in the country in Australia, Helen notes that computers were not really a thing. She happened into technology after moving to the US, as she was the only person in her office under 40. Of course she would be comfortable with computers and able to handle a database conversion, right? That launched her into a career that spanned supporting small nonprofits, working at one of the biggest banks on Wall Street while leading a global team, being the CISO of a major university, and now Advisory CISO at Cisco. Helen recently wrote a book, "Navigating the Cybersecurity Career Path," to help others know when it's time to move on from one role to another role as part of desire to give back to the community. We thank Helen for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 14 Sep 2025 07:00:00 -0000</pubDate>
      <itunes:title>Helen Patton: A platform to talk about security. [CISO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>85</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9b209170-9010-11f0-9c7f-27a037b07a5a/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Advisory CISO at Cisco, Helen Patton, shares that a combination of dumb luck, hard work and serendipity that got her to where she is today. Growing up in the country in Australia, Helen notes that computers were not really a thing. She happened into technology after moving to the US, as she was the only person in her office under 40. Of course she would be comfortable with computers and able to handle a database conversion, right? That launched her into a career that spanned supporting small nonprofits, working at one of the biggest banks on Wall Street while leading a global team, being the CISO of a major university, and now Advisory CISO at Cisco. Helen recently wrote a book, "Navigating the Cybersecurity Career Path," to help others know when it's time to move on from one role to another role as part of desire to give back to the community. We thank Helen for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Advisory CISO at Cisco, Helen Patton, shares that a combination of dumb luck, hard work and serendipity that got her to where she is today. Growing up in the country in Australia, Helen notes that computers were not really a thing. She happened into technology after moving to the US, as she was the only person in her office under 40. Of course she would be comfortable with computers and able to handle a database conversion, right? That launched her into a career that spanned supporting small nonprofits, working at one of the biggest banks on Wall Street while leading a global team, being the CISO of a major university, and now Advisory CISO at Cisco. Helen recently wrote a book, "Navigating the Cybersecurity Career Path," to help others know when it's time to move on from one role to another role as part of desire to give back to the community. We thank Helen for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>645</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9b209170-9010-11f0-9c7f-27a037b07a5a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8941105022.mp3?updated=1735936616" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Data leak without a click.  [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/393/notes</link>
      <description>Today we are joined by Amanda Rousseau, Principal AI Security Researcher from Straiker, discussing their work on "The Silent Exfiltration: Zero‑Click Agentic AI Hack That Can Leak Your Google Drive with One Email." Straiker’s research found that enterprise AI agents can be silently manipulated to leak sensitive data, even without user clicks or alerts. By chaining small gaps across tools like Gmail, Google Drive, and calendars, attackers achieved zero-click exfiltration, system mapping, and even policy rewrites. The findings highlight that excessive agent autonomy creates a new attack surface, requiring least-privilege design, runtime guardrails, and continuous red-teaming to stay secure.

The research can be found here:


  The Silent Exfiltration: Zero‑Click Agentic AI Hack That Can Leak Your Google Drive with One Email


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Sep 2025 07:00:00 -0000</pubDate>
      <itunes:title>Data leak without a click.  [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>398</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/00fa13ea-8ff3-11f0-87c6-b715183ba2f5/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Today we are joined by Amanda Rousseau, Principal AI Security Researcher from Straiker, discussing their work on "The Silent Exfiltration: Zero‑Click Agentic AI Hack That Can Leak Your Google Drive with One Email." Straiker’s research found that enterprise AI agents can be silently manipulated to leak sensitive data, even without user clicks or alerts. By chaining small gaps across tools like Gmail, Google Drive, and calendars, attackers achieved zero-click exfiltration, system mapping, and even policy rewrites. The findings highlight that excessive agent autonomy creates a new attack surface, requiring least-privilege design, runtime guardrails, and continuous red-teaming to stay secure.

The research can be found here:


  The Silent Exfiltration: Zero‑Click Agentic AI Hack That Can Leak Your Google Drive with One Email


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we are joined by <a href="https://www.linkedin.com/in/malwareunicorn/">Amanda Rousseau</a>, Principal AI Security Researcher from <a href="https://www.linkedin.com/company/straikerai/">Straiker</a>, discussing their work on "The Silent Exfiltration: Zero‑Click Agentic AI Hack That Can Leak Your Google Drive with One Email." Straiker’s research found that enterprise AI agents can be silently manipulated to leak sensitive data, even without user clicks or alerts. By chaining small gaps across tools like Gmail, Google Drive, and calendars, attackers achieved zero-click exfiltration, system mapping, and even policy rewrites. The findings highlight that excessive agent autonomy creates a new attack surface, requiring least-privilege design, runtime guardrails, and continuous red-teaming to stay secure.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.straiker.ai/blog/the-silent-exfiltration-zero-click-agentic-ai-hack-that-can-leak-your-google-drive-with-one-email">The Silent Exfiltration: Zero‑Click Agentic AI Hack That Can Leak Your Google Drive with One Email</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1322</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00fa13ea-8ff3-11f0-87c6-b715183ba2f5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7672704880.mp3?updated=1757692544" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>WhatsAppened to Samsung?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2391/notes</link>
      <description>Samsung patches a critical Android zero-day vulnerability. Microsoft resolves a global Exchange Online outage. CISA reaffirms its commitment to the CVE program. California passes a bill requiring web browsers to let users automatically send opt-out signals. Apple issues spyware attack warnings. The FTC opens an investigation into AI chatbots on how they protect children and teens. A hacker convicted of attempting to extort more than 20,000 psychotherapy patients is free on appeal. Our guest is Dave Lewis, Global Advisory CISO at 1Password, discussing how security leaders can protect M&amp;A deal value and integrity. Schools face insider threats from students.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today’s guest is Dave Lewis, Global Advisory CISO at 1Password, discussing how security leaders can protect deal value and integrity.Selected Reading

Samsung patches actively exploited zero-day reported by WhatsApp (Bleeping Computer)

Microsoft fixes Exchange Online outage affecting users worldwide (Bleeping Computer)

CISA looks to partners to shore up the future of the CVE Program (Help Net Security)

California legislature passes bill forcing web browsers to let consumers automatically opt out of data sharing (The Record)

Apple warns customers targeted in recent spyware attacks (Bleeping Computer)

FTC to AI Companies: Tell Us How You Protect Teens and Kids Who Use AI Companions (CNET)

Defence, Space and Cybersecurity. Why the General Assembly in Frascati matters (Decode39)

DSEI Takeaways: Space and Cyber and the Invisible Front Line (Via Satellite) 

Hacker convicted of extorting 20,000 psychotherapy victims walks free during appeal (The Record)

Children hacking their own schools for 'fun', watchdog warns (BBC) - kicker

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 12 Sep 2025 20:10:00 -0000</pubDate>
      <itunes:title>WhatsAppened to Samsung?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2391</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Samsung patches a critical Android zero-day vulnerability. Microsoft resolves a global Exchange Online outage. CISA reaffirms its commitment to the CVE program. California passes a bill requiring web browsers to let users automatically send opt-out signals. Apple issues spyware attack warnings. The FTC opens an investigation into AI chatbots on how they protect children and teens. A hacker convicted of attempting to extort more than 20,000 psychotherapy patients is free on appeal. Our guest is Dave Lewis, Global Advisory CISO at 1Password, discussing how security leaders can protect M&amp;A deal value and integrity. Schools face insider threats from students.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today’s guest is Dave Lewis, Global Advisory CISO at 1Password, discussing how security leaders can protect deal value and integrity.Selected Reading

Samsung patches actively exploited zero-day reported by WhatsApp (Bleeping Computer)

Microsoft fixes Exchange Online outage affecting users worldwide (Bleeping Computer)

CISA looks to partners to shore up the future of the CVE Program (Help Net Security)

California legislature passes bill forcing web browsers to let consumers automatically opt out of data sharing (The Record)

Apple warns customers targeted in recent spyware attacks (Bleeping Computer)

FTC to AI Companies: Tell Us How You Protect Teens and Kids Who Use AI Companions (CNET)

Defence, Space and Cybersecurity. Why the General Assembly in Frascati matters (Decode39)

DSEI Takeaways: Space and Cyber and the Invisible Front Line (Via Satellite) 

Hacker convicted of extorting 20,000 psychotherapy victims walks free during appeal (The Record)

Children hacking their own schools for 'fun', watchdog warns (BBC) - kicker

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.  

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Samsung patches a critical Android zero-day vulnerability. Microsoft resolves a global Exchange Online outage. CISA reaffirms its commitment to the CVE program. California passes a bill requiring web browsers to let users automatically send opt-out signals. Apple issues spyware attack warnings. The FTC opens an investigation into AI chatbots on how they protect children and teens. A hacker convicted of attempting to extort more than 20,000 psychotherapy patients is free on appeal. Our guest is Dave Lewis, Global Advisory CISO at 1Password, discussing how security leaders can protect M&amp;A deal value and integrity. Schools face insider threats from students.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today’s guest is <a href="https://www.linkedin.com/in/gattaca/"><u>Dave Lewis</u></a>, Global Advisory CISO at <a href="https://www.linkedin.com/company/1password/"><u>1Password</u></a>, discussing how security leaders can protect deal value and integrity.<br><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/samsung-patches-actively-exploited-zero-day-reported-by-whatsapp/"><u>Samsung patches actively exploited zero-day reported by WhatsApp</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-investigates-exchange-online-outage-in-north-america/"><u>Microsoft fixes Exchange Online outage affecting users worldwide</u></a> (Bleeping Computer)</p>
<p><a href="https://www.helpnetsecurity.com/2025/09/12/cisa-cve-program-future/"><u>CISA looks to partners to shore up the future of the CVE Program</u></a> (Help Net Security)</p>
<p><a href="https://therecord.media/california-legislature-passes-bill-data-sharing-opt-out"><u>California legislature passes bill forcing web browsers to let consumers automatically opt out of data sharing</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/apple-warns-customers-targeted-in-recent-spyware-attacks/"><u>Apple warns customers targeted in recent spyware attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.cnet.com/tech/services-and-software/ftc-to-ai-companies-tell-us-how-you-protect-teens-and-kids-who-use-ai-companions/"><u>FTC to AI Companies: Tell Us How You Protect Teens and Kids Who Use AI Companions</u></a> (CNET)</p>
<p><a href="https://decode39.com/11793/defence-space-and-cybersecurity-why-the-general-assembly-in-frascati-matters/"><u>Defence, Space and Cybersecurity. Why the General Assembly in Frascati matters</u></a> (Decode39)</p>
<p><a href="https://www.satellitetoday.com/government-military/2025/09/11/dsei-takeaways-space-and-cyber-and-the-invisible-front-line/?utm_source=Via+Satellite+Email&amp;utm_medium=email&amp;utm_campaign=DNF+Email&amp;oly_enc_id=4280I7282856G8I"><u>DSEI Takeaways: Space and Cyber and the Invisible Front Line</u></a> (Via Satellite) </p>
<p><a href="https://therecord.media/finland-vastaamo-hacker-free-during-appeal-conviction"><u>Hacker convicted of extorting 20,000 psychotherapy victims walks free during appeal</u></a> (The Record)</p>
<p><br><a href="https://www.bbc.com/news/articles/c203pedz58go"><u>Children hacking their own schools for 'fun', watchdog warns</u></a> (BBC) - kicker</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.  </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1656</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ce264c72-1c7a-11f0-85e0-7b50b22978fc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1474862921.mp3?updated=1757702922" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber and AI take center stage.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2390/notes</link>
      <description>The House passes a defense policy bill that includes new provisions on cybersecurity and artificial intelligence. Senator Wyden accuses Microsoft of “gross cybersecurity negligence” after a 2024 ransomware attack crippled healthcare giant Ascension. The White House shelves plans to split U.S. Cyber Command and the NSA. The Pentagon finalizes its long-awaited Cybersecurity Maturity Model Certification (CMMC 2.0) rule. Akira ransomware group targets SonicWall devices. Officials warn solar-powered highway infrastructure should be checked for hidden radios. The Atlantic Council maps the global spyware market. Researchers uncover serious flaws in Apple’s AirPlay. A European DDoS mitigation provider thwarts a record-breaking attack. My Caveat cohosts Ethan Cook and Ben Yelin unpack the cyber elements of the Big Beautiful Bill. Who fixes the vibe code? 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we have Ethan Cook joining Caveat hosts Dave Bittner and Ben Yelin for this month’s Policy Deep Dive. Together, they unpack HR1, the “Big Beautiful Bill”, and how its investments in technology, supply chain security, and defensive resiliency reflect the Trump administration’s push for long-term technological dominance. If you want to hear the full conversation, head over to Caveat.

Selected Reading

House moves ahead with defense bill that includes AI, cyber provisions (The Record)

FTC should investigate Microsoft after Ascension ransomware attack, senator says (The Record)

Cyber Command, NSA to remain under single leader as officials shelve plan to end 'dual hat' (The Record)

Pentagon Releases Long-Awaited Contractor Cybersecurity Rule (GovInfo Security)

Akira Ransomware Group Utilizing SonicWall Devices for Initial Access (Rapid7)

Exclusive: US warns hidden radios may be embedded in solar-powered highway infrastructure (Reuters)

Mythical Beasts: Diving into the depths of the global spyware market (Atlantic Council)

Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance (SecurityWeek)

DDoS defender targeted in 1.5 Bpps denial-of-service attack (Bleeping Computer)

The Software Engineers Paid to Fix Vibe Coded Messes (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 11 Sep 2025 20:10:00 -0000</pubDate>
      <itunes:title>Cyber and AI take center stage.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2390</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The House passes a defense policy bill that includes new provisions on cybersecurity and artificial intelligence. Senator Wyden accuses Microsoft of “gross cybersecurity negligence” after a 2024 ransomware attack crippled healthcare giant Ascension. The White House shelves plans to split U.S. Cyber Command and the NSA. The Pentagon finalizes its long-awaited Cybersecurity Maturity Model Certification (CMMC 2.0) rule. Akira ransomware group targets SonicWall devices. Officials warn solar-powered highway infrastructure should be checked for hidden radios. The Atlantic Council maps the global spyware market. Researchers uncover serious flaws in Apple’s AirPlay. A European DDoS mitigation provider thwarts a record-breaking attack. My Caveat cohosts Ethan Cook and Ben Yelin unpack the cyber elements of the Big Beautiful Bill. Who fixes the vibe code? 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we have Ethan Cook joining Caveat hosts Dave Bittner and Ben Yelin for this month’s Policy Deep Dive. Together, they unpack HR1, the “Big Beautiful Bill”, and how its investments in technology, supply chain security, and defensive resiliency reflect the Trump administration’s push for long-term technological dominance. If you want to hear the full conversation, head over to Caveat.

Selected Reading

House moves ahead with defense bill that includes AI, cyber provisions (The Record)

FTC should investigate Microsoft after Ascension ransomware attack, senator says (The Record)

Cyber Command, NSA to remain under single leader as officials shelve plan to end 'dual hat' (The Record)

Pentagon Releases Long-Awaited Contractor Cybersecurity Rule (GovInfo Security)

Akira Ransomware Group Utilizing SonicWall Devices for Initial Access (Rapid7)

Exclusive: US warns hidden radios may be embedded in solar-powered highway infrastructure (Reuters)

Mythical Beasts: Diving into the depths of the global spyware market (Atlantic Council)

Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance (SecurityWeek)

DDoS defender targeted in 1.5 Bpps denial-of-service attack (Bleeping Computer)

The Software Engineers Paid to Fix Vibe Coded Messes (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The House passes a defense policy bill that includes new provisions on cybersecurity and artificial intelligence. Senator Wyden accuses Microsoft of “gross cybersecurity negligence” after a 2024 ransomware attack crippled healthcare giant Ascension. The White House shelves plans to split U.S. Cyber Command and the NSA. The Pentagon finalizes its long-awaited Cybersecurity Maturity Model Certification (CMMC 2.0) rule. Akira ransomware group targets SonicWall devices. Officials warn solar-powered highway infrastructure should be checked for hidden radios. The Atlantic Council maps the global spyware market. Researchers uncover serious flaws in Apple’s AirPlay. A European DDoS mitigation provider thwarts a record-breaking attack. My Caveat cohosts Ethan Cook and Ben Yelin unpack the cyber elements of the Big Beautiful Bill. Who fixes the vibe code?<strong> </strong></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we have <a href="https://www.linkedin.com/in/ethan-cook-766a24138/"><u>Ethan Cook</u></a> joining <a href="https://thecyberwire.com/podcasts/caveat"><u>Caveat</u></a> hosts <a href="https://www.linkedin.com/in/dave-bittner-27231a4/"><u>Dave Bittner</u></a> and <a href="https://www.linkedin.com/in/benjamin-yelin-5b14114b/"><u>Ben Yelin</u></a> for this month’s <a href="https://thecyberwire.com/podcasts/caveat/277/notes"><u>Policy Deep Dive</u></a>. Together, they unpack HR1, the “Big Beautiful Bill”, and how its investments in technology, supply chain security, and defensive resiliency reflect the Trump administration’s push for long-term technological dominance. If you want to hear the full conversation, head over to Caveat.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/house-passes-defense-policy-bill-ai-cyber"><u>House moves ahead with defense bill that includes AI, cyber provisions</u></a> (The Record)</p>
<p><a href="https://therecord.media/ascension-ransomware-attack-wyden-seeks-ftc-microsoft-investigation"><u>FTC should investigate Microsoft after Ascension ransomware attack, senator says</u></a> (The Record)</p>
<p><a href="https://therecord.media/cyber-command-nsa-dual-hat-single-leader-trump-administration"><u>Cyber Command, NSA to remain under single leader as officials shelve plan to end 'dual hat'</u></a> (The Record)</p>
<p><a href="https://www.govinfosecurity.com/pentagon-releases-long-awaited-contractor-cybersecurity-rule-a-29413"><u>Pentagon Releases Long-Awaited Contractor Cybersecurity Rule</u></a> (GovInfo Security)</p>
<p><a href="https://www.rapid7.com/blog/post/dr-akira-ransomware-group-utilizing-sonicwall-devices-for-initial-access/"><u>Akira Ransomware Group Utilizing SonicWall Devices for Initial Access</u></a> (Rapid7)</p>
<p><a href="https://www.reuters.com/legal/government/us-warns-hidden-radios-may-be-embedded-solar-powered-highway-infrastructure-2025-09-10/"><u>Exclusive: US warns hidden radios may be embedded in solar-powered highway infrastructure</u></a> (Reuters)</p>
<p><a href="https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/mythical-beasts-diving-into-the-depths-of-the-global-spyware-market/"><u>Mythical Beasts: Diving into the depths of the global spyware market</u></a> (Atlantic Council)</p>
<p><a href="https://www.securityweek.com/remote-carplay-hack-puts-drivers-at-risk-of-distraction-and-surveillance/"><u>Remote CarPlay Hack Puts Drivers at Risk of Distraction and Surveillance</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/ddos-defender-targeted-in-15-bpps-denial-of-service-attack/"><u>DDoS defender targeted in 1.5 Bpps denial-of-service attack</u></a> (Bleeping Computer)</p>
<p><a href="https://www.404media.co/the-software-engineers-paid-to-fix-vibe-coded-messes/"><u>The Software Engineers Paid to Fix Vibe Coded Messes</u></a> (404 Media)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1532</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cdf82fcc-1c7a-11f0-85e0-cffc4ee64a74]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7904258389.mp3?updated=1757610696" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>86 reasons to update.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2389/notes</link>
      <description>Patch Tuesday. A data leak sheds light on North Korean APT Kimsuky. Apple introduces Memory Integrity Enforcement. Ransomware payments have dropped sharply in the education sector in 2025. A top NCS official warns ICS security lags behind, and a senator calls U.S. cybersecurity a “hellscape”. A Ukrainian national faces federal charges and an $11 million bounty for allegedly running multiple ransomware operations. Our guest is Jake Braun sharing the latest on Project Franklin. WhoFi makes WiFi a new spy.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Jake Braun, longtime DEF CON organizer, former White House official, and lead on DEF CON Franklin, sharing the latest on Project Franklin.

Selected Reading

Two Zero-Days Among Patch Tuesday CVEs This Month (Infosecurity Magazine)

Fortinet, Ivanti, Nvidia Release Security Updates (SecurityWeek)

ICS Patch Tuesday: Rockwell Automation Leads With 8 Security Advisories (SecurityWeek)

SAP 'wins' Patch Tuesday with worse flaws than Microsoft  (The Register)

Adobe Patches Critical ColdFusion and Commerce Vulnerabilities (SecurityWeek)

Data leak sheds light on Kimsuky operations (SC Media)

Apple Unveils iPhone Memory Protections to Combat Sophisticated Attacks (SecurityWeek)

Learn about ChillyHell, a modular Mac backdoor (jamf)

Ransomware Payments Plummet in Education Amid Enhanced Resiliency (Infosecurity Magazine)

Critical infrastructure security tech needs to be as good as our smartphones, top NSC cyber official says (CyberScoop)

Sen. King: Cyber domain is a ‘hellscape’ that will be made worse by cuts (The Record)

US indicts alleged ransomware boss tied to $18B in damages (The Register)Jeremy Clarkson's pub has been 'swindled' out of £27,000 by hackers (Manchester Evening News)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 10 Sep 2025 20:10:00 -0000</pubDate>
      <itunes:title>86 reasons to update.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2389</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Patch Tuesday. A data leak sheds light on North Korean APT Kimsuky. Apple introduces Memory Integrity Enforcement. Ransomware payments have dropped sharply in the education sector in 2025. A top NCS official warns ICS security lags behind, and a senator calls U.S. cybersecurity a “hellscape”. A Ukrainian national faces federal charges and an $11 million bounty for allegedly running multiple ransomware operations. Our guest is Jake Braun sharing the latest on Project Franklin. WhoFi makes WiFi a new spy.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Jake Braun, longtime DEF CON organizer, former White House official, and lead on DEF CON Franklin, sharing the latest on Project Franklin.

Selected Reading

Two Zero-Days Among Patch Tuesday CVEs This Month (Infosecurity Magazine)

Fortinet, Ivanti, Nvidia Release Security Updates (SecurityWeek)

ICS Patch Tuesday: Rockwell Automation Leads With 8 Security Advisories (SecurityWeek)

SAP 'wins' Patch Tuesday with worse flaws than Microsoft  (The Register)

Adobe Patches Critical ColdFusion and Commerce Vulnerabilities (SecurityWeek)

Data leak sheds light on Kimsuky operations (SC Media)

Apple Unveils iPhone Memory Protections to Combat Sophisticated Attacks (SecurityWeek)

Learn about ChillyHell, a modular Mac backdoor (jamf)

Ransomware Payments Plummet in Education Amid Enhanced Resiliency (Infosecurity Magazine)

Critical infrastructure security tech needs to be as good as our smartphones, top NSC cyber official says (CyberScoop)

Sen. King: Cyber domain is a ‘hellscape’ that will be made worse by cuts (The Record)

US indicts alleged ransomware boss tied to $18B in damages (The Register)Jeremy Clarkson's pub has been 'swindled' out of £27,000 by hackers (Manchester Evening News)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Patch Tuesday. A data leak sheds light on North Korean APT Kimsuky. Apple introduces Memory Integrity Enforcement. Ransomware payments have dropped sharply in the education sector in 2025. A top NCS official warns ICS security lags behind, and a senator calls U.S. cybersecurity a “hellscape”. A Ukrainian national faces federal charges and an $11 million bounty for allegedly running multiple ransomware operations. Our guest is Jake Braun sharing the latest on Project Franklin. WhoFi makes WiFi a new spy.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/jake-braun-77372539/"><u>Jake Braun</u></a>, longtime DEF CON organizer, former White House official, and lead on DEF CON Franklin, sharing the latest on <a href="https://defconfranklin.com/"><u>Project Franklin</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.infosecurity-magazine.com/news/two-zero-days-patch-tuesday-cves/"><u>Two Zero-Days Among Patch Tuesday CVEs This Month</u> </a>(Infosecurity Magazine)</p>
<p><a href="https://www.securityweek.com/fortinet-ivanti-nvidia-release-security-updates/"><u>Fortinet, Ivanti, Nvidia Release Security Updates</u> </a>(SecurityWeek)</p>
<p><a href="https://www.securityweek.com/ics-patch-tuesday-rockwell-automation-leads-with-8-security-advisories/"><u>ICS Patch Tuesday: Rockwell Automation Leads With 8 Security Advisories</u></a> (SecurityWeek)</p>
<p><a href="https://www.theregister.com/2025/09/10/microsoft_patch_tuesday/"><u>SAP 'wins' Patch Tuesday with worse flaws than Microsoft </u></a> (The Register)</p>
<p><a href="https://www.securityweek.com/adobe-patches-critical-coldfusion-and-commerce-vulnerabilities/"><u>Adobe Patches Critical ColdFusion and Commerce Vulnerabilities</u></a> (SecurityWeek)</p>
<p><a href="https://www.scworld.com/brief/data-leak-sheds-light-on-kimsuky-operations"><u>Data leak sheds light on Kimsuky operations</u></a> (SC Media)</p>
<p><a href="https://www.securityweek.com/apple-unveils-iphone-memory-protections-to-combat-sophisticated-attacks/"><u>Apple Unveils iPhone Memory Protections to Combat Sophisticated Attacks</u></a> (SecurityWeek)</p>
<p><a href="https://www.jamf.com/blog/chillyhell-a-modular-macos-backdoor/"><u>Learn about ChillyHell, a modular Mac backdoor</u></a> (jamf)</p>
<p><a href="https://www.infosecurity-magazine.com/news/ransomware-payments-plummet/"><u>Ransomware Payments Plummet in Education Amid Enhanced Resiliency</u></a> (Infosecurity Magazine)</p>
<p><a href="https://cyberscoop.com/alexei-bulazel-critical-infrastructure-security-tech-needs-to-be-as-good-as-our-smartphones/"><u>Critical infrastructure security tech needs to be as good as our smartphones, top NSC cyber official says</u> </a>(CyberScoop)</p>
<p><a href="https://therecord.media/angus-king-cyber-domain-cuts-cisa"><u>Sen. King: Cyber domain is a ‘hellscape’ that will be made worse by cuts</u></a> (The Record)</p>
<p><a href="https://www.theregister.com/2025/09/10/us_nefilim_ransomware_indictment/"><u>US indicts alleged ransomware boss tied to $18B in damages </u></a>(The Register)<br><a href="https://www.manchestereveningnews.co.uk/news/showbiz-news/jeremy-clarkson-pub-hackers-cotswolds-32433280"><u>Jeremy Clarkson's pub has been 'swindled' out of £27,000 by hackers</u></a> (Manchester Evening News)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1679</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cdca9cc4-1c7a-11f0-85e0-c3b583161176]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7228167565.mp3?updated=1757525200" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chalk one up for defenders.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2388/notes</link>
      <description>The open source community heads off a major npm supply chain attack. The Treasury Department sanctions cyber scam centers in Myanmar and Cambodia. Scammers abuse iCloud Calendar invites to send callback phishing emails. Researchers discover a new malware variant exploiting exposed Docker APIs. Phishing attacks abuse the Axios user agent and Microsoft’s Direct Send feature. Plex warns users of a data breach.  Researchers flag a surge in scans targeting Cisco ASA devices. CISA delays finalizing its incident reporting rule. The GAO says federal cyber workforce figures are incomplete and unreliable. Our guest is Kevin Magee, Global Director of Cybersecurity Startups at Microsoft Security, discussing cybersecurity education going back to school. AI earns its own Darwin awards. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Kevin Magee, Global Director of Cybersecurity Startups at Microsoft Security discussing cybersecurity education going back to school.

Selected Reading

Hackers hijack npm packages with 2 billion weekly downloads in supply chain attack (Bleeping Computer)

Open Source Community Thwarts Massive npm Supply Chain Attack (Infosecurity Magazine)

US sanctions companies behind cyber scam centers in Cambodia, Myanmar (The Record)

New Apple Warning, This iCloud Calendar Invite Is Actually An Attack (Forbes)

New Docker Malware Strain Spotted Blocking Rivals on Exposed APIs (HackRead)

Axios User Agent Helps Automate Phishing on “Unprecedented Scale” (Infosecurity Magazine)

Plex Urges Password Resets Following Data Breach (SecurityWeek)

Surge in networks scans targeting Cisco ASA devices raise concerns (Bleeping Computer)

CISA pushes final cyber incident reporting rule to May 2026 (CyberScoop)

US government lacks clarity into its infosec workforce (The Register)

AI Darwin Awards launch to celebrate spectacularly bad deployments (The Register) 

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Sep 2025 20:10:00 -0000</pubDate>
      <itunes:title>Chalk one up for defenders.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2388</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The open source community heads off a major npm supply chain attack. The Treasury Department sanctions cyber scam centers in Myanmar and Cambodia. Scammers abuse iCloud Calendar invites to send callback phishing emails. Researchers discover a new malware variant exploiting exposed Docker APIs. Phishing attacks abuse the Axios user agent and Microsoft’s Direct Send feature. Plex warns users of a data breach.  Researchers flag a surge in scans targeting Cisco ASA devices. CISA delays finalizing its incident reporting rule. The GAO says federal cyber workforce figures are incomplete and unreliable. Our guest is Kevin Magee, Global Director of Cybersecurity Startups at Microsoft Security, discussing cybersecurity education going back to school. AI earns its own Darwin awards. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Kevin Magee, Global Director of Cybersecurity Startups at Microsoft Security discussing cybersecurity education going back to school.

Selected Reading

Hackers hijack npm packages with 2 billion weekly downloads in supply chain attack (Bleeping Computer)

Open Source Community Thwarts Massive npm Supply Chain Attack (Infosecurity Magazine)

US sanctions companies behind cyber scam centers in Cambodia, Myanmar (The Record)

New Apple Warning, This iCloud Calendar Invite Is Actually An Attack (Forbes)

New Docker Malware Strain Spotted Blocking Rivals on Exposed APIs (HackRead)

Axios User Agent Helps Automate Phishing on “Unprecedented Scale” (Infosecurity Magazine)

Plex Urges Password Resets Following Data Breach (SecurityWeek)

Surge in networks scans targeting Cisco ASA devices raise concerns (Bleeping Computer)

CISA pushes final cyber incident reporting rule to May 2026 (CyberScoop)

US government lacks clarity into its infosec workforce (The Register)

AI Darwin Awards launch to celebrate spectacularly bad deployments (The Register) 

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The open source community heads off a major npm supply chain attack. The Treasury Department sanctions cyber scam centers in Myanmar and Cambodia. Scammers abuse iCloud Calendar invites to send callback phishing emails. Researchers discover a new malware variant exploiting exposed Docker APIs. Phishing attacks abuse the Axios user agent and Microsoft’s Direct Send feature. Plex warns users of a data breach.  Researchers flag a surge in scans targeting Cisco ASA devices. CISA delays finalizing its incident reporting rule. The GAO says federal cyber workforce figures are incomplete and unreliable. Our guest is Kevin Magee, Global Director of Cybersecurity Startups at Microsoft Security, discussing cybersecurity education going back to school. AI earns its own Darwin awards.<strong> </strong></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/kmagee/"><u>Kevin Magee</u></a>, Global Director of Cybersecurity Startups at <a href="https://www.linkedin.com/company/microsoft/"><u>Microsoft Security</u></a> discussing cybersecurity education going back to school.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/hackers-hijack-npm-packages-with-2-billion-weekly-downloads-in-supply-chain-attack/"><u>Hackers hijack npm packages with 2 billion weekly downloads in supply chain attack</u></a> (Bleeping Computer)</p>
<p><a href="https://www.infosecurity-magazine.com/news/npm-supply-chain-attack-averted/"><u>Open Source Community Thwarts Massive npm Supply Chain Attack</u></a> (Infosecurity Magazine)</p>
<p><a href="https://therecord.media/us-sanctions-companies-southeast-asia-scam-compounds"><u>US sanctions companies behind cyber scam centers in Cambodia, Myanmar</u></a> (The Record)</p>
<p><a href="https://www.forbes.com/sites/kateoflahertyuk/2025/09/08/new-apple-warning-this-icloud-calendar-invite-is-actually-an-attack/"><u>New Apple Warning, This iCloud Calendar Invite Is Actually An Attack</u></a> (Forbes)</p>
<p><a href="https://hackread.com/new-docker-malware-blocking-rivals-exposed-apis/"><u>New Docker Malware Strain Spotted Blocking Rivals on Exposed APIs</u></a> (HackRead)</p>
<p><a href="https://www.infosecurity-magazine.com/news/axios-user-agent-automate-phishing/"><u>Axios User Agent Helps Automate Phishing on “Unprecedented Scale”</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.securityweek.com/plex-urges-password-resets-following-data-breach/"><u>Plex Urges Password Resets Following Data Breach</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/surge-in-networks-scans-targeting-cisco-asa-devices-raise-concerns/"><u>Surge in networks scans targeting Cisco ASA devices raise concerns</u></a> (Bleeping Computer)</p>
<p><a href="https://cyberscoop.com/cisa-pushes-final-cyber-incident-reporting-rule-to-may-2026/"><u>CISA pushes final cyber incident reporting rule to May 2026</u></a> (CyberScoop)</p>
<p><a href="https://www.theregister.com/2025/09/08/us_govt_lacks_clarity_infosec_workforce/"><u>US government lacks clarity into its infosec workforce</u></a> (The Register)</p>
<p><a href="https://www.theregister.com/2025/09/09/ai_darwin_awards/"><u>AI Darwin Awards launch to celebrate spectacularly bad deployments</u></a> (The Register) </p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1580</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cd9cb73c-1c7a-11f0-85e0-83b76d7ceaf4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2791475119.mp3?updated=1757438948" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Big tech, bigger fines.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2387/notes</link>
      <description>The EU fines Google $3.5 billion over adtech abuses. Cloudflare blocks record-breaking Distributed Denial of Service (DDoS) attacks. The Salesforce-Salesloft breach began months earlier with GitHub access. Researchers say the new TAG-150 cybercriminal group has been active since March. Hackers use stolen secrets to leak more than 6,700 Nx private repositories. Subsea cable outages disrupt internet connectivity across India, Pakistan, and parts of the UAE. Monday Business Breakdown. On our Industry Voices segment Todd Moore, Global Vice President, Data Security at Thales, unpacks the perils of insider risk. Hackers claim Burger King’s security flaws are a real whopper.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Industry Voices

On our Industry Voices segment, we are joined by ⁠Todd Moore⁠, Global Vice President, Data Security at ⁠Thales⁠, discussing the biggest threat to your data has a badge, a password, and years of goodwill. Check out Todd's full conversation here. You can learn more about monitoring unstructured data at scale  and enabling security teams to leverage AI &amp; ML technologies from Thales. 

Selected Reading

EU fines Google $3.5 billion for anti-competitive ad practices (Bleeping Computer)

Cloudflare blocks massive 11.5 Tbps DDoS attack (SDxCentral)

Salesloft GitHub Account Compromised Months Before Salesforce Attack (SecurityWeek)

From CastleLoader to CastleRAT: TAG-150 Advances Operations with Multi-Tiered Infrastructure (Recorded Future)

Over 6,700 Private Repositories Made Public in Nx Supply Chain Attack (SecurityWeek)

Red Sea cable cuts disrupt internet across Asia and the Middle East (Reuters)

⁠N2K Pro Business Briefing update⁠ (N2K Networks)

Burger King hacked, attackers 'impressed by the commitment to terrible security practices' — systems described as 'solid as a paper Whopper wrapper in the rain,’ other RBI brands like Tim Hortons and Popeyes also vulnerable (Tom’s Hardware)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 08 Sep 2025 20:10:00 -0000</pubDate>
      <itunes:title>Big tech, bigger fines.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2387</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The EU fines Google $3.5 billion over adtech abuses. Cloudflare blocks record-breaking Distributed Denial of Service (DDoS) attacks. The Salesforce-Salesloft breach began months earlier with GitHub access. Researchers say the new TAG-150 cybercriminal group has been active since March. Hackers use stolen secrets to leak more than 6,700 Nx private repositories. Subsea cable outages disrupt internet connectivity across India, Pakistan, and parts of the UAE. Monday Business Breakdown. On our Industry Voices segment Todd Moore, Global Vice President, Data Security at Thales, unpacks the perils of insider risk. Hackers claim Burger King’s security flaws are a real whopper.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Industry Voices

On our Industry Voices segment, we are joined by ⁠Todd Moore⁠, Global Vice President, Data Security at ⁠Thales⁠, discussing the biggest threat to your data has a badge, a password, and years of goodwill. Check out Todd's full conversation here. You can learn more about monitoring unstructured data at scale  and enabling security teams to leverage AI &amp; ML technologies from Thales. 

Selected Reading

EU fines Google $3.5 billion for anti-competitive ad practices (Bleeping Computer)

Cloudflare blocks massive 11.5 Tbps DDoS attack (SDxCentral)

Salesloft GitHub Account Compromised Months Before Salesforce Attack (SecurityWeek)

From CastleLoader to CastleRAT: TAG-150 Advances Operations with Multi-Tiered Infrastructure (Recorded Future)

Over 6,700 Private Repositories Made Public in Nx Supply Chain Attack (SecurityWeek)

Red Sea cable cuts disrupt internet across Asia and the Middle East (Reuters)

⁠N2K Pro Business Briefing update⁠ (N2K Networks)

Burger King hacked, attackers 'impressed by the commitment to terrible security practices' — systems described as 'solid as a paper Whopper wrapper in the rain,’ other RBI brands like Tim Hortons and Popeyes also vulnerable (Tom’s Hardware)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The EU fines Google $3.5 billion over adtech abuses. Cloudflare blocks record-breaking Distributed Denial of Service (DDoS) attacks. The Salesforce-Salesloft breach began months earlier with GitHub access. Researchers say the new TAG-150 cybercriminal group has been active since March. Hackers use stolen secrets to leak more than 6,700 Nx private repositories. Subsea cable outages disrupt internet connectivity across India, Pakistan, and parts of the UAE. Monday Business Breakdown. On our Industry Voices segment Todd Moore, Global Vice President, Data Security at Thales, unpacks the perils of insider risk. Hackers claim Burger King’s security flaws are a real whopper.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Industry Voices</strong></p>
<p>On our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/todd-moore-a21a143/">⁠<u>Todd Moore</u>⁠</a>, Global Vice President, Data Security at <a href="https://www.linkedin.com/company/thales/">⁠<u>Thales</u>⁠</a>, discussing the biggest threat to your data has a badge, a password, and years of goodwill. Check out Todd's full conversation <a href="https://explore.thecyberwire.com/todd-moore">here</a>. You can learn more about <a>monitoring unstructured data at scale</a>  and <a href="https://cpl.thalesgroup.com/data-security/ai-cybersecurity-solutions?utm_source=cyberwire&amp;utm_medium=podcast&amp;utm_campaign=edl_us_cs_podcast_cyberwire_aw_traffic_na&amp;utm_content=edl_us_cs_podcast_cyberwire_aw_traffic_na_itdm_na_audio_interviewshownotes2_na">enabling security teams to leverage AI &amp; ML technologies</a> from Thales. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/google/eu-fines-google-35-billion-for-anti-competitive-ad-practices/"><u>EU fines Google $3.5 billion for anti-competitive ad practices</u></a> (Bleeping Computer)</p>
<p><a href="https://www.sdxcentral.com/news/cloudflare-blocks-massive-115-tbps-ddos-attack/"><u>Cloudflare blocks massive 11.5 Tbps DDoS attack</u></a> (SDxCentral)</p>
<p><a href="https://www.securityweek.com/salesloft-github-account-compromised-months-before-salesforce-attack/"><u>Salesloft GitHub Account Compromised Months Before Salesforce Attack</u></a> (SecurityWeek)</p>
<p><a href="https://www.recordedfuture.com/research/from-castleloader-to-castlerat-tag-150-advances-operations"><u>From CastleLoader to CastleRAT: TAG-150 Advances Operations with Multi-Tiered Infrastructure</u></a> (Recorded Future)</p>
<p><a href="https://www.securityweek.com/over-6700-private-repositories-made-public-in-nx-supply-chain-attack/"><u>Over 6,700 Private Repositories Made Public in Nx Supply Chain Attack</u></a> (SecurityWeek)</p>
<p><a href="https://www.reuters.com/world/middle-east/red-sea-cable-cuts-disrupt-internet-across-asia-middle-east-2025-09-06/"><u>Red Sea cable cuts disrupt internet across Asia and the Middle East</u></a> (Reuters)</p>
<p>⁠<a href="https://thecyberwire.com/newsletters/business-briefing/7/35"><u>N2K Pro Business Briefing update</u></a>⁠ (N2K Networks)</p>
<p><a href="https://www.tomshardware.com/tech-industry/cyber-security/burger-king-hacked-digital-platform-as-solid-as-a-paper-whopper-wrapper-in-the-rain-easy-security-bypass-exploited-catastrophic-vulnerabilities-also-worked-on-other-rbi-brands-like-tim-hortons-and-popeyes"><u>Burger King hacked, attackers 'impressed by the commitment to terrible security practices' — systems described as 'solid as a paper Whopper wrapper in the rain,’ other RBI brands like Tim Hortons and Popeyes also vulnerable</u></a> (Tom’s Hardware)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1806</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cd6e4c80-1c7a-11f0-85e0-bbb83381d61e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8986542381.mp3?updated=1757356566" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Andrew Maloney: Never-ending thirst for knowledge. [COO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/84/notes</link>
      <description>Please enjoy this encore of Career Notes. 

COO and Co-Founder of Query. AI, Andrew Maloney, shares how the building blocks he learned in the military helped him get where he is today. Coming from a blue collar family with a minimal knowledge of computers, Andrew went into computer operations in the Air Force. While deployed to Oman just after the start of the Iraq War, Andrew said he got his break into security. That's where he learned the components that fit together in order to effectively secure an environment. Andrew's words of wisdom: You've got to keep pushing and you've got to believe in yourself and never sell yourself short. We thank Andrew for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 07 Sep 2025 07:00:00 -0000</pubDate>
      <itunes:title>Andrew Maloney: Never-ending thirst for knowledge. [COO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>84</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/362a4408-8a81-11f0-857b-c3047ba935f4/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

COO and Co-Founder of Query. AI, Andrew Maloney, shares how the building blocks he learned in the military helped him get where he is today. Coming from a blue collar family with a minimal knowledge of computers, Andrew went into computer operations in the Air Force. While deployed to Oman just after the start of the Iraq War, Andrew said he got his break into security. That's where he learned the components that fit together in order to effectively secure an environment. Andrew's words of wisdom: You've got to keep pushing and you've got to believe in yourself and never sell yourself short. We thank Andrew for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>COO and Co-Founder of Query. AI, Andrew Maloney, shares how the building blocks he learned in the military helped him get where he is today. Coming from a blue collar family with a minimal knowledge of computers, Andrew went into computer operations in the Air Force. While deployed to Oman just after the start of the Iraq War, Andrew said he got his break into security. That's where he learned the components that fit together in order to effectively secure an environment. Andrew's words of wisdom: You've got to keep pushing and you've got to believe in yourself and never sell yourself short. We thank Andrew for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>575</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[362a4408-8a81-11f0-857b-c3047ba935f4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3091663387.mp3?updated=1735936616" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Don’t trust that app! [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/392/notes</link>
      <description>Today we are joined by Selena Larson, co-host of Only Malware in the Building and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at Proofpoint, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth apps to impersonate services like Adobe, DocuSign, and SharePoint, stealing credentials and bypassing MFA via attacker-in-the-middle phishing kits, mainly Tycoon. 

These attacks redirect users to fake Microsoft login pages to capture credentials, 2FA tokens, and session cookies, targeting nearly 3,000 Microsoft 365 accounts across 900 environments in 2025. Microsoft’s upcoming security changes and strengthened email, cloud, and web defenses, along with user education, are recommended to reduce these risks.

The research can be found here:


  
⁠Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Sep 2025 07:00:00 -0000</pubDate>
      <itunes:title>Don’t trust that app! [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>392</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/54e8def8-8a78-11f0-95b3-17d65f25daeb/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Today we are joined by Selena Larson, co-host of Only Malware in the Building and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at Proofpoint, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth apps to impersonate services like Adobe, DocuSign, and SharePoint, stealing credentials and bypassing MFA via attacker-in-the-middle phishing kits, mainly Tycoon. 

These attacks redirect users to fake Microsoft login pages to capture credentials, 2FA tokens, and session cookies, targeting nearly 3,000 Microsoft 365 accounts across 900 environments in 2025. Microsoft’s upcoming security changes and strengthened email, cloud, and web defenses, along with user education, are recommended to reduce these risks.

The research can be found here:


  
⁠Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we are joined by <a href="https://www.linkedin.com/in/selenalarson/">Selena Larson</a>, co-host of <a href="https://thecyberwire.com/podcasts/only-malware-in-the-building">Only Malware in the Building</a> and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at <a href="https://www.proofpoint.com/us">Proofpoint</a>, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth apps to impersonate services like Adobe, DocuSign, and SharePoint, stealing credentials and bypassing MFA via attacker-in-the-middle phishing kits, mainly Tycoon. </p>
<p>These attacks redirect users to fake Microsoft login pages to capture credentials, 2FA tokens, and session cookies, targeting nearly 3,000 Microsoft 365 accounts across 900 environments in 2025. Microsoft’s upcoming security changes and strengthened email, cloud, and web defenses, along with user education, are recommended to reduce these risks.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://www.huntress.com/blog/exploitation-of-sonicwall-vpn">⁠</a><a href="https://www.proofpoint.com/us/blog/threat-insight/microsoft-oauth-app-impersonation-campaign-leads-mfa-phishing">Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1241</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[54e8def8-8a78-11f0-95b3-17d65f25daeb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8564769446.mp3?updated=1757090856" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Wheels left spinning after cyber incident. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2386/notes</link>
      <description>A cyberattack disrupts Bridgestone’s manufacturing operations. CISA warns of critical vulnerabilities in products used across multiple sectors. Additional cybersecurity firms confirm data exposure in the recent Salesforce–Salesloft Drift attack. A configuration vulnerability in Sitecore products leads to remote code execution. HHS promises stricter enforcement of healthcare information access rules. Texas sues an education software provider over a December 2024 data breach. A federal jury orders Google to pay $425 million over improperly collected user data. Nations unite for global guidance on SBOMs. On our Industry Voices segment, we are joined by Aron Anderson, Enterprise Security Manager of Adobe, on embracing the journey to zero trust. Chess.com gets caught in a tricky gambit.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Industry Voices

On our Industry Voices segment we are joined by  Aron Anderson, Enterprise Security Manager of Adobe, as he is talking about embracing the journey to zero trust. If you want to hear the full conversation from Aron, you can check it out here.

Selected Reading

Tire giant Bridgestone confirms cyberattack impacts manufacturing (Bleeping Computer)

CISA issues ICS advisories on hardware flaws in Honeywell, Mitsubishi Electric, Delta Electronics, rail communication protocols (Industrial Cyber)

More Cybersecurity Firms Hit by Salesforce-Salesloft Drift Breach (SecurityWeek)

Unknown miscreants snooping around Sitecore via sample keys (The Register)

HHS Says It's 'Cracking Down' on Health Information Blocking (BankInfo Security)

Texas sues PowerSchool over breach exposing 62M students, 880k Texans (Bleeping Computer)

Google hit with $425 million verdict in privacy class action suit (The Record)

US and 14 Allies Release Joint Guidance on Software Bill of Materials (Infosecurity Magazine)

Chess.com says 4,500 people had data stolen during June breach  (The Record)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 05 Sep 2025 20:10:00 -0000</pubDate>
      <itunes:title>Wheels left spinning after cyber incident. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2386</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A cyberattack disrupts Bridgestone’s manufacturing operations. CISA warns of critical vulnerabilities in products used across multiple sectors. Additional cybersecurity firms confirm data exposure in the recent Salesforce–Salesloft Drift attack. A configuration vulnerability in Sitecore products leads to remote code execution. HHS promises stricter enforcement of healthcare information access rules. Texas sues an education software provider over a December 2024 data breach. A federal jury orders Google to pay $425 million over improperly collected user data. Nations unite for global guidance on SBOMs. On our Industry Voices segment, we are joined by Aron Anderson, Enterprise Security Manager of Adobe, on embracing the journey to zero trust. Chess.com gets caught in a tricky gambit.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Industry Voices

On our Industry Voices segment we are joined by  Aron Anderson, Enterprise Security Manager of Adobe, as he is talking about embracing the journey to zero trust. If you want to hear the full conversation from Aron, you can check it out here.

Selected Reading

Tire giant Bridgestone confirms cyberattack impacts manufacturing (Bleeping Computer)

CISA issues ICS advisories on hardware flaws in Honeywell, Mitsubishi Electric, Delta Electronics, rail communication protocols (Industrial Cyber)

More Cybersecurity Firms Hit by Salesforce-Salesloft Drift Breach (SecurityWeek)

Unknown miscreants snooping around Sitecore via sample keys (The Register)

HHS Says It's 'Cracking Down' on Health Information Blocking (BankInfo Security)

Texas sues PowerSchool over breach exposing 62M students, 880k Texans (Bleeping Computer)

Google hit with $425 million verdict in privacy class action suit (The Record)

US and 14 Allies Release Joint Guidance on Software Bill of Materials (Infosecurity Magazine)

Chess.com says 4,500 people had data stolen during June breach  (The Record)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cyberattack disrupts Bridgestone’s manufacturing operations. CISA warns of critical vulnerabilities in products used across multiple sectors. Additional cybersecurity firms confirm data exposure in the recent Salesforce–Salesloft Drift attack. A configuration vulnerability in Sitecore products leads to remote code execution. HHS promises stricter enforcement of healthcare information access rules. Texas sues an education software provider over a December 2024 data breach. A federal jury orders Google to pay $425 million over improperly collected user data. Nations unite for global guidance on SBOMs. On our Industry Voices segment, we are joined by Aron Anderson, Enterprise Security Manager of Adobe, on embracing the journey to zero trust. <a href="http://chess.com"><u>Chess.com</u></a> gets caught in a tricky gambit.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Industry Voices</strong></p>
<p>On our Industry Voices segment we are joined by  <a href="https://www.linkedin.com/in/aron-anderson-infosec/"><u>Aron Anderson</u></a>, Enterprise Security Manager of <a href="https://www.linkedin.com/company/adobe/"><u>Adobe</u></a>, as he is talking about embracing the journey to zero trust. If you want to hear the full conversation from Aron, you can check it out <a href="https://explore.thecyberwire.com/aron-anderson">here</a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/tire-giant-bridgestone-confirms-cyberattack-impacts-manufacturing/"><u>Tire giant Bridgestone confirms cyberattack impacts manufacturing</u></a> (Bleeping Computer)</p>
<p><a href="https://industrialcyber.co/cisa/cisa-issues-ics-advisories-on-hardware-flaws-in-honeywell-mitsubishi-electric-delta-electronics-rail-communication-protocols/"><u>CISA issues ICS advisories on hardware flaws in Honeywell, Mitsubishi Electric, Delta Electronics, rail communication protocols</u></a> (Industrial Cyber)</p>
<p><a href="https://www.securityweek.com/more-cybersecurity-firms-hit-by-salesforce-salesloft-drift-breach/"><u>More Cybersecurity Firms Hit by Salesforce-Salesloft Drift Breach</u></a> (SecurityWeek)</p>
<p><a href="https://www.theregister.com/2025/09/04/unknown_miscreants_snooping_around_sitecore/"><u>Unknown miscreants snooping around Sitecore via sample keys</u> </a>(The Register)</p>
<p><a href="https://www.bankinfosecurity.com/hhs-says-its-cracking-down-on-health-information-blocking-a-29368"><u>HHS Says It's 'Cracking Down' on Health Information Blocking</u></a> (BankInfo Security)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/texas-sues-powerschool-after-massive-data-breach-hit-62-million-students/"><u>Texas sues PowerSchool over breach exposing 62M students, 880k Texans</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/google-hit-with-425-million-privacy-class-action-verdict"><u>Google hit with $425 million verdict in privacy class action suit</u></a> (The Record)</p>
<p><a href="https://www.infosecurity-magazine.com/news/us-allies-joint-guidance-sboms/"><u>US and 14 Allies Release Joint Guidance on Software Bill of Materials</u></a> (Infosecurity Magazine)</p>
<p><a href="https://therecord.media/chess-platform-data-breach-file-transfer-tool"><u>Chess.com says 4,500 people had data stolen during June breach</u></a>  (The Record)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1782</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cd44f7c2-1c7a-11f0-85e0-a71bead7d019]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8161057071.mp3?updated=1757092304" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>China’s cyberstorm goes global.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2385/notes</link>
      <description>Salt Typhoon marks China’s most ambitious campaign yet. A major Google outage hit Southeastern Europe.  A critical zero-day flaw in FreePBX gets patched. Scattered Lapsus$ Hunters claim the Jaguar Land Rover hack. Researchers uncover a major evolution in the XWorm backdoor campaign. GhostRedirector is a new China-aligned threat actor. CISA adds a pair of TP-Link router flaws to its Known Exploited Vulnerabilities (KEV) catalog. The feds put a $10 million bounty on three Russian FSB officers. Experts warn sweeping cuts to ODNI could cripple U.S. cyber defense. Our guest is Rick Kaun, Global Director of Cybersecurity Services at Rockwell Automation, discussing IT/OT convergence in securing critical water and wastewater systems. Google says rumors of Gmail’s breach are greatly exaggerated.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.CyberWire Guest

Today our guest is Rick Kaun, Global Director of Cybersecurity Services at Rockwell Automation, who is talking about "IT/OT Convergence for Critical Water &amp; Wastewater Security."

Selected Reading

‘Unrestrained’ Chinese Cyberattackers May Have Stolen Data From Almost Every American (The New York Times)

Google Down in Eastern Europe (UPDATED) (Novinite Sofia News Agency)

Sangoma Patches Critical Zero-Day Exploited to Hack FreePBX Servers (SecurityWeek)

M&amp;S hackers claim to be behind Jaguar Land Rover cyber attack (BBC)

XWorm’s Evolving Infection Chain: From Predictable to Deceptive (Trellix)

GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes (welivesecurity by ESET)

CISA Flags TP-Link Router Flaws CVE-2023-50224 and CVE-2025-9377 as Actively Exploited (The Cyber Security News) 

US offers $10 million bounty for info on Russian FSB hackers (Bleeping Computer)

Cutting Cyber Intelligence Undermines National Security (FDD)

No, Google did not warn 2.5 billion Gmail users to reset passwords (Bleeping Computer)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 04 Sep 2025 20:10:00 -0000</pubDate>
      <itunes:title>China’s cyberstorm goes global.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2385</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Salt Typhoon marks China’s most ambitious campaign yet. A major Google outage hit Southeastern Europe.  A critical zero-day flaw in FreePBX gets patched. Scattered Lapsus$ Hunters claim the Jaguar Land Rover hack. Researchers uncover a major evolution in the XWorm backdoor campaign. GhostRedirector is a new China-aligned threat actor. CISA adds a pair of TP-Link router flaws to its Known Exploited Vulnerabilities (KEV) catalog. The feds put a $10 million bounty on three Russian FSB officers. Experts warn sweeping cuts to ODNI could cripple U.S. cyber defense. Our guest is Rick Kaun, Global Director of Cybersecurity Services at Rockwell Automation, discussing IT/OT convergence in securing critical water and wastewater systems. Google says rumors of Gmail’s breach are greatly exaggerated.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.CyberWire Guest

Today our guest is Rick Kaun, Global Director of Cybersecurity Services at Rockwell Automation, who is talking about "IT/OT Convergence for Critical Water &amp; Wastewater Security."

Selected Reading

‘Unrestrained’ Chinese Cyberattackers May Have Stolen Data From Almost Every American (The New York Times)

Google Down in Eastern Europe (UPDATED) (Novinite Sofia News Agency)

Sangoma Patches Critical Zero-Day Exploited to Hack FreePBX Servers (SecurityWeek)

M&amp;S hackers claim to be behind Jaguar Land Rover cyber attack (BBC)

XWorm’s Evolving Infection Chain: From Predictable to Deceptive (Trellix)

GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes (welivesecurity by ESET)

CISA Flags TP-Link Router Flaws CVE-2023-50224 and CVE-2025-9377 as Actively Exploited (The Cyber Security News) 

US offers $10 million bounty for info on Russian FSB hackers (Bleeping Computer)

Cutting Cyber Intelligence Undermines National Security (FDD)

No, Google did not warn 2.5 billion Gmail users to reset passwords (Bleeping Computer)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Salt Typhoon marks China’s most ambitious campaign yet. A major Google outage hit Southeastern Europe.  A critical zero-day flaw in FreePBX gets patched. Scattered Lapsus$ Hunters claim the Jaguar Land Rover hack. Researchers uncover a major evolution in the XWorm backdoor campaign. GhostRedirector is a new China-aligned threat actor. CISA adds a pair of TP-Link router flaws to its Known Exploited Vulnerabilities (KEV) catalog. The feds put a $10 million bounty on three Russian FSB officers. Experts warn sweeping cuts to ODNI could cripple U.S. cyber defense. Our guest is Rick Kaun, Global Director of Cybersecurity Services at Rockwell Automation, discussing IT/OT convergence in securing critical water and wastewater systems. Google says rumors of Gmail’s breach are greatly exaggerated.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.<br><strong>CyberWire Guest</strong></p>
<p>Today our guest is <a href="https://www.linkedin.com/in/rickkaun/"><u>Rick Kaun</u></a>, Global Director of Cybersecurity Services at <a href="https://www.linkedin.com/company/rockwell-automation/"><u>Rockwell Automation</u></a>, who is talking about "IT/OT Convergence for Critical Water &amp; Wastewater Security."</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.nytimes.com/2025/09/04/world/asia/china-hack-salt-typhoon.html"><u>‘Unrestrained’ Chinese Cyberattackers May Have Stolen Data From Almost Every American</u></a> (The New York Times)</p>
<p><a href="https://www.novinite.com/articles/234225/Google+Down+in+Eastern+Europe+%28UPDATED%29"><u>Google Down in Eastern Europe (UPDATED)</u></a> (Novinite Sofia News Agency)</p>
<p><a href="https://www.securityweek.com/sangoma-patches-critical-zero-day-exploited-to-hack-freepbx-servers/"><u>Sangoma Patches Critical Zero-Day Exploited to Hack FreePBX Servers</u></a> (SecurityWeek)</p>
<p><a href="https://www.bbc.co.uk/news/articles/c4gqepe5355o"><u>M&amp;S hackers claim to be behind Jaguar Land Rover cyber attack</u></a> (BBC)</p>
<p><a href="https://www.trellix.com/blogs/research/xworms-evolving-infection-chain-from-predictable-to-deceptive/"><u>XWorm’s Evolving Infection Chain: From Predictable to Deceptive</u></a> (Trellix)</p>
<p><a href="https://www.welivesecurity.com/en/eset-research/ghostredirector-poisons-windows-servers-backdoors-side-potatoes/"><u>GhostRedirector poisons Windows servers: Backdoors with a side of Potatoes</u></a> (welivesecurity by ESET)</p>
<p><a href="https://thecybersecurity.news/general-cyber-security-news/cisa-flags-tp-link-router-flaws-cve-2023-50224-and-cve-2025-9377-as-actively-exploited-34215/"><u>CISA Flags TP-Link Router Flaws CVE-2023-50224 and CVE-2025-9377 as Actively Exploited</u></a> (The Cyber Security News) </p>
<p><a href="https://www.bleepingcomputer.com/news/security/us-offers-10-million-bounty-for-info-on-russian-fsb-hackers/"><u>US offers $10 million bounty for info on Russian FSB hackers</u></a> (Bleeping Computer)</p>
<p><a href="https://www.fdd.org/analysis/2025/09/03/cutting-cyber-intelligence-undermines-national-security/"><u>Cutting Cyber Intelligence Undermines National Security</u></a> (FDD)</p>
<p><a href="https://www.bleepingcomputer.com/news/technology/no-google-did-not-warn-25-billion-gmail-users-to-reset-passwords/"><u>No, Google did not warn 2.5 billion Gmail users to reset passwords</u></a> (Bleeping Computer)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1630</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cd1d2580-1c7a-11f0-85e0-ef4ddd44dd09]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6362482651.mp3?updated=1757013175" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware in the rearview.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2384/notes</link>
      <description>Jaguar Land Rover suffers a major cyberattack. ICE gains access to a powerful spyware tool. Researchers find Fancy Bear snuffling around a new Outlook backdoor. Cloudflare and Palo Alto Networks confirm compromised Salesforce data. A researcher discovers an unsecured Navy Federal Credit Union (NFCU) server. A new ClickFix scam spreads MetaStealer malware. Specialty healthcare providers struggle to protect sensitive patient data.  CISA appoints a new Executive Assistant Director for Cybersecurity. On Afternoon Cyber Tea, Ann Johnson and Harvard’s Amy Edmondson discuss how psychological safety helps cybersecurity teams speak up, spot risks, and learn from failure. Our guest today is Tim Starks from CyberScoop discussing China’s reliance on domestic firms for hacking. Hackers threaten to feed stolen art to the machines.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Afternoon Cyber Tea

On our Afternoon Cyber Tea segment, host Ann Johnson is joined by Amy Edmondson⁠, Harvard Business School professor and psychological safety pioneer. Together they discuss how creating psychologically safe environments allows teams, especially in high-pressure fields like cybersecurity, to speak up about early warnings, embrace the red, and learn from failure. You can listen to Ann and Amy's full conversation here and don't miss new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app.

CyberWire Guest

Our guest today is Tim Starks from CyberScoop discussing Top FBI official says Chinese reliance on domestic firms for hacking is a weakness.

Selected Reading

Jaguar Land Rover Operations ‘Severely Disrupted’ by Cyberattack (Security Week)

Ice obtains access to Israeli-made spyware that can hack phones and encrypted apps (The Guardian)

Russian APT28 Expands Arsenal with 'NotDoor' Outlook Backdoor (Infosecurity Magazine)

Cloudflare and Palo Alto Networks Victimized in Salesloft Drift Breach (Infosecurity Magazine)

Misconfigured Server Leaks 378GB of Navy Federal Credit Union Files (Hack Read)

Fake AnyDesk Installer Spreads MetaStealer Through ClickFix Scam (Hack Read)

Hacks on Specialty Health Entities Affect Nearly 900,000 (Bank Infosecurity)

Python-based infostealer ‘Inf0s3c’ combines stealth with broad data theft (SC Media)

CISA Names Nicholas Andersen as Executive Assistant Director for Cybersecurity (The Cyber Express)

Hackers Threaten to Submit Artists' Data to AI Models If Art Site Doesn't Pay Up (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 03 Sep 2025 20:10:00 -0000</pubDate>
      <itunes:title>Ransomware in the rearview.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2384</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Jaguar Land Rover suffers a major cyberattack. ICE gains access to a powerful spyware tool. Researchers find Fancy Bear snuffling around a new Outlook backdoor. Cloudflare and Palo Alto Networks confirm compromised Salesforce data. A researcher discovers an unsecured Navy Federal Credit Union (NFCU) server. A new ClickFix scam spreads MetaStealer malware. Specialty healthcare providers struggle to protect sensitive patient data.  CISA appoints a new Executive Assistant Director for Cybersecurity. On Afternoon Cyber Tea, Ann Johnson and Harvard’s Amy Edmondson discuss how psychological safety helps cybersecurity teams speak up, spot risks, and learn from failure. Our guest today is Tim Starks from CyberScoop discussing China’s reliance on domestic firms for hacking. Hackers threaten to feed stolen art to the machines.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Afternoon Cyber Tea

On our Afternoon Cyber Tea segment, host Ann Johnson is joined by Amy Edmondson⁠, Harvard Business School professor and psychological safety pioneer. Together they discuss how creating psychologically safe environments allows teams, especially in high-pressure fields like cybersecurity, to speak up about early warnings, embrace the red, and learn from failure. You can listen to Ann and Amy's full conversation here and don't miss new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app.

CyberWire Guest

Our guest today is Tim Starks from CyberScoop discussing Top FBI official says Chinese reliance on domestic firms for hacking is a weakness.

Selected Reading

Jaguar Land Rover Operations ‘Severely Disrupted’ by Cyberattack (Security Week)

Ice obtains access to Israeli-made spyware that can hack phones and encrypted apps (The Guardian)

Russian APT28 Expands Arsenal with 'NotDoor' Outlook Backdoor (Infosecurity Magazine)

Cloudflare and Palo Alto Networks Victimized in Salesloft Drift Breach (Infosecurity Magazine)

Misconfigured Server Leaks 378GB of Navy Federal Credit Union Files (Hack Read)

Fake AnyDesk Installer Spreads MetaStealer Through ClickFix Scam (Hack Read)

Hacks on Specialty Health Entities Affect Nearly 900,000 (Bank Infosecurity)

Python-based infostealer ‘Inf0s3c’ combines stealth with broad data theft (SC Media)

CISA Names Nicholas Andersen as Executive Assistant Director for Cybersecurity (The Cyber Express)

Hackers Threaten to Submit Artists' Data to AI Models If Art Site Doesn't Pay Up (404 Media)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jaguar Land Rover suffers a major cyberattack. ICE gains access to a powerful spyware tool. Researchers find Fancy Bear snuffling around a new Outlook backdoor. Cloudflare and Palo Alto Networks confirm compromised Salesforce data. A researcher discovers an unsecured Navy Federal Credit Union (NFCU) server. A new ClickFix scam spreads MetaStealer malware. Specialty healthcare providers struggle to protect sensitive patient data.  CISA appoints a new Executive Assistant Director for Cybersecurity. On <em>Afternoon Cyber Tea</em>, Ann Johnson and Harvard’s Amy Edmondson discuss how psychological safety helps cybersecurity teams speak up, spot risks, and learn from failure. Our guest today is Tim Starks from CyberScoop discussing China’s reliance on domestic firms for hacking. Hackers threaten to feed stolen art to the machines.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Afternoon Cyber Tea</strong></p>
<p>On our Afternoon Cyber Tea segment, host Ann Johnson is joined by<a href="https://www.linkedin.com/in/amycedmondson/?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAABt73UB9xjVc239C35nu4xpqxGdEStY1CE"><u> Amy Edmondson⁠</u></a>, Harvard Business School professor and psychological safety pioneer. Together they discuss how creating psychologically safe environments allows teams, especially in high-pressure fields like cybersecurity, to speak up about early warnings, embrace the red, and learn from failure. You can listen to Ann and Amy's<a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea/112/notes"><u> full conversation here</u></a> and don't miss new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Our guest today is <a href="https://www.linkedin.com/in/tstarks/"><u>Tim Stark</u></a>s from <a href="https://www.linkedin.com/company/cyberscoop/"><u>CyberScoop</u></a> discussing Top FBI official says Chinese reliance on domestic firms for hacking is a weakness.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.securityweek.com/jaguar-land-rover-operations-severely-disrupted-by-cyberattack/"><u>Jaguar Land Rover Operations ‘Severely Disrupted’ by Cyberattack</u></a> (Security Week)</p>
<p><a href="https://www.theguardian.com/us-news/2025/sep/02/trump-immigration-ice-israeli-spyware?CMP=Share_iOSApp_Other"><u>Ice obtains access to Israeli-made spyware that can hack phones and encrypted apps</u></a> (The Guardian)</p>
<p><a href="https://www.infosecurity-magazine.com/news/russia-apt28-notdoor-outlook/"><u>Russian APT28 Expands Arsenal with 'NotDoor' Outlook Backdoor</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.infosecurity-magazine.com/news/cloudflare-victimized-in-salesloft/"><u>Cloudflare and Palo Alto Networks Victimized in Salesloft Drift Breach</u></a> (Infosecurity Magazine)</p>
<p><a href="https://hackread.com/misconfigured-server-navy-federal-credit-union-data-leak/"><u>Misconfigured Server Leaks 378GB of Navy Federal Credit Union Files</u></a> (Hack Read)</p>
<p><a href="https://hackread.com/fake-anydesk-installer-metastealer-clickfix-scam/"><u>Fake AnyDesk Installer Spreads MetaStealer Through ClickFix Scam</u></a> (Hack Read)</p>
<p><a href="https://www.bankinfosecurity.com/hacks-on-specialty-health-entities-affect-nearly-900000-a-29349"><u>Hacks on Specialty Health Entities Affect Nearly 900,000</u></a> (Bank Infosecurity)</p>
<p><a href="https://www.scworld.com/news/python-based-infostealer-inf0s3c-combines-stealth-with-broad-data-theft"><u>Python-based infostealer ‘Inf0s3c’ combines stealth with broad data theft</u></a> (SC Media)</p>
<p><a href="https://thecyberexpress.com/cisa-appoint-nicholas-andersen-cybersecurity/"><u>CISA Names Nicholas Andersen as Executive Assistant Director for Cybersecurity</u></a> (The Cyber Express)</p>
<p><a href="https://www.404media.co/hackers-threaten-to-submit-artists-data-to-ai-models-if-art-site-doesnt-pay-up/"><u>Hackers Threaten to Submit Artists' Data to AI Models If Art Site Doesn't Pay Up</u></a> (404 Media)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1810</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ccf56040-1c7a-11f0-85e0-278244f8a77e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3324839873.mp3?updated=1756991097" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Blizzard warning: Amazon freezes midnight hack.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2383/notes</link>
      <description>Researchers disrupt a cyber campaign by Russia’s Midnight Blizzard. The Salesloft Drift breach continues to ripple outward. WhatsApp patches a critical flaw in its iOS and Mac apps. A fake PDF editing tool delivers the TamperChef infostealer. A hacker finds crash data Tesla claimed not to have. Spain cancels a €10 million contract with Huawei.  A fraudster bilks Baltimore for over  $1.5 million. We’ve got a breakdown of the latest Business news. In our Threat Vector  segment, ⁠Michael Sikorski⁠ and guest ⁠Thomas P. Bossert explore the path from policy and national security strategy to building operational cyber defense. We preview our spicy new episode of Only Malware in the Building.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.Threat Vector Segment

In our Threat Vector  segment, host David Moulton hands the mic over to ⁠Michael Sikorski⁠ and guest ⁠Thomas P. Bossert⁠, President of Trinity Cyber and former Homeland Security Advisor. They explore the path from policy and national security strategy to building operational cyber defense. Listen to the full conversation here and find new episodes of⁠ Threat Vector⁠ each Thursday on the N2K CyberWire network and in your favorite podcast app.CyberWire Guest

Today, our podcast producer Liz Stokes speaks with N2K Director of Enterprise Content Strategy Ma'ayan Plaut about our spicy new episode of Only Malware in the Building. You can find the audio version of Only Malware episode here, but we recommend you view the episode for added enjoyment!

Selected Reading

Amazon disrupts Russian APT29 hackers targeting Microsoft 365 (Bleeping Computer)

The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft (Krebs on Security)

Zscaler swiftly mitigates a security incident impacting Salesloft Drift (Zscaler)

WhatsApp fixes 'zero-click' bug used to hack Apple users with spyware (TechCrunch)

TamperedChef infostealer delivered through fraudulent PDF Editor (Bleeping Computer)

Heimdal Investigation: European Organizations Hit by PDF Editor Malware Campaign (Heimdal Security) 

Tesla said it didn’t have critical data in a fatal crash. Then a hacker found it. (The Washington Post)

Spanish government cancels €10m contract using Huawei equipment (The Record)

Scammer steals $1.5 million from Baltimore by spoofing city vendor (The Record)

N2K Pro Business Briefing update (N2K Networks) Taco Bell rethinks AI drive-through after man orders 18,000 waters (BBC)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Sep 2025 20:10:00 -0000</pubDate>
      <itunes:title>Blizzard warning: Amazon freezes midnight hack.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2383</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Researchers disrupt a cyber campaign by Russia’s Midnight Blizzard. The Salesloft Drift breach continues to ripple outward. WhatsApp patches a critical flaw in its iOS and Mac apps. A fake PDF editing tool delivers the TamperChef infostealer. A hacker finds crash data Tesla claimed not to have. Spain cancels a €10 million contract with Huawei.  A fraudster bilks Baltimore for over  $1.5 million. We’ve got a breakdown of the latest Business news. In our Threat Vector  segment, ⁠Michael Sikorski⁠ and guest ⁠Thomas P. Bossert explore the path from policy and national security strategy to building operational cyber defense. We preview our spicy new episode of Only Malware in the Building.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.Threat Vector Segment

In our Threat Vector  segment, host David Moulton hands the mic over to ⁠Michael Sikorski⁠ and guest ⁠Thomas P. Bossert⁠, President of Trinity Cyber and former Homeland Security Advisor. They explore the path from policy and national security strategy to building operational cyber defense. Listen to the full conversation here and find new episodes of⁠ Threat Vector⁠ each Thursday on the N2K CyberWire network and in your favorite podcast app.CyberWire Guest

Today, our podcast producer Liz Stokes speaks with N2K Director of Enterprise Content Strategy Ma'ayan Plaut about our spicy new episode of Only Malware in the Building. You can find the audio version of Only Malware episode here, but we recommend you view the episode for added enjoyment!

Selected Reading

Amazon disrupts Russian APT29 hackers targeting Microsoft 365 (Bleeping Computer)

The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft (Krebs on Security)

Zscaler swiftly mitigates a security incident impacting Salesloft Drift (Zscaler)

WhatsApp fixes 'zero-click' bug used to hack Apple users with spyware (TechCrunch)

TamperedChef infostealer delivered through fraudulent PDF Editor (Bleeping Computer)

Heimdal Investigation: European Organizations Hit by PDF Editor Malware Campaign (Heimdal Security) 

Tesla said it didn’t have critical data in a fatal crash. Then a hacker found it. (The Washington Post)

Spanish government cancels €10m contract using Huawei equipment (The Record)

Scammer steals $1.5 million from Baltimore by spoofing city vendor (The Record)

N2K Pro Business Briefing update (N2K Networks) Taco Bell rethinks AI drive-through after man orders 18,000 waters (BBC)

Share your feedback.

What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers disrupt a cyber campaign by Russia’s Midnight Blizzard. The Salesloft Drift breach continues to ripple outward. WhatsApp patches a critical flaw in its iOS and Mac apps. A fake PDF editing tool delivers the TamperChef infostealer. A hacker finds crash data Tesla claimed not to have. Spain cancels a €10 million contract with Huawei.  A fraudster bilks Baltimore for over  $1.5 million. We’ve got a breakdown of the latest Business news. In our Threat Vector  segment, ⁠Michael Sikorski⁠ and guest ⁠Thomas P. Bossert explore the path from policy and national security strategy to building operational cyber defense. We preview our spicy new episode of Only Malware in the Building.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.<br><strong>Threat Vector Segment</strong></p>
<p>In our Threat Vector  segment, host <a href="https://www.linkedin.com/in/davidrmoulton/"><u>David Moulton</u></a> hands the mic over to ⁠<a href="https://www.linkedin.com/in/mikesiko/"><u>Michael Sikorski⁠</u></a> and guest ⁠<a href="https://www.linkedin.com/in/tombossert/"><u>Thomas P. Bossert</u></a>⁠, President of Trinity Cyber and former Homeland Security Advisor. They explore the path from policy and national security strategy to building operational cyber defense. Listen to the full conversation <a href="https://thecyberwire.com/podcasts/threat-vector/82/notes"><u>here</u></a> and find new episodes of<a href="https://thecyberwire.com/podcasts/threat-vector"><u>⁠ Threat Vector⁠</u></a> each Thursday on the N2K CyberWire network and in your favorite podcast app.<br><strong>CyberWire Guest</strong></p>
<p>Today, our podcast producer <a href="https://www.linkedin.com/in/elizabeth-stokes-183925181/"><u>Liz Stokes</u></a> speaks with N2K Director of Enterprise Content Strategy <a href="https://www.linkedin.com/in/maayanplaut/"><u>Ma'ayan Plaut</u></a> about our spicy new episode of <a href="https://thecyberwire.com/podcasts/only-malware-in-the-building"><u>Only Malware in the Building</u></a>. You can find the audio version of Only Malware episode <a href="https://thecyberwire.com/podcasts/only-malware-in-the-building/15/notes"><u>here</u></a>, but we recommend you <a href="https://youtu.be/HDgLBxEKx28"><u>view the episode</u></a> for added enjoyment!</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/amazon-disrupts-russian-apt29-hackers-targeting-microsoft-365/"><u>Amazon disrupts Russian APT29 hackers targeting Microsoft 365</u></a> (Bleeping Computer)</p>
<p><a href="https://krebsonsecurity.com/2025/09/the-ongoing-fallout-from-a-breach-at-ai-chatbot-maker-salesloft/"><u>The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft</u></a> (Krebs on Security)</p>
<p><a href="https://www.zscaler.com/blogs/company-news/salesloft-drift-supply-chain-incident-key-details-and-zscaler-s-response"><u>Zscaler swiftly mitigates a security incident impacting Salesloft Drift</u></a> (Zscaler)</p>
<p><a href="https://techcrunch.com/2025/08/29/whatsapp-fixes-zero-click-bug-used-to-hack-apple-users-with-spyware/"><u>WhatsApp fixes 'zero-click' bug used to hack Apple users with spyware</u></a> (TechCrunch)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/tamperedchef-infostealer-delivered-through-fraudulent-pdf-editor/"><u>TamperedChef infostealer delivered through fraudulent PDF Editor</u></a> (Bleeping Computer)</p>
<p><a href="https://hello.heimdalsecurity.com/api/mailings/click/PMRGSZBCHIZDAMBTGI2CYITVOJWCEORCNB2HI4DTHIXS62DFNFWWIYLMONSWG5LSNF2HSLTDN5WS6YTMN5TS62DFNFWWIYLMFV2GC3LQMVZGKZDDNBSWMLLJNZ3GK43UNFTWC5DJN5XC6IRMEJXXEZZCHIRGMNLFG5SWGMRTFU3DIYZVFU2GMNRUFVQWGN3BFUZWEM3DHAZDMY3DMQ2WCIRMEJ3GK4TTNFXW4IR2EI2CELBCONUWOIR2EJ4HMUSXOYWUG4CYJBIU6NSSG4ZGMR2ZKAZTKUDRMFTUG3JZJJVEKWKTPFVWSUL2GZRHOSJ5EJ6Q===="><u>Heimdal Investigation: European Organizations Hit by PDF Editor Malware Campaign</u></a> (Heimdal Security) </p>
<p><a href="https://www.washingtonpost.com/technology/2025/08/29/tesla-autopilot-crashes-evidence-testimony-wrongful-death/"><u>Tesla said it didn’t have critical data in a fatal crash. Then a hacker found it.</u></a> (The Washington Post)</p>
<p><a href="https://therecord.media/spain-cancels-10-million-euro-huawei-contract"><u>Spanish government cancels €10m contract using Huawei equipment</u></a> (The Record)</p>
<p><a href="https://therecord.media/scammer-steals-baltimore-city-impersonation-vendor"><u>Scammer steals $1.5 million from Baltimore by spoofing city vendor</u></a> (The Record)</p>
<p><a href="https://thecyberwire.com/newsletters/business-briefing/7/34"><u>N2K Pro Business Briefing update</u></a> (N2K Networks) <br><a href="https://www.bbc.com/news/articles/ckgyk2p55g8o"><u>Taco Bell rethinks AI drive-through after man orders 18,000 waters</u></a> (BBC)</p>
<p><strong>Share your feedback.</strong></p>
<p>What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/NCFFCZJ"><u>brief listener survey</u></a>. Thank you for helping us continue to improve our show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1931</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cccd9042-1c7a-11f0-85e0-5ba9234b0afa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1271921757.mp3?updated=1756839053" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hot sauce and hot takes: An Only Malware in the Building special. [OMITB]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/15/notes</link>
      <description>Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss.

For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join ⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠⁠DISCARDED⁠, along with ⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠⁠⁠⁠⁠, as they take on a fiery hot wings challenge while answering personal questions about themselves, their careers, and the stories that shaped them. Think you’ve seen them tackle malware mysteries before? Wait until you see them sweat. 

This one’s too good for audio alone — you’ll want to watch the full ⁠video⁠ edition to catch every spicy reaction, every laugh, and maybe even a few tears.

So grab your milk, get ready to feel the burn, and come join us for this special hot take on Only Malware in the Building.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Sep 2025 07:00:00 -0000</pubDate>
      <itunes:title>Hot sauce and hot takes: An Only Malware in the Building special. [OMITB]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>15</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/62c13692-850a-11f0-ad7c-3f099007ece8/image/c9e03c2780f2971756311ea6bbed3d9a.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss.

For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join ⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠, ⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠⁠DISCARDED⁠, along with ⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠, former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠⁠⁠⁠⁠, as they take on a fiery hot wings challenge while answering personal questions about themselves, their careers, and the stories that shaped them. Think you’ve seen them tackle malware mysteries before? Wait until you see them sweat. 

This one’s too good for audio alone — you’ll want to watch the full ⁠video⁠ edition to catch every spicy reaction, every laugh, and maybe even a few tears.

So grab your milk, get ready to feel the burn, and come join us for this special hot take on Only Malware in the Building.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome in! You’ve entered, <em>Only Malware in the Building</em> — but this time, it’s not just another episode. This is a special edition you won’t want to miss.</p>
<p>For the first time, our hosts are together <em>in-studio</em> — and they’re turning up the heat. Literally. Join ⁠⁠⁠⁠⁠<a href="https://www.linkedin.com/in/selenalarson/">⁠Selena Larson⁠⁠⁠⁠⁠⁠</a>, <a href="https://www.proofpoint.com/">⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">⁠⁠⁠⁠⁠⁠DISCARDED⁠</a>, along with <a href="https://www.n2k.com/">⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠</a> and <a href="https://www.linkedin.com/in/keith-mularski-b737551/">⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠</a>, former FBI cybercrime investigator and now Chief Global Ambassador at <a href="https://www.linkedin.com/company/qintel/">⁠⁠⁠⁠⁠Qintel⁠⁠⁠⁠⁠</a>⁠⁠⁠⁠, as they take on a fiery hot wings challenge while answering personal questions about themselves, their careers, and the stories that shaped them. Think you’ve seen them tackle malware mysteries before? Wait until you see them sweat. </p>
<p>This one’s too good for audio alone — you’ll want to watch the full <a href="https://youtu.be/HDgLBxEKx28">⁠video⁠</a> edition to catch every spicy reaction, every laugh, and maybe even a few tears.</p>
<p>So grab your milk, get ready to feel the burn, and come join us for this special hot take on <em>Only Malware in the Building.</em></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2197</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[62c13692-850a-11f0-ad7c-3f099007ece8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4565652809.mp3?updated=1756494533" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Live from Black Hat: Ransomware, Responsible Disclosure, and the Rise of AI [Microsoft Threat Intelligence Podcast]</title>
      <link>https://thecyberwire.com/podcasts/microsoft-threat-intelligence/51/notes</link>
      <description>While our team is observing the Labor Day holiday in the US, we hope you will enjoy this episode of The Microsoft Threat Intelligence Podcast . New episodes airs on the N2K CyberWIre network every other Wednesday. 

In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠Sherrod DeGrippo  is live from Black Hat 2025 with a special lineup of Microsoft security leaders and researchers. 

First, Sherrod sits down with Tom Gallagher, VP of Engineering and head of the Microsoft Security Response Center (MSRC). Tom shares how his team works with researchers worldwide, why responsible disclosure matters, and how programs like Zero Day Quest (ZDQ) are shaping the future of vulnerability research in cloud and AI security. He also announced the next iteration of ZTQ with $5 million up for grabs. 

Next, Sherrod is joined by Eric Baller (Senior Security Researcher) and Eric Olson (Principal Security Researcher) to unpack the fast-changing ransomware landscape. From dwell time collapsing from weeks to minutes, to the growing role of access brokers, they explore how attackers operate as organized ecosystems and how defenders can respond. 

Finally, Sherrod welcomes Travis Schack (Principal Security Researcher) alongside Eric Olson to examine the mechanics of social engineering. They discuss how attackers exploit urgency, trust, and human curiosity, why AI is supercharging phishing campaigns, and how defenders can fight back with both training and technology. 

In this episode you’ll learn:     


  How MSRC partners with researchers across 59 countries to protect customers 

  Why Zero Day Quest is accelerating vulnerability discovery in cloud and AI 

  How ransomware dwell times have shrunk from days to under an hour 


Resources: 


  
View Sherrod DeGrippo on LinkedIn 

   Zero Day Quest — Microsoft 

  
Microsoft Security Response Center Blog 


Related Microsoft Podcasts:  


  Afternoon Cyber Tea with Ann Johnson

  The BlueHat Podcast

  
Uncovering Hidden Risks    


 

Discover and follow other Microsoft podcasts at microsoft.com/podcasts 

Get the latest threat intelligence insights and guidance at Microsoft Security Insider

 

The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 01 Sep 2025 07:05:00 -0000</pubDate>
      <itunes:title>Live from Black Hat: Ransomware, Responsible Disclosure, and the Rise of AI [Microsoft Threat Intelligence Podcast]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>51</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ed598a4c-81c8-11f0-b7a8-838b548b52bf/image/de42cff255e7436f87668db0949201cb.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>While our team is observing the Labor Day holiday in the US, we hope you will enjoy this episode of The Microsoft Threat Intelligence Podcast . New episodes airs on the N2K CyberWIre network every other Wednesday. 

In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠Sherrod DeGrippo  is live from Black Hat 2025 with a special lineup of Microsoft security leaders and researchers. 

First, Sherrod sits down with Tom Gallagher, VP of Engineering and head of the Microsoft Security Response Center (MSRC). Tom shares how his team works with researchers worldwide, why responsible disclosure matters, and how programs like Zero Day Quest (ZDQ) are shaping the future of vulnerability research in cloud and AI security. He also announced the next iteration of ZTQ with $5 million up for grabs. 

Next, Sherrod is joined by Eric Baller (Senior Security Researcher) and Eric Olson (Principal Security Researcher) to unpack the fast-changing ransomware landscape. From dwell time collapsing from weeks to minutes, to the growing role of access brokers, they explore how attackers operate as organized ecosystems and how defenders can respond. 

Finally, Sherrod welcomes Travis Schack (Principal Security Researcher) alongside Eric Olson to examine the mechanics of social engineering. They discuss how attackers exploit urgency, trust, and human curiosity, why AI is supercharging phishing campaigns, and how defenders can fight back with both training and technology. 

In this episode you’ll learn:     


  How MSRC partners with researchers across 59 countries to protect customers 

  Why Zero Day Quest is accelerating vulnerability discovery in cloud and AI 

  How ransomware dwell times have shrunk from days to under an hour 


Resources: 


  
View Sherrod DeGrippo on LinkedIn 

   Zero Day Quest — Microsoft 

  
Microsoft Security Response Center Blog 


Related Microsoft Podcasts:  


  Afternoon Cyber Tea with Ann Johnson

  The BlueHat Podcast

  
Uncovering Hidden Risks    


 

Discover and follow other Microsoft podcasts at microsoft.com/podcasts 

Get the latest threat intelligence insights and guidance at Microsoft Security Insider

 

The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While our team is observing the Labor Day holiday in the US, we hope you will enjoy this episode of The Microsoft Threat Intelligence Podcast . New episodes airs on the N2K CyberWIre network every other Wednesday. </strong></em></p>
<p>In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠<a href="https://www.linkedin.com/in/sherroddegrippo/">Sherrod DeGrippo</a>  is live from Black Hat 2025 with a special lineup of Microsoft security leaders and researchers. </p>
<p>First, Sherrod sits down with <a href="https://www.linkedin.com/in/togallagher/">Tom Gallagher</a>, VP of Engineering and head of the Microsoft Security Response Center (MSRC). Tom shares how his team works with researchers worldwide, why responsible disclosure matters, and how programs like Zero Day Quest (ZDQ) are shaping the future of vulnerability research in cloud and AI security. He also announced the next iteration of ZTQ with $5 million up for grabs. </p>
<p>Next, Sherrod is joined by <a href="https://www.linkedin.com/in/ericballer/">Eric Baller </a>(Senior Security Researcher) and <a href="https://www.linkedin.com/in/ericinaleigh/">Eric Olson</a> (Principal Security Researcher) to unpack the fast-changing ransomware landscape. From dwell time collapsing from weeks to minutes, to the growing role of access brokers, they explore how attackers operate as organized ecosystems and how defenders can respond. </p>
<p>Finally, Sherrod welcomes <a href="https://www.linkedin.com/in/travisschack/">Travis Schack</a> (Principal Security Researcher) alongside Eric Olson to examine the mechanics of social engineering. They discuss how attackers exploit urgency, trust, and human curiosity, why AI is supercharging phishing campaigns, and how defenders can fight back with both training and technology. </p>
<p><strong>In this episode you’ll learn</strong>:     </p>
<ul>
  <li>How MSRC partners with researchers across 59 countries to protect customers </li>
  <li>Why Zero Day Quest is accelerating vulnerability discovery in cloud and AI </li>
  <li>How ransomware dwell times have shrunk from days to under an hour </li>
</ul>
<p><strong>Resources:</strong> </p>
<ul>
  <li>
<a href="https://www.linkedin.com/in/sherroddegrippo/">View Sherrod DeGrippo on LinkedIn</a> </li>
  <li> <a href="https://www.microsoft.com/en-us/msrc/microsoft-zero-day-quest?msockid=32380dbf49b36eb70bd91b9c48386f80">Zero Day Quest — Microsoft</a> </li>
  <li>
<a href="https://msrc.microsoft.com/blog">Microsoft Security Response Center Blog</a> </li>
</ul>
<p><strong>Related Microsoft Podcasts:  </strong></p>
<ul>
  <li><a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a></li>
  <li><a href="https://bluehatpodcast.com/">The BlueHat Podcast</a></li>
  <li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>    </li>
</ul>
<p> </p>
<p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> </a><a href="https://news.microsoft.com/podcasts/">microsoft.com/podcasts</a> </p>
<p>Get the latest threat intelligence insights and guidance at Microsoft <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fsecurity-insider%2F&amp;data=05%7C02%7Cv-ropetrillo%40microsoft.com%7C81e205a6b727403624b808dc64a26e6b%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638495896032091649%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=LTpBsEuiaY5YiYn2FYDydHrHkYWl%2FBTl2uAQlkBz1N0%3D&amp;reserved=0">Security Insider</a></p>
<p> </p>
<p><em>The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network. </em></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2636</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ed598a4c-81c8-11f0-b7a8-838b548b52bf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3544403568.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The labor behind the labor. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/85/notes</link>
      <description>This Labor Day, we’re celebrating more than just a holiday. Join us in celebrating not just the work, but the people who make it possible — the labor behind the labor.We’re honoring the people who bring their creativity, dedication, and passion to every corner of N2K. The work you hear, read, and see from us doesn’t happen by accident. It’s the result of talented colleagues who pour themselves into their craft, often in ways that don’t always get the spotlight. From shaping sound and refining scripts to building certification content and producing video, their labor is the heartbeat of what we do.In this special edition, host Ma’ayan Plaut introduces you to some of the voices behind the scenes: Elliott, whose audio artistry makes every show sing; Ethan, whose sharp analysis bridges policy and practice; Alice, whose storytelling brings energy and curiosity to the space industry; George and Ann, who create and refine the certification content that keeps us at the forefront of technology; and Sarelle, whose video production brings our stories to life. Together, they embody the care and creativity that define N2K.And if you’d like to see the labor behind the labor, we’ve also put together a ⁠⁠video⁠⁠ companion to this project — giving you another way to meet the team and experience their work in action. Be sure to check it out!
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 01 Sep 2025 07:00:00 -0000</pubDate>
      <itunes:title>The labor behind the labor. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>85</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/aa2ecaca-851f-11f0-83b2-43e9f6c18edd/image/0216c9cea15c53e5d2c739964a38623c.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This Labor Day, we’re celebrating more than just a holiday. Join us in celebrating not just the work, but the people who make it possible — the labor behind the labor.We’re honoring the people who bring their creativity, dedication, and passion to every corner of N2K. The work you hear, read, and see from us doesn’t happen by accident. It’s the result of talented colleagues who pour themselves into their craft, often in ways that don’t always get the spotlight. From shaping sound and refining scripts to building certification content and producing video, their labor is the heartbeat of what we do.In this special edition, host Ma’ayan Plaut introduces you to some of the voices behind the scenes: Elliott, whose audio artistry makes every show sing; Ethan, whose sharp analysis bridges policy and practice; Alice, whose storytelling brings energy and curiosity to the space industry; George and Ann, who create and refine the certification content that keeps us at the forefront of technology; and Sarelle, whose video production brings our stories to life. Together, they embody the care and creativity that define N2K.And if you’d like to see the labor behind the labor, we’ve also put together a ⁠⁠video⁠⁠ companion to this project — giving you another way to meet the team and experience their work in action. Be sure to check it out!
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This Labor Day, we’re celebrating more than just a holiday. Join us in celebrating not just the work, but the people who make it possible — the labor behind the labor.We’re honoring the people who bring their creativity, dedication, and passion to every corner of N2K. The work you hear, read, and see from us doesn’t happen by accident. It’s the result of talented colleagues who pour themselves into their craft, often in ways that don’t always get the spotlight. From shaping sound and refining scripts to building certification content and producing video, their labor is the heartbeat of what we do.In this special edition, host Ma’ayan Plaut introduces you to some of the voices behind the scenes: Elliott, whose audio artistry makes every show sing; Ethan, whose sharp analysis bridges policy and practice; Alice, whose storytelling brings energy and curiosity to the space industry; George and Ann, who create and refine the certification content that keeps us at the forefront of technology; and Sarelle, whose video production brings our stories to life. Together, they embody the care and creativity that define N2K.And if you’d like to <em>see</em> the labor behind the labor, we’ve also put together a <a href="https://youtu.be/L1uvWxUNTeU">⁠⁠video⁠⁠</a> companion to this project — giving you another way to meet the team and experience their work in action. Be sure to check it out!</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2126</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aa2ecaca-851f-11f0-83b2-43e9f6c18edd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3619994679.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Marina Ciavatta: Going after the human error. [Social engineer] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/83/notes</link>
      <description>Please enjoy this encore of Career Notes.

Social engineer and CEO of Hekate, Marina Ciavatta, shares her story of how people think her job is a la Mission Impossible coming from the ceiling with a rope and stealing stuff in the dead of the night. Marina does physical pentesting. Starting with an unused degree in journalism, Marina turned her talent for writing into a job as a content producer for a technology company and this appealed to her self-proclaimed nerdism. She fell in love with hacking and got into pentesting thanks to a friend. Marina recommends those interested in physical pentesting "try to find other social engineers to mingle. It's in the name. We are social creatures." We thank Marina for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 31 Aug 2025 07:00:00 -0000</pubDate>
      <itunes:title>Marina Ciavatta: Going after the human error. [Social engineer] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>83</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5b784df2-8443-11f0-88b2-bf6eaa7b4c62/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes.

Social engineer and CEO of Hekate, Marina Ciavatta, shares her story of how people think her job is a la Mission Impossible coming from the ceiling with a rope and stealing stuff in the dead of the night. Marina does physical pentesting. Starting with an unused degree in journalism, Marina turned her talent for writing into a job as a content producer for a technology company and this appealed to her self-proclaimed nerdism. She fell in love with hacking and got into pentesting thanks to a friend. Marina recommends those interested in physical pentesting "try to find other social engineers to mingle. It's in the name. We are social creatures." We thank Marina for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes.</p>
<p>Social engineer and CEO of Hekate, Marina Ciavatta, shares her story of how people think her job is a la Mission Impossible coming from the ceiling with a rope and stealing stuff in the dead of the night. Marina does physical pentesting. Starting with an unused degree in journalism, Marina turned her talent for writing into a job as a content producer for a technology company and this appealed to her self-proclaimed nerdism. She fell in love with hacking and got into pentesting thanks to a friend. Marina recommends those interested in physical pentesting "try to find other social engineers to mingle. It's in the name. We are social creatures." We thank Marina for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>666</itunes:duration>
      <guid isPermaLink="false"><![CDATA[5b784df2-8443-11f0-88b2-bf6eaa7b4c62]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2866934269.mp3?updated=1735936615" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cracks in the wall. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/391/notes</link>
      <description>This week, we are joined by Jamie Levy, Director of Adversary Tactics at Huntress, who is discussing their work on "Active Exploitation of SonicWall VPNs." Huntress has released an urgent threat advisory on active exploitation of SonicWall VPNs, with attackers bypassing MFA, pivoting to domain controllers, and ultimately deploying Akira ransomware. The campaigns involve techniques such as disabling defenses, clearing logs, credential theft, and Bring Your Own Vulnerable Driver (BYOVD) attacks with legitimate Windows drivers. 

Organizations using SonicWall devices are strongly advised to disable SSL VPN access or restrict it via IP allow-listing, rotate credentials, and hunt for indicators of compromise as this remains an ongoing and evolving threat.

Complete our annual ⁠⁠⁠⁠⁠audience survey⁠⁠⁠⁠⁠ before August 31.

The research can be found here:


  Huntress Threat Advisory: Active Exploitation of SonicWall VPNs


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Aug 2025 07:00:00 -0000</pubDate>
      <itunes:title>Cracks in the wall. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>391</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5a612220-844f-11f0-a0f4-3bb8db589aec/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Jamie Levy, Director of Adversary Tactics at Huntress, who is discussing their work on "Active Exploitation of SonicWall VPNs." Huntress has released an urgent threat advisory on active exploitation of SonicWall VPNs, with attackers bypassing MFA, pivoting to domain controllers, and ultimately deploying Akira ransomware. The campaigns involve techniques such as disabling defenses, clearing logs, credential theft, and Bring Your Own Vulnerable Driver (BYOVD) attacks with legitimate Windows drivers. 

Organizations using SonicWall devices are strongly advised to disable SSL VPN access or restrict it via IP allow-listing, rotate credentials, and hunt for indicators of compromise as this remains an ongoing and evolving threat.

Complete our annual ⁠⁠⁠⁠⁠audience survey⁠⁠⁠⁠⁠ before August 31.

The research can be found here:


  Huntress Threat Advisory: Active Exploitation of SonicWall VPNs


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/jlevy77/">Jamie Levy</a>, Director of Adversary Tactics at <a href="https://www.linkedin.com/company/huntress-labs/">Huntress</a>, who is discussing their work on "Active Exploitation of SonicWall VPNs." Huntress has released an urgent threat advisory on active exploitation of SonicWall VPNs, with attackers bypassing MFA, pivoting to domain controllers, and ultimately deploying Akira ransomware. The campaigns involve techniques such as disabling defenses, clearing logs, credential theft, and Bring Your Own Vulnerable Driver (BYOVD) attacks with legitimate Windows drivers. </p>
<p>Organizations using SonicWall devices are strongly advised to disable SSL VPN access or restrict it via IP allow-listing, rotate credentials, and hunt for indicators of compromise as this remains an ongoing and evolving threat.</p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JDYLFZ5">⁠⁠⁠⁠⁠audience survey⁠⁠⁠⁠⁠</a> before August 31.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.huntress.com/blog/exploitation-of-sonicwall-vpn">Huntress Threat Advisory: Active Exploitation of SonicWall VPNs</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>793</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a612220-844f-11f0-a0f4-3bb8db589aec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6478929598.mp3?updated=1756413851" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware sick day.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2382/notes</link>
      <description>A suspected ransomware attack disrupts hundreds of Swedish municipalities. Google warns Gmail users of emerging cyberattacks tied to the ShinyHunters group. A malicious supply chain attack hits the npm registry. Senators press AFLAC for answers following a data breach. Law enforcement takedowns splinter the ransomware ecosystem. The FBI and Dutch police take down a major online fakeID marketplace. Florida proposes requiring healthcare providers to strengthen data breach preparedness and reporting. Our guest is Kathleen Peters, Chief Innovation Officer at Experian North America, explaining why AI is both accelerating and mitigating fraud. An affiliate army pushes fake casinos worldwide.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Kathleen Peters, Chief Innovation Officer at Experian North America, who is sharing the AI paradox: why AI is both accelerating and mitigating fraud. You can learn more in Experian’s U.S. Identity &amp; Fraud Report.

Selected Reading

Hundreds of Swedish municipalities impacted by suspected ransomware attack on IT supplier (The Record)

Google issues emergency warning for all Gmail users (Geekspin)

TransUnion Data Breach Impacts 4.4 Million (Security Week)

Npm Package Hijacked to Steal Data and Crypto via AI-Powered Malware (Infosecurity Magazine)

US Senators Call for Details of Aflac Data Breach (Bank Infosecurity)

Ransomware gang takedowns causing explosion of new, smaller groups (The Record)

FBI, Dutch cops seize fake ID marketplace, servers  (The Register)

Florida Considers Rule to Improve Healthcare Data Breach Transparency (The HIPPA Journal)

Affiliates Flock to ‘Soulless’ Scam Gambling Machine (Krebs on Security)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 29 Aug 2025 20:10:00 -0000</pubDate>
      <itunes:title>Ransomware sick day.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2382</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A suspected ransomware attack disrupts hundreds of Swedish municipalities. Google warns Gmail users of emerging cyberattacks tied to the ShinyHunters group. A malicious supply chain attack hits the npm registry. Senators press AFLAC for answers following a data breach. Law enforcement takedowns splinter the ransomware ecosystem. The FBI and Dutch police take down a major online fakeID marketplace. Florida proposes requiring healthcare providers to strengthen data breach preparedness and reporting. Our guest is Kathleen Peters, Chief Innovation Officer at Experian North America, explaining why AI is both accelerating and mitigating fraud. An affiliate army pushes fake casinos worldwide.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Kathleen Peters, Chief Innovation Officer at Experian North America, who is sharing the AI paradox: why AI is both accelerating and mitigating fraud. You can learn more in Experian’s U.S. Identity &amp; Fraud Report.

Selected Reading

Hundreds of Swedish municipalities impacted by suspected ransomware attack on IT supplier (The Record)

Google issues emergency warning for all Gmail users (Geekspin)

TransUnion Data Breach Impacts 4.4 Million (Security Week)

Npm Package Hijacked to Steal Data and Crypto via AI-Powered Malware (Infosecurity Magazine)

US Senators Call for Details of Aflac Data Breach (Bank Infosecurity)

Ransomware gang takedowns causing explosion of new, smaller groups (The Record)

FBI, Dutch cops seize fake ID marketplace, servers  (The Register)

Florida Considers Rule to Improve Healthcare Data Breach Transparency (The HIPPA Journal)

Affiliates Flock to ‘Soulless’ Scam Gambling Machine (Krebs on Security)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A suspected ransomware attack disrupts hundreds of Swedish municipalities. Google warns Gmail users of emerging cyberattacks tied to the ShinyHunters group. A malicious supply chain attack hits the npm registry. Senators press AFLAC for answers following a data breach. Law enforcement takedowns splinter the ransomware ecosystem. The FBI and Dutch police take down a major online fakeID marketplace. Florida proposes requiring healthcare providers to strengthen data breach preparedness and reporting. Our guest is Kathleen Peters, Chief Innovation Officer at Experian North America, explaining why AI is both accelerating and mitigating fraud. An affiliate army pushes fake casinos worldwide.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/kathleenhpeters/"><u>Kathleen Peters</u></a>, Chief Innovation Officer at <a href="https://www.linkedin.com/company/experian/"><u>Experian</u></a> North America, who is sharing the AI paradox: why AI is both accelerating and mitigating fraud. You can learn more in <a href="https://www.experian.com/blogs/insights/2025-identity-fraud-report/"><u>Experian’s U.S. Identity &amp; Fraud Report</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/sweden-municipalities-ransomware-software"><u>Hundreds of Swedish municipalities impacted by suspected ransomware attack on IT supplier</u></a> (The Record)</p>
<p><a href="https://geekspin.co/google-issues-warning-for-gmail-users/"><u>Google issues emergency warning for all Gmail users</u></a> (Geekspin)</p>
<p><a href="https://www.securityweek.com/transunion-data-breach-impacts-4-4-million/"><u>TransUnion Data Breach Impacts 4.4 Million</u></a> (Security Week)</p>
<p><a href="https://www.infosecurity-magazine.com/news/npm-package-hijacked-ai-malware/"><u>Npm Package Hijacked to Steal Data and Crypto via AI-Powered Malware</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.bankinfosecurity.com/us-senators-call-for-details-aflac-data-breach-a-29319"><u>US Senators Call for Details of Aflac Data Breach</u></a> (Bank Infosecurity)</p>
<p><a href="https://therecord.media/ransomware-gang-takedown-proliferation"><u>Ransomware gang takedowns causing explosion of new, smaller groups</u></a> (The Record)</p>
<p><a href="https://www.theregister.com/2025/08/28/fbi_dutch_cops_seize_veriftools/"><u>FBI, Dutch cops seize fake ID marketplace, servers</u> </a> (The Register)</p>
<p><a href="https://www.hipaajournal.com/florida-rule-improve-healthcare-data-breach-transparency/"><u>Florida Considers Rule to Improve Healthcare Data Breach Transparency</u></a> (The HIPPA Journal)</p>
<p><a href="https://krebsonsecurity.com/2025/08/affiliates-flock-to-soulless-scam-gambling-machine/"><u>Affiliates Flock to ‘Soulless’ Scam Gambling Machine</u></a> (Krebs on Security)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1512</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cc7be5d0-1c7a-11f0-85e0-e74ce147620e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6438739270.mp3?updated=1756488107" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Listening in on the listeners.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2381/notes</link>
      <description>The FBI shares revelations on Salt Typhoon’s reach.  Former NSA and FBI directors sound alarm on infrastructure cybersecurity gaps. Google is launching a new cyber “disruption unit”. A new report highlights cyber risks to the maritime industry. A Pennsylvania healthcare provider suffers a data breach affecting over six hundred thousand individuals. Citrix patches a critical vulnerability under active exploitation. The U.S. sanctions a North Korean-linked fraud network. Ransomware is rapidly evolving with generative AI. Our guest is Brandon Karpf, speaking with T-Minus host Maria Varmazis connecting three seemingly disparate stories. Who needs a tutor when you’ve got root access?

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest today is Brandon Karpf, friend of the show, founder of T-Minus Space Daily, and cybersecurity expert talking with T-Minus host Maria Varmazis. Brandon decided to do a stump the host play for this month's space and cybersecurity segment.

Selected Reading

Chinese Spies Hit More Than 80 Countries in ‘Salt Typhoon’ Breach, FBI Reveals (WSJ)

NSA and Others Provide Guidance to Counter China State-Sponsored Actors Targeting Critical Infrastructure Organizations (NSA)

Critical Infrastructure Leaders and Former National Security Officials Address Escalating Cyber Threats at Exclusive GCIS Security Briefing (Business Wire)

Google previews cyber ‘disruption unit’ as U.S. government, industry weigh going heavier on offense (CyberScoop)

Maritime cybersecurity is the iceberg no one sees coming (Help Net Security)

Healthcare Services Group reports data breach exposing information of over 624 K individuals (Beyond Machines)

Over 28,000 Citrix devices vulnerable to new exploited RCE flaw (Bleeping Computer)

US sanctions fraud network used by North Korean 'remote IT workers' to seek jobs and steal money (TechCrunch)

The Era of AI-Generated Ransomware Has Arrived (WIRED)

Spanish police arrest student suspected of hacking school system to change grades (The Record)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 28 Aug 2025 05:00:00 -0000</pubDate>
      <itunes:title>Listening In on the listeners.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2381</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The FBI shares revelations on Salt Typhoon’s reach.  Former NSA and FBI directors sound alarm on infrastructure cybersecurity gaps. Google is launching a new cyber “disruption unit”. A new report highlights cyber risks to the maritime industry. A Pennsylvania healthcare provider suffers a data breach affecting over six hundred thousand individuals. Citrix patches a critical vulnerability under active exploitation. The U.S. sanctions a North Korean-linked fraud network. Ransomware is rapidly evolving with generative AI. Our guest is Brandon Karpf, speaking with T-Minus host Maria Varmazis connecting three seemingly disparate stories. Who needs a tutor when you’ve got root access?

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest today is Brandon Karpf, friend of the show, founder of T-Minus Space Daily, and cybersecurity expert talking with T-Minus host Maria Varmazis. Brandon decided to do a stump the host play for this month's space and cybersecurity segment.

Selected Reading

Chinese Spies Hit More Than 80 Countries in ‘Salt Typhoon’ Breach, FBI Reveals (WSJ)

NSA and Others Provide Guidance to Counter China State-Sponsored Actors Targeting Critical Infrastructure Organizations (NSA)

Critical Infrastructure Leaders and Former National Security Officials Address Escalating Cyber Threats at Exclusive GCIS Security Briefing (Business Wire)

Google previews cyber ‘disruption unit’ as U.S. government, industry weigh going heavier on offense (CyberScoop)

Maritime cybersecurity is the iceberg no one sees coming (Help Net Security)

Healthcare Services Group reports data breach exposing information of over 624 K individuals (Beyond Machines)

Over 28,000 Citrix devices vulnerable to new exploited RCE flaw (Bleeping Computer)

US sanctions fraud network used by North Korean 'remote IT workers' to seek jobs and steal money (TechCrunch)

The Era of AI-Generated Ransomware Has Arrived (WIRED)

Spanish police arrest student suspected of hacking school system to change grades (The Record)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FBI shares revelations on Salt Typhoon’s reach.  Former NSA and FBI directors sound alarm on infrastructure cybersecurity gaps. Google is launching a new cyber “disruption unit”. A new report highlights cyber risks to the maritime industry. A Pennsylvania healthcare provider suffers a data breach affecting over six hundred thousand individuals. Citrix patches a critical vulnerability under active exploitation. The U.S. sanctions a North Korean-linked fraud network. Ransomware is rapidly evolving with generative AI. Our guest is Brandon Karpf, speaking with T-Minus host Maria Varmazis connecting three seemingly disparate stories. Who needs a tutor when you’ve got root access?</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Our guest today is <a href="https://www.linkedin.com/in/brandon-karpf/"><u>Brandon Karpf</u></a>, friend of the show, founder of <a href="https://space.n2k.com/podcasts/t-minus"><u>T-Minus Space Daily</u></a>, and cybersecurity expert talking with T-Minus host Maria Varmazis. Brandon decided to do a stump the host play for this month's space and cybersecurity segment.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.wsj.com/politics/national-security/chinese-spies-hit-more-than-80-countries-in-salt-typhoon-breach-fbi-reveals-59b2108f"><u>Chinese Spies Hit More Than 80 Countries in ‘Salt Typhoon’ Breach, FBI Reveals</u> </a>(WSJ)</p>
<p><a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4287371/nsa-and-others-provide-guidance-to-counter-china-state-sponsored-actors-targeti/"><u>NSA and Others Provide Guidance to Counter China State-Sponsored Actors Targeting Critical Infrastructure Organizations</u></a> (NSA)</p>
<p><a href="https://finance.yahoo.com/news/critical-infrastructure-leaders-former-national-123600204.html?guccounter=1"><u>Critical Infrastructure Leaders and Former National Security Officials Address Escalating Cyber Threats at Exclusive GCIS Security Briefing</u></a> (Business Wire)</p>
<p><a href="https://cyberscoop.com/google-cybersecurity-disruption-unit-active-defense-hack-back/"><u>Google previews cyber ‘disruption unit’ as U.S. government, industry weigh going heavier on offense</u> </a>(CyberScoop)</p>
<p><a href="https://www.helpnetsecurity.com/2025/08/28/maritime-industry-cybersecurity-threats/"><u>Maritime cybersecurity is the iceberg no one sees coming</u> </a>(Help Net Security)</p>
<p><a href="https://beyondmachines.net/event_details/healthcare-services-group-reports-data-breach-exposing-information-of-over-624-k-individuals-x-1-t-s-y/gD2P6Ple2L"><u>Healthcare Services Group reports data breach exposing information of over 624 K individuals</u></a> (Beyond Machines)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/over-28-200-citrix-instances-vulnerable-to-actively-exploited-rce-bug/"><u>Over 28,000 Citrix devices vulnerable to new exploited RCE flaw</u></a> (Bleeping Computer)</p>
<p><a href="https://techcrunch.com/2025/08/27/us-sanctions-fraud-network-used-by-north-korea-to-seek-jobs-and-steal-money/"><u>US sanctions fraud network used by North Korean 'remote IT workers' to seek jobs and steal money</u> </a>(TechCrunch)</p>
<p><a href="https://www.wired.com/story/the-era-of-ai-generated-ransomware-has-arrived/"><u>The Era of AI-Generated Ransomware Has Arrived</u> </a>(WIRED)</p>
<p><br><a href="https://therecord.media/spanish-police-hacker-arrest-grades"><u>Spanish police arrest student suspected of hacking school system to change grades</u></a> (The Record)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1755</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cc5406a0-1c7a-11f0-85e0-a392ad4eda21]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1247000914.mp3?updated=1756405522" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Whistle-blown and wide open.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2380/notes</link>
      <description>A whistle-blower claims DOGE uploaded a sensitive Social Security database to a vulnerable cloud server. Allies push back against North Korean IT scams. ZipLine is a sophisticated phishing campaign targeting U.S.-based manufacturing. Researchers uncover a residential proxy network operating across at least 20 U.S. states. Flock Safety license plate readers face increased scrutiny. A new report chronicles DDoS through the first half of the year. LLM guard rails fail to defend against run-on sentences. A South American APT targets the Colombian government. Our guest is Harry Thomas, Founder and CTO at Frenos, on the benefits of curated and vetted AI training data. One man’s fight against phantom jobs posts.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest today is Harry Thomas, Founder and CTO at Frenos, talking about the benefits of curated and vetted AI training data.  Learn more about the Frenos and N2K Networks partnership to utilize industry validated intelligence to build the first AI native OT security posture management platform.

Selected Reading

DOGE Put Critical Social Security Data at Risk, Whistle-Blower Says (The New York Times)

Governments, tech companies meet in Tokyo to share tips on fighting North Korea IT worker scheme (The Record)

ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies (Check Point Research)

Phishing Campaign Targeting Companies via UpCrypter (FortiGuard Labs)

Belarus-Linked DSLRoot Proxy Network Deploys Hardware in U.S. Residences, Including Military Homes (Infrawatch)

CBP Had Access to More than 80,000 Flock AI Cameras Nationwide (404 Media)

Evanston shuts down license plate cameras, terminates contract with Flock Safety (Evanston Round Table)

Global DDoS attacks exceed 8M amid geopolitical tensions (Telecoms Tech News)

One long sentence is all it takes to make LLMs misbehave (The Register)

TAG-144’s Persistent Grip on South American Organizations (Recorded Future)

This tech worker was frustrated with ghost job ads. Now he’s working to pass a national law banning them (CNBC)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 27 Aug 2025 20:10:00 -0000</pubDate>
      <itunes:title>Whistle-blown and wide open.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2380</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A whistle-blower claims DOGE uploaded a sensitive Social Security database to a vulnerable cloud server. Allies push back against North Korean IT scams. ZipLine is a sophisticated phishing campaign targeting U.S.-based manufacturing. Researchers uncover a residential proxy network operating across at least 20 U.S. states. Flock Safety license plate readers face increased scrutiny. A new report chronicles DDoS through the first half of the year. LLM guard rails fail to defend against run-on sentences. A South American APT targets the Colombian government. Our guest is Harry Thomas, Founder and CTO at Frenos, on the benefits of curated and vetted AI training data. One man’s fight against phantom jobs posts.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest today is Harry Thomas, Founder and CTO at Frenos, talking about the benefits of curated and vetted AI training data.  Learn more about the Frenos and N2K Networks partnership to utilize industry validated intelligence to build the first AI native OT security posture management platform.

Selected Reading

DOGE Put Critical Social Security Data at Risk, Whistle-Blower Says (The New York Times)

Governments, tech companies meet in Tokyo to share tips on fighting North Korea IT worker scheme (The Record)

ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies (Check Point Research)

Phishing Campaign Targeting Companies via UpCrypter (FortiGuard Labs)

Belarus-Linked DSLRoot Proxy Network Deploys Hardware in U.S. Residences, Including Military Homes (Infrawatch)

CBP Had Access to More than 80,000 Flock AI Cameras Nationwide (404 Media)

Evanston shuts down license plate cameras, terminates contract with Flock Safety (Evanston Round Table)

Global DDoS attacks exceed 8M amid geopolitical tensions (Telecoms Tech News)

One long sentence is all it takes to make LLMs misbehave (The Register)

TAG-144’s Persistent Grip on South American Organizations (Recorded Future)

This tech worker was frustrated with ghost job ads. Now he’s working to pass a national law banning them (CNBC)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A whistle-blower claims DOGE uploaded a sensitive Social Security database to a vulnerable cloud server. Allies push back against North Korean IT scams. ZipLine is a sophisticated phishing campaign targeting U.S.-based manufacturing. Researchers uncover a residential proxy network operating across at least 20 U.S. states. Flock Safety license plate readers face increased scrutiny. A new report chronicles DDoS through the first half of the year. LLM guard rails fail to defend against run-on sentences. A South American APT targets the Colombian government. Our guest is Harry Thomas, Founder and CTO at Frenos, on the benefits of curated and vetted AI training data. One man’s fight against phantom jobs posts.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Our guest today is <a href="https://www.linkedin.com/in/harry-j-thomas/"><u>Harry Thomas</u></a>, Founder and CTO at <a href="https://frenos.io/"><u>Frenos</u></a>, talking about the benefits of curated and vetted AI training data.  Learn more about the <a href="https://thecyberwire.com/stories/d0e41e56a3354d179cc90121c92c5e26/frenos-partners-with-n2k-to-power-first-ai-native-ot-security-posture-management-platform-with-industry-validated-intelligence"><u>Frenos and N2K Networks partnership</u></a> to utilize industry validated intelligence to build the first AI native OT security posture management platform.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.nytimes.com/2025/08/26/us/politics/doge-social-security-data.html"><u>DOGE Put Critical Social Security Data at Risk, Whistle-Blower Says </u></a>(The New York Times)</p>
<p><a href="https://therecord.media/japan-us-south-korea-forum-north-korea-it-worker-scheme"><u>Governments, tech companies meet in Tokyo to share tips on fighting North Korea IT worker scheme</u></a> (The Record)</p>
<p><a href="https://research.checkpoint.com/2025/zipline-phishing-campaign/"><u>ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies</u></a> (Check Point Research)</p>
<p><a href="https://www.fortinet.com/blog/threat-research/phishing-campaign-targeting-companies-via-upcrypter"><u>Phishing Campaign Targeting Companies via UpCrypter </u></a>(FortiGuard Labs)</p>
<p><a href="https://infrawatch.app/blog/dslroot-us-proxy-investigation"><u>Belarus-Linked DSLRoot Proxy Network Deploys Hardware in U.S. Residences, Including Military Homes</u></a> (Infrawatch)</p>
<p><a href="https://www.404media.co/cbp-had-access-to-more-than-80-000-flock-ai-cameras-nationwide/"><u>CBP Had Access to More than 80,000 Flock AI Cameras Nationwide</u></a> (404 Media)</p>
<p><a href="https://evanstonroundtable.com/2025/08/26/evanston-shuts-down-license-plate-cameras-terminates-contract-with-flock-safety/"><u>Evanston shuts down license plate cameras, terminates contract with Flock Safety</u></a> (Evanston Round Table)</p>
<p><a href="https://www.telecomstechnews.com/news/global-ddos-attacks-exceed-8m-amid-geopolitical-tensions/"><u>Global DDoS attacks exceed 8M amid geopolitical tensions</u></a> (Telecoms Tech News)</p>
<p><a href="https://www.theregister.com/2025/08/26/breaking_llms_for_fun/"><u>One long sentence is all it takes to make LLMs misbehave </u></a>(The Register)</p>
<p><a href="https://www.recordedfuture.com/research/tag-144s-persistent-grip-on-south-american-organizations"><u>TAG-144’s Persistent Grip on South American Organizations</u></a> (Recorded Future)</p>
<p><a href="https://www.cnbc.com/2025/08/25/tech-worker-was-frustrated-with-ghost-jobs-now-hes-trying-to-pass-a-national-ban.html"><u>This tech worker was frustrated with ghost job ads. Now he’s working to pass a national law banning them</u></a> (CNBC)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1557</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cc2bc3de-1c7a-11f0-85e0-33cf37261289]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2824290237.mp3?updated=1756319394" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rolling the dice on cybersecurity.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2379/notes</link>
      <description>A cyberattack disrupts state systems in Nevada. A China-linked threat actor targets Southeast Asian diplomats. A new attack method hides malicious prompts inside images processed by AI systems.Experts ponder preventing AI agents from going rogue. A new study finds AI is hitting entry-level jobs hardest. Michigan’s Supreme Court upholds limits on cell phone searches. Sen. Wyden accuses the judiciary of cyber negligence. CISA issues an urgent alert on a critical Git vulnerability. Hackers target Maryland’s transit services for the disabled. Our guest is Cristian Rodriguez, Field CTO for the Americas from CrowdStrike, examining the escalating three-front war in AI.  A neighborhood crime reporting app gets algorithmically sketchy.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Cristian Rodriguez, Field CTO, Americas from CrowdStrike, as he is examining the escalating three-front war in AI.

Selected Reading

 Cybercrime Government Leadership News News Briefs  Recorded Future Nevada state websites, phone lines knocked offline by cyberattack (The Record)

Chinese UNC6384 Hackers Use Valid Code-Signing Certificates to Evade Detection (GB Hackers)

New AI attack hides data-theft prompts in downscaled images (Bleeping Computer)

How to stop AI agents going rogue (BBC)

AI Makes It Harder for Entry-Level Coders to Find Jobs, Study Says (Bloomberg)

Fourth Amendment Victory: Michigan Supreme Court Reins in Digital Device Fishing Expeditions (Electronic Frontier Foundation)

Wyden calls for probe of federal judiciary data breaches, accusing it of ‘negligence’ (The Record)

CISA Alerts on Git Arbitrary File Write Flaw Actively Exploited (GB Hackers)

Maryland investigating cyberattack impacting transit service for disabled people (The Record)

Citizen Is Using AI to Generate Crime Alerts With No Human Review. It’s Making a Lot of Mistakes (404 Media)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Aug 2025 20:10:00 -0000</pubDate>
      <itunes:title>Rolling the dice on cybersecurity.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2379</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A cyberattack disrupts state systems in Nevada. A China-linked threat actor targets Southeast Asian diplomats. A new attack method hides malicious prompts inside images processed by AI systems.Experts ponder preventing AI agents from going rogue. A new study finds AI is hitting entry-level jobs hardest. Michigan’s Supreme Court upholds limits on cell phone searches. Sen. Wyden accuses the judiciary of cyber negligence. CISA issues an urgent alert on a critical Git vulnerability. Hackers target Maryland’s transit services for the disabled. Our guest is Cristian Rodriguez, Field CTO for the Americas from CrowdStrike, examining the escalating three-front war in AI.  A neighborhood crime reporting app gets algorithmically sketchy.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Cristian Rodriguez, Field CTO, Americas from CrowdStrike, as he is examining the escalating three-front war in AI.

Selected Reading

 Cybercrime Government Leadership News News Briefs  Recorded Future Nevada state websites, phone lines knocked offline by cyberattack (The Record)

Chinese UNC6384 Hackers Use Valid Code-Signing Certificates to Evade Detection (GB Hackers)

New AI attack hides data-theft prompts in downscaled images (Bleeping Computer)

How to stop AI agents going rogue (BBC)

AI Makes It Harder for Entry-Level Coders to Find Jobs, Study Says (Bloomberg)

Fourth Amendment Victory: Michigan Supreme Court Reins in Digital Device Fishing Expeditions (Electronic Frontier Foundation)

Wyden calls for probe of federal judiciary data breaches, accusing it of ‘negligence’ (The Record)

CISA Alerts on Git Arbitrary File Write Flaw Actively Exploited (GB Hackers)

Maryland investigating cyberattack impacting transit service for disabled people (The Record)

Citizen Is Using AI to Generate Crime Alerts With No Human Review. It’s Making a Lot of Mistakes (404 Media)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cyberattack disrupts state systems in Nevada. A China-linked threat actor targets Southeast Asian diplomats. A new attack method hides malicious prompts inside images processed by AI systems.Experts ponder preventing AI agents from going rogue. A new study finds AI is hitting entry-level jobs hardest. Michigan’s Supreme Court upholds limits on cell phone searches. Sen. Wyden accuses the judiciary of cyber negligence. CISA issues an urgent alert on a critical Git vulnerability. Hackers target Maryland’s transit services for the disabled. Our guest is Cristian Rodriguez, Field CTO for the Americas from CrowdStrike, examining the escalating three-front war in AI.  A neighborhood crime reporting app gets algorithmically sketchy.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/cristianr/"><u>Cristian Rodriguez</u></a>, Field CTO, Americas from <a href="https://www.linkedin.com/company/crowdstrike/"><u>CrowdStrike</u></a>, as he is examining the escalating three-front war in AI.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/nevada-state-websites-phones-cyberattack-disruption"><u> Cybercrime Government Leadership News News Briefs  Recorded Future Nevada state websites, phone lines knocked offline by cyberattack</u></a> (The Record)</p>
<p><a href="https://gbhackers.com/chinese-unc6384-hackers-use-valid-code-signing-certificates/"><u>Chinese UNC6384 Hackers Use Valid Code-Signing Certificates to Evade Detection</u></a> (GB Hackers)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/new-ai-attack-hides-data-theft-prompts-in-downscaled-images/"><u>New AI attack hides data-theft prompts in downscaled images</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bbc.com/news/articles/cq87e0dwj25o"><u>How to stop AI agents going rogue</u></a> (BBC)</p>
<p><a href="https://www.bloomberg.com/news/articles/2025-08-26/ai-makes-it-harder-for-entry-level-coders-to-find-jobs-study-says"><u>AI Makes It Harder for Entry-Level Coders to Find Jobs, Study Says </u></a>(Bloomberg)</p>
<p><a href="https://www.eff.org/deeplinks/2025/08/fourth-amendment-victory-michigan-supreme-court-reins-digital-device-fishing-1"><u>Fourth Amendment Victory: Michigan Supreme Court Reins in Digital Device Fishing Expeditions </u></a>(Electronic Frontier Foundation)</p>
<p><a href="https://therecord.media/wyden-probe-federal-judiciary-data-breaches"><u>Wyden calls for probe of federal judiciary data breaches, accusing it of ‘negligence’</u></a> (The Record)</p>
<p><a href="https://gbhackers.com/cisa-alerts-on-git-arbitrary-file-write-flaw/"><u>CISA Alerts on Git Arbitrary File Write Flaw Actively Exploited</u></a> (GB Hackers)</p>
<p><a href="https://therecord.media/maryland-cyberattack-transit-disabled-people"><u>Maryland investigating cyberattack impacting transit service for disabled people</u></a> (The Record)</p>
<p><a href="https://www.404media.co/citizen-is-using-ai-to-generate-crime-alerts-with-no-human-review-its-making-a-lot-of-mistakes"><u>Citizen Is Using AI to Generate Crime Alerts With No Human Review. It’s Making a Lot of Mistakes</u></a> (404 Media)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1590</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cc03b95c-1c7a-11f0-85e0-d7b65c87fb91]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2978031230.mp3?updated=1756234277" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A farmers market of stolen data.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2378/notes</link>
      <description>Farmers Insurance discloses a data breach affecting over a million people. Agentic AI tools fall for common scams. A new bill in Congress looks to revive letters of marque for the digital age. Cybercriminals target macOS users with the Shamos infostealer. New Android spyware masquerades as antivirus to target Russian business executives. CISA seeks public comments on SBOM updates. A major third party electronics manufacturer reports a ransomware attack. Salesforce patches multiple vulnerabilities in its Tableau products. Over 370,000 user Grok conversations were accidentally indexed by Google. Ben Yelin examines the UK’s decision to drop digital backdoor requirements. WIRED gets duped by an AI author.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies joins to discuss the U.K. dropping ‘back door’ demand for Apple user data. Read the article Ben discusses. If you enjoyed this conversation and want to hear more from Ben, check out our Caveat podcast here. 

Selected Reading

Farmers Insurance Data Breach Impacts Over 1 Million People (SecurityWeek)

"Scamlexity": When Agentic AI Browsers Get Scammed (Guardio)

Bill would give hackers letters of marque against US enemies (The Register)

Fake macOS help sites push Shamos infostealer via ClickFix technique (Help Net Security)

New Android malware poses as antivirus from Russian intelligence agency (Bleeping Computer)

CISA Requests Public Feedback on Updated SBOM Guidance (SecurityWeek)

Electronics manufacturer Data I/O reports ransomware attack to SEC (The Record)

Salesforce patches multiple flaws in Tableau Server, at least one critical (Beyond Machines)

370,000 Grok AI chats leaked after being indexed on Google (Cyber Daily)

How WIRED Got Rolled by an AI Freelancer (WIRED)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 25 Aug 2025 20:10:00 -0000</pubDate>
      <itunes:title>A farmers market of stolen data.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2378</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Farmers Insurance discloses a data breach affecting over a million people. Agentic AI tools fall for common scams. A new bill in Congress looks to revive letters of marque for the digital age. Cybercriminals target macOS users with the Shamos infostealer. New Android spyware masquerades as antivirus to target Russian business executives. CISA seeks public comments on SBOM updates. A major third party electronics manufacturer reports a ransomware attack. Salesforce patches multiple vulnerabilities in its Tableau products. Over 370,000 user Grok conversations were accidentally indexed by Google. Ben Yelin examines the UK’s decision to drop digital backdoor requirements. WIRED gets duped by an AI author.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies joins to discuss the U.K. dropping ‘back door’ demand for Apple user data. Read the article Ben discusses. If you enjoyed this conversation and want to hear more from Ben, check out our Caveat podcast here. 

Selected Reading

Farmers Insurance Data Breach Impacts Over 1 Million People (SecurityWeek)

"Scamlexity": When Agentic AI Browsers Get Scammed (Guardio)

Bill would give hackers letters of marque against US enemies (The Register)

Fake macOS help sites push Shamos infostealer via ClickFix technique (Help Net Security)

New Android malware poses as antivirus from Russian intelligence agency (Bleeping Computer)

CISA Requests Public Feedback on Updated SBOM Guidance (SecurityWeek)

Electronics manufacturer Data I/O reports ransomware attack to SEC (The Record)

Salesforce patches multiple flaws in Tableau Server, at least one critical (Beyond Machines)

370,000 Grok AI chats leaked after being indexed on Google (Cyber Daily)

How WIRED Got Rolled by an AI Freelancer (WIRED)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Farmers Insurance discloses a data breach affecting over a million people. Agentic AI tools fall for common scams. A new bill in Congress looks to revive letters of marque for the digital age. Cybercriminals target macOS users with the Shamos infostealer. New Android spyware masquerades as antivirus to target Russian business executives. CISA seeks public comments on SBOM updates. A major third party electronics manufacturer reports a ransomware attack. Salesforce patches multiple vulnerabilities in its Tableau products. Over 370,000 user Grok conversations were accidentally indexed by Google. Ben Yelin examines the UK’s decision to drop digital backdoor requirements. WIRED gets duped by an AI author.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p><a href="https://www.linkedin.com/in/benjamin-yelin-5b14114b/"><u>Ben Yelin</u></a> from <a href="https://www.linkedin.com/company/university-of-maryland-center-for-health-and-homeland-security/"><u>University of Maryland Center for Cyber Health and Hazard Strategies</u></a> joins to discuss the U.K. dropping ‘back door’ demand for Apple user data. Read the <a href="https://www.washingtonpost.com/technology/2025/08/19/uk-apple-backdoor-data-privacy-gabbard/"><u>article</u></a> Ben discusses. If you enjoyed this conversation and want to hear more from Ben, check out our Caveat podcast <a href="https://thecyberwire.com/podcasts/caveat"><u>here</u></a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.securityweek.com/farmers-insurance-data-breach-impacts-over-1-million-people/"><u>Farmers Insurance Data Breach Impacts Over 1 Million People </u></a>(SecurityWeek)</p>
<p><a href="https://guard.io/labs/scamlexity-we-put-agentic-ai-browsers-to-the-test-they-clicked-they-paid-they-failed"><u>"Scamlexity": When Agentic AI Browsers Get Scammed</u></a> (Guardio)</p>
<p><a href="https://www.theregister.com/2025/08/21/congressman_proposes_bringing_back_letters/"><u>Bill would give hackers letters of marque against US enemies </u></a>(The Register)</p>
<p><a href="https://www.helpnetsecurity.com/2025/08/25/fake-macos-help-sites-push-shamos-infostealer-via-clickfix-technique/"><u>Fake macOS help sites push Shamos infostealer via ClickFix technique</u></a> (Help Net Security)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/new-android-malware-poses-as-antivirus-from-russian-intelligence-agency/"><u>New Android malware poses as antivirus from Russian intelligence agency</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/cisa-requests-public-feedback-on-updated-sbom-guidance/"><u>CISA Requests Public Feedback on Updated SBOM Guidance </u></a>(SecurityWeek)</p>
<p><a href="https://therecord.media/electronics-manufacturer-dataio-ransomware"><u>Electronics manufacturer Data I/O reports ransomware attack to SEC</u></a> (The Record)</p>
<p><a href="https://beyondmachines.net/event_details/salesforce-patches-multiple-flaws-in-tableau-server-at-least-one-critical-k-t-i-0-c/gD2P6Ple2L"><u>Salesforce patches multiple flaws in Tableau Server, at least one critical</u></a> (Beyond Machines)</p>
<p><a href="https://www.cyberdaily.au/security/12546-370-000-grok-ai-chats-leaked-after-being-indexed-on-google"><u>370,000 Grok AI chats leaked after being indexed on Google </u></a>(Cyber Daily)</p>
<p><a href="https://www.wired.com/story/how-wired-got-rolled-by-an-ai-freelancer/"><u>How WIRED Got Rolled by an AI Freelancer</u></a> (WIRED)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1332</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cbd9ee1a-1c7a-11f0-85e0-b7a92c6c0b4b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2426626182.mp3?updated=1756144249" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Julian Waits: Find a way to help society. [Serial Entrepreneur] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/82/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Senior Vice President and Executive in Residence with Rapid7 and Chairman for Cyversity, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. Julian always wanted to do something where he could find a way to help society to basically help others. Starting out as a Baptist minister with aspirations of being a professional musician, Julian found it more practical to take some technology classes and practice his saxophone when he had time. His first tech job was at Texaco where he worked on early networks and moved into systems engineering at Compaq. Julian notes his ADD made coding less attractive than talking with others to solve problems and Compaq provided him with opportunities to pivot. Searching out diversity, Julian moved to DC, and had his first taste of startups. He now describes himself as a serial entrepreneur. We thank Julian for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 24 Aug 2025 07:00:00 -0000</pubDate>
      <itunes:title>Julian Waits: Find a way to help society. [Serial Entrepreneur] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>82</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/99f326d2-7f7b-11f0-ad89-8b71ce7393a3/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Senior Vice President and Executive in Residence with Rapid7 and Chairman for Cyversity, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. Julian always wanted to do something where he could find a way to help society to basically help others. Starting out as a Baptist minister with aspirations of being a professional musician, Julian found it more practical to take some technology classes and practice his saxophone when he had time. His first tech job was at Texaco where he worked on early networks and moved into systems engineering at Compaq. Julian notes his ADD made coding less attractive than talking with others to solve problems and Compaq provided him with opportunities to pivot. Searching out diversity, Julian moved to DC, and had his first taste of startups. He now describes himself as a serial entrepreneur. We thank Julian for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Senior Vice President and Executive in Residence with Rapid7 and Chairman for Cyversity, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. Julian always wanted to do something where he could find a way to help society to basically help others. Starting out as a Baptist minister with aspirations of being a professional musician, Julian found it more practical to take some technology classes and practice his saxophone when he had time. His first tech job was at Texaco where he worked on early networks and moved into systems engineering at Compaq. Julian notes his ADD made coding less attractive than talking with others to solve problems and Compaq provided him with opportunities to pivot. Searching out diversity, Julian moved to DC, and had his first taste of startups. He now describes himself as a serial entrepreneur. We thank Julian for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>664</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[99f326d2-7f7b-11f0-ad89-8b71ce7393a3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7840339857.mp3?updated=1735936615" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Beyond the smoke screen. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/390/notes</link>
      <description>This week, we are joined by Dr. Renée Burton, VP of Infoblox Threat Intel, who is discussing their work on VexTrio, a notorious traffic distribution system (TDS) involved in digital fraud. The VexTrio investigation uncovers a massive global ad fraud and scam operation powered by just 250 virtual machines, tying it directly to named individuals and shell companies across Europe. 

The research exposes VexTrio’s full criminal supply chain—including fake apps, dating scams, affiliate networks, and payment processors—alongside a powerful CDN infrastructure ranked among the world’s top 10k domains. It also calls on the adtech industry to take accountability for enabling and sustaining such widespread abuse.

Complete our annual ⁠⁠⁠⁠audience survey⁠⁠⁠⁠ before August 31.

The research can be found here:


  
⁠VexTrio’s Origin Story : From Spam to Scam to Adtech



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Aug 2025 07:00:00 -0000</pubDate>
      <itunes:title>Beyond the smoke screen. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>390</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/e8e84bec-7f7a-11f0-958a-d3780ecefc49/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Dr. Renée Burton, VP of Infoblox Threat Intel, who is discussing their work on VexTrio, a notorious traffic distribution system (TDS) involved in digital fraud. The VexTrio investigation uncovers a massive global ad fraud and scam operation powered by just 250 virtual machines, tying it directly to named individuals and shell companies across Europe. 

The research exposes VexTrio’s full criminal supply chain—including fake apps, dating scams, affiliate networks, and payment processors—alongside a powerful CDN infrastructure ranked among the world’s top 10k domains. It also calls on the adtech industry to take accountability for enabling and sustaining such widespread abuse.

Complete our annual ⁠⁠⁠⁠audience survey⁠⁠⁠⁠ before August 31.

The research can be found here:


  
⁠VexTrio’s Origin Story : From Spam to Scam to Adtech



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/ren%C3%A9e-burton-b7161110b/">Dr. Renée Burton</a>, VP of <a href="https://www.linkedin.com/company/infoblox/">Infoblox</a> Threat Intel, who is discussing their work on VexTrio, a notorious traffic distribution system (TDS) involved in digital fraud. The VexTrio investigation uncovers a massive global ad fraud and scam operation powered by just 250 virtual machines, tying it directly to named individuals and shell companies across Europe. </p>
<p>The research exposes VexTrio’s full criminal supply chain—including fake apps, dating scams, affiliate networks, and payment processors—alongside a powerful CDN infrastructure ranked among the world’s top 10k domains. It also calls on the adtech industry to take accountability for enabling and sustaining such widespread abuse.</p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JDYLFZ5">⁠⁠⁠⁠audience survey⁠⁠⁠⁠</a> before August 31.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://www.greynoise.io/resources/early-warning-signals-attacker-behavior-precedes-new-vulnerabilities">⁠</a><a href="https://blogs.infoblox.com/threat-intelligence/vextrios-origin-story-from-spam-to-scam-to-adtech/">VexTrio’s Origin Story : From Spam to Scam to Adtech</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1342</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e8e84bec-7f7a-11f0-958a-d3780ecefc49]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8355461711.mp3?updated=1755882159" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A free speech showdown.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2377/notes</link>
      <description>The FTC warns one country’s “online safety” may be another’s “censorship.” A new bipartisan bill aims to reduce barriers to federal cyber jobs. MURKY PANDA targets government, technology, academia, legal, and professional services in North America. MITRE updates their hardware weaknesses list. Customs and Border Protection conducts a record number of device searches at U.S. borders. A recent hoax exposes weaknesses in the cybersecurity community’s verification methods. A Houston man gets four years in prison for sabotaging his employer’s computer systems. A Florida-based provider of sleep apnea equipment suffers a data breach. Interpol dismantles a vast cybercriminal network spanning Africa.  Brandon Karpf shares his experience with fake North Korean job applicants. Being a smooth-talking English speaker can land you a gig in the cybercrime underworld. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Brandon Karpf, friend of the show discussing his experience with fake North Korean job applicants. You can also hear more from Brandon on our show T-Minus Daily, where he’s a regular guest on a monthly space segment—catch his latest episode this Monday!

Selected Reading

US warns tech companies against complying with European and British ‘censorship’ laws (The Record)

House lawmakers take aim at education requirements for federal cyber jobs (CyberScoop)

MURKY PANDA: Trusted-Relationship Cloud Threat (CrowdStrike)

MITRE Updates List of Most Common Hardware Weaknesses (SecurityWeek)

Phone Searches at the US Border Hit a Record High (WIRED)

The Cybersecurity Community's Wake-Up Call: A Fake Reward and Its Lessons (The DefendOps Diaries)

Chinese national who sabotaged Ohio company’s systems handed four-year jail stint (The Record)

CPAP Medical Data Breach Impacts 90,000 People (SecurityWeek)

Interpol-Led African Cybercrime Crackdown Leads to 1209 Arrests (Infosecurity Magazine)

'Impersonation as a service' next big thing in cybercrime (The Register)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 22 Aug 2025 20:10:00 -0000</pubDate>
      <itunes:title>A free speech showdown.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2377</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The FTC warns one country’s “online safety” may be another’s “censorship.” A new bipartisan bill aims to reduce barriers to federal cyber jobs. MURKY PANDA targets government, technology, academia, legal, and professional services in North America. MITRE updates their hardware weaknesses list. Customs and Border Protection conducts a record number of device searches at U.S. borders. A recent hoax exposes weaknesses in the cybersecurity community’s verification methods. A Houston man gets four years in prison for sabotaging his employer’s computer systems. A Florida-based provider of sleep apnea equipment suffers a data breach. Interpol dismantles a vast cybercriminal network spanning Africa.  Brandon Karpf shares his experience with fake North Korean job applicants. Being a smooth-talking English speaker can land you a gig in the cybercrime underworld. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Brandon Karpf, friend of the show discussing his experience with fake North Korean job applicants. You can also hear more from Brandon on our show T-Minus Daily, where he’s a regular guest on a monthly space segment—catch his latest episode this Monday!

Selected Reading

US warns tech companies against complying with European and British ‘censorship’ laws (The Record)

House lawmakers take aim at education requirements for federal cyber jobs (CyberScoop)

MURKY PANDA: Trusted-Relationship Cloud Threat (CrowdStrike)

MITRE Updates List of Most Common Hardware Weaknesses (SecurityWeek)

Phone Searches at the US Border Hit a Record High (WIRED)

The Cybersecurity Community's Wake-Up Call: A Fake Reward and Its Lessons (The DefendOps Diaries)

Chinese national who sabotaged Ohio company’s systems handed four-year jail stint (The Record)

CPAP Medical Data Breach Impacts 90,000 People (SecurityWeek)

Interpol-Led African Cybercrime Crackdown Leads to 1209 Arrests (Infosecurity Magazine)

'Impersonation as a service' next big thing in cybercrime (The Register)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FTC warns one country’s “online safety” may be another’s “censorship.” A new bipartisan bill aims to reduce barriers to federal cyber jobs. MURKY PANDA targets government, technology, academia, legal, and professional services in North America. MITRE updates their hardware weaknesses list. Customs and Border Protection conducts a record number of device searches at U.S. borders. A recent hoax exposes weaknesses in the cybersecurity community’s verification methods. A Houston man gets four years in prison for sabotaging his employer’s computer systems. A Florida-based provider of sleep apnea equipment suffers a data breach. Interpol dismantles a vast cybercriminal network spanning Africa.  Brandon Karpf shares his experience with fake North Korean job applicants. Being a smooth-talking English speaker can land you a gig in the cybercrime underworld.<strong> </strong></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/brandon-karpf/"><u>Brandon Karpf</u></a>, friend of the show discussing his experience with fake North Korean job applicants. You can also hear more from Brandon on our show <a href="https://space.n2k.com/podcasts/t-minus"><u>T-Minus Daily</u></a>, where he’s a regular guest on a monthly space segment—catch his latest episode this Monday!</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/tech-companies-ftc-censorship-laws"><u>US warns tech companies against complying with European and British ‘censorship’ laws</u></a> (The Record)</p>
<p><a href="https://cyberscoop.com/federal-cybersecurity-jobs-education-requirements/"><u>House lawmakers take aim at education requirements for federal cyber jobs</u></a> (CyberScoop)</p>
<p><a href="https://www.crowdstrike.com/en-us/blog/murky-panda-trusted-relationship-threat-in-cloud/"><u>MURKY PANDA: Trusted-Relationship Cloud Threat</u></a> (CrowdStrike)</p>
<p><a href="https://www.securityweek.com/mitre-updates-list-of-most-common-hardware-weaknesses/"><u>MITRE Updates List of Most Common Hardware Weaknesses</u></a> (SecurityWeek)</p>
<p><a href="https://www.wired.com/story/phone-searches-at-the-us-border-hit-a-record-high/"><u>Phone Searches at the US Border Hit a Record High</u></a> (WIRED)</p>
<p><a href="https://thedefendopsdiaries.com/the-cybersecurity-communitys-wake-up-call-a-fake-reward-and-its-lessons/"><u>The Cybersecurity Community's Wake-Up Call: A Fake Reward and Its Lessons</u></a> (The DefendOps Diaries)</p>
<p><a href="https://therecord.media/chinese-national-sentenced-prison"><u>Chinese national who sabotaged Ohio company’s systems handed four-year jail stint</u></a> (The Record)</p>
<p><a href="https://www.securityweek.com/cpap-medical-data-breach-impacts-90000-people/"><u>CPAP Medical Data Breach Impacts 90,000 People</u></a> (SecurityWeek)</p>
<p><a href="https://www.infosecurity-magazine.com/news/interpol-african-cybercrime/"><u>Interpol-Led African Cybercrime Crackdown Leads to 1209 Arrests</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.theregister.com/2025/08/21/impersonation_as_a_service/"><u>'Impersonation as a service' next big thing in cybercrime</u></a> (The Register)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1908</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cbaf0f42-1c7a-11f0-85e0-8bf038a6f1e6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7348153982.mp3?updated=1755888678" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Behind the lock lies a flaw.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2376/notes</link>
      <description>Zero-day clickjacking flaws affect major password managers. The FBI warns that Russian state-backed hackers are exploiting a long-known Cisco flaw. Apple releases emergency patches for a zero-day flaw in the Image I/O framework. Home Depot faces a proposed class action lawsuit accusing it of secretly using facial recognition at self-checkout kiosks. A VPN browser extension has been exposed for secretly spying on users. Browser fingerprinting overtakes cookies as the dominant method of online tracking. Agentic AI browsers prove easily scammed. A Scattered Spider member earns 10 years in federal prison. Ron Zayas, CEO of Ironwall by Incogni, to discuss the massive data sharing and privacy risks in the leading Buy Now Pay Later apps. An Australian bank’s AI cutbacks are put on permanent hold.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Ron Zayas, CEO of Ironwall by Incogni, to discuss the massive data sharing and privacy risks in the leading Buy Now Pay Later apps. Tune in to hear the full conversation on Caveat.

Selected Reading

Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers (Socket)

FBI warns of Russian hackers exploiting 7-year-old Cisco flaw (Bleeping Computer)

Apple fixes new zero-day flaw exploited in targeted attacks (Bleeping Computer)

Home Depot Sued for 'Secretly' Using Facial Recognition Technology on Self-Checkout Cameras (PetaPixel)

SpyVPN: The Google-Featured VPN That Secretly Captures Your Screen (Koi Blog)

Beyond cookies: browser fingerprinting in 2025 (PITG Network)

"Scamlexity": When Agentic AI Browsers Get Scammed (Guardio)

SIM-Swapper, Scattered Spider Hacker Gets 10 Years (Krebs on Security)

Commonwealth Bank backtracks on AI job cuts, apologises for 'error' as call volumes rise (ABC News)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 21 Aug 2025 20:10:00 -0000</pubDate>
      <itunes:title>Behind the lock lies a flaw.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2376</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Zero-day clickjacking flaws affect major password managers. The FBI warns that Russian state-backed hackers are exploiting a long-known Cisco flaw. Apple releases emergency patches for a zero-day flaw in the Image I/O framework. Home Depot faces a proposed class action lawsuit accusing it of secretly using facial recognition at self-checkout kiosks. A VPN browser extension has been exposed for secretly spying on users. Browser fingerprinting overtakes cookies as the dominant method of online tracking. Agentic AI browsers prove easily scammed. A Scattered Spider member earns 10 years in federal prison. Ron Zayas, CEO of Ironwall by Incogni, to discuss the massive data sharing and privacy risks in the leading Buy Now Pay Later apps. An Australian bank’s AI cutbacks are put on permanent hold.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Ron Zayas, CEO of Ironwall by Incogni, to discuss the massive data sharing and privacy risks in the leading Buy Now Pay Later apps. Tune in to hear the full conversation on Caveat.

Selected Reading

Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers (Socket)

FBI warns of Russian hackers exploiting 7-year-old Cisco flaw (Bleeping Computer)

Apple fixes new zero-day flaw exploited in targeted attacks (Bleeping Computer)

Home Depot Sued for 'Secretly' Using Facial Recognition Technology on Self-Checkout Cameras (PetaPixel)

SpyVPN: The Google-Featured VPN That Secretly Captures Your Screen (Koi Blog)

Beyond cookies: browser fingerprinting in 2025 (PITG Network)

"Scamlexity": When Agentic AI Browsers Get Scammed (Guardio)

SIM-Swapper, Scattered Spider Hacker Gets 10 Years (Krebs on Security)

Commonwealth Bank backtracks on AI job cuts, apologises for 'error' as call volumes rise (ABC News)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Zero-day clickjacking flaws affect major password managers. The FBI warns that Russian state-backed hackers are exploiting a long-known Cisco flaw. Apple releases emergency patches for a zero-day flaw in the Image I/O framework. Home Depot faces a proposed class action lawsuit accusing it of secretly using facial recognition at self-checkout kiosks. A VPN browser extension has been exposed for secretly spying on users. Browser fingerprinting overtakes cookies as the dominant method of online tracking. Agentic AI browsers prove easily scammed. A Scattered Spider member earns 10 years in federal prison. Ron Zayas, CEO of Ironwall by Incogni, to discuss the massive data sharing and privacy risks in the leading Buy Now Pay Later apps. An Australian bank’s AI cutbacks are put on permanent hold.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://ironwall360.com/about-us/ron-zayas"><u>Ron Zayas</u></a>, CEO of <a href="https://ironwall.com/"><u>Ironwall</u></a> by Incogni, to discuss the massive data sharing and privacy risks in the leading Buy Now Pay Later apps. Tune in to hear the full conversation on <a href="https://thecyberwire.com/podcasts/caveat"><em>Caveat</em></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://socket.dev/blog/password-manager-clickjacking"><u>Researcher Exposes Zero-Day Clickjacking Vulnerabilities in Major Password Managers</u></a> (Socket)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/fbi-warns-of-russian-hackers-exploiting-cisco-flaw-in-critical-infrastructure-attacks/"><u>FBI warns of Russian hackers exploiting 7-year-old Cisco flaw</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/apple/apple-emergency-updates-fix-new-actively-exploited-zero-day/"><u>Apple fixes new zero-day flaw exploited in targeted attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://petapixel.com/2025/08/20/home-depot-sued-for-secretly-using-facial-recognition-technology-on-self-checkout-cameras/"><u>Home Depot Sued for 'Secretly' Using Facial Recognition Technology on Self-Checkout Cameras</u> </a>(PetaPixel)</p>
<p><a href="https://www.koi.security/blog/spyvpn-the-vpn-that-secretly-captures-your-screen"><u>SpyVPN: The Google-Featured VPN That Secretly Captures Your Screen</u> </a>(Koi Blog)</p>
<p><a href="https://pitg.network/news/2025/08/15/browser-fingerprinting.html"><u>Beyond cookies: browser fingerprinting in 2025</u></a> (PITG Network)</p>
<p><a href="https://guard.io/labs/scamlexity-we-put-agentic-ai-browsers-to-the-test-they-clicked-they-paid-they-failed"><u>"Scamlexity": When Agentic AI Browsers Get Scammed</u></a> (Guardio)</p>
<p><a href="https://krebsonsecurity.com/2025/08/sim-swapper-scattered-spider-hacker-gets-10-years/"><u>SIM-Swapper, Scattered Spider Hacker Gets 10 Years</u> </a>(Krebs on Security)</p>
<p><a href="https://www.abc.net.au/news/2025-08-21/cba-backtracks-on-ai-job-cuts-as-chatbot-lifts-call-volumes/105679492"><u>Commonwealth Bank backtracks on AI job cuts, apologises for 'error' as call volumes rise</u> </a>(ABC News)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1475</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cb864ce2-1c7a-11f0-85e0-fb1632694f22]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8514716612.mp3?updated=1755799353" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Undoing the undo bug.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2375/notes</link>
      <description>Microsoft releases emergency out-of-band (OOB) Windows updates. Trump targets NSA’s leading AI and cyber expert in clearance revocations. A breach may have compromised the privacy of Ohio medical marijuana patients. Cybercriminals exploit an AI website builder to rapidly create phishing sites. Warlock ransomware operators target Microsoft’s SharePoint ToolShell vulnerability. Google and Mozilla patch Chrome and Firefox. European officials report two cyber incidents targeting water infrastructure. A federal appeals court has upheld fines against T-Mobile and Sprint for illegally selling customer location data. Authorities dismantle DDoS powerhouse Rapper Bot. On our Industry Voices segment, we are joined by Matt Radolec, VP - Incident Response, Cloud Operations, and Sales Engineering at Varonis, speaking about ShinyHunters and the problems with securing Salesforce. Microsoft Copilot gets creative with compliance. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

On our Industry Voices segment, we are joined by Matt Radolec, VP - Incident Response, Cloud Operations, and Sales Engineering at Varonis, who is speaking about ShinyHunters and the problems with securing Salesforce. You can hear more from Matt here.



Selected Reading

Microsoft releases emergency updates to fix Windows recovery (Bleeping Computer)

Trump Revokes Security Clearances of 37 Former and Current Officials (The New York Times)

Highly Sensitive Medical Cannabis Patient Data Exposed by Unsecured Database (WIRED)

AI Website Builder Lovable Abused for Phishing and Malware Scams (Hackread)

Warlock Ransomware Hitting Victims Globally Through SharePoint ToolShell Exploit (InfoSecurity Magazine)

High-Severity Vulnerabilities Patched in Chrome, Firefox (SecurityWeek)

Russia-linked European attacks renew concerns over water cybersecurity (CSO Online)

T-Mobile claimed selling location data without consent is legal, judges disagree (Ars Technica)

Officials gain control of Rapper Bot DDoS botnet, charge lead developer and administrator (CyberScoop)

Copilot Broke Your Audit Log, but Microsoft Won’t Tell You (Pistachio Blog)



Audience Survey

Complete our annual audience survey before August 31.



Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 20 Aug 2025 20:10:00 -0000</pubDate>
      <itunes:title>Undoing the undo bug.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2375</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Microsoft releases emergency out-of-band (OOB) Windows updates. Trump targets NSA’s leading AI and cyber expert in clearance revocations. A breach may have compromised the privacy of Ohio medical marijuana patients. Cybercriminals exploit an AI website builder to rapidly create phishing sites. Warlock ransomware operators target Microsoft’s SharePoint ToolShell vulnerability. Google and Mozilla patch Chrome and Firefox. European officials report two cyber incidents targeting water infrastructure. A federal appeals court has upheld fines against T-Mobile and Sprint for illegally selling customer location data. Authorities dismantle DDoS powerhouse Rapper Bot. On our Industry Voices segment, we are joined by Matt Radolec, VP - Incident Response, Cloud Operations, and Sales Engineering at Varonis, speaking about ShinyHunters and the problems with securing Salesforce. Microsoft Copilot gets creative with compliance. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

On our Industry Voices segment, we are joined by Matt Radolec, VP - Incident Response, Cloud Operations, and Sales Engineering at Varonis, who is speaking about ShinyHunters and the problems with securing Salesforce. You can hear more from Matt here.



Selected Reading

Microsoft releases emergency updates to fix Windows recovery (Bleeping Computer)

Trump Revokes Security Clearances of 37 Former and Current Officials (The New York Times)

Highly Sensitive Medical Cannabis Patient Data Exposed by Unsecured Database (WIRED)

AI Website Builder Lovable Abused for Phishing and Malware Scams (Hackread)

Warlock Ransomware Hitting Victims Globally Through SharePoint ToolShell Exploit (InfoSecurity Magazine)

High-Severity Vulnerabilities Patched in Chrome, Firefox (SecurityWeek)

Russia-linked European attacks renew concerns over water cybersecurity (CSO Online)

T-Mobile claimed selling location data without consent is legal, judges disagree (Ars Technica)

Officials gain control of Rapper Bot DDoS botnet, charge lead developer and administrator (CyberScoop)

Copilot Broke Your Audit Log, but Microsoft Won’t Tell You (Pistachio Blog)



Audience Survey

Complete our annual audience survey before August 31.



Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft releases emergency out-of-band (OOB) Windows updates. Trump targets NSA’s leading AI and cyber expert in clearance revocations. A breach may have compromised the privacy of Ohio medical marijuana patients. Cybercriminals exploit an AI website builder to rapidly create phishing sites. Warlock ransomware operators target Microsoft’s SharePoint ToolShell vulnerability. Google and Mozilla patch Chrome and Firefox. European officials report two cyber incidents targeting water infrastructure. A federal appeals court has upheld fines against T-Mobile and Sprint for illegally selling customer location data. Authorities dismantle DDoS powerhouse Rapper Bot. On our Industry Voices segment, we are joined by Matt Radolec, VP - Incident Response, Cloud Operations, and Sales Engineering at Varonis, speaking about ShinyHunters and the problems with securing Salesforce. Microsoft Copilot gets creative with compliance.<strong> </strong></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br></p>
<p><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/matthew-radolec/"><u>Matt Radolec</u></a>, VP - Incident Response, Cloud Operations, and Sales Engineering at <a href="https://www.linkedin.com/company/varonis/"><u>Varonis</u></a>, who is speaking about ShinyHunters and the problems with securing Salesforce. You can hear more from Matt <a href="https://explore.thecyberwire.com/varonis">here</a>.</p>
<p><br></p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-emergency-updates-to-fix-windows-recovery/"><u>Microsoft releases emergency updates to fix Windows recovery</u></a> (Bleeping Computer)</p>
<p><a href="https://www.nytimes.com/2025/08/19/us/politics/trump-security-clearances.html?unlocked_article_code=1.fU8.7Q8i.CxTDapEZ5dxi"><u>Trump Revokes Security Clearances of 37 Former and Current Officials</u></a> (The New York Times)</p>
<p><a href="https://www.wired.com/story/highly-sensitive-medical-cannabis-patient-data-exposed-by-unsecured-database/"><u>Highly Sensitive Medical Cannabis Patient Data Exposed by Unsecured Database</u></a> (WIRED)</p>
<p><a href="https://hackread.com/ai-website-builder-lovable-phishing-malware-scams/"><u>AI Website Builder Lovable Abused for Phishing and Malware Scams</u></a> (Hackread)</p>
<p><a href="https://www.infosecurity-magazine.com/news/warlock-ransomware-sharepoint/"><u>Warlock Ransomware Hitting Victims Globally Through SharePoint ToolShell Exploit</u></a> (InfoSecurity Magazine)</p>
<p><a href="https://www.securityweek.com/high-severity-vulnerabilities-patched-in-chrome-firefox/"><u>High-Severity Vulnerabilities Patched in Chrome, Firefox</u> </a>(SecurityWeek)</p>
<p><a href="https://www.csoonline.com/article/4042449/russia-linked-european-attacks-renew-concerns-over-water-cybersecurity.html"><u>Russia-linked European attacks renew concerns over water cybersecurity</u> </a>(CSO Online)</p>
<p><a href="https://arstechnica.com/tech-policy/2025/08/t-mobile-claimed-selling-location-data-without-consent-is-legal-judges-disagree/"><u>T-Mobile claimed selling location data without consent is legal, judges disagree</u> </a>(Ars Technica)</p>
<p><a href="https://cyberscoop.com/rapper-bot-ddos-botnet-disrupted/"><u>Officials gain control of Rapper Bot DDoS botnet, charge lead developer and administrator</u> </a>(CyberScoop)</p>
<p><a href="https://pistachioapp.com/blog/copilot-broke-your-audit-log"><u>Copilot Broke Your Audit Log, but Microsoft Won’t Tell You</u></a> (Pistachio Blog)</p>
<p><br></p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><br></p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1926</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e2c592dc-7deb-11f0-baea-cf532cead532]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8549570700.mp3?updated=1755715544" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Inside Intel’s internal web maze.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2374/notes</link>
      <description>A researcher uncovers vulnerabilities across Intel’s internal websites that exposed sensitive employee and supplier data. The Kimsuky group (APT43) targets South Korean diplomatic missions. A new DDoS vulnerability bypasses the 2023 “Rapid Reset” fix. Drug development firm Inotiv reports a ransomware attack to the SEC. The UK drops their demand that Apple provide access to encrypted iCloud accounts. Hackers disguise the PipeMagic backdoor as a fake ChatGPT desktop app. The source code for a powerful Android banking trojan was leaked online. A Nebraska man is sentenced to prison for defrauding cloud providers to mine nearly $1 million in cryptocurrency. On this week’s Threat Vector, David Moulton speaks with Liz Pinder and Patrick Bayle for a no holds barred look at context switching in the SOC. A UK police force fails to call for backup.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector

Security analysts are drowning in tools, alerts, and tabs. On today's Threat Vector segment from Palo Alto Networks, we offer a snapshot from host⁠ David Moulton⁠'s conversation with⁠ Liz Pinder⁠ and⁠ Patrick Bayle⁠⁠. Together they take a no holds barred look at context switching in the SOC, what it costs, why it's getting worse, and how smarter design can fix it. You can listen to David, Patrick, and Liz's conversation⁠ here⁠. It’s a must-listen for anyone building or managing a modern SOC. New episodes of⁠ Threat Vector⁠ drop each Thursday on the N2K CyberWire network and in your favorite podcast app.

Selected Reading

Intel data breach: employee data could be accessed via API (Techzine Global)

North Korean Kimsuky Hackers Use GitHub to Target Foreign Embassies with XenoRAT Malware (GB Hackers)

Internet-wide Vulnerability Enables Giant DDoS Attacks (Dark Reading)

Drug development company Inotiv reports ransomware attack to SEC (The Record)

UK ‘agrees to drop’ demand over Apple iCloud encryption, US intelligence head claims (The Record)

Ransomware gang masking PipeMagic backdoor as ChatGPT desktop app: Microsoft (The Record)

ERMAC Android malware source code leak exposes banking trojan infrastructure (Bleeping Computer)

Nebraska man gets 1 year in prison for $3.5M cryptojacking scheme (Bleeping Computer)

South Yorkshire Police Deletes 96,000 Pieces of Digital Evidence  (Infosecurity Magazine) 

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Aug 2025 20:10:00 -0000</pubDate>
      <itunes:title>Inside Intel’s internal web maze.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2374</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A researcher uncovers vulnerabilities across Intel’s internal websites that exposed sensitive employee and supplier data. The Kimsuky group (APT43) targets South Korean diplomatic missions. A new DDoS vulnerability bypasses the 2023 “Rapid Reset” fix. Drug development firm Inotiv reports a ransomware attack to the SEC. The UK drops their demand that Apple provide access to encrypted iCloud accounts. Hackers disguise the PipeMagic backdoor as a fake ChatGPT desktop app. The source code for a powerful Android banking trojan was leaked online. A Nebraska man is sentenced to prison for defrauding cloud providers to mine nearly $1 million in cryptocurrency. On this week’s Threat Vector, David Moulton speaks with Liz Pinder and Patrick Bayle for a no holds barred look at context switching in the SOC. A UK police force fails to call for backup.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector

Security analysts are drowning in tools, alerts, and tabs. On today's Threat Vector segment from Palo Alto Networks, we offer a snapshot from host⁠ David Moulton⁠'s conversation with⁠ Liz Pinder⁠ and⁠ Patrick Bayle⁠⁠. Together they take a no holds barred look at context switching in the SOC, what it costs, why it's getting worse, and how smarter design can fix it. You can listen to David, Patrick, and Liz's conversation⁠ here⁠. It’s a must-listen for anyone building or managing a modern SOC. New episodes of⁠ Threat Vector⁠ drop each Thursday on the N2K CyberWire network and in your favorite podcast app.

Selected Reading

Intel data breach: employee data could be accessed via API (Techzine Global)

North Korean Kimsuky Hackers Use GitHub to Target Foreign Embassies with XenoRAT Malware (GB Hackers)

Internet-wide Vulnerability Enables Giant DDoS Attacks (Dark Reading)

Drug development company Inotiv reports ransomware attack to SEC (The Record)

UK ‘agrees to drop’ demand over Apple iCloud encryption, US intelligence head claims (The Record)

Ransomware gang masking PipeMagic backdoor as ChatGPT desktop app: Microsoft (The Record)

ERMAC Android malware source code leak exposes banking trojan infrastructure (Bleeping Computer)

Nebraska man gets 1 year in prison for $3.5M cryptojacking scheme (Bleeping Computer)

South Yorkshire Police Deletes 96,000 Pieces of Digital Evidence  (Infosecurity Magazine) 

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A researcher uncovers vulnerabilities across Intel’s internal websites that exposed sensitive employee and supplier data. The Kimsuky group (APT43) targets South Korean diplomatic missions. A new DDoS vulnerability bypasses the 2023 “Rapid Reset” fix. Drug development firm Inotiv reports a ransomware attack to the SEC. The UK drops their demand that Apple provide access to encrypted iCloud accounts. Hackers disguise the PipeMagic backdoor as a fake ChatGPT desktop app. The source code for a powerful Android banking trojan was leaked online. A Nebraska man is sentenced to prison for defrauding cloud providers to mine nearly $1 million in cryptocurrency. On this week’s Threat Vector, David Moulton speaks with Liz Pinder and Patrick Bayle for a no holds barred look at context switching in the SOC. A UK police force fails to call for backup.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Threat Vector</strong></p>
<p>Security analysts are drowning in tools, alerts, and tabs. On today's Threat Vector segment from Palo Alto Networks, we offer a snapshot from host<a href="https://www.linkedin.com/in/davidrmoulton/">⁠<u> David Moulton</u>⁠</a>'s conversation with<a href="https://www.linkedin.com/in/liz-pinder-1108928b">⁠<u> Liz Pinder</u>⁠</a> and<a href="https://www.linkedin.com/in/patrickbayle">⁠<u> Patrick Bayle⁠</u>⁠</a>. Together they take a no holds barred look at context switching in the SOC, what it costs, why it's getting worse, and how smarter design can fix it. You can listen to David, Patrick, and Liz's conversation<a href="https://thecyberwire.com/podcasts/threat-vector/80/notes">⁠<u> here</u>⁠</a>. It’s a must-listen for anyone building or managing a modern SOC. New episodes of<a href="https://thecyberwire.com/podcasts/threat-vector">⁠<u> Threat Vector</u>⁠</a> drop each Thursday on the N2K CyberWire network and in your favorite podcast app.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.techzine.eu/news/security/133909/intel-data-breach-employee-data-could-be-accessed-via-api/"><u>Intel data breach: employee data could be accessed via API </u></a>(Techzine Global)</p>
<p><a href="https://gbhackers.com/north-korean-kimsuky-hackers-use-github/"><u>North Korean Kimsuky Hackers Use GitHub to Target Foreign Embassies with XenoRAT Malware</u></a> (GB Hackers)</p>
<p><a href="https://www.darkreading.com/vulnerabilities-threats/internet-wide-vulnerability-giant-ddos-attacks"><u>Internet-wide Vulnerability Enables Giant DDoS Attacks</u></a> (Dark Reading)</p>
<p><a href="https://therecord.media/drug-development-innotiv-ransomware-sec"><u>Drug development company Inotiv reports ransomware attack to SEC</u></a> (The Record)</p>
<p><a href="https://therecord.media/uk-agrees-drop-apple-encryption"><u>UK ‘agrees to drop’ demand over Apple iCloud encryption, US intelligence head claims</u></a> (The Record)</p>
<p><a href="https://therecord.media/ransomware-gang-masking-pipemagic-backdoor"><u>Ransomware gang masking PipeMagic backdoor as ChatGPT desktop app: Microsoft</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/ermac-android-malware-source-code-leak-exposes-banking-trojan-infrastructure/"><u>ERMAC Android malware source code leak exposes banking trojan infrastructure</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/nebraska-man-gets-1-year-in-prison-for-35m-cryptojacking-scheme/"><u>Nebraska man gets 1 year in prison for $3.5M cryptojacking scheme</u></a> (Bleeping Computer)</p>
<p><a href="https://www.infosecurity-magazine.com/news/south-yorkshire-police-deletes/"><u>South Yorkshire Police Deletes 96,000 Pieces of Digital Evidence </u></a> (Infosecurity Magazine) </p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1578</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cb31f142-1c7a-11f0-85e0-dbe7c7960d07]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8598963958.mp3?updated=1755626019" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Workday’s bad day.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2373/notes</link>
      <description>HR software giant Workday discloses a data breach. Researchers uncover a zero-day in Elastic’s EDR software. Ghost-tapping is an emerging fraud technique where cybercriminals use NFC relay attacks to exploit stolen payment card data. Germany may be on a path to ban ad blockers. A security researcher documents multiple serious flaws in McDonald’s systems. There’s a new open-source framework for testing 5G security flaws. New York’s Attorney General sues the banks behind Zelle over fraud allegations. The DOJ charges the alleged Zeppelin ransomware operator and seizes over $2.8 million in cryptocurrency. Tim Starks from CyberScoop discusses the overlooked changes that two Trump executive orders could bring to cybersecurity. Bots build their own echo chambers.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.CyberWire Guest

Today we have Tim Starks from CyberScoop discussing the overlooked changes that two Trump executive orders could bring to cybersecurity.

Selected Reading

HR giant Workday discloses data breach after Salesforce attack (Bleeping Computer)

Researchers report zero-day vulnerability in Elastic Endpoint Detection and Respons Driver that enables system compromise (Beyond Machines)

Ghost-Tapping and the Chinese Cybercriminal Retail Fraud Ecosystem (Recorded Future)

Is Germany on the Brink of Banning Ad Blockers? User Freedom, Privacy, and Security Is At Risk. (Open Policy &amp; Advocacy)

How I Hacked McDonald's (Their Security Contact Was Harder to Find Than Their Secret Sauce Recipe) (bobdahacker)

Boffins say tool can sniff 5G traffic, launch 'attacks' without using rogue base stations (The Register)

New York claims Zelle’s shoddy security enabled a billion dollars in scams  (The Verge)

US Seizes $2.8 Million From Zeppelin Ransomware Operator (SecurityWeek)

Researchers Made a Social Media Platform Where Every User Was AI. The Bots Ended Up at War (Gizmodo)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 18 Aug 2025 20:10:00 -0000</pubDate>
      <itunes:title>Workday’s bad day.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2373</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>HR software giant Workday discloses a data breach. Researchers uncover a zero-day in Elastic’s EDR software. Ghost-tapping is an emerging fraud technique where cybercriminals use NFC relay attacks to exploit stolen payment card data. Germany may be on a path to ban ad blockers. A security researcher documents multiple serious flaws in McDonald’s systems. There’s a new open-source framework for testing 5G security flaws. New York’s Attorney General sues the banks behind Zelle over fraud allegations. The DOJ charges the alleged Zeppelin ransomware operator and seizes over $2.8 million in cryptocurrency. Tim Starks from CyberScoop discusses the overlooked changes that two Trump executive orders could bring to cybersecurity. Bots build their own echo chambers.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.CyberWire Guest

Today we have Tim Starks from CyberScoop discussing the overlooked changes that two Trump executive orders could bring to cybersecurity.

Selected Reading

HR giant Workday discloses data breach after Salesforce attack (Bleeping Computer)

Researchers report zero-day vulnerability in Elastic Endpoint Detection and Respons Driver that enables system compromise (Beyond Machines)

Ghost-Tapping and the Chinese Cybercriminal Retail Fraud Ecosystem (Recorded Future)

Is Germany on the Brink of Banning Ad Blockers? User Freedom, Privacy, and Security Is At Risk. (Open Policy &amp; Advocacy)

How I Hacked McDonald's (Their Security Contact Was Harder to Find Than Their Secret Sauce Recipe) (bobdahacker)

Boffins say tool can sniff 5G traffic, launch 'attacks' without using rogue base stations (The Register)

New York claims Zelle’s shoddy security enabled a billion dollars in scams  (The Verge)

US Seizes $2.8 Million From Zeppelin Ransomware Operator (SecurityWeek)

Researchers Made a Social Media Platform Where Every User Was AI. The Bots Ended Up at War (Gizmodo)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>HR software giant Workday discloses a data breach. Researchers uncover a zero-day in Elastic’s EDR software. Ghost-tapping is an emerging fraud technique where cybercriminals use NFC relay attacks to exploit stolen payment card data. Germany may be on a path to ban ad blockers. A security researcher documents multiple serious flaws in McDonald’s systems. There’s a new open-source framework for testing 5G security flaws. New York’s Attorney General sues the banks behind Zelle over fraud allegations. The DOJ charges the alleged Zeppelin ransomware operator and seizes over $2.8 million in cryptocurrency. Tim Starks from CyberScoop discusses the overlooked changes that two Trump executive orders could bring to cybersecurity. Bots build their own echo chambers.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.<br><strong>CyberWire Guest</strong></p>
<p>Today we have <a href="https://www.linkedin.com/in/tstarks/"><u>Tim Starks</u></a> from <a href="https://www.linkedin.com/company/cyberscoop/"><u>CyberScoop</u></a> discussing the overlooked changes that two Trump executive orders could bring to cybersecurity.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/hr-giant-workday-discloses-data-breach-amid-salesforce-attacks/"><u>HR giant Workday discloses data breach after Salesforce attack</u></a> (Bleeping Computer)</p>
<p><a href="https://beyondmachines.net/event_details/researchers-report-zero-day-vulnerability-in-elastic-endpoint-detection-and-respons-driver-that-enables-system-compromise-g-y-n-u-3/gD2P6Ple2L"><u>Researchers report zero-day vulnerability in Elastic Endpoint Detection and Respons Driver that enables system compromise</u></a> (Beyond Machines)</p>
<p><a href="https://www.recordedfuture.com/research/ghost-tapping-chinese-criminal-ecosystem"><u>Ghost-Tapping and the Chinese Cybercriminal Retail Fraud Ecosystem</u></a> (Recorded Future)</p>
<p><a href="https://blog.mozilla.org/netpolicy/2025/08/14/is-germany-on-the-brink-of-banning-ad-blockers-user-freedom-privacy-and-security-is-at-risk/"><u>Is Germany on the Brink of Banning Ad Blockers? User Freedom, Privacy, and Security Is At Risk. </u></a>(Open Policy &amp; Advocacy)</p>
<p><a href="https://bobdahacker.com/blog/mcdonalds-security-vulnerabilities"><u>How I Hacked McDonald's (Their Security Contact Was Harder to Find Than Their Secret Sauce Recipe) </u></a>(bobdahacker)</p>
<p><a href="https://www.theregister.com/2025/08/18/sni5gect/"><u>Boffins say tool can sniff 5G traffic, launch 'attacks' without using rogue base stations</u></a> (The Register)</p>
<p><a href="https://www.theverge.com/news/758827/new-york-zelle-scams-fraud-lawsuit"><u>New York claims Zelle’s shoddy security enabled a billion dollars in scams </u></a> (The Verge)</p>
<p><a href="https://www.securityweek.com/us-seizes-2-8-million-from-zeppelin-ransomware-operator/"><u>US Seizes $2.8 Million From Zeppelin Ransomware Operator </u></a>(SecurityWeek)</p>
<p><a href="https://gizmodo.com/researchers-made-a-social-media-platform-where-every-user-was-ai-the-bots-ended-up-at-war-2000642012"><u>Researchers Made a Social Media Platform Where Every User Was AI. The Bots Ended Up at War</u></a> (Gizmodo)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1616</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cb06f21c-1c7a-11f0-85e0-c3e12258a554]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2644066011.mp3?updated=1755542523" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Strengthening product security through ethical hacker collaboration. [CyberWire-X]</title>
      <link>https://thecyberwire.com/podcasts/cyberwire-x/52/notes</link>
      <description>Bug bounty programs have become a critical bridge between businesses and ethical hackers, but what does it take to make that relationship thrive? In this episode, Ani Turner, Senior Security Engineer and bug bounty program lead at Adobe, and Jasmin Landry, a seasoned ethical hacker and top-performing researcher on Adobe’s program, dive into the goals, benefits, and hidden challenges of running and contributing to a bug bounty program.

From the motivations that drive hackers and businesses, to the misconceptions that persist in the space, this conversation explores what really makes a bug bounty program successful — and how trust, communication, and shared purpose can lead to stronger security outcomes.

Resources: 


  Learn more about Adobe’s bug bounty program: https://www.adobe.com/trust/security/bug-bounty.html 

  Submit a report to Adobe: https://hackerone.com/adobe?type=team 


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 17 Aug 2025 05:00:00 -0000</pubDate>
      <itunes:title>Strengthening product security through ethical hacker collaboration. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>55</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/4ecfc9d6-94e7-11f0-993c-97f9ef675ef8/image/cca6449db500549f3982c5870b5f89a9.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Bug bounty programs have become a critical bridge between businesses and ethical hackers, but what does it take to make that relationship thrive? In this episode, Ani Turner, Senior Security Engineer and bug bounty program lead at Adobe, and Jasmin Landry, a seasoned ethical hacker and top-performing researcher on Adobe’s program, dive into the goals, benefits, and hidden challenges of running and contributing to a bug bounty program.

From the motivations that drive hackers and businesses, to the misconceptions that persist in the space, this conversation explores what really makes a bug bounty program successful — and how trust, communication, and shared purpose can lead to stronger security outcomes.

Resources: 


  Learn more about Adobe’s bug bounty program: https://www.adobe.com/trust/security/bug-bounty.html 

  Submit a report to Adobe: https://hackerone.com/adobe?type=team 


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Bug bounty programs have become a critical bridge between businesses and ethical hackers, but what does it take to make that relationship thrive? In this episode, <a href="https://www.linkedin.com/in/ani-turner/">Ani Turner</a>, Senior Security Engineer and bug bounty program lead at Adobe, and <a href="https://www.linkedin.com/in/jasminlandry/">Jasmin Landry</a>, a seasoned ethical hacker and top-performing researcher on Adobe’s program, dive into the goals, benefits, and hidden challenges of running and contributing to a bug bounty program.</p>
<p>From the motivations that drive hackers and businesses, to the misconceptions that persist in the space, this conversation explores what really makes a bug bounty program successful — and how trust, communication, and shared purpose can lead to stronger security outcomes.</p>
<p>Resources: </p>
<ul>
  <li>Learn more about Adobe’s bug bounty program:<a href="https://www.adobe.com/trust/security/bug-bounty.html"> https://www.adobe.com/trust/security/bug-bounty.html</a> </li>
  <li>Submit a report to Adobe: <a href="https://hackerone.com/adobe?type=team">https://hackerone.com/adobe?type=team</a> </li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1679</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4ecfc9d6-94e7-11f0-993c-97f9ef675ef8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3299262947.mp3?updated=1754941639" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dr. Rois Ni Thuama: Get into the game. [Cyber governance] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/81/notes</link>
      <description>Please enjoy this encore of Career Notes.

Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pause her studies. While there, she began making music videos and wildlife documentaries. Upon her return to London, Rois started working in corporate governance and risk at a music technology startup. This ignited her enthusiasm for startups. She now works in a company with several coworkers from that tech startup doing cyber governance. Rois advises law students of many ways into the industry including doing coding, learning risk management, and understanding privacy legislation, and then "just get into the game." We thank Rois for sharing her story. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Aug 2025 07:00:00 -0000</pubDate>
      <itunes:title>Dr. Rois Ni Thuama: Get into the game. [Cyber governance] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>81</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/71f75018-79ef-11f0-8452-a7cb8d63b8d2/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Career Notes.

Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pause her studies. While there, she began making music videos and wildlife documentaries. Upon her return to London, Rois started working in corporate governance and risk at a music technology startup. This ignited her enthusiasm for startups. She now works in a company with several coworkers from that tech startup doing cyber governance. Rois advises law students of many ways into the industry including doing coding, learning risk management, and understanding privacy legislation, and then "just get into the game." We thank Rois for sharing her story. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes.</p>
<p>Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pause her studies. While there, she began making music videos and wildlife documentaries. Upon her return to London, Rois started working in corporate governance and risk at a music technology startup. This ignited her enthusiasm for startups. She now works in a company with several coworkers from that tech startup doing cyber governance. Rois advises law students of many ways into the industry including doing coding, learning risk management, and understanding privacy legislation, and then "just get into the game." We thank Rois for sharing her story. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>590</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[71f75018-79ef-11f0-8452-a7cb8d63b8d2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5072675378.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CVE countdown clock. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/389/notes</link>
      <description>Bob Rudis, VP Data Science from GreyNoise, is sharing some insights into their work on "Early Warning Signals:  When Attacker Behavior Precedes New Vulnerabilities." New research reveals a striking trend: in 80% of cases, spikes in malicious activity against enterprise edge technologies like VPNs and firewalls occurred weeks before related CVEs were disclosed. 

The report breaks down this “6-week critical window,” highlighting which vendors show the strongest early-warning patterns and offering tactical steps defenders can take when suspicious spikes emerge. These findings reveal how early attacker activity can be transformed into actionable intelligence, enabling defenders to anticipate and neutralize threats before vulnerabilities are publicly disclosed.

Complete our annual ⁠⁠⁠audience survey⁠⁠⁠ before August 31.

The research can be found here:


  Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Aug 2025 07:00:00 -0000</pubDate>
      <itunes:title>The CVE countdown clock. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>389</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9b1fdf64-79ea-11f0-9309-6bbd12a09408/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Bob Rudis, VP Data Science from GreyNoise, is sharing some insights into their work on "Early Warning Signals:  When Attacker Behavior Precedes New Vulnerabilities." New research reveals a striking trend: in 80% of cases, spikes in malicious activity against enterprise edge technologies like VPNs and firewalls occurred weeks before related CVEs were disclosed. 

The report breaks down this “6-week critical window,” highlighting which vendors show the strongest early-warning patterns and offering tactical steps defenders can take when suspicious spikes emerge. These findings reveal how early attacker activity can be transformed into actionable intelligence, enabling defenders to anticipate and neutralize threats before vulnerabilities are publicly disclosed.

Complete our annual ⁠⁠⁠audience survey⁠⁠⁠ before August 31.

The research can be found here:


  Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/hrbrmstr/">Bob Rudis</a>, VP Data Science from <a href="https://www.linkedin.com/company/greynoise/">GreyNoise</a>, is sharing some insights into their work on "Early Warning Signals:  When Attacker Behavior Precedes New Vulnerabilities." New research reveals a striking trend: in 80% of cases, spikes in malicious activity against enterprise edge technologies like VPNs and firewalls occurred weeks before related CVEs were disclosed. </p>
<p>The report breaks down this “6-week critical window,” highlighting which vendors show the strongest early-warning patterns and offering tactical steps defenders can take when suspicious spikes emerge. These findings reveal how early attacker activity can be transformed into actionable intelligence, enabling defenders to anticipate and neutralize threats before vulnerabilities are publicly disclosed.</p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JDYLFZ5">⁠⁠⁠audience survey⁠⁠⁠</a> before August 31.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.greynoise.io/resources/early-warning-signals-attacker-behavior-precedes-new-vulnerabilities">Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1798</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9b1fdf64-79ea-11f0-9309-6bbd12a09408]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1917146082.mp3?updated=1755270203" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Media server mayday.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2372/notes</link>
      <description>Plex urges users to immediately update their Media Server due to an undisclosed security flaw. Cisco warns of a critical remote code execution flaw in their Secure Firewall Management Center software.Rockwell Automation discloses multiple critical and high-severity flaws. Hackers breached a Canadian House of Commons database. Active law enforcement and government email accounts are sold online for as little as $40. Telecom giant Colt Technology Services suffers a cyber incident disrupting its customer portal. Taiwan launches new measures to boost hospital cybersecurity after ransomware attacks.  NIST has released a concept paper proposing control overlays for securing AI systems. A date with an AI chatbot ends in tragedy. Our guest is Randall Degges, Snyk's Head of Developer and Security Relations, to discuss how underqualified or outsourced coding support can open doors for nation-state threats. Dutch speed cameras are stuck in a cyber-induced siesta.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Randall Degges, Snyk's Head of Developer and Security Relations, to discuss how underqualified or outsourced coding support can open doors for nation-state threats.

Selected Reading

Plex warns users to patch security vulnerability immediately (Bleeping Computer)

Cisco Discloses Critical RCE Flaw in Firewall Management Software (Infosecurity Magazine)

Critical Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Products (SecurityWeek)

CISA Releases Thirty-Two Industrial Control Systems Advisories (CISA.gov)

Hackers Breach Canadian Government Via Microsoft Exploit (Bank Infosecurity)

Compromised Government and Police Email Accounts on the Dark Web (Abnormal.AI)

Telco giant Colt suffers attack, takes systems offline (The Register)

Taiwan announces measures to protect hospitals from hackers (Focus Taiwan)

New NIST Concept Paper Outlines AI-Specific Cybersecurity Framework (Hack Read)

A flirty Meta AI bot invited a retiree to meet. He never made it home. (Reuters)

Dutch prosecution service attack keeps speed cameras offline (The Register)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 15 Aug 2025 20:10:00 -0000</pubDate>
      <itunes:title>Media server mayday.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2372</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Plex urges users to immediately update their Media Server due to an undisclosed security flaw. Cisco warns of a critical remote code execution flaw in their Secure Firewall Management Center software.Rockwell Automation discloses multiple critical and high-severity flaws. Hackers breached a Canadian House of Commons database. Active law enforcement and government email accounts are sold online for as little as $40. Telecom giant Colt Technology Services suffers a cyber incident disrupting its customer portal. Taiwan launches new measures to boost hospital cybersecurity after ransomware attacks.  NIST has released a concept paper proposing control overlays for securing AI systems. A date with an AI chatbot ends in tragedy. Our guest is Randall Degges, Snyk's Head of Developer and Security Relations, to discuss how underqualified or outsourced coding support can open doors for nation-state threats. Dutch speed cameras are stuck in a cyber-induced siesta.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Randall Degges, Snyk's Head of Developer and Security Relations, to discuss how underqualified or outsourced coding support can open doors for nation-state threats.

Selected Reading

Plex warns users to patch security vulnerability immediately (Bleeping Computer)

Cisco Discloses Critical RCE Flaw in Firewall Management Software (Infosecurity Magazine)

Critical Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Products (SecurityWeek)

CISA Releases Thirty-Two Industrial Control Systems Advisories (CISA.gov)

Hackers Breach Canadian Government Via Microsoft Exploit (Bank Infosecurity)

Compromised Government and Police Email Accounts on the Dark Web (Abnormal.AI)

Telco giant Colt suffers attack, takes systems offline (The Register)

Taiwan announces measures to protect hospitals from hackers (Focus Taiwan)

New NIST Concept Paper Outlines AI-Specific Cybersecurity Framework (Hack Read)

A flirty Meta AI bot invited a retiree to meet. He never made it home. (Reuters)

Dutch prosecution service attack keeps speed cameras offline (The Register)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Plex urges users to immediately update their Media Server due to an undisclosed security flaw. Cisco warns of a critical remote code execution flaw in their Secure Firewall Management Center software.Rockwell Automation discloses multiple critical and high-severity flaws. Hackers breached a Canadian House of Commons database. Active law enforcement and government email accounts are sold online for as little as $40. Telecom giant Colt Technology Services suffers a cyber incident disrupting its customer portal. Taiwan launches new measures to boost hospital cybersecurity after ransomware attacks.  NIST has released a concept paper proposing control overlays for securing AI systems. A date with an AI chatbot ends in tragedy. Our guest is Randall Degges, Snyk's Head of Developer and Security Relations, to discuss how underqualified or outsourced coding support can open doors for nation-state threats. Dutch speed cameras are stuck in a cyber-induced siesta.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/rdegges/"><u>Randall Degges</u></a>, <a href="https://www.linkedin.com/company/snyk/"><u>Snyk</u></a>'s Head of Developer and Security Relations, to discuss how underqualified or outsourced coding support can open doors for nation-state threats.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/plex-warns-users-to-patch-security-vulnerability-immediately/"><u>Plex warns users to patch security vulnerability immediately</u></a> (Bleeping Computer)</p>
<p><a href="https://www.infosecurity-magazine.com/news/cisco-critical-rce-flaw-firewall/"><u>Cisco Discloses Critical RCE Flaw in Firewall Management Software </u></a>(Infosecurity Magazine)</p>
<p><a href="https://www.securityweek.com/critical-flaws-patched-in-rockwell-factorytalk-micro800-controllogix-products/"><u>Critical Flaws Patched in Rockwell FactoryTalk, Micro800, ControlLogix Products </u></a>(SecurityWeek)</p>
<p><a href="https://www.cisa.gov/news-events/alerts/2025/08/14/cisa-releases-thirty-two-industrial-control-systems-advisories"><u>CISA Releases Thirty-Two Industrial Control Systems Advisories</u></a> (CISA.gov)</p>
<p><a href="https://www.bankinfosecurity.com/hackers-breach-canadian-government-via-microsoft-exploit-a-29228"><u>Hackers Breach Canadian Government Via Microsoft Exploit</u></a> (Bank Infosecurity)</p>
<p><a href="https://abnormal.ai/blog/compromised-police-government-email-accounts"><u>Compromised Government and Police Email Accounts on the Dark Web</u></a> (Abnormal.AI)</p>
<p><a href="https://www.theregister.com/2025/08/15/london_telco_colts_services_disrupted/"><u>Telco giant Colt suffers attack, takes systems offline </u></a>(The Register)</p>
<p><a href="https://focustaiwan.tw/society/202508150015"><u>Taiwan announces measures to protect hospitals from hackers</u></a> (Focus Taiwan)</p>
<p><a href="https://hackread.com/nist-concept-paper-ai-specific-cybersecurity-framework/"><u>New NIST Concept Paper Outlines AI-Specific Cybersecurity Framework</u></a> (Hack Read)</p>
<p><a href="https://www.reuters.com/investigates/special-report/meta-ai-chatbot-death/"><u>A flirty Meta AI bot invited a retiree to meet. He never made it home.</u></a> (Reuters)</p>
<p><a href="https://www.theregister.com/2025/08/15/cyberattack_on_dutch_prosecution_service/"><u>Dutch prosecution service attack keeps speed cameras offline </u></a>(The Register)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1773</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cada8bc8-1c7a-11f0-85e0-43b885f722ea]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1378392336.mp3?updated=1755281217" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dialysis down, data out.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2371/notes</link>
      <description>A ransomware attack exposes personal medical records of VA patients. New joint guidance from CISA and the NSA emphasizes asset inventory and OT taxonomy. The UK government reportedly spent millions to cover up a data breach. Researchers identified two critical flaws in a widely used print orchestration platform.  Phishing attacks increasingly rely on personalization. Rooting and jailbreaking frameworks pose serious enterprise risks. Fortinet warns of a critical command injection flaw in FortiSIEM. Estonian nationals are sentenced in a crypto Ponzi scheme. Michele Campobasso from Forescout joins us to unpack new research separating the hype from reality around “vibe hacking.” Meet the Blockchain Bandits of Pyongyang.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Michele Campobasso from Forescout joins us to unpack new research separating the hype from reality around “vibe hacking.” Their team tested open-source, underground, and commercial AI models on vulnerability research and exploit development tasks—finding high failure rates and significant limitations, even among top commercial systems.

Selected Reading

Medical records for 1 million dialysis patients breached in data hack of VA vendor (Stars and Stripes)

NSA Joins CISA and Others to Share OT Asset Inventory Guidance (NSA.gov)

CISA warns of N-able N-central flaws exploited in zero-day attacks (Bleeping Computer)

U.K. Secretly Spent $3.2 Million to Stop Journalists From Reporting on Data Breach (The New York Times)

From Support Ticket to Zero Day  (Horizon3.ai)

Personalization in Phishing: Advanced Tactics for Malware Delivery (Cofense)

The Root(ing) Of All Evil: Security Holes That Could Compromise Your Mobile Device (Zimperium)

Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild (Bleeping Computer)

Estonians behind $577 million cryptomining fraud sentenced to 16 months (The Record)

Someone counter-hacked a North Korean IT worker: Here’s what they found (Cointelegraph)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 14 Aug 2025 20:10:00 -0000</pubDate>
      <itunes:title>Dialysis down, data out.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2371</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A ransomware attack exposes personal medical records of VA patients. New joint guidance from CISA and the NSA emphasizes asset inventory and OT taxonomy. The UK government reportedly spent millions to cover up a data breach. Researchers identified two critical flaws in a widely used print orchestration platform.  Phishing attacks increasingly rely on personalization. Rooting and jailbreaking frameworks pose serious enterprise risks. Fortinet warns of a critical command injection flaw in FortiSIEM. Estonian nationals are sentenced in a crypto Ponzi scheme. Michele Campobasso from Forescout joins us to unpack new research separating the hype from reality around “vibe hacking.” Meet the Blockchain Bandits of Pyongyang.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Michele Campobasso from Forescout joins us to unpack new research separating the hype from reality around “vibe hacking.” Their team tested open-source, underground, and commercial AI models on vulnerability research and exploit development tasks—finding high failure rates and significant limitations, even among top commercial systems.

Selected Reading

Medical records for 1 million dialysis patients breached in data hack of VA vendor (Stars and Stripes)

NSA Joins CISA and Others to Share OT Asset Inventory Guidance (NSA.gov)

CISA warns of N-able N-central flaws exploited in zero-day attacks (Bleeping Computer)

U.K. Secretly Spent $3.2 Million to Stop Journalists From Reporting on Data Breach (The New York Times)

From Support Ticket to Zero Day  (Horizon3.ai)

Personalization in Phishing: Advanced Tactics for Malware Delivery (Cofense)

The Root(ing) Of All Evil: Security Holes That Could Compromise Your Mobile Device (Zimperium)

Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild (Bleeping Computer)

Estonians behind $577 million cryptomining fraud sentenced to 16 months (The Record)

Someone counter-hacked a North Korean IT worker: Here’s what they found (Cointelegraph)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A ransomware attack exposes personal medical records of VA patients. New joint guidance from CISA and the NSA emphasizes asset inventory and OT taxonomy. The UK government reportedly spent millions to cover up a data breach. Researchers identified two critical flaws in a widely used print orchestration platform.  Phishing attacks increasingly rely on personalization. Rooting and jailbreaking frameworks pose serious enterprise risks. Fortinet warns of a critical command injection flaw in FortiSIEM. Estonian nationals are sentenced in a crypto Ponzi scheme. Michele Campobasso from Forescout joins us to unpack new research separating the hype from reality around “vibe hacking.” Meet the Blockchain Bandits of Pyongyang.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p><a href="https://www.linkedin.com/in/michele-campobasso-6634b9119/"><u>Michele Campobasso</u></a> from <a href="https://www.linkedin.com/company/forescout-technologies/"><u>Forescout</u></a> joins us to unpack new research separating the hype from reality around “vibe hacking.” Their team tested open-source, underground, and commercial AI models on vulnerability research and exploit development tasks—finding high failure rates and significant limitations, even among top commercial systems.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.stripes.com/veterans/2025-08-13/veterans-dialysis-patients-data-breach-18753704.html"><u>Medical records for 1 million dialysis patients breached in data hack of VA vendor</u></a> (Stars and Stripes)</p>
<p><a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/4273440/nsa-joins-cisa-and-others-to-share-ot-asset-inventory-guidance/"><u>NSA Joins CISA and Others to Share OT Asset Inventory Guidance</u></a> (NSA.gov)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-n-able-n-central-flaws-exploited-in-zero-day-attacks/"><u>CISA warns of N-able N-central flaws exploited in zero-day attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.nytimes.com/2025/08/13/world/europe/uk-data-breach-afghan.html"><u>U.K. Secretly Spent $3.2 Million to Stop Journalists From Reporting on Data Breach </u></a>(The New York Times)</p>
<p><a href="https://horizon3.ai/attack-research/attack-blogs/from-support-ticket-to-zero-day/"><u>From Support Ticket to Zero Day </u></a> (Horizon3.ai)</p>
<p><a href="https://cofense.com/blog/personalization-in-phishing-advanced-tactics-for-malware-delivery"><u>Personalization in Phishing: Advanced Tactics for Malware Delivery</u></a> (Cofense)</p>
<p><a href="https://zimperium.com/blog/the-rooting-of-all-evil-security-holes-that-could-compromise-your-mobile-device"><u>The Root(ing) Of All Evil: Security Holes That Could Compromise Your Mobile Device</u></a> (Zimperium)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/fortinet-warns-of-fortisiem-pre-auth-rce-flaw-with-exploit-in-the-wild/"><u>Fortinet warns of FortiSIEM pre-auth RCE flaw with exploit in the wild</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/estonians-behind-multimillion-dollar-crypto-fraud-sentenced"><u>Estonians behind $577 million cryptomining fraud sentenced to 16 months</u></a> (The Record)</p>
<p><br><a href="https://cointelegraph.com/news/someone-counter-hacked-a-north-korean-it-worker-here-s-what-they-found"><u>Someone counter-hacked a North Korean IT worker: Here’s what they found</u></a> (Cointelegraph)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1606</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[caa97524-1c7a-11f0-85e0-4b4a763000d8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5405654888.mp3?updated=1755198980" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When spies get spied on.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2370/notes</link>
      <description>Patch Tuesday. The Matrix Foundation patches high-severity vulnerabilities in its open-source communications protocol. The “Curly COMrades” Russian-aligned APT targets critical infrastructure. Microsoft tells users to ignore new CertificateServicesClient (CertEnroll) errors.  Researchers uncover a malware campaign hiding the NjRat Remote Access Trojan in a fake Minecraft clone. Motorcycle manufacturer Royal Enfield suffers a ransomware attack. The DOJ details a major operation against the BlackSuit ransomware group. Our guest is Jack Jones, father of Factor Analysis of Information Risk (FAIR) and the FAIR Controls Analytics Model (FAIR-CAM), sharing insights on cyber risk quantification. Data Brokers’ digital hide-and-seek.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Jack Jones, father of Factor Analysis of Information Risk (FAIR) and the FAIR Controls Analytics Model (FAIR-CAM), as he is sharing insights on where he sees the cyber risk quantification market heading.

Selected Reading

Microsoft Patches Over 100 Vulnerabilities (SecurityWeek)

Adobe Patches Over 60 Vulnerabilities Across 13 Products (SecurityWeek)

Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia (SecurityWeek)

Fortinet, Ivanti Release August 2025 Security Patches (SecurityWeek)

ICS Patch Tuesday: Major Vendors Address Code Execution Vulnerabilities (SecurityWeek)

Alarm raised over 'high-severity' vulnerabilities in Matrix messaging protocol (The Record)

'Curly COMrades' APT Hackers Target Critical Organizations Across Multiple Countries (GB Hackers)

Microsoft asks users to ignore certificate enrollment errors (Bleeping Computer)

Fake Minecraft Installer Spreads NjRat Spyware to Steal Data (Hackread)

Motorcycle manufacturer Royal Enfield hit by ransomware attack published: yesterday (Beyond Machines)

US Authorities Seize $1m from BlackSuit Ransomware Group (Infosecurity Magazine)

We caught companies making it harder to delete your personal data online  (The Markup)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 13 Aug 2025 20:10:00 -0000</pubDate>
      <itunes:title>When spies get spied on.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2370</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Patch Tuesday. The Matrix Foundation patches high-severity vulnerabilities in its open-source communications protocol. The “Curly COMrades” Russian-aligned APT targets critical infrastructure. Microsoft tells users to ignore new CertificateServicesClient (CertEnroll) errors.  Researchers uncover a malware campaign hiding the NjRat Remote Access Trojan in a fake Minecraft clone. Motorcycle manufacturer Royal Enfield suffers a ransomware attack. The DOJ details a major operation against the BlackSuit ransomware group. Our guest is Jack Jones, father of Factor Analysis of Information Risk (FAIR) and the FAIR Controls Analytics Model (FAIR-CAM), sharing insights on cyber risk quantification. Data Brokers’ digital hide-and-seek.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Jack Jones, father of Factor Analysis of Information Risk (FAIR) and the FAIR Controls Analytics Model (FAIR-CAM), as he is sharing insights on where he sees the cyber risk quantification market heading.

Selected Reading

Microsoft Patches Over 100 Vulnerabilities (SecurityWeek)

Adobe Patches Over 60 Vulnerabilities Across 13 Products (SecurityWeek)

Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia (SecurityWeek)

Fortinet, Ivanti Release August 2025 Security Patches (SecurityWeek)

ICS Patch Tuesday: Major Vendors Address Code Execution Vulnerabilities (SecurityWeek)

Alarm raised over 'high-severity' vulnerabilities in Matrix messaging protocol (The Record)

'Curly COMrades' APT Hackers Target Critical Organizations Across Multiple Countries (GB Hackers)

Microsoft asks users to ignore certificate enrollment errors (Bleeping Computer)

Fake Minecraft Installer Spreads NjRat Spyware to Steal Data (Hackread)

Motorcycle manufacturer Royal Enfield hit by ransomware attack published: yesterday (Beyond Machines)

US Authorities Seize $1m from BlackSuit Ransomware Group (Infosecurity Magazine)

We caught companies making it harder to delete your personal data online  (The Markup)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Patch Tuesday. The Matrix Foundation patches high-severity vulnerabilities in its open-source communications protocol. The “Curly COMrades” Russian-aligned APT targets critical infrastructure. Microsoft tells users to ignore new CertificateServicesClient (CertEnroll) errors.  Researchers uncover a malware campaign hiding the NjRat Remote Access Trojan in a fake Minecraft clone. Motorcycle manufacturer Royal Enfield suffers a ransomware attack. The DOJ details a major operation against the BlackSuit ransomware group. Our guest is Jack Jones, father of Factor Analysis of Information Risk (FAIR) and the FAIR Controls Analytics Model (FAIR-CAM), sharing insights on cyber risk quantification. Data Brokers’ digital hide-and-seek.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/jonesj26/"><u>Jack Jones</u></a>, father of Factor Analysis of Information Risk (FAIR) and the FAIR Controls Analytics Model (FAIR-CAM), as he is sharing insights on where he sees the cyber risk quantification market heading.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.securityweek.com/microsoft-patches-over-100-vulnerabilities/"><u>Microsoft Patches Over 100 Vulnerabilities </u></a>(SecurityWeek)</p>
<p><a href="https://www.securityweek.com/adobe-patches-over-60-vulnerabilities-across-13-products/"><u>Adobe Patches Over 60 Vulnerabilities Across 13 Products </u></a>(SecurityWeek)</p>
<p><a href="https://www.securityweek.com/chipmaker-patch-tuesday-many-vulnerabilities-addressed-by-intel-amd-nvidia/"><u>Chipmaker Patch Tuesday: Many Vulnerabilities Addressed by Intel, AMD, Nvidia</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/fortinet-ivanti-release-august-2025-security-patches/"><u>Fortinet, Ivanti Release August 2025 Security Patches </u></a>(SecurityWeek)</p>
<p><a href="https://www.securityweek.com/ics-patch-tuesday-major-vendors-address-code-execution-vulnerabilities/"><u>ICS Patch Tuesday: Major Vendors Address Code Execution Vulnerabilities </u></a>(SecurityWeek)</p>
<p><a href="https://therecord.media/matrix-messaging-protocol-high-severity-vulnerabilities"><u>Alarm raised over 'high-severity' vulnerabilities in Matrix messaging protocol</u></a> (The Record)</p>
<p><a href="https://gbhackers.com/curly-comrades-apt-hackers-target-critical-organizations/"><u>'Curly COMrades' APT Hackers Target Critical Organizations Across Multiple Countries</u></a> (GB Hackers)</p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-asks-users-to-ignore-certificate-enrollment-errors/"><u>Microsoft asks users to ignore certificate enrollment errors</u></a> (Bleeping Computer)</p>
<p><a href="https://hackread.com/fake-minecraft-installer-njrat-spyware-steal-data/"><u>Fake Minecraft Installer Spreads NjRat Spyware to Steal Data</u></a> (Hackread)</p>
<p><a href="https://beyondmachines.net/event_details/motorcycle-manufacturer-royal-enfield-hit-by-ransomware-attack-y-y-8-u-e/gD2P6Ple2L"><u>Motorcycle manufacturer Royal Enfield hit by ransomware attack published: yesterday</u></a> (Beyond Machines)</p>
<p><a href="https://www.infosecurity-magazine.com/news/us-seize-1m-blacksuit-ransomware/"><u>US Authorities Seize $1m from BlackSuit Ransomware Group </u></a>(Infosecurity Magazine)</p>
<p><br><a href="https://themarkup.org/privacy/2025/08/12/we-caught-companies-making-it-harder-to-delete-your-data"><u>We caught companies making it harder to delete your personal data online </u></a> (The Markup)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1731</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ca7edf12-1c7a-11f0-85e0-4f928be40ea3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1316256483.mp3?updated=1755111020" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kimsuky gets kim-sunk.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2369/notes</link>
      <description>Hackers leak backend data from the North Korean state-sponsored hacking group Kimsuky. A ransomware attack on a Dutch clinical diagnostics lab exposes medical data of nearly half a million women. One of the world’s largest staffing firms suffers a data breach. Saint Paul, Minnesota, confirms the Interlock ransomware gang was behind a July cyberattack. Researchers jailbreak ChatGPT-5. A cyber incident takes the Pennsylvania Attorney General’s Office entirely offline. A new report quantifies global financial exposure from Operational Technology (OT) cyber incidents. Finnish prosecutors charge a Russian captain for allegedly damaging five critical subsea cables in the Baltic Sea. On our Industry Voices segment, we are joined by Sean Deuby, Semperis’ Principal Technologist, with insights on the global state of ransomware. Hackers take smart buses for a virtual joyride.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Sean Deuby, Semperis’ Principal Technologist, who is sharing insights and observations on the state of ransomware around the globe. If you want to hear the full conversation, check it out here.

Selected Reading

Kimsuky APT Hackers Exposed in Alleged Breach Revealing Phishing Tools and Operational Data (TechNadu)

Ransomware attack on dutch medical lab exposes cancer screening data of almost 500K women (Beyond Machines)

Manpower discloses data breach affecting nearly 145,000 people (Bleeping Computer)

Saint Paul cyberattack linked to Interlock ransomware gang (Bleeping Computer)

Tenable Jailbreaks GPT-5, Gets It To Generate Dangerous Info Despite OpenAI’s New Safety Tech (Tenable)

Pennsylvania Attorney General's Office hit by cybersecurity incident, shuts down digital infrastructure (Beyond Machines)

New Dragos Report Estimates Over $300 Billion in Potential Global OT Cyber Risk Exposure (Business Wire)

The 2025 OT Security Financial Risk Report (Dragos)

Finland charges captain of suspected Russian ‘shadow fleet’ tanker for subsea cable damage (The Record)

Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking (SecurityWeek)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Aug 2025 20:10:00 -0000</pubDate>
      <itunes:title>Kimsuky gets kim-sunk.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2369</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Hackers leak backend data from the North Korean state-sponsored hacking group Kimsuky. A ransomware attack on a Dutch clinical diagnostics lab exposes medical data of nearly half a million women. One of the world’s largest staffing firms suffers a data breach. Saint Paul, Minnesota, confirms the Interlock ransomware gang was behind a July cyberattack. Researchers jailbreak ChatGPT-5. A cyber incident takes the Pennsylvania Attorney General’s Office entirely offline. A new report quantifies global financial exposure from Operational Technology (OT) cyber incidents. Finnish prosecutors charge a Russian captain for allegedly damaging five critical subsea cables in the Baltic Sea. On our Industry Voices segment, we are joined by Sean Deuby, Semperis’ Principal Technologist, with insights on the global state of ransomware. Hackers take smart buses for a virtual joyride.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Sean Deuby, Semperis’ Principal Technologist, who is sharing insights and observations on the state of ransomware around the globe. If you want to hear the full conversation, check it out here.

Selected Reading

Kimsuky APT Hackers Exposed in Alleged Breach Revealing Phishing Tools and Operational Data (TechNadu)

Ransomware attack on dutch medical lab exposes cancer screening data of almost 500K women (Beyond Machines)

Manpower discloses data breach affecting nearly 145,000 people (Bleeping Computer)

Saint Paul cyberattack linked to Interlock ransomware gang (Bleeping Computer)

Tenable Jailbreaks GPT-5, Gets It To Generate Dangerous Info Despite OpenAI’s New Safety Tech (Tenable)

Pennsylvania Attorney General's Office hit by cybersecurity incident, shuts down digital infrastructure (Beyond Machines)

New Dragos Report Estimates Over $300 Billion in Potential Global OT Cyber Risk Exposure (Business Wire)

The 2025 OT Security Financial Risk Report (Dragos)

Finland charges captain of suspected Russian ‘shadow fleet’ tanker for subsea cable damage (The Record)

Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking (SecurityWeek)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hackers leak backend data from the North Korean state-sponsored hacking group Kimsuky. A ransomware attack on a Dutch clinical diagnostics lab exposes medical data of nearly half a million women. One of the world’s largest staffing firms suffers a data breach. Saint Paul, Minnesota, confirms the Interlock ransomware gang was behind a July cyberattack. Researchers jailbreak ChatGPT-5. A cyber incident takes the Pennsylvania Attorney General’s Office entirely offline. A new report quantifies global financial exposure from Operational Technology (OT) cyber incidents. Finnish prosecutors charge a Russian captain for allegedly damaging five critical subsea cables in the Baltic Sea. On our Industry Voices segment, we are joined by Sean Deuby, Semperis’ Principal Technologist, with insights on the global state of ransomware. Hackers take smart buses for a virtual joyride.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/seandeuby/"><u>Sean Deuby</u></a>, <a href="https://www.linkedin.com/company/semperis/"><u>Semperis</u></a>’ Principal Technologist, who is sharing insights and observations on the state of ransomware around the globe. If you want to hear the full conversation, check it out <a href="https://explore.thecyberwire.com/sean-deuby">here</a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.technadu.com/kimsuky-apt-hackers-exposed-in-alleged-breach-revealing-phishing-tools-and-operational-data/605836/"><u>Kimsuky APT Hackers Exposed in Alleged Breach Revealing Phishing Tools and Operational Data</u></a> (TechNadu)</p>
<p><a href="https://beyondmachines.net/event_details/ransomware-attack-on-dutch-medical-lab-exposes-cancer-screening-data-of-almost-500k-women-j-8-d-c-7/gD2P6Ple2L"><u>Ransomware attack on dutch medical lab exposes cancer screening data of almost 500K women</u></a> (Beyond Machines)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/manpower-staffing-agency-discloses-data-breach-after-attack-claimed-by-ransomhub/"><u>Manpower discloses data breach affecting nearly 145,000 people</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/saint-paul-cyberattack-linked-to-interlock-ransomware-gang/"><u>Saint Paul cyberattack linked to Interlock ransomware gang</u></a> (Bleeping Computer)</p>
<p><a href="https://www.tenable.com/blog/tenable-jailbreaks-gpt-5-gets-it-to-generate-dangerous-info-despite-openais-new-safety-tech"><u>Tenable Jailbreaks GPT-5, Gets It To Generate Dangerous Info Despite OpenAI’s New Safety Tech</u></a> (Tenable)</p>
<p><a href="https://beyondmachines.net/event_details/pennsylvania-attorney-general-s-office-hit-by-cybersecurity-incident-shuts-down-digital-infrastructure-8-6-4-9-r/gD2P6Ple2L"><u>Pennsylvania Attorney General's Office hit by cybersecurity incident, shuts down digital infrastructure</u></a> (Beyond Machines)</p>
<p><a href="https://www.businesswire.com/news/home/20250812165168/en/New-Dragos-Report-Estimates-Over-%24300-Billion-in-Potential-Global-OT-Cyber-Risk-Exposure"><u>New Dragos Report Estimates Over $300 Billion in Potential Global OT Cyber Risk Exposure</u></a> (Business Wire)</p>
<p><a href="https://www.dragos.com/2025-ot-security-financial-risk-report/"><u>The 2025 OT Security Financial Risk Report </u></a>(Dragos)</p>
<p><a href="https://therecord.media/finland-charges-captain-russia-ghost-fleet-undersea-cable"><u>Finland charges captain of suspected Russian ‘shadow fleet’ tanker for subsea cable damage</u></a> (The Record)</p>
<p><a href="https://www.securityweek.com/free-wi-fi-leaves-buses-vulnerable-to-remote-hacking/"><u>Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking </u></a>(SecurityWeek)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1692</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ca549086-1c7a-11f0-85e0-53318123b42d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7735477988.mp3?updated=1755025345" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Deadlines in the cloud.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2368/notes</link>
      <description>CISA issues an Emergency Directive to urgently patch a critical vulnerability in Microsoft Exchange hybrid configurations. SoupDealer malware proves highly evasive. Google patches a Gemini calendar flaw. A North Korean espionage group pivots to financial crime. Russia’s RomCom exploits a WinRAR zero-day. Researchers turn Linux-based webcams into persistent threats. The Franklin Project enlists volunteer hackers to strengthen cybersecurity at U.S. water utilities. DoD announces the winner of DARPA’s two-year AI Cyber Challenge. The U.S. extradites Ghanaian nationals for their roles in a massive fraud ring. Our guest is Steve Deitz, President of MANTECH's Federal Civilian Sector, with a look at cell-based Security Operations Centers (SOC). AI advice turns dinner into a medical mystery.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices, we are joined by Steve Deitz, President of MANTECH's Federal Civilian Sector, as he is  discussing  the cell-based Security Operations Center (SOC) approach. Check out the full conversation from Steve here. 

Selected Reading

Understanding and Mitigating CVE-2025-53786: A Critical Microsoft Exchange Vulnerability (The DefendOps Diaries)

CISA Issues Urgent Advisory to Address Microsoft Exchange Flaw (GB Hackers)

SoupDealer Malware Evades Sandboxes, AVs, and EDR/XDR in Real-World Attacks (GB Hackers)

Google Calendar invites let researchers hijack Gemini to leak user data (Bleeping Computer)

North Korean Group ScarCruft Expands From Spying to Ransomware Attacks (Hackread)

Russian Hackers Exploited WinRAR Zero-Day in Attacks on Europe, Canada (SecurityWeek)

BadCam: New BadUSB Attack Turns Linux Webcams Into Persistent Threats (SecurityWeek)

DEF CON hackers plug security holes in US water systems (The Register)

DARPA announces $4 million winner of AI code review competition at DEF CON (The Record)

'Chairmen' of $100 million scam operation extradited to US (Bleeping Computer)

Guy Gives Himself 19th Century Psychiatric Illness After Consulting With ChatGPT (404 Media) 

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 11 Aug 2025 20:10:00 -0000</pubDate>
      <itunes:title>Deadlines in the cloud.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2368</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA issues an Emergency Directive to urgently patch a critical vulnerability in Microsoft Exchange hybrid configurations. SoupDealer malware proves highly evasive. Google patches a Gemini calendar flaw. A North Korean espionage group pivots to financial crime. Russia’s RomCom exploits a WinRAR zero-day. Researchers turn Linux-based webcams into persistent threats. The Franklin Project enlists volunteer hackers to strengthen cybersecurity at U.S. water utilities. DoD announces the winner of DARPA’s two-year AI Cyber Challenge. The U.S. extradites Ghanaian nationals for their roles in a massive fraud ring. Our guest is Steve Deitz, President of MANTECH's Federal Civilian Sector, with a look at cell-based Security Operations Centers (SOC). AI advice turns dinner into a medical mystery.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices, we are joined by Steve Deitz, President of MANTECH's Federal Civilian Sector, as he is  discussing  the cell-based Security Operations Center (SOC) approach. Check out the full conversation from Steve here. 

Selected Reading

Understanding and Mitigating CVE-2025-53786: A Critical Microsoft Exchange Vulnerability (The DefendOps Diaries)

CISA Issues Urgent Advisory to Address Microsoft Exchange Flaw (GB Hackers)

SoupDealer Malware Evades Sandboxes, AVs, and EDR/XDR in Real-World Attacks (GB Hackers)

Google Calendar invites let researchers hijack Gemini to leak user data (Bleeping Computer)

North Korean Group ScarCruft Expands From Spying to Ransomware Attacks (Hackread)

Russian Hackers Exploited WinRAR Zero-Day in Attacks on Europe, Canada (SecurityWeek)

BadCam: New BadUSB Attack Turns Linux Webcams Into Persistent Threats (SecurityWeek)

DEF CON hackers plug security holes in US water systems (The Register)

DARPA announces $4 million winner of AI code review competition at DEF CON (The Record)

'Chairmen' of $100 million scam operation extradited to US (Bleeping Computer)

Guy Gives Himself 19th Century Psychiatric Illness After Consulting With ChatGPT (404 Media) 

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA issues an Emergency Directive to urgently patch a critical vulnerability in Microsoft Exchange hybrid configurations. SoupDealer malware proves highly evasive. Google patches a Gemini calendar flaw. A North Korean espionage group pivots to financial crime. Russia’s RomCom exploits a WinRAR zero-day. Researchers turn Linux-based webcams into persistent threats. The Franklin Project enlists volunteer hackers to strengthen cybersecurity at U.S. water utilities. DoD announces the winner of DARPA’s two-year AI Cyber Challenge. The U.S. extradites Ghanaian nationals for their roles in a massive fraud ring. Our guest is Steve Deitz, President of MANTECH's Federal Civilian Sector, with a look at cell-based Security Operations Centers (SOC). AI advice turns dinner into a medical mystery.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On today’s Industry Voices, we are joined by <a href="https://www.linkedin.com/in/stephen-deitz-03982a4/"><u>Steve Deitz</u></a>, President of <a href="https://www.linkedin.com/company/mantech/"><u>MANTECH</u></a>'s Federal Civilian Sector, as he is  discussing  the cell-based Security Operations Center (SOC) approach. Check out the full conversation from Steve <a href="https://explore.thecyberwire.com/n2k-cyberwire-mantech"><u>here</u></a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://thedefendopsdiaries.com/understanding-and-mitigating-cve-2025-53786-a-critical-microsoft-exchange-vulnerability/"><u>Understanding and Mitigating CVE-2025-53786: A Critical Microsoft Exchange Vulnerability</u></a> (The DefendOps Diaries)</p>
<p><a href="https://gbhackers.com/cisa-advisory-microsoft-exchange-flaw/"><u>CISA Issues Urgent Advisory to Address Microsoft Exchange Flaw</u></a> (GB Hackers)</p>
<p><a href="https://gbhackers.com/soupdealer-malware-evades-sandboxes-avs-and-edr-xdr/"><u>SoupDealer Malware Evades Sandboxes, AVs, and EDR/XDR in Real-World Attacks</u></a> (GB Hackers)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/google-calendar-invites-let-researchers-hijack-gemini-to-leak-user-data/"><u>Google Calendar invites let researchers hijack Gemini to leak user data</u></a> (Bleeping Computer)</p>
<p><a href="https://hackread.com/north-korean-group-scarcruft-spying-ransomware-attacks/"><u>North Korean Group ScarCruft Expands From Spying to Ransomware Attacks</u></a> (Hackread)</p>
<p><a href="https://www.securityweek.com/russian-hackers-exploited-winrar-zero-day-in-attacks-on-europe-canada/"><u>Russian Hackers Exploited WinRAR Zero-Day in Attacks on Europe, Canada</u> </a>(SecurityWeek)</p>
<p><a href="https://www.securityweek.com/badcam-new-badusb-attack-turns-linux-webcams-into-persistent-threats/"><u>BadCam: New BadUSB Attack Turns Linux Webcams Into Persistent Threats</u> </a>(SecurityWeek)</p>
<p><a href="https://www.theregister.com/2025/08/10/def_con_hackers_water_security/"><u>DEF CON hackers plug security holes in US water systems</u> </a>(The Register)</p>
<p><a href="https://therecord.media/darpa-ai-code-competition-winner-def-con"><u>DARPA announces $4 million winner of AI code review competition at DEF CON</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/us-charges-ghanaians-linked-to-theft-of-100-million-in-romance-scams-bec-attacks/"><u>'Chairmen' of $100 million scam operation extradited to US</u></a> (Bleeping Computer)</p>
<p><a href="https://www.404media.co/guy-gives-himself-19th-century-psychiatric-illness-after-consulting-with-chatgpt/"><u>Guy Gives Himself 19th Century Psychiatric Illness After Consulting With ChatGPT</u></a> (404 Media) </p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1790</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ca294f3e-1c7a-11f0-85e0-8f9edb8c6a40]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2188467385.mp3?updated=1754935603" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ed Amoroso: Security shouldn't be the main dish. [Computer Science] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/80/notes</link>
      <description>Please enjoy this encore of Career Notes.

Chief Executive Officer and Founder of TAG Cyber, Ed Amoroso, shares how he learned on the job and grew his career. In his words, Ed "went from my dad having an ARPANET connection and I'm learning Pascal, to Bell Labs, to CISO, to business, to quitting, to starting something new. And now I'm riding a new exponential up and it's a hell of a ride." Hear from Ed how he sees security as a side dish that you'll progress into naturally once you've paid your dues and mastered a skill like networking, software or databases. We thank Ed for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 10 Aug 2025 07:00:00 -0000</pubDate>
      <itunes:title>Ed Amoroso: Security shouldn't be the main dish. [Computer Science] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>80</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/41146f76-745e-11f0-85ba-830580539cd8/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes.

Chief Executive Officer and Founder of TAG Cyber, Ed Amoroso, shares how he learned on the job and grew his career. In his words, Ed "went from my dad having an ARPANET connection and I'm learning Pascal, to Bell Labs, to CISO, to business, to quitting, to starting something new. And now I'm riding a new exponential up and it's a hell of a ride." Hear from Ed how he sees security as a side dish that you'll progress into naturally once you've paid your dues and mastered a skill like networking, software or databases. We thank Ed for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes.</p>
<p>Chief Executive Officer and Founder of TAG Cyber, Ed Amoroso, shares how he learned on the job and grew his career. In his words, Ed "went from my dad having an ARPANET connection and I'm learning Pascal, to Bell Labs, to CISO, to business, to quitting, to starting something new. And now I'm riding a new exponential up and it's a hell of a ride." Hear from Ed how he sees security as a side dish that you'll progress into naturally once you've paid your dues and mastered a skill like networking, software or databases. We thank Ed for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>663</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[41146f76-745e-11f0-85ba-830580539cd8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5895998206.mp3?updated=1735936614" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When malware plays pretend. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/388/notes</link>
      <description>Nicolás Chiaraviglio, Chief Scientist from Zimperium's zLabs, joins to  discuss their work on "Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed." Zimperium’s zLabs team has been tracking an evolving banker trojan dubbed DoubleTrouble, which has grown more sophisticated in both its distribution and capabilities. Initially spread via phishing sites impersonating European banks, it now uses malicious APKs hosted in Discord channels, and boasts features like screen recording, keylogging, UI overlays, and app blocking—all while heavily abusing Android’s Accessibility Services. 

Despite advanced obfuscation and dynamic evasion techniques, Zimperium’s on-device detection tools have successfully identified both known and previously unseen variants, helping protect users from credential theft, financial fraud, and device compromise.

Complete our annual ⁠⁠audience survey⁠⁠ before August 31.

The research can be found here:


  
⁠Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Aug 2025 07:00:00 -0000</pubDate>
      <itunes:title>When malware plays pretend. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>388</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/fd1265e2-7482-11f0-88dc-77e41a1e4d74/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Nicolás Chiaraviglio, Chief Scientist from Zimperium's zLabs, joins to  discuss their work on "Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed." Zimperium’s zLabs team has been tracking an evolving banker trojan dubbed DoubleTrouble, which has grown more sophisticated in both its distribution and capabilities. Initially spread via phishing sites impersonating European banks, it now uses malicious APKs hosted in Discord channels, and boasts features like screen recording, keylogging, UI overlays, and app blocking—all while heavily abusing Android’s Accessibility Services. 

Despite advanced obfuscation and dynamic evasion techniques, Zimperium’s on-device detection tools have successfully identified both known and previously unseen variants, helping protect users from credential theft, financial fraud, and device compromise.

Complete our annual ⁠⁠audience survey⁠⁠ before August 31.

The research can be found here:


  
⁠Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/nicolaschiaraviglio/">Nicolás Chiaraviglio</a>, Chief Scientist from <a href="https://www.linkedin.com/company/zimperium/">Zimperium</a>'s zLabs, joins to  discuss their work on "Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed." Zimperium’s zLabs team has been tracking an evolving banker trojan dubbed <em>DoubleTrouble</em>, which has grown more sophisticated in both its distribution and capabilities. Initially spread via phishing sites impersonating European banks, it now uses malicious APKs hosted in Discord channels, and boasts features like screen recording, keylogging, UI overlays, and app blocking—all while heavily abusing Android’s Accessibility Services. </p>
<p>Despite advanced obfuscation and dynamic evasion techniques, Zimperium’s on-device detection tools have successfully identified both known and previously unseen variants, helping protect users from credential theft, financial fraud, and device compromise.</p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JDYLFZ5">⁠⁠audience survey⁠⁠</a> before August 31.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://www.semperis.com/blog/noauth-abuse-alert-full-account-takeover/">⁠</a><a href="https://zimperium.com/blog/behind-random-words-doubletrouble-mobile-banking-trojan-revealed">Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1230</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fd1265e2-7482-11f0-88dc-77e41a1e4d74]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9076440020.mp3?updated=1754675331" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Reflections in a broken vault.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2367/notes</link>
      <description>Researchers uncover multiple vulnerabilities in a popular open-source secrets manager. Software bugs threaten satellite safety. Columbia University confirms a cyberattack. Researchers uncover malicious NPM packages posing as WhatsApp development tools.A new EDR killer tool is being used by multiple ransomware gangs. Home Improvement stores integrate AI license plate readers into their parking lots. The U.S. federal judiciary announces new cybersecurity measures after cyberattacks compromised its case management system. CISA officials reaffirm their commitment to the CVE Program. Our guest is David Wiseman, Vice President of Secure Communications at BlackBerry, discussing the challenges of secure communications. AI watermarking breaks under spectral pressure.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by David Wiseman, Vice President of Secure Communications at BlackBerry, who is discussing the challenges and misconceptions around secure communications.

Selected Reading

HashiCorp Vault 0-Day Flaws Enable Remote Code Execution Attacks (GB Hackers)

Yamcs v5.8.6 Vulnerability Assessment (VisionSpace)

Columbia University says hacker stole SSNs and other data of nearly 900,000 (The Record)

Fake WhatsApp developer libraries hide destructive data-wiping code (Bleeping Computer)

New EDR killer tool used by eight different ransomware groups (Bleeping Computer)

Home Depot and Lowe's Share Data From Hundreds of AI Cameras With Cops (404 Media)

US Federal Judiciary Tightens Security Following Escalated Cyber-Attacks (Infosecurity Magazine)

CISA pledges to continue backing CVE Program after April funding fiasco  (The Record)

CISA Issues 10 ICS Advisories Detailing Vulnerabilities and Exploits (GB Hackers)

AI Watermark Remover Defeats Top Techniques  (IEEE Spectrum)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 08 Aug 2025 20:10:00 -0000</pubDate>
      <itunes:title>Reflections in a broken vault.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2367</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Researchers uncover multiple vulnerabilities in a popular open-source secrets manager. Software bugs threaten satellite safety. Columbia University confirms a cyberattack. Researchers uncover malicious NPM packages posing as WhatsApp development tools.A new EDR killer tool is being used by multiple ransomware gangs. Home Improvement stores integrate AI license plate readers into their parking lots. The U.S. federal judiciary announces new cybersecurity measures after cyberattacks compromised its case management system. CISA officials reaffirm their commitment to the CVE Program. Our guest is David Wiseman, Vice President of Secure Communications at BlackBerry, discussing the challenges of secure communications. AI watermarking breaks under spectral pressure.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by David Wiseman, Vice President of Secure Communications at BlackBerry, who is discussing the challenges and misconceptions around secure communications.

Selected Reading

HashiCorp Vault 0-Day Flaws Enable Remote Code Execution Attacks (GB Hackers)

Yamcs v5.8.6 Vulnerability Assessment (VisionSpace)

Columbia University says hacker stole SSNs and other data of nearly 900,000 (The Record)

Fake WhatsApp developer libraries hide destructive data-wiping code (Bleeping Computer)

New EDR killer tool used by eight different ransomware groups (Bleeping Computer)

Home Depot and Lowe's Share Data From Hundreds of AI Cameras With Cops (404 Media)

US Federal Judiciary Tightens Security Following Escalated Cyber-Attacks (Infosecurity Magazine)

CISA pledges to continue backing CVE Program after April funding fiasco  (The Record)

CISA Issues 10 ICS Advisories Detailing Vulnerabilities and Exploits (GB Hackers)

AI Watermark Remover Defeats Top Techniques  (IEEE Spectrum)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers uncover multiple vulnerabilities in a popular open-source secrets manager. Software bugs threaten satellite safety. Columbia University confirms a cyberattack. Researchers uncover malicious NPM packages posing as WhatsApp development tools.A new EDR killer tool is being used by multiple ransomware gangs. Home Improvement stores integrate AI license plate readers into their parking lots. The U.S. federal judiciary announces new cybersecurity measures after cyberattacks compromised its case management system. CISA officials reaffirm their commitment to the CVE Program. Our guest is David Wiseman, Vice President of Secure Communications at BlackBerry, discussing the challenges of secure communications. AI watermarking breaks under spectral pressure.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/davidjwiseman/"><u>David Wiseman</u></a>, Vice President of Secure Communications at <a href="https://www.linkedin.com/company/blackberry/"><u>BlackBerry</u></a>, who is discussing the challenges and misconceptions around secure communications.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://gbhackers.com/hashicorp-vault-0-day-flaws/"><u>HashiCorp Vault 0-Day Flaws Enable Remote Code Execution Attacks</u></a> (GB Hackers)</p>
<p><a href="https://visionspace.com/yamcs-v5-8-6-vulnerability-assessment/"><u>Yamcs v5.8.6 Vulnerability Assessment</u> </a>(VisionSpace)</p>
<p><a href="https://therecord.media/columbia-university-data-breach-cyberattack-notifications"><u>Columbia University says hacker stole SSNs and other data of nearly 900,000</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/fake-whatsapp-developer-libraries-hide-destructive-data-wiping-code/"><u>Fake WhatsApp developer libraries hide destructive data-wiping code</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/new-edr-killer-tool-used-by-eight-different-ransomware-groups/"><u>New EDR killer tool used by eight different ransomware groups</u></a> (Bleeping Computer)</p>
<p><a href="https://www.404media.co/home-depot-and-lowes-share-data-from-hundreds-of-ai-cameras-with-cops/"><u>Home Depot and Lowe's Share Data From Hundreds of AI Cameras With Cops</u></a> (404 Media)</p>
<p><a href="https://www.infosecurity-magazine.com/news/us-judiciary-security-cyber-attacks/"><u>US Federal Judiciary Tightens Security Following Escalated Cyber-Attacks</u></a> (Infosecurity Magazine)</p>
<p><a href="https://therecord.media/cisa-pledges-support-cve-program-black-hat"><u>CISA pledges to continue backing CVE Program after April funding fiasco</u></a>  (The Record)</p>
<p><a href="https://gbhackers.com/cisa-issues-10-ics-advisories-2/"><u>CISA Issues 10 ICS Advisories Detailing Vulnerabilities and Exploits</u></a> (GB Hackers)</p>
<p><a href="https://spectrum.ieee.org/ai-watermark-remover"><u>AI Watermark Remover Defeats Top Techniques </u></a> (IEEE Spectrum)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1767</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c9fdbedc-1c7a-11f0-85e0-5b09e7855f82]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3770369275.mp3?updated=1754680818" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exchange hybrid flaw raises cloud alarm.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2366/notes</link>
      <description>Microsoft warns of a high-severity vulnerability in Exchange Server hybrid deployments. A Dutch airline and a French telecom report data breaches. Researchers reveal new HTTP request smuggling variants. An Israeli spyware maker may have rebranded to evade U.S. sanctions. CyberArk patches critical vulnerabilities in its secrets management platform. The Akira gang use a legit Intel CPU tuning driver to disable Microsoft Defender. ChatGPT Connectors are shown vulnerable to indirect prompt injection. Researchers expose new details about the VexTrio cybercrime network. SonicWall says a recent SSLVPN-related cyber activity is not due to a zero-day. Ryan Whelan from Accenture is our man on the street at Black Hat. Do androids dream of concierge duty?

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

We continue our coverage from the floor at Black Hat USA 2025 with another edition of Man on the Street. This time, we’re catching up with Ryan Whelan, Managing Director and Global Head of Cyber Intelligence at Accenture, to hear what’s buzzing at the conference.

Selected Reading

Microsoft warns of high-severity flaw in hybrid Exchange deployments (Bleeping Computer)

KLM suffers cyber breach affecting six million passengers (IO+)

Cyberattack hits France’s third-largest mobile operator, millions of customers affected (The Record)

New HTTP Request Smuggling Attacks Impacted CDNs, Major Orgs, Millions of Websites (SecurityWeek)

Candiru Spyware Infrastructure Uncovered (BankInfoSecurity)

Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities (SecurityWeek)

Akira ransomware abuses CPU tuning tool to disable Microsoft Defender (Bleeping Computer)

A Single Poisoned Document Could Leak ‘Secret’ Data Via ChatGPT (WIRED)

Researchers Expose Infrastructure Behind Cybercrime Network VexTrio (Infosecurity Magazine)

Gen 7 and newer SonicWall Firewalls – SSLVPN Recent Threat Activity (SonicWall)

Want a Different Kind of Work Trip? Try a Robot Hotel (WIRED)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 07 Aug 2025 20:10:00 -0000</pubDate>
      <itunes:title>Exchange hybrid flaw raises cloud alarm.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2366</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Microsoft warns of a high-severity vulnerability in Exchange Server hybrid deployments. A Dutch airline and a French telecom report data breaches. Researchers reveal new HTTP request smuggling variants. An Israeli spyware maker may have rebranded to evade U.S. sanctions. CyberArk patches critical vulnerabilities in its secrets management platform. The Akira gang use a legit Intel CPU tuning driver to disable Microsoft Defender. ChatGPT Connectors are shown vulnerable to indirect prompt injection. Researchers expose new details about the VexTrio cybercrime network. SonicWall says a recent SSLVPN-related cyber activity is not due to a zero-day. Ryan Whelan from Accenture is our man on the street at Black Hat. Do androids dream of concierge duty?

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

We continue our coverage from the floor at Black Hat USA 2025 with another edition of Man on the Street. This time, we’re catching up with Ryan Whelan, Managing Director and Global Head of Cyber Intelligence at Accenture, to hear what’s buzzing at the conference.

Selected Reading

Microsoft warns of high-severity flaw in hybrid Exchange deployments (Bleeping Computer)

KLM suffers cyber breach affecting six million passengers (IO+)

Cyberattack hits France’s third-largest mobile operator, millions of customers affected (The Record)

New HTTP Request Smuggling Attacks Impacted CDNs, Major Orgs, Millions of Websites (SecurityWeek)

Candiru Spyware Infrastructure Uncovered (BankInfoSecurity)

Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities (SecurityWeek)

Akira ransomware abuses CPU tuning tool to disable Microsoft Defender (Bleeping Computer)

A Single Poisoned Document Could Leak ‘Secret’ Data Via ChatGPT (WIRED)

Researchers Expose Infrastructure Behind Cybercrime Network VexTrio (Infosecurity Magazine)

Gen 7 and newer SonicWall Firewalls – SSLVPN Recent Threat Activity (SonicWall)

Want a Different Kind of Work Trip? Try a Robot Hotel (WIRED)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft warns of a high-severity vulnerability in Exchange Server hybrid deployments. A Dutch airline and a French telecom report data breaches. Researchers reveal new HTTP request smuggling variants. An Israeli spyware maker may have rebranded to evade U.S. sanctions. CyberArk patches critical vulnerabilities in its secrets management platform. The Akira gang use a legit Intel CPU tuning driver to disable Microsoft Defender. ChatGPT Connectors are shown vulnerable to indirect prompt injection. Researchers expose new details about the VexTrio cybercrime network. SonicWall says a recent SSLVPN-related cyber activity is not due to a zero-day. Ryan Whelan from Accenture is our man on the street at Black Hat. Do androids dream of concierge duty?</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>We continue our coverage from the floor at <a href="https://www.blackhat.com/"><u>Black Hat</u></a> USA 2025 with another edition of Man on the Street. This time, we’re catching up with <a href="https://www.linkedin.com/in/t-ryan-whelan-1156ab5/"><u>Ryan Whelan</u></a>, Managing Director and Global Head of Cyber Intelligence at <a href="https://www.linkedin.com/company/accenture/"><u>Accenture</u></a>, to hear what’s buzzing at the conference.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-of-high-severity-flaw-in-hybrid-exchange-deployments/"><u>Microsoft warns of high-severity flaw in hybrid Exchange deployments</u></a> (Bleeping Computer)</p>
<p><a href="https://ioplus.nl/en/posts/klm-suffers-cyber-breach-affecting-six-million-passengers"><u>KLM suffers cyber breach affecting six million passengers</u></a> (IO+)</p>
<p><a href="https://therecord.media/bouygues-telecom-france-cyberattack-data-breach"><u>Cyberattack hits France’s third-largest mobile operator, millions of customers affected</u></a> (The Record)</p>
<p><a href="https://www.securityweek.com/new-http-request-smuggling-attacks-impacted-cdns-major-orgs-millions-of-websites/"><u>New HTTP Request Smuggling Attacks Impacted CDNs, Major Orgs, Millions of Websites</u></a> (SecurityWeek)</p>
<p><a href="https://www.bankinfosecurity.com/candiru-spyware-infrastructure-uncovered-a-29142"><u>Candiru Spyware Infrastructure Uncovered</u></a> (BankInfoSecurity)</p>
<p><a href="https://www.securityweek.com/enterprise-secrets-exposed-by-cyberark-conjur-vulnerabilities/"><u>Enterprise Secrets Exposed by CyberArk Conjur Vulnerabilities</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/akira-ransomware-abuses-cpu-tuning-tool-to-disable-microsoft-defender/"><u>Akira ransomware abuses CPU tuning tool to disable Microsoft Defender</u></a> (Bleeping Computer)</p>
<p><a href="https://www.wired.com/story/poisoned-document-could-leak-secret-data-chatgpt/"><u>A Single Poisoned Document Could Leak ‘Secret’ Data Via ChatGPT</u></a> (WIRED)</p>
<p><a href="https://www.infosecurity-magazine.com/news/bhusa-cybercrime-network-vextrio/"><u>Researchers Expose Infrastructure Behind Cybercrime Network VexTrio </u></a>(Infosecurity Magazine)</p>
<p><a href="https://www.sonicwall.com/support/notices/gen-7-and-newer-sonicwall-firewalls-sslvpn-recent-threat-activity/250804095336430"><u>Gen 7 and newer SonicWall Firewalls – SSLVPN Recent Threat Activity</u></a> (SonicWall)</p>
<p><a href="https://www.wired.com/story/inside-japan-henn-na-robot-hotel/?_sp=06fa5238-cda3-4180-aace-f1d6213a76ee.1754502262140"><u>Want a Different Kind of Work Trip? Try a Robot Hotel</u></a> (WIRED)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1468</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c9d1bcf6-1c7a-11f0-85e0-035e8498ec6b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8372072896.mp3?updated=1754592726" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chasing Silicon shadows.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2365/notes</link>
      <description>Two Chinese nationals are arrested for allegedly exporting sensitive Nvidia AI chips. A critical security flaw has been discovered in Microsoft’s new NLWeb protocol. Vulnerabilities in Dell laptop firmware could let attackers bypass Windows logins and install malware. Trend Micro warns of an actively exploited remote code execution flaw in its endpoint security platform. Google confirms a data breach involving one of its Salesforce databases. A lack of MFA leaves a Canadian city on the hook for ransomware recovery costs. Nvidia’s CSO denies the need for backdoors or kill switches in the company’s GPUs. CISA flags multiple critical vulnerabilities in Tigo Energy’s Cloud Connect Advanced (CCA) platform. DHS grants funding cuts off the MS-ISAC. Helicopter parenting officially hits the footwear aisle.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Sarah Powazek from UC Berkeley's Center for Long-Term Cybersecurity (CLTC) discussing her proposed nationwide roadmap to scale cyber defense for community organizations.

Black Hat Women on the street

Live from Black Hat USA 2025, it’s a special “Women on the Street” segment with Halcyon’s Cynthia Kaiser, SVP Ransomware Research Center, and CISO Stacey Cameron. Hear what’s happening on the ground and what’s top of mind in cybersecurity this year.

Selected Reading

Two Arrested in the US for Illegally Exporting Microchips Used in AI Applications to China (TechNadu)

Microsoft’s plan to fix the web with AI has already hit an embarrassing security flaw  (The Verge)

ReVault flaws let hackers bypass Windows login on Dell laptops (Bleeping Computer)

Trend Micro warns of Apex One zero-day exploited in attacks (Bleeping Computer)

Google says hackers stole its customers' data in a breach of its Salesforce database (TechCrunch)

Hamilton taxpayers on the hook for full $18.3M cyberattack repair bill after insurance claim denied (CP24)

Nvidia rejects US demand for backdoors in AI chips (The Verge)

Critical vulnerabilities reported in Tigo Energy Cloud connect advanced solar management platform (Beyond Machines)

New state, local cyber grant rules prohibit spending on MS-ISAC (StateScoop)

Skechers skewered for adding secret Apple AirTag compartment to kids’ sneakers — have we reached peak obsessive parenting? (NY Post)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 06 Aug 2025 20:10:00 -0000</pubDate>
      <itunes:title>Chasing Silicon shadows.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2365</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Two Chinese nationals are arrested for allegedly exporting sensitive Nvidia AI chips. A critical security flaw has been discovered in Microsoft’s new NLWeb protocol. Vulnerabilities in Dell laptop firmware could let attackers bypass Windows logins and install malware. Trend Micro warns of an actively exploited remote code execution flaw in its endpoint security platform. Google confirms a data breach involving one of its Salesforce databases. A lack of MFA leaves a Canadian city on the hook for ransomware recovery costs. Nvidia’s CSO denies the need for backdoors or kill switches in the company’s GPUs. CISA flags multiple critical vulnerabilities in Tigo Energy’s Cloud Connect Advanced (CCA) platform. DHS grants funding cuts off the MS-ISAC. Helicopter parenting officially hits the footwear aisle.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Sarah Powazek from UC Berkeley's Center for Long-Term Cybersecurity (CLTC) discussing her proposed nationwide roadmap to scale cyber defense for community organizations.

Black Hat Women on the street

Live from Black Hat USA 2025, it’s a special “Women on the Street” segment with Halcyon’s Cynthia Kaiser, SVP Ransomware Research Center, and CISO Stacey Cameron. Hear what’s happening on the ground and what’s top of mind in cybersecurity this year.

Selected Reading

Two Arrested in the US for Illegally Exporting Microchips Used in AI Applications to China (TechNadu)

Microsoft’s plan to fix the web with AI has already hit an embarrassing security flaw  (The Verge)

ReVault flaws let hackers bypass Windows login on Dell laptops (Bleeping Computer)

Trend Micro warns of Apex One zero-day exploited in attacks (Bleeping Computer)

Google says hackers stole its customers' data in a breach of its Salesforce database (TechCrunch)

Hamilton taxpayers on the hook for full $18.3M cyberattack repair bill after insurance claim denied (CP24)

Nvidia rejects US demand for backdoors in AI chips (The Verge)

Critical vulnerabilities reported in Tigo Energy Cloud connect advanced solar management platform (Beyond Machines)

New state, local cyber grant rules prohibit spending on MS-ISAC (StateScoop)

Skechers skewered for adding secret Apple AirTag compartment to kids’ sneakers — have we reached peak obsessive parenting? (NY Post)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Two Chinese nationals are arrested for allegedly exporting sensitive Nvidia AI chips. A critical security flaw has been discovered in Microsoft’s new NLWeb protocol. Vulnerabilities in Dell laptop firmware could let attackers bypass Windows logins and install malware. Trend Micro warns of an actively exploited remote code execution flaw in its endpoint security platform. Google confirms a data breach involving one of its Salesforce databases. A lack of MFA leaves a Canadian city on the hook for ransomware recovery costs. Nvidia’s CSO denies the need for backdoors or kill switches in the company’s GPUs. CISA flags multiple critical vulnerabilities in Tigo Energy’s Cloud Connect Advanced (CCA) platform. DHS grants funding cuts off the MS-ISAC. Helicopter parenting officially hits the footwear aisle.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/s-powazek/"><u>Sarah Powazek</u></a> from UC Berkeley's <a href="https://www.linkedin.com/company/cltcberkeley/"><u>Center for Long-Term Cybersecurity</u></a> (CLTC) discussing her proposed nationwide roadmap to scale cyber defense for community organizations.</p>
<p><strong>Black Hat Women on the street</strong></p>
<p>Live from Black Hat USA 2025, it’s a special “Women on the Street” segment with <a href="https://www.linkedin.com/company/halcyonai/"><u>Halcyon</u></a>’s <a href="https://www.linkedin.com/in/cynthia-kaiser-cyber/"><u>Cynthia Kaiser</u></a>, SVP Ransomware Research Center, and CISO <a href="https://www.linkedin.com/in/stacey-cameron-b82b459/"><u>Stacey Cameron</u></a>. Hear what’s happening on the ground and what’s top of mind in cybersecurity this year.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.technadu.com/two-arrested-in-the-us-for-illegally-exporting-microchips-used-in-ai-applications-to-china/605373/"><u>Two Arrested in the US for Illegally Exporting Microchips Used in AI Applications to China</u></a> (TechNadu)</p>
<p><a href="https://www.theverge.com/news/719617/microsoft-nlweb-security-flaw-agentic-web"><u>Microsoft’s plan to fix the web with AI has already hit an embarrassing security flaw</u> </a> (The Verge)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/revault-flaws-let-hackers-bypass-windows-login-on-dell-laptops/"><u>ReVault flaws let hackers bypass Windows login on Dell laptops</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/trend-micro-warns-of-endpoint-protection-zero-day-exploited-in-attacks/"><u>Trend Micro warns of Apex One zero-day exploited in attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://techcrunch.com/2025/08/06/google-says-hackers-stole-its-customers-data-in-a-breach-of-its-salesforce-database/"><u>Google says hackers stole its customers' data in a breach of its Salesforce database</u></a> (TechCrunch)</p>
<p><a href="https://www.cp24.com/local/hamilton/2025/07/31/hamilton-taxpayers-on-the-hook-for-full-183m-cyberattack-repair-bill-after-insurance-claim-denied/"><u>Hamilton taxpayers on the hook for full $18.3M cyberattack repair bill after insurance claim denied</u></a> (CP24)</p>
<p><a href="https://www.theverge.com/news/719697/nvidia-ai-gpu-chips-denies-backdoors-kill-switches-spyware"><u>Nvidia rejects US demand for backdoors in AI chips</u></a> (The Verge)</p>
<p><a href="https://beyondmachines.net/event_details/critical-vulnerabilities-reported-in-tigo-energy-cloud-connect-advanced-solar-management-platform-8-9-z-l-9/gD2P6Ple2L"><u>Critical vulnerabilities reported in Tigo Energy Cloud connect advanced solar management platform</u></a> (Beyond Machines)</p>
<p><a href="https://statescoop.com/state-local-cyber-grant-msisac-2025/"><u>New state, local cyber grant rules prohibit spending on MS-ISAC</u></a> (StateScoop)</p>
<p><a href="https://nypost.com/2025/08/05/lifestyle/skechers-skewered-for-adding-secret-apple-airtag-compartment-to-kids-sneakers/"><u>Skechers skewered for adding secret Apple AirTag compartment to kids’ sneakers — have we reached peak obsessive parenting?</u></a> (NY Post)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2267</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c9a4a14e-1c7a-11f0-85e0-379cd007d932]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4979802807.mp3?updated=1754509348" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hello, hacker speaking.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2364/notes</link>
      <description>Cisco reveals a phishing related data breach. SonicWall warns users to disable SSLVPN services after reports of ransomware gangs exploiting a likely zero-day.  Researchers uncover a stealthy Linux backdoor and new vulnerabilities in Nvidia’s Triton Inference Server. A new malware campaign targets Microsoft 365 users with fake OneDrive emails. The U.S. Treasury warns of rising criminal activity involving cryptocurrency ATMs. Cloudflare accuses an AI startup of using stealthy methods to bypass restrictions on web scraping. A global infostealer campaign compromises over 4,000 victims across 62 countries. Marty Momdjian, General Manager of Ready1 by Semperis, tells us about Operation Blindspot, a tabletop exercise taking place this week at Black Hat. On this week’s Threat Vector segment, host David Moulton speaks with ⁠Nigel Hedges⁠ from ⁠Sigma Healthcare⁠ about how CISOs can shift cybersecurity from a technical problem to a business priority. One hospital’s data ends up in the snack aisle.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

We are joined by Marty Momdjian, General Manager of Ready1 by Semperis, who is talking about Operation Blindspot, a tabletop exercise simulating a cyberattack against a rural water utility based in Nevada taking place this week at Black Hat USA 2025.

Threat Vector Segment

On this week’s Threat Vector segment, host David Moulton speaks with ⁠Nigel Hedges⁠, Executive General Manager of Cyber &amp; Risk at ⁠Chemist Warehouse⁠ and ⁠Sigma Healthcare⁠. Nigel shares how CISOs can shift cybersecurity from a technical problem to a business priority. You can listen to the full discussion on Threat Vector here and catch new episodes every Thursday on your favorite podcast app.

Selected Reading

Cisco discloses data breach impacting Cisco.com user accounts (Bleeping Computer)

SonicWall urges admins to disable SSLVPN amid rising attacks (Bleeping Computer)

Antivirus vendors fail to spot persistent, nasty, stealthy Linux backdoor (The Register)

Nvidia Triton Vulnerabilities Pose Big Risk to AI Models (SecurityWeek)

Discord CDN Link Abused to Deliver RAT Disguised as OneDrive File (Hackread)

Crypto ATMs fueling criminal activity, Treasury warns (The Record)

AI company Perplexity is sneaking to get around blocks on crawlers, Cloudflare alleges (CyberScoop)

Python-powered malware grabs 200K passwords, credit cards (The Register)

Thai hospital fined 1.2 million baht for data breach via snack bags (DataBreaches.Net) 

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Aug 2025 20:10:00 -0000</pubDate>
      <itunes:title>Hello, hacker speaking.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2364</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Cisco reveals a phishing related data breach. SonicWall warns users to disable SSLVPN services after reports of ransomware gangs exploiting a likely zero-day.  Researchers uncover a stealthy Linux backdoor and new vulnerabilities in Nvidia’s Triton Inference Server. A new malware campaign targets Microsoft 365 users with fake OneDrive emails. The U.S. Treasury warns of rising criminal activity involving cryptocurrency ATMs. Cloudflare accuses an AI startup of using stealthy methods to bypass restrictions on web scraping. A global infostealer campaign compromises over 4,000 victims across 62 countries. Marty Momdjian, General Manager of Ready1 by Semperis, tells us about Operation Blindspot, a tabletop exercise taking place this week at Black Hat. On this week’s Threat Vector segment, host David Moulton speaks with ⁠Nigel Hedges⁠ from ⁠Sigma Healthcare⁠ about how CISOs can shift cybersecurity from a technical problem to a business priority. One hospital’s data ends up in the snack aisle.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

We are joined by Marty Momdjian, General Manager of Ready1 by Semperis, who is talking about Operation Blindspot, a tabletop exercise simulating a cyberattack against a rural water utility based in Nevada taking place this week at Black Hat USA 2025.

Threat Vector Segment

On this week’s Threat Vector segment, host David Moulton speaks with ⁠Nigel Hedges⁠, Executive General Manager of Cyber &amp; Risk at ⁠Chemist Warehouse⁠ and ⁠Sigma Healthcare⁠. Nigel shares how CISOs can shift cybersecurity from a technical problem to a business priority. You can listen to the full discussion on Threat Vector here and catch new episodes every Thursday on your favorite podcast app.

Selected Reading

Cisco discloses data breach impacting Cisco.com user accounts (Bleeping Computer)

SonicWall urges admins to disable SSLVPN amid rising attacks (Bleeping Computer)

Antivirus vendors fail to spot persistent, nasty, stealthy Linux backdoor (The Register)

Nvidia Triton Vulnerabilities Pose Big Risk to AI Models (SecurityWeek)

Discord CDN Link Abused to Deliver RAT Disguised as OneDrive File (Hackread)

Crypto ATMs fueling criminal activity, Treasury warns (The Record)

AI company Perplexity is sneaking to get around blocks on crawlers, Cloudflare alleges (CyberScoop)

Python-powered malware grabs 200K passwords, credit cards (The Register)

Thai hospital fined 1.2 million baht for data breach via snack bags (DataBreaches.Net) 

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cisco reveals a phishing related data breach. SonicWall warns users to disable SSLVPN services after reports of ransomware gangs exploiting a likely zero-day.  Researchers uncover a stealthy Linux backdoor and new vulnerabilities in Nvidia’s Triton Inference Server. A new malware campaign targets Microsoft 365 users with fake OneDrive emails. The U.S. Treasury warns of rising criminal activity involving cryptocurrency ATMs. Cloudflare accuses an AI startup of using stealthy methods to bypass restrictions on web scraping. A global infostealer campaign compromises over 4,000 victims across 62 countries. Marty Momdjian, General Manager of Ready1 by Semperis, tells us about Operation Blindspot, a tabletop exercise taking place this week at Black Hat. On this week’s Threat Vector segment, host David Moulton speaks with ⁠Nigel Hedges⁠ from ⁠Sigma Healthcare⁠ about how CISOs can shift cybersecurity from a technical problem to a business priority. One hospital’s data ends up in the snack aisle.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>We are joined by <a href="https://www.linkedin.com/in/martymomdjian/"><u>Marty Momdjian</u></a>, General Manager of Ready1 by <a href="https://www.linkedin.com/company/semperis/"><u>Semperis</u></a>, who is talking about <a href="https://www.semperis.com/operation-blindspot/"><u>Operation Blindspot</u></a>, a tabletop exercise simulating a cyberattack against a rural water utility based in Nevada taking place this week at Black Hat USA 2025.</p>
<p><strong>Threat Vector Segment</strong></p>
<p>On this week’s <a href="https://thecyberwire.com/podcasts/threat-vector"><u>Threat Vector</u></a> segment, host <a href="https://www.linkedin.com/in/davidrmoulton/"><u>David Moulton</u></a> speaks with <a href="https://www.linkedin.com/in/nigel-hedges/"><u>⁠Nigel Hedges</u></a>⁠, Executive General Manager of Cyber &amp; Risk at <a href="https://www.chemistwarehouse.com.au/"><u>⁠Chemist Warehouse⁠</u></a> and ⁠<a href="https://sigmahealthcare.com.au/"><u>Sigma Healthcare</u></a>⁠. Nigel shares how CISOs can shift cybersecurity from a technical problem to a business priority. You can listen to the full discussion on Threat Vector <a href="https://thecyberwire.com/podcasts/threat-vector/78/notes"><u>here</u></a> and catch new episodes every Thursday on your favorite podcast app.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisco-discloses-data-breach-impacting-ciscocom-user-accounts/"><u>Cisco discloses data breach impacting Cisco.com user accounts</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/sonicwall-urges-admins-to-disable-sslvpn-amid-rising-attacks/"><u>SonicWall urges admins to disable SSLVPN amid rising attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.theregister.com/2025/08/05/plague_linux_backdoor/"><u>Antivirus vendors fail to spot persistent, nasty, stealthy Linux backdoor</u></a> (The Register)</p>
<p><a href="https://www.securityweek.com/nvidia-triton-vulnerabilities-pose-big-risk-to-ai-models/"><u>Nvidia Triton Vulnerabilities Pose Big Risk to AI Models </u></a>(SecurityWeek)</p>
<p><a href="https://hackread.com/discord-cdn-link-deliver-rat-disguised-onedrive-file/"><u>Discord CDN Link Abused to Deliver RAT Disguised as OneDrive File</u></a> (Hackread)</p>
<p><a href="https://therecord.media/crypto-atms-fueling-cybercrime"><u>Crypto ATMs fueling criminal activity, Treasury warns</u></a> (The Record)</p>
<p><a href="https://cyberscoop.com/perplexity-blocks-on-crawlers-cloudflare/"><u>AI company Perplexity is sneaking to get around blocks on crawlers, Cloudflare alleges </u></a>(CyberScoop)</p>
<p><a href="https://www.theregister.com/2025/08/04/pxa_stealer_4000_victims/"><u>Python-powered malware grabs 200K passwords, credit cards </u></a>(The Register)</p>
<p><br><a href="https://databreaches.net/2025/08/04/thai-hospital-fined-1-2-million-baht-for-data-breach-via-snack-bags/"><u>Thai hospital fined 1.2 million baht for data breach via snack bags </u></a>(DataBreaches.Net) </p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1845</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c97748ca-1c7a-11f0-85e0-3330f97515e7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3829995837.mp3?updated=1754419785" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New sheriff in cyber town.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2363/notes</link>
      <description>The Senate confirms a new national cyber director. A new commission explores the establishment of a separate Cyber Force. Cybercriminals exploit link wrapping to launch sophisticated phishing attacks. AI agents are hijacked, cameras cracked, and devs phished. Gene sequencers and period trackers settle allegations of oversharing personal data and inadequate security. Today we are joined by Tim Starks from CyberScoop discussing how China accuses the US of exploiting Microsoft zero-day in a cyberattack. OpenAI scrambles after a chat leak fiasco.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. You can read Tim’s article on the topic here. 

CyberWire Guest

Today we are joined by Tim Starks from CyberScoop discussing how China accuses the US of exploiting Microsoft zero-day in a cyberattack.

Selected Reading

Sean Cairncross confirmed as national cyber director (The Record)

Panel to create roadmap for establishing US Cyber Force (The Record)

Microsoft 365: Attackers Weaponize Proofpoint and Intermedia Link Wrapping to Steal Logins (WinBuzzer)

When Public Prompts Turn Into Local Shells: ‘CurXecute’ – RCE in Cursor via MCP Auto‑Start (Aim Security)

LegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Code (Hackread)

Bitdefender Warns Users to Update Dahua Cameras Over Critical Flaws (Hackread)

Mozilla warns of phishing attacks targeting add-on developers (Bleeping Computer)

Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities (SecurityWeek)

Flo settles class action lawsuit alleging improper data sharing (The Record)

ChatGPT users shocked to learn their chats were in Google search results (Ars Technica) 

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 04 Aug 2025 20:10:00 -0000</pubDate>
      <itunes:title>New sheriff in cyber town.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2363</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The Senate confirms a new national cyber director. A new commission explores the establishment of a separate Cyber Force. Cybercriminals exploit link wrapping to launch sophisticated phishing attacks. AI agents are hijacked, cameras cracked, and devs phished. Gene sequencers and period trackers settle allegations of oversharing personal data and inadequate security. Today we are joined by Tim Starks from CyberScoop discussing how China accuses the US of exploiting Microsoft zero-day in a cyberattack. OpenAI scrambles after a chat leak fiasco.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. You can read Tim’s article on the topic here. 

CyberWire Guest

Today we are joined by Tim Starks from CyberScoop discussing how China accuses the US of exploiting Microsoft zero-day in a cyberattack.

Selected Reading

Sean Cairncross confirmed as national cyber director (The Record)

Panel to create roadmap for establishing US Cyber Force (The Record)

Microsoft 365: Attackers Weaponize Proofpoint and Intermedia Link Wrapping to Steal Logins (WinBuzzer)

When Public Prompts Turn Into Local Shells: ‘CurXecute’ – RCE in Cursor via MCP Auto‑Start (Aim Security)

LegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Code (Hackread)

Bitdefender Warns Users to Update Dahua Cameras Over Critical Flaws (Hackread)

Mozilla warns of phishing attacks targeting add-on developers (Bleeping Computer)

Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities (SecurityWeek)

Flo settles class action lawsuit alleging improper data sharing (The Record)

ChatGPT users shocked to learn their chats were in Google search results (Ars Technica) 

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Senate confirms a new national cyber director. A new commission explores the establishment of a separate Cyber Force. Cybercriminals exploit link wrapping to launch sophisticated phishing attacks. AI agents are hijacked, cameras cracked, and devs phished. Gene sequencers and period trackers settle allegations of oversharing personal data and inadequate security. Today we are joined by Tim Starks from CyberScoop discussing how China accuses the US of exploiting Microsoft zero-day in a cyberattack. OpenAI scrambles after a chat leak fiasco.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>. You can read Tim’s article on the topic <a href="https://cyberscoop.com/china-accuses-us-of-exploiting-microsoft-zero-day-in-cyberattack/"><u>here</u></a>. </p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/tstarks/"><u>Tim Starks</u></a> from <a href="https://www.linkedin.com/company/cyberscoop/"><u>CyberScoop</u></a> discussing how China accuses the US of exploiting Microsoft zero-day in a cyberattack.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/sean-cairncross-confirmed-oncd"><u>Sean Cairncross confirmed as national cyber director</u></a> (The Record)</p>
<p><a href="https://therecord.media/panel-to-create-roadmap-cyber-force"><u>Panel to create roadmap for establishing US Cyber Force</u></a> (The Record)</p>
<p><a href="https://winbuzzer.com/2025/08/04/microsoft-365-attackers-weaponize-proofpoint-and-intermedia-link-wrapping-to-steal-logins-xcxwbn/"><u>Microsoft 365: Attackers Weaponize Proofpoint and Intermedia Link Wrapping to Steal Logins</u></a> (WinBuzzer)</p>
<p><a href="https://www.aim.security/lp/aim-labs-curxecute-blogpost"><u>When Public Prompts Turn Into Local Shells: ‘CurXecute’ – RCE in Cursor via MCP Auto‑Start</u></a> (Aim Security)</p>
<p><a href="https://hackread.com/legalpwn-attack-genai-tools-misclassify-malware-safe-code/"><u>LegalPwn Attack Tricks GenAI Tools Into Misclassifying Malware as Safe Code</u></a> (Hackread)</p>
<p><a href="https://hackread.com/bitdefender-update-dahua-cameras-critical-flaws/"><u>Bitdefender Warns Users to Update Dahua Cameras Over Critical Flaws</u></a> (Hackread)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/mozilla-warns-of-phishing-attacks-targeting-add-on-developers/"><u>Mozilla warns of phishing attacks targeting add-on developers</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/gene-sequencing-giant-illumina-settles-for-9-8m-over-product-vulnerabilities/"><u>Gene Sequencing Giant Illumina Settles for $9.8M Over Product Vulnerabilities</u></a> (SecurityWeek)</p>
<p><a href="https://therecord.media/flo-app-settlement-class-action-suit-data-sharing-meta"><u>Flo settles class action lawsuit alleging improper data sharing</u></a> (The Record)</p>
<p><a href="https://arstechnica.com/tech-policy/2025/08/chatgpt-users-shocked-to-learn-their-chats-were-in-google-search-results/"><u>ChatGPT users shocked to learn their chats were in Google search results</u></a> (Ars Technica) </p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1521</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c9499420-1c7a-11f0-85e0-1392344f3f42]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1318702683.mp3?updated=1754336694" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hannah Kenney: Focused on people. [Risk] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/79/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Manager in BARR Advisory's Cyber Risk Advisory Practice, Hannah Kenney, shares her journey from never considering technology as a career to having it click in an informations systems class in college. After noticing she was the only one in the room who enjoyed the lecture, Hannah knew she wanted to go down the technology route. In talking about her work, Hannah describes it as creative problem solving. She hopes "people see me as someone who viewed cybersecurity and risk as something that is focused on people first and foremost." We thank Hannah for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 03 Aug 2025 07:00:00 -0000</pubDate>
      <itunes:title>Hannah Kenney: Focused on people. [Risk] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>79</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/d334a0ee-6ee9-11f0-bdf9-cfb5479da5b6/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Manager in BARR Advisory's Cyber Risk Advisory Practice, Hannah Kenney, shares her journey from never considering technology as a career to having it click in an informations systems class in college. After noticing she was the only one in the room who enjoyed the lecture, Hannah knew she wanted to go down the technology route. In talking about her work, Hannah describes it as creative problem solving. She hopes "people see me as someone who viewed cybersecurity and risk as something that is focused on people first and foremost." We thank Hannah for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Manager in BARR Advisory's Cyber Risk Advisory Practice, Hannah Kenney, shares her journey from never considering technology as a career to having it click in an informations systems class in college. After noticing she was the only one in the room who enjoyed the lecture, Hannah knew she wanted to go down the technology route. In talking about her work, Hannah describes it as creative problem solving. She hopes "people see me as someone who viewed cybersecurity and risk as something that is focused on people first and foremost." We thank Hannah for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>496</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d334a0ee-6ee9-11f0-bdf9-cfb5479da5b6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1033997073.mp3?updated=1735936614" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>nOAuth-ing to see here. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/387/notes</link>
      <description>This week, we are joined by Eric Woodruff, Chief Identity Architect at Semperis, discussing "nOAuth Abuse Alert: Full Account Takeover of Entra Cross-Tenant SaaS Applications". Semperis researchers identified a critical authentication flaw known as nOAuth in 9 out of 104 tested SaaS applications integrated with Microsoft Entra ID. 

This low-complexity but severe vulnerability allows attackers with just a user’s email address and access to an Entra tenant to impersonate users, exfiltrate data, and move laterally within affected apps—with no viable defense or detection available to customers. The findings spotlight ongoing risks tied to improper use of email claims in authentication and emphasize the urgent need for SaaS vendors to adopt secure OpenID Connect practices and remediate vulnerable applications.

Complete our annual ⁠audience survey⁠ before August 31.

The research can be found here:


  nOAuth Abuse Alert: Full Account Takeover of Entra Cross-Tenant SaaS Applications


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Aug 2025 07:00:00 -0000</pubDate>
      <itunes:title>nOAuth-ing to see here. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>387</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9aca152c-6ee9-11f0-9b7d-1757392ee95e/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Eric Woodruff, Chief Identity Architect at Semperis, discussing "nOAuth Abuse Alert: Full Account Takeover of Entra Cross-Tenant SaaS Applications". Semperis researchers identified a critical authentication flaw known as nOAuth in 9 out of 104 tested SaaS applications integrated with Microsoft Entra ID. 

This low-complexity but severe vulnerability allows attackers with just a user’s email address and access to an Entra tenant to impersonate users, exfiltrate data, and move laterally within affected apps—with no viable defense or detection available to customers. The findings spotlight ongoing risks tied to improper use of email claims in authentication and emphasize the urgent need for SaaS vendors to adopt secure OpenID Connect practices and remediate vulnerable applications.

Complete our annual ⁠audience survey⁠ before August 31.

The research can be found here:


  nOAuth Abuse Alert: Full Account Takeover of Entra Cross-Tenant SaaS Applications


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/ericonidentity/">Eric Woodruff</a>, Chief Identity Architect at <a href="https://www.linkedin.com/company/semperis/">Semperis</a>, discussing "nOAuth Abuse Alert: Full Account Takeover of Entra Cross-Tenant SaaS Applications". Semperis researchers identified a critical authentication flaw known as <em>nOAuth</em> in 9 out of 104 tested SaaS applications integrated with Microsoft Entra ID. </p>
<p>This low-complexity but severe vulnerability allows attackers with just a user’s email address and access to an Entra tenant to impersonate users, exfiltrate data, and move laterally within affected apps—with no viable defense or detection available to customers. The findings spotlight ongoing risks tied to improper use of email claims in authentication and emphasize the urgent need for SaaS vendors to adopt secure OpenID Connect practices and remediate vulnerable applications.</p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JDYLFZ5">⁠audience survey⁠</a> before August 31.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.semperis.com/blog/noauth-abuse-alert-full-account-takeover/">nOAuth Abuse Alert: Full Account Takeover of Entra Cross-Tenant SaaS Applications</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1439</itunes:duration>
      <guid isPermaLink="false"><![CDATA[9aca152c-6ee9-11f0-9b7d-1757392ee95e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7743942156.mp3?updated=1754059513" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SUSE flaw found hiding in plain port.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2362/notes</link>
      <description>A critical vulnerability in SUSE [SOO-suh] Manager allows attackers to run commands with root privilege. A joint CISA and U.S. Coast Guard threat hunt at a critical infrastructure site reveals serious cybersecurity issues. Healthcare providers across the U.S. report recent data breaches. Cybercriminals infiltrate a bank by physically planting a Raspberry Pi on a network switch. Russian state-backed hackers target Moscow diplomats to deploy ApolloShadow malware. Luxembourg investigates a major telecom outage tied to Huawei equipment. China’s cyberspace regulator summons Nvidia over alleged security risks linked to its H20 AI chips. A new report examines early indicators of system compromise. Today we are joined by Ryan Whelan, Managing Director and Global Head of Accenture Cyber Intelligence, with their analysis of Scattered Spider. Pwn2Own puts a million dollar bounty on WhatsApp zero-clicks.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire GuestOur guest today is Ryan Whelan, Managing Director and Global Head of Accenture Cyber Intelligence, discussing the possibilities of Scattered Spider.

Selected Reading

Critical flaw in SUSE Manager exposes enterprise deployments to compromise (Beyond Machines)

CISA identifies OT configuration flaws during cyber threat hunt at critical infrastructure organization, lists cyber hygiene (Industrial Cyber)

CISA Issues ICS Advisories for Rockwell Automation Using VMware, and Güralp Seismic Monitoring Systems (Cyber Security News)

Florida Internal Medicine Practices Discloses November 2024 Data Breach (HIPAA Journal)

Cybercrooks use Raspberry Pi to steal ATM cash (The Register)

Russian Cyberspies Target Foreign Embassies in Moscow via AitM Attacks: Microsoft (SecurityWeek)

Luxembourg probes reported attack on Huawei tech that caused nationwide telecoms outage (The Record)

Nvidia summoned by China's cyberspace watchdog over risks in H20 chips (CGTN)

Hackers Regularly Exploit Vulnerabilities Before Public Disclosure (Infosecurity Magazine)

Pwn2Own hacking contest pays $1 million for WhatsApp exploit (Bleeping Computer)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 01 Aug 2025 20:10:00 -0000</pubDate>
      <itunes:title>SUSE flaw found hiding in plain port.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2362</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A critical vulnerability in SUSE [SOO-suh] Manager allows attackers to run commands with root privilege. A joint CISA and U.S. Coast Guard threat hunt at a critical infrastructure site reveals serious cybersecurity issues. Healthcare providers across the U.S. report recent data breaches. Cybercriminals infiltrate a bank by physically planting a Raspberry Pi on a network switch. Russian state-backed hackers target Moscow diplomats to deploy ApolloShadow malware. Luxembourg investigates a major telecom outage tied to Huawei equipment. China’s cyberspace regulator summons Nvidia over alleged security risks linked to its H20 AI chips. A new report examines early indicators of system compromise. Today we are joined by Ryan Whelan, Managing Director and Global Head of Accenture Cyber Intelligence, with their analysis of Scattered Spider. Pwn2Own puts a million dollar bounty on WhatsApp zero-clicks.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire GuestOur guest today is Ryan Whelan, Managing Director and Global Head of Accenture Cyber Intelligence, discussing the possibilities of Scattered Spider.

Selected Reading

Critical flaw in SUSE Manager exposes enterprise deployments to compromise (Beyond Machines)

CISA identifies OT configuration flaws during cyber threat hunt at critical infrastructure organization, lists cyber hygiene (Industrial Cyber)

CISA Issues ICS Advisories for Rockwell Automation Using VMware, and Güralp Seismic Monitoring Systems (Cyber Security News)

Florida Internal Medicine Practices Discloses November 2024 Data Breach (HIPAA Journal)

Cybercrooks use Raspberry Pi to steal ATM cash (The Register)

Russian Cyberspies Target Foreign Embassies in Moscow via AitM Attacks: Microsoft (SecurityWeek)

Luxembourg probes reported attack on Huawei tech that caused nationwide telecoms outage (The Record)

Nvidia summoned by China's cyberspace watchdog over risks in H20 chips (CGTN)

Hackers Regularly Exploit Vulnerabilities Before Public Disclosure (Infosecurity Magazine)

Pwn2Own hacking contest pays $1 million for WhatsApp exploit (Bleeping Computer)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A critical vulnerability in SUSE [SOO-suh] Manager allows attackers to run commands with root privilege. A joint CISA and U.S. Coast Guard threat hunt at a critical infrastructure site reveals serious cybersecurity issues. Healthcare providers across the U.S. report recent data breaches. Cybercriminals infiltrate a bank by physically planting a Raspberry Pi on a network switch. Russian state-backed hackers target Moscow diplomats to deploy ApolloShadow malware. Luxembourg investigates a major telecom outage tied to Huawei equipment. China’s cyberspace regulator summons Nvidia over alleged security risks linked to its H20 AI chips. A new report examines early indicators of system compromise. Today we are joined by Ryan Whelan, Managing Director and Global Head of Accenture Cyber Intelligence, with their analysis of Scattered Spider. Pwn2Own puts a million dollar bounty on WhatsApp zero-clicks.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong><br>Our guest today is <a href="https://www.linkedin.com/in/t-ryan-whelan-1156ab5/"><u>Ryan Whelan</u></a>, Managing Director and Global Head of <a href="https://www.linkedin.com/company/accenture/"><u>Accenture</u></a> Cyber Intelligence, discussing the possibilities of Scattered Spider.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://beyondmachines.net/event_details/critical-flaw-in-suse-manager-exposes-enterprise-deployments-to-compromise-r-n-b-l-q/gD2P6Ple2L"><u>Critical flaw in SUSE Manager exposes enterprise deployments to compromise</u></a> (Beyond Machines)</p>
<p><a href="https://industrialcyber.co/cisa/cisa-identifies-ot-configuration-flaws-during-cyber-threat-hunt-at-critical-infrastructure-organization-lists-cyber-hygiene/"><u>CISA identifies OT configuration flaws during cyber threat hunt at critical infrastructure organization, lists cyber hygiene</u></a> (Industrial Cyber)</p>
<p><a href="https://cybersecuritynews.com/cisa-issues-two-ics-advisories/"><u>CISA Issues ICS Advisories for Rockwell Automation Using VMware, and Güralp Seismic Monitoring Systems</u></a> (Cyber Security News)</p>
<p><a href="https://www.hipaajournal.com/florida-internal-medicine-practices-data-breach/"><u>Florida Internal Medicine Practices Discloses November 2024 Data Breach</u></a> (HIPAA Journal)</p>
<p><a href="https://www.theregister.com/2025/08/01/cybercrooks_bribed_lackeys_in_physical/"><u>Cybercrooks use Raspberry Pi to steal ATM cash</u></a> (The Register)</p>
<p><a href="https://www.securityweek.com/russian-cyberspies-target-foreign-embassies-in-moscow-via-aitm-attacks-microsoft/"><u>Russian Cyberspies Target Foreign Embassies in Moscow via AitM Attacks: Microsoft</u> </a>(SecurityWeek)</p>
<p><a href="https://therecord.media/luxembourg-telecom-outage-reported-cyberattack-huawei-tech"><u>Luxembourg probes reported attack on Huawei tech that caused nationwide telecoms outage</u></a> (The Record)</p>
<p><a href="https://news.cgtn.com/news/2025-07-31/Nvidia-summoned-by-China-s-cyberspace-watchdog-over-risks-in-H20-chips-1FsHYiyhCiQ/p.html"><u>Nvidia summoned by China's cyberspace watchdog over risks in H20 chips</u></a> (CGTN)</p>
<p><a href="https://www.infosecurity-magazine.com/news/hackers-exploit-vulnerabilities/"><u>Hackers Regularly Exploit Vulnerabilities Before Public Disclosure</u> </a>(Infosecurity Magazine)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/pwn2own-hacking-contest-pays-1-million-for-whatsapp-exploit/"><u>Pwn2Own hacking contest pays $1 million for WhatsApp exploit</u></a> (Bleeping Computer)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1484</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c91dbe40-1c7a-11f0-85e0-73cb684e4936]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1283557564.mp3?updated=1754076660" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Open source, open target.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2361/notes</link>
      <description>A sweeping malware campaign by North Korea’s Lazarus Group targets open source ecosystems. President Trump announces a new electronic health records system. A new report reveals deep ties between Chinese state-sponsored hackers and Chinese tech companies. Researchers describe a new prompt injection threat targeting LLMs via browser extensions. Palo Alto Networks’ Unit 42 proposes a new Attribution Framework. Honeywell patches six vulnerabilities in its Experion Process Knowledge System. Researchers track the rapid evolution of a sophisticated Android banking trojan. Scattered Spider goes quiet following recent arrests. Our guests are Jermaine Roebuck and Ann Galchutt from CISA, discussing "Open-Source Eviction Strategies Tool for Cyber Incident Response." A Polish trainmaker sues hackers for fixing trains.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Jermaine Roebuck, Associate Director for Threat Hunting at CISA and Ann Galchutt, Technical Lead at CISA, who will be discussing "Open-Source Eviction Strategies Tool for Cyber Incident Response."

Selected Reading

Sonatype uncovers global espionage campaign in open source ecosystems (Sonatype)

Trump administration is launching a new private health tracking system with Big Tech's help (AP News)

Report Links Chinese Companies to Tools Used by State-Sponsored Hackers (SecurityWeek)

Top 5 GenAI Tools Vulnerable to Man-in-the-Prompt Attack, Billions Could Be Affected (LayerX)

Introducing Unit 42’s Attribution Framework (Unit42)

Honeywell Experion PKS Flaws Allow Manipulation of Industrial Processes (SecurityWeek)

Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed

Cybercriminals ‘Spooked’ After Scattered Spider Arrests (Infosecurity Magazine)

Polish Train Maker Is Suing the Hackers Who Exposed Its Anti-Repair Tricks (iFixit)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 31 Jul 2025 20:10:00 -0000</pubDate>
      <itunes:title>Open source, open target.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2361</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A sweeping malware campaign by North Korea’s Lazarus Group targets open source ecosystems. President Trump announces a new electronic health records system. A new report reveals deep ties between Chinese state-sponsored hackers and Chinese tech companies. Researchers describe a new prompt injection threat targeting LLMs via browser extensions. Palo Alto Networks’ Unit 42 proposes a new Attribution Framework. Honeywell patches six vulnerabilities in its Experion Process Knowledge System. Researchers track the rapid evolution of a sophisticated Android banking trojan. Scattered Spider goes quiet following recent arrests. Our guests are Jermaine Roebuck and Ann Galchutt from CISA, discussing "Open-Source Eviction Strategies Tool for Cyber Incident Response." A Polish trainmaker sues hackers for fixing trains.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Jermaine Roebuck, Associate Director for Threat Hunting at CISA and Ann Galchutt, Technical Lead at CISA, who will be discussing "Open-Source Eviction Strategies Tool for Cyber Incident Response."

Selected Reading

Sonatype uncovers global espionage campaign in open source ecosystems (Sonatype)

Trump administration is launching a new private health tracking system with Big Tech's help (AP News)

Report Links Chinese Companies to Tools Used by State-Sponsored Hackers (SecurityWeek)

Top 5 GenAI Tools Vulnerable to Man-in-the-Prompt Attack, Billions Could Be Affected (LayerX)

Introducing Unit 42’s Attribution Framework (Unit42)

Honeywell Experion PKS Flaws Allow Manipulation of Industrial Processes (SecurityWeek)

Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed

Cybercriminals ‘Spooked’ After Scattered Spider Arrests (Infosecurity Magazine)

Polish Train Maker Is Suing the Hackers Who Exposed Its Anti-Repair Tricks (iFixit)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A sweeping malware campaign by North Korea’s Lazarus Group targets open source ecosystems. President Trump announces a new electronic health records system. A new report reveals deep ties between Chinese state-sponsored hackers and Chinese tech companies. Researchers describe a new prompt injection threat targeting LLMs via browser extensions. Palo Alto Networks’ Unit 42 proposes a new Attribution Framework. Honeywell patches six vulnerabilities in its Experion Process Knowledge System. Researchers track the rapid evolution of a sophisticated Android banking trojan. Scattered Spider goes quiet following recent arrests. Our guests are Jermaine Roebuck and Ann Galchutt from CISA, discussing "Open-Source Eviction Strategies Tool for Cyber Incident Response." A Polish trainmaker sues hackers for fixing trains.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/jermaine-r-6a119942/"><u>Jermaine Roebuck</u></a>, Associate Director for Threat Hunting at <a href="https://www.cisa.gov/"><u>CISA</u></a> and <a href="https://www.linkedin.com/in/ann-galchutt-a66522153/"><u>Ann Galchutt</u></a>, Technical Lead at CISA, who will be discussing "<a href="https://www.cisa.gov/eviction-strategies-tool"><u>Open-Source Eviction Strategies Tool for Cyber Incident Response</u></a>."</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.sonatype.com/blog/sonatype-uncovers-global-espionage-campaign-in-open-source-ecosystems"><u>Sonatype uncovers global espionage campaign in open source ecosystems</u></a> (Sonatype)</p>
<p><a href="https://apnews.com/article/trump-ai-rfk-jr-health-tech-fa73703bd1fd557c787ef0b590e151f1"><u>Trump administration is launching a new private health tracking system with Big Tech's help</u></a> (AP News)</p>
<p><a href="https://www.securityweek.com/report-links-chinese-companies-to-tools-used-by-state-sponsored-hackers/"><u>Report Links Chinese Companies to Tools Used by State-Sponsored Hackers </u></a>(SecurityWeek)</p>
<p><a href="https://layerxsecurity.com/blog/man-in-the-prompt-top-ai-tools-vulnerable-to-injection/"><u>Top 5 GenAI Tools Vulnerable to Man-in-the-Prompt Attack, Billions Could Be Affected </u></a>(LayerX)</p>
<p><a href="https://unit42.paloaltonetworks.com/unit-42-attribution-framework/"><u>Introducing Unit 42’s Attribution Framework</u></a> (Unit42)</p>
<p><a href="https://www.securityweek.com/honeywell-experion-pks-flaws-allow-manipulation-of-industrial-processes/"><u>Honeywell Experion PKS Flaws Allow Manipulation of Industrial Processes </u></a>(SecurityWeek)</p>
<p><a href="https://zimperium.com/blog/behind-random-words-doubletrouble-mobile-banking-trojan-revealed"><u>Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed</u></a></p>
<p><a href="https://www.infosecurity-magazine.com/news/cybercriminals-spooked-scattered/"><u>Cybercriminals ‘Spooked’ After Scattered Spider Arrests </u></a>(Infosecurity Magazine)</p>
<p><a href="https://www.ifixit.com/News/112008/polish-train-maker-is-suing-the-hackers-who-exposed-its-anti-repair-tricks"><u>Polish Train Maker Is Suing the Hackers Who Exposed Its Anti-Repair Tricks </u></a>(iFixit)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1721</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c8f13eba-1c7a-11f0-85e0-e7896772b0f8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9608334603.mp3?updated=1753989038" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>State of emergency in St Paul. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2360/notes</link>
      <description>Officials in St. Paul, Minnesota declare a state of emergency following a cyberattack. Hackers disrupt a major French telecom. A power outage causes widespread service disruptions for cloud provider Linode. Researchers reveal a critical authentication bypass flaw in an AI-driven app development platform. A new study shows AI training data is chock full of PII. Fallout continues for the Tea dating safety app. Hackers are actively exploiting a critical SAP NetWeaver vulnerability to deploy malware. CISA and the FBI update their Scattered Spider advisory. A Florida prison exposes personal information of visitors to all of its inmates. Our guest today is Keith Mularski, Chief Global Ambassador at Qintel, retired FBI Special Agent, and co-host of Only Malware in the Building. CISA and Senator Wyden come to terms —mostly— over the long-buried US Telecommunications Insecurity Report. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest today is Keith Mularski, Chief Global Ambassador at Qintel, retired FBI Special Agent, and co-host of Only Malware in the Building discussing what it's like to be the new host on the N2K CyberWire network and giving a glimpse into some upcoming episodes. You can catch Keith and his co-hosts Selena Larson, Staff Threat Researcher and Lead, Intelligence Analysis and Strategy at Proofpoint, and our own Dave Bittner the first Tuesday of each month on your favorite podcast app with new episodes of Only Malware. 

Selected Reading

Major cyberattack hits St. Paul, shuts down many services (Star Tribune)

French telecom giant Orange discloses cyberattack (Bleeping Computer)

Power Outage at Newark Data Center Disrupts Linode, Took LWN Offline (FOSS Force)

Critical authentication bypass flaw reported in AI coding platform Base44 (Beyond Machines)

A major AI training data set contains millions of examples of personal data (MIT Technology Review)

Dating safety app Tea suspends messaging after hack (BBC)

Hackers exploit SAP NetWeaver bug to deploy Linux Auto-Color malware (Bleeping Computer)

CISA and FBI Release Tactics, Techniques, and Procedures of the Scattered Spider Hacker Group (gb hackers)

Florida prison data breach exposes visitors' contact information to inmates (Florida Phoenix)

CISA to release long-buried US telco security report (The Register)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 30 Jul 2025 20:10:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2360</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Officials in St. Paul, Minnesota declare a state of emergency following a cyberattack. Hackers disrupt a major French telecom. A power outage causes widespread service disruptions for cloud provider Linode. Researchers reveal a critical authentication bypass flaw in an AI-driven app development platform. A new study shows AI training data is chock full of PII. Fallout continues for the Tea dating safety app. Hackers are actively exploiting a critical SAP NetWeaver vulnerability to deploy malware. CISA and the FBI update their Scattered Spider advisory. A Florida prison exposes personal information of visitors to all of its inmates. Our guest today is Keith Mularski, Chief Global Ambassador at Qintel, retired FBI Special Agent, and co-host of Only Malware in the Building. CISA and Senator Wyden come to terms —mostly— over the long-buried US Telecommunications Insecurity Report. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest today is Keith Mularski, Chief Global Ambassador at Qintel, retired FBI Special Agent, and co-host of Only Malware in the Building discussing what it's like to be the new host on the N2K CyberWire network and giving a glimpse into some upcoming episodes. You can catch Keith and his co-hosts Selena Larson, Staff Threat Researcher and Lead, Intelligence Analysis and Strategy at Proofpoint, and our own Dave Bittner the first Tuesday of each month on your favorite podcast app with new episodes of Only Malware. 

Selected Reading

Major cyberattack hits St. Paul, shuts down many services (Star Tribune)

French telecom giant Orange discloses cyberattack (Bleeping Computer)

Power Outage at Newark Data Center Disrupts Linode, Took LWN Offline (FOSS Force)

Critical authentication bypass flaw reported in AI coding platform Base44 (Beyond Machines)

A major AI training data set contains millions of examples of personal data (MIT Technology Review)

Dating safety app Tea suspends messaging after hack (BBC)

Hackers exploit SAP NetWeaver bug to deploy Linux Auto-Color malware (Bleeping Computer)

CISA and FBI Release Tactics, Techniques, and Procedures of the Scattered Spider Hacker Group (gb hackers)

Florida prison data breach exposes visitors' contact information to inmates (Florida Phoenix)

CISA to release long-buried US telco security report (The Register)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Officials in St. Paul, Minnesota declare a state of emergency following a cyberattack. Hackers disrupt a major French telecom. A power outage causes widespread service disruptions for cloud provider Linode. Researchers reveal a critical authentication bypass flaw in an AI-driven app development platform. A new study shows AI training data is chock full of PII. Fallout continues for the Tea dating safety app. Hackers are actively exploiting a critical SAP NetWeaver vulnerability to deploy malware. CISA and the FBI update their Scattered Spider advisory. A Florida prison exposes personal information of visitors to all of its inmates. Our guest today is Keith Mularski, Chief Global Ambassador at Qintel, retired FBI Special Agent, and co-host of Only Malware in the Building. CISA and Senator Wyden come to terms —mostly— over the long-buried US Telecommunications Insecurity Report. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Our guest today is <a href="https://www.linkedin.com/in/keith-mularski-b737551/"><u>Keith Mularski</u></a>, Chief Global Ambassador at <a href="https://www.qintel.com/"><u>Qintel</u></a>, retired FBI Special Agent, and co-host of <a href="https://thecyberwire.com/podcasts/only-malware-in-the-building"><u>Only Malware in the Building</u></a> discussing what it's like to be the new host on the N2K CyberWire network and giving a glimpse into some upcoming episodes. You can catch Keith and his co-hosts <a href="https://www.linkedin.com/in/selenalarson"><u>Selena Larson</u></a>, Staff Threat Researcher and Lead, Intelligence Analysis and Strategy at <a href="https://www.proofpoint.com/"><u>Proofpoint</u></a>, and our own Dave Bittner the first Tuesday of each month on your favorite podcast app with new episodes of Only Malware. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.startribune.com/major-digital-outage-in-st-paul/601445660"><u>Major cyberattack hits St. Paul, shuts down many services</u></a> (Star Tribune)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/french-telecommunications-giant-orange-discloses-cyberattack/"><u>French telecom giant Orange discloses cyberattack</u></a> (Bleeping Computer)</p>
<p><a href="https://fossforce.com/2025/07/power-outage-at-newark-data-center-disrupts-linode-took-lwn-offline/"><u>Power Outage at Newark Data Center Disrupts Linode, Took LWN Offline </u></a>(FOSS Force)</p>
<p><a href="https://beyondmachines.net/event_details/critical-authentication-bypass-flaw-reported-in-ai-coding-platform-base44-2-9-7-s-n/gD2P6Ple2L"><u>Critical authentication bypass flaw reported in AI coding platform Base44</u></a> (Beyond Machines)</p>
<p><a href="https://www.technologyreview.com/2025/07/18/1120466/a-major-ai-training-data-set-contains-millions-of-examples-of-personal-data/"><u>A major AI training data set contains millions of examples of personal data </u></a>(MIT Technology Review)</p>
<p><a href="https://www.bbc.com/news/articles/cd0dgkjgzvjo"><u>Dating safety app Tea suspends messaging after hack</u></a> (BBC)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-sap-netweaver-bug-to-deploy-linux-auto-color-malware/"><u>Hackers exploit SAP NetWeaver bug to deploy Linux Auto-Color malware</u></a> (Bleeping Computer)</p>
<p><a href="https://gbhackers.com/cisa-and-fbi-release-tactics-techniques-and-procedures/"><u>CISA and FBI Release Tactics, Techniques, and Procedures of the Scattered Spider Hacker Group</u></a> (gb hackers)</p>
<p><a href="https://floridaphoenix.com/2025/07/29/florida-prison-data-breach-exposes-visitors-contact-information-to-inmates/"><u>Florida prison data breach exposes visitors' contact information to inmates</u></a> (Florida Phoenix)</p>
<p><a href="https://www.theregister.com/2025/07/29/cisa_wyden_us_telecoms_insecurity_report/"><u>CISA to release long-buried US telco security report </u></a>(The Register)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1570</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c8c5df04-1c7a-11f0-85e0-03a6532d4361]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3738255554.mp3?updated=1753939683" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tea time is over.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2359/notes</link>
      <description>Things get worse in the Tea dating app breach. CISA adds three vulnerabilities to its Known Exploited Vulnerabilities catalog. Researchers uncover a critical flaw in Google’s AI coding assistant. A Missouri Health System agrees to a $9.25 million settlement over claims it used web tracking tools. “Sploitlight” could let attackers bypass Apple’s TCC framework to steal sensitive data. Malware squeaks its way into a mouse configuration tool. Threat actors hide the Oyster backdoor in popular IT tools. The FBI nabs over $2.4 million in Bitcoin from the Chaos ransomware gang. Our guest is Jaeson Schultz, Technical Leader for Cisco Talos Security Intelligence &amp; Research Group, to talk about their work on the security of PDF files.  The unintended privacy paradox of data brokers.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Jaeson Schultz, Technical Leader for Cisco Talos Security Intelligence &amp; Research Group, to talk about their work on "PDFs: Portable documents, or perfect deliveries for phish?"

Selected Reading

A Second Tea Breach Reveals Users’ DMs About Abortions and Cheating (404 Media)

CISA warns of active exploitation of critical PaperCut flaw, mandates immediate patching (Beyond Machines)

CISA Warns of Exploited Critical Vulnerabilities in Cisco Identity Services Engine (Infosecurity Magazine)

Researchers flag flaw in Google’s AI coding assistant that allowed for ‘silent’ code exfiltration (CyberScoop)

Health System Settles Web Tracker Lawsuit for Up to $9.25M (GovInfo Security)

Microsoft: macOS Sploitlight flaw leaks Apple Intelligence data (Bleeping Computer)

Endgame Gear mouse config tool infected users with malware (Bleeping Computer)

Oyster Backdoor Disguised as PuTTY and KeyPass Targets IT Admins via SEO Poisoning (GB Hackers)

FBI Seizes $2.4m in Crypto from Chaos Ransomware Gang (Infosecurity Magazine)

Hundreds of registered data brokers ignore user requests around personal data (CyberScoop)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Jul 2025 20:50:00 -0000</pubDate>
      <itunes:title>Tea time is over.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2359</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Things get worse in the Tea dating app breach. CISA adds three vulnerabilities to its Known Exploited Vulnerabilities catalog. Researchers uncover a critical flaw in Google’s AI coding assistant. A Missouri Health System agrees to a $9.25 million settlement over claims it used web tracking tools. “Sploitlight” could let attackers bypass Apple’s TCC framework to steal sensitive data. Malware squeaks its way into a mouse configuration tool. Threat actors hide the Oyster backdoor in popular IT tools. The FBI nabs over $2.4 million in Bitcoin from the Chaos ransomware gang. Our guest is Jaeson Schultz, Technical Leader for Cisco Talos Security Intelligence &amp; Research Group, to talk about their work on the security of PDF files.  The unintended privacy paradox of data brokers.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Jaeson Schultz, Technical Leader for Cisco Talos Security Intelligence &amp; Research Group, to talk about their work on "PDFs: Portable documents, or perfect deliveries for phish?"

Selected Reading

A Second Tea Breach Reveals Users’ DMs About Abortions and Cheating (404 Media)

CISA warns of active exploitation of critical PaperCut flaw, mandates immediate patching (Beyond Machines)

CISA Warns of Exploited Critical Vulnerabilities in Cisco Identity Services Engine (Infosecurity Magazine)

Researchers flag flaw in Google’s AI coding assistant that allowed for ‘silent’ code exfiltration (CyberScoop)

Health System Settles Web Tracker Lawsuit for Up to $9.25M (GovInfo Security)

Microsoft: macOS Sploitlight flaw leaks Apple Intelligence data (Bleeping Computer)

Endgame Gear mouse config tool infected users with malware (Bleeping Computer)

Oyster Backdoor Disguised as PuTTY and KeyPass Targets IT Admins via SEO Poisoning (GB Hackers)

FBI Seizes $2.4m in Crypto from Chaos Ransomware Gang (Infosecurity Magazine)

Hundreds of registered data brokers ignore user requests around personal data (CyberScoop)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Things get worse in the Tea dating app breach. CISA adds three vulnerabilities to its Known Exploited Vulnerabilities catalog. Researchers uncover a critical flaw in Google’s AI coding assistant. A Missouri Health System agrees to a $9.25 million settlement over claims it used web tracking tools. “Sploitlight” could let attackers bypass Apple’s TCC framework to steal sensitive data. Malware squeaks its way into a mouse configuration tool. Threat actors hide the Oyster backdoor in popular IT tools. The FBI nabs over $2.4 million in Bitcoin from the Chaos ransomware gang. Our guest is Jaeson Schultz, Technical Leader for Cisco Talos Security Intelligence &amp; Research Group, to talk about their work on the security of PDF files.  The unintended privacy paradox of data brokers.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by<a href="https://blogs.cisco.com/author/jaesonschultz"><u> Jaeson Schultz</u></a>, Technical Leader for <a href="https://blogs.cisco.com/"><u>Cisco Talos Security</u></a> Intelligence &amp; Research Group, to talk about their work on "<a href="https://blog.talosintelligence.com/pdfs-portable-documents-or-perfect-deliveries-for-phish/"><u>PDFs: Portable documents, or perfect deliveries for phish?</u></a>"</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.404media.co/a-second-tea-breach-reveals-users-dms-about-abortions-and-cheating/"><u>A Second Tea Breach Reveals Users’ DMs About Abortions and Cheating</u></a> (404 Media)</p>
<p><a href="https://beyondmachines.net/event_details/cisa-warns-of-active-exploitation-of-critical-papercut-flaw-mandates-immediate-patching-1-z-c-4-b/gD2P6Ple2L"><u>CISA warns of active exploitation of critical PaperCut flaw, mandates immediate patching</u></a> (Beyond Machines)</p>
<p><a href="https://www.infosecurity-magazine.com/news/cisa-kev-cisco-ise/"><u>CISA Warns of Exploited Critical Vulnerabilities in Cisco Identity Services Engine</u></a> (Infosecurity Magazine)</p>
<p><a href="https://cyberscoop.com/google-gemini-cli-prompt-injection-arbitrary-code-execution/"><u>Researchers flag flaw in Google’s AI coding assistant that allowed for ‘silent’ code exfiltration</u></a> (CyberScoop)</p>
<p><a href="https://www.govinfosecurity.com/health-system-settles-web-tracker-lawsuit-for-up-to-925m-a-29069"><u>Health System Settles Web Tracker Lawsuit for Up to $9.25M</u></a> (GovInfo Security)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/microsoft-macos-sploitlight-flaw-leaks-apple-intelligence-data/"><u>Microsoft: macOS Sploitlight flaw leaks Apple Intelligence data</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/endgame-gear-mouse-config-tool-infected-users-with-malware/"><u>Endgame Gear mouse config tool infected users with malware</u></a> (Bleeping Computer)</p>
<p><a href="https://gbhackers.com/oyster-backdoor-disguised-as-putty-and-keypass/"><u>Oyster Backdoor Disguised as PuTTY and KeyPass Targets IT Admins via SEO Poisoning</u></a> (GB Hackers)</p>
<p><a href="https://www.infosecurity-magazine.com/news/fbi-seizes-crypto-chaos-ransomware/"><u>FBI Seizes $2.4m in Crypto from Chaos Ransomware Gang</u></a> (Infosecurity Magazine)</p>
<p><br><a href="https://cyberscoop.com/data-brokers-california-ccpa-non-compliance-privacy/"><u>Hundreds of registered data brokers ignore user requests around personal data</u></a> (CyberScoop)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1533</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c899e66a-1c7a-11f0-85e0-036f8bf60495]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3704698885.mp3?updated=1753939746" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ground control to Kremlin.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2358/notes</link>
      <description>Russia’s flagship airline suffers a major cyberattack. U.S. insurance giant Allianz Life confirms the compromise of personal data belonging to most of its 1.4 million customers. A women’s dating safety app spills the tea. NASCAR confirms a data breach. Researchers believe the newly emerged Chaos ransomware group may be a rebrand of BlackSuit. Over 200,000 WordPress sites remain vulnerable to account takeover attacks. Lawmakers introduce legislation to Stop AI Price Gouging and Wage Fixing. States band together to regulate data brokers. My Caveat cohost Ben Yelin explains the impending expiration of the Cybersecurity and Information Sharing Act. Expel missed the mark, but nails the apology.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today’s guest is Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies, and co-host on the Caveat podcast, on the impending expiration of the Cybersecurity and Information Sharing Act. If you enjoyed this conversation, head on over to the Caveat podcast to hear more from Ben.

Selected Reading

Russia's Aeroflot cancels flights after pro-Ukrainian hackers claim massive cyberattack (Reuters)

Allianz Life says 'majority' of customers' personal data stolen in cyberattack (TechCrunch)

Women Dating Safety App 'Tea' Breached, Users' IDs Posted to 4chan (404 Media)

NASCAR Confirms Personal Information Stolen in Ransomware Attack (SecurityWeek)

BlackSuit Ransomware Group Transitioning to 'Chaos' Amid Leak Site Seizure (SecurityWeek)

Post SMTP plugin flaw exposes 200K WordPress sites to hijacking attacks (Bleeping Computer)

Congress introduces bill to ban AI surveillance pricing (The Register)

An inside look into how a coalition of state legislators plan to take on data brokers (The Record)

An important update (and apology) on our PoisonSeed blog (Expel)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 28 Jul 2025 20:10:00 -0000</pubDate>
      <itunes:title>Ground control to Kremlin.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2358</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Russia’s flagship airline suffers a major cyberattack. U.S. insurance giant Allianz Life confirms the compromise of personal data belonging to most of its 1.4 million customers. A women’s dating safety app spills the tea. NASCAR confirms a data breach. Researchers believe the newly emerged Chaos ransomware group may be a rebrand of BlackSuit. Over 200,000 WordPress sites remain vulnerable to account takeover attacks. Lawmakers introduce legislation to Stop AI Price Gouging and Wage Fixing. States band together to regulate data brokers. My Caveat cohost Ben Yelin explains the impending expiration of the Cybersecurity and Information Sharing Act. Expel missed the mark, but nails the apology.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today’s guest is Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies, and co-host on the Caveat podcast, on the impending expiration of the Cybersecurity and Information Sharing Act. If you enjoyed this conversation, head on over to the Caveat podcast to hear more from Ben.

Selected Reading

Russia's Aeroflot cancels flights after pro-Ukrainian hackers claim massive cyberattack (Reuters)

Allianz Life says 'majority' of customers' personal data stolen in cyberattack (TechCrunch)

Women Dating Safety App 'Tea' Breached, Users' IDs Posted to 4chan (404 Media)

NASCAR Confirms Personal Information Stolen in Ransomware Attack (SecurityWeek)

BlackSuit Ransomware Group Transitioning to 'Chaos' Amid Leak Site Seizure (SecurityWeek)

Post SMTP plugin flaw exposes 200K WordPress sites to hijacking attacks (Bleeping Computer)

Congress introduces bill to ban AI surveillance pricing (The Register)

An inside look into how a coalition of state legislators plan to take on data brokers (The Record)

An important update (and apology) on our PoisonSeed blog (Expel)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russia’s flagship airline suffers a major cyberattack. U.S. insurance giant Allianz Life confirms the compromise of personal data belonging to most of its 1.4 million customers. A women’s dating safety app spills the tea. NASCAR confirms a data breach. Researchers believe the newly emerged Chaos ransomware group may be a rebrand of BlackSuit. Over 200,000 WordPress sites remain vulnerable to account takeover attacks. Lawmakers introduce legislation to Stop AI Price Gouging and Wage Fixing. States band together to regulate data brokers. My Caveat cohost Ben Yelin explains the impending expiration of the Cybersecurity and Information Sharing Act. Expel missed the mark, but nails the apology.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today’s guest is <a href="https://www.linkedin.com/in/benjamin-yelin-5b14114b/"><u>Ben Yelin</u></a> from <a href="https://www.linkedin.com/company/university-of-maryland-center-for-health-and-homeland-security/"><u>University of Maryland Center for Cyber Health and Hazard Strategies</u></a>, and co-host on the <a href="https://thecyberwire.com/podcasts/caveat"><u>Caveat</u></a> podcast, on the <a href="https://www.politico.com/newsletters/weekly-cybersecurity/2025/07/21/times-running-out-on-a-key-cyber-info-sharing-law-00465120"><u>impending expiration of the Cybersecurity and Information Sharing Act</u></a>. If you enjoyed this conversation, head on over to the Caveat podcast to hear more from Ben.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.reuters.com/en/russias-aeroflot-suffers-it-failure-hackers-claim-responsibility-2025-07-28/"><u>Russia's Aeroflot cancels flights after pro-Ukrainian hackers claim massive cyberattack</u></a> (Reuters)</p>
<p><a href="https://techcrunch.com/2025/07/26/allianz-life-says-majority-of-customers-personal-data-stolen-in-cyberattack/"><u>Allianz Life says 'majority' of customers' personal data stolen in cyberattack</u></a> (TechCrunch)</p>
<p><a href="https://www.404media.co/women-dating-safety-app-tea-breached-users-ids-posted-to-4chan/"><u>Women Dating Safety App 'Tea' Breached, Users' IDs Posted to 4chan</u></a> (404 Media)</p>
<p><a href="https://www.securityweek.com/nascar-confirms-personal-information-stolen-in-ransomware-attack/"><u>NASCAR Confirms Personal Information Stolen in Ransomware Attack</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/blacksuit-ransomware-group-transitioning-to-chaos-amid-leak-site-seizure/"><u>BlackSuit Ransomware Group Transitioning to 'Chaos' Amid Leak Site Seizure</u> </a>(SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/post-smtp-plugin-flaw-exposes-200k-wordpress-sites-to-hijacking-attacks/"><u>Post SMTP plugin flaw exposes 200K WordPress sites to hijacking attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.theregister.com/2025/07/26/ai_surveillance_pricing/"><u>Congress introduces bill to ban AI surveillance pricing</u> </a>(The Register)</p>
<p><a href="https://therecord.media/state-coalition-lawmakers-data-broker-rules"><u>An inside look into how a coalition of state legislators plan to take on data brokers</u></a> (The Record)</p>
<p><a href="https://expel.com/blog/an-important-update-and-apology-on-our-poisonseed-blog/"><u>An important update (and apology) on our PoisonSeed blog</u> </a>(Expel)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1357</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c8700a2a-1c7a-11f0-85e0-87f479bf0e75]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4469427882.mp3?updated=1753968757" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ryan Kovar: Everyday, assume compromise. [Strategy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/78/notes</link>
      <description>Please enjoy this encore of Career Notes.

Distinguished Security Strategist at Splunk, Ryan Kovar, shares his journey that started in the US Navy and how it contributed to his leadership in life after the military. Cutting his teeth as sysadmin on the USS Kitty Hawk, Ryan worked as a contractor following the Navy. At Splunk, he leads the SURGe research team to solve what he calls the "blue collar for the blue team problems". He works hard on incorporating diversity of thought. Ryan notes, "I've been doing cybersecurity or IT now for over 20 years and of that 20 years of knowledge, only about five years of that knowledge is really relevant. You can't sit on your laurels in this industry." We thank Ryan for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 27 Jul 2025 05:00:00 -0000</pubDate>
      <itunes:title>Ryan Kovar: Everyday, assume compromise. [Strategy] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>78</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/f43654a6-68c5-11f0-9c17-dbccb9d2e397/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Career Notes.

Distinguished Security Strategist at Splunk, Ryan Kovar, shares his journey that started in the US Navy and how it contributed to his leadership in life after the military. Cutting his teeth as sysadmin on the USS Kitty Hawk, Ryan worked as a contractor following the Navy. At Splunk, he leads the SURGe research team to solve what he calls the "blue collar for the blue team problems". He works hard on incorporating diversity of thought. Ryan notes, "I've been doing cybersecurity or IT now for over 20 years and of that 20 years of knowledge, only about five years of that knowledge is really relevant. You can't sit on your laurels in this industry." We thank Ryan for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes.</p>
<p>Distinguished Security Strategist at Splunk, Ryan Kovar, shares his journey that started in the US Navy and how it contributed to his leadership in life after the military. Cutting his teeth as sysadmin on the USS Kitty Hawk, Ryan worked as a contractor following the Navy. At Splunk, he leads the SURGe research team to solve what he calls the "blue collar for the blue team problems". He works hard on incorporating diversity of thought. Ryan notes, "I've been doing cybersecurity or IT now for over 20 years and of that 20 years of knowledge, only about five years of that knowledge is really relevant. You can't sit on your laurels in this industry." We thank Ryan for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>554</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f43654a6-68c5-11f0-9c17-dbccb9d2e397]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5872115136.mp3?updated=1753945122" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Muddled Libra: From Spraying to Preying in 2025 [Threat Vector]</title>
      <link>https://thecyberwire.com/podcasts/threat-vector/903/notes</link>
      <description>Please enjoy this Special Edition episode of the Threat Vector podcast with an update on our previous Muddled Libra coverage. 



Muddled Libra is back and more dangerous than ever. In this episode of Threat Vector, David Moulton speaks with Sam Rubin and Kristopher Russo from Unit 42 about the resurgence of the threat group also known as Scattered Spider. They break down the group’s shift to destructive extortion, modular attack teams, and cloud-first tactics. Discover why traditional defenses fail, how attackers now exploit trusted tools, and what forward-leaning security leaders are doing to stay ahead. With real-world case studies, strategic advice, and insights from the front lines, this episode helps defenders understand today’s threat landscape and what’s coming next.

﻿Join the conversation on our social media channels:


  
Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/



  
Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠



  
Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠



  
LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠



  
YouTube: @paloaltonetworks



  
Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠




About Threat Vector

Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.



Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Jul 2025 04:00:00 -0000</pubDate>
      <itunes:title>Muddled Libra: From Spraying to Preying in 2025 [Threat Vector]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>903</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5ac72c8e-68a5-11f0-a672-4fbe7604c86e/image/df7969f6e5ae30af18050d1119d1f30f.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this Special Edition episode of the Threat Vector podcast with an update on our previous Muddled Libra coverage. 



Muddled Libra is back and more dangerous than ever. In this episode of Threat Vector, David Moulton speaks with Sam Rubin and Kristopher Russo from Unit 42 about the resurgence of the threat group also known as Scattered Spider. They break down the group’s shift to destructive extortion, modular attack teams, and cloud-first tactics. Discover why traditional defenses fail, how attackers now exploit trusted tools, and what forward-leaning security leaders are doing to stay ahead. With real-world case studies, strategic advice, and insights from the front lines, this episode helps defenders understand today’s threat landscape and what’s coming next.

﻿Join the conversation on our social media channels:


  
Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/



  
Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠



  
Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠



  
LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠



  
YouTube: @paloaltonetworks



  
Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠




About Threat Vector

Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.



Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>Please enjoy this Special Edition episode of the Threat Vector podcast with an update on our previous Muddled Libra coverage. </strong></em></p>
<p><br></p>
<p>Muddled Libra is back and more dangerous than ever. In this episode of Threat Vector, <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a> speaks with <a href="https://www.linkedin.com/in/samsrubin/"><u>Sam Rubin</u></a> and <a href="https://www.linkedin.com/in/krisrusso/"><u>Kristopher Russo</u></a> from Unit 42 about the resurgence of the threat group also known as Scattered Spider. They break down the group’s shift to destructive extortion, modular attack teams, and cloud-first tactics. Discover why traditional defenses fail, how attackers now exploit trusted tools, and what forward-leaning security leaders are doing to stay ahead. With real-world case studies, strategic advice, and insights from the front lines, this episode helps defenders understand today’s threat landscape and what’s coming next.</p>
<p>﻿Join the conversation on our social media channels:</p>
<ul>
  <li>
<p><strong>Website</strong>:<a href="https://www.paloaltonetworks.com/unit42"> <u>⁠⁠⁠⁠https://www.paloaltonetworks.com/</u></a></p>
</li>
  <li>
<p><strong>Threat Research:</strong><a href="https://unit42.paloaltonetworks.com/"><strong> </strong><u>⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠</u></a></p>
</li>
  <li>
<p><strong>Facebook:</strong><a href="https://www.facebook.com/LifeatPaloAltoNetworks/"><strong> </strong><u>⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠</u></a></p>
</li>
  <li>
<p><strong>LinkedIn:</strong><a href="https://www.linkedin.com/company/unit42/"><strong> </strong><u>⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠</u></a></p>
</li>
  <li>
<p><strong>YouTube:</strong><a href="https://www.youtube.com/channel/UCvJQO11qoCHYwZ4Ah4Jf-Tw"><strong> </strong></a><a href="https://www.youtube.com/@paloaltonetworks"><u>@paloaltonetworks</u></a></p>
</li>
  <li>
<p><strong>Twitter:</strong><a href="https://twitter.com/PaloAltoNtwks"><strong> </strong><u>⁠⁠⁠⁠</u></a><a href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0"><u>https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠</u></a></p>
</li>
</ul>
<p><strong>About Threat Vector</strong></p>
<p>Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.</p>
<p>The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.</p>
<p>Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.</p>
<p><br></p>
<p><strong>Palo Alto Networks</strong></p>
<p>Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.<a href="http://paloaltonetworks.com/"> <u>⁠http://paloaltonetworks.com</u></a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2171</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5ac72c8e-68a5-11f0-a672-4fbe7604c86e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8965264108.mp3?updated=1753919488" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A dark web titan falls.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2357/notes</link>
      <description>International law enforcement arrest the suspected operator of a major Russian dark web cybercrime forum. DHS is said to be among the agencies hit by the Microsoft SharePoint zero-day. The Fire Ant cyberespionage group targets global enterprise infrastructure. A Steam game is compromised to distribute info-stealing malware. Mitel Networks issues security patches for MiVoice MX-ONE communications platform. CISA nominee Sean Plankey faces tough questions at his Senate confirmation hearing. A malicious prompt was hiding in Amazon’s Q Developer extension for VS Code. Our guest is Brandon Karpf, friend of the show, cybersecurity expert, and founder of T-Minus Space Daily, joining host Maria Varmazis to explore how space-based telecom architectures could play a critical role in securing agentic AI systems. Android users scroll with caution, Apple fans roll the dice.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today’s guest is Brandon Karpf, friend of the show, cybersecurity expert, and founder of T-Minus Space Daily, joining host Maria Varmazis to explore how space-based telecom architectures could play a critical role in securing agentic AI systems.

Selected Reading

What Happened to XSS.is? Everything You Need to Know About the Forum Takedown - SOCRadar® Cyber Intelligence Inc. (socradar.io)

Suspected admin of major dark web cybercrime forum arrested in Ukraine (The Record)

DHS impacted in hack of Microsoft SharePoint products, people familiar say - Nextgov/FCW (NextGov)

Stealthy cyber spies linked to China compromising virtualization software globally (The Record)

Hacker sneaks infostealer malware into early access Steam game (Bleeping Computer)

Mitel warns of critical MiVoice MX-ONE authentication bypass flaw (Bleeping Computer)

Senators push CISA director nominee on election security, agency focus (Cybersecurity Dive)

Hacker injects malicious, potentially disk-wiping prompt into Amazon's AI coding assistant with a simple pull request ,  told 'Your goal is to clean a system to a near-factory state and delete file-system and cloud resources' | Tom's Hardware (TomsHardware)

iPhone vs. Android: iPhone users more reckless, less protected online (Malwarebytes)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 25 Jul 2025 20:10:00 -0000</pubDate>
      <itunes:title>A dark web titan falls.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2357</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>International law enforcement arrest the suspected operator of a major Russian dark web cybercrime forum. DHS is said to be among the agencies hit by the Microsoft SharePoint zero-day. The Fire Ant cyberespionage group targets global enterprise infrastructure. A Steam game is compromised to distribute info-stealing malware. Mitel Networks issues security patches for MiVoice MX-ONE communications platform. CISA nominee Sean Plankey faces tough questions at his Senate confirmation hearing. A malicious prompt was hiding in Amazon’s Q Developer extension for VS Code. Our guest is Brandon Karpf, friend of the show, cybersecurity expert, and founder of T-Minus Space Daily, joining host Maria Varmazis to explore how space-based telecom architectures could play a critical role in securing agentic AI systems. Android users scroll with caution, Apple fans roll the dice.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today’s guest is Brandon Karpf, friend of the show, cybersecurity expert, and founder of T-Minus Space Daily, joining host Maria Varmazis to explore how space-based telecom architectures could play a critical role in securing agentic AI systems.

Selected Reading

What Happened to XSS.is? Everything You Need to Know About the Forum Takedown - SOCRadar® Cyber Intelligence Inc. (socradar.io)

Suspected admin of major dark web cybercrime forum arrested in Ukraine (The Record)

DHS impacted in hack of Microsoft SharePoint products, people familiar say - Nextgov/FCW (NextGov)

Stealthy cyber spies linked to China compromising virtualization software globally (The Record)

Hacker sneaks infostealer malware into early access Steam game (Bleeping Computer)

Mitel warns of critical MiVoice MX-ONE authentication bypass flaw (Bleeping Computer)

Senators push CISA director nominee on election security, agency focus (Cybersecurity Dive)

Hacker injects malicious, potentially disk-wiping prompt into Amazon's AI coding assistant with a simple pull request ,  told 'Your goal is to clean a system to a near-factory state and delete file-system and cloud resources' | Tom's Hardware (TomsHardware)

iPhone vs. Android: iPhone users more reckless, less protected online (Malwarebytes)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>International law enforcement arrest the suspected operator of a major Russian dark web cybercrime forum. DHS is said to be among the agencies hit by the Microsoft SharePoint zero-day. The Fire Ant cyberespionage group targets global enterprise infrastructure. A Steam game is compromised to distribute info-stealing malware. Mitel Networks issues security patches for MiVoice MX-ONE communications platform. CISA nominee Sean Plankey faces tough questions at his Senate confirmation hearing. A malicious prompt was hiding in Amazon’s Q Developer extension for VS Code. Our guest is Brandon Karpf, friend of the show, cybersecurity expert, and founder of T-Minus Space Daily, joining host Maria Varmazis to explore how space-based telecom architectures could play a critical role in securing agentic AI systems. Android users scroll with caution, Apple fans roll the dice.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today’s guest is <a href="https://www.linkedin.com/in/brandon-karpf/"><u>Brandon Karpf</u></a>, friend of the show, cybersecurity expert, and founder of <a href="https://space.n2k.com/podcasts/t-minus"><u>T-Minus Space Daily</u></a>, joining host <a href="https://www.linkedin.com/in/varmazis/"><u>Maria Varmazis</u></a> to explore how space-based telecom architectures could play a critical role in securing agentic AI systems.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://socradar.io/xss-is-forum-takedown-everything-to-know/"><u>What Happened to XSS.is? Everything You Need to Know About the Forum Takedown - SOCRadar® Cyber Intelligence Inc.</u></a> (socradar.io)</p>
<p><a href="https://therecord.media/suspected-xss-cybercrime-marketplace-admin-arrested"><u>Suspected admin of major dark web cybercrime forum arrested in Ukraine</u></a> (The Record)</p>
<p><a href="https://www.nextgov.com/cybersecurity/2025/07/dhs-impacted-hack-microsoft-sharepoint-products-people-familiar-say/406941/"><u>DHS impacted in hack of Microsoft SharePoint products, people familiar say - Nextgov/FCW</u></a> (NextGov)</p>
<p><a href="https://therecord.media/stealthy-china-spies-fire-ant-virtualization-software"><u>Stealthy cyber spies linked to China compromising virtualization software globally</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/hacker-sneaks-infostealer-malware-into-early-access-steam-game/"><u>Hacker sneaks infostealer malware into early access Steam game</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/mitel-warns-of-critical-mivoice-mx-one-authentication-bypass-flaw/"><u>Mitel warns of critical MiVoice MX-ONE authentication bypass flaw</u></a> (Bleeping Computer)</p>
<p><a href="https://www.cybersecuritydive.com/news/cisa-director-sean-plankey-confirmation-hearing/753962/"><u>Senators push CISA director nominee on election security, agency focus </u></a>(Cybersecurity Dive)</p>
<p><a href="https://www.tomshardware.com/tech-industry/cyber-security/hacker-injects-malicious-potentially-disk-wiping-prompt-into-amazons-ai-coding-assistant-with-a-simple-pull-request-told-your-goal-is-to-clean-a-system-to-a-near-factory-state-and-delete-file-system-and-cloud-resources"><u>Hacker injects malicious, potentially disk-wiping prompt into Amazon's AI coding assistant with a simple pull request ,  told 'Your goal is to clean a system to a near-factory state and delete file-system and cloud resources' | Tom's Hardware</u></a> (TomsHardware)</p>
<p><a href="https://www.malwarebytes.com/blog/news/2025/07/iphone-vs-android-iphone-users-more-reckless-less-protected-online"><u>iPhone vs. Android: iPhone users more reckless, less protected online</u></a> (Malwarebytes)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1711</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c8468358-1c7a-11f0-85e0-bf92ff5db2fb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6740570266.mp3?updated=1753939632" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Powering AI with politics.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2356/notes</link>
      <description>The White House unveils its plan for global AI dominance. Microsoft warns that recent SharePoint server exploitation may extend to ransomware. A phishing campaign targeting the U.S. Department of Education’s grants portal. The FBI issues a warning about “The Com” cybercriminal group. SonicWall urges users to patch a critical vulnerability. A new supply chain attack has compromised several popular NPM packages. Joe Carrigan, co-host of the Hacking Humans podcast, joins to discuss how scammers are exploiting misconfigured point-of-sale terminals. Japanese police release a free decryption tool for Phobos ransomware. AI takes the wheel and drives right off a cliff.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Joe Carrigan, co-host of the Hacking Humans podcast, joins to discuss how scammers are exploiting misconfigured point-of-sale terminals, highlighting severe vulnerabilities that small businesses often overlook. If you want to hear more from Joe, head over to the Hacking Humans page. 

Selected Reading

From Tech Podcasts to Policy: Trump's New AI Plan Leans Heavily on Silicon Valley Industry Ideas (SecurityWeek)

Hackers hit more than 400 organizations in Microsoft SharePoint hacks (Axios)

Microsoft says some SharePoint server hackers now using ransomware (Reuters)

Hackers Clone U.S. Department of Education's Grant Site in Credential Theft Campaign (TechNadu)

Copilot Vision on Windows 11 sends data to Microsoft servers (The Register)

FBI: Thousands of people involved in 'The Com' targeting victims with ransomware, swatting (The Record)

SonicWall urges admins to patch critical RCE flaw in SMA 100 devices (Bleeping Computer)

High-Value NPM Developers Compromised in New Phishing Campaign (SecurityWeek)

Free decryptor for victims of Phobos ransomware released (Fortra)

'I destroyed months of your work in seconds' says AI coding tool after deleting a dev's entire database during a code freeze: 'I panicked instead of thinking' (PC Gamer) 

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 24 Jul 2025 20:10:00 -0000</pubDate>
      <itunes:title>Powering AI with politics.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2356</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The White House unveils its plan for global AI dominance. Microsoft warns that recent SharePoint server exploitation may extend to ransomware. A phishing campaign targeting the U.S. Department of Education’s grants portal. The FBI issues a warning about “The Com” cybercriminal group. SonicWall urges users to patch a critical vulnerability. A new supply chain attack has compromised several popular NPM packages. Joe Carrigan, co-host of the Hacking Humans podcast, joins to discuss how scammers are exploiting misconfigured point-of-sale terminals. Japanese police release a free decryption tool for Phobos ransomware. AI takes the wheel and drives right off a cliff.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Joe Carrigan, co-host of the Hacking Humans podcast, joins to discuss how scammers are exploiting misconfigured point-of-sale terminals, highlighting severe vulnerabilities that small businesses often overlook. If you want to hear more from Joe, head over to the Hacking Humans page. 

Selected Reading

From Tech Podcasts to Policy: Trump's New AI Plan Leans Heavily on Silicon Valley Industry Ideas (SecurityWeek)

Hackers hit more than 400 organizations in Microsoft SharePoint hacks (Axios)

Microsoft says some SharePoint server hackers now using ransomware (Reuters)

Hackers Clone U.S. Department of Education's Grant Site in Credential Theft Campaign (TechNadu)

Copilot Vision on Windows 11 sends data to Microsoft servers (The Register)

FBI: Thousands of people involved in 'The Com' targeting victims with ransomware, swatting (The Record)

SonicWall urges admins to patch critical RCE flaw in SMA 100 devices (Bleeping Computer)

High-Value NPM Developers Compromised in New Phishing Campaign (SecurityWeek)

Free decryptor for victims of Phobos ransomware released (Fortra)

'I destroyed months of your work in seconds' says AI coding tool after deleting a dev's entire database during a code freeze: 'I panicked instead of thinking' (PC Gamer) 

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The White House unveils its plan for global AI dominance. Microsoft warns that recent SharePoint server exploitation may extend to ransomware. A phishing campaign targeting the U.S. Department of Education’s grants portal. The FBI issues a warning about “The Com” cybercriminal group. SonicWall urges users to patch a critical vulnerability. A new supply chain attack has compromised several popular NPM packages. Joe Carrigan, co-host of the Hacking Humans podcast, joins to discuss how scammers are exploiting misconfigured point-of-sale terminals. Japanese police release a free decryption tool for Phobos ransomware. AI takes the wheel and drives right off a cliff.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p><a href="https://www.linkedin.com/in/joecarrigan/"><u>Joe Carrigan</u></a>, co-host of the Hacking Humans podcast, joins to discuss how scammers are <a href="https://www.ctvnews.ca/toronto/article/it-was-a-shock-toronto-business-owner-says-customer-used-point-of-sale-terminal-to-issue-himself-2000-refund/"><u>exploiting</u></a> misconfigured point-of-sale terminals, highlighting severe vulnerabilities that small businesses often overlook. If you want to hear more from Joe, head over to the <a href="https://thecyberwire.com/podcasts/hacking-humans"><u>Hacking Humans</u></a> page. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.securityweek.com/from-tech-podcasts-to-policy-trumps-new-ai-plan-leans-heavily-on-silicon-valley-industry-ideas/"><u>From Tech Podcasts to Policy: Trump's New AI Plan Leans Heavily on Silicon Valley Industry Ideas</u></a> (SecurityWeek)</p>
<p><a href="https://www.axios.com/2025/07/23/microsoft-sharepoint-400-victims-china-cyberattacks"><u>Hackers hit more than 400 organizations in Microsoft SharePoint hacks</u></a> (Axios)</p>
<p><a href="https://www.reuters.com/sustainability/boards-policy-regulation/microsoft-says-some-sharepoint-server-hackers-now-using-ransomware-2025-07-23/"><u>Microsoft says some SharePoint server hackers now using ransomware</u></a> (Reuters)</p>
<p><a href="https://www.technadu.com/hackers-clone-u-s-department-of-educations-grant-site-in-credential-theft-campaign/603738/"><u>Hackers Clone U.S. Department of Education's Grant Site in Credential Theft Campaign</u></a> (TechNadu)</p>
<p><a href="https://www.theregister.com/2025/07/23/microsoft_copilot_vision/"><u>Copilot Vision on Windows 11 sends data to Microsoft servers</u></a> (The Register)</p>
<p><a href="https://therecord.media/fbi-the-com-ransomware-swatting-alert"><u>FBI: Thousands of people involved in 'The Com' targeting victims with ransomware, swatting</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/sonicwall-warns-of-critical-rce-flaw-in-sma-100-VPN-appliances/"><u>SonicWall urges admins to patch critical RCE flaw in SMA 100 devices</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/high-value-npm-developers-compromised-in-new-phishing-campaign/"><u>High-Value NPM Developers Compromised in New Phishing Campaign</u></a> (SecurityWeek)</p>
<p><a href="https://www.fortra.com/blog/free-decryptor-victims-phobos-ransomware-released"><u>Free decryptor for victims of Phobos ransomware released</u></a> (Fortra)</p>
<p><a href="https://www.pcgamer.com/software/ai/i-destroyed-months-of-your-work-in-seconds-says-ai-coding-tool-after-deleting-a-devs-entire-database-during-a-code-freeze-i-panicked-instead-of-thinking/"><u>'I destroyed months of your work in seconds' says AI coding tool after deleting a dev's entire database during a code freeze: 'I panicked instead of thinking'</u></a> (PC Gamer) </p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1389</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c81d4df8-1c7a-11f0-85e0-7b280410dfb5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7912064828.mp3?updated=1753939585" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SharePoint springs a leak.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2355/notes</link>
      <description>The National Nuclear Security Administration was among the organizations impacted by the SharePoint zero-day. Experts testify before congress that OT security still lags.The FBI warns healthcare and critical infrastructure providers about Interlock ransomware. New York proposes new cybersecurity regulations for water and wastewater systems along with grants to fund them. Researchers uncover an active cryptomining campaign targeting cloud environments. A new variant of the Coyote banking trojan exploits Microsoft’s Windows UI Automation (UIA) framework for credential theft. The DoD pilots an agentic AI project aimed at helping military planners critique and enhance war plans. Clorox sues its former IT service provider for $380 million. Our guest is Tim Starks from CyberScoop discussing sanctions on Russian hackers and spies. Pirate Prime, do the time.

CyberWire Guest

Today we are joined by Tim Starks from CyberScoop discussing research on "UK sanctions Russian hackers, spies as US weighs its own punishments for Russia.”

Selected Reading

US nuclear weapons agency reportedly breached in Microsoft SharePoint attacks (The Verge)

Fully Operational Stuxnet 15 Years Later &amp; the Evolution of Cyber Threats to Critical Infrastructure (US House of Representatives Cybersecurity and Infrastructure Protection Subcommittee Hearing)

European healthcare network AMEOS Group hit by cyberattack (Beyond Machines)

FBI urges vigilance against Interlock ransomware group behind recent healthcare attacks (The Record)

New York unveils new cyber regulations, $2.5 million grant program for water systems (The Record)

Soco404: Multiplatform Cryptomining Campaign (Wiz)

Coyote malware abuses Windows accessibility framework for data theft (Bleeping Computer)

Thunderforge Brings AI Agents to Wargames (IEEE Spectrum)

Clorox Sues Cognizant for Causing 2023 Cyber-Attack (Infosecurity Magazine)

Operator of Jetflix illegal streaming service gets 7 years in prison (Bleeping Computer)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 23 Jul 2025 20:10:00 -0000</pubDate>
      <itunes:title>SharePoint springs a leak.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2355</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The National Nuclear Security Administration was among the organizations impacted by the SharePoint zero-day. Experts testify before congress that OT security still lags.The FBI warns healthcare and critical infrastructure providers about Interlock ransomware. New York proposes new cybersecurity regulations for water and wastewater systems along with grants to fund them. Researchers uncover an active cryptomining campaign targeting cloud environments. A new variant of the Coyote banking trojan exploits Microsoft’s Windows UI Automation (UIA) framework for credential theft. The DoD pilots an agentic AI project aimed at helping military planners critique and enhance war plans. Clorox sues its former IT service provider for $380 million. Our guest is Tim Starks from CyberScoop discussing sanctions on Russian hackers and spies. Pirate Prime, do the time.

CyberWire Guest

Today we are joined by Tim Starks from CyberScoop discussing research on "UK sanctions Russian hackers, spies as US weighs its own punishments for Russia.”

Selected Reading

US nuclear weapons agency reportedly breached in Microsoft SharePoint attacks (The Verge)

Fully Operational Stuxnet 15 Years Later &amp; the Evolution of Cyber Threats to Critical Infrastructure (US House of Representatives Cybersecurity and Infrastructure Protection Subcommittee Hearing)

European healthcare network AMEOS Group hit by cyberattack (Beyond Machines)

FBI urges vigilance against Interlock ransomware group behind recent healthcare attacks (The Record)

New York unveils new cyber regulations, $2.5 million grant program for water systems (The Record)

Soco404: Multiplatform Cryptomining Campaign (Wiz)

Coyote malware abuses Windows accessibility framework for data theft (Bleeping Computer)

Thunderforge Brings AI Agents to Wargames (IEEE Spectrum)

Clorox Sues Cognizant for Causing 2023 Cyber-Attack (Infosecurity Magazine)

Operator of Jetflix illegal streaming service gets 7 years in prison (Bleeping Computer)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The National Nuclear Security Administration was among the organizations impacted by the SharePoint zero-day. Experts testify before congress that OT security still lags.The FBI warns healthcare and critical infrastructure providers about Interlock ransomware. New York proposes new cybersecurity regulations for water and wastewater systems along with grants to fund them. Researchers uncover an active cryptomining campaign targeting cloud environments. A new variant of the Coyote banking trojan exploits Microsoft’s Windows UI Automation (UIA) framework for credential theft. The DoD pilots an agentic AI project aimed at helping military planners critique and enhance war plans. Clorox sues its former IT service provider for $380 million. Our guest is Tim Starks from CyberScoop discussing sanctions on Russian hackers and spies. Pirate Prime, do the time.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/tstarks/"><u>Tim Starks</u></a> from <a href="https://www.linkedin.com/company/cyberscoop/"><u>CyberScoop</u></a> discussing research on "<a href="https://cyberscoop.com/uk-sanctions-russian-hackers-spies-as-us-weighs-its-own-punishments-for-russia/"><u>UK sanctions Russian hackers, spies as US weighs its own punishments for Russia.</u></a>”</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.theverge.com/news/712080/microsoft-sharepoint-hack-us-nuclear-weapons-agency"><u>US nuclear weapons agency reportedly breached in Microsoft SharePoint attacks</u></a> (The Verge)</p>
<p><a href="https://www.youtube.com/live/jLROmU7j57Q"><u>Fully Operational Stuxnet 15 Years Later &amp; the Evolution of Cyber Threats to Critical Infrastructure</u></a> (US House of Representatives Cybersecurity and Infrastructure Protection Subcommittee Hearing)</p>
<p><a href="https://beyondmachines.net/event_details/european-healthcare-network-ameos-group-hit-by-cyberattack-u-w-v-o-o/gD2P6Ple2L"><u>European healthcare network AMEOS Group hit by cyberattack</u></a> (Beyond Machines)</p>
<p><a href="https://therecord.media/fbi-vigilance-interlock-ransomware"><u>FBI urges vigilance against Interlock ransomware group behind recent healthcare attacks</u></a> (The Record)</p>
<p><a href="https://therecord.media/new-york-cyber-regulations-water-grants"><u>New York unveils new cyber regulations, $2.5 million grant program for water systems</u></a> (The Record)</p>
<p><a href="https://www.wiz.io/blog/soco404-multiplatform-cryptomining-campaign-uses-fake-error-pages-to-hide-payload"><u>Soco404: Multiplatform Cryptomining Campaign</u></a> (Wiz)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/coyote-malware-abuses-windows-accessibility-framework-for-data-theft/"><u>Coyote malware abuses Windows accessibility framework for data theft</u></a> (Bleeping Computer)</p>
<p><a href="https://spectrum.ieee.org/thunderforge-ai-wargames-dod"><u>Thunderforge Brings AI Agents to Wargames</u></a> (IEEE Spectrum)</p>
<p><a href="https://www.infosecurity-magazine.com/news/clorox-sues-cognizant-2023/"><u>Clorox Sues Cognizant for Causing 2023 Cyber-Attack</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.bleepingcomputer.com/news/technology/operator-of-jetflix-illegal-streaming-service-gets-7-years-in-prison/"><u>Operator of Jetflix illegal streaming service gets 7 years in prison</u></a> (Bleeping Computer)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1495</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7f3822a-1c7a-11f0-85e0-3f146914cd4f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5760835558.mp3?updated=1753939557" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The SharePoint siege goes strategic.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2354/notes</link>
      <description>Confusion persists over the Microsoft Sharepoint zero-days. CrushFTP confirms a zero-day under active exploitation. The UK government proposes a public sector ban on ransomware payments. A new ransomware group is using an AI chatbot to handle victim negotiations. Australia’s financial regulator accuses a wealth management firm of failing to manage cybersecurity risks. Researchers uncover a WordPress attack that abuses Google Tag Manager. Arizona election officials question CISA following a state portal cyberattack.  Hungarian police arrest a man accused of launching DDoS attacks on independent media outlets. On our Threat Vector segment guest host ⁠Michael Sikorski⁠ ⁠and Michael Daniel⁠ of the Cyber Threat Alliance (CTA) explore cybersecurity collaboration. A Spyware kingpin wants back in.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment

On our Threat Vector segment, host David Moulton turns the mic over to guest host ⁠Michael Sikorski⁠ and his guest ⁠Michael Daniel⁠ of the Cyber Threat Alliance (CTA) for a deep dive into cybersecurity collaboration. You can hear Michael and Michael's full discussion on Threat Vector ⁠⁠⁠here⁠⁠⁠ and catch new episodes every Thursday on your favorite podcast app.

Selected Reading

ToolShell Zero-Day Attacks on SharePoint: First Wave Linked to China, Hit High-Value Targets (SecurityWeek)

Microsoft: Windows Server KB5062557 causes cluster, VM issues (Bleeping Computer) 

File transfer company CrushFTP warns of zero-day exploit seen in the wild (The Record)

UK to lead crackdown on cyber criminals with ransomware measures (GOV.UK)

Ransomware Group Uses AI Chatbot to Intensify Pressure on Victims (Infosecurity Magazine)

Australian Regulator Alleges Financial Firm Exposed Clients to Unacceptable Cyber Risks (Infosecurity Magazine)

WordPress spam campaign abuses Google Tag Manager scripts (SC Media)

After website hack, Arizona election officials unload on Trump’s CISA (CyberScoop)

Hungarian police arrest suspect in cyberattacks on independent media (The Record)

Serial spyware founder Scott Zuckerman wants the FTC to unban him from the surveillance industry (TechCrunch)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Jul 2025 20:10:00 -0000</pubDate>
      <itunes:title>The SharePoint siege goes strategic.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2354</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Confusion persists over the Microsoft Sharepoint zero-days. CrushFTP confirms a zero-day under active exploitation. The UK government proposes a public sector ban on ransomware payments. A new ransomware group is using an AI chatbot to handle victim negotiations. Australia’s financial regulator accuses a wealth management firm of failing to manage cybersecurity risks. Researchers uncover a WordPress attack that abuses Google Tag Manager. Arizona election officials question CISA following a state portal cyberattack.  Hungarian police arrest a man accused of launching DDoS attacks on independent media outlets. On our Threat Vector segment guest host ⁠Michael Sikorski⁠ ⁠and Michael Daniel⁠ of the Cyber Threat Alliance (CTA) explore cybersecurity collaboration. A Spyware kingpin wants back in.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment

On our Threat Vector segment, host David Moulton turns the mic over to guest host ⁠Michael Sikorski⁠ and his guest ⁠Michael Daniel⁠ of the Cyber Threat Alliance (CTA) for a deep dive into cybersecurity collaboration. You can hear Michael and Michael's full discussion on Threat Vector ⁠⁠⁠here⁠⁠⁠ and catch new episodes every Thursday on your favorite podcast app.

Selected Reading

ToolShell Zero-Day Attacks on SharePoint: First Wave Linked to China, Hit High-Value Targets (SecurityWeek)

Microsoft: Windows Server KB5062557 causes cluster, VM issues (Bleeping Computer) 

File transfer company CrushFTP warns of zero-day exploit seen in the wild (The Record)

UK to lead crackdown on cyber criminals with ransomware measures (GOV.UK)

Ransomware Group Uses AI Chatbot to Intensify Pressure on Victims (Infosecurity Magazine)

Australian Regulator Alleges Financial Firm Exposed Clients to Unacceptable Cyber Risks (Infosecurity Magazine)

WordPress spam campaign abuses Google Tag Manager scripts (SC Media)

After website hack, Arizona election officials unload on Trump’s CISA (CyberScoop)

Hungarian police arrest suspect in cyberattacks on independent media (The Record)

Serial spyware founder Scott Zuckerman wants the FTC to unban him from the surveillance industry (TechCrunch)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Confusion persists over the Microsoft Sharepoint zero-days. CrushFTP confirms a zero-day under active exploitation. The UK government proposes a public sector ban on ransomware payments. A new ransomware group is using an AI chatbot to handle victim negotiations. Australia’s financial regulator accuses a wealth management firm of failing to manage cybersecurity risks. Researchers uncover a WordPress attack that abuses Google Tag Manager. Arizona election officials question CISA following a state portal cyberattack.  Hungarian police arrest a man accused of launching DDoS attacks on independent media outlets. On our Threat Vector segment guest host ⁠Michael Sikorski⁠ ⁠and Michael Daniel⁠ of the Cyber Threat Alliance (CTA) explore cybersecurity collaboration. A Spyware kingpin wants back in.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Threat Vector Segment</strong></p>
<p>On our Threat Vector segment, host David Moulton turns the mic over to guest host <a href="https://www.linkedin.com/in/mikesiko/"><u>⁠Michael Sikorski⁠</u></a> and his guest <a href="https://www.linkedin.com/in/j-michael-daniel-cta/"><u>⁠Michael Daniel⁠</u></a> of the Cyber Threat Alliance (CTA) for a deep dive into cybersecurity collaboration. You can hear Michael and Michael's full discussion on Threat Vector ⁠⁠⁠<a href="https://thecyberwire.com/podcasts/daily-podcast/2344/notes"><u>here⁠⁠⁠</u></a> and catch new episodes every Thursday on your favorite podcast app.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.securityweek.com/toolshell-zero-day-attacks-on-sharepoint-first-wave-linked-to-china-hit-high-value-targets/"><u>ToolShell Zero-Day Attacks on SharePoint: First Wave Linked to China, Hit High-Value Targets</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-windows-server-kb5062557-causes-cluster-vm-issues/"><u>Microsoft: Windows Server KB5062557 causes cluster, VM issues</u></a> (Bleeping Computer) </p>
<p><a href="https://therecord.media/file-transfer-crushftp-zero-day"><u>File transfer company CrushFTP warns of zero-day exploit seen in the wild</u></a> (The Record)</p>
<p><a href="https://www.gov.uk/government/news/uk-to-lead-crackdown-on-cyber-criminals-with-ransomware-measures"><u>UK to lead crackdown on cyber criminals with ransomware measures</u></a> (GOV.UK)</p>
<p><a href="https://www.infosecurity-magazine.com/news/ransomware-ai-chatbot-pressure/"><u>Ransomware Group Uses AI Chatbot to Intensify Pressure on Victims</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.infosecurity-magazine.com/news/australian-alleges-financial-cyber/"><u>Australian Regulator Alleges Financial Firm Exposed Clients to Unacceptable Cyber Risks</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.scworld.com/news/wordpress-spam-campaign-abuses-google-tag-manager-scripts"><u>WordPress spam campaign abuses Google Tag Manager scripts</u></a> (SC Media)</p>
<p><a href="https://cyberscoop.com/arizona-secretary-of-state-website-hack-candidate-portal-criticizes-cisa/"><u>After website hack, Arizona election officials unload on Trump’s CISA</u></a> (CyberScoop)</p>
<p><a href="https://therecord.media/hungary-arrest-suspect-hacking-independent-media"><u>Hungarian police arrest suspect in cyberattacks on independent media</u></a> (The Record)</p>
<p><a href="https://techcrunch.com/2025/07/21/serial-spyware-founder-scott-zuckerman-wants-the-ftc-to-unban-him-from-the-surveillance-industry/"><u>Serial spyware founder Scott Zuckerman wants the FTC to unban him from the surveillance industry</u></a> (TechCrunch)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1637</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7c9c5a2-1c7a-11f0-85e0-e78ad179b796]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9537916103.mp3?updated=1753939571" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Microsoft flaws fuel global breaches.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2353/notes</link>
      <description>Microsoft issues emergency updates for zero-day SharePoint flaws. Alaska Airlines resumes operations following an IT outage. The UK government reconsiders demands for Apple iCloud backdoors. A French Senate report raises concerns over digital sovereignty. Meta declines to sign the EU’s new voluntary AI code of practice. A new report claims last year’s CrowdStrike outage disrupted over 750 hospitals. The World Leaks extortion group has breached Dell’s Customer Solution Centers. Hewlett-Packard Enterprise (HPE) issues a critical warning about two severe security flaws in Aruba Instant On Access Points. A single compromised password leads to a UK transport company’s demise. An AI assistant falls for fake metadata magic. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Maria Varmazis, host of T-Minus Space Daily, joins Dave Bittner to unpack AST SpaceMobile’s request to use amateur radio spectrum for satellite communications. They explore what this means for ham radio users, the role of secondary spectrum access, and why the amateur community is pushing back. It’s a nuanced look at spectrum sharing, space tech, and regulatory tensions.

Selected Reading

Global hack on Microsoft product hits U.S., state agencies, researchers say (The Washington Post)

Microsoft releases emergency patches for SharePoint RCE flaws exploited in attacks (Bleeping Computer)

Alaska Airlines requests all flights to be grounded: FAA (ABC News)

UK government seeks way out of clash with US over Apple encryption (Financial Times)

Digital vassals? French Government ‘exposes citizens’ data to US’ (Brussels Signal)

Meta snubs the EU’s voluntary AI guidelines (The Verge)

At Least 750 US Hospitals Faced Disruptions During Last Year’s CrowdStrike Outage, Study Finds (WIRED)

Dell confirms breach of test lab platform by World Leaks extortion group (Bleeping Computer)

HPE warns of hardcoded passwords in Aruba access points (Bleeping Computer)

Weak password allowed hackers to sink a 158-year-old company (BBC News)

Claude Jailbroken to Mint Unlimited Stripe Coupons (General Analysis)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 21 Jul 2025 20:30:00 -0000</pubDate>
      <itunes:title>Microsoft flaws fuel global breaches.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2353</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Microsoft issues emergency updates for zero-day SharePoint flaws. Alaska Airlines resumes operations following an IT outage. The UK government reconsiders demands for Apple iCloud backdoors. A French Senate report raises concerns over digital sovereignty. Meta declines to sign the EU’s new voluntary AI code of practice. A new report claims last year’s CrowdStrike outage disrupted over 750 hospitals. The World Leaks extortion group has breached Dell’s Customer Solution Centers. Hewlett-Packard Enterprise (HPE) issues a critical warning about two severe security flaws in Aruba Instant On Access Points. A single compromised password leads to a UK transport company’s demise. An AI assistant falls for fake metadata magic. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Maria Varmazis, host of T-Minus Space Daily, joins Dave Bittner to unpack AST SpaceMobile’s request to use amateur radio spectrum for satellite communications. They explore what this means for ham radio users, the role of secondary spectrum access, and why the amateur community is pushing back. It’s a nuanced look at spectrum sharing, space tech, and regulatory tensions.

Selected Reading

Global hack on Microsoft product hits U.S., state agencies, researchers say (The Washington Post)

Microsoft releases emergency patches for SharePoint RCE flaws exploited in attacks (Bleeping Computer)

Alaska Airlines requests all flights to be grounded: FAA (ABC News)

UK government seeks way out of clash with US over Apple encryption (Financial Times)

Digital vassals? French Government ‘exposes citizens’ data to US’ (Brussels Signal)

Meta snubs the EU’s voluntary AI guidelines (The Verge)

At Least 750 US Hospitals Faced Disruptions During Last Year’s CrowdStrike Outage, Study Finds (WIRED)

Dell confirms breach of test lab platform by World Leaks extortion group (Bleeping Computer)

HPE warns of hardcoded passwords in Aruba access points (Bleeping Computer)

Weak password allowed hackers to sink a 158-year-old company (BBC News)

Claude Jailbroken to Mint Unlimited Stripe Coupons (General Analysis)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft issues emergency updates for zero-day SharePoint flaws. Alaska Airlines resumes operations following an IT outage. The UK government reconsiders demands for Apple iCloud backdoors. A French Senate report raises concerns over digital sovereignty. Meta declines to sign the EU’s new voluntary AI code of practice. A new report claims last year’s CrowdStrike outage disrupted over 750 hospitals. The World Leaks extortion group has breached Dell’s Customer Solution Centers. Hewlett-Packard Enterprise (HPE) issues a critical warning about two severe security flaws in Aruba Instant On Access Points. A single compromised password leads to a UK transport company’s demise. An AI assistant falls for fake metadata magic. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p><a href="https://www.linkedin.com/in/varmazis/"><u>Maria Varmazis</u></a>, host of <a href="https://space.n2k.com/podcasts/t-minus"><u>T-Minus Space Daily</u></a>, joins Dave Bittner to unpack AST SpaceMobile’s request to use amateur radio spectrum for satellite communications. They explore what this means for ham radio users, the role of secondary spectrum access, and why the amateur community is pushing back. It’s a nuanced look at spectrum sharing, space tech, and regulatory tensions.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.washingtonpost.com/technology/2025/07/20/microsoft-sharepoint-hack/"><u>Global hack on Microsoft product hits U.S., state agencies, researchers say</u></a> (The Washington Post)</p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-releases-emergency-patches-for-sharepoint-rce-flaws-exploited-in-attacks/"><u>Microsoft releases emergency patches for SharePoint RCE flaws exploited in attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://abcnews.go.com/US/alaska-airlines-requests-flights-grounded-faa/story?id=123915811"><u>Alaska Airlines requests all flights to be grounded: FAA</u></a> (ABC News)</p>
<p><a href="https://www.ft.com/content/3a3e6dbc-591d-4087-9ad3-11af04f0176f"><u>UK government seeks way out of clash with US over Apple encryption</u></a> (Financial Times)</p>
<p><a href="https://brusselssignal.eu/2025/07/digital-vassals-french-government-exposes-citizens-data-to-us/"><u>Digital vassals? French Government ‘exposes citizens’ data to US’</u></a> (Brussels Signal)</p>
<p><a href="https://www.theverge.com/news/710576/meta-eu-ai-act-code-of-practice-agreement"><u>Meta snubs the EU’s voluntary AI guidelines</u></a> (The Verge)</p>
<p><a href="https://www.wired.com/story/at-least-750-us-hospitals-faced-disruptions-during-last-years-crowdstrike-outage-study-finds/"><u>At Least 750 US Hospitals Faced Disruptions During Last Year’s CrowdStrike Outage, Study Finds</u></a> (WIRED)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/dell-confirms-breach-of-test-lab-platform-by-world-leaks-extortion-group/"><u>Dell confirms breach of test lab platform by World Leaks extortion group</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/hpe-warns-of-hardcoded-passwords-in-aruba-access-points/"><u>HPE warns of hardcoded passwords in Aruba access points</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bbc.co.uk/news/articles/cx2gx28815wo"><u>Weak password allowed hackers to sink a 158-year-old company</u></a> (BBC News)</p>
<p><a href="https://www.generalanalysis.com/blog/imessage-stripe-exploit"><u>Claude Jailbroken to Mint Unlimited Stripe Coupons</u></a> (General Analysis)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1885</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7a05712-1c7a-11f0-85e0-2b1a9e9c809f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8136211859.mp3?updated=1753939636" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Anisha Patel: Right along with them. [Program management] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/77/notes</link>
      <description>Please enjoy this encore of Career Notes: 

Associate Director at Raytheon Intelligence and Space in the Cyber Protection Services Division Anisha Patel always loved math and it defined her career journey. As a first-generation American from an Asian household, Anisha said she was destined for a STEM-focused career and chose electrical engineering. She began her career and remains at Raytheon (formerly E-Systems) working in several areas of the business thanks to her skills and informal mentors. Starting a rotational assignment in program management (7 years ago), Anisha said she "went to the dark side and then the hole closed and there I ended up." Anisha talks about the need to bring diversity of thought into the industry and adds to her team with this in mind. We thank Anisha for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 20 Jul 2025 07:00:00 -0000</pubDate>
      <itunes:title>Anisha Patel: Right along with them. [Program management] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>77</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Career Notes: 

Associate Director at Raytheon Intelligence and Space in the Cyber Protection Services Division Anisha Patel always loved math and it defined her career journey. As a first-generation American from an Asian household, Anisha said she was destined for a STEM-focused career and chose electrical engineering. She began her career and remains at Raytheon (formerly E-Systems) working in several areas of the business thanks to her skills and informal mentors. Starting a rotational assignment in program management (7 years ago), Anisha said she "went to the dark side and then the hole closed and there I ended up." Anisha talks about the need to bring diversity of thought into the industry and adds to her team with this in mind. We thank Anisha for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes: </p>
<p>Associate Director at Raytheon Intelligence and Space in the Cyber Protection Services Division Anisha Patel always loved math and it defined her career journey. As a first-generation American from an Asian household, Anisha said she was destined for a STEM-focused career and chose electrical engineering. She began her career and remains at Raytheon (formerly E-Systems) working in several areas of the business thanks to her skills and informal mentors. Starting a rotational assignment in program management (7 years ago), Anisha said she "went to the dark side and then the hole closed and there I ended up." Anisha talks about the need to bring diversity of thought into the industry and adds to her team with this in mind. We thank Anisha for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>525</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[96430800-63ff-11f0-9c8d-33846bed399e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1498430628.mp3?updated=1753934326" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Creeping like a spider. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/385/notes</link>
      <description>This week, we are pleased to be joined by ⁠George Glass⁠, Associate Managing Director of ⁠Kroll⁠'s Cyber Risk business, as he is discussing their research on Scattered Spider and their targeting of insurance companies. While Scattered Spider has recently turned its attention to the airline industry, George focuses on the broader trend of the group’s industry-by-industry approach and what that means for defenders across sectors.

George and Dave discuss the group’s history, their self-identification as a cartel, and their increasingly aggressive tactics, including the use of fear-based social engineering, physical threats, and the recruitment of insiders at telecom providers. They also examine how organizations—especially those with vulnerabilities similar to past targets—can proactively defend against this threat and prepare an effective response if their industry becomes the next focus.

Complete our annual ⁠⁠audience survey⁠⁠ before August 31.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Jul 2025 07:00:00 -0000</pubDate>
      <itunes:title>Creeping like a spider. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>385</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/56323fe6-63fb-11f0-b4b6-37fda3cfd18f/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, we are pleased to be joined by ⁠George Glass⁠, Associate Managing Director of ⁠Kroll⁠'s Cyber Risk business, as he is discussing their research on Scattered Spider and their targeting of insurance companies. While Scattered Spider has recently turned its attention to the airline industry, George focuses on the broader trend of the group’s industry-by-industry approach and what that means for defenders across sectors.

George and Dave discuss the group’s history, their self-identification as a cartel, and their increasingly aggressive tactics, including the use of fear-based social engineering, physical threats, and the recruitment of insiders at telecom providers. They also examine how organizations—especially those with vulnerabilities similar to past targets—can proactively defend against this threat and prepare an effective response if their industry becomes the next focus.

Complete our annual ⁠⁠audience survey⁠⁠ before August 31.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are pleased to be joined by <a href="https://www.linkedin.com/in/im-geeg/">⁠George Glass⁠</a>, Associate Managing Director of <a href="https://www.kroll.com/en">⁠Kroll⁠</a>'s Cyber Risk business, as he is discussing their research on Scattered Spider and their targeting of insurance companies. While Scattered Spider has recently turned its attention to the airline industry, George focuses on the broader trend of the group’s industry-by-industry approach and what that means for defenders across sectors.</p>
<p>George and Dave discuss the group’s history, their self-identification as a cartel, and their increasingly aggressive tactics, including the use of fear-based social engineering, physical threats, and the recruitment of insiders at telecom providers. They also examine how organizations—especially those with vulnerabilities similar to past targets—can proactively defend against this threat and prepare an effective response if their industry becomes the next focus.</p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JDYLFZ5">⁠⁠audience survey⁠⁠</a> before August 31.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1053</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[56323fe6-63fb-11f0-b4b6-37fda3cfd18f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3181385663.mp3?updated=1753926042" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>UK calls out Russia’s playbook.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2352/notes</link>
      <description>The UK sanctions Russian military intelligence officers tied to GRU cyber units. An AI-powered malware called LameHug targets Windows systems. Google files a lawsuit against the operators of the Badbox 2.0 botnet. A pair of healthcare data breaches impact over 3 million individuals. Researchers report a phishing attack that bypasses FIDO authentication by exploiting QR codes. A critical flaw in Nvidia’s Container Toolkit threatens managed AI cloud services. A secure messaging app is found exposing sensitive data due to outdated configurations. Meta investors settle their $8 billion lawsuit. Our guest is Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst, with a data-driven look at how AI is affecting jobs. Belgian police provide timely cyber tips, baked right in.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we have Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst, discussing how AI is affecting jobs.

Got cybersecurity, IT, or project management certification goals?

For the past 25 years, N2K's practice tests have helped more than half a million professionals reach certification success. Grow your career and reach your goals faster with N2K’s full exam prep of practice tests, labs, and training courses for Microsoft, CompTIA, PMI, Amazon, and more at n2k.com/certify.

Selected Reading

Breaking: UK sanctions Russian cyber spies accused of facilitating murders (The Record)

Russia Linked to New Malware Targeting Email Accounts for Espionage (Infosecurity Magazine)

New “LameHug” Malware Deploys AI-Generated Commands (Infosecurity Magazine)

Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet (SecurityWeek)

1.4 Million Affected by Data Breach at Virginia Radiology Practice  (SecurityWeek)

Anne Arundel Dermatology Data Breach Impacts 1.9 Million People (SecurityWeek)

Phishing attack abuses QR codes to bypass FIDO keys  (SC Media)

Critical Nvidia Toolkit Flaw Exposes AI Cloud Services to Hacking (SecurityWeek)

New TeleMessage SGNL Flaw Is Actively Being Exploited by Attackers (Hackread)

Meta investors, Zuckerberg settle $8 billion privacy lawsuit tied to Cambridge Analytica scandal (The Record)

Loaf and order: Belgian police launch bread-based cybersecurity campaign (Graham Cluley)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 18 Jul 2025 20:10:00 -0000</pubDate>
      <itunes:title>UK calls out Russia’s playbook.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2352</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The UK sanctions Russian military intelligence officers tied to GRU cyber units. An AI-powered malware called LameHug targets Windows systems. Google files a lawsuit against the operators of the Badbox 2.0 botnet. A pair of healthcare data breaches impact over 3 million individuals. Researchers report a phishing attack that bypasses FIDO authentication by exploiting QR codes. A critical flaw in Nvidia’s Container Toolkit threatens managed AI cloud services. A secure messaging app is found exposing sensitive data due to outdated configurations. Meta investors settle their $8 billion lawsuit. Our guest is Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst, with a data-driven look at how AI is affecting jobs. Belgian police provide timely cyber tips, baked right in.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we have Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst, discussing how AI is affecting jobs.

Got cybersecurity, IT, or project management certification goals?

For the past 25 years, N2K's practice tests have helped more than half a million professionals reach certification success. Grow your career and reach your goals faster with N2K’s full exam prep of practice tests, labs, and training courses for Microsoft, CompTIA, PMI, Amazon, and more at n2k.com/certify.

Selected Reading

Breaking: UK sanctions Russian cyber spies accused of facilitating murders (The Record)

Russia Linked to New Malware Targeting Email Accounts for Espionage (Infosecurity Magazine)

New “LameHug” Malware Deploys AI-Generated Commands (Infosecurity Magazine)

Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet (SecurityWeek)

1.4 Million Affected by Data Breach at Virginia Radiology Practice  (SecurityWeek)

Anne Arundel Dermatology Data Breach Impacts 1.9 Million People (SecurityWeek)

Phishing attack abuses QR codes to bypass FIDO keys  (SC Media)

Critical Nvidia Toolkit Flaw Exposes AI Cloud Services to Hacking (SecurityWeek)

New TeleMessage SGNL Flaw Is Actively Being Exploited by Attackers (Hackread)

Meta investors, Zuckerberg settle $8 billion privacy lawsuit tied to Cambridge Analytica scandal (The Record)

Loaf and order: Belgian police launch bread-based cybersecurity campaign (Graham Cluley)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The UK sanctions Russian military intelligence officers tied to GRU cyber units. An AI-powered malware called LameHug targets Windows systems. Google files a lawsuit against the operators of the Badbox 2.0 botnet. A pair of healthcare data breaches impact over 3 million individuals. Researchers report a phishing attack that bypasses FIDO authentication by exploiting QR codes. A critical flaw in Nvidia’s Container Toolkit threatens managed AI cloud services. A secure messaging app is found exposing sensitive data due to outdated configurations. Meta investors settle their $8 billion lawsuit. Our guest is Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst, with a data-driven look at how AI is affecting jobs. Belgian police provide timely cyber tips, baked right in.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we have <a href="https://www.linkedin.com/in/will-markow/"><u>Will Markow</u></a>, CEO of <a href="https://www.linkedin.com/company/fourone-insights/"><u>FourOne Insights</u></a> and N2K CyberWire Senior Workforce Analyst, discussing <a href="https://www.fouroneinsights.com/insights/is-ai-really-killing-jobs-the-data-says-not-yet"><u>how AI is affecting jobs</u></a>.</p>
<p>Got cybersecurity, IT, or project management certification goals?</p>
<p>For the past 25 years, N2K's practice tests have helped more than half a million professionals reach certification success. Grow your career and reach your goals faster with N2K’s full exam prep of practice tests, labs, and training courses for Microsoft, CompTIA, PMI, Amazon, and more at n2k.com/certify.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/uk-sanctions-gru-personnel-accused-murder-civilians-ukraine"><u>Breaking: UK sanctions Russian cyber spies accused of facilitating murders</u></a> (The Record)</p>
<p><a href="https://www.infosecurity-magazine.com/news/new-malware-targeting-email/"><u>Russia Linked to New Malware Targeting Email Accounts for Espionage </u></a>(Infosecurity Magazine)</p>
<p><a href="https://www.infosecurity-magazine.com/news/new-lamehug-malware-deploys/"><u>New “LameHug” Malware Deploys AI-Generated Commands </u></a>(Infosecurity Magazine)</p>
<p><a href="https://www.securityweek.com/google-sues-operators-of-10-million-device-badbox-2-0-botnet/"><u>Google Sues Operators of 10-Million-Device Badbox 2.0 Botnet </u></a>(SecurityWeek)</p>
<p><a href="https://www.securityweek.com/1-4-million-affected-by-data-breach-at-virginia-radiology-practice/"><u>1.4 Million Affected by Data Breach at Virginia Radiology Practice </u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/anne-arundel-dermatology-data-breach-impacts-1-9-million-people/"><u>Anne Arundel Dermatology Data Breach Impacts 1.9 Million People </u></a>(SecurityWeek)</p>
<p><a href="https://www.scworld.com/news/phishing-attack-abuses-qr-codes-to-bypass-fido-keys"><u>Phishing attack abuses QR codes to bypass FIDO keys </u></a> (SC Media)</p>
<p><a href="https://www.securityweek.com/critical-nvidia-toolkit-flaw-exposes-ai-cloud-services-to-hacking/"><u>Critical Nvidia Toolkit Flaw Exposes AI Cloud Services to Hacking </u></a>(SecurityWeek)</p>
<p><a href="https://hackread.com/telemessage-sgnl-flaw-actively-exploited-by-attackers/"><u>New TeleMessage SGNL Flaw Is Actively Being Exploited by Attackers</u></a> (Hackread)</p>
<p><a href="https://therecord.media/meta-investors-zuckerberg-settle-privacy-lawsuit"><u>Meta investors, Zuckerberg settle $8 billion privacy lawsuit tied to Cambridge Analytica scandal</u></a> (The Record)</p>
<p><br><a href="https://grahamcluley.com/loaf-and-order-belgian-police-launch-bread-based-cybersecurity-campaign/"><u>Loaf and order: Belgian police launch bread-based cybersecurity campaign</u></a> (Graham Cluley)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1433</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c774ce62-1c7a-11f0-85e0-27fdf608fb5a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1380898522.mp3?updated=1753939480" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When hackers become the hunted.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2351/notes</link>
      <description>Pro-Russian Hackers, scam lords, and ransomware gangs face global justice. Louis Vuitton ties customer data breaches to a single cyber incident. The White House is developing a “Zero Trust 2.0” cybersecurity strategy. OVERSTEP malware targets outdated SonicWall Secure Mobile Access (SMA) devices. An Australian political party suffers a massive ransomware breach. Our guest Jacob Oakley speaks with T-Minus Space Daily host Maria Varmazis. Jacob is Technical Director at SIXGEN and Space Lead for the DEFCON Aerospace Village. An Italian YouTuber faces a retro reckoning.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest Jacob Oakley joins us from today’s episode of T-Minus Space Daily host Maria Varmazis. Jacob is Technical Director at SIXGEN and Space Lead for the DEFCON Aerospace Village. He and Maria discuss space cybersecurity.

Selected Reading

Global operation targets NoName057(16) pro-Russian cybercrime network - The offenders targeted Ukraine and supporting countries, including many EU Member States (Europol)

Cambodia makes 1,000 arrests in latest crackdown on cybercrime (NBC News)

Armenian National Extradited to the United States Faces Federal Charges for Ransomware Extortion Conspiracy (US Department of Justice)

Italian police dismantle Romanian ransomware gang targeting nonprofits, film companies (The Record)

Louis Vuitton says regional data breaches tied to same cyberattack (Bleeping Computer)

Trump admin focuses on ‘zero trust 2.0,’ cybersecurity efficiencies (Federal News Network)

SonicWall SMA devices hacked with OVERSTEP rootkit tied to ransomware (Bleeping Computer)

Clive Palmer's political parties suffer data breach affecting 'all emails ... documents and records' (Crikey)

YouTuber faces jail time for showing off Android-based gaming handhelds (Ars Technica)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 17 Jul 2025 20:10:00 -0000</pubDate>
      <itunes:title>When hackers become the hunted.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2351</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Pro-Russian Hackers, scam lords, and ransomware gangs face global justice. Louis Vuitton ties customer data breaches to a single cyber incident. The White House is developing a “Zero Trust 2.0” cybersecurity strategy. OVERSTEP malware targets outdated SonicWall Secure Mobile Access (SMA) devices. An Australian political party suffers a massive ransomware breach. Our guest Jacob Oakley speaks with T-Minus Space Daily host Maria Varmazis. Jacob is Technical Director at SIXGEN and Space Lead for the DEFCON Aerospace Village. An Italian YouTuber faces a retro reckoning.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest Jacob Oakley joins us from today’s episode of T-Minus Space Daily host Maria Varmazis. Jacob is Technical Director at SIXGEN and Space Lead for the DEFCON Aerospace Village. He and Maria discuss space cybersecurity.

Selected Reading

Global operation targets NoName057(16) pro-Russian cybercrime network - The offenders targeted Ukraine and supporting countries, including many EU Member States (Europol)

Cambodia makes 1,000 arrests in latest crackdown on cybercrime (NBC News)

Armenian National Extradited to the United States Faces Federal Charges for Ransomware Extortion Conspiracy (US Department of Justice)

Italian police dismantle Romanian ransomware gang targeting nonprofits, film companies (The Record)

Louis Vuitton says regional data breaches tied to same cyberattack (Bleeping Computer)

Trump admin focuses on ‘zero trust 2.0,’ cybersecurity efficiencies (Federal News Network)

SonicWall SMA devices hacked with OVERSTEP rootkit tied to ransomware (Bleeping Computer)

Clive Palmer's political parties suffer data breach affecting 'all emails ... documents and records' (Crikey)

YouTuber faces jail time for showing off Android-based gaming handhelds (Ars Technica)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Pro-Russian Hackers, scam lords, and ransomware gangs face global justice. Louis Vuitton ties customer data breaches to a single cyber incident. The White House is developing a “Zero Trust 2.0” cybersecurity strategy. OVERSTEP malware targets outdated SonicWall Secure Mobile Access (SMA) devices. An Australian political party suffers a massive ransomware breach. Our guest Jacob Oakley speaks with T-Minus Space Daily host Maria Varmazis. Jacob is Technical Director at SIXGEN and Space Lead for the DEFCON Aerospace Village. An Italian YouTuber faces a retro reckoning.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Our guest <a href="https://www.linkedin.com/in/jacob-oakley-3128a25a/"><u>Jacob Oakley</u></a> joins us from today’s episode of <a href="https://space.n2k.com/podcasts/t-minus"><u>T-Minus Space Daily</u></a> host <a href="https://www.linkedin.com/in/varmazis/"><u>Maria Varmazis</u></a>. Jacob is Technical Director at <a href="https://www.sixgen.io/"><u>SIXGEN</u></a> and Space Lead for the <a href="https://www.aerospacevillage.org/"><u>DEFCON Aerospace Village</u></a>. He and Maria discuss space cybersecurity.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.europol.europa.eu/media-press/newsroom/news/global-operation-targets-noname05716-pro-russian-cybercrime-network"><u>Global operation targets NoName057(16) pro-Russian cybercrime network - The offenders targeted Ukraine and supporting countries, including many EU Member States</u></a> (Europol)</p>
<p><a href="https://www.nbcnews.com/world/asia/cambodia-makes-1000-arrests-latest-crackdown-cybercrime-rcna219141"><u>Cambodia makes 1,000 arrests in latest crackdown on cybercrime</u></a> (NBC News)</p>
<p><a href="https://www.justice.gov/usao-or/pr/armenian-national-extradited-united-states-faces-federal-charges-ransomware-extortion"><u>Armenian National Extradited to the United States Faces Federal Charges for Ransomware Extortion Conspiracy</u></a> (US Department of Justice)</p>
<p><a href="https://therecord.media/italian-police-dismantle-romanian-ransomware-gang"><u>Italian police dismantle Romanian ransomware gang targeting nonprofits, film companies</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/louis-vuitton-says-regional-data-breaches-tied-to-same-cyberattack/"><u>Louis Vuitton says regional data breaches tied to same cyberattack</u></a> (Bleeping Computer)</p>
<p><a href="https://federalnewsnetwork.com/cybersecurity/2025/07/trump-admin-focuses-on-zero-trust-2-0-cybersecurity-efficiencies/"><u>Trump admin focuses on ‘zero trust 2.0,’ cybersecurity efficiencies</u></a> (Federal News Network)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/sonicwall-sma-devices-hacked-with-overstep-rootkit-tied-to-ransomware/"><u>SonicWall SMA devices hacked with OVERSTEP rootkit tied to ransomware</u></a> (Bleeping Computer)</p>
<p><a href="https://www.crikey.com.au/2025/07/17/clive-palmer-united-australia-party-trumpet-of-patriots-data-breach-documents/"><u>Clive Palmer's political parties suffer data breach affecting 'all emails ... documents and records'</u></a> (Crikey)</p>
<p><a href="https://arstechnica.com/gadgets/2025/07/youtuber-faces-jail-time-for-showing-off-android-based-gaming-handhelds/"><u>YouTuber faces jail time for showing off Android-based gaming handhelds</u></a> (Ars Technica)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1640</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c74815f2-1c7a-11f0-85e0-2fe719fb16f4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9658124182.mp3?updated=1753939483" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chrome’s high-risk bug gets squashed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2350/notes</link>
      <description>Google and Microsoft issue critical updates. CISA warns of active exploitation of a critical flaw in Wing FTP Server. Cloudflare restores their DNS Resolver service following a brief outage. A critical vulnerability in a PHP documentation tool allows attackers to execute code on affected servers. NSA and FBI officials say they’ve disrupted Chinese cyber campaigns targeting U.S. critical infrastructure. A UK data breach puts Afghan soldiers and their families at risk. Researchers find malware hiding in DNS records. A former U.S. Army soldier pleads guilty to charges of hacking and extortion. Ben Yelin joins us with insights on the Senate Armed Services Committee’s response to rising threats to critical infrastructure.The large print giveth and the small print taketh away. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Ben Yelin, co host of our Caveat podcast and Program Director for Public Policy &amp; External Affairs at the University of Maryland Center for Cyber Health and Hazard Strategies, discussing the Senate Armed Services Committee’s and Trump administration nominees’ recent conversation about rising threats to critical infrastructure. You can find the article Ben discusses here. 

Selected Reading

Google fixes actively exploited sandbox escape zero day in Chrome (Bleeping Computer)

Windows KB5064489 emergency update fixes Azure VM launch issues (Bleeping Computer)

Exploited Wing file transfer bug risks ‘total server compromise,’ CISA warns (The Record)

Cloudflare 1.1.1.1 incident on July 14, 2025 (Cloudflare)

Critical template Injection flaw in LaRecipe Documentation Package enables remote code execution (Beyond Machines)

NSA: Volt Typhoon was ‘not successful’ at persisting in critical infrastructure (The Record)

Defence secretary 'unable to say' if anyone killed after Afghan data breach  (BBC News)

Hackers exploit a blind spot by hiding malware inside DNS records (Ars Technica)

21-year-old former US soldier pleads guilty to hacking, extorting telecoms  (The Record)

WeTransfer says files not used to train AI after backlash (BBC News)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 16 Jul 2025 20:10:00 -0000</pubDate>
      <itunes:title>Chrome’s high-risk bug gets squashed.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2350</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Google and Microsoft issue critical updates. CISA warns of active exploitation of a critical flaw in Wing FTP Server. Cloudflare restores their DNS Resolver service following a brief outage. A critical vulnerability in a PHP documentation tool allows attackers to execute code on affected servers. NSA and FBI officials say they’ve disrupted Chinese cyber campaigns targeting U.S. critical infrastructure. A UK data breach puts Afghan soldiers and their families at risk. Researchers find malware hiding in DNS records. A former U.S. Army soldier pleads guilty to charges of hacking and extortion. Ben Yelin joins us with insights on the Senate Armed Services Committee’s response to rising threats to critical infrastructure.The large print giveth and the small print taketh away. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Ben Yelin, co host of our Caveat podcast and Program Director for Public Policy &amp; External Affairs at the University of Maryland Center for Cyber Health and Hazard Strategies, discussing the Senate Armed Services Committee’s and Trump administration nominees’ recent conversation about rising threats to critical infrastructure. You can find the article Ben discusses here. 

Selected Reading

Google fixes actively exploited sandbox escape zero day in Chrome (Bleeping Computer)

Windows KB5064489 emergency update fixes Azure VM launch issues (Bleeping Computer)

Exploited Wing file transfer bug risks ‘total server compromise,’ CISA warns (The Record)

Cloudflare 1.1.1.1 incident on July 14, 2025 (Cloudflare)

Critical template Injection flaw in LaRecipe Documentation Package enables remote code execution (Beyond Machines)

NSA: Volt Typhoon was ‘not successful’ at persisting in critical infrastructure (The Record)

Defence secretary 'unable to say' if anyone killed after Afghan data breach  (BBC News)

Hackers exploit a blind spot by hiding malware inside DNS records (Ars Technica)

21-year-old former US soldier pleads guilty to hacking, extorting telecoms  (The Record)

WeTransfer says files not used to train AI after backlash (BBC News)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Google and Microsoft issue critical updates. CISA warns of active exploitation of a critical flaw in Wing FTP Server. Cloudflare restores their DNS Resolver service following a brief outage. A critical vulnerability in a PHP documentation tool allows attackers to execute code on affected servers. NSA and FBI officials say they’ve disrupted Chinese cyber campaigns targeting U.S. critical infrastructure. A UK data breach puts Afghan soldiers and their families at risk. Researchers find malware hiding in DNS records. A former U.S. Army soldier pleads guilty to charges of hacking and extortion. Ben Yelin joins us with insights on the Senate Armed Services Committee’s response to rising threats to critical infrastructure.The large print giveth and the small print taketh away.<strong> </strong></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by Ben Yelin, co host of our Caveat podcast and Program Director for Public Policy &amp; External Affairs at the University of Maryland Center for Cyber Health and Hazard Strategies, discussing the Senate Armed Services Committee’s and Trump administration nominees’ recent conversation about rising threats to critical infrastructure. You can find the article Ben discusses <a href="https://www.defenseone.com/policy/2025/07/sasc-pentagon-you-need-new-cyber-deterrence-plan/406677/"><u>here</u></a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/google-fixes-actively-exploited-sandbox-escape-zero-day-in-chrome/"><u>Google fixes actively exploited sandbox escape zero day in Chrome</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/windows-kb5064489-emergency-update-fixes-azure-vm-launch-issues/"><u>Windows KB5064489 emergency update fixes Azure VM launch issues</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/exploited-file-transfer-bug-cisa"><u>Exploited Wing file transfer bug risks ‘total server compromise,’ CISA warns</u></a> (The Record)</p>
<p><a href="https://blog.cloudflare.com/cloudflare-1-1-1-1-incident-on-july-14-2025/"><u>Cloudflare 1.1.1.1 incident on July 14, 2025</u></a> (Cloudflare)</p>
<p><a href="https://beyondmachines.net/event_details/critical-template-injection-flaw-in-larecipe-documentation-package-enables-remote-code-execution-g-a-g-7-h/gD2P6Ple2L"><u>Critical template Injection flaw in LaRecipe Documentation Package enables remote code execution</u></a> (Beyond Machines)</p>
<p><a href="https://therecord.media/china-typhoon-hackers-nsa-fbi-response"><u>NSA: Volt Typhoon was ‘not successful’ at persisting in critical infrastructure </u></a>(The Record)</p>
<p><a href="https://www.bbc.co.uk/news/articles/c1k8yvj89kyo"><u>Defence secretary 'unable to say' if anyone killed after Afghan data breach </u></a> (BBC News)</p>
<p><a href="https://arstechnica.com/security/2025/07/hackers-exploit-a-blind-spot-by-hiding-malware-inside-dns-records/"><u>Hackers exploit a blind spot by hiding malware inside DNS records </u></a>(Ars Technica)</p>
<p><a href="https://therecord.media/cameron-john-wagenius-former-us-soldier-guilty-plea-hacking"><u>21-year-old former US soldier pleads guilty to hacking, extorting telecoms</u></a>  (The Record)</p>
<p><a href="https://www.bbc.co.uk/news/articles/cp8mp79gyz1o"><u>WeTransfer says files not used to train AI after backlash </u></a>(BBC News)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1460</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c71c5610-1c7a-11f0-85e0-fbe5358da800]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5141877165.mp3?updated=1753939449" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Grok that broke the camel’s back.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2349/notes</link>
      <description>A DOGE employee leaks private API keys to GitHub. North Korea’s “Contagious Interview” campaign has a new malware loader. A New Jersey diagnostic lab suffers a ransomware attack. A top-grossing dark web marketplace goes dark in what experts believe is an exit scam. MITRE launches a cybersecurity framework to address threats in cryptocurrency and digital financial systems. Experts fear steep budget cuts and layoffs under the Trump administration may undermine cybersecurity information sharing. A Maryland IT contractor settles federal allegations of cyber fraud. Kim Jones and Ethan Cook reflect on CISO perspectives. A crypto hacker goes hero and gets a hefty reward. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today Kim Jones, host of CISO perspectives, sits down with N2K’s analyst Ethan Cook to reflect on highlights from this season of CISO Perspectives. They revisit key moments, discuss recurring themes like the cybersecurity workforce gap, and get Ethan’s outsider take on the conversations. It’s all part of a special wrap-up to close out the season finale. If you like this conversation and want to hear more from CISO Perspectives, check it out here.

Selected Reading

DOGE Employee exposes AI API Keys in source code, giving access to advanced xAI models (Beyond Machines)

DOGE Denizen Marko Elez Leaked API Key for xAI (Krebs on Security)

North Korean Actors Expand Contagious Interview Campaign with New Malware Loader (Infosecurity Magazine)

Avantic Medical Lab hit by ransomware attack, data breach (Beyond Machines)

Abacus Market Shutters After Exit Scam, Say Experts (Infosecurity Magazine)

MITRE Unveils AADAPT Framework to Tackle Cryptocurrency Threats (SecurityWeek)

How Trump's Cyber Cuts Dismantle Federal Information Sharing (BankInfo Security)

UK launches vulnerability research program for external experts (Bleeping Computer)

Federal IT contractor to pay $14.75 fine over ‘cyber fraud’ allegations (The Record)

Crypto Hacker Who Drained $42,000,000 From GMX Goes White Hat, Returns Funds in Exchange for $5,000,000 Bounty (The Daily Hodl) 

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Jul 2025 20:10:00 -0000</pubDate>
      <itunes:title>The Grok that broke the camel’s back.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2349</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A DOGE employee leaks private API keys to GitHub. North Korea’s “Contagious Interview” campaign has a new malware loader. A New Jersey diagnostic lab suffers a ransomware attack. A top-grossing dark web marketplace goes dark in what experts believe is an exit scam. MITRE launches a cybersecurity framework to address threats in cryptocurrency and digital financial systems. Experts fear steep budget cuts and layoffs under the Trump administration may undermine cybersecurity information sharing. A Maryland IT contractor settles federal allegations of cyber fraud. Kim Jones and Ethan Cook reflect on CISO perspectives. A crypto hacker goes hero and gets a hefty reward. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today Kim Jones, host of CISO perspectives, sits down with N2K’s analyst Ethan Cook to reflect on highlights from this season of CISO Perspectives. They revisit key moments, discuss recurring themes like the cybersecurity workforce gap, and get Ethan’s outsider take on the conversations. It’s all part of a special wrap-up to close out the season finale. If you like this conversation and want to hear more from CISO Perspectives, check it out here.

Selected Reading

DOGE Employee exposes AI API Keys in source code, giving access to advanced xAI models (Beyond Machines)

DOGE Denizen Marko Elez Leaked API Key for xAI (Krebs on Security)

North Korean Actors Expand Contagious Interview Campaign with New Malware Loader (Infosecurity Magazine)

Avantic Medical Lab hit by ransomware attack, data breach (Beyond Machines)

Abacus Market Shutters After Exit Scam, Say Experts (Infosecurity Magazine)

MITRE Unveils AADAPT Framework to Tackle Cryptocurrency Threats (SecurityWeek)

How Trump's Cyber Cuts Dismantle Federal Information Sharing (BankInfo Security)

UK launches vulnerability research program for external experts (Bleeping Computer)

Federal IT contractor to pay $14.75 fine over ‘cyber fraud’ allegations (The Record)

Crypto Hacker Who Drained $42,000,000 From GMX Goes White Hat, Returns Funds in Exchange for $5,000,000 Bounty (The Daily Hodl) 

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A DOGE employee leaks private API keys to GitHub. North Korea’s “Contagious Interview” campaign has a new malware loader. A New Jersey diagnostic lab suffers a ransomware attack. A top-grossing dark web marketplace goes dark in what experts believe is an exit scam. MITRE launches a cybersecurity framework to address threats in cryptocurrency and digital financial systems. Experts fear steep budget cuts and layoffs under the Trump administration may undermine cybersecurity information sharing. A Maryland IT contractor settles federal allegations of cyber fraud. Kim Jones and Ethan Cook reflect on CISO perspectives. A crypto hacker goes hero and gets a hefty reward.<strong> </strong></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today<a href="https://www.linkedin.com/in/kimjones-cism/"><u> Kim Jones</u></a>, host of CISO perspectives, sits down with N2K’s analyst <a href="https://www.linkedin.com/in/ethan-cook-766a24138/"><u>Ethan Cook</u></a> to reflect on highlights from this season of <a href="https://thecyberwire.com/podcasts/cso-perspectives/140/notes"><em>CISO Perspectives</em></a>. They revisit key moments, discuss recurring themes like the cybersecurity workforce gap, and get Ethan’s outsider take on the conversations. It’s all part of a special wrap-up to close out the season finale. If you like this conversation and want to hear more from CISO Perspectives, check it out <a href="https://thecyberwire.com/podcasts/cso-perspectives"><u>here</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://beyondmachines.net/event_details/doge-employee-exposes-ai-api-keys-in-source-code-giving-access-to-advanced-xai-models-k-l-q-0-o/gD2P6Ple2L"><u>DOGE Employee exposes AI API Keys in source code, giving access to advanced xAI models</u></a> (Beyond Machines)</p>
<p><a href="https://krebsonsecurity.com/2025/07/doge-denizen-marko-elez-leaked-api-key-for-xai/"><u>DOGE Denizen Marko Elez Leaked API Key for xAI</u></a> (Krebs on Security)</p>
<p><a href="https://www.infosecurity-magazine.com/news/north-korean-contagious-interview/"><u>North Korean Actors Expand Contagious Interview Campaign with New Malware Loader</u></a> (Infosecurity Magazine)</p>
<p><a href="https://beyondmachines.net/event_details/avantic-medical-lab-reports-ransomware-attack-data-breach-b-j-f-o-b/gD2P6Ple2L"><u>Avantic Medical Lab hit by ransomware attack, data breach</u></a> (Beyond Machines)</p>
<p><a href="https://www.infosecurity-magazine.com/news/abacus-market-shutters-exit-scam/"><u>Abacus Market Shutters After Exit Scam, Say Experts</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.securityweek.com/mitre-unveils-aadapt-framework-to-tackle-cryptocurrency-threats/"><u>MITRE Unveils AADAPT Framework to Tackle Cryptocurrency Threats</u></a> (SecurityWeek)</p>
<p><a href="https://www.bankinfosecurity.com/how-trumps-cyber-cuts-dismantle-federal-information-sharing-a-28964"><u>How Trump's Cyber Cuts Dismantle Federal Information Sharing</u></a> (BankInfo Security)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/uk-launches-vulnerability-research-program-for-external-experts/"><u>UK launches vulnerability research program for external experts</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/federal-it-contractor-fined-over-cyber-fraud-allegations"><u>Federal IT contractor to pay $14.75 fine over ‘cyber fraud’ allegations</u></a> (The Record)</p>
<p><a href="https://dailyhodl.com/2025/07/12/crypto-hacker-who-drained-42000000-from-gmx-goes-white-hat-returns-funds-in-exchange-for-5000000-bounty/"><u>Crypto Hacker Who Drained $42,000,000 From GMX Goes White Hat, Returns Funds in Exchange for $5,000,000 Bounty</u></a> (The Daily Hodl) </p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1809</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6f361b0-1c7a-11f0-85e0-6b28549875fb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7653205839.mp3?updated=1752601047" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Taxing times for cyber fraudsters.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2348/notes</link>
      <description>British and Romanian authorities make arrests in a major tax fraud scheme. The Interlock ransomware gang has a new RAT. A new vulnerability in Google Gemini for Workspace allows attackers to hide malicious instructions inside emails. Suspected Chinese hackers breach a major DC law firm.  Multiple firmware vulnerabilities affect products from Taiwanese manufacturer Gigabyte Technology. Nvidia warns against Rowhammer attacks across its product line. Louis Vuitton joins the list of breached UK retailers. Indian authorities dismantle a cyber fraud gang. CISA pumps the brakes on a critical vulnerability in American train systems. Our guest is Cynthia Kaiser, SVP of Halcyon’s Ransomware Research Center and former Deputy Assistant Director at the FBI’s Cyber Division, with insights on Scattered Spider. Hackers ransack Elmo’s World. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Cynthia Kaiser, SVP of Halcyon’s Ransomware Research Center and former Deputy Assistant Director at the FBI’s Cyber Division, discussing "Scattered Spider and Other Criminal Compromise of Outsourcing Providers Increases Victim Attacks." You can check out more from Halcyon here. 

Selected Reading

Romanian police arrest 13 scammers targeting UK’s tax authority (The Record)

Interlock Ransomware Unleashes New RAT in Widespread Campaign (Infosecurity Magazine)

Google Gemini flaw hijacks email summaries for phishing (Bleeping Computer)

Chinese hackers suspected in breach of powerful DC law firm (CNN Politics)

Flaws in Gigabyte Firmware Allow Security Bypass, Backdoor Deployment (Security Week)

Nvidia warns of Rowhammer attacks on GPUs (The Register)

Louis Vuitton UK Latest Retailer Hit by Data Breach (Infosecurity Magazine)

Indian Police Raid Tech Support Scam Call Center (Infosecurity Magazine)

Security vulnerability on U.S. trains that let anyone activate the brakes on the rear car was known for 13 years — operators refused to fix the issue until now (Tom's Hardware)

End-of-Train and Head-of-Train Remote Linking Protocol (CISA)

Hacker Makes Antisemitic Posts on Elmo’s X Account (The New York Times)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 14 Jul 2025 20:10:00 -0000</pubDate>
      <itunes:title>Taxing times for cyber fraudsters.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2348</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>British and Romanian authorities make arrests in a major tax fraud scheme. The Interlock ransomware gang has a new RAT. A new vulnerability in Google Gemini for Workspace allows attackers to hide malicious instructions inside emails. Suspected Chinese hackers breach a major DC law firm.  Multiple firmware vulnerabilities affect products from Taiwanese manufacturer Gigabyte Technology. Nvidia warns against Rowhammer attacks across its product line. Louis Vuitton joins the list of breached UK retailers. Indian authorities dismantle a cyber fraud gang. CISA pumps the brakes on a critical vulnerability in American train systems. Our guest is Cynthia Kaiser, SVP of Halcyon’s Ransomware Research Center and former Deputy Assistant Director at the FBI’s Cyber Division, with insights on Scattered Spider. Hackers ransack Elmo’s World. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Cynthia Kaiser, SVP of Halcyon’s Ransomware Research Center and former Deputy Assistant Director at the FBI’s Cyber Division, discussing "Scattered Spider and Other Criminal Compromise of Outsourcing Providers Increases Victim Attacks." You can check out more from Halcyon here. 

Selected Reading

Romanian police arrest 13 scammers targeting UK’s tax authority (The Record)

Interlock Ransomware Unleashes New RAT in Widespread Campaign (Infosecurity Magazine)

Google Gemini flaw hijacks email summaries for phishing (Bleeping Computer)

Chinese hackers suspected in breach of powerful DC law firm (CNN Politics)

Flaws in Gigabyte Firmware Allow Security Bypass, Backdoor Deployment (Security Week)

Nvidia warns of Rowhammer attacks on GPUs (The Register)

Louis Vuitton UK Latest Retailer Hit by Data Breach (Infosecurity Magazine)

Indian Police Raid Tech Support Scam Call Center (Infosecurity Magazine)

Security vulnerability on U.S. trains that let anyone activate the brakes on the rear car was known for 13 years — operators refused to fix the issue until now (Tom's Hardware)

End-of-Train and Head-of-Train Remote Linking Protocol (CISA)

Hacker Makes Antisemitic Posts on Elmo’s X Account (The New York Times)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>British and Romanian authorities make arrests in a major tax fraud scheme. The Interlock ransomware gang has a new RAT. A new vulnerability in Google Gemini for Workspace allows attackers to hide malicious instructions inside emails. Suspected Chinese hackers breach a major DC law firm.  Multiple firmware vulnerabilities affect products from Taiwanese manufacturer Gigabyte Technology. Nvidia warns against Rowhammer attacks across its product line. Louis Vuitton joins the list of breached UK retailers. Indian authorities dismantle a cyber fraud gang. CISA pumps the brakes on a critical vulnerability in American train systems. Our guest is Cynthia Kaiser, SVP of Halcyon’s Ransomware Research Center and former Deputy Assistant Director at the FBI’s Cyber Division, with insights on Scattered Spider. Hackers ransack Elmo’s World.<strong> </strong></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/cynthia-kaiser-cyber/"><u>Cynthia Kaiser</u></a>, SVP of <a href="https://www.linkedin.com/company/halcyonai/"><u>Halcyon’s</u></a> Ransomware Research Center and former Deputy Assistant Director at the FBI’s Cyber Division, discussing "<a href="https://www.halcyon.ai/blog/scattered-spider-and-other-criminal-compromise-of-outsourcing-providers-increases-victim-attacks"><u>Scattered Spider and Other Criminal Compromise of Outsourcing Providers Increases Victim Attacks</u></a>." You can check out more from Halcyon <a href="https://explore.thecyberwire.com/halcyon">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/romania-arrests-tax-fraud-ring-britain-hmrc"><u>Romanian police arrest 13 scammers targeting UK’s tax authority</u></a> (The Record)</p>
<p><a href="https://www.infosecurity-magazine.com/news/interlock-ransomware-new-rat/"><u>Interlock Ransomware Unleashes New RAT in Widespread Campaign</u> </a>(Infosecurity Magazine)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/google-gemini-flaw-hijacks-email-summaries-for-phishing/"><u>Google Gemini flaw hijacks email summaries for phishing</u></a> (Bleeping Computer)</p>
<p><a href="https://www.cnn.com/2025/07/11/politics/chinese-hackers-suspected-law-firm-hack"><u>Chinese hackers suspected in breach of powerful DC law firm</u> </a>(CNN Politics)</p>
<p><a href="https://www.securityweek.com/flaws-in-gigabyte-firmware-allow-security-bypass-backdoor-deployment/"><u>Flaws in Gigabyte Firmware Allow Security Bypass, Backdoor Deployment</u></a> (Security Week)</p>
<p><a href="https://www.theregister.com/2025/07/13/infosec_in_brief/"><u>Nvidia warns of Rowhammer attacks on GPUs</u> </a>(The Register)</p>
<p><a href="https://www.infosecurity-magazine.com/news/louis-vuitton-uk-retailer-data/"><u>Louis Vuitton UK Latest Retailer Hit by Data Breach</u> </a>(Infosecurity Magazine)</p>
<p><a href="https://www.infosecurity-magazine.com/news/indian-police-tech-support-scam/"><u>Indian Police Raid Tech Support Scam Call Center</u> </a>(Infosecurity Magazine)</p>
<p><a href="https://www.tomshardware.com/tech-industry/cyber-security/security-vulnerability-on-u-s-trains-that-let-anyone-activate-the-brakes-on-the-rear-car-was-known-for-13-years-operators-refused-to-fix-the-issue-until-now"><u>Security vulnerability on U.S. trains that let anyone activate the brakes on the rear car was known for 13 years — operators refused to fix the issue until now</u> </a>(Tom's Hardware)</p>
<p><a href="https://www.cisa.gov/news-events/ics-advisories/icsa-25-191-10"><u>End-of-Train and Head-of-Train Remote Linking Protocol</u> </a>(CISA)</p>
<p><a href="https://www.nytimes.com/2025/07/14/us/elmo-x-hack-antisemitism.html"><u>Hacker Makes Antisemitic Posts on Elmo’s X Account</u> </a>(The New York Times)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1696</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6c8bc94-1c7a-11f0-85e0-f7672ec4f27b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7382303027.mp3?updated=1752523281" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>MK Palmore: Lead from where you stand. [CISO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/76/notes</link>
      <description>Please enjoy this encore of Career Notes.

Director of Google Cloud's Office of the CISO, MK Palmore, dedicated much of his life to public service and now brings his experience working for the greater good to the private sector. A graduate of the US Naval Academy, including the Naval Academy Prep School that he calls the most impactful educational experience of his life, MK commissioned into the US Marine Corps following his service academy time. He joined the FBI and that is where he came into the cybersecurity realm. MK is passionate about getting more diversity, equity and inclusion into industry. We thank MK for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Jul 2025 07:00:00 -0000</pubDate>
      <itunes:title>MK Palmore: Lead from where you stand. [CISO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>76</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c92905b6-5e88-11f0-8786-530996ecd322/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Career Notes.

Director of Google Cloud's Office of the CISO, MK Palmore, dedicated much of his life to public service and now brings his experience working for the greater good to the private sector. A graduate of the US Naval Academy, including the Naval Academy Prep School that he calls the most impactful educational experience of his life, MK commissioned into the US Marine Corps following his service academy time. He joined the FBI and that is where he came into the cybersecurity realm. MK is passionate about getting more diversity, equity and inclusion into industry. We thank MK for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes.</p>
<p>Director of Google Cloud's Office of the CISO, MK Palmore, dedicated much of his life to public service and now brings his experience working for the greater good to the private sector. A graduate of the US Naval Academy, including the Naval Academy Prep School that he calls the most impactful educational experience of his life, MK commissioned into the US Marine Corps following his service academy time. He joined the FBI and that is where he came into the cybersecurity realm. MK is passionate about getting more diversity, equity and inclusion into industry. We thank MK for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>550</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c92905b6-5e88-11f0-8786-530996ecd322]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3790732322.mp3?updated=1752260504" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Click here to steal. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/384/notes</link>
      <description>Today we are joined by ⁠Selena Larson⁠, Threat Researcher at ⁠Proofpoint⁠, and co-host of ⁠Only Malware in the Building⁠, as she discusses their work on "Amatera Stealer - Rebranded ACR Stealer With Improved Evasion, Sophistication." Proofpoint researchers have identified Amatera Stealer, a rebranded and actively developed malware-as-a-service (MaaS) variant of the former ACR Stealer, featuring advanced evasion techniques like NTSockets for stealthy C2 communication and WoW64 Syscalls to bypass user-mode defenses. 

Distributed via ClearFake web injects and the ClickFix technique, Amatera leverages multilayered PowerShell loaders, blockchain-based hosting, and creative social engineering to compromise victims. With enhanced capabilities to steal browser data, crypto wallets, and other sensitive files, Amatera poses a growing threat in the wake of disruptions to competing stealers like Lumma.

Complete our annual ⁠audience survey⁠ before August 31.

The research can be found here:


  ⁠Amatera Stealer: Rebranded ACR Stealer With Improved Evasion, Sophistication


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Jul 2025 07:00:00 -0000</pubDate>
      <itunes:title>Click here to steal. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>384</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c69d7840-1c7a-11f0-85e0-aba6a56b08cc/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Today we are joined by ⁠Selena Larson⁠, Threat Researcher at ⁠Proofpoint⁠, and co-host of ⁠Only Malware in the Building⁠, as she discusses their work on "Amatera Stealer - Rebranded ACR Stealer With Improved Evasion, Sophistication." Proofpoint researchers have identified Amatera Stealer, a rebranded and actively developed malware-as-a-service (MaaS) variant of the former ACR Stealer, featuring advanced evasion techniques like NTSockets for stealthy C2 communication and WoW64 Syscalls to bypass user-mode defenses. 

Distributed via ClearFake web injects and the ClickFix technique, Amatera leverages multilayered PowerShell loaders, blockchain-based hosting, and creative social engineering to compromise victims. With enhanced capabilities to steal browser data, crypto wallets, and other sensitive files, Amatera poses a growing threat in the wake of disruptions to competing stealers like Lumma.

Complete our annual ⁠audience survey⁠ before August 31.

The research can be found here:


  ⁠Amatera Stealer: Rebranded ACR Stealer With Improved Evasion, Sophistication


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we are joined by <a href="https://www.linkedin.com/in/selenalarson/">⁠<u>Selena Larson</u>⁠</a>, Threat Researcher at <a href="https://www.linkedin.com/company/proofpoint/">⁠<u>Proofpoint</u>⁠</a>, and co-host of <a href="https://thecyberwire.com/podcasts/only-malware-in-the-building">⁠<u>Only Malware in the Building</u>⁠</a>, as she discusses their work on "Amatera Stealer - Rebranded ACR Stealer With Improved Evasion, Sophistication." Proofpoint researchers have identified <em>Amatera Stealer</em>, a rebranded and actively developed malware-as-a-service (MaaS) variant of the former ACR Stealer, featuring advanced evasion techniques like NTSockets for stealthy C2 communication and WoW64 Syscalls to bypass user-mode defenses. </p>
<p>Distributed via ClearFake web injects and the ClickFix technique, Amatera leverages multilayered PowerShell loaders, blockchain-based hosting, and creative social engineering to compromise victims. With enhanced capabilities to steal browser data, crypto wallets, and other sensitive files, Amatera poses a growing threat in the wake of disruptions to competing stealers like Lumma.</p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JDYLFZ5">⁠audience survey⁠</a> before August 31.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.proofpoint.com/us/blog/threat-insight/amatera-stealer-rebranded-acr-stealer-improved-evasion-sophistication">⁠Amatera Stealer: Rebranded ACR Stealer With Improved Evasion, Sophistication</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1511</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c69d7840-1c7a-11f0-85e0-aba6a56b08cc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9740807142.mp3?updated=1752252490" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Behind the firewall, trouble brews.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2347/notes</link>
      <description>Fortinet patches a critical flaw in its FortiWeb web application firewall.  Hackers are exploiting a critical vulnerability in Wing FTP Server. U.S. Cyber Command’s fiscal 2026 budget includes a new AI project.  Czechia’s cybersecurity agency has issued a formal warning about Chinese AI company DeepSeek. The DoNot APT group targets Italy’s Ministry of Foreign Affairs. Mexico’s former president is under investigation for alleged bribes to secure spyware contracts. The FBI seizes a major Nintendo Switch piracy site. CISA releases 13 ICS advisories.  A retired US Army lieutenant colonel pleads guilty to oversharing classified information on a dating app. Our guest is Catherine Woneis, VP of Product at Fingerprint, to discuss how bots are being used to facilitate music royalty fraud. A federal judge is not impressed with a crypto-thief’s lack of restitution.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Catherine Woneis, VP of Product at Fingerprint, to discuss how bots are being used to facilitate music royalty fraud and how companies can protect themselves.

Selected Reading

Critical SQL injection vulnerability in Fortinet FortiWeb enables unauthenticated remote code execution (Beyond Machines)

Critical Wing FTCritical Wing FTP Server Vulnerability Exploited - SecurityWeekP Server Vulnerability Exploited (SecurityWeek)

Cyber Command creates new AI program in fiscal 2026 budget (DefenseScoop)

DeepSeek a threat to national security, warns Czech cyber agency (The Record)

Indian Cyber Espionage Group Targets Italian Government (Infosecurity Magazine)

Former Mexican president investigated over allegedly taking bribes from spyware industry (The Record)

Major Nintendo Switch Piracy Website Seized By FBI (Kotaku)

CISA Releases Thirteen Industrial Control Systems Advisories (CISA)

Lovestruck US Air Force worker admits leaking secrets on dating app (The Register)

Crypto Scammer Truglia Gets 12 Years Prison, Up From 18 Months (Bloomberg)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 11 Jul 2025 20:10:00 -0000</pubDate>
      <itunes:title>Behind the firewall, trouble brews.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2347</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Fortinet patches a critical flaw in its FortiWeb web application firewall.  Hackers are exploiting a critical vulnerability in Wing FTP Server. U.S. Cyber Command’s fiscal 2026 budget includes a new AI project.  Czechia’s cybersecurity agency has issued a formal warning about Chinese AI company DeepSeek. The DoNot APT group targets Italy’s Ministry of Foreign Affairs. Mexico’s former president is under investigation for alleged bribes to secure spyware contracts. The FBI seizes a major Nintendo Switch piracy site. CISA releases 13 ICS advisories.  A retired US Army lieutenant colonel pleads guilty to oversharing classified information on a dating app. Our guest is Catherine Woneis, VP of Product at Fingerprint, to discuss how bots are being used to facilitate music royalty fraud. A federal judge is not impressed with a crypto-thief’s lack of restitution.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Catherine Woneis, VP of Product at Fingerprint, to discuss how bots are being used to facilitate music royalty fraud and how companies can protect themselves.

Selected Reading

Critical SQL injection vulnerability in Fortinet FortiWeb enables unauthenticated remote code execution (Beyond Machines)

Critical Wing FTCritical Wing FTP Server Vulnerability Exploited - SecurityWeekP Server Vulnerability Exploited (SecurityWeek)

Cyber Command creates new AI program in fiscal 2026 budget (DefenseScoop)

DeepSeek a threat to national security, warns Czech cyber agency (The Record)

Indian Cyber Espionage Group Targets Italian Government (Infosecurity Magazine)

Former Mexican president investigated over allegedly taking bribes from spyware industry (The Record)

Major Nintendo Switch Piracy Website Seized By FBI (Kotaku)

CISA Releases Thirteen Industrial Control Systems Advisories (CISA)

Lovestruck US Air Force worker admits leaking secrets on dating app (The Register)

Crypto Scammer Truglia Gets 12 Years Prison, Up From 18 Months (Bloomberg)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Fortinet patches a critical flaw in its FortiWeb web application firewall.  Hackers are exploiting a critical vulnerability in Wing FTP Server. U.S. Cyber Command’s fiscal 2026 budget includes a new AI project.  Czechia’s cybersecurity agency has issued a formal warning about Chinese AI company DeepSeek. The DoNot APT group targets Italy’s Ministry of Foreign Affairs. Mexico’s former president is under investigation for alleged bribes to secure spyware contracts. The FBI seizes a major Nintendo Switch piracy site. CISA releases 13 ICS advisories.  A retired US Army lieutenant colonel pleads guilty to oversharing classified information on a dating app. Our guest is Catherine Woneis, VP of Product at Fingerprint, to discuss how bots are being used to facilitate music royalty fraud. A federal judge is not impressed with a crypto-thief’s lack of restitution.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/valleycat/"><u>Catherine Woneis</u></a>, VP of Product at <a href="https://www.linkedin.com/company/fingerprintjs/"><u>Fingerprint</u></a>, to discuss how bots are being used to facilitate music royalty fraud and how companies can protect themselves.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://beyondmachines.net/event_details/critical-sql-injection-vulnerability-in-fortinet-fortiweb-enables-unauthenticated-remote-code-execution-f-e-i-9-a/gD2P6Ple2L"><u>Critical SQL injection vulnerability in Fortinet FortiWeb enables unauthenticated remote code execution</u></a> (Beyond Machines)</p>
<p><a href="https://www.securityweek.com/critical-wing-ftp-server-vulnerability-exploited/"><u>Critical Wing FTCritical Wing FTP Server Vulnerability Exploited - SecurityWeekP Server Vulnerability Exploited </u></a>(SecurityWeek)</p>
<p><a href="https://defensescoop.com/2025/07/07/cyber-command-fy26-budget-request-new-ai-program/"><u>Cyber Command creates new AI program in fiscal 2026 budget </u></a>(DefenseScoop)</p>
<p><a href="https://therecord.media/deepseek-security-czech-cyber-agency-warning"><u>DeepSeek a threat to national security, warns Czech cyber agency</u></a> (The Record)</p>
<p><a href="https://www.infosecurity-magazine.com/news/indian-cyber-espionage-italian/"><u>Indian Cyber Espionage Group Targets Italian Government </u></a>(Infosecurity Magazine)</p>
<p><a href="https://therecord.media/former-mexican-president-investigated-spyware-bribes"><u>Former Mexican president investigated over allegedly taking bribes from spyware industry</u></a> (The Record)</p>
<p><a href="https://kotaku.com/switch-2-piracy-nsw2u-roms-fbi-hack-emulator-zelda-1851786034"><u>Major Nintendo Switch Piracy Website Seized By FBI</u></a> (Kotaku)</p>
<p><a href="https://www.cisa.gov/news-events/alerts/2025/07/10/cisa-releases-thirteen-industrial-control-systems-advisories"><u>CISA Releases Thirteen Industrial Control Systems Advisories</u></a> (CISA)</p>
<p><a href="https://www.theregister.com/2025/07/10/airman_admits_dating_app_leaks/"><u>Lovestruck US Air Force worker admits leaking secrets on dating app</u></a> (The Register)</p>
<p><a href="https://www.bloomberg.com/news/articles/2025-07-10/crypto-scammer-truglia-gets-12-years-prison-up-from-18-months"><u>Crypto Scammer Truglia Gets 12 Years Prison, Up From 18 Months </u></a>(Bloomberg)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1549</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3d195c30-5e81-11f0-8233-57c1731724c4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3953843841.mp3?updated=1752257503" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybercrime has a hefty price tag.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2346/notes</link>
      <description>UK police make multiple arrests in the retail cyberattack case.  French authorities arrest a Russian basketball player at the request of the U.S. A German court declares open season on Meta’s tracking pixels. The European Union unveils new rules to regulate artificial intelligence. London’s Iran International news confirms cyberattacks from Banished Kitten. Treasury sanctions a North Korean hacker over fake IT worker schemes. Microsoft confirms a widespread issue preventing organizations from deploying the latest Windows updates. Agreements over AI help end a year-long Hollywood strike. Researchers take an  in-depth look at ClickFix. I’m joined by Ben Yelin and Ethan Cook for a look at Congress’ recent attempt to limit AI regulation through preemption. Password insecurity with a side of fries.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we’re sharing our latest Caveat Policy Deep Dive—a special segment where we explore the legal and policy forces shaping our digital lives. In this episode, Ethan Cook joins hosts Dave Bittner and Ben Yelin to break down a recent attempt by Congress to use preemption as a way to block state-level AI laws, and what this means for the ongoing tug-of-war over who should regulate AI in America.

For the full conversation and a deeper dive into the implications of this federal vs. state showdown, check out the Caveat podcast

Selected Reading

UK police arrest four in connection with M&amp;S and Co-op cyberattacks (Reuters)

Russian Basketball Player Arrested in France at Request of United States (The Moscow Times)

German court rules Meta tracking technology violates European privacy laws (The Record)

European Union Unveils Rules for Powerful A.I. Systems (The New York Times)

Leaked materials came from previously reported cyberattacks, Iran International confirms (Iran Insight)

Treasury sanctions North Korean over IT worker malware scheme (Bleeping Computer)

Microsoft confirms Windows Server Update Services (WSUS) sync is broken (Bleeping Computer)

Industry video game actors pass agreement with studios for AI security (Reuters)

Fix the Click: Preventing the ClickFix Attack Vector (Palo Alto Networks)

McDonald’s AI Hiring Bot Exposed Millions of Applicants' Data to Hackers Using the Password ‘123456’ (WIRED)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 10 Jul 2025 20:10:00 -0000</pubDate>
      <itunes:title>Cybercrime has a hefty price tag.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2346</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>UK police make multiple arrests in the retail cyberattack case.  French authorities arrest a Russian basketball player at the request of the U.S. A German court declares open season on Meta’s tracking pixels. The European Union unveils new rules to regulate artificial intelligence. London’s Iran International news confirms cyberattacks from Banished Kitten. Treasury sanctions a North Korean hacker over fake IT worker schemes. Microsoft confirms a widespread issue preventing organizations from deploying the latest Windows updates. Agreements over AI help end a year-long Hollywood strike. Researchers take an  in-depth look at ClickFix. I’m joined by Ben Yelin and Ethan Cook for a look at Congress’ recent attempt to limit AI regulation through preemption. Password insecurity with a side of fries.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we’re sharing our latest Caveat Policy Deep Dive—a special segment where we explore the legal and policy forces shaping our digital lives. In this episode, Ethan Cook joins hosts Dave Bittner and Ben Yelin to break down a recent attempt by Congress to use preemption as a way to block state-level AI laws, and what this means for the ongoing tug-of-war over who should regulate AI in America.

For the full conversation and a deeper dive into the implications of this federal vs. state showdown, check out the Caveat podcast

Selected Reading

UK police arrest four in connection with M&amp;S and Co-op cyberattacks (Reuters)

Russian Basketball Player Arrested in France at Request of United States (The Moscow Times)

German court rules Meta tracking technology violates European privacy laws (The Record)

European Union Unveils Rules for Powerful A.I. Systems (The New York Times)

Leaked materials came from previously reported cyberattacks, Iran International confirms (Iran Insight)

Treasury sanctions North Korean over IT worker malware scheme (Bleeping Computer)

Microsoft confirms Windows Server Update Services (WSUS) sync is broken (Bleeping Computer)

Industry video game actors pass agreement with studios for AI security (Reuters)

Fix the Click: Preventing the ClickFix Attack Vector (Palo Alto Networks)

McDonald’s AI Hiring Bot Exposed Millions of Applicants' Data to Hackers Using the Password ‘123456’ (WIRED)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>UK police make multiple arrests in the retail cyberattack case.  French authorities arrest a Russian basketball player at the request of the U.S. A German court declares open season on Meta’s tracking pixels. The European Union unveils new rules to regulate artificial intelligence. London’s Iran International news confirms cyberattacks from Banished Kitten. Treasury sanctions a North Korean hacker over fake IT worker schemes. Microsoft confirms a widespread issue preventing organizations from deploying the latest Windows updates. Agreements over AI help end a year-long Hollywood strike. Researchers take an  in-depth look at ClickFix. I’m joined by Ben Yelin and Ethan Cook for a look at Congress’ recent attempt to limit AI regulation through preemption. Password insecurity with a side of fries.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we’re sharing our latest <a href="https://thecyberwire.com/podcasts/caveat/268/notes"><em>Caveat</em><u> Policy Deep Dive</u></a>—a special segment where we explore the legal and policy forces shaping our digital lives. In this episode, <a href="https://www.linkedin.com/in/ethan-cook-766a24138/"><u>Ethan Cook</u></a> joins hosts Dave Bittner and Ben Yelin to break down a recent attempt by Congress to use <em>preemption</em> as a way to block state-level AI laws, and what this means for the ongoing tug-of-war over who should regulate AI in America.</p>
<p>For the full conversation and a deeper dive into the implications of this federal vs. state showdown, check out the <a href="https://thecyberwire.com/podcasts/caveat"><em>Caveat</em></a> podcast</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.reuters.com/business/retail-consumer/uk-police-arrest-four-connection-with-ms-co-op-cyberattacks-2025-07-10/"><u>UK police arrest four in connection with M&amp;S and Co-op cyberattacks</u></a> (Reuters)</p>
<p><a href="https://www.themoscowtimes.com/2025/07/10/russian-basketball-player-arrested-in-france-at-request-of-united-states-a89756"><u>Russian Basketball Player Arrested in France at Request of United States</u></a> (The Moscow Times)</p>
<p><a href="https://therecord.media/german-court-meta-tracking-tech"><u>German court rules Meta tracking technology violates European privacy laws</u></a> (The Record)</p>
<p><a href="https://www.nytimes.com/2025/07/10/business/ai-rules-europe.html"><u>European Union Unveils Rules for Powerful A.I. Systems</u></a> (The New York Times)</p>
<p><a href="https://www.iranintl.com/en/202507084950"><u>Leaked materials came from previously reported cyberattacks, Iran International confirms</u></a> (Iran Insight)</p>
<p><a href="https://www.bleepingcomputer.com/news/legal/treasury-sanctions-north-korean-over-it-worker-malware-scheme/"><u>Treasury sanctions North Korean over IT worker malware scheme</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-confirms-windows-server-update-services-wsus-sync-is-broken/"><u>Microsoft confirms Windows Server Update Services (WSUS) sync is broken</u></a> (Bleeping Computer)</p>
<p><a href="https://www.reuters.com/business/media-telecom/industry-video-game-actors-pass-agreement-with-studios-ai-security-2025-07-10/"><u>Industry video game actors pass agreement with studios for AI security</u></a> (Reuters)</p>
<p><a href="https://unit42.paloaltonetworks.com/preventing-clickfix-attack-vector/"><u>Fix the Click: Preventing the ClickFix Attack Vector</u></a> (Palo Alto Networks)</p>
<p><a href="https://www.wired.com/story/mcdonalds-ai-hiring-chat-bot-paradoxai/"><u>McDonald’s AI Hiring Bot Exposed Millions of Applicants' Data to Hackers Using the Password ‘123456’</u></a> (WIRED)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1788</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c673e52a-1c7a-11f0-85e0-2b3bf0ef9412]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4610604946.mp3?updated=1752172804" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Plug-ins gone rogue.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2345/notes</link>
      <description>Patch Tuesday. An Iranian ransomware group puts a premium on U.S. and Israeli targets. Batavia spyware targets Russia’s industrial sector. HHS fines a Texas Behavioral Health firm for failed risk analysis. The Anatsa banking trojan targets financial institutions in the U.S. and Canada. Hackers abuse a legitimate commercial evasion framework to package infostealer payloads. Researchers discovered malicious browser extensions infecting over 2.3 million users. Joe Carrigan, co-host on Hacking Humans discusses phishing kits targeting CFOs. Can felines frustrate algorithms? Purr-haps…

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Joe Carrigan, a co-host of Hacking Humans, as he discusses phishing kits targeting CFOs.

Selected Reading

Microsoft July 2025 Patch Tuesday fixes one zero-day, 137 flaws (Bleeping Computer)

SAP Patches Critical Flaws That Could Allow Remote Code Execution, Full System Takeover (SecurityWeek)

CISA Releases One Industrial Control Systems Advisory (CISA)

Iranian ransomware group offers bigger payouts for attacks on Israel, US (The Record)

New spyware strain steals data from Russian industrial companies (The Record)

Mental Health Provider Fined $225K for Lack of Risk Analysis (BankInfo Security)

Anatsa mobile malware returns to victimize North American bank customers (The Record)

Legitimate Shellter Pen-Testing Tool Used in Malware Attacks (SecurityWeek)

Researchers Reveal 18 Malicious Chrome and Edge Extensions Disguised as Everyday Tools (Infosecurity Magazine)

Cat content disturbs AI models (Computerworld)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 09 Jul 2025 20:10:00 -0000</pubDate>
      <itunes:title>Plug-ins gone rogue.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2345</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Patch Tuesday. An Iranian ransomware group puts a premium on U.S. and Israeli targets. Batavia spyware targets Russia’s industrial sector. HHS fines a Texas Behavioral Health firm for failed risk analysis. The Anatsa banking trojan targets financial institutions in the U.S. and Canada. Hackers abuse a legitimate commercial evasion framework to package infostealer payloads. Researchers discovered malicious browser extensions infecting over 2.3 million users. Joe Carrigan, co-host on Hacking Humans discusses phishing kits targeting CFOs. Can felines frustrate algorithms? Purr-haps…

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Joe Carrigan, a co-host of Hacking Humans, as he discusses phishing kits targeting CFOs.

Selected Reading

Microsoft July 2025 Patch Tuesday fixes one zero-day, 137 flaws (Bleeping Computer)

SAP Patches Critical Flaws That Could Allow Remote Code Execution, Full System Takeover (SecurityWeek)

CISA Releases One Industrial Control Systems Advisory (CISA)

Iranian ransomware group offers bigger payouts for attacks on Israel, US (The Record)

New spyware strain steals data from Russian industrial companies (The Record)

Mental Health Provider Fined $225K for Lack of Risk Analysis (BankInfo Security)

Anatsa mobile malware returns to victimize North American bank customers (The Record)

Legitimate Shellter Pen-Testing Tool Used in Malware Attacks (SecurityWeek)

Researchers Reveal 18 Malicious Chrome and Edge Extensions Disguised as Everyday Tools (Infosecurity Magazine)

Cat content disturbs AI models (Computerworld)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Patch Tuesday. An Iranian ransomware group puts a premium on U.S. and Israeli targets. Batavia spyware targets Russia’s industrial sector. HHS fines a Texas Behavioral Health firm for failed risk analysis. The Anatsa banking trojan targets financial institutions in the U.S. and Canada. Hackers abuse a legitimate commercial evasion framework to package infostealer payloads. Researchers discovered malicious browser extensions infecting over 2.3 million users. Joe Carrigan, co-host on Hacking Humans discusses phishing kits targeting CFOs. Can felines frustrate algorithms? Purr-haps…</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/joecarrigan/"><u>Joe Carrigan</u></a>, a co-host of <a href="https://thecyberwire.com/podcasts/hacking-humans"><u>Hacking Humans</u></a>, as he discusses phishing kits targeting CFOs.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2025-patch-tuesday-fixes-one-zero-day-137-flaws/"><u>Microsoft July 2025 Patch Tuesday fixes one zero-day, 137 flaws</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/sap-patches-critical-flaws-that-could-allow-remote-code-execution-full-system-takeover/"><u>SAP Patches Critical Flaws That Could Allow Remote Code Execution, Full System Takeover</u></a> (SecurityWeek)</p>
<p><a href="https://www.cisa.gov/news-events/alerts/2025/07/08/cisa-releases-one-industrial-control-systems-advisory"><u>CISA Releases One Industrial Control Systems Advisory</u></a> (CISA)</p>
<p><a href="https://therecord.media/iran-ransomware-group-pay2keyi2p-israel-us-targets"><u>Iranian ransomware group offers bigger payouts for attacks on Israel, US</u></a> (The Record)</p>
<p><a href="https://therecord.media/spyware-strain-steals-data-russian-industrial-sector"><u>New spyware strain steals data from Russian industrial companies</u></a> (The Record)</p>
<p><a href="https://www.bankinfosecurity.com/mental-health-provider-fined-225k-for-lack-risk-analysis-a-28916"><u>Mental Health Provider Fined $225K for Lack of Risk Analysis</u></a> (BankInfo Security)</p>
<p><a href="https://therecord.media/anatsa-android-banking-malware-returns-north-america"><u>Anatsa mobile malware returns to victimize North American bank customers</u></a> (The Record)</p>
<p><a href="https://www.securityweek.com/legit-shellter-pen-testing-tool-used-in-malware-attacks/"><u>Legitimate Shellter Pen-Testing Tool Used in Malware Attacks </u></a>(SecurityWeek)</p>
<p><a href="https://www.infosecurity-magazine.com/news/18-malicious-chrome-edge-extensions/"><u>Researchers Reveal 18 Malicious Chrome and Edge Extensions Disguised as Everyday Tools</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.computerworld.com/article/4018707/cat-content-disturbs-ai-models.html"><u>Cat content disturbs AI models </u></a>(Computerworld)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1432</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c647bedc-1c7a-11f0-85e0-4f7aead49e2d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8265566467.mp3?updated=1752082058" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Memory leaks and login sneaks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2344/notes</link>
      <description>Researchers release proof-of-concept exploits for CitrixBleed2. Grafana patches four high-severity vulnerabilities. A hacker claims to have breached Spanish telecom giant Telefónica. Italian police arrest a Chinese man wanted by U.S. authorities for alleged industrial espionage. Beware of a new ransomware group called Bert. Call of Duty goes offline after reports of RCE vulnerabilities. President Trump's spending bill allocates hundreds of millions for cybersecurity. Nearly 26 million job seekers’ resumes and personal data are leaked. CISA adds four actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog. Outsmarting AI scraper bots with math.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment

Cyber attackers are increasingly targeting the very tools developers trust—integrated development environments (IDEs), low-code platforms, and public code repositories. In this segment of Threat Vector, host ⁠David Moulton⁠ speaks with ⁠Daniel Frank⁠ and ⁠Tom Fakterman⁠ from Palo Alto Networks' threat research team about “Hunting Threats in Developer Environments.” You can hear David and Tyler's full discussion on Threat Vector ⁠⁠here⁠⁠ and catch new episodes every Thursday on your favorite podcast app.

Selected Reading

Public exploits released for Citrix Bleed 2 NetScaler flaw, patch now (Bleeping Computer)

Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild (SecurityWeek)

Hacker leaks Telefónica data allegedly stolen in a new breach (Bleeping Computer)

Italian police arrest Chinese national wanted by FBI for alleged industrial espionage (Reuters)

Beware of Bert: New ransomware group targets healthcare, tech firms (The Record)

Call of Duty takes PC game offline after multiple reports of RCE attacks on players (CyberScoop)

GOP domestic policy bill includes hundreds of millions for military cyber (CyberScoop)

TalentHook leaks resumes of 26 Million job seekers (Beyond Machines)

CISA Adds Four Known Exploited Vulnerabilities to Catalog (CISA)

The Open-Source Software Saving the Internet From AI Bot Scrapers (404 Media)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Jul 2025 20:10:00 -0000</pubDate>
      <itunes:title>Memory leaks and login sneaks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2344</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Researchers release proof-of-concept exploits for CitrixBleed2. Grafana patches four high-severity vulnerabilities. A hacker claims to have breached Spanish telecom giant Telefónica. Italian police arrest a Chinese man wanted by U.S. authorities for alleged industrial espionage. Beware of a new ransomware group called Bert. Call of Duty goes offline after reports of RCE vulnerabilities. President Trump's spending bill allocates hundreds of millions for cybersecurity. Nearly 26 million job seekers’ resumes and personal data are leaked. CISA adds four actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog. Outsmarting AI scraper bots with math.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment

Cyber attackers are increasingly targeting the very tools developers trust—integrated development environments (IDEs), low-code platforms, and public code repositories. In this segment of Threat Vector, host ⁠David Moulton⁠ speaks with ⁠Daniel Frank⁠ and ⁠Tom Fakterman⁠ from Palo Alto Networks' threat research team about “Hunting Threats in Developer Environments.” You can hear David and Tyler's full discussion on Threat Vector ⁠⁠here⁠⁠ and catch new episodes every Thursday on your favorite podcast app.

Selected Reading

Public exploits released for Citrix Bleed 2 NetScaler flaw, patch now (Bleeping Computer)

Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild (SecurityWeek)

Hacker leaks Telefónica data allegedly stolen in a new breach (Bleeping Computer)

Italian police arrest Chinese national wanted by FBI for alleged industrial espionage (Reuters)

Beware of Bert: New ransomware group targets healthcare, tech firms (The Record)

Call of Duty takes PC game offline after multiple reports of RCE attacks on players (CyberScoop)

GOP domestic policy bill includes hundreds of millions for military cyber (CyberScoop)

TalentHook leaks resumes of 26 Million job seekers (Beyond Machines)

CISA Adds Four Known Exploited Vulnerabilities to Catalog (CISA)

The Open-Source Software Saving the Internet From AI Bot Scrapers (404 Media)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers release proof-of-concept exploits for CitrixBleed2. Grafana patches four high-severity vulnerabilities. A hacker claims to have breached Spanish telecom giant Telefónica. Italian police arrest a Chinese man wanted by U.S. authorities for alleged industrial espionage. Beware of a new ransomware group called Bert. Call of Duty goes offline after reports of RCE vulnerabilities. President Trump's spending bill allocates hundreds of millions for cybersecurity. Nearly 26 million job seekers’ resumes and personal data are leaked. CISA adds four actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog. Outsmarting AI scraper bots with math.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Threat Vector Segment</strong></p>
<p>Cyber attackers are increasingly targeting the very tools developers trust—integrated development environments (IDEs), low-code platforms, and public code repositories. In this segment of Threat Vector, host <a href="https://www.linkedin.com/in/davidrmoulton/"><u>⁠David Moulton⁠</u></a> speaks with <a href="https://www.linkedin.com/in/dani3lfrank/"><u>⁠Daniel Frank⁠</u></a> and <a href="https://www.linkedin.com/in/tom-fakterman-b14489158/"><u>⁠Tom Fakterman⁠</u></a> from Palo Alto Networks' threat research team about “Hunting Threats in Developer Environments.” You can hear David and Tyler's full discussion on Threat Vector <a href="https://thecyberwire.com/podcasts/threat-vector/74/notes"><u>⁠⁠here⁠⁠</u></a> and catch new episodes every Thursday on your favorite podcast app.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/public-exploits-released-for-citrixbleed-2-netscaler-flaw-patch-now/"><u>Public exploits released for Citrix Bleed 2 NetScaler flaw, patch now</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/grafana-patches-chromium-bugs-including-zero-day-exploited-in-the-wild/"><u>Grafana Patches Chromium Bugs, Including Zero-Day Exploited in the Wild</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/hacker-leaks-telef-nica-data-allegedly-stolen-in-a-new-breach/"><u>Hacker leaks Telefónica data allegedly stolen in a new breach</u></a> (Bleeping Computer)</p>
<p><a href="https://www.reuters.com/world/china/italian-police-arrest-chinese-national-wanted-by-fbi-alleged-industrial-2025-07-07/"><u>Italian police arrest Chinese national wanted by FBI for alleged industrial espionage</u></a> (Reuters)</p>
<p><a href="https://therecord.media/bert-ransomware-identified"><u>Beware of Bert: New ransomware group targets healthcare, tech firms</u></a> (The Record)</p>
<p><a href="https://cyberscoop.com/call-of-duty-remote-code-execution-pc-game-offline/"><u>Call of Duty takes PC game offline after multiple reports of RCE attacks on players</u></a> (CyberScoop)</p>
<p><a href="https://cyberscoop.com/gop-domestic-policy-bill-includes-hundreds-of-millions-for-military-cyber/"><u>GOP domestic policy bill includes hundreds of millions for military cyber</u></a> (CyberScoop)</p>
<p><a href="https://beyondmachines.net/event_details/talenthook-leaks-resumes-of-26-million-job-seekers-7-7-s-s-2/gD2P6Ple2L"><u>TalentHook leaks resumes of 26 Million job seekers</u></a> (Beyond Machines)</p>
<p><a href="https://www.cisa.gov/news-events/alerts/2025/07/07/cisa-adds-four-known-exploited-vulnerabilities-catalog"><u>CISA Adds Four Known Exploited Vulnerabilities to Catalog</u></a> (CISA)</p>
<p><a href="https://www.404media.co/the-open-source-software-saving-the-internet-from-ai-bot-scrapers/"><u>The Open-Source Software Saving the Internet From AI Bot Scrapers</u></a> (404 Media)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1490</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c61efeac-1c7a-11f0-85e0-6b8610770f9b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3196364221.mp3?updated=1751997317" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SafePay, unsafe day.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2343/notes</link>
      <description>Ingram Micro suffers a ransomware attack by the SafePay gang. Spanish police dismantle a large-scale investment fraud ring. The SatanLock ransomware group says it is shutting down. Brazilian police arrest a man accused of stealing over $100 million from the country’s banking system. Qantas confirms contact from a “potential cybercriminal” following its recent customer data breach. The XWorm RAT evolves to better evade detection. Cybercriminals ramp up fraudulent domains ahead of Amazon Prime day. Apple sues a former engineer allegedly stealing confidential data. Our guest is Rob Allen, Chief Product Officer at Threat Locker, discussing why 'Default Deny' could be the Antidote to Security Fatigue. AI image editing blurs the evidence. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Rob Allen, Chief Product Officer at Threat Locker, discussing From Noise to Control: Why 'Default Deny' Is the Antidote to Security Fatigue. If you want to hear more from Rob or Threat Locker, you can listen to them here.

Selected Reading

Ingram Micro outage caused by SafePay ransomware attack (Bleeping Computer)

Police dismantles investment fraud ring stealing €10 million (Bleeping Computer)

SatanLock Ransomware Ends Operations, Says Stolen Data Will Be Leaked (Hackread)

Police in Brazil Arrest a Suspect Over $100M Banking Hack (SecurityWeek)

Qantas Contacted by Potential Cybercriminal Following Data Breach (Infosecurity Magazine)

Arbor Associates reports data breach exposing patient information (Beyond Machines)

XWorm RAT Deploys New Stagers and Loaders to Bypass Defenses (GB Hackers)

Amazon Prime Day 2025: Deals Await, But So Do the Cyber Criminals (Check Point)

Apple Accuses Ex-Engineer Of Stealing Vision Pro Secrets, Silently Accepting Job At Snap Inc., And Covering His Tracks By Wiping Data From Work Laptop (WCCF TECH)

Cops Use ChatGPT to Edit Drugs Bust Photo, Goes Horribly Wrong (PetaPixel)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 07 Jul 2025 20:30:00 -0000</pubDate>
      <itunes:title>SafePay, unsafe day.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2343</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Ingram Micro suffers a ransomware attack by the SafePay gang. Spanish police dismantle a large-scale investment fraud ring. The SatanLock ransomware group says it is shutting down. Brazilian police arrest a man accused of stealing over $100 million from the country’s banking system. Qantas confirms contact from a “potential cybercriminal” following its recent customer data breach. The XWorm RAT evolves to better evade detection. Cybercriminals ramp up fraudulent domains ahead of Amazon Prime day. Apple sues a former engineer allegedly stealing confidential data. Our guest is Rob Allen, Chief Product Officer at Threat Locker, discussing why 'Default Deny' could be the Antidote to Security Fatigue. AI image editing blurs the evidence. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Rob Allen, Chief Product Officer at Threat Locker, discussing From Noise to Control: Why 'Default Deny' Is the Antidote to Security Fatigue. If you want to hear more from Rob or Threat Locker, you can listen to them here.

Selected Reading

Ingram Micro outage caused by SafePay ransomware attack (Bleeping Computer)

Police dismantles investment fraud ring stealing €10 million (Bleeping Computer)

SatanLock Ransomware Ends Operations, Says Stolen Data Will Be Leaked (Hackread)

Police in Brazil Arrest a Suspect Over $100M Banking Hack (SecurityWeek)

Qantas Contacted by Potential Cybercriminal Following Data Breach (Infosecurity Magazine)

Arbor Associates reports data breach exposing patient information (Beyond Machines)

XWorm RAT Deploys New Stagers and Loaders to Bypass Defenses (GB Hackers)

Amazon Prime Day 2025: Deals Await, But So Do the Cyber Criminals (Check Point)

Apple Accuses Ex-Engineer Of Stealing Vision Pro Secrets, Silently Accepting Job At Snap Inc., And Covering His Tracks By Wiping Data From Work Laptop (WCCF TECH)

Cops Use ChatGPT to Edit Drugs Bust Photo, Goes Horribly Wrong (PetaPixel)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ingram Micro suffers a ransomware attack by the SafePay gang. Spanish police dismantle a large-scale investment fraud ring. The SatanLock ransomware group says it is shutting down. Brazilian police arrest a man accused of stealing over $100 million from the country’s banking system. Qantas confirms contact from a “potential cybercriminal” following its recent customer data breach. The XWorm RAT evolves to better evade detection. Cybercriminals ramp up fraudulent domains ahead of Amazon Prime day. Apple sues a former engineer allegedly stealing confidential data. Our guest is Rob Allen, Chief Product Officer at Threat Locker, discussing why 'Default Deny' could be the Antidote to Security Fatigue. AI image editing blurs the evidence.<strong> </strong></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/threatlockerrob/"><u>Rob Allen</u></a>, Chief Product Officer at <a href="https://www.linkedin.com/company/threatlockerinc/"><u>Threat Locker</u></a>, discussing From Noise to Control: Why 'Default Deny' Is the Antidote to Security Fatigue. If you want to hear more from Rob or Threat Locker, you can listen to them <a href="https://explore.thecyberwire.com/threatlocker">here</a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/ingram-micro-outage-caused-by-safepay-ransomware-attack/"><u>Ingram Micro outage caused by SafePay ransomware attack</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/legal/police-dismantles-investment-fraud-ring-stealing-10-million/"><u>Police dismantles investment fraud ring stealing €10 million</u></a> (Bleeping Computer)</p>
<p><a href="https://hackread.com/satanlock-ransomware-ends-operations-stolen-data-leak/"><u>SatanLock Ransomware Ends Operations, Says Stolen Data Will Be Leaked</u></a> (Hackread)</p>
<p><a href="https://www.securityweek.com/police-in-brazil-arrest-a-suspect-over-100m-banking-hack/"><u>Police in Brazil Arrest a Suspect Over $100M Banking Hack</u></a> (SecurityWeek)</p>
<p><a href="https://www.infosecurity-magazine.com/news/qantas-contacted-cybercriminal/"><u>Qantas Contacted by Potential Cybercriminal Following Data Breach</u></a> (Infosecurity Magazine)</p>
<p><a href="https://beyondmachines.net/event_details/arbor-associates-reports-data-breach-exposing-patient-information-2-a-v-z-d/gD2P6Ple2L"><u>Arbor Associates reports data breach exposing patient information</u></a> (Beyond Machines)</p>
<p><a href="https://gbhackers.com/xworm-rat-deploys-new-stagers-and-loaders/"><u>XWorm RAT Deploys New Stagers and Loaders to Bypass Defenses</u></a> (GB Hackers)</p>
<p><a href="https://blog.checkpoint.com/research/amazon-prime-day-2025-deals-await-but-so-do-the-cyber-criminals-2/"><u>Amazon Prime Day 2025: Deals Await, But So Do the Cyber Criminals </u></a>(Check Point)</p>
<p><a href="https://wccftech.com/apple-accuses-former-employee-over-vision-pro-secreats-leak/"><u>Apple Accuses Ex-Engineer Of Stealing Vision Pro Secrets, Silently Accepting Job At Snap Inc., And Covering His Tracks By Wiping Data From Work Laptop</u></a> (WCCF TECH)</p>
<p><a href="https://petapixel.com/2025/07/03/cops-use-chatgpt-to-edit-drugs-bust-photo-goes-horribly-wrong/"><u>Cops Use ChatGPT to Edit Drugs Bust Photo, Goes Horribly Wrong</u></a> (PetaPixel)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1887</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c5f392e4-1c7a-11f0-85e0-8b8fe7f984bd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4369346534.mp3?updated=1751920473" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Swati Shekhar: Challenges increase your risk appetite. [Engineering] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/75/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Ground Labs' Head of Engineering, Swati Shekhar, shares her circuitous route from and back to engineering. Always being interested in leveraging the tools available to solve problems, Swati talks about how she found her place in engineering. She mentions how she had her first real experience with a computer when she was 17 in her first year at college. Aside from being one of 30 young women in a sea of 500 young men there, Swati described it as a "good culture shock because anything that takes you out of your comfort zone actually makes you learn and grow." She notes that challenges experienced in life increase your risk appetite so significantly. Swati advises those looking to make a job change to be certain of what is attracting them and to be yourself. We thank Swati for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 06 Jul 2025 07:00:00 -0000</pubDate>
      <itunes:title>Swati Shekhar: Challenges increase your risk appetite. [Engineering] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>75</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/71ae4d28-56ae-11f0-b8e6-fb438ecff291/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Ground Labs' Head of Engineering, Swati Shekhar, shares her circuitous route from and back to engineering. Always being interested in leveraging the tools available to solve problems, Swati talks about how she found her place in engineering. She mentions how she had her first real experience with a computer when she was 17 in her first year at college. Aside from being one of 30 young women in a sea of 500 young men there, Swati described it as a "good culture shock because anything that takes you out of your comfort zone actually makes you learn and grow." She notes that challenges experienced in life increase your risk appetite so significantly. Swati advises those looking to make a job change to be certain of what is attracting them and to be yourself. We thank Swati for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Ground Labs' Head of Engineering, Swati Shekhar, shares her circuitous route from and back to engineering. Always being interested in leveraging the tools available to solve problems, Swati talks about how she found her place in engineering. She mentions how she had her first real experience with a computer when she was 17 in her first year at college. Aside from being one of 30 young women in a sea of 500 young men there, Swati described it as a "good culture shock because anything that takes you out of your comfort zone actually makes you learn and grow." She notes that challenges experienced in life increase your risk appetite so significantly. Swati advises those looking to make a job change to be certain of what is attracting them and to be yourself. We thank Swati for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>664</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[71ae4d28-56ae-11f0-b8e6-fb438ecff291]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1799727618.mp3?updated=1751397069" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Botnet’s back, tell a friend. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/368/notes</link>
      <description>Please enjoy this encore of Research Saturday. 

This week we are joined by ⁠⁠Silas Cutler⁠⁠, Principal Security Researcher at ⁠⁠Censys⁠⁠, asking the important question of "Will the Real Volt Typhoon Please Stand Up?" The FBI's disruption of the KV Botnet in December 2023, attributed to the Chinese threat group Volt Typhoon, targeted infected systems but did not affect the botnet's control infrastructure. 

Despite law enforcement efforts and technical exposure, the botnet's infrastructure has remained largely stable, with only changes in hosting providers, raising questions about whether another party operates the botnet. Censys scanning data from 2024 shows a shift in the botnet's control servers, indicating a response to disruption attempts, while the botnet's operators have shown limited efforts to obscure their infrastructure.

The research can be found here:


  ⁠⁠Will the Real Volt Typhoon Please Stand Up?


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Jul 2025 07:00:00 -0000</pubDate>
      <itunes:title>Botnet’s back, tell a friend. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>368</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/3e973c44-5832-11f0-b752-333bbf7779c1/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Research Saturday. 

This week we are joined by ⁠⁠Silas Cutler⁠⁠, Principal Security Researcher at ⁠⁠Censys⁠⁠, asking the important question of "Will the Real Volt Typhoon Please Stand Up?" The FBI's disruption of the KV Botnet in December 2023, attributed to the Chinese threat group Volt Typhoon, targeted infected systems but did not affect the botnet's control infrastructure. 

Despite law enforcement efforts and technical exposure, the botnet's infrastructure has remained largely stable, with only changes in hosting providers, raising questions about whether another party operates the botnet. Censys scanning data from 2024 shows a shift in the botnet's control servers, indicating a response to disruption attempts, while the botnet's operators have shown limited efforts to obscure their infrastructure.

The research can be found here:


  ⁠⁠Will the Real Volt Typhoon Please Stand Up?


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Research Saturday. </p>
<p>This week we are joined by <a href="https://www.linkedin.com/in/silascutler/">⁠⁠Silas Cutler⁠⁠</a>, Principal Security Researcher at <a href="https://www.linkedin.com/company/censysio/">⁠⁠Censys⁠⁠</a>, asking the important question of "Will the Real Volt Typhoon Please Stand Up?" The FBI's disruption of the KV Botnet in December 2023, attributed to the Chinese threat group Volt Typhoon, targeted infected systems but did not affect the botnet's control infrastructure. </p>
<p>Despite law enforcement efforts and technical exposure, the botnet's infrastructure has remained largely stable, with only changes in hosting providers, raising questions about whether another party operates the botnet. Censys scanning data from 2024 shows a shift in the botnet's control servers, indicating a response to disruption attempts, while the botnet's operators have shown limited efforts to obscure their infrastructure.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://censys.com/will-the-real-volt-typhoon-please-stand-up/">⁠⁠Will the Real Volt Typhoon Please Stand Up?</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1187</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3e973c44-5832-11f0-b752-333bbf7779c1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6192729066.mp3?updated=1751563822" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title> Turning data into decisions.  [Deep Space]</title>
      <link>https://space.n2k.com/podcasts/t-minus/ds104</link>
      <description>Please enjoy this encore from our T-Minus Space Daily segment Deep Space. 

Parker Wishik⁠ from ⁠The Aerospace Corporation⁠ explores how experts are turning data into decisions in the space industry on the latest Nexus segment. Parker is joined by⁠ Jackie Barbieri⁠, Founder and CEO of ⁠Whitespace⁠, and Dr. Steve Lewis, Leader of The Aerospace Corporations’s ⁠SPEAR team⁠.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Be sure to follow T-Minus on ⁠LinkedIn⁠ and ⁠Instagram⁠.



Selected Reading

⁠Aerospace Advances Massless Payloads for Space Missions⁠ 

⁠Aerospace Experts Are Turning Data into Decisions⁠

⁠Aerospace recently assembled a team of highly skilled scientists and engineers who play a critical role in addressing national and global disruptions in GPS and other radio frequency spectrums.⁠

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our ⁠media kit⁠. Contact us at ⁠space@n2k.com⁠ to request more info.

Want to join us for an interview?

Please send your pitch to ⁠space-editor@n2k.com⁠ and include your name, affiliation, and topic proposal.

T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 04 Jul 2025 07:00:00 -0000</pubDate>
      <itunes:title> Turning data into decisions.  [Deep Space]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>104</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ff198558-576a-11f0-8508-2b427b1575b9/image/f4a19856889e7eaf272b3ef70e511b88.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore from our T-Minus Space Daily segment Deep Space. 

Parker Wishik⁠ from ⁠The Aerospace Corporation⁠ explores how experts are turning data into decisions in the space industry on the latest Nexus segment. Parker is joined by⁠ Jackie Barbieri⁠, Founder and CEO of ⁠Whitespace⁠, and Dr. Steve Lewis, Leader of The Aerospace Corporations’s ⁠SPEAR team⁠.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Be sure to follow T-Minus on ⁠LinkedIn⁠ and ⁠Instagram⁠.



Selected Reading

⁠Aerospace Advances Massless Payloads for Space Missions⁠ 

⁠Aerospace Experts Are Turning Data into Decisions⁠

⁠Aerospace recently assembled a team of highly skilled scientists and engineers who play a critical role in addressing national and global disruptions in GPS and other radio frequency spectrums.⁠

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our ⁠media kit⁠. Contact us at ⁠space@n2k.com⁠ to request more info.

Want to join us for an interview?

Please send your pitch to ⁠space-editor@n2k.com⁠ and include your name, affiliation, and topic proposal.

T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore from our <a href="https://space.n2k.com/podcasts/t-minus">T-Minus Space Daily</a> segment Deep Space. </p>
<p><a href="https://www.linkedin.com/in/parkerwishik/"><u>Parker Wishik</u>⁠</a> from <a href="https://aerospace.org/">⁠<u>The Aerospace Corporation</u>⁠</a> explores how experts are turning data into decisions in the space industry on the latest Nexus segment. Parker is joined by<a href="https://www.linkedin.com/in/jackie-barbieri/">⁠<u> Jackie Barbieri</u>⁠</a>, Founder and CEO of <a href="https://inthewhitespace.com/">⁠<u>Whitespace</u>⁠</a>, and Dr. Steve Lewis, Leader of The Aerospace Corporations’s <a href="https://aerospace.org/article/aerospace-experts-are-turning-data-decisions">⁠<u>SPEAR team</u>⁠</a>.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Be sure to follow T-Minus on <a href="https://www.linkedin.com/company/n2k-space/">⁠<u>LinkedIn</u>⁠</a> and <a href="https://www.instagram.com/n2kspace/">⁠<u>Instagram</u>⁠</a>.</p>
<p><br></p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://aerospace.org/article/aerospace-advances-massless-payloads-space-missions">⁠<u>Aerospace Advances Massless Payloads for Space Missions</u>⁠</a> </p>
<p><a href="https://aerospace.org/article/aerospace-experts-are-turning-data-decisions">⁠<u>Aerospace Experts Are Turning Data into Decisions</u>⁠</a></p>
<p><a href="https://www.linkedin.com/posts/the-aerospace-corporation_aerospace-recently-assembled-a-team-of-highly-activity-7330956288815726592-KRND">⁠<u>Aerospace recently assembled a team of highly skilled scientists and engineers who play a critical role in addressing national and global disruptions in GPS and other radio frequency spectrums.</u>⁠</a></p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">⁠<u>media kit</u>⁠</a>. Contact us at <a href="mailto:space@n2k.com">⁠<u>space@n2k.com</u>⁠</a> to request more info.</p>
<p><strong>Want to join us for an interview?</strong></p>
<p>Please send your pitch to <a href="mailto:space-editor@n2k.com">⁠<u>space-editor@n2k.com</u>⁠</a> and include your name, affiliation, and topic proposal.</p>
<p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2867</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ff198558-576a-11f0-8508-2b427b1575b9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8339474917.mp3?updated=1751478489" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Secure Your Summer: Top Cyber Myths, Busted [Threat Vector]</title>
      <link>https://thecyberwire.com/podcasts/threat-vector/71/notes</link>
      <description>While the N2K CyberWire team is observing Independence Day in the US, we thought you'd enjoy this episode of Threat Vector from our podcast network. Listen in and bust those cyber myths.



In this episode of Threat Vector, David Moulton talks with Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance. Lisa shares insights from this year’s “Oh Behave!” report and dives into why cybersecurity habits remain unchanged—even when we know better. From password reuse to misunderstood AI risks, Lisa explains how emotion, storytelling, and system design all play a role in protecting users. Learn why secure-by-design is the future, how storytelling can reshape behavior, and why facts alone won’t change minds. This episode is a must-listen for CISOs, security leaders, and anyone working to reduce human risk at scale.

Resources:


  Kubikle: A comedy webseries about cybercriminals.

  
Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2024 


﻿Join the conversation on our social media channels:


  
Website:⁠⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠⁠


  
Threat Research:⁠⁠⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠


  
Facebook:⁠⁠⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠⁠⁠


  
LinkedIn:⁠⁠⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠⁠⁠


  
YouTube:⁠⁠⁠ ⁠⁠⁠⁠⁠⁠@paloaltonetworks⁠⁠⁠


  
Twitter:⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠⁠⁠



About Threat Vector

Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.



Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠ ⁠http://paloaltonetworks.com⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 04 Jul 2025 06:00:00 -0000</pubDate>
      <itunes:title>Secure Your Summer: Top Cyber Myths, Busted [Threat Vector]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>71</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5d93b4d2-5748-11f0-b8db-7bc5f2169471/image/bd55769c8d22f6236f6e678fc4aa36b5.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>While the N2K CyberWire team is observing Independence Day in the US, we thought you'd enjoy this episode of Threat Vector from our podcast network. Listen in and bust those cyber myths.



In this episode of Threat Vector, David Moulton talks with Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance. Lisa shares insights from this year’s “Oh Behave!” report and dives into why cybersecurity habits remain unchanged—even when we know better. From password reuse to misunderstood AI risks, Lisa explains how emotion, storytelling, and system design all play a role in protecting users. Learn why secure-by-design is the future, how storytelling can reshape behavior, and why facts alone won’t change minds. This episode is a must-listen for CISOs, security leaders, and anyone working to reduce human risk at scale.

Resources:


  Kubikle: A comedy webseries about cybercriminals.

  
Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2024 


﻿Join the conversation on our social media channels:


  
Website:⁠⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠⁠


  
Threat Research:⁠⁠⁠ ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠


  
Facebook:⁠⁠⁠ ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠⁠⁠


  
LinkedIn:⁠⁠⁠ ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠⁠⁠


  
YouTube:⁠⁠⁠ ⁠⁠⁠⁠⁠⁠@paloaltonetworks⁠⁠⁠


  
Twitter:⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠⁠⁠



About Threat Vector

Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.



Palo Alto Networks

Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.⁠⁠⁠ ⁠http://paloaltonetworks.com⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While the N2K CyberWire team is observing Independence Day in the US, we thought you'd enjoy this episode of Threat Vector from our podcast network. Listen in and bust those cyber myths.</strong></em></p>
<p><br></p>
<p>In this episode of <em>Threat Vector</em>, <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a> talks with <a href="https://www.linkedin.com/in/lisaplaggemier/">Lisa Plaggemier</a>, Executive Director of the <a href="https://www.staysafeonline.org/">National Cybersecurity Alliance</a>. Lisa shares insights from this year’s “Oh Behave!” report and dives into why cybersecurity habits remain unchanged—even when we know better. From password reuse to misunderstood AI risks, Lisa explains how emotion, storytelling, and system design all play a role in protecting users. Learn why secure-by-design is the future, how storytelling can reshape behavior, and why facts alone won’t change minds. This episode is a must-listen for CISOs, security leaders, and anyone working to reduce human risk at scale.</p>
<p><strong>Resources:</strong></p>
<ul>
  <li><a href="https://www.staysafeonline.org/kubikle"><u>Kubikle: A comedy webseries about cybercriminals.</u></a></li>
  <li>
<a href="https://www.staysafeonline.org/articles/oh-behave-the-annual-cybersecurity-attitudes-and-behaviors-report-2024"><u>Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2024</u></a> </li>
</ul>
<p><strong>﻿Join the conversation on our social media channels:</strong></p>
<ul>
  <li>
<strong>Website</strong>:<a href="https://www.paloaltonetworks.com/unit42">⁠⁠⁠ ⁠⁠⁠⁠https://www.paloaltonetworks.com/⁠⁠⁠</a>
</li>
  <li>
<strong>Threat Research:</strong><a href="https://unit42.paloaltonetworks.com/">⁠⁠⁠<strong> </strong>⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠⁠⁠⁠</a>
</li>
  <li>
<strong>Facebook:</strong><a href="https://www.facebook.com/LifeatPaloAltoNetworks/">⁠⁠⁠<strong> </strong>⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠⁠⁠⁠</a>
</li>
  <li>
<strong>LinkedIn:</strong><a href="https://www.linkedin.com/company/unit42/">⁠⁠⁠<strong> </strong>⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠⁠⁠⁠</a>
</li>
  <li>
<strong>YouTube:</strong><a href="https://www.youtube.com/channel/UCvJQO11qoCHYwZ4Ah4Jf-Tw">⁠⁠⁠<u><strong> </strong></u>⁠⁠⁠</a><a href="https://www.youtube.com/paloaltonetworks">⁠⁠⁠@paloaltonetworks⁠⁠⁠</a>
</li>
  <li>
<strong>Twitter:</strong><a href="https://twitter.com/PaloAltoNtwks">⁠⁠⁠<strong> </strong>⁠⁠⁠⁠⁠⁠⁠</a><a href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0">⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠⁠⁠⁠</a>
</li>
</ul>
<p><strong>About Threat Vector</strong></p>
<p>Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.</p>
<p>The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.</p>
<p>Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.</p>
<p><br></p>
<p><strong>Palo Alto Networks</strong></p>
<p>Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.<a href="http://paloaltonetworks.com/">⁠⁠⁠ ⁠http://paloaltonetworks.com⁠</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2280</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5d93b4d2-5748-11f0-b8db-7bc5f2169471]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8247935419.mp3?updated=1748987027" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The bug that let anyone in.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2342/notes</link>
      <description>Sudo patch your Linux systems. Cisco has removed a critical backdoor account that gave remote attackers root privileges. The Hunters International ransomware group rebrands and closes up shop. The Centers for Medicare and Medicaid Services (CMS) notifies 103,000 people that their personal data was compromised. NimDoor is a sophisticated North Korean cyber campaign targeting macOS. Researchers uncover a massive phishing campaign using thousands of fake retail websites. The FBI’s top cyber official says Salt Typhoon is largely contained. Microsoft tells customers to ignore Windows Firewall error warnings. A California jury orders Google to pay $314 million for collecting Android user data without consent. Ben Yelin shares insights from this year’s Supreme Court session. Ransomware negotiations with a side of side hustle.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today our guest is Ben Yelin from UMD CHHS, who is sharing a wrap up of this year’s Supreme Court session. If you want to hear more from Ben, head on over to the Caveat podcast, where he is co-host with Dave as they discuss all things law and privacy. 

Selected Reading

Linux Users Urged to Patch Critical Sudo CVE (Infosecurity Magazine)

Cisco warns that Unified CM has hardcoded root SSH credentials (Bleeping Computer)

Hunters International ransomware shuts down after World Leaks rebrand (Bleeping Computer)

Feds Notify 103,000 Medicare Beneficiaries of Scam, Breach (Data Breach Today)

N Korean Hackers Drop NimDoor macOS Malware Via Fake Zoom Updates (Hackread)

China-linked hackers spoof big-name brand websites to steal shoppers' payment info (The Record)

Top FBI cyber official: Salt Typhoon ‘largely contained’ in telecom networks (CyberScoop)

Microsoft asks users to ignore Windows Firewall config errors (Bleeping Computer)

California jury orders Google to pay $314 million over data transfers from Android phones (The Record)

US Probes Whether Negotiator Took Slice of Hacker Payments (Bloomberg)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 03 Jul 2025 20:10:00 -0000</pubDate>
      <itunes:title>The bug that let anyone in.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2342</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Sudo patch your Linux systems. Cisco has removed a critical backdoor account that gave remote attackers root privileges. The Hunters International ransomware group rebrands and closes up shop. The Centers for Medicare and Medicaid Services (CMS) notifies 103,000 people that their personal data was compromised. NimDoor is a sophisticated North Korean cyber campaign targeting macOS. Researchers uncover a massive phishing campaign using thousands of fake retail websites. The FBI’s top cyber official says Salt Typhoon is largely contained. Microsoft tells customers to ignore Windows Firewall error warnings. A California jury orders Google to pay $314 million for collecting Android user data without consent. Ben Yelin shares insights from this year’s Supreme Court session. Ransomware negotiations with a side of side hustle.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today our guest is Ben Yelin from UMD CHHS, who is sharing a wrap up of this year’s Supreme Court session. If you want to hear more from Ben, head on over to the Caveat podcast, where he is co-host with Dave as they discuss all things law and privacy. 

Selected Reading

Linux Users Urged to Patch Critical Sudo CVE (Infosecurity Magazine)

Cisco warns that Unified CM has hardcoded root SSH credentials (Bleeping Computer)

Hunters International ransomware shuts down after World Leaks rebrand (Bleeping Computer)

Feds Notify 103,000 Medicare Beneficiaries of Scam, Breach (Data Breach Today)

N Korean Hackers Drop NimDoor macOS Malware Via Fake Zoom Updates (Hackread)

China-linked hackers spoof big-name brand websites to steal shoppers' payment info (The Record)

Top FBI cyber official: Salt Typhoon ‘largely contained’ in telecom networks (CyberScoop)

Microsoft asks users to ignore Windows Firewall config errors (Bleeping Computer)

California jury orders Google to pay $314 million over data transfers from Android phones (The Record)

US Probes Whether Negotiator Took Slice of Hacker Payments (Bloomberg)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sudo patch your Linux systems. Cisco has removed a critical backdoor account that gave remote attackers root privileges. The Hunters International ransomware group rebrands and closes up shop. The Centers for Medicare and Medicaid Services (CMS) notifies 103,000 people that their personal data was compromised. NimDoor is a sophisticated North Korean cyber campaign targeting macOS. Researchers uncover a massive phishing campaign using thousands of fake retail websites. The FBI’s top cyber official says Salt Typhoon is largely contained. Microsoft tells customers to ignore Windows Firewall error warnings. A California jury orders Google to pay $314 million for collecting Android user data without consent. Ben Yelin shares insights from this year’s Supreme Court session. Ransomware negotiations with a side of side hustle.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today our guest is <a href="https://www.linkedin.com/in/benjamin-yelin-5b14114b/"><u>Ben Yelin</u></a> from UMD <a href="https://www.linkedin.com/company/university-of-maryland-center-for-health-and-homeland-security/"><u>CHHS</u></a>, who is sharing a wrap up of this year’s Supreme Court session. If you want to hear more from Ben, head on over to the <a href="https://thecyberwire.com/podcasts/caveat"><u>Caveat</u></a> podcast, where he is co-host with Dave as they discuss all things law and privacy. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.infosecurity-magazine.com/news/linux-users-urged-to-patch/"><u>Linux Users Urged to Patch Critical Sudo CVE</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisco-removes-unified-cm-callManager-backdoor-root-account/"><u>Cisco warns that Unified CM has hardcoded root SSH credentials</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/hunters-international-ransomware-shuts-down-after-world-leaks-rebrand/"><u>Hunters International ransomware shuts down after World Leaks rebrand</u></a> (Bleeping Computer)</p>
<p><a href="https://www.databreachtoday.com/feds-notify-103000-medicare-beneficiaries-scam-breach-a-28882"><u>Feds Notify 103,000 Medicare Beneficiaries of Scam, Breach</u></a> (Data Breach Today)</p>
<p><a href="https://hackread.com/n-korean-hackers-nimdoor-macos-malware-fake-zoom-updates/"><u>N Korean Hackers Drop NimDoor macOS Malware Via Fake Zoom Updates</u></a> (Hackread)</p>
<p><a href="https://therecord.media/china-linked-hackers-website-phishing"><u>China-linked hackers spoof big-name brand websites to steal shoppers' payment info</u></a> (The Record)</p>
<p><a href="https://cyberscoop.com/top-fbi-cyber-official-salt-typhoon-largely-contained-in-telecom-networks/"><u>Top FBI cyber official: Salt Typhoon ‘largely contained’ in telecom networks</u></a> (CyberScoop)</p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-asks-users-to-ignore-windows-firewall-config-errors/"><u>Microsoft asks users to ignore Windows Firewall config errors</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/google-lawsuit-data-collection-android-cellular"><u>California jury orders Google to pay $314 million over data transfers from Android phones</u></a> (The Record)</p>
<p><br><a href="https://www.bloomberg.com/news/articles/2025-07-02/us-probes-ex-ransom-negotiator-accused-of-scheming-with-hackers"><u>US Probes Whether Negotiator Took Slice of Hacker Payments</u></a> (Bloomberg)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1615</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c5a2178e-1c7a-11f0-85e0-636a5a48d327]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4986890528.mp3?updated=1751566717" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Houken blends stealth and chaos.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2341/notes</link>
      <description>French authorities report multiple entities targeted by access brokers. A ransomware group extorts a German hunger charity. AT&amp;T combats SIM swapping and account takeover attacks. A Missouri physician group suffers a cyber attack. Qantas doesn’t crash, but their computers do. Researchers uncover multiple critical vulnerabilities in Agorum Core Open. A student loan administrator in Virginia gets hit by the Akira ransomware group. The Feds sanction a Russian bulletproof hosting service. Johnson Controls notifies individuals of a major ransomware attack dating back to 2023. Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst shares the latest technology workforce trends. The ICEBlock app warms up to users.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest is Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst, sharing the latest workforce technology trends. Will recently appeared on our CISO Perspectives podcast with host Kim Jones in the “What’s the “correct” path for entering cyber?” episode. If you are not already an N2K Pro member, you can learn more about that here. 

Got cybersecurity, IT, or project management certification goals?

For the past 25 years, N2K's practice tests have helped more than half a million professionals reach certification success. Grow your career and reach your goals faster with N2K’s full exam prep of practice tests, labs, and training courses for Microsoft, CompTIA, PMI, Amazon, and more at n2k.com/certify.

Selected Reading

French cybersecurity agency confirms government affected by Ivanti hacks (The Record)

Ransomware gang attacks German charity that feeds starving children (The Record)

AT&amp;T deploys new account lock feature to counter SIM swapping (CyberScoop)

Cyberattack in Missouri healthcare provider Esse Health exposes data of over 263,000 patients (Beyond Machines)

Australia's Qantas says 6 million customer accounts accessed in cyber hack (Reuters)

Security Advisories on Agorum Core Open (usd)

Virginia student loan administrator Southwood Financial hit by ransomware attack (Beyond Machines)

Russian bulletproof hosting service Aeza Group sanctioned by US for ransomware work (The Record)

Johnson Controls starts notifying people affected by 2023 breach (Bleeping Computers)

ICEBlock, an app for anonymously reporting ICE sightings, goes viral overnight after Bondi criticism (TechCrunch) 

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 02 Jul 2025 20:10:00 -0000</pubDate>
      <itunes:title>Houken blends stealth and chaos.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2341</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>French authorities report multiple entities targeted by access brokers. A ransomware group extorts a German hunger charity. AT&amp;T combats SIM swapping and account takeover attacks. A Missouri physician group suffers a cyber attack. Qantas doesn’t crash, but their computers do. Researchers uncover multiple critical vulnerabilities in Agorum Core Open. A student loan administrator in Virginia gets hit by the Akira ransomware group. The Feds sanction a Russian bulletproof hosting service. Johnson Controls notifies individuals of a major ransomware attack dating back to 2023. Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst shares the latest technology workforce trends. The ICEBlock app warms up to users.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest is Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst, sharing the latest workforce technology trends. Will recently appeared on our CISO Perspectives podcast with host Kim Jones in the “What’s the “correct” path for entering cyber?” episode. If you are not already an N2K Pro member, you can learn more about that here. 

Got cybersecurity, IT, or project management certification goals?

For the past 25 years, N2K's practice tests have helped more than half a million professionals reach certification success. Grow your career and reach your goals faster with N2K’s full exam prep of practice tests, labs, and training courses for Microsoft, CompTIA, PMI, Amazon, and more at n2k.com/certify.

Selected Reading

French cybersecurity agency confirms government affected by Ivanti hacks (The Record)

Ransomware gang attacks German charity that feeds starving children (The Record)

AT&amp;T deploys new account lock feature to counter SIM swapping (CyberScoop)

Cyberattack in Missouri healthcare provider Esse Health exposes data of over 263,000 patients (Beyond Machines)

Australia's Qantas says 6 million customer accounts accessed in cyber hack (Reuters)

Security Advisories on Agorum Core Open (usd)

Virginia student loan administrator Southwood Financial hit by ransomware attack (Beyond Machines)

Russian bulletproof hosting service Aeza Group sanctioned by US for ransomware work (The Record)

Johnson Controls starts notifying people affected by 2023 breach (Bleeping Computers)

ICEBlock, an app for anonymously reporting ICE sightings, goes viral overnight after Bondi criticism (TechCrunch) 

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>French authorities report multiple entities targeted by access brokers. A ransomware group extorts a German hunger charity. AT&amp;T combats SIM swapping and account takeover attacks. A Missouri physician group suffers a cyber attack. Qantas doesn’t crash, but their computers do. Researchers uncover multiple critical vulnerabilities in Agorum Core Open. A student loan administrator in Virginia gets hit by the Akira ransomware group. The Feds sanction a Russian bulletproof hosting service. Johnson Controls notifies individuals of a major ransomware attack dating back to 2023. Will Markow, CEO of FourOne Insights and N2K CyberWire Senior Workforce Analyst shares the latest technology workforce trends. The ICEBlock app warms up to users.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Our guest is <a href="https://www.linkedin.com/in/will-markow/"><u>Will Markow</u></a>, CEO of <a href="https://www.linkedin.com/company/fourone-insights/"><u>FourOne Insights</u></a> and N2K CyberWire Senior Workforce Analyst, sharing the latest workforce technology trends. Will recently appeared on our <a href="https://thecyberwire.com/podcasts/cso-perspectives"><u>CISO Perspectives</u></a> podcast with host <a href="https://www.linkedin.com/in/kimjones-cism/"><u>Kim Jones</u></a> in the “<a href="https://thecyberwire.com/podcasts/cso-perspectives/131/notes"><u>What’s the “correct” path for entering cyber?</u></a>” episode. If you are not already an N2K Pro member, you can learn more about that <a href="https://thecyberwire.com/pro"><u>here</u></a>. </p>
<p><strong>Got cybersecurity, IT, or project management certification goals?</strong></p>
<p>For the past 25 years, N2K's practice tests have helped more than half a million professionals reach certification success. Grow your career and reach your goals faster with N2K’s full exam prep of practice tests, labs, and training courses for Microsoft, CompTIA, PMI, Amazon, and more at <a href="http://n2k.com/certify"><u>n2k.com/certify</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/france-anssi-report-ivanti-bugs-exploited"><u>French cybersecurity agency confirms government affected by Ivanti hacks</u></a> (The Record)</p>
<p><a href="https://therecord.media/welthungerhilfe-german-hunger-relief-charity-ransomware-attack"><u>Ransomware gang attacks German charity that feeds starving children</u></a> (The Record)</p>
<p><a href="https://cyberscoop.com/att-wireless-account-lock-sim-swapping-protection/"><u>AT&amp;T deploys new account lock feature to counter SIM swapping</u></a> (CyberScoop)</p>
<p><a href="https://beyondmachines.net/event_details/cyberattack-in-missouri-healthcare-provider-esse-health-exposes-data-of-over-263000-patients-f-8-g-0-x/gD2P6Ple2L"><u>Cyberattack in Missouri healthcare provider Esse Health exposes data of over 263,000 patients</u></a> (Beyond Machines)</p>
<p><a href="https://www.reuters.com/world/asia-pacific/australias-qantas-confirms-cyber-incident-one-its-contact-centres-2025-07-01/"><u>Australia's Qantas says 6 million customer accounts accessed in cyber hack</u></a> (Reuters)</p>
<p><a href="https://www.usd.de/en/security-advisories-on-agorum-core-open/"><u>Security Advisories on Agorum Core Open</u></a> (usd)</p>
<p><a href="https://beyondmachines.net/event_details/virginia-student-loan-administrator-southwood-financial-hit-by-ransomware-attack-d-7-i-8-f/gD2P6Ple2L"><u>Virginia student loan administrator Southwood Financial hit by ransomware attack</u></a> (Beyond Machines)</p>
<p><a href="https://therecord.media/russia-bulletproof-hosting-aeza-group-us-sanctions"><u>Russian bulletproof hosting service Aeza Group sanctioned by US for ransomware work</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/johnson-controls-starts-notifying-people-affected-by-2023-breach/"><u>Johnson Controls starts notifying people affected by 2023 breach</u></a> (Bleeping Computers)</p>
<p><a href="https://techcrunch.com/2025/07/01/iceblock-an-app-for-anonymously-reporting-ice-sightings-goes-viral-overnight-after-bondi-criticism/"><u>ICEBlock, an app for anonymously reporting ICE sightings, goes viral overnight after Bondi criticism</u></a> (TechCrunch) </p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1970</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c5780e94-1c7a-11f0-85e0-2f0727fda849]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5027685884.mp3?updated=1751510042" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>North Korea’s covert coders caught.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2340/notes</link>
      <description>The Feds shut down a covert North Korean IT operation. Google releases an emergency update to fix a new Chrome zero-day. A major U.S. trade show and event marketing firm suffers a data breach. NetScaler patches a pair of critical vulnerabilities. A sophisticated cyber attack targets The Hague. An Iran-linked hacking group threatens to release emails allegedly stolen from aides to President Trump. A ransomware attack exposes sensitive data linked to multiple Swiss federal government offices. The U.S. Treasury Department faces scrutiny after a string of cyberattacks. The FBI’s phone security tips draw fire from Senator Wyden. Tim Starks from CyberScoop describes how ubiquitous surveillance turned deadly. AI proves its pentesting prowess.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

We are joined today by Tim Starks, Senior Reporter from CyberScoop, discussing his story "Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report."

Selected Reading

US government takes down major North Korean 'remote IT workers' operation (TechCrunch)

Google fixes fourth actively exploited Chrome zero-day of 2025 (Bleeping Computer)

NetScaler Critical Security Updates for CVE-2025-6543 and CVE-2025-5777 (NetScaler)

International Criminal Court hit with cyber security attack (AP News)

Iran-linked hackers threaten to release Trump aides' emails (Reuters)

Swiss government data compromised in ransomware attack on health foundation Radix (Beyond Machines)

Trade show management firm Nth Degree hit by data breach, exposing sensitive data (Beyond Machines)

A Trio of US Treasury Hacks Exposes a Pattern Making Banks Nervous (Bloomberg)

Senator Chides FBI for Weak Advice on Mobile Security (Krebs on Security)

The top red teamer in the US is an AI bot (CSO Online)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Jul 2025 20:10:00 -0000</pubDate>
      <itunes:title>North Korea’s covert coders caught.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2340</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The Feds shut down a covert North Korean IT operation. Google releases an emergency update to fix a new Chrome zero-day. A major U.S. trade show and event marketing firm suffers a data breach. NetScaler patches a pair of critical vulnerabilities. A sophisticated cyber attack targets The Hague. An Iran-linked hacking group threatens to release emails allegedly stolen from aides to President Trump. A ransomware attack exposes sensitive data linked to multiple Swiss federal government offices. The U.S. Treasury Department faces scrutiny after a string of cyberattacks. The FBI’s phone security tips draw fire from Senator Wyden. Tim Starks from CyberScoop describes how ubiquitous surveillance turned deadly. AI proves its pentesting prowess.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

We are joined today by Tim Starks, Senior Reporter from CyberScoop, discussing his story "Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report."

Selected Reading

US government takes down major North Korean 'remote IT workers' operation (TechCrunch)

Google fixes fourth actively exploited Chrome zero-day of 2025 (Bleeping Computer)

NetScaler Critical Security Updates for CVE-2025-6543 and CVE-2025-5777 (NetScaler)

International Criminal Court hit with cyber security attack (AP News)

Iran-linked hackers threaten to release Trump aides' emails (Reuters)

Swiss government data compromised in ransomware attack on health foundation Radix (Beyond Machines)

Trade show management firm Nth Degree hit by data breach, exposing sensitive data (Beyond Machines)

A Trio of US Treasury Hacks Exposes a Pattern Making Banks Nervous (Bloomberg)

Senator Chides FBI for Weak Advice on Mobile Security (Krebs on Security)

The top red teamer in the US is an AI bot (CSO Online)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Feds shut down a covert North Korean IT operation. Google releases an emergency update to fix a new Chrome zero-day. A major U.S. trade show and event marketing firm suffers a data breach. NetScaler patches a pair of critical vulnerabilities. A sophisticated cyber attack targets The Hague. An Iran-linked hacking group threatens to release emails allegedly stolen from aides to President Trump. A ransomware attack exposes sensitive data linked to multiple Swiss federal government offices. The U.S. Treasury Department faces scrutiny after a string of cyberattacks. The FBI’s phone security tips draw fire from Senator Wyden. Tim Starks from CyberScoop describes how ubiquitous surveillance turned deadly. AI proves its pentesting prowess.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>We are joined today by <a href="https://www.linkedin.com/in/tstarks/"><u>Tim Starks</u></a>, Senior Reporter from <a href="https://cyberscoop.com/"><u>CyberScoop</u></a>, discussing his story "<a href="https://cyberscoop.com/hacker-helped-kill-fbi-sources-witnesses-in-el-chapo-case-according-to-watchdog-report/"><u>Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report</u></a>."</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://techcrunch.com/2025/06/30/us-government-takes-down-major-north-korean-remote-it-workers-operation/"><u>US government takes down major North Korean 'remote IT workers' operation</u></a> (TechCrunch)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/google-fixes-fourth-actively-exploited-chrome-zero-day-of-2025/"><u>Google fixes fourth actively exploited Chrome zero-day of 2025</u></a> (Bleeping Computer)</p>
<p><a href="https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/"><u>NetScaler Critical Security Updates for CVE-2025-6543 and CVE-2025-5777</u></a> (NetScaler)</p>
<p><a href="https://apnews.com/article/international-court-cyberattack-hague-netherlands-50ac8b2f53928fc1f05163c67b09c4bf"><u>International Criminal Court hit with cyber security attack</u></a> (AP News)</p>
<p><a href="https://www.reuters.com/legal/government/iran-linked-hackers-threaten-release-trump-aides-emails-2025-06-30/"><u>Iran-linked hackers threaten to release Trump aides' emails</u></a> (Reuters)</p>
<p><a href="https://beyondmachines.net/event_details/swiss-government-data-compromised-in-ransomware-attack-on-health-foundation-radix-5-f-q-5-o/gD2P6Ple2L"><u>Swiss government data compromised in ransomware attack on health foundation Radix</u></a> (Beyond Machines)</p>
<p><a href="https://beyondmachines.net/event_details/trade-show-management-firm-nth-degree-hit-by-data-breach-exposing-sensitive-data-g-3-1-w-7/gD2P6Ple2L"><u>Trade show management firm Nth Degree hit by data breach, exposing sensitive data</u></a> (Beyond Machines)</p>
<p><a href="https://www.bloomberg.com/news/features/2025-06-30/us-treasury-hacks-exposes-pattern-of-federal-security-missteps-report-finds"><u>A Trio of US Treasury Hacks Exposes a Pattern Making Banks Nervous</u></a> (Bloomberg)</p>
<p><a href="https://krebsonsecurity.com/2025/06/senator-chides-fbi-for-weak-advice-on-mobile-security/"><u>Senator Chides FBI for Weak Advice on Mobile Security</u></a> (Krebs on Security)</p>
<p><a href="https://www.csoonline.com/article/4012801/the-top-red-teamer-in-the-us-is-an-ai-bot.html"><u>The top red teamer in the US is an AI bot</u></a> (CSO Online)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1481</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c55035ea-1c7a-11f0-85e0-833b8516280b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6349175317.mp3?updated=1751393221" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>U.S. braces for Iranian cyber intrusions.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2339/notes</link>
      <description>CISA warns organizations of potential cyber threats from Iranian state-sponsored actors.Scattered Spider targets aviation and transportation. Workforce cuts at the State Department raise concerns about weakened cyber diplomacy. Canada bans Chinese security camera vendor Hikvision over national security concerns.Cisco Talos reports a rise in cybercriminals abusing Large Language Models. MacOS malware Poseidon Stealer rebrands.Researchers discover multiple vulnerabilities in Bluetooth chips used in headphones and earbuds. The FDA issues new guidance on medical device cybersecurity. Our guest is  Debbie Gordon, Co-Founder of Cloud Range, looking “Beyond the Stack - Why Cyber Readiness Starts with People.” An IT worker’s revenge plan backfires.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices segment, Debbie Gordon, Co-Founder of Cloud Range, shares insights on looking “Beyond the Stack - Why Cyber Readiness Starts with People.” Learn more about what Debbie discusses in Cloud Range’s blog: Bolstering Your Human Security Posture.  You can hear Debbie's full conversation here.

Selected Reading

CISA and Partners Urge Critical Infrastructure to Stay Vigilant in the Current Geopolitical Environment (CISA)

Joint Statement from CISA, FBI, DC3 and NSA on Potential Targeted Cyber Activity Against U.S. Critical Infrastructure by Iran (CISA, FBI, DOD Cyber Crime Center, NSA) 

Prolific cybercriminal group now targeting aviation, transportation companies (Axios)

U.S. Cyber Diplomacy at Risk Amid State Department Shakeup (GovInfo Security)

Canada Bans Chinese CCTV Vendor Hikvision Over National Security Concerns (Infosecurity Magazine)

Malicious AI Models Are Behind a New Wave of Cybercrime, Cisco Talos (Hackread)

MacOS malware Poseidon Stealer rebranded as Odyssey Stealer (SC Media)

Airoha Chip Vulnerabilities Expose Headphones to Takeover (SecurityWeek)

FDA Expands Premarket Medical Device Cyber Guidance (GovInfo Security)

'Disgruntled' British IT worker jailed for hacking employer after being suspended (The Record)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 30 Jun 2025 20:10:00 -0000</pubDate>
      <itunes:title>U.S. braces for Iranian cyber intrusions.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2339</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA warns organizations of potential cyber threats from Iranian state-sponsored actors.Scattered Spider targets aviation and transportation. Workforce cuts at the State Department raise concerns about weakened cyber diplomacy. Canada bans Chinese security camera vendor Hikvision over national security concerns.Cisco Talos reports a rise in cybercriminals abusing Large Language Models. MacOS malware Poseidon Stealer rebrands.Researchers discover multiple vulnerabilities in Bluetooth chips used in headphones and earbuds. The FDA issues new guidance on medical device cybersecurity. Our guest is  Debbie Gordon, Co-Founder of Cloud Range, looking “Beyond the Stack - Why Cyber Readiness Starts with People.” An IT worker’s revenge plan backfires.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices segment, Debbie Gordon, Co-Founder of Cloud Range, shares insights on looking “Beyond the Stack - Why Cyber Readiness Starts with People.” Learn more about what Debbie discusses in Cloud Range’s blog: Bolstering Your Human Security Posture.  You can hear Debbie's full conversation here.

Selected Reading

CISA and Partners Urge Critical Infrastructure to Stay Vigilant in the Current Geopolitical Environment (CISA)

Joint Statement from CISA, FBI, DC3 and NSA on Potential Targeted Cyber Activity Against U.S. Critical Infrastructure by Iran (CISA, FBI, DOD Cyber Crime Center, NSA) 

Prolific cybercriminal group now targeting aviation, transportation companies (Axios)

U.S. Cyber Diplomacy at Risk Amid State Department Shakeup (GovInfo Security)

Canada Bans Chinese CCTV Vendor Hikvision Over National Security Concerns (Infosecurity Magazine)

Malicious AI Models Are Behind a New Wave of Cybercrime, Cisco Talos (Hackread)

MacOS malware Poseidon Stealer rebranded as Odyssey Stealer (SC Media)

Airoha Chip Vulnerabilities Expose Headphones to Takeover (SecurityWeek)

FDA Expands Premarket Medical Device Cyber Guidance (GovInfo Security)

'Disgruntled' British IT worker jailed for hacking employer after being suspended (The Record)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA warns organizations of potential cyber threats from Iranian state-sponsored actors.Scattered Spider targets aviation and transportation. Workforce cuts at the State Department raise concerns about weakened cyber diplomacy. Canada bans Chinese security camera vendor Hikvision over national security concerns.Cisco Talos reports a rise in cybercriminals abusing Large Language Models. MacOS malware Poseidon Stealer rebrands.Researchers discover multiple vulnerabilities in Bluetooth chips used in headphones and earbuds. The FDA issues new guidance on medical device cybersecurity. Our guest is  Debbie Gordon, Co-Founder of Cloud Range, looking “Beyond the Stack - Why Cyber Readiness Starts with People.” An IT worker’s revenge plan backfires.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On today’s Industry Voices segment, <a href="https://www.linkedin.com/in/degordon/"><u>Debbie Gordon</u></a>, Co-Founder of <a href="https://www.cloudrangecyber.com/"><u>Cloud Range</u></a>, shares insights on looking “Beyond the Stack - Why Cyber Readiness Starts with People.” Learn more about what Debbie discusses in Cloud Range’s blog: <a href="https://www.cloudrangecyber.com/news/bolstering-your-human-security-posture?rq=human"><u>Bolstering Your Human Security Posture</u></a>.  You can hear Debbie's full conversation <a href="https://explore.thecyberwire.com/debbie-gordon">here.</a></p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.cisa.gov/news-events/alerts/2025/06/30/cisa-and-partners-urge-critical-infrastructure-stay-vigilant-current-geopolitical-environment"><u>CISA and Partners Urge Critical Infrastructure to Stay Vigilant in the Current Geopolitical Environment</u></a> (CISA)</p>
<p><a href="https://www.cisa.gov/"><u>Joint Statement from CISA, FBI, DC3 and NSA on Potential Targeted Cyber Activity Against U.S. Critical Infrastructure by Iran</u></a> (CISA, FBI, DOD Cyber Crime Center, NSA) </p>
<p><a href="https://www.axios.com/2025/06/27/aviation-transportation-sector-cyberattacks-scattered-spider"><u>Prolific cybercriminal group now targeting aviation, transportation companies</u></a> (Axios)</p>
<p><a href="https://www.govinfosecurity.com/us-cyber-diplomacy-at-risk-amid-state-department-shakeup-a-28854"><u>U.S. Cyber Diplomacy at Risk Amid State Department Shakeup</u></a> (GovInfo Security)</p>
<p><a href="https://www.infosecurity-magazine.com/news/canada-bans-chinese-cctv-hikvision/"><u>Canada Bans Chinese CCTV Vendor Hikvision Over National Security Concerns</u></a> (Infosecurity Magazine)</p>
<p><a href="https://hackread.com/malicious-ai-models-wave-of-cybercrime-cisco-talos/"><u>Malicious AI Models Are Behind a New Wave of Cybercrime, Cisco Talos</u></a> (Hackread)</p>
<p><a href="https://www.scworld.com/news/macos-malware-poseidon-stealer-rebranded-as-odyssey-stealer"><u>MacOS malware Poseidon Stealer rebranded as Odyssey Stealer</u></a> (SC Media)</p>
<p><a href="https://www.securityweek.com/airoha-chip-vulnerabilities-expose-headphones-to-takeover/"><u>Airoha Chip Vulnerabilities Expose Headphones to Takeover</u></a> (SecurityWeek)</p>
<p><a href="https://www.govinfosecurity.com/fda-expands-premarket-medical-device-cyber-guidance-a-28850"><u>FDA Expands Premarket Medical Device Cyber Guidance</u></a> (GovInfo Security)</p>
<p><a href="https://therecord.media/uk-it-worker-jailed-hacking-former-employer"><u>'Disgruntled' British IT worker jailed for hacking employer after being suspended</u></a> (The Record)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2056</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c52556ea-1c7a-11f0-85e0-a799fa3777fb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8218313322.mp3?updated=1751384642" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jamil Jaffer: You should run towards risk. [Strategy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/74/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Senior Vice President for Strategy, Partnerships, and Corporate Development at IronNet Cybersecurity, Jamil Jaffer, shares how his interest in technology brought him full circle. Always a tech guy, Jamil paid he way through college doing computer support. Jamil went to law school and worked in various jobs in Washington DC including a stint in the newly-created National Security division of the Justice Department just after 9/11. When talking about adversity, Jamil notes, "Adversity has happened in life, but you gotta run at those things. To me, you know, I like risk. I think risk is something that a lot of people shy away from." We thank Jamil for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 29 Jun 2025 07:00:00 -0000</pubDate>
      <itunes:title>Jamil Jaffer: You should run towards risk. [Strategy] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>74</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/fe1cc2d0-5370-11f0-a78c-3b284cd84aeb/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Senior Vice President for Strategy, Partnerships, and Corporate Development at IronNet Cybersecurity, Jamil Jaffer, shares how his interest in technology brought him full circle. Always a tech guy, Jamil paid he way through college doing computer support. Jamil went to law school and worked in various jobs in Washington DC including a stint in the newly-created National Security division of the Justice Department just after 9/11. When talking about adversity, Jamil notes, "Adversity has happened in life, but you gotta run at those things. To me, you know, I like risk. I think risk is something that a lot of people shy away from." We thank Jamil for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Senior Vice President for Strategy, Partnerships, and Corporate Development at IronNet Cybersecurity, Jamil Jaffer, shares how his interest in technology brought him full circle. Always a tech guy, Jamil paid he way through college doing computer support. Jamil went to law school and worked in various jobs in Washington DC including a stint in the newly-created National Security division of the Justice Department just after 9/11. When talking about adversity, Jamil notes, "Adversity has happened in life, but you gotta run at those things. To me, you know, I like risk. I think risk is something that a lot of people shy away from." We thank Jamil for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>481</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fe1cc2d0-5370-11f0-a78c-3b284cd84aeb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3562909647.mp3?updated=1751040394" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A tale of two botnets. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/383/notes</link>
      <description>This week we are joined by Kyle Lefton, Security Researcher from Akamai, who is diving into their work on "Two Botnets, One Flaw - Mirai Spreads Through Wazuh Vulnerability." Akamai researchers have observed active exploitation of CVE-2025-24016, a critical RCE vulnerability in Wazuh, by two Mirai-based botnets. 

The campaigns highlight how quickly attackers are adapting proof-of-concept exploits to spread malware, underscoring the urgency of patching vulnerable systems. One botnet appears to target Italian-speaking users, suggesting regionally tailored operations.

The research can be found here:


  
⁠Two Botnets, One Flaw: Mirai Spreads Through Wazuh Vulnerability



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Jun 2025 07:00:00 -0000</pubDate>
      <itunes:title>A tale of two botnets. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>383</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/67ae10fa-536c-11f0-a1b7-6fe597932625/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by Kyle Lefton, Security Researcher from Akamai, who is diving into their work on "Two Botnets, One Flaw - Mirai Spreads Through Wazuh Vulnerability." Akamai researchers have observed active exploitation of CVE-2025-24016, a critical RCE vulnerability in Wazuh, by two Mirai-based botnets. 

The campaigns highlight how quickly attackers are adapting proof-of-concept exploits to spread malware, underscoring the urgency of patching vulnerable systems. One botnet appears to target Italian-speaking users, suggesting regionally tailored operations.

The research can be found here:


  
⁠Two Botnets, One Flaw: Mirai Spreads Through Wazuh Vulnerability



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by <a href="https://www.linkedin.com/in/kyle-lefton-72774b219/">Kyle Lefton</a>, Security Researcher from <a href="https://www.linkedin.com/company/akamai-technologies/">Akamai</a>, who is diving into their work on "Two Botnets, One Flaw - Mirai Spreads Through Wazuh Vulnerability." Akamai researchers have observed active exploitation of CVE-2025-24016, a critical RCE vulnerability in Wazuh, by two Mirai-based botnets. </p>
<p>The campaigns highlight how quickly attackers are adapting proof-of-concept exploits to spread malware, underscoring the urgency of patching vulnerable systems. One botnet appears to target Italian-speaking users, suggesting regionally tailored operations.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://www.trendmicro.com/en_us/research/25/d/zdi-23-1527-and-zdi-23-1528-the-potential-impact-of-overly-permi.html">⁠</a><a href="https://www.akamai.com/blog/security-research/botnets-flaw-mirai-spreads-through-wazuh-vulnerability">Two Botnets, One Flaw: Mirai Spreads Through Wazuh Vulnerability</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1315</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[67ae10fa-536c-11f0-a1b7-6fe597932625]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6622918117.mp3?updated=1751291611" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Turbulence in the cloud.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2338/notes</link>
      <description>Hawaiian Airlines reports a cybersecurity incident. Microsoft updates its Windows Resiliency Initiative after the 2024 CrowdStrike crash. CitrixBleed 2 is under active exploitation in the wild. Researchers disclose a critical vulnerability in Open VSX. Malware uses prompt injection to evade AI analysis. A new report claims Cambodia turns a blind eye to scam compounds. Senators propose a ban on AI tools from foreign adversaries. An NSA veteran is named top civilian at U.S. Cyber Command. Maria Varmazis speaks with Ian Itz from Iridium Communications on allowing IoT devices to communicate directly with satellites. One Kansas City hacker’s bold marketing campaign ends with a guilty plea.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest today is Ian Itz, Executive Director at the IoT Line of Business at Iridium Communications. Ian spoke with T-Minus Space Daily host Maria Varmazis on their Deep Space weekend show about how Iridium allows IoT devices, like sensors and trackers, to communicate directly with satellites, bypassing terrestrial infrastructure. We share an excerpt of their conversation on our show today. You can listen to the full conversation on Deep Space. And, be sure to check out T-Minus Space Daily brought to you by N2K CyberWire each weekday on your favorite podcast app.

Selected Reading

Hawaiian Airlines Hit by Cybersecurity Incident (Infosecurity Magazine)

Microsoft to Preview New Windows Endpoint Security Platform After CrowdStrike Outage (SecurityWeek)

CitrixBleed 2 Vulnerability Exploited (Infosecurity Magazine)

Vulnerability Exposed All Open VSX Repositories to Takeover (SecurityWeek)

Prompt injection in malware sample targets AI code analysis tools (SC Media)

Scam compounds labeled a 'living nightmare' as Cambodian government accused of turning a blind eye (The Record)

Bipartisan bill seeks to ban federal agencies from using DeepSeek, AI tools from ‘foreign adversaries’ (The Record)

NSA’s Patrick Ware takes over as top civilian at U.S. Cyber Command (The Record)

Man Who Hacked Organizations to Advertise Security Services Pleads Guilty (SecurityWeek)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 27 Jun 2025 20:10:00 -0000</pubDate>
      <itunes:title>Turbulence in the cloud.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2338</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Hawaiian Airlines reports a cybersecurity incident. Microsoft updates its Windows Resiliency Initiative after the 2024 CrowdStrike crash. CitrixBleed 2 is under active exploitation in the wild. Researchers disclose a critical vulnerability in Open VSX. Malware uses prompt injection to evade AI analysis. A new report claims Cambodia turns a blind eye to scam compounds. Senators propose a ban on AI tools from foreign adversaries. An NSA veteran is named top civilian at U.S. Cyber Command. Maria Varmazis speaks with Ian Itz from Iridium Communications on allowing IoT devices to communicate directly with satellites. One Kansas City hacker’s bold marketing campaign ends with a guilty plea.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest today is Ian Itz, Executive Director at the IoT Line of Business at Iridium Communications. Ian spoke with T-Minus Space Daily host Maria Varmazis on their Deep Space weekend show about how Iridium allows IoT devices, like sensors and trackers, to communicate directly with satellites, bypassing terrestrial infrastructure. We share an excerpt of their conversation on our show today. You can listen to the full conversation on Deep Space. And, be sure to check out T-Minus Space Daily brought to you by N2K CyberWire each weekday on your favorite podcast app.

Selected Reading

Hawaiian Airlines Hit by Cybersecurity Incident (Infosecurity Magazine)

Microsoft to Preview New Windows Endpoint Security Platform After CrowdStrike Outage (SecurityWeek)

CitrixBleed 2 Vulnerability Exploited (Infosecurity Magazine)

Vulnerability Exposed All Open VSX Repositories to Takeover (SecurityWeek)

Prompt injection in malware sample targets AI code analysis tools (SC Media)

Scam compounds labeled a 'living nightmare' as Cambodian government accused of turning a blind eye (The Record)

Bipartisan bill seeks to ban federal agencies from using DeepSeek, AI tools from ‘foreign adversaries’ (The Record)

NSA’s Patrick Ware takes over as top civilian at U.S. Cyber Command (The Record)

Man Who Hacked Organizations to Advertise Security Services Pleads Guilty (SecurityWeek)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hawaiian Airlines reports a cybersecurity incident. Microsoft updates its Windows Resiliency Initiative after the 2024 CrowdStrike crash. CitrixBleed 2 is under active exploitation in the wild. Researchers disclose a critical vulnerability in Open VSX. Malware uses prompt injection to evade AI analysis. A new report claims Cambodia turns a blind eye to scam compounds. Senators propose a ban on AI tools from foreign adversaries. An NSA veteran is named top civilian at U.S. Cyber Command. Maria Varmazis speaks with Ian Itz from Iridium Communications on allowing IoT devices to communicate directly with satellites. One Kansas City hacker’s bold marketing campaign ends with a guilty plea.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Our guest today is <a href="https://www.linkedin.com/in/ian-itz-4b094610/"><u>Ian Itz</u></a>, Executive Director at the IoT Line of Business at <a href="https://www.iridium.com/"><u>Iridium Communications</u></a>. Ian spoke with <a href="https://space.n2k.com/podcasts/t-minus"><u>T-Minus Space Daily</u></a> host Maria Varmazis on their Deep Space weekend show about how Iridium allows IoT devices, like sensors and trackers, to communicate directly with satellites, bypassing terrestrial infrastructure. We share an excerpt of their conversation on our show today. You can listen to the full conversation on <a href="https://space.n2k.com/podcasts/t-minus/ds103"><u>Deep Space</u></a>. And, be sure to check out T-Minus Space Daily brought to you by N2K CyberWire each weekday on your favorite podcast app.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.infosecurity-magazine.com/news/hawaiian-airlines-cybersecurity/"><u>Hawaiian Airlines Hit by Cybersecurity Incident</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.securityweek.com/microsoft-to-preview-new-windows-endpoint-security-platform-after-crowdstrike-outage/"><u>Microsoft to Preview New Windows Endpoint Security Platform After CrowdStrike Outage</u></a> (SecurityWeek)</p>
<p><a href="https://www.infosecurity-magazine.com/news/citrixbleed-2-vulnerability/"><u>CitrixBleed 2 Vulnerability Exploited</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.securityweek.com/vulnerability-exposed-all-open-vsx-repositories-to-takeover/"><u>Vulnerability Exposed All Open VSX Repositories to Takeover</u></a> (SecurityWeek)</p>
<p><a href="https://www.scworld.com/brief/prompt-injection-in-malware-sample-targets-ai-code-analysis-tools"><u>Prompt injection in malware sample targets AI code analysis tools</u></a> (SC Media)</p>
<p><a href="https://therecord.media/cambodia-scam-compounds-amnesty-international-report"><u>Scam compounds labeled a 'living nightmare' as Cambodian government accused of turning a blind eye</u></a> (The Record)</p>
<p><a href="https://therecord.media/bipartisan-bill-ban-deepseek-federal"><u>Bipartisan bill seeks to ban federal agencies from using DeepSeek, AI tools from ‘foreign adversaries’</u></a> (The Record)</p>
<p><a href="https://therecord.media/patrick-ware-executive-director-us-cyber-command"><u>NSA’s Patrick Ware takes over as top civilian at U.S. Cyber Command</u></a> (The Record)</p>
<p><a href="https://www.securityweek.com/man-who-hacked-organizations-to-advertise-security-services-pleads-guilty/"><u>Man Who Hacked Organizations to Advertise Security Services Pleads Guilty</u></a> (SecurityWeek)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1873</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c4fdf1ea-1c7a-11f0-85e0-83308cfbd6aa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1758930416.mp3?updated=1751049765" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No panic—just patch.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2337/notes</link>
      <description>Patches, patches and more patches.A patient death has been linked to the 2023 ransomware attack on an NHS IT provider. U.S. authorities indict the man known online as “IntelBroker”. A suspected cyberattack disrupts Columbia University’s computer systems. A major license plate reader company restricts cross-state data access after reports revealed misuse of its network by police agencies. Our guest is Andy Boyd, former Director of CIA's Center for Cyber Intelligence (CCI) and currently an operating partner at AE Industrial Partners. Discounted parking as a gateway cybercrime. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest today joins us from this week’s Caveat podcast episode. Andy Boyd, former Director of CIA's Center for Cyber Intelligence (CCI) and currently an operating partner at AE Industrial Partners, a private equity firm focused on the national security and aerospace industries, joins Dave and co-host Ben Yelin to discuss offensive cyber and the United States government. You can listen to the full conversation here and catch new episodes of Caveat every Thursday on your favorite podcast app.

Selected Reading

Cisco reports perfect 10 critical remote code execution flaws in Identity Services Engine (ISE) (Beyond Machines) 

Citrix releases emergency patches for actively exploited vulnerability in NetScaler Products (Beyond Machines)

CISA Warns of FortiOS Hard-Coded Credentials Vulnerability Exploited in Attacks (Cyber Security News) 

CISA: AMI MegaRAC bug enabling server hijacks exploited in attacks (Bleeping Computer)

Patient's death linked to cyber attack on NHS, hospital trust says | Science, Climate &amp; Tech News (Sky News)

British Man Charged by US in ‘IntelBroker’ Company Data Hacks (Bloomberg)

French police reportedly arrest suspected BreachForums administrators (The Record)

Potential Cyberattack Scrambles Columbia University Computer Systems (The New York Times)

Flock Removes States From National Lookup Tool After ICE and Abortion Searches Revealed (404 Media)

Student allegedly hacked Western Sydney University to get discounted parking and alter academic results | New South Wales (The Guardian)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 26 Jun 2025 20:10:00 -0000</pubDate>
      <itunes:title>No panic—just patch.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2337</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Patches, patches and more patches.A patient death has been linked to the 2023 ransomware attack on an NHS IT provider. U.S. authorities indict the man known online as “IntelBroker”. A suspected cyberattack disrupts Columbia University’s computer systems. A major license plate reader company restricts cross-state data access after reports revealed misuse of its network by police agencies. Our guest is Andy Boyd, former Director of CIA's Center for Cyber Intelligence (CCI) and currently an operating partner at AE Industrial Partners. Discounted parking as a gateway cybercrime. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest today joins us from this week’s Caveat podcast episode. Andy Boyd, former Director of CIA's Center for Cyber Intelligence (CCI) and currently an operating partner at AE Industrial Partners, a private equity firm focused on the national security and aerospace industries, joins Dave and co-host Ben Yelin to discuss offensive cyber and the United States government. You can listen to the full conversation here and catch new episodes of Caveat every Thursday on your favorite podcast app.

Selected Reading

Cisco reports perfect 10 critical remote code execution flaws in Identity Services Engine (ISE) (Beyond Machines) 

Citrix releases emergency patches for actively exploited vulnerability in NetScaler Products (Beyond Machines)

CISA Warns of FortiOS Hard-Coded Credentials Vulnerability Exploited in Attacks (Cyber Security News) 

CISA: AMI MegaRAC bug enabling server hijacks exploited in attacks (Bleeping Computer)

Patient's death linked to cyber attack on NHS, hospital trust says | Science, Climate &amp; Tech News (Sky News)

British Man Charged by US in ‘IntelBroker’ Company Data Hacks (Bloomberg)

French police reportedly arrest suspected BreachForums administrators (The Record)

Potential Cyberattack Scrambles Columbia University Computer Systems (The New York Times)

Flock Removes States From National Lookup Tool After ICE and Abortion Searches Revealed (404 Media)

Student allegedly hacked Western Sydney University to get discounted parking and alter academic results | New South Wales (The Guardian)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Patches, patches and more patches.A patient death has been linked to the 2023 ransomware attack on an NHS IT provider. U.S. authorities indict the man known online as “IntelBroker”. A suspected cyberattack disrupts Columbia University’s computer systems. A major license plate reader company restricts cross-state data access after reports revealed misuse of its network by police agencies. Our guest is Andy Boyd, former Director of CIA's Center for Cyber Intelligence (CCI) and currently an operating partner at AE Industrial Partners. Discounted parking as a gateway cybercrime. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Our guest today joins us from this week’s <a href="https://thecyberwire.com/podcasts/caveat"><u>Caveat</u></a> podcast episode. <a href="https://www.linkedin.com/in/andrew-g-boyd-12194673/"><u>Andy Boyd</u></a>, former Director of CIA's Center for Cyber Intelligence (CCI) and currently an operating partner at <a href="https://www.aeroequity.com/"><u>AE Industrial Partners</u></a>, a private equity firm focused on the national security and aerospace industries, joins Dave and co-host Ben Yelin to discuss offensive cyber and the United States government. You can listen to the full conversation <a href="https://thecyberwire.com/podcasts/caveat/266/notes"><u>here</u></a> and catch new episodes of Caveat every Thursday on your favorite podcast app.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://beyondmachines.net/event_details/cisco-reports-perfect-10-critical-remote-code-execution-flaws-in-identity-services-engine-ise-m-m-f-c-7/gD2P6Ple2L"><u>Cisco reports perfect 10 critical remote code execution flaws in Identity Services Engine (ISE)</u></a> (Beyond Machines) </p>
<p><a href="https://beyondmachines.net/event_details/citrix-releases-emergency-patches-for-actively-exploited-vulnerability-in-netscaler-products-m-f-5-f-y/gD2P6Ple2L"><u>Citrix releases emergency patches for actively exploited vulnerability in NetScaler Products</u></a> (Beyond Machines)</p>
<p><a href="https://cybersecuritynews.com/fortinet-fortios-hard-coded-credentials-vulnerability/"><u>CISA Warns of FortiOS Hard-Coded Credentials Vulnerability Exploited in Attacks</u></a> (Cyber Security News) </p>
<p><a href="https://www.bleepingcomputer.com/news/security/cisa-ami-megarac-bug-that-lets-hackers-brick-servers-now-actively-exploited/"><u>CISA: AMI MegaRAC bug enabling server hijacks exploited in attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://news.sky.com/story/patient-death-linked-to-cyber-attack-on-nhs-hospital-trust-says-13388485"><u>Patient's death linked to cyber attack on NHS, hospital trust says | Science, Climate &amp; Tech News</u></a> (Sky News)</p>
<p><a href="https://www.bloomberg.com/news/articles/2025-06-25/british-man-charged-by-us-in-intelbroker-company-data-hacks"><u>British Man Charged by US in ‘IntelBroker’ Company Data Hacks</u></a> (Bloomberg)</p>
<p><a href="https://therecord.media/france-breachforums-suspects-arrests"><u>French police reportedly arrest suspected BreachForums administrators</u></a> (The Record)</p>
<p><a href="https://www.nytimes.com/2025/06/25/nyregion/columbia-university-cyberattack.html"><u>Potential Cyberattack Scrambles Columbia University Computer Systems</u></a> (The New York Times)</p>
<p><a href="https://www.404media.co/flock-removes-states-from-national-lookup-tool-after-ice-and-abortion-searches-revealed/"><u>Flock Removes States From National Lookup Tool After ICE and Abortion Searches Revealed</u></a> (404 Media)</p>
<p><a href="https://www.theguardian.com/australia-news/2025/jun/26/student-allegedly-hacked-western-sydney-university-to-get-discounted-parking-and-alter-academic-results-ntwnfb"><u>Student allegedly hacked Western Sydney University to get discounted parking and alter academic results | New South Wales</u></a> (The Guardian)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1786</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c4d55b7c-1c7a-11f0-85e0-0b1be05d490c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8297397820.mp3?updated=1750961808" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Open-source, open season.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2336/notes</link>
      <description>Cybercriminals target financial institutions across Africa using open-source tools. Threat actors are using a technique called Authenticode stuffing to abuse ConnectWise remote access software. A fake version of SonicWall’s NetExtender VPN app steals users’ credentials. CISA and the NSA publish a guide urging the adoption of Memory Safe Languages. Researchers identify multiple security vulnerabilities affecting Brother printers. Fake AI-themed websites spread malware. Researchers track a sharp rise in signup fraud. A new Common Good Cyber Fund has been launched to support nonprofits that provide essential cybersecurity services. Tim Starks from CyberScoop joins us to discuss calls for a federal cyberinsurance backstop. A Moscow court says ‘nyet’ to more jail time for cyber crooks.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

We are again joined by Tim Starks, Senior Reporter from CyberScoop. Tim discusses his recent piece on “Federal cyber insurance backstop should be tied to expiring terrorism insurance law, report recommends.”

Selected Reading

Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector (Unit 42)

Hackers Abuse ConnectWise to Hide Malware (SecurityWeek)

Fake SonicWall VPN app steals user credentials (The Register)

CISA Publishes Guide to Address Memory Safety Vulnerabilities in Modern Software Development (GB Hackers)

New Vulnerabilities Expose Millions of Brother Printers to Hacking (SecurityWeek)

Black Hat SEO Poisoning Search Engine Results For AI (ThreatLabz)

Half of Customer Signups Are Now Fraudulent  (Infosecurity Magazine)

Common Good Cyber Fund Launched to Support Non-Profit Security Efforts (Infosecurity Magazine)

Russia releases REvil members after convictions for payment card fraud (The Record)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 25 Jun 2025 20:10:00 -0000</pubDate>
      <itunes:title>Open-source, open season.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2336</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Cybercriminals target financial institutions across Africa using open-source tools. Threat actors are using a technique called Authenticode stuffing to abuse ConnectWise remote access software. A fake version of SonicWall’s NetExtender VPN app steals users’ credentials. CISA and the NSA publish a guide urging the adoption of Memory Safe Languages. Researchers identify multiple security vulnerabilities affecting Brother printers. Fake AI-themed websites spread malware. Researchers track a sharp rise in signup fraud. A new Common Good Cyber Fund has been launched to support nonprofits that provide essential cybersecurity services. Tim Starks from CyberScoop joins us to discuss calls for a federal cyberinsurance backstop. A Moscow court says ‘nyet’ to more jail time for cyber crooks.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

We are again joined by Tim Starks, Senior Reporter from CyberScoop. Tim discusses his recent piece on “Federal cyber insurance backstop should be tied to expiring terrorism insurance law, report recommends.”

Selected Reading

Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector (Unit 42)

Hackers Abuse ConnectWise to Hide Malware (SecurityWeek)

Fake SonicWall VPN app steals user credentials (The Register)

CISA Publishes Guide to Address Memory Safety Vulnerabilities in Modern Software Development (GB Hackers)

New Vulnerabilities Expose Millions of Brother Printers to Hacking (SecurityWeek)

Black Hat SEO Poisoning Search Engine Results For AI (ThreatLabz)

Half of Customer Signups Are Now Fraudulent  (Infosecurity Magazine)

Common Good Cyber Fund Launched to Support Non-Profit Security Efforts (Infosecurity Magazine)

Russia releases REvil members after convictions for payment card fraud (The Record)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cybercriminals target financial institutions across Africa using open-source tools. Threat actors are using a technique called Authenticode stuffing to abuse ConnectWise remote access software. A fake version of SonicWall’s NetExtender VPN app steals users’ credentials. CISA and the NSA publish a guide urging the adoption of Memory Safe Languages. Researchers identify multiple security vulnerabilities affecting Brother printers. Fake AI-themed websites spread malware. Researchers track a sharp rise in signup fraud. A new Common Good Cyber Fund has been launched to support nonprofits that provide essential cybersecurity services. Tim Starks from CyberScoop joins us to discuss calls for a federal cyberinsurance backstop. A Moscow court says ‘nyet’ to more jail time for cyber crooks.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>We are again joined by <a href="https://www.linkedin.com/in/tstarks/"><u>Tim Starks</u></a>, Senior Reporter from <a href="https://cyberscoop.com/"><u>CyberScoop</u></a>. Tim discusses his recent piece on “<a href="https://cyberscoop.com/federal-cyber-insurance-backstop-should-be-tied-to-expiring-terrorism-insurance-law-report-recommends/"><u>Federal cyber insurance backstop should be tied to expiring terrorism insurance law, report recommends</u></a>.”</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://unit42.paloaltonetworks.com/cybercriminals-attack-financial-sector-across-africa/"><u>Cybercriminals Abuse Open-Source Tools To Target Africa’s Financial Sector</u></a> (Unit 42)</p>
<p><a href="https://www.securityweek.com/hackers-abuse-connectwise-to-hide-malware/"><u>Hackers Abuse ConnectWise to Hide Malware</u></a> (SecurityWeek)</p>
<p><a href="https://www.theregister.com/2025/06/24/unknown_crims_using_hacked_sonicwall/"><u>Fake SonicWall VPN app steals user credentials</u> (The Register</a>)</p>
<p><a href="https://gbhackers.com/cisa-publishes-guide-to-address-memory-safety-vulnerabilities/"><u>CISA Publishes Guide to Address Memory Safety Vulnerabilities in Modern Software Development</u></a> (GB Hackers)</p>
<p><a href="https://www.securityweek.com/new-vulnerabilities-expose-millions-of-brother-printers-to-hacking/"><u>New Vulnerabilities Expose Millions of Brother Printers to Hacking</u></a> (SecurityWeek)</p>
<p><a href="https://www.zscaler.com/blogs/security-research/black-hat-seo-poisoning-search-engine-results-ai-distribute-malware"><u>Black Hat SEO Poisoning Search Engine Results For AI</u> (ThreatLabz</a>)</p>
<p><a href="https://www.infosecurity-magazine.com/news/half-customer-signups-now/"><u>Half of Customer Signups Are Now Fraudulent </u> (Infosecurity Magazine</a>)</p>
<p><a href="https://www.infosecurity-magazine.com/news/common-good-cyber-non-profit/"><u>Common Good Cyber Fund Launched to Support Non-Profit Security Efforts</u></a> <a href="https://www.infosecurity-magazine.com/news/half-customer-signups-now/">(Infosecurity Magazine</a>)</p>
<p><a href="https://therecord.media/revil-cybercrime-gang-members-released-russia"><u>Russia releases REvil members after convictions for payment card fraud</u></a> (The Record)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1586</itunes:duration>
      <guid isPermaLink="false"><![CDATA[c4aed254-1c7a-11f0-85e0-6fb994308132]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9321463306.mp3?updated=1750877378" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Iran’s digital threat after U.S. strikes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2335/notes</link>
      <description>Cybersecurity warnings about possible Iranian retaliation have surged. A potential act of sabotage disrupts the NATO Summit in The Hague. Canadian cybersecurity officials discover Salt Typhoon breached a major telecom provider. The U.S. House bans WhatsApp from all government devices. APT28 uses Signal chats in phishing campaigns targeting Ukrainian government entities. A China-linked APT has built a covert network of over 1,000 compromised devices  for long-term espionage. FileFix is a new variant of the well-known ClickFix method. SparkKitty targets Android and iOS users for image theft. Scammers steal $4 million from Coinbase users by posing as support staff. On today’s Threat Vector, host David Moulton sits down with Tyler Shields, Principal Analyst at ESG, to discuss the fine line between thought leadership and echo chambers in the industry. War Thunder gamers just can’t resist state secrets.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment

In this segment of Threat Vector, host David Moulton sits down with Tyler Shields, Principal Analyst at ESG, entrepreneur, and cybersecurity marketing expert, to discuss the fine line between thought leadership and echo chambers in the industry. You can hear David and Tyler's full discussion on Threat Vector ⁠here⁠ and catch new episodes every Thursday on your favorite podcast app.

Selected Reading

Warnings Ratchet Over Iranian Cyberattack (BankInfoSecurity)

NATO Summit in The Hague hit by potential sabotage as rail cables set on fire (The Record)

Canada says Salt Typhoon hacked telecom firm via Cisco flaw (BleepingComputer) 

Scoop: WhatsApp banned on House staffers' devices (Axios)

APT28 hackers use Signal chats to launch new malware attacks on Ukraine (Bleeping Computer)

Chinese APT Hacking Routers to Build Espionage Infrastructure (SecurityWeek)

FileFix - A ClickFix Alternative (mr.d0x)

Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play (SecurityWeek)

Hackers Impersonate Coinbase User Support To Scam Victims of $4,000,000 Before Blowing Most of Money on Gambling: ZachXBT (The Daily Hodl)

Reset the clock! War Thunder fan posts restricted Harrier data to game forum (Cyber Daily)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Jun 2025 20:10:00 -0000</pubDate>
      <itunes:title>Iran’s digital threat after U.S. strikes.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2335</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Cybersecurity warnings about possible Iranian retaliation have surged. A potential act of sabotage disrupts the NATO Summit in The Hague. Canadian cybersecurity officials discover Salt Typhoon breached a major telecom provider. The U.S. House bans WhatsApp from all government devices. APT28 uses Signal chats in phishing campaigns targeting Ukrainian government entities. A China-linked APT has built a covert network of over 1,000 compromised devices  for long-term espionage. FileFix is a new variant of the well-known ClickFix method. SparkKitty targets Android and iOS users for image theft. Scammers steal $4 million from Coinbase users by posing as support staff. On today’s Threat Vector, host David Moulton sits down with Tyler Shields, Principal Analyst at ESG, to discuss the fine line between thought leadership and echo chambers in the industry. War Thunder gamers just can’t resist state secrets.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment

In this segment of Threat Vector, host David Moulton sits down with Tyler Shields, Principal Analyst at ESG, entrepreneur, and cybersecurity marketing expert, to discuss the fine line between thought leadership and echo chambers in the industry. You can hear David and Tyler's full discussion on Threat Vector ⁠here⁠ and catch new episodes every Thursday on your favorite podcast app.

Selected Reading

Warnings Ratchet Over Iranian Cyberattack (BankInfoSecurity)

NATO Summit in The Hague hit by potential sabotage as rail cables set on fire (The Record)

Canada says Salt Typhoon hacked telecom firm via Cisco flaw (BleepingComputer) 

Scoop: WhatsApp banned on House staffers' devices (Axios)

APT28 hackers use Signal chats to launch new malware attacks on Ukraine (Bleeping Computer)

Chinese APT Hacking Routers to Build Espionage Infrastructure (SecurityWeek)

FileFix - A ClickFix Alternative (mr.d0x)

Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play (SecurityWeek)

Hackers Impersonate Coinbase User Support To Scam Victims of $4,000,000 Before Blowing Most of Money on Gambling: ZachXBT (The Daily Hodl)

Reset the clock! War Thunder fan posts restricted Harrier data to game forum (Cyber Daily)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cybersecurity warnings about possible Iranian retaliation have surged. A potential act of sabotage disrupts the NATO Summit in The Hague. Canadian cybersecurity officials discover Salt Typhoon breached a major telecom provider. The U.S. House bans WhatsApp from all government devices. APT28 uses Signal chats in phishing campaigns targeting Ukrainian government entities. A China-linked APT has built a covert network of over 1,000 compromised devices  for long-term espionage. FileFix is a new variant of the well-known ClickFix method. SparkKitty targets Android and iOS users for image theft. Scammers steal $4 million from Coinbase users by posing as support staff. On today’s Threat Vector, host David Moulton sits down with Tyler Shields, Principal Analyst at ESG, to discuss the fine line between thought leadership and echo chambers in the industry. War Thunder gamers just can’t resist state secrets.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Threat Vector Segment</strong></p>
<p>In this segment of Threat Vector, host <a href="https://www.linkedin.com/in/davidrmoulton/"><u>David Moulton</u></a> sits down with <a href="https://www.linkedin.com/in/tylershields/"><u>Tyler Shields</u></a>, Principal Analyst at <a href="https://www.techtarget.com/esg-global/"><u>ESG</u></a>, entrepreneur, and cybersecurity marketing expert, to discuss the fine line between thought leadership and echo chambers in the industry. You can hear David and Tyler's full discussion on Threat Vector <a href="https://thecyberwire.com/podcasts/threat-vector/72/notes"><u>⁠here⁠</u></a> and catch new episodes every Thursday on your favorite podcast app.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.govinfosecurity.com/warnings-ratchet-up-over-iranian-cyberattacks-a-28793"><u>Warnings Ratchet Over Iranian Cyberattack</u></a> (BankInfoSecurity)</p>
<p><a href="https://therecord.media/nato-summit-the-hague-rail-cables-set-on-fire"><u>NATO Summit in The Hague hit by potential sabotage as rail cables set on fire</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/canada-says-salt-typhoon-hacked-telecom-firm-via-cisco-flaw/"><u>Canada says Salt Typhoon hacked telecom firm via Cisco flaw</u></a> (BleepingComputer) </p>
<p><a href="https://www.axios.com/2025/06/23/whatsapp-house-congress-staffers-messaging-app"><u>Scoop: WhatsApp banned on House staffers' devices</u></a> (Axios)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/apt28-hackers-use-signal-chats-to-launch-new-malware-attacks-on-ukraine/"><u>APT28 hackers use Signal chats to launch new malware attacks on Ukraine</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/chinese-apt-hacking-routers-to-build-espionage-infrastructure/"><u>Chinese APT Hacking Routers to Build Espionage Infrastructure</u></a> (SecurityWeek)</p>
<p><a href="https://mrd0x.com/filefix-clickfix-alternative/"><u>FileFix - A ClickFix Alternative</u></a> (mr.d0x)</p>
<p><a href="https://www.securityweek.com/photo-stealing-spyware-sneaks-into-apple-app-store-google-play/"><u>Photo-Stealing Spyware Sneaks Into Apple App Store, Google Play</u></a> (SecurityWeek)</p>
<p><a href="https://dailyhodl.com/2025/06/23/hackers-impersonate-coinbase-user-support-to-scam-victims-of-4000000-before-blowing-most-of-money-on-gambling-zachxbt/"><u>Hackers Impersonate Coinbase User Support To Scam Victims of $4,000,000 Before Blowing Most of Money on Gambling: ZachXBT</u></a> (The Daily Hodl)</p>
<p><a href="https://www.cyberdaily.au/culture/12278-reset-the-clock-war-thunder-fan-posts-restricted-harrier-data-to-game-forum"><u>Reset the clock! War Thunder fan posts restricted Harrier data to game forum</u></a> (Cyber Daily)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1535</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c483b434-1c7a-11f0-85e0-b7b3294bab20]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6056670145.mp3?updated=1750788534" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Iran’s digital retaliation looms.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2334/notes</link>
      <description>US warns of heightened risk of Iranian cyberattacks. Cyber warfare has become central to Israel and Iran’s strategies. Oxford City Council discloses data breach. Europe aiming for digital sovereignty. Michigan hospital network says data belonging to 740,000 was stolen by ransomware gang. RapperBot pivoting to attack DVRs. A picture worth a thousand wallets. New Zealand’s public sector bolsters cyber defenses. On our Industry Voices segment today, we are joined by Imran Umar, Zero Trust Lead at Booz Allen Hamilton, discussing Zero Trust and Thunderdome. And a cyberattack spoils Russia’s dairy flow.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.CyberWire Guest

On our Industry Voices segment today, we are joined by Imran Umar, Zero Trust Lead at Booz Allen Hamilton, discussing Zero Trust and Thunderdome. Hear the full conversation ⁠here⁠. Find resources below to learn more about the topic Imran discusses.

For additional information:


  
Zero Trust, More Confidence





  
Zero Trust: Translating Results into Action 


Selected Reading

US Warns of Heightened Risk of Iranian Cyber-Attacks After Military Strikes (Infosecurity Magazine) 

Bank hacks, internet shutdowns and crypto heists: Here’s how the war between Israel and Iran is playing out in cyberspace (Politico)

Oxford City Council suffers breach exposing two decades of data (Bleeping Computer) 

Europeans seek 'digital sovereignty' as US tech firms embrace Trump (Reuters)

Data of more than 740,000 stolen in ransomware attack on Michigan hospital network (The Record) 

RapperBot Attacking DVRs to Gain Access Over Surveillance Cameras to Record Video (Cyber Security News) 

CoinMarketCap Doodle Image Vulnerability Lets Attackers Run Malicious Code via API Call (GB Hackers)

NZ NCSC mandates minimum cybersecurity baseline for public sector agencies, sets October deadline (Industrial Cyber)

Russian dairy supply disrupted by cyberattack on animal certification system (The Record)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 23 Jun 2025 20:10:00 -0000</pubDate>
      <itunes:title>Iran’s digital retaliation looms.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2334</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>US warns of heightened risk of Iranian cyberattacks. Cyber warfare has become central to Israel and Iran’s strategies. Oxford City Council discloses data breach. Europe aiming for digital sovereignty. Michigan hospital network says data belonging to 740,000 was stolen by ransomware gang. RapperBot pivoting to attack DVRs. A picture worth a thousand wallets. New Zealand’s public sector bolsters cyber defenses. On our Industry Voices segment today, we are joined by Imran Umar, Zero Trust Lead at Booz Allen Hamilton, discussing Zero Trust and Thunderdome. And a cyberattack spoils Russia’s dairy flow.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.CyberWire Guest

On our Industry Voices segment today, we are joined by Imran Umar, Zero Trust Lead at Booz Allen Hamilton, discussing Zero Trust and Thunderdome. Hear the full conversation ⁠here⁠. Find resources below to learn more about the topic Imran discusses.

For additional information:


  
Zero Trust, More Confidence





  
Zero Trust: Translating Results into Action 


Selected Reading

US Warns of Heightened Risk of Iranian Cyber-Attacks After Military Strikes (Infosecurity Magazine) 

Bank hacks, internet shutdowns and crypto heists: Here’s how the war between Israel and Iran is playing out in cyberspace (Politico)

Oxford City Council suffers breach exposing two decades of data (Bleeping Computer) 

Europeans seek 'digital sovereignty' as US tech firms embrace Trump (Reuters)

Data of more than 740,000 stolen in ransomware attack on Michigan hospital network (The Record) 

RapperBot Attacking DVRs to Gain Access Over Surveillance Cameras to Record Video (Cyber Security News) 

CoinMarketCap Doodle Image Vulnerability Lets Attackers Run Malicious Code via API Call (GB Hackers)

NZ NCSC mandates minimum cybersecurity baseline for public sector agencies, sets October deadline (Industrial Cyber)

Russian dairy supply disrupted by cyberattack on animal certification system (The Record)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>US warns of heightened risk of Iranian cyberattacks. Cyber warfare has become central to Israel and Iran’s strategies. Oxford City Council discloses data breach. Europe aiming for digital sovereignty. Michigan hospital network says data belonging to 740,000 was stolen by ransomware gang. RapperBot pivoting to attack DVRs. A picture worth a thousand wallets. New Zealand’s public sector bolsters cyber defenses. On our Industry Voices segment today, we are joined by Imran Umar, Zero Trust Lead at Booz Allen Hamilton, discussing Zero Trust and Thunderdome. And a cyberattack spoils Russia’s dairy flow.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.<br><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment today, we are joined by <a href="https://www.linkedin.com/in/imran-umar-516763209/"><u>Imran Umar</u></a>, Zero Trust Lead at <a href="https://www.linkedin.com/company/booz-allen-hamilton/"><u>Booz Allen Hamilton</u></a>, discussing Zero Trust and Thunderdome. Hear the full conversation <a href="https://explore.thecyberwire.com/bah">⁠here⁠</a>. Find resources below to learn more about the topic Imran discusses.</p>
<p>For additional information:</p>
<ul>
  <li>
<p><a href="http://www.boozallen.com/zerotrust"><u>Zero Trust, More Confidence</u></a></p>
</li>
</ul>
<ul>
  <li>
<br><a href="https://www.boozallen.com/content/dam/home/docs/cyber/zero-trust-diagnose-design-factsheet.pdf"><u>Zero Trust: Translating Results into Action</u></a> </li>
</ul>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.infosecurity-magazine.com/news/us-risk-iranian-cyber-attacks/"><u>US Warns of Heightened Risk of Iranian Cyber-Attacks After Military Strikes</u></a> (Infosecurity Magazine) </p>
<p><a href="https://www.politico.com/news/2025/06/22/us-israel-iran-war-cyber-attacks-00417782"><u>Bank hacks, internet shutdowns and crypto heists: Here’s how the war between Israel and Iran is playing out in cyberspace</u></a> (Politico)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/oxford-city-council-suffers-breach-exposing-two-decades-of-data/"><u>Oxford City Council suffers breach exposing two decades of data</u></a> (Bleeping Computer) </p>
<p><a href="https://www.reuters.com/business/media-telecom/europeans-seek-digital-sovereignty-us-tech-firms-embrace-trump-2025-06-21/"><u>Europeans seek 'digital sovereignty' as US tech firms embrace Trump</u></a> (Reuters)</p>
<p><a href="https://therecord.media/mclaren-health-care-data-breach-notification-ransomware"><u>Data of more than 740,000 stolen in ransomware attack on Michigan hospital network</u></a> (The Record) </p>
<p><a href="https://cybersecuritynews.com/rapperbot-attacking-dvrs/"><u>RapperBot Attacking DVRs to Gain Access Over Surveillance Cameras to Record Video</u></a> (Cyber Security News) </p>
<p><a href="https://gbhackers.com/coinmarketcap-doodle-image-vulnerability/"><u>CoinMarketCap Doodle Image Vulnerability Lets Attackers Run Malicious Code via API Call</u></a> (GB Hackers)</p>
<p><a href="https://industrialcyber.co/regulation-standards-and-compliance/nz-ncsc-mandates-minimum-cybersecurity-baseline-for-public-sector-agencies-sets-october-deadline/"><u>NZ NCSC mandates minimum cybersecurity baseline for public sector agencies, sets October deadline</u></a> (Industrial Cyber)</p>
<p><a href="https://therecord.media/russia-dairy-supply-disrupted-cyberattack"><u>Russian dairy supply disrupted by cyberattack on animal certification system</u></a> (The Record)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1838</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c459915e-1c7a-11f0-85e0-73203494b636]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4105611108.mp3?updated=1750705598" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jadee Hanson: Cybersecurity is a team effort. [CISO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/73/notes</link>
      <description>Please enjoy this encore of Career Notes.

 Jadee Hanson, CIO and CISO at Code 42, started her technology journey thanks to the help of a teacher in high school. She began college studying computer science and ended with a degree in computer information systems as it had more of the business side. Working in the private sector for companies such as Deloitte, Target and Code 42, Jadee gained experience and specialized in insider risk. She notes "utopia for me and my team is to get to a spot where the team is just firing on all cylinders and being really proactive about what's coming and what's changing." Jadee mentions she tries hard to do things that might scare her every day. For those interested in the field, especially young women, Jadee recommends they get involved and then stay curious. We thank Jadee for sharing her story with us.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 22 Jun 2025 07:00:00 -0000</pubDate>
      <itunes:title>Jadee Hanson: Cybersecurity is a team effort. [CISO] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>73</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/e0a40348-4dea-11f0-add2-1f26a66149d0/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes.

 Jadee Hanson, CIO and CISO at Code 42, started her technology journey thanks to the help of a teacher in high school. She began college studying computer science and ended with a degree in computer information systems as it had more of the business side. Working in the private sector for companies such as Deloitte, Target and Code 42, Jadee gained experience and specialized in insider risk. She notes "utopia for me and my team is to get to a spot where the team is just firing on all cylinders and being really proactive about what's coming and what's changing." Jadee mentions she tries hard to do things that might scare her every day. For those interested in the field, especially young women, Jadee recommends they get involved and then stay curious. We thank Jadee for sharing her story with us.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes.</p>
<p> Jadee Hanson, CIO and CISO at Code 42, started her technology journey thanks to the help of a teacher in high school. She began college studying computer science and ended with a degree in computer information systems as it had more of the business side. Working in the private sector for companies such as Deloitte, Target and Code 42, Jadee gained experience and specialized in insider risk. She notes "utopia for me and my team is to get to a spot where the team is just firing on all cylinders and being really proactive about what's coming and what's changing." Jadee mentions she tries hard to do things that might scare her every day. For those interested in the field, especially young women, Jadee recommends they get involved and then stay curious. We thank Jadee for sharing her story with us.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>609</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e0a40348-4dea-11f0-add2-1f26a66149d0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1597613523.mp3?updated=1750433143" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Signed, sealed, exploitable. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/382/notes</link>
      <description>Dustin Childs, Head of Threat Awareness at Trend Micro Zero Day Initiative, joins to discuss their work on "ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains." The research explores two critical vulnerabilities (ZDI-23-1527 and ZDI-23-1528) that could have enabled attackers to hijack the Microsoft PC Manager supply chain via overly permissive SAS tokens in WinGet and official Microsoft domains. 

While the issues have since been resolved, the findings highlight how misconfigured cloud storage access can put trusted software distribution at risk. The post also includes detection strategies to help defenders identify and mitigate similar threats.

The research can be found here:


  ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Jun 2025 07:00:00 -0000</pubDate>
      <itunes:title>Signed, sealed, exploitable. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>382</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/49cfa8cc-4deb-11f0-9b37-c764c253feb0/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Dustin Childs, Head of Threat Awareness at Trend Micro Zero Day Initiative, joins to discuss their work on "ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains." The research explores two critical vulnerabilities (ZDI-23-1527 and ZDI-23-1528) that could have enabled attackers to hijack the Microsoft PC Manager supply chain via overly permissive SAS tokens in WinGet and official Microsoft domains. 

While the issues have since been resolved, the findings highlight how misconfigured cloud storage access can put trusted software distribution at risk. The post also includes detection strategies to help defenders identify and mitigate similar threats.

The research can be found here:


  ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/dustincchilds/">Dustin Childs</a>, Head of Threat Awareness at <a href="https://www.linkedin.com/company/zerodayinitiative/">Trend Micro Zero Day Initiative</a>, joins to discuss their work on "ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains." The research explores two critical vulnerabilities (ZDI-23-1527 and ZDI-23-1528) that could have enabled attackers to hijack the Microsoft PC Manager supply chain via overly permissive SAS tokens in WinGet and official Microsoft domains. </p>
<p>While the issues have since been resolved, the findings highlight how misconfigured cloud storage access can put trusted software distribution at risk. The post also includes detection strategies to help defenders identify and mitigate similar threats.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.trendmicro.com/en_us/research/25/d/zdi-23-1527-and-zdi-23-1528-the-potential-impact-of-overly-permi.html">ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>982</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[49cfa8cc-4deb-11f0-9b37-c764c253feb0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4705210041.mp3?updated=1750429679" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A blast from the breached past.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2333/notes</link>
      <description>An historic data breach that wasn’t. Aflac says it stopped a ransomware attack. Cloudflare thwarts a record breaking DDoS attack. Mocha Manakin combines clever social engineering with custom-built malware. The Godfather Android trojan uses a sophisticated virtualization technique to hijack banking and crypto apps. A British expert on Russian information warfare is targeted in a sophisticated spear phishing campaign. A federal judge dismisses a lawsuit against CrowdStrike filed by airline passengers. Banana Squad disguises malicious code as legitimate open-source software. The U.S. Justice Department wants to seize over $225 million in cryptocurrency linked to romance and investment scams.  Ben Yelin explains the recent Oversight Committee request for Microsoft to hand over GitHub logs related to alleged DOGE misconduct. This one weird audio trick leaves AI scam calls speechless.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today, we are joined Ben Yelin, co host of Caveat podcast and Program Director for Public Policy &amp; External Affairs at the University of Maryland Center for Health and Homeland Security, discussing the recent Oversight Committee request for Microsoft to hand over GitHub logs related to alleged misconduct by Elon Musk’s "Department of Government Efficiency" (DOGE). You can learn more here.

Selected Reading

No, the 16 billion credentials leak is not a new data breach (Bleeping Computer)

Aflac says it stopped ransomware attack launched by ‘sophisticated cybercrime group’ (The Record)

Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider (SecurityWeek)

New Mocha Manakin Malware Deploys NodeInitRAT via Clickfix Attack (Hackread)

Godfather Android Trojan Creates Sandbox on Infected Devices (SecurityWeek)

Russia Expert Falls Prey to Elite Hackers Disguised as US Officials (Infosecurity Magazine)

Judge Axes Flight Disruption Suit Tied to CrowdStrike Outage (GovInfo Security)

Banana Squad Hides Data-Stealing Malware in Fake GitHub Repositories (Hackread)

DOJ moves to seize $225 million in crypto stolen by scammers (The Record)

Boffins devise voice-altering tech to jam 'vishing' ploys (The Register)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 20 Jun 2025 20:10:00 -0000</pubDate>
      <itunes:title>A blast from the breached past.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2333</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>An historic data breach that wasn’t. Aflac says it stopped a ransomware attack. Cloudflare thwarts a record breaking DDoS attack. Mocha Manakin combines clever social engineering with custom-built malware. The Godfather Android trojan uses a sophisticated virtualization technique to hijack banking and crypto apps. A British expert on Russian information warfare is targeted in a sophisticated spear phishing campaign. A federal judge dismisses a lawsuit against CrowdStrike filed by airline passengers. Banana Squad disguises malicious code as legitimate open-source software. The U.S. Justice Department wants to seize over $225 million in cryptocurrency linked to romance and investment scams.  Ben Yelin explains the recent Oversight Committee request for Microsoft to hand over GitHub logs related to alleged DOGE misconduct. This one weird audio trick leaves AI scam calls speechless.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today, we are joined Ben Yelin, co host of Caveat podcast and Program Director for Public Policy &amp; External Affairs at the University of Maryland Center for Health and Homeland Security, discussing the recent Oversight Committee request for Microsoft to hand over GitHub logs related to alleged misconduct by Elon Musk’s "Department of Government Efficiency" (DOGE). You can learn more here.

Selected Reading

No, the 16 billion credentials leak is not a new data breach (Bleeping Computer)

Aflac says it stopped ransomware attack launched by ‘sophisticated cybercrime group’ (The Record)

Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider (SecurityWeek)

New Mocha Manakin Malware Deploys NodeInitRAT via Clickfix Attack (Hackread)

Godfather Android Trojan Creates Sandbox on Infected Devices (SecurityWeek)

Russia Expert Falls Prey to Elite Hackers Disguised as US Officials (Infosecurity Magazine)

Judge Axes Flight Disruption Suit Tied to CrowdStrike Outage (GovInfo Security)

Banana Squad Hides Data-Stealing Malware in Fake GitHub Repositories (Hackread)

DOJ moves to seize $225 million in crypto stolen by scammers (The Record)

Boffins devise voice-altering tech to jam 'vishing' ploys (The Register)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An historic data breach that wasn’t. Aflac says it stopped a ransomware attack. Cloudflare thwarts a record breaking DDoS attack. Mocha Manakin combines clever social engineering with custom-built malware. The Godfather Android trojan uses a sophisticated virtualization technique to hijack banking and crypto apps. A British expert on Russian information warfare is targeted in a sophisticated spear phishing campaign. A federal judge dismisses a lawsuit against CrowdStrike filed by airline passengers. Banana Squad disguises malicious code as legitimate open-source software. The U.S. Justice Department wants to seize over $225 million in cryptocurrency linked to romance and investment scams.  Ben Yelin explains the recent Oversight Committee request for Microsoft to hand over GitHub logs related to alleged DOGE misconduct. This one weird audio trick leaves AI scam calls speechless.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today, we are joined <a href="https://www.linkedin.com/in/benjamin-yelin-5b14114b/"><u>Ben Yelin</u></a>, co host of <a href="https://thecyberwire.com/podcasts/caveat"><u>Caveat</u></a> podcast and Program Director for Public Policy &amp; External Affairs at the <a href="https://www.mdchhs.com/"><u>University of Maryland Center for Health and Homeland Security</u></a>, discussing the recent Oversight Committee request for Microsoft to hand over GitHub logs related to alleged misconduct by Elon Musk’s "Department of Government Efficiency" (DOGE). You can learn more <a href="https://oversightdemocrats.house.gov/news/press-releases/following-whistleblower-reports-acting-ranking-member-lynch-demands-microsoft"><u>here</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/no-the-16-billion-credentials-leak-is-not-a-new-data-breach/"><u>No, the 16 billion credentials leak is not a new data breach</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/aflac-cyberattack-potential-data-breach"><u>Aflac says it stopped ransomware attack launched by ‘sophisticated cybercrime group’</u></a> (The Record)</p>
<p><a href="https://www.securityweek.com/record-breaking-ddos-attack-peaked-at-7-3-tbps/"><u>Record-Breaking 7.3 Tbps DDoS Attack Targets Hosting Provider</u></a> (SecurityWeek)</p>
<p><a href="https://hackread.com/mocha-manakin-malware-nodeinitrat-via-clickfix-attack/"><u>New Mocha Manakin Malware Deploys NodeInitRAT via Clickfix Attack</u></a> (Hackread)</p>
<p><a href="https://www.securityweek.com/godfather-android-trojan-creates-sandbox-on-infected-devices/"><u>Godfather Android Trojan Creates Sandbox on Infected Devices</u></a> (SecurityWeek)</p>
<p><a href="https://www.infosecurity-magazine.com/news/russia-expert-elite-hackers-us/"><u>Russia Expert Falls Prey to Elite Hackers Disguised as US Officials</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.govinfosecurity.com/judge-axes-flight-disruption-suit-tied-to-crowdstrike-outage-a-28759"><u>Judge Axes Flight Disruption Suit Tied to CrowdStrike Outage</u></a> (GovInfo Security)</p>
<p><a href="https://hackread.com/banana-squad-data-stealing-malware-github-repositories/"><u>Banana Squad Hides Data-Stealing Malware in Fake GitHub Repositories</u></a> (Hackread)</p>
<p><a href="https://therecord.media/doj-moves-to-seize-225-million-in-stolen-crypto"><u>DOJ moves to seize $225 million in crypto stolen by scammers</u></a> (The Record)</p>
<p><a href="https://www.theregister.com/2025/06/19/voice_altering_vishing_jammer/"><u>Boffins devise voice-altering tech to jam 'vishing' ploys</u></a> (The Register)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1543</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c42ea17e-1c7a-11f0-85e0-a37825d3b9e4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3348284723.mp3?updated=1750445777" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Juneteenth: Reflecting, belonging, and owning your seat at the table. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/84/notes</link>
      <description>We put together an open conversation between our podcast hosts, CyberWire Daily's Dave Bittner, T-Minus Space Daily’s Maria Varmazis, and CISO Perspectives podcast’s Kim Jones. Their conversation goes deeper than just the historical significance of Juneteenth, diving into candid conversations on allyship, representation, and the enduring value of diversity in the cybersecurity and space fields. Grab your coffee and join us in the room.   

Resources: 


  Juneteenth


CISO Perspectives podcast: 


  Does diversity matter in cyber?

  Mid season reflection with Kim Jones.


T-Minus Space Daily podcast: 


  Dr. Sian Proctor sharing her poem "Space to Inspire" on Instagram.

  Deep Space: Inspiration4 with Dr. Sian “Leo” Proctor.


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 19 Jun 2025 07:00:00 -0000</pubDate>
      <itunes:title>Juneteenth: Reflecting, belonging, and owning your seat at the table. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>84</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/f7801162-4c6c-11f0-b76e-071013791aee/image/0216c9cea15c53e5d2c739964a38623c.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Juneteenth: Reflecting, belonging, and owning your seat at the table.</itunes:subtitle>
      <itunes:summary>We put together an open conversation between our podcast hosts, CyberWire Daily's Dave Bittner, T-Minus Space Daily’s Maria Varmazis, and CISO Perspectives podcast’s Kim Jones. Their conversation goes deeper than just the historical significance of Juneteenth, diving into candid conversations on allyship, representation, and the enduring value of diversity in the cybersecurity and space fields. Grab your coffee and join us in the room.   

Resources: 


  Juneteenth


CISO Perspectives podcast: 


  Does diversity matter in cyber?

  Mid season reflection with Kim Jones.


T-Minus Space Daily podcast: 


  Dr. Sian Proctor sharing her poem "Space to Inspire" on Instagram.

  Deep Space: Inspiration4 with Dr. Sian “Leo” Proctor.


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>We put together an open conversation between our podcast hosts, CyberWire Daily's <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a>, <a href="https://space.n2k.com/podcasts/t-minus">T-Minus Space Daily</a>’s <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a>, and <a href="https://thecyberwire.com/podcasts/cso-perspectives">CISO Perspectives</a> podcast’s <a href="https://www.linkedin.com/in/kimjones-cism/">Kim Jones</a>. Their conversation goes deeper than just the historical significance of Juneteenth, diving into candid conversations on allyship, representation, and the enduring value of diversity in the cybersecurity and space fields. Grab your coffee and join us in the room.   </p>
<p><strong>Resources:</strong> </p>
<ul>
  <li><a href="https://www.juneteenth.com/">Juneteenth</a></li>
</ul>
<p><strong>CISO Perspectives podcast: </strong></p>
<ul>
  <li><a href="https://thecyberwire.com/podcasts/cso-perspectives/132/notes">Does diversity matter in cyber?</a></li>
  <li><a href="https://thecyberwire.com/podcasts/cso-perspectives/136/notes">Mid season reflection with Kim Jones.</a></li>
</ul>
<p><strong>T-Minus Space Daily podcast:</strong> </p>
<ul>
  <li><a href="https://www.instagram.com/reel/DFnkHwwRF0X/?utm_source=ig_web_copy_link&amp;igsh=MzRlODBiNWFlZA==">Dr. Sian Proctor sharing her poem "Space to Inspire" on Instagram.</a></li>
  <li><a href="https://space.n2k.com/podcasts/t-minus/ds82">Deep Space: Inspiration4 with Dr. Sian “Leo” Proctor.</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2126</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f7801162-4c6c-11f0-b76e-071013791aee]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1625558560.mp3?updated=1750264170" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Typhoon on the line.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2332/notes</link>
      <description>Viasat confirms it was breached by Salt Typhoon. Microsoft’s June 2025 security update giveth, and Microsoft’s June 2025 security update taketh away. Local privilege escalation flaws grant root access on major Linux distributions. BeyondTrust patches a critical remote code execution flaw. SMS low cost routing exposes users to serious risks. Erie Insurance says their ongoing outage isn’t ransomware. Backups are no good if you can’t find them. Veeam patches a critical vulnerability in its Backup software. SuperCard malware steals payment card data for ATM fraud and direct bank transfers. We preview our Juneteenth special edition. Backing up humanity. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

Today, we are sharing an excerpt of our Juneteenth Special Edition conversation between Dave Bittner, T-Minus Space Daily’s Maria Varmazis, and CISO Perspectives podcast’s Kim Jones. Enjoy this discussion on the eve of Juneteenth and tune into your CyberWire Daily feed tomorrow on your favorite podcast app to hear the full conversation.



Selected Reading

Viasat hacked by China-backed Salt Typhoon in 2024 US telecom attacks (Cybernews)

Microsoft's June Patches Unleash a Cascade of Critical Failures (WinBuzzer)

New Linux udisks flaw lets attackers get root on major Linux distros (Bleeping Computer)

BeyondTrust warns of pre-auth RCE in Remote Support software (Bleeping Computer)

Two Factor Insecurity (Lighthouse Reports)

Erie Insurance: ‘No Evidence’ of Ransomware in Network Outage (Insurance Journal)

Half of organizations struggle to locate backup data, report finds (SC Media)

New Veeam RCE flaw lets domain users hack backup servers (Bleeping Computer)

Russia detects first SuperCard malware attacks skimming bank data via NFC (The Record)

Why one man is archiving human-made content from before the AI explosion (Ars Technica)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 18 Jun 2025 20:10:00 -0000</pubDate>
      <itunes:title>Typhoon on the line.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2332</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Viasat confirms it was breached by Salt Typhoon. Microsoft’s June 2025 security update giveth, and Microsoft’s June 2025 security update taketh away. Local privilege escalation flaws grant root access on major Linux distributions. BeyondTrust patches a critical remote code execution flaw. SMS low cost routing exposes users to serious risks. Erie Insurance says their ongoing outage isn’t ransomware. Backups are no good if you can’t find them. Veeam patches a critical vulnerability in its Backup software. SuperCard malware steals payment card data for ATM fraud and direct bank transfers. We preview our Juneteenth special edition. Backing up humanity. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

Today, we are sharing an excerpt of our Juneteenth Special Edition conversation between Dave Bittner, T-Minus Space Daily’s Maria Varmazis, and CISO Perspectives podcast’s Kim Jones. Enjoy this discussion on the eve of Juneteenth and tune into your CyberWire Daily feed tomorrow on your favorite podcast app to hear the full conversation.



Selected Reading

Viasat hacked by China-backed Salt Typhoon in 2024 US telecom attacks (Cybernews)

Microsoft's June Patches Unleash a Cascade of Critical Failures (WinBuzzer)

New Linux udisks flaw lets attackers get root on major Linux distros (Bleeping Computer)

BeyondTrust warns of pre-auth RCE in Remote Support software (Bleeping Computer)

Two Factor Insecurity (Lighthouse Reports)

Erie Insurance: ‘No Evidence’ of Ransomware in Network Outage (Insurance Journal)

Half of organizations struggle to locate backup data, report finds (SC Media)

New Veeam RCE flaw lets domain users hack backup servers (Bleeping Computer)

Russia detects first SuperCard malware attacks skimming bank data via NFC (The Record)

Why one man is archiving human-made content from before the AI explosion (Ars Technica)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Viasat confirms it was breached by Salt Typhoon. Microsoft’s June 2025 security update giveth, and Microsoft’s June 2025 security update taketh away. Local privilege escalation flaws grant root access on major Linux distributions. BeyondTrust patches a critical remote code execution flaw. SMS low cost routing exposes users to serious risks. Erie Insurance says their ongoing outage isn’t ransomware. Backups are no good if you can’t find them. Veeam patches a critical vulnerability in its Backup software. SuperCard malware steals payment card data for ATM fraud and direct bank transfers. We preview our Juneteenth special edition. Backing up humanity. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br></p>
<p><strong>CyberWire Guest</strong></p>
<p>Today, we are sharing an excerpt of our Juneteenth Special Edition conversation between <a href="https://www.linkedin.com/in/dave-bittner-27231a4/"><u>Dave Bittner</u></a>, <a href="https://space.n2k.com/podcasts/t-minus"><u>T-Minus Space Daily</u></a>’s <a href="https://www.linkedin.com/in/varmazis/"><u>Maria Varmazis</u></a>, and <a href="https://thecyberwire.com/podcasts/cso-perspectives"><u>CISO Perspectives</u></a> podcast’s <a href="https://www.linkedin.com/in/kimjones-cism/"><u>Kim Jones</u></a>. Enjoy this discussion on the eve of <a href="https://www.juneteenth.com/"><u>Juneteenth</u></a> and tune into your CyberWire Daily feed tomorrow on your favorite podcast app to hear the full conversation.</p>
<p><br></p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://cnews.link/viasat-breach-cyberattacks-salt-typhoon-1/"><u>Viasat hacked by China-backed Salt Typhoon in 2024 US telecom attacks</u></a> (Cybernews)</p>
<p><a href="https://winbuzzer.com/2025/06/18/microsofts-june-patches-unleash-a-cascade-of-critical-failures-xcxwbn/"><u>Microsoft's June Patches Unleash a Cascade of Critical Failures</u></a> (WinBuzzer)</p>
<p><a href="https://www.bleepingcomputer.com/news/linux/new-linux-udisks-flaw-lets-attackers-get-root-on-major-linux-distros/"><u>New Linux udisks flaw lets attackers get root on major Linux distros</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/beyondtrust-warns-of-pre-auth-rce-in-remote-support-software/"><u>BeyondTrust warns of pre-auth RCE in Remote Support software</u></a> (Bleeping Computer)</p>
<p><a href="https://www.lighthousereports.com/investigation/two-factor-insecurity/"><u>Two Factor Insecurity</u></a> (Lighthouse Reports)</p>
<p><a href="https://www.insurancejournal.com/news/east/2025/06/18/828269.htm"><u>Erie Insurance: ‘No Evidence’ of Ransomware in Network Outage</u></a> (Insurance Journal)</p>
<p><a href="https://www.scworld.com/news/half-of-organizations-struggle-to-locate-backup-data-report-finds"><u>Half of organizations struggle to locate backup data, report finds</u></a> (SC Media)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/new-veeam-rce-flaw-lets-domain-users-hack-backup-servers/"><u>New Veeam RCE flaw lets domain users hack backup servers</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/supercard-nfc-banking-malware-russia"><u>Russia detects first SuperCard malware attacks skimming bank data via NFC</u></a> (The Record)</p>
<p><a href="https://arstechnica.com/ai/2025/06/why-one-man-is-archiving-human-made-content-from-before-the-ai-explosion/"><u>Why one man is archiving human-made content from before the AI explosion</u></a> (Ars Technica)</p>
<p><br><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><br><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1355</itunes:duration>
      <guid isPermaLink="false"><![CDATA[c3b21e9c-1c7a-11f0-85e0-ff229ea140a1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7880266545.mp3?updated=1750268087" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Can’t DOGE the inquiry. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2331/notes</link>
      <description>A House oversight committee requests DOGE documents from Microsoft. Predatory Sparrow claims a cyberattack on an Iranian bank. Microsoft says data that happens in Europe will stay in Europe. A complex malware campaign is using heavily obfuscated Visual Basic files to deploy RATs. A widely used CMS platform suffers potential RCE bugs.  North Korea’s Kimsuky targets academic institutions using password-protected research documents. Asus patches a high-severity vulnerability in its Armoury Crate software. CISA’s new leader remains in confirmation limbo. Our guest is Brian Downey, VP of Product Management from Barracuda, talking about how security sprawl increases risk. Operation Fluffy Narwhal thinks it’s time to rethink adversary naming.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. 

CyberWire Guest

We are joined by Brian Downey, VP of Product Marketing and Product Management from Barracuda, talking about how security sprawl increases risk. You can find more information about what Brian discussed here.

Selected Reading

Following Whistleblower Reports, Acting Ranking Member Lynch Demands Microsoft Hand Over Information on DOGE’s Misconduct at NLRB | The Committee on Oversight and Accountability Democrats (House Committee on Oversight and Government Reform)

Pro-Israel hackers claim breach of Iranian bank amid military escalation (The Record)

Microsoft lays out data protection plans for European cloud customers (Reuters)

New Sophisticated Multi-Stage Malware Campaign Weaponizes VBS Files to Execute PowerShell Script (Cyber Security News)

Chained Flaws in Enterprise CMS Provider Sitecore Could Allow RCE (Infosecurity Magazine)

Beware of Weaponized Research Papers That Delivers Malware Via Password-Protected Documents (Cyber Security News)

Organizations Warned of Vulnerability Exploited Against Discontinued TP-Link Routers (SecurityWeek)

Asus Armoury Crate Vulnerability Leads to Full System Compromise (SecurityWeek)

Trump’s Pick to Lead CISA is Stuck in Confirmation Limbo (Gov Infosecurity)

Call Them What They Are: Time to Fix Cyber Threat Actor Naming (Just Security)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Jun 2025 20:00:00 -0000</pubDate>
      <itunes:title>Can’t DOGE the inquiry. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2331</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A House oversight committee requests DOGE documents from Microsoft. Predatory Sparrow claims a cyberattack on an Iranian bank. Microsoft says data that happens in Europe will stay in Europe. A complex malware campaign is using heavily obfuscated Visual Basic files to deploy RATs. A widely used CMS platform suffers potential RCE bugs.  North Korea’s Kimsuky targets academic institutions using password-protected research documents. Asus patches a high-severity vulnerability in its Armoury Crate software. CISA’s new leader remains in confirmation limbo. Our guest is Brian Downey, VP of Product Management from Barracuda, talking about how security sprawl increases risk. Operation Fluffy Narwhal thinks it’s time to rethink adversary naming.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. 

CyberWire Guest

We are joined by Brian Downey, VP of Product Marketing and Product Management from Barracuda, talking about how security sprawl increases risk. You can find more information about what Brian discussed here.

Selected Reading

Following Whistleblower Reports, Acting Ranking Member Lynch Demands Microsoft Hand Over Information on DOGE’s Misconduct at NLRB | The Committee on Oversight and Accountability Democrats (House Committee on Oversight and Government Reform)

Pro-Israel hackers claim breach of Iranian bank amid military escalation (The Record)

Microsoft lays out data protection plans for European cloud customers (Reuters)

New Sophisticated Multi-Stage Malware Campaign Weaponizes VBS Files to Execute PowerShell Script (Cyber Security News)

Chained Flaws in Enterprise CMS Provider Sitecore Could Allow RCE (Infosecurity Magazine)

Beware of Weaponized Research Papers That Delivers Malware Via Password-Protected Documents (Cyber Security News)

Organizations Warned of Vulnerability Exploited Against Discontinued TP-Link Routers (SecurityWeek)

Asus Armoury Crate Vulnerability Leads to Full System Compromise (SecurityWeek)

Trump’s Pick to Lead CISA is Stuck in Confirmation Limbo (Gov Infosecurity)

Call Them What They Are: Time to Fix Cyber Threat Actor Naming (Just Security)

Audience Survey

Complete our annual audience survey before August 31.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A House oversight committee requests DOGE documents from Microsoft. Predatory Sparrow claims a cyberattack on an Iranian bank. Microsoft says data that happens in Europe will stay in Europe. A complex malware campaign is using heavily obfuscated Visual Basic files to deploy RATs. A widely used CMS platform suffers potential RCE bugs.  North Korea’s Kimsuky targets academic institutions using password-protected research documents. Asus patches a high-severity vulnerability in its Armoury Crate software. CISA’s new leader remains in confirmation limbo. Our guest is Brian Downey, VP of Product Management from Barracuda, talking about how security sprawl increases risk. Operation Fluffy Narwhal thinks it’s time to rethink adversary naming.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>. </p>
<p><strong>CyberWire Guest</strong></p>
<p>We are joined by <a href="https://www.linkedin.com/in/brian-downey-5a2b124/"><u>Brian Downey</u></a>, VP of Product Marketing and Product Management from <a href="https://www.barracuda.com/"><u>Barracuda</u></a>, talking about how security sprawl increases risk. You can find more information about what Brian discussed <a href="https://blog.barracuda.com/2025/06/02/new-global-business-research-security-sprawl-increases-risk"><u>here</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://oversightdemocrats.house.gov/news/press-releases/following-whistleblower-reports-acting-ranking-member-lynch-demands-microsoft"><u>Following Whistleblower Reports, Acting Ranking Member Lynch Demands Microsoft Hand Over Information on DOGE’s Misconduct at NLRB | The Committee on Oversight and Accountability Democrats</u></a> (House Committee on Oversight and Government Reform)</p>
<p><a href="https://therecord.media/pro-israel-hackers-claim-attack-on-iranian-bank"><u>Pro-Israel hackers claim breach of Iranian bank amid military escalation</u></a> (The Record)</p>
<p><a href="https://www.reuters.com/sustainability/boards-policy-regulation/microsoft-lays-out-data-protection-plans-european-cloud-customers-2025-06-16/"><u>Microsoft lays out data protection plans for European cloud customers</u></a> (Reuters)</p>
<p><a href="https://cybersecuritynews.com/new-sophisticated-multi-stage-malware-campaign/"><u>New Sophisticated Multi-Stage Malware Campaign Weaponizes VBS Files to Execute PowerShell Script</u></a> (Cyber Security News)</p>
<p><a href="https://www.infosecurity-magazine.com/news/chained-flaws-cms-sitecore-rce/"><u>Chained Flaws in Enterprise CMS Provider Sitecore Could Allow RCE </u></a>(Infosecurity Magazine)</p>
<p><a href="https://cybersecuritynews.com/beware-of-weaponized-research-papers-that-delivers-malware/"><u>Beware of Weaponized Research Papers That Delivers Malware Via Password-Protected Documents</u></a> (Cyber Security News)</p>
<p><a href="https://www.securityweek.com/organizations-warned-of-vulnerability-exploited-against-discontinued-tp-link-routers/"><u>Organizations Warned of Vulnerability Exploited Against Discontinued TP-Link Routers </u></a>(SecurityWeek)</p>
<p><a href="https://www.securityweek.com/asus-armoury-crate-vulnerability-leads-to-full-system-compromise/"><u>Asus Armoury Crate Vulnerability Leads to Full System Compromise </u></a>(SecurityWeek)</p>
<p><a href="https://www.govinfosecurity.com/trumps-pick-to-lead-cisa-stuck-in-confirmation-limbo-a-28717"><u>Trump’s Pick to Lead CISA is Stuck in Confirmation Limbo</u></a> (Gov Infosecurity)</p>
<p><strong></strong><a href="https://www.justsecurity.org/114442/cyber-threat-actor-naming/"><u>Call Them What They Are: Time to Fix Cyber Threat Actor Naming</u></a> (Just Security)</p>
<p><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1629</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c3dc1238-1c7a-11f0-85e0-8f645f8c107f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6104443841.mp3?updated=1750186778" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Darknet drug marketplace closed for business. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2330/notes</link>
      <description>International law enforcement takes down a darknet drug marketplace. The Washington Post is investigating a cyberattack targeting several journalists' email accounts. Anubis ransomware adds destructive capabilities. The GrayAlpha threat group uses fake browser update pages to deliver advanced malware. Researchers uncover a stealthy malware campaign that hides a malicious payload in a JPEG image. Tenable patches three high-severity vulnerabilities in Nessus Agent. Attackers can disable Secure Boot on many Windows devices by exploiting a firmware flaw. Lawmakers introduce a bipartisan bill to strengthen coordination between CISA and HHS. Harry Coker reflects on his tenure as National Cyber Director. Maria Varmazis checks in with Brandon Karpf on agentic AI. When online chatbots overshare, it’s no laughing Meta. 



CyberWire Guest

Joining us today to discuss Agentic AI and it relates to cybersecurity and space with T-Minus Space Daily host Maria Varmazis is Brandon Karpf, friend of the show, founder of T-Minus Space Daily, and cybersecurity expert.

Selected Reading

Police seizes Archetyp Market drug marketplace, arrests admin (Bleeping Computer)

Washington Post investigating cyberattack on journalists' email accounts, source says (Reuters)

Anubis Ransomware Packs a Wiper to Permanently Delete Files (SecurityWeek)

GrayAlpha Hacker Group Weaponizes Browser Updates to Deploy PowerNet Loader and NetSupport RAT (Cyber Security News)

Malicious Payload Uncovered in JPEG Image Using Steganography and Base64 Obfuscation (Cyber Security News)

Tenable Fixes Three High-Severity Flaws in Vulnerability Scanner Nessus (Infosecurity Magazine)

Microsoft-Signed Firmware Module Bypasses Secure Boot (Gov Infosecurity)

Bipartisan bill aims to create CISA-HHS liaison for hospital cyberattacks (The Record)

Coker: We can’t have economic prosperity or national security without cybersecurity (The Record)

The Meta AI app is a privacy disaster (TechCrunch)

Audience Survey

Complete our annual audience survey before August 31.



Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 16 Jun 2025 20:00:00 -0000</pubDate>
      <itunes:title>Darknet drug marketplace closed for business. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2330</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>International law enforcement takes down a darknet drug marketplace. The Washington Post is investigating a cyberattack targeting several journalists' email accounts. Anubis ransomware adds destructive capabilities. The GrayAlpha threat group uses fake browser update pages to deliver advanced malware. Researchers uncover a stealthy malware campaign that hides a malicious payload in a JPEG image. Tenable patches three high-severity vulnerabilities in Nessus Agent. Attackers can disable Secure Boot on many Windows devices by exploiting a firmware flaw. Lawmakers introduce a bipartisan bill to strengthen coordination between CISA and HHS. Harry Coker reflects on his tenure as National Cyber Director. Maria Varmazis checks in with Brandon Karpf on agentic AI. When online chatbots overshare, it’s no laughing Meta. 



CyberWire Guest

Joining us today to discuss Agentic AI and it relates to cybersecurity and space with T-Minus Space Daily host Maria Varmazis is Brandon Karpf, friend of the show, founder of T-Minus Space Daily, and cybersecurity expert.

Selected Reading

Police seizes Archetyp Market drug marketplace, arrests admin (Bleeping Computer)

Washington Post investigating cyberattack on journalists' email accounts, source says (Reuters)

Anubis Ransomware Packs a Wiper to Permanently Delete Files (SecurityWeek)

GrayAlpha Hacker Group Weaponizes Browser Updates to Deploy PowerNet Loader and NetSupport RAT (Cyber Security News)

Malicious Payload Uncovered in JPEG Image Using Steganography and Base64 Obfuscation (Cyber Security News)

Tenable Fixes Three High-Severity Flaws in Vulnerability Scanner Nessus (Infosecurity Magazine)

Microsoft-Signed Firmware Module Bypasses Secure Boot (Gov Infosecurity)

Bipartisan bill aims to create CISA-HHS liaison for hospital cyberattacks (The Record)

Coker: We can’t have economic prosperity or national security without cybersecurity (The Record)

The Meta AI app is a privacy disaster (TechCrunch)

Audience Survey

Complete our annual audience survey before August 31.



Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>International law enforcement takes down a darknet drug marketplace. The Washington Post is investigating a cyberattack targeting several journalists' email accounts. Anubis ransomware adds destructive capabilities. The GrayAlpha threat group uses fake browser update pages to deliver advanced malware. Researchers uncover a stealthy malware campaign that hides a malicious payload in a JPEG image. Tenable patches three high-severity vulnerabilities in Nessus Agent. Attackers can disable Secure Boot on many Windows devices by exploiting a firmware flaw. Lawmakers introduce a bipartisan bill to strengthen coordination between CISA and HHS. Harry Coker reflects on his tenure as National Cyber Director. Maria Varmazis checks in with Brandon Karpf on agentic AI. When online chatbots overshare, it’s no laughing Meta. </p>
<p><br></p>
<p><strong>CyberWire Guest</strong></p>
<p>Joining us today to discuss Agentic AI and it relates to cybersecurity and space with T-Minus Space Daily host Maria Varmazis is <a href="https://www.linkedin.com/in/brandon-karpf/"><u>Brandon Karpf</u></a>, friend of the show, founder of <a href="https://space.n2k.com/podcasts/t-minus"><u>T-Minus Space Daily</u></a>, and cybersecurity expert.</p>
<p><br><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/police-seizes-archetyp-market-drug-marketplace-arrests-admin/"><u>Police seizes Archetyp Market drug marketplace, arrests admin</u></a> (Bleeping Computer)</p>
<p><a href="https://www.reuters.com/world/us/washington-post-investigating-cyberattack-journalists-wsj-reports-2025-06-15/"><u>Washington Post investigating cyberattack on journalists' email accounts, source says </u></a>(Reuters)</p>
<p><a href="https://www.securityweek.com/anubis-ransomware-packs-a-wiper-to-permanently-delete-files/"><u>Anubis Ransomware Packs a Wiper to Permanently Delete Files </u></a>(SecurityWeek)</p>
<p><a href="https://cybersecuritynews.com/grayalpha-hacker-group-weaponizes-browser-updates/"><u>GrayAlpha Hacker Group Weaponizes Browser Updates to Deploy PowerNet Loader and NetSupport RAT</u></a> (Cyber Security News)</p>
<p><a href="https://cybersecuritynews.com/malicious-payload-uncovered-in-jpeg-image-using-steganography/"><u>Malicious Payload Uncovered in JPEG Image Using Steganography and Base64 Obfuscation</u></a> (Cyber Security News)</p>
<p><a href="https://www.infosecurity-magazine.com/news/tenable-fixes-flaws-nessus/"><u>Tenable Fixes Three High-Severity Flaws in Vulnerability Scanner Nessus</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.govinfosecurity.com/microsoft-signed-firmware-module-bypasses-secure-boot-a-28703"><u>Microsoft-Signed Firmware Module Bypasses Secure Boot</u></a> (Gov Infosecurity)</p>
<p><a href="https://therecord.media/bill-proposes-cisa-hhs-liaison-hospital-cyberattacks"><u>Bipartisan bill aims to create CISA-HHS liaison for hospital cyberattacks</u></a> (The Record)</p>
<p><a href="https://therecord.media/coker-interview-no-economic-security-without-cybersecurity"><u>Coker: We can’t have economic prosperity or national security without cybersecurity</u></a> (The Record)</p>
<p><a href="https://techcrunch.com/2025/06/12/the-meta-ai-app-is-a-privacy-disaster/"><u>The Meta AI app is a privacy disaster</u></a> (TechCrunch)</p>
<p><br><strong>Audience Survey</strong></p>
<p>Complete our <a href="https://www.surveymonkey.com/r/JDV3B73"><u>annual audience survey</u></a> before August 31.</p>
<p><br></p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1884</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c385d9c2-1c7a-11f0-85e0-5ba2485bc878]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6158430436.mp3?updated=1750094099" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mark Nunnikhoven: Providing clarity about security. [Cloud strategy]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/72/notes</link>
      <description>Please enjoy this encore of Career Notes.

Distinguished Cloud Strategist at Lacework, Mark Nunnikhoven, has gone from taking technology to its limits for his own understanding to providing clarity about security for others. Mark fell in love with his Commodore 128 and once he realized he could bend the machine to his will, it set him on the path to technology. While he had some bumps in the road, dropping out of high school and not following the traditional path in college, Mark did complete his masters in information security. His professional life took him from Canadian public service to the private sector where Mark noted the culture shift was an eye-opening experience. Mark always looks to learn something new and share that with others and that is evidenced as his includes teaching as a facet of his career. We thank Mark for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 15 Jun 2025 05:00:00 -0000</pubDate>
      <itunes:title>Mark Nunnikhoven: Providing clarity about security. [Cloud strategy]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>72</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Career Notes.

Distinguished Cloud Strategist at Lacework, Mark Nunnikhoven, has gone from taking technology to its limits for his own understanding to providing clarity about security for others. Mark fell in love with his Commodore 128 and once he realized he could bend the machine to his will, it set him on the path to technology. While he had some bumps in the road, dropping out of high school and not following the traditional path in college, Mark did complete his masters in information security. His professional life took him from Canadian public service to the private sector where Mark noted the culture shift was an eye-opening experience. Mark always looks to learn something new and share that with others and that is evidenced as his includes teaching as a facet of his career. We thank Mark for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>Please enjoy this encore of Career Notes.</strong></em></p>
<p>Distinguished Cloud Strategist at Lacework, Mark Nunnikhoven, has gone from taking technology to its limits for his own understanding to providing clarity about security for others. Mark fell in love with his Commodore 128 and once he realized he could bend the machine to his will, it set him on the path to technology. While he had some bumps in the road, dropping out of high school and not following the traditional path in college, Mark did complete his masters in information security. His professional life took him from Canadian public service to the private sector where Mark noted the culture shift was an eye-opening experience. Mark always looks to learn something new and share that with others and that is evidenced as his includes teaching as a facet of his career. We thank Mark for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>533</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dbbe1f06-47ca-11f0-bef8-af2bb96735ac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1231489314.mp3?updated=1749760046" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hiding in plain sight with vibe coding. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/381/notes</link>
      <description>This week, Dave is joined by ⁠Ziv Karliner⁠, ⁠Pillar Security⁠’s Co-Founder and CTO, sharing details on their work on "New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents." Vibe Coding - where developers use AI assistants like GitHub Copilot and Cursor to generate code almost instantly - has become central to how enterprises build software today. But while it’s turbo-charging development, it’s also introducing new and largely unseen cyber threats.

The team at Pillar Security identified a novel attack vector, the ⁠"Rules File Backdoor"⁠, which allows attackers to manipulate these platforms into generating malicious code. It represents a new class of supply chain attacks that weaponizes AI itself, where the malicious code suggestions blend seamlessly with legitimate ones, bypassing human review and security tools. 

The research can be found here:


  ⁠New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Jun 2025 05:00:00 -0000</pubDate>
      <itunes:title>Hiding in plain sight with vibe coding. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>381</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, Dave is joined by ⁠Ziv Karliner⁠, ⁠Pillar Security⁠’s Co-Founder and CTO, sharing details on their work on "New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents." Vibe Coding - where developers use AI assistants like GitHub Copilot and Cursor to generate code almost instantly - has become central to how enterprises build software today. But while it’s turbo-charging development, it’s also introducing new and largely unseen cyber threats.

The team at Pillar Security identified a novel attack vector, the ⁠"Rules File Backdoor"⁠, which allows attackers to manipulate these platforms into generating malicious code. It represents a new class of supply chain attacks that weaponizes AI itself, where the malicious code suggestions blend seamlessly with legitimate ones, bypassing human review and security tools. 

The research can be found here:


  ⁠New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, Dave is joined by <a href="https://www.linkedin.com/in/zivk/">⁠Ziv Karliner⁠</a>, <a href="https://www.pillar.security/">⁠Pillar Security⁠</a>’s Co-Founder and CTO, sharing details on their work on "New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents." Vibe Coding - where developers use AI assistants like GitHub Copilot and Cursor to generate code almost instantly - has become central to how enterprises build software today. But while it’s turbo-charging development, it’s also introducing new and largely unseen cyber threats.</p>
<p>The team at Pillar Security identified a novel attack vector, the <a href="https://www.pillar.security/blog/new-vulnerability-in-github-copilot-and-cursor-how-hackers-can-weaponize-code-agents">⁠"Rules File Backdoor"⁠</a>, which allows attackers to manipulate these platforms into generating malicious code. It represents a new class of supply chain attacks that weaponizes AI itself, where the malicious code suggestions blend seamlessly with legitimate ones, bypassing human review and security tools. </p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.pillar.security/blog/new-vulnerability-in-github-copilot-and-cursor-how-hackers-can-weaponize-code-agents">⁠New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1309</itunes:duration>
      <guid isPermaLink="false"><![CDATA[f70e631a-487e-11f0-a970-9b429ad32a18]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9140897347.mp3?updated=1749837459" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cloudflare’s cloudy day resolved.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2329/notes</link>
      <description>Cloudflare says yesterday’s widespread outage was not caused by a cyberattack. Predator mobile spyware remains highly active. Microsoft is investigating ongoing Microsoft 365 authentication services issues. An account takeover campaign targets Entra ID users by abusing a popular pen testing tool. Palo Alto Networks documents a JavaScript obfuscation method dubbed “JSFireTruck.” Trend Micro and Mitel patch multiple high-severity vulnerabilities. CISA issues multiple advisories. My Hacking Humans cohost Joe Carrigan joins us to discuss linkless recruiting scams. Uncle Sam wants an AI chatbot. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

Today, we are joined by Joe Carrigan, one of Dave’s Hacking Humans co-hosts, to talk about linkless recruiting scams. You can learn more in this article from The Record: FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters. Tune in to Hacking Humans each Thursday on your favorite podcast app to hear the latest on the social engineering scams that are making the headlines from Joe, Dave and their co-host Maria Varmazis. 



Selected Reading

Cloudflare: Outage not caused by security incident, data is safe (Bleeping Computer)

Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection (Cyber Security News)

Microsoft confirms auth issues affecting Microsoft 365 users (Bleeping Computer)

TeamFiltration Abused in Entra ID Account Takeover Campaign (SecurityWeek)

270K websites injected with ‘JSF-ck’ obfuscated code (SC Media)

Palo Alto Networks Patches Series of Vulnerabilities (Infosecurity Magazine)

SimpleHelp Vulnerability Exploited Against Utility Billing Software Users (SecurityWeek)

Trend Micro fixes critical vulnerabilities in multiple products (Bleeping Computer)

Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking  (SecurityWeek)

CISA Releases Ten Industrial Control Systems Advisories (CISA)

Trump team leaks AI plans in public GitHub repository (The Register)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 13 Jun 2025 20:00:00 -0000</pubDate>
      <itunes:title>Cloudflare’s cloudy day resolved.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2329</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Cloudflare says yesterday’s widespread outage was not caused by a cyberattack. Predator mobile spyware remains highly active. Microsoft is investigating ongoing Microsoft 365 authentication services issues. An account takeover campaign targets Entra ID users by abusing a popular pen testing tool. Palo Alto Networks documents a JavaScript obfuscation method dubbed “JSFireTruck.” Trend Micro and Mitel patch multiple high-severity vulnerabilities. CISA issues multiple advisories. My Hacking Humans cohost Joe Carrigan joins us to discuss linkless recruiting scams. Uncle Sam wants an AI chatbot. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

Today, we are joined by Joe Carrigan, one of Dave’s Hacking Humans co-hosts, to talk about linkless recruiting scams. You can learn more in this article from The Record: FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters. Tune in to Hacking Humans each Thursday on your favorite podcast app to hear the latest on the social engineering scams that are making the headlines from Joe, Dave and their co-host Maria Varmazis. 



Selected Reading

Cloudflare: Outage not caused by security incident, data is safe (Bleeping Computer)

Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection (Cyber Security News)

Microsoft confirms auth issues affecting Microsoft 365 users (Bleeping Computer)

TeamFiltration Abused in Entra ID Account Takeover Campaign (SecurityWeek)

270K websites injected with ‘JSF-ck’ obfuscated code (SC Media)

Palo Alto Networks Patches Series of Vulnerabilities (Infosecurity Magazine)

SimpleHelp Vulnerability Exploited Against Utility Billing Software Users (SecurityWeek)

Trend Micro fixes critical vulnerabilities in multiple products (Bleeping Computer)

Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking  (SecurityWeek)

CISA Releases Ten Industrial Control Systems Advisories (CISA)

Trump team leaks AI plans in public GitHub repository (The Register)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cloudflare says yesterday’s widespread outage was not caused by a cyberattack. Predator mobile spyware remains highly active. Microsoft is investigating ongoing Microsoft 365 authentication services issues. An account takeover campaign targets Entra ID users by abusing a popular pen testing tool. Palo Alto Networks documents a JavaScript obfuscation method dubbed “JSFireTruck.” Trend Micro and Mitel patch multiple high-severity vulnerabilities. CISA issues multiple advisories. My Hacking Humans cohost Joe Carrigan joins us to discuss linkless recruiting scams. Uncle Sam wants an AI chatbot. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br></p>
<p><strong>CyberWire Guest</strong></p>
<p>Today, we are joined by <a href="https://www.linkedin.com/in/joecarrigan/"><u>Joe Carrigan</u></a>, one of Dave’s <a href="https://thecyberwire.com/podcasts/hacking-humans"><u>Hacking Humans</u></a> co-hosts, to talk about linkless recruiting scams. You can learn more in this article from The Record: <a href="https://therecord.media/fin6-recruitment-scam-malware-campaign"><u>FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters</u></a>. Tune in to Hacking Humans each Thursday on your favorite podcast app to hear the latest on the social engineering scams that are making the headlines from Joe, Dave and their co-host Maria Varmazis. </p>
<p><br></p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/cloudflare-outage-not-caused-by-security-incident-data-is-safe/"><u>Cloudflare: Outage not caused by security incident, data is safe</u></a> (Bleeping Computer)</p>
<p><a href="https://cybersecuritynews.com/predator-mobile-spyware-remains-consistent/"><u>Predator Mobile Spyware Remains Consistent with New Design Changes to Evade Detection</u></a> (Cyber Security News)</p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-confirms-auth-issues-affecting-microsoft-365-users/"><u>Microsoft confirms auth issues affecting Microsoft 365 users</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/teamfiltration-abused-in-entra-id-account-takeover-campaign/"><u>TeamFiltration Abused in Entra ID Account Takeover Campaign</u></a> (SecurityWeek)</p>
<p><a href="https://www.scworld.com/news/270k-websites-injected-with-jsf-ck-obfuscated-code"><u>270K websites injected with ‘JSF-ck’ obfuscated code</u></a> (SC Media)</p>
<p><a href="https://www.infosecurity-magazine.com/news/palo-alto-networks-patches-series/"><u>Palo Alto Networks Patches Series of Vulnerabilities</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.securityweek.com/simplehelp-vulnerability-exploited-against-utility-billing-software-users/"><u>SimpleHelp Vulnerability Exploited Against Utility Billing Software Users</u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/trend-micro-fixes-six-critical-flaws-on-apex-central-endpoint-encryption-policyserver/"><u>Trend Micro fixes critical vulnerabilities in multiple products</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/critical-vulnerability-exposes-many-mitel-micollab-instances-to-remote-hacking/"><u>Critical Vulnerability Exposes Many Mitel MiCollab Instances to Remote Hacking </u></a> (SecurityWeek)</p>
<p><a href="https://www.cisa.gov/news-events/alerts/2025/06/12/cisa-releases-ten-industrial-control-systems-advisories"><u>CISA Releases Ten Industrial Control Systems Advisories</u></a> (CISA)</p>
<p><a href="https://www.theregister.com/2025/06/10/trump_admin_leak_government_ai_plans/"><u>Trump team leaks AI plans in public GitHub repository</u></a> (The Register)</p>
<p><br><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1383</itunes:duration>
      <guid isPermaLink="false"><![CDATA[c35c6cb8-1c7a-11f0-85e0-9b6dac0b7335]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2468931533.mp3?updated=1749835385" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scam operations disrupted across Asia. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2328/notes</link>
      <description>Interpol’s Operation Secure dismantles a major cybercrime network, and Singapore takes down scam centers. GitLab patches multiple vulnerabilities in its DevSecOps platform. Researchers unveil a covert method for exfiltrating data using smartwatches. EchoLeak allows for data exfiltration from Microsoft Copilot. Journalists are confirmed targets of Paragon’s Graphite spyware. France calls for comments on tracking pixels. Fog ransomware operators deploy an unusual mix of tools. Skeleton Spider targets recruiters by posing as job seekers on LinkedIn and Indeed. Erie Insurance suffers ongoing outages following a cyberattack. Our N2K Lead Analyst Ethan Cook shares insights on Trump’s antitrust policies. DNS neglect leads to AI subdomain exploits.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today, we share a selection from today’s Caveat podcast where Dave Bittner and Ben Yelin are joined by N2K’s Lead Analyst, Ethan Cook, to take a Policy Deep Dive into “The art of the breakup: Trump’s antitrust surge.” You can listen to the full episode here and find new episodes of Caveat in your favorite podcast app each Thursday.  

Selected Reading

Interpol takes down 20,000 malicious IPs and domains (Cybernews)

Singapore leads multinational operation to shutter scam centers tied to $225 million in thefts (The Record)

GitLab patches high severity account takeover, missing auth issues (Bleeping Computer)

SmartAttack uses smartwatches to steal data from air-gapped systems (Bleeping Computer)

Critical vulnerability in Microsoft 365 Copilot AI called EchoLeak enabled data exfiltration (Beyond Machines)

Researchers confirm two journalists were hacked with Paragon spyware (TechCrunch)

Tracking pixels: CNIL launches public consultation on its draft recommendation (CNIL)

Fog ransomware attack uses unusual mix of legitimate and open-source tools (Bleeping Computer)

FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters (The Record)

Erie Insurance confirms cyberattack behind business disruptions (Bleeping Computer)

Why Was Nvidia Hosting Blogs About 'Brazilian Facesitting Fart Games'? (404 Media) 

Secure your public DNS presence from subdomain takeovers and dangling DNS exploits (Silent Push)



Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 12 Jun 2025 20:00:00 -0000</pubDate>
      <itunes:title>Scam operations disrupted across Asia. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2328</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Interpol’s Operation Secure dismantles a major cybercrime network, and Singapore takes down scam centers. GitLab patches multiple vulnerabilities in its DevSecOps platform. Researchers unveil a covert method for exfiltrating data using smartwatches. EchoLeak allows for data exfiltration from Microsoft Copilot. Journalists are confirmed targets of Paragon’s Graphite spyware. France calls for comments on tracking pixels. Fog ransomware operators deploy an unusual mix of tools. Skeleton Spider targets recruiters by posing as job seekers on LinkedIn and Indeed. Erie Insurance suffers ongoing outages following a cyberattack. Our N2K Lead Analyst Ethan Cook shares insights on Trump’s antitrust policies. DNS neglect leads to AI subdomain exploits.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today, we share a selection from today’s Caveat podcast where Dave Bittner and Ben Yelin are joined by N2K’s Lead Analyst, Ethan Cook, to take a Policy Deep Dive into “The art of the breakup: Trump’s antitrust surge.” You can listen to the full episode here and find new episodes of Caveat in your favorite podcast app each Thursday.  

Selected Reading

Interpol takes down 20,000 malicious IPs and domains (Cybernews)

Singapore leads multinational operation to shutter scam centers tied to $225 million in thefts (The Record)

GitLab patches high severity account takeover, missing auth issues (Bleeping Computer)

SmartAttack uses smartwatches to steal data from air-gapped systems (Bleeping Computer)

Critical vulnerability in Microsoft 365 Copilot AI called EchoLeak enabled data exfiltration (Beyond Machines)

Researchers confirm two journalists were hacked with Paragon spyware (TechCrunch)

Tracking pixels: CNIL launches public consultation on its draft recommendation (CNIL)

Fog ransomware attack uses unusual mix of legitimate and open-source tools (Bleeping Computer)

FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters (The Record)

Erie Insurance confirms cyberattack behind business disruptions (Bleeping Computer)

Why Was Nvidia Hosting Blogs About 'Brazilian Facesitting Fart Games'? (404 Media) 

Secure your public DNS presence from subdomain takeovers and dangling DNS exploits (Silent Push)



Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Interpol’s Operation Secure dismantles a major cybercrime network, and Singapore takes down scam centers. GitLab patches multiple vulnerabilities in its DevSecOps platform. Researchers unveil a covert method for exfiltrating data using smartwatches. EchoLeak allows for data exfiltration from Microsoft Copilot. Journalists are confirmed targets of Paragon’s Graphite spyware. France calls for comments on tracking pixels. Fog ransomware operators deploy an unusual mix of tools. Skeleton Spider targets recruiters by posing as job seekers on LinkedIn and Indeed. Erie Insurance suffers ongoing outages following a cyberattack. Our N2K Lead Analyst Ethan Cook shares insights on Trump’s antitrust policies. DNS neglect leads to AI subdomain exploits.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br><strong>CyberWire Guest</strong></p>
<p>Today, we share a selection from today’s <a href="https://thecyberwire.com/podcasts/caveat"><u>Caveat</u></a> podcast where Dave Bittner and Ben Yelin are joined by N2K’s Lead Analyst, Ethan Cook, to take a Policy Deep Dive into “The art of the breakup: Trump’s antitrust surge.” You can listen to the full episode <a href="https://thecyberwire.com/podcasts/caveat/265/notes"><u>here</u></a> and find new episodes of Caveat in your favorite podcast app each Thursday.  </p>
<p><br><strong>Selected Reading</strong></p>
<p><a href="https://cnews.link/interpol-takes-down-20000-malicious-ips-and-domains-2/"><u>Interpol takes down 20,000 malicious IPs and domains</u></a> (Cybernews)</p>
<p><a href="https://therecord.media/asia-scam-center-takedowns-singapore-police"><u>Singapore leads multinational operation to shutter scam centers tied to $225 million in thefts</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/gitlab-patches-high-severity-account-takeover-missing-auth-issues/"><u>GitLab patches high severity account takeover, missing auth issues</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/smartattack-uses-smartwatches-to-steal-data-from-air-gapped-systems/"><u>SmartAttack uses smartwatches to steal data from air-gapped systems</u></a> (Bleeping Computer)</p>
<p><a href="https://beyondmachines.net/event_details/critical-vulnerability-in-microsoft-365-copilot-ai-called-echoleak-enabled-data-exfiltration-9-w-s-e-v/gD2P6Ple2L"><u>Critical vulnerability in Microsoft 365 Copilot AI called EchoLeak enabled data exfiltration</u></a> (Beyond Machines)</p>
<p><a href="https://techcrunch.com/2025/06/12/researchers-confirm-two-journalists-were-hacked-with-paragon-spyware/"><u>Researchers confirm two journalists were hacked with Paragon spyware</u></a> (TechCrunch)</p>
<p><a href="https://www.cnil.fr/fr/consultation-publique-projet-recommandation-pixels-de-suivi"><u>Tracking pixels: CNIL launches public consultation on its draft recommendation</u></a> (CNIL)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/fog-ransomware-attack-uses-unusual-mix-of-legitimate-and-open-source-tools/"><u>Fog ransomware attack uses unusual mix of legitimate and open-source tools</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/fin6-recruitment-scam-malware-campaign"><u>FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters</u></a> (The Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/erie-insurance-confirms-cyberattack-behind-business-disruptions/"><u>Erie Insurance confirms cyberattack behind business disruptions</u></a> (Bleeping Computer)</p>
<p><a href="https://www.404media.co/spam-blogs-ai-slop-domains-wowlazy/"><u>Why Was Nvidia Hosting Blogs About 'Brazilian Facesitting Fart Games'?</u></a> (404 Media) </p>
<p><strong></strong><a href="https://www.silentpush.com/blog/subdomain-takeovers-and-dangling-dns-exploits/"><u>Secure your public DNS presence from subdomain takeovers and dangling DNS exploits</u></a> (Silent Push)</p>
<p><br></p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1684</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c331b54a-1c7a-11f0-85e0-87b62462163d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1304038404.mp3?updated=1749757407" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ghost students “haunting” online colleges. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2327/notes</link>
      <description>Patch Tuesday. Mozilla  patches two critical FireFox security flaws. A critical flaw in Salesforce OmniStudio exposes sensitive customer data stored in plain text. The Badbox botnet continues to evolve. AI-powered “ghost students” enrolling in online college courses to steal government funds. Hackers steal nearly 300,000 vehicle crash reports from the Texas Department of Transportation. ConnectWise rotates its digital code signing certificates. The chair of the House Homeland Security Committee announces his upcoming retirement. Our guest is Matt Radolec, VP of Incident Response, Cloud Operations &amp; SE EU from Varonis, wondering if AI may be the Cerberus of our time. Friendly skies…or friendly spies? 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

On our Industry Voices segment, we have Matt Radolec, VP of Incident Response, Cloud Operations &amp; SE EU from Varonis, sharing insights on AI: The Cerberus of our time. You can hear Matt’s full interview here. The State of Data Security: Quantifying AI’s Impact on Data Risk report from Varonis reveals how much sensitive data is exposed and at risk in the AI era. Learn more and get State of Data Security Report.

Selected Reading

Microsoft warns of 66 flaws to fix for this Patch Tuesday, and two are under active attack (The Register)

Microsoft slows Windows 11 24H2 Patch Tuesday due to a 'compatibility issue'  (The Register)

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, CISA (SecurityWeek)

Firefox Patches Multiple Vulnerabilities That Could Lead to Browser Crash (Cyber Security News)

Salesforce OmniStudio Vulnerabilities Exposes Sensitive Customer Data in Plain Text (Cyber Security News)

CISO who helped unmask Badbox warns: Version 3 is coming (The Register)

How Scammers Are Using AI to Steal College Financial Aid  (SecurityWeek)

300K Crash Reports Stolen in Texas DOT Hack (BankInfoSecurity)

ConnectWise rotating code signing certificates over security concerns (Bleeping Computer)

House Homeland Chairman Mark Green’s departure could leave congressional cyber agenda in limbo (CyberScoop)

Airlines Don't Want You to Know They Sold Your Flight Data to DHS (404 Media)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 11 Jun 2025 20:00:00 -0000</pubDate>
      <itunes:title>Ghost students “haunting” online colleges. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2327</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Patch Tuesday. Mozilla  patches two critical FireFox security flaws. A critical flaw in Salesforce OmniStudio exposes sensitive customer data stored in plain text. The Badbox botnet continues to evolve. AI-powered “ghost students” enrolling in online college courses to steal government funds. Hackers steal nearly 300,000 vehicle crash reports from the Texas Department of Transportation. ConnectWise rotates its digital code signing certificates. The chair of the House Homeland Security Committee announces his upcoming retirement. Our guest is Matt Radolec, VP of Incident Response, Cloud Operations &amp; SE EU from Varonis, wondering if AI may be the Cerberus of our time. Friendly skies…or friendly spies? 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

On our Industry Voices segment, we have Matt Radolec, VP of Incident Response, Cloud Operations &amp; SE EU from Varonis, sharing insights on AI: The Cerberus of our time. You can hear Matt’s full interview here. The State of Data Security: Quantifying AI’s Impact on Data Risk report from Varonis reveals how much sensitive data is exposed and at risk in the AI era. Learn more and get State of Data Security Report.

Selected Reading

Microsoft warns of 66 flaws to fix for this Patch Tuesday, and two are under active attack (The Register)

Microsoft slows Windows 11 24H2 Patch Tuesday due to a 'compatibility issue'  (The Register)

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, CISA (SecurityWeek)

Firefox Patches Multiple Vulnerabilities That Could Lead to Browser Crash (Cyber Security News)

Salesforce OmniStudio Vulnerabilities Exposes Sensitive Customer Data in Plain Text (Cyber Security News)

CISO who helped unmask Badbox warns: Version 3 is coming (The Register)

How Scammers Are Using AI to Steal College Financial Aid  (SecurityWeek)

300K Crash Reports Stolen in Texas DOT Hack (BankInfoSecurity)

ConnectWise rotating code signing certificates over security concerns (Bleeping Computer)

House Homeland Chairman Mark Green’s departure could leave congressional cyber agenda in limbo (CyberScoop)

Airlines Don't Want You to Know They Sold Your Flight Data to DHS (404 Media)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Patch Tuesday. Mozilla  patches two critical FireFox security flaws. A critical flaw in Salesforce OmniStudio exposes sensitive customer data stored in plain text. The Badbox botnet continues to evolve. AI-powered “ghost students” enrolling in online college courses to steal government funds. Hackers steal nearly 300,000 vehicle crash reports from the Texas Department of Transportation. ConnectWise rotates its digital code signing certificates. The chair of the House Homeland Security Committee announces his upcoming retirement. Our guest is Matt Radolec, VP of Incident Response, Cloud Operations &amp; SE EU from Varonis, wondering if AI may be the Cerberus of our time. Friendly skies…or friendly spies? </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br></p>
<p><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment, we have <a href="https://www.linkedin.com/in/matthew-radolec/"><u>Matt Radolec</u></a>, VP of Incident Response, Cloud Operations &amp; SE EU from <a href="https://www.linkedin.com/company/varonis/"><u>Varonis</u></a>, sharing insights on AI: The Cerberus of our time. You can hear Matt’s full interview <a href="https://explore.thecyberwire.com/varonis"><u>here</u></a>. The State of Data Security: Quantifying AI’s Impact on Data Risk report from Varonis reveals how much sensitive data is exposed and at risk in the AI era. Learn more and get <a href="https://info.varonis.com/en/state-of-data-security-report-2025"><u>State of Data Security Report</u></a>.<br></p>
<p><br><strong>Selected Reading</strong></p>
<p><a href="https://www.theregister.com/2025/06/10/microsoft_patch_tuesday_june/"><u>Microsoft warns of 66 flaws to fix for this Patch Tuesday, and two are under active attack</u></a> (The Register)</p>
<p><a href="https://www.theregister.com/2025/06/11/microsoft_slows_windows_11_24h2/"><u>Microsoft slows Windows 11 24H2 Patch Tuesday due to a 'compatibility issue'</u></a>  (The Register)</p>
<p><a href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-siemens-schneider-aveva-cisa/"><u>ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Aveva, CISA</u></a> (SecurityWeek)</p>
<p><a href="https://cybersecuritynews.com/firefox-patches-multiple-vulnerabilities/"><u>Firefox Patches Multiple Vulnerabilities That Could Lead to Browser Crash</u></a> (Cyber Security News)</p>
<p><a href="https://cybersecuritynews.com/salesforce-omnistudio-vulnerabilities/"><u>Salesforce OmniStudio Vulnerabilities Exposes Sensitive Customer Data in Plain Text</u></a> (Cyber Security News)</p>
<p><a href="https://www.theregister.com/2025/06/11/badbox_round_three/"><u>CISO who helped unmask Badbox warns: Version 3 is coming</u></a> (The Register)</p>
<p><a href="https://www.securityweek.com/how-scammers-are-using-ai-to-steal-college-financial-aid/"><u>How Scammers Are Using AI to Steal College Financial Aid</u></a>  (SecurityWeek)</p>
<p><a href="https://www.govinfosecurity.com/300k-crash-reports-stolen-in-texas-dot-hack-a-28646"><u>300K Crash Reports Stolen in Texas DOT Hack</u></a> (BankInfoSecurity)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/connectwise-rotating-code-signing-certificates-over-security-concerns/"><u>ConnectWise rotating code signing certificates over security concerns</u></a> (Bleeping Computer)</p>
<p><a href="https://cyberscoop.com/mark-green-house-homeland-chairman-cybersecurity-agenda/"><u>House Homeland Chairman Mark Green’s departure could leave congressional cyber agenda in limbo</u></a> (CyberScoop)</p>
<p><a href="https://www.404media.co/airlines-dont-want-you-to-know-they-sold-your-flight-data-to-dhs/"><u>Airlines Don't Want You to Know They Sold Your Flight Data to DHS</u></a> (404 Media)</p>
<p><br><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1866</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c3091676-1c7a-11f0-85e0-0707df347002]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4558363450.mp3?updated=1749665551" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jedai tricks, human risks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2326/notes</link>
      <description>An unsecured Chroma database exposes personal information of Canva Creators. A researcher brute-forces Google phone numbers.  Five zero-day vulnerabilities in Salesforce Industry Cloud are uncovered. Librarian Ghouls target Russian organizations with stealthy malware. SAP releases multiple security patches including a critical fix for a NetWeaver bug. Sensata Technologies confirms the theft of sensitive personal data during an April ransomware attack.SentinelOne warns of targeted cyber-espionage attempts by China-linked threat actors. Skitnet gains traction amongst ransomware gangs. The UK’s NHS issues an urgent appeal for blood donors. On today’s Threat Vector, host David Moulton talks with Arjun Bhatnagar, CEO of Cloaked, about why protecting your digital privacy is more urgent than ever. The FBI’s Cyber Division welcomes a new leader. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment

In this segment of Threat Vector, host David Moulton talks with Arjun Bhatnagar, CEO of Cloaked, about why protecting your digital privacy is more urgent than ever. From building better cybersecurity habits to understanding the hidden risks in everyday apps, Arjun shares practical advice that listeners can use immediately. You can hear David and Arjun's full discussion on Threat Vector ⁠here⁠ and catch new episodes every Thursday on your favorite podcast app.

Selected Reading

Canva Creators' Data Exposed Via AI Chatbot Company Database (Cyber Security News)

Google brute-force attack exposes phone numbers in minutes (The Register)

Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud (SecurityWeek)

'Librarian Ghouls' APT Group Actively Attacking Organizations To Deploy Malware (Cyber Security News)

Critical Vulnerability Patched in SAP NetWeaver (SecurityWeek)

Sensitive Information Stolen in Sensata Ransomware Attack (SecurityWeek)

SentinelOne Warns Cybersecurity Vendors of Chinese Attacks (Infosecurity Magazine)

Skitnet Malware Actively Adopted by Ransomware Gangs to Enhance Operational Efficiency (GB Hackers)

NHS calls for 1 million blood donors as UK stocks remain low following cyberattack (The Record) – mentioning this in the Briefing

Brett Leatherman to follow Bryan Vorndran as head of FBI Cyber Division (The Record)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Jun 2025 20:10:00 -0000</pubDate>
      <itunes:title>Jedai tricks, human risks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2326</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>An unsecured Chroma database exposes personal information of Canva Creators. A researcher brute-forces Google phone numbers.  Five zero-day vulnerabilities in Salesforce Industry Cloud are uncovered. Librarian Ghouls target Russian organizations with stealthy malware. SAP releases multiple security patches including a critical fix for a NetWeaver bug. Sensata Technologies confirms the theft of sensitive personal data during an April ransomware attack.SentinelOne warns of targeted cyber-espionage attempts by China-linked threat actors. Skitnet gains traction amongst ransomware gangs. The UK’s NHS issues an urgent appeal for blood donors. On today’s Threat Vector, host David Moulton talks with Arjun Bhatnagar, CEO of Cloaked, about why protecting your digital privacy is more urgent than ever. The FBI’s Cyber Division welcomes a new leader. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment

In this segment of Threat Vector, host David Moulton talks with Arjun Bhatnagar, CEO of Cloaked, about why protecting your digital privacy is more urgent than ever. From building better cybersecurity habits to understanding the hidden risks in everyday apps, Arjun shares practical advice that listeners can use immediately. You can hear David and Arjun's full discussion on Threat Vector ⁠here⁠ and catch new episodes every Thursday on your favorite podcast app.

Selected Reading

Canva Creators' Data Exposed Via AI Chatbot Company Database (Cyber Security News)

Google brute-force attack exposes phone numbers in minutes (The Register)

Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud (SecurityWeek)

'Librarian Ghouls' APT Group Actively Attacking Organizations To Deploy Malware (Cyber Security News)

Critical Vulnerability Patched in SAP NetWeaver (SecurityWeek)

Sensitive Information Stolen in Sensata Ransomware Attack (SecurityWeek)

SentinelOne Warns Cybersecurity Vendors of Chinese Attacks (Infosecurity Magazine)

Skitnet Malware Actively Adopted by Ransomware Gangs to Enhance Operational Efficiency (GB Hackers)

NHS calls for 1 million blood donors as UK stocks remain low following cyberattack (The Record) – mentioning this in the Briefing

Brett Leatherman to follow Bryan Vorndran as head of FBI Cyber Division (The Record)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An unsecured Chroma database exposes personal information of Canva Creators. A researcher brute-forces Google phone numbers.  Five zero-day vulnerabilities in Salesforce Industry Cloud are uncovered. Librarian Ghouls target Russian organizations with stealthy malware. SAP releases multiple security patches including a critical fix for a NetWeaver bug. Sensata Technologies confirms the theft of sensitive personal data during an April ransomware attack.SentinelOne warns of targeted cyber-espionage attempts by China-linked threat actors. Skitnet gains traction amongst ransomware gangs. The UK’s NHS issues an urgent appeal for blood donors. On today’s Threat Vector, host David Moulton talks with Arjun Bhatnagar, CEO of Cloaked, about why protecting your digital privacy is more urgent than ever. The FBI’s Cyber Division welcomes a new leader. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Threat Vector Segment</strong></p>
<p>In this segment of Threat Vector, host David Moulton talks with<a href="https://www.linkedin.com/in/arjunbhatnagar/"><u> Arjun Bhatnagar</u></a>, CEO of Cloaked, about why protecting your digital privacy is more urgent than ever. From building better cybersecurity habits to understanding the hidden risks in everyday apps, Arjun shares practical advice that listeners can use immediately. You can hear David and Arjun's full discussion on Threat Vector <a href="https://thecyberwire.com/podcasts/threat-vector/70/notes"><u>⁠here⁠</u></a> and catch new episodes every Thursday on your favorite podcast app.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://cybersecuritynews.com/canva-creators-data-exposed/"><u>Canva Creators' Data Exposed Via AI Chatbot Company Database</u></a> (Cyber Security News)</p>
<p><a href="https://www.theregister.com/2025/06/10/google_brute_force_phone_number/"><u>Google brute-force attack exposes phone numbers in minutes</u></a> (The Register)</p>
<p><a href="https://www.securityweek.com/five-zero-days-15-misconfigurations-found-in-salesforce-industry-cloud/"><u>Five Zero-Days, 15 Misconfigurations Found in Salesforce Industry Cloud</u></a> (SecurityWeek)</p>
<p><a href="https://cybersecuritynews.com/librarian-ghouls-apt-group-actively-attacking-organizations/"><u>'Librarian Ghouls' APT Group Actively Attacking Organizations To Deploy Malware</u></a> (Cyber Security News)</p>
<p><a href="https://www.securityweek.com/critical-vulnerability-patched-in-sap-netweaver/"><u>Critical Vulnerability Patched in SAP NetWeaver</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/sensitive-information-stolen-in-sensata-ransomware-attack/"><u>Sensitive Information Stolen in Sensata Ransomware Attack</u></a> (SecurityWeek)</p>
<p><a href="https://www.infosecurity-magazine.com/news/sentinelone-cybersecurity-vendors/"><u>SentinelOne Warns Cybersecurity Vendors of Chinese Attacks</u></a> (Infosecurity Magazine)</p>
<p><a href="https://gbhackers.com/skitnet-malware-actively-adopted-by-ransomware-gangs/"><u>Skitnet Malware Actively Adopted by Ransomware Gangs to Enhance Operational Efficiency</u></a> (GB Hackers)</p>
<p><a href="https://therecord.media/uk-nhs-calls-for-blood-donations-after-cyberattack"><u>NHS calls for 1 million blood donors as UK stocks remain low following cyberattack</u></a> (The Record) – mentioning this in the Briefing</p>
<p><a href="https://therecord.media/brett-leatherman-fbi-cyber-replacing-bryan-vorndran"><u>Brett Leatherman to follow Bryan Vorndran as head of FBI Cyber Division</u></a> (The Record)</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1679</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c2ddd056-1c7a-11f0-85e0-d7dbf4be236a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1575065819.mp3?updated=1749581487" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>White House reboots cybersecurity priorities.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2325/notes</link>
      <description>A new White House executive Order overhauls U.S. cybersecurity policy. The EU updates its “cybersecurity blueprint”. The Pentagon’s inspector general  investigates Defense Secretary Hegseth’s Signal messages. Chinese hackers target U.S. smartphones. A new Mirai botnet variant drops malware on vulnerable DVRs. 17 popular Gluestack packages on NPM have been compromised. Attackers exploit vulnerabilities in Fortigate security appliances to deploy Qilin ransomware. A Nigerian man gets five years in prison for a hacking and fraud scheme. Our guest is Tim Starks from CyberScoop, discussing Sean Cairncross’ journey toward confirmation as the next National Cyber Director. Fire Stick flicks spark a full-on legal blitz.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Tim Starks from CyberScoop, to discuss Sean Cairncross, who’s bringing a focus on policy coordination if confirmed as the next National Cyber Director.

Selected Reading

Trump Administration Revises Cybersecurity Rules, Replaces Biden Order (Infosecurity Magazine)

Europe arms itself against cyber catastrophe (Politico)

Pentagon watchdog investigates if staffers were asked to delete Hegseth’s Signal messages (Associated Press)

Chinese hackers and user lapses turn smartphones into a 'mobile security crisis' (Associated Press)

iMessage Zero-Click Attacks Suspected in Targeting of High-Value EU, US Individuals (SecurityWeek)

New Mirai botnet infect TBK DVR devices via command injection flaw (Bleeping Computer)

Malware found in NPM packages with 1 million weekly downloads (Bleeping Computer)

Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware (Cyber Security News)

Nigerian Involved in Hacking US Tax Preparation Firms Sentenced to Prison (SecurityWeek)

Hacked Fire Sticks now come with more than just malware – a possible jail sentence (Cybernews)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 09 Jun 2025 20:10:00 -0000</pubDate>
      <itunes:title>White House reboots cybersecurity priorities.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2325</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A new White House executive Order overhauls U.S. cybersecurity policy. The EU updates its “cybersecurity blueprint”. The Pentagon’s inspector general  investigates Defense Secretary Hegseth’s Signal messages. Chinese hackers target U.S. smartphones. A new Mirai botnet variant drops malware on vulnerable DVRs. 17 popular Gluestack packages on NPM have been compromised. Attackers exploit vulnerabilities in Fortigate security appliances to deploy Qilin ransomware. A Nigerian man gets five years in prison for a hacking and fraud scheme. Our guest is Tim Starks from CyberScoop, discussing Sean Cairncross’ journey toward confirmation as the next National Cyber Director. Fire Stick flicks spark a full-on legal blitz.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Tim Starks from CyberScoop, to discuss Sean Cairncross, who’s bringing a focus on policy coordination if confirmed as the next National Cyber Director.

Selected Reading

Trump Administration Revises Cybersecurity Rules, Replaces Biden Order (Infosecurity Magazine)

Europe arms itself against cyber catastrophe (Politico)

Pentagon watchdog investigates if staffers were asked to delete Hegseth’s Signal messages (Associated Press)

Chinese hackers and user lapses turn smartphones into a 'mobile security crisis' (Associated Press)

iMessage Zero-Click Attacks Suspected in Targeting of High-Value EU, US Individuals (SecurityWeek)

New Mirai botnet infect TBK DVR devices via command injection flaw (Bleeping Computer)

Malware found in NPM packages with 1 million weekly downloads (Bleeping Computer)

Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware (Cyber Security News)

Nigerian Involved in Hacking US Tax Preparation Firms Sentenced to Prison (SecurityWeek)

Hacked Fire Sticks now come with more than just malware – a possible jail sentence (Cybernews)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A new White House executive Order overhauls U.S. cybersecurity policy. The EU updates its “cybersecurity blueprint”. The Pentagon’s inspector general  investigates Defense Secretary Hegseth’s Signal messages. Chinese hackers target U.S. smartphones. A new Mirai botnet variant drops malware on vulnerable DVRs. 17 popular Gluestack packages on NPM have been compromised. Attackers exploit vulnerabilities in Fortigate security appliances to deploy Qilin ransomware. A Nigerian man gets five years in prison for a hacking and fraud scheme. Our guest is Tim Starks from CyberScoop, discussing Sean Cairncross’ journey toward confirmation as the next National Cyber Director. Fire Stick flicks spark a full-on legal blitz.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/tstarks/"><u>Tim Starks</u></a> from <a href="https://www.linkedin.com/company/cyberscoop/"><u>CyberScoop</u></a>, to discuss Sean Cairncross, who’s bringing a focus on policy coordination if confirmed as the next National Cyber Director.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.infosecurity-magazine.com/news/trump-new-cyber-executive-order/"><u>Trump Administration Revises Cybersecurity Rules, Replaces Biden Order</u> </a>(Infosecurity Magazine)</p>
<p><a href="https://www.politico.eu/article/europe-arms-cyber-council-military-council-daily-european-council/"><u>Europe arms itself against cyber catastrophe</u></a> (Politico)</p>
<p><a href="https://apnews.com/article/hegseth-signal-investigation-pentagon-trump-3cf7e90fe58f1ee10a07f386bd33c201"><u>Pentagon watchdog investigates if staffers were asked to delete Hegseth’s Signal messages</u></a> (Associated Press)</p>
<p><a href="https://apnews.com/article/china-cybersecurity-hacking-smartphones-37bb5f10c6e21fec2863b1faf269cecc"><u>Chinese hackers and user lapses turn smartphones into a 'mobile security crisis'</u></a> (Associated Press)</p>
<p><a href="https://www.securityweek.com/imessage-zero-click-attacks-suspected-in-targeting-of-high-value-eu-us-individuals/"><u>iMessage Zero-Click Attacks Suspected in Targeting of High-Value EU, US Individuals</u> </a>(SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/new-mirai-botnet-infect-tbk-dvr-devices-via-command-injection-flaw/"><u>New Mirai botnet infect TBK DVR devices via command injection flaw</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/supply-chain-attack-hits-gluestack-npm-packages-with-960k-weekly-downloads/"><u>Malware found in NPM packages with 1 million weekly downloads</u></a> (Bleeping Computer)</p>
<p><a href="https://cybersecuritynews.com/hackers-actively-exploiting-fortigate-vulnerabilities/"><u>Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware</u></a> (Cyber Security News)</p>
<p><a href="https://www.securityweek.com/nigerian-involved-in-hacking-us-tax-preparation-firms-sentenced-to-prison/"><u>Nigerian Involved in Hacking US Tax Preparation Firms Sentenced to Prison</u> </a>(SecurityWeek)</p>
<p><a href="https://cnews.link/hacked-amazon-fire-stick-crackdown-1/"><u>Hacked Fire Sticks now come with more than just malware – a possible jail sentence</u></a> (Cybernews)</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1812</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c2b2fcf0-1c7a-11f0-85e0-479445e38ae2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9660694837.mp3?updated=1749498211" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ell Marquez: It's okay to be new. [Linux] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/71/notes</link>
      <description>Please enjoy this encore of Career Notes.

Linux and Security Advocate at Intezer Ell Marquez shares her journey from the family ranch to security. Needing a life change due to a bunch of circumstances that had occurred that left her almost homeless, Ell found out about a six week Linux boot camp that took her down the path toward technology. She fell in love with security at at BSides Conference and hasn't looked back. Ell says she recently started a campaign called "it's okay to be new" noting that no matter how long you've been in the industry, you need to be new because technology changes so quickly. She concludes by offering one final piece of advice to everybody is just "be unapologetically yourself." We thank Ell for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 08 Jun 2025 07:00:00 -0000</pubDate>
      <itunes:title>Ell Marquez: It's okay to be new. [Linux] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>71</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/56656620-4310-11f0-9d8c-4365792726fd/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes.

Linux and Security Advocate at Intezer Ell Marquez shares her journey from the family ranch to security. Needing a life change due to a bunch of circumstances that had occurred that left her almost homeless, Ell found out about a six week Linux boot camp that took her down the path toward technology. She fell in love with security at at BSides Conference and hasn't looked back. Ell says she recently started a campaign called "it's okay to be new" noting that no matter how long you've been in the industry, you need to be new because technology changes so quickly. She concludes by offering one final piece of advice to everybody is just "be unapologetically yourself." We thank Ell for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes.</p>
<p>Linux and Security Advocate at Intezer Ell Marquez shares her journey from the family ranch to security. Needing a life change due to a bunch of circumstances that had occurred that left her almost homeless, Ell found out about a six week Linux boot camp that took her down the path toward technology. She fell in love with security at at BSides Conference and hasn't looked back. Ell says she recently started a campaign called "it's okay to be new" noting that no matter how long you've been in the industry, you need to be new because technology changes so quickly. She concludes by offering one final piece of advice to everybody is just "be unapologetically yourself." We thank Ell for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>592</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[56656620-4310-11f0-9d8c-4365792726fd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2097888900.mp3?updated=1749239851" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A new stealer hiding behind AI hype. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/380/notes</link>
      <description>This week, we are joined by Michael Gorelik, Chief Technology Officer from Morphisec, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as fake AI video generation platforms, luring users into uploading media in exchange for malware-laced downloads. 

Distributed through convincing Facebook groups and viral campaigns, the malware steals browser credentials, cryptocurrency wallets, and can deploy a remote access trojan like XWorm. The campaign uses a layered, obfuscated delivery chain disguised as legitimate video editing software, making it both deceptive and difficult to detect.

The research can be found here:


  ⁠⁠New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Jun 2025 07:00:00 -0000</pubDate>
      <itunes:title>A new stealer hiding behind AI hype. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>380</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/1177469c-430f-11f0-85a8-1b0438ac22a6/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Michael Gorelik, Chief Technology Officer from Morphisec, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as fake AI video generation platforms, luring users into uploading media in exchange for malware-laced downloads. 

Distributed through convincing Facebook groups and viral campaigns, the malware steals browser credentials, cryptocurrency wallets, and can deploy a remote access trojan like XWorm. The campaign uses a layered, obfuscated delivery chain disguised as legitimate video editing software, making it both deceptive and difficult to detect.

The research can be found here:


  ⁠⁠New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/smgoreli/">Michael Gorelik</a>, Chief Technology Officer from <a href="https://www.linkedin.com/company/morphisec/">Morphisec</a>, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as fake AI video generation platforms, luring users into uploading media in exchange for malware-laced downloads. </p>
<p>Distributed through convincing Facebook groups and viral campaigns, the malware steals browser credentials, cryptocurrency wallets, and can deploy a remote access trojan like XWorm. The campaign uses a layered, obfuscated delivery chain disguised as legitimate video editing software, making it both deceptive and difficult to detect.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.morphisec.com/blog/new-noodlophile-stealer-fake-ai-video-generation-platforms/">⁠⁠New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1328</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1177469c-430f-11f0-85a8-1b0438ac22a6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9399921087.mp3?updated=1749225407" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Beware of BADBOX. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2324/notes</link>
      <description>The DOJ files to seize over $7 million linked to illegal North Korean IT workers. The FBI warns of BADBOX 2.0 malware targeting IoT devices. Researchers uncover a major security flaw in Chrome extensions. ESET uncovers Iranian hackers targeting Kurdish and Iraqi government officials. Hitachi Energy, Acronis and Cisco patch critical vulnerabilities. 20 suspects are arrested in a major international CSAM takedown. Hackers exploit a critical flaw in Roundcube webmail. Today’s guest is Ian Bramson, Global Head of Industrial Cybersecurity at Black &amp; Veatch, exploring how organizations can close the cyberattack readiness gap.  ChatGPT logs are caught in a legal tug-of-war. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today’s guest is Ian Bramson, Global Head of Industrial Cybersecurity at Black &amp; Veatch. Ian joins us to explore how organizations can close the cyberattack readiness gap in industrial environments—especially as cyber threats grow more sophisticated and aggressive.

Selected Reading

Department Files Civil Forfeiture Complaint Against Over $7.74M Laundered on Behalf of the North Korean Government (U.S. Department of Justice)

FBI: BADBOX 2.0 Android malware infects millions of consumer devices (Bleeping Computer)

Chrome Extensions Vulnerability Exposes API Keys, Secrets, and Tokens (Cyber Security News)

Iran-linked hackers target Kurdish and Iraqi officials in long-running cyberespionage campaign (The Record)

CISA reports critical flaw in Hitachi Energy Relion devices (Beyond Machines)

Critical security vulnerabilities discovered in Acronis Cyber Protect software (Beyond Machines)

Cisco Patches Critical ISE Vulnerability With Public PoC (SecurityWeek)

Police arrests 20 suspects for distributing child sexual abuse content  (Bleeping Computer)

Hacker selling critical Roundcube webmail exploit as tech info disclosed (Bleeping Computer)– mentioning this in the Briefing

OpenAI slams court order to save all ChatGPT logs, including deleted chats (Ars Technica)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 06 Jun 2025 20:30:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2324</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Beware of BADBOX. </itunes:subtitle>
      <itunes:summary>The DOJ files to seize over $7 million linked to illegal North Korean IT workers. The FBI warns of BADBOX 2.0 malware targeting IoT devices. Researchers uncover a major security flaw in Chrome extensions. ESET uncovers Iranian hackers targeting Kurdish and Iraqi government officials. Hitachi Energy, Acronis and Cisco patch critical vulnerabilities. 20 suspects are arrested in a major international CSAM takedown. Hackers exploit a critical flaw in Roundcube webmail. Today’s guest is Ian Bramson, Global Head of Industrial Cybersecurity at Black &amp; Veatch, exploring how organizations can close the cyberattack readiness gap.  ChatGPT logs are caught in a legal tug-of-war. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today’s guest is Ian Bramson, Global Head of Industrial Cybersecurity at Black &amp; Veatch. Ian joins us to explore how organizations can close the cyberattack readiness gap in industrial environments—especially as cyber threats grow more sophisticated and aggressive.

Selected Reading

Department Files Civil Forfeiture Complaint Against Over $7.74M Laundered on Behalf of the North Korean Government (U.S. Department of Justice)

FBI: BADBOX 2.0 Android malware infects millions of consumer devices (Bleeping Computer)

Chrome Extensions Vulnerability Exposes API Keys, Secrets, and Tokens (Cyber Security News)

Iran-linked hackers target Kurdish and Iraqi officials in long-running cyberespionage campaign (The Record)

CISA reports critical flaw in Hitachi Energy Relion devices (Beyond Machines)

Critical security vulnerabilities discovered in Acronis Cyber Protect software (Beyond Machines)

Cisco Patches Critical ISE Vulnerability With Public PoC (SecurityWeek)

Police arrests 20 suspects for distributing child sexual abuse content  (Bleeping Computer)

Hacker selling critical Roundcube webmail exploit as tech info disclosed (Bleeping Computer)– mentioning this in the Briefing

OpenAI slams court order to save all ChatGPT logs, including deleted chats (Ars Technica)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The DOJ files to seize over $7 million linked to illegal North Korean IT workers. The FBI warns of BADBOX 2.0 malware targeting IoT devices. Researchers uncover a major security flaw in Chrome extensions. ESET uncovers Iranian hackers targeting Kurdish and Iraqi government officials. Hitachi Energy, Acronis and Cisco patch critical vulnerabilities. 20 suspects are arrested in a major international CSAM takedown. Hackers exploit a critical flaw in Roundcube webmail. Today’s guest is Ian Bramson, Global Head of Industrial Cybersecurity at Black &amp; Veatch, exploring how organizations can close the cyberattack readiness gap.  ChatGPT logs are caught in a legal tug-of-war. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today’s guest is <a href="https://www.linkedin.com/in/ianbramson/"><u>Ian Bramson</u></a>, Global Head of Industrial Cybersecurity at <a href="https://www.linkedin.com/company/black-and-veatch/"><u>Black &amp; Veatch</u></a>. Ian joins us to explore how organizations can close the cyberattack readiness gap in industrial environments—especially as cyber threats grow more sophisticated and aggressive.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.justice.gov/opa/pr/department-files-civil-forfeiture-complaint-against-over-774m-laundered-behalf-north-korean"><u>Department Files Civil Forfeiture Complaint Against Over $7.74M Laundered on Behalf of the North Korean Government</u></a> (U.S. Department of Justice)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/fbi-badbox-20-android-malware-infects-millions-of-consumer-devices/"><u>FBI: BADBOX 2.0 Android malware infects millions of consumer devices</u></a> (Bleeping Computer)</p>
<p><a href="https://cybersecuritynews.com/chrome-extensions-vulnerability-exposes-api-keys/"><u>Chrome Extensions Vulnerability Exposes API Keys, Secrets, and Tokens</u></a> (Cyber Security News)</p>
<p><a href="https://therecord.media/iran-linked-hackers-target-kurdish-iraq-cyber-espionage"><u>Iran-linked hackers target Kurdish and Iraqi officials in long-running cyberespionage campaign</u></a> (The Record)</p>
<p><a href="https://beyondmachines.net/event_details/cisa-reports-critical-flaw-in-hitachi-energy-relion-devices-r-x-0-5-4/gD2P6Ple2L"><u>CISA reports critical flaw in Hitachi Energy Relion devices</u></a> (Beyond Machines)</p>
<p><a href="https://beyondmachines.net/event_details/critical-security-vulnerabilities-discovered-in-acronis-cyber-protect-software-c-k-s-0-k/gD2P6Ple2L"><u>Critical security vulnerabilities discovered in Acronis Cyber Protect software</u></a> (Beyond Machines)</p>
<p><a href="https://www.securityweek.com/cisco-patches-critical-ise-vulnerability-with-public-poc/"><u>Cisco Patches Critical ISE Vulnerability With Public PoC </u></a>(SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/police-arrests-20-suspects-for-distributing-child-sexual-abuse-content/"><u>Police arrests 20 suspects for distributing child sexual abuse content</u></a>  (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/hacker-selling-critical-roundcube-webmail-exploit-as-tech-info-disclosed/"><u>Hacker selling critical Roundcube webmail exploit as tech info disclosed</u></a> (Bleeping Computer)– mentioning this in the Briefing</p>
<p><a href="https://arstechnica.com/tech-policy/2025/06/openai-says-court-forcing-it-to-save-all-chatgpt-logs-is-a-privacy-nightmare/"><u>OpenAI slams court order to save all ChatGPT logs, including deleted chats </u></a>(Ars Technica)</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p>
<p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1640</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c28d3362-1c7a-11f0-85e0-1f47d5afcd8b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7668520948.mp3?updated=1749235740" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>China’s largest data leak exposes billions.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2323/notes</link>
      <description>Researchers discover what may be China’s largest ever data leak. CrowdStrike cooperates with federal authorities following last year’s major software bug. A researcher discovers over half a million sensitive insurance documents exposed online. Microsoft offers free cybersecurity programs to European governments. The FBI chronicles the Play ransomware gang. Google warns a threat group is targeting Salesforce customers. A former Biden cybersecurity official warns that U.S. critical infrastructure remains highly vulnerable to cyberattacks. The State Department offers up to $10 million for information on the RedLine infostealer malware. Our guest is Anneka Gupta, Chief Product Officer at Rubrik, on the challenges of managing security across systems. Some FDA workers want to put their new Elsa AI on ice.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we have Anneka Gupta, Chief Product Officer at Rubrik, talking about organizations moving to the cloud thinking security will be handled there and the challenges of managing security across systems.

Selected Reading

Largest ever data leak exposes over 4 billion user records (Cybernews)

CrowdStrike Cooperating With Federal Probes Into July Software Outage (Wall Street Journal)

Two Decades of Triangle Insurance Documents Exposed Publicly (Substack)

Microsoft offers to boost European governments' cybersecurity for free ( (Reuters)

FBI: Play ransomware gang has attacked 600 organizations since 2023 (The Record)

Google Warns of Vishing, Extortion Campaign Targeting Salesforce Customers (SecurityWeek)

‘I do not have confidence’ that US infrastructure is cyber-secure, former NSC official says (Nextgov/FCW)

China issues warrants for alleged Taiwanese hackers and bans a business for pro-independence links (AP News)

US offers $10M for tips on state hackers tied to RedLine malware (Bleeping Computer)

FDA rushed out agency-wide AI tool—it’s not going well (Ars Technica)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 05 Jun 2025 20:10:00 -0000</pubDate>
      <itunes:title>China’s largest data leak exposes billions.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2323</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Researchers discover what may be China’s largest ever data leak. CrowdStrike cooperates with federal authorities following last year’s major software bug. A researcher discovers over half a million sensitive insurance documents exposed online. Microsoft offers free cybersecurity programs to European governments. The FBI chronicles the Play ransomware gang. Google warns a threat group is targeting Salesforce customers. A former Biden cybersecurity official warns that U.S. critical infrastructure remains highly vulnerable to cyberattacks. The State Department offers up to $10 million for information on the RedLine infostealer malware. Our guest is Anneka Gupta, Chief Product Officer at Rubrik, on the challenges of managing security across systems. Some FDA workers want to put their new Elsa AI on ice.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we have Anneka Gupta, Chief Product Officer at Rubrik, talking about organizations moving to the cloud thinking security will be handled there and the challenges of managing security across systems.

Selected Reading

Largest ever data leak exposes over 4 billion user records (Cybernews)

CrowdStrike Cooperating With Federal Probes Into July Software Outage (Wall Street Journal)

Two Decades of Triangle Insurance Documents Exposed Publicly (Substack)

Microsoft offers to boost European governments' cybersecurity for free ( (Reuters)

FBI: Play ransomware gang has attacked 600 organizations since 2023 (The Record)

Google Warns of Vishing, Extortion Campaign Targeting Salesforce Customers (SecurityWeek)

‘I do not have confidence’ that US infrastructure is cyber-secure, former NSC official says (Nextgov/FCW)

China issues warrants for alleged Taiwanese hackers and bans a business for pro-independence links (AP News)

US offers $10M for tips on state hackers tied to RedLine malware (Bleeping Computer)

FDA rushed out agency-wide AI tool—it’s not going well (Ars Technica)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers discover what may be China’s largest ever data leak. CrowdStrike cooperates with federal authorities following last year’s major software bug. A researcher discovers over half a million sensitive insurance documents exposed online. Microsoft offers free cybersecurity programs to European governments. The FBI chronicles the Play ransomware gang. Google warns a threat group is targeting Salesforce customers. A former Biden cybersecurity official warns that U.S. critical infrastructure remains highly vulnerable to cyberattacks. The State Department offers up to $10 million for information on the RedLine infostealer malware. Our guest is Anneka Gupta, Chief Product Officer at Rubrik, on the challenges of managing security across systems. Some FDA workers want to put their new Elsa AI on ice.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we have <a href="https://www.linkedin.com/in/annekagupta/"><u>Anneka Gupta</u></a>, Chief Product Officer at <a href="https://www.linkedin.com/company/rubrik-inc/"><u>Rubrik</u></a>, talking about organizations moving to the cloud thinking <a href="https://www.rubrik.com/company/newsroom/press-releases/25/rubrik-reveals-90-of-global-it-and-security-executives-report-cyberattacks-in-the-past-year"><u>security</u></a> will be handled there and the challenges of managing security across systems.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://cnews.link/chinese-data-leak-billiones-records-exposed-3/"><u>Largest ever data leak exposes over 4 billion user records</u></a> (Cybernews)</p>
<p><a href="https://www.wsj.com/business/telecom/crowdstrike-cooperating-with-federal-probes-into-july-software-outage-c39a96b5"><u>CrowdStrike Cooperating With Federal Probes Into July Software Outage </u>(Wall Street J</a>ournal)</p>
<p><a href="https://jltee.substack.com/p/two-decades-of-triangle-insurance-documents-exposed"><u>Two Decades of Triangle Insurance Documents Exposed Publicly</u></a> (Substack)</p>
<p><a href="https://www.reuters.com/sustainability/boards-policy-regulation/microsoft-offers-boost-european-governments-cybersecurity-free-2025-06-04/"><u>Microsoft offers to boost European governments' cybersecurity for free </u></a>( (Reuters)</p>
<p><a href="https://therecord.media/play-ransomware-gang-fbi-update-900-attacks"><u>FBI: Play ransomware gang has attacked 600 organizations since 2023</u></a> (The Record)</p>
<p><a href="https://www.securityweek.com/google-warns-of-vishing-extortion-campaign-targeting-salesforce-customers/"><u>Google Warns of Vishing, Extortion Campaign Targeting Salesforce Customers </u></a>(SecurityWeek)</p>
<p><a href="https://www.nextgov.com/cybersecurity/2025/06/i-do-not-have-confidence-us-infrastructure-cyber-secure-former-nsc-official-says/405816/"><u>‘I do not have confidence’ that US infrastructure is cyber-secure, former NSC official says </u></a>(Nextgov/FCW)</p>
<p><a href="https://apnews.com/article/chian-taiwan-hacking-wanted-kuma-f937096e3163470b21597b4ec809d799"><u>China issues warrants for alleged Taiwanese hackers and bans a business for pro-independence links </u></a>(AP News)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/us-offers-10m-for-tips-on-state-hackers-tied-to-redline-malware/"><u>US offers $10M for tips on state hackers tied to RedLine malware</u></a> (Bleeping Computer)</p>
<p><br><a href="https://arstechnica.com/health/2025/06/fda-rushed-out-agency-wide-ai-tool-its-not-going-well/"><u>FDA rushed out agency-wide AI tool—it’s not going well</u> (Ars Technica</a>)</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1663</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c2678892-1c7a-11f0-85e0-1bfb13ec6ef7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2794818516.mp3?updated=1749149836" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Appetite for tracking: A feast on private data.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2322/notes</link>
      <description>Researchers uncover a major privacy violation involving tracking scripts from Meta and Yandex. A compliance automation firm discloses a data breach. PumaBot stalks vulnerable IoT devices. The Ramnit banking trojan gets repurposed for ICS intrusions. The North Face suffers a credential stuffing attack. Kaspersky says the Black Owl team is a cyber threat to Russia. CISA releases ISC advisories. An Indian grocery delivery startup suffers a devastating data wiping attack. The UK welcomes their new Cyber and Electromagnetic (CyberEM) Command. Our guest is Rohan Pinto, CTO of 1Kosmos, discussing the implications of AI deepfakes for biometric security. The cybersecurity sleuths at Sophos unravel a curious caper.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Rohan Pinto, CTO of 1Kosmos, and he is discussing the implications of AI deepfakes for biometric security.

Selected Reading

Meta and Yandex are de-anonymizing Android users’ web browsing identifiers (Ars Technica)

Vanta leaks customer data due to product code change (Beyond Machines)

New Linux PumaBot Attacking IoT Devices by Brute-Forcing SSH Credentials (Cyber Security News)

Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift (SecurityWeek)

The North Face warns customers of April credential stuffing attack (Bleeping Computer)

Pro-Ukraine hacker group Black Owl poses ‘major threat’ to Russia, Kaspersky says (The Record)

CISA Releases ICS Advisories Covering Vulnerabilities &amp; Exploits (Cyber Security News)

Indian grocery startup KiranaPro was hacked and its servers deleted, CEO confirms (TechCrunch)

UK CyberEM Command to spearhead new era of armed conflict (The Register)

Widespread Campaign Targets Cybercriminals and Gamers  (Infosecurity Magazine)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 04 Jun 2025 20:10:00 -0000</pubDate>
      <itunes:title>Appetite for tracking: A feast on private data.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2322</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Researchers uncover a major privacy violation involving tracking scripts from Meta and Yandex. A compliance automation firm discloses a data breach. PumaBot stalks vulnerable IoT devices. The Ramnit banking trojan gets repurposed for ICS intrusions. The North Face suffers a credential stuffing attack. Kaspersky says the Black Owl team is a cyber threat to Russia. CISA releases ISC advisories. An Indian grocery delivery startup suffers a devastating data wiping attack. The UK welcomes their new Cyber and Electromagnetic (CyberEM) Command. Our guest is Rohan Pinto, CTO of 1Kosmos, discussing the implications of AI deepfakes for biometric security. The cybersecurity sleuths at Sophos unravel a curious caper.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Rohan Pinto, CTO of 1Kosmos, and he is discussing the implications of AI deepfakes for biometric security.

Selected Reading

Meta and Yandex are de-anonymizing Android users’ web browsing identifiers (Ars Technica)

Vanta leaks customer data due to product code change (Beyond Machines)

New Linux PumaBot Attacking IoT Devices by Brute-Forcing SSH Credentials (Cyber Security News)

Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift (SecurityWeek)

The North Face warns customers of April credential stuffing attack (Bleeping Computer)

Pro-Ukraine hacker group Black Owl poses ‘major threat’ to Russia, Kaspersky says (The Record)

CISA Releases ICS Advisories Covering Vulnerabilities &amp; Exploits (Cyber Security News)

Indian grocery startup KiranaPro was hacked and its servers deleted, CEO confirms (TechCrunch)

UK CyberEM Command to spearhead new era of armed conflict (The Register)

Widespread Campaign Targets Cybercriminals and Gamers  (Infosecurity Magazine)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers uncover a major privacy violation involving tracking scripts from Meta and Yandex. A compliance automation firm discloses a data breach. PumaBot stalks vulnerable IoT devices. The Ramnit banking trojan gets repurposed for ICS intrusions. The North Face suffers a credential stuffing attack. Kaspersky says the Black Owl team is a cyber threat to Russia. CISA releases ISC advisories. An Indian grocery delivery startup suffers a devastating data wiping attack. The UK welcomes their new Cyber and Electromagnetic (CyberEM) Command. Our guest is Rohan Pinto, CTO of 1Kosmos, discussing the implications of AI deepfakes for biometric security. The cybersecurity sleuths at Sophos unravel a curious caper.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/rohanpinto/"><u>Rohan Pinto</u></a>, CTO of <a href="https://www.linkedin.com/company/1kosmos/"><u>1Kosmos</u></a>, and he is discussing the implications of AI deepfakes for biometric security.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://arstechnica.com/security/2025/06/meta-and-yandex-are-de-anonymizing-android-users-web-browsing-identifiers/"><u>Meta and Yandex are de-anonymizing Android users’ web browsing identifiers </u></a>(Ars Technica)</p>
<p><a href="https://beyondmachines.net/event_details/vanta-leaks-customer-data-due-to-product-code-change-m-i-l-5-k/gD2P6Ple2L"><u>Vanta leaks customer data due to product code change</u></a> (Beyond Machines)</p>
<p><a href="https://cybersecuritynews.com/new-linux-pumabot-attacking-iot-devices/"><u>New Linux PumaBot Attacking IoT Devices by Brute-Forcing SSH Credentials</u></a> (Cyber Security News)</p>
<p><a href="https://www.securityweek.com/ramnit-malware-infections-spike-in-ot-as-evidence-suggests-ics-shift/"><u>Ramnit Malware Infections Spike in OT as Evidence Suggests ICS Shift </u></a>(SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/the-north-face-warns-customers-of-april-credential-stuffing-attack/"><u>The North Face warns customers of April credential stuffing attack</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/pro-ukraine-hacker-group-black-owl-major-threat-russia"><u>Pro-Ukraine hacker group Black Owl poses ‘major threat’ to Russia, Kaspersky says</u></a> (The Record)</p>
<p><a href="https://cybersecuritynews.com/cisa-releases-ics-advisories-vulnerabilities/"><u>CISA Releases ICS Advisories Covering Vulnerabilities &amp; Exploits</u></a> (Cyber Security News)</p>
<p><a href="https://techcrunch.com/2025/06/03/indian-grocery-startup-kiranapro-was-hacked-and-its-servers-deleted-ceo-confirms/"><u>Indian grocery startup KiranaPro was hacked and its servers deleted, CEO confirms </u></a>(TechCrunch)</p>
<p><a href="https://www.theregister.com/2025/06/04/uk_cyberem_command_details/"><u>UK CyberEM Command to spearhead new era of armed conflict </u></a>(The Register)</p>
<p><a href="https://www.infosecurity-magazine.com/news/campaign-targets-cybercriminals/"><u>Widespread Campaign Targets Cybercriminals and Gamers </u></a> (Infosecurity Magazine)</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1860</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c23f41b6-1c7a-11f0-85e0-23c784993a5c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2248809742.mp3?updated=1749061205" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Zero-day déjà vu.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2321/notes</link>
      <description>Google issues an emergency patch for a Chrome zero-day. A new malware campaign uses fake DocuSign CAPTCHA pages to trick users into installing a RAT. A high-severity Splunk vulnerability allows non-admin users to access and modify critical directories. Experts warn congress that Chinese infiltrations are preparations for war. Senators look to strengthen cybersecurity collaboration in the U.S. energy sector. Crocodilus Android malware adds fake contacts to victims’ phones. SentinelOne publishes a detailed analysis of their recent outage. Cartier leaves some of its cyber sparkle exposed. Our guest is Jon Miller, CEO and Co-founder of Halcyon, discussing Bring Your Own Vulnerable Driver (BYOVD) attacks. Microsoft and CrowdStrike tackle hacker naming…or do they?

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today on our Industry Voices segment, we are joined by Jon Miller, CEO and Co-founder of Halcyon who is discussing Bring Your Own Vulnerable Driver (BYOVD) attacks. Listen to Jon’s conversation here.

Selected Reading

Google patches new Chrome zero-day bug exploited in attacks (Bleeping Computer)

Fake Docusign Pages Deliver Multi-Stage NetSupport RAT Malware  (Infosecurity Magazine)

Splunk Universal Forwarder on Windows Lets Non-Admin Users Access All Contents (Cyber Security News)

China hacks show they're 'preparing for war': McMaster (The Register)

FCC Proposes Rules to Ferret Out Control of Regulated Entities by Foreign Adversaries (Cooley)

US lawmakers propose legislation to expand cyber threat coordination across energy sector (Industrial Cyber)

Android malware Crocodilus adds fake contacts to spoof trusted callers (Bleeping Computer)

SentinelOne Global Service Outage Root Cause Revealed (Cyber Security News)

Romanian man pleads guilty to 'swatting' plot that targeted an ex-US president and lawmakers (AP News)

Cartier reports data breach exposing customer personal information (Beyond Machines)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Jun 2025 20:10:00 -0000</pubDate>
      <itunes:title>Zero-day déjà vu.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2321</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Google issues an emergency patch for a Chrome zero-day. A new malware campaign uses fake DocuSign CAPTCHA pages to trick users into installing a RAT. A high-severity Splunk vulnerability allows non-admin users to access and modify critical directories. Experts warn congress that Chinese infiltrations are preparations for war. Senators look to strengthen cybersecurity collaboration in the U.S. energy sector. Crocodilus Android malware adds fake contacts to victims’ phones. SentinelOne publishes a detailed analysis of their recent outage. Cartier leaves some of its cyber sparkle exposed. Our guest is Jon Miller, CEO and Co-founder of Halcyon, discussing Bring Your Own Vulnerable Driver (BYOVD) attacks. Microsoft and CrowdStrike tackle hacker naming…or do they?

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today on our Industry Voices segment, we are joined by Jon Miller, CEO and Co-founder of Halcyon who is discussing Bring Your Own Vulnerable Driver (BYOVD) attacks. Listen to Jon’s conversation here.

Selected Reading

Google patches new Chrome zero-day bug exploited in attacks (Bleeping Computer)

Fake Docusign Pages Deliver Multi-Stage NetSupport RAT Malware  (Infosecurity Magazine)

Splunk Universal Forwarder on Windows Lets Non-Admin Users Access All Contents (Cyber Security News)

China hacks show they're 'preparing for war': McMaster (The Register)

FCC Proposes Rules to Ferret Out Control of Regulated Entities by Foreign Adversaries (Cooley)

US lawmakers propose legislation to expand cyber threat coordination across energy sector (Industrial Cyber)

Android malware Crocodilus adds fake contacts to spoof trusted callers (Bleeping Computer)

SentinelOne Global Service Outage Root Cause Revealed (Cyber Security News)

Romanian man pleads guilty to 'swatting' plot that targeted an ex-US president and lawmakers (AP News)

Cartier reports data breach exposing customer personal information (Beyond Machines)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Google issues an emergency patch for a Chrome zero-day. A new malware campaign uses fake DocuSign CAPTCHA pages to trick users into installing a RAT. A high-severity Splunk vulnerability allows non-admin users to access and modify critical directories. Experts warn congress that Chinese infiltrations are preparations for war. Senators look to strengthen cybersecurity collaboration in the U.S. energy sector. Crocodilus Android malware adds fake contacts to victims’ phones. SentinelOne publishes a detailed analysis of their recent outage. Cartier leaves some of its cyber sparkle exposed. Our guest is Jon Miller, CEO and Co-founder of Halcyon, discussing Bring Your Own Vulnerable Driver (BYOVD) attacks. Microsoft and CrowdStrike tackle hacker naming…or do they?</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today on our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/jonmillerhalcyon/"><u>Jon Miller</u></a>, CEO and Co-founder of <a href="https://www.linkedin.com/company/halcyonai/"><u>Halcyon</u></a> who is discussing Bring Your Own Vulnerable Driver (BYOVD) attacks. Listen to Jon’s conversation here.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/google-patches-new-chrome-zero-day-bug-exploited-in-attacks/"><u>Google patches new Chrome zero-day bug exploited in attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.infosecurity-magazine.com/news/fake-docusign-pages-deliver-rat/"><u>Fake Docusign Pages Deliver Multi-Stage NetSupport RAT Malware </u></a> (Infosecurity Magazine)</p>
<p><a href="https://cybersecuritynews.com/splunk-universal-forwarder-vulnerability/"><u>Splunk Universal Forwarder on Windows Lets Non-Admin Users Access All Contents</u></a> (Cyber Security News)</p>
<p><a href="https://www.theregister.com/2025/05/29/china_preparing_war_mcmaster/"><u>China hacks show they're 'preparing for war': McMaster </u></a>(The Register)</p>
<p><a href="https://www.cooley.com/news/insight/2025/2025-06-02-fcc-proposes-rules-to-ferret-out-control-of-regulated-entities-by-foreign-adversaries"><u>FCC Proposes Rules to Ferret Out Control of Regulated Entities by Foreign Adversaries</u></a> (Cooley)</p>
<p><a href="https://industrialcyber.co/regulation-standards-and-compliance/us-lawmakers-propose-legislation-to-expand-cyber-threat-coordination-across-energy-sector/"><u>US lawmakers propose legislation to expand cyber threat coordination across energy sector</u></a> (Industrial Cyber)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/android-malware-crocodilus-adds-fake-contacts-to-spoof-trusted-callers/"><u>Android malware Crocodilus adds fake contacts to spoof trusted callers</u></a> (Bleeping Computer)</p>
<p><a href="https://cybersecuritynews.com/sentineloneoutage-root-cause/"><u>SentinelOne Global Service Outage Root Cause Revealed</u></a> (Cyber Security News)</p>
<p><a href="https://apnews.com/article/swatting-plot-thomasz-szabo-60de50b8bf1dd35b3ea403072a58f1cd"><u>Romanian man pleads guilty to 'swatting' plot that targeted an ex-US president and lawmakers</u></a> (AP News)</p>
<p><a href="https://beyondmachines.net/event_details/cartier-reports-data-breach-exposing-customer-personal-information-4-t-h-3-p/gD2P6Ple2L"><u>Cartier reports data breach exposing customer personal information</u></a> (Beyond Machines)</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2204</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c2170ab6-1c7a-11f0-85e0-bb9c4762add8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8481755194.mp3?updated=1748977532" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AVCheck goes dark in Operation Endgame.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2320/notes</link>
      <description>An international law enforcement operation dismantles AVCheck. Trump’s 2026 budget looks to cut over one thousand positions from CISA. Cyber Command’s defensive wing gains sub-unified command status. A critical vBulletin vulnerability is actively exploited. Acreed takes over Russian markets as credential theft kingpin. Qualcomm patches three actively exploited zero-days in its Adreno GPU drivers. Researchers unveil details of a Cisco IOS XE Zero-Day. Microsoft warns a memory corruption flaw in the legacy JScript engine is under active exploitation. A closer look at the stealthy Lactrodectus loader. On today’s Afternoon Cyber Tea, Ann Johnson speaks with Hugh Thompson, RSAC program committee chair. Decoding AI hallucinations with physics.

Complete our annual audience survey before August 31.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we have our Afternoon Cyber Tea segment with Ann Johnson. On today’s episode, Ann speaks with Hugh Thompson, RSAC program committee chair, as they discuss what goes into building the RSA Conference.

Selected Reading

Police takes down AVCheck site used by cybercriminals to scan malware (Bleeping Computer)

DHS budget request would cut CISA staff by 1,000 positions (Federal News Network)

Cybercom’s defensive arm elevated to sub-unified command (DefenseScoop)

vBulletin Vulnerability Exploited in the Wild (SecurityWeek)

Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown (Infosecurity Magazine)

Qualcomm fixes three Adreno GPU zero-days exploited in attacks (Bleeping Computer)

Exploit details for max severity Cisco IOS XE flaw now public (Bleeping Computer)

Microsoft Scripting Engine flaw exploited in wild, Proof-of-Concept published (Beyond Machines)

Latrodectus Malware Analysis: A Deep Dive into the Black Widow of Cyber Threats in 2025 (WardenShield)

The Root of AI Hallucinations: Physics Theory Digs Into the 'Attention' Flaw  (SecurityWeek)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 02 Jun 2025 20:10:00 -0000</pubDate>
      <itunes:title>AVCheck goes dark in Operation Endgame.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2320</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>An international law enforcement operation dismantles AVCheck. Trump’s 2026 budget looks to cut over one thousand positions from CISA. Cyber Command’s defensive wing gains sub-unified command status. A critical vBulletin vulnerability is actively exploited. Acreed takes over Russian markets as credential theft kingpin. Qualcomm patches three actively exploited zero-days in its Adreno GPU drivers. Researchers unveil details of a Cisco IOS XE Zero-Day. Microsoft warns a memory corruption flaw in the legacy JScript engine is under active exploitation. A closer look at the stealthy Lactrodectus loader. On today’s Afternoon Cyber Tea, Ann Johnson speaks with Hugh Thompson, RSAC program committee chair. Decoding AI hallucinations with physics.

Complete our annual audience survey before August 31.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we have our Afternoon Cyber Tea segment with Ann Johnson. On today’s episode, Ann speaks with Hugh Thompson, RSAC program committee chair, as they discuss what goes into building the RSA Conference.

Selected Reading

Police takes down AVCheck site used by cybercriminals to scan malware (Bleeping Computer)

DHS budget request would cut CISA staff by 1,000 positions (Federal News Network)

Cybercom’s defensive arm elevated to sub-unified command (DefenseScoop)

vBulletin Vulnerability Exploited in the Wild (SecurityWeek)

Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown (Infosecurity Magazine)

Qualcomm fixes three Adreno GPU zero-days exploited in attacks (Bleeping Computer)

Exploit details for max severity Cisco IOS XE flaw now public (Bleeping Computer)

Microsoft Scripting Engine flaw exploited in wild, Proof-of-Concept published (Beyond Machines)

Latrodectus Malware Analysis: A Deep Dive into the Black Widow of Cyber Threats in 2025 (WardenShield)

The Root of AI Hallucinations: Physics Theory Digs Into the 'Attention' Flaw  (SecurityWeek)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An international law enforcement operation dismantles AVCheck. Trump’s 2026 budget looks to cut over one thousand positions from CISA. Cyber Command’s defensive wing gains sub-unified command status. A critical vBulletin vulnerability is actively exploited. Acreed takes over Russian markets as credential theft kingpin. Qualcomm patches three actively exploited zero-days in its Adreno GPU drivers. Researchers unveil details of a Cisco IOS XE Zero-Day. Microsoft warns a memory corruption flaw in the legacy JScript engine is under active exploitation. A closer look at the stealthy Lactrodectus loader. On today’s Afternoon Cyber Tea, Ann Johnson speaks with Hugh Thompson, RSAC program committee chair. Decoding AI hallucinations with physics.</p>
<p>Complete our annual <a href="https://www.surveymonkey.com/r/JD89DRW">audience survey</a> before August 31.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we have our <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea"><u>Afternoon Cyber Tea</u></a> segment with <a href="https://www.linkedin.com/in/ann-johnsons/"><u>Ann Johnson</u></a>. On today’s episode, Ann speaks with <a href="https://www.linkedin.com/in/hugh-thompson-ph-d-3b51bb2/"><u>Hugh Thompson</u></a>, <a href="https://www.linkedin.com/company/rsa-conference/"><u>RSAC</u></a> program committee chair, as they discuss what goes into building the RSA Conference.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/police-takes-down-avcheck-antivirus-site-used-by-cybercriminals/"><u>Police takes down AVCheck site used by cybercriminals to scan malware</u></a> (Bleeping Computer)</p>
<p><a href="https://federalnewsnetwork.com/cybersecurity/2025/05/dhs-budget-request-would-cut-cisa-staff-by-1000-positions/"><u>DHS budget request would cut CISA staff by 1,000 positions</u></a> (Federal News Network)</p>
<p><a href="https://defensescoop.com/2025/05/30/cybercom-jfhq-dodin-dcdc-designated-sub-unified-command/"><u>Cybercom’s defensive arm elevated to sub-unified command </u></a>(DefenseScoop)</p>
<p><a href="https://www.securityweek.com/vbulletin-vulnerability-exploited-in-the-wild/"><u>vBulletin Vulnerability Exploited in the Wild </u></a>(SecurityWeek)</p>
<p><a href="https://www.infosecurity-magazine.com/news/acreed-dominant-infostealer-lumma/"><u>Acreed Emerges as Dominant Infostealer Threat Following Lumma Takedown </u></a>(Infosecurity Magazine)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/qualcomm-fixes-three-adreno-gpu-zero-days-exploited-in-attacks/"><u>Qualcomm fixes three Adreno GPU zero-days exploited in attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/exploit-details-for-max-severity-cisco-ios-xe-flaw-now-public/"><u>Exploit details for max severity Cisco IOS XE flaw now public</u></a> (Bleeping Computer)</p>
<p><a href="https://beyondmachines.net/event_details/microsoft-scripting-engine-flaw-exploited-in-wild-proof-of-concept-published-z-k-t-v-z/gD2P6Ple2L"><u>Microsoft Scripting Engine flaw exploited in wild, Proof-of-Concept published</u></a> (Beyond Machines)</p>
<p><a href="https://wardenshield.com/latrodectus-malware-analysis-a-deep-dive-into-the-black-widow-of-cyber-threats-in-2025"><u>Latrodectus Malware Analysis: A Deep Dive into the Black Widow of Cyber Threats in 2025 </u></a>(WardenShield)</p>
<p><br><a href="https://www.securityweek.com/the-root-of-ai-hallucinations-physics-theory-digs-into-the-attention-flaw/"><u>The Root of AI Hallucinations: Physics Theory Digs Into the 'Attention' Flaw </u></a> (SecurityWeek)</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1396</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c1ed7e80-1c7a-11f0-85e0-3f1a788434b5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2184597587.mp3?updated=1748891057" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Brandon Karpf: A sailor of the 21st century. [Transitioning service member] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/70/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Lieutenant in the US Navy and Skillbridge Fellow at the CyberWire, Brandon Karpf, knew he wanted to join the military at a young age. He achieved that through the US Naval Academy where he was a member of the men’s heavyweight rowing team. Commissioned as a cryptologic warfare officer, Brandon was sent to MIT for a graduate degree where he experienced the exact opposite of the Naval Academy’s highly structured life. Brandon’s later work with both NSA and US Cyber Command helped him gain experience and cyber operations skills. As he transitions from active duty to civilian life, Brandon shares his personal challenges and struggles during that process. Through the DoD Skillbridge Fellowship program, Brandon’s transition has him sharing his skills with the CyberWire. We thank Brandon for sharing his expertise and his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 01 Jun 2025 07:00:00 -0000</pubDate>
      <itunes:title>Brandon Karpf: A sailor of the 21st century. [Transitioning service member] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>70</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/25425c9c-3c9e-11f0-a288-9f8f2b2e2922/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Lieutenant in the US Navy and Skillbridge Fellow at the CyberWire, Brandon Karpf, knew he wanted to join the military at a young age. He achieved that through the US Naval Academy where he was a member of the men’s heavyweight rowing team. Commissioned as a cryptologic warfare officer, Brandon was sent to MIT for a graduate degree where he experienced the exact opposite of the Naval Academy’s highly structured life. Brandon’s later work with both NSA and US Cyber Command helped him gain experience and cyber operations skills. As he transitions from active duty to civilian life, Brandon shares his personal challenges and struggles during that process. Through the DoD Skillbridge Fellowship program, Brandon’s transition has him sharing his skills with the CyberWire. We thank Brandon for sharing his expertise and his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Lieutenant in the US Navy and Skillbridge Fellow at the CyberWire, Brandon Karpf, knew he wanted to join the military at a young age. He achieved that through the US Naval Academy where he was a member of the men’s heavyweight rowing team. Commissioned as a cryptologic warfare officer, Brandon was sent to MIT for a graduate degree where he experienced the exact opposite of the Naval Academy’s highly structured life. Brandon’s later work with both NSA and US Cyber Command helped him gain experience and cyber operations skills. As he transitions from active duty to civilian life, Brandon shares his personal challenges and struggles during that process. Through the DoD Skillbridge Fellowship program, Brandon’s transition has him sharing his skills with the CyberWire. We thank Brandon for sharing his expertise and his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>687</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[25425c9c-3c9e-11f0-a288-9f8f2b2e2922]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6020124105.mp3?updated=1748531339" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Triofox and the key to disaster. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/379/notes</link>
      <description>This week, we are joined by John Hammond, Principal Security Researcher at Huntress, who is sharing his PoC and research on "CVE-2025-30406 - Critical Gladinet CentreStack &amp; Triofox Vulnerability Exploited In The Wild." A critical 9.0 severity vulnerability (CVE-2025-30406) in Gladinet CentreStack and Triofox is being actively exploited in the wild, allowing remote code execution via hardcoded cryptographic keys in default configuration files. 

Huntress researchers observed compromises at multiple organizations and confirmed hundreds of vulnerable internet-exposed servers, urging immediate patching or manual machineKey updates. Mitigation guidance, detection, and remediation scripts have been released to help users identify and secure affected installations.

The research can be found here:


  ⁠CVE-2025-30406 - Critical Gladinet CentreStack &amp; Triofox Vulnerability Exploited In The Wild


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 31 May 2025 07:00:00 -0000</pubDate>
      <itunes:title>Triofox and the key to disaster. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>379</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0743255a-3cb2-11f0-ac3a-e78dbdaa1c75/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by John Hammond, Principal Security Researcher at Huntress, who is sharing his PoC and research on "CVE-2025-30406 - Critical Gladinet CentreStack &amp; Triofox Vulnerability Exploited In The Wild." A critical 9.0 severity vulnerability (CVE-2025-30406) in Gladinet CentreStack and Triofox is being actively exploited in the wild, allowing remote code execution via hardcoded cryptographic keys in default configuration files. 

Huntress researchers observed compromises at multiple organizations and confirmed hundreds of vulnerable internet-exposed servers, urging immediate patching or manual machineKey updates. Mitigation guidance, detection, and remediation scripts have been released to help users identify and secure affected installations.

The research can be found here:


  ⁠CVE-2025-30406 - Critical Gladinet CentreStack &amp; Triofox Vulnerability Exploited In The Wild


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/johnhammond010/">John Hammond</a>, Principal Security Researcher at <a href="https://www.linkedin.com/company/huntress-labs/">Huntress</a>, who is sharing his <a href="https://www.linkedin.com/posts/johnhammond010_i-got-a-proof-of-concept-working-for-cve-activity-7316763256671334400-_Ygk/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAB-Vd20BH_D8NLQgtX11vAYfXE68Jqwc68M">PoC</a> and research on "CVE-2025-30406 - Critical Gladinet CentreStack &amp; Triofox Vulnerability Exploited In The Wild." A critical 9.0 severity vulnerability (CVE-2025-30406) in Gladinet CentreStack and Triofox is being actively exploited in the wild, allowing remote code execution via hardcoded cryptographic keys in default configuration files. </p>
<p>Huntress researchers observed compromises at multiple organizations and confirmed hundreds of vulnerable internet-exposed servers, urging immediate patching or manual machineKey updates. Mitigation guidance, detection, and remediation scripts have been released to help users identify and secure affected installations.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.huntress.com/blog/cve-2025-30406-critical-gladinet-centrestack-triofox-vulnerability-exploited-in-the-wild">⁠CVE-2025-30406 - Critical Gladinet CentreStack &amp; Triofox Vulnerability Exploited In The Wild</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1166</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0743255a-3cb2-11f0-ac3a-e78dbdaa1c75]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3776909128.mp3?updated=1748539875" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>All systems not go.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2319/notes</link>
      <description>SentinelOne suffers a global service outage. A major DDoS attack hits a Russian internet provider. U.S. banking groups urge the SEC to scrap cybersecurity disclosure rules. Australia mandates reporting of ransomware payments. Researchers uncover a new Browser-in-the-Middle (BitM) attack targeting Safari users. A Florida health system pays over $800,000 to settle insider breach concerns. CISA issues five urgent ICS advisories. Our guest is  Matt Covington, VP of Product at BlackCloak, discussing the emergence of advanced impersonation techniques like deepfakes and the importance of digital executive protection. The feds are putting all our digital data in one basket.

CyberWire Guest

On our Industry Voices segment, at the 2025 RSA Conference, we were joined by Matt Covington, VP of Product at BlackCloak, discussing the emergence of advanced impersonation techniques like deepfakes and digital executive protection. Listen to Matt’s conversation here. 

Selected Reading

Cybersecurity Firm SentinelOne Suffers Major Outage (Bank Infosecurity)

DDoS incident disrupts internet for thousands in Moscow (The Record)

Banks Want SEC to Rescind Cyberattack Disclosure Requirements (PYMNTS.com)

Australian ransomware victims now must tell the government if they pay up (The Record)

New BitM Attack Exploits Safari Vulnerability to Steal Login Credentials (Cyber Security News)

Florida Health System Pays $800K for Insider Record Snooping (Bank Infosecurity)

UTG-Q-015 Hackers Launched Large Scale Brute-Force Attacks Against Govt Web Servers (Cyber Security News)

CISA Releases Five ICS Advisories Targeting Vulnerabilities and Exploits (Cyber Security News)

Trump Taps Palantir to Compile Data on Americans (The New York Times)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 30 May 2025 20:10:00 -0000</pubDate>
      <itunes:title>All systems not go.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2319</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>SentinelOne suffers a global service outage. A major DDoS attack hits a Russian internet provider. U.S. banking groups urge the SEC to scrap cybersecurity disclosure rules. Australia mandates reporting of ransomware payments. Researchers uncover a new Browser-in-the-Middle (BitM) attack targeting Safari users. A Florida health system pays over $800,000 to settle insider breach concerns. CISA issues five urgent ICS advisories. Our guest is  Matt Covington, VP of Product at BlackCloak, discussing the emergence of advanced impersonation techniques like deepfakes and the importance of digital executive protection. The feds are putting all our digital data in one basket.

CyberWire Guest

On our Industry Voices segment, at the 2025 RSA Conference, we were joined by Matt Covington, VP of Product at BlackCloak, discussing the emergence of advanced impersonation techniques like deepfakes and digital executive protection. Listen to Matt’s conversation here. 

Selected Reading

Cybersecurity Firm SentinelOne Suffers Major Outage (Bank Infosecurity)

DDoS incident disrupts internet for thousands in Moscow (The Record)

Banks Want SEC to Rescind Cyberattack Disclosure Requirements (PYMNTS.com)

Australian ransomware victims now must tell the government if they pay up (The Record)

New BitM Attack Exploits Safari Vulnerability to Steal Login Credentials (Cyber Security News)

Florida Health System Pays $800K for Insider Record Snooping (Bank Infosecurity)

UTG-Q-015 Hackers Launched Large Scale Brute-Force Attacks Against Govt Web Servers (Cyber Security News)

CISA Releases Five ICS Advisories Targeting Vulnerabilities and Exploits (Cyber Security News)

Trump Taps Palantir to Compile Data on Americans (The New York Times)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>SentinelOne suffers a global service outage. A major DDoS attack hits a Russian internet provider. U.S. banking groups urge the SEC to scrap cybersecurity disclosure rules. Australia mandates reporting of ransomware payments. Researchers uncover a new Browser-in-the-Middle (BitM) attack targeting Safari users. A Florida health system pays over $800,000 to settle insider breach concerns. CISA issues five urgent ICS advisories. Our guest is  Matt Covington, VP of Product at BlackCloak, discussing the emergence of advanced impersonation techniques like deepfakes and the importance of digital executive protection. The feds are putting all our digital data in one basket.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment, at the 2025 RSA Conference, we were joined by <a href="https://www.linkedin.com/in/mecovington/"><u>Matt Covington</u></a>, VP of Product at <a href="https://www.linkedin.com/company/blackcloak/"><u>BlackCloak</u></a>, discussing the emergence of advanced impersonation techniques like deepfakes and digital executive protection. Listen to Matt’s conversation <a href="https://explore.thecyberwire.com/blackcloak"><u>here</u></a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.bankinfosecurity.com/cybersecurity-firm-sentinelone-suffers-major-outage-a-28554"><u>Cybersecurity Firm SentinelOne Suffers Major Outage</u></a> (Bank Infosecurity)</p>
<p><a href="https://therecord.media/moscow-internet-provider-asvt-ddos-attack"><u>DDoS incident disrupts internet for thousands in Moscow</u></a> (The Record)</p>
<p><a href="https://www.pymnts.com/cybersecurity/2025/banks-want-sec-to-rescind-cyberattack-disclosure-requirements/"><u>Banks Want SEC to Rescind Cyberattack Disclosure Requirements</u></a> (PYMNTS.com)</p>
<p><a href="https://therecord.media/australia-ransomware-victims-must-report-payments"><u>Australian ransomware victims now must tell the government if they pay up</u></a> (The Record)</p>
<p><a href="https://cybersecuritynews.com/new-bitm-attack-exploits-safari-vulnerability/"><u>New BitM Attack Exploits Safari Vulnerability to Steal Login Credentials</u></a> (Cyber Security News)</p>
<p><a href="https://www.bankinfosecurity.com/florida-health-system-pays-800k-for-insider-record-snooping-a-28542"><u>Florida Health System Pays $800K for Insider Record Snooping</u></a> (Bank Infosecurity)</p>
<p><a href="https://cybersecuritynews.com/utg-q-015-hackers-launched-large-scale-brute-force-attacks/"><u>UTG-Q-015 Hackers Launched Large Scale Brute-Force Attacks Against Govt Web Servers</u></a> (Cyber Security News)</p>
<p><a href="https://cybersecuritynews.com/cisa-releases-five-ics-advisories-2/"><u>CISA Releases Five ICS Advisories Targeting Vulnerabilities and Exploits</u></a> (Cyber Security News)</p>
<p><a href="https://www.nytimes.com/2025/05/30/technology/trump-palantir-data-americans.html?unlocked_article_code=1.LE8.nf1Z.DRMUcszmh_N5&amp;smid=nytcore-ios-share&amp;referringSource=articleShare"><u>Trump Taps Palantir to Compile Data on Americans </u>(The New York Times</a>)</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1865</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c1c6a616-1c7a-11f0-85e0-3ba4b197bd80]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3523745635.mp3?updated=1748621936" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When "out of the box" becomes "out of control."</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2318/notes</link>
      <description>Children’s DNA in criminal databases. ASUS routers get an unwanted houseguest. New APT41 malware uses Google Calendar for command-and-control. Interlock ransomware gang deploys new Trojan. Estonia issues arrest warrant for suspect in massive pharmacy breach. The enemy within the endpoint. New England hospitals disrupted by cyberattack. Tim Starks from CyberScoop is discussing ‘Whatever we did was not enough’: How Salt Typhoon slipped through the government’s blind spots. And Victoria’s Secrets are leaked.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we have Tim Starks from CyberScoop discussing ‘Whatever we did was not enough’: How Salt Typhoon slipped through the government’s blind spots.

Selected Reading

 The US Is Storing Migrant Children’s DNA in a Criminal Database (WIRED)

GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers (GreyNoise)

Mark Your Calendar: APT41 Innovative Tactics (Google Threat Intelligence Group)

Interlock ransomware gang deploys new NodeSnake RAT on universities (BleepingComputer)

Estonia issues arrest warrant for Moroccan wanted for major pharmacy data breach (The Record)

Israeli company Syngia thwarts North Korean cyberattack (The Jerusalem Post)

St. Joseph Hospital owner says company targeted in cybersecurity incident (WMUR)

Victoria’s Secret Website Taken Offline After Cybersecurity Breach (GB Hackers)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 29 May 2025 20:10:00 -0000</pubDate>
      <itunes:title>When "out of the box" becomes "out of control."</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2318</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Children’s DNA in criminal databases. ASUS routers get an unwanted houseguest. New APT41 malware uses Google Calendar for command-and-control. Interlock ransomware gang deploys new Trojan. Estonia issues arrest warrant for suspect in massive pharmacy breach. The enemy within the endpoint. New England hospitals disrupted by cyberattack. Tim Starks from CyberScoop is discussing ‘Whatever we did was not enough’: How Salt Typhoon slipped through the government’s blind spots. And Victoria’s Secrets are leaked.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we have Tim Starks from CyberScoop discussing ‘Whatever we did was not enough’: How Salt Typhoon slipped through the government’s blind spots.

Selected Reading

 The US Is Storing Migrant Children’s DNA in a Criminal Database (WIRED)

GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers (GreyNoise)

Mark Your Calendar: APT41 Innovative Tactics (Google Threat Intelligence Group)

Interlock ransomware gang deploys new NodeSnake RAT on universities (BleepingComputer)

Estonia issues arrest warrant for Moroccan wanted for major pharmacy data breach (The Record)

Israeli company Syngia thwarts North Korean cyberattack (The Jerusalem Post)

St. Joseph Hospital owner says company targeted in cybersecurity incident (WMUR)

Victoria’s Secret Website Taken Offline After Cybersecurity Breach (GB Hackers)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Children’s DNA in criminal databases. ASUS routers get an unwanted houseguest. New APT41 malware uses Google Calendar for command-and-control. Interlock ransomware gang deploys new Trojan. Estonia issues arrest warrant for suspect in massive pharmacy breach. The enemy within the endpoint. New England hospitals disrupted by cyberattack. Tim Starks from CyberScoop is discussing ‘Whatever we did was not enough’: How Salt Typhoon slipped through the government’s blind spots. And Victoria’s Secrets are leaked.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we have <a href="https://www.linkedin.com/in/tstarks/"><u>Tim Starks</u></a> from <a href="https://www.linkedin.com/company/cyberscoop/"><u>CyberScoop</u></a> discussing ‘Whatever we did was not enough’: How Salt Typhoon slipped through the government’s blind spots.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.wired.com/story/cbp-dna-migrant-children-fbi-codis"><u> The US Is Storing Migrant Children’s DNA in a Criminal Database</u></a> (WIRED)</p>
<p><a href="https://www.greynoise.io/blog/stealthy-backdoor-campaign-affecting-asus-routers"><u>GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers</u></a> (GreyNoise)</p>
<p><a href="https://cloud.google.com/blog/topics/threat-intelligence/apt41-innovative-tactics"><u>Mark Your Calendar: APT41 Innovative Tactics</u></a> (Google Threat Intelligence Group)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/interlock-ransomware-gang-deploys-new-nodesnake-rat-on-universities/"><u>Interlock ransomware gang deploys new NodeSnake RAT on universities</u></a> (BleepingComputer)</p>
<p><a href="https://therecord.media/estonia-arrest-warrant-pharmacy-data-breach"><u>Estonia issues arrest warrant for Moroccan wanted for major pharmacy data breach</u></a> (The Record)</p>
<p><a href="https://www.jpost.com/jpost-tech/article-855888"><u>Israeli company Syngia thwarts North Korean cyberattack </u></a>(The Jerusalem Post)</p>
<p><a href="https://www.wmur.com/article/st-joseph-hospital-cybersecurity-52825/64907525"><u>St. Joseph Hospital owner says company targeted in cybersecurity incident</u></a> (WMUR)</p>
<p><a href="https://gbhackers.com/victorias-secret-websit/"><u>Victoria’s Secret Website Taken Offline After Cybersecurity Breach</u></a> (GB Hackers)</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1568</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c19fb650-1c7a-11f0-85e0-a3d97cd9b236]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9265536391.mp3?updated=1748547499" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fingers point east.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2317/notes</link>
      <description>The Czech Republic accuses Chinese state-backed hackers of cyber-espionage. CISA’s leaders head for the exits. Cybercriminals are using fake AI video generator websites to spread malware. A stealthy phishing campaign delivers the Remcos RAT via DBatLoader. A fake Bitdefender website spreads malware targeting financial data. Medusa ransomware claims to have breached global real estate firm RE/MAX. An Iranian national faces up to 30 years in prison for ransomware targeting US cities. Our guest is Tony Velleca, CyberProof's CEO,  discussing exposure management and a more risk-focused approach to prioritize threats. Mind reading for fun and profit. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices segment, at the 2025 RSA Conference we were joined by Tony Velleca, CyberProof's CEO, who is discussing exposure management and moving towards a more risk-focused approach to prioritize threats. Listen to Tony’s interview here.

Selected Reading

Chinese spies blamed for attempted hack on Czech government network (The Record)

CISA loses nearly all top officials as purge continues- (Cybersecurity Dive)

Google warns of Vietnam-based hackers using bogus AI video generators to spread malware (The Record)

Chrome 137, Firefox 139 Patch High-Severity Vulnerabilities (SecurityWeek)

New Phishing Campaign Uses DBatLoader to Drop Remcos RAT: What Analysts Need to Know (Hack Read)

Hackers Mimic Popular Antivirus Site to Deliver VenomRAT &amp; Steal Finance Data (Cybersecurity News)

RE/MAX deals with alleged 150GB data theft: Medusa ransomware demands $200K (Cyber News)

CISA Releases ICS Advisories Covering Vulnerabilities &amp; Exploits (Cybersecurity News)

Iranian pleads guilty to launching Baltimore ransomware attack, faces 30 years behind bars (The Record)

Neural Privacy Under Threat: The Battle for Neural Data  (tsaaro consulting)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 28 May 2025 20:10:00 -0000</pubDate>
      <itunes:title>Fingers point east. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2317</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The Czech Republic accuses Chinese state-backed hackers of cyber-espionage. CISA’s leaders head for the exits. Cybercriminals are using fake AI video generator websites to spread malware. A stealthy phishing campaign delivers the Remcos RAT via DBatLoader. A fake Bitdefender website spreads malware targeting financial data. Medusa ransomware claims to have breached global real estate firm RE/MAX. An Iranian national faces up to 30 years in prison for ransomware targeting US cities. Our guest is Tony Velleca, CyberProof's CEO,  discussing exposure management and a more risk-focused approach to prioritize threats. Mind reading for fun and profit. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices segment, at the 2025 RSA Conference we were joined by Tony Velleca, CyberProof's CEO, who is discussing exposure management and moving towards a more risk-focused approach to prioritize threats. Listen to Tony’s interview here.

Selected Reading

Chinese spies blamed for attempted hack on Czech government network (The Record)

CISA loses nearly all top officials as purge continues- (Cybersecurity Dive)

Google warns of Vietnam-based hackers using bogus AI video generators to spread malware (The Record)

Chrome 137, Firefox 139 Patch High-Severity Vulnerabilities (SecurityWeek)

New Phishing Campaign Uses DBatLoader to Drop Remcos RAT: What Analysts Need to Know (Hack Read)

Hackers Mimic Popular Antivirus Site to Deliver VenomRAT &amp; Steal Finance Data (Cybersecurity News)

RE/MAX deals with alleged 150GB data theft: Medusa ransomware demands $200K (Cyber News)

CISA Releases ICS Advisories Covering Vulnerabilities &amp; Exploits (Cybersecurity News)

Iranian pleads guilty to launching Baltimore ransomware attack, faces 30 years behind bars (The Record)

Neural Privacy Under Threat: The Battle for Neural Data  (tsaaro consulting)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Czech Republic accuses Chinese state-backed hackers of cyber-espionage. CISA’s leaders head for the exits. Cybercriminals are using fake AI video generator websites to spread malware. A stealthy phishing campaign delivers the Remcos RAT via DBatLoader. A fake Bitdefender website spreads malware targeting financial data. Medusa ransomware claims to have breached global real estate firm RE/MAX. An Iranian national faces up to 30 years in prison for ransomware targeting US cities. Our guest is Tony Velleca, CyberProof's CEO,  discussing exposure management and a more risk-focused approach to prioritize threats. Mind reading for fun and profit.<strong> </strong></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On today’s Industry Voices segment, at the 2025 RSA Conference we were joined by <a href="https://www.linkedin.com/in/tony-velleca-90224b/"><u>Tony Velleca</u></a>, <a href="https://www.linkedin.com/company/cyberproof-inc-/"><u>CyberProof</u></a>'s CEO, who is discussing exposure management and moving towards a more risk-focused approach to prioritize threats. Listen to Tony’s interview <a href="https://explore.thecyberwire.com/tony-velleca"><u>here</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/czechia-accuses-china-cyber-espionage-apt31"><u>Chinese spies blamed for attempted hack on Czech government network</u></a> (The Record)</p>
<p><a href="https://www.cybersecuritydive.com/news/cisa-senior-official-departures/748992/"><u>CISA loses nearly all top officials as purge continues</u></a>- (Cybersecurity Dive)</p>
<p><a href="https://therecord.media/malvertising-vietnam-hackers-fake-ai-video-generators"><u>Google warns of Vietnam-based hackers using bogus AI video generators to spread malware</u></a> (The Record)</p>
<p><a href="https://www.securityweek.com/chrome-137-firefox-139-patch-high-severity-vulnerabilities/"><u>Chrome 137, Firefox 139 Patch High-Severity Vulnerabilities </u></a>(SecurityWeek)</p>
<p><a href="https://hackread.com/new-phishing-campaign-dbatloader-drop-remcos-rat/"><u>New Phishing Campaign Uses DBatLoader to Drop Remcos RAT: What Analysts Need to Know</u></a> (Hack Read)</p>
<p><a href="https://cybersecuritynews.com/hackers-mimic-popular-antivirus-site/"><u>Hackers Mimic Popular Antivirus Site to Deliver VenomRAT &amp; Steal Finance Data</u></a> (Cybersecurity News)</p>
<p><a href="https://cnews.link/medusa-ransomware-threatens-release-remax-data-1/"><u>RE/MAX deals with alleged 150GB data theft: Medusa ransomware demands $200K</u></a> (Cyber News)</p>
<p><a href="https://cybersecuritynews.com/cisa-johnson-controls-istar-utility/"><u>CISA Releases ICS Advisories Covering Vulnerabilities &amp; Exploits</u></a> (Cybersecurity News)</p>
<p><a href="https://therecord.media/iranian-years-decades-guilty-ransomware"><u>Iranian pleads guilty to launching Baltimore ransomware attack, faces 30 years behind bars</u></a> (The Record)</p>
<p><a href="https://tsaaro.com/newsletter/neural-privacy-under-threat-the-battle-for-neural-data/"><u>Neural Privacy Under Threat: The Battle for Neural Data  </u></a>(tsaaro consulting)</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1727</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c1788e72-1c7a-11f0-85e0-6bb18fdee0e1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7361715531.mp3?updated=1748449712" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BEAR-ly washed and dangerous.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2316/notes</link>
      <description>“Laundry Bear” airs dirty cyber linen in the Netherlands. AI coding agents are tricked by malicious prompts in a Github MCP vulnerability.Tenable patches critical flaws in Network Monitor on Windows. MathWorks confirms ransomware behind MATLAB outage. Feds audit NVD over vulnerability backlog. FBI warns law firms of evolving Silent Ransom Group tactics. Chinese hackers exploit Cityworks flaw to breach US municipal networks. Everest Ransomware Group leaks Coca-Cola employee data. Nova Scotia Power hit by ransomware.  On today’s Threat Vector, ⁠David Moulton⁠ speaks with ⁠his Palo Alto Networks colleagues Tanya Shastri⁠ and ⁠Navneet Singh about a strategy for secure AI by design.  CIA’s secret spy site was… a Star Wars fan page?

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector

In this segment of Threat Vector, host ⁠David Moulton⁠ speaks with ⁠Tanya Shastri⁠, SVP of Product Management, and ⁠Navneet Singh⁠, VP of Marketing - Network Security, at Palo Alto Networks. They explore what it means to adopt a secure AI by design strategy, giving employees the freedom to innovate with generative AI while maintaining control and reducing risk. You can hear their full discussion on Threat Vector ⁠here⁠ and catch new episodes every Thursday on your favorite podcast app.

Selected Reading

Dutch intelligence unmasks previously unknown Russian hacking group 'Laundry Bear' (The Record)

GitHub MCP Server Vulnerability Let Attackers Access Private Repositories (Cybersecurity News)

Tenable Network Monitor Vulnerabilities Let Attackers Escalate Privileges (Cybersecurity News)

Ransomware attack on MATLAB dev MathWorks – licensing center still locked down (The Register)

US Government Launches Audit of NIST’s National Vulnerability Database (Infosecurity Magazine)

Law Firms Warned of Silent Ransom Group Attacks  (SecurityWeek)

Chinese Hackers Exploit Cityworks Flaw to Target US Local Governments (Infosecurity Magazine)

Everest Ransomware Leaks Coca-Cola Employee Data Online (Hackread)

Nova Scotia Power Suffers Ransomware Attack; 280,000 Customers' Data Compromised (GB Hackers)

The CIA Secretly Ran a Star Wars Fan Site (404 Media)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 May 2025 20:10:00 -0000</pubDate>
      <itunes:title>BEAR-ly washed and dangerous.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2316</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>“Laundry Bear” airs dirty cyber linen in the Netherlands. AI coding agents are tricked by malicious prompts in a Github MCP vulnerability.Tenable patches critical flaws in Network Monitor on Windows. MathWorks confirms ransomware behind MATLAB outage. Feds audit NVD over vulnerability backlog. FBI warns law firms of evolving Silent Ransom Group tactics. Chinese hackers exploit Cityworks flaw to breach US municipal networks. Everest Ransomware Group leaks Coca-Cola employee data. Nova Scotia Power hit by ransomware.  On today’s Threat Vector, ⁠David Moulton⁠ speaks with ⁠his Palo Alto Networks colleagues Tanya Shastri⁠ and ⁠Navneet Singh about a strategy for secure AI by design.  CIA’s secret spy site was… a Star Wars fan page?

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector

In this segment of Threat Vector, host ⁠David Moulton⁠ speaks with ⁠Tanya Shastri⁠, SVP of Product Management, and ⁠Navneet Singh⁠, VP of Marketing - Network Security, at Palo Alto Networks. They explore what it means to adopt a secure AI by design strategy, giving employees the freedom to innovate with generative AI while maintaining control and reducing risk. You can hear their full discussion on Threat Vector ⁠here⁠ and catch new episodes every Thursday on your favorite podcast app.

Selected Reading

Dutch intelligence unmasks previously unknown Russian hacking group 'Laundry Bear' (The Record)

GitHub MCP Server Vulnerability Let Attackers Access Private Repositories (Cybersecurity News)

Tenable Network Monitor Vulnerabilities Let Attackers Escalate Privileges (Cybersecurity News)

Ransomware attack on MATLAB dev MathWorks – licensing center still locked down (The Register)

US Government Launches Audit of NIST’s National Vulnerability Database (Infosecurity Magazine)

Law Firms Warned of Silent Ransom Group Attacks  (SecurityWeek)

Chinese Hackers Exploit Cityworks Flaw to Target US Local Governments (Infosecurity Magazine)

Everest Ransomware Leaks Coca-Cola Employee Data Online (Hackread)

Nova Scotia Power Suffers Ransomware Attack; 280,000 Customers' Data Compromised (GB Hackers)

The CIA Secretly Ran a Star Wars Fan Site (404 Media)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>“Laundry Bear” airs dirty cyber linen in the Netherlands. AI coding agents are tricked by malicious prompts in a Github MCP vulnerability.Tenable patches critical flaws in Network Monitor on Windows. MathWorks confirms ransomware behind MATLAB outage. Feds audit NVD over vulnerability backlog. FBI warns law firms of evolving Silent Ransom Group tactics. Chinese hackers exploit Cityworks flaw to breach US municipal networks. Everest Ransomware Group leaks Coca-Cola employee data. Nova Scotia Power hit by ransomware.  On today’s Threat Vector, ⁠David Moulton⁠ speaks with ⁠his Palo Alto Networks colleagues Tanya Shastri⁠ and ⁠Navneet Singh about a strategy for secure AI by design.  CIA’s secret spy site was… a Star Wars fan page?</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Threat Vector</strong></p>
<p>In this segment of Threat Vector, host <a href="https://www.linkedin.com/in/davidrmoulton/"><u>⁠David Moulton⁠</u></a> speaks with <a href="https://www.linkedin.com/in/tanyas/"><u>⁠Tanya Shastri⁠</u></a>, SVP of Product Management, and <a href="https://www.linkedin.com/in/nasingh/"><u>⁠Navneet Singh⁠</u></a>, VP of Marketing - Network Security, at Palo Alto Networks. They explore what it means to adopt a secure AI by design strategy, giving employees the freedom to innovate with generative AI while maintaining control and reducing risk. You can hear their full discussion on Threat Vector <a href="https://thecyberwire.com/podcasts/threat-vector/68/notes"><u>⁠here⁠</u></a> and catch new episodes every Thursday on your favorite podcast app.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/laundry-bear-void-blizzard-russia-hackers-netherlands"><u>Dutch intelligence unmasks previously unknown Russian hacking group 'Laundry Bear'</u></a> (The Record)</p>
<p><a href="https://cybersecuritynews.com/github-mcp-server-vulnerability/"><u>GitHub MCP Server Vulnerability Let Attackers Access Private Repositories</u></a> (Cybersecurity News)</p>
<p><a href="https://cybersecuritynews.com/tenable-network-monitor-vulnerabilities/"><u>Tenable Network Monitor Vulnerabilities Let Attackers Escalate Privileges</u></a> (Cybersecurity News)</p>
<p><a href="https://www.theregister.com/2025/05/27/mathworks_ransomware_attack_leaves_ondeadline/"><u>Ransomware attack on MATLAB dev MathWorks – licensing center still locked down</u></a> (The Register)</p>
<p><a href="https://www.infosecurity-magazine.com/news/us-government-launches-audit-nist/"><u>US Government Launches Audit of NIST’s National Vulnerability Database</u> (Infosecurity Magazine</a>)</p>
<p><a href="https://www.securityweek.com/law-firms-warned-of-silent-ransom-group-attacks/"><u>Law Firms Warned of Silent Ransom Group Attacks </u> (SecurityWeek</a>)</p>
<p><a href="https://www.infosecurity-magazine.com/news/chinese-hackers-cityworks-local/"><u>Chinese Hackers Exploit Cityworks Flaw to Target US Local Governments</u> (Infosecurity Magazine</a>)</p>
<p><a href="https://hackread.com/everest-ransomware-leaks-coca-cola-employee-data/"><u>Everest Ransomware Leaks Coca-Cola Employee Data Online</u></a> (Hackread)</p>
<p><a href="https://gbhackers.com/nova-scotia-power-suffers-ransomware/"><u>Nova Scotia Power Suffers Ransomware Attack; 280,000 Customers' Data Compromised</u></a> (GB Hackers)</p>
<p><a href="https://www.404media.co/the-cia-secretly-ran-a-star-wars-fan-site/"><u>The CIA Secretly Ran a Star Wars Fan Site</u></a> (404 Media)</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1783</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c1504214-1c7a-11f0-85e0-e7b50bffe35a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1987787678.mp3?updated=1748374678" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title> AWS in Orbit: Automated Satellite Management. [T-Minus Space]</title>
      <link>https://space.n2k.com/podcasts/t-minus/aws-in-orbit-21</link>
      <description>While our team is observing Memorial Day in the United States, please enjoy this episode from our team from T-Minus Space Daily recorded recently at Space Symposium.



You can learn more about AWS in Orbit at space.n2k.com/aws.

Our guests on this episode are Dax Garner, CTO at Cognitive Space and Ed Meletyan, AWS Sr Solutions Architect.



Remember to leave us a 5-star rating and review in your favorite podcast app.

Be sure to follow T-Minus on LinkedIn and Instagram.



Selected Reading

AWS Aerospace and Satellite



Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.



Want to join us for an interview?

Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.



T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 26 May 2025 06:00:00 -0000</pubDate>
      <itunes:title> AWS in Orbit: Automated Satellite Management.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>21</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/59e7931c-37db-11f0-b157-a76fdbef88d8/image/5bf353b8161d63e4c8d41f0409dc5650.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Find out how AWS for Aerospace and Satellite is  assisting automated satellite management with Cognitive Space. </itunes:subtitle>
      <itunes:summary>While our team is observing Memorial Day in the United States, please enjoy this episode from our team from T-Minus Space Daily recorded recently at Space Symposium.



You can learn more about AWS in Orbit at space.n2k.com/aws.

Our guests on this episode are Dax Garner, CTO at Cognitive Space and Ed Meletyan, AWS Sr Solutions Architect.



Remember to leave us a 5-star rating and review in your favorite podcast app.

Be sure to follow T-Minus on LinkedIn and Instagram.



Selected Reading

AWS Aerospace and Satellite



Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.



Want to join us for an interview?

Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.



T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While our team is observing Memorial Day in the United States, please enjoy this episode from our team from </strong></em><a href="https://space.n2k.com/podcasts/t-minus"><em><strong>T-Minus Space Daily</strong></em></a><em><strong> recorded recently at Space Symposium.</strong></em></p>
<p><br></p>
<p>You can learn more about AWS in Orbit at <a href="https://space.n2k.com/aws">space.n2k.com/aws</a>.</p>
<p>Our guests on this episode are <a href="https://www.linkedin.com/in/daxgarner/">Dax Garner</a>, CTO at <a href="https://www.cognitivespace.com/">Cognitive Space</a> and <a href="https://www.credly.com/users/ed-meletyan">Ed Meletyan</a>, AWS Sr Solutions Architect.</p>
<p><br></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Be sure to follow T-Minus on <a href="https://www.linkedin.com/company/n2k-space/">LinkedIn</a> and <a href="https://www.instagram.com/tminusdaily/">Instagram</a>.</p>
<p><br></p>
<p>Selected Reading</p>
<p><a href="https://aws.amazon.com/aerospace-and-satellite/?trk=c9d66aa7-01dc-4cbe-93b1-2c987a64a1d9&amp;sc_channel=el">AWS Aerospace and Satellite</a></p>
<p><br></p>
<p>Want to hear your company in the show?</p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/ung56qbvknfbj9z2">media kit</a>. Contact us at <a href="mailto:space@n2k.com">space@n2k.com</a> to request more info.</p>
<p><br></p>
<p>Want to join us for an interview?</p>
<p>Please send your pitch to <a href="mailto:space-editor@n2k.com">space-editor@n2k.com</a> and include your name, affiliation, and topic proposal.</p>
<p><br></p>
<p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1358</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[59e7931c-37db-11f0-b157-a76fdbef88d8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4656646713.mp3?updated=1744997417" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hugh Thompson on Building the RSA Conference [Afternoon Cyber Tea]</title>
      <link>https://thecyberwire.com/podcasts/afternoon-cyber-tea/107/notes</link>
      <description>While our team is observing Memorial Day in the United States, please enjoy this episode from the N2K CyberWire network partner, Microsoft Security. You can hear new episodes of Ann Johnson's Afternoon Cyber Tea podcast every other Tuesday.



Dr. Hugh Thompson, Executive Chairman of RSA Conference and Managing Partner at Crosspoint Capital joins Ann on this week's episode of Afternoon Cyber Tea. They discuss what goes into planning the world’s largest cybersecurity conference—from theme selection to llama-related surprises on the expo floor—and how the RSA community continues to evolve. Hugh also shares how his background in applied math led him from academia to cybersecurity, his thoughts on the human element in security, and what keeps him optimistic about the future of the industry. 

 

Resources:  

View Hugh Thompson on LinkedIn   

View Ann Johnson on LinkedIn   

  

  

Related Microsoft Podcasts:  


  
Microsoft Threat Intelligence Podcast  





  
The BlueHat Podcast   





  
Uncovering Hidden Risks  




      

Discover and follow other Microsoft podcasts at microsoft.com/podcasts  

  

Afternoon Cyber Tea with Ann Johnson is produced by Microsoft and distributed as part of N2K media network. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 26 May 2025 06:00:00 -0000</pubDate>
      <itunes:title>Hugh Thompson on Building the RSA Conference </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>107</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>While our team is observing Memorial Day in the United States, please enjoy this episode from the N2K CyberWire network partner, Microsoft Security. You can hear new episodes of Ann Johnson's Afternoon Cyber Tea podcast every other Tuesday.



Dr. Hugh Thompson, Executive Chairman of RSA Conference and Managing Partner at Crosspoint Capital joins Ann on this week's episode of Afternoon Cyber Tea. They discuss what goes into planning the world’s largest cybersecurity conference—from theme selection to llama-related surprises on the expo floor—and how the RSA community continues to evolve. Hugh also shares how his background in applied math led him from academia to cybersecurity, his thoughts on the human element in security, and what keeps him optimistic about the future of the industry. 

 

Resources:  

View Hugh Thompson on LinkedIn   

View Ann Johnson on LinkedIn   

  

  

Related Microsoft Podcasts:  


  
Microsoft Threat Intelligence Podcast  





  
The BlueHat Podcast   





  
Uncovering Hidden Risks  




      

Discover and follow other Microsoft podcasts at microsoft.com/podcasts  

  

Afternoon Cyber Tea with Ann Johnson is produced by Microsoft and distributed as part of N2K media network. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em><strong>While our team is observing Memorial Day in the United States, please enjoy this episode from the N2K CyberWire network partner, Microsoft Security. You can hear new episodes of Ann Johnson's </strong></em><a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea"><em><strong>Afternoon Cyber Tea</strong></em></a><em><strong> podcast every other Tuesday.</strong></em></p>
<p><br></p>
<p><a href="https://www.linkedin.com/in/hugh-thompson-ph-d-3b51bb2/"><u>Dr. Hugh Thompson</u></a>, Executive Chairman of RSA Conference and Managing Partner at Crosspoint Capital joins Ann on this week's episode of Afternoon Cyber Tea. They discuss what goes into planning the world’s largest cybersecurity conference—from theme selection to llama-related surprises on the expo floor—and how the RSA community continues to evolve. Hugh also shares how his background in applied math led him from academia to cybersecurity, his thoughts on the human element in security, and what keeps him optimistic about the future of the industry. </p>
<p> </p>
<p>Resources:  </p>
<p><a href="https://www.linkedin.com/in/hugh-thompson-ph-d-3b51bb2/"><u>View Hugh Thompson on LinkedIn</u></a> <a href="https://www.linkedin.com/in/yonatanzunger/"><u> </u></a> </p>
<p><a href="https://www.linkedin.com/in/ann-johnsons/"><u>View Ann Johnson on LinkedIn</u></a>   </p>
<p>  </p>
<p>  </p>
<p>Related Microsoft Podcasts:  </p>
<ul>
  <li>
<p><a href="https://msthreatintelpodcast.com/"><u>Microsoft Threat Intelligence Podcast</u></a>  </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://bluehatpodcast.com/"><u>The BlueHat Podcast</u></a>   </p>
</li>
</ul>
<ul>
  <li>
<p><a href="https://uncoveringhiddenrisks.com/"><u>Uncovering Hidden Risks</u></a>  </p>
</li>
</ul>
<p>      </p>
<p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> </a><a href="https://news.microsoft.com/podcasts/"><u>microsoft.com/podcasts</u></a>  </p>
<p>  </p>
<p><em>Afternoon Cyber Tea with Ann Johnson is produced by Microsoft and distributed as part of N2K media network. </em></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2254</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d866140c-37d6-11f0-9aab-5f991d97713f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6704920354.mp3?updated=1747694114" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pattie Dillon: Take the leap. [Anti-fraud] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/69/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Product Manager in Anti-Fraud Solutions at SpyCloud, Pattie Dillon shares her journey from raising her family to specializing in the anti-fraud space. Upon reentering the workforce, Pattie worked on identity verification and developed a system with privacy concerns in mind. She moved to work in gift cards and was exposed to money laundering. Traveling along the fraud spectrum, Pattie learned about underground data and feels that this data can be leveraged to actually prevent and fight online fraud. Pattie believes if you don't try, you'll never know. We know we appreciate Pattie sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 25 May 2025 07:00:00 -0000</pubDate>
      <itunes:title>Pattie Dillon: Take the leap. [Anti-fraud] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>69</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/62f6b006-3735-11f0-b33d-d30bd5c970b6/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Product Manager in Anti-Fraud Solutions at SpyCloud, Pattie Dillon shares her journey from raising her family to specializing in the anti-fraud space. Upon reentering the workforce, Pattie worked on identity verification and developed a system with privacy concerns in mind. She moved to work in gift cards and was exposed to money laundering. Traveling along the fraud spectrum, Pattie learned about underground data and feels that this data can be leveraged to actually prevent and fight online fraud. Pattie believes if you don't try, you'll never know. We know we appreciate Pattie sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Product Manager in Anti-Fraud Solutions at SpyCloud, Pattie Dillon shares her journey from raising her family to specializing in the anti-fraud space. Upon reentering the workforce, Pattie worked on identity verification and developed a system with privacy concerns in mind. She moved to work in gift cards and was exposed to money laundering. Traveling along the fraud spectrum, Pattie learned about underground data and feels that this data can be leveraged to actually prevent and fight online fraud. Pattie believes if you don't try, you'll never know. We know we appreciate Pattie sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>546</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[62f6b006-3735-11f0-b33d-d30bd5c970b6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6119894237.mp3?updated=1747932467" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Purple teaming in the modern enterprise. [CyberWire-X]</title>
      <link>https://thecyberwire.com/podcasts/cyberwire-x/51/notes</link>
      <description>In large enterprise software companies, Red and Blue Teams collaborate through Purple Teaming to proactively detect, respond to, and mitigate advanced threats. In this episode of CyberWire-X, N2K's Dave Bittner is joined by Adobe’s Justin Tiplitsky, Director of Red Team and Ivan Koshkin, Senior Detection Engineer to discuss how their teams work together daily to strengthen Adobe’s security ecosystem. They share real-world insights on how this essential collaboration enhances threat detection, refines security controls, and improves overall cyber resilience.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 25 May 2025 05:00:00 -0000</pubDate>
      <itunes:title>Purple teaming in the modern enterprise. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>51</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/855b836c-3689-11f0-ad2a-073ac49e0035/image/cca6449db500549f3982c5870b5f89a9.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In large enterprise software companies, Red and Blue Teams collaborate through Purple Teaming to proactively detect, respond to, and mitigate advanced threats. In this episode of CyberWire-X, N2K's Dave Bittner is joined by Adobe’s Justin Tiplitsky, Director of Red Team and Ivan Koshkin, Senior Detection Engineer to discuss how their teams work together daily to strengthen Adobe’s security ecosystem. They share real-world insights on how this essential collaboration enhances threat detection, refines security controls, and improves overall cyber resilience.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In large enterprise software companies, Red and Blue Teams collaborate through Purple Teaming to proactively detect, respond to, and mitigate advanced threats. In this episode of CyberWire-X, N2K's Dave Bittner is joined by Adobe’s<strong> </strong><a href="https://www.linkedin.com/in/jtiplitsky/">Justin Tiplitsky</a><strong>, </strong>Director of Red Team and <a href="https://www.linkedin.com/in/ivan-koshkin-a916a1a7/">Ivan Koshkin</a>, Senior Detection Engineer<strong> </strong>to discuss how their teams work together daily to strengthen Adobe’s security ecosystem. They share real-world insights on how this essential collaboration enhances threat detection, refines security controls, and improves overall cyber resilience.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1590</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[855b836c-3689-11f0-ad2a-073ac49e0035]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1587169244.mp3?updated=1747860740" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pandas with a purpose. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/378/notes</link>
      <description>This week, we are joined by Deepen Desai, Zscaler's Chief Security Officer and EVP of Cyber and AI Engineering, taking a dive deep into Mustang Panda’s latest campaign. Zscaler ThreatLabz uncovered new tools used by Mustang Panda, including the backdoors TONEINS, TONESHELL, PUBLOAD, and the proxy tool StarLoader, all delivered via phishing. 

They also discovered two custom keyloggers, PAKLOG and CorKLOG, and an EDR evasion tool, SplatCloak, highlighting the group's focus on surveillance, persistence, and stealth in cyberespionage operations.4o.

The research can be found here:


  Latest Mustang Panda Arsenal: ToneShell and StarProxy | P1

  Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 May 2025 07:00:00 -0000</pubDate>
      <itunes:title>Pandas with a purpose. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>378</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6de12d96-37ff-11f0-bcb6-1f5f58490fe6/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Deepen Desai, Zscaler's Chief Security Officer and EVP of Cyber and AI Engineering, taking a dive deep into Mustang Panda’s latest campaign. Zscaler ThreatLabz uncovered new tools used by Mustang Panda, including the backdoors TONEINS, TONESHELL, PUBLOAD, and the proxy tool StarLoader, all delivered via phishing. 

They also discovered two custom keyloggers, PAKLOG and CorKLOG, and an EDR evasion tool, SplatCloak, highlighting the group's focus on surveillance, persistence, and stealth in cyberespionage operations.4o.

The research can be found here:


  Latest Mustang Panda Arsenal: ToneShell and StarProxy | P1

  Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/deepen-desai-48487b2/">Deepen Desai</a>, <a href="https://www.linkedin.com/company/zscaler/">Zscaler</a>'s Chief Security Officer and EVP of Cyber and AI Engineering, taking a dive deep into Mustang Panda’s latest campaign. Zscaler ThreatLabz uncovered new tools used by Mustang Panda, including the backdoors TONEINS, TONESHELL, PUBLOAD, and the proxy tool StarLoader, all delivered via phishing. </p>
<p>They also discovered two custom keyloggers, PAKLOG and CorKLOG, and an EDR evasion tool, SplatCloak, highlighting the group's focus on surveillance, persistence, and stealth in cyberespionage operations.4o.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.zscaler.com/blogs/security-research/latest-mustang-panda-arsenal-toneshell-and-starproxy-p1">Latest Mustang Panda Arsenal: ToneShell and StarProxy | P1</a></li>
  <li><a href="https://www.zscaler.com/blogs/security-research/latest-mustang-panda-arsenal-paklog-corklog-and-splatcloak-p2">Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1040</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6de12d96-37ff-11f0-bcb6-1f5f58490fe6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2393493196.mp3?updated=1748014340" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When malware masters meet their match.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2315/notes</link>
      <description>Operation Endgame dismantles cybercriminal infrastructure. DOGE’s use of the Grok AI chatbot raises ethical and privacy concerns. Malware on the npm registry uses malicious packages to quietly gather intelligence on developer environments. Researchers link Careto malware to the Spanish government. Exploring proactive operations via letters of marque. Hackers hesitate to attend the HOPE conference over travel concerns. Our guest is Jeffrey Wheatman, Cyber Risk Expert at Black Kite, warning us to "Beware the silent breach." AI threatens to spill secrets to save itself.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices, we were joined at the RSAC Conference by Jeffrey Wheatman, Cyber Risk Expert at Black Kite, as he is sharing his thoughts on "Beware the silent breach." Listen to Jeffery’s interview here.Selected Reading

Operation ENDGAME strikes again: the ransomware kill chain broken at its source (Europol)

Russian developer of Qakbot malware indicted by US for global ransomware campaign (CNews)

Russian hackers target US and allies to disrupt Ukraine aid, warns NSA (CNews)

Exclusive: Musk’s DOGE expanding his Grok AI in U.S. government, raising conflict concerns (Reuters)

60 malicious npm packages caught mapping developer networks (Developer Tech)

Mysterious hacking group Careto was run by the Spanish government, sources say (TechCrunch)

An 18th-century war power resurfaces in cyber policy talks (Next Gov)

Hacker Conference HOPE Says U.S. Immigration Crackdown Caused Massive Crash in Ticket Sales (404 Media)

Anthropic's new AI model turns to blackmail when engineers try to take it offline (TechCrunch)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 23 May 2025 20:10:00 -0000</pubDate>
      <itunes:title>When malware masters meet their match.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2315</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Operation Endgame dismantles cybercriminal infrastructure. DOGE’s use of the Grok AI chatbot raises ethical and privacy concerns. Malware on the npm registry uses malicious packages to quietly gather intelligence on developer environments. Researchers link Careto malware to the Spanish government. Exploring proactive operations via letters of marque. Hackers hesitate to attend the HOPE conference over travel concerns. Our guest is Jeffrey Wheatman, Cyber Risk Expert at Black Kite, warning us to "Beware the silent breach." AI threatens to spill secrets to save itself.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices, we were joined at the RSAC Conference by Jeffrey Wheatman, Cyber Risk Expert at Black Kite, as he is sharing his thoughts on "Beware the silent breach." Listen to Jeffery’s interview here.Selected Reading

Operation ENDGAME strikes again: the ransomware kill chain broken at its source (Europol)

Russian developer of Qakbot malware indicted by US for global ransomware campaign (CNews)

Russian hackers target US and allies to disrupt Ukraine aid, warns NSA (CNews)

Exclusive: Musk’s DOGE expanding his Grok AI in U.S. government, raising conflict concerns (Reuters)

60 malicious npm packages caught mapping developer networks (Developer Tech)

Mysterious hacking group Careto was run by the Spanish government, sources say (TechCrunch)

An 18th-century war power resurfaces in cyber policy talks (Next Gov)

Hacker Conference HOPE Says U.S. Immigration Crackdown Caused Massive Crash in Ticket Sales (404 Media)

Anthropic's new AI model turns to blackmail when engineers try to take it offline (TechCrunch)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Operation Endgame dismantles cybercriminal infrastructure. DOGE’s use of the Grok AI chatbot raises ethical and privacy concerns. Malware on the npm registry uses malicious packages to quietly gather intelligence on developer environments. Researchers link Careto malware to the Spanish government. Exploring proactive operations via letters of marque. Hackers hesitate to attend the HOPE conference over travel concerns. Our guest is Jeffrey Wheatman, Cyber Risk Expert at Black Kite, warning us to "Beware the silent breach." AI threatens to spill secrets to save itself.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On today’s Industry Voices, we were joined at the RSAC Conference by <a href="https://www.linkedin.com/in/jnwheatman/"><u>Jeffrey Wheatman</u></a>, Cyber Risk Expert at <a href="https://www.linkedin.com/company/blackkite/"><u>Black Kite</u></a>, as he is sharing his thoughts on "Beware the silent breach." Listen to Jeffery’s interview here.<br><strong>Selected Reading</strong></p>
<p><a href="https://www.europol.europa.eu/media-press/newsroom/news/operation-endgame-strikes-again-ransomware-kill-chain-broken-its-source"><u>Operation ENDGAME strikes again: the ransomware kill chain broken at its source </u></a>(Europol)</p>
<p><a href="https://cnews.link/russian-indicted-qakbot-malware-developer-leader-ransomware-1/"><u>Russian developer of Qakbot malware indicted by US for global ransomware campaign</u></a> (CNews)</p>
<p><a href="https://cnews.link/russian-hackers-target-us-disrupt-ukraine-aid-nsa-1/"><u>Russian hackers target US and allies to disrupt Ukraine aid, warns NSA</u></a> (CNews)</p>
<p><a href="https://www.reuters.com/sustainability/boards-policy-regulation/musks-doge-expanding-his-grok-ai-us-government-raising-conflict-concerns-2025-05-23/"><u>Exclusive: Musk’s DOGE expanding his Grok AI in U.S. government, raising conflict concerns </u></a>(Reuters)</p>
<p><a href="https://www.developer-tech.com/news/60-malicious-npm-packages-mapping-developer-networks/"><u>60 malicious npm packages caught mapping developer networks</u></a> (Developer Tech)</p>
<p><a href="https://techcrunch.com/2025/05/23/mysterious-hacking-group-careto-was-run-by-the-spanish-government-sources-say/"><u>Mysterious hacking group Careto was run by the Spanish government, sources say </u></a>(TechCrunch)</p>
<p><a href="https://www.nextgov.com/cybersecurity/2025/05/18th-century-war-power-resurfaces-cyber-policy-talks/405526/?oref=ng-author-river"><u>An 18th-century war power resurfaces in cyber policy talks</u></a> (Next Gov)</p>
<p><a href="https://www.404media.co/hacker-conference-hope-says-fewer-people-buying-tickets-because-u-s-immigration-crackdown/"><u>Hacker Conference HOPE Says U.S. Immigration Crackdown Caused Massive Crash in Ticket Sales</u></a> (404 Media)</p>
<p><br><a href="https://techcrunch.com/2025/05/22/anthropics-new-ai-model-turns-to-blackmail-when-engineers-try-to-take-it-offline/"><u>Anthropic's new AI model turns to blackmail when engineers try to take it offline </u></a>(TechCrunch)</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2021</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c1017670-1c7a-11f0-85e0-33791f8f2fd7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5517582849.mp3?updated=1748024069" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lights out for Lumma.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2314/notes</link>
      <description>A joint operation takes down Lumma infrastructure. The FTC finalizes a security settlement with GoDaddy. The Telemessage breach compromised far more U.S. officials than initially known. Twin hackers allegedly breach a major federal software provider from the inside. U.S. telecom providers fail to notify the Senate when law enforcement agencies request data from Senate-issued devices.DragonForce makes its mark on the ransomware front. A data leak threatens survivors of domestic abuse in the UK. Lexmark discloses a critical vulnerability affecting over 120 printer models. Our guest is David Holmes, CTO for Application Security at Imperva, with insights into the role of AI in bot attacks. Scammers ship stolen cash in Squishmallows.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today’s guest is David Holmes, CTO for Application Security at Imperva, a Thales company, who is sharing some insights into the role of AI in bot attacks.

Selected Reading

Lumma infostealer’s infrastructure seized during US, EU, Microsoft operation (the Record)

FTC finalizes order requiring GoDaddy to secure hosting services (Bleeping Computer)

Exclusive: Hacker who breached communications app used by Trump aide stole data from across US government (Reuters)

By Default, Signal Doesn't Recall (Signal)

Hack of Contractor Was at Root of Massive Federal Data Breach (Bloomberg)

Phone companies failed to warn senators about surveillance, Wyden says - Live Updates (POLITICO)

DragonForce targets rivals in a play for dominance (Sophos News)

‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential refuge addresses (The Record)

Lexmark reporting remote code execution flaw affecting over 120 Printer Models (Beyond Machines)

DOJ charges 12 more in $263 million crypto fraud takedown where money was hidden in squishmallow stuffed animals (Bitdefender)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 22 May 2025 20:10:00 -0000</pubDate>
      <itunes:title>Lights out for Lumma.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2314</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A joint operation takes down Lumma infrastructure. The FTC finalizes a security settlement with GoDaddy. The Telemessage breach compromised far more U.S. officials than initially known. Twin hackers allegedly breach a major federal software provider from the inside. U.S. telecom providers fail to notify the Senate when law enforcement agencies request data from Senate-issued devices.DragonForce makes its mark on the ransomware front. A data leak threatens survivors of domestic abuse in the UK. Lexmark discloses a critical vulnerability affecting over 120 printer models. Our guest is David Holmes, CTO for Application Security at Imperva, with insights into the role of AI in bot attacks. Scammers ship stolen cash in Squishmallows.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today’s guest is David Holmes, CTO for Application Security at Imperva, a Thales company, who is sharing some insights into the role of AI in bot attacks.

Selected Reading

Lumma infostealer’s infrastructure seized during US, EU, Microsoft operation (the Record)

FTC finalizes order requiring GoDaddy to secure hosting services (Bleeping Computer)

Exclusive: Hacker who breached communications app used by Trump aide stole data from across US government (Reuters)

By Default, Signal Doesn't Recall (Signal)

Hack of Contractor Was at Root of Massive Federal Data Breach (Bloomberg)

Phone companies failed to warn senators about surveillance, Wyden says - Live Updates (POLITICO)

DragonForce targets rivals in a play for dominance (Sophos News)

‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential refuge addresses (The Record)

Lexmark reporting remote code execution flaw affecting over 120 Printer Models (Beyond Machines)

DOJ charges 12 more in $263 million crypto fraud takedown where money was hidden in squishmallow stuffed animals (Bitdefender)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A joint operation takes down Lumma infrastructure. The FTC finalizes a security settlement with GoDaddy. The Telemessage breach compromised far more U.S. officials than initially known. Twin hackers allegedly breach a major federal software provider from the inside. U.S. telecom providers fail to notify the Senate when law enforcement agencies request data from Senate-issued devices.DragonForce makes its mark on the ransomware front. A data leak threatens survivors of domestic abuse in the UK. Lexmark discloses a critical vulnerability affecting over 120 printer models. Our guest is David Holmes, CTO for Application Security at Imperva, with insights into the role of AI in bot attacks. Scammers ship stolen cash in Squishmallows.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today’s guest is <a href="https://www.linkedin.com/in/david-william-holmes/"><u>David Holmes</u></a>, CTO for Application Security at <a href="https://www.linkedin.com/company/imperva/"><u>Imperva</u></a>, a Thales company, who is sharing some insights into the role of AI in bot attacks.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://therecord.media/lumma-infostealer-malware-takedown-microsoft-fbi"><u>Lumma infostealer’s infrastructure seized during US, EU, Microsoft operation</u></a> (the Record)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/ftc-finalizes-order-requiring-godaddy-to-secure-hosting-services/"><u>FTC finalizes order requiring GoDaddy to secure hosting services</u></a> (Bleeping Computer)</p>
<p><a href="https://www.reuters.com/world/us/hacker-who-breached-communications-app-used-by-trump-aide-stole-data-across-us-2025-05-21/"><u>Exclusive: Hacker who breached communications app used by Trump aide stole data from across US government </u></a>(Reuters)</p>
<p><a href="https://signal.org/blog/signal-doesnt-recall/"><u>By Default, Signal Doesn't Recall</u></a> (Signal)</p>
<p><a href="https://www.bloomberg.com/news/articles/2025-05-21/security-failures-behind-us-contractor-s-data-breach"><u>Hack of Contractor Was at Root of Massive Federal Data Breach</u></a> (Bloomberg)</p>
<p><a href="https://www.politico.com/live-updates/2025/05/21/congress/exclusive-phone-companies-failed-to-warn-senators-about-surveillance-wyden-says-00361400"><u>Phone companies failed to warn senators about surveillance, Wyden says - Live Updates</u> </a>(POLITICO)</p>
<p><a href="https://news.sophos.com/en-us/2025/05/21/dragonforce-targets-rivals-in-a-play-for-dominance/"><u>DragonForce targets rivals in a play for dominance</u> </a>(Sophos News)</p>
<p><a href="https://therecord.media/concern-domestic-survivors-breach-london"><u>‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential refuge addresses</u></a> (The Record)</p>
<p><a href="https://beyondmachines.net/event_details/lexmart-reporting-remote-code-execution-flaw-affecting-over-120-printer-models-w-j-x-r-1/gD2P6Ple2L"><u>Lexmark reporting remote code execution flaw affecting over 120 Printer Models</u></a> (Beyond Machines)</p>
<p><a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/doj-charges-12-263-million-crypto-fraud-takedown-where-money-hidden-squishmallow-stuffed-animals"><u>DOJ charges 12 more in $263 million crypto fraud takedown where money was hidden in squishmallow stuffed animals</u></a> (Bitdefender)</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1589</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c0db3aa0-1c7a-11f0-85e0-8373c3332f52]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5098107720.mp3?updated=1747943708" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bear in the network.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2313/notes</link>
      <description>A joint advisory warns of Fancy Bear targeting Western logistics and technology firms. A nonprofit hospital network in Ohio suffers a disruptive ransomware attack. The Consumer Financial Protection Bureau (CFPB) drops plans to subject data brokers to tighter regulations. KrebsOnSecurity and Google block a record breaking DDoS attack. A phishing campaign rerouted employee paychecks. Atlassian patches multiple high-severity vulnerabilities. A Wisconsin telecom provider confirms a cyberattack caused a week-long outage.  VMware issues a Security Advisory addressing multiple high-risk vulnerabilities.  Prosecutors say a 19-year-old student from Massachusetts will plead guilty to hacking PowerSchool. Our guest is Rob Allen, Chief Product Officer at ThreatLocker, discussing deliberate simplicity of fundamental controls around zero trust. Oversharing your call location data.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, today we are joined by Rob Allen, Chief Product Officer at ThreatLocker from RSAC 2025. Rob is discussing the deliberate simplicity of fundamental controls around zero trust. Token theft and phishing attacks bypass traditional MFA protections, letting attackers impersonate users and access critical SaaS platforms — without needing passwords. Listen to Rob’s interview here.

Learn more from the ThreatLocker team here.

Selected Reading

Russian GRU Targeting Western Logistics Entities and Technology Companies ( CISA)

Ransomware attack disrupts Kettering Health Network in Ohio (Beyond Machines)

America’s CFPB bins proposed data broker crackdown (The Register)

Krebs on Security hit by 'test run' DDoS attack that peaked at 6.3 terabits of data per second (Metacurity)

SEO poisoning campaign swipes direct deposits from employees (SC Media)

Atlassian Warns of Multiple High-Severity Vulnerabilities Hits Data Center Server (Cybersecurity News)

Cellcom Service Disruption Caused by Cyberattack (SecurityWeek)

VMware releases patches for security flaws in multiple virtualization products (Beyond Machines)

Massachusetts man will plead guilty in PowerSchool hack case (CyberScoop)

O2 VoLTE: locating any customer with a phone call  (Mast Database)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 21 May 2025 20:10:00 -0000</pubDate>
      <itunes:title>Bear in the network.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2313</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A joint advisory warns of Fancy Bear targeting Western logistics and technology firms. A nonprofit hospital network in Ohio suffers a disruptive ransomware attack. The Consumer Financial Protection Bureau (CFPB) drops plans to subject data brokers to tighter regulations. KrebsOnSecurity and Google block a record breaking DDoS attack. A phishing campaign rerouted employee paychecks. Atlassian patches multiple high-severity vulnerabilities. A Wisconsin telecom provider confirms a cyberattack caused a week-long outage.  VMware issues a Security Advisory addressing multiple high-risk vulnerabilities.  Prosecutors say a 19-year-old student from Massachusetts will plead guilty to hacking PowerSchool. Our guest is Rob Allen, Chief Product Officer at ThreatLocker, discussing deliberate simplicity of fundamental controls around zero trust. Oversharing your call location data.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, today we are joined by Rob Allen, Chief Product Officer at ThreatLocker from RSAC 2025. Rob is discussing the deliberate simplicity of fundamental controls around zero trust. Token theft and phishing attacks bypass traditional MFA protections, letting attackers impersonate users and access critical SaaS platforms — without needing passwords. Listen to Rob’s interview here.

Learn more from the ThreatLocker team here.

Selected Reading

Russian GRU Targeting Western Logistics Entities and Technology Companies ( CISA)

Ransomware attack disrupts Kettering Health Network in Ohio (Beyond Machines)

America’s CFPB bins proposed data broker crackdown (The Register)

Krebs on Security hit by 'test run' DDoS attack that peaked at 6.3 terabits of data per second (Metacurity)

SEO poisoning campaign swipes direct deposits from employees (SC Media)

Atlassian Warns of Multiple High-Severity Vulnerabilities Hits Data Center Server (Cybersecurity News)

Cellcom Service Disruption Caused by Cyberattack (SecurityWeek)

VMware releases patches for security flaws in multiple virtualization products (Beyond Machines)

Massachusetts man will plead guilty in PowerSchool hack case (CyberScoop)

O2 VoLTE: locating any customer with a phone call  (Mast Database)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A joint advisory warns of Fancy Bear targeting Western logistics and technology firms. A nonprofit hospital network in Ohio suffers a disruptive ransomware attack. The Consumer Financial Protection Bureau (CFPB) drops plans to subject data brokers to tighter regulations. KrebsOnSecurity and Google block a record breaking DDoS attack. A phishing campaign rerouted employee paychecks. Atlassian patches multiple high-severity vulnerabilities. A Wisconsin telecom provider confirms a cyberattack caused a week-long outage.  VMware issues a Security Advisory addressing multiple high-risk vulnerabilities.  Prosecutors say a 19-year-old student from Massachusetts will plead guilty to hacking PowerSchool. Our guest is Rob Allen, Chief Product Officer at ThreatLocker, discussing deliberate simplicity of fundamental controls around zero trust. Oversharing your call location data.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment, today we are joined by <a href="https://www.linkedin.com/in/threatlockerrob/"><u>Rob Allen</u></a>, Chief Product Officer at <a href="https://www.linkedin.com/company/threatlockerinc/"><u>ThreatLocker</u></a> from RSAC 2025. Rob is discussing the deliberate simplicity of fundamental controls around zero trust. Token theft and phishing attacks bypass traditional MFA protections, letting attackers impersonate users and access critical SaaS platforms — without needing passwords. Listen to Rob’s interview <a href="https://explore.thecyberwire.com/rob-allen?hs_preview=kaArDOzv-190387478875"><u>here</u></a>.</p>
<p>Learn more from the ThreatLocker team <a href="https://www.threatlocker.com/book-a-threatlocker-demo?utm_source=cyberwire_n2k&amp;utm_medium=sponsor&amp;utm_campaign=demo_q2_25&amp;utm_content=demo&amp;utm_term=podcast">here</a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a"><u>Russian GRU Targeting Western Logistics Entities and Technology Companies </u></a>( CISA)</p>
<p><a href="https://beyondmachines.net/event_details/ransomware-attack-disrupts-kettering-health-network-in-ohio-6-9-g-t-9/gD2P6Ple2L"><u>Ransomware attack disrupts Kettering Health Network in Ohio</u></a> (Beyond Machines)</p>
<p><a href="https://go.theregister.com/feed/www.theregister.com/2025/05/16/cfpb_data_broker/"><u>America’s CFPB bins proposed data broker crackdown </u></a>(The Register)</p>
<p><a href="https://www.metacurity.com/krebs-on-security-hit-by-test-run-ddos-attack-that-peaked-at-6-3-terabits-of-data-per-second/"><u>Krebs on Security hit by 'test run' DDoS attack that peaked at 6.3 terabits of data per second</u></a> (Metacurity)</p>
<p><a href="https://www.scworld.com/news/seo-poisoning-campaign-swipes-direct-deposits-from-employees"><u>SEO poisoning campaign swipes direct deposits from employees </u></a>(SC Media)</p>
<p><a href="https://cybersecuritynews.com/atlassian-data-center-server/"><u>Atlassian Warns of Multiple High-Severity Vulnerabilities Hits Data Center Server</u></a> (Cybersecurity News)</p>
<p><a href="https://www.securityweek.com/cellcom-service-disruption-caused-by-cyberattack/"><u>Cellcom Service Disruption Caused by Cyberattack </u></a>(SecurityWeek)</p>
<p><a href="https://beyondmachines.net/event_details/vmware-releases-patches-for-security-flaws-in-multiple-virtualization-products-u-1-5-w-n/gD2P6Ple2L"><u>VMware releases patches for security flaws in multiple virtualization products</u></a> (Beyond Machines)</p>
<p><a href="https://cyberscoop.com/massachusetts-man-will-plead-guilty-in-powerschool-hack-case/"><u>Massachusetts man will plead guilty in PowerSchool hack case </u></a>(CyberScoop)</p>
<p><a href="https://mastdatabase.co.uk/blog/2025/05/o2-expose-customer-location-call-4g/"><u>O2 VoLTE: locating any customer with a phone call </u></a> (Mast Database)</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2080</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c0b48824-1c7a-11f0-85e0-171726f591f1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4889418184.mp3?updated=1747856524" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Take It Down Act walks a fine line.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2312/notes</link>
      <description>President Trump signs the Take It Down Act into law. A UK grocer logistics firm gets hit by ransomware. Researchers discover trojanized versions of the KeePass password manager. Researchers from CISA and NIST promote a new metric to better predict actively exploited software flaws. A new campaign uses SEO poisoning to deliver Bumblebee malware. A sophisticated phishing campaign is impersonating Zoom meeting invites to steal user credentials. CISA has added six actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog. A bipartisan bill aims to strengthen the shrinking federal cybersecurity workforce. Our guest is Chris Novak, Vice President of Global Cybersecurity Solutions at Verizon, sharing insights on their 2025 DBIR. DOGE downsizes, and the UAE recruits.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Chris Novak, Vice President of Global Cybersecurity Solutions at Verizon, sharing insights on their 2025 Data Breach Investigations Report (DBIR).Selected Reading

Trump signs the Take It Down Act into law |(The Verge)

Supplier to Tesco, Aldi and Lidl hit with ransomware (Computing)

Fake KeePass password manager leads to ESXi ransomware attack (Bleeping Computer)

Vulnerability Exploitation Probability Metric Proposed by NIST, CISA Researchers (Security Week)

Threat Actors Deliver Bumblebee Malware Poisoning Bing SEO (Cybersecurity News)

New Phishing Attack Poses as Zoom Meeting Invites to Steal Login Credentials (GB Hackers)

CISA Adds Six Known Exploited Vulnerabilities to Catalog (CISA)

Federal cyber workforce training institute eyed in bipartisan House bill (CyberScoop)

UAE Recruiting US Personnel Displaced by DOGE to Work on AI for its Military (Zetter Sero Day)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 May 2025 20:10:00 -0000</pubDate>
      <itunes:title>The Take It Down act walks a fine line.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2312</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>President Trump signs the Take It Down Act into law. A UK grocer logistics firm gets hit by ransomware. Researchers discover trojanized versions of the KeePass password manager. Researchers from CISA and NIST promote a new metric to better predict actively exploited software flaws. A new campaign uses SEO poisoning to deliver Bumblebee malware. A sophisticated phishing campaign is impersonating Zoom meeting invites to steal user credentials. CISA has added six actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog. A bipartisan bill aims to strengthen the shrinking federal cybersecurity workforce. Our guest is Chris Novak, Vice President of Global Cybersecurity Solutions at Verizon, sharing insights on their 2025 DBIR. DOGE downsizes, and the UAE recruits.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Chris Novak, Vice President of Global Cybersecurity Solutions at Verizon, sharing insights on their 2025 Data Breach Investigations Report (DBIR).Selected Reading

Trump signs the Take It Down Act into law |(The Verge)

Supplier to Tesco, Aldi and Lidl hit with ransomware (Computing)

Fake KeePass password manager leads to ESXi ransomware attack (Bleeping Computer)

Vulnerability Exploitation Probability Metric Proposed by NIST, CISA Researchers (Security Week)

Threat Actors Deliver Bumblebee Malware Poisoning Bing SEO (Cybersecurity News)

New Phishing Attack Poses as Zoom Meeting Invites to Steal Login Credentials (GB Hackers)

CISA Adds Six Known Exploited Vulnerabilities to Catalog (CISA)

Federal cyber workforce training institute eyed in bipartisan House bill (CyberScoop)

UAE Recruiting US Personnel Displaced by DOGE to Work on AI for its Military (Zetter Sero Day)

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>President Trump signs the Take It Down Act into law. A UK grocer logistics firm gets hit by ransomware. Researchers discover trojanized versions of the KeePass password manager. Researchers from CISA and NIST promote a new metric to better predict actively exploited software flaws. A new campaign uses SEO poisoning to deliver Bumblebee malware. A sophisticated phishing campaign is impersonating Zoom meeting invites to steal user credentials. CISA has added six actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog. A bipartisan bill aims to strengthen the shrinking federal cybersecurity workforce. Our guest is Chris Novak, Vice President of Global Cybersecurity Solutions at Verizon, sharing insights on their 2025 DBIR. DOGE downsizes, and the UAE recruits.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/chrisjnovak/"><u>Chris Novak</u></a>, Vice President of Global Cybersecurity Solutions at <a href="https://www.linkedin.com/company/verizonbusiness/"><u>Verizon</u></a>, sharing insights on their 2025 Data Breach Investigations <a href="https://www.verizon.com/business/resources/reports/dbir/?CMP=OOH_SMB_OTH_22222_MC_20200501_NA_NM20200079_00001"><u>Report</u></a> (DBIR).<br><strong>Selected Reading</strong></p>
<p><a href="https://www.theverge.com/news/661230/trump-signs-take-it-down-act-ai-deepfakes"><u>Trump signs the Take It Down Act into law |</u></a>(The Verge)</p>
<p><a href="https://www.computing.co.uk/news/2025/security/supplier-to-tesco-aldi-and-lidl-hit-with-ransomware"><u>Supplier to Tesco, Aldi and Lidl hit with ransomware</u></a> (Computing)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/fake-keepass-password-manager-leads-to-esxi-ransomware-attack/"><u>Fake KeePass password manager leads to ESXi ransomware attack</u></a> (Bleeping Computer)</p>
<p><a href="https://www.securityweek.com/vulnerability-exploitation-probability-metric-proposed-by-nist-cisa-researchers/"><u>Vulnerability Exploitation Probability Metric Proposed by NIST, CISA Researchers </u></a>(Security Week)</p>
<p><a href="https://cybersecuritynews.com/threat-actors-deliver-bumblebee-malware/"><u>Threat Actors Deliver Bumblebee Malware Poisoning Bing SEO</u></a> (Cybersecurity News)</p>
<p><a href="https://gbhackers.com/new-phishing-attack-poses-as-zoom-meeting/"><u>New Phishing Attack Poses as Zoom Meeting Invites to Steal Login Credentials</u></a> (GB Hackers)</p>
<p><a href="https://www.cisa.gov/news-events/alerts/2025/05/19/cisa-adds-six-known-exploited-vulnerabilities-catalog"><u>CISA Adds Six Known Exploited Vulnerabilities to Catalog</u></a> (CISA)</p>
<p><a href="https://cyberscoop.com/federal-cyber-workforce-training-house-bill/"><u>Federal cyber workforce training institute eyed in bipartisan House bill </u></a>(CyberScoop)</p>
<p><br><a href="https://www.zetter-zeroday.com/uae-recruiting-us-personnel-displaced-by-doge-to-work-on-ai-for-its-military/"><u>UAE Recruiting US Personnel Displaced by DOGE to Work on AI for its Military</u></a> (Zetter Sero Day)</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1753</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c08de908-1c7a-11f0-85e0-f364a21c30f6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7307444683.mp3?updated=1747768351" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Redacted realities: Inside the MoJ hack.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2311/notes</link>
      <description>The UK’s Ministry of Justice suffers a major breach. Mozilla patches two critical JavaScript engine flaws in Firefox. Over 200,000 patients of a Georgia-based health clinic see their sensitive data exposed. Researchers track increased malicious targeting of iOS devices. A popular printer brand serves up malware. PupkinStealer targets Windows systems. An Alabama man gets 14 months in prison for a sim-swap attack on the SEC. Our guest is Ian Tien, CEO at Mattermost, sharing insights on enhancing cybersecurity through effective collaboration. Ethical Hackers win the day at Pwn2Own Berlin. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices segment, we are joined by Ian Tien, CEO at Mattermost at RSAC 2025, who is sharing insights on enhancing cybersecurity through effective collaboration. Check out Ian’s blog on “What’s Next for Cybersecurity Teams? AI, Automation &amp; Real-Time Workflows.” Listen to Ian’s interview here. 

Selected Reading

Hackers steal 'significant amount of personal data' from Ministry of Justice in brazen cyber-attack (Daily Mail Online)

M&amp;S and Co-Op: BBC reporter on talking to the hackers (BBC)

210K American clinics‘ patients had their financial data leaked (Cybernews)

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak (SecurityWeek)

Over 40,000 iOS Apps Found Exploiting Private Entitlements, Zimperium (Hackread)

This printer company served you malware for months and dismissed it as false positives (Neowin)

Hack of SEC social media account earns 14-month prison sentence for Alabama man (The Record)

Hackers Earn Over $1 Million at Pwn2Own Berlin 2025 (SecurityWeek) 

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 19 May 2025 20:10:00 -0000</pubDate>
      <itunes:title>Redacted realities: Inside the MoJ hack.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2311</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The UK’s Ministry of Justice suffers a major breach. Mozilla patches two critical JavaScript engine flaws in Firefox. Over 200,000 patients of a Georgia-based health clinic see their sensitive data exposed. Researchers track increased malicious targeting of iOS devices. A popular printer brand serves up malware. PupkinStealer targets Windows systems. An Alabama man gets 14 months in prison for a sim-swap attack on the SEC. Our guest is Ian Tien, CEO at Mattermost, sharing insights on enhancing cybersecurity through effective collaboration. Ethical Hackers win the day at Pwn2Own Berlin. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On today’s Industry Voices segment, we are joined by Ian Tien, CEO at Mattermost at RSAC 2025, who is sharing insights on enhancing cybersecurity through effective collaboration. Check out Ian’s blog on “What’s Next for Cybersecurity Teams? AI, Automation &amp; Real-Time Workflows.” Listen to Ian’s interview here. 

Selected Reading

Hackers steal 'significant amount of personal data' from Ministry of Justice in brazen cyber-attack (Daily Mail Online)

M&amp;S and Co-Op: BBC reporter on talking to the hackers (BBC)

210K American clinics‘ patients had their financial data leaked (Cybernews)

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak (SecurityWeek)

Over 40,000 iOS Apps Found Exploiting Private Entitlements, Zimperium (Hackread)

This printer company served you malware for months and dismissed it as false positives (Neowin)

Hack of SEC social media account earns 14-month prison sentence for Alabama man (The Record)

Hackers Earn Over $1 Million at Pwn2Own Berlin 2025 (SecurityWeek) 

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The UK’s Ministry of Justice suffers a major breach. Mozilla patches two critical JavaScript engine flaws in Firefox. Over 200,000 patients of a Georgia-based health clinic see their sensitive data exposed. Researchers track increased malicious targeting of iOS devices. A popular printer brand serves up malware. PupkinStealer targets Windows systems. An Alabama man gets 14 months in prison for a sim-swap attack on the SEC. Our guest is Ian Tien, CEO at Mattermost, sharing insights on enhancing cybersecurity through effective collaboration. Ethical Hackers win the day at Pwn2Own Berlin. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On today’s Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/iantien/"><u>Ian Tien</u></a>, CEO at <a href="https://www.linkedin.com/company/mattermost/"><u>Mattermost</u></a> at RSAC 2025, who is sharing insights on enhancing cybersecurity through effective collaboration<em>. </em>Check out Ian’s blog on “<a href="https://mattermost.com/blog/whats-next-for-cybersecurity-teams-ai-automation-real-time-workflows/"><u>What’s Next for Cybersecurity Teams? AI, Automation &amp; Real-Time Workflows</u></a>.” Listen to Ian’s interview <a href="https://explore.thecyberwire.com/ian-tien"><u>here</u></a>. </p>
<p><br><strong>Selected Reading</strong></p>
<p><a href="https://www.dailymail.co.uk/news/article-14726399/Hackers-steal-significant-personal-data-Ministry-Justice-brazen-cyber-attack.html"><u>Hackers steal 'significant amount of personal data' from Ministry of Justice in brazen cyber-attack</u></a> (Daily Mail Online)</p>
<p><a href="https://www.bbc.com/news/articles/cgr5nen5gxyo"><u>M&amp;S and Co-Op: BBC reporter on talking to the hackers</u></a> (BBC)</p>
<p><a href="https://cnews.link/harbin-clinic-patient-data-exposed-3/"><u>210K American clinics‘ patients had their financial data leaked</u></a> (Cybernews)</p>
<p><a href="https://www.securityweek.com/480000-catholic-health-patients-impacted-by-serviceaide-data-leak/"><u>480,000 Catholic Health Patients Impacted by Serviceaide Data Leak</u></a> (SecurityWeek)</p>
<p><a href="https://hackread.com/40000-ios-apps-found-exploiting-private-entitlements/"><u>Over 40,000 iOS Apps Found Exploiting Private Entitlements, Zimperium</u></a> (Hackread)</p>
<p><a href="https://www.neowin.net/news/this-printer-company-served-you-malware-for-months-and-dismissed-it-as-false-positives/"><u>This printer company served you malware for months and dismissed it as false positives</u></a> (Neowin)</p>
<p><a href="https://therecord.media/sec-social-media-hack-sentencing"><u>Hack of SEC social media account earns 14-month prison sentence for Alabama man</u></a> (The Record)</p>
<p><br><a href="https://www.securityweek.com/hackers-earn-over-1-million-at-pwn2own-berlin-2025/"><u>Hackers Earn Over $1 Million at Pwn2Own Berlin 2025</u></a> (SecurityWeek) </p>
<p><strong>Share your feedback.</strong></p>
<p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener"><u>brief listener survey</u></a> as we continually work to improve the show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1640</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c0679bea-1c7a-11f0-85e0-d7fd9588753a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4760618311.mp3?updated=1747685543" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dave Bittner: From puppet shows to podcasts. [Media] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/68/notes</link>
      <description>Please enjoy this encore of Career Notes. 

Host of the CyberWire Podcast, Dave Bittner, wanted to work with the Muppets, so naturally he landed in cybersecurity. Dave and his Cookie Monster puppet spent much of his childhood putting on shows for his parents friends. During one of those performances, he was discovered and got his start at the local PBS station. A radio, television and film major in college, Dave owned his own company and as the most tech-savvy member of the group, handled that side of things. Dave notes his cybersecurity challenges back then consisted of maybe a corrupt floppy disk. It wasn't until he joined the CyberWIre that cybersecurity became Dave's focus. A former boss showed him how to lead a team and treat everyone with kindness regardless of their role. We thank Dave for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 18 May 2025 07:00:00 -0000</pubDate>
      <itunes:title>Dave Bittner: From puppet shows to podcasts. [Media] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>68</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/01454474-2aa8-11f0-b39a-372decc1f539/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 

Host of the CyberWire Podcast, Dave Bittner, wanted to work with the Muppets, so naturally he landed in cybersecurity. Dave and his Cookie Monster puppet spent much of his childhood putting on shows for his parents friends. During one of those performances, he was discovered and got his start at the local PBS station. A radio, television and film major in college, Dave owned his own company and as the most tech-savvy member of the group, handled that side of things. Dave notes his cybersecurity challenges back then consisted of maybe a corrupt floppy disk. It wasn't until he joined the CyberWIre that cybersecurity became Dave's focus. A former boss showed him how to lead a team and treat everyone with kindness regardless of their role. We thank Dave for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p>
<p>Host of the CyberWire Podcast, Dave Bittner, wanted to work with the Muppets, so naturally he landed in cybersecurity. Dave and his Cookie Monster puppet spent much of his childhood putting on shows for his parents friends. During one of those performances, he was discovered and got his start at the local PBS station. A radio, television and film major in college, Dave owned his own company and as the most tech-savvy member of the group, handled that side of things. Dave notes his cybersecurity challenges back then consisted of maybe a corrupt floppy disk. It wasn't until he joined the CyberWIre that cybersecurity became Dave's focus. A former boss showed him how to lead a team and treat everyone with kindness regardless of their role. We thank Dave for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>647</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01454474-2aa8-11f0-b39a-372decc1f539]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9368084828.mp3?updated=1746556474" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leveling up their credential phishing tactics. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/377/notes</link>
      <description>This week, Dave speaks with Max Gannon of Cofense Intelligence to dive into his team's research on "The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders." 

Threat actors continuously develop new tactics, techniques, and procedures (TTPs) to bypass existing defenses. When defenders identify these methods and implement countermeasures, attackers adapt or create more sophisticated approaches. 

This research explores how cybercriminals are leveling up their credential phishing tactics using Precision-Validated Phishing, a technique that leverages real-time email validation to ensure only high-value targets receive the phishing attempt.

The research can be found here:


  
The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders﻿⁠⁠⁠⁠⁠



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 May 2025 05:00:00 -0000</pubDate>
      <itunes:title>Leveling up their credential phishing tactics. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>12</itunes:season>
      <itunes:episode>377</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, Dave speaks with Max Gannon of Cofense Intelligence to dive into his team's research on "The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders." 

Threat actors continuously develop new tactics, techniques, and procedures (TTPs) to bypass existing defenses. When defenders identify these methods and implement countermeasures, attackers adapt or create more sophisticated approaches. 

This research explores how cybercriminals are leveling up their credential phishing tactics using Precision-Validated Phishing, a technique that leverages real-time email validation to ensure only high-value targets receive the phishing attempt.

The research can be found here:


  
The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders﻿⁠⁠⁠⁠⁠



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, Dave speaks with <a href="https://www.linkedin.com/in/max-gannon-34b775111/">Max Gannon</a> of <a href="https://cofense.com/">Cofense Intelligence</a> to dive into his team's research on "The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders." </p>
<p>Threat actors continuously develop new tactics, techniques, and procedures (TTPs) to bypass existing defenses. When defenders identify these methods and implement countermeasures, attackers adapt or create more sophisticated approaches. </p>
<p>This research explores how cybercriminals are leveling up their credential phishing tactics using Precision-Validated Phishing, a technique that leverages real-time email validation to ensure only high-value targets receive the phishing attempt.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://cofense.com/blog/the-rise-of-precision-validated-credential-theft-a-new-challenge-for-defenders">The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders</a>﻿<a href="https://www.cyberark.com/resources/threat-research-blog/agents-under-attack-threat-modeling-agentic-ai">⁠⁠⁠⁠</a><a href="https://www.reversinglabs.com/blog/atomic-and-exodus-crypto-wallets-targeted-in-malicious-npm-campaign">⁠</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1066</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c415db22-31c3-11f0-8892-03ea95e9f6d7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1099913429.mp3?updated=1747337786" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Preparing for the cyber battlespace. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2310/notes</link>
      <description>NATO hosts the world’s largest cyber defense exercise. The DOJ charges a dozen people in a racketeering conspiracy involving the theft of over $230 million in cryptocurrency. Japan has enacted a new Active Cyberdefense Law. Lawmakers push to reauthorize the Cybersecurity Information Sharing Act. Two critical Ivanti Endpoint Manager Mobile vulnerabilities are under active exploitation. Hackers use a new fileless technique to deploy Remcos RAT. The NSA’s Director of Cybersecurity hangs up their hat. Our guest is Christopher Cleary, VP of ManTech's Global Cyber Practice, discussing the cyber battlespace of the future. Coinbase flips the script on an extortion attempt. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Joining us on our Industry Voices segment, Christopher Cleary, VP of ManTech's Global Cyber Practice, talks about the battlespace of the future. If you would like to hear the full-length interview between Christopher and Dave, listen here. Learn more about ManTech’s cybersecurity work here. 

Selected Reading

NATO's Locked Shields Reflects Cyber Defense Growth  (SecurityWeek)

US charges 12 more suspects linked to $230 million crypto theft (Bleeping Computer)

Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations (The Record)

Lawmakers push for reauthorization of cyber information sharing bill as deadline looms (The Record)

Ban sales of gear from China’s TP-Link, Republican lawmakers tell Trump administration (The Record)

Scammers are deepfaking voices of senior US government officials, warns FBI (The Register)

Multiple Ivanti Endpoint Mobile Manager Vulnerabilities Allows Remote Code Execution (Cyber Security News)

Updated Remcos RAT deployed in fileless intrusion (SC Media)

NSA cyber director Luber to retire at month’s end (The Record)

Coinbase offers $20 million bounty after extortion attempt with stolen data (The Record)

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 16 May 2025 20:00:00 -0000</pubDate>
      <itunes:title>Preparing for the cyber battlespace. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2310</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>NATO hosts the world’s largest cyber defense exercise. The DOJ charges a dozen people in a racketeering conspiracy involving the theft of over $230 million in cryptocurrency. Japan has enacted a new Active Cyberdefense Law. Lawmakers push to reauthorize the Cybersecurity Information Sharing Act. Two critical Ivanti Endpoint Manager Mobile vulnerabilities are under active exploitation. Hackers use a new fileless technique to deploy Remcos RAT. The NSA’s Director of Cybersecurity hangs up their hat. Our guest is Christopher Cleary, VP of ManTech's Global Cyber Practice, discussing the cyber battlespace of the future. Coinbase flips the script on an extortion attempt. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Joining us on our Industry Voices segment, Christopher Cleary, VP of ManTech's Global Cyber Practice, talks about the battlespace of the future. If you would like to hear the full-length interview between Christopher and Dave, listen here. Learn more about ManTech’s cybersecurity work here. 

Selected Reading

NATO's Locked Shields Reflects Cyber Defense Growth  (SecurityWeek)

US charges 12 more suspects linked to $230 million crypto theft (Bleeping Computer)

Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations (The Record)

Lawmakers push for reauthorization of cyber information sharing bill as deadline looms (The Record)

Ban sales of gear from China’s TP-Link, Republican lawmakers tell Trump administration (The Record)

Scammers are deepfaking voices of senior US government officials, warns FBI (The Register)

Multiple Ivanti Endpoint Mobile Manager Vulnerabilities Allows Remote Code Execution (Cyber Security News)

Updated Remcos RAT deployed in fileless intrusion (SC Media)

NSA cyber director Luber to retire at month’s end (The Record)

Coinbase offers $20 million bounty after extortion attempt with stolen data (The Record)

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>NATO hosts the world’s largest cyber defense exercise. The DOJ charges a dozen people in a racketeering conspiracy involving the theft of over $230 million in cryptocurrency. Japan has enacted a new Active Cyberdefense Law. Lawmakers push to reauthorize the Cybersecurity Information Sharing Act. Two critical Ivanti Endpoint Manager Mobile vulnerabilities are under active exploitation. Hackers use a new fileless technique to deploy Remcos RAT. The NSA’s Director of Cybersecurity hangs up their hat. Our guest is Christopher Cleary, VP of ManTech's Global Cyber Practice, discussing the cyber battlespace of the future. Coinbase flips the script on an extortion attempt. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Joining us on our Industry Voices segment, <a href="https://www.linkedin.com/in/christopher-cleary-pmp-cissp-6242b635/"><u>Christopher Cleary</u></a>, VP of <a href="https://www.mantech.com/"><u>ManTech</u></a>'s Global Cyber Practice, talks about the battlespace of the future. If you would like to hear the full-length interview between Christopher and Dave, listen <a href="https://explore.thecyberwire.com/chris-cleary"><u>here</u></a>. Learn more about ManTech’s cybersecurity work <a href="https://www.mantech.com/expertise/cyberspace-superiority/">here</a>. </p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.securityweek.com/from-60-to-4000-natos-locked-shields-reflects-cyber-defense-growth/"><u>NATO's Locked Shields Reflects Cyber Defense Growth </u></a> (SecurityWeek)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/us-charges-12-more-suspects-linked-to-230-million-crypto-theft/"><u>US charges 12 more suspects linked to $230 million crypto theft</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/japan-enacts-new-law-allowing-offensive-cyber-operations"><u>Japan enacts new Active Cyberdefense Law allowing for offensive cyber operations</u></a> (The Record)</p>
<p><a href="https://therecord.media/lawmakers-push-for-reauthorization-information-sharing-bill"><u>Lawmakers push for reauthorization of cyber information sharing bill as deadline looms</u></a> (The Record)</p>
<p><a href="https://therecord.media/republican-lawmakers-call-for-tp-link-ban"><u>Ban sales of gear from China’s TP-Link, Republican lawmakers tell Trump administration</u></a> (The Record)</p>
<p><a href="https://www.theregister.com/2025/05/16/fbi_deepfake_us_government_warning/"><u>Scammers are deepfaking voices of senior US government officials, warns FBI</u></a> (The Register)</p>
<p><a href="https://cybersecuritynews.com/ivanti-endpoint-mobile-manager-vulnerabilities/"><u>Multiple Ivanti Endpoint Mobile Manager Vulnerabilities Allows Remote Code Execution</u></a> (Cyber Security News)</p>
<p><a href="https://www.scworld.com/brief/updated-remcos-rat-deployed-in-fileless-intrusion"><u>Updated Remcos RAT deployed in fileless intrusion </u></a>(SC Media)</p>
<p><a href="https://therecord.media/nsa-cyber-director-dave-luber-to-retire"><u>NSA cyber director Luber to retire at month’s end</u></a> (The Record)</p>
<p><a href="https://therecord.media/coinbase-extortion-attempt-company-offers-20million-reward"><u>Coinbase offers $20 million bounty after extortion attempt with stolen data</u></a> (The Record)</p>
<p><br><strong>Share your feedback.</strong></p>
<p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener"><u>brief listener survey</u></a> as we continually work to improve the show. </p>
<p><br><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2061</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c0400904-1c7a-11f0-85e0-1310fc108c16]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4449174403.mp3?updated=1747422981" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bypassing Bitlocker encryption. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2309/notes</link>
      <description>Google issues an emergency patch for a high-severity Chrome browser flaw. Researchers bypass BitLocker encryption in minutes. A massive Chinese-language black market has shut down. The CFPB cancels plans to curb the sale of personal information by data brokers. A cyberespionage campaign called Operation RoundPress targets vulnerable webmail servers. Google warns that Scattered Spider is now targeting U.S. retail companies. The largest steelmaker in the U.S. shut down operations following a cybersecurity incident. Our guest is Devin Ertel, Chief Information Security Officer at Menlo Security, discussing redefining enterprise security. The long and the short of layoffs.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment and direct from RSAC 2025, our guest is Devin Ertel, Chief Information Security Officer at Menlo Security, discussing redefining enterprise security. Listen to Devin's interview here. 

Selected Reading

Google fixes high severity Chrome flaw with public exploit (Bleeping Computer)

BitLocker Encryption Bypassed in Minutes Using Bitpixie Vulnerability: PoC Released (Cyber Security News)

The Internet’s Biggest-Ever Black Market Just Shut Down Amid a Telegram Purge (WIRED) 

German operation shuts down crypto mixer eXch, seizes millions in assets (The Record)

CFPB Quietly Kills Rule to Shield Americans From Data Brokers (WIRED)

EU ruling: tracking-based advertising by Google, Microsoft, Amazon, X, across Europe has no legal basis (Irish Council for Civil Liberties)

Operation RoundPress targeting high-value webmail servers (We Live Security)

Google says hackers that hit UK retailers now targeting American stores (Reuters)

Cybersecurity incident forces largest US steelmaker to take some operations offline (The Record)

Infosec Layoffs Aren't the Bargain Boards May Think (Dark Reading) 

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 15 May 2025 20:00:00 -0000</pubDate>
      <itunes:title>Bypassing Bitlocker encryption. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2309</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Google issues an emergency patch for a high-severity Chrome browser flaw. Researchers bypass BitLocker encryption in minutes. A massive Chinese-language black market has shut down. The CFPB cancels plans to curb the sale of personal information by data brokers. A cyberespionage campaign called Operation RoundPress targets vulnerable webmail servers. Google warns that Scattered Spider is now targeting U.S. retail companies. The largest steelmaker in the U.S. shut down operations following a cybersecurity incident. Our guest is Devin Ertel, Chief Information Security Officer at Menlo Security, discussing redefining enterprise security. The long and the short of layoffs.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment and direct from RSAC 2025, our guest is Devin Ertel, Chief Information Security Officer at Menlo Security, discussing redefining enterprise security. Listen to Devin's interview here. 

Selected Reading

Google fixes high severity Chrome flaw with public exploit (Bleeping Computer)

BitLocker Encryption Bypassed in Minutes Using Bitpixie Vulnerability: PoC Released (Cyber Security News)

The Internet’s Biggest-Ever Black Market Just Shut Down Amid a Telegram Purge (WIRED) 

German operation shuts down crypto mixer eXch, seizes millions in assets (The Record)

CFPB Quietly Kills Rule to Shield Americans From Data Brokers (WIRED)

EU ruling: tracking-based advertising by Google, Microsoft, Amazon, X, across Europe has no legal basis (Irish Council for Civil Liberties)

Operation RoundPress targeting high-value webmail servers (We Live Security)

Google says hackers that hit UK retailers now targeting American stores (Reuters)

Cybersecurity incident forces largest US steelmaker to take some operations offline (The Record)

Infosec Layoffs Aren't the Bargain Boards May Think (Dark Reading) 

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Google issues an emergency patch for a high-severity Chrome browser flaw. Researchers bypass BitLocker encryption in minutes. A massive Chinese-language black market has shut down. The CFPB cancels plans to curb the sale of personal information by data brokers. A cyberespionage campaign called Operation RoundPress targets vulnerable webmail servers. Google warns that Scattered Spider is now targeting U.S. retail companies. The largest steelmaker in the U.S. shut down operations following a cybersecurity incident. Our guest is Devin Ertel, Chief Information Security Officer at Menlo Security, discussing redefining enterprise security. The long and the short of layoffs.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment and direct from RSAC 2025, our guest is <a href="https://www.linkedin.com/in/devinertel/">Devin Ertel</a>, Chief Information Security Officer at <a href="https://www.menlosecurity.com/">Menlo Security</a>, discussing redefining enterprise security. Listen to Devin's interview <a href="https://explore.thecyberwire.com/devin-ertel">here</a>. </p>
<p><br><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/google-fixes-high-severity-chrome-flaw-with-public-exploit/"><u>Google fixes high severity Chrome flaw with public exploit</u></a> (Bleeping Computer)</p>
<p><a href="https://cybersecuritynews.com/bitlocker-encryption-bypassed/"><u>BitLocker Encryption Bypassed in Minutes Using Bitpixie Vulnerability: PoC Released</u></a> (Cyber Security News)</p>
<p><a href="https://www.wired.com/story/the-internets-biggest-ever-black-market-shuts-down-after-a-telegram-purge/"><u>The Internet’s Biggest-Ever Black Market Just Shut Down Amid a Telegram Purge</u></a> (WIRED) </p>
<p><a href="https://therecord.media/exch-cryptocurrency-mixer-germany-takedown"><u>German operation shuts down crypto mixer eXch, seizes millions in assets</u></a> (The Record)</p>
<p><a href="https://www.wired.com/story/cfpb-quietly-kills-rule-to-shield-americans-from-data-brokers/"><u>CFPB Quietly Kills Rule to Shield Americans From Data Brokers </u></a>(WIRED)</p>
<p><a href="https://www.iccl.ie/digital-data/eu-ruling-tracking-based-advertising-by-google-microsoft-amazon-x-across-europe-has-no-legal-basis/"><u>EU ruling: tracking-based advertising by Google, Microsoft, Amazon, X, across Europe has no legal basis</u></a> (Irish Council for Civil Liberties)</p>
<p><a href="https://www.welivesecurity.com/en/eset-research/operation-roundpress/"><u>Operation RoundPress targeting high-value webmail servers</u></a> (We Live Security)</p>
<p><a href="https://www.reuters.com/business/google-says-hackers-that-targeted-uk-retail-sector-are-now-targeting-us-2025-05-14/"><u>Google says hackers that hit UK retailers now targeting American stores </u></a>(Reuters)</p>
<p><a href="https://therecord.media/cyber-incident-forces-nucor-steel-to-take-systems-offline"><u>Cybersecurity incident forces largest US steelmaker to take some operations offline</u></a> (The Record)</p>
<p><a href="https://www.darkreading.com/cyber-risk/infosec-layoffs-arent-bargain-boards-may-think"><u>Infosec Layoffs Aren't the Bargain Boards May Think</u></a> (Dark Reading) </p>
<p><br><strong>Share your feedback.</strong></p>
<p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener"><u>brief listener survey</u></a> as we continually work to improve the show. </p>
<p><br><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1988</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c018bf48-1c7a-11f0-85e0-f3ddce39d546]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2653896848.mp3?updated=1747335969" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Get to patching: Patch Tuesday updates. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2308/notes</link>
      <description>A busy Patch Tuesday. Investigators discover undocumented communications devices inside Chinese-made power inverters. A newly discovered Branch Privilege Injection flaw affects Intel CPUs. A UK retailer may claim up to £100mn from its cyber insurers after a major cyberattack.  A Kosovo national has been extradited to the U.S. for allegedly running an illegal online marketplace. CISA will continue alerts on its website following industry backlash. On our Industry Voices segment, Neil Hare-Brown, CEO at STORM Guidance, discusses Cyber Incident Response (CIR) retainer service provision. Shoring up the future of the CVE program.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

On today’s Industry Voices segment, we are joined by Neil Hare-Brown, CEO at STORM Guidance, discussing Cyber Incident Response (CIR) retainer service provision. You can learn more here. 

Selected Reading

Microsoft Patch Tuesday security updates for May 2025 fixed 5 actively exploited zero-days (Security Affairs)

SAP patches second zero-day flaw exploited in recent attacks (Bleeping Computer) 

Ivanti fixes EPMM zero-days chained in code execution attacks (Bleeping Computer) 

Fortinet fixes critical zero-day exploited in FortiVoice attacks (Bleeping Computer) 

Vulnerabilities Patched by Juniper, VMware and Zoom (SecurityWeek)

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact (SecurityWeek)

Adobe Patches Big Batch of Critical-Severity Software Flaws (SecurityWeek)

Ghost in the machine? Rogue communication devices found in Chinese inverters (Reuters)

New Intel CPU flaws leak sensitive data from privileged memory (Bleeping Computer) 

M&amp;S cyber insurance payout to be worth up to £100mn (Financial Times)

US extradites Kosovo national charged in operating illegal online marketplace (The Record)

CISA Planned to Kill .Gov Alerts. Then It Reversed Course. (Data BreachToday)

CVE Foundation eyes year-end launch following 11th-hour rescue of MITRE program (CyberScoop)

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 14 May 2025 20:00:00 -0000</pubDate>
      <itunes:title>Get to patching: Patch Tuesday updates. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2308</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A busy Patch Tuesday. Investigators discover undocumented communications devices inside Chinese-made power inverters. A newly discovered Branch Privilege Injection flaw affects Intel CPUs. A UK retailer may claim up to £100mn from its cyber insurers after a major cyberattack.  A Kosovo national has been extradited to the U.S. for allegedly running an illegal online marketplace. CISA will continue alerts on its website following industry backlash. On our Industry Voices segment, Neil Hare-Brown, CEO at STORM Guidance, discusses Cyber Incident Response (CIR) retainer service provision. Shoring up the future of the CVE program.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

On today’s Industry Voices segment, we are joined by Neil Hare-Brown, CEO at STORM Guidance, discussing Cyber Incident Response (CIR) retainer service provision. You can learn more here. 

Selected Reading

Microsoft Patch Tuesday security updates for May 2025 fixed 5 actively exploited zero-days (Security Affairs)

SAP patches second zero-day flaw exploited in recent attacks (Bleeping Computer) 

Ivanti fixes EPMM zero-days chained in code execution attacks (Bleeping Computer) 

Fortinet fixes critical zero-day exploited in FortiVoice attacks (Bleeping Computer) 

Vulnerabilities Patched by Juniper, VMware and Zoom (SecurityWeek)

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact (SecurityWeek)

Adobe Patches Big Batch of Critical-Severity Software Flaws (SecurityWeek)

Ghost in the machine? Rogue communication devices found in Chinese inverters (Reuters)

New Intel CPU flaws leak sensitive data from privileged memory (Bleeping Computer) 

M&amp;S cyber insurance payout to be worth up to £100mn (Financial Times)

US extradites Kosovo national charged in operating illegal online marketplace (The Record)

CISA Planned to Kill .Gov Alerts. Then It Reversed Course. (Data BreachToday)

CVE Foundation eyes year-end launch following 11th-hour rescue of MITRE program (CyberScoop)

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A busy Patch Tuesday. Investigators discover undocumented communications devices inside Chinese-made power inverters. A newly discovered Branch Privilege Injection flaw affects Intel CPUs. A UK retailer may claim up to £100mn from its cyber insurers after a major cyberattack.  A Kosovo national has been extradited to the U.S. for allegedly running an illegal online marketplace. CISA will continue alerts on its website following industry backlash. On our Industry Voices segment, Neil Hare-Brown, CEO at STORM Guidance, discusses Cyber Incident Response (CIR) retainer service provision. Shoring up the future of the CVE program.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br></p>
<p><strong>CyberWire Guest</strong></p>
<p>On today’s Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/neilhb/"><u>Neil Hare-Brown</u></a>, CEO at <a href="https://www.stormguidance.com/"><u>STORM Guidance</u></a>, discussing Cyber Incident Response (CIR) retainer service provision. You can learn more <a href="https://www.cyber.care/cyberwire"><u>here</u></a>. </p>
<p><br><strong>Selected Reading</strong></p>
<p><a href="https://securityaffairs.com/177839/hacking/microsoft-patch-tuesday-security-updates-for-may-2025-fixed-5-actively-exploited-zero-days.html"><u>Microsoft Patch Tuesday security updates for May 2025 fixed 5 actively exploited zero-days</u></a> (Security Affairs)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/sap-patches-second-zero-day-flaw-exploited-in-recent-attacks/"><u>SAP patches second zero-day flaw exploited in recent attacks</u></a> (Bleeping Computer) </p>
<p><a href="https://www.bleepingcomputer.com/news/security/ivanti-fixes-epmm-zero-days-chained-in-code-execution-attacks/"><u>Ivanti fixes EPMM zero-days chained in code execution attacks</u></a> (Bleeping Computer) </p>
<p><a href="https://www.bleepingcomputer.com/news/security/fortinet-fixes-critical-zero-day-exploited-in-fortivoice-attacks/"><u>Fortinet fixes critical zero-day exploited in FortiVoice attacks</u></a> (Bleeping Computer) </p>
<p><a href="https://www.securityweek.com/vulnerabilities-patched-by-juniper-vmware-and-zoom/"><u>Vulnerabilities Patched by Juniper, VMware and Zoom</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-siemens-schneider-phoenix-contact/"><u>ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact</u></a> (SecurityWeek)</p>
<p><a href="https://www.securityweek.com/adobe-patches-big-batch-of-critical-severity-software-flaws/"><u>Adobe Patches Big Batch of Critical-Severity Software Flaws</u></a> (SecurityWeek)</p>
<p><a href="https://www.reuters.com/sustainability/climate-energy/ghost-machine-rogue-communication-devices-found-chinese-inverters-2025-05-14/"><u>Ghost in the machine? Rogue communication devices found in Chinese inverters</u></a> (Reuters)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/new-intel-cpu-flaws-leak-sensitive-data-from-privileged-memory/"><u>New Intel CPU flaws leak sensitive data from privileged memory</u></a> (Bleeping Computer) </p>
<p><a href="https://www.ft.com/content/723b6195-1ce7-4b5f-94f5-729e9152c578"><u>M&amp;S cyber insurance payout to be worth up to £100mn</u></a> (Financial Times)</p>
<p><a href="https://therecord.media/us-extradites-kosovo-national-online-marketplace"><u>US extradites Kosovo national charged in operating illegal online marketplace</u></a> (The Record)</p>
<p><a href="https://www.databreachtoday.com/cisa-planned-to-kill-gov-alerts-then-reversed-course-a-28391"><u>CISA Planned to Kill .Gov Alerts. Then It Reversed Course.</u></a> (Data BreachToday)</p>
<p><a href="https://cyberscoop.com/cve-program-funding-crisis-cve-foundation-mitre/"><u>CVE Foundation eyes year-end launch following 11th-hour rescue of MITRE program</u></a> (CyberScoop)</p>
<p><br><strong>Share your feedback.</strong></p>
<p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener"><u>brief listener survey</u></a> as we continually work to improve the show. </p>
<p><br><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1935</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bff131b2-1c7a-11f0-85e0-7bc168f322a2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7630901061.mp3?updated=1747253275" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jamming in a ban on state AI regulation.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2307/notes</link>
      <description>House Republicans look to limit state regulation of AI. Spain investigates potential cybersecurity weak links in the April 28 power grid collapse. A major security flaw has been found in ASUS mainboards’ automatic update system. A new macOS info-stealing malware uses PyInstaller to evade detection. The U.S. charges 14 North Korean nationals in a remote IT job scheme. Europe’s cybersecurity agency launches the European Vulnerability Database. CISA pares back website security alerts. Moldovan authorities arrest a suspect in DoppelPaymer ransomware attacks. On today’s Threat Vector segment, David Moulton speaks with ⁠Noelle Russell⁠, CEO of the AI Leadership Institute, about how to scale responsible AI in the enterprise. Dave &amp; Buster’s invites vanish into the void.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



Threat Vector 

Recorded Live at the Canopy Hotel during the RSAC Conference in San Francisco, ⁠David Moulton⁠ speaks with ⁠Noelle Russell⁠, CEO of the AI Leadership Institute and a leading voice in responsible AI on this Threat Vector segment. Drawing from her new book Scaling Responsible AI, Noelle explains why early-stage AI projects must move beyond hype to operational maturity—addressing accuracy, fairness, and security as foundational pillars. Together, they explore how generative AI models introduce new risks, how red teaming helps organizations prepare, and how to embed responsible practices into AI systems. You can hear David and Noelle’s full discussion on Threat Vector here and catch new episodes every Thursday on your favorite podcast app. 

Selected Reading

Republicans Try to Cram Ban on AI Regulation Into Budget Reconciliation Bill (404 Media)

Spain investigates cyber weaknesses in blackout probe (The Financial Times)

Critical Security flaw in ASUS mainboard update system (Beyond Machines)

Hackers Exploiting PyInstaller to Deploy Undetectable macOS Infostealer (Cybersecurity News)

Researchers Uncover Remote IT Job Fraud Scheme Involving North Korean Nationals (GB Hackers)

European Vulnerability Database Launches Amid US CVE Chaos (Infosecurity Magazine)

Apple Security Update: Multiple Vulnerabilities in macOS &amp; iOS Patched (Cybersecurity News)

CISA changes vulnerabilities updates, shifts to X and emails (The Register)

Suspected DoppelPaymer Ransomware Group Member Arrested (Security Week)

Cracking The Dave &amp; Buster’s Anomaly (Rambo.Codes) 

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 May 2025 20:00:00 -0000</pubDate>
      <itunes:title>Jamming in a ban on state AI regulation.  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2307</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>House Republicans look to limit state regulation of AI. Spain investigates potential cybersecurity weak links in the April 28 power grid collapse. A major security flaw has been found in ASUS mainboards’ automatic update system. A new macOS info-stealing malware uses PyInstaller to evade detection. The U.S. charges 14 North Korean nationals in a remote IT job scheme. Europe’s cybersecurity agency launches the European Vulnerability Database. CISA pares back website security alerts. Moldovan authorities arrest a suspect in DoppelPaymer ransomware attacks. On today’s Threat Vector segment, David Moulton speaks with ⁠Noelle Russell⁠, CEO of the AI Leadership Institute, about how to scale responsible AI in the enterprise. Dave &amp; Buster’s invites vanish into the void.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



Threat Vector 

Recorded Live at the Canopy Hotel during the RSAC Conference in San Francisco, ⁠David Moulton⁠ speaks with ⁠Noelle Russell⁠, CEO of the AI Leadership Institute and a leading voice in responsible AI on this Threat Vector segment. Drawing from her new book Scaling Responsible AI, Noelle explains why early-stage AI projects must move beyond hype to operational maturity—addressing accuracy, fairness, and security as foundational pillars. Together, they explore how generative AI models introduce new risks, how red teaming helps organizations prepare, and how to embed responsible practices into AI systems. You can hear David and Noelle’s full discussion on Threat Vector here and catch new episodes every Thursday on your favorite podcast app. 

Selected Reading

Republicans Try to Cram Ban on AI Regulation Into Budget Reconciliation Bill (404 Media)

Spain investigates cyber weaknesses in blackout probe (The Financial Times)

Critical Security flaw in ASUS mainboard update system (Beyond Machines)

Hackers Exploiting PyInstaller to Deploy Undetectable macOS Infostealer (Cybersecurity News)

Researchers Uncover Remote IT Job Fraud Scheme Involving North Korean Nationals (GB Hackers)

European Vulnerability Database Launches Amid US CVE Chaos (Infosecurity Magazine)

Apple Security Update: Multiple Vulnerabilities in macOS &amp; iOS Patched (Cybersecurity News)

CISA changes vulnerabilities updates, shifts to X and emails (The Register)

Suspected DoppelPaymer Ransomware Group Member Arrested (Security Week)

Cracking The Dave &amp; Buster’s Anomaly (Rambo.Codes) 

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>House Republicans look to limit state regulation of AI. Spain investigates potential cybersecurity weak links in the April 28 power grid collapse. A major security flaw has been found in ASUS mainboards’ automatic update system. A new macOS info-stealing malware uses PyInstaller to evade detection. The U.S. charges 14 North Korean nationals in a remote IT job scheme. Europe’s cybersecurity agency launches the European Vulnerability Database. CISA pares back website security alerts. Moldovan authorities arrest a suspect in DoppelPaymer ransomware attacks. On today’s Threat Vector segment, David Moulton speaks with ⁠Noelle Russell⁠, CEO of the AI Leadership Institute, about how to scale responsible AI in the enterprise. Dave &amp; Buster’s invites vanish into the void.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br></p>
<p><strong>Threat Vector </strong></p>
<p>Recorded Live at the Canopy Hotel during the RSAC Conference in San Francisco, ⁠<a href="https://www.linkedin.com/in/davidrmoulton/"><u>David Moulton</u></a>⁠ speaks with ⁠<a href="https://www.linkedin.com/in/noelleai/"><u>Noelle Russell</u></a>⁠, CEO of the AI Leadership Institute and a leading voice in responsible AI on this <a href="https://thecyberwire.com/podcasts/threat-vector"><u>Threat Vector</u></a> segment. Drawing from her new book Scaling Responsible AI, Noelle explains why early-stage AI projects must move beyond hype to operational maturity—addressing accuracy, fairness, and security as foundational pillars. Together, they explore how generative AI models introduce new risks, how red teaming helps organizations prepare, and how to embed responsible practices into AI systems. You can hear David and Noelle’s full discussion on Threat Vector <a href="https://thecyberwire.com/podcasts/threat-vector/66/notes"><u>here</u></a> and catch new episodes every Thursday on your favorite podcast app. </p>
<p><br><strong>Selected Reading</strong></p>
<p><a href="https://www.404media.co/republicans-try-to-cram-ban-on-ai-regulation-into-budget-reconciliation-bill/"><u>Republicans Try to Cram Ban on AI Regulation Into Budget Reconciliation Bill</u></a> (404 Media)</p>
<p><a href="https://www.ft.com/content/a24e6e3c-cf9f-4093-833b-6e7492e7e7f0"><u>Spain investigates cyber weaknesses in blackout probe</u></a> (The Financial Times)</p>
<p><a href="https://beyondmachines.net/event_details/critical-security-flaw-in-asus-mainboard-update-system-k-5-z-y-7/gD2P6Ple2L"><u>Critical Security flaw in ASUS mainboard update system</u></a> (Beyond Machines)</p>
<p><a href="https://cybersecuritynews.com/hackers-exploiting-pyinstaller/"><u>Hackers Exploiting PyInstaller to Deploy Undetectable macOS Infostealer</u></a> (Cybersecurity News)</p>
<p><a href="https://gbhackers.com/researchers-uncover-remote-it-job-fraud-scheme/"><u>Researchers Uncover Remote IT Job Fraud Scheme Involving North Korean Nationals</u></a> (GB Hackers)</p>
<p><a href="https://www.infosecurity-magazine.com/news/european-vulnerability-database-us/"><u>European Vulnerability Database Launches Amid US CVE Chaos </u></a>(Infosecurity Magazine)</p>
<p><a href="https://cybersecuritynews.com/apple-security-update-sensitive-data/"><u>Apple Security Update: Multiple Vulnerabilities in macOS &amp; iOS Patched</u></a> (Cybersecurity News)</p>
<p><a href="https://www.theregister.com/2025/05/12/cisa_vulnerabilities_updates_x/"><u>CISA changes vulnerabilities updates, shifts to X and emails </u></a>(The Register)</p>
<p><a href="https://www.securityweek.com/suspected-doppelpaymer-ransomware-group-member-arrested/"><u>Suspected DoppelPaymer Ransomware Group Member Arrested </u></a>(Security Week)</p>
<p><a href="https://rambo.codes/posts/2025-05-12-cracking-the-dave-and-busters-anomaly"><u>Cracking The Dave &amp; Buster’s Anomaly</u></a> (Rambo.Codes) </p>
<p><br><strong>Share your feedback.</strong></p>
<p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener"><u>brief listener survey</u></a> as we continually work to improve the show. </p>
<p><br><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1611</itunes:duration>
      <guid isPermaLink="false"><![CDATA[bfc8950e-1c7a-11f0-85e0-8fb342e7b613]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7188937512.mp3?updated=1747247686" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No quick fix for a ClickFix attack. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2306/notes</link>
      <description>A major student engagement platform falls victim to the ClickFix social engineering attack. Google settles privacy allegations with Texas for over one point three billion dollars. Stores across the UK face empty shelves due to an ongoing cyberattack. Ascension Health reports that over 437,000 patients were affected by a third-party data breach. A critical zero-day vulnerability in SAP NetWeaver is being actively exploited. Researchers uncover two major cybersecurity threats targeting IT admins and cloud systems. U.S. prosecutors charge three Russians and one Kazakhstani in connection with the takedown of two major botnets. A new tool disables Microsoft Defender by tricking Windows into thinking a legitimate antivirus is installed. Tim Starks, Senior Reporter from CyberScoop, discusses congressional reactions to White House budget cut proposals for CISA. Fair use faces limits in generative AI.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

We welcome back Tim Starks, Senior Reporter from CyberScoop, discussing congressional reactions to White House budget cut proposals for CISA. You can find background information in these articles: 


  
House appropriators have reservations — or worse — about proposed CISA cuts⁠



  
⁠Sen. Murphy: Trump administration has ‘illegally gutted funding for cybersecurity⁠’




Selected Reading

iClicker website compromised with fake ClickFix CAPTCHA installing malware (BeyondMachines.net)

Google Agrees to $1.3 Billion Settlement in Texas Privacy Lawsuits (SecurityWeek)

Fears 'hackers still in the system' leave Co-op shelves running empty across UK (The Record)

437,000 Impacted by Ascension Health Data Breach (SecurityWeek)

SAP NetWeaver Vulnerability Exploited in Wild by Chinese Hackers (Cyber Security News)

New SEO Poisoning Campaign Targeting IT Admins With Malware (Hackread)

Three Russians, one Kazakhstani charged in takedown of Anyproxy and 5socks botnets (The Record)

Defendnot — A New Tool That Disables Windows Defender by Posing as an Antivirus Solution (Cyber Security News)

Five Takeaways from the Copyright Office’s Controversial New AI Report (Copyright Lately) 

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 12 May 2025 20:00:00 -0000</pubDate>
      <itunes:title>No quick fix for a ClickFix attack. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2306</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A major student engagement platform falls victim to the ClickFix social engineering attack. Google settles privacy allegations with Texas for over one point three billion dollars. Stores across the UK face empty shelves due to an ongoing cyberattack. Ascension Health reports that over 437,000 patients were affected by a third-party data breach. A critical zero-day vulnerability in SAP NetWeaver is being actively exploited. Researchers uncover two major cybersecurity threats targeting IT admins and cloud systems. U.S. prosecutors charge three Russians and one Kazakhstani in connection with the takedown of two major botnets. A new tool disables Microsoft Defender by tricking Windows into thinking a legitimate antivirus is installed. Tim Starks, Senior Reporter from CyberScoop, discusses congressional reactions to White House budget cut proposals for CISA. Fair use faces limits in generative AI.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

We welcome back Tim Starks, Senior Reporter from CyberScoop, discussing congressional reactions to White House budget cut proposals for CISA. You can find background information in these articles: 


  
House appropriators have reservations — or worse — about proposed CISA cuts⁠



  
⁠Sen. Murphy: Trump administration has ‘illegally gutted funding for cybersecurity⁠’




Selected Reading

iClicker website compromised with fake ClickFix CAPTCHA installing malware (BeyondMachines.net)

Google Agrees to $1.3 Billion Settlement in Texas Privacy Lawsuits (SecurityWeek)

Fears 'hackers still in the system' leave Co-op shelves running empty across UK (The Record)

437,000 Impacted by Ascension Health Data Breach (SecurityWeek)

SAP NetWeaver Vulnerability Exploited in Wild by Chinese Hackers (Cyber Security News)

New SEO Poisoning Campaign Targeting IT Admins With Malware (Hackread)

Three Russians, one Kazakhstani charged in takedown of Anyproxy and 5socks botnets (The Record)

Defendnot — A New Tool That Disables Windows Defender by Posing as an Antivirus Solution (Cyber Security News)

Five Takeaways from the Copyright Office’s Controversial New AI Report (Copyright Lately) 

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A major student engagement platform falls victim to the ClickFix social engineering attack. Google settles privacy allegations with Texas for over one point three billion dollars. Stores across the UK face empty shelves due to an ongoing cyberattack. Ascension Health reports that over 437,000 patients were affected by a third-party data breach. A critical zero-day vulnerability in SAP NetWeaver is being actively exploited. Researchers uncover two major cybersecurity threats targeting IT admins and cloud systems. U.S. prosecutors charge three Russians and one Kazakhstani in connection with the takedown of two major botnets. A new tool disables Microsoft Defender by tricking Windows into thinking a legitimate antivirus is installed. Tim Starks, Senior Reporter from CyberScoop, discusses congressional reactions to White House budget cut proposals for CISA. Fair use faces limits in generative AI.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br></p>
<p><strong>CyberWire Guest</strong></p>
<p>We welcome back <a href="https://www.linkedin.com/in/tstarks/"><u>Tim Starks</u></a>, Senior Reporter from <a href="https://cyberscoop.com/"><u>CyberScoop</u></a>, discussing congressional reactions to White House budget cut proposals for CISA. You can find background information in these articles: </p>
<ul>
  <li>
<p><a href="https://cyberscoop.com/house-questions-trump-cisa-budget-cuts-2025/"><u>House appropriators have reservations — or worse — about proposed CISA cuts</u>⁠</a></p>
</li>
  <li>
<p><a href="https://cyberscoop.com/sen-murphy-trump-administration-has-illegally-gutted-funding-for-cybersecurity/">⁠<u>Sen. Murphy: Trump administration has ‘illegally gutted funding for cybersecurity</u>⁠</a>’</p>
</li>
</ul>
<p><strong>Selected Reading</strong></p>
<p><a href="https://beyondmachines.net/event_details/iclicker-website-compromised-with-fake-clickfix-captcha-installing-malware-j-c-o-0-4/gD2P6Ple2L"><u>iClicker website compromised with fake ClickFix CAPTCHA installing malware</u></a> (BeyondMachines.net)</p>
<p><a href="https://www.securityweek.com/google-agrees-to-1-3-billion-settlement-in-texas-privacy-lawsuits/"><u>Google Agrees to $1.3 Billion Settlement in Texas Privacy Lawsuits</u></a> (SecurityWeek)</p>
<p><a href="https://therecord.media/co-op-cyberattack-uk-company-fears-hackers-still-in-system"><u>Fears 'hackers still in the system' leave Co-op shelves running empty across UK</u></a> (The Record)</p>
<p><a href="https://www.securityweek.com/437000-impacted-by-ascension-health-data-breach/"><u>437,000 Impacted by Ascension Health Data Breach</u></a> (SecurityWeek)</p>
<p><a href="https://cybersecuritynews.com/sap-netweaver-vulnerability-exploited/"><u>SAP NetWeaver Vulnerability Exploited in Wild by Chinese Hackers</u></a> (Cyber Security News)</p>
<p><a href="https://hackread.com/seo-poisoning-campaign-hit-it-admins-with-malware/"><u>New SEO Poisoning Campaign Targeting IT Admins With Malware</u></a> (Hackread)</p>
<p><a href="https://therecord.media/5socks-anyproxy-botnets-takedown-russians-kazakhstani-charged"><u>Three Russians, one Kazakhstani charged in takedown of Anyproxy and 5socks botnets</u></a> (The Record)</p>
<p><a href="https://cybersecuritynews.com/defendnot-disables-windows-defender/"><u>Defendnot — A New Tool That Disables Windows Defender by Posing as an Antivirus Solution</u></a> (Cyber Security News)</p>
<p><a href="https://copyrightlately.com/copyright-office-ai-report/"><u>Five Takeaways from the Copyright Office’s Controversial New AI Report</u></a> (Copyright Lately) </p>
<p><br><strong>Share your feedback.</strong></p>
<p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener"><u>brief listener survey</u></a> as we continually work to improve the show. </p>
<p><br><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1586</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bfa263e8-1c7a-11f0-85e0-5b885dad0b31]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6956716309.mp3?updated=1747077396" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Limor Kessem: Be an upstander. [Security Advisor] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/67/notes</link>
      <description>Enjoy this encore of Career Notes. 

Executive Security Advisor at IBM Security Limor Kessem says she started her cybersecurity career by pure chance. Limor made a change from her childhood dream of being a doctor and came into cybersecurity with her passion, investment, discipline, and perseverance. Limor talks about how we must tighten our core security and at the same time we allow innovation to help us move forward with the times. She's been fortunate to have been able to stand up for others and has had others support her. She said that is very motivating and has allowed her to really explore every possible thing in her career that she can contribute without limiting herself to a certain role. We thank Limor for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 11 May 2025 07:00:00 -0000</pubDate>
      <itunes:title>Limor Kessem: Be an upstander. [Security Advisor] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>67</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/529d595c-2aa7-11f0-aa38-97a763999325/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Enjoy this encore of Career Notes. 

Executive Security Advisor at IBM Security Limor Kessem says she started her cybersecurity career by pure chance. Limor made a change from her childhood dream of being a doctor and came into cybersecurity with her passion, investment, discipline, and perseverance. Limor talks about how we must tighten our core security and at the same time we allow innovation to help us move forward with the times. She's been fortunate to have been able to stand up for others and has had others support her. She said that is very motivating and has allowed her to really explore every possible thing in her career that she can contribute without limiting herself to a certain role. We thank Limor for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this encore of Career Notes. </p>
<p>Executive Security Advisor at IBM Security Limor Kessem says she started her cybersecurity career by pure chance. Limor made a change from her childhood dream of being a doctor and came into cybersecurity with her passion, investment, discipline, and perseverance. Limor talks about how we must tighten our core security and at the same time we allow innovation to help us move forward with the times. She's been fortunate to have been able to stand up for others and has had others support her. She said that is very motivating and has allowed her to really explore every possible thing in her career that she can contribute without limiting herself to a certain role. We thank Limor for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>507</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[529d595c-2aa7-11f0-aa38-97a763999325]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7047254205.mp3?updated=1746556141" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Beyond cyber: Securing the next horizon. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/83/notes</link>
      <description>Cybersecurity is no longer confined to the digital world or just a technical challenge, it’s a global imperative. The NightDragon Innovation Summit convened a group of industry leaders to discuss how public and private entities can work together to address emerging threats and harness the power of AI, cybersecurity, and innovation to strengthen national defense.

In this special edition podcast, we capture a glimpse into the knowledge and expertise shared at the NightDragon Innovation Summit. We are joined by NightDragon Founder and CEO Dave DeWalt, DataBee CEO Nicole Bucala, Liberty Mutual Insurance EVP and CISO Katie Jenkins, Sophos CEO Joe Levy, and Dataminr VP of Sales Engineering Michael Mastrole. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 11 May 2025 05:00:00 -0000</pubDate>
      <itunes:title>Beyond cyber: Securing the next horizon.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>83</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b085d5b2-2d04-11f0-a1ca-4b03070248c9/image/5c193c8b1edfd8bf5257414ab950f73c.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cybersecurity is no longer confined to the digital world or just a technical challenge, it’s a global imperative. The NightDragon Innovation Summit convened a group of industry leaders to discuss how public and private entities can work together to address emerging threats and harness the power of AI, cybersecurity, and innovation to strengthen national defense.

In this special edition podcast, we capture a glimpse into the knowledge and expertise shared at the NightDragon Innovation Summit. We are joined by NightDragon Founder and CEO Dave DeWalt, DataBee CEO Nicole Bucala, Liberty Mutual Insurance EVP and CISO Katie Jenkins, Sophos CEO Joe Levy, and Dataminr VP of Sales Engineering Michael Mastrole. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cybersecurity is no longer confined to the digital world or just a technical challenge, it’s a global imperative. The <a href="https://gatsby.events/night-dragon/rsvp/register?e=night-dragon-innovation-summit-2025">NightDragon Innovation Summit</a> convened a group of industry leaders to discuss how public and private entities can work together to address emerging threats and harness the power of AI, cybersecurity, and innovation to strengthen national defense.</p>
<p>In this special edition podcast, we capture a glimpse into the knowledge and expertise shared at the NightDragon Innovation Summit. We are joined by <a href="https://www.nightdragon.com/">NightDragon</a> Founder and CEO <a href="https://www.linkedin.com/in/ddewalt/">Dave DeWalt</a>, <a href="https://www.comcasttechnologysolutions.com/databee-suite">DataBee</a> CEO <a href="https://www.linkedin.com/in/nicole-bucala-33b951164/">Nicole Bucala</a>, <a href="https://www.libertymutualgroup.com/about-lm/corporate-information/overview">Liberty Mutual Insurance</a> EVP and CISO <a href="https://www.linkedin.com/in/katiec1/">Katie Jenkins</a>, Sophos CEO <a href="https://www.linkedin.com/in/j0313vy/">Joe Levy</a>, and <a href="https://www.dataminr.com/">Dataminr</a> VP of Sales Engineering <a href="https://www.linkedin.com/in/mastrole/">Michael Mastrole</a>. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3613</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b085d5b2-2d04-11f0-a1ca-4b03070248c9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7156967833.mp3?updated=1748358470" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hijacking wallets with malicious patches. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/376/notes</link>
      <description>This week, we are joined by Lucija Valentić, Software Threat Researcher from ReversingLabs, who is discussing "Atomic and Exodus crypto wallets targeted in malicious npm campaign." Threat actors have launched a malicious npm campaign targeting Atomic and Exodus crypto wallets by distributing a fake package called "pdf-to-office," which secretly patches locally installed wallet software to redirect crypto transfers to attacker-controlled addresses. 

ReversingLabs researchers discovered that this package used obfuscated JavaScript to trojanize specific files in targeted wallet versions, enabling persistence even after the malicious package was removed. This incident highlights the growing threat of software supply chain attacks in the cryptocurrency space and underscores the need for vigilant monitoring of both open-source repositories and local applications.

The research can be found here:


  
⁠⁠Atomic and Exodus crypto wallets targeted in malicious npm campaign



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 May 2025 05:00:00 -0000</pubDate>
      <itunes:title>Hijacking wallets with malicious patches.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>376</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Lucija Valentić, Software Threat Researcher from ReversingLabs, who is discussing "Atomic and Exodus crypto wallets targeted in malicious npm campaign." Threat actors have launched a malicious npm campaign targeting Atomic and Exodus crypto wallets by distributing a fake package called "pdf-to-office," which secretly patches locally installed wallet software to redirect crypto transfers to attacker-controlled addresses. 

ReversingLabs researchers discovered that this package used obfuscated JavaScript to trojanize specific files in targeted wallet versions, enabling persistence even after the malicious package was removed. This incident highlights the growing threat of software supply chain attacks in the cryptocurrency space and underscores the need for vigilant monitoring of both open-source repositories and local applications.

The research can be found here:


  
⁠⁠Atomic and Exodus crypto wallets targeted in malicious npm campaign



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/lucija-valenti%C4%87-731975210/">Lucija Valentić</a>, Software Threat Researcher from <a href="https://www.linkedin.com/company/reversinglabs/">ReversingLabs</a>, who is discussing "Atomic and Exodus crypto wallets targeted in malicious npm campaign." Threat actors have launched a malicious npm campaign targeting Atomic and Exodus crypto wallets by distributing a fake package called "pdf-to-office," which secretly patches locally installed wallet software to redirect crypto transfers to attacker-controlled addresses. </p>
<p>ReversingLabs researchers discovered that this package used obfuscated JavaScript to trojanize specific files in targeted wallet versions, enabling persistence even after the malicious package was removed. This incident highlights the growing threat of software supply chain attacks in the cryptocurrency space and underscores the need for vigilant monitoring of both open-source repositories and local applications.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li>
<a href="https://www.cyberark.com/resources/threat-research-blog/agents-under-attack-threat-modeling-agentic-ai">⁠⁠</a><a href="https://www.reversinglabs.com/blog/atomic-and-exodus-crypto-wallets-targeted-in-malicious-npm-campaign">Atomic and Exodus crypto wallets targeted in malicious npm campaign</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1029</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[29459a92-31b9-11f0-a317-7f404b6836f2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1289523122.mp3?updated=1746724229" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scrutinizing the security of messaging apps continues. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2305/notes</link>
      <description>The messaging app used by CBP and the White House faces continued security scrutiny. Hacktivists breach the airline used for U.S. deportation flights. The FBI warns that threat actors are exploiting outdated, unsupported routers. Education giant Pearson confirms a cyberattack. Researchers report exploitation of Windows Remote Management (WinRM) for stealthy lateral movement in Active Directory (AD) environments. A sophisticated email attack campaign uses malicious PDF invoices to deliver a cross-platform RAT. A zero-day vulnerability in SAP NetWeaver enables remote code execution. An Indiana health system reports a data breach affecting nearly 263,000 individuals. Our guest is Alex Cox, Director of Information Security at LastPass, discussing tax-related lures targeting refunds. AI empowers a murder victim to speak from beyond the grave. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Alex Cox, Director of Information Security at LastPass, to discuss tax-related lures facing both tax preparation agencies and filers expecting refunds.

Selected Reading

On the state of modern Web Application Security (BrightTalk)

Customs and Border Protection Confirms Its Use of Hacked Signal Clone TeleMessage  (Wired)

Hackers hit deportation airline GlobalX, leak flight manifests, and leave an unsubtle message for "Donnie" Trump (Bitdefender)

FBI Sounds Alarm on Rogue Cybercrime Services Targeting Obsolete Routers (infosecurity magazine)

Education giant Pearson hit by cyberattack exposing customer data (Bleeping Computer)

Hackers Using Windows Remote Management to Stealthily Navigate Active Directory Network (Cybersecurity News)

Hackers Weaponizing PDF Invoices to Attack Windows, Linux &amp; macOS Systems (Cybersecurity News)

SAP Zero-Day Targeted Since January, Many Sectors Impacted (Security Week)

Indiana Health System Notifies 263,000 of Oracle Hack (Bank of Infosecurity)

A Judge Accepted AI Video Testimony From a Dead Man (404 Media)

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 09 May 2025 20:00:00 -0000</pubDate>
      <itunes:title>Scrutinizing the security of messaging apps continues. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2305</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The messaging app used by CBP and the White House faces continued security scrutiny. Hacktivists breach the airline used for U.S. deportation flights. The FBI warns that threat actors are exploiting outdated, unsupported routers. Education giant Pearson confirms a cyberattack. Researchers report exploitation of Windows Remote Management (WinRM) for stealthy lateral movement in Active Directory (AD) environments. A sophisticated email attack campaign uses malicious PDF invoices to deliver a cross-platform RAT. A zero-day vulnerability in SAP NetWeaver enables remote code execution. An Indiana health system reports a data breach affecting nearly 263,000 individuals. Our guest is Alex Cox, Director of Information Security at LastPass, discussing tax-related lures targeting refunds. AI empowers a murder victim to speak from beyond the grave. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Today we are joined by Alex Cox, Director of Information Security at LastPass, to discuss tax-related lures facing both tax preparation agencies and filers expecting refunds.

Selected Reading

On the state of modern Web Application Security (BrightTalk)

Customs and Border Protection Confirms Its Use of Hacked Signal Clone TeleMessage  (Wired)

Hackers hit deportation airline GlobalX, leak flight manifests, and leave an unsubtle message for "Donnie" Trump (Bitdefender)

FBI Sounds Alarm on Rogue Cybercrime Services Targeting Obsolete Routers (infosecurity magazine)

Education giant Pearson hit by cyberattack exposing customer data (Bleeping Computer)

Hackers Using Windows Remote Management to Stealthily Navigate Active Directory Network (Cybersecurity News)

Hackers Weaponizing PDF Invoices to Attack Windows, Linux &amp; macOS Systems (Cybersecurity News)

SAP Zero-Day Targeted Since January, Many Sectors Impacted (Security Week)

Indiana Health System Notifies 263,000 of Oracle Hack (Bank of Infosecurity)

A Judge Accepted AI Video Testimony From a Dead Man (404 Media)

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The messaging app used by CBP and the White House faces continued security scrutiny. Hacktivists breach the airline used for U.S. deportation flights. The FBI warns that threat actors are exploiting outdated, unsupported routers. Education giant Pearson confirms a cyberattack. Researchers report exploitation of Windows Remote Management (WinRM) for stealthy lateral movement in Active Directory (AD) environments. A sophisticated email attack campaign uses malicious PDF invoices to deliver a cross-platform RAT. A zero-day vulnerability in SAP NetWeaver enables remote code execution. An Indiana health system reports a data breach affecting nearly 263,000 individuals. Our guest is Alex Cox, Director of Information Security at LastPass, discussing tax-related lures targeting refunds. AI empowers a murder victim to speak from beyond the grave. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/alexjcox/"><u>Alex Cox</u></a>, Director of Information Security at <a href="https://www.lastpass.com/"><u>LastPass</u></a>, to discuss tax-related lures facing both tax preparation agencies and filers expecting refunds.</p>
<p><br><strong>Selected Reading</strong></p>
<p><a href="https://www.brighttalk.com/webcast/18820/640148?bt_tok=%7B%7Brecord.BT_fastpass_token%7D%7D&amp;utm_source=N2KNetworks&amp;utm_medium=brighttalk&amp;utm_campaign=640148"><u>On the state of modern Web Application Security</u></a> (BrightTalk)</p>
<p><a href="https://www.wired.com/story/cbp-confirms-telemessage-use/"><u>Customs and Border Protection Confirms Its Use of Hacked Signal Clone TeleMessage </u></a> (Wired)</p>
<p><a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/hackers-globalx-message-trump"><u>Hackers hit deportation airline GlobalX, leak flight manifests, and leave an unsubtle message for "Donnie" Trump</u></a> (Bitdefender)</p>
<p><a href="https://www.infosecurity-magazine.com/news/fbi-cybercrime-obsolete-routers/"><u>FBI Sounds Alarm on Rogue Cybercrime Services Targeting Obsolete Routers</u></a> (infosecurity magazine)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/education-giant-pearson-hit-by-cyberattack-exposing-customer-data/"><u>Education giant Pearson hit by cyberattack exposing customer data</u></a> (Bleeping Computer)</p>
<p><a href="https://cybersecuritynews.com/windows-remote-management-leveraged/"><u>Hackers Using Windows Remote Management to Stealthily Navigate Active Directory Network</u></a> (Cybersecurity News)</p>
<p><a href="https://cybersecuritynews.com/hackers-weaponizing-pdf-invoices/"><u>Hackers Weaponizing PDF Invoices to Attack Windows, Linux &amp; macOS Systems</u></a> (Cybersecurity News)</p>
<p><a href="https://www.securityweek.com/sap-zero-day-targeted-since-january-many-sectors-impacted/"><u>SAP Zero-Day Targeted Since January, Many Sectors Impacted </u></a>(Security Week)</p>
<p><a href="https://www.bankinfosecurity.com/indiana-health-system-notifies-263000-oracle-hack-a-28353"><u>Indiana Health System Notifies 263,000 of Oracle Hack</u></a> (Bank of Infosecurity)</p>
<p><a href="https://www.404media.co/email/0cb70eb4-c805-4e4e-9428-7ae90657205c/?ref=daily-stories-newsletter"><u>A Judge Accepted AI Video Testimony From a Dead Man</u></a> (404 Media)</p>
<p><br><strong>Share your feedback.</strong></p>
<p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener"><u>brief listener survey</u></a> as we continually work to improve the show. </p>
<p><br><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1586</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bf7be47a-1c7a-11f0-85e0-57b5fdf68971]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1067611011.mp3?updated=1746812637" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Targeting schools is not cool. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2304/notes</link>
      <description>The LockBit ransomware gang has been hacked. Google researchers identify a new infostealer called Lostkeys. SonicWall is urging customers to patch three critical device vulnerabilities. Apple patches a critical remote code execution flaw. Cisco patches 35 vulnerabilities across multiple products. Iranian hackers cloned a German modeling agency’s website to spy on Iranian dissidents. Researchers bypass SentinelOne’s EDR protection. Education tech firm PowerSchool faces renewed extortion. CrowdStrike leans into AI amidst layoffs. Our guest is Caleb Barlow, CEO of Cyberbit, discussing the mixed messages of the cyber skills gaps. Honoring the legacy of Joseph Nye.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

Today we are joined by Caleb Barlow, CEO of Cyberbit, who is discussing the mixed messages of the cyber skills gaps.

Selected Reading

LockBit ransomware gang hacked, victim negotiations exposed (Bleeping Computer)

Russian state-linked Coldriver spies add new malware to operation (The Record)

Fake AI Tools Push New Noodlophile Stealer Through Facebook Ads (Hackread)

SonicWall urges admins to patch VPN flaw exploited in attacks (Bleeping Computer)

Researchers Details macOS Remote Code Execution Vulnerability - CVE-2024-44236 (Cyber Security News)

Cisco IOS XE Wireless Controllers Vulnerability Enables Full Device Control for Attackers (Cyber Security News)

Cisco Patches 35 Vulnerabilities Across Several Products (SecurityWeek)

Iranian Hackers Impersonate as Model Agency to Attack Victims (Cyber Security News)

Hacker Finds New Technique to Bypass SentinelOne EDR Solution (Infosecurity Magazine)

CrowdStrike trims workforce by 5 percent, aims to rely on AI (The Register)

Despite ransom payment, PowerSchool hacker now extorting individual school districts (The Record) 

Joseph Nye, Harvard professor, developer of “soft power” theory, and an architect of modern international relations, dies at 88 (Harvard University) 

Nye Lauded for Cybersecurity Leadership (The Belfer Center for Science and International Affairs at Harvard University)

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 08 May 2025 20:00:00 -0000</pubDate>
      <itunes:title>Targeting schools is not cool. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2304</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The LockBit ransomware gang has been hacked. Google researchers identify a new infostealer called Lostkeys. SonicWall is urging customers to patch three critical device vulnerabilities. Apple patches a critical remote code execution flaw. Cisco patches 35 vulnerabilities across multiple products. Iranian hackers cloned a German modeling agency’s website to spy on Iranian dissidents. Researchers bypass SentinelOne’s EDR protection. Education tech firm PowerSchool faces renewed extortion. CrowdStrike leans into AI amidst layoffs. Our guest is Caleb Barlow, CEO of Cyberbit, discussing the mixed messages of the cyber skills gaps. Honoring the legacy of Joseph Nye.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.



CyberWire Guest

Today we are joined by Caleb Barlow, CEO of Cyberbit, who is discussing the mixed messages of the cyber skills gaps.

Selected Reading

LockBit ransomware gang hacked, victim negotiations exposed (Bleeping Computer)

Russian state-linked Coldriver spies add new malware to operation (The Record)

Fake AI Tools Push New Noodlophile Stealer Through Facebook Ads (Hackread)

SonicWall urges admins to patch VPN flaw exploited in attacks (Bleeping Computer)

Researchers Details macOS Remote Code Execution Vulnerability - CVE-2024-44236 (Cyber Security News)

Cisco IOS XE Wireless Controllers Vulnerability Enables Full Device Control for Attackers (Cyber Security News)

Cisco Patches 35 Vulnerabilities Across Several Products (SecurityWeek)

Iranian Hackers Impersonate as Model Agency to Attack Victims (Cyber Security News)

Hacker Finds New Technique to Bypass SentinelOne EDR Solution (Infosecurity Magazine)

CrowdStrike trims workforce by 5 percent, aims to rely on AI (The Register)

Despite ransom payment, PowerSchool hacker now extorting individual school districts (The Record) 

Joseph Nye, Harvard professor, developer of “soft power” theory, and an architect of modern international relations, dies at 88 (Harvard University) 

Nye Lauded for Cybersecurity Leadership (The Belfer Center for Science and International Affairs at Harvard University)

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The LockBit ransomware gang has been hacked. Google researchers identify a new infostealer called Lostkeys. SonicWall is urging customers to patch three critical device vulnerabilities. Apple patches a critical remote code execution flaw. Cisco patches 35 vulnerabilities across multiple products. Iranian hackers cloned a German modeling agency’s website to spy on Iranian dissidents. Researchers bypass SentinelOne’s EDR protection. Education tech firm PowerSchool faces renewed extortion. CrowdStrike leans into AI amidst layoffs. Our guest is Caleb Barlow, CEO of Cyberbit, discussing the mixed messages of the cyber skills gaps. Honoring the legacy of Joseph Nye.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br></p>
<p><strong>CyberWire Guest</strong></p>
<p>Today we are joined by <a href="https://www.linkedin.com/in/calebbarlow/"><u>Caleb Barlow</u></a>, CEO of <a href="https://www.cyberbit.com/"><u>Cyberbit</u></a>, who is discussing the mixed messages of the cyber skills gaps.</p>
<p><br><strong>Selected Reading</strong></p>
<p><a href="https://www.bleepingcomputer.com/news/security/lockbit-ransomware-gang-hacked-victim-negotiations-exposed/"><u>LockBit ransomware gang hacked, victim negotiations exposed</u></a> (Bleeping Computer)</p>
<p><a href="https://therecord.media/coldriver-russia-cyber-espionage-lostkeys-malware"><u>Russian state-linked Coldriver spies add new malware to operation</u></a> (The Record)</p>
<p><a href="https://hackread.com/fake-ai-tools-noodlophile-stealer-facebook-ads/"><u>Fake AI Tools Push New Noodlophile Stealer Through Facebook Ads</u></a> (Hackread)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/sonicwall-urges-admins-to-patch-vpn-flaw-exploited-in-attacks/"><u>SonicWall urges admins to patch VPN flaw exploited in attacks</u></a> (Bleeping Computer)</p>
<p><a href="https://cybersecuritynews.com/macos-remote-code-execution-vulnerability/"><u>Researchers Details macOS Remote Code Execution Vulnerability - CVE-2024-44236</u></a> (Cyber Security News)</p>
<p><a href="https://cybersecuritynews.com/cisco-ios-xe-wireless-controllers-vulnerability/"><u>Cisco IOS XE Wireless Controllers Vulnerability Enables Full Device Control for Attackers</u></a> (Cyber Security News)</p>
<p><a href="https://www.securityweek.com/cisco-patches-35-vulnerabilities-across-several-products/"><u>Cisco Patches 35 Vulnerabilities Across Several Products</u></a> (SecurityWeek)</p>
<p><a href="https://cybersecuritynews.com/iranian-hackers-impersonate-as-model-agency/"><u>Iranian Hackers Impersonate as Model Agency to Attack Victims</u></a> (Cyber Security News)</p>
<p><a href="https://www.infosecurity-magazine.com/news/new-technique-bypass-sentinelone/"><u>Hacker Finds New Technique to Bypass SentinelOne EDR Solution</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.theregister.com/2025/05/07/crowdstrike_trims_workforce_ai/"><u>CrowdStrike trims workforce by 5 percent, aims to rely on AI</u></a> (The Register)</p>
<p><a href="https://therecord.media/despite-ransom-payment-powerschool-extorting"><u>Despite ransom payment, PowerSchool hacker now extorting individual school districts</u></a> (The Record) </p>
<p><a href="https://www.hks.harvard.edu/faculty-research/policy-topics/international-relations-security/joseph-nye-obituary"><u>Joseph Nye, Harvard professor, developer of “soft power” theory, and an architect of modern international relations, dies at 88</u></a> (Harvard University) </p>
<p><a href="https://www.belfercenter.org/publication/nye-lauded-cybersecurity-leadership"><u>Nye Lauded for Cybersecurity Leadership</u></a> (The Belfer Center for Science and International Affairs at Harvard University)</p>
<p><br><strong>Share your feedback.</strong></p>
<p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener"><u>brief listener survey</u></a> as we continually work to improve the show. </p>
<p><br><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1831</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bf56a4da-1c7a-11f0-85e0-bb2f5856861f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4527437770.mp3?updated=1746730699" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AWS in Orbit: Empowering exploration on the Moon, Mars, and more.</title>
      <link>https://space.n2k.com/podcasts/t-minus/aws-in-orbit-20</link>
      <description>From the N2K CyberWire network T-Minus team, please enjoy this podcast episode recorded at Space Symposium 2025. Find out how AWS for Aerospace and Satellite is  empowering exploration on the Moon, Mars, and beyond with Lunar Outpost. You can learn more about AWS in Orbit at space.n2k.com/aws.



Our guests on this episode are AJ Gemer, CTO at Lunar Outpost and Salem El Nimri, CTO at AWS Aerospace &amp; Satellite.



Remember to leave us a 5-star rating and review in your favorite podcast app.



Be sure to follow T-Minus on LinkedIn and Instagram.



Selected Reading



AWS Aerospace and Satellite



Audience Survey

We want to hear from you! Please complete our short survey. It’ll help us get better and deliver you the most mission-critical space intel every day.



Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.



Want to join us for an interview?

Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.



T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 08 May 2025 18:00:00 -0000</pubDate>
      <itunes:title>AWS in Orbit: Empowering exploration on the Moon, Mars, and more.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>20</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/406f9a34-2c04-11f0-9f99-5703a7fe57c8/image/67ce59bd16df6235319bb2b9cd4a03e0.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Find out how AWS for Aerospace and Satellite is  empowering exploration on the Moon, Mars, and beyond with Lunar Outpost.</itunes:subtitle>
      <itunes:summary>From the N2K CyberWire network T-Minus team, please enjoy this podcast episode recorded at Space Symposium 2025. Find out how AWS for Aerospace and Satellite is  empowering exploration on the Moon, Mars, and beyond with Lunar Outpost. You can learn more about AWS in Orbit at space.n2k.com/aws.



Our guests on this episode are AJ Gemer, CTO at Lunar Outpost and Salem El Nimri, CTO at AWS Aerospace &amp; Satellite.



Remember to leave us a 5-star rating and review in your favorite podcast app.



Be sure to follow T-Minus on LinkedIn and Instagram.



Selected Reading



AWS Aerospace and Satellite



Audience Survey

We want to hear from you! Please complete our short survey. It’ll help us get better and deliver you the most mission-critical space intel every day.



Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.



Want to join us for an interview?

Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.



T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From the N2K CyberWire network T-Minus team, please enjoy this podcast episode recorded at Space Symposium 2025. Find out how AWS for Aerospace and Satellite is  empowering exploration on the Moon, Mars, and beyond with Lunar Outpost. You can learn more about AWS in Orbit at <a href="https://space.n2k.com/aws">space.n2k.com/aws</a>.</p>
<p><br></p>
<p>Our guests on this episode are <a href="https://www.linkedin.com/in/aj-gemer/">AJ Gemer</a>, CTO at <a href="https://www.lunaroutpost.com/">Lunar Outpost</a> and Salem El Nimri, CTO at AWS Aerospace &amp; Satellite.</p>
<p><br></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p><br></p>
<p>Be sure to follow T-Minus on <a href="https://www.linkedin.com/company/n2k-space/">LinkedIn</a> and <a href="https://www.instagram.com/tminusdaily/">Instagram</a>.</p>
<p><br></p>
<p>Selected Reading</p>
<p><br></p>
<p><a href="https://aws.amazon.com/aerospace-and-satellite/?trk=c9d66aa7-01dc-4cbe-93b1-2c987a64a1d9&amp;sc_channel=el">AWS Aerospace and Satellite</a></p>
<p><br></p>
<p>Audience Survey</p>
<p>We want to hear from you! Please complete our <a href="https://www.surveymonkey.com/r/BL5NFPW">short survey</a>. It’ll help us get better and deliver you the most mission-critical space intel every day.</p>
<p><br></p>
<p>Want to hear your company in the show?</p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/ung56qbvknfbj9z2">media kit</a>. Contact us at <a href="mailto:space@n2k.com">space@n2k.com</a> to request more info.</p>
<p><br></p>
<p>Want to join us for an interview?</p>
<p>Please send your pitch to <a href="mailto:space-editor@n2k.com">space-editor@n2k.com</a> and include your name, affiliation, and topic proposal.</p>
<p><br></p>
<p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1597</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[406f9a34-2c04-11f0-9f99-5703a7fe57c8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9579503929.mp3?updated=1744227928" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When spyware backfires.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2303/notes</link>
      <description>A jury orders NSO Group to pay $167 millions dollars to Meta over spyware allegations. CISA warns of hacktivists targeting U.S. ICS and SCADA systems. Researcher Micah Lee documents serious privacy risks in the TM SGNL app used by high level Trump officials. The NSA plans significant workforce cuts. Nations look for alternatives to U.S. cloud providers. A medical device provider discloses a cyberattack disrupting its ability to ship customer orders. The Panda Shop smishing kit impersonates trusted brands. Accenture’s CFO thwarts a deepfake attempt. Our temporary intern Kevin Magee from Microsoft wraps up his reporting from the RSAC show floor.  Server room shenanigans, with romance, retaliation, and root access.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Wrapping up RSAC 2025, we’re joined by our partner Kevin Magee, Global Director of Cybersecurity Startups at Microsoft for Startups. Kevin brings the energy with a high-octane medley of interviews directly from the show floor, featuring sharp insights and bold ideas from some of cybersecurity’s most influential voices. It’s the perfect, fast-paced finale to our RSAC coverage—check out the show notes for links to all the guests featured!

In this segment, you’ll hear from Eoin Wickens, Director of Threat Intelligence of HiddenLayer, Jordan Shaw-Young, Chief of Staff for Security Services at BlueVoyant, Gil Barak, co-founder and CEO of Blink Ops, and Paul St Vil, VP of Field Engineering at Zenity.

You can also catch Kevin on our Microsoft for Startups⁠ Spotlight, brought to you by N2K CyberWire and Microsoft, where we shine a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. Kevin and Dave talk with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur, then speak with three Microsoft for Startups members: Matthew Chiodi⁠ of ⁠Cerby⁠, ⁠Travis Howerton⁠ of ⁠RegScale⁠, and ⁠Karl Mattson⁠ of ⁠Endor Labs⁠. Whether you are building your own startup or just love a good innovation story, listen and learn more here.

Selected Reading

Spyware-maker NSO ordered to pay $167 million for hacking WhatsApp (The Washington Post)

CISA Warns of Hackers Attacking ICS/SCADA Systems in Oil and Natural Gas Companies (Cyber Security News)

Despite misleading marketing, Israeli company TeleMessage, used by Trump officials, can access plaintext chat logs (Micha Flee)

NSA to cut up to 2,000 civilian roles as part of intel community downsizing' (The Record)

NIST loses key cyber experts in standards and research (Cybersecurity Dive)

A coherent European/non-US cloud strategy: building railroads for the cloud economy (Bert Hubert)

Medical device giant Masimo says cyberattack is limiting ability to fill customer orders (The Record)

New Chinese Smishing Kit Dubbed 'Panda Shop' Steal Google, Apple Pay &amp; Credit Card Details (Cyber Security News)

Accenture: What we learned when our CEO got deepfaked (Computing)

IT Worker from Computacenter Let Girlfriend Into Deutsche Bank’s Restricted Areas (GB Hackers)

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 07 May 2025 20:10:00 -0000</pubDate>
      <itunes:title>When spyware backfires.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2303</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A jury orders NSO Group to pay $167 millions dollars to Meta over spyware allegations. CISA warns of hacktivists targeting U.S. ICS and SCADA systems. Researcher Micah Lee documents serious privacy risks in the TM SGNL app used by high level Trump officials. The NSA plans significant workforce cuts. Nations look for alternatives to U.S. cloud providers. A medical device provider discloses a cyberattack disrupting its ability to ship customer orders. The Panda Shop smishing kit impersonates trusted brands. Accenture’s CFO thwarts a deepfake attempt. Our temporary intern Kevin Magee from Microsoft wraps up his reporting from the RSAC show floor.  Server room shenanigans, with romance, retaliation, and root access.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Wrapping up RSAC 2025, we’re joined by our partner Kevin Magee, Global Director of Cybersecurity Startups at Microsoft for Startups. Kevin brings the energy with a high-octane medley of interviews directly from the show floor, featuring sharp insights and bold ideas from some of cybersecurity’s most influential voices. It’s the perfect, fast-paced finale to our RSAC coverage—check out the show notes for links to all the guests featured!

In this segment, you’ll hear from Eoin Wickens, Director of Threat Intelligence of HiddenLayer, Jordan Shaw-Young, Chief of Staff for Security Services at BlueVoyant, Gil Barak, co-founder and CEO of Blink Ops, and Paul St Vil, VP of Field Engineering at Zenity.

You can also catch Kevin on our Microsoft for Startups⁠ Spotlight, brought to you by N2K CyberWire and Microsoft, where we shine a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. Kevin and Dave talk with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur, then speak with three Microsoft for Startups members: Matthew Chiodi⁠ of ⁠Cerby⁠, ⁠Travis Howerton⁠ of ⁠RegScale⁠, and ⁠Karl Mattson⁠ of ⁠Endor Labs⁠. Whether you are building your own startup or just love a good innovation story, listen and learn more here.

Selected Reading

Spyware-maker NSO ordered to pay $167 million for hacking WhatsApp (The Washington Post)

CISA Warns of Hackers Attacking ICS/SCADA Systems in Oil and Natural Gas Companies (Cyber Security News)

Despite misleading marketing, Israeli company TeleMessage, used by Trump officials, can access plaintext chat logs (Micha Flee)

NSA to cut up to 2,000 civilian roles as part of intel community downsizing' (The Record)

NIST loses key cyber experts in standards and research (Cybersecurity Dive)

A coherent European/non-US cloud strategy: building railroads for the cloud economy (Bert Hubert)

Medical device giant Masimo says cyberattack is limiting ability to fill customer orders (The Record)

New Chinese Smishing Kit Dubbed 'Panda Shop' Steal Google, Apple Pay &amp; Credit Card Details (Cyber Security News)

Accenture: What we learned when our CEO got deepfaked (Computing)

IT Worker from Computacenter Let Girlfriend Into Deutsche Bank’s Restricted Areas (GB Hackers)

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A jury orders NSO Group to pay $167 millions dollars to Meta over spyware allegations. CISA warns of hacktivists targeting U.S. ICS and SCADA systems. Researcher Micah Lee documents serious privacy risks in the TM SGNL app used by high level Trump officials. The NSA plans significant workforce cuts. Nations look for alternatives to U.S. cloud providers. A medical device provider discloses a cyberattack disrupting its ability to ship customer orders. The Panda Shop smishing kit impersonates trusted brands. Accenture’s CFO thwarts a deepfake attempt. Our temporary intern Kevin Magee from Microsoft wraps up his reporting from the RSAC show floor.  Server room shenanigans, with romance, retaliation, and root access.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Wrapping up RSAC 2025, we’re joined by our partner <a href="https://www.linkedin.com/in/kmagee/"><u>Kevin Magee</u></a>, Global Director of Cybersecurity Startups at <a href="https://www.microsoft.com/en-us/startups?wt.mc_id=cyberwireepisode_landingpage_organicsocial_mfsmktg"><u>Microsoft for Startups</u></a>. Kevin brings the energy with a high-octane medley of interviews directly from the show floor, featuring sharp insights and bold ideas from some of cybersecurity’s most influential voices. It’s the perfect, fast-paced finale to our RSAC coverage—check out the show notes for links to all the guests featured!</p>
<p>In this segment, you’ll hear from <a href="https://www.linkedin.com/in/eoinwickens/"><u>Eoin Wickens</u></a>, Director of Threat Intelligence of <a href="https://www.linkedin.com/company/hiddenlayersec/"><u>HiddenLayer</u></a>, <a href="https://www.linkedin.com/in/jordanshawyoung/overlay/about-this-profile/"><u>Jordan Shaw-Young</u></a>, Chief of Staff for Security Services at <a href="https://www.linkedin.com/company/bluevoyant/"><u>BlueVoyant</u></a>, <a href="https://www.linkedin.com/in/gilbarak/overlay/about-this-profile/"><u>Gil Barak</u></a>, co-founder and CEO of <a href="https://www.linkedin.com/company/blink-ops/"><u>Blink Ops</u></a>, and <a href="https://www.linkedin.com/in/paul-st-vil-8a48884/overlay/about-this-profile/"><u>Paul St Vil</u></a>, VP of Field Engineering at <a href="https://www.linkedin.com/company/zenitysec/"><u>Zenity</u></a>.</p>
<p>You can also catch Kevin on our <a href="https://explore.thecyberwire.com/microsoft-for-startups"><u>Microsoft for Startups⁠</u></a> Spotlight, brought to you by N2K CyberWire and Microsoft, where we shine a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. Kevin and Dave talk with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur, then speak with three Microsoft for Startups members: Matthew Chiodi⁠ of ⁠Cerby⁠, ⁠Travis Howerton⁠ of ⁠RegScale⁠, and ⁠Karl Mattson⁠ of ⁠Endor Labs⁠. Whether you are building your own startup or just love a good innovation story, <a href="https://explore.thecyberwire.com/microsoft-for-startups"><u>listen and learn more here</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.washingtonpost.com/technology/2025/05/06/nso-pegasus-whatsapp-damages/"><u>Spyware-maker NSO ordered to pay $167 million for hacking WhatsApp</u></a> (The Washington Post)</p>
<p><a href="https://cybersecuritynews.com/hackers-attacking-ics-scada-systems/"><u>CISA Warns of Hackers Attacking ICS/SCADA Systems in Oil and Natural Gas Companies</u></a> (Cyber Security News)</p>
<p><a href="https://micahflee.com/despite-misleading-marketing-israeli-company-telemessage-used-by-trump-officials-can-access-plaintext-chat-logs/"><u>Despite misleading marketing, Israeli company TeleMessage, used by Trump officials, can access plaintext chat logs</u></a> (Micha Flee)</p>
<p><a href="https://therecord.media/nsa-to-cut-up-to-2000-roles-downsizing"><u>NSA to cut up to 2,000 civilian roles as part of intel community downsizing</u></a>' (The Record)</p>
<p><a href="https://www.cybersecuritydive.com/news/nist-cyber-retirements-quantum-ai-research-standards/747270/"><u>NIST loses key cyber experts in standards and research</u> (Cybersecurity Dive</a>)</p>
<p><a href="https://berthub.eu/articles/posts/a-coherent-non-us-cloud-strategy/"><u>A coherent European/non-US cloud strategy: building railroads for the cloud economy </u>(Bert Hubert</a>)</p>
<p><a href="https://therecord.media/masimo-medical-device-company-cyberattack"><u>Medical device giant Masimo says cyberattack is limiting ability to fill customer orders</u></a> (The Record)</p>
<p><a href="https://cybersecuritynews.com/new-chinese-smishing-kit-dubbed-panda-shop/"><u>New Chinese Smishing Kit Dubbed 'Panda Shop' Steal Google, Apple Pay &amp; Credit Card Details</u></a> (Cyber Security News)</p>
<p><a href="https://www.computing.co.uk/event/2025/accenture-what-we-learned-when-our-ceo-got-deepfaked"><u>Accenture: What we learned when our CEO got deepfaked</u></a> (Computing)</p>
<p><br><a href="https://gbhackers.com/it-worker-girlfriend-into-deutsche-banks-restricted-areas/"><u>IT Worker from Computacenter Let Girlfriend Into Deutsche Bank’s Restricted Areas</u></a> (GB Hackers)</p>
<p><strong>Share your feedback.</strong></p>
<p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener"><u>brief listener survey</u></a> as we continually work to improve the show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1660</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bf309f4c-1c7a-11f0-85e0-d79cad6e0490]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7509915722.mp3?updated=1746640013" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No hocus pocus—MagicINFO flaw is the real threat.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2302/notes</link>
      <description>A critical flaw in a Samsung’s CMS is being actively exploited. President Trump’s proposed 2026 budget aims to slash funding for CISA. “ClickFix” malware targets both Windows and Linux systems through advanced social engineering. CISA warns of a critical Langflow vulnerability actively exploited in the wild. A new supply-chain attack targets Linux servers using malicious Go modules found on GitHub. The Venom Spider threat group targets HR professionals with fake resume submissions. The Luna Moth group escalates phishing attacks on U.S. legal and financial institutions. The U.S. Treasury aims to cut off a Cambodia-based money laundering operation. Our guest is  Monzy Merza, Co-Founder and CEO of Crogl, discussing the CISO's conundrum in the face of AI. Malware, mouse ears, and mayhem: Disney hacker pleads guilty.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Monzy Merza, Co-Founder and CEO of Crogl, who is discussing the CISO's conundrum—the growing challenge of securing organizations in a world where AI rapidly expands both the number of users and potential adversaries.Selected Reading

Samsung MagicINFO Vulnerability Exploited Days After PoC Publication (SecurityWeek)

Trump would cut CISA budget by $491M amid ‘censorship’ claim  (The Register)

New ClickFix Attack Mimics Ministry of Defense Website to Attack Windows &amp; Linux Machines (Cyber Security News)

Critical Vulnerability in AI Builder Langflow Under Attack (SecurityWeek)

Linux wiper malware hidden in malicious Go modules on GitHub (Bleeping Computer)

Malware scammers target HR professionals with Venom Spider malware (SC Media)

Luna Moth extortion hackers pose as IT help desks to breach US firms (Bleeping Computer)

US Readies Huione Group Ban Over Cybercrime Links (GovInfo Security)

Hacker 'NullBulge' pleads guilty to stealing Disney's Slack data (Bleeping Computer)

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 May 2025 20:30:00 -0000</pubDate>
      <itunes:title>No hocus pocus—MagicINFO flaw is the real threat.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2302</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A critical flaw in a Samsung’s CMS is being actively exploited. President Trump’s proposed 2026 budget aims to slash funding for CISA. “ClickFix” malware targets both Windows and Linux systems through advanced social engineering. CISA warns of a critical Langflow vulnerability actively exploited in the wild. A new supply-chain attack targets Linux servers using malicious Go modules found on GitHub. The Venom Spider threat group targets HR professionals with fake resume submissions. The Luna Moth group escalates phishing attacks on U.S. legal and financial institutions. The U.S. Treasury aims to cut off a Cambodia-based money laundering operation. Our guest is  Monzy Merza, Co-Founder and CEO of Crogl, discussing the CISO's conundrum in the face of AI. Malware, mouse ears, and mayhem: Disney hacker pleads guilty.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Monzy Merza, Co-Founder and CEO of Crogl, who is discussing the CISO's conundrum—the growing challenge of securing organizations in a world where AI rapidly expands both the number of users and potential adversaries.Selected Reading

Samsung MagicINFO Vulnerability Exploited Days After PoC Publication (SecurityWeek)

Trump would cut CISA budget by $491M amid ‘censorship’ claim  (The Register)

New ClickFix Attack Mimics Ministry of Defense Website to Attack Windows &amp; Linux Machines (Cyber Security News)

Critical Vulnerability in AI Builder Langflow Under Attack (SecurityWeek)

Linux wiper malware hidden in malicious Go modules on GitHub (Bleeping Computer)

Malware scammers target HR professionals with Venom Spider malware (SC Media)

Luna Moth extortion hackers pose as IT help desks to breach US firms (Bleeping Computer)

US Readies Huione Group Ban Over Cybercrime Links (GovInfo Security)

Hacker 'NullBulge' pleads guilty to stealing Disney's Slack data (Bleeping Computer)

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A critical flaw in a Samsung’s CMS is being actively exploited. President Trump’s proposed 2026 budget aims to slash funding for CISA. “ClickFix” malware targets both Windows and Linux systems through advanced social engineering. CISA warns of a critical Langflow vulnerability actively exploited in the wild. A new supply-chain attack targets Linux servers using malicious Go modules found on GitHub. The Venom Spider threat group targets HR professionals with fake resume submissions. The Luna Moth group escalates phishing attacks on U.S. legal and financial institutions. The U.S. Treasury aims to cut off a Cambodia-based money laundering operation. Our guest is  Monzy Merza, Co-Founder and CEO of Crogl, discussing the CISO's conundrum in the face of AI. Malware, mouse ears, and mayhem: Disney hacker pleads guilty.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/monzymerza/"><u>Monzy Merza</u></a>, Co-Founder and CEO of <a href="https://www.linkedin.com/company/crogl/"><u>Crogl</u></a>, who is discussing the CISO's conundrum—the growing challenge of securing organizations in a world where AI rapidly expands both the number of users and potential adversaries.<br><strong>Selected Reading</strong></p>
<p><a href="https://www.securityweek.com/samsung-magicinfo-vulnerability-exploited-days-after-poc-publication/"><u>Samsung MagicINFO Vulnerability Exploited Days After PoC Publication</u> (SecurityWeek</a>)</p>
<p><a href="https://www.theregister.com/2025/05/06/cisa_budget_cuts/"><u>Trump would cut CISA budget by $491M amid ‘censorship’ claim </u> (The Register</a>)</p>
<p><a href="https://cybersecuritynews.com/new-clickfix-attack-mimics-ministry-of-defense-website/"><u>New ClickFix Attack Mimics Ministry of Defense Website to Attack Windows &amp; Linux Machines</u></a> (Cyber Security News)</p>
<p><a href="https://www.securityweek.com/critical-vulnerability-in-ai-builder-langflow-under-attack/"><u>Critical Vulnerability in AI Builder Langflow Under Attack</u></a> <a href="https://www.securityweek.com/samsung-magicinfo-vulnerability-exploited-days-after-poc-publication/">(SecurityWeek</a>)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/linux-wiper-malware-hidden-in-malicious-go-modules-on-github/"><u>Linux wiper malware hidden in malicious Go modules on GitHub</u></a> (Bleeping Computer)</p>
<p><a href="https://www.scworld.com/news/malware-scammers-target-hr-professionals-with-venom-spider-malware"><u>Malware scammers target HR professionals with Venom Spider malware</u> (SC Media</a>)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/luna-moth-extortion-hackers-pose-as-it-help-desks-to-breach-us-firms/"><u>Luna Moth extortion hackers pose as IT help desks to breach US firms</u></a> (Bleeping Computer)</p>
<p><a href="https://www.govinfosecurity.com/us-readies-huione-group-ban-over-cybercrime-links-a-28293"><u>US Readies Huione Group Ban Over Cybercrime Links</u></a> (GovInfo Security)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/hacker-nullbulge-pleads-guilty-to-stealing-disneys-slack-data/"><u>Hacker 'NullBulge' pleads guilty to stealing Disney's Slack data</u></a> (Bleeping Computer)</p>
<p><strong>Share your feedback.</strong></p>
<p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener"><u>brief listener survey</u></a> as we continually work to improve the show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1861</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bf0a3d20-1c7a-11f0-85e0-07d81280491d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3011464688.mp3?updated=1746562129" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hardcoded credentials and hard lessons.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2301/notes</link>
      <description>Researchers uncover serious vulnerabilities in the Signal fork reportedly used by top government officials. CISA adds a second Commvault flaw to its Known Exploited Vulnerabilities catalog. xAI exposed a private API key on GitHub for nearly two months. FortiGuard uncovers a cyber-espionage campaign targeting critical national infrastructure in the Middle East. Threat brokers advertise a new SS7 zero-day exploit on cybercrime forums. The StealC  info-stealer and malware loader gets an update. Passkeys blaze the trail to a passwordless future. On our Afternoon Cyber Tea segment with Ann Johnson, Ann speaks with Christina Morillo, Head of Information Security at the New York Giants. Cubism meets computing: the Z80 goes full Picasso. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.CyberWire GuestOn our Afternoon Cyber Tea segment with Ann Johnson, Ann speaks with Christina Morillo, Head of Information Security at New York Football Giants, as they discuss how she approaches cybersecurity with curiosity, business alignment, and strong collaboration across the NFL community.

Selected Reading

The Signal Clone the Trump Admin Uses Was Hacked (404 Media)

Critical Commvault Vulnerability in Attacker Crosshairs (SecurityWeek)

xAI Dev Leaked API Key on GitHub for Private SpaceX, Tesla &amp; Twitter/X (Cyber Security News)

FortiGuard Incident Response Team Detects Intrusion into Middle East Critical National Infrastructure (Fortinet)

Hackers Selling SS7 0-Day Vulnerability on Hacker Froums for $5000 (Cyber Security News)

StealC malware enhanced with stealth upgrades and data theft tools (Bleeping Computer)

Sick of 15-character passwords? Microsoft is going password-less, starting now. (Mashable)

Passkeys for Normal People (Troy Hunt)

Single-Board Z80 Computer Draws Inspiration From Picasso (Hackaday)

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 05 May 2025 20:10:00 -0000</pubDate>
      <itunes:title>Hardcoded credentials and hard lessons.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2301</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers uncover serious vulnerabilities in the Signal fork reportedly used by top government officials. CISA adds a second Commvault flaw to its Known Exploited Vulnerabilities catalog. xAI exposed a private API key on GitHub for nearly two months. FortiGuard uncovers a cyber-espionage campaign targeting critical national infrastructure in the Middle East. Threat brokers advertise a new SS7 zero-day exploit on cybercrime forums. The StealC  info-stealer and malware loader gets an update. Passkeys blaze the trail to a passwordless future. On our Afternoon Cyber Tea segment with Ann Johnson, Ann speaks with Christina Morillo, Head of Information Security at the New York Giants. Cubism meets computing: the Z80 goes full Picasso. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.CyberWire GuestOn our Afternoon Cyber Tea segment with Ann Johnson, Ann speaks with Christina Morillo, Head of Information Security at New York Football Giants, as they discuss how she approaches cybersecurity with curiosity, business alignment, and strong collaboration across the NFL community.

Selected Reading

The Signal Clone the Trump Admin Uses Was Hacked (404 Media)

Critical Commvault Vulnerability in Attacker Crosshairs (SecurityWeek)

xAI Dev Leaked API Key on GitHub for Private SpaceX, Tesla &amp; Twitter/X (Cyber Security News)

FortiGuard Incident Response Team Detects Intrusion into Middle East Critical National Infrastructure (Fortinet)

Hackers Selling SS7 0-Day Vulnerability on Hacker Froums for $5000 (Cyber Security News)

StealC malware enhanced with stealth upgrades and data theft tools (Bleeping Computer)

Sick of 15-character passwords? Microsoft is going password-less, starting now. (Mashable)

Passkeys for Normal People (Troy Hunt)

Single-Board Z80 Computer Draws Inspiration From Picasso (Hackaday)

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers uncover serious vulnerabilities in the Signal fork reportedly used by top government officials. CISA adds a second Commvault flaw to its Known Exploited Vulnerabilities catalog. xAI exposed a private API key on GitHub for nearly two months. FortiGuard uncovers a cyber-espionage campaign targeting critical national infrastructure in the Middle East. Threat brokers advertise a new SS7 zero-day exploit on cybercrime forums. The StealC  info-stealer and malware loader gets an update. Passkeys blaze the trail to a passwordless future. On our Afternoon Cyber Tea segment with Ann Johnson, Ann speaks with Christina Morillo, Head of Information Security at the New York Giants. Cubism meets computing: the Z80 goes full Picasso.<strong> </strong></p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.<br><strong>CyberWire Guest</strong>On our <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea"><u>Afternoon Cyber Tea</u></a> segment with Ann Johnson, Ann speaks with <a href="https://www.linkedin.com/in/christinamorillo/"><u>Christina Morillo</u></a>, Head of Information Security at <a href="https://www.giants.com/"><u>New York Football Giants</u></a>, as they discuss how she approaches cybersecurity with curiosity, business alignment, and strong collaboration across the NFL community.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.404media.co/the-signal-clone-the-trump-admin-uses-was-hacked/"><u>The Signal Clone the Trump Admin Uses Was Hacked</u></a> (404 Media)</p>
<p><a href="https://www.securityweek.com/critical-commvault-vulnerability-in-attacker-crosshairs/"><u>Critical Commvault Vulnerability in Attacker Crosshairs</u></a> (SecurityWeek)</p>
<p><a href="https://cybersecuritynews.com/api-key-on-github/"><u>xAI Dev Leaked API Key on GitHub for Private SpaceX, Tesla &amp; Twitter/X</u></a> (Cyber Security News)</p>
<p><a href="https://www.fortinet.com/blog/threat-research/fortiguard-incident-response-team-detects-intrusion-into-middle-east-critical-national-infrastructure"><u>FortiGuard Incident Response Team Detects Intrusion into Middle East Critical National Infrastructure</u></a> (Fortinet)</p>
<p><a href="https://cybersecuritynews.com/hackers-selling-ss7-0-day-vulnerability/"><u>Hackers Selling SS7 0-Day Vulnerability on Hacker Froums for $5000</u></a> (Cyber Security News)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/stealc-malware-enhanced-with-stealth-upgrades-and-data-theft-tools/"><u>StealC malware enhanced with stealth upgrades and data theft tools</u></a> (Bleeping Computer)</p>
<p><a href="https://mashable.com/article/microsoft-password-announcement-passwordless-sign-in"><u>Sick of 15-character passwords? Microsoft is going password-less, starting now.</u></a> (Mashable)</p>
<p><a href="https://www.troyhunt.com/passkeys-for-normal-people/"><u>Passkeys for Normal People</u></a> (Troy Hunt)</p>
<p><a href="https://hackaday.com/2025/05/01/single-board-z80-computer-draws-inspiration-from-picasso/"><u>Single-Board Z80 Computer Draws Inspiration From Picasso</u></a> (Hackaday)</p>
<p><strong>Share your feedback.</strong></p>
<p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener"><u>brief listener survey</u></a> as we continually work to improve the show. <br><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1426</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[064266a0-29e0-11f0-b06e-0f3f4de7bccf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8727489749.mp3?updated=1746470780" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Joe Bradley: A bit of a winding road. [Chief Scientist] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/66/notes</link>
      <description>Please enjoy this encore of Career Notes.

Chief Scientist at LivePerson Joe Bradley takes us down his circuitous career journey that led him back to math. Joe had many ambitions from opera singer to middle school teacher, spent some time at two national labs and went back to his first love of math and physics. He notes that many of the most mathematically intuitive people that he's met are people that also have a creative outlet and a lot of times it's music. Adding a business aspect to his technical work, Joe came to his current position. He recommends going deep into your preferred subject and hopes that it helps you to become something different because of all you put into the work. We thank Joe for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 04 May 2025 07:00:00 -0000</pubDate>
      <itunes:title>Joe Bradley: A bit of a winding road. [Chief Scientist] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>66</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a5f266a2-277c-11f0-8b38-0b8678f6e068/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes.

Chief Scientist at LivePerson Joe Bradley takes us down his circuitous career journey that led him back to math. Joe had many ambitions from opera singer to middle school teacher, spent some time at two national labs and went back to his first love of math and physics. He notes that many of the most mathematically intuitive people that he's met are people that also have a creative outlet and a lot of times it's music. Adding a business aspect to his technical work, Joe came to his current position. He recommends going deep into your preferred subject and hopes that it helps you to become something different because of all you put into the work. We thank Joe for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes.</p>
<p>Chief Scientist at LivePerson Joe Bradley takes us down his circuitous career journey that led him back to math. Joe had many ambitions from opera singer to middle school teacher, spent some time at two national labs and went back to his first love of math and physics. He notes that many of the most mathematically intuitive people that he's met are people that also have a creative outlet and a lot of times it's music. Adding a business aspect to his technical work, Joe came to his current position. He recommends going deep into your preferred subject and hopes that it helps you to become something different because of all you put into the work. We thank Joe for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>449</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a5f266a2-277c-11f0-8b38-0b8678f6e068]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3132994145.mp3?updated=1746208028" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When AI gets a to-do list. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/375/notes</link>
      <description>This week, we are joined by ⁠Shaked Reiner⁠, Security Principal Security Researcher at ⁠CyberArk⁠, who is discussing their research on"Agents Under Attack: Threat Modeling Agentic AI." Agentic AI empowers LLMs to take autonomous actions, like browsing the web or executing code, making them more useful—but also more dangerous. 

Threats like prompt injections and stolen API keys can turn agents into attack vectors. Shaked Reiner explains how treating agent outputs like untrusted code and applying traditional security principles can help keep them in check.

The research can be found here:


  ⁠Agents Under Attack: Threat Modeling Agentic AI


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 May 2025 07:00:00 -0000</pubDate>
      <itunes:title>When AI gets a to-do list. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>375</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/75dbfb68-277c-11f0-8d39-571f9cdb3b0c/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by ⁠Shaked Reiner⁠, Security Principal Security Researcher at ⁠CyberArk⁠, who is discussing their research on"Agents Under Attack: Threat Modeling Agentic AI." Agentic AI empowers LLMs to take autonomous actions, like browsing the web or executing code, making them more useful—but also more dangerous. 

Threats like prompt injections and stolen API keys can turn agents into attack vectors. Shaked Reiner explains how treating agent outputs like untrusted code and applying traditional security principles can help keep them in check.

The research can be found here:


  ⁠Agents Under Attack: Threat Modeling Agentic AI


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/shaked-reiner-454a06106/?originalSubdomain=il">⁠Shaked Reiner⁠</a>, Security Principal Security Researcher at <a href="https://www.linkedin.com/company/cyber-ark-software/">⁠CyberArk⁠</a>, who is discussing their research on"Agents Under Attack: Threat Modeling Agentic AI." Agentic AI empowers LLMs to take autonomous actions, like browsing the web or executing code, making them more useful—but also more dangerous. </p>
<p>Threats like prompt injections and stolen API keys can turn agents into attack vectors. Shaked Reiner explains how treating agent outputs like untrusted code and applying traditional security principles can help keep them in check.</p>
<p><strong>The research can be found here:</strong></p>
<ul>
  <li><a href="https://www.cyberark.com/resources/threat-research-blog/agents-under-attack-threat-modeling-agentic-ai">⁠Agents Under Attack: Threat Modeling Agentic AI</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1282</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[75dbfb68-277c-11f0-8d39-571f9cdb3b0c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7249631396.mp3?updated=1746204088" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Wired, but not fired.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2300/notes</link>
      <description>RSAC 2025 comes to an end. Canadian power company hit by cyberattack. Ascension Health discloses another breach. UK luxury department store Harrods discloses attempted cyberattack. Microsoft fixes bug flagging Gmail as spam. An unofficial version of the Signal app shared in photo. EU fines TikTok for violating GDPR with China data transfer. US Treasury to cut off Southeast Asian cybercrime key player. Passwordless by default coming your way. Our guest is Kevin Magee, from Microsoft, sharing a medley of interviews he gathered on the show floor of RSAC 2025.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Kevin on the Street

Joining us this week from RSAC 2025, we have our partner Kevin Magee, Global Director of Cybersecurity Startups at Microsoft for Startups. Kevin closes out RSAC 2025 with a high-energy medley of interviews straight from the show floor, packed with sharp insights and bold ideas from some of cybersecurity’s standout voices. It’s a dynamic and fast-paced finale to our RSAC coverage—and you can find links to all of the guests featured in the show notes.

In this segment, you’ll hear from Christopher Simm, CTO at Bulletproof; Dr. Chase Cunningham (aka Dr. Zero Trust), Chief Strategy Officer at Ericom Software; Helen Patton, cybersecurity advisor at Cisco; Jeremy Vaughan, CEO and co-founder of Start Left Security; and Tzvika Shneider, CEO of Pynt.

You can also catch Kevin on our Microsoft for Startups⁠ Spotlight, brought to you by N2K CyberWire and Microsoft, where we shine a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. Kevin and Dave talk with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur, then speak with three Microsoft for Startups members: Matthew Chiodi⁠ of ⁠Cerby⁠, ⁠Travis Howerton⁠ of ⁠RegScale⁠, and ⁠Karl Mattson⁠ of ⁠Endor Labs⁠. Whether you are building your own startup or just love a good innovation story, listen and learn more here.

Selected Reading

Day 4 Recap: Closing Celebration with Alicia Keys, RSAC College Day, and What's Ahead for 2025 (RSAC Conference) 

Canadian Electric Utility Hit by Cyberattack (SecurityWeek)

Ascension discloses second major cyber attack in a year (The Register)

Harrods latest retailer to be hit by cyber attack (BBC)

Microsoft fixes Exchange Online bug flagging Gmail emails as spam (Bleeping Computer) 

Mike Waltz Accidentally Reveals Obscure App the Government Is Using to Archive Signal Messages (404 Media)

TikTok hit with 530 million euro privacy fine in investigation into China data transfer (AP News)

Ukrainian extradited to US for alleged Nefilim ransomware attack spree (CyberScoop)

US wants to cut off key player in Southeast Asian cybercrime industry (The Record) 

Microsoft makes all new accounts passwordless by default (Bleeping Computer) 

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 02 May 2025 20:10:00 -0000</pubDate>
      <itunes:title>Wired, but not fired.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2300</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>RSAC 2025 comes to an end. Canadian power company hit by cyberattack. Ascension Health discloses another breach. UK luxury department store Harrods discloses attempted cyberattack. Microsoft fixes bug flagging Gmail as spam. An unofficial version of the Signal app shared in photo. EU fines TikTok for violating GDPR with China data transfer. US Treasury to cut off Southeast Asian cybercrime key player. Passwordless by default coming your way. Our guest is Kevin Magee, from Microsoft, sharing a medley of interviews he gathered on the show floor of RSAC 2025.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Kevin on the Street

Joining us this week from RSAC 2025, we have our partner Kevin Magee, Global Director of Cybersecurity Startups at Microsoft for Startups. Kevin closes out RSAC 2025 with a high-energy medley of interviews straight from the show floor, packed with sharp insights and bold ideas from some of cybersecurity’s standout voices. It’s a dynamic and fast-paced finale to our RSAC coverage—and you can find links to all of the guests featured in the show notes.

In this segment, you’ll hear from Christopher Simm, CTO at Bulletproof; Dr. Chase Cunningham (aka Dr. Zero Trust), Chief Strategy Officer at Ericom Software; Helen Patton, cybersecurity advisor at Cisco; Jeremy Vaughan, CEO and co-founder of Start Left Security; and Tzvika Shneider, CEO of Pynt.

You can also catch Kevin on our Microsoft for Startups⁠ Spotlight, brought to you by N2K CyberWire and Microsoft, where we shine a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. Kevin and Dave talk with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur, then speak with three Microsoft for Startups members: Matthew Chiodi⁠ of ⁠Cerby⁠, ⁠Travis Howerton⁠ of ⁠RegScale⁠, and ⁠Karl Mattson⁠ of ⁠Endor Labs⁠. Whether you are building your own startup or just love a good innovation story, listen and learn more here.

Selected Reading

Day 4 Recap: Closing Celebration with Alicia Keys, RSAC College Day, and What's Ahead for 2025 (RSAC Conference) 

Canadian Electric Utility Hit by Cyberattack (SecurityWeek)

Ascension discloses second major cyber attack in a year (The Register)

Harrods latest retailer to be hit by cyber attack (BBC)

Microsoft fixes Exchange Online bug flagging Gmail emails as spam (Bleeping Computer) 

Mike Waltz Accidentally Reveals Obscure App the Government Is Using to Archive Signal Messages (404 Media)

TikTok hit with 530 million euro privacy fine in investigation into China data transfer (AP News)

Ukrainian extradited to US for alleged Nefilim ransomware attack spree (CyberScoop)

US wants to cut off key player in Southeast Asian cybercrime industry (The Record) 

Microsoft makes all new accounts passwordless by default (Bleeping Computer) 

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>RSAC 2025 comes to an end. Canadian power company hit by cyberattack. Ascension Health discloses another breach. UK luxury department store Harrods discloses attempted cyberattack. Microsoft fixes bug flagging Gmail as spam. An unofficial version of the Signal app shared in photo. EU fines TikTok for violating GDPR with China data transfer. US Treasury to cut off Southeast Asian cybercrime key player. Passwordless by default coming your way. Our guest is Kevin Magee, from Microsoft, sharing a medley of interviews he gathered on the show floor of RSAC 2025.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Kevin on the Street</strong></p>
<p>Joining us this week from RSAC 2025, we have our partner <a href="https://www.linkedin.com/in/kmagee/"><u>Kevin Magee</u></a>, Global Director of Cybersecurity Startups at <a href="https://www.microsoft.com/en-us/startups?wt.mc_id=cyberwireepisode_landingpage_organicsocial_mfsmktg"><u>Microsoft for Startups</u></a>. Kevin closes out RSAC 2025 with a high-energy medley of interviews straight from the show floor, packed with sharp insights and bold ideas from some of cybersecurity’s standout voices. It’s a dynamic and fast-paced finale to our RSAC coverage—and you can find links to all of the guests featured in the show notes.</p>
<p>In this segment, you’ll hear from <a href="https://www.linkedin.com/in/csimm/?original_referer=https%3A%2F%2Fwww%2Egoogle%2Ecom%2F&amp;originalSubdomain=ca"><u>Christopher Simm</u></a>, CTO at <a href="https://www.linkedin.com/company/bulletproof-a-gli-company/"><u>Bulletproof</u></a>; <a href="https://www.linkedin.com/in/dr-chase-cunningham/"><u>Dr. Chase Cunningham</u></a> (aka Dr. Zero Trust), Chief Strategy Officer at <a href="https://www.ericom.com/"><u>Ericom Software</u></a>; <a href="https://www.linkedin.com/in/helenpatton/"><u>Helen Patton</u></a>, cybersecurity advisor at <a href="https://www.linkedin.com/company/cisco/"><u>Cisco</u></a>; <a href="https://www.linkedin.com/in/jeremyjvaughan/"><u>Jeremy Vaughan</u></a>, CEO and co-founder of <a href="https://www.linkedin.com/company/start-left/"><u>Start Left Security</u></a>; and <a href="https://www.linkedin.com/in/tzvika-shneider/?original_referer=https%3A%2F%2Fwww%2Egoogle%2Ecom%2F&amp;originalSubdomain=il"><u>Tzvika Shneider</u></a>, CEO of <a href="https://www.linkedin.com/company/pynt/"><u>Pynt</u></a>.</p>
<p>You can also catch Kevin on our <a href="https://explore.thecyberwire.com/microsoft-for-startups"><u>Microsoft for Startups⁠</u></a> Spotlight, brought to you by N2K CyberWire and Microsoft, where we shine a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. Kevin and Dave talk with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur, then speak with three Microsoft for Startups members: Matthew Chiodi⁠ of ⁠Cerby⁠, ⁠Travis Howerton⁠ of ⁠RegScale⁠, and ⁠Karl Mattson⁠ of ⁠Endor Labs⁠. Whether you are building your own startup or just love a good innovation story, <a href="https://explore.thecyberwire.com/microsoft-for-startups"><u>listen and learn more here</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.rsaconference.com/library/blog/day-4-recap-2025"><u>Day 4 Recap: Closing Celebration with Alicia Keys, RSAC College Day, and What's Ahead for 2025</u></a> (RSAC Conference) </p>
<p><a href="https://www.securityweek.com/canadian-electric-utility-hit-by-cyberattack/"><u>Canadian Electric Utility Hit by Cyberattack</u></a> (SecurityWeek)</p>
<p><a href="https://www.theregister.com/2025/05/01/ascension_cyberattack/"><u>Ascension discloses second major cyber attack in a year</u></a> (The Register)</p>
<p><a href="https://www.bbc.com/news/articles/c62x4zxe418o"><u>Harrods latest retailer to be hit by cyber attack</u></a> (BBC)</p>
<p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-exchange-online-bug-flagging-gmail-emails-as-spam/"><u>Microsoft fixes Exchange Online bug flagging Gmail emails as spam</u></a> (Bleeping Computer) </p>
<p><a href="https://www.404media.co/mike-waltz-accidentally-reveals-obscure-app-the-government-is-using-to-archive-signal-messages/"><u>Mike Waltz Accidentally Reveals Obscure App the Government Is Using to Archive Signal Messages</u></a> (404 Media)</p>
<p><a href="https://apnews.com/article/tiktok-ireland-european-union-data-privacy-regulation-d386ec74becc716905d7f686d6a448e2"><u>TikTok hit with 530 million euro privacy fine in investigation into China data transfer</u></a> (AP News)</p>
<p><a href="https://cyberscoop.com/nefilim-ransomware-artem-stryzhak-extradited/"><u>Ukrainian extradited to US for alleged Nefilim ransomware attack spree</u></a> (CyberScoop)</p>
<p><a href="https://therecord.media/us-fincen-cut-off-huione-group-southeast-asia-cyber-scam"><u>US wants to cut off key player in Southeast Asian cybercrime industry</u></a> (The Record) </p>
<p><br><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-makes-all-new-accounts-passwordless-by-default/"><u>Microsoft makes all new accounts passwordless by default</u></a> (Bleeping Computer) </p>
<p><strong>Share your feedback.</strong></p>
<p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener"><u>brief listener survey</u></a> as we continually work to improve the show.</p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1786</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bedef0ac-1c7a-11f0-85e0-93beab6def5f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9530498642.mp3?updated=1746210671" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI on the offensive.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2299/notes</link>
      <description>Updates from RSAC 2025. Former NSA cyber chief Rob Joyce warns that AI is rapidly approaching the ability to develop high-level software exploits. An FBI official warns that China is the top threat to U.S. critical infrastructure. Mandiant and Google raise alarms over widespread infiltration of global companies by North Korean IT workers. France accuses Russia’s Fancy Bear of targeting at least a dozen French government and institutional entities. SonicWall has issued an urgent alert about active exploitation of a high-severity vulnerability in its Secure Mobile Access appliances. A China-linked APT group known as “TheWizards” is abusing an IPv6 networking feature. Gremlin Stealer emerges as a serious threat. A 23-year-old Scottish man linked to the Scattered Spider hacking group has been extradited from Spain to the U.S. Senators urge FTC action on consumer neural data. New WordPress malware masquerades as an anti-malware plugin. Our guest is Andy Cao from ProjectDiscovery, the Winner of the 20th Annual RSAC™ Innovation Sandbox Contest. Our intern Kevin returns with some Kevin on the Street interviews from the RSAC floor.  Research reveals the risk of juice jacking isn’t entirely imaginary. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest is Andy Cao from ProjectDiscovery, who is the Winner of the 20th Annual RSAC™ Innovation Sandbox Contest 2025 event. Kevin on the Street

Joining us this week from RSAC 2025, we have our partner Kevin Magee, Global Director of Cybersecurity Startups at Microsoft for Startups. Stay tuned to the CyberWire Daily podcast for “Kevin on the Street” updates on all things RSAC 2025 from Kevin all week. Today Kevin is joined by Shane Harding CEO of Devicie and Nathan Ostrowski Co-Founder Petrą Security. 

You can also catch Kevin on our Microsoft for Startups⁠ Spotlight, brought to you by N2K CyberWire and Microsoft, where we shine a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. Kevin and Dave talk with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur, then speak with three Microsoft for Startups members: Matthew Chiodi⁠ of ⁠Cerby⁠, ⁠Travis Howerton⁠ of ⁠RegScale⁠, and ⁠Karl Mattson⁠ of ⁠Endor Labs⁠. Whether you are building your own startup or just love a good innovation story, listen and learn more here.

Selected Reading

Ex-NSA cyber boss: AI will soon be a great exploit dev (The Register) 

AI makes China leading threat to US critical infrastructure, says FBI official (SC World)

North Korean operatives have infiltrated hundreds of Fortune 500 companies (CyberScoop)

France Blames Russia for Cyberattacks on Dozen Entities (SecurityWeek)

SonicWall OS Command Injection Vulnerability Exploited in the Wild (Cyber Security News)

Hackers abuse IPv6 networking feature to hijack software updates (Bleeping Computer) 

New Gremlin Stealer Advertised on Hacker Forums Targets Credit Card Data and Login Credentials (GB Hackers)

Alleged ‘Scattered Spider’ Member Extradited to U.S. (Krebs on Security)

Senators Urge FTC Action on Consumer Neural Data, Signaling Heightened Scrutiny (Cooley)

New WordPress Malware as Anti-Malware Plugin Take Full Control of Website (Cyber Security News) 

iOS and Android juice jacking defenses have been trivial to bypass for years (Ars Technica)Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 01 May 2025 20:10:00 -0000</pubDate>
      <itunes:title>AI on the offensive.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2299</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Updates from RSAC 2025. Former NSA cyber chief Rob Joyce warns that AI is rapidly approaching the ability to develop high-level software exploits. An FBI official warns that China is the top threat to U.S. critical infrastructure. Mandiant and Google raise alarms over widespread infiltration of global companies by North Korean IT workers. France accuses Russia’s Fancy Bear of targeting at least a dozen French government and institutional entities. SonicWall has issued an urgent alert about active exploitation of a high-severity vulnerability in its Secure Mobile Access appliances. A China-linked APT group known as “TheWizards” is abusing an IPv6 networking feature. Gremlin Stealer emerges as a serious threat. A 23-year-old Scottish man linked to the Scattered Spider hacking group has been extradited from Spain to the U.S. Senators urge FTC action on consumer neural data. New WordPress malware masquerades as an anti-malware plugin. Our guest is Andy Cao from ProjectDiscovery, the Winner of the 20th Annual RSAC™ Innovation Sandbox Contest. Our intern Kevin returns with some Kevin on the Street interviews from the RSAC floor.  Research reveals the risk of juice jacking isn’t entirely imaginary. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

Our guest is Andy Cao from ProjectDiscovery, who is the Winner of the 20th Annual RSAC™ Innovation Sandbox Contest 2025 event. Kevin on the Street

Joining us this week from RSAC 2025, we have our partner Kevin Magee, Global Director of Cybersecurity Startups at Microsoft for Startups. Stay tuned to the CyberWire Daily podcast for “Kevin on the Street” updates on all things RSAC 2025 from Kevin all week. Today Kevin is joined by Shane Harding CEO of Devicie and Nathan Ostrowski Co-Founder Petrą Security. 

You can also catch Kevin on our Microsoft for Startups⁠ Spotlight, brought to you by N2K CyberWire and Microsoft, where we shine a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. Kevin and Dave talk with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur, then speak with three Microsoft for Startups members: Matthew Chiodi⁠ of ⁠Cerby⁠, ⁠Travis Howerton⁠ of ⁠RegScale⁠, and ⁠Karl Mattson⁠ of ⁠Endor Labs⁠. Whether you are building your own startup or just love a good innovation story, listen and learn more here.

Selected Reading

Ex-NSA cyber boss: AI will soon be a great exploit dev (The Register) 

AI makes China leading threat to US critical infrastructure, says FBI official (SC World)

North Korean operatives have infiltrated hundreds of Fortune 500 companies (CyberScoop)

France Blames Russia for Cyberattacks on Dozen Entities (SecurityWeek)

SonicWall OS Command Injection Vulnerability Exploited in the Wild (Cyber Security News)

Hackers abuse IPv6 networking feature to hijack software updates (Bleeping Computer) 

New Gremlin Stealer Advertised on Hacker Forums Targets Credit Card Data and Login Credentials (GB Hackers)

Alleged ‘Scattered Spider’ Member Extradited to U.S. (Krebs on Security)

Senators Urge FTC Action on Consumer Neural Data, Signaling Heightened Scrutiny (Cooley)

New WordPress Malware as Anti-Malware Plugin Take Full Control of Website (Cyber Security News) 

iOS and Android juice jacking defenses have been trivial to bypass for years (Ars Technica)Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Updates from RSAC 2025. Former NSA cyber chief Rob Joyce warns that AI is rapidly approaching the ability to develop high-level software exploits. An FBI official warns that China is the top threat to U.S. critical infrastructure. Mandiant and Google raise alarms over widespread infiltration of global companies by North Korean IT workers. France accuses Russia’s Fancy Bear of targeting at least a dozen French government and institutional entities. SonicWall has issued an urgent alert about active exploitation of a high-severity vulnerability in its Secure Mobile Access appliances. A China-linked APT group known as “TheWizards” is abusing an IPv6 networking feature. Gremlin Stealer emerges as a serious threat. A 23-year-old Scottish man linked to the Scattered Spider hacking group has been extradited from Spain to the U.S. Senators urge FTC action on consumer neural data. New WordPress malware masquerades as an anti-malware plugin. Our guest is Andy Cao from ProjectDiscovery, the Winner of the 20th Annual RSAC™ Innovation Sandbox Contest. Our intern Kevin returns with some Kevin on the Street interviews from the RSAC floor.  Research reveals the risk of juice jacking isn’t entirely imaginary. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>Our guest is<em> </em><a href="https://www.linkedin.com/in/andymcao/"><u>Andy Cao</u></a> from <a href="https://www.linkedin.com/company/projectdiscovery/"><u>ProjectDiscovery</u></a>, who is the Winner of the 20th Annual RSAC™ <a href="https://www.rsaconference.com/usa/programs/innovation-sandbox"><u>Innovation Sandbox Contest</u></a> 2025 event. <br><strong>Kevin on the Street</strong></p>
<p>Joining us this week from RSAC 2025, we have our partner <a href="https://www.linkedin.com/in/kmagee/"><u>Kevin Magee</u></a>, Global Director of Cybersecurity Startups at <a href="https://www.microsoft.com/en-us/startups?wt.mc_id=cyberwireepisode_landingpage_organicsocial_mfsmktg"><u>Microsoft for Startups</u></a>. Stay tuned to the CyberWire Daily podcast for “Kevin on the Street” updates on all things RSAC 2025 from Kevin all week. Today Kevin is joined by Shane Harding CEO of Devicie and Nathan Ostrowski Co-Founder Petrą Security. </p>
<p>You can also catch Kevin on our <a href="https://explore.thecyberwire.com/microsoft-for-startups"><u>Microsoft for Startups⁠</u></a> Spotlight, brought to you by N2K CyberWire and Microsoft, where we shine a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. Kevin and Dave talk with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur, then speak with three Microsoft for Startups members: Matthew Chiodi⁠ of ⁠Cerby⁠, ⁠Travis Howerton⁠ of ⁠RegScale⁠, and ⁠Karl Mattson⁠ of ⁠Endor Labs⁠. Whether you are building your own startup or just love a good innovation story, <a href="https://explore.thecyberwire.com/microsoft-for-startups"><u>listen and learn more here</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.theregister.com/2025/04/30/exnsa_cyber_boss_ai_expoit_dev/"><u>Ex-NSA cyber boss: AI will soon be a great exploit dev</u></a> (The Register) </p>
<p><a href="https://www.scworld.com/brief/ai-makes-china-leading-threat-to-us-critical-infrastructure-says-fbi-official"><u>AI makes China leading threat to US critical infrastructure, says FBI official</u></a> (SC World)</p>
<p><a href="https://cyberscoop.com/north-korea-workers-infiltrate-fortune-500/"><u>North Korean operatives have infiltrated hundreds of Fortune 500 companies</u></a> (CyberScoop)</p>
<p><a href="https://www.securityweek.com/france-blames-russia-for-cyberattacks-on-dozen-entities/"><u>France Blames Russia for Cyberattacks on Dozen Entities</u></a> (SecurityWeek)</p>
<p><a href="https://cybersecuritynews.com/sonicwall-os-command-injection-vulnerability/"><u>SonicWall OS Command Injection Vulnerability Exploited in the Wild</u></a> (Cyber Security News)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/hackers-abuse-ipv6-networking-feature-to-hijack-software-updates/"><u>Hackers abuse IPv6 networking feature to hijack software updates</u></a> (Bleeping Computer) </p>
<p><a href="https://gbhackers.com/new-gremlin-stealer-advertised-on-hacker-forums/"><u>New Gremlin Stealer Advertised on Hacker Forums Targets Credit Card Data and Login Credentials</u></a> (GB Hackers)</p>
<p><a href="https://krebsonsecurity.com/2025/04/alleged-scattered-spider-member-extradited-to-u-s/"><u>Alleged ‘Scattered Spider’ Member Extradited to U.S.</u></a> (Krebs on Security)</p>
<p><a href="https://www.cooley.com/news/insight/2025/2025-04-30-senators-urge-ftc-action-on-consumer-neural-data-signaling-heightened-scrutiny"><u>Senators Urge FTC Action on Consumer Neural Data, Signaling Heightened Scrutiny</u></a> (Cooley)</p>
<p><a href="https://cybersecuritynews.com/new-wordpress-malware-as-anti-malware-plugin/"><u>New WordPress Malware as Anti-Malware Plugin Take Full Control of Website</u></a> (Cyber Security News) </p>
<p><a href="https://arstechnica.com/security/2025/04/ios-and-android-juice-jacking-defenses-have-been-trivial-to-bypass-for-years/"><u>iOS and Android juice jacking defenses have been trivial to bypass for years</u></a> (Ars Technica)<br><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1628</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[be8be7a4-1c7a-11f0-85e0-d77b22ee3693]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3403242615.mp3?updated=1746126347" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Less CISA, more private sector power?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2298/notes</link>
      <description>DHS Secretary Kristi Noem justifies budget cuts in her RSAC keynote. The EFF pens an open letter to Trump backing Chris Krebs. Scattered Spider is credited with the Marks &amp; Spencer cyberattack. Researchers discover a critical flaw in Apple’s AirPlay protocol. The latest CISA advisories. On our Industry Voices segment, we are joined by Neil Gad, Chief Product and Technology Officer at RealVNC, who is discussing a security-first approach in remote access software development. What do you call an AI chatbot that finished at the bottom of its class in med school?

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Neil Gad, Chief Product and Technology Officer at RealVNC, who is discussing a security-first approach in remote access software development.

Kevin on the Street

Joining us this week from RSAC 2025, we have our partner Kevin Magee, Global Director of Cybersecurity Startups at Microsoft for Startups. Stay tuned to the CyberWire Daily podcast for “Kevin on the Street” updates on all things RSAC 2025 from Kevin all week. Today Kevin is joined by Ryan Lasmaili Co-Founder and CEO of Vaultree and Stan Golubchik CEO and co-founder of Contraforce, here are their conversations.

You can also catch Kevin on our Microsoft for Startups⁠ Spotlight, brought to you by N2K CyberWire and Microsoft, where we shine a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. Kevin and Dave talk with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur, then speak with three Microsoft for Startups members: Matthew Chiodi⁠ of ⁠Cerby⁠, ⁠Travis Howerton⁠ of ⁠RegScale⁠, and ⁠Karl Mattson⁠ of ⁠Endor Labs⁠. Whether you are building your own startup or just love a good innovation story, https://explore.thecyberwire.com/microsoft-for-startups.

Selected Reading

DHS Secretary Noem: CISA needs to get back to ‘core mission’ (CyberScoop)

Noem calls for reauthorization of cyberthreat information sharing law during RSA keynote (The Record)

Cyber experts, Democrats urge Trump administration not to break up cyber coordination in State reorg (CyberScoop)

Infosec pros rally against Trump's attack on Chris Krebs (The Register)

Scattered Spider Suspected in Major M&amp;S Cyberattack (Hackread)

AirPlay Zero-Click RCE Vulnerability Enables Remote Device Takeover via Wi-Fi (Cyber Security News)

CISA Adds One Known Exploited Vulnerability to Catalog (CISA)

CISA Releases Three Industrial Control Systems Advisories (CISA)

Instagram's AI Chatbots Lie About Being Licensed Therapists  (404 Media)

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 30 Apr 2025 20:10:00 -0000</pubDate>
      <itunes:title>Less CISA, more private sector power?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2298</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>DHS Secretary Kristi Noem justifies budget cuts in her RSAC keynote. The EFF pens an open letter to Trump backing Chris Krebs. Scattered Spider is credited with the Marks &amp; Spencer cyberattack. Researchers discover a critical flaw in Apple’s AirPlay protocol. The latest CISA advisories. On our Industry Voices segment, we are joined by Neil Gad, Chief Product and Technology Officer at RealVNC, who is discussing a security-first approach in remote access software development. What do you call an AI chatbot that finished at the bottom of its class in med school?

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest

On our Industry Voices segment, we are joined by Neil Gad, Chief Product and Technology Officer at RealVNC, who is discussing a security-first approach in remote access software development.

Kevin on the Street

Joining us this week from RSAC 2025, we have our partner Kevin Magee, Global Director of Cybersecurity Startups at Microsoft for Startups. Stay tuned to the CyberWire Daily podcast for “Kevin on the Street” updates on all things RSAC 2025 from Kevin all week. Today Kevin is joined by Ryan Lasmaili Co-Founder and CEO of Vaultree and Stan Golubchik CEO and co-founder of Contraforce, here are their conversations.

You can also catch Kevin on our Microsoft for Startups⁠ Spotlight, brought to you by N2K CyberWire and Microsoft, where we shine a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. Kevin and Dave talk with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur, then speak with three Microsoft for Startups members: Matthew Chiodi⁠ of ⁠Cerby⁠, ⁠Travis Howerton⁠ of ⁠RegScale⁠, and ⁠Karl Mattson⁠ of ⁠Endor Labs⁠. Whether you are building your own startup or just love a good innovation story, https://explore.thecyberwire.com/microsoft-for-startups.

Selected Reading

DHS Secretary Noem: CISA needs to get back to ‘core mission’ (CyberScoop)

Noem calls for reauthorization of cyberthreat information sharing law during RSA keynote (The Record)

Cyber experts, Democrats urge Trump administration not to break up cyber coordination in State reorg (CyberScoop)

Infosec pros rally against Trump's attack on Chris Krebs (The Register)

Scattered Spider Suspected in Major M&amp;S Cyberattack (Hackread)

AirPlay Zero-Click RCE Vulnerability Enables Remote Device Takeover via Wi-Fi (Cyber Security News)

CISA Adds One Known Exploited Vulnerability to Catalog (CISA)

CISA Releases Three Industrial Control Systems Advisories (CISA)

Instagram's AI Chatbots Lie About Being Licensed Therapists  (404 Media)

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>DHS Secretary Kristi Noem justifies budget cuts in her RSAC keynote. The EFF pens an open letter to Trump backing Chris Krebs. Scattered Spider is credited with the Marks &amp; Spencer cyberattack. Researchers discover a critical flaw in Apple’s AirPlay protocol. The latest CISA advisories. On our Industry Voices segment, we are joined by Neil Gad, Chief Product and Technology Officer at RealVNC, who is discussing a security-first approach in remote access software development. What do you call an AI chatbot that finished at the bottom of its class in med school?</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>CyberWire Guest</strong></p>
<p>On our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/neilgad/"><u>Neil Gad</u></a>, Chief Product and Technology Officer at <a href="https://www.realvnc.com/en/connect/security/?lai_vid=8rQWgRR2nTQP1&amp;lai_sr=20-24&amp;lai_sl=l"><u>RealVNC</u></a>, who is discussing a security-first approach in remote access software development.</p>
<p><strong>Kevin on the Street</strong></p>
<p>Joining us this week from RSAC 2025, we have our partner <a href="https://www.linkedin.com/in/kmagee/"><u>Kevin Magee</u></a>, Global Director of Cybersecurity Startups at <a href="https://www.microsoft.com/en-us/startups?wt.mc_id=cyberwireepisode_landingpage_organicsocial_mfsmktg"><u>Microsoft for Startups</u></a>. Stay tuned to the CyberWire Daily podcast for “Kevin on the Street” updates on all things RSAC 2025 from Kevin all week. Today Kevin is joined by Ryan Lasmaili Co-Founder and CEO of Vaultree and Stan Golubchik CEO and co-founder of Contraforce, here are their conversations.</p>
<p>You can also catch Kevin on our <a href="https://explore.thecyberwire.com/microsoft-for-startups"><u>Microsoft for Startups⁠</u></a> Spotlight, brought to you by N2K CyberWire and Microsoft, where we shine a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. Kevin and Dave talk with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur, then speak with three Microsoft for Startups members: Matthew Chiodi⁠ of ⁠Cerby⁠, ⁠Travis Howerton⁠ of ⁠RegScale⁠, and ⁠Karl Mattson⁠ of ⁠Endor Labs⁠. Whether you are building your own startup or just love a good innovation story, <a href="https://explore.thecyberwire.com/microsoft-for-startups"><u>https://explore.thecyberwire.com/microsoft-for-startups</u></a>.</p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://cyberscoop.com/kristi-noem-rsac-2025-cisa-mission/"><u>DHS Secretary Noem: CISA needs to get back to ‘core mission’</u></a> (CyberScoop)</p>
<p><a href="https://therecord.media/kristi-noem-rsa-keynote-info-sharing-law"><u>Noem calls for reauthorization of cyberthreat information sharing law during RSA keynote</u></a> (The Record)</p>
<p><a href="https://cyberscoop.com/state-department-reorg-cyber-diplomacy-cyberspace-digital-policy/"><u>Cyber experts, Democrats urge Trump administration not to break up cyber coordination in State reorg</u></a> (CyberScoop)</p>
<p><a href="https://www.theregister.com/2025/04/29/infosec_trump_krebs_letter/"><u>Infosec pros rally against Trump's attack on Chris Krebs</u></a> (The Register)</p>
<p><a href="https://hackread.com/scattered-spider-suspected-in-major-ms-cyberattack/"><u>Scattered Spider Suspected in Major M&amp;S Cyberattack</u></a> (Hackread)</p>
<p><a href="https://cybersecuritynews.com/airplay-zero-click-rce-vulnerability/"><u>AirPlay Zero-Click RCE Vulnerability Enables Remote Device Takeover via Wi-Fi</u></a> (Cyber Security News)</p>
<p><a href="https://www.cisa.gov/news-events/alerts/2025/04/29/cisa-adds-one-known-exploited-vulnerability-catalog"><u>CISA Adds One Known Exploited Vulnerability to Catalog</u></a> (CISA)</p>
<p><a href="https://www.cisa.gov/news-events/alerts/2025/04/29/cisa-releases-three-industrial-control-systems-advisories"><u>CISA Releases Three Industrial Control Systems Advisories</u></a> (CISA)</p>
<p><a href="https://www.404media.co/instagram-ai-studio-therapy-chatbots-lie-about-being-licensed-therapists/"><u>Instagram's AI Chatbots Lie About Being Licensed Therapists</u></a>  (404 Media)</p>
<p><strong>Share your feedback.</strong></p>
<p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener"><u>brief listener survey</u></a> as we continually work to improve the show. </p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1806</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[be623f26-1c7a-11f0-85e0-139602784b29]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7015762498.mp3?updated=1746041281" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trends shaping the future at RSAC.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2297/notes</link>
      <description>RSAC 2025 is well under way, and Kevin the Intern files his first report. Authorities say Spain and Portugal’s massive power outage was not a cyberattack. Concerns are raised over DOGE access to classified nuclear networks. The FS-ISAC launches the Cyberfraud Prevention Framework. Real-time deepfake fraud is here to stay. On today’s Threat Vector, host David Moulton speaks with Daniel B. Rosenzweig, a leading data privacy and AI attorney, about the growing complexity of privacy compliance in the era of big data and artificial intelligence. Protecting your company…with a fat joke. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector 

In this segment of Threat Vector, host David Moulton speaks with Daniel B. Rosenzweig, a leading data privacy and AI attorney, about the growing complexity of privacy compliance in the era of big data and artificial intelligence. Dan explains how businesses can build trust by aligning technical operations with legal obligations—what he calls “say what you do, do what you say.” They explore U.S. state privacy laws, global data transfer regulations, AI compliance, and the role of privacy-enhancing technologies. You can hear David and Daniel's full discussion on Threat Vector here and catch new episodes every Thursday on your favorite podcast app. 

Kevin on the Street

Joining us this week from RSAC 2025, we have our partner Kevin Magee, Global Director of Cybersecurity Startups at Microsoft for Startups. Stay tuned to the CyberWire Daily podcast for “Kevin on the Street” updates on all things RSAC 2025 from Kevin all week. 

You can also catch Kevin on our Microsoft for Startups⁠ Spotlight, brought to you by N2K CyberWire and Microsoft, where we shine a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. Kevin and Dave talk with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur, then speak with three Microsoft for Startups members: Matthew Chiodi⁠ of ⁠Cerby⁠, ⁠Travis Howerton⁠ of ⁠RegScale⁠, and ⁠Karl Mattson⁠ of ⁠Endor Labs⁠. Whether you are building your own startup or just love a good innovation story, https://explore.thecyberwire.com/microsoft-for-startups.



Selected Reading

RSA Conference 2025 Announcements Summary (Day 1) (SecurityWeek)

ISMG Editors: Day 1 Overview of RSAC Conference 2025 (GovInfo Security)

ProjectDiscovery Named “Most Innovative Startup” at RSAC™ 2025 Conference Innovation Sandbox Contest (RSAC) 

Krebs: People should be ‘outraged’ at efforts to shrink federal cyber efforts (The Record)

NSA, CISA top brass absent from RSA Conference (The Register)

Power Is Restored in Spain and Portugal After Widespread Outage (New York Times)

DOGE employees gain accounts on classified networks holding nuclear secrets (NPR)

New Framework Targets Rising Financial Crime Threats  (GovInfo Security)

The Age of Realtime Deepfake Fraud Is Here (404 Media)

The one interview question that will protect you from North Korean fake workers (The Register)

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Apr 2025 20:10:00 -0000</pubDate>
      <itunes:title>Trends shaping the future at RSAC.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2297</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>RSAC 2025 is well under way, and Kevin the Intern files his first report. Authorities say Spain and Portugal’s massive power outage was not a cyberattack. Concerns are raised over DOGE access to classified nuclear networks. The FS-ISAC launches the Cyberfraud Prevention Framework. Real-time deepfake fraud is here to stay. On today’s Threat Vector, host David Moulton speaks with Daniel B. Rosenzweig, a leading data privacy and AI attorney, about the growing complexity of privacy compliance in the era of big data and artificial intelligence. Protecting your company…with a fat joke. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector 

In this segment of Threat Vector, host David Moulton speaks with Daniel B. Rosenzweig, a leading data privacy and AI attorney, about the growing complexity of privacy compliance in the era of big data and artificial intelligence. Dan explains how businesses can build trust by aligning technical operations with legal obligations—what he calls “say what you do, do what you say.” They explore U.S. state privacy laws, global data transfer regulations, AI compliance, and the role of privacy-enhancing technologies. You can hear David and Daniel's full discussion on Threat Vector here and catch new episodes every Thursday on your favorite podcast app. 

Kevin on the Street

Joining us this week from RSAC 2025, we have our partner Kevin Magee, Global Director of Cybersecurity Startups at Microsoft for Startups. Stay tuned to the CyberWire Daily podcast for “Kevin on the Street” updates on all things RSAC 2025 from Kevin all week. 

You can also catch Kevin on our Microsoft for Startups⁠ Spotlight, brought to you by N2K CyberWire and Microsoft, where we shine a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. Kevin and Dave talk with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur, then speak with three Microsoft for Startups members: Matthew Chiodi⁠ of ⁠Cerby⁠, ⁠Travis Howerton⁠ of ⁠RegScale⁠, and ⁠Karl Mattson⁠ of ⁠Endor Labs⁠. Whether you are building your own startup or just love a good innovation story, https://explore.thecyberwire.com/microsoft-for-startups.



Selected Reading

RSA Conference 2025 Announcements Summary (Day 1) (SecurityWeek)

ISMG Editors: Day 1 Overview of RSAC Conference 2025 (GovInfo Security)

ProjectDiscovery Named “Most Innovative Startup” at RSAC™ 2025 Conference Innovation Sandbox Contest (RSAC) 

Krebs: People should be ‘outraged’ at efforts to shrink federal cyber efforts (The Record)

NSA, CISA top brass absent from RSA Conference (The Register)

Power Is Restored in Spain and Portugal After Widespread Outage (New York Times)

DOGE employees gain accounts on classified networks holding nuclear secrets (NPR)

New Framework Targets Rising Financial Crime Threats  (GovInfo Security)

The Age of Realtime Deepfake Fraud Is Here (404 Media)

The one interview question that will protect you from North Korean fake workers (The Register)

Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>RSAC 2025 is well under way, and Kevin the Intern files his first report. Authorities say Spain and Portugal’s massive power outage was not a cyberattack. Concerns are raised over DOGE access to classified nuclear networks. The FS-ISAC launches the Cyberfraud Prevention Framework. Real-time deepfake fraud is here to stay. On today’s Threat Vector, host David Moulton speaks with Daniel B. Rosenzweig, a leading data privacy and AI attorney, about the growing complexity of privacy compliance in the era of big data and artificial intelligence. Protecting your company…with a fat joke. </p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><strong>Threat Vector </strong></p>
<p>In this segment of Threat Vector, host <a href="https://www.linkedin.com/in/davidrmoulton/"><u>David Moulton</u></a> speaks with <a href="https://www.linkedin.com/in/daniel-b-rosenzweig-45a91364"><u>Daniel B. Rosenzweig</u></a>, a leading data privacy and AI attorney, about the growing complexity of privacy compliance in the era of big data and artificial intelligence. Dan explains how businesses can build trust by aligning technical operations with legal obligations—what he calls “say what you do, do what you say.” They explore U.S. state privacy laws, global data transfer regulations, AI compliance, and the role of privacy-enhancing technologies. You can hear David and Daniel's full discussion on Threat Vector<a href="https://thecyberwire.com/podcasts/threat-vector/64/notes"><u> here</u></a> and catch new episodes every Thursday on your favorite podcast app. </p>
<p><strong>Kevin on the Street</strong></p>
<p>Joining us this week from RSAC 2025, we have our partner <a href="https://www.linkedin.com/in/kmagee/"><u>Kevin Magee</u></a>, Global Director of Cybersecurity Startups at <a href="https://www.microsoft.com/en-us/startups?wt.mc_id=cyberwireepisode_landingpage_organicsocial_mfsmktg"><u>Microsoft for Startups</u></a>. Stay tuned to the CyberWire Daily podcast for “Kevin on the Street” updates on all things RSAC 2025 from Kevin all week. </p>
<p>You can also catch Kevin on our <a href="https://explore.thecyberwire.com/microsoft-for-startups"><u>Microsoft for Startups⁠</u></a> Spotlight, brought to you by N2K CyberWire and Microsoft, where we shine a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. Kevin and Dave talk with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur, then speak with three Microsoft for Startups members: Matthew Chiodi⁠ of ⁠Cerby⁠, ⁠Travis Howerton⁠ of ⁠RegScale⁠, and ⁠Karl Mattson⁠ of ⁠Endor Labs⁠. Whether you are building your own startup or just love a good innovation story, <a href="https://explore.thecyberwire.com/microsoft-for-startups"><u>https://explore.thecyberwire.com/microsoft-for-startups</u></a>.</p>
<p><br></p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://www.securityweek.com/rsa-conference-2025-announcements-summary-day-1/"><u>RSA Conference 2025 Announcements Summary (Day 1)</u></a> (SecurityWeek)</p>
<p><a href="https://www.govinfosecurity.com/ismg-editors-day-1-overview-rsac-conference-2025-a-28100"><u>ISMG Editors: Day 1 Overview of RSAC Conference 2025</u></a> (GovInfo Security)</p>
<p><a href="https://www.rsaconference.com/library/press-release/2025-isb-winner"><u>ProjectDiscovery Named “Most Innovative Startup” at RSAC™ 2025 Conference Innovation Sandbox Contest</u></a> (RSAC) </p>
<p><a href="https://therecord.media/krebs-outrage-efforts-to-shrink-federal-cyber-workforce"><u>Krebs: People should be ‘outraged’ at efforts to shrink federal cyber efforts</u></a> (The Record)</p>
<p><a href="https://www.theregister.com/2025/04/28/nsa_cisa_bosses_notably_absent/"><u>NSA, CISA top brass absent from RSA Conference</u></a> (The Register)</p>
<p><a href="https://www.nytimes.com/2025/04/29/world/europe/power-outage-spain-portugal.html"><u>Power Is Restored in Spain and Portugal After Widespread Outage</u></a> (New York Times)</p>
<p><a href="https://www.npr.org/2025/04/28/nx-s1-5378684/doge-energy-department-nuclear-secrets-access"><u>DOGE employees gain accounts on classified networks holding nuclear secrets</u></a> (NPR)</p>
<p><a href="https://www.govinfosecurity.com/new-framework-targets-rising-financial-crime-threats-a-28112"><u>New Framework Targets Rising Financial Crime Threats</u></a>  (GovInfo Security)</p>
<p><a href="https://www.404media.co/the-age-of-realtime-deepfake-fraud-is-here/"><u>The Age of Realtime Deepfake Fraud Is Here</u></a> (404 Media)</p>
<p><a href="https://www.theregister.com/2025/04/29/north_korea_worker_interview_questions/"><u>The one interview question that will protect you from North Korean fake workers</u></a> (The Register)</p>
<p><br><strong>Share your feedback.</strong></p>
<p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener"><u>brief listener survey</u></a> as we continually work to improve the show. </p>
<p><br><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1638</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[be385436-1c7a-11f0-85e0-6f03409a0aa5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2884552455.mp3?updated=1745954502" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lights out, lines down.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2296/notes</link>
      <description>A massive power outage strikes the Iberian Peninsula. Iran says it repelled a “widespread and complex” cyberattack targeting national infrastructure. Researchers find hundreds of SAP NetWeaver systems vulnerable to a critical zero-day. A British retailer tells warehouse workers to stay home following a cyberattack. VeriSource Services discloses a breach exposing personal data of four million individuals. Global automated scanning surged 16.7% in 2024. CISA discloses several critical vulnerabilities affecting Planet Technology’s industrial switches and network management products. A Greek court upholds a VPN provider’s no-logs policies. Law enforcement dismantles the JokerOTP phishing tool. Our guest is Tim Starks from CyberScoop with developments in the NSO Group trial. How Bad Scans and AI Spread a Scientific Urban Legend.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Special Edition

On our ⁠Microsoft for Startups⁠ Spotlight, brought to you by N2K CyberWire and Microsoft, we are shining a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. This episode is part of our exclusive RSAC series where we dive into the real world impact of the Microsoft for Startups Founders Hub. 

Along with Microsoft’s ⁠Kevin Magee⁠, Dave Bittner talks with an entrepreneur and startup veteran, and founders from three incredible startups who are part of the Founders Hub, each tackling big problems with even bigger ideas. 

Dave and Kevin set the stage speaking with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur. Dave and Kevin then speak with three founders: ⁠Matthew Chiodi⁠ of ⁠Cerby⁠, ⁠Travis Howerton⁠ of ⁠RegScale⁠, and ⁠Karl Mattson⁠ of ⁠Endor Labs⁠. So whether you are building your own startup or just love a good innovation story, listen in. For more information, visit the ⁠Microsoft for Startups website⁠. 



CyberWire Guest

We are joined by Tim Starks from CyberScoop who is discussing Judge limits evidence about NSO Group customers, victims in damages trial 



Selected Reading

Nationwide Power Outages in Portugal &amp; Spain Possibly Due to Cyberattack (Cyber Security News)

Iran claims it stopped large cyberattack on country’s infrastructure (The Record)

400+ SAP NetWeaver Devices Vulnerable to 0-Day Attacks that Exploited in the Wild (Cyber Security News)

M&amp;S warehouse workers told not to come to work following cyberattack (The Record)

4 Million Affected by VeriSource Data Breach (SecurityWeek)

Researchers Note 16.7% Increase in Automated Scanning Activity (Infosecurity Magazine)

Critical Vulnerabilities Found in Planet Technology Industrial Networking Products (SecurityWeek)

Court Dismisses Criminal Charges Against VPN Executive, Affirms No-Log Policy (Hackread)

JokerOTP Dismantled After 28,000 Phishing Attacks, 2 Arrested (Hackread)

A Strange Phrase Keeps Turning Up in Scientific Papers, But Why? (ScienceAlert)



Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 



Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 28 Apr 2025 20:10:00 -0000</pubDate>
      <itunes:title>Lights out, lines down.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2296</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A massive power outage strikes the Iberian Peninsula. Iran says it repelled a “widespread and complex” cyberattack targeting national infrastructure. Researchers find hundreds of SAP NetWeaver systems vulnerable to a critical zero-day. A British retailer tells warehouse workers to stay home following a cyberattack. VeriSource Services discloses a breach exposing personal data of four million individuals. Global automated scanning surged 16.7% in 2024. CISA discloses several critical vulnerabilities affecting Planet Technology’s industrial switches and network management products. A Greek court upholds a VPN provider’s no-logs policies. Law enforcement dismantles the JokerOTP phishing tool. Our guest is Tim Starks from CyberScoop with developments in the NSO Group trial. How Bad Scans and AI Spread a Scientific Urban Legend.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Special Edition

On our ⁠Microsoft for Startups⁠ Spotlight, brought to you by N2K CyberWire and Microsoft, we are shining a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. This episode is part of our exclusive RSAC series where we dive into the real world impact of the Microsoft for Startups Founders Hub. 

Along with Microsoft’s ⁠Kevin Magee⁠, Dave Bittner talks with an entrepreneur and startup veteran, and founders from three incredible startups who are part of the Founders Hub, each tackling big problems with even bigger ideas. 

Dave and Kevin set the stage speaking with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur. Dave and Kevin then speak with three founders: ⁠Matthew Chiodi⁠ of ⁠Cerby⁠, ⁠Travis Howerton⁠ of ⁠RegScale⁠, and ⁠Karl Mattson⁠ of ⁠Endor Labs⁠. So whether you are building your own startup or just love a good innovation story, listen in. For more information, visit the ⁠Microsoft for Startups website⁠. 



CyberWire Guest

We are joined by Tim Starks from CyberScoop who is discussing Judge limits evidence about NSO Group customers, victims in damages trial 



Selected Reading

Nationwide Power Outages in Portugal &amp; Spain Possibly Due to Cyberattack (Cyber Security News)

Iran claims it stopped large cyberattack on country’s infrastructure (The Record)

400+ SAP NetWeaver Devices Vulnerable to 0-Day Attacks that Exploited in the Wild (Cyber Security News)

M&amp;S warehouse workers told not to come to work following cyberattack (The Record)

4 Million Affected by VeriSource Data Breach (SecurityWeek)

Researchers Note 16.7% Increase in Automated Scanning Activity (Infosecurity Magazine)

Critical Vulnerabilities Found in Planet Technology Industrial Networking Products (SecurityWeek)

Court Dismisses Criminal Charges Against VPN Executive, Affirms No-Log Policy (Hackread)

JokerOTP Dismantled After 28,000 Phishing Attacks, 2 Arrested (Hackread)

A Strange Phrase Keeps Turning Up in Scientific Papers, But Why? (ScienceAlert)



Share your feedback.

We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 



Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A massive power outage strikes the Iberian Peninsula. Iran says it repelled a “widespread and complex” cyberattack targeting national infrastructure. Researchers find hundreds of SAP NetWeaver systems vulnerable to a critical zero-day. A British retailer tells warehouse workers to stay home following a cyberattack. VeriSource Services discloses a breach exposing personal data of four million individuals. Global automated scanning surged 16.7% in 2024. CISA discloses several critical vulnerabilities affecting Planet Technology’s industrial switches and network management products. A Greek court upholds a VPN provider’s no-logs policies. Law enforcement dismantles the JokerOTP phishing tool. Our guest is Tim Starks from CyberScoop with developments in the NSO Group trial. How Bad Scans and AI Spread a Scientific Urban Legend.</p>
<p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p>
<p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a>.</p>
<p><br><strong>CyberWire Special Edition</strong></p>
<p>On our <a href="https://www.microsoft.com/en-us/startups"><u>⁠Microsoft for Startups⁠</u></a> Spotlight, brought to you by N2K CyberWire and Microsoft, we are shining a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. This episode is part of our exclusive RSAC series where we dive into the real world impact of the Microsoft for Startups Founders Hub. </p>
<p>Along with Microsoft’s <a href="https://www.linkedin.com/in/kmagee/"><u>⁠Kevin Magee⁠</u></a>, Dave Bittner talks with an entrepreneur and startup veteran, and founders from three incredible startups who are part of the Founders Hub, each tackling big problems with even bigger ideas. </p>
<p>Dave and Kevin set the stage speaking with startup veteran and Cygenta co-founder <a href="https://www.linkedin.com/in/freakyclown/"><u>FC</u></a> about making the leap from hacker to entrepreneur. Dave and Kevin then speak with three founders: <a href="https://www.linkedin.com/in/mattchiodi/"><u>⁠Matthew Chiodi⁠</u></a> of <a href="https://www.cerby.com/"><u>⁠Cerby⁠</u></a>, <a href="https://www.linkedin.com/in/travishowerton/"><u>⁠Travis Howerton⁠</u></a> of <a href="https://regscale.com/"><u>⁠RegScale⁠</u></a>, and <a href="https://www.linkedin.com/in/karlmattson1/"><u>⁠Karl Mattson⁠</u></a> of <a href="https://www.endorlabs.com/"><u>⁠Endor Labs⁠</u></a>. So whether you are building your own startup or just love a good innovation story, <a href="https://explore.thecyberwire.com/microsoft-for-startups"><u>listen in</u></a>. For more information, visit the <a href="https://thecyberwire.com/podcasts/special-edition/82/What%20is%20Microsoft%20for%20Startups"><u>⁠Microsoft for Startups website⁠</u></a>. </p>
<p><br></p>
<p><strong>CyberWire Guest</strong></p>
<p>We are joined by <a href="https://www.linkedin.com/in/tstarks/"><u>Tim Starks</u></a> from <a href="https://www.linkedin.com/company/cyberscoop/"><u>CyberScoop</u></a> who is discussing Judge limits evidence about NSO Group customers, victims in damages trial </p>
<p><br></p>
<p><strong>Selected Reading</strong></p>
<p><a href="https://cybersecuritynews.com/nationwide-power-outages-in-portugal-spain/"><u>Nationwide Power Outages in Portugal &amp; Spain Possibly Due to Cyberattack</u></a> (Cyber Security News)</p>
<p><a href="https://therecord.media/iran-cyberattack-national-infrastructure"><u>Iran claims it stopped large cyberattack on country’s infrastructure</u></a> (The Record)</p>
<p><a href="https://cybersecuritynews.com/sap-netweaver-devices-vulnerable-to-0-day/"><u>400+ SAP NetWeaver Devices Vulnerable to 0-Day Attacks that Exploited in the Wild</u></a> (Cyber Security News)</p>
<p><a href="https://therecord.media/marks-and-spencer-cyberattack-warehouse-disruptions"><u>M&amp;S warehouse workers told not to come to work following cyberattack</u></a> (The Record)</p>
<p><a href="https://www.securityweek.com/4-million-affected-by-data-breach-at-verisource-services/"><u>4 Million Affected by VeriSource Data Breach</u></a> (SecurityWeek)</p>
<p><a href="https://www.infosecurity-magazine.com/news/increase-automated-scanning/"><u>Researchers Note 16.7% Increase in Automated Scanning Activity</u></a> (Infosecurity Magazine)</p>
<p><a href="https://www.securityweek.com/critical-vulnerabilities-found-in-planet-technology-industrial-networking-products/"><u>Critical Vulnerabilities Found in Planet Technology Industrial Networking Products</u></a> (SecurityWeek)</p>
<p><a href="https://hackread.com/court-dismisses-criminal-charges-against-vpn-executive-affirms-no-log-policy/"><u>Court Dismisses Criminal Charges Against VPN Executive, Affirms No-Log Policy</u></a> (Hackread)</p>
<p><a href="https://hackread.com/jokerotp-dismantled-28000-phishing-attacks-2-arrested/"><u>JokerOTP Dismantled After 28,000 Phishing Attacks, 2 Arrested</u></a> (Hackread)</p>
<p><a href="https://www.sciencealert.com/a-strange-phrase-keeps-turning-up-in-scientific-papers-but-why"><u>A Strange Phrase Keeps Turning Up in Scientific Papers, But Why?</u></a> (ScienceAlert)</p>
<p><br></p>
<p><strong>Share your feedback.</strong></p>
<p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener"><u>brief listener survey</u></a> as we continually work to improve the show. </p>
<p><br></p>
<p><strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1478</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[be0edd40-1c7a-11f0-85e0-679ca3fedb17]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1193390875.mp3?updated=1745868210" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Natali Tshuva: Impacting critical industries. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/65/notes</link>
      <description>Please enjoy this encore episode of Career Notes. 

CEO and co-founder of Sternum, Natali Tshuva shares how she took her interest in science and technology and made a career and company out of it. Beginning her computer science undergraduate degree at age 14 through a special program in Israel, Natali says it opened up a new world for her. Her required service in the IDF found Natali as a member of Unit 8200, the Israeli intelligence. In the Israeli corporate space following the IDF, Natali discovered how cybersecurity could actually create impact in the real world environment and found a way to combine her cybersecurity expertise with the passion to impact critical industries like the medical industry. Natali recommends that those entering the field get some hands-on experience and use your unique strengths to find a way to make the world a better place. We thank Natali for sharing her story. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 27 Apr 2025 07:00:00 -0000</pubDate>
      <itunes:title>Natali Tshuva: Impacting critical industries. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>65</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6759de26-2212-11f0-86a6-079b2919143e/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore episode of Career Notes. 

CEO and co-founder of Sternum, Natali Tshuva shares how she took her interest in science and technology and made a career and company out of it. Beginning her computer science undergraduate degree at age 14 through a special program in Israel, Natali says it opened up a new world for her. Her required service in the IDF found Natali as a member of Unit 8200, the Israeli intelligence. In the Israeli corporate space following the IDF, Natali discovered how cybersecurity could actually create impact in the real world environment and found a way to combine her cybersecurity expertise with the passion to impact critical industries like the medical industry. Natali recommends that those entering the field get some hands-on experience and use your unique strengths to find a way to make the world a better place. We thank Natali for sharing her story. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Career Notes. </p>
<p>CEO and co-founder of Sternum, Natali Tshuva shares how she took her interest in science and technology and made a career and company out of it. Beginning her computer science undergraduate degree at age 14 through a special program in Israel, Natali says it opened up a new world for her. Her required service in the IDF found Natali as a member of Unit 8200, the Israeli intelligence. In the Israeli corporate space following the IDF, Natali discovered how cybersecurity could actually create impact in the real world environment and found a way to combine her cybersecurity expertise with the passion to impact critical industries like the medical industry. Natali recommends that those entering the field get some hands-on experience and use your unique strengths to find a way to make the world a better place. We thank Natali for sharing her story. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>484</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6759de26-2212-11f0-86a6-079b2919143e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3692313019.mp3?updated=1745612494" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Microsoft for Startups: The benefits of the cyber startup ecosystem. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/82/notes</link>
      <description>Welcome to the Microsoft for Startups Spotlight, brought to you by N2K CyberWire and Microsoft. In this episode, we are shining a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. This episode is part of our exclusive RSAC series where we dive into the real world impact of the Microsoft for Startups Founders Hub. 

Along with Microsoft’s Kevin Magee, Dave Bittner talks with an entrepreneur and startup veteran, and founders from three incredible startups who are part of the Founders Hub, each tackling big problems with even bigger ideas. 

Dave and Kevin set the stage speaking with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur. Dave and Kevin then speak with three founders: Matthew Chiodi of Cerby, Travis Howerton of RegScale, and Karl Mattson of Endor Labs. So whether you are building your own startup or just love a good innovation story, listen in. For more information, visit the Microsoft for Startups website. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 27 Apr 2025 05:00:00 -0000</pubDate>
      <itunes:title>Microsoft for Startups (MFS): The benefits of the cyber startup ecosystem. [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>82</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/06ca035e-2214-11f0-a9f1-7770d1a68bd9/image/0216c9cea15c53e5d2c739964a38623c.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Welcome to the Microsoft for Startups Spotlight, brought to you by N2K CyberWire and Microsoft. In this episode, we are shining a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. This episode is part of our exclusive RSAC series where we dive into the real world impact of the Microsoft for Startups Founders Hub. 

Along with Microsoft’s Kevin Magee, Dave Bittner talks with an entrepreneur and startup veteran, and founders from three incredible startups who are part of the Founders Hub, each tackling big problems with even bigger ideas. 

Dave and Kevin set the stage speaking with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur. Dave and Kevin then speak with three founders: Matthew Chiodi of Cerby, Travis Howerton of RegScale, and Karl Mattson of Endor Labs. So whether you are building your own startup or just love a good innovation story, listen in. For more information, visit the Microsoft for Startups website. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the <a href="https://www.microsoft.com/en-us/startups">Microsoft for Startups</a> Spotlight, brought to you by N2K CyberWire and Microsoft. In this episode, we are shining a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. This episode is part of our exclusive RSAC series where we dive into the real world impact of the Microsoft for Startups Founders Hub. </p>
<p>Along with Microsoft’s <a href="https://www.linkedin.com/in/kmagee/">Kevin Magee</a>, Dave Bittner talks with an entrepreneur and startup veteran, and founders from three incredible startups who are part of the Founders Hub, each tackling big problems with even bigger ideas. </p>
<p>Dave and Kevin set the stage speaking with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur. Dave and Kevin then speak with three founders: <a href="https://www.linkedin.com/in/mattchiodi/">Matthew Chiodi</a> of <a href="https://www.cerby.com/">Cerby</a>, <a href="https://www.linkedin.com/in/travishowerton/">Travis Howerton</a> of <a href="https://regscale.com/">RegScale</a>, and <a href="https://www.linkedin.com/in/karlmattson1/">Karl Mattson</a> of <a href="https://www.endorlabs.com/">Endor Labs</a>. So whether you are building your own startup or just love a good innovation story, listen in. For more information, visit the <a href="What%20is%20Microsoft%20for%20Startups">Microsoft for Startups website</a>. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>4335</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[06ca035e-2214-11f0-a9f1-7770d1a68bd9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2973918322.mp3?updated=1746814600" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>China’s new cyber arsenal revealed. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/374/notes</link>
      <description>Today we are joined by Crystal Morin, Cybersecurity Strategist from Sysdig, as she is sharing their work on "UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell." UNC5174, a Chinese state-sponsored threat actor, has resurfaced with a stealthy cyber campaign using a new arsenal of customized and open-source tools, including a variant of their SNOWLIGHT malware and the VShell RAT. 
Sysdig researchers discovered that the group targets Linux systems through malicious bash scripts, domain squatting, and in-memory payloads, indicating a high level of sophistication and espionage intent. Their evolving tactics, such as using spoofed domains and fileless malware, continue to blur attribution and pose a significant threat to research institutions, critical infrastructure, and NGOs across the West and Asia-Pacific regions.

The research can be found here:
UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Apr 2025 07:00:00 -0000</pubDate>
      <itunes:title>China’s new cyber arsenal revealed. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>374</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/d5be562e-21f6-11f0-97ed-f35303708191/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Today we are joined by Crystal Morin, Cybersecurity Strategist from Sysdig, as she is sharing their work on "UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell." UNC5174, a Chinese state-sponsored threat actor, has resurfaced with a stealthy cyber campaign using a new arsenal of customized and open-source tools, including a variant of their SNOWLIGHT malware and the VShell RAT. 
Sysdig researchers discovered that the group targets Linux systems through malicious bash scripts, domain squatting, and in-memory payloads, indicating a high level of sophistication and espionage intent. Their evolving tactics, such as using spoofed domains and fileless malware, continue to blur attribution and pose a significant threat to research institutions, critical infrastructure, and NGOs across the West and Asia-Pacific regions.

The research can be found here:
UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we are joined by <a href="https://www.linkedin.com/in/crystal-morin/">Crystal Morin</a>, Cybersecurity Strategist from <a href="https://www.linkedin.com/company/sysdig/">Sysdig</a>, as she is sharing their work on "UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell." UNC5174, a Chinese state-sponsored threat actor, has resurfaced with a stealthy cyber campaign using a new arsenal of customized and open-source tools, including a variant of their SNOWLIGHT malware and the VShell RAT. </p><p>Sysdig researchers discovered that the group targets Linux systems through malicious bash scripts, domain squatting, and in-memory payloads, indicating a high level of sophistication and espionage intent. Their evolving tactics, such as using spoofed domains and fileless malware, continue to blur attribution and pose a significant threat to research institutions, critical infrastructure, and NGOs across the West and Asia-Pacific regions.</p><p><br></p><h3>The research can be found here:</h3><ul><li><a href="https://sysdig.com/blog/unc5174-chinese-threat-actor-vshell/">UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1353</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d5be562e-21f6-11f0-97ed-f35303708191]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4220797882.mp3?updated=1745597973" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pentagon hits fast-forward on software certs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2295/notes</link>
      <description>The Defense Department is launching a new fast-track software approval process. A popular employee monitoring tool exposes over 21 million real-time screenshots. The U.S. opens a criminal antitrust investigation into router maker TP-Link. A pair of health data breaches affect over six million people. South Korea’s SK Telecom confirms a cyberattack. A critical zero-day puts thousands of SAP applications at potential risk. Researchers raise concerns over AI agents performing unauthorized actions. “Policy Puppetry” can break the safety guardrails of all major generative AI models. New research tallies the high costs of data breaches. A preview of the RSAC Innovation Sandbox with Cecilia Marinier, Vice President at RSAC, and David Chen, Head of Global Technology Investment Banking at Morgan Stanley. Stocking hard drives full of human knowledge, just in case. 


Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn


CyberWire Guest
Cecilia Marinier, Vice President at RSAC, and David Chen, Head of Global Technology Investment Banking at Morgan Stanley, sit down with Dave to discuss the Innovation Sandbox Contest 2025.


Selected Reading
Acting Pentagon CIO Signing Off on New, Faster Cyber Rules for Contractors (airandspaceforces)

Top employee monitoring app leaks 21 million screenshots on thousands of users (TechRadar)

 Router Maker TP-Link Faces US Criminal Antitrust Investigation (bloomberg)

Yale New Haven Health Notifying 5.5 Million of March Hack (bankinfosecurity)

Frederick Health data breach impacts nearly 1 million patients (BleepingComputer)

Hackers access sensitive SIM card data at South Korea's largest telecoms company (bitdefender)

SAP Zero-Day Possibly Exploited by Initial Access Broker (SecurityWeek)

Chrome Extension Uses AI Engine to Act Without User Input (Infosecurity Magazine)

All Major Gen-AI Models Vulnerable to 'Policy Puppetry' Prompt Injection Attack (SecurityWeek)

US Data Breach Lawsuits Total $155M Amid Cybersecurity Failures (Infosecurity Magazine)

Sales of Hard Drives for the End of the World Boom Under Trump (404media)


Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.


Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 25 Apr 2025 20:20:00 -0000</pubDate>
      <itunes:title>Pentagon hits fast-forward on software certs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2295</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The Defense Department is launching a new fast-track software approval process. A popular employee monitoring tool exposes over 21 million real-time screenshots. The U.S. opens a criminal antitrust investigation into router maker TP-Link. A pair of health data breaches affect over six million people. South Korea’s SK Telecom confirms a cyberattack. A critical zero-day puts thousands of SAP applications at potential risk. Researchers raise concerns over AI agents performing unauthorized actions. “Policy Puppetry” can break the safety guardrails of all major generative AI models. New research tallies the high costs of data breaches. A preview of the RSAC Innovation Sandbox with Cecilia Marinier, Vice President at RSAC, and David Chen, Head of Global Technology Investment Banking at Morgan Stanley. Stocking hard drives full of human knowledge, just in case. 


Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn


CyberWire Guest
Cecilia Marinier, Vice President at RSAC, and David Chen, Head of Global Technology Investment Banking at Morgan Stanley, sit down with Dave to discuss the Innovation Sandbox Contest 2025.


Selected Reading
Acting Pentagon CIO Signing Off on New, Faster Cyber Rules for Contractors (airandspaceforces)

Top employee monitoring app leaks 21 million screenshots on thousands of users (TechRadar)

 Router Maker TP-Link Faces US Criminal Antitrust Investigation (bloomberg)

Yale New Haven Health Notifying 5.5 Million of March Hack (bankinfosecurity)

Frederick Health data breach impacts nearly 1 million patients (BleepingComputer)

Hackers access sensitive SIM card data at South Korea's largest telecoms company (bitdefender)

SAP Zero-Day Possibly Exploited by Initial Access Broker (SecurityWeek)

Chrome Extension Uses AI Engine to Act Without User Input (Infosecurity Magazine)

All Major Gen-AI Models Vulnerable to 'Policy Puppetry' Prompt Injection Attack (SecurityWeek)

US Data Breach Lawsuits Total $155M Amid Cybersecurity Failures (Infosecurity Magazine)

Sales of Hard Drives for the End of the World Boom Under Trump (404media)


Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.


Want to hear your company in the show?

You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Defense Department is launching a new fast-track software approval process. A popular employee monitoring tool exposes over 21 million real-time screenshots. The U.S. opens a criminal antitrust investigation into router maker TP-Link. A pair of health data breaches affect over six million people. South Korea’s SK Telecom confirms a cyberattack. A critical zero-day puts thousands of SAP applications at potential risk. Researchers raise concerns over AI agents performing unauthorized actions. “Policy Puppetry” can break the safety guardrails of all major generative AI models. New research tallies the high costs of data breaches. A preview of the RSAC Innovation Sandbox with Cecilia Marinier, Vice President at RSAC, and David Chen, Head of Global Technology Investment Banking at Morgan Stanley. Stocking hard drives full of human knowledge, just in case. </p>
<p>
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/"><u>LinkedIn</u></a></p>
<p>
<strong>CyberWire Guest</strong>
<a href="https://www.linkedin.com/in/cecilia-murtagh-marinier-14967/"><u>Cecilia Marinier</u></a>, Vice President at <a href="https://www.linkedin.com/company/rsa-conference/"><u>RSAC</u></a>, and <a href="https://www.linkedin.com/in/david-chen-91a45/"><u>David Chen</u></a>, Head of Global Technology Investment Banking at <a href="https://www.linkedin.com/company/morgan-stanley/"><u>Morgan Stanley</u></a>, sit down with Dave to discuss the Innovation Sandbox Contest 2025.</p>
<p>
<strong>Selected Reading</strong>
<a href="https://www.airandspaceforces.com/acting-pentagon-cio-faster-cyber-rules-contractors/#:~:text=Acting%20Pentagon%20CIO%20Signing%20Off%20on%20New%2C%20Faster%20Cyber%20Rules%20for%20Contractors&amp;text=A%20new%20fast%2Dtrack%20approval,Katie%20Arrington%20said%20April%2023"><u>Acting Pentagon CIO Signing Off on New, Faster Cyber Rules for Contractors</u></a> (airandspaceforces)</p>
<p><a href="https://www.techradar.com/pro/security/top-employee-monitoring-app-leaks-21-million-screenshots-on-thousands-of-users"><u>Top employee monitoring app leaks 21 million screenshots on thousands of users</u> (TechRadar</a>)</p>
<p><a href="https://www.bloomberg.com/news/articles/2025-04-24/router-maker-tp-link-faces-us-criminal-antitrust-investigation?accessToken=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzb3VyY2UiOiJTdWJzY3JpYmVyR2lmdGVkQXJ0aWNsZSIsImlhdCI6MTc0NTU0NzU5OSwiZXhwIjoxNzQ2MTUyMzk5LCJhcnRpY2xlSWQiOiJTVjZNVEVEV1gyUFMwMCIsImJjb25uZWN0SWQiOiJERDEzODM4MTc2MTc0NEYzODBBODhGRjlEQkI2MkEwOCJ9.GfIiGTK-3yQ7KHsirEMjPxdYFCCFp7dtAApNsgTOJYs"><u> Router Maker TP-Link Faces US Criminal Antitrust Investigation</u></a> (bloomberg)</p>
<p><a href="https://www.bankinfosecurity.com/yale-new-haven-health-notifying-55-million-march-hack-a-28081"><u>Yale New Haven Health Notifying 5.5 Million of March Hack</u></a> (bankinfosecurity)</p>
<p><a href="https://www.bleepingcomputer.com/news/security/frederick-health-data-breach-impacts-nearly-1-million-patients/"><u>Frederick Health data breach impacts nearly 1 million patients</u></a> (BleepingComputer)</p>
<p><a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/hackers-access-sensitive-sim-card-data-at-south-koreas-largest-telecoms-company"><u>Hackers access sensitive SIM card data at South Korea's largest telecoms company</u></a> (bitdefender)</p>
<p><a href="https://www.securityweek.com/sap-zero-day-possibly-exploited-by-initial-access-broker/"><u>SAP Zero-Day Possibly Exploited by Initial Access Broker</u> (SecurityWeek</a>)</p>
<p><a href="https://www.infosecurity-magazine.com/news/chrome-extension-ai-engine-act-mcp/"><u>Chrome Extension Uses AI Engine to Act Without User Input </u>(Infosecurity Magazine</a>)</p>
<p><a href="https://www.securityweek.com/all-major-gen-ai-models-vulnerable-to-policy-puppetry-prompt-injection-attack/"><u>All Major Gen-AI Models Vulnerable to 'Policy Puppetry' Prompt Injection Attack</u></a> <a href="https://www.securityweek.com/sap-zero-day-possibly-exploited-by-initial-access-broker/">(SecurityWeek</a>)</p>
<p><a href="https://www.infosecurity-magazine.com/news/lawsuits-total-155m-cybersecurity/"><u>US Data Breach Lawsuits Total $155M Amid Cybersecurity Failures</u></a> <a href="https://www.infosecurity-magazine.com/news/chrome-extension-ai-engine-act-mcp/">(Infosecurity Magazine</a>)</p>
<p><a href="https://www.404media.co/sales-of-hard-drives-prepper-disk-for-the-end-of-the-world-have-boomed-under-trump/?ref=daily-stories-newsletter"><u>Sales of Hard Drives for the End of the World Boom Under Trump</u></a> (404media)</p>
<p>
<strong>Share your feedback.</strong>
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener"><u>brief listener survey</u></a> as we continually work to improve the show.</p>
<p>
<strong>Want to hear your company in the show?</strong></p>
<p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q"><u>media kit</u></a>. Contact us at <a href="mailto:cyberwire@n2k.com"><u>cyberwire@n2k.com</u></a> to request more info.</p>
<p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1604</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bde4cbe0-1c7a-11f0-85e0-8f38e7775936]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4012957745.mp3?updated=1745610041" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lessons from the latest breach reports.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2294/notes</link>
      <description>Verizon and Mandiant call for layered defenses against evolving threats. Cisco Talos describes ToyMaker and Cactus threat actors. Researchers discover a major Linux security flaw which allows rootkits to bypass traditional detection methods. Ransomware groups are experimenting with new business models. Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division shares the latest on Salt Typhoon. Global censorship takes a coffee break.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Dave sits down with Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division who shares  a PSA on Salt Typhoon.

Selected Reading
2025 Data Breach Investigations Report (Verizon)
Mandiant M-Trends 2025 Report (Mandiant)
Introducing ToyMaker, an initial access broker working in cahoots with double extortion gangs (Ciso Talos)
Linux 'io_uring' security blindspot allows stealthy rootkit attacks (bleepingcomputer)
Ransomware groups test new business models to hit more victims, increase profits (the record)
Cloudflare: Government-backed internet shutdowns plummet to zero in first quarter (the record)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 24 Apr 2025 20:10:00 -0000</pubDate>
      <itunes:title>Lessons from the latest breach reports.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2294</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Verizon and Mandiant call for layered defenses against evolving threats. Cisco Talos describes ToyMaker and Cactus threat actors. Researchers discover a major Linux security flaw which allows rootkits to bypass traditional detection methods. Ransomware groups are experimenting with new business models. Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division shares the latest on Salt Typhoon. Global censorship takes a coffee break.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Dave sits down with Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division who shares  a PSA on Salt Typhoon.

Selected Reading
2025 Data Breach Investigations Report (Verizon)
Mandiant M-Trends 2025 Report (Mandiant)
Introducing ToyMaker, an initial access broker working in cahoots with double extortion gangs (Ciso Talos)
Linux 'io_uring' security blindspot allows stealthy rootkit attacks (bleepingcomputer)
Ransomware groups test new business models to hit more victims, increase profits (the record)
Cloudflare: Government-backed internet shutdowns plummet to zero in first quarter (the record)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Verizon and Mandiant call for layered defenses against evolving threats. Cisco Talos describes ToyMaker and Cactus threat actors. Researchers discover a major Linux security flaw which allows rootkits to bypass traditional detection methods. Ransomware groups are experimenting with new business models. Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division shares the latest on Salt Typhoon. Global censorship takes a coffee break.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Dave sits down with Deputy Assistant Director <a href="https://www.linkedin.com/in/cynthia-kaiser-cyber/">Cynthia Kaiser</a> from the <a href="https://www.linkedin.com/company/fbicyber/">FBI Cyber Division</a> who shares  a PSA on Salt Typhoon.</p><h2><br></h2><h2>Selected Reading</h2><p><a href="https://www.verizon.com/business/resources/reports/dbir/">2025 Data Breach Investigations Report</a> (Verizon)</p><p><a href="https://services.google.com/fh/files/misc/m-trends-2025-en.pdf">Mandiant M-Trends 2025 Report</a> (Mandiant)</p><p><a href="https://blog.talosintelligence.com/introducing-toymaker-an-initial-access-broker/">Introducing ToyMaker, an initial access broker working in cahoots with double extortion gangs</a> (Ciso Talos)</p><p><a href="https://www.bleepingcomputer.com/news/security/linux-io-uring-security-blindspot-allows-stealthy-rootkit-attacks/">Linux 'io_uring' security blindspot allows stealthy rootkit attacks</a> (bleepingcomputer)</p><p><a href="https://therecord.media/ransomware-groups-test-new-business-models-dragonforce-anubis">Ransomware groups test new business models to hit more victims, increase profits</a> (the record)</p><p><a href="https://therecord.media/government-internet-shutdowns-slow-in-2025">Cloudflare: Government-backed internet shutdowns plummet to zero in first quarter</a> (the record)</p><p><br></p><h2>Share your feedback.</h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1377</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bdbbe64e-1c7a-11f0-85e0-4383ebb10091]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8323255619.mp3?updated=1745519402" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>States struggle with cyber shift.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2293/notes</link>
      <description>The White House’s shift of cybersecurity responsibilities to the states is met with skepticism. Baltimore City Public Schools suffer a ransomware attack. Russian state-backed hackers target Dutch critical infrastructure. Microsoft resolves multiple Remote Desktop issues. A new malware campaign is targeting Docker environments for cryptojacking. A new phishing campaign uses weaponized Word documents to steal Windows login credentials. Zyxel Networks issues critical patches for two high-severity vulnerabilities. CISA issues five advisories highlighting critical vulnerabilities in ICS systems. Our guest is Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division, sharing the findings of their latest IC3 report. So long, Privacy Sandbox. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today we are joined by Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division, as she is sharing the findings of their latest IC3 report.

Selected Reading
Trump is shifting cybersecurity to the states, but many aren’t prepared (Stateline)
Baltimore City Public Schools report data breach (beyondmachines)
Russia attempting cyber sabotage attacks against Dutch critical infrastructure (record)
Microsoft fixes Remote Desktop freezes caused by Windows updates (bleepingcomputer)
New Malware Hijacking Docker Images with Unique Obfuscation Technique (cybersecuritynews)
Hackers Exploit Weaponized Word Docs to Steal Windows Login Credentials (gbhackers)
Kelly Benefits Data Breach Impacts 260,000 People (SecurityWeek)
Data Breach at Onsite Mammography Impacts 350,000 (SecurityWeek)
Zyxel Patches Privilege Management Vulnerabilities in USG FLEX H Series Firewalls (cybersecuritynews)
CISA Releases Five Advisories Covering ICS Vulnerabilities &amp; Exploits (cybersecuritynews)
RIP to the Google Privacy Sandbox (The Register)
2024 IC3 ANNUAL REPORT 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 23 Apr 2025 20:20:00 -0000</pubDate>
      <itunes:title>States struggle with cyber shift.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2293</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The White House’s shift of cybersecurity responsibilities to the states is met with skepticism. Baltimore City Public Schools suffer a ransomware attack. Russian state-backed hackers target Dutch critical infrastructure. Microsoft resolves multiple Remote Desktop issues. A new malware campaign is targeting Docker environments for cryptojacking. A new phishing campaign uses weaponized Word documents to steal Windows login credentials. Zyxel Networks issues critical patches for two high-severity vulnerabilities. CISA issues five advisories highlighting critical vulnerabilities in ICS systems. Our guest is Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division, sharing the findings of their latest IC3 report. So long, Privacy Sandbox. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today we are joined by Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division, as she is sharing the findings of their latest IC3 report.

Selected Reading
Trump is shifting cybersecurity to the states, but many aren’t prepared (Stateline)
Baltimore City Public Schools report data breach (beyondmachines)
Russia attempting cyber sabotage attacks against Dutch critical infrastructure (record)
Microsoft fixes Remote Desktop freezes caused by Windows updates (bleepingcomputer)
New Malware Hijacking Docker Images with Unique Obfuscation Technique (cybersecuritynews)
Hackers Exploit Weaponized Word Docs to Steal Windows Login Credentials (gbhackers)
Kelly Benefits Data Breach Impacts 260,000 People (SecurityWeek)
Data Breach at Onsite Mammography Impacts 350,000 (SecurityWeek)
Zyxel Patches Privilege Management Vulnerabilities in USG FLEX H Series Firewalls (cybersecuritynews)
CISA Releases Five Advisories Covering ICS Vulnerabilities &amp; Exploits (cybersecuritynews)
RIP to the Google Privacy Sandbox (The Register)
2024 IC3 ANNUAL REPORT 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The White House’s shift of cybersecurity responsibilities to the states is met with skepticism. Baltimore City Public Schools suffer a ransomware attack. Russian state-backed hackers target Dutch critical infrastructure. Microsoft resolves multiple Remote Desktop issues. A new malware campaign is targeting Docker environments for cryptojacking. A new phishing campaign uses weaponized Word documents to steal Windows login credentials. Zyxel Networks issues critical patches for two high-severity vulnerabilities. CISA issues five advisories highlighting critical vulnerabilities in ICS systems. Our guest is Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division, sharing the findings of their latest IC3 report. So long, Privacy Sandbox. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today we are joined by Deputy Assistant Director <a href="https://www.linkedin.com/in/cynthia-kaiser-cyber/">Cynthia Kaiser</a> from the <a href="https://www.linkedin.com/company/fbicyber/">FBI Cyber Division</a>, as she is sharing the findings of their latest IC3 report.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://stateline.org/2025/04/18/trump-is-shifting-cybersecurity-to-the-states-but-many-arent-prepared/">Trump is shifting cybersecurity to the states, but many aren’t prepared (Stateline</a>)</p><p><a href="https://beyondmachines.net/event_details/baltimore-city-public-schools-report-data-breach-a-j-j-3-i/gD2P6Ple2L">Baltimore City Public Schools report data breach</a> (beyondmachines)</p><p><a href="https://therecord.media/dutch-mivd-report-russian-cyber-sabotage">Russia attempting cyber sabotage attacks against Dutch critical infrastructure</a> (record)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-remote-desktop-freezes-caused-by-windows-updates/">Microsoft fixes Remote Desktop freezes caused by Windows updates</a> (bleepingcomputer)</p><p><a href="https://cybersecuritynews.com/new-malware-hijacking-docker-images/">New Malware Hijacking Docker Images with Unique Obfuscation Technique</a> (cybersecuritynews)</p><p><a href="https://gbhackers.com/hackers-exploit-weaponized-word-docs/">Hackers Exploit Weaponized Word Docs to Steal Windows Login Credentials</a> (gbhackers)</p><p><a href="https://www.securityweek.com/kelly-benefits-data-breach-impacts-260000-people/">Kelly Benefits Data Breach Impacts 260,000 People (SecurityWeek</a>)</p><p><a href="https://www.securityweek.com/data-breach-at-onsite-mammography-impacts-350000/">Data Breach at Onsite Mammography Impacts 350,000 (SecurityWeek</a>)</p><p><a href="https://cybersecuritynews.com/zyxel-patches-privilege-management-vulnerabilities/">Zyxel Patches Privilege Management Vulnerabilities in USG FLEX H Series Firewalls</a> (cybersecuritynews)</p><p><a href="https://cybersecuritynews.com/cisa-releases-five-ics-advisories/">CISA Releases Five Advisories Covering ICS Vulnerabilities &amp; Exploits</a> (cybersecuritynews)</p><p><a href="https://www.theregister.com/2025/04/22/google_privacy_sandbox/">RIP to the Google Privacy Sandbox (The Register</a>)</p><p><a href="https://www.ic3.gov/AnnualReport/Reports/2024_IC3Report.pdf">2024 IC3 ANNUAL REPORT</a> </p><p><br></p><h2>Share your feedback.</h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1729</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bd92c994-1c7a-11f0-85e0-7b0d36d5351e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7704707268.mp3?updated=1745437452" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Proton66’s malware highway.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2292/notes</link>
      <description>The Russian Proton66 is tied to cybercriminal bulletproof hosting services. A new Rust-based botnet hijacks vulnerable routers. CISA budget cuts limit the use of popular analysis tools. A pair of healthcare providers confirm ransomware attacks. Researchers uncover the Scallywag  ad fraud network. The UN warns of cyber-enabled fraud in Southeast Asia expanding at an industrial scale. Fog ransomware resurfaces and points a finger at DOGE. The cybercrime marketplace Cracked relaunches under a new domain. On our Industry Voices segment, Bob Maley, CSO of Black Kite, shares insights on the growing risk of third-party cyber incidents. Taking the scenic route through Europe's digital landscape.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today we are joined by Kim Jones, the new Host of CISO Perspectives podcast, previewing the latest episode where Kim is joined by Larry Whiteside Jr. discussing “Are we a trade or a profession?”

Industry Voices
On our Industry Voices segment, Bob Maley, CSO of Black Kite, sharing insights on the growing risk of third-party cyber incidents.

Selected Reading
Many Malware Campaigns Linked to Proton66 Network (SecurityWeek)
New Rust Botnet Hijacking Routers to Inject Commands Remotely (Cyber Security News)
CISA Issues Warning Against Using Censys, VirusTotal in Threat Hunting Ops (GB Hackers)
Two Healthcare Orgs Hit by Ransomware Confirm Data Breaches Impacting Over 100,000 (SecurityWeek)
Scalllywag Ad Fraud Network Generates 1.4 Billion Bid Requests Daily (Infosecurity Magazine)
$40bn Southeast Asian Scam Sector Growing “Like a Cancer” (Infosecurity Magazine)
Fog ransomware notes troll with DOGE references, bait insider attacks (SC World)
Reborn: Cybercrime Marketplace Cracked Appears to Be Back (BankInfo Security)
Nemesis darknet market founder indicted for years-long “borderless powerhouse of criminal activity” (Cybernews)
Digital Weaning Guide from the United States (Dagbladet Information)
Two top cyber officials resign from CISA (The Record)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Apr 2025 20:10:00 -0000</pubDate>
      <itunes:title>Proton66’s malware highway.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2292</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The Russian Proton66 is tied to cybercriminal bulletproof hosting services. A new Rust-based botnet hijacks vulnerable routers. CISA budget cuts limit the use of popular analysis tools. A pair of healthcare providers confirm ransomware attacks. Researchers uncover the Scallywag  ad fraud network. The UN warns of cyber-enabled fraud in Southeast Asia expanding at an industrial scale. Fog ransomware resurfaces and points a finger at DOGE. The cybercrime marketplace Cracked relaunches under a new domain. On our Industry Voices segment, Bob Maley, CSO of Black Kite, shares insights on the growing risk of third-party cyber incidents. Taking the scenic route through Europe's digital landscape.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today we are joined by Kim Jones, the new Host of CISO Perspectives podcast, previewing the latest episode where Kim is joined by Larry Whiteside Jr. discussing “Are we a trade or a profession?”

Industry Voices
On our Industry Voices segment, Bob Maley, CSO of Black Kite, sharing insights on the growing risk of third-party cyber incidents.

Selected Reading
Many Malware Campaigns Linked to Proton66 Network (SecurityWeek)
New Rust Botnet Hijacking Routers to Inject Commands Remotely (Cyber Security News)
CISA Issues Warning Against Using Censys, VirusTotal in Threat Hunting Ops (GB Hackers)
Two Healthcare Orgs Hit by Ransomware Confirm Data Breaches Impacting Over 100,000 (SecurityWeek)
Scalllywag Ad Fraud Network Generates 1.4 Billion Bid Requests Daily (Infosecurity Magazine)
$40bn Southeast Asian Scam Sector Growing “Like a Cancer” (Infosecurity Magazine)
Fog ransomware notes troll with DOGE references, bait insider attacks (SC World)
Reborn: Cybercrime Marketplace Cracked Appears to Be Back (BankInfo Security)
Nemesis darknet market founder indicted for years-long “borderless powerhouse of criminal activity” (Cybernews)
Digital Weaning Guide from the United States (Dagbladet Information)
Two top cyber officials resign from CISA (The Record)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Russian Proton66 is tied to cybercriminal bulletproof hosting services. A new Rust-based botnet hijacks vulnerable routers. CISA budget cuts limit the use of popular analysis tools. A pair of healthcare providers confirm ransomware attacks. Researchers uncover the Scallywag  ad fraud network. The UN warns of cyber-enabled fraud in Southeast Asia expanding at an industrial scale. Fog ransomware resurfaces and points a finger at DOGE. The cybercrime marketplace Cracked relaunches under a new domain. On our Industry Voices segment, Bob Maley, CSO of Black Kite, shares insights on the growing risk of third-party cyber incidents. Taking the scenic route through Europe's digital landscape.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today we are joined by <a href="https://www.linkedin.com/in/kimjones-cism/">Kim Jones</a>, the new Host of <a href="https://thecyberwire.com/podcasts/cso-perspectives">CISO Perspectives</a> podcast, previewing the latest episode where Kim is joined by <a href="https://www.linkedin.com/in/larrywhitesidejr/">Larry Whiteside Jr.</a> discussing “Are we a trade or a profession?”</p><p><br></p><h2>Industry Voices</h2><p>On our Industry Voices segment, <a href="https://www.linkedin.com/in/strategicciso/">Bob Maley</a>, CSO of <a href="https://www.linkedin.com/company/blackkite/">Black Kite</a>, sharing insights on the growing risk of third-party cyber incidents.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/many-malware-campaigns-linked-to-proton66-network/">Many Malware Campaigns Linked to Proton66 Network</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/new-rust-botnet-hijacking-routers/">New Rust Botnet Hijacking Routers to Inject Commands Remotely</a> (Cyber Security News)</p><p><a href="https://gbhackers.com/cisa-issues-warning-against-using-censys-virustotal/">CISA Issues Warning Against Using Censys, VirusTotal in Threat Hunting Ops</a> (GB Hackers)</p><p><a href="https://www.securityweek.com/two-healthcare-orgs-hit-by-ransomware-confirm-data-breaches-impacting-over-100000/">Two Healthcare Orgs Hit by Ransomware Confirm Data Breaches Impacting Over 100,000</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/scalllywag-ad-fraud-networ-14/">Scalllywag Ad Fraud Network Generates 1.4 Billion Bid Requests Daily</a> (Infosecurity Magazine)</p><p><a href="https://www.infosecurity-magazine.com/news/40bn-southeast-asia-scam-grow/">$40bn Southeast Asian Scam Sector Growing “Like a Cancer”</a> (Infosecurity Magazine)</p><p><a href="https://www.scworld.com/news/fog-ransomware-notes-troll-with-doge-references-bait-insider-attacks">Fog ransomware notes troll with DOGE references, bait insider attacks</a> (SC World)</p><p><a href="https://www.bankinfosecurity.com/reborn-cybercrime-marketplace-cracked-appears-to-be-back-a-28053">Reborn: Cybercrime Marketplace Cracked Appears to Be Back</a> (BankInfo Security)</p><p><a href="https://cybernews.com/cybercrime/nemesis-dark-web-market-founder-indicted-illegal-cyber-activities/">Nemesis darknet market founder indicted for years-long “borderless powerhouse of criminal activity”</a> (Cybernews)</p><p><a href="https://www.information.dk/kultur/2025/04/guide-digital-afvaenning-usa-saadan-goer?kupon=eyJpYXQiOjE3NDUyMzE2ODgsInN1YiI6IjIyMjUyMDo4MjkxNzUifQ.FC5axnfdUKYDuqFbAJfadw&amp;ref=metacurity.com">Digital Weaning Guide from the United States</a> (Dagbladet Information)</p><p><a href="https://therecord.media/two-top-cyber-officials-resign-from-cisa">Two top cyber officials resign from CISA</a> (The Record)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2196</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bd69e506-1c7a-11f0-85e0-ab7fb7a59e2e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8109569664.mp3?updated=1745349254" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When fake fixes hide real attacks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2291/notes</link>
      <description>Adversary nations are using ClickFix in cyber espionage campaigns. Japan’s Financial Services Agency issues an urgent warning after hundreds of millions in unauthorized trades. The critical Erlang/OTP’s SSH vulnerability now has public exploits. A flawed rollout of a new Microsoft Entra app triggers widespread account lockouts.  The alleged operator of SmokeLoader malware faces federal hacking charges. A new scam blends social engineering, malware, and NFC tech to drain bank accounts. GSA employees may have been oversharing sensitive documents. Yoni Shohet, Co-Founder and CEO of Valence Security, who cautions financial organizations of coming Chinese open source AI. Crosswalks in the crosshairs of satirical hacking.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
We are joined by Yoni Shohet, Co-Founder and CEO of Valence Security, discussing how the onslaught of more open source AI tools coming out of China will be difficult to manage for companies especially those in the financial sector.

Selected Reading
North Korea, Iran, Russia-Backed Hackers Deploy ClickFix in New Attacks (Hackread)
Countries Shore Up Their Digital Defenses as Global Tensions Raise the Threat of Cyberwarfare (SecurityWeek)
Japan warns of hundreds of millions of dollars in unauthorized trades from hacked accounts (The Record)
Critical Erlang/OTP SSH RCE bug now has public exploits, patch now (Bleeping Computer)
Widespread Microsoft Entra lockouts tied to new security feature rollout (Bleeping Computer)
Alleged SmokeLoader malware operator facing federal charges in Vermont (The Record)
New payment-card scam involves a phone call, some malware and a personal tap (The Record)
Sensitive files, including White House floor plans, shared with thousands (The Washington Post)
Hacking US crosswalks to talk like Zuck is as easy as 1234 (The Register) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 21 Apr 2025 20:10:00 -0000</pubDate>
      <itunes:title>When fake fixes hide real attacks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2291</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Adversary nations are using ClickFix in cyber espionage campaigns. Japan’s Financial Services Agency issues an urgent warning after hundreds of millions in unauthorized trades. The critical Erlang/OTP’s SSH vulnerability now has public exploits. A flawed rollout of a new Microsoft Entra app triggers widespread account lockouts.  The alleged operator of SmokeLoader malware faces federal hacking charges. A new scam blends social engineering, malware, and NFC tech to drain bank accounts. GSA employees may have been oversharing sensitive documents. Yoni Shohet, Co-Founder and CEO of Valence Security, who cautions financial organizations of coming Chinese open source AI. Crosswalks in the crosshairs of satirical hacking.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
We are joined by Yoni Shohet, Co-Founder and CEO of Valence Security, discussing how the onslaught of more open source AI tools coming out of China will be difficult to manage for companies especially those in the financial sector.

Selected Reading
North Korea, Iran, Russia-Backed Hackers Deploy ClickFix in New Attacks (Hackread)
Countries Shore Up Their Digital Defenses as Global Tensions Raise the Threat of Cyberwarfare (SecurityWeek)
Japan warns of hundreds of millions of dollars in unauthorized trades from hacked accounts (The Record)
Critical Erlang/OTP SSH RCE bug now has public exploits, patch now (Bleeping Computer)
Widespread Microsoft Entra lockouts tied to new security feature rollout (Bleeping Computer)
Alleged SmokeLoader malware operator facing federal charges in Vermont (The Record)
New payment-card scam involves a phone call, some malware and a personal tap (The Record)
Sensitive files, including White House floor plans, shared with thousands (The Washington Post)
Hacking US crosswalks to talk like Zuck is as easy as 1234 (The Register) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Adversary nations are using ClickFix in cyber espionage campaigns. Japan’s Financial Services Agency issues an urgent warning after hundreds of millions in unauthorized trades. The critical Erlang/OTP’s SSH vulnerability now has public exploits. A flawed rollout of a new Microsoft Entra app triggers widespread account lockouts.  The alleged operator of SmokeLoader malware faces federal hacking charges. A new scam blends social engineering, malware, and NFC tech to drain bank accounts. GSA employees may have been oversharing sensitive documents. Yoni Shohet, Co-Founder and CEO of Valence Security, who cautions financial organizations of coming Chinese open source AI. Crosswalks in the crosshairs of satirical hacking.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>We are joined by <a href="https://www.linkedin.com/in/yonishohet/">Yoni Shohet</a>, Co-Founder and CEO of <a href="https://www.linkedin.com/company/valence-security/">Valence Security</a>, discussing how the onslaught of more open source AI tools coming out of China will be difficult to manage for companies especially those in the financial sector.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://hackread.com/north-korea-iran-russia-hackers-clickfix-attacks/">North Korea, Iran, Russia-Backed Hackers Deploy ClickFix in New Attacks</a> (Hackread)</p><p><a href="https://www.securityweek.com/countries-shore-up-their-digital-defenses-as-global-tensions-raise-the-threat-of-cyberwarfare/">Countries Shore Up Their Digital Defenses as Global Tensions Raise the Threat of Cyberwarfare</a> (SecurityWeek)</p><p><a href="https://therecord.media/japan-warns-of-unauthorized-trades-hacked-accounts">Japan warns of hundreds of millions of dollars in unauthorized trades from hacked accounts</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/public-exploits-released-for-critical-erlang-otp-ssh-flaw-patch-now/">Critical Erlang/OTP SSH RCE bug now has public exploits, patch now</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/widespread-microsoft-entra-lockouts-tied-to-new-security-feature-rollout/">Widespread Microsoft Entra lockouts tied to new security feature rollout</a> (Bleeping Computer)</p><p><a href="https://therecord.media/alleged-smokeloader-operator-charged-in-vermont">Alleged SmokeLoader malware operator facing federal charges in Vermont</a> (The Record)</p><p><a href="https://therecord.media/new-payment-card-scam-involves-malware-tap">New payment-card scam involves a phone call, some malware and a personal tap</a> (The Record)</p><p><a href="https://www.washingtonpost.com/politics/2025/04/20/trump-biden-sensitive-documents-shared/">Sensitive files, including White House floor plans, shared with thousands</a> (The Washington Post)</p><p><a href="https://www.theregister.com/2025/04/19/us_crosswalk_button_hacking/">Hacking US crosswalks to talk like Zuck is as easy as 1234</a> (The Register) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1536</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bd3fcd48-1c7a-11f0-85e0-bff925de534b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1045934635.mp3?updated=1745263294" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rich Hale: Understanding the data. [CTO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/64/notes</link>
      <description>Please enjoy this encore episode of Career Notes.
Chief Technology Officer of ActiveNav Rich Hale takes us through his career aspirations of board game designer (one he has yet to realize), through his experience with the Royal Air Force to the commercial sector where his firm works to secure dark data. During his time in the Air Force, Rich was fortunate to serve on a wide range of different platforms from training aircraft to bombers, and all the way into procurement and policy. Transitioning to the commercial sector, Rich notes he was well prepared for some aspects, but lacking in some he's made up on his own. Rich likes to lead with vision and empower his teams. He counsels that you should not fear making a career change, but be sure to look twice before making the leap. We thank Rich for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 20 Apr 2025 07:00:00 -0000</pubDate>
      <itunes:title>Rich Hale: Understanding the data. [CTO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>64</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bfe77b42-1c8c-11f0-96c4-93414713ab8d/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore episode of Career Notes.
Chief Technology Officer of ActiveNav Rich Hale takes us through his career aspirations of board game designer (one he has yet to realize), through his experience with the Royal Air Force to the commercial sector where his firm works to secure dark data. During his time in the Air Force, Rich was fortunate to serve on a wide range of different platforms from training aircraft to bombers, and all the way into procurement and policy. Transitioning to the commercial sector, Rich notes he was well prepared for some aspects, but lacking in some he's made up on his own. Rich likes to lead with vision and empower his teams. He counsels that you should not fear making a career change, but be sure to look twice before making the leap. We thank Rich for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Career Notes.</p><p>Chief Technology Officer of ActiveNav Rich Hale takes us through his career aspirations of board game designer (one he has yet to realize), through his experience with the Royal Air Force to the commercial sector where his firm works to secure dark data. During his time in the Air Force, Rich was fortunate to serve on a wide range of different platforms from training aircraft to bombers, and all the way into procurement and policy. Transitioning to the commercial sector, Rich notes he was well prepared for some aspects, but lacking in some he's made up on his own. Rich likes to lead with vision and empower his teams. He counsels that you should not fear making a career change, but be sure to look twice before making the leap. We thank Rich for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>469</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bfe77b42-1c8c-11f0-96c4-93414713ab8d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4706481739.mp3?updated=1745003758" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Crafting malware with modern metals. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/373/notes</link>
      <description>This week, we are joined by Nick Cerne, Security Consultant from Bishop Fox, to discuss "Rust for Malware Development." In pursuit of simulating real adversarial tactics, this blog explores the use of Rust for malware development, contrasting it with C in terms of binary complexity, detection evasion, and reverse engineering challenges. 
The author demonstrates how Rust's inherent anti-analysis traits and memory safety features can create more evasive malware tooling, including a simple dropper that injects shellcode using lesser-known Windows APIs. Through hands-on comparisons and decompiled output analysis, the post highlights Rust’s growing appeal in offensive security while noting key OPSEC considerations and tooling limitations.

The research can be found here:
Rust for Malware Development

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Apr 2025 07:00:00 -0000</pubDate>
      <itunes:title>Crafting malware with modern metals. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>373</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7fc5a1c4-1c87-11f0-8792-db434f6be066/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Nick Cerne, Security Consultant from Bishop Fox, to discuss "Rust for Malware Development." In pursuit of simulating real adversarial tactics, this blog explores the use of Rust for malware development, contrasting it with C in terms of binary complexity, detection evasion, and reverse engineering challenges. 
The author demonstrates how Rust's inherent anti-analysis traits and memory safety features can create more evasive malware tooling, including a simple dropper that injects shellcode using lesser-known Windows APIs. Through hands-on comparisons and decompiled output analysis, the post highlights Rust’s growing appeal in offensive security while noting key OPSEC considerations and tooling limitations.

The research can be found here:
Rust for Malware Development

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/nick-cerne/">Nick Cerne</a>, Security Consultant from <a href="https://www.linkedin.com/company/bishop-fox/">Bishop Fox</a>, to discuss "Rust for Malware Development." In pursuit of simulating real adversarial tactics, this blog explores the use of Rust for malware development, contrasting it with C in terms of binary complexity, detection evasion, and reverse engineering challenges. </p><p>The author demonstrates how Rust's inherent anti-analysis traits and memory safety features can create more evasive malware tooling, including a simple dropper that injects shellcode using lesser-known Windows APIs. Through hands-on comparisons and decompiled output analysis, the post highlights Rust’s growing appeal in offensive security while noting key OPSEC considerations and tooling limitations.</p><h3><br></h3><h3>The research can be found here:</h3><ul><li><a href="https://bishopfox.com/blog/rust-for-malware-development">Rust for Malware Development</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1023</itunes:duration>
      <guid isPermaLink="false"><![CDATA[7fc5a1c4-1c87-11f0-8792-db434f6be066]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3205647513.mp3?updated=1745002500" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SSH-attered trust.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2290/notes</link>
      <description>A critical vulnerability in Erlang/OTP SSH allows unauthenticated remote code execution. There’s a bipartisan effort to renew a key cybersecurity info sharing law. A newly discovered Linux kernel vulnerability allows local attackers to escalate privileges. A researcher uncovers 57 risky Chrome extensions with a combined 6 million users. AttackIQ shares StrelaStealer simulations. A major live events service provider notifies employees and customers of a data breach. CISA warns of an actively exploited SonicWall vulnerability. An airport retailer agrees to a multi-million dollar settlement stemming from a ransomware attack. A preview of RSAC 2025 with Linda Gray Martin and Britta Glade. Zoom-a-zoom zoom, it’s always DNS. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today Dave sits down with Linda Gray Martin, Chief of Staff, and Britta Glade, SVP of Content and Communities, from RSAC sharing what is new at RSAC 2025.

Selected Reading
Critical Erlang/OTP SSH pre-auth RCE is 'Surprisingly Easy' to exploit, patch now (Bleeping Computer)
Bipartisan duo wants to renew 10-year-old cyberthreat information sharing law (The Record)
Linux Kernel Vulnerability Let Attackers Escalate Privilege – PoC Released (Cyber Security News)
Chrome extensions with 6 million installs have hidden tracking code (Bleeping Computer)
Emulating the Stealthy StrelaStealer Malware (AttackIQ)
Live Events Giant Legends International Hacked (SecurityWeek)
CISA tags SonicWall VPN flaw as actively exploited in attacks (Bleeping Computer)
Airport retailer agrees to $6.9 million settlement over ransomware data breach (The Record)
Global Zoom Outage Caused by Server Block Imposed from GoDaddy Registry (Cyber Security News)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 18 Apr 2025 20:10:00 -0000</pubDate>
      <itunes:title>SSH-attered trust.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2290</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A critical vulnerability in Erlang/OTP SSH allows unauthenticated remote code execution. There’s a bipartisan effort to renew a key cybersecurity info sharing law. A newly discovered Linux kernel vulnerability allows local attackers to escalate privileges. A researcher uncovers 57 risky Chrome extensions with a combined 6 million users. AttackIQ shares StrelaStealer simulations. A major live events service provider notifies employees and customers of a data breach. CISA warns of an actively exploited SonicWall vulnerability. An airport retailer agrees to a multi-million dollar settlement stemming from a ransomware attack. A preview of RSAC 2025 with Linda Gray Martin and Britta Glade. Zoom-a-zoom zoom, it’s always DNS. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today Dave sits down with Linda Gray Martin, Chief of Staff, and Britta Glade, SVP of Content and Communities, from RSAC sharing what is new at RSAC 2025.

Selected Reading
Critical Erlang/OTP SSH pre-auth RCE is 'Surprisingly Easy' to exploit, patch now (Bleeping Computer)
Bipartisan duo wants to renew 10-year-old cyberthreat information sharing law (The Record)
Linux Kernel Vulnerability Let Attackers Escalate Privilege – PoC Released (Cyber Security News)
Chrome extensions with 6 million installs have hidden tracking code (Bleeping Computer)
Emulating the Stealthy StrelaStealer Malware (AttackIQ)
Live Events Giant Legends International Hacked (SecurityWeek)
CISA tags SonicWall VPN flaw as actively exploited in attacks (Bleeping Computer)
Airport retailer agrees to $6.9 million settlement over ransomware data breach (The Record)
Global Zoom Outage Caused by Server Block Imposed from GoDaddy Registry (Cyber Security News)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A critical vulnerability in Erlang/OTP SSH allows unauthenticated remote code execution. There’s a bipartisan effort to renew a key cybersecurity info sharing law. A newly discovered Linux kernel vulnerability allows local attackers to escalate privileges. A researcher uncovers 57 risky Chrome extensions with a combined 6 million users. AttackIQ shares StrelaStealer simulations. A major live events service provider notifies employees and customers of a data breach. CISA warns of an actively exploited SonicWall vulnerability. An airport retailer agrees to a multi-million dollar settlement stemming from a ransomware attack. A preview of RSAC 2025 with Linda Gray Martin and Britta Glade. Zoom-a-zoom zoom, it’s always DNS.<strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today Dave sits down with <a href="https://www.linkedin.com/in/linda-gray-martin-223708/">Linda Gray Martin</a>, Chief of Staff, and <a href="https://www.linkedin.com/in/britta-glade-5251003/">Britta Glade</a>, SVP of Content and Communities, from <a href="https://www.rsaconference.com/usa?utm_paid_source=googleads&amp;utm_paid_campaign=North%20America%20-%20Brand%20-%20North%20America&amp;utm_paid_content=brand&amp;utm_paid_term=rsac&amp;gad_source=1&amp;gclid=Cj0KCQjwzYLABhD4ARIsALySuCSbsuyJQ2X6lA97HiCEVEMGbZP9NJbbxqOL5V_eEWsnDxuQo9JaTloaAqZMEALw_wcB">RSAC</a> sharing what is new at RSAC 2025.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/critical-erlang-otp-ssh-pre-auth-rce-is-surprisingly-easy-to-exploit-patch-now/">Critical Erlang/OTP SSH pre-auth RCE is 'Surprisingly Easy' to exploit, patch now</a> (Bleeping Computer)</p><p><a href="https://therecord.media/cybersecurity-information-sharing-act-2015-renewal-rounds-peters">Bipartisan duo wants to renew 10-year-old cyberthreat information sharing law</a> (The Record)</p><p><a href="https://cybersecuritynews.com/linux-kernel-vulnerability-escalate-privilege/">Linux Kernel Vulnerability Let Attackers Escalate Privilege – PoC Released</a><a href="https://cybersecuritynews.com/linux-kernel-vulnerability-escalate-privilege/"> </a>(Cyber Security News)</p><p><a href="https://www.bleepingcomputer.com/news/security/chrome-extensions-with-6-million-installs-have-hidden-tracking-code/">Chrome extensions with 6 million installs have hidden tracking code</a> (Bleeping Computer)</p><p><a href="https://www.attackiq.com/2025/04/17/emulating-strelastealer/">Emulating the Stealthy StrelaStealer Malware</a> (AttackIQ)</p><p><a href="https://www.securityweek.com/live-events-giant-legends-international-hacked/">Live Events Giant Legends International Hacked</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-tags-sonicwall-vpn-flaw-as-actively-exploited-in-attacks/">CISA tags SonicWall VPN flaw as actively exploited in attacks</a> (Bleeping Computer)</p><p><a href="https://therecord.media/airport-retailer-agrees-to-settlement-ransomware-data-breach">Airport retailer agrees to $6.9 million settlement over ransomware data breach</a> (The Record)</p><p><a href="https://cybersecuritynews.com/global-zoom-outage/">Global Zoom Outage Caused by Server Block Imposed from GoDaddy Registry</a> (Cyber Security News)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1621</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[728b4070-d378-11ef-84f5-bb724c523097]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3424080040.mp3?updated=1744999598" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Microsoft squashes windows server bug.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2289/notes</link>
      <description>Microsoft issues emergency updates for Windows Server. Apple releases emergency security updates to patch two zero-days. CISA averts a CVE program disruption. Researchers uncover Windows versions of the BrickStorm backdoor. Atlassian and Cisco patch several high-severity vulnerabilities. An Oklahoma cybersecurity CEO is charged with hacking a local hospital. A Fortune 500 financial firm reports an insider data breach. Researchers unmask IP addresses behind the Medusa Ransomware Group. CISA issues a warning following an Oracle data breach. On our Industry Voices segment, we are joined by Rob Allen, Chief Product Officer at ThreatLocker, to discuss a layered approach to zero trust. Former CISA director Chris Krebs steps down from his role at SentinelOne.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Industry Voices
On our Industry Voices segment, we are joined by Rob Allen, Chief Product Officer at ThreatLocker, to discuss a layered approach to zero trust.

Selected Reading
New Windows Server emergency updates fix container launch issue (Bleeping Computer)
Apple fixes two zero-days exploited in targeted iPhone attacks (Bleeping Computer)
CISA Throws Lifeline to CVE Program with Last-Minute Contract Extension (Infosecurity Magazine)
MITRE Hackers' Backdoor Has Targeted Windows for Years (SecurityWeek)
Vulnerabilities Patched in Atlassian, Cisco Products (SecurityWeek)
Edmond cybersecurity CEO accused in major hack at hospital (KOCO News)
Fortune 500 firm's ex-employee exposes thousands of clients (Cybernews)
Researchers Deanonymized Medusa Ransomware Group's Onion Site (Cyber Security News)
CISA warns of potential data breaches caused by legacy Oracle Cloud leak (The Record)
Krebs Exits SentinelOne After Security Clearance Pulled (SecurityWeek)
The top 10 ThreatLocker policies for 2025 (ThreatLocker)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 17 Apr 2025 20:20:00 -0000</pubDate>
      <itunes:title>Microsoft squashes windows server bug.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2289</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Microsoft issues emergency updates for Windows Server. Apple releases emergency security updates to patch two zero-days. CISA averts a CVE program disruption. Researchers uncover Windows versions of the BrickStorm backdoor. Atlassian and Cisco patch several high-severity vulnerabilities. An Oklahoma cybersecurity CEO is charged with hacking a local hospital. A Fortune 500 financial firm reports an insider data breach. Researchers unmask IP addresses behind the Medusa Ransomware Group. CISA issues a warning following an Oracle data breach. On our Industry Voices segment, we are joined by Rob Allen, Chief Product Officer at ThreatLocker, to discuss a layered approach to zero trust. Former CISA director Chris Krebs steps down from his role at SentinelOne.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Industry Voices
On our Industry Voices segment, we are joined by Rob Allen, Chief Product Officer at ThreatLocker, to discuss a layered approach to zero trust.

Selected Reading
New Windows Server emergency updates fix container launch issue (Bleeping Computer)
Apple fixes two zero-days exploited in targeted iPhone attacks (Bleeping Computer)
CISA Throws Lifeline to CVE Program with Last-Minute Contract Extension (Infosecurity Magazine)
MITRE Hackers' Backdoor Has Targeted Windows for Years (SecurityWeek)
Vulnerabilities Patched in Atlassian, Cisco Products (SecurityWeek)
Edmond cybersecurity CEO accused in major hack at hospital (KOCO News)
Fortune 500 firm's ex-employee exposes thousands of clients (Cybernews)
Researchers Deanonymized Medusa Ransomware Group's Onion Site (Cyber Security News)
CISA warns of potential data breaches caused by legacy Oracle Cloud leak (The Record)
Krebs Exits SentinelOne After Security Clearance Pulled (SecurityWeek)
The top 10 ThreatLocker policies for 2025 (ThreatLocker)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft issues emergency updates for Windows Server. Apple releases emergency security updates to patch two zero-days. CISA averts a CVE program disruption. Researchers uncover Windows versions of the BrickStorm backdoor. Atlassian and Cisco patch several high-severity vulnerabilities. An Oklahoma cybersecurity CEO is charged with hacking a local hospital. A Fortune 500 financial firm reports an insider data breach. Researchers unmask IP addresses behind the Medusa Ransomware Group. CISA issues a warning following an Oracle data breach. On our Industry Voices segment, we are joined by Rob Allen, Chief Product Officer at ThreatLocker, to discuss a layered approach to zero trust. Former CISA director Chris Krebs steps down from his role at SentinelOne.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Industry Voices</h2><p>On our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/threatlockerrob/">Rob Allen</a>, Chief Product Officer at <a href="https://www.threatlocker.com/">ThreatLocker</a>, to discuss a layered approach to zero trust.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/microsoft/new-windows-server-emergency-updates-fix-container-launch-issue/">New Windows Server emergency updates fix container launch issue</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/apple-fixes-two-zero-days-exploited-in-targeted-iphone-attacks/">Apple fixes two zero-days exploited in targeted iPhone attacks</a> (Bleeping Computer)</p><p><a href="https://www.infosecurity-magazine.com/news/cisa-cve-program-mitre-contract/">CISA Throws Lifeline to CVE Program with Last-Minute Contract Extension</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/mitre-hackers-backdoor-has-targeted-windows-for-years/">MITRE Hackers' Backdoor Has Targeted Windows for Years</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/vulnerabilities-patched-in-atlassian-cisco-products/">Vulnerabilities Patched in Atlassian, Cisco Products</a> (SecurityWeek)</p><p><a href="https://www.koco.com/article/edmond-cybersecurity-ceo-accused-major-hack-at-hospital/64505584">Edmond cybersecurity CEO accused in major hack at hospital</a> (KOCO News)</p><p><a href="https://cnews.link/ameriprise-financial-advisor-data-breach-clients-1/">Fortune 500 firm's ex-employee exposes thousands of clients</a> (Cybernews)</p><p><a href="https://cybersecuritynews.com/researchers-deanonymized-medusa-ransomware/">Researchers Deanonymized Medusa Ransomware Group's Onion Site</a> (Cyber Security News)</p><p><a href="https://therecord.media/cisa-warns-of-potential-data-breaches-tied-to-oracle-issue">CISA warns of potential data breaches caused by legacy Oracle Cloud leak</a> (The Record)</p><p><a href="https://www.securityweek.com/krebs-exits-sentinelone-after-security-clearance-pulled/">Krebs Exits SentinelOne After Security Clearance Pulled</a> (SecurityWeek)</p><p><a href="https://www.threatlocker.com/blog/top-10-threatlocker-policies-for-2025?utm_source=cyberwire_n2k&amp;utm_medium=sponsor&amp;utm_campaign=rob_allen_industy_voices_layered_zero_trust_q2_25&amp;utm_content=rob_allen_industy_voices_layered_zero_trust&amp;utm_term=podcast">The top 10 ThreatLocker policies for 2025</a> (ThreatLocker)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1806</itunes:duration>
      <guid isPermaLink="false"><![CDATA[724fcb9e-d378-11ef-84f5-f3726640a34e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3602605790.mp3?updated=1744920293" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CVE program gets last-minute lifeline.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2288/notes</link>
      <description>The CVE program gets a last-minute reprieve. A federal whistleblower alleges a security breach at the NLRB. Texas votes to spin up their very own Cyber Command. BreachForums suffers another takedown. A watchdog group sues the federal government over SignalGate allegations. The SEC Chair reveals a 2016 hack. ResolverRAT targets the healthcare and pharmaceutical sectors worldwide. Microsoft warns of blue screen crashes following recent updates. On our CertByte segment, Chris Hare is joined by Troy McMillan to break down a question targeting the EC-Council® Certified Ethical Hacker (CEH) exam. 4chan gets Soyjacked. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K. In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by Troy McMillan to break down a question targeting the EC-Council® Certified Ethical Hacker (CEH) exam. Today’s question comes from N2K’s EC-Council Certified Ethical Hacker CEH (312-50) Practice Test.
Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify.To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro. 
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.

Selected Reading
Funding Expires for Key Cyber Vulnerability Database (Krebs on Security)
CISA extends funding to ensure 'no lapse in critical CVE services' (Bleeping Computer)
CVE Foundation (CVE Foundation)
NoVa govcon firm Mitre to lay off 442 employees after DOGE cuts contracts (Virginia Business)
Federal employee alleges DOGE activity resulted in data breach at labor board (NBC News)
Whistleblower claims DOGE took sensitive data - now he’s being hounded by threatening notes (CNN via YouTube)
New state agency to deal with cyber threats advances in Texas House (Texarkana Gazette)
BreachForums taken down by the FBI? Dark Storm hackers say they did it “for fun” (Cybernews)
Here’s What Happened to Those SignalGate Messages (WIRED)
After breach, SEC says hackers used stolen data to buy stocks (CNET)
New ResolverRAT malware targets pharma and healthcare orgs worldwide (Bleeping Computer)
Microsoft warns of blue screen crashes caused by April updates (Bleeping Computer)
Infamous message board 4chan taken down following major hack (Bleeping Computer) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 16 Apr 2025 20:10:00 -0000</pubDate>
      <itunes:title>CVE program gets last-minute lifeline.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2288</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The CVE program gets a last-minute reprieve. A federal whistleblower alleges a security breach at the NLRB. Texas votes to spin up their very own Cyber Command. BreachForums suffers another takedown. A watchdog group sues the federal government over SignalGate allegations. The SEC Chair reveals a 2016 hack. ResolverRAT targets the healthcare and pharmaceutical sectors worldwide. Microsoft warns of blue screen crashes following recent updates. On our CertByte segment, Chris Hare is joined by Troy McMillan to break down a question targeting the EC-Council® Certified Ethical Hacker (CEH) exam. 4chan gets Soyjacked. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K. In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by Troy McMillan to break down a question targeting the EC-Council® Certified Ethical Hacker (CEH) exam. Today’s question comes from N2K’s EC-Council Certified Ethical Hacker CEH (312-50) Practice Test.
Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify.To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro. 
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.

Selected Reading
Funding Expires for Key Cyber Vulnerability Database (Krebs on Security)
CISA extends funding to ensure 'no lapse in critical CVE services' (Bleeping Computer)
CVE Foundation (CVE Foundation)
NoVa govcon firm Mitre to lay off 442 employees after DOGE cuts contracts (Virginia Business)
Federal employee alleges DOGE activity resulted in data breach at labor board (NBC News)
Whistleblower claims DOGE took sensitive data - now he’s being hounded by threatening notes (CNN via YouTube)
New state agency to deal with cyber threats advances in Texas House (Texarkana Gazette)
BreachForums taken down by the FBI? Dark Storm hackers say they did it “for fun” (Cybernews)
Here’s What Happened to Those SignalGate Messages (WIRED)
After breach, SEC says hackers used stolen data to buy stocks (CNET)
New ResolverRAT malware targets pharma and healthcare orgs worldwide (Bleeping Computer)
Microsoft warns of blue screen crashes caused by April updates (Bleeping Computer)
Infamous message board 4chan taken down following major hack (Bleeping Computer) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The CVE program gets a last-minute reprieve. A federal whistleblower alleges a security breach at the NLRB. Texas votes to spin up their very own Cyber Command. BreachForums suffers another takedown. A watchdog group sues the federal government over SignalGate allegations. The SEC Chair reveals a 2016 hack. ResolverRAT targets the healthcare and pharmaceutical sectors worldwide. Microsoft warns of blue screen crashes following recent updates. On our CertByte segment, Chris Hare is joined by Troy McMillan to break down a question targeting the EC-Council® Certified Ethical Hacker (CEH) exam. 4chan gets Soyjacked. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CertByte Segment</h2><p>Welcome to CertByte! On this bi-weekly segment hosted by <a href="https://www.linkedin.com/in/chrisharepmp/">Chris Hare</a>, a content developer and project management specialist at <a href="https://www.n2k.com/?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1740605340384.1740674526462.317&amp;__hssc=223811332.1.1740674526462&amp;__hsfp=3850742519">N2K</a>. In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by<a href="https://www.linkedin.com/in/troy-mcmillan-834a632/"> Troy McMillan</a> to break down a question targeting the EC-Council® Certified Ethical Hacker (CEH) exam. Today’s question comes from<a href="https://certify.cybervista.net/products/ec-council/certified-ethical-hacker-practice-test/"> N2K’s EC-Council Certified Ethical Hacker CEH (312-50) Practice Test</a>.</p><p>Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify.To get the full news to knowledge experience, learn more about our N2K Pro subscription at<a href="https://thecyberwire.com/pro"> https://thecyberwire.com/pro</a>. </p><p>Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://krebsonsecurity.com/2025/04/funding-expires-for-key-cyber-vulnerability-database/">Funding Expires for Key Cyber Vulnerability Database</a> (Krebs on Security)</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-extends-funding-to-ensure-no-lapse-in-critical-cve-services/">CISA extends funding to ensure 'no lapse in critical CVE services'</a> (Bleeping Computer)</p><p><a href="https://www.thecvefoundation.org/">CVE Foundation</a> (CVE Foundation)</p><p><a href="https://virginiabusiness.com/nova-govcon-firm-mitre-to-lay-off-442-employees-after-doge-cuts-contracts/">NoVa govcon firm Mitre to lay off 442 employees after DOGE cuts contracts</a> (Virginia Business)</p><p><a href="https://www.nbcnews.com/tech/security/federal-employee-alleges-doge-activity-resulted-data-breach-labor-boar-rcna201425">Federal employee alleges DOGE activity resulted in data breach at labor board</a> (NBC News)</p><p><a href="https://www.youtube.com/watch?v=TsqgXfrSksI">Whistleblower claims DOGE took sensitive data - now he’s being hounded by threatening notes</a> (CNN via YouTube)</p><p><a href="https://www.texarkanagazette.com/news/2025/apr/15/new-state-agency-to-deal-with-cyber-threats/">New state agency to deal with cyber threats advances in Texas House</a> (Texarkana Gazette)</p><p><a href="https://cnews.link/breachforums-dark-storm-ddos-cyberattack-fbi-hackers-1/">BreachForums taken down by the FBI? Dark Storm hackers say they did it “for fun”</a> (Cybernews)</p><p><a href="https://www.wired.com/story/heres-what-happened-to-those-signalgate-messages/">Here’s What Happened to Those SignalGate Messages</a> (WIRED)</p><p><a href="https://www.cnet.com/personal-finance/investing/after-breach-sec-says-hackers-used-stolen-data-to-buy-stocks/">After breach, SEC says hackers used stolen data to buy stocks</a> (CNET)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-resolverrat-malware-targets-pharma-and-healthcare-orgs-worldwide/">New ResolverRAT malware targets pharma and healthcare orgs worldwide</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-of-blue-screen-crashes-caused-by-april-updates/">Microsoft warns of blue screen crashes caused by April updates</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/infamous-message-board-4chan-taken-down-following-major-hack/">Infamous message board 4chan taken down following major hack</a> (Bleeping Computer) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1659</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[721346ce-d378-11ef-84f5-bb478bb5c05a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2209373803.mp3?updated=1744829285" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OCC breach jolts financial sector.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2287/notes</link>
      <description>Some U.S. banks pause electronic communications with the OCC following a major breach of the agency’s email system. Uncertainty spreads at CISA. China accuses three alleged U.S. operatives of conducting cyberattacks during February’s Asian Games. Microsoft Teams suffers filesharing issues. Fraudsters use ChatGPT to create fake passports. Car rental giant Hertz confirms data stolen in last year’s Cleo breach. Researchers describe a novel process injection method called Waiting Thread Hijacking. A new macOS malware-as-a-service threat is being sold on underground forums. A UK man is sentenced to over eight years for masterminding the LabHost phishing platform. Kim Jones joins us with a preview of the newly relaunched CISO Perspective podcast.  David Moulton  from Unit 42 sits down with Rob Wright, Security News Director at Informa TechTarget for the latest Threat Vector. Fighting the flood of AI generated experts.  
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Kim Jones joins Dave to launch the newly rebranded CISO Perspectives—formerly CSO Perspectives. We’re excited to welcome a fresh voice to the mic as Kim takes the helm. In this premiere episode, he’s joined by Ed Adams for a candid conversation about the evolving role of the CISO and the big question on everyone’s mind: Is the cyber talent ecosystem broken? Tune in as Kim kicks off this next chapter—same mission, sharper focus, new perspective.

Threat Vector Segment
The cybersecurity industry is full of headlines, but are we paying attention to the right ones? In this segment of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, sits down with Rob Wright, Security News Director at Informa TechTarget, to discuss the stories the industry overlooks, the overhyped AI security fears, and the real risks posed by certificate authorities. You can listen to the full conversation here and catch new episodes of Threat Vector each Thursday on your favorite podcast app. 

Selected Reading
OCC Hack: JPMorgan, BNY Limit Information Sharing With Agency After Breach (Bloomberg)
CISA Braces for Major Workforce Cuts Amid Security Fears (BankInfo Security)
China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games (SecurityWeek)
Microsoft Teams File Sharing Outage, Users Unable to Share Files (Cyber Security News)
ChatGPT Image Generator Abused for Fake Passport Production (GB Hackers)
Hertz says personal, sensitive data stolen in Cleo attacks (The Register)
Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking (Check Point Research)
macOS Users Beware! Hackers Allegedly Offering Full System Control Malware for Rent (Cyber Security News)
LabHost Phishing Mastermind Sentenced to 8.5 Years (Infosecurity Magazine)
Virtual reality: The widely-quoted media experts who are not what they seem (Press Gazette) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Apr 2025 20:10:00 -0000</pubDate>
      <itunes:title>OCC breach jolts financial sector.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2287</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Some U.S. banks pause electronic communications with the OCC following a major breach of the agency’s email system. Uncertainty spreads at CISA. China accuses three alleged U.S. operatives of conducting cyberattacks during February’s Asian Games. Microsoft Teams suffers filesharing issues. Fraudsters use ChatGPT to create fake passports. Car rental giant Hertz confirms data stolen in last year’s Cleo breach. Researchers describe a novel process injection method called Waiting Thread Hijacking. A new macOS malware-as-a-service threat is being sold on underground forums. A UK man is sentenced to over eight years for masterminding the LabHost phishing platform. Kim Jones joins us with a preview of the newly relaunched CISO Perspective podcast.  David Moulton  from Unit 42 sits down with Rob Wright, Security News Director at Informa TechTarget for the latest Threat Vector. Fighting the flood of AI generated experts.  
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Kim Jones joins Dave to launch the newly rebranded CISO Perspectives—formerly CSO Perspectives. We’re excited to welcome a fresh voice to the mic as Kim takes the helm. In this premiere episode, he’s joined by Ed Adams for a candid conversation about the evolving role of the CISO and the big question on everyone’s mind: Is the cyber talent ecosystem broken? Tune in as Kim kicks off this next chapter—same mission, sharper focus, new perspective.

Threat Vector Segment
The cybersecurity industry is full of headlines, but are we paying attention to the right ones? In this segment of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, sits down with Rob Wright, Security News Director at Informa TechTarget, to discuss the stories the industry overlooks, the overhyped AI security fears, and the real risks posed by certificate authorities. You can listen to the full conversation here and catch new episodes of Threat Vector each Thursday on your favorite podcast app. 

Selected Reading
OCC Hack: JPMorgan, BNY Limit Information Sharing With Agency After Breach (Bloomberg)
CISA Braces for Major Workforce Cuts Amid Security Fears (BankInfo Security)
China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games (SecurityWeek)
Microsoft Teams File Sharing Outage, Users Unable to Share Files (Cyber Security News)
ChatGPT Image Generator Abused for Fake Passport Production (GB Hackers)
Hertz says personal, sensitive data stolen in Cleo attacks (The Register)
Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking (Check Point Research)
macOS Users Beware! Hackers Allegedly Offering Full System Control Malware for Rent (Cyber Security News)
LabHost Phishing Mastermind Sentenced to 8.5 Years (Infosecurity Magazine)
Virtual reality: The widely-quoted media experts who are not what they seem (Press Gazette) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Some U.S. banks pause electronic communications with the OCC following a major breach of the agency’s email system. Uncertainty spreads at CISA. China accuses three alleged U.S. operatives of conducting cyberattacks during February’s Asian Games. Microsoft Teams suffers filesharing issues. Fraudsters use ChatGPT to create fake passports. Car rental giant Hertz confirms data stolen in last year’s Cleo breach. Researchers describe a novel process injection method called Waiting Thread Hijacking. A new macOS malware-as-a-service threat is being sold on underground forums. A UK man is sentenced to over eight years for masterminding the LabHost phishing platform. Kim Jones joins us with a preview of the newly relaunched CISO Perspective podcast.  David Moulton  from Unit 42 sits down with Rob Wright, Security News Director at Informa TechTarget for the latest Threat Vector. Fighting the flood of AI generated experts. <strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/kimjones-cism/">Kim Jones</a> joins Dave to launch the newly rebranded <a href="https://thecyberwire.com/podcasts/cso-perspectives">CISO Perspectives</a>—formerly <em>CSO Perspectives</em>. We’re excited to welcome a fresh voice to the mic as Kim takes the helm. In this premiere episode, he’s joined by <a href="https://www.linkedin.com/in/edadamsboston/">Ed Adams</a> for a candid conversation about the evolving role of the CISO and the big question on everyone’s mind: <em>Is the cyber talent ecosystem broken?</em> Tune in as Kim kicks off this next chapter—same mission, sharper focus, new perspective.</p><p><br></p><h2>Threat Vector Segment</h2><p>The cybersecurity industry is full of headlines, but are we paying attention to the right ones? In this segment of <a href="https://thecyberwire.com/podcasts/threat-vector">Threat Vector</a>, host <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a>, Director of Thought Leadership at Unit 42, sits down with <a href="https://www.linkedin.com/in/rob-wright-4b6a6610/">Rob Wright</a>, Security News Director at Informa TechTarget, to discuss the stories the industry overlooks, the overhyped AI security fears, and the real risks posed by certificate authorities. You can listen to the full conversation <a href="https://thecyberwire.com/podcasts/threat-vector/62/notes">here</a> and catch new episodes of Threat Vector each Thursday on your favorite podcast app. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bloomberg.com/news/articles/2025-04-14/jpmorgan-bny-limit-information-sharing-with-occ-after-hack">OCC Hack: JPMorgan, BNY Limit Information Sharing With Agency After Breach</a> (Bloomberg)</p><p><a href="https://www.bankinfosecurity.com/cisa-braces-for-major-workforce-cuts-amid-security-fears-a-27996">CISA Braces for Major Workforce Cuts Amid Security Fears</a> (BankInfo Security)</p><p><a href="https://www.securityweek.com/china-pursuing-3-alleged-us-operatives-over-cyberattacks-during-asian-games/">China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/microsoft-teams-faces-file-sharing-outage/">Microsoft Teams File Sharing Outage, Users Unable to Share Files</a> (Cyber Security News)</p><p><a href="https://gbhackers.com/chatgpt-image-generator-abused/">ChatGPT Image Generator Abused for Fake Passport Production</a> (GB Hackers)</p><p><a href="https://www.theregister.com/2025/04/15/hertz_cleo_customer_data/">Hertz says personal, sensitive data stolen in Cleo attacks</a> (The Register)</p><p><a href="https://research.checkpoint.com/2025/waiting-thread-hijacking/">Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking</a> (Check Point Research)</p><p><a href="https://cybersecuritynews.com/hackers-macos-full-system-control-malwares-for-rent/">macOS Users Beware! Hackers Allegedly Offering Full System Control Malware for Rent</a> (Cyber Security News)</p><p><a href="https://www.infosecurity-magazine.com/news/labhost-phishing-mastermind/">LabHost Phishing Mastermind Sentenced to 8.5 Years</a> (Infosecurity Magazine)</p><p><a href="https://pressgazette.co.uk/publishers/digital-journalism/virtual-reality-the-widely-quoted-media-experts-who-are-not-what-they-seem/">Virtual reality: The widely-quoted media experts who are not what they seem</a> (Press Gazette) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1956</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[71d4e65e-d378-11ef-84f5-d35f12b7435a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7002568731.mp3?updated=1744746341" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI ambitions clash with cyber caution.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2286/notes</link>
      <description>The Department of the Interior removes top cybersecurity and tech officials. The DOJ looks to block foreign adversaries from acquiring sensitive personal data of U.S. citizens. Microsoft issues emergency updates to fix an Active Directory bug. Hackers are installing stealth backdoors on FortiGate devices. Researchers warn of a rise in “Dangling DNS” attacks. A pair of class action lawsuits allege a major adtech firm secretly tracks users online without consent. Google is fixing a 20-year-old Chrome privacy flaw. The Tycoon2FA phishing-as-a-service platform continues to evolve. My guest is Tim Starks from CyberScoop, discussing the latest from CISA and Chris Krebs. Slopsquatting AI totally harshes the supply chain vibe. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today we are joined by Tim Starks from CyberScoop, and he is discussing the latest with CISA and Chris Krebs.

Selected Reading
Interior Department Ousts Key Cyber Leaders Amid DOGE Spat (Data Breach Today)
US Blocks Foreign Governments from Acquiring Citizen Data (Infosecurity Magazine)
Microsoft: New emergency Windows updates fix AD policy issues (Bleeping Origin)
Fortinet Issues Fixes After Attackers Bypass Patches to Maintain Access (Hackread)
Dangling DNS Attack Let Hackers Gain Control Over Organization’s Subdomain (Cyber Security News)
Two Lawsuits Allege The Trade Desk Secretly Violates Consumer Privacy Laws (AdTech)
Chrome 136 fixes 20-year browser history privacy risk (Bleeping Computer)
Tycoon2FA phishing kit targets Microsoft 365 with new tricks (Bleeping Computer)
AI Hallucinations Create a New Software Supply Chain Threat (SecurityWeek)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 14 Apr 2025 20:10:00 -0000</pubDate>
      <itunes:title>AI ambitions clash with cyber caution.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2286</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The Department of the Interior removes top cybersecurity and tech officials. The DOJ looks to block foreign adversaries from acquiring sensitive personal data of U.S. citizens. Microsoft issues emergency updates to fix an Active Directory bug. Hackers are installing stealth backdoors on FortiGate devices. Researchers warn of a rise in “Dangling DNS” attacks. A pair of class action lawsuits allege a major adtech firm secretly tracks users online without consent. Google is fixing a 20-year-old Chrome privacy flaw. The Tycoon2FA phishing-as-a-service platform continues to evolve. My guest is Tim Starks from CyberScoop, discussing the latest from CISA and Chris Krebs. Slopsquatting AI totally harshes the supply chain vibe. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today we are joined by Tim Starks from CyberScoop, and he is discussing the latest with CISA and Chris Krebs.

Selected Reading
Interior Department Ousts Key Cyber Leaders Amid DOGE Spat (Data Breach Today)
US Blocks Foreign Governments from Acquiring Citizen Data (Infosecurity Magazine)
Microsoft: New emergency Windows updates fix AD policy issues (Bleeping Origin)
Fortinet Issues Fixes After Attackers Bypass Patches to Maintain Access (Hackread)
Dangling DNS Attack Let Hackers Gain Control Over Organization’s Subdomain (Cyber Security News)
Two Lawsuits Allege The Trade Desk Secretly Violates Consumer Privacy Laws (AdTech)
Chrome 136 fixes 20-year browser history privacy risk (Bleeping Computer)
Tycoon2FA phishing kit targets Microsoft 365 with new tricks (Bleeping Computer)
AI Hallucinations Create a New Software Supply Chain Threat (SecurityWeek)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Department of the Interior removes top cybersecurity and tech officials. The DOJ looks to block foreign adversaries from acquiring sensitive personal data of U.S. citizens. Microsoft issues emergency updates to fix an Active Directory bug. Hackers are installing stealth backdoors on FortiGate devices. Researchers warn of a rise in “Dangling DNS” attacks. A pair of class action lawsuits allege a major adtech firm secretly tracks users online without consent. Google is fixing a 20-year-old Chrome privacy flaw. The Tycoon2FA phishing-as-a-service platform continues to evolve. My guest is Tim Starks from CyberScoop, discussing the latest from CISA and Chris Krebs. Slopsquatting AI totally harshes the supply chain vibe.<strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today we are joined by <a href="https://www.linkedin.com/in/tstarks/">Tim Starks</a> from <a href="https://www.linkedin.com/company/cyberscoop/">CyberScoop</a>, and he is discussing the latest with CISA and Chris Krebs.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.databreachtoday.com/interior-department-ousts-key-cyber-leaders-amid-doge-spat-a-27977">Interior Department Ousts Key Cyber Leaders Amid DOGE Spat</a> (Data Breach Today)</p><p><a href="https://www.infosecurity-magazine.com/news/us-foreign-governments-acquiring/">US Blocks Foreign Governments from Acquiring Citizen Data</a> (Infosecurity Magazine)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-new-emergency-windows-updates-fix-ad-policy-issues/">Microsoft: New emergency Windows updates fix AD policy issues</a> (Bleeping Origin)</p><p><a href="https://hackread.com/fortinet-fixe-attackers-bypass-patches-maintain-access/">Fortinet Issues Fixes After Attackers Bypass Patches to Maintain Access</a> (Hackread)</p><p><a href="https://cybersecuritynews.com/dangling-dns-attack-let-hackers-gain-control/">Dangling DNS Attack Let Hackers Gain Control Over Organization’s Subdomain</a> (Cyber Security News)</p><p><a href="https://www.adweek.com/programmatic/lawsuits-trade-desk-consumer-privacy-laws/">Two Lawsuits Allege The Trade Desk Secretly Violates Consumer Privacy Laws</a> (AdTech)</p><p><a href="https://www.bleepingcomputer.com/news/security/chrome-136-fixes-20-year-browser-history-privacy-risk/">Chrome 136 fixes 20-year browser history privacy risk</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/tycoon2fa-phishing-kit-targets-microsoft-365-with-new-tricks/">Tycoon2FA phishing kit targets Microsoft 365 with new tricks</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/ai-hallucinations-create-a-new-software-supply-chain-threat/">AI Hallucinations Create a New Software Supply Chain Threat</a> (SecurityWeek)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1692</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7198cf70-d378-11ef-84f5-5f45cca4f104]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2690989556.mp3?updated=1744655679" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jennifer Walsmith: Pioneering and defining possible. [Cyber Solutions] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/63/notes</link>
      <description>Please enjoy this encore of Career Notes. 
Vice President for Cyber and Information Solutions within Mission Systems at Northrop Grumman, Jennifer Walsmith takes us on her pioneering career journey. Following in her father's footsteps at the National Security Agency, Jennifer began her career out of high school in computer systems analysis. Jennifer notes she saw the value of a college degree and at her parents' urging attended night school. She completed her bachelors in computer science at University of Maryland, Baltimore County with the support of the NSA. Jennifer talks about the support of her team at NSA where she was one of the first women to have a career and a family, raising two children while working. Upon retirement from government service, Jennifer chose an organization with values that closely matched her own and uses her position to help her team define possible where they sometimes think they can't. We thank Jennifer for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 13 Apr 2025 07:00:00 -0000</pubDate>
      <itunes:title>Jennifer Walsmith: Pioneering and defining possible. [Cyber Solutions] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>63</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9db1190a-10a9-11f0-af03-a3a20eafb314/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 
Vice President for Cyber and Information Solutions within Mission Systems at Northrop Grumman, Jennifer Walsmith takes us on her pioneering career journey. Following in her father's footsteps at the National Security Agency, Jennifer began her career out of high school in computer systems analysis. Jennifer notes she saw the value of a college degree and at her parents' urging attended night school. She completed her bachelors in computer science at University of Maryland, Baltimore County with the support of the NSA. Jennifer talks about the support of her team at NSA where she was one of the first women to have a career and a family, raising two children while working. Upon retirement from government service, Jennifer chose an organization with values that closely matched her own and uses her position to help her team define possible where they sometimes think they can't. We thank Jennifer for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p><p>Vice President for Cyber and Information Solutions within Mission Systems at Northrop Grumman, Jennifer Walsmith takes us on her pioneering career journey. Following in her father's footsteps at the National Security Agency, Jennifer began her career out of high school in computer systems analysis. Jennifer notes she saw the value of a college degree and at her parents' urging attended night school. She completed her bachelors in computer science at University of Maryland, Baltimore County with the support of the NSA. Jennifer talks about the support of her team at NSA where she was one of the first women to have a career and a family, raising two children while working. Upon retirement from government service, Jennifer chose an organization with values that closely matched her own and uses her position to help her team define possible where they sometimes think they can't. We thank Jennifer for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>564</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9db1190a-10a9-11f0-af03-a3a20eafb314]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7743616696.mp3?updated=1743698345" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The new malware on the block. [OMITB]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/10/notes</link>
      <description>This week, we are sharing an episode of our monthly show, Only Malware in the Building. We invite you to join Dave Bittner and cohost Selena Larson as they explore "The new malware on the block."

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner —and our newest totally unbiased co-host, Archy, a highly sophisticated AI robot who swears they have no ulterior motives (but we’re keeping an eye on them just in case).
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about the latest shake-ups in the fake update threat landscape, including two new cybercriminal actors, fresh Mac malware, and the growing challenge of tracking these evolving campaigns.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Apr 2025 07:00:00 -0000</pubDate>
      <itunes:title>The new malware on the block.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/1e055db0-16ee-11f0-b6f5-e7892393ba3f/image/d9f0cdb0dcdd515f0dfd92da4cc68fb2.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This week, we are sharing an episode of our monthly show, Only Malware in the Building. We invite you to join Dave Bittner and cohost Selena Larson as they explore "The new malware on the block."

Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner —and our newest totally unbiased co-host, Archy, a highly sophisticated AI robot who swears they have no ulterior motives (but we’re keeping an eye on them just in case).
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about the latest shake-ups in the fake update threat landscape, including two new cybercriminal actors, fresh Mac malware, and the growing challenge of tracking these evolving campaigns.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong><em>This week, we are sharing an episode of our monthly show, Only Malware in the Building. We invite you to join Dave Bittner and cohost Selena Larson as they explore "The new malware on the block."</em></strong></p><p><br></p><p>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is <a href="https://www.linkedin.com/in/selenalarson/">Selena Larson</a>, <a href="https://www.proofpoint.com/">Proofpoint</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">DISCARDED</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by <a href="https://www.n2k.com/">N2K Networks</a> <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> —and our newest <em>totally</em> unbiased co-host, Archy, a highly sophisticated AI robot who swears they have <em>no</em> ulterior motives (but we’re keeping an eye on them just in case).</p><p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about the latest shake-ups in the <a href="https://www.proofpoint.com/us/blog/threat-insight/update-fake-updates-two-new-actors-and-new-mac-malware">fake update threat landscape</a>, including two new cybercriminal actors, fresh Mac malware, and the growing challenge of tracking these evolving campaigns.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1983</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1e055db0-16ee-11f0-b6f5-e7892393ba3f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6015130929.mp3?updated=1741033653" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA shrinks while threats grow.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2285/notes</link>
      <description>CISA braces for widespread staffing cuts. Russian hackers target a Western military mission in Ukraine. China acknowledges Volt Typhoon. The U.S. signs on to global spyware restrictions. A lab supporting Planned Parenthood confirms a data breach. Threat actors steal metadata from unsecured Amazon EC2 instances. A critical WordPress plugin vulnerability is under active exploitation. A new analysis details a critical unauthenticated remote code execution flaw affecting Ivanti products. Joining us today is Johannes Ullrich, Dean of Research at SANS Technology Institute, with his take on "Vibe Security." Does AI understand, and does that ultimately matter? 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Joining us today is Johannes Ullrich, Dean of Research at SANS Technology Institute, discussing "Vibe Security," similar to “Vibe Coding” where security teams overly rely on AI to do their job.

Selected Reading
Trump administration planning major workforce cuts at CISA (The Record)
Cybersecurity industry falls silent as Trump turns ire on SentinelOne (Reuters)
Russian hackers attack Western military mission using malicious drive (Bleeping Computer)
China Admitted to US That It Conducted Volt Typhoon Attacks: Report (SecurityWeek)
US to sign Pall Mall pact aimed at countering spyware abuses (The Record)
US lab testing provider exposed health data of 1.6 million people (Bleeping Computer)
Amazon EC2 instance metadata targeted in SSRF attacks (SC Media)
Vulnerability in OttoKit WordPress Plugin Exploited in the Wild (SecurityWeek)
Ivanti 0-day RCE Vulnerability Exploitation Details Disclosed (Cyber Security News)
Experts Debate: Do AI Chatbots Truly Understand? (IEEE Spectrum)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 11 Apr 2025 20:20:00 -0000</pubDate>
      <itunes:title>CISA shrinks while threats grow.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2285</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA braces for widespread staffing cuts. Russian hackers target a Western military mission in Ukraine. China acknowledges Volt Typhoon. The U.S. signs on to global spyware restrictions. A lab supporting Planned Parenthood confirms a data breach. Threat actors steal metadata from unsecured Amazon EC2 instances. A critical WordPress plugin vulnerability is under active exploitation. A new analysis details a critical unauthenticated remote code execution flaw affecting Ivanti products. Joining us today is Johannes Ullrich, Dean of Research at SANS Technology Institute, with his take on "Vibe Security." Does AI understand, and does that ultimately matter? 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Joining us today is Johannes Ullrich, Dean of Research at SANS Technology Institute, discussing "Vibe Security," similar to “Vibe Coding” where security teams overly rely on AI to do their job.

Selected Reading
Trump administration planning major workforce cuts at CISA (The Record)
Cybersecurity industry falls silent as Trump turns ire on SentinelOne (Reuters)
Russian hackers attack Western military mission using malicious drive (Bleeping Computer)
China Admitted to US That It Conducted Volt Typhoon Attacks: Report (SecurityWeek)
US to sign Pall Mall pact aimed at countering spyware abuses (The Record)
US lab testing provider exposed health data of 1.6 million people (Bleeping Computer)
Amazon EC2 instance metadata targeted in SSRF attacks (SC Media)
Vulnerability in OttoKit WordPress Plugin Exploited in the Wild (SecurityWeek)
Ivanti 0-day RCE Vulnerability Exploitation Details Disclosed (Cyber Security News)
Experts Debate: Do AI Chatbots Truly Understand? (IEEE Spectrum)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA braces for widespread staffing cuts. Russian hackers target a Western military mission in Ukraine. China acknowledges Volt Typhoon. The U.S. signs on to global spyware restrictions. A lab supporting Planned Parenthood confirms a data breach. Threat actors steal metadata from unsecured Amazon EC2 instances. A critical WordPress plugin vulnerability is under active exploitation. A new analysis details a critical unauthenticated remote code execution flaw affecting Ivanti products. Joining us today is Johannes Ullrich, Dean of Research at SANS Technology Institute, with his take on "Vibe Security." Does AI understand, and does that ultimately matter? </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Joining us today is <a href="https://www.linkedin.com/in/johannesullrich/">Johannes Ullrich</a>, Dean of Research at <a href="https://www.sans.edu/">SANS Technology Institute</a>, discussing "Vibe Security," similar to “Vibe Coding” where security teams overly rely on AI to do their job.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/trump-administration-planning-workforce-cuts-at-cisa">Trump administration planning major workforce cuts at CISA</a> (The Record)</p><p><a href="https://www.reuters.com/world/us/cybersecurity-industry-falls-silent-trump-turns-ire-sentinelone-2025-04-10/">Cybersecurity industry falls silent as Trump turns ire on SentinelOne</a> (Reuters)</p><p><a href="https://www.bleepingcomputer.com/news/security/russian-hackers-attack-western-military-mission-using-malicious-drive/">Russian hackers attack Western military mission using malicious drive</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/china-admitted-to-us-that-it-conducted-volt-typhoon-attacks-report/">China Admitted to US That It Conducted Volt Typhoon Attacks: Report </a>(SecurityWeek)</p><p><a href="https://therecord.media/us-to-sign-pall-mall-process-code-of-practice-spyware">US to sign Pall Mall pact aimed at countering spyware abuses</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/us-lab-testing-provider-exposed-health-data-of-16-million-people/">US lab testing provider exposed health data of 1.6 million people</a> (Bleeping Computer)</p><p><a href="https://www.scworld.com/news/amazon-ec2-instance-metadata-targeted-in-ssrf-attacks">Amazon EC2 instance metadata targeted in SSRF attacks</a> (SC Media)</p><p><a href="https://www.securityweek.com/vulnerability-in-ottokit-wordpress-plugin-exploited-in-the-wild/">Vulnerability in OttoKit WordPress Plugin Exploited in the Wild</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/ivanti-0-day-rce-vulnerability/">Ivanti 0-day RCE Vulnerability Exploitation Details Disclosed</a> (Cyber Security News)</p><p><a href="https://spectrum.ieee.org/ai-chatbot">Experts Debate: Do AI Chatbots Truly Understand?</a> (IEEE Spectrum)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1566</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[715c3efc-d378-11ef-84f5-abd0987c3523]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1008235770.mp3?updated=1744395047" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Former cybersecurity officials lose clearances.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2284/notes</link>
      <description>Trump targets former cybersecurity officials. Senator blocks CISA nominee over telecom security concerns. The acting head of NSA and Cyber Command makes his public debut. Escalation of Cyber Tensions in U.S.-China Trade Relations. Researchers evaluate the effectiveness of Large Language Models (LLMs) in automating Cyber Threat Intelligence. Hackers at Black Hat Asia pown a Nissan Leaf. A smart hub vulnerability exposes WiFi credentials. A new report reveals routers’ riskiness. Operation Endgames nabs SmokeLoader botnet users. Our guest is Anushika Babu, Chief Growth Officer at AppSecEngineer, joins us to discuss the creative ways people are using AI. The folks behind the Flipper Zero get busy.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Anushika Babu, Chief Growth Officer at AppSecEngineer, joins us to discuss the creative ways people are using AI.

Selected Reading
Trump Signs Memorandum Revoking Security Clearance of Former CISA Director Chris Krebs (Zero Day)
Senator puts hold on Trump's nominee for CISA director, citing telco security 'cover up' (TechCrunch)
Infosec experts fear China could retaliate against tariffs with a Typhoon attack (The Register)
New US Cyber Command, NSA chief glides in first public appearance (The Record)
LARGE LANGUAGE MODELS ARE UNRELIABLE FOR CYBER THREAT INTELLIGENCE (ARXIG)
Nissan Leaf Hacked for Remote Spying, Physical Takeover (SecurityWeek)
TP-Link IoT Smart Hub Vulnerability Exposes Wi-Fi Credentials (Cyber Security News)
Study Identifies 20 Most Vulnerable Connected Devices of 2025 (SecurityWeek)
Authorities Seized Smokeloader Malware Operators &amp; Seized Servers (Cyber Security News)
Flipper Zero maker unveils ‘Busy Bar,’ a new ADHD productivity tool (Bleeping Computer)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 10 Apr 2025 20:00:00 -0000</pubDate>
      <itunes:title>Former cybersecurity officials lose clearances.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2284</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Trump targets former cybersecurity officials. Senator blocks CISA nominee over telecom security concerns. The acting head of NSA and Cyber Command makes his public debut. Escalation of Cyber Tensions in U.S.-China Trade Relations. Researchers evaluate the effectiveness of Large Language Models (LLMs) in automating Cyber Threat Intelligence. Hackers at Black Hat Asia pown a Nissan Leaf. A smart hub vulnerability exposes WiFi credentials. A new report reveals routers’ riskiness. Operation Endgames nabs SmokeLoader botnet users. Our guest is Anushika Babu, Chief Growth Officer at AppSecEngineer, joins us to discuss the creative ways people are using AI. The folks behind the Flipper Zero get busy.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Anushika Babu, Chief Growth Officer at AppSecEngineer, joins us to discuss the creative ways people are using AI.

Selected Reading
Trump Signs Memorandum Revoking Security Clearance of Former CISA Director Chris Krebs (Zero Day)
Senator puts hold on Trump's nominee for CISA director, citing telco security 'cover up' (TechCrunch)
Infosec experts fear China could retaliate against tariffs with a Typhoon attack (The Register)
New US Cyber Command, NSA chief glides in first public appearance (The Record)
LARGE LANGUAGE MODELS ARE UNRELIABLE FOR CYBER THREAT INTELLIGENCE (ARXIG)
Nissan Leaf Hacked for Remote Spying, Physical Takeover (SecurityWeek)
TP-Link IoT Smart Hub Vulnerability Exposes Wi-Fi Credentials (Cyber Security News)
Study Identifies 20 Most Vulnerable Connected Devices of 2025 (SecurityWeek)
Authorities Seized Smokeloader Malware Operators &amp; Seized Servers (Cyber Security News)
Flipper Zero maker unveils ‘Busy Bar,’ a new ADHD productivity tool (Bleeping Computer)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Trump targets former cybersecurity officials. Senator blocks CISA nominee over telecom security concerns. The acting head of NSA and Cyber Command makes his public debut. Escalation of Cyber Tensions in U.S.-China Trade Relations. Researchers evaluate the effectiveness of Large Language Models (LLMs) in automating Cyber Threat Intelligence. Hackers at Black Hat Asia pown a Nissan Leaf. A smart hub vulnerability exposes WiFi credentials. A new report reveals routers’ riskiness. Operation Endgames nabs SmokeLoader botnet users. Our guest is Anushika Babu, Chief Growth Officer at AppSecEngineer, joins us to discuss the creative ways people are using AI. The folks behind the Flipper Zero get busy.</p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p><br></p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/dr-anushika-babu-vadlamudi-ba449193/">Anushika Babu</a>, Chief Growth Officer at <a href="https://www.appsecengineer.com/">AppSecEngineer</a>, joins us to discuss the creative ways people are using AI.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.zetter-zeroday.com/trump-signs-memorandum-revoking-security-clearance-of-former-cisa-director-chris-krebs/">Trump Signs Memorandum Revoking Security Clearance of Former CISA Director Chris Krebs</a> (Zero Day)</p><p><a href="https://techcrunch.com/2025/04/09/senator-puts-hold-on-trumps-nominee-for-cisa-director-citing-telco-security-cover-up/">Senator puts hold on Trump's nominee for CISA director, citing telco security 'cover up'</a> (TechCrunch)</p><p><a href="https://www.theregister.com/2025/04/10/trade_war_reaches_cyberspace/">Infosec experts fear China could retaliate against tariffs with a Typhoon attack</a> (The Register)</p><p><a href="https://therecord.media/hartman-cyber-command-nsa-first-senate-apperance">New US Cyber Command, NSA chief glides in first public appearance</a> (The Record)</p><p><a href="https://arxiv.org/pdf/2503.23175">LARGE LANGUAGE MODELS ARE UNRELIABLE FOR CYBER THREAT INTELLIGENCE</a> (ARXIG)</p><p><a href="https://www.securityweek.com/nissan-leaf-hacked-for-remote-spying-physical-takeover/">Nissan Leaf Hacked for Remote Spying, Physical Takeover</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/tp-link-iot-smart-hub-vulnerability/">TP-Link IoT Smart Hub Vulnerability Exposes Wi-Fi Credentials</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/study-identifies-20-most-vulnerable-connected-devices-of-2025/">Study Identifies 20 Most Vulnerable Connected Devices of 2025</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/authorities-seized-smokeloader-malware/">Authorities Seized Smokeloader Malware Operators &amp; Seized Servers</a> (Cyber Security News)</p><p><a href="https://www.bleepingcomputer.com/news/technology/flipper-zero-maker-unveils-busy-bar-a-new-adhd-productivity-tool/">Flipper Zero maker unveils ‘Busy Bar,’ a new ADHD productivity tool</a> (Bleeping Computer)</p><p><br></p><h2>Share your feedback.</h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p><br></p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1591</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[712239e6-d378-11ef-84f5-03b0edc23e62]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9358557971.mp3?updated=1744311948" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Major breach at the US Treasury’s OCC. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2283/notes</link>
      <description>Treasury’s OCC reports a major email breach. Patch Tuesday updates. A critical vulnerability in AWS Systems Manager (SSM) Agent allowed attackers to execute arbitrary code with root privileges.  Experts urge Congress to keep strict export controls to help slow China’s progress in AI. A critical bug in WhatsApp for Windows allows malicious code execution.CISA adds multiple advisories on actively exploited vulnerabilities. Insider threat allegations rock a major Maryland medical center. Microsoft’s Ann Johnson from Afternoon Cyber Tea is joined by Jack Rhysider, the creator and host of the acclaimed podcast Darknet Diaries. Feds Aim to Rewrite Social Security Code in Record Time. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In this episode of Afternoon Cyber Tea, Ann Johnson is joined by Jack Rhysider, the creator and host of the acclaimed podcast Darknet Diaries. You can hear the full conversation here. Be sure to catch new episodes of Afternoon Cyber Tea every other Tuesday on N2K CyberWIre and your favorite podcast app. 

Selected Reading
Treasury's OCC Says Hackers Had Access to 150,000 Emails (SecurityWeek)
Microsoft Fixes Over 130 CVEs in April Patch Tuesday (Infosecurity Magazine)
Vulnerabilities Patched by Ivanti, VMware, Zoom (SecurityWeek)
Fortinet Patches Critical FortiSwitch Vulnerability (SecurityWeek)
ICS Patch Tuesday: Vulnerabilities Addressed by Rockwell, ABB, Siemens, Schneider (SecurityWeek)
AWS Systems Manager Plugin Vulnerability Let Attackers Execute Arbitrary Code (Cyber Security News)
Tech experts recommend full steam ahead on US export controls for AI (CyberScoop)
Don't open that file in WhatsApp for Windows just yet (The Register)
CISA Warns of Microsoft Windows CLFS Vulnerability Exploited in Wild (Cyber Security News)
CISA Urges Urgent Patching for Exploited CentreStack, Windows Zero-Days (SecurityWeek)
Pharmacist accused of spying on women using work, home cams (The Register)
DOGE Plans to Rebuild SSA Code Base in Months, Risking Benefits and System Collapse (WIRED) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 09 Apr 2025 20:00:00 -0000</pubDate>
      <itunes:title>Major breach at the US Treasury’s OCC. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2283</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Treasury’s OCC reports a major email breach. Patch Tuesday updates. A critical vulnerability in AWS Systems Manager (SSM) Agent allowed attackers to execute arbitrary code with root privileges.  Experts urge Congress to keep strict export controls to help slow China’s progress in AI. A critical bug in WhatsApp for Windows allows malicious code execution.CISA adds multiple advisories on actively exploited vulnerabilities. Insider threat allegations rock a major Maryland medical center. Microsoft’s Ann Johnson from Afternoon Cyber Tea is joined by Jack Rhysider, the creator and host of the acclaimed podcast Darknet Diaries. Feds Aim to Rewrite Social Security Code in Record Time. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In this episode of Afternoon Cyber Tea, Ann Johnson is joined by Jack Rhysider, the creator and host of the acclaimed podcast Darknet Diaries. You can hear the full conversation here. Be sure to catch new episodes of Afternoon Cyber Tea every other Tuesday on N2K CyberWIre and your favorite podcast app. 

Selected Reading
Treasury's OCC Says Hackers Had Access to 150,000 Emails (SecurityWeek)
Microsoft Fixes Over 130 CVEs in April Patch Tuesday (Infosecurity Magazine)
Vulnerabilities Patched by Ivanti, VMware, Zoom (SecurityWeek)
Fortinet Patches Critical FortiSwitch Vulnerability (SecurityWeek)
ICS Patch Tuesday: Vulnerabilities Addressed by Rockwell, ABB, Siemens, Schneider (SecurityWeek)
AWS Systems Manager Plugin Vulnerability Let Attackers Execute Arbitrary Code (Cyber Security News)
Tech experts recommend full steam ahead on US export controls for AI (CyberScoop)
Don't open that file in WhatsApp for Windows just yet (The Register)
CISA Warns of Microsoft Windows CLFS Vulnerability Exploited in Wild (Cyber Security News)
CISA Urges Urgent Patching for Exploited CentreStack, Windows Zero-Days (SecurityWeek)
Pharmacist accused of spying on women using work, home cams (The Register)
DOGE Plans to Rebuild SSA Code Base in Months, Risking Benefits and System Collapse (WIRED) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Treasury’s OCC reports a major email breach. Patch Tuesday updates. A critical vulnerability in AWS Systems Manager (SSM) Agent allowed attackers to execute arbitrary code with root privileges.  Experts urge Congress to keep strict export controls to help slow China’s progress in AI. A critical bug in WhatsApp for Windows allows malicious code execution.CISA adds multiple advisories on actively exploited vulnerabilities. Insider threat allegations rock a major Maryland medical center. Microsoft’s Ann Johnson from Afternoon Cyber Tea is joined by Jack Rhysider, the creator and host of the acclaimed podcast Darknet Diaries. Feds Aim to Rewrite Social Security Code in Record Time. </p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p><br></p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>In this episode of <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea</a>, <a href="https://www.linkedin.com/in/ann-johnsons/">Ann Johnson</a> is joined by <a href="https://www.linkedin.com/in/jack-rhysider-02922a167/">Jack Rhysider</a>, the creator and host of the acclaimed podcast Darknet Diaries. You can hear the full conversation <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea/104/notes">here</a>. Be sure to catch new episodes of Afternoon Cyber Tea every other Tuesday on <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">N2K CyberWIre</a> and your favorite podcast app. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/treasurys-occ-says-hackers-had-access-to-150000-emails/">Treasury's OCC Says Hackers Had Access to 150,000 Emails</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-fixes-130-cves-april/">Microsoft Fixes Over 130 CVEs in April Patch Tuesday</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/vulnerabilities-patched-by-ivanti-vmware-zoom/">Vulnerabilities Patched by Ivanti, VMware, Zoom</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/fortinet-patches-critical-fortiswitch-vulnerability/">Fortinet Patches Critical FortiSwitch Vulnerability</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-rockwell-abb-siemens-schneider/">ICS Patch Tuesday: Vulnerabilities Addressed by Rockwell, ABB, Siemens, Schneider</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/aws-systems-manager-plugin-vulnerability/">AWS Systems Manager Plugin Vulnerability Let Attackers Execute Arbitrary Code</a> (Cyber Security News)</p><p><a href="https://cyberscoop.com/china-deepseek-export-controls-congress-i/">Tech experts recommend full steam ahead on US export controls for AI</a> (CyberScoop)</p><p><a href="https://www.theregister.com/2025/04/08/whatsapp_windows_bug/">Don't open that file in WhatsApp for Windows just yet</a> (The Register)</p><p><a href="https://cybersecuritynews.com/cisa-warns-of-microsoft-windows-clfs-vulnerability/">CISA Warns of Microsoft Windows CLFS Vulnerability Exploited in Wild</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/cisa-urges-urgent-patching-for-exploited-centrestack-windows-zero-days/">CISA Urges Urgent Patching for Exploited CentreStack, Windows Zero-Days</a> (SecurityWeek)</p><p><a href="https://www.theregister.com/2025/04/09/pharmacist_accused_of_cyber_voyeurism/">Pharmacist accused of spying on women using work, home cams</a> (The Register)</p><p><a href="https://www.wired.com/story/doge-rebuild-social-security-administration-cobol-benefits/">DOGE Plans to Rebuild SSA Code Base in Months, Risking Benefits and System Collapse</a> (WIRED) </p><p><br></p><h2>Share your feedback.</h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p><br></p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1373</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[70e650ca-d378-11ef-84f5-ef4bc93754db]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2520044593.mp3?updated=1744311901" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Using AI to sniff out opposition.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2282/notes</link>
      <description>Is DOGE using AI to monitor federal employees? Google’s latest Android update addresses two zero-days. Scattered Spider continues its phishing and malware campaigns. Ransomware’s grip is slipping. ToddyCat exploits a critical flaw in ESET products. Oracle privately confirms a legacy system breach. Over 5,000 Ivanti Connect Secure appliances remain exposed online to a critical remote code execution vulnerability. CISA confirms active exploitation of a critical vulnerability in CrushFTP. In our Industry Voices segment, we are joined by Matt Radolec, VP of Incident Response at Varonis, on turning to gamers to to Build Resilient Cyber Teams. AI outphishes human red teams. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In our Industry Voices segment, we are joined by Matt Radolec, VP of Incident Response, Cloud Operations &amp; SE EU from Varonis, as he is discussing research on “From Gamer to Leader: How to Build Resilient Cyber Teams.” Catch Matt’s keynote at RSAC 2025 on April 30th. 

Selected Reading
Exclusive: Musk's DOGE using AI to snoop on U.S. federal workers, sources say (Reuters)
Tariff Wars: The Technology Impact (BankInfo Security)
Google Patched Android 0-Day Vulnerability Exploited in the Wild (Cyber Security News) 
Scattered Spider adds new phishing kit, malware to its web (The Register)
Ransomware Underground Faces Declining Relevance (BankInfo Security)
ESET Vulnerability Exploited for Stealthy Malware Execution (SecurityWeek)
Oracle Confirms that Hackers Broke Systems &amp; Stole Client Login Credentials (Cyber Security News) 
Exploited Vulnerability Puts 5,000 Ivanti VPN Appliances at Risk (SecurityWeek)
CISA Warns of CrushFTP Vulnerability Exploitation in the Wild (Infosecurity Magazine)
AI Outsmarts Human Red Teams in Phishing Tests (GovInfo Security)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Apr 2025 20:00:00 -0000</pubDate>
      <itunes:title>Using AI to sniff out opposition.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2282</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Is DOGE using AI to monitor federal employees? Google’s latest Android update addresses two zero-days. Scattered Spider continues its phishing and malware campaigns. Ransomware’s grip is slipping. ToddyCat exploits a critical flaw in ESET products. Oracle privately confirms a legacy system breach. Over 5,000 Ivanti Connect Secure appliances remain exposed online to a critical remote code execution vulnerability. CISA confirms active exploitation of a critical vulnerability in CrushFTP. In our Industry Voices segment, we are joined by Matt Radolec, VP of Incident Response at Varonis, on turning to gamers to to Build Resilient Cyber Teams. AI outphishes human red teams. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In our Industry Voices segment, we are joined by Matt Radolec, VP of Incident Response, Cloud Operations &amp; SE EU from Varonis, as he is discussing research on “From Gamer to Leader: How to Build Resilient Cyber Teams.” Catch Matt’s keynote at RSAC 2025 on April 30th. 

Selected Reading
Exclusive: Musk's DOGE using AI to snoop on U.S. federal workers, sources say (Reuters)
Tariff Wars: The Technology Impact (BankInfo Security)
Google Patched Android 0-Day Vulnerability Exploited in the Wild (Cyber Security News) 
Scattered Spider adds new phishing kit, malware to its web (The Register)
Ransomware Underground Faces Declining Relevance (BankInfo Security)
ESET Vulnerability Exploited for Stealthy Malware Execution (SecurityWeek)
Oracle Confirms that Hackers Broke Systems &amp; Stole Client Login Credentials (Cyber Security News) 
Exploited Vulnerability Puts 5,000 Ivanti VPN Appliances at Risk (SecurityWeek)
CISA Warns of CrushFTP Vulnerability Exploitation in the Wild (Infosecurity Magazine)
AI Outsmarts Human Red Teams in Phishing Tests (GovInfo Security)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Is DOGE using AI to monitor federal employees? Google’s latest Android update addresses two zero-days. Scattered Spider continues its phishing and malware campaigns. Ransomware’s grip is slipping. ToddyCat exploits a critical flaw in ESET products. Oracle privately confirms a legacy system breach. Over 5,000 Ivanti Connect Secure appliances remain exposed online to a critical remote code execution vulnerability. CISA confirms active exploitation of a critical vulnerability in CrushFTP. In our Industry Voices segment, we are joined by Matt Radolec, VP of Incident Response at Varonis, on turning to gamers to to Build Resilient Cyber Teams. AI outphishes human red teams. </p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p><br></p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>In our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/matthew-radolec/">Matt Radolec</a>, VP of Incident Response, Cloud Operations &amp; SE EU from <a href="https://www.linkedin.com/company/varonis/">Varonis</a>, as he is discussing research on “From Gamer to Leader: How to Build Resilient Cyber Teams.” Catch Matt’s <a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1737040234564001Td9r?_gl=1*g5ztug*_gcl_aw*R0NMLjE3NDQxMjY4MjEuQ2p3S0NBandrdE9fQmhCckVpd0FWNzBqWGtyN05tQ3BreDVncC1RN0RXY1F1djRsYzNYOHRVRTFMY2FxRjhxZy16MkdJMXFOVV9SdjZ4b0MzRVVRQXZEX0J3RQ..*_gcl_au*NTY4OTQ0NzQ2LjE3NDE5MDIwNzQ.*_ga*MzY0MTQ0NzQ1LjE3NDE5MDIwNzQ.*_ga_Q3JZKF3KQM*MTc0NDEyNjgxNS40LjEuMTc0NDEyNjg4Mi4wLjAuMjA5MzQzNTgwOA..">keynote</a> at RSAC 2025 on April 30th. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.reuters.com/technology/artificial-intelligence/musks-doge-using-ai-snoop-us-federal-workers-sources-say-2025-04-08/">Exclusive: Musk's DOGE using AI to snoop on U.S. federal workers, sources say</a> (Reuters)</p><p><a href="https://www.bankinfosecurity.com/blogs/tariff-wars-technology-impact-p-3849">Tariff Wars: The Technology Impact</a> (BankInfo Security)</p><p><a href="https://cybersecuritynews.com/google-patched-android-0-day-vulnerability/">Google Patched Android 0-Day Vulnerability Exploited in the Wild</a> (Cyber Security News) </p><p><a href="https://www.theregister.com/2025/04/08/scattered_spider_updates/">Scattered Spider adds new phishing kit, malware to its web</a> (The Register)</p><p><a href="https://www.bankinfosecurity.com/blogs/ransomware-underground-faces-declining-relevance-p-3850">Ransomware Underground Faces Declining Relevance</a> (BankInfo Security)</p><p><a href="https://www.securityweek.com/eset-vulnerability-exploited-for-stealthy-malware-execution/">ESET Vulnerability Exploited for Stealthy Malware Execution</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/oracle-confirms-that-hackers-broke-systems/">Oracle Confirms that Hackers Broke Systems &amp; Stole Client Login Credentials</a> (Cyber Security News) </p><p><a href="https://www.securityweek.com/exploited-vulnerability-puts-5000-ivanti-vpn-appliances-at-risk/">Exploited Vulnerability Puts 5,000 Ivanti VPN Appliances at Risk</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/crushftp-vulnerability-cisa-kev/">CISA Warns of CrushFTP Vulnerability Exploitation in the Wild</a> (Infosecurity Magazine)</p><p><a href="https://www.govinfosecurity.com/ai-outsmarts-human-red-teams-in-phishing-tests-a-27945">AI Outsmarts Human Red Teams in Phishing Tests</a> (GovInfo Security)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p><br></p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1883</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[70a8b2f6-d378-11ef-84f5-0fce90c41376]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2751356561.mp3?updated=1744138933" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>UK Apple showdown gonna be public.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2281/notes</link>
      <description>UK court blocks government's attempt to keep Apple encryption case secret. Port of Seattle says last year's breach affected 90,000 people. Verizon Call Filter App flaw exposes millions' call records. Hackers hit Australian pension funds. A global threat hiding in plain sight. Cybercriminals are yelling CAPTCH-ya! Meta retires U.S. fact-checking program. Our guest today is Rob Boyce from Accenture and he’s discussing Advanced Persistent Teenagers (APTeens). And Google’s AI Goes Under the Sea.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Rob Boyce, Global Lead for Cyber Resilience at Accenture, joins to discuss Advanced Persistent Teenagers (APTeens). Advanced Persistent Teenagers (APTeens) have rapidly become a significant enterprise risk by demonstrating capabilities once limited to organized ransomware groups, the threat from juvenile, homegrown threat-actors has risen steadily. 

Selected Reading
UK Effort to Keep Apple Encryption Fight Secret Blocked in Court (Bloomberg)
Port of Seattle says ransomware breach impacts 90,000 people (BleepingComputer)
Call Records of Millions Exposed by Verizon App Vulnerability (SecurityWeek)
Cybercriminals are trying to loot Australian pension accounts in new campaign (The Record)
NEPTUNE RAT Attacking Windows Users to Exfiltrate Passwords from 270+ Apps (Cyber Security News)
Threat Actors Using Fake CAPTCHAs and CloudFlare Turnstile to Deliver LegionLoader (Cyber Security News) 
Meta ends its fact-checking program in the US later today, replaces it with Community Notes (Techspot)
Suspected Scattered Spider Hacker Pleads Guilty (SecurityWeek)
This Alphabet Spin-off Brings “Fishal Recognition” to Aquaculture (IEEE Spectrum) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 07 Apr 2025 20:00:00 -0000</pubDate>
      <itunes:title>UK Apple showdown gonna be public.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>13</itunes:season>
      <itunes:episode>2281</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>UK court blocks government's attempt to keep Apple encryption case secret. Port of Seattle says last year's breach affected 90,000 people. Verizon Call Filter App flaw exposes millions' call records. Hackers hit Australian pension funds. A global threat hiding in plain sight. Cybercriminals are yelling CAPTCH-ya! Meta retires U.S. fact-checking program. Our guest today is Rob Boyce from Accenture and he’s discussing Advanced Persistent Teenagers (APTeens). And Google’s AI Goes Under the Sea.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Rob Boyce, Global Lead for Cyber Resilience at Accenture, joins to discuss Advanced Persistent Teenagers (APTeens). Advanced Persistent Teenagers (APTeens) have rapidly become a significant enterprise risk by demonstrating capabilities once limited to organized ransomware groups, the threat from juvenile, homegrown threat-actors has risen steadily. 

Selected Reading
UK Effort to Keep Apple Encryption Fight Secret Blocked in Court (Bloomberg)
Port of Seattle says ransomware breach impacts 90,000 people (BleepingComputer)
Call Records of Millions Exposed by Verizon App Vulnerability (SecurityWeek)
Cybercriminals are trying to loot Australian pension accounts in new campaign (The Record)
NEPTUNE RAT Attacking Windows Users to Exfiltrate Passwords from 270+ Apps (Cyber Security News)
Threat Actors Using Fake CAPTCHAs and CloudFlare Turnstile to Deliver LegionLoader (Cyber Security News) 
Meta ends its fact-checking program in the US later today, replaces it with Community Notes (Techspot)
Suspected Scattered Spider Hacker Pleads Guilty (SecurityWeek)
This Alphabet Spin-off Brings “Fishal Recognition” to Aquaculture (IEEE Spectrum) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>UK court blocks government's attempt to keep Apple encryption case secret. Port of Seattle says last year's breach affected 90,000 people. Verizon Call Filter App flaw exposes millions' call records. Hackers hit Australian pension funds. A global threat hiding in plain sight. Cybercriminals are yelling CAPTCH-ya! Meta retires U.S. fact-checking program. Our guest today is Rob Boyce from Accenture and he’s discussing Advanced Persistent Teenagers (APTeens). And Google’s AI Goes Under the Sea.</p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p><br></p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/therobertjboyce/">Rob Boyce</a>, Global Lead for Cyber Resilience at <a href="https://www.linkedin.com/company/accenture/">Accenture</a>, joins to discuss Advanced Persistent Teenagers (APTeens). Advanced Persistent Teenagers (APTeens) have rapidly become a significant enterprise risk by demonstrating capabilities once limited to organized ransomware groups, the threat from juvenile, homegrown threat-actors has risen steadily. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bloomberg.com/news/articles/2025-04-07/uk-effort-to-keep-apple-encryption-fight-secret-blocked-in-court">UK Effort to Keep Apple Encryption Fight Secret Blocked in Court</a> (Bloomberg)</p><p><a href="https://www.bleepingcomputer.com/news/security/port-of-seattle-says-ransomware-breach-impacts-90-000-people/">Port of Seattle says ransomware breach impacts 90,000 people</a> (BleepingComputer)</p><p><a href="https://www.securityweek.com/call-records-of-millions-exposed-by-verizon-app-vulnerability/">Call Records of Millions Exposed by Verizon App Vulnerability</a> (SecurityWeek)</p><p><a href="https://therecord.media/cybercriminals-australia-hacking-campaign-pension">Cybercriminals are trying to loot Australian pension accounts in new campaign</a> (The Record)</p><p><a href="https://cybersecuritynews.com/neptune-rat-attacking-windows-users/#google_vignette">NEPTUNE RAT Attacking Windows Users to Exfiltrate Passwords from 270+ Apps</a> (Cyber Security News)</p><p><a href="https://cybersecuritynews.com/fake-captchas-cloudflare-turnstile-legionloader/">Threat Actors Using Fake CAPTCHAs and CloudFlare Turnstile to Deliver LegionLoader</a> (Cyber Security News) </p><p><a href="https://www.techspot.com/news/107438-meta-ends-fact-checking-program-us-later-today.html">Meta ends its fact-checking program in the US later today, replaces it with Community Notes</a> (Techspot)</p><p><a href="https://www.securityweek.com/suspected-scattered-spider-hacker-pleads-guilty/">Suspected Scattered Spider Hacker Pleads Guilty</a> (SecurityWeek)</p><p><a href="https://spectrum.ieee.org/aquaculture">This Alphabet Spin-off Brings “Fishal Recognition” to Aquaculture</a> (IEEE Spectrum) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p><br></p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1358</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7068d88e-d378-11ef-84f5-5b537da2d080]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2525680226.mp3?updated=1744138769" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rick Howard: Give people resources. [CSO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/62/notes</link>
      <description>Please enjoy this encore of Career Notes. 
Chief Security Officer, Chief Analyst, and Senior Fellow at the CyberWire, Rick Howard, shares his travels through the cybersecurity job space. The son of a gold miner who began his career out of West Point in the US Army, Rick worked his way up to being the Commander of the Army's Computer Emergency Response Team. Rick moved to the commercial sector working for Bruce Schneier running Counterpane's global SOC. Rick's first CSO job was for Palo Alto Networks where he was afforded the opportunity to create the Cybersecurity Canon Hall of Fame and the Cyber Threat Alliance. Upon considering retirement, Rick called up on the CyberWire to ask about doing a podcast and he was hired on to the team. Rick shares a proud moment through a favorite story. We thank Rick for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 06 Apr 2025 07:00:00 -0000</pubDate>
      <itunes:title>Rick Howard: Give people resources. [CSO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>62</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/2914b656-10a9-11f0-8c57-9bf1efec7f65/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 
Chief Security Officer, Chief Analyst, and Senior Fellow at the CyberWire, Rick Howard, shares his travels through the cybersecurity job space. The son of a gold miner who began his career out of West Point in the US Army, Rick worked his way up to being the Commander of the Army's Computer Emergency Response Team. Rick moved to the commercial sector working for Bruce Schneier running Counterpane's global SOC. Rick's first CSO job was for Palo Alto Networks where he was afforded the opportunity to create the Cybersecurity Canon Hall of Fame and the Cyber Threat Alliance. Upon considering retirement, Rick called up on the CyberWire to ask about doing a podcast and he was hired on to the team. Rick shares a proud moment through a favorite story. We thank Rick for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p><p>Chief Security Officer, Chief Analyst, and Senior Fellow at the CyberWire, Rick Howard, shares his travels through the cybersecurity job space. The son of a gold miner who began his career out of West Point in the US Army, Rick worked his way up to being the Commander of the Army's Computer Emergency Response Team. Rick moved to the commercial sector working for Bruce Schneier running Counterpane's global SOC. Rick's first CSO job was for Palo Alto Networks where he was afforded the opportunity to create the Cybersecurity Canon Hall of Fame and the Cyber Threat Alliance. Upon considering retirement, Rick called up on the CyberWire to ask about doing a podcast and he was hired on to the team. Rick shares a proud moment through a favorite story. We thank Rick for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>519</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2914b656-10a9-11f0-8c57-9bf1efec7f65]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3961475737.mp3?updated=1743697963" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bybit’s $1.4B breach. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/372/notes</link>
      <description>Zach Edwards from Silent Push is discussing their work on "New Lazarus Group Infrastructure, Acquires Sensitive Intel Related to $1.4B ByBit Hack and Past Attacks." Silent Push analysts uncovered significant infrastructure used by the Lazarus APT Group, linking them to the $1.4 billion Bybit crypto heist through the domain bybit-assessment[.]com registered just hours before the attack. 
The investigation revealed a pattern of test entries, VPN usage, and fake job interview scams targeting crypto users, with malware deployment tied to North Korean threat actor groups like TraderTraitor and Contagious Interview. The team also identified numerous companies being impersonated in these scams, including major crypto platforms like Coinbase, Binance, and Kraken, to alert potential victims.

The research can be found here:
Silent Push Pivots into New Lazarus Group Infrastructure, Acquires Sensitive Intel Related to $1.4B ByBit Hack and Past Attacks

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Apr 2025 07:00:00 -0000</pubDate>
      <itunes:title>Bybit’s $1.4B breach. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>372</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/2d3b8b1c-1179-11f0-a7e8-137b8c27cdc2/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Zach Edwards from Silent Push is discussing their work on "New Lazarus Group Infrastructure, Acquires Sensitive Intel Related to $1.4B ByBit Hack and Past Attacks." Silent Push analysts uncovered significant infrastructure used by the Lazarus APT Group, linking them to the $1.4 billion Bybit crypto heist through the domain bybit-assessment[.]com registered just hours before the attack. 
The investigation revealed a pattern of test entries, VPN usage, and fake job interview scams targeting crypto users, with malware deployment tied to North Korean threat actor groups like TraderTraitor and Contagious Interview. The team also identified numerous companies being impersonated in these scams, including major crypto platforms like Coinbase, Binance, and Kraken, to alert potential victims.

The research can be found here:
Silent Push Pivots into New Lazarus Group Infrastructure, Acquires Sensitive Intel Related to $1.4B ByBit Hack and Past Attacks

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/zedwards/">Zach Edwards</a> from <a href="https://www.linkedin.com/company/silent-push/">Silent Push</a> is discussing their work on "New Lazarus Group Infrastructure, Acquires Sensitive Intel Related to $1.4B ByBit Hack and Past Attacks." Silent Push analysts uncovered significant infrastructure used by the Lazarus APT Group, linking them to the $1.4 billion Bybit crypto heist through the domain <em>bybit-assessment[.]com</em> registered just hours before the attack. </p><p>The investigation revealed a pattern of test entries, VPN usage, and fake job interview scams targeting crypto users, with malware deployment tied to North Korean threat actor groups like TraderTraitor and Contagious Interview. The team also identified numerous companies being impersonated in these scams, including major crypto platforms like Coinbase, Binance, and Kraken, to alert potential victims.</p><h3><br></h3><h3>The research can be found here:</h3><ul><li><a href="https://www.silentpush.com/blog/lazarus-bybit/">Silent Push Pivots into New Lazarus Group Infrastructure, Acquires Sensitive Intel Related to $1.4B ByBit Hack and Past Attacks</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1952</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2d3b8b1c-1179-11f0-a7e8-137b8c27cdc2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3148692218.mp3?updated=1743786215" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A leadership shift.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2280/notes</link>
      <description>President Trump fires the head of NSA and Cyber Command. The Health Sector Coordinating Council asks the White House to abandon Biden-era security updates. Senators introduce bipartisan legislation to help fight money laundering. A critical vulnerability has been discovered in the Apache Parquet Java library. The State Bar of Texas reports a ransomware-related data breach. New Android spyware uses a password-protected uninstallation method. A Chinese state-backed threat group exploits a critical Ivanti vulnerability for remote code execution. Today’s guest is Dave Dewalt, Founder and CEO of NightDragon, with the latest trends and outlook from cyber leaders.  Malware masquerades as the tax man.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest is Dave Dewalt, Founder and CEO of NightDragon, sharing 2024 trends and a 2025 outlook.

Selected Reading
Haugh fired from leadership of NSA, Cyber Command (The Record)
Defense Sec Hegseth in Signalgate Pentagon watchdog probe (The Register)
HSCC Urges White House to Shift Gears on Health Cyber Regs (BankInfo Security)
Lawmakers seek to close loophole limiting Secret Service investigations into cyber laundering (The Record)
Critical Apache Parquet RCE Vulnerability Lets Attackers Run Malicious Code (Cyber Security News)
State Bar of Texas Says Personal Information Stolen in Ransomware Attack (SecurityWeek)
New Android Spyware That Asks Password From Users to Uninstall (TechCrunch)
Chinese State Hackers Exploiting Newly Disclosed Ivanti Flaw (Infosecurity Magazine)
Hackers Leveraging URL Shorteners &amp; QR Codes for Tax-Related Phishing Attacks (Microsoft)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 04 Apr 2025 20:10:00 -0000</pubDate>
      <itunes:title>A leadership shift.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2280</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>President Trump fires the head of NSA and Cyber Command. The Health Sector Coordinating Council asks the White House to abandon Biden-era security updates. Senators introduce bipartisan legislation to help fight money laundering. A critical vulnerability has been discovered in the Apache Parquet Java library. The State Bar of Texas reports a ransomware-related data breach. New Android spyware uses a password-protected uninstallation method. A Chinese state-backed threat group exploits a critical Ivanti vulnerability for remote code execution. Today’s guest is Dave Dewalt, Founder and CEO of NightDragon, with the latest trends and outlook from cyber leaders.  Malware masquerades as the tax man.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest is Dave Dewalt, Founder and CEO of NightDragon, sharing 2024 trends and a 2025 outlook.

Selected Reading
Haugh fired from leadership of NSA, Cyber Command (The Record)
Defense Sec Hegseth in Signalgate Pentagon watchdog probe (The Register)
HSCC Urges White House to Shift Gears on Health Cyber Regs (BankInfo Security)
Lawmakers seek to close loophole limiting Secret Service investigations into cyber laundering (The Record)
Critical Apache Parquet RCE Vulnerability Lets Attackers Run Malicious Code (Cyber Security News)
State Bar of Texas Says Personal Information Stolen in Ransomware Attack (SecurityWeek)
New Android Spyware That Asks Password From Users to Uninstall (TechCrunch)
Chinese State Hackers Exploiting Newly Disclosed Ivanti Flaw (Infosecurity Magazine)
Hackers Leveraging URL Shorteners &amp; QR Codes for Tax-Related Phishing Attacks (Microsoft)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>President Trump fires the head of NSA and Cyber Command. The Health Sector Coordinating Council asks the White House to abandon Biden-era security updates. Senators introduce bipartisan legislation to help fight money laundering. A critical vulnerability has been discovered in the Apache Parquet Java library. The State Bar of Texas reports a ransomware-related data breach. New Android spyware uses a password-protected uninstallation method. A Chinese state-backed threat group exploits a critical Ivanti vulnerability for remote code execution. Today’s guest is Dave Dewalt, Founder and CEO of NightDragon, with the latest trends and outlook from cyber leaders.  Malware masquerades as the tax man.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today’s guest is <a href="https://www.linkedin.com/in/ddewalt/">Dave Dewalt</a>, Founder and CEO of <a href="https://www.nightdragon.com/">NightDragon</a>, sharing <a href="https://www.nightdragon.com/insights/nightdragon-special-report-cyber-leaders-on-2024-trends-and-2025-outlook/">2024 trends and a 2025 outlook</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/gen-timothy-haugh-fired-nsa-cyber-command-trump">Haugh fired from leadership of NSA, Cyber Command</a> (The Record)</p><p><a href="https://www.theregister.com/2025/04/04/hegseth_inspector_general/">Defense Sec Hegseth in Signalgate Pentagon watchdog probe</a> (The Register)</p><p><a href="https://www.bankinfosecurity.com/interviews/hscc-urges-white-house-to-shift-gears-on-health-cyber-regs-i-5472">HSCC Urges White House to Shift Gears on Health Cyber Regs</a> (BankInfo Security)</p><p><a href="https://therecord.media/lawmakers-seek-to-close-secret-service-cyber-money-laundering-loophole">Lawmakers seek to close loophole limiting Secret Service investigations into cyber laundering</a> (The Record)</p><p><a href="https://cybersecuritynews.com/critical-apache-parquet-rce-vulnerability/">Critical Apache Parquet RCE Vulnerability Lets Attackers Run Malicious Code</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/state-bar-of-texas-says-personal-information-stolen-in-ransomware-attack/">State Bar of Texas Says Personal Information Stolen in Ransomware Attack</a> (SecurityWeek)</p><p><a href="https://techcrunch.com/2025/04/03/this-sneaky-android-spyware-needs-a-password-to-uninstall-heres-how-to-remove-it-without-one/">New Android Spyware That Asks Password From Users to Uninstall</a> (TechCrunch)</p><p><a href="https://www.infosecurity-magazine.com/news/chinese-state-hackers-ivanti-flaw/">Chinese State Hackers Exploiting Newly Disclosed Ivanti Flaw</a> (Infosecurity Magazine)</p><p><a href="https://www.microsoft.com/en-us/security/blog/2025/04/03/threat-actors-leverage-tax-season-to-deploy-tax-themed-phishing-campaigns/">Hackers Leveraging URL Shorteners &amp; QR Codes for Tax-Related Phishing Attacks</a> (Microsoft)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1803</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[702d3cc0-d378-11ef-84f5-f3157cd0d53a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7286379621.mp3?updated=1743788962" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The invisible force fueling cyber chaos.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2279/notes</link>
      <description>A joint advisory labels Fast Flux a national security threat. Europol shuts down a major international CSAM platform. Oracle verifies a data breach. A new attack targets Apache Tomcat servers. The Hunters International group pivots away from ransomware. Hackers target Juniper routers using default credentials. A controversy erupts over a critical CrushFTP vulnerability.  Johannes Ullrich, Dean of Research at SANS Technology Institute unpacks Next.js.  Abracadabra, alakazam — poof! Your credentials are gone.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Johannes Ullrich, Dean of Research at SANS Technology Institute, is discussing Next.js and how similar problems have led to vulnerabilities recently.

Selected Reading
Fast Flux: A National Security Threat (CISA)
Don’t cut CISA personnel, House panel leaders say, as they plan legislation giving the agency more to do (CyberScoop)
CSAM platform Kidflix shut down by international operation (The Record)
AI Image Site GenNomis Exposed 47GB of Underage Deepfakes (Hackread)
Oracle tells clients of second recent hack, log-in data stolen, Bloomberg News reports (Reuters)
Hackers Exploiting Apache Tomcat Vulnerability to Steal SSH Credentials &amp; Gain Server Control (Cyber Security News)
Hunters International Ransomware Gang Rebranding, Shifting Focus (SecurityWeek)
Hackers Actively Scanning for Juniper’s Smart Router With Default Password (Cyber Security News)
Details Emerge on CVE Controversy Around Exploited CrushFTP Vulnerability (SecurityWeek) 
New Malware Attacking Magic Enthusiasts to Steal Login Credentials (Cyber Security News)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 03 Apr 2025 20:10:00 -0000</pubDate>
      <itunes:title>The invisible force fueling cyber chaos.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2279</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A joint advisory labels Fast Flux a national security threat. Europol shuts down a major international CSAM platform. Oracle verifies a data breach. A new attack targets Apache Tomcat servers. The Hunters International group pivots away from ransomware. Hackers target Juniper routers using default credentials. A controversy erupts over a critical CrushFTP vulnerability.  Johannes Ullrich, Dean of Research at SANS Technology Institute unpacks Next.js.  Abracadabra, alakazam — poof! Your credentials are gone.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Johannes Ullrich, Dean of Research at SANS Technology Institute, is discussing Next.js and how similar problems have led to vulnerabilities recently.

Selected Reading
Fast Flux: A National Security Threat (CISA)
Don’t cut CISA personnel, House panel leaders say, as they plan legislation giving the agency more to do (CyberScoop)
CSAM platform Kidflix shut down by international operation (The Record)
AI Image Site GenNomis Exposed 47GB of Underage Deepfakes (Hackread)
Oracle tells clients of second recent hack, log-in data stolen, Bloomberg News reports (Reuters)
Hackers Exploiting Apache Tomcat Vulnerability to Steal SSH Credentials &amp; Gain Server Control (Cyber Security News)
Hunters International Ransomware Gang Rebranding, Shifting Focus (SecurityWeek)
Hackers Actively Scanning for Juniper’s Smart Router With Default Password (Cyber Security News)
Details Emerge on CVE Controversy Around Exploited CrushFTP Vulnerability (SecurityWeek) 
New Malware Attacking Magic Enthusiasts to Steal Login Credentials (Cyber Security News)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A joint advisory labels Fast Flux a national security threat. Europol shuts down a major international CSAM platform. Oracle verifies a data breach. A new attack targets Apache Tomcat servers. The Hunters International group pivots away from ransomware. Hackers target Juniper routers using default credentials. A controversy erupts over a critical CrushFTP vulnerability.  Johannes Ullrich, Dean of Research at SANS Technology Institute unpacks Next.js.  Abracadabra, alakazam — poof! Your credentials are gone.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/johannesullrich/">Johannes Ullrich</a>, Dean of Research at <a href="https://www.linkedin.com/school/sans-technology-institute/">SANS Technology Institute</a>, is discussing Next.js and how similar problems have led to vulnerabilities recently.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-093a">Fast Flux: A National Security Threat</a> (CISA)</p><p><a href="https://cyberscoop.com/cisa-workforce-cuts-house-leaders-legislation/">Don’t cut CISA personnel, House panel leaders say, as they plan legislation giving the agency more to do</a> (CyberScoop)</p><p><a href="https://therecord.media/csam-platform-kidflix-shut-down-europol">CSAM platform Kidflix shut down by international operation</a> (The Record)</p><p><a href="https://hackread.com/ai-image-site-gennomis-exposed-underage-deepfakes/">AI Image Site GenNomis Exposed 47GB of Underage Deepfakes</a> (Hackread)</p><p><a href="https://www.reuters.com/technology/cybersecurity/oracle-tells-clients-second-recent-hack-log-in-data-stolen-bloomberg-news-2025-04-02/">Oracle tells clients of second recent hack, log-in data stolen, Bloomberg News reports</a> (Reuters)</p><p><a href="https://cybersecuritynews.com/hackers-exploiting-apache-tomcat-vulnerability/">Hackers Exploiting Apache Tomcat Vulnerability to Steal SSH Credentials &amp; Gain Server Control</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/hunters-international-ransomware-gang-rebranding-shifting-focus/">Hunters International Ransomware Gang Rebranding, Shifting Focus</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/hackers-scanning-junipers-smart-router/">Hackers Actively Scanning for Juniper’s Smart Router With Default Password</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/details-emerge-on-cve-controversy-around-exploited-crushftp-vulnerability/">Details Emerge on CVE Controversy Around Exploited CrushFTP Vulnerability</a> (SecurityWeek) </p><p><a href="https://cybersecuritynews.com/new-malware-attacking-magic-enthusiasts/">New Malware Attacking Magic Enthusiasts to Steal Login Credentials</a> (Cyber Security News)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1499</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6fb76f40-d378-11ef-84f5-1b43f27204f7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3165110389.mp3?updated=1743708836" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chrome &amp; Firefox squash the latest flaws.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2278/notes</link>
      <description>Google and Mozilla patch nearly two dozen security flaws. The UK’s Royal Mail Group sees 144GB of data stolen and leaked. A bizarre campaign looks to recruit cybersecurity professionals to hack Chinese websites. PostgreSQL servers with weak credentials have been compromised for cryptojacking. Google Cloud patches a vulnerability affecting its Cloud Run platform. Oracle faces a class-action lawsuit over alleged cloud services data breaches. CISA releases ICS advisories detailing vulnerabilities in Rockwell Automation and Hitachi Energy products. General Paul Nakasone offers a candid assessment of America’s evolving cyber threats. On today’s CertByte segment,  a look at the Cisco Enterprise Network Core Technologies exam. Are AI LLMs more like minds or mirrors?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from N2K’s suite of industry-leading certification resources, this week, Chris is joined by Troy McMillan to break down a question targeting the Cisco Enterprise Network Core Technologies (350-401 ENCOR) v1.1 exam. Today’s question comes from N2K’s Cisco CCNP Implementing and Operating Cisco Enterprise Network Core Technologies ENCOR (350-401) Practice Test.
The ENCOR exam enables candidates to earn the Cisco Certified Specialist - Enterprise Core certification, which can also be used to meet exam requirements for several other Cisco certifications. 
Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify.To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro. 
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.
Additional source: https://www.cisco.com/site/us/en/learn/training-certifications/exams/encor.html  

Selected Reading
Chrome 135, Firefox 137 Patch High-Severity Vulnerabilities (SecurityWeek)
Royal Mail Group Loses 144GB to Infostealers: Same Samsung Hacker, Same 2021 Infostealer Log (Infostealers)
Someone is trying to recruit security researchers in bizarre hacking campaign (TechCrunch)
Ongoing cryptomining campaign hits over 1.5K PostgreSQL servers (SC Media)
ImageRunner Flaw Exposed Sensitive Information in Google Cloud (SecurityWeek)
Google Brings End-to-End Encrypted Emails to All Enterprise Gmail Users (SecurityWeek)
Oracle now faces class action amid alleged data breaches (The Register)
CISA Releases Two ICS Advisories for Vulnerabilities, &amp; Exploits Surrounding ICS (Cyber Security News)
Exclusive: Gen. Paul Nakasone says China is now our biggest cyber threat (The Record)
Large AI models are cultural and social technologies (Science)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 02 Apr 2025 20:10:00 -0000</pubDate>
      <itunes:title>Chrome &amp; Firefox squash the latest flaws.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2278</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Google and Mozilla patch nearly two dozen security flaws. The UK’s Royal Mail Group sees 144GB of data stolen and leaked. A bizarre campaign looks to recruit cybersecurity professionals to hack Chinese websites. PostgreSQL servers with weak credentials have been compromised for cryptojacking. Google Cloud patches a vulnerability affecting its Cloud Run platform. Oracle faces a class-action lawsuit over alleged cloud services data breaches. CISA releases ICS advisories detailing vulnerabilities in Rockwell Automation and Hitachi Energy products. General Paul Nakasone offers a candid assessment of America’s evolving cyber threats. On today’s CertByte segment,  a look at the Cisco Enterprise Network Core Technologies exam. Are AI LLMs more like minds or mirrors?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from N2K’s suite of industry-leading certification resources, this week, Chris is joined by Troy McMillan to break down a question targeting the Cisco Enterprise Network Core Technologies (350-401 ENCOR) v1.1 exam. Today’s question comes from N2K’s Cisco CCNP Implementing and Operating Cisco Enterprise Network Core Technologies ENCOR (350-401) Practice Test.
The ENCOR exam enables candidates to earn the Cisco Certified Specialist - Enterprise Core certification, which can also be used to meet exam requirements for several other Cisco certifications. 
Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify.To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro. 
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.
Additional source: https://www.cisco.com/site/us/en/learn/training-certifications/exams/encor.html  

Selected Reading
Chrome 135, Firefox 137 Patch High-Severity Vulnerabilities (SecurityWeek)
Royal Mail Group Loses 144GB to Infostealers: Same Samsung Hacker, Same 2021 Infostealer Log (Infostealers)
Someone is trying to recruit security researchers in bizarre hacking campaign (TechCrunch)
Ongoing cryptomining campaign hits over 1.5K PostgreSQL servers (SC Media)
ImageRunner Flaw Exposed Sensitive Information in Google Cloud (SecurityWeek)
Google Brings End-to-End Encrypted Emails to All Enterprise Gmail Users (SecurityWeek)
Oracle now faces class action amid alleged data breaches (The Register)
CISA Releases Two ICS Advisories for Vulnerabilities, &amp; Exploits Surrounding ICS (Cyber Security News)
Exclusive: Gen. Paul Nakasone says China is now our biggest cyber threat (The Record)
Large AI models are cultural and social technologies (Science)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Google and Mozilla patch nearly two dozen security flaws. The UK’s Royal Mail Group sees 144GB of data stolen and leaked. A bizarre campaign looks to recruit cybersecurity professionals to hack Chinese websites. PostgreSQL servers with weak credentials have been compromised for cryptojacking. Google Cloud patches a vulnerability affecting its Cloud Run platform. Oracle faces a class-action lawsuit over alleged cloud services data breaches. CISA releases ICS advisories detailing vulnerabilities in Rockwell Automation and Hitachi Energy products. General Paul Nakasone offers a candid assessment of America’s evolving cyber threats. On today’s CertByte segment,  a look at the Cisco Enterprise Network Core Technologies exam. Are AI LLMs more like minds or mirrors?</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CertByte Segment</h2><p>Welcome to CertByte! On this bi-weekly segment hosted by <a href="https://www.linkedin.com/in/chrisharepmp/">Chris Hare</a>, a content developer and project management specialist at <a href="https://www.n2k.com/?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1740605340384.1740674526462.317&amp;__hssc=223811332.1.1740674526462&amp;__hsfp=3850742519">N2K</a>, we share practice questions from N2K’s suite of industry-leading certification resources, this week, Chris is joined by<a href="https://www.linkedin.com/in/troy-mcmillan-834a632/"> Troy McMillan</a> to break down a question targeting the Cisco Enterprise Network Core Technologies (350-401 ENCOR) v1.1 exam. Today’s question comes from<a href="https://certify.cybervista.net/products/cisco/implementing-cisco-encor-practice-test/"> N2K’s Cisco CCNP Implementing and Operating Cisco Enterprise Network Core Technologies ENCOR (350-401) Practice Test</a>.</p><p>The ENCOR exam enables candidates to earn the Cisco Certified Specialist - Enterprise Core certification, which can also be used to meet exam requirements for several other Cisco certifications. </p><p>Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify.To get the full news to knowledge experience, learn more about our N2K Pro subscription at<a href="https://thecyberwire.com/pro"> https://thecyberwire.com/pro</a>. </p><p>Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.</p><p>Additional source:<a href="https://www.cisco.com/site/us/en/learn/training-certifications/exams/encor.html"> https://www.cisco.com/site/us/en/learn/training-certifications/exams/encor.html</a> <em> </em></p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/chrome-135-firefox-137-patch-high-severity-vulnerabilities/">Chrome 135, Firefox 137 Patch High-Severity Vulnerabilities</a> (SecurityWeek)</p><p><a href="https://www.infostealers.com/article/royal-mail-group-loses-144gb-to-infostealers-same-samsung-hacker-same-2021-infostealer-log/">Royal Mail Group Loses 144GB to Infostealers: Same Samsung Hacker, Same 2021 Infostealer Log</a> (Infostealers)</p><p><a href="https://techcrunch.com/2025/04/01/someone-is-trying-to-recruit-security-researchers-in-bizarre-hacking-campaign/">Someone is trying to recruit security researchers in bizarre hacking campaign</a> (TechCrunch)</p><p><a href="https://www.scworld.com/brief/ongoing-cryptomining-campaign-hits-over-1-5k-postgresql-servers">Ongoing cryptomining campaign hits over 1.5K PostgreSQL servers</a> (SC Media)</p><p><a href="https://www.securityweek.com/imagerunner-flaw-exposed-sensitive-information-in-google-cloud/">ImageRunner Flaw Exposed Sensitive Information in Google Cloud</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/gmail-brings-end-to-end-encrypted-emails-to-all-enterprise-users/">Google Brings End-to-End Encrypted Emails to All Enterprise Gmail Users</a> (SecurityWeek)</p><p><a href="https://www.theregister.com/2025/04/02/oracle_breach_class_action/">Oracle now faces class action amid alleged data breaches</a> (The Register)</p><p><a href="https://cybersecuritynews.com/cisa-releases-two-ics-advisories-for-vulnerabilities/">CISA Releases Two ICS Advisories for Vulnerabilities, &amp; Exploits Surrounding ICS</a> (Cyber Security News)</p><p><a href="https://therecord.media/nakasone-interview-china-ai-deepseek-doge">Exclusive: Gen. Paul Nakasone says China is now our biggest cyber threat</a> (The Record)</p><p><a href="https://henryfarrell.net/large-ai-models-are-cultural-and-social-technologies/">Large AI models are cultural and social technologies</a> (Science)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><h2><br></h2><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1468</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6ff254c0-d378-11ef-84f5-6fc3f5afbd0e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9357765074.mp3?updated=1743620712" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hackers beware, fines are in the air.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2277/notes</link>
      <description>The UK unveils the full scope of its upcoming Cyber Security and Resilience Bill. Apple warns of critical zero-day vulnerabilities under active exploitation. The InterLock ransomware group claims responsibility for a cyberattack on National Presto Industries. Microsoft flags a critical vulnerability in Canon printer drivers. Check Point Software confirms a data breach. The FTC warns 23andMe’s bankruptcy trustees to uphold their privacy obligations. A Canadian hacker has been arrested and charged for allegedly breaching systems tied to the Texas Republican Party. A GCHQ intern pleads guilty to stealing top-secret data. On our Threat Vector segment, host David Moulton from Palo Alto Networks speaks with Richu Channakeshava, Senior Product Manager at Palo Alto Networks, about the urgent need for organizations to prepare for a post-quantum world. The confabulous hallucinations of AI. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
Host David Moulton from Palo Alto Networks Threat Vector podcast asks “Is the Quantum Threat Closer Than You Think?” on the latest segment of Threat Vector. Quantum computing is advancing fast, and with it comes a major cybersecurity risk—the potential to break today’s encryption standards. David speaks with Richu Channakeshava, Senior Product Manager at Palo Alto Networks, about the urgent need for organizations to prepare for a post-quantum world. You can catch the full discussion here. Be sure to listen to new episodes of Threat Vector every Thursday on your favorite podcast app. 

Selected Reading
UK threatens £100K-a-day fines under new cyber bill (The Register)
Apple Warns of Three 0-Day Vulnerabilities Actively Exploited in Attacks (Cyber Security News)
Ransomware Group Takes Credit for National Presto Industries Attack (SecurityWeek)
Critical Vulnerability Found in Canon Printer Drivers (SecurityWeek)
Check Point Acknowledges Data Breach, Claims Information is 'Old (Cyber Security News)
FTC: 23andMe's Buyer Must Uphold Co.'s Data Privacy Pledge (BankInfo Security)
Canadian hacker arrested for allegedly stealing data from Texas Republican Party (The Record)
GCHQ intern took top secret spy tool home, now faces prison (The Register)
A Peek Into How AI 'Thinks' - and Why It Hallucinates (GovInfo Security)
Why Confabulation, Not Hallucination, Defines AI Errors (Integrative Psych)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Apr 2025 20:10:00 -0000</pubDate>
      <itunes:title>Hackers beware, fines are in the air.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2277</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The UK unveils the full scope of its upcoming Cyber Security and Resilience Bill. Apple warns of critical zero-day vulnerabilities under active exploitation. The InterLock ransomware group claims responsibility for a cyberattack on National Presto Industries. Microsoft flags a critical vulnerability in Canon printer drivers. Check Point Software confirms a data breach. The FTC warns 23andMe’s bankruptcy trustees to uphold their privacy obligations. A Canadian hacker has been arrested and charged for allegedly breaching systems tied to the Texas Republican Party. A GCHQ intern pleads guilty to stealing top-secret data. On our Threat Vector segment, host David Moulton from Palo Alto Networks speaks with Richu Channakeshava, Senior Product Manager at Palo Alto Networks, about the urgent need for organizations to prepare for a post-quantum world. The confabulous hallucinations of AI. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
Host David Moulton from Palo Alto Networks Threat Vector podcast asks “Is the Quantum Threat Closer Than You Think?” on the latest segment of Threat Vector. Quantum computing is advancing fast, and with it comes a major cybersecurity risk—the potential to break today’s encryption standards. David speaks with Richu Channakeshava, Senior Product Manager at Palo Alto Networks, about the urgent need for organizations to prepare for a post-quantum world. You can catch the full discussion here. Be sure to listen to new episodes of Threat Vector every Thursday on your favorite podcast app. 

Selected Reading
UK threatens £100K-a-day fines under new cyber bill (The Register)
Apple Warns of Three 0-Day Vulnerabilities Actively Exploited in Attacks (Cyber Security News)
Ransomware Group Takes Credit for National Presto Industries Attack (SecurityWeek)
Critical Vulnerability Found in Canon Printer Drivers (SecurityWeek)
Check Point Acknowledges Data Breach, Claims Information is 'Old (Cyber Security News)
FTC: 23andMe's Buyer Must Uphold Co.'s Data Privacy Pledge (BankInfo Security)
Canadian hacker arrested for allegedly stealing data from Texas Republican Party (The Record)
GCHQ intern took top secret spy tool home, now faces prison (The Register)
A Peek Into How AI 'Thinks' - and Why It Hallucinates (GovInfo Security)
Why Confabulation, Not Hallucination, Defines AI Errors (Integrative Psych)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The UK unveils the full scope of its upcoming Cyber Security and Resilience Bill. Apple warns of critical zero-day vulnerabilities under active exploitation. The InterLock ransomware group claims responsibility for a cyberattack on National Presto Industries. Microsoft flags a critical vulnerability in Canon printer drivers. Check Point Software confirms a data breach. The FTC warns 23andMe’s bankruptcy trustees to uphold their privacy obligations. A Canadian hacker has been arrested and charged for allegedly breaching systems tied to the Texas Republican Party. A GCHQ intern pleads guilty to stealing top-secret data. On our Threat Vector segment, host David Moulton from Palo Alto Networks speaks with Richu Channakeshava, Senior Product Manager at Palo Alto Networks, about the urgent need for organizations to prepare for a post-quantum world. The confabulous hallucinations of AI. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Threat Vector Segment</h2><p>Host <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a> from <a href="https://www.paloaltonetworks.com/unit42">Palo Alto Networks</a> Threat Vector podcast asks “Is the Quantum Threat Closer Than You Think?” on the latest segment of Threat Vector. Quantum computing is advancing fast, and with it comes a major cybersecurity risk—the potential to break today’s encryption standards. David speaks with <a href="https://www.linkedin.com/in/richuchannakeshava/">Richu Channakeshava</a>, Senior Product Manager at Palo Alto Networks, about the urgent need for organizations to prepare for a post-quantum world. You can catch the <a href="https://thecyberwire.com/podcasts/threat-vector/60/notes">full discussion here</a>. Be sure to listen to new episodes of <a href="https://thecyberwire.com/podcasts/threat-vector">Threat Vector</a> every Thursday on your favorite podcast app. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.theregister.com/2025/04/01/uk_100k_fines_csr/">UK threatens £100K-a-day fines under new cyber bill</a> (The Register)</p><p><a href="https://cybersecuritynews.com/apple-warns-of-three-0-day-vulnerabilities/">Apple Warns of Three 0-Day Vulnerabilities Actively Exploited in Attacks</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/ransomware-group-takes-credit-for-national-presto-industries-attack/">Ransomware Group Takes Credit for National Presto Industries Attack</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/critical-vulnerability-found-in-canon-printer-drivers/">Critical Vulnerability Found in Canon Printer Drivers </a>(SecurityWeek)</p><p><a href="https://cybersecuritynews.com/check-point-acknowledges-data-breach/">Check Point Acknowledges Data Breach, Claims Information is 'Old</a> (Cyber Security News)</p><p><a href="https://www.bankinfosecurity.com/ftc-23andmes-buyer-must-uphold-cos-data-privacy-pledge-a-27885">FTC: 23andMe's Buyer Must Uphold Co.'s Data Privacy Pledge</a> (BankInfo Security)</p><p><a href="https://therecord.media/canadian-hacker-arrested-texas-gop">Canadian hacker arrested for allegedly stealing data from Texas Republican Party</a> (The Record)</p><p><a href="https://www.theregister.com/2025/04/01/student_gchq_theft/">GCHQ intern took top secret spy tool home, now faces prison</a> (The Register)</p><p><a href="https://www.govinfosecurity.com/peek-into-how-ai-thinks-hallucinates-a-27883">A Peek Into How AI 'Thinks' - and Why It Hallucinates</a> (GovInfo Security)</p><p><a href="https://www.integrative-psych.org/resources/confabulation-not-hallucination-ai-errors">Why Confabulation, Not Hallucination, Defines AI Errors</a> (Integrative Psych)</p><p><br></p><h2>Share your feedback.</h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1487</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6f7a3936-d378-11ef-84f5-8bfe8685899f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3395096625.mp3?updated=1743535880" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransom demands and medical data for sale.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2276/notes</link>
      <description>A cyberattack targeting Oracle Health compromises patient data. The DOJ nabs over $8 million tied to romance scams. Trend Micro examines a China-linked APT group conducting cyber-espionage. A new Android banking trojan called Crocodilus has emerged. North Korea’s Lazarus Group targets job seekers in the crypto industry. CISA IDs a new malware variant targeting Ivanti Connect Secure appliances. Maria Varmazis, host of N2K’s T-Minus Space Daily show chats with Jake Braun, former White House Principal Deputy National Cyber Director and chairman of DEF CON Franklin. They discuss designating space as critical infrastructure. Nulling out your pizza payment. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Maria Varmazis, host of N2K’s T-Minus Space Daily show sits down with Jake Braun, former White House Principal Deputy National Cyber Director and chairman of DEF CON Franklin, and they discuss designating space as critical infrastructure and sharing an overview of its attack surface.

Selected Reading
Oracle Health breach compromises patient data at US hospitals (Bleeping Computer)
Oracle Warns Health Customers of Patient Data Breach (Bloomberg)
Critical Condition: Legacy Medical Devices Remain Easy Targets for Ransomware (SecurityWeek)
U.S. seized $8.2 million in crypto linked to 'Romance Baiting' scams (Bleeping Computer)
DOJ Seizes USD 8.2M Tied to Pig Butchering Scheme (TRM Labs)
Earth Alux Hackers Employ VARGIET Malware to Attack Organizations (Cyber Security News) 
'Crocodilus' Android Banking Trojan Allows Device Takeover, Data Theft (SecurityWeek)
ClickFake Interview – Lazarus Hackers Exploit Windows and macOS Users Fake Job Campaign (Cyber Security News) 
CISA Analyzes Malware Used in Ivanti Zero-Day Attacks (SecurityWeek)
How A Null Character Was Used to Bypass Payments (System Weakness on Medium) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 31 Mar 2025 20:20:00 -0000</pubDate>
      <itunes:title>Ransom demands and medical data for sale.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2276</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A cyberattack targeting Oracle Health compromises patient data. The DOJ nabs over $8 million tied to romance scams. Trend Micro examines a China-linked APT group conducting cyber-espionage. A new Android banking trojan called Crocodilus has emerged. North Korea’s Lazarus Group targets job seekers in the crypto industry. CISA IDs a new malware variant targeting Ivanti Connect Secure appliances. Maria Varmazis, host of N2K’s T-Minus Space Daily show chats with Jake Braun, former White House Principal Deputy National Cyber Director and chairman of DEF CON Franklin. They discuss designating space as critical infrastructure. Nulling out your pizza payment. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Maria Varmazis, host of N2K’s T-Minus Space Daily show sits down with Jake Braun, former White House Principal Deputy National Cyber Director and chairman of DEF CON Franklin, and they discuss designating space as critical infrastructure and sharing an overview of its attack surface.

Selected Reading
Oracle Health breach compromises patient data at US hospitals (Bleeping Computer)
Oracle Warns Health Customers of Patient Data Breach (Bloomberg)
Critical Condition: Legacy Medical Devices Remain Easy Targets for Ransomware (SecurityWeek)
U.S. seized $8.2 million in crypto linked to 'Romance Baiting' scams (Bleeping Computer)
DOJ Seizes USD 8.2M Tied to Pig Butchering Scheme (TRM Labs)
Earth Alux Hackers Employ VARGIET Malware to Attack Organizations (Cyber Security News) 
'Crocodilus' Android Banking Trojan Allows Device Takeover, Data Theft (SecurityWeek)
ClickFake Interview – Lazarus Hackers Exploit Windows and macOS Users Fake Job Campaign (Cyber Security News) 
CISA Analyzes Malware Used in Ivanti Zero-Day Attacks (SecurityWeek)
How A Null Character Was Used to Bypass Payments (System Weakness on Medium) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cyberattack targeting Oracle Health compromises patient data. The DOJ nabs over $8 million tied to romance scams. Trend Micro examines a China-linked APT group conducting cyber-espionage. A new Android banking trojan called Crocodilus has emerged. North Korea’s Lazarus Group targets job seekers in the crypto industry. CISA IDs a new malware variant targeting Ivanti Connect Secure appliances. Maria Varmazis, host of N2K’s T-Minus Space Daily show chats with Jake Braun, former White House Principal Deputy National Cyber Director and chairman of DEF CON Franklin. They discuss designating space as critical infrastructure. Nulling out your pizza payment. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a>, host of N2K’s <a href="https://www.linkedin.com/company/n2k-space/">T-Minus</a> Space Daily show sits down with <a href="https://www.linkedin.com/in/jake-braun-77372539/">Jake Braun</a>, former White House Principal Deputy National Cyber Director and chairman of DEF CON Franklin, and they discuss designating space as critical infrastructure and sharing an overview of its attack surface.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/oracle-health-breach-compromises-patient-data-at-us-hospitals/">Oracle Health breach compromises patient data at US hospitals</a> (Bleeping Computer)</p><p><a href="https://www.bloomberg.com/news/articles/2025-03-28/oracle-warns-health-customers-of-patient-data-breach">Oracle Warns Health Customers of Patient Data Breach</a> (Bloomberg)</p><p><a href="https://www.securityweek.com/critical-condition-legacy-medical-devices-remain-easy-targets-for-ransomware/">Critical Condition: Legacy Medical Devices Remain Easy Targets for Ransomware</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/cryptocurrency/us-seized-82-million-in-crypto-linked-to-romance-baiting-scams/">U.S. seized $8.2 million in crypto linked to 'Romance Baiting' scams</a> (Bleeping Computer)</p><p><a href="https://www.trmlabs.com/resources/blog/doj-seizes-usd-8-2m-tied-to-pig-butchering-scheme">DOJ Seizes USD 8.2M Tied to Pig Butchering Scheme</a> (TRM Labs)</p><p><a href="https://cybersecuritynews.com/earth-alux-hackers-employ-vargiet/">Earth Alux Hackers Employ VARGIET Malware to Attack Organizations</a> (Cyber Security News) </p><p><a href="https://www.securityweek.com/crocodilus-android-banking-trojan-allows-device-takeover-data-theft/">'Crocodilus' Android Banking Trojan Allows Device Takeover, Data Theft</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/lazarus-hackers-exploit-windows-and-macos-users/">ClickFake Interview – Lazarus Hackers Exploit Windows and macOS Users Fake Job Campaign</a> (Cyber Security News) </p><p><a href="https://www.securityweek.com/cisa-analyzes-malware-used-in-ivanti-connect-secure-zero-day-attacks/">CISA Analyzes Malware Used in Ivanti Zero-Day Attacks</a> (SecurityWeek)</p><p><a href="https://systemweakness.com/how-a-null-character-was-used-to-bypass-payments-7b417932dede">How A Null Character Was Used to Bypass Payments</a> (System Weakness on Medium) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1792</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6f3fa21c-d378-11ef-84f5-a783b7945aa7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2262563986.mp3?updated=1743450820" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Alyssa Miller: We have to elevate others. [BISO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/61/notes</link>
      <description>Please enjoy this encore episode of Career Notes. 
Business Information Security Officer at S&amp;P Global Ratings, Alyssa Miller, joins us to talk about her journey to become a champion to create a welcoming nature and acceptance of diversity in the cybersecurity community. Starting her first full-time tech position while still in college, Alyssa noted the culture shock being in both worlds. Entering as a programmer and then moving to pen testing where she got her start in security, Alyssa grew into a leader who is committed to elevating those around her. Some stumbling blocks along the way gave her pause and helped point her in her current role where Alyssa works to bring more diverse views to improve the problem-solving in the space, something she sees as a key to success for the industry. We thank Alyssa for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 30 Mar 2025 07:00:00 -0000</pubDate>
      <itunes:title>Alyssa Miller: We have to elevate others. [BISO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>61</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8fae355c-0c05-11f0-8006-8bd3dc31bd9a/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore episode of Career Notes. 
Business Information Security Officer at S&amp;P Global Ratings, Alyssa Miller, joins us to talk about her journey to become a champion to create a welcoming nature and acceptance of diversity in the cybersecurity community. Starting her first full-time tech position while still in college, Alyssa noted the culture shock being in both worlds. Entering as a programmer and then moving to pen testing where she got her start in security, Alyssa grew into a leader who is committed to elevating those around her. Some stumbling blocks along the way gave her pause and helped point her in her current role where Alyssa works to bring more diverse views to improve the problem-solving in the space, something she sees as a key to success for the industry. We thank Alyssa for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Career Notes. </p><p>Business Information Security Officer at S&amp;P Global Ratings, Alyssa Miller, joins us to talk about her journey to become a champion to create a welcoming nature and acceptance of diversity in the cybersecurity community. Starting her first full-time tech position while still in college, Alyssa noted the culture shock being in both worlds. Entering as a programmer and then moving to pen testing where she got her start in security, Alyssa grew into a leader who is committed to elevating those around her. Some stumbling blocks along the way gave her pause and helped point her in her current role where Alyssa works to bring more diverse views to improve the problem-solving in the space, something she sees as a key to success for the industry. We thank Alyssa for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>554</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8fae355c-0c05-11f0-8006-8bd3dc31bd9a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4595555811.mp3?updated=1743187397" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Breaking barriers, one byte at a time. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/371/notes</link>
      <description>This week, we are joined by Jon Williams, Vulnerability Researcher from Bishop Fox, discussing "Tearing Down (Sonic)Walls: Decrypting SonicOSX Firmware." Bishop Fox researchers reverse-engineered the encryption protecting SonicWall SonicOSX firmware, enabling them to access its underlying file system for security research. 
They presented their process and findings at DistrictCon Year 0 and released a tool called Sonicrack to extract keys from VMware virtual machine bundles, facilitating the decryption of VMware NSv firmware images. This research builds upon previous work, including techniques to decrypt static NSv images and reverse-engineer other encryption formats used by SonicWall.

The research can be found here:
Tearing Down (Sonic)Walls: Decrypting SonicOSX Firmware

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 Mar 2025 07:00:00 -0000</pubDate>
      <itunes:title>Breaking barriers, one byte at a time. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>371</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/2f71c736-0c09-11f0-8bc6-a3854d6a4810/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, we are joined by Jon Williams, Vulnerability Researcher from Bishop Fox, discussing "Tearing Down (Sonic)Walls: Decrypting SonicOSX Firmware." Bishop Fox researchers reverse-engineered the encryption protecting SonicWall SonicOSX firmware, enabling them to access its underlying file system for security research. 
They presented their process and findings at DistrictCon Year 0 and released a tool called Sonicrack to extract keys from VMware virtual machine bundles, facilitating the decryption of VMware NSv firmware images. This research builds upon previous work, including techniques to decrypt static NSv images and reverse-engineer other encryption formats used by SonicWall.

The research can be found here:
Tearing Down (Sonic)Walls: Decrypting SonicOSX Firmware

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/jonthetech/">Jon Williams</a>, Vulnerability Researcher from <a href="https://bishopfox.com/">Bishop Fox</a>, discussing "Tearing Down (Sonic)Walls: Decrypting SonicOSX Firmware." Bishop Fox researchers reverse-engineered the encryption protecting SonicWall SonicOSX firmware, enabling them to access its underlying file system for security research. </p><p>They presented their process and findings at DistrictCon Year 0 and released a tool called Sonicrack to extract keys from VMware virtual machine bundles, facilitating the decryption of VMware NSv firmware images. This research builds upon previous work, including techniques to decrypt static NSv images and reverse-engineer other encryption formats used by SonicWall.</p><p><br></p><h3>The research can be found here:</h3><ul><li><a href="https://bishopfox.com/blog/sonicwall-decrypting-sonicosx-firmware">Tearing Down (Sonic)Walls: Decrypting SonicOSX Firmware</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1161</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2f71c736-0c09-11f0-8bc6-a3854d6a4810]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7639016006.mp3?updated=1743189613" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New sandbox escape looks awfully familiar.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2275/notes</link>
      <description>Mozilla patches Firefox flaw similar to actively exploited Chrome vulnerability. Russia-based RedCurl gang deploys ransomware for the first time. Ukraine's railway operator recovers from cyberattack. India cracks down on Google’s billing monopoly. Morphing Meerkat's phishing kit abuses DNS mail exchange records. 300,000 attacks in three weeks. Our guest is Chris Wysopal, Founder and Chief Security Evangelist of Veracode, who sits down with Dave to discuss the increase in the average fix time for security flaws. And Liz Stokes joins with another Fun Fact Friday. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Chris Wysopal, Founder and Chief Security Evangelist of Veracode, discussing increase in the average fix time for security flaws and percent of organizations that carry critical security debt for longer than a year.

Selected Reading
After Chrome patches zero-day used to target Russians, Firefox splats similar bug (The Register)
Microsoft fixes Remote Desktop issues caused by Windows updates (Bleeping Computer)
Firefox fixes flaw similar to Chrome zero-day used against Russian organizations (The Record)
RedCurl's Ransomware Debut: A Technical Deep Dive (Bitdefender)
Ukraine’s state railway restores online ticket sales after major cyberattack (The Record)
Google App Store Billing Policy Anti-Competitive, India Court Rules (Bloomberg)
Morphing Meerkat PhaaS Platform Spoofs 100+ Brands - Infosecurity Magazine (Infosecurity Magazine)
Fresh Grandoreiro Banking Trojan Campaigns Target Latin America, Europe (SecurityWeek)
Malware distributed via fake DeepSeek ads on Google (SC Media)
GorillaBot Attacks Windows Devices With 300,000+ Attack Commands Across 100+ Countries (Cyber Security News) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 28 Mar 2025 20:10:00 -0000</pubDate>
      <itunes:title>New sandbox escape looks awfully familiar.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Mozilla patches Firefox flaw similar to actively exploited Chrome vulnerability. Russia-based RedCurl gang deploys ransomware for the first time. Ukraine's railway operator recovers from cyberattack. India cracks down on Google’s billing monopoly. Morphing Meerkat's phishing kit abuses DNS mail exchange records. 300,000 attacks in three weeks. Our guest is Chris Wysopal, Founder and Chief Security Evangelist of Veracode, who sits down with Dave to discuss the increase in the average fix time for security flaws. And Liz Stokes joins with another Fun Fact Friday. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Chris Wysopal, Founder and Chief Security Evangelist of Veracode, discussing increase in the average fix time for security flaws and percent of organizations that carry critical security debt for longer than a year.

Selected Reading
After Chrome patches zero-day used to target Russians, Firefox splats similar bug (The Register)
Microsoft fixes Remote Desktop issues caused by Windows updates (Bleeping Computer)
Firefox fixes flaw similar to Chrome zero-day used against Russian organizations (The Record)
RedCurl's Ransomware Debut: A Technical Deep Dive (Bitdefender)
Ukraine’s state railway restores online ticket sales after major cyberattack (The Record)
Google App Store Billing Policy Anti-Competitive, India Court Rules (Bloomberg)
Morphing Meerkat PhaaS Platform Spoofs 100+ Brands - Infosecurity Magazine (Infosecurity Magazine)
Fresh Grandoreiro Banking Trojan Campaigns Target Latin America, Europe (SecurityWeek)
Malware distributed via fake DeepSeek ads on Google (SC Media)
GorillaBot Attacks Windows Devices With 300,000+ Attack Commands Across 100+ Countries (Cyber Security News) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Mozilla patches Firefox flaw similar to actively exploited Chrome vulnerability. Russia-based RedCurl gang deploys ransomware for the first time. Ukraine's railway operator recovers from cyberattack. India cracks down on Google’s billing monopoly. Morphing Meerkat's phishing kit abuses DNS mail exchange records. 300,000 attacks in three weeks. Our guest is Chris Wysopal, Founder and Chief Security Evangelist of Veracode, who sits down with Dave to discuss the increase in the average fix time for security flaws. And Liz Stokes joins with another Fun Fact Friday. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/wysopal/">Chris Wysopal</a>, Founder and Chief Security Evangelist of <a href="https://www.linkedin.com/company/veracode/">Veracode</a>, discussing increase in the average fix time for security flaws and percent of organizations that carry critical security debt for longer than a year.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.theregister.com/2025/03/28/google_kaspersky_mozilla/">After Chrome patches zero-day used to target Russians, Firefox splats similar bug</a> (The Register)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-remote-desktop-issues-caused-by-windows-updates/">Microsoft fixes Remote Desktop issues caused by Windows updates</a> (Bleeping Computer)</p><p><a href="https://therecord.media/firefox-sandbox-vulnerability-similar-chrome-zero-day">Firefox fixes flaw similar to Chrome zero-day used against Russian organizations</a> (The Record)</p><p><a href="https://www.bitdefender.com/en-us/blog/businessinsights/redcurl-qwcrypt-ransomware-technical-deep-dive">RedCurl's Ransomware Debut: A Technical Deep Dive</a> (Bitdefender)</p><p><a href="https://therecord.media/ukraine-state-railway-restores-online-ticketing-after-cyberattack">Ukraine’s state railway restores online ticket sales after major cyberattack</a> (The Record)</p><p><a href="https://www.bloomberg.com/news/articles/2025-03-28/google-s-billing-policy-anti-competitive-india-court-rules">Google App Store Billing Policy Anti-Competitive, India Court Rules</a> (Bloomberg)</p><p><a href="https://www.infosecurity-magazine.com/news/morphing-meerkat-phaas-platform/">Morphing Meerkat PhaaS Platform Spoofs 100+ Brands - Infosecurity Magazine</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/fresh-grandoreiro-banking-trojan-campaigns-target-latin-america-europe/">Fresh Grandoreiro Banking Trojan Campaigns Target Latin America, Europe</a> (SecurityWeek)</p><p><a href="https://www.scworld.com/brief/malware-distributed-via-fake-deepseek-ads-on-google">Malware distributed via fake DeepSeek ads on Google</a> (SC Media)</p><p><a href="https://cybersecuritynews.com/gorillabot-attacks-windows/">GorillaBot Attacks Windows Devices With 300,000+ Attack Commands Across 100+ Countries</a> (Cyber Security News) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1741</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6f05a1ca-d378-11ef-84f5-a36ac93e95be]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5888048202.mp3?updated=1743185274" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FamousSparrow’s sneaky resurgence.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2274/notes</link>
      <description>China’s FamousSparrow is back. A misconfigured Amazon S3 bucket exposes data from an Australian fintech firm. Researchers uncover a sophisticated Linux-based backdoor targeting industrial systems. Infiltrating the BlackLock Ransomware group’s infrastructure. Solar inverters in the security spotlight. Credential stuffing gets automated. CISA updates the Known Exploited Vulnerabilities catalog. The UK’s NCA warns of online groups involved in sadistic cybercrime and real-world violence. Authorities arrest a dozen  individuals linked to the now-defunct Ghost encrypted communication platform. Our guest is Tal Skverer, Research Team Lead from Astrix, discussing the OWASP NHI Top 10 framework. Remembering our friend Matt Stephenson. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
We are joined by Tal Skverer, Research Team Lead from Astrix, who is discussing the OWASP NHI Top 10 framework and how teams can use these as they implement NHIs into their systems.

Selected Reading
Chinese Spy Group FamousSparrow Back with a Vengeance, Targets US (Infosecurity Magazine)
Aussie Fintech Vroom Exposes Thousands of Records After AWS Misconfiguration (HackRead)
New Sophisticated Linux Backdoor Targets OT Systems via 0-Day RCE Exploit (GB Hackers)
Blacklock Ransomware: A Late Holiday Gift with Intrusion into the Threat Actor's Infrastructure (Resecurity)
Dozens of solar inverter flaws could be exploited to attack power grids (Bleeping Computer)
Threat Actors Using Powerful Cybercriminal Weapon 'Atlantis AIO' to Automate Credential Stuffing Attacks (Cyber Security News)
CISA Adds of Sitecore CMS Code Execution Vulnerability to List of Known Exploited Vulnerabilities (Cyber Security News)
NCA Warns of Sadistic Online “Com” Networks (Infosecurity Magazine)
12 Cybercriminals Arrested Following Takedown of Ghost Communication Platform (Cyber Security News)
Matt Stephenson remembrance (LinkedIn) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 27 Mar 2025 20:20:00 -0000</pubDate>
      <itunes:title>FamousSparrow’s sneaky resurgence.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2274</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>China’s FamousSparrow is back. A misconfigured Amazon S3 bucket exposes data from an Australian fintech firm. Researchers uncover a sophisticated Linux-based backdoor targeting industrial systems. Infiltrating the BlackLock Ransomware group’s infrastructure. Solar inverters in the security spotlight. Credential stuffing gets automated. CISA updates the Known Exploited Vulnerabilities catalog. The UK’s NCA warns of online groups involved in sadistic cybercrime and real-world violence. Authorities arrest a dozen  individuals linked to the now-defunct Ghost encrypted communication platform. Our guest is Tal Skverer, Research Team Lead from Astrix, discussing the OWASP NHI Top 10 framework. Remembering our friend Matt Stephenson. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
We are joined by Tal Skverer, Research Team Lead from Astrix, who is discussing the OWASP NHI Top 10 framework and how teams can use these as they implement NHIs into their systems.

Selected Reading
Chinese Spy Group FamousSparrow Back with a Vengeance, Targets US (Infosecurity Magazine)
Aussie Fintech Vroom Exposes Thousands of Records After AWS Misconfiguration (HackRead)
New Sophisticated Linux Backdoor Targets OT Systems via 0-Day RCE Exploit (GB Hackers)
Blacklock Ransomware: A Late Holiday Gift with Intrusion into the Threat Actor's Infrastructure (Resecurity)
Dozens of solar inverter flaws could be exploited to attack power grids (Bleeping Computer)
Threat Actors Using Powerful Cybercriminal Weapon 'Atlantis AIO' to Automate Credential Stuffing Attacks (Cyber Security News)
CISA Adds of Sitecore CMS Code Execution Vulnerability to List of Known Exploited Vulnerabilities (Cyber Security News)
NCA Warns of Sadistic Online “Com” Networks (Infosecurity Magazine)
12 Cybercriminals Arrested Following Takedown of Ghost Communication Platform (Cyber Security News)
Matt Stephenson remembrance (LinkedIn) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>China’s FamousSparrow is back. A misconfigured Amazon S3 bucket exposes data from an Australian fintech firm. Researchers uncover a sophisticated Linux-based backdoor targeting industrial systems. Infiltrating the BlackLock Ransomware group’s infrastructure. Solar inverters in the security spotlight. Credential stuffing gets automated. CISA updates the Known Exploited Vulnerabilities catalog. The UK’s NCA warns of online groups involved in sadistic cybercrime and real-world violence. Authorities arrest a dozen  individuals linked to the now-defunct Ghost encrypted communication platform. Our guest is Tal Skverer, Research Team Lead from Astrix, discussing the OWASP NHI Top 10 framework. Remembering our friend Matt Stephenson.<strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>We are joined by <a href="https://www.linkedin.com/in/reverser/">Tal Skverer</a>, Research Team Lead from <a href="https://www.linkedin.com/company/astrix-security/">Astrix</a>, who is discussing the OWASP NHI Top 10 framework and how teams can use these as they implement NHIs into their systems.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.infosecurity-magazine.com/news/chin-famoussparrow-targets-us/">Chinese Spy Group FamousSparrow Back with a Vengeance, Targets US</a> (Infosecurity Magazine)</p><p><a href="https://hackread.com/aussie-fintech-vroom-pii-records-aws-misconfiguration/">Aussie Fintech Vroom Exposes Thousands of Records After AWS Misconfiguration</a> (HackRead)</p><p><a href="https://gbhackers.com/new-sophisticated-linux-backdoor-targets-ot-systems/">New Sophisticated Linux Backdoor Targets OT Systems via 0-Day RCE Exploit</a> (GB Hackers)</p><p><a href="https://www.resecurity.com/blog/article/blacklock-ransomware-a-late-holiday-gift-with-intrusion-into-the-threat-actors-infrastructure">Blacklock Ransomware: A Late Holiday Gift with Intrusion into the Threat Actor's Infrastructure</a> (Resecurity)</p><p><a href="https://www.bleepingcomputer.com/news/security/dozens-of-solar-inverter-flaws-could-be-exploited-to-attack-power-grids/">Dozens of solar inverter flaws could be exploited to attack power grids</a> (Bleeping Computer)</p><p><a href="https://cybersecuritynews.com/threat-actors-using-powerful-cybercriminal-weapon-atlantis-aio/">Threat Actors Using Powerful Cybercriminal Weapon 'Atlantis AIO' to Automate Credential Stuffing Attacks</a> (Cyber Security News)</p><p><a href="https://cybersecuritynews.com/cisa-adds-sitecore-cms-code-execution-vulnerability/">CISA Adds of Sitecore CMS Code Execution Vulnerability to List of Known Exploited Vulnerabilities</a> (Cyber Security News)</p><p><a href="https://www.infosecurity-magazine.com/news/nca-warns-of-sadistic-online-com/">NCA Warns of Sadistic Online “Com” Networks</a> (Infosecurity Magazine)</p><p><a href="https://cybersecuritynews.com/12-cybercriminals-arrested-following-takedown/">12 Cybercriminals Arrested Following Takedown of Ghost Communication Platform</a> (Cyber Security News)</p><p><a href="https://www.linkedin.com/posts/richardmelick_i-am-heartbroken-to-share-that-matt-stephenson-ugcPost-7310475505147748354-uTjF/?utm_source=share&amp;utm_medium=member_ios&amp;rcm=ACoAAAASkOEBs0uv3XVImJt67l6ZmeYk-n-KdyQ">Matt Stephenson remembrance</a> (LinkedIn) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1780</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6eca585e-d378-11ef-84f5-eb75ee162be2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1038252232.mp3?updated=1743105314" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No click, all tricks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2273/notes</link>
      <description>Researchers uncover a new Windows zero-day. A covert Chinese-linked network targets recently laid-off U.S. government workers. Malicious npm packages are found injecting persistent reverse shell backdoors. A macOS malware loader evolves. DrayTek router disruptions affect users worldwide. A new report warns of growing cyber risks to the commercial space sector. CISA issues four ICS advisories. U.S. Marshals arrest a key suspect in a multi million dollar cryptocurrency heist. Our guest is Brian Levine, Co-Founder and CEO of FormerGov.com, speaking about creating a networking directory for former government and military professionals. The UK’s NCSC goes full influencer to promote 2FA.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Brian Levine, Co-Founder and CEO of FormerGov.com, speaking about the importance of networking and creating a directory for former government and military professionals.

Selected Reading
New Windows 0-Day Vulnerability Let Remote Attackers Steal NTLM Credentials - Unofficial Patch (cybersecuritynews)
Exclusive: Secretive Chinese network tries to lure fired federal workers, research shows (Reuters)
New npm attack poisons local packages with backdoors (bleepingcomputer)
macOS Users Warned of New Versions of ReaderUpdate Malware (securityweek)
DrayTek Routers Vulnerability Exploited in the Wild – Possibly Links to Reboot Loop (cybersecuritynews)
ENISA Probes Space Threat Landscape in New Report (Infosecurity Magazine)
CISA Warns of Four Vulnerabilities, and Exploits Surrounding ICS (cybersecuritynews)
Crypto Heist Suspect "Wiz" Arrested After $243 Million Theft (hackread)
NCSC taps influencers to make 2FA go viral (The Register) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 26 Mar 2025 20:10:00 -0000</pubDate>
      <itunes:title>No click, all tricks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2273</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Researchers uncover a new Windows zero-day. A covert Chinese-linked network targets recently laid-off U.S. government workers. Malicious npm packages are found injecting persistent reverse shell backdoors. A macOS malware loader evolves. DrayTek router disruptions affect users worldwide. A new report warns of growing cyber risks to the commercial space sector. CISA issues four ICS advisories. U.S. Marshals arrest a key suspect in a multi million dollar cryptocurrency heist. Our guest is Brian Levine, Co-Founder and CEO of FormerGov.com, speaking about creating a networking directory for former government and military professionals. The UK’s NCSC goes full influencer to promote 2FA.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Brian Levine, Co-Founder and CEO of FormerGov.com, speaking about the importance of networking and creating a directory for former government and military professionals.

Selected Reading
New Windows 0-Day Vulnerability Let Remote Attackers Steal NTLM Credentials - Unofficial Patch (cybersecuritynews)
Exclusive: Secretive Chinese network tries to lure fired federal workers, research shows (Reuters)
New npm attack poisons local packages with backdoors (bleepingcomputer)
macOS Users Warned of New Versions of ReaderUpdate Malware (securityweek)
DrayTek Routers Vulnerability Exploited in the Wild – Possibly Links to Reboot Loop (cybersecuritynews)
ENISA Probes Space Threat Landscape in New Report (Infosecurity Magazine)
CISA Warns of Four Vulnerabilities, and Exploits Surrounding ICS (cybersecuritynews)
Crypto Heist Suspect "Wiz" Arrested After $243 Million Theft (hackread)
NCSC taps influencers to make 2FA go viral (The Register) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers uncover a new Windows zero-day. A covert Chinese-linked network targets recently laid-off U.S. government workers. Malicious npm packages are found injecting persistent reverse shell backdoors. A macOS malware loader evolves. DrayTek router disruptions affect users worldwide. A new report warns of growing cyber risks to the commercial space sector. CISA issues four ICS advisories. U.S. Marshals arrest a key suspect in a multi million dollar cryptocurrency heist. Our guest is Brian Levine, Co-Founder and CEO of FormerGov.com, speaking about creating a networking directory for former government and military professionals. The UK’s NCSC goes full influencer to promote 2FA.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/brian-levine-cyberlaw/">Brian Levine</a>, Co-Founder and CEO of <a href="http://formergov.com">FormerGov.com</a>, speaking about the importance of networking and creating a directory for former government and military professionals.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://cybersecuritynews.com/new-windows-zero-day-vulnerability/">New Windows 0-Day Vulnerability Let Remote Attackers Steal NTLM Credentials - Unofficial Patch</a> (cybersecuritynews)</p><p><a href="https://www.reuters.com/world/china/secretive-chinese-network-tries-lure-fired-federal-workers-research-shows-2025-03-25/">Exclusive: Secretive Chinese network tries to lure fired federal workers, research shows</a><a href="https://www.reuters.com/world/china/secretive-chinese-network-tries-lure-fired-federal-workers-research-shows-2025-03-25/"> (Reuters</a>)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-npm-attack-poisons-local-packages-with-backdoors/">New npm attack poisons local packages with backdoors</a> (bleepingcomputer)</p><p><a href="https://www.securityweek.com/macos-users-warned-of-new-versions-of-readerupdate-malware/">macOS Users Warned of New Versions of ReaderUpdate Malware</a> (securityweek)</p><p><a href="https://cybersecuritynews.com/draytek-routers-vulnerability-exploited-in-the-wild/">DrayTek Routers Vulnerability Exploited in the Wild – Possibly Links to Reboot Loop</a> (cybersecuritynews)</p><p><a href="https://www.infosecurity-magazine.com/news/enisa-probes-space-threat/">ENISA Probes Space Threat Landscape in New Report</a><a href="https://www.infosecurity-magazine.com/news/enisa-probes-space-threat/"> </a>(Infosecurity Magazine)</p><p><a href="https://cybersecuritynews.com/cisa-warns-of-four-vulnerabilities-and-exploits/">CISA Warns of Four Vulnerabilities, and Exploits Surrounding ICS</a> (cybersecuritynews)</p><p><a href="https://hackread.com/crypto-heist-suspect-wiz-arrested-243-million-theft/">Crypto Heist Suspect "Wiz" Arrested After $243 Million Theft</a> (hackread)</p><p><a href="https://www.theregister.com/2025/03/26/ncsc_influencers_2fa/">NCSC taps influencers to make 2FA go viral</a><a href="https://www.theregister.com/2025/03/26/ncsc_influencers_2fa/"> </a>(The Register) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p><br></p><p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1482</itunes:duration>
      <guid isPermaLink="false"><![CDATA[6e8d9f90-d378-11ef-84f5-53dbe6c31ec7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6958660049.mp3?updated=1743017364" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The nightmare you can’t ignore.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2272/notes</link>
      <description>Critical Remote Code Execution vulnerabilities affect Kubernetes controllers. Senior Trump administration officials allegedly use unsecured platforms for national security discussions. Even experts like Troy Hunt get phished. Google acknowledges user data loss but doesn’t explain it. Chinese hackers spent four years inside an Asian telecom firm. SnakeKeylogger is a stealthy, multi-stage credential-stealing malware. A cybercrime crackdown results in over 300 arrests across seven African countries. Ben Yelin, Caveat co-host and Program Director, Public Policy &amp; External Affairs at the University of Maryland Center for Health and Homeland Security, joins to discuss the Signal national security leak. Pew Research Center figures out how its online polling got slightly forked.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
We are joined by Ben Yelin, Caveat co-host and Program Director, Public Policy &amp; External Affairs at the University of Maryland Center for Health and Homeland Security, on the Signal national security leak.

Selected Reading
IngressNightmare: critical Kubernetes vulnerabilities in ingress NGINX controller (Beyond Machines)
Remote Code Execution Vulnerabilities in Ingress NGINX (Wiz) 
Ingress-nginx CVE-2025-1974: What You Need to Know (Kubernetes) 
Trump administration is reviewing how its national security team sent military plans to a magazine editor (NBC News)
The Trump Administration Accidentally Texted Me Its War Plans (The Atlantic)
How Russian Hackers Are Exploiting Signal 'Linked Devices' Feature for Real-Time Spying (SecurityWeek)
Troy Hunt: A Sneaky Phish Just Grabbed my Mailchimp Mailing List (Troy Hunt)
'Technical issue' at Google deletes some customer data (The Register)
Chinese hackers spent four years inside Asian telco’s networks (The Record)
Multistage Info Stealer SnakeKeylogger Attacking Individuals and Businesses to Steal Logins (Cyber Security News)
Over 300 arrested in international crackdown on cyber scams (The Record)
How a glitch in an online survey replaced the word ‘yes’ with ‘forks’ (Pew Research)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Mar 2025 20:10:00 -0000</pubDate>
      <itunes:title>The nightmare you can’t ignore.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2272</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Critical Remote Code Execution vulnerabilities affect Kubernetes controllers. Senior Trump administration officials allegedly use unsecured platforms for national security discussions. Even experts like Troy Hunt get phished. Google acknowledges user data loss but doesn’t explain it. Chinese hackers spent four years inside an Asian telecom firm. SnakeKeylogger is a stealthy, multi-stage credential-stealing malware. A cybercrime crackdown results in over 300 arrests across seven African countries. Ben Yelin, Caveat co-host and Program Director, Public Policy &amp; External Affairs at the University of Maryland Center for Health and Homeland Security, joins to discuss the Signal national security leak. Pew Research Center figures out how its online polling got slightly forked.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
We are joined by Ben Yelin, Caveat co-host and Program Director, Public Policy &amp; External Affairs at the University of Maryland Center for Health and Homeland Security, on the Signal national security leak.

Selected Reading
IngressNightmare: critical Kubernetes vulnerabilities in ingress NGINX controller (Beyond Machines)
Remote Code Execution Vulnerabilities in Ingress NGINX (Wiz) 
Ingress-nginx CVE-2025-1974: What You Need to Know (Kubernetes) 
Trump administration is reviewing how its national security team sent military plans to a magazine editor (NBC News)
The Trump Administration Accidentally Texted Me Its War Plans (The Atlantic)
How Russian Hackers Are Exploiting Signal 'Linked Devices' Feature for Real-Time Spying (SecurityWeek)
Troy Hunt: A Sneaky Phish Just Grabbed my Mailchimp Mailing List (Troy Hunt)
'Technical issue' at Google deletes some customer data (The Register)
Chinese hackers spent four years inside Asian telco’s networks (The Record)
Multistage Info Stealer SnakeKeylogger Attacking Individuals and Businesses to Steal Logins (Cyber Security News)
Over 300 arrested in international crackdown on cyber scams (The Record)
How a glitch in an online survey replaced the word ‘yes’ with ‘forks’ (Pew Research)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Critical Remote Code Execution vulnerabilities affect Kubernetes controllers. Senior Trump administration officials allegedly use unsecured platforms for national security discussions. Even experts like Troy Hunt get phished. Google acknowledges user data loss but doesn’t explain it. Chinese hackers spent four years inside an Asian telecom firm. SnakeKeylogger is a stealthy, multi-stage credential-stealing malware. A cybercrime crackdown results in over 300 arrests across seven African countries. Ben Yelin, Caveat co-host and Program Director, Public Policy &amp; External Affairs at the University of Maryland Center for Health and Homeland Security, joins to discuss the Signal national security leak. Pew Research Center figures out how its online polling got slightly forked.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>We are joined by <a href="https://www.linkedin.com/in/benjamin-yelin-5b14114b/">Ben Yelin</a>, <a href="https://thecyberwire.com/podcasts/caveat">Caveat</a> co-host and Program Director, Public Policy &amp; External Affairs at the University of <a href="https://www.mdchhs.com/">Maryland Center for Health and Homeland Security</a>, on the Signal national security leak.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://beyondmachines.net/event_details/ingressnightmare-critical-kubernetes-vulnerabilities-in-ingress-nginx-controller-a-x-8-p-n/gD2P6Ple2L">IngressNightmare: critical Kubernetes vulnerabilities in ingress NGINX controller</a> (Beyond Machines)</p><p><a href="https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities">Remote Code Execution Vulnerabilities in Ingress NGINX</a> (Wiz) </p><p><a href="https://kubernetes.io/blog/2025/03/24/ingress-nginx-cve-2025-1974/">Ingress-nginx CVE-2025-1974: What You Need to Know</a> (Kubernetes) </p><p><a href="https://www.nbcnews.com/politics/national-security/atlantic-jeffrey-goldberg-trump-houthis-rcna197847">Trump administration is reviewing how its national security team sent military plans to a magazine editor</a> (NBC News)</p><p><a href="https://www.theatlantic.com/politics/archive/2025/03/trump-administration-accidentally-texted-me-its-war-plans/682151/?gift=kPTlqn0J1iP9IBZcsdI5IVJpB2t9BYyxpzU4sooa69M&amp;utm_source=copy-link&amp;utm_medium=social&amp;utm_campaign=share">The Trump Administration Accidentally Texted Me Its War Plans</a> (The Atlantic)</p><p><a href="https://www.securityweek.com/how-russian-hackers-are-exploiting-signals-linked-devices-for-real-time-spying/">How Russian Hackers Are Exploiting Signal 'Linked Devices' Feature for Real-Time Spying</a> (SecurityWeek)</p><p><a href="https://www.troyhunt.com/a-sneaky-phish-just-grabbed-my-mailchimp-mailing-list/">Troy Hunt: A Sneaky Phish Just Grabbed my Mailchimp Mailing List</a> (Troy Hunt)</p><p><a href="https://www.theregister.com/2025/03/24/google_maps_timeline_data_loss/">'Technical issue' at Google deletes some customer data</a> (The Register)</p><p><a href="https://therecord.media/chinese-hackers-spent-years-telco">Chinese hackers spent four years inside Asian telco’s networks</a> (The Record)</p><p><a href="https://cybersecuritynews.com/multistage-info-stealer-snakekeylogger-attacking-individuals/">Multistage Info Stealer SnakeKeylogger Attacking Individuals and Businesses to Steal Logins</a> (Cyber Security News)</p><p><a href="https://therecord.media/300-arrested-africa-crackdown-cyber-scams">Over 300 arrested in international crackdown on cyber scams</a> (The Record)</p><p><a href="https://www.pewresearch.org/decoded/2025/03/21/how-a-glitch-in-an-online-survey-replaced-the-word-yes-with-forks/">How a glitch in an online survey replaced the word ‘yes’ with ‘forks’</a> (Pew Research)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1497</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6e52c33e-d378-11ef-84f5-7b865c18366f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8359509816.mp3?updated=1742928747" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scammers celebrate with a bang.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2271/notes</link>
      <description>Money laundering runs rampant in Cambodia. Privacy advocates question a new data sharing EO from the White House. An NYU website hack exposes the data of millions. A game demo gets pulled from Steam after users report infostealing malware. The Cloak ransomware group claims a cyberattack on the Virginia Attorney General’s Office. 23andMe files for Chapter 11 bankruptcy. Medusa ransomware is using a malicious driver to disable security tools on infected systems. Clearview AI settles a class-action lawsuit over privacy violations. A look back at the CVE program. In today’s Industry Voices segment, we are joined by Joe Ryan, Head of Customer Enablement at Maltego Technologies, who is highlighting how to help analysts in resource-constrained environments overcome training gaps and use investigative tools more effectively. Luring AI bots into the digital labyrinth.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In today’s Industry Voices segment, we are joined by Joe Ryan, Head of Customer Enablement at Maltego Technologies, who is highlighting how to help analysts in resource-constrained environments overcome training gaps and use investigative tools more effectively.

Selected Reading
How Scammers Launder Money and Get Away With It (New York Times) 
Trump order on information sharing appears to have implications for DOGE and beyond (The Record)
Over 3 million applicants’ data leaked on NYU’s website (Washington Square News)
Steam pulls game demo infecting Windows with info-stealing malware (Bleeping Computer)
Ransomware Group Claims Attack on Virginia Attorney General’s Office (SecurityWeek)
23andMe Files for Bankruptcy Amid Concerns About Security of Customers’ Genetic Data (New York Times)
Medusa Ransomware Uses Malicious Driver to Disable Security Tools (SecurityWeek)
Clearview AI settles class-action privacy lawsuit worth an estimated $50 million (The Record)  
Despite challenges, the CVE program is a public-private partnership that has shown resilience (CyberScoop)
Trapping misbehaving bots in an AI Labyrinth (Cloudflare)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 24 Mar 2025 20:10:00 -0000</pubDate>
      <itunes:title>Scammers celebrate with a bang.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2271</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Money laundering runs rampant in Cambodia. Privacy advocates question a new data sharing EO from the White House. An NYU website hack exposes the data of millions. A game demo gets pulled from Steam after users report infostealing malware. The Cloak ransomware group claims a cyberattack on the Virginia Attorney General’s Office. 23andMe files for Chapter 11 bankruptcy. Medusa ransomware is using a malicious driver to disable security tools on infected systems. Clearview AI settles a class-action lawsuit over privacy violations. A look back at the CVE program. In today’s Industry Voices segment, we are joined by Joe Ryan, Head of Customer Enablement at Maltego Technologies, who is highlighting how to help analysts in resource-constrained environments overcome training gaps and use investigative tools more effectively. Luring AI bots into the digital labyrinth.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In today’s Industry Voices segment, we are joined by Joe Ryan, Head of Customer Enablement at Maltego Technologies, who is highlighting how to help analysts in resource-constrained environments overcome training gaps and use investigative tools more effectively.

Selected Reading
How Scammers Launder Money and Get Away With It (New York Times) 
Trump order on information sharing appears to have implications for DOGE and beyond (The Record)
Over 3 million applicants’ data leaked on NYU’s website (Washington Square News)
Steam pulls game demo infecting Windows with info-stealing malware (Bleeping Computer)
Ransomware Group Claims Attack on Virginia Attorney General’s Office (SecurityWeek)
23andMe Files for Bankruptcy Amid Concerns About Security of Customers’ Genetic Data (New York Times)
Medusa Ransomware Uses Malicious Driver to Disable Security Tools (SecurityWeek)
Clearview AI settles class-action privacy lawsuit worth an estimated $50 million (The Record)  
Despite challenges, the CVE program is a public-private partnership that has shown resilience (CyberScoop)
Trapping misbehaving bots in an AI Labyrinth (Cloudflare)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Money laundering runs rampant in Cambodia. Privacy advocates question a new data sharing EO from the White House. An NYU website hack exposes the data of millions. A game demo gets pulled from Steam after users report infostealing malware. The Cloak ransomware group claims a cyberattack on the Virginia Attorney General’s Office. 23andMe files for Chapter 11 bankruptcy. Medusa ransomware is using a malicious driver to disable security tools on infected systems. Clearview AI settles a class-action lawsuit over privacy violations. A look back at the CVE program. In today’s Industry Voices segment, we are joined by Joe Ryan, Head of Customer Enablement at Maltego Technologies, who is highlighting how to help analysts in resource-constrained environments overcome training gaps and use investigative tools more effectively. Luring AI bots into the digital labyrinth.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>In today’s Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/joeryantrainer/">Joe Ryan</a>, Head of Customer Enablement at <a href="https://www.maltego.com/?utm_source=podcast&amp;utm_medium=cyberwire&amp;utm_campaign=partnership&amp;utm_content=cyberwire-interview">Maltego Technologies</a>, who is highlighting how to help analysts in resource-constrained environments overcome training gaps and use investigative tools more effectively.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.nytimes.com/2025/03/23/world/asia/cambodia-money-laundering-huione.html?unlocked_article_code=1.6E4.AX3t.f5GtiHT2f_2E&amp;smid=nytcore-ios-share&amp;referringSource=articleShare">How Scammers Launder Money and Get Away With It</a> (New York Times) </p><p><a href="https://therecord.media/trump-executive-order-information-silos-data-sharing-doge">Trump order on information sharing appears to have implications for DOGE and beyond</a> (The Record)</p><p><a href="https://nyunews.com/news/2025/03/22/nyu-website-hacked-data-leak">Over 3 million applicants’ data leaked on NYU’s website</a> (Washington Square News)</p><p><a href="https://www.bleepingcomputer.com/news/security/steam-pulls-game-demo-infecting-windows-with-info-stealing-malware">Steam pulls game demo infecting Windows with info-stealing malware</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/ransomware-group-claims-attack-on-virginia-attorney-generals-office">Ransomware Group Claims Attack on Virginia Attorney General’s Office</a> (SecurityWeek)</p><p><a href="https://www.nytimes.com/2025/03/24/business/23andme-bankruptcy.html?unlocked_article_code=1.6U4.rMSp.hq7gqucS9yE8&amp;smid=nytcore-ios-share&amp;referringSource=articleShare">23andMe Files for Bankruptcy Amid Concerns About Security of Customers’ Genetic Data</a> (New York Times)</p><p><a href="https://www.securityweek.com/medusa-ransomware-uses-malicious-driver-to-disable-security-tools/">Medusa Ransomware Uses Malicious Driver to Disable Security Tools</a> (SecurityWeek)</p><p><a href="https://therecord.media/clearview-ai-illinois-class-action-lawsuit-settlement">Clearview AI settles class-action privacy lawsuit worth an estimated $50 million</a> (The Record)  </p><p><a href="https://cyberscoop.com/cve-program-history-mitre-nist-1999-2024/">Despite challenges, the CVE program is a public-private partnership that has shown resilience</a> (CyberScoop)</p><p><a href="https://blog.cloudflare.com/ai-labyrinth/">Trapping misbehaving bots in an AI Labyrinth</a> (Cloudflare)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2100</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6e178ad0-d378-11ef-84f5-0f818aee6981]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4183441382.mp3?updated=1742922950" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Andrew Hammond: Understanding the plot. [Historian and Curator] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/60/notes</link>
      <description>Please enjoy this encore of Career Notes. 
Historian and Curator at the International Spy Museum. Dr. Andrew Hammond, shares how he came to share the history of espionage and intelligence as a career. Starting out in the Royal Air Force when 9/11 happened, Andrew found himself trying to understand what was going on in the world. Studying history and international relations gave him some perspective and led him on his career path which included an introduction to museum industry at the 9/11 Museum. After a stint in academia in the UK, Andrew found his way back to the US and eventually ended up at the International Spy Museum in Washington, DC. He said one of the "greatest parts of the job being able to engage with the artifacts" and share their stories. We thank Andrew for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 23 Mar 2025 19:00:00 -0000</pubDate>
      <itunes:title>Andrew Hammond: Understanding the plot. [Historian and Curator] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>60</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/07821d3a-0690-11f0-b406-8b1c778659ac/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes. 
Historian and Curator at the International Spy Museum. Dr. Andrew Hammond, shares how he came to share the history of espionage and intelligence as a career. Starting out in the Royal Air Force when 9/11 happened, Andrew found himself trying to understand what was going on in the world. Studying history and international relations gave him some perspective and led him on his career path which included an introduction to museum industry at the 9/11 Museum. After a stint in academia in the UK, Andrew found his way back to the US and eventually ended up at the International Spy Museum in Washington, DC. He said one of the "greatest parts of the job being able to engage with the artifacts" and share their stories. We thank Andrew for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p><p>Historian and Curator at the International Spy Museum. Dr. Andrew Hammond, shares how he came to share the history of espionage and intelligence as a career. Starting out in the Royal Air Force when 9/11 happened, Andrew found himself trying to understand what was going on in the world. Studying history and international relations gave him some perspective and led him on his career path which included an introduction to museum industry at the 9/11 Museum. After a stint in academia in the UK, Andrew found his way back to the US and eventually ended up at the International Spy Museum in Washington, DC. He said one of the "greatest parts of the job being able to engage with the artifacts" and share their stories. We thank Andrew for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>486</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[07821d3a-0690-11f0-b406-8b1c778659ac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4036460791.mp3?updated=1742587793" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Excel-lerating cyberattacks. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/370/notes</link>
      <description>This week, we are joined by Tom Hegel, Principal Threat Researcher from SentinelLabs research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belarusian government espionage, is actively targeting Ukrainian military and government entities as well as Belarusian opposition activists using weaponized Excel documents. 
SentinelLabs identified new malware variants and tactics, including obfuscated VBA macros that deploy malware via DLL files, with payload delivery seemingly controlled based on a target’s location and system profile. The campaign, which began preparation in mid-2024 and became active by late 2024, appears to be an evolution of previous Ghostwriter operations, combining disinformation with cyberattacks to further political and military objectives.

The research can be found here:
Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Mar 2025 07:00:00 -0000</pubDate>
      <itunes:title>Excel-lerating cyberattacks. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>370</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a0cdbc3a-067a-11f0-b62d-47ac1945e7fa/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This week, we are joined by Tom Hegel, Principal Threat Researcher from SentinelLabs research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belarusian government espionage, is actively targeting Ukrainian military and government entities as well as Belarusian opposition activists using weaponized Excel documents. 
SentinelLabs identified new malware variants and tactics, including obfuscated VBA macros that deploy malware via DLL files, with payload delivery seemingly controlled based on a target’s location and system profile. The campaign, which began preparation in mid-2024 and became active by late 2024, appears to be an evolution of previous Ghostwriter operations, combining disinformation with cyberattacks to further political and military objectives.

The research can be found here:
Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/tom-hegel/">Tom Hegel</a>, Principal Threat Researcher from <a href="https://www.linkedin.com/company/sentinelone/">SentinelLabs</a> research team, to discuss their work on "Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition." The latest Ghostwriter campaign, linked to Belarusian government espionage, is actively targeting Ukrainian military and government entities as well as Belarusian opposition activists using weaponized Excel documents. </p><p>SentinelLabs identified new malware variants and tactics, including obfuscated VBA macros that deploy malware via DLL files, with payload delivery seemingly controlled based on a target’s location and system profile. The campaign, which began preparation in mid-2024 and became active by late 2024, appears to be an evolution of previous Ghostwriter operations, combining disinformation with cyberattacks to further political and military objectives.</p><h3><br></h3><h3>The research can be found here:</h3><ul><li><a href="https://www.sentinelone.com/labs/ghostwriter-new-campaign-targets-ukrainian-government-and-belarusian-opposition/">Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1423</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a0cdbc3a-067a-11f0-b62d-47ac1945e7fa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6795461093.mp3?updated=1742578358" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Brute force and broken trust.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2270/notes</link>
      <description>Over 150 government database servers are dangerously exposed to the internet. Threat actors are exploiting a vulnerability in CheckPoint’s ZoneAlarm antivirus software. Albabat ransomware goes cross-platform. ESET reports on the Chinese Operation FishMedley campaign. VanHelsing ransomware targets Windows systems in the U.S. and France. CISA issues five ICS advisories warning of high-severity vulnerabilities across critical infrastructure systems. A former NFL coach is indicted for allegedly hacking into the accounts of thousands of college athletes. Brandon Karpf joins us with a look at cyberspace in space. A fraud detection firm gets shut down for fraud. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Brandon Karpf, friend of N2K CyberWire, joins T-Minus Space Daily host Maria Varmazis for the Space and Cyber March segment.

Selected Reading
Over 150 US Government Database Servers Vulnerable to Internet Exposure (GB Hackers)
White House Shifting Cyber Risk to State and Local Agencies (Data Breach Today)
Cybercriminals Exploit CheckPoint Driver Flaws in Malicious Campaign (Infosecurity Magazine)
Albabat Ransomware Attacking Windows, Linux &amp; macOS by Leveraging GitHub (Cyber Security News)
Chinese I-Soon Hackers Hit 7 Organizations in Operation FishMedley (SecurityWeek)
VanHelsing Ransomware Attacking Windows Systems With New Evasion Technique &amp; File Extension (Cyber Security News)
CISA Releases Five Industrial Control Systems Advisories Covering Vulnerabilities &amp; Exploits (Cyber Security News)
Former NFL, Michigan Assistant Coach Matt Weiss Charged With Hacking for Athletes' Intimate Photos (SecurityWeek)
AdTech CEO whose products detected ad fraud jailed for fraud (The Register) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 21 Mar 2025 20:10:00 -0000</pubDate>
      <itunes:title>Brute force and broken trust.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2270</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Over 150 government database servers are dangerously exposed to the internet. Threat actors are exploiting a vulnerability in CheckPoint’s ZoneAlarm antivirus software. Albabat ransomware goes cross-platform. ESET reports on the Chinese Operation FishMedley campaign. VanHelsing ransomware targets Windows systems in the U.S. and France. CISA issues five ICS advisories warning of high-severity vulnerabilities across critical infrastructure systems. A former NFL coach is indicted for allegedly hacking into the accounts of thousands of college athletes. Brandon Karpf joins us with a look at cyberspace in space. A fraud detection firm gets shut down for fraud. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Brandon Karpf, friend of N2K CyberWire, joins T-Minus Space Daily host Maria Varmazis for the Space and Cyber March segment.

Selected Reading
Over 150 US Government Database Servers Vulnerable to Internet Exposure (GB Hackers)
White House Shifting Cyber Risk to State and Local Agencies (Data Breach Today)
Cybercriminals Exploit CheckPoint Driver Flaws in Malicious Campaign (Infosecurity Magazine)
Albabat Ransomware Attacking Windows, Linux &amp; macOS by Leveraging GitHub (Cyber Security News)
Chinese I-Soon Hackers Hit 7 Organizations in Operation FishMedley (SecurityWeek)
VanHelsing Ransomware Attacking Windows Systems With New Evasion Technique &amp; File Extension (Cyber Security News)
CISA Releases Five Industrial Control Systems Advisories Covering Vulnerabilities &amp; Exploits (Cyber Security News)
Former NFL, Michigan Assistant Coach Matt Weiss Charged With Hacking for Athletes' Intimate Photos (SecurityWeek)
AdTech CEO whose products detected ad fraud jailed for fraud (The Register) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Over 150 government database servers are dangerously exposed to the internet. Threat actors are exploiting a vulnerability in CheckPoint’s ZoneAlarm antivirus software. Albabat ransomware goes cross-platform. ESET reports on the Chinese Operation FishMedley campaign. VanHelsing ransomware targets Windows systems in the U.S. and France. CISA issues five ICS advisories warning of high-severity vulnerabilities across critical infrastructure systems. A former NFL coach is indicted for allegedly hacking into the accounts of thousands of college athletes. Brandon Karpf joins us with a look at cyberspace in space. A fraud detection firm gets shut down for fraud. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a>, friend of N2K CyberWire, joins <a href="https://space.n2k.com/podcasts/t-minus">T-Minus Space Daily</a> host <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> for the Space and Cyber March segment.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://gbhackers.com/over-150-us-government-database-servers-vulnerable/">Over 150 US Government Database Servers Vulnerable to Internet Exposure</a> (GB Hackers)</p><p><a href="https://www.databreachtoday.com/white-house-shifting-cyber-risk-to-state-local-agencies-a-27793">White House Shifting Cyber Risk to State and Local Agencies</a> (Data Breach Today)</p><p><a href="https://www.infosecurity-magazine.com/news/cybercriminals-exploit-checkpoint/">Cybercriminals Exploit CheckPoint Driver Flaws in Malicious Campaign</a> (Infosecurity Magazine)</p><p><a href="https://cybersecuritynews.com/albabat-ransomware-attacking-windows-linux-macos/">Albabat Ransomware Attacking Windows, Linux &amp; macOS by Leveraging GitHub</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/chinese-i-soon-hackers-hit-7-organizations-in-operation-fishmedley/">Chinese I-Soon Hackers Hit 7 Organizations in Operation FishMedley</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/vanhelsing-ransomware-attacking-windows-systems/">VanHelsing Ransomware Attacking Windows Systems With New Evasion Technique &amp; File Extension</a> (Cyber Security News)</p><p><a href="https://cybersecuritynews.com/cisa-releases-five-industrial-control-systems/">CISA Releases Five Industrial Control Systems Advisories Covering Vulnerabilities &amp; Exploits</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/former-nfl-michigan-assistant-coach-matt-weiss-charged-with-hacking-for-athletes-intimate-photos/">Former NFL, Michigan Assistant Coach Matt Weiss Charged With Hacking for Athletes' Intimate Photos</a> (SecurityWeek)</p><p><a href="https://www.theregister.com/2025/03/21/kubient_ceo_jailed/">AdTech CEO whose products detected ad fraud jailed for fraud</a> (The Register) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1523</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6dda557a-d378-11ef-84f5-2704225e049e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7979067448.mp3?updated=1742583620" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Can’t escape RCE flaws.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2269/notes</link>
      <description>Veeam patches a critical vulnerability in its Backup &amp; Replication software. A spyware data breach highlights ongoing risks. Clearview AI attempted to purchase sensitive data such as Social Security numbers and mug shots. The Netherlands’ parliament looks to reduce reliance on U.S. software firms. A Pennsylvania union notifies over 517,000 individuals of a data breach. Researchers discover a RansomHub affiliate deploying a new custom backdoor called Betruger. A new info-stealer spreads through game cheats and cracks. David Wiseman, Vice President of Secure Communications at BlackBerry, joins us to explore how organizations can effectively implement CISA’s encrypted communications guidelines. What to do when AI casually accuses you of murder? 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
David Wiseman, Vice President of Secure Communications at BlackBerry, joins us to explore how organizations can effectively implement CISA’s encrypted communications guidelines. Don’t miss the full conversation—listen now on the Caveat podcast!

Selected Reading
Veeam Patches Critical Vulnerability in Backup &amp; Replication (SecurityWeek)
The Citizen Lab’s director dissects spyware and the ‘proliferating’ market for it (The Record)
Data breach at stalkerware SpyX affects close to 2 million, including thousands of Apple users (TechCrunch)
Facial Recognition Company Clearview Attempted to Buy Social Security Numbers and Mugshots for its Database (404 Media)
Dutch parliament calls for end to dependence on US software companies (Yahoo)
Pennsylvania education union data breach hit 500,000 people (Bleeping Computer)
RansomHub Affiliate Deploying New Custom Backdoor Dubbed ‘Betruger’ For Persistence (Cyber Security News)
New Arcane infostealer infects YouTube, Discord users via game cheats (Bleeping Computer)
Dad demands OpenAI delete ChatGPT’s false claim that he murdered his kids (Ars Technica)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 20 Mar 2025 20:10:00 -0000</pubDate>
      <itunes:title>Can’t escape RCE flaws.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2269</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Veeam patches a critical vulnerability in its Backup &amp; Replication software. A spyware data breach highlights ongoing risks. Clearview AI attempted to purchase sensitive data such as Social Security numbers and mug shots. The Netherlands’ parliament looks to reduce reliance on U.S. software firms. A Pennsylvania union notifies over 517,000 individuals of a data breach. Researchers discover a RansomHub affiliate deploying a new custom backdoor called Betruger. A new info-stealer spreads through game cheats and cracks. David Wiseman, Vice President of Secure Communications at BlackBerry, joins us to explore how organizations can effectively implement CISA’s encrypted communications guidelines. What to do when AI casually accuses you of murder? 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
David Wiseman, Vice President of Secure Communications at BlackBerry, joins us to explore how organizations can effectively implement CISA’s encrypted communications guidelines. Don’t miss the full conversation—listen now on the Caveat podcast!

Selected Reading
Veeam Patches Critical Vulnerability in Backup &amp; Replication (SecurityWeek)
The Citizen Lab’s director dissects spyware and the ‘proliferating’ market for it (The Record)
Data breach at stalkerware SpyX affects close to 2 million, including thousands of Apple users (TechCrunch)
Facial Recognition Company Clearview Attempted to Buy Social Security Numbers and Mugshots for its Database (404 Media)
Dutch parliament calls for end to dependence on US software companies (Yahoo)
Pennsylvania education union data breach hit 500,000 people (Bleeping Computer)
RansomHub Affiliate Deploying New Custom Backdoor Dubbed ‘Betruger’ For Persistence (Cyber Security News)
New Arcane infostealer infects YouTube, Discord users via game cheats (Bleeping Computer)
Dad demands OpenAI delete ChatGPT’s false claim that he murdered his kids (Ars Technica)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Veeam patches a critical vulnerability in its Backup &amp; Replication software. A spyware data breach highlights ongoing risks. Clearview AI attempted to purchase sensitive data such as Social Security numbers and mug shots. The Netherlands’ parliament looks to reduce reliance on U.S. software firms. A Pennsylvania union notifies over 517,000 individuals of a data breach. Researchers discover a RansomHub affiliate deploying a new custom backdoor called Betruger. A new info-stealer spreads through game cheats and cracks. David Wiseman, Vice President of Secure Communications at BlackBerry, joins us to explore how organizations can effectively implement CISA’s encrypted communications guidelines. What to do when AI casually accuses you of murder? </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/davidjwiseman/">David Wiseman</a>, Vice President of Secure Communications at <a href="https://www.linkedin.com/company/blackberry/">BlackBerry</a>, joins us to explore how organizations can effectively implement CISA’s encrypted communications guidelines. Don’t miss the full conversation—listen now on the <a href="https://thecyberwire.com/podcasts/caveat">Caveat</a> podcast!</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/veeam-patches-critical-vulnerability-in-backup-replication/">Veeam Patches Critical Vulnerability in Backup &amp; Replication</a> (SecurityWeek)</p><p><a href="https://therecord.media/ron-deibert-citizen-lab-spyware-interview">The Citizen Lab’s director dissects spyware and the ‘proliferating’ market for it</a> (The Record)</p><p><a href="https://techcrunch.com/2025/03/19/data-breach-at-stalkerware-spyx-affects-close-to-2-million-including-thousands-of-apple-users/">Data breach at stalkerware SpyX affects close to 2 million, including thousands of Apple users</a> (TechCrunch)</p><p><a href="https://www.404media.co/facial-recognition-company-clearview-attempted-to-buy-social-security-numbers-and-mugshots-for-its-database/">Facial Recognition Company Clearview Attempted to Buy Social Security Numbers and Mugshots for its Database</a> (404 Media)</p><p><a href="https://www.yahoo.com/news/dutch-parliament-calls-end-reliance-155717872.html">Dutch parliament calls for end to dependence on US software companies</a> (Yahoo)</p><p><a href="https://www.bleepingcomputer.com/news/security/pennsylvania-education-union-data-breach-hit-500-000-people/">Pennsylvania education union data breach hit 500,000 people</a> (Bleeping Computer)</p><p><a href="https://cybersecuritynews.com/ransomhub-affiliate-deploying-betruger/">RansomHub Affiliate Deploying New Custom Backdoor Dubbed ‘Betruger’ For Persistence</a> (Cyber Security News)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-arcane-infostealer-infects-youtube-discord-users-via-game-cheats/">New Arcane infostealer infects YouTube, Discord users via game cheats</a> (Bleeping Computer)</p><p><a href="https://arstechnica.com/tech-policy/2025/03/chatgpt-falsely-claimed-a-dad-murdered-his-own-kids-complaint-says/">Dad demands OpenAI delete ChatGPT’s false claim that he murdered his kids</a> (Ars Technica)</p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1452</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6d9de64e-d378-11ef-84f5-03f521a66780]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4070421523.mp3?updated=1742495809" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Remote hijacking at your fingertips.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2268/notes</link>
      <description>A critical vulnerability could let attackers hijack and potentially disable vulnerable servers. Europol warns of a “shadow alliance” between state-backed threat actors and cybercriminals. Sekoia examines ClearFake. A critical PHP vulnerability is under active exploitation. A sophisticated scareware phishing campaign has shifted its focus to macOS users. Phishing as a service attacks are on the rise. A new jailbreak technique bypasses security controls in popular LLMs. Microsoft has uncovered StilachiRAT. CISA confirms active exploitation of a critical Fortinet vulnerability. On our CertByte segment, Chris Hare is joined by Troy McMillan to break down a question targeting the ISACA® Certified Information Security Manager® (CISM®) exam. AI coding assistants get all judgy. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from N2K’s suite of industry-leading certification resources. This week, Chris is joined by Troy McMillan to break down a question targeting the ISACA® Certified Information Security Manager® (CISM®) exam. Today’s question comes from N2K’s ISACA® Certified Information Security Manager® (CISM®) Practice Test.
The CISM exam helps to affirm your ability to assess risks, implement effective governance, proactively respond to incidents and is the preferred credential for IT managers, according to ISACA.To learn more about this and other related topics under this objective, please refer to the following resource: CISM Review Manual, 15th Edition, 1.0, Information Security Governance, Introduction.
Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify.
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.
Additional source: https://www.isaca.org/credentialing/cism#1

Selected Reading
Critical AMI MegaRAC bug can let attackers hijack, brick servers (bleepingcomputer)
Europol Warns of “Shadow Alliance” Between States and Criminals (Infosecurity Magazine)
ClearFake’s New Widespread Variant: Increased Web3 Exploitation for Malware Delivery (Sekoia.io Blog)
PHP RCE Vulnerability Actively Exploited in Wild to Attack Windows-based Systems (cybersecuritynews)
Scareware Combined With Phishing in Attacks Targeting macOS Users (securityweek)
Sneaky 2FA Joins Tycoon 2FA and EvilProxy in 2025 Phishing Surge (Infosecurity Magazine)
New Jailbreak Technique Bypasses DeepSeek, Copilot, and ChatGPT to Generate Chrome Malware (gbhackers)
Microsoft Warns of New StilachiRAT Malware (SecurityWeek)
Fortinet Vulnerability Exploited in Ransomware Attack, CISA Warns (Infosecurity Magazine)
AI coding assistant Cursor reportedly tells a 'vibe coder' to write his own damn code (TechCrunch)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 19 Mar 2025 20:10:00 -0000</pubDate>
      <itunes:title>Remote hijacking at your fingertips.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2268</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A critical vulnerability could let attackers hijack and potentially disable vulnerable servers. Europol warns of a “shadow alliance” between state-backed threat actors and cybercriminals. Sekoia examines ClearFake. A critical PHP vulnerability is under active exploitation. A sophisticated scareware phishing campaign has shifted its focus to macOS users. Phishing as a service attacks are on the rise. A new jailbreak technique bypasses security controls in popular LLMs. Microsoft has uncovered StilachiRAT. CISA confirms active exploitation of a critical Fortinet vulnerability. On our CertByte segment, Chris Hare is joined by Troy McMillan to break down a question targeting the ISACA® Certified Information Security Manager® (CISM®) exam. AI coding assistants get all judgy. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from N2K’s suite of industry-leading certification resources. This week, Chris is joined by Troy McMillan to break down a question targeting the ISACA® Certified Information Security Manager® (CISM®) exam. Today’s question comes from N2K’s ISACA® Certified Information Security Manager® (CISM®) Practice Test.
The CISM exam helps to affirm your ability to assess risks, implement effective governance, proactively respond to incidents and is the preferred credential for IT managers, according to ISACA.To learn more about this and other related topics under this objective, please refer to the following resource: CISM Review Manual, 15th Edition, 1.0, Information Security Governance, Introduction.
Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify.
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.
Additional source: https://www.isaca.org/credentialing/cism#1

Selected Reading
Critical AMI MegaRAC bug can let attackers hijack, brick servers (bleepingcomputer)
Europol Warns of “Shadow Alliance” Between States and Criminals (Infosecurity Magazine)
ClearFake’s New Widespread Variant: Increased Web3 Exploitation for Malware Delivery (Sekoia.io Blog)
PHP RCE Vulnerability Actively Exploited in Wild to Attack Windows-based Systems (cybersecuritynews)
Scareware Combined With Phishing in Attacks Targeting macOS Users (securityweek)
Sneaky 2FA Joins Tycoon 2FA and EvilProxy in 2025 Phishing Surge (Infosecurity Magazine)
New Jailbreak Technique Bypasses DeepSeek, Copilot, and ChatGPT to Generate Chrome Malware (gbhackers)
Microsoft Warns of New StilachiRAT Malware (SecurityWeek)
Fortinet Vulnerability Exploited in Ransomware Attack, CISA Warns (Infosecurity Magazine)
AI coding assistant Cursor reportedly tells a 'vibe coder' to write his own damn code (TechCrunch)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A critical vulnerability could let attackers hijack and potentially disable vulnerable servers. Europol warns of a “shadow alliance” between state-backed threat actors and cybercriminals. Sekoia examines ClearFake. A critical PHP vulnerability is under active exploitation. A sophisticated scareware phishing campaign has shifted its focus to macOS users. Phishing as a service attacks are on the rise. A new jailbreak technique bypasses security controls in popular LLMs. Microsoft has uncovered StilachiRAT. CISA confirms active exploitation of a critical Fortinet vulnerability. On our CertByte segment, Chris Hare is joined by Troy McMillan to break down a question targeting the ISACA® Certified Information Security Manager® (CISM®) exam. AI coding assistants get all judgy.<strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CertByte Segment</h2><p>Welcome to CertByte! On this bi-weekly segment hosted by <a href="https://www.linkedin.com/in/chrisharepmp/">Chris Hare</a>, a content developer and project management specialist at <a href="https://www.n2k.com/?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1740605340384.1740674526462.317&amp;__hssc=223811332.1.1740674526462&amp;__hsfp=3850742519">N2K</a>, we share practice questions from N2K’s suite of industry-leading certification resources. This week, Chris is joined by<a href="https://www.linkedin.com/in/troy-mcmillan-834a632/"> Troy McMillan</a> to break down a question targeting the ISACA® Certified Information Security Manager® (CISM®) exam. Today’s question comes from<a href="https://certify.cybervista.net/products/isaca/cism-practice-test/"> N2K’s ISACA® Certified Information Security Manager® (CISM®) Practice Test</a>.</p><p>The CISM exam helps to affirm your ability to assess risks, implement effective governance, proactively respond to incidents and is the preferred credential for IT managers, according to ISACA.To learn more about this and other related topics under this objective, please refer to the following resource: CISM Review Manual, 15th Edition, 1.0, Information Security Governance, Introduction.</p><p>Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify.</p><p>Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.</p><p>Additional source:<a href="https://www.isaca.org/credentialing/cism#1"> https://www.isaca.org/credentialing/cism#1</a></p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/critical-ami-megarac-bug-can-let-attackers-hijack-brick-servers/">Critical AMI MegaRAC bug can let attackers hijack, brick servers</a> (bleepingcomputer)</p><p><a href="https://www.infosecurity-magazine.com/news/europol-warns-shadow-alliance/">Europol Warns of “Shadow Alliance” Between States and Criminals</a> (Infosecurity Magazine)</p><p><a href="https://blog.sekoia.io/clearfakes-new-widespread-variant-increased-web3-exploitation-for-malware-delivery/">ClearFake’s New Widespread Variant: Increased Web3 Exploitation for Malware Delivery</a> (Sekoia.io Blog)</p><p><a href="https://cybersecuritynews.com/php-rce-vulnerability-actively-exploited-in-wild/">PHP RCE Vulnerability Actively Exploited in Wild to Attack Windows-based Systems</a> (cybersecuritynews)</p><p><a href="https://www.securityweek.com/scareware-combined-with-phishing-in-attacks-targeting-macos-users/">Scareware Combined With Phishing in Attacks Targeting macOS Users</a> (securityweek)</p><p><a href="https://www.infosecurity-magazine.com/news/sneaky-2fa-joins-tycoon-2fa/">Sneaky 2FA Joins Tycoon 2FA and EvilProxy in 2025 Phishing Surge</a> (Infosecurity Magazine)</p><p><a href="https://gbhackers.com/new-jailbreak-technique-bypasses/">New Jailbreak Technique Bypasses DeepSeek, Copilot, and ChatGPT to Generate Chrome Malware</a> (gbhackers)</p><p><a href="https://www.securityweek.com/microsoft-warns-of-new-stilachirat-malware/">Microsoft Warns of New StilachiRAT Malware </a>(SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/fortinet-vulnerability-ransomware/">Fortinet Vulnerability Exploited in Ransomware Attack, CISA Warns</a> (Infosecurity Magazine)</p><p><a href="https://techcrunch.com/2025/03/14/ai-coding-assistant-cursor-reportedly-tells-a-vibe-coder-to-write-his-own-damn-code/">AI coding assistant Cursor reportedly tells a 'vibe coder' to write his own damn code</a> (TechCrunch)</p><p><br></p><h2>Share your feedback.</h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1563</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6d60b7ec-d378-11ef-84f5-a30935de8490]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3691472732.mp3?updated=1742410834" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tomcat got your server?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2267/notes</link>
      <description>An Apache Tomcat vulnerability is under active exploitation. CISA rehires workers ousted by DOGE. Lawmakers look to protect rural water systems from cyber threats. Western Alliance Bank notifies 22,000 individuals of a data breach. A new cyberattack method called BitM allows hackers to bypass multi-factor authentication.  A Chinese cyberespionage group targets Central European diplomats. A new cyberattack uses ChatGPT infrastructure to target the financial sector and U.S. government agencies. Australia sues a major securities firm over inadequate protection of customer data. Our Threat Vector segment examines how unifying security capabilities strengthens cyber resilience. Cybercriminals say, “Get me Edward Snowden on the line!”
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
Security platformization is transforming the way organizations defend against cyber threats. In this episode of Threat Vector, host David Moulton speaks with Carlos Rivera, Senior Analyst at Forrester, about how unifying security capabilities strengthens cyber resilience. To listen to the full discussion, please check out the episode here or on your favorite podcast app, and tune in to new episodes of Threat Vector by Palo Alto Networks﻿ every Thursday. 

Selected Reading
Critical Apache Tomcat RCE Vulnerability Exploited in Just 30hrs of Public Exploit (Cyber Security News)
CISA Rehires Fired Employees, Immediately Puts Them on Leave (GovInfo Security)
Western Alliance Bank Discloses Data Breach Linked to Cleo Hack (SecurityWeek)
New BitM Attack Lets Hackers Steal User Sessions Within Seconds (Cyber Security News)
US Lawmakers Reintroduce Bill to Boost Rural Water Cybersecurity  (SecurityWeek)
Chinese Hackers Target European Diplomats with Malware (GovInfo Security)
Hackers Exploit ChatGPT with CVE-2024-27564, 10,000+ Attacks in a Week (Hackread)
Australia Sues FIIG Investment Firm in Cyber 'Wake-Up Call' (GovInfo Security)
Extortion crew threatened to inform Edward Snowden (?!) if victim didn't pay up (The Register)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Mar 2025 20:10:00 -0000</pubDate>
      <itunes:title>Tomcat got your server?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2267</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>An Apache Tomcat vulnerability is under active exploitation. CISA rehires workers ousted by DOGE. Lawmakers look to protect rural water systems from cyber threats. Western Alliance Bank notifies 22,000 individuals of a data breach. A new cyberattack method called BitM allows hackers to bypass multi-factor authentication.  A Chinese cyberespionage group targets Central European diplomats. A new cyberattack uses ChatGPT infrastructure to target the financial sector and U.S. government agencies. Australia sues a major securities firm over inadequate protection of customer data. Our Threat Vector segment examines how unifying security capabilities strengthens cyber resilience. Cybercriminals say, “Get me Edward Snowden on the line!”
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
Security platformization is transforming the way organizations defend against cyber threats. In this episode of Threat Vector, host David Moulton speaks with Carlos Rivera, Senior Analyst at Forrester, about how unifying security capabilities strengthens cyber resilience. To listen to the full discussion, please check out the episode here or on your favorite podcast app, and tune in to new episodes of Threat Vector by Palo Alto Networks﻿ every Thursday. 

Selected Reading
Critical Apache Tomcat RCE Vulnerability Exploited in Just 30hrs of Public Exploit (Cyber Security News)
CISA Rehires Fired Employees, Immediately Puts Them on Leave (GovInfo Security)
Western Alliance Bank Discloses Data Breach Linked to Cleo Hack (SecurityWeek)
New BitM Attack Lets Hackers Steal User Sessions Within Seconds (Cyber Security News)
US Lawmakers Reintroduce Bill to Boost Rural Water Cybersecurity  (SecurityWeek)
Chinese Hackers Target European Diplomats with Malware (GovInfo Security)
Hackers Exploit ChatGPT with CVE-2024-27564, 10,000+ Attacks in a Week (Hackread)
Australia Sues FIIG Investment Firm in Cyber 'Wake-Up Call' (GovInfo Security)
Extortion crew threatened to inform Edward Snowden (?!) if victim didn't pay up (The Register)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An Apache Tomcat vulnerability is under active exploitation. CISA rehires workers ousted by DOGE. Lawmakers look to protect rural water systems from cyber threats. Western Alliance Bank notifies 22,000 individuals of a data breach. A new cyberattack method called BitM allows hackers to bypass multi-factor authentication.  A Chinese cyberespionage group targets Central European diplomats. A new cyberattack uses ChatGPT infrastructure to target the financial sector and U.S. government agencies. Australia sues a major securities firm over inadequate protection of customer data. Our Threat Vector segment examines how unifying security capabilities strengthens cyber resilience. Cybercriminals say, “Get me Edward Snowden on the line!”</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Threat Vector Segment</h2><p>Security platformization is transforming the way organizations defend against cyber threats. In this episode of Threat Vector, host <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a> speaks with <a href="https://www.linkedin.com/in/riveracarlosj/">Carlos Rivera</a>, Senior Analyst at Forrester, about how unifying security capabilities strengthens cyber resilience. To listen to the full discussion, please check out the episode<a href="https://thecyberwire.com/podcasts/threat-vector/59/notes"> here</a> or on your favorite podcast app, and tune in to new episodes of<a href="https://thecyberwire.com/podcasts/threat-vector"> Threat Vector</a> by<a href="https://www.paloaltonetworks.com/"> Palo Alto Networks</a>﻿ every Thursday. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://cybersecuritynews.com/apache-tomcat-rce-vulnerability-exploited/">Critical Apache Tomcat RCE Vulnerability Exploited in Just 30hrs of Public Exploit</a> (Cyber Security News)</p><p><a href="https://www.govinfosecurity.com/cisa-rehires-fired-employees-immediately-puts-them-on-leave-a-27743">CISA Rehires Fired Employees, Immediately Puts Them on Leave</a> (GovInfo Security)</p><p><a href="https://www.securityweek.com/western-alliance-bank-discloses-data-breach-linked-to-cleo-hack/">Western Alliance Bank Discloses Data Breach Linked to Cleo Hack</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/bitm-attack-lets-hackers-steal-user-sessions/">New BitM Attack Lets Hackers Steal User Sessions Within Seconds</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/us-lawmakers-reintroduce-bill-to-boost-rural-water-cybersecurity/">US Lawmakers Reintroduce Bill to Boost Rural Water Cybersecurity</a>  (SecurityWeek)</p><p><a href="https://www.govinfosecurity.com/chinese-hackers-target-european-diplomats-malware-a-27745">Chinese Hackers Target European Diplomats with Malware</a> (GovInfo Security)</p><p><a href="https://hackread.com/hackers-exploit-chatgpt-cve-2024-27564-10000-attacks/">Hackers Exploit ChatGPT with CVE-2024-27564, 10,000+ Attacks in a Week</a> (Hackread)</p><p><a href="https://www.govinfosecurity.com/australia-sues-fiig-investment-firm-in-cyber-wake-up-call-a-27749">Australia Sues FIIG Investment Firm in Cyber 'Wake-Up Call'</a> (GovInfo Security)</p><p><a href="https://www.theregister.com/2025/03/18/extortionists_ox_thief_legal_threats/">Extortion crew threatened to inform Edward Snowden (?!) if victim didn't pay up</a> (The Register)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1497</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6d1f3ede-d378-11ef-84f5-7f27983747f4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3671203850.mp3?updated=1742321684" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A reel disaster for GitHub.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2266/notes</link>
      <description>A phishing campaign targets nearly 12,000 GitHub repositories. The BlackLock ransomware group is one to watch. A federal judge orders reinstatement of workers at CISA. Over 100 car dealership websites suffer a supply chain attack, and Hellcat breaches Jaguar Land Rover. Researchers uncover a major vulnerability affecting RSA encryption keys. A Life Insurance Company notifies 355,500 individuals of a December 2024 data breach. A researcher releases a decryptor for Akira ransomware. A new  mapping database aims to help NGOs and high-risk individuals find security tools. Tim Starks from CyberScoop reports that trade groups fear a cybersecurity blackout if a key panel and vital cyber law aren’t renewed. A fundamental shift of our understanding of hash tables. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today our guest is Tim Starks from CyberScoop is discussing how "Trade groups worry information sharing will worsen without critical infrastructure panel, CISA law renewal."

Selected Reading
Fake "Security Alert" issues on GitHub use OAuth app to hijack accounts (Bleeping Computer)
BlackLock Ransomware Strikes Over 40 Organizations in Just Two Months (GB Hackers)
Federal Judges Block Trump's Mass Firings of Federal Workers (BankInfo Security)
100 Car Dealerships Hit by Supply Chain Attack (SecurityWeek)
Jaguar Land Rover Breached by HELLCAT Ransomware Group using Jira Credentials (Cyber Security News)
Millions Of RSA Key Exposes Serious Flaws That Can Be Exploited (Cyber Security News)
Insurer Notifying 335,500 Customers, Agents, Others of Hack (BankInfo Security)
New Akira ransomware decryptor cracks encryptions keys using GPUs (Bleeping Computer)
Security Database Aims to Empower Non-Profits (Infosecurity Magazine)
Undergraduate Disproves 40-Year-Old Conjecture, Invents New Kind of Hash Table (WIRED)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 17 Mar 2025 20:10:00 -0000</pubDate>
      <itunes:title>A reel disaster for GitHub.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2266</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A phishing campaign targets nearly 12,000 GitHub repositories. The BlackLock ransomware group is one to watch. A federal judge orders reinstatement of workers at CISA. Over 100 car dealership websites suffer a supply chain attack, and Hellcat breaches Jaguar Land Rover. Researchers uncover a major vulnerability affecting RSA encryption keys. A Life Insurance Company notifies 355,500 individuals of a December 2024 data breach. A researcher releases a decryptor for Akira ransomware. A new  mapping database aims to help NGOs and high-risk individuals find security tools. Tim Starks from CyberScoop reports that trade groups fear a cybersecurity blackout if a key panel and vital cyber law aren’t renewed. A fundamental shift of our understanding of hash tables. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today our guest is Tim Starks from CyberScoop is discussing how "Trade groups worry information sharing will worsen without critical infrastructure panel, CISA law renewal."

Selected Reading
Fake "Security Alert" issues on GitHub use OAuth app to hijack accounts (Bleeping Computer)
BlackLock Ransomware Strikes Over 40 Organizations in Just Two Months (GB Hackers)
Federal Judges Block Trump's Mass Firings of Federal Workers (BankInfo Security)
100 Car Dealerships Hit by Supply Chain Attack (SecurityWeek)
Jaguar Land Rover Breached by HELLCAT Ransomware Group using Jira Credentials (Cyber Security News)
Millions Of RSA Key Exposes Serious Flaws That Can Be Exploited (Cyber Security News)
Insurer Notifying 335,500 Customers, Agents, Others of Hack (BankInfo Security)
New Akira ransomware decryptor cracks encryptions keys using GPUs (Bleeping Computer)
Security Database Aims to Empower Non-Profits (Infosecurity Magazine)
Undergraduate Disproves 40-Year-Old Conjecture, Invents New Kind of Hash Table (WIRED)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A phishing campaign targets nearly 12,000 GitHub repositories. The BlackLock ransomware group is one to watch. A federal judge orders reinstatement of workers at CISA. Over 100 car dealership websites suffer a supply chain attack, and Hellcat breaches Jaguar Land Rover. Researchers uncover a major vulnerability affecting RSA encryption keys. A Life Insurance Company notifies 355,500 individuals of a December 2024 data breach. A researcher releases a decryptor for Akira ransomware. A new  mapping database aims to help NGOs and high-risk individuals find security tools. Tim Starks from CyberScoop reports that trade groups fear a cybersecurity blackout if a key panel and vital cyber law aren’t renewed. A fundamental shift of our understanding of hash tables. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today our guest is <a href="https://www.linkedin.com/in/tstarks/">Tim Starks</a> from <a href="https://www.linkedin.com/company/cyberscoop/">CyberScoop</a> is discussing how "<a href="https://cyberscoop.com/cyber-information-sharing-critical-infrastructure-panel-cisa-law-renewal/">Trade groups worry information sharing will worsen without critical infrastructure panel, CISA law renewal</a>."</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/">Fake "Security Alert" issues on GitHub use OAuth app to hijack accounts</a> (Bleeping Computer)</p><p><a href="https://gbhackers.com/blacklock-ransomware-strikes-over-40-organizations/">BlackLock Ransomware Strikes Over 40 Organizations in Just Two Months</a> (GB Hackers)</p><p><a href="https://www.bankinfosecurity.com/federal-judges-block-trumps-mass-firings-federal-workers-a-27734">Federal Judges Block Trump's Mass Firings of Federal Workers</a> (BankInfo Security)</p><p><a href="https://www.securityweek.com/100-car-dealerships-hit-by-supply-chain-attack/">100 Car Dealerships Hit by Supply Chain Attack</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/jaguar-land-rover-breached-by-hellcat/">Jaguar Land Rover Breached by HELLCAT Ransomware Group using Jira Credentials</a> (Cyber Security News)</p><p><a href="https://cybersecuritynews.com/millions-of-rsa-key-exposes-serious-flaws/">Millions Of RSA Key Exposes Serious Flaws That Can Be Exploited</a> (Cyber Security News)</p><p><a href="https://www.bankinfosecurity.com/insurer-notifying-335500-customers-agents-others-hack-a-27733">Insurer Notifying 335,500 Customers, Agents, Others of Hack</a> (BankInfo Security)</p><p><a href="https://www.bleepingcomputer.com/news/security/gpu-powered-akira-ransomware-decryptor-released-on-github/">New Akira ransomware decryptor cracks encryptions keys using GPUs</a> (Bleeping Computer)</p><p><a href="https://www.infosecurity-magazine.com/news/security-database-aims-empower/">Security Database Aims to Empower Non-Profits</a><a href="https://www.infosecurity-magazine.com/news/security-database-aims-empower/"> (Infosecurity Magazine</a>)</p><p><a href="https://www.wired.com/story/undergraduate-upends-a-40-year-old-data-science-conjecture/">Undergraduate Disproves 40-Year-Old Conjecture, Invents New Kind of Hash Table</a><a href="https://www.wired.com/story/undergraduate-upends-a-40-year-old-data-science-conjecture/"> (WIRED</a>)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1438</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6ce3a8ce-d378-11ef-84f5-0f61e789d16a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3423775284.mp3?updated=1742236515" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ingrid Toppelberg: Knowing how to take risks will pay off. [Cybersecurity education] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/59/notes</link>
      <description>Please enjoy this encore of Career Notes.
Chief Product Officer at Cybint Solutions, Ingrid Toppelberg, shares her journey from consulting to bootcamp coach and cybersecurity education. As a young girl, Ingrid wanted to do everything from being a teacher to the head of the World Bank. After consulting for several years, Ingrid found cybersecurity. What she found fascinating about the cyber world is how important it is for absolutely everyone at all levels to know about cybersecurity. Ingrid also develops and conducts bootcamps to reskill displaced people into cybersecurity. Ingrid says to those interested in cyber, "just do it. We need different kinds of minds in cyber keeping us safe." We thank Ingrid for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 16 Mar 2025 07:00:00 -0000</pubDate>
      <itunes:title>Ingrid Toppelberg: Knowing how to take risks will pay off. [Cybersecurity education] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>59</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore of Career Notes.
Chief Product Officer at Cybint Solutions, Ingrid Toppelberg, shares her journey from consulting to bootcamp coach and cybersecurity education. As a young girl, Ingrid wanted to do everything from being a teacher to the head of the World Bank. After consulting for several years, Ingrid found cybersecurity. What she found fascinating about the cyber world is how important it is for absolutely everyone at all levels to know about cybersecurity. Ingrid also develops and conducts bootcamps to reskill displaced people into cybersecurity. Ingrid says to those interested in cyber, "just do it. We need different kinds of minds in cyber keeping us safe." We thank Ingrid for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes.</p><p>Chief Product Officer at Cybint Solutions, Ingrid Toppelberg, shares her journey from consulting to bootcamp coach and cybersecurity education. As a young girl, Ingrid wanted to do everything from being a teacher to the head of the World Bank. After consulting for several years, Ingrid found cybersecurity. What she found fascinating about the cyber world is how important it is for absolutely everyone at all levels to know about cybersecurity. Ingrid also develops and conducts bootcamps to reskill displaced people into cybersecurity. Ingrid says to those interested in cyber, "just do it. We need different kinds of minds in cyber keeping us safe." We thank Ingrid for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>452</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[87ede002-00f6-11f0-a68b-b72b366a8cf2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6653778463.mp3?updated=1741971533" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trailblazers in Cybersecurity: Lessons from the Women Leading the Charge [Threat Vector]</title>
      <link>https://thecyberwire.com/podcasts/threat-vector/58/notes</link>
      <description>We thought you might enjoy this episode of Threat Vector podcast from the N2K CyberWIre network as we continue our observance of Women's History Month. You can catch new episodes of Threat Vector every Thursday here and on your favorite podcast app. 

In this special Women’s History Month episode of Threat Vector, host David Moulton speaks with four trailblazing women in cybersecurity who are shaping the industry: Kristy Friedrichs, Chief Partnerships Officer; Tanya Shastri, SVP of Product Management; Sama Manchanda, Consultant at Unit 42; and Stephanie Regan, Principal Technical Architect at Unit 42.

They share their journeys into cybersecurity, discuss the challenges they faced, and offer insights on leadership, innovation, and mentorship. From AI-driven security to digital forensics, these women have made a lasting impact. Tune in to hear their advice for the next generation and why cybersecurity remains one of the most exciting and dynamic fields to be in today.

﻿Join the conversation on our social media channels:



Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/



Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠



Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠



LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠



YouTube: @paloaltonetworks


Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠



About Threat Vector
Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.

Palo Alto Networks
Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 16 Mar 2025 06:00:00 -0000</pubDate>
      <itunes:title>Trailblazers in Cybersecurity: Lessons from the Women Leading the Charge</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>58</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5986e312-feb2-11ef-9ba5-ef1ad2e137d5/image/d1d87f114f5761a60cfbeb7c48197b0a.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>We thought you might enjoy this episode of Threat Vector podcast from the N2K CyberWIre network as we continue our observance of Women's History Month. You can catch new episodes of Threat Vector every Thursday here and on your favorite podcast app. 

In this special Women’s History Month episode of Threat Vector, host David Moulton speaks with four trailblazing women in cybersecurity who are shaping the industry: Kristy Friedrichs, Chief Partnerships Officer; Tanya Shastri, SVP of Product Management; Sama Manchanda, Consultant at Unit 42; and Stephanie Regan, Principal Technical Architect at Unit 42.

They share their journeys into cybersecurity, discuss the challenges they faced, and offer insights on leadership, innovation, and mentorship. From AI-driven security to digital forensics, these women have made a lasting impact. Tune in to hear their advice for the next generation and why cybersecurity remains one of the most exciting and dynamic fields to be in today.

﻿Join the conversation on our social media channels:



Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/



Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠



Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠



LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠



YouTube: @paloaltonetworks


Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠



About Threat Vector
Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.

Palo Alto Networks
Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong><em>We thought you might enjoy this episode of Threat Vector podcast from the N2K CyberWIre network as we continue our observance of Women's History Month. You can catch new episodes of </em></strong><a href="https://thecyberwire.com/podcasts/threat-vector"><strong><em>Threat Vector</em></strong></a><strong><em> every Thursday here and on your favorite podcast app. </em></strong></p><p><br></p><p>In this special Women’s History Month episode of Threat Vector, host <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a> speaks with four trailblazing women in cybersecurity who are shaping the industry: <a href="https://www.linkedin.com/in/kristy-friedrichs-mcbride-6590a127/">Kristy Friedrichs</a>, Chief Partnerships Officer; <a href="https://www.linkedin.com/in/tanyas/">Tanya Shastri</a>, SVP of Product Management; <a href="https://www.linkedin.com/in/samamanchanda/">Sama Manchanda</a>, Consultant at Unit 42; and <a href="https://www.linkedin.com/in/stephanie-regan-83a283350/">Stephanie Regan</a>, Principal Technical Architect at Unit 42.</p><p><br></p><p>They share their journeys into cybersecurity, discuss the challenges they faced, and offer insights on leadership, innovation, and mentorship. From AI-driven security to digital forensics, these women have made a lasting impact. Tune in to hear their advice for the next generation and why cybersecurity remains one of the most exciting and dynamic fields to be in today.</p><p><br></p><p>﻿Join the conversation on our social media channels:</p><p><br></p><ul>
<li>
<strong>Website</strong>:<a href="https://www.paloaltonetworks.com/unit42"> ⁠⁠⁠⁠https://www.paloaltonetworks.com/</a>
</li>
<li>
<strong>Threat Research:</strong><a href="https://unit42.paloaltonetworks.com/"><strong> </strong>⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠</a>
</li>
<li>
<strong>Facebook:</strong><a href="https://www.facebook.com/LifeatPaloAltoNetworks/"><strong> </strong>⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠</a>
</li>
<li>
<strong>LinkedIn:</strong><a href="https://www.linkedin.com/company/unit42/"><strong> </strong>⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠</a>
</li>
<li>
<strong>YouTube:</strong><a href="https://www.youtube.com/channel/UCvJQO11qoCHYwZ4Ah4Jf-Tw"><strong> </strong></a>@paloaltonetworks</li>
<li>
<strong>Twitter:</strong><a href="https://twitter.com/PaloAltoNtwks"><strong> </strong>⁠⁠⁠⁠</a><a href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0">https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠</a>
</li>
</ul><p><br></p><p><strong>About Threat Vector</strong></p><p>Threat Vector by Palo Alto Networks is your premier podcast for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.</p><p><br></p><p>The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.</p><p><br></p><p>Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.</p><p><br></p><p><strong>Palo Alto Networks</strong></p><p>Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.<a href="http://paloaltonetworks.com/"> ⁠http://paloaltonetworks.com⁠</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1810</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5986e312-feb2-11ef-9ba5-ef1ad2e137d5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6920653040.mp3?updated=1741707100" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The ransomware clones of HellCat &amp; Morpheus. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/369/notes</link>
      <description>Jim Walter, Senior Threat Researcher on SentinelLabs research team, to discuss their work on "HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code." Over the past six months, new ransomware groups like FunkSec, Nitrogen, and Termite have emerged, while established threats such as Cl0p and LockBit 4.0 have resurfaced. Two prominent Ransomware-as-a-Service (RaaS) operations, HellCat and Morpheus, have gained traction, with research indicating that affiliates of both are using nearly identical ransomware payloads. 
Despite similarities in their encryption techniques and ransom notes, there is no conclusive evidence linking HellCat and Morpheus to the Underground Team, though shared tools or affiliates may be involved.

The research can be found here:
HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Mar 2025 07:00:00 -0000</pubDate>
      <itunes:title>The ransomware clones of HellCat &amp; Morpheus. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>369</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/2eed5260-00ee-11f0-a428-ab3a2222630e/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Jim Walter, Senior Threat Researcher on SentinelLabs research team, to discuss their work on "HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code." Over the past six months, new ransomware groups like FunkSec, Nitrogen, and Termite have emerged, while established threats such as Cl0p and LockBit 4.0 have resurfaced. Two prominent Ransomware-as-a-Service (RaaS) operations, HellCat and Morpheus, have gained traction, with research indicating that affiliates of both are using nearly identical ransomware payloads. 
Despite similarities in their encryption techniques and ransom notes, there is no conclusive evidence linking HellCat and Morpheus to the Underground Team, though shared tools or affiliates may be involved.

The research can be found here:
HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jim Walter, Senior Threat Researcher on <a href="https://www.linkedin.com/company/sentinelone/">SentinelLabs</a> research team, to discuss their work on "HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code." Over the past six months, new ransomware groups like FunkSec, Nitrogen, and Termite have emerged, while established threats such as Cl0p and LockBit 4.0 have resurfaced. Two prominent Ransomware-as-a-Service (RaaS) operations, HellCat and Morpheus, have gained traction, with research indicating that affiliates of both are using nearly identical ransomware payloads. </p><p>Despite similarities in their encryption techniques and ransom notes, there is no conclusive evidence linking HellCat and Morpheus to the Underground Team, though shared tools or affiliates may be involved.</p><p><br></p><h3>The research can be found here:</h3><ul><li><a href="https://www.sentinelone.com/blog/hellcat-and-morpheus-two-brands-one-payload-as-ransomware-affiliates-drop-identical-code/">HellCat and Morpheus | Two Brands, One Payload as Ransomware Affiliates Drop Identical Code</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1120</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2eed5260-00ee-11f0-a428-ab3a2222630e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5955001241.mp3?updated=1741968222" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Balancing budget cuts and cybersecurity.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2265/notes</link>
      <description>The White House is urging federal agencies not to lay off cybersecurity teams. Google doesn’t deny receiving a secret legal order from the UK government. Microsoft researchers identify a simple method to bypass AI safety guardrails. Scammers are impersonating the Clop ransomware gang. Cisco issues security advisories for multiple IOS XR vulnerabilities. CISA warns of multiple ICS security issues. A LockBit ransomware developer has been extradited to the U.S. GCHQ’s former director calls for stronger cybersecurity collaboration. Rick Howard and Kim Jones pass the mic for the CISO Perspectives podcast. Sniffing out Stingrays.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we have Dave speaking with Rick Howard, a friend of the show, and Kim Jones, a veteran CISO, educator, and expert in the field, as Rick passes the mic to Kim for a brand new season of CISO Perspectives, formerly CSO Perspectives. 

Selected Reading
White House instructs agencies to avoid firing cybersecurity staff, email says (Reuters)
Elon Musk Made Visit to U.S. Spy Agency (Wall Street Journal)
Google refuses to deny it received encryption order from UK government (The Record)
New Context Compliance Exploit Jailbreaks Major AI Models (GB Hackers)
Fraudsters Impersonate Clop Ransomware to Extort Businesses (Infosecurity Magazine)
Cisco Warns of IOS XR Software Vulnerability Let Attackers Trigger DoS condition (Cyber Security News)
CISA Releases Thirteen Industrial Control Systems Focusing Vulnerabilities &amp; Exploits (Cyber Security News)
LockBit Ransomware Developer Extradited to US (SecurityWeek)
Cyber Industry Falls Short on Collaboration, Says Former GCHQ Director  (Infosecurity Magazine)
Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying (Electronic Frontier Foundation)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 14 Mar 2025 21:05:00 -0000</pubDate>
      <itunes:title>Balancing budget cuts and cybersecurity.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2265</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The White House is urging federal agencies not to lay off cybersecurity teams. Google doesn’t deny receiving a secret legal order from the UK government. Microsoft researchers identify a simple method to bypass AI safety guardrails. Scammers are impersonating the Clop ransomware gang. Cisco issues security advisories for multiple IOS XR vulnerabilities. CISA warns of multiple ICS security issues. A LockBit ransomware developer has been extradited to the U.S. GCHQ’s former director calls for stronger cybersecurity collaboration. Rick Howard and Kim Jones pass the mic for the CISO Perspectives podcast. Sniffing out Stingrays.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we have Dave speaking with Rick Howard, a friend of the show, and Kim Jones, a veteran CISO, educator, and expert in the field, as Rick passes the mic to Kim for a brand new season of CISO Perspectives, formerly CSO Perspectives. 

Selected Reading
White House instructs agencies to avoid firing cybersecurity staff, email says (Reuters)
Elon Musk Made Visit to U.S. Spy Agency (Wall Street Journal)
Google refuses to deny it received encryption order from UK government (The Record)
New Context Compliance Exploit Jailbreaks Major AI Models (GB Hackers)
Fraudsters Impersonate Clop Ransomware to Extort Businesses (Infosecurity Magazine)
Cisco Warns of IOS XR Software Vulnerability Let Attackers Trigger DoS condition (Cyber Security News)
CISA Releases Thirteen Industrial Control Systems Focusing Vulnerabilities &amp; Exploits (Cyber Security News)
LockBit Ransomware Developer Extradited to US (SecurityWeek)
Cyber Industry Falls Short on Collaboration, Says Former GCHQ Director  (Infosecurity Magazine)
Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying (Electronic Frontier Foundation)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The White House is urging federal agencies not to lay off cybersecurity teams. Google doesn’t <em>deny</em> receiving a secret legal order from the UK government. Microsoft researchers identify a simple method to bypass AI safety guardrails. Scammers are impersonating the Clop ransomware gang. Cisco issues security advisories for multiple IOS XR vulnerabilities. CISA warns of multiple ICS security issues. A LockBit ransomware developer has been extradited to the U.S. GCHQ’s former director calls for stronger cybersecurity collaboration. Rick Howard and Kim Jones pass the mic for the CISO Perspectives podcast. Sniffing out Stingrays.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today, we have Dave speaking with <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a>, a friend of the show, and <a href="https://www.linkedin.com/in/kimjones-cism/">Kim Jones</a>, a veteran CISO, educator, and expert in the field, as Rick passes the mic to Kim for a brand new season of <a href="https://thecyberwire.com/stories/354673281ca34c42b61a17b12f445ed7/n2k-cyberwire-welcomes-kim-jones-as-new-host-of-ciso-perspectives-podcast">CISO Perspectives</a>, formerly CSO Perspectives. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.reuters.com/world/us/white-house-instructs-agencies-avoid-firing-cybersecurity-staff-email-says-2025-03-13/?ref=metacurity.com">White House instructs agencies to avoid firing cybersecurity staff, email says</a> (Reuters)</p><p><a href="https://www.wsj.com/politics/national-security/elon-musk-made-secret-visit-to-u-s-spy-agency-9b0b64e2">Elon Musk Made Visit to U.S. Spy Agency</a> (Wall Street Journal)</p><p><a href="https://therecord.media/google-refuses-to-deny-it-received-uk-tcn">Google refuses to deny it received encryption order from UK government</a> (The Record)</p><p><a href="https://gbhackers.com/context-compliance-exploit-jailbreaks-major-ai-models/">New Context Compliance Exploit Jailbreaks Major AI Models</a> (GB Hackers)</p><p><a href="https://www.infosecurity-magazine.com/news/fraudsters-clop-ransomware-extort/">Fraudsters Impersonate Clop Ransomware to Extort Businesses</a> (Infosecurity Magazine)</p><p><a href="https://cybersecuritynews.com/cisco-warns-of-ios-xr-software-vulnerability/">Cisco Warns of IOS XR Software Vulnerability Let Attackers Trigger DoS condition</a> (Cyber Security News)</p><p><a href="https://cybersecuritynews.com/cisa-releases-thirteen-industrial-control-systems/">CISA Releases Thirteen Industrial Control Systems Focusing Vulnerabilities &amp; Exploits</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/lockbit-ransomware-developer-extradited-to-us/">LockBit Ransomware Developer Extradited to US</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/cyber-industry-collaboration-gchq/">Cyber Industry Falls Short on Collaboration, Says Former GCHQ Director </a> (Infosecurity Magazine)</p><p><a href="https://www.eff.org/deeplinks/2025/03/meet-rayhunter-new-open-source-tool-eff-detect-cellular-spying">Meet Rayhunter: A New Open Source Tool from EFF to Detect Cellular Spying</a> (Electronic Frontier Foundation)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1610</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6ca4a4a8-d378-11ef-84f5-7bba4cdb2bed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5048347506.mp3?updated=1741977903" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FCC draws the line on Chinese tech threats.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2264/notes</link>
      <description>The FCC looks to counter Chinese cyber threats. Turmoil at CISA. Volt Typhoon infiltrated a power utility for over 300 days. Europe takes the lead at Ukraine’s annual cyber conference. Facebook discloses a critical vulnerability in FreeType. A new Android spyware infiltrated the Google Play store. Our guest is Alvaro Alonso Ruiz, Co-Founder and CCO of Leanspace, who is discussing software in space with T-Minus Space Daily host Maria Varmazis. A UK hospital finds thousands of unwelcome guests on their network. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today our guest is Alvaro Alonso Ruiz, Co-Founder and CCO of Leanspace, who is discussing software in space with T-Minus Space Daily host Maria Varmazis.

Selected Reading
US communications regulator to create council to counter China technology threats (Financial Times)
‘People Are Scared’: Inside CISA as It Reels From Trump’s Purge (WIRED)
CISA cuts $10 million annually from ISAC funding for states amid wider cyber cuts (The Record)
Arizona Secretary of State Proposes Alternative to Defunded National Election Security Program (Democracy Docket)
China's Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days (SecurityWeek)
Chinese cyberspies backdoor Juniper routers for stealthy access (Bleeping Computer)
At Ukraine’s major cyber conference, Europe takes center stage over US (The Record)
Facebook discloses FreeType 2 flaw exploited in attacks (Bleeping Computer)
New North Korean Android spyware slips onto Google Play (Bleeping Computer)
NHS Trust IT head: ‘Our attack surface was much bigger than we thought’ (Computing)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 13 Mar 2025 20:10:00 -0000</pubDate>
      <itunes:title>FCC draws the line on Chinese tech threats.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2264</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The FCC looks to counter Chinese cyber threats. Turmoil at CISA. Volt Typhoon infiltrated a power utility for over 300 days. Europe takes the lead at Ukraine’s annual cyber conference. Facebook discloses a critical vulnerability in FreeType. A new Android spyware infiltrated the Google Play store. Our guest is Alvaro Alonso Ruiz, Co-Founder and CCO of Leanspace, who is discussing software in space with T-Minus Space Daily host Maria Varmazis. A UK hospital finds thousands of unwelcome guests on their network. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today our guest is Alvaro Alonso Ruiz, Co-Founder and CCO of Leanspace, who is discussing software in space with T-Minus Space Daily host Maria Varmazis.

Selected Reading
US communications regulator to create council to counter China technology threats (Financial Times)
‘People Are Scared’: Inside CISA as It Reels From Trump’s Purge (WIRED)
CISA cuts $10 million annually from ISAC funding for states amid wider cyber cuts (The Record)
Arizona Secretary of State Proposes Alternative to Defunded National Election Security Program (Democracy Docket)
China's Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days (SecurityWeek)
Chinese cyberspies backdoor Juniper routers for stealthy access (Bleeping Computer)
At Ukraine’s major cyber conference, Europe takes center stage over US (The Record)
Facebook discloses FreeType 2 flaw exploited in attacks (Bleeping Computer)
New North Korean Android spyware slips onto Google Play (Bleeping Computer)
NHS Trust IT head: ‘Our attack surface was much bigger than we thought’ (Computing)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FCC looks to counter Chinese cyber threats. Turmoil at CISA. Volt Typhoon infiltrated a power utility for over 300 days. Europe takes the lead at Ukraine’s annual cyber conference. Facebook discloses a critical vulnerability in FreeType. A new Android spyware infiltrated the Google Play store. Our guest is Alvaro Alonso Ruiz, Co-Founder and CCO of Leanspace, who is discussing software in space with T-Minus Space Daily host Maria Varmazis. A UK hospital finds thousands of unwelcome guests on their network. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today our guest is <a href="https://www.linkedin.com/in/alvaro-alonso-ruiz/">Alvaro Alonso Ruiz</a>, Co-Founder and CCO of <a href="https://www.linkedin.com/company/leanspace-sas/">Leanspace</a>, who is discussing software in space with <a href="https://space.n2k.com/podcasts/t-minus">T-Minus Space Daily</a> host <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.ft.com/content/0deedda7-55de-481e-b3ab-1d645ee27365">US communications regulator to create council to counter China technology threats</a> (Financial Times)</p><p><a href="https://www.wired.com/story/inside-cisa-under-trump/">‘People Are Scared’: Inside CISA as It Reels From Trump’s Purge</a> (WIRED)</p><p><a href="https://therecord.media/cisa-cuts-10-million-isac-funding">CISA cuts $10 million annually from ISAC funding for states amid wider cyber cuts</a> (The Record)</p><p><a href="https://www.democracydocket.com/news-alerts/arizona-secretary-of-state-proposes-alternative-to-defunded-national-election-security-program/">Arizona Secretary of State Proposes Alternative to Defunded National Election Security Program</a> (Democracy Docket)</p><p><a href="https://www.securityweek.com/chinas-volt-typhoon-hackers-dwelled-in-us-electric-grid-for-300-days/">China's Volt Typhoon Hackers Dwelled in US Electric Grid for 300 Days</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-cyberspies-backdoor-juniper-routers-for-stealthy-access/">Chinese cyberspies backdoor Juniper routers for stealthy access</a> (Bleeping Computer)</p><p><a href="https://therecord.media/kyiv-cyber-conference-europe-center-stage-over-us">At Ukraine’s major cyber conference, Europe takes center stage over US</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/facebook-discloses-freetype-2-flaw-exploited-in-attacks/">Facebook discloses FreeType 2 flaw exploited in attacks</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-north-korean-android-spyware-slips-onto-google-play/">New North Korean Android spyware slips onto Google Play</a> (Bleeping Computer)</p><p><a href="https://www.computing.co.uk/feature/2025/nhs-it-head-our-attack-surface-was-much-bigger-than-we-thought">NHS Trust IT head: ‘Our attack surface was much bigger than we thought’</a> (Computing)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1713</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bfb1f890-003b-11f0-b522-ab7b642854b2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3513095322.mp3?updated=1741892416" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Will Plankey lead CISA to victory?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2263/notes</link>
      <description>The White House names their nominee for CISA’s top spot. Patch Tuesday updates. Apple issues emergency updates for a zero-day WebKit vulnerability. Researchers highlight advanced MFA-bypassing techniques. North Korea's Lazarus Group targets cryptocurrency wallets and browser data. Our guest today is Rocco D’Amico of Brass Valley discussing hidden risks in retired devices and reducing data breach threats. Making sense of the skills gap paradox. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Joining us today is Rocco D’Amico of Brass Valley discussing hidden risks in retired devices and reducing data breach threats.

Selected Reading
Trump nominates Sean Plankey as new CISA director (Tech Crunch)
CISA worker says 100-strong red team fired after DOGE action (The Register)
March 2025 Patch Tuesday: Microsoft Fixes 57 Vulnerabilities, 7 Zero-Days (Hackread)
ICS Patch Tuesday: Advisories Published by CISA, Schneider Electric, Siemens (SecurityWeek)
CISA Warns of Microsoft Windows Management Console (MMC) Vulnerability Exploited in Wild (Cyber Security News)
Apple WebKit Zero-Day Vulnerability Actively Exploit in High Profile Cyber Attacks (Cyber Security News)
Hackers Using Advanced MFA-Bypassing Techniques To Gain Access To User Account (Cyber Security News)
North Korean Lazarus hackers infect hundreds via npm packages (Bleeping Computer)
Welcome to the skills gap paradox (Computing)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 12 Mar 2025 20:10:00 -0000</pubDate>
      <itunes:title>Will Plankey lead CISA to victory?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2263</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The White House names their nominee for CISA’s top spot. Patch Tuesday updates. Apple issues emergency updates for a zero-day WebKit vulnerability. Researchers highlight advanced MFA-bypassing techniques. North Korea's Lazarus Group targets cryptocurrency wallets and browser data. Our guest today is Rocco D’Amico of Brass Valley discussing hidden risks in retired devices and reducing data breach threats. Making sense of the skills gap paradox. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Joining us today is Rocco D’Amico of Brass Valley discussing hidden risks in retired devices and reducing data breach threats.

Selected Reading
Trump nominates Sean Plankey as new CISA director (Tech Crunch)
CISA worker says 100-strong red team fired after DOGE action (The Register)
March 2025 Patch Tuesday: Microsoft Fixes 57 Vulnerabilities, 7 Zero-Days (Hackread)
ICS Patch Tuesday: Advisories Published by CISA, Schneider Electric, Siemens (SecurityWeek)
CISA Warns of Microsoft Windows Management Console (MMC) Vulnerability Exploited in Wild (Cyber Security News)
Apple WebKit Zero-Day Vulnerability Actively Exploit in High Profile Cyber Attacks (Cyber Security News)
Hackers Using Advanced MFA-Bypassing Techniques To Gain Access To User Account (Cyber Security News)
North Korean Lazarus hackers infect hundreds via npm packages (Bleeping Computer)
Welcome to the skills gap paradox (Computing)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The White House names their nominee for CISA’s top spot. Patch Tuesday updates. Apple issues emergency updates for a zero-day WebKit vulnerability. Researchers highlight advanced MFA-bypassing techniques. North Korea's Lazarus Group targets cryptocurrency wallets and browser data. Our guest today is Rocco D’Amico of Brass Valley discussing hidden risks in retired devices and reducing data breach threats. Making sense of the skills gap paradox.<strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Joining us today is <a href="https://www.linkedin.com/in/roccodamico/">Rocco D’Amico</a> of <a href="https://brassvalley.com/">Brass Valley</a> discussing hidden risks in retired devices and reducing data breach threats.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://techcrunch.com/2025/03/11/trump-nominates-sean-plankey-as-new-cisa-director/">Trump nominates Sean Plankey as new CISA director</a> (Tech Crunch)</p><p><a href="https://www.theregister.com/2025/03/12/cisa_staff_layoffs/">CISA worker says 100-strong red team fired after DOGE action</a> (The Register)</p><p><a href="https://hackread.com/march-2025-patch-tuesday-microsoft-fixes-vulnerabilities-zero-days/">March 2025 Patch Tuesday: Microsoft Fixes 57 Vulnerabilities, 7 Zero-Days</a> (Hackread)</p><p><a href="https://www.securityweek.com/ics-patch-tuesday-advisories-published-by-cisa-schneider-electric-siemens/">ICS Patch Tuesday: Advisories Published by CISA, Schneider Electric, Siemens</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/cisa-warns-of-microsoft-windows-management-console-mmc-vulnerability/">CISA Warns of Microsoft Windows Management Console (MMC) Vulnerability Exploited in Wild</a> (Cyber Security News)</p><p><a href="https://cybersecuritynews.com/apple-webkit-zero-day-vulnerability-actively-exploit-in-high-profile-cyber-attacks/">Apple WebKit Zero-Day Vulnerability Actively Exploit in High Profile Cyber Attacks</a> (Cyber Security News)</p><p><a href="https://cybersecuritynews.com/hackers-using-advanced-mfa-bypassing-techniques/">Hackers Using Advanced MFA-Bypassing Techniques To Gain Access To User Account</a> (Cyber Security News)</p><p><a href="https://www.bleepingcomputer.com/news/security/north-korean-lazarus-hackers-infect-hundreds-via-npm-packages/">North Korean Lazarus hackers infect hundreds via npm packages</a> (Bleeping Computer)</p><p><a href="https://www.computing.co.uk/analysis/2025/welcome-to-the-skills-gap-paradox">Welcome to the skills gap paradox</a> (Computing)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1569</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6c2d1744-d378-11ef-84f5-e3a572fb445e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8938020389.mp3?updated=1741803013" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>X marks the hack.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2262/notes</link>
      <description>X-Twitter had multiple waves of outages yesterday. Signal’s president warns against agentic AI. A new lawsuit alleges DOGE bypassed critical security safeguards. Is the Five Eyes Alliance fraying? The Minja attack poisons ai memory through user interaction. Researchers report increased activity from the SideWinder APT group. A critical Veritas vulnerability enables remote code execution. A Kansas healthcare provider breach exposes 220,000 patients’ data. New York sues Allstate over data exposure in insurance websites. CISA warns of critical Ivanti and VeraCode vulnerabilities. FTC to refund $25.5 million to victims of tech support scams. On our Industry Voices segment, we are joined by Gerald Beuchelt, CISO at Acronis, who is discussing how threat research and intelligence matter to MSPs. The UK celebrates a record-breaking CyberFirst Girls Competition. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, we are joined by Gerald Beuchelt, CISO at Acronis, who is discussing how threat research and intelligence matter to MSPs.

Selected Reading
Hackers Take Credit for X Cyberattack (SecurityWeek)
X users report login troubles as Dark Storm claims cyberattack (Malwarebytes)
Signal President Meredith Whittaker calls out agentic AI as having 'profound' security and privacy issues (TechCrunch)
Lawsuit Says DOGE Is Ignoring Key Social Security Data Rules (BankInfo Security)
As Trump pivots to Russia, allies weigh sharing less intel with U.S. (NBC News)
MINJA sneak attack poisons AI models for other chatbot users (The Register)
SideWinder APT Group Attacking Military &amp; Government Entities With New Tools (Cyber Security News)
Critical Veritas Vulnerability Let Attackers Execute Malicious Code (Cyber Security News)
Kansas healthcare provider says more than 220,000 impacted by cyberattack (The Record)
Allstate sued for exposing personal info in plaintext (The Register)
CISA Urges All Organizations to Patch Exploited Critical Ivanti Vulnerabilities (Infosecurity Magazine)
FTC will send $25.5 million to victims of tech support scams (Bleeping Computer)
Record Number of Girls Compete in CyberFirst Contest (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Mar 2025 20:10:00 -0000</pubDate>
      <itunes:title>X marks the hack.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2262</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>X-Twitter had multiple waves of outages yesterday. Signal’s president warns against agentic AI. A new lawsuit alleges DOGE bypassed critical security safeguards. Is the Five Eyes Alliance fraying? The Minja attack poisons ai memory through user interaction. Researchers report increased activity from the SideWinder APT group. A critical Veritas vulnerability enables remote code execution. A Kansas healthcare provider breach exposes 220,000 patients’ data. New York sues Allstate over data exposure in insurance websites. CISA warns of critical Ivanti and VeraCode vulnerabilities. FTC to refund $25.5 million to victims of tech support scams. On our Industry Voices segment, we are joined by Gerald Beuchelt, CISO at Acronis, who is discussing how threat research and intelligence matter to MSPs. The UK celebrates a record-breaking CyberFirst Girls Competition. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, we are joined by Gerald Beuchelt, CISO at Acronis, who is discussing how threat research and intelligence matter to MSPs.

Selected Reading
Hackers Take Credit for X Cyberattack (SecurityWeek)
X users report login troubles as Dark Storm claims cyberattack (Malwarebytes)
Signal President Meredith Whittaker calls out agentic AI as having 'profound' security and privacy issues (TechCrunch)
Lawsuit Says DOGE Is Ignoring Key Social Security Data Rules (BankInfo Security)
As Trump pivots to Russia, allies weigh sharing less intel with U.S. (NBC News)
MINJA sneak attack poisons AI models for other chatbot users (The Register)
SideWinder APT Group Attacking Military &amp; Government Entities With New Tools (Cyber Security News)
Critical Veritas Vulnerability Let Attackers Execute Malicious Code (Cyber Security News)
Kansas healthcare provider says more than 220,000 impacted by cyberattack (The Record)
Allstate sued for exposing personal info in plaintext (The Register)
CISA Urges All Organizations to Patch Exploited Critical Ivanti Vulnerabilities (Infosecurity Magazine)
FTC will send $25.5 million to victims of tech support scams (Bleeping Computer)
Record Number of Girls Compete in CyberFirst Contest (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>X-Twitter had multiple waves of outages yesterday. Signal’s president warns against agentic AI. A new lawsuit alleges DOGE bypassed critical security safeguards. Is the Five Eyes Alliance fraying? The Minja attack poisons ai memory through user interaction. Researchers report increased activity from the SideWinder APT group. A critical Veritas vulnerability enables remote code execution. A Kansas healthcare provider breach exposes 220,000 patients’ data. New York sues Allstate over data exposure in insurance websites. CISA warns of critical Ivanti and VeraCode vulnerabilities. FTC to refund $25.5 million to victims of tech support scams. On our Industry Voices segment, we are joined by Gerald Beuchelt, CISO at Acronis, who is discussing how threat research and intelligence matter to MSPs. The UK celebrates a record-breaking CyberFirst Girls Competition. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/beuchelt/">Gerald Beuchelt</a>, CISO at <a href="https://www.linkedin.com/company/acronis/">Acronis</a>, who is discussing how threat research and intelligence matter to MSPs.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/hackers-take-credit-for-x-cyberattack/">Hackers Take Credit for X Cyberattack</a> (SecurityWeek)</p><p><a href="https://www.malwarebytes.com/blog/news/2025/03/x-users-report-login-troubles-as-dark-storm-claims-cyberattack">X users report login troubles as Dark Storm claims cyberattack</a> (Malwarebytes)</p><p><a href="https://techcrunch.com/2025/03/07/signal-president-meredith-whittaker-calls-out-agentic-ai-as-having-profound-security-and-privacy-issues/">Signal President Meredith Whittaker calls out agentic AI as having 'profound' security and privacy issues</a> (TechCrunch)</p><p><a href="https://www.bankinfosecurity.com/lawsuit-says-doge-ignoring-key-social-security-data-rules-a-27678">Lawsuit Says DOGE Is Ignoring Key Social Security Data Rules</a> (BankInfo Security)</p><p><a href="https://www.nbcnews.com/politics/national-security/trump-pivots-russia-allies-weigh-sharing-less-intel-us-rcna194420">As Trump pivots to Russia, allies weigh sharing less intel with U.S.</a> (NBC News)</p><p><a href="https://www.theregister.com/2025/03/11/minja_attack_poisons_ai_model_memory/">MINJA sneak attack poisons AI models for other chatbot users</a> (The Register)</p><p><a href="https://cybersecuritynews.com/sidewinder-apt-group-attacking-military-government-entities/">SideWinder APT Group Attacking Military &amp; Government Entities With New Tools</a> (Cyber Security News)</p><p><a href="https://cybersecuritynews.com/critical-veritas-vulnerability/">Critical Veritas Vulnerability Let Attackers Execute Malicious Code</a> (Cyber Security News)</p><p><a href="https://therecord.media/kansas-healthcare-provider-data-breach">Kansas healthcare provider says more than 220,000 impacted by cyberattack</a> (The Record)</p><p><a href="https://www.theregister.com/2025/03/10/allstate_sued_pii_exposure/">Allstate sued for exposing personal info in plaintext</a> (The Register)</p><p><a href="https://www.infosecurity-magazine.com/news/cisa-kev-ivanti-critical/">CISA Urges All Organizations to Patch Exploited Critical Ivanti Vulnerabilities</a> (Infosecurity Magazine)</p><p><a href="https://www.bleepingcomputer.com/news/security/ftc-will-send-255-million-to-victims-of-tech-support-scams/">FTC will send $25.5 million to victims of tech support scams</a> (Bleeping Computer)</p><p><a href="https://www.infosecurity-magazine.com/news/record-number-girls-compete/">Record Number of Girls Compete in CyberFirst Contest</a> (Infosecurity Magazine)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1800</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6bebfb7e-d378-11ef-84f5-a7feaec959c6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9784608904.mp3?updated=1741715980" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>PHP flaw sparks global attack wave.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2261/notes</link>
      <description>PHP exploits are active in the wild. Security researchers discover undocumented commands in a popular Wi-Fi and Bluetooth-enabled microcontroller. The ONCD could gain influence in this second Trump administration. The Akira ransomware gang leverages an unsecured webcam. Mission, Texas declares a state of emergency following a cyberattack. The FBI and Secret Service confirm crypto-heists are linked to the 2022 LastPass breach. A popular home appliance manufacturer suffers a cyberattack. Switzerland updates reporting requirements for critical infrastructure operators.  Our guest is Errol Weiss, Chief Security Officer at the Health-ISAC, who warns “the cavalry isn’t coming—why the private sector must take the lead in critical infrastructure cybersecurity.” A termination kill switch leads to potential jail time. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we have Errol Weiss, Chief Security Officer at the Health-ISAC, sharing his take “the cavalry isn’t coming—why the private sector must take the lead in critical infrastructure cybersecurity.”

Selected Reading
Mass Exploitation of Critical PHP Vulnerability Begins (SecurityWeek)
Undocumented commands found in Bluetooth chip used by a billion devices (Bleeping Computer)
White House cyber director’s office set for more power under Trump, experts say (The Record)
Ransomware gang encrypted network from a webcam to bypass EDR (Bleeping Computer)
Texas border city declares state of emergency after cyberattack on government systems (The Record)
Feds Link $150M Cyberheist to 2022 LastPass Hacks (Krebs on Security)
Home appliance company Presto says cyberattack causing delivery delays (The Record)
Switzerland Mandates Cyber-Attack Reporting for Critical Infrastructure (Infosecurity Magazine)
Developer sabotaged ex-employer IT systems with kill switch (The Register) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 10 Mar 2025 20:30:00 -0000</pubDate>
      <itunes:title>PHP flaw sparks global attack wave.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2261</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>PHP exploits are active in the wild. Security researchers discover undocumented commands in a popular Wi-Fi and Bluetooth-enabled microcontroller. The ONCD could gain influence in this second Trump administration. The Akira ransomware gang leverages an unsecured webcam. Mission, Texas declares a state of emergency following a cyberattack. The FBI and Secret Service confirm crypto-heists are linked to the 2022 LastPass breach. A popular home appliance manufacturer suffers a cyberattack. Switzerland updates reporting requirements for critical infrastructure operators.  Our guest is Errol Weiss, Chief Security Officer at the Health-ISAC, who warns “the cavalry isn’t coming—why the private sector must take the lead in critical infrastructure cybersecurity.” A termination kill switch leads to potential jail time. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we have Errol Weiss, Chief Security Officer at the Health-ISAC, sharing his take “the cavalry isn’t coming—why the private sector must take the lead in critical infrastructure cybersecurity.”

Selected Reading
Mass Exploitation of Critical PHP Vulnerability Begins (SecurityWeek)
Undocumented commands found in Bluetooth chip used by a billion devices (Bleeping Computer)
White House cyber director’s office set for more power under Trump, experts say (The Record)
Ransomware gang encrypted network from a webcam to bypass EDR (Bleeping Computer)
Texas border city declares state of emergency after cyberattack on government systems (The Record)
Feds Link $150M Cyberheist to 2022 LastPass Hacks (Krebs on Security)
Home appliance company Presto says cyberattack causing delivery delays (The Record)
Switzerland Mandates Cyber-Attack Reporting for Critical Infrastructure (Infosecurity Magazine)
Developer sabotaged ex-employer IT systems with kill switch (The Register) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>PHP exploits are active in the wild. Security researchers discover undocumented commands in a popular Wi-Fi and Bluetooth-enabled microcontroller. The ONCD could gain influence in this second Trump administration. The Akira ransomware gang leverages an unsecured webcam. Mission, Texas declares a state of emergency following a cyberattack. The FBI and Secret Service confirm crypto-heists are linked to the 2022 LastPass breach. A popular home appliance manufacturer suffers a cyberattack. Switzerland updates reporting requirements for critical infrastructure operators.  Our guest is Errol Weiss, Chief Security Officer at the Health-ISAC, who warns “the cavalry isn’t coming—why the private sector must take the lead in critical infrastructure cybersecurity.” A termination kill switch leads to potential jail time. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today, we have <a href="https://www.linkedin.com/in/errolweiss/">Errol Weiss</a>, Chief Security Officer at the <a href="https://health-isac.org/">Health-ISAC</a>, sharing his take “the cavalry isn’t coming—why the private sector must take the lead in critical infrastructure cybersecurity.”</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/mass-exploitation-of-critical-php-vulnerability-begins/">Mass Exploitation of Critical PHP Vulnerability Begins</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/undocumented-commands-found-in-bluetooth-chip-used-by-a-billion-devices/">Undocumented commands found in Bluetooth chip used by a billion devices</a> (Bleeping Computer)</p><p><a href="https://therecord.media/trump-white-house-office-national-cyber-director">White House cyber director’s office set for more power under Trump, experts say</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-gang-encrypted-network-from-a-webcam-to-bypass-edr/">Ransomware gang encrypted network from a webcam to bypass EDR</a> (Bleeping Computer)</p><p><a href="https://therecord.media/texas-city-cyberattack-emergency-declaration">Texas border city declares state of emergency after cyberattack on government systems</a> (The Record)</p><p><a href="https://krebsonsecurity.com/2025/03/feds-link-150m-cyberheist-to-2022-lastpass-hacks/">Feds Link $150M Cyberheist to 2022 LastPass Hacks</a> (Krebs on Security)</p><p><a href="https://therecord.media/presto-home-appliances-manufacturer-cyberattack">Home appliance company Presto says cyberattack causing delivery delays</a> (The Record)</p><p><a href="https://www.infosecurity-magazine.com/news/switzerland-mandates-cyber/">Switzerland Mandates Cyber-Attack Reporting for Critical Infrastructure</a> (Infosecurity Magazine)</p><p><a href="https://www.theregister.com/2025/03/08/developer_server_kill_switch/">Developer sabotaged ex-employer IT systems with kill switch</a> (The Register) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1831</itunes:duration>
      <guid isPermaLink="false"><![CDATA[6bb01320-d378-11ef-84f5-df6efb0e67da]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7622141723.mp3?updated=1741637432" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Peter Baumann: Adding value to data. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/58/notes</link>
      <description>Please enjoy this encore of Career Notes. 
CEO of ActiveNav, Peter Baumann, takes us on his career journey from minor home electrical experiments to the business of data discovery. He began his career as an electrical engineer, but felt an entrepreneurial spirit was part of his makeup. Following his return to college to study business and finance, Peter talks about being set on the path to shine the light on the data to provide discovery capability. To those interested in the field, he suggests having a broad familiarity of different approaches. We thank Peter for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 09 Mar 2025 07:00:00 -0000</pubDate>
      <itunes:title>Peter Baumann: Adding value to data. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>58</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b8b397ae-fb97-11ef-85a5-7f6fc6d9cacf/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Career Notes. 
CEO of ActiveNav, Peter Baumann, takes us on his career journey from minor home electrical experiments to the business of data discovery. He began his career as an electrical engineer, but felt an entrepreneurial spirit was part of his makeup. Following his return to college to study business and finance, Peter talks about being set on the path to shine the light on the data to provide discovery capability. To those interested in the field, he suggests having a broad familiarity of different approaches. We thank Peter for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p><p>CEO of ActiveNav, Peter Baumann, takes us on his career journey from minor home electrical experiments to the business of data discovery. He began his career as an electrical engineer, but felt an entrepreneurial spirit was part of his makeup. Following his return to college to study business and finance, Peter talks about being set on the path to shine the light on the data to provide discovery capability. To those interested in the field, he suggests having a broad familiarity of different approaches. We thank Peter for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>494</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b8b397ae-fb97-11ef-85a5-7f6fc6d9cacf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7442787421.mp3?updated=1741381753" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Botnet’s back, tell a friend. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/368/notes</link>
      <description>This week we are joined by Silas Cutler, Principal Security Researcher at Censys, asking the important question of "Will the Real Volt Typhoon Please Stand Up?" The FBI's disruption of the KV Botnet in December 2023, attributed to the Chinese threat group Volt Typhoon, targeted infected systems but did not affect the botnet's control infrastructure. 
Despite law enforcement efforts and technical exposure, the botnet's infrastructure has remained largely stable, with only changes in hosting providers, raising questions about whether another party operates the botnet. Censys scanning data from 2024 shows a shift in the botnet's control servers, indicating a response to disruption attempts, while the botnet's operators have shown limited efforts to obscure their infrastructure.
The research can be found here:
Will the Real Volt Typhoon Please Stand Up?

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Mar 2025 08:00:00 -0000</pubDate>
      <itunes:title>Botnet’s back, tell a friend. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>368</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by Silas Cutler, Principal Security Researcher at Censys, asking the important question of "Will the Real Volt Typhoon Please Stand Up?" The FBI's disruption of the KV Botnet in December 2023, attributed to the Chinese threat group Volt Typhoon, targeted infected systems but did not affect the botnet's control infrastructure. 
Despite law enforcement efforts and technical exposure, the botnet's infrastructure has remained largely stable, with only changes in hosting providers, raising questions about whether another party operates the botnet. Censys scanning data from 2024 shows a shift in the botnet's control servers, indicating a response to disruption attempts, while the botnet's operators have shown limited efforts to obscure their infrastructure.
The research can be found here:
Will the Real Volt Typhoon Please Stand Up?

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by <a href="https://www.linkedin.com/in/silascutler/">Silas Cutler</a>, Principal Security Researcher at <a href="https://www.linkedin.com/company/censysio/">Censys</a>, asking the important question of "Will the Real Volt Typhoon Please Stand Up?" The FBI's disruption of the KV Botnet in December 2023, attributed to the Chinese threat group Volt Typhoon, targeted infected systems but did not affect the botnet's control infrastructure. </p><p>Despite law enforcement efforts and technical exposure, the botnet's infrastructure has remained largely stable, with only changes in hosting providers, raising questions about whether another party operates the botnet. Censys scanning data from 2024 shows a shift in the botnet's control servers, indicating a response to disruption attempts, while the botnet's operators have shown limited efforts to obscure their infrastructure.</p><h3>The research can be found here:</h3><ul><li><a href="https://censys.com/will-the-real-volt-typhoon-please-stand-up/">Will the Real Volt Typhoon Please Stand Up?</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1187</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[33cca3e6-fb88-11ef-a175-4ba4b83f665c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2034284516.mp3?updated=1741374993" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The end of the line for Garantex.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2260/notes</link>
      <description>Law enforcement shutters Garantex crypto exchange. NTT discloses breach affecting corporate customers. Malvertising campaign hits nearly a million devices. AI’s role in Canada’s next election. Scammers target Singapore’s PM in AI fraud. Botnets exploit critical IP camera vulnerability. In our International Women's Day and Women’s History Month special, join Liz Stokes as she shares the inspiring stories of women shaping the future of cybersecurity. And how did Insider threats turn a glitch into a goldmine?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In this special International Women’s Day edition, we shine a spotlight on the incredible women in and around our network who are shaping the future of cybersecurity. Join Liz Stokes as we celebrate Selena Larson, Threat Researcher at Proofpoint, and co-host of Only Malware in the Building, Gianna Whitver, CEO &amp; Co-Founder of the Cybersecurity Marketing Society and co-host of the Breaking Through in Cybersecurity Marketing podcast, Maria Velasquez, Chief Growth Officer &amp; Co-Founder of the Cybersecurity Marketing Society and co-host of the Breaking Through in Cybersecurity Marketing podcast, Chris Hare, Project Management Specialist and Content Developer at N2K Networks, and host of CertByte, Ann Lang, Project Manager at N2K Networks, Jennifer Eiben, Executive Producer at N2K Networks, and Maria Varmazis, host of the T-Minus Space Daily show at N2K Networks for their achievements, resilience, and the invaluable contributions they make to keeping our digital world secure.

Selected Reading
Russian crypto exchange Garantex’s website taken down in apparent law enforcement operation (The Record)
Data breach at Japanese telecom giant NTT hits 18,000 companies (BleepingComputer)
Malvertising campaign leads to info stealers hosted on GitHub (Microsoft)
Canadian intelligence agency warns of threat AI poses to upcoming elections (The Record) 
Deepfakes of Singapore PM Used to Sell Crypto, Residency Program (Bloomberg) 
Edimax Camera Zero-Day Disclosed by CISA Exploited by Botnets (SecurityWeek)
Magecart: How Akamai Protected a Global Retailer Against a Live Attack (Akamai) 
Cybercrime 'crew' stole $635,000 in Taylor Swift concert tickets (BleepingComputer)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 07 Mar 2025 21:30:00 -0000</pubDate>
      <itunes:title>The end of the line for Garantex.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2260</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Law enforcement shutters Garantex crypto exchange. NTT discloses breach affecting corporate customers. Malvertising campaign hits nearly a million devices. AI’s role in Canada’s next election. Scammers target Singapore’s PM in AI fraud. Botnets exploit critical IP camera vulnerability. In our International Women's Day and Women’s History Month special, join Liz Stokes as she shares the inspiring stories of women shaping the future of cybersecurity. And how did Insider threats turn a glitch into a goldmine?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In this special International Women’s Day edition, we shine a spotlight on the incredible women in and around our network who are shaping the future of cybersecurity. Join Liz Stokes as we celebrate Selena Larson, Threat Researcher at Proofpoint, and co-host of Only Malware in the Building, Gianna Whitver, CEO &amp; Co-Founder of the Cybersecurity Marketing Society and co-host of the Breaking Through in Cybersecurity Marketing podcast, Maria Velasquez, Chief Growth Officer &amp; Co-Founder of the Cybersecurity Marketing Society and co-host of the Breaking Through in Cybersecurity Marketing podcast, Chris Hare, Project Management Specialist and Content Developer at N2K Networks, and host of CertByte, Ann Lang, Project Manager at N2K Networks, Jennifer Eiben, Executive Producer at N2K Networks, and Maria Varmazis, host of the T-Minus Space Daily show at N2K Networks for their achievements, resilience, and the invaluable contributions they make to keeping our digital world secure.

Selected Reading
Russian crypto exchange Garantex’s website taken down in apparent law enforcement operation (The Record)
Data breach at Japanese telecom giant NTT hits 18,000 companies (BleepingComputer)
Malvertising campaign leads to info stealers hosted on GitHub (Microsoft)
Canadian intelligence agency warns of threat AI poses to upcoming elections (The Record) 
Deepfakes of Singapore PM Used to Sell Crypto, Residency Program (Bloomberg) 
Edimax Camera Zero-Day Disclosed by CISA Exploited by Botnets (SecurityWeek)
Magecart: How Akamai Protected a Global Retailer Against a Live Attack (Akamai) 
Cybercrime 'crew' stole $635,000 in Taylor Swift concert tickets (BleepingComputer)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Law enforcement shutters Garantex crypto exchange. NTT discloses breach affecting corporate customers. Malvertising campaign hits nearly a million devices. AI’s role in Canada’s next election. Scammers target Singapore’s PM in AI fraud. Botnets exploit critical IP camera vulnerability. In our International Women's Day and Women’s History Month special, join Liz Stokes as she shares the inspiring stories of women shaping the future of cybersecurity. And how did Insider threats turn a glitch into a goldmine?</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>In this special International Women’s Day edition, we shine a spotlight on the incredible women in and around our network who are shaping the future of cybersecurity. Join <a href="https://www.linkedin.com/in/elizabeth-stokes-183925181/">Liz Stokes</a> as we celebrate <a href="https://www.linkedin.com/in/selenalarson/">Selena Larson</a>, Threat Researcher at <a href="https://www.linkedin.com/company/proofpoint/">Proofpoint</a>, and co-host of <a href="https://thecyberwire.com/podcasts/only-malware-in-the-building">Only Malware in the Building</a>, <a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a>, CEO &amp; Co-Founder of the <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">Cybersecurity Marketing Society</a> and co-host of the <a href="https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing">Breaking Through in Cybersecurity Marketing</a> podcast, <a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez</a>, Chief Growth Officer &amp; Co-Founder of the <a href="https://www.linkedin.com/company/cybersecuritymarketingsociety/">Cybersecurity Marketing Society</a> and co-host of the <a href="https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing">Breaking Through in Cybersecurity Marketing</a> podcast, <a href="https://www.linkedin.com/in/chrisharepmp/">Chris Hare</a>, Project Management Specialist and Content Developer at <a href="https://www.linkedin.com/company/n2k-networks/">N2K Networks</a>, and host of CertByte, <a href="https://www.linkedin.com/in/ann-lang-4870a61/">Ann Lang</a>, Project Manager at <a href="https://www.linkedin.com/company/n2k-networks/">N2K Networks</a>, <a href="https://www.linkedin.com/in/jennifer-eiben/">Jennifer Eiben</a>, Executive Producer at <a href="https://www.linkedin.com/company/n2k-networks/">N2K Networks</a>, and <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a>, host of the <a href="https://www.linkedin.com/company/n2k-space/">T-Minus Space Daily</a> show at <a href="https://www.linkedin.com/company/n2k-networks/">N2K Networks</a> for their achievements, resilience, and the invaluable contributions they make to keeping our digital world secure.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/garantex-crypto-exchange-taken-down-law-enforcement-operation">Russian crypto exchange Garantex’s website taken down in apparent law enforcement operation</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/data-breach-at-japanese-telecom-giant-ntt-hits-18-000-companies/">Data breach at Japanese telecom giant NTT hits 18,000 companies</a> (BleepingComputer)</p><p><a href="https://www.microsoft.com/en-us/security/blog/2025/03/06/malvertising-campaign-leads-to-info-stealers-hosted-on-github/">Malvertising campaign leads to info stealers hosted on GitHub</a> (Microsoft)</p><p><a href="https://therecord.media/canada-cyber-agency-elections-warning-ai-">Canadian intelligence agency warns of threat AI poses to upcoming elections</a> (The Record) </p><p><a href="https://www.bloomberg.com/news/articles/2025-03-07/deepfakes-of-singapore-pm-used-to-sell-crypto-residency-program">Deepfakes of Singapore PM Used to Sell Crypto, Residency Program</a> (Bloomberg) </p><p><a href="https://www.securityweek.com/edimax-camera-zero-day-disclosed-by-cisa-exploited-by-botnets/">Edimax Camera Zero-Day Disclosed by CISA Exploited by Botnets</a> (SecurityWeek)</p><p><a href="https://www.akamai.com/blog/security/2025/mar/how-akamai-protected-global-retailer-against-live-attack">Magecart: How Akamai Protected a Global Retailer Against a Live Attack</a> (Akamai) </p><p><a href="https://www.bleepingcomputer.com/news/security/cybercrime-crew-stole-635-000-in-taylor-swift-concert-tickets/">Cybercrime 'crew' stole $635,000 in Taylor Swift concert tickets</a> (BleepingComputer)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1457</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6b70e34e-d378-11ef-84f5-c3e6fbf60075]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7961921852.mp3?updated=1741381004" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From China with love (and Malware).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2259/notes</link>
      <description>US Justice Department charges employees of Chinese IT contractor i-Soon. Silk Typhoon targets the IT supply chain for initial access. Chrome extensions that change shape. Attackers target airflow misconfigurations. LibreOffice vulnerability opens the door to script-based attacks. NSO group leaders face charges in spyware case. Today, our own Dave Bittner is our guest as he appeared on the Adopting Zero Trust podcast at ThreatLocker’s Zero Trust World 2025 event with hosts Elliot Volkman and Neal Dennis and guest Dr. Chase Cunningham. And turning $1B into thin air.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, our own Dave Bittner is in our guest spot as he appeared on the Adopting Zero Trust podcast at ThreatLocker’s Zero Trust World 2025 event with hosts Elliot Volkman and Neal Dennis and guest Dr. Chase Cunningham aka Dr. Zero Trust. Adopting Zero Trust is an ongoing conversation about the people and organizations adopting Zero Trust. You can catch the full episode here where Dave and Dr. Zero Trust weigh the difference between delivering refined news and raw perspective, hitting critical mass for AI, and the current political environment.

Selected Reading
US charges Chinese nationals in cyberattacks on Treasury, dissidents and more (The Record)
Silk Typhoon targeting IT supply chain (Microsoft)
Malicious Chrome extensions can spoof password managers in new attack (Bleeping Computer) 
Apache Airflow Misconfigurations Leak Login Credentials to Hackers (GB Hackers)
LibreOffice Flaw Allows Attackers to Run Arbitrary Scripts via Macro URL (GB Hackers)
Exploited VMware ESXi Flaws Put Many at Risk of Ransomware, Other Attacks (SecurityWeek)
Catalan court says NSO Group executives can be charged in spyware investigation (TechCrunch)
Former top NSA cyber official: Probationary firings ‘devastating’ to cyber, national security (CyberScoop) 
Financial Organizations Urge CISA to Revise Proposed CIRCIA Implementation (SecurityWeek)
North Koreans finish initial laundering stage after more than $1 billion stolen from Bybit (The Record) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 06 Mar 2025 21:10:00 -0000</pubDate>
      <itunes:title>From China with love (and Malware).</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2259</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>US Justice Department charges employees of Chinese IT contractor i-Soon. Silk Typhoon targets the IT supply chain for initial access. Chrome extensions that change shape. Attackers target airflow misconfigurations. LibreOffice vulnerability opens the door to script-based attacks. NSO group leaders face charges in spyware case. Today, our own Dave Bittner is our guest as he appeared on the Adopting Zero Trust podcast at ThreatLocker’s Zero Trust World 2025 event with hosts Elliot Volkman and Neal Dennis and guest Dr. Chase Cunningham. And turning $1B into thin air.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, our own Dave Bittner is in our guest spot as he appeared on the Adopting Zero Trust podcast at ThreatLocker’s Zero Trust World 2025 event with hosts Elliot Volkman and Neal Dennis and guest Dr. Chase Cunningham aka Dr. Zero Trust. Adopting Zero Trust is an ongoing conversation about the people and organizations adopting Zero Trust. You can catch the full episode here where Dave and Dr. Zero Trust weigh the difference between delivering refined news and raw perspective, hitting critical mass for AI, and the current political environment.

Selected Reading
US charges Chinese nationals in cyberattacks on Treasury, dissidents and more (The Record)
Silk Typhoon targeting IT supply chain (Microsoft)
Malicious Chrome extensions can spoof password managers in new attack (Bleeping Computer) 
Apache Airflow Misconfigurations Leak Login Credentials to Hackers (GB Hackers)
LibreOffice Flaw Allows Attackers to Run Arbitrary Scripts via Macro URL (GB Hackers)
Exploited VMware ESXi Flaws Put Many at Risk of Ransomware, Other Attacks (SecurityWeek)
Catalan court says NSO Group executives can be charged in spyware investigation (TechCrunch)
Former top NSA cyber official: Probationary firings ‘devastating’ to cyber, national security (CyberScoop) 
Financial Organizations Urge CISA to Revise Proposed CIRCIA Implementation (SecurityWeek)
North Koreans finish initial laundering stage after more than $1 billion stolen from Bybit (The Record) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>US Justice Department charges employees of Chinese IT contractor i-Soon. Silk Typhoon targets the IT supply chain for initial access. Chrome extensions that change shape. Attackers target airflow misconfigurations. LibreOffice vulnerability opens the door to script-based attacks. NSO group leaders face charges in spyware case. Today, our own Dave Bittner is our guest as he appeared on the Adopting Zero Trust podcast at ThreatLocker’s Zero Trust World 2025 event with hosts Elliot Volkman and Neal Dennis and guest Dr. Chase Cunningham. And turning $1B into thin air.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today, our own Dave Bittner is in our guest spot as he appeared on the <a href="https://www.adoptingzerotrust.com/">Adopting Zero Trust podcast</a> at <a href="https://www.threatlocker.com/">ThreatLocker</a>’s <a href="https://ztw.com/">Zero Trust World</a> 2025 event with hosts <a href="https://www.linkedin.com/in/elliotv/">Elliot Volkman</a> and <a href="https://www.linkedin.com/in/myprofiledennis/">Neal Dennis</a> and guest <a href="https://www.linkedin.com/in/dr-chase-cunningham/">Dr. Chase Cunningham</a> aka Dr. Zero Trust. Adopting Zero Trust is an ongoing conversation about the people and organizations adopting Zero Trust. You can catch the full episode <a href="https://www.adoptingzerotrust.com/p/live-at-ztw2025-cyberwire-dailys">here</a> where Dave and Dr. Zero Trust weigh the difference between delivering refined news and raw perspective, hitting critical mass for AI, and the current political environment.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/doj-charges-chinese-nationals-isoon-cyberattacks-treasury">US charges Chinese nationals in cyberattacks on Treasury, dissidents and more</a> (The Record)</p><p><a href="https://www.microsoft.com/en-us/security/blog/2025/03/05/silk-typhoon-targeting-it-supply-chain/">Silk Typhoon targeting IT supply chain</a> (Microsoft)</p><p><a href="https://www.bleepingcomputer.com/news/security/malicious-chrome-extensions-can-spoof-password-managers-in-new-attack/">Malicious Chrome extensions can spoof password managers in new attack</a> (Bleeping Computer) </p><p><a href="https://gbhackers.com/apache-airflow-misconfigurations-leak-login-credentials/">Apache Airflow Misconfigurations Leak Login Credentials to Hackers</a> (GB Hackers)</p><p><a href="https://gbhackers.com/libreoffice-flaw-allows-attackers-to-run-arbitrary-scripts/">LibreOffice Flaw Allows Attackers to Run Arbitrary Scripts via Macro URL</a> (GB Hackers)</p><p><a href="https://www.securityweek.com/exploited-vmware-esxi-flaws-put-many-at-risk-of-ransomware-other-attacks/">Exploited VMware ESXi Flaws Put Many at Risk of Ransomware, Other Attacks</a> (SecurityWeek)</p><p><a href="https://techcrunch.com/2025/03/05/catalan-court-says-nso-group-executives-can-be-charged-in-spyware-investigation/">Catalan court says NSO Group executives can be charged in spyware investigation</a> (TechCrunch)</p><p><a href="https://cyberscoop.com/joyce-china-probationary-firings-devastating-congress/">Former top NSA cyber official: Probationary firings ‘devastating’ to cyber, national security</a> (CyberScoop) </p><p><a href="https://www.securityweek.com/financial-organizations-urge-cisa-to-revise-proposed-circia-implementation/">Financial Organizations Urge CISA to Revise Proposed CIRCIA Implementation</a> (SecurityWeek)</p><p><a href="https://therecord.media/north-koreans-initial-laundering-bybit-hack">North Koreans finish initial laundering stage after more than $1 billion stolen from Bybit</a> (The Record) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1666</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6b31517a-d378-11ef-84f5-87851f3cf61f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5887112591.mp3?updated=1741292943" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US Treasury targets darknet kingpin.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2258/notes</link>
      <description>US Treasury Department sanctions Iranian national accused of running the Nemesis criminal marketplace. Hunters International threatens to leak data stolen from Tata Technologies. Apple challenges U.K.’s iCloud encryption backdoor order. UK competition regulator says no investigation into Microsoft's OpenAI partnership. Stealthy malware campaign targets the UAE's aviation and satellite industry. This week on our CertByte segment, N2K’s Chris Hare is joined by Troy McMillan to break down a question targeting the Cisco Certified Network Associate (CCNA) exam. And hackers hit the books.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K. This week, Chris is joined by Troy McMillan to break down a question targeting the Cisco Certified Network Associate (CCNA) exam, 201-301, version 1.1 exam. Today’s question comes from N2K’s Cisco Certified Network Associate (CCNA 200-301) Practice Test. 
According to Cisco, the CCNA is the industry’s most widely recognized and respected associate-level certification. To learn more about this and other related topics under this objective, please refer to the following resource: https://learningnetwork.cisco.com/s/article/protection-techniques-nbsp-from-wardriving-attack 
To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro. 
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.
Additional source: https://www.cisco.com/site/us/en/learn/training-certifications/certifications/enterprise/ccna/index.html

Selected Reading
Treasury sanctions Iranian national behind defunct Nemesis darknet marketplace (The Record)
Ransomware Group Claims Attack on Tata Technologies (SecurityWeek) 
Apple is challenging U.K.’s iCloud encryption backdoor order (TechCrunch)
UK's competition regulator says Microsoft's OpenAI partnership doesn't qualify for investigation (TechCrunch)  
Call It What You Want: Threat Actor Delivers Highly Targeted Multistage Polyglot Malware (Proofpoint)
Snail Mail Fail: Fake Ransom Note Campaign Preys on Fear (GuidePoint Security)
Fake police call cryptocurrency investors to steal their funds (Bitdefender)
Microsoft Teams tactics, malware connect Black Basta, Cactus ransomware (Bleeping Computer)  
Investigator says differing names for hacker groups, hackers studying investigative methods hinders law enforcement (CyberScoop) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 05 Mar 2025 21:30:00 -0000</pubDate>
      <itunes:title>US Treasury targets darknet kingpin.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2258</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>US Treasury Department sanctions Iranian national accused of running the Nemesis criminal marketplace. Hunters International threatens to leak data stolen from Tata Technologies. Apple challenges U.K.’s iCloud encryption backdoor order. UK competition regulator says no investigation into Microsoft's OpenAI partnership. Stealthy malware campaign targets the UAE's aviation and satellite industry. This week on our CertByte segment, N2K’s Chris Hare is joined by Troy McMillan to break down a question targeting the Cisco Certified Network Associate (CCNA) exam. And hackers hit the books.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K. This week, Chris is joined by Troy McMillan to break down a question targeting the Cisco Certified Network Associate (CCNA) exam, 201-301, version 1.1 exam. Today’s question comes from N2K’s Cisco Certified Network Associate (CCNA 200-301) Practice Test. 
According to Cisco, the CCNA is the industry’s most widely recognized and respected associate-level certification. To learn more about this and other related topics under this objective, please refer to the following resource: https://learningnetwork.cisco.com/s/article/protection-techniques-nbsp-from-wardriving-attack 
To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro. 
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.
Additional source: https://www.cisco.com/site/us/en/learn/training-certifications/certifications/enterprise/ccna/index.html

Selected Reading
Treasury sanctions Iranian national behind defunct Nemesis darknet marketplace (The Record)
Ransomware Group Claims Attack on Tata Technologies (SecurityWeek) 
Apple is challenging U.K.’s iCloud encryption backdoor order (TechCrunch)
UK's competition regulator says Microsoft's OpenAI partnership doesn't qualify for investigation (TechCrunch)  
Call It What You Want: Threat Actor Delivers Highly Targeted Multistage Polyglot Malware (Proofpoint)
Snail Mail Fail: Fake Ransom Note Campaign Preys on Fear (GuidePoint Security)
Fake police call cryptocurrency investors to steal their funds (Bitdefender)
Microsoft Teams tactics, malware connect Black Basta, Cactus ransomware (Bleeping Computer)  
Investigator says differing names for hacker groups, hackers studying investigative methods hinders law enforcement (CyberScoop) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>US Treasury Department sanctions Iranian national accused of running the Nemesis criminal marketplace. Hunters International threatens to leak data stolen from Tata Technologies. Apple challenges U.K.’s iCloud encryption backdoor order. UK competition regulator says no investigation into Microsoft's OpenAI partnership. Stealthy malware campaign targets the UAE's aviation and satellite industry. This week on our CertByte segment, N2K’s Chris Hare is joined by Troy McMillan to break down a question targeting the Cisco Certified Network Associate (CCNA) exam. And hackers hit the books.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CertByte Segment</h2><p>Welcome to CertByte! On this bi-weekly segment hosted by <a href="https://www.linkedin.com/in/chrisharepmp/">Chris Hare</a>, a content developer and project management specialist at <a href="https://www.n2k.com/?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1740605340384.1740674526462.317&amp;__hssc=223811332.1.1740674526462&amp;__hsfp=3850742519">N2K</a>. This week, Chris is joined by<a href="https://www.linkedin.com/in/troy-mcmillan-834a632/"> </a><a href="https://www.linkedin.com/in/troy-mcmillan-834a632/">Troy McMillan</a> to break down a question targeting the Cisco Certified Network Associate (CCNA) exam, 201-301, version 1.1 exam. Today’s question comes from<a href="https://certify.cybervista.net/products/cisco/cisco-certified-network-associate-practice-test/"> </a><a href="https://certify.cybervista.net/products/cisco/cisco-certified-network-associate-practice-test/">N2K’s Cisco Certified Network Associate (CCNA 200-301) Practice Test</a>. </p><p>According to Cisco, the CCNA is the industry’s most widely recognized and respected associate-level certification. To learn more about this and other related topics under this objective, please refer to the following resource:<a href="https://learningnetwork.cisco.com/s/article/protection-techniques-nbsp-from-wardriving-attack"> </a><a href="https://learningnetwork.cisco.com/s/article/protection-techniques-nbsp-from-wardriving-attack">https://learningnetwork.cisco.com/s/article/protection-techniques-nbsp-from-wardriving-attack </a></p><p>To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro. </p><p><em>Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.</em></p><p>Additional source:<a href="https://www.cisco.com/site/us/en/learn/training-certifications/certifications/enterprise/ccna/index.html"> </a><a href="https://www.cisco.com/site/us/en/learn/training-certifications/certifications/enterprise/ccna/index.html">https://www.cisco.com/site/us/en/learn/training-certifications/certifications/enterprise/ccna/index.html</a></p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/iran-national-sanctioned-nemesis-marketplace">Treasury sanctions Iranian national behind defunct Nemesis darknet marketplace</a> (The Record)</p><p><a href="https://www.securityweek.com/ransomware-group-claims-attack-on-tata-technologies/">Ransomware Group Claims Attack on Tata Technologies</a> (SecurityWeek) </p><p><a href="https://techcrunch.com/2025/03/05/apple-is-challenging-u-k-s-icloud-encryption-backdoor-order/">Apple is challenging U.K.’s iCloud encryption backdoor order</a> (TechCrunch)</p><p><a href="https://techcrunch.com/2025/03/05/u-k-s-competition-authority-says-microsofts-openai-partnership-doesnt-quality-for-investigation/">UK's competition regulator says Microsoft's OpenAI partnership doesn't qualify for investigation</a> (TechCrunch)  </p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/call-it-what-you-want-threat-actor-delivers-highly-targeted-multistage-polyglot">Call It What You Want: Threat Actor Delivers Highly Targeted Multistage Polyglot Malware</a> (Proofpoint)</p><p><a href="https://www.guidepointsecurity.com/blog/snail-mail-fail-fake-ransom-note-campaign-preys-on-fear/">Snail Mail Fail: Fake Ransom Note Campaign Preys on Fear</a> (GuidePoint Security)</p><p><a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/fake-police-call-cryptocurrency-investors-to-steal-their-funds">Fake police call cryptocurrency investors to steal their funds</a> (Bitdefender)</p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-teams-tactics-malware-connect-black-basta-cactus-ransomware/">Microsoft Teams tactics, malware connect Black Basta, Cactus ransomware</a> (Bleeping Computer)  </p><p><a href="https://cyberscoop.com/cybercrime-investigator-hacker-groups-law-enforcement/">Investigator says differing names for hacker groups, hackers studying investigative methods hinders law enforcement</a> (CyberScoop) </p><p><br></p><p><strong>Share your feedback.</strong></p><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1412</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6af50bf2-d378-11ef-84f5-83b6334da626]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4732867954.mp3?updated=1741208618" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA keeps watch on Russia.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2257/notes</link>
      <description>CISA says it will continue monitoring Russian cyber threats. Broadcom patches zero-days that can lead to VM escape. Google patches 43 Bugs, including two sneaky zero-days. CISA flags vulnerabilities exploited in the wild. Palau's health ministry recovers from ransomware attack. Lost and found or lost and leaked? On this week's Threat Vector segment, David Moulton previews an episode with Hollie Hennessy on IoT cybersecurity risk mitigation and next week’s special International Women's Day episode featuring trailblazing women from Palo Alto Networks sharing their cybersecurity journeys and leadership insights. And is that really you? 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
On our Threat Vector Segment, host David Moulton shares previews of two upcoming episodes. On this Thursday’s episode, he speaks with Hollie Hennessy, Principal Analyst for IoT Cybersecurity at Omdia, to discuss how attackers exploit vulnerabilities in connected environments and the best approaches for risk mitigation.
The next week On Thursday, March 13th, David shares four conversations with some of the trailblazing women at Palo Alto Networks in honor of International Women’s Day and Women’s History Month. They share their journeys into cybersecurity, discuss the challenges they faced and offer insights on leadership, innovation, and mentorship. Be sure to tune in for some inspiring stories.
Don't miss the full episodes every Threat Vector Thursday, subscribe now to stay ahead. If you're in Austin, Texas for SXSW and want to meet up, email David at threatvector@Paloaltonetworks.com. 

Selected Reading
DHS says CISA won’t stop looking at Russian cyber threats (CyberScoop)
Did Trump Admin Order U.S. Cyber Command and CISA to Stand Down on Russia? (Zero Day)
Broadcom Patches 3 VMware Zero-Days Exploited in the Wild (SecurityWeek)
Google fixes Android zero-day exploited by Serbian authorities (Bleeping Computer) 
Several flaws added to CISA known exploited vulnerabilities catalog (SC Media) 
Palau health ministry on the mend after Qilin ransomware attack (The Record)
Lost luggage data leak exposes nearly a million records (Cybernews)
Lee Enterprises ransomware attack halts freelance and contractor payments (TechCrunch)
TikTok Blasts Australia for YouTube Carveout in Social Media Ban (Bloomberg)
Deepfake cyberattacks proliferated in 2024, iProov claims (The Register)  

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Mar 2025 21:10:00 -0000</pubDate>
      <itunes:title>CISA keeps watch on Russia.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2257</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA says it will continue monitoring Russian cyber threats. Broadcom patches zero-days that can lead to VM escape. Google patches 43 Bugs, including two sneaky zero-days. CISA flags vulnerabilities exploited in the wild. Palau's health ministry recovers from ransomware attack. Lost and found or lost and leaked? On this week's Threat Vector segment, David Moulton previews an episode with Hollie Hennessy on IoT cybersecurity risk mitigation and next week’s special International Women's Day episode featuring trailblazing women from Palo Alto Networks sharing their cybersecurity journeys and leadership insights. And is that really you? 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
On our Threat Vector Segment, host David Moulton shares previews of two upcoming episodes. On this Thursday’s episode, he speaks with Hollie Hennessy, Principal Analyst for IoT Cybersecurity at Omdia, to discuss how attackers exploit vulnerabilities in connected environments and the best approaches for risk mitigation.
The next week On Thursday, March 13th, David shares four conversations with some of the trailblazing women at Palo Alto Networks in honor of International Women’s Day and Women’s History Month. They share their journeys into cybersecurity, discuss the challenges they faced and offer insights on leadership, innovation, and mentorship. Be sure to tune in for some inspiring stories.
Don't miss the full episodes every Threat Vector Thursday, subscribe now to stay ahead. If you're in Austin, Texas for SXSW and want to meet up, email David at threatvector@Paloaltonetworks.com. 

Selected Reading
DHS says CISA won’t stop looking at Russian cyber threats (CyberScoop)
Did Trump Admin Order U.S. Cyber Command and CISA to Stand Down on Russia? (Zero Day)
Broadcom Patches 3 VMware Zero-Days Exploited in the Wild (SecurityWeek)
Google fixes Android zero-day exploited by Serbian authorities (Bleeping Computer) 
Several flaws added to CISA known exploited vulnerabilities catalog (SC Media) 
Palau health ministry on the mend after Qilin ransomware attack (The Record)
Lost luggage data leak exposes nearly a million records (Cybernews)
Lee Enterprises ransomware attack halts freelance and contractor payments (TechCrunch)
TikTok Blasts Australia for YouTube Carveout in Social Media Ban (Bloomberg)
Deepfake cyberattacks proliferated in 2024, iProov claims (The Register)  

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA says it will continue monitoring Russian cyber threats. Broadcom patches zero-days that can lead to VM escape. Google patches 43 Bugs, including two sneaky zero-days. CISA flags vulnerabilities exploited in the wild. Palau's health ministry recovers from ransomware attack. Lost and found or lost and leaked? On this week's <em>Threat Vector</em> segment, David Moulton previews an episode with Hollie Hennessy on IoT cybersecurity risk mitigation and next week’s special International Women's Day episode featuring trailblazing women from Palo Alto Networks sharing their cybersecurity journeys and leadership insights. And is that really you? </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Threat Vector Segment</h2><p>On our <a href="https://thecyberwire.com/podcasts/threat-vector">Threat Vector</a> Segment, host <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a> shares previews of two upcoming episodes. On this Thursday’s episode, he speaks with <a href="https://www.linkedin.com/in/holliehennessy/">Hollie Hennessy</a>, Principal Analyst for IoT Cybersecurity at <a href="https://omdia.tech.informa.com/">Omdia</a>, to discuss how attackers exploit vulnerabilities in connected environments and the best approaches for risk mitigation.</p><p>The next week On Thursday, March 13th, David shares four conversations with some of the trailblazing women at Palo Alto Networks in honor of <a href="https://www.internationalwomensday.com/">International Women’s Day</a> and <a href="https://www.womenshistorymonth.gov/">Women’s History Month</a>. They share their journeys into cybersecurity, discuss the challenges they faced and offer insights on leadership, innovation, and mentorship. Be sure to tune in for some inspiring stories.</p><p>Don't miss the full episodes every Threat Vector Thursday, <a href="https://thecyberwire.com/podcasts/threat-vector">subscribe now</a> to stay ahead. If you're in Austin, Texas for SXSW and want to meet up, email David at <a href="mailto:threatvector@Paloaltonetworks.com">threatvector@Paloaltonetworks.com</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://cyberscoop.com/dhs-cisa-wont-stop-looking-at-russian-cyber-threats/">DHS says CISA won’t stop looking at Russian cyber threats</a> (CyberScoop)</p><p><a href="https://www.zetter-zeroday.com/did-trump-admin-order-u-s-cyber-command-and-cisa-to-stand-down-on-russia/">Did Trump Admin Order U.S. Cyber Command and CISA to Stand Down on Russia?</a> (Zero Day)</p><p><a href="https://www.securityweek.com/broadcom-patches-3-vmware-zero-days-exploited-in-the-wild/">Broadcom Patches 3 VMware Zero-Days Exploited in the Wild</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/google-fixes-android-zero-days-exploited-in-targeted-attacks/">Google fixes Android zero-day exploited by Serbian authorities</a> (Bleeping Computer) </p><p><a href="https://www.scworld.com/brief/several-flaws-added-to-cisa-known-exploited-vulnerabilities-catalog">Several flaws added to CISA known exploited vulnerabilities catalog</a> (SC Media) </p><p><a href="https://therecord.media/palau-health-ministry-ransomware-recover">Palau health ministry on the mend after Qilin ransomware attack</a> (The Record)</p><p><a href="https://cybernews.com/security/lost-luggage-data-leak/">Lost luggage data leak exposes nearly a million records</a> (Cybernews)</p><p><a href="https://techcrunch.com/2025/03/03/lee-enterprises-ransomware-attack-hits-freelance-and-contractor-payments/">Lee Enterprises ransomware attack halts freelance and contractor payments</a> (TechCrunch)</p><p><a href="https://www.bloomberg.com/news/articles/2025-03-04/tiktok-blasts-australia-for-youtube-carveout-in-social-media-ban?embedded-checkout=true">TikTok Blasts Australia for YouTube Carveout in Social Media Ban</a> (Bloomberg)</p><p><a href="https://www.theregister.com/2025/03/04/faceswapping_scams_2024/">Deepfake cyberattacks proliferated in 2024, iProov claims</a> (The Register)  </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1765</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6ab6bbfe-d378-11ef-84f5-5b10105004af]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6385923844.mp3?updated=1741185685" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Is it cyber peace or just a buffer?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2256/notes</link>
      <description>Cyber Command ordered to halt offensive operations against Russia during Ukraine negotiations. Ransomware actors exploit Paragon Partition Manager vulnerability. Amnesty International publishes analysis of Cellebrite exploit chain. California orders data broker to shut down for violating the Delete Act. On our Afternoon Cyber Tea segment with host Ann Johnson of Microsoft Security, Ann speaks with Igor Tsyganskiy, Microsoft's Global Chief Information Security Officer, about "The Power of Partnership in Cyber Defense." And it’s the end of an era.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Afternoon Cyber Tea segment.
On our monthly Afternoon Cyber Tea segment with host Ann Johnson of Microsoft Security, Ann speaks with Igor Tsyganskiy, Microsoft's Global Chief Information Security Officer, about "The Power of Partnership in Cyber Defense." Ann and Igor share an engaging conversation on the challenges and optimism driving the fight against cyber threats. To hear the full conversation on Ann’s show, check out the episode here. You can catch new episodes of Afternoon Cyber Tea every other Tuesday on N2K CyberWire network and on your favorite podcast app. 

Selected Reading
Exclusive: Hegseth orders Cyber Command to stand down on Russia planning (The Record) 
As Trump warms to Putin, U.S. halts offensive cyber operations against Moscow (The Washington Post) 
Hegseth Orders Pentagon to Stop Offensive Cyberoperations Against Russia (The New York Times) 
Ransomware gangs exploit Paragon Partition Manager bug in BYOVD attacks (Bleeping Computer)
VU#726882 - Paragon Partition Manager contains five memory vulnerabilities within its BioNTdrv.sys driver that allow for privilege escalation and denial-of-service (DoS) attacks (Carnegie Mellon University Software Engineering Institute CERT Coordination Center)
Cellebrite zero-day exploit used to target phone of Serbian student activist (Amnesty International Security Lab)
California shuts down data broker for failing to register (The Record)  
Research finds 12,000 ‘Live’ API Keys and Passwords in DeepSeek's Training Data (Truffle Security) 
Cyberattack detected at Polish space agency, minister says (Reuters)
Polish space agency confirms cyberattack (The Register)
As Skype shuts down, its legacy is end-to-end encryption for the masses (TechCrunch) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 03 Mar 2025 21:10:00 -0000</pubDate>
      <itunes:title>Is it cyber peace just a buffer?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2256</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Cyber Command ordered to halt offensive operations against Russia during Ukraine negotiations. Ransomware actors exploit Paragon Partition Manager vulnerability. Amnesty International publishes analysis of Cellebrite exploit chain. California orders data broker to shut down for violating the Delete Act. On our Afternoon Cyber Tea segment with host Ann Johnson of Microsoft Security, Ann speaks with Igor Tsyganskiy, Microsoft's Global Chief Information Security Officer, about "The Power of Partnership in Cyber Defense." And it’s the end of an era.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Afternoon Cyber Tea segment.
On our monthly Afternoon Cyber Tea segment with host Ann Johnson of Microsoft Security, Ann speaks with Igor Tsyganskiy, Microsoft's Global Chief Information Security Officer, about "The Power of Partnership in Cyber Defense." Ann and Igor share an engaging conversation on the challenges and optimism driving the fight against cyber threats. To hear the full conversation on Ann’s show, check out the episode here. You can catch new episodes of Afternoon Cyber Tea every other Tuesday on N2K CyberWire network and on your favorite podcast app. 

Selected Reading
Exclusive: Hegseth orders Cyber Command to stand down on Russia planning (The Record) 
As Trump warms to Putin, U.S. halts offensive cyber operations against Moscow (The Washington Post) 
Hegseth Orders Pentagon to Stop Offensive Cyberoperations Against Russia (The New York Times) 
Ransomware gangs exploit Paragon Partition Manager bug in BYOVD attacks (Bleeping Computer)
VU#726882 - Paragon Partition Manager contains five memory vulnerabilities within its BioNTdrv.sys driver that allow for privilege escalation and denial-of-service (DoS) attacks (Carnegie Mellon University Software Engineering Institute CERT Coordination Center)
Cellebrite zero-day exploit used to target phone of Serbian student activist (Amnesty International Security Lab)
California shuts down data broker for failing to register (The Record)  
Research finds 12,000 ‘Live’ API Keys and Passwords in DeepSeek's Training Data (Truffle Security) 
Cyberattack detected at Polish space agency, minister says (Reuters)
Polish space agency confirms cyberattack (The Register)
As Skype shuts down, its legacy is end-to-end encryption for the masses (TechCrunch) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber Command ordered to halt offensive operations against Russia during Ukraine negotiations. Ransomware actors exploit Paragon Partition Manager vulnerability. Amnesty International publishes analysis of Cellebrite exploit chain. California orders data broker to shut down for violating the Delete Act. On our Afternoon Cyber Tea segment with host Ann Johnson of Microsoft Security, Ann speaks with Igor Tsyganskiy, Microsoft's Global Chief Information Security Officer, about "The Power of Partnership in Cyber Defense." And it’s the end of an era.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Afternoon Cyber Tea segment.</h2><p>On our monthly Afternoon Cyber Tea segment with host Ann Johnson of Microsoft Security, Ann speaks with Igor Tsyganskiy, Microsoft's Global Chief Information Security Officer, about "The Power of Partnership in Cyber Defense." Ann and Igor share an engaging conversation on the challenges and optimism driving the fight against cyber threats. To hear the full conversation on Ann’s show, check out the episode <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea/101/notes">here</a>. You can catch new episodes of <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea</a> every other Tuesday on N2K CyberWire network and on your favorite podcast app. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/hegseth-orders-cyber-command-stand-down-russia-planning">Exclusive: Hegseth orders Cyber Command to stand down on Russia planning</a> (The Record) </p><p><a href="https://www.washingtonpost.com/national-security/2025/03/01/trump-putin-russia-cyber-offense-cisa/">As Trump warms to Putin, U.S. halts offensive cyber operations against Moscow</a> (The Washington Post) </p><p><a href="https://www.nytimes.com/2025/03/02/us/politics/hegseth-cyber-russia-trump-putin.html">Hegseth Orders Pentagon to Stop Offensive Cyberoperations Against Russia</a> (The New York Times) </p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-gangs-exploit-paragon-partition-manager-bug-in-byovd-attacks/">Ransomware gangs exploit Paragon Partition Manager bug in BYOVD attacks</a> (Bleeping Computer)</p><p><a href="https://kb.cert.org/vuls/id/726882">VU#726882 - Paragon Partition Manager contains five memory vulnerabilities within its BioNTdrv.sys driver that allow for privilege escalation and denial-of-service (DoS) attacks</a> (Carnegie Mellon University Software Engineering Institute CERT Coordination Center)</p><p><a href="https://securitylab.amnesty.org/latest/2025/02/cellebrite-zero-day-exploit-used-to-target-phone-of-serbian-student-activist/">Cellebrite zero-day exploit used to target phone of Serbian student activist</a> (Amnesty International Security Lab)</p><p><a href="https://therecord.media/california-shuts-down-data-broker-for-failing-to-register">California shuts down data broker for failing to register</a> (The Record)  </p><p><a href="https://trufflesecurity.com/blog/research-finds-12-000-live-api-keys-and-passwords-in-deepseek-s-training-data">Research finds 12,000 ‘Live’ API Keys and Passwords in DeepSeek's Training Data</a> (Truffle Security) </p><p><a href="https://www.reuters.com/world/europe/cyberattack-detected-polish-space-agency-minister-says-2025-03-02/">Cyberattack detected at Polish space agency, minister says</a> (Reuters)</p><p><a href="https://www.theregister.com/2025/03/03/polish_space_agency_confirms_cyberattack/">Polish space agency confirms cyberattack</a> (The Register)</p><p><a href="https://techcrunch.com/2025/03/03/as-skype-shuts-down-its-legacy-is-end-to-end-encryption-for-the-masses/">As Skype shuts down, its legacy is end-to-end encryption for the masses</a> (TechCrunch) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1115</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6a790ad4-d378-11ef-84f5-e3af63776eda]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9635800148.mp3?updated=1741034166" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Taree Reardon: A voice for women in cyber. [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/57/notes</link>
      <description>Senior Threat Analyst and Shift Lead for VMware Taree Reardon shares her journey to becoming leader for women in the cybersecurity field. A big gamer who has always been interested in hacking and forensics, Taree found her passion while learning about cybersecurity. She's dedicated to diversity and inclusion and found her footing on a team made up of 50% women. Taree spends her days tracking and blocking attacks and as a champion for women. Trusting yourself is top on her list of advice. We thank Taree for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 02 Mar 2025 08:00:00 -0000</pubDate>
      <itunes:title>Taree Reardon: A voice for women in cyber. [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>57</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ba2d25c2-f616-11ef-8913-034bb613a371/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Senior Threat Analyst and Shift Lead for VMware Taree Reardon shares her journey to becoming leader for women in the cybersecurity field. A big gamer who has always been interested in hacking and forensics, Taree found her passion while learning about cybersecurity. She's dedicated to diversity and inclusion and found her footing on a team made up of 50% women. Taree spends her days tracking and blocking attacks and as a champion for women. Trusting yourself is top on her list of advice. We thank Taree for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Senior Threat Analyst and Shift Lead for VMware Taree Reardon shares her journey to becoming leader for women in the cybersecurity field. A big gamer who has always been interested in hacking and forensics, Taree found her passion while learning about cybersecurity. She's dedicated to diversity and inclusion and found her footing on a team made up of 50% women. Taree spends her days tracking and blocking attacks and as a champion for women. Trusting yourself is top on her list of advice. We thank Taree for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>476</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ba2d25c2-f616-11ef-8913-034bb613a371]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1188039853.mp3?updated=1740776491" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Caught in the contagious interview. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/367/notes</link>
      <description>This week we are joined by Phil Stokes, threat researcher at SentinelOne's SentinelLabs, discussing their work on "macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed." Apple recently pushed an update to its XProtect tool, blocking several variants of the DPRK-linked Ferret malware family, which targets victims through the "Contagious Interview" campaign. 
The malware uses fake job interview processes to trick users into installing malicious software, and new variants, including FlexibleFerret, remain undetected by XProtect. SentinelOne's research reveals a deeper investigation into this malware, which uses social engineering to expand its attack vectors, including targeting developers through platforms like GitHub.

The research can be found here:
macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Mar 2025 08:00:00 -0000</pubDate>
      <itunes:title>Caught in the contagious interview. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>367</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c2a1ccd2-f605-11ef-a887-bbd60daa4c91/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>This week we are joined by Phil Stokes, threat researcher at SentinelOne's SentinelLabs, discussing their work on "macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed." Apple recently pushed an update to its XProtect tool, blocking several variants of the DPRK-linked Ferret malware family, which targets victims through the "Contagious Interview" campaign. 
The malware uses fake job interview processes to trick users into installing malicious software, and new variants, including FlexibleFerret, remain undetected by XProtect. SentinelOne's research reveals a deeper investigation into this malware, which uses social engineering to expand its attack vectors, including targeting developers through platforms like GitHub.

The research can be found here:
macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by <a href="https://www.linkedin.com/in/phil-stokes-b74248181/">Phil Stokes</a>, threat researcher at <a href="https://www.linkedin.com/company/sentinelone/">SentinelOne's</a> SentinelLabs, discussing their work on "macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed." Apple recently pushed an update to its XProtect tool, blocking several variants of the DPRK-linked Ferret malware family, which targets victims through the "Contagious Interview" campaign. </p><p>The malware uses fake job interview processes to trick users into installing malicious software, and new variants, including FlexibleFerret, remain undetected by XProtect. SentinelOne's research reveals a deeper investigation into this malware, which uses social engineering to expand its attack vectors, including targeting developers through platforms like GitHub.</p><p><br></p><h3>The research can be found here:</h3><ul><li><a href="https://www.sentinelone.com/blog/macos-flexibleferret-further-variants-of-dprk-malware-family-unearthed/">macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1570</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c2a1ccd2-f605-11ef-a887-bbd60daa4c91]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5440574437.mp3?updated=1740765537" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pay the ransom or risk data carnage.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2255/notes</link>
      <description>Qilin ransomware gang claims responsibility for attack against Lee Enterprises. Thai police arrest suspected hacker behind more than 90 data leaks. JavaGhost uses compromised AWS environments to launch phishing campaigns. LotusBlossum cyberespionage campaigns target Southeast Asia. Malware abuses Microsoft dev tunnels for C2 communication. Protecting the food supply. Today’s guest is Keith Mularski, Chief Global Ambassador at Qintel and former FBI Special Agent, discussing crypto being the target of the cyber underground. And an interview with Iron Man?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today we share Dave’s conversation with Keith Mularski, Chief Global Ambassador at Qintel and former FBI Special Agent, discussing crypto being the target of the cyber underground.

Selected Reading
Ransomware Group Takes Credit for Lee Enterprises Attack (SecurityWeek)
Hacker Behind Over 90 Data Leaks Arrested in Thailand (SecurityWeek)
JavaGhost’s Persistent Phishing Attacks From the Cloud (Unit 42)
Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools (Cisco Talos)
Njrat Campaign Using Microsoft Dev Tunnels (SANS Internet Storm Center) 
New Pass-the-Cookie Attack Bypass Microsoft 365 &amp; YouTube MFA Logins (Cyber Security News)  
How pass the cookie attacks can bypass your MFA  (Longwall Security)
Farm and Food Cybersecurity Act reintroduced to protect food supply chain from cyber threats (Industrial Cyber)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 28 Feb 2025 21:10:00 -0000</pubDate>
      <itunes:title>Pay the ransom or risk data carnage.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2255</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Qilin ransomware gang claims responsibility for attack against Lee Enterprises. Thai police arrest suspected hacker behind more than 90 data leaks. JavaGhost uses compromised AWS environments to launch phishing campaigns. LotusBlossum cyberespionage campaigns target Southeast Asia. Malware abuses Microsoft dev tunnels for C2 communication. Protecting the food supply. Today’s guest is Keith Mularski, Chief Global Ambassador at Qintel and former FBI Special Agent, discussing crypto being the target of the cyber underground. And an interview with Iron Man?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today we share Dave’s conversation with Keith Mularski, Chief Global Ambassador at Qintel and former FBI Special Agent, discussing crypto being the target of the cyber underground.

Selected Reading
Ransomware Group Takes Credit for Lee Enterprises Attack (SecurityWeek)
Hacker Behind Over 90 Data Leaks Arrested in Thailand (SecurityWeek)
JavaGhost’s Persistent Phishing Attacks From the Cloud (Unit 42)
Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools (Cisco Talos)
Njrat Campaign Using Microsoft Dev Tunnels (SANS Internet Storm Center) 
New Pass-the-Cookie Attack Bypass Microsoft 365 &amp; YouTube MFA Logins (Cyber Security News)  
How pass the cookie attacks can bypass your MFA  (Longwall Security)
Farm and Food Cybersecurity Act reintroduced to protect food supply chain from cyber threats (Industrial Cyber)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Qilin ransomware gang claims responsibility for attack against Lee Enterprises. Thai police arrest suspected hacker behind more than 90 data leaks. JavaGhost uses compromised AWS environments to launch phishing campaigns. LotusBlossum cyberespionage campaigns target Southeast Asia. Malware abuses Microsoft dev tunnels for C2 communication. Protecting the food supply. Today’s guest is Keith Mularski, Chief Global Ambassador at Qintel and former FBI Special Agent, discussing crypto being the target of the cyber underground. And an <a href="https://youtube.com/shorts/WUaaHOmzELI?feature=share">interview</a> with Iron Man?</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today we share Dave’s conversation with <a href="https://www.linkedin.com/in/keith-mularski-b737551/">Keith Mularski</a>, Chief Global Ambassador at <a href="https://www.qintel.com/">Qintel</a> and former FBI Special Agent, discussing crypto being the target of the cyber underground.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/ransomware-group-takes-credit-for-lee-enterprises-attack/">Ransomware Group Takes Credit for Lee Enterprises Attack</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/hacker-behind-over-90-data-leaks-arrested-in-thailand/">Hacker Behind Over 90 Data Leaks Arrested in Thailand</a> (SecurityWeek)</p><p><a href="https://unit42.paloaltonetworks.com/javaghost-cloud-phishing/">JavaGhost’s Persistent Phishing Attacks From the Cloud</a> (Unit 42)</p><p><a href="https://blog.talosintelligence.com/lotus-blossom-espionage-group/">Lotus Blossom espionage group targets multiple industries with different versions of Sagerunex and hacking tools</a> (Cisco Talos)</p><p><a href="https://isc.sans.edu/diary/Njrat%20Campaign%20Using%20Microsoft%20Dev%20Tunnels/31724">Njrat Campaign Using Microsoft Dev Tunnels</a> (SANS Internet Storm Center) </p><p><a href="https://cybersecuritynews.com/new-pass-the-cookie-attack-bypass/">New Pass-the-Cookie Attack Bypass Microsoft 365 &amp; YouTube MFA Logins</a> (Cyber Security News)  </p><p><a href="https://longwallsecurity.com/how-pass-the-cookie-attacks-can-bypass-your-mfa/">How pass the cookie attacks can bypass your MFA </a> (Longwall Security)</p><p><a href="https://industrialcyber.co/regulation-standards-and-compliance/farm-and-food-cybersecurity-act-reintroduced-to-protect-food-supply-chain-from-cyber-threats/">Farm and Food Cybersecurity Act reintroduced to protect food supply chain from cyber threats</a> (Industrial Cyber)</p><p><br></p><h2>Share your feedback.</h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1519</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6a3d1ede-d378-11ef-84f5-ff901974c844]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2932430293.mp3?updated=1740776762" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The masterminds behind a $1.5 billion heist.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2254/notes</link>
      <description>FBI attributes $1.5 billion Bybit hack to DPRK hackers. Cellebrite suspends services in Serbia following allegations of misuse. A Belgium spy agency is hacked. New groups, bigger attacks. Sticky Werewolf strikes again. US DNI orders legal review of UK's request for iCloud backdoor. A cybersecurity veteran takes CISA’s lead. DOGE accesses sensitive HUD data. Cleveland Municipal Court remains closed following cyber incident. Our guest today is an excerpt from our Caveat podcast. Adam Marré, Arctic Wolf CISO and former FBI special agent, joins Dave to discuss banning TikTok and increasing regulations for social media companies. And can hacking be treason?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest today is an excerpt from our Caveat podcast. Adam Marré, Arctic Wolf CISO and former FBI special agent, joins Dave to discuss banning TikTok and increasing regulations for social media companies. You can hear Adam and Dave’s full discussion on today’s Caveat episode. Listen to Dave and co-host Ben Yelin discuss the issue following the interview on Caveat. 

Selected Reading
FBI confirms Lazarus hackers were behind $1.5B Bybit crypto heist (Bleeping Computer)
Cellebrite suspends Serbia as customer after claims police used firm's tech to plant spyware (TechCrunch)
Belgium probes suspected Chinese hack of state security service (The Record)
It's not just Salt Typhoon: All China-backed attack groups are showcasing specialized offensive skills (CyberScoop) 
Angry Likho APT Resurfaces with Lumma Stealer Attacks Against Russia (Hackread) 
Gabbard: UK demand to Apple for backdoor access is 'grave concern' to US (The Record)
Karen Evans steps into a leading federal cyber position: executive assistant director for cybersecurity at CISA (CyberScoop)
DOGE Gains Access to Confidential Records on Housing Discrimination, Medical Details — Even Domestic Violence (ProPublica)
‘Cyber incident’ shuts down Cleveland Municipal Court for third straight day (The Record)
Cyber threat shuts down Cleveland Municipal Court for second day (News5 Cleveland) 
U.S. Soldier Charged in AT&amp;T Hack Searched “Can Hacking Be Treason” (Krebs on Security)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 27 Feb 2025 21:10:00 -0000</pubDate>
      <itunes:title>The masterminds behind a $1.5 billion heist.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2254</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>FBI attributes $1.5 billion Bybit hack to DPRK hackers. Cellebrite suspends services in Serbia following allegations of misuse. A Belgium spy agency is hacked. New groups, bigger attacks. Sticky Werewolf strikes again. US DNI orders legal review of UK's request for iCloud backdoor. A cybersecurity veteran takes CISA’s lead. DOGE accesses sensitive HUD data. Cleveland Municipal Court remains closed following cyber incident. Our guest today is an excerpt from our Caveat podcast. Adam Marré, Arctic Wolf CISO and former FBI special agent, joins Dave to discuss banning TikTok and increasing regulations for social media companies. And can hacking be treason?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest today is an excerpt from our Caveat podcast. Adam Marré, Arctic Wolf CISO and former FBI special agent, joins Dave to discuss banning TikTok and increasing regulations for social media companies. You can hear Adam and Dave’s full discussion on today’s Caveat episode. Listen to Dave and co-host Ben Yelin discuss the issue following the interview on Caveat. 

Selected Reading
FBI confirms Lazarus hackers were behind $1.5B Bybit crypto heist (Bleeping Computer)
Cellebrite suspends Serbia as customer after claims police used firm's tech to plant spyware (TechCrunch)
Belgium probes suspected Chinese hack of state security service (The Record)
It's not just Salt Typhoon: All China-backed attack groups are showcasing specialized offensive skills (CyberScoop) 
Angry Likho APT Resurfaces with Lumma Stealer Attacks Against Russia (Hackread) 
Gabbard: UK demand to Apple for backdoor access is 'grave concern' to US (The Record)
Karen Evans steps into a leading federal cyber position: executive assistant director for cybersecurity at CISA (CyberScoop)
DOGE Gains Access to Confidential Records on Housing Discrimination, Medical Details — Even Domestic Violence (ProPublica)
‘Cyber incident’ shuts down Cleveland Municipal Court for third straight day (The Record)
Cyber threat shuts down Cleveland Municipal Court for second day (News5 Cleveland) 
U.S. Soldier Charged in AT&amp;T Hack Searched “Can Hacking Be Treason” (Krebs on Security)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>FBI attributes $1.5 billion Bybit hack to DPRK hackers. Cellebrite suspends services in Serbia following allegations of misuse. A Belgium spy agency is hacked. New groups, bigger attacks. Sticky Werewolf strikes again. US DNI orders legal review of UK's request for iCloud backdoor. A cybersecurity veteran takes CISA’s lead. DOGE accesses sensitive HUD data. Cleveland Municipal Court remains closed following cyber incident. Our guest today is an excerpt from our Caveat podcast. Adam Marré, Arctic Wolf CISO and former FBI special agent, joins Dave to discuss banning TikTok and increasing regulations for social media companies. And can hacking be treason?</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest today is an excerpt from our <a href="https://thecyberwire.com/podcasts/caveat">Caveat</a> podcast. <a href="https://www.linkedin.com/in/adam-marre/">Adam Marré</a>, Arctic Wolf CISO and former FBI special agent, joins Dave to discuss banning TikTok and increasing regulations for social media companies. You can hear Adam and Dave’s full discussion on today’s <a href="https://thecyberwire.com/podcasts/caveat/252/notes">Caveat episode</a>. Listen to Dave and co-host Ben Yelin discuss the issue following the interview on Caveat. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/fbi-confirms-lazarus-hackers-were-behind-15b-bybit-crypto-heist/">FBI confirms Lazarus hackers were behind $1.5B Bybit crypto heist</a> (Bleeping Computer)</p><p><a href="https://techcrunch.com/2025/02/26/cellebrite-suspends-serbia-as-customer-after-claims-police-used-firms-tech-to-plant-spyware/">Cellebrite suspends Serbia as customer after claims police used firm's tech to plant spyware</a> (TechCrunch)</p><p><a href="https://therecord.media/belgium-investigation-alleged-china-cyber-espionage-vsse">Belgium probes suspected Chinese hack of state security service</a> (The Record)</p><p><a href="https://cyberscoop.com/china-specialized-offensive-skills-crowdstrike/">It's not just Salt Typhoon: All China-backed attack groups are showcasing specialized offensive skills</a> (CyberScoop) </p><p><a href="https://hackread.com/angry-likho-apt-lumma-stealer-attacks-on-russia/">Angry Likho APT Resurfaces with Lumma Stealer Attacks Against Russia</a> (Hackread) </p><p><a href="https://therecord.media/odni-gabbard-uk-apple-backdoor-request-grave-concern">Gabbard: UK demand to Apple for backdoor access is 'grave concern' to US</a> (The Record)</p><p><a href="https://cyberscoop.com/karen-evans-steps-into-a-leading-federal-cyber-position-executive-assistant-director-for-cybersecurity-at-cisa/">Karen Evans steps into a leading federal cyber position: executive assistant director for cybersecurity at CISA</a> (CyberScoop)</p><p><a href="https://www.propublica.org/article/doge-elon-musk-hud-housing-discrimination-privacy-domestic-violence">DOGE Gains Access to Confidential Records on Housing Discrimination, Medical Details — Even Domestic Violence</a> (ProPublica)</p><p><a href="https://therecord.media/cyber-incident-shuts-down-cleveland-municipal-court">‘Cyber incident’ shuts down Cleveland Municipal Court for third straight day</a> (The Record)</p><p><a href="https://www.news5cleveland.com/news/local-news/cyber-threat-shuts-down-cleveland-municipal-court-for-second-day">Cyber threat shuts down Cleveland Municipal Court for second day</a> (News5 Cleveland) </p><p><a href="https://krebsonsecurity.com/2025/02/u-s-soldier-charged-in-att-hack-searched-can-hacking-be-treason/">U.S. Soldier Charged in AT&amp;T Hack Searched “Can Hacking Be Treason”</a> (Krebs on Security)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1628</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[69f9155e-d378-11ef-84f5-ff6044ae5748]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3817583937.mp3?updated=1740685600" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Live from Orlando, it's Hacking Humans! [Hacking Humans]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/327/notes</link>
      <description>In this special live episode of Hacking Humans, recorded at ThreatLocker’s Zero Trust World 2025 conference in Orlando, Florida, Dave Bittner is joined by T-Minus host Maria Varmazis. Together, they explore the latest in social engineering scams, phishing schemes, and cybercriminal exploits making headlines. Their guest, Seamus Lennon, ThreatLocker’s VP of Operations for EMEA, shares insights on Zero Trust security and the evolving threat landscape. Maria's story this week follows the IRS warning about a fake “Self Employment Tax Credit” scam on social media, urging taxpayers to ignore misinformation and consult professionals. Dave's got the story of the Better Business Bureau’s annual Scam Tracker report, revealing that online shopping scams continue to top the list for the fifth year, with phishing and employment scams remaining major threats, while fraudsters increasingly use AI and deepfake technology to deceive victims. Our catch of the day comes from Diesel in West Virginia, and features a scammer who tried to panic their target with a classic “We’ve frozen your account” scam—only to get hilariously mixed up with actual embryo freezing.
Resources and links to stories: 

Better Business Bureau reveals top local scams of 2024

IRS warns taxpayers about misleading claims about non-existent “Self Employment Tax Credit;” promoters, social media peddling inaccurate eligibility suggestions

BBB Scam Tracker

Got a $1,400 rebate text from the IRS? It's a scam, Better Business Bureau warns.


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 27 Feb 2025 16:20:00 -0000</pubDate>
      <itunes:title>Live from Orlando, it's Hacking Humans!</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>327</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/412836ba-f523-11ef-86b9-d72d55731ef9/image/c43559e894154454c5de2e7b6b79dd27.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>In this special live episode of Hacking Humans, recorded at ThreatLocker’s Zero Trust World 2025 conference in Orlando, Florida, Dave Bittner is joined by T-Minus host Maria Varmazis. Together, they explore the latest in social engineering scams, phishing schemes, and cybercriminal exploits making headlines. Their guest, Seamus Lennon, ThreatLocker’s VP of Operations for EMEA, shares insights on Zero Trust security and the evolving threat landscape. Maria's story this week follows the IRS warning about a fake “Self Employment Tax Credit” scam on social media, urging taxpayers to ignore misinformation and consult professionals. Dave's got the story of the Better Business Bureau’s annual Scam Tracker report, revealing that online shopping scams continue to top the list for the fifth year, with phishing and employment scams remaining major threats, while fraudsters increasingly use AI and deepfake technology to deceive victims. Our catch of the day comes from Diesel in West Virginia, and features a scammer who tried to panic their target with a classic “We’ve frozen your account” scam—only to get hilariously mixed up with actual embryo freezing.
Resources and links to stories: 

Better Business Bureau reveals top local scams of 2024

IRS warns taxpayers about misleading claims about non-existent “Self Employment Tax Credit;” promoters, social media peddling inaccurate eligibility suggestions

BBB Scam Tracker

Got a $1,400 rebate text from the IRS? It's a scam, Better Business Bureau warns.


You can hear more from the T-Minus space daily show here.

Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@n2k.com.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this special live episode of <em>Hacking Humans</em>, recorded at ThreatLocker’s Zero Trust World 2025 conference in Orlando, Florida, <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> is joined by <em>T-Minus</em> host <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a>. Together, they explore the latest in social engineering scams, phishing schemes, and cybercriminal exploits making headlines. Their guest, <a href="https://www.linkedin.com/in/seamus-lennon-41423886/">Seamus Lennon</a>, ThreatLocker’s VP of Operations for EMEA, shares insights on Zero Trust security and the evolving threat landscape. Maria's story this week follows the IRS warning about a fake “Self Employment Tax Credit” scam on social media, urging taxpayers to ignore misinformation and consult professionals. Dave's got the story of the Better Business Bureau’s annual Scam Tracker report, revealing that online shopping scams continue to top the list for the fifth year, with phishing and employment scams remaining major threats, while fraudsters increasingly use AI and deepfake technology to deceive victims. Our catch of the day comes from Diesel in West Virginia, and features a scammer who tried to panic their target with a classic “We’ve frozen your account” scam—only to get hilariously mixed up with actual embryo freezing.</p><p>Resources and links to stories: </p><ul>
<li><a href="https://abc7chicago.com/post/better-business-bureau-reveals-top-local-scams-2024-online-shopping-phone-email-rampant/15741408/">Better Business Bureau reveals top local scams of 2024</a></li>
<li><a href="https://www.irs.gov/newsroom/irs-warns-taxpayers-about-misleading-claims-about-non-existent-self-employment-tax-credit-promoters-social-media-peddling-inaccurate-eligibility-suggestions">IRS warns taxpayers about misleading claims about non-existent “Self Employment Tax Credit;” promoters, social media peddling inaccurate eligibility suggestions</a></li>
<li><a href="https://www.bbb.org/scamtracker/lookupscam/936488">BBB Scam Tracker</a></li>
<li><a href="https://www.cbsnews.com/news/irs-economic-impact-payment-text/">Got a $1,400 rebate text from the IRS? It's a scam, Better Business Bureau warns.</a></li>
</ul><p><br></p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><br></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@n2k.com">hackinghumans@n2k.com</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1851</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[412836ba-f523-11ef-86b9-d72d55731ef9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4669409575.mp3?updated=1740510971" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacked in plain sight.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2253/notes</link>
      <description>A major employee screening provider discloses a data breach affecting over 3.3 million people. Signal considers exiting Sweden over a proposed law that would give police access to encrypted messages. House Democrats call out DOGE’s negligent cybersecurity practices. Critical vulnerabilities in Rsync allow attackers to execute remote code. A class action lawsuit claims Amazon violates Washington State’s privacy laws. CISA warns that attackers are exploiting Microsoft’s Partner Center platform. A researcher discovers a critical remote code execution vulnerability in MITRE’s Caldera security training platform. An analysis of  CISA’s JCDC AI Cybersecurity Collaboration Playbook. Ben Yelin explains Apple pulling iCloud end-to-end encryption in response to the UK Government. A Disney employee’s cautionary tale. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
We are joined by Caveat podcast co-host Ben Yelin to discuss Apple pulling iCloud end-to-end encryption in response to the UK Government. You can read the article from Bleeping Computer here. Ben is the Program Director for Public Policy &amp; External Affairs at University of Maryland Center for Health and Homeland Security. You can catch Caveat every Thursday here on the N2K CyberWire network and on your favorite podcast app. 

Selected Reading
3.3 Million People Impacted by DISA Data Breach (SecurityWeek)
DOGE must halt all ‘negligent cybersecurity practices,’ House Democrats tell Trump (The Record)
Signal May Exit Sweden If Government Imposes Encryption Backdoor (Infosecurity Magazine)
Rsync Vulnerabilities Let Hackers Gain Full Control of Servers - PoC Released (Cyber Security News)
Lawsuit: Amazon Violates Washington State Health Data Law (BankInfo Security)
CISA Warns of Microsoft Partner Center Access Control Vulnerability Exploited in Wild (Cyber Security News)
MITRE Caldera security suite scores perfect 10 for insecurity (The Register)
CISA’s AI cybersecurity playbook calls for greater collaboration, but trust is key to successful execution (CyberScoop)
A Disney Worker Downloaded an AI Tool. It Led to a Hack That Ruined His Life. (Wall Street Journal) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 26 Feb 2025 21:10:00 -0000</pubDate>
      <itunes:title>Hacked in plain sight.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2253</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A major employee screening provider discloses a data breach affecting over 3.3 million people. Signal considers exiting Sweden over a proposed law that would give police access to encrypted messages. House Democrats call out DOGE’s negligent cybersecurity practices. Critical vulnerabilities in Rsync allow attackers to execute remote code. A class action lawsuit claims Amazon violates Washington State’s privacy laws. CISA warns that attackers are exploiting Microsoft’s Partner Center platform. A researcher discovers a critical remote code execution vulnerability in MITRE’s Caldera security training platform. An analysis of  CISA’s JCDC AI Cybersecurity Collaboration Playbook. Ben Yelin explains Apple pulling iCloud end-to-end encryption in response to the UK Government. A Disney employee’s cautionary tale. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
We are joined by Caveat podcast co-host Ben Yelin to discuss Apple pulling iCloud end-to-end encryption in response to the UK Government. You can read the article from Bleeping Computer here. Ben is the Program Director for Public Policy &amp; External Affairs at University of Maryland Center for Health and Homeland Security. You can catch Caveat every Thursday here on the N2K CyberWire network and on your favorite podcast app. 

Selected Reading
3.3 Million People Impacted by DISA Data Breach (SecurityWeek)
DOGE must halt all ‘negligent cybersecurity practices,’ House Democrats tell Trump (The Record)
Signal May Exit Sweden If Government Imposes Encryption Backdoor (Infosecurity Magazine)
Rsync Vulnerabilities Let Hackers Gain Full Control of Servers - PoC Released (Cyber Security News)
Lawsuit: Amazon Violates Washington State Health Data Law (BankInfo Security)
CISA Warns of Microsoft Partner Center Access Control Vulnerability Exploited in Wild (Cyber Security News)
MITRE Caldera security suite scores perfect 10 for insecurity (The Register)
CISA’s AI cybersecurity playbook calls for greater collaboration, but trust is key to successful execution (CyberScoop)
A Disney Worker Downloaded an AI Tool. It Led to a Hack That Ruined His Life. (Wall Street Journal) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A major employee screening provider discloses a data breach affecting over 3.3 million people. Signal considers exiting Sweden over a proposed law that would give police access to encrypted messages. House Democrats call out DOGE’s negligent cybersecurity practices. Critical vulnerabilities in Rsync allow attackers to execute remote code. A class action lawsuit claims Amazon violates Washington State’s privacy laws. CISA warns that attackers are exploiting Microsoft’s Partner Center platform. A researcher discovers a critical remote code execution vulnerability in MITRE’s Caldera security training platform. An analysis of  CISA’s JCDC AI Cybersecurity Collaboration Playbook. Ben Yelin explains Apple pulling iCloud end-to-end encryption in response to the UK Government. A Disney employee’s cautionary tale.<strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>We are joined by Caveat podcast co-host <a href="https://www.linkedin.com/in/benjamin-yelin-5b14114b/">Ben Yelin</a> to discuss Apple pulling iCloud end-to-end encryption in response to the UK Government. You can read the article from Bleeping Computer <a href="https://www.bleepingcomputer.com/news/security/apple-pulls-icloud-end-to-end-encryption-feature-in-the-uk/">here</a>. Ben is the Program Director for Public Policy &amp; External Affairs at <a href="https://www.mdchhs.com/">University of Maryland Center for Health and Homeland Security</a>. You can catch Caveat every Thursday <a href="https://thecyberwire.com/podcasts/caveat">here</a> on the N2K CyberWire network and on your favorite podcast app. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/3-3-million-people-impacted-by-disa-data-breach/">3.3 Million People Impacted by DISA Data Breach</a> (SecurityWeek)</p><p><a href="https://therecord.media/doge-cybersecurity-house-democrats-letter-trump">DOGE must halt all ‘negligent cybersecurity practices,’ House Democrats tell Trump</a> (The Record)</p><p><a href="https://www.infosecurity-magazine.com/news/signal-exit-sweden-government/">Signal May Exit Sweden If Government Imposes Encryption Backdoor</a> (Infosecurity Magazine)</p><p><a href="https://cybersecuritynews.com/rsync-vulnerabilities-full-control-servers/">Rsync Vulnerabilities Let Hackers Gain Full Control of Servers - PoC Released</a> (Cyber Security News)</p><p><a href="https://www.bankinfosecurity.com/lawsuit-amazon-violates-washington-state-health-data-law-a-27595">Lawsuit: Amazon Violates Washington State Health Data Law</a> (BankInfo Security)</p><p><a href="https://cybersecuritynews.com/cisa-microsoft-partner-center-access/">CISA Warns of Microsoft Partner Center Access Control Vulnerability Exploited in Wild</a> (Cyber Security News)</p><p><a href="https://www.theregister.com/2025/02/25/10_bug_mitre_caldera/">MITRE Caldera security suite scores perfect 10 for insecurity</a> (The Register)</p><p><a href="https://cyberscoop.com/ai-cybersecurity-jcdc-playbook-op-ed/">CISA’s AI cybersecurity playbook calls for greater collaboration, but trust is key to successful execution</a> (CyberScoop)</p><p><a href="https://www.wsj.com/tech/cybersecurity/disney-employee-ai-tool-hacker-cyberattack-3700c931?mod=panda_wsj_author_alert">A Disney Worker Downloaded an AI Tool. It Led to a Hack That Ruined His Life.</a> (Wall Street Journal) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1496</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[69b7dcce-d378-11ef-84f5-9308dd77e414]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6709360241.mp3?updated=1740599306" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Orange you glad you didn't fall for this?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2252/notes</link>
      <description>A hacker claims to have stolen internal documents from  a major French telecommunications company. A security breach hits Russia’s financial sector. Cyberattacks targeting ICS and OT surged dramatically last year. Chinese group Silver Fox is spoofing medical software. The UK Home Office’s new vulnerability reporting policy risks prosecuting ethical hackers. Ransomware actors are shifting away from encryption. A sophisticated macOS malware campaign is distributing Poseidon Stealer. The LightSpy surveillance framework evolves into a cross-platform espionage tool. A Chinese botnet is targeting Microsoft 365 accounts using password spraying attacks. Our guest today is Lauren Buitta, Founder and CEO at Girl Security, discussing mentoring and intergenerational strategies. There may be a backdoor in your front door.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest today is Lauren Buitta, Founder and CEO at Girl Security, discussing mentoring and intergenerational strategies.

Selected Reading
Orange Group confirms breach after hacker leaks company documents (Bleeping Computer)
Russia warns of breach of major IT service provider LANIT serving the financial sector (Beyond Machines) 
Dragos: Surge of new hacking groups enter ICS space as states collaborate with private actors (CyberScoop)
China's Silver Fox spoofs medical imaging apps to hijack patients' computers (The Register)
UK Home Office’s new vulnerability reporting mechanism leaves researchers open to prosecution (The Record)
Only a Fifth of Ransomware Attacks Now Encrypt Data (Infosecurity Magazine)
Poseidon Stealer Malware Attacking Mac Users via Fake DeepSeek Site (Cyber Security News) 
Exploits for unpatched Parallels Desktop flaw give root on Macs (Bleeping Computer)
LightSpy Malware Expands with 100+ Commands to Target Users Across All Major OS Platforms (GB Hackers) 
Chinese Botnet Bypasses MFA in Microsoft 365 Attacks (Infosecurity Magazine)
CISA Warns of Attacks Exploiting Oracle Agile PLM Vulnerability (SecurityWeek)
A single default password exposes access to dozens of apartment buildings (TechCrunch)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Feb 2025 21:10:00 -0000</pubDate>
      <itunes:title>Orange you glad you didn't fall for this?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2252</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A hacker claims to have stolen internal documents from  a major French telecommunications company. A security breach hits Russia’s financial sector. Cyberattacks targeting ICS and OT surged dramatically last year. Chinese group Silver Fox is spoofing medical software. The UK Home Office’s new vulnerability reporting policy risks prosecuting ethical hackers. Ransomware actors are shifting away from encryption. A sophisticated macOS malware campaign is distributing Poseidon Stealer. The LightSpy surveillance framework evolves into a cross-platform espionage tool. A Chinese botnet is targeting Microsoft 365 accounts using password spraying attacks. Our guest today is Lauren Buitta, Founder and CEO at Girl Security, discussing mentoring and intergenerational strategies. There may be a backdoor in your front door.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest today is Lauren Buitta, Founder and CEO at Girl Security, discussing mentoring and intergenerational strategies.

Selected Reading
Orange Group confirms breach after hacker leaks company documents (Bleeping Computer)
Russia warns of breach of major IT service provider LANIT serving the financial sector (Beyond Machines) 
Dragos: Surge of new hacking groups enter ICS space as states collaborate with private actors (CyberScoop)
China's Silver Fox spoofs medical imaging apps to hijack patients' computers (The Register)
UK Home Office’s new vulnerability reporting mechanism leaves researchers open to prosecution (The Record)
Only a Fifth of Ransomware Attacks Now Encrypt Data (Infosecurity Magazine)
Poseidon Stealer Malware Attacking Mac Users via Fake DeepSeek Site (Cyber Security News) 
Exploits for unpatched Parallels Desktop flaw give root on Macs (Bleeping Computer)
LightSpy Malware Expands with 100+ Commands to Target Users Across All Major OS Platforms (GB Hackers) 
Chinese Botnet Bypasses MFA in Microsoft 365 Attacks (Infosecurity Magazine)
CISA Warns of Attacks Exploiting Oracle Agile PLM Vulnerability (SecurityWeek)
A single default password exposes access to dozens of apartment buildings (TechCrunch)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A hacker claims to have stolen internal documents from  a major French telecommunications company. A security breach hits Russia’s financial sector. Cyberattacks targeting ICS and OT surged dramatically last year. Chinese group Silver Fox is spoofing medical software. The UK Home Office’s new vulnerability reporting policy risks prosecuting ethical hackers. Ransomware actors are shifting away from encryption. A sophisticated macOS malware campaign is distributing Poseidon Stealer. The LightSpy surveillance framework evolves into a cross-platform espionage tool. A Chinese botnet is targeting Microsoft 365 accounts using password spraying attacks. Our guest today is Lauren Buitta, Founder and CEO at Girl Security, discussing mentoring and intergenerational strategies. There may be a backdoor in your front door.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest today is <a href="https://www.linkedin.com/in/lauren-bean-buitta/">Lauren Buitta</a>, Founder and CEO at <a href="https://www.linkedin.com/company/girl-security/">Girl Security</a>, discussing mentoring and intergenerational strategies.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/orange-group-confirms-breach-after-hacker-leaks-company-documents/">Orange Group confirms breach after hacker leaks company documents</a> (Bleeping Computer)</p><p><a href="https://beyondmachines.net/event_details/russia-warns-of-breach-of-major-it-service-provider-lanit-serving-the-financial-sector-c-w-d-3-w/gD2P6Ple2L">Russia warns of breach of major IT service provider LANIT serving the financial sector</a> (Beyond Machines) </p><p><a href="https://cyberscoop.com/dragos-ot-ics-annual-report-states-collaborating-with-private-hacking-groups/">Dragos: Surge of new hacking groups enter ICS space as states collaborate with private actors</a> (CyberScoop)</p><p><a href="https://www.theregister.com/2025/02/25/silver_fox_medical_app_backdoor/">China's Silver Fox spoofs medical imaging apps to hijack patients' computers</a> (The Register)</p><p><a href="https://therecord.media/uk-home-office-vulnerability-disclosure-ethical-hackers">UK Home Office’s new vulnerability reporting mechanism leaves researchers open to prosecution</a> (The Record)</p><p><a href="https://www.infosecurity-magazine.com/news/only-fifth-ransomware-attacks/">Only a Fifth of Ransomware Attacks Now Encrypt Data</a> (Infosecurity Magazine)</p><p><a href="https://cybersecuritynews.com/poseidon-stealer-malware-attacking-mac-users/">Poseidon Stealer Malware Attacking Mac Users via Fake DeepSeek Site</a> (Cyber Security News) </p><p><a href="https://www.bleepingcomputer.com/news/security/exploits-for-unpatched-parallels-desktop-flaw-give-root-on-macs/">Exploits for unpatched Parallels Desktop flaw give root on Macs</a> (Bleeping Computer)</p><p><a href="https://gbhackers.com/lightspy-malware-expands-with-100-commands/">LightSpy Malware Expands with 100+ Commands to Target Users Across All Major OS Platforms</a> (GB Hackers) </p><p><a href="https://www.infosecurity-magazine.com/news/chinese-botnet-mfa-microsoft/">Chinese Botnet Bypasses MFA in Microsoft 365 Attacks</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/cisa-warns-of-attacks-exploiting-oracle-agile-plm-vulnerability/">CISA Warns of Attacks Exploiting Oracle Agile PLM Vulnerability</a> (SecurityWeek)</p><p><a href="https://techcrunch.com/2025/02/24/a-single-default-password-exposes-access-to-dozens-of-apartment-buildings/">A single default password exposes access to dozens of apartment buildings</a> (TechCrunch)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1638</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[697d7bc4-d378-11ef-84f5-abdeb24cf81c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5826420139.mp3?updated=1740512870" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Can the U.S. keep up in cyberspace?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2251/notes</link>
      <description>Retired Gen. Paul Nakasone warns the U.S. is falling behind in cyberspace. Australia orders government entities to remove and ban Kaspersky products. FatalRAT targets industrial organizations in the APAC region. A major cryptocurrency exchange reports the theft of $1.5 billion in digital assets. Apple removes end-to-end encryption (E2EE) for iCloud in the UK. Researchers uncover a LockBit ransomware attack exploiting a Windows Confluence server. Researchers uncover zero-day vulnerabilities in a widely used cloud logging utility.A PayPal email scam is tricking users into calling scammers. Republican leaders in the House request public input on national data privacy standards. A Michigan man faces charges for his use of the Genesis cybercrime marketplace. Our guest is  Karl Sigler, Senior Security Research Manager from Trustwave SpiderLabs, explaining the domino effect of a cyberattack on the power grid. Meta sues an Insta Extortionist.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, Dave speaks with Karl Sigler, Senior Security Research Manager from Trustwave SpiderLabs, about the domino effect of a cyberattack on the power grid. You can dig into the details in their report. 

Selected Reading
Former NSA, Cyber Command chief Paul Nakasone says U.S. falling behind its enemies in cyberspace (CyberScoop)
Kaspersky Banned on Australian Government Systems (SecurityWeek)
Chinese Hackers Attacking Industrial Organizations With Sophisticated FatalRAT (Cyber Security News)
Bybit Hack Drains $1.5 Billion From Cryptocurrency Exchange (SecurityWeek)
Experts Slam Government After “Disastrous” Apple Encryption Move (Infosecurity Magazine)
Confluence Exploit Leads to LockBit Ransomware (The DFIR Report)
Fluent Bit 0-day Vulnerabilities Exposes Billions of Production Environments to Cyber Attacks (Cyber Security News)
Beware: PayPal "New Address" feature abused to send phishing emails (Bleeping Computer)
Top House E&amp;C Republicans query public for ideas on data privacy law (CyberScoop)
US Charges Genesis Market User (SecurityWeek)
Meta Sues Alleged Instagram Extortionist (404 Media) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 24 Feb 2025 21:10:00 -0000</pubDate>
      <itunes:title>Can the U.S. keep up in cyberspace?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2251</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Retired Gen. Paul Nakasone warns the U.S. is falling behind in cyberspace. Australia orders government entities to remove and ban Kaspersky products. FatalRAT targets industrial organizations in the APAC region. A major cryptocurrency exchange reports the theft of $1.5 billion in digital assets. Apple removes end-to-end encryption (E2EE) for iCloud in the UK. Researchers uncover a LockBit ransomware attack exploiting a Windows Confluence server. Researchers uncover zero-day vulnerabilities in a widely used cloud logging utility.A PayPal email scam is tricking users into calling scammers. Republican leaders in the House request public input on national data privacy standards. A Michigan man faces charges for his use of the Genesis cybercrime marketplace. Our guest is  Karl Sigler, Senior Security Research Manager from Trustwave SpiderLabs, explaining the domino effect of a cyberattack on the power grid. Meta sues an Insta Extortionist.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, Dave speaks with Karl Sigler, Senior Security Research Manager from Trustwave SpiderLabs, about the domino effect of a cyberattack on the power grid. You can dig into the details in their report. 

Selected Reading
Former NSA, Cyber Command chief Paul Nakasone says U.S. falling behind its enemies in cyberspace (CyberScoop)
Kaspersky Banned on Australian Government Systems (SecurityWeek)
Chinese Hackers Attacking Industrial Organizations With Sophisticated FatalRAT (Cyber Security News)
Bybit Hack Drains $1.5 Billion From Cryptocurrency Exchange (SecurityWeek)
Experts Slam Government After “Disastrous” Apple Encryption Move (Infosecurity Magazine)
Confluence Exploit Leads to LockBit Ransomware (The DFIR Report)
Fluent Bit 0-day Vulnerabilities Exposes Billions of Production Environments to Cyber Attacks (Cyber Security News)
Beware: PayPal "New Address" feature abused to send phishing emails (Bleeping Computer)
Top House E&amp;C Republicans query public for ideas on data privacy law (CyberScoop)
US Charges Genesis Market User (SecurityWeek)
Meta Sues Alleged Instagram Extortionist (404 Media) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Retired Gen. Paul Nakasone warns the U.S. is falling behind in cyberspace. Australia orders government entities to remove and ban Kaspersky products. FatalRAT targets industrial organizations in the APAC region. A major cryptocurrency exchange reports the theft of $1.5 billion in digital assets. Apple removes end-to-end encryption (E2EE) for iCloud in the UK. Researchers uncover a LockBit ransomware attack exploiting a Windows Confluence server. Researchers uncover zero-day vulnerabilities in a widely used cloud logging utility.A PayPal email scam is tricking users into calling scammers. Republican leaders in the House request public input on national data privacy standards. A Michigan man faces charges for his use of the Genesis cybercrime marketplace. Our guest is  Karl Sigler, Senior Security Research Manager from Trustwave SpiderLabs, explaining the domino effect of a cyberattack on the power grid. Meta sues an Insta Extortionist.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today, Dave speaks with <a href="https://www.linkedin.com/in/ksigler/">Karl Sigler</a>, Senior Security Research Manager from <a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog">Trustwave SpiderLabs</a>, about the domino effect of a cyberattack on the power grid. You can dig into the details in their <a href="https://www.trustwave.com/en-us/company/newsroom/news/trustwave-unveils-2025-cybersecurity-threat-report-for-energy-and-utilities-sector-highlights-surge-in-ransomware-attacks/">report</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://cyberscoop.com/former-nsa-cyber-command-chief-paul-nakasone-enemies-cyberspace/">Former NSA, Cyber Command chief Paul Nakasone says U.S. falling behind its enemies in cyberspace</a> (CyberScoop)</p><p><a href="https://www.securityweek.com/kaspersky-banned-on-australian-government-systems/">Kaspersky Banned on Australian Government Systems</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/hackers-attacking-industrial-organizations-with-fatalrat/">Chinese Hackers Attacking Industrial Organizations With Sophisticated FatalRAT</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/bybit-hack-drains-1-5-billion-from-cryptocurrency-exchange/">Bybit Hack Drains $1.5 Billion From Cryptocurrency Exchange</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/experts-government-disastrous/">Experts Slam Government After “Disastrous” Apple Encryption Move</a> (Infosecurity Magazine)</p><p><a href="https://thedfirreport.com/2025/02/24/confluence-exploit-leads-to-lockbit-ransomware/">Confluence Exploit Leads to LockBit Ransomware</a> (The DFIR Report)</p><p><a href="https://cybersecuritynews.com/fluent-bit-0-day-vulnerabilities-exposes-billions-of-production-environments/">Fluent Bit 0-day Vulnerabilities Exposes Billions of Production Environments to Cyber Attacks</a> (Cyber Security News)</p><p><a href="https://www.bleepingcomputer.com/news/security/beware-paypal-new-address-feature-abused-to-send-phishing-emails/">Beware: PayPal "New Address" feature abused to send phishing emails</a> (Bleeping Computer)</p><p><a href="https://cyberscoop.com/energy-commerce-request-for-information-data-privacy-standards/">Top House E&amp;C Republicans query public for ideas on data privacy law</a> (CyberScoop)</p><p><a href="https://www.securityweek.com/us-charges-genesis-market-user/">US Charges Genesis Market User</a> (SecurityWeek)</p><p><a href="https://www.404media.co/r/ae5f6b36?m=98b933c2-86c5-4538-943c-acd26db8c39a">Meta Sues Alleged Instagram Extortionist</a> (404 Media) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1774</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[694325b4-d378-11ef-84f5-8f9833acba21]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9155774378.mp3?updated=1740426398" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dwayne Price: Sharing information. [Project Management] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/56/notes</link>
      <description>Please enjoy this encore of Career Notes. 
Senior technical project manager Dwayne Price takes us on his career journey from databases to project management. Always fascinated with technology and one who appreciates the aspects of the business side of a computer implementations, Dwayne attended UMBC for both his undergraduate and graduate degrees in information systems management. A strong Unix administration background prepared him to understand the relationship between Unix administration and database security. He recommends those interested in cybersecurity check out the NICE Framework as it speaks to all the various different types of roles in cybersecurity, Dwayne prides himself on his communication skills and openness. We thank Dwayne for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 23 Feb 2025 08:00:00 -0000</pubDate>
      <itunes:title>Dwayne Price: Sharing information. [Project Management] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>56</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Career Notes. 
Senior technical project manager Dwayne Price takes us on his career journey from databases to project management. Always fascinated with technology and one who appreciates the aspects of the business side of a computer implementations, Dwayne attended UMBC for both his undergraduate and graduate degrees in information systems management. A strong Unix administration background prepared him to understand the relationship between Unix administration and database security. He recommends those interested in cybersecurity check out the NICE Framework as it speaks to all the various different types of roles in cybersecurity, Dwayne prides himself on his communication skills and openness. We thank Dwayne for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p><p>Senior technical project manager Dwayne Price takes us on his career journey from databases to project management. Always fascinated with technology and one who appreciates the aspects of the business side of a computer implementations, Dwayne attended UMBC for both his undergraduate and graduate degrees in information systems management. A strong Unix administration background prepared him to understand the relationship between Unix administration and database security. He recommends those interested in cybersecurity check out the NICE Framework as it speaks to all the various different types of roles in cybersecurity, Dwayne prides himself on his communication skills and openness. We thank Dwayne for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>475</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[33872496-efa4-11ef-b955-57983b16fa07]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1574873666.mp3?updated=1740067817" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From small-time scams to billion-dollar threats. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/366/notes</link>
      <description>This week, we are joined by Selena Larson from Proofpoint, and co-host of the "Only Malware in the Building" podcast, as she discusses the research on "Why Biasing Advanced Persistent Threats over Cybercrime is a Security Risk." The cybersecurity industry has historically prioritized Advanced Persistent Threats (APTs) from nation-state actors over cybercrime, but this distinction is outdated as cybercriminals now employ equally sophisticated tactics. 
Financially motivated threat actors, especially ransomware groups, have evolved to the point where they rival state-backed hackers in technical capability and impact, disrupting businesses, infrastructure, and individuals on a massive scale. To enhance security, defenders must shift focus from an APT-centric mindset to a broader approach that equally prioritizes combating cybercrime, which poses an immediate and tangible risk to global stability.

The research can be found here:
Why Biasing Advanced Persistent Threats over Cybercrime is a Security Risk

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Feb 2025 06:00:00 -0000</pubDate>
      <itunes:title>From small-time scams to billion-dollar threats. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>366</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, we are joined by Selena Larson from Proofpoint, and co-host of the "Only Malware in the Building" podcast, as she discusses the research on "Why Biasing Advanced Persistent Threats over Cybercrime is a Security Risk." The cybersecurity industry has historically prioritized Advanced Persistent Threats (APTs) from nation-state actors over cybercrime, but this distinction is outdated as cybercriminals now employ equally sophisticated tactics. 
Financially motivated threat actors, especially ransomware groups, have evolved to the point where they rival state-backed hackers in technical capability and impact, disrupting businesses, infrastructure, and individuals on a massive scale. To enhance security, defenders must shift focus from an APT-centric mindset to a broader approach that equally prioritizes combating cybercrime, which poses an immediate and tangible risk to global stability.

The research can be found here:
Why Biasing Advanced Persistent Threats over Cybercrime is a Security Risk

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/selenalarson/">Selena Larson</a> from Proofpoint, and co-host of the "Only Malware in the Building" podcast, as she discusses the research on "Why Biasing Advanced Persistent Threats over Cybercrime is a Security Risk." The cybersecurity industry has historically prioritized Advanced Persistent Threats (APTs) from nation-state actors over cybercrime, but this distinction is outdated as cybercriminals now employ equally sophisticated tactics. </p><p>Financially motivated threat actors, especially ransomware groups, have evolved to the point where they rival state-backed hackers in technical capability and impact, disrupting businesses, infrastructure, and individuals on a massive scale. To enhance security, defenders must shift focus from an APT-centric mindset to a broader approach that equally prioritizes combating cybercrime, which poses an immediate and tangible risk to global stability.</p><p><br></p><h3>The research can be found here:</h3><ul><li><a href="https://www.rusi.org/explore-our-research/publications/commentary/why-biasing-advanced-persistent-threats-over-cybercrime-security-risk">Why Biasing Advanced Persistent Threats over Cybercrime is a Security Risk</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1446</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d939c434-efa4-11ef-b665-33b3aeb75569]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7796511913.mp3?updated=1740068252" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The political shake-up at the FBI.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2250/notes</link>
      <description>The Senate confirms Kash Patel as FBI director. The SEC rebrands its Crypto Assets and Cyber Unit. Microsoft's quantum chip signals an urgent need for post-quantum security. Chat log leaks reveal the inner workings of BlackBasta. CISA advisories highlight Craft CMS and ICS devices. Researchers release proof-of-concepts for Ivanti Endpoint Manager vulnerabilities. Warby Parker gets a $1.5 million HIPAA fine. Our guest is Steve Schmidt, Amazon CSO, with a behind the scenes look at securing a major event. Researchers explore the massive, mysterious YouTube wormhole.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Steve Schmidt, Amazon CSO, talking about integrating physical and logical security measures. Learn more: "Securing a city-sized event: How Amazon integrates physical and logical security at re:Invent."

Selected Reading
Trump loyalist Kash Patel is confirmed as FBI director by the Senate despite deep Democratic doubts (AP)
SEC rebrands cryptocurrency unit to focus on emerging technologies (CyberScoop)
Microsoft’s Quantum Chip Breakthrough Accelerates Threat to Encryption (Infosecurity Magazine)
BlackBasta Ransomware Chatlogs Leaked Online (Infosecurity Magazine)
CISA Warns of Attacks Exploiting Craft CMS Vulnerability (SecurityWeek)
CISA Releases 7 ICS Advisories Detailing Vulnerabilities &amp; Exploits (Cyber Security News)
Ivanti endpoint manager can become endpoint ravager (The Register)
Feds Fine Eyeglass Retailer $1.5M for HIPAA Lapses in Hacks (GovInfo Security)
How a computer that 'drunk dials' videos is exposing YouTube's secrets (BBC)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 21 Feb 2025 21:10:00 -0000</pubDate>
      <itunes:title>The political shake-up at the FBI.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2250</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The Senate confirms Kash Patel as FBI director. The SEC rebrands its Crypto Assets and Cyber Unit. Microsoft's quantum chip signals an urgent need for post-quantum security. Chat log leaks reveal the inner workings of BlackBasta. CISA advisories highlight Craft CMS and ICS devices. Researchers release proof-of-concepts for Ivanti Endpoint Manager vulnerabilities. Warby Parker gets a $1.5 million HIPAA fine. Our guest is Steve Schmidt, Amazon CSO, with a behind the scenes look at securing a major event. Researchers explore the massive, mysterious YouTube wormhole.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Steve Schmidt, Amazon CSO, talking about integrating physical and logical security measures. Learn more: "Securing a city-sized event: How Amazon integrates physical and logical security at re:Invent."

Selected Reading
Trump loyalist Kash Patel is confirmed as FBI director by the Senate despite deep Democratic doubts (AP)
SEC rebrands cryptocurrency unit to focus on emerging technologies (CyberScoop)
Microsoft’s Quantum Chip Breakthrough Accelerates Threat to Encryption (Infosecurity Magazine)
BlackBasta Ransomware Chatlogs Leaked Online (Infosecurity Magazine)
CISA Warns of Attacks Exploiting Craft CMS Vulnerability (SecurityWeek)
CISA Releases 7 ICS Advisories Detailing Vulnerabilities &amp; Exploits (Cyber Security News)
Ivanti endpoint manager can become endpoint ravager (The Register)
Feds Fine Eyeglass Retailer $1.5M for HIPAA Lapses in Hacks (GovInfo Security)
How a computer that 'drunk dials' videos is exposing YouTube's secrets (BBC)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Senate confirms Kash Patel as FBI director. The SEC rebrands its Crypto Assets and Cyber Unit. Microsoft's quantum chip signals an urgent need for post-quantum security. Chat log leaks reveal the inner workings of BlackBasta. CISA advisories highlight Craft CMS and ICS devices. Researchers release proof-of-concepts for Ivanti Endpoint Manager vulnerabilities. Warby Parker gets a $1.5 million HIPAA fine. Our guest is Steve Schmidt, Amazon CSO, with a behind the scenes look at securing a major event. Researchers explore the massive, mysterious YouTube wormhole.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/stephenschmidt1/">Steve Schmidt</a>, <a href="https://aws.amazon.com/">Amazon</a> CSO, talking about integrating physical and logical security measures. Learn more: "<a href="https://aws.amazon.com/blogs/security/securing-a-city-sized-event-how-amazon-integrates-physical-and-logical-security-at-reinvent/">Securing a city-sized event: How Amazon integrates physical and logical security at re:Invent</a>."</p><p><br></p><h2>Selected Reading</h2><p><a href="https://apnews.com/article/trump-patel-fbi-justice-department-518329110ea230e2989095bfcbe34c59">Trump loyalist Kash Patel is confirmed as FBI director by the Senate despite deep Democratic doubts</a> (AP)</p><p><a href="https://cyberscoop.com/sec-cyber-unit-cryptocurrency-enforcement-emerging-technologies/">SEC rebrands cryptocurrency unit to focus on emerging technologies</a> (CyberScoop)</p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-quantum-chip-encryption/">Microsoft’s Quantum Chip Breakthrough Accelerates Threat to Encryption</a> (Infosecurity Magazine)</p><p><a href="https://www.infosecurity-magazine.com/news/blackbasta-ransomware-chatlogs/">BlackBasta Ransomware Chatlogs Leaked Online</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/cisa-warns-of-attacks-exploiting-craft-cms-vulnerability/">CISA Warns of Attacks Exploiting Craft CMS Vulnerability</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/cisa-releases-7-ics-advisories/">CISA Releases 7 ICS Advisories Detailing Vulnerabilities &amp; Exploits</a> (Cyber Security News)</p><p><a href="https://www.theregister.com/2025/02/21/ivanti_traversal_flaw_poc_exploit/">Ivanti endpoint manager can become endpoint ravager</a> (The Register)</p><p><a href="https://www.govinfosecurity.com/feds-fine-eyeglass-retailer-15m-for-hipaa-lapses-in-hacks-a-27571">Feds Fine Eyeglass Retailer $1.5M for HIPAA Lapses in Hacks</a> (GovInfo Security)</p><p><a href="https://www.bbc.com/future/article/20250213-youtube-at-20-a-computer-that-drunk-dials-online-videos-reveals-statistics-that-google-doesnt-want-you-to-know">How a computer that 'drunk dials' videos is exposing YouTube's secrets</a> (BBC)</p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1654</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[69077a14-d378-11ef-84f5-c77c328e697d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4092268148.mp3?updated=1740413691" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No rest for the patched.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2249/notes</link>
      <description>The CISA and FBI warn that Ghost ransomware has breached organizations in over 70 countries. President Trump announces his pick to lead the DOJ’s National Security Division. A new ransomware strain targets European healthcare organizations. Researchers uncover four critical vulnerabilities in Ivanti Endpoint Manager. Microsoft has patched a critical improper access control vulnerability in Power Pages. The NSA updates its Ghidra reverse engineering tool. A former U.S. Army soldier admits to leaking private call records. Our guest is Stephen Hilt, senior threat researcher at Trend Micro, sharing the current state of the English cyber underground market. The pentesters’ breach was simulated — their arrest was not. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Stephen Hilt, senior threat researcher at Trend Micro, sharing the current state of the English cyber underground market. Learn more in the report. 

Selected Reading
CISA and FBI: Ghost ransomware breached orgs in 70 countries (Bleeping Computer)
Trump to nominate White House insider from first term to lead DOJ’s National Security Division (The Record)
New NailaoLocker ransomware used against EU healthcare orgs (Bleeping Computer)
PoC Exploit Published for Critical Ivanti EPM Vulnerabilities (SecurityWeek)
Microsoft Patches Exploited Power Pages Vulnerability (SecurityWeek)
NSA Added New Features to Supercharge Ghidra 11.3 (Cyber Security News)
Army soldier linked to Snowflake extortion to plead guilty (The Register)
Katie Arrington Returns to Pentagon as DoD CISO (GovInfo Security)
Penetration Testers Arrested by Police During Authorized Physical Penetration Testing (Cyber Security News)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 20 Feb 2025 21:10:00 -0000</pubDate>
      <itunes:title>No rest for the patched.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2249</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The CISA and FBI warn that Ghost ransomware has breached organizations in over 70 countries. President Trump announces his pick to lead the DOJ’s National Security Division. A new ransomware strain targets European healthcare organizations. Researchers uncover four critical vulnerabilities in Ivanti Endpoint Manager. Microsoft has patched a critical improper access control vulnerability in Power Pages. The NSA updates its Ghidra reverse engineering tool. A former U.S. Army soldier admits to leaking private call records. Our guest is Stephen Hilt, senior threat researcher at Trend Micro, sharing the current state of the English cyber underground market. The pentesters’ breach was simulated — their arrest was not. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Stephen Hilt, senior threat researcher at Trend Micro, sharing the current state of the English cyber underground market. Learn more in the report. 

Selected Reading
CISA and FBI: Ghost ransomware breached orgs in 70 countries (Bleeping Computer)
Trump to nominate White House insider from first term to lead DOJ’s National Security Division (The Record)
New NailaoLocker ransomware used against EU healthcare orgs (Bleeping Computer)
PoC Exploit Published for Critical Ivanti EPM Vulnerabilities (SecurityWeek)
Microsoft Patches Exploited Power Pages Vulnerability (SecurityWeek)
NSA Added New Features to Supercharge Ghidra 11.3 (Cyber Security News)
Army soldier linked to Snowflake extortion to plead guilty (The Register)
Katie Arrington Returns to Pentagon as DoD CISO (GovInfo Security)
Penetration Testers Arrested by Police During Authorized Physical Penetration Testing (Cyber Security News)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The CISA and FBI warn that Ghost ransomware has breached organizations in over 70 countries. President Trump announces his pick to lead the DOJ’s National Security Division. A new ransomware strain targets European healthcare organizations. Researchers uncover four critical vulnerabilities in Ivanti Endpoint Manager. Microsoft has patched a critical improper access control vulnerability in Power Pages. The NSA updates its Ghidra reverse engineering tool. A former U.S. Army soldier admits to leaking private call records. Our guest is Stephen Hilt, senior threat researcher at Trend Micro, sharing the current state of the English cyber underground market. The pentesters’ breach was simulated — their arrest was not. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/stephen-hilt-889aa31b/">Stephen Hilt</a>, senior threat researcher at <a href="https://www.trendmicro.com/en_us/business.html">Trend Micro</a>, sharing the current state of the English cyber underground market. Learn more in the <a href="https://www.trendmicro.com/vinfo/ph/security/news/cybercrime-and-digital-threats/bridging-divides-transcending-borders-the-current-state-of-the-english-underground">report</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/cisa-and-fbi-ghost-ransomware-breached-orgs-in-70-countries/">CISA and FBI: Ghost ransomware breached orgs in 70 countries</a> (Bleeping Computer)</p><p><a href="https://therecord.media/john-eisenberg-expected-trump-nominee-doj-nsd">Trump to nominate White House insider from first term to lead DOJ’s National Security Division</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-nailaolocker-ransomware-used-against-eu-healthcare-orgs/">New NailaoLocker ransomware used against EU healthcare orgs</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/poc-exploit-published-for-critical-ivanti-epm-vulnerabilities/">PoC Exploit Published for Critical Ivanti EPM Vulnerabilities</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/microsoft-patches-exploited-power-pages-vulnerability/">Microsoft Patches Exploited Power Pages Vulnerability</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/ghidra-11-3-new-features/">NSA Added New Features to Supercharge Ghidra 11.3</a> (Cyber Security News)</p><p><a href="https://www.theregister.com/2025/02/20/us_army_snowflake_theft/">Army soldier linked to Snowflake extortion to plead guilty</a> (The Register)</p><p><a href="https://www.govinfosecurity.com/katie-arrington-returns-to-pentagon-as-dod-ciso-a-27558">Katie Arrington Returns to Pentagon as DoD CISO</a> (GovInfo Security)</p><p><a href="https://cybersecuritynews.com/penetration-testers-arrested-by-police-during-authorized-physical-penetration-testing/">Penetration Testers Arrested by Police During Authorized Physical Penetration Testing</a> (Cyber Security News)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1674</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[68c941ea-d378-11ef-84f5-efb73ee6a51b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4530282147.mp3?updated=1740078902" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pennies for access.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2248/notes</link>
      <description>Credential theft puts sensitive corporate and military networks at risk. A federal judge refuses to block DOGE from accessing sensitive federal data. New York-based Insight Partners confirms a cyber-attack. BlackLock ransomware group is on the rise. OpenSSH patches a pair of vulnerabilities. Russian threat actors are exploiting Signal’s “Linked Devices” feature. Over 12,000 GFI KerioControl firewalls remain exposed to a critical remote code execution (RCE) vulnerability.CISA issued two ICS security advisories. Federal contractors pay $11 million in cybersecurity noncompliance fines. In our CertByte segment, Chris Hare is joined by Steven Burnley to break down a question targeting the ISC2® SSCP - Systems Security Certified Practitioner exam.Sweeping cybercrime reforms are unveiled by…Russia?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from N2K’s suite of industry-leading certification resources, for the past 25 years, N2K's practice tests have helped more than half a million IT and cyber security professionals reach certification success. Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. 
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.
Additional source: https://www.isc2.org/certifications/sscp   

Selected Reading
Hundreds of US Military and Defense Credentials Compromised (Infosecurity Magazine)
DOGE Team Wins Legal Battle, Retains Access to Federal Data (GovInfo Security)
Musk Ally Demands Admin Access to System That Lets Government Text the Public (404 Media)
Cyber Investor Insight Partners Suffers Security Breach (Infosecurity Magazine)
BlackLock On Track to Be 2025’s Most Prolific Ransomware Group (Infosecurity Magazine)
Qualys reports two flaws in OpenSSH, one critical DDoS (Beyond Machines)
Russian phishing campaigns exploit Signal's device-linking feature (Bleeping Computer)
Over 12,000 KerioControl firewalls exposed to exploited RCE flaw (Bleeping Computer)
CISA Releases Two New ICS Advisories Exploits Following Vulnerabilities (Cyber Security News)
Managed healthcare defense contractor to pay $11 million over alleged cyber failings (The Record)
Russian Government Proposes Stricter Penalties to Tackle Cybercrime (GB Hackers) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 19 Feb 2025 21:20:00 -0000</pubDate>
      <itunes:title>Pennies for access.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2248</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Credential theft puts sensitive corporate and military networks at risk. A federal judge refuses to block DOGE from accessing sensitive federal data. New York-based Insight Partners confirms a cyber-attack. BlackLock ransomware group is on the rise. OpenSSH patches a pair of vulnerabilities. Russian threat actors are exploiting Signal’s “Linked Devices” feature. Over 12,000 GFI KerioControl firewalls remain exposed to a critical remote code execution (RCE) vulnerability.CISA issued two ICS security advisories. Federal contractors pay $11 million in cybersecurity noncompliance fines. In our CertByte segment, Chris Hare is joined by Steven Burnley to break down a question targeting the ISC2® SSCP - Systems Security Certified Practitioner exam.Sweeping cybercrime reforms are unveiled by…Russia?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from N2K’s suite of industry-leading certification resources, for the past 25 years, N2K's practice tests have helped more than half a million IT and cyber security professionals reach certification success. Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. 
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.
Additional source: https://www.isc2.org/certifications/sscp   

Selected Reading
Hundreds of US Military and Defense Credentials Compromised (Infosecurity Magazine)
DOGE Team Wins Legal Battle, Retains Access to Federal Data (GovInfo Security)
Musk Ally Demands Admin Access to System That Lets Government Text the Public (404 Media)
Cyber Investor Insight Partners Suffers Security Breach (Infosecurity Magazine)
BlackLock On Track to Be 2025’s Most Prolific Ransomware Group (Infosecurity Magazine)
Qualys reports two flaws in OpenSSH, one critical DDoS (Beyond Machines)
Russian phishing campaigns exploit Signal's device-linking feature (Bleeping Computer)
Over 12,000 KerioControl firewalls exposed to exploited RCE flaw (Bleeping Computer)
CISA Releases Two New ICS Advisories Exploits Following Vulnerabilities (Cyber Security News)
Managed healthcare defense contractor to pay $11 million over alleged cyber failings (The Record)
Russian Government Proposes Stricter Penalties to Tackle Cybercrime (GB Hackers) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Credential theft puts sensitive corporate and military networks at risk. A federal judge refuses to block DOGE from accessing sensitive federal data. New York-based Insight Partners confirms a cyber-attack. BlackLock ransomware group is on the rise. OpenSSH patches a pair of vulnerabilities. Russian threat actors are exploiting Signal’s “Linked Devices” feature. Over 12,000 GFI KerioControl firewalls remain exposed to a critical remote code execution (RCE) vulnerability.CISA issued two ICS security advisories. Federal contractors pay $11 million in cybersecurity noncompliance fines. In our CertByte segment, Chris Hare is joined by Steven Burnley to break down a question targeting the ISC2® SSCP - Systems Security Certified Practitioner exam.Sweeping cybercrime reforms are unveiled by…Russia?</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CertByte Segment</h2><p>Welcome to CertByte! On this bi-weekly segment hosted by <a href="https://www.linkedin.com/in/chrisharepmp/">Chris Hare</a>, a content developer and project management specialist at <a href="https://www.n2k.com/?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1739565471181.1739820596293.307&amp;__hssc=223811332.2.1739820596293&amp;__hsfp=867848667">N2K</a>, we share practice questions from N2K’s suite of industry-leading certification resources, for the past 25 years, N2K's practice tests have helped more than half a million IT and cyber security professionals reach certification success. Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at <a href="http://n2k.com/certify">n2k.com/certify</a>. </p><p>Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.</p><p>Additional source: <a href="https://www.isc2.org/certifications/sscp">https://www.isc2.org/certifications/sscp</a>   </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.infosecurity-magazine.com/news/us-military-defense-credentials/">Hundreds of US Military and Defense Credentials Compromised</a> (Infosecurity Magazine)</p><p><a href="https://www.govinfosecurity.com/doge-team-wins-legal-battle-retains-access-to-federal-data-a-27549">DOGE Team Wins Legal Battle, Retains Access to Federal Data</a> (GovInfo Security)</p><p><a href="https://www.404media.co/musk-ally-demands-admin-access-to-system-that-lets-government-text-the-public/">Musk Ally Demands Admin Access to System That Lets Government Text the Public</a> (404 Media)</p><p><a href="https://www.infosecurity-magazine.com/news/insight-partners-security-breach/">Cyber Investor Insight Partners Suffers Security Breach</a> (Infosecurity Magazine)</p><p><a href="https://www.infosecurity-magazine.com/news/blacklock-2025s-most-prolific/">BlackLock On Track to Be 2025’s Most Prolific Ransomware Group</a> (Infosecurity Magazine)</p><p><a href="https://beyondmachines.net/event_details/qualys-reports-two-flaws-in-openssh-one-critical-ddos-m-c-h-k-q/gD2P6Ple2L">Qualys reports two flaws in OpenSSH, one critical DDoS</a> (Beyond Machines)</p><p><a href="https://www.bleepingcomputer.com/news/security/russian-phishing-campaigns-exploit-signals-device-linking-feature/">Russian phishing campaigns exploit Signal's device-linking feature</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/over-12-000-keriocontrol-firewalls-exposed-to-exploited-rce-flaw/">Over 12,000 KerioControl firewalls exposed to exploited RCE flaw</a> (Bleeping Computer)</p><p><a href="https://cybersecuritynews.com/cisa-releases-two-new-ics-advisories/">CISA Releases Two New ICS Advisories Exploits Following Vulnerabilities</a> (Cyber Security News)</p><p><a href="https://therecord.media/managed-health-tricare-false-claims">Managed healthcare defense contractor to pay $11 million over alleged cyber failings</a> (The Record)</p><p><a href="https://gbhackers.com/russian-government-proposes-stricter-penalties/">Russian Government Proposes Stricter Penalties to Tackle Cybercrime</a> (GB Hackers) </p><p><br></p><h2>Share your feedback.</h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show.</p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1760</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[abd9b112-eefe-11ef-b216-4f3630179196]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2284032712.mp3?updated=1739998653" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>PAN-ic mode: The race to secure PAN-OS.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2247/notes</link>
      <description>Palo Alto Networks confirms a recently patched firewall vulnerability is being actively exploited. CISA warns of an actively exploited iOS vulnerability. Juniper Networks has issued a critical security advisory for an API authentication bypass vulnerability. The acting commissioner of the Social Security Administration (SSA) resigns after Elon Musk’s team sought access to sensitive personal data of millions of Americans. The EagerBee malware framework is actively targeting government agencies and ISPs across the Middle East. Proofpoint researchers document a new macOS infostealer. A new phishing kit uses timesheet notification emails to steal credentials and two-factor authentication codes. JPMorgan Chase will begin blocking Zelle payments to social media contacts to combat online scams. Our guest is Tim Starks from CyberScoop discussing his interview with former National Cyber Director Harry Coker. Transferring your digital legacy.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Tim Starks from CyberScoop discussing his interview with former National Cyber Director Harry Coker. You can read more about Tim’s interview “National Cyber Director Harry Coker looks back (and ahead) on the Cyber Director office” and companion piece “Trump picks Sean Cairncross for national cyber director” on CyberScoop. 

Selected Reading
Palo Alto Networks Confirms Exploitation of Firewall Vulnerability (SecurityWeek)
CISA Warns of Apple iOS Vulnerability Exploited in Wild (Cyber Security News)
Juniper Warns of Critical Authentication Bypass Vulnerability Affecting Multiple Products (Cyber Security News)
Top Social Security Official Leaves After Musk Team Seeks Data Access (New York Times)
EagerBee Malware Attacking Government Entities &amp; ISPs To Deploy Backdoor (Cyber Security News)
Proofpoint Uncovers FrigidStealer, A New MacOS Infostealer (Infosecurity Magazine)
Microsoft Warns of Improved XCSSET macOS Malware (SecurityWeek)
Fake Timesheet Report Emails Linked to Tycoon 2FA Phishing Kit (GB Hackers)
Chase will soon block Zelle payments to sellers on social media (Bleeping Computer)
Digital Estate Planning: How to Prepare Your Social Media Accounts (New York Times)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Feb 2025 21:10:00 -0000</pubDate>
      <itunes:title>PAN-ic mode: The race to secure PAN-OS.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2247</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Palo Alto Networks confirms a recently patched firewall vulnerability is being actively exploited. CISA warns of an actively exploited iOS vulnerability. Juniper Networks has issued a critical security advisory for an API authentication bypass vulnerability. The acting commissioner of the Social Security Administration (SSA) resigns after Elon Musk’s team sought access to sensitive personal data of millions of Americans. The EagerBee malware framework is actively targeting government agencies and ISPs across the Middle East. Proofpoint researchers document a new macOS infostealer. A new phishing kit uses timesheet notification emails to steal credentials and two-factor authentication codes. JPMorgan Chase will begin blocking Zelle payments to social media contacts to combat online scams. Our guest is Tim Starks from CyberScoop discussing his interview with former National Cyber Director Harry Coker. Transferring your digital legacy.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Tim Starks from CyberScoop discussing his interview with former National Cyber Director Harry Coker. You can read more about Tim’s interview “National Cyber Director Harry Coker looks back (and ahead) on the Cyber Director office” and companion piece “Trump picks Sean Cairncross for national cyber director” on CyberScoop. 

Selected Reading
Palo Alto Networks Confirms Exploitation of Firewall Vulnerability (SecurityWeek)
CISA Warns of Apple iOS Vulnerability Exploited in Wild (Cyber Security News)
Juniper Warns of Critical Authentication Bypass Vulnerability Affecting Multiple Products (Cyber Security News)
Top Social Security Official Leaves After Musk Team Seeks Data Access (New York Times)
EagerBee Malware Attacking Government Entities &amp; ISPs To Deploy Backdoor (Cyber Security News)
Proofpoint Uncovers FrigidStealer, A New MacOS Infostealer (Infosecurity Magazine)
Microsoft Warns of Improved XCSSET macOS Malware (SecurityWeek)
Fake Timesheet Report Emails Linked to Tycoon 2FA Phishing Kit (GB Hackers)
Chase will soon block Zelle payments to sellers on social media (Bleeping Computer)
Digital Estate Planning: How to Prepare Your Social Media Accounts (New York Times)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Palo Alto Networks confirms a recently patched firewall vulnerability is being actively exploited. CISA warns of an actively exploited iOS vulnerability. Juniper Networks has issued a critical security advisory for an API authentication bypass vulnerability. The acting commissioner of the Social Security Administration (SSA) resigns after Elon Musk’s team sought access to sensitive personal data of millions of Americans. The EagerBee malware framework is actively targeting government agencies and ISPs across the Middle East. Proofpoint researchers document a new macOS infostealer. A new phishing kit uses timesheet notification emails to steal credentials and two-factor authentication codes. JPMorgan Chase will begin blocking Zelle payments to social media contacts to combat online scams. Our guest is Tim Starks from CyberScoop discussing his interview with former National Cyber Director Harry Coker. Transferring your digital legacy.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/tstarks/">Tim Starks</a> from <a href="https://cyberscoop.com/">CyberScoop</a> discussing his interview with former National Cyber Director Harry Coker. You can read more about Tim’s interview “<a href="https://cyberscoop.com/national-cyber-director-harry-coker-looks-back-and-ahead-on-the-cyber-director-office/">National Cyber Director Harry Coker looks back (and ahead) on the Cyber Director office</a>” and companion piece “<a href="https://cyberscoop.com/sean-cairncross-national-cyber-director-nomination-donald-trump/">Trump picks Sean Cairncross for national cyber director</a>” on CyberScoop. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/palo-alto-networks-confirms-exploitation-of-firewall-vulnerability/">Palo Alto Networks Confirms Exploitation of Firewall Vulnerability</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/cisa-apple-ios-vulnerability-exploited/">CISA Warns of Apple iOS Vulnerability Exploited in Wild</a> (Cyber Security News)</p><p><a href="https://cybersecuritynews.com/juniper-warns-of-critical-authentication-bypass-vulnerability/">Juniper Warns of Critical Authentication Bypass Vulnerability Affecting Multiple Products</a> (Cyber Security News)</p><p><a href="https://www.nytimes.com/2025/02/17/us/politics/social-security-musk-team-access.html">Top Social Security Official Leaves After Musk Team Seeks Data Access</a> (New York Times)</p><p><a href="https://cybersecuritynews.com/eagerbee-malware-attacking-government-entities/">EagerBee Malware Attacking Government Entities &amp; ISPs To Deploy Backdoor</a> (Cyber Security News)</p><p><a href="https://www.infosecurity-magazine.com/news/proofpoint-frigidstealer-new-mac/">Proofpoint Uncovers FrigidStealer, A New MacOS Infostealer</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/microsoft-warns-of-improvements-to-xcsset-macos-malware/">Microsoft Warns of Improved XCSSET macOS Malware</a> (SecurityWeek)</p><p><a href="https://gbhackers.com/fake-timesheet-report-emails/">Fake Timesheet Report Emails Linked to Tycoon 2FA Phishing Kit</a> (GB Hackers)</p><p><a href="https://www.bleepingcomputer.com/news/security/chase-will-soon-block-zelle-payments-to-sellers-on-social-media/">Chase will soon block Zelle payments to sellers on social media</a> (Bleeping Computer)</p><p><a href="https://www.nytimes.com/2025/02/12/technology/personaltech/social-media-accounts-death.html">Digital Estate Planning: How to Prepare Your Social Media Accounts</a> (New York Times)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1763</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[684711de-d378-11ef-84f5-df4b7f4258bd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5332237875.mp3?updated=1739899318" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>LIVE! From Philly [Threat Vector]</title>
      <link>https://thecyberwire.com/podcasts/threat-vector/902/notes</link>
      <description>While we are taking a publishing break to observe Washington's Birthday here in the United States, enjoy this primer on how to create a podcast from our partners at Palo Alto Networks direct from the CyberMarketingCon 2024.

Podcasts have become vital tools for sharing knowledge and insights, particularly in technical fields like cybersecurity. "Threat Vector," led by David Moulton, serves as an essential guide through the complex landscape of cyber threats, offering expert interviews and in-depth analysis.

In this session, David will discuss the process behind creating "Threat Vector," highlighting the challenges and rewards of developing a podcast that resonates with industry experts. Attendees will learn about the foundational elements of podcasting, from initial concept development to content creation and audience engagement.

David's approach integrates his extensive background in storytelling, design, and strategic marketing, enabling him to tackle intricate cybersecurity topics and make them accessible to a broad audience. This session will dive into how to present intricate cybersecurity topics in an accessible and engaging manner and explore various techniques for producing compelling content and effective strategies for promoting a podcast to a wider audience.

Join David and guest host David J. Ebner of Content Workshop for an informative discussion on using podcasts as a medium for education and influence in the cybersecurity field. This session is ideal for anyone interested in starting a podcast or enhancing their approach to cybersecurity communication.

Join the conversation on our social media channels:


Website: http://www.paloaltonetworks.com 


Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠



Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠



LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/palo-alto-networks/



YouTube: ⁠⁠⁠⁠@paloaltonetworks



Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠



About Threat Vector
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.

Palo Alto Networks
Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 17 Feb 2025 07:00:00 -0000</pubDate>
      <itunes:title>LIVE! From Philly [Threat Vector]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>902</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/515a17ee-eaea-11ef-8ed5-57fc0be6fe7e/image/d1d87f114f5761a60cfbeb7c48197b0a.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Direct from CyberMarketingCon 2024: From Concept to Mic: Crafting a Hit Podcast with Impact</itunes:subtitle>
      <itunes:summary>While we are taking a publishing break to observe Washington's Birthday here in the United States, enjoy this primer on how to create a podcast from our partners at Palo Alto Networks direct from the CyberMarketingCon 2024.

Podcasts have become vital tools for sharing knowledge and insights, particularly in technical fields like cybersecurity. "Threat Vector," led by David Moulton, serves as an essential guide through the complex landscape of cyber threats, offering expert interviews and in-depth analysis.

In this session, David will discuss the process behind creating "Threat Vector," highlighting the challenges and rewards of developing a podcast that resonates with industry experts. Attendees will learn about the foundational elements of podcasting, from initial concept development to content creation and audience engagement.

David's approach integrates his extensive background in storytelling, design, and strategic marketing, enabling him to tackle intricate cybersecurity topics and make them accessible to a broad audience. This session will dive into how to present intricate cybersecurity topics in an accessible and engaging manner and explore various techniques for producing compelling content and effective strategies for promoting a podcast to a wider audience.

Join David and guest host David J. Ebner of Content Workshop for an informative discussion on using podcasts as a medium for education and influence in the cybersecurity field. This session is ideal for anyone interested in starting a podcast or enhancing their approach to cybersecurity communication.

Join the conversation on our social media channels:


Website: http://www.paloaltonetworks.com 


Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠



Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠



LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/palo-alto-networks/



YouTube: ⁠⁠⁠⁠@paloaltonetworks



Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠



About Threat Vector
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.

Palo Alto Networks
Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong><em>While we are taking a publishing break to observe Washington's Birthday here in the United States, enjoy this primer on how to create a podcast from our partners at Palo Alto Networks direct from the CyberMarketingCon 2024.</em></strong></p><p><br></p><p>Podcasts have become vital tools for sharing knowledge and insights, particularly in technical fields like cybersecurity. "Threat Vector," led by <a href="David%20Moulton">David Moulton</a>, serves as an essential guide through the complex landscape of cyber threats, offering expert interviews and in-depth analysis.</p><p><br></p><p>In this session, David will discuss the process behind creating "Threat Vector," highlighting the challenges and rewards of developing a podcast that resonates with industry experts. Attendees will learn about the foundational elements of podcasting, from initial concept development to content creation and audience engagement.</p><p><br></p><p>David's approach integrates his extensive background in storytelling, design, and strategic marketing, enabling him to tackle intricate cybersecurity topics and make them accessible to a broad audience. This session will dive into how to present intricate cybersecurity topics in an accessible and engaging manner and explore various techniques for producing compelling content and effective strategies for promoting a podcast to a wider audience.</p><p><br></p><p>Join David and guest host <a href="https://www.linkedin.com/in/davidjebner/">David J. Ebner</a> of <a href="https://contentworkshop.com/">Content Workshop</a> for an informative discussion on using podcasts as a medium for education and influence in the cybersecurity field. This session is ideal for anyone interested in starting a podcast or enhancing their approach to cybersecurity communication.</p><h3><br></h3><h3>Join the conversation on our social media channels:</h3><ul>
<li>
<strong>Website</strong>: <a href="http://www.paloaltonetworks.com/">http://www.paloaltonetworks.com</a> </li>
<li>
<strong>Threat Research</strong>: ⁠⁠⁠⁠<a href="https://unit42.paloaltonetworks.com/%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0">https://unit42.paloaltonetworks.com/⁠⁠⁠⁠</a>
</li>
<li>
<strong>Facebook</strong>: ⁠⁠⁠⁠<a href="https://www.facebook.com/LifeatPaloAltoNetworks/%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0">https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠</a>
</li>
<li>
<strong>LinkedIn</strong>: ⁠⁠⁠⁠<a href="https://www.linkedin.com/company/palo-alto-networks/">https://www.linkedin.com/company/palo-alto-networks/</a>
</li>
<li>
<strong>YouTube</strong>: ⁠⁠⁠⁠<a href="https://www.youtube.com/@paloaltonetworks">@paloaltonetworks</a>
</li>
<li>
<strong>Twitter</strong>: ⁠⁠⁠⁠<a href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0">https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠</a>
</li>
</ul><h3><br></h3><h3><strong>About Threat Vector</strong></h3><p>Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.</p><p><br></p><p>The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.</p><p><br></p><p>Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.</p><h3><br></h3><h3><strong>Palo Alto Networks</strong></h3><p>Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.<a href="http://paloaltonetworks.com/"> ⁠http://paloaltonetworks.com⁠</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1477</itunes:duration>
      <guid isPermaLink="false"><![CDATA[515a17ee-eaea-11ef-8ed5-57fc0be6fe7e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7165668666.mp3?updated=1738333690" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Maria Thompson-Saeb: Be flexible and make it happen. [Program Management] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/55/notes</link>
      <description>Please enjoy this encore of Career Notes. 
Senior Program Manager for Governance, Risk and Compliance at Illumio, Maria Thompson-Saeb shares experiences that led to her career in cybersecurity. Interested in computers and not a fan of math, Maria opted for information systems management rather than computer science. She started her career as a government contractor. Once in the private sector, Maria moved into the Unix and Linux environments where she says "something that would totally change everything." She gained an interest in security and took it upon herself to train up and move into that realm. Maria notes it was not without roadblocks, but that being flexible helped her address those challenges and make her career in security happen. We thank Maria for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 16 Feb 2025 08:00:00 -0000</pubDate>
      <itunes:title>Maria Thompson-Saeb: Be flexible and make it happen. [Program Management] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>55</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/89d14050-eb05-11ef-8a52-6b977eeec7d5/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Career Notes. 
Senior Program Manager for Governance, Risk and Compliance at Illumio, Maria Thompson-Saeb shares experiences that led to her career in cybersecurity. Interested in computers and not a fan of math, Maria opted for information systems management rather than computer science. She started her career as a government contractor. Once in the private sector, Maria moved into the Unix and Linux environments where she says "something that would totally change everything." She gained an interest in security and took it upon herself to train up and move into that realm. Maria notes it was not without roadblocks, but that being flexible helped her address those challenges and make her career in security happen. We thank Maria for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p><p>Senior Program Manager for Governance, Risk and Compliance at Illumio, Maria Thompson-Saeb shares experiences that led to her career in cybersecurity. Interested in computers and not a fan of math, Maria opted for information systems management rather than computer science. She started her career as a government contractor. Once in the private sector, Maria moved into the Unix and Linux environments where she says "something that would totally change everything." She gained an interest in security and took it upon herself to train up and move into that realm. Maria notes it was not without roadblocks, but that being flexible helped her address those challenges and make her career in security happen. We thank Maria for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>566</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[89d14050-eb05-11ef-8a52-6b977eeec7d5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8492784859.mp3?updated=1739559750" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bot or not? The fake CAPTCHA trick spreading Lumma malware. [Research Saturday}</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/365/notes</link>
      <description>Nati Tal, Head of Guardio Labs, discusses their work on "“DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising." Guardio has uncovered a large-scale malvertising campaign dubbed “DeceptionAds,” which tricks users into running a malicious PowerShell command under the guise of proving they’re human. This fake CAPTCHA scheme delivers Lumma info-stealer malware while bypassing security measures like Google’s Safe Browsing. 
Even after disclosure and takedown efforts, the campaign resurfaced—raising concerns about the effectiveness of existing defenses against ad-driven cyber threats.
The research can be found here:
“DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Feb 2025 08:00:00 -0000</pubDate>
      <itunes:title>Bot or not? The fake CAPTCHA trick spreading Lumma malware. [Research Saturday}</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>365</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c5c81e70-eafc-11ef-be02-a73f089ecb6f/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Nati Tal, Head of Guardio Labs, discusses their work on "“DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising." Guardio has uncovered a large-scale malvertising campaign dubbed “DeceptionAds,” which tricks users into running a malicious PowerShell command under the guise of proving they’re human. This fake CAPTCHA scheme delivers Lumma info-stealer malware while bypassing security measures like Google’s Safe Browsing. 
Even after disclosure and takedown efforts, the campaign resurfaced—raising concerns about the effectiveness of existing defenses against ad-driven cyber threats.
The research can be found here:
“DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/natital/">Nati Tal</a>, Head of <a href="https://www.linkedin.com/company/guardiosec/">Guardio Labs</a>, discusses their work on "“DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising." Guardio has uncovered a large-scale malvertising campaign dubbed “DeceptionAds,” which tricks users into running a malicious PowerShell command under the guise of proving they’re human. This fake CAPTCHA scheme delivers Lumma info-stealer malware while bypassing security measures like Google’s Safe Browsing. </p><p>Even after disclosure and takedown efforts, the campaign resurfaced—raising concerns about the effectiveness of existing defenses against ad-driven cyber threats.</p><h3>The research can be found here:</h3><ul><li><a href="https://labs.guard.io/deceptionads-fake-captcha-driving-infostealer-infections-and-a-glimpse-to-the-dark-side-of-0c516f4dc0b6">“DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1928</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c5c81e70-eafc-11ef-be02-a73f089ecb6f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8829183541.mp3?updated=1739568964" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI’s blind spots need human eyes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2246/notes</link>
      <description>Nakasone addresses AI at the Munich Cyber Security Conference. Court documents reveal the degree to which DOGE actually has access. Dutch police dismantle a bulletproof hosting operation. German officials investigate Apple’s App Tracking. Hackers exploited security flaws in BeyondTrust. CISA issues 20 new ICS advisories. The new Astoroth phishing kit bypasses 2FA. Hackers waste no time exploiting a SonicWall proof-of-concept vulnerability. Our guest today is Lawrence Pingree, VP of Technical Marketing at Dispersive, joining us to discuss why preemptive defense is essential in the AI arms race. Have I Been Pwned ponders whether resellers are worth the trouble. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest today is Lawrence Pingree, VP of Technical Marketing at Dispersive, joining us to discuss why preemptive defense is essential in the AI arms race. You can read more in "How Cybercriminals Are Using AI: Exploring the New Threat Landscape."

Selected Reading
Putting the human back into AI is key, former NSA Director Nakasone says (The Record)
Court Documents Shed New Light on DOGE Access and Activity at Treasury Department (Zero Day)
Musk's DOGE team: Judges to consider barring it from US government systems (Reuters)
Anyone Can Push Updates to the DOGE.gov Website (404 Media)
Dutch Police seizes 127 XHost servers, dismantles bulletproof hoster (Bleeping Computer)
Apple app tracking rules more strict for others – watchdog (The Register)
PostgreSQL flaw exploited as zero-day in BeyondTrust breach (Bleeping Computer)
CISA Releases 20 ICS Advisories Detailing Vulnerabilities &amp; Exploits (Cyber Security News) 
Astaroth 2FA Phishing Kit Targets Gmail, Yahoo, Office 365, and Third-Party Logins (GB Hackers) 
SonicWall Firewall Vulnerability Exploited After PoC Publication (SecurityWeek)
Have I Been Pwned likely to ban resellers (The Register)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 14 Feb 2025 21:10:00 -0000</pubDate>
      <itunes:title>AI’s blind spots need human eyes.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2246</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Nakasone addresses AI at the Munich Cyber Security Conference. Court documents reveal the degree to which DOGE actually has access. Dutch police dismantle a bulletproof hosting operation. German officials investigate Apple’s App Tracking. Hackers exploited security flaws in BeyondTrust. CISA issues 20 new ICS advisories. The new Astoroth phishing kit bypasses 2FA. Hackers waste no time exploiting a SonicWall proof-of-concept vulnerability. Our guest today is Lawrence Pingree, VP of Technical Marketing at Dispersive, joining us to discuss why preemptive defense is essential in the AI arms race. Have I Been Pwned ponders whether resellers are worth the trouble. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest today is Lawrence Pingree, VP of Technical Marketing at Dispersive, joining us to discuss why preemptive defense is essential in the AI arms race. You can read more in "How Cybercriminals Are Using AI: Exploring the New Threat Landscape."

Selected Reading
Putting the human back into AI is key, former NSA Director Nakasone says (The Record)
Court Documents Shed New Light on DOGE Access and Activity at Treasury Department (Zero Day)
Musk's DOGE team: Judges to consider barring it from US government systems (Reuters)
Anyone Can Push Updates to the DOGE.gov Website (404 Media)
Dutch Police seizes 127 XHost servers, dismantles bulletproof hoster (Bleeping Computer)
Apple app tracking rules more strict for others – watchdog (The Register)
PostgreSQL flaw exploited as zero-day in BeyondTrust breach (Bleeping Computer)
CISA Releases 20 ICS Advisories Detailing Vulnerabilities &amp; Exploits (Cyber Security News) 
Astaroth 2FA Phishing Kit Targets Gmail, Yahoo, Office 365, and Third-Party Logins (GB Hackers) 
SonicWall Firewall Vulnerability Exploited After PoC Publication (SecurityWeek)
Have I Been Pwned likely to ban resellers (The Register)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Nakasone addresses AI at the Munich Cyber Security Conference. Court documents reveal the degree to which DOGE actually has access. Dutch police dismantle a bulletproof hosting operation. German officials investigate Apple’s App Tracking. Hackers exploited security flaws in BeyondTrust. CISA issues 20 new ICS advisories. The new Astoroth phishing kit bypasses 2FA. Hackers waste no time exploiting a SonicWall proof-of-concept vulnerability. Our guest today is Lawrence Pingree, VP of Technical Marketing at Dispersive, joining us to discuss why preemptive defense is essential in the AI arms race. Have I Been Pwned ponders whether resellers are worth the trouble.<strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest today is <a href="https://www.linkedin.com/in/lawrencepingree/">Lawrence Pingree</a>, VP of Technical Marketing at <a href="https://dispersive.io/">Dispersive</a>, joining us to discuss why <a href="https://blog.dispersive.io/addressing-the-ai-arms-race-why-preemptive-defense-is-essential">preemptive defense is essential in the AI arms race</a>. You can read more in "<a href="https://dispersive.io/how-cybercriminals-are-using-ai/?_gl=1*1t0bvel*_ga*MTc3NTYxMzAxMy4xNzM3MDM3MjY0*_ga_6Y52EXMQJF*MTczNzU2MTI1OC4zLjAuMTczNzU2MTI1OC42MC4wLjA">How Cybercriminals Are Using AI: Exploring the New Threat Landscape</a>."</p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/putting-the-human-back-into-ai-is-key-nakasone">Putting the human back into AI is key, former NSA Director Nakasone says</a> (The Record)</p><p><a href="https://www.zetter-zeroday.com/court-documents-shed-new-light-on-doge-access-and-activity-at-treasury-department/">Court Documents Shed New Light on DOGE Access and Activity at Treasury Department</a> (Zero Day)</p><p><a href="https://www.reuters.com/legal/judges-consider-barring-musks-doge-team-government-systems-2025-02-14/">Musk's DOGE team: Judges to consider barring it from US government systems</a> (Reuters)</p><p><a href="https://www.404media.co/anyone-can-push-updates-to-the-doge-gov-website-2/">Anyone Can Push Updates to the DOGE.gov Website</a> (404 Media)</p><p><a href="https://www.bleepingcomputer.com/news/legal/dutch-police-seizes-127-xhost-servers-dismantles-bulletproof-hoster/">Dutch Police seizes 127 XHost servers, dismantles bulletproof hoster</a> (Bleeping Computer)</p><p><a href="https://www.theregister.com/2025/02/14/apple_app_tracking_probe/">Apple app tracking rules more strict for others – watchdog</a> (The Register)</p><p><a href="https://www.bleepingcomputer.com/news/security/postgresql-flaw-exploited-as-zero-day-in-beyondtrust-breach/">PostgreSQL flaw exploited as zero-day in BeyondTrust breach</a> (Bleeping Computer)</p><p><a href="https://cybersecuritynews.com/cisa-releases-20-ics-advisories/">CISA Releases 20 ICS Advisories Detailing Vulnerabilities &amp; Exploits</a> (Cyber Security News) </p><p><a href="https://gbhackers.com/astaroth-2fa-phishing-kit-targets-gmail-yahoo-office-365/">Astaroth 2FA Phishing Kit Targets Gmail, Yahoo, Office 365, and Third-Party Logins</a> (GB Hackers) </p><p><a href="https://www.securityweek.com/sonicwall-firewall-vulnerability-exploited-after-poc-publication/">SonicWall Firewall Vulnerability Exploited After PoC Publication</a> (SecurityWeek)</p><p><a href="https://www.theregister.com/2025/02/13/hibp_reseller_ban/">Have I Been Pwned likely to ban resellers</a> (The Register)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><h2><br></h2><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1690</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[67cce562-d378-11ef-84f5-4fae456d830b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8987159370.mp3?updated=1739562594" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Salt in the wound.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2245/notes</link>
      <description>Salt Typhoon is still at it. Russian cyber-actor Seashell Blizzard expands its reach. The EFF sues DOGE to protect federal workers’ data. House Republicans pursue a comprehensive data privacy bill. Fortinet patches a critical vulnerability. Google views cybercrime as a national security threat. Palo Alto Networks issues 10 new security advisories. Symantec suspects a Chinese APT sidehustle. Guest Jason Baker, Principal Security Consultant at GuidePoint Security, joins us to share an update on the state of ransomware. A massive IoT data breach exposes 2.7 billion records. Here come the AI agents. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest, Jason Baker, Principal Security Consultant at GuidePoint Security, joins us to share an update on the state of ransomware.

Selected Reading
China’s Salt Typhoon Spies Are Still Hacking Telecoms—Now by Exploiting Cisco Routers (WIRED)
Russian Seashell Blizzard Enlists Specialist Initial Access Subgroup to Expand Ops (Infosecurity Magazine)
EFF Leads Fight Against DOGE and Musk's Access to US Federal Workers' Data (Infosecurity Magazine)
Elon Musk and the Right Are Recasting Reporting as ‘Doxxing’ (New York Times)
FortiOS Vulnerability Allows Super-Admin Privilege Escalation – Patch Now! (Hackread)
Cybercrime evolving into national security threat: Google (The Record)
House Republicans launch group for comprehensive data privacy legislation (The Record)
Palo Alto Networks Patches Potentially Serious Firewall Vulnerability (SecurityWeek)
Chinese Cyberspy Possibly Launching Ransomware Attacks as Side Job (SecurityWeek)
Massive IoT Data Breach Exposes 2.7 Billion Records, Including Wi-Fi Passwords (Cyber Security News)
Are You Ready to Let an AI Agent Use Your Computer? (IEEE Spectrum)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 13 Feb 2025 21:10:00 -0000</pubDate>
      <itunes:title>Salt in the wound.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2245</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Salt Typhoon is still at it. Russian cyber-actor Seashell Blizzard expands its reach. The EFF sues DOGE to protect federal workers’ data. House Republicans pursue a comprehensive data privacy bill. Fortinet patches a critical vulnerability. Google views cybercrime as a national security threat. Palo Alto Networks issues 10 new security advisories. Symantec suspects a Chinese APT sidehustle. Guest Jason Baker, Principal Security Consultant at GuidePoint Security, joins us to share an update on the state of ransomware. A massive IoT data breach exposes 2.7 billion records. Here come the AI agents. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest, Jason Baker, Principal Security Consultant at GuidePoint Security, joins us to share an update on the state of ransomware.

Selected Reading
China’s Salt Typhoon Spies Are Still Hacking Telecoms—Now by Exploiting Cisco Routers (WIRED)
Russian Seashell Blizzard Enlists Specialist Initial Access Subgroup to Expand Ops (Infosecurity Magazine)
EFF Leads Fight Against DOGE and Musk's Access to US Federal Workers' Data (Infosecurity Magazine)
Elon Musk and the Right Are Recasting Reporting as ‘Doxxing’ (New York Times)
FortiOS Vulnerability Allows Super-Admin Privilege Escalation – Patch Now! (Hackread)
Cybercrime evolving into national security threat: Google (The Record)
House Republicans launch group for comprehensive data privacy legislation (The Record)
Palo Alto Networks Patches Potentially Serious Firewall Vulnerability (SecurityWeek)
Chinese Cyberspy Possibly Launching Ransomware Attacks as Side Job (SecurityWeek)
Massive IoT Data Breach Exposes 2.7 Billion Records, Including Wi-Fi Passwords (Cyber Security News)
Are You Ready to Let an AI Agent Use Your Computer? (IEEE Spectrum)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Salt Typhoon is still at it. Russian cyber-actor Seashell Blizzard expands its reach. The EFF sues DOGE to protect federal workers’ data. House Republicans pursue a comprehensive data privacy bill. Fortinet patches a critical vulnerability. Google views cybercrime as a national security threat. Palo Alto Networks issues 10 new security advisories. Symantec suspects a Chinese APT sidehustle. Guest Jason Baker, Principal Security Consultant at GuidePoint Security, joins us to share an update on the state of ransomware. A massive IoT data breach exposes 2.7 billion records. Here come the AI agents. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today’s guest, <a href="https://www.linkedin.com/in/jasonbaker0111/">Jason Baker</a>, Principal Security Consultant at <a href="https://www.guidepointsecurity.com/">GuidePoint Security</a>, joins us to share an update on the state of ransomware.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.wired.com/story/chinas-salt-typhoon-spies-are-still-hacking-telecoms-now-by-exploiting-cisco-routers/">China’s Salt Typhoon Spies Are Still Hacking Telecoms—Now by Exploiting Cisco Routers</a> (WIRED)</p><p><a href="https://www.infosecurity-magazine.com/news/russian-seashell-blizzard-initial/">Russian Seashell Blizzard Enlists Specialist Initial Access Subgroup to Expand Ops</a> (Infosecurity Magazine)</p><p><a href="https://www.infosecurity-magazine.com/news/eff-lawsuit-us-doge-musk-opm-data/">EFF Leads Fight Against DOGE and Musk's Access to US Federal Workers' Data</a> (Infosecurity Magazine)</p><p><a href="https://www.nytimes.com/2025/02/12/business/media/elon-musk-doxxing-marko-elez.html?unlocked_article_code=1.wk4.20-T.WJaiJFtQibu1">Elon Musk and the Right Are Recasting Reporting as ‘Doxxing’</a> (New York Times)</p><p><a href="https://hackread.com/fortios-vulnerability-super-admin-privilege-escalation/">FortiOS Vulnerability Allows Super-Admin Privilege Escalation – Patch Now!</a> (Hackread)</p><p><a href="https://therecord.media/cybercrime-evolving-nation-state-threat">Cybercrime evolving into national security threat: Google</a> (The Record)</p><p><a href="https://therecord.media/data-privacy-legislation-house-republicans-working-group">House Republicans launch group for comprehensive data privacy legislation</a> (The Record)</p><p><a href="https://www.securityweek.com/palo-alto-networks-patches-potentially-serious-firewall-vulnerability/">Palo Alto Networks Patches Potentially Serious Firewall Vulnerability</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/chinese-cyberspy-possibly-launching-ransomware-attacks-as-side-job/">Chinese Cyberspy Possibly Launching Ransomware Attacks as Side Job</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/massive-iot-data-breach/">Massive IoT Data Breach Exposes 2.7 Billion Records, Including Wi-Fi Passwords</a> (Cyber Security News)</p><p><a href="https://spectrum.ieee.org/ai-agents-computer-use">Are You Ready to Let an AI Agent Use Your Computer?</a> (IEEE Spectrum)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1721</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[678f0c42-d378-11ef-84f5-5fb016fd6aad]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5261501288.mp3?updated=1739475968" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DOGEgeddon: The cyber crisis hiding in plain sight.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2244/notes</link>
      <description>Is DOGE a cyberattack against America? The White House plans to nominate a new national cyber director. Patch Tuesday updates. Ivanti discloses a critical stack-based buffer overflow vulnerability. The GAO  identifies cybersecurity gaps in the U.S. Coast Guard’s efforts to secure the Maritime Transportation System. An Arizona woman pleads guilty to running a laptop farm for North Korea. A notorious swatter gets a prison sentence. Our guests are  Gianna Whitver and Maria Velasquez, co-hosts of the Breaking Through in Cybersecurity Marketing podcast. Plague-themed phishing tests take it too far.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we welcome Gianna Whitver and Maria Velasquez, co-hosts of the Breaking Through in Cybersecurity Marketing podcast, sharing their plans for 2025. You can listen to new episodes of Breaking Through in Cybersecurity Marketing every Wednesday airing on the N2K CyberWire network and wherever you get your podcasts. 

Selected Reading
DOGE's Cyberattack Against America (Foreign Policy)
Trump plans to nominate GOP insider Sean Cairncross as national cyber director (The Record)
Microsoft Fixes Another Two Actively Exploited Zero-Days (Infosecurity Magazine)
Chipmaker Patch Tuesday: Intel, AMD, Nvidia Fix High-Severity Vulnerabilities (SecurityWeek)
ICS Patch Tuesday: Vulnerabilities Addressed by Schneider Electric, Siemens (SecurityWeek)
Ivanti Connect Secure Vulnerabilities Let Attackers Execute Code Remotely (Cyber Security News)
GAO Tells Coast Guard to Improve Cybersecurity of Maritime Transportation System (SecurityWeek)
Arizona woman pleads guilty to running laptop farm for N. Korean IT workers, faces 9-year sentence (The Record)
California Teenager Sentenced to 48 Months in Prison for Nationwide Swatting Spree (US Department of Justice)
Phishing Tests, the Bane of Work Life, Are Getting Meaner (Wall Street Journal) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 12 Feb 2025 23:10:00 -0000</pubDate>
      <itunes:title>DOGEgeddon: The cyber crisis hiding in plain sight.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2244</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Is DOGE a cyberattack against America? The White House plans to nominate a new national cyber director. Patch Tuesday updates. Ivanti discloses a critical stack-based buffer overflow vulnerability. The GAO  identifies cybersecurity gaps in the U.S. Coast Guard’s efforts to secure the Maritime Transportation System. An Arizona woman pleads guilty to running a laptop farm for North Korea. A notorious swatter gets a prison sentence. Our guests are  Gianna Whitver and Maria Velasquez, co-hosts of the Breaking Through in Cybersecurity Marketing podcast. Plague-themed phishing tests take it too far.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we welcome Gianna Whitver and Maria Velasquez, co-hosts of the Breaking Through in Cybersecurity Marketing podcast, sharing their plans for 2025. You can listen to new episodes of Breaking Through in Cybersecurity Marketing every Wednesday airing on the N2K CyberWire network and wherever you get your podcasts. 

Selected Reading
DOGE's Cyberattack Against America (Foreign Policy)
Trump plans to nominate GOP insider Sean Cairncross as national cyber director (The Record)
Microsoft Fixes Another Two Actively Exploited Zero-Days (Infosecurity Magazine)
Chipmaker Patch Tuesday: Intel, AMD, Nvidia Fix High-Severity Vulnerabilities (SecurityWeek)
ICS Patch Tuesday: Vulnerabilities Addressed by Schneider Electric, Siemens (SecurityWeek)
Ivanti Connect Secure Vulnerabilities Let Attackers Execute Code Remotely (Cyber Security News)
GAO Tells Coast Guard to Improve Cybersecurity of Maritime Transportation System (SecurityWeek)
Arizona woman pleads guilty to running laptop farm for N. Korean IT workers, faces 9-year sentence (The Record)
California Teenager Sentenced to 48 Months in Prison for Nationwide Swatting Spree (US Department of Justice)
Phishing Tests, the Bane of Work Life, Are Getting Meaner (Wall Street Journal) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Is DOGE a cyberattack against America? The White House plans to nominate a new national cyber director. Patch Tuesday updates. Ivanti discloses a critical stack-based buffer overflow vulnerability. The GAO  identifies cybersecurity gaps in the U.S. Coast Guard’s efforts to secure the Maritime Transportation System. An Arizona woman pleads guilty to running a laptop farm for North Korea. A notorious swatter gets a prison sentence. Our guests are  Gianna Whitver and Maria Velasquez, co-hosts of the Breaking Through in Cybersecurity Marketing podcast. Plague-themed phishing tests take it too far.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today, we welcome <a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a> and <a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez</a>, co-hosts of the <a href="https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing">Breaking Through in Cybersecurity Marketing</a> podcast, sharing their plans for 2025. You can listen to new episodes of Breaking Through in Cybersecurity Marketing every Wednesday airing on the N2K CyberWire network and wherever you get your podcasts. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://foreignpolicy.com/2025/02/11/doge-cyberattack-united-states-treasury/">DOGE's Cyberattack Against America</a> (Foreign Policy)</p><p><a href="https://therecord.media/sean-cairncross-trump-national-cyber-director-nominee">Trump plans to nominate GOP insider Sean Cairncross as national cyber director</a> (The Record)</p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-fixes-two-actively/">Microsoft Fixes Another Two Actively Exploited Zero-Days</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/chipmaker-patch-tuesday-intel-amd-nvidia-fix-high-severity-vulnerabilities/">Chipmaker Patch Tuesday: Intel, AMD, Nvidia Fix High-Severity Vulnerabilities</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/ics-patch-tuesday-vulnerabilities-addressed-by-schneider-electric-siemens/">ICS Patch Tuesday: Vulnerabilities Addressed by Schneider Electric, Siemens</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/ivanti-connect-secure-vulnerabilities-rce/">Ivanti Connect Secure Vulnerabilities Let Attackers Execute Code Remotely</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/gao-tells-coast-guard-to-improve-cybersecurity-of-maritime-transportation-system/">GAO Tells Coast Guard to Improve Cybersecurity of Maritime Transportation System</a> (SecurityWeek)</p><p><a href="https://therecord.media/arizona-woman-pleads-guilty-north-korean-laptop-farm">Arizona woman pleads guilty to running laptop farm for N. Korean IT workers, faces 9-year sentence</a> (The Record)</p><p><a href="https://www.justice.gov/opa/pr/california-teenager-sentenced-48-months-prison-nationwide-swatting-spree">California Teenager Sentenced to 48 Months in Prison for Nationwide Swatting Spree</a> (US Department of Justice)</p><p><a href="https://www.wsj.com/tech/cybersecurity/phishing-tests-the-bane-of-work-life-are-getting-meaner-76f30173">Phishing Tests, the Bane of Work Life, Are Getting Meaner</a> (Wall Street Journal) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1732</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[71d41c9c-e97b-11ef-b423-57a698ed2f1a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7798957510.mp3?updated=1739391826" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Apple’s race to secure your iPhone.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2243/notes</link>
      <description>Apple releases emergency security updates to patch a zero-day vulnerability. CISA places election security workers on leave. Elon Musk leads a group of investors making an unsolicited bid to acquire OpenAI. The man accused of hacking the SEC’s XTwitter account pleads guilty. Law enforcement seizes the leak site of the 8Base ransomware gang.  Researchers track a massive increase in brute-force attacks targeting edge devices. Experts question the U.K. government’s demand for an encryption backdoor in Apple devices. Today’s guest is John Fokker, Head of Threat Intelligence at Trellix, joining us to discuss their work on "Blurring the Lines: How Nation-States and Organized Cybercriminals Are Becoming Alike." And it’s international day for women and girls in science.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest is John Fokker, Head of Threat Intelligence at Trellix, joining us to discuss their work on "Blurring the Lines: How Nation-States and Organized Cybercriminals Are Becoming Alike."

Selected Reading
Apple fixes zero-day exploited in 'extremely sophisticated' attacks (BleepingComputer)
US cyber agency puts election security staffers who worked with the states on leave (AP News)
Elon Musk-led group makes $97.4 billion bid for OpenAI, CEO refuses and offers to "buy Twitter for $9.74 billion" (TechSpot)
OpenAI Finds No Evidence of Breach After Hacker Offers to Sell 20 Million Credentials (SecurityWeek)
Hacker who hijacked SEC’s X account pleads guilty, faces maximum five-year sentence (The Record)
8Base ransomware site taken down as Thai authorities arrest 4 connected to operation (The Record)
Edge Devices Face Surge in Mass Brute-Force Password Attacks (Data Breach Today)
U.K. Kicks Apple’s Door Open for China (Wall Street Journal)
International Day of Women and Girls in Science- United Nations (United Nations)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Feb 2025 21:10:00 -0000</pubDate>
      <itunes:title>Apple’s race to secure your iPhone.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2243</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Apple releases emergency security updates to patch a zero-day vulnerability. CISA places election security workers on leave. Elon Musk leads a group of investors making an unsolicited bid to acquire OpenAI. The man accused of hacking the SEC’s XTwitter account pleads guilty. Law enforcement seizes the leak site of the 8Base ransomware gang.  Researchers track a massive increase in brute-force attacks targeting edge devices. Experts question the U.K. government’s demand for an encryption backdoor in Apple devices. Today’s guest is John Fokker, Head of Threat Intelligence at Trellix, joining us to discuss their work on "Blurring the Lines: How Nation-States and Organized Cybercriminals Are Becoming Alike." And it’s international day for women and girls in science.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest is John Fokker, Head of Threat Intelligence at Trellix, joining us to discuss their work on "Blurring the Lines: How Nation-States and Organized Cybercriminals Are Becoming Alike."

Selected Reading
Apple fixes zero-day exploited in 'extremely sophisticated' attacks (BleepingComputer)
US cyber agency puts election security staffers who worked with the states on leave (AP News)
Elon Musk-led group makes $97.4 billion bid for OpenAI, CEO refuses and offers to "buy Twitter for $9.74 billion" (TechSpot)
OpenAI Finds No Evidence of Breach After Hacker Offers to Sell 20 Million Credentials (SecurityWeek)
Hacker who hijacked SEC’s X account pleads guilty, faces maximum five-year sentence (The Record)
8Base ransomware site taken down as Thai authorities arrest 4 connected to operation (The Record)
Edge Devices Face Surge in Mass Brute-Force Password Attacks (Data Breach Today)
U.K. Kicks Apple’s Door Open for China (Wall Street Journal)
International Day of Women and Girls in Science- United Nations (United Nations)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Apple releases emergency security updates to patch a zero-day vulnerability. CISA places election security workers on leave. Elon Musk leads a group of investors making an unsolicited bid to acquire OpenAI. The man accused of hacking the SEC’s XTwitter account pleads guilty. Law enforcement seizes the leak site of the 8Base ransomware gang.  Researchers track a massive increase in brute-force attacks targeting edge devices. Experts question the U.K. government’s demand for an encryption backdoor in Apple devices. Today’s guest is John Fokker, Head of Threat Intelligence at Trellix, joining us to discuss their work on "Blurring the Lines: How Nation-States and Organized Cybercriminals Are Becoming Alike." And it’s international day for women and girls in science.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today’s guest is <a href="https://www.linkedin.com/in/john-fokker-95b614107/">John Fokker</a>, Head of Threat Intelligence at <a href="https://www.trellix.com/">Trellix</a>, joining us to discuss their work on "<a href="https://www.trellix.com/blogs/research/blurring-the-lines-how-nation-states-and-cybercriminals-are-becoming-alike/">Blurring the Lines: How Nation-States and Organized Cybercriminals Are Becoming Alike</a>."</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/apple/apple-fixes-zero-day-exploited-in-extremely-sophisticated-attacks/">Apple fixes zero-day exploited in 'extremely sophisticated' attacks</a> (BleepingComputer)</p><p><a href="https://apnews.com/article/election-security-cisa-kristi-noem-cybersecurity-5bac8ce416c46b4fbe44c94ae5874b39">US cyber agency puts election security staffers who worked with the states on leave</a> (AP News)</p><p><a href="https://www.techspot.com/news/106722-elon-musk-led-group-offers-974-billion-openai.html">Elon Musk-led group makes $97.4 billion bid for OpenAI, CEO refuses and offers to "buy Twitter for $9.74 billion"</a> (TechSpot)</p><p><a href="https://www.securityweek.com/openai-finds-no-evidence-of-breach-after-hacker-offers-to-sell-20m-credentials/">OpenAI Finds No Evidence of Breach After Hacker Offers to Sell 20 Million Credentials</a> (SecurityWeek)</p><p><a href="https://therecord.media/hacker-hijacked-sec-account-maximum">Hacker who hijacked SEC’s X account pleads guilty, faces maximum five-year sentence</a> (The Record)</p><p><a href="https://therecord.media/8base-ransomware-site-taken-down-4-arrested">8Base ransomware site taken down as Thai authorities arrest 4 connected to operation</a> (The Record)</p><p><a href="https://www.databreachtoday.com/edge-devices-face-surge-in-mass-brute-force-password-attacks-a-27484">Edge Devices Face Surge in Mass Brute-Force Password Attacks</a> (Data Breach Today)</p><p><a href="https://www.wsj.com/opinion/u-k-kicks-apples-door-open-for-china-encryption-data-protection-deb4bc2b">U.K. Kicks Apple’s Door Open for China</a> (Wall Street Journal)</p><p><a href="https://www.un.org/en/observances/women-and-girls-in-science-day">International Day of Women and Girls in Science- United Nations</a> (United Nations)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1754</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[671872da-d378-11ef-84f5-0bc98b6bb9c6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4774733311.mp3?updated=1739306707" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Read all about it—or maybe not.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2242/notes</link>
      <description>A cyberattack disrupts newspaper publishing. A major AI summit takes place in Paris this week. A federal judge restricts DOGE from accessing Treasury Department systems. Cybersecurity cooperation between Canada and the U.S. remains strong. The Kraken ransomware group leaks credentials allegedly linked to Cisco. Europol urges banks to start preparing for quantum-safe cryptography. Microsoft expands its Copilot bug bounty program. The PlayStation Network (PSN) experienced a major outage over the weekend. Indiana man sentenced to 20 years for $37m cryptocurrency fraud. Our guest is Mike Woodard, VP of Product Management for App Security at Digital.ai, sharing strategies to minimize risk when implementing AI. Hunting for length and complexity in WiFi passwords. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Mike Woodard, VP of Product Management for App Security at Digital.ai, sharing strategies to minimize risk when implementing AI to enhance security.

Selected Reading
Cyberattack Disrupts Publication of Lee Newspapers Across the U.S. (New York Times)
Trump’s AI Ambition and China’s DeepSeek Overshadow an AI Summit in Paris (SecurityWeek)
Musk Team’s Treasury Access Raises Security Fears, Despite Judge’s Ordered Halt (New York Times)
In Breaking USAID, the Trump Administration May Have Broken the Law (ProPublica)
Judge: DOGE made US Treasury ‘more vulnerable to hacking’ (The Register)
Cisco Data Breach – Ransomware Group Allegedly Breached Internal Network (GB Hackers)
Europol Warns Financial Sector of “Imminent” Quantum Threat (Infosecurity Magazine)
Trade war or not, Canada will keep working with the U.S. on cybersecurity (The Logic)
Microsoft Expands Copilot Bug Bounty Program, Increases Payouts (SecurityWeek)
PlayStation Network Down; Outage Leaves Gamers Frustrated (Updated) (HackRead)
Indiana Man Sentenced to 20 Years in Federal Prison for Conspiracies Involving Cyber Intrusion and a Massive $37 Million Cryptocurrency Theft (DataBreaches.Net)
The World's Longest and Strongest WiFi Passwords (InfoSec Write-ups) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 10 Feb 2025 21:10:00 -0000</pubDate>
      <itunes:title>Read all about it—or maybe not.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2242</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A cyberattack disrupts newspaper publishing. A major AI summit takes place in Paris this week. A federal judge restricts DOGE from accessing Treasury Department systems. Cybersecurity cooperation between Canada and the U.S. remains strong. The Kraken ransomware group leaks credentials allegedly linked to Cisco. Europol urges banks to start preparing for quantum-safe cryptography. Microsoft expands its Copilot bug bounty program. The PlayStation Network (PSN) experienced a major outage over the weekend. Indiana man sentenced to 20 years for $37m cryptocurrency fraud. Our guest is Mike Woodard, VP of Product Management for App Security at Digital.ai, sharing strategies to minimize risk when implementing AI. Hunting for length and complexity in WiFi passwords. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Mike Woodard, VP of Product Management for App Security at Digital.ai, sharing strategies to minimize risk when implementing AI to enhance security.

Selected Reading
Cyberattack Disrupts Publication of Lee Newspapers Across the U.S. (New York Times)
Trump’s AI Ambition and China’s DeepSeek Overshadow an AI Summit in Paris (SecurityWeek)
Musk Team’s Treasury Access Raises Security Fears, Despite Judge’s Ordered Halt (New York Times)
In Breaking USAID, the Trump Administration May Have Broken the Law (ProPublica)
Judge: DOGE made US Treasury ‘more vulnerable to hacking’ (The Register)
Cisco Data Breach – Ransomware Group Allegedly Breached Internal Network (GB Hackers)
Europol Warns Financial Sector of “Imminent” Quantum Threat (Infosecurity Magazine)
Trade war or not, Canada will keep working with the U.S. on cybersecurity (The Logic)
Microsoft Expands Copilot Bug Bounty Program, Increases Payouts (SecurityWeek)
PlayStation Network Down; Outage Leaves Gamers Frustrated (Updated) (HackRead)
Indiana Man Sentenced to 20 Years in Federal Prison for Conspiracies Involving Cyber Intrusion and a Massive $37 Million Cryptocurrency Theft (DataBreaches.Net)
The World's Longest and Strongest WiFi Passwords (InfoSec Write-ups) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cyberattack disrupts newspaper publishing. A major AI summit takes place in Paris this week. A federal judge restricts DOGE from accessing Treasury Department systems. Cybersecurity cooperation between Canada and the U.S. remains strong. The Kraken ransomware group leaks credentials allegedly linked to Cisco. Europol urges banks to start preparing for quantum-safe cryptography. Microsoft expands its Copilot bug bounty program. The PlayStation Network (PSN) experienced a major outage over the weekend. Indiana man sentenced to 20 years for $37m cryptocurrency fraud. Our guest is Mike Woodard, VP of Product Management for App Security at Digital.ai, sharing strategies to minimize risk when implementing AI. Hunting for length and complexity in WiFi passwords. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/mike663/">Mike Woodard</a>, VP of Product Management for App Security at <a href="http://digital.ai">Digital.ai</a>, sharing strategies to minimize risk when implementing AI to enhance security.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.nytimes.com/2025/02/09/business/media/newspaper-cyberattack-lee-enterprises.html">Cyberattack Disrupts Publication of Lee Newspapers Across the U.S.</a> (New York Times)</p><p><a href="https://www.securityweek.com/trumps-ai-ambition-and-chinas-deepseek-overshadow-an-ai-summit-in-paris/">Trump’s AI Ambition and China’s DeepSeek Overshadow an AI Summit in Paris</a> (SecurityWeek)</p><p><a href="https://www.nytimes.com/2025/02/08/us/politics/treasury-systems-raised-security-concerns.html">Musk Team’s Treasury Access Raises Security Fears, Despite Judge’s Ordered Halt</a> (New York Times)</p><p><a href="https://www.propublica.org/article/usaid-trump-musk-destruction-may-have-broken-law">In Breaking USAID, the Trump Administration May Have Broken the Law</a> (ProPublica)</p><p><a href="https://www.theregister.com/2025/02/10/doge_infosec_impact_court_order/">Judge: DOGE made US Treasury ‘more vulnerable to hacking’</a> (The Register)</p><p><a href="https://gbhackers.com/cisco-data-breach-internal-network-compromised/">Cisco Data Breach – Ransomware Group Allegedly Breached Internal Network</a> (GB Hackers)</p><p><a href="https://www.infosecurity-magazine.com/news/europol-warns-financial-sector/">Europol Warns Financial Sector of “Imminent” Quantum Threat</a> (Infosecurity Magazine)</p><p><a href="https://thelogic.co/news/canada-usa-cybersecurity-trade-war/">Trade war or not, Canada will keep working with the U.S. on cybersecurity</a> (The Logic)</p><p><a href="https://www.securityweek.com/microsoft-expands-copilot-bug-bounty-program-increases-payouts/">Microsoft Expands Copilot Bug Bounty Program, Increases Payouts</a> (SecurityWeek)</p><p><a href="https://hackread.com/playstation-network-down-outage-gamers-frustrated/">PlayStation Network Down; Outage Leaves Gamers Frustrated (Updated)</a> (HackRead)</p><p><a href="https://databreaches.net/2025/02/07/indiana-man-sentenced-to-20-years-in-federal-prison-for-conspiracies-involving-cyber-intrusion-and-a-massive-37-million-cryptocurrency-theft/">Indiana Man Sentenced to 20 Years in Federal Prison for Conspiracies Involving Cyber Intrusion and a Massive $37 Million Cryptocurrency Theft</a> (DataBreaches.Net)</p><p><a href="https://infosecwriteups.com/the-worlds-longest-and-strongest-wifi-passwords-3d59292a9661">The World's Longest and Strongest WiFi Passwords</a> (InfoSec Write-ups) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1527</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[66db07e2-d378-11ef-84f5-d7b3066e84e2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2952580151.mp3?updated=1739218943" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Avi Shua: Try to do things by yourself. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/54/notes</link>
      <description>Please enjoy this encore of Career Notes. 
CEO and co-founder of Orca Security Avi Shua shares his thoughts on ways to succeed in cybersecurity. Avi's excitement about cybersecurity began when he was 13 as he tried to think of ways to get around the school's network security. He joined the Israeli Army's Intelligence Unit 8200 and experienced some unique cybersecurity training programs that he would eventually come to teach. Learning to solve problems on your own is a skill Avi acquired and took into his professional career. In his current position, Avi works to advance Orca's mission. He loves that his company works to reduce friction and enables security people to do their jobs. Instead of becoming of plumbers connecting things, Avi says they can do their job and become real security practitioners. We thank Avi for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 09 Feb 2025 08:00:00 -0000</pubDate>
      <itunes:title>Avi Shua: Try to do things by yourself. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>54</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/22b5b7a6-e4b2-11ef-8abd-f71124f7c8f2/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of Career Notes. 
CEO and co-founder of Orca Security Avi Shua shares his thoughts on ways to succeed in cybersecurity. Avi's excitement about cybersecurity began when he was 13 as he tried to think of ways to get around the school's network security. He joined the Israeli Army's Intelligence Unit 8200 and experienced some unique cybersecurity training programs that he would eventually come to teach. Learning to solve problems on your own is a skill Avi acquired and took into his professional career. In his current position, Avi works to advance Orca's mission. He loves that his company works to reduce friction and enables security people to do their jobs. Instead of becoming of plumbers connecting things, Avi says they can do their job and become real security practitioners. We thank Avi for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of Career Notes. </p><p>CEO and co-founder of Orca Security Avi Shua shares his thoughts on ways to succeed in cybersecurity. Avi's excitement about cybersecurity began when he was 13 as he tried to think of ways to get around the school's network security. He joined the Israeli Army's Intelligence Unit 8200 and experienced some unique cybersecurity training programs that he would eventually come to teach. Learning to solve problems on your own is a skill Avi acquired and took into his professional career. In his current position, Avi works to advance Orca's mission. He loves that his company works to reduce friction and enables security people to do their jobs. Instead of becoming of plumbers connecting things, Avi says they can do their job and become real security practitioners. We thank Avi for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>484</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[22b5b7a6-e4b2-11ef-8abd-f71124f7c8f2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6345236242.mp3?updated=1738864222" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cleo’s trojan horse. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/364/notes</link>
      <description>Mark Manglicmot, SVP of Security Services from Arctic Wolf, is sharing their research on "Cleopatra’s Shadow: A Mass Exploitation Campaign Deploying a Java Backdoor Through Zero-Day Exploitation of Cleo MFT Software." Arctic Wolf Labs discovered an ongoing exploitation campaign targeting Cleo Managed File Transfer (MFT) products, beginning on December 7, 2024. Threat actors used a malicious PowerShell stager to deploy a Java-based backdoor, dubbed Cleopatra, which features in-memory file storage and cross-platform compatibility across Windows and Linux. 
Despite Cleo's previous patch for CVE-2024-50623, attackers appear to have leveraged an alternative access method, exploiting the software's autorun feature to execute payloads and establish persistent access.

The research can be found here:
Cleopatra’s Shadow: A Mass Exploitation Campaign Deploying a Java Backdoor Through Zero-Day Exploitation of Cleo MFT Software

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Feb 2025 08:00:00 -0000</pubDate>
      <itunes:title>Cleo’s trojan horse. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>364</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/3d0836ae-e572-11ef-81af-6f8e38e4bed2/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Mark Manglicmot, SVP of Security Services from Arctic Wolf, is sharing their research on "Cleopatra’s Shadow: A Mass Exploitation Campaign Deploying a Java Backdoor Through Zero-Day Exploitation of Cleo MFT Software." Arctic Wolf Labs discovered an ongoing exploitation campaign targeting Cleo Managed File Transfer (MFT) products, beginning on December 7, 2024. Threat actors used a malicious PowerShell stager to deploy a Java-based backdoor, dubbed Cleopatra, which features in-memory file storage and cross-platform compatibility across Windows and Linux. 
Despite Cleo's previous patch for CVE-2024-50623, attackers appear to have leveraged an alternative access method, exploiting the software's autorun feature to execute payloads and establish persistent access.

The research can be found here:
Cleopatra’s Shadow: A Mass Exploitation Campaign Deploying a Java Backdoor Through Zero-Day Exploitation of Cleo MFT Software

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/mark-manglicmot/">Mark Manglicmot</a>, SVP of Security Services from <a href="https://www.linkedin.com/company/arcticwolf/">Arctic Wolf</a>, is sharing their research on "Cleopatra’s Shadow: A Mass Exploitation Campaign Deploying a Java Backdoor Through Zero-Day Exploitation of Cleo MFT Software." Arctic Wolf Labs discovered an ongoing exploitation campaign targeting Cleo Managed File Transfer (MFT) products, beginning on December 7, 2024. Threat actors used a malicious PowerShell stager to deploy a Java-based backdoor, dubbed <em>Cleopatra</em>, which features in-memory file storage and cross-platform compatibility across Windows and Linux. </p><p>Despite Cleo's previous patch for CVE-2024-50623, attackers appear to have leveraged an alternative access method, exploiting the software's autorun feature to execute payloads and establish persistent access.</p><p><br></p><h3>The research can be found here:</h3><ul><li><a href="https://arcticwolf.com/resources/blog/cleopatras-shadow-a-mass-exploitation-campaign/">Cleopatra’s Shadow: A Mass Exploitation Campaign Deploying a Java Backdoor Through Zero-Day Exploitation of Cleo MFT Software</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1111</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3d0836ae-e572-11ef-81af-6f8e38e4bed2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7637244504.mp3?updated=1738947445" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DOGE-eat-DOGE world.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2241/notes</link>
      <description>Security concerns grow over DOGE’s use of AI. The British government demands access to encrypted iCloud accounts. Researchers identify critical vulnerabilities in the DeepSeek iOS app. Microsoft Edge uses AI to block scareware. A phishing campaign targets Facebook users with fake copyright infringement notices. Researchers discover malicious machine learning models on Hugging Face. A major data broker faces yet-another data breach lawsuit. CISA warns of a critical Microsoft Outlook vulnerability under active exploitation. Guest John Anthony Smith, Founder and Chief Security Officer at Fenix24, shares insights into why backups are the most important security control. The UK’s cyber weather report says expect light phishing with a chance of ransomware. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today on our Industry Voices segment, guest John Anthony Smith, Founder and Chief Security Officer at Fenix24, shares insights into why backups are the most important security control. 

For additional details, please visit this resource: 
The Reality of Resilience, Recovery, and Repeat Cyberattacks (Infographic)


Selected Reading
Elon Musk’s DOGE feeds AI sensitive federal data to target cuts (The Washington Post)
Will DOGE Access to CMS Data Lead to HIPAA Breaches? (GovInfo Security)
Federal judge tightens DOGE leash over critical Treasury payment system access (The Register)
UK reportedly demands secret ‘back door’ to Apple users’ iCloud accounts (The Record)
NowSecure Uncovers Multiple Security and Privacy Flaws in DeepSeek iOS Mobile App (NowSecure)
Microsoft Edge update adds AI-powered Scareware Blocker (Bleeping Computer)
New Facebook Fake Copyright Notices Phishing Steals Your FB Credentials (Cyber Security News)
Developers Beware! Malicious ML Models Detected on Hugging Face Platform (Cyber Security News)
Coordinates of millions of smartphones feared stolen, sparking yet another lawsuit against data broker (The Register)
Critical Microsoft Outlook Vulnerability (CVE-2024-21413) Actively Exploited in Attacks - CISA Warns (CISA)
UK cyberattack severity to be scored by world-first group  (The Register)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 07 Feb 2025 21:10:00 -0000</pubDate>
      <itunes:title>DOGE-eat-DOGE world.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2241</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Security concerns grow over DOGE’s use of AI. The British government demands access to encrypted iCloud accounts. Researchers identify critical vulnerabilities in the DeepSeek iOS app. Microsoft Edge uses AI to block scareware. A phishing campaign targets Facebook users with fake copyright infringement notices. Researchers discover malicious machine learning models on Hugging Face. A major data broker faces yet-another data breach lawsuit. CISA warns of a critical Microsoft Outlook vulnerability under active exploitation. Guest John Anthony Smith, Founder and Chief Security Officer at Fenix24, shares insights into why backups are the most important security control. The UK’s cyber weather report says expect light phishing with a chance of ransomware. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today on our Industry Voices segment, guest John Anthony Smith, Founder and Chief Security Officer at Fenix24, shares insights into why backups are the most important security control. 

For additional details, please visit this resource: 
The Reality of Resilience, Recovery, and Repeat Cyberattacks (Infographic)


Selected Reading
Elon Musk’s DOGE feeds AI sensitive federal data to target cuts (The Washington Post)
Will DOGE Access to CMS Data Lead to HIPAA Breaches? (GovInfo Security)
Federal judge tightens DOGE leash over critical Treasury payment system access (The Register)
UK reportedly demands secret ‘back door’ to Apple users’ iCloud accounts (The Record)
NowSecure Uncovers Multiple Security and Privacy Flaws in DeepSeek iOS Mobile App (NowSecure)
Microsoft Edge update adds AI-powered Scareware Blocker (Bleeping Computer)
New Facebook Fake Copyright Notices Phishing Steals Your FB Credentials (Cyber Security News)
Developers Beware! Malicious ML Models Detected on Hugging Face Platform (Cyber Security News)
Coordinates of millions of smartphones feared stolen, sparking yet another lawsuit against data broker (The Register)
Critical Microsoft Outlook Vulnerability (CVE-2024-21413) Actively Exploited in Attacks - CISA Warns (CISA)
UK cyberattack severity to be scored by world-first group  (The Register)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Security concerns grow over DOGE’s use of AI. The British government demands access to encrypted iCloud accounts. Researchers identify critical vulnerabilities in the DeepSeek iOS app. Microsoft Edge uses AI to block scareware. A phishing campaign targets Facebook users with fake copyright infringement notices. Researchers discover malicious machine learning models on Hugging Face. A major data broker faces yet-another data breach lawsuit. CISA warns of a critical Microsoft Outlook vulnerability under active exploitation. Guest John Anthony Smith, Founder and Chief Security Officer at Fenix24, shares insights into why backups are the most important security control. The UK’s cyber weather report says expect light phishing with a chance of ransomware.<strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today on our Industry Voices segment, guest <a href="https://www.linkedin.com/in/john-anthony-smith/">John Anthony Smith</a>, Founder and Chief Security Officer at <a href="https://fenix24.com/">Fenix24</a>, shares insights into why backups are the most important security control. </p><p><br></p><p><strong>For additional details, please visit this resource: </strong></p><ul><li><a href="https://fenix24.com/wp-content/uploads/2024/10/Fenix_RepeatCyberattacks_flyer_090924-1.pdf">The Reality of Resilience, Recovery, and Repeat Cyberattacks (Infographic)</a></li></ul><p><br></p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.washingtonpost.com/nation/2025/02/06/elon-musk-doge-ai-department-education/">Elon Musk’s DOGE feeds AI sensitive federal data to target cuts</a> (The Washington Post)</p><p><a href="https://www.govinfosecurity.com/will-doge-access-to-cms-data-lead-to-hipaa-breaches-a-27463">Will DOGE Access to CMS Data Lead to HIPAA Breaches?</a> (GovInfo Security)</p><p><a href="https://www.theregister.com/2025/02/06/federal_court_leashes_doges_tresury_access/">Federal judge tightens DOGE leash over critical Treasury payment system access</a> (The Register)</p><p><a href="https://therecord.media/uk-government-reportedly-demands-backdoor-apple-icloud">UK reportedly demands secret ‘back door’ to Apple users’ iCloud accounts</a> (The Record)</p><p><a href="https://www.nowsecure.com/blog/2025/02/06/nowsecure-uncovers-multiple-security-and-privacy-flaws-in-deepseek-ios-mobile-app/">NowSecure Uncovers Multiple Security and Privacy Flaws in DeepSeek iOS Mobile App</a> (NowSecure)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-edge-update-adds-ai-powered-scareware-blocker/">Microsoft Edge update adds AI-powered Scareware Blocker</a> (Bleeping Computer)</p><p><a href="https://cybersecuritynews.com/new-facebook-fake-copyright-notices/">New Facebook Fake Copyright Notices Phishing Steals Your FB Credentials</a> (Cyber Security News)</p><p><a href="https://cybersecuritynews.com/malicious-ml-models-detected-on-hugging-face/">Developers Beware! Malicious ML Models Detected on Hugging Face Platform</a> (Cyber Security News)</p><p><a href="https://www.theregister.com/2025/02/06/gravy_analytics_data_breach_suit/">Coordinates of millions of smartphones feared stolen, sparking yet another lawsuit against data broker</a> (The Register)</p><p><a href="https://cybersecuritynews.com/critical-microsoft-outlook-vulnerability-actively-exploited-in-cyber-attacks/">Critical Microsoft Outlook Vulnerability (CVE-2024-21413) Actively Exploited in Attacks - CISA Warns</a> (CISA)</p><p><a href="https://www.theregister.com/2025/02/07/uk_cyber_monitoring_centre/">UK cyberattack severity to be scored by world-first group</a>  (The Register)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1853</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[66988764-d378-11ef-84f5-c3b61d2c8995]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7863634801.mp3?updated=1738955307" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FCC around and find out.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2240/notes</link>
      <description>Chaos and security concerns continue in Washington. Spanish authorities arrest a man suspected of hacking NATO, the UN, and the US Army. A major U.S. hiring platform exposes millions of resumes. Another British engineering firm suffers a cyberattack. Cisco patches multiple vulnerabilities. Cybercriminals exploit SVG files in phishing attacks. SparkCat SDK targets cryptocurrency via Android and iOS apps. CISA directs federal agencies to patch a high-severity Linux kernel flaw. Thailand leaves scamming syndicates in the dark. Positive trends in the fight against ransomware. Our guest is Cliff Crosland, CEO and Co-founder at Scanner.dev, discusses the evolution of security data lakes and the "bring your own" model for security tools. Don’t eff with the FCC.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today on our Industry Voices segment, guest Cliff Crosland, CEO and Co-founder at Scanner.dev, discusses the evolution of security data lakes and the "bring your own" model for security tools. For some additional details, check out their blog on “Security Data Lakes: A New Tool for Threat Hunting, Detection &amp; Response, and GenAI-Powered Analysis.”

Selected Reading
Musk’s DOGE agents access sensitive personnel data, alarming security officials (Washington Post)
Union groups sue Treasury over giving DOGE access to sensitive data (The Record)
Hacker Who Targeted NATO, US Army Arrested in Spain (SecurityWeek)
Hiring platform serves users raw with 5.4 million CVs exposed (Cybernews)
IMI becomes the latest British engineering firm to be hacked (TechCrunch)
Cisco Patches Critical Vulnerabilities in Enterprise Security Product (SecurityWeek)
Scalable Vector Graphics files pose a novel phishing threat (Sophos News)
Crypto-stealing apps found in Apple App Store for the first time (Bleeping Computer)
Ransomware payments dropped in 2024 as victims refused to pay hackers (TechCrunch)
CISA orders agencies to patch Linux kernel bug exploited in attacks (Bleeping Computer)
Thailand cuts power supply to Myanmar scam hubs (The Record)
Robocallers posing as FCC fraud prevention team call FCC staff (Bleeping Computer)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 06 Feb 2025 21:10:00 -0000</pubDate>
      <itunes:title>FCC around and find out.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2240</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Chaos and security concerns continue in Washington. Spanish authorities arrest a man suspected of hacking NATO, the UN, and the US Army. A major U.S. hiring platform exposes millions of resumes. Another British engineering firm suffers a cyberattack. Cisco patches multiple vulnerabilities. Cybercriminals exploit SVG files in phishing attacks. SparkCat SDK targets cryptocurrency via Android and iOS apps. CISA directs federal agencies to patch a high-severity Linux kernel flaw. Thailand leaves scamming syndicates in the dark. Positive trends in the fight against ransomware. Our guest is Cliff Crosland, CEO and Co-founder at Scanner.dev, discusses the evolution of security data lakes and the "bring your own" model for security tools. Don’t eff with the FCC.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today on our Industry Voices segment, guest Cliff Crosland, CEO and Co-founder at Scanner.dev, discusses the evolution of security data lakes and the "bring your own" model for security tools. For some additional details, check out their blog on “Security Data Lakes: A New Tool for Threat Hunting, Detection &amp; Response, and GenAI-Powered Analysis.”

Selected Reading
Musk’s DOGE agents access sensitive personnel data, alarming security officials (Washington Post)
Union groups sue Treasury over giving DOGE access to sensitive data (The Record)
Hacker Who Targeted NATO, US Army Arrested in Spain (SecurityWeek)
Hiring platform serves users raw with 5.4 million CVs exposed (Cybernews)
IMI becomes the latest British engineering firm to be hacked (TechCrunch)
Cisco Patches Critical Vulnerabilities in Enterprise Security Product (SecurityWeek)
Scalable Vector Graphics files pose a novel phishing threat (Sophos News)
Crypto-stealing apps found in Apple App Store for the first time (Bleeping Computer)
Ransomware payments dropped in 2024 as victims refused to pay hackers (TechCrunch)
CISA orders agencies to patch Linux kernel bug exploited in attacks (Bleeping Computer)
Thailand cuts power supply to Myanmar scam hubs (The Record)
Robocallers posing as FCC fraud prevention team call FCC staff (Bleeping Computer)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chaos and security concerns continue in Washington. Spanish authorities arrest a man suspected of hacking NATO, the UN, and the US Army. A major U.S. hiring platform exposes millions of resumes. Another British engineering firm suffers a cyberattack. Cisco patches multiple vulnerabilities. Cybercriminals exploit SVG files in phishing attacks. SparkCat SDK targets cryptocurrency via Android and iOS apps. CISA directs federal agencies to patch a high-severity Linux kernel flaw. Thailand leaves scamming syndicates in the dark. Positive trends in the fight against ransomware. Our guest is Cliff Crosland, CEO and Co-founder at Scanner.dev, discusses the evolution of security data lakes and the "bring your own" model for security tools. Don’t eff with the FCC.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today on our Industry Voices segment, guest <a href="https://www.linkedin.com/in/cliftoncrosland/">Cliff Crosland</a>, CEO and Co-founder at <a href="https://scanner.dev/how-it-works/">Scanner.dev</a>, discusses the evolution of security data lakes and the "bring your own" model for security tools. For some additional details, check out their blog on “<a href="https://blog.scanner.dev/security-data-lakes-a-new-tool-for-threat-hunting-detection-amp-response-and-genai/">Security Data Lakes: A New Tool for Threat Hunting, Detection &amp; Response, and GenAI-Powered Analysis</a>.”</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.washingtonpost.com/national-security/2025/02/06/elon-musk-doge-access-personnel-data-opm-security/">Musk’s DOGE agents access sensitive personnel data, alarming security officials</a> (Washington Post)</p><p><a href="https://therecord.media/union-groups-sue-treasury-over-giving-doge-access-to-data">Union groups sue Treasury over giving DOGE access to sensitive data</a> (The Record)</p><p><a href="https://www.securityweek.com/hacker-who-targeted-nato-us-army-arrested-in-spain/">Hacker Who Targeted NATO, US Army Arrested in Spain</a> (SecurityWeek)</p><p><a href="https://cnews.link/foh-boh-hiring-platform-exposed-millions-resumes-3/">Hiring platform serves users raw with 5.4 million CVs exposed</a> (Cybernews)</p><p><a href="https://techcrunch.com/2025/02/06/imi-becomes-the-latest-british-engineering-firm-to-be-hacked/">IMI becomes the latest British engineering firm to be hacked</a> (TechCrunch)</p><p><a href="https://www.securityweek.com/cisco-patches-critical-vulnerabilities-in-enterprise-management-product/">Cisco Patches Critical Vulnerabilities in Enterprise Security Product </a>(SecurityWeek)</p><p><a href="https://news.sophos.com/en-us/2025/02/05/svg-phishing/">Scalable Vector Graphics files pose a novel phishing threat</a> (Sophos News)</p><p><a href="https://www.bleepingcomputer.com/news/mobile/crypto-stealing-apps-found-in-apple-app-store-for-the-first-time/">Crypto-stealing apps found in Apple App Store for the first time</a> (Bleeping Computer)</p><p><a href="https://techcrunch.com/2025/02/05/ransomware-payments-dropped-in-2024-as-victims-refused-to-pay-hackers/">Ransomware payments dropped in 2024 as victims refused to pay hackers</a> (TechCrunch)</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-agencies-to-patch-linux-kernel-bug-exploited-in-attacks/">CISA orders agencies to patch Linux kernel bug exploited in attacks</a> (Bleeping Computer)</p><p><a href="https://therecord.media/thailand-cuts-power-scam-compounds-myanmar">Thailand cuts power supply to Myanmar scam hubs</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/robocallers-posing-as-fcc-fraud-prevention-team-call-fcc-staff/">Robocallers posing as FCC fraud prevention team call FCC staff</a> (Bleeping Computer)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2280</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[665a3d4c-d378-11ef-84f5-07ad9923bdbe]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8055206063.mp3?updated=1738869124" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DOGE days numbered?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2239/notes</link>
      <description>The DOGE team faces growing backlash. The Five Eyes release guidance on protecting edge devices. A critical macOS kernel vulnerability allows privilege escalation, memory corruption, and kernel code execution. Google and Mozilla release security updates for Chrome and Firefox. Multiple Veeam backup products are vulnerable to man-in-the-middle attacks. Zyxel suggests you replace those outdated routers. A former Google engineer faces multiple charges for alleged corporate espionage. CISA issues nine new advisories for ICS vulnerabilities. A house Republican introduces a cybersecurity workforce scholarship bill. On our CertByte segment, a look at ISC2’s CISSP exam. Google updates its stance on AI weapons. 

Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare.
This week, Chris is joined by Steven Burnley to break down a question targeting ISC2®'s CISSP - Certified Information Systems Security Professional) exam. Today’s question comes from N2K’s ISC2® CISSP - Certified Information Systems Security Professional Practice Test.
Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. 
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.

Selected Reading
Federal Workers Sue to Disconnect DOGE Server (WIRED)
Treasury says DOGE review has ‘read-only’ access to federal payments system (The Record)
‘Things Are Going to Get Intense:’ How a Musk Ally Plans to Push AI on the Government (404 Media)
Cybersecurity, government experts are aghast at security failures in DOGE takeover (CyberScoop)
Five Eyes Launch Guidance to Improve Edge Device Security (Infosecurity Magazine)
Apple's MacOS Kernel Vulnerability Let Attackers Escalate Privileges - PoC Released (Cyber Security News) 
Chrome 133, Firefox 135 Patch High-Severity Vulnerabilities (SecurityWeek)
Critical Veeam Vulnerability (CVE-2025-23114) Exposes Backup Servers to Remote Code Execution (SOCRadar)
Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers (TechCrunch)
US cranks up espionage charges against ex-Googler accused of trade secrets heist (The Register)
CISA Releases Nine Advisories Detailing vulnerabilities and Exploits Surrounding ICS (Cyber Security News)
CISA hires former DHS CIO into top cyber position (Federal News Network)
Proposal for federal cyber scholarship, with service requirement, returns in House (The Record)
Google drops pledge not to use AI for weapons or surveillance (Washington Post)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 05 Feb 2025 21:10:00 -0000</pubDate>
      <itunes:title>DOGE days numbered?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2239</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The DOGE team faces growing backlash. The Five Eyes release guidance on protecting edge devices. A critical macOS kernel vulnerability allows privilege escalation, memory corruption, and kernel code execution. Google and Mozilla release security updates for Chrome and Firefox. Multiple Veeam backup products are vulnerable to man-in-the-middle attacks. Zyxel suggests you replace those outdated routers. A former Google engineer faces multiple charges for alleged corporate espionage. CISA issues nine new advisories for ICS vulnerabilities. A house Republican introduces a cybersecurity workforce scholarship bill. On our CertByte segment, a look at ISC2’s CISSP exam. Google updates its stance on AI weapons. 

Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare.
This week, Chris is joined by Steven Burnley to break down a question targeting ISC2®'s CISSP - Certified Information Systems Security Professional) exam. Today’s question comes from N2K’s ISC2® CISSP - Certified Information Systems Security Professional Practice Test.
Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. 
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.

Selected Reading
Federal Workers Sue to Disconnect DOGE Server (WIRED)
Treasury says DOGE review has ‘read-only’ access to federal payments system (The Record)
‘Things Are Going to Get Intense:’ How a Musk Ally Plans to Push AI on the Government (404 Media)
Cybersecurity, government experts are aghast at security failures in DOGE takeover (CyberScoop)
Five Eyes Launch Guidance to Improve Edge Device Security (Infosecurity Magazine)
Apple's MacOS Kernel Vulnerability Let Attackers Escalate Privileges - PoC Released (Cyber Security News) 
Chrome 133, Firefox 135 Patch High-Severity Vulnerabilities (SecurityWeek)
Critical Veeam Vulnerability (CVE-2025-23114) Exposes Backup Servers to Remote Code Execution (SOCRadar)
Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers (TechCrunch)
US cranks up espionage charges against ex-Googler accused of trade secrets heist (The Register)
CISA Releases Nine Advisories Detailing vulnerabilities and Exploits Surrounding ICS (Cyber Security News)
CISA hires former DHS CIO into top cyber position (Federal News Network)
Proposal for federal cyber scholarship, with service requirement, returns in House (The Record)
Google drops pledge not to use AI for weapons or surveillance (Washington Post)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The DOGE team faces growing backlash. The Five Eyes release guidance on protecting edge devices. A critical macOS kernel vulnerability allows privilege escalation, memory corruption, and kernel code execution. Google and Mozilla release security updates for Chrome and Firefox. Multiple Veeam backup products are vulnerable to man-in-the-middle attacks. Zyxel suggests you replace those outdated routers. A former Google engineer faces multiple charges for alleged corporate espionage. CISA issues nine new advisories for ICS vulnerabilities. A house Republican introduces a cybersecurity workforce scholarship bill. On our CertByte segment, a look at ISC2’s CISSP exam. Google updates its stance on AI weapons. </p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CertByte Segment</h2><p>Welcome to CertByte! On this bi-weekly segment hosted by<a href="https://www.linkedin.com/in/chrisharepmp/"> Chris Hare</a>.</p><p>This week, Chris is joined by <a href="https://www.linkedin.com/in/steven-burnley-1a0a5013/">Steven Burnley</a> to break down a question targeting ISC2®'s CISSP - Certified Information Systems Security Professional) exam. Today’s question comes from <a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-pro/">N2K’s ISC2® CISSP - Certified Information Systems Security Professional Practice Test</a>.</p><p>Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at <a href="http://n2k.com/certify?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1738617724211.1738624366129.288&amp;__hssc=223811332.3.1738624366129&amp;__hsfp=3017050130">n2k.com/certify</a>. </p><p>Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.</p><h2><br></h2><h2>Selected Reading</h2><p><a href="https://www.wired.com/story/federal-workers-sue-over-doge-server/">Federal Workers Sue to Disconnect DOGE Server</a> (WIRED)</p><p><a href="https://therecord.media/treasury-payments-system-doge-read-only">Treasury says DOGE review has ‘read-only’ access to federal payments system</a> (The Record)</p><p><a href="https://www.404media.co/things-are-going-to-get-intense-how-a-musk-ally-plans-to-push-ai-on-the-government/">‘Things Are Going to Get Intense:’ How a Musk Ally Plans to Push AI on the Government</a> (404 Media)</p><p><a href="https://cyberscoop.com/musk-doge-opm-treasury-breach/">Cybersecurity, government experts are aghast at security failures in DOGE takeover</a> (CyberScoop)</p><p><a href="https://www.infosecurity-magazine.com/news/five-eyes-guidance-improve-edge/">Five Eyes Launch Guidance to Improve Edge Device Security</a> (Infosecurity Magazine)</p><p><a href="https://cybersecuritynews.com/apples-macos-kernel-vulnerability-let-attackers-escalate-privileges/">Apple's MacOS Kernel Vulnerability Let Attackers Escalate Privileges - PoC Released</a> (Cyber Security News) </p><p><a href="https://www.securityweek.com/chrome-133-firefox-135-patch-high-severity-vulnerabilities/">Chrome 133, Firefox 135 Patch High-Severity Vulnerabilities</a> (SecurityWeek)</p><p><a href="https://socradar.io/veeam-cve-2025-23114-servers-remote-code-execution/">Critical Veeam Vulnerability (CVE-2025-23114) Exposes Backup Servers to Remote Code Execution</a> (SOCRadar)</p><p><a href="https://techcrunch.com/2025/02/05/router-maker-zyxel-tells-customers-to-replace-vulnerable-hardware-exploited-by-hackers/">Router maker Zyxel tells customers to replace vulnerable hardware exploited by hackers</a> (TechCrunch)</p><p><a href="https://www.theregister.com/2025/02/05/google_espionage_charges/">US cranks up espionage charges against ex-Googler accused of trade secrets heist</a> (The Register)</p><p><a href="https://cybersecuritynews.com/cisa-releases-nine-advisories-detailing-vulnerabilities/">CISA Releases Nine Advisories Detailing vulnerabilities and Exploits Surrounding ICS</a> (Cyber Security News)</p><p><a href="https://federalnewsnetwork.com/cybersecurity/2025/02/cisa-hires-former-dhs-cio-into-top-cyber-position/">CISA hires former DHS CIO into top cyber position</a> (Federal News Network)</p><p><a href="https://therecord.media/pivott-act-returns-cyber-scholarships-rep-mark-green">Proposal for federal cyber scholarship, with service requirement, returns in House</a> (The Record)</p><p><a href="https://www.washingtonpost.com/technology/2025/02/04/google-ai-policies-weapons-harm/">Google drops pledge not to use AI for weapons or surveillance</a> (Washington Post)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1634</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[661a54e8-d378-11ef-84f5-abdf726232dd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1876464524.mp3?updated=1738785814" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A wolf in DOGE’s clothing?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2238/notes</link>
      <description>DOGE’s unchecked access to federal networks sparks major cybersecurity fears. Senator Hawley’s AI ban targets China and raises free speech concerns. Apple service ticket portal vulnerability exposed millions of users’ data. North Korean ‘FlexibleFerret’ malware targets macos via job scams and fake zoom apps. February 2025 android security update fixes 48 vulnerabilities, including exploited zero-day. Grubhub data breach exposes customer and driver information. Abandoned cloud infrastructure creates major security risks. Texas to launch its own Cyber Command amid rising cyber threats. Dell PowerProtect vulnerabilities pose critical security risks. On our Threat Vector segment, David Moulton and his guests look at the potential dangers of DeepSeek. U.S. Government is quietly altering the Head Start database. And a moment of inspiration from a spacefaring poet.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
Artificial intelligence is advancing fast, but with innovation comes risk. In this segment of Threat Vector, host David Moulton sits down with Sam Rubin, SVP of Consulting and Threat Intelligence at Unit 42, and Kyle Wilhoit, Director of Threat Research, to explore the vulnerabilities of DeepSeek, a new large language model. To listen to the full discussion, please check out the episode here or on your favorite podcast app, and tune in to new episodes of Threat Vector by Palo Alto Networks﻿ every Thursday. 

Selected Reading
Musk’s DOGE effort could spread malware, expose US systems to threat actors (CSO Online)
As DOGE teams plug into federal networks, cybersecurity risks could be huge, experts say (The Record)
Senator Hawley Proposes Jail Time for People Who Download DeepSeek (404 Media)
Apple Service Ticket portal Vulnerability Exposes Millions of Users Data (Cyber Security News) 
N. Korean ‘FlexibleFerret’ Malware Hits macOS with Fake Zoom, Job Scams (Hackread)
Google fixes Android kernel zero-day exploited in attacks (Bleeping Computer)
GrubHub Data Breach - Customers Phone Numbers Exposed (Cyber Security News) 
Here’s all the ways an abandoned cloud instance can cause security issues (CyberScoop)
Texas to Establish Cyber Command Amid “Dramatic” Rise in Attacks (Infosecurity Magazine)
Multiple Dell PowerProtect Vulnerabilities Let Attackers Compromise System (Cyber Security News) 
‘Forbidden Words’: Github Reveals How Software Engineers Are Purging Federal Databases (404 Media) 
T-Minus Deep Space: Inspiration4 with Dr. Sian “Leo” Proctor. (T-Minus Deep Space podcast)
Dr. Sian Proctor got her ticket to space after being selected for her poetry (Instagram) 
2025 SpaceCom: Interview with Dr. Sian Proctor (YouTube) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Feb 2025 21:10:00 -0000</pubDate>
      <itunes:title>A wolf in DOGE’s clothing?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2238</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>DOGE’s unchecked access to federal networks sparks major cybersecurity fears. Senator Hawley’s AI ban targets China and raises free speech concerns. Apple service ticket portal vulnerability exposed millions of users’ data. North Korean ‘FlexibleFerret’ malware targets macos via job scams and fake zoom apps. February 2025 android security update fixes 48 vulnerabilities, including exploited zero-day. Grubhub data breach exposes customer and driver information. Abandoned cloud infrastructure creates major security risks. Texas to launch its own Cyber Command amid rising cyber threats. Dell PowerProtect vulnerabilities pose critical security risks. On our Threat Vector segment, David Moulton and his guests look at the potential dangers of DeepSeek. U.S. Government is quietly altering the Head Start database. And a moment of inspiration from a spacefaring poet.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
Artificial intelligence is advancing fast, but with innovation comes risk. In this segment of Threat Vector, host David Moulton sits down with Sam Rubin, SVP of Consulting and Threat Intelligence at Unit 42, and Kyle Wilhoit, Director of Threat Research, to explore the vulnerabilities of DeepSeek, a new large language model. To listen to the full discussion, please check out the episode here or on your favorite podcast app, and tune in to new episodes of Threat Vector by Palo Alto Networks﻿ every Thursday. 

Selected Reading
Musk’s DOGE effort could spread malware, expose US systems to threat actors (CSO Online)
As DOGE teams plug into federal networks, cybersecurity risks could be huge, experts say (The Record)
Senator Hawley Proposes Jail Time for People Who Download DeepSeek (404 Media)
Apple Service Ticket portal Vulnerability Exposes Millions of Users Data (Cyber Security News) 
N. Korean ‘FlexibleFerret’ Malware Hits macOS with Fake Zoom, Job Scams (Hackread)
Google fixes Android kernel zero-day exploited in attacks (Bleeping Computer)
GrubHub Data Breach - Customers Phone Numbers Exposed (Cyber Security News) 
Here’s all the ways an abandoned cloud instance can cause security issues (CyberScoop)
Texas to Establish Cyber Command Amid “Dramatic” Rise in Attacks (Infosecurity Magazine)
Multiple Dell PowerProtect Vulnerabilities Let Attackers Compromise System (Cyber Security News) 
‘Forbidden Words’: Github Reveals How Software Engineers Are Purging Federal Databases (404 Media) 
T-Minus Deep Space: Inspiration4 with Dr. Sian “Leo” Proctor. (T-Minus Deep Space podcast)
Dr. Sian Proctor got her ticket to space after being selected for her poetry (Instagram) 
2025 SpaceCom: Interview with Dr. Sian Proctor (YouTube) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>DOGE’s unchecked access to federal networks sparks major cybersecurity fears. Senator Hawley’s AI ban targets China and raises free speech concerns. Apple service ticket portal vulnerability exposed millions of users’ data. North Korean ‘FlexibleFerret’ malware targets macos via job scams and fake zoom apps. February 2025 android security update fixes 48 vulnerabilities, including exploited zero-day. Grubhub data breach exposes customer and driver information. Abandoned cloud infrastructure creates major security risks. Texas to launch its own Cyber Command amid rising cyber threats. Dell PowerProtect vulnerabilities pose critical security risks. On our Threat Vector segment, David Moulton and his guests look at the potential dangers of DeepSeek. U.S. Government is quietly altering the Head Start database. And a moment of inspiration from a spacefaring poet.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Threat Vector Segment</h2><p>Artificial intelligence is advancing fast, but with innovation comes risk. In this segment of Threat Vector, host <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a> sits down with <a href="https://www.linkedin.com/in/samsrubin/">Sam Rubin</a>, SVP of Consulting and Threat Intelligence at Unit 42, and <a href="https://www.linkedin.com/in/kylewilhoit/">Kyle Wilhoit</a>, Director of Threat Research, to explore the vulnerabilities of DeepSeek, a new large language model. To listen to the full discussion, please check out the episode<a href="https://thecyberwire.com/podcasts/threat-vector/901/notes"> here</a> or on your favorite podcast app, and tune in to new episodes of<a href="https://thecyberwire.com/podcasts/threat-vector"> Threat Vector</a> by<a href="https://www.paloaltonetworks.com/"> Palo Alto Networks</a>﻿ every Thursday. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.csoonline.com/article/3815925/musks-doge-effort-could-spread-malware-expose-us-systems-to-threat-actors.html">Musk’s DOGE effort could spread malware, expose US systems to threat actors</a> (CSO Online)</p><p><a href="https://therecord.media/doge-opm-treasury-cybersecurity">As DOGE teams plug into federal networks, cybersecurity risks could be huge, experts say</a> (The Record)</p><p><a href="https://www.404media.co/senator-hawley-proposes-jail-time-for-people-who-download-deepseek/">Senator Hawley Proposes Jail Time for People Who Download DeepSeek</a> (404 Media)</p><p><a href="https://cybersecuritynews.com/apple-service-ticket-portal-vulnerability/">Apple Service Ticket portal Vulnerability Exposes Millions of Users Data</a> (Cyber Security News) </p><p><a href="https://hackread.com/north-korea-flexibleferret-malware-macos-fake-zoom-job-scams/">N. Korean ‘FlexibleFerret’ Malware Hits macOS with Fake Zoom, Job Scams</a> (Hackread)</p><p><a href="https://www.bleepingcomputer.com/news/security/google-fixes-android-kernel-zero-day-exploited-in-attacks/">Google fixes Android kernel zero-day exploited in attacks</a> (Bleeping Computer)</p><p><a href="https://cybersecuritynews.com/grubhub-data-breach/">GrubHub Data Breach - Customers Phone Numbers Exposed</a> (Cyber Security News) </p><p><a href="https://cyberscoop.com/abandoned-cloud-aws-s3-buckets-security-risk-watchtowr/">Here’s all the ways an abandoned cloud instance can cause security issues</a> (CyberScoop)</p><p><a href="https://www.infosecurity-magazine.com/news/texas-cyber-command-rise-attacks/">Texas to Establish Cyber Command Amid “Dramatic” Rise in Attacks</a> (Infosecurity Magazine)</p><p><a href="https://cybersecuritynews.com/multiple-dell-powerprotect-vulnerabilities/">Multiple Dell PowerProtect Vulnerabilities Let Attackers Compromise System</a> (Cyber Security News) </p><p><a href="https://www.404media.co/forbidden-words-github-reveals-how-software-engineers-are-purging-federal-databases/">‘Forbidden Words’: Github Reveals How Software Engineers Are Purging Federal Databases</a> (404 Media) </p><p><a href="https://space.n2k.com/podcasts/t-minus/ds82">T-Minus Deep Space: Inspiration4 with Dr. Sian “Leo” Proctor.</a> (T-Minus Deep Space podcast)</p><p><a href="https://www.instagram.com/reel/DFnkHwwRF0X/?igsh=MWxhZnM2Z2h4cjN1cQ==">Dr. Sian Proctor got her ticket to space after being selected for her poetry</a> (Instagram) </p><p><a href="https://youtu.be/EandEVBAxiM">2025 SpaceCom: Interview with Dr. Sian Proctor</a> (YouTube) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1614</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a069ddd0-e327-11ef-b103-db5630a2b7ca]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6556942466.mp3?updated=1738705879" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Federal agencies in power struggle crossfire. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2237/notes</link>
      <description>Federal agencies become battlegrounds in an unprecedented power struggle. XE Group evolves from credit-card skimming to exploiting zero-day vulnerabilities. WhatsApp uncovers a zero-click spyware attack linked to an Israeli firm.Texas expands its ban on Chinese-backed AI and social media apps. Data breaches expose the personal and medical information of over a million people.NVIDIA patches multiple critical vulnerabilities. Arm discloses critical vulnerabilities affecting its Mali GPU Kernel Drivers and firmware. The UK government aims to set the global standard for securing AI. Tim Starks from CyberScoop has the latest from Senate confirmation hearings. The National Cryptologic Museum rights a wrong. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Joining us today is Tim Starks, Senior Reporter from CyberScoop, to discuss two of his recent articles: 

FBI nominee Kash Patel getting questions on cybercrime investigations, Silk Road founder, surveillance powers

Even the US government can fall victim to cryptojacking


Selected Reading
Top Security Officials at Aid Agency Put on Leave After Denying Access to Musk Team (New York Times)
Exclusive: Musk aides lock workers out of OPM computer system (Reuters)
Federal Workers Block Doors of Admin Building Over Elon Musk Data Breach (DC Media Group)
Trump Broke the Federal Email System and Government Employees Got Blasted With Astonishingly Vulgar Messages (Futurism)
CISA employees told they are exempt from federal worker resignation program (The Record)
From credit card fraud to zero-day exploits: Xe Group expanding cybercriminal efforts (CyberScoop)
Israeli Firm Paragon Attack WhatsApp With New Zero-Click Spyware (Cyber Security News)
Texas Gov. Greg Abbott bans DeepSeek, RedNote and other Chinese-backed AI platforms (Statesman)
Hundreds of Thousands Hit by Data Breaches at Healthcare Firms in Colorado, North Carolina (SecurityWeek)
Insurance Company Globe Life Notifying 850,000 People of Data Breach (SecurityWeek)
NVIDIA GPU Display Driver Vulnerability Lets Attackers Steal Files Remotely - Update Now (Cyber Security News)
Arm Mali GPU Kernel Driver 0-Day Vulnerability Actively Exploited in the Wild (Cyber Security News)
UK Announces “World-First” AI Security Standard (Infosecurity Magazine)
Larry Pfeiffer on Bluesky (Bluesky)
Possibly related to the Bluesky post: Trailblazers in U.S. Cryptologic History 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 03 Feb 2025 21:00:00 -0000</pubDate>
      <itunes:title>Federal agencies in power struggle crossfire. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2237</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Federal agencies become battlegrounds in an unprecedented power struggle. XE Group evolves from credit-card skimming to exploiting zero-day vulnerabilities. WhatsApp uncovers a zero-click spyware attack linked to an Israeli firm.Texas expands its ban on Chinese-backed AI and social media apps. Data breaches expose the personal and medical information of over a million people.NVIDIA patches multiple critical vulnerabilities. Arm discloses critical vulnerabilities affecting its Mali GPU Kernel Drivers and firmware. The UK government aims to set the global standard for securing AI. Tim Starks from CyberScoop has the latest from Senate confirmation hearings. The National Cryptologic Museum rights a wrong. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Joining us today is Tim Starks, Senior Reporter from CyberScoop, to discuss two of his recent articles: 

FBI nominee Kash Patel getting questions on cybercrime investigations, Silk Road founder, surveillance powers

Even the US government can fall victim to cryptojacking


Selected Reading
Top Security Officials at Aid Agency Put on Leave After Denying Access to Musk Team (New York Times)
Exclusive: Musk aides lock workers out of OPM computer system (Reuters)
Federal Workers Block Doors of Admin Building Over Elon Musk Data Breach (DC Media Group)
Trump Broke the Federal Email System and Government Employees Got Blasted With Astonishingly Vulgar Messages (Futurism)
CISA employees told they are exempt from federal worker resignation program (The Record)
From credit card fraud to zero-day exploits: Xe Group expanding cybercriminal efforts (CyberScoop)
Israeli Firm Paragon Attack WhatsApp With New Zero-Click Spyware (Cyber Security News)
Texas Gov. Greg Abbott bans DeepSeek, RedNote and other Chinese-backed AI platforms (Statesman)
Hundreds of Thousands Hit by Data Breaches at Healthcare Firms in Colorado, North Carolina (SecurityWeek)
Insurance Company Globe Life Notifying 850,000 People of Data Breach (SecurityWeek)
NVIDIA GPU Display Driver Vulnerability Lets Attackers Steal Files Remotely - Update Now (Cyber Security News)
Arm Mali GPU Kernel Driver 0-Day Vulnerability Actively Exploited in the Wild (Cyber Security News)
UK Announces “World-First” AI Security Standard (Infosecurity Magazine)
Larry Pfeiffer on Bluesky (Bluesky)
Possibly related to the Bluesky post: Trailblazers in U.S. Cryptologic History 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Federal agencies become battlegrounds in an unprecedented power struggle. XE Group evolves from credit-card skimming to exploiting zero-day vulnerabilities. WhatsApp uncovers a zero-click spyware attack linked to an Israeli firm.Texas expands its ban on Chinese-backed AI and social media apps. Data breaches expose the personal and medical information of over a million people.NVIDIA patches multiple critical vulnerabilities. Arm discloses critical vulnerabilities affecting its Mali GPU Kernel Drivers and firmware. The UK government aims to set the global standard for securing AI. Tim Starks from CyberScoop has the latest from Senate confirmation hearings. The National Cryptologic Museum rights a wrong. </p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p><br></p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Joining us today is <a href="https://www.linkedin.com/in/tstarks/">Tim Starks</a>, Senior Reporter from CyberScoop, to discuss two of his recent articles: </p><ul>
<li><a href="https://cyberscoop.com/fbi-nominee-kash-patel-cybercrime-silk-road-surveillance-powers/">FBI nominee Kash Patel getting questions on cybercrime investigations, Silk Road founder, surveillance powers</a></li>
<li><a href="https://fedscoop.com/cryptojacking-federal-government-agencies-usaid/">Even the US government can fall victim to cryptojacking</a></li>
</ul><p><br></p><h2>Selected Reading</h2><p><a href="https://www.nytimes.com/2025/02/02/us/politics/usaid-official-leave-musk.html">Top Security Officials at Aid Agency Put on Leave After Denying Access to Musk Team</a> (New York Times)</p><p><a href="https://www.reuters.com/world/us/musk-aides-lock-government-workers-out-computer-systems-us-agency-sources-say-2025-01-31/">Exclusive: Musk aides lock workers out of OPM computer system</a> (Reuters)</p><p><a href="https://dcmediagroup.us/2025/02/02/federal-workers-block-doors-of-admin-building-over-elon-musk-data-breach/">Federal Workers Block Doors of Admin Building Over Elon Musk Data Breach</a> (DC Media Group)</p><p><a href="https://futurism.com/the-byte/trump-email-system">Trump Broke the Federal Email System and Government Employees Got Blasted With Astonishingly Vulgar Messages</a> (Futurism)</p><p><a href="https://therecord.media/cisa-employees-told-they-are-exempt-deferred-resignation?ref=metacurity.com">CISA employees told they are exempt from federal worker resignation program</a> (The Record)</p><p><a href="https://cyberscoop.com/xegroup-zero-day-exploit-intezer-labs-solis-security-vietnam/">From credit card fraud to zero-day exploits: Xe Group expanding cybercriminal efforts</a> (CyberScoop)</p><p><a href="https://cybersecuritynews.com/zero-click-spyware-attack-whatsapp/">Israeli Firm Paragon Attack WhatsApp With New Zero-Click Spyware</a> (Cyber Security News)</p><p><a href="https://www.statesman.com/story/business/technology/2025/01/31/deepseek-rednote-ban-abbott-texas-artificial-intelligence/78093529007/">Texas Gov. Greg Abbott bans DeepSeek, RedNote and other Chinese-backed AI platforms</a> (Statesman)</p><p><a href="https://www.securityweek.com/hundreds-of-thousands-hit-by-data-breaches-at-healthcare-firms-in-colorado-north-carolina/">Hundreds of Thousands Hit by Data Breaches at Healthcare Firms in Colorado, North Carolina</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/insurance-company-globe-life-notifying-850000-people-of-data-breach/">Insurance Company Globe Life Notifying 850,000 People of Data Breach</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/nvidia-gpu-display-driver-vulnerability-lets-attackers-steal-files-remotely-update-now/">NVIDIA GPU Display Driver Vulnerability Lets Attackers Steal Files Remotely - Update Now</a> (Cyber Security News)</p><p><a href="https://cybersecuritynews.com/arm-mali-gpu-kernel-driver-zero-day-vulnerability/">Arm Mali GPU Kernel Driver 0-Day Vulnerability Actively Exploited in the Wild</a> (Cyber Security News)</p><p><a href="https://www.infosecurity-magazine.com/news/uk-announces-worldfirst-ai-standard/">UK Announces “World-First” AI Security Standard</a> (Infosecurity Magazine)</p><p><a href="https://bsky.app/profile/larrypfeifferdc.bsky.social/post/3lh637hlitc2w">Larry Pfeiffer on Bluesky</a> (Bluesky)</p><ul><li>Possibly related to the Bluesky post: <a href="https://x.com/cryptoron/status/1885983208853905771">Trailblazers in U.S. Cryptologic History</a> </li></ul><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p><br></p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1586</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[65995c1c-d378-11ef-84f5-ffc0248066fc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7924440795.mp3?updated=1738610552" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Margaret Cunningham: A people scientist with a technology focus. [Behavioral science} [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/53/notes</link>
      <description>Please enjoy this encore episode with Principal Research Scientist for Human Behavior at Forcepoint, Margaret Cunningham. She shares her story of how she landed in cybersecurity. With a background in psychology and counseling and not feeling that one-on-one counseling was her thing, Margaret had a transformational moment in her PhD program in applied experimental technology when she realized she could "provide helping services and good work services at a broader scale." Margaret found her professional footing at DHS's Human Systems Integration Branch of Science and Technology Department as the person who figured out how to measure how new technologies impacted human performance. Margaret points out that making connections and reading whatever you can is important to stay up to date in the field. She notes that her statistical analysis skills are an asset. She hopes to create champions in human behavior and performance in the world of technology. We thank Margaret for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 02 Feb 2025 08:00:00 -0000</pubDate>
      <itunes:title>Margaret Cunningham: A people scientist with a technology focus. [Behavioral science} [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>53</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/483af4d8-d9da-11ef-a496-570ff9115176/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode with Principal Research Scientist for Human Behavior at Forcepoint, Margaret Cunningham. She shares her story of how she landed in cybersecurity. With a background in psychology and counseling and not feeling that one-on-one counseling was her thing, Margaret had a transformational moment in her PhD program in applied experimental technology when she realized she could "provide helping services and good work services at a broader scale." Margaret found her professional footing at DHS's Human Systems Integration Branch of Science and Technology Department as the person who figured out how to measure how new technologies impacted human performance. Margaret points out that making connections and reading whatever you can is important to stay up to date in the field. She notes that her statistical analysis skills are an asset. She hopes to create champions in human behavior and performance in the world of technology. We thank Margaret for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode with Principal Research Scientist for Human Behavior at Forcepoint, Margaret Cunningham. She shares her story of how she landed in cybersecurity. With a background in psychology and counseling and not feeling that one-on-one counseling was her thing, Margaret had a transformational moment in her PhD program in applied experimental technology when she realized she could "provide helping services and good work services at a broader scale." Margaret found her professional footing at DHS's Human Systems Integration Branch of Science and Technology Department as the person who figured out how to measure how new technologies impacted human performance. Margaret points out that making connections and reading whatever you can is important to stay up to date in the field. She notes that her statistical analysis skills are an asset. She hopes to create champions in human behavior and performance in the world of technology. We thank Margaret for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>416</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[483af4d8-d9da-11ef-a496-570ff9115176]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2184543487.mp3?updated=1737672002" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A Digital Eye on supply-chain-based espionage attacks. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/363/notes</link>
      <description>This week, Dave Bittner is joined by Juan Andres Guerrero-Saade (JAGS) from SentinelOne's SentinelLabs to discuss the work his team and Tinexta Cyber did on "Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels." 

Tinexta Cyber and SentinelLabs have been tracking threat activities targeting business-to-business IT service providers in Southern Europe. Based on the malware, infrastructure, techniques used, victimology, and the timing of the activities, we assess that it is highly likely these attacks were conducted by a China-nexus threat actor with cyberespionage motivations.

The relationships between European countries and China are complex, characterized by cooperation, competition, and underlying tensions in areas such as trade, investment, and technology. Suspected China-linked cyberespionage groups frequently target public and private organizations across Europe to gather strategic intelligence, gain competitive advantages, and advance geopolitical, economic, and technological interests.

The research can be found here:
Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Feb 2025 08:00:00 -0000</pubDate>
      <itunes:title>A Digital Eye on supply-chain-based espionage attacks. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>363</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a9934928-e016-11ef-9cc6-efd6dcba4210/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, Dave Bittner is joined by Juan Andres Guerrero-Saade (JAGS) from SentinelOne's SentinelLabs to discuss the work his team and Tinexta Cyber did on "Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels." 

Tinexta Cyber and SentinelLabs have been tracking threat activities targeting business-to-business IT service providers in Southern Europe. Based on the malware, infrastructure, techniques used, victimology, and the timing of the activities, we assess that it is highly likely these attacks were conducted by a China-nexus threat actor with cyberespionage motivations.

The relationships between European countries and China are complex, characterized by cooperation, competition, and underlying tensions in areas such as trade, investment, and technology. Suspected China-linked cyberespionage groups frequently target public and private organizations across Europe to gather strategic intelligence, gain competitive advantages, and advance geopolitical, economic, and technological interests.

The research can be found here:
Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, Dave Bittner is joined by Juan Andres Guerrero-Saade (JAGS) from <a href="https://www.sentinelone.com/labs/">SentinelOne</a>'s SentinelLabs to discuss the work his team and Tinexta Cyber did on "Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels." </p><p><br></p><p>Tinexta Cyber and SentinelLabs have been tracking threat activities targeting business-to-business IT service providers in Southern Europe. Based on the malware, infrastructure, techniques used, victimology, and the timing of the activities, we assess that it is highly likely these attacks were conducted by a China-nexus threat actor with cyberespionage motivations.</p><p><br></p><p>The relationships between European countries and China are complex, characterized by cooperation, competition, and underlying tensions in areas such as trade, investment, and technology. Suspected China-linked cyberespionage groups <a href="https://cert.europa.eu/static/files/TLP-CLEAR-JointPublication-23-01.pdf">frequently target</a> public and private organizations across Europe to gather strategic intelligence, gain competitive advantages, and advance geopolitical, economic, and technological interests.</p><h3><br></h3><h3>The research can be found here:</h3><ul><li><a href="https://www.sentinelone.com/labs/operation-digital-eye-chinese-apt-compromises-critical-digital-infrastructure-via-visual-studio-code-tunnels/">Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1447</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a9934928-e016-11ef-9cc6-efd6dcba4210]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9286479973.mp3?updated=1738358048" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The end of a cybercrime empire.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2236/notes</link>
      <description>Authorities dismantle a Pakistan-based cybercrime network. Lawmakers question the feasibility of establishing a U.S. Cyber Force as a standalone military branch. The DOJ sues to block HPE’s acquisition of Juniper Networks. Tangerine Turkey deploys cryptomining malware. Major healthcare providers send breach notifications. Norwegian police seize a Russian-crewed ship suspected of damaging a communications cable. Researchers discover critical vulnerabilities in GitHub Copilot. D-Link patches a critical router vulnerability. CISA and the FDA have warned U.S. healthcare organizations of severe security vulnerabilities in Chinese-made patient monitors. Pauses in funding create confusion for federal cybersecurity vendors. We bid a fond farewell to a pair of N2K colleagues. The case of the disappearing government data. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest segment is bittersweet as we offer our thanks and see you laters to two of our beloved colleagues N2K President Simone Petrella, who’s taking her leadership role to our advisory board, and Executive Editor Brandon Karpf, who will be taking up the mantle of protecting our national security starting his own company, Hedy Cyber. Join us in celebrating their incredible journeys, contributions to our successes, and letting them both know just how deeply they will be missed by all of us here at N2K.

Selected Reading
US, Dutch Authorities Disrupt Pakistani Hacking Shop Network (SecurityWeek)
Lawmakers push for guardrails, deadline on cyber military study (The Record)
US Sues to Stop HPE $14 Billion Deal to Buy Juniper Networks (Bloomberg)
Tangerine Turkey mines cryptocurrency in global campaign (Red Canary)
US healthcare provider data breach impacts 1 million patients (Bleeping Computer)
NorthBay Health Data Breach Impacts 569,000 Individuals (SecurityWeek)
Norway seizes ship suspected of sabotage, says crew are Russian nationals (The Record)
GitHub Copilot Jailbreak Vulnerability Let Attackers Train Malicious Models (Cyber Security News)
D-Link Routers Vulnerability Let Attackers Gain Full Router Control Remotely (Cyber Security News)
CISA, FDA Warn of Dangerous Backdoor in Contec Patient Monitors (SecurityWeek)
Federal Cybersecurity Contractors Whiplashed By Uncertainty (GovInfo Security)
Archivists Work to Identify and Save the Thousands of Datasets Disappearing From Data.gov (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 31 Jan 2025 21:10:00 -0000</pubDate>
      <itunes:title>The end of a cybercrime empire.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2236</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Authorities dismantle a Pakistan-based cybercrime network. Lawmakers question the feasibility of establishing a U.S. Cyber Force as a standalone military branch. The DOJ sues to block HPE’s acquisition of Juniper Networks. Tangerine Turkey deploys cryptomining malware. Major healthcare providers send breach notifications. Norwegian police seize a Russian-crewed ship suspected of damaging a communications cable. Researchers discover critical vulnerabilities in GitHub Copilot. D-Link patches a critical router vulnerability. CISA and the FDA have warned U.S. healthcare organizations of severe security vulnerabilities in Chinese-made patient monitors. Pauses in funding create confusion for federal cybersecurity vendors. We bid a fond farewell to a pair of N2K colleagues. The case of the disappearing government data. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest segment is bittersweet as we offer our thanks and see you laters to two of our beloved colleagues N2K President Simone Petrella, who’s taking her leadership role to our advisory board, and Executive Editor Brandon Karpf, who will be taking up the mantle of protecting our national security starting his own company, Hedy Cyber. Join us in celebrating their incredible journeys, contributions to our successes, and letting them both know just how deeply they will be missed by all of us here at N2K.

Selected Reading
US, Dutch Authorities Disrupt Pakistani Hacking Shop Network (SecurityWeek)
Lawmakers push for guardrails, deadline on cyber military study (The Record)
US Sues to Stop HPE $14 Billion Deal to Buy Juniper Networks (Bloomberg)
Tangerine Turkey mines cryptocurrency in global campaign (Red Canary)
US healthcare provider data breach impacts 1 million patients (Bleeping Computer)
NorthBay Health Data Breach Impacts 569,000 Individuals (SecurityWeek)
Norway seizes ship suspected of sabotage, says crew are Russian nationals (The Record)
GitHub Copilot Jailbreak Vulnerability Let Attackers Train Malicious Models (Cyber Security News)
D-Link Routers Vulnerability Let Attackers Gain Full Router Control Remotely (Cyber Security News)
CISA, FDA Warn of Dangerous Backdoor in Contec Patient Monitors (SecurityWeek)
Federal Cybersecurity Contractors Whiplashed By Uncertainty (GovInfo Security)
Archivists Work to Identify and Save the Thousands of Datasets Disappearing From Data.gov (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Authorities dismantle a Pakistan-based cybercrime network. Lawmakers question the feasibility of establishing a U.S. Cyber Force as a standalone military branch. The DOJ sues to block HPE’s acquisition of Juniper Networks. Tangerine Turkey deploys cryptomining malware. Major healthcare providers send breach notifications. Norwegian police seize a Russian-crewed ship suspected of damaging a communications cable. Researchers discover critical vulnerabilities in GitHub Copilot. D-Link patches a critical router vulnerability. CISA and the FDA have warned U.S. healthcare organizations of severe security vulnerabilities in Chinese-made patient monitors. Pauses in funding create confusion for federal cybersecurity vendors. We bid a fond farewell to a pair of N2K colleagues. The case of the disappearing government data. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today’s guest segment is bittersweet as we offer our thanks and see you laters to two of our beloved colleagues <a href="https://www.n2k.com/">N2K</a> President <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a>, who’s taking her leadership role to our advisory board, and Executive Editor <a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a>, who will be taking up the mantle of protecting our national security starting his own company, Hedy Cyber. Join us in celebrating their incredible journeys, contributions to our successes, and letting them both know just how deeply they will be missed by all of us here at N2K.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/us-dutch-authorities-disrupt-pakistani-hacking-shop-network/">US, Dutch Authorities Disrupt Pakistani Hacking Shop Network</a> (SecurityWeek)</p><p><a href="https://therecord.media/lawmakers-push-for-guardrails-deadline-cyber-force-study">Lawmakers push for guardrails, deadline on cyber military study</a> (The Record)</p><p><a href="https://www.bloomberg.com/news/articles/2025-01-30/doj-sues-to-stop-hpe-s-14-billion-deal-to-buy-juniper-networks">US Sues to Stop HPE $14 Billion Deal to Buy Juniper Networks</a> (Bloomberg)</p><p><a href="https://redcanary.com/blog/threat-intelligence/tangerine-turkey/">Tangerine Turkey mines cryptocurrency in global campaign</a> (Red Canary)</p><p><a href="https://www.bleepingcomputer.com/news/security/us-healthcare-provider-data-breach-impacts-1-million-patients/">US healthcare provider data breach impacts 1 million patients</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/northbay-health-data-breach-impacts-569000-individuals/">NorthBay Health Data Breach Impacts 569,000 Individuals</a> (SecurityWeek)</p><p><a href="https://therecord.media/norway-seizes-ship-suspected-sabotage">Norway seizes ship suspected of sabotage, says crew are Russian nationals</a> (The Record)</p><p><a href="https://cybersecuritynews.com/github-copilot-jailbreak-vulnerability/">GitHub Copilot Jailbreak Vulnerability Let Attackers Train Malicious Models</a> (Cyber Security News)</p><p><a href="https://cybersecuritynews.com/d-link-routers-attackers-router-remotely/">D-Link Routers Vulnerability Let Attackers Gain Full Router Control Remotely</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/cisa-fda-warn-of-dangerous-backdoor-in-contec-patient-monitors/">CISA, FDA Warn of Dangerous Backdoor in Contec Patient Monitors</a> (SecurityWeek)</p><p><a href="https://www.govinfosecurity.com/federal-cybersecurity-contractors-whiplashed-by-uncertainty-a-27412">Federal Cybersecurity Contractors Whiplashed By Uncertainty</a> (GovInfo Security)</p><p><a href="https://www.404media.co/archivists-work-to-identify-and-save-the-thousands-of-datasets-disappearing-from-data-gov/">Archivists Work to Identify and Save the Thousands of Datasets Disappearing From Data.gov</a> (404 Media)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1850</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[655e8fe2-d378-11ef-84f5-9b35acbf0fdd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8912416834.mp3?updated=1738354340" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cracked and Nulled taken down. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2235/notes</link>
      <description>International law enforcement takes down a pair of notorious hacking forums. Wiz discovers an open DeepSeek database. Time Bandit jailbreaks ChatGPT. Ransomware hits one of the largest U.S. blood centers. A cyberattack takes the South African Weather Service offline. Researchers describe a new “browser syncjacking” attack. TeamViewer patches a high-severity privilege escalation flaw. Over three dozen industry groups urge Congress to pass a national data privacy law. CISA faces an uncertain future. N2K’s Brandon Karpf speaks with Ellen Chang, Vice President Ventures at BMNT and Head of BMNT Ventures. OpenAI Cries Foul After Getting a Taste of Its Own Medicine. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, N2K’s Brandon Karpf speaks with Ellen Chang, Vice President Ventures at BMNT and Head of BMNT Ventures, about the venture model, why it exists, how it works, and its impact.

Selected Reading
Police seizes Cracked and Nulled hacking forum servers, arrests suspects (Bleeping Computer)
Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information, Including Chat History (Wiz)
Time Bandit ChatGPT jailbreak bypasses safeguards on sensitive topics(Bleeping Computer)
US blood donation giant warns of disruption after ransomware attack (TechCrunch)
South Africa’s government-run weather service knocked offline by cyberattack (The Record)
Syncjacking Attack Enables Full Browser and Device Takeover (Infosecurity Magazine)
TeamViewer Patches High-Severity Vulnerability in Windows Applications (SecurityWeek)
Industry groups call on Congress to enact federal data privacy law (The Record)
US Cyber Agency’s Future Role in Elections Remains Murky Under the Trump Administration (SecurityWeek)
OpenAI Furious DeepSeek Might Have Stolen All the Data OpenAI Stole From Us (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 30 Jan 2025 21:00:00 -0000</pubDate>
      <itunes:title>Cracked and Nulled taken down. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2235</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>International law enforcement takes down a pair of notorious hacking forums. Wiz discovers an open DeepSeek database. Time Bandit jailbreaks ChatGPT. Ransomware hits one of the largest U.S. blood centers. A cyberattack takes the South African Weather Service offline. Researchers describe a new “browser syncjacking” attack. TeamViewer patches a high-severity privilege escalation flaw. Over three dozen industry groups urge Congress to pass a national data privacy law. CISA faces an uncertain future. N2K’s Brandon Karpf speaks with Ellen Chang, Vice President Ventures at BMNT and Head of BMNT Ventures. OpenAI Cries Foul After Getting a Taste of Its Own Medicine. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, N2K’s Brandon Karpf speaks with Ellen Chang, Vice President Ventures at BMNT and Head of BMNT Ventures, about the venture model, why it exists, how it works, and its impact.

Selected Reading
Police seizes Cracked and Nulled hacking forum servers, arrests suspects (Bleeping Computer)
Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information, Including Chat History (Wiz)
Time Bandit ChatGPT jailbreak bypasses safeguards on sensitive topics(Bleeping Computer)
US blood donation giant warns of disruption after ransomware attack (TechCrunch)
South Africa’s government-run weather service knocked offline by cyberattack (The Record)
Syncjacking Attack Enables Full Browser and Device Takeover (Infosecurity Magazine)
TeamViewer Patches High-Severity Vulnerability in Windows Applications (SecurityWeek)
Industry groups call on Congress to enact federal data privacy law (The Record)
US Cyber Agency’s Future Role in Elections Remains Murky Under the Trump Administration (SecurityWeek)
OpenAI Furious DeepSeek Might Have Stolen All the Data OpenAI Stole From Us (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>International law enforcement takes down a pair of notorious hacking forums. Wiz discovers an open DeepSeek database. Time Bandit jailbreaks ChatGPT. Ransomware hits one of the largest U.S. blood centers. A cyberattack takes the South African Weather Service offline. Researchers describe a new “browser syncjacking” attack. TeamViewer patches a high-severity privilege escalation flaw. Over three dozen industry groups urge Congress to pass a national data privacy law. CISA faces an uncertain future. N2K’s Brandon Karpf speaks with Ellen Chang, Vice President Ventures at BMNT and Head of BMNT Ventures. OpenAI Cries Foul After Getting a Taste of Its Own Medicine. </p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p><br></p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today, N2K’s Brandon Karpf speaks with <a href="https://www.linkedin.com/in/ellenmchang/">Ellen Chang</a>, Vice President Ventures at <a href="https://www.bmnt.com/">BMNT</a> and Head of BMNT Ventures, about the venture model, why it exists, how it works, and its impact.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/police-seizes-cracked-and-nulled-hacking-forum-servers-arrests-suspects/">Police seizes Cracked and Nulled hacking forum servers, arrests suspects</a> (Bleeping Computer)</p><p><a href="https://www.wiz.io/blog/wiz-research-uncovers-exposed-deepseek-database-leak">Wiz Research Uncovers Exposed DeepSeek Database Leaking Sensitive Information, Including Chat History</a> (Wiz)</p><p><a href="https://www.bleepingcomputer.com/news/security/time-bandit-chatgpt-jailbreak-bypasses-safeguards-on-sensitive-topics/">Time Bandit ChatGPT jailbreak bypasses safeguards on sensitive topics</a>(Bleeping Computer)</p><p><a href="https://techcrunch.com/2025/01/30/us-blood-donation-giant-warns-of-disruption-after-ransomware-attack/">US blood donation giant warns of disruption after ransomware attack</a> (TechCrunch)</p><p><a href="https://therecord.media/south-african-weather-service-cyberattack">South Africa’s government-run weather service knocked offline by cyberattack</a> (The Record)</p><p><a href="https://www.infosecurity-magazine.com/news/full-browser-device-takeover/">Syncjacking Attack Enables Full Browser and Device Takeover</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/teamviewer-patches-high-severity-vulnerability-in-windows-applications/">TeamViewer Patches High-Severity Vulnerability in Windows Applications</a> (SecurityWeek)</p><p><a href="https://therecord.media/industry-groups-congress-data-privacy">Industry groups call on Congress to enact federal data privacy law</a> (The Record)</p><p><a href="https://www.securityweek.com/us-cyber-agencys-future-role-in-elections-remains-murky-under-the-trump-administration/">US Cyber Agency’s Future Role in Elections Remains Murky Under the Trump Administration</a> (SecurityWeek)</p><p><a href="https://www.404media.co/openai-furious-deepseek-might-have-stolen-all-the-data-openai-stole-from-us/">OpenAI Furious DeepSeek Might Have Stolen All the Data OpenAI Stole From Us</a> (404 Media)</p><p><br></p><h2>Share your feedback.</h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><h2><br></h2><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p><br></p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1974</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[651e4856-d378-11ef-84f5-7b114f7f99e1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4116791902.mp3?updated=1738336907" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cats and RATS are all the rage.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2234/notes</link>
      <description>Hackers linked to China and Iran are using AI to enhance cyberattacks. An AI-powered messaging tool for Slack and Discord is reportedly leaking user data. British engineering giant Smiths Group suffers a cyberattack. Rockwell Automation details critical and high-severity vulnerabilities. Researchers warn of new side-channel vulnerabilities in Apple CPUs. The Hellcat ransomware gang looks to humiliate its victims. SparkRAT targets macOS users and government entities. Flashpoint looks at FleshStealer malware. Cybercriminals leverage trust in government websites. Our guest is Ivan Novikov, CEO at Wallarm, sharing insights on the recent United States ruling that bars certain Chinese and Russian connected car tech from being imported into the US. QR code shenanigans. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Ivan Novikov, CEO at Wallarm, sharing insights on the recent United States ruling that bars certain Chinese and Russian connected car tech from being imported into the US and its impact.

Selected Reading
Chinese and Iranian Hackers Are Using U.S. AI Products to Bolster Cyberattacks (Wall Street Journal)
Update: Cybercriminals still not fully on board the AI train (yet) (Sophos)
Unprotected AI service streams private Slack messages for 30 bucks a month (Cybernews)
Engineering giant Smiths Group discloses security breach (Bleeping Computer)
Rockwell Patches Critical, High-Severity Vulnerabilities in Several Products (SecurityWeek)
New Apple CPU side-channel attacks steal data from browsers (Bleeping Computer)
SLAP (Predictors Fail)
Meow-ware gang: the cyber cats who humiliate their prey (Cybernews)
Hackers Attacking Windows, macOS, and Linux systems With SparkRAT (GB Hackers)
Unmasking FleshStealer: A New Infostealer Threat in 2025 (Flashpoint)
Threat Actors Exploit Government Websites for Phishing (Infosecurity Magazine)
Christian Walther: "@gvy_dvpont Got me thinking… c…"  (Mastodon)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 29 Jan 2025 21:00:00 -0000</pubDate>
      <itunes:title>Cats and RATS are all the rage.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2234</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Hackers linked to China and Iran are using AI to enhance cyberattacks. An AI-powered messaging tool for Slack and Discord is reportedly leaking user data. British engineering giant Smiths Group suffers a cyberattack. Rockwell Automation details critical and high-severity vulnerabilities. Researchers warn of new side-channel vulnerabilities in Apple CPUs. The Hellcat ransomware gang looks to humiliate its victims. SparkRAT targets macOS users and government entities. Flashpoint looks at FleshStealer malware. Cybercriminals leverage trust in government websites. Our guest is Ivan Novikov, CEO at Wallarm, sharing insights on the recent United States ruling that bars certain Chinese and Russian connected car tech from being imported into the US. QR code shenanigans. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Ivan Novikov, CEO at Wallarm, sharing insights on the recent United States ruling that bars certain Chinese and Russian connected car tech from being imported into the US and its impact.

Selected Reading
Chinese and Iranian Hackers Are Using U.S. AI Products to Bolster Cyberattacks (Wall Street Journal)
Update: Cybercriminals still not fully on board the AI train (yet) (Sophos)
Unprotected AI service streams private Slack messages for 30 bucks a month (Cybernews)
Engineering giant Smiths Group discloses security breach (Bleeping Computer)
Rockwell Patches Critical, High-Severity Vulnerabilities in Several Products (SecurityWeek)
New Apple CPU side-channel attacks steal data from browsers (Bleeping Computer)
SLAP (Predictors Fail)
Meow-ware gang: the cyber cats who humiliate their prey (Cybernews)
Hackers Attacking Windows, macOS, and Linux systems With SparkRAT (GB Hackers)
Unmasking FleshStealer: A New Infostealer Threat in 2025 (Flashpoint)
Threat Actors Exploit Government Websites for Phishing (Infosecurity Magazine)
Christian Walther: "@gvy_dvpont Got me thinking… c…"  (Mastodon)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hackers linked to China and Iran are using AI to enhance cyberattacks. An AI-powered messaging tool for Slack and Discord is reportedly leaking user data. British engineering giant Smiths Group suffers a cyberattack. Rockwell Automation details critical and high-severity vulnerabilities. Researchers warn of new side-channel vulnerabilities in Apple CPUs. The Hellcat ransomware gang looks to humiliate its victims. SparkRAT targets macOS users and government entities. Flashpoint looks at FleshStealer malware. Cybercriminals leverage trust in government websites. Our guest is Ivan Novikov, CEO at Wallarm, sharing insights on the recent United States ruling that bars certain Chinese and Russian connected car tech from being imported into the US. QR code shenanigans. </p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p><br></p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/d0znpp/">Ivan Novikov</a>, CEO at <a href="https://www.wallarm.com/">Wallarm</a>, sharing insights on the recent United States <a href="https://www.documentcloud.org/documents/25487025-2025-00592/">ruling</a> that bars certain Chinese and Russian connected car tech from being imported into the US and its impact.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.wsj.com/tech/ai/chinese-and-iranian-hackers-are-using-u-s-ai-products-to-bolster-cyberattacks-ff3c5884">Chinese and Iranian Hackers Are Using U.S. AI Products to Bolster Cyberattacks</a> (Wall Street Journal)</p><p><a href="https://news.sophos.com/en-us/2025/01/28/update-cybercriminals-still-not-fully-on-board-the-ai-train-yet/">Update: Cybercriminals still not fully on board the AI train (yet)</a> (Sophos)</p><p><a href="https://cnews.link/unprotected-ai-service-streams-private-slack-messages-3/">Unprotected AI service streams private Slack messages for 30 bucks a month</a> (Cybernews)</p><p><a href="https://www.bleepingcomputer.com/news/security/engineering-giant-smiths-group-discloses-security-breach/">Engineering giant Smiths Group discloses security breach</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/rockwell-patches-critical-high-severity-vulnerabilities-in-several-products/">Rockwell Patches Critical, High-Severity Vulnerabilities in Several Products</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-apple-cpu-side-channel-attack-steals-data-from-browsers/">New Apple CPU side-channel attacks steal data from browsers</a> (Bleeping Computer)</p><p><a href="https://predictors.fail/">SLAP</a> (Predictors Fail)</p><p><a href="https://cnews.link/hellcat-ransomware-gang-analysis-1/">Meow-ware gang: the cyber cats who humiliate their prey</a> (Cybernews)</p><p><a href="https://gbhackers.com/hackers-attacking-windows-macos-and-linux-systems/">Hackers Attacking Windows, macOS, and Linux systems With SparkRAT</a> (GB Hackers)</p><p><a href="https://flashpoint.io/blog/fleshstealer-infostealer-threat-2025/">Unmasking FleshStealer: A New Infostealer Threat in 2025</a> (Flashpoint)</p><p><a href="https://www.infosecurity-magazine.com/news/threat-actors-exploit-gov-websites/">Threat Actors Exploit Government Websites for Phishing</a> (Infosecurity Magazine)</p><p><a href="https://mstdn.social/@isziaui/113874436953157913">Christian Walther: "@gvy_dvpont Got me thinking… c…" </a> (Mastodon)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p><br></p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1590</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[64d55114-d378-11ef-84f5-6fa52c12c3aa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9534295500.mp3?updated=1738182134" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>It was DDoS, not us. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2233/notes</link>
      <description>DeepSeek blames DDoS for recent outages. Hackers behind last year’s AT&amp;T data breach targeted members of the Trump family, Kamala Harris, and Marco Rubio’s wife.The EU sanctions Russians for cyberattacks against Estonia. ENGlobal confirms personal information was taken in last year’s ransomware attack. CISA issues a critical warning about a SonicWall vulnerability actively exploited. A large-scale phishing campaign exploits users’ trust in PDF files and the USPS. Apple patches a zero-day affecting many of their products. A ransomware attack on an Ohio-based operator of skilled nursing and rehabilitation facilities affects over 70,000. President Trump has a tumultuous first week back in office. Our guest is Bogdan Botezatu, Director, Threat Research and Reporting at Bitdefender, to discuss the dark market subculture and its parallels to holiday shopping. A nonprofit aims to clean up the AI industry’s mess. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
We are joined by Bogdan Botezatu, Director, Threat Research and Reporting at Bitdefender, to discuss the dark market subculture and its parallels to holiday shopping. Check out Bitdefender’s research on the topic here.

Selected Reading
DeepSeek Blames Disruption on Cyberattack as Vulnerabilities Emerge (SecurityWeek)
DeepSeek FAQ (Stratechery)
We tried out DeepSeek. It worked well, until we asked it about Tiananmen Square and Taiwan (The Guardian) 
Hackers Mined AT&amp;T Breach for Data on Trump's Family, Kamala Harris (404 Media)
European Union Sanctions Russian Nationals for Hacking Estonia (SecurityWeek)
ENGlobal Says Personal Information Accessed in Ransomware Attack (SecurityWeek)
CISA Warns of SonicWall 0-day RCE Vulnerability Exploited in Wild (Cyber Security News)
Hackers Use Malicious PDFs, pose as USPS in Mobile Phishing Scam (Security Boulevard)
Amazon Prime Security Warning As Hackers Strike—What You Need To Know (Forbes) 
Apple plugs exploited security hole in iOS, updates macOS (The Register)
Nursing Home, Rehab Chain Says Hack Affects Nearly 70,000 (GovInfo Security)
A Tumultuous Week for Federal Cybersecurity Efforts (Krebs on Security)
Initiative Aims to Enable Ethical Coding LLMs (IEEE Spectrum)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Jan 2025 21:00:00 -0000</pubDate>
      <itunes:title>It was DDoS, not us. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2233</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>DeepSeek blames DDoS for recent outages. Hackers behind last year’s AT&amp;T data breach targeted members of the Trump family, Kamala Harris, and Marco Rubio’s wife.The EU sanctions Russians for cyberattacks against Estonia. ENGlobal confirms personal information was taken in last year’s ransomware attack. CISA issues a critical warning about a SonicWall vulnerability actively exploited. A large-scale phishing campaign exploits users’ trust in PDF files and the USPS. Apple patches a zero-day affecting many of their products. A ransomware attack on an Ohio-based operator of skilled nursing and rehabilitation facilities affects over 70,000. President Trump has a tumultuous first week back in office. Our guest is Bogdan Botezatu, Director, Threat Research and Reporting at Bitdefender, to discuss the dark market subculture and its parallels to holiday shopping. A nonprofit aims to clean up the AI industry’s mess. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
We are joined by Bogdan Botezatu, Director, Threat Research and Reporting at Bitdefender, to discuss the dark market subculture and its parallels to holiday shopping. Check out Bitdefender’s research on the topic here.

Selected Reading
DeepSeek Blames Disruption on Cyberattack as Vulnerabilities Emerge (SecurityWeek)
DeepSeek FAQ (Stratechery)
We tried out DeepSeek. It worked well, until we asked it about Tiananmen Square and Taiwan (The Guardian) 
Hackers Mined AT&amp;T Breach for Data on Trump's Family, Kamala Harris (404 Media)
European Union Sanctions Russian Nationals for Hacking Estonia (SecurityWeek)
ENGlobal Says Personal Information Accessed in Ransomware Attack (SecurityWeek)
CISA Warns of SonicWall 0-day RCE Vulnerability Exploited in Wild (Cyber Security News)
Hackers Use Malicious PDFs, pose as USPS in Mobile Phishing Scam (Security Boulevard)
Amazon Prime Security Warning As Hackers Strike—What You Need To Know (Forbes) 
Apple plugs exploited security hole in iOS, updates macOS (The Register)
Nursing Home, Rehab Chain Says Hack Affects Nearly 70,000 (GovInfo Security)
A Tumultuous Week for Federal Cybersecurity Efforts (Krebs on Security)
Initiative Aims to Enable Ethical Coding LLMs (IEEE Spectrum)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>DeepSeek blames DDoS for recent outages. Hackers behind last year’s AT&amp;T data breach targeted members of the Trump family, Kamala Harris, and Marco Rubio’s wife.The EU sanctions Russians for cyberattacks against Estonia. ENGlobal confirms personal information was taken in last year’s ransomware attack. CISA issues a critical warning about a SonicWall vulnerability actively exploited. A large-scale phishing campaign exploits users’ trust in PDF files and the USPS. Apple patches a zero-day affecting many of their products. A ransomware attack on an Ohio-based operator of skilled nursing and rehabilitation facilities affects over 70,000. President Trump has a tumultuous first week back in office. Our guest is Bogdan Botezatu, Director, Threat Research and Reporting at Bitdefender, to discuss the dark market subculture and its parallels to holiday shopping. A nonprofit aims to clean up the AI industry’s mess. </p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p><br></p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>We are joined by <a href="https://www.linkedin.com/in/bogdanbotezatu/?originalSubdomain=ro">Bogdan Botezatu</a>, Director, Threat Research and Reporting at <a href="https://www.bitdefender.com/en-us/">Bitdefender</a>, to discuss the dark market subculture and its parallels to holiday shopping. Check out Bitdefender’s research on the topic <a href="https://bitdefender.com/en-us/blog/hotforsecurity/holiday-shopping-and-the-dark-market-parallel/">here</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/deepseek-blames-disruption-on-cyberattack-as-vulnerabilities-emerge/">DeepSeek Blames Disruption on Cyberattack as Vulnerabilities Emerge</a> (SecurityWeek)</p><p><a href="https://stratechery.com/2025/deepseek-faq/">DeepSeek FAQ</a> (Stratechery)</p><p><a href="https://www.theguardian.com/technology/2025/jan/28/we-tried-out-deepseek-it-works-well-until-we-asked-it-about-tiananmen-square-and-taiwan">We tried out DeepSeek. It worked well, until we asked it about Tiananmen Square and Taiwan</a> (The Guardian) </p><p><a href="https://www.404media.co/hackers-mined-at-t-breach-for-data-on-trumps-family-kamala-harris/">Hackers Mined AT&amp;T Breach for Data on Trump's Family, Kamala Harris</a> (404 Media)</p><p><a href="https://www.securityweek.com/european-union-sanctions-russian-nationals-for-hacking-estonia/">European Union Sanctions Russian Nationals for Hacking Estonia</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/englobal-says-personal-information-accessed-in-ransomware-attack/">ENGlobal Says Personal Information Accessed in Ransomware Attack</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/cisa-sonicwall-0-day-rce/">CISA Warns of SonicWall 0-day RCE Vulnerability Exploited in Wild</a> (Cyber Security News)</p><p><a href="https://securityboulevard.com/2025/01/hackers-use-malicious-pdfs-pose-as-usps-in-mobile-phishing-scam/">Hackers Use Malicious PDFs, pose as USPS in Mobile Phishing Scam</a> (Security Boulevard)</p><p><a href="https://www.forbes.com/sites/daveywinder/2025/01/28/amazon-prime-security-warning-as-hackers-strike-what-you-need-to-know/">Amazon Prime Security Warning As Hackers Strike—What You Need To Know</a> (Forbes) </p><p><a href="https://www.theregister.com/2025/01/28/apple_cve_2025_24085/">Apple plugs exploited security hole in iOS, updates macOS</a> (The Register)</p><p><a href="https://www.govinfosecurity.com/nursing-home-rehab-chain-says-hack-affects-nearly-70000-a-27386">Nursing Home, Rehab Chain Says Hack Affects Nearly 70,000</a> (GovInfo Security)</p><p><a href="https://krebsonsecurity.com/2025/01/a-tumultuous-week-for-federal-cybersecurity-efforts/">A Tumultuous Week for Federal Cybersecurity Efforts</a> (Krebs on Security)</p><p><a href="https://spectrum.ieee.org/coding-ai">Initiative Aims to Enable Ethical Coding LLMs</a> (IEEE Spectrum)</p><p><br></p><h2>Share your feedback.</h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p><br></p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1700</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6496a6bc-d378-11ef-84f5-77e883c21aec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1687845501.mp3?updated=1738097555" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>China's chatbot sends tech stocks into tailspin.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2232/notes</link>
      <description>Chinese AI startup DeepSeek shakes up the market. Trump freezes cyber diplomacy funding and puts a vital U.S.-EU data-sharing agreement at risk. A trojanized RAT targets script kiddies. U.K. telecom giant TalkTalk investigates a data breach. Researchers uncover a critical flaw in Meta’s Llama Stack AI framework. Attackers leverage hidden text salting in emails. The “FlowerStorm” phishing framework targets multiple brands to steal customer credentials. A critical zero-day hits SonicWall VPN appliances. Swedish authorities seized a cargo ship suspected of damaging a key fiber optic cable. Freezing out crypto-kidnappers. Our guest is Jon Miller, CEO and Co-founder from Halcyon, sharing trends in ransomware and insights on Brain Cipher. The British Museum defends its artefacts from IT attacks.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest today is Jon Miller, CEO and Co-founder from Halcyon, sharing trends in ransomware along with some insights on Brain Cipher. For more detail, check out Halcyon’s Power Rankings: Ransomware Malicious Quartile Q4-2024. 

Selected Reading
A shocking Chinese AI advancement called DeepSeek is sending US stocks plunging (CNN Business)
Politicization of intel oversight board could threaten key US-EU data transfer agreement (The Record)
Cyber diplomacy funding halted as US issues broad freeze on foreign aid (The Record)
Weaponised XWorm RAT builder Attacking script kiddies to Steal Sensitive Data (GB Hackers)
Change Healthcare Breach Almost Doubles in Size to 190 Million Victims (Infosecurity Magazine)
TalkTalk investigating data breach after hacker claims theft of customer data (TechCrunch)
Meta rushes to fix critical Llama Stack AI flaw (Cybernews)
Seasoning email threats with hidden text salting (Cisco Talos)
New Phishing Framework Attacking Multiple Brands To Steal Customer Logins (Cyber Security News)
More than 2,000 SonicWall devices vulnerable to critical zero-day (The Record)
Sweden seizes vessel after another undersea cable damaged (The Register)
Nicolas Bacca: "We have invented a unique organisational model for intervening in cryptocurrency ransom" (The Big Whale) 
British Museum hit by alleged IT attack by ex-worker (BBC News)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 27 Jan 2025 21:53:00 -0000</pubDate>
      <itunes:title>China's chatbot sends tech stocks into tailspin.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2232</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Chinese AI startup DeepSeek shakes up the market. Trump freezes cyber diplomacy funding and puts a vital U.S.-EU data-sharing agreement at risk. A trojanized RAT targets script kiddies. U.K. telecom giant TalkTalk investigates a data breach. Researchers uncover a critical flaw in Meta’s Llama Stack AI framework. Attackers leverage hidden text salting in emails. The “FlowerStorm” phishing framework targets multiple brands to steal customer credentials. A critical zero-day hits SonicWall VPN appliances. Swedish authorities seized a cargo ship suspected of damaging a key fiber optic cable. Freezing out crypto-kidnappers. Our guest is Jon Miller, CEO and Co-founder from Halcyon, sharing trends in ransomware and insights on Brain Cipher. The British Museum defends its artefacts from IT attacks.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest today is Jon Miller, CEO and Co-founder from Halcyon, sharing trends in ransomware along with some insights on Brain Cipher. For more detail, check out Halcyon’s Power Rankings: Ransomware Malicious Quartile Q4-2024. 

Selected Reading
A shocking Chinese AI advancement called DeepSeek is sending US stocks plunging (CNN Business)
Politicization of intel oversight board could threaten key US-EU data transfer agreement (The Record)
Cyber diplomacy funding halted as US issues broad freeze on foreign aid (The Record)
Weaponised XWorm RAT builder Attacking script kiddies to Steal Sensitive Data (GB Hackers)
Change Healthcare Breach Almost Doubles in Size to 190 Million Victims (Infosecurity Magazine)
TalkTalk investigating data breach after hacker claims theft of customer data (TechCrunch)
Meta rushes to fix critical Llama Stack AI flaw (Cybernews)
Seasoning email threats with hidden text salting (Cisco Talos)
New Phishing Framework Attacking Multiple Brands To Steal Customer Logins (Cyber Security News)
More than 2,000 SonicWall devices vulnerable to critical zero-day (The Record)
Sweden seizes vessel after another undersea cable damaged (The Register)
Nicolas Bacca: "We have invented a unique organisational model for intervening in cryptocurrency ransom" (The Big Whale) 
British Museum hit by alleged IT attack by ex-worker (BBC News)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chinese AI startup DeepSeek shakes up the market. Trump freezes cyber diplomacy funding and puts a vital U.S.-EU data-sharing agreement at risk. A trojanized RAT targets script kiddies. U.K. telecom giant TalkTalk investigates a data breach. Researchers uncover a critical flaw in Meta’s Llama Stack AI framework. Attackers leverage hidden text salting in emails. The “FlowerStorm” phishing framework targets multiple brands to steal customer credentials. A critical zero-day hits SonicWall VPN appliances. Swedish authorities seized a cargo ship suspected of damaging a key fiber optic cable. Freezing out crypto-kidnappers. Our guest is Jon Miller, CEO and Co-founder from Halcyon, sharing trends in ransomware and insights on Brain Cipher. The British Museum defends its artefacts from IT attacks.</p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p><br></p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><h2><br></h2><h2>CyberWire Guest</h2><p>Our guest today is <a href="https://www.linkedin.com/in/jonmillerhalcyon/">Jon Miller</a>, CEO and Co-founder from <a href="https://www.halcyon.ai/">Halcyon</a>, sharing trends in ransomware along with some insights on Brain Cipher. For more detail, check out Halcyon’s <a href="https://www.halcyon.ai/blog/power-rankings-ransomware-malicious-quartile-q4-2024">Power Rankings: Ransomware Malicious Quartile Q4-2024</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.cnn.com/2025/01/27/tech/deepseek-stocks-ai-china">A shocking Chinese AI advancement called DeepSeek is sending US stocks plunging</a> (CNN Business)</p><p><a href="https://therecord.media/politicization-of-pclob-could-threaten-key-eu-us-data-transfer-agreement">Politicization of intel oversight board could threaten key US-EU data transfer agreement</a> (The Record)</p><p><a href="https://therecord.media/cyber-diplomacy-funding-halted-freeze-on-foreign-aid">Cyber diplomacy funding halted as US issues broad freeze on foreign aid</a> (The Record)</p><p><a href="https://gbhackers.com/weaponised-xworm-rat-builder-attacking-script-kiddies/">Weaponised XWorm RAT builder Attacking script kiddies to Steal Sensitive Data</a> (GB Hackers)</p><p><a href="https://www.infosecurity-magazine.com/news/change-healthcare-breach-doubles/">Change Healthcare Breach Almost Doubles in Size to 190 Million Victims</a> (Infosecurity Magazine)</p><p><a href="https://techcrunch.com/2025/01/27/talktalk-investigating-data-breach-after-hacker-claims-theft-of-customer-data/">TalkTalk investigating data breach after hacker claims theft of customer data</a> (TechCrunch)</p><p><a href="https://cnews.link/meta-rushes-fix-critical-llama-stack-vulnerability-3/">Meta rushes to fix critical Llama Stack AI flaw</a> (Cybernews)</p><p><a href="https://blog.talosintelligence.com/seasoning-email-threats-with-hidden-text-salting/">Seasoning email threats with hidden text salting</a> (Cisco Talos)</p><p><a href="https://cybersecuritynews.com/new-phishing-framework-attacking-multiple-brands/">New Phishing Framework Attacking Multiple Brands To Steal Customer Logins</a> (Cyber Security News)</p><p><a href="https://therecord.media/sonicwall-devices-exposed-zero-day">More than 2,000 SonicWall devices vulnerable to critical zero-day</a> (The Record)</p><p><a href="https://www.theregister.com/2025/01/27/sweden_seizes_ship/">Sweden seizes vessel after another undersea cable damaged</a> (The Register)</p><p><a href="https://en.thebigwhale.io/article-en/nicolas-bacca-we-have-invented-a-unique-organisational-model-for-intervening-in-cryptocurrency-ransomware">Nicolas Bacca: "We have invented a unique organisational model for intervening in cryptocurrency ransom"</a> (The Big Whale) </p><p><a href="https://www.bbc.co.uk/news/articles/cd9qjde4wnqo">British Museum hit by alleged IT attack by ex-worker</a> (BBC News)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><h2><br></h2><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p><br></p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1806</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[645b9a18-d378-11ef-84f5-435de4ed38cd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4672814520.mp3?updated=1738006165" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dave Farrow: The guy that enabled the business. [Security leadership] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/52/notes</link>
      <description>Please enjoy this encore episode with VP of Information Security at Barracuda Dave Farrow, and how he shares how a teenage surfer fell in love with software development and made his way in the cybersecurity field. Dave chose to study electrical engineering in college because he wanted to learn something that didn't make sense to him. He says he's done things in his career that he said he'd never do: for example, he went into and fell in love with software development. Taking on leadership of a bug bounty program at Barracuda blossomed into the creation of an internal security team. Dave wants to be the guy who enables the business and not the one who prevented it. He hopes all will come to recognize that there are other threats besides cybersecurity threats to business. We thank Dave for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 26 Jan 2025 08:00:00 -0000</pubDate>
      <itunes:title>Dave Farrow: The guy that enabled the business. [Security leadership] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>52</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b5d7861a-d9d9-11ef-9635-83337cec5ef9/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode with VP of Information Security at Barracuda Dave Farrow, and how he shares how a teenage surfer fell in love with software development and made his way in the cybersecurity field. Dave chose to study electrical engineering in college because he wanted to learn something that didn't make sense to him. He says he's done things in his career that he said he'd never do: for example, he went into and fell in love with software development. Taking on leadership of a bug bounty program at Barracuda blossomed into the creation of an internal security team. Dave wants to be the guy who enables the business and not the one who prevented it. He hopes all will come to recognize that there are other threats besides cybersecurity threats to business. We thank Dave for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode with VP of Information Security at Barracuda Dave Farrow, and how he shares how a teenage surfer fell in love with software development and made his way in the cybersecurity field. Dave chose to study electrical engineering in college because he wanted to learn something that didn't make sense to him. He says he's done things in his career that he said he'd never do: for example, he went into and fell in love with software development. Taking on leadership of a bug bounty program at Barracuda blossomed into the creation of an internal security team. Dave wants to be the guy who enables the business and not the one who prevented it. He hopes all will come to recognize that there are other threats besides cybersecurity threats to business. We thank Dave for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>500</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5d7861a-d9d9-11ef-9635-83337cec5ef9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8901901781.mp3?updated=1737671756" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>LightSpy's dark evolution. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/362/notes</link>
      <description>This week, we are joined by Ismael Valenzuela, VP of Threat Research &amp; Intelligence, and Jacob Faires, Principal Threat Researcher, from Blackberry discussing the team's work on "LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign." In April 2024, BlackBerry uncovered a significant evolution of the LightSpy malware campaign, attributed to Chinese cyber-espionage group APT41. 
The newly introduced DeepData framework, a modular Windows-based surveillance tool, expands data theft capabilities with 12 specialized plugins for tasks like communication surveillance, credential theft, and system intelligence gathering. The campaign targets a wide range of communication platforms, including WhatsApp, Signal, and WeChat, with advanced techniques for monitoring and stealing sensitive information from victims across the Asia-Pacific region.
The research can be found here:
LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Jan 2025 06:00:00 -0000</pubDate>
      <itunes:title>LightSpy's dark evolution. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>362</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, we are joined by Ismael Valenzuela, VP of Threat Research &amp; Intelligence, and Jacob Faires, Principal Threat Researcher, from Blackberry discussing the team's work on "LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign." In April 2024, BlackBerry uncovered a significant evolution of the LightSpy malware campaign, attributed to Chinese cyber-espionage group APT41. 
The newly introduced DeepData framework, a modular Windows-based surveillance tool, expands data theft capabilities with 12 specialized plugins for tasks like communication surveillance, credential theft, and system intelligence gathering. The campaign targets a wide range of communication platforms, including WhatsApp, Signal, and WeChat, with advanced techniques for monitoring and stealing sensitive information from victims across the Asia-Pacific region.
The research can be found here:
LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/ivalenzuela/">Ismael Valenzuela</a>, VP of Threat Research &amp; Intelligence, and <a href="https://www.linkedin.com/in/jacob-faires/">Jacob Faires</a>, Principal Threat Researcher, from <a href="https://www.linkedin.com/company/blackberry/">Blackberry</a> discussing the team's work on "LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign." In April 2024, BlackBerry uncovered a significant evolution of the LightSpy malware campaign, attributed to Chinese cyber-espionage group APT41. </p><p>The newly introduced DeepData framework, a modular Windows-based surveillance tool, expands data theft capabilities with 12 specialized plugins for tasks like communication surveillance, credential theft, and system intelligence gathering. The campaign targets a wide range of communication platforms, including WhatsApp, Signal, and WeChat, with advanced techniques for monitoring and stealing sensitive information from victims across the Asia-Pacific region.</p><p>The research can be found here:</p><ul><li><a href="https://blogs.blackberry.com/en/2024/11/lightspy-apt41-deploys-advanced-deepdata-framework-in-targeted-southern-asia-espionage-campaign">LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1360</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[75c1d788-da9c-11ef-b4b8-1b3c1134321a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2559795336.mp3?updated=1737756185" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The end of warrantless searches?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2231/notes</link>
      <description>A federal court finds the FBI’s warrantless section 702 searches unconstitutional. The DOJ charges five in a fake IT worker scheme. The Texas Attorney General expands his investigation into automakers’ data sharing. CISA highlights vulnerabilities in the aircraft collision avoidance system. Estonia will host Europe's new space cybersecurity testing ground. Hackers use hardware breakpoints to evade EDR detection. Subaru’s Starlink connected vehicle service exposed sensitive customer and vehicle data. Asian nations claim progress against criminal cyber-scam camps. Our guest today is Dr. Chris Pierson, Founder and CEO of BlackCloak, with his outlook on 2025. Sticking AI crawlers in the tar pit. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest today is Dr. Chris Pierson, Founder and CEO of BlackCloak, joining us to share trends he sees coming our way in 2025.

Selected Reading
Court rules FBI’s warrantless searches violated Fourth Amendment (Ars Technica)
US Charges Five People Over North Korean IT Worker Scheme (SecurityWeek)
Texas probes four more car companies over how they collect and sell consumer data (The Record)
CISA Warns of Flaws in Aircraft Collision Avoidance Systems (BankInfo Security)
ESA - Estonia to host Europe's new space cybersecurity testing ground (European Space Agency)
Bypassing EDR Detection by Exploiting Hardware Breakpoints at CPU Level (Cyber Security News)
Subaru Starlink Vulnerability Exposed Cars to Remote Hacking (SecurityWeek)
China and friends say they're hurting cyber-slave scam camps (The Register)
Developer Creates Infinite Maze That Traps AI Training Bots (404 Media)  

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 24 Jan 2025 21:40:00 -0000</pubDate>
      <itunes:title>The end of warrantless searches?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2231</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A federal court finds the FBI’s warrantless section 702 searches unconstitutional. The DOJ charges five in a fake IT worker scheme. The Texas Attorney General expands his investigation into automakers’ data sharing. CISA highlights vulnerabilities in the aircraft collision avoidance system. Estonia will host Europe's new space cybersecurity testing ground. Hackers use hardware breakpoints to evade EDR detection. Subaru’s Starlink connected vehicle service exposed sensitive customer and vehicle data. Asian nations claim progress against criminal cyber-scam camps. Our guest today is Dr. Chris Pierson, Founder and CEO of BlackCloak, with his outlook on 2025. Sticking AI crawlers in the tar pit. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest today is Dr. Chris Pierson, Founder and CEO of BlackCloak, joining us to share trends he sees coming our way in 2025.

Selected Reading
Court rules FBI’s warrantless searches violated Fourth Amendment (Ars Technica)
US Charges Five People Over North Korean IT Worker Scheme (SecurityWeek)
Texas probes four more car companies over how they collect and sell consumer data (The Record)
CISA Warns of Flaws in Aircraft Collision Avoidance Systems (BankInfo Security)
ESA - Estonia to host Europe's new space cybersecurity testing ground (European Space Agency)
Bypassing EDR Detection by Exploiting Hardware Breakpoints at CPU Level (Cyber Security News)
Subaru Starlink Vulnerability Exposed Cars to Remote Hacking (SecurityWeek)
China and friends say they're hurting cyber-slave scam camps (The Register)
Developer Creates Infinite Maze That Traps AI Training Bots (404 Media)  

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A federal court finds the FBI’s warrantless section 702 searches unconstitutional. The DOJ charges five in a fake IT worker scheme. The Texas Attorney General expands his investigation into automakers’ data sharing. CISA highlights vulnerabilities in the aircraft collision avoidance system. Estonia will host Europe's new space cybersecurity testing ground. Hackers use hardware breakpoints to evade EDR detection. Subaru’s Starlink connected vehicle service exposed sensitive customer and vehicle data. Asian nations claim progress against criminal cyber-scam camps. Our guest today is Dr. Chris Pierson, Founder and CEO of BlackCloak, with his outlook on 2025. Sticking AI crawlers in the tar pit. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest today is <a href="https://www.linkedin.com/in/drchristopherpierson/">Dr. Chris Pierson</a>, Founder and CEO of <a href="https://blackcloak.io/">BlackCloak</a>, joining us to share trends he sees coming our way in 2025.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://arstechnica.com/tech-policy/2025/01/court-rules-fbis-warrantless-searches-violated-fourth-amendment/">Court rules FBI’s warrantless searches violated Fourth Amendment</a> (Ars Technica)</p><p><a href="https://www.securityweek.com/us-charges-five-people-over-north-korean-it-worker-scheme/">US Charges Five People Over North Korean IT Worker Scheme</a> (SecurityWeek)</p><p><a href="https://therecord.media/texas-probes-four-more-car-companies-data-collection-sharing">Texas probes four more car companies over how they collect and sell consumer data</a> (The Record)</p><p><a href="https://www.bankinfosecurity.com/cisa-warns-flaws-in-aircraft-collision-avoidance-systems-a-27365">CISA Warns of Flaws in Aircraft Collision Avoidance Systems</a> (BankInfo Security)</p><p><a href="https://www.esa.int/Applications/Connectivity_and_Secure_Communications/Estonia_to_host_Europe_s_new_space_cybersecurity_testing_ground">ESA - Estonia to host Europe's new space cybersecurity testing ground</a> (European Space Agency)</p><p><a href="https://cybersecuritynews.com/bypassing-edr-detection-hardware-breakpoints/">Bypassing EDR Detection by Exploiting Hardware Breakpoints at CPU Level</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/subaru-starlink-vulnerability-exposed-cars-to-remote-hacking/">Subaru Starlink Vulnerability Exposed Cars to Remote Hacking</a> (SecurityWeek)</p><p><a href="https://www.theregister.com/2025/01/24/lancang_mekong_anti_cyberscam_cooperation/">China and friends say they're hurting cyber-slave scam camps</a> (The Register)</p><p><a href="https://www.404media.co/email/6558718f-dbe9-47a0-a57f-5e80e0ed44ce/?ref=daily-stories-newsletter">Developer Creates Infinite Maze That Traps AI Training Bots</a> (404 Media)  </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1740</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[64180ad2-d378-11ef-84f5-2b47dca36572]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5992019871.mp3?updated=1737753387" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A warning from the cloud.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2230/notes</link>
      <description>CISA and FBI detail exploit chains used by Chinese hackers to compromise Ivanti Cloud Service Appliances. Energy systems in Central Europe use unencrypted radio signals. A critical SonicWall vulnerability is under active exploitation. The Nnice ransomware strain isn’t. Cisco discloses a critical vulnerability in its Meeting Management tool. GhostGPT is a new malicious generative AI chatbot. ClamAV patches critical vulnerabilities in the open-source anti-virus engine. A new report questions the effectiveness of paying ransomware demands. DOGE piggybacks on the United States Digital Service. On our Industry Voices segment, we are joined by Joe Gillespie, Senior Vice President at Booz Allen, discussing Cyber AI. Jen Easterly leaves CISA a legacy of resilience and dedication. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Industry Voices
Today on our Industry Voices segment, we are joined by Joe Gillespie, Senior Vice President at Booz Allen, discussing Cyber AI.

Selected Reading
FBI/CISA Share Details on Ivanti Exploits Chains: What Network Defenders Need to Know (SecurityWeek)
Researchers say new attack could take down the European power grid (Ars Technica)
Critical SonicWall Vulnerability Exploited In Attacks Execute Arbitrary OS Commands (Cyber Security News)
Nnice Ransomware Attacking Windows Systems With Advanced Encryption Techniques (GB Hackers)
Cisco Fixes Critical Vulnerability in Meeting Management (Infosecurity Magazine)
New GhostGPT AI Chatbot Facilitates Malware Creation and Phishing (Infosecurity Magazine)
Open-Source ClamAV Releases Critical Security Patch Updates – What’s Inside! (Cyber Security News)
Companies who pay off ransomware attackers rarely get their data back, survey shows (Cybernews)
Elon Musk Plays DOGE Ball—and Hits America’s Geek Squad (WIRED)
Under Trump, US Cyberdefense Loses Its Head (WIRED) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 23 Jan 2025 21:10:00 -0000</pubDate>
      <itunes:title>A warning from the cloud.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2230</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA and FBI detail exploit chains used by Chinese hackers to compromise Ivanti Cloud Service Appliances. Energy systems in Central Europe use unencrypted radio signals. A critical SonicWall vulnerability is under active exploitation. The Nnice ransomware strain isn’t. Cisco discloses a critical vulnerability in its Meeting Management tool. GhostGPT is a new malicious generative AI chatbot. ClamAV patches critical vulnerabilities in the open-source anti-virus engine. A new report questions the effectiveness of paying ransomware demands. DOGE piggybacks on the United States Digital Service. On our Industry Voices segment, we are joined by Joe Gillespie, Senior Vice President at Booz Allen, discussing Cyber AI. Jen Easterly leaves CISA a legacy of resilience and dedication. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Industry Voices
Today on our Industry Voices segment, we are joined by Joe Gillespie, Senior Vice President at Booz Allen, discussing Cyber AI.

Selected Reading
FBI/CISA Share Details on Ivanti Exploits Chains: What Network Defenders Need to Know (SecurityWeek)
Researchers say new attack could take down the European power grid (Ars Technica)
Critical SonicWall Vulnerability Exploited In Attacks Execute Arbitrary OS Commands (Cyber Security News)
Nnice Ransomware Attacking Windows Systems With Advanced Encryption Techniques (GB Hackers)
Cisco Fixes Critical Vulnerability in Meeting Management (Infosecurity Magazine)
New GhostGPT AI Chatbot Facilitates Malware Creation and Phishing (Infosecurity Magazine)
Open-Source ClamAV Releases Critical Security Patch Updates – What’s Inside! (Cyber Security News)
Companies who pay off ransomware attackers rarely get their data back, survey shows (Cybernews)
Elon Musk Plays DOGE Ball—and Hits America’s Geek Squad (WIRED)
Under Trump, US Cyberdefense Loses Its Head (WIRED) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA and FBI detail exploit chains used by Chinese hackers to compromise Ivanti Cloud Service Appliances. Energy systems in Central Europe use unencrypted radio signals. A critical SonicWall vulnerability is under active exploitation. The Nnice ransomware strain isn’t. Cisco discloses a critical vulnerability in its Meeting Management tool. GhostGPT is a new malicious generative AI chatbot. ClamAV patches critical vulnerabilities in the open-source anti-virus engine. A new report questions the effectiveness of paying ransomware demands. DOGE piggybacks on the United States Digital Service. On our Industry Voices segment, we are joined by Joe Gillespie, Senior Vice President at Booz Allen, discussing Cyber AI. Jen Easterly leaves CISA a legacy of resilience and dedication. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Industry Voices</h2><p>Today on our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/gillespiej/">Joe Gillespie</a>, Senior Vice President at <a href="https://www.boozallen.com/">Booz Allen</a>, discussing Cyber AI.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/fbi-cisa-share-details-on-ivanti-exploits-chains-what-network-defenders-need-to-know/">FBI/CISA Share Details on Ivanti Exploits Chains: What Network Defenders Need to Know</a> (SecurityWeek)</p><p><a href="https://arstechnica.com/security/2025/01/could-hackers-use-new-attack-to-take-down-european-power-grid/">Researchers say new attack could take down the European power grid</a> (Ars Technica)</p><p><a href="https://cybersecuritynews.com/sonicwall-0-day-vulnerability-actively-exploited/">Critical SonicWall Vulnerability Exploited In Attacks Execute Arbitrary OS Commands</a> (Cyber Security News)</p><p><a href="https://gbhackers.com/nnince-ransomware-attacking-windows-systems/">Nnice Ransomware Attacking Windows Systems With Advanced Encryption Techniques</a> (GB Hackers)</p><p><a href="https://www.infosecurity-magazine.com/news/cisco-critical-vulnerability/">Cisco Fixes Critical Vulnerability in Meeting Management</a> (Infosecurity Magazine)</p><p><a href="https://www.infosecurity-magazine.com/news/ghostgpt-ai-chatbot-malware/">New GhostGPT AI Chatbot Facilitates Malware Creation and Phishing</a> (Infosecurity Magazine)</p><p><a href="https://cybersecuritynews.com/open-source-clamav-releases-critical-security-patch-updates-whats-inside/">Open-Source ClamAV Releases Critical Security Patch Updates – What’s Inside!</a> (Cyber Security News)</p><p><a href="https://cybernews.com/security/ransomware-attacks-increase-data-recovery-survey/">Companies who pay off ransomware attackers rarely get their data back, survey shows</a> (Cybernews)</p><p><a href="https://www.wired.com/story/plaintext-trump-musk-us-digital-service-doge/">Elon Musk Plays DOGE Ball—and Hits America’s Geek Squad</a> (WIRED)</p><p><a href="https://www.wired.com/story/big-interview-jen-easterly-cisa-cybersecurity/">Under Trump, US Cyberdefense Loses Its Head</a> (WIRED) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2036</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[63d90af8-d378-11ef-84f5-b74e8e9ae1bb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9000957957.mp3?updated=1737665410" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The uncertain future of cyber safety oversight.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2229/notes</link>
      <description>The latest cyber moves from the Trump White House. Pompompurin faces resentencing. An attack on a government IT contractor impacts Medicaid, child support, and food assistance programs. Helldown ransomware targets unpatched Zyxel firewalls. Murdoc is a new Mirai botnet variant. Cloudflare maps the DDoS landscape. North Korea’s Lazarus group uses fake job interviews to deploy malware. Hackers are abusing Google ads to spread AmosStealer malware. Pwn2Own Automotive awards over $382,000 on its first day. In our CertByte segment, Chris Hare and Steven Burnley take on a question from N2K’s Agile Certified Practitioner (PMI-ACP)® Practice Test. NYC Restaurant week tries to keep bots off the menu. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from N2K’s suite of industry-leading certification resources, and a study tip to help you achieve the professional certifications you need to fast-track your career growth in IT, cyber security, or project management.
In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by Steven Burnley to break down a question targeting the CC - Certified in Cyber Security certification by ISC2®. Today’s question comes from N2K’s Agile Certified Practitioner (PMI-ACP)® Practice Test.
Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro. 
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.

Additional sources: 
https://www.pmi.org/certifications/agile-acp 
https://www.pmi.org/-/media/pmi/documents/public/pdf/certifications/agile-certified-exam-outline.pdf 

Selected Reading
Trump Fires DHS Board Probing Salt Typhoon Hacks (Dark Reading)
TSA chief behind cyber directives for aviation, pipelines and rail ousted by Trump team (The Record)
Trump pardons Silk Road dark web market creator Ross Ulbricht (BBC)
BreachForums Admin Conor Fitzpatrick (Pompompurin) to Be Resentenced (Hackread)
Government IT contractor Conduent says 'third-party compromise’ caused outages (The Record)
Helldown Ransomware Exploiting Zyxel Devices Using Zero-Day Vulnerability (Cyber Security News)
New Mirai botnet variant Murdoc Botnet targets AVTECH IP cameras and Huawei HG532 routers (Security Affairs)
Record-Breaking DDoS Attack Reached 5.6 Tbps (SecurityWeek)
InvisibleFerret Malware Attacking Windows Users Through Fake Job Interview Tactics (Cyber Security News)
Fake Homebrew Google ads target Mac users with malware (Bleeping Computer)
Over $380,000 Paid Out on First Day of Pwn2Own Automotive 2025 (SecurityWeek)
Security Alert: Bots Target NYC Restaurant Week (DataDome)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 22 Jan 2025 21:10:00 -0000</pubDate>
      <itunes:title>The uncertain future of cyber safety oversight.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2229</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The latest cyber moves from the Trump White House. Pompompurin faces resentencing. An attack on a government IT contractor impacts Medicaid, child support, and food assistance programs. Helldown ransomware targets unpatched Zyxel firewalls. Murdoc is a new Mirai botnet variant. Cloudflare maps the DDoS landscape. North Korea’s Lazarus group uses fake job interviews to deploy malware. Hackers are abusing Google ads to spread AmosStealer malware. Pwn2Own Automotive awards over $382,000 on its first day. In our CertByte segment, Chris Hare and Steven Burnley take on a question from N2K’s Agile Certified Practitioner (PMI-ACP)® Practice Test. NYC Restaurant week tries to keep bots off the menu. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from N2K’s suite of industry-leading certification resources, and a study tip to help you achieve the professional certifications you need to fast-track your career growth in IT, cyber security, or project management.
In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by Steven Burnley to break down a question targeting the CC - Certified in Cyber Security certification by ISC2®. Today’s question comes from N2K’s Agile Certified Practitioner (PMI-ACP)® Practice Test.
Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro. 
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.

Additional sources: 
https://www.pmi.org/certifications/agile-acp 
https://www.pmi.org/-/media/pmi/documents/public/pdf/certifications/agile-certified-exam-outline.pdf 

Selected Reading
Trump Fires DHS Board Probing Salt Typhoon Hacks (Dark Reading)
TSA chief behind cyber directives for aviation, pipelines and rail ousted by Trump team (The Record)
Trump pardons Silk Road dark web market creator Ross Ulbricht (BBC)
BreachForums Admin Conor Fitzpatrick (Pompompurin) to Be Resentenced (Hackread)
Government IT contractor Conduent says 'third-party compromise’ caused outages (The Record)
Helldown Ransomware Exploiting Zyxel Devices Using Zero-Day Vulnerability (Cyber Security News)
New Mirai botnet variant Murdoc Botnet targets AVTECH IP cameras and Huawei HG532 routers (Security Affairs)
Record-Breaking DDoS Attack Reached 5.6 Tbps (SecurityWeek)
InvisibleFerret Malware Attacking Windows Users Through Fake Job Interview Tactics (Cyber Security News)
Fake Homebrew Google ads target Mac users with malware (Bleeping Computer)
Over $380,000 Paid Out on First Day of Pwn2Own Automotive 2025 (SecurityWeek)
Security Alert: Bots Target NYC Restaurant Week (DataDome)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The latest cyber moves from the Trump White House. Pompompurin faces resentencing. An attack on a government IT contractor impacts Medicaid, child support, and food assistance programs. Helldown ransomware targets unpatched Zyxel firewalls. Murdoc is a new Mirai botnet variant. Cloudflare maps the DDoS landscape. North Korea’s Lazarus group uses fake job interviews to deploy malware. Hackers are abusing Google ads to spread AmosStealer malware. Pwn2Own Automotive awards over $382,000 on its first day. In our CertByte segment, Chris Hare and Steven Burnley take on a question from N2K’s Agile Certified Practitioner (PMI-ACP)® Practice Test. NYC Restaurant week tries to keep bots off the menu. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CertByte Segment</h2><p>Welcome to CertByte! On this bi-weekly segment hosted by<a href="https://www.linkedin.com/in/chrisharepmp/"> Chris Hare</a>, a content developer and project management specialist at <a href="https://www.n2k.com/?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1737490389858.1737501526148.263&amp;__hssc=223811332.9.1737501526148&amp;__hsfp=336580338">N2K</a>, we share practice questions from N2K’s suite of industry-leading certification resources, and a study tip to help you achieve the professional certifications you need to fast-track your career growth in IT, cyber security, or project management.</p><p>In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by <a href="https://www.linkedin.com/in/steven-burnley-1a0a5013/">Steven Burnley</a> to break down a question targeting the CC - Certified in Cyber Security certification by ISC2®. Today’s question comes from <a href="https://certify.cybervista.net/products/pmi/pmi-agile-certified-practitioner-practice-test/">N2K’s Agile Certified Practitioner (PMI-ACP)® Practice Test</a>.</p><p>Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at <a href="http://n2k.com/certify">n2k.com/certify</a>. To get the full news to knowledge experience, learn more about our N2K Pro subscription at <a href="https://thecyberwire.com/pro">https://thecyberwire.com/pro</a>. </p><p>Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.</p><p><br></p><h2>Additional sources: </h2><p><a href="https://www.pmi.org/certifications/agile-acp">https://www.pmi.org/certifications/agile-acp</a> </p><p><a href="https://www.pmi.org/-/media/pmi/documents/public/pdf/certifications/agile-certified-exam-outline.pdf">https://www.pmi.org/-/media/pmi/documents/public/pdf/certifications/agile-certified-exam-outline.pdf</a> </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.darkreading.com/threat-intelligence/trump-fires-cyber-safety-board-salt-typhoon-hackers">Trump Fires DHS Board Probing Salt Typhoon Hacks</a> (Dark Reading)</p><p><a href="https://therecord.media/tsa-chief-behind-cyber-directives-ousted-trump-administration">TSA chief behind cyber directives for aviation, pipelines and rail ousted by Trump team</a> (The Record)</p><p><a href="https://www.bbc.com/news/articles/cz7e0jve875o">Trump pardons Silk Road dark web market creator Ross Ulbricht</a> (BBC)</p><p><a href="https://hackread.com/breachforums-admin-conor-fitzpatrick-pompompurin-resentenced/">BreachForums Admin Conor Fitzpatrick (Pompompurin) to Be Resentenced</a> (Hackread)</p><p><a href="https://therecord.media/government-contractor-conduent-outage-compromise">Government IT contractor Conduent says 'third-party compromise’ caused outages</a> (The Record)</p><p><a href="https://cybersecuritynews.com/helldown-ransomware-exploiting-zyxel-devices/">Helldown Ransomware Exploiting Zyxel Devices Using Zero-Day Vulnerability</a> (Cyber Security News)</p><p><a href="https://securityaffairs.com/173294/cyber-crime/new-mirai-botnet-variant-murdoc-botnet-targets-avtech-ip-cameras-and-huawei-hg532-routers.html">New Mirai botnet variant Murdoc Botnet targets AVTECH IP cameras and Huawei HG532 routers</a> (Security Affairs)</p><p><a href="https://www.securityweek.com/record-breaking-ddos-attack-reached-5-6-tbps/">Record-Breaking DDoS Attack Reached 5.6 Tbps</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/invisibleferret-malware-attacking-windows/">InvisibleFerret Malware Attacking Windows Users Through Fake Job Interview Tactics</a> (Cyber Security News)</p><p><a href="https://www.bleepingcomputer.com/news/security/fake-homebrew-google-ads-target-mac-users-with-malware/">Fake Homebrew Google ads target Mac users with malware</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/over-380000-paid-out-on-first-day-of-pwn2own-automotive-2025/">Over $380,000 Paid Out on First Day of Pwn2Own Automotive 2025</a> (SecurityWeek)</p><p><a href="https://datadome.co/threat-research/bots-target-nyc-restaurant-week/">Security Alert: Bots Target NYC Restaurant Week</a> (DataDome)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1786</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6394af20-d378-11ef-84f5-3b926df78630]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1476565827.mp3?updated=1737577798" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trump’s opening moves.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2228/notes</link>
      <description>President Trump rolls back AI regulations and throws TikTok a lifeline. Attackers pose as Ukraine’s CERT-UA tech support. A critical vulnerability is found in the Brave browser. Sophos observes hacking groups abusing Microsoft 365 services and exploiting default Microsoft Teams settings. Researchers uncover critical flaws in tunneling protocols. A breach exposes personal information of thousands of students and educators. Oracle patches 320 security vulnerabilities. Kaspersky reveals over a dozen vulnerabilities in a Mercedes-Benz infotainment system. Tim Starks from CyberScoop discusses executive orders on cybersecurity and the future of CISA. We preview coming episodes of Threat Vector.  Honesty isn’t always the best policy. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
On our Threat Vector podcast preview today: 
IoT devices are everywhere, with billions deployed globally in industries like healthcare, manufacturing, and critical infrastructure. But this explosion of connectivity brings unprecedented security challenges. Host David Moulton speaks with Dr. May Wang, CTO of IoT Security at Palo Alto Networks, about how AI is transforming IoT security. Stay tuned for the full conversation this Thursday. 

CyberWire Guest
Our guest is Tim Starks from CyberScoop discussing executive orders on cybersecurity and the future of CISA. You can read Tim’s article on the recent Biden EO here.  
Selected Reading
Trump revokes Biden executive order on addressing AI risks (Reuters)
TikTok is back up in the US after Trump says he will extend deadline (Bleeping Computer)
Hackers impersonate Ukraine’s CERT to trick people into allowing computer access (The Record) 
Brave Browser Vulnerability Let Malicious Website Mimic as Legitimate One (Cyber Security News) 
Ransomware Groups Abuse Microsoft Services for Initial Access (SecurityWeek)
Tunneling Flaws Put VPNs, CDNs and Routers at Risk Globally (Hackread)
Students, Educators Impacted by PowerSchool Data Breach (SecurityWeek)
Oracle To Address 320 Vulnerabilities in January Patch Update (Infosecurity Magazine)
Details Disclosed for Mercedes-Benz Infotainment Vulnerabilities (SecurityWeek)
Washington Man Admits to Role in Multiple Cybercrime, Fraud Schemes (SecurityWeek)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Jan 2025 21:10:00 -0000</pubDate>
      <itunes:title>Trump’s opening moves.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2228</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>President Trump rolls back AI regulations and throws TikTok a lifeline. Attackers pose as Ukraine’s CERT-UA tech support. A critical vulnerability is found in the Brave browser. Sophos observes hacking groups abusing Microsoft 365 services and exploiting default Microsoft Teams settings. Researchers uncover critical flaws in tunneling protocols. A breach exposes personal information of thousands of students and educators. Oracle patches 320 security vulnerabilities. Kaspersky reveals over a dozen vulnerabilities in a Mercedes-Benz infotainment system. Tim Starks from CyberScoop discusses executive orders on cybersecurity and the future of CISA. We preview coming episodes of Threat Vector.  Honesty isn’t always the best policy. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
On our Threat Vector podcast preview today: 
IoT devices are everywhere, with billions deployed globally in industries like healthcare, manufacturing, and critical infrastructure. But this explosion of connectivity brings unprecedented security challenges. Host David Moulton speaks with Dr. May Wang, CTO of IoT Security at Palo Alto Networks, about how AI is transforming IoT security. Stay tuned for the full conversation this Thursday. 

CyberWire Guest
Our guest is Tim Starks from CyberScoop discussing executive orders on cybersecurity and the future of CISA. You can read Tim’s article on the recent Biden EO here.  
Selected Reading
Trump revokes Biden executive order on addressing AI risks (Reuters)
TikTok is back up in the US after Trump says he will extend deadline (Bleeping Computer)
Hackers impersonate Ukraine’s CERT to trick people into allowing computer access (The Record) 
Brave Browser Vulnerability Let Malicious Website Mimic as Legitimate One (Cyber Security News) 
Ransomware Groups Abuse Microsoft Services for Initial Access (SecurityWeek)
Tunneling Flaws Put VPNs, CDNs and Routers at Risk Globally (Hackread)
Students, Educators Impacted by PowerSchool Data Breach (SecurityWeek)
Oracle To Address 320 Vulnerabilities in January Patch Update (Infosecurity Magazine)
Details Disclosed for Mercedes-Benz Infotainment Vulnerabilities (SecurityWeek)
Washington Man Admits to Role in Multiple Cybercrime, Fraud Schemes (SecurityWeek)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>President Trump rolls back AI regulations and throws TikTok a lifeline. Attackers pose as Ukraine’s CERT-UA tech support. A critical vulnerability is found in the Brave browser. Sophos observes hacking groups abusing Microsoft 365 services and exploiting default Microsoft Teams settings. Researchers uncover critical flaws in tunneling protocols. A breach exposes personal information of thousands of students and educators. Oracle patches 320 security vulnerabilities. Kaspersky reveals over a dozen vulnerabilities in a Mercedes-Benz infotainment system. Tim Starks from CyberScoop discusses executive orders on cybersecurity and the future of CISA. We preview coming episodes of Threat Vector.  Honesty isn’t always the best policy. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Threat Vector Segment</h2><p>On our <a href="https://thecyberwire.com/podcasts/threat-vector">Threat Vector</a> podcast preview today: </p><p>IoT devices are everywhere, with billions deployed globally in industries like healthcare, manufacturing, and critical infrastructure. But this explosion of connectivity brings unprecedented security challenges. Host <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a> speaks with <a href="https://www.linkedin.com/in/drmaywang/">Dr. May Wang</a>, CTO of IoT Security at Palo Alto Networks, about how AI is transforming IoT security. Stay tuned for the full conversation this Thursday. </p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/tstarks/">Tim Starks</a> from <a href="https://cyberscoop.com/">CyberScoop</a> discussing executive orders on cybersecurity and the future of CISA. You can read Tim’s article on the recent Biden EO <a href="https://cyberscoop.com/biden-cyber-executive-order-gets-mostly-plaudits-but-its-fate-is-uncertain/">here</a>.  </p><h2>Selected Reading</h2><p><a href="https://www.reuters.com/technology/artificial-intelligence/trump-revokes-biden-executive-order-addressing-ai-risks-2025-01-21/">Trump revokes Biden executive order on addressing AI risks</a> (Reuters)</p><p><a href="https://www.bleepingcomputer.com/news/software/tiktok-is-back-up-in-the-us-after-trump-says-he-will-extend-deadline/">TikTok is back up in the US after Trump says he will extend deadline</a> (Bleeping Computer)</p><p><a href="https://therecord.media/fake-ukraine-cert-anydesk-requests-hackers">Hackers impersonate Ukraine’s CERT to trick people into allowing computer access</a> (The Record) </p><p><a href="https://cybersecuritynews.com/brave-browser-vulnerability-malicious-website/">Brave Browser Vulnerability Let Malicious Website Mimic as Legitimate One</a> (Cyber Security News) </p><p><a href="https://www.securityweek.com/ransomware-groups-abuse-microsoft-services-for-initial-access/">Ransomware Groups Abuse Microsoft Services for Initial Access</a> (SecurityWeek)</p><p><a href="https://hackread.com/tunneling-flaws-millions-of-vpns-and-routers-at-risk/">Tunneling Flaws Put VPNs, CDNs and Routers at Risk Globally</a> (Hackread)</p><p><a href="https://www.securityweek.com/students-educators-impacted-by-powerschool-data-breach/">Students, Educators Impacted by PowerSchool Data Breach</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/oracle-320-vulnerabilities-january/">Oracle To Address 320 Vulnerabilities in January Patch Update</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/details-disclosed-for-mercedes-benz-infotainment-vulnerabilities/">Details Disclosed for Mercedes-Benz Infotainment Vulnerabilities</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/washington-man-admits-to-role-in-multiple-cybercrime-fraud-schemes/">Washington Man Admits to Role in Multiple Cybercrime, Fraud Schemes</a> (SecurityWeek)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2264</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[63562606-d378-11ef-84f5-97152143952b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9728041964.mp3?updated=1737491547" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AWS in Orbit: Data Automation and Space Domain Awareness with Kayhan Space. [AWS in Orbit]</title>
      <link>https://space.n2k.com/podcasts/t-minus/aws-in-orbit-16</link>
      <description>You can learn more about AWS in Orbit at space.n2k.com/aws.
Our guests today are Araz Feyzi, Co-founder and CTO at Kayhan Space and Tim Sills, Lead Security Solutions Architect at AWS for Aerospace and Satellite.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Be sure to follow T-Minus on LinkedIn and Instagram.

Selected Reading
AWS Aerospace and Satellite

Audience Survey
We want to hear from you! Please complete our short survey. It’ll help us get better and deliver you the most mission-critical space intel every day.

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.

Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 20 Jan 2025 10:00:00 -0000</pubDate>
      <itunes:title>AWS in Orbit: Data Automation and Space Domain Awareness with Kayhan Space. [AWS in Orbit]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>16</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c6923b34-d511-11ef-b276-efe671b9bab0/image/4920629e26d87d1554827e638b79477b.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Find out how AWS for Aerospace and Satellite is working with Kayhan Space to enhance data automation and space domain awareness.</itunes:subtitle>
      <itunes:summary>You can learn more about AWS in Orbit at space.n2k.com/aws.
Our guests today are Araz Feyzi, Co-founder and CTO at Kayhan Space and Tim Sills, Lead Security Solutions Architect at AWS for Aerospace and Satellite.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Be sure to follow T-Minus on LinkedIn and Instagram.

Selected Reading
AWS Aerospace and Satellite

Audience Survey
We want to hear from you! Please complete our short survey. It’ll help us get better and deliver you the most mission-critical space intel every day.

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.

Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>You can learn more about AWS in Orbit at <a href="https://space.n2k.com/aws">space.n2k.com/aws</a>.</p><p>Our guests today are <a href="https://www.linkedin.com/in/arazf/">Araz Feyzi,</a> Co-founder and CTO at <a href="https://kayhan.space/">Kayhan Space</a> and <a href="https://www.linkedin.com/in/tim-sills/">Tim Sills</a>, Lead Security Solutions Architect at <a href="https://aws.amazon.com/aerospace-and-satellite/">AWS for Aerospace and Satellite</a>.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Be sure to follow T-Minus on <a href="https://www.linkedin.com/company/n2k-space/">LinkedIn</a> and <a href="https://www.instagram.com/tminusdaily/">Instagram</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://aws.amazon.com/aerospace-and-satellite/?trk=c9d66aa7-01dc-4cbe-93b1-2c987a64a1d9&amp;sc_channel=el">AWS Aerospace and Satellite</a></p><p><br></p><h2>Audience Survey</h2><p>We want to hear from you! Please complete our <a href="https://www.surveymonkey.com/r/BL5NFPW">short survey</a>. It’ll help us get better and deliver you the most mission-critical space intel every day.</p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/ung56qbvknfbj9z2">media kit</a>. Contact us at <a href="mailto:space@n2k.com">space@n2k.com</a> to request more info.</p><p><br></p><h2>Want to join us for an interview?</h2><p>Please send your pitch to <a href="mailto:space-editor@n2k.com">space-editor@n2k.com</a> and include your name, affiliation, and topic proposal.</p><p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1660</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6923b34-d511-11ef-b276-efe671b9bab0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9946238342.mp3?updated=1734112862" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Baan Alsinawi: Trust ourselves and be courageous. [Compliance] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/51/notes</link>
      <description>Please enjoy this encore of the Managing Director at Cerberus Sentinel, Chief Compliance Officer and the President of TalaTek, Baan Alsinawi  as she shares her cybersecurity journey from a teenager who wanted to understand computers and held several positions in IT from help desk to systems engineering and cybersecurity. Founding her own business focusing on compliance, Baan says she spends maybe only 20% of her day on technical tasks and that there is always so more to do. Finding the right people for her team is a marker of success for Baan. She talks of the importance of sharing the sense of community of women in technology and nurturing women in the field. We thank Baan for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 19 Jan 2025 08:00:00 -0000</pubDate>
      <itunes:title>Baan Alsinawi: Trust ourselves and be courageous. [Compliance] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>51</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of the Managing Director at Cerberus Sentinel, Chief Compliance Officer and the President of TalaTek, Baan Alsinawi  as she shares her cybersecurity journey from a teenager who wanted to understand computers and held several positions in IT from help desk to systems engineering and cybersecurity. Founding her own business focusing on compliance, Baan says she spends maybe only 20% of her day on technical tasks and that there is always so more to do. Finding the right people for her team is a marker of success for Baan. She talks of the importance of sharing the sense of community of women in technology and nurturing women in the field. We thank Baan for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of the Managing Director at Cerberus Sentinel, Chief Compliance Officer and the President of TalaTek, Baan Alsinawi  as she shares her cybersecurity journey from a teenager who wanted to understand computers and held several positions in IT from help desk to systems engineering and cybersecurity. Founding her own business focusing on compliance, Baan says she spends maybe only 20% of her day on technical tasks and that there is always so more to do. Finding the right people for her team is a marker of success for Baan. She talks of the importance of sharing the sense of community of women in technology and nurturing women in the field. We thank Baan for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>482</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[93c942ce-d4e9-11ef-8d3e-877b77cc56e4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3994947178.mp3?updated=1737133808" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A cute cover for a dangerous vulnerability. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/361/notes</link>
      <description>Nati Tal, Head of Guardio Labs, sits down to share their work on “CrossBarking” — Exploiting a 0-Day Opera Vulnerability with a Cross-Browser Extension Store Attack. Guardio Labs has uncovered a critical vulnerability in the Opera browser, enabling malicious extensions to exploit Private APIs for actions like screen capturing, browser setting changes, and account hijacking. 
Highlighting the ease of bypassing extension store security, researchers demonstrated how a puppy-themed extension exploiting this flaw could infiltrate both Chrome and Opera's extension stores, potentially reaching millions of users. This case underscores the delicate balance between enhancing browser productivity and ensuring robust security measures, revealing the alarming tactics modern threat actors employ to exploit trusted platforms.
The research can be found here:
“CrossBarking” — Exploiting a 0-Day Opera Vulnerability with a Cross-Browser Extension Store Attack

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Jan 2025 08:00:00 -0000</pubDate>
      <itunes:title>A cute cover for a dangerous vulnerability. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>361</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Nati Tal, Head of Guardio Labs, sits down to share their work on “CrossBarking” — Exploiting a 0-Day Opera Vulnerability with a Cross-Browser Extension Store Attack. Guardio Labs has uncovered a critical vulnerability in the Opera browser, enabling malicious extensions to exploit Private APIs for actions like screen capturing, browser setting changes, and account hijacking. 
Highlighting the ease of bypassing extension store security, researchers demonstrated how a puppy-themed extension exploiting this flaw could infiltrate both Chrome and Opera's extension stores, potentially reaching millions of users. This case underscores the delicate balance between enhancing browser productivity and ensuring robust security measures, revealing the alarming tactics modern threat actors employ to exploit trusted platforms.
The research can be found here:
“CrossBarking” — Exploiting a 0-Day Opera Vulnerability with a Cross-Browser Extension Store Attack

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/natital/">Nati Tal</a>, Head of <a href="https://www.linkedin.com/company/guardiosec/">Guardio Labs</a>, sits down to share their work on “CrossBarking” — Exploiting a 0-Day Opera Vulnerability with a Cross-Browser Extension Store Attack. Guardio Labs has uncovered a critical vulnerability in the Opera browser, enabling malicious extensions to exploit Private APIs for actions like screen capturing, browser setting changes, and account hijacking. </p><p>Highlighting the ease of bypassing extension store security, researchers demonstrated how a puppy-themed extension exploiting this flaw could infiltrate both Chrome and Opera's extension stores, potentially reaching millions of users. This case underscores the delicate balance between enhancing browser productivity and ensuring robust security measures, revealing the alarming tactics modern threat actors employ to exploit trusted platforms.</p><p>The research can be found here:</p><ul><li><a href="https://labs.guard.io/crossbarking-exploiting-a-0-day-opera-vulnerability-with-a-cross-browser-extension-store-attack-db3e6d6e6aa8">“CrossBarking” — Exploiting a 0-Day Opera Vulnerability with a Cross-Browser Extension Store Attack</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1304</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b3f8b31a-d50a-11ef-8044-336cbe396aaa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9814550046.mp3?updated=1737143312" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacking the bureau.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2227/notes</link>
      <description>The FBI warns agents of hacked call and text logs. The US Treasury sanctions entities tied to North Korea’s fake IT worker operations. Russian hacking group Star Blizzard attempted to infiltrate WhatsApp accounts of nonprofits supporting Ukraine. Yubico discloses a critical vulnerability in its Pluggable Authentication Module)software.  Google releases an open-source library for software composition analysis. CISA hopes to close the software understanding gap. Pumakit targets critical infrastructure. Simplehelp patches multiple flaws in their remote access software. The FTC bans GM from selling driver data. HHS outlines their efforts to protect hospitals and healthcare. Our guest Maria Tranquilli, Executive Director at Common Mission Project, speaks with N2K’s Executive Editor Brandon Karpf about the origins and impact of Hacking for Defense. Even the best of red teamers are humbled by AI. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest Maria Tranquilli, Executive Director at Common Mission Project, speaks with N2K’s Executive Editor Brandon Karpf about the origins and impact of Hacking for Defense, and how universities can get involved.

Selected Reading
FBI Has Warned Agents It Believes Hackers Stole Their Call Logs (Bloomberg)
US Announces Sanctions Against North Korean Fake IT Worker Network (SecurityWeek)
Russian Star Blizzard hackers exploit WhatsApp accounts to spy on nonprofits aiding Ukraine (The Record)
Yubico PAM Module Vulnerability Let Attackers Bypass Authentications In Certain Configurations (Cyber Security News)
Google Releases Open Source Library for Software Composition Analysis (SecurityWeek)
Closing the Software Understanding Gap (CISA)
Pumakit - A Sophisticated Linux Rootkit Attack Critical Infrastructure (Cyber Security News)
Vulnerabilities in SimpleHelp Remote Access Software May Lead to System Compromise (SecurityWeek)
FTC hands GM a 5-year ban on selling sensitive driver info to data brokers (The Record)
How HHS has strengthened cybersecurity of hospitals and health care systems (CyberScoop)
Microsoft AI Red Team says security work will never be done (The Register) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 17 Jan 2025 21:10:00 -0000</pubDate>
      <itunes:title>Hacking the bureau.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2227</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The FBI warns agents of hacked call and text logs. The US Treasury sanctions entities tied to North Korea’s fake IT worker operations. Russian hacking group Star Blizzard attempted to infiltrate WhatsApp accounts of nonprofits supporting Ukraine. Yubico discloses a critical vulnerability in its Pluggable Authentication Module)software.  Google releases an open-source library for software composition analysis. CISA hopes to close the software understanding gap. Pumakit targets critical infrastructure. Simplehelp patches multiple flaws in their remote access software. The FTC bans GM from selling driver data. HHS outlines their efforts to protect hospitals and healthcare. Our guest Maria Tranquilli, Executive Director at Common Mission Project, speaks with N2K’s Executive Editor Brandon Karpf about the origins and impact of Hacking for Defense. Even the best of red teamers are humbled by AI. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest Maria Tranquilli, Executive Director at Common Mission Project, speaks with N2K’s Executive Editor Brandon Karpf about the origins and impact of Hacking for Defense, and how universities can get involved.

Selected Reading
FBI Has Warned Agents It Believes Hackers Stole Their Call Logs (Bloomberg)
US Announces Sanctions Against North Korean Fake IT Worker Network (SecurityWeek)
Russian Star Blizzard hackers exploit WhatsApp accounts to spy on nonprofits aiding Ukraine (The Record)
Yubico PAM Module Vulnerability Let Attackers Bypass Authentications In Certain Configurations (Cyber Security News)
Google Releases Open Source Library for Software Composition Analysis (SecurityWeek)
Closing the Software Understanding Gap (CISA)
Pumakit - A Sophisticated Linux Rootkit Attack Critical Infrastructure (Cyber Security News)
Vulnerabilities in SimpleHelp Remote Access Software May Lead to System Compromise (SecurityWeek)
FTC hands GM a 5-year ban on selling sensitive driver info to data brokers (The Record)
How HHS has strengthened cybersecurity of hospitals and health care systems (CyberScoop)
Microsoft AI Red Team says security work will never be done (The Register) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FBI warns agents of hacked call and text logs. The US Treasury sanctions entities tied to North Korea’s fake IT worker operations. Russian hacking group Star Blizzard attempted to infiltrate WhatsApp accounts of nonprofits supporting Ukraine. Yubico discloses a critical vulnerability in its Pluggable Authentication Module)software.  Google releases an open-source library for software composition analysis. CISA hopes to close the software understanding gap. Pumakit targets critical infrastructure. Simplehelp patches multiple flaws in their remote access software. The FTC bans GM from selling driver data. HHS outlines their efforts to protect hospitals and healthcare. Our guest Maria Tranquilli, Executive Director at Common Mission Project, speaks with N2K’s Executive Editor Brandon Karpf about the origins and impact of Hacking for Defense. Even the best of red teamers are humbled by AI. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest <a href="https://www.linkedin.com/in/mariatranquilli/">Maria Tranquilli</a>, Executive Director at <a href="https://www.commonmission.us/">Common Mission Project</a>, speaks with <a href="https://www.n2k.com/">N2K</a>’s Executive Editor <a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a> about the origins and impact of <a href="https://www.h4d.us/">Hacking for Defense</a>, and how universities can get involved.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bloomberg.com/news/articles/2025-01-16/fbi-has-warned-agents-it-believes-hackers-stole-their-call-logs">FBI Has Warned Agents It Believes Hackers Stole Their Call Logs</a> (Bloomberg)</p><p><a href="https://www.securityweek.com/us-announces-sanctions-against-north-korean-fake-it-worker-network/">US Announces Sanctions Against North Korean Fake IT Worker Network</a> (SecurityWeek)</p><p><a href="https://therecord.media/russia-star-blizzard-whatsapp-ukraine">Russian Star Blizzard hackers exploit WhatsApp accounts to spy on nonprofits aiding Ukraine</a> (The Record)</p><p><a href="https://cybersecuritynews.com/yubico-pam-module-vulnerability-let-attackers-bypass-authentications/">Yubico PAM Module Vulnerability Let Attackers Bypass Authentications In Certain Configurations</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/google-releases-open-source-library-for-software-composition-analysis/">Google Releases Open Source Library for Software Composition Analysis</a> (SecurityWeek)</p><p><a href="https://www.cisa.gov/resources-tools/resources/closing-software-understanding-gap">Closing the Software Understanding Gap</a> (CISA)</p><p><a href="https://cybersecuritynews.com/pumakit-linux-rootkit/">Pumakit - A Sophisticated Linux Rootkit Attack Critical Infrastructure</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/vulnerabilities-in-simplehelp-remote-access-software-may-lead-to-system-compromise/">Vulnerabilities in SimpleHelp Remote Access Software May Lead to System Compromise</a> (SecurityWeek)</p><p><a href="https://therecord.media/ftc-gm-settlement-5-year-ban-selling-driver-data">FTC hands GM a 5-year ban on selling sensitive driver info to data brokers</a> (The Record)</p><p><a href="https://cyberscoop.com/hhs-cybersecurity-health-care-systems-hospitals/">How HHS has strengthened cybersecurity of hospitals and health care systems</a> (CyberScoop)</p><p><a href="https://www.theregister.com/2025/01/17/microsoft_ai_redteam_infosec_warning/">Microsoft AI Red Team says security work will never be done</a> (The Register) </p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2056</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[62d29e4e-d378-11ef-84f5-23e11464baf4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6636649926.mp3?updated=1737144805" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bolstering the digital shield.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2226/notes</link>
      <description>President Biden issues a comprehensive  cybersecurity executive order. Updates on Silk Typhoon’s US Treasury breach. A Chinese telecom hardware firm is under FBI investigation. A critical vulnerability has been found in the UEFI Secure Boot mechanism. California-based cannabis brand Stiiizy suffers a data breach. North Korea’s Lazarus Group lures freelance developers. The FTC highlights major security failures at web hosting giant GoDaddy. Veeam patches a critical vulnerability in their Backup for Microsoft Azure product. Hackers leak sensitive data from over 15,000 Fortinet firewalls. Our guest today is Oren Koren, Veriti's Co-founder and CPO, sharing insights about the state of healthcare cybersecurity. Shiver me timbers! Meta’s AI trains on a treasure chest of pirated books.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest today is Oren Koren, Veriti's Co-founder and CPO, sharing insights about the state of healthcare cybersecurity. You can read more in their “The State of Healthcare Cybersecurity 2025” report. 

Selected Reading
Biden to sign executive order on AI and software security (Axios)
Treasury Breach by Chinese Sponsored Hackers Focused on Sanctions, Report Says (Bloomberg)
Exclusive: Chinese tech firm founded by Huawei veterans in the FBI's crosshairs (Reuters)
New UEFI Secure Boot Bypass Vulnerability Exposes Systems to Malicious Bootkits (Cyber Security News)
380,000 Impacted by Data Breach at Cannabis Retailer Stiiizy (SecurityWeek)
North Korean Hackers Targeting Freelance Software Developers (SecurityWeek)
GoDaddy Accused of Serious Security Failings by FTC (Infosecurity Magazine)
Veeam Azure Backup Solution Vulnerability Allows Attackers To Enumerate Network (Cyber Security News)
Hacking group leaks Fortinet users’ details on dark web (Computing)
Meta Secretly Trained Its AI on a Notorious Piracy Database, Newly Unredacted Court Docs Reveal (WIRED)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 16 Jan 2025 21:10:00 -0000</pubDate>
      <itunes:title>Bolstering the digital shield.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2226</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>President Biden issues a comprehensive  cybersecurity executive order. Updates on Silk Typhoon’s US Treasury breach. A Chinese telecom hardware firm is under FBI investigation. A critical vulnerability has been found in the UEFI Secure Boot mechanism. California-based cannabis brand Stiiizy suffers a data breach. North Korea’s Lazarus Group lures freelance developers. The FTC highlights major security failures at web hosting giant GoDaddy. Veeam patches a critical vulnerability in their Backup for Microsoft Azure product. Hackers leak sensitive data from over 15,000 Fortinet firewalls. Our guest today is Oren Koren, Veriti's Co-founder and CPO, sharing insights about the state of healthcare cybersecurity. Shiver me timbers! Meta’s AI trains on a treasure chest of pirated books.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest today is Oren Koren, Veriti's Co-founder and CPO, sharing insights about the state of healthcare cybersecurity. You can read more in their “The State of Healthcare Cybersecurity 2025” report. 

Selected Reading
Biden to sign executive order on AI and software security (Axios)
Treasury Breach by Chinese Sponsored Hackers Focused on Sanctions, Report Says (Bloomberg)
Exclusive: Chinese tech firm founded by Huawei veterans in the FBI's crosshairs (Reuters)
New UEFI Secure Boot Bypass Vulnerability Exposes Systems to Malicious Bootkits (Cyber Security News)
380,000 Impacted by Data Breach at Cannabis Retailer Stiiizy (SecurityWeek)
North Korean Hackers Targeting Freelance Software Developers (SecurityWeek)
GoDaddy Accused of Serious Security Failings by FTC (Infosecurity Magazine)
Veeam Azure Backup Solution Vulnerability Allows Attackers To Enumerate Network (Cyber Security News)
Hacking group leaks Fortinet users’ details on dark web (Computing)
Meta Secretly Trained Its AI on a Notorious Piracy Database, Newly Unredacted Court Docs Reveal (WIRED)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>President Biden issues a comprehensive  cybersecurity executive order. Updates on Silk Typhoon’s US Treasury breach. A Chinese telecom hardware firm is under FBI investigation. A critical vulnerability has been found in the UEFI Secure Boot mechanism. California-based cannabis brand Stiiizy suffers a data breach. North Korea’s Lazarus Group lures freelance developers. The FTC highlights major security failures at web hosting giant GoDaddy. Veeam patches a critical vulnerability in their Backup for Microsoft Azure product. Hackers leak sensitive data from over 15,000 Fortinet firewalls. Our guest today is Oren Koren, Veriti's Co-founder and CPO, sharing insights about the state of healthcare cybersecurity. Shiver me timbers! Meta’s AI trains on a treasure chest of pirated books.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest today is <a href="https://www.linkedin.com/in/orenkorenclo/">Oren Koren</a>, <a href="https://veriti.ai/">Veriti</a>'s Co-founder and CPO, sharing insights about the state of healthcare cybersecurity. You can read more in their “<a href="https://veriti.ai/downloads/the-state-of-healthcare-cybersecurity-2025/">The State of Healthcare Cybersecurity 2025</a>” report. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.axios.com/2025/01/16/biden-executive-order-ai-cyber-security-trump">Biden to sign executive order on AI and software security</a> (Axios)</p><p><a href="https://www.bloomberg.com/news/articles/2025-01-16/treasury-hackers-focused-on-sanctions-intelligence-report-says">Treasury Breach by Chinese Sponsored Hackers Focused on Sanctions, Report Says</a> (Bloomberg)</p><p><a href="https://www.reuters.com/technology/chinese-tech-firm-founded-by-huawei-veterans-fbis-crosshairs-2025-01-16/">Exclusive: Chinese tech firm founded by Huawei veterans in the FBI's crosshairs</a> (Reuters)</p><p><a href="https://cybersecuritynews.com/uefi-secure-boot-bypass-vulnerability/">New UEFI Secure Boot Bypass Vulnerability Exposes Systems to Malicious Bootkits</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/380000-impacted-by-data-breach-at-cannabis-retailer-stiiizy/">380,000 Impacted by Data Breach at Cannabis Retailer Stiiizy</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/north-korean-hackers-targeting-freelance-software-developers/">North Korean Hackers Targeting Freelance Software Developers</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/godaddy-security-failings-ftc/">GoDaddy Accused of Serious Security Failings by FTC</a> (Infosecurity Magazine)</p><p><a href="https://cybersecuritynews.com/veeam-azure-backup-solution-vulnerability/">Veeam Azure Backup Solution Vulnerability Allows Attackers To Enumerate Network</a> (Cyber Security News)</p><p><a href="https://www.computing.co.uk/news/2025/security/hacking-group-leaks-fortinet-users-details-dark-web">Hacking group leaks Fortinet users’ details on dark web</a> (Computing)</p><p><a href="https://www.wired.com/story/new-documents-unredacted-meta-copyright-ai-lawsuit/">Meta Secretly Trained Its AI on a Notorious Piracy Database, Newly Unredacted Court Docs Reveal</a> (WIRED)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1717</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[629332b8-d378-11ef-84f5-079f102ab526]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1238213130.mp3?updated=1737058182" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Massive malware cleanup.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2225/notes</link>
      <description>The FBI deletes PlugX malware from thousands of U.S. computers. Researchers uncover vulnerabilities in Windows 11 allowing attackers to bypass protections and execute code at the kernel level. A look at (a busy) Patch Tuesday. Researchers uncovered six critical vulnerabilities in a popular Linux file transfer tool. Texas sues Allstate for allegedly collecting, using, and selling driving data without proper consent. An executive order enables AI developers to build data centers on federal lands. On our Industry Voices segment, we are joined by Mike Hamilton, Chief Information Officer at Cloudflare, discussing how tech sprawl emulates the snake game. Meta profits while users suffer. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Industry Voices Segment
On our Industry Voices segment, we are joined by Mike Hamilton, Chief Information Officer at Cloudflare, discussing how tech sprawl emulates the snake game. You can read Mike’s thoughts here. 

Selected Reading
FBI deletes Chinese PlugX malware from thousands of US computers (Bleeping Computer) 
Windows 11 Security Features Bypassed to Obtain Arbitrary Code Execution in Kernel Mode (Cyber Security News) 
Microsoft Patches Eight Zero-Days to Start the Year (Infosecurity Magazine)
Chrome 132 Patches 16 Vulnerabilities (SecurityWeek)
Nvidia, Zoom, Zyxel Patch High-Severity Vulnerabilities (SecurityWeek)
Ivanti Patches Critical Vulnerabilities in Endpoint Manager (SecurityWeek)
Zoom Patches Multiple Vulnerabilities That Let Attackers Escalate Privileges (Cyber Security News)
Apple Patches Flaw That Allows Kernel Security Bypassing (GovInfo Security)
ICS Patch Tuesday: Security Advisories Published by Schneider, Siemens, Phoenix Contact, CISA (SecurityWeek)
Linux Rsync File Transfer Tool Vulnerability Let Attackers Execute Arbitrary Code (Cyber Security News)
Allstate car insurer sued for tracking drivers without permission (Bleeping Computer) 
Biden Opens US Federal Sites for AI Data Center Growth (BankInfo Security)
Instagram Ads Send This Nudify Site 90 Percent of Its Traffic (404 Media) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 15 Jan 2025 21:10:00 -0000</pubDate>
      <itunes:title>Massive malware cleanup.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2225</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The FBI deletes PlugX malware from thousands of U.S. computers. Researchers uncover vulnerabilities in Windows 11 allowing attackers to bypass protections and execute code at the kernel level. A look at (a busy) Patch Tuesday. Researchers uncovered six critical vulnerabilities in a popular Linux file transfer tool. Texas sues Allstate for allegedly collecting, using, and selling driving data without proper consent. An executive order enables AI developers to build data centers on federal lands. On our Industry Voices segment, we are joined by Mike Hamilton, Chief Information Officer at Cloudflare, discussing how tech sprawl emulates the snake game. Meta profits while users suffer. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Industry Voices Segment
On our Industry Voices segment, we are joined by Mike Hamilton, Chief Information Officer at Cloudflare, discussing how tech sprawl emulates the snake game. You can read Mike’s thoughts here. 

Selected Reading
FBI deletes Chinese PlugX malware from thousands of US computers (Bleeping Computer) 
Windows 11 Security Features Bypassed to Obtain Arbitrary Code Execution in Kernel Mode (Cyber Security News) 
Microsoft Patches Eight Zero-Days to Start the Year (Infosecurity Magazine)
Chrome 132 Patches 16 Vulnerabilities (SecurityWeek)
Nvidia, Zoom, Zyxel Patch High-Severity Vulnerabilities (SecurityWeek)
Ivanti Patches Critical Vulnerabilities in Endpoint Manager (SecurityWeek)
Zoom Patches Multiple Vulnerabilities That Let Attackers Escalate Privileges (Cyber Security News)
Apple Patches Flaw That Allows Kernel Security Bypassing (GovInfo Security)
ICS Patch Tuesday: Security Advisories Published by Schneider, Siemens, Phoenix Contact, CISA (SecurityWeek)
Linux Rsync File Transfer Tool Vulnerability Let Attackers Execute Arbitrary Code (Cyber Security News)
Allstate car insurer sued for tracking drivers without permission (Bleeping Computer) 
Biden Opens US Federal Sites for AI Data Center Growth (BankInfo Security)
Instagram Ads Send This Nudify Site 90 Percent of Its Traffic (404 Media) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FBI deletes PlugX malware from thousands of U.S. computers. Researchers uncover vulnerabilities in Windows 11 allowing attackers to bypass protections and execute code at the kernel level. A look at (a busy) Patch Tuesday. Researchers uncovered six critical vulnerabilities in a popular Linux file transfer tool. Texas sues Allstate for allegedly collecting, using, and selling driving data without proper consent. An executive order enables AI developers to build data centers on federal lands. On our Industry Voices segment, we are joined by Mike Hamilton, Chief Information Officer at Cloudflare, discussing how tech sprawl emulates the snake game. Meta profits while users suffer. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Industry Voices Segment</h2><p>On our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/mike-hamilton-us/">Mike Hamilton</a>, Chief Information Officer at <a href="https://www.cloudflare.com/">Cloudflare</a>, discussing how tech sprawl emulates the snake game. You can read Mike’s thoughts <a href="https://www.cloudflare.com/the-net/game-on/tech-sprawl/">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/fbi-deletes-chinese-plugx-malware-from-thousands-of-us-computers/">FBI deletes Chinese PlugX malware from thousands of US computers</a> (Bleeping Computer) </p><p><a href="https://cybersecuritynews.com/windows-11-bypassed-arbitrary-code-kernel-mode/">Windows 11 Security Features Bypassed to Obtain Arbitrary Code Execution in Kernel Mode</a> (Cyber Security News) </p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-patches-eight-zerodays/">Microsoft Patches Eight Zero-Days to Start the Year</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/chrome-132-patches-16-vulnerabilities/">Chrome 132 Patches 16 Vulnerabilities</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/nvidia-zoom-zyxel-patch-high-severity-vulnerabilities/">Nvidia, Zoom, Zyxel Patch High-Severity Vulnerabilities</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/ivanti-patches-critical-vulnerabilities-in-endpoint-manager-2/">Ivanti Patches Critical Vulnerabilities in Endpoint Manager</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/zoom-matches-multiple-vulnerabilities/">Zoom Patches Multiple Vulnerabilities That Let Attackers Escalate Privileges</a> (Cyber Security News)</p><p><a href="https://www.govinfosecurity.com/apple-patches-flaw-that-allows-kernel-security-bypassing-a-27289">Apple Patches Flaw That Allows Kernel Security Bypassing</a> (GovInfo Security)</p><p><a href="https://www.securityweek.com/ics-patch-tuesday-security-advisories-published-by-schneider-siemens-phoenix-contact-cisa/">ICS Patch Tuesday: Security Advisories Published by Schneider, Siemens, Phoenix Contact, CISA</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/linux-rsync-file-transfer-tool-vulnerability/">Linux Rsync File Transfer Tool Vulnerability Let Attackers Execute Arbitrary Code</a> (Cyber Security News)</p><p><a href="https://www.bleepingcomputer.com/news/legal/allstate-car-insurer-sued-for-tracking-drivers-without-permission/">Allstate car insurer sued for tracking drivers without permission</a> (Bleeping Computer) </p><p><a href="https://www.bankinfosecurity.com/biden-opens-us-federal-sites-for-ai-data-center-growth-a-27295">Biden Opens US Federal Sites for AI Data Center Growth</a> (BankInfo Security)</p><p><a href="https://www.404media.co/instagram-ads-send-this-nudify-site-90-percent-of-its-traffic/">Instagram Ads Send This Nudify Site 90 Percent of Its Traffic</a> (404 Media) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1775</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[62234444-d378-11ef-84f5-0b92884c8f17]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3919855926.mp3?updated=1736971199" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>National security in the digital age.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2224/notes</link>
      <description>A draft cybersecurity executive order from the Biden administration seeks to bolster defenses. Researchers identify a “mass exploitation campaign” targeting Fortinet firewalls. A Chinese-language illicit online marketplace is growing at an alarming rate. CISA urges patching of a second BeyondTrust vulnerability. The UK proposes banning ransomware payments by public sector and critical infrastructure organizations. A critical flaw in Google’s authentication flow exposes millions to unauthorized access.OWASP releases its first Non-Human Identities (NHI) Top 10. A Microsoft lawsuit targets individuals accused of bypassing safety controls in its Azure OpenAI tools. Our guest is Chris Pierson, Founder and CEO of BlackCloak, discussing digital executive protection. The feds remind the health care sector that AI must first do no harm. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Chris Pierson, Founder and CEO of BlackCloak, discussing digital executive protection.

Selected Reading
Second Biden cyber executive order directs agency action on fed security, AI, space (CyberScoop)
Snoops exploited Fortinet firewalls with 'probable' 0-day (The Register)
The ‘Largest Illicit Online Marketplace’ Ever Is Growing at an Alarming Rate, Report Says (WIRED)
CISA Warns of Second BeyondTrust Vulnerability Exploited in Attacks (SecurityWeek)
UK Considers Ban on Ransomware Payments by Public Bodies (Infosecurity Magazine)
Google OAuth "Sign in with Google" Vulnerability Exposes Millions of Accounts to Data Theft (Cyber Security News)
OWASP Publishes First-Ever Top 10 “Non-Human Identities (NHI) Security Risks (Cyber Security News)
Microsoft Sues Harmful Fake AI Image Crime Ring (GovInfo Security)
Feds Tell Health Sector to Watch for Bias in AI Decisions (BankInfo Security)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Jan 2025 21:10:00 -0000</pubDate>
      <itunes:title>National security in the digital age.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2224</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A draft cybersecurity executive order from the Biden administration seeks to bolster defenses. Researchers identify a “mass exploitation campaign” targeting Fortinet firewalls. A Chinese-language illicit online marketplace is growing at an alarming rate. CISA urges patching of a second BeyondTrust vulnerability. The UK proposes banning ransomware payments by public sector and critical infrastructure organizations. A critical flaw in Google’s authentication flow exposes millions to unauthorized access.OWASP releases its first Non-Human Identities (NHI) Top 10. A Microsoft lawsuit targets individuals accused of bypassing safety controls in its Azure OpenAI tools. Our guest is Chris Pierson, Founder and CEO of BlackCloak, discussing digital executive protection. The feds remind the health care sector that AI must first do no harm. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Chris Pierson, Founder and CEO of BlackCloak, discussing digital executive protection.

Selected Reading
Second Biden cyber executive order directs agency action on fed security, AI, space (CyberScoop)
Snoops exploited Fortinet firewalls with 'probable' 0-day (The Register)
The ‘Largest Illicit Online Marketplace’ Ever Is Growing at an Alarming Rate, Report Says (WIRED)
CISA Warns of Second BeyondTrust Vulnerability Exploited in Attacks (SecurityWeek)
UK Considers Ban on Ransomware Payments by Public Bodies (Infosecurity Magazine)
Google OAuth "Sign in with Google" Vulnerability Exposes Millions of Accounts to Data Theft (Cyber Security News)
OWASP Publishes First-Ever Top 10 “Non-Human Identities (NHI) Security Risks (Cyber Security News)
Microsoft Sues Harmful Fake AI Image Crime Ring (GovInfo Security)
Feds Tell Health Sector to Watch for Bias in AI Decisions (BankInfo Security)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A draft cybersecurity executive order from the Biden administration seeks to bolster defenses. Researchers identify a “mass exploitation campaign” targeting Fortinet firewalls. A Chinese-language illicit online marketplace is growing at an alarming rate. CISA urges patching of a second BeyondTrust vulnerability. The UK proposes banning ransomware payments by public sector and critical infrastructure organizations. A critical flaw in Google’s authentication flow exposes millions to unauthorized access.OWASP releases its first Non-Human Identities (NHI) Top 10. A Microsoft lawsuit targets individuals accused of bypassing safety controls in its Azure OpenAI tools. Our guest is Chris Pierson, Founder and CEO of BlackCloak, discussing digital executive protection. The feds remind the health care sector that AI must first do no harm.<strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/drchristopherpierson/">Chris Pierson</a>, Founder and CEO of <a href="https://blackcloak.io/">BlackCloak</a>, discussing digital executive protection.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://cyberscoop.com/biden-administration-cybersecurity-executive-order-2025/">Second Biden cyber executive order directs agency action on fed security, AI, space</a> (CyberScoop)</p><p><a href="https://www.theregister.com/2025/01/14/miscreants_mass_exploited_fortinet_firewalls/">Snoops exploited Fortinet firewalls with 'probable' 0-day</a> (The Register)</p><p><a href="https://www.wired.com/story/the-largest-illicit-online-marketplace-ever-is-growing-at-an-alarming-rate/">The ‘Largest Illicit Online Marketplace’ Ever Is Growing at an Alarming Rate, Report Says</a> (WIRED)</p><p><a href="https://www.securityweek.com/cisa-warns-of-second-beyondtrust-vulnerability-exploited-in-attacks/">CISA Warns of Second BeyondTrust Vulnerability Exploited in Attacks</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/uk-ban-ransomware-payments/">UK Considers Ban on Ransomware Payments by Public Bodies</a> (Infosecurity Magazine)</p><p><a href="https://cybersecuritynews.com/google-oauth-vulnerability/">Google OAuth "Sign in with Google" Vulnerability Exposes Millions of Accounts to Data Theft</a> (Cyber Security News)</p><p><a href="https://cybersecuritynews.com/owasp-nhi-top-10/">OWASP Publishes First-Ever Top 10 “Non-Human Identities (NHI) Security Risks</a> (Cyber Security News)</p><p><a href="https://www.govinfosecurity.com/microsoft-sues-harmful-fake-ai-image-crime-ring-a-27277">Microsoft Sues Harmful Fake AI Image Crime Ring</a> (GovInfo Security)</p><p><a href="https://www.bankinfosecurity.com/feds-tell-health-sector-to-watch-for-bias-in-ai-decisions-a-27279">Feds Tell Health Sector to Watch for Bias in AI Decisions</a> (BankInfo Security)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1760</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5b1adf66-d2b2-11ef-8320-431ba015b56f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1750702698.mp3?updated=1736885440" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Multi-factor frustration.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2223/notes</link>
      <description>An MFA outage affects Microsoft 365 Office apps. The Biden administration  introduces new export controls to block adversaries from accessing advanced AI chips. A Dutch university cancels lectures after a cyberattack. Three Russian nationals have been indicted for operating cryptocurrency mixers. Juniper Networks releases security updates for Junos OS. Spain’s largest telecommunications company confirms a data breach. The “Banshee” infostealer leverages a stolen Apple encryption algorithm. Researchers uncover a novel ransomware campaign targeting Amazon S3 buckets. A major data broker suffers a major data breach. Our guest Philippe Humeau, CEO and Founder of CrowdSec, shares the biggest issues currently facing cybersecurity and how open-source cybersecurity platforms combat them. The weirdness of AI. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest Philippe Humeau, CEO and Founder of CrowdSec, shares the biggest issues currently facing cybersecurity and how open-source cybersecurity platforms combat them. 

Selected Reading
Microsoft MFA outage blocking access to Microsoft 365 apps (Bleeping Computer)
White House Moves to Restrict AI Chip Exports (GovInfo Security)
New Ransomware Group Uses AI to Develop Nefarious Tools (Infosecurity Magazine)
Cyberattack forces Dutch university to cancel lectures (The Record)
3 Russians Indicted for Operating Blender.io and Sinbad.io Crypto Mixers (Hackread)
Juniper Networks Fixes High-Severity Vulnerabilities in Junos OS (SecurityWeek)
Aviatrix Controller RCE Vulnerability Exploited In The Wild (Cyber Security News) 
Hackers Exploiting YouTube to Spread Malware That Steals Browser Data (GB Hackers)
Banshee 2.0 Malware Steals Apple's Encryption to Hide on Macs (Dark Reading)
A breach of a data broker's trove of location data threatens the privacy of millions (TechCrunch) 
Abusing AWS Native Services: Ransomware Encrypting S3 Buckets with SSE-C (Halcyon) 
AI Mistakes Are Very Different Than Human Mistakes (IEEE Spectrum)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 13 Jan 2025 21:10:00 -0000</pubDate>
      <itunes:title>Multi-factor frustration.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2223</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An MFA outage affects Microsoft 365 Office apps. The Biden administration  introduces new export controls to block adversaries from accessing advanced AI chips. A Dutch university cancels lectures after a cyberattack. Three Russian nationals have been indicted for operating cryptocurrency mixers. Juniper Networks releases security updates for Junos OS. Spain’s largest telecommunications company confirms a data breach. The “Banshee” infostealer leverages a stolen Apple encryption algorithm. Researchers uncover a novel ransomware campaign targeting Amazon S3 buckets. A major data broker suffers a major data breach. Our guest Philippe Humeau, CEO and Founder of CrowdSec, shares the biggest issues currently facing cybersecurity and how open-source cybersecurity platforms combat them. The weirdness of AI. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest Philippe Humeau, CEO and Founder of CrowdSec, shares the biggest issues currently facing cybersecurity and how open-source cybersecurity platforms combat them. 

Selected Reading
Microsoft MFA outage blocking access to Microsoft 365 apps (Bleeping Computer)
White House Moves to Restrict AI Chip Exports (GovInfo Security)
New Ransomware Group Uses AI to Develop Nefarious Tools (Infosecurity Magazine)
Cyberattack forces Dutch university to cancel lectures (The Record)
3 Russians Indicted for Operating Blender.io and Sinbad.io Crypto Mixers (Hackread)
Juniper Networks Fixes High-Severity Vulnerabilities in Junos OS (SecurityWeek)
Aviatrix Controller RCE Vulnerability Exploited In The Wild (Cyber Security News) 
Hackers Exploiting YouTube to Spread Malware That Steals Browser Data (GB Hackers)
Banshee 2.0 Malware Steals Apple's Encryption to Hide on Macs (Dark Reading)
A breach of a data broker's trove of location data threatens the privacy of millions (TechCrunch) 
Abusing AWS Native Services: Ransomware Encrypting S3 Buckets with SSE-C (Halcyon) 
AI Mistakes Are Very Different Than Human Mistakes (IEEE Spectrum)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An MFA outage affects Microsoft 365 Office apps. The Biden administration  introduces new export controls to block adversaries from accessing advanced AI chips. A Dutch university cancels lectures after a cyberattack. Three Russian nationals have been indicted for operating cryptocurrency mixers. Juniper Networks releases security updates for Junos OS. Spain’s largest telecommunications company confirms a data breach. The “Banshee” infostealer leverages a stolen Apple encryption algorithm. Researchers uncover a novel ransomware campaign targeting Amazon S3 buckets. A major data broker suffers a major data breach. Our guest Philippe Humeau, CEO and Founder of CrowdSec, shares the biggest issues currently facing cybersecurity and how open-source cybersecurity platforms combat them. The weirdness of AI.<strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest <a href="https://www.linkedin.com/in/philippehumeau">Philippe Humeau</a>, CEO and Founder of <a href="https://www.crowdsec.net/">CrowdSec</a>, shares the biggest issues currently facing cybersecurity and how open-source cybersecurity platforms combat them. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-mfa-outage-blocking-access-to-microsoft-365-apps/">Microsoft MFA outage blocking access to Microsoft 365 apps</a> (Bleeping Computer)</p><p><a href="https://www.govinfosecurity.com/white-house-moves-to-restrict-ai-chip-exports-a-27275">White House Moves to Restrict AI Chip Exports</a> (GovInfo Security)</p><p><a href="https://www.infosecurity-magazine.com/news/new-ransomware-group-uses-ai/">New Ransomware Group Uses AI to Develop Nefarious Tools</a> (Infosecurity Magazine)</p><p><a href="https://therecord.media/tu-eindhoven-cyberattack-lectures-canceled">Cyberattack forces Dutch university to cancel lectures</a> (The Record)</p><p><a href="https://hackread.com/3-russian-operating-blender-io-sinbad-io-crypto-mixers/">3 Russians Indicted for Operating Blender.io and Sinbad.io Crypto Mixers</a> (Hackread)</p><p><a href="https://www.securityweek.com/juniper-networks-fixes-high-severity-vulnerabilities-in-junos-os/">Juniper Networks Fixes High-Severity Vulnerabilities in Junos OS</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/aviatrix-controller-rce-vulnerability-exploited-in-wild/">Aviatrix Controller RCE Vulnerability Exploited In The Wild</a> (Cyber Security News) </p><p><a href="https://gbhackers.com/youtube-malware-browser-data-theft/">Hackers Exploiting YouTube to Spread Malware That Steals Browser Data</a> (GB Hackers)</p><p><a href="https://www.darkreading.com/threat-intelligence/banshee-malware-steals-apple-encryption-macs">Banshee 2.0 Malware Steals Apple's Encryption to Hide on Macs</a> (Dark Reading)</p><p><a href="https://techcrunch.com/2025/01/13/gravy-analytics-data-broker-breach-trove-of-location-data-threatens-privacy-millions/">A breach of a data broker's trove of location data threatens the privacy of millions </a><a href="https://techcrunch.com/2025/01/13/gravy-analytics-data-broker-breach-trove-of-location-data-threatens-privacy-millions/">(TechCrunch)</a><a href="https://techcrunch.com/2025/01/13/gravy-analytics-data-broker-breach-trove-of-location-data-threatens-privacy-millions/"> </a></p><p><a href="http://www.halcyon.ai/blog/abusing-aws-native-services-ransomware-encrypting-s3-buckets-with-sse-c">Abusing AWS Native Services: Ransomware Encrypting S3 Buckets with SSE-C</a> (Halcyon) </p><p><a href="https://spectrum.ieee.org/ai-mistakes-schneier">AI Mistakes Are Very Different Than Human Mistakes</a> (IEEE Spectrum)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1739</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[88783c86-d1ec-11ef-9955-938fc0400ca8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7886221392.mp3?updated=1736800484" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Michael Bishop Jr.: Good, bad or indifferent. [Security] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/50/notes</link>
      <description>Please enjoy this encore episode, where we are joined by Senior Security Officer at Centers for Medicare and Medicaid Services Michael Bishop Jr. as he shares his journey from Army infantryman deployed to Iraq to working in cybersecurity. After 12 years in the U.S. Army, Mike found himself in a rough spot. Looking for work and having some personal challenges, Mike's mentor, an Army officer he met while enlisted, recognized Mike's struggles and helped to nudge him toward cybersecurity. Mike credits his mentor with helping him transition to where he is today. Undergoing training for cybersecurity, he was tested in many areas and found the route he wanted to go. We thank Michael for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Jan 2025 08:00:00 -0000</pubDate>
      <itunes:title>Michael Bishop Jr.: Good, bad or indifferent. [Security] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>50</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode, where we are joined by Senior Security Officer at Centers for Medicare and Medicaid Services Michael Bishop Jr. as he shares his journey from Army infantryman deployed to Iraq to working in cybersecurity. After 12 years in the U.S. Army, Mike found himself in a rough spot. Looking for work and having some personal challenges, Mike's mentor, an Army officer he met while enlisted, recognized Mike's struggles and helped to nudge him toward cybersecurity. Mike credits his mentor with helping him transition to where he is today. Undergoing training for cybersecurity, he was tested in many areas and found the route he wanted to go. We thank Michael for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode, where we are joined by Senior Security Officer at Centers for Medicare and Medicaid Services Michael Bishop Jr. as he shares his journey from Army infantryman deployed to Iraq to working in cybersecurity. After 12 years in the U.S. Army, Mike found himself in a rough spot. Looking for work and having some personal challenges, Mike's mentor, an Army officer he met while enlisted, recognized Mike's struggles and helped to nudge him toward cybersecurity. Mike credits his mentor with helping him transition to where he is today. Undergoing training for cybersecurity, he was tested in many areas and found the route he wanted to go. We thank Michael for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>440</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[867f1f60-cf9b-11ef-b3ea-537f2a2e1dec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7491913624.mp3?updated=1736545536" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The hidden cost of data hoarding. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/339/notes</link>
      <description>This week, we are joined by Kyla Cardona and Aurora Johnson from SpyCloud discussing their research "China’s Surveillance State Is Selling Citizen Data as a Side Hustle." Chinese technology companies, under CCP mandate, collect vast amounts of data on citizens, creating opportunities for corrupt insiders to steal and resell this information on dark markets. These stolen datasets, aggregated into "Social Work Libraries" (SGKs), mirror lower-tech versions of CCP internal security databases. 
Kyla and Aurora discuss how Chinese cybercriminals use these SGKs and their implications compared to Western, European, and Russian cybercrime ecosystems. With expertise in Chinese OSINT and cybersecurity policy, both researchers bring deep insights into the geopolitical and technical dynamics of China's digital landscape.
The research can be found here:

“Pantsless Data”: Decoding Chinese Cybercrime TTPs

A Deep Dive Into the Intricate Chinese Cybercrime Ecosystem

China’s Surveillance State Is Selling Citizen Data as a Side Hustle


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Jan 2025 08:00:00 -0000</pubDate>
      <itunes:title>The hidden cost of data hoarding. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>339</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, we are joined by Kyla Cardona and Aurora Johnson from SpyCloud discussing their research "China’s Surveillance State Is Selling Citizen Data as a Side Hustle." Chinese technology companies, under CCP mandate, collect vast amounts of data on citizens, creating opportunities for corrupt insiders to steal and resell this information on dark markets. These stolen datasets, aggregated into "Social Work Libraries" (SGKs), mirror lower-tech versions of CCP internal security databases. 
Kyla and Aurora discuss how Chinese cybercriminals use these SGKs and their implications compared to Western, European, and Russian cybercrime ecosystems. With expertise in Chinese OSINT and cybersecurity policy, both researchers bring deep insights into the geopolitical and technical dynamics of China's digital landscape.
The research can be found here:

“Pantsless Data”: Decoding Chinese Cybercrime TTPs

A Deep Dive Into the Intricate Chinese Cybercrime Ecosystem

China’s Surveillance State Is Selling Citizen Data as a Side Hustle


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/kylakcardona/">Kyla Cardona</a> and <a href="https://www.linkedin.com/in/aurora-johnson-417b2911b/">Aurora Johnson</a> from <a href="https://www.linkedin.com/company/spycloud/">SpyCloud</a> discussing their research "China’s Surveillance State Is Selling Citizen Data as a Side Hustle." Chinese technology companies, under CCP mandate, collect vast amounts of data on citizens, creating opportunities for corrupt insiders to steal and resell this information on dark markets. These stolen datasets, aggregated into "Social Work Libraries" (SGKs), mirror lower-tech versions of CCP internal security databases. </p><p>Kyla and Aurora discuss how Chinese cybercriminals use these SGKs and their implications compared to Western, European, and Russian cybercrime ecosystems. With expertise in Chinese OSINT and cybersecurity policy, both researchers bring deep insights into the geopolitical and technical dynamics of China's digital landscape.</p><p>The research can be found here:</p><ul>
<li><a href="https://spycloud.com/blog/growing-chinese-threat-actor-ecosystem/">“Pantsless Data”: Decoding Chinese Cybercrime TTPs</a></li>
<li><a href="https://spycloud.com/blog/deep-dive-chinese-cybercrime-ecosystem/">A Deep Dive Into the Intricate Chinese Cybercrime Ecosystem</a></li>
<li><a href="https://www.wired.com/story/chineses-surveillance-state-is-selling-citizens-data-as-a-side-hustle/">China’s Surveillance State Is Selling Citizen Data as a Side Hustle</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1898</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2064ae5e-cf99-11ef-8832-671acc7d0917]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4803393533.mp3?updated=1736544848" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When retaliation turns digital.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2222/notes</link>
      <description>New details emerge about Chinese hackers breaching the US Treasury Department. The Supreme Court considers the TikTok ban. Chinese hackers exploit a zero-day flaw in Ivanti Connect Secure VPN. A new credit card skimmer malware targets WordPress checkout pages. The Banshee macOS info-stealer has been updated. A California health services organization reports a data breach. A Florida firm pays a $337,750 HIPAA settlement following a 2018 breach. Samsung patches Android devices. A Proton Mail outage hits users worldwide. A popular e-card site recovers from malware. CertByte segment host Chris Hare interviews our guest Casey Marks, ISC2's Chief Qualifications Officer, about the future of certifications. That’s a feature, not a hack. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
CertByte segment host Chris Hare interviews our guest Casey Marks, ISC2's Chief Qualifications Officer, about certifications and where they could be heading. You can check out their 2024 ISC2 Cybersecurity Workforce study here. 

Selected Reading
Chinese hackers breached US government office that assesses foreign investments for national security risks (CNN)
Supreme Court considers whether to allow TikTok ban to take effect (NBC News) 
Ivanti VPN zero-day exploited by Chinese hackers (SC Media)
New Skimmer Malware Hijacking WordPress Websites to Steal Credit Cards (Cyber Security News)
Banshee macOS Malware Expands Targeting (SecurityWeek)
BayMark Health Services Reports Data Breach, Exposing Patient Information (The Cyber Express)
Florida Firm Fined $337K by Feds for Data Deleted in Hack (BankInfo Security)
Samsung Patches Multiple Vulnerabilities That Let Attackers Execute Arbitrary Code (Cyber Security News)
Proton Mail still down as Proton recovers from worldwide outage (Bleeping Computer)
GroupGreeting e-card site attacked in “zqxq” campaign (Malwarebytes)
Microsoft DRM Hacking Raises Questions on Vulnerability Disclosures (SecurityWeek)
Facebook awards researcher $100,000 for finding bug that granted internal access (RocketNews)
Developers sent into security panic by 'useful feature' (The Register)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 10 Jan 2025 21:40:00 -0000</pubDate>
      <itunes:title>When retaliation turns digital.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2226</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>New details emerge about Chinese hackers breaching the US Treasury Department. The Supreme Court considers the TikTok ban. Chinese hackers exploit a zero-day flaw in Ivanti Connect Secure VPN. A new credit card skimmer malware targets WordPress checkout pages. The Banshee macOS info-stealer has been updated. A California health services organization reports a data breach. A Florida firm pays a $337,750 HIPAA settlement following a 2018 breach. Samsung patches Android devices. A Proton Mail outage hits users worldwide. A popular e-card site recovers from malware. CertByte segment host Chris Hare interviews our guest Casey Marks, ISC2's Chief Qualifications Officer, about the future of certifications. That’s a feature, not a hack. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
CertByte segment host Chris Hare interviews our guest Casey Marks, ISC2's Chief Qualifications Officer, about certifications and where they could be heading. You can check out their 2024 ISC2 Cybersecurity Workforce study here. 

Selected Reading
Chinese hackers breached US government office that assesses foreign investments for national security risks (CNN)
Supreme Court considers whether to allow TikTok ban to take effect (NBC News) 
Ivanti VPN zero-day exploited by Chinese hackers (SC Media)
New Skimmer Malware Hijacking WordPress Websites to Steal Credit Cards (Cyber Security News)
Banshee macOS Malware Expands Targeting (SecurityWeek)
BayMark Health Services Reports Data Breach, Exposing Patient Information (The Cyber Express)
Florida Firm Fined $337K by Feds for Data Deleted in Hack (BankInfo Security)
Samsung Patches Multiple Vulnerabilities That Let Attackers Execute Arbitrary Code (Cyber Security News)
Proton Mail still down as Proton recovers from worldwide outage (Bleeping Computer)
GroupGreeting e-card site attacked in “zqxq” campaign (Malwarebytes)
Microsoft DRM Hacking Raises Questions on Vulnerability Disclosures (SecurityWeek)
Facebook awards researcher $100,000 for finding bug that granted internal access (RocketNews)
Developers sent into security panic by 'useful feature' (The Register)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>New details emerge about Chinese hackers breaching the US Treasury Department. The Supreme Court considers the TikTok ban. Chinese hackers exploit a zero-day flaw in Ivanti Connect Secure VPN. A new credit card skimmer malware targets WordPress checkout pages. The Banshee macOS info-stealer has been updated. A California health services organization reports a data breach. A Florida firm pays a $337,750 HIPAA settlement following a 2018 breach. Samsung patches Android devices. A Proton Mail outage hits users worldwide. A popular e-card site recovers from malware. CertByte segment host Chris Hare interviews our guest Casey Marks, ISC2's Chief Qualifications Officer, about the future of certifications. That’s a feature, not a hack. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>CertByte segment host<a href="https://www.linkedin.com/in/chrisharepmp/"> Chris Hare</a> interviews our guest <a href="https://www.linkedin.com/in/caseymarks/">Casey Marks</a>, <a href="https://www.isc2.org/">ISC2</a>'s Chief Qualifications Officer, about <a href="https://www.isc2.org/certifications">certifications</a> and where they could be heading. You can check out their 2024 ISC2 Cybersecurity Workforce study <a href="https://www.isc2.org/Insights/2024/10/ISC2-2024-Cybersecurity-Workforce-Study">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.cnn.com/2025/01/10/politics/chinese-hackers-breach-committee-on-foreign-investment-in-the-us/index.html?ref=metacurity.com">Chinese hackers breached US government office that assesses foreign investments for national security risks</a> (CNN)</p><p><a href="https://www.nbcnews.com/politics/supreme-court/supreme-court-tiktok-ban-bytedance-china-biden-administration-rcna186971">Supreme Court considers whether to allow TikTok ban to take effect</a> (NBC News) </p><p><a href="https://www.scworld.com/brief/ivanti-vpn-zero-day-exploited-by-chinese-hackers">Ivanti VPN zero-day exploited by Chinese hackers</a> (SC Media)</p><p><a href="https://cybersecuritynews.com/wordpress-credit-card-skimmer/">New Skimmer Malware Hijacking WordPress Websites to Steal Credit Cards</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/banshee-macos-malware-expands-target-list/">Banshee macOS Malware Expands Targeting</a> (SecurityWeek)</p><p><a href="https://thecyberexpress.com/baymark-health-services-data-breach/">BayMark Health Services Reports Data Breach, Exposing Patient Information</a> (The Cyber Express)</p><p><a href="https://www.bankinfosecurity.com/florida-firm-fined-337k-by-feds-for-data-deleted-in-hack-a-27259">Florida Firm Fined $337K by Feds for Data Deleted in Hack</a> (BankInfo Security)</p><p><a href="https://cybersecuritynews.com/samsung-patches-multiple-vulnerabilities/">Samsung Patches Multiple Vulnerabilities That Let Attackers Execute Arbitrary Code</a> (Cyber Security News)</p><p><a href="https://www.bleepingcomputer.com/news/technology/proton-mail-still-down-as-proton-recovers-from-worldwide-outage/">Proton Mail still down as Proton recovers from worldwide outage</a> (Bleeping Computer)</p><p><a href="https://www.malwarebytes.com/blog/news/2025/01/groupgreeting-e-card-site-attacked-inzqxq-campaign">GroupGreeting e-card site attacked in “zqxq” campaign</a> (Malwarebytes)</p><p><a href="https://www.securityweek.com/microsoft-drm-hacking-raises-questions-on-vulnerability-disclosures/">Microsoft DRM Hacking Raises Questions on Vulnerability Disclosures</a> (SecurityWeek)</p><p><a href="https://rocketnews.com/2025/01/facebook-awards-researcher-100000-for-finding-bug-that-granted-internal-access/">Facebook awards researcher $100,000 for finding bug that granted internal access</a> (RocketNews)</p><p><a href="https://www.theregister.com/2025/01/10/on_call/">Developers sent into security panic by 'useful feature'</a> (The Register)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show.</p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1649</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c0ee3072-b95e-11ee-8cf8-1b51c9e966e8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8839047291.mp3?updated=1736542970" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Biden’s final cyber order tackles digital weaknesses.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2221/notes</link>
      <description>The Biden administration is finalizing an executive order to bolster U.S. cybersecurity. Ivanti releases emergency updates to address a critical zero-day vulnerability. A critical vulnerability is discovered in Kerio Control firewall software. Palo Alto Networks patches multiple vulnerabilities in its retired migration tool. Fake exploits for Microsoft vulnerabilities lure security researchers. A medical billing company data breach affects over 360,000. A cyberattack disrupts the city of Winston-Salem. CrowdStrike identifies a phishing campaign exploiting its recruitment branding. Our guest is Danny Allen, CTO from Snyk, sharing how a balanced approach between AI and human oversight can strengthen cybersecurity. The worst of the worst from CES. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Danny Allen, CTO from Snyk, sharing how a balanced approach between AI and human oversight can strengthen cybersecurity. Learn more in Snyk’s AI Readiness Report about how some companies are still hesitant to adopt AI, despite its clear benefits in addressing human error and keeping up with fast-evolving technology.

Selected Reading
White House Rushes to Finish Cyber Order After China Hacks (Bloomberg)
Zero-Day Patch Alert: Ivanti Connect Secure Under Attack (GovInfo Security)
GFI KerioControl Firewall Vulnerability Exploited in the Wild (SecurityWeek) 
Palo Alto Networks Patches High-Severity Vulnerability in Retired Migration Tool (SecurityWeek) 
Security pros baited by fake Windows LDAP exploits (The Register)
Major US medical billing firm breached, 360K+ customers' healthcare data leaked (Cybernews)
Recruitment Phishing Scam Imitates CrowdStrike Hiring Process (CrowdStrike)
Some Winston-Salem city services knocked offline by cyberattack (The Record)
Excelsior Orthopaedics Data Breach Impacts 357,000 People (SecurityWeek) 
The 'Worst in Show' CES Products Put Your Data at Risk and Cause Waste, Privacy Advocates Say (SecurityWeek)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 09 Jan 2025 21:10:00 -0000</pubDate>
      <itunes:title>Biden’s final cyber order tackles digital weaknesses.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2221</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The Biden administration is finalizing an executive order to bolster U.S. cybersecurity. Ivanti releases emergency updates to address a critical zero-day vulnerability. A critical vulnerability is discovered in Kerio Control firewall software. Palo Alto Networks patches multiple vulnerabilities in its retired migration tool. Fake exploits for Microsoft vulnerabilities lure security researchers. A medical billing company data breach affects over 360,000. A cyberattack disrupts the city of Winston-Salem. CrowdStrike identifies a phishing campaign exploiting its recruitment branding. Our guest is Danny Allen, CTO from Snyk, sharing how a balanced approach between AI and human oversight can strengthen cybersecurity. The worst of the worst from CES. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Danny Allen, CTO from Snyk, sharing how a balanced approach between AI and human oversight can strengthen cybersecurity. Learn more in Snyk’s AI Readiness Report about how some companies are still hesitant to adopt AI, despite its clear benefits in addressing human error and keeping up with fast-evolving technology.

Selected Reading
White House Rushes to Finish Cyber Order After China Hacks (Bloomberg)
Zero-Day Patch Alert: Ivanti Connect Secure Under Attack (GovInfo Security)
GFI KerioControl Firewall Vulnerability Exploited in the Wild (SecurityWeek) 
Palo Alto Networks Patches High-Severity Vulnerability in Retired Migration Tool (SecurityWeek) 
Security pros baited by fake Windows LDAP exploits (The Register)
Major US medical billing firm breached, 360K+ customers' healthcare data leaked (Cybernews)
Recruitment Phishing Scam Imitates CrowdStrike Hiring Process (CrowdStrike)
Some Winston-Salem city services knocked offline by cyberattack (The Record)
Excelsior Orthopaedics Data Breach Impacts 357,000 People (SecurityWeek) 
The 'Worst in Show' CES Products Put Your Data at Risk and Cause Waste, Privacy Advocates Say (SecurityWeek)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Biden administration is finalizing an executive order to bolster U.S. cybersecurity. Ivanti releases emergency updates to address a critical zero-day vulnerability. A critical vulnerability is discovered in Kerio Control firewall software. Palo Alto Networks patches multiple vulnerabilities in its retired migration tool. Fake exploits for Microsoft vulnerabilities lure security researchers. A medical billing company data breach affects over 360,000. A cyberattack disrupts the city of Winston-Salem. CrowdStrike identifies a phishing campaign exploiting its recruitment branding. Our guest is Danny Allen, CTO from Snyk, sharing how a balanced approach between AI and human oversight can strengthen cybersecurity. The worst of the worst from CES. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/dannyallan/">Danny Allen</a>, CTO from <a href="https://snyk.io/">Snyk</a>, sharing how a balanced approach between AI and human oversight can strengthen cybersecurity. Learn more in <a href="https://snyk.io/reports/secure-adoption-in-the-genai-era/">Snyk’s AI Readiness Report</a> about how some companies are still hesitant to adopt AI, despite its clear benefits in addressing human error and keeping up with fast-evolving technology.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bloomberg.com/news/articles/2025-01-08/white-house-rushes-to-finish-cyber-order-after-china-hacks">White House Rushes to Finish Cyber Order After China Hacks</a> (Bloomberg)</p><p><a href="https://www.govinfosecurity.com/zero-day-patch-alert-ivanti-connect-secure-under-attack-a-27253">Zero-Day Patch Alert: Ivanti Connect Secure Under Attack</a> (GovInfo Security)</p><p><a href="https://www.securityweek.com/gfi-keriocontrol-firewall-vulnerability-exploited-in-the-wild/">GFI KerioControl Firewall Vulnerability Exploited in the Wild (SecurityWeek) </a></p><p><a href="https://www.securityweek.com/palo-alto-networks-patches-high-severity-vulnerability-in-retired-migration-tool/">Palo Alto Networks Patches High-Severity Vulnerability in Retired Migration Tool</a> <a href="https://www.securityweek.com/gfi-keriocontrol-firewall-vulnerability-exploited-in-the-wild/">(SecurityWeek) </a></p><p><a href="https://www.theregister.com/2025/01/09/security_pros_baited_by_fake/">Security pros baited by fake Windows LDAP exploits</a> (The Register)</p><p><a href="https://cnews.link/medusind-medical-billing-firm-data-breach-3/">Major US medical billing firm breached, 360K+ customers' healthcare data leaked</a> (Cybernews)</p><p><a href="https://www.crowdstrike.com/en-us/blog/recruitment-phishing-scam-imitates-crowdstrike-hiring-process/">Recruitment Phishing Scam Imitates CrowdStrike Hiring Process</a> (CrowdStrike)</p><p><a href="https://therecord.media/winston-salem-north-carolina-services-offline-cyberattack">Some Winston-Salem city services knocked offline by cyberattack</a> (The Record)</p><p><a href="https://www.securityweek.com/excelsior-orthopaedics-data-breach-impacts-357000-people/">Excelsior Orthopaedics Data Breach Impacts 357,000 People</a> <a href="https://www.securityweek.com/gfi-keriocontrol-firewall-vulnerability-exploited-in-the-wild/">(SecurityWeek) </a></p><p><a href="https://www.securityweek.com/the-worst-in-show-ces-products-put-your-data-at-risk-and-cause-waste-privacy-advocates-say/">The 'Worst in Show' CES Products Put Your Data at Risk and Cause Waste, Privacy Advocates Say</a> <a href="https://www.securityweek.com/gfi-keriocontrol-firewall-vulnerability-exploited-in-the-wild/">(SecurityWeek)</a></p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1477</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c0b29e36-b95e-11ee-8cf8-475fbefdef82]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3759001624.mp3?updated=1736521351" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A new Mirai-based botnet.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2220/notes</link>
      <description>Researchers ID a new Mirai-based botnet. Android devices get their first round of updates for the new year. Criminals exploit legitimate Apple and Google services in sophisticated voice phishing attacks. Japan attributes over 200 cyberattacks to the Chinese hacking group MirrorFace. A PayPal phishing scam exploits legitimate platform functionality. SonicWall addresses critical vulnerabilities in its SonicOS software. CISA warns of active exploitation of vulnerabilities in Mitel MiCollab. A new government backed labelling program hopes to help consumers choose more secure devices. On today’s CertByte segment, Chris Hare and Steven Burnley unpack a question from N2K’s ISC2® Certified in Cyber Security (CC) Practice Test. Streaming license plate readers - no password required.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K.
In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by Steven Burnley to break down a question targeting the CC - Certified in Cyber Security certification by ISC2®. Today’s question comes from N2K’s ISC2® Certified in Cyber Security (CC) Practice Test.
The CC(SM) - Certified in Cyber Security is an entry-level, ANAB accredited exam geared towards anyone who wants to prove their foundational skills, knowledge, and abilities. To learn more about this and other related topics under this objective, please refer to the following resource: ISC2 (n.d.). https://www.isc2.org/landing/cc-etextbook  
Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro. 
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.
Additional source: https://www.isc2.org/certifications/cc 

Selected Reading
New Mirai Botnet Exploits Zero-Days in Routers and Smart Devices (Infosecurity Magazine)
First Android Update of 2025 Patches Critical Code Execution Vulnerabilities (SecurityWeek)
A Day in the Life of a Prolific Voice Phishing Crew (Krebs on Security)
Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data (AP News)
Casio says hackers stole personal data of 8,500 people during October ransomware attack (TechCrunch)
New PayPal Phishing Scam Exploits MS365 Tools and Genuine-Looking Emails (Hackread)
Multiple Sonicwall VPN Vulnerabilities Let Attackers Bypass Authentication (Cyber Security News)
CISA Warns of Mitel MiCollab Vulnerabilities Exploited in Attacks (SecurityWeek)
New Labels Will Help People Pick Devices Less at Risk of Hacking (SecurityWeek)
Researcher Turns Insecure License Plate Cameras Into Open Source Surveillance Tool (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 08 Jan 2025 21:10:00 -0000</pubDate>
      <itunes:title>A new Mirai-based botnet.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2220</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Researchers ID a new Mirai-based botnet. Android devices get their first round of updates for the new year. Criminals exploit legitimate Apple and Google services in sophisticated voice phishing attacks. Japan attributes over 200 cyberattacks to the Chinese hacking group MirrorFace. A PayPal phishing scam exploits legitimate platform functionality. SonicWall addresses critical vulnerabilities in its SonicOS software. CISA warns of active exploitation of vulnerabilities in Mitel MiCollab. A new government backed labelling program hopes to help consumers choose more secure devices. On today’s CertByte segment, Chris Hare and Steven Burnley unpack a question from N2K’s ISC2® Certified in Cyber Security (CC) Practice Test. Streaming license plate readers - no password required.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K.
In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by Steven Burnley to break down a question targeting the CC - Certified in Cyber Security certification by ISC2®. Today’s question comes from N2K’s ISC2® Certified in Cyber Security (CC) Practice Test.
The CC(SM) - Certified in Cyber Security is an entry-level, ANAB accredited exam geared towards anyone who wants to prove their foundational skills, knowledge, and abilities. To learn more about this and other related topics under this objective, please refer to the following resource: ISC2 (n.d.). https://www.isc2.org/landing/cc-etextbook  
Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro. 
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.
Additional source: https://www.isc2.org/certifications/cc 

Selected Reading
New Mirai Botnet Exploits Zero-Days in Routers and Smart Devices (Infosecurity Magazine)
First Android Update of 2025 Patches Critical Code Execution Vulnerabilities (SecurityWeek)
A Day in the Life of a Prolific Voice Phishing Crew (Krebs on Security)
Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data (AP News)
Casio says hackers stole personal data of 8,500 people during October ransomware attack (TechCrunch)
New PayPal Phishing Scam Exploits MS365 Tools and Genuine-Looking Emails (Hackread)
Multiple Sonicwall VPN Vulnerabilities Let Attackers Bypass Authentication (Cyber Security News)
CISA Warns of Mitel MiCollab Vulnerabilities Exploited in Attacks (SecurityWeek)
New Labels Will Help People Pick Devices Less at Risk of Hacking (SecurityWeek)
Researcher Turns Insecure License Plate Cameras Into Open Source Surveillance Tool (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers ID a new Mirai-based botnet. Android devices get their first round of updates for the new year. Criminals exploit legitimate Apple and Google services in sophisticated voice phishing attacks. Japan attributes over 200 cyberattacks to the Chinese hacking group MirrorFace. A PayPal phishing scam exploits legitimate platform functionality. SonicWall addresses critical vulnerabilities in its SonicOS software. CISA warns of active exploitation of vulnerabilities in Mitel MiCollab. A new government backed labelling program hopes to help consumers choose more secure devices. On today’s CertByte segment, Chris Hare and Steven Burnley unpack a question from N2K’s ISC2® Certified in Cyber Security (CC) Practice Test. Streaming license plate readers - no password required.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CertByte Segment</h2><p>Welcome to CertByte! On this bi-weekly segment hosted by<a href="https://www.linkedin.com/in/chrisharepmp/"> Chris Hare</a>, a content developer and project management specialist at <a href="https://www.n2k.com/?__hstc=223811332.a636bba53840b4700c929fe67723a129.1721054632698.1736278825308.1736283658185.241&amp;__hssc=223811332.4.1736283658185&amp;__hsfp=336580338">N2K</a>.</p><p>In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by <a href="https://www.linkedin.com/in/steven-burnley-1a0a5013/">Steven Burnley</a> to break down a question targeting the CC - Certified in Cyber Security certification by ISC2®. Today’s question comes from <a href="https://certify.cybervista.net/products/isc2/certified-in-cybersecurity-practice-test/">N2K’s ISC2® Certified in Cyber Security (CC) Practice Test</a>.</p><p>The CC(SM) - Certified in Cyber Security is an entry-level, ANAB accredited exam geared towards anyone who wants to prove their foundational skills, knowledge, and abilities. To learn more about this and other related topics under this objective, please refer to the following resource: ISC2 (n.d.). <a href="https://www.isc2.org/landing/cc-etextbook">https://www.isc2.org/landing/cc-etextbook</a>  </p><p>Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. To get the full news to knowledge experience, learn more about our N2K Pro subscription at <a href="https://thecyberwire.com/pro">https://thecyberwire.com/pro</a>. </p><p><strong><em>Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.</em></strong></p><p>Additional source: <a href="https://www.isc2.org/certifications/cc">https://www.isc2.org/certifications/cc</a> </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.infosecurity-magazine.com/news/mirai-botnet-zerodays-routers/">New Mirai Botnet Exploits Zero-Days in Routers and Smart Devices</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/first-android-update-of-2025-patches-critical-code-execution-vulnerabilities/">First Android Update of 2025 Patches Critical Code Execution Vulnerabilities</a> (SecurityWeek)</p><p><a href="https://krebsonsecurity.com/2025/01/a-day-in-the-life-of-a-prolific-voice-phishing-crew/">A Day in the Life of a Prolific Voice Phishing Crew</a> (Krebs on Security)</p><p><a href="https://apnews.com/article/japan-police-cyberattack-china-government-68adcb293b2931da4c30ca0279720124">Japan links Chinese hacker MirrorFace to dozens of cyberattacks targeting security and tech data</a> (AP News)</p><p><a href="https://techcrunch.com/2025/01/08/casio-says-hackers-stole-personal-data-of-8500-people-during-october-ransomware-attack/">Casio says hackers stole personal data of 8,500 people during October ransomware attack</a> (TechCrunch)</p><p><a href="https://hackread.com/paypal-phishing-scam-exploits-ms365-genuine-emails/">New PayPal Phishing Scam Exploits MS365 Tools and Genuine-Looking Emails</a> (Hackread)</p><p><a href="https://cybersecuritynews.com/multiple-sonicwall-vpn-vulnerabilities/">Multiple Sonicwall VPN Vulnerabilities Let Attackers Bypass Authentication</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/cisa-warns-of-mitel-micollab-vulnerabilities-exploited-in-attacks/">CISA Warns of Mitel MiCollab Vulnerabilities Exploited in Attacks</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/new-labels-will-help-people-pick-devices-less-at-risk-of-hacking/">New Labels Will Help People Pick Devices Less at Risk of Hacking</a> (SecurityWeek)</p><p><a href="https://www.404media.co/researcher-turns-insecure-license-plate-cameras-into-open-source-surveillance-tool/">Researcher Turns Insecure License Plate Cameras Into Open Source Surveillance Tool</a> (404 Media)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1569</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c076f7e6-b95e-11ee-8cf8-cfda10903295]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8740884002.mp3?updated=1736368422" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>U.S. sanctions spark cyber showdown with China.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2219/notes</link>
      <description>China criticizes U.S. sanctions. School districts face cyberattacks over the holiday season. The U.N.’s International Civil Aviation Organization (ICAO) is investigating a potential data breach. Eagerbee malware targets government organizations and ISPs in the Middle East. A major New York medical center notifies 674,000 individuals of a data breach. Hackers infiltrate Argentina’s Airport Security Police (PSA) payroll system. An industrial networking firm identifies critical vulnerabilities in its cellular routers, secure routers, and network security appliances. Phishing click rates among enterprise users surged in 2024. A California man is suing three banks for allegedly enabling criminals to steal nearly $1 million from him. On our Threat Vector segment, we preview this week’s episode where host David Moulton speaks with Margaret Kelley about the evolving landscape of cloud breaches. Microsoft’s Bing demonstrates imitation is the sincerest form of flattery. 

Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
On our Threat Vector segment, we preview this week’s episode where host David Moulton speaks with Margaret Kelley about the evolving landscape of cloud breaches and how organizations can defend against sophisticated attacks. You can catch new episodes of Threat Vector every Thursday here and on your favorite podcast app. 

Selected Reading
China Protests US Sanctions for Its Alleged Role in Hacking, Complains of Foreign Hacker Attacks (SecurityWeek)
Tencent added to US list of 'Chinese military companies' (The Register)
School districts in Maine, Tennessee respond to holiday cyberattacks (The Record) 
UN aviation agency 'actively investigating' cybercriminal’s claimed data breach (The Record) 
Eagerbee backdoor deployed against Middle Eastern govt orgs, ISPs (Bleeping Computer)
Staten Island Hospital Notifying 674,000 of May 2023 Hack (BankInfo Security)
Industrial networking manufacturer Moxa reports 'critical' router bugs (CyberScoop)
Phishing Click Rates Triple in 2024 (Infosecurity Magazine)
Pig butchering victim sues banks for allowing scammers to open accounts (The Record) 
Hackers Compromised Argentina’s Airport Security Payroll System (GB Hackers)
Microsoft is using Bing to trick people into thinking they’re on Google (The Verge) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Jan 2025 21:10:00 -0000</pubDate>
      <itunes:title>U.S. sanctions spark cyber showdown with China.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2219</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>China criticizes U.S. sanctions. School districts face cyberattacks over the holiday season. The U.N.’s International Civil Aviation Organization (ICAO) is investigating a potential data breach. Eagerbee malware targets government organizations and ISPs in the Middle East. A major New York medical center notifies 674,000 individuals of a data breach. Hackers infiltrate Argentina’s Airport Security Police (PSA) payroll system. An industrial networking firm identifies critical vulnerabilities in its cellular routers, secure routers, and network security appliances. Phishing click rates among enterprise users surged in 2024. A California man is suing three banks for allegedly enabling criminals to steal nearly $1 million from him. On our Threat Vector segment, we preview this week’s episode where host David Moulton speaks with Margaret Kelley about the evolving landscape of cloud breaches. Microsoft’s Bing demonstrates imitation is the sincerest form of flattery. 

Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
On our Threat Vector segment, we preview this week’s episode where host David Moulton speaks with Margaret Kelley about the evolving landscape of cloud breaches and how organizations can defend against sophisticated attacks. You can catch new episodes of Threat Vector every Thursday here and on your favorite podcast app. 

Selected Reading
China Protests US Sanctions for Its Alleged Role in Hacking, Complains of Foreign Hacker Attacks (SecurityWeek)
Tencent added to US list of 'Chinese military companies' (The Register)
School districts in Maine, Tennessee respond to holiday cyberattacks (The Record) 
UN aviation agency 'actively investigating' cybercriminal’s claimed data breach (The Record) 
Eagerbee backdoor deployed against Middle Eastern govt orgs, ISPs (Bleeping Computer)
Staten Island Hospital Notifying 674,000 of May 2023 Hack (BankInfo Security)
Industrial networking manufacturer Moxa reports 'critical' router bugs (CyberScoop)
Phishing Click Rates Triple in 2024 (Infosecurity Magazine)
Pig butchering victim sues banks for allowing scammers to open accounts (The Record) 
Hackers Compromised Argentina’s Airport Security Payroll System (GB Hackers)
Microsoft is using Bing to trick people into thinking they’re on Google (The Verge) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>China criticizes U.S. sanctions. School districts face cyberattacks over the holiday season. The U.N.’s International Civil Aviation Organization (ICAO) is investigating a potential data breach. Eagerbee malware targets government organizations and ISPs in the Middle East. A major New York medical center notifies 674,000 individuals of a data breach. Hackers infiltrate Argentina’s Airport Security Police (PSA) payroll system. An industrial networking firm identifies critical vulnerabilities in its cellular routers, secure routers, and network security appliances. Phishing click rates among enterprise users surged in 2024. A California man is suing three banks for allegedly enabling criminals to steal nearly $1 million from him. On our Threat Vector segment, we preview this week’s episode where host David Moulton speaks with Margaret Kelley about the evolving landscape of cloud breaches. Microsoft’s Bing demonstrates imitation is the sincerest form of flattery.<strong> </strong></p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Threat Vector Segment</h2><p>On our Threat Vector segment, we preview this week’s episode where host <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a> speaks with <a href="https://www.linkedin.com/in/margaretzimmermann/">Margaret Kelley</a> about the evolving landscape of cloud breaches and how organizations can defend against sophisticated attacks. You can catch new episodes of Threat Vector every Thursday <a href="https://thecyberwire.com/podcasts/threat-vector">here</a> and on your favorite podcast app. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/china-protests-us-sanctions-for-its-alleged-role-in-hacking-complains-of-foreign-hacker-attacks/">China Protests US Sanctions for Its Alleged Role in Hacking, Complains of Foreign Hacker Attacks</a> (SecurityWeek)</p><p><a href="https://www.theregister.com/2025/01/07/tencent_catl_chinese_military_company_list/">Tencent added to US list of 'Chinese military companies'</a> (The Register)</p><p><a href="https://therecord.media/school-cyberattacks-holidays-maine-tennessee">School districts in Maine, Tennessee respond to holiday cyberattacks</a> (The Record) </p><p><a href="https://therecord.media/united-nations-icao-investigating-data-breach">UN aviation agency 'actively investigating' cybercriminal’s claimed data breach</a> (The Record) </p><p><a href="https://www.bleepingcomputer.com/news/security/eagerbee-backdoor-deployed-against-middle-eastern-govt-orgs-isps/">Eagerbee backdoor deployed against Middle Eastern govt orgs, ISPs</a> (Bleeping Computer)</p><p><a href="https://www.bankinfosecurity.com/staten-island-hospital-notifying-674000-may-2023-hack-a-27225">Staten Island Hospital Notifying 674,000 of May 2023 Hack</a> (BankInfo Security)</p><p><a href="https://cyberscoop.com/industrial-networking-manufacturer-moxa-reports-critical-router-bugs/">Industrial networking manufacturer Moxa reports 'critical' router bugs</a> (CyberScoop)</p><p><a href="https://www.infosecurity-magazine.com/news/phishing-click-rates-triple/">Phishing Click Rates Triple in 2024 </a>(Infosecurity Magazine)</p><p><a href="https://therecord.media/pig-butchering-sues-banks-know-your-customer-rules">Pig butchering victim sues banks for allowing scammers to open accounts</a> (The Record) </p><p><a href="https://gbhackers.com/hackers-compromised-argentinas-airport/">Hackers Compromised Argentina’s Airport Security Payroll System</a> (GB Hackers)</p><p><a href="https://www.theverge.com/2025/1/6/24337117/microsoft-bing-search-results-google-design-trick">Microsoft is using Bing to trick people into thinking they’re on Google</a> (The Verge) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1637</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c039e1da-b95e-11ee-8cf8-dbbe4d9b0294]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4120978673.mp3?updated=1736278354" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>China’s shadow over U.S. telecom networks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2218/notes</link>
      <description>New reports shed light on both Volt and Salt Typhoons. Tenable updates faulty Nessus Agents and resumes plugin updates. A new infostealer campaign targets gamers on Discord. A fake version of a popular browser extension has been discovered stealing login credentials and conducting phishing attacks. ESET warns Windows 10 users of a potential “security fiasco.” A vulnerability in Nuclei allows attackers to bypass template signature verification and inject malicious code. An Indiana dental practice pays a $350,000 settlement over an alleged ransomware coverup. Tim Starks, Senior Reporter from CyberScoop, joins us today to discuss a new United Nations cybercrime treaty and his outlook for 2025. Farewell to a visionary leader. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Tim Starks, Senior Reporter from CyberScoop, joins us today to discuss a new United Nations cybercrime treaty and his outlook for 2025. Read Tim’s article on the UN cybercrime treaty here. 

Selected Reading
The US’s Worst Fears of Chinese Hacking Are on Display in Guam (Bloomberg)
How Chinese Hackers Graduated From Clumsy Corporate Thieves to Military Weapons (Wall Street Journal)
China protests US sanctions for its alleged role in hacking, complains of foreign hacker attacks (AP News)
Tenable Disables Nessus Agents Over Faulty Updates (SecurityWeek)
New Infostealer Campaign Uses Discord Videogame Lure (Infosecurity Magazine)
Beware! Malicious EditThisCookie Chrome Extension Steals Login Credentials (Cyber Security News)
Windows 10 users urged to upgrade to avoid "security fiasco" (Bleeping Computer)
Nuclei flaw lets malicious templates bypass signature verification (Bleeping Computer)
Dental Practice Pays State in Alleged Data Breach 'Cover Up' (GovInfo Security)
Tenable CEO Amit Yoran Dead at 54 (SecurityWeek)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 06 Jan 2025 21:10:00 -0000</pubDate>
      <itunes:title>China’s shadow over U.S. telecom networks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>2218</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>New reports shed light on both Volt and Salt Typhoons. Tenable updates faulty Nessus Agents and resumes plugin updates. A new infostealer campaign targets gamers on Discord. A fake version of a popular browser extension has been discovered stealing login credentials and conducting phishing attacks. ESET warns Windows 10 users of a potential “security fiasco.” A vulnerability in Nuclei allows attackers to bypass template signature verification and inject malicious code. An Indiana dental practice pays a $350,000 settlement over an alleged ransomware coverup. Tim Starks, Senior Reporter from CyberScoop, joins us today to discuss a new United Nations cybercrime treaty and his outlook for 2025. Farewell to a visionary leader. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Tim Starks, Senior Reporter from CyberScoop, joins us today to discuss a new United Nations cybercrime treaty and his outlook for 2025. Read Tim’s article on the UN cybercrime treaty here. 

Selected Reading
The US’s Worst Fears of Chinese Hacking Are on Display in Guam (Bloomberg)
How Chinese Hackers Graduated From Clumsy Corporate Thieves to Military Weapons (Wall Street Journal)
China protests US sanctions for its alleged role in hacking, complains of foreign hacker attacks (AP News)
Tenable Disables Nessus Agents Over Faulty Updates (SecurityWeek)
New Infostealer Campaign Uses Discord Videogame Lure (Infosecurity Magazine)
Beware! Malicious EditThisCookie Chrome Extension Steals Login Credentials (Cyber Security News)
Windows 10 users urged to upgrade to avoid "security fiasco" (Bleeping Computer)
Nuclei flaw lets malicious templates bypass signature verification (Bleeping Computer)
Dental Practice Pays State in Alleged Data Breach 'Cover Up' (GovInfo Security)
Tenable CEO Amit Yoran Dead at 54 (SecurityWeek)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>New reports shed light on both Volt and Salt Typhoons. Tenable updates faulty Nessus Agents and resumes plugin updates. A new infostealer campaign targets gamers on Discord. A fake version of a popular browser extension has been discovered stealing login credentials and conducting phishing attacks. ESET warns Windows 10 users of a potential “security fiasco.” A vulnerability in Nuclei allows attackers to bypass template signature verification and inject malicious code. An Indiana dental practice pays a $350,000 settlement over an alleged ransomware coverup. Tim Starks, Senior Reporter from CyberScoop, joins us today to discuss a new United Nations cybercrime treaty and his outlook for 2025. Farewell to a visionary leader. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/tstarks/">Tim Starks</a>, Senior Reporter from <a href="https://cyberscoop.com/">CyberScoop</a>, joins us today to discuss a new United Nations cybercrime treaty and his outlook for 2025. Read Tim’s article on the UN cybercrime treaty <a href="https://cyberscoop.com/after-un-adoption-controversial-cybercrime-treatys-next-steps-could-prove-vital/">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bloomberg.com/news/features/2025-01-03/chinese-cyber-hackers-terrify-us-intelligence-after-infiltrating-guam">The US’s Worst Fears of Chinese Hacking Are on Display in Guam</a> (Bloomberg)</p><p><a href="https://www.wsj.com/tech/cybersecurity/typhoon-china-hackers-military-weapons-97d4ef95">How Chinese Hackers Graduated From Clumsy Corporate Thieves to Military Weapons</a> (Wall Street Journal)</p><p><a href="https://apnews.com/article/china-cyber-integrity-sanctions-534d16a4a9c37a46dd7046cc4fe0f751?ref=metacurity.com">China protests US sanctions for its alleged role in hacking, complains of foreign hacker attacks</a> (AP News)</p><p><a href="https://www.securityweek.com/tenable-disables-nessus-agents-over-faulty-updates/">Tenable Disables Nessus Agents Over Faulty Updates</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/infostealer-campaign-discord/">New Infostealer Campaign Uses Discord Videogame Lure</a> (Infosecurity Magazine)</p><p><a href="https://cybersecuritynews.com/malicious-editthiscookie-chrome-extension/">Beware! Malicious EditThisCookie Chrome Extension Steals Login Credentials</a> (Cyber Security News)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/windows-10-users-urged-to-upgrade-to-avoid-security-fiasco/">Windows 10 users urged to upgrade to avoid "security fiasco"</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/nuclei-flaw-lets-malicious-templates-bypass-signature-verification/">Nuclei flaw lets malicious templates bypass signature verification</a> (Bleeping Computer)</p><p><a href="https://www.govinfosecurity.com/dental-practice-pays-state-in-alleged-data-breach-cover-up-a-27213">Dental Practice Pays State in Alleged Data Breach 'Cover Up'</a> (GovInfo Security)</p><p><a href="https://www.securityweek.com/tenable-ceo-amit-yoran-dead-at-54/">Tenable CEO Amit Yoran Dead at 54</a> (SecurityWeek)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1601</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bffddb40-b95e-11ee-8cf8-1bb7ca8d824d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7207207757.mp3?updated=1736192227" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dominique West: Security found me. [Strategy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/49/notes</link>
      <description>Technical account manager Dominique West takes us on her career journey from engineering to cybersecurity. Even though her undergraduate degree was in information systems, Dominique did not learn about cybersecurity until she personally experienced credit card fraud. She had a range of positions from working the help desk in an art museum to vulnerability management and cloud security. Dominique mentions remembering feeling isolated as the only black person and one of few women in many situations. These experiences spurred her into action to create Security in Color to help others navigate their way into cybersecurity and share resources are available to them. Dominique recommends those interested in cybersecurity to go ahead and get your hands dirty out there; figure out what you like and what you don't like and do community. We thank Dominique for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Jan 2025 08:00:00 -0000</pubDate>
      <itunes:title>Dominique West: Security found me. [Strategy] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>49</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Technical account manager Dominique West takes us on her career journey from engineering to cybersecurity. Even though her undergraduate degree was in information systems, Dominique did not learn about cybersecurity until she personally experienced credit card fraud. She had a range of positions from working the help desk in an art museum to vulnerability management and cloud security. Dominique mentions remembering feeling isolated as the only black person and one of few women in many situations. These experiences spurred her into action to create Security in Color to help others navigate their way into cybersecurity and share resources are available to them. Dominique recommends those interested in cybersecurity to go ahead and get your hands dirty out there; figure out what you like and what you don't like and do community. We thank Dominique for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Technical account manager Dominique West takes us on her career journey from engineering to cybersecurity. Even though her undergraduate degree was in information systems, Dominique did not learn about cybersecurity until she personally experienced credit card fraud. She had a range of positions from working the help desk in an art museum to vulnerability management and cloud security. Dominique mentions remembering feeling isolated as the only black person and one of few women in many situations. These experiences spurred her into action to create Security in Color to help others navigate their way into cybersecurity and share resources are available to them. Dominique recommends those interested in cybersecurity to go ahead and get your hands dirty out there; figure out what you like and what you don't like and do community. We thank Dominique for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>473</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3c7f7358-ca12-11ef-b1e1-ebe52c921674]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2199257428.mp3?updated=1735936815" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Crypto client or cyber trap? [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/338/notes</link>
      <description>Karlo Zanki, Reverse Engineer at ReversingLabs, discussing their work on "Malicious PyPI crypto pay package aiocpa implants infostealer code." ReversingLabs' machine learning-based threat hunting system identified a malicious PyPI package, aiocpa, designed to exfiltrate cryptocurrency wallet information. 
Unlike typical attacks involving typosquatting, the attackers published a seemingly legitimate crypto client tool to build trust before introducing malicious updates. ReversingLabs used its Spectra Assure platform to detect behavioral anomalies and worked with PyPI to remove the package, highlighting the growing need for advanced supply chain security tools to counter increasingly sophisticated threats.
The research can be found here:
Malicious PyPI crypto pay package aiocpa implants infostealer code

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Jan 2025 08:00:00 -0000</pubDate>
      <itunes:title>Crypto client or cyber trap? [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>338</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Karlo Zanki, Reverse Engineer at ReversingLabs, discussing their work on "Malicious PyPI crypto pay package aiocpa implants infostealer code." ReversingLabs' machine learning-based threat hunting system identified a malicious PyPI package, aiocpa, designed to exfiltrate cryptocurrency wallet information. 
Unlike typical attacks involving typosquatting, the attackers published a seemingly legitimate crypto client tool to build trust before introducing malicious updates. ReversingLabs used its Spectra Assure platform to detect behavioral anomalies and worked with PyPI to remove the package, highlighting the growing need for advanced supply chain security tools to counter increasingly sophisticated threats.
The research can be found here:
Malicious PyPI crypto pay package aiocpa implants infostealer code

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/karlo-zanki-b8a2341a5/">Karlo Zanki</a>, Reverse Engineer at <a href="https://www.linkedin.com/company/reversinglabs/">ReversingLabs</a>, discussing their work on "Malicious PyPI crypto pay package aiocpa implants infostealer code." ReversingLabs' machine learning-based threat hunting system identified a malicious PyPI package, <em>aiocpa</em>, designed to exfiltrate cryptocurrency wallet information. </p><p>Unlike typical attacks involving typosquatting, the attackers published a seemingly legitimate crypto client tool to build trust before introducing malicious updates. ReversingLabs used its Spectra Assure platform to detect behavioral anomalies and worked with PyPI to remove the package, highlighting the growing need for advanced supply chain security tools to counter increasingly sophisticated threats.</p><p>The research can be found here:</p><ul><li><a href="https://www.reversinglabs.com/blog/malicious-pypi-crypto-pay-package-aiocpa-implants-infostealer-code">Malicious PyPI crypto pay package aiocpa implants infostealer code</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1262</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[445ce43a-ca11-11ef-8852-8330ad2408b5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5423411906.mp3?updated=1735936547" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI-powered propaganda.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2217/notes</link>
      <description>The U.S. sanctions Russian and Iranian groups over election misinformation. Apple settles a class action lawsuit over Siri privacy allegations. DoubleClickjacking exploits a timing vulnerability in browser behavior. FireScam targets sensitive info on Android devices. ASUS issues a critical security advisory for several router models. A former crypto boss faces extradition amidst allegations of defrauding investors out of more than $40 billion. HHS unveils proposed updates to HIPAA. Millions of email servers have yet to enable encryption. Our guest is Joe Saunders, Co-Founder &amp; CEO of RunSafe Security discussing the complexities of safeguarding critical infrastructure. Using Doom to prove you’re human. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Joe Saunders, Co-Founder &amp; CEO of RunSafe Security. Joe joins us to discuss the complexities of safeguarding critical infrastructure amid the looming threat of cyber attacks and military conflict.

Selected Reading
US Imposes Sanctions on Russian and Iranian Groups Over Disinformation Targeting American Voters (SecurityWeek)
Apple Agrees $95M Settlement Over Siri Privacy Violations (Infosecurity Magazine)
SysBumps - New Kernel Break Attack Bypassing macOS Systems Security (Cyber Security News)
'DoubleClickjacking' Threatens Major Websites’ Security (GovInfo Security)
FireScam Android Malware Packs Infostealer, Spyware Capabilities (SecurityWeek)
ASUS Routers Vulnerabilities Allows Arbitrary Code Execution (Cyber Security News)
Crypto Boss Extradited to Face $40bn Fraud Charges (Infosecurity Magazine)
What's in HHS' Proposed HIPAA Security Rule Overhaul? (GovInfo Security)
Over 3 million mail servers without encryption exposed to sniffing attacks (Bleeping Computer)
CAPTCHAs now run Doom – on nightmare mode (The Register)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 03 Jan 2025 21:10:00 -0000</pubDate>
      <itunes:title>AI-powered propaganda.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>2217</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The U.S. sanctions Russian and Iranian groups over election misinformation. Apple settles a class action lawsuit over Siri privacy allegations. DoubleClickjacking exploits a timing vulnerability in browser behavior. FireScam targets sensitive info on Android devices. ASUS issues a critical security advisory for several router models. A former crypto boss faces extradition amidst allegations of defrauding investors out of more than $40 billion. HHS unveils proposed updates to HIPAA. Millions of email servers have yet to enable encryption. Our guest is Joe Saunders, Co-Founder &amp; CEO of RunSafe Security discussing the complexities of safeguarding critical infrastructure. Using Doom to prove you’re human. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Joe Saunders, Co-Founder &amp; CEO of RunSafe Security. Joe joins us to discuss the complexities of safeguarding critical infrastructure amid the looming threat of cyber attacks and military conflict.

Selected Reading
US Imposes Sanctions on Russian and Iranian Groups Over Disinformation Targeting American Voters (SecurityWeek)
Apple Agrees $95M Settlement Over Siri Privacy Violations (Infosecurity Magazine)
SysBumps - New Kernel Break Attack Bypassing macOS Systems Security (Cyber Security News)
'DoubleClickjacking' Threatens Major Websites’ Security (GovInfo Security)
FireScam Android Malware Packs Infostealer, Spyware Capabilities (SecurityWeek)
ASUS Routers Vulnerabilities Allows Arbitrary Code Execution (Cyber Security News)
Crypto Boss Extradited to Face $40bn Fraud Charges (Infosecurity Magazine)
What's in HHS' Proposed HIPAA Security Rule Overhaul? (GovInfo Security)
Over 3 million mail servers without encryption exposed to sniffing attacks (Bleeping Computer)
CAPTCHAs now run Doom – on nightmare mode (The Register)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The U.S. sanctions Russian and Iranian groups over election misinformation. Apple settles a class action lawsuit over Siri privacy allegations. DoubleClickjacking exploits a timing vulnerability in browser behavior. FireScam targets sensitive info on Android devices. ASUS issues a critical security advisory for several router models. A former crypto boss faces extradition amidst allegations of defrauding investors out of more than $40 billion. HHS unveils proposed updates to HIPAA. Millions of email servers have yet to enable encryption. Our guest is Joe Saunders, Co-Founder &amp; CEO of RunSafe Security discussing the complexities of safeguarding critical infrastructure. Using Doom to prove you’re human. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/joesaunders/">Joe Saunders</a>, Co-Founder &amp; CEO of <a href="https://runsafesecurity.com/">RunSafe Security</a>. Joe joins us to discuss the complexities of safeguarding critical infrastructure amid the looming threat of cyber attacks and military conflict.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/us-imposes-sanctions-on-russian-and-iranian-groups-over-disinformation-targeting-american-voters/">US Imposes Sanctions on Russian and Iranian Groups Over Disinformation Targeting American Voters</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/apple-95m-settlement-siri-privacy/">Apple Agrees $95M Settlement Over Siri Privacy Violations</a> (Infosecurity Magazine)</p><p><a href="https://cybersecuritynews.com/sysbumps/">SysBumps - New Kernel Break Attack Bypassing macOS Systems Security</a> (Cyber Security News)</p><p><a href="https://www.govinfosecurity.com/doubleclickjacking-threatens-major-websites-security-a-27203">'DoubleClickjacking' Threatens Major Websites’ Security</a> (GovInfo Security)</p><p><a href="https://www.securityweek.com/firescam-android-malware-packs-infostealer-spyware-capabilities/">FireScam Android Malware Packs Infostealer, Spyware Capabilities</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/asus-router-vulnerabilities/">ASUS Routers Vulnerabilities Allows Arbitrary Code Execution</a> (Cyber Security News)</p><p><a href="https://www.infosecurity-magazine.com/news/crypto-boss-extradited-40bn-fraud/">Crypto Boss Extradited to Face $40bn Fraud Charges</a> (Infosecurity Magazine)</p><p><a href="https://www.govinfosecurity.com/whats-in-hhs-proposed-hipaa-security-rule-overhaul-a-27201">What's in HHS' Proposed HIPAA Security Rule Overhaul?</a> (GovInfo Security)</p><p><a href="https://www.bleepingcomputer.com/news/security/over-3-million-mail-servers-without-encryption-exposed-to-sniffing-attacks/">Over 3 million mail servers without encryption exposed to sniffing attacks</a> (Bleeping Computer)</p><p><a href="https://www.theregister.com/2025/01/03/captcha_doom_nightmare/">CAPTCHAs now run Doom – on nightmare mode</a> (The Register)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1836</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bfc265a6-b95e-11ee-8cf8-e30659a31c3f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9128430052.mp3?updated=1735934075" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A breach in the U.S. Treasury.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2216/notes</link>
      <description>Chinese hackers breach the U.S. Treasury Department. At least 35 Chrome extensions are compromised. Federal authorities arrest a U.S. Army soldier over accusations of sensitive data stolen from AT&amp;T and Verizon. A misconfigured Amazon cloud server exposes sensitive data from over 800,000 VW EV owners. Rhode Island confirms a data breach linked to ransomware group Brain Cipher. Ascension healthcare confirms the exposure of the personal and medical data of 5.6 million customers. A recent patch to Windows BitLocker encryption proves inadequate. A suspected Chinese hacking campaign is exploiting a vulnerability in Palo Alto firewalls for espionage. The DOJ bans the sale of Americans’ sensitive data to adversarial nations. HHS proposes a HIPAA update to address cybersecurity. Our guest is Mick Baccio, Global Security Advisor at Splunk, with insights on the cybersecurity resilience gap. CISA Director Easterly looks back at 2024. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Mick Baccio, Global Security Advisor at Splunk’s security research team SURGe, sharing some insights on the cybersecurity resilience gap and top cyber challenges/priorities for the public sector. You can read more about this in SURGe’s blog and whitepaper. 

Selected Reading
US Treasury Department breached through remote support platform (Bleeping Computer)
New details reveal how hackers hijacked 35 Google Chrome extensions (Bleeping Computer)
U.S. Army Soldier Arrested in AT&amp;T, Verizon Extortions (Krebs on Security)
AT&amp;T and Verizon Say Chinese Hackers Ejected From Networks (GovInfo Security)
Volkswagen leak exposes private information of 800,000 EV owners, including location data (TechSpot)
Hackers Leak Rhode Island Citizens' Data on Dark Web (Infosecurity Magazine)
Ascension cyberattack exposed medical data of 5.6M customers (Healthcare IT News)
Patched BitLocker Flaw Still Susceptible to Hack (GovInfo Security)
Palo Alto Firewalls Backdoored by Suspected Chinese Hackers (BankInfo Security)
US prohibits data sales to adversarial nations (SC Media) 
Massive healthcare breaches prompt US cybersecurity rules overhaul (Bleeping Computer)
CISA's 2024 Review Highlights Major Efforts in Cybersecurity Industry Collaboration (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 02 Jan 2025 21:10:00 -0000</pubDate>
      <itunes:title>A breach in the U.S. Treasury.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>2216</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Chinese hackers breach the U.S. Treasury Department. At least 35 Chrome extensions are compromised. Federal authorities arrest a U.S. Army soldier over accusations of sensitive data stolen from AT&amp;T and Verizon. A misconfigured Amazon cloud server exposes sensitive data from over 800,000 VW EV owners. Rhode Island confirms a data breach linked to ransomware group Brain Cipher. Ascension healthcare confirms the exposure of the personal and medical data of 5.6 million customers. A recent patch to Windows BitLocker encryption proves inadequate. A suspected Chinese hacking campaign is exploiting a vulnerability in Palo Alto firewalls for espionage. The DOJ bans the sale of Americans’ sensitive data to adversarial nations. HHS proposes a HIPAA update to address cybersecurity. Our guest is Mick Baccio, Global Security Advisor at Splunk, with insights on the cybersecurity resilience gap. CISA Director Easterly looks back at 2024. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Mick Baccio, Global Security Advisor at Splunk’s security research team SURGe, sharing some insights on the cybersecurity resilience gap and top cyber challenges/priorities for the public sector. You can read more about this in SURGe’s blog and whitepaper. 

Selected Reading
US Treasury Department breached through remote support platform (Bleeping Computer)
New details reveal how hackers hijacked 35 Google Chrome extensions (Bleeping Computer)
U.S. Army Soldier Arrested in AT&amp;T, Verizon Extortions (Krebs on Security)
AT&amp;T and Verizon Say Chinese Hackers Ejected From Networks (GovInfo Security)
Volkswagen leak exposes private information of 800,000 EV owners, including location data (TechSpot)
Hackers Leak Rhode Island Citizens' Data on Dark Web (Infosecurity Magazine)
Ascension cyberattack exposed medical data of 5.6M customers (Healthcare IT News)
Patched BitLocker Flaw Still Susceptible to Hack (GovInfo Security)
Palo Alto Firewalls Backdoored by Suspected Chinese Hackers (BankInfo Security)
US prohibits data sales to adversarial nations (SC Media) 
Massive healthcare breaches prompt US cybersecurity rules overhaul (Bleeping Computer)
CISA's 2024 Review Highlights Major Efforts in Cybersecurity Industry Collaboration (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chinese hackers breach the U.S. Treasury Department. At least 35 Chrome extensions are compromised. Federal authorities arrest a U.S. Army soldier over accusations of sensitive data stolen from AT&amp;T and Verizon. A misconfigured Amazon cloud server exposes sensitive data from over 800,000 VW EV owners. Rhode Island confirms a data breach linked to ransomware group Brain Cipher. Ascension healthcare confirms the exposure of the personal and medical data of 5.6 million customers. A recent patch to Windows BitLocker encryption proves inadequate. A suspected Chinese hacking campaign is exploiting a vulnerability in Palo Alto firewalls for espionage. The DOJ bans the sale of Americans’ sensitive data to adversarial nations. HHS proposes a HIPAA update to address cybersecurity. Our guest is Mick Baccio, Global Security Advisor at Splunk, with insights on the cybersecurity resilience gap. CISA Director Easterly looks back at 2024. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is Mick Baccio, Global Security Advisor at Splunk’s security research team SURGe, sharing some insights on the cybersecurity resilience gap and top cyber challenges/priorities for the public sector. You can read more about this in SURGe’s <a href="https://www.splunk.com/en_us/blog/industries/bridging-the-cyber-confidence-gap-digital-resilience-in-the-public-sector.html">blog</a> and <a href="https://www.splunk.com/en_us/form/bridging-the-resilience-gap-across-public-and-private-sectors.html">whitepaper</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/us-treasury-department-breached-through-remote-support-platform/">US Treasury Department breached through remote support platform</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-details-reveal-how-hackers-hijacked-35-google-chrome-extensions/">New details reveal how hackers hijacked 35 Google Chrome extensions</a> (Bleeping Computer)</p><p><a href="https://krebsonsecurity.com/2024/12/u-s-army-soldier-arrested-in-att-verizon-extortions/">U.S. Army Soldier Arrested in AT&amp;T, Verizon Extortions</a> (Krebs on Security)</p><p><a href="https://www.govinfosecurity.com/att-verizon-say-chinese-hackers-ejected-from-networks-a-27190">AT&amp;T and Verizon Say Chinese Hackers Ejected From Networks</a> (GovInfo Security)</p><p><a href="https://www.techspot.com/news/106155-volkswagen-data-leak-exposes-private-information-800000-ev.html">Volkswagen leak exposes private information of 800,000 EV owners, including location data</a> (TechSpot)</p><p><a href="https://www.infosecurity-magazine.com/news/hackers-rhode-island-data/">Hackers Leak Rhode Island Citizens' Data on Dark Web</a> (Infosecurity Magazine)</p><p><a href="https://www.healthcareitnews.com/news/ascension-cyberattack-exposed-medical-data-56m-customers">Ascension cyberattack exposed medical data of 5.6M customers</a> (Healthcare IT News)</p><p><a href="https://www.govinfosecurity.com/patched-bitlocker-flaw-still-susceptible-to-hack-a-27195">Patched BitLocker Flaw Still Susceptible to Hack</a> (GovInfo Security)</p><p><a href="https://www.bankinfosecurity.com/palo-alto-firewalls-backdoored-by-suspected-chinese-hackers-a-27182">Palo Alto Firewalls Backdoored by Suspected Chinese Hackers</a> (BankInfo Security)</p><p><a href="https://www.scworld.com/brief/us-prohibits-data-sales-to-adversarial-nations">US prohibits data sales to adversarial nations </a><a href="https://www.scworld.com/brief/us-prohibits-data-sales-to-adversarial-nations">(SC Media)</a><a href="https://www.scworld.com/brief/us-prohibits-data-sales-to-adversarial-nations"> </a></p><p><a href="https://www.bleepingcomputer.com/news/security/massive-healthcare-breaches-prompt-us-cybersecurity-rules-overhaul/">Massive healthcare breaches prompt US cybersecurity rules overhaul</a> (Bleeping Computer)</p><p><a href="https://www.infosecurity-magazine.com/news/cisa-2024-review-cyber-industry/">CISA's 2024 Review Highlights Major Efforts in Cybersecurity Industry Collaboration</a> (Infosecurity Magazine)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1812</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bf858514-b95e-11ee-8cf8-0fce9eab5e58]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2586935873.mp3?updated=1735847694" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scotland’s position to lead cyber and space. [Deep Space]</title>
      <link>https://space.n2k.com/podcasts/t-minus/ds78</link>
      <description>Sharon Lemac-Vincere is an academic that focuses her research on the intersection of space and cyber. She has released a report on space and cybersecurity which outlines how Scotland can lead the way in both industries. 
You can connect with Sharon on LinkedIn, and read her paper on The Cyber-Safe Gateway : Unlocking Scotland's Space Cybersecurity Potential on this website.

Remember to leave us a 5-star rating and review in your favorite podcast app.
Be sure to follow T-Minus on LinkedIn and Instagram.

T-Minus Crew Survey
We want to hear from you! Please complete our 4 question survey. It’ll help us get better and deliver you the most mission-critical space intel every day.

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.

Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 01 Jan 2025 08:00:00 -0000</pubDate>
      <itunes:title>Scotland’s position to lead cyber and space. [Deep Space]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>78</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/550dc604-c16b-11ef-a02d-27e5dd79252d/image/ad72ba49a386b651623190673146de68.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Sharon Lemac-Vincere has released a report on space and cybersecurity which outlines how Scotland can lead the way at the intersection of both industries.</itunes:subtitle>
      <itunes:summary>Sharon Lemac-Vincere is an academic that focuses her research on the intersection of space and cyber. She has released a report on space and cybersecurity which outlines how Scotland can lead the way in both industries. 
You can connect with Sharon on LinkedIn, and read her paper on The Cyber-Safe Gateway : Unlocking Scotland's Space Cybersecurity Potential on this website.

Remember to leave us a 5-star rating and review in your favorite podcast app.
Be sure to follow T-Minus on LinkedIn and Instagram.

T-Minus Crew Survey
We want to hear from you! Please complete our 4 question survey. It’ll help us get better and deliver you the most mission-critical space intel every day.

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.

Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sharon Lemac-Vincere is an academic that focuses her research on the intersection of space and cyber. She has released a report on space and cybersecurity which outlines how Scotland can lead the way in both industries. </p><p>You can connect with Sharon on <a href="https://www.linkedin.com/in/dr-sharon-l%C3%A8mac-vincere-90b68b182/">LinkedIn</a>, and read her paper on The Cyber-Safe Gateway : Unlocking Scotland's Space Cybersecurity Potential on <a href="https://strathprints.strath.ac.uk/90919/">this website</a>.</p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Be sure to follow T-Minus on <a href="https://www.linkedin.com/company/n2k-space/">LinkedIn</a> and <a href="https://www.instagram.com/n2kspace/">Instagram</a>.</p><p><br></p><h2>T-Minus Crew Survey</h2><p>We want to hear from you! Please complete our <a href="https://www.surveymonkey.com/r/BL5NFPW">4 question survey</a>. It’ll help us get better and deliver you the most mission-critical space intel every day.</p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:space@n2k.com">space@n2k.com</a> to request more info.</p><p><br></p><h2>Want to join us for an interview?</h2><p>Please send your pitch to <a href="mailto:space-editor@n2k.com">space-editor@n2k.com</a> and include your name, affiliation, and topic proposal.</p><p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1644</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[550dc604-c16b-11ef-a02d-27e5dd79252d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8358829969.mp3?updated=1734984711" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Disrupting Cracked Cobalt Strike [The Microsoft Threat Intelligence Podcast]</title>
      <link>https://thecyberwire.com/podcasts/microsoft-threat-intelligence/25/notes</link>
      <description>While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, The Microsoft Threat Intelligence Podcast by Microsoft Threat Intelligence. See you in 2025!

On this week's episode of The Microsoft Threat Intelligence Podcast, we discuss the collaborative effort between Microsoft and Fortra to combat the illegal use of cracked Cobalt Strike software, which is commonly employed in ransomware attacks.  To break down the situation, our host, Sherrod DeGrippo, is joined by Richard Boscovich, Assistant General Counsel at Microsoft, Jason Lyons, Principal Investigator with the DCU, and Bob Erdman, Associate VP Research and Development at Fortra. The discussion covers the creative use of DMCA notifications tailored by geographic region to combat cybercrime globally. The group express their optimism about applying these successful techniques to other areas, such as phishing kits, and highlight ongoing efforts to make Cobalt Strike harder to abuse.   
 

In this episode you’ll learn:      
  

The impact on detection engineers due to the crackdown on cracked Cobalt Strike 

Extensive automation used to detect and dismantle large-scale threats 

How the team used the DMCA creatively to combat cybercrime 

 

Some questions we ask:     
  

 Do you encounter any pushback when issuing DMCA notifications? 

 How do you plan to proceed following the success of this operation? 

 Can you explain the legal mechanisms behind this take-down? 

 

Resources:  
View Jason Lyons on LinkedIn 
View Bob Erdman on LinkedIn   
View Richard Boscovich on LinkedIn  
View Sherrod DeGrippo on LinkedIn  

 

Related Microsoft Podcasts:                   


Afternoon Cyber Tea with Ann Johnson 


The BlueHat Podcast 


Uncovering Hidden Risks     

 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 
Get the latest threat intelligence insights and guidance at Microsoft Security Insider 
 
 
The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 01 Jan 2025 07:00:00 -0000</pubDate>
      <itunes:title>Disrupting Cracked Cobalt Strike [The Microsoft Threat Intelligence Podcast]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>25</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, The Microsoft Threat Intelligence Podcast by Microsoft Threat Intelligence. See you in 2025!

On this week's episode of The Microsoft Threat Intelligence Podcast, we discuss the collaborative effort between Microsoft and Fortra to combat the illegal use of cracked Cobalt Strike software, which is commonly employed in ransomware attacks.  To break down the situation, our host, Sherrod DeGrippo, is joined by Richard Boscovich, Assistant General Counsel at Microsoft, Jason Lyons, Principal Investigator with the DCU, and Bob Erdman, Associate VP Research and Development at Fortra. The discussion covers the creative use of DMCA notifications tailored by geographic region to combat cybercrime globally. The group express their optimism about applying these successful techniques to other areas, such as phishing kits, and highlight ongoing efforts to make Cobalt Strike harder to abuse.   
 

In this episode you’ll learn:      
  

The impact on detection engineers due to the crackdown on cracked Cobalt Strike 

Extensive automation used to detect and dismantle large-scale threats 

How the team used the DMCA creatively to combat cybercrime 

 

Some questions we ask:     
  

 Do you encounter any pushback when issuing DMCA notifications? 

 How do you plan to proceed following the success of this operation? 

 Can you explain the legal mechanisms behind this take-down? 

 

Resources:  
View Jason Lyons on LinkedIn 
View Bob Erdman on LinkedIn   
View Richard Boscovich on LinkedIn  
View Sherrod DeGrippo on LinkedIn  

 

Related Microsoft Podcasts:                   


Afternoon Cyber Tea with Ann Johnson 


The BlueHat Podcast 


Uncovering Hidden Risks     

 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
 
Get the latest threat intelligence insights and guidance at Microsoft Security Insider 
 
 
The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong><em>While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, </em></strong><a href="https://thecyberwire.com/podcasts/microsoft-threat-intelligence"><strong><em>The Microsoft Threat Intelligence Podcast</em></strong></a><strong><em> by Microsoft Threat Intelligence. See you in 2025!</em></strong></p><p><br></p><p>On this week's episode of The Microsoft Threat Intelligence Podcast, we discuss the collaborative effort between Microsoft and Fortra to combat the illegal use of cracked Cobalt Strike software, which is commonly employed in ransomware attacks.  To break down the situation, our host, Sherrod DeGrippo, is joined by Richard Boscovich, Assistant General Counsel at Microsoft, Jason Lyons, Principal Investigator with the DCU, and Bob Erdman, Associate VP Research and Development at Fortra. The discussion covers the creative use of DMCA notifications tailored by geographic region to combat cybercrime globally. The group express their optimism about applying these successful techniques to other areas, such as phishing kits, and highlight ongoing efforts to make Cobalt Strike harder to abuse.   </p><p> </p><h3>
<strong>In this episode you’ll learn</strong>:      </h3><p>  </p><ul>
<li>The impact on detection engineers due to the crackdown on cracked Cobalt Strike </li>
<li>Extensive automation used to detect and dismantle large-scale threats </li>
<li>How the team used the DMCA creatively to combat cybercrime </li>
</ul><p> </p><h3>
<strong>Some questions we ask:</strong>     </h3><p>  </p><ul>
<li> Do you encounter any pushback when issuing DMCA notifications? </li>
<li> How do you plan to proceed following the success of this operation? </li>
<li> Can you explain the legal mechanisms behind this take-down? </li>
</ul><p> </p><h3>
<strong>Resources:</strong>  </h3><p>View Jason Lyons on LinkedIn </p><p><a href="https://www.linkedin.com/in/boberdman1/">View Bob Erdman on LinkedIn</a>   </p><p><a href="https://www.linkedin.com/in/richard-domingues-boscovich-8a981721/">View Richard Boscovich on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/sherroddegrippo/">View Sherrod DeGrippo on LinkedIn</a>  </p><p><br></p><p> </p><h3>
<strong>Related Microsoft Podcasts:                  </strong> </h3><ul>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a> </li>
<li>
<a href="https://bluehatpodcast.com/">The BlueHat Podcast</a> </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>     </li>
</ul><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><p> </p><p>Get the latest threat intelligence insights and guidance at Microsoft <a href="https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fsecurity-insider%2F&amp;data=05%7C02%7Cv-ropetrillo%40microsoft.com%7C81e205a6b727403624b808dc64a26e6b%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638495896032091649%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&amp;sdata=LTpBsEuiaY5YiYn2FYDydHrHkYWl%2FBTl2uAQlkBz1N0%3D&amp;reserved=0">Security Insider</a> </p><p> </p><p> </p><p><em>The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network. </em> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2320</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f2986a58-bd8a-11ef-9d48-afbf00110e40]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8820369163.mp3?updated=1723655131" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Future-proofing finance: FS-ISAC’s blueprint for cryptographic agility. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/81/notes</link>
      <description>Brandon Karpf sits down with Mike Silverman, Chief Strategy and Innovation Officer at FS-ISAC, to discuss the white paper Building Cryptographic Agility in the Financial Sector.
Authored by experts from FS-ISAC’s Post-Quantum Cryptography Working Group, the paper addresses the vulnerabilities posed by quantum computing to current cryptographic algorithms. It provides financial institutions with strategies to safeguard sensitive data and maintain trust as these emerging threats evolve.
Discover the challenges and actionable steps to build cryptographic agility in this insightful conversation.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 31 Dec 2024 08:00:00 -0000</pubDate>
      <itunes:title>Future-proofing finance: FS-ISAC’s blueprint for cryptographic agility. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>81</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/e3e75940-bf08-11ef-aa17-5f17890e0474/image/0216c9cea15c53e5d2c739964a38623c.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Brandon Karpf sits down with Mike Silverman, Chief Strategy and Innovation Officer at FS-ISAC, to discuss the white paper Building Cryptographic Agility in the Financial Sector.
Authored by experts from FS-ISAC’s Post-Quantum Cryptography Working Group, the paper addresses the vulnerabilities posed by quantum computing to current cryptographic algorithms. It provides financial institutions with strategies to safeguard sensitive data and maintain trust as these emerging threats evolve.
Discover the challenges and actionable steps to build cryptographic agility in this insightful conversation.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a> sits down with <a href="https://www.linkedin.com/in/mikebsilverman/">Mike Silverman</a>, Chief Strategy and Innovation Officer at <a href="https://www.linkedin.com/company/fs-isac/">FS-ISAC</a>, to discuss the white paper <a href="https://www.fsisac.com/hubfs/Knowledge/PQC/BuildingCryptographicAgilityInTheFinancialSector.pdf?utm_campaign=PostQuantumCryptography&amp;utm_source=pr"><em>Building Cryptographic Agility in the Financial Sector.</em></a></p><p>Authored by experts from FS-ISAC’s Post-Quantum Cryptography <a href="https://www.fsisac.com/newsroom/fsisac-guidance-urges-financial-firms-to-implement-crypto-agility-as-a-key-defense-against-quantum-computing-threats">Working Group</a>, the paper addresses the vulnerabilities posed by quantum computing to current cryptographic algorithms. It provides financial institutions with strategies to safeguard sensitive data and maintain trust as these emerging threats evolve.</p><p>Discover the challenges and actionable steps to build cryptographic agility in this insightful conversation.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1206</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e3e75940-bf08-11ef-aa17-5f17890e0474]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5698649215.mp3?updated=1734723527" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Navigating AI Safety and Security Challenges with Yonatan Zunger [The BlueHat Podcast]</title>
      <link>https://thecyberwire.com/podcasts/the-bluehat-podcast/34/notes</link>
      <description>While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, The BlueHat Podcast by Microsoft and MSRC. See you in 2025!

Yonatan Zunger, CVP of AI Safety &amp; Security at Microsoft joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Yonatan explains the distinction between generative and predictive AI, noting that while predictive AI excels in classification and recommendation, generative AI focuses on summarizing and role-playing. He highlights how generative AI's ability to process natural language and role-play has vast potential, though its applications are still emerging. He contrasts this with predictive AI's strength in handling large datasets for specific tasks. Yonatan emphasizes the importance of ethical considerations in AI development, stressing the need for continuous safety engineering and diverse perspectives to anticipate and mitigate potential failures. He provides examples of AI's positive and negative uses, illustrating the importance of designing systems that account for various scenarios and potential misuses. 
 
 

In This Episode You Will Learn:    
 

How predictive AI anticipates outcomes based on historical data 

The difficulties and strategies involved in making AI systems safe and secure from misuse 

How role-playing exercises help developers understand the behavior of AI systems 

 

Some Questions We Ask:     
 

What distinguishes predictive AI from generative AI? 

Can generative AI be used to improve decision-making processes? 

What is the role of unit testing and test cases in policy and AI system development? 


 

Resources:  
View Yonatan Zunger on LinkedIn     
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 

 

Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 30 Dec 2024 07:00:00 -0000</pubDate>
      <itunes:title>Navigating AI Safety and Security Challenges with Yonatan Zunger [The BlueHat Podcast]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>34</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, The BlueHat Podcast by Microsoft and MSRC. See you in 2025!

Yonatan Zunger, CVP of AI Safety &amp; Security at Microsoft joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Yonatan explains the distinction between generative and predictive AI, noting that while predictive AI excels in classification and recommendation, generative AI focuses on summarizing and role-playing. He highlights how generative AI's ability to process natural language and role-play has vast potential, though its applications are still emerging. He contrasts this with predictive AI's strength in handling large datasets for specific tasks. Yonatan emphasizes the importance of ethical considerations in AI development, stressing the need for continuous safety engineering and diverse perspectives to anticipate and mitigate potential failures. He provides examples of AI's positive and negative uses, illustrating the importance of designing systems that account for various scenarios and potential misuses. 
 
 

In This Episode You Will Learn:    
 

How predictive AI anticipates outcomes based on historical data 

The difficulties and strategies involved in making AI systems safe and secure from misuse 

How role-playing exercises help developers understand the behavior of AI systems 

 

Some Questions We Ask:     
 

What distinguishes predictive AI from generative AI? 

Can generative AI be used to improve decision-making processes? 

What is the role of unit testing and test cases in policy and AI system development? 


 

Resources:  
View Yonatan Zunger on LinkedIn     
View Wendy Zenone on LinkedIn  
View Nic Fillingham on LinkedIn 

 

Related Microsoft Podcasts:  
 


Microsoft Threat Intelligence Podcast  


Afternoon Cyber Tea with Ann Johnson  


Uncovering Hidden Risks  

 
 
Discover and follow other Microsoft podcasts at microsoft.com/podcasts  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong><em>While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, </em></strong><a href="https://thecyberwire.com/podcasts/the-bluehat-podcast"><strong><em>The BlueHat Podcast</em></strong></a><strong><em> by Microsoft and MSRC. See you in 2025!</em></strong></p><p><br></p><p><a href="https://www.linkedin.com/in/yonatanzunger/">Yonatan Zunger</a>, CVP of AI Safety &amp; Security at Microsoft joins Nic Fillingham and Wendy Zenone on this week's episode of The BlueHat Podcast. Yonatan explains the distinction between generative and predictive AI, noting that while predictive AI excels in classification and recommendation, generative AI focuses on summarizing and role-playing. He highlights how generative AI's ability to process natural language and role-play has vast potential, though its applications are still emerging. He contrasts this with predictive AI's strength in handling large datasets for specific tasks. Yonatan emphasizes the importance of ethical considerations in AI development, stressing the need for continuous safety engineering and diverse perspectives to anticipate and mitigate potential failures. He provides examples of AI's positive and negative uses, illustrating the importance of designing systems that account for various scenarios and potential misuses. </p><p> </p><p> </p><h3>
<strong>In This Episode You Will Learn</strong>:    </h3><p> </p><ul>
<li>How predictive AI anticipates outcomes based on historical data </li>
<li>The difficulties and strategies involved in making AI systems safe and secure from misuse </li>
<li>How role-playing exercises help developers understand the behavior of AI systems </li>
</ul><p> </p><h3>
<strong>Some Questions We Ask: </strong>    </h3><p> </p><ul>
<li>What distinguishes predictive AI from generative AI? </li>
<li>Can generative AI be used to improve decision-making processes? </li>
<li>What is the role of unit testing and test cases in policy and AI system development? </li>
</ul><p><br></p><p> </p><h3>
<strong>Resources:</strong>  </h3><p><a href="https://www.linkedin.com/in/yonatanzunger/">View Yonatan Zunger on LinkedIn</a>     </p><p><a href="https://www.linkedin.com/in/wendyzenone/">View Wendy Zenone on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/nicfill/">View Nic Fillingham on LinkedIn</a> </p><p><br></p><p> </p><h3>
<strong>Related Microsoft Podcasts:</strong>  </h3><p> </p><ul>
<li>
<a href="https://msthreatintelpodcast.com/">Microsoft Threat Intelligence Podcast</a>  </li>
<li>
<a href="https://afternooncybertea.com/">Afternoon Cyber Tea with Ann Johnson</a>  </li>
<li>
<a href="https://uncoveringhiddenrisks.com/">Uncovering Hidden Risks</a>  </li>
</ul><p> </p><p> </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a>  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3214</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[38458320-bd8a-11ef-b230-f382bdb8cd27]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8426763541.mp3?updated=1722887049" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Streamlining the US Navy's innovation process: A conversation with Acting CTO Justin Fanelli.</title>
      <link>https://thecyberwire.com/podcasts/special-edition/68/notes</link>
      <description>Please enjoy this encore episode of a Special Edition. 
N2K’s Brandon Karpf speaks with guest Justin Fanelli, Acting CTO of the US Navy, about the US Navy streamlining the innovation process. For some background, you can refer to this article. 

Additional resources: 


PEO Digital Innovation Adoption Kit 

Atlantic Council’s Commission on Defense Innovation Adoption


For industry looking to engage with PEO Digital: Industry Engagement



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 30 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>Streamlining the US Navy's innovation process: A conversation with Acting CTO Justin Fanelli.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>68</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode of a Special Edition. 
N2K’s Brandon Karpf speaks with guest Justin Fanelli, Acting CTO of the US Navy, about the US Navy streamlining the innovation process. For some background, you can refer to this article. 

Additional resources: 


PEO Digital Innovation Adoption Kit 

Atlantic Council’s Commission on Defense Innovation Adoption


For industry looking to engage with PEO Digital: Industry Engagement



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of a Special Edition. </p><p><a href="https://www.n2k.com/">N2K</a>’s <a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a> speaks with guest <a href="https://www.linkedin.com/in/justinfanelli/">Justin Fanelli</a>, Acting CTO of the <a href="https://www.navy.com/">US Navy</a>, about the US Navy streamlining the innovation process. For some background, you can refer to this <a href="https://www.afcea.org/signal-media/calling-innovators-navy-wants-you">article</a>. </p><h3><br></h3><h3>Additional resources: </h3><ul>
<li>
<a href="https://www.peodigital.navy.mil/Portals/96/Documents/PDFs/PEODigital_Innovation_Adoption_v3.pdf?ver=kfbqKeRadl-LcOJfRJ6TwQ%3d%3d">PEO Digital Innovation Adoption Kit</a> </li>
<li>Atlantic Council’s <a href="https://www.atlanticcouncil.org/programs/scowcroft-center-for-strategy-and-security/forward-defense/defense-innovation-adoption-commission/">Commission on Defense Innovation Adoption</a>
</li>
<li>For industry looking to engage with PEO Digital: <a href="https://www.peodigital.navy.mil/Industry/">Industry Engagement</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2150</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[09a1c88c-bf04-11ef-8305-3338bb123d6b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2646608740.mp3?updated=1734721509" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Yatia (Tia) Hopkins: Grit and right place, right time. [Solutions Architecture] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/48/notes</link>
      <description>VP of Global Solutions Architecture at eSentire Tia Hopkins shares her career journey and talks about its beginnings in engineering and pivots into cybersecurity leadership. Tia shares how she liked to take things apart when she was young, including the brand new computer her mother bought her and how she was fascinated by all the pieces of it spread all across her bedroom floor. As she started studying engineering, Tia learned she was more of a technologist than an engineer. Tia got her start in technology without completing her formal education by what she says is "grit and right place, right time." Once she was in a management role, Tia wanted to validate her knowledge, experience, and ability and not only completed her bachelor's degree, but also two master's degrees. Tia recently started an organization to encourage and grow interest, confidence, and leaders of women of color in the field of cybersecurity. We thank Tia for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 29 Dec 2024 08:00:00 -0000</pubDate>
      <itunes:title>Yatia (Tia) Hopkins: Grit and right place, right time. [Solutions Architecture] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>48</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c6edcf5a-bf02-11ef-9fdd-9372cbdae8dd/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>VP of Global Solutions Architecture at eSentire Tia Hopkins shares her career journey and talks about its beginnings in engineering and pivots into cybersecurity leadership. Tia shares how she liked to take things apart when she was young, including the brand new computer her mother bought her and how she was fascinated by all the pieces of it spread all across her bedroom floor. As she started studying engineering, Tia learned she was more of a technologist than an engineer. Tia got her start in technology without completing her formal education by what she says is "grit and right place, right time." Once she was in a management role, Tia wanted to validate her knowledge, experience, and ability and not only completed her bachelor's degree, but also two master's degrees. Tia recently started an organization to encourage and grow interest, confidence, and leaders of women of color in the field of cybersecurity. We thank Tia for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>VP of Global Solutions Architecture at eSentire Tia Hopkins shares her career journey and talks about its beginnings in engineering and pivots into cybersecurity leadership. Tia shares how she liked to take things apart when she was young, including the brand new computer her mother bought her and how she was fascinated by all the pieces of it spread all across her bedroom floor. As she started studying engineering, Tia learned she was more of a technologist than an engineer. Tia got her start in technology without completing her formal education by what she says is "grit and right place, right time." Once she was in a management role, Tia wanted to validate her knowledge, experience, and ability and not only completed her bachelor's degree, but also two master's degrees. Tia recently started an organization to encourage and grow interest, confidence, and leaders of women of color in the field of cybersecurity. We thank Tia for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>494</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6edcf5a-bf02-11ef-9fdd-9372cbdae8dd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5268238479.mp3?updated=1734720713" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>On the prowl for mobile malware. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/337/notes</link>
      <description>This week, we are joined by Asheer Malhotra and Vitor Ventura from Cisco Talos, and they are discussing "Operation Celestial Force employs mobile and desktop malware to target Indian entities." Cisco Talos revealed Operation Celestial Force, an espionage campaign by the Pakistani threat group "Cosmic Leopard," targeting Indian defense, government, and technology sectors. 
Active for at least six years, the operation has recently increased its use of mobile malware and commercial spyware for surveillance.
The research can be found here:
Operation Celestial Force employs mobile and desktop malware to target Indian entities

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Dec 2024 08:00:00 -0000</pubDate>
      <itunes:title>On the prowl for mobile malware. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>337</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, we are joined by Asheer Malhotra and Vitor Ventura from Cisco Talos, and they are discussing "Operation Celestial Force employs mobile and desktop malware to target Indian entities." Cisco Talos revealed Operation Celestial Force, an espionage campaign by the Pakistani threat group "Cosmic Leopard," targeting Indian defense, government, and technology sectors. 
Active for at least six years, the operation has recently increased its use of mobile malware and commercial spyware for surveillance.
The research can be found here:
Operation Celestial Force employs mobile and desktop malware to target Indian entities

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by Asheer Malhotra and Vitor Ventura from Cisco Talos, and they are discussing "Operation Celestial Force employs mobile and desktop malware to target Indian entities." Cisco Talos revealed Operation Celestial Force, an espionage campaign by the Pakistani threat group "Cosmic Leopard," targeting Indian defense, government, and technology sectors. </p><p>Active for at least six years, the operation has recently increased its use of mobile malware and commercial spyware for surveillance.</p><p>The research can be found here:</p><ul><li class="ql-align-center"><a href="https://blog.talosintelligence.com/cosmic-leopard/">Operation Celestial Force employs mobile and desktop malware to target Indian entities</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1458</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f6b03a56-bee5-11ef-8deb-330d82371612]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3710236879.mp3?updated=1734723142" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A cyber carol.</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/7/notes</link>
      <description>Please enjoy this encore episode of Only Malware in the Building. 
Welcome in! You’ve entered, Only Malware in the Building. Grab your eggnog and don your coziest holiday sweater as we sleuth our way through cyber mysteries with a festive twist! Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our cyber ghosts delve into the past, present, and future of some of the season’s most pressing threats: two-factor authentication (2FA), social engineering scams, and the return to consumer-targeted attacks. 
Together, Rick, Dave, and Selena deliver a ghostly—but insightful—message about the state of cybersecurity, past, present, and future. Can their advice save your holiday season from digital disaster? Tune in and find out.
May your holidays be merry, bright, and free of cyber fright!
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 27 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>A cyber carol.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>7</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode of Only Malware in the Building. 
Welcome in! You’ve entered, Only Malware in the Building. Grab your eggnog and don your coziest holiday sweater as we sleuth our way through cyber mysteries with a festive twist! Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our cyber ghosts delve into the past, present, and future of some of the season’s most pressing threats: two-factor authentication (2FA), social engineering scams, and the return to consumer-targeted attacks. 
Together, Rick, Dave, and Selena deliver a ghostly—but insightful—message about the state of cybersecurity, past, present, and future. Can their advice save your holiday season from digital disaster? Tune in and find out.
May your holidays be merry, bright, and free of cyber fright!
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Only Malware in the Building. </p><p>Welcome in! You’ve entered, Only Malware in the Building. Grab your eggnog and don your coziest holiday sweater as we sleuth our way through cyber mysteries with a festive twist! Your host is <a href="https://www.linkedin.com/in/selenalarson/">Selena Larson</a>, <a href="https://www.proofpoint.com/">Proofpoint</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">DISCARDED</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by <a href="https://www.n2k.com/">N2K</a> Networks <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> and <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> to uncover the stories behind notable cyberattacks. Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, our cyber ghosts delve into the past, present, and future of some of the season’s most pressing threats: two-factor authentication (2FA), social engineering scams, and the return to consumer-targeted attacks. </p><p>Together, Rick, Dave, and Selena deliver a ghostly—but insightful—message about the state of cybersecurity, past, present, and future. Can their advice save your holiday season from digital disaster? Tune in and find out.</p><p>May your holidays be merry, bright, and free of cyber fright!</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2902</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[40a01514-be46-11ef-8587-275b997b0361]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6877411172.mp3?updated=1734640637" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Putting a dent in the cybersecurity workforce gap.</title>
      <link>https://thecyberwire.com/podcasts/special-edition/57/notes</link>
      <description>Please enjoy this encore episode of Solution Spotlight.
In this special edition of Solution Spotlight, N2K President, Simone Petrella is talking with ISC2 CEO Clar Rosso about putting a dent in the cybersecurity workforce gap through empowerment, breaking down barriers and expanding DE&amp;I initiatives.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 26 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>Putting a dent in the cybersecurity workforce gap.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>57</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode of Solution Spotlight.
In this special edition of Solution Spotlight, N2K President, Simone Petrella is talking with ISC2 CEO Clar Rosso about putting a dent in the cybersecurity workforce gap through empowerment, breaking down barriers and expanding DE&amp;I initiatives.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Solution Spotlight.</p><p>In this special edition of Solution Spotlight, N2K President, Simone Petrella is talking with ISC2 CEO Clar Rosso about putting a dent in the cybersecurity workforce gap through empowerment, breaking down barriers and expanding DE&amp;I initiatives.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1803</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f050dde8-be3e-11ef-992d-3f0633517c34]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7772538961.mp3?updated=1734636884" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire: The 12 Days of Malware. [Special edition]</title>
      <link>https://thecyberwire.com/stories/0739dc4bd4df40b5ac47037160f81afe/the-cyberwire-the-12-days-of-malware</link>
      <description>Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings &amp; Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out our video for the full effect!

The 12 Days of Malware lyrics
On the first day of Christmas, my malware gave to me:
A keylogger logging my keys.

On the second day of Christmas, my malware gave to me:
2 Trojan Apps...
And a keylogger logging my keys.

On the third day of Christmas, my malware gave to me:
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fourth day of Christmas, my malware gave to me:
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fifth day of Christmas, my malware gave to me:
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the sixth day of Christmas, my malware gave to me:
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the seventh day of Christmas, my malware gave to me:
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eighth day of Christmas, my malware gave to me:
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the ninth day of Christmas, my malware gave to me:
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the tenth day of Christmas, my malware gave to me:
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eleventh day of Christmas, my malware gave to me:
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the twelfth day of Christmas, my malware gave to me:
12 Hackers hacking...
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 25 Dec 2024 08:00:00 -0000</pubDate>
      <itunes:title>The CyberWire: The 12 Days of Malware. [Special edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings &amp; Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out our video for the full effect!

The 12 Days of Malware lyrics
On the first day of Christmas, my malware gave to me:
A keylogger logging my keys.

On the second day of Christmas, my malware gave to me:
2 Trojan Apps...
And a keylogger logging my keys.

On the third day of Christmas, my malware gave to me:
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fourth day of Christmas, my malware gave to me:
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fifth day of Christmas, my malware gave to me:
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the sixth day of Christmas, my malware gave to me:
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the seventh day of Christmas, my malware gave to me:
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eighth day of Christmas, my malware gave to me:
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the ninth day of Christmas, my malware gave to me:
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the tenth day of Christmas, my malware gave to me:
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eleventh day of Christmas, my malware gave to me:
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the twelfth day of Christmas, my malware gave to me:
12 Hackers hacking...
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings &amp; Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out our <a href="https://youtu.be/XqLu0QiEnLA">video</a> for the full effect!</p><p><br></p><p><strong>The 12 Days of Malware lyrics</strong></p><p><em>On the first day of Christmas, my malware gave to me:</em></p><p><em>A keylogger logging my keys.</em></p><p><br></p><p><em>On the second day of Christmas, my malware gave to me:</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the third day of Christmas, my malware gave to me:</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the fourth day of Christmas, my malware gave to me:</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the fifth day of Christmas, my malware gave to me:</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the sixth day of Christmas, my malware gave to me:</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the seventh day of Christmas, my malware gave to me:</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the eighth day of Christmas, my malware gave to me:</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the ninth day of Christmas, my malware gave to me:</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the tenth day of Christmas, my malware gave to me:</em></p><p><em>10 Darknet markets...</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days! (Bah-dum-dum-dum!)</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the eleventh day of Christmas, my malware gave to me:</em></p><p><em>11 Phishers phishing...</em></p><p><em>10 Darknet markets...</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days! (Bah-dum-dum-dum!)</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the twelfth day of Christmas, my malware gave to me:</em></p><p><em>12 Hackers hacking...</em></p><p><em>11 Phishers phishing...</em></p><p><em>10 Darknet markets...</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>388</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c0b13e22-bca7-11ef-bacb-3b4c222d1c34]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2810973766.mp3?updated=1765841333" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A social engineering carol.</title>
      <link>https://thecyberwire.com/stories/48661009ff614f9ebd0b4610cf8ad4f0/a-social-engineering-carol</link>
      <description>Gather 'round for a holiday treat like no other! In this festive edition of Only Malware in the Building, we present A Social Engineering Carol—a cunning twist on the classic Dickens tale, penned and created by our very own Dave Bittner. Follow a modern-day Scrooge as they navigate the ghostly consequences of phishing, vishing, and smishing in this holiday cybersecurity fable.
Don't miss the accompanying video, packed with holiday cheer and cyber lessons to keep you safe this season! Check it out now! 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 25 Dec 2024 06:00:00 -0000</pubDate>
      <itunes:title>A social engineering carol.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Gather 'round for a holiday treat like no other! In this festive edition of Only Malware in the Building, we present A Social Engineering Carol—a cunning twist on the classic Dickens tale, penned and created by our very own Dave Bittner. Follow a modern-day Scrooge as they navigate the ghostly consequences of phishing, vishing, and smishing in this holiday cybersecurity fable.
Don't miss the accompanying video, packed with holiday cheer and cyber lessons to keep you safe this season! Check it out now! 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Gather 'round for a holiday treat like no other! In this festive edition of <em>Only Malware in the Building</em>, we present <em>A Social Engineering Carol</em>—a cunning twist on the classic Dickens tale, penned and created by our very own Dave Bittner. Follow a modern-day Scrooge as they navigate the ghostly consequences of phishing, vishing, and smishing in this holiday cybersecurity fable.</p><p>Don't miss the accompanying <a href="https://youtu.be/Gqwy1erf7So">video</a>, packed with holiday cheer and cyber lessons to keep you safe this season! Check it out now! </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>488</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7057af00-bd5c-11ef-8358-6fb6c357624a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7629714526.mp3?updated=1734539321" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lessons from the Viasat cybersecurity attack. [T-Minus]</title>
      <link>https://space.n2k.com/podcasts/t-minus/ds75</link>
      <description>Please enjoy this encore of T-Minus Space Daily.
A few hours prior to the Russian invasion of Ukraine on February 24, 2022, Russia’s military intelligence launched a cyberattack against ViaSat’s KA-SAT satellite network, which was used by the Ukrainian Armed Forces. It prevented them from using satellite communications to respond to the invasion. After the ViaSat hack, numerous cyber operations were conducted against the space sector from both sides of the conflict. What have we learnt from the Viasat attack? Clémence Poirier has written a report on the Viasat cybersecurity attack during the war in Ukraine. Hacking the Cosmos: Cyber operations against the space sector. 

You can connect with Clémence Poirier on LinkedIn, and read her report on this website.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.

T-Minus Crew Survey
We want to hear from you! Please complete our 4 question survey. It’ll help us get better and deliver you the most mission-critical space intel every day.

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.

Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.

T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Dec 2024 21:10:00 -0000</pubDate>
      <itunes:title>Lessons from the Viasat cybersecurity attack. [T-Minus]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>75</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/07d607b0-bbd1-11ef-bcbe-47fae52687e8/image/918c4c29c1a39da1256d8202d2c33921.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore of T-Minus Space Daily.
A few hours prior to the Russian invasion of Ukraine on February 24, 2022, Russia’s military intelligence launched a cyberattack against ViaSat’s KA-SAT satellite network, which was used by the Ukrainian Armed Forces. It prevented them from using satellite communications to respond to the invasion. After the ViaSat hack, numerous cyber operations were conducted against the space sector from both sides of the conflict. What have we learnt from the Viasat attack? Clémence Poirier has written a report on the Viasat cybersecurity attack during the war in Ukraine. Hacking the Cosmos: Cyber operations against the space sector. 

You can connect with Clémence Poirier on LinkedIn, and read her report on this website.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.

T-Minus Crew Survey
We want to hear from you! Please complete our 4 question survey. It’ll help us get better and deliver you the most mission-critical space intel every day.

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.

Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.

T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore of T-Minus Space Daily.</p><p>A few hours prior to the Russian invasion of Ukraine on February 24, 2022, Russia’s military intelligence launched a cyberattack against ViaSat’s KA-SAT satellite network, which was used by the Ukrainian Armed Forces. It prevented them from using satellite communications to respond to the invasion. After the ViaSat hack, numerous cyber operations were conducted against the space sector from both sides of the conflict. What have we learnt from the Viasat attack? Clémence Poirier has written a report on the Viasat cybersecurity attack during the war in Ukraine. Hacking the Cosmos: Cyber operations against the space sector. </p><p><br></p><p>You can connect with Clémence Poirier on <a href="https://www.linkedin.com/in/cl%C3%A9mence-poirier1/">LinkedIn</a>, and read her report on <a href="https://css.ethz.ch/en/center/CSS-news/2024/10/hacking-the-cosmos-cyber-operations-against-the-space-sector-a-case-study-from-the-war-in-ukraine.html">this website</a>.</p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p><br></p><p>Miss an episode? Sign-up for our weekly intelligence roundup, <a href="https://space.n2k.com/newsletters/signals-and-space"><em>Signals and Space</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow T-Minus on <a href="https://www.linkedin.com/company/n2k-space/">LinkedIn</a> and <a href="https://www.instagram.com/n2kspace/">Instagram</a>.</p><p><br></p><h2>T-Minus Crew Survey</h2><p>We want to hear from you! Please complete our <a href="https://www.surveymonkey.com/r/BL5NFPW">4 question survey</a>. It’ll help us get better and deliver you the most mission-critical space intel every day.</p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:space@n2k.com">space@n2k.com</a> to request more info.</p><p><br></p><h2>Want to join us for an interview?</h2><p>Please send your pitch to <a href="mailto:space-editor@n2k.com">space-editor@n2k.com</a> and include your name, affiliation, and topic proposal.</p><p><br></p><p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1577</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[07d607b0-bbd1-11ef-bcbe-47fae52687e8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3465169394.mp3?updated=1734372172" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Decoding XDR: Allie Mellen on What’s Next [Threat Vector]</title>
      <link>https://thecyberwire.com/podcasts/threat-vector/46/notes</link>
      <description>While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, Threat Vector by Palo Alto Networks. See you in 2025!


Announcement: We are pleased to share an exciting announcement about Cortex XDR at the top of our show. You can learn more here. Check out our episode on "Cyber Espionage and Financial Crime: North Korea’s Double Threat" with Assaf Dahan, Director of Threat Research at Palo Alto Networks Cortex team.

Join host David Moulton on Threat Vector, as he dives deep into the rapidly evolving XDR landscape with Allie Mellen, Principal Analyst at Forrester. With expertise in security operations, nation-state threats, and the application of AI in security, Allie offers an inside look at how XDR is reshaping threat detection and response. From tackling the SIEM market’s current challenges to optimizing detection engineering, Allie provides invaluable insights into the people, processes, and tools central to an effective SOC. This episode offers listeners a thoughtful exploration of how to navigate today's complex threat landscape and separate XDR hype from reality. Perfect for cybersecurity professionals looking to stay ahead in the field, tune in to hear expert perspectives on the next steps in cybersecurity resilience.

Ready to go deeper? Join Josh Costa, Director of Product Marketing, Allie Mellen, Principal Analyst at Forrester and David Moulton, Director of Content and Thought Leadership for Unit 42 as they discuss the State of XDR https://start.paloaltonetworks.com/State-of-XDR-with-Forrester. 

Join the conversation on our social media channels:


Website: http://www.paloaltonetworks.com 


Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠



Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠



LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/palo-alto-networks/



YouTube: ⁠⁠⁠⁠@paloaltonetworks



Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠



About Threat Vector
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.

Palo Alto Networks
Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Dec 2024 07:00:00 -0000</pubDate>
      <itunes:title>Decoding XDR: Allie Mellen on What’s Next [Threat Vector]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>46</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/96c8b404-bd75-11ef-bb4e-4be19d83348c/image/d1d87f114f5761a60cfbeb7c48197b0a.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, Threat Vector by Palo Alto Networks. See you in 2025!


Announcement: We are pleased to share an exciting announcement about Cortex XDR at the top of our show. You can learn more here. Check out our episode on "Cyber Espionage and Financial Crime: North Korea’s Double Threat" with Assaf Dahan, Director of Threat Research at Palo Alto Networks Cortex team.

Join host David Moulton on Threat Vector, as he dives deep into the rapidly evolving XDR landscape with Allie Mellen, Principal Analyst at Forrester. With expertise in security operations, nation-state threats, and the application of AI in security, Allie offers an inside look at how XDR is reshaping threat detection and response. From tackling the SIEM market’s current challenges to optimizing detection engineering, Allie provides invaluable insights into the people, processes, and tools central to an effective SOC. This episode offers listeners a thoughtful exploration of how to navigate today's complex threat landscape and separate XDR hype from reality. Perfect for cybersecurity professionals looking to stay ahead in the field, tune in to hear expert perspectives on the next steps in cybersecurity resilience.

Ready to go deeper? Join Josh Costa, Director of Product Marketing, Allie Mellen, Principal Analyst at Forrester and David Moulton, Director of Content and Thought Leadership for Unit 42 as they discuss the State of XDR https://start.paloaltonetworks.com/State-of-XDR-with-Forrester. 

Join the conversation on our social media channels:


Website: http://www.paloaltonetworks.com 


Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠



Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠



LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/palo-alto-networks/



YouTube: ⁠⁠⁠⁠@paloaltonetworks



Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠



About Threat Vector
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.

The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.

Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.

Palo Alto Networks
Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<h3>
<strong><em>While we are on our winter publishing break, please enjoy an episode of our N2K CyberWire network show, </em></strong><a href="https://thecyberwire.com/podcasts/threat-vector"><strong><em>Threat Vector</em></strong></a> <em>by Palo Alto Networks</em><strong><em>. See you in 2025!</em></strong>
</h3><p><br></p><p><strong><em>Announcement: We are pleased to share an exciting announcement about Cortex XDR at the top of our show. You can learn more </em></strong><a href="Cortex%20XDR%20Delivers%20Unmatched%20100%%20Detection%20in%20MITRE%20Evals%202024"><strong><em>here</em></strong></a><strong><em>. </em></strong>Check out our episode on "<a href="https://thecyberwire.com/podcasts/threat-vector/43/notes">Cyber Espionage and Financial Crime: North Korea’s Double Threat</a>" with Assaf Dahan, Director of Threat Research at Palo Alto Networks Cortex team.</p><p><br></p><p>Join host <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a> on <em>Threat Vector</em>, as he dives deep into the rapidly evolving XDR landscape with <a href="https://www.linkedin.com/in/hackerxbella/">Allie Mellen</a>, Principal Analyst at <a href="https://www.forrester.com/bold">Forrester</a>. With expertise in security operations, nation-state threats, and the application of AI in security, Allie offers an inside look at how XDR is reshaping threat detection and response. From tackling the SIEM market’s current challenges to optimizing detection engineering, Allie provides invaluable insights into the people, processes, and tools central to an effective SOC. This episode offers listeners a thoughtful exploration of how to navigate today's complex threat landscape and separate XDR hype from reality. Perfect for cybersecurity professionals looking to stay ahead in the field, tune in to hear expert perspectives on the next steps in cybersecurity resilience.</p><p><br></p><p>Ready to go deeper? Join Josh Costa, Director of Product Marketing, Allie Mellen, Principal Analyst at Forrester and David Moulton, Director of Content and Thought Leadership for Unit 42 as they discuss the State of XDR <a href="https://start.paloaltonetworks.com/State-of-XDR-with-Forrester">https://start.paloaltonetworks.com/State-of-XDR-with-Forrester</a>. </p><p><br></p><h3>Join the conversation on our social media channels:</h3><ul>
<li>
<strong>Website</strong>: <a href="http://www.paloaltonetworks.com/">http://www.paloaltonetworks.com</a> </li>
<li>
<strong>Threat Research</strong>: ⁠⁠⁠⁠<a href="https://unit42.paloaltonetworks.com/%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0">https://unit42.paloaltonetworks.com/⁠⁠⁠⁠</a>
</li>
<li>
<strong>Facebook</strong>: ⁠⁠⁠⁠<a href="https://www.facebook.com/LifeatPaloAltoNetworks/%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0">https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠</a>
</li>
<li>
<strong>LinkedIn</strong>: ⁠⁠⁠⁠<a href="https://www.linkedin.com/company/palo-alto-networks/">https://www.linkedin.com/company/palo-alto-networks/</a>
</li>
<li>
<strong>YouTube</strong>: ⁠⁠⁠⁠<a href="https://www.youtube.com/@paloaltonetworks">@paloaltonetworks</a>
</li>
<li>
<strong>Twitter</strong>: ⁠⁠⁠⁠<a href="https://twitter.com/PaloAltoNtwks%E2%81%A0%E2%81%A0%E2%81%A0%E2%81%A0">https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠</a>
</li>
</ul><h3><br></h3><h3><strong>About Threat Vector</strong></h3><p>Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends.</p><p><br></p><p>The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers.</p><p><br></p><p>Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersecurity landscape, Threat Vector equips you with the knowledge needed to safeguard your organization.</p><h3><br></h3><h3><strong>Palo Alto Networks</strong></h3><p>Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile.<a href="http://paloaltonetworks.com/"> ⁠http://paloaltonetworks.com⁠</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2399</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[96c8b404-bd75-11ef-bb4e-4be19d83348c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6205271239.mp3?updated=1733952277" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Court puts the ‘spy’ in spyware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2215/notes</link>
      <description>A federal judge finds NSO Group liable for hacking WhatsApp. China accuses the U.S. government of cyberattacks. The UK’s Operation Destabilise uncovers a vast criminal network. An alleged LockBit developer says he did it for the money. Apache releases a security update for their Tomcat web server. Siemens issues a security advisory for their User Management Component. Italy’s data protection authority fines OpenAI $15.6 million. Researchers demonstrate a method to bypass the latest Wi-Fi security protocol. Apple sends potential spyware victims to a nonprofit for help. Our guest is Sven Krasser, CrowdStrike's Senior Vice President Data Science and Chief Scientist, talking about balancing AI and human intervention. Hackers supersize their McDonald’s delivery orders. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, our guest is Sven Krasser, CrowdStrike's Senior Vice President Data Science and Chief Scientist, talking about balancing AI and human intervention.

Selected Reading
Judge rules NSO Group is liable for spyware hacks targeting 1,400 WhatsApp user devices (Recorded Future)
Chinese cyber center points finger at U.S. over alleged cyberattacks to steal trade secrets (CyberScoop)
Inside Operation Destabilise: How a ransomware investigation linked Russian money laundering and street-level drug dealing (Recorded Future)
Suspected LockBit dev faces extradition to the US (The Register)
Apache fixes remote code execution bypass in Tomcat web server (Bleeping Computer)
Siemens Warn of Critical Vulnerability in UMC (GovInfoSecurity)
Italy's Privacy Watchdog Fines OpenAI for ChatGPT's Violations in Collecting Users Personal Data (SecurityWeek)
WPA3 Network Password Bypassed via MITM Attack &amp; Social Engineering (CyberSecurityNews.com)
Apple Warns Users Of iPhone Spyware Attacks—What You Need To Know (Forbes)
McDonald’s Delivery App Vulnerability Let Anyone Place an Order for Just $0.01 (CyberSecurityNews.com)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 23 Dec 2024 21:10:00 -0000</pubDate>
      <itunes:title>Court puts the ‘spy’ in spyware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2215</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A federal judge finds NSO Group liable for hacking WhatsApp. China accuses the U.S. government of cyberattacks. The UK’s Operation Destabilise uncovers a vast criminal network. An alleged LockBit developer says he did it for the money. Apache releases a security update for their Tomcat web server. Siemens issues a security advisory for their User Management Component. Italy’s data protection authority fines OpenAI $15.6 million. Researchers demonstrate a method to bypass the latest Wi-Fi security protocol. Apple sends potential spyware victims to a nonprofit for help. Our guest is Sven Krasser, CrowdStrike's Senior Vice President Data Science and Chief Scientist, talking about balancing AI and human intervention. Hackers supersize their McDonald’s delivery orders. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, our guest is Sven Krasser, CrowdStrike's Senior Vice President Data Science and Chief Scientist, talking about balancing AI and human intervention.

Selected Reading
Judge rules NSO Group is liable for spyware hacks targeting 1,400 WhatsApp user devices (Recorded Future)
Chinese cyber center points finger at U.S. over alleged cyberattacks to steal trade secrets (CyberScoop)
Inside Operation Destabilise: How a ransomware investigation linked Russian money laundering and street-level drug dealing (Recorded Future)
Suspected LockBit dev faces extradition to the US (The Register)
Apache fixes remote code execution bypass in Tomcat web server (Bleeping Computer)
Siemens Warn of Critical Vulnerability in UMC (GovInfoSecurity)
Italy's Privacy Watchdog Fines OpenAI for ChatGPT's Violations in Collecting Users Personal Data (SecurityWeek)
WPA3 Network Password Bypassed via MITM Attack &amp; Social Engineering (CyberSecurityNews.com)
Apple Warns Users Of iPhone Spyware Attacks—What You Need To Know (Forbes)
McDonald’s Delivery App Vulnerability Let Anyone Place an Order for Just $0.01 (CyberSecurityNews.com)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A federal judge finds NSO Group liable for hacking WhatsApp. China accuses the U.S. government of cyberattacks. The UK’s Operation Destabilise uncovers a vast criminal network. An alleged LockBit developer says he did it for the money. Apache releases a security update for their Tomcat web server. Siemens issues a security advisory for their User Management Component. Italy’s data protection authority fines OpenAI $15.6 million. Researchers demonstrate a method to bypass the latest Wi-Fi security protocol. Apple sends potential spyware victims to a nonprofit for help. Our guest is Sven Krasser, CrowdStrike's Senior Vice President Data Science and Chief Scientist, talking about balancing AI and human intervention. Hackers supersize their McDonald’s delivery orders. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today, our guest is <a href="https://www.linkedin.com/in/svenkrasser/">Sven Krasser</a>, <a href="https://www.crowdstrike.com/">CrowdStrike</a>'s Senior Vice President Data Science and Chief Scientist, talking about balancing AI and human intervention.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/judge-rules-nso-group-liable-for-hack-of-1400-whatsapp-users">Judge rules NSO Group is liable for spyware hacks targeting 1,400 WhatsApp user devices</a> (Recorded Future)</p><p><a href="https://cyberscoop.com/chinese-cyber-center-us-alleged-cyberattacks-trade-secrets/">Chinese cyber center points finger at U.S. over alleged cyberattacks to steal trade secrets</a> (CyberScoop)</p><p><a href="https://therecord.media/operation-destabilise-money-laundering-investigation-uk-nca">Inside Operation Destabilise: How a ransomware investigation linked Russian money laundering and street-level drug dealing</a> (Recorded Future)</p><p><a href="https://www.theregister.com/2024/12/23/lockbit_ransomware_dev_extradition/">Suspected LockBit dev faces extradition to the US</a> (The Register)</p><p><a href="https://www.bleepingcomputer.com/news/security/apache-fixes-remote-code-execution-bypass-in-tomcat-web-server/">Apache fixes remote code execution bypass in Tomcat web server</a> (Bleeping Computer)</p><p><a href="https://www.govinfosecurity.com/siemens-warns-critical-vulnerability-in-umc-a-27121">Siemens Warn of Critical Vulnerability in UMC</a> (GovInfoSecurity)</p><p><a href="https://www.securityweek.com/italys-privacy-watchdog-fines-openai-for-chatgpts-violations-in-collecting-users-personal-data/">Italy's Privacy Watchdog Fines OpenAI for ChatGPT's Violations in Collecting Users Personal Data</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/researchers-bypass-wpa3-password/">WPA3 Network Password Bypassed via MITM Attack &amp; Social Engineering</a> (CyberSecurityNews.com)</p><p><a href="https://www.forbes.com/sites/daveywinder/2024/12/20/apple-warns-users-of-iphone-spyware-attacks-what-you-need-to-know/">Apple Warns Users Of iPhone Spyware Attacks—What You Need To Know</a> (Forbes)</p><p><a href="https://cybersecuritynews.com/mcdonalds-delivery-app-vulnerability/">McDonald’s Delivery App Vulnerability Let Anyone Place an Order for Just $0.01</a> (CyberSecurityNews.com)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1828</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bd9be23e-b95e-11ee-8cf8-f3d922fbd3d9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2691054017.mp3?updated=1734980624" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jim Zufoletti: Building your experience portfolio. [Entrepreneur] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/47/notes</link>
      <description>CEO and co-founder of SafeGuard Cyber Jim Zufoletti shares his journey starting out as an intrepreneur and transformation into a serial entrepreneur in cybersecurity. Jim shares how he got his feet wet working for others as an intrepreneur and catching the entrepreneurial bug in the mid-90s. He has co-founded a number of companies starting with FreeMarkets, a B2B ecommerce company. After that went public and Jim moved on, he went to business school at the University of Virginia and crossed paths with his future co-founder of SafeGuard Cyber. At UVA, Jim was inspired by a professor who exposed him to the effectuation approach to entrepreneurship, Along those lines, Jim recommends those looking to start a business in cyber build their experience portfolio. Jim took what he learned to help build where he is today. His company helps protect the humans in this new digital world with the current work from home environment. And, we thank Jim for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 22 Dec 2024 08:00:00 -0000</pubDate>
      <itunes:title>Jim Zufoletti: Building your experience portfolio. [Entrepreneur] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>47</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/e8aaa164-bef7-11ef-b5a2-8ff9c9e84ee6/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CEO and co-founder of SafeGuard Cyber Jim Zufoletti shares his journey starting out as an intrepreneur and transformation into a serial entrepreneur in cybersecurity. Jim shares how he got his feet wet working for others as an intrepreneur and catching the entrepreneurial bug in the mid-90s. He has co-founded a number of companies starting with FreeMarkets, a B2B ecommerce company. After that went public and Jim moved on, he went to business school at the University of Virginia and crossed paths with his future co-founder of SafeGuard Cyber. At UVA, Jim was inspired by a professor who exposed him to the effectuation approach to entrepreneurship, Along those lines, Jim recommends those looking to start a business in cyber build their experience portfolio. Jim took what he learned to help build where he is today. His company helps protect the humans in this new digital world with the current work from home environment. And, we thank Jim for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CEO and co-founder of SafeGuard Cyber Jim Zufoletti shares his journey starting out as an intrepreneur and transformation into a serial entrepreneur in cybersecurity. Jim shares how he got his feet wet working for others as an intrepreneur and catching the entrepreneurial bug in the mid-90s. He has co-founded a number of companies starting with FreeMarkets, a B2B ecommerce company. After that went public and Jim moved on, he went to business school at the University of Virginia and crossed paths with his future co-founder of SafeGuard Cyber. At UVA, Jim was inspired by a professor who exposed him to the effectuation approach to entrepreneurship, Along those lines, Jim recommends those looking to start a business in cyber build their experience portfolio. Jim took what he learned to help build where he is today. His company helps protect the humans in this new digital world with the current work from home environment. And, we thank Jim for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>472</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e8aaa164-bef7-11ef-b5a2-8ff9c9e84ee6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6507389698.mp3?updated=1734716046" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Quishing for trouble. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/358/notes</link>
      <description>Adam Khan, VP of Security Operations at Barracuda, joins to discuss his team's work on "The evolving use of QR codes in phishing attacks." Cybercriminals are evolving phishing tactics by embedding QR codes, or “quishing,” into PDF documents attached to emails, tricking recipients into scanning them to access malicious websites that steal credentials. 
Barracuda researchers found over half a million such emails from June to September 2024, with most impersonating brands like Microsoft, DocuSign, and Adobe to exploit urgency and trust. To counter these attacks, businesses should deploy multilayered email security, use AI-powered detection tools, educate employees on QR code risks, and enable multifactor authentication to safeguard accounts.
The research can be found here: 
Threat Spotlight: The evolving use of QR codes in phishing attacks

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Dec 2024 08:00:00 -0000</pubDate>
      <itunes:title>Quishing for trouble. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>358</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5f5c6976-beff-11ef-a8bd-67b02091c6d0/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Adam Khan, VP of Security Operations at Barracuda, joins to discuss his team's work on "The evolving use of QR codes in phishing attacks." Cybercriminals are evolving phishing tactics by embedding QR codes, or “quishing,” into PDF documents attached to emails, tricking recipients into scanning them to access malicious websites that steal credentials. 
Barracuda researchers found over half a million such emails from June to September 2024, with most impersonating brands like Microsoft, DocuSign, and Adobe to exploit urgency and trust. To counter these attacks, businesses should deploy multilayered email security, use AI-powered detection tools, educate employees on QR code risks, and enable multifactor authentication to safeguard accounts.
The research can be found here: 
Threat Spotlight: The evolving use of QR codes in phishing attacks

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/adamkhan-cyber/">Adam Khan</a>, VP of Security Operations at <a href="https://www.linkedin.com/company/barracuda-networks/">Barracuda</a>, joins to discuss his team's work on "The evolving use of QR codes in phishing attacks." Cybercriminals are evolving phishing tactics by embedding QR codes, or “quishing,” into PDF documents attached to emails, tricking recipients into scanning them to access malicious websites that steal credentials. </p><p>Barracuda researchers found over half a million such emails from June to September 2024, with most impersonating brands like Microsoft, DocuSign, and Adobe to exploit urgency and trust. To counter these attacks, businesses should deploy multilayered email security, use AI-powered detection tools, educate employees on QR code risks, and enable multifactor authentication to safeguard accounts.</p><p>The research can be found here: </p><ul><li><a href="https://blog.barracuda.com/2024/10/22/threat-spotlight-evolving-qr-codes-phishing-attacks">Threat Spotlight: The evolving use of QR codes in phishing attacks</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>856</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5f5c6976-beff-11ef-a8bd-67b02091c6d0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8959449270.mp3?updated=1734719480" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ukraine’s fight to restore critical data.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2214/notes</link>
      <description>Russian hackers attack Ukraine’s state registers. NotLockBit is a new ransomware strain targeting macOS and Windows. Sophos discloses three critical vulnerabilities in its Firewall product. The BadBox botnet infects over 190,000 Android devices. BeyondTrust patches two critical vulnerabilities. Hackers stole $2.2 billion from cryptocurrency platforms in 2024. Officials dismantle a live sports streaming piracy ring. Rockwell Automation patches critical vulnerabilities in a device used for energy control in industrial systems. A new report from Dragos highlights ransomware groups targeting industrial sectors. A Ukrainian national is sentenced to 60 months in prison for distributing the Raccoon Infostealer malware. We bid a fond farewell to our colleague Rick Howard, who’s retiring after years of inspiring leadership, wisdom, and camaraderie. The LockBit gang tease what’s yet to come. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest segment is bittersweet as we bid farewell to our beloved Rick Howard, who’s retiring after years of inspiring leadership, wisdom, and camaraderie. Join us in celebrating his incredible journey, sharing heartfelt memories, and letting him know just how deeply he’ll be missed by all of us here at N2K.

Selected Reading
Ukraine’s state registers hit with one of Russia’s largest cyberattacks, officials say (The Record)
NotLockBit - Previously Unknown Ransomware Attack Windows &amp; macOS (GB Hackers)
Critical Sophos Firewall Vulnerabilities Let Attackers Execute Remote Code (Cyber Security News)
Botnet of 190,000 BadBox-Infected Android Devices Discovered (SecurityWeek)
BeyondTrust Security Incident — Command Injection and Escalation Weaknesses (CVE-2024-12356, CVE-2024-12686) (SOCRadar)
Crypto-Hackers Steal $2.2bn as North Koreans Dominate (Infosecurity Magazine)
Massive live sports piracy ring with 812 million yearly visits taken offline (Bleeping Computer)
Rockwell PowerMonitor Vulnerabilities Allow Remote Hacking of Industrial Systems (SecurityWeek)
Ransomware Attackers Target Industries with Low Downtime Tolerance (Infosecurity Magazine)
Ukrainian Raccoon Infostealer Operator Sentenced to Prison in US (SecurityWeek)
NetWalker Ransomware Operator Sentenced For Hacking Hundreds Of Organizations (Cyber Security News)
LockBit Admins Tease a New Ransomware Version (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 20 Dec 2024 21:10:00 -0000</pubDate>
      <itunes:title>Ukraine’s fight to restore critical data.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2214</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Russian hackers attack Ukraine’s state registers. NotLockBit is a new ransomware strain targeting macOS and Windows. Sophos discloses three critical vulnerabilities in its Firewall product. The BadBox botnet infects over 190,000 Android devices. BeyondTrust patches two critical vulnerabilities. Hackers stole $2.2 billion from cryptocurrency platforms in 2024. Officials dismantle a live sports streaming piracy ring. Rockwell Automation patches critical vulnerabilities in a device used for energy control in industrial systems. A new report from Dragos highlights ransomware groups targeting industrial sectors. A Ukrainian national is sentenced to 60 months in prison for distributing the Raccoon Infostealer malware. We bid a fond farewell to our colleague Rick Howard, who’s retiring after years of inspiring leadership, wisdom, and camaraderie. The LockBit gang tease what’s yet to come. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest segment is bittersweet as we bid farewell to our beloved Rick Howard, who’s retiring after years of inspiring leadership, wisdom, and camaraderie. Join us in celebrating his incredible journey, sharing heartfelt memories, and letting him know just how deeply he’ll be missed by all of us here at N2K.

Selected Reading
Ukraine’s state registers hit with one of Russia’s largest cyberattacks, officials say (The Record)
NotLockBit - Previously Unknown Ransomware Attack Windows &amp; macOS (GB Hackers)
Critical Sophos Firewall Vulnerabilities Let Attackers Execute Remote Code (Cyber Security News)
Botnet of 190,000 BadBox-Infected Android Devices Discovered (SecurityWeek)
BeyondTrust Security Incident — Command Injection and Escalation Weaknesses (CVE-2024-12356, CVE-2024-12686) (SOCRadar)
Crypto-Hackers Steal $2.2bn as North Koreans Dominate (Infosecurity Magazine)
Massive live sports piracy ring with 812 million yearly visits taken offline (Bleeping Computer)
Rockwell PowerMonitor Vulnerabilities Allow Remote Hacking of Industrial Systems (SecurityWeek)
Ransomware Attackers Target Industries with Low Downtime Tolerance (Infosecurity Magazine)
Ukrainian Raccoon Infostealer Operator Sentenced to Prison in US (SecurityWeek)
NetWalker Ransomware Operator Sentenced For Hacking Hundreds Of Organizations (Cyber Security News)
LockBit Admins Tease a New Ransomware Version (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russian hackers attack Ukraine’s state registers. NotLockBit is a new ransomware strain targeting macOS and Windows. Sophos discloses three critical vulnerabilities in its Firewall product. The BadBox botnet infects over 190,000 Android devices. BeyondTrust patches two critical vulnerabilities. Hackers stole $2.2 billion from cryptocurrency platforms in 2024. Officials dismantle a live sports streaming piracy ring. Rockwell Automation patches critical vulnerabilities in a device used for energy control in industrial systems. A new report from Dragos highlights ransomware groups targeting industrial sectors. A Ukrainian national is sentenced to 60 months in prison for distributing the Raccoon Infostealer malware. We bid a fond farewell to our colleague Rick Howard, who’s retiring after years of inspiring leadership, wisdom, and camaraderie. The LockBit gang tease what’s yet to come. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today’s guest segment is bittersweet as we bid farewell to our beloved <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a>, who’s retiring after years of inspiring leadership, wisdom, and camaraderie. Join us in celebrating his incredible journey, sharing heartfelt memories, and letting him know just how deeply he’ll be missed by all of us here at N2K.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/ukraine-government-cyberattack-state-registers-russia">Ukraine’s state registers hit with one of Russia’s largest cyberattacks, officials say</a> (The Record)</p><p><a href="https://gbhackers.com/notlockbit/">NotLockBit - Previously Unknown Ransomware Attack Windows &amp; macOS</a> (GB Hackers)</p><p><a href="https://cybersecuritynews.com/sophos-firewall-vulnerabilities/">Critical Sophos Firewall Vulnerabilities Let Attackers Execute Remote Code</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/botnet-of-190000-badbox-infected-android-devices-discovered/">Botnet of 190,000 BadBox-Infected Android Devices Discovered</a> (SecurityWeek)</p><p><a href="https://socradar.io/beyondtrust-security-incident-command-injection/">BeyondTrust Security Incident — Command Injection and Escalation Weaknesses (CVE-2024-12356, CVE-2024-12686)</a><a href="https://socradar.io/beyondtrust-security-incident-command-injection/"> (SOCRadar)</a></p><p><a href="https://www.infosecurity-magazine.com/news/cryptohackers-steal-22bn-north/">Crypto-Hackers Steal $2.2bn as North Koreans Dominate</a> (Infosecurity Magazine)</p><p><a href="https://www.bleepingcomputer.com/news/security/massive-live-sports-piracy-ring-with-812-million-yearly-visits-taken-offline/">Massive live sports piracy ring with 812 million yearly visits taken offline</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/rockwell-powermonitor-vulnerabilities-allow-remote-hacking-of-industrial-systems/">Rockwell PowerMonitor Vulnerabilities Allow Remote Hacking of Industrial Systems</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-industries-downtime/">Ransomware Attackers Target Industries with Low Downtime Tolerance</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/ukrainian-raccoon-infostealer-operator-sentenced-to-prison-in-us/">Ukrainian Raccoon Infostealer Operator Sentenced to Prison in US</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/netwalker-ransomware-operator-sentenced/">NetWalker Ransomware Operator Sentenced For Hacking Hundreds Of Organizations</a> (Cyber Security News)</p><p><a href="https://www.infosecurity-magazine.com/news/lockbit-admins-tease-a-new/">LockBit Admins Tease a New Ransomware Version</a> (Infosecurity Magazine)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1954</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bd5e9a50-b95e-11ee-8cf8-138be7ac6588]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1978695388.mp3?updated=1734724521" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Breached but not broken.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2213/notes</link>
      <description>CISA urges senior government officials to enhance mobile device security. Russian state-sponsored hacker group Sandworm is targeting Ukrainian soldiers. A website bug in GPS tracking firm Hapn is exposing customer information. Multiple critical vulnerabilities have been identified in Sharp branded routers. Ireland’s Data Protection Commission fines Meta $263 million for alleged GDPR violations. Google releases an urgent Chrome security update to address four high-rated vulnerabilities. Cyberattacks on India-based organizations surged 92% year-over-year. Cybercriminals target Google Calendar to launch phishing attacks. Fortinet patches a critical vulnerability in FortiWLM. Juniper Networks warns of a botnet infection targeting routers with default credentials. Our guest is Jeff Krull, principal and practice leader of Baker Tilly's cybersecurity practice, with advice on using employee access controls to limit internal cyber threats. When is “undesirable” a badge of honor?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Jeff Krull, principal and practice leader of Baker Tilly's cybersecurity practice, talking about using employee access controls to limit internal cyber threats.

Selected Reading
CISA urges senior government officials to lock down mobile devices amid ongoing Salt Typhoon breach (The Record)
Sandworm-linked hackers target users of Ukraine’s military app in new spying campaign (The Record)
Tracker firm Hapn spilling names of thousands of GPS tracking customers (TechCrunch)
Multiple security flaws reported in SHARP routers (Beyond Machines)
Meta fined $263 million for alleged GDPR violations that led to data breach (The Record)
Update Google Chrome Now—4 New Windows, Mac, Linux Security Warnings (Forbes)
India Sees Surge in Banking, Utilities API Attacks (Dark Reading)
Google Calendar Phishing Scam Targets Users with Malicious Invites (Hackread)
Fortinet Patches Critical FortiWLM Vulnerability (SecurityWeek)
Juniper Warns of Mirai Botnet Targeting Session Smart Routers (SecurityWeek)
Recorded Future CEO Calls Russia’s “Undesirable” Listing a “Compliment” (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 19 Dec 2024 21:10:00 -0000</pubDate>
      <itunes:title>Breached but not broken.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2213</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA urges senior government officials to enhance mobile device security. Russian state-sponsored hacker group Sandworm is targeting Ukrainian soldiers. A website bug in GPS tracking firm Hapn is exposing customer information. Multiple critical vulnerabilities have been identified in Sharp branded routers. Ireland’s Data Protection Commission fines Meta $263 million for alleged GDPR violations. Google releases an urgent Chrome security update to address four high-rated vulnerabilities. Cyberattacks on India-based organizations surged 92% year-over-year. Cybercriminals target Google Calendar to launch phishing attacks. Fortinet patches a critical vulnerability in FortiWLM. Juniper Networks warns of a botnet infection targeting routers with default credentials. Our guest is Jeff Krull, principal and practice leader of Baker Tilly's cybersecurity practice, with advice on using employee access controls to limit internal cyber threats. When is “undesirable” a badge of honor?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Jeff Krull, principal and practice leader of Baker Tilly's cybersecurity practice, talking about using employee access controls to limit internal cyber threats.

Selected Reading
CISA urges senior government officials to lock down mobile devices amid ongoing Salt Typhoon breach (The Record)
Sandworm-linked hackers target users of Ukraine’s military app in new spying campaign (The Record)
Tracker firm Hapn spilling names of thousands of GPS tracking customers (TechCrunch)
Multiple security flaws reported in SHARP routers (Beyond Machines)
Meta fined $263 million for alleged GDPR violations that led to data breach (The Record)
Update Google Chrome Now—4 New Windows, Mac, Linux Security Warnings (Forbes)
India Sees Surge in Banking, Utilities API Attacks (Dark Reading)
Google Calendar Phishing Scam Targets Users with Malicious Invites (Hackread)
Fortinet Patches Critical FortiWLM Vulnerability (SecurityWeek)
Juniper Warns of Mirai Botnet Targeting Session Smart Routers (SecurityWeek)
Recorded Future CEO Calls Russia’s “Undesirable” Listing a “Compliment” (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA urges senior government officials to enhance mobile device security. Russian state-sponsored hacker group Sandworm is targeting Ukrainian soldiers. A website bug in GPS tracking firm Hapn is exposing customer information. Multiple critical vulnerabilities have been identified in Sharp branded routers. Ireland’s Data Protection Commission fines Meta $263 million for alleged GDPR violations. Google releases an urgent Chrome security update to address four high-rated vulnerabilities. Cyberattacks on India-based organizations surged 92% year-over-year. Cybercriminals target Google Calendar to launch phishing attacks. Fortinet patches a critical vulnerability in FortiWLM. Juniper Networks warns of a botnet infection targeting routers with default credentials. Our guest is Jeff Krull, principal and practice leader of Baker Tilly's cybersecurity practice, with advice on using employee access controls to limit internal cyber threats. When is “undesirable” a badge of honor?</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/jeff-krull-7021123/">Jeff Krull</a>, principal and practice leader of <a href="https://www.bakertilly.com/">Baker Tilly</a>'s cybersecurity practice, talking about using employee access controls to limit internal cyber threats.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/cisa-urges-senior-officials-to-lock-down-devices-salt-typhoon">CISA urges senior government officials to lock down mobile devices amid ongoing Salt Typhoon breach</a> (The Record)</p><p><a href="https://therecord.media/ukraine-military-app-espionage-russia-sandworm">Sandworm-linked hackers target users of Ukraine’s military app in new spying campaign</a> (The Record)</p><p><a href="https://techcrunch.com/2024/12/18/tracker-firm-hapn-spilling-names-of-thousands-of-gps-tracking-customers/">Tracker firm Hapn spilling names of thousands of GPS tracking customers</a> (TechCrunch)</p><p><a href="https://beyondmachines.net/event_details/multiple-security-flaws-reported-in-sharp-routers-n-j-4-n-c/gD2P6Ple2L">Multiple security flaws reported in SHARP routers</a> (Beyond Machines)</p><p><a href="https://therecord.media/meta-fined-263-million-gdpr-violations-data-breach">Meta fined $263 million for alleged GDPR violations that led to data breach</a> (The Record)</p><p><a href="https://www.forbes.com/sites/daveywinder/2024/12/19/update-google-chrome-now-4-new-windows-mac-linux-security-warnings/">Update Google Chrome Now—4 New Windows, Mac, Linux Security Warnings</a> (Forbes)</p><p><a href="https://www.darkreading.com/cyber-risk/india-surge-api-attacks-banking-utilities">India Sees Surge in Banking, Utilities API Attacks</a> (Dark Reading)</p><p><a href="https://hackread.com/google-calendar-phishing-scam-users-malicious-invites/">Google Calendar Phishing Scam Targets Users with Malicious Invites</a> (Hackread)</p><p><a href="https://www.securityweek.com/fortinet-patches-critical-fortiwlm-vulnerability/">Fortinet Patches Critical FortiWLM Vulnerability</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/juniper-warns-of-mirai-botnet-targeting-session-smart-routers/">Juniper Warns of Mirai Botnet Targeting Session Smart Routers</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/recorded-future-russia-undesirable/">Recorded Future CEO Calls Russia’s “Undesirable” Listing a “Compliment”</a> (Infosecurity Magazine)</p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1718</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bd22bb84-b95e-11ee-8cf8-832bd70bb1af]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9990887300.mp3?updated=1734638574" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacking allegations and antitrust heat.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2212/notes</link>
      <description>The U.S. considers a ban on Chinese made routers. More than 200 Cleo managed file-transfer servers remain vulnerable. The Androxgh0st botnet expands. Schneider Electric reports a critical vulnerability in some PLCs. A critical Apache Struts 2 vulnerability is being actively exploited. Malicious campaigns are targeting Chinese-branded IoT devices. A Nebraska-based healthcare insurer discloses a data breach affecting over 225,000 individuals. IntelBroker leaks 2.9GB of data from Cisco’s DevHub environment. CISA issues a Binding Operational Directive requiring federal agencies to enhance cloud security. On today’s CERTByte segment, Chris Hare and Dan Neville unpack a question targeting the Network+ certification. INTERPOL says, “Enough with the pig butchering.“
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
This week, Chris is joined by Dan Neville to break down a question targeting the Network+ certification (N10-008 expires on 12/20/24 and the N10-009 update launched on June 20th of this year). Today’s question comes from N2K’s CompTIA® Network+ Practice Test, both exam versions of which are offered on our site.
Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro.
Please note: The questions and answers provided here and on our site are not actual current or prior questions and answers from these certification publishers or providers.

Selected Reading
U.S. Weighs Ban on Chinese-Made Router in Millions of American Homes (Wall Street Journal)
Attack Exposure: Unpatched Cleo Managed File-Transfer Software (BankInfo Security)
Androxgh0st Botnet Targets IoT Devices, Exploiting 27 Vulnerabilities (Hackread)
Schneider Electric reports critical flaw in Modicon Programmable Logic Controllers (Beyond Machines)
RATs can sniff out your Chinese-made web cameras: here’s how to defend yourself (Cybernews)
Regional Care Data Breach Impacts 225,000 People (SecurityWeek)
Hacker IntelBroker Leaked 2.9GB of Data Stolen From Cisco DevHub Instance (Cyber Security News)
New critical Apache Struts flaw exploited to find vulnerable servers (Bleeping Computer)
CISA Issues Binding Operational Directive for Improved Cloud Security (SecurityWeek)
Playbook for Strengthening Cybersecurity in Federal Grant Programs for Critical Infrastructure (CISA)
INTERPOL urges end to 'Pig Butchering' term, cites harm to online victims (INTERPOL) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 18 Dec 2024 21:10:00 -0000</pubDate>
      <itunes:title>Hacking allegations and antitrust heat.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2212</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The U.S. considers a ban on Chinese made routers. More than 200 Cleo managed file-transfer servers remain vulnerable. The Androxgh0st botnet expands. Schneider Electric reports a critical vulnerability in some PLCs. A critical Apache Struts 2 vulnerability is being actively exploited. Malicious campaigns are targeting Chinese-branded IoT devices. A Nebraska-based healthcare insurer discloses a data breach affecting over 225,000 individuals. IntelBroker leaks 2.9GB of data from Cisco’s DevHub environment. CISA issues a Binding Operational Directive requiring federal agencies to enhance cloud security. On today’s CERTByte segment, Chris Hare and Dan Neville unpack a question targeting the Network+ certification. INTERPOL says, “Enough with the pig butchering.“
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
This week, Chris is joined by Dan Neville to break down a question targeting the Network+ certification (N10-008 expires on 12/20/24 and the N10-009 update launched on June 20th of this year). Today’s question comes from N2K’s CompTIA® Network+ Practice Test, both exam versions of which are offered on our site.
Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro.
Please note: The questions and answers provided here and on our site are not actual current or prior questions and answers from these certification publishers or providers.

Selected Reading
U.S. Weighs Ban on Chinese-Made Router in Millions of American Homes (Wall Street Journal)
Attack Exposure: Unpatched Cleo Managed File-Transfer Software (BankInfo Security)
Androxgh0st Botnet Targets IoT Devices, Exploiting 27 Vulnerabilities (Hackread)
Schneider Electric reports critical flaw in Modicon Programmable Logic Controllers (Beyond Machines)
RATs can sniff out your Chinese-made web cameras: here’s how to defend yourself (Cybernews)
Regional Care Data Breach Impacts 225,000 People (SecurityWeek)
Hacker IntelBroker Leaked 2.9GB of Data Stolen From Cisco DevHub Instance (Cyber Security News)
New critical Apache Struts flaw exploited to find vulnerable servers (Bleeping Computer)
CISA Issues Binding Operational Directive for Improved Cloud Security (SecurityWeek)
Playbook for Strengthening Cybersecurity in Federal Grant Programs for Critical Infrastructure (CISA)
INTERPOL urges end to 'Pig Butchering' term, cites harm to online victims (INTERPOL) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The U.S. considers a ban on Chinese made routers. More than 200 Cleo managed file-transfer servers remain vulnerable. The Androxgh0st botnet expands. Schneider Electric reports a critical vulnerability in some PLCs. A critical Apache Struts 2 vulnerability is being actively exploited. Malicious campaigns are targeting Chinese-branded IoT devices. A Nebraska-based healthcare insurer discloses a data breach affecting over 225,000 individuals. IntelBroker leaks 2.9GB of data from Cisco’s DevHub environment. CISA issues a Binding Operational Directive requiring federal agencies to enhance cloud security. On today’s CERTByte segment, Chris Hare and Dan Neville unpack a question targeting the Network+ certification. INTERPOL says, “Enough with the pig butchering.“</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CertByte Segment</h2><p>This week, Chris is joined by <a href="https://www.linkedin.com/in/danneville1/">Dan Neville</a> to break down a question targeting the Network+ certification (N10-008 expires on 12/20/24 and the N10-009 update launched on June 20th of this year). Today’s question comes from<a href="https://certify.cybervista.net/products/comptia/network-plus-practice-test/"> </a><a href="https://certify.cybervista.net/products/comptia/network-plus-practice-test/">N2K’s CompTIA® Network+ Practice Test</a>, both exam versions of which are offered on our site.</p><p>Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro.</p><p><strong><em>Please note: The questions and answers provided here and on our site are not actual current or prior questions and answers from these certification publishers or providers.</em></strong></p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.wsj.com/politics/national-security/us-ban-china-router-tp-link-systems-7d7507e6?st=S62Lxc&amp;reflink=desktopwebshare_permalink">U.S. Weighs Ban on Chinese-Made Router in Millions of American Homes</a> (Wall Street Journal)</p><p><a href="https://www.bankinfosecurity.com/attack-exposure-unpatched-cleo-managed-file-transfer-software-a-27092">Attack Exposure: Unpatched Cleo Managed File-Transfer Software</a> (BankInfo Security)</p><p><a href="https://hackread.com/androxgh0st-botnet-iot-devices-exploit-vulnerabilities/">Androxgh0st Botnet Targets IoT Devices, Exploiting 27 Vulnerabilities</a> (Hackread)</p><p><a href="https://beyondmachines.net/event_details/schneider-electric-reports-critical-flaw-in-modicon-programmable-logic-controllers-4-o-8-k-s/gD2P6Ple2L">Schneider Electric reports critical flaw in Modicon Programmable Logic Controllers</a> (Beyond Machines)</p><p><a href="https://cnews.link/hiatus-rat-attack-web-cameras-hikvision-xiongmai-1/">RATs can sniff out your Chinese-made web cameras: here’s how to defend yourself</a> (Cybernews)</p><p><a href="https://www.securityweek.com/regional-care-data-breach-impacts-225000-people/">Regional Care Data Breach Impacts 225,000 People</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/intelbroker-leaked-2-9gb-cisco-data/">Hacker IntelBroker Leaked 2.9GB of Data Stolen From Cisco DevHub Instance</a> (Cyber Security News)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-critical-apache-struts-flaw-exploited-to-find-vulnerable-servers/">New critical Apache Struts flaw exploited to find vulnerable servers</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/cisa-issues-binding-operational-directive-for-improved-cloud-security/">CISA Issues Binding Operational Directive for Improved Cloud Security</a> (SecurityWeek)</p><p><a href="https://www.cisa.gov/resources-tools/resources/playbook-strengthening-cybersecurity-federal-grant-programs-critical-infrastructure">Playbook for Strengthening Cybersecurity in Federal Grant Programs for Critical Infrastructure</a> (CISA)</p><p><a href="https://www.interpol.int/en/News-and-Events/News/2024/INTERPOL-urges-end-to-Pig-Butchering-term-cites-harm-to-online-victims">INTERPOL urges end to 'Pig Butchering' term, cites harm to online victims</a> (INTERPOL) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1530</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bce6d560-b95e-11ee-8cf8-7b7c50644ef7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2404831558.mp3?updated=1734550092" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The cost of peeking at U.S. traffic.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2211/notes</link>
      <description>The Biden administration takes its first step to retaliate against China for the Salt Typhoon cyberattack. The Feds release a draft National Cyber Incident Response Plan. Telecom Namibia suffers a cyberattack. The Australian Information Commissioner has reached a $50 million settlement with Meta over the Cambridge Analytica scandal. CISA releases its 2024 year in review. LastPass hackers nab an additional five millions dollars. Texas Tech University notifies over 1.4 million individuals of a ransomware attack. Researchers discover a new DarkGate RAT attack vector using vishing. A fraudster gets 69 months in prison. On our Threat Vector segment, David Moulton speaks with Nir Zuk, Founder and CTO of Palo Alto Networks about predictions for 2025. Surveillance tweaks our brains in unexpected ways. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
On our Threat Vector segment, we preview this week’s episode where host David Moulton talks with Nir Zuk, Founder and CTO of Palo Alto Networks. They talk about Palo Alto Networks' predictions for 2025, focusing on the shift to unified data security platforms and the growing importance of AI in cybersecurity. You can catch new episodes of Threat Vector every Thursday here and on your favorite podcast app. 

Selected Reading
Biden Administration Takes First Step to Retaliate Against China Over Hack (The New York Times)
US Unveils New National Cyber Incident Response Plan (Infosecurity Magazine)
Telecom Namibia Cyberattack: 400,000 Files Leaked (The Cyber Express)
Landmark settlement of $50m from Meta for Australian users impacted by Cambridge Analytica incident (OAIC)
CISA Warns of New Windows Vulnerability Used in Hacker Attacks (CyberInsider)
CISA 2024 Year in review (CISA)
LastPass threat actor steals $5.4M from victims just a week before Xmas (Cointelegraph)
Texas Tech University Data Breach Impacts 1.4 Million People (SecurityWeek)
Microsoft Teams Vishing Spreads DarkGate RAT (Dark Reading)
Man Accused of SQL Injection Hacking Gets 69-Month Prison Sentence (SecurityWeek)
The psychological implications of Big Brother’s gaze (SCIMEX)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Dec 2024 21:10:00 -0000</pubDate>
      <itunes:title>The cost of peeking at U.S. traffic.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2211</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The Biden administration takes its first step to retaliate against China for the Salt Typhoon cyberattack. The Feds release a draft National Cyber Incident Response Plan. Telecom Namibia suffers a cyberattack. The Australian Information Commissioner has reached a $50 million settlement with Meta over the Cambridge Analytica scandal. CISA releases its 2024 year in review. LastPass hackers nab an additional five millions dollars. Texas Tech University notifies over 1.4 million individuals of a ransomware attack. Researchers discover a new DarkGate RAT attack vector using vishing. A fraudster gets 69 months in prison. On our Threat Vector segment, David Moulton speaks with Nir Zuk, Founder and CTO of Palo Alto Networks about predictions for 2025. Surveillance tweaks our brains in unexpected ways. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
On our Threat Vector segment, we preview this week’s episode where host David Moulton talks with Nir Zuk, Founder and CTO of Palo Alto Networks. They talk about Palo Alto Networks' predictions for 2025, focusing on the shift to unified data security platforms and the growing importance of AI in cybersecurity. You can catch new episodes of Threat Vector every Thursday here and on your favorite podcast app. 

Selected Reading
Biden Administration Takes First Step to Retaliate Against China Over Hack (The New York Times)
US Unveils New National Cyber Incident Response Plan (Infosecurity Magazine)
Telecom Namibia Cyberattack: 400,000 Files Leaked (The Cyber Express)
Landmark settlement of $50m from Meta for Australian users impacted by Cambridge Analytica incident (OAIC)
CISA Warns of New Windows Vulnerability Used in Hacker Attacks (CyberInsider)
CISA 2024 Year in review (CISA)
LastPass threat actor steals $5.4M from victims just a week before Xmas (Cointelegraph)
Texas Tech University Data Breach Impacts 1.4 Million People (SecurityWeek)
Microsoft Teams Vishing Spreads DarkGate RAT (Dark Reading)
Man Accused of SQL Injection Hacking Gets 69-Month Prison Sentence (SecurityWeek)
The psychological implications of Big Brother’s gaze (SCIMEX)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Biden administration takes its first step to retaliate against China for the Salt Typhoon cyberattack. The Feds release a draft National Cyber Incident Response Plan. Telecom Namibia suffers a cyberattack. The Australian Information Commissioner has reached a $50 million settlement with Meta over the Cambridge Analytica scandal. CISA releases its 2024 year in review. LastPass hackers nab an additional five millions dollars. Texas Tech University notifies over 1.4 million individuals of a ransomware attack. Researchers discover a new DarkGate RAT attack vector using vishing. A fraudster gets 69 months in prison. On our Threat Vector segment, David Moulton speaks with Nir Zuk, Founder and CTO of Palo Alto Networks about predictions for 2025. Surveillance tweaks our brains in unexpected ways. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Threat Vector Segment</h2><p>On our Threat Vector segment, we preview this week’s episode where host<a href="https://www.linkedin.com/in/davidrmoulton/"> David Moulton</a> talks with <a href="https://www.linkedin.com/in/nir-z-680120233/">Nir Zuk</a>, Founder and CTO of Palo Alto Networks. They talk about Palo Alto Networks' predictions for 2025, focusing on the shift to unified data security platforms and the growing importance of AI in cybersecurity. You can catch new episodes of Threat Vector every Thursday here and on your favorite podcast app. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.nytimes.com/2024/12/16/us/politics/biden-administration-retaliation-china-hack.html">Biden Administration Takes First Step to Retaliate Against China Over Hack</a> (The New York Times)</p><p><a href="https://www.infosecurity-magazine.com/news/us-cyber-incident-response-plan/">US Unveils New National Cyber Incident Response Plan</a> (Infosecurity Magazine)</p><p><a href="https://thecyberexpress.com/telecom-namibia-cyberattack/">Telecom Namibia Cyberattack: 400,000 Files Leaked</a> (The Cyber Express)</p><p><a href="https://www.oaic.gov.au/news/media-centre/landmark-settlement-of-$50m-from-meta-for-australian-users-impacted-by-cambridge-analytica-incident">Landmark settlement of $50m from Meta for Australian users impacted by Cambridge Analytica incident</a> (OAIC)</p><p><a href="https://cyberinsider.com/cisa-warns-of-new-windows-vulnerability-used-in-hacker-attacks/">CISA Warns of New Windows Vulnerability Used in Hacker Attacks</a> (CyberInsider)</p><p><a href="http://cisa.gov/2024YIR">CISA 2024 Year in review</a> (CISA)</p><p><a href="https://cointelegraph.com/news/lastpass-threat-actor-steals-over-5-million-from-40-victims">LastPass threat actor steals $5.4M from victims just a week before Xmas</a> (Cointelegraph)</p><p><a href="https://www.securityweek.com/texas-tech-university-data-breach-impacts-1-4-million-people/">Texas Tech University Data Breach Impacts 1.4 Million People</a> (SecurityWeek)</p><p><a href="https://mwyr.es/CAb1ECZ2">Microsoft Teams Vishing Spreads DarkGate RAT</a> (Dark Reading)</p><p><a href="https://www.securityweek.com/man-accused-of-sql-injection-hacking-gets-69-month-prison-sentence/">Man Accused of SQL Injection Hacking Gets 69-Month Prison Sentence </a>(SecurityWeek)</p><p><a href="https://www.scimex.org/newsfeed/the-psychological-implications-of-big-brothers-gaze">The psychological implications of Big Brother’s gaze</a> (SCIMEX)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1678</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bca9f28a-b95e-11ee-8cf8-7b117debe230]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4724051193.mp3?updated=1734463650" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rhode Island cyberattack exposes sensitive data.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2210/notes</link>
      <description>A cyberattack in Rhode Island targets those who applied for government assistance programs. U.S. Senators propose a three billion dollar budget item to “rip and replace” Chinese telecom equipment. The Clop ransomware gang confirms exploiting vulnerabilities in Cleo’s managed file transfer platforms. A major Southern California healthcare provider suffers a ransomware attack. A leading US auto parts provider discloses a cyberattack on its Canadian business unit.SRP Federal Credit Union notifies over 240,000 individuals of cyberattack.  A sophisticated phishing campaign targets YouTube creators.  Researchers identify a high-severity vulnerability in Mullvad VPN. A horrific dark web forum moderator gets 30 years in prison. Our guests are Perry Carpenter and Mason Amadeus, hosts of the new FAIK Files podcast. Jailbreaking your license plate. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guests are Perry Carpenter and Mason Amadeus, hosts of The FAIK Files podcast, talking about their new show. You can find new episodes of The FAIK Files every Friday on the N2K CyberWire network. 

Selected Reading
Personal Data of Rhode Island Residents Breached in Large Cyberattack (The New York Times)
Senators, witnesses: $3B for ‘rip and replace’ a good start to preventing Salt Typhoon-style breaches ( CyberScoop)
Clop ransomware claims responsibility for Cleo data theft attacks (Bleeping Computer)
Hackers Steal 17M Patient Records in Attack on 3 Hospitals (BankInfo Security)
Major Auto Parts Firm LKQ Hit by Cyberattack (Securityweek)
SRP Federal Credit Union Ransomware Attack Impacts 240,000 (Securityweek)
ConnectOnCall Announces 914K-Record Data Breach (HIPAA Journal)
Malware Hidden in Fake Business Proposals Hits YouTube Creators (Hackread)
Critical Mullvad VPN Vulnerabilities Let Attackers Execute Malicious Code (Cyber Security News) 
Texan man gets 30 years in prison for running CSAM exchange (The Register)
Hackers Can Jailbreak Digital License Plates to Make Others Pay Their Tolls and Tickets (WIRED)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 16 Dec 2024 21:10:00 -0000</pubDate>
      <itunes:title>Rhode Island cyberattack exposes sensitive data.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2210</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A cyberattack in Rhode Island targets those who applied for government assistance programs. U.S. Senators propose a three billion dollar budget item to “rip and replace” Chinese telecom equipment. The Clop ransomware gang confirms exploiting vulnerabilities in Cleo’s managed file transfer platforms. A major Southern California healthcare provider suffers a ransomware attack. A leading US auto parts provider discloses a cyberattack on its Canadian business unit.SRP Federal Credit Union notifies over 240,000 individuals of cyberattack.  A sophisticated phishing campaign targets YouTube creators.  Researchers identify a high-severity vulnerability in Mullvad VPN. A horrific dark web forum moderator gets 30 years in prison. Our guests are Perry Carpenter and Mason Amadeus, hosts of the new FAIK Files podcast. Jailbreaking your license plate. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guests are Perry Carpenter and Mason Amadeus, hosts of The FAIK Files podcast, talking about their new show. You can find new episodes of The FAIK Files every Friday on the N2K CyberWire network. 

Selected Reading
Personal Data of Rhode Island Residents Breached in Large Cyberattack (The New York Times)
Senators, witnesses: $3B for ‘rip and replace’ a good start to preventing Salt Typhoon-style breaches ( CyberScoop)
Clop ransomware claims responsibility for Cleo data theft attacks (Bleeping Computer)
Hackers Steal 17M Patient Records in Attack on 3 Hospitals (BankInfo Security)
Major Auto Parts Firm LKQ Hit by Cyberattack (Securityweek)
SRP Federal Credit Union Ransomware Attack Impacts 240,000 (Securityweek)
ConnectOnCall Announces 914K-Record Data Breach (HIPAA Journal)
Malware Hidden in Fake Business Proposals Hits YouTube Creators (Hackread)
Critical Mullvad VPN Vulnerabilities Let Attackers Execute Malicious Code (Cyber Security News) 
Texan man gets 30 years in prison for running CSAM exchange (The Register)
Hackers Can Jailbreak Digital License Plates to Make Others Pay Their Tolls and Tickets (WIRED)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cyberattack in Rhode Island targets those who applied for government assistance programs. U.S. Senators propose a three billion dollar budget item to “rip and replace” Chinese telecom equipment. The Clop ransomware gang confirms exploiting vulnerabilities in Cleo’s managed file transfer platforms. A major Southern California healthcare provider suffers a ransomware attack. A leading US auto parts provider discloses a cyberattack on its Canadian business unit.SRP Federal Credit Union notifies over 240,000 individuals of cyberattack.  A sophisticated phishing campaign targets YouTube creators.  Researchers identify a high-severity vulnerability in Mullvad VPN. A horrific dark web forum moderator gets 30 years in prison. Our guests are Perry Carpenter and Mason Amadeus, hosts of the new FAIK Files podcast. Jailbreaking your license plate.<strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guests are <a href="https://www.linkedin.com/in/perrycarpenter">Perry Carpenter</a> and <a href="https://www.linkedin.com/in/mason-amadeus-a853a7242">Mason Amadeus</a>, hosts of <a href="https://thecyberwire.com/podcasts/the-faik-files">The FAIK Files</a> podcast, talking about their new show. You can find new episodes of The FAIK Files every Friday on the N2K CyberWire network. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.nytimes.com/2024/12/14/us/cyberattack-rhode-island-ribridges-snap-medicaid.html">Personal Data of Rhode Island Residents Breached in Large Cyberattack</a> (The New York Times)</p><p><a href="https://cyberscoop.com/senators-witnesses-3b-for-rip-and-replace-a-good-start-to-preventing-salt-typhoon-style-breaches/">Senators, witnesses: $3B for ‘rip and replace’ a good start to preventing Salt Typhoon-style breaches</a> ( CyberScoop)</p><p><a href="https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-responsibility-for-cleo-data-theft-attacks/">Clop ransomware claims responsibility for Cleo data theft attacks</a> (Bleeping Computer)</p><p><a href="https://www.bankinfosecurity.com/hackers-steal-17m-patient-records-in-attack-on-3-hospitals-a-27059">Hackers Steal 17M Patient Records in Attack on 3 Hospitals</a> (BankInfo Security)</p><p><a href="https://www.securityweek.com/major-auto-parts-firm-lkq-hit-by-cyberattack/">Major Auto Parts Firm LKQ Hit by Cyberattack</a> (Securityweek)</p><p><a href="https://www.securityweek.com/srp-federal-credit-union-ransomware-attack-impacts-240000/">SRP Federal Credit Union Ransomware Attack Impacts 240,000</a> (Securityweek)</p><p><a href="https://www.hipaajournal.com/connectoncall-data-breach/">ConnectOnCall Announces 914K-Record Data Breach</a> (HIPAA Journal)</p><p><a href="https://hackread.com/malware-fake-business-proposals-hits-youtube-creators/">Malware Hidden in Fake Business Proposals Hits YouTube Creators</a> (Hackread)</p><p><a href="https://cybersecuritynews.com/mullvad-vpn-vulnerabilities/">Critical Mullvad VPN Vulnerabilities Let Attackers Execute Malicious Code</a> (Cyber Security News) </p><p><a href="https://www.theregister.com/2024/12/13/texas_it_admin_csam/">Texan man gets 30 years in prison for running CSAM exchange</a> (The Register)</p><p><a href="https://www.wired.com/story/digital-license-plate-jailbreak-hack/">Hackers Can Jailbreak Digital License Plates to Make Others Pay Their Tolls and Tickets</a> (WIRED)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1906</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bc6cd300-b95e-11ee-8cf8-f38a5584ae48]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5328587306.mp3?updated=1734381711" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Marcelle Lee: Cyber sleuth detecting emerging threats. [Research] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/46/notes</link>
      <description>Please enjoy this encore episode of Career Notes. 
Senior security researcher from Secureworks Marcelle Lee shares her career journey into cybersecurity and how she helps solve hard problems in her daily work. Marcelle came into cybersecurity not through any traditional path. She describes her route from a different field and starting in cyber at her local community college through a grant program. Marcelle took full advantage of the opportunities she had and grew her career from there. She recommends finding your specialty, but continue to build other skills. As a woman in the field, she is a strong proponent of diversity and encouraging others to find what excites them. And, we thank Marcelle for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 15 Dec 2024 08:00:00 -0000</pubDate>
      <itunes:title>Marcelle Lee: Cyber sleuth detecting emerging threats. [Research] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>46</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/2dfc0902-b984-11ef-a105-eb04e4800fe7/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode of Career Notes. 
Senior security researcher from Secureworks Marcelle Lee shares her career journey into cybersecurity and how she helps solve hard problems in her daily work. Marcelle came into cybersecurity not through any traditional path. She describes her route from a different field and starting in cyber at her local community college through a grant program. Marcelle took full advantage of the opportunities she had and grew her career from there. She recommends finding your specialty, but continue to build other skills. As a woman in the field, she is a strong proponent of diversity and encouraging others to find what excites them. And, we thank Marcelle for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode of Career Notes. </p><p>Senior security researcher from Secureworks Marcelle Lee shares her career journey into cybersecurity and how she helps solve hard problems in her daily work. Marcelle came into cybersecurity not through any traditional path. She describes her route from a different field and starting in cyber at her local community college through a grant program. Marcelle took full advantage of the opportunities she had and grew her career from there. She recommends finding your specialty, but continue to build other skills. As a woman in the field, she is a strong proponent of diversity and encouraging others to find what excites them. And, we thank Marcelle for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>475</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2dfc0902-b984-11ef-a105-eb04e4800fe7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4659168839.mp3?updated=1734116584" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Watching the watchers. IoT vulnerabilities exposed by AI. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/357/notes</link>
      <description>This week, we are joined by Andrew Morris, Founder and CTO of GreyNoise, to discuss their work on "GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI." GreyNoise discovered two critical zero-day vulnerabilities in IoT-connected live streaming cameras, used in sensitive environments like healthcare and industrial operations, by leveraging its AI-powered detection system, Sift. 
The vulnerabilities, CVE-2024-8956 (insufficient authentication) and CVE-2024-8957 (OS command injection), could allow attackers to take full control of affected devices, manipulate video feeds, or integrate them into botnets for broader attacks. This breakthrough underscores the transformative role of AI in identifying threats that traditional systems might miss, highlighting the urgent need for robust cybersecurity measures in the expanding IoT landscape.
The research can be found here: 
GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Dec 2024 08:00:00 -0000</pubDate>
      <itunes:title>Watching the watchers. IoT vulnerabilities exposed by AI. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>357</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/61c0b032-b97d-11ef-8a26-03070123b7ec/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, we are joined by Andrew Morris, Founder and CTO of GreyNoise, to discuss their work on "GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI." GreyNoise discovered two critical zero-day vulnerabilities in IoT-connected live streaming cameras, used in sensitive environments like healthcare and industrial operations, by leveraging its AI-powered detection system, Sift. 
The vulnerabilities, CVE-2024-8956 (insufficient authentication) and CVE-2024-8957 (OS command injection), could allow attackers to take full control of affected devices, manipulate video feeds, or integrate them into botnets for broader attacks. This breakthrough underscores the transformative role of AI in identifying threats that traditional systems might miss, highlighting the urgent need for robust cybersecurity measures in the expanding IoT landscape.
The research can be found here: 
GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/andrew---morris/">Andrew Morris</a>, Founder and CTO of <a href="https://www.linkedin.com/company/greynoise/">GreyNoise</a>, to discuss their work on "GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI." GreyNoise discovered two critical zero-day vulnerabilities in IoT-connected live streaming cameras, used in sensitive environments like healthcare and industrial operations, by leveraging its AI-powered detection system, Sift. </p><p>The vulnerabilities, CVE-2024-8956 (insufficient authentication) and CVE-2024-8957 (OS command injection), could allow attackers to take full control of affected devices, manipulate video feeds, or integrate them into botnets for broader attacks. This breakthrough underscores the transformative role of AI in identifying threats that traditional systems might miss, highlighting the urgent need for robust cybersecurity measures in the expanding IoT landscape.</p><p>The research can be found here: </p><ul><li><a href="https://www.greynoise.io/blog/greynoise-intelligence-discovers-zero-day-vulnerabilities-in-live-streaming-cameras-with-the-help-of-ai">GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1095</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[61c0b032-b97d-11ef-8a26-03070123b7ec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8858455568.mp3?updated=1734113946" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hackers in handcuffs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2209/notes</link>
      <description>The U.S. dismantles the Rydox criminal marketplace.  File-sharing provider Cleo urges customers to immediately patch a critical vulnerability. A Japanese media giant reportedly paid nearly $3 million to a Russia-linked ransomware group. The largest Bitcoin ATM operator in the U.S. confirms a data breach. Microsoft quietly patches two potentially critical vulnerabilities. Researchers at Claroty describe a malware tool used by nation-state actors to target critical IoT and OT systems. Dell releases patches for a pair of critical vulnerabilities. A federal court indicts 14 North Korean nationals for a scheme funding North Korea’s weapons programs. Texas accuses a data broker of sharing sensitive driving data without consent. Tim Starks, senior reporter at CyberScoop, joins Dave to explore the FCC's groundbreaking proposal to introduce cybersecurity rules linked to wiretapping laws. How the bots stole Christmas. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Tim Starks, senior reporter at CyberScoop, joins Dave to explore the FCC's groundbreaking proposal to introduce cybersecurity rules linked to wiretapping laws. Read more about it in Tim’s article.

Selected Reading
Rydox Cybercrime Marketplace Disrupted, Administrators Arrested (SecurityWeek)
Cleo urges customers to ‘immediately’ apply new patch as researchers discover new malware (The Record)
Japanese game and anime publisher reportedly pays $3 million ransom to Russia-linked hackers (The Record)
Bitcoin ATM Giant Byte Federal Hit by Hackers, 58,000 Users Impacted (Hackread)
Microsoft Patches Vulnerabilities in Windows Defender, Update Catalog (SecurityWeek)
Researchers Discover Malware Used by Nation-Sates to Attack OT Systems (Infosecurity Magazine)
Critical Dell Security Vulnerabilities Let Attackers Compromise Affected Systems (Cyber Security News)
14 North Korean IT Workers Charged, US to Offer $5 Million Rewards for Info (Cyber Security News)
Texas adds data broker specializing in driver behavior to list of alleged privacy law violators (The Record)
UK Shoppers Frustrated as Bots Snap Up Popular Christmas Gifts (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 13 Dec 2024 21:10:00 -0000</pubDate>
      <itunes:title>Hackers in handcuffs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2209</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The U.S. dismantles the Rydox criminal marketplace.  File-sharing provider Cleo urges customers to immediately patch a critical vulnerability. A Japanese media giant reportedly paid nearly $3 million to a Russia-linked ransomware group. The largest Bitcoin ATM operator in the U.S. confirms a data breach. Microsoft quietly patches two potentially critical vulnerabilities. Researchers at Claroty describe a malware tool used by nation-state actors to target critical IoT and OT systems. Dell releases patches for a pair of critical vulnerabilities. A federal court indicts 14 North Korean nationals for a scheme funding North Korea’s weapons programs. Texas accuses a data broker of sharing sensitive driving data without consent. Tim Starks, senior reporter at CyberScoop, joins Dave to explore the FCC's groundbreaking proposal to introduce cybersecurity rules linked to wiretapping laws. How the bots stole Christmas. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Tim Starks, senior reporter at CyberScoop, joins Dave to explore the FCC's groundbreaking proposal to introduce cybersecurity rules linked to wiretapping laws. Read more about it in Tim’s article.

Selected Reading
Rydox Cybercrime Marketplace Disrupted, Administrators Arrested (SecurityWeek)
Cleo urges customers to ‘immediately’ apply new patch as researchers discover new malware (The Record)
Japanese game and anime publisher reportedly pays $3 million ransom to Russia-linked hackers (The Record)
Bitcoin ATM Giant Byte Federal Hit by Hackers, 58,000 Users Impacted (Hackread)
Microsoft Patches Vulnerabilities in Windows Defender, Update Catalog (SecurityWeek)
Researchers Discover Malware Used by Nation-Sates to Attack OT Systems (Infosecurity Magazine)
Critical Dell Security Vulnerabilities Let Attackers Compromise Affected Systems (Cyber Security News)
14 North Korean IT Workers Charged, US to Offer $5 Million Rewards for Info (Cyber Security News)
Texas adds data broker specializing in driver behavior to list of alleged privacy law violators (The Record)
UK Shoppers Frustrated as Bots Snap Up Popular Christmas Gifts (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The U.S. dismantles the Rydox criminal marketplace.  File-sharing provider Cleo urges customers to immediately patch a critical vulnerability. A Japanese media giant reportedly paid nearly $3 million to a Russia-linked ransomware group. The largest Bitcoin ATM operator in the U.S. confirms a data breach. Microsoft quietly patches two potentially critical vulnerabilities. Researchers at Claroty describe a malware tool used by nation-state actors to target critical IoT and OT systems. Dell releases patches for a pair of critical vulnerabilities. A federal court indicts 14 North Korean nationals for a scheme funding North Korea’s weapons programs. Texas accuses a data broker of sharing sensitive driving data without consent. Tim Starks, senior reporter at CyberScoop, joins Dave to explore the FCC's groundbreaking proposal to introduce cybersecurity rules linked to wiretapping laws. How the bots stole Christmas. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/tstarks/">Tim Starks</a>, senior reporter at <a href="https://cyberscoop.com/">CyberScoop</a>, joins Dave to explore the FCC's groundbreaking proposal to introduce cybersecurity rules linked to wiretapping laws. Read more about it in Tim’s <a href="https://cyberscoop.com/fcc-cybersecurity-rules-wiretapping-law-salt-typhoon/">article</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/rydox-cybercrime-marketplace-disrupted-administrators-arrested/">Rydox Cybercrime Marketplace Disrupted, Administrators Arrested</a> (SecurityWeek)</p><p><a href="https://therecord.media/cleo-urges-customers-to-immediately-patch-systems-after-exploitation">Cleo urges customers to ‘immediately’ apply new patch as researchers discover new malware</a> (The Record)</p><p><a href="https://therecord.media/kadokawa-japan-reported-ransomware-payment">Japanese game and anime publisher reportedly pays $3 million ransom to Russia-linked hackers</a> (The Record)</p><p><a href="https://hackread.com/bitcoin-atm-byte-federal-hackers-users-impacted/">Bitcoin ATM Giant Byte Federal Hit by Hackers, 58,000 Users Impacted</a> (Hackread)</p><p><a href="https://www.securityweek.com/microsoft-patches-vulnerabilities-in-windows-defender-update-catalog/">Microsoft Patches Vulnerabilities in Windows Defender, Update Catalog</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/malware-nation-sate-industrial/">Researchers Discover Malware Used by Nation-Sates to Attack OT Systems</a> (Infosecurity Magazine)</p><p><a href="https://cybersecuritynews.com/dell-vulnerabilities-alert/">Critical Dell Security Vulnerabilities Let Attackers Compromise Affected Systems</a> (Cyber Security News)</p><p><a href="https://cybersecuritynews.com/14-north-korean-it-workers-charged-us-to-offer-5-million-rewards-for-info/">14 North Korean IT Workers Charged, US to Offer $5 Million Rewards for Info</a> (Cyber Security News)</p><p><a href="https://therecord.media/arity-data-broker-texas-data-privacy-violation-notice">Texas adds data broker specializing in driver behavior to list of alleged privacy law violators</a> (The Record)</p><p><a href="https://www.infosecurity-magazine.com/news/uk-shoppers-bots-snap-up-christmas/">UK Shoppers Frustrated as Bots Snap Up Popular Christmas Gifts</a> (Infosecurity Magazine)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1564</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bc2f61c8-b95e-11ee-8cf8-fb59a3306746]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8836776539.mp3?updated=1734120716" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When AI goes offline.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2208/notes</link>
      <description>ChatGPT and Meta face widespread outages. Trump advisors explore splitting NSA and CyberCom leadership roles. A critical vulnerability in Apache Struts 2 has been disclosed. “AuthQuake” allowed attackers to bypass Microsoft MFA protections. Researchers identify Nova, a sophisticated variant of the Snake Keylogger malware. Adobe addresses critical vulnerabilities across their product line. Chinese law enforcement has been using spyware to collect data from Android devices since 2017. A new report highlights the gaps in hardware and firmware security management. A Krispy Kreme cyberattack creates a sticky situation. N2K’s Executive Editor Brandon Karpf speaks with guest Mike Silverman, Chief Strategy and Innovation Officer at the FS-ISAC discussing cryptographic agility. Do Not Track bids a fond farewell. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, N2K’s Executive Editor Brandon Karpf speaks with guest Mike Silverman, Chief Strategy and Innovation Officer at the FS-ISAC discussing cryptographic agility. You can learn more in their new white paper "Building Cryptographic Agility in the Financial Sector." We will share the extended version of this conversation over our winter break. Stay tuned. 

Selected Reading
ChatGPT Down Globally, Services Restored After Hours Of Outage (Cyber Security News)
Facebook, Instagram and other Meta apps go down due to 'technical issue' (CNBC)
Unfinished business for Trump: Ending the Cyber Command and NSA 'dual hat' (The Record)
Apache issues patches for critical Struts 2 RCE bug (The Register)
Microsoft MFA Bypassed via AuthQuake Attack (SecurityWeek)
Nova Keylogger – A Snake Malware Steal Credentials and Capture Screenshorts From Windows (Cyber Security News)
Adobe releases December 2024 patches for flaws in multiple products, including critical (Beyond Machines)
Mobile Surveillance Tool EagleMsgSpy Used by Chinese Law Enforcement (SecurityWeek)
Three-Quarters of Security Leaders Admit Gaps in Hardware Knowledge (Infosecurity Magazine)
Krispy Kreme cyberattack impacts online orders and operations (Bleeping Computer)
Firefox, one of the first “Do Not Track” supporters, no longer offers it (Ars Technica) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 12 Dec 2024 21:10:00 -0000</pubDate>
      <itunes:title>When AI goes offline.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2208</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>ChatGPT and Meta face widespread outages. Trump advisors explore splitting NSA and CyberCom leadership roles. A critical vulnerability in Apache Struts 2 has been disclosed. “AuthQuake” allowed attackers to bypass Microsoft MFA protections. Researchers identify Nova, a sophisticated variant of the Snake Keylogger malware. Adobe addresses critical vulnerabilities across their product line. Chinese law enforcement has been using spyware to collect data from Android devices since 2017. A new report highlights the gaps in hardware and firmware security management. A Krispy Kreme cyberattack creates a sticky situation. N2K’s Executive Editor Brandon Karpf speaks with guest Mike Silverman, Chief Strategy and Innovation Officer at the FS-ISAC discussing cryptographic agility. Do Not Track bids a fond farewell. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, N2K’s Executive Editor Brandon Karpf speaks with guest Mike Silverman, Chief Strategy and Innovation Officer at the FS-ISAC discussing cryptographic agility. You can learn more in their new white paper "Building Cryptographic Agility in the Financial Sector." We will share the extended version of this conversation over our winter break. Stay tuned. 

Selected Reading
ChatGPT Down Globally, Services Restored After Hours Of Outage (Cyber Security News)
Facebook, Instagram and other Meta apps go down due to 'technical issue' (CNBC)
Unfinished business for Trump: Ending the Cyber Command and NSA 'dual hat' (The Record)
Apache issues patches for critical Struts 2 RCE bug (The Register)
Microsoft MFA Bypassed via AuthQuake Attack (SecurityWeek)
Nova Keylogger – A Snake Malware Steal Credentials and Capture Screenshorts From Windows (Cyber Security News)
Adobe releases December 2024 patches for flaws in multiple products, including critical (Beyond Machines)
Mobile Surveillance Tool EagleMsgSpy Used by Chinese Law Enforcement (SecurityWeek)
Three-Quarters of Security Leaders Admit Gaps in Hardware Knowledge (Infosecurity Magazine)
Krispy Kreme cyberattack impacts online orders and operations (Bleeping Computer)
Firefox, one of the first “Do Not Track” supporters, no longer offers it (Ars Technica) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>ChatGPT and Meta face widespread outages. Trump advisors explore splitting NSA and CyberCom leadership roles. A critical vulnerability in Apache Struts 2 has been disclosed. “AuthQuake” allowed attackers to bypass Microsoft MFA protections. Researchers identify Nova, a sophisticated variant of the Snake Keylogger malware. Adobe addresses critical vulnerabilities across their product line. Chinese law enforcement has been using spyware to collect data from Android devices since 2017. A new report highlights the gaps in hardware and firmware security management. A Krispy Kreme cyberattack creates a sticky situation. N2K’s Executive Editor Brandon Karpf speaks with guest Mike Silverman, Chief Strategy and Innovation Officer at the FS-ISAC discussing cryptographic agility. Do Not Track bids a fond farewell. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today, N2K’s Executive Editor Brandon Karpf speaks with guest <a href="https://www.linkedin.com/in/mikebsilverman/">Mike Silverman</a>, Chief Strategy and Innovation Officer at the <a href="https://www.fsisac.com/">FS-ISAC</a> discussing cryptographic agility. You can learn more in their new white paper "<a href="https://www.fsisac.com/hubfs/Knowledge/PQC/BuildingCryptographicAgilityInTheFinancialSector.pdf?utm_campaign=PostQuantumCryptography&amp;utm_source=pr">Building Cryptographic Agility in the Financial Sector</a>." We will share the extended version of this conversation over our winter break. Stay tuned. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://cybersecuritynews.com/chatgpt-down-globally/">ChatGPT Down Globally, Services Restored After Hours Of Outage</a> (Cyber Security News)</p><p><a href="https://www.cnbc.com/2024/12/11/metas-facebook-instagram-go-down-due-to-technical-issue.html">Facebook, Instagram and other Meta apps go down due to 'technical issue'</a> (CNBC)</p><p><a href="https://therecord.media/cyber-command-nsa-dual-hat-trump">Unfinished business for Trump: Ending the Cyber Command and NSA 'dual hat'</a> (The Record)</p><p><a href="https://www.theregister.com/2024/12/12/apache_struts_2_vuln/">Apache issues patches for critical Struts 2 RCE bug</a> (The Register)</p><p><a href="https://www.securityweek.com/microsoft-mfa-bypassed-via-authquake-attack/">Microsoft MFA Bypassed via AuthQuake Attack</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/nova-keylogger/">Nova Keylogger – A Snake Malware Steal Credentials and Capture Screenshorts From Windows</a> (Cyber Security News)</p><p><a href="https://beyondmachines.net/event_details/adobe-releases-december-2024-patches-for-flaws-in-multiple-products-including-critical-p-1-y-b-t/gD2P6Ple2L">Adobe releases December 2024 patches for flaws in multiple products, including critical</a> (Beyond Machines)</p><p><a href="https://www.securityweek.com/mobile-surveillance-tool-eaglemsgspy-used-by-chinese-law-enforcement/">Mobile Surveillance Tool EagleMsgSpy Used by Chinese Law Enforcement</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/threequarters-security-leaders/">Three-Quarters of Security Leaders Admit Gaps in Hardware Knowledge</a> (Infosecurity Magazine)</p><p><a href="https://www.bleepingcomputer.com/news/security/krispy-kreme-cyberattack-impacts-online-orders-and-operations/">Krispy Kreme cyberattack impacts online orders and operations</a> (Bleeping Computer)</p><p><a href="https://arstechnica.com/gadgets/2024/12/firefox-one-of-the-first-do-not-track-supporters-no-longer-offers-it/">Firefox, one of the first “Do Not Track” supporters, no longer offers it</a> (Ars Technica) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1630</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bbf1ff04-b95e-11ee-8cf8-1f41154f201a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6548659815.mp3?updated=1734030751" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When exploits go wild and patches race the clock.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2207/notes</link>
      <description>Microsoft confirms a critical Windows zero-day vulnerability. Global law enforcement agencies dismantle 27 DDoS platforms. Researchers compromise memory in AMD virtual machines. Ivanti reports multiple critical vulnerabilities in its Cloud Services Application. Group-IB researchers expose a sophisticated global phishing campaign. A zero-day vulnerability in Cleo’s managed file transfer software is under active exploitation. The U.S. sanctions a Chinese firm for a 2020 firewall exploit. Congress looks to require the FCC to regulate telecom cybersecurity. Our guest is Malachi Walker, Security Strategist at DomainTools, discussing their role in ODNI's newly established Sentinel Horizon Program. SpartanWarriorz dodge a Telegram crackdown. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Malachi Walker, Security Strategist at DomainTools, about their role in ODNI's newly established Sentinel Horizon Program.

Selected Reading
New Windows 0Day Attack Confirmed—Homeland Security Says Update Now (Forbes)
Microsoft Fixes 71 CVEs Including Actively Exploited Zero-Day (Infosecurity Magazine)
Atlassian, Splunk Patch High-Severity Vulnerabilities (SecurityWeek)
Chrome Security Update, Patch for 3 High-severity Vulnerabilities (Cyber Security News)
ICS Patch Tuesday: Security Advisories Released by Siemens, Schneider, CISA, Others (SecurityWeek)
Operation PowerOFF Takes Down DDoS Boosters (Infosecurity Magazine)
AMD Chip VM Memory Protections Broken by BadRAM (Security Boulevard)
Three more vulns spotted in Ivanti CSA, all critical, one 10/10 (The Register)
Global Ongoing Phishing Campaign Targets Employees Across 12 Industries (Hackread)
New Cleo zero-day RCE flaw exploited in data theft attacks (Bleeping Computer) 
US Sanctions Chinese Firm at Center of Global Firewall Hack (Infosecurity Magazine)
Wyden legislation would mandate FCC cybersecurity rules for telecoms (CyberScoop)
Scam Kit Maker Rebuilding Business After Telegram Channel Shut Down (Security Boulevard) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 11 Dec 2024 21:10:00 -0000</pubDate>
      <itunes:title>When exploits go wild and patches race the clock.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2207</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Microsoft confirms a critical Windows zero-day vulnerability. Global law enforcement agencies dismantle 27 DDoS platforms. Researchers compromise memory in AMD virtual machines. Ivanti reports multiple critical vulnerabilities in its Cloud Services Application. Group-IB researchers expose a sophisticated global phishing campaign. A zero-day vulnerability in Cleo’s managed file transfer software is under active exploitation. The U.S. sanctions a Chinese firm for a 2020 firewall exploit. Congress looks to require the FCC to regulate telecom cybersecurity. Our guest is Malachi Walker, Security Strategist at DomainTools, discussing their role in ODNI's newly established Sentinel Horizon Program. SpartanWarriorz dodge a Telegram crackdown. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Malachi Walker, Security Strategist at DomainTools, about their role in ODNI's newly established Sentinel Horizon Program.

Selected Reading
New Windows 0Day Attack Confirmed—Homeland Security Says Update Now (Forbes)
Microsoft Fixes 71 CVEs Including Actively Exploited Zero-Day (Infosecurity Magazine)
Atlassian, Splunk Patch High-Severity Vulnerabilities (SecurityWeek)
Chrome Security Update, Patch for 3 High-severity Vulnerabilities (Cyber Security News)
ICS Patch Tuesday: Security Advisories Released by Siemens, Schneider, CISA, Others (SecurityWeek)
Operation PowerOFF Takes Down DDoS Boosters (Infosecurity Magazine)
AMD Chip VM Memory Protections Broken by BadRAM (Security Boulevard)
Three more vulns spotted in Ivanti CSA, all critical, one 10/10 (The Register)
Global Ongoing Phishing Campaign Targets Employees Across 12 Industries (Hackread)
New Cleo zero-day RCE flaw exploited in data theft attacks (Bleeping Computer) 
US Sanctions Chinese Firm at Center of Global Firewall Hack (Infosecurity Magazine)
Wyden legislation would mandate FCC cybersecurity rules for telecoms (CyberScoop)
Scam Kit Maker Rebuilding Business After Telegram Channel Shut Down (Security Boulevard) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft confirms a critical Windows zero-day vulnerability. Global law enforcement agencies dismantle 27 DDoS platforms. Researchers compromise memory in AMD virtual machines. Ivanti reports multiple critical vulnerabilities in its Cloud Services Application. Group-IB researchers expose a sophisticated global phishing campaign. A zero-day vulnerability in Cleo’s managed file transfer software is under active exploitation. The U.S. sanctions a Chinese firm for a 2020 firewall exploit. Congress looks to require the FCC to regulate telecom cybersecurity. Our guest is Malachi Walker, Security Strategist at DomainTools, discussing their role in ODNI's newly established Sentinel Horizon Program. SpartanWarriorz dodge a Telegram crackdown.<strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/malachijwalker/">Malachi Walker</a>, Security Strategist at <a href="https://www.domaintools.com/">DomainTools</a>, about their role in ODNI's newly established <a href="https://www.domaintools.com/company/press/press-releases/domaintools-selected-for-odni-sentinel-horizon-program/">Sentinel Horizon Program</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.forbes.com/sites/daveywinder/2024/12/11/new-windows-0day-attack-confirmed-homeland-security-says-update-now/">New Windows 0Day Attack Confirmed—Homeland Security Says Update Now</a> (Forbes)</p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-71-cves-actively/">Microsoft Fixes 71 CVEs Including Actively Exploited Zero-Day</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/atlassian-splunk-patch-high-severity-vulnerabilities/">Atlassian, Splunk Patch High-Severity Vulnerabilities</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/chrome-131-security-update/">Chrome Security Update, Patch for 3 High-severity Vulnerabilities</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/ics-patch-tuesday-security-advisories-released-by-siemens-schneider-cisa-others/">ICS Patch Tuesday: Security Advisories Released by Siemens, Schneider, CISA, Others</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/operation-poweroff-takes-down-ddos/">Operation PowerOFF Takes Down DDoS Boosters</a> (Infosecurity Magazine)</p><p><a href="https://securityboulevard.com/2024/12/amd-chip-vm-memory-protections-broken-by-badram/">AMD Chip VM Memory Protections Broken by BadRAM</a> (Security Boulevard)</p><p><a href="https://www.theregister.com/2024/12/11/ivanti_vulns_critical/">Three more vulns spotted in Ivanti CSA, all critical, one 10/10</a> (The Register)</p><p><a href="https://hackread.com/ongoing-phishing-campaign-targets-employees/">Global Ongoing Phishing Campaign Targets Employees Across 12 Industries</a> (Hackread)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-cleo-zero-day-rce-flaw-exploited-in-data-theft-attacks/">New Cleo zero-day RCE flaw exploited in data theft attacks</a> (Bleeping Computer) </p><p><a href="https://www.infosecurity-magazine.com/news/us-sanctions-chinese-firewall-hack/">US Sanctions Chinese Firm at Center of Global Firewall Hack</a> (Infosecurity Magazine)</p><p><a href="https://cyberscoop.com/wyden-legislation-would-mandate-fcc-cybersecurity-rules-for-telecoms/">Wyden legislation would mandate FCC cybersecurity rules for telecoms</a> (CyberScoop)</p><p><a href="https://securityboulevard.com/2024/12/scam-kit-maker-rebuilding-business-after-telegram-channel-shut-down/">Scam Kit Maker Rebuilding Business After Telegram Channel Shut Down</a> (Security Boulevard) </p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1542</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bbb3fe2a-b95e-11ee-8cf8-2348ef2f47f5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8531730924.mp3?updated=1733944441" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Buckets of trouble.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2206/notes</link>
      <description>Researchers uncover a large-scale hacking operation tied to the infamous ShinyHunters. A Dell Power Manager vulnerability lets attackers execute malicious code. TikTok requests a federal court injunction to delay a U.S. ban. Radiant Capital attributed a $50 million cryptocurrency heist to North Korea. Japanese firms report ransomware attacks affecting their U.S. subsidiaries. WhatsApp’s “ViewOnce” feature faces continued scrutiny. SpyLoan malware targets Android users through deceptive loan apps. A major Romanian electricity distributor is investigating an ongoing ransomware attack. A critical flaw in OpenWrt Sysupgrade has been fixed. Contenders for top cyber roles in the next Trump administration visit Mar-a-Lago. On our Industry Voices segment, Jason Lamar, Cobalt’s Senior Vice President of Product, joins us to share insights on offensive security: staying ahead of cyber threats. Google’s new quantum chip promises scaling without failing. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, Jason Lamar, Cobalt’s Senior Vice President of Product, joins us to share insights on offensive security: staying ahead of cyber threats. Check out Cobalt’s GigaOm Radar Report for PTaaS 2024 to learn more. 

Selected Reading
ShinyHunters, Nemesis Linked to Hacks After Leaking Their AWS S3 Bucket (Hackread)
Dell Power Manager Vulnerability Let Attackers Execute Malicious Code (Cyber Security News)
TikTok Asks Court To Suspend Ban Ahead of Supreme Court Appeal (The Information)
Radiant links $50 million crypto heist to North Korean hackers (Bleeping Computer)
US subsidiaries of Japanese water treatment company, green tea maker hit with ransomware (The Record)
WhatsApp View Once Vulnerability Let Attackers Bypass The Privacy Feature (Cyber Security News)
SpyLoan Malware: A Growing Threat to Android Users (Security Boulevard)
Romanian energy supplier Electrica hit by ransomware attack (Bleeping Computer)
OpenWrt Sysupgrade flaw let hackers push malicious firmware images (Bleeping Computer)
Homeland Security veteran to be interviewed for Trump administration cyber role (The Record)
Google claims ‘breakthrough’ with new quantum chip (Silicon Republic)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Dec 2024 21:10:00 -0000</pubDate>
      <itunes:title>Buckets of trouble.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2206</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Researchers uncover a large-scale hacking operation tied to the infamous ShinyHunters. A Dell Power Manager vulnerability lets attackers execute malicious code. TikTok requests a federal court injunction to delay a U.S. ban. Radiant Capital attributed a $50 million cryptocurrency heist to North Korea. Japanese firms report ransomware attacks affecting their U.S. subsidiaries. WhatsApp’s “ViewOnce” feature faces continued scrutiny. SpyLoan malware targets Android users through deceptive loan apps. A major Romanian electricity distributor is investigating an ongoing ransomware attack. A critical flaw in OpenWrt Sysupgrade has been fixed. Contenders for top cyber roles in the next Trump administration visit Mar-a-Lago. On our Industry Voices segment, Jason Lamar, Cobalt’s Senior Vice President of Product, joins us to share insights on offensive security: staying ahead of cyber threats. Google’s new quantum chip promises scaling without failing. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, Jason Lamar, Cobalt’s Senior Vice President of Product, joins us to share insights on offensive security: staying ahead of cyber threats. Check out Cobalt’s GigaOm Radar Report for PTaaS 2024 to learn more. 

Selected Reading
ShinyHunters, Nemesis Linked to Hacks After Leaking Their AWS S3 Bucket (Hackread)
Dell Power Manager Vulnerability Let Attackers Execute Malicious Code (Cyber Security News)
TikTok Asks Court To Suspend Ban Ahead of Supreme Court Appeal (The Information)
Radiant links $50 million crypto heist to North Korean hackers (Bleeping Computer)
US subsidiaries of Japanese water treatment company, green tea maker hit with ransomware (The Record)
WhatsApp View Once Vulnerability Let Attackers Bypass The Privacy Feature (Cyber Security News)
SpyLoan Malware: A Growing Threat to Android Users (Security Boulevard)
Romanian energy supplier Electrica hit by ransomware attack (Bleeping Computer)
OpenWrt Sysupgrade flaw let hackers push malicious firmware images (Bleeping Computer)
Homeland Security veteran to be interviewed for Trump administration cyber role (The Record)
Google claims ‘breakthrough’ with new quantum chip (Silicon Republic)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers uncover a large-scale hacking operation tied to the infamous ShinyHunters. A Dell Power Manager vulnerability lets attackers execute malicious code. TikTok requests a federal court injunction to delay a U.S. ban. Radiant Capital attributed a $50 million cryptocurrency heist to North Korea. Japanese firms report ransomware attacks affecting their U.S. subsidiaries. WhatsApp’s “ViewOnce” feature faces continued scrutiny. SpyLoan malware targets Android users through deceptive loan apps. A major Romanian electricity distributor is investigating an ongoing ransomware attack. A critical flaw in OpenWrt Sysupgrade has been fixed. Contenders for top cyber roles in the next Trump administration visit Mar-a-Lago. On our Industry Voices segment, Jason Lamar, Cobalt’s Senior Vice President of Product, joins us to share insights on offensive security: staying ahead of cyber threats. Google’s new quantum chip promises scaling without failing. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Voices segment, <a href="https://www.linkedin.com/in/jasonlamar/">Jason Lamar</a>, <a href="https://www.cobalt.io/">Cobalt</a>’s Senior Vice President of Product, joins us to share insights on offensive security: staying ahead of cyber threats. Check out Cobalt’s <a href="https://resource.cobalt.io/gigaom-ptaas-report-2024?utm_campaign=GigaOm%20Radar%20Report%202024&amp;utm_source=cyberwire&amp;utm_medium=industry%20voices&amp;utm_content=GigaOm%20Radar%20Report%202024">GigaOm Radar Report for PTaaS 2024</a> to learn more. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://hackread.com/shinyhunters-nemesis-hacks-aws-s3-bucket-leak/">ShinyHunters, Nemesis Linked to Hacks After Leaking Their AWS S3 Bucket</a> (Hackread)</p><p><a href="https://cybersecuritynews.com/dell-power-manager-code-execution-vulnerability/">Dell Power Manager Vulnerability Let Attackers Execute Malicious Code</a> (Cyber Security News)</p><p><a href="https://www.theinformation.com/briefings/tiktok-asks-court-to-suspend-ban-ahead-of-supreme-court-appeal">TikTok Asks Court To Suspend Ban Ahead of Supreme Court Appeal</a> (The Information)</p><p><a href="https://www.bleepingcomputer.com/news/security/radiant-links-50-million-crypto-heist-to-north-korean-hackers/">Radiant links $50 million crypto heist to North Korean hackers</a> (Bleeping Computer)</p><p><a href="https://therecord.media/us-subsidiaries-japanese-water-treatment">US subsidiaries of Japanese water treatment company, green tea maker hit with ransomware</a> (The Record)</p><p><a href="https://cybersecuritynews.com/whatsapp-view-once-vulnerability-bypassed/">WhatsApp View Once Vulnerability Let Attackers Bypass The Privacy Feature</a> (Cyber Security News)</p><p><a href="https://securityboulevard.com/2024/12/spyloan-malware-a-growing-threat-to-android-users/">SpyLoan Malware: A Growing Threat to Android Users</a> (Security Boulevard)</p><p><a href="https://www.bleepingcomputer.com/news/security/romanian-energy-supplier-electrica-hit-by-ransomware-attack/">Romanian energy supplier Electrica hit by ransomware attack</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/openwrt-sysupgrade-flaw-let-hackers-push-malicious-firmware-images/">OpenWrt Sysupgrade flaw let hackers push malicious firmware images</a> (Bleeping Computer)</p><p><a href="https://therecord.media/dhs-interview-brian-harrell-trump">Homeland Security veteran to be interviewed for Trump administration cyber role</a> (The Record)</p><p><a href="https://www.siliconrepublic.com/machines/google-quantum-chip-error-correction-quantum-computing">Google claims ‘breakthrough’ with new quantum chip</a> (Silicon Republic)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1880</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bb777b9e-b95e-11ee-8cf8-634e0b46c0dd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6055480381.mp3?updated=1733858694" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Router security in jeopardy.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2205/notes</link>
      <description>A critical zero-day is confirmed by a Japanese router maker. Romania annuls the first round of its 2024 presidential election over concerns of Russian interference. A sophisticated malware campaign targets macOS users. Mandiant uncovers a method to bypass browser isolation using QR codes. Belgian and Dutch authorities arrest eight individuals linked to online fraud schemes. A medical device company discloses a ransomware attack. A community hospital in Massachusetts confirms a ransomware attack affecting over three hundred thousand. The Termite ransomware gang claims responsibility for the attack on Blue Yonder. Synology patches multiple vulnerabilities in its Router Manager (SRM) software. The head of U.S. Cyber Command outlines the challenges of keeping decision makers up to date. Our guest is Anna Pobletts, Head of Passwordless at 1Password, discussing the state of passkeys and what she sees on the road to a truly passwordless future. Robot rats join the mischief. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Anna Pobletts, Head of Passwordless at 1Password, discussing the state of passkeys and what she sees on the road to a truly passwordless future. 

Selected Reading
I-O Data Confirms Zero-Day Attacks on Routers, Full Patches Pending (SecurityWeek)
Romania’s top court annuls presidential election result (CNN)
MacOS Passwords Alert—New Malware Targets Keychain, Chrome, Brave, Opera (Forbes)
QR codes bypass browser isolation for malicious C2 communication (Bleeping Computer)
Eight Suspected Phishers Arrested in Belgium, Netherlands (SecurityWeek)
Medical Device Maker Artivion Scrambling to Restore Systems After Ransomware Attack (SecurityWeek)
Anna Jaques Hospital ransomware breach exposed data of 300K patients (Bleeping Computer)
Blue Yonder SaaS giant breached by Termite ransomware gang (Bleeping Computer)
Synology Router Vulnerabilities Let Attackers Inject Arbitrary Web Script (Cyber Security News)
Cyber Command Chief Discusses Challenges of Getting Intel to Users (Defense.gov)
Robot Rodents: How AI Learned To Squeak And Play (Hackaday)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 09 Dec 2024 21:10:00 -0000</pubDate>
      <itunes:title>Router security in jeopardy.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2205</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A critical zero-day is confirmed by a Japanese router maker. Romania annuls the first round of its 2024 presidential election over concerns of Russian interference. A sophisticated malware campaign targets macOS users. Mandiant uncovers a method to bypass browser isolation using QR codes. Belgian and Dutch authorities arrest eight individuals linked to online fraud schemes. A medical device company discloses a ransomware attack. A community hospital in Massachusetts confirms a ransomware attack affecting over three hundred thousand. The Termite ransomware gang claims responsibility for the attack on Blue Yonder. Synology patches multiple vulnerabilities in its Router Manager (SRM) software. The head of U.S. Cyber Command outlines the challenges of keeping decision makers up to date. Our guest is Anna Pobletts, Head of Passwordless at 1Password, discussing the state of passkeys and what she sees on the road to a truly passwordless future. Robot rats join the mischief. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Anna Pobletts, Head of Passwordless at 1Password, discussing the state of passkeys and what she sees on the road to a truly passwordless future. 

Selected Reading
I-O Data Confirms Zero-Day Attacks on Routers, Full Patches Pending (SecurityWeek)
Romania’s top court annuls presidential election result (CNN)
MacOS Passwords Alert—New Malware Targets Keychain, Chrome, Brave, Opera (Forbes)
QR codes bypass browser isolation for malicious C2 communication (Bleeping Computer)
Eight Suspected Phishers Arrested in Belgium, Netherlands (SecurityWeek)
Medical Device Maker Artivion Scrambling to Restore Systems After Ransomware Attack (SecurityWeek)
Anna Jaques Hospital ransomware breach exposed data of 300K patients (Bleeping Computer)
Blue Yonder SaaS giant breached by Termite ransomware gang (Bleeping Computer)
Synology Router Vulnerabilities Let Attackers Inject Arbitrary Web Script (Cyber Security News)
Cyber Command Chief Discusses Challenges of Getting Intel to Users (Defense.gov)
Robot Rodents: How AI Learned To Squeak And Play (Hackaday)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A critical zero-day is confirmed by a Japanese router maker. Romania annuls the first round of its 2024 presidential election over concerns of Russian interference. A sophisticated malware campaign targets macOS users. Mandiant uncovers a method to bypass browser isolation using QR codes. Belgian and Dutch authorities arrest eight individuals linked to online fraud schemes. A medical device company discloses a ransomware attack. A community hospital in Massachusetts confirms a ransomware attack affecting over three hundred thousand. The Termite ransomware gang claims responsibility for the attack on Blue Yonder. Synology patches multiple vulnerabilities in its Router Manager (SRM) software. The head of U.S. Cyber Command outlines the challenges of keeping decision makers up to date. Our guest is Anna Pobletts, Head of Passwordless at 1Password, discussing the state of passkeys and what she sees on the road to a truly passwordless future. Robot rats join the mischief. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><h2><br></h2><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/anna-pobletts/">Anna Pobletts</a>, Head of Passwordless at <a href="https://1password.com/">1Password</a>, discussing the state of passkeys and what she sees on the <a href="https://blog.1password.com/passkeys-story-metrics/">road to a truly passwordless future</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/i-o-data-confirms-zero-day-attacks-on-routers-full-patches-pending/">I-O Data Confirms Zero-Day Attacks on Routers, Full Patches Pending</a> (SecurityWeek)</p><p><a href="https://www.cnn.com/2024/12/06/europe/romania-annuls-presidential-election-intl">Romania’s top court annuls presidential election result</a> (CNN)</p><p><a href="https://www.forbes.com/sites/daveywinder/2024/12/09/macos-passwords-alert-new-malware-targets-keychain-chrome-brave-opera/">MacOS Passwords Alert—New Malware Targets Keychain, Chrome, Brave, Opera</a> (Forbes)</p><p><a href="https://www.bleepingcomputer.com/news/security/qr-codes-bypass-browser-isolation-for-malicious-c2-communication/">QR codes bypass browser isolation for malicious C2 communication</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/eight-suspected-phishers-arrested-in-belgium-netherlands/">Eight Suspected Phishers Arrested in Belgium, Netherlands</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/medical-device-maker-artivion-scrambling-to-restore-systems-after-ransomware-attack/">Medical Device Maker Artivion Scrambling to Restore Systems After Ransomware Attack</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/anna-jaques-hospital-ransomware-breach-exposed-data-of-300k-patients">Anna Jaques Hospital ransomware breach exposed data of 300K patients</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/blue-yonder-saas-giant-breached-by-termite-ransomware-gang">Blue Yonder SaaS giant breached by Termite ransomware gang</a> (Bleeping Computer)</p><p><a href="https://cybersecuritynews.com/synology-router-vulnerabilities/">Synology Router Vulnerabilities Let Attackers Inject Arbitrary Web Script</a> (Cyber Security News)</p><p><a href="https://www.defense.gov/News/News-Stories/Article/Article/3989774/cyber-command-chief-discusses-challenges-of-getting-intel-to-users/">Cyber Command Chief Discusses Challenges of Getting Intel to Users</a> (Defense.gov)</p><p><a href="https://hackaday.com/2024/12/09/robot-rodents-how-ai-learned-to-squeak-and-play/">Robot Rodents: How AI Learned To Squeak And Play</a> (Hackaday)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1677</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bb3dbd28-b95e-11ee-8cf8-eb3f6a6990dd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1377521459.mp3?updated=1733772668" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Aviv Grafi: There needs to be fundamental changes in security. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/45/notes</link>
      <description>CEO and Founder of Votiro Aviv Grafi shares his story from serving as a member of the IDF's intelligence forces to leading his own venture. Aviv says his service in the IDF shaped a lot of his thinking and problem solving. Following his military service, Aviv worked to gain more real world and business experience. Starting his own business as a pentester was where the seeds for what would become Votiro would form. Aviv talks about the roller coaster that you experience when starting your own venture and offers some advice. And, we thank Aviv for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 08 Dec 2024 08:00:00 -0000</pubDate>
      <itunes:title>Aviv Grafi: There needs to be fundamental changes in security. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>45</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CEO and Founder of Votiro Aviv Grafi shares his story from serving as a member of the IDF's intelligence forces to leading his own venture. Aviv says his service in the IDF shaped a lot of his thinking and problem solving. Following his military service, Aviv worked to gain more real world and business experience. Starting his own business as a pentester was where the seeds for what would become Votiro would form. Aviv talks about the roller coaster that you experience when starting your own venture and offers some advice. And, we thank Aviv for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CEO and Founder of Votiro Aviv Grafi shares his story from serving as a member of the IDF's intelligence forces to leading his own venture. Aviv says his service in the IDF shaped a lot of his thinking and problem solving. Following his military service, Aviv worked to gain more real world and business experience. Starting his own business as a pentester was where the seeds for what would become Votiro would form. Aviv talks about the roller coaster that you experience when starting your own venture and offers some advice. And, we thank Aviv for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>318</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2760ec28-b3ff-11ef-9204-eb557c23d79f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9815906101.mp3?updated=1733509694" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Digital Mindhunters: a novel look at cybersecurity and artificial intelligence. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/80/notes</link>
      <description>In this special edition podcast, N2K's Executive Editor Brandon Karpf talks with author, CEO and cybersecurity advisor Dr. Bilyana Lilly about her new novel "Digital Mindhunters." 

Book Overview
In a high-stakes game of espionage and deception, a female analyst uncovers Russia's plot to wield artificial intelligence, espionage, and disinformation as weapons of chaos against the United States. As she races against time to thwart an assassination plot, she finds herself entangled in a web of international intrigue and discovers a parallel threat from a Chinese spy network aiming to steal data, manipulate American voters, and harness technology to dismantle the very foundations of U.S. democracy. In a world where lies are a weapon and trust is a luxury, she navigates the treacherous worlds of arms dealers, hackers, and spies to protect her country.

About the author
Dr. Bilyana Lilly is a cybersecurity and information warfare expert. She advises senior executives in the private and public sector on how to mitigate cybersecurity risk across their enterprises. Dr. Lilly serves on the Advisory Boards of the venture capital firm Night Dragon and the cybersecurity firm RunSafe Security. She chairs the Democratic Resilience Track of the Warsaw Security Forum and is an adjunct senior advisor for critical infrastructure and resilience at the Institute for Security and Technology. Her previous roles include a manager at Deloitte's Financial Cybersecurity Practice and a fellow at the RAND Corporation. Dr. Lilly holds a PhD in policy analysis and cyber security, and three master's degrees, including an honors degree from Oxford University. Her book "Russian Information Warfare" became a bestseller and is on display at the Pentagon. Dr. Lilly is a mentor and a speaker at RSA, DefCon, CyCon, and the Executive Women's Forum. She has been denounced by Russia's Ministry of Foreign Affairs and called cyber expert by Tom Hanks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 08 Dec 2024 07:00:00 -0000</pubDate>
      <itunes:title>Digital Mindhunters: a novel look at cybersecurity and artificial intelligence. [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>80</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/22077d54-b414-11ef-bd98-2bf8b207ba2c/image/0216c9cea15c53e5d2c739964a38623c.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this special edition podcast, N2K's Executive Editor Brandon Karpf talks with author, CEO and cybersecurity advisor Dr. Bilyana Lilly about her new novel "Digital Mindhunters." 

Book Overview
In a high-stakes game of espionage and deception, a female analyst uncovers Russia's plot to wield artificial intelligence, espionage, and disinformation as weapons of chaos against the United States. As she races against time to thwart an assassination plot, she finds herself entangled in a web of international intrigue and discovers a parallel threat from a Chinese spy network aiming to steal data, manipulate American voters, and harness technology to dismantle the very foundations of U.S. democracy. In a world where lies are a weapon and trust is a luxury, she navigates the treacherous worlds of arms dealers, hackers, and spies to protect her country.

About the author
Dr. Bilyana Lilly is a cybersecurity and information warfare expert. She advises senior executives in the private and public sector on how to mitigate cybersecurity risk across their enterprises. Dr. Lilly serves on the Advisory Boards of the venture capital firm Night Dragon and the cybersecurity firm RunSafe Security. She chairs the Democratic Resilience Track of the Warsaw Security Forum and is an adjunct senior advisor for critical infrastructure and resilience at the Institute for Security and Technology. Her previous roles include a manager at Deloitte's Financial Cybersecurity Practice and a fellow at the RAND Corporation. Dr. Lilly holds a PhD in policy analysis and cyber security, and three master's degrees, including an honors degree from Oxford University. Her book "Russian Information Warfare" became a bestseller and is on display at the Pentagon. Dr. Lilly is a mentor and a speaker at RSA, DefCon, CyCon, and the Executive Women's Forum. She has been denounced by Russia's Ministry of Foreign Affairs and called cyber expert by Tom Hanks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this special edition podcast, N2K's Executive Editor <a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a> talks with author, CEO and cybersecurity advisor <a href="https://www.linkedin.com/in/dr-bilyana-lilly-983b8119/">Dr. Bilyana Lilly</a> about her new novel "<a href="https://a.co/d/9f7atHY">Digital Mindhunters</a>." </p><p><br></p><h3>Book Overview</h3><p>In a high-stakes game of espionage and deception, a female analyst uncovers Russia's plot to wield artificial intelligence, espionage, and disinformation as weapons of chaos against the United States. As she races against time to thwart an assassination plot, she finds herself entangled in a web of international intrigue and discovers a parallel threat from a Chinese spy network aiming to steal data, manipulate American voters, and harness technology to dismantle the very foundations of U.S. democracy. In a world where lies are a weapon and trust is a luxury, she navigates the treacherous worlds of arms dealers, hackers, and spies to protect her country.</p><p><br></p><h3>About the author</h3><p>Dr. Bilyana Lilly is a cybersecurity and information warfare expert. She advises senior executives in the private and public sector on how to mitigate cybersecurity risk across their enterprises. Dr. Lilly serves on the Advisory Boards of the venture capital firm Night Dragon and the cybersecurity firm RunSafe Security. She chairs the Democratic Resilience Track of the Warsaw Security Forum and is an adjunct senior advisor for critical infrastructure and resilience at the Institute for Security and Technology. Her previous roles include a manager at Deloitte's Financial Cybersecurity Practice and a fellow at the RAND Corporation. Dr. Lilly holds a PhD in policy analysis and cyber security, and three master's degrees, including an honors degree from Oxford University. Her book "Russian Information Warfare" became a bestseller and is on display at the Pentagon. Dr. Lilly is a mentor and a speaker at RSA, DefCon, CyCon, and the Executive Women's Forum. She has been denounced by Russia's Ministry of Foreign Affairs and called cyber expert by Tom Hanks.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2557</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[22077d54-b414-11ef-bd98-2bf8b207ba2c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4043065388.mp3?updated=1733520168" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The JPHP loader breaking away from the pack. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/356/notes</link>
      <description>Shawn Kanady, Global Director of Trustwave SpiderLabs, to discuss their work on "Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader." Trustwave SpiderLabs has uncovered Pronsis Loader, a new malware variant using the rare programming language JPHP and stealthy installation tactics to evade detection. 
The malware is capable of delivering high-risk payloads like Lumma Stealer and Latrodectus, posing a significant threat. Researchers highlight its unique capabilities and infrastructure, offering insights for bolstering cybersecurity defenses.
The research can be found here: 
Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Dec 2024 08:00:00 -0000</pubDate>
      <itunes:title>The JPHP loader breaking away from the pack. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>356</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Shawn Kanady, Global Director of Trustwave SpiderLabs, to discuss their work on "Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader." Trustwave SpiderLabs has uncovered Pronsis Loader, a new malware variant using the rare programming language JPHP and stealthy installation tactics to evade detection. 
The malware is capable of delivering high-risk payloads like Lumma Stealer and Latrodectus, posing a significant threat. Researchers highlight its unique capabilities and infrastructure, offering insights for bolstering cybersecurity defenses.
The research can be found here: 
Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/shawn-kanady/">Shawn Kanady</a>, Global Director of <a href="https://www.linkedin.com/company/trustwave/">Trustwave</a> SpiderLabs, to discuss their work on "Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader." Trustwave SpiderLabs has uncovered Pronsis Loader, a new malware variant using the rare programming language JPHP and stealthy installation tactics to evade detection. </p><p>The malware is capable of delivering high-risk payloads like Lumma Stealer and Latrodectus, posing a significant threat. Researchers highlight its unique capabilities and infrastructure, offering insights for bolstering cybersecurity defenses.</p><p>The research can be found here: </p><ul><li><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/pronsis-loader-a-jphp-driven-malware-diverging-from-d3fck-loader/">Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1372</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[540a7978-b3e2-11ef-adfe-d32502c431ec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4969659884.mp3?updated=1733497529" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The NTLM bug that sees and steals.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2204/notes</link>
      <description>Researchers uncover a critical Windows zero-day.  An alleged Ukrainian cyberattack targets one of Russia’s largest banks. Russian group BlueAlpha exploits CloudFlare services. Microsoft flags Chinese hacking group Storm-0227 for targeting critical infrastructure and U.S. government agencies. SonicWall patches high-severity vulnerabilities in its secure access gateway. Atrium Health reports a data breach affecting over half a million individuals. Rockwell Automation discloses four critical vulnerabilities in its Arena software. U.S. authorities arrest an alleged member of the Scattered Spider gang. Our guest is Hugh Thompson, RSAC program committee chair, discussing the 2025 Innovation Sandbox Contest and its new investment component. C3PO gets caught in the crypto mines. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Joining Dave today is Hugh Thompson, RSAC program committee chair, discussing the 2025 Innovation Sandbox Contest and its new investment component. Read more details in the press release. 

Selected Reading
New Windows 7 To 11 Warning As Zero-Day With No Official Fix Confirmed (Forbes)
Russian users report Gazprombank outages amid alleged Ukrainian cyberattack (The Record)
BlueAlpha Russian hackers caught abusing CloudFlare services (SC Media)
U.S. org suffered four month intrusion by Chinese hackers (Bleeping Computer)
Microsoft: Another Chinese cyberspy crew targeting US critical orgs 'as of yesterday' (The Register)
SonicWall Patches 6 Vulnerabilities in Secure Access Gateway (SecurityWeek)
Mitel MiCollab zero-day and PoC exploit unveiled (Help Net Security)
Atrium Health Data Breach Impacts 585,000 People (SecurityWeek)
Rockwell Automation Vulnerabilities Let Attackers Execute Remote Code (Cyber Security News)
US arrests Scattered Spider suspect linked to telecom hacks  (Bleeping Computer)
Nebraska Man pleads guilty to $3.5 million cryptojacking scheme (Bleeping Computer)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 06 Dec 2024 21:10:00 -0000</pubDate>
      <itunes:title>The NTLM bug that sees and steals.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2204</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Researchers uncover a critical Windows zero-day.  An alleged Ukrainian cyberattack targets one of Russia’s largest banks. Russian group BlueAlpha exploits CloudFlare services. Microsoft flags Chinese hacking group Storm-0227 for targeting critical infrastructure and U.S. government agencies. SonicWall patches high-severity vulnerabilities in its secure access gateway. Atrium Health reports a data breach affecting over half a million individuals. Rockwell Automation discloses four critical vulnerabilities in its Arena software. U.S. authorities arrest an alleged member of the Scattered Spider gang. Our guest is Hugh Thompson, RSAC program committee chair, discussing the 2025 Innovation Sandbox Contest and its new investment component. C3PO gets caught in the crypto mines. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Joining Dave today is Hugh Thompson, RSAC program committee chair, discussing the 2025 Innovation Sandbox Contest and its new investment component. Read more details in the press release. 

Selected Reading
New Windows 7 To 11 Warning As Zero-Day With No Official Fix Confirmed (Forbes)
Russian users report Gazprombank outages amid alleged Ukrainian cyberattack (The Record)
BlueAlpha Russian hackers caught abusing CloudFlare services (SC Media)
U.S. org suffered four month intrusion by Chinese hackers (Bleeping Computer)
Microsoft: Another Chinese cyberspy crew targeting US critical orgs 'as of yesterday' (The Register)
SonicWall Patches 6 Vulnerabilities in Secure Access Gateway (SecurityWeek)
Mitel MiCollab zero-day and PoC exploit unveiled (Help Net Security)
Atrium Health Data Breach Impacts 585,000 People (SecurityWeek)
Rockwell Automation Vulnerabilities Let Attackers Execute Remote Code (Cyber Security News)
US arrests Scattered Spider suspect linked to telecom hacks  (Bleeping Computer)
Nebraska Man pleads guilty to $3.5 million cryptojacking scheme (Bleeping Computer)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers uncover a critical Windows zero-day.  An alleged Ukrainian cyberattack targets one of Russia’s largest banks. Russian group BlueAlpha exploits CloudFlare services. Microsoft flags Chinese hacking group Storm-0227 for targeting critical infrastructure and U.S. government agencies. SonicWall patches high-severity vulnerabilities in its secure access gateway. Atrium Health reports a data breach affecting over half a million individuals. Rockwell Automation discloses four critical vulnerabilities in its Arena software. U.S. authorities arrest an alleged member of the Scattered Spider gang. Our guest is Hugh Thompson, RSAC program committee chair, discussing the 2025 Innovation Sandbox Contest and its new investment component. C3PO gets caught in the crypto mines. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Joining Dave today is <a href="https://www.linkedin.com/in/hugh-thompson-ph-d-3b51bb2/">Hugh Thompson</a>, RSAC program committee chair, discussing the 2025 <a href="https://www.rsaconference.com/rsac-programs/innovation/innovation-sandbox">Innovation Sandbox Contest</a> and its new investment component. Read more details in the <a href="https://www.prnewswire.com/news-releases/rsa-conference-2025-innovation-sandbox-contest-celebrates-20th-anniversary-introduces-50-million-annual-investment-program-for-top-10-finalists-302312129.html">press release</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.forbes.com/sites/daveywinder/2024/12/06/new-windows-7-to-11-warning-as-zero-day-with-no-official-fix-strikes/">New Windows 7 To 11 Warning As Zero-Day With No Official Fix Confirmed</a> (Forbes)</p><p><a href="https://therecord.media/gazprombank-outages-russia-ukraine-claims-cyberattack">Russian users report Gazprombank outages amid alleged Ukrainian cyberattack</a> (The Record)</p><p><a href="https://www.scworld.com/news/bluealpha-russian-hackers-caught-abusing-cloudflare-services">BlueAlpha Russian hackers caught abusing CloudFlare services</a> (SC Media)</p><p><a href="https://www.bleepingcomputer.com/news/security/us-org-suffered-four-month-intrusion-by-chinese-hackers/">U.S. org suffered four month intrusion by Chinese hackers</a> (Bleeping Computer)</p><p><a href="https://www.theregister.com/2024/12/06/chinese_cyberspy_us_data/">Microsoft: Another Chinese cyberspy crew targeting US critical orgs 'as of yesterday'</a> (The Register)</p><p><a href="https://www.securityweek.com/sonicwall-patches-6-vulnerabilities-in-secure-access-gateway/">SonicWall Patches 6 Vulnerabilities in Secure Access Gateway</a> (SecurityWeek)</p><p><a href="https://www.helpnetsecurity.com/2024/12/05/mitel-micollab-zero-day-and-poc-exploit-unveiled/">Mitel MiCollab zero-day and PoC exploit unveiled</a> (Help Net Security)</p><p><a href="https://www.securityweek.com/atrium-health-data-breach-impacts-585000-people/">Atrium Health Data Breach Impacts 585,000 People</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/rockwell-automation-vulnerabilities/">Rockwell Automation Vulnerabilities Let Attackers Execute Remote Code</a> (Cyber Security News)</p><p><a href="https://www.bleepingcomputer.com/news/security/us-arrests-scattered-spider-suspect-linked-to-telecom-hacks/">US arrests Scattered Spider suspect linked to telecom hacks</a>  (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/nebraska-man-pleads-guilty-to-35-million-cryptojacking-scheme/">Nebraska Man pleads guilty to $3.5 million cryptojacking scheme</a> (Bleeping Computer)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1691</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bb05fcee-b95e-11ee-8cf8-d3acfc1569d4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3549194788.mp3?updated=1733515177" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dismantling the Manson cybercrime market. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2203/notes</link>
      <description>Europol dismantles the Manson cybercrime market. Operation Destabilise stops two major Russian-speaking money laundering networks. New details emerge on China’s attacks on U.S. telecoms. Black Lotus Labs uncovers a covert campaign by the Russian-based threat actor “Secret Blizzard”. Cisco issues patches for a high impact bootloader vulnerability. Trend Micro researchers uncovered Earth Minotaur targeting Tibetan and Uyghur communities. Payroll Pirates target HR payroll systems to redirect employee funds .Pegasus spyware may be more prevalent than previously believed. Our guest today is Jon France, CISO at ISC2, with insights from the ISC2 2024 Workforce Study. How businesses can lose customers one tip at a time. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest today is Jon France, CISO at ISC2, sharing the ISC2 2024 Workforce Study. You can read the press release about the report here and dig into the details of the report itself here. 

Selected Reading
50 Servers Linked to Cybercrime Marketplace and Phishing Sites Seized by Law Enforcement (SecurityWeek)
UK’s NCA Disrupts Multibillion-Dollar Russian Money Launderers (Infosecurity Magazine)
The White House reveals at least 8 U.S. telecom firms impacted by China’s Salt Typhoon cyberattack (Fast Company)
Senators implore Department of Defense to expand the use of Matrix (Element)
Snowblind: The Invisible Hand of Secret Blizzard (Lumen)
Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage (Microsoft Security)
Russian Hackers Exploit Rival Attackers’ Infrastructure for Espionage (Infosecurity Magazine)
Bootloader Vulnerability Impacts Over 100 Cisco Switches (SecurityWeek)
MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks (Trend Micro)
Hunting Payroll Pirates: Silent Push Tracks HR Redirect Phishing Scam (Silent Push)
iVerify Mobile Threat Investigation Uncovers New Pegasus Samples (iVerify)
How a Russian man’s harrowing tale shows the physical dangers of spyware (CyberScoop)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 05 Dec 2024 20:00:00 -0000</pubDate>
      <itunes:title>Dismantling the Manson cybercrime market. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2203</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Europol dismantles the Manson cybercrime market. Operation Destabilise stops two major Russian-speaking money laundering networks. New details emerge on China’s attacks on U.S. telecoms. Black Lotus Labs uncovers a covert campaign by the Russian-based threat actor “Secret Blizzard”. Cisco issues patches for a high impact bootloader vulnerability. Trend Micro researchers uncovered Earth Minotaur targeting Tibetan and Uyghur communities. Payroll Pirates target HR payroll systems to redirect employee funds .Pegasus spyware may be more prevalent than previously believed. Our guest today is Jon France, CISO at ISC2, with insights from the ISC2 2024 Workforce Study. How businesses can lose customers one tip at a time. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest today is Jon France, CISO at ISC2, sharing the ISC2 2024 Workforce Study. You can read the press release about the report here and dig into the details of the report itself here. 

Selected Reading
50 Servers Linked to Cybercrime Marketplace and Phishing Sites Seized by Law Enforcement (SecurityWeek)
UK’s NCA Disrupts Multibillion-Dollar Russian Money Launderers (Infosecurity Magazine)
The White House reveals at least 8 U.S. telecom firms impacted by China’s Salt Typhoon cyberattack (Fast Company)
Senators implore Department of Defense to expand the use of Matrix (Element)
Snowblind: The Invisible Hand of Secret Blizzard (Lumen)
Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage (Microsoft Security)
Russian Hackers Exploit Rival Attackers’ Infrastructure for Espionage (Infosecurity Magazine)
Bootloader Vulnerability Impacts Over 100 Cisco Switches (SecurityWeek)
MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks (Trend Micro)
Hunting Payroll Pirates: Silent Push Tracks HR Redirect Phishing Scam (Silent Push)
iVerify Mobile Threat Investigation Uncovers New Pegasus Samples (iVerify)
How a Russian man’s harrowing tale shows the physical dangers of spyware (CyberScoop)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Europol dismantles the Manson cybercrime market. Operation Destabilise stops two major Russian-speaking money laundering networks. New details emerge on China’s attacks on U.S. telecoms. Black Lotus Labs uncovers a covert campaign by the Russian-based threat actor “Secret Blizzard”. Cisco issues patches for a high impact bootloader vulnerability. Trend Micro researchers uncovered Earth Minotaur targeting Tibetan and Uyghur communities. Payroll Pirates target HR payroll systems to redirect employee funds .Pegasus spyware may be more prevalent than previously believed. Our guest today is Jon France, CISO at ISC2, with insights from the ISC2 2024 Workforce Study. How businesses can lose customers one tip at a time. </p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p><br></p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest today is <a href="https://www.linkedin.com/in/jonfrance/">Jon France</a>, CISO at <a href="https://www.isc2.org/">ISC2</a>, sharing the ISC2 2024 Workforce Study. You can read the press release about the report <a href="https://www.prnewswire.com/news-releases/latest-isc2-study-finds-that-ai-viewed-as-catalyst-for-career-growth-stronger-security-despite-slowing-growth-in-cybersecurity-workforce-302292100.html?tc=eml_cleartime">here</a> and dig into the details of the report itself <a href="https://www.isc2.org/Insights/2024/10/ISC2-2024-Cybersecurity-Workforce-Study">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/50-servers-linked-to-cybercrime-marketplace-and-phishing-sites-seized-by-law-enforcement/">50 Servers Linked to Cybercrime Marketplace and Phishing Sites Seized by Law Enforcement</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/nca-multibilliondollar-russian/">UK’s NCA Disrupts Multibillion-Dollar Russian Money Launderers</a> (Infosecurity Magazine)</p><p><a href="https://www.fastcompany.com/91241070/white-house-reveals-least-8-u-s-telecom-firms-impacted-chinas-salt-typhoon-cyberattack">The White House reveals at least 8 U.S. telecom firms impacted by China’s Salt Typhoon cyberattack</a> (Fast Company)</p><p><a href="https://element.io/blog/senators-implore-department-of-defense-to-expand-the-use-of-matrix/">Senators implore Department of Defense to expand the use of Matrix</a> (Element)</p><p><a href="https://blog.lumen.com/snowblind-the-invisible-hand-of-secret-blizzard/">Snowblind: The Invisible Hand of Secret Blizzard</a> (Lumen)</p><p><a href="https://www.microsoft.com/en-us/security/blog/2024/12/04/frequent-freeloader-part-i-secret-blizzard-compromising-storm-0156-infrastructure-for-espionage/">Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage</a> (Microsoft Security)</p><p><a href="https://www.infosecurity-magazine.com/news/russia-hackers-exploit-rival/">Russian Hackers Exploit Rival Attackers’ Infrastructure for Espionage</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/bootloader-vulnerability-impacts-over-100-cisco-switches/">Bootloader Vulnerability Impacts Over 100 Cisco Switches</a> (SecurityWeek)</p><p><a href="https://www.trendmicro.com/en_us/research/24/l/earth-minotaur.html">MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks</a> (Trend Micro)</p><p><a href="https://www.silentpush.com/blog/payroll-pirates/">Hunting Payroll Pirates: Silent Push Tracks HR Redirect Phishing Scam</a> (Silent Push)</p><p><a href="https://iverify.io/blog/iverify-mobile-threat-investigation-uncovers-new-pegasus-samples">iVerify Mobile Threat Investigation Uncovers New Pegasus Samples</a> (iVerify)</p><p><a href="https://cyberscoop.com/russian-surveillance-spyware-threat-citizen-lab/">How a Russian man’s harrowing tale shows the physical dangers of spyware</a> (CyberScoop)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1775</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bacde4ee-b95e-11ee-8cf8-f786a63c60fc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3701509355.mp3?updated=1733427238" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The end of MATRIX.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2202/notes</link>
      <description>International law enforcement takes down the MATRIX messaging platform. SailPoint discloses a critical vulnerability in its IdentityIQ platform. A Solana library has been backdoored. SolarWinds discloses a critical vulnerability in its Platform product. Researchers identify 16 zero-day vulnerabilities in Fuji Electric’s remote monitoring software. Cisco urges users to patch a decade-old vulnerability. CISA warns of active exploitation of Zyxel firewall devices. A critical XSS vulnerability has been identified in MobSF. Google’s December 2024 Android security update addresses 14 high-severity vulnerabilities. The Federal Trade Commission settles with data brokers over alleged consent violations. On today’s CertByte segment, Chris Hare and Dan Neville break down a question targeting the A+ Core (220-1101) Exam 1 certification. A vodka company gets iced by ransomware.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from N2K’s suite of industry-leading certification resources, and a study tip to help you achieve the professional certifications you need to fast-track your career growth in IT, cyber security, or project management.
This week, Chris is joined by Dan Neville breaking down a question targeting the A+ Core (220-1101) Exam 1 certification. Today’s question comes from N2K’s CompTIA® A+ Core Exam 1 Practice Test (Core Exam 2 Practice Test is also available on our site).
Have a question that you’d like to see covered? Email us at certbyte@n2k.com. Check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. 
Please note: The questions and answers provided here and on our site are not actual current or prior questions and answers from these certification publishers or providers.
Additional sources: www.comptia.org

Selected Reading
International Operation Dismantles MATRIX: A Sophisticated Encrypted Messaging Service (SOCRadar)
German Police Shutter Country’s Largest Dark Web Market (Infosecurity Magazine)
10/10 directory traversal bug hits SailPoint's IdentityIQ (The Register)
Solana Web3.js Library Backdoored in Supply Chain Attack (SecurityWeek)
SolarWinds Platform XSS Vulnerability Let Attackers Inject Malicious Code (Cyber Security News)
16 Zero-Days Uncovered in Fuji Electric Monitoring Software (GovInfo Security)
Cisco Urges Immediate Patch for Decade-Old WebVPN Vulnerability (Hackread)
VulnerabilitiesCISA Warns of Zyxel Firewall Vulnerability Exploited in Attacks (SecurityWeek)
U.S. CISA adds ProjectSend, North Grid Proself, and Zyxel firewalls bugs to its Known Exploited Vulnerabilities catalog (SecurityAffairs)
MobSF XSS Vulnerability Let Attackers Inject Malicious Scripts (GB Hacker)
Android's December 2024 Security Update Patches 14 Vulnerabilities (SecurityWeek)
FTC accuses data brokers of improperly selling location info (The Register)
Vodka Giant Stoli Files for Bankruptcy After Ransomware Attack (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 04 Dec 2024 21:10:00 -0000</pubDate>
      <itunes:title>The end of MATRIX.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2202</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>International law enforcement takes down the MATRIX messaging platform. SailPoint discloses a critical vulnerability in its IdentityIQ platform. A Solana library has been backdoored. SolarWinds discloses a critical vulnerability in its Platform product. Researchers identify 16 zero-day vulnerabilities in Fuji Electric’s remote monitoring software. Cisco urges users to patch a decade-old vulnerability. CISA warns of active exploitation of Zyxel firewall devices. A critical XSS vulnerability has been identified in MobSF. Google’s December 2024 Android security update addresses 14 high-severity vulnerabilities. The Federal Trade Commission settles with data brokers over alleged consent violations. On today’s CertByte segment, Chris Hare and Dan Neville break down a question targeting the A+ Core (220-1101) Exam 1 certification. A vodka company gets iced by ransomware.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from N2K’s suite of industry-leading certification resources, and a study tip to help you achieve the professional certifications you need to fast-track your career growth in IT, cyber security, or project management.
This week, Chris is joined by Dan Neville breaking down a question targeting the A+ Core (220-1101) Exam 1 certification. Today’s question comes from N2K’s CompTIA® A+ Core Exam 1 Practice Test (Core Exam 2 Practice Test is also available on our site).
Have a question that you’d like to see covered? Email us at certbyte@n2k.com. Check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. 
Please note: The questions and answers provided here and on our site are not actual current or prior questions and answers from these certification publishers or providers.
Additional sources: www.comptia.org

Selected Reading
International Operation Dismantles MATRIX: A Sophisticated Encrypted Messaging Service (SOCRadar)
German Police Shutter Country’s Largest Dark Web Market (Infosecurity Magazine)
10/10 directory traversal bug hits SailPoint's IdentityIQ (The Register)
Solana Web3.js Library Backdoored in Supply Chain Attack (SecurityWeek)
SolarWinds Platform XSS Vulnerability Let Attackers Inject Malicious Code (Cyber Security News)
16 Zero-Days Uncovered in Fuji Electric Monitoring Software (GovInfo Security)
Cisco Urges Immediate Patch for Decade-Old WebVPN Vulnerability (Hackread)
VulnerabilitiesCISA Warns of Zyxel Firewall Vulnerability Exploited in Attacks (SecurityWeek)
U.S. CISA adds ProjectSend, North Grid Proself, and Zyxel firewalls bugs to its Known Exploited Vulnerabilities catalog (SecurityAffairs)
MobSF XSS Vulnerability Let Attackers Inject Malicious Scripts (GB Hacker)
Android's December 2024 Security Update Patches 14 Vulnerabilities (SecurityWeek)
FTC accuses data brokers of improperly selling location info (The Register)
Vodka Giant Stoli Files for Bankruptcy After Ransomware Attack (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>International law enforcement takes down the MATRIX messaging platform. SailPoint discloses a critical vulnerability in its IdentityIQ platform. A Solana library has been backdoored. SolarWinds discloses a critical vulnerability in its Platform product. Researchers identify 16 zero-day vulnerabilities in Fuji Electric’s remote monitoring software. Cisco urges users to patch a decade-old vulnerability. CISA warns of active exploitation of Zyxel firewall devices. A critical XSS vulnerability has been identified in MobSF. Google’s December 2024 Android security update addresses 14 high-severity vulnerabilities. The Federal Trade Commission settles with data brokers over alleged consent violations. On today’s CertByte segment, Chris Hare and Dan Neville break down a question targeting the A+ Core (220-1101) Exam 1 certification. A vodka company gets iced by ransomware.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CertByte Segment</h2><p>Welcome to CertByte! On this bi-weekly segment hosted by<a href="https://www.linkedin.com/in/chrisharepmp/"> </a><a href="https://www.linkedin.com/in/chrisharepmp/">Chris Hare</a>, a content developer and project management specialist at<a href="https://www.n2k.com/"> </a><a href="https://www.n2k.com/">N2K</a>, we share practice questions from N2K’s suite of industry-leading certification resources, and a study tip to help you achieve the professional certifications you need to fast-track your career growth in IT, cyber security, or project management.</p><p>This week, Chris is joined by<a href="https://www.linkedin.com/in/danneville1/"> </a><a href="https://www.linkedin.com/in/danneville1/">Dan Neville</a> breaking down a question targeting the A+ Core (220-1101) Exam 1 certification. Today’s question comes from<a href="https://certify.cybervista.net/products/comptia/a-core-exam-1-practice-test/"> </a><a href="https://certify.cybervista.net/products/comptia/a-core-exam-1-practice-test/">N2K’s CompTIA® A+ Core Exam 1 Practice Test</a> (<a href="https://certify.cybervista.net/products/comptia/a-core-exam-2-practice-test/">Core Exam 2 Practice Test</a> is also available on our site).</p><p>Have a question that you’d like to see covered? Email us at certbyte@n2k.com. Check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. </p><p><em>Please note: The questions and answers provided here and on our site are not actual current or prior questions and answers from these certification publishers or providers.</em></p><p>Additional sources:<a href="http://www.comptia.org/"> </a><a href="http://www.comptia.org">www.comptia.org</a></p><p><br></p><h2>Selected Reading</h2><p><a href="https://socradar.io/international-operation-dismantles-matrix-a-sophisticated-encrypted-messaging-service/">International Operation Dismantles MATRIX: A Sophisticated Encrypted Messaging Service</a> (SOCRadar)</p><p><a href="https://www.infosecurity-magazine.com/news/german-police-shutter-largest-dark/">German Police Shutter Country’s Largest Dark Web Market</a> (Infosecurity Magazine)</p><p><a href="https://www.theregister.com/2024/12/03/sailpoint_identityiq_vulnerability/">10/10 directory traversal bug hits SailPoint's IdentityIQ</a> (The Register)</p><p><a href="https://www.securityweek.com/solana-web3-js-library-backdoored-in-supply-chain-attack/">Solana Web3.js Library Backdoored in Supply Chain Attack</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/solarwinds-platform-xss-vulnerability/">SolarWinds Platform XSS Vulnerability Let Attackers Inject Malicious Code</a> (Cyber Security News)</p><p><a href="https://www.govinfosecurity.com/16-zero-days-uncovered-in-fuji-electric-monitoring-software-a-26962">16 Zero-Days Uncovered in Fuji Electric Monitoring Software</a> (GovInfo Security)</p><p><a href="https://hackread.com/cisco-patch-decade-old-webvpn-vulnerability/">Cisco Urges Immediate Patch for Decade-Old WebVPN Vulnerability</a> (Hackread)</p><p><a href="https://www.securityweek.com/cisa-warns-of-zyxel-firewall-vulnerability-exploited-in-attacks/">VulnerabilitiesCISA Warns of Zyxel Firewall Vulnerability Exploited in Attacks</a> (SecurityWeek)</p><p><a href="https://securityaffairs.com/171638/security/u-s-cisa-adds-projectsend-north-grid-proself-and-zyxel-firewalls-bugs-to-its-known-exploited-vulnerabilities-catalog.html">U.S. CISA adds ProjectSend, North Grid Proself, and Zyxel firewalls bugs to its Known Exploited Vulnerabilities catalog</a> (SecurityAffairs)</p><p><a href="https://gbhackers.com/mobsf-xss-vulnerability/">MobSF XSS Vulnerability Let Attackers Inject Malicious Scripts</a> (GB Hacker)</p><p><a href="https://www.securityweek.com/androids-december-2024-security-update-patches-14-vulnerabilities/">Android's December 2024 Security Update Patches 14 Vulnerabilities</a> (SecurityWeek)</p><p><a href="https://www.theregister.com/2024/12/04/ftc_data_brokers/">FTC accuses data brokers of improperly selling location info</a> (The Register)</p><p><a href="https://www.infosecurity-magazine.com/news/vodka-stoli-bankruptcy-ransomware/">Vodka Giant Stoli Files for Bankruptcy After Ransomware Attack</a> (Infosecurity Magazine)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1677</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ba9642aa-b95e-11ee-8cf8-b34a86f0638b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6567036634.mp3?updated=1733341968" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Nam3l3ss but not harmless.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2201/notes</link>
      <description>More than 760,000 see their personal data exposed on the BreachForums cybercrime forum. The new head of the UK’s NCSC warns against underestimating growing cyber threats. The Consumer Financial Protection Bureau (CFPB) looks to prevent data brokers from selling Americans’ personal and financial information. A U.S. government and energy sector contractor discloses a ransomware attack. The “smoked ham” Windows backdoor is being actively deployed. A new report warns of overreliance on Chinese-made LIDAR technology. SmokeLoader malware targets companies in Taiwan. NIST proposes new password guidelines. South Korean police make arrests over 240,000 satellite receivers with built-in DDoS attack capabilities. On our Threat Vector segment, we preview this week’s episode where host David Moulton goes Behind the Scenes with Palo Alto Networks CIO and CISO. ChatGPT has a Voldemort moment. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
On our Threat Vector segment, we preview this week’s episode where host David Moulton goes “Behind the Scenes with Palo Alto Networks CIO and CISO Securing Business Success with Frictionless Cybersecurity.” Meerah Rajavel, CIO of Palo Alto Networks, and Niall Browne, CISO of the organization, join David to discuss the importance of aligning IT strategy with cybersecurity. You can catch new episodes of Threat Vector every Thursday here and on your favorite podcast app. 

Selected Reading
760,000 Employee Records From Several Major Firms Leaked Online (SecurityWeek)
UK cyber chief warns country is ‘widely underestimating’ risks from cyberattacks (The Record)
US agency proposes new rule blocking data brokers from selling Americans' sensitive personal data (TechCrunch)
US government contractor ENGlobal says operations are ‘limited’ following cyberattack (TechCrunch)
New Windows Backdoor Security Warning For Bing, Dropbox, Google Users (Forbes)
Chinese LIDAR Dominance a Cybersecurity Threat, Warns Think Tank (Infosecurity Magazine)
SmokeLoader Attack Targets Companies in Taiwan (FortiGuard Labs) 
Korea arrests CEO for adding DDoS feature to satellite receivers (Bleeping Computer)
Do Your Passwords Meet the Proposed New Federal Guidelines? (Wall Street Journal)
These names cause ChatGPT to break, and it's due to AI hallucinations ( TechSpot)  

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Dec 2024 21:10:00 -0000</pubDate>
      <itunes:title>Nam3l3ss but not harmless.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2201</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>More than 760,000 see their personal data exposed on the BreachForums cybercrime forum. The new head of the UK’s NCSC warns against underestimating growing cyber threats. The Consumer Financial Protection Bureau (CFPB) looks to prevent data brokers from selling Americans’ personal and financial information. A U.S. government and energy sector contractor discloses a ransomware attack. The “smoked ham” Windows backdoor is being actively deployed. A new report warns of overreliance on Chinese-made LIDAR technology. SmokeLoader malware targets companies in Taiwan. NIST proposes new password guidelines. South Korean police make arrests over 240,000 satellite receivers with built-in DDoS attack capabilities. On our Threat Vector segment, we preview this week’s episode where host David Moulton goes Behind the Scenes with Palo Alto Networks CIO and CISO. ChatGPT has a Voldemort moment. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
On our Threat Vector segment, we preview this week’s episode where host David Moulton goes “Behind the Scenes with Palo Alto Networks CIO and CISO Securing Business Success with Frictionless Cybersecurity.” Meerah Rajavel, CIO of Palo Alto Networks, and Niall Browne, CISO of the organization, join David to discuss the importance of aligning IT strategy with cybersecurity. You can catch new episodes of Threat Vector every Thursday here and on your favorite podcast app. 

Selected Reading
760,000 Employee Records From Several Major Firms Leaked Online (SecurityWeek)
UK cyber chief warns country is ‘widely underestimating’ risks from cyberattacks (The Record)
US agency proposes new rule blocking data brokers from selling Americans' sensitive personal data (TechCrunch)
US government contractor ENGlobal says operations are ‘limited’ following cyberattack (TechCrunch)
New Windows Backdoor Security Warning For Bing, Dropbox, Google Users (Forbes)
Chinese LIDAR Dominance a Cybersecurity Threat, Warns Think Tank (Infosecurity Magazine)
SmokeLoader Attack Targets Companies in Taiwan (FortiGuard Labs) 
Korea arrests CEO for adding DDoS feature to satellite receivers (Bleeping Computer)
Do Your Passwords Meet the Proposed New Federal Guidelines? (Wall Street Journal)
These names cause ChatGPT to break, and it's due to AI hallucinations ( TechSpot)  

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>More than 760,000 see their personal data exposed on the BreachForums cybercrime forum. The new head of the UK’s NCSC warns against underestimating growing cyber threats. The Consumer Financial Protection Bureau (CFPB) looks to prevent data brokers from selling Americans’ personal and financial information. A U.S. government and energy sector contractor discloses a ransomware attack. The “smoked ham” Windows backdoor is being actively deployed. A new report warns of overreliance on Chinese-made LIDAR technology. SmokeLoader malware targets companies in Taiwan. NIST proposes new password guidelines. South Korean police make arrests over 240,000 satellite receivers with built-in DDoS attack capabilities. On our Threat Vector segment, we preview this week’s episode where host David Moulton goes Behind the Scenes with Palo Alto Networks CIO and CISO. ChatGPT has a Voldemort moment. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Threat Vector Segment</h2><p>On our <a href="https://thecyberwire.com/podcasts/threat-vector">Threat Vector</a> segment, we preview this week’s episode where host <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a> goes “Behind the Scenes with <a href="http://www.paloaltonetworks.com/">Palo Alto Networks</a> CIO and CISO Securing Business Success with Frictionless Cybersecurity.” <a href="https://www.linkedin.com/in/meerah-rajavel/">Meerah Rajavel</a>, CIO of Palo Alto Networks, and <a href="https://www.linkedin.com/in/niallbrowne/">Niall Browne</a>, CISO of the organization, join David to discuss the importance of aligning IT strategy with cybersecurity. You can catch new episodes of Threat Vector every Thursday <a href="https://thecyberwire.com/podcasts/threat-vector">here</a> and on your favorite podcast app. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/760000-employee-records-from-several-major-firms-leaked-online/">760,000 Employee Records From Several Major Firms Leaked Online</a> (SecurityWeek)</p><p><a href="https://therecord.media/uk-cyber-chief-warns-underestimate">UK cyber chief warns country is ‘widely underestimating’ risks from cyberattacks</a> (The Record)</p><p><a href="https://techcrunch.com/2024/12/03/us-agency-proposes-new-rule-blocking-data-brokers-from-selling-americans-sensitive-personal-data/">US agency proposes new rule blocking data brokers from selling Americans' sensitive personal data</a> (TechCrunch)</p><p><a href="https://techcrunch.com/2024/12/03/us-government-contractor-englobal-says-operations-are-limited-following-cyberattack/">US government contractor ENGlobal says operations are ‘limited’ following cyberattack</a> (TechCrunch)</p><p><a href="https://www.forbes.com/sites/daveywinder/2024/12/03/new-windows-backdoor-security-warning-for-bing-dropbox-google-users/">New Windows Backdoor Security Warning For Bing, Dropbox, Google Users</a> (Forbes)</p><p><a href="https://www.infosecurity-magazine.com/news/chinese-lidar-dominance/">Chinese LIDAR Dominance a Cybersecurity Threat, Warns Think Tank</a> (Infosecurity Magazine)</p><p><a href="https://www.fortinet.com/blog/threat-research/sophisticated-attack-targets-taiwan-with-smokeloader">SmokeLoader Attack Targets Companies in Taiwan </a>(FortiGuard Labs) </p><p><a href="https://www.bleepingcomputer.com/news/security/korea-arrests-ceo-for-adding-ddos-feature-to-satellite-receivers/">Korea arrests CEO for adding DDoS feature to satellite receivers</a> (Bleeping Computer)</p><p><a href="https://www.wsj.com/tech/cybersecurity/passwords-proposed-new-federal-guidelines-2ba177d8">Do Your Passwords Meet the Proposed New Federal Guidelines?</a> (Wall Street Journal)</p><p><a href="https://www.techspot.com/news/105802-names-cause-chatgpt-break-due-ai-hallucinations.html">These names cause ChatGPT to break, and it's due to AI hallucinations</a> ( TechSpot)  </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1670</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ba5e0dae-b95e-11ee-8cf8-bf80717c47b3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3820594050.mp3?updated=1733256537" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The international effort making digital spaces safer.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2200/notes</link>
      <description>A major cybercrime crackdown by Interpol nabs hundreds of suspects and millions in stolen funds. Zabbix has disclosed a critical SQL injection vulnerability. A novel phishing campaign exploits Microsoft Word’s file recovery feature. Researchers track the Rockstar 2FA phishing toolkit. Critical vulnerabilities are found in Advantech’s industrial wireless access points.  North Korea’s Kimsuky hacking group shifts their tactics. The U.N. forms an advisory body to address growing threats to critical undersea cable infrastructure.The U.K. is laser-focused on AI security research. Russian authorities arrest the Wazawaka ransomware affiliate. Our guest is Marshall Heilman, CEO of DTEX Systems, sharing his experience with a nation-state actor's attempt to gain employment at his company. OpenAI opens the door for encrudification. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Marshall Heilman, CEO of DTEX Systems, discussing how HR can spot fake IT workers and sharing their own experience with a nation-state actor's attempt to gain employment at his company. You can read DTEX Systems findings here. 

Selected Reading
Global Police Arrest 5500 in $400m Cyber-Fraud Crackdown (Infosecurity Magazine)
Critical Vulnerability Found in Zabbix Network Monitoring Tool (SecurityWeek)
Novel phishing campaign uses corrupted Word documents to evade security (Bleeping Computer)
"Rockstar 2FA" Phishing-as-a-Service Steals Microsoft 365 Credentials Via AiTM Attacks (Cyber Security News) 
Warning: Patch Advantech Industrial Wireless Access Points (GovInfo Security)
North Korean Hacking Group Launches Undected Malwareless URL Phishing Attacks (Cyber Security News)
UN, international orgs create advisory body for submarine cables after incidents (The Record)
U.K. launches AI security lab to combat nation-state cyber threats (SC Media)
Ransomware suspect Wazawaka reportedly arrested by Russia (SC World)
OpenAI explores advertising as it steps up revenue drive (Financial Times) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 02 Dec 2024 21:10:00 -0000</pubDate>
      <itunes:title>The international effort making digital spaces safer.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2200</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A major cybercrime crackdown by Interpol nabs hundreds of suspects and millions in stolen funds. Zabbix has disclosed a critical SQL injection vulnerability. A novel phishing campaign exploits Microsoft Word’s file recovery feature. Researchers track the Rockstar 2FA phishing toolkit. Critical vulnerabilities are found in Advantech’s industrial wireless access points.  North Korea’s Kimsuky hacking group shifts their tactics. The U.N. forms an advisory body to address growing threats to critical undersea cable infrastructure.The U.K. is laser-focused on AI security research. Russian authorities arrest the Wazawaka ransomware affiliate. Our guest is Marshall Heilman, CEO of DTEX Systems, sharing his experience with a nation-state actor's attempt to gain employment at his company. OpenAI opens the door for encrudification. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Marshall Heilman, CEO of DTEX Systems, discussing how HR can spot fake IT workers and sharing their own experience with a nation-state actor's attempt to gain employment at his company. You can read DTEX Systems findings here. 

Selected Reading
Global Police Arrest 5500 in $400m Cyber-Fraud Crackdown (Infosecurity Magazine)
Critical Vulnerability Found in Zabbix Network Monitoring Tool (SecurityWeek)
Novel phishing campaign uses corrupted Word documents to evade security (Bleeping Computer)
"Rockstar 2FA" Phishing-as-a-Service Steals Microsoft 365 Credentials Via AiTM Attacks (Cyber Security News) 
Warning: Patch Advantech Industrial Wireless Access Points (GovInfo Security)
North Korean Hacking Group Launches Undected Malwareless URL Phishing Attacks (Cyber Security News)
UN, international orgs create advisory body for submarine cables after incidents (The Record)
U.K. launches AI security lab to combat nation-state cyber threats (SC Media)
Ransomware suspect Wazawaka reportedly arrested by Russia (SC World)
OpenAI explores advertising as it steps up revenue drive (Financial Times) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A major cybercrime crackdown by Interpol nabs hundreds of suspects and millions in stolen funds. Zabbix has disclosed a critical SQL injection vulnerability. A novel phishing campaign exploits Microsoft Word’s file recovery feature. Researchers track the Rockstar 2FA phishing toolkit. Critical vulnerabilities are found in Advantech’s industrial wireless access points.  North Korea’s Kimsuky hacking group shifts their tactics. The U.N. forms an advisory body to address growing threats to critical undersea cable infrastructure.The U.K. is laser-focused on AI security research. Russian authorities arrest the Wazawaka ransomware affiliate. Our guest is Marshall Heilman, CEO of DTEX Systems, sharing his experience with a nation-state actor's attempt to gain employment at his company. OpenAI opens the door for encrudification. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/marshall-heilman/">Marshall Heilman</a>, CEO of <a href="https://www.dtexsystems.com/">DTEX Systems</a>, discussing how HR can spot fake IT workers and sharing their own experience with a nation-state actor's attempt to gain employment at his company. You can read DTEX Systems findings <a href="https://dtexsystems.wistia.com/medias/ybsgc905cn">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.infosecurity-magazine.com/news/police-arrest-5500-cyberfraud/">Global Police Arrest 5500 in $400m Cyber-Fraud Crackdown</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/critical-vulnerability-found-in-zabbix-network-monitoring-tool/">Critical Vulnerability Found in Zabbix Network Monitoring Tool</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/novel-phising-campaign-uses-corrupted-word-documents-to-evade-security/">Novel phishing campaign uses corrupted Word documents to evade security</a> (Bleeping Computer)</p><p><a href="https://cybersecuritynews.com/rockstar-2fa/">"Rockstar 2FA" Phishing-as-a-Service Steals Microsoft 365 Credentials Via AiTM Attacks</a> (Cyber Security News) </p><p><a href="https://www.govinfosecurity.com/warning-patch-advantech-industrial-wireless-access-points-a-26943">Warning: Patch Advantech Industrial Wireless Access Points</a> (GovInfo Security)</p><p><a href="https://cybersecuritynews.com/malwareless-url-phishing-attacks/">North Korean Hacking Group Launches Undected Malwareless URL Phishing Attacks</a> (Cyber Security News)</p><p><a href="https://therecord.media/un-international-orgs-create-advisory-body-submarine-cables">UN, international orgs create advisory body for submarine cables after incidents</a> (The Record)</p><p><a href="https://www.scworld.com/brief/u-k-launches-ai-security-lab-to-combat-nation-state-cyber-threats-1">U.K. launches AI security lab to combat nation-state cyber threats</a> (SC Media)</p><p><a href="https://therecord.media/wazawaka-mikhail-matveev-reportedly-arrested-russia">Ransomware suspect Wazawaka reportedly arrested by Russia</a> (SC World)</p><p><a href="https://www.ft.com/content/9350d075-1658-4d3c-8bc9-b9b3dfc29b26">OpenAI explores advertising as it steps up revenue drive</a> (Financial Times) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1638</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ba25c6c4-b95e-11ee-8cf8-ebc081f3b2f6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2898944784.mp3?updated=1733168381" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Debra Danielson: Be fearless. [CTO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/44/notes</link>
      <description>Please enjoy this encore episode, where we are joined by Chief Technology Officer and Senior Vice President, Engineering for Digital Guardian Debra Danielson, as she shares her career journey. From aspirations of becoming an astronaut studying mechanical and aerospace engineering, Finding her first job at a local software company that turned into a long term commitment after it was acquired by another firm. Debra mentions that when she was heads-down programming, there were many women in the field and when she emerged from the cube to take on management and leadership positions, the ratio of women had dropped dramatically. She noted at this time that it took a lot of energy to be different. Debra shared that each time she had challenges in her career, she learned from them. She offers advice of taking risks earlier in your career as you don't know what it could lead to. And, we thank Debra for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 01 Dec 2024 08:00:00 -0000</pubDate>
      <itunes:title>Debra Danielson: Be fearless. [CTO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>44</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/dffb1ec4-ace9-11ef-8d8b-db5c4dbbf9b2/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode, where we are joined by Chief Technology Officer and Senior Vice President, Engineering for Digital Guardian Debra Danielson, as she shares her career journey. From aspirations of becoming an astronaut studying mechanical and aerospace engineering, Finding her first job at a local software company that turned into a long term commitment after it was acquired by another firm. Debra mentions that when she was heads-down programming, there were many women in the field and when she emerged from the cube to take on management and leadership positions, the ratio of women had dropped dramatically. She noted at this time that it took a lot of energy to be different. Debra shared that each time she had challenges in her career, she learned from them. She offers advice of taking risks earlier in your career as you don't know what it could lead to. And, we thank Debra for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode, where we are joined by Chief Technology Officer and Senior Vice President, Engineering for Digital Guardian Debra Danielson, as she shares her career journey. From aspirations of becoming an astronaut studying mechanical and aerospace engineering, Finding her first job at a local software company that turned into a long term commitment after it was acquired by another firm. Debra mentions that when she was heads-down programming, there were many women in the field and when she emerged from the cube to take on management and leadership positions, the ratio of women had dropped dramatically. She noted at this time that it took a lot of energy to be different. Debra shared that each time she had challenges in her career, she learned from them. She offers advice of taking risks earlier in your career as you don't know what it could lead to. And, we thank Debra for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>460</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dffb1ec4-ace9-11ef-8d8b-db5c4dbbf9b2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8330283693.mp3?updated=1732730897" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leaking your AWS API keys, on purpose? [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/324/notes</link>
      <description>Please enjoy this encore episode: 
Noah Pack, a SANS Internet Storm Center Intern, sits down to discuss research on "What happens when you accidentally leak your AWS API keys?" This research is a guest diary from Noah and shares a project he worked on after seeing an online video of someone who created a python script that emailed colleges asking for free swag to be shipped to him. 
The research states "In this article, I will share some research, resources, and real-world data related to leaked AWS API keys." In this research, Noah shares what he learned while implementing his experiment. 
The research can be found here:
What happens when you accidentally leak your AWS API keys? [Guest Diary]

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Nov 2024 08:00:00 -0000</pubDate>
      <itunes:title>Leaking your AWS API keys, on purpose? [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>324</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c64c0ffa-ace5-11ef-9f4b-1b6168650a1f/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode: 
Noah Pack, a SANS Internet Storm Center Intern, sits down to discuss research on "What happens when you accidentally leak your AWS API keys?" This research is a guest diary from Noah and shares a project he worked on after seeing an online video of someone who created a python script that emailed colleges asking for free swag to be shipped to him. 
The research states "In this article, I will share some research, resources, and real-world data related to leaked AWS API keys." In this research, Noah shares what he learned while implementing his experiment. 
The research can be found here:
What happens when you accidentally leak your AWS API keys? [Guest Diary]

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode: </p><p>Noah Pack, a SANS Internet Storm Center Intern, sits down to discuss research on "What happens when you accidentally leak your AWS API keys?" This research is a guest diary from Noah and shares a project he worked on after seeing an online video of someone who created a python script that emailed colleges asking for free swag to be shipped to him. </p><p>The research states "In this article, I will share some research, resources, and real-world data related to leaked AWS API keys." In this research, Noah shares what he learned while implementing his experiment. </p><p>The research can be found here:</p><ul><li><a href="https://isc.sans.edu/diary/What+happens+when+you+accidentally+leak+your+AWS+API+keys+Guest+Diary/30730">What happens when you accidentally leak your AWS API keys? [Guest Diary]</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1470</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c64c0ffa-ace5-11ef-9f4b-1b6168650a1f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7212564890.mp3?updated=1732729491" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Science fiction meets reality with Ronald D. Moore. [T-Minus Deep Space]</title>
      <link>https://space.n2k.com/podcasts/t-minus/ds74</link>
      <description>T-Minus Space Daily Podcast Host Maria Varmazis was asked to host a fireside chat with Sci-Fi legend Ronald D. Moore at the Beyond Earth Symposium in Washington DC.  Ronald D. Moore is an American screenwriter and television producer. He is best known for his work on Star Trek, the re-imagined Battlestar Galactica and For All Mankind TV series.

Check out the full conversation on our YouTube Page here!

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.

T-Minus Crew Survey
We want to hear from you! Please complete our 4 question survey. It’ll help us get better and deliver you the most mission-critical space intel every day.

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.

Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.

T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 29 Nov 2024 07:00:00 -0000</pubDate>
      <itunes:title>Science fiction meets reality with Ronald D. Moore. [T-Minus Deep Space]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>74</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ef96c294-ad01-11ef-90e8-63d7cea7cb3e/image/f4a19856889e7eaf272b3ef70e511b88.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Sci-Fi meets reality with Ronald D. Moore. Ron is best known for his work on Star Trek, the re-imagined Battlestar Galactica and For All Mankind TV series.</itunes:subtitle>
      <itunes:summary>T-Minus Space Daily Podcast Host Maria Varmazis was asked to host a fireside chat with Sci-Fi legend Ronald D. Moore at the Beyond Earth Symposium in Washington DC.  Ronald D. Moore is an American screenwriter and television producer. He is best known for his work on Star Trek, the re-imagined Battlestar Galactica and For All Mankind TV series.

Check out the full conversation on our YouTube Page here!

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.

T-Minus Crew Survey
We want to hear from you! Please complete our 4 question survey. It’ll help us get better and deliver you the most mission-critical space intel every day.

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.

Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.

T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>T-Minus Space Daily Podcast Host <a href="mailto:maria.varmazis@n2k.com">Maria Varmazis</a> was asked to host a fireside chat with Sci-Fi legend Ronald D. Moore at the Beyond Earth Symposium in Washington DC.  Ronald D. Moore is an American screenwriter and television producer. He is best known for his work on Star Trek, the re-imagined Battlestar Galactica and For All Mankind TV series.</p><p><br></p><p>Check out the full conversation on our YouTube Page <a href="https://youtu.be/5BGNRcc_f1g">here</a>!</p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p><br></p><p>Miss an episode? Sign-up for our weekly intelligence roundup, <a href="https://space.n2k.com/newsletters/signals-and-space"><em>Signals and Space</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow T-Minus on <a href="https://www.linkedin.com/company/n2k-space/">LinkedIn</a> and <a href="https://www.instagram.com/n2kspace/">Instagram</a>.</p><p><br></p><h2>T-Minus Crew Survey</h2><p>We want to hear from you! Please complete our <a href="https://www.surveymonkey.com/r/BL5NFPW">4 question survey</a>. It’ll help us get better and deliver you the most mission-critical space intel every day.</p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:space@n2k.com">space@n2k.com</a> to request more info.</p><p><br></p><h2>Want to join us for an interview?</h2><p>Please send your pitch to <a href="mailto:space-editor@n2k.com">space-editor@n2k.com</a> and include your name, affiliation, and topic proposal.</p><p><br></p><p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2773</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ef96c294-ad01-11ef-90e8-63d7cea7cb3e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3973347571.mp3?updated=1732744597" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Solution Spotlight: Simone Petrella talking with Lee Parrish, CISO of Newell Brands, about his book and security relationship management.  [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/69/notes</link>
      <description>Please enjoy this encore episode: 
On this Solution Spotlight, guest Lee Parrish, author and CISO at Newell Brands, joins N2K President Simone Petrella to discuss his book "The Shortest Hour: An Applied Approach to Boardroom Governance of Cyber Security" and security relationship management.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 28 Nov 2024 08:00:00 -0000</pubDate>
      <itunes:title>Solution Spotlight: Simone Petrella talking with Lee Parrish, CISO of Newell Brands, about his book and security relationship management.  [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>69</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this encore episode: 
On this Solution Spotlight, guest Lee Parrish, author and CISO at Newell Brands, joins N2K President Simone Petrella to discuss his book "The Shortest Hour: An Applied Approach to Boardroom Governance of Cyber Security" and security relationship management.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode: </p><p>On this Solution Spotlight, guest <a href="https://www.linkedin.com/in/lee-parrish/">Lee Parrish</a>, author and CISO at <a href="https://www.newellbrands.com/">Newell Brands</a>, joins <a href="https://www.n2k.com/">N2K</a> President <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a> to discuss his book "<a href="https://www.google.com/books/edition/The_Shortest_Hour/6P0MEQAAQBAJ?hl=en&amp;gbpv=0">The Shortest Hour: An Applied Approach to Boardroom Governance of Cyber Security</a>" and security relationship management.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1807</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b9b106b8-b95e-11ee-8cf8-63712d9a1166]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6837471655.mp3?updated=1732658162" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Grappling with a ransomware attack.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2199/notes</link>
      <description>Blue Yonder continues to grapple with ransomware attack. AI-powered scams surge this shopping season. Gaming engine exploited to deliver malware. Chinese hackers ride the router wave. TikTok’s beauty filter ban. Redefining cybersecurity education for the future. On our Industry Voices segment, Dave sits down with Damon Fleury, SpyCloud’s Chief Product Officer to discuss defending against what criminals know about you and the role of holistic digital identity in cyber defense. And when do cyber criminals start their holiday scheming?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today on our Industry Voices segment, guest Damon Fleury, SpyCloud’s Chief Product Officer, joins Dave to discuss defending against what criminals know about you and the role of holistic digital identity in cyber defense.

Selected Reading
Kevin Beaumont (@GossiTheDog) on Mastodon (Mastodon)
Advanced Cyberthreats Targeting Holiday Shoppers (FortiGuard Labs) 
Black Friday Gets a Fakeover: Fake Stores Spike 110% by Using LLMs this Holiday Shopping Season (Netcraft)
The Exploitation of Gaming Engines: A New Dimension in Cybercrime (Check Point Software) 
T-Mobile Engineers Spotted Hackers Running Commands on Routers (Bloomberg Law)  
TikTok will block beauty filters for teens over mental health concerns (The Verge)
Australia passes bill banning social media for children under 16 (The Washington Post)
CISA debuts new cybersecurity training platform (Federal News Network) 
African cybercrime crackdown culminates in 1,006 captured and cuffed (The Record)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 27 Nov 2024 21:10:00 -0000</pubDate>
      <itunes:title>Grappling with a ransomware attack.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2199</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Blue Yonder continues to grapple with ransomware attack. AI-powered scams surge this shopping season. Gaming engine exploited to deliver malware. Chinese hackers ride the router wave. TikTok’s beauty filter ban. Redefining cybersecurity education for the future. On our Industry Voices segment, Dave sits down with Damon Fleury, SpyCloud’s Chief Product Officer to discuss defending against what criminals know about you and the role of holistic digital identity in cyber defense. And when do cyber criminals start their holiday scheming?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today on our Industry Voices segment, guest Damon Fleury, SpyCloud’s Chief Product Officer, joins Dave to discuss defending against what criminals know about you and the role of holistic digital identity in cyber defense.

Selected Reading
Kevin Beaumont (@GossiTheDog) on Mastodon (Mastodon)
Advanced Cyberthreats Targeting Holiday Shoppers (FortiGuard Labs) 
Black Friday Gets a Fakeover: Fake Stores Spike 110% by Using LLMs this Holiday Shopping Season (Netcraft)
The Exploitation of Gaming Engines: A New Dimension in Cybercrime (Check Point Software) 
T-Mobile Engineers Spotted Hackers Running Commands on Routers (Bloomberg Law)  
TikTok will block beauty filters for teens over mental health concerns (The Verge)
Australia passes bill banning social media for children under 16 (The Washington Post)
CISA debuts new cybersecurity training platform (Federal News Network) 
African cybercrime crackdown culminates in 1,006 captured and cuffed (The Record)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Blue Yonder continues to grapple with ransomware attack. AI-powered scams surge this shopping season. Gaming engine exploited to deliver malware. Chinese hackers ride the router wave. TikTok’s beauty filter ban. Redefining cybersecurity education for the future. On our Industry Voices segment, Dave sits down with Damon Fleury, SpyCloud’s Chief Product Officer to discuss defending against what criminals know about you and the role of holistic digital identity in cyber defense. And when do cyber criminals start their holiday scheming?</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today on our Industry Voices segment, guest <a href="https://www.linkedin.com/in/damonfleury/">Damon Fleury</a>, <a href="https://spycloud.com/">SpyCloud</a>’s Chief Product Officer, joins Dave to discuss defending against what criminals know about you and the role of holistic digital identity in cyber defense.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://cyberplace.social/@GossiTheDog/113550481295785096">Kevin Beaumont (@GossiTheDog) on Mastodon</a> (Mastodon)</p><p><a href="https://www.fortinet.com/blog/threat-research/advanced-cyberthreats-targeting-holiday-shoppers">Advanced Cyberthreats Targeting Holiday Shoppers</a> (FortiGuard Labs) </p><p><a href="https://www.netcraft.com/blog/2024-llm-powered-fake-online-shopping-site-surge/">Black Friday Gets a Fakeover: Fake Stores Spike 110% by Using LLMs this Holiday Shopping Season</a> (Netcraft)</p><p><a href="https://blog.checkpoint.com/research/the-exploitation-of-gaming-engines-a-new-dimension-in-cybercrime/">The Exploitation of Gaming Engines: A New Dimension in Cybercrime</a> (Check Point Software) </p><p><a href="https://news.bloomberglaw.com/us-law-week/t-mobile-engineers-spotted-hackers-running-commands-on-routers">T-Mobile Engineers Spotted Hackers Running Commands on Routers</a> (Bloomberg Law)  </p><p><a href="https://www.theverge.com/2024/11/27/24307314/tiktok-beauty-filter-effects-age-restriction-teens-wellbeing">TikTok will block beauty filters for teens over mental health concerns</a> (The Verge)</p><p><a href="https://www.washingtonpost.com/world/2024/11/27/australia-social-media-ban-bill/">Australia passes bill banning social media for children under 16 </a>(The Washington Post)</p><p><a href="https://federalnewsnetwork.com/cybersecurity/2024/11/cisa-debuts-new-cybersecurity-training-platform/">CISA debuts new cybersecurity training platform</a> (Federal News Network) </p><p><a href="https://therecord.media/interpol-afripol-cybercrime-arrests">African cybercrime crackdown culminates in 1,006 captured and cuffed</a> (The Record)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1670</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b978c802-b95e-11ee-8cf8-5f0f1a61028a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8748614611.mp3?updated=1732734592" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Taking aim at cybercrime.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2198/notes</link>
      <description>Smashing cybercrime syndicates. CyberVolk goes global. Tech troubles mostly resolved. A malware web weaved by Salt Typhoon targets global sectors. Love at first exploit. Ransomware attack on Blue Yonder brews trouble. Google faces a UK court battle. Lateral moves and lost data. I sit down with Clemence Poirer, Senior Cyberdefense Researcher at the Center for Security Studies (CSS) at ETH Zurich | Space Cybersecurity to discuss cybersecurity attacks in space. And finally, a Cybersecurity sales pitch goes rogue.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest, Clemence Poirier, Senior Cyberdefense Researcher at the Center for Security Studies (CSS) at ETH Zurich, recently spoke with T-Minus Space Daily podcast host Maria Varmazis about cybersecurity attacks in space. Read the case study: Hacking the Cosmos: Cyber operations against the space sector. A case study from the war in Ukraine.

Selected Reading
Bangkok busts SMS Blaster sending 1 million scam texts from a van (Bleeping Computer)
Police bust two Chinese syndicates (Bangkok Post)
'CyberVolk' hacktivists use ransomware in support of Russian interests (The Record) 
Microsoft says massive Outlook and Teams outage is mostly resolved (CNN) 
British hospital group declares ‘major incident’ following cyberattack (The Record) 
NHS declares major cyber incident for third time this year (The Register)
Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions (Trend Micro)
RomCom exploits Firefox and Windows zero days in the wild
Starbucks, Grocery Stores Hit by Blue Yonder Ransomware Attack (SecurityWeek)
Google hit with £7B claim over search engine dominance (The Register)
CISA Details Red Team Assessment including TTPs &amp; network defense (GB Hackers)
DOJ: Man hacked networks to pitch cybersecurity services (Bleeping Computer)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Nov 2024 21:10:00 -0000</pubDate>
      <itunes:title>Taking aim at cybercrime.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2198</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Smashing cybercrime syndicates. CyberVolk goes global. Tech troubles mostly resolved. A malware web weaved by Salt Typhoon targets global sectors. Love at first exploit. Ransomware attack on Blue Yonder brews trouble. Google faces a UK court battle. Lateral moves and lost data. I sit down with Clemence Poirer, Senior Cyberdefense Researcher at the Center for Security Studies (CSS) at ETH Zurich | Space Cybersecurity to discuss cybersecurity attacks in space. And finally, a Cybersecurity sales pitch goes rogue.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest, Clemence Poirier, Senior Cyberdefense Researcher at the Center for Security Studies (CSS) at ETH Zurich, recently spoke with T-Minus Space Daily podcast host Maria Varmazis about cybersecurity attacks in space. Read the case study: Hacking the Cosmos: Cyber operations against the space sector. A case study from the war in Ukraine.

Selected Reading
Bangkok busts SMS Blaster sending 1 million scam texts from a van (Bleeping Computer)
Police bust two Chinese syndicates (Bangkok Post)
'CyberVolk' hacktivists use ransomware in support of Russian interests (The Record) 
Microsoft says massive Outlook and Teams outage is mostly resolved (CNN) 
British hospital group declares ‘major incident’ following cyberattack (The Record) 
NHS declares major cyber incident for third time this year (The Register)
Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions (Trend Micro)
RomCom exploits Firefox and Windows zero days in the wild
Starbucks, Grocery Stores Hit by Blue Yonder Ransomware Attack (SecurityWeek)
Google hit with £7B claim over search engine dominance (The Register)
CISA Details Red Team Assessment including TTPs &amp; network defense (GB Hackers)
DOJ: Man hacked networks to pitch cybersecurity services (Bleeping Computer)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Smashing cybercrime syndicates. CyberVolk goes global. Tech troubles mostly resolved. A malware web weaved by Salt Typhoon targets global sectors. Love at first exploit. Ransomware attack on Blue Yonder brews trouble. Google faces a UK court battle. Lateral moves and lost data. I sit down with Clemence Poirer, Senior Cyberdefense Researcher at the Center for Security Studies (CSS) at ETH Zurich | Space Cybersecurity to discuss cybersecurity attacks in space. And finally, a Cybersecurity sales pitch goes rogue.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today’s guest, <a href="https://www.linkedin.com/in/ACoAABqEE84BqHwsGtoBajU2FjnUkFzDNe2Vrpo">Clemence Poirier</a>, Senior Cyberdefense Researcher at the Center for Security Studies (CSS) at ETH Zurich, recently spoke with T-Minus Space Daily podcast host Maria Varmazis about cybersecurity attacks in space. Read the case study: <a href="https://css.ethz.ch/en/center/CSS-news/2024/10/hacking-the-cosmos-cyber-operations-against-the-space-sector-a-case-study-from-the-war-in-ukraine.html">Hacking the Cosmos: Cyber operations against the space sector. A case study from the war in Ukraine</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/bangkok-busts-sms-blaster-sending-1-million-scam-texts-from-a-van/">Bangkok busts SMS Blaster sending 1 million scam texts from a van</a> (Bleeping Computer)</p><p><a href="https://www.bangkokpost.com/thailand/general/2907107/police-bust-two-chinese-syndicates">Police bust two Chinese syndicates</a> (Bangkok Post)</p><p><a href="https://therecord.media/cybervolk-india-hacktivists-russia-ransomware">'CyberVolk' hacktivists use ransomware in support of Russian interests</a> (The Record) </p><p><a href="https://www.cnn.com/2024/11/25/tech/microsofts-outlook-teams-outage/index.html">Microsoft says massive Outlook and Teams outage is mostly resolved</a> (CNN) </p><p><a href="https://therecord.media/england-hospitals-cyberattack-nhs-wirral">British hospital group declares ‘major incident’ following cyberattack</a> (The Record) </p><p><a href="https://www.theregister.com/2024/11/26/third_major_cyber_incident_declared/">NHS declares major cyber incident for third time this year</a> (The Register)</p><p><a href="https://www.trendmicro.com/en_us/research/24/k/earth-estries.html">Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions</a> (Trend Micro)</p><p><a href="https://www.welivesecurity.com/en/eset-research/romcom-exploits-firefox-and-windows-zero-days-in-the-wild/">RomCom exploits Firefox and Windows zero days in the wild</a></p><p><a href="https://www.securityweek.com/starbucks-grocery-stores-hit-by-blue-yonder-ransomware-attack/">Starbucks, Grocery Stores Hit by Blue Yonder Ransomware Attack</a> (SecurityWeek)</p><p><a href="https://www.theregister.com/2024/11/26/google_7_billion_cat/">Google hit with £7B claim over search engine dominance</a> (The Register)</p><p><a href="https://gbhackers.com/cisa-details-red-team-assessment/">CISA Details Red Team Assessment including TTPs &amp; network defense</a> (GB Hackers)</p><p><a href="https://www.bleepingcomputer.com/news/security/doj-man-hacked-networks-to-pitch-cybersecurity-services/">DOJ: Man hacked networks to pitch cybersecurity services</a> (Bleeping Computer)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1539</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b9410cb4-b95e-11ee-8cf8-93e71f17c8af]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7055547025.mp3?updated=1732650820" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Novel attacks and creative phishing angles. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2197/notes</link>
      <description>APT28 uses a novel technique to breach organizations via nearby WiFi networks. Your Apple ID is (not) suspended. UK highlighting Russian threats at NATO Cyber Defence Conference. US senators request an audit of TSA's facial recognition technology. Supply chain software company sustains ransomware attack. Critical QNAP vulnerability could allow remote code execution. Outdated Avast Anti-Rootkit driver exploited. No more internet rabbit holes for China. Guest Lesley Carhart from Dragos on "The Shifting Landscape of OT Incident Response." Stop &amp; Shop turns cyber oops into coffee and cookies.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is ​​Lesley Carhart, Technical Director at Dragos, speaking with Dave Bittner about "The Shifting Landscape of OT Incident Response." You can find the blog here.

Selected Reading
Russian Cyberspies Hacked Building Across Street From Target for Wi-Fi Attack (SecurityWeek)
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access (Volexity)
New Warning For 2 Billion iPhone, iPad, Mac Users—Your Apple ID Is Suspended (Forbes)
Russia plotting to use AI to enhance cyber-attacks against UK, minister will warn (The Guardian) 
Britain, NATO must stay ahead in 'new AI arms race', says UK minister (Reuters) 
Senators call for audit of TSA’s facial recognition tech as use expands in airports (The Record) 
Blue Yonder ransomware attack disrupts supply chains across UK and US (Tech Monitor)
Critical QNAP Vulnerability Let Attackers Execute Remote Code (Cyber Security News)
Malware campaign abused flawed Avast Anti-Rootkit driver (Security Affairs)
When Guardians Become Predators: How Malware Corrupts the Protectors (Trellix report) 
Imagine a land where algorithms don't ruin the Internet (The Register)
Stop &amp; Shop recovers from 'cybersecurity issue,' will give out free food, coffee (WTNH)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 25 Nov 2024 21:00:00 -0000</pubDate>
      <itunes:title>Novel attacks and creative phishing angles. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2197</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>APT28 uses a novel technique to breach organizations via nearby WiFi networks. Your Apple ID is (not) suspended. UK highlighting Russian threats at NATO Cyber Defence Conference. US senators request an audit of TSA's facial recognition technology. Supply chain software company sustains ransomware attack. Critical QNAP vulnerability could allow remote code execution. Outdated Avast Anti-Rootkit driver exploited. No more internet rabbit holes for China. Guest Lesley Carhart from Dragos on "The Shifting Landscape of OT Incident Response." Stop &amp; Shop turns cyber oops into coffee and cookies.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is ​​Lesley Carhart, Technical Director at Dragos, speaking with Dave Bittner about "The Shifting Landscape of OT Incident Response." You can find the blog here.

Selected Reading
Russian Cyberspies Hacked Building Across Street From Target for Wi-Fi Attack (SecurityWeek)
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access (Volexity)
New Warning For 2 Billion iPhone, iPad, Mac Users—Your Apple ID Is Suspended (Forbes)
Russia plotting to use AI to enhance cyber-attacks against UK, minister will warn (The Guardian) 
Britain, NATO must stay ahead in 'new AI arms race', says UK minister (Reuters) 
Senators call for audit of TSA’s facial recognition tech as use expands in airports (The Record) 
Blue Yonder ransomware attack disrupts supply chains across UK and US (Tech Monitor)
Critical QNAP Vulnerability Let Attackers Execute Remote Code (Cyber Security News)
Malware campaign abused flawed Avast Anti-Rootkit driver (Security Affairs)
When Guardians Become Predators: How Malware Corrupts the Protectors (Trellix report) 
Imagine a land where algorithms don't ruin the Internet (The Register)
Stop &amp; Shop recovers from 'cybersecurity issue,' will give out free food, coffee (WTNH)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>APT28 uses a novel technique to breach organizations via nearby WiFi networks. Your Apple ID is (not) suspended. UK highlighting Russian threats at NATO Cyber Defence Conference. US senators request an audit of TSA's facial recognition technology. Supply chain software company sustains ransomware attack. Critical QNAP vulnerability could allow remote code execution. Outdated Avast Anti-Rootkit driver exploited. No more internet rabbit holes for China. Guest Lesley Carhart from Dragos on "The Shifting Landscape of OT Incident Response." Stop &amp; Shop turns cyber oops into coffee and cookies.</p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p><br></p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><h2><br></h2><h2>CyberWire Guest</h2><p>Our guest is ​​<a href="https://www.linkedin.com/in/lcarhart/">Lesley Carhart</a>, Technical Director at <a href="https://www.dragos.com/">Dragos</a>, speaking with Dave Bittner about "The Shifting Landscape of OT Incident Response." You can find the blog <a href="https://www.dragos.com/blog/the-shifting-landscape-of-ot-incident-response/">here</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/russian-cyberspies-hacked-building-across-street-from-target-for-wi-fi-attack/">Russian Cyberspies Hacked Building Across Street From Target for Wi-Fi Attack</a> (SecurityWeek)</p><p><a href="https://www.volexity.com/blog/2024/11/22/the-nearest-neighbor-attack-how-a-russian-apt-weaponized-nearby-wi-fi-networks-for-covert-access/">The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access</a> (Volexity)</p><p><a href="https://www.forbes.com/sites/daveywinder/2024/11/25/new-warning-for-2-billion-iphone-ipad-mac-users-your-apple-id-is-suspended/">New Warning For 2 Billion iPhone, iPad, Mac Users—Your Apple ID Is Suspended</a> (Forbes)</p><p><a href="https://www.theguardian.com/world/2024/nov/25/russia-plotting-to-use-ai-to-enhance-cyber-attacks-against-uk-minister-will-warn">Russia plotting to use AI to enhance cyber-attacks against UK, minister will warn</a> (The Guardian) </p><p><a href="https://www.reuters.com/technology/cybersecurity/britain-nato-must-stay-ahead-new-ai-arms-race-says-uk-minister-2024-11-25/">Britain, NATO must stay ahead in 'new AI arms race', says UK minister</a> (Reuters) </p><p><a href="https://therecord.media/tsa-facial-recognition-tech-senators-call-for-audits">Senators call for audit of TSA’s facial recognition tech as use expands in airports</a> (The Record) </p><p><a href="https://www.techmonitor.ai/technology/cybersecurity/blue-yonder-ransomware-attack-disrupts-supply-chains-across-uk-and-us">Blue Yonder ransomware attack disrupts supply chains across UK and US</a> (Tech Monitor)</p><p><a href="https://cybersecuritynews.com/critical-qnap-vulnerability-let-attackers-execute-remote-code/">Critical QNAP Vulnerability Let Attackers Execute Remote Code</a> (Cyber Security News)</p><p><a href="https://securityaffairs.com/171340/hacking/avast-anti-rootkit-driver-abused-malware-campaign.html">Malware campaign abused flawed Avast Anti-Rootkit driver</a> (Security Affairs)</p><p><a href="https://www.trellix.com/blogs/research/when-guardians-become-predators-how-malware-corrupts-the-protectors/">When Guardians Become Predators: How Malware Corrupts the Protectors</a> (Trellix report) </p><p><a href="https://go.theregister.com/feed/www.theregister.com/2024/11/25/china_algorithm_transparency/">Imagine a land where algorithms don't ruin the Internet</a> (The Register)</p><p><a href="https://www.wtnh.com/news/connecticut/stop-shop-recovers-from-cybersecurity-issue-giving-out-free-food-coffee/">Stop &amp; Shop recovers from 'cybersecurity issue,' will give out free food, coffee</a> (WTNH)</p><p><br></p><h2>Share your feedback.</h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p><br></p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1609</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b909146c-b95e-11ee-8cf8-ebb195cf25ec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7634658569.mp3?updated=1732560477" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Greg Bell: Answer the question of "why?" [Open Source] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/43/notes</link>
      <description>Enjoy this encore episode where we are joined by Co-founder and Chief Strategy Officer for Corelight Greg Bell, as he describes the twists and turns of his career bringing him back to his childhood joy of computers. Working in a myriad of fields from human rights to Hollywood to writing a history of conspiracy belief before pivoting back to technology. Focusing on the relationships within the open source community, Greg works to change and improve the world through his mission-based organization. For those looking to begin their career in cyber, Greg offers that great mentorship and working for great organizations where you can soak in the culture are really important. And, we thank Greg for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 24 Nov 2024 08:00:00 -0000</pubDate>
      <itunes:title>Greg Bell: Answer the question of "why?" [Open Source] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>43</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this encore episode where we are joined by Co-founder and Chief Strategy Officer for Corelight Greg Bell, as he describes the twists and turns of his career bringing him back to his childhood joy of computers. Working in a myriad of fields from human rights to Hollywood to writing a history of conspiracy belief before pivoting back to technology. Focusing on the relationships within the open source community, Greg works to change and improve the world through his mission-based organization. For those looking to begin their career in cyber, Greg offers that great mentorship and working for great organizations where you can soak in the culture are really important. And, we thank Greg for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this encore episode where we are joined by Co-founder and Chief Strategy Officer for Corelight Greg Bell, as he describes the twists and turns of his career bringing him back to his childhood joy of computers. Working in a myriad of fields from human rights to Hollywood to writing a history of conspiracy belief before pivoting back to technology. Focusing on the relationships within the open source community, Greg works to change and improve the world through his mission-based organization. For those looking to begin their career in cyber, Greg offers that great mentorship and working for great organizations where you can soak in the culture are really important. And, we thank Greg for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>390</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ec8a8e3c-a5f4-11ef-9225-3b3bdb51c496]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2437408708.mp3?updated=1731965984" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exposing AI's Achilles heel. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/355/notes</link>
      <description>This week, we are joined by Ami Luttwak, Co-Founder and CTO from Wiz, sharing their work on "Wiz Research Finds Critical NVIDIA AI Vulnerability Affecting Containers Using NVIDIA GPUs, Including Over 35 percent of Cloud Environments." A critical vulnerability in the NVIDIA Container Toolkit, widely used for GPU access in AI workloads, could allow attackers to escape containers and gain full access to host environments, jeopardizing sensitive data. 
Wiz estimates that at least 33% of cloud environments are affected and urges immediate updates to NVIDIA's patched version. This discovery highlights the broader issue of young, under-secured codebases in AI tools, emphasizing the need for stronger security measures and collaboration.
The research can be found here: 
Wiz Research Finds Critical NVIDIA AI Vulnerability Affecting Containers Using NVIDIA GPUs, Including Over 35% of Cloud Environments

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Nov 2024 08:00:00 -0000</pubDate>
      <itunes:title>Exposing AI's Achilles heel. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>355</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, we are joined by Ami Luttwak, Co-Founder and CTO from Wiz, sharing their work on "Wiz Research Finds Critical NVIDIA AI Vulnerability Affecting Containers Using NVIDIA GPUs, Including Over 35 percent of Cloud Environments." A critical vulnerability in the NVIDIA Container Toolkit, widely used for GPU access in AI workloads, could allow attackers to escape containers and gain full access to host environments, jeopardizing sensitive data. 
Wiz estimates that at least 33% of cloud environments are affected and urges immediate updates to NVIDIA's patched version. This discovery highlights the broader issue of young, under-secured codebases in AI tools, emphasizing the need for stronger security measures and collaboration.
The research can be found here: 
Wiz Research Finds Critical NVIDIA AI Vulnerability Affecting Containers Using NVIDIA GPUs, Including Over 35% of Cloud Environments

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by <a href="https://www.linkedin.com/in/amiluttwak/">Ami Luttwak</a>, Co-Founder and CTO from <a href="https://cms.megaphone.fm/organizations/cd9023bc-9a2c-11ea-bbcb-a7f75b26f845/podcasts/720fb496-dcfb-11ea-a475-bbdae30535a9/episodes/24f7f7c4-b6f3-11ee-ae1a-cb823dcb079e/wizsecurity">Wiz</a>, sharing their work on "Wiz Research Finds Critical NVIDIA AI Vulnerability Affecting Containers Using NVIDIA GPUs, Including Over 35 percent of Cloud Environments." A critical vulnerability in the NVIDIA Container Toolkit, widely used for GPU access in AI workloads, could allow attackers to escape containers and gain full access to host environments, jeopardizing sensitive data. </p><p>Wiz estimates that at least 33% of cloud environments are affected and urges immediate updates to NVIDIA's patched version. This discovery highlights the broader issue of young, under-secured codebases in AI tools, emphasizing the need for stronger security measures and collaboration.</p><p>The research can be found here: </p><ul><li><a href="https://www.wiz.io/blog/wiz-research-critical-nvidia-ai-vulnerability">Wiz Research Finds Critical NVIDIA AI Vulnerability Affecting Containers Using NVIDIA GPUs, Including Over 35% of Cloud Environments</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1412</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4cde3984-a760-11ef-b7cf-f3b92c2535c6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5245394873.mp3?updated=1732122227" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A not so BASIC farewell.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2195/notes</link>
      <description>META details its efforts against pig butchering. The Salt Typhoon attack on major U.S. telecoms sparks interest from Congress.  Microsoft dismantles 240 domains linked to the ONNX phishing-as-a-service platform. A major U.S. gambling and lottery provider suffers a cyberattack. Hackers exploit newly patched zero-days in Palo Alto Networks firewalls. Researchers say Fortinet VPN servers lack sufficient logging. A pilot program looks to improve security for small U.S. water utilities. Bitdefender warns of scammers using Black Friday-themed spam emails. Our guest is DataDome’s CEO and Co-founder, Benjamin Fabre, discussing how "Fake Accounts Threaten Black Friday Gaming Sales." A fond farewell for a true cyber innovator. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In advance of Black Friday shopping next week, our guest is  DataDome’s CEO and Co-founder, Benjamin Fabre discussing their team's work on "Fake Accounts Threaten Black Friday Gaming Sales." 

Selected Reading
Meta cracks down on millions of accounts it tied to pig-butchering scams (CyberScoop)
China’s Hacking Reached Deep Into U.S. Telecoms (New York Times)
FCC leaders skirt call for wiretap security reform, hope to ‘go deeper’ on telecom breach briefings (NextGov)
Microsoft disrupts ONNX phishing-as-a-service infrastructure (Bleeping Computer)
Gambling and lottery giant disrupted by cyberattack, working to bring systems back online (The Record)
Over 2,000 Palo Alto firewalls hacked using recently patched bugs (Bleeping Computer)
Fortinet VPN design flaw hides successful brute-force attacks (Bleeping Computer)
First Water Utilities Take Volunteer Cyber Help (The University of Chicago Harris School of Public Policy)
Three-Quarters of Black Friday Spam Emails Identified as Scams (Infosecurity Magazine)
Thomas E. Kurtz, a Creator of BASIC Computer Language, Dies at 96 (New York Times)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 22 Nov 2024 21:00:00 -0000</pubDate>
      <itunes:title>A not so BASIC farewell.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2196</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>META details its efforts against pig butchering. The Salt Typhoon attack on major U.S. telecoms sparks interest from Congress.  Microsoft dismantles 240 domains linked to the ONNX phishing-as-a-service platform. A major U.S. gambling and lottery provider suffers a cyberattack. Hackers exploit newly patched zero-days in Palo Alto Networks firewalls. Researchers say Fortinet VPN servers lack sufficient logging. A pilot program looks to improve security for small U.S. water utilities. Bitdefender warns of scammers using Black Friday-themed spam emails. Our guest is DataDome’s CEO and Co-founder, Benjamin Fabre, discussing how "Fake Accounts Threaten Black Friday Gaming Sales." A fond farewell for a true cyber innovator. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In advance of Black Friday shopping next week, our guest is  DataDome’s CEO and Co-founder, Benjamin Fabre discussing their team's work on "Fake Accounts Threaten Black Friday Gaming Sales." 

Selected Reading
Meta cracks down on millions of accounts it tied to pig-butchering scams (CyberScoop)
China’s Hacking Reached Deep Into U.S. Telecoms (New York Times)
FCC leaders skirt call for wiretap security reform, hope to ‘go deeper’ on telecom breach briefings (NextGov)
Microsoft disrupts ONNX phishing-as-a-service infrastructure (Bleeping Computer)
Gambling and lottery giant disrupted by cyberattack, working to bring systems back online (The Record)
Over 2,000 Palo Alto firewalls hacked using recently patched bugs (Bleeping Computer)
Fortinet VPN design flaw hides successful brute-force attacks (Bleeping Computer)
First Water Utilities Take Volunteer Cyber Help (The University of Chicago Harris School of Public Policy)
Three-Quarters of Black Friday Spam Emails Identified as Scams (Infosecurity Magazine)
Thomas E. Kurtz, a Creator of BASIC Computer Language, Dies at 96 (New York Times)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>META details its efforts against pig butchering. The Salt Typhoon attack on major U.S. telecoms sparks interest from Congress.  Microsoft dismantles 240 domains linked to the ONNX phishing-as-a-service platform. A major U.S. gambling and lottery provider suffers a cyberattack. Hackers exploit newly patched zero-days in Palo Alto Networks firewalls. Researchers say Fortinet VPN servers lack sufficient logging. A pilot program looks to improve security for small U.S. water utilities. Bitdefender warns of scammers using Black Friday-themed spam emails. Our guest is DataDome’s CEO and Co-founder, Benjamin Fabre, discussing how "Fake Accounts Threaten Black Friday Gaming Sales." A fond farewell for a true cyber innovator. </p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p><br></p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>In advance of Black Friday shopping next week, our guest is  <a href="https://datadome.co/">DataDome</a>’s CEO and Co-founder, <a href="https://www.linkedin.com/in/benjaminfabre/">Benjamin Fabre</a> discussing their team's work on "<a href="https://datadome.co/threat-research/security-alert-fake-accounts-threaten-black-friday-gaming-sales/">Fake Accounts Threaten Black Friday Gaming Sales</a>." </p><p><br></p><h2>Selected Reading</h2><p><a href="https://cyberscoop.com/meta-cracks-down-on-millions-of-accounts-it-tied-to-pig-butchering-scams">Meta cracks down on millions of accounts it tied to pig-butchering scams</a> (CyberScoop)</p><p><a href="https://www.nytimes.com/2024/11/21/us/politics/china-hacking-telecommunications.html">China’s Hacking Reached Deep Into U.S. Telecoms</a> (New York Times)</p><p><a href="https://www.nextgov.com/cybersecurity/2024/11/fcc-leaders-skirt-call-wiretap-security-reform-hope-go-deeper-telecom-breach-briefings/401222/?oref=ng-homepage-river&amp;ref=metacurity.com">FCC leaders skirt call for wiretap security reform, hope to ‘go deeper’ on telecom breach briefings</a> (NextGov)</p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-disrupts-onnx-phishing-as-a-service-infrastructure">Microsoft disrupts ONNX phishing-as-a-service infrastructure</a> (Bleeping Computer)</p><p><a href="https://therecord.media/gambling-lottery-giant-hit-with-disruptive-cyberattack">Gambling and lottery giant disrupted by cyberattack, working to bring systems back online</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/over-2-000-palo-alto-firewalls-hacked-using-recently-patched-bugs/">Over 2,000 Palo Alto firewalls hacked using recently patched bugs</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/fortinet-vpn-design-flaw-hides-successful-brute-force-attacks/">Fortinet VPN design flaw hides successful brute-force attacks</a> (Bleeping Computer)</p><p><a href="https://harris.uchicago.edu/news-events/news/first-water-utilities-take-volunteer-cyber-help">First Water Utilities Take Volunteer Cyber Help</a> (The University of Chicago Harris School of Public Policy)</p><p><a href="https://www.infosecurity-magazine.com/news/black-friday-spam-emails-scams/">Three-Quarters of Black Friday Spam Emails Identified as Scams</a> (Infosecurity Magazine)</p><p><a href="https://www.nytimes.com/2024/11/16/technology/thomas-kurtz-dead.html">Thomas E. Kurtz, a Creator of BASIC Computer Language, Dies at 96</a> (New York Times)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p><br></p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1688</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b8d0514a-b95e-11ee-8cf8-ab48529fae87]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6658586751.mp3?updated=1732560611" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No more spinach for PopeyeTools. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2195/notes</link>
      <description>The feds take down the PopeyeTools cybercrime market. Five alleged Scattered Spider members have been charged.  CISA warns of critical vulnerabilities in VMware’s vCenter Server. Global AI experts convene to discuss safety. MITRE updates its list of Top 25 Most Dangerous Software Weaknesses. US and Australian agencies warn critical infrastructure organizations about evolving tactics by the BianLian ransomware group. A new report looks at rising threats to the U.S. manufacturing industry. Researchers at ESET uncover the WolfsBane Linux backdoor. A pair of malicious Python packages impersonating ChatGPT went undetected for over a year. A data breach at a French hospital compromised the medical records of 750,000 patients. On our Industry Voices segment, guest Avihai Ben-Yossef, Cymulate’s Co-Founder and CTO, joins us to discuss "The Evolution and Outlook of Exposure Management." AI Pimping is the scourge of Instagram. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, guest Avihai Ben-Yossef, Cymulate’s Co-Founder and CTO, joins us to discuss "The Evolution and Outlook of Exposure Management."


Resources: 

Security Validation Essentials

Hertz Israel Reduced Cyber Risk by 81% within 4 Months with Cymulate

SecOps Roundtable: Security Validation and the Path to Exposure Management

Double Agent: Exploiting Pass-through Authentication Credential Validation in Azure AD


Selected Reading

US seizes PopeyeTools cybercrime marketplace, charges administrators (Bleeping Computer)
Five Charged in Scattered Spider Case (Infosecurity Magazine)
CISA Warns of VMware VCenter Vulnerabilities Actively Exploited in Attacks (Cyber Security News)
US Gathers Allies to Talk AI Safety as Trump’s Vow to Undo Biden’s AI Policy Overshadows Their Work (SecurityWeek)
MITRE Updates List of 25 Most Dangerous Software Vulnerabilities (SecurityWeek)
BianLian Ransomware Group Adopts New Tactics, Posing Significant Risk (Infosecurity Magazine)
Manufacturing Sector Under Siege: Industry Faces Wave of Advanced Email Attacks (Abnormal Security)
Gelsemium APT Hackers Attacking Linux Servers With New WolfsBane Malware (Cyber Security News)
Two PyPi Malicious Package Mimic ChatGPT &amp; Claude Steals Developers Data (GB Hackers)
Cyberattack at French hospital exposes health data of 750,000 patients (Bleeping Computer)
Inside the Booming 'AI Pimping' Industry (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 21 Nov 2024 21:30:00 -0000</pubDate>
      <itunes:title>No more spinach for PopeyeTools. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2195</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The feds take down the PopeyeTools cybercrime market. Five alleged Scattered Spider members have been charged.  CISA warns of critical vulnerabilities in VMware’s vCenter Server. Global AI experts convene to discuss safety. MITRE updates its list of Top 25 Most Dangerous Software Weaknesses. US and Australian agencies warn critical infrastructure organizations about evolving tactics by the BianLian ransomware group. A new report looks at rising threats to the U.S. manufacturing industry. Researchers at ESET uncover the WolfsBane Linux backdoor. A pair of malicious Python packages impersonating ChatGPT went undetected for over a year. A data breach at a French hospital compromised the medical records of 750,000 patients. On our Industry Voices segment, guest Avihai Ben-Yossef, Cymulate’s Co-Founder and CTO, joins us to discuss "The Evolution and Outlook of Exposure Management." AI Pimping is the scourge of Instagram. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, guest Avihai Ben-Yossef, Cymulate’s Co-Founder and CTO, joins us to discuss "The Evolution and Outlook of Exposure Management."


Resources: 

Security Validation Essentials

Hertz Israel Reduced Cyber Risk by 81% within 4 Months with Cymulate

SecOps Roundtable: Security Validation and the Path to Exposure Management

Double Agent: Exploiting Pass-through Authentication Credential Validation in Azure AD


Selected Reading

US seizes PopeyeTools cybercrime marketplace, charges administrators (Bleeping Computer)
Five Charged in Scattered Spider Case (Infosecurity Magazine)
CISA Warns of VMware VCenter Vulnerabilities Actively Exploited in Attacks (Cyber Security News)
US Gathers Allies to Talk AI Safety as Trump’s Vow to Undo Biden’s AI Policy Overshadows Their Work (SecurityWeek)
MITRE Updates List of 25 Most Dangerous Software Vulnerabilities (SecurityWeek)
BianLian Ransomware Group Adopts New Tactics, Posing Significant Risk (Infosecurity Magazine)
Manufacturing Sector Under Siege: Industry Faces Wave of Advanced Email Attacks (Abnormal Security)
Gelsemium APT Hackers Attacking Linux Servers With New WolfsBane Malware (Cyber Security News)
Two PyPi Malicious Package Mimic ChatGPT &amp; Claude Steals Developers Data (GB Hackers)
Cyberattack at French hospital exposes health data of 750,000 patients (Bleeping Computer)
Inside the Booming 'AI Pimping' Industry (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The feds take down the PopeyeTools cybercrime market. Five alleged Scattered Spider members have been charged.  CISA warns of critical vulnerabilities in VMware’s vCenter Server. Global AI experts convene to discuss safety. MITRE updates its list of Top 25 Most Dangerous Software Weaknesses. US and Australian agencies warn critical infrastructure organizations about evolving tactics by the BianLian ransomware group. A new report looks at rising threats to the U.S. manufacturing industry. Researchers at ESET uncover the WolfsBane Linux backdoor. A pair of malicious Python packages impersonating ChatGPT went undetected for over a year. A data breach at a French hospital compromised the medical records of 750,000 patients. On our Industry Voices segment, guest Avihai Ben-Yossef, Cymulate’s Co-Founder and CTO, joins us to discuss "The Evolution and Outlook of Exposure Management." AI Pimping is the scourge of Instagram. </p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p><br></p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our <a href="https://www.linkedin.com/in/avihai-ben-yossef-0613165b/?originalSubdomain=il">Industry Voices</a> segment, guest <a href="https://www.linkedin.com/in/avihai-ben-yossef-0613165b/?originalSubdomain=il">Avihai Ben-Yossef</a>, <a href="http://www.cymulate.com/">Cymulate</a>’s Co-Founder and CTO, joins us to discuss "The Evolution and Outlook of Exposure Management."</p><p><br></p><h3>
<strong>Resources</strong>: </h3><ul>
<li><a href="https://cymulate.com/resources/security-validation-essentials-ebook/">Security Validation Essentials</a></li>
<li><a href="https://cymulate.com/resources/hertz-israel-reduced-cyber-risk-by-81-percent-within-four-months-with-cymulate/">Hertz Israel Reduced Cyber Risk by 81% within 4 Months with Cymulate</a></li>
<li><a href="https://cymulate.com/blog/secops-roundtable-security-validation-and-exposure-management/">SecOps Roundtable: Security Validation and the Path to Exposure Management</a></li>
<li><a href="https://cymulate.com/blog/exploiting-pta-credential-validation-in-azure-ad/">Double Agent: Exploiting Pass-through Authentication Credential Validation in Azure AD</a></li>
</ul><p><br></p><h2>Selected Reading</h2><p><br></p><p><a href="https://www.bleepingcomputer.com/news/legal/us-seizes-popeyetools-cybercrime-marketplace-charges-administrators/">US seizes PopeyeTools cybercrime marketplace, charges administrators</a> (Bleeping Computer)</p><p><a href="https://www.infosecurity-magazine.com/news/five-charged-in-scattered-spider/">Five Charged in Scattered Spider Case</a> (Infosecurity Magazine)</p><p><a href="https://cybersecuritynews.com/cisa-warns-of-vmware-vcenter-vulnerabilities/">CISA Warns of VMware VCenter Vulnerabilities Actively Exploited in Attacks</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/us-gathers-allies-to-talk-ai-safety-as-trumps-vow-to-undo-bidens-ai-policy-overshadows-their-work/">US Gathers Allies to Talk AI Safety as Trump’s Vow to Undo Biden’s AI Policy Overshadows Their Work</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/mitre-updates-list-of-25-most-dangerous-software-vulnerabilities/">MITRE Updates List of 25 Most Dangerous Software Vulnerabilities</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/bianlian-ransomware-new-tactics/">BianLian Ransomware Group Adopts New Tactics, Posing Significant Risk</a> (Infosecurity Magazine)</p><p><a href="https://abnormalsecurity.com/blog/manufacturing-industry-email-attack-trends">Manufacturing Sector Under Siege: Industry Faces Wave of Advanced Email Attacks</a> (Abnormal Security)</p><p><a href="https://cybersecuritynews.com/gelsemium-apt-hackers-attacking-linux-servers/">Gelsemium APT Hackers Attacking Linux Servers With New WolfsBane Malware</a> (Cyber Security News)</p><p><a href="https://gbhackers.com/two-pypi-malicious-package-mimic-chatgpt-claude/">Two PyPi Malicious Package Mimic ChatGPT &amp; Claude Steals Developers Data</a> (GB Hackers)</p><p><a href="https://www.bleepingcomputer.com/news/security/cyberattack-at-french-hospital-exposes-health-data-of-750-000-patients/">Cyberattack at French hospital exposes health data of 750,000 patients</a> (Bleeping Computer)</p><p><a href="https://www.404media.co/inside-the-booming-ai-pimping-industry-3/">Inside the Booming 'AI Pimping' Industry</a> (404 Media)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p><br></p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1865</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b8954dca-b95e-11ee-8cf8-9fc379cf2ece]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3831186699.mp3?updated=1732306247" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When location data becomes a weapon.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2194/notes</link>
      <description>A WIRED investigation uncovers the ease of tracking U.S. military personnel. Apple releases emergency security updates to address actively exploited vulnerabilities. Latino teenagers and LGBTQ individuals are receiving disturbing text messages spreading false threats. Crowdstrike says Liminal Panda is responsible for telecom intrusions. Oracle patches a high-severity zero-day vulnerability. Trend Micro has disclosed a critical vulnerability in its Deep Security 20 Agent software. A rural hospital in Oklahoma suffers a ransomware attack. A leading fintech firm is investigating a security breach in its file transfer platform. Researchers deploy Mantis against malicious LLMs.  Ben Yelin from the University of Maryland Center for Health and Homeland Security discusses AI’s bias in the resume screening process. Tracking down a lost Lambo. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we have Ben Yelin, Program Director, Public Policy &amp; External Affairs at the University of Maryland Center for Health and Homeland Security and our Caveat podcast co-host, discussing AI’s racial and gender bias in the resume screening process. You can read about it here.

Selected Reading
Anyone Can Buy Data Tracking US Soldiers and Spies to Nuclear Vaults and Brothels in Germany (WIRED)
GAO recommends new agency to streamline how US government protects citizens’ data (The Record)
Apple Issues Emergency Security Update for Actively Exploited Flaws (Infosecurity Magazine)
Texts threatening deportation and 're-education' for gays stoke both fear and defiance (NBC News)
Chinese APT Group Targets Telecom Firms Linked to BRI (Infosecurity Magazine)
Oracle Patches Exploited Agile PLM Zero-Day (SecurityWeek)
Trend Micro Deep Security Vulnerability Let Attackers Execute Remote Code (Cyber Security News)
Oklahoma Hospital Says Ransomware Hack Hits 133,000 People (GovInfo Security)
Fintech Giant Finastra Investigating Data Breach (Krebs on Security)
AI About-Face: 'Mantis' Turns LLM Attackers Into Prey (Dark Reading)
Hackers Steal MLB Star Kris Bryant’s $200K Lamborghini By Rerouting Delivery (Carscoops)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 20 Nov 2024 21:20:00 -0000</pubDate>
      <itunes:title>When location data becomes a weapon.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2194</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A WIRED investigation uncovers the ease of tracking U.S. military personnel. Apple releases emergency security updates to address actively exploited vulnerabilities. Latino teenagers and LGBTQ individuals are receiving disturbing text messages spreading false threats. Crowdstrike says Liminal Panda is responsible for telecom intrusions. Oracle patches a high-severity zero-day vulnerability. Trend Micro has disclosed a critical vulnerability in its Deep Security 20 Agent software. A rural hospital in Oklahoma suffers a ransomware attack. A leading fintech firm is investigating a security breach in its file transfer platform. Researchers deploy Mantis against malicious LLMs.  Ben Yelin from the University of Maryland Center for Health and Homeland Security discusses AI’s bias in the resume screening process. Tracking down a lost Lambo. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we have Ben Yelin, Program Director, Public Policy &amp; External Affairs at the University of Maryland Center for Health and Homeland Security and our Caveat podcast co-host, discussing AI’s racial and gender bias in the resume screening process. You can read about it here.

Selected Reading
Anyone Can Buy Data Tracking US Soldiers and Spies to Nuclear Vaults and Brothels in Germany (WIRED)
GAO recommends new agency to streamline how US government protects citizens’ data (The Record)
Apple Issues Emergency Security Update for Actively Exploited Flaws (Infosecurity Magazine)
Texts threatening deportation and 're-education' for gays stoke both fear and defiance (NBC News)
Chinese APT Group Targets Telecom Firms Linked to BRI (Infosecurity Magazine)
Oracle Patches Exploited Agile PLM Zero-Day (SecurityWeek)
Trend Micro Deep Security Vulnerability Let Attackers Execute Remote Code (Cyber Security News)
Oklahoma Hospital Says Ransomware Hack Hits 133,000 People (GovInfo Security)
Fintech Giant Finastra Investigating Data Breach (Krebs on Security)
AI About-Face: 'Mantis' Turns LLM Attackers Into Prey (Dark Reading)
Hackers Steal MLB Star Kris Bryant’s $200K Lamborghini By Rerouting Delivery (Carscoops)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A WIRED investigation uncovers the ease of tracking U.S. military personnel. Apple releases emergency security updates to address actively exploited vulnerabilities. Latino teenagers and LGBTQ individuals are receiving disturbing text messages spreading false threats. Crowdstrike says Liminal Panda is responsible for telecom intrusions. Oracle patches a high-severity zero-day vulnerability. Trend Micro has disclosed a critical vulnerability in its Deep Security 20 Agent software. A rural hospital in Oklahoma suffers a ransomware attack. A leading fintech firm is investigating a security breach in its file transfer platform. Researchers deploy Mantis against malicious LLMs.  Ben Yelin from the University of Maryland Center for Health and Homeland Security discusses AI’s bias in the resume screening process. Tracking down a lost Lambo. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today, we have <a href="https://www.linkedin.com/in/benjamin-yelin-5b14114b/">Ben Yelin</a>, Program Director, Public Policy &amp; External Affairs at the University of Maryland Center for Health and Homeland Security and our Caveat podcast co-host, discussing AI’s racial and gender bias in the resume screening process. You can read about it <a href="https://www.geekwire.com/2024/ai-overwhelmingly-prefers-white-and-male-job-candidates-in-new-test-of-resume-screening-bias/">here</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.wired.com/story/phone-data-us-soldiers-spies-nuclear-germany/">Anyone Can Buy Data Tracking US Soldiers and Spies to Nuclear Vaults and Brothels in Germany</a> (WIRED)</p><p><a href="https://therecord.media/gao-recommends-new-agency-data-privacy-protections">GAO recommends new agency to streamline how US government protects citizens’ data</a> (The Record)</p><p><a href="https://www.infosecurity-magazine.com/news/apple-security-update/">Apple Issues Emergency Security Update for Actively Exploited Flaws</a> (Infosecurity Magazine)</p><p><a href="https://www.nbcnews.com/news/latino/lgbtq-latino-communities-targeted-deportation-reeducation-texts-fbi-rcna180624">Texts threatening deportation and 're-education' for gays stoke both fear and defiance</a> (NBC News)</p><p><a href="https://www.infosecurity-magazine.com/news/chinese-apt-targets-telecoms-bri/">Chinese APT Group Targets Telecom Firms Linked to BRI</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/oracle-patches-exploited-agile-plm-zero-day/">Oracle Patches Exploited Agile PLM Zero-Day</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/trend-micro-deep-security-vulnerability/">Trend Micro Deep Security Vulnerability Let Attackers Execute Remote Code</a> (Cyber Security News)</p><p><a href="https://www.govinfosecurity.com/oklahoma-hospital-says-ransomware-hack-hits-133000-people-a-26852">Oklahoma Hospital Says Ransomware Hack Hits 133,000 People</a> (GovInfo Security)</p><p><a href="https://krebsonsecurity.com/2024/11/fintech-giant-finastra-investigating-data-breach/">Fintech Giant Finastra Investigating Data Breach</a> (Krebs on Security)</p><p><a href="https://www.darkreading.com/cybersecurity-operations/deceptive-framework-defense-mislead-attacking-ai">AI About-Face: 'Mantis' Turns LLM Attackers Into Prey</a> (Dark Reading)</p><p><a href="https://www.carscoops.com/2024/11/high-tech-thieves-steal-mlb-players-lamborghini-huracan/">Hackers Steal MLB Star Kris Bryant’s $200K Lamborghini By Rerouting Delivery</a> (Carscoops)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1578</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b85ccaae-b95e-11ee-8cf8-2bb9dbbe2bec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4026202727.mp3?updated=1732136121" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Biden vs. Trump: A tale of two cybersecurity strategies.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2193/notes</link>
      <description>Pundits predict Trump will overhaul U.S. cybersecurity policy. Experts examine escalating cybersecurity threats facing the U.S. energy sector. Palo Alto Networks patches a pair of zero-days. Akira and SafePay ransomware groups claim dozens of new victims. A major pharmacy group is pressured to pay a $1.3 million ransomware installment. Threat actors are exploiting Spotify playlists and podcasts. An alleged Phobos ransomware admin has been extradited to the U.S. Rapper “Razzlekhan” gets 18 months in prison for her part in the Bitfinex cryptocurrency hack. On today’s Threat Vector, David Moulton speaks with Assaf Dahan, Director of Threat Research at Palo Alto Networks’ Cortex team, about the rising cyber threat from North Korea.  Swiss scammers send snail mail. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
On this segment of Threat Vector, host David Moulton speaks with Assaf Dahan, Director of Threat Research at Palo Alto Networks’ Cortex team, about the rising cyber threat from North Korea. To hear the full conversation between David and Assaf, listen to Cyber Espionage and Financial Crime: North Korea’s Double Threat, and catch new episodes of Threat Vector every Thursday on your favorite podcast app! 

Selected Reading
More Spyware, Fewer Rules: What Trump’s Return Means for US Cybersecurity (WIRED)
How to remove the cybersecurity gridlock from the nation's energy lifelines (CyberScoop)
Palo Alto Patches Firewall Zero-Day Exploited in Operation Lunar Peek (SecurityWeek)
SafePay ransomware: Obscure group uses LockBit builder, claims 22 victims (SC Media)
Akira Ransomware Drops 30 Victims on Leak Site in One Day (SecurityWeek)
Gang Shaking Down Pharmacy Group for Second Ransom Payment (GovInfo Security)
Spotify abused to promote pirated software and game cheats (Bleeping Computer)
Suspected Phobos Ransomware Admin Extradited to US (Infosecurity Magazine)
Heather ‘Razzlekhan’ Morgan sentenced to 18 months in prison, ending Bitfinex saga (The Record)
Now Hackers Are Using Snail Mail In Cyber Attacks—Here’s How (Forbes) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Nov 2024 22:00:00 -0000</pubDate>
      <itunes:title>Biden vs. Trump: A tale of two cybersecurity strategies.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2193</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Pundits predict Trump will overhaul U.S. cybersecurity policy. Experts examine escalating cybersecurity threats facing the U.S. energy sector. Palo Alto Networks patches a pair of zero-days. Akira and SafePay ransomware groups claim dozens of new victims. A major pharmacy group is pressured to pay a $1.3 million ransomware installment. Threat actors are exploiting Spotify playlists and podcasts. An alleged Phobos ransomware admin has been extradited to the U.S. Rapper “Razzlekhan” gets 18 months in prison for her part in the Bitfinex cryptocurrency hack. On today’s Threat Vector, David Moulton speaks with Assaf Dahan, Director of Threat Research at Palo Alto Networks’ Cortex team, about the rising cyber threat from North Korea.  Swiss scammers send snail mail. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
On this segment of Threat Vector, host David Moulton speaks with Assaf Dahan, Director of Threat Research at Palo Alto Networks’ Cortex team, about the rising cyber threat from North Korea. To hear the full conversation between David and Assaf, listen to Cyber Espionage and Financial Crime: North Korea’s Double Threat, and catch new episodes of Threat Vector every Thursday on your favorite podcast app! 

Selected Reading
More Spyware, Fewer Rules: What Trump’s Return Means for US Cybersecurity (WIRED)
How to remove the cybersecurity gridlock from the nation's energy lifelines (CyberScoop)
Palo Alto Patches Firewall Zero-Day Exploited in Operation Lunar Peek (SecurityWeek)
SafePay ransomware: Obscure group uses LockBit builder, claims 22 victims (SC Media)
Akira Ransomware Drops 30 Victims on Leak Site in One Day (SecurityWeek)
Gang Shaking Down Pharmacy Group for Second Ransom Payment (GovInfo Security)
Spotify abused to promote pirated software and game cheats (Bleeping Computer)
Suspected Phobos Ransomware Admin Extradited to US (Infosecurity Magazine)
Heather ‘Razzlekhan’ Morgan sentenced to 18 months in prison, ending Bitfinex saga (The Record)
Now Hackers Are Using Snail Mail In Cyber Attacks—Here’s How (Forbes) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Pundits predict Trump will overhaul U.S. cybersecurity policy. Experts examine escalating cybersecurity threats facing the U.S. energy sector. Palo Alto Networks patches a pair of zero-days. Akira and SafePay ransomware groups claim dozens of new victims. A major pharmacy group is pressured to pay a $1.3 million ransomware installment. Threat actors are exploiting Spotify playlists and podcasts. An alleged Phobos ransomware admin has been extradited to the U.S. Rapper “Razzlekhan” gets 18 months in prison for her part in the Bitfinex cryptocurrency hack. On today’s Threat Vector, David Moulton speaks with Assaf Dahan, Director of Threat Research at Palo Alto Networks’ Cortex team, about the rising cyber threat from North Korea.  Swiss scammers send snail mail. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Threat Vector Segment</h2><p>On this segment of<a href="https://thecyberwire.com/podcasts/threat-vector"> Threat Vector</a>, host<a href="https://www.linkedin.com/in/davidrmoulton/"> David Moulton</a> speaks with<a href="https://www.linkedin.com/in/assaf-dahan-a98226108/"> Assaf Dahan</a>, Director of Threat Research at Palo Alto Networks’ Cortex team, about the rising cyber threat from North Korea. To hear the full conversation between David and Assaf, listen to<a href="https://thecyberwire.com/podcasts/threat-vector/43/notes"> Cyber Espionage and Financial Crime: North Korea’s Double Threat</a>, and catch new episodes of Threat Vector every Thursday on your favorite podcast app! </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.wired.com/story/trump-administration-cybersecurity-policy-reversals">More Spyware, Fewer Rules: What Trump’s Return Means for US Cybersecurity</a> (WIRED)</p><p><a href="https://cyberscoop.com/cybersecurity-energy-sector-supply-chain-risks-brian-harrell-sachin-bansal/">How to remove the cybersecurity gridlock from the nation's energy lifelines</a> (CyberScoop)</p><p><a href="https://www.securityweek.com/palo-alto-patches-firewall-zero-day-exploited-in-operation-lunar-peek/">Palo Alto Patches Firewall Zero-Day Exploited in Operation Lunar Peek</a> (SecurityWeek)</p><p><a href="https://www.scworld.com/news/safepay-ransomware-obscure-group-uses-lockbit-builder-claims-22-victims">SafePay ransomware: Obscure group uses LockBit builder, claims 22 victims</a> (SC Media)</p><p><a href="https://www.securityweek.com/akira-ransomware-drops-30-victims-on-leak-site-in-one-day/">Akira Ransomware Drops 30 Victims on Leak Site in One Day</a> (SecurityWeek)</p><p><a href="https://www.govinfosecurity.com/gang-shaking-down-pharmacy-group-for-second-ransom-payment-a-26838">Gang Shaking Down Pharmacy Group for Second Ransom Payment</a> (GovInfo Security)</p><p><a href="https://www.bleepingcomputer.com/news/security/spotify-abused-to-promote-pirated-software-and-game-cheats/">Spotify abused to promote pirated software and game cheats</a> (Bleeping Computer)</p><p><a href="https://www.infosecurity-magazine.com/news/phobos-ransomware-admin-extradited/">Suspected Phobos Ransomware Admin Extradited to US</a> (Infosecurity Magazine)</p><p><a href="https://therecord.media/razzlekhan-bitfinex-sentenced-18-months-bitcoin-laundering">Heather ‘Razzlekhan’ Morgan sentenced to 18 months in prison, ending Bitfinex saga</a> (The Record)</p><p><a href="https://www.forbes.com/sites/daveywinder/2024/11/18/now-hackers-are-using-snail-mail-in-cyber-attacks-heres-how/">Now Hackers Are Using Snail Mail In Cyber Attacks—Here’s How</a> (Forbes) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1707</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cb9550f6-a6b0-11ef-af1f-33585b891f5b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9652155127.mp3?updated=1732052048" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A new era for CISA under Trump?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2192/notes</link>
      <description>CISA’s Director Easterly plans to step down in the coming year. DHS issues recommendations for AI in critical infrastructure.Palo Alto Networks confirms active exploitation of a critical zero-day vulnerability in its firewalls. Threat actors exploit Microsoft’s 365 Admin Portal to send sextortion emails. A China-based APT targets a zero-day in Fortinet’s Windows VPN. The EPA reports on vulnerabilities in drinking water systems. A critical authentication bypass vulnerability affects a popular WordPress plugin. Researchers track a rise in the ClickFix social engineering technique. An 18 year old faces up to twenty years behind bars for swatting. Our guest is  Rob Boyce, Global Lead, Cyber Resilience at Accenture, discussing SIM swapping services targeting telcos. Nuisance calls are in decline. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we are joined by Rob Boyce, Global Lead, Cyber Resilience at Accenture, discussing SIM swapping services targeting telcos.

Selected Reading
CISA Director Jen Easterly to depart on Inauguration Day (Nextgov/FCW)
DHS Releases Secure AI Framework for Critical Infrastructure (Dark Reading)
Palo Alto firewalls exploited after critical zero-day vulnerability (Cybernews)
Microsoft 365 Admin portal abused to send sextortion emails (Bleeping Computer) 
Fortinet VPN Zero-Day Exploited in Malware Attacks Remains Unpatched: Report (SecurityWeek)
300 Drinking Water Systems in US Exposed to Disruptive, Damaging Hacker Attacks (SecurityWeek)
Security plugin flaw in millions of WordPress sites gives admin access (Bleeping Computer)
Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape (Proofpoint)
Teen serial swatter-for-hire busted, pleads guilty, could face 20 years (The Register)
FTC Records 50% Drop in Nuisance Calls Since 2021 (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 18 Nov 2024 21:10:00 -0000</pubDate>
      <itunes:title>A new era for CISA under Trump?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2192</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA’s Director Easterly plans to step down in the coming year. DHS issues recommendations for AI in critical infrastructure.Palo Alto Networks confirms active exploitation of a critical zero-day vulnerability in its firewalls. Threat actors exploit Microsoft’s 365 Admin Portal to send sextortion emails. A China-based APT targets a zero-day in Fortinet’s Windows VPN. The EPA reports on vulnerabilities in drinking water systems. A critical authentication bypass vulnerability affects a popular WordPress plugin. Researchers track a rise in the ClickFix social engineering technique. An 18 year old faces up to twenty years behind bars for swatting. Our guest is  Rob Boyce, Global Lead, Cyber Resilience at Accenture, discussing SIM swapping services targeting telcos. Nuisance calls are in decline. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we are joined by Rob Boyce, Global Lead, Cyber Resilience at Accenture, discussing SIM swapping services targeting telcos.

Selected Reading
CISA Director Jen Easterly to depart on Inauguration Day (Nextgov/FCW)
DHS Releases Secure AI Framework for Critical Infrastructure (Dark Reading)
Palo Alto firewalls exploited after critical zero-day vulnerability (Cybernews)
Microsoft 365 Admin portal abused to send sextortion emails (Bleeping Computer) 
Fortinet VPN Zero-Day Exploited in Malware Attacks Remains Unpatched: Report (SecurityWeek)
300 Drinking Water Systems in US Exposed to Disruptive, Damaging Hacker Attacks (SecurityWeek)
Security plugin flaw in millions of WordPress sites gives admin access (Bleeping Computer)
Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape (Proofpoint)
Teen serial swatter-for-hire busted, pleads guilty, could face 20 years (The Register)
FTC Records 50% Drop in Nuisance Calls Since 2021 (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA’s Director Easterly plans to step down in the coming year. DHS issues recommendations for AI in critical infrastructure.Palo Alto Networks confirms active exploitation of a critical zero-day vulnerability in its firewalls. Threat actors exploit Microsoft’s 365 Admin Portal to send sextortion emails. A China-based APT targets a zero-day in Fortinet’s Windows VPN. The EPA reports on vulnerabilities in drinking water systems. A critical authentication bypass vulnerability affects a popular WordPress plugin. Researchers track a rise in the ClickFix social engineering technique. An 18 year old faces up to twenty years behind bars for swatting. Our guest is  Rob Boyce, Global Lead, Cyber Resilience at Accenture, discussing SIM swapping services targeting telcos. Nuisance calls are in decline. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today, we are joined by <a href="https://www.linkedin.com/in/therobertjboyce/">Rob Boyce</a>, Global Lead, Cyber Resilience at <a href="https://www.accenture.com/us-en">Accenture</a>, discussing SIM swapping services targeting telcos.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.nextgov.com/people/2024/11/cisa-director-jen-easterly-depart-inauguration-day/401036/">CISA Director Jen Easterly to depart on Inauguration Day</a> (Nextgov/FCW)</p><p><a href="https://www.darkreading.com/cloud-security/dhs-releases-secure-ai-framework-critical-infrastructure">DHS Releases Secure AI Framework for Critical Infrastructure</a> (Dark Reading)</p><p><a href="https://cybernews.com/security/palo-alto-firewalls-exploited-critical-zero-day/">Palo Alto firewalls exploited after critical zero-day vulnerability</a> (Cybernews)</p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-365-admin-portal-abused-to-send-sextortion-emails/">Microsoft 365 Admin portal abused to send sextortion emails</a> (Bleeping Computer) </p><p><a href="https://www.securityweek.com/fortinet-vpn-zero-day-exploited-in-malware-attacks-remains-unpatched-report/">Fortinet VPN Zero-Day Exploited in Malware Attacks Remains Unpatched: Report</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/300-drinking-water-systems-in-us-exposed-to-disruptive-damaging-hacker-attacks/">300 Drinking Water Systems in US Exposed to Disruptive, Damaging Hacker Attacks</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/security-plugin-flaw-in-millions-of-wordpress-sites-gives-admin-access/">Security plugin flaw in millions of WordPress sites gives admin access</a> (Bleeping Computer)</p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/security-brief-clickfix-social-engineering-technique-floods-threat-landscape">Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape</a> (Proofpoint)</p><p><a href="https://www.theregister.com/2024/11/18/teenage_serial_swatterforhire_busted/">Teen serial swatter-for-hire busted, pleads guilty, could face 20 years</a> (The Register)</p><p><a href="https://www.infosecurity-magazine.com/news/ftc-records-50-drop-nuisance-calls/">FTC Records 50% Drop in Nuisance Calls Since 2021</a> (Infosecurity Magazine)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1586</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7e7aec2-b95e-11ee-8cf8-b72481d28f7d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8135796739.mp3?updated=1731962718" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Teresa Shea: The challenge of adapting new technologies. [Intelligence] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/42/notes</link>
      <description>Please enjoy this encore episode where Vice President of Raytheon's Cyber Offense, Defense Expert Teresa Shea speaks of her journey from math to adapting new technologies on the cutting edge, With a love of math, Teresa was offered a scholarship by the Society of Women Engineering and decided to pursue a degree in electrical engineering. Unsurprisingly, there were few other women in her program, Teresa interned with and then proceeded to work for the National Security Agency becoming their SIGINT director. Following her government career, Teresa worked to help bring new technologies to government through her work at Raytheon. We thank Teresa for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 17 Nov 2024 08:00:00 -0000</pubDate>
      <itunes:title>Teresa Shea: The challenge of adapting new technologies. [Intelligence] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>42</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode where Vice President of Raytheon's Cyber Offense, Defense Expert Teresa Shea speaks of her journey from math to adapting new technologies on the cutting edge, With a love of math, Teresa was offered a scholarship by the Society of Women Engineering and decided to pursue a degree in electrical engineering. Unsurprisingly, there were few other women in her program, Teresa interned with and then proceeded to work for the National Security Agency becoming their SIGINT director. Following her government career, Teresa worked to help bring new technologies to government through her work at Raytheon. We thank Teresa for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode where Vice President of Raytheon's Cyber Offense, Defense Expert Teresa Shea speaks of her journey from math to adapting new technologies on the cutting edge, With a love of math, Teresa was offered a scholarship by the Society of Women Engineering and decided to pursue a degree in electrical engineering. Unsurprisingly, there were few other women in her program, Teresa interned with and then proceeded to work for the National Security Agency becoming their SIGINT director. Following her government career, Teresa worked to help bring new technologies to government through her work at Raytheon. We thank Teresa for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>437</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[102b2320-a36f-11ef-9ee6-4fa961b59097]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8371291229.mp3?updated=1731688589" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Credential harvesters in the cloud. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/354/notes</link>
      <description>This week we are joined by, Blake Darché, Head of Cloudforce One at Cloudflare, to discuss their work on "Unraveling SloppyLemming’s Operations Across South Asia." Cloudforce One's investigation into the advanced threat actor "SloppyLemming" reveals an extensive espionage campaign targeting South and East Asia, with a focus on Pakistan's government, defense, telecommunications, and energy sectors. 
Leveraging multiple cloud service providers, SloppyLemming employs tactics like credential harvesting, malware delivery, and command-and-control (C2) operations, often relying on open-source adversary emulation tools like Cobalt Strike. Despite its activities, the actor's poor operational security (OPSEC) has allowed investigators to gain valuable insights into its infrastructure and tooling.
The research can be found here: 
Unraveling SloppyLemming’s operations across South Asia

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Nov 2024 08:00:00 -0000</pubDate>
      <itunes:title>Credential harvesters in the cloud. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>354</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week we are joined by, Blake Darché, Head of Cloudforce One at Cloudflare, to discuss their work on "Unraveling SloppyLemming’s Operations Across South Asia." Cloudforce One's investigation into the advanced threat actor "SloppyLemming" reveals an extensive espionage campaign targeting South and East Asia, with a focus on Pakistan's government, defense, telecommunications, and energy sectors. 
Leveraging multiple cloud service providers, SloppyLemming employs tactics like credential harvesting, malware delivery, and command-and-control (C2) operations, often relying on open-source adversary emulation tools like Cobalt Strike. Despite its activities, the actor's poor operational security (OPSEC) has allowed investigators to gain valuable insights into its infrastructure and tooling.
The research can be found here: 
Unraveling SloppyLemming’s operations across South Asia

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by, <a href="https://www.linkedin.com/in/blakedarche/">Blake Darché</a>, Head of Cloudforce One at <a href="https://www.cloudflare.com/">Cloudflare</a>, to discuss their work on "Unraveling SloppyLemming’s Operations Across South Asia." Cloudforce One's investigation into the advanced threat actor "SloppyLemming" reveals an extensive espionage campaign targeting South and East Asia, with a focus on Pakistan's government, defense, telecommunications, and energy sectors. </p><p>Leveraging multiple cloud service providers, SloppyLemming employs tactics like credential harvesting, malware delivery, and command-and-control (C2) operations, often relying on open-source adversary emulation tools like Cobalt Strike. Despite its activities, the actor's poor operational security (OPSEC) has allowed investigators to gain valuable insights into its infrastructure and tooling.</p><p>The research can be found here: </p><ul><li><a href="https://www.cloudflare.com/threat-intelligence/research/report/unraveling-sloppylemmings-operations-across-south-asia/">Unraveling SloppyLemming’s operations across South Asia</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>955</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[43fb9cf0-a36c-11ef-aac8-cb7ed097047b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3703229394.mp3?updated=1731687558" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>One tap, total access: Pegasus exploits unveiled.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2191/notes</link>
      <description>Unredacted court filings from WhatsApp’s 2019 lawsuit against NSO Group reveal the scope of spyware infections. Glove Stealer can bypass App-Bound Encryption in Chromium-based browsers. Researchers uncover a new zero-day vulnerability in Fortinet’s FortiManager. Rapid7 detects an updated version of LodaRAT. CISA warns of active exploitation of Palo Alto Networks’ Expedition tool. Misconfigured Microsoft Power Pages accounts expose sensitive data. Iranian state hackers mimic North Koreans in fake job scams. Australia warns its critical infrastructure providers about state sponsored embedded malware. An especially cruel cybercriminal gets ten years in the slammer. Guest Ambuj Kumar, Co-founder and CEO of Simbian, joins us to discuss how AI Agents may change the cyber landscape. We’re countin’ down the top ten least secure passwords. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Ambuj Kumar, Co-founder and CEO of Simbian, joins us to discuss how AI Agents are going to change the cyber landscape.

Selected Reading
1,400 Pegasus spyware infections detailed in WhatsApp’s lawsuit filings (The Record)
Glove Stealer Malware Bypasses Chrome's App-Bound Encryption (SecurityWeek)
watchTowr Finds New Zero-Day Vulnerability in Fortinet Products ( Infosecurity Magazine)
LodaRAT: Established malware, new victim patterns (Rapid7 Blog)
CISA Warns of Two More Palo Alto Expedition Flaws Exploited in Attacks (SecurityWeek)
Microsoft Power Pages misconfigs exposing sensitive data (The Register)
Iranian Threat Actors Mimic North Korean Job Scam Techniques (BankInfo Security)
Hackers Lurking in Critical Infrastructure to Wage Attacks (BankInfo Security)
Cybercriminal devoid of boundaries gets 10-year prison sentence (The Register)
Top 200 Most Common Passwords (NordPass)

Special voting request. 
Just when you thought voting was over for this year…It’s time to vote…again!
The N2K CyberWire hosting team of Dave Bittner, Maria Varmazis, and Joseph Carrigan have been nominated for the Creator of the Year category in the Baltimore region’s 2024 Technical.ly Awards for their incredible work on the Hacking Humans podcast!
If you're a fan of Hacking Humans, we’d be thrilled to have your support! Please cast your vote here. (Make sure you select the “Baltimore” region). Thanks for your vote! Voting ends Monday, November 18th, so don't delay!

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts wit
h us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 15 Nov 2024 21:10:00 -0000</pubDate>
      <itunes:title>One tap, total access: Pegasus exploits unveiled.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2191</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Unredacted court filings from WhatsApp’s 2019 lawsuit against NSO Group reveal the scope of spyware infections. Glove Stealer can bypass App-Bound Encryption in Chromium-based browsers. Researchers uncover a new zero-day vulnerability in Fortinet’s FortiManager. Rapid7 detects an updated version of LodaRAT. CISA warns of active exploitation of Palo Alto Networks’ Expedition tool. Misconfigured Microsoft Power Pages accounts expose sensitive data. Iranian state hackers mimic North Koreans in fake job scams. Australia warns its critical infrastructure providers about state sponsored embedded malware. An especially cruel cybercriminal gets ten years in the slammer. Guest Ambuj Kumar, Co-founder and CEO of Simbian, joins us to discuss how AI Agents may change the cyber landscape. We’re countin’ down the top ten least secure passwords. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Ambuj Kumar, Co-founder and CEO of Simbian, joins us to discuss how AI Agents are going to change the cyber landscape.

Selected Reading
1,400 Pegasus spyware infections detailed in WhatsApp’s lawsuit filings (The Record)
Glove Stealer Malware Bypasses Chrome's App-Bound Encryption (SecurityWeek)
watchTowr Finds New Zero-Day Vulnerability in Fortinet Products ( Infosecurity Magazine)
LodaRAT: Established malware, new victim patterns (Rapid7 Blog)
CISA Warns of Two More Palo Alto Expedition Flaws Exploited in Attacks (SecurityWeek)
Microsoft Power Pages misconfigs exposing sensitive data (The Register)
Iranian Threat Actors Mimic North Korean Job Scam Techniques (BankInfo Security)
Hackers Lurking in Critical Infrastructure to Wage Attacks (BankInfo Security)
Cybercriminal devoid of boundaries gets 10-year prison sentence (The Register)
Top 200 Most Common Passwords (NordPass)

Special voting request. 
Just when you thought voting was over for this year…It’s time to vote…again!
The N2K CyberWire hosting team of Dave Bittner, Maria Varmazis, and Joseph Carrigan have been nominated for the Creator of the Year category in the Baltimore region’s 2024 Technical.ly Awards for their incredible work on the Hacking Humans podcast!
If you're a fan of Hacking Humans, we’d be thrilled to have your support! Please cast your vote here. (Make sure you select the “Baltimore” region). Thanks for your vote! Voting ends Monday, November 18th, so don't delay!

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts wit
h us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Unredacted court filings from WhatsApp’s 2019 lawsuit against NSO Group reveal the scope of spyware infections. Glove Stealer can bypass App-Bound Encryption in Chromium-based browsers. Researchers uncover a new zero-day vulnerability in Fortinet’s FortiManager. Rapid7 detects an updated version of LodaRAT. CISA warns of active exploitation of Palo Alto Networks’ Expedition tool. Misconfigured Microsoft Power Pages accounts expose sensitive data. Iranian state hackers mimic North Koreans in fake job scams. Australia warns its critical infrastructure providers about state sponsored embedded malware. An especially cruel cybercriminal gets ten years in the slammer. Guest Ambuj Kumar, Co-founder and CEO of Simbian, joins us to discuss how AI Agents may change the cyber landscape. We’re countin’ down the top ten least secure passwords. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/ambujkumar/">Ambuj Kumar</a>, Co-founder and CEO of <a href="https://simbian.ai/">Simbian</a>, joins us to discuss how AI Agents are going to change the cyber landscape.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/pegasus-spyware-infections-detailed-whatsapp-lawsuit">1,400 Pegasus spyware infections detailed in WhatsApp’s lawsuit filings</a> (The Record)</p><p><a href="https://www.securityweek.com/glove-stealer-malware-bypasses-chromes-app-bound-encryption/">Glove Stealer Malware Bypasses Chrome's App-Bound Encryption</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/watchtowr-new-vulnerability/">watchTowr Finds New Zero-Day Vulnerability in Fortinet Products</a> ( Infosecurity Magazine)</p><p><a href="https://www.rapid7.com/blog/post/2024/11/12/lodarat-established-malware-new-victim-patterns/">LodaRAT: Established malware, new victim patterns </a>(Rapid7 Blog)</p><p><a href="https://www.securityweek.com/cisa-warns-of-two-more-palo-alto-expedition-flaws-exploited-in-attacks/">CISA Warns of Two More Palo Alto Expedition Flaws Exploited in Attacks</a> (SecurityWeek)</p><p><a href="https://www.theregister.com/2024/11/15/microsoft_power_pages_misconfigurations/">Microsoft Power Pages misconfigs exposing sensitive data</a> (The Register)</p><p><a href="https://www.bankinfosecurity.com/iranian-threat-actors-mimic-north-korean-job-scam-techniques-a-26818">Iranian Threat Actors Mimic North Korean Job Scam Techniques</a> (BankInfo Security)</p><p><a href="https://www.bankinfosecurity.com/hackers-lurking-in-critical-infrastructure-to-wage-attacks-a-26815">Hackers Lurking in Critical Infrastructure to Wage Attacks</a> (BankInfo Security)</p><p><a href="https://www.theregister.com/2024/11/14/cybercriminal_devoid_of_boundaries_gets/">Cybercriminal devoid of boundaries gets 10-year prison sentence</a> (The Register)</p><p><a href="https://nordpass.com/most-common-passwords-list/">Top 200 Most Common Passwords</a> (NordPass)</p><p><br></p><h2><strong>Special voting request. </strong></h2><p>Just when you thought voting was over for this year…It’s time to vote…again!</p><p>The N2K CyberWire hosting team of <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a>,<a href="https://www.linkedin.com/in/varmazis/"> </a><a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a>, and<a href="https://www.linkedin.com/in/joecarrigan/"> </a><a href="https://www.linkedin.com/in/joecarrigan/">Joseph Carrigan</a> have been nominated for the Creator of the Year category in the Baltimore region’s 2024<a href="https://www.linkedin.com/company/technicallynews/"> </a><a href="https://www.linkedin.com/company/technicallynews/">Technical.ly</a> Awards for their incredible work on the <a href="https://thecyberwire.com/podcasts/hacking-humans">Hacking Humans</a> podcast!</p><p>If you're a fan of Hacking Humans, we’d be thrilled to have your support! Please cast your vote <a href="https://technical.ly/series/technically-awards/">here</a>. (Make sure you select the “Baltimore” region). Thanks for your vote! Voting ends Monday, November 18th, so don't delay!</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts wit</p><p>h us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2175</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7a93dcc-b95e-11ee-8cf8-3f93788f3b6b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7605843287.mp3?updated=1731700953" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Eavesdropping on America’s eyes and ears.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2190/notes</link>
      <description>The Feds confirm Chinese penetration of U.S. telecom wiretap systems. Anne Neuberger outlines top cybersecurity challenges facing the upcoming Trump administration. Former Air National Guardsman Jack Teixeira gets a 15-year prison sentence for leaking classified U.S. military documents. A Chinese national faces up to 20 years in prison after pleading guilty to money laundering for “pig-butchering” scams. Researchers say a popular pregnancy app has serious, unaddressed security vulnerabilities. NIST misses its deadline for clearing the NVD backlog. A B2B demand generation company confirms a leak affecting 122 million people. HHS warns healthcare organizations to be on the lookout for Godzilla. Moody’s designates the industries at highest risk of cyber attack. Guest Sarah Hutchins, Partner at Parker Poe, discusses the growing number of state data privacy laws. An AI grandma keeps scammers on the line. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Sarah Hutchins, Partner at Parker Poe, discusses the growing number of state data privacy laws. You can listen to Sarah’s full conversation including litigation trends related to targeted advertising and wiretapping, and key takeaways for companies on cybersecurity practices and risk reporting on today’s Caveat episode. 

Selected Reading
FBI confirms China-backed hackers breached US telecom giants to steal wiretap data (TechCrunch)
Top White House cyber official urges Trump to focus on ransomware, China (The Record)
Chinese national faces 20 years in US prison for laundering pig-butchering proceeds (The Record)
IT specialist Jack Teixeira jailed for 15 years after leaking classified military documents on Discord (Bitdefender)
Pregnancy Tracking App ‘What to Expect’ Refuses to Fix Issue that Allows Full Account Takeover (404 Media)
NIST Explains Why It Failed to Clear CVE Backlog (SecurityWeek)
Leaked info of 122 million linked to B2B data aggregator breach (Bleeping Computer)
Feds Warn of Godzilla Webshell Threats to Health Sector (BankInfo Security)
Industries with highest cyber risk unveiled by Moody’s Rating (SC Media)
O2 unveils Daisy, the AI granny wasting scammers’ time (Virgin Media O2) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 14 Nov 2024 21:10:00 -0000</pubDate>
      <itunes:title>Eavesdropping on America’s eyes and ears.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2190</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The Feds confirm Chinese penetration of U.S. telecom wiretap systems. Anne Neuberger outlines top cybersecurity challenges facing the upcoming Trump administration. Former Air National Guardsman Jack Teixeira gets a 15-year prison sentence for leaking classified U.S. military documents. A Chinese national faces up to 20 years in prison after pleading guilty to money laundering for “pig-butchering” scams. Researchers say a popular pregnancy app has serious, unaddressed security vulnerabilities. NIST misses its deadline for clearing the NVD backlog. A B2B demand generation company confirms a leak affecting 122 million people. HHS warns healthcare organizations to be on the lookout for Godzilla. Moody’s designates the industries at highest risk of cyber attack. Guest Sarah Hutchins, Partner at Parker Poe, discusses the growing number of state data privacy laws. An AI grandma keeps scammers on the line. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Sarah Hutchins, Partner at Parker Poe, discusses the growing number of state data privacy laws. You can listen to Sarah’s full conversation including litigation trends related to targeted advertising and wiretapping, and key takeaways for companies on cybersecurity practices and risk reporting on today’s Caveat episode. 

Selected Reading
FBI confirms China-backed hackers breached US telecom giants to steal wiretap data (TechCrunch)
Top White House cyber official urges Trump to focus on ransomware, China (The Record)
Chinese national faces 20 years in US prison for laundering pig-butchering proceeds (The Record)
IT specialist Jack Teixeira jailed for 15 years after leaking classified military documents on Discord (Bitdefender)
Pregnancy Tracking App ‘What to Expect’ Refuses to Fix Issue that Allows Full Account Takeover (404 Media)
NIST Explains Why It Failed to Clear CVE Backlog (SecurityWeek)
Leaked info of 122 million linked to B2B data aggregator breach (Bleeping Computer)
Feds Warn of Godzilla Webshell Threats to Health Sector (BankInfo Security)
Industries with highest cyber risk unveiled by Moody’s Rating (SC Media)
O2 unveils Daisy, the AI granny wasting scammers’ time (Virgin Media O2) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Feds confirm Chinese penetration of U.S. telecom wiretap systems. Anne Neuberger outlines top cybersecurity challenges facing the upcoming Trump administration. Former Air National Guardsman Jack Teixeira gets a 15-year prison sentence for leaking classified U.S. military documents. A Chinese national faces up to 20 years in prison after pleading guilty to money laundering for “pig-butchering” scams. Researchers say a popular pregnancy app has serious, unaddressed security vulnerabilities. NIST misses its deadline for clearing the NVD backlog. A B2B demand generation company confirms a leak affecting 122 million people. HHS warns healthcare organizations to be on the lookout for Godzilla. Moody’s designates the industries at highest risk of cyber attack. Guest Sarah Hutchins, Partner at Parker Poe, discusses the growing number of state data privacy laws. An AI grandma keeps scammers on the line. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/sarah-hutchins-504a2938/">Sarah Hutchins</a>, Partner at <a href="https://www.parkerpoe.com/">Parker Poe</a>, discusses the growing number of state data privacy laws. You can listen to Sarah’s full conversation including litigation trends related to targeted advertising and wiretapping, and key takeaways for companies on cybersecurity practices and risk reporting on today’s <a href="https://thecyberwire.com/podcasts/caveat/240/notes">Caveat episode</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://techcrunch.com/2024/11/14/us-confirms-china-backed-hackers-breached-telecom-providers-to-steal-wiretap-data/">FBI confirms China-backed hackers breached US telecom giants to steal wiretap data</a> (TechCrunch)</p><p><a href="https://therecord.media/neuberger-urges-trump-admin-focus-china-ransomware">Top White House cyber official urges Trump to focus on ransomware, China</a> (The Record)</p><p><a href="https://therecord.media/chinese-national-faces-20-years-money-laundering-pig-butchering">Chinese national faces 20 years in US prison for laundering pig-butchering proceeds</a> (The Record)</p><p><a href="https://www.bitdefender.com/en-us/blog/hotforsecurity/it-specialist-jack-teixeira-jailed-for-15-years-after-leaking-classified-military-documents-on-discord">IT specialist Jack Teixeira jailed for 15 years after leaking classified military documents on Discord</a> (Bitdefender)</p><p><a href="https://www.404media.co/pregnancy-tracking-app-what-to-expect-refuses-to-fix-issue-that-allows-full-account-takeover-2/">Pregnancy Tracking App ‘What to Expect’ Refuses to Fix Issue that Allows Full Account Takeover</a> (404 Media)</p><p><a href="https://www.securityweek.com/nist-explains-why-it-failed-to-clear-cve-backlog/">NIST Explains Why It Failed to Clear CVE Backlog</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/leaked-info-of-122-million-linked-to-b2b-data-aggregator-breach/">Leaked info of 122 million linked to B2B data aggregator breach</a> (Bleeping Computer)</p><p><a href="https://www.bankinfosecurity.com/feds-warn-godzilla-webshell-threats-to-health-sector-a-26803">Feds Warn of Godzilla Webshell Threats to Health Sector</a> (BankInfo Security)</p><p><a href="https://www.scworld.com/brief/industries-with-highest-cyber-risk-unveiled-by-moodys-rating">Industries with highest cyber risk unveiled by Moody’s Rating</a> (SC Media)</p><p><a href="https://news.virginmediao2.co.uk/o2-unveils-daisy-the-ai-granny-wasting-scammers-time/">O2 unveils Daisy, the AI granny wasting scammers’ time</a> (Virgin Media O2) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1616</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b770e03a-b95e-11ee-8cf8-bff730c6d915]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1352678058.mp3?updated=1731612809" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>‘Bitcoin Jesus’ and Sheboygan face problems.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2189/notes</link>
      <description>Federal agencies and Five Eyes partners list the past year’s most exploited vulnerabilities. U.S. authorities hand down indictments in the Snowflake customer breach. Patch Tuesday updates. Zoom discloses multiple vulnerabilities. A China-linked hacker group has compromised Tibetan media and university websites. A cyberattack on a Dutch company affects over 2,000 U.S. grocery stores. Sheboygan suffers a ransomware attack. The White House plans to support a controversial UN cybercrime treaty. On today’s CertByte segment, N2K’s Chris Hare is joined by Dan Neville to break down a question from the CompTIA® Security+ certification Practice Test.  Bitcoin Jesus faces $48 million in tax fraud charges. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment

On CertByte, host Chris Hare, content developer and project management specialist at N2K, shares practice questions and a study tip to help you achieve the professional certifications you need to fast-track your career growth in IT, cyber security, or project management.

In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by Dan Nevllie to break down a question targeting the CompTIA® Security+ (SY0-701) certification. Today’s question comes from N2K’s CompTIA® Security+ Practice Test.

According to CompTIA®, Security+ is "the most widely adopted ISO/ANSI-accredited early career cybersecurity certification on the market." The exam is geared towards anyone who already holds a Network+ cert, and has two years of experience in a security or a systems admin role.To learn more about this and other related topics under this objective, please refer to the following resources: CompTIA Security+ Study Guide with over 500 Practice Test Questions (Sybex Study Guide), Chapter 17: Risk Management and Privacy and CompTIA Security+ Get Certified Get Ahead: SY0-701 Study Guide Chapter 11: Implementing Policies to Mitigate Risk.

Have a question that you’d like to see covered? Email us at certbyte@n2k.com. 

Please note: The questions and answers provided here and on our site are not actual current or prior questions and answers from these certification publishers or providers.

Additional sources: www.comptia.org

Selected Reading

FBI, CISA, and NSA reveal most exploited vulnerabilities of 2023 (Bleeping Computer)
Here’s the indictment against two men allegedly responsible for Snowflake customer breach (CyberScoop)
Microsoft Patch Tuesday, November 2024 Edition (Krebs on Security)
ICS Patch Tuesday: Security Advisories Released by CISA, Schneider, Siemens, Rockwell (SecurityWeek)
Zoom App Vulnerability Let Attackers Execute Remote Code (Cyber Security News)
China-linked group hacked Tibetan media and university sites to distribute Cobalt Strike payload (The Record)
Dutch company behind Hannaford, Stop &amp; Shop says cyber issue affecting US network (The Record)
City of Sheboygan hit by apparent ransomware attack (WPR)
Biden Administration to Support UN Cyber Treaty Despite Concerns Over Misuse (Bloomberg)
‘Bitcoin Jesus’ Fights IRS Tax Evasion Case From Spanish Island (Bloomberg)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 13 Nov 2024 21:00:00 -0000</pubDate>
      <itunes:title>‘Bitcoin Jesus’ and Sheboygan face problems.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2189</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Federal agencies and Five Eyes partners list the past year’s most exploited vulnerabilities. U.S. authorities hand down indictments in the Snowflake customer breach. Patch Tuesday updates. Zoom discloses multiple vulnerabilities. A China-linked hacker group has compromised Tibetan media and university websites. A cyberattack on a Dutch company affects over 2,000 U.S. grocery stores. Sheboygan suffers a ransomware attack. The White House plans to support a controversial UN cybercrime treaty. On today’s CertByte segment, N2K’s Chris Hare is joined by Dan Neville to break down a question from the CompTIA® Security+ certification Practice Test.  Bitcoin Jesus faces $48 million in tax fraud charges. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment

On CertByte, host Chris Hare, content developer and project management specialist at N2K, shares practice questions and a study tip to help you achieve the professional certifications you need to fast-track your career growth in IT, cyber security, or project management.

In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by Dan Nevllie to break down a question targeting the CompTIA® Security+ (SY0-701) certification. Today’s question comes from N2K’s CompTIA® Security+ Practice Test.

According to CompTIA®, Security+ is "the most widely adopted ISO/ANSI-accredited early career cybersecurity certification on the market." The exam is geared towards anyone who already holds a Network+ cert, and has two years of experience in a security or a systems admin role.To learn more about this and other related topics under this objective, please refer to the following resources: CompTIA Security+ Study Guide with over 500 Practice Test Questions (Sybex Study Guide), Chapter 17: Risk Management and Privacy and CompTIA Security+ Get Certified Get Ahead: SY0-701 Study Guide Chapter 11: Implementing Policies to Mitigate Risk.

Have a question that you’d like to see covered? Email us at certbyte@n2k.com. 

Please note: The questions and answers provided here and on our site are not actual current or prior questions and answers from these certification publishers or providers.

Additional sources: www.comptia.org

Selected Reading

FBI, CISA, and NSA reveal most exploited vulnerabilities of 2023 (Bleeping Computer)
Here’s the indictment against two men allegedly responsible for Snowflake customer breach (CyberScoop)
Microsoft Patch Tuesday, November 2024 Edition (Krebs on Security)
ICS Patch Tuesday: Security Advisories Released by CISA, Schneider, Siemens, Rockwell (SecurityWeek)
Zoom App Vulnerability Let Attackers Execute Remote Code (Cyber Security News)
China-linked group hacked Tibetan media and university sites to distribute Cobalt Strike payload (The Record)
Dutch company behind Hannaford, Stop &amp; Shop says cyber issue affecting US network (The Record)
City of Sheboygan hit by apparent ransomware attack (WPR)
Biden Administration to Support UN Cyber Treaty Despite Concerns Over Misuse (Bloomberg)
‘Bitcoin Jesus’ Fights IRS Tax Evasion Case From Spanish Island (Bloomberg)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Federal agencies and Five Eyes partners list the past year’s most exploited vulnerabilities. U.S. authorities hand down indictments in the Snowflake customer breach. Patch Tuesday updates. Zoom discloses multiple vulnerabilities. A China-linked hacker group has compromised Tibetan media and university websites. A cyberattack on a Dutch company affects over 2,000 U.S. grocery stores. Sheboygan suffers a ransomware attack. The White House plans to support a controversial UN cybercrime treaty. On today’s CertByte segment, N2K’s Chris Hare is joined by Dan Neville to break down a question from the CompTIA® Security+ certification Practice Test.  Bitcoin Jesus faces $48 million in tax fraud charges. </p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p><br></p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CertByte Segment</h2><p><br></p><p>On CertByte, host<a href="https://www.linkedin.com/in/chrisharepmp/"> Chris Hare</a>, content developer and project management specialist at<a href="https://www.n2k.com/"> N2K</a>, shares practice questions and a study tip to help you achieve the professional certifications you need to fast-track your career growth in IT, cyber security, or project management.</p><p><br></p><p>In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by<a href="https://www.linkedin.com/in/danneville1/"> Dan Nevllie</a> to break down a question targeting the CompTIA® Security+ (SY0-701) certification. Today’s question comes from<a href="https://certify.cybervista.net/products/comptia/comptia-security-sy0-701-training-course/"> N2K’s CompTIA® Security+ Practice Test</a>.</p><p><br></p><p>According to CompTIA®, Security+ is "the most widely adopted ISO/ANSI-accredited early career cybersecurity certification on the market." The exam is geared towards anyone who already holds a Network+ cert, and has two years of experience in a security or a systems admin role.To learn more about this and other related topics under this objective, please refer to the following resources: CompTIA Security+ Study Guide with over 500 Practice Test Questions (Sybex Study Guide), Chapter 17: Risk Management and Privacy and CompTIA Security+ Get Certified Get Ahead: SY0-701 Study Guide Chapter 11: Implementing Policies to Mitigate Risk.</p><p><br></p><p>Have a question that you’d like to see covered? Email us at certbyte@n2k.com. </p><p><br></p><p>Please note: The questions and answers provided here and on our site are not actual current or prior questions and answers from these certification publishers or providers.</p><p><br></p><p>Additional sources:<a href="http://www.comptia.org/"> www.comptia.org</a></p><h2><br></h2><h2>Selected Reading</h2><p><br></p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-cisa-and-nsa-reveal-most-exploited-vulnerabilities-of-2023/">FBI, CISA, and NSA reveal most exploited vulnerabilities of 2023</a> (Bleeping Computer)</p><p><a href="https://cyberscoop.com/connor-moucka-snowflake-data-breach-indictment-john-binns/">Here’s the indictment against two men allegedly responsible for Snowflake customer breach</a> (CyberScoop)</p><p><a href="https://krebsonsecurity.com/2024/11/microsoft-patch-tuesday-november-2024-edition/">Microsoft Patch Tuesday, November 2024 Edition</a> (Krebs on Security)</p><p><a href="https://www.securityweek.com/ics-patch-tuesday-security-advisories-released-by-cisa-schneider-siemens-rockwell/">ICS Patch Tuesday: Security Advisories Released by CISA, Schneider, Siemens, Rockwell</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/zoom-app-vulnerability/">Zoom App Vulnerability Let Attackers Execute Remote Code</a> (Cyber Security News)</p><p><a href="https://therecord.media/china-linked-tibetan-group-hacked-sites">China-linked group hacked Tibetan media and university sites to distribute Cobalt Strike payload</a> (The Record)</p><p><a href="https://therecord.media/dutch-company-stop-shop-hannaford-cyber">Dutch company behind Hannaford, Stop &amp; Shop says cyber issue affecting US network</a> (The Record)</p><p><a href="https://www.wpr.org/news/sheboygan-hit-apparent-ransomware-attack">City of Sheboygan hit by apparent ransomware attack</a> (WPR)</p><p><a href="https://www.bloomberg.com/news/articles/2024-11-11/biden-administration-to-support-controversial-un-cyber-treaty">Biden Administration to Support UN Cyber Treaty Despite Concerns Over Misuse</a> (Bloomberg)</p><p><a href="https://www.bloomberg.com/news/articles/2024-11-13/-bitcoin-jesus-fights-irs-tax-evasion-case-from-spanish-island">‘Bitcoin Jesus’ Fights IRS Tax Evasion Case From Spanish Island</a> (Bloomberg)</p><p><br></p><h2>Share your feedback.</h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p><br></p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1586</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7387b64-b95e-11ee-8cf8-cb3f6d74ed05]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5276364235.mp3?updated=1731527628" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware as a public health crisis. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2188/notes</link>
      <description>At the U.N. Anne Neuberger frames ransomware as a growing public health crisis. Amazon confirms a MOVEit-related data breach. SAP provides patches and mitigations for a variety of flaws. Researchers identify North Korean hackers embedding malware in macOS applications. Form I-9 Compliance reports a data breach impacting over 193,000 individuals. Hot Topic confirms a breach affecting over 54 million customers. Halliburton reports a $35 million ransomware event. Ymir ransomware follows in the footsteps of RustyStealer.  Threat actors prepare for a second Trump presidency. A Venezuelan man gets 25 years for romance scam kidnappings. Our guest is Tim Starks from CyberScoop sharing what he’s hearing from Washington insiders as they prepare for the next Trump administration. The Secret Service wonders if warrants are really required.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Tim Starks from CyberScoop sharing what he’s hearing from Washington insiders as they prepare for the next Trump administration.

Selected Reading
White House Slams Russia Over Ransomware's Healthcare Hits (BankInfo Security)
Amazon employee data stolen by hacker, company confirms (Silicon Republic)
SAP Patches High-Severity Vulnerability in Web Dispatcher (SecurityWeek)
North Korean-linked hackers were caught experimenting with new macOS malware (CyberScoop)
Form I-9 Compliance Data Breach Impacts Over 190,000 People (SecurityWeek)
Hot Topic Data Breach: A Massive Leak Exposes Millions of Customer Records (SOCRadar)
Energy Giant Halliburton Reveals $35m Ransomware Loss (Infosecurity Magazine)
New Ymir ransomware partners with RustyStealer in attacks (Bleeping Computer)
How Global Threat Actors May Respond to a Second Trump Term (GovInfo Security)
Man Gets 25 Years for Online Dating Hostage Scams Targeting Americans (Hackread)
'FYI. A Warrant Isn’t Needed': Secret Service Says You Agreed To Be Tracked With Location Data (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Nov 2024 21:00:00 -0000</pubDate>
      <itunes:title>Ransomware as a public health crisis. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2188</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>At the U.N. Anne Neuberger frames ransomware as a growing public health crisis. Amazon confirms a MOVEit-related data breach. SAP provides patches and mitigations for a variety of flaws. Researchers identify North Korean hackers embedding malware in macOS applications. Form I-9 Compliance reports a data breach impacting over 193,000 individuals. Hot Topic confirms a breach affecting over 54 million customers. Halliburton reports a $35 million ransomware event. Ymir ransomware follows in the footsteps of RustyStealer.  Threat actors prepare for a second Trump presidency. A Venezuelan man gets 25 years for romance scam kidnappings. Our guest is Tim Starks from CyberScoop sharing what he’s hearing from Washington insiders as they prepare for the next Trump administration. The Secret Service wonders if warrants are really required.

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Tim Starks from CyberScoop sharing what he’s hearing from Washington insiders as they prepare for the next Trump administration.

Selected Reading
White House Slams Russia Over Ransomware's Healthcare Hits (BankInfo Security)
Amazon employee data stolen by hacker, company confirms (Silicon Republic)
SAP Patches High-Severity Vulnerability in Web Dispatcher (SecurityWeek)
North Korean-linked hackers were caught experimenting with new macOS malware (CyberScoop)
Form I-9 Compliance Data Breach Impacts Over 190,000 People (SecurityWeek)
Hot Topic Data Breach: A Massive Leak Exposes Millions of Customer Records (SOCRadar)
Energy Giant Halliburton Reveals $35m Ransomware Loss (Infosecurity Magazine)
New Ymir ransomware partners with RustyStealer in attacks (Bleeping Computer)
How Global Threat Actors May Respond to a Second Trump Term (GovInfo Security)
Man Gets 25 Years for Online Dating Hostage Scams Targeting Americans (Hackread)
'FYI. A Warrant Isn’t Needed': Secret Service Says You Agreed To Be Tracked With Location Data (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>At the U.N. Anne Neuberger frames ransomware as a growing public health crisis. Amazon confirms a MOVEit-related data breach. SAP provides patches and mitigations for a variety of flaws. Researchers identify North Korean hackers embedding malware in macOS applications. Form I-9 Compliance reports a data breach impacting over 193,000 individuals. Hot Topic confirms a breach affecting over 54 million customers. Halliburton reports a $35 million ransomware event. Ymir ransomware follows in the footsteps of RustyStealer.  Threat actors prepare for a second Trump presidency. A Venezuelan man gets 25 years for romance scam kidnappings. Our guest is Tim Starks from CyberScoop sharing what he’s hearing from Washington insiders as they prepare for the next Trump administration. The Secret Service wonders if warrants are really required.</p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p><br></p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/tstarks/">Tim Starks</a> from <a href="https://cyberscoop.com/">CyberScoop</a> sharing what he’s hearing from Washington insiders as they prepare for the next Trump administration.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bankinfosecurity.com/white-house-slams-russia-over-ransomwares-healthcare-hits-a-26781">White House Slams Russia Over Ransomware's Healthcare Hits</a> (BankInfo Security)</p><p><a href="https://www.siliconrepublic.com/enterprise/amazon-employee-data-stolen-hack-moveit-breach">Amazon employee data stolen by hacker, company confirms</a> (Silicon Republic)</p><p><a href="https://www.securityweek.com/sap-patches-high-severity-vulnerability-in-web-dispatcher/">SAP Patches High-Severity Vulnerability in Web Dispatcher</a> (SecurityWeek)</p><p><a href="https://cyberscoop.com/north-korea-macos-malware-flutter-jamf/">North Korean-linked hackers were caught experimenting with new macOS malware</a> (CyberScoop)</p><p><a href="https://www.securityweek.com/form-i-9-compliance-data-breach-impacts-over-190000-people/">Form I-9 Compliance Data Breach Impacts Over 190,000 People</a> (SecurityWeek)</p><p><a href="https://socradar.io/hot-topic-data-breach-a-massive-leak-exposes-millions-of-customer-records/">Hot Topic Data Breach: A Massive Leak Exposes Millions of Customer Records</a> (SOCRadar)</p><p><a href="https://www.infosecurity-magazine.com/news/energy-giant-halliburton-35m/">Energy Giant Halliburton Reveals $35m Ransomware Loss</a> (Infosecurity Magazine)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-ymir-ransomware-partners-with-rustystealer-in-attacks/">New Ymir ransomware partners with RustyStealer in attacks</a> (Bleeping Computer)</p><p><a href="https://www.govinfosecurity.com/how-global-threat-actors-may-respond-to-second-trump-term-a-26788">How Global Threat Actors May Respond to a Second Trump Term</a> (GovInfo Security)</p><p><a href="https://hackread.com/online-dating-hostage-scams-targeting-americans/">Man Gets 25 Years for Online Dating Hostage Scams Targeting Americans</a> (Hackread)</p><p><a href="https://www.404media.co/fyi-a-warrant-isnt-needed-secret-service-says-you-agreed-to-be-tracked-with-location-data/">'FYI. A Warrant Isn’t Needed': Secret Service Says You Agreed To Be Tracked With Location Data</a> (404 Media)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1745</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b6ff9632-b95e-11ee-8cf8-1b5e8149d9ea]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4300028631.mp3?updated=1731440932" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Solution Spotlight: Rebuilding trust in the wake of tech calamities. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/79/notes</link>
      <description>In this special edition of our podcast, Simone Petrella sits down with cybersecurity luminary Alex Stamos, Chief Information Security Officer at SentinelOne, to delve into one of the most challenging years in tech history. 2024 has seen unprecedented breaches of multinational corporations, high-stakes attacks from state actors, massive data leaks, and the largest global IT failure on record. As both a seasoned security executive and respected thought leader, Stamos offers a firsthand perspective on how the security landscape is evolving under these pressures.

In this exclusive keynote discussion, Stamos draws from his extensive experience to share hard-won lessons from the upheavals of 2024, discussing how companies can build — and rebuild — trust amidst this environment of constant threat. What new responsibilities do organizations have to their customers, employees, shareholders, and society? And what major shifts can we expect across cybersecurity and IT practices in response to these cascading challenges? Tune in for a deep dive into how security professionals are rising to meet their roles in a world brimming with motivated and capable adversaries.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 10 Nov 2024 08:00:00 -0000</pubDate>
      <itunes:title>Solution Spotlight: Rebuilding trust in the wake of tech calamities. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>79</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this special edition of our podcast, Simone Petrella sits down with cybersecurity luminary Alex Stamos, Chief Information Security Officer at SentinelOne, to delve into one of the most challenging years in tech history. 2024 has seen unprecedented breaches of multinational corporations, high-stakes attacks from state actors, massive data leaks, and the largest global IT failure on record. As both a seasoned security executive and respected thought leader, Stamos offers a firsthand perspective on how the security landscape is evolving under these pressures.

In this exclusive keynote discussion, Stamos draws from his extensive experience to share hard-won lessons from the upheavals of 2024, discussing how companies can build — and rebuild — trust amidst this environment of constant threat. What new responsibilities do organizations have to their customers, employees, shareholders, and society? And what major shifts can we expect across cybersecurity and IT practices in response to these cascading challenges? Tune in for a deep dive into how security professionals are rising to meet their roles in a world brimming with motivated and capable adversaries.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this special edition of our podcast, <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a> sits down with cybersecurity luminary <a href="https://www.linkedin.com/in/alexstamos/">Alex Stamos</a>, Chief Information Security Officer at <a href="https://www.linkedin.com/company/sentinelone/">SentinelOne</a>, to delve into one of the most challenging years in tech history. 2024 has seen unprecedented breaches of multinational corporations, high-stakes attacks from state actors, massive data leaks, and the largest global IT failure on record. As both a seasoned security executive and respected thought leader, Stamos offers a firsthand perspective on how the security landscape is evolving under these pressures.</p><p><br></p><p>In this exclusive <a href="https://events.isc2.org/p/s/keynote-building-a-trustworthy-company-after-the-tech-calamities-of-2024-plus-isc2-awards-announcement-6432">keynote discussion</a>, Stamos draws from his extensive experience to share hard-won lessons from the upheavals of 2024, discussing how companies can build — and rebuild — trust amidst this environment of constant threat. What new responsibilities do organizations have to their customers, employees, shareholders, and society? And what major shifts can we expect across cybersecurity and IT practices in response to these cascading challenges? Tune in for a deep dive into how security professionals are rising to meet their roles in a world brimming with motivated and capable adversaries.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1357</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a0a6802c-9e0e-11ef-b1a4-7f97656d9ddc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3022596727.mp3?updated=1731097619" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kevin Magee: Focus on the archer. [CSO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/41/notes</link>
      <description>Enjoy this special encore episode where we are joined by Chief Security Officer of Microsoft Canada Kevin Magee, he's sharing his background as a historian and how it applies to his work in cybersecurity. Likening himself to a dashing Indiana Jones, Kevin talks about how he sees history unfolding and the most interesting things right now are happening in security. Spending time tinkering with things in the university's computer room under the stairs gave way to Kevin's love affair with technology. As Chief Security Officer, Kevin says he uses an analogy: "I think we focus on the arrows, not the the archer" meaning there's too much focus on the attacks rather than the ones mounting them. As a historian and witness to our current history, Kevin sees the changes all affecting cybersecurity. We thank Kevin for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 10 Nov 2024 08:00:00 -0000</pubDate>
      <itunes:title>Kevin Magee: Focus on the archer. [CSO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>41</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this special encore episode where we are joined by Chief Security Officer of Microsoft Canada Kevin Magee, he's sharing his background as a historian and how it applies to his work in cybersecurity. Likening himself to a dashing Indiana Jones, Kevin talks about how he sees history unfolding and the most interesting things right now are happening in security. Spending time tinkering with things in the university's computer room under the stairs gave way to Kevin's love affair with technology. As Chief Security Officer, Kevin says he uses an analogy: "I think we focus on the arrows, not the the archer" meaning there's too much focus on the attacks rather than the ones mounting them. As a historian and witness to our current history, Kevin sees the changes all affecting cybersecurity. We thank Kevin for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special encore episode where we are joined by Chief Security Officer of Microsoft Canada Kevin Magee, he's sharing his background as a historian and how it applies to his work in cybersecurity. Likening himself to a dashing Indiana Jones, Kevin talks about how he sees history unfolding and the most interesting things right now are happening in security. Spending time tinkering with things in the university's computer room under the stairs gave way to Kevin's love affair with technology. As Chief Security Officer, Kevin says he uses an analogy: "I think we focus on the arrows, not the the archer" meaning there's too much focus on the attacks rather than the ones mounting them. As a historian and witness to our current history, Kevin sees the changes all affecting cybersecurity. We thank Kevin for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>444</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c096d8ee-9e10-11ef-baf4-571bed69c897]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5896240308.mp3?updated=1731098327" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A firewall wake up call. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/313/notes</link>
      <description>Enjoy this special encore episode, where we are joined by Jon Williams from Bishop Fox, as he is sharing their research on "It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable." SonicWall published advisories for CVE-2022-22274 and CVE-2023-0656 a year apart after finding that NGFW series 6 and 7 devices are affected by two unauthenticated denial-of-service vulnerabilities.
The research states "Our research found that the two issues are fundamentally the same but exploitable at different HTTP URI paths due to reuse of a vulnerable code pattern." They also found that when they scanned SonicWall firewalls with management interfaces exposed to the internet, they found that 76% are vulnerable to one or both issues.
The research can be found here: 
It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Nov 2024 08:00:00 -0000</pubDate>
      <itunes:title>A firewall wake up call. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>313</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b68b60fa-b95e-11ee-8cf8-af0489a47c7b/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Enjoy this special encore episode, where we are joined by Jon Williams from Bishop Fox, as he is sharing their research on "It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable." SonicWall published advisories for CVE-2022-22274 and CVE-2023-0656 a year apart after finding that NGFW series 6 and 7 devices are affected by two unauthenticated denial-of-service vulnerabilities.
The research states "Our research found that the two issues are fundamentally the same but exploitable at different HTTP URI paths due to reuse of a vulnerable code pattern." They also found that when they scanned SonicWall firewalls with management interfaces exposed to the internet, they found that 76% are vulnerable to one or both issues.
The research can be found here: 
It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special encore episode, where we are joined by Jon Williams from Bishop Fox, as he is sharing their research on "It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable." SonicWall published advisories for CVE-2022-22274 and CVE-2023-0656 a year apart after finding that NGFW series 6 and 7 devices are affected by two unauthenticated denial-of-service vulnerabilities.</p><p>The research states "Our research found that the two issues are fundamentally the same but exploitable at different HTTP URI paths due to reuse of a vulnerable code pattern." They also found that when they scanned SonicWall firewalls with management interfaces exposed to the internet, they found that 76% are vulnerable to one or both issues.</p><p>The research can be found here: </p><ul><li><a href="https://bishopfox.com/blog/its-2024-and-over-178-000-sonicwall-firewalls-are-publicly-exploitable">It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1261</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b68b60fa-b95e-11ee-8cf8-af0489a47c7b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1314704082.mp3?updated=1731083667" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA issues urgent warning.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2187/notes</link>
      <description>CISA issues a warning about a critical security flaw in Palo Alto Networks’ Expedition tool. A federal agency urges employees to limit phone use in response to Chinese hacking. Law enforcement is perplexed by spontaneously rebooting iPhones. A key supplier for oilfields suffers a ransomware attack. Hewlett Packard Enterprise (HPE) patches multiple vulnerabilities in its Aruba Networking access points. Cybercriminals use game-related apps to distribute Winos4.0. Germany proposes legislation protecting security researchers. The TSA proposes new cybersecurity regulations for critical transportation infrastructure. Our guest is Aaron Griffin, Chief Architect from Sevco Security, sharing the discovery of a significant Apple iOS bug involving iPhone Mirroring.  AI tries to wing it in a Reddit group, but moderators put a fork in it. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Aaron Griffin, Chief Architect from Sevco Security, sharing the discovery of a significant Apple iOS 18 and macOS Sequoia privacy bug that exposes employee personal iPhone apps and data to companies through iPhone Mirroring. Read Sevco’s blog on the topic.

Selected Reading
CISA warns of Critical Palo Alto Networks Vulnerability Exploited in Attacks (GB Hackers)
U.S. Agency Warns Employees About Phone Use Amid Ongoing China Hack (Wall Street Journal)
Host of House panels getting briefed on major Chinese hacker telecom breaches (CyberScoop)
Police Freak Out at iPhones Mysteriously Rebooting Themselves, Locking Cops Out (404 Media)
Texas-based oilfield supplier faces disruptions following ransomware attack (The Record)
HPE Patches Critical Vulnerabilities in Aruba Access Points (SecurityWeek)
Winos4.0 hides in gaming apps to hijack Windows systems (The Register)
Germany drafts law to protect researchers who find security flaws (Bleeping Computer)
TSA proposes new cybersecurity rule for surface transportation, seeks public feedback (Industrial Cyber)
Reddit’s ‘Interesting as Fuck’ Community Rules That AI-Generated Video Is Not Interesting (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 08 Nov 2024 21:10:00 -0000</pubDate>
      <itunes:title>CISA issues urgent warning.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2187</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA issues a warning about a critical security flaw in Palo Alto Networks’ Expedition tool. A federal agency urges employees to limit phone use in response to Chinese hacking. Law enforcement is perplexed by spontaneously rebooting iPhones. A key supplier for oilfields suffers a ransomware attack. Hewlett Packard Enterprise (HPE) patches multiple vulnerabilities in its Aruba Networking access points. Cybercriminals use game-related apps to distribute Winos4.0. Germany proposes legislation protecting security researchers. The TSA proposes new cybersecurity regulations for critical transportation infrastructure. Our guest is Aaron Griffin, Chief Architect from Sevco Security, sharing the discovery of a significant Apple iOS bug involving iPhone Mirroring.  AI tries to wing it in a Reddit group, but moderators put a fork in it. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Aaron Griffin, Chief Architect from Sevco Security, sharing the discovery of a significant Apple iOS 18 and macOS Sequoia privacy bug that exposes employee personal iPhone apps and data to companies through iPhone Mirroring. Read Sevco’s blog on the topic.

Selected Reading
CISA warns of Critical Palo Alto Networks Vulnerability Exploited in Attacks (GB Hackers)
U.S. Agency Warns Employees About Phone Use Amid Ongoing China Hack (Wall Street Journal)
Host of House panels getting briefed on major Chinese hacker telecom breaches (CyberScoop)
Police Freak Out at iPhones Mysteriously Rebooting Themselves, Locking Cops Out (404 Media)
Texas-based oilfield supplier faces disruptions following ransomware attack (The Record)
HPE Patches Critical Vulnerabilities in Aruba Access Points (SecurityWeek)
Winos4.0 hides in gaming apps to hijack Windows systems (The Register)
Germany drafts law to protect researchers who find security flaws (Bleeping Computer)
TSA proposes new cybersecurity rule for surface transportation, seeks public feedback (Industrial Cyber)
Reddit’s ‘Interesting as Fuck’ Community Rules That AI-Generated Video Is Not Interesting (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA issues a warning about a critical security flaw in Palo Alto Networks’ Expedition tool. A federal agency urges employees to limit phone use in response to Chinese hacking. Law enforcement is perplexed by spontaneously rebooting iPhones. A key supplier for oilfields suffers a ransomware attack. Hewlett Packard Enterprise (HPE) patches multiple vulnerabilities in its Aruba Networking access points. Cybercriminals use game-related apps to distribute Winos4.0. Germany proposes legislation protecting security researchers. The TSA proposes new cybersecurity regulations for critical transportation infrastructure. Our guest is Aaron Griffin, Chief Architect from Sevco Security, sharing the discovery of a significant Apple iOS bug involving iPhone Mirroring.  AI tries to wing it in a Reddit group, but moderators put a fork in it. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/aaronsgriffin/">Aaron Griffin</a>, Chief Architect from <a href="https://www.sevcosecurity.com/">Sevco Security</a>, sharing the discovery of a significant Apple iOS 18 and macOS Sequoia privacy bug that exposes employee personal iPhone apps and data to companies through iPhone Mirroring. Read Sevco’s <a href="https://www.sevcosecurity.com/iphone-mirroring-expose-employee-personal-information/">blog</a> on the topic.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://gbhackers.com/cisa-warns-of-critical-palo-alto-networks-vulnerability-exploited-in-attacks/">CISA warns of Critical Palo Alto Networks Vulnerability Exploited in Attacks</a> (GB Hackers)</p><p><a href="https://www.wsj.com/us-news/u-s-agency-warns-employees-about-phone-use-amid-ongoing-china-hack-dd459273">U.S. Agency Warns Employees About Phone Use Amid Ongoing China Hack </a>(Wall Street Journal)</p><p><a href="https://cyberscoop.com/house-panels-briefing-chinese-hacker-telecom-breaches/">Host of House panels getting briefed on major Chinese hacker telecom breaches</a> (CyberScoop)</p><p><a href="https://www.404media.co/police-freak-out-at-iphones-mysteriously-rebooting-themselves-locking-cops-out/">Police Freak Out at iPhones Mysteriously Rebooting Themselves, Locking Cops Out</a> (404 Media)</p><p><a href="https://therecord.media/oilfield-supplier-faces-disruptions-cyberattack">Texas-based oilfield supplier faces disruptions following ransomware attack</a> (The Record)</p><p><a href="https://www.securityweek.com/hpe-patches-critical-vulnerabilities-in-aruba-access-points/">HPE Patches Critical Vulnerabilities in Aruba Access Points</a> (SecurityWeek)</p><p><a href="https://www.theregister.com/2024/11/08/winos40_targets_windows/">Winos4.0 hides in gaming apps to hijack Windows systems</a> (The Register)</p><p><a href="https://www.bleepingcomputer.com/news/security/germany-drafts-law-to-protect-researchers-who-find-security-flaws/">Germany drafts law to protect researchers who find security flaws</a> (Bleeping Computer)</p><p><a href="https://industrialcyber.co/transport/tsa-proposes-new-cybersecurity-rule-for-surface-transportation-seeks-public-feedback/">TSA proposes new cybersecurity rule for surface transportation, seeks public feedback</a> (Industrial Cyber)</p><p><a href="https://www.404media.co/reddits-interesting-as-fuck-community-rules-that-ai-generated-video-is-not-interesting/">Reddit’s ‘Interesting as Fuck’ Community Rules That AI-Generated Video Is Not Interesting</a> (404 Media)</p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1522</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b6c4c502-b95e-11ee-8cf8-f3afeb972cb0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8647983182.mp3?updated=1731441466" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Canada cuts TikTok ties.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2186/notes</link>
      <description>Canada orders ByteDance to shut down local operations. Cisco releases urgent patches for multiple vulnerabilities. SteelFox malware delivers a crypto-miner and info-stealer. North Korean campaigns pursue fake jobs and remote workers. A suspected cyber intrusion disrupts Washington state court systems. Over 200,000 customers of SelectBlinds have their credit card info stolen. Cyber experts encourage congress to pursue bipartisan readiness studies despite DoD pushback. On our Industry Voices segment, we welcome guest Jeremy Huval, Chief Innovation Officer at HITRUST®,  discussing the AI explosion and the need to consider the risks before implementation. Curiosity killed the cat lover’s computer. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, we welcome guest Jeremy Huval, Chief Innovation Officer at HITRUST®,  discussing the AI explosion and the need to consider the risks before implementation. Learn more about how robust your AI risk management program is here.

Selected Reading
Canada Orders Shutdown of Local TikTok Branch Over Security Concerns (Infosecurity Magazine)
Cisco Patches Critical Vulnerability in Industrial Networking Solution (SecurityWeek)
Cisco Desk Phone Series Vulnerability Lets Remote Attacker Access Sensitive Information (GB Hackers)
‘SteelFox’ Miner and Information Stealer Bundle Emerges (SecurityWeek)
North Korean Hackers Employing New Tactic To Acquire Remote Jobs (Cyber Security News)
Outages impact Washington state courts after ‘unauthorized activity’ detected on network (The Record)
SelectBlinds says 200,000 customers impacted after hackers embed malware on site (The Record)
Congress must demand a study of America’s cyber forces (CyberScoop)
Cybercrooks target Bengal cat lovers in Australia (The Register)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 07 Nov 2024 21:10:00 -0000</pubDate>
      <itunes:title>Canada cuts TikTok ties.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2186</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Canada orders ByteDance to shut down local operations. Cisco releases urgent patches for multiple vulnerabilities. SteelFox malware delivers a crypto-miner and info-stealer. North Korean campaigns pursue fake jobs and remote workers. A suspected cyber intrusion disrupts Washington state court systems. Over 200,000 customers of SelectBlinds have their credit card info stolen. Cyber experts encourage congress to pursue bipartisan readiness studies despite DoD pushback. On our Industry Voices segment, we welcome guest Jeremy Huval, Chief Innovation Officer at HITRUST®,  discussing the AI explosion and the need to consider the risks before implementation. Curiosity killed the cat lover’s computer. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, we welcome guest Jeremy Huval, Chief Innovation Officer at HITRUST®,  discussing the AI explosion and the need to consider the risks before implementation. Learn more about how robust your AI risk management program is here.

Selected Reading
Canada Orders Shutdown of Local TikTok Branch Over Security Concerns (Infosecurity Magazine)
Cisco Patches Critical Vulnerability in Industrial Networking Solution (SecurityWeek)
Cisco Desk Phone Series Vulnerability Lets Remote Attacker Access Sensitive Information (GB Hackers)
‘SteelFox’ Miner and Information Stealer Bundle Emerges (SecurityWeek)
North Korean Hackers Employing New Tactic To Acquire Remote Jobs (Cyber Security News)
Outages impact Washington state courts after ‘unauthorized activity’ detected on network (The Record)
SelectBlinds says 200,000 customers impacted after hackers embed malware on site (The Record)
Congress must demand a study of America’s cyber forces (CyberScoop)
Cybercrooks target Bengal cat lovers in Australia (The Register)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Canada orders ByteDance to shut down local operations. Cisco releases urgent patches for multiple vulnerabilities. SteelFox malware delivers a crypto-miner and info-stealer. North Korean campaigns pursue fake jobs and remote workers. A suspected cyber intrusion disrupts Washington state court systems. Over 200,000 customers of SelectBlinds have their credit card info stolen. Cyber experts encourage congress to pursue bipartisan readiness studies despite DoD pushback. On our Industry Voices segment, we welcome guest Jeremy Huval, Chief Innovation Officer at HITRUST®,  discussing the AI explosion and the need to consider the risks before implementation. Curiosity killed the cat lover’s computer. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Voices segment, we welcome guest <a href="https://www.linkedin.com/in/jeremyhuval/">Jeremy Huval</a>, Chief Innovation Officer at <a href="https://hitrustalliance.net/">HITRUST®</a>,  discussing the AI explosion and the need to consider the risks before implementation. Learn more about how robust your AI risk management program is <a href="https://hitrustalliance.net/ai-hub">here</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.infosecurity-magazine.com/news/canada-orders-shutdown-tiktok/">Canada Orders Shutdown of Local TikTok Branch Over Security Concerns </a>(Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/cisco-patches-critical-vulnerability-in-industrial-networking-solution/">Cisco Patches Critical Vulnerability in Industrial Networking Solution</a> (SecurityWeek)</p><p><a href="https://gbhackers.com/cisco-desk-phone-series-vulnerability/">Cisco Desk Phone Series Vulnerability Lets Remote Attacker Access Sensitive Information</a> (GB Hackers)</p><p><a href="https://www.securityweek.com/steelfox-miner-and-information-stealer-bundle-emerges/">‘SteelFox’ Miner and Information Stealer Bundle Emerges</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/north-korean-hackers-acquire-remote-jobs/">North Korean Hackers Employing New Tactic To Acquire Remote Jobs</a> (Cyber Security News)</p><p><a href="https://therecord.media/outages-washington-courts-cyber-activity">Outages impact Washington state courts after ‘unauthorized activity’ detected on network</a> (The Record)</p><p><a href="https://therecord.media/selectblinds-customers-credit-card-info-data-breach-website-malware">SelectBlinds says 200,000 customers impacted after hackers embed malware on site</a> (The Record)</p><p><a href="https://cyberscoop.com/cyber-force-study-congress-department-of-defense-op-ed/">Congress must demand a study of America’s cyber forces</a> (CyberScoop)</p><p><a href="https://www.theregister.com/2024/11/06/bengal_cat_australia/">Cybercrooks target Bengal cat lovers in Australia</a> (The Register)</p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1842</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b64f7fc2-b95e-11ee-8cf8-c3e9befade88]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7618431598.mp3?updated=1731010272" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>That’s a wrap on election day. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2185/notes</link>
      <description>Election day wrap-up. The FBI issues a warning about cybercriminals selling government email credentials. Google issues an emergency update for Chrome. An Interpol operation nets dozens of arrests and IP takedowns. Microchip Technology disclosed $21.4 million in expenses related to a cybersecurity breach. Ransomware makes a Georgia hospital revert to paper records. South Korea fines Meta $15 million over privacy violations. A cyberattack disables panic alarms on British prison vans. A small city in Kansas recovers from a devastating pig butchering scheme. Our guest today is Javed Hasan, CEO and Co-Founder of Lineaje, discussing the growing risks within open source ecosystems. Sending data down the compressed air superhighway.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest today is Javed Hasan, CEO and Co-Founder of Lineaje, discussing the growing risks within open source ecosystems.

Selected Reading
Top US cyber official says 'no evidence of malicious activity' impacting election (The Record)
FBI Warns Gmail, Outlook Users Of $100 Government Emergency Data Email Hack (Forbes)
Chrome Security Update: Patch for Multiple High Severity Vulnerabilities (Cyber Security News)
Interpol disrupts cybercrime activity on 22,000 IP addresses, arrests 41 (Bleeping Computer)
Microchip Technology Reports $21.4 Million Cost From Ransomware Attack (SecurityWeek)
Ransomware Attack Disrupts Georgia Hospital's Access to Health Records (SecurityWeek)
South Korea Fines Meta $15 Million for Illegal Data Collection on Facebook Users (CEO Today)
Cyberattack disables tracking systems and panic alarms on British prison vans (The Record)
FBI recovers just $8M after crypto scam crashes Kansas bank (The Register)
The bizarre reason pneumatic tubes are coming back (BBC Science Focus)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 06 Nov 2024 21:10:00 -0000</pubDate>
      <itunes:title>That’s a wrap on election day. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2185</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Election day wrap-up. The FBI issues a warning about cybercriminals selling government email credentials. Google issues an emergency update for Chrome. An Interpol operation nets dozens of arrests and IP takedowns. Microchip Technology disclosed $21.4 million in expenses related to a cybersecurity breach. Ransomware makes a Georgia hospital revert to paper records. South Korea fines Meta $15 million over privacy violations. A cyberattack disables panic alarms on British prison vans. A small city in Kansas recovers from a devastating pig butchering scheme. Our guest today is Javed Hasan, CEO and Co-Founder of Lineaje, discussing the growing risks within open source ecosystems. Sending data down the compressed air superhighway.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest today is Javed Hasan, CEO and Co-Founder of Lineaje, discussing the growing risks within open source ecosystems.

Selected Reading
Top US cyber official says 'no evidence of malicious activity' impacting election (The Record)
FBI Warns Gmail, Outlook Users Of $100 Government Emergency Data Email Hack (Forbes)
Chrome Security Update: Patch for Multiple High Severity Vulnerabilities (Cyber Security News)
Interpol disrupts cybercrime activity on 22,000 IP addresses, arrests 41 (Bleeping Computer)
Microchip Technology Reports $21.4 Million Cost From Ransomware Attack (SecurityWeek)
Ransomware Attack Disrupts Georgia Hospital's Access to Health Records (SecurityWeek)
South Korea Fines Meta $15 Million for Illegal Data Collection on Facebook Users (CEO Today)
Cyberattack disables tracking systems and panic alarms on British prison vans (The Record)
FBI recovers just $8M after crypto scam crashes Kansas bank (The Register)
The bizarre reason pneumatic tubes are coming back (BBC Science Focus)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Election day wrap-up. The FBI issues a warning about cybercriminals selling government email credentials. Google issues an emergency update for Chrome. An Interpol operation nets dozens of arrests and IP takedowns. Microchip Technology disclosed $21.4 million in expenses related to a cybersecurity breach. Ransomware makes a Georgia hospital revert to paper records. South Korea fines Meta $15 million over privacy violations. A cyberattack disables panic alarms on British prison vans. A small city in Kansas recovers from a devastating pig butchering scheme. Our guest today is Javed Hasan, CEO and Co-Founder of Lineaje, discussing the growing risks within open source ecosystems. Sending data down the compressed air superhighway.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest today is <a href="https://www.linkedin.com/in/javedhasan/">Javed Hasan</a>, CEO and Co-Founder of <a href="http://lineaje.dev/">Lineaje</a>, discussing the growing risks within open source ecosystems.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/cisa-easterly-no-evidence-of-malicious-election-activity">Top US cyber official says 'no evidence of malicious activity' impacting election</a> (The Record)</p><p><a href="https://www.forbes.com/sites/daveywinder/2024/11/06/fbi-warns-gmail-outlook-users-of-100-government-emergency-data-email-hack/">FBI Warns Gmail, Outlook Users Of $100 Government Emergency Data Email Hack</a> (Forbes)</p><p><a href="https://cybersecuritynews.com/chrome-security-update-vulnerabilities/">Chrome Security Update: Patch for Multiple High Severity Vulnerabilities</a> (Cyber Security News)</p><p><a href="https://www.bleepingcomputer.com/news/security/interpol-disrupts-cybercrime-activity-on-22-000-ip-addresses-arrests-41/">Interpol disrupts cybercrime activity on 22,000 IP addresses, arrests 41</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/microchip-technology-reports-21-4-million-cost-from-ransomware-attack/">Microchip Technology Reports $21.4 Million Cost From Ransomware Attack</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/ransomware-attack-disrupts-georgia-hospitals-access-to-health-records/">Ransomware Attack Disrupts Georgia Hospital's Access to Health Records </a>(SecurityWeek)</p><p><a href="https://www.ceotodaymagazine.com/2024/11/south-korea-fines-meta-15-million-for-illegal-data-collection-on-facebook-users/">South Korea Fines Meta $15 Million for Illegal Data Collection on Facebook Users</a> (CEO Today)</p><p><a href="https://therecord.media/british-prison-vans-cyberattack">Cyberattack disables tracking systems and panic alarms on British prison vans</a> (The Record)</p><p><a href="https://www.theregister.com/2024/11/05/fbi_pig_kansas_cryptocurrency/">FBI recovers just $8M after crypto scam crashes Kansas bank</a> (The Register)</p><p><a href="https://www.sciencefocus.com/future-technology/pneumatic-tubes">The bizarre reason pneumatic tubes are coming back</a> (BBC Science Focus)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1657</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b615be4a-b95e-11ee-8cf8-1b0bfc557c72]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1860630157.mp3?updated=1730922197" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Confidence on election day.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2184/notes</link>
      <description>On election day U.S. officials express confidence. A Virginia company is charged with violating U.S. export restrictions on technology bound for Russia. Backing up your GMail. Google mandates MFA. Google claims an AI-powered vulnerability detection breakthrough. Schneider Electric investigates a cyberattack on its internal project tracking platform. A Canadian man suspected in the Snowflake-related data breaches has been arrested. On our Threat Vector segment, David Moulton sits down with Christopher Scott, from Unit 42 to explore the essentials of crisis leadership and management.  I spy air fry?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
In this segment of the Threat Vector podcast, host David Moulton sits down with Christopher Scott, Managing Partner at Unit 42 by Palo Alto Networks, to explore the essentials of crisis leadership and management in cybersecurity. You can hear the full discussion here and catch new episodes of Threat Vector every Thursday on your favorite podcast app. 

Selected Reading
In final check-in before Election Day, CISA cites low-level threats, and not much else (The Record)
Joint ODNI, FBI, and CISA Statement (FBI Federal Bureau of Investigation)
Exclusive: Nakasone says all the news about influence campaigns ahead of Election Day is actually 'a sign of success' (The Record)
Virginia Company and Two Senior Executives Charged with Illegally Exporting Millions of Dollars of U.S. Technology to Russia (United States Department of Justice)
Gmail 2FA Cyber Attacks—Open Another Account Before It’s Too Late (Forbes)
Mandatory MFA is coming to Google Cloud. Here’s what you need to know (Google Cloud)
Schneider Electric says hackers accessed internal project execution tracking platform (The Record)
Google claims AI first after SQLite security bug discovered (The Register)
Suspected Snowflake Hacker Arrested in Canada (404 Media)
Is your air fryer spying on you? Concerns over ‘excessive’ surveillance in smart devices (The Guardian) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Nov 2024 21:10:00 -0000</pubDate>
      <itunes:title>Confidence on election day.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2184</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>On election day U.S. officials express confidence. A Virginia company is charged with violating U.S. export restrictions on technology bound for Russia. Backing up your GMail. Google mandates MFA. Google claims an AI-powered vulnerability detection breakthrough. Schneider Electric investigates a cyberattack on its internal project tracking platform. A Canadian man suspected in the Snowflake-related data breaches has been arrested. On our Threat Vector segment, David Moulton sits down with Christopher Scott, from Unit 42 to explore the essentials of crisis leadership and management.  I spy air fry?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
In this segment of the Threat Vector podcast, host David Moulton sits down with Christopher Scott, Managing Partner at Unit 42 by Palo Alto Networks, to explore the essentials of crisis leadership and management in cybersecurity. You can hear the full discussion here and catch new episodes of Threat Vector every Thursday on your favorite podcast app. 

Selected Reading
In final check-in before Election Day, CISA cites low-level threats, and not much else (The Record)
Joint ODNI, FBI, and CISA Statement (FBI Federal Bureau of Investigation)
Exclusive: Nakasone says all the news about influence campaigns ahead of Election Day is actually 'a sign of success' (The Record)
Virginia Company and Two Senior Executives Charged with Illegally Exporting Millions of Dollars of U.S. Technology to Russia (United States Department of Justice)
Gmail 2FA Cyber Attacks—Open Another Account Before It’s Too Late (Forbes)
Mandatory MFA is coming to Google Cloud. Here’s what you need to know (Google Cloud)
Schneider Electric says hackers accessed internal project execution tracking platform (The Record)
Google claims AI first after SQLite security bug discovered (The Register)
Suspected Snowflake Hacker Arrested in Canada (404 Media)
Is your air fryer spying on you? Concerns over ‘excessive’ surveillance in smart devices (The Guardian) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On election day U.S. officials express confidence. A Virginia company is charged with violating U.S. export restrictions on technology bound for Russia. Backing up your GMail. Google mandates MFA. Google claims an AI-powered vulnerability detection breakthrough. Schneider Electric investigates a cyberattack on its internal project tracking platform. A Canadian man suspected in the Snowflake-related data breaches has been arrested. On our Threat Vector segment, David Moulton sits down with Christopher Scott, from Unit 42 to explore the essentials of crisis leadership and management.  I spy air fry?</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Threat Vector Segment</h2><p>In this segment of the <a href="https://thecyberwire.com/podcasts/threat-vector">Threat Vector</a> podcast, host <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a> sits down with <a href="https://www.linkedin.com/in/chrisscott-u42/">Christopher Scott</a>, Managing Partner at Unit 42 by <a href="https://www.paloaltonetworks.com/">Palo Alto Networks</a>, to explore the essentials of crisis leadership and management in cybersecurity. You can hear the full discussion <a href="https://thecyberwire.com/podcasts/threat-vector/41/notes">here</a> and catch new episodes of <a href="https://thecyberwire.com/podcasts/threat-vector">Threat Vector</a> every Thursday on your favorite podcast app. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/cisa-2024-presidential-election-threats">In final check-in before Election Day, CISA cites low-level threats, and not much else</a> (The Record)</p><p><a href="https://www.fbi.gov/news/press-releases/joint-odni-fbi-and-cisa-statement-110424">Joint ODNI, FBI, and CISA Statement</a> (FBI Federal Bureau of Investigation)</p><p><a href="https://therecord.media/nakasone-2024-election-security-influence-operations">Exclusive: Nakasone says all the news about influence campaigns ahead of Election Day is actually 'a sign of success'</a> (The Record)</p><p><a href="https://www.justice.gov/opa/pr/virginia-company-and-two-senior-executives-charged-illegally-exporting-millions-dollars-us">Virginia Company and Two Senior Executives Charged with Illegally Exporting Millions of Dollars of U.S. Technology to Russia</a> (United States Department of Justice)</p><p><a href="https://www.forbes.com/sites/daveywinder/2024/11/05/gmail-2fa-cyber-attack-open-another-account-before-its-too-late/">Gmail 2FA Cyber Attacks—Open Another Account Before It’s Too Late</a> (Forbes)</p><p><a href="https://cloud.google.com/blog/products/identity-security/mandatory-mfa-is-coming-to-google-cloud-heres-what-you-need-to-know">Mandatory MFA is coming to Google Cloud. Here’s what you need to know</a> (Google Cloud)</p><p><a href="https://therecord.media/schneider-electric-hackers-accessed-internal-project-tracking-platform">Schneider Electric says hackers accessed internal project execution tracking platform</a> (The Record)</p><p><a href="https://www.theregister.com/2024/11/05/google_ai_vulnerability_hunting/">Google claims AI first after SQLite security bug discovered </a>(The Register)</p><p><a href="https://www.404media.co/suspected-snowflake-hacker-arrested-in-canada/">Suspected Snowflake Hacker Arrested in Canada</a> (404 Media)</p><p><a href="https://www.theguardian.com/technology/2024/nov/05/air-fryer-excessive-surveillance-smart-devices-which-watches-speakers-trackers">Is your air fryer spying on you? Concerns over ‘excessive’ surveillance in smart devices</a> (The Guardian) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1653</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5dcb32a-b95e-11ee-8cf8-b73ab0b58406]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6358025636.mp3?updated=1730835280" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FBI fights fake news.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2183/notes</link>
      <description>The FBI flags fake videos claiming to be from the agency. Okta patches an authentication bypass vulnerability. Microsoft confirms Windows Server 2025 Blue Screen of Death issues. Scammers exploit DocuSign’s APIs to send fake invoices that bypass spam filters. Hackers use smart contracts for command and control. ICS suppliers face challenges convincing customers to secure their environments. Barracuda tracks a phishing campaign impersonating OpenAI. X-Twitter makes controversial changes to its block feature. A Nigerian man gets 26 years in prison for email fraud. On our Solution Spotlight, N2K's Simone Petrella interviews Alex Stamos, CISO at SentinelOne, at the ISC2 Security Congress 2024 about lessons learned in 2024 and what that means for 2025. For a South Dakota plastic surgeon, ransomware was just the beginning of his financial woes.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight, N2K's Simone Petrella interviews Alex Stamos, CISO at SentinelOne, at the ISC2 Security Congress 2024 about lessons learned in 2024 and what that means for 2025.

Selected Reading
FBI flags false videos impersonating agency, claiming Democratic ballot fraud (CyberScoop)
Okta security bug affects those with really long usernames (The Register)
Microsoft confirms Windows Server 2025 blue screen, install issues (Bleeping Computer)
Scammers Use DocuSign API to Evade Spam Filters with Phishing Invoices (Hackread)
Supply Chain Attack Uses Smart Contracts for C2 Ops (Infosecurity Magazine)
Siemens and Rockwell Tackle Industrial Cybersecurity, but Face Customer Hesitation (SecurityWeek)
Cybercriminals impersonate OpenAI in large-scale phishing attack (Barracuda)
X updates block feature, letting blocked users see your public posts (TechCrunch)
US Sentences Nigerian to 26 Years in Prison for Stealing Millions Through Phishing (SecurityWeek)
Doctor Hit With $500K HIPAA Fine: Feds Worse Than Hacker (GovInfo Security) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 04 Nov 2024 21:10:00 -0000</pubDate>
      <itunes:title>FBI fights fake news.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2183</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The FBI flags fake videos claiming to be from the agency. Okta patches an authentication bypass vulnerability. Microsoft confirms Windows Server 2025 Blue Screen of Death issues. Scammers exploit DocuSign’s APIs to send fake invoices that bypass spam filters. Hackers use smart contracts for command and control. ICS suppliers face challenges convincing customers to secure their environments. Barracuda tracks a phishing campaign impersonating OpenAI. X-Twitter makes controversial changes to its block feature. A Nigerian man gets 26 years in prison for email fraud. On our Solution Spotlight, N2K's Simone Petrella interviews Alex Stamos, CISO at SentinelOne, at the ISC2 Security Congress 2024 about lessons learned in 2024 and what that means for 2025. For a South Dakota plastic surgeon, ransomware was just the beginning of his financial woes.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight, N2K's Simone Petrella interviews Alex Stamos, CISO at SentinelOne, at the ISC2 Security Congress 2024 about lessons learned in 2024 and what that means for 2025.

Selected Reading
FBI flags false videos impersonating agency, claiming Democratic ballot fraud (CyberScoop)
Okta security bug affects those with really long usernames (The Register)
Microsoft confirms Windows Server 2025 blue screen, install issues (Bleeping Computer)
Scammers Use DocuSign API to Evade Spam Filters with Phishing Invoices (Hackread)
Supply Chain Attack Uses Smart Contracts for C2 Ops (Infosecurity Magazine)
Siemens and Rockwell Tackle Industrial Cybersecurity, but Face Customer Hesitation (SecurityWeek)
Cybercriminals impersonate OpenAI in large-scale phishing attack (Barracuda)
X updates block feature, letting blocked users see your public posts (TechCrunch)
US Sentences Nigerian to 26 Years in Prison for Stealing Millions Through Phishing (SecurityWeek)
Doctor Hit With $500K HIPAA Fine: Feds Worse Than Hacker (GovInfo Security) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FBI flags fake videos claiming to be from the agency. Okta patches an authentication bypass vulnerability. Microsoft confirms Windows Server 2025 Blue Screen of Death issues. Scammers exploit DocuSign’s APIs to send fake invoices that bypass spam filters. Hackers use smart contracts for command and control. ICS suppliers face challenges convincing customers to secure their environments. Barracuda tracks a phishing campaign impersonating OpenAI. X-Twitter makes controversial changes to its block feature. A Nigerian man gets 26 years in prison for email fraud. On our Solution Spotlight, N2K's Simone Petrella interviews Alex Stamos, CISO at SentinelOne, at the ISC2 Security Congress 2024 about lessons learned in 2024 and what that means for 2025. For a South Dakota plastic surgeon, ransomware was just the beginning of his financial woes.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Solution Spotlight, <a href="https://www.n2k.com/">N2K</a>'s <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a> interviews <a href="https://www.linkedin.com/in/alexstamos/">Alex Stamos</a>, CISO at <a href="https://www.sentinelone.com/">SentinelOne</a>, at the <a href="https://www.isc2.org/">ISC2</a> <a href="https://events.isc2.org/p/s/keynote-building-a-trustworthy-company-after-the-tech-calamities-of-2024-plus-isc2-awards-announcement-6432">Security Congress 2024</a> about lessons learned in 2024 and what that means for 2025.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://cyberscoop.com/fbi-fake-videos-ballot-fraud-democrats-doppelganger/">FBI flags false videos impersonating agency, claiming Democratic ballot fraud</a> (CyberScoop)</p><p><a href="https://www.theregister.com/2024/11/04/why_the_long_name_okta/">Okta security bug affects those with really long usernames</a> (The Register)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-confirms-windows-server-2025-blue-screen-install-issues/">Microsoft confirms Windows Server 2025 blue screen, install issues</a> (Bleeping Computer)</p><p><a href="https://hackread.com/scammers-docusign-api-spam-filters-phishing-invoices/">Scammers Use DocuSign API to Evade Spam Filters with Phishing Invoices</a> (Hackread)</p><p><a href="https://www.infosecurity-magazine.com/news/supply-chain-attack-smart/">Supply Chain Attack Uses Smart Contracts for C2 Ops </a>(Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/siemens-and-rockwell-tackle-industrial-cybersecurity-but-face-customer-hesitation/">Siemens and Rockwell Tackle Industrial Cybersecurity, but Face Customer Hesitation</a> (SecurityWeek)</p><p><a href="https://blog.barracuda.com/2024/10/31/impersonate-openai-steal-data">Cybercriminals impersonate OpenAI in large-scale phishing attack</a> (Barracuda)</p><p><a href="https://techcrunch.com/2024/11/03/x-updates-block-feature-letting-blocked-users-see-your-public-posts/">X updates block feature, letting blocked users see your public posts</a> (TechCrunch)</p><p><a href="https://www.securityweek.com/us-sentences-nigerian-to-26-years-in-prison-for-stealing-millions-through-phishing/">US Sentences Nigerian to 26 Years in Prison for Stealing Millions Through Phishing</a> (SecurityWeek)</p><p><a href="https://www.govinfosecurity.com/doctor-hit-500k-hipaa-fine-feds-worse-than-hacker-a-26706">Doctor Hit With $500K HIPAA Fine: Feds Worse Than Hacker</a> (GovInfo Security) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1914</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5a4a976-b95e-11ee-8cf8-4b9f5257ff68]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8034987687.mp3?updated=1730751785" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dinah Davis: Building your network. [R&amp;D] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/40/notes</link>
      <description>Please enjoy this encore episode, where we are joined by VP of R&amp;D at Arctic Wolf Networks Dinah Davis, as she shares how she arrived in the cybersecurity industry after finding her niche. Dinah recalls how at a time of indecision, a computer course at university and a job with the Canadian government helped to solidify her career direction. Dinah mentions how "security and cryptography specifically was this perfect mix of real world problem solving and mathematics and computer science all combined into one ball of happiness." Networking played a key role in Dinah's journey. She recommends that those interested in joining the field to go for what they believe in. And, we thank Dinah for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 03 Nov 2024 08:00:00 -0000</pubDate>
      <itunes:title>Dinah Davis: Building your network. [R&amp;D] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>40</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ab9d5d6c-986d-11ef-86a0-c7059fc866e2/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Please enjoy this encore episode, where we are joined by VP of R&amp;D at Arctic Wolf Networks Dinah Davis, as she shares how she arrived in the cybersecurity industry after finding her niche. Dinah recalls how at a time of indecision, a computer course at university and a job with the Canadian government helped to solidify her career direction. Dinah mentions how "security and cryptography specifically was this perfect mix of real world problem solving and mathematics and computer science all combined into one ball of happiness." Networking played a key role in Dinah's journey. She recommends that those interested in joining the field to go for what they believe in. And, we thank Dinah for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Please enjoy this encore episode, where we are joined by VP of R&amp;D at Arctic Wolf Networks Dinah Davis, as she shares how she arrived in the cybersecurity industry after finding her niche. Dinah recalls how at a time of indecision, a computer course at university and a job with the Canadian government helped to solidify her career direction. Dinah mentions how "security and cryptography specifically was this perfect mix of real world problem solving and mathematics and computer science all combined into one ball of happiness." Networking played a key role in Dinah's journey. She recommends that those interested in joining the field to go for what they believe in. And, we thank Dinah for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>490</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ab9d5d6c-986d-11ef-86a0-c7059fc866e2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5947512800.mp3?updated=1730478528" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Velvet Ant's silent invasion. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/353/notes</link>
      <description>This week, we are joined by, Amnon Kushnir from Sygnia, who is sharing their work on "China-Nexus Threat Group ‘Velvet Ant’ Leverages a Zero-Day to Deploy Malware on Cisco Nexus Switches." In early 2024, Sygnia observed the ‘Velvet Ant’ threat group exploiting a zero-day vulnerability (CVE-2024-20399) to infiltrate Cisco Switch appliances and operate undetected within enterprise networks. 
This attack enables threat actors to escape Cisco’s command interface and install malware directly on the device’s OS, bypassing standard security tools. The incident underscores the risks posed by third-party appliances and the importance of enhanced monitoring and threat detection to counter advanced persistent threats.
 The research can be found here:
China-Nexus Threat Group ‘Velvet Ant’ Leverages a Zero-Day to Deploy Malware on Cisco Nexus Switches

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Nov 2024 05:00:00 -0000</pubDate>
      <itunes:title>Velvet Ant's silent invasion. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>353</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/d7236978-986c-11ef-bfa6-ef16807f3cd2/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, we are joined by, Amnon Kushnir from Sygnia, who is sharing their work on "China-Nexus Threat Group ‘Velvet Ant’ Leverages a Zero-Day to Deploy Malware on Cisco Nexus Switches." In early 2024, Sygnia observed the ‘Velvet Ant’ threat group exploiting a zero-day vulnerability (CVE-2024-20399) to infiltrate Cisco Switch appliances and operate undetected within enterprise networks. 
This attack enables threat actors to escape Cisco’s command interface and install malware directly on the device’s OS, bypassing standard security tools. The incident underscores the risks posed by third-party appliances and the importance of enhanced monitoring and threat detection to counter advanced persistent threats.
 The research can be found here:
China-Nexus Threat Group ‘Velvet Ant’ Leverages a Zero-Day to Deploy Malware on Cisco Nexus Switches

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by, <a href="https://www.linkedin.com/in/amnonkushnir/">Amnon Kushnir</a> from <a href="https://www.linkedin.com/company/sygnia/">Sygnia</a>, who is sharing their work on "China-Nexus Threat Group ‘Velvet Ant’ Leverages a Zero-Day to Deploy Malware on Cisco Nexus Switches." In early 2024, Sygnia observed the ‘Velvet Ant’ threat group exploiting a zero-day vulnerability (CVE-2024-20399) to infiltrate Cisco Switch appliances and operate undetected within enterprise networks. </p><p>This attack enables threat actors to escape Cisco’s command interface and install malware directly on the device’s OS, bypassing standard security tools. The incident underscores the risks posed by third-party appliances and the importance of enhanced monitoring and threat detection to counter advanced persistent threats.</p><p> The research can be found here:</p><ul><li><a href="https://www.sygnia.co/blog/china-threat-group-velvet-ant-cisco-zero-day/">China-Nexus Threat Group ‘Velvet Ant’ Leverages a Zero-Day to Deploy Malware on Cisco Nexus Switches</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1166</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d7236978-986c-11ef-bfa6-ef16807f3cd2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4997692466.mp3?updated=1730478378" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A push to debunk election disinformation.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2182/notes</link>
      <description>Georgia’s Secretary of State Pushes Social Media to Remove Russian Disinformation. CISA introduces its first international strategic plan. Microsoft issues a warning about the Quad7 botnet. Researchers uncover a zero-click vulnerability in Synology devices. CISA warns of critical ICS vulnerabilities. The U.S.and Israel outline the latest cyber activities of an Iranian threat group. Researchers track an online shopping scam operation called “Phish ‘n’ Ships.” A Colorado Pathology lab notifies 1.8 million patients of a data breach. Our guest is Gary Barlet, Public Sector CTO at Illumio, with a timely look at election security. Packing a custom PC full of meth. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Gary Barlet, Public Sector CTO at Illumio, discussing where elections are most vulnerable and the potential dangers beyond national elections.

Selected Reading
Georgia official asks social media sites to take down Russian disinformation video (The Record)
CISA Strategic Plan Targets Global Cooperation on Cybersecurity (Security Boulevard)
Microsoft: Chinese hackers use Quad7 botnet to steal credentials (Bleeping Computer)
Microsoft delays Windows Recall again, now by December (Bleeping Computer)
Zero-Click Flaw Exposes Potentially Millions of Popular Storage Devices to Attack (WIRED)
CISA Warns of Critical Software Vulnerabilities in Industrial Devices (Infosecurity Magazine)
US, Israel Describe Iranian Hackers' Targeting of Olympics, Surveillance Cameras (SecurityWeek)
Fake product listings on real shopping sites lead to stolen payment information (SC Media)
Medusa Ransomware Hack of Pathology Lab Affects 1.8 Million (BankInfo Security)
Someone tried to smuggle 100kg of synthetic drugs into Australia inside a bunch of PC cases (TechSpot)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 01 Nov 2024 20:10:00 -0000</pubDate>
      <itunes:title>A push to debunk election disinformation.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2182</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Georgia’s Secretary of State Pushes Social Media to Remove Russian Disinformation. CISA introduces its first international strategic plan. Microsoft issues a warning about the Quad7 botnet. Researchers uncover a zero-click vulnerability in Synology devices. CISA warns of critical ICS vulnerabilities. The U.S.and Israel outline the latest cyber activities of an Iranian threat group. Researchers track an online shopping scam operation called “Phish ‘n’ Ships.” A Colorado Pathology lab notifies 1.8 million patients of a data breach. Our guest is Gary Barlet, Public Sector CTO at Illumio, with a timely look at election security. Packing a custom PC full of meth. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Gary Barlet, Public Sector CTO at Illumio, discussing where elections are most vulnerable and the potential dangers beyond national elections.

Selected Reading
Georgia official asks social media sites to take down Russian disinformation video (The Record)
CISA Strategic Plan Targets Global Cooperation on Cybersecurity (Security Boulevard)
Microsoft: Chinese hackers use Quad7 botnet to steal credentials (Bleeping Computer)
Microsoft delays Windows Recall again, now by December (Bleeping Computer)
Zero-Click Flaw Exposes Potentially Millions of Popular Storage Devices to Attack (WIRED)
CISA Warns of Critical Software Vulnerabilities in Industrial Devices (Infosecurity Magazine)
US, Israel Describe Iranian Hackers' Targeting of Olympics, Surveillance Cameras (SecurityWeek)
Fake product listings on real shopping sites lead to stolen payment information (SC Media)
Medusa Ransomware Hack of Pathology Lab Affects 1.8 Million (BankInfo Security)
Someone tried to smuggle 100kg of synthetic drugs into Australia inside a bunch of PC cases (TechSpot)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Georgia’s Secretary of State Pushes Social Media to Remove Russian Disinformation. CISA introduces its first international strategic plan. Microsoft issues a warning about the Quad7 botnet. Researchers uncover a zero-click vulnerability in Synology devices. CISA warns of critical ICS vulnerabilities. The U.S.and Israel outline the latest cyber activities of an Iranian threat group. Researchers track an online shopping scam operation called “Phish ‘n’ Ships.” A Colorado Pathology lab notifies 1.8 million patients of a data breach. Our guest is Gary Barlet, Public Sector CTO at Illumio, with a timely look at election security. Packing a custom PC full of meth. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/gary-barlet-illumio/">Gary Barlet</a>, Public Sector CTO at <a href="https://www.illumio.com/">Illumio</a>, discussing where elections are most vulnerable and the potential dangers beyond national elections.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/georgia-fake-voting-video-x-brad-raffensperger">Georgia official asks social media sites to take down Russian disinformation video</a> (The Record)</p><p><a href="https://securityboulevard.com/2024/11/cisa-strategic-plan-targets-global-cooperation-on-cybersecurity/">CISA Strategic Plan Targets Global Cooperation on Cybersecurity</a> (Security Boulevard)</p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-chinese-hackers-use-quad7-botnet-to-steal-credentials/">Microsoft: Chinese hackers use Quad7 botnet to steal credentials</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-delays-windows-recall-again-now-by-december/">Microsoft delays Windows Recall again, now by December</a> (Bleeping Computer)</p><p><a href="https://www.wired.com/story/synology-zero-click-vulnerability/">Zero-Click Flaw Exposes Potentially Millions of Popular Storage Devices to Attack</a> (WIRED)</p><p><a href="https://www.infosecurity-magazine.com/news/cisa-critical-vulnerabilities-ics/">CISA Warns of Critical Software Vulnerabilities in Industrial Devices</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/us-israel-describe-iranian-hackers-targeting-of-olympics-surveillance-cameras/">US, Israel Describe Iranian Hackers' Targeting of Olympics, Surveillance Cameras</a> (SecurityWeek)</p><p><a href="https://www.scworld.com/news/fake-product-listings-on-real-shopping-sites-lead-to-stolen-payment-information">Fake product listings on real shopping sites lead to stolen payment information </a>(SC Media)</p><p><a href="https://www.bankinfosecurity.com/medusa-ransomware-hack-pathology-lab-affects-18-million-a-26695">Medusa Ransomware Hack of Pathology Lab Affects 1.8 Million</a> (BankInfo Security)</p><p><a href="https://www.techspot.com/news/105384-someone-tried-smuggle-100kg-synthetic-drugs-australia-inside.html">Someone tried to smuggle 100kg of synthetic drugs into Australia inside a bunch of PC cases</a> (TechSpot)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1485</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b56ba3b0-b95e-11ee-8cf8-a72e45171e24]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4577906533.mp3?updated=1730484063" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Guarding the Vote</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2181/notes</link>
      <description>CISA spins up an election operations war room. Microsoft neglected to restrict access to gender-detecting AI. Yahoo uncovers vulnerabilities in OpenText’s NetIQ iManager. QNAP issues urgent patches for its NAS devices. Sysdig uncovers Emerald Whale. A malvertising campaign exploits Meta’s ad platform to spread the SYS01 infostealer. Senator Ron Wyden wants to tighten rules aimed at preventing U.S. technologies from reaching repressive regimes. Researchers use AI to uncover an IoT zero-day. Sophos reveals a five year battle with firewall hackers. Our guest is Frederico Hakamine, Technology Evangelist from Axonius, talking about how threats both overlap and differ across individuals and critical infrastructure. Be afraid of spooky data.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Frederico Hakamine, Technology Evangelist from Axonius, talking about how threats both overlap and differ across individuals and critical infrastructure.

Selected Reading
CISA Opens Election War Room to Combat Escalating Threats (GovInfo Security)
Agencies face ‘inflection point’ ahead of looming zero-trust deadline, CISA official says (CyberScoop)
Microsoft Provided Gender Detection AI on Accident (404 Media)
Yahoo Discloses NetIQ iManager Flaws Allowing Remote Code Execution (SecurityWeek)
QNAP patches critical SQLi flaw (Beyond Machines)
EMERALDWHALE: 15k Cloud Credentials Stolen in Operation Targeting Exposed Git Config Files (Sysdig)
Fake Meta Ads Hijacking Facebook Accounts to Spread SYS01 Infostealer (Hackread)
Exclusive: Senator calls on Commerce to tighten proposed rules on exporting surveillance, hacking tech to problematic nations (CyberScoop)
GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI (GreyNoise) 
Inside Sophos' 5-Year War With the Chinese Hackers Hijacking Its Devices (WIRED)
Pacific Rim: Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats (Sophos News)
Spooky Data at a Distance (LinkedIn)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 31 Oct 2024 20:10:00 -0000</pubDate>
      <itunes:title>Guarding the Vote</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2181</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA spins up an election operations war room. Microsoft neglected to restrict access to gender-detecting AI. Yahoo uncovers vulnerabilities in OpenText’s NetIQ iManager. QNAP issues urgent patches for its NAS devices. Sysdig uncovers Emerald Whale. A malvertising campaign exploits Meta’s ad platform to spread the SYS01 infostealer. Senator Ron Wyden wants to tighten rules aimed at preventing U.S. technologies from reaching repressive regimes. Researchers use AI to uncover an IoT zero-day. Sophos reveals a five year battle with firewall hackers. Our guest is Frederico Hakamine, Technology Evangelist from Axonius, talking about how threats both overlap and differ across individuals and critical infrastructure. Be afraid of spooky data.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Frederico Hakamine, Technology Evangelist from Axonius, talking about how threats both overlap and differ across individuals and critical infrastructure.

Selected Reading
CISA Opens Election War Room to Combat Escalating Threats (GovInfo Security)
Agencies face ‘inflection point’ ahead of looming zero-trust deadline, CISA official says (CyberScoop)
Microsoft Provided Gender Detection AI on Accident (404 Media)
Yahoo Discloses NetIQ iManager Flaws Allowing Remote Code Execution (SecurityWeek)
QNAP patches critical SQLi flaw (Beyond Machines)
EMERALDWHALE: 15k Cloud Credentials Stolen in Operation Targeting Exposed Git Config Files (Sysdig)
Fake Meta Ads Hijacking Facebook Accounts to Spread SYS01 Infostealer (Hackread)
Exclusive: Senator calls on Commerce to tighten proposed rules on exporting surveillance, hacking tech to problematic nations (CyberScoop)
GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI (GreyNoise) 
Inside Sophos' 5-Year War With the Chinese Hackers Hijacking Its Devices (WIRED)
Pacific Rim: Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats (Sophos News)
Spooky Data at a Distance (LinkedIn)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA spins up an election operations war room. Microsoft neglected to restrict access to gender-detecting AI. Yahoo uncovers vulnerabilities in OpenText’s NetIQ iManager. QNAP issues urgent patches for its NAS devices. Sysdig uncovers Emerald Whale. A malvertising campaign exploits Meta’s ad platform to spread the SYS01 infostealer. Senator Ron Wyden wants to tighten rules aimed at preventing U.S. technologies from reaching repressive regimes. Researchers use AI to uncover an IoT zero-day. Sophos reveals a five year battle with firewall hackers. Our guest is Frederico Hakamine, Technology Evangelist from Axonius, talking about how threats both overlap and differ across individuals and critical infrastructure. Be afraid of spooky data.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/fred-/">Frederico Hakamine</a>, Technology Evangelist from <a href="https://www.axonius.com/">Axonius</a>, talking about how threats both overlap and differ across individuals and critical infrastructure.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.govinfosecurity.com/cisa-opens-election-war-room-to-combat-escalating-threats-a-26685">CISA Opens Election War Room to Combat Escalating Threats</a> (GovInfo Security)</p><p><a href="https://cyberscoop.com/zero-trust-implementation-plan-cisa-federal-agencies-deadline/">Agencies face ‘inflection point’ ahead of looming zero-trust deadline, CISA official says</a> (CyberScoop)</p><p><a href="https://www.404media.co/microsoft-provided-gender-detection-ai-on-accident/">Microsoft Provided Gender Detection AI on Accident</a> (404 Media)</p><p><a href="https://www.securityweek.com/yahoo-discloses-netiq-imanager-flaws-allowing-remote-code-execution/">Yahoo Discloses NetIQ iManager Flaws Allowing Remote Code Execution</a> (SecurityWeek)</p><p><a href="https://beyondmachines.net/event_details/qnap-patches-critical-sqli-flaw-i-p-p-n-e/gD2P6Ple2L">QNAP patches critical SQLi flaw</a> (Beyond Machines)</p><p><a href="https://sysdig.com/blog/emeraldwhale/">EMERALDWHALE: 15k Cloud Credentials Stolen in Operation Targeting Exposed Git Config Files</a> (Sysdig)</p><p><a href="https://hackread.com/fake-meta-ads-hijacking-facebook-sys01-infostealer/">Fake Meta Ads Hijacking Facebook Accounts to Spread SYS01 Infostealer</a> (Hackread)</p><p><a href="https://cyberscoop.com/exclusive-ron-wyden-commerce-rules-exporting-surveillance-hacking-tech/">Exclusive: Senator calls on Commerce to tighten proposed rules on exporting surveillance, hacking tech to problematic nations</a> (CyberScoop)</p><p><a href="http://www.greynoise.io/blog/greynoise-intelligence-discovers-zero-day-vulnerabilities-in-live-streaming-cameras-with-the-help-of-ai">GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI</a> (GreyNoise) </p><p><a href="https://www.wired.com/story/sophos-chengdu-china-five-year-hacker-war/">Inside Sophos' 5-Year War With the Chinese Hackers Hijacking Its Devices</a> (WIRED)</p><p><a href="https://news.sophos.com/en-us/2024/10/31/pacific-rim-neutralizing-china-based-threat/">Pacific Rim: Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats</a> (Sophos News)</p><p><a href="https://www.linkedin.com/pulse/spooky-data-distance-simson-garfinkel-nrt9e/">Spooky Data at a Distance</a> (LinkedIn)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1667</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5339790-b95e-11ee-8cf8-ab5ca2f69a69]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1049728713.mp3?updated=1730404020" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Malware Mash</title>
      <description>Happy Halloween from the team at N2K Networks! 

We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here.  

Lyrics

I was coding in the lab late one night
when my eyes beheld an eerie sight 
for my malware threat score began to rise 
and suddenly to my surprise...

It did the Mash 
It did the Malware Mash 
The Malware Mash 
It was a botnet smash 
It did the Mash 
It caught on 'cause of Flash 
The Malware Mash 
It did the Malware Mash

From the Stuxnet worm squirming toward the near east 
to the dark web souqs where the script kiddies feast 
the APTs left their humble abodes 
to get installed from rootkit payloads. 

They did the Mash 
They did the Malware Mash 
The Malware Mash 
It was an adware smash 
They did the Mash 
It caught on 'cause of Flash 
The Malware Mash 
They did the Malware Mash

The botnets were having fun 
The DDoS had just begun 
The viruses hit the darknet, 
with ransomware yet to come. 
The keys were logging, phishing emails abound, 
Snowden on chains, backed by his Russian hounds. 
The Shadow Brokers were about to arrive 
with their vocal group, "The NotPetya Five."

They did the Mash 
They played the Malware Mash
The Malware Mash 
It was a botnet smash 
They did the Mash 
It caught on 'cause of Flash 
The Malware Mash 
They played the Malware Mash

Somewhere in Moscow Vlad's voice did ring 
Seems he was troubled by just one thing. 
He opened a shell then shook his fist 
and said, "Whatever happened to my Turla Trojan twist." 

It's now the Mash 
It's now the Malware Mash 
The Malware Mash 
And it's a botnet smash 
It's now the Mash 
It caught on 'cause of Flash 
The Malware Mash 
It's now the Malware Mash

Now everything's cool, Vlad's a part of the band 
And the Malware Mash is the hit of the land. 
For you, defenders, this mash was meant to 
when you get to my door, tell them Creeper sent you.

Then you can Mash 
Then you can Malware Mash 
The Malware Mash 
And be a botnet smash 
It is the Mash 
Don't you dare download Flash 
The Malware Mash 
Just do the Malware Mash
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 31 Oct 2024 18:40:00 -0000</pubDate>
      <itunes:title>The Malware Mash</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ce75845c-97b6-11ef-96a1-af70dae85f2f/image/a7bd2dc42eefee62cd5572fe3881cc20.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Happy Halloween from the team at N2K Networks! 

We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here.  

Lyrics

I was coding in the lab late one night
when my eyes beheld an eerie sight 
for my malware threat score began to rise 
and suddenly to my surprise...

It did the Mash 
It did the Malware Mash 
The Malware Mash 
It was a botnet smash 
It did the Mash 
It caught on 'cause of Flash 
The Malware Mash 
It did the Malware Mash

From the Stuxnet worm squirming toward the near east 
to the dark web souqs where the script kiddies feast 
the APTs left their humble abodes 
to get installed from rootkit payloads. 

They did the Mash 
They did the Malware Mash 
The Malware Mash 
It was an adware smash 
They did the Mash 
It caught on 'cause of Flash 
The Malware Mash 
They did the Malware Mash

The botnets were having fun 
The DDoS had just begun 
The viruses hit the darknet, 
with ransomware yet to come. 
The keys were logging, phishing emails abound, 
Snowden on chains, backed by his Russian hounds. 
The Shadow Brokers were about to arrive 
with their vocal group, "The NotPetya Five."

They did the Mash 
They played the Malware Mash
The Malware Mash 
It was a botnet smash 
They did the Mash 
It caught on 'cause of Flash 
The Malware Mash 
They played the Malware Mash

Somewhere in Moscow Vlad's voice did ring 
Seems he was troubled by just one thing. 
He opened a shell then shook his fist 
and said, "Whatever happened to my Turla Trojan twist." 

It's now the Mash 
It's now the Malware Mash 
The Malware Mash 
And it's a botnet smash 
It's now the Mash 
It caught on 'cause of Flash 
The Malware Mash 
It's now the Malware Mash

Now everything's cool, Vlad's a part of the band 
And the Malware Mash is the hit of the land. 
For you, defenders, this mash was meant to 
when you get to my door, tell them Creeper sent you.

Then you can Mash 
Then you can Malware Mash 
The Malware Mash 
And be a botnet smash 
It is the Mash 
Don't you dare download Flash 
The Malware Mash 
Just do the Malware Mash
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<h3>Happy Halloween from the team at N2K Networks! </h3><p><br></p><p>We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video <a href="https://youtu.be/QBpAAhbPOk0">here</a>.  </p><h2><br></h2><h3><strong>Lyrics</strong></h3><p><br></p><p>I was coding in the lab late one night</p><p>when my eyes beheld an eerie sight </p><p>for my malware threat score began to rise </p><p>and suddenly to my surprise...</p><p><br></p><p>It did the Mash </p><p>It did the Malware Mash </p><p>The Malware Mash </p><p>It was a botnet smash </p><p>It did the Mash </p><p>It caught on 'cause of Flash </p><p>The Malware Mash </p><p>It did the Malware Mash</p><p><br></p><p>From the Stuxnet worm squirming toward the near east </p><p>to the dark web souqs where the script kiddies feast </p><p>the APTs left their humble abodes </p><p>to get installed from rootkit payloads. </p><p><br></p><p>They did the Mash </p><p>They did the Malware Mash </p><p>The Malware Mash </p><p>It was an adware smash </p><p>They did the Mash </p><p>It caught on 'cause of Flash </p><p>The Malware Mash </p><p>They did the Malware Mash</p><p><br></p><p>The botnets were having fun </p><p>The DDoS had just begun </p><p>The viruses hit the darknet, </p><p>with ransomware yet to come. </p><p>The keys were logging, phishing emails abound, </p><p>Snowden on chains, backed by his Russian hounds. </p><p>The Shadow Brokers were about to arrive </p><p>with their vocal group, "The NotPetya Five."</p><p><br></p><p>They did the Mash </p><p>They played the Malware Mash</p><p>The Malware Mash </p><p>It was a botnet smash </p><p>They did the Mash </p><p>It caught on 'cause of Flash </p><p>The Malware Mash </p><p>They played the Malware Mash</p><p><br></p><p>Somewhere in Moscow Vlad's voice did ring </p><p>Seems he was troubled by just one thing. </p><p>He opened a shell then shook his fist </p><p>and said, "Whatever happened to my Turla Trojan twist." </p><p><br></p><p>It's now the Mash </p><p>It's now the Malware Mash </p><p>The Malware Mash </p><p>And it's a botnet smash </p><p>It's now the Mash </p><p>It caught on 'cause of Flash </p><p>The Malware Mash </p><p>It's now the Malware Mash</p><p><br></p><p>Now everything's cool, Vlad's a part of the band </p><p>And the Malware Mash is the hit of the land. </p><p>For you, defenders, this mash was meant to </p><p>when you get to my door, tell them Creeper sent you.</p><p><br></p><p>Then you can Mash </p><p>Then you can Malware Mash </p><p>The Malware Mash </p><p>And be a botnet smash </p><p>It is the Mash </p><p>Don't you dare download Flash </p><p>The Malware Mash </p><p>Just do the Malware Mash</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>291</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ce75845c-97b6-11ef-96a1-af70dae85f2f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4977983935.mp3?updated=1730399988" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Password snafu sparks election security questions.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2180/notes</link>
      <description>Colorado election officials downplay a partial password leak. Over 22,000 CyberPanel instances were targeted in a ransomware attack. Google issues a critical security update for Chrome. Microsoft says Russia’s SVR is conducting a wide-ranging phishing campaign. The FakeCall Android banking trojan gains advanced evasion and espionage capabilities. A New 0patch Fix Blocks Malicious Theme Files. iOS malware LightSpy adds destructive features. LinkedIn faces class-action lawsuits over alleged privacy violations. The U.S. charges a Russian national as part of Operation Magnus. On this week’s CertByte segment, Chris Hare is joined by Dan Neville to break down a question targeting the Certified Associate in Project Management (CAPM)® certification. An Ex-Disney Staffer Allegedly Adds a Side of Sabotage to Park Menus. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
In this segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by Dan Neville to break down a question targeting the Certified Associate in Project Management (CAPM)® certification by the Project Management Institute®. Today’s question comes from N2K’s PMI® Certified Associate in Project Management (CAPM®) Practice Test.
If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro.
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.
Additional sources: The 9 Most In-Demand Professional Certifications You Can Get Right Now

Selected Reading
Partial Breach of Election Machine Passwords in Colorado Poses No Risk, State Says (The New York Times)
Election Threats Escalating as US Voters Flock to the Polls (BankInfo Security)
Massive PSAUX ransomware attack targets 22,000 CyberPanel instances (Bleeping Computer)
Critical Chrome Security Update: Patch for Out-of-Bounds &amp; WebRTC Vulnerability (Cyber Security News)
Russian spies use remote desktop protocol files in unusual mass phishing drive (The Register)
FakeCall Android Trojan Evolves with New Evasion Tactics and Expanded Espionage Capabilities (SecurityWeek)
0patch Blog: We Patched CVE-2024-38030, Found Another Windows Themes Spoofing Vulnerability (0day) (0patch)
Recent Version of LightSpy iOS Malware Packs Destructive Capabilities (SecurityWeek)
Lawsuits Accuse LinkedIn of Tracking Users' Health Info (GovInfo Security)
Feds name a Russian accused of developing Redline (The Register)
Fired Employee Allegedly Hacked Disney World's Menu System to Alter Peanut Allergy Information (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 30 Oct 2024 20:10:00 -0000</pubDate>
      <itunes:title>Password snafu sparks election security questions.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2180</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Colorado election officials downplay a partial password leak. Over 22,000 CyberPanel instances were targeted in a ransomware attack. Google issues a critical security update for Chrome. Microsoft says Russia’s SVR is conducting a wide-ranging phishing campaign. The FakeCall Android banking trojan gains advanced evasion and espionage capabilities. A New 0patch Fix Blocks Malicious Theme Files. iOS malware LightSpy adds destructive features. LinkedIn faces class-action lawsuits over alleged privacy violations. The U.S. charges a Russian national as part of Operation Magnus. On this week’s CertByte segment, Chris Hare is joined by Dan Neville to break down a question targeting the Certified Associate in Project Management (CAPM)® certification. An Ex-Disney Staffer Allegedly Adds a Side of Sabotage to Park Menus. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
In this segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by Dan Neville to break down a question targeting the Certified Associate in Project Management (CAPM)® certification by the Project Management Institute®. Today’s question comes from N2K’s PMI® Certified Associate in Project Management (CAPM®) Practice Test.
If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro.
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.
Additional sources: The 9 Most In-Demand Professional Certifications You Can Get Right Now

Selected Reading
Partial Breach of Election Machine Passwords in Colorado Poses No Risk, State Says (The New York Times)
Election Threats Escalating as US Voters Flock to the Polls (BankInfo Security)
Massive PSAUX ransomware attack targets 22,000 CyberPanel instances (Bleeping Computer)
Critical Chrome Security Update: Patch for Out-of-Bounds &amp; WebRTC Vulnerability (Cyber Security News)
Russian spies use remote desktop protocol files in unusual mass phishing drive (The Register)
FakeCall Android Trojan Evolves with New Evasion Tactics and Expanded Espionage Capabilities (SecurityWeek)
0patch Blog: We Patched CVE-2024-38030, Found Another Windows Themes Spoofing Vulnerability (0day) (0patch)
Recent Version of LightSpy iOS Malware Packs Destructive Capabilities (SecurityWeek)
Lawsuits Accuse LinkedIn of Tracking Users' Health Info (GovInfo Security)
Feds name a Russian accused of developing Redline (The Register)
Fired Employee Allegedly Hacked Disney World's Menu System to Alter Peanut Allergy Information (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Colorado election officials downplay a partial password leak. Over 22,000 CyberPanel instances were targeted in a ransomware attack. Google issues a critical security update for Chrome. Microsoft says Russia’s SVR is conducting a wide-ranging phishing campaign. The FakeCall Android banking trojan gains advanced evasion and espionage capabilities. A New 0patch Fix Blocks Malicious Theme Files. iOS malware LightSpy adds destructive features. LinkedIn faces class-action lawsuits over alleged privacy violations. The U.S. charges a Russian national as part of Operation Magnus. On this week’s CertByte segment, Chris Hare is joined by Dan Neville to break down a question targeting the Certified Associate in Project Management (CAPM)® certification. An Ex-Disney Staffer Allegedly Adds a Side of Sabotage to Park Menus. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CertByte Segment</h2><p>In this segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by<a href="https://www.linkedin.com/in/danneville1/"> </a><a href="https://www.linkedin.com/in/danneville1/">Dan Neville</a> to break down a question targeting the Certified Associate in Project Management (CAPM)® certification by the Project Management Institute®. Today’s question comes from N2K’s<a href="https://certify.cybervista.net/products/pmi/capm-practice-test/"> PMI® Certified Associate in Project Management (CAPM®) Practice Test</a>.</p><p>If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at<a href="http://n2k.com/certify."> </a><a href="http://n2k.com/certify.">n2k.com/certify.</a> To get the full news to knowledge experience, learn more about our N2K Pro subscription at<a href="https://thecyberwire.com/pro."> </a><a href="https://thecyberwire.com/pro.">https://thecyberwire.com/pro.</a></p><p><em>Please</em> <em>note: The questions and answe</em>r<em>s provid</em>e<em>d here, and on our site, are not actual current or </em>p<em>ri</em>or<em> ques</em>t<em>ions and answer</em>s f<em>r</em>o<em>m these ce</em>r<em>tification publishers</em> <em>or providers.</em></p><p>A<em>dditional so</em>ur<em>c</em>e<em>s:</em><a href="https://www.entrepreneur.com/starting-a-business/the-9-most-in-demand-professional-certifications-you-can/453592"> </a><a href="https://www.entrepreneur.com/starting-a-business/the-9-most-in-demand-professional-certifications-you-can/453592">The 9 Most In-Demand Professional Certifications You Can Get Right Now</a></p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.nytimes.com/2024/10/29/us/politics/colorado-election-passwords-breach.html">Partial Breach of Election Machine Passwords in Colorado Poses No Risk, State Says</a> (The New York Times)</p><p><a href="https://www.bankinfosecurity.com/election-threats-escalating-as-us-voters-flock-to-polls-a-26672">Election Threats Escalating as US Voters Flock to the Polls</a> (BankInfo Security)</p><p><a href="https://www.bleepingcomputer.com/news/security/massive-psaux-ransomware-attack-targets-22-000-cyberpanel-instances/">Massive PSAUX ransomware attack targets 22,000 CyberPanel instances</a> (Bleeping Computer)</p><p><a href="https://cybersecuritynews.com/chrome-security-out-of-bounds-webrtc/">Critical Chrome Security Update: Patch for Out-of-Bounds &amp; WebRTC Vulnerability</a> (Cyber Security News)</p><p><a href="https://www.theregister.com/2024/10/30/russia_wrangles_rdp_files_in/">Russian spies use remote desktop protocol files in unusual mass phishing drive</a> (The Register)</p><p><a href="https://www.securityweek.com/fakecall-android-trojan-evolves-with-new-evasion-tactics-and-expanded-espionage-capabilities/">FakeCall Android Trojan Evolves with New Evasion Tactics and Expanded Espionage Capabilities</a> (SecurityWeek)</p><p><a href="https://blog.0patch.com/2024/10/we-patched-cve-2024-38030-found-another.html">0patch Blog: We Patched CVE-2024-38030, Found Another Windows Themes Spoofing Vulnerability (0day)</a> (0patch)</p><p><a href="https://www.securityweek.com/recent-version-of-lightspy-ios-malware-packs-destructive-capabilities/">Recent Version of LightSpy iOS Malware Packs Destructive Capabilities</a> (SecurityWeek)</p><p><a href="https://www.govinfosecurity.com/lawsuits-accuse-linkedin-tracking-users-health-info-a-26668">Lawsuits Accuse LinkedIn of Tracking Users' Health Info</a> (GovInfo Security)</p><p><a href="https://www.theregister.com/2024/10/29/russian_redline_malware/">Feds name a Russian accused of developing Redline</a> (The Register)</p><p><a href="https://www.404media.co/fired-employee-allegedly-hacked-disney-worlds-menu-system-to-alter-peanut-allergy-information/">Fired Employee Allegedly Hacked Disney World's Menu System to Alter Peanut Allergy Information</a> (404 Media)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1611</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4fa7e6a-b95e-11ee-8cf8-4f9dffe3aae0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6476959603.mp3?updated=1730315988" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Securing democracy. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2179/notes</link>
      <description>Chinese hacking into US telecoms draws federal scrutiny. ESET examines Evasive Panda’s CloudScout toolset. A new ChatGPT jailbreak bypassed security safeguards. Nintendo warns users of a phishing scam. The Five Eyes launch the Secure Innovation initiative for startups. CISA releases “Product Security Bad Practices” guidelines. Apple’s new bug bounty program offers a million bucks for critical vulnerabilities. The City of Columbus drops its suit of a cybersecurity researcher. On our Solution Spotlight today, N2K’s Simone Petrella speaks with Chris Porter, CISO at Fannie Mae, on cultivating cybersecurity culture and talent. Spooky spam is back.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight today, N2K’s Simone Petrella speaks with Chris Porter, CISO at Fannie Mae, on cultivating cybersecurity culture and talent. You can hear Simone’s and Chris’ full conversation in this special edition podcast.

Selected Reading
Key Federal Cyber Panel to Probe Chinese Telecoms Hacking (Bank Info Security)
CloudScout: Evasive Panda scouting cloud services (We Live Security)
ChatGPT Jailbreak: Researchers Bypass AI Safeguards Using Hexadecimal Encoding and Emojis (SecurityWeek)
Nintendo Warns of Phishing Attack Mimics Company Email Address (gbhackers)
Five Eyes Agencies Launch Startup Security Initiative (Infosecurity magazine)
CISA sees elimination of ‘bad practices’ as next secure-by-design step (CyberScoop)
Apple Launches 'Apple Intelligence' and Offers $1M Bug Bounty for Security (Hackread)
Columbus drops lawsuit against data leak whistleblower Connor Goodwolf, but with a catch (NBC)
Spooky Spam, Scary Scams: Halloween Threats Rise (Security Boulevard)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Oct 2024 20:10:00 -0000</pubDate>
      <itunes:title>Securing democracy. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2179</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Chinese hacking into US telecoms draws federal scrutiny. ESET examines Evasive Panda’s CloudScout toolset. A new ChatGPT jailbreak bypassed security safeguards. Nintendo warns users of a phishing scam. The Five Eyes launch the Secure Innovation initiative for startups. CISA releases “Product Security Bad Practices” guidelines. Apple’s new bug bounty program offers a million bucks for critical vulnerabilities. The City of Columbus drops its suit of a cybersecurity researcher. On our Solution Spotlight today, N2K’s Simone Petrella speaks with Chris Porter, CISO at Fannie Mae, on cultivating cybersecurity culture and talent. Spooky spam is back.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight today, N2K’s Simone Petrella speaks with Chris Porter, CISO at Fannie Mae, on cultivating cybersecurity culture and talent. You can hear Simone’s and Chris’ full conversation in this special edition podcast.

Selected Reading
Key Federal Cyber Panel to Probe Chinese Telecoms Hacking (Bank Info Security)
CloudScout: Evasive Panda scouting cloud services (We Live Security)
ChatGPT Jailbreak: Researchers Bypass AI Safeguards Using Hexadecimal Encoding and Emojis (SecurityWeek)
Nintendo Warns of Phishing Attack Mimics Company Email Address (gbhackers)
Five Eyes Agencies Launch Startup Security Initiative (Infosecurity magazine)
CISA sees elimination of ‘bad practices’ as next secure-by-design step (CyberScoop)
Apple Launches 'Apple Intelligence' and Offers $1M Bug Bounty for Security (Hackread)
Columbus drops lawsuit against data leak whistleblower Connor Goodwolf, but with a catch (NBC)
Spooky Spam, Scary Scams: Halloween Threats Rise (Security Boulevard)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chinese hacking into US telecoms draws federal scrutiny. ESET examines Evasive Panda’s CloudScout toolset. A new ChatGPT jailbreak bypassed security safeguards. Nintendo warns users of a phishing scam. The Five Eyes launch the Secure Innovation initiative for startups. CISA releases “Product Security Bad Practices” guidelines. Apple’s new bug bounty program offers a million bucks for critical vulnerabilities. The City of Columbus drops its suit of a cybersecurity researcher. On our Solution Spotlight today, N2K’s Simone Petrella speaks with Chris Porter, CISO at Fannie Mae, on cultivating cybersecurity culture and talent. Spooky spam is back.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Solution Spotlight today, <a href="https://www.n2k.com/">N2K</a>’s <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a> speaks with <a href="https://www.linkedin.com/in/christopherdporter/">Chris Porter</a>, CISO at <a href="https://www.fanniemae.com/">Fannie Mae</a>, on cultivating cybersecurity culture and talent. You can hear Simone’s and Chris’ full conversation in this <a href="https://thecyberwire.com/podcasts/special-edition/78/notes">special edition</a> podcast.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bankinfosecurity.com/key-federal-cyber-panel-to-probe-chinese-telecoms-hacking-a-26648">Key Federal Cyber Panel to Probe Chinese Telecoms Hacking</a> (Bank Info Security)</p><p><a href="https://www.welivesecurity.com/en/eset-research/cloudscout-evasive-panda-scouting-cloud-services/">CloudScout: Evasive Panda scouting cloud services</a> (We Live Security)</p><p><a href="https://www.securityweek.com/first-chatgpt-jailbreak-disclosed-via-mozillas-new-ai-bug-bounty-program/">ChatGPT Jailbreak: Researchers Bypass AI Safeguards Using Hexadecimal Encoding and Emojis</a> (SecurityWeek)</p><p><a href="https://gbhackers.com/nintendo-warns-of-phishing-attack/">Nintendo Warns of Phishing Attack Mimics Company Email Address</a> (gbhackers)</p><p><a href="https://www.infosecurity-magazine.com/news/five-eyes-agencies-startup/">Five Eyes Agencies Launch Startup Security Initiative</a> (Infosecurity magazine)</p><p><a href="https://cyberscoop.com/cisa-secure-by-design-software-bad-practices/">CISA sees elimination of ‘bad practices’ as next secure-by-design step</a><a href="https://cyberscoop.com/cisa-secure-by-design-software-bad-practices/"> (CyberScoop</a>)</p><p><a href="https://hackread.com/apple-launches-apple-intelligence-bug-bounty/">Apple Launches 'Apple Intelligence' and Offers $1M Bug Bounty for Security</a> (Hackread)</p><p><a href="https://www.nbc4i.com/news/local-news/columbus/columbus-drops-lawsuit-against-data-leak-whistleblower-connor-goodwolf-but-with-a-catch/">Columbus drops lawsuit against data leak whistleblower Connor Goodwolf, but with a catch</a> (NBC)</p><p><a href="https://securityboulevard.com/2024/10/spooky-spam-scary-scams-halloween-threats-rise/">Spooky Spam, Scary Scams: Halloween Threats Rise</a> (Security Boulevard)</p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1755</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4c1edc0-b95e-11ee-8cf8-6f01bee4b3d9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3947096109.mp3?updated=1730230469" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Solution Spotlight: Cultivating cybersecurity culture. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/78/notes</link>
      <description>In this Solution Spotlight episode, our very own Simone Petrella sits down with Chris Porter, the Chief Information Security Officer at Fannie Mae. As a seasoned expert in the financial and cybersecurity sectors, Chris shares insights into how Fannie Mae navigates the complexities of securing one of the nation's most critical financial institutions.

Together, they discuss Fannie Mae's evolving cybersecurity posture, balancing innovation with risk management, and the critical strategies employed to protect sensitive data in an increasingly digital and interconnected world. Chris also delves into the importance of collaboration across the industry, highlighting partnerships and intelligence-sharing as vital components in mitigating cyber threats.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Oct 2024 20:10:00 -0000</pubDate>
      <itunes:title>Solution Spotlight: Cultivating cybersecurity culture. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>78</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5d7fe61c-9616-11ef-bb08-a37d2ddc7087/image/0216c9cea15c53e5d2c739964a38623c.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this Solution Spotlight episode, our very own Simone Petrella sits down with Chris Porter, the Chief Information Security Officer at Fannie Mae. As a seasoned expert in the financial and cybersecurity sectors, Chris shares insights into how Fannie Mae navigates the complexities of securing one of the nation's most critical financial institutions.

Together, they discuss Fannie Mae's evolving cybersecurity posture, balancing innovation with risk management, and the critical strategies employed to protect sensitive data in an increasingly digital and interconnected world. Chris also delves into the importance of collaboration across the industry, highlighting partnerships and intelligence-sharing as vital components in mitigating cyber threats.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this Solution Spotlight episode, our very own <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a> sits down with <a href="https://www.linkedin.com/in/christopherdporter/">Chris Porter</a>, the Chief Information Security Officer at <a href="https://www.fanniemae.com/">Fannie Mae</a>. As a seasoned expert in the financial and cybersecurity sectors, Chris shares insights into how Fannie Mae navigates the complexities of securing one of the nation's most critical financial institutions.</p><p><br></p><p>Together, they discuss Fannie Mae's evolving cybersecurity posture, balancing innovation with risk management, and the critical strategies employed to protect sensitive data in an increasingly digital and interconnected world. Chris also delves into the importance of collaboration across the industry, highlighting partnerships and intelligence-sharing as vital components in mitigating cyber threats.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1893</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5d7fe61c-9616-11ef-bb08-a37d2ddc7087]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9221623521.mp3?updated=1730221820" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Operation Magnus strikes back.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2178/notes</link>
      <description>Operation Magnus disrupts notorious infostealers. Pennsylvania officials debunk election disinformation attributed to Russia. TeamTNT targets Docker daemons. Delta sues CrowdStrike. NVIDIA released a critical GPU Display Driver update. Fog and Akira ransomware exploit SonicWall VPNs. A researcher demonstrates Downgrade attacks against Windows systems. Qilin ransomware grows more evasive and disruptive. Pwn2Own Ireland awards over $1 million for more than 70 zero-day vulnerabilities. Our guest is Grant Geyer, Chief Strategy Officer at Claroty, talking about safeguarding our nation's critical food infrastructure. At long last, it’s legal to fix your McFlurry. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Grant Geyer, Chief Strategy Officer at Claroty, talking about safeguarding our nation's critical food infrastructure. The FBI recently held an Agriculture Threats Symposium in Nebraska, spotlighting growing concerns over the security of the nation's critical food infrastructure amid rising threats. As cyberattacks and bioterrorism increasingly target agriculture, the event highlighted urgent calls for stronger safety measures to protect the food supply chain. 

Selected Reading
Operation Magnus Disrupted Redline and Meta Infostealer Malware (Cyber Security News)
Pennsylvania officials rebut false voter fraud claims from home and abroad (CyberScoop)
TeamTNT Exploits 16 Million IPs in Malware Attack on Docker Clusters (Hackread)
Delta sues CrowdStrike for $500 million in damages caused by massive airline cancelations (The Independent)
NVIDIA GPU Vulnerabilities Allow Attackers To Execute Remote Code on Windows &amp; Linux (Cyber Security News)
Fog ransomware targets SonicWall VPNs to breach corporate networks (Bleeping Computer)
New Windows Driver Signature bypass allows kernel rootkit installs (Bleeping Computer)
Updated Qilin Ransomware Escalates Encryption and Evasion (BankInfo Security)
Researchers Discover Over 70 Zero-Day Bugs at Pwn2Own Ireland (Infosecurity Magazine)
It Is Now Legal to Hack McFlurry Machines (and Medical Devices) to Fix Them (404 Media)
DisMis: Explore our 3-part series on election propaganda. (N2K)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 28 Oct 2024 20:10:00 -0000</pubDate>
      <itunes:title>Operation Magnus strikes back.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2178</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Operation Magnus disrupts notorious infostealers. Pennsylvania officials debunk election disinformation attributed to Russia. TeamTNT targets Docker daemons. Delta sues CrowdStrike. NVIDIA released a critical GPU Display Driver update. Fog and Akira ransomware exploit SonicWall VPNs. A researcher demonstrates Downgrade attacks against Windows systems. Qilin ransomware grows more evasive and disruptive. Pwn2Own Ireland awards over $1 million for more than 70 zero-day vulnerabilities. Our guest is Grant Geyer, Chief Strategy Officer at Claroty, talking about safeguarding our nation's critical food infrastructure. At long last, it’s legal to fix your McFlurry. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Grant Geyer, Chief Strategy Officer at Claroty, talking about safeguarding our nation's critical food infrastructure. The FBI recently held an Agriculture Threats Symposium in Nebraska, spotlighting growing concerns over the security of the nation's critical food infrastructure amid rising threats. As cyberattacks and bioterrorism increasingly target agriculture, the event highlighted urgent calls for stronger safety measures to protect the food supply chain. 

Selected Reading
Operation Magnus Disrupted Redline and Meta Infostealer Malware (Cyber Security News)
Pennsylvania officials rebut false voter fraud claims from home and abroad (CyberScoop)
TeamTNT Exploits 16 Million IPs in Malware Attack on Docker Clusters (Hackread)
Delta sues CrowdStrike for $500 million in damages caused by massive airline cancelations (The Independent)
NVIDIA GPU Vulnerabilities Allow Attackers To Execute Remote Code on Windows &amp; Linux (Cyber Security News)
Fog ransomware targets SonicWall VPNs to breach corporate networks (Bleeping Computer)
New Windows Driver Signature bypass allows kernel rootkit installs (Bleeping Computer)
Updated Qilin Ransomware Escalates Encryption and Evasion (BankInfo Security)
Researchers Discover Over 70 Zero-Day Bugs at Pwn2Own Ireland (Infosecurity Magazine)
It Is Now Legal to Hack McFlurry Machines (and Medical Devices) to Fix Them (404 Media)
DisMis: Explore our 3-part series on election propaganda. (N2K)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Operation Magnus disrupts notorious infostealers. Pennsylvania officials debunk election disinformation attributed to Russia. TeamTNT targets Docker daemons. Delta sues CrowdStrike. NVIDIA released a critical GPU Display Driver update. Fog and Akira ransomware exploit SonicWall VPNs. A researcher demonstrates Downgrade attacks against Windows systems. Qilin ransomware grows more evasive and disruptive. Pwn2Own Ireland awards over $1 million for more than 70 zero-day vulnerabilities. Our guest is Grant Geyer, Chief Strategy Officer at Claroty, talking about safeguarding our nation's critical food infrastructure. At long last, it’s legal to fix your McFlurry. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/grantgeyer/">Grant Geyer</a>, Chief Strategy Officer at <a href="https://claroty.com/">Claroty</a>, talking about safeguarding our nation's critical food infrastructure. The FBI recently held an<a href="https://www.fbi.gov/news/stories/agriculture-threats-symposium-in-nebraska-highlights-safety-measures-to-protect-nations-critical-food-infrastructure"> Agriculture Threats Symposium</a> in Nebraska, spotlighting growing concerns over the security of the nation's critical food infrastructure amid rising threats. As cyberattacks and bioterrorism increasingly target agriculture, the event highlighted urgent calls for stronger safety measures to protect the food supply chain. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://cybersecuritynews.com/redline-and-meta-infostealers/">Operation Magnus Disrupted Redline and Meta Infostealer Malware</a> (Cyber Security News)</p><p><a href="https://cyberscoop.com/pennsylvania-disinformation-voter-fraud-domestic-foreign/">Pennsylvania officials rebut false voter fraud claims from home and abroad</a> (CyberScoop)</p><p><a href="https://hackread.com/teamtnt-exploits-ips-malware-attack-docker-clusters/">TeamTNT Exploits 16 Million IPs in Malware Attack on Docker Clusters</a> (Hackread)</p><p><a href="https://www.independent.co.uk/news/world/americas/delta-crowdstrike-lawsuit-airline-cancelations-b2636227.html">Delta sues CrowdStrike for $500 million in damages caused by massive airline cancelations </a>(The Independent)</p><p><a href="https://cybersecuritynews.com/nvidia-gpu-display-driver-vulnerabilities/">NVIDIA GPU Vulnerabilities Allow Attackers To Execute Remote Code on Windows &amp; Linux</a> (Cyber Security News)</p><p><a href="https://www.bleepingcomputer.com/news/security/fog-ransomware-targets-sonicwall-vpns-to-breach-corporate-networks/">Fog ransomware targets SonicWall VPNs to breach corporate networks</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-windows-driver-signature-bypass-allows-kernel-rootkit-installs/">New Windows Driver Signature bypass allows kernel rootkit installs</a> (Bleeping Computer)</p><p><a href="https://www.bankinfosecurity.com/updated-qilin-ransomware-escalates-encryption-evasion-a-26637">Updated Qilin Ransomware Escalates Encryption and Evasion</a> (BankInfo Security)</p><p><a href="https://www.infosecurity-magazine.com/news/researchers-70-zeroday-bugspwn/">Researchers Discover Over 70 Zero-Day Bugs at Pwn2Own Ireland </a>(Infosecurity Magazine)</p><p><a href="https://www.404media.co/it-is-now-legal-to-hack-mcflurry-machines-and-medical-devices-to-fix-them/">It Is Now Legal to Hack McFlurry Machines (and Medical Devices) to Fix Them</a> (404 Media)</p><p><a href="https://thecyberwire.com/stories/071d8fa461364f2c834d6f8071efe8b0/dismis-explore-our-3-part-series-on-election-propaganda">DisMis: Explore our 3-part series on election propaganda.</a> (N2K)</p><p><br></p><h2>Share your feedback.</h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1661</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b489a3c0-b95e-11ee-8cf8-bb73e2843aa7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1922638362.mp3?updated=1730148936" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stephen Hamilton: Getting the mission to the next level. [Military] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/39/notes</link>
      <description>Enjoy this special encore episode where we are joined by Army Cyber Institute Technical Director and Chief of Staff Colonel Stephen Hamilton, as he takes us on his computer science journey. Fascinated with computers since the second grade, Stephen chose West Point after high school to study computer science. Following graduation he moved into the signal branch as it most closely matched his interest in ham radio as no branch related directly to computing. He was pulled from the motor pool to help with another area's computing needs and then worked his way to teaching computer science at. West Point and US Cyber Command. Stephen recommends coding it first to help realize the nuances, and then code it again. We thank Stephen for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 27 Oct 2024 07:00:00 -0000</pubDate>
      <itunes:title>Stephen Hamilton: Getting the mission to the next level. [Military] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>39</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c0865b12-9245-11ef-bfd2-e3790383b150/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this special encore episode where we are joined by Army Cyber Institute Technical Director and Chief of Staff Colonel Stephen Hamilton, as he takes us on his computer science journey. Fascinated with computers since the second grade, Stephen chose West Point after high school to study computer science. Following graduation he moved into the signal branch as it most closely matched his interest in ham radio as no branch related directly to computing. He was pulled from the motor pool to help with another area's computing needs and then worked his way to teaching computer science at. West Point and US Cyber Command. Stephen recommends coding it first to help realize the nuances, and then code it again. We thank Stephen for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special encore episode where we are joined by Army Cyber Institute Technical Director and Chief of Staff Colonel Stephen Hamilton, as he takes us on his computer science journey. Fascinated with computers since the second grade, Stephen chose West Point after high school to study computer science. Following graduation he moved into the signal branch as it most closely matched his interest in ham radio as no branch related directly to computing. He was pulled from the motor pool to help with another area's computing needs and then worked his way to teaching computer science at. West Point and US Cyber Command. Stephen recommends coding it first to help realize the nuances, and then code it again. We thank Stephen for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>458</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c0865b12-9245-11ef-bfd2-e3790383b150]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9814666620.mp3?updated=1729873557" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mission possible? Navigating tech adoption in the DoD. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/77/notes</link>
      <description>In this episode, N2K's Brandon Karpf interviews Pete Newell, CEO and Founder of BMNT, about the challenges facing technology adoption within the Department of Defense (DoD). They discuss the concept of “mission acceleration,” focusing on the DoD’s struggle to keep pace with rapid changes on the battlefield and the importance of a human-centered approach to technology adaptation. Newell emphasizes that true innovation in defense is more of a "people problem" than a technology issue, requiring shifts in organizational culture and internal education. Tune in to hear insights on accelerating change in defense through better problem articulation and training.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 27 Oct 2024 07:00:00 -0000</pubDate>
      <itunes:title>Mission possible? Navigating tech adoption in the DoD. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>77</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cf034e9c-92eb-11ef-8bda-1301a69e044b/image/0216c9cea15c53e5d2c739964a38623c.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode, N2K's Brandon Karpf interviews Pete Newell, CEO and Founder of BMNT, about the challenges facing technology adoption within the Department of Defense (DoD). They discuss the concept of “mission acceleration,” focusing on the DoD’s struggle to keep pace with rapid changes on the battlefield and the importance of a human-centered approach to technology adaptation. Newell emphasizes that true innovation in defense is more of a "people problem" than a technology issue, requiring shifts in organizational culture and internal education. Tune in to hear insights on accelerating change in defense through better problem articulation and training.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, N2K's <a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a> interviews <a href="https://www.linkedin.com/in/petenewell/">Pete Newell</a>, CEO and Founder of <a href="https://www.linkedin.com/company/bmnt/">BMNT</a>, about the challenges facing technology adoption within the Department of Defense (DoD). They discuss the concept of “mission acceleration,” focusing on the DoD’s struggle to keep pace with rapid changes on the battlefield and the importance of a human-centered approach to technology adaptation. Newell emphasizes that true innovation in defense is more of a "people problem" than a technology issue, requiring shifts in organizational culture and internal education. Tune in to hear insights on accelerating change in defense through better problem articulation and training.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1812</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cf034e9c-92eb-11ef-8bda-1301a69e044b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7865606191.mp3?updated=1729873684" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>LLM security 101. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/352/notes</link>
      <description>This week, we are pleased to be joined by Mick Baccio, global security advisor for Splunk SURGe, sharing their research on "LLM Security: Splunk &amp; OWASP Top 10 for LLM-based Applications." The research dives into the rapid rise of AI and Large Language Models (LLMs) that initially seem magical, but behind the scenes, they are sophisticated systems built by humans. Despite their impressive capabilities, these systems are vulnerable to numerous cyber threats.
Splunk's research explores the OWASP Top 10 for LLM Applications, a framework that highlights key vulnerabilities such as prompt injection, training data poisoning, and sensitive information disclosure. 
 The research can be found here:
LLM Security: Splunk &amp; OWASP Top 10 for LLM-based Applications

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Oct 2024 07:00:00 -0000</pubDate>
      <itunes:title>LLM security 101. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>352</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a706b814-9239-11ef-8e6a-d37e786891ef/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, we are pleased to be joined by Mick Baccio, global security advisor for Splunk SURGe, sharing their research on "LLM Security: Splunk &amp; OWASP Top 10 for LLM-based Applications." The research dives into the rapid rise of AI and Large Language Models (LLMs) that initially seem magical, but behind the scenes, they are sophisticated systems built by humans. Despite their impressive capabilities, these systems are vulnerable to numerous cyber threats.
Splunk's research explores the OWASP Top 10 for LLM Applications, a framework that highlights key vulnerabilities such as prompt injection, training data poisoning, and sensitive information disclosure. 
 The research can be found here:
LLM Security: Splunk &amp; OWASP Top 10 for LLM-based Applications

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are pleased to be joined by <a href="https://www.linkedin.com/in/nohackme/">Mick Baccio</a>, global security advisor for <a href="https://www.linkedin.com/company/splunk/">Splunk SURGe</a>, sharing their research on "LLM Security: Splunk &amp; OWASP Top 10 for LLM-based Applications." The research dives into the rapid rise of AI and Large Language Models (LLMs) that initially seem magical, but behind the scenes, they are sophisticated systems built by humans. Despite their impressive capabilities, these systems are vulnerable to numerous cyber threats.</p><p>Splunk's research explores the OWASP Top 10 for LLM Applications, a framework that highlights key vulnerabilities such as prompt injection, training data poisoning, and sensitive information disclosure. </p><p> The research can be found here:</p><ul><li><a href="https://www.splunk.com/en_us/blog/security/llm-defense-owasp-top-10.html">LLM Security: Splunk &amp; OWASP Top 10 for LLM-based Applications</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1073</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a706b814-9239-11ef-8e6a-d37e786891ef]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5428867701.mp3?updated=1729798789" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>UnitedHealth breach numbers confirmed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2177/notes</link>
      <description>UnitedHealth confirms breach numbers. Patient privacy pains. Amazon vs. APT29. CDK vulnerability threatens user security. Fog and Akira take aim at SonicWall. Level up or log off. LinkedIn in hot water. Open source, closed doors.  Watt's the risk? Today, we are joined by Itzik Alvas, Entro Security’s CEO and Co-Founder, discussing their research team's work on non-human identities and secrets management. And Muni Metro hits Ctrl+Alt+Delete on floppy disks!
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we are joined by Itzik Alvas, Entro Security’s CEO and Co-Founder, discussing their research team's work on non-human identities and secrets management. You can learn more here. 

Selected Reading
UnitedHealth: 100 Million Individuals Affected by the Change Healthcare Data Breach (Heimdal)
OnePoint Patient Care data breach impacted 795916 individuals (Security Affairs)
Amazon identified internet domains abused by APT29 (AWS Security Blog) 
RDP configuration files as a means of obtaining remote access to a computer or "Rogue RDP" (CERT-UA#11690) (CERT-UA) 
AWS Cloud Development Kit flaw exposed accounts to full takeover (The Register) 
Arctic Wolf Labs Observes Increased Fog and Akira Ransomware Activity Linked to SonicWall SSL VPN (Arctic Wolf) 
Lazarus Group Exploits Chrome 0-Day for Crypto with Fake NFT Game (Hackread) 
LinkedIn hit with $335 million fine for using member data for ad targeting without consent (The Record) 
Linux creator approves de-listing of several kernel maintainers associated with Russia (The Record) 
U.S. CISA adds Cisco ASA and FTD, and RoundCube Webmail bugs to its Known Exploited Vulnerabilities catalog (Security Affairs)
Cybersecurity Isn't Easy When You're Trying to Be Green (Dark Reading) 
Goodbye, floppies - San Francisco pays Hitachi $212 million to remove 5.25-inch disks from its light rail service (TechSpot)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 25 Oct 2024 20:10:00 -0000</pubDate>
      <itunes:title>UnitedHealth breach numbers confirmed.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2177</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>UnitedHealth confirms breach numbers. Patient privacy pains. Amazon vs. APT29. CDK vulnerability threatens user security. Fog and Akira take aim at SonicWall. Level up or log off. LinkedIn in hot water. Open source, closed doors.  Watt's the risk? Today, we are joined by Itzik Alvas, Entro Security’s CEO and Co-Founder, discussing their research team's work on non-human identities and secrets management. And Muni Metro hits Ctrl+Alt+Delete on floppy disks!
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we are joined by Itzik Alvas, Entro Security’s CEO and Co-Founder, discussing their research team's work on non-human identities and secrets management. You can learn more here. 

Selected Reading
UnitedHealth: 100 Million Individuals Affected by the Change Healthcare Data Breach (Heimdal)
OnePoint Patient Care data breach impacted 795916 individuals (Security Affairs)
Amazon identified internet domains abused by APT29 (AWS Security Blog) 
RDP configuration files as a means of obtaining remote access to a computer or "Rogue RDP" (CERT-UA#11690) (CERT-UA) 
AWS Cloud Development Kit flaw exposed accounts to full takeover (The Register) 
Arctic Wolf Labs Observes Increased Fog and Akira Ransomware Activity Linked to SonicWall SSL VPN (Arctic Wolf) 
Lazarus Group Exploits Chrome 0-Day for Crypto with Fake NFT Game (Hackread) 
LinkedIn hit with $335 million fine for using member data for ad targeting without consent (The Record) 
Linux creator approves de-listing of several kernel maintainers associated with Russia (The Record) 
U.S. CISA adds Cisco ASA and FTD, and RoundCube Webmail bugs to its Known Exploited Vulnerabilities catalog (Security Affairs)
Cybersecurity Isn't Easy When You're Trying to Be Green (Dark Reading) 
Goodbye, floppies - San Francisco pays Hitachi $212 million to remove 5.25-inch disks from its light rail service (TechSpot)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>UnitedHealth confirms breach numbers. Patient privacy pains. Amazon vs. APT29. CDK vulnerability threatens user security. Fog and Akira take aim at SonicWall. Level up or log off. LinkedIn in hot water. Open source, closed doors.  Watt's the risk? Today, we are joined by Itzik Alvas, Entro Security’s CEO and Co-Founder, discussing their research team's work on non-human identities and secrets management. And Muni Metro hits Ctrl+Alt+Delete on floppy disks!</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today, we are joined by <a href="https://www.linkedin.com/in/itzik-alvas/">Itzik Alvas</a>, <a href="https://entro.security/">Entro Security</a>’s CEO and Co-Founder, discussing their research team's work on non-human identities and secrets management. You can learn more <a href="https://lp.entro.security/2025-state-of-nhi-and-secrets-in-cyber">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://heimdalsecurity.com/blog/unitedhealth-change-healthcare-data-breach/">UnitedHealth: 100 Million Individuals Affected by the Change Healthcare Data Breach</a> (Heimdal)</p><p><a href="https://securityaffairs.com/170247/data-breach/onepoint-patient-care-data-breach.html">OnePoint Patient Care data breach impacted 795916 individuals</a> (Security Affairs)</p><p><a href="https://aws.amazon.com/blogs/security/amazon-identified-internet-domains-abused-by-apt29/">Amazon identified internet domains abused by APT29</a> (AWS Security Blog) </p><p><a href="https://cert.gov.ua/article/6281076">RDP configuration files as a means of obtaining remote access to a computer or "Rogue RDP" (CERT-UA#11690)</a> (CERT-UA) </p><p><a href="https://www.theregister.com/2024/10/24/aws_cloud_development_kit_flaw/">AWS Cloud Development Kit flaw exposed accounts to full takeover</a> (The Register) </p><p><a href="https://arcticwolf.com/resources/blog/arctic-wolf-labs-observes-increased-fog-and-akira-ransomware-activity-linked-to-sonicwall-ssl-vpn/">Arctic Wolf Labs Observes Increased Fog and Akira Ransomware Activity Linked to SonicWall SSL VPN</a> (Arctic Wolf) </p><p><a href="https://hackread.com/north-korean-hackers-crypto-deceptive-game-zero-day-exploit/">Lazarus Group Exploits Chrome 0-Day for Crypto with Fake NFT Game</a> (Hackread) </p><p><a href="https://therecord.media/linkedin-hit-with-335-million-fine-gdpr-ireland">LinkedIn hit with $335 million fine for using member data for ad targeting without consent</a> (The Record) </p><p><a href="https://therecord.media/linus-torvalds-russian-linux-kernel-maintainers-removed">Linux creator approves de-listing of several kernel maintainers associated with Russia</a> (The Record) </p><p><a href="https://securityaffairs.com/170231/security/u-s-cisa-adds-cisco-asa-and-ftd-and-roundcube-webmail-bugs-to-its-known-exploited-vulnerabilities-catalog.html">U.S. CISA adds Cisco ASA and FTD, and RoundCube Webmail bugs to its Known Exploited Vulnerabilities catalog</a> (Security Affairs)</p><p><a href="https://www.darkreading.com/cyber-risk/cybersecurity-is-not-easy-when-you-are-green">Cybersecurity Isn't Easy When You're Trying to Be Green</a> (Dark Reading) </p><p><a href="https://www.techspot.com/news/105295-goodbye-floppies-san-francisco-pays-hitachi-212-million.html">Goodbye, floppies - San Francisco pays Hitachi $212 million to remove 5.25-inch disks from its light rail service</a> (TechSpot)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1242</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b44f4590-b95e-11ee-8cf8-e709c7d4196a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2353173479.mp3?updated=1729880827" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A giant FortiJump for cybercriminals.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2176/notes</link>
      <description>Fortinet confirms a recently rumored zero-day. Officials investigate how restricted chips ended up in products from Huawei. The White House unveils a coordinated AI strategy for national security. Researchers jailbreak LLMs with Deceptive Delight. A new ransomware group exploits vulnerable device drivers. Sensitive documents from a UN trust fund are leaked online. Penn State pays over a millions dollars to settle allegations of inadequate security in government contracts. CISA adds a SharePoint vulnerability to its Known Exploited Vulnerabilities Catalog. A Microsoft report warns of growing election disinformation. On our industry voices segment, Eric Herzog, CMO of Infinidat, discusses merging cybersecurity and cyber storage resilience.  China is shocked - shocked! - that its space program has drawn the attention of foreign spies. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our industry voices segment, Eric Herzog, CMO of Infinidat, discusses merging cybersecurity and cyber storage resilience. 

Selected Reading
Mandiant says new Fortinet flaw has been exploited since June (Bleeping Computer)
TSMC Cuts Off Client After Discovering Chips Sent to Huawei (Bloomberg)
White House unveils plan for US government to keep its edge on AI development (The Record)
FACT SHEET: Biden-Harris Administration Outlines Coordinated Approach to Harness Power of AI for U.S. National Security (The White House)
New LLM jailbreak method with 65% success rate developed by researchers (SC Media)
Embargo Ransomware Disables Security Defenses (GovInfo Security)
Misconfigured UN Database Exposes 228GB of Gender Violence Victims' Data (Hackread)
Penn State Settles for $1.25M Over Failure to Comply With DoD, NASA Cybersecurity Requirements (SecurityWeek)
CISA Warns Active Exploitation of Microsoft SharePoint Vulnerability (Cyber Security News)
As Election Looms, Disinformation ‘Has Never Been Worse’ (The New York Times) 
Microsoft Warns Foreign Disinformation Is Hitting the US Election From All Directions (WIRED)
China’s space programme targeted by ‘audacity’ of foreign agents, anti-spy agency warns (South China Morning Post) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 24 Oct 2024 20:10:00 -0000</pubDate>
      <itunes:title>A giant FortiJump for cybercriminals.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2176</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Fortinet confirms a recently rumored zero-day. Officials investigate how restricted chips ended up in products from Huawei. The White House unveils a coordinated AI strategy for national security. Researchers jailbreak LLMs with Deceptive Delight. A new ransomware group exploits vulnerable device drivers. Sensitive documents from a UN trust fund are leaked online. Penn State pays over a millions dollars to settle allegations of inadequate security in government contracts. CISA adds a SharePoint vulnerability to its Known Exploited Vulnerabilities Catalog. A Microsoft report warns of growing election disinformation. On our industry voices segment, Eric Herzog, CMO of Infinidat, discusses merging cybersecurity and cyber storage resilience.  China is shocked - shocked! - that its space program has drawn the attention of foreign spies. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our industry voices segment, Eric Herzog, CMO of Infinidat, discusses merging cybersecurity and cyber storage resilience. 

Selected Reading
Mandiant says new Fortinet flaw has been exploited since June (Bleeping Computer)
TSMC Cuts Off Client After Discovering Chips Sent to Huawei (Bloomberg)
White House unveils plan for US government to keep its edge on AI development (The Record)
FACT SHEET: Biden-Harris Administration Outlines Coordinated Approach to Harness Power of AI for U.S. National Security (The White House)
New LLM jailbreak method with 65% success rate developed by researchers (SC Media)
Embargo Ransomware Disables Security Defenses (GovInfo Security)
Misconfigured UN Database Exposes 228GB of Gender Violence Victims' Data (Hackread)
Penn State Settles for $1.25M Over Failure to Comply With DoD, NASA Cybersecurity Requirements (SecurityWeek)
CISA Warns Active Exploitation of Microsoft SharePoint Vulnerability (Cyber Security News)
As Election Looms, Disinformation ‘Has Never Been Worse’ (The New York Times) 
Microsoft Warns Foreign Disinformation Is Hitting the US Election From All Directions (WIRED)
China’s space programme targeted by ‘audacity’ of foreign agents, anti-spy agency warns (South China Morning Post) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Fortinet confirms a recently rumored zero-day. Officials investigate how restricted chips ended up in products from Huawei. The White House unveils a coordinated AI strategy for national security. Researchers jailbreak LLMs with Deceptive Delight. A new ransomware group exploits vulnerable device drivers. Sensitive documents from a UN trust fund are leaked online. Penn State pays over a millions dollars to settle allegations of inadequate security in government contracts. CISA adds a SharePoint vulnerability to its Known Exploited Vulnerabilities Catalog. A Microsoft report warns of growing election disinformation. On our industry voices segment, Eric Herzog, CMO of Infinidat, discusses merging cybersecurity and cyber storage resilience.  China is shocked - shocked! - that its space program has drawn the attention of foreign spies.<strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our industry voices segment, <a href="https://www.linkedin.com/in/erherzog/">Eric Herzog</a>, CMO of <a href="https://www.infinidat.com/en/cyber-resilience?utm_source=CyberWire&amp;utm_medium=Referral">Infinidat</a>, discusses merging cybersecurity and cyber storage resilience. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/mandiant-says-new-fortinet-fortimanager-flaw-has-been-exploited-since-june/">Mandiant says new Fortinet flaw has been exploited since June</a> (Bleeping Computer)</p><p><a href="https://www.bloomberg.com/news/articles/2024-10-23/tsmc-cuts-off-client-after-discovering-chips-diverted-to-huawei">TSMC Cuts Off Client After Discovering Chips Sent to Huawei</a> (Bloomberg)</p><p><a href="https://therecord.media/biden-administration-artificial-intelligence-nsm">White House unveils plan for US government to keep its edge on AI development</a> (The Record)</p><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2024/10/24/fact-sheet-biden-harris-administration-outlines-coordinated-approach-to-harness-power-of-ai-for-u-s-national-security/">FACT SHEET: Biden-Harris Administration Outlines Coordinated Approach to Harness Power of AI for U.S. National Security</a> (The White House)</p><p><a href="https://www.scworld.com/news/new-llm-jailbreak-method-with-65-success-rate-developed-by-researchers">New LLM jailbreak method with 65% success rate developed by researchers</a> (SC Media)</p><p><a href="https://www.govinfosecurity.com/embargo-ransomware-disables-security-defenses-a-26603">Embargo Ransomware Disables Security Defenses</a> (GovInfo Security)</p><p><a href="https://hackread.com/misconfigured-un-database-gender-violence-victims-data/">Misconfigured UN Database Exposes 228GB of Gender Violence Victims' Data</a> (Hackread)</p><p><a href="https://www.securityweek.com/penn-state-settles-for-1-25m-over-failure-to-comply-with-dod-nasa-cybersecurity-requirements/">Penn State Settles for $1.25M Over Failure to Comply With DoD, NASA Cybersecurity Requirements</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/microsoft-sharepoint-vulnerability/">CISA Warns Active Exploitation of Microsoft SharePoint Vulnerability</a> (Cyber Security News)</p><p><a href="https://www.nytimes.com/2024/10/23/business/media/election-disinformation.html">As Election Looms, Disinformation ‘Has Never Been Worse’</a> (The New York Times) </p><p><a href="https://www.wired.com/story/microsoft-russia-china-iran-election-disinformation">Microsoft Warns Foreign Disinformation Is Hitting the US Election From All Directions</a> (WIRED)</p><p><a href="https://www.scmp.com/news/china/politics/article/3283525/chinas-space-programme-targeted-audacity-foreign-agents-anti-spy-agency-warns">China’s space programme targeted by ‘audacity’ of foreign agents, anti-spy agency warns</a> (South China Morning Post) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1928</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b416e16e-b95e-11ee-8cf8-23429b5a8ead]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3521141605.mp3?updated=1729796122" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>NotLockBit takes a bite out of macOS.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2175/notes</link>
      <description>NotLockBit mimics its namesake while targeting macOS. Symantec uncovers popular mobile apps with hardcoded credentials. Avast releases a Mallox ransomware decryptor. Akira ransomware reverts to tactics tried and true. Lawmakers ask the DOJ to prosecute tax prep firms for privacy violations. The SEC levies fines for misleading disclosures following the SolarWinds breach. Software liability remains a sticky issue. Updated guidance reiterates the feds’ commitment to the Traffic Light Protocol. A task force has cybersecurity recommendations for the next U.S. president. Today’s guest is Jérôme Segura, Sr. Director of Research at Malwarebytes, sharing their work on "Scammers advertise fake AppleCare+ service via GitHub repos." Warrantless surveillance, powered by your favorite apps. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest is Jérôme Segura, Sr. Director of Research at Malwarebytes, sharing their work on "Scammers advertise fake AppleCare+ service via GitHub repos." You can learn more about this research here. 

Selected Reading
NotLockBit Ransomware Can Target macOS Devices (SecurityWeek)
Millions of iOS and Android Users at Risk as Popular Apps Expose Cloud Keys (Hackread)
Mallox Ransomware Flaw Let Victims Recover Files Without Ransom Payment (Cyber Security News)
Akira ransomware pivots back to double extortion, C++ code (SC Media)
Lawmakers ask DOJ to prosecute tax prep firms for sharing customer data with big tech (The Record)
SEC fines four companies $7M for 'misleading cyber disclosures' regarding SolarWinds hack (TechCrunch)
The struggle for software liability: Inside a ‘very, very, very hard problem’ (The Record)
US Government Pledges to Cyber Threat Sharing Via TLP Protocol (Infosecurity Magazine)
Task force unveils cyber recommendations for the next president (CyberScoop)
The Global Surveillance Free-for-All in Mobile Ad Data (Krebs on Security)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 23 Oct 2024 20:10:00 -0000</pubDate>
      <itunes:title>NotLockBit takes a bite out of macOS.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2175</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>NotLockBit mimics its namesake while targeting macOS. Symantec uncovers popular mobile apps with hardcoded credentials. Avast releases a Mallox ransomware decryptor. Akira ransomware reverts to tactics tried and true. Lawmakers ask the DOJ to prosecute tax prep firms for privacy violations. The SEC levies fines for misleading disclosures following the SolarWinds breach. Software liability remains a sticky issue. Updated guidance reiterates the feds’ commitment to the Traffic Light Protocol. A task force has cybersecurity recommendations for the next U.S. president. Today’s guest is Jérôme Segura, Sr. Director of Research at Malwarebytes, sharing their work on "Scammers advertise fake AppleCare+ service via GitHub repos." Warrantless surveillance, powered by your favorite apps. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest is Jérôme Segura, Sr. Director of Research at Malwarebytes, sharing their work on "Scammers advertise fake AppleCare+ service via GitHub repos." You can learn more about this research here. 

Selected Reading
NotLockBit Ransomware Can Target macOS Devices (SecurityWeek)
Millions of iOS and Android Users at Risk as Popular Apps Expose Cloud Keys (Hackread)
Mallox Ransomware Flaw Let Victims Recover Files Without Ransom Payment (Cyber Security News)
Akira ransomware pivots back to double extortion, C++ code (SC Media)
Lawmakers ask DOJ to prosecute tax prep firms for sharing customer data with big tech (The Record)
SEC fines four companies $7M for 'misleading cyber disclosures' regarding SolarWinds hack (TechCrunch)
The struggle for software liability: Inside a ‘very, very, very hard problem’ (The Record)
US Government Pledges to Cyber Threat Sharing Via TLP Protocol (Infosecurity Magazine)
Task force unveils cyber recommendations for the next president (CyberScoop)
The Global Surveillance Free-for-All in Mobile Ad Data (Krebs on Security)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>NotLockBit mimics its namesake while targeting macOS. Symantec uncovers popular mobile apps with hardcoded credentials. Avast releases a Mallox ransomware decryptor. Akira ransomware reverts to tactics tried and true. Lawmakers ask the DOJ to prosecute tax prep firms for privacy violations. The SEC levies fines for misleading disclosures following the SolarWinds breach. Software liability remains a sticky issue. Updated guidance reiterates the feds’ commitment to the Traffic Light Protocol. A task force has cybersecurity recommendations for the next U.S. president. Today’s guest is Jérôme Segura, Sr. Director of Research at Malwarebytes, sharing their work on "Scammers advertise fake AppleCare+ service via GitHub repos." Warrantless surveillance, powered by your favorite apps. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today’s guest is <a href="https://www.linkedin.com/in/jeromesegura/">Jérôme Segura</a>, Sr. Director of Research at <a href="https://www.malwarebytes.com/">Malwarebytes</a>, sharing their work on "Scammers advertise fake AppleCare+ service via GitHub repos." You can learn more about this research <a href="https://www.malwarebytes.com/blog/scams/2024/09/scammers-advertise-fake-applecare-service-via-github-repos">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/notlockbit-ransomware-can-target-macos-devices/">NotLockBit Ransomware Can Target macOS Devices</a> (SecurityWeek)</p><p><a href="https://hackread.com/ios-android-users-risk-apps-expose-cloud-keys/">Millions of iOS and Android Users at Risk as Popular Apps Expose Cloud Keys</a> (Hackread)</p><p><a href="https://cybersecuritynews.com/mallox-ransomware-decrypted/">Mallox Ransomware Flaw Let Victims Recover Files Without Ransom Payment</a> (Cyber Security News)</p><p><a href="https://www.scworld.com/news/akira-ransomware-pivots-back-to-double-extortion-c-code">Akira ransomware pivots back to double extortion, C++ code</a> (SC Media)</p><p><a href="https://therecord.media/lawmakers-ask-doj-to-prosecute-tax-prep-firms-sharing-data-meta-google">Lawmakers ask DOJ to prosecute tax prep firms for sharing customer data with big tech</a> (The Record)</p><p><a href="https://techcrunch.com/2024/10/22/sec-fines-four-companies-7-million-for-misleading-cyber-disclosures-regarding-solarwinds-hack/">SEC fines four companies $7M for 'misleading cyber disclosures' regarding SolarWinds hack</a> (TechCrunch)</p><p><a href="https://therecord.media/cybersecurity-software-liability-standards-white-house-struggle">The struggle for software liability: Inside a ‘very, very, very hard problem’</a> (The Record)</p><p><a href="https://www.infosecurity-magazine.com/news/us-government-threat-sharing-tlp/">US Government Pledges to Cyber Threat Sharing Via TLP Protocol</a> (Infosecurity Magazine)</p><p><a href="https://cyberscoop.com/task-force-unveils-cyber-recommendations-for-the-next-president/">Task force unveils cyber recommendations for the next president</a> (CyberScoop)</p><p><a href="https://krebsonsecurity.com/2024/10/the-global-surveillance-free-for-all-in-mobile-ad-data/">The Global Surveillance Free-for-All in Mobile Ad Data</a> (Krebs on Security)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1862</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b3dd6b1e-b95e-11ee-8cf8-b7599fdb51e4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5757767773.mp3?updated=1729711740" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Zero-day exploited in the wild.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2174/notes</link>
      <description>A zero-day affects Samsung mobile processors. A critical vulnerability is discovered in the OneDev DevOps platform. German authorities warn against vulnerable industrial routers. The Bumblebee loader buzzes around corporate networks. Ghostpulse hides payloads in PNG files. A Michigan chain of dental centers agrees to a multimillion dollar data breach settlement. A White House proposal tamps down international data sharing. Fortinet is reportedly patching an as-yet undisclosed severe vulnerability. In our Threat Vector segment, host David Moulton speaks with Nathaniel Quist about cloud extortion operations, the rise of ransomware attacks, and the challenges businesses face in securing public cloud environments. Russian deepfakes spread election misinformation. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
In this segment of the Threat Vector podcast, host David Moulton, Director of Thought Leadership at Palo Alto Networks, speaks with Nathaniel Quist, Manager of Cloud Threat Intelligence at Cortex &amp; Unit 42. David and Nathaniel discuss recent cloud extortion operations, the rise of ransomware attacks, and the challenges businesses face in securing public cloud environments. You can hear the full discussion here and catch new episodes of Threat Vector every Thursday on your favorite podcast app. 

Selected Reading
Google Warns of Samsung Zero-Day Exploited in the Wild (SecurityWeek)
Critical OneDev DevOps Platform Vulnerability Let Attacker Read Sensitive Data (Cyber Security News)
Critical Vulnerabilities Expose mbNET.mini, Helmholz Industrial Routers to Attacks (SecurityWeek)
Hackers Use Bumblebee Malware to Gain Access to Corporate Networks (GB Hackers)
CISA Adds Sciencelogic SL1 Unspecified Vulnerability to KEV Catalog (Cyber Security News)
Pixel perfect Ghostpulse malware loader hides inside PNG image files (The Register)
Dental Center Chain Settles Data Breach Lawsuit for $2.7M (BankInfo Security)
Biden administration proposes new rules governing data transfers to adversarial nations (The Record)
Fortinet issues private notifications to FortiManager customers to patch an undisclosed flaw (Beyond Machines)
Russian Propaganda Unit Appears to Be Behind Spread of False Tim Walz Sexual Abuse Claims (WIRED)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Oct 2024 20:10:00 -0000</pubDate>
      <itunes:title>Zero-day exploited in the wild.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2174</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A zero-day affects Samsung mobile processors. A critical vulnerability is discovered in the OneDev DevOps platform. German authorities warn against vulnerable industrial routers. The Bumblebee loader buzzes around corporate networks. Ghostpulse hides payloads in PNG files. A Michigan chain of dental centers agrees to a multimillion dollar data breach settlement. A White House proposal tamps down international data sharing. Fortinet is reportedly patching an as-yet undisclosed severe vulnerability. In our Threat Vector segment, host David Moulton speaks with Nathaniel Quist about cloud extortion operations, the rise of ransomware attacks, and the challenges businesses face in securing public cloud environments. Russian deepfakes spread election misinformation. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
In this segment of the Threat Vector podcast, host David Moulton, Director of Thought Leadership at Palo Alto Networks, speaks with Nathaniel Quist, Manager of Cloud Threat Intelligence at Cortex &amp; Unit 42. David and Nathaniel discuss recent cloud extortion operations, the rise of ransomware attacks, and the challenges businesses face in securing public cloud environments. You can hear the full discussion here and catch new episodes of Threat Vector every Thursday on your favorite podcast app. 

Selected Reading
Google Warns of Samsung Zero-Day Exploited in the Wild (SecurityWeek)
Critical OneDev DevOps Platform Vulnerability Let Attacker Read Sensitive Data (Cyber Security News)
Critical Vulnerabilities Expose mbNET.mini, Helmholz Industrial Routers to Attacks (SecurityWeek)
Hackers Use Bumblebee Malware to Gain Access to Corporate Networks (GB Hackers)
CISA Adds Sciencelogic SL1 Unspecified Vulnerability to KEV Catalog (Cyber Security News)
Pixel perfect Ghostpulse malware loader hides inside PNG image files (The Register)
Dental Center Chain Settles Data Breach Lawsuit for $2.7M (BankInfo Security)
Biden administration proposes new rules governing data transfers to adversarial nations (The Record)
Fortinet issues private notifications to FortiManager customers to patch an undisclosed flaw (Beyond Machines)
Russian Propaganda Unit Appears to Be Behind Spread of False Tim Walz Sexual Abuse Claims (WIRED)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A zero-day affects Samsung mobile processors. A critical vulnerability is discovered in the OneDev DevOps platform. German authorities warn against vulnerable industrial routers. The Bumblebee loader buzzes around corporate networks. Ghostpulse hides payloads in PNG files. A Michigan chain of dental centers agrees to a multimillion dollar data breach settlement. A White House proposal tamps down international data sharing. Fortinet is reportedly patching an as-yet undisclosed severe vulnerability. In our Threat Vector segment, host David Moulton speaks with Nathaniel Quist about cloud extortion operations, the rise of ransomware attacks, and the challenges businesses face in securing public cloud environments. Russian deepfakes spread election misinformation.<strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Threat Vector Segment</h2><p>In this segment of the <a href="https://thecyberwire.com/podcasts/threat-vector">Threat Vector</a> podcast, host <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a>, Director of Thought Leadership at Palo Alto Networks, speaks with <a href="https://www.linkedin.com/in/qquist/">Nathaniel Quist</a>, Manager of Cloud Threat Intelligence at <a href="https://www.paloaltonetworks.com/cortex">Cortex</a> &amp; <a href="https://www.paloaltonetworks.com/unit42">Unit 42</a>. David and Nathaniel discuss recent cloud extortion operations, the rise of ransomware attacks, and the challenges businesses face in securing public cloud environments. You can hear the full discussion <a href="https://thecyberwire.com/podcasts/threat-vector/36/notes">here</a> and catch new episodes of Threat Vector every Thursday on your favorite podcast app. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/google-warns-of-samsung-zero-day-exploited-in-the-wild/">Google Warns of Samsung Zero-Day Exploited in the Wild</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/onedev-devops-platform-vulnerability/">Critical OneDev DevOps Platform Vulnerability Let Attacker Read Sensitive Data</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/critical-vulnerabilities-expose-mbnet-mini-helmholz-industrial-routers-to-attacks/">Critical Vulnerabilities Expose mbNET.mini, Helmholz Industrial Routers to Attacks</a> (SecurityWeek)</p><p><a href="https://gbhackers.com/hackers-use-bumblebee-malware/">Hackers Use Bumblebee Malware to Gain Access to Corporate Networks</a> (GB Hackers)</p><p><a href="https://cybersecuritynews.com/sciencelogic-sl1-unspecified-vulnerability/">CISA Adds Sciencelogic SL1 Unspecified Vulnerability to KEV Catalog</a> (Cyber Security News)</p><p><a href="https://www.theregister.com/2024/10/22/ghostpulse_malware_loader_png/">Pixel perfect Ghostpulse malware loader hides inside PNG image files</a> (The Register)</p><p><a href="https://www.bankinfosecurity.com/dental-center-chain-settles-data-breach-lawsuit-for-27m-a-26572">Dental Center Chain Settles Data Breach Lawsuit for $2.7M</a> (BankInfo Security)</p><p><a href="https://therecord.media/biden-administration-rules-data-transfer-adversaries">Biden administration proposes new rules governing data transfers to adversarial nations</a> (The Record)</p><p><a href="https://beyondmachines.net/event_details/fortinet-issues-private-notifications-to-fortimanager-customers-to-patch-an-undisclosed-flaw-l-v-z-w-f/gD2P6Ple2L">Fortinet issues private notifications to FortiManager customers to patch an undisclosed flaw</a> (Beyond Machines)</p><p><a href="https://www.wired.com/story/russian-propaganda-unit-storm-1516-false-tim-walz-sexual-abuse-claims">Russian Propaganda Unit Appears to Be Behind Spread of False Tim Walz Sexual Abuse Claims</a> (WIRED)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1590</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b3a592c0-b95e-11ee-8cf8-0354152b79cb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8331949646.mp3?updated=1729623964" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>On the run, caught on arrival.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2173/notes</link>
      <description>An alleged Australian scammer wanted by the FBI gets nabbed in Italy. The Internet Archive has been breached again. Researchers discover vulnerabilities in encrypted cloud storage platforms. Cisco confirms stolen files but insists it’s not a data breach.  A Chinese disinformation group targets Senator Marco Rubio. Malicious chatbot prompts can hide inside harmless ones. The DoD wants to offer senior cyber executives part-time roles as military reservists. Six years out, the specter of Spectre remains. Russian prosecutors seek prison for REvil operators. Guest Pete Newell, Founder and CEO of BMNT, talks with N2K's Brandon Karpf about challenges associated with technology adoption and change in the DoD. Microsoft uses clever deception to reel in phishers. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Pete Newell, Founder and CEO of BMNT, talks with N2K's Brandon Karpf about challenges associated with technology adoption and change in the DoD.

Selected Reading
Australian wanted by FBI over alleged $46 million scam arrested in Italy (The Sydney Morning Herald)
Internet Archive breached again through stolen access tokens (Bleeping Computer)
Severe flaws in E2EE cloud storage platforms used by millions (Bleeping Computer)
Cisco Confirms Security Incident After Hacker Offers to Sell Data (SecurityWeek)
Report: China’s Spamouflage disinformation campaign testing techniques on Sen. Marco Rubio (The Record)
This Prompt Can Make an AI Chatbot Identify and Extract Personal Details From Your Chats (WIRED)
Wanted: Weekend Warriors in Tech (Wall Street Journal)
Spectre flaws continue to haunt Intel and AMD (The Register)
Russia's case against REvil hackers proceeds as government recommends 6.5-year sentences (The Record)
Microsoft creates fake Azure tenants to pull phishers into honeypots (Bleeping Computer)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 21 Oct 2024 20:10:00 -0000</pubDate>
      <itunes:title>On the run, caught on arrival.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2173</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>An alleged Australian scammer wanted by the FBI gets nabbed in Italy. The Internet Archive has been breached again. Researchers discover vulnerabilities in encrypted cloud storage platforms. Cisco confirms stolen files but insists it’s not a data breach.  A Chinese disinformation group targets Senator Marco Rubio. Malicious chatbot prompts can hide inside harmless ones. The DoD wants to offer senior cyber executives part-time roles as military reservists. Six years out, the specter of Spectre remains. Russian prosecutors seek prison for REvil operators. Guest Pete Newell, Founder and CEO of BMNT, talks with N2K's Brandon Karpf about challenges associated with technology adoption and change in the DoD. Microsoft uses clever deception to reel in phishers. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Pete Newell, Founder and CEO of BMNT, talks with N2K's Brandon Karpf about challenges associated with technology adoption and change in the DoD.

Selected Reading
Australian wanted by FBI over alleged $46 million scam arrested in Italy (The Sydney Morning Herald)
Internet Archive breached again through stolen access tokens (Bleeping Computer)
Severe flaws in E2EE cloud storage platforms used by millions (Bleeping Computer)
Cisco Confirms Security Incident After Hacker Offers to Sell Data (SecurityWeek)
Report: China’s Spamouflage disinformation campaign testing techniques on Sen. Marco Rubio (The Record)
This Prompt Can Make an AI Chatbot Identify and Extract Personal Details From Your Chats (WIRED)
Wanted: Weekend Warriors in Tech (Wall Street Journal)
Spectre flaws continue to haunt Intel and AMD (The Register)
Russia's case against REvil hackers proceeds as government recommends 6.5-year sentences (The Record)
Microsoft creates fake Azure tenants to pull phishers into honeypots (Bleeping Computer)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An alleged Australian scammer wanted by the FBI gets nabbed in Italy. The Internet Archive has been breached again. Researchers discover vulnerabilities in encrypted cloud storage platforms. Cisco confirms stolen files but insists it’s not a data breach.  A Chinese disinformation group targets Senator Marco Rubio. Malicious chatbot prompts can hide inside harmless ones. The DoD wants to offer senior cyber executives part-time roles as military reservists. Six years out, the specter of Spectre remains. Russian prosecutors seek prison for REvil operators. Guest Pete Newell, Founder and CEO of BMNT, talks with N2K's Brandon Karpf about challenges associated with technology adoption and change in the DoD. Microsoft uses clever deception to reel in phishers. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/petenewell/">Pete Newell</a>, Founder and CEO of <a href="https://www.bmnt.com/">BMNT</a>, talks with <a href="https://www.n2k.com/">N2K</a>'s <a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a> about challenges associated with technology adoption and change in the DoD.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.smh.com.au/world/europe/australian-wanted-by-fbi-over-alleged-46-million-scam-arrested-in-italy-20241020-p5kjpu.html">Australian wanted by FBI over alleged $46 million scam arrested in Italy</a> (The Sydney Morning Herald)</p><p><a href="https://www.bleepingcomputer.com/news/security/internet-archive-breached-again-through-stolen-access-tokens/">Internet Archive breached again through stolen access tokens</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/severe-flaws-in-e2ee-cloud-storage-platforms-used-by-millions/">Severe flaws in E2EE cloud storage platforms used by millions</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/cisco-confirms-security-incident-after-hacker-offers-to-sell-data/">Cisco Confirms Security Incident After Hacker Offers to Sell Data</a> (SecurityWeek)</p><p><a href="https://therecord.media/china-spamouflage-operation-testing-techniques-marco-rubio">Report: China’s Spamouflage disinformation campaign testing techniques on Sen. Marco Rubio</a> (The Record)</p><p><a href="https://www.wired.com/story/ai-imprompter-malware-llm">This Prompt Can Make an AI Chatbot Identify and Extract Personal Details From Your Chats</a> (WIRED)</p><p><a href="https://www.wsj.com/tech/wanted-weekend-warriors-in-tech-3b3a7513">Wanted: Weekend Warriors in Tech</a> (Wall Street Journal)</p><p><a href="https://www.theregister.com/2024/10/18/spectre_problems_continue_amd_intel">Spectre flaws continue to haunt Intel and AMD</a> (The Register)</p><p><a href="https://therecord.media/russia-revil-hackers-case-sentencing">Russia's case against REvil hackers proceeds as government recommends 6.5-year sentences</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-creates-fake-azure-tenants-to-pull-phishers-into-honeypots/">Microsoft creates fake Azure tenants to pull phishers into honeypots</a> (Bleeping Computer)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1945</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b36dc03e-b95e-11ee-8cf8-1b4f717cc848]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4451936218.mp3?updated=1729538502" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Aarti Borkar: Make your own choices. [Product] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/38/notes</link>
      <description>Enjoy this special encore episode where we are joined by the Head of Product for IBM Security Aarti Borkar, who shares her journey which included going after her lifelong love of math rather than following in her parents' footsteps in the medical field. In following her passions, Aarti found herself studying computer engineering and computer science, and upon taking a pause from her studies, she found a niche working at IBM in a mix of databases and networking. In her current position, Aarti describes her favorite discussion topics very often involve being around the use of AI for converting security into predictive domains. Aarti reminds us that you should pause and see if you are on the right path. Staying on a path just because you started there can be a bad idea. And, we thank Aarti for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 20 Oct 2024 07:00:00 -0000</pubDate>
      <itunes:title>Aarti Borkar: Make your own choices. [Product] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>41</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a8bae152-8ccc-11ef-8ff6-971688481a74/image/910aaf148c5fdf3b9f89208a91f19df4.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this special encore episode where we are joined by the Head of Product for IBM Security Aarti Borkar, who shares her journey which included going after her lifelong love of math rather than following in her parents' footsteps in the medical field. In following her passions, Aarti found herself studying computer engineering and computer science, and upon taking a pause from her studies, she found a niche working at IBM in a mix of databases and networking. In her current position, Aarti describes her favorite discussion topics very often involve being around the use of AI for converting security into predictive domains. Aarti reminds us that you should pause and see if you are on the right path. Staying on a path just because you started there can be a bad idea. And, we thank Aarti for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special encore episode where we are joined by the Head of Product for IBM Security Aarti Borkar, who shares her journey which included going after her lifelong love of math rather than following in her parents' footsteps in the medical field. In following her passions, Aarti found herself studying computer engineering and computer science, and upon taking a pause from her studies, she found a niche working at IBM in a mix of databases and networking. In her current position, Aarti describes her favorite discussion topics very often involve being around the use of AI for converting security into predictive domains. Aarti reminds us that you should pause and see if you are on the right path. Staying on a path just because you started there can be a bad idea. And, we thank Aarti for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>428</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a8bae152-8ccc-11ef-8ff6-971688481a74]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7001264437.mp3?updated=1729199911" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New targets, new tools, same threat. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/351/notes</link>
      <description>This week we are joined by Chester Wisniewski, Global Field CTO from Sophos X-Ops team, to discuss their work on "Crimson Palace returns: New Tools, Tactics, and Targets." Sophos X-Ops has observed a resurgence in cyberespionage activity, tracked as Operation Crimson Palace, targeting Southeast Asian government organizations. 
After a brief lull, Cluster Charlie resumed operations in September 2023, using new tactics such as web shells and open-source tools to bypass detection, re-establish access, and map target network infrastructure, demonstrating ongoing efforts to exfiltrate data and expand their foothold.
The research can be found here:

Crimson Palace returns: New Tools, Tactics, and Targets 

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Oct 2024 07:00:00 -0000</pubDate>
      <itunes:title>New targets, new tools, same threat. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>351</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c694501a-8ccb-11ef-8afc-f3abb11a2f35/image/95b72a93c2ffaf8ff900d662a9bd3735.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week we are joined by Chester Wisniewski, Global Field CTO from Sophos X-Ops team, to discuss their work on "Crimson Palace returns: New Tools, Tactics, and Targets." Sophos X-Ops has observed a resurgence in cyberespionage activity, tracked as Operation Crimson Palace, targeting Southeast Asian government organizations. 
After a brief lull, Cluster Charlie resumed operations in September 2023, using new tactics such as web shells and open-source tools to bypass detection, re-establish access, and map target network infrastructure, demonstrating ongoing efforts to exfiltrate data and expand their foothold.
The research can be found here:

Crimson Palace returns: New Tools, Tactics, and Targets 

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by <a href="https://www.linkedin.com/in/chester-wisniewski/">Chester Wisniewski</a>, Global Field CTO from <a href="https://www.linkedin.com/company/sophos/">Sophos</a> X-Ops team, to discuss their work on "<a href="https://news.sophos.com/en-us/2024/09/10/crimson-palace-new-tools-tactics-targets/">Crimson Palace returns: New Tools, Tactics, and Targets</a>." Sophos X-Ops has observed a resurgence in cyberespionage activity, tracked as <a href="https://news.sophos.com/en-us/2024/06/05/operation-crimson-palace-a-technical-deep-dive/">Operation Crimson Palace</a>, targeting Southeast Asian government organizations. </p><p>After a brief lull, Cluster Charlie resumed operations in September 2023, using new tactics such as web shells and open-source tools to bypass detection, re-establish access, and map target network infrastructure, demonstrating ongoing efforts to exfiltrate data and expand their foothold.</p><p>The research can be found here:</p><ul><li>
<a href="https://www.wrike.com/workspace.htm?acc=2486920#folder/337266682/tableV2?filters=&amp;sidePanelItemId=1492230849&amp;spaceId=628165068&amp;viewId=313316326">Crimson Palace returns: New Tools, Tactics, and Targets</a> </li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1457</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c694501a-8ccb-11ef-8afc-f3abb11a2f35]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6557481287.mp3?updated=1729199918" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No more “cyber Snorlax” naps. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2172/notes</link>
      <description>Microsoft describes a macOS vulnerability. A trio of healthcare organizations reveal data breaches affecting nearly three quarters a million patients. Group-IB infiltrates a ransomware as a service operation. Instagram rolls out new measures to combat sextortion schemes. Updates from Bitdfender address Man-in-the-Middle attacks. An Alabama man is arrested for allegedly hacking the SEC. In our Industry Voices segment, Gerry Gebel, VP of Strata Identity, describes how to ensure identity continuity during IDP disrupted, disconnected and diminished environments. CISOs want to see their role split into two positions. Game Freak’s Servers Take Critical Hit.

Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we have our Industry Voices segment with Gerry Gebel, VP of Products and Standards at Strata Identity, discussing how to ensure identity continuity during IDP disrupted, disconnected and diminished environments.

Resources to learn more: 

Identity Continuity™: How to have uninterrupted IDP access

Resilience in extreme conditions: Why DDIL environments need continuous identity access


Selected Reading
macOS Vulnerability Could Expose User Data, Microsoft Warns (Infosecurity Magazine)
Microsoft warns it lost some customer's security logs for a month (Bleeping Computer)
3 Longtime Health Centers Report Hacks Affecting 740,000 (GovInfo Security)
Cicada3301 ransomware affiliate program infiltrated by security researchers (SC Media)
Instagram Rolls Out New Sextortion Protection Measures (Infosecurity Magazine)
Bitdefender Total Security Vulnerability Exposes Users to Man-in-the-Middle Attacks (Cyber Security News)
Alabama Man Arrested in SEC Social Media Account Hack That Led the Price of Bitcoin to Spike (SecurityWeek)
CISOs Concerned Over Growing Demands of Role (Security Boulevard)
Pokémon video game developer confirms its systems were breached by hackers (The Record)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 18 Oct 2024 20:00:00 -0000</pubDate>
      <itunes:title>No more “cyber Snorlax” naps. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2172</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b334e232-b95e-11ee-8cf8-7b5c8c2adc63/image/7d86b799af003eb0ecfeba5070fb924f.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Microsoft describes a macOS vulnerability. A trio of healthcare organizations reveal data breaches affecting nearly three quarters a million patients. Group-IB infiltrates a ransomware as a service operation. Instagram rolls out new measures to combat sextortion schemes. Updates from Bitdfender address Man-in-the-Middle attacks. An Alabama man is arrested for allegedly hacking the SEC. In our Industry Voices segment, Gerry Gebel, VP of Strata Identity, describes how to ensure identity continuity during IDP disrupted, disconnected and diminished environments. CISOs want to see their role split into two positions. Game Freak’s Servers Take Critical Hit.

Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we have our Industry Voices segment with Gerry Gebel, VP of Products and Standards at Strata Identity, discussing how to ensure identity continuity during IDP disrupted, disconnected and diminished environments.

Resources to learn more: 

Identity Continuity™: How to have uninterrupted IDP access

Resilience in extreme conditions: Why DDIL environments need continuous identity access


Selected Reading
macOS Vulnerability Could Expose User Data, Microsoft Warns (Infosecurity Magazine)
Microsoft warns it lost some customer's security logs for a month (Bleeping Computer)
3 Longtime Health Centers Report Hacks Affecting 740,000 (GovInfo Security)
Cicada3301 ransomware affiliate program infiltrated by security researchers (SC Media)
Instagram Rolls Out New Sextortion Protection Measures (Infosecurity Magazine)
Bitdefender Total Security Vulnerability Exposes Users to Man-in-the-Middle Attacks (Cyber Security News)
Alabama Man Arrested in SEC Social Media Account Hack That Led the Price of Bitcoin to Spike (SecurityWeek)
CISOs Concerned Over Growing Demands of Role (Security Boulevard)
Pokémon video game developer confirms its systems were breached by hackers (The Record)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft describes a macOS vulnerability. A trio of healthcare organizations reveal data breaches affecting nearly three quarters a million patients. Group-IB infiltrates a ransomware as a service operation. Instagram rolls out new measures to combat sextortion schemes. Updates from Bitdfender address Man-in-the-Middle attacks. An Alabama man is arrested for allegedly hacking the SEC. In our Industry Voices segment, Gerry Gebel, VP of Strata Identity, describes how to ensure identity continuity during IDP disrupted, disconnected and diminished environments. CISOs want to see their role split into two positions. Game Freak’s Servers Take Critical Hit.</p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><h2><br></h2><h2>CyberWire Guest</h2><p>Today, we have our Industry Voices segment with <a href="https://www.linkedin.com/in/gerry-gebel/">Gerry Gebel</a>, VP of Products and Standards at <a href="https://www.strata.io/">Strata Identity</a>, discussing how to ensure identity continuity during IDP disrupted, disconnected and diminished environments.</p><p><br></p><h3><strong>Resources to learn more: </strong></h3><ul>
<li><a href="https://www.strata.io/blog/identity-continuity/identity-continuity-uninterrupted-idp-access/?utm_medium=referral&amp;utm_source=cyberwire">Identity Continuity™: How to have uninterrupted IDP access</a></li>
<li><a href="https://www.strata.io/blog/identity-continuity/ddil-resilient-identity-continuity/?utm_medium=referral&amp;utm_source=cyberwire">Resilience in extreme conditions: Why DDIL environments need continuous identity access</a></li>
</ul><p><br></p><h2>Selected Reading</h2><p><a href="https://www.infosecurity-magazine.com/news/microsoft-macos-vulnerability/">macOS Vulnerability Could Expose User Data, Microsoft Warns</a> (Infosecurity Magazine)</p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-warns-it-lost-some-customers-security-logs-for-a-month/">Microsoft warns it lost some customer's security logs for a month</a> (Bleeping Computer)</p><p><a href="https://www.govinfosecurity.com/3-longtime-health-centers-report-hacks-affecting-740000-a-26552">3 Longtime Health Centers Report Hacks Affecting 740,000</a> (GovInfo Security)</p><p><a href="https://www.scworld.com/news/cicada3301-ransomware-affiliate-program-infiltrated-by-security-researchers">Cicada3301 ransomware affiliate program infiltrated by security researchers</a> (SC Media)</p><p><a href="https://www.infosecurity-magazine.com/news/instagram-sextortion-protection/">Instagram Rolls Out New Sextortion Protection Measures</a> (Infosecurity Magazine)</p><p><a href="https://cybersecuritynews.com/bitdefender-total-security-vulnerability/">Bitdefender Total Security Vulnerability Exposes Users to Man-in-the-Middle Attacks</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/alabama-man-arrested-in-sec-social-media-account-hack-that-led-the-price-of-bitcoin-to-spike/">Alabama Man Arrested in SEC Social Media Account Hack That Led the Price of Bitcoin to Spike</a> (SecurityWeek)</p><p><a href="https://securityboulevard.com/2024/10/cisos-concerned-over-growing-demands-of-role/">CISOs Concerned Over Growing Demands of Role</a> (Security Boulevard)</p><p><a href="https://therecord.media/pokemon-video-game-developer-game-freak-confirms-data-breach">Pokémon video game developer confirms its systems were breached by hackers</a> (The Record)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><h2><br></h2><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p><br></p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1767</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b334e232-b95e-11ee-8cf8-7b5c8c2adc63]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3839883598.mp3?updated=1729280858" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Authorities bring down another hacker.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2171/notes</link>
      <description>Brazilian authorities arrest the alleged “USDoD” hacker. The DoJ indicts the alleged operators of Anonymous Sudan. CISA and its partners warn of Iranian brute force password attempts. A new report questions online platforms’ ability to detect election disinformation. Recent security patches address critical vulnerabilities in widely-used platforms. North Korean threat actors escalate their fake IT worker schemes. CISA seeks comment on Product Security Bad Practices. Dealing effectively with post-breach stress. Tim Starks, Senior Reporter at CyberScoop, joins us to discuss “What’s new from this year’s Counter Ransomware Initiative summit.” Redbox DVD rental machines get a reboot. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
We welcome back Tim Starks, Senior Reporter at CyberScoop, to discuss “What’s new from this year’s Counter Ransomware Initiative summit, and what’s next.”

Selected Reading
Hacker allegedly behind attacks on FBI, Airbus, National Public Data arrested in Brazil (The Record)
Two Sudanese Nationals Indicted for Alleged Role in Anonymous Sudan Cyberattacks on Hospitals, Government Facilities, and Other Critical Infrastructure in Los Angeles and Around the World (US Department of Justice)
Iranian Hackers Using Brute Force on Critical Infrastructure (GovInfo Security)
Before US election, TikTok and Facebook fail to block harmful disinformation. YouTube succeeds (Global Witness)
F5 BIG-IP Updates Patch High-Severity Elevation of Privilege Vulnerability (Security Week)
Cisco Patches High-Severity Vulnerabilities in Analog Telephone Adapters (Security Week)
GitHub patches critical vulnerability in its Enterprise Servers (CyberScoop)
North Korea Escalates Fake IT Worker Schemes to Extort Employers (Infosecurity Magazine)
CISA Seeks Feedback on Upcoming Product Security Flaws Guidance (Infosecurity Magazine)
Helping Your Team Cope With the Stress of a Cyber Incident (BankInfo Security)
Tinkerers Are Taking Old Redbox Kiosks Home and Reverse Engineering Them (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 17 Oct 2024 20:10:00 -0000</pubDate>
      <itunes:title>Authorities bring down another hacker.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2171</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Brazilian authorities arrest the alleged “USDoD” hacker. The DoJ indicts the alleged operators of Anonymous Sudan. CISA and its partners warn of Iranian brute force password attempts. A new report questions online platforms’ ability to detect election disinformation. Recent security patches address critical vulnerabilities in widely-used platforms. North Korean threat actors escalate their fake IT worker schemes. CISA seeks comment on Product Security Bad Practices. Dealing effectively with post-breach stress. Tim Starks, Senior Reporter at CyberScoop, joins us to discuss “What’s new from this year’s Counter Ransomware Initiative summit.” Redbox DVD rental machines get a reboot. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
We welcome back Tim Starks, Senior Reporter at CyberScoop, to discuss “What’s new from this year’s Counter Ransomware Initiative summit, and what’s next.”

Selected Reading
Hacker allegedly behind attacks on FBI, Airbus, National Public Data arrested in Brazil (The Record)
Two Sudanese Nationals Indicted for Alleged Role in Anonymous Sudan Cyberattacks on Hospitals, Government Facilities, and Other Critical Infrastructure in Los Angeles and Around the World (US Department of Justice)
Iranian Hackers Using Brute Force on Critical Infrastructure (GovInfo Security)
Before US election, TikTok and Facebook fail to block harmful disinformation. YouTube succeeds (Global Witness)
F5 BIG-IP Updates Patch High-Severity Elevation of Privilege Vulnerability (Security Week)
Cisco Patches High-Severity Vulnerabilities in Analog Telephone Adapters (Security Week)
GitHub patches critical vulnerability in its Enterprise Servers (CyberScoop)
North Korea Escalates Fake IT Worker Schemes to Extort Employers (Infosecurity Magazine)
CISA Seeks Feedback on Upcoming Product Security Flaws Guidance (Infosecurity Magazine)
Helping Your Team Cope With the Stress of a Cyber Incident (BankInfo Security)
Tinkerers Are Taking Old Redbox Kiosks Home and Reverse Engineering Them (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Brazilian authorities arrest the alleged “USDoD” hacker. The DoJ indicts the alleged operators of Anonymous Sudan. CISA and its partners warn of Iranian brute force password attempts. A new report questions online platforms’ ability to detect election disinformation. Recent security patches address critical vulnerabilities in widely-used platforms. North Korean threat actors escalate their fake IT worker schemes. CISA seeks comment on Product Security Bad Practices. Dealing effectively with post-breach stress. Tim Starks, Senior Reporter at CyberScoop, joins us to discuss “What’s new from this year’s Counter Ransomware Initiative summit.” Redbox DVD rental machines get a reboot. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>We welcome back <a href="https://www.linkedin.com/in/tstarks/">Tim Starks</a>, Senior Reporter at <a href="https://cyberscoop.com/">CyberScoop</a>, to discuss “<a href="https://cyberscoop.com/counter-ransomware-initiative-summit-whats-next/">What’s new from this year’s Counter Ransomware Initiative summit, and what’s next</a>.”</p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/hacker-behind-fbi-npd-airbus-attacks-arrested-brazil">Hacker allegedly behind attacks on FBI, Airbus, National Public Data arrested in Brazil</a> (The Record)</p><p><a href="https://www.justice.gov/usao-cdca/pr/two-sudanese-nationals-indicted-alleged-role-anonymous-sudan-cyberattacks-hospitals">Two Sudanese Nationals Indicted for Alleged Role in Anonymous Sudan Cyberattacks on Hospitals, Government Facilities, and Other Critical Infrastructure in Los Angeles and Around the World</a> (US Department of Justice)</p><p><a href="https://www.govinfosecurity.com/iranian-hackers-using-brute-force-on-critical-infrastructure-a-26542">Iranian Hackers Using Brute Force on Critical Infrastructure</a> (GovInfo Security)</p><p><a href="https://www.globalwitness.org/en/campaigns/digital-threats/us-election-tiktok-and-facebook-fail-block-harmful-disinformation-youtube-succeeds/">Before US election, TikTok and Facebook fail to block harmful disinformation. YouTube succeeds</a> (Global Witness)</p><p><a href="https://www.securityweek.com/f5-big-ip-updates-patch-high-severity-elevation-of-privilege-vulnerability/">F5 BIG-IP Updates Patch High-Severity Elevation of Privilege Vulnerability</a> (Security Week)</p><p><a href="https://www.securityweek.com/cisco-patches-high-severity-vulnerabilities-in-analog-telephone-adapters/">Cisco Patches High-Severity Vulnerabilities in Analog Telephone Adapters</a> (Security Week)</p><p><a href="https://cyberscoop.com/github-enterprise-vulnerability-sso-saml/">GitHub patches critical vulnerability in its Enterprise Servers</a> (CyberScoop)</p><p><a href="https://www.infosecurity-magazine.com/news/north-korea-it-worker-extort/">North Korea Escalates Fake IT Worker Schemes to Extort Employers</a> (Infosecurity Magazine)</p><p><a href="https://www.infosecurity-magazine.com/news/cisa-product-security-flaws/">CISA Seeks Feedback on Upcoming Product Security Flaws Guidance</a> (Infosecurity Magazine)</p><p><a href="https://www.bankinfosecurity.com/blogs/helping-your-team-cope-stress-cyber-incident-p-3741">Helping Your Team Cope With the Stress of a Cyber Incident</a> (BankInfo Security)</p><p><a href="https://www.404media.co/tinkerers-are-taking-old-redbox-kiosks-home-and-reverse-engineering-them/">Tinkerers Are Taking Old Redbox Kiosks Home and Reverse Engineering Them</a> (404 Media)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show.</p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1688</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b2fc4eb8-b95e-11ee-8cf8-fb408cfed044]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3538859432.mp3?updated=1729193401" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sri Lanka says ‘no more’ to financial fakers!</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2170/notes</link>
      <description>Authorities arrest over 200 Chinese nationals in Sri Lanka over financial scams. Officials in Finland take down an online drug market. Cisco investigates an alleged data breach.  A major apparel provider suffers a data breach. Oracle’s latest patch update includes 35 critical issues. Microsoft has patched several high-severity vulnerabilities. The NCSC’s new boss calls for global collaboration to fight cybercrime. CISA warns of critical vulnerabilities affecting software from Microsoft, Mozilla, and SolarWinds.Hackers steal data from Verizon’s push-to-talk (PTT) system. On our CertByte segment, Chris Hare is joined by resident Microsoft SME George Monsalvatge to break down a question from N2K's Microsoft Azure Administrator (AZ-104) Practice Test. Robot vacuums go rogue.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from our suite of industry-leading content and a study tip to help you achieve the professional certifications you need to fast-track your career growth.
In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by resident Microsoft SME George Monsalvatge to break down a question from N2K's Microsoft Azure Administrator (AZ-104) Practice Test.
Candidates for the Microsoft Azure Administrator exam are Azure Administrators who manage cloud services that span storage, security, networking, and compute cloud capabilities. Candidates should be proficient in using PowerShell, the Command Line Interface, Azure Portal, ARM templates, operating systems, virtualization, cloud infrastructure, storage structures, and networking.
Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify.
Please note: The questions and answers provided here and on our site are not actual current or prior questions and answers from these certification publishers or providers.
Reference:
Microsoft Azure Blog &gt; Virtual Machines &gt; Gain business insights using Power BI reports for Azure Backup

Selected Reading
Sri Lankan Police Arrest Over 200 Chinese Scammers (BankInfo Security)
Finnish Customs closed down the Sipulitie marketplace on the encrypted Tor network (Finnish Customs)
Cisco investigates breach after stolen data for sale on hacking forum (Bleeping Computer)
Varsity Brands Data Breach Impacts 65,000 People (SecurityWeek)
Oracle October 2024 Critical Patch Update Addresses 198 CVEs (Security Boulevard)
Microsoft Patches Vulnerabilities in Power Platform, Imagine Cup Site (SecurityWeek)
'Nationally significant' cyberattacks are surging, warns the UK's new cyber chief (The Record)
CISA Warns of Three Vulnerabilities Actively Exploited in the Wild (Cyber Security News)
Hackers Advertise Stolen Verizon Push-to-Talk ‘Call Logs’ (404 Media)
Hackers took over robovacs to chase pets and yell slurs (The Verge)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 16 Oct 2024 20:10:00 -0000</pubDate>
      <itunes:title>Sri Lanka says ‘no more’ to financial fakers!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2170</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Authorities arrest over 200 Chinese nationals in Sri Lanka over financial scams. Officials in Finland take down an online drug market. Cisco investigates an alleged data breach.  A major apparel provider suffers a data breach. Oracle’s latest patch update includes 35 critical issues. Microsoft has patched several high-severity vulnerabilities. The NCSC’s new boss calls for global collaboration to fight cybercrime. CISA warns of critical vulnerabilities affecting software from Microsoft, Mozilla, and SolarWinds.Hackers steal data from Verizon’s push-to-talk (PTT) system. On our CertByte segment, Chris Hare is joined by resident Microsoft SME George Monsalvatge to break down a question from N2K's Microsoft Azure Administrator (AZ-104) Practice Test. Robot vacuums go rogue.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from our suite of industry-leading content and a study tip to help you achieve the professional certifications you need to fast-track your career growth.
In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by resident Microsoft SME George Monsalvatge to break down a question from N2K's Microsoft Azure Administrator (AZ-104) Practice Test.
Candidates for the Microsoft Azure Administrator exam are Azure Administrators who manage cloud services that span storage, security, networking, and compute cloud capabilities. Candidates should be proficient in using PowerShell, the Command Line Interface, Azure Portal, ARM templates, operating systems, virtualization, cloud infrastructure, storage structures, and networking.
Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify.
Please note: The questions and answers provided here and on our site are not actual current or prior questions and answers from these certification publishers or providers.
Reference:
Microsoft Azure Blog &gt; Virtual Machines &gt; Gain business insights using Power BI reports for Azure Backup

Selected Reading
Sri Lankan Police Arrest Over 200 Chinese Scammers (BankInfo Security)
Finnish Customs closed down the Sipulitie marketplace on the encrypted Tor network (Finnish Customs)
Cisco investigates breach after stolen data for sale on hacking forum (Bleeping Computer)
Varsity Brands Data Breach Impacts 65,000 People (SecurityWeek)
Oracle October 2024 Critical Patch Update Addresses 198 CVEs (Security Boulevard)
Microsoft Patches Vulnerabilities in Power Platform, Imagine Cup Site (SecurityWeek)
'Nationally significant' cyberattacks are surging, warns the UK's new cyber chief (The Record)
CISA Warns of Three Vulnerabilities Actively Exploited in the Wild (Cyber Security News)
Hackers Advertise Stolen Verizon Push-to-Talk ‘Call Logs’ (404 Media)
Hackers took over robovacs to chase pets and yell slurs (The Verge)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Authorities arrest over 200 Chinese nationals in Sri Lanka over financial scams. Officials in Finland take down an online drug market. Cisco investigates an alleged data breach.  A major apparel provider suffers a data breach. Oracle’s latest patch update includes 35 critical issues. Microsoft has patched several high-severity vulnerabilities. The NCSC’s new boss calls for global collaboration to fight cybercrime. CISA warns of critical vulnerabilities affecting software from Microsoft, Mozilla, and SolarWinds.Hackers steal data from Verizon’s push-to-talk (PTT) system. On our CertByte segment, Chris Hare is joined by resident Microsoft SME George Monsalvatge to break down a question from N2K's Microsoft Azure Administrator (AZ-104) Practice Test. Robot vacuums go rogue.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CertByte Segment</h2><p>Welcome to CertByte! On this bi-weekly segment hosted by <a href="https://www.linkedin.com/in/chrisharepmp/">Chris Hare</a>, a content developer and project management specialist at <a href="https://www.n2k.com/">N2K</a>, we share practice questions from our suite of industry-leading content and a study tip to help you achieve the professional certifications you need to fast-track your career growth.</p><p>In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by resident Microsoft SME <a href="https://www.linkedin.com/in/george-monsalvatge-abb2172/">George Monsalvatge</a> to break down a question from<a href="https://certify.cybervista.net/products/microsoft/microsoft-azure-administrator-104-practice-test/"> N2K's Microsoft Azure Administrator (AZ-104) Practice Test</a>.</p><p>Candidates for the Microsoft Azure Administrator exam are Azure Administrators who manage cloud services that span storage, security, networking, and compute cloud capabilities. Candidates should be proficient in using PowerShell, the Command Line Interface, Azure Portal, ARM templates, operating systems, virtualization, cloud infrastructure, storage structures, and networking.</p><p>Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at <a href="http://n2k.com/certify">n2k.com/certify</a>.</p><p><strong><em>Please note: The questions and answers provided here and on our site are not actual current or prior questions and answers from these certification publishers or providers.</em></strong></p><p><strong>Reference:</strong></p><p>Microsoft Azure Blog &gt; Virtual Machines &gt;<a href="https://azure.microsoft.com/de-de/blog/azure-backup-reports/"> </a><a href="https://azure.microsoft.com/de-de/blog/azure-backup-reports/">Gain business insights using Power BI reports for Azure Backup</a></p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bankinfosecurity.com/sri-lankan-police-arrest-over-200-chinese-scammers-a-26531">Sri Lankan Police Arrest Over 200 Chinese Scammers</a> (BankInfo Security)</p><p><a href="https://tulli.fi/en/-/finnish-customs-closed-down-the-sipulitie-marketplace-on-the-encrypted-tor-network">Finnish Customs closed down the Sipulitie marketplace on the encrypted Tor network</a> (Finnish Customs)</p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-investigates-breach-after-stolen-data-for-sale-on-hacking-forum">Cisco investigates breach after stolen data for sale on hacking forum</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/varsity-brands-data-breach-impacts-65000-people/">Varsity Brands Data Breach Impacts 65,000 People</a> (SecurityWeek)</p><p><a href="https://securityboulevard.com/2024/10/oracle-october-2024-critical-patch-update-addresses-198-cves/">Oracle October 2024 Critical Patch Update Addresses 198 CVEs</a> (Security Boulevard)</p><p><a href="https://www.securityweek.com/microsoft-patches-vulnerabilities-in-power-platform-imagine-cup-site/">Microsoft Patches Vulnerabilities in Power Platform, Imagine Cup Site</a> (SecurityWeek)</p><p><a href="https://therecord.media/uk-nationally-significant-cyberattacks-ncsc-horne-warning">'Nationally significant' cyberattacks are surging, warns the UK's new cyber chief</a> (The Record)</p><p><a href="https://cybersecuritynews.com/cisa-warns-of-three-vulnerabilities-2/">CISA Warns of Three Vulnerabilities Actively Exploited in the Wild</a> (Cyber Security News)</p><p><a href="https://www.404media.co/hackers-advertise-stolen-verizon-push-to-talk-call-log">Hackers Advertise Stolen Verizon Push-to-Talk ‘Call Logs’</a> (404 Media)</p><p><a href="https://www.theverge.com/2024/10/12/24268508/hacked-ecovacs-deebot-x2-racial-slurs-chase-pets">Hackers took over robovacs to chase pets and yell slurs</a> (The Verge)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1503</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b2bc06be-b95e-11ee-8cf8-3f4bd3c96ff7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1019109618.mp3?updated=1729106216" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Election Propaganda: Part 3: Efforts to reduce the impact of future elections.</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/5575/notes</link>
      <description>Thinking past the US 2024 Presidential Election, In part three of the series, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses reducing the impact of propaganda in the future elections with Perry Carpenter, Chief Human Risk Management Strategist at KnowBe4 and host of the 8th Layer Insights Podcast, Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project, and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber.

Check out Part 1 &amp; 2!
Part 1: Election Propaganda Part 1: How Does Election Propaganda Work? In this episode, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that every citizen can take—regardless of political philosophy—to resist the influence of propaganda. This foundational episode is essential for understanding how to navigate the complex landscape of election messaging.

Part 2: Election Propaganda: Part 2: Modern propaganda efforts. In preparation for the US 2024 Presidential Election, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses recent international propaganda efforts in the form of nation state interference and influence operations as well as domestic campaigns designed to split the target country into opposing camps. Guests include Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber.

References:
Rick Howard, 2024. Election Propaganda Part 1: How does election propaganda work? [3 Part Podcast Series]. The CyberWire.
Rick Howard, 2024. Election Propaganda: Part 2: Modern propaganda efforts. [3 Part Podcast Series]. The CyberWire.
Christopher Chabris, Daniel Simons, 2010. The Invisible Gorilla: And Other Ways Our Intuitions Deceive Us [Book]. Goodreads.
Chris Palmer, 2010. TFL Viral - Awareness Test (Moonwalking Bear) [Explainer]. YouTube.
David Ehl, 2024. Why Meta is now banning Russian propaganda [News]. Deutsche Welle. 
Eli Pariser, 2011. The Filter Bubble: What the Internet is Hiding From You [Book]. Goodreads.
Kara Swisher, Julia Davis, Alex Stamos, Brandy Zadrozny, 2024. Useful Idiots? How Right-Wing Influencers Got $ to Spread Russian Propaganda [Podcast]. On with Kara Swisher.
Nate Silver, 2024. What’s behind Trump’s surge in prediction markets? [Analysis]. Silver Bulletin.
Niha Masih, 2024. Meta bans Russian state media outlet RT for acts of ‘foreign interference’ [News]. The Washington Post.
Nilay Patel, 2024. The AI election deepfakes have arrived [Podcast]. Decoder.
Nina Jankowicz, 2020. How to Lose the Information War: Russia, Fake News and the Future of Conflict [Book]. Goodreads. 
Perry Carpenter, 2024. FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions [Book]. Goodreads. 
Perry Carpenter, 2021. Meatloaf Recipes Cookbook: Easy Recipes For Preparing Tasty Meals For Weight Loss And Healthy Lifestyle All Year Round [Book]. Goodreads.
Perry Carpenter, n.d. 8th Layer Insights [Podcast]. N2K CyberWire.
Renee DiResta, 2024. Invisible Rulers: The People Who Turn Lies into Reality [Book]. Goodreads. 
Robin Stern, Marc Brackett, 2024. 5 Ways to Recognize and Avoid Political Gaslighting [Explainer]. The Washington Post.
Sarah Ellison, Amy Gardner, Clara Ence Morse, 2024. Elon Musk’s misleading election claims reach millions and alarm election officials [News]. The Washington Post.
Scott Small, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal Cyber.
Staff, n.d. Overview: Coalition for Content Provenance and Authenticity [Website]. C2PA.
Staff, 2021. Foreign Threats to the 2020 US Federal Elections [Intelligence Community Assessment]. DNI.
Staff, n.d. Project Origin [Website]. OriginProject. URL https://www.originproject.info/
Stuart A. Thompson, Tiffany Hsu, 2024. Left-Wing Misinformation Is Having a Moment [Analysis] The New York Times. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 16 Oct 2024 06:00:00 -0000</pubDate>
      <itunes:title>Election Propaganda: Part 3: Efforts to reduce the impact of future elections.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>5575</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thinking past the US 2024 Presidential Election, In part three of the series, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses reducing the impact of propaganda in the future elections with Perry Carpenter, Chief Human Risk Management Strategist at KnowBe4 and host of the 8th Layer Insights Podcast, Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project, and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber.

Check out Part 1 &amp; 2!
Part 1: Election Propaganda Part 1: How Does Election Propaganda Work? In this episode, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that every citizen can take—regardless of political philosophy—to resist the influence of propaganda. This foundational episode is essential for understanding how to navigate the complex landscape of election messaging.

Part 2: Election Propaganda: Part 2: Modern propaganda efforts. In preparation for the US 2024 Presidential Election, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses recent international propaganda efforts in the form of nation state interference and influence operations as well as domestic campaigns designed to split the target country into opposing camps. Guests include Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber.

References:
Rick Howard, 2024. Election Propaganda Part 1: How does election propaganda work? [3 Part Podcast Series]. The CyberWire.
Rick Howard, 2024. Election Propaganda: Part 2: Modern propaganda efforts. [3 Part Podcast Series]. The CyberWire.
Christopher Chabris, Daniel Simons, 2010. The Invisible Gorilla: And Other Ways Our Intuitions Deceive Us [Book]. Goodreads.
Chris Palmer, 2010. TFL Viral - Awareness Test (Moonwalking Bear) [Explainer]. YouTube.
David Ehl, 2024. Why Meta is now banning Russian propaganda [News]. Deutsche Welle. 
Eli Pariser, 2011. The Filter Bubble: What the Internet is Hiding From You [Book]. Goodreads.
Kara Swisher, Julia Davis, Alex Stamos, Brandy Zadrozny, 2024. Useful Idiots? How Right-Wing Influencers Got $ to Spread Russian Propaganda [Podcast]. On with Kara Swisher.
Nate Silver, 2024. What’s behind Trump’s surge in prediction markets? [Analysis]. Silver Bulletin.
Niha Masih, 2024. Meta bans Russian state media outlet RT for acts of ‘foreign interference’ [News]. The Washington Post.
Nilay Patel, 2024. The AI election deepfakes have arrived [Podcast]. Decoder.
Nina Jankowicz, 2020. How to Lose the Information War: Russia, Fake News and the Future of Conflict [Book]. Goodreads. 
Perry Carpenter, 2024. FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions [Book]. Goodreads. 
Perry Carpenter, 2021. Meatloaf Recipes Cookbook: Easy Recipes For Preparing Tasty Meals For Weight Loss And Healthy Lifestyle All Year Round [Book]. Goodreads.
Perry Carpenter, n.d. 8th Layer Insights [Podcast]. N2K CyberWire.
Renee DiResta, 2024. Invisible Rulers: The People Who Turn Lies into Reality [Book]. Goodreads. 
Robin Stern, Marc Brackett, 2024. 5 Ways to Recognize and Avoid Political Gaslighting [Explainer]. The Washington Post.
Sarah Ellison, Amy Gardner, Clara Ence Morse, 2024. Elon Musk’s misleading election claims reach millions and alarm election officials [News]. The Washington Post.
Scott Small, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal Cyber.
Staff, n.d. Overview: Coalition for Content Provenance and Authenticity [Website]. C2PA.
Staff, 2021. Foreign Threats to the 2020 US Federal Elections [Intelligence Community Assessment]. DNI.
Staff, n.d. Project Origin [Website]. OriginProject. URL https://www.originproject.info/
Stuart A. Thompson, Tiffany Hsu, 2024. Left-Wing Misinformation Is Having a Moment [Analysis] The New York Times. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thinking past the US 2024 Presidential Election, In part three of the series, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses reducing the impact of propaganda in the future elections with Perry Carpenter, Chief Human Risk Management Strategist at KnowBe4 and host of the 8th Layer Insights Podcast, Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project, and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber.</p><p><br></p><h2>Check out Part 1 &amp; 2!</h2><p><strong>Part 1:</strong> <a href="https://thecyberwire.com/podcasts/cso-perspectives-public/5573/notes">Election Propaganda Part 1: How Does Election Propaganda Work?</a> In this episode, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that every citizen can take—regardless of political philosophy—to resist the influence of propaganda. This foundational episode is essential for understanding how to navigate the complex landscape of election messaging.</p><p><br></p><p><strong>Part 2: </strong><a href="https://thecyberwire.com/podcasts/cso-perspectives-public/5574/notes">Election Propaganda: Part 2: Modern propaganda efforts.</a><strong> </strong>In preparation for the US 2024 Presidential Election, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses recent international propaganda efforts in the form of nation state interference and influence operations as well as domestic campaigns designed to split the target country into opposing camps. Guests include Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber.</p><p><br></p><h2>References:</h2><p><a href="https://thecyberwire.com/podcasts/cso-perspectives-public/5573/notes">Rick Howard, 2024. Election Propaganda Part 1: How does election propaganda work? [3 Part Podcast Series]. The CyberWire.</a></p><p><a href="https://thecyberwire.com/podcasts/cso-perspectives-public/5574/notes">Rick Howard, 2024. Election Propaganda: Part 2: Modern propaganda efforts. [3 Part Podcast Series]. The CyberWire.</a></p><p><a href="https://www.goodreads.com/book/show/7783191-the-invisible-gorilla">Christopher Chabris, Daniel Simons, 2010. The Invisible Gorilla: And Other Ways Our Intuitions Deceive Us [Book]. Goodreads.</a></p><p><a href="https://www.youtube.com/watch?v=xNSgmm9FX2s">Chris Palmer, 2010. TFL Viral - Awareness Test (Moonwalking Bear) [Explainer]. YouTube.</a></p><p><a href="https://www.dw.com/en/why-meta-is-now-banning-russian-propaganda/a-70290904">David Ehl, 2024. Why Meta is now banning Russian propaganda [News]. Deutsche Welle.</a> </p><p><a href="https://www.goodreads.com/book/show/10596103-the-filter-bubble">Eli Pariser, 2011. The Filter Bubble: What the Internet is Hiding From You [Book]. Goodreads.</a></p><p><a href="https://pca.st/pq9bqe5c">Kara Swisher, Julia Davis, Alex Stamos, Brandy Zadrozny, 2024. Useful Idiots? How Right-Wing Influencers Got $ to Spread Russian Propaganda [Podcast]. On with Kara Swisher.</a></p><p><a href="https://www.natesilver.net/p/whats-behind-trumps-surge-in-prediction">Nate Silver, 2024. What’s behind Trump’s surge in prediction markets? [Analysis]. Silver Bulletin.</a></p><p><a href="https://www.washingtonpost.com/technology/2024/09/17/meta-ban-rt-russia-state-media">Niha Masih, 2024. Meta bans Russian state media outlet RT for acts of ‘foreign interference’ [News]. The Washington Post.</a></p><p><a href="https://pca.st/hym6jsf4">Nilay Patel, 2024. The AI election deepfakes have arrived [Podcast]. Decoder.</a></p><p><a href="https://www.goodreads.com/book/show/52382865-how-to-lose-the-information-war">Nina Jankowicz, 2020. How to Lose the Information War: Russia, Fake News and the Future of Conflict [Book]. Goodreads. </a></p><p><a href="https://www.goodreads.com/book/show/217957690-faik">Perry Carpenter, 2024. FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions [Book]. Goodreads.</a> </p><p><a href="https://www.goodreads.com/book/show/113976361-meatloaf-recipes-cookbook">Perry Carpenter, 2021. Meatloaf Recipes Cookbook: Easy Recipes For Preparing Tasty Meals For Weight Loss And Healthy Lifestyle All Year Round [Book]. Goodreads.</a></p><p><a href="https://thecyberwire.com/podcasts/8th-layer-insights">Perry Carpenter, n.d. 8th Layer Insights [Podcast]. N2K CyberWire.</a></p><p><a href="https://www.goodreads.com/book/show/199372835-invisible-rulers">Renee DiResta, 2024. Invisible Rulers: The People Who Turn Lies into Reality [Book]. Goodreads. </a></p><p><a href="https://www.washingtonpost.com/wellness/2024/09/10/political-gaslighting-comic/">Robin Stern, Marc Brackett, 2024. 5 Ways to Recognize and Avoid Political Gaslighting [Explainer]. The Washington Post.</a></p><p><a href="https://www.washingtonpost.com/politics/2024/09/10/elon-musk-illegal-immigrant-voting-misinformation/">Sarah Ellison, Amy Gardner, Clara Ence Morse, 2024. Elon Musk’s misleading election claims reach millions and alarm election officials [News]. The Washington Post.</a></p><p><a href="https://www.tidalcyber.com/election-cyber-interference-threats-and-defenses">Scott Small, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal Cyber.</a></p><p><a href="https://c2pa.org/">Staff, n.d. Overview: Coalition for Content Provenance and Authenticity [Website]. C2PA.</a></p><p><a href="https://www.dni.gov/files/ODNI/documents/assessments/ICA-declass-16MAR21.pdf">Staff, 2021. Foreign Threats to the 2020 US Federal Elections [Intelligence Community Assessment]. DNI.</a></p><p><a href="https://www.nytimes.com/2024/09/03/technology/left-wing-misinformation-conspiracy-theories.html">Staff, n.d. Project Origin [Website]. OriginProject. URL https://www.originproject.info/</a></p><p><a href="https://www.nytimes.com/2024/09/03/technology/left-wing-misinformation-conspiracy-theories.html">Stuart A. Thompson, Tiffany Hsu, 2024. Left-Wing Misinformation Is Having a Moment [Analysis] The New York Times. </a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2743</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[76074a76-8b1d-11ef-b951-4b1e8f012583]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5668985210.mp3?updated=1729027320" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A “must patch” list in the making.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2169/notes</link>
      <description>CISA adds a Fortinet flaw to its “must patch” list. Splunk releases fixes for 11 vulnerabilities in Splunk Enterprise. ErrorFather is a new malicious Android banking trojan. New evidence backs secure-by-design practices. CISA warns that threat actors are exploiting unencrypted persistent cookies. The FIDO Alliance standardizes passkey portability. Cybercriminals linger on Telegram. On our Industry Voices segment today, our guest is Matt Radolec, Vice President, Incident Response and Cloud Operations at Varonis, discussing how AI amplifies the need for data privacy regulation and opens doors for abuse. We mark the passing of the co creator of the BBS.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment today, our guest is Matt Radolec, Vice President, Incident Response and Cloud Operations at Varonis, discussing how AI amplifies the need for data privacy regulation and opens doors for abuse.

Selected Reading
Tens of thousands of IPs vulnerable to Fortinet flaw dubbed 'must patch' by feds (CyberScoop)
Fortinet FortiGuard Labs Observes Darknet Activity Targeting the 2024 United States Presidential Election (Fortinet)
Splunk Enterprise Update Patches Remote Code Execution Vulnerabilities (SecurityWeek)
Cerberus Android Banking Trojan Deployed in New Multi-Stage Malicious Campaign (Infosecurity Magazine)
Organizations can substantially lower vulnerabilities with secure-by-design practices, report finds (CyberScoop)
Eight Million Users Download 200+ Malicious Apps from Google Play (Infosecurity Magazine)
TrickMo malware steals Android PINs using fake lock screen (Bleeping Computer)
CISA: Hackers abuse F5 BIG-IP cookies to map internal servers (Bleeping Computer)
FIDO Alliance is Standardizing Passkey Portability (Thurrott)
So far, cybercriminals appear to be just shopping around for a Telegram alternative (The Record)
Ward Christensen, BBS inventor and architect of our online age, dies at age 78 (Ars Technica)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Oct 2024 20:10:00 -0000</pubDate>
      <itunes:title>A “must patch” list in the making.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2169</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA adds a Fortinet flaw to its “must patch” list. Splunk releases fixes for 11 vulnerabilities in Splunk Enterprise. ErrorFather is a new malicious Android banking trojan. New evidence backs secure-by-design practices. CISA warns that threat actors are exploiting unencrypted persistent cookies. The FIDO Alliance standardizes passkey portability. Cybercriminals linger on Telegram. On our Industry Voices segment today, our guest is Matt Radolec, Vice President, Incident Response and Cloud Operations at Varonis, discussing how AI amplifies the need for data privacy regulation and opens doors for abuse. We mark the passing of the co creator of the BBS.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment today, our guest is Matt Radolec, Vice President, Incident Response and Cloud Operations at Varonis, discussing how AI amplifies the need for data privacy regulation and opens doors for abuse.

Selected Reading
Tens of thousands of IPs vulnerable to Fortinet flaw dubbed 'must patch' by feds (CyberScoop)
Fortinet FortiGuard Labs Observes Darknet Activity Targeting the 2024 United States Presidential Election (Fortinet)
Splunk Enterprise Update Patches Remote Code Execution Vulnerabilities (SecurityWeek)
Cerberus Android Banking Trojan Deployed in New Multi-Stage Malicious Campaign (Infosecurity Magazine)
Organizations can substantially lower vulnerabilities with secure-by-design practices, report finds (CyberScoop)
Eight Million Users Download 200+ Malicious Apps from Google Play (Infosecurity Magazine)
TrickMo malware steals Android PINs using fake lock screen (Bleeping Computer)
CISA: Hackers abuse F5 BIG-IP cookies to map internal servers (Bleeping Computer)
FIDO Alliance is Standardizing Passkey Portability (Thurrott)
So far, cybercriminals appear to be just shopping around for a Telegram alternative (The Record)
Ward Christensen, BBS inventor and architect of our online age, dies at age 78 (Ars Technica)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA adds a Fortinet flaw to its “must patch” list. Splunk releases fixes for 11 vulnerabilities in Splunk Enterprise. ErrorFather is a new malicious Android banking trojan. New evidence backs secure-by-design practices. CISA warns that threat actors are exploiting unencrypted persistent cookies. The FIDO Alliance standardizes passkey portability. Cybercriminals linger on Telegram. On our Industry Voices segment today, our guest is Matt Radolec, Vice President, Incident Response and Cloud Operations at Varonis, discussing how AI amplifies the need for data privacy regulation and opens doors for abuse. We mark the passing of the co creator of the BBS.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Voices segment today, our guest is <a href="https://www.linkedin.com/in/matthew-radolec-1b54974b/">Matt Radolec</a>, Vice President, Incident Response and Cloud Operations at <a href="https://www.varonis.com/">Varonis</a>, discussing how AI amplifies the need for data privacy regulation and opens doors for abuse.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://cyberscoop.com/ips-vulnerable-fortinet-flaw-must-patch/">Tens of thousands of IPs vulnerable to Fortinet flaw dubbed 'must patch' by feds</a> (CyberScoop)</p><p><a href="https://www.fortinet.com/corporate/about-us/newsroom/press-releases/2024/fortinet-fortiguard-labs-observes-darknet-activity-targeting-the-2024-united-states-presidential-election">Fortinet FortiGuard Labs Observes Darknet Activity Targeting the 2024 United States Presidential Election</a> (Fortinet)</p><p><a href="https://www.securityweek.com/splunk-enterprise-update-patches-remote-code-execution-vulnerabilities/">Splunk Enterprise Update Patches Remote Code Execution Vulnerabilities</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/cerberus-android-banking-trojan/">Cerberus Android Banking Trojan Deployed in New Multi-Stage Malicious Campaign</a> (Infosecurity Magazine)</p><p><a href="https://cyberscoop.com/secure-by-design-return-investment-code-warrior/">Organizations can substantially lower vulnerabilities with secure-by-design practices, report finds</a> (CyberScoop)</p><p><a href="https://www.infosecurity-magazine.com/news/eight-million-download-200-mal/">Eight Million Users Download 200+ Malicious Apps from Google Play</a> (Infosecurity Magazine)</p><p><a href="https://www.bleepingcomputer.com/news/security/trickmo-malware-steals-android-pins-using-fake-lock-screen/">TrickMo malware steals Android PINs using fake lock screen</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-hackers-abuse-f5-big-ip-cookies-to-map-internal-servers/">CISA: Hackers abuse F5 BIG-IP cookies to map internal servers</a> (Bleeping Computer)</p><p><a href="https://www.thurrott.com/cloud/311436/fido-alliance-is-standardizing-passkey-portability">FIDO Alliance is Standardizing Passkey Portability</a> (Thurrott)</p><p><a href="https://therecord.media/telegram-alternatives-for-cybercriminals">So far, cybercriminals appear to be just shopping around for a Telegram alternative</a> (The Record)</p><p><a href="https://arstechnica.com/gadgets/2024/10/ward-christensen-bbs-inventor-and-architect-of-our-online-age-dies-at-age-78/">Ward Christensen, BBS inventor and architect of our online age, dies at age 78</a> (Ars Technica)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1823</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b2829708-b95e-11ee-8cf8-a3a32a0e4ee9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8952128292.mp3?updated=1729016997" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Solution Spotlight: A first look at ISC2's 2024 Cybersecurity Workforce Study. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/76/notes</link>
      <description>In this special edition of Solution Spotlight, join us for an exclusive conversation between ISC2's Executive Vice President of Corporate Affairs, Andy Woolnough, and N2K's Simone Petrella. Together, they take a deep dive into ISC2's 2024 Cybersecurity Workforce Study, offering a first look at the most pressing findings.
Discover insights from a survey of 15,852 cybersecurity professionals and decision-makers across the globe, including the size of the current workforce, the demand for more professionals, and alarming trends around layoffs, budget cuts, and skills shortages. Andy and Simone also explore the growing disconnect between the skills in high demand by hiring managers and those that cybersecurity pros are prioritizing. Learn why organizations must take immediate action to foster talent and bridge these skills gaps to meet the industry's evolving needs.
Plus, today marks the start of the ISC2 Security Congress 2024! Whether attending in person or virtually, this event is packed with opportunities to engage with industry experts and further your knowledge in cybersecurity.
Tune in for actionable insights and exclusive details on the state of the cybersecurity workforce and how your organization can stay ahead.
For more information on ISC2 Security Congress 2024, visit the event page here.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 14 Oct 2024 07:00:00 -0000</pubDate>
      <itunes:title>Solution Spotlight: A first look at ISC2's 2024 Cybersecurity Workforce Study. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>76</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this special edition of Solution Spotlight, join us for an exclusive conversation between ISC2's Executive Vice President of Corporate Affairs, Andy Woolnough, and N2K's Simone Petrella. Together, they take a deep dive into ISC2's 2024 Cybersecurity Workforce Study, offering a first look at the most pressing findings.
Discover insights from a survey of 15,852 cybersecurity professionals and decision-makers across the globe, including the size of the current workforce, the demand for more professionals, and alarming trends around layoffs, budget cuts, and skills shortages. Andy and Simone also explore the growing disconnect between the skills in high demand by hiring managers and those that cybersecurity pros are prioritizing. Learn why organizations must take immediate action to foster talent and bridge these skills gaps to meet the industry's evolving needs.
Plus, today marks the start of the ISC2 Security Congress 2024! Whether attending in person or virtually, this event is packed with opportunities to engage with industry experts and further your knowledge in cybersecurity.
Tune in for actionable insights and exclusive details on the state of the cybersecurity workforce and how your organization can stay ahead.
For more information on ISC2 Security Congress 2024, visit the event page here.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this special edition of <em>Solution Spotlight</em>, join us for an exclusive conversation between <a href="https://www.isc2.org/">ISC2</a>'s Executive Vice President of Corporate Affairs, <a href="https://www.linkedin.com/in/andy-woolnough/">Andy Woolnough</a>, and <a href="https://www.n2k.com/">N2K</a>'s <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a>. Together, they take a deep dive into <a href="https://www.isc2.org/Insights/2024/09/Employers-Must-Act-Cybersecurity-Workforce-Growth-Stalls-as-Skills-Gaps-Widen">ISC2's 2024 Cybersecurity Workforce Study</a>, offering a first look at the most pressing findings.</p><p>Discover insights from a survey of 15,852 cybersecurity professionals and decision-makers across the globe, including the size of the current workforce, the demand for more professionals, and alarming trends around layoffs, budget cuts, and skills shortages. Andy and Simone also explore the growing disconnect between the skills in high demand by hiring managers and those that cybersecurity pros are prioritizing. Learn why organizations must take immediate action to foster talent and bridge these skills gaps to meet the industry's evolving needs.</p><p>Plus, today marks the start of the ISC2 Security Congress 2024! Whether attending in person or virtually, this event is packed with opportunities to engage with industry experts and further your knowledge in cybersecurity.</p><p>Tune in for actionable insights and exclusive details on the state of the cybersecurity workforce and how your organization can stay ahead.</p><p>For more information on ISC2 Security Congress 2024, visit the event page <a href="https://web.cvent.com/event/a5c15481-492d-4efa-bd79-a521ab73b699/websitePage:26a84091-6c86-411e-9e16-6613ec20a219">here</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1635</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6ce7808a-87f0-11ef-ba71-67de1cbcc504]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3519941067.mp3?updated=1728666371" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Billy Wilson: Translating language skills to technical skills. [HPC] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/37/notes</link>
      <description>Enjoy this special encore episode, where we are joined by a High Performance Computing Systems Administrator at Brigham Young University. Billy Wilson tells his cybersecurity career story translating language skills to technical skills. According to Billy's employer, moving to a technical position at his alma mater occurred because Billy showed this potential and a thirst for learning. He is currently pursuing his master's degree from SANS Technology Institute for Information Security Engineering while working to secure BYU's data for their computationally-intensive research. Billy notes that not everyone has one overarching passion which gives him variety in his work. And, we thank Billy for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 13 Oct 2024 07:00:00 -0000</pubDate>
      <itunes:title>Billy Wilson: Translating language skills to technical skills. [HPC] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>37</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this special encore episode, where we are joined by a High Performance Computing Systems Administrator at Brigham Young University. Billy Wilson tells his cybersecurity career story translating language skills to technical skills. According to Billy's employer, moving to a technical position at his alma mater occurred because Billy showed this potential and a thirst for learning. He is currently pursuing his master's degree from SANS Technology Institute for Information Security Engineering while working to secure BYU's data for their computationally-intensive research. Billy notes that not everyone has one overarching passion which gives him variety in his work. And, we thank Billy for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special encore episode, where we are joined by a High Performance Computing Systems Administrator at Brigham Young University. Billy Wilson tells his cybersecurity career story translating language skills to technical skills. According to Billy's employer, moving to a technical position at his alma mater occurred because Billy showed this potential and a thirst for learning. He is currently pursuing his master's degree from SANS Technology Institute for Information Security Engineering while working to secure BYU's data for their computationally-intensive research. Billy notes that not everyone has one overarching passion which gives him variety in his work. And, we thank Billy for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>427</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aab686ec-873a-11ef-ad94-43a73701e13b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6991360256.mp3?updated=1728587452" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware on repeat. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/350/notes</link>
      <description>In this episode, Trevor Hilligoss, VP of SpyCloud Labs at SpyCloud, discusses the increasing threat of ransomware, emphasizing the role of infostealer malware in facilitating these attacks. He draws from SpyCloud's 2024 Malware and Ransomware Defense Report, highlighting how compromised identity data from infostealers creates opportunities for ransomware operators.
With 75% of organizations experiencing multiple ransomware attacks in the past year, Trevor explores findings from over 500 security leaders in the US and UK, discussing the challenges businesses face and how they can use insights from this research to defend against ransomware and other cybercrimes.
The research can be found here:
MALWARE AND RANSOMWARE DEFENSE REPORT

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Oct 2024 07:00:00 -0000</pubDate>
      <itunes:title>Ransomware on repeat. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>350</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode, Trevor Hilligoss, VP of SpyCloud Labs at SpyCloud, discusses the increasing threat of ransomware, emphasizing the role of infostealer malware in facilitating these attacks. He draws from SpyCloud's 2024 Malware and Ransomware Defense Report, highlighting how compromised identity data from infostealers creates opportunities for ransomware operators.
With 75% of organizations experiencing multiple ransomware attacks in the past year, Trevor explores findings from over 500 security leaders in the US and UK, discussing the challenges businesses face and how they can use insights from this research to defend against ransomware and other cybercrimes.
The research can be found here:
MALWARE AND RANSOMWARE DEFENSE REPORT

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/thilligoss/">Trevor Hilligoss</a>, VP of <a href="https://www.linkedin.com/company/spycloud/">SpyCloud Labs</a> at <a href="https://www.linkedin.com/company/spycloud/">SpyCloud</a>, discusses the increasing threat of ransomware, emphasizing the role of infostealer malware in facilitating these attacks. He draws from SpyCloud's <a href="https://spycloud.com/resource/2024-malware-ransomware-defense-report/">2024 Malware and Ransomware Defense Report</a>, highlighting how compromised identity data from infostealers creates opportunities for ransomware operators.</p><p>With 75% of organizations experiencing multiple ransomware attacks in the past year, Trevor explores findings from over 500 security leaders in the US and UK, discussing the challenges businesses face and how they can use insights from this research to defend against ransomware and other cybercrimes.</p><p>The research can be found here:</p><ul><li><a href="https://spycloud.com/resource/2024-malware-ransomware-defense-report/">MALWARE AND RANSOMWARE DEFENSE REPORT</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1535</itunes:duration>
      <guid isPermaLink="false"><![CDATA[e632eb70-87e9-11ef-a7b9-5f73dcb198ef]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3419001007.mp3?updated=1729011761" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patient portals down, ransomware up.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2168/notes</link>
      <description>A Colorado health system’s patient portal has been compromised. Malicious uploads to open-source repositories surge over the past year. Octo2 malware targets Android devices. A critical vulnerability in Veeam Backup &amp; Replication software is being exploited. The U.S. and U.K. team up for kids online safety. The European Council adopts the Cyber Resilience Act. New York State adopts new cyber regulations for hospitals. The FBI created its own cryptocurrency to help thwart fraudsters. Our guest Dr. Bilyana Lilly joins us to talk about her new novel "Digital Mindhunters." Getting dumped via AI.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest Dr. Bilyana Lilly joins us to talk about her new novel "Digital Mindhunters."

Selected Reading
Cyberattack targets healthcare nonprofit overseeing 13 Colorado facilities (The Record)
Malicious packages in open-source repositories are surging (CyberScoop)
Octo2 Malware Uses Fake NordVPN, Chrome Apps to Infect Android Devices (HackRead)
Hackers Exploiting Veeam RCE Vulnerability to Deploy Ransomware (Cybersecuritynews)
Britain, US set up working group to improve children’s online safety (Reuters)
European Council Adopts Cyber Resilience Act (BankInfoSecurity)
New York State Enacts New Cyber Requirements for Hospitals (BankInfoSecurity)
FBI created a crypto token so it could watch it being abused (The Register)
Man learns he’s being dumped via “dystopian” AI summary of texts (Ars Technica)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 11 Oct 2024 20:10:00 -0000</pubDate>
      <itunes:title>Patient portals down, ransomware up.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2168</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A Colorado health system’s patient portal has been compromised. Malicious uploads to open-source repositories surge over the past year. Octo2 malware targets Android devices. A critical vulnerability in Veeam Backup &amp; Replication software is being exploited. The U.S. and U.K. team up for kids online safety. The European Council adopts the Cyber Resilience Act. New York State adopts new cyber regulations for hospitals. The FBI created its own cryptocurrency to help thwart fraudsters. Our guest Dr. Bilyana Lilly joins us to talk about her new novel "Digital Mindhunters." Getting dumped via AI.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest Dr. Bilyana Lilly joins us to talk about her new novel "Digital Mindhunters."

Selected Reading
Cyberattack targets healthcare nonprofit overseeing 13 Colorado facilities (The Record)
Malicious packages in open-source repositories are surging (CyberScoop)
Octo2 Malware Uses Fake NordVPN, Chrome Apps to Infect Android Devices (HackRead)
Hackers Exploiting Veeam RCE Vulnerability to Deploy Ransomware (Cybersecuritynews)
Britain, US set up working group to improve children’s online safety (Reuters)
European Council Adopts Cyber Resilience Act (BankInfoSecurity)
New York State Enacts New Cyber Requirements for Hospitals (BankInfoSecurity)
FBI created a crypto token so it could watch it being abused (The Register)
Man learns he’s being dumped via “dystopian” AI summary of texts (Ars Technica)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Colorado health system’s patient portal has been compromised. Malicious uploads to open-source repositories surge over the past year. Octo2 malware targets Android devices. A critical vulnerability in Veeam Backup &amp; Replication software is being exploited. The U.S. and U.K. team up for kids online safety. The European Council adopts the Cyber Resilience Act. New York State adopts new cyber regulations for hospitals. The FBI created its own cryptocurrency to help thwart fraudsters. Our guest Dr. Bilyana Lilly joins us to talk about her new novel "Digital Mindhunters." Getting dumped via AI.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest <a href="https://www.linkedin.com/in/dr-bilyana-lilly-983b8119/">Dr. Bilyana Lilly</a> joins us to talk about her new novel "<a href="https://a.co/d/9f7atHY">Digital Mindhunters</a>."</p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/cyberattack-targets-healthcare-nonprofit-colorado">Cyberattack targets healthcare nonprofit overseeing 13 Colorado facilities</a> (The Record)</p><p><a href="https://cyberscoop.com/open-source-security-supply-chain-sonatype/">Malicious packages in open-source repositories are surging</a> (CyberScoop)</p><p><a href="https://hackread.com/octo2-malware-fake-nordvpn-chrome-apps-android-device/">Octo2 Malware Uses Fake NordVPN, Chrome Apps to Infect Android Devices</a> (HackRead)</p><p><a href="https://cybersecuritynews.com/hackers-exploiting-veeam-rce-vulnerability/">Hackers Exploiting Veeam RCE Vulnerability to Deploy Ransomware</a> (Cybersecuritynews)</p><p><a href="https://www.reuters.com/technology/britain-us-set-up-working-group-improve-childrens-online-safety-2024-10-10">Britain, US set up working group to improve children’s online safety</a> (Reuters)</p><p><a href="https://www.bankinfosecurity.com/european-council-adopts-cyber-resilience-act-a-26509">European Council Adopts Cyber Resilience Act</a> (BankInfoSecurity)</p><p><a href="https://www.bankinfosecurity.com/new-york-state-enacts-new-cyber-requirements-for-hospitals-a-26504">New York State Enacts New Cyber Requirements for Hospitals</a> (BankInfoSecurity)</p><p><a href="https://www.theregister.com/2024/10/11/fbi_nexfundai_crypto_fraud_sting/">FBI created a crypto token so it could watch it being abused</a> (The Register)</p><p><a href="https://arstechnica.com/ai/2024/10/man-learns-hes-being-dumped-via-dystopian-ai-summary-of-texts/">Man learns he’s being dumped via “dystopian” AI summary of texts</a> (Ars Technica)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1781</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b211c4a6-b95e-11ee-8cf8-93aa9c739c63]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1100032735.mp3?updated=1728673786" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacked, attacked, and sued.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2167/notes</link>
      <description>The Internet Archive gets breached and DDoSed. Dutch police arrest the alleged proprietors of an illicit online market. Fidelity Investments confirms a data breach. Marriott settles for $52 million over a multi-year data breach. Critical updates from Mozilla, FortiNet, Palo Alto Networks, VMWare, and Apple. Mongolian Skimmer targets Magento installations. On our Industry Voices segment, we speak with Ben April, Chief Technology Officer at Maltego Technologies GMBH, about "Overcoming information overload: Challenges in social media investigations." Bankruptcy pulls back the curtain on a data brokerage firm. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, we speak with Ben April, Chief Technology Officer at Maltego Technologies GMBH, about "Overcoming information overload: Challenges in social media investigations." 

Selected Reading
Internet Archive Breach Exposes 31 Million Users (WIRED)
Dutch cops reveal takedown of 'largest dark web market' 
Fidelity says data breach exposed personal data of 77,000 customers (TechCrunch)
Marriott Agrees $52m Settlement for Massive Data Breach (Infosecurity Magazine)
Mozilla releases patches for actively exploited Firefox bug (The Register)
CISA says critical Fortinet RCE flaw now exploited in attacks (Bleeping Computer)
Palo Alto Warns of Critical Flaw That Let Attackers Takeover Firewalls (Cyber Security News)
VMware NSX Vulnerabilities Allow Hackers To Execute Arbitrary Commands (Cyber Security News)
iTunes Local Privilege Escalation (CVE-2024-44193) Vulnerability Analysis and Exploitation (CYFIRMA) 
The Mongolian Skimmer (Jscrambler)
National Public Data files for bankruptcy after info leak (The Register)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 10 Oct 2024 20:10:00 -0000</pubDate>
      <itunes:title>Hacked, attacked, and sued.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2167</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The Internet Archive gets breached and DDoSed. Dutch police arrest the alleged proprietors of an illicit online market. Fidelity Investments confirms a data breach. Marriott settles for $52 million over a multi-year data breach. Critical updates from Mozilla, FortiNet, Palo Alto Networks, VMWare, and Apple. Mongolian Skimmer targets Magento installations. On our Industry Voices segment, we speak with Ben April, Chief Technology Officer at Maltego Technologies GMBH, about "Overcoming information overload: Challenges in social media investigations." Bankruptcy pulls back the curtain on a data brokerage firm. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, we speak with Ben April, Chief Technology Officer at Maltego Technologies GMBH, about "Overcoming information overload: Challenges in social media investigations." 

Selected Reading
Internet Archive Breach Exposes 31 Million Users (WIRED)
Dutch cops reveal takedown of 'largest dark web market' 
Fidelity says data breach exposed personal data of 77,000 customers (TechCrunch)
Marriott Agrees $52m Settlement for Massive Data Breach (Infosecurity Magazine)
Mozilla releases patches for actively exploited Firefox bug (The Register)
CISA says critical Fortinet RCE flaw now exploited in attacks (Bleeping Computer)
Palo Alto Warns of Critical Flaw That Let Attackers Takeover Firewalls (Cyber Security News)
VMware NSX Vulnerabilities Allow Hackers To Execute Arbitrary Commands (Cyber Security News)
iTunes Local Privilege Escalation (CVE-2024-44193) Vulnerability Analysis and Exploitation (CYFIRMA) 
The Mongolian Skimmer (Jscrambler)
National Public Data files for bankruptcy after info leak (The Register)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Internet Archive gets breached and DDoSed. Dutch police arrest the alleged proprietors of an illicit online market. Fidelity Investments confirms a data breach. Marriott settles for $52 million over a multi-year data breach. Critical updates from Mozilla, FortiNet, Palo Alto Networks, VMWare, and Apple. Mongolian Skimmer targets Magento installations. On our Industry Voices segment, we speak with Ben April, Chief Technology Officer at Maltego Technologies GMBH, about "Overcoming information overload: Challenges in social media investigations." Bankruptcy pulls back the curtain on a data brokerage firm. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Voices segment, we speak with <a href="https://www.linkedin.com/in/bapril/">Ben April</a>, Chief Technology Officer at <a href="https://www.maltego.com/?utm_source=podcast&amp;utm_medium=cyberwire&amp;utm_campaign=partnership&amp;utm_content=cyberwire-interview">Maltego Technologies GMBH</a>, about "Overcoming information overload: Challenges in social media investigations." </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.wired.com/story/internet-archive-hacked/">Internet Archive Breach Exposes 31 Million Users</a> (WIRED)</p><p><a href="https://www.theregister.com/2024/10/10/cannabia_bohemia_darkweb_market_investigation/">Dutch cops reveal takedown of 'largest dark web market'</a> </p><p><a href="https://techcrunch.com/2024/10/10/fidelity-says-data-breach-exposed-personal-data-of-77000-customers/">Fidelity says data breach exposed personal data of 77,000 customers</a> (TechCrunch)</p><p><a href="https://www.infosecurity-magazine.com/news/marriott-settlement-massive-data/">Marriott Agrees $52m Settlement for Massive Data Breach</a> (Infosecurity Magazine)</p><p><a href="https://www.theregister.com/2024/10/10/firefixed_mozilla_patches_critical_firefox/">Mozilla releases patches for actively exploited Firefox bug</a> (The Register)</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-says-critical-fortinet-rce-flaw-now-exploited-in-attacks/">CISA says critical Fortinet RCE flaw now exploited in attacks</a> (Bleeping Computer)</p><p><a href="https://cybersecuritynews.com/pan-os-firewall-takeover-flaw/">Palo Alto Warns of Critical Flaw That Let Attackers Takeover Firewalls</a> (Cyber Security News)</p><p><a href="https://cybersecuritynews.com/vmware-nsx-hacks/">VMware NSX Vulnerabilities Allow Hackers To Execute Arbitrary Commands</a> (Cyber Security News)</p><p><a href="https://www.cyfirma.com/research/itunes-local-privilege-escalation-cve-2024-44193-vulnerability-analysis-and-exploitation/">iTunes Local Privilege Escalation (CVE-2024-44193) Vulnerability Analysis and Exploitation</a> (CYFIRMA) </p><p><a href="https://jscrambler.com/blog/the-mongolian-skimmer">The Mongolian Skimmer</a> (Jscrambler)</p><p><a href="https://www.theregister.com/2024/10/09/national_public_data_bankrupt/">National Public Data files for bankruptcy after info leak</a> (The Register)</p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1689</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b1d8eb5e-b95e-11ee-8cf8-ff951d5cb08d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2578652809.mp3?updated=1728585298" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Attacks amidst anniversaries.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2166/notes</link>
      <description>Hackers target Russia’s court information system. Patch Tuesday rundown. GoldenJackal targets government and diplomatic entities in Europe, the Middle East, and South Asia.Cybercriminals are exploiting Florida’s disaster relief efforts. Australia introduced its first standalone cybersecurity law. CISA and the FBI issue guidance against Iranian threat actors. Mamba 2FA targets Microsoft 365 accounts. Casio reports a data breach. On our Solution Spotlight, Simone Petrella speaks with Andy Woolnough from ISC2's about their 2024 Cybersecurity Workforce Study.  Keeping the AI slop off Wikipedia. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight today, our guest is Andy Woolnough, ISC2's Executive Vice President Corporate Affairs Executive Vice President Corporate Affairs. Andy shares a first look at ISC2's 2024 Cybersecurity Workforce Study with N2K's Simone Petrella. You can catch Simone and Andy’s full conversation on Monday, October 14th in our CyberWire Daily feed. That is also the day the ISC2 Security Congress 2024 kicks off. You can find out more about the event that has a virtual option here.  

Selected Reading
For a second day, Ukrainian hackers hit Russian institutions (Washington Post)
Microsoft October 2024 Patch Tuesday fixes 5 zero-days, 118 flaws (Bleeping Computer)
GoldenJackal APT Group Breached Air-Gapped European Government Systems (The Cyber Express)
Scammers Hit Florida Hurricane Victims with Fake FEMA Claims, Malware Files (Hackread)
Australia Introduces First Standalone Cybersecurity Law (Infosecurity Magazine)
CISA Issues Guidance to Counter Iran's Election Interference (BankInfo Security)
New Mamba 2FA bypass service targets Microsoft 365 accounts (Bleeping Computer)
Casio says recent cyberattack 'caused system failure' (The Record)
The Editors Protecting Wikipedia from AI Hoaxes (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 09 Oct 2024 20:10:00 -0000</pubDate>
      <itunes:title>Attacks amidst anniversaries.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2166</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b1a14a8c-b95e-11ee-8cf8-9b384ead12af/image/7d86b799af003eb0ecfeba5070fb924f.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Hackers target Russia’s court information system. Patch Tuesday rundown. GoldenJackal targets government and diplomatic entities in Europe, the Middle East, and South Asia.Cybercriminals are exploiting Florida’s disaster relief efforts. Australia introduced its first standalone cybersecurity law. CISA and the FBI issue guidance against Iranian threat actors. Mamba 2FA targets Microsoft 365 accounts. Casio reports a data breach. On our Solution Spotlight, Simone Petrella speaks with Andy Woolnough from ISC2's about their 2024 Cybersecurity Workforce Study.  Keeping the AI slop off Wikipedia. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight today, our guest is Andy Woolnough, ISC2's Executive Vice President Corporate Affairs Executive Vice President Corporate Affairs. Andy shares a first look at ISC2's 2024 Cybersecurity Workforce Study with N2K's Simone Petrella. You can catch Simone and Andy’s full conversation on Monday, October 14th in our CyberWire Daily feed. That is also the day the ISC2 Security Congress 2024 kicks off. You can find out more about the event that has a virtual option here.  

Selected Reading
For a second day, Ukrainian hackers hit Russian institutions (Washington Post)
Microsoft October 2024 Patch Tuesday fixes 5 zero-days, 118 flaws (Bleeping Computer)
GoldenJackal APT Group Breached Air-Gapped European Government Systems (The Cyber Express)
Scammers Hit Florida Hurricane Victims with Fake FEMA Claims, Malware Files (Hackread)
Australia Introduces First Standalone Cybersecurity Law (Infosecurity Magazine)
CISA Issues Guidance to Counter Iran's Election Interference (BankInfo Security)
New Mamba 2FA bypass service targets Microsoft 365 accounts (Bleeping Computer)
Casio says recent cyberattack 'caused system failure' (The Record)
The Editors Protecting Wikipedia from AI Hoaxes (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hackers target Russia’s court information system. Patch Tuesday rundown. GoldenJackal targets government and diplomatic entities in Europe, the Middle East, and South Asia.Cybercriminals are exploiting Florida’s disaster relief efforts. Australia introduced its first standalone cybersecurity law. CISA and the FBI issue guidance against Iranian threat actors. Mamba 2FA targets Microsoft 365 accounts. Casio reports a data breach. On our Solution Spotlight, Simone Petrella speaks with Andy Woolnough from ISC2's about their 2024 Cybersecurity Workforce Study.  Keeping the AI slop off Wikipedia.<strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Solution Spotlight today, our guest is <a href="https://www.linkedin.com/in/andy-woolnough/">Andy Woolnough</a>, <a href="https://www.isc2.org/">ISC2</a>'s Executive Vice President Corporate Affairs Executive Vice President Corporate Affairs. Andy shares a <a href="https://www.isc2.org/Insights/2024/09/Employers-Must-Act-Cybersecurity-Workforce-Growth-Stalls-as-Skills-Gaps-Widen">first look at ISC2's 2024 Cybersecurity Workforce Study</a> with <a href="https://www.n2k.com/">N2K</a>'s <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a>. You can catch Simone and Andy’s full conversation on Monday, October 14th in our CyberWire Daily feed. That is also the day the ISC2 Security Congress 2024 kicks off. You can find out more about the event that has a virtual option <a href="https://web.cvent.com/event/a5c15481-492d-4efa-bd79-a521ab73b699/websitePage:26a84091-6c86-411e-9e16-6613ec20a219">here</a>.  </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.washingtonpost.com/world/2024/10/08/russia-ukraine-hack-vgtrk-courts/">For a second day, Ukrainian hackers hit Russian institutions</a> (Washington Post)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-october-2024-patch-tuesday-fixes-5-zero-days-118-flaws">Microsoft October 2024 Patch Tuesday fixes 5 zero-days, 118 flaws</a> (Bleeping Computer)</p><p><a href="https://thecyberexpress.com/goldenjackal-apt-group-breached-air-gapped/">GoldenJackal APT Group Breached Air-Gapped European Government Systems</a> (The Cyber Express)</p><p><a href="https://hackread.com/scammers-florida-hurricane-victim-fake-fema-malware/">Scammers Hit Florida Hurricane Victims with Fake FEMA Claims, Malware Files</a> (Hackread)</p><p><a href="https://www.infosecurity-magazine.com/news/australia-introduces-cybersecurity/">Australia Introduces First Standalone Cybersecurity Law</a> (Infosecurity Magazine)</p><p><a href="https://www.bankinfosecurity.com/cisa-issues-guidance-to-counter-irans-election-interference-a-26481">CISA Issues Guidance to Counter Iran's Election Interference</a> (BankInfo Security)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-mamba-2fa-bypass-service-targets-microsoft-365-accounts/">New Mamba 2FA bypass service targets Microsoft 365 accounts</a> (Bleeping Computer)</p><p><a href="https://therecord.media/casio-cyberattack-system-failure">Casio says recent cyberattack 'caused system failure'</a> (The Record)</p><p><a href="https://www.404media.co/the-editors-protecting-wikipedia-from-ai-hoaxes/">The Editors Protecting Wikipedia from AI Hoaxes</a> (404 Media)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1820</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b1a14a8c-b95e-11ee-8cf8-9b384ead12af]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6537597500.mp3?updated=1728500313" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Election Propaganda: Part 2: Modern propaganda efforts.</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/5574/notes</link>
      <description>In preparation for the US 2024 Presidential Election, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses recent international propaganda efforts in the form of nation state interference and influence operations as well as domestic campaigns designed to split the target country into opposing camps. Guests include Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber.

Check out Part 1!
Make sure to check out Election Propaganda Part 1: How Does Election Propaganda Work? In this episode, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that every citizen can take—regardless of political philosophy—to resist the influence of propaganda. This foundational episode is essential for understanding how to navigate the complex landscape of election messaging.

References:
Scott Small, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal Cyber.
Renee DiResta, 2024. Invisible Rulers: The People Who Turn Lies into Reality [Book]. Goodreads. 
Nina Jankowicz, 2020. How to Lose the Information War: Russia, Fake News and the Future of Conflict [Book]. Goodreads.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 09 Oct 2024 06:00:00 -0000</pubDate>
      <itunes:title>Election Propaganda: Part 2: Modern propaganda efforts.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>5574</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>In preparation for the US 2024 Presidential Election, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses recent international propaganda efforts in the form of nation state interference and influence operations as well as domestic campaigns designed to split the target country into opposing camps. Guests include Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber.

Check out Part 1!
Make sure to check out Election Propaganda Part 1: How Does Election Propaganda Work? In this episode, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that every citizen can take—regardless of political philosophy—to resist the influence of propaganda. This foundational episode is essential for understanding how to navigate the complex landscape of election messaging.

References:
Scott Small, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal Cyber.
Renee DiResta, 2024. Invisible Rulers: The People Who Turn Lies into Reality [Book]. Goodreads. 
Nina Jankowicz, 2020. How to Lose the Information War: Russia, Fake News and the Future of Conflict [Book]. Goodreads.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In preparation for the US 2024 Presidential Election, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses recent international propaganda efforts in the form of nation state interference and influence operations as well as domestic campaigns designed to split the target country into opposing camps. Guests include Nina Jankowicz, Co-Founder and CEO of the The American Sunlight Project and Scott Small, Director of Cyber Threat Intelligence at Tidal Cyber.</p><p><br></p><h2>Check out Part 1!</h2><p>Make sure to check out <a href="https://thecyberwire.com/podcasts/cso-perspectives-public/5573/notes">Election Propaganda Part 1: How Does Election Propaganda Work?</a> In this episode, Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that every citizen can take—regardless of political philosophy—to resist the influence of propaganda. This foundational episode is essential for understanding how to navigate the complex landscape of election messaging.</p><p><br></p><h2>References:</h2><p><a href="https://www.tidalcyber.com/election-cyber-interference-threats-and-defenses">Scott Small, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal Cyber.</a></p><p><a href="https://www.goodreads.com/book/show/199372835-invisible-rulers">Renee DiResta, 2024. Invisible Rulers: The People Who Turn Lies into Reality [Book]. Goodreads.</a> </p><p><a href="https://www.goodreads.com/book/show/52382865-how-to-lose-the-information-war">Nina Jankowicz, 2020. How to Lose the Information War: Russia, Fake News and the Future of Conflict [Book]. Goodreads.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2986</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6123bbf0-859e-11ef-939a-3b1a04bad279]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2894890267.mp3?updated=1728504052" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Key player unmasked in global ransomware takedown.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2165/notes</link>
      <description>Western authorities I.D. a key member of Evil Corp. A major U.S. water utility suffers a cyberattack. ODNI warns of influence campaigns targeting presidential and congressional races. A California deepfakes law gets blocked. Europol leads a global effort against human trafficking. Trinity ransomware targets the healthcare industry. Qualcomm patches a critical zero-day in its DSP service. ADT discloses a breach of encrypted employee data. North Korean hackers use stealthy Powershell exploits. On our Threat Vector segment, David Moulton and his guests tackle the pressing challenges of securing Operational Technology (OT) environments.  Machine Learning pioneers win the Nobel Prize. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
In this segment of Threat Vector, David Moulton, Director of Thought Leadership at Palo Alto Networks, hosts cybersecurity experts Qiang Huang Chung hwang, Palo Alto Networks VP of Product Management for Cloud Delivered Security Services, and Michela Menting, Senior Research Director in Digital Security at ABI Research, discuss the pressing challenges of securing Operational Technology (OT) environments. 
Join us each Thursday for a new episode of Threat Vector on the N2K CyberWire network. To hear David, Michela and Qiang’s full discussion, check it out here. 

Selected Reading
Police unmask Aleksandr Ryzhenkov as Evil Corp member and LockBit affiliate (The Record)
American Water, the largest water utility in US, is targeted by a cyberattack (Associated Press)
US Warns of Foreign Interference in Congressional Races (Infosecurity Magazine)
US Judge Blocks California's Law Curbing Election Deepfakes (BankInfo Security)
Global Police Track Human Traffickers in Online Crackdown (Infosecurity Magazine)
Recently spotted Trinity ransomware spurs federal warning to healthcare industry (The Record)
Qualcomm patches high-severity zero-day exploited in attacks (Bleeping Computer)
ADT says hacker stole encrypted internal employee data after compromising business partner (The Record)
North Korean Hackers Employ PowerShell-Based Malware With Serious Evasion Techniques (Cyber Security News)
‘Godfather of AI’ shares Nobel Prize in physics for work on machine learning (CNN)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Oct 2024 20:10:00 -0000</pubDate>
      <itunes:title>Key player unmasked in global ransomware takedown.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2165</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Western authorities I.D. a key member of Evil Corp. A major U.S. water utility suffers a cyberattack. ODNI warns of influence campaigns targeting presidential and congressional races. A California deepfakes law gets blocked. Europol leads a global effort against human trafficking. Trinity ransomware targets the healthcare industry. Qualcomm patches a critical zero-day in its DSP service. ADT discloses a breach of encrypted employee data. North Korean hackers use stealthy Powershell exploits. On our Threat Vector segment, David Moulton and his guests tackle the pressing challenges of securing Operational Technology (OT) environments.  Machine Learning pioneers win the Nobel Prize. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
In this segment of Threat Vector, David Moulton, Director of Thought Leadership at Palo Alto Networks, hosts cybersecurity experts Qiang Huang Chung hwang, Palo Alto Networks VP of Product Management for Cloud Delivered Security Services, and Michela Menting, Senior Research Director in Digital Security at ABI Research, discuss the pressing challenges of securing Operational Technology (OT) environments. 
Join us each Thursday for a new episode of Threat Vector on the N2K CyberWire network. To hear David, Michela and Qiang’s full discussion, check it out here. 

Selected Reading
Police unmask Aleksandr Ryzhenkov as Evil Corp member and LockBit affiliate (The Record)
American Water, the largest water utility in US, is targeted by a cyberattack (Associated Press)
US Warns of Foreign Interference in Congressional Races (Infosecurity Magazine)
US Judge Blocks California's Law Curbing Election Deepfakes (BankInfo Security)
Global Police Track Human Traffickers in Online Crackdown (Infosecurity Magazine)
Recently spotted Trinity ransomware spurs federal warning to healthcare industry (The Record)
Qualcomm patches high-severity zero-day exploited in attacks (Bleeping Computer)
ADT says hacker stole encrypted internal employee data after compromising business partner (The Record)
North Korean Hackers Employ PowerShell-Based Malware With Serious Evasion Techniques (Cyber Security News)
‘Godfather of AI’ shares Nobel Prize in physics for work on machine learning (CNN)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Western authorities I.D. a key member of Evil Corp. A major U.S. water utility suffers a cyberattack. ODNI warns of influence campaigns targeting presidential and congressional races. A California deepfakes law gets blocked. Europol leads a global effort against human trafficking. Trinity ransomware targets the healthcare industry. Qualcomm patches a critical zero-day in its DSP service. ADT discloses a breach of encrypted employee data. North Korean hackers use stealthy Powershell exploits. On our Threat Vector segment, David Moulton and his guests tackle the pressing challenges of securing Operational Technology (OT) environments.  Machine Learning pioneers win the Nobel Prize.<strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Threat Vector Segment</h2><p>In this segment of <a href="https://thecyberwire.com/podcasts/threat-vector">Threat Vector,</a> <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a>, Director of Thought Leadership at <a href="https://www.paloaltonetworks.com/">Palo Alto Networks</a>, hosts cybersecurity experts <a href="https://www.linkedin.com/in/qianghuang2020/">Qiang Huang</a> Chung hwang, Palo Alto Networks VP of Product Management for Cloud Delivered Security Services, and <a href="https://www.linkedin.com/in/michelamenting/">Michela Menting</a>, Senior Research Director in Digital Security at <a href="https://www.abiresearch.com/">ABI Research</a>, discuss the pressing challenges of securing Operational Technology (OT) environments. </p><p>Join us each Thursday for a new episode of Threat Vector on the N2K CyberWire network. To hear David, Michela and Qiang’s full discussion, check it out <a href="https://thecyberwire.com/podcasts/threat-vector/37/notes">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/evil-corp-cybercrime-lockbit-russia-aleksandr-ryzhenkov">Police unmask Aleksandr Ryzhenkov as Evil Corp member and LockBit affiliate</a> (The Record)</p><p><a href="https://apnews.com/article/american-water-cyberattack-36423062dbce05c9aa70ef8aa07810cb">American Water, the largest water utility in US, is targeted by a cyberattack</a> (Associated Press)</p><p><a href="https://www.infosecurity-magazine.com/news/us-foreign-interference-congress/">US Warns of Foreign Interference in Congressional Races</a> (Infosecurity Magazine)</p><p><a href="https://www.bankinfosecurity.com/us-judge-blocks-californias-law-curbing-election-deepfakes-a-26467">US Judge Blocks California's Law Curbing Election Deepfakes</a> (BankInfo Security)</p><p><a href="https://www.infosecurity-magazine.com/news/global-police-human-traffickers/">Global Police Track Human Traffickers in Online Crackdown</a> (Infosecurity Magazine)</p><p><a href="https://therecord.media/trinity-ransomware-alert-healthcare-industry-hhs-cyber-center">Recently spotted Trinity ransomware spurs federal warning to healthcare industry</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/qualcomm-patches-high-severity-zero-day-exploited-in-attacks/">Qualcomm patches high-severity zero-day exploited in attacks</a> (Bleeping Computer)</p><p><a href="https://therecord.media/adt-hacker-stole-encrypted-data-after-breaching-third-party">ADT says hacker stole encrypted internal employee data after compromising business partner</a> (The Record)</p><p><a href="https://cybersecuritynews.com/hackers-employ-powershell-malware/">North Korean Hackers Employ PowerShell-Based Malware With Serious Evasion Techniques</a> (Cyber Security News)</p><p><a href="https://www.cnn.com/2024/10/08/science/nobel-prize-physics-hopfield-hinton-machine-learning-intl/index.html">‘Godfather of AI’ shares Nobel Prize in physics for work on machine learning</a> (CNN)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1682</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b1697512-b95e-11ee-8cf8-db61b8c3454e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2953238309.mp3?updated=1728412589" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tapped and trapped.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2164/notes</link>
      <description>Chinese hackers breach U.S. telecom wiretap systems. A third-party debt collection provider exposes sensitive information of Comcast customers. Homeland Security’s cybercrime division chronicles their success. Google removes Kaspersky antivirus from the Play store. Ukrainian hackers take down Russian TV and Radio channels. A crypto-thief pleads guilty to wire fraud and money laundering. A pig-butchering victim gets his money back. On our Industry Voices segment, Jeff Reed, Chief Product Officer at Vectra AI, joins us to talk about how modern attackers don't hack in, they log in. AI knows - the truth is out there. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, Jeff Reed, Chief Product Officer at Vectra AI, joins us to talk about how modern attackers don't hack in, they log in.

Selected Reading
Chinese hackers breached US court wiretap systems, WSJ reports (Reuters)
Comcast says customer data stolen in ransomware attack on debt collection agency (TechCrunch)
Cyber Cops Stopped 500 Ransomware Hacks Since 2021, DHS Says (Bloomberg)
Google removes Kaspersky's antivirus software from Play Store (Bleeping Computer)
Ukraine Claims Cyberattack Blocked Russian State TV Online on Putin’s Birthday (Bloomberg)
Crypto Hacker Pleads Guilty for Stealing Over $37 Million in Cryptocurrency (Cyber Security News)
A victim of a crypto ‘pig butchering’ scam just got his $140,000 back (NPR)
How chatbots can win over crackpots (Fast Company)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 07 Oct 2024 20:10:00 -0000</pubDate>
      <itunes:title>Tapped and trapped.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2164</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Chinese hackers breach U.S. telecom wiretap systems. A third-party debt collection provider exposes sensitive information of Comcast customers. Homeland Security’s cybercrime division chronicles their success. Google removes Kaspersky antivirus from the Play store. Ukrainian hackers take down Russian TV and Radio channels. A crypto-thief pleads guilty to wire fraud and money laundering. A pig-butchering victim gets his money back. On our Industry Voices segment, Jeff Reed, Chief Product Officer at Vectra AI, joins us to talk about how modern attackers don't hack in, they log in. AI knows - the truth is out there. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, Jeff Reed, Chief Product Officer at Vectra AI, joins us to talk about how modern attackers don't hack in, they log in.

Selected Reading
Chinese hackers breached US court wiretap systems, WSJ reports (Reuters)
Comcast says customer data stolen in ransomware attack on debt collection agency (TechCrunch)
Cyber Cops Stopped 500 Ransomware Hacks Since 2021, DHS Says (Bloomberg)
Google removes Kaspersky's antivirus software from Play Store (Bleeping Computer)
Ukraine Claims Cyberattack Blocked Russian State TV Online on Putin’s Birthday (Bloomberg)
Crypto Hacker Pleads Guilty for Stealing Over $37 Million in Cryptocurrency (Cyber Security News)
A victim of a crypto ‘pig butchering’ scam just got his $140,000 back (NPR)
How chatbots can win over crackpots (Fast Company)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chinese hackers breach U.S. telecom wiretap systems. A third-party debt collection provider exposes sensitive information of Comcast customers. Homeland Security’s cybercrime division chronicles their success. Google removes Kaspersky antivirus from the Play store. Ukrainian hackers take down Russian TV and Radio channels. A crypto-thief pleads guilty to wire fraud and money laundering. A pig-butchering victim gets his money back. On our Industry Voices segment, Jeff Reed, Chief Product Officer at Vectra AI, joins us to talk about how modern attackers don't hack in, they log in. AI knows - the truth is out there. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Voices segment, <a href="https://www.linkedin.com/in/jeffreed4/">Jeff Reed</a>, Chief Product Officer at <a href="https://www.vectra.ai/showme?utm_medium=display&amp;utm_source=cyberwire&amp;utm_campaign=fy24_vectra_awarenesscampaign&amp;utm_content=interview-10.7&amp;utm_term=%7bkeyword%7d">Vectra AI</a>, joins us to talk about how modern attackers don't hack in, they log in.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.reuters.com/technology/cybersecurity/chinese-hackers-breached-us-court-wiretap-systems-wsj-reports-2024-10-06/">Chinese hackers breached US court wiretap systems, WSJ reports</a> (Reuters)</p><p><a href="https://techcrunch.com/2024/10/07/comcast-says-customer-data-stolen-in-ransomware-attack-on-debt-collection-agency/">Comcast says customer data stolen in ransomware attack on debt collection agency</a> (TechCrunch)</p><p><a href="https://www.bloomberg.com/news/newsletters/2024-10-04/cyber-cops-stopped-500-ransomware-hacks-since-2021-dhs-says">Cyber Cops Stopped 500 Ransomware Hacks Since 2021, DHS Says</a> (Bloomberg)</p><p><a href="https://www.bleepingcomputer.com/news/security/google-removes-kasperskys-antivirus-software-from-play-store-disables-developer-accounts/">Google removes Kaspersky's antivirus software from Play Store</a> (Bleeping Computer)</p><p><a href="https://www.bloomberg.com/news/articles/2024-10-07/ukraine-claims-cyberattack-blocked-russian-state-tv-online-on-putin-s-birthday">Ukraine Claims Cyberattack Blocked Russian State TV Online on Putin’s Birthday</a> (Bloomberg)</p><p><a href="https://cybersecuritynews.com/crypto-hacker-pleads-guilty/">Crypto Hacker Pleads Guilty for Stealing Over $37 Million in Cryptocurrency</a> (Cyber Security News)</p><p><a href="https://www.npr.org/2024/10/04/g-s1-26505/spirebit-crypto-pig-butchering-scam-victim-gets-money-back">A victim of a crypto ‘pig butchering’ scam just got his $140,000 back</a> (NPR)</p><p><a href="https://www.fastcompany.com/91203559/how-chatbots-can-win-over-crackpots">How chatbots can win over crackpots</a> (Fast Company)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1699</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b1314f66-b95e-11ee-8cf8-678b1e29bd21]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5055403607.mp3?updated=1728330141" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dr. Jessica Barker: Cybersecurity has a huge people element to it. [Socio-technical] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/36/notes</link>
      <description>Enjoy this encore episode where we are joined by Co-founder and socio-technical lead at Cygenta, Dr. Jessica Barker, as she shares her story from childhood career aspirations of becoming a farmer to her accidental pivot to working in cybersecurity. With a PhD in civic design, Jessica looked at the creation of social and civic places until she was approached by a cybersecurity consultancy interested in the human side of cybersecurity. She jumped in and the rest is history. Having experienced some negativity as a woman in cybersecurity, Jessica is a strong proponent of diversity in the field. She suggests that newcomers to the industry follow what interests them and jump in. And, we thank Jessica for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 06 Oct 2024 07:00:00 -0000</pubDate>
      <itunes:title>Dr. Jessica Barker: Cybersecurity has a huge people element to it. [Socio-technical] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>36</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this encore episode where we are joined by Co-founder and socio-technical lead at Cygenta, Dr. Jessica Barker, as she shares her story from childhood career aspirations of becoming a farmer to her accidental pivot to working in cybersecurity. With a PhD in civic design, Jessica looked at the creation of social and civic places until she was approached by a cybersecurity consultancy interested in the human side of cybersecurity. She jumped in and the rest is history. Having experienced some negativity as a woman in cybersecurity, Jessica is a strong proponent of diversity in the field. She suggests that newcomers to the industry follow what interests them and jump in. And, we thank Jessica for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this encore episode where we are joined by Co-founder and socio-technical lead at Cygenta, Dr. Jessica Barker, as she shares her story from childhood career aspirations of becoming a farmer to her accidental pivot to working in cybersecurity. With a PhD in civic design, Jessica looked at the creation of social and civic places until she was approached by a cybersecurity consultancy interested in the human side of cybersecurity. She jumped in and the rest is history. Having experienced some negativity as a woman in cybersecurity, Jessica is a strong proponent of diversity in the field. She suggests that newcomers to the industry follow what interests them and jump in. And, we thank Jessica for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>460</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cd29cf36-7f79-11ef-8206-dfe871d9b4ca]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4069485018.mp3?updated=1727734959" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Podcast bait, malware switch. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/349/notes</link>
      <description>Joshua Miller from Proofpoint is discussing their work on "Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset." Proofpoint identified Iranian threat actor TA453 targeting a prominent Jewish figure with a fake podcast interview invitation, using a benign email to build trust before sending a malicious link. 
The attack attempted to deliver new malware called BlackSmith, containing a PowerShell trojan dubbed AnvilEcho, designed for intelligence gathering and exfiltration. This malware consolidates all of TA453's known capabilities into a single script rather than the previously used modular approach.
The research can be found here:
Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Oct 2024 07:00:00 -0000</pubDate>
      <itunes:title>Podcast bait, malware switch. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>349</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joshua Miller from Proofpoint is discussing their work on "Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset." Proofpoint identified Iranian threat actor TA453 targeting a prominent Jewish figure with a fake podcast interview invitation, using a benign email to build trust before sending a malicious link. 
The attack attempted to deliver new malware called BlackSmith, containing a PowerShell trojan dubbed AnvilEcho, designed for intelligence gathering and exfiltration. This malware consolidates all of TA453's known capabilities into a single script rather than the previously used modular approach.
The research can be found here:
Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joshua Miller from Proofpoint is discussing their work on "Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset." Proofpoint identified Iranian threat actor TA453 targeting a prominent Jewish figure with a fake podcast interview invitation, using a benign email to build trust before sending a malicious link. </p><p>The attack attempted to deliver new malware called BlackSmith, containing a PowerShell trojan dubbed AnvilEcho, designed for intelligence gathering and exfiltration. This malware consolidates all of TA453's known capabilities into a single script rather than the previously used modular approach.</p><p>The research can be found here:</p><ul><li><a href="https://www.proofpoint.com/us/blog/threat-insight/best-laid-plans-ta453-targets-religious-figure-fake-podcast-invite-delivering">Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1184</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[918859dc-8273-11ef-b988-2b3f3d1d054e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2614264848.mp3?updated=1728062288" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Caught red-handed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2163/notes</link>
      <description>Interpol arrests eight in an international cybercrime crackdown. A MedusaLocker variant targets financial organizations. Cloudflare mitigates a record DDoS attempt. Insights from the Counter Ransomware Initiative summit. Fin7 uses deepnudes as a lure for malware. Researchers discovered critical vulnerabilities in DrayTek routers. CISA issues urgent alerts for products from Synacor and Ivanti. A former election official gets nine years in prison for a voting system data breach. Microsoft and the DOJ seize domains used by Russia’s ColdRiver hacking group. On our Industry Voices segment, we are joined by Eric Olden, Founder and CEO of Strata Identity. to learn how the modern enterprise can orchestrate the 7 A's of identity security to achieve zero trust. Harvard students demonstrate glasses that can see through your privacy. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Industry Voices Segment
On our Industry Voices segment, we are joined by Eric Olden, Founder and CEO of Strata Identity. Eric talks about how the modern enterprise can orchestrate the 7 A's of identity security to achieve zero trust. You can check out Strata’s blog on “Understanding the 7 A’s of IAM” and their book on “Identity Orchestration for Dummies”. 

Selected Reading
International police dismantle cybercrime group in West Africa (The Record)
New MedusaLocker Ransomware Variant Deployed by Threat Actor (Infosecurity Magazine)
Cloudflare Mitigates Record Breaking 3.8 Tbps DDoS Attack (Hackread)
Recently patched CUPS flaw can be used to amplify DDoS attacks (Bleeping Computer)
More frequent disruption operations needed to dent ransomware gangs, officials say (CyberScoop)
FIN7 hackers launch deepfake nude “generator” sites to spread malware (Bleeping Computer)
14 New DrayTek routers' flaws impacts over 700,000 devices in 168 countries (Security Affairs)
CISA Warns Active Exploitation of Zimbra &amp; Ivanti Endpoint Manager Vulnerability (Cyber Security News)
Former Mesa County clerk sentenced to 9 years for 2020 voting system breach (CyberScoop)
Microsoft and DOJ disrupt Russian FSB hackers' attack infrastructure (Bleeping Computer)
Someone Put Facial Recognition Tech onto Meta's Smart Glasses to Instantly Dox Strangers (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 04 Oct 2024 20:10:00 -0000</pubDate>
      <itunes:title>Caught red-handed.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2163</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Interpol arrests eight in an international cybercrime crackdown. A MedusaLocker variant targets financial organizations. Cloudflare mitigates a record DDoS attempt. Insights from the Counter Ransomware Initiative summit. Fin7 uses deepnudes as a lure for malware. Researchers discovered critical vulnerabilities in DrayTek routers. CISA issues urgent alerts for products from Synacor and Ivanti. A former election official gets nine years in prison for a voting system data breach. Microsoft and the DOJ seize domains used by Russia’s ColdRiver hacking group. On our Industry Voices segment, we are joined by Eric Olden, Founder and CEO of Strata Identity. to learn how the modern enterprise can orchestrate the 7 A's of identity security to achieve zero trust. Harvard students demonstrate glasses that can see through your privacy. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Industry Voices Segment
On our Industry Voices segment, we are joined by Eric Olden, Founder and CEO of Strata Identity. Eric talks about how the modern enterprise can orchestrate the 7 A's of identity security to achieve zero trust. You can check out Strata’s blog on “Understanding the 7 A’s of IAM” and their book on “Identity Orchestration for Dummies”. 

Selected Reading
International police dismantle cybercrime group in West Africa (The Record)
New MedusaLocker Ransomware Variant Deployed by Threat Actor (Infosecurity Magazine)
Cloudflare Mitigates Record Breaking 3.8 Tbps DDoS Attack (Hackread)
Recently patched CUPS flaw can be used to amplify DDoS attacks (Bleeping Computer)
More frequent disruption operations needed to dent ransomware gangs, officials say (CyberScoop)
FIN7 hackers launch deepfake nude “generator” sites to spread malware (Bleeping Computer)
14 New DrayTek routers' flaws impacts over 700,000 devices in 168 countries (Security Affairs)
CISA Warns Active Exploitation of Zimbra &amp; Ivanti Endpoint Manager Vulnerability (Cyber Security News)
Former Mesa County clerk sentenced to 9 years for 2020 voting system breach (CyberScoop)
Microsoft and DOJ disrupt Russian FSB hackers' attack infrastructure (Bleeping Computer)
Someone Put Facial Recognition Tech onto Meta's Smart Glasses to Instantly Dox Strangers (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Interpol arrests eight in an international cybercrime crackdown. A MedusaLocker variant targets financial organizations. Cloudflare mitigates a record DDoS attempt. Insights from the Counter Ransomware Initiative summit. Fin7 uses deepnudes as a lure for malware. Researchers discovered critical vulnerabilities in DrayTek routers. CISA issues urgent alerts for products from Synacor and Ivanti. A former election official gets nine years in prison for a voting system data breach. Microsoft and the DOJ seize domains used by Russia’s ColdRiver hacking group. On our Industry Voices segment, we are joined by Eric Olden, Founder and CEO of Strata Identity. to learn how the modern enterprise can orchestrate the 7 A's of identity security to achieve zero trust. Harvard students demonstrate glasses that can see through your privacy. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Industry Voices Segment</h2><p>On our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/boughtnotsold/">Eric Olden</a>, Founder and CEO of <a href="https://www.strata.io/">Strata Identity</a>. Eric talks about how the modern enterprise can orchestrate the 7 A's of identity security to achieve zero trust. You can check out Strata’s blog on “<a href="https://www.strata.io/blog/identity-access-management/understanding-the-7-as-of-iam/?utm_medium=referral&amp;utm_source=cyberwire">Understanding the 7 A’s of IAM</a>” and their book on “<a href="https://www.strata.io/resources/whitepapers/identity-orchestration-for-dummies/?utm_medium=referral&amp;utm_source=cyberwire">Identity Orchestration for Dummies</a>”. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/interpol-west-africa-cybercrime-group-cote-divoire">International police dismantle cybercrime group in West Africa</a> (The Record)</p><p><a href="https://www.infosecurity-magazine.com/news/medusalocker-ransomware-deployed/">New MedusaLocker Ransomware Variant Deployed by Threat Actor</a> (Infosecurity Magazine)</p><p><a href="https://hackread.com/cloudflare-mitigates-record-3-8-tbps-ddos-attack/">Cloudflare Mitigates Record Breaking 3.8 Tbps DDoS Attack</a> (Hackread)</p><p><a href="https://www.bleepingcomputer.com/news/security/recently-patched-cups-flaw-can-be-used-to-amplify-ddos-attacks/">Recently patched CUPS flaw can be used to amplify DDoS attacks</a> (Bleeping Computer)</p><p><a href="https://cyberscoop.com/counter-ransomware-initiative-summit-white-house-odni/">More frequent disruption operations needed to dent ransomware gangs, officials say</a> (CyberScoop)</p><p><a href="https://www.bleepingcomputer.com/news/security/fin7-hackers-launch-deepfake-nude-generator-sites-to-spread-malware/">FIN7 hackers launch deepfake nude “generator” sites to spread malware</a> (Bleeping Computer)</p><p><a href="https://securityaffairs.com/169267/security/draytek-routers-flaws-impacts-700000-devices.html">14 New DrayTek routers' flaws impacts over 700,000 devices in 168 countries</a> (Security Affairs)</p><p><a href="https://cybersecuritynews.com/zimbra-ivanti-endpoint-manager-vulnerability/">CISA Warns Active Exploitation of Zimbra &amp; Ivanti Endpoint Manager Vulnerability</a> (Cyber Security News)</p><p><a href="https://cyberscoop.com/tina-peters-prison-sentence-voting-breach-mesa-county-elections/">Former Mesa County clerk sentenced to 9 years for 2020 voting system breach</a> (CyberScoop)</p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-and-doj-seize-spear-phishing-domains-used-by-star-blizzard-russian-hackers/">Microsoft and DOJ disrupt Russian FSB hackers' attack infrastructure</a> (Bleeping Computer)</p><p><a href="https://www.404media.co/someone-put-facial-recognition-tech-onto-metas-smart-glasses-to-instantly-dox-strangers">Someone Put Facial Recognition Tech onto Meta's Smart Glasses to Instantly Dox Strangers</a> (404 Media)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1959</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b0f8ac6a-b95e-11ee-8cf8-57e110f2f6af]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3287077397.mp3?updated=1728063790" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Global Race for the 21st Century</title>
      <link>https://thecyberwire.com/podcasts/special-edition/75/notes</link>
      <description>In this episode, Dmitri Alperovitch discusses his book World on the Brink: How America Can Beat China in the Race for the Twenty-First Century with host Ben Yelin. Alperovitch highlights the rising tensions between the U.S. and China, focusing on Taiwan as a critical flashpoint that could ignite a new Cold War. He shares insights on the strategies America must adopt to maintain its status as the world’s leading superpower while addressing the challenges posed by China. By examining both strengths and weaknesses, as well as providing a timely blueprint for navigating the complexities of global relations in the 21st century.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 03 Oct 2024 06:00:00 -0000</pubDate>
      <itunes:title>The Global Race for the 21st Century</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>75</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode, Dmitri Alperovitch discusses his book World on the Brink: How America Can Beat China in the Race for the Twenty-First Century with host Ben Yelin. Alperovitch highlights the rising tensions between the U.S. and China, focusing on Taiwan as a critical flashpoint that could ignite a new Cold War. He shares insights on the strategies America must adopt to maintain its status as the world’s leading superpower while addressing the challenges posed by China. By examining both strengths and weaknesses, as well as providing a timely blueprint for navigating the complexities of global relations in the 21st century.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, <a href="https://www.linkedin.com/in/dmitrialperovitch/">Dmitri Alperovitch</a> discusses his book <a href="https://www.amazon.com/World-Brink-America-Twenty-First-Century/dp/B0CFC6HSXS/ref=sr_1_1?crid=20HUZJBLADH4A&amp;dib=eyJ2IjoiMSJ9.WGiXM2LwA-7Qvl3NoWaUZ0BksWmHAL_gRHJYlPk6usEko1wKn3PV0O_azDjEieRmNfu4GmsVuTFnp6Kw5pxPeQ.o-6uBxM5jc8nRjqQDPAHi1KvqY6NV9SJk5xdONrv_v0&amp;dib_tag=se&amp;keywords=Dmitri+Alperovitch&amp;qid=1723146861&amp;sprefix=dmitri+alperovitch%2Caps%2C171&amp;sr=8-1"><em>World on the Brink: How America Can Beat China in the Race for the Twenty-First Century</em></a> with host <a href="https://www.linkedin.com/in/benjamin-yelin-5b14114b/">Ben Yelin</a>. Alperovitch highlights the rising tensions between the U.S. and China, focusing on Taiwan as a critical flashpoint that could ignite a new Cold War. He shares insights on the strategies America must adopt to maintain its status as the world’s leading superpower while addressing the challenges posed by China. By examining both strengths and weaknesses, as well as providing a timely blueprint for navigating the complexities of global relations in the 21st century.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2291</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b8c7401a-7f7d-11ef-88bd-ab6efaf2ce24]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1730877830.mp3?updated=1727835492" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Election Propaganda Part 1: How does election propaganda work?</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/5573/notes</link>
      <description>Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that an average citizen, regardless of political philosophy, can take in order to not succumb to propaganda. 
References:
David Ehl, 2024. Why Meta is now banning Russian propaganda [News]. Deutsche Welle.
Jeff Berman, Renée DiResta, 2023. Disinformation &amp; How To Combat It [Interview]. Youtube. 
Niha Masih, 2024. Meta bans Russian state media outlet RT for acts of ‘foreign interference’ [News]. The Washington Post.
Quentin Hardy, Renée DiResta, 2024. The Invisible Rulers Turning Lies Into Reality [Interview]. YouTube. 
Rob Tracinski, Renée DiResta, 2024.  The Internet Rumor Mill [Interview]. YouTube.
Robin Stern, Marc Brackett, 2024. 5 Ways to Recognize and Avoid Political Gaslighting [Explainer]. The Washington Post.
Sarah Ellison, Amy Gardner, Clara Ence Morse, 2024. Elon Musk’s misleading election claims reach millions and alarm election officials [News]. The Washington Post.
Scott Small, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal Cyber. 
Staff, 2021. Foreign Threats to the 2020 US Federal Elections [Intelligence Community Assessment]. DNI.
Staff, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal.
Stuart A. Thompson, Tiffany Hsu, 2024. Left-Wing Misinformation Is Having a Moment [Analysis. The New York Times. 
Stuart A. Thompson, 2024. Elon Musk’s Week on X: Deepfakes, Falsehoods and Lots of Memes [News]. The New York Times.
Will Oremus, 2024. Zuckerberg expresses regrets over covid misinformation crackdown [News]. The Washington Post.
Yascha Mounk, Renée DiResta, 2022. How (Not) to Fix Social Media [Interview]. YouTube.
Renee DiResta, 2024. Invisible Rulers: The People Who Turn Lies into Reality [Book]. Goodreads. 
Nina Jankowicz, 2020. How to Lose the Information War: Russia, Fake News and the Future of Conflict [Book]. Goodreads.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 02 Oct 2024 06:00:00 -0000</pubDate>
      <itunes:title>Election Propaganda Part 1: How does election propaganda work?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>5573</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that an average citizen, regardless of political philosophy, can take in order to not succumb to propaganda. 
References:
David Ehl, 2024. Why Meta is now banning Russian propaganda [News]. Deutsche Welle.
Jeff Berman, Renée DiResta, 2023. Disinformation &amp; How To Combat It [Interview]. Youtube. 
Niha Masih, 2024. Meta bans Russian state media outlet RT for acts of ‘foreign interference’ [News]. The Washington Post.
Quentin Hardy, Renée DiResta, 2024. The Invisible Rulers Turning Lies Into Reality [Interview]. YouTube. 
Rob Tracinski, Renée DiResta, 2024.  The Internet Rumor Mill [Interview]. YouTube.
Robin Stern, Marc Brackett, 2024. 5 Ways to Recognize and Avoid Political Gaslighting [Explainer]. The Washington Post.
Sarah Ellison, Amy Gardner, Clara Ence Morse, 2024. Elon Musk’s misleading election claims reach millions and alarm election officials [News]. The Washington Post.
Scott Small, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal Cyber. 
Staff, 2021. Foreign Threats to the 2020 US Federal Elections [Intelligence Community Assessment]. DNI.
Staff, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal.
Stuart A. Thompson, Tiffany Hsu, 2024. Left-Wing Misinformation Is Having a Moment [Analysis. The New York Times. 
Stuart A. Thompson, 2024. Elon Musk’s Week on X: Deepfakes, Falsehoods and Lots of Memes [News]. The New York Times.
Will Oremus, 2024. Zuckerberg expresses regrets over covid misinformation crackdown [News]. The Washington Post.
Yascha Mounk, Renée DiResta, 2022. How (Not) to Fix Social Media [Interview]. YouTube.
Renee DiResta, 2024. Invisible Rulers: The People Who Turn Lies into Reality [Book]. Goodreads. 
Nina Jankowicz, 2020. How to Lose the Information War: Russia, Fake News and the Future of Conflict [Book]. Goodreads.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses personal defensive measures that an average citizen, regardless of political philosophy, can take in order to not succumb to propaganda. </p><h2>References:</h2><p><a href="https://www.dw.com/en/why-meta-is-now-banning-russian-propaganda/a-70290904">David Ehl, 2024. Why Meta is now banning Russian propaganda [News]. Deutsche Welle.</a></p><p><a href="https://www.youtube.com/watch?v=YG_qFv83gpA">Jeff Berman, Renée DiResta, 2023. Disinformation &amp; How To Combat It [Interview]. Youtube. </a></p><p><a href="https://www.washingtonpost.com/technology/2024/09/17/meta-ban-rt-russia-state-media">Niha Masih, 2024. Meta bans Russian state media outlet RT for acts of ‘foreign interference’ [News]. The Washington Post.</a></p><p><a href="https://www.youtube.com/watch?v=Ad2gjdN_k5Y">Quentin Hardy, Renée DiResta, 2024. The Invisible Rulers Turning Lies Into Reality [Interview]. YouTube. </a></p><p><a href="https://www.youtube.com/watch?v=WIeNusUarhE">Rob Tracinski, Renée DiResta, 2024.  The Internet Rumor Mill [Interview]. YouTube.</a></p><p><a href="https://www.washingtonpost.com/wellness/2024/09/10/political-gaslighting-comic/">Robin Stern, Marc Brackett, 2024. 5 Ways to Recognize and Avoid Political Gaslighting [Explainer]. The Washington Post.</a></p><p><a href="https://www.washingtonpost.com/politics/2024/09/10/elon-musk-illegal-immigrant-voting-misinformation/">Sarah Ellison, Amy Gardner, Clara Ence Morse, 2024. Elon Musk’s misleading election claims reach millions and alarm election officials [News]. The Washington Post.</a></p><p><a href="https://www.tidalcyber.com/election-cyber-interference-threats-and-defenses">Scott Small, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal Cyber. </a></p><p><a href="https://www.dni.gov/files/ODNI/documents/assessments/ICA-declass-16MAR21.pdf">Staff, 2021. Foreign Threats to the 2020 US Federal Elections [Intelligence Community Assessment]. DNI.</a></p><p><a href="https://www.tidalcyber.com/election-cyber-interference-threats-and-defenses">Staff, 2024. Election Cyber Interference Threats &amp; Defenses: A Data-Driven Study [White Paper]. Tidal.</a></p><p><a href="https://www.nytimes.com/2024/09/03/technology/left-wing-misinformation-conspiracy-theories.html">Stuart A. Thompson, Tiffany Hsu, 2024. Left-Wing Misinformation Is Having a Moment [Analysis. The New York Times. </a></p><p><a href="https://www.nytimes.com/2024/09/27/technology/elon-musk-x-posts.html">Stuart A. Thompson, 2024. Elon Musk’s Week on X: Deepfakes, Falsehoods and Lots of Memes [News]. The New York Times.</a></p><p><a href="https://www.washingtonpost.com/technology/2024/08/27/meta-zuckerberg-covid-misinformation-jordan-white-house/">Will Oremus, 2024. Zuckerberg expresses regrets over covid misinformation crackdown [News]. The Washington Post.</a></p><p><a href="https://www.youtube.com/watch?v=Qouv-mfAAbI">Yascha Mounk, Renée DiResta, 2022. How (Not) to Fix Social Media [Interview]. YouTube.</a></p><p><a href="https://www.goodreads.com/book/show/199372835-invisible-rulers">Renee DiResta, 2024. Invisible Rulers: The People Who Turn Lies into Reality [Book]. Goodreads. </a></p><p><a href="https://www.goodreads.com/book/show/52382865-how-to-lose-the-information-war">Nina Jankowicz, 2020. How to Lose the Information War: Russia, Fake News and the Future of Conflict [Book]. Goodreads.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1972</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8a970510-7f80-11ef-b3fd-fff6f9be7c30]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8903843200.mp3?updated=1727806804" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Breaking news blocked. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2162/notes</link>
      <description>A global news agency suffers a cyberattack. CISA and the FBI provide guidance on cross site scripting attacks. A Texas health system diverts patients following a ransomware attack. Western Digital patches a critical vulnerability in network attached storage devices. California passes a law protecting domestic abuse survivors from being tracked. Verizon and PlayStation each suffer outages. CISA responds to critiques from the OIG. T-Mobile settles with the FCC over multiple data breaches. The DOJ indicts a Minnesota man on charges of selling counterfeit software license keys. On our Industry Voices segment kicking off Cybersecurity Awareness Month, we are joined by Chad Raduege, Executive Director of the Oklahoma Cyber Innovation Institute at The University of Tulsa, discussing the Institute’s K-12 outreach initiatives.  A Crypto Criminal Stretches His Limits—And His Legs.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Industry Voices Segment
On our Industry Voices segment kicks off Cybersecurity Awareness Month, we are joined by Chad Raduege, Executive Director of the Oklahoma Cyber Innovation Institute at The University of Tulsa, discussing the Institute’s K-12 outreach initiatives. 

Selected Reading
AFP News Agency's Content Delivery Systems Hit by Cyberattack (Hackread)
CISA and FBI Issue Alert on XSS Vulnerabilities (Security Boulevard)
UMC Health System Diverts Patients Following Ransomware Attack (SecurityWeek)
Western Digital My Cloud Devices Flaw Let Attackers Execute Arbitrary Code (CyberSecurity News)
California passes car data privacy law to protect domestic abuse survivors (The Record)
The Playstation Network is down in a global outage (Bleeping Computer)
Verizon Mobile Outages Reported Across the U.S. (The New York Times)
DoJ audit finds CISA faces challenges in cyber threat information sharing, as participation hits record low (Industrial Cyber)
T-Mobile pays $31.5 million FCC settlement over 4 data breaches (Bleeping Computer)
Man charged for selling forged license keys for network switches (Bleeping Computer)
Crooked Cops, Stolen Laptops &amp; the Ghost of UGNazi (Krebs on Security)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Oct 2024 20:10:00 -0000</pubDate>
      <itunes:title>Breaking news blocked. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2162</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A global news agency suffers a cyberattack. CISA and the FBI provide guidance on cross site scripting attacks. A Texas health system diverts patients following a ransomware attack. Western Digital patches a critical vulnerability in network attached storage devices. California passes a law protecting domestic abuse survivors from being tracked. Verizon and PlayStation each suffer outages. CISA responds to critiques from the OIG. T-Mobile settles with the FCC over multiple data breaches. The DOJ indicts a Minnesota man on charges of selling counterfeit software license keys. On our Industry Voices segment kicking off Cybersecurity Awareness Month, we are joined by Chad Raduege, Executive Director of the Oklahoma Cyber Innovation Institute at The University of Tulsa, discussing the Institute’s K-12 outreach initiatives.  A Crypto Criminal Stretches His Limits—And His Legs.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Industry Voices Segment
On our Industry Voices segment kicks off Cybersecurity Awareness Month, we are joined by Chad Raduege, Executive Director of the Oklahoma Cyber Innovation Institute at The University of Tulsa, discussing the Institute’s K-12 outreach initiatives. 

Selected Reading
AFP News Agency's Content Delivery Systems Hit by Cyberattack (Hackread)
CISA and FBI Issue Alert on XSS Vulnerabilities (Security Boulevard)
UMC Health System Diverts Patients Following Ransomware Attack (SecurityWeek)
Western Digital My Cloud Devices Flaw Let Attackers Execute Arbitrary Code (CyberSecurity News)
California passes car data privacy law to protect domestic abuse survivors (The Record)
The Playstation Network is down in a global outage (Bleeping Computer)
Verizon Mobile Outages Reported Across the U.S. (The New York Times)
DoJ audit finds CISA faces challenges in cyber threat information sharing, as participation hits record low (Industrial Cyber)
T-Mobile pays $31.5 million FCC settlement over 4 data breaches (Bleeping Computer)
Man charged for selling forged license keys for network switches (Bleeping Computer)
Crooked Cops, Stolen Laptops &amp; the Ghost of UGNazi (Krebs on Security)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A global news agency suffers a cyberattack. CISA and the FBI provide guidance on cross site scripting attacks. A Texas health system diverts patients following a ransomware attack. Western Digital patches a critical vulnerability in network attached storage devices. California passes a law protecting domestic abuse survivors from being tracked. Verizon and PlayStation each suffer outages. CISA responds to critiques from the OIG. T-Mobile settles with the FCC over multiple data breaches. The DOJ indicts a Minnesota man on charges of selling counterfeit software license keys. On our Industry Voices segment kicking off Cybersecurity Awareness Month, we are joined by Chad Raduege, Executive Director of the Oklahoma Cyber Innovation Institute at The University of Tulsa, discussing the Institute’s K-12 outreach initiatives.  A Crypto Criminal Stretches His Limits—And His Legs.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Industry Voices Segment</h2><p>On our Industry Voices segment kicks off <a href="https://www.cisa.gov/cybersecurity-awareness-month">Cybersecurity Awareness Month</a>, we are joined by <a href="https://www.linkedin.com/in/chad-raduege/">Chad Raduege</a>, Executive Director of the <a href="https://utulsa.edu/research/ocii/">Oklahoma Cyber Innovation Institute at The University of Tulsa</a>, discussing the Institute’s K-12 outreach initiatives. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://hackread.com/afp-news-agency-content-delivery-systems-cyberattack/">AFP News Agency's Content Delivery Systems Hit by Cyberattack</a> (Hackread)</p><p><a href="https://securityboulevard.com/2024/10/cisa-and-fbi-issue-alert-on-xss-vulnerabilities/">CISA and FBI Issue Alert on XSS Vulnerabilities </a>(Security Boulevard)</p><p><a href="https://www.securityweek.com/umc-health-system-diverts-patients-following-ransomware-attack/">UMC Health System Diverts Patients Following Ransomware Attack</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/western-digital-my-cloud-flaw/">Western Digital My Cloud Devices Flaw Let Attackers Execute Arbitrary Code</a> (CyberSecurity News)</p><p><a href="https://therecord.media/california-car-data-privacy-law-domestic-abuse-tracking">California passes car data privacy law to protect domestic abuse survivors</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/gaming/the-playstation-network-is-down-in-a-global-outage/">The Playstation Network is down in a global outage</a> (Bleeping Computer)</p><p><a href="https://www.nytimes.com/2024/09/30/business/verizon-mobile-outages-us.html">Verizon Mobile Outages Reported Across the U.S.</a> (The New York Times)</p><p><a href="https://industrialcyber.co/reports/doj-audit-finds-cisa-faces-challenges-in-cyber-threat-information-sharing-as-participation-hits-record-low/">DoJ audit finds CISA faces challenges in cyber threat information sharing, as participation hits record low</a> (Industrial Cyber)</p><p><a href="https://www.bleepingcomputer.com/news/security/t-mobile-pays-315-million-fcc-settlement-over-4-data-breaches/">T-Mobile pays $31.5 million FCC settlement over 4 data breaches</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/legal/man-charged-for-selling-forged-license-keys-for-network-switches/">Man charged for selling forged license keys for network switches</a> (Bleeping Computer)</p><p><a href="https://krebsonsecurity.com/2024/09/crooked-cops-stolen-laptops-the-ghost-of-ugnazi/">Crooked Cops, Stolen Laptops &amp; the Ghost of UGNazi</a> (Krebs on Security)</p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1827</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b04eb5c0-b95e-11ee-8cf8-ab9ee8897acf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4422059834.mp3?updated=1727835744" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Escape from GPU island.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2161/notes</link>
      <description>A critical vulnerability has been discovered in the NVIDIA Container Toolkit. Representatives from around the world are meeting in Washington to address ransomware.  The Pentagon shoots down the notion of a separate cyber service. A genetic testing company leaves sensitive information in an unsecured folder. A public accounting firm breach affects 127,000 individuals. The DOJ charges a British national with hacking U.S. companies. California’s Governor vetoes an AI safety bill. CISOs deserve a seat at the table. Tim Starks from CyberScoop describes the House Homeland Security chair’s proposed cyber workforce bill. Password laziness leaves routers vulnerable. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Tim Starks from CyberScoop talking about the House Homeland Security chair releasing and pushing forth a cyber workforce bill. Read more in Tim’s article. 

Selected Reading
Critical flaw in NVIDIA Container Toolkit allows full host takeover (Bleeping Computer)
Here's what to expect from the Counter Ransomware Initiative meeting this week (The Record)
Pentagon asks lawmakers to kill third-party look at an independent cyber force (Breaking Defense)
Facial DNA provider leaks biometric data via WordPress folder (Hackread)
Accounting Firm WMDDH Discloses Data Breach Impacting 127,000 (SecurityWeek)
British National Arrested, Charged for Hacking US Companies (SecurityWeek)
California Gov. Newsom Vetoes Hotly Debated AI Safety Bill (BankInfo Security)
PwC Urges Boards to Give CISOs a Seat at the Table (Infosecurity Magazine)
New Critical Password Warning—86% Of All Router Users Need To Act Now (Forbes)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 30 Sep 2024 20:10:00 -0000</pubDate>
      <itunes:title>Escape from GPU island.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2161</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A critical vulnerability has been discovered in the NVIDIA Container Toolkit. Representatives from around the world are meeting in Washington to address ransomware.  The Pentagon shoots down the notion of a separate cyber service. A genetic testing company leaves sensitive information in an unsecured folder. A public accounting firm breach affects 127,000 individuals. The DOJ charges a British national with hacking U.S. companies. California’s Governor vetoes an AI safety bill. CISOs deserve a seat at the table. Tim Starks from CyberScoop describes the House Homeland Security chair’s proposed cyber workforce bill. Password laziness leaves routers vulnerable. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Tim Starks from CyberScoop talking about the House Homeland Security chair releasing and pushing forth a cyber workforce bill. Read more in Tim’s article. 

Selected Reading
Critical flaw in NVIDIA Container Toolkit allows full host takeover (Bleeping Computer)
Here's what to expect from the Counter Ransomware Initiative meeting this week (The Record)
Pentagon asks lawmakers to kill third-party look at an independent cyber force (Breaking Defense)
Facial DNA provider leaks biometric data via WordPress folder (Hackread)
Accounting Firm WMDDH Discloses Data Breach Impacting 127,000 (SecurityWeek)
British National Arrested, Charged for Hacking US Companies (SecurityWeek)
California Gov. Newsom Vetoes Hotly Debated AI Safety Bill (BankInfo Security)
PwC Urges Boards to Give CISOs a Seat at the Table (Infosecurity Magazine)
New Critical Password Warning—86% Of All Router Users Need To Act Now (Forbes)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A critical vulnerability has been discovered in the NVIDIA Container Toolkit. Representatives from around the world are meeting in Washington to address ransomware.  The Pentagon shoots down the notion of a separate cyber service. A genetic testing company leaves sensitive information in an unsecured folder. A public accounting firm breach affects 127,000 individuals. The DOJ charges a British national with hacking U.S. companies. California’s Governor vetoes an AI safety bill. CISOs deserve a seat at the table. Tim Starks from CyberScoop describes the House Homeland Security chair’s proposed cyber workforce bill. Password laziness leaves routers vulnerable. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/tstarks/">Tim Starks</a> from <a href="https://cyberscoop.com/">CyberScoop</a> talking about the House Homeland Security chair releasing and pushing forth a cyber workforce bill. Read more in Tim’s <a href="https://cyberscoop.com/exclusive-house-homeland-security-chair-releases-pushes-forth-cyber-workforce-bill/">article</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/critical-flaw-in-nvidia-container-toolkit-allows-full-host-takeover/">Critical flaw in NVIDIA Container Toolkit allows full host takeover</a> (Bleeping Computer)</p><p><a href="https://therecord.media/counter-ransomware-initiative-washington-meeting-2024">Here's what to expect from the Counter Ransomware Initiative meeting this week</a> (The Record)</p><p><a href="https://breakingdefense.com/2024/09/pentagon-asks-lawmakers-to-kill-third-party-look-at-an-independent-cyber-force/">Pentagon asks lawmakers to kill third-party look at an independent cyber force</a> (Breaking Defense)</p><p><a href="https://hackread.com/facial-dna-provider-leak-biometric-data-wordpress-folder/">Facial DNA provider leaks biometric data via WordPress folder</a> (Hackread)</p><p><a href="https://www.securityweek.com/accounting-firm-wmddh-discloses-data-breach-impacting-127000/">Accounting Firm WMDDH Discloses Data Breach Impacting 127,000 </a>(SecurityWeek)</p><p><a href="https://www.securityweek.com/british-national-arrested-charged-for-hacking-us-companies/">British National Arrested, Charged for Hacking US Companies</a> (SecurityWeek)</p><p><a href="https://www.bankinfosecurity.com/california-gov-newsom-vetoes-hotly-debated-ai-safety-bill-a-26407">California Gov. Newsom Vetoes Hotly Debated AI Safety Bill</a> (BankInfo Security)</p><p><a href="https://www.infosecurity-magazine.com/news/pwc-boards-cisos-seat-table/">PwC Urges Boards to Give CISOs a Seat at the Table </a>(Infosecurity Magazine)</p><p><a href="https://www.forbes.com/sites/daveywinder/2024/09/30/new-critical-password-warning-86-of-all-router-users-need-to-act-now/">New Critical Password Warning—86% Of All Router Users Need To Act Now</a> (Forbes)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1503</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b0149796-b95e-11ee-8cf8-0b0bec059f7e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8666815248.mp3?updated=1727724845" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Steve Blank, national security, and the dilemma of technology disruption. (Part 2 of 2) [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/74/notes</link>
      <description>In this 2-part special edition series, guest Steve Blank, co-founder of the Gordian Knot Center for National Security Innovation at Stanford University, speaks with N2K's Brandon Karpf about national security and the dilemma of technology disruption.

Listen to part 1 here.

In this series, Steve Blank, a renowned expert in national security innovation, explores the critical challenges facing the U.S. Department of Defense in a rapidly evolving technological landscape. From the rise of global adversaries like China to the bureaucratic obstacles hindering defense innovation, Blank breaks down the “dilemma of technology disruption” in national security. Learn how the U.S. can overcome its outdated systems, accelerate innovation, and prepare for the future of defense technology. Whether you’re interested in defense tech, cybersecurity, or government innovation, this episode offers deep insights into the intersection of national security and technological disruption.

For some background, you can check out Steve’s article “Why Large Organizations Struggle With Disruption, and What to Do About It.”
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 29 Sep 2024 06:00:00 -0000</pubDate>
      <itunes:title>Steve Blank, national security, and the dilemma of technology disruption. (Part 2 of 2) [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>74</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this 2-part special edition series, guest Steve Blank, co-founder of the Gordian Knot Center for National Security Innovation at Stanford University, speaks with N2K's Brandon Karpf about national security and the dilemma of technology disruption.

Listen to part 1 here.

In this series, Steve Blank, a renowned expert in national security innovation, explores the critical challenges facing the U.S. Department of Defense in a rapidly evolving technological landscape. From the rise of global adversaries like China to the bureaucratic obstacles hindering defense innovation, Blank breaks down the “dilemma of technology disruption” in national security. Learn how the U.S. can overcome its outdated systems, accelerate innovation, and prepare for the future of defense technology. Whether you’re interested in defense tech, cybersecurity, or government innovation, this episode offers deep insights into the intersection of national security and technological disruption.

For some background, you can check out Steve’s article “Why Large Organizations Struggle With Disruption, and What to Do About It.”
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this 2-part special edition series, guest <a href="https://www.linkedin.com/in/steveblank/">Steve Blank</a>, co-founder of the <a href="https://gordianknot.stanford.edu/">Gordian Knot Center for National Security Innovation</a> at Stanford University, speaks with <a href="https://www.n2k.com/">N2K</a>'s <a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a> about national security and the dilemma of technology disruption.</p><p><br></p><p>Listen to <a href="https://thecyberwire.com/podcasts/special-edition/73/notes">part 1 here</a>.</p><p><br></p><p>In this series, Steve Blank, a renowned expert in national security innovation, explores the critical challenges facing the U.S. Department of Defense in a rapidly evolving technological landscape. From the rise of global adversaries like China to the bureaucratic obstacles hindering defense innovation, Blank breaks down the “dilemma of technology disruption” in national security. Learn how the U.S. can overcome its outdated systems, accelerate innovation, and prepare for the future of defense technology. Whether you’re interested in defense tech, cybersecurity, or government innovation, this episode offers deep insights into the intersection of national security and technological disruption.</p><p><br></p><p>For some background, you can check out Steve’s article “<a href="https://steveblank.com/2024/07/30/why-large-organizations-struggle-with-disruption-and-what-to-do-about-it/">Why Large Organizations Struggle With Disruption, and What to Do About It</a>.”</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2001</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3ca5996e-7d02-11ef-a47e-f3357f38b4b4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5839011139.mp3?updated=1727719851" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jason Clark: Challenge the way things are done. [Strategy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/35/notes</link>
      <description>Enjoy this encore episode where we are joined by the Chief strategy officer and chief security officer for Netskope, Jason Clark, shares his journey as he challenges the status quo and works to expand diversity in cybersecurity. Jason started his career by breaking the mold and heading to the Air Force rather than his family legacy of Army service. Following his military service, he became a CISO for the New York Times at age 26 and kept building from there. Jason advises, "You should always be seeking out jobs you're actually not qualified for. I think that's how you grow. If you know you could do the job, and you've got half the skills, go for it." Jason aspires to a legacy of increasing diversity in the cybersecurity industry and founded a non-profit to do just that. And, we thank Jason for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Sep 2024 07:10:00 -0000</pubDate>
      <itunes:title>Jason Clark: Challenge the way things are done. [Strategy] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>35</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this encore episode where we are joined by the Chief strategy officer and chief security officer for Netskope, Jason Clark, shares his journey as he challenges the status quo and works to expand diversity in cybersecurity. Jason started his career by breaking the mold and heading to the Air Force rather than his family legacy of Army service. Following his military service, he became a CISO for the New York Times at age 26 and kept building from there. Jason advises, "You should always be seeking out jobs you're actually not qualified for. I think that's how you grow. If you know you could do the job, and you've got half the skills, go for it." Jason aspires to a legacy of increasing diversity in the cybersecurity industry and founded a non-profit to do just that. And, we thank Jason for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this encore episode where we are joined by the Chief strategy officer and chief security officer for Netskope, Jason Clark, shares his journey as he challenges the status quo and works to expand diversity in cybersecurity. Jason started his career by breaking the mold and heading to the Air Force rather than his family legacy of Army service. Following his military service, he became a CISO for the New York Times at age 26 and kept building from there. Jason advises, "You should always be seeking out jobs you're actually not qualified for. I think that's how you grow. If you know you could do the job, and you've got half the skills, go for it." Jason aspires to a legacy of increasing diversity in the cybersecurity industry and founded a non-profit to do just that. And, we thank Jason for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>402</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1fe9ccc2-7ce5-11ef-bf4a-47e5439202b0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1262239336.mp3?updated=1727451201" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Beyond the permissions wall. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/348/notes</link>
      <description>We are joined by Yves Younan, Senior Manager, Talos Vulnerability Discovery and Research from Cisco, discussing their work on "How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions." Cisco Talos has uncovered eight vulnerabilities in Microsoft applications for macOS that could allow attackers to exploit the system's permission model by injecting malicious libraries. 
By leveraging permissions already granted to these apps, attackers could gain access to sensitive resources like the microphone, camera, and screen recording without user consent. While Microsoft considers these issues low risk and has declined to fix them, the vulnerabilities pose a potential threat to user privacy and security.
The research can be found here:
How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Sep 2024 07:00:00 -0000</pubDate>
      <itunes:title>Beyond the permissions wall. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>348</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>We are joined by Yves Younan, Senior Manager, Talos Vulnerability Discovery and Research from Cisco, discussing their work on "How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions." Cisco Talos has uncovered eight vulnerabilities in Microsoft applications for macOS that could allow attackers to exploit the system's permission model by injecting malicious libraries. 
By leveraging permissions already granted to these apps, attackers could gain access to sensitive resources like the microphone, camera, and screen recording without user consent. While Microsoft considers these issues low risk and has declined to fix them, the vulnerabilities pose a potential threat to user privacy and security.
The research can be found here:
How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>We are joined by Yves Younan, Senior Manager, Talos Vulnerability Discovery and Research from Cisco, discussing their work on "How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions." Cisco Talos has uncovered eight vulnerabilities in Microsoft applications for macOS that could allow attackers to exploit the system's permission model by injecting malicious libraries. </p><p>By leveraging permissions already granted to these apps, attackers could gain access to sensitive resources like the microphone, camera, and screen recording without user consent. While Microsoft considers these issues low risk and has declined to fix them, the vulnerabilities pose a potential threat to user privacy and security.</p><p>The research can be found here:</p><ul><li><a href="https://blog.talosintelligence.com/how-multiple-vulnerabilities-in-microsoft-apps-for-macos-pave-the-way-to-stealing-permissions/">How multiple vulnerabilities in Microsoft apps for macOS pave the way to stealing permissions</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>887</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c0b92912-7c50-11ef-b713-03cd21fc01dc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2582149556.mp3?updated=1727387673" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Darknet dollars exposed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2160/notes</link>
      <description>International Law Enforcement Seizes Domains of Russian Crypto Laundering Networks. The real-world risk of a recently revealed Linux vulnerability appears low. Criminal Charges Loom in the Iranian Hack of the Trump Campaign. Meta is fined over a hundred million dollars for storing users’ passwords in plaintext. Delaware’s public libraries grapple with the aftermath of a ransomware attack. Tor merges with Tails. Progress Software urges customers to patch multiple vulnerabilities. A critical vulnerability in VLC media player has been discovered. Our guests are Mark Lance, Vice President of DFIR and Threat Intelligence at GuidePoint Security, and Andrew Nelson, Principal Security Consultant at GuidePoint Security discussing their work on "Hazard Ransomware – A Successful Broken Encryptor Story." Having the wisdom to admit you just don’t know. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Mark Lance, Vice President DFIR and Threat Intelligence at GuidePoint Security, discussing their work on "Hazard Ransomware – A Successful Broken Encryptor Story." 

Selected Reading
US-led operation disrupts crypto exchanges linked to Russian cybercrime (The Record)
Highly Anticipated Linux Flaw Allows Remote Code Execution, but Less Serious Than Expected (SecurityWeek)
Criminal charges coming in alleged Iranian hack of Trump campaign emails: Sources (ABC News)
Meta fined $101 million for storing hundreds of millions of passwords in plaintext (The Record)
Hackers attack Delaware libraries, seek ransom. Here's what we know (Delaware Online)
Tor Merges With Security-Focused OS Tails (SecurityWeek)
Progress urges admins to patch critical WhatsUp Gold bugs ASAP (Bleeping Computer)
VLC Player Vulnerability Let Attackers Execute Malicious Code, Update Now (Cyber Security News)
Bigger AI chatbots more inclined to spew nonsense — and people don't always realize (Nature)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 27 Sep 2024 20:10:00 -0000</pubDate>
      <itunes:title>Darknet dollars exposed.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2160</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>International Law Enforcement Seizes Domains of Russian Crypto Laundering Networks. The real-world risk of a recently revealed Linux vulnerability appears low. Criminal Charges Loom in the Iranian Hack of the Trump Campaign. Meta is fined over a hundred million dollars for storing users’ passwords in plaintext. Delaware’s public libraries grapple with the aftermath of a ransomware attack. Tor merges with Tails. Progress Software urges customers to patch multiple vulnerabilities. A critical vulnerability in VLC media player has been discovered. Our guests are Mark Lance, Vice President of DFIR and Threat Intelligence at GuidePoint Security, and Andrew Nelson, Principal Security Consultant at GuidePoint Security discussing their work on "Hazard Ransomware – A Successful Broken Encryptor Story." Having the wisdom to admit you just don’t know. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Mark Lance, Vice President DFIR and Threat Intelligence at GuidePoint Security, discussing their work on "Hazard Ransomware – A Successful Broken Encryptor Story." 

Selected Reading
US-led operation disrupts crypto exchanges linked to Russian cybercrime (The Record)
Highly Anticipated Linux Flaw Allows Remote Code Execution, but Less Serious Than Expected (SecurityWeek)
Criminal charges coming in alleged Iranian hack of Trump campaign emails: Sources (ABC News)
Meta fined $101 million for storing hundreds of millions of passwords in plaintext (The Record)
Hackers attack Delaware libraries, seek ransom. Here's what we know (Delaware Online)
Tor Merges With Security-Focused OS Tails (SecurityWeek)
Progress urges admins to patch critical WhatsUp Gold bugs ASAP (Bleeping Computer)
VLC Player Vulnerability Let Attackers Execute Malicious Code, Update Now (Cyber Security News)
Bigger AI chatbots more inclined to spew nonsense — and people don't always realize (Nature)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>International Law Enforcement Seizes Domains of Russian Crypto Laundering Networks. The real-world risk of a recently revealed Linux vulnerability appears low. Criminal Charges Loom in the Iranian Hack of the Trump Campaign. Meta is fined over a hundred million dollars for storing users’ passwords in plaintext. Delaware’s public libraries grapple with the aftermath of a ransomware attack. Tor merges with Tails. Progress Software urges customers to patch multiple vulnerabilities. A critical vulnerability in VLC media player has been discovered. Our guests are Mark Lance, Vice President of DFIR and Threat Intelligence at GuidePoint Security, and Andrew Nelson, Principal Security Consultant at GuidePoint Security discussing their work on "Hazard Ransomware – A Successful Broken Encryptor Story." Having the wisdom to admit you just don’t know. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/mark-lance-9594234/">Mark Lance</a>, Vice President DFIR and Threat Intelligence at <a href="https://www.guidepointsecurity.com/">GuidePoint Security</a>, discussing their work on "<a href="https://www.guidepointsecurity.com/blog/hazard-ransomware-a-successful-broken-encryptor-story/">Hazard Ransomware – A Successful Broken Encryptor Story</a>." </p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/cryptocurrency-exchanges-seizures-ivanov-sanctions-us-netherlands">US-led operation disrupts crypto exchanges linked to Russian cybercrime</a> (The Record)</p><p><a href="https://www.securityweek.com/highly-anticipated-linux-flaw-allows-remote-code-execution-but-less-serious-than-expected/">Highly Anticipated Linux Flaw Allows Remote Code Execution, but Less Serious Than Expected</a> (SecurityWeek)</p><p><a href="https://abcnews.go.com/US/criminal-charges-coming-alleged-iranian-hack-trump-campaign/story?id=114243158">Criminal charges coming in alleged Iranian hack of Trump campaign emails: Sources</a> (ABC News)</p><p><a href="https://therecord.media/meta-unprotected-passwords-fine-gdpr">Meta fined $101 million for storing hundreds of millions of passwords in plaintext</a> (The Record)</p><p><a href="https://www.delawareonline.com/story/news/local/2024/09/26/hackers-hit-delaware-libraries-what-we-know-about-cyber-attack-ransomhub-claims-responsibility/75360885007/">Hackers attack Delaware libraries, seek ransom. Here's what we know</a> (Delaware Online)</p><p><a href="https://www.securityweek.com/tor-merges-with-security-focused-os-tails/">Tor Merges With Security-Focused OS Tails</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/progress-urges-admins-to-patch-critical-whatsup-gold-bugs-asap/">Progress urges admins to patch critical WhatsUp Gold bugs ASAP</a> (Bleeping Computer)</p><p><a href="https://cybersecuritynews.com/vlc-player-malicious-code/">VLC Player Vulnerability Let Attackers Execute Malicious Code, Update Now</a> (Cyber Security News)</p><p><a href="https://www.nature.com/articles/d41586-024-03137-3">Bigger AI chatbots more inclined to spew nonsense — and people don't always realize</a> (Nature)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1730</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[afda22e6-b95e-11ee-8cf8-231634b6434f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5554623119.mp3?updated=1727464289" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Salt Typhoon’s cyber storm.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2159/notes</link>
      <description>Salt Typhoon infiltrates US ISPs. Researchers hack the connected features in Kia vehicles.WiFi portals in UK train stations suffer Islamophobic graffiti. International partners release a joint guide for protecting Active Directory. A key house committee approves an AI vulnerability reporting bill. India’s largest health insurer sues Telegram over leaked data. HPE Aruba Networking patches three critical vulnerabilities in its Aruba Access Points. OpenAI plans to restructure into a for-profit business. CISA raises the red flag on Hurricane Helene scams. Our guest is Ashley Rose, Founder &amp; CEO at Living Security, on the creation of Forrester’s newest cybersecurity category, Human Risk Management. The FTC says “Objection!” to the world’s first self-proclaimed robot lawyer.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Ashley Rose, Living Security’s Founder &amp; CEO, talking about the creation of Forrester’s newest cybersecurity category, Human Risk Management. Read Ashley’s blog. Learn more on The Forrester Wave™: Human Risk Management Solutions, Q3 2024.  

Selected Reading
China-Backed Salt Typhoon Targets U.S. Internet Providers: Report (Security Boulevard)
Millions of Vehicles Could Be Hacked and Tracked Thanks to a Simple Website Bug (WIRED)
Public Wi-Fi operator investigating cyberattack at UK's busiest train stations (The Rgister)
ASD’s ACSC, CISA, and US and International Partners Release Guidance on Detecting and Mitigating Active Directory Compromises (CISA)
House panel moves bill that adds AI systems to National Vulnerability Database (CyberScoop)
India's Star Health sues Telegram after hacker uses app's chatbots to leak data (Reuters)
HPE Aruba Networking fixes critical flaws impacting Access Points (Bleeping Computer)
Exclusive: OpenAI to remove non-profit control and give Sam Altman equity (Reuters)
OpenAI's technology chief Mira Murati, two other research executives to leave (Reuters)
CISA Warns of Hurricane-Related Scams (CISA)
DoNotPay must pay $193,000 to settle false claim charges from FTC. (The Verge)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 26 Sep 2024 20:10:00 -0000</pubDate>
      <itunes:title>Salt Typhoon’s cyber storm.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2159</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Salt Typhoon infiltrates US ISPs. Researchers hack the connected features in Kia vehicles.WiFi portals in UK train stations suffer Islamophobic graffiti. International partners release a joint guide for protecting Active Directory. A key house committee approves an AI vulnerability reporting bill. India’s largest health insurer sues Telegram over leaked data. HPE Aruba Networking patches three critical vulnerabilities in its Aruba Access Points. OpenAI plans to restructure into a for-profit business. CISA raises the red flag on Hurricane Helene scams. Our guest is Ashley Rose, Founder &amp; CEO at Living Security, on the creation of Forrester’s newest cybersecurity category, Human Risk Management. The FTC says “Objection!” to the world’s first self-proclaimed robot lawyer.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Ashley Rose, Living Security’s Founder &amp; CEO, talking about the creation of Forrester’s newest cybersecurity category, Human Risk Management. Read Ashley’s blog. Learn more on The Forrester Wave™: Human Risk Management Solutions, Q3 2024.  

Selected Reading
China-Backed Salt Typhoon Targets U.S. Internet Providers: Report (Security Boulevard)
Millions of Vehicles Could Be Hacked and Tracked Thanks to a Simple Website Bug (WIRED)
Public Wi-Fi operator investigating cyberattack at UK's busiest train stations (The Rgister)
ASD’s ACSC, CISA, and US and International Partners Release Guidance on Detecting and Mitigating Active Directory Compromises (CISA)
House panel moves bill that adds AI systems to National Vulnerability Database (CyberScoop)
India's Star Health sues Telegram after hacker uses app's chatbots to leak data (Reuters)
HPE Aruba Networking fixes critical flaws impacting Access Points (Bleeping Computer)
Exclusive: OpenAI to remove non-profit control and give Sam Altman equity (Reuters)
OpenAI's technology chief Mira Murati, two other research executives to leave (Reuters)
CISA Warns of Hurricane-Related Scams (CISA)
DoNotPay must pay $193,000 to settle false claim charges from FTC. (The Verge)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Salt Typhoon infiltrates US ISPs. Researchers hack the connected features in Kia vehicles.WiFi portals in UK train stations suffer Islamophobic graffiti. International partners release a joint guide for protecting Active Directory. A key house committee approves an AI vulnerability reporting bill. India’s largest health insurer sues Telegram over leaked data. HPE Aruba Networking patches three critical vulnerabilities in its Aruba Access Points. OpenAI plans to restructure into a for-profit business. CISA raises the red flag on Hurricane Helene scams. Our guest is Ashley Rose, Founder &amp; CEO at Living Security, on the creation of Forrester’s newest cybersecurity category, Human Risk Management. The FTC says “Objection!” to the world’s first self-proclaimed robot lawyer.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/ashley-m-rose/">Ashley Rose</a>, <a href="https://www.livingsecurity.com/">Living Security</a>’s Founder &amp; CEO, talking about the creation of Forrester’s newest cybersecurity category, Human Risk Management. Read Ashley’s <a href="https://www.livingsecurity.com/blog/human-risk-management-leader">blog</a>. Learn more on <a href="https://www.forrester.com/report/the-forrester-wave-tm-human-risk-management-solutions-q3-2024/RES181374">The Forrester Wave™: Human Risk Management Solutions, Q3 2024</a>.  </p><p><br></p><h2>Selected Reading</h2><p><a href="https://securityboulevard.com/2024/09/china-backed-salt-typhoon-targets-u-s-internet-providers-report/">China-Backed Salt Typhoon Targets U.S. Internet Providers: Report</a> (Security Boulevard)</p><p><a href="https://www.wired.com/story/kia-web-vulnerability-vehicle-hack-track/">Millions of Vehicles Could Be Hacked and Tracked Thanks to a Simple Website Bug</a> (WIRED)</p><p><a href="https://www.theregister.com/2024/09/26/public_wifi_operator_investigating_cyberattack/">Public Wi-Fi operator investigating cyberattack at UK's busiest train stations</a> (The Rgister)</p><p><a href="https://www.cisa.gov/news-events/alerts/2024/09/25/asds-acsc-cisa-and-us-and-international-partners-release-guidance-detecting-and-mitigating-active">ASD’s ACSC, CISA, and US and International Partners Release Guidance on Detecting and Mitigating Active Directory Compromises</a> (CISA)</p><p><a href="https://cyberscoop.com/nist-artificial-intelligence-vulnerability-reporting-congress/">House panel moves bill that adds AI systems to National Vulnerability Database</a> (CyberScoop)</p><p><a href="https://www.reuters.com/technology/cybersecurity/indias-star-health-sues-telegram-after-hacker-uses-apps-chatbots-leak-data-2024-09-26/">India's Star Health sues Telegram after hacker uses app's chatbots to leak data</a> (Reuters)</p><p><a href="https://www.bleepingcomputer.com/news/security/hpe-aruba-networking-fixes-three-critical-rce-flaws-impacting-its-access-points/">HPE Aruba Networking fixes critical flaws impacting Access Points</a> (Bleeping Computer)</p><p><a href="https://www.reuters.com/technology/artificial-intelligence/openai-remove-non-profit-control-give-sam-altman-equity-sources-say-2024-09-25/">Exclusive: OpenAI to remove non-profit control and give Sam Altman equity</a> (Reuters)</p><p><a href="https://www.reuters.com/technology/artificial-intelligence/openais-technology-chief-mira-murati-leave-2024-09-25/">OpenAI's technology chief Mira Murati, two other research executives to leave</a> (Reuters)</p><p><a href="https://www.cisa.gov/news-events/alerts/2024/09/25/cisa-warns-hurricane-related-scams">CISA Warns of Hurricane-Related Scams</a> (CISA)</p><p><a href="https://www.theverge.com/2024/9/25/24254405/federal-trade-commission-donotpay-robot-lawyers-artificial-intelligence-scams">DoNotPay must pay $193,000 to settle false claim charges from FTC.</a> (The Verge)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1687</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[af9f5080-b95e-11ee-8cf8-5f4c16a8f71d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5827504620.mp3?updated=1727379105" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Blue screen blues.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2158/notes</link>
      <description>CrowdStrike’s Adam Meyers testifies before congress. The State Department is set to provide nearly $35 million in foreign aid to strengthen global cybersecurity. Foreign adversaries claim ongoing access to presidential campaign documents. Researchers warn of critical vulnerabilities in fuel tank monitoring systems. Hackers claim a Chrome 2FA feature bypass takes less than ten minutes. Exploiting ChatGPT’s long-term memory. Politicians and staffers find personal data exposed on the dark web. A critical vulnerability in Ivanti’s Virtual Traffic Manager is being actively exploited. On our CertByte segment,  Chris Hare is joined by resident Microsoft SME George Monsalvatge to break down a question from N2K’s CompTIA Project+ Practice Test. Don’t click the PDiddy links.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from our suite of industry-leading content and a study tip to help you achieve the professional certifications you need to fast-track your career growth.
In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by resident Microsoft SME George Monsalvatge to break down a question from N2K’s CompTIA Project+ (PK0-005) Practice Test.
This exam is targeted for candidates who have about 1-2 years of project management experience. This is not an actual test question, but an example of one that covers an objective for the 5th version of the exam, which came out in November 2022.
Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro.
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.

Selected Reading
CrowdStrike Apologizes for IT Outage, Defends Microsoft Kernel Access (Infosecurity Magazine)
Exclusive: State Department cyber bureau preps funding blitz aimed at boosting allies' defenses (The Record)
Iranian-linked election interference operation shows signs of recent access (CyberScoop)
FEC expands campaign spending rules to allow for physical, cybersecurity purchases (CyberScoop)
Automatic Tank Gauges Used in Critical Infrastructure Plagued by Critical Vulnerabilities (SecurityWeek)
New Chrome Alert After Hackers Claim 2FA Security Cracked In 10 Minutes (Forbes)
Hacker plants false memories in ChatGPT to steal user data in perpetuity (Ars Technica)
Proton warns that data of thousands politicians leaked on the dark web (Beyond Machines)
Third Recent Ivanti Vulnerability Exploited in the Wild (SecurityWeek)
PDiddySploit Malware Hidden in Files Claiming to Reveal Deleted Diddy Posts (Hackread)
Diddy Do It? Or Did Cybercriminals? How Hackers Are Turning Scandals Into Cyber Attacks (Veriti)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 25 Sep 2024 20:10:00 -0000</pubDate>
      <itunes:title>Blue screen blues.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2158</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CrowdStrike’s Adam Meyers testifies before congress. The State Department is set to provide nearly $35 million in foreign aid to strengthen global cybersecurity. Foreign adversaries claim ongoing access to presidential campaign documents. Researchers warn of critical vulnerabilities in fuel tank monitoring systems. Hackers claim a Chrome 2FA feature bypass takes less than ten minutes. Exploiting ChatGPT’s long-term memory. Politicians and staffers find personal data exposed on the dark web. A critical vulnerability in Ivanti’s Virtual Traffic Manager is being actively exploited. On our CertByte segment,  Chris Hare is joined by resident Microsoft SME George Monsalvatge to break down a question from N2K’s CompTIA Project+ Practice Test. Don’t click the PDiddy links.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from our suite of industry-leading content and a study tip to help you achieve the professional certifications you need to fast-track your career growth.
In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by resident Microsoft SME George Monsalvatge to break down a question from N2K’s CompTIA Project+ (PK0-005) Practice Test.
This exam is targeted for candidates who have about 1-2 years of project management experience. This is not an actual test question, but an example of one that covers an objective for the 5th version of the exam, which came out in November 2022.
Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. To get the full news to knowledge experience, learn more about our N2K Pro subscription at https://thecyberwire.com/pro.
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.

Selected Reading
CrowdStrike Apologizes for IT Outage, Defends Microsoft Kernel Access (Infosecurity Magazine)
Exclusive: State Department cyber bureau preps funding blitz aimed at boosting allies' defenses (The Record)
Iranian-linked election interference operation shows signs of recent access (CyberScoop)
FEC expands campaign spending rules to allow for physical, cybersecurity purchases (CyberScoop)
Automatic Tank Gauges Used in Critical Infrastructure Plagued by Critical Vulnerabilities (SecurityWeek)
New Chrome Alert After Hackers Claim 2FA Security Cracked In 10 Minutes (Forbes)
Hacker plants false memories in ChatGPT to steal user data in perpetuity (Ars Technica)
Proton warns that data of thousands politicians leaked on the dark web (Beyond Machines)
Third Recent Ivanti Vulnerability Exploited in the Wild (SecurityWeek)
PDiddySploit Malware Hidden in Files Claiming to Reveal Deleted Diddy Posts (Hackread)
Diddy Do It? Or Did Cybercriminals? How Hackers Are Turning Scandals Into Cyber Attacks (Veriti)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CrowdStrike’s Adam Meyers testifies before congress. The State Department is set to provide nearly $35 million in foreign aid to strengthen global cybersecurity. Foreign adversaries claim ongoing access to presidential campaign documents. Researchers warn of critical vulnerabilities in fuel tank monitoring systems. Hackers claim a Chrome 2FA feature bypass takes less than ten minutes. Exploiting ChatGPT’s long-term memory. Politicians and staffers find personal data exposed on the dark web. A critical vulnerability in Ivanti’s Virtual Traffic Manager is being actively exploited. On our CertByte segment,  Chris Hare is joined by resident Microsoft SME George Monsalvatge to break down a question from N2K’s CompTIA Project+ Practice Test. Don’t click the PDiddy links.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CertByte Segment</h2><p>Welcome to CertByte! On this bi-weekly segment hosted by <a href="https://www.linkedin.com/in/chrisharepmp/">Chris Hare</a>, a content developer and project management specialist at <a href="https://www.n2k.com/">N2K</a>, we share practice questions from our suite of industry-leading content and a study tip to help you achieve the professional certifications you need to fast-track your career growth.</p><p>In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by resident Microsoft SME <a href="https://www.linkedin.com/in/george-monsalvatge-abb2172/">George Monsalvatge</a> to break down a question from N2K’s <a href="https://certify.cybervista.net/products/comptia/project-plus-practice-test/">CompTIA Project+ (PK0-005)</a> Practice Test.</p><p>This exam is targeted for candidates who have about 1-2 years of project management experience. This is not an actual test question, but an example of one that covers an objective for the 5th version of the exam, which came out in November 2022.</p><p>Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at <a href="http://n2k.com/certify">n2k.com/certify</a>. To get the full news to knowledge experience, learn more about our N2K Pro subscription at <a href="https://thecyberwire.com/pro">https://thecyberwire.com/pro</a><a href="https://thecyberwire.com/pro.">.</a></p><p><em>Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.</em></p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.infosecurity-magazine.com/news/crowdstrike-apologizes-outage/">CrowdStrike Apologizes for IT Outage, Defends Microsoft Kernel Access</a> (Infosecurity Magazine)</p><p><a href="https://therecord.media/state-dept-preps-funding-blitz-to-boost-cyber-defenses-fick">Exclusive: State Department cyber bureau preps funding blitz aimed at boosting allies' defenses</a> (The Record)</p><p><a href="https://cyberscoop.com/trump-campaign-hack-new-material-ongoing-access/">Iranian-linked election interference operation shows signs of recent access</a> (CyberScoop)</p><p><a href="https://cyberscoop.com/fec-campaign-funds-security-purchases/">FEC expands campaign spending rules to allow for physical, cybersecurity purchases</a> (CyberScoop)</p><p><a href="https://www.securityweek.com/automatic-tank-gauges-used-in-critical-infrastructure-plagued-by-critical-vulnerabilities/">Automatic Tank Gauges Used in Critical Infrastructure Plagued by Critical Vulnerabilities </a>(SecurityWeek)</p><p><a href="https://www.forbes.com/sites/daveywinder/2024/09/25/new-chrome-alert-after-hackers-claim-2fa-security-cracked-in-10-minutes/">New Chrome Alert After Hackers Claim 2FA Security Cracked In 10 Minutes</a> (Forbes)</p><p><a href="https://arstechnica.com/security/2024/09/false-memories-planted-in-chatgpt-give-hacker-persistent-exfiltration-channel/">Hacker plants false memories in ChatGPT to steal user data in perpetuity</a> (Ars Technica)</p><p><a href="https://beyondmachines.net/event_details/proton-warns-that-data-of-over-3k-capitol-hill-staffers-leaked-on-the-dark-web-source-unknown-8-r-c-p-h/gD2P6Ple2L">Proton warns that data of thousands politicians leaked on the dark web</a> (Beyond Machines)</p><p><a href="https://www.securityweek.com/third-recent-ivanti-product-vulnerability-exploited-in-the-wild/">Third Recent Ivanti Vulnerability Exploited in the Wild</a> (SecurityWeek)</p><p><a href="https://hackread.com/pdiddysploit-malware-hidden-files-deleted-diddy-posts/">PDiddySploit Malware Hidden in Files Claiming to Reveal Deleted Diddy Posts</a> (Hackread)</p><p><a href="https://veriti.ai/blog/diddy-do-it-or-did-cybercriminals-how-hackers-are-turning-scandals-into-cyber-attacks/">Diddy Do It? Or Did Cybercriminals? How Hackers Are Turning Scandals Into Cyber Attacks</a> (Veriti)</p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1507</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[af6525d6-b95e-11ee-8cf8-cfd916a0f613]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9575595338.mp3?updated=1727289946" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>PIVOTT Act drafts the next wave of digital defenders.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2157/notes</link>
      <description>The House Homeland Security Chair introduces a major cyber workforce bill. Google rolls out new Gmail security tools. Telegram makes a big shift in its privacy policy. Microsoft doubles down on cybersecurity. A Kansas water treatment facility suffers a suspected cyberattack. MoneyGram reports network outages. Kaspersky antivirus users get an automatic upgrade, maybe. North Korean IT workers infiltrate Fortune 100 companies. Gartner analysts urge cybersecurity leaders to focus on  prevention, response, and recovery. In this week’s Threat Vector, host David Moulton is joined by Daniel Kendzior, Global Data &amp; AI Security Practice Lead at Accenture, to explore the seismic shifts in cybersecurity brought about by AI technologies.  A lavish lifestyle exposes the duo behind a $230M crypto scam.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
In this segment of Threat Vector, host David Moulton, Director of Thought Leadership at Palo Alto Networks Unit 42, and Daniel Kendzior, Global Data &amp; AI Security Practice Lead at Accenture, explore the seismic shifts in cybersecurity brought about by AI technologies. 
Join us each Thursday for a new episode of Threat Vector on the N2K CyberWire network. To hear David and Daniel’s full discussion, check it out here. 

Selected Reading
Exclusive: House Homeland Security chair releases, pushes forth cyber workforce bill (CyberScoop)
Google Announces New Gmail Security Move For Millions (Forbes)
Telegram will now provide some user data to authorities (BBC)
Microsoft CEO to Cyber Team: Don’t Tell Me How Great Everything Is (Bloomberg)
Kansas Water Facility Switches to Manual Operations Following Cyberattack (SecurityWeek)
MoneyGram says cyber incident causing network outages (The Record)
Kaspersky Users in US Find Antivirus Software Automatically Replaced (Cyber Security News)
Dozens of Fortune 100 companies have unwittingly hired North Korean IT workers, according to report (The Record)
Zero Failure Tolerance, A Cybersecurity Myth Holding Back Organization (Infosecurity Magazine)
Two men arrested one month after $230 million of cryptocurrency stolen from a single victim (Bitdefender) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Sep 2024 20:10:00 -0000</pubDate>
      <itunes:title>PIVOTT Act drafts the next wave of digital defenders.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2157</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The House Homeland Security Chair introduces a major cyber workforce bill. Google rolls out new Gmail security tools. Telegram makes a big shift in its privacy policy. Microsoft doubles down on cybersecurity. A Kansas water treatment facility suffers a suspected cyberattack. MoneyGram reports network outages. Kaspersky antivirus users get an automatic upgrade, maybe. North Korean IT workers infiltrate Fortune 100 companies. Gartner analysts urge cybersecurity leaders to focus on  prevention, response, and recovery. In this week’s Threat Vector, host David Moulton is joined by Daniel Kendzior, Global Data &amp; AI Security Practice Lead at Accenture, to explore the seismic shifts in cybersecurity brought about by AI technologies.  A lavish lifestyle exposes the duo behind a $230M crypto scam.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
In this segment of Threat Vector, host David Moulton, Director of Thought Leadership at Palo Alto Networks Unit 42, and Daniel Kendzior, Global Data &amp; AI Security Practice Lead at Accenture, explore the seismic shifts in cybersecurity brought about by AI technologies. 
Join us each Thursday for a new episode of Threat Vector on the N2K CyberWire network. To hear David and Daniel’s full discussion, check it out here. 

Selected Reading
Exclusive: House Homeland Security chair releases, pushes forth cyber workforce bill (CyberScoop)
Google Announces New Gmail Security Move For Millions (Forbes)
Telegram will now provide some user data to authorities (BBC)
Microsoft CEO to Cyber Team: Don’t Tell Me How Great Everything Is (Bloomberg)
Kansas Water Facility Switches to Manual Operations Following Cyberattack (SecurityWeek)
MoneyGram says cyber incident causing network outages (The Record)
Kaspersky Users in US Find Antivirus Software Automatically Replaced (Cyber Security News)
Dozens of Fortune 100 companies have unwittingly hired North Korean IT workers, according to report (The Record)
Zero Failure Tolerance, A Cybersecurity Myth Holding Back Organization (Infosecurity Magazine)
Two men arrested one month after $230 million of cryptocurrency stolen from a single victim (Bitdefender) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The House Homeland Security Chair introduces a major cyber workforce bill. Google rolls out new Gmail security tools. Telegram makes a big shift in its privacy policy. Microsoft doubles down on cybersecurity. A Kansas water treatment facility suffers a suspected cyberattack. MoneyGram reports network outages. Kaspersky antivirus users get an automatic upgrade, maybe. North Korean IT workers infiltrate Fortune 100 companies. Gartner analysts urge cybersecurity leaders to focus on  prevention, response, and recovery. In this week’s Threat Vector, host David Moulton is joined by Daniel Kendzior, Global Data &amp; AI Security Practice Lead at Accenture, to explore the seismic shifts in cybersecurity brought about by AI technologies.  A lavish lifestyle exposes the duo behind a $230M crypto scam.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Threat Vector Segment</h2><p>In this segment of <a href="https://thecyberwire.com/podcasts/threat-vector">Threat Vector</a>, host <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a>, Director of Thought Leadership at <a href="https://www.paloaltonetworks.com/">Palo Alto Networks</a> Unit 42, and <a href="https://www.linkedin.com/in/danielkendzior/">Daniel Kendzior</a>, Global Data &amp; AI Security Practice Lead at <a href="https://www.accenture.com/us-en">Accenture</a>, explore the seismic shifts in cybersecurity brought about by AI technologies. </p><p>Join us each Thursday for a new episode of Threat Vector on the N2K CyberWire network. To hear David and Daniel’s full discussion, check it out <a href="https://thecyberwire.com/podcasts/threat-vector/35/notes">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://cyberscoop.com/exclusive-house-homeland-security-chair-releases-pushes-forth-cyber-workforce-bill/">Exclusive: House Homeland Security chair releases, pushes forth cyber workforce bill</a> (CyberScoop)</p><p><a href="https://www.forbes.com/sites/daveywinder/2024/09/24/google-announces-new-gmail-security-move-for-millions/">Google Announces New Gmail Security Move For Millions</a> (Forbes)</p><p><a href="https://www.bbc.com/news/articles/cvglp0xny3eo">Telegram will now provide some user data to authorities</a> (BBC)</p><p><a href="https://www.bloomberg.com/news/articles/2024-09-23/microsoft-ceo-to-cyber-team-don-t-tell-me-how-great-everything-is">Microsoft CEO to Cyber Team: Don’t Tell Me How Great Everything Is</a> (Bloomberg)</p><p><a href="https://www.securityweek.com/kansas-water-facility-switches-to-manual-operations-following-cyberattack/">Kansas Water Facility Switches to Manual Operations Following Cyberattack</a> (SecurityWeek)</p><p><a href="https://therecord.media/moneygram-cybersecurity-incident-network-outages">MoneyGram says cyber incident causing network outages</a> (The Record)</p><p><a href="https://cybersecuritynews.com/kaspersky-us-antivirus-replaced/">Kaspersky Users in US Find Antivirus Software Automatically Replaced</a> (Cyber Security News)</p><p><a href="https://therecord.media/major-us-companies-unwittingly-hire-north-korean-remote-it-workers">Dozens of Fortune 100 companies have unwittingly hired North Korean IT workers, according to report</a> (The Record)</p><p><a href="https://www.infosecurity-magazine.com/news/zero-failure-tolerance/">Zero Failure Tolerance, A Cybersecurity Myth Holding Back Organization</a> (Infosecurity Magazine)</p><p><a href="https://www.bitdefender.com/blog/hotforsecurity/two-men-arrested-one-month-after-230-million-of-cryptocurrency-stolen-from-a-single-victim/">Two men arrested one month after $230 million of cryptocurrency stolen from a single victim</a> (Bitdefender) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1667</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[af29af6a-b95e-11ee-8cf8-cf7b5caf6e60]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1917583608.mp3?updated=1727206417" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Can connected cars jeopardize national security?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2156/notes</link>
      <description>The US is set to propose a ban on Chinese software and hardware in connected cars. Dell investigates a breach of employee data. Unit 42 uncovers a North Korean PondRAT and a red team tool called Splinter. Marko Polo malware targets cryptocurrency influencers, gamers, and developers. An Iranian state-sponsored threat group targets Middle Eastern governments and telecommunications.The alleged Snowflake hacker remains active and at large. German officials quantify fallout from the CrowdStrike incident. Apple’s latest macOS update has led to widespread issues with cybersecurity software and network connectivity. Our guest is Vincenzo Ciancaglini, Senior Threat Researcher from Trend Micro, talking about the uptick in cybercrime driven by the generative AI explosion. Supercharging your graphing calculator. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Vincenzo Ciancaglini, Senior Threat Researcher from Trend Micro, talking about the uptick in cybercrime driven by the generative AI explosion. Read their blog "Surging Hype: An Update on the Rising Abuse of GenAI" here. 

Selected Reading
Exclusive: US to propose ban on Chinese software, hardware in connected vehicles (Reuters)
Dell investigates data breach claims after hacker leaks employee info (Bleeping Computer)
North Korea-linked APT Gleaming Pisces deliver new PondRAT backdoor via malicious Python packages (Security Affairs)
Global infostealer malware operation targets crypto users, gamers (Bleeping Computer)
Iranian-Linked Group Facilitates APT Attacks on Middle East Networks (Security Boulevard)
Hacker behind Snowflake customer data breaches remains active (CyberScoop)
Discovering Splinter: A First Look at a New Post-Exploitation Red Team Tool (Palo Alto Networks)
Organizations are changing cybersecurity providers in wake of Crowdstrike outage (Help Net Security)
Cybersecurity Products Conking Out After macOS Sequoia Update (SecurityWeek)
Secret calculator hack brings ChatGPT to the TI-84, enabling easy cheating (Ars Technica)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 23 Sep 2024 20:00:00 -0000</pubDate>
      <itunes:title>Can connected cars jeopardize national security?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2156</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The US is set to propose a ban on Chinese software and hardware in connected cars. Dell investigates a breach of employee data. Unit 42 uncovers a North Korean PondRAT and a red team tool called Splinter. Marko Polo malware targets cryptocurrency influencers, gamers, and developers. An Iranian state-sponsored threat group targets Middle Eastern governments and telecommunications.The alleged Snowflake hacker remains active and at large. German officials quantify fallout from the CrowdStrike incident. Apple’s latest macOS update has led to widespread issues with cybersecurity software and network connectivity. Our guest is Vincenzo Ciancaglini, Senior Threat Researcher from Trend Micro, talking about the uptick in cybercrime driven by the generative AI explosion. Supercharging your graphing calculator. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Vincenzo Ciancaglini, Senior Threat Researcher from Trend Micro, talking about the uptick in cybercrime driven by the generative AI explosion. Read their blog "Surging Hype: An Update on the Rising Abuse of GenAI" here. 

Selected Reading
Exclusive: US to propose ban on Chinese software, hardware in connected vehicles (Reuters)
Dell investigates data breach claims after hacker leaks employee info (Bleeping Computer)
North Korea-linked APT Gleaming Pisces deliver new PondRAT backdoor via malicious Python packages (Security Affairs)
Global infostealer malware operation targets crypto users, gamers (Bleeping Computer)
Iranian-Linked Group Facilitates APT Attacks on Middle East Networks (Security Boulevard)
Hacker behind Snowflake customer data breaches remains active (CyberScoop)
Discovering Splinter: A First Look at a New Post-Exploitation Red Team Tool (Palo Alto Networks)
Organizations are changing cybersecurity providers in wake of Crowdstrike outage (Help Net Security)
Cybersecurity Products Conking Out After macOS Sequoia Update (SecurityWeek)
Secret calculator hack brings ChatGPT to the TI-84, enabling easy cheating (Ars Technica)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US is set to propose a ban on Chinese software and hardware in connected cars. Dell investigates a breach of employee data. Unit 42 uncovers a North Korean PondRAT and a red team tool called Splinter. Marko Polo malware targets cryptocurrency influencers, gamers, and developers. An Iranian state-sponsored threat group targets Middle Eastern governments and telecommunications.The alleged Snowflake hacker remains active and at large. German officials quantify fallout from the CrowdStrike incident. Apple’s latest macOS update has led to widespread issues with cybersecurity software and network connectivity. Our guest is Vincenzo Ciancaglini, Senior Threat Researcher from Trend Micro, talking about the uptick in cybercrime driven by the generative AI explosion. Supercharging your graphing calculator. </p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p><br></p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/vciancaglini/">Vincenzo Ciancaglini</a>, Senior Threat Researcher from <a href="https://www.trendmicro.com/en_us/business.html">Trend Micro</a>, talking about the uptick in cybercrime driven by the generative AI explosion. Read their blog "Surging Hype: An Update on the Rising Abuse of GenAI" <a href="https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/surging-hype-an-update-on-the-rising-abuse-of-genai">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.reuters.com/business/autos-transportation/us-propose-barring-chinese-software-hardware-connected-vehicles-sources-say-2024-09-21/">Exclusive: US to propose ban on Chinese software, hardware in connected vehicles</a> (Reuters)</p><p><a href="https://www.bleepingcomputer.com/news/security/dell-investigates-data-breach-claims-after-hacker-leaks-employee-info">Dell investigates data breach claims after hacker leaks employee info</a> (Bleeping Computer)</p><p><a href="https://securityaffairs.com/168781/apt/gleaming-pisces-malicious-python-packages.html">North Korea-linked APT Gleaming Pisces deliver new PondRAT backdoor via malicious Python packages</a> (Security Affairs)</p><p><a href="https://www.bleepingcomputer.com/news/security/global-infostealer-malware-operation-targets-crypto-users-gamers/">Global infostealer malware operation targets crypto users, gamers</a> (Bleeping Computer)</p><p><a href="https://securityboulevard.com/2024/09/iranian-linked-group-facilitates-apt-attacks-on-middle-east-networks/">Iranian-Linked Group Facilitates APT Attacks on Middle East Networks</a> (Security Boulevard)</p><p><a href="https://cyberscoop.com/snowflake-hacker-judische-labscon-2024/">Hacker behind Snowflake customer data breaches remains active </a>(CyberScoop)</p><p><a href="https://unit42.paloaltonetworks.com/analysis-pentest-tool-splinter/">Discovering Splinter: A First Look at a New Post-Exploitation Red Team Tool</a> (Palo Alto Networks)</p><p><a href="https://www.helpnetsecurity.com/2024/09/23/changing-cybersecurity-providers/">Organizations are changing cybersecurity providers in wake of Crowdstrike outage </a>(Help Net Security)</p><p><a href="https://www.securityweek.com/cybersecurity-products-conking-out-after-macos-sequoia-update/">Cybersecurity Products Conking Out After macOS Sequoia Update</a> (SecurityWeek)</p><p><a href="https://arstechnica.com/information-technology/2024/09/secret-calculator-hack-brings-chatgpt-to-the-ti-84-enabling-easy-cheating/">Secret calculator hack brings ChatGPT to the TI-84, enabling easy cheating</a> (Ars Technica)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p><br></p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1865</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aeee6bd0-b95e-11ee-8cf8-63dc62108c91]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3256358492.mp3?updated=1727118085" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kyla Guru: You are a key piece to our national security. [Education] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/34/notes</link>
      <description>Enjoy this special encore episode, where we are jjoined by Founder and CEO of nonprofit Bits N' Bytes Cybersecurity Education and undergraduate student at Stanford University, Kyla Guru shares her journey from GenCyber Camp to becoming a cybersecurity thought leader. Seeing the need. for cybersecurity education in her own community spurred Kyla into action engaging our civilian population in understanding their role in the cybersecurity space. Kyla recommends putting yourself out there: taking courses, getting more knowledge, getting internships, meeting people and going to conferences. Kyla thinks her generation has an inquisitive mind and feels that is where advocacy and education come in with cybersecurity. She shares for any young person "thinking about maybe starting something in security, this is definitely the time to do so." And, we thank Kyla for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 22 Sep 2024 07:00:00 -0000</pubDate>
      <itunes:title>Kyla Guru: You are a key piece to our national security. [Education] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>34</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this special encore episode, where we are jjoined by Founder and CEO of nonprofit Bits N' Bytes Cybersecurity Education and undergraduate student at Stanford University, Kyla Guru shares her journey from GenCyber Camp to becoming a cybersecurity thought leader. Seeing the need. for cybersecurity education in her own community spurred Kyla into action engaging our civilian population in understanding their role in the cybersecurity space. Kyla recommends putting yourself out there: taking courses, getting more knowledge, getting internships, meeting people and going to conferences. Kyla thinks her generation has an inquisitive mind and feels that is where advocacy and education come in with cybersecurity. She shares for any young person "thinking about maybe starting something in security, this is definitely the time to do so." And, we thank Kyla for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special encore episode, where we are jjoined by Founder and CEO of nonprofit Bits N' Bytes Cybersecurity Education and undergraduate student at Stanford University, Kyla Guru shares her journey from GenCyber Camp to becoming a cybersecurity thought leader. Seeing the need. for cybersecurity education in her own community spurred Kyla into action engaging our civilian population in understanding their role in the cybersecurity space. Kyla recommends putting yourself out there: taking courses, getting more knowledge, getting internships, meeting people and going to conferences. Kyla thinks her generation has an inquisitive mind and feels that is where advocacy and education come in with cybersecurity. She shares for any young person "thinking about maybe starting something in security, this is definitely the time to do so." And, we thank Kyla for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>439</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5652e878-75cb-11ef-b333-f705761ac456]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8464692534.mp3?updated=1726670467" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Steve Blank, national security, and the dilemma of technology disruption. (Part 1 of 2)</title>
      <link>https://thecyberwire.com/podcasts/special-edition/73/notes</link>
      <description>In this 2-part special edition series, guest Steve Blank, co-founder of the Gordian Knot Center for National Security Innovation at Stanford University, speaks with N2K's Brandon Karpf about national security and the dilemma of technology disruption. 

In this series, Steve Blank, a renowned expert in national security innovation, explores the critical challenges facing the U.S. Department of Defense in a rapidly evolving technological landscape. From the rise of global adversaries like China to the bureaucratic obstacles hindering defense innovation, Blank breaks down the “dilemma of technology disruption” in national security. Learn how the U.S. can overcome its outdated systems, accelerate innovation, and prepare for the future of defense technology. Whether you’re interested in defense tech, cybersecurity, or government innovation, this episode offers deep insights into the intersection of national security and technological disruption.

For some background, you can check out Steve’s article “Why Large Organizations Struggle With Disruption, and What to Do About It.”
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 22 Sep 2024 06:00:00 -0000</pubDate>
      <itunes:title>Steve Blank, national security, and the dilemma of technology disruption. (Part 1 of 2)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>73</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this 2-part special edition series, guest Steve Blank, co-founder of the Gordian Knot Center for National Security Innovation at Stanford University, speaks with N2K's Brandon Karpf about national security and the dilemma of technology disruption. 

In this series, Steve Blank, a renowned expert in national security innovation, explores the critical challenges facing the U.S. Department of Defense in a rapidly evolving technological landscape. From the rise of global adversaries like China to the bureaucratic obstacles hindering defense innovation, Blank breaks down the “dilemma of technology disruption” in national security. Learn how the U.S. can overcome its outdated systems, accelerate innovation, and prepare for the future of defense technology. Whether you’re interested in defense tech, cybersecurity, or government innovation, this episode offers deep insights into the intersection of national security and technological disruption.

For some background, you can check out Steve’s article “Why Large Organizations Struggle With Disruption, and What to Do About It.”
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this 2-part special edition series, guest <a href="https://www.linkedin.com/in/steveblank/">Steve Blank</a>, co-founder of the <a href="https://gordianknot.stanford.edu/">Gordian Knot Center for National Security Innovation</a> at Stanford University, speaks with <a href="https://www.n2k.com/">N2K</a>'s <a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a> about national security and the dilemma of technology disruption. </p><p><br></p><p>In this series, Steve Blank, a renowned expert in national security innovation, explores the critical challenges facing the U.S. Department of Defense in a rapidly evolving technological landscape. From the rise of global adversaries like China to the bureaucratic obstacles hindering defense innovation, Blank breaks down the “dilemma of technology disruption” in national security. Learn how the U.S. can overcome its outdated systems, accelerate innovation, and prepare for the future of defense technology. Whether you’re interested in defense tech, cybersecurity, or government innovation, this episode offers deep insights into the intersection of national security and technological disruption.</p><p><br></p><p>For some background, you can check out Steve’s article “<a href="https://steveblank.com/2024/07/30/why-large-organizations-struggle-with-disruption-and-what-to-do-about-it/">Why Large Organizations Struggle With Disruption, and What to Do About It</a>.”</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2185</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7ab261c6-7774-11ef-bb49-eb5445483a0b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2623002038.mp3?updated=1726859985" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hook, line, and sinker. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/347/notes</link>
      <description>Jonathan Tanner, Senior Security Researcher from Barracuda, discussing their work on "Stealthy phishing attack uses advanced infostealer for data exfiltration." The recent phishing attack, detailed by Barracuda, uses a sophisticated infostealer malware to exfiltrate a wide array of sensitive data. 
The attack begins with a phishing email containing an ISO file with an HTA payload, which downloads and executes obfuscated scripts to extract and transmit browser information, saved files, and credentials to remote servers. This advanced infostealer is notable for its extensive data collection capabilities and complex exfiltration methods, highlighting the increasing sophistication of cyber threats.
The research can be found here:
Stealthy phishing attack uses advanced infostealer for data exfiltration

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Sep 2024 07:00:00 -0000</pubDate>
      <itunes:title>Hook, line, and sinker. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>347</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Jonathan Tanner, Senior Security Researcher from Barracuda, discussing their work on "Stealthy phishing attack uses advanced infostealer for data exfiltration." The recent phishing attack, detailed by Barracuda, uses a sophisticated infostealer malware to exfiltrate a wide array of sensitive data. 
The attack begins with a phishing email containing an ISO file with an HTA payload, which downloads and executes obfuscated scripts to extract and transmit browser information, saved files, and credentials to remote servers. This advanced infostealer is notable for its extensive data collection capabilities and complex exfiltration methods, highlighting the increasing sophistication of cyber threats.
The research can be found here:
Stealthy phishing attack uses advanced infostealer for data exfiltration

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/jtannersec/">Jonathan Tanner</a>, Senior Security Researcher from <a href="https://www.barracuda.com/">Barracuda</a>, discussing their work on "<a href="https://blog.barracuda.com/2024/08/14/phishing-advanced-infostealer-data-exfiltration">Stealthy phishing attack uses advanced infostealer for data exfiltration</a>." The recent phishing attack, detailed by Barracuda, uses a sophisticated infostealer malware to exfiltrate a wide array of sensitive data. </p><p>The attack begins with a phishing email containing an ISO file with an HTA payload, which downloads and executes obfuscated scripts to extract and transmit browser information, saved files, and credentials to remote servers. This advanced infostealer is notable for its extensive data collection capabilities and complex exfiltration methods, highlighting the increasing sophistication of cyber threats.</p><p>The research can be found here:</p><ul><li><a href="https://blog.barracuda.com/2024/08/14/phishing-advanced-infostealer-data-exfiltration">Stealthy phishing attack uses advanced infostealer for data exfiltration</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1182</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8c1dc930-75c8-11ef-bc47-ffbf4452e8c1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5948821387.mp3?updated=1726669704" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>They really are watching what we watch. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2155/notes</link>
      <description>An FTC report confirms online surveillance and privacy concerns. Ukraine bans Telegram for state and security officials. Sensitive customer data from India’s largest health insurer is leaked. German law enforcement shuts down multiple cryptocurrency exchange services. HZ RAT sets its sights on macOS systems. Stolen VPN passwords remain a growing threat. Law enforcement dismantles the iServer phishing-as-a-service platform. Today’s guest is Steve Blank, co-founder of the Gordian Knot Center for National Security Innovation at Stanford University, talking with N2K's Brandon Karpf about national security and the dilemma of technology disruption. CISA’s boss pushes for accountability. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest is Steve Blank, co-founder of the Gordian Knot Center for National Security Innovation at Stanford University, talking with N2K's Brandon Karpf about national security and the dilemma of technology disruption. For some background, you can check out Steve’s article “Why Large Organizations Struggle With Disruption, and What to Do About It.”

To listen to Brandon and Steve’s full conversation, check out our Special Edition series that will run over the next two Sundays in our CyberWire Daily podcast feed. 

Selected Reading
FTC Staff Report Finds Large Social Media and Video Streaming Companies Have Engaged in Vast Surveillance of Users with Lax Privacy Controls and Inadequate Safeguards for Kids and Teens (Federal Trade Commission)
Ukraine bans Telegram on state and military devices (The Record)
Hacker selling 7 TB of Star Health Insurance’s customer data using Telegram (CSO Online)
German Government Shuts Down 47 Exchanges, Says They're Tied To ‘Illegal Activity’ (CoinDesk)
New MacOS Malware Let Attackers Control The Device Remotely (Cyber Security News)
More Than Two Million Stolen VPN Passwords Discovered (Security Boulevard)
High-risk vulnerabilities in common enterprise technologies (Rapid7 Blog)
Law Enforcement Dismantles Phishing Platform Used for Unlocking Stolen Phones (SecurityWeek)
Insecure software makers are the real cyber villains – CISA (The Register) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 20 Sep 2024 20:00:00 -0000</pubDate>
      <itunes:title>They really are watching what we watch. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2155</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>An FTC report confirms online surveillance and privacy concerns. Ukraine bans Telegram for state and security officials. Sensitive customer data from India’s largest health insurer is leaked. German law enforcement shuts down multiple cryptocurrency exchange services. HZ RAT sets its sights on macOS systems. Stolen VPN passwords remain a growing threat. Law enforcement dismantles the iServer phishing-as-a-service platform. Today’s guest is Steve Blank, co-founder of the Gordian Knot Center for National Security Innovation at Stanford University, talking with N2K's Brandon Karpf about national security and the dilemma of technology disruption. CISA’s boss pushes for accountability. 

Remember to leave us a 5-star rating and review in your favorite podcast app.

Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest is Steve Blank, co-founder of the Gordian Knot Center for National Security Innovation at Stanford University, talking with N2K's Brandon Karpf about national security and the dilemma of technology disruption. For some background, you can check out Steve’s article “Why Large Organizations Struggle With Disruption, and What to Do About It.”

To listen to Brandon and Steve’s full conversation, check out our Special Edition series that will run over the next two Sundays in our CyberWire Daily podcast feed. 

Selected Reading
FTC Staff Report Finds Large Social Media and Video Streaming Companies Have Engaged in Vast Surveillance of Users with Lax Privacy Controls and Inadequate Safeguards for Kids and Teens (Federal Trade Commission)
Ukraine bans Telegram on state and military devices (The Record)
Hacker selling 7 TB of Star Health Insurance’s customer data using Telegram (CSO Online)
German Government Shuts Down 47 Exchanges, Says They're Tied To ‘Illegal Activity’ (CoinDesk)
New MacOS Malware Let Attackers Control The Device Remotely (Cyber Security News)
More Than Two Million Stolen VPN Passwords Discovered (Security Boulevard)
High-risk vulnerabilities in common enterprise technologies (Rapid7 Blog)
Law Enforcement Dismantles Phishing Platform Used for Unlocking Stolen Phones (SecurityWeek)
Insecure software makers are the real cyber villains – CISA (The Register) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An FTC report confirms online surveillance and privacy concerns. Ukraine bans Telegram for state and security officials. Sensitive customer data from India’s largest health insurer is leaked. German law enforcement shuts down multiple cryptocurrency exchange services. HZ RAT sets its sights on macOS systems. Stolen VPN passwords remain a growing threat. Law enforcement dismantles the iServer phishing-as-a-service platform. Today’s guest is Steve Blank, co-founder of the Gordian Knot Center for National Security Innovation at Stanford University, talking with N2K's Brandon Karpf about national security and the dilemma of technology disruption. CISA’s boss pushes for accountability. </p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p><br></p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today’s guest is <a href="https://www.linkedin.com/in/steveblank/">Steve Blank</a>, co-founder of the <a href="https://gordianknot.stanford.edu/">Gordian Knot Center for National Security Innovation</a> at Stanford University, talking with <a href="https://www.n2k.com/">N2K</a>'s <a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a> about national security and the dilemma of technology disruption. For some background, you can check out Steve’s article “<a href="https://steveblank.com/2024/07/30/why-large-organizations-struggle-with-disruption-and-what-to-do-about-it/">Why Large Organizations Struggle With Disruption, and What to Do About It.</a>”</p><p><br></p><p>To listen to Brandon and Steve’s full conversation, check out our <a href="https://thecyberwire.com/podcasts/special-edition">Special Edition</a> series that will run over the next two Sundays in our CyberWire Daily podcast feed. </p><h2><br></h2><h2>Selected Reading</h2><p><a href="https://www.ftc.gov/news-events/news/press-releases/2024/09/ftc-staff-report-finds-large-social-media-video-streaming-companies-have-engaged-vast-surveillance">FTC Staff Report Finds Large Social Media and Video Streaming Companies Have Engaged in Vast Surveillance of Users with Lax Privacy Controls and Inadequate Safeguards for Kids and Teens</a> (Federal Trade Commission)</p><p><a href="https://therecord.media/ukraine-bans-telegram-official-devices">Ukraine bans Telegram on state and military devices</a> (The Record)</p><p><a href="https://www.csoonline.com/article/3535168/hacker-selling-7-tb-of-star-health-insurances-customer-data-using-telegram.html">Hacker selling 7 TB of Star Health Insurance’s customer data using Telegram</a> (CSO Online)</p><p><a href="https://www.coindesk.com/business/2024/09/19/german-government-shuts-down-47-exchanges-tied-to-illegal-activity/">German Government Shuts Down 47 Exchanges, Says They're Tied To ‘Illegal Activity’</a> (CoinDesk)</p><p><a href="https://cybersecuritynews.com/macos-malware-control-device-remotely/">New MacOS Malware Let Attackers Control The Device Remotely</a> (Cyber Security News)</p><p><a href="https://securityboulevard.com/2024/09/more-than-two-million-stolen-vpn-passwords-discovered/">More Than Two Million Stolen VPN Passwords Discovered</a> (Security Boulevard)</p><p><a href="https://www.rapid7.com/blog/post/2024/09/19/etr-high-risk-vulnerabilities-in-common-enterprise-technologies/">High-risk vulnerabilities in common enterprise technologies</a> (Rapid7 Blog)</p><p><a href="https://www.securityweek.com/law-enforcement-dismantles-phishing-platform-used-for-unlocking-stolen-phones/">Law Enforcement Dismantles Phishing Platform Used for Unlocking Stolen Phones</a> (SecurityWeek)</p><p><a href="https://www.theregister.com/2024/09/20/cisa_sloppy_vendors_cybercrime_villains/">Insecure software makers are the real cyber villains – CISA</a> (The Register) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><h2><br></h2><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p><br></p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1678</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aeb4b674-b95e-11ee-8cf8-8f49fe35a174]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9183460957.mp3?updated=1726857005" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Derailing the Raptor Train botnet. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2154/notes</link>
      <description>The US government disrupts China’s Raptor Train botnet. A phishing campaign abuses GitHub repositories to distribute malware.Ransomware group Vanilla Tempest targets U.S. healthcare providers.Hackers demand $6 million for stolen airport data. The FCC opens applications for a $200 million cybersecurity grant program. GreyNoise Intelligence tracks mysterious online “Noise Storms”. Scammers threaten Walmart shoppers with arrest. CISA adds five critical items to its known exploited vulnerabilities list. Craigslist founder will donate $100 million to strengthen US cybersecurity. Our guest today is Victoria Samson, Chief Director at Secure World Foundation, talking about space security and stability. Cybercriminals fall prey to very infostealers they rely on. 

Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest today is Victoria Samson, Chief Director at Secure World Foundation, talking with N2K’s T-Minus Space Daily podcast host Maria Varmazis about space security and stability. For some additional detail about space sustainability, visit Secure World Foundation’s Space Sustainability 101.  

Selected Reading
US Disrupts 'Raptor Train' Botnet of Chinese APT Flax Typhoon (SecurityWeek)
Clever 'GitHub Scanner' campaign abusing repos to push malware (Bleeping Computer)
Microsoft warns of ransomware attacks on US healthcare (CSO Online)
Sea-Tac refuses to pay 100-bitcoin ransom after August cyberattack (The Seattle Times)
FCC $200m Cyber Grant Pilot Opens Applications for Schools and Libraries (Infosecurity Magazine)
GreyNoise Reveals New Internet Noise Storm: Secret Messages and the China Connection (GreyNoise)
Walmart customers scammed via fake shopping lists, threatened with arrest (Malwarebytes)
CISA Warns of Five Vulnerabilities Actively Exploited in the Wild (Cyber Security News)
Craigslist Founder Pledges $100 Million to Boost U.S. Cybersecurity (Wall Street Journal)
Criminals Keep Hacking Themselves, Letting Researchers Unmask Them (404 Media) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 19 Sep 2024 20:00:00 -0000</pubDate>
      <itunes:title>Derailing the Raptor Train botnet. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2154</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The US government disrupts China’s Raptor Train botnet. A phishing campaign abuses GitHub repositories to distribute malware.Ransomware group Vanilla Tempest targets U.S. healthcare providers.Hackers demand $6 million for stolen airport data. The FCC opens applications for a $200 million cybersecurity grant program. GreyNoise Intelligence tracks mysterious online “Noise Storms”. Scammers threaten Walmart shoppers with arrest. CISA adds five critical items to its known exploited vulnerabilities list. Craigslist founder will donate $100 million to strengthen US cybersecurity. Our guest today is Victoria Samson, Chief Director at Secure World Foundation, talking about space security and stability. Cybercriminals fall prey to very infostealers they rely on. 

Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest today is Victoria Samson, Chief Director at Secure World Foundation, talking with N2K’s T-Minus Space Daily podcast host Maria Varmazis about space security and stability. For some additional detail about space sustainability, visit Secure World Foundation’s Space Sustainability 101.  

Selected Reading
US Disrupts 'Raptor Train' Botnet of Chinese APT Flax Typhoon (SecurityWeek)
Clever 'GitHub Scanner' campaign abusing repos to push malware (Bleeping Computer)
Microsoft warns of ransomware attacks on US healthcare (CSO Online)
Sea-Tac refuses to pay 100-bitcoin ransom after August cyberattack (The Seattle Times)
FCC $200m Cyber Grant Pilot Opens Applications for Schools and Libraries (Infosecurity Magazine)
GreyNoise Reveals New Internet Noise Storm: Secret Messages and the China Connection (GreyNoise)
Walmart customers scammed via fake shopping lists, threatened with arrest (Malwarebytes)
CISA Warns of Five Vulnerabilities Actively Exploited in the Wild (Cyber Security News)
Craigslist Founder Pledges $100 Million to Boost U.S. Cybersecurity (Wall Street Journal)
Criminals Keep Hacking Themselves, Letting Researchers Unmask Them (404 Media) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.

The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US government disrupts China’s Raptor Train botnet. A phishing campaign abuses GitHub repositories to distribute malware.Ransomware group Vanilla Tempest targets U.S. healthcare providers.Hackers demand $6 million for stolen airport data. The FCC opens applications for a $200 million cybersecurity grant program. GreyNoise Intelligence tracks mysterious online “Noise Storms”. Scammers threaten Walmart shoppers with arrest. CISA adds five critical items to its known exploited vulnerabilities list. Craigslist founder will donate $100 million to strengthen US cybersecurity. Our guest today is Victoria Samson, Chief Director at Secure World Foundation, talking about space security and stability. Cybercriminals fall prey to very infostealers they rely on. </p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest today is <a href="https://www.linkedin.com/in/victoria-samson-6338aa13/">Victoria Samson</a>, Chief Director at <a href="https://swfound.org/">Secure World Foundation</a>, talking with N2K’s <a href="https://space.n2k.com/podcasts/t-minus">T-Minus Space Daily</a> podcast host <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a> about space security and stability. For some additional detail about space sustainability, visit Secure World Foundation’s <a href="https://swfound.org/space-sustainability-101/">Space Sustainability 101</a>.  </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/us-disrupts-raptor-train-botnet-of-chinese-apt-flax-typhoon/">US Disrupts 'Raptor Train' Botnet of Chinese APT Flax Typhoon</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/clever-github-scanner-campaign-abusing-repos-to-push-malware/">Clever 'GitHub Scanner' campaign abusing repos to push malware</a> (Bleeping Computer)</p><p><a href="https://www.csoonline.com/article/3531730/microsoft-warns-of-ransomware-attacks-on-us-healthcare.html">Microsoft warns of ransomware attacks on US healthcare</a> (CSO Online)</p><p><a href="https://www.seattletimes.com/seattle-news/sea-tac-refuses-to-pay-100-bitcoin-ransom-after-august-cyberattack/">Sea-Tac refuses to pay 100-bitcoin ransom after August cyberattack</a> (The Seattle Times)</p><p><a href="https://www.infosecurity-magazine.com/news/fcc-cyber-grant-applications/">FCC $200m Cyber Grant Pilot Opens Applications for Schools and Libraries</a> (Infosecurity Magazine)</p><p><a href="https://www.greynoise.io/blog/greynoise-reveals-new-internet-noise-storm-secret-messages-and-the-china-connection">GreyNoise Reveals New Internet Noise Storm: Secret Messages and the China Connection</a> (GreyNoise)</p><p><a href="https://www.malwarebytes.com/blog/scams/2024/09/walmart-customers-scammed-via-fake-shopping-lists-threatened-with-arrest">Walmart customers scammed via fake shopping lists, threatened with arrest</a> (Malwarebytes)</p><p><a href="https://cybersecuritynews.com/cisa-warns-five-vulnerabilities/">CISA Warns of Five Vulnerabilities Actively Exploited in the Wild</a> (Cyber Security News)</p><p><a href="https://www.wsj.com/tech/cybersecurity/craigslist-founder-pledges-100-million-to-boost-u-s-cybersecurity-5357f5ae">Craigslist Founder Pledges $100 Million to Boost U.S. Cybersecurity</a> (Wall Street Journal)</p><p><a href="https://www.404media.co/criminals-keep-hacking-themselves-letting-researchers-unmask-them/">Criminals Keep Hacking Themselves, Letting Researchers Unmask Them</a> (404 Media) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p><br></p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1929</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ae7bedf8-b95e-11ee-8cf8-232ce3468e2d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5522327564.mp3?updated=1726771527" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>High-stakes sabotage.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2153/notes</link>
      <description>Exploding pagers in Lebanon are not a cyberattack. Europol leads an international effort to shut down the encrypted communications app Ghost. Microsoft IDs Russian propaganda groups’ disinformation campaigns. California’s Governor signs bills regulating AI in political ads. A multi-step zero-click macOS Calendar vulnerability is documented. A new phishing campaign targets Apple ID credentials.The US Cyber Ambassador emphasizes deterrence. Our guest is Linda Betz, Executive Vice President of Global Community Engagement at the FS-ISAC, sharing their work on maintaining security support at all levels of cyber maturity. AI tries to out-Buffett Warren Buffett.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Linda Betz, Executive Vice President of Global Community Engagement at the FS-ISAC, sharing their work and the recently-published guide on maintaining security support at all levels of cyber maturity. You can check out their guide “Cyber Fundamentals: Critical baseline security practices for today’s threat landscape” here. 

Selected Reading
Israel Planted Explosives in Pagers Sold to Hezbollah, Officials Say (The New York Times)
Criminal-favored Ghost messaging app busted, owners arrested (Cybernews)
Russians made videos falsely accusing Harris of hit-and-run, Microsoft says (The Washington Post)
California governor signs laws to crack down on election deepfakes created by AI (Associated Press)
Researcher chains multiple old macOS flaws to compromise iCloud with no user interaction (Beyond Machines)
iPhone Users Warned As New Email Password-Stealing Attacks Reported (Forbes)
Deterrence in cyberspace is possible — and ‘urgent’ — amid ‘alarming’ hybrid attacks, State cyber ambassador says (CyberScoop)
New Chatbot ETF Promises to Mimic Warren Buffett, David Tepper (Bloomberg)


Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 18 Sep 2024 20:10:00 -0000</pubDate>
      <itunes:title>High-stakes sabotage.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2153</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Exploding pagers in Lebanon are not a cyberattack. Europol leads an international effort to shut down the encrypted communications app Ghost. Microsoft IDs Russian propaganda groups’ disinformation campaigns. California’s Governor signs bills regulating AI in political ads. A multi-step zero-click macOS Calendar vulnerability is documented. A new phishing campaign targets Apple ID credentials.The US Cyber Ambassador emphasizes deterrence. Our guest is Linda Betz, Executive Vice President of Global Community Engagement at the FS-ISAC, sharing their work on maintaining security support at all levels of cyber maturity. AI tries to out-Buffett Warren Buffett.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Linda Betz, Executive Vice President of Global Community Engagement at the FS-ISAC, sharing their work and the recently-published guide on maintaining security support at all levels of cyber maturity. You can check out their guide “Cyber Fundamentals: Critical baseline security practices for today’s threat landscape” here. 

Selected Reading
Israel Planted Explosives in Pagers Sold to Hezbollah, Officials Say (The New York Times)
Criminal-favored Ghost messaging app busted, owners arrested (Cybernews)
Russians made videos falsely accusing Harris of hit-and-run, Microsoft says (The Washington Post)
California governor signs laws to crack down on election deepfakes created by AI (Associated Press)
Researcher chains multiple old macOS flaws to compromise iCloud with no user interaction (Beyond Machines)
iPhone Users Warned As New Email Password-Stealing Attacks Reported (Forbes)
Deterrence in cyberspace is possible — and ‘urgent’ — amid ‘alarming’ hybrid attacks, State cyber ambassador says (CyberScoop)
New Chatbot ETF Promises to Mimic Warren Buffett, David Tepper (Bloomberg)


Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Exploding pagers in Lebanon are not a cyberattack. Europol leads an international effort to shut down the encrypted communications app Ghost. Microsoft IDs Russian propaganda groups’ disinformation campaigns. California’s Governor signs bills regulating AI in political ads. A multi-step zero-click macOS Calendar vulnerability is documented. A new phishing campaign targets Apple ID credentials.The US Cyber Ambassador emphasizes deterrence. Our guest is Linda Betz, Executive Vice President of Global Community Engagement at the FS-ISAC, sharing their work on maintaining security support at all levels of cyber maturity. AI tries to out-Buffett Warren Buffett.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/linda-betz-967181/">Linda Betz</a>, Executive Vice President of Global Community Engagement at the <a href="https://www.fsisac.com/">FS-ISAC</a>, sharing their work and the recently-published guide on maintaining security support at all levels of cyber maturity. You can check out their guide “Cyber Fundamentals: Critical baseline security practices for today’s threat landscape” <a href="https://www.fsisac.com/cyber-fundamentals">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.nytimes.com/2024/09/17/world/middleeast/israel-hezbollah-pagers-explosives.html?unlocked_article_code=1.LU4.vFSx.5aHyBXwQ_7U7&amp;amp;smid=nytcore-ios-share&amp;amp;referringSource=articleShare">Israel Planted Explosives in Pagers Sold to Hezbollah, Officials Say</a> (The New York Times)</p><p><a href="https://cybernews.com/news/encrypted-ghost-app-busted-owners-arrested/">Criminal-favored Ghost messaging app busted, owners arrested</a> (Cybernews)</p><p><a href="https://www.washingtonpost.com/technology/2024/09/17/russia-fake-videos-election-interference-kamala-harris/">Russians made videos falsely accusing Harris of hit-and-run, Microsoft says</a> (The Washington Post)</p><p><a href="https://apnews.com/article/california-artificial-intelligence-deepfakes-election-0e70cb32b06d9187eaef5bdacaba6d77">California governor signs laws to crack down on election deepfakes created by AI</a><strong> </strong>(Associated Press)</p><p><a href="https://beyondmachines.net/event_details/researcher-chains-multiple-old-macos-flaws-to-compromise-icloud-with-no-user-interaction-r-v-l-6-3/gD2P6Ple2L">Researcher chains multiple old macOS flaws to compromise iCloud with no user interaction</a> (Beyond Machines)</p><p><a href="https://www.forbes.com/sites/daveywinder/2024/09/18/icloud-password-attack-warning-for-iphone-15-iphone-16-gmail-outlook-users/">iPhone Users Warned As New Email Password-Stealing Attacks Reported</a> (Forbes)</p><p><a href="https://cyberscoop.com/deterrence-in-cyberspace-is-possible-and-urgent-amid-alarming-hybrid-attacks-state-cyber-ambassador-says/">Deterrence in cyberspace is possible — and ‘urgent’ — amid ‘alarming’ hybrid attacks, State cyber ambassador says</a> (CyberScoop)</p><p><a href="https://www.bloomberg.com/news/articles/2024-09-18/warren-buffett-david-tepper-s-brainpower-fuels-new-chatbot-etf">New Chatbot ETF Promises to Mimic Warren Buffett, David Tepper</a> (Bloomberg)</p><p><br></p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ae425c46-b95e-11ee-8cf8-b771f588eb6a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9380111676.mp3?updated=1726771818" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>One small step for scammers. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2152/notes</link>
      <description>The US charges a Chinese national for spear-phishing government employees. The feds impose new sanctions on the makers of Predator spyware. Dealing with fake data breaches. Researchers discover a critical vulnerability in Google Cloud Platform. D-Link has patched critical vulnerabilities in three popular wireless router models. Snowflake ups their authentication game. A US mining company confirms a cyberattack. Researchers identify critical threats targeting construction industry accounting software. Tim Starks from CyberScoop joins us with his reporting on the US Postal Service’s ability to meet the challenges of the upcoming election. Cisco’s second round of layoffs hit hard. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest today is Tim Starks, Senior Reporter from CyberScoop, joining us to discuss his piece on "Election officials say U.S. Postal Service woes place election mail at risk." 

Selected Reading
DoJ: Chinese Man Used Spear-Phishing to Obtain Software From NASA, Military (SecurityWeek)
US Ramps Up Sanctions on Spyware-Maker Intellexa (Infosecurity Magazine)
All Smoke, no Fire: The Bizarre Trend of Fake Data Breaches and How to Protect Against Them (Security Boulevard)
Google Cloud Platform RCE Flaw Let Attackers Execute Code on Millions of Google Servers (Cyber Security News) 
D-Link fixes critical RCE, hardcoded password flaws in WiFi 6 routers (Bleeping Computer)
Breach-Weary Snowflake Moves to MFA, 14-Character Passwords (GovInfo Security)
Owner of only US platinum mine confirms data breach after ransomware claims (The Record)
Cracks in the Foundation: Intrusions of FOUNDATION Accounting Software (Huntress)
Cisco's second layoff of 2024 affects thousands of employees (TechCrunch)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Sep 2024 20:10:00 -0000</pubDate>
      <itunes:title>One small step for scammers. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2152</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The US charges a Chinese national for spear-phishing government employees. The feds impose new sanctions on the makers of Predator spyware. Dealing with fake data breaches. Researchers discover a critical vulnerability in Google Cloud Platform. D-Link has patched critical vulnerabilities in three popular wireless router models. Snowflake ups their authentication game. A US mining company confirms a cyberattack. Researchers identify critical threats targeting construction industry accounting software. Tim Starks from CyberScoop joins us with his reporting on the US Postal Service’s ability to meet the challenges of the upcoming election. Cisco’s second round of layoffs hit hard. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest today is Tim Starks, Senior Reporter from CyberScoop, joining us to discuss his piece on "Election officials say U.S. Postal Service woes place election mail at risk." 

Selected Reading
DoJ: Chinese Man Used Spear-Phishing to Obtain Software From NASA, Military (SecurityWeek)
US Ramps Up Sanctions on Spyware-Maker Intellexa (Infosecurity Magazine)
All Smoke, no Fire: The Bizarre Trend of Fake Data Breaches and How to Protect Against Them (Security Boulevard)
Google Cloud Platform RCE Flaw Let Attackers Execute Code on Millions of Google Servers (Cyber Security News) 
D-Link fixes critical RCE, hardcoded password flaws in WiFi 6 routers (Bleeping Computer)
Breach-Weary Snowflake Moves to MFA, 14-Character Passwords (GovInfo Security)
Owner of only US platinum mine confirms data breach after ransomware claims (The Record)
Cracks in the Foundation: Intrusions of FOUNDATION Accounting Software (Huntress)
Cisco's second layoff of 2024 affects thousands of employees (TechCrunch)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US charges a Chinese national for spear-phishing government employees. The feds impose new sanctions on the makers of Predator spyware. Dealing with fake data breaches. Researchers discover a critical vulnerability in Google Cloud Platform. D-Link has patched critical vulnerabilities in three popular wireless router models. Snowflake ups their authentication game. A US mining company confirms a cyberattack. Researchers identify critical threats targeting construction industry accounting software. Tim Starks from CyberScoop joins us with his reporting on the US Postal Service’s ability to meet the challenges of the upcoming election. Cisco’s second round of layoffs hit hard.<strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest today is <a href="https://www.linkedin.com/in/tstarks/">Tim Starks</a>, Senior Reporter from <a href="http://cyberscoop.com/">CyberScoop</a>, joining us to discuss his piece on "<a href="https://cyberscoop.com/postal-service-election-officials-mail-at-risk/">Election officials say U.S. Postal Service woes place election mail at risk.</a>" </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/doj-chinese-man-used-spear-phishing-to-obtain-software-from-nasa-military/">DoJ: Chinese Man Used Spear-Phishing to Obtain Software From NASA, Military</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/us-ramps-up-sanctions-spywaremaker/">US Ramps Up Sanctions on Spyware-Maker Intellexa</a> (Infosecurity Magazine)</p><p><a href="https://securityboulevard.com/2024/09/all-smoke-no-fire-the-bizarre-trend-of-fake-data-breaches-and-how-to-protect-against-them/">All Smoke, no Fire: The Bizarre Trend of Fake Data Breaches and How to Protect Against Them</a> (Security Boulevard)</p><p><a href="https://cybersecuritynews.com/gcp-rce-flaw/">Google Cloud Platform RCE Flaw Let Attackers Execute Code on Millions of Google Servers</a> (Cyber Security News) </p><p><a href="https://www.bleepingcomputer.com/news/security/d-link-fixes-critical-rce-hardcoded-password-flaws-in-wifi-6-routers/">D-Link fixes critical RCE, hardcoded password flaws in WiFi 6 routers</a> (Bleeping Computer)</p><p><a href="https://www.govinfosecurity.com/breach-weary-snowflake-moves-to-mfa-14-character-passwords-a-26297">Breach-Weary Snowflake Moves to MFA, 14-Character Passwords</a> (GovInfo Security)</p><p><a href="https://therecord.media/stillwater-mining-company-montana-platinum-data-breach">Owner of only US platinum mine confirms data breach after ransomware claims</a> (The Record)</p><p><a href="https://www.huntress.com/blog/cracks-in-the-foundation-intrusions-of-foundation-accounting-software">Cracks in the Foundation: Intrusions of FOUNDATION Accounting Software</a> (Huntress)</p><p><a href="https://techcrunch.com/2024/09/17/ciscos-second-layoff-of-2024-affect-thousands-of-employees/">Cisco's second layoff of 2024 affects thousands of employees</a> (TechCrunch)</p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1499</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ae09dccc-b95e-11ee-8cf8-a32b03235a88]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5442968520.mp3?updated=1726598836" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Agencies warn of voter data deception.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2151/notes</link>
      <description>The FBI and CISA dismiss false claims of compromised voter registration data. The State Department accuses RT of running global covert influence operations. Chinese hackers are suspected of targeting a Pacific Islands diplomatic organization. A look at Apple’s Private Cloud Compute system. 23andMe will pay $30 million to settle a lawsuit over a 2023 data breach.  SolarWinds releases patches for vulnerabilities in its Access Rights Manager. Browser kiosk mode frustrates users into giving up credentials. Brian Krebs reveals the threat of growing online “harm communities.” Our guest is Elliot Ward, Senior Security Researcher at Snyk, sharing insights on prompt injection attacks. How theoretical is the Dead Internet Theory?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Elliot Ward, Senior Security Researcher at Snyk, sharing insights on their recent work "Agent Hijacking: the true impact of prompt injection attacks." 

Selected Reading
FBI tells public to ignore false claims of hacked voter data (Bleeping Computer)
Russia’s RT news agency has ‘cyber operational capabilities,’ assists in military procurement, State Dept says (The Record)
The Dark Nexus Between Harm Groups and ‘The Com’ (Krebs on Security)
China suspected of hacking diplomatic body for Pacific islands region (The Record)
Apple Intelligence Promises Better AI Privacy. Here’s How It Actually Works (WIRED)
Apple seeks to drop its lawsuit against Israeli spyware pioneer NSO (Washington Post)
23andMe settles data breach lawsuit for $30 million (Reuters)
SolarWinds Patches Critical Vulnerability in Access Rights Manager (SecurityWeek)
Malware locks browser in kiosk mode to steal Google credentials (Bleeping Computer)
Is anyone out there? (Prospect Magazine) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 16 Sep 2024 20:10:00 -0000</pubDate>
      <itunes:title>Agencies warn of voter data deception.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2151</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The FBI and CISA dismiss false claims of compromised voter registration data. The State Department accuses RT of running global covert influence operations. Chinese hackers are suspected of targeting a Pacific Islands diplomatic organization. A look at Apple’s Private Cloud Compute system. 23andMe will pay $30 million to settle a lawsuit over a 2023 data breach.  SolarWinds releases patches for vulnerabilities in its Access Rights Manager. Browser kiosk mode frustrates users into giving up credentials. Brian Krebs reveals the threat of growing online “harm communities.” Our guest is Elliot Ward, Senior Security Researcher at Snyk, sharing insights on prompt injection attacks. How theoretical is the Dead Internet Theory?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Elliot Ward, Senior Security Researcher at Snyk, sharing insights on their recent work "Agent Hijacking: the true impact of prompt injection attacks." 

Selected Reading
FBI tells public to ignore false claims of hacked voter data (Bleeping Computer)
Russia’s RT news agency has ‘cyber operational capabilities,’ assists in military procurement, State Dept says (The Record)
The Dark Nexus Between Harm Groups and ‘The Com’ (Krebs on Security)
China suspected of hacking diplomatic body for Pacific islands region (The Record)
Apple Intelligence Promises Better AI Privacy. Here’s How It Actually Works (WIRED)
Apple seeks to drop its lawsuit against Israeli spyware pioneer NSO (Washington Post)
23andMe settles data breach lawsuit for $30 million (Reuters)
SolarWinds Patches Critical Vulnerability in Access Rights Manager (SecurityWeek)
Malware locks browser in kiosk mode to steal Google credentials (Bleeping Computer)
Is anyone out there? (Prospect Magazine) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FBI and CISA dismiss false claims of compromised voter registration data. The State Department accuses RT of running global covert influence operations. Chinese hackers are suspected of targeting a Pacific Islands diplomatic organization. A look at Apple’s Private Cloud Compute system. 23andMe will pay $30 million to settle a lawsuit over a 2023 data breach.  SolarWinds releases patches for vulnerabilities in its Access Rights Manager. Browser kiosk mode frustrates users into giving up credentials. Brian Krebs reveals the threat of growing online “harm communities.” Our guest is Elliot Ward, Senior Security Researcher at Snyk, sharing insights on prompt injection attacks. How theoretical is the Dead Internet Theory?</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://snyk.io/contributors/elliot-ward/">Elliot Ward</a>, Senior Security Researcher at <a href="https://snyk.io/">Snyk</a>, sharing insights on their recent work "<a href="https://snyk.io/blog/agent-hijacking/">Agent Hijacking: the true impact of prompt injection attacks</a>." </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/fbi-tells-public-to-ignore-false-claims-of-hacked-voter-data/">FBI tells public to ignore false claims of hacked voter data</a> (Bleeping Computer)</p><p><a href="https://therecord.media/russia-rt-news-agency-intelligence-military-functions-state-department-blinken">Russia’s RT news agency has ‘cyber operational capabilities,’ assists in military procurement, State Dept says</a> (The Record)</p><p><a href="https://krebsonsecurity.com/2024/09/the-dark-nexus-between-harm-groups-and-the-com/">The Dark Nexus Between Harm Groups and ‘The Com’</a> (Krebs on Security)</p><p><a href="https://therecord.media/pacific-islands-forum-cyberattack-fiji-australia-china">China suspected of hacking diplomatic body for Pacific islands region</a> (The Record)</p><p><a href="https://www.wired.com/story/apple-private-cloud-compute-ai/">Apple Intelligence Promises Better AI Privacy. Here’s How It Actually Works</a> (WIRED)</p><p><a href="https://www.washingtonpost.com/technology/2024/09/13/apple-lawsuit-nso-pegasus-spyware/?ref=metacurity.com">Apple seeks to drop its lawsuit against Israeli spyware pioneer NSO</a> (Washington Post)</p><p><a href="https://www.reuters.com/technology/cybersecurity/23andme-settles-data-breach-lawsuit-30-million-2024-09-13">23andMe settles data breach lawsuit for $30 million</a> (Reuters)</p><p><a href="https://www.securityweek.com/solarwinds-patches-critical-vulnerability-in-access-rights-manager/">SolarWinds Patches Critical Vulnerability in Access Rights Manager</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/malware-locks-browser-in-kiosk-mode-to-steal-google-credentials/">Malware locks browser in kiosk mode to steal Google credentials</a> (Bleeping Computer)</p><p><a href="https://www.prospectmagazine.co.uk/ideas/technology/internet/67864/dead-internet-theory-ai">Is anyone out there?</a> (Prospect Magazine) </p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1902</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[add05fce-b95e-11ee-8cf8-33fa6e5712e7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2370095728.mp3?updated=1726510273" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Breaking the information sharing barrier.</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/97/notes</link>
      <description>Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, turns over hosting responsibilities to Errol Weiss, the Chief Security Officer (CSO) of the HEALTH-ISAC and one of the original contributors to the N2K CyberWire Hash Table. He will make the business case for information sharing.

References:
White and Williams LLP, Staff Osborne Clarke LLP , 2018. Threat Information Sharing and GDPR [Legal Review]. FS-ISAC. 
Senator Richard Burr (R-NC), 2015. S.754 - 114th Congress (2015-2016): To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes [Law]. Library of Congress.
Staff, n.d. National Council of ISACs [Website]. NCI.
Staff, 2020. Guidance to Assist Non-Federal Entities to Share Cyber Threat Indicators and Defensive Measures with Federal Entities under the Cybersecurity Information Sharing Act of 2015 [Guidance]. CISA.
Staff, 2023. Information Sharing Best Practices [White paper]. Health-ISAC.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 16 Sep 2024 06:00:00 -0000</pubDate>
      <itunes:title>Breaking the information sharing barrier.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>11</itunes:season>
      <itunes:episode>97</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, turns over hosting responsibilities to Errol Weiss, the Chief Security Officer (CSO) of the HEALTH-ISAC and one of the original contributors to the N2K CyberWire Hash Table. He will make the business case for information sharing.

References:
White and Williams LLP, Staff Osborne Clarke LLP , 2018. Threat Information Sharing and GDPR [Legal Review]. FS-ISAC. 
Senator Richard Burr (R-NC), 2015. S.754 - 114th Congress (2015-2016): To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes [Law]. Library of Congress.
Staff, n.d. National Council of ISACs [Website]. NCI.
Staff, 2020. Guidance to Assist Non-Federal Entities to Share Cyber Threat Indicators and Defensive Measures with Federal Entities under the Cybersecurity Information Sharing Act of 2015 [Guidance]. CISA.
Staff, 2023. Information Sharing Best Practices [White paper]. Health-ISAC.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, turns over hosting responsibilities to Errol Weiss, the Chief Security Officer (CSO) of the HEALTH-ISAC and one of the original contributors to the N2K CyberWire Hash Table. He will make the business case for information sharing.</p><p><br></p><h2>References:</h2><p><a href="https://www.fsisac.com/resources/threat-information-sharing-and-gdpr">White and Williams LLP, Staff Osborne Clarke LLP , 2018. Threat Information Sharing and GDPR [Legal Review]. FS-ISAC.</a> </p><p><a href="https://www.congress.gov/bill/114th-congress/senate-bill/754">Senator Richard Burr (R-NC), 2015. S.754 - 114th Congress (2015-2016): To improve cybersecurity in the United States through enhanced sharing of information about cybersecurity threats, and for other purposes [Law]. Library of Congress.</a></p><p><a href="https://www.nationalisacs.org/">Staff, n.d. National Council of ISACs [Website]. NCI.</a></p><p><a href="https://www.cisa.gov/sites/default/files/publications/Non-Federal%20Entity%20Sharing%20Guidance%20under%20the%20Cybersecurity%20Information%20Sharing%20Act%20of%202015_1.pdf">Staff, 2020. Guidance to Assist Non-Federal Entities to Share Cyber Threat Indicators and Defensive Measures with Federal Entities under the Cybersecurity Information Sharing Act of 2015 [Guidance]. CISA.</a></p><p><a href="https://h-isac.org/h-isac-information-sharing-best-practices/">Staff, 2023. Information Sharing Best Practices [White paper]. Health-ISAC.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1440</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3fb75de0-7212-11ef-bfc6-3b4aca58e4fa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4378308062.mp3?updated=1726261975" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ben Yelin: A detour could be a sliding door moment. [Policy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/33/notes</link>
      <description>Enjoy this encore of Carerr Notes, where the Program Director for Public Policy and External Affairs at the University of Maryland's Center for Health and Homeland Security Ben Yelin shares his journey from political junkie to Fourth Amendment specialist. Several significant life defining political developments like the disputed 2000 election, 9/11, and the Iraqi war occurred during his formative years that shaped Ben's interest in public policy and his desire to pursue a degree in law. An opportunity to be a teaching assistant turned out to be one of those sliding door scenarios that led Ben to where he is now, a lawyer in the academic and consulting worlds specializing in cybersecurity and digital privacy issues. Through his work, Ben hopes to elevate the course of the debate on these very important issues. And, we thank Ben for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 15 Sep 2024 07:00:00 -0000</pubDate>
      <itunes:title>Ben Yelin: A detour could be a sliding door moment. [Policy] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>33</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this encore of Carerr Notes, where the Program Director for Public Policy and External Affairs at the University of Maryland's Center for Health and Homeland Security Ben Yelin shares his journey from political junkie to Fourth Amendment specialist. Several significant life defining political developments like the disputed 2000 election, 9/11, and the Iraqi war occurred during his formative years that shaped Ben's interest in public policy and his desire to pursue a degree in law. An opportunity to be a teaching assistant turned out to be one of those sliding door scenarios that led Ben to where he is now, a lawyer in the academic and consulting worlds specializing in cybersecurity and digital privacy issues. Through his work, Ben hopes to elevate the course of the debate on these very important issues. And, we thank Ben for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this encore of Carerr Notes, where the Program Director for Public Policy and External Affairs at the University of Maryland's Center for Health and Homeland Security Ben Yelin shares his journey from political junkie to Fourth Amendment specialist. Several significant life defining political developments like the disputed 2000 election, 9/11, and the Iraqi war occurred during his formative years that shaped Ben's interest in public policy and his desire to pursue a degree in law. An opportunity to be a teaching assistant turned out to be one of those sliding door scenarios that led Ben to where he is now, a lawyer in the academic and consulting worlds specializing in cybersecurity and digital privacy issues. Through his work, Ben hopes to elevate the course of the debate on these very important issues. And, we thank Ben for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>441</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ac448fca-720b-11ef-95dc-5713090f8edf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4953865813.mp3?updated=1726258294" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Spamageddon: Xeon Sender’s cloudy SMS attack revealed! [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/346/notes</link>
      <description>Alex Delamotte, Threat Researcher from SentinelOne Labs, joins to share their work on "Xeon Sender | SMS Spam Shipping Multi-Tool Targeting SaaS Credentials." SentinelOne’s Labs team has uncovered new research on Xeon Sender, a cloud hacktool used to launch SMS spam attacks via legitimate APIs like Amazon SNS. 
First seen in 2022, this tool has been repurposed by multiple threat actors and distributed on underground forums, highlighting the ongoing trend of SMS spam through cloud services and SaaS.
The research can be found here:
Xeon Sender | SMS Spam Shipping Multi-Tool Targeting SaaS Credentials

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Sep 2024 07:00:00 -0000</pubDate>
      <itunes:title>Spamageddon: Xeon Sender’s cloudy SMS attack revealed! [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>349</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Alex Delamotte, Threat Researcher from SentinelOne Labs, joins to share their work on "Xeon Sender | SMS Spam Shipping Multi-Tool Targeting SaaS Credentials." SentinelOne’s Labs team has uncovered new research on Xeon Sender, a cloud hacktool used to launch SMS spam attacks via legitimate APIs like Amazon SNS. 
First seen in 2022, this tool has been repurposed by multiple threat actors and distributed on underground forums, highlighting the ongoing trend of SMS spam through cloud services and SaaS.
The research can be found here:
Xeon Sender | SMS Spam Shipping Multi-Tool Targeting SaaS Credentials

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Alex Delamotte, Threat Researcher from SentinelOne Labs, joins to share their work on "Xeon Sender | SMS Spam Shipping Multi-Tool Targeting SaaS Credentials." SentinelOne’s Labs team has uncovered new research on Xeon Sender, a cloud hacktool used to launch SMS spam attacks via legitimate APIs like Amazon SNS. </p><p>First seen in 2022, this tool has been repurposed by multiple threat actors and distributed on underground forums, highlighting the ongoing trend of SMS spam through cloud services and SaaS.</p><p>The research can be found here:</p><ul><li><a href="https://www.sentinelone.com/labs/xeon-sender-sms-spam-shipping-multi-tool-targeting-saas-credentials/">Xeon Sender | SMS Spam Shipping Multi-Tool Targeting SaaS Credentials</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>957</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6d3ec0c8-7217-11ef-956d-1b13d9ca8eaa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4208195338.mp3?updated=1726263849" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mini-breach, mega-hype.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2150/notes</link>
      <description>Fortinet reveals a data breach. The feds sanction a Cambodian senator for forced labor scams. UK police arrest a teen linked to the Transport for London cyberattack. New Linux malware targets Oracle WebLogic. Citrix patches critical Workspace app flaws. Microsoft unveils updates to prevent outages like the CrowdStrike incident. U.S. Space Systems invests in secure communications. Illegal gun-conversion sites get taken down. Tim Starks of CyberScoop tracks Russian hackers mimicking spyware vendors. Cybersecurity hiring gaps persist. Hackers use eye-tracking to steal passwords.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we welcome back Tim Starks, senior reporter from CyberScoop, to discuss “Google: apparent Russian hackers play copycat to commercial spyware vendors.” You can read the article Tim refers to here. 

Selected Reading
Fortinet Data Breach: What We Know So Far (SOCRadar)
Cambodian senator sanctioned by US over cyber-scams (The Register)
UK NCA arrested a teenager linked to the attack on Transport for London (Security Affairs)
New 'Hadooken' Linux Malware Targets WebLogic Servers (SecurityWeek)
Citrix Workspace App Vulnerabilities Allow Privilege Escalation Attacks (Cyber Security News)
Microsoft Vows to Prevent Future CrowdStrike-Like Outages (Infosecurity Magazine)
Space Systems Command Awards $188M Contract for meshONE-T Follow-on (Space Systems Command)
Domains seized for allegedly importing Chinese gun switches (The Register)
Why Breaking into Cybersecurity Isn’t as Easy as You Think (Security Boulevard)
Apple Vision Pro’s Eye Tracking Exposed What People Type (WIRED)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 13 Sep 2024 20:20:00 -0000</pubDate>
      <itunes:title>Mini-breach, mega-hype.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2150</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Fortinet reveals a data breach. The feds sanction a Cambodian senator for forced labor scams. UK police arrest a teen linked to the Transport for London cyberattack. New Linux malware targets Oracle WebLogic. Citrix patches critical Workspace app flaws. Microsoft unveils updates to prevent outages like the CrowdStrike incident. U.S. Space Systems invests in secure communications. Illegal gun-conversion sites get taken down. Tim Starks of CyberScoop tracks Russian hackers mimicking spyware vendors. Cybersecurity hiring gaps persist. Hackers use eye-tracking to steal passwords.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we welcome back Tim Starks, senior reporter from CyberScoop, to discuss “Google: apparent Russian hackers play copycat to commercial spyware vendors.” You can read the article Tim refers to here. 

Selected Reading
Fortinet Data Breach: What We Know So Far (SOCRadar)
Cambodian senator sanctioned by US over cyber-scams (The Register)
UK NCA arrested a teenager linked to the attack on Transport for London (Security Affairs)
New 'Hadooken' Linux Malware Targets WebLogic Servers (SecurityWeek)
Citrix Workspace App Vulnerabilities Allow Privilege Escalation Attacks (Cyber Security News)
Microsoft Vows to Prevent Future CrowdStrike-Like Outages (Infosecurity Magazine)
Space Systems Command Awards $188M Contract for meshONE-T Follow-on (Space Systems Command)
Domains seized for allegedly importing Chinese gun switches (The Register)
Why Breaking into Cybersecurity Isn’t as Easy as You Think (Security Boulevard)
Apple Vision Pro’s Eye Tracking Exposed What People Type (WIRED)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Fortinet reveals a data breach. The feds sanction a Cambodian senator for forced labor scams. UK police arrest a teen linked to the Transport for London cyberattack. New Linux malware targets Oracle WebLogic. Citrix patches critical Workspace app flaws. Microsoft unveils updates to prevent outages like the CrowdStrike incident. U.S. Space Systems invests in secure communications. Illegal gun-conversion sites get taken down. Tim Starks of CyberScoop tracks Russian hackers mimicking spyware vendors. Cybersecurity hiring gaps persist. Hackers use eye-tracking to steal passwords.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today, we welcome back <a href="https://www.linkedin.com/in/tstarks/">Tim Starks</a>, senior reporter from <a href="https://cyberscoop.com/">CyberScoop</a>, to discuss “Google: apparent Russian hackers play copycat to commercial spyware vendors.” You can read the article Tim refers to <a href="https://cyberscoop.com/apt29-spyware-google-threat-analysis-group/">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://socradar.io/fortinet-data-breach-what-we-know-so-far/">Fortinet Data Breach: What We Know So Far</a> (SOCRadar)</p><p><a href="https://www.theregister.com/2024/09/13/cambodian_senator_sanctioned_for_cyberscams/">Cambodian senator sanctioned by US over cyber-scams </a>(The Register)</p><p><a href="https://securityaffairs.com/168327/uncategorized/uk-nca-arrested-teenager-transport-for-london-attack.html">UK NCA arrested a teenager linked to the attack on Transport for London</a> (Security Affairs)</p><p><a href="https://www.securityweek.com/new-hadooken-linux-malware-targets-weblogic-servers/">New 'Hadooken' Linux Malware Targets WebLogic Servers </a>(SecurityWeek)</p><p><a href="https://cybersecuritynews.com/citrix-workspace-privilege-escalation/">Citrix Workspace App Vulnerabilities Allow Privilege Escalation Attacks</a> (Cyber Security News)</p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-prevent-crowdstrike/">Microsoft Vows to Prevent Future CrowdStrike-Like Outages</a> (Infosecurity Magazine)</p><p><a href="https://www.ssc.spaceforce.mil/Portals/3/PA-912%20%28Document%29%20-%20Press%20Release%20m1T%20Follow-On%20Contract%20Award%20-%20PA%20edits.pdf">Space Systems Command Awards $188M Contract for meshONE-T Follow-on</a> (Space Systems Command)</p><p><a href="https://www.theregister.com/2024/09/13/gun_switch_domains_seized/">Domains seized for allegedly importing Chinese gun switches</a> (The Register)</p><p><a href="https://securityboulevard.com/2024/09/why-breaking-into-cybersecurity-isnt-as-easy-as-you-think/">Why Breaking into Cybersecurity Isn’t as Easy as You Think</a> (Security Boulevard)</p><p><a href="https://www.wired.com/story/apple-vision-pro-persona-eye-tracking-spy-typing/">Apple Vision Pro’s Eye Tracking Exposed What People Type</a> (WIRED)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1534</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ad95f50a-b95e-11ee-8cf8-2fd6665d9628]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5250350869.mp3?updated=1726257340" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>UK’s newest cybersecurity MVPs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2149/notes</link>
      <description>The UK designates data centers as Critical National Infrastructure. Cisco releases patches for multiple vulnerabilities in its IOS XR network operating system. BYOD is a growing security risk. A Pennsylvania healthcare network has agreed to a $65 million settlement stemming from a 2023 data breach.Google Cloud introduces air-gapped backup vaults. TrickMo is a newly discovered Android banking malware. GitLab has released a critical security update. A $20 domain purchase highlights concerns over WHOIS trust and security. Our guest is Jon France, CISO at ISC2, with insights on Communicating Cyber Risk of New Technology to the Board. And, could Pikachu be a double-agent for Western intelligence agencies?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Jon France, CISO at ISC2, sharing his take on "All on "Board" for AI – Communicating Cyber Risk of New Technology to the Board." This is a session Jon presented at Black Hat USA 2024. You can check out his session’s abstract. Also, N2K CyberWire is a partner of ISC2’s Security Congress 2024. Learn more about the in-person and virtual event here. 

Selected Reading
UK Recognizes Data Centers as Critical National Infrastructure (Infosecurity Magazine)
Cisco Patches High-Severity Vulnerabilities in Network Operating System (SecurityWeek)
BYOD Policies Fueling Security Risks (Security Boulevard)
Healthcare Provider to Pay $65M Settlement Following Ransomware Attack (SecurityWeek)
Google Unveils Air-gapped Backup Vaults to Protect Data from Ransomware Attacks (Cyber Security News)
New Android Banking Malware TrickMo Attacking Users To Steal Login Credentials (Cyber Security News)
GitLab Releases Critical Security Update, Urges Users to Patch Immediately (Cyber Security News)
Rogue WHOIS server gives researcher superpowers no one should ever have (Ars Technica)
Pokémon GO was an intelligence tool, claims Belarus military official (The Register) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential security leaders in the industry. Learn more about our network sponsorship opportunities and build your brand where industry leaders get their daily news.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 12 Sep 2024 20:10:00 -0000</pubDate>
      <itunes:title>UK’s newest cybersecurity MVPs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2149</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The UK designates data centers as Critical National Infrastructure. Cisco releases patches for multiple vulnerabilities in its IOS XR network operating system. BYOD is a growing security risk. A Pennsylvania healthcare network has agreed to a $65 million settlement stemming from a 2023 data breach.Google Cloud introduces air-gapped backup vaults. TrickMo is a newly discovered Android banking malware. GitLab has released a critical security update. A $20 domain purchase highlights concerns over WHOIS trust and security. Our guest is Jon France, CISO at ISC2, with insights on Communicating Cyber Risk of New Technology to the Board. And, could Pikachu be a double-agent for Western intelligence agencies?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Jon France, CISO at ISC2, sharing his take on "All on "Board" for AI – Communicating Cyber Risk of New Technology to the Board." This is a session Jon presented at Black Hat USA 2024. You can check out his session’s abstract. Also, N2K CyberWire is a partner of ISC2’s Security Congress 2024. Learn more about the in-person and virtual event here. 

Selected Reading
UK Recognizes Data Centers as Critical National Infrastructure (Infosecurity Magazine)
Cisco Patches High-Severity Vulnerabilities in Network Operating System (SecurityWeek)
BYOD Policies Fueling Security Risks (Security Boulevard)
Healthcare Provider to Pay $65M Settlement Following Ransomware Attack (SecurityWeek)
Google Unveils Air-gapped Backup Vaults to Protect Data from Ransomware Attacks (Cyber Security News)
New Android Banking Malware TrickMo Attacking Users To Steal Login Credentials (Cyber Security News)
GitLab Releases Critical Security Update, Urges Users to Patch Immediately (Cyber Security News)
Rogue WHOIS server gives researcher superpowers no one should ever have (Ars Technica)
Pokémon GO was an intelligence tool, claims Belarus military official (The Register) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential security leaders in the industry. Learn more about our network sponsorship opportunities and build your brand where industry leaders get their daily news.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The UK designates data centers as Critical National Infrastructure. Cisco releases patches for multiple vulnerabilities in its IOS XR network operating system. BYOD is a growing security risk. A Pennsylvania healthcare network has agreed to a $65 million settlement stemming from a 2023 data breach.Google Cloud introduces air-gapped backup vaults. TrickMo is a newly discovered Android banking malware. GitLab has released a critical security update. A $20 domain purchase highlights concerns over WHOIS trust and security. Our guest is Jon France, CISO at ISC2, with insights on Communicating Cyber Risk of New Technology to the Board. And, could Pikachu be a double-agent for Western intelligence agencies?</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is<a href="https://www.linkedin.com/in/jonfrance/"> Jon France</a>, CISO at <a href="https://www.isc2.org/">ISC2</a>, sharing his take on "All on "Board" for AI – Communicating Cyber Risk of New Technology to the Board." This is a session Jon presented at Black Hat USA 2024. You can check out his <a href="https://www.blackhat.com/us-24/features/schedule/index.html#all-on-board-for-ai--communicating-cyber-risk-of-new-technology-to-the-board-40899">session’s abstract</a>. Also, N2K CyberWire is a partner of ISC2’s Security Congress 2024. Learn more about the in-person and virtual event <a href="https://web.cvent.com/event/a5c15481-492d-4efa-bd79-a521ab73b699/websitePage:26a84091-6c86-411e-9e16-6613ec20a219">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.infosecurity-magazine.com/news/uk-data-centers-critical-national/">UK Recognizes Data Centers as Critical National Infrastructure</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/cisco-patches-high-severity-vulnerabilities-in-network-operating-system/">Cisco Patches High-Severity Vulnerabilities in Network Operating System</a> (SecurityWeek)</p><p><a href="https://securityboulevard.com/2024/09/byod-policies-fueling-security-risks/">BYOD Policies Fueling Security Risks</a> (Security Boulevard)</p><p><a href="https://www.securityweek.com/pennsylvania-healthcare-provider-to-pay-65m-settlement-following-ransomware-attack/">Healthcare Provider to Pay $65M Settlement Following Ransomware Attack </a>(SecurityWeek)</p><p><a href="https://cybersecuritynews.com/google-air-gapped-backup-vaults/">Google Unveils Air-gapped Backup Vaults to Protect Data from Ransomware Attacks</a> (Cyber Security News)</p><p><a href="https://cybersecuritynews.com/trickmo-android-banking-malware-attack/">New Android Banking Malware TrickMo Attacking Users To Steal Login Credentials</a> (Cyber Security News)</p><p><a href="https://cybersecuritynews.com/gitlab-critical-security-update/">GitLab Releases Critical Security Update, Urges Users to Patch Immediately</a> (Cyber Security News)</p><p><a href="https://arstechnica.com/security/2024/09/rogue-whois-server-gives-researcher-superpowers-no-one-should-ever-have/">Rogue WHOIS server gives researcher superpowers no one should ever have</a> (Ars Technica)</p><p><a href="https://www.theregister.com/2024/09/12/pokemon_go_spying_belarus_claims/">Pokémon GO was an intelligence tool, claims Belarus military official</a> (The Register) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential security leaders in the industry. Learn more about our <a href="https://sponsor.thecyberwire.com/">network sponsorship opportunities</a> and build your brand where industry leaders get their daily news.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1709</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ad5d6078-b95e-11ee-8cf8-afb0007307d8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8503904197.mp3?updated=1726172669" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A Patch Tuesday overload.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2148/notes</link>
      <description>Patch Tuesday rundown. Microsoft integrates post-quantum cryptography (PQC) algorithms into its SymCrypt cryptographic library.The FTC finalizes rules to combat fake reviews and testimonials. A payment card thief pleads guilty. On our latest CertByte segment, N2K’s Chris Hare and George Monsalvatge share questions and study tips from the Microsoft Azure Fundamentals (AZ-900) Practice Test.  Hard Drive Heaven: How Iconic Music Sessions Are Disappearing. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K.
In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by resident Microsoft SME George Monsalvatge to break down a question from N2K’s Microsoft Azure Fundamentals (AZ-900) Practice Test.
﻿Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. 

Reference:
What is public cloud? (RedHat)
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.

Remembering 9/11
In today’s episode, we pause to honor and remember the lives lost on September 11, 2001. We pay tribute to the courageous first responders, the resilient survivors, and the families whose lives were forever altered by that tragic day. Amidst the profound loss, the spirit of unity and compassion shone brightly, reminding us of our shared humanity.
Additionally, you can check out our special segment featuring personal remembrances from N2K CyberWire’s very own Rick Howard, who was in the Pentagon on that fateful day. His reflections provide a heartfelt perspective on the events and are well worth your time. Tune in to hear his poignant insights.

Special Edition Podcast
In today’s special edition of Solution Spotlight, we welcome Mary Haigh, Global CISO of BAE Systems, as she sits down with N2K’s Simone Petrella. Together, they discuss moving beyond the technical aspects of cybersecurity to build and lead a high-performing security team. 

Selected Reading
Microsoft Fixes Four Actively Exploited Zero-Days (Infosecurity Magazine)
Adobe releases september 2024 patches for flaws in multiple products, including critical (Beyond Machines)
Chrome 128 Update Resolves High-Severity Vulnerabilities (SecurityWeek)
ICS Patch Tuesday: Advisories Published by Siemens, Schneider, ABB, CISA (SecurityWeek)
Ivanti fixes maximum severity RCE bug in Endpoint Management software (Bleeping Computer)
Microsoft Adds Support for Post-Quantum Algorithms in SymCrypt Library (SecurityWeek)
Federal Trade Commission Announces Final Rule Banning Fake Reviews and Testimonials (Federal Trade Commission)
Hacker pleads guilty after arriving on plane from Ukraine with a laptop crammed full of stolen credit card details (Bitdefender)
Inside Iron Mountain: It’s Time to Talk About Hard Drives (Mixonline)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach top security leaders. Explore our network sponsorship opportunities and build your brand where industry leaders get their daily news.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 11 Sep 2024 20:10:00 -0000</pubDate>
      <itunes:title>A Patch Tuesday overload.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2148</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Patch Tuesday rundown. Microsoft integrates post-quantum cryptography (PQC) algorithms into its SymCrypt cryptographic library.The FTC finalizes rules to combat fake reviews and testimonials. A payment card thief pleads guilty. On our latest CertByte segment, N2K’s Chris Hare and George Monsalvatge share questions and study tips from the Microsoft Azure Fundamentals (AZ-900) Practice Test.  Hard Drive Heaven: How Iconic Music Sessions Are Disappearing. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K.
In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by resident Microsoft SME George Monsalvatge to break down a question from N2K’s Microsoft Azure Fundamentals (AZ-900) Practice Test.
﻿Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify. 

Reference:
What is public cloud? (RedHat)
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.

Remembering 9/11
In today’s episode, we pause to honor and remember the lives lost on September 11, 2001. We pay tribute to the courageous first responders, the resilient survivors, and the families whose lives were forever altered by that tragic day. Amidst the profound loss, the spirit of unity and compassion shone brightly, reminding us of our shared humanity.
Additionally, you can check out our special segment featuring personal remembrances from N2K CyberWire’s very own Rick Howard, who was in the Pentagon on that fateful day. His reflections provide a heartfelt perspective on the events and are well worth your time. Tune in to hear his poignant insights.

Special Edition Podcast
In today’s special edition of Solution Spotlight, we welcome Mary Haigh, Global CISO of BAE Systems, as she sits down with N2K’s Simone Petrella. Together, they discuss moving beyond the technical aspects of cybersecurity to build and lead a high-performing security team. 

Selected Reading
Microsoft Fixes Four Actively Exploited Zero-Days (Infosecurity Magazine)
Adobe releases september 2024 patches for flaws in multiple products, including critical (Beyond Machines)
Chrome 128 Update Resolves High-Severity Vulnerabilities (SecurityWeek)
ICS Patch Tuesday: Advisories Published by Siemens, Schneider, ABB, CISA (SecurityWeek)
Ivanti fixes maximum severity RCE bug in Endpoint Management software (Bleeping Computer)
Microsoft Adds Support for Post-Quantum Algorithms in SymCrypt Library (SecurityWeek)
Federal Trade Commission Announces Final Rule Banning Fake Reviews and Testimonials (Federal Trade Commission)
Hacker pleads guilty after arriving on plane from Ukraine with a laptop crammed full of stolen credit card details (Bitdefender)
Inside Iron Mountain: It’s Time to Talk About Hard Drives (Mixonline)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach top security leaders. Explore our network sponsorship opportunities and build your brand where industry leaders get their daily news.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Patch Tuesday rundown. Microsoft integrates post-quantum cryptography (PQC) algorithms into its SymCrypt cryptographic library.The FTC finalizes rules to combat fake reviews and testimonials. A payment card thief pleads guilty. On our latest CertByte segment, N2K’s Chris Hare and George Monsalvatge share questions and study tips from the Microsoft Azure Fundamentals (AZ-900) Practice Test.  Hard Drive Heaven: How Iconic Music Sessions Are Disappearing.<strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2><strong>CertByte Segment</strong></h2><p>Welcome to CertByte! On this bi-weekly segment hosted by <a href="https://www.linkedin.com/in/chrisharepmp/">Chris Hare</a>, a content developer and project management specialist at <a href="https://www.n2k.com/">N2K</a>.</p><p>In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by resident Microsoft SME <a href="https://www.linkedin.com/in/george-monsalvatge-abb2172/">George Monsalvatge</a> to break down a question from N2K’s <a href="https://certify.cybervista.net/products/microsoft/microsoft-azure-fundamentals-practice-test/">Microsoft Azure Fundamentals (AZ-900) Practice Test</a>.</p><p>﻿Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at <a href="http://n2k.com/certify">n2k.com/certify</a>. </p><p><br></p><h2>Reference:</h2><p><a href="https://www.redhat.com/en/topics/cloud-computing/what-is-public-cloud">What is public cloud?</a> (RedHat)</p><p><em>Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.</em></p><p><br></p><h2>Remembering 9/11</h2><p>In today’s episode, we pause to honor and remember the lives lost on September 11, 2001. We pay tribute to the courageous first responders, the resilient survivors, and the families whose lives were forever altered by that tragic day. Amidst the profound loss, the spirit of unity and compassion shone brightly, reminding us of our shared humanity.</p><p>Additionally, you can check out our <a href="https://thecyberwire.com/podcasts/cso-perspectives-public/5572/notes">special segment</a> featuring personal remembrances from N2K CyberWire’s very own <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a>, who was in the Pentagon on that fateful day. His reflections provide a heartfelt perspective on the events and are well worth your time. Tune in to hear his poignant insights.</p><p><br></p><h2>Special Edition Podcast</h2><p>In today’s special edition of <a href="https://thecyberwire.com/podcasts/special-edition/72/notes">Solution Spotlight</a>, we welcome <a href="https://www.linkedin.com/in/mary-haigh-29611625/">Mary Haigh</a>, Global CISO of BAE Systems, as she sits down with N2K’s <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a>. Together, they discuss moving beyond the technical aspects of cybersecurity to build and lead a high-performing security team. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.infosecurity-magazine.com/news/microsoft-fixes-four-actively/">Microsoft Fixes Four Actively Exploited Zero-Days </a>(Infosecurity Magazine)</p><p><a href="https://beyondmachines.net/event_details/adobe-releases-patches-for-acrobat-reader-and-cold-fusion-4-o-i-n-a/gD2P6Ple2L">Adobe releases september 2024 patches for flaws in multiple products, including critical</a> (Beyond Machines)</p><p><a href="https://www.securityweek.com/chrome-128-update-resolves-high-severity-vulnerabilities/">Chrome 128 Update Resolves High-Severity Vulnerabilities</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/ics-patch-tuesday-advisories-published-by-siemens-schneider-abb-cisa/">ICS Patch Tuesday: Advisories Published by Siemens, Schneider, ABB, CISA</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/ivanti-fixes-maximum-severity-rce-bug-in-endpoint-management-software/">Ivanti fixes maximum severity RCE bug in Endpoint Management software</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/microsoft-adds-support-for-post-quantum-algorithms-in-symcrypt-library/">Microsoft Adds Support for Post-Quantum Algorithms in SymCrypt Library</a> (SecurityWeek)</p><p><a href="https://www.ftc.gov/news-events/news/press-releases/2024/08/federal-trade-commission-announces-final-rule-banning-fake-reviews-testimonials">Federal Trade Commission Announces Final Rule Banning Fake Reviews and Testimonials</a> (Federal Trade Commission)</p><p><a href="https://www.bitdefender.com/blog/hotforsecurity/hacker-pleads-guilty-after-arriving-on-plane-from-ukraine-with-a-laptop-crammed-full-of-stolen-credit-card-details/">Hacker pleads guilty after arriving on plane from Ukraine with a laptop crammed full of stolen credit card details</a> (Bitdefender)</p><p><a href="https://www.mixonline.com/business/inside-iron-mountain-its-time-to-talk-about-hard-drives">Inside Iron Mountain: It’s Time to Talk About Hard Drives</a> (Mixonline)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach top security leaders. Explore our <a href="https://sponsor.thecyberwire.com/">network sponsorship opportunities</a> and build your brand where industry leaders get their daily news.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1365</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ad1bda86-b95e-11ee-8cf8-ab209eec1192]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5875330115.mp3?updated=1726081673" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Solution Spotlight: Mary Haigh, Global CISO of BAE Systems, on building a cybersecurity team.</title>
      <link>https://thecyberwire.com/podcasts/special-edition/72/notes</link>
      <description>On this Solution Spotlight, guest Dr. Mary Haigh, Global CISO of BAE Systems, speaks with N2K President Simone Petrella about moving beyond the technical to build a cybersecurity team.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 11 Sep 2024 06:00:00 -0000</pubDate>
      <itunes:title>Solution Spotlight: Mary Haigh, Global CISO of BAE Systems, on building a cybersecurity team.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>72</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this Solution Spotlight, guest Dr. Mary Haigh, Global CISO of BAE Systems, speaks with N2K President Simone Petrella about moving beyond the technical to build a cybersecurity team.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this Solution Spotlight, guest Dr. <a href="https://www.linkedin.com/in/mary-haigh-29611625/">Mary Haigh</a>, Global CISO of <a href="https://www.baesystems.com/en/home">BAE Systems</a>, speaks with <a href="https://www.n2k.com/">N2K</a> President <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a> about moving beyond the technical to build a cybersecurity team.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1511</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b141cf12-6fac-11ef-9861-6fec885535b2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2474378852.mp3?updated=1726014432" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stealth, command, exfiltrate: The three-headed cyber dragon of Crimson Palace.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2147/notes</link>
      <description>Crimson Palace targets Asian organizations on behalf of the PRC. Europe’s AI Convention has lofty goals and legal loopholes. The NoName ransomware gang may be working as a RansomHub affiliate. Wisconsin Physicians Service Insurance Corporation, SLIM CD, and Acadian Ambulance Service each suffer significant data breaches. CISA adds three vulnerabilities to its Known Exploited Vulnerabilities Catalog. Researchers from Ben-Gurion University in Israel develop new techniques to exfiltrate data from air-gapped computers. In our latest Threat Vector segment, David Moulton, Director of Thought Leadership at Unit 42, sits down with Ryan Barger, Director of Offensive Security Services, to explore how AI is revolutionizing offensive security. Sextortion scammers have gone to the dogs. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
In this segment of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, sits down with Ryan Barger, Director of Offensive Security Services, to explore how AI is revolutionizing offensive security. Ryan delves into the practical applications of AI in tasks such as OSINT analysis, payload development, and evading endpoint detection systems. To listen to their full conversation, check out the episode here. You can catch new episodes of Threat Vector every Thursday on the N2K CyberWire network. 

Selected Reading
Chinese Tag Team APTs Keep Stealing Asian Gov't Secrets (Dark Reading)
The AI Convention: Lofty Goals, Legal Loopholes, and National Security Caveats (SecurityWeek)
NoName ransomware gang deploying RansomHub malware in recent attacks (Bleeping Computer)
Wisconsin Insurer Discloses Data Breach Impacting 950,000 Individuals (SecurityWeek)
Payment Gateway SLIM CD Data Breach: 1.7 Million Users Impacted (HACKREAD)
Acadian Ambulance service is reporting data breach, exposing almost 3 Million people (Beyond Machines)
CISA Warns of Three Vulnerabilities That Are Actively Exploited in the Wild (Cyber Security News)
Researchers Detail Attacks on Air-Gapped Computers to Steal Data (Cyber Security News)
Sextortion scams now use your "cheating" spouse’s name as a lure (Bleeping Computer) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Sep 2024 20:10:00 -0000</pubDate>
      <itunes:title>Stealth, command, exfiltrate: The three-headed cyber dragon of Crimson Palace.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2147</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Crimson Palace targets Asian organizations on behalf of the PRC. Europe’s AI Convention has lofty goals and legal loopholes. The NoName ransomware gang may be working as a RansomHub affiliate. Wisconsin Physicians Service Insurance Corporation, SLIM CD, and Acadian Ambulance Service each suffer significant data breaches. CISA adds three vulnerabilities to its Known Exploited Vulnerabilities Catalog. Researchers from Ben-Gurion University in Israel develop new techniques to exfiltrate data from air-gapped computers. In our latest Threat Vector segment, David Moulton, Director of Thought Leadership at Unit 42, sits down with Ryan Barger, Director of Offensive Security Services, to explore how AI is revolutionizing offensive security. Sextortion scammers have gone to the dogs. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
In this segment of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, sits down with Ryan Barger, Director of Offensive Security Services, to explore how AI is revolutionizing offensive security. Ryan delves into the practical applications of AI in tasks such as OSINT analysis, payload development, and evading endpoint detection systems. To listen to their full conversation, check out the episode here. You can catch new episodes of Threat Vector every Thursday on the N2K CyberWire network. 

Selected Reading
Chinese Tag Team APTs Keep Stealing Asian Gov't Secrets (Dark Reading)
The AI Convention: Lofty Goals, Legal Loopholes, and National Security Caveats (SecurityWeek)
NoName ransomware gang deploying RansomHub malware in recent attacks (Bleeping Computer)
Wisconsin Insurer Discloses Data Breach Impacting 950,000 Individuals (SecurityWeek)
Payment Gateway SLIM CD Data Breach: 1.7 Million Users Impacted (HACKREAD)
Acadian Ambulance service is reporting data breach, exposing almost 3 Million people (Beyond Machines)
CISA Warns of Three Vulnerabilities That Are Actively Exploited in the Wild (Cyber Security News)
Researchers Detail Attacks on Air-Gapped Computers to Steal Data (Cyber Security News)
Sextortion scams now use your "cheating" spouse’s name as a lure (Bleeping Computer) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Crimson Palace targets Asian organizations on behalf of the PRC. Europe’s AI Convention has lofty goals and legal loopholes. The NoName ransomware gang may be working as a RansomHub affiliate. Wisconsin Physicians Service Insurance Corporation, SLIM CD, and Acadian Ambulance Service each suffer significant data breaches. CISA adds three vulnerabilities to its Known Exploited Vulnerabilities Catalog. Researchers from Ben-Gurion University in Israel develop new techniques to exfiltrate data from air-gapped computers. In our latest Threat Vector segment, David Moulton, Director of Thought Leadership at Unit 42, sits down with Ryan Barger, Director of Offensive Security Services, to explore how AI is revolutionizing offensive security. Sextortion scammers have gone to the dogs. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Threat Vector Segment</h2><p>In this segment of Threat Vector, <a href="https://www.linkedin.com/in/davidrmoulton">David Moulton</a>, Director of Thought Leadership at Unit 42, sits down with <a href="https://www.linkedin.com/in/ryan-barger/">Ryan Barger</a>, Director of Offensive Security Services, to explore how AI is revolutionizing offensive security. Ryan delves into the practical applications of AI in tasks such as OSINT analysis, payload development, and evading endpoint detection systems. To listen to their full conversation, check out the episode <a href="https://thecyberwire.com/podcasts/threat-vector/29/notes">here</a>. You can catch new episodes of <a href="https://thecyberwire.com/podcasts/threat-vector">Threat Vector</a> every Thursday on the N2K CyberWire network. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.darkreading.com/threat-intelligence/chinese-tag-team-apts-keep-stealing-asian-govt-secrets">Chinese Tag Team APTs Keep Stealing Asian Gov't Secrets</a> (Dark Reading)</p><p><a href="https://www.securityweek.com/the-ai-convention-lofty-goals-legal-loopholes-and-national-security-caveats/">The AI Convention: Lofty Goals, Legal Loopholes, and National Security Caveats</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/noname-ransomware-gang-deploying-ransomhub-malware-in-recent-attacks/">NoName ransomware gang deploying RansomHub malware in recent attacks</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/wisconsin-insurer-discloses-data-breach-impacting-950000-individuals/">Wisconsin Insurer Discloses Data Breach Impacting 950,000 Individuals</a> (SecurityWeek)</p><p><a href="https://hackread.com/payment-gateway-slim-cd-data-breach-millions-impacted/">Payment Gateway SLIM CD Data Breach: 1.7 Million Users Impacted</a> (HACKREAD)</p><p><a href="https://beyondmachines.net/event_details/acadian-ambulance-service-is-reporting-data-breach-exposing-almost-3-million-people-1-y-1-p-8/gD2P6Ple2L">Acadian Ambulance service is reporting data breach, exposing almost 3 Million people</a> (Beyond Machines)</p><p><a href="https://cybersecuritynews.com/cisa-warns-of-three-vulnerabilities/">CISA Warns of Three Vulnerabilities That Are Actively Exploited in the Wild</a> (Cyber Security News)</p><p><a href="https://cybersecuritynews.com/attacks-on-air-gapped/">Researchers Detail Attacks on Air-Gapped Computers to Steal Data</a> (Cyber Security News)</p><p><a href="https://www.bleepingcomputer.com/news/security/sextortion-scams-now-use-your-cheating-spouses-name-as-a-lure/">Sextortion scams now use your "cheating" spouse’s name as a lure</a> (Bleeping Computer) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1486</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[acdd9c12-b95e-11ee-8cf8-b36f55381d16]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8603289292.mp3?updated=1725993907" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A ticking clock to exploitation.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2146/notes</link>
      <description>Patch Now alerts come from Progress Software and Veeam Backup &amp; Restoration. Car rental giant Avis notifies nearly 300,000 customers of a data breach. The UK’s National Crime Agency struggles to retain top cyber talent. Two Nigerian brothers get prison time for their roles in a deadly sextortion scheme. SpyAgent malware uses OCR to steal cryptocurrency. A Seattle area school district suffers a cybercrime snow day. Our guest is Amer Deeba, CEO of Normalyze, discussing data’s version of hide and go seek -  the emergence of shadow data. A crypto leader resigns after being held at gunpoint. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Amer Deeba, CEO of Normalyze, discussing data’s version of hide and go seek, or the emergence of shadow data.

Selected Reading
Progress LoadMaster vulnerable to 10/10 severity RCE flaw (Bleeping Computer)
New Veeam Vulnerability Puts Thousands of Backup Servers at Risk – PATCH NOW! (HACKREAD)
Thousands of Avis car rental customers had personal data stolen in cyberattack (TechCrunch)
UK National Crime Agency, responsible for fighting cybercrime, ‘on its knees,’ warns report (The Record)
2 Brothers Sentenced to More Than 17 Years in Prison in Sextortion Scheme (The New York Times)
SpyAgent Android malware steals your crypto recovery phrases from images (Bleeping Computer)
Highline schools closing Monday because of cyberattack (Seattle Times)
Crypto Firm CEO Resigns Following Armed Robbery of Company Funds (Blockonomi)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 09 Sep 2024 20:10:00 -0000</pubDate>
      <itunes:title>A ticking clock to exploitation.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2146</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Patch Now alerts come from Progress Software and Veeam Backup &amp; Restoration. Car rental giant Avis notifies nearly 300,000 customers of a data breach. The UK’s National Crime Agency struggles to retain top cyber talent. Two Nigerian brothers get prison time for their roles in a deadly sextortion scheme. SpyAgent malware uses OCR to steal cryptocurrency. A Seattle area school district suffers a cybercrime snow day. Our guest is Amer Deeba, CEO of Normalyze, discussing data’s version of hide and go seek -  the emergence of shadow data. A crypto leader resigns after being held at gunpoint. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Amer Deeba, CEO of Normalyze, discussing data’s version of hide and go seek, or the emergence of shadow data.

Selected Reading
Progress LoadMaster vulnerable to 10/10 severity RCE flaw (Bleeping Computer)
New Veeam Vulnerability Puts Thousands of Backup Servers at Risk – PATCH NOW! (HACKREAD)
Thousands of Avis car rental customers had personal data stolen in cyberattack (TechCrunch)
UK National Crime Agency, responsible for fighting cybercrime, ‘on its knees,’ warns report (The Record)
2 Brothers Sentenced to More Than 17 Years in Prison in Sextortion Scheme (The New York Times)
SpyAgent Android malware steals your crypto recovery phrases from images (Bleeping Computer)
Highline schools closing Monday because of cyberattack (Seattle Times)
Crypto Firm CEO Resigns Following Armed Robbery of Company Funds (Blockonomi)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Patch Now alerts come from Progress Software and Veeam Backup &amp; Restoration. Car rental giant Avis notifies nearly 300,000 customers of a data breach. The UK’s National Crime Agency struggles to retain top cyber talent. Two Nigerian brothers get prison time for their roles in a deadly sextortion scheme. SpyAgent malware uses OCR to steal cryptocurrency. A Seattle area school district suffers a cybercrime snow day. Our guest is Amer Deeba, CEO of Normalyze, discussing data’s version of hide and go seek -  the emergence of shadow data. A crypto leader resigns after being held at gunpoint. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/amer-deeba-39276/">Amer Deeba</a>, CEO of <a href="https://normalyze.ai/">Normalyze</a>, discussing data’s version of hide and go seek, or the emergence of shadow data.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/progress-loadmaster-vulnerable-to-10-10-severity-rce-flaw/">Progress LoadMaster vulnerable to 10/10 severity RCE flaw</a> (Bleeping Computer)</p><p><a href="https://hackread.com/new-veeam-vulnerability-backup-servers-at-risk/">New Veeam Vulnerability Puts Thousands of Backup Servers at Risk – PATCH NOW!</a> (HACKREAD)</p><p><a href="https://techcrunch.com/2024/09/09/thousands-of-avis-car-rental-customers-had-personal-data-stolen-in-cyberattack/">Thousands of Avis car rental customers had personal data stolen in cyberattack</a> (TechCrunch)</p><p><a href="https://therecord.media/uk-national-crime-agency-nca-on-its-knees-report-says">UK National Crime Agency, responsible for fighting cybercrime, ‘on its knees,’ warns report</a> (The Record)</p><p><a href="https://www.nytimes.com/2024/09/05/us/nigeria-brothers-sentence-sex-extortion.html">2 Brothers Sentenced to More Than 17 Years in Prison in Sextortion Scheme</a> (The New York Times)</p><p><a href="https://www.bleepingcomputer.com/news/security/spyagent-android-malware-steals-your-crypto-recovery-phrases-from-images/?ref=metacurity.com">SpyAgent Android malware steals your crypto recovery phrases from images</a> (Bleeping Computer)</p><p><a href="https://www.seattletimes.com/education-lab/highline-schools-closing-monday-because-of-technology-breach">Highline schools closing Monday because of cyberattack</a> (Seattle Times)</p><p><a href="https://blockonomi.com/crypto-firm-ceo-resigns-following-armed-robbery-of-company-funds/">Crypto Firm CEO Resigns Following Armed Robbery of Company Funds</a> (Blockonomi)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1615</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ac9c87ea-b95e-11ee-8cf8-6f21cd441126]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4784776070.mp3?updated=1725906542" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ann Johnson: Trying to make the world safer. [Business Development] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/32/notes</link>
      <description>Enjoy this special encore episode where we are joined by, Microsoft's Corporate Vice President of Cybersecurity Business Development Ann Johnson brings us on her career journey from aspiring lawyer to cybersecurity executive. After pivoting from studying law, Ann started working with computers and found she had a deep technical aptitude for technology and started earning certifications landing in cybersecurity because she found an interest in PKI. At Microsoft, Ann says she solves some of the hardest problems every day. She recommends getting a mentor and finding your area of expertise. She leaves us with three dimensions she hopes to be her legacy: 1. diversity in more than just gender, 2. bringing a human aspect to the industry, and 3. being empathetic to the user experience. We thank Ann for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 08 Sep 2024 07:00:00 -0000</pubDate>
      <itunes:title>Ann Johnson: Trying to make the world safer. [Business Development] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>35</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this special encore episode where we are joined by, Microsoft's Corporate Vice President of Cybersecurity Business Development Ann Johnson brings us on her career journey from aspiring lawyer to cybersecurity executive. After pivoting from studying law, Ann started working with computers and found she had a deep technical aptitude for technology and started earning certifications landing in cybersecurity because she found an interest in PKI. At Microsoft, Ann says she solves some of the hardest problems every day. She recommends getting a mentor and finding your area of expertise. She leaves us with three dimensions she hopes to be her legacy: 1. diversity in more than just gender, 2. bringing a human aspect to the industry, and 3. being empathetic to the user experience. We thank Ann for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special encore episode where we are joined by, Microsoft's Corporate Vice President of Cybersecurity Business Development Ann Johnson brings us on her career journey from aspiring lawyer to cybersecurity executive. After pivoting from studying law, Ann started working with computers and found she had a deep technical aptitude for technology and started earning certifications landing in cybersecurity because she found an interest in PKI. At Microsoft, Ann says she solves some of the hardest problems every day. She recommends getting a mentor and finding your area of expertise. She leaves us with three dimensions she hopes to be her legacy: 1. diversity in more than just gender, 2. bringing a human aspect to the industry, and 3. being empathetic to the user experience. We thank Ann for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>437</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[869ddd5c-6d20-11ef-8c06-ebec9d733c4b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8506936220.mp3?updated=1725717495" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The playbook for outpacing China. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/345/notes</link>
      <description>This week, N2K's very own Brandon Karpf sits down with Kevin Lentz, Team Leader of the Cyber Pacific Project at the Global Disinformation Lab, and they discuss the recent threatcasting report "Cyber Competition in the Indo-Pacific Gray Zone 2035." This report, developed using the Threatcasting Method, examines how the U.S. and Indo-Pacific allies can coordinate their cyber defense efforts in response to future competition with China. 
It presents findings, trends, and recommendations based on twenty-five scenarios simulated by a cross-functional group of experts to anticipate and address emerging threats over the next decade.
The research can be found here:
Cyber Competition in the Indo-Pacific Gray Zone 2035

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Sep 2024 07:00:00 -0000</pubDate>
      <itunes:title>The playbook for outpacing China. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>345</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, N2K's very own Brandon Karpf sits down with Kevin Lentz, Team Leader of the Cyber Pacific Project at the Global Disinformation Lab, and they discuss the recent threatcasting report "Cyber Competition in the Indo-Pacific Gray Zone 2035." This report, developed using the Threatcasting Method, examines how the U.S. and Indo-Pacific allies can coordinate their cyber defense efforts in response to future competition with China. 
It presents findings, trends, and recommendations based on twenty-five scenarios simulated by a cross-functional group of experts to anticipate and address emerging threats over the next decade.
The research can be found here:
Cyber Competition in the Indo-Pacific Gray Zone 2035

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, <a href="https://www.linkedin.com/company/n2k-networks/">N2K</a>'s very own <a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a> sits down with <a href="https://www.linkedin.com/in/kevinjameslentz/">Kevin Lentz</a>, Team Leader of the Cyber Pacific Project at the <a href="https://www.linkedin.com/company/ut-gdil/">Global Disinformation Lab</a>, and they discuss the recent threatcasting <a href="https://athena.westpoint.edu/items/23747390-fc5a-4618-a038-2f26651a1bca">report</a> "Cyber Competition in the Indo-Pacific Gray Zone 2035." This report, developed using the Threatcasting Method, examines how the U.S. and Indo-Pacific allies can coordinate their cyber defense efforts in response to future competition with China. </p><p>It presents findings, trends, and recommendations based on twenty-five scenarios simulated by a cross-functional group of experts to anticipate and address emerging threats over the next decade.</p><p>The research can be found here:</p><ul><li><a href="https://athena.westpoint.edu/items/23747390-fc5a-4618-a038-2f26651a1bca">Cyber Competition in the Indo-Pacific Gray Zone 2035</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1561</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a211d36e-6d1f-11ef-8060-4f5a6b5ccc5c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7131313139.mp3?updated=1725717639" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Blizzard warning: Russia’s GRU unleashes new cyber saboteurs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2145/notes</link>
      <description>Cadet Blizzard is part of Russia’s elite GRU Unit. Apache releases a security update for its open-source ERP system. SonicWall has issued an urgent advisory for a critical vulnerability. Researchers uncover a novel technique exploiting Linux’s Pluggable Authentication Modules. Google’s kCTF team has discloses a critical security vulnerability affecting the Linux kernel’s netfilter component. Predator spyware has resurfaced.  US health care firm Confidant Health exposes 5.3 terabytes of sensitive health information. Dealing with the National Public Data breach. On our Solution Spotlight: Mary Haigh, Global CISO of BAE Systems, speaks with N2K's Simone Petrella about moving beyond the technical to build an effective cybersecurity team. An AI music streaming scheme strikes a sour note. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight segment, Mary Haigh, Global CISO of BAE Systems, speaks with N2K President Simone Petrella about moving beyond the technical to build a cybersecurity team.

Selected Reading
Russia’s Most Notorious Special Forces Unit Now Has Its Own Cyber Warfare Team (WIRED)
Apache Makes Another Attempt at Patching Exploited RCE in OFBiz (SecurityWeek)
SonicWall Access Control Vulnerability Exploited in the Wild (GB Hackers)
Linux Pluggable Authentication Modules Abused to Create Backdoors (Cyber Security News)
PoC Exploit Released for Linux Kernel Vulnerability that Allows Root Access (Cyber Security News)
Predator spyware resurfaces with signs of activity, Recorded Future says (CyberScoop)
Therapy Sessions Exposed by Mental Health Care Firm’s Unsecured Database (WIRED)
Frustration Trying to Opt-Out After the National Public Data Breach (Security Boulevard)
Musician charged with $10M streaming royalties fraud using AI and bots (Bleeping Computer)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 06 Sep 2024 20:10:00 -0000</pubDate>
      <itunes:title>Blizzard warning: Russia’s GRU unleashes new cyber saboteurs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2145</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Cadet Blizzard is part of Russia’s elite GRU Unit. Apache releases a security update for its open-source ERP system. SonicWall has issued an urgent advisory for a critical vulnerability. Researchers uncover a novel technique exploiting Linux’s Pluggable Authentication Modules. Google’s kCTF team has discloses a critical security vulnerability affecting the Linux kernel’s netfilter component. Predator spyware has resurfaced.  US health care firm Confidant Health exposes 5.3 terabytes of sensitive health information. Dealing with the National Public Data breach. On our Solution Spotlight: Mary Haigh, Global CISO of BAE Systems, speaks with N2K's Simone Petrella about moving beyond the technical to build an effective cybersecurity team. An AI music streaming scheme strikes a sour note. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight segment, Mary Haigh, Global CISO of BAE Systems, speaks with N2K President Simone Petrella about moving beyond the technical to build a cybersecurity team.

Selected Reading
Russia’s Most Notorious Special Forces Unit Now Has Its Own Cyber Warfare Team (WIRED)
Apache Makes Another Attempt at Patching Exploited RCE in OFBiz (SecurityWeek)
SonicWall Access Control Vulnerability Exploited in the Wild (GB Hackers)
Linux Pluggable Authentication Modules Abused to Create Backdoors (Cyber Security News)
PoC Exploit Released for Linux Kernel Vulnerability that Allows Root Access (Cyber Security News)
Predator spyware resurfaces with signs of activity, Recorded Future says (CyberScoop)
Therapy Sessions Exposed by Mental Health Care Firm’s Unsecured Database (WIRED)
Frustration Trying to Opt-Out After the National Public Data Breach (Security Boulevard)
Musician charged with $10M streaming royalties fraud using AI and bots (Bleeping Computer)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cadet Blizzard is part of Russia’s elite GRU Unit. Apache releases a security update for its open-source ERP system. SonicWall has issued an urgent advisory for a critical vulnerability. Researchers uncover a novel technique exploiting Linux’s Pluggable Authentication Modules. Google’s kCTF team has discloses a critical security vulnerability affecting the Linux kernel’s netfilter component. Predator spyware has resurfaced.  US health care firm Confidant Health exposes 5.3 terabytes of sensitive health information. Dealing with the National Public Data breach. On our Solution Spotlight: Mary Haigh, Global CISO of BAE Systems, speaks with N2K's Simone Petrella about moving beyond the technical to build an effective cybersecurity team. An AI music streaming scheme strikes a sour note. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Solution Spotlight segment, <a href="https://www.linkedin.com/in/mary-haigh-29611625/">Mary Haigh</a>, Global CISO of <a href="https://www.baesystems.com/en/home">BAE Systems</a>, speaks with <a href="https://www.n2k.com/">N2K</a> President <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a> about moving beyond the technical to build a cybersecurity team.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.wired.com/story/russia-gru-unit-29155-hacker-team/">Russia’s Most Notorious Special Forces Unit Now Has Its Own Cyber Warfare Team</a> (WIRED)</p><p><a href="https://www.securityweek.com/apache-makes-another-attempt-at-patching-exploited-rce-in-ofbiz/">Apache Makes Another Attempt at Patching Exploited RCE in OFBiz</a> (SecurityWeek)</p><p><a href="https://gbhackers.com/sonicwall-access-control-vulnerability/">SonicWall Access Control Vulnerability Exploited in the Wild</a> (GB Hackers)</p><p><a href="https://cybersecuritynews.com/linux-pluggable-authentication-modules-abused/">Linux Pluggable Authentication Modules Abused to Create Backdoors</a> (Cyber Security News)</p><p><a href="https://cybersecuritynews.com/poc-exploit-released-for-linux-kernel-vulnerability/">PoC Exploit Released for Linux Kernel Vulnerability that Allows Root Access</a> (Cyber Security News)</p><p><a href="https://cyberscoop.com/predator-spyware-resurfaces-with-signs-of-activity-recorded-future-says/">Predator spyware resurfaces with signs of activity, Recorded Future says</a> (CyberScoop)</p><p><a href="https://www.wired.com/story/confidant-health-therapy-records-database-exposure/">Therapy Sessions Exposed by Mental Health Care Firm’s Unsecured Database </a>(WIRED)</p><p><a href="https://securityboulevard.com/2024/09/frustration-trying-to-opt-out-after-the-national-public-data-breach/">Frustration Trying to Opt-Out After the National Public Data Breach </a>(Security Boulevard)</p><p><a href="https://www.bleepingcomputer.com/news/security/musician-charged-with-10m-streaming-royalties-fraud-using-ai-and-bots/">Musician charged with $10M streaming royalties fraud using AI and bots</a> (Bleeping Computer)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2361</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ac5f954c-b95e-11ee-8cf8-870f20fdf7ba]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6053652300.mp3?updated=1725648901" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>U.S. rains on Russia’s fake news parade.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2144/notes</link>
      <description>The DOJ disrupts Russia’s Doppelganger. NSA boasts over 1,000 public and private partners. The FBI warns of North Korean operatives launching “complex and elaborate” social engineering attacks. Iran pays the ransom to sure up their banking system. Cisco has disclosed two critical vulnerabilities in its Smart Licensing Utility. A Nigerian man gets five years in prison for Business Email Compromise schemes. Planned Parenthood confirms a cyberattack. Our guests are Sara Siegle and Cam Potts from NSA, Co-Hosts of the new show, No Such Podcast. OnlyFans hackers get more than they bargained for. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guests are Sara Siegle, Chief, Strategic Communications and Cam Potts, Co-Host, from NSA sharing their new podcast, No Such Podcast. The NSA launched the first two episodes of their new weekly podcast today. You can catch their trailer here. Visit their show on Libsyn. 

Selected Reading
US Targets Russian Media and Hackers Over Election Meddling (BankInfoSecurity)
NSA Eyes Global Partnerships to Combat Chinese Cyberthreats (BankInfoSecurity)
North Korean scammers prep stealth attacks on crypto outfits (The Register)
Iran pays millions in ransom to end massive cyberattack on banks, officials say (Politico)
DrayTek Vulnerabilities Added to CISA KEV Catalog Exploited in Global Campaign (SecurityWeek)
Critical Cisco Smart Licensing Vulnerabilities Let Attackers Take Over System (Cyber Security News)
Nigerian man sentenced to 5 years for role in BEC operation (CyberScoop)
Planned Parenthood confirms cyberattack as RansomHub claims breach (Bleeping Computer)
Fake OnlyFans cybercrime tool infects hackers with malware (Bleeping Computer)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 05 Sep 2024 20:10:00 -0000</pubDate>
      <itunes:title>U.S. rains on Russia’s fake news parade.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2147</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The DOJ disrupts Russia’s Doppelganger. NSA boasts over 1,000 public and private partners. The FBI warns of North Korean operatives launching “complex and elaborate” social engineering attacks. Iran pays the ransom to sure up their banking system. Cisco has disclosed two critical vulnerabilities in its Smart Licensing Utility. A Nigerian man gets five years in prison for Business Email Compromise schemes. Planned Parenthood confirms a cyberattack. Our guests are Sara Siegle and Cam Potts from NSA, Co-Hosts of the new show, No Such Podcast. OnlyFans hackers get more than they bargained for. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guests are Sara Siegle, Chief, Strategic Communications and Cam Potts, Co-Host, from NSA sharing their new podcast, No Such Podcast. The NSA launched the first two episodes of their new weekly podcast today. You can catch their trailer here. Visit their show on Libsyn. 

Selected Reading
US Targets Russian Media and Hackers Over Election Meddling (BankInfoSecurity)
NSA Eyes Global Partnerships to Combat Chinese Cyberthreats (BankInfoSecurity)
North Korean scammers prep stealth attacks on crypto outfits (The Register)
Iran pays millions in ransom to end massive cyberattack on banks, officials say (Politico)
DrayTek Vulnerabilities Added to CISA KEV Catalog Exploited in Global Campaign (SecurityWeek)
Critical Cisco Smart Licensing Vulnerabilities Let Attackers Take Over System (Cyber Security News)
Nigerian man sentenced to 5 years for role in BEC operation (CyberScoop)
Planned Parenthood confirms cyberattack as RansomHub claims breach (Bleeping Computer)
Fake OnlyFans cybercrime tool infects hackers with malware (Bleeping Computer)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The DOJ disrupts Russia’s Doppelganger. NSA boasts over 1,000 public and private partners. The FBI warns of North Korean operatives launching “complex and elaborate” social engineering attacks. Iran pays the ransom to sure up their banking system. Cisco has disclosed two critical vulnerabilities in its Smart Licensing Utility. A Nigerian man gets five years in prison for Business Email Compromise schemes. Planned Parenthood confirms a cyberattack. Our guests are Sara Siegle and Cam Potts from NSA, Co-Hosts of the new show, No Such Podcast. OnlyFans hackers get more than they bargained for. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guests are Sara Siegle, Chief, Strategic Communications and <a href="https://www.linkedin.com/in/cam-p-the-pao/">Cam Potts</a>, Co-Host, from <a href="https://www.nsa.gov/">NSA</a> sharing their new podcast, <a href="https://www.nsa.gov/Podcast/">No Such Podcast</a>. The NSA launched the first two episodes of their new weekly podcast today. You can catch their trailer <a href="https://www.youtube.com/watch?v=8eB4oUeFtvE">here</a>. Visit their show on <a href="https://directory.libsyn.com/shows/view/id/nosuchpodcast">Libsyn</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bankinfosecurity.com/us-targets-russian-media-hackers-over-election-meddling-a-26199">US Targets Russian Media and Hackers Over Election Meddling</a> (BankInfoSecurity)</p><p><a href="https://www.bankinfosecurity.com/nsa-eyes-global-partnerships-to-combat-chinese-cyber-threats-a-26204">NSA Eyes Global Partnerships to Combat Chinese Cyberthreats</a> (BankInfoSecurity)</p><p><a href="https://www.theregister.com/2024/09/05/fbi_north_korean_scammers_prepping/">North Korean scammers prep stealth attacks on crypto outfits</a> (The Register)</p><p><a href="https://www.politico.eu/article/iran-millions-ransom-massive-cyberattack-banks/">Iran pays millions in ransom to end massive cyberattack on banks, officials say</a> (Politico)</p><p><a href="https://www.securityweek.com/draytek-vulnerabilities-added-to-cisa-kev-catalog-exploited-in-global-campaign/">DrayTek Vulnerabilities Added to CISA KEV Catalog Exploited in Global Campaign</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/cisco-smart-licensing-vulnerabilities/">Critical Cisco Smart Licensing Vulnerabilities Let Attackers Take Over System</a> (Cyber Security News)</p><p><a href="https://cyberscoop.com/nigerian-man-sentenced-to-5-years-for-role-in-bec-operation/">Nigerian man sentenced to 5 years for role in BEC operation</a> (CyberScoop)</p><p><a href="https://www.bleepingcomputer.com/news/security/planned-parenthood-confirms-cyberattack-as-ransomhub-claims-breach/">Planned Parenthood confirms cyberattack as RansomHub claims breach</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/fake-onlyfans-cybercrime-tool-infects-hackers-with-malware/">Fake OnlyFans cybercrime tool infects hackers with malware</a> (Bleeping Computer)</p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1462</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ac209f7c-b95e-11ee-8cf8-53d4bc1a24cc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6341743455.mp3?updated=1725564318" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From secure to clone-tastic.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2143/notes</link>
      <description>Researchers find Yubikeys vulnerable to cloning. Google warns of a serious zero-day Android vulnerability. Zyxel releases patches for multiple vulnerabilities. D-Link urges customers to retire unsupported vulnerable routers. Hackers linked to Russia and Belarus target Latvian websites. The Federal Trade Commission (FTC) reports a sharp rise in Bitcoin ATM-related scams. Dutch authorities fine Clearview AI over thirty million Euros over GDPR violations. Threat actors are misusing the MacroPack red team tool to deploy malware. CISA shies away from influencing content moderation. Our guest is George Barnes, Cyber Practice President at Red Cell Partners and Fmr. Deputy Director of NSA discussing his experience at the agency and now in the VC world. Unauthorized Wi-Fi on a Navy warship Leads to Court-Martial. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is George Barnes, Cyber Practice President and Partner at Red Cell Partners and judge at the 2024 DataTribe Challenge, discussing his experience on both sides, having been at NSA and now in the VC world. Submit your startup to potentially be selected to be part of a startup competition like no other by September 27, 2024.

Selected Reading
YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel (Ars Technica)
Google Issues Android Under Attack Warning As 0-Day Threat Hits Users (Forbes)
Zyxel Patches Critical Vulnerabilities in Networking Devices (SecurityWeek)
D-Link says it is not fixing four RCE flaws in DIR-846W routers (Bleeping Computer)
Hackers linked to Russia and Belarus increasingly target Latvian websites, officials say (The Record)
New FTC Data Shows Massive Increase in Losses to Bitcoin ATM Scams (FTC)
Dutch DPA imposes a fine on Clearview because of illegal data collection for facial recognition | Autoriteit Persoonsgegevens (Autoriteit Persoonsgegevens)
Red Teaming Tool Abused for Malware Deployment (Infosecurity Magazine)
CISA moves away from trying to influence content moderation decisions on election disinformation (CyberScoop)
How Navy chiefs conspired to get themselves illegal warship Wi-Fi (Navy Times)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 04 Sep 2024 20:10:00 -0000</pubDate>
      <itunes:title>From secure to clone-tastic.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2146</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Researchers find Yubikeys vulnerable to cloning. Google warns of a serious zero-day Android vulnerability. Zyxel releases patches for multiple vulnerabilities. D-Link urges customers to retire unsupported vulnerable routers. Hackers linked to Russia and Belarus target Latvian websites. The Federal Trade Commission (FTC) reports a sharp rise in Bitcoin ATM-related scams. Dutch authorities fine Clearview AI over thirty million Euros over GDPR violations. Threat actors are misusing the MacroPack red team tool to deploy malware. CISA shies away from influencing content moderation. Our guest is George Barnes, Cyber Practice President at Red Cell Partners and Fmr. Deputy Director of NSA discussing his experience at the agency and now in the VC world. Unauthorized Wi-Fi on a Navy warship Leads to Court-Martial. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is George Barnes, Cyber Practice President and Partner at Red Cell Partners and judge at the 2024 DataTribe Challenge, discussing his experience on both sides, having been at NSA and now in the VC world. Submit your startup to potentially be selected to be part of a startup competition like no other by September 27, 2024.

Selected Reading
YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel (Ars Technica)
Google Issues Android Under Attack Warning As 0-Day Threat Hits Users (Forbes)
Zyxel Patches Critical Vulnerabilities in Networking Devices (SecurityWeek)
D-Link says it is not fixing four RCE flaws in DIR-846W routers (Bleeping Computer)
Hackers linked to Russia and Belarus increasingly target Latvian websites, officials say (The Record)
New FTC Data Shows Massive Increase in Losses to Bitcoin ATM Scams (FTC)
Dutch DPA imposes a fine on Clearview because of illegal data collection for facial recognition | Autoriteit Persoonsgegevens (Autoriteit Persoonsgegevens)
Red Teaming Tool Abused for Malware Deployment (Infosecurity Magazine)
CISA moves away from trying to influence content moderation decisions on election disinformation (CyberScoop)
How Navy chiefs conspired to get themselves illegal warship Wi-Fi (Navy Times)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers find Yubikeys vulnerable to cloning. Google warns of a serious zero-day Android vulnerability. Zyxel releases patches for multiple vulnerabilities. D-Link urges customers to retire unsupported vulnerable routers. Hackers linked to Russia and Belarus target Latvian websites. The Federal Trade Commission (FTC) reports a sharp rise in Bitcoin ATM-related scams. Dutch authorities fine Clearview AI over thirty million Euros over GDPR violations. Threat actors are misusing the MacroPack red team tool to deploy malware. CISA shies away from influencing content moderation. Our guest is George Barnes, Cyber Practice President at Red Cell Partners and Fmr. Deputy Director of NSA discussing his experience at the agency and now in the VC world. Unauthorized Wi-Fi on a Navy warship Leads to Court-Martial. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/george-barnes-7b53762aa/">George Barnes</a>, Cyber Practice President and Partner at <a href="https://www.redcellpartners.com/">Red Cell Partners</a> and judge at the <a href="https://datatribe.com/challenge/">2024 DataTribe Challenge</a>, discussing his experience on both sides, having been at NSA and now in the VC world. Submit your startup to potentially be selected to be part of a startup competition like no other by September 27, 2024.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/">YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel </a>(Ars Technica)</p><p><a href="https://www.forbes.com/sites/daveywinder/2024/09/04/google-issues-android-under-attack-warning-as-0-day-threat-hits-users/">Google Issues Android Under Attack Warning As 0-Day Threat Hits Users</a> (Forbes)</p><p><a href="https://www.securityweek.com/zyxel-patches-critical-vulnerabilities-in-networking-devices/">Zyxel Patches Critical Vulnerabilities in Networking Devices</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/d-link-says-it-is-not-fixing-four-rce-flaws-in-dir-846w-routers/">D-Link says it is not fixing four RCE flaws in DIR-846W routers</a> (Bleeping Computer)</p><p><a href="https://therecord.media/latvia-website-attacks-attributed-to-russia-belarus">Hackers linked to Russia and Belarus increasingly target Latvian websites, officials say</a> (The Record)</p><p><a href="https://www.ftc.gov/news-events/news/press-releases/2024/09/new-ftc-data-shows-massive-increase-losses-bitcoin-atm-scams">New FTC Data Shows Massive Increase in Losses to Bitcoin ATM Scams</a> (FTC)</p><p><a href="https://www.autoriteitpersoonsgegevens.nl/en/current/dutch-dpa-imposes-a-fine-on-clearview-because-of-illegal-data-collection-for-facial-recognition">Dutch DPA imposes a fine on Clearview because of illegal data collection for facial recognition | Autoriteit Persoonsgegevens</a> (Autoriteit Persoonsgegevens)</p><p><a href="https://www.infosecurity-magazine.com/news/red-teaming-tool-abused-malware/">Red Teaming Tool Abused for Malware Deployment</a> (Infosecurity Magazine)</p><p><a href="https://cyberscoop.com/cisa-moves-away-from-trying-to-influence-content-moderation-decisions-on-election-disinformation/">CISA moves away from trying to influence content moderation decisions on election disinformation</a> (CyberScoop)</p><p><a href="https://www.navytimes.com/news/your-navy/2024/09/03/how-navy-chiefs-conspired-to-get-themselves-illegal-warship-wi-fi/">How Navy chiefs conspired to get themselves illegal warship Wi-Fi</a> (Navy Times)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1516</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[abe27f62-b95e-11ee-8cf8-1bc33606d04c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1791213184.mp3?updated=1725477402" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Brazil nixes Twitter’s successor.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2142/notes</link>
      <description>Brazil blocks access to X/Twitter. Transport for London has been hit with a cyberattack. Threat actors have poisoned GlobalProtect VPN software to deliver WikiLoader. “Voldemort” is a significant international cyber-espionage campaign. Researchers uncover an SQL injection flaw with implications for airport security. Three men plead guilty to running an MFA bypass service. The FTC has filed a complaint against security camera firm Verkada. CBIZ Benefits &amp; Insurance Services disclosed a data breach affecting nearly 36,000. The cybersecurity implications of a second Trump term. On our Industry Insights segment, guest Caroline Wong, Chief Strategy Officer at Cobalt, discusses application security and artificial intelligence.  A Washington startup claims to revolutionize political lobbying with AI.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Insights segment, guest Caroline Wong, Chief Strategy Officer at Cobalt, discusses application security and artificial intelligence. You can find out more from Cobalt’s The State of Pentesting Report 2024 here. 

Selected Reading
Brazil Suspends Access to Elon Musk's X, Including via VPNs (GovInfo Security)
Cyberattack hits agency responsible for London’s transport network (The Record)
Hacking Poisoning GlobalProtect VPN To Deliver WikiLoader Malware On Windows (Cyber Security News)
Scores of Organizations Hit By Novel Voldemort Malware (Infosecurity Magazine)
Researchers find SQL injection to bypass airport TSA security checks (Bleeping Computer)
Three Plead Guilty to Running MFA Bypass Site (Infosecurity Magazine)
Verkada to Pay $2.95 Million Over FTC Probe Into Security Camera Hacking (SecurityWeek)
Business services giant CBIZ discloses customer data breach (Bleeping Computer)
Who would be the cyber pros in a second Trump term? (CyberScoop)
Convicted fraudsters launch AI lobbying firm using fake names (Politico)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Sep 2024 20:10:00 -0000</pubDate>
      <itunes:title>Brazil nixes Twitter’s successor.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2142</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Brazil blocks access to X/Twitter. Transport for London has been hit with a cyberattack. Threat actors have poisoned GlobalProtect VPN software to deliver WikiLoader. “Voldemort” is a significant international cyber-espionage campaign. Researchers uncover an SQL injection flaw with implications for airport security. Three men plead guilty to running an MFA bypass service. The FTC has filed a complaint against security camera firm Verkada. CBIZ Benefits &amp; Insurance Services disclosed a data breach affecting nearly 36,000. The cybersecurity implications of a second Trump term. On our Industry Insights segment, guest Caroline Wong, Chief Strategy Officer at Cobalt, discusses application security and artificial intelligence.  A Washington startup claims to revolutionize political lobbying with AI.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Insights segment, guest Caroline Wong, Chief Strategy Officer at Cobalt, discusses application security and artificial intelligence. You can find out more from Cobalt’s The State of Pentesting Report 2024 here. 

Selected Reading
Brazil Suspends Access to Elon Musk's X, Including via VPNs (GovInfo Security)
Cyberattack hits agency responsible for London’s transport network (The Record)
Hacking Poisoning GlobalProtect VPN To Deliver WikiLoader Malware On Windows (Cyber Security News)
Scores of Organizations Hit By Novel Voldemort Malware (Infosecurity Magazine)
Researchers find SQL injection to bypass airport TSA security checks (Bleeping Computer)
Three Plead Guilty to Running MFA Bypass Site (Infosecurity Magazine)
Verkada to Pay $2.95 Million Over FTC Probe Into Security Camera Hacking (SecurityWeek)
Business services giant CBIZ discloses customer data breach (Bleeping Computer)
Who would be the cyber pros in a second Trump term? (CyberScoop)
Convicted fraudsters launch AI lobbying firm using fake names (Politico)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Brazil blocks access to X/Twitter. Transport for London has been hit with a cyberattack. Threat actors have poisoned GlobalProtect VPN software to deliver WikiLoader. “Voldemort” is a significant international cyber-espionage campaign. Researchers uncover an SQL injection flaw with implications for airport security. Three men plead guilty to running an MFA bypass service. The FTC has filed a complaint against security camera firm Verkada. CBIZ Benefits &amp; Insurance Services disclosed a data breach affecting nearly 36,000. The cybersecurity implications of a second Trump term. On our Industry Insights segment, guest Caroline Wong, Chief Strategy Officer at Cobalt, discusses application security and artificial intelligence.  A Washington startup claims to revolutionize political lobbying with AI.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Insights segment, guest <a href="https://www.linkedin.com/in/carolinewmwong/">Caroline Wong</a>, Chief Strategy Officer at <a href="https://www.cobalt.io/">Cobalt</a>, discusses application security and artificial intelligence. You can find out more from Cobalt’s The State of Pentesting Report 2024 <a href="https://resource.cobalt.io/state-of-pentesting-2024">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.govinfosecurity.com/brazil-suspends-access-to-elon-musks-x-including-via-vpns-a-26180">Brazil Suspends Access to Elon Musk's X, Including via VPNs</a> (GovInfo Security)</p><p><a href="https://therecord.media/transport-for-london-cyberattack">Cyberattack hits agency responsible for London’s transport network</a> (The Record)</p><p><a href="https://cybersecuritynews.com/hacking-globalprotect-vpn-wikiloader-malware/">Hacking Poisoning GlobalProtect VPN To Deliver WikiLoader Malware On Windows</a> (Cyber Security News)</p><p><a href="https://www.infosecurity-magazine.com/news/scores-organizations-voldemort/">Scores of Organizations Hit By Novel Voldemort Malware </a>(Infosecurity Magazine)</p><p><a href="https://www.bleepingcomputer.com/news/security/researchers-find-sql-injection-to-bypass-airport-tsa-security-checks/">Researchers find SQL injection to bypass airport TSA security checks</a> (Bleeping Computer)</p><p><a href="https://www.infosecurity-magazine.com/news/three-plead-guilty-running-mfa/">Three Plead Guilty to Running MFA Bypass Site</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/verkada-to-pay-2-95-million-over-ftc-probe-into-security-camera-hacking/">Verkada to Pay $2.95 Million Over FTC Probe Into Security Camera Hacking</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/business-services-giant-cbiz-discloses-customer-data-breach/">Business services giant CBIZ discloses customer data breach</a> (Bleeping Computer)</p><p><a href="https://cyberscoop.com/trump-cybersecurity-second-term-white-house-cisa/">Who would be the cyber pros in a second Trump term?</a> (CyberScoop)</p><p><a href="https://www.politico.com/news/2024/09/02/jacob-wohl-jack-burkman-ai-lobbying-pseudonyms-00176917">Convicted fraudsters launch AI lobbying firm using fake names</a> (Politico)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1683</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aba59ef8-b95e-11ee-8cf8-e797ab36cf55]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2975100902.mp3?updated=1725391854" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AWS in Orbit: Building Opportunity with Axiom Space. [AWS in Orbit]</title>
      <link>https://space.n2k.com/podcasts/t-minus/aws-in-orbit-10</link>
      <description>You can learn more about AWS in Orbit at space.n2k.com/aws.

Our guests today are Jason Aspiotis, Global Director, In-Space Data &amp; Security at Axiom Space and Jay Naves, Sr. Solutions Architect at AWS Aerospace &amp; Satellite Solutions.

AWS in Orbit is a podcast collaboration between N2K Networks and AWS to offer listeners an in-depth look at the transformative intersection of cloud computing, space technologies, and generative AI.

Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.

Selected Reading
AWS Aerospace and Satellite

Audience Survey
We want to hear from you! Please complete our short survey. It’ll help us get better and deliver you the most mission-critical space intel every day.

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.

Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 02 Sep 2024 07:00:00 -0000</pubDate>
      <itunes:title>AWS in Orbit: Building Opportunity with Axiom Space. [AWS in Orbit]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/668a0a54-6573-11ef-a15d-2710b07c3bc3/image/e134309b6b52ebbca93352915e2dad96.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>We speak to Axiom Space and AWS Aerospace and Satellite about Building Opportunity, Enterprise IT Technologies on Orbit, and Mission Control from Anywhere.</itunes:subtitle>
      <itunes:summary>You can learn more about AWS in Orbit at space.n2k.com/aws.

Our guests today are Jason Aspiotis, Global Director, In-Space Data &amp; Security at Axiom Space and Jay Naves, Sr. Solutions Architect at AWS Aerospace &amp; Satellite Solutions.

AWS in Orbit is a podcast collaboration between N2K Networks and AWS to offer listeners an in-depth look at the transformative intersection of cloud computing, space technologies, and generative AI.

Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.

Selected Reading
AWS Aerospace and Satellite

Audience Survey
We want to hear from you! Please complete our short survey. It’ll help us get better and deliver you the most mission-critical space intel every day.

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.

Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>You can learn more about AWS in Orbit at <a href="https://space.n2k.com/aws">space.n2k.com/aws</a>.</p><p><br></p><p>Our guests today are <a href="https://www.linkedin.com/in/jason-aspiotis/">Jason Aspiotis</a>, Global Director, In-Space Data &amp; Security at <a href="https://www.linkedin.com/company/axiom-space/">Axiom Space</a> and <a href="https://www.linkedin.com/in/jay-naves/">Jay Naves</a>, Sr. Solutions Architect at <a href="https://aws.amazon.com/aerospace-and-satellite/">AWS Aerospace &amp; Satellite Solutions</a>.</p><p><br></p><p>AWS in Orbit is a podcast collaboration between N2K Networks and AWS to offer listeners an in-depth look at the transformative intersection of cloud computing, space technologies, and generative AI.</p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our weekly intelligence roundup, <a href="https://space.n2k.com/newsletters/signals-and-space">Signals and Space</a>, and you’ll never miss a beat. And be sure to follow T-Minus on <a href="https://www.linkedin.com/company/n2k-space/">LinkedIn</a> and <a href="https://www.instagram.com/tminusdaily/">Instagram</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://aws.amazon.com/aerospace-and-satellite/?trk=c9d66aa7-01dc-4cbe-93b1-2c987a64a1d9&amp;sc_channel=el">AWS Aerospace and Satellite</a></p><p><br></p><h2>Audience Survey</h2><p>We want to hear from you! Please complete our <a href="https://www.surveymonkey.com/r/BL5NFPW">short survey</a>. It’ll help us get better and deliver you the most mission-critical space intel every day.</p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/ung56qbvknfbj9z2">media kit</a>. Contact us at <a href="mailto:space@n2k.com">space@n2k.com</a> to request more info.</p><p><br></p><h2>Want to join us for an interview?</h2><p>Please send your pitch to <a href="mailto:space-editor@n2k.com">space-editor@n2k.com</a> and include your name, affiliation, and topic proposal.</p><p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2381</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[668a0a54-6573-11ef-a15d-2710b07c3bc3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3438210807.mp3?updated=1724440910" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tom Gorup: Fail fast and fail forward. [Operations]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/31/notes</link>
      <description>Enjoy this encore episode with Vice President of Security and Support Operations of Alert Logic Tom Gorup shares how his career path led him from tactics learned in Army infantry using machine guns and claymores to cybersecurity replacing the artillery with antivirus and firewalls. Tom built a security automation solution called the Grunt (in recollection of his role in the Army) that automated firewall blocks. He credits his experience in battle-planning for his expertise in applying strategic thinking to work in cybersecurity, noting that communication is key in both scenarios. Tom advises that those looking into a new career shouldn't shy away from failure as failure is just another opportunity to learn. We thank Tom for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 01 Sep 2024 07:00:00 -0000</pubDate>
      <itunes:title>Tom Gorup: Fail fast and fail forward. [Operations]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>31</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this encore episode with Vice President of Security and Support Operations of Alert Logic Tom Gorup shares how his career path led him from tactics learned in Army infantry using machine guns and claymores to cybersecurity replacing the artillery with antivirus and firewalls. Tom built a security automation solution called the Grunt (in recollection of his role in the Army) that automated firewall blocks. He credits his experience in battle-planning for his expertise in applying strategic thinking to work in cybersecurity, noting that communication is key in both scenarios. Tom advises that those looking into a new career shouldn't shy away from failure as failure is just another opportunity to learn. We thank Tom for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this encore episode with Vice President of Security and Support Operations of Alert Logic Tom Gorup shares how his career path led him from tactics learned in Army infantry using machine guns and claymores to cybersecurity replacing the artillery with antivirus and firewalls. Tom built a security automation solution called the Grunt (in recollection of his role in the Army) that automated firewall blocks. He credits his experience in battle-planning for his expertise in applying strategic thinking to work in cybersecurity, noting that communication is key in both scenarios. Tom advises that those looking into a new career shouldn't shy away from failure as failure is just another opportunity to learn. We thank Tom for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>419</itunes:duration>
      <guid isPermaLink="false"><![CDATA[17213cdc-6643-11ef-8a32-8f2ac940a736]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7800939076.mp3?updated=1724962840" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The impact of CISO Circles and cultivating a security culture.</title>
      <link>https://thecyberwire.com/podcasts/special-edition/71/notes</link>
      <description>In this Special Edition podcast, N2K's Executive Editor Brandon Karpf speaks with Danielle Ruderman, Senior Manager for Wordwide Security Specialists at AWS, and Adam Mikeal, CISO at Texas A&amp;M, about CISO Circles, security challenges faced in higher education, and fostering the culture of security. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 01 Sep 2024 06:00:00 -0000</pubDate>
      <itunes:title>The impact of CISO Circles and cultivating a security culture.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>71</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this Special Edition podcast, N2K's Executive Editor Brandon Karpf speaks with Danielle Ruderman, Senior Manager for Wordwide Security Specialists at AWS, and Adam Mikeal, CISO at Texas A&amp;M, about CISO Circles, security challenges faced in higher education, and fostering the culture of security. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this Special Edition podcast, <a href="https://www.n2k.com/">N2K</a>'s Executive Editor <a href="https://www.linkedin.com/in/brandon-karpf?miniProfileUrn=urn%3Ali%3Afsd_profile%3AACoAAC_NTGsBc2E8E6H8UXjNCs_zBoGJW7wzXdk&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BUyr0ds6jQCSNrFnfsjiBpg%3D%3D">Brandon Karpf</a> speaks with <a href="https://www.linkedin.com/in/daniellebiancaruderman/">Danielle Ruderman</a>, Senior Manager for Wordwide Security Specialists at <a href="https://www.linkedin.com/company/amazon-web-services/">AWS</a>, and <a href="https://www.linkedin.com/in/amikeal/">Adam Mikeal</a>, CISO at <a href="https://www.linkedin.com/school/texas-a&amp;m-university/">Texas A&amp;M</a>, about CISO Circles, security challenges faced in higher education, and fostering the culture of security. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1256</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[52e4ef28-6712-11ef-a3ca-9fde5b6ec3db]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2549928833.mp3?updated=1725052395" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pop goes the developer. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/344/notes</link>
      <description>Tim Peck, a Senior Threat Researcher at Securonix, is discussing their work on "Threat actors behind the DEV#POPPER campaign have retooled and are continuing to target software developers via social engineering." The DEV#POPPER campaign continues to evolve, now targeting developers with malware capable of operating on Linux, Windows, and macOS systems. 
The threat actors, believed to be North Korean, employ sophisticated social engineering tactics, such as fake job interviews, to deliver stealthy malware that gathers sensitive information, including browser credentials and system data. 
The research can be found here:
Research Update: Threat Actors Behind the DEV#POPPER Campaign Have Retooled and are Continuing to Target Software Developers via Social Engineering

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 31 Aug 2024 07:00:00 -0000</pubDate>
      <itunes:title>Pop goes the developer. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>344</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Tim Peck, a Senior Threat Researcher at Securonix, is discussing their work on "Threat actors behind the DEV#POPPER campaign have retooled and are continuing to target software developers via social engineering." The DEV#POPPER campaign continues to evolve, now targeting developers with malware capable of operating on Linux, Windows, and macOS systems. 
The threat actors, believed to be North Korean, employ sophisticated social engineering tactics, such as fake job interviews, to deliver stealthy malware that gathers sensitive information, including browser credentials and system data. 
The research can be found here:
Research Update: Threat Actors Behind the DEV#POPPER Campaign Have Retooled and are Continuing to Target Software Developers via Social Engineering

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tim Peck, a Senior Threat Researcher at Securonix, is discussing their work on "Threat actors behind the DEV#POPPER campaign have retooled and are continuing to target software developers via social engineering." The DEV#POPPER campaign continues to evolve, now targeting developers with malware capable of operating on Linux, Windows, and macOS systems. </p><p>The threat actors, believed to be North Korean, employ sophisticated social engineering tactics, such as fake job interviews, to deliver stealthy malware that gathers sensitive information, including browser credentials and system data. </p><p>The research can be found here:</p><ul><li><a href="https://www.securonix.com/blog/research-update-threat-actors-behind-the-devpopper-campaign-have-retooled-and-are-continuing-to-target-software-developers-via-social-engineering/">Research Update: Threat Actors Behind the DEV#POPPER Campaign Have Retooled and are Continuing to Target Software Developers via Social Engineering</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1246</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[47edd9bc-66ff-11ef-9c82-6bad973f9ba5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7164687337.mp3?updated=1725043963" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>High stakes for high tech: California's AI safety regulations take center stage.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2141/notes</link>
      <description>AI regulations move forward in California. DDoS attacks are on the rise. CISA  releases a joint Cybersecurity Advisory on the RansomHub ransomware. A persistent malware campaign has been targeting Roblox developers. Two European men are indicted for orchestrating a widespread “swatting” campaign. Critical vulnerabilities in an enterprise network monitoring solution could lead to system compromise. An Ohio judge issues a restraining order against a cybersecurity expert following a ransomware attack. Our guest is Dr. Zulfikar Ramzan, Chief Scientist at Aura, sharing his take on AI's growing role with online criminals. Admiral Hopper's lost lecture is lost no more. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Dr. Zulfikar Ramzan, Chief Scientist at Aura, sharing his take on the RockYou2024 breach and AI's growing role with online criminals.

Selected Reading
California Advances Landmark Legislation to Regulate Large AI Models (SecurityWeek)
Radware Report Surfaces Increasing Waves of DDoS Attacks (Security Boulevard)
CISA and Partners Release Advisory on RansomHub Ransomware (CISA)
Year-Long Malware Campaign Exploits NPM to Attack Roblox Developers (HackRead)
2 Men From Europe Charged With 'Swatting' Plot Targeting Former US President and Members of Congress (SecurityWeek)
Critical Flaws in Progress Software WhatsUp Gold Expose Systems to Full Compromise (SecurityWeek)
Ahead of mandatory rules, CISA unveils new cyber incident reporting portal (Federal News Network)
Franklin County judge grants city request to suppress cyber expert's efforts to warn public (The Columbus Dispatch)
Adm. Grace Hopper’s 1982 NSA Lecture Has Been Published (Schneier on Security)
Capt. Grace Hopper on Future Possibilities: Data, Hardware, Software, and People (Part One, 1982) (YouTube)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 30 Aug 2024 20:10:00 -0000</pubDate>
      <itunes:title>High stakes for high tech: California's AI safety regulations take center stage.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2141</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>AI regulations move forward in California. DDoS attacks are on the rise. CISA  releases a joint Cybersecurity Advisory on the RansomHub ransomware. A persistent malware campaign has been targeting Roblox developers. Two European men are indicted for orchestrating a widespread “swatting” campaign. Critical vulnerabilities in an enterprise network monitoring solution could lead to system compromise. An Ohio judge issues a restraining order against a cybersecurity expert following a ransomware attack. Our guest is Dr. Zulfikar Ramzan, Chief Scientist at Aura, sharing his take on AI's growing role with online criminals. Admiral Hopper's lost lecture is lost no more. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Dr. Zulfikar Ramzan, Chief Scientist at Aura, sharing his take on the RockYou2024 breach and AI's growing role with online criminals.

Selected Reading
California Advances Landmark Legislation to Regulate Large AI Models (SecurityWeek)
Radware Report Surfaces Increasing Waves of DDoS Attacks (Security Boulevard)
CISA and Partners Release Advisory on RansomHub Ransomware (CISA)
Year-Long Malware Campaign Exploits NPM to Attack Roblox Developers (HackRead)
2 Men From Europe Charged With 'Swatting' Plot Targeting Former US President and Members of Congress (SecurityWeek)
Critical Flaws in Progress Software WhatsUp Gold Expose Systems to Full Compromise (SecurityWeek)
Ahead of mandatory rules, CISA unveils new cyber incident reporting portal (Federal News Network)
Franklin County judge grants city request to suppress cyber expert's efforts to warn public (The Columbus Dispatch)
Adm. Grace Hopper’s 1982 NSA Lecture Has Been Published (Schneier on Security)
Capt. Grace Hopper on Future Possibilities: Data, Hardware, Software, and People (Part One, 1982) (YouTube)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>AI regulations move forward in California. DDoS attacks are on the rise. CISA  releases a joint Cybersecurity Advisory on the RansomHub ransomware. A persistent malware campaign has been targeting Roblox developers. Two European men are indicted for orchestrating a widespread “swatting” campaign. Critical vulnerabilities in an enterprise network monitoring solution could lead to system compromise. An Ohio judge issues a restraining order against a cybersecurity expert following a ransomware attack. Our guest is Dr. Zulfikar Ramzan, Chief Scientist at Aura, sharing his take on AI's growing role with online criminals. Admiral Hopper's lost lecture is lost no more. </p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/zulfikar-ramzan-aa581/">Dr. Zulfikar Ramzan</a>, Chief Scientist at <a href="http://aura.com/">Aura</a>, sharing his take on the RockYou2024 breach and AI's growing role with online criminals.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/california-advances-landmark-legislation-to-regulate-large-ai-models/">California Advances Landmark Legislation to Regulate Large AI Models</a> (SecurityWeek)</p><p><a href="https://securityboulevard.com/2024/08/radware-report-surfaces-increasing-waves-of-ddos-attacks/">Radware Report Surfaces Increasing Waves of DDoS Attacks</a> (Security Boulevard)</p><p><a href="https://www.cisa.gov/news-events/alerts/2024/08/29/cisa-and-partners-release-advisory-ransomhub-ransomware">CISA and Partners Release Advisory on RansomHub Ransomware</a> (CISA)</p><p><a href="https://hackread.com/malware-exploits-npm-attack-roblox-developers/">Year-Long Malware Campaign Exploits NPM to Attack Roblox Developers</a> (HackRead)</p><p><a href="https://www.securityweek.com/2-men-from-europe-charged-with-swatting-plot-targeting-former-us-president-and-members-of-congress/">2 Men From Europe Charged With 'Swatting' Plot Targeting Former US President and Members of Congress </a>(SecurityWeek)</p><p><a href="https://www.securityweek.com/critical-flaws-in-progress-software-whatsup-gold-expose-systems-to-full-compromise/">Critical Flaws in Progress Software WhatsUp Gold Expose Systems to Full Compromise </a>(SecurityWeek)</p><p><a href="https://federalnewsnetwork.com/cybersecurity/2024/08/ahead-of-mandatory-rules-cisa-unveils-new-cyber-incident-reporting-portal">Ahead of mandatory rules, CISA unveils new cyber incident reporting portal</a> (Federal News Network)</p><p><a href="https://www.dispatch.com/story/news/local/2024/08/29/data-hack-columbus-restraining-order-cyber-security-expert-david-ross/74998593007/?ref=metacurity.com">Franklin County judge grants city request to suppress cyber expert's efforts to warn public</a> (The Columbus Dispatch)</p><p><a href="https://www.schneier.com/blog/archives/2024/08/adm-grace-hoppers-1982-nsa-lecture-has-been-published.html">Adm. Grace Hopper’s 1982 NSA Lecture Has Been Published</a> (Schneier on Security)</p><p><a href="https://www.youtube.com/watch?v=si9iqF5uTFk">Capt. Grace Hopper on Future Possibilities: Data, Hardware, Software, and People (Part One, 1982)</a> (YouTube)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1622</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ab218320-b95e-11ee-8cf8-2780f369d921]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6702544160.mp3?updated=1725043820" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Crime, compliance, and controversy.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2140/notes</link>
      <description>French authorities outline the allegations against Telegram’s CEO. Google finds familiar spyware in Mongolian government websites. The Mirai botnet leverages obsolete security cameras. Iran’s Peach Sandstorm targets the space industry. A federal appeals court says platforms may be liable to algorithmically recommended content. Scam cycles are getting shorter. McDonald’s officials are grimacing after hackers take over their Instagram account. Our guests today are Dave DeWalt, Founder and CEO of NightDragon, and Nicole Bucala, CEO and GM at DataBee, sharing their joint initiative which aims to propel future cybersecurity innovations. A would-be extortionist fails to cover his tracks.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guests today are Dave DeWalt, Founder and CEO of NightDragon, and Nicole Bucala, CEO and GM at DataBee, sharing their joint initiative to propel future cybersecurity innovations. Learn more. 

Selected Reading
French authorities charge Telegram's Durov in probe into organized crime on app (Reuters)
Russian government hackers found using exploits made by spyware companies NSO and Intellexa (TechCrunch)
Old CCTV cameras provide a fresh opportunity for a Mirai botnet variant (The Record)
Notorious Iranian Hackers Have Been Targeting the Space Industry With a New Backdoor (WIRED) 
Appeals court revives TikTok ‘blackout challenge’ death suit (The Register)
Online scam cycles are getting shorter and more effective, Chainalysis finds (CyberScoop)
Cisco Patches Multiple NX-OS Software Vulnerabilities (SecurityWeek)
Crypto scammers who hacked McDonald's Instagram account say they stole $700,000 (Bitdefender)
IT Engineer Charged For Attempting to Extort Former Employer (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 29 Aug 2024 20:10:00 -0000</pubDate>
      <itunes:title>Crime, compliance, and controversy.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2140</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>French authorities outline the allegations against Telegram’s CEO. Google finds familiar spyware in Mongolian government websites. The Mirai botnet leverages obsolete security cameras. Iran’s Peach Sandstorm targets the space industry. A federal appeals court says platforms may be liable to algorithmically recommended content. Scam cycles are getting shorter. McDonald’s officials are grimacing after hackers take over their Instagram account. Our guests today are Dave DeWalt, Founder and CEO of NightDragon, and Nicole Bucala, CEO and GM at DataBee, sharing their joint initiative which aims to propel future cybersecurity innovations. A would-be extortionist fails to cover his tracks.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guests today are Dave DeWalt, Founder and CEO of NightDragon, and Nicole Bucala, CEO and GM at DataBee, sharing their joint initiative to propel future cybersecurity innovations. Learn more. 

Selected Reading
French authorities charge Telegram's Durov in probe into organized crime on app (Reuters)
Russian government hackers found using exploits made by spyware companies NSO and Intellexa (TechCrunch)
Old CCTV cameras provide a fresh opportunity for a Mirai botnet variant (The Record)
Notorious Iranian Hackers Have Been Targeting the Space Industry With a New Backdoor (WIRED) 
Appeals court revives TikTok ‘blackout challenge’ death suit (The Register)
Online scam cycles are getting shorter and more effective, Chainalysis finds (CyberScoop)
Cisco Patches Multiple NX-OS Software Vulnerabilities (SecurityWeek)
Crypto scammers who hacked McDonald's Instagram account say they stole $700,000 (Bitdefender)
IT Engineer Charged For Attempting to Extort Former Employer (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>French authorities outline the allegations against Telegram’s CEO. Google finds familiar spyware in Mongolian government websites. The Mirai botnet leverages obsolete security cameras. Iran’s Peach Sandstorm targets the space industry. A federal appeals court says platforms may be liable to algorithmically recommended content. Scam cycles are getting shorter. McDonald’s officials are grimacing after hackers take over their Instagram account. Our guests today are Dave DeWalt, Founder and CEO of NightDragon, and Nicole Bucala, CEO and GM at DataBee, sharing their joint initiative which aims to propel future cybersecurity innovations. A would-be extortionist fails to cover his tracks.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guests today are <a href="https://www.linkedin.com/in/ddewalt/">Dave DeWalt</a>, Founder and CEO of <a href="https://www.nightdragon.com/">NightDragon</a>, and <a href="https://www.linkedin.com/in/nicole-bucala-33b951164/">Nicole Bucala</a>, CEO and GM at <a href="https://www.comcasttechnologysolutions.com/databee-suite">DataBee</a>, sharing their joint initiative to propel future cybersecurity innovations. <a href="https://www.nightdragon.com/insights/nightdragon-and-comcast-technology-solutions-partnership/">Learn more</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.reuters.com/world/europe/french-judges-decide-next-step-durov-probe-2024-08-28">French authorities charge Telegram's Durov in probe into organized crime on app</a> (Reuters)</p><p><a href="https://techcrunch.com/2024/08/29/russian-government-hackers-found-using-exploits-made-by-spyware-companies-nso-and-intellexa/">Russian government hackers found using exploits made by spyware companies NSO and Intellexa</a> (TechCrunch)</p><p><a href="https://therecord.media/avtech-zero-day-cctv-cameras-mirai-botnet-variant">Old CCTV cameras provide a fresh opportunity for a Mirai botnet variant</a> (The Record)</p><p><a href="https://www.wired.com/story/iran-peach-sandworm-tickler-backdoor/">Notorious Iranian Hackers Have Been Targeting the Space Industry With a New Backdoor</a> (WIRED) </p><p><a href="https://www.theregister.com/2024/08/28/tiktok_blackout_challenge_appeal/">Appeals court revives TikTok ‘blackout challenge’ death suit</a> (The Register)</p><p><a href="https://cyberscoop.com/online-scamming-cycles-shorter-more-effective-chainalysis/">Online scam cycles are getting shorter and more effective, Chainalysis finds</a> (CyberScoop)</p><p><a href="https://www.securityweek.com/cisco-patches-multiple-nx-os-software-vulnerabilities/">Cisco Patches Multiple NX-OS Software Vulnerabilities</a> (SecurityWeek)</p><p><a href="https://www.bitdefender.com/blog/hotforsecurity/crypto-scammers-who-hacked-mcdonalds-instagram-account-say-they-stole-700-000/">Crypto scammers who hacked McDonald's Instagram account say they stole $700,000</a> (Bitdefender)</p><p><a href="https://www.infosecurity-magazine.com/news/it-engineer-charged-extort-former/">IT Engineer Charged For Attempting to Extort Former Employer</a> (Infosecurity Magazine)</p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1681</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aae3e830-b95e-11ee-8cf8-4bd1556f4f0b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5395247219.mp3?updated=1724958542" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From screen share to spyware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2139/notes</link>
      <description>Threat actors use a malicious Pidgin plugin to deliver malware. The BlackByte ransomware group is exploiting a recently patched VMware ESXi  vulnerability. The State Department offers a $2.5 million reward for a major malware distributor. A Swiss industrial manufacturer suffers a cyberattack. The U.S. Marshals Service (USMS) responds to claims of data theft by the Hunters International ransomware gang. Park’N Fly reports a data breach affecting 1 million customers. Black Lotus Labs documents the active exploitation of a zero-day vulnerability in Versa Director servers. Federal law enforcement agencies warn that Iran-based cyber actors continue to exploit U.S. and foreign organizations. We kick off our new educational CertByte segment with hosts Chris Hare and George Monsalvatge. Precrime detectives root out election related misinformation before it happens. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On today’s show, our guests are N2K's Chris Hare and George Monsalvatge introducing our new bi-weekly CertByte segments that kick off today on the CyberWire Daily podcast.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from our suite of industry-leading content and a study tip to help you achieve the professional certifications you need to fast-track your career growth.
In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by George Monsalvatge to break down a question targeting the Project Management Professional (PMP)® certification by the Project Management Institute®. Today’s question comes from N2K’s PMI® Project Management Professional (PMP®) Practice Test.
The PMP® is the global gold standard certification typically targeted for those who have about three to five years of project management experience. To learn more about this and other related topics under this objective, please refer to the following resource: Project Management Institute - Code of Ethics and Professional Conduct.
Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify.
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.

Selected Reading
 Malware Delivered via Malicious Pidgin Plugin, Signal Fork (SecurityWeek)
BlackByte Hackers Exploiting VMware ESXi Auth Bypass Flaw to Deploy Ransomware (Cyber Security News)
US Offering $2.5 Million Reward for Belarusian Malware Distributor (SecurityWeek)
Services at Swiss manufacturer Schlatter disrupted in likely ransomware attack (SiliconANGLE)
US Marshals say data posted by ransomware gang not from 'new or undisclosed incident' (The Record)
Park’N Fly notifies 1 million customers of data breach (Bleeping Computer)
Taking the Crossroads: The Versa Director Zero-Day Exploitation (Lumen)
Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations (CISA)
Hundreds of 'PreCrime' Election-Related Fraud Sites Spotted (Metacurity)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 28 Aug 2024 20:10:00 -0000</pubDate>
      <itunes:title>From screen share to spyware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2139</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Threat actors use a malicious Pidgin plugin to deliver malware. The BlackByte ransomware group is exploiting a recently patched VMware ESXi  vulnerability. The State Department offers a $2.5 million reward for a major malware distributor. A Swiss industrial manufacturer suffers a cyberattack. The U.S. Marshals Service (USMS) responds to claims of data theft by the Hunters International ransomware gang. Park’N Fly reports a data breach affecting 1 million customers. Black Lotus Labs documents the active exploitation of a zero-day vulnerability in Versa Director servers. Federal law enforcement agencies warn that Iran-based cyber actors continue to exploit U.S. and foreign organizations. We kick off our new educational CertByte segment with hosts Chris Hare and George Monsalvatge. Precrime detectives root out election related misinformation before it happens. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On today’s show, our guests are N2K's Chris Hare and George Monsalvatge introducing our new bi-weekly CertByte segments that kick off today on the CyberWire Daily podcast.

CertByte Segment
Welcome to CertByte! On this bi-weekly segment hosted by Chris Hare, a content developer and project management specialist at N2K, we share practice questions from our suite of industry-leading content and a study tip to help you achieve the professional certifications you need to fast-track your career growth.
In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by George Monsalvatge to break down a question targeting the Project Management Professional (PMP)® certification by the Project Management Institute®. Today’s question comes from N2K’s PMI® Project Management Professional (PMP®) Practice Test.
The PMP® is the global gold standard certification typically targeted for those who have about three to five years of project management experience. To learn more about this and other related topics under this objective, please refer to the following resource: Project Management Institute - Code of Ethics and Professional Conduct.
Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at n2k.com/certify.
Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.

Selected Reading
 Malware Delivered via Malicious Pidgin Plugin, Signal Fork (SecurityWeek)
BlackByte Hackers Exploiting VMware ESXi Auth Bypass Flaw to Deploy Ransomware (Cyber Security News)
US Offering $2.5 Million Reward for Belarusian Malware Distributor (SecurityWeek)
Services at Swiss manufacturer Schlatter disrupted in likely ransomware attack (SiliconANGLE)
US Marshals say data posted by ransomware gang not from 'new or undisclosed incident' (The Record)
Park’N Fly notifies 1 million customers of data breach (Bleeping Computer)
Taking the Crossroads: The Versa Director Zero-Day Exploitation (Lumen)
Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations (CISA)
Hundreds of 'PreCrime' Election-Related Fraud Sites Spotted (Metacurity)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Threat actors use a malicious Pidgin plugin to deliver malware. The BlackByte ransomware group is exploiting a recently patched VMware ESXi  vulnerability. The State Department offers a $2.5 million reward for a major malware distributor. A Swiss industrial manufacturer suffers a cyberattack. The U.S. Marshals Service (USMS) responds to claims of data theft by the Hunters International ransomware gang. Park’N Fly reports a data breach affecting 1 million customers. Black Lotus Labs documents the active exploitation of a zero-day vulnerability in Versa Director servers. Federal law enforcement agencies warn that Iran-based cyber actors continue to exploit U.S. and foreign organizations. We kick off our new educational CertByte segment with hosts Chris Hare and George Monsalvatge. Precrime detectives root out election related misinformation before it happens. </p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On today’s show, our guests are <a href="https://www.n2k.com/">N2K</a>'s <a href="https://www.linkedin.com/in/chrisharepmp/">Chris Hare</a> and <a href="https://www.linkedin.com/in/george-monsalvatge-abb2172/">George Monsalvatge</a> introducing our new bi-weekly CertByte segments that kick off today on the CyberWire Daily podcast.</p><p><br></p><h2>CertByte Segment</h2><p>Welcome to CertByte! On this bi-weekly segment hosted by <a href="https://www.linkedin.com/in/chrisharepmp/">Chris Hare</a>, a content developer and project management specialist at <a href="https://www.n2k.com/">N2K</a>, we share practice questions from our suite of industry-leading content and a study tip to help you achieve the professional certifications you need to fast-track your career growth.</p><p>In each segment, Chris is joined by an N2K Content Developer to help illustrate the learning. This week, Chris is joined by <a href="https://www.linkedin.com/in/george-monsalvatge-abb2172/">George Monsalvatge</a> to break down a question targeting the Project Management Professional (PMP)® certification by the Project Management Institute®. Today’s question comes from N2K’s <a href="https://certify.cybervista.net/products/pmi/project-management-pro-practice-test/">PMI® Project Management Professional (PMP®) Practice Test</a>.</p><p>The PMP® is the global gold standard certification typically targeted for those who have about three to five years of project management experience. To learn more about this and other related topics under this objective, please refer to the following resource: <a href="https://www.pmi.org/about/ethics/code">Project Management Institute - Code of Ethics and Professional Conduct</a>.</p><p>Have a question that you’d like to see covered? Email us at certbyte@n2k.com. If you're studying for a certification exam, check out N2K’s full exam prep library of certification practice tests, practice labs, and training courses by visiting our website at <a href="http://n2k.com/certify">n2k.com/certify</a>.</p><p><em>Please note: The questions and answers provided here, and on our site, are not actual current or prior questions and answers from these certification publishers or providers.</em></p><p><br></p><h2>Selected Reading</h2><p><em> </em><a href="https://www.securityweek.com/malware-delivered-via-malicious-pidgin-plugin-signal-fork/">Malware Delivered via Malicious Pidgin Plugin, Signal Fork</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/blackbyte-vmware-esxi-auth-bypass-flaw/">BlackByte Hackers Exploiting VMware ESXi Auth Bypass Flaw to Deploy Ransomware</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/us-offering-2-5-million-reward-for-belarusian-malware-distributor/">US Offering $2.5 Million Reward for Belarusian Malware Distributor</a> (SecurityWeek)</p><p><a href="https://siliconangle.com/2024/08/12/services-swiss-manufacturer-schlatter-disrupted-likely-ransomware-attack/">Services at Swiss manufacturer Schlatter disrupted in likely ransomware attack</a> (SiliconANGLE)</p><p><a href="https://therecord.media/marshals-service-data-posted-ransomware-gang">US Marshals say data posted by ransomware gang not from 'new or undisclosed incident'</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/parkn-fly-notifies-1-million-customers-of-data-breach/">Park’N Fly notifies 1 million customers of data breach</a> (Bleeping Computer)</p><p><a href="https://blog.lumen.com/taking-the-crossroads-the-versa-director-zero-day-exploitation/">Taking the Crossroads: The Versa Director Zero-Day Exploitation</a> (Lumen)</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-241a">Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations </a>(CISA)</p><p><a href="https://www.metacurity.com/hundreds-of-precrime-election-related-fraud-sites-spotted/">Hundreds of 'PreCrime' Election-Related Fraud Sites Spotted</a> (Metacurity)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1655</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aaa5fdb8-b95e-11ee-8cf8-77949c8e2bdd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8414828709.mp3?updated=1724871751" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber revolt or just digital ruckus?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2138/notes</link>
      <description>Hacktivists respond to the arrest of Telegram’s CEO in France. Stealthy Linux malware stayed undetected for two years. Versa Networks patches a zero-day vulnerability. Google has patched its tenth zero-day vulnerability of 2024. Researchers at Arkose labs document Greasy Opal. A flaw in Microsoft 365 Copilot allowed attackers to exfiltrate sensitive user data. Gafgyt targets crypto mining in cloud native environments. Microsoft investigates an Exchange Online message quarantine issue. Our guest is Bar Kaduri, research team leader at Orca Security talking about AI Goat, the first open source AI security learning environment based on the OWASP top 10 ML risks. Kentucky Prisoners Trick Tablets to Generate Fake Money. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Bar Kaduri, research team leader at Orca Security talking about AI Goat, the first open source AI security learning environment based on the OWASP top 10 ML risks. Available on GitHub, AI Goat is an intentionally vulnerable AI environment built in Terraform that includes numerous threats and vulnerabilities for testing and learning purposes. Learn more. 

Selected Reading
Arrest of Telegram CEO sparks cyberattacks against French websites (SC Media)
Unveiling sedexp: A Stealthy Linux Malware Exploiting udev Rules (AON)	
Stealthy 'sedexp' Linux malware evaded detection for two years (Bleeping Computer)
Google tags a tenth Chrome zero-day as exploited this year (Bleeping Computer)
Versa fixes Director zero-day vulnerability exploited in attacks (Bleeping Computer)
Greasy Opal: Greasing the Skids for Cybercrime (Arkose Labs)
Microsoft Copilot Prompt Injection Vulnerability Let Hackers Exfiltrate Personal Data (Cyber Security News)
Gafgyt Botnet: Weak SSH Passwords Targeted For GPU Mining (Security Boulevard)
Microsoft: Exchange Online mistakenly tags emails as malware (Bleeping Computer)
Kentucky prisoners hack state-issued computer tablets to digitally create $1M. How’d they do it? (Union Bulletin)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Aug 2024 20:10:00 -0000</pubDate>
      <itunes:title>Cyber revolt or just digital ruckus?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2141</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Hacktivists respond to the arrest of Telegram’s CEO in France. Stealthy Linux malware stayed undetected for two years. Versa Networks patches a zero-day vulnerability. Google has patched its tenth zero-day vulnerability of 2024. Researchers at Arkose labs document Greasy Opal. A flaw in Microsoft 365 Copilot allowed attackers to exfiltrate sensitive user data. Gafgyt targets crypto mining in cloud native environments. Microsoft investigates an Exchange Online message quarantine issue. Our guest is Bar Kaduri, research team leader at Orca Security talking about AI Goat, the first open source AI security learning environment based on the OWASP top 10 ML risks. Kentucky Prisoners Trick Tablets to Generate Fake Money. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Bar Kaduri, research team leader at Orca Security talking about AI Goat, the first open source AI security learning environment based on the OWASP top 10 ML risks. Available on GitHub, AI Goat is an intentionally vulnerable AI environment built in Terraform that includes numerous threats and vulnerabilities for testing and learning purposes. Learn more. 

Selected Reading
Arrest of Telegram CEO sparks cyberattacks against French websites (SC Media)
Unveiling sedexp: A Stealthy Linux Malware Exploiting udev Rules (AON)	
Stealthy 'sedexp' Linux malware evaded detection for two years (Bleeping Computer)
Google tags a tenth Chrome zero-day as exploited this year (Bleeping Computer)
Versa fixes Director zero-day vulnerability exploited in attacks (Bleeping Computer)
Greasy Opal: Greasing the Skids for Cybercrime (Arkose Labs)
Microsoft Copilot Prompt Injection Vulnerability Let Hackers Exfiltrate Personal Data (Cyber Security News)
Gafgyt Botnet: Weak SSH Passwords Targeted For GPU Mining (Security Boulevard)
Microsoft: Exchange Online mistakenly tags emails as malware (Bleeping Computer)
Kentucky prisoners hack state-issued computer tablets to digitally create $1M. How’d they do it? (Union Bulletin)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hacktivists respond to the arrest of Telegram’s CEO in France. Stealthy Linux malware stayed undetected for two years. Versa Networks patches a zero-day vulnerability. Google has patched its tenth zero-day vulnerability of 2024. Researchers at Arkose labs document Greasy Opal. A flaw in Microsoft 365 Copilot allowed attackers to exfiltrate sensitive user data. Gafgyt targets crypto mining in cloud native environments. Microsoft investigates an Exchange Online message quarantine issue. Our guest is Bar Kaduri, research team leader at Orca Security talking about AI Goat, the first open source AI security learning environment based on the OWASP top 10 ML risks. Kentucky Prisoners Trick Tablets to Generate Fake Money. </p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/bar-kaduri/">Bar Kaduri</a>, research team leader at <a href="https://orca.security/">Orca Security</a> talking about AI Goat, the first open source AI security learning environment based on the OWASP top 10 ML risks. Available on GitHub, AI Goat is an intentionally vulnerable AI environment built in Terraform that includes numerous threats and vulnerabilities for testing and learning purposes. <a href="https://orca.security/resources/blog/orca-ai-goat-open-source-environment-owasp-risks/">Learn more</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.scmagazine.com/brief/arrest-of-telegram-ceo-sparks-cyberattacks-against-french-websites">Arrest of Telegram CEO sparks cyberattacks against French websites</a> (SC Media)</p><p><a href="https://www.aon.com/en/insights/cyber-labs/unveiling-sedexp">Unveiling sedexp: A Stealthy Linux Malware Exploiting udev Rules</a> (AON)	</p><p><a href="https://www.bleepingcomputer.com/news/security/stealthy-sedexp-linux-malware-evaded-detection-for-two-years/">Stealthy 'sedexp' Linux malware evaded detection for two years</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/google-tags-a-tenth-chrome-zero-day-as-exploited-this-year/">Google tags a tenth Chrome zero-day as exploited this year</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/versa-fixes-director-zero-day-vulnerability-exploited-in-attacks/">Versa fixes Director zero-day vulnerability exploited in attacks</a> (Bleeping Computer)</p><p><a href="https://www.arkoselabs.com/resource/dossier-greasy-opal-greasing-skids-cybercrime/">Greasy Opal: Greasing the Skids for Cybercrime</a> (Arkose Labs)</p><p><a href="https://cybersecuritynews.com/copilot-prompt-injection-vulnerability/">Microsoft Copilot Prompt Injection Vulnerability Let Hackers Exfiltrate Personal Data</a> (Cyber Security News)</p><p><a href="https://securityboulevard.com/2024/08/gafgyt-botnet-weak-ssh-passwords-targeted-for-gpu-mining/">Gafgyt Botnet: Weak SSH Passwords Targeted For GPU Mining</a> (Security Boulevard)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-exchange-online-mistakenly-tags-emails-as-malware/">Microsoft: Exchange Online mistakenly tags emails as malware</a> (Bleeping Computer)</p><p><a href="https://www.union-bulletin.com/news/national/kentucky-prisoners-hack-state-issued-computer-tablets-to-digitally-create-1m-how-d-they-do/article_f28eb222-c372-5a3c-bd43-102dd1a1f282.html">Kentucky prisoners hack state-issued computer tablets to digitally create $1M. How’d they do it?</a> (Union Bulletin)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1520</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aa65db34-b95e-11ee-8cf8-0f9c8248be0f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8576655498.mp3?updated=1724785348" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From secret chats to public spats.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2137/notes</link>
      <description>Telegram’s CEO is arrested by French police, presumably over moderation failures. A cyberattack disrupted services at Seattle-Tacoma International Airport and the Port of Seattle. SonicWall has warned customers of a critical vulnerability that could lead to unauthorized access or a firewall crash. Dutch and French regulators fined Uber €290 million for failing to protect the privacy of EU drivers. Microsoft will host a cybersecurity conference next month in response to the disastrous CrowdStrike software update. Radio Free Europe/Radio Liberty looks at Iran’s active attempts to interfere in the upcoming U.S. presidential election. Our guests are Danielle Ruderman, Senior Manager for Worldwide Security Specialists at AWS, and Adam Mikeal, CISO at Texas A&amp;M. They spoke with N2K’s Brandon Karpf about CISO Circles, security challenges faced in higher education, and fostering the culture of security. Pig Butchering devastates a small town bank. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guests are Danielle Ruderman, Senior Manager for Worldwide Security Specialists at AWS, and Adam Mikeal, CISO at Texas A&amp;M. They spoke with N2K’s Brandon Karpf about CISO Circles, security challenges faced in higher education, and fostering the culture of security. Brandon spoke with Danielle and Adam at AWS’ re:Inforce 2024. 

Selected Reading
Telegram CEO Pavel Durov arrested at French airport (BBC)
Is Telegram really an encrypted messaging app? – A Few Thoughts on Cryptographic Engineering (Cryptography Engineering)
The Port of Seattle and Sea-Tac Airport say they’ve been hit by ‘possible cyberattack’ (TechCrunch)
Nearly 32 Million Documents, Invoices, Contracts, and Agreements Exposed Online by Global Field Service Management Provider (Website Planet)
SonicWall Patches Critical SonicOS Vulnerability (SecurityWeek)
Uber fined €290 million for sending drivers’ data outside Europe (Politico)
Microsoft plans September cybersecurity event to discuss changes after CrowdStrike outage (CNBC)
Iran Tries To 'Storm' U.S. Election With Russian-Style Disinformation Campaign (Radio Free Europe/Radio Liberty)
Audit finds notable security gaps in FBI's storage media management (Bleeping Computer)
Cryptocurrency 'pig butchering' scam wrecks Kansas bank, sends ex-CEO to prison for 24 years (CNBC)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 26 Aug 2024 20:10:00 -0000</pubDate>
      <itunes:title>From secret chats to public spats.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2137</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Telegram’s CEO is arrested by French police, presumably over moderation failures. A cyberattack disrupted services at Seattle-Tacoma International Airport and the Port of Seattle. SonicWall has warned customers of a critical vulnerability that could lead to unauthorized access or a firewall crash. Dutch and French regulators fined Uber €290 million for failing to protect the privacy of EU drivers. Microsoft will host a cybersecurity conference next month in response to the disastrous CrowdStrike software update. Radio Free Europe/Radio Liberty looks at Iran’s active attempts to interfere in the upcoming U.S. presidential election. Our guests are Danielle Ruderman, Senior Manager for Worldwide Security Specialists at AWS, and Adam Mikeal, CISO at Texas A&amp;M. They spoke with N2K’s Brandon Karpf about CISO Circles, security challenges faced in higher education, and fostering the culture of security. Pig Butchering devastates a small town bank. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guests are Danielle Ruderman, Senior Manager for Worldwide Security Specialists at AWS, and Adam Mikeal, CISO at Texas A&amp;M. They spoke with N2K’s Brandon Karpf about CISO Circles, security challenges faced in higher education, and fostering the culture of security. Brandon spoke with Danielle and Adam at AWS’ re:Inforce 2024. 

Selected Reading
Telegram CEO Pavel Durov arrested at French airport (BBC)
Is Telegram really an encrypted messaging app? – A Few Thoughts on Cryptographic Engineering (Cryptography Engineering)
The Port of Seattle and Sea-Tac Airport say they’ve been hit by ‘possible cyberattack’ (TechCrunch)
Nearly 32 Million Documents, Invoices, Contracts, and Agreements Exposed Online by Global Field Service Management Provider (Website Planet)
SonicWall Patches Critical SonicOS Vulnerability (SecurityWeek)
Uber fined €290 million for sending drivers’ data outside Europe (Politico)
Microsoft plans September cybersecurity event to discuss changes after CrowdStrike outage (CNBC)
Iran Tries To 'Storm' U.S. Election With Russian-Style Disinformation Campaign (Radio Free Europe/Radio Liberty)
Audit finds notable security gaps in FBI's storage media management (Bleeping Computer)
Cryptocurrency 'pig butchering' scam wrecks Kansas bank, sends ex-CEO to prison for 24 years (CNBC)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Telegram’s CEO is arrested by French police, presumably over moderation failures. A cyberattack disrupted services at Seattle-Tacoma International Airport and the Port of Seattle. SonicWall has warned customers of a critical vulnerability that could lead to unauthorized access or a firewall crash. Dutch and French regulators fined Uber €290 million for failing to protect the privacy of EU drivers. Microsoft will host a cybersecurity conference next month in response to the disastrous CrowdStrike software update. Radio Free Europe/Radio Liberty looks at Iran’s active attempts to interfere in the upcoming U.S. presidential election. Our guests are Danielle Ruderman, Senior Manager for Worldwide Security Specialists at AWS, and Adam Mikeal, CISO at Texas A&amp;M. They spoke with N2K’s Brandon Karpf about CISO Circles, security challenges faced in higher education, and fostering the culture of security. Pig Butchering devastates a small town bank. </p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guests are <a href="https://www.linkedin.com/in/daniellebiancaruderman/">Danielle Ruderman</a>, Senior Manager for Worldwide Security Specialists at <a href="https://aws.amazon.com/">AWS</a>, and <a href="https://www.linkedin.com/in/amikeal/">Adam Mikeal</a>, CISO at <a href="https://www.tamu.edu/">Texas A&amp;M</a>. They spoke with <a href="https://www.n2k.com/">N2K</a>’s <a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a> about CISO Circles, security challenges faced in higher education, and fostering the culture of security. Brandon spoke with Danielle and Adam at AWS’ re:<a href="https://reinforce.awsevents.com/">Inforce 2024.</a> </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bbc.com/news/articles/ckg2kz9kn93o">Telegram CEO Pavel Durov arrested at French airport</a> (BBC)</p><p><a href="https://blog.cryptographyengineering.com/2024/08/25/telegram-is-not-really-an-encrypted-messaging-app/">Is Telegram really an encrypted messaging app? – A Few Thoughts on Cryptographic Engineering</a> (Cryptography Engineering)</p><p><a href="https://techcrunch.com/2024/08/25/the-port-of-seattle-and-sea-tac-airport-say-theyve-been-hit-by-possible-cyberattack/">The Port of Seattle and Sea-Tac Airport say they’ve been hit by ‘possible cyberattack’</a> (TechCrunch)</p><p><a href="https://www.websiteplanet.com/news/servicebridge-breach-report/">Nearly 32 Million Documents, Invoices, Contracts, and Agreements Exposed Online by Global Field Service Management Provider</a> (Website Planet)</p><p><a href="https://www.securityweek.com/sonicwall-patches-critical-sonicos-vulnerability/">SonicWall Patches Critical SonicOS Vulnerability</a> (SecurityWeek)</p><p><a href="https://www.politico.eu/article/uber-fined-e290-million-for-sending-drivers-data-outside-europe/?mid=1#cid=2169118">Uber fined €290 million for sending drivers’ data outside Europe</a> (Politico)</p><p><a href="https://www.cnbc.com/2024/08/23/microsoft-plans-september-cybersecurity-event-after-crowdstrike-outage.html">Microsoft plans September cybersecurity event to discuss changes after CrowdStrike outage</a> (CNBC)</p><p><a href="https://www.rferl.org/a/iran-us-election-disinformation-harris-trump/33089022.html">Iran Tries To 'Storm' U.S. Election With Russian-Style Disinformation Campaign</a> (Radio Free Europe/Radio Liberty)</p><p><a href="https://www.bleepingcomputer.com/news/security/audit-finds-notable-security-gaps-in-fbis-storage-media-management/">Audit finds notable security gaps in FBI's storage media management</a> (Bleeping Computer)</p><p><a href="https://www.cnbc.com/2024/08/21/cryptocurrency-shan-hanes-pig-butchering-scam.html">Cryptocurrency 'pig butchering' scam wrecks Kansas bank, sends ex-CEO to prison for 24 years</a> (CNBC)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1570</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aa263ef2-b95e-11ee-8cf8-bf089617e100]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6030360732.mp3?updated=1724699373" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ellen Sundra: Actions speak louder than words. [Engineering] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/30/notes</link>
      <description>Enjoy this special encore episode, where we are joined by Vice President of Global Systems Engineering Ellen Sundra and she shares her career path from life as a college grad who found her niche by creating a training program to a leader in cybersecurity. She realized that training and educating people was her passion. Ellen sees her value in providing soft skills as a natural balance to her technical team at Forescout Technologies. Being a woman in a male-dominated world proved to be a challenge and gaining her confidence to share her unique point of view helped her excel in it. Ellen recommends keeping your eyes open for how your skill set fits into cybersecurity. Find your perspective and really embrace it! We thank Ellen for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 25 Aug 2024 07:00:00 -0000</pubDate>
      <itunes:title>Ellen Sundra: Actions speak louder than words. [Engineering] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>30</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this special encore episode, where we are joined by Vice President of Global Systems Engineering Ellen Sundra and she shares her career path from life as a college grad who found her niche by creating a training program to a leader in cybersecurity. She realized that training and educating people was her passion. Ellen sees her value in providing soft skills as a natural balance to her technical team at Forescout Technologies. Being a woman in a male-dominated world proved to be a challenge and gaining her confidence to share her unique point of view helped her excel in it. Ellen recommends keeping your eyes open for how your skill set fits into cybersecurity. Find your perspective and really embrace it! We thank Ellen for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special encore episode, where we are joined by Vice President of Global Systems Engineering Ellen Sundra and she shares her career path from life as a college grad who found her niche by creating a training program to a leader in cybersecurity. She realized that training and educating people was her passion. Ellen sees her value in providing soft skills as a natural balance to her technical team at Forescout Technologies. Being a woman in a male-dominated world proved to be a challenge and gaining her confidence to share her unique point of view helped her excel in it. Ellen recommends keeping your eyes open for how your skill set fits into cybersecurity. Find your perspective and really embrace it! We thank Ellen for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>454</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7f39eda4-617b-11ef-b3ee-c76634cc8e65]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2215556143.mp3?updated=1724437152" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Quantum-proof and ready: NIST unveils the future of encryption. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/70/notes</link>
      <description>In this Special Edition podcast, N2K's Executive Editor Brandon Karpf speaks with Dustin Moody, mathematician at NIST, about their first 3 recently finalized post-quantum encryption standards.

NIST finalized a key set of encryption algorithms designed to protect against future cyberattacks from quantum computers, which operate in fundamentally different ways from traditional computers. Listen as Brandon and Dustin discuss these algorithms and how quantum computing will change the way we view encryption and cyber attacks in the future. 

Resources:
NIST Releases First 3 Finalized Post-Quantum Encryption Standards (NIST)

FIPS 203

FIPS 204

FIPS 205

What is Post Quantum Cryptography? (NIST)
National Cybersecurity Center of Excellence (NCCoE)
Post-Quantum Cryptography Standardization Project (NIST)
Need to know: NIST finalizes post-quantum encryption standards essential for cybersecurity. (N2K CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 25 Aug 2024 06:00:00 -0000</pubDate>
      <itunes:title>Quantum-proof and ready: NIST unveils the future of encryption. [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>70</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this Special Edition podcast, N2K's Executive Editor Brandon Karpf speaks with Dustin Moody, mathematician at NIST, about their first 3 recently finalized post-quantum encryption standards.

NIST finalized a key set of encryption algorithms designed to protect against future cyberattacks from quantum computers, which operate in fundamentally different ways from traditional computers. Listen as Brandon and Dustin discuss these algorithms and how quantum computing will change the way we view encryption and cyber attacks in the future. 

Resources:
NIST Releases First 3 Finalized Post-Quantum Encryption Standards (NIST)

FIPS 203

FIPS 204

FIPS 205

What is Post Quantum Cryptography? (NIST)
National Cybersecurity Center of Excellence (NCCoE)
Post-Quantum Cryptography Standardization Project (NIST)
Need to know: NIST finalizes post-quantum encryption standards essential for cybersecurity. (N2K CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this Special Edition podcast, <a href="https://www.n2k.com/">N2K</a>'s Executive Editor <a href="https://www.linkedin.com/in/brandon-karpf?miniProfileUrn=urn%3Ali%3Afsd_profile%3AACoAAC_NTGsBc2E8E6H8UXjNCs_zBoGJW7wzXdk&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BUyr0ds6jQCSNrFnfsjiBpg%3D%3D">Brandon Karpf</a> speaks with <a href="https://www.linkedin.com/in/dustin-moody-88410550/">Dustin Moody</a>, mathematician at <a href="https://www.linkedin.com/in/dustin-moody-88410550/">NIST</a>, about their first 3 recently finalized post-quantum encryption standards.</p><p><br></p><p>NIST finalized a key set of encryption algorithms designed to protect against future cyberattacks from quantum computers, which operate in fundamentally different ways from traditional computers. Listen as Brandon and Dustin discuss these algorithms and how quantum computing will change the way we view encryption and cyber attacks in the future. </p><p><br></p><h3>Resources:</h3><p><a href="https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards">NIST Releases First 3 Finalized Post-Quantum Encryption Standards</a> (NIST)</p><ul>
<li><a href="https://csrc.nist.gov/pubs/fips/203/final">FIPS 203</a></li>
<li><a href="https://csrc.nist.gov/pubs/fips/204/final">FIPS 204</a></li>
<li><a href="https://csrc.nist.gov/pubs/fips/205/final">FIPS 205</a></li>
</ul><p><a href="https://www.nist.gov/cybersecurity/what-post-quantum-cryptography">What is Post Quantum Cryptography?</a> (NIST)</p><p><a href="https://www.nccoe.nist.gov/">National Cybersecurity Center of Excellence (NCCoE)</a></p><p><a href="https://csrc.nist.gov/projects/post-quantum-cryptography/post-quantum-cryptography-standardization">Post-Quantum Cryptography Standardization Project</a> (NIST)</p><p><a href="https://thecyberwire.com/stories/4118c57e137a41709bd52c15aac15d3e/need-to-know-nist-finalizes-post-quantum-encryption-standards-essential-for-cybersecurity">Need to know: NIST finalizes post-quantum encryption standards essential for cybersecurity.</a> (N2K CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1683</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ea5a1fc2-6181-11ef-a32b-ab6a87aa51c5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4247735224.mp3?updated=1724442370" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>MaaS infrastructure exposed. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/343/notes</link>
      <description>Robert Duncan, VP of Product Strategy from Netcraft, is discussing their work on "Mule-as-a-Service Infrastructure Exposed." Netcraft's new threat intelligence reveals the intricate connections within global fraud networks, showing how criminals use specialized services like Mule-as-a-Service (MaaS) to launder scam proceeds. 
By mapping the cyber and financial infrastructure, including bank accounts, crypto wallets, and phone numbers, Netcraft exposes how different scams are interconnected and identifies weak points that can be targeted to disrupt these operations. This insight provides an opportunity to prevent fraud and protect against financial crimes like pig butchering, investment scams, and romance fraud.
The research can be found here:
Mule-as-a-Service Infrastructure Exposed

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Aug 2024 07:00:00 -0000</pubDate>
      <itunes:title>MaaS infrastructure exposed. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>339</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Robert Duncan, VP of Product Strategy from Netcraft, is discussing their work on "Mule-as-a-Service Infrastructure Exposed." Netcraft's new threat intelligence reveals the intricate connections within global fraud networks, showing how criminals use specialized services like Mule-as-a-Service (MaaS) to launder scam proceeds. 
By mapping the cyber and financial infrastructure, including bank accounts, crypto wallets, and phone numbers, Netcraft exposes how different scams are interconnected and identifies weak points that can be targeted to disrupt these operations. This insight provides an opportunity to prevent fraud and protect against financial crimes like pig butchering, investment scams, and romance fraud.
The research can be found here:
Mule-as-a-Service Infrastructure Exposed

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Robert Duncan, VP of Product Strategy from Netcraft, is discussing their work on "Mule-as-a-Service Infrastructure Exposed." Netcraft's new threat intelligence reveals the intricate connections within global fraud networks, showing how criminals use specialized services like Mule-as-a-Service (MaaS) to launder scam proceeds. </p><p>By mapping the cyber and financial infrastructure, including bank accounts, crypto wallets, and phone numbers, Netcraft exposes how different scams are interconnected and identifies weak points that can be targeted to disrupt these operations. This insight provides an opportunity to prevent fraud and protect against financial crimes like pig butchering, investment scams, and romance fraud.</p><p>The research can be found here:</p><ul><li><a href="https://www.netcraft.com/blog/mule-as-a-service-infrastructure-exposed/">Mule-as-a-Service Infrastructure Exposed</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2b224c66-6167-11ef-a877-3b77940a720c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2938833812.mp3?updated=1724434112" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hackers strike LiteSpeed cache again. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2136/notes</link>
      <description>The exploitation of the LiteSpeed Cache Wordpress plugin has begun. Halliburton confirms a cyberattack. Velvet Ant targets Cisco Switch appliances. The Qilin ransomware group harvests credentials stored in Google Chrome. Ham radio enthusiasts pay a million dollar ransom. SolarWinds releases a hotfix to fix a hotfix. A telecom company will pay a million dollar fine over President Biden deepfakes. The Justice Department is suing the Georgia Institute of Technology and an affiliated company for allegedly failing to meet required cybersecurity standards for Pentagon contracts. Today’s guest is Dustin Moody, mathematician at NIST, speaking with N2K's Brandon Karpf about post-quantum encryption standards.  When it comes to phishing simulations, sometimes the cure is scarier than the disease.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest Dustin Moody, mathematician at NIST, talks with N2K's Brandon Karpf about their first 3 finalized post-quantum encryption standards. You can hear more of Brandon and Dustin’s conversation as they go into more detail on the individual standards on Sunday in our Special Edition podcast. Stay tuned. 
You can read more on the newly-released standards here. Want to learn more about what post-quantum cryptography is? Check out this resource from NICE. 

Selected Reading
Hackers are exploiting critical bug in LiteSpeed Cache plugin (Bleeping Computer)
Oil industry giant Halliburton confirms 'issue' following reported cyberattack (The Record)
China-Nexus Threat Group ‘Velvet Ant’ Exploits Zero-Day on Cisco Nexus Switches (Sygnia)
Qilin ransomware now steals credentials from Chrome browsers (Bleeping Computer)
ARRL IT Security Incident - Report to Members (ARRL: The National Association for Amateur Radio)
SolarWinds Leaks Credentials in Hotfix for Exploited Web Help Desk Flaw (SecurityWeek)
Telecom company hit with $1 million penalty over AI-generated fake Biden robocalls (The Record)
DOJ sues Georgia Tech over allegedly failing to meet cyber requirements for DOD contracts (CyberScoop)
Uni phishing test based on fake Ebola scare prompts apology (The Register)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 23 Aug 2024 20:10:00 -0000</pubDate>
      <itunes:title>Hackers strike LiteSpeed cache again. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2136</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The exploitation of the LiteSpeed Cache Wordpress plugin has begun. Halliburton confirms a cyberattack. Velvet Ant targets Cisco Switch appliances. The Qilin ransomware group harvests credentials stored in Google Chrome. Ham radio enthusiasts pay a million dollar ransom. SolarWinds releases a hotfix to fix a hotfix. A telecom company will pay a million dollar fine over President Biden deepfakes. The Justice Department is suing the Georgia Institute of Technology and an affiliated company for allegedly failing to meet required cybersecurity standards for Pentagon contracts. Today’s guest is Dustin Moody, mathematician at NIST, speaking with N2K's Brandon Karpf about post-quantum encryption standards.  When it comes to phishing simulations, sometimes the cure is scarier than the disease.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest Dustin Moody, mathematician at NIST, talks with N2K's Brandon Karpf about their first 3 finalized post-quantum encryption standards. You can hear more of Brandon and Dustin’s conversation as they go into more detail on the individual standards on Sunday in our Special Edition podcast. Stay tuned. 
You can read more on the newly-released standards here. Want to learn more about what post-quantum cryptography is? Check out this resource from NICE. 

Selected Reading
Hackers are exploiting critical bug in LiteSpeed Cache plugin (Bleeping Computer)
Oil industry giant Halliburton confirms 'issue' following reported cyberattack (The Record)
China-Nexus Threat Group ‘Velvet Ant’ Exploits Zero-Day on Cisco Nexus Switches (Sygnia)
Qilin ransomware now steals credentials from Chrome browsers (Bleeping Computer)
ARRL IT Security Incident - Report to Members (ARRL: The National Association for Amateur Radio)
SolarWinds Leaks Credentials in Hotfix for Exploited Web Help Desk Flaw (SecurityWeek)
Telecom company hit with $1 million penalty over AI-generated fake Biden robocalls (The Record)
DOJ sues Georgia Tech over allegedly failing to meet cyber requirements for DOD contracts (CyberScoop)
Uni phishing test based on fake Ebola scare prompts apology (The Register)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The exploitation of the LiteSpeed Cache Wordpress plugin has begun. Halliburton confirms a cyberattack. Velvet Ant targets Cisco Switch appliances. The Qilin ransomware group harvests credentials stored in Google Chrome. Ham radio enthusiasts pay a million dollar ransom. SolarWinds releases a hotfix to fix a hotfix. A telecom company will pay a million dollar fine over President Biden deepfakes. The Justice Department is suing the Georgia Institute of Technology and an affiliated company for allegedly failing to meet required cybersecurity standards for Pentagon contracts. Today’s guest is Dustin Moody, mathematician at NIST, speaking with N2K's Brandon Karpf about post-quantum encryption standards.  When it comes to phishing simulations, sometimes the cure is scarier than the disease.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today’s guest <a href="https://www.linkedin.com/in/dustin-moody-88410550/">Dustin Moody</a>, mathematician at <a href="https://www.nist.gov/">NIST</a>, talks with <a href="https://www.n2k.com/">N2K</a>'s <a href="https://www.linkedin.com/in/brandon-karpf?miniProfileUrn=urn%3Ali%3Afsd_profile%3AACoAAC_NTGsBc2E8E6H8UXjNCs_zBoGJW7wzXdk&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BUyr0ds6jQCSNrFnfsjiBpg%3D%3D">Brandon Karpf</a> about their first 3 finalized post-quantum encryption standards. You can hear more of Brandon and Dustin’s conversation as they go into more detail on the individual standards on Sunday in our Special Edition podcast. Stay tuned. </p><p>You can read more on the newly-released standards <a href="https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards">here</a>. Want to learn more about what post-quantum cryptography is? Check out <a href="https://www.nist.gov/cybersecurity/what-post-quantum-cryptography">this resource</a> from NICE. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/hackers-are-exploiting-critical-bug-in-litespeed-cache-plugin/">Hackers are exploiting critical bug in LiteSpeed Cache plugin</a> (Bleeping Computer)</p><p><a href="https://therecord.media/halliburton-reported-cyberattack-company-confirms-issue">Oil industry giant Halliburton confirms 'issue' following reported cyberattack</a> (The Record)</p><p><a href="https://www.sygnia.co/blog/china-threat-group-velvet-ant-cisco-zero-day/">China-Nexus Threat Group ‘Velvet Ant’ Exploits Zero-Day on Cisco Nexus Switches</a> (Sygnia)</p><p><a href="https://www.bleepingcomputer.com/news/security/qilin-ransomware-now-steals-credentials-from-chrome-browsers/">Qilin ransomware now steals credentials from Chrome browsers</a> (Bleeping Computer)</p><p><a href="https://www.arrl.org/news/arrl-it-security-incident-report-to-members">ARRL IT Security Incident - Report to Members</a> (ARRL: The National Association for Amateur Radio)</p><p><a href="https://www.securityweek.com/solarwinds-leaks-credentials-in-hotfix-for-exploited-web-help-desk-flaw/">SolarWinds Leaks Credentials in Hotfix for Exploited Web Help Desk Flaw</a> (SecurityWeek)</p><p><a href="https://therecord.media/telecom-company-fined-1-million-biden-ai-robocalls">Telecom company hit with $1 million penalty over AI-generated fake Biden robocalls</a> (The Record)</p><p><a href="https://cyberscoop.com/georgia-tech-lawsuit-dod-contracts-cybersecurity/">DOJ sues Georgia Tech over allegedly failing to meet cyber requirements for DOD contracts</a> (CyberScoop)</p><p><a href="https://www.theregister.com/2024/08/22/ucsc_phishing_test_ebola/">Uni phishing test based on fake Ebola scare prompts apology</a> (The Register)</p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1445</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a9d3aac0-b95e-11ee-8cf8-1ff61fb5a0e3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2754271305.mp3?updated=1724440811" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Almost letting hackers rule the web.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2135/notes</link>
      <description>A Wordpress plugin vulnerability puts 5 million sites at risk. Google releases an emergency Chrome update addressing an actively exploited vulnerability. Cisco patches multiple vulnerabilities. Researchers say Slack AI is vulnerable to prompt injection. Widely used RFID smart cards could be easily backdoored. The FAA proposes new cybersecurity rules for airplanes, engines, and propellers. A member of the Russian Karakurt ransomware group faces charges in the U.S. The Five Eyes release a guide on Best Practices for Event Logging and Threat Detection. The Kremlin claims widespread online outages are due to DDoS, but experts think otherwise. In our Threat Vector segment, guest host Michael Sikorski speaks with Jason Healey, Senior Research Scholar at Columbia University's School of International and Public Affairs. A deadbeat dad dodges debt through death. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
In this Threat Vector segment, guest host Michael Sikorski, CTO of Unit 42, engages in a thought-provoking conversation about the historical challenges and advances in cyber conflict with Jason Healey, Senior Research Scholar at Columbia University's School of International and Public Affairs. To listen to their full conversation, check out the episode here. You can catch new episodes of Threat Vector every Thursday on the N2K CyberWire network. 

Selected Reading
Critical Privilege Escalation in LiteSpeed Cache Plugin (Patchstack)
Google fixes ninth Chrome zero-day exploited in attacks this year (The Register)
Cisco Patches High-Severity Vulnerability Reported by NSA (SecurityWeek)
Slack AI can leak private data via prompt injection (The Register)
Major Backdoor in Millions of RFID Cards Allows Instant Cloning (SecurityWeek)
FAA proposes new cybersecurity rules for airplanes (The Record)
U.S. charges Karakurt extortion gang’s “cold case” negotiator (Bleeping Computer)
ASD’s ACSC, CISA, FBI, and NSA, with the support of International Partners Release Best Practices for Event Logging and Threat Detection (CISA)
Kremlin blames widespread website disruptions on DDoS attack; digital experts disagree (The Record)
Deadbeat dad faked his own death by hacking government sites (The Register)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 22 Aug 2024 20:10:00 -0000</pubDate>
      <itunes:title>Almost letting hackers rule the web.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2135</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A Wordpress plugin vulnerability puts 5 million sites at risk. Google releases an emergency Chrome update addressing an actively exploited vulnerability. Cisco patches multiple vulnerabilities. Researchers say Slack AI is vulnerable to prompt injection. Widely used RFID smart cards could be easily backdoored. The FAA proposes new cybersecurity rules for airplanes, engines, and propellers. A member of the Russian Karakurt ransomware group faces charges in the U.S. The Five Eyes release a guide on Best Practices for Event Logging and Threat Detection. The Kremlin claims widespread online outages are due to DDoS, but experts think otherwise. In our Threat Vector segment, guest host Michael Sikorski speaks with Jason Healey, Senior Research Scholar at Columbia University's School of International and Public Affairs. A deadbeat dad dodges debt through death. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
In this Threat Vector segment, guest host Michael Sikorski, CTO of Unit 42, engages in a thought-provoking conversation about the historical challenges and advances in cyber conflict with Jason Healey, Senior Research Scholar at Columbia University's School of International and Public Affairs. To listen to their full conversation, check out the episode here. You can catch new episodes of Threat Vector every Thursday on the N2K CyberWire network. 

Selected Reading
Critical Privilege Escalation in LiteSpeed Cache Plugin (Patchstack)
Google fixes ninth Chrome zero-day exploited in attacks this year (The Register)
Cisco Patches High-Severity Vulnerability Reported by NSA (SecurityWeek)
Slack AI can leak private data via prompt injection (The Register)
Major Backdoor in Millions of RFID Cards Allows Instant Cloning (SecurityWeek)
FAA proposes new cybersecurity rules for airplanes (The Record)
U.S. charges Karakurt extortion gang’s “cold case” negotiator (Bleeping Computer)
ASD’s ACSC, CISA, FBI, and NSA, with the support of International Partners Release Best Practices for Event Logging and Threat Detection (CISA)
Kremlin blames widespread website disruptions on DDoS attack; digital experts disagree (The Record)
Deadbeat dad faked his own death by hacking government sites (The Register)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Wordpress plugin vulnerability puts 5 million sites at risk. Google releases an emergency Chrome update addressing an actively exploited vulnerability. Cisco patches multiple vulnerabilities. Researchers say Slack AI is vulnerable to prompt injection. Widely used RFID smart cards could be easily backdoored. The FAA proposes new cybersecurity rules for airplanes, engines, and propellers. A member of the Russian Karakurt ransomware group faces charges in the U.S. The Five Eyes release a guide on Best Practices for Event Logging and Threat Detection. The Kremlin claims widespread online outages are due to DDoS, but experts think otherwise. In our Threat Vector segment, guest host Michael Sikorski speaks with Jason Healey, Senior Research Scholar at Columbia University's School of International and Public Affairs. A deadbeat dad dodges debt through death. </p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Threat Vector Segment</h2><p>In this <a href="https://thecyberwire.com/podcasts/threat-vector">Threat Vector</a> segment, guest host <a href="https://www.linkedin.com/in/mikesiko/">Michael Sikorski</a>, CTO of Unit 42, engages in a thought-provoking conversation about the historical challenges and advances in cyber conflict with <a href="https://www.linkedin.com/in/jasonhealey/">Jason Healey</a>, Senior Research Scholar at Columbia University's School of International and Public Affairs. To listen to their full conversation, check out the episode <a href="https://thecyberwire.com/podcasts/threat-vector/30/notes">here</a>. You can catch new episodes of Threat Vector every Thursday on the N2K CyberWire network. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://patchstack.com/articles/critical-privilege-escalation-in-litespeed-cache-plugin-affecting-5-million-sites">Critical Privilege Escalation in LiteSpeed Cache Plugin</a> (Patchstack)</p><p><a href="https://www.bleepingcomputer.com/news/security/google-fixes-tenth-actively-exploited-chrome-zero-day-in-2024/">Google fixes ninth Chrome zero-day exploited in attacks this year</a> (The Register)</p><p><a href="https://www.securityweek.com/cisco-patches-high-severity-vulnerability-reported-by-nsa/">Cisco Patches High-Severity Vulnerability Reported by NSA</a> (SecurityWeek)</p><p><a href="https://www.theregister.com/2024/08/21/slack_ai_prompt_injection/">Slack AI can leak private data via prompt injection</a> (The Register)</p><p><a href="https://www.securityweek.com/major-backdoor-in-millions-of-rfid-cards-allows-instant-cloning/">Major Backdoor in Millions of RFID Cards Allows Instant Cloning</a> (SecurityWeek)</p><p><a href="https://therecord.media/faa-new-cybersecurity-rules-airplanes">FAA proposes new cybersecurity rules for airplanes</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/legal/us-charges-karakurt-extortion-gangs-cold-case-negotiator/">U.S. charges Karakurt extortion gang’s “cold case” negotiator</a> (Bleeping Computer)</p><p><a href="https://www.cisa.gov/news-events/alerts/2024/08/21/asds-acsc-cisa-fbi-and-nsa-support-international-partners-release-best-practices-event-logging-and">ASD’s ACSC, CISA, FBI, and NSA, with the support of International Partners Release Best Practices for Event Logging and Threat Detection</a> (CISA)</p><p><a href="https://therecord.media/russia-blames-websites-apps-outages-on-ddos">Kremlin blames widespread website disruptions on DDoS attack; digital experts disagree</a> (The Record)</p><p><a href="https://www.theregister.com/2024/08/21/man_jailed_faking_death_online/">Deadbeat dad faked his own death by hacking government sites</a> (The Register)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1567</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a994dd36-b95e-11ee-8cf8-33c32de6f12e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2056715715.mp3?updated=1724354165" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberattack cripples major American chipmaker.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2134/notes</link>
      <description>A major American chipmaker discloses a cyberattack. Cybercriminals exploit Progressive Web Applications (PWAs) to bypass iOS and Android defenses. Mandiant uncovers a privilege escalation vulnerability in Microsoft Azure Kubernetes Services. ALBeast hits ALB. Microsoft’s latest security update has caused significant issues for dual-boot systems. The DOE’s new SolarSnitch program aims to sure up solar panel security. Researchers uncover LLM poisoning techniques. An Iranian-linked group uses a fake podcast to lure a target. Our guest is Parya Lotfi, CEO of DuckDuckGoose, discussing the increasing problem of deepfakes in the cybersecurity landscape. Return to sender - AirTag edition. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest Parya Lotfi, CEO of DuckDuckGoose, discusses the increasing relevance of deepfakes in the cybersecurity landscape.

Selected Reading
Microchip Technology discloses cyberattack impacting operations (Bleeping Computer)
Android and iOS users targeted with novel banking app phishing campaign (Cybernews)
Azure Kubernetes Services Vulnerability Exposed Sensitive Information (SecurityWeek)
ALBeast: Misconfiguration Flaw Exposes 15,000 AWS Load Balancers to Risk (HACKREAD)
Microsoft’s latest security update has ruined dual-boot Windows and Linux PCs (The Verge)
DOE debuts SolarSnitch technology to boost cybersecurity in solar energy systems (Industrial Cyber)
Researchers Highlight How Poisoned LLMs Can Suggest Vulnerable Code (Dark Reading)
Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset | Proofpoint US (Proofpoint)
Serial mail thieves thwarted when victim sends herself an AirTag (Apple Insider) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 21 Aug 2024 20:10:00 -0000</pubDate>
      <itunes:title>Cyberattack cripples major American chipmaker.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2134</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A major American chipmaker discloses a cyberattack. Cybercriminals exploit Progressive Web Applications (PWAs) to bypass iOS and Android defenses. Mandiant uncovers a privilege escalation vulnerability in Microsoft Azure Kubernetes Services. ALBeast hits ALB. Microsoft’s latest security update has caused significant issues for dual-boot systems. The DOE’s new SolarSnitch program aims to sure up solar panel security. Researchers uncover LLM poisoning techniques. An Iranian-linked group uses a fake podcast to lure a target. Our guest is Parya Lotfi, CEO of DuckDuckGoose, discussing the increasing problem of deepfakes in the cybersecurity landscape. Return to sender - AirTag edition. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest Parya Lotfi, CEO of DuckDuckGoose, discusses the increasing relevance of deepfakes in the cybersecurity landscape.

Selected Reading
Microchip Technology discloses cyberattack impacting operations (Bleeping Computer)
Android and iOS users targeted with novel banking app phishing campaign (Cybernews)
Azure Kubernetes Services Vulnerability Exposed Sensitive Information (SecurityWeek)
ALBeast: Misconfiguration Flaw Exposes 15,000 AWS Load Balancers to Risk (HACKREAD)
Microsoft’s latest security update has ruined dual-boot Windows and Linux PCs (The Verge)
DOE debuts SolarSnitch technology to boost cybersecurity in solar energy systems (Industrial Cyber)
Researchers Highlight How Poisoned LLMs Can Suggest Vulnerable Code (Dark Reading)
Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset | Proofpoint US (Proofpoint)
Serial mail thieves thwarted when victim sends herself an AirTag (Apple Insider) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A major American chipmaker discloses a cyberattack. Cybercriminals exploit Progressive Web Applications (PWAs) to bypass iOS and Android defenses. Mandiant uncovers a privilege escalation vulnerability in Microsoft Azure Kubernetes Services. ALBeast hits ALB. Microsoft’s latest security update has caused significant issues for dual-boot systems. The DOE’s new SolarSnitch program aims to sure up solar panel security. Researchers uncover LLM poisoning techniques. An Iranian-linked group uses a fake podcast to lure a target. Our guest is Parya Lotfi, CEO of DuckDuckGoose, discussing the increasing problem of deepfakes in the cybersecurity landscape. Return to sender - AirTag edition. </p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest <a href="https://www.linkedin.com/in/paryalotfi/">Parya Lotfi</a>, CEO of <a href="https://www.duckduckgoose.ai/">DuckDuckGoose</a>, discusses the increasing relevance of deepfakes in the cybersecurity landscape.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/microchip-technology-discloses-cyberattack-impacting-operations/">Microchip Technology discloses cyberattack impacting operations</a> (Bleeping Computer)</p><p><a href="https://cnews.link/android-ios-users-targeted-banking-app-phishing/">Android and iOS users targeted with novel banking app phishing campaign</a> (Cybernews)</p><p><a href="https://www.securityweek.com/azure-kubernetes-services-vulnerability-exposed-sensitive-information/">Azure Kubernetes Services Vulnerability Exposed Sensitive Information</a> (SecurityWeek)</p><p><a href="https://hackread.com/albeast-aws-misconfiguration-flaw-load-balancers-risk/">ALBeast: Misconfiguration Flaw Exposes 15,000 AWS Load Balancers to Risk</a> (HACKREAD)</p><p><a href="https://www.theverge.com/2024/8/21/24225108/microsoft-security-update-windows-linux-dual-boot-errors">Microsoft’s latest security update has ruined dual-boot Windows and Linux PCs</a> (The Verge)</p><p><a href="https://industrialcyber.co/threats-attacks/doe-debuts-solarsnitch-technology-to-boost-cybersecurity-in-solar-energy-systems/">DOE debuts SolarSnitch technology to boost cybersecurity in solar energy systems </a>(Industrial Cyber)</p><p><a href="https://www.darkreading.com/application-security/researchers-turn-code-completion-llms-into-attack-tools">Researchers Highlight How Poisoned LLMs Can Suggest Vulnerable Code</a> (Dark Reading)</p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/best-laid-plans-ta453-targets-religious-figure-fake-podcast-invite-delivering">Best Laid Plans: TA453 Targets Religious Figure with Fake Podcast Invite Delivering New BlackSmith Malware Toolset | Proofpoint US</a> (Proofpoint)</p><p><a href="https://appleinsider.com/articles/24/08/21/serial-mail-thieves-thwarted-when-victim-sends-herself-an-airtag">Serial mail thieves thwarted when victim sends herself an AirTag</a> (Apple Insider) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1706</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a957d1b6-b95e-11ee-8cf8-7337e8f3704c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7617296808.mp3?updated=1724265556" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybersecurity on the ballot.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2133/notes</link>
      <description>The Dem’s 2024 party platform touches on cybersecurity goals. The feds warn of increased Iranian influence operations. A severe security flaw has been discovered in a popular WordPress donation plugin. The Lazarus Group exploits a Windows zero-day to install a rootkit. Krebs on Security takes a closer look at the significant data breach at National Public Data. Toyota confirms a data breach after their data shows up on a hacking forum. A critical Jenkins vulnerability is added to CISA’s Known Exploited Vulnerabilities catalog. Cybercriminals steal credit card info from the Oregon Zoo. Guest CJ Moses, CISO at Amazon, discussing partnership and being a good custodian of the community in threat intel and information sharing. CISA gets new digs. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest CJ Moses, CISO at Amazon, speaks with N2K’s Brandon Karpf about partnership and being a good custodian of the community in threat intel and information sharing at re:Inforce 2024.

Selected Reading
Democratic Party Platform Contains Three Cyber Goals (Metacurity)
US warns of Iranian hackers escalating influence operations (Bleeping Computer)
Critical WordPress Plugin RCE Vulnerability Impacts 100k+ Sites (Cyber Security News)
Windows driver zero-day exploited by Lazarus hackers to install rootkit (Bleeping Computer)
National Public Data Published Its Own Passwords (Krebs on Security)
Toyota confirms breach after stolen data leaks on hacking forum (Bleeping Computer)
Critical Jenkins vulnerability added to CISA’s known vulnerabilities catalog (SC Media)
Cybercriminals siphon credit card numbers from Oregon Zoo website (The Record)
CISA to Get New $524 Million Headquarters in DC, Backed by Inflation Reduction Act Funding (SecurityWeek)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Aug 2024 20:10:00 -0000</pubDate>
      <itunes:title>Cybersecurity on the ballot.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2133</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The Dem’s 2024 party platform touches on cybersecurity goals. The feds warn of increased Iranian influence operations. A severe security flaw has been discovered in a popular WordPress donation plugin. The Lazarus Group exploits a Windows zero-day to install a rootkit. Krebs on Security takes a closer look at the significant data breach at National Public Data. Toyota confirms a data breach after their data shows up on a hacking forum. A critical Jenkins vulnerability is added to CISA’s Known Exploited Vulnerabilities catalog. Cybercriminals steal credit card info from the Oregon Zoo. Guest CJ Moses, CISO at Amazon, discussing partnership and being a good custodian of the community in threat intel and information sharing. CISA gets new digs. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest CJ Moses, CISO at Amazon, speaks with N2K’s Brandon Karpf about partnership and being a good custodian of the community in threat intel and information sharing at re:Inforce 2024.

Selected Reading
Democratic Party Platform Contains Three Cyber Goals (Metacurity)
US warns of Iranian hackers escalating influence operations (Bleeping Computer)
Critical WordPress Plugin RCE Vulnerability Impacts 100k+ Sites (Cyber Security News)
Windows driver zero-day exploited by Lazarus hackers to install rootkit (Bleeping Computer)
National Public Data Published Its Own Passwords (Krebs on Security)
Toyota confirms breach after stolen data leaks on hacking forum (Bleeping Computer)
Critical Jenkins vulnerability added to CISA’s known vulnerabilities catalog (SC Media)
Cybercriminals siphon credit card numbers from Oregon Zoo website (The Record)
CISA to Get New $524 Million Headquarters in DC, Backed by Inflation Reduction Act Funding (SecurityWeek)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Dem’s 2024 party platform touches on cybersecurity goals. The feds warn of increased Iranian influence operations. A severe security flaw has been discovered in a popular WordPress donation plugin. The Lazarus Group exploits a Windows zero-day to install a rootkit. Krebs on Security takes a closer look at the significant data breach at National Public Data. Toyota confirms a data breach after their data shows up on a hacking forum. A critical Jenkins vulnerability is added to CISA’s Known Exploited Vulnerabilities catalog. Cybercriminals steal credit card info from the Oregon Zoo. Guest CJ Moses, CISO at Amazon, discussing partnership and being a good custodian of the community in threat intel and information sharing. CISA gets new digs. </p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/cjmoses/">CJ Moses</a>, CISO at <a href="https://www.aboutamazon.com/">Amazon</a>, speaks with <a href="https://www.n2k.com/">N2K</a>’s <a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a> about partnership and being a good custodian of the community in threat intel and information sharing at <a href="https://reinforce.awsevents.com/">re:Inforce 2024</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.metacurity.com/democratic-party-platform-contains-three-cyber-goals/">Democratic Party Platform Contains Three Cyber Goals</a> (Metacurity)</p><p><a href="https://www.bleepingcomputer.com/news/security/us-warns-of-iranian-hackers-escalating-influence-operations/">US warns of Iranian hackers escalating influence operations</a> (Bleeping Computer)</p><p><a href="https://cybersecuritynews.com/wordpress-plugin-rce-vulnerability/">Critical WordPress Plugin RCE Vulnerability Impacts 100k+ Sites</a> (Cyber Security News)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/windows-driver-zero-day-exploited-by-lazarus-hackers-to-install-rootkit/">Windows driver zero-day exploited by Lazarus hackers to install rootkit</a> (Bleeping Computer)</p><p><a href="https://krebsonsecurity.com/2024/08/national-public-data-published-its-own-passwords/">National Public Data Published Its Own Passwords</a> (Krebs on Security)</p><p><a href="https://www.bleepingcomputer.com/news/security/toyota-confirms-breach-after-stolen-data-leaks-on-hacking-forum">Toyota confirms breach after stolen data leaks on hacking forum</a> (Bleeping Computer)</p><p><a href="https://www.scmagazine.com/news/critical-jenkins-vulnerability-added-to-cisas-known-vulnerabilities-catalog">Critical Jenkins vulnerability added to CISA’s known vulnerabilities catalog</a> (SC Media)</p><p><a href="https://therecord.media/cybercriminals-siphon-credit-card-info-from-zoo">Cybercriminals siphon credit card numbers from Oregon Zoo website</a> (The Record)</p><p><a href="https://www.securityweek.com/gsa-awards-contract-for-cisas-new-524-million-headquarters/">CISA to Get New $524 Million Headquarters in DC, Backed by Inflation Reduction Act Funding</a> (SecurityWeek)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1718</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a91ab98e-b95e-11ee-8cf8-cb7c3bd314d8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3632160779.mp3?updated=1724182323" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mic, camera, and more at risk.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2132/notes</link>
      <description>Cisco Talos discovers vulnerabilities in Microsoft applications for macOS. OpenAI disrupts an Iranian influence campaign. Jewish Home Lifecare discloses a data breach affecting over 100,000. Google tests an auto-redaction feature in Chrome for Android. Unicoin informs the SEC that it was locked out of G-Suite for four days. House lawmakers raise concerns over China-made WiFi routers. Moody’s likens the switch to post-quantum cryptography to the Y2K bug. Diversity focused tech nonprofits grapple with flagging support. Tim Starks of CyberScoop is back to discuss his investigation of a Russian hacking group targeting human rights groups. Smart phones get some street smarts.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
We welcome Tim Starks of CyberScoop back to discuss his story "Russian hacking campaign targets rights groups, media, former US ambassador."

Selected Reading
Vulnerabilities in Microsoft’s macOS apps could help hackers access microphones and cameras (The Record)
OpenAI Disrupts Iranian Misinformation Campaign (The New York Times)
100,000 Impacted by Jewish Home Lifecare Data Breach (SecurityWeek)
Chrome will redact credit cards, passwords when you share Android screen (Bleeping Computer)
Crypto firm says hacker locked all employees out of Google products for four days (The Record)
House lawmakers push Commerce Department to probe Chinese Wi-Fi router company (CyberScoop)
Moody's sounds alarm on quantum computing risk, as transition to PQC ‘will be long and costly’ (Industrial Cyber)
The movement to diversify Silicon Valley is crumbling amid attacks on DEI (Washington Post)
Google’s Stunning New Android AI Feature Instantly Locks Phone Thieves Out (Forbes)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 19 Aug 2024 20:10:00 -0000</pubDate>
      <itunes:title>Mic, camera, and more at risk.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2132</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Cisco Talos discovers vulnerabilities in Microsoft applications for macOS. OpenAI disrupts an Iranian influence campaign. Jewish Home Lifecare discloses a data breach affecting over 100,000. Google tests an auto-redaction feature in Chrome for Android. Unicoin informs the SEC that it was locked out of G-Suite for four days. House lawmakers raise concerns over China-made WiFi routers. Moody’s likens the switch to post-quantum cryptography to the Y2K bug. Diversity focused tech nonprofits grapple with flagging support. Tim Starks of CyberScoop is back to discuss his investigation of a Russian hacking group targeting human rights groups. Smart phones get some street smarts.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
We welcome Tim Starks of CyberScoop back to discuss his story "Russian hacking campaign targets rights groups, media, former US ambassador."

Selected Reading
Vulnerabilities in Microsoft’s macOS apps could help hackers access microphones and cameras (The Record)
OpenAI Disrupts Iranian Misinformation Campaign (The New York Times)
100,000 Impacted by Jewish Home Lifecare Data Breach (SecurityWeek)
Chrome will redact credit cards, passwords when you share Android screen (Bleeping Computer)
Crypto firm says hacker locked all employees out of Google products for four days (The Record)
House lawmakers push Commerce Department to probe Chinese Wi-Fi router company (CyberScoop)
Moody's sounds alarm on quantum computing risk, as transition to PQC ‘will be long and costly’ (Industrial Cyber)
The movement to diversify Silicon Valley is crumbling amid attacks on DEI (Washington Post)
Google’s Stunning New Android AI Feature Instantly Locks Phone Thieves Out (Forbes)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cisco Talos discovers vulnerabilities in Microsoft applications for macOS. OpenAI disrupts an Iranian influence campaign. Jewish Home Lifecare discloses a data breach affecting over 100,000. Google tests an auto-redaction feature in Chrome for Android. Unicoin informs the SEC that it was locked out of G-Suite for four days. House lawmakers raise concerns over China-made WiFi routers. Moody’s likens the switch to post-quantum cryptography to the Y2K bug. Diversity focused tech nonprofits grapple with flagging support. Tim Starks of CyberScoop is back to discuss his investigation of a Russian hacking group targeting human rights groups. Smart phones get some street smarts.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>We welcome <a href="https://www.linkedin.com/in/tstarks/">Tim Starks</a> of <a href="https://cyberscoop.com/">CyberScoop</a> back to discuss his story "<a href="https://cyberscoop.com/russian-hacking-campaign-targets-rights-groups-media-former-us-ambassador/">Russian hacking campaign targets rights groups, media, former US ambassador.</a>"</p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/microsoft-macos-apps-vulnerabilities-cisco">Vulnerabilities in Microsoft’s macOS apps could help hackers access microphones and cameras</a> (The Record)</p><p><a href="https://www.nytimes.com/2024/08/16/technology/openai-chatgpt-iran-misinformation.html">OpenAI Disrupts Iranian Misinformation Campaign</a> (The New York Times)</p><p><a href="https://www.securityweek.com/100000-impacted-by-jewish-home-lifecare-data-breach/">100,000 Impacted by Jewish Home Lifecare Data Breach</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/google/chrome-will-redact-credit-cards-passwords-when-you-share-android-screen/">Chrome will redact credit cards, passwords when you share Android screen</a> (Bleeping Computer)</p><p><a href="https://therecord.media/unicoin-cryptocurrency-company-hack-gsuite">Crypto firm says hacker locked all employees out of Google products for four days</a> (The Record)</p><p><a href="https://cyberscoop.com/commerce-department-investigation-chinese-wifi-router-company/">House lawmakers push Commerce Department to probe Chinese Wi-Fi router company</a> (CyberScoop)</p><p><a href="https://industrialcyber.co/reports/moodys-sounds-alarm-on-quantum-computing-risk-as-transition-to-pqc-will-be-long-and-costly/">Moody's sounds alarm on quantum computing risk, as transition to PQC ‘will be long and costly’</a> (Industrial Cyber)</p><p><a href="https://www.washingtonpost.com/technology/2024/08/19/silicon-valley-dei-backlash/">The movement to diversify Silicon Valley is crumbling amid attacks on DEI</a> (Washington Post)</p><p><a href="https://www.forbes.com/sites/daveywinder/2024/08/19/googles-stunning-new-android-ai-feature-instantly-locks-phone-thieves-out/">Google’s Stunning New Android AI Feature Instantly Locks Phone Thieves Out</a> (Forbes)</p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1460</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a8dd6750-b95e-11ee-8cf8-53d1a8a423e8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5877064939.mp3?updated=1724094834" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Robert Lee: Keeping the lights on. [ICS] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/29/notes</link>
      <description>Enjoy this special encore with CEO and co-founder of Dragos Robert Lee, as he talks about how he came to cybersecurity through industrial control systems. Growing up with parents in the Air Force, Robert's father tried to steer him away from military service. Still Rob chose to attend the Air Force Academy where he had greater exposure to computers through ICS. Robert finds his interest lies in things that impact the physical world around us. In his work, Dragos focuses on identifying what people are doing bad and helping people understand how to defend against that. Rob describes the possibility of making a jump to control system security from another area recommending you bring something to the table. Rob talks about the world he would like to leave to his son and his hopes for the future. We thank Rob for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 18 Aug 2024 07:00:00 -0000</pubDate>
      <itunes:title>Robert Lee: Keeping the lights on. [ICS] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>29</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this special encore with CEO and co-founder of Dragos Robert Lee, as he talks about how he came to cybersecurity through industrial control systems. Growing up with parents in the Air Force, Robert's father tried to steer him away from military service. Still Rob chose to attend the Air Force Academy where he had greater exposure to computers through ICS. Robert finds his interest lies in things that impact the physical world around us. In his work, Dragos focuses on identifying what people are doing bad and helping people understand how to defend against that. Rob describes the possibility of making a jump to control system security from another area recommending you bring something to the table. Rob talks about the world he would like to leave to his son and his hopes for the future. We thank Rob for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special encore with CEO and co-founder of Dragos Robert Lee, as he talks about how he came to cybersecurity through industrial control systems. Growing up with parents in the Air Force, Robert's father tried to steer him away from military service. Still Rob chose to attend the Air Force Academy where he had greater exposure to computers through ICS. Robert finds his interest lies in things that impact the physical world around us. In his work, Dragos focuses on identifying what people are doing bad and helping people understand how to defend against that. Rob describes the possibility of making a jump to control system security from another area recommending you bring something to the table. Rob talks about the world he would like to leave to his son and his hopes for the future. We thank Rob for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>454</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[958186f0-5c0b-11ef-a6f0-cb23f6c576cc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3462734095.mp3?updated=1723839330" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Essential tools with critical security challenges. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/342/notes</link>
      <description>Snir Ben Shimol from ZEST Security on their work, "How we hacked a cloud production environment by exploiting Terraform providers." In this blog, ZEST discusses the security risks associated with Terraform providers, particularly those from community sources. 
The research highlights the importance of carefully vetting providers, regular scanning, and following best practices like version pinning to mitigate potential vulnerabilities in cloud infrastructure management.
The research can be found here:
The hidden risks of Terraform providers

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Aug 2024 07:00:00 -0000</pubDate>
      <itunes:title>Essential tools with critical security challenges. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>339</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Snir Ben Shimol from ZEST Security on their work, "How we hacked a cloud production environment by exploiting Terraform providers." In this blog, ZEST discusses the security risks associated with Terraform providers, particularly those from community sources. 
The research highlights the importance of carefully vetting providers, regular scanning, and following best practices like version pinning to mitigate potential vulnerabilities in cloud infrastructure management.
The research can be found here:
The hidden risks of Terraform providers

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Snir Ben Shimol from ZEST Security on their work, "How we hacked a cloud production environment by exploiting Terraform providers." In this blog, ZEST discusses the security risks associated with Terraform providers, particularly those from community sources. </p><p>The research highlights the importance of carefully vetting providers, regular scanning, and following best practices like version pinning to mitigate potential vulnerabilities in cloud infrastructure management.</p><p>The research can be found here:</p><ul><li><a href="https://zestsecurity.io/the-hidden-risks-of-terraform-providers/">The hidden risks of Terraform providers</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1337</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e3da3384-5c00-11ef-8590-832483f60d40]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7362709051.mp3?updated=1723835426" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Demo-lition derby: iVerify and Google clash over pixel app pitfalls.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2131/notes</link>
      <description>Google and iVerify clash over the security implications of an Android app. CISA has issued a warning about a critical vulnerability in SolarWinds Web Help Desk. Ransomware attacks targeting industrial sectors surge. Microsoft is rolling out mandatory MFA for Azure. Banshee Stealer is a new macOS-targeted malware developed by Russian threat actors. A popular flight tracking website exposes users’ personal and professional information. San Francisco goes after websites generating deepfake nudes. Daniel Blackford, Director of Threat Research at Proofpoint, joins us to discuss emerging tactics used by threat actors and trends in e-crime tied to nation states.  Scammers Use Google to Scam Google.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Daniel Blackford, Director of Threat Research at Proofpoint, joined us while he was out at Black Hat to discuss emerging tactics used by threat actors and trends in e-crime tied to nation states. 

Selected Reading
Google to remove app from Pixel devices following claims that it made phones vulnerable (The Record)
Nearly All Google Pixel Phones Exposed by Unpatched Flaw in Hidden Android App (WIRED)
SolarWinds Web Help Desk Vulnerability Possibly Exploited as Zero-Day (SecurityWeek)
Microsoft Mandates MFA for All Azure Sign-Ins (Infosecurity Magazine)
New Banshee Stealer macOS Malware Priced at $3,000 Per Month (SecurityWeek)
Dragos reports resurgence of ransomware attacks on industrial sectors, raising likelihood of targeting OT networks (Industrial Cyber)
CISA Releases Eleven Industrial Control Systems Advisories (CISA)
FlightAware Exposed Pilots’ and Users’ Info (404 Media)
AI-powered ‘undressing’ websites are getting sued (The Verge)
Dozens of Google products targeted by scammers via malicious search ads (Malwarebytes) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 16 Aug 2024 20:10:00 -0000</pubDate>
      <itunes:title>Demo-lition derby: iVerify and Google clash over pixel app pitfalls.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2131</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Google and iVerify clash over the security implications of an Android app. CISA has issued a warning about a critical vulnerability in SolarWinds Web Help Desk. Ransomware attacks targeting industrial sectors surge. Microsoft is rolling out mandatory MFA for Azure. Banshee Stealer is a new macOS-targeted malware developed by Russian threat actors. A popular flight tracking website exposes users’ personal and professional information. San Francisco goes after websites generating deepfake nudes. Daniel Blackford, Director of Threat Research at Proofpoint, joins us to discuss emerging tactics used by threat actors and trends in e-crime tied to nation states.  Scammers Use Google to Scam Google.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Daniel Blackford, Director of Threat Research at Proofpoint, joined us while he was out at Black Hat to discuss emerging tactics used by threat actors and trends in e-crime tied to nation states. 

Selected Reading
Google to remove app from Pixel devices following claims that it made phones vulnerable (The Record)
Nearly All Google Pixel Phones Exposed by Unpatched Flaw in Hidden Android App (WIRED)
SolarWinds Web Help Desk Vulnerability Possibly Exploited as Zero-Day (SecurityWeek)
Microsoft Mandates MFA for All Azure Sign-Ins (Infosecurity Magazine)
New Banshee Stealer macOS Malware Priced at $3,000 Per Month (SecurityWeek)
Dragos reports resurgence of ransomware attacks on industrial sectors, raising likelihood of targeting OT networks (Industrial Cyber)
CISA Releases Eleven Industrial Control Systems Advisories (CISA)
FlightAware Exposed Pilots’ and Users’ Info (404 Media)
AI-powered ‘undressing’ websites are getting sued (The Verge)
Dozens of Google products targeted by scammers via malicious search ads (Malwarebytes) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Google and iVerify clash over the security implications of an Android app. CISA has issued a warning about a critical vulnerability in SolarWinds Web Help Desk. Ransomware attacks targeting industrial sectors surge. Microsoft is rolling out mandatory MFA for Azure. Banshee Stealer is a new macOS-targeted malware developed by Russian threat actors. A popular flight tracking website exposes users’ personal and professional information. San Francisco goes after websites generating deepfake nudes. Daniel Blackford, Director of Threat Research at Proofpoint, joins us to discuss emerging tactics used by threat actors and trends in e-crime tied to nation states.  Scammers Use Google to Scam Google.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/daniel-blackford-a84a722b/">Daniel Blackford</a>, Director of Threat Research at <a href="https://www.proofpoint.com/us">Proofpoint</a>, joined us while he was out at Black Hat to discuss emerging tactics used by threat actors and trends in e-crime tied to nation states. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/google-to-remove-app-pixel-vulnerable">Google to remove app from Pixel devices following claims that it made phones vulnerable</a> (The Record)</p><p><a href="https://www.wired.com/story/google-android-pixel-showcase-vulnerability/">Nearly All Google Pixel Phones Exposed by Unpatched Flaw in Hidden Android App</a> (WIRED)</p><p><a href="https://www.securityweek.com/solarwinds-web-help-desk-vulnerability-possibly-exploited-as-zero-day/">SolarWinds Web Help Desk Vulnerability Possibly Exploited as Zero-Day</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-mandates-mfa-azure/">Microsoft Mandates MFA for All Azure Sign-Ins</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/new-banshee-stealer-macos-malware-priced-at-3000-per-month/">New Banshee Stealer macOS Malware Priced at $3,000 Per Month</a> (SecurityWeek)</p><p><a href="https://industrialcyber.co/industrial-cyber-attacks/dragos-reports-resurgence-of-ransomware-attacks-on-industrial-sectors-raising-likelihood-of-targeting-ot-networks/">Dragos reports resurgence of ransomware attacks on industrial sectors, raising likelihood of targeting OT networks</a> (Industrial Cyber)</p><p><a href="https://www.cisa.gov/news-events/alerts/2024/08/15/cisa-releases-eleven-industrial-control-systems-advisories">CISA Releases Eleven Industrial Control Systems Advisories</a> (CISA)</p><p><a href="https://www.404media.co/flightaware-exposed-pilots-and-users-info-2/">FlightAware Exposed Pilots’ and Users’ Info</a> (404 Media)</p><p><a href="https://www.theverge.com/2024/8/16/24221651/ai-deepfake-nude-undressing-websites-lawsuit-sanfrancisco">AI-powered ‘undressing’ websites are getting sued</a> (The Verge)</p><p><a href="https://www.malwarebytes.com/blog/scams/2024/08/dozens-of-google-products-targeted-by-scammers-via-malicious-search-ads">Dozens of Google products targeted by scammers via malicious search ads</a> (Malwarebytes) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1571</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a89df570-b95e-11ee-8cf8-f7554ab2c40b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2940788130.mp3?updated=1723835397" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Weeding out 'worms' for Window's users. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2130/notes</link>
      <description>Microsoft urges users to patch a critical TCP/IP remote code execution vulnerability. Texas sues GM over the privacy of location and driving data. Google says Iran’s APT42 is responsible for recent phishing attacks targeting presidential campaigns. Doppelgänger struggles to sustain its operations. Sophos X-Ops examines the Mad Liberator extortion gang. Fortra researchers document a potential Blue Screen of Death vulnerability on Windows. China’s Green Cicada Network creates over 5,000 AI-controlled inauthentic X(Twitter) accounts. Kim Dotcom is being extradited to the United States. Our guest is Rui Ribeiro, CEO at JScrambler, to discuss how the extensive use of first and third-party JavaScript is a blessing and a curse. Wireless shifting can really grind your gears. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest Rui Ribeiro, JScrambler's CEO, joins us to discuss how the extensive use of first and third-party JavaScript is both a blessing and a curse.

Selected Reading
Zero-click Windows TCP/IP RCE impacts all systems with IPv6 enabled, patch now (Bleeping Computer)
Texas sues General Motors over car data tracking (POLITICO)
Google: Iranian Group APT42 Behind Trump, Biden Hack Attempts (Security Boulevard)
Doppelgänger operation rushes to secure itself amid ongoing detections, German agency says (The Record)
Palo Alto Networks Patches Unauthenticated Command Execution Flaw in Cortex XSOAR (SecurityWeek)
A new extortion crew, Mad Liberator, emerges on the scene (The Register)
Beware, Windows users. Newly-spotted CVE-2024-6768 vulnerability can cause blue screen (MSPoweruser)
CyberCX Unmasks China-linked AI Disinformation Capability on X (Cyber CX)
Kim Dotcom is being Megauploaded to the US for trial (The Verge)
Want to Win a Bike Race? Hack Your Rival’s Wireless Shifters (WIRED) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 15 Aug 2024 20:10:00 -0000</pubDate>
      <itunes:title>Weeding out 'worms' for Window's users. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2130</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Microsoft urges users to patch a critical TCP/IP remote code execution vulnerability. Texas sues GM over the privacy of location and driving data. Google says Iran’s APT42 is responsible for recent phishing attacks targeting presidential campaigns. Doppelgänger struggles to sustain its operations. Sophos X-Ops examines the Mad Liberator extortion gang. Fortra researchers document a potential Blue Screen of Death vulnerability on Windows. China’s Green Cicada Network creates over 5,000 AI-controlled inauthentic X(Twitter) accounts. Kim Dotcom is being extradited to the United States. Our guest is Rui Ribeiro, CEO at JScrambler, to discuss how the extensive use of first and third-party JavaScript is a blessing and a curse. Wireless shifting can really grind your gears. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest Rui Ribeiro, JScrambler's CEO, joins us to discuss how the extensive use of first and third-party JavaScript is both a blessing and a curse.

Selected Reading
Zero-click Windows TCP/IP RCE impacts all systems with IPv6 enabled, patch now (Bleeping Computer)
Texas sues General Motors over car data tracking (POLITICO)
Google: Iranian Group APT42 Behind Trump, Biden Hack Attempts (Security Boulevard)
Doppelgänger operation rushes to secure itself amid ongoing detections, German agency says (The Record)
Palo Alto Networks Patches Unauthenticated Command Execution Flaw in Cortex XSOAR (SecurityWeek)
A new extortion crew, Mad Liberator, emerges on the scene (The Register)
Beware, Windows users. Newly-spotted CVE-2024-6768 vulnerability can cause blue screen (MSPoweruser)
CyberCX Unmasks China-linked AI Disinformation Capability on X (Cyber CX)
Kim Dotcom is being Megauploaded to the US for trial (The Verge)
Want to Win a Bike Race? Hack Your Rival’s Wireless Shifters (WIRED) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft urges users to patch a critical TCP/IP remote code execution vulnerability. Texas sues GM over the privacy of location and driving data. Google says Iran’s APT42 is responsible for recent phishing attacks targeting presidential campaigns. Doppelgänger struggles to sustain its operations. Sophos X-Ops examines the Mad Liberator extortion gang. Fortra researchers document a potential Blue Screen of Death vulnerability on Windows. China’s Green Cicada Network creates over 5,000 AI-controlled inauthentic X(Twitter) accounts. Kim Dotcom is being extradited to the United States. Our guest is Rui Ribeiro, CEO at JScrambler, to discuss how the extensive use of first and third-party JavaScript is a blessing and a curse. Wireless shifting can really grind your gears. </p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today’s guest <a href="https://www.linkedin.com/in/rui-ribeiro-jscrambler/">Rui Ribeiro</a>, <a href="https://jscrambler.com/">JScrambler</a>'s CEO, joins us to discuss how the extensive use of first and third-party JavaScript is both a blessing and a curse.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/microsoft/zero-click-windows-tcp-ip-rce-impacts-all-systems-with-ipv6-enabled-patch-now/">Zero-click Windows TCP/IP RCE impacts all systems with IPv6 enabled, patch now</a> (Bleeping Computer)</p><p><a href="https://www.politico.com/news/2024/08/13/texas-general-motors-car-data-tracking-00173877">Texas sues General Motors over car data tracking</a> (POLITICO)</p><p><a href="https://securityboulevard.com/2024/08/google-iranian-group-apt42-behind-trump-biden-hack-attempts/">Google: Iranian Group APT42 Behind Trump, Biden Hack Attempts</a> (Security Boulevard)</p><p><a href="https://therecord.media/doppelganger-influence-operation-struggle-bavarian-baylfv-report">Doppelgänger operation rushes to secure itself amid ongoing detections, German agency says</a> (The Record)</p><p><a href="https://www.securityweek.com/palo-alto-networks-patches-unauthenticated-command-execution-flaw-in-cortex-xsoar/">Palo Alto Networks Patches Unauthenticated Command Execution Flaw in Cortex XSOAR</a> (SecurityWeek)</p><p><a href="https://www.theregister.com/2024/08/15/mad_liberator_extortion/">A new extortion crew, Mad Liberator, emerges on the scene</a> (The Register)</p><p><a href="https://mspoweruser.com/beware-windows-users-newly-spotted-cve-2024-6768-vulnerability-can-cause-blue-screen/">Beware, Windows users. Newly-spotted CVE-2024-6768 vulnerability can cause blue screen</a> (MSPoweruser)</p><p><a href="https://cybercx.com/blog/cybercx-unmasks-china-linked-ai-disinformation-capability/">CyberCX Unmasks China-linked AI Disinformation Capability on X</a> (Cyber CX)</p><p><a href="https://www.theverge.com/2024/8/15/24220920/kim-dotcom-megaupload-us-extradition-trial">Kim Dotcom is being Megauploaded to the US for trial</a> (The Verge)</p><p><a href="https://www.wired.com/story/shimano-wireless-bicycle-shifter-jamming-replay-attacks/">Want to Win a Bike Race? Hack Your Rival’s Wireless Shifters</a> (WIRED) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1628</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a85f264c-b95e-11ee-8cf8-5bff0a3633af]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1995177873.mp3?updated=1723749593" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A health bot’s security slip-up.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2129/notes</link>
      <description>Researchers at Tenable uncovered severe vulnerabilities in Microsoft’s Azure Health Bot Service. Scammers use deepfakes on Facebook and Instagram. Foreign influence operations target the Harris presidential campaign. An Idaho not-for-profit healthcare provider discloses a data breach. Research reveals a troubling trend of delayed and non-disclosure of ransomware attacks by organizations. Patch Tuesday roundup. Palo Alto Networks’ Unit 42 revealed a significant security risk in open-source GitHub projects. Enzo Biochem will pay $4.5 million to settle charges of inadequate security protocols. Our guest is Stephanie Schneider, Cyber Threat Intelligence Analyst at LastPass, joins us to discuss the ongoing Snowflake account attacks driven by exposed legitimate credentials.  Mining for profits on Airbnb. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Stephanie Schneider, Cyber Threat Intelligence Analyst at LastPass, joins us to discuss the ongoing Snowflake account attacks driven by exposed legitimate credentials and how enterprises can boost their defenses against these types of attacks.

Selected Reading
Critical Vulnerability Found in Microsoft’s AI Healthcare Chatbot (Infosecurity Magazine)
UK Prime Minister Keir Starmer and Prince William deepfaked in investment scam campaign (Bitdefender)
FBI told Harris campaign it was target of 'foreign actor influence operation,' official says (Reuters)
3AM ransomware stole data of 464,000 Kootenai Health patients (Bleeping Computer)
Report reveals lag in disclosure of ransomware attacks in 2023 (Security Brief)
Fortinet, Zoom Patch Multiple Vulnerabilities (SecurityWeek)
Chipmaker Patch Tuesday: Intel, AMD Address Over 110 Vulnerabilities 
Adobe Patches 72 Security Vulnerabilities Across Multiple Products (Cyber Security News)
Microsoft Fixes Nine Zero-Days on Patch Tuesday (Infosecurity Magazine)
ICS Patch Tuesday: Advisories Released by Siemens, Schneider, Rockwell, Aveva (SecurityWeek)
Are your GitHub Action artifacts leaking tokens? (SC Magazine)
Enzo Biochem to pay $4.5 mln over cyberattack, NY attorney general says (Reuters)
Airbnb host adds ‘no crypto mining’ rule after tenant installs 10 rigs (Protos) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 14 Aug 2024 20:10:00 -0000</pubDate>
      <itunes:title>A health bot’s security slip-up.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2132</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Researchers at Tenable uncovered severe vulnerabilities in Microsoft’s Azure Health Bot Service. Scammers use deepfakes on Facebook and Instagram. Foreign influence operations target the Harris presidential campaign. An Idaho not-for-profit healthcare provider discloses a data breach. Research reveals a troubling trend of delayed and non-disclosure of ransomware attacks by organizations. Patch Tuesday roundup. Palo Alto Networks’ Unit 42 revealed a significant security risk in open-source GitHub projects. Enzo Biochem will pay $4.5 million to settle charges of inadequate security protocols. Our guest is Stephanie Schneider, Cyber Threat Intelligence Analyst at LastPass, joins us to discuss the ongoing Snowflake account attacks driven by exposed legitimate credentials.  Mining for profits on Airbnb. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Stephanie Schneider, Cyber Threat Intelligence Analyst at LastPass, joins us to discuss the ongoing Snowflake account attacks driven by exposed legitimate credentials and how enterprises can boost their defenses against these types of attacks.

Selected Reading
Critical Vulnerability Found in Microsoft’s AI Healthcare Chatbot (Infosecurity Magazine)
UK Prime Minister Keir Starmer and Prince William deepfaked in investment scam campaign (Bitdefender)
FBI told Harris campaign it was target of 'foreign actor influence operation,' official says (Reuters)
3AM ransomware stole data of 464,000 Kootenai Health patients (Bleeping Computer)
Report reveals lag in disclosure of ransomware attacks in 2023 (Security Brief)
Fortinet, Zoom Patch Multiple Vulnerabilities (SecurityWeek)
Chipmaker Patch Tuesday: Intel, AMD Address Over 110 Vulnerabilities 
Adobe Patches 72 Security Vulnerabilities Across Multiple Products (Cyber Security News)
Microsoft Fixes Nine Zero-Days on Patch Tuesday (Infosecurity Magazine)
ICS Patch Tuesday: Advisories Released by Siemens, Schneider, Rockwell, Aveva (SecurityWeek)
Are your GitHub Action artifacts leaking tokens? (SC Magazine)
Enzo Biochem to pay $4.5 mln over cyberattack, NY attorney general says (Reuters)
Airbnb host adds ‘no crypto mining’ rule after tenant installs 10 rigs (Protos) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Tenable uncovered severe vulnerabilities in Microsoft’s Azure Health Bot Service. Scammers use deepfakes on Facebook and Instagram. Foreign influence operations target the Harris presidential campaign. An Idaho not-for-profit healthcare provider discloses a data breach. Research reveals a troubling trend of delayed and non-disclosure of ransomware attacks by organizations. Patch Tuesday roundup. Palo Alto Networks’ Unit 42 revealed a significant security risk in open-source GitHub projects. Enzo Biochem will pay $4.5 million to settle charges of inadequate security protocols. Our guest is Stephanie Schneider, Cyber Threat Intelligence Analyst at LastPass, joins us to discuss the ongoing Snowflake account attacks driven by exposed legitimate credentials.  Mining for profits on Airbnb. </p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/stephanie-keinz-schneider-764aa652/">Stephanie Schneider</a>, Cyber Threat Intelligence Analyst at <a href="https://www.lastpass.com/">LastPass</a>, joins us to discuss the ongoing Snowflake account attacks driven by exposed legitimate credentials and how enterprises can boost their defenses against these types of attacks.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.infosecurity-magazine.com/news/critical-vulnerability-microsoft/">Critical Vulnerability Found in Microsoft’s AI Healthcare Chatbot</a> (Infosecurity Magazine)</p><p><a href="https://www.bitdefender.com/blog/hotforsecurity/uk-prime-minister-keir-starmer-and-prince-william-deepfaked-in-investment-scam-campaign/">UK Prime Minister Keir Starmer and Prince William deepfaked in investment scam campaign</a> (Bitdefender)</p><p><a href="https://www.reuters.com/world/us/fbi-told-harris-campaign-it-was-target-foreign-actor-influence-operation-nbc-2024-08-13/?ref=metacurity.com">FBI told Harris campaign it was target of 'foreign actor influence operation,' official says</a> (Reuters)</p><p><a href="https://www.bleepingcomputer.com/news/security/3am-ransomware-stole-data-of-464-000-kootenai-health-patients/">3AM ransomware stole data of 464,000 Kootenai Health patients</a> (Bleeping Computer)</p><p><a href="https://securitybrief.com.au/story/report-reveals-lag-in-disclosure-of-ransomware-attacks-in-2023">Report reveals lag in disclosure of ransomware attacks in 2023</a> (Security Brief)</p><p><a href="https://www.securityweek.com/fortinet-zoom-patch-multiple-vulnerabilities/">Fortinet, Zoom Patch Multiple Vulnerabilities</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/chipmaker-patch-tuesday-intel-amd-address-over-110-vulnerabilities/">Chipmaker Patch Tuesday: Intel, AMD Address Over 110 Vulnerabilities</a> </p><p><a href="https://cybersecuritynews.com/adobe-patches-vulnerabilities/">Adobe Patches 72 Security Vulnerabilities Across Multiple Products</a> (Cyber Security News)</p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-fixes-nine-zerodays/">Microsoft Fixes Nine Zero-Days on Patch Tuesday </a>(Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/ics-patch-tuesday-advisories-released-by-siemens-schneider-rockwell-aveva/">ICS Patch Tuesday: Advisories Released by Siemens, Schneider, Rockwell, Aveva</a> (SecurityWeek)</p><p><a href="https://www.scmagazine.com/news/are-your-github-action-artifacts-leaking-tokens?ref=metacurity.com">Are your GitHub Action artifacts leaking tokens?</a> (SC Magazine)</p><p><a href="https://www.reuters.com/technology/cybersecurity/enzo-biochem-pay-45-mln-failing-safeguard-patient-data-2024-08-13/">Enzo Biochem to pay $4.5 mln over cyberattack, NY attorney general says</a> (Reuters)</p><p><a href="https://protos.com/airbnb-host-adds-no-crypto-mining-rule-after-tenant-installs-10-rigs/">Airbnb host adds ‘no crypto mining’ rule after tenant installs 10 rigs</a> (Protos) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show.</p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1524</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a81fb962-b95e-11ee-8cf8-c716198ffa1d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5215307327.mp3?updated=1723662660" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From dispossessor to disposed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2128/notes</link>
      <description>The FBI is the repossessor of Dispossessor. The NCA collars and extradites a notorious cybercriminal. A German company loses sixty million dollars to business email compromise. DeathGrip is a new Ransomware-as-a-Service (RaaS) platform. Russia blocks access to Signal. NIST publishes post-quantum cryptography standards. DARPA awards $14 million to teams competing in the AI Cyber Challenge. On our Solution Spotlight, N2K President Simone Petrella talks with Lee Parrish, CISO of Newell Brands, about his book "The Shortest Hour: An Applied Approach to Boardroom Governance of Cyber Security". AI generates impossible code - for knitters and crocheters.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight, N2K President Simone Petrella talks with Lee Parrish, CISO of Newell Brands, about his book "The Shortest Hour: An Applied Approach to Boardroom Governance of Cyber Security" and security relationship management. Coming tomorrow, stay tuned for a special edition with Simone and Lee’s full conversation. 

Selected Reading
FBI strikes down rumored LockBit reboot (CSO Online)
Suspected head of prolific cybercrime groups arrested and extradited (National Crime Agency)
Orion SA says scammers conned company out of $60 million (The Register)
DeathGrip Ransomware Expanding Services Using RaaS Service (GB Hackers)
Swiss manufacturer investigating ransomware attack that shut down IT network (The Record)
Russia Blocks Signal Messaging App as Authorities Tighten Control Over Information (SecurityWeek)
Post-Quantum Cryptography Standards Officially Announced by NIST – a History and Explanation (SecurityWeek)
Need to know: NIST finalizes post-quantum encryption standards essential for cybersecurity (N2K CyberWire)
NIST Releases First 3 Finalized Post-Quantum Encryption Standards (NIST)  
DARPA Awards $14m to Seven Teams in AI Cyber Challenge (Infosecurity Magazine)
The AI scams infiltrating the knitting and crochet world - and why it matters for everyone (ZDNET)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Aug 2024 20:10:00 -0000</pubDate>
      <itunes:title>From dispossessor to disposed.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2128</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The FBI is the repossessor of Dispossessor. The NCA collars and extradites a notorious cybercriminal. A German company loses sixty million dollars to business email compromise. DeathGrip is a new Ransomware-as-a-Service (RaaS) platform. Russia blocks access to Signal. NIST publishes post-quantum cryptography standards. DARPA awards $14 million to teams competing in the AI Cyber Challenge. On our Solution Spotlight, N2K President Simone Petrella talks with Lee Parrish, CISO of Newell Brands, about his book "The Shortest Hour: An Applied Approach to Boardroom Governance of Cyber Security". AI generates impossible code - for knitters and crocheters.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight, N2K President Simone Petrella talks with Lee Parrish, CISO of Newell Brands, about his book "The Shortest Hour: An Applied Approach to Boardroom Governance of Cyber Security" and security relationship management. Coming tomorrow, stay tuned for a special edition with Simone and Lee’s full conversation. 

Selected Reading
FBI strikes down rumored LockBit reboot (CSO Online)
Suspected head of prolific cybercrime groups arrested and extradited (National Crime Agency)
Orion SA says scammers conned company out of $60 million (The Register)
DeathGrip Ransomware Expanding Services Using RaaS Service (GB Hackers)
Swiss manufacturer investigating ransomware attack that shut down IT network (The Record)
Russia Blocks Signal Messaging App as Authorities Tighten Control Over Information (SecurityWeek)
Post-Quantum Cryptography Standards Officially Announced by NIST – a History and Explanation (SecurityWeek)
Need to know: NIST finalizes post-quantum encryption standards essential for cybersecurity (N2K CyberWire)
NIST Releases First 3 Finalized Post-Quantum Encryption Standards (NIST)  
DARPA Awards $14m to Seven Teams in AI Cyber Challenge (Infosecurity Magazine)
The AI scams infiltrating the knitting and crochet world - and why it matters for everyone (ZDNET)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FBI is the repossessor of Dispossessor. The NCA collars and extradites a notorious cybercriminal. A German company loses sixty million dollars to business email compromise. DeathGrip is a new Ransomware-as-a-Service (RaaS) platform. Russia blocks access to Signal. NIST publishes post-quantum cryptography standards. DARPA awards $14 million to teams competing in the AI Cyber Challenge. On our Solution Spotlight, N2K President Simone Petrella talks with Lee Parrish, CISO of Newell Brands, about his book "The Shortest Hour: An Applied Approach to Boardroom Governance of Cyber Security". AI generates impossible code - for knitters and crocheters.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Solution Spotlight, N2K President Simone Petrella talks with <a href="https://www.linkedin.com/in/lee-parrish/">Lee Parrish</a>, CISO of <a href="https://www.newellbrands.com/">Newell Brands</a>, about his book "<a href="https://www.google.com/books/edition/The_Shortest_Hour/6P0MEQAAQBAJ?hl=en&amp;gbpv=0">The Shortest Hour: An Applied Approach to Boardroom Governance of Cyber Security</a>" and security relationship management. Coming tomorrow, stay tuned for a special edition with Simone and Lee’s full conversation. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.csoonline.com/article/3486100/fbi-strikes-down-rumored-lockbit-reboot.html">FBI strikes down rumored LockBit reboot </a>(CSO Online)</p><p><a href="https://www.nationalcrimeagency.gov.uk/news/suspected-head-of-prolific-cybercrime-groups-arrested-and-extradited">Suspected head of prolific cybercrime groups arrested and extradited </a>(National Crime Agency)</p><p><a href="https://www.theregister.com/2024/08/13/orion_sa_says_scammers_conned/">Orion SA says scammers conned company out of $60 million</a> (The Register)</p><p><a href="https://gbhackers.com/deathgrip-ransomware-expanding-services-using-raas-service/">DeathGrip Ransomware Expanding Services Using RaaS Service</a> (GB Hackers)</p><p><a href="https://therecord.media/swiss-manufacturer-investigating-ransomware-incident">Swiss manufacturer investigating ransomware attack that shut down IT network</a> (The Record)</p><p><a href="https://www.securityweek.com/russia-blocks-signal-messaging-app-as-authorities-tighten-control-over-information/">Russia Blocks Signal Messaging App as Authorities Tighten Control Over Information</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/post-quantum-cryptography-standards-officially-announced-by-nist-a-history-and-explanation/">Post-Quantum Cryptography Standards Officially Announced by NIST – a History and Explanation</a> (SecurityWeek)</p><p><a href="https://thecyberwire.com/stories/4118c57e137a41709bd52c15aac15d3e/need-to-know-nist-finalizes-post-quantum-encryption-standards-essential-for-cybersecurity">Need to know: NIST finalizes post-quantum encryption standards essential for cybersecurity</a> (N2K CyberWire)</p><p><a href="https://www.nist.gov/news-events/news/2024/08/nist-releases-first-3-finalized-post-quantum-encryption-standards">NIST Releases First 3 Finalized Post-Quantum Encryption Standards</a> (NIST)  </p><p><a href="https://www.infosecurity-magazine.com/news/darpa-awards-14m-seven-teams-ai-1/">DARPA Awards $14m to Seven Teams in AI Cyber Challenge</a> (Infosecurity Magazine)</p><p><a href="https://www.zdnet.com/article/how-ai-scams-are-infiltrating-the-knitting-and-crochet-world/">The AI scams infiltrating the knitting and crochet world - and why it matters for everyone</a> (ZDNET)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1907</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[08451040-b95e-11ee-adc6-430aded5b1b5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6840177178.mp3?updated=1723578180" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Solution Spotlight: Simone Petrella talking with Lee Parrish, CISO of Newell Brands, about his book and security relationship management. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/69/notes</link>
      <description>On this Solution Spotlight, guest Lee Parrish, author and CISO at Newell Brands, joins N2K President Simone Petrella to discuss his book "The Shortest Hour: An Applied Approach to Boardroom Governance of Cyber Security" and security relationship management.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Aug 2024 06:00:00 -0000</pubDate>
      <itunes:title>Solution Spotlight: Simone Petrella talking with Lee Parrish, CISO of Newell Brands, about his book and security relationship management. [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>69</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this Solution Spotlight, guest Lee Parrish, author and CISO at Newell Brands, joins N2K President Simone Petrella to discuss his book "The Shortest Hour: An Applied Approach to Boardroom Governance of Cyber Security" and security relationship management.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this Solution Spotlight, guest <a href="https://www.linkedin.com/in/lee-parrish/">Lee Parrish</a>, author and CISO at <a href="https://www.newellbrands.com/">Newell Brands</a>, joins <a href="https://www.n2k.com/">N2K</a> President <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a> to discuss his book "<a href="https://www.google.com/books/edition/The_Shortest_Hour/6P0MEQAAQBAJ?hl=en&amp;gbpv=0">The Shortest Hour: An Applied Approach to Boardroom Governance of Cyber Security</a>" and security relationship management.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1807</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b0c10538-58d4-11ef-b100-dfa711896e28]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2881764920.mp3?updated=1725989662" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Confidential or compromised?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2127/notes</link>
      <description>The Trump campaign claims its email systems were breached by Iranian hackers. A Nashville man is arrested as part of an alleged North Korean IT worker hiring scam. At Defcon, researchers reveal significant vulnerabilities in Google’s Quick Share. Ransomware attacks hit an Australian gold mining company as well as multiple U.S. local governments. GPS spoofing is a matter of time. Cisco readies another round of layoffs. Nearly 2.7 billion records of personal information for people in the United States have been shared on a hacking forum. Our own Rick Howard speaks with Mark Ryland, Director of Amazon Security, about formal verification.  A hacker hacks the hackers.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On today’s guest slot, N2K’s CSO Rick Howard speaks with Mark Ryland, Director of Amazon Security at AWS, about formal verification, which is logical proofs about correctness of systems, at AWS re:Inforce. Rick and Mark caught up at AWS re:Inforce 2024. 

Selected Reading
Experts warn of election disruptions after Trump says campaign was hacked (Washington Post)
Nashville man arrested for running “laptop farm” to get jobs for North Koreans (Ars Technica)
Google Patches Critical Vulnerabilities in Quick Share After Researchers' Warning (Hackread)
Australian gold mining company Evolution Mining announces ransomware attack (The Record)
GPS spoofers 'hack time' on commercial airlines, researchers say (Reuters)
Exclusive: Cisco to lay off thousands more in second job cut this year (Reuters)
Hackers leak 2.7 billion data records with Social Security numbers (Bleeping Computer)
Local gov’ts in Texas, Florida hit with ransomware as cyber leaders question best path forward (The Record)
Simple Coding Errors Lead to Major Ransomware Takedown (Cybersecurity News)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 12 Aug 2024 20:30:00 -0000</pubDate>
      <itunes:title>Confidential or compromised?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2127</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The Trump campaign claims its email systems were breached by Iranian hackers. A Nashville man is arrested as part of an alleged North Korean IT worker hiring scam. At Defcon, researchers reveal significant vulnerabilities in Google’s Quick Share. Ransomware attacks hit an Australian gold mining company as well as multiple U.S. local governments. GPS spoofing is a matter of time. Cisco readies another round of layoffs. Nearly 2.7 billion records of personal information for people in the United States have been shared on a hacking forum. Our own Rick Howard speaks with Mark Ryland, Director of Amazon Security, about formal verification.  A hacker hacks the hackers.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On today’s guest slot, N2K’s CSO Rick Howard speaks with Mark Ryland, Director of Amazon Security at AWS, about formal verification, which is logical proofs about correctness of systems, at AWS re:Inforce. Rick and Mark caught up at AWS re:Inforce 2024. 

Selected Reading
Experts warn of election disruptions after Trump says campaign was hacked (Washington Post)
Nashville man arrested for running “laptop farm” to get jobs for North Koreans (Ars Technica)
Google Patches Critical Vulnerabilities in Quick Share After Researchers' Warning (Hackread)
Australian gold mining company Evolution Mining announces ransomware attack (The Record)
GPS spoofers 'hack time' on commercial airlines, researchers say (Reuters)
Exclusive: Cisco to lay off thousands more in second job cut this year (Reuters)
Hackers leak 2.7 billion data records with Social Security numbers (Bleeping Computer)
Local gov’ts in Texas, Florida hit with ransomware as cyber leaders question best path forward (The Record)
Simple Coding Errors Lead to Major Ransomware Takedown (Cybersecurity News)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Trump campaign claims its email systems were breached by Iranian hackers. A Nashville man is arrested as part of an alleged North Korean IT worker hiring scam. At Defcon, researchers reveal significant vulnerabilities in Google’s Quick Share. Ransomware attacks hit an Australian gold mining company as well as multiple U.S. local governments. GPS spoofing is a matter of time. Cisco readies another round of layoffs. Nearly 2.7 billion records of personal information for people in the United States have been shared on a hacking forum. Our own Rick Howard speaks with Mark Ryland, Director of Amazon Security, about formal verification.  A hacker hacks the hackers.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On today’s guest slot, <a href="https://www.n2k.com/">N2K</a>’s CSO <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> speaks with <a href="https://www.linkedin.com/in/markryland/">Mark Ryland</a>, Director of Amazon Security at <a href="https://aws.amazon.com/security/">AWS</a>, about formal verification, which is logical proofs about correctness of systems, at AWS re:Inforce. Rick and Mark caught up at <a href="https://reinforce.awsevents.com/">AWS re:Inforce 2024</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.washingtonpost.com/politics/2024/08/11/trump-hack-iran-elections/">Experts warn of election disruptions after Trump says campaign was hacked</a> (Washington Post)</p><p><a href="https://arstechnica.com/security/2024/08/nashville-man-arrested-for-running-laptop-farm-to-get-jobs-for-north-koreans/">Nashville man arrested for running “laptop farm” to get jobs for North Koreans</a> (Ars Technica)</p><p><a href="https://hackread.com/google-patches-quick-share-vulnerabilities-warning/">Google Patches Critical Vulnerabilities in Quick Share After Researchers' Warning</a> (Hackread)</p><p><a href="https://therecord.media/evolution-mining-gold-ransomware-incident">Australian gold mining company Evolution Mining announces ransomware attack</a> (The Record)</p><p><a href="https://www.reuters.com/technology/cybersecurity/gps-spoofers-hack-time-commercial-airlines-researchers-say-2024-08-10/">GPS spoofers 'hack time' on commercial airlines, researchers say</a> (Reuters)</p><p><a href="https://www.reuters.com/technology/cisco-lay-off-thousands-more-second-job-cut-this-year-sources-say-2024-08-09/">Exclusive: Cisco to lay off thousands more in second job cut this year</a> (Reuters)</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-leak-27-billion-data-records-with-social-security-numbers/">Hackers leak 2.7 billion data records with Social Security numbers</a> (Bleeping Computer)</p><p><a href="https://therecord.media/texas-florida-local-governments-ransomware-neuberger-nakasone-white-house">Local gov’ts in Texas, Florida hit with ransomware as cyber leaders question best path forward</a> (The Record)</p><p><a href="https://securityonline.info/simple-coding-errors-lead-to-major-ransomware-takedown/">Simple Coding Errors Lead to Major Ransomware Takedown</a> (Cybersecurity News)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1487</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[080c505c-b95e-11ee-adc6-9bae5cb733b2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5566299278.mp3?updated=1723492588" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What does materiality mean exactly?</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/96/notes</link>
      <description>Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses the meaning of cybersecurity materiality.

References:
Amy Howe, 2024. Supreme Court strikes down Chevron, curtailing power of federal agencies [Blog] 
Cydney Posner, 2023. SEC Adopts Final Rules on Cybersecurity Disclosure [Explainer]. The Harvard Law School Forum on Corporate Governance.
Cynthia Brumfield, 2022. 5 years after NotPetya: Lessons learned Analysis]. CSO Online.
Eleanor Dallaway, 2023. Closed for Business: The Organisations That Suffered Fatal Cyber Attacks that Shut Their Doors For Good [News]. Assured.
Gary Cohen, 2021. Throwback Attack: Chinese hackers steal plans for the F-35 fighter in a supply chain heist [Explainer]. Industrial Cybersecurity Pulse.
James Pearson, 2022. Russia downed satellite internet in Ukraine [News]. Reuters.
Katz, D., 2021. Corporate Governance Update: “Materiality” in America and Abroad [Essay]. The Harvard Law School Forum on Corporate Governance.
Kim Zetter, 2014. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon [Cybersecurity Canon Hall of Fame Book]. Goodreads.
Lizárraga, C.J., 2023. Improving the Quality of Cybersecurity Risk Management Disclosures [Essay]. U.S. Securities and Exchange Commission.
MATTHEW DALY, 2024. Supreme Court Chevron decision: What it means for federal regulations [WWW Document]. AP News.
Rick Howard. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon [Book Review]. Cybersecurity Canon Project.
Rick Howard, 2021. Using cyber sand tables to study the DNC hack of 2016. [Podcast]. The CyberWire. 
Rick Howard, 2022. Cyber sand table series: OPM. [Podcast and Essay]. The CyberWire.
Staff, 2020. Qasem Soleimani: US strike on Iran general was unlawful, UN expert says [Explainer]. BBC News.
Staff, 2023. Final Rule: Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure [Government Guidance]. U.S. Securities and Exchange Commission.
Staff, 2024. Number of Public Companies v. Private: U.S. [Website]. Advisorpedia.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 12 Aug 2024 06:00:00 -0000</pubDate>
      <itunes:title>What does materiality mean exactly?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>96</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses the meaning of cybersecurity materiality.

References:
Amy Howe, 2024. Supreme Court strikes down Chevron, curtailing power of federal agencies [Blog] 
Cydney Posner, 2023. SEC Adopts Final Rules on Cybersecurity Disclosure [Explainer]. The Harvard Law School Forum on Corporate Governance.
Cynthia Brumfield, 2022. 5 years after NotPetya: Lessons learned Analysis]. CSO Online.
Eleanor Dallaway, 2023. Closed for Business: The Organisations That Suffered Fatal Cyber Attacks that Shut Their Doors For Good [News]. Assured.
Gary Cohen, 2021. Throwback Attack: Chinese hackers steal plans for the F-35 fighter in a supply chain heist [Explainer]. Industrial Cybersecurity Pulse.
James Pearson, 2022. Russia downed satellite internet in Ukraine [News]. Reuters.
Katz, D., 2021. Corporate Governance Update: “Materiality” in America and Abroad [Essay]. The Harvard Law School Forum on Corporate Governance.
Kim Zetter, 2014. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon [Cybersecurity Canon Hall of Fame Book]. Goodreads.
Lizárraga, C.J., 2023. Improving the Quality of Cybersecurity Risk Management Disclosures [Essay]. U.S. Securities and Exchange Commission.
MATTHEW DALY, 2024. Supreme Court Chevron decision: What it means for federal regulations [WWW Document]. AP News.
Rick Howard. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon [Book Review]. Cybersecurity Canon Project.
Rick Howard, 2021. Using cyber sand tables to study the DNC hack of 2016. [Podcast]. The CyberWire. 
Rick Howard, 2022. Cyber sand table series: OPM. [Podcast and Essay]. The CyberWire.
Staff, 2020. Qasem Soleimani: US strike on Iran general was unlawful, UN expert says [Explainer]. BBC News.
Staff, 2023. Final Rule: Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure [Government Guidance]. U.S. Securities and Exchange Commission.
Staff, 2024. Number of Public Companies v. Private: U.S. [Website]. Advisorpedia.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses the meaning of cybersecurity materiality.</p><p><br></p><h2>References:</h2><p><a href="https://www.scotusblog.com/2024/06/supreme-court-strikes-down-chevron-curtailing-power-of-federal-agencies/">Amy Howe, 2024. Supreme Court strikes down Chevron, curtailing power of federal agencies [Blog] </a></p><p><a href="https://corpgov.law.harvard.edu/2023/08/09/sec-adopts-final-rules-on-cybersecurity-disclosure/">Cydney Posner, 2023. SEC Adopts Final Rules on Cybersecurity Disclosure [Explainer]. The Harvard Law School Forum on Corporate Governance.</a></p><p><a href="https://www.csoonline.com/article/573049/5-years-after-notpetya-lessons-learned.html">Cynthia Brumfield, 2022. 5 years after NotPetya: Lessons learned Analysis]. CSO Online.</a></p><p><a href="https://assured.co.uk/2023/closed-for-business-the-organisations-who-suffered-fatal-cyber-attacks-that-shut-their-doors-for-good/">Eleanor Dallaway, 2023. Closed for Business: The Organisations That Suffered Fatal Cyber Attacks that Shut Their Doors For Good [News]. Assured</a>.</p><p><a href="https://www.industrialcybersecuritypulse.com/networks/throwback-attack-chinese-hackers-steal-plans-for-the-f-35-fighter-in-a-supply-chain-heist/">Gary Cohen, 2021. Throwback Attack: Chinese hackers steal plans for the F-35 fighter in a supply chain heist [Explainer]. Industrial Cybersecurity Pulse.</a></p><p><a href="https://www.reuters.com/world/europe/russia-behind-cyberattack-against-satellite-internet-modems-ukraine-eu-2022-05-10/">James Pearson, 2022. Russia downed satellite internet in Ukraine [News]. Reuters.</a></p><p><a href="https://corpgov.law.harvard.edu/2021/05/01/corporate-governance-update-materiality-in-america-and-abroad/">Katz, D., 2021. Corporate Governance Update: “Materiality” in America and Abroad [Essay]. The Harvard Law School Forum on Corporate Governance.</a></p><p><a href="https://www.goodreads.com/book/show/18465875-countdown-to-zero-day">Kim Zetter, 2014. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon [Cybersecurity Canon Hall of Fame Book]. Goodreads.</a></p><p><a href="https://www.sec.gov/news/statement/lizarraga-statement-cybersecurity-072623">Lizárraga, C.J., 2023. Improving the Quality of Cybersecurity Risk Management Disclosures [Essay]. U.S. Securities and Exchange Commission.</a></p><p><a href="https://apnews.com/article/supreme-court-chevron-regulations-environment-4ae73d5a79cabadff4da8f7e16669929">MATTHEW DALY, 2024. Supreme Court Chevron decision: What it means for federal regulations [WWW Document]. AP News.</a></p><p><a href="https://icdt.osu.edu/countdown-zero-day-stuxnet-and-launch-worlds-first-digital-weapon">Rick Howard. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon [Book Review]. Cybersecurity Canon Project.</a></p><p><a href="https://thecyberwire.com/podcasts/cso-perspectives/61/notes">Rick Howard, 2021. Using cyber sand tables to study the DNC hack of 2016. [Podcast]. The CyberWire.</a> </p><p><a href="https://thecyberwire.com/stories/d0d8b9995bd84c389112385dd95ec4ee/cyber-sand-table-series-opm">Rick Howard, 2022. Cyber sand table series: OPM. [Podcast and Essay]. The CyberWire.</a></p><p><a href="https://www.bbc.com/news/world-middle-east-53345885">Staff, 2020. Qasem Soleimani: US strike on Iran general was unlawful, UN expert says [Explainer]. BBC News.</a></p><p><a href="https://www.sec.gov/rules/final/2023/33-11216.pdf">Staff, 2023. Final Rule: Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure [Government Guidance]. U.S. Securities and Exchange Commission.</a></p><p><a href="https://www.advisorpedia.com/chart-center/number-of-public-companies-v-private-us/">Staff, 2024. Number of Public Companies v. Private: U.S. [Website]. Advisorpedia.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>696</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[26cd0e1e-567a-11ef-9c3f-374d90d3abf0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3704573351.mp3?updated=1723227384" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Andrea Little Limbago: Look at the intersection of the of humans and technology. [Social Science]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/28/notes</link>
      <description>Enjoy this special encore episode:
Computational Social Scientist Andrea Little Limbago shares her journey as a social scientist in cybersecurity. Andrea laments that she wishes she'd known there is no straight line between what you think you want to do and then where you end up going. Beginning her career in international relations and courted by the Department of Defense's Joint Warfare Analysis Center while teaching at New York University, Andrea began her work in cybersecurity. Her team was one of the first to start thinking about the intersection of cybersecurity and geopolitics and quantitative modeling. Andrea reminds us there are many paths and skills needed in cybersecurity and hopes she's opened some doors for others. We thank Andrea for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 11 Aug 2024 07:00:00 -0000</pubDate>
      <itunes:title>Andrea Little Limbago: Look at the intersection of the of humans and technology. [Social Science]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>33</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this special encore episode:
Computational Social Scientist Andrea Little Limbago shares her journey as a social scientist in cybersecurity. Andrea laments that she wishes she'd known there is no straight line between what you think you want to do and then where you end up going. Beginning her career in international relations and courted by the Department of Defense's Joint Warfare Analysis Center while teaching at New York University, Andrea began her work in cybersecurity. Her team was one of the first to start thinking about the intersection of cybersecurity and geopolitics and quantitative modeling. Andrea reminds us there are many paths and skills needed in cybersecurity and hopes she's opened some doors for others. We thank Andrea for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this special encore episode:</p><p>Computational Social Scientist Andrea Little Limbago shares her journey as a social scientist in cybersecurity. Andrea laments that she wishes she'd known there is no straight line between what you think you want to do and then where you end up going. Beginning her career in international relations and courted by the Department of Defense's Joint Warfare Analysis Center while teaching at New York University, Andrea began her work in cybersecurity. Her team was one of the first to start thinking about the intersection of cybersecurity and geopolitics and quantitative modeling. Andrea reminds us there are many paths and skills needed in cybersecurity and hopes she's opened some doors for others. We thank Andrea for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>451</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7e4851e-5696-11ef-99ba-3bacbacf75dd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2129373389.mp3?updated=1723239381" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Prompts gone rogue. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/341/notes</link>
      <description>Shachar Menashe, Senior Director of Security Research at JFrog, is talking about "When Prompts Go Rogue: Analyzing a Prompt Injection Code Execution in Vanna.AI." A security vulnerability in the Vanna.AI tool, called CVE-2024-5565, allows hackers to exploit large language models (LLMs) by manipulating user input to execute malicious code, a method known as prompt injection. 
This poses a significant risk when LLMs are connected to critical functions, highlighting the need for stronger security measures.
The research can be found here:
When Prompts Go Rogue: Analyzing a Prompt Injection Code Execution in Vanna.AI

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Aug 2024 07:00:00 -0000</pubDate>
      <itunes:title>Prompts gone rogue. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>341</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Shachar Menashe, Senior Director of Security Research at JFrog, is talking about "When Prompts Go Rogue: Analyzing a Prompt Injection Code Execution in Vanna.AI." A security vulnerability in the Vanna.AI tool, called CVE-2024-5565, allows hackers to exploit large language models (LLMs) by manipulating user input to execute malicious code, a method known as prompt injection. 
This poses a significant risk when LLMs are connected to critical functions, highlighting the need for stronger security measures.
The research can be found here:
When Prompts Go Rogue: Analyzing a Prompt Injection Code Execution in Vanna.AI

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Shachar Menashe, Senior Director of Security Research at JFrog, is talking about "When Prompts Go Rogue: Analyzing a Prompt Injection Code Execution in Vanna.AI." A security vulnerability in the Vanna.AI tool, called CVE-2024-5565, allows hackers to exploit large language models (LLMs) by manipulating user input to execute malicious code, a method known as prompt injection. </p><p>This poses a significant risk when LLMs are connected to critical functions, highlighting the need for stronger security measures.</p><p>The research can be found here:</p><ul><li><a href="https://jfrog.com/blog/prompt-injection-attack-code-execution-in-vanna-ai-cve-2024-5565/">When Prompts Go Rogue: Analyzing a Prompt Injection Code Execution in Vanna.AI</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1424</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c4c2233a-5665-11ef-8d66-bf9763d81ed7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4845235375.mp3?updated=1723219148" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The 18-year stowaway.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2126/notes</link>
      <description>Deep firmware vulnerabilities affect chips from AMD. CISA warns of actively exploited Cisco devices. Solar inverters are found vulnerable to disruption. Iran steps up efforts to interfere with U.S. elections. The UN passes its first global cybercrime treaty. ADT confirms a data breach. A longstanding browser flaw is finally fixed. Crash reports help unlock the truth. Rob Boyce of Accenture shares his thoughts live from Las Vegas at the Black Hat conference. These scammers messed with the wrong guy. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
We are joined by podcast partner Rob Boyce of Accenture sharing his thoughts as our man on the street from the Black Hat USA 2024.

Selected Reading
‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections (WIRED)
Warnings Issued Over Cisco Device Hacking, Unpatched Vulnerabilities (SecurityWeek)
Series Of Solar Power System Vulnerabilities Impacts Millions Of Installations (Cyber Security News)
Microsoft: Iran makes late play to meddle in U.S. elections (CyberScoop)
UN cybercrime treaty passes in unanimous vote (The Record)
ADT confirms data breach after customer info leaked on hacking forum (Bleeping Computer)
It's 2024 and we're just getting round to stopping browsers insecurely accessing 0.0.0.0 (The Register)
Computer Crash Reports Are an Untapped Hacker Gold Mine (WIRED)
USPS Text Scammers Duped His Wife, So He Hacked Their Operation (WIRED)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 09 Aug 2024 20:10:00 -0000</pubDate>
      <itunes:title>The 18-year stowaway.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2126</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Deep firmware vulnerabilities affect chips from AMD. CISA warns of actively exploited Cisco devices. Solar inverters are found vulnerable to disruption. Iran steps up efforts to interfere with U.S. elections. The UN passes its first global cybercrime treaty. ADT confirms a data breach. A longstanding browser flaw is finally fixed. Crash reports help unlock the truth. Rob Boyce of Accenture shares his thoughts live from Las Vegas at the Black Hat conference. These scammers messed with the wrong guy. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
We are joined by podcast partner Rob Boyce of Accenture sharing his thoughts as our man on the street from the Black Hat USA 2024.

Selected Reading
‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections (WIRED)
Warnings Issued Over Cisco Device Hacking, Unpatched Vulnerabilities (SecurityWeek)
Series Of Solar Power System Vulnerabilities Impacts Millions Of Installations (Cyber Security News)
Microsoft: Iran makes late play to meddle in U.S. elections (CyberScoop)
UN cybercrime treaty passes in unanimous vote (The Record)
ADT confirms data breach after customer info leaked on hacking forum (Bleeping Computer)
It's 2024 and we're just getting round to stopping browsers insecurely accessing 0.0.0.0 (The Register)
Computer Crash Reports Are an Untapped Hacker Gold Mine (WIRED)
USPS Text Scammers Duped His Wife, So He Hacked Their Operation (WIRED)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Deep firmware vulnerabilities affect chips from AMD. CISA warns of actively exploited Cisco devices. Solar inverters are found vulnerable to disruption. Iran steps up efforts to interfere with U.S. elections. The UN passes its first global cybercrime treaty. ADT confirms a data breach. A longstanding browser flaw is finally fixed. Crash reports help unlock the truth. Rob Boyce of Accenture shares his thoughts live from Las Vegas at the Black Hat conference. These scammers messed with the wrong guy. </p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>We are joined by podcast partner <a href="https://www.linkedin.com/in/therobertjboyce/">Rob Boyce</a> of <a href="https://www.accenture.com/">Accenture</a> sharing his thoughts as our man on the street from the <a href="https://www.blackhat.com/us-24/">Black Hat USA 2024</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.wired.com/story/amd-chip-sinkclose-flaw/">‘Sinkclose’ Flaw in Hundreds of Millions of AMD Chips Allows Deep, Virtually Unfixable Infections</a> (WIRED)</p><p><a href="https://www.securityweek.com/warnings-issued-over-cisco-device-hacking-unpatched-vulnerabilities/">Warnings Issued Over Cisco Device Hacking, Unpatched Vulnerabilities</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/solar-power-system-vulnerabilities-impact/">Series Of Solar Power System Vulnerabilities Impacts Millions Of Installations</a> (Cyber Security News)</p><p><a href="https://cyberscoop.com/microsoft-iran-makes-late-play-to-meddle-in-u-s-elections/?ref=metacurity.com">Microsoft: Iran makes late play to meddle in U.S. elections</a> (CyberScoop)</p><p><a href="https://therecord.media/un-cybercrime-treaty-passes-unanimous?ref=metacurity.com">UN cybercrime treaty passes in unanimous vote</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/adt-confirms-data-breach-after-customer-info-leaked-on-hacking-forum/?ref=metacurity.com">ADT confirms data breach after customer info leaked on hacking forum</a> (Bleeping Computer)</p><p><a href="https://www.theregister.com/2024/08/09/0000_day_bug/">It's 2024 and we're just getting round to stopping browsers insecurely accessing 0.0.0.0</a> (The Register)</p><p><a href="https://www.wired.com/story/crash-reports-vulnerability-data/?ref=metacurity.com">Computer Crash Reports Are an Untapped Hacker Gold Mine</a> (WIRED)</p><p><a href="https://www.wired.com/story/usps-scam-text-smishing-triad/">USPS Text Scammers Duped His Wife, So He Hacked Their Operation</a> (WIRED)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1394</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[07d31daa-b95e-11ee-adc6-a7bd691dfa4a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6008306658.mp3?updated=1723229223" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybersecurity leaders gear up for the ultimate test.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2125/notes</link>
      <description>Black Hat kicks off with reassurances from global cyber allies. Researchers highlight vulnerabilities in car head units, AWS and 5G basebands. Alleged dark web forum leaders are charged in federal court. Tens of thousands of ICS devices are vulnerable to weak automation protocols. Kimsuky targets universities for espionage. Ransomware claims the life of a calf and its mother. A look at job risk in the face of AI. In our Threat Vector segment, host David Moulton speaks with Nir Zuk, Founder and CTO of Palo Alto Networks, about the future of cybersecurity. An alleged cybercrime rapper sees his Benjamins seized.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
In this Threat Vector segment, host David Moulton, Unit 42 Director of Thought Leadership, converses with Nir Zuk, Founder and CTO of Palo Alto Networks, about the future of cybersecurity. They discuss the pressing challenges organizations face today and the pivotal shift from traditional defense strategies to a mindset that assumes breaches. To listen to their full conversation, check out the episode here. You can catch new episodes of Threat Vector every Thursday on the N2K CyberWire network. 

Selected Reading
US elections have never been more secure, says CISA chief (The Register)
Black Hat USA 2024: vehicle head unit can spy on you, researchers reveal (Cybernews)
AWS Patches Vulnerabilities Potentially Allowing Account Takeovers (SecurityWeek)
Hackers could spy on cell phone users by abusing 5G baseband flaws, researchers say (TechCrunch)
Exclusive: Massive Criminal Online Platform Disrupted (Court Watch)
Web-Connected Industrial Control Systems Vulnerable to Attack (Security Boulevard)
North Korea Kimsuky Launch Phishing Attacks on Universities (Infosecurity Magazine)
Swiss cow and calf dead after ransomware attack on milking robot (Cybernews)
AI Will Displace American Workers—When, How, and To What Extent Is Less Certain (Lawfare)
Cybercrime Rapper Sues Bank over Fraud Investigation (Krebs on Security) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 08 Aug 2024 20:10:00 -0000</pubDate>
      <itunes:title>Cybersecurity leaders gear up for the ultimate test.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2129</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Black Hat kicks off with reassurances from global cyber allies. Researchers highlight vulnerabilities in car head units, AWS and 5G basebands. Alleged dark web forum leaders are charged in federal court. Tens of thousands of ICS devices are vulnerable to weak automation protocols. Kimsuky targets universities for espionage. Ransomware claims the life of a calf and its mother. A look at job risk in the face of AI. In our Threat Vector segment, host David Moulton speaks with Nir Zuk, Founder and CTO of Palo Alto Networks, about the future of cybersecurity. An alleged cybercrime rapper sees his Benjamins seized.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
In this Threat Vector segment, host David Moulton, Unit 42 Director of Thought Leadership, converses with Nir Zuk, Founder and CTO of Palo Alto Networks, about the future of cybersecurity. They discuss the pressing challenges organizations face today and the pivotal shift from traditional defense strategies to a mindset that assumes breaches. To listen to their full conversation, check out the episode here. You can catch new episodes of Threat Vector every Thursday on the N2K CyberWire network. 

Selected Reading
US elections have never been more secure, says CISA chief (The Register)
Black Hat USA 2024: vehicle head unit can spy on you, researchers reveal (Cybernews)
AWS Patches Vulnerabilities Potentially Allowing Account Takeovers (SecurityWeek)
Hackers could spy on cell phone users by abusing 5G baseband flaws, researchers say (TechCrunch)
Exclusive: Massive Criminal Online Platform Disrupted (Court Watch)
Web-Connected Industrial Control Systems Vulnerable to Attack (Security Boulevard)
North Korea Kimsuky Launch Phishing Attacks on Universities (Infosecurity Magazine)
Swiss cow and calf dead after ransomware attack on milking robot (Cybernews)
AI Will Displace American Workers—When, How, and To What Extent Is Less Certain (Lawfare)
Cybercrime Rapper Sues Bank over Fraud Investigation (Krebs on Security) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Black Hat kicks off with reassurances from global cyber allies. Researchers highlight vulnerabilities in car head units, AWS and 5G basebands. Alleged dark web forum leaders are charged in federal court. Tens of thousands of ICS devices are vulnerable to weak automation protocols. Kimsuky targets universities for espionage. Ransomware claims the life of a calf and its mother. A look at job risk in the face of AI. In our Threat Vector segment, host David Moulton speaks with Nir Zuk, Founder and CTO of Palo Alto Networks, about the future of cybersecurity. An alleged cybercrime rapper sees his Benjamins seized.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Threat Vector Segment</h2><p>In this <a href="https://thecyberwire.com/podcasts/threat-vector">Threat Vector</a> segment, host <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a>, Unit 42 Director of Thought Leadership, converses with <a href="https://www.linkedin.com/in/nir-z-680120233/">Nir Zuk</a>, Founder and CTO of <a href="https://www.paloaltonetworks.com/">Palo Alto Networks</a>, about the future of cybersecurity. They discuss the pressing challenges organizations face today and the pivotal shift from traditional defense strategies to a mindset that assumes breaches. To listen to their full conversation, check out the episode <a href="https://thecyberwire.com/podcasts/threat-vector/28/notes">here</a>. You can catch new episodes of Threat Vector every Thursday on the N2K CyberWire network. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.theregister.com/2024/08/08/election_tech_is_fine_says/">US elections have never been more secure, says CISA chief</a> (The Register)</p><p><a href="https://cybernews.com/security/android-head-units-drivers-data-safety/">Black Hat USA 2024: vehicle head unit can spy on you, researchers reveal</a> (Cybernews)</p><p><a href="https://www.securityweek.com/aws-patches-vulnerabilities-potentially-allowing-account-takeovers/">AWS Patches Vulnerabilities Potentially Allowing Account Takeovers</a> (SecurityWeek)</p><p><a href="https://techcrunch.com/2024/08/07/hackers-could-spy-on-cellphone-users-by-abusing-5g-baseband-flaws-researchers-say/">Hackers could spy on cell phone users by abusing 5G baseband flaws, researchers say</a> (TechCrunch)</p><p><a href="https://www.courtwatch.news/p/exclusive-massive-criminal-online">Exclusive: Massive Criminal Online Platform Disrupted</a> (Court Watch)</p><p><a href="https://securityboulevard.com/2024/08/web-connected-industrial-control-systems-vulnerable-to-attack/">Web-Connected Industrial Control Systems Vulnerable to Attack </a>(Security Boulevard)</p><p><a href="https://www.infosecurity-magazine.com/news/north-korea-kimsuky-phishing/">North Korea Kimsuky Launch Phishing Attacks on Universities</a> (Infosecurity Magazine)</p><p><a href="https://cybernews.com/security/swiss-cow-and-calf-dead-after-ransomware-attack/">Swiss cow and calf dead after ransomware attack on milking robot</a> (Cybernews)</p><p><a href="https://www.lawfaremedia.org/article/ai-will-displace-american-workers-when--how--and-to-what-extent-is-less-certain">AI Will Displace American Workers—When, How, and To What Extent Is Less Certain</a> (Lawfare)</p><p><a href="https://krebsonsecurity.com/2024/08/cybercrime-rapper-sues-bank-over-fraud-investigation/">Cybercrime Rapper Sues Bank over Fraud Investigation</a> (Krebs on Security) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1622</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0798eaea-b95e-11ee-adc6-3b6154dd082e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2715993615.mp3?updated=1723142193" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When updates attack.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2124/notes</link>
      <description>Crowdstrike releases a postmortem. LoanDepot puts a multimillion dollar price tag on their ransomware incident. RHADAMANTHYS info stealer targets Israelis. Zola ransomware is an advanced evolution of the Proton family. Firefox fixes several high-severity vulnerabilities. Researchers at Certitude uncover a vulnerability in Microsoft 365’s anti-phishing measures. Threat actors exploit legitimate anti-virus software for malicious purposes. Samsung’s new bug bounty program offers rewards up to a million dollars. Guest Adam Marré, CISO at Arctic Wolf, joining us to share his observations on the ground at Black Hat USA 2024. Ransomware gangs turn the screws and keep up with the times. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Adam Marré, CISO at Arctic Wolf, joining us to share his observations as our man on the street from Black Hat USA 2024.

Selected Reading
CrowdStrike Publishes Technical Root Cause Analysis of Faulty Falcon Update (Cyber Security News)
Ransomware Attack Cost LoanDepot $27 Million (SecurityWeek)
RHADAMANTHYS Stealer Weaponizing RAR Archive To Steal Login Credentials (Cyber Security News)
New Zola Ransomware Using Multiple Tools to Disable Windows Defender (GB Hackers)
Firefox Patches Multiple High Severity Vulnerabilities (Cyber Security News)
Exploring Anti-Phishing Measures in Microsoft 365 (Certitude Blog)
Hackers Hijack Anti-Virus Software Using SbaProxy Hacking Tool (Cyber Security News)
Samsung to pay $1,000,000 for RCEs on Galaxy’s secure vault (Bleeping Computer)
Turning the screws: The pressure tactics of ransomware gangs (Sophos News)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 07 Aug 2024 20:10:00 -0000</pubDate>
      <itunes:title>When updates attack.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2124</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Crowdstrike releases a postmortem. LoanDepot puts a multimillion dollar price tag on their ransomware incident. RHADAMANTHYS info stealer targets Israelis. Zola ransomware is an advanced evolution of the Proton family. Firefox fixes several high-severity vulnerabilities. Researchers at Certitude uncover a vulnerability in Microsoft 365’s anti-phishing measures. Threat actors exploit legitimate anti-virus software for malicious purposes. Samsung’s new bug bounty program offers rewards up to a million dollars. Guest Adam Marré, CISO at Arctic Wolf, joining us to share his observations on the ground at Black Hat USA 2024. Ransomware gangs turn the screws and keep up with the times. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Adam Marré, CISO at Arctic Wolf, joining us to share his observations as our man on the street from Black Hat USA 2024.

Selected Reading
CrowdStrike Publishes Technical Root Cause Analysis of Faulty Falcon Update (Cyber Security News)
Ransomware Attack Cost LoanDepot $27 Million (SecurityWeek)
RHADAMANTHYS Stealer Weaponizing RAR Archive To Steal Login Credentials (Cyber Security News)
New Zola Ransomware Using Multiple Tools to Disable Windows Defender (GB Hackers)
Firefox Patches Multiple High Severity Vulnerabilities (Cyber Security News)
Exploring Anti-Phishing Measures in Microsoft 365 (Certitude Blog)
Hackers Hijack Anti-Virus Software Using SbaProxy Hacking Tool (Cyber Security News)
Samsung to pay $1,000,000 for RCEs on Galaxy’s secure vault (Bleeping Computer)
Turning the screws: The pressure tactics of ransomware gangs (Sophos News)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Crowdstrike releases a postmortem. LoanDepot puts a multimillion dollar price tag on their ransomware incident. RHADAMANTHYS info stealer targets Israelis. Zola ransomware is an advanced evolution of the Proton family. Firefox fixes several high-severity vulnerabilities. Researchers at Certitude uncover a vulnerability in Microsoft 365’s anti-phishing measures. Threat actors exploit legitimate anti-virus software for malicious purposes. Samsung’s new bug bounty program offers rewards up to a million dollars. Guest Adam Marré, CISO at Arctic Wolf, joining us to share his observations on the ground at Black Hat USA 2024. Ransomware gangs turn the screws and keep up with the times. </p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/adam-marre/">Adam Marré</a>, CISO at <a href="https://arcticwolf.com/">Arctic Wolf</a>, joining us to share his observations as our man on the street from <a href="https://www.blackhat.com/us-24/">Black Hat USA 2024</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://cybersecuritynews.com/crowdstrike-root-cause-analysis/">CrowdStrike Publishes Technical Root Cause Analysis of Faulty Falcon Update</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/ransomware-attack-cost-loandepot-27-million/">Ransomware Attack Cost LoanDepot $27 Million</a> (SecurityWeek)</p><p><a href="https://cybersecuritynews.com/rhadamanthys-stealer-rar-credentials/">RHADAMANTHYS Stealer Weaponizing RAR Archive To Steal Login Credentials</a> (Cyber Security News)</p><p><a href="https://gbhackers.com/new-zola-ransomware-disable-windows-defender/">New Zola Ransomware Using Multiple Tools to Disable Windows Defender</a> (GB Hackers)</p><p><a href="https://cybersecuritynews.com/firefox-patches-vulnerabilities/">Firefox Patches Multiple High Severity Vulnerabilities</a> (Cyber Security News)</p><p><a href="https://certitude.consulting/blog/en/o365-anti-phishing-measures/">Exploring Anti-Phishing Measures in Microsoft 365</a> (Certitude Blog)</p><p><a href="https://cybersecuritynews.com/hackers-hijack-anti-virus-software-using-sbaproxy-hacking-tool/">Hackers Hijack Anti-Virus Software Using SbaProxy Hacking Tool</a> (Cyber Security News)</p><p><a href="https://www.bleepingcomputer.com/news/security/samsung-to-pay-1-000-000-for-rces-on-galaxys-secure-vault/">Samsung to pay $1,000,000 for RCEs on Galaxy’s secure vault</a> (Bleeping Computer)</p><p><a href="https://news.sophos.com/en-us/2024/08/06/turning-the-screws-the-pressure-tactics-of-ransomware-gangs/">Turning the screws: The pressure tactics of ransomware gangs</a> (Sophos News)</p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1520</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[076039f2-b95e-11ee-adc6-ef231c801733]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1917581434.mp3?updated=1723057632" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberattack calls for an early dismissal. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2123/notes</link>
      <description>Thousands of education sector devices have been maliciously wiped after an attack on a UK MDM firm. A perceived design flaw in Microsoft Authenticator leaves users locked out of accounts. SharpRino charges ahead to deploy ransomware. North Korea’s Stressed Pungsan provides initial access points for malware distribution. Magniber ransomware targets home users and SMBs. Google patches an Android zero-day. A new Senate bill aims to treat ransomware as terrorism. Microsoft ties security to employee compensation. Guest Kim Kischel, Director of Cybersecurity Product Marketing at Microsoft, discusses how AI is impacting the unified security operations center. A victim of business email compromise gets some good news. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Kim Kischel, Director of Cybersecurity Product Marketing at Microsoft, discusses how AI is impacting the unified security operations center and how it's changing the way defenders defend.

Selected Reading
Over 13,000 phones wiped clean as cyberattack cripples Mobile Guardian (CSO Online)
Design Flaw Has Microsoft Authenticator Overwriting MFA Accounts, Locking Users Out (Slashdot)
Network Admins Beware! SharpRhino Ransomware Attacking Mimic as Angry IP Scanner (Cyber Security News)
North Korean Hackers Attacking Windows Users With Weaponized npm Files (Cyber Security News)
Surge in Magniber ransomware attacks impact home users worldwide (Bleeping Computer)
Google Patches Android Zero-Day Exploited in Targeted Attacks (SecurityWeek)
Intelligence bill would elevate ransomware to a terrorist threat (CyberScoop)
Microsoft is binding employee bonuses and promotions to security performance (TechSpot)
Police Recover Over $40m Headed to BEC Scammers (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Aug 2024 20:10:00 -0000</pubDate>
      <itunes:title>Cyberattack calls for an early dismissal. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2123</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Thousands of education sector devices have been maliciously wiped after an attack on a UK MDM firm. A perceived design flaw in Microsoft Authenticator leaves users locked out of accounts. SharpRino charges ahead to deploy ransomware. North Korea’s Stressed Pungsan provides initial access points for malware distribution. Magniber ransomware targets home users and SMBs. Google patches an Android zero-day. A new Senate bill aims to treat ransomware as terrorism. Microsoft ties security to employee compensation. Guest Kim Kischel, Director of Cybersecurity Product Marketing at Microsoft, discusses how AI is impacting the unified security operations center. A victim of business email compromise gets some good news. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Kim Kischel, Director of Cybersecurity Product Marketing at Microsoft, discusses how AI is impacting the unified security operations center and how it's changing the way defenders defend.

Selected Reading
Over 13,000 phones wiped clean as cyberattack cripples Mobile Guardian (CSO Online)
Design Flaw Has Microsoft Authenticator Overwriting MFA Accounts, Locking Users Out (Slashdot)
Network Admins Beware! SharpRhino Ransomware Attacking Mimic as Angry IP Scanner (Cyber Security News)
North Korean Hackers Attacking Windows Users With Weaponized npm Files (Cyber Security News)
Surge in Magniber ransomware attacks impact home users worldwide (Bleeping Computer)
Google Patches Android Zero-Day Exploited in Targeted Attacks (SecurityWeek)
Intelligence bill would elevate ransomware to a terrorist threat (CyberScoop)
Microsoft is binding employee bonuses and promotions to security performance (TechSpot)
Police Recover Over $40m Headed to BEC Scammers (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thousands of education sector devices have been maliciously wiped after an attack on a UK MDM firm. A perceived design flaw in Microsoft Authenticator leaves users locked out of accounts. SharpRino charges ahead to deploy ransomware. North Korea’s Stressed Pungsan provides initial access points for malware distribution. Magniber ransomware targets home users and SMBs. Google patches an Android zero-day. A new Senate bill aims to treat ransomware as terrorism. Microsoft ties security to employee compensation. Guest Kim Kischel, Director of Cybersecurity Product Marketing at Microsoft, discusses how AI is impacting the unified security operations center. A victim of business email compromise gets some good news.<strong> </strong></p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/kimkischel/">Kim Kischel</a>, Director of Cybersecurity Product Marketing at <a href="https://www.microsoft.com/en-us">Microsoft</a>, discusses how AI is impacting the unified security operations center and how it's changing the way defenders defend.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.csoonline.com/article/3481871/over-13000-phones-wiped-clean-as-cyberattack-cripples-mobile-guardian.html">Over 13,000 phones wiped clean as cyberattack cripples Mobile Guardian</a> (CSO Online)</p><p><a href="https://it.slashdot.org/story/24/08/05/1849249/design-flaw-has-microsoft-authenticator-overwriting-mfa-accounts-locking-users-out">Design Flaw Has Microsoft Authenticator Overwriting MFA Accounts, Locking Users Out</a> (Slashdot)</p><p><a href="https://cybersecuritynews.com/sharprhino-ransomware-alert/">Network Admins Beware! SharpRhino Ransomware Attacking Mimic as Angry IP Scanner</a> (Cyber Security News)</p><p><a href="https://cybersecuritynews.com/north-korean-npm-attacks-windows/">North Korean Hackers Attacking Windows Users With Weaponized npm Files</a> (Cyber Security News)</p><p><a href="https://www.bleepingcomputer.com/news/security/surge-in-magniber-ransomware-attacks-impact-home-users-worldwide/">Surge in Magniber ransomware attacks impact home users worldwide</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/google-patches-android-zero-day-exploited-in-targeted-attacks/">Google Patches Android Zero-Day Exploited in Targeted Attacks</a> (SecurityWeek)</p><p><a href="https://cyberscoop.com/ransomware-terrorism-ndaa-2025/">Intelligence bill would elevate ransomware to a terrorist threat</a> (CyberScoop)</p><p><a href="https://www.techspot.com/news/104133-microsoft-binding-employee-bonuses-promotions-security-performance.html">Microsoft is binding employee bonuses and promotions to security performance </a>(TechSpot)</p><p><a href="https://www.infosecurity-magazine.com/news/police-recover-40m-bec-scammers/">Police Recover Over $40m Headed to BEC Scammers</a> (Infosecurity Magazine)</p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1565</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[07271852-b95e-11ee-adc6-d777525b8180]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3578983693.mp3?updated=1722973525" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>TikTok in the hot seat...again.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2122/notes</link>
      <description>The justice department sues TikTok over alleged violations of children’s online privacy laws. Bad blood between Crowdstrike and Delta Airlines. The UK once again delays upgrades to their cybercrime reporting center. Apache OFBiz users are urged to patch a critical vulnerability. SLUBStick is a newly discovered Linux Kernel attack. CISA releases a handy guide to help software suppliers manage security risk. StormBamboo poisons DNS queries to deliver targeted malware. The White House looks to help close the cybersecurity skills gap with $15 million in scholarships. Our guest US Congressional candidate from Oklahoma, Madison Horn, speaking with my Caveat co host Ben Yelin about national security and cyberwarfare. Chewing on rumors of Olympic sabotage. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
US Congressional candidate from Oklahoma, Madison Horn, speaks with Caveat co host Ben Yelin about national security and cyberwarfare. You can hear the full interview on our latest episode of Caveat here.

CSO Perspectives
This week on N2K Pro’s CSO Perspectives podcast, host and N2K CSO Rick Howard focuses on “Cybersecurity is radically asymmetrically distributed.” Rick and Dave do a preview. You can find the full episode here if you are an N2K Pro subscriber, otherwise check out an extended sample here. 
 
Selected Reading
Justice Department Sues TikTok, Accusing the Company of Illegally Collecting Children's Data (SecurityWeek)
CrowdStrike says it’s not to blame for Delta’s days-long outage (The Verge)
Replacement for Action Fraud, UK’s cybercrime reporting service, delayed again until 2025 (The Record)
Apache OFBiz Users Warned of New and Exploited Vulnerabilities (SecurityWeek)
Linux kernel impacted by new SLUBStick cross-cache attack (Bleeping Computer)
CISA says suppliers bear responsibility for insecure software in Fed procurement guide (The Stack)
Chinese hackers compromised an ISP to deliver malicious software updates (Help Net Security)
White House and EC-Council Launch $15m Cybersecurity Scholarship Program (Infosecurity Magazine)
2024 Paris Olympics: a snoop was at the origin of suspicions of sabotage in the fan zone of the Chateau de Vincennes (FranceInfo)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 05 Aug 2024 20:10:00 -0000</pubDate>
      <itunes:title>TikTok in the hot seat...again.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2122</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The justice department sues TikTok over alleged violations of children’s online privacy laws. Bad blood between Crowdstrike and Delta Airlines. The UK once again delays upgrades to their cybercrime reporting center. Apache OFBiz users are urged to patch a critical vulnerability. SLUBStick is a newly discovered Linux Kernel attack. CISA releases a handy guide to help software suppliers manage security risk. StormBamboo poisons DNS queries to deliver targeted malware. The White House looks to help close the cybersecurity skills gap with $15 million in scholarships. Our guest US Congressional candidate from Oklahoma, Madison Horn, speaking with my Caveat co host Ben Yelin about national security and cyberwarfare. Chewing on rumors of Olympic sabotage. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
US Congressional candidate from Oklahoma, Madison Horn, speaks with Caveat co host Ben Yelin about national security and cyberwarfare. You can hear the full interview on our latest episode of Caveat here.

CSO Perspectives
This week on N2K Pro’s CSO Perspectives podcast, host and N2K CSO Rick Howard focuses on “Cybersecurity is radically asymmetrically distributed.” Rick and Dave do a preview. You can find the full episode here if you are an N2K Pro subscriber, otherwise check out an extended sample here. 
 
Selected Reading
Justice Department Sues TikTok, Accusing the Company of Illegally Collecting Children's Data (SecurityWeek)
CrowdStrike says it’s not to blame for Delta’s days-long outage (The Verge)
Replacement for Action Fraud, UK’s cybercrime reporting service, delayed again until 2025 (The Record)
Apache OFBiz Users Warned of New and Exploited Vulnerabilities (SecurityWeek)
Linux kernel impacted by new SLUBStick cross-cache attack (Bleeping Computer)
CISA says suppliers bear responsibility for insecure software in Fed procurement guide (The Stack)
Chinese hackers compromised an ISP to deliver malicious software updates (Help Net Security)
White House and EC-Council Launch $15m Cybersecurity Scholarship Program (Infosecurity Magazine)
2024 Paris Olympics: a snoop was at the origin of suspicions of sabotage in the fan zone of the Chateau de Vincennes (FranceInfo)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The justice department sues TikTok over alleged violations of children’s online privacy laws. Bad blood between Crowdstrike and Delta Airlines. The UK once again delays upgrades to their cybercrime reporting center. Apache OFBiz users are urged to patch a critical vulnerability. SLUBStick is a newly discovered Linux Kernel attack. CISA releases a handy guide to help software suppliers manage security risk. StormBamboo poisons DNS queries to deliver targeted malware. The White House looks to help close the cybersecurity skills gap with $15 million in scholarships. Our guest US Congressional candidate from Oklahoma, Madison Horn, speaking with my Caveat co host Ben Yelin about national security and cyberwarfare. Chewing on rumors of Olympic sabotage. </p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>US Congressional candidate from Oklahoma, <a href="https://www.linkedin.com/in/madisonshorn/">Madison Horn</a>, speaks with <a href="https://thecyberwire.com/podcasts/caveat">Caveat</a> co host <a href="https://www.linkedin.com/in/benjamin-yelin-5b14114b/">Ben Yelin</a> about national security and cyberwarfare. You can hear the full interview on our latest episode of Caveat <a href="https://thecyberwire.com/podcasts/caveat/227/notes">here</a>.</p><p><br></p><h2>CSO Perspectives</h2><p>This week on N2K Pro’s <a href="https://thecyberwire.com/podcasts/cso-perspectives">CSO Perspectives podcast</a>, host and <a href="https://www.n2k.com/">N2K</a> CSO <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> focuses on “Cybersecurity is radically asymmetrically distributed.” Rick and Dave do a preview. You can find the full episode <a href="https://thecyberwire.com/podcasts/cso-perspectives/117/notes">here</a> if you are an N2K Pro subscriber, otherwise check out an extended sample <a href="https://thecyberwire.com/podcasts/cso-perspectives-public/95/notes">here</a>. </p><p> </p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/justice-department-sues-tiktok-accusing-the-company-of-illegally-collecting-childrens-data/">Justice Department Sues TikTok, Accusing the Company of Illegally Collecting Children's Data</a> (SecurityWeek)</p><p><a href="https://www.theverge.com/2024/8/5/24213521/crowdstrike-refutes-blame-delta-outage-litigation">CrowdStrike says it’s not to blame for Delta’s days-long outage</a> (The Verge)</p><p><a href="https://therecord.media/uk-action-fraud-replacement-delayed-2025">Replacement for Action Fraud, UK’s cybercrime reporting service, delayed again until 2025</a> (The Record)</p><p><a href="https://www.securityweek.com/apache-ofbiz-users-warned-of-new-and-exploited-vulnerabilities/">Apache OFBiz Users Warned of New and Exploited Vulnerabilities</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/linux-kernel-impacted-by-new-slubstick-cross-cache-attack/">Linux kernel impacted by new SLUBStick cross-cache attack</a> (Bleeping Computer)</p><p><a href="https://www.thestack.technology/cisa-says-suppliers-bear-responsibility-for-insecure-software-in-fed-procurement-guide/">CISA says suppliers bear responsibility for insecure software in Fed procurement guide</a> (The Stack)</p><p><a href="https://www.helpnetsecurity.com/2024/08/05/compromised-isp-dns-malware/">Chinese hackers compromised an ISP to deliver malicious software updates</a> (Help Net Security)</p><p><a href="https://www.infosecurity-magazine.com/news/white-house-ec-council-cyber/">White House and EC-Council Launch $15m Cybersecurity Scholarship Program</a> (Infosecurity Magazine)</p><p><a href="https://www.francetvinfo.fr/les-jeux-olympiques/paris-2024/paris-2024-une-fouine-etait-a-l-origine-des-soupcons-de-sabotages-dans-la-fan-zone-du-chateau-de-vincennes_6706254.htm">2024 Paris Olympics: a snoop was at the origin of suspicions of sabotage in the fan zone of the Chateau de Vincennes</a> (FranceInfo)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2025</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[06ee31d6-b95e-11ee-adc6-1bbdf4076dde]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5389627385.mp3?updated=1722886723" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybersecurity is radically asymmetrically distributed.</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/95/notes</link>
      <description>Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses the idea that Cybersecurity is radically asymmetrically distributed. It means that cybersecurity risk is not the same for all verticals and knowing that may impact the first principle strategies you choose to protect your enterprise.

For a complete reading list and even more information, check out Rick’s more detailed essay on the topic.

References:
André Munro, 2024. Liberal democracy [Explainer]. Encyclopedia Britannica.
David Weedmark, 2017. Why do some states require emissions testing? [Explainer]. Autoblog.
Kara Rogers, 2020. What Is a Superspreader Event? [Explainer]. Encyclopedia Britannica.
Lara Salahi, 2021. 1 Year Later: The ‘Superspreader’ Conference That Sparked Boston’s COVID Outbreak [News]. NBC10 Boston. 
Malcolm Gladwell, 2002. The Tipping Point: How Little Things Can Make a Big Difference [Book]. Goodreads.
Malcolm Gladwell, 2005. Blink: The Power of Thinking Without Thinking [Book]. Goodreads.
Malcolm Gladwell, 2008. Outliers: The Story of Success [Book]. Goodreads. 
Malcolm Gladwell, 2019. Talking to Strangers: What We Should Know About the People We Don’t Know [Book]. Goodreads.
Malcolm Gladwell, 2021. The Bomber Mafia: A Dream, a Temptation, and the Longest Night of the Second World War [Book]. Goodreads. 
Malcom Gladwell, 2024. Medal of Honor: Stories of Courage [Podcast]. Pushkin Industries.
Malcolm Gladwell. Revisionist History [Podcast]. Pushkin Industries.
Michael Lewis, 2003. Moneyball: The Art of Winning an Unfair Game [Book]. Goodreads.
Michael Lewis. Against the Rules [Podcast]. Pushkin Industries. 
Nassim Nicholas Taleb, 2007. The Black Swan: The Impact of the Highly Improbable [Book]. Goodreads.
Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads. 
Rick Howard, 2023. Cybersecurity First Principles Book Appendix  [Diagram]. N2K CyberWire.
Rick Howard, 2023. Cybersecurity moneyball: First principles applied to the workforce gap. [Podcast]. The CyberWire.
Rick Howard, Simone Petrella , 2024. The Moneyball Approach to Buying Down Risk, Not Superstars [Presentation]. RSA 2024 Conference.
Robert Soucy, 2024. Fascism [Explainer]. Encyclopedia Britannica. 
Staff, 2022. Information Risk Insights Study: A Clearer Vision for Assessing the Risk of Cyber Incidents [Report]. Cyentia Institute.
Staff. Congressional Medal of Honor Recipients [Website]. Congressional Medal of Honor Society.
Staff. North American Industry Classification System (NAICS)  [Website]. U.S. Census Bureau.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 05 Aug 2024 06:00:00 -0000</pubDate>
      <itunes:title>Cybersecurity is radically asymmetrically distributed.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>95</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses the idea that Cybersecurity is radically asymmetrically distributed. It means that cybersecurity risk is not the same for all verticals and knowing that may impact the first principle strategies you choose to protect your enterprise.

For a complete reading list and even more information, check out Rick’s more detailed essay on the topic.

References:
André Munro, 2024. Liberal democracy [Explainer]. Encyclopedia Britannica.
David Weedmark, 2017. Why do some states require emissions testing? [Explainer]. Autoblog.
Kara Rogers, 2020. What Is a Superspreader Event? [Explainer]. Encyclopedia Britannica.
Lara Salahi, 2021. 1 Year Later: The ‘Superspreader’ Conference That Sparked Boston’s COVID Outbreak [News]. NBC10 Boston. 
Malcolm Gladwell, 2002. The Tipping Point: How Little Things Can Make a Big Difference [Book]. Goodreads.
Malcolm Gladwell, 2005. Blink: The Power of Thinking Without Thinking [Book]. Goodreads.
Malcolm Gladwell, 2008. Outliers: The Story of Success [Book]. Goodreads. 
Malcolm Gladwell, 2019. Talking to Strangers: What We Should Know About the People We Don’t Know [Book]. Goodreads.
Malcolm Gladwell, 2021. The Bomber Mafia: A Dream, a Temptation, and the Longest Night of the Second World War [Book]. Goodreads. 
Malcom Gladwell, 2024. Medal of Honor: Stories of Courage [Podcast]. Pushkin Industries.
Malcolm Gladwell. Revisionist History [Podcast]. Pushkin Industries.
Michael Lewis, 2003. Moneyball: The Art of Winning an Unfair Game [Book]. Goodreads.
Michael Lewis. Against the Rules [Podcast]. Pushkin Industries. 
Nassim Nicholas Taleb, 2007. The Black Swan: The Impact of the Highly Improbable [Book]. Goodreads.
Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads. 
Rick Howard, 2023. Cybersecurity First Principles Book Appendix  [Diagram]. N2K CyberWire.
Rick Howard, 2023. Cybersecurity moneyball: First principles applied to the workforce gap. [Podcast]. The CyberWire.
Rick Howard, Simone Petrella , 2024. The Moneyball Approach to Buying Down Risk, Not Superstars [Presentation]. RSA 2024 Conference.
Robert Soucy, 2024. Fascism [Explainer]. Encyclopedia Britannica. 
Staff, 2022. Information Risk Insights Study: A Clearer Vision for Assessing the Risk of Cyber Incidents [Report]. Cyentia Institute.
Staff. Congressional Medal of Honor Recipients [Website]. Congressional Medal of Honor Society.
Staff. North American Industry Classification System (NAICS)  [Website]. U.S. Census Bureau.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses the idea that Cybersecurity is radically asymmetrically distributed. It means that cybersecurity risk is not the same for all verticals and knowing that may impact the first principle strategies you choose to protect your enterprise.</p><p><br></p><p><strong><em>For a complete reading list and even more information, check out Rick’s more detailed </em></strong><a href="https://thecyberwire.com/stories/8f4d0385d9ae4c5782fe2b19a846c1f1/cybersecurity-is-radically-asymmetrically-distributed"><strong><em>essay</em></strong></a><strong><em> on the topic.</em></strong></p><p><br></p><h2>References:</h2><p><a href="https://www.britannica.com/topic/liberal-democracy">André Munro, 2024. Liberal democracy [Explainer]. Encyclopedia Britannica.</a></p><p><a href="https://www.autoblog.com/2017/01/25/why-do-some-states-require-emissions-testing/">David Weedmark, 2017. Why do some states require emissions testing? [Explainer]. Autoblog.</a></p><p><a href="https://www.britannica.com/story/what-is-a-superspreader-event">Kara Rogers, 2020. What Is a Superspreader Event? [Explainer]. Encyclopedia Britannica.</a></p><p><a href="https://www.nbcboston.com/news/coronavirus/1-year-later-the-superspreader-conference-that-sparked-bostons-coronavirus-outbreak/2314011/">Lara Salahi, 2021. 1 Year Later: The ‘Superspreader’ Conference That Sparked Boston’s COVID Outbreak [News]. NBC10 Boston.</a> </p><p><a href="https://www.goodreads.com/book/show/2612.The_Tipping_Point">Malcolm Gladwell, 2002. The Tipping Point: How Little Things Can Make a Big Difference [Book]. Goodreads.</a></p><p><a href="https://www.goodreads.com/book/show/40102.Blink">Malcolm Gladwell, 2005. Blink: The Power of Thinking Without Thinking [Book]. Goodreads.</a></p><p><a href="https://www.goodreads.com/book/show/3228917-outliers">Malcolm Gladwell, 2008. Outliers: The Story of Success [Book]. Goodreads.</a> </p><p><a href="https://www.goodreads.com/book/show/43848929-talking-to-strangers">Malcolm Gladwell, 2019. Talking to Strangers: What We Should Know About the People We Don’t Know [Book]. Goodreads.</a></p><p><a href="https://www.goodreads.com/book/show/57007687-the-bomber-mafia">Malcolm Gladwell, 2021. The Bomber Mafia: A Dream, a Temptation, and the Longest Night of the Second World War [Book]. Goodreads.</a> </p><p><a href="https://www.pushkin.fm/podcasts/medal-of-honor-stories-of-courage">Malcom Gladwell, 2024. Medal of Honor: Stories of Courage [Podcast]. Pushkin Industries.</a></p><p><a href="https://www.pushkin.fm/podcasts/revisionist-history">Malcolm Gladwell. Revisionist History [Podcast]. Pushkin Industries.</a></p><p><a href="https://www.goodreads.com/book/show/1301.Moneyball">Michael Lewis, 2003. Moneyball: The Art of Winning an Unfair Game [Book]. Goodreads.</a></p><p><a href="https://www.pushkin.fm/podcasts/against-the-rules">Michael Lewis. Against the Rules [Podcast]. Pushkin Industries.</a> </p><p><a href="https://www.goodreads.com/book/show/242472.The_Black_Swan">Nassim Nicholas Taleb, 2007. The Black Swan: The Impact of the Highly Improbable [Book]. Goodreads.</a></p><p><a href="https://www.goodreads.com/book/show/75671183-cybersecurity-first-principles">Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads.</a> </p><p><a href="https://www.n2k.com/cybersecurityfirstprinciplesbook">Rick Howard, 2023. Cybersecurity First Principles Book Appendix  [Diagram]. N2K CyberWire.</a></p><p><a href="https://thecyberwire.com/stories/16028e80f4704e7dabc339a979a75a03/cybersecurity-moneyball-first-principles-applied-to-the-workforce-gap">Rick Howard, 2023. Cybersecurity moneyball: First principles applied to the workforce gap. [Podcast]. The CyberWire.</a></p><p><a href="https://www.youtube.com/watch?v=4_IANv33DpI">Rick Howard, Simone Petrella , 2024. The Moneyball Approach to Buying Down Risk, Not Superstars [Presentation]. RSA 2024 Conference</a>.</p><p><a href="https://www.britannica.com/topic/fascism">Robert Soucy, 2024. Fascism [Explainer]. Encyclopedia Britannica</a>. </p><p><a href="https://www.cyentia.com/iris-2022/">Staff, 2022. Information Risk Insights Study: A Clearer Vision for Assessing the Risk of Cyber Incidents [Report]. Cyentia Institute.</a></p><p><a href="https://www.cmohs.org/recipients/overview">Staff. Congressional Medal of Honor Recipients [Website]. Congressional Medal of Honor Society.</a></p><p><a href="https://www.census.gov/naics/">Staff. North American Industry Classification System (NAICS)  [Website]. U.S. Census Bureau.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1088</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[75dfa1de-510b-11ef-b11d-8f44ff1ed384]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5506509694.mp3?updated=1722631118" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ron Brash: Problem fixer in critical infrastructure. [OT] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/27/notes</link>
      <description>Director of Cyber Security Insights at Verve Industrial aka self-proclaimed industrial cybersecurity geek Ron Brash shares his journey through the industrial cybersecurity space. From taking his parents 286s and 386s to task to working for the "OG of industrial cybersecurity," Ron has pushed limits. Starting off in technical testing, racing through university at 2x speed, and taking a detour through neuroscience with machine learning, Ron decided to return to critical infrastructure working with devices that keep the lights on and the water flowing. Ron hopes his work makes an impact and his life is memorable for those he cares about. We thank Ron for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Aug 2024 07:00:00 -0000</pubDate>
      <itunes:title>Ron Brash: Problem fixer in critical infrastructure. [OT] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>27</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Director of Cyber Security Insights at Verve Industrial aka self-proclaimed industrial cybersecurity geek Ron Brash shares his journey through the industrial cybersecurity space. From taking his parents 286s and 386s to task to working for the "OG of industrial cybersecurity," Ron has pushed limits. Starting off in technical testing, racing through university at 2x speed, and taking a detour through neuroscience with machine learning, Ron decided to return to critical infrastructure working with devices that keep the lights on and the water flowing. Ron hopes his work makes an impact and his life is memorable for those he cares about. We thank Ron for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Director of Cyber Security Insights at Verve Industrial aka self-proclaimed industrial cybersecurity geek Ron Brash shares his journey through the industrial cybersecurity space. From taking his parents 286s and 386s to task to working for the "OG of industrial cybersecurity," Ron has pushed limits. Starting off in technical testing, racing through university at 2x speed, and taking a detour through neuroscience with machine learning, Ron decided to return to critical infrastructure working with devices that keep the lights on and the water flowing. Ron hopes his work makes an impact and his life is memorable for those he cares about. We thank Ron for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>501</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[957169ac-510f-11ef-b6ca-034356214966]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5513087283.mp3?updated=1722631585" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title> Spinning the web of tangled tactics. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/340/notes</link>
      <description>This week, we are joined by Jason Baker, Senior Threat Consultant at GuidePoint Security, and he is discussing their work on "Worldwide Web: An Analysis of Tactics and Techniques Attributed to Scattered Spider." In early 2024, a current RansomHub RaaS affiliate was identified as a former Alphv/Black Cat affiliate and is believed to be linked to the Scattered Spider group, known for using overlapping tools, tactics, and victims. 
The high-confidence assessment by GuidePoint’s DFIR and GRIT teams is supported by the consistent use of tools like ngrok and Tailscale, social engineering tactics, and systematic playbooks in intrusions.
The research can be found here:
Worldwide Web: An Analysis of Tactics and Techniques Attributed to Scattered Spider

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Aug 2024 07:00:00 -0000</pubDate>
      <itunes:title> Spinning the web of tangled tactics. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>340</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, we are joined by Jason Baker, Senior Threat Consultant at GuidePoint Security, and he is discussing their work on "Worldwide Web: An Analysis of Tactics and Techniques Attributed to Scattered Spider." In early 2024, a current RansomHub RaaS affiliate was identified as a former Alphv/Black Cat affiliate and is believed to be linked to the Scattered Spider group, known for using overlapping tools, tactics, and victims. 
The high-confidence assessment by GuidePoint’s DFIR and GRIT teams is supported by the consistent use of tools like ngrok and Tailscale, social engineering tactics, and systematic playbooks in intrusions.
The research can be found here:
Worldwide Web: An Analysis of Tactics and Techniques Attributed to Scattered Spider

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by Jason Baker, Senior Threat Consultant at GuidePoint Security, and he is discussing their work on "Worldwide Web: An Analysis of Tactics and Techniques Attributed to Scattered Spider." In early 2024, a current RansomHub RaaS affiliate was identified as a former Alphv/Black Cat affiliate and is believed to be linked to the Scattered Spider group, known for using overlapping tools, tactics, and victims. </p><p>The high-confidence assessment by GuidePoint’s DFIR and GRIT teams is supported by the consistent use of tools like ngrok and Tailscale, social engineering tactics, and systematic playbooks in intrusions.</p><p>The research can be found here:</p><ul><li><a href="https://www.guidepointsecurity.com/blog/worldwide-web-an-analysis-of-tactics-and-techniques-attributed-to-scattered-spider/">Worldwide Web: An Analysis of Tactics and Techniques Attributed to Scattered Spider</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1369</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f7f8fb12-50f1-11ef-884f-7bf94d91991c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3254406552.mp3?updated=1722619532" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A high-stakes swap.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2121/notes</link>
      <description>Notorious Russian cybercriminals head home after an historic prisoner exchange. An Israeli hacktivist group claims responsibility for a cyberattack that disrupted internet access in Iran. The U.S. Copyright Office calls for federal legislation to combat deep fakes. Cybercriminals are using a Cloudflare testing service for malware campaigns. The GAO instructs the EPA to address rising cyber threats to water and wastewater systems. Claroty reports a vulnerability in Rockwell Automation’s ControlLogix devices. Apple has open-sourced its homomorphic encryption (HE) library. CISA warns of a high severity vulnerability in Avtech Security cameras, and the agency appoints its first Chief AI Officer.  We welcome Tim Starks of CyberScoop back to the show today to discuss President Biden's cybersecurity legacy. Can an AI chatbot recognize its own reflection?
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guests
Welcoming Tim Starks of CyberScoop back to the show today to discuss Biden's cybersecurity legacy. For more information, you can check out Tim’s article “Biden’s cybersecurity legacy: ‘a big shift’ to private sector responsibility.” The National Cybersecurity Strategy can be found here. 

Dave also sits down with Errol Weiss, CSO of Health-ISAC, sharing their reaction to the ransomware attacks against healthcare. Health-ISAC and the American Hospital Association (AHA) have issued an advisory to raise awareness of the potential cascading impacts of cyberattacks on healthcare suppliers and the importance of mitigating single points of failure in supply chains. Recent ransomware attacks on OneBlood, Synnovis, and Octapharma by Russian cybercrime gangs have caused significant disruptions to patient care, emphasizing the need for healthcare organizations to incorporate mission-critical third-party suppliers into their risk and emergency management plans.

Selected Reading
Jailed cybercriminals returned to Russia in historic prisoner swap (CyberScoop)
American Hospital Association and Health-ISAC Joint Threat Bulletin - TLP White  (American Hospital Association and Health-ISAC) 
Iranian Internet Attacked by Israeli Hacktivist Group: Reports (Security Boulevard)
Copyright and Artificial Intelligence, Part 1 Digital Replicas Report (US Copyright Office)
Hackers abuse free TryCloudflare to deliver remote access malware (Bleeping Computer)
EPA Told to Address Cyber Risks to Water Systems (Infosecurity Magazine)
Security Bypass Vulnerability Found in Rockwell Automation Logix Controllers (SecurityWeek)
Apple open-sources its Homomorphic Encryption library (The Stack)
CISA Warns of Avtech Camera Vulnerability Exploited in Wild (SecurityWeek)
Lisa Einstein Appointed as CISA’s First Chief AI Officer (Homeland Security Today)
Can a Large Language Model Recognize Itself? (IEEE Spectrum)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 02 Aug 2024 20:10:00 -0000</pubDate>
      <itunes:title>A high-stakes swap.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2121</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Notorious Russian cybercriminals head home after an historic prisoner exchange. An Israeli hacktivist group claims responsibility for a cyberattack that disrupted internet access in Iran. The U.S. Copyright Office calls for federal legislation to combat deep fakes. Cybercriminals are using a Cloudflare testing service for malware campaigns. The GAO instructs the EPA to address rising cyber threats to water and wastewater systems. Claroty reports a vulnerability in Rockwell Automation’s ControlLogix devices. Apple has open-sourced its homomorphic encryption (HE) library. CISA warns of a high severity vulnerability in Avtech Security cameras, and the agency appoints its first Chief AI Officer.  We welcome Tim Starks of CyberScoop back to the show today to discuss President Biden's cybersecurity legacy. Can an AI chatbot recognize its own reflection?
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guests
Welcoming Tim Starks of CyberScoop back to the show today to discuss Biden's cybersecurity legacy. For more information, you can check out Tim’s article “Biden’s cybersecurity legacy: ‘a big shift’ to private sector responsibility.” The National Cybersecurity Strategy can be found here. 

Dave also sits down with Errol Weiss, CSO of Health-ISAC, sharing their reaction to the ransomware attacks against healthcare. Health-ISAC and the American Hospital Association (AHA) have issued an advisory to raise awareness of the potential cascading impacts of cyberattacks on healthcare suppliers and the importance of mitigating single points of failure in supply chains. Recent ransomware attacks on OneBlood, Synnovis, and Octapharma by Russian cybercrime gangs have caused significant disruptions to patient care, emphasizing the need for healthcare organizations to incorporate mission-critical third-party suppliers into their risk and emergency management plans.

Selected Reading
Jailed cybercriminals returned to Russia in historic prisoner swap (CyberScoop)
American Hospital Association and Health-ISAC Joint Threat Bulletin - TLP White  (American Hospital Association and Health-ISAC) 
Iranian Internet Attacked by Israeli Hacktivist Group: Reports (Security Boulevard)
Copyright and Artificial Intelligence, Part 1 Digital Replicas Report (US Copyright Office)
Hackers abuse free TryCloudflare to deliver remote access malware (Bleeping Computer)
EPA Told to Address Cyber Risks to Water Systems (Infosecurity Magazine)
Security Bypass Vulnerability Found in Rockwell Automation Logix Controllers (SecurityWeek)
Apple open-sources its Homomorphic Encryption library (The Stack)
CISA Warns of Avtech Camera Vulnerability Exploited in Wild (SecurityWeek)
Lisa Einstein Appointed as CISA’s First Chief AI Officer (Homeland Security Today)
Can a Large Language Model Recognize Itself? (IEEE Spectrum)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Notorious Russian cybercriminals head home after an historic prisoner exchange. An Israeli hacktivist group claims responsibility for a cyberattack that disrupted internet access in Iran. The U.S. Copyright Office calls for federal legislation to combat deep fakes. Cybercriminals are using a Cloudflare testing service for malware campaigns. The GAO instructs the EPA to address rising cyber threats to water and wastewater systems. Claroty reports a vulnerability in Rockwell Automation’s ControlLogix devices. Apple has open-sourced its homomorphic encryption (HE) library. CISA warns of a high severity vulnerability in Avtech Security cameras, and the agency appoints its first Chief AI Officer.  We welcome Tim Starks of CyberScoop back to the show today to discuss President Biden's cybersecurity legacy. Can an AI chatbot recognize its own reflection?</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guests</h2><p>Welcoming <a href="https://www.linkedin.com/in/tstarks/">Tim Starks</a> of <a href="https://cyberscoop.com/">CyberScoop</a> back to the show today to discuss Biden's cybersecurity legacy. For more information, you can check out Tim’s article “<a href="https://cyberscoop.com/bidens-cybersecurity-legacy-a-big-shift-to-private-sector-responsibility/">Biden’s cybersecurity legacy: ‘a big shift’ to private sector responsibility.</a>” The National Cybersecurity Strategy can be found <a href="https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf">here</a>. </p><p><br></p><p>Dave also sits down with <a href="https://www.linkedin.com/in/errolweiss/">Errol Weiss</a>, CSO of <a href="https://h-isac.org/">Health-ISAC</a>, sharing their reaction to the ransomware attacks against healthcare. Health-ISAC and the <a href="https://www.aha.org/">American Hospital Association</a> (AHA) have issued an <a href="https://www.aha.org/advisory/2024-08-01-american-hospital-association-and-health-isac-joint-threat-bulletin-tlp-white">advisory</a> to raise awareness of the potential cascading impacts of cyberattacks on healthcare suppliers and the importance of mitigating single points of failure in supply chains. Recent ransomware attacks on OneBlood, Synnovis, and Octapharma by Russian cybercrime gangs have caused significant disruptions to patient care, emphasizing the need for healthcare organizations to incorporate mission-critical third-party suppliers into their risk and emergency management plans.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://cyberscoop.com/jailed-cybercriminals-returned-to-russia-in-historic-prisoner-swap/">Jailed cybercriminals returned to Russia in historic prisoner swap</a> (CyberScoop)</p><p><a href="https://www.aha.org/advisory/2024-08-01-american-hospital-association-and-health-isac-joint-threat-bulletin-tlp-white">American Hospital Association and Health-ISAC Joint Threat Bulletin - TLP White </a> (American Hospital Association and Health-ISAC) </p><p><a href="https://securityboulevard.com/2024/08/iranian-internet-attacked-by-israeli-hacktivist-group-reports/">Iranian Internet Attacked by Israeli Hacktivist Group: Reports</a> (Security Boulevard)</p><p><a href="https://copyright.gov/ai/Copyright-and-Artificial-Intelligence-Part-1-Digital-Replicas-Report.pdf">Copyright and Artificial Intelligence, Part 1 Digital Replicas Report</a> (US Copyright Office)</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-abuse-free-trycloudflare-to-deliver-remote-access-malware/?ref=metacurity.com">Hackers abuse free TryCloudflare to deliver remote access malware</a> (Bleeping Computer)</p><p><a href="https://www.infosecurity-magazine.com/news/epa-cyber-risks-water-systems/">EPA Told to Address Cyber Risks to Water Systems </a>(Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/security-bypass-vulnerability-found-in-rockwell-automation-logix-controllers/">Security Bypass Vulnerability Found in Rockwell Automation Logix Controllers </a>(SecurityWeek)</p><p><a href="https://www.thestack.technology/apple-open-sources-its-homomorphic-encryption-library/">Apple open-sources its Homomorphic Encryption library</a> (The Stack)</p><p><a href="https://www.securityweek.com/cisa-warns-of-avtech-camera-vulnerability-exploited-in-wild/">CISA Warns of Avtech Camera Vulnerability Exploited in Wild</a> (SecurityWeek)</p><p><a href="https://www.hstoday.us/industry/people-on-the-move/lisa-einstein-appointed-as-cisas-first-chief-ai-officer">Lisa Einstein Appointed as CISA’s First Chief AI Officer</a> (Homeland Security Today)</p><p><a href="https://spectrum.ieee.org/self-aware-ai">Can a Large Language Model Recognize Itself?</a> (IEEE Spectrum)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2115</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[06b0a4b0-b95e-11ee-adc6-1350ea563cca]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8979487761.mp3?updated=1722625844" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware strikes a nerve.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2120/notes</link>
      <description>The U.S. blood supply is under pressure from a ransomware attack. CrowdStrike shareholders sue the company. There’s a critical vulnerability in Bitdefender’s GravityZone Update Server. BingoMod RAT targets Android users. Hackers use Google Ads to trick users into a fake Google Authenticator app. Western Sydney University confirms a major data breach. Marylands leads the way in gift card scam prevention. NSA is all-in on AI. My guest is David Moulton, host of Palo Alto Networks' podcast Threat Vector. Attention marketers: AI isn’t the buzzword you think it is. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
David Moulton, host of Palo Alto Networks' podcast Threat Vector and Director of Thought Leadership, discussing the evolution of his show and what we can expect to see coming next. You can catch the latest episode of Threat Vector where David welcomes Palo Alto Networks Founder and CTO Nir Zuk here.

Selected Reading
Ransomware attack on major US blood center prompts hundreds of hospitals to implement shortage protocols (The Record)
CrowdStrike sued by shareholders over global outage (BBC)
Bitdefender Flaw Let Attackers Trigger Server-Side Request Forgery Attacks (GB Hackers)
BingoMod Android RAT Wipes Devices After Stealing Money (SecurityWeek)
Google being impersonated on Google Ads by scammers peddling fake Authenticator (Cybernews)
Western Sydney University reveals full scope of January data breach (Cyber Daily)
Maryland becomes first state to pass law against gift card draining (CBS News)
More than 7,000 NSA analysts are using generative AI tools, director says (Defense One)
Study Finds Consumers Are Actively Turned Off by Products That Use AI (Futurism)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 01 Aug 2024 20:10:00 -0000</pubDate>
      <itunes:title>Ransomware strikes a nerve.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2120</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The U.S. blood supply is under pressure from a ransomware attack. CrowdStrike shareholders sue the company. There’s a critical vulnerability in Bitdefender’s GravityZone Update Server. BingoMod RAT targets Android users. Hackers use Google Ads to trick users into a fake Google Authenticator app. Western Sydney University confirms a major data breach. Marylands leads the way in gift card scam prevention. NSA is all-in on AI. My guest is David Moulton, host of Palo Alto Networks' podcast Threat Vector. Attention marketers: AI isn’t the buzzword you think it is. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
David Moulton, host of Palo Alto Networks' podcast Threat Vector and Director of Thought Leadership, discussing the evolution of his show and what we can expect to see coming next. You can catch the latest episode of Threat Vector where David welcomes Palo Alto Networks Founder and CTO Nir Zuk here.

Selected Reading
Ransomware attack on major US blood center prompts hundreds of hospitals to implement shortage protocols (The Record)
CrowdStrike sued by shareholders over global outage (BBC)
Bitdefender Flaw Let Attackers Trigger Server-Side Request Forgery Attacks (GB Hackers)
BingoMod Android RAT Wipes Devices After Stealing Money (SecurityWeek)
Google being impersonated on Google Ads by scammers peddling fake Authenticator (Cybernews)
Western Sydney University reveals full scope of January data breach (Cyber Daily)
Maryland becomes first state to pass law against gift card draining (CBS News)
More than 7,000 NSA analysts are using generative AI tools, director says (Defense One)
Study Finds Consumers Are Actively Turned Off by Products That Use AI (Futurism)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The U.S. blood supply is under pressure from a ransomware attack. CrowdStrike shareholders sue the company. There’s a critical vulnerability in Bitdefender’s GravityZone Update Server. BingoMod RAT targets Android users. Hackers use Google Ads to trick users into a fake Google Authenticator app. Western Sydney University confirms a major data breach. Marylands leads the way in gift card scam prevention. NSA is all-in on AI. My guest is David Moulton, host of Palo Alto Networks' podcast Threat Vector. Attention marketers: AI isn’t the buzzword you think it is. </p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a>, host of <a href="https://www.paloaltonetworks.com/">Palo Alto Networks</a>' podcast <a href="https://thecyberwire.com/podcasts/threat-vector">Threat Vector</a> and Director of Thought Leadership, discussing the evolution of his show and what we can expect to see coming next. You can catch the latest episode of Threat Vector where David welcomes Palo Alto Networks Founder and CTO Nir Zuk <a href="https://thecyberwire.com/podcasts/threat-vector/28/notes">here</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/ransomware-attack-blood-center-shortage-protocols-hospitals">Ransomware attack on major US blood center prompts hundreds of hospitals to implement shortage protocols</a> (The Record)</p><p><a href="https://www.bbc.com/news/articles/cy08ljxndr4o">CrowdStrike sued by shareholders over global outage</a> (BBC)</p><p><a href="https://gbhackers.com/bitdefender-flaw-let-attackers/">Bitdefender Flaw Let Attackers Trigger Server-Side Request Forgery Attacks</a> (GB Hackers)</p><p><a href="https://www.securityweek.com/bingomod-android-rat-wipes-devices-after-stealing-money/">BingoMod Android RAT Wipes Devices After Stealing Money</a> (SecurityWeek)</p><p><a href="https://cnews.link/google-impersonated-on-google-ads/">Google being impersonated on Google Ads by scammers peddling fake Authenticator</a> (Cybernews)</p><p><a href="https://www.cyberdaily.au/security/10909-western-sydney-university-reveals-full-scope-of-january-data-breach">Western Sydney University reveals full scope of January data breach</a> (Cyber Daily)</p><p><a href="https://www.cbsnews.com/news/gift-card-draining-maryland-first-state-law/">Maryland becomes first state to pass law against gift card draining</a> (CBS News)</p><p><a href="https://www.defenseone.com/defense-systems/2024/07/more-7000-nsa-workers-are-using-generative-ai-tools/398480/">More than 7,000 NSA analysts are using generative AI tools, director says</a> (Defense One)</p><p><a href="https://futurism.com/the-byte/study-consumers-turned-off-products-ai">Study Finds Consumers Are Actively Turned Off by Products That Use AI</a> (Futurism)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1489</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[06785b5a-b95e-11ee-adc6-5b1c7e4b632c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1867547583.mp3?updated=1722867059" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When DDoS and defense collide.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2119/notes</link>
      <description>A global Microsoft outage takes down Outlook and Minecraft. The US Senate passes The Kids Online Safety and Privacy Act. Lame Duck domain names are targets for takeovers. A GeoServer vulnerability exposes thousands to remote code execution. China proposes a national internet ID. Email attacks surge dramatically in 2024. Columbus Ohio thwarts a ransomware attack. When it comes to invading your privacy, the Paris 2024 Olympics app goes for the gold. Our guest is Rakesh Nair, Senior Vice President of Engineering and Product at Devo, discussing the issues that security teams face when dealing with data control and data orchestration. Was it really Windows 3.1 that saved Southwest Airlines?
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Rakesh Nair, Senior Vice President of Engineering and Product at Devo, discussing the issues that security teams face when dealing with data control and data orchestration. You can read more here. 

Selected Reading
Microsoft apologises after thousands report new outage (BBC News)
Microsoft: Ransomware gangs exploit VMware ESXi auth bypass in attacks (Bleeping Computer)
Senate Passes Bill to Protect Kids Online and Make Tech Companies Accountable for Harmful Content (SecurityWeek)
Don’t Let Your Domain Name Become a “Sitting Duck” (Krebs on Security)
Hackers Actively Exploiting GeoServer RCE Flaw, 6635 Servers Vulnerable (Cyber Security News)
China Wants to Start a National Internet ID System (The New York Times)
Email Attacks Surge, Ransomware Threat Remains Elevated (Security Boulevard)
Columbus says it thwarted overseas ransomware attack that caused tech shutdown (Dispatch)
Gold rush for data: Paris 2024 Olympic apps are eavesdropping on users (Cyber News)
No, Southwest Airlines is not still using Windows 3.1 (OSnews) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 31 Jul 2024 20:10:00 -0000</pubDate>
      <itunes:title>When DDoS and defense collide.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2119</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A global Microsoft outage takes down Outlook and Minecraft. The US Senate passes The Kids Online Safety and Privacy Act. Lame Duck domain names are targets for takeovers. A GeoServer vulnerability exposes thousands to remote code execution. China proposes a national internet ID. Email attacks surge dramatically in 2024. Columbus Ohio thwarts a ransomware attack. When it comes to invading your privacy, the Paris 2024 Olympics app goes for the gold. Our guest is Rakesh Nair, Senior Vice President of Engineering and Product at Devo, discussing the issues that security teams face when dealing with data control and data orchestration. Was it really Windows 3.1 that saved Southwest Airlines?
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Rakesh Nair, Senior Vice President of Engineering and Product at Devo, discussing the issues that security teams face when dealing with data control and data orchestration. You can read more here. 

Selected Reading
Microsoft apologises after thousands report new outage (BBC News)
Microsoft: Ransomware gangs exploit VMware ESXi auth bypass in attacks (Bleeping Computer)
Senate Passes Bill to Protect Kids Online and Make Tech Companies Accountable for Harmful Content (SecurityWeek)
Don’t Let Your Domain Name Become a “Sitting Duck” (Krebs on Security)
Hackers Actively Exploiting GeoServer RCE Flaw, 6635 Servers Vulnerable (Cyber Security News)
China Wants to Start a National Internet ID System (The New York Times)
Email Attacks Surge, Ransomware Threat Remains Elevated (Security Boulevard)
Columbus says it thwarted overseas ransomware attack that caused tech shutdown (Dispatch)
Gold rush for data: Paris 2024 Olympic apps are eavesdropping on users (Cyber News)
No, Southwest Airlines is not still using Windows 3.1 (OSnews) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A global Microsoft outage takes down Outlook and Minecraft. The US Senate passes The Kids Online Safety and Privacy Act. Lame Duck domain names are targets for takeovers. A GeoServer vulnerability exposes thousands to remote code execution. China proposes a national internet ID. Email attacks surge dramatically in 2024. Columbus Ohio thwarts a ransomware attack. When it comes to invading your privacy, the Paris 2024 Olympics app goes for the gold. Our guest is Rakesh Nair, Senior Vice President of Engineering and Product at Devo, discussing the issues that security teams face when dealing with data control and data orchestration. Was it really Windows 3.1 that saved Southwest Airlines?</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/rakesh-nair/">Rakesh Nair</a>, Senior Vice President of Engineering and Product at <a href="https://www.devo.com/">Devo</a>, discussing the issues that security teams face when dealing with data control and data orchestration. You can read more <a href="https://www.devo.com/company/newsroom/devo-delivers-complete-data-control-to-security-teams-with-the-launch-of-data-orchestration/">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bbc.co.uk/news/articles/c903e793w74o">Microsoft apologises after thousands report new outage</a> (BBC News)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-ransomware-gangs-exploit-vmware-esxi-auth-bypass-in-attacks/">Microsoft: Ransomware gangs exploit VMware ESXi auth bypass in attacks</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/senate-passes-bill-to-protect-kids-online-and-make-tech-companies-accountable-for-harmful-content/">Senate Passes Bill to Protect Kids Online and Make Tech Companies Accountable for Harmful Content</a> (SecurityWeek)</p><p><a href="https://krebsonsecurity.com/2024/07/dont-let-your-domain-name-become-a-sitting-duck/">Don’t Let Your Domain Name Become a “Sitting Duck”</a> (Krebs on Security)</p><p><a href="https://cybersecuritynews.com/hackers-actively-exploiting-geoserver/">Hackers Actively Exploiting GeoServer RCE Flaw, 6635 Servers Vulnerable</a> (Cyber Security News)</p><p><a href="https://www.nytimes.com/2024/07/31/business/china-national-internet-id.html">China Wants to Start a National Internet ID System</a> (The New York Times)</p><p><a href="https://securityboulevard.com/2024/07/email-attacks-surge-ransomware-threat-remains-elevated/">Email Attacks Surge, Ransomware Threat Remains Elevated</a> (Security Boulevard)</p><p><a href="https://www.dispatch.com/story/news/local/2024/07/29/columbus-email-restored-tech-cyber-outage-continues-to-plauge-departments/74586293007/?ref=metacurity.com">Columbus says it thwarted overseas ransomware attack that caused tech shutdown</a> (Dispatch)</p><p><a href="https://cybernews.com/security/paris-2024-olympic-apps-eavesdropping-on-users/?ref=metacurity.com">Gold rush for data: Paris 2024 Olympic apps are eavesdropping on users</a> (Cyber News)</p><p><a href="https://www.osnews.com/story/140301/no-southwest-airlines-is-not-still-using-windows-3-1/">No, Southwest Airlines is not still using Windows 3.1</a> (OSnews) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1722</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[063f2f7e-b95e-11ee-adc6-5f329a2d88bf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8220489630.mp3?updated=1722452206" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Breaking Bad (records).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2118/notes</link>
      <description>ZScaler uncovers the largest ransomware payment to date. IBM says the average cost of a breach is closing in on five million dollars. Hackers exploited Proofpoint's email protection platform to send millions of phishing emails. NIST launches Dioptra to test ML models. AcidPour targets Linux data storage devices for wiping. WhatsApp for Windows allows Python to run wild. The White House releases the National Standards Strategy for Critical and Emerging Technology (USG NSSCET) Implementation Roadmap. A bipartisan Senate bill aims to fund cybersecurity apprenticeships. CISA adds three exploits to its vulnerability catalog. Ben Yelin joins us today to discuss a U.S. District Court judge’s recent dismissal of charges against SolarWinds. Loose lips sink ships, but leaky HDMI cables flood the airwaves with digital data. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Ben Yelin, co-host of our Caveat podcast and Program Director, Public Policy &amp; External Affairs at University of Maryland Center for Health and Homeland Security, joins us today to discuss the U.S. District Court judge dismissing most charges against SolarWinds. For more detail on the SolarWinds decision, check out this article. 

Selected Reading
Zscaler just uncovered what could be the largest ransomware payment of all time (ITPro)
Hackers exploit Proofpoint to send millions of phishing emails (Tech Monitor)
Average data breach cost jumps to $4.88 million, collateral damage increased (Help Net Security)
NIST releases open-source platform for AI safety testing (SC Media)
AcidPour Malware Attacking Linux Data Storage Devices To Wipe Out Data (GB Hackers)
WhatsApp for Windows lets Python, PHP scripts execute with no warning (Bleeping Computer)
US government debuts Implementation Roadmap for national standards strategy on critical and emerging technologies (Industrial Cyber)
Bipartisan Senate bill would promote cybersecurity apprenticeship programs (CyberScoop)
CISA warns of three new critical exploited vulnerabilities (The Stack)
AI can reveal what’s on your screen via signals leaking from cables (New Scientist)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Jul 2024 20:10:00 -0000</pubDate>
      <itunes:title>Breaking Bad (records).</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2118</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>ZScaler uncovers the largest ransomware payment to date. IBM says the average cost of a breach is closing in on five million dollars. Hackers exploited Proofpoint's email protection platform to send millions of phishing emails. NIST launches Dioptra to test ML models. AcidPour targets Linux data storage devices for wiping. WhatsApp for Windows allows Python to run wild. The White House releases the National Standards Strategy for Critical and Emerging Technology (USG NSSCET) Implementation Roadmap. A bipartisan Senate bill aims to fund cybersecurity apprenticeships. CISA adds three exploits to its vulnerability catalog. Ben Yelin joins us today to discuss a U.S. District Court judge’s recent dismissal of charges against SolarWinds. Loose lips sink ships, but leaky HDMI cables flood the airwaves with digital data. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Ben Yelin, co-host of our Caveat podcast and Program Director, Public Policy &amp; External Affairs at University of Maryland Center for Health and Homeland Security, joins us today to discuss the U.S. District Court judge dismissing most charges against SolarWinds. For more detail on the SolarWinds decision, check out this article. 

Selected Reading
Zscaler just uncovered what could be the largest ransomware payment of all time (ITPro)
Hackers exploit Proofpoint to send millions of phishing emails (Tech Monitor)
Average data breach cost jumps to $4.88 million, collateral damage increased (Help Net Security)
NIST releases open-source platform for AI safety testing (SC Media)
AcidPour Malware Attacking Linux Data Storage Devices To Wipe Out Data (GB Hackers)
WhatsApp for Windows lets Python, PHP scripts execute with no warning (Bleeping Computer)
US government debuts Implementation Roadmap for national standards strategy on critical and emerging technologies (Industrial Cyber)
Bipartisan Senate bill would promote cybersecurity apprenticeship programs (CyberScoop)
CISA warns of three new critical exploited vulnerabilities (The Stack)
AI can reveal what’s on your screen via signals leaking from cables (New Scientist)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>ZScaler uncovers the largest ransomware payment to date. IBM says the average cost of a breach is closing in on five million dollars. Hackers exploited Proofpoint's email protection platform to send millions of phishing emails. NIST launches Dioptra to test ML models. AcidPour targets Linux data storage devices for wiping. WhatsApp for Windows allows Python to run wild. The White House releases the National Standards Strategy for Critical and Emerging Technology (USG NSSCET) Implementation Roadmap. A bipartisan Senate bill aims to fund cybersecurity apprenticeships. CISA adds three exploits to its vulnerability catalog. Ben Yelin joins us today to discuss a U.S. District Court judge’s recent dismissal of charges against SolarWinds. Loose lips sink ships, but leaky HDMI cables flood the airwaves with digital data. </p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/benjamin-yelin-5b14114b/">Ben Yelin</a>, co-host of our <a href="https://thecyberwire.com/podcasts/caveat">Caveat</a> podcast and Program Director, Public Policy &amp; External Affairs at <a href="https://www.mdchhs.com/">University of Maryland Center for Health and Homeland Security</a>, joins us today to discuss the U.S. District Court judge dismissing most charges against SolarWinds. For more detail on the SolarWinds decision, check out this <a href="https://therecord.media/judge-tosses-most-of-solarwinds-case-sec">article</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.itpro.com/security/ransomware/zscaler-just-uncovered-what-could-be-the-largest-ransomware-payment-of-all-time">Zscaler just uncovered what could be the largest ransomware payment of all time</a> (ITPro)</p><p><a href="https://techmonitor.ai/technology/cybersecurity/proofpoint-echospoofing">Hackers exploit Proofpoint to send millions of phishing emails</a> (Tech Monitor)</p><p><a href="https://www.helpnetsecurity.com/2024/07/30/ibm-cost-data-breach-report-2024/">Average data breach cost jumps to $4.88 million, collateral damage increased</a> (Help Net Security)</p><p><a href="https://www.scmagazine.com/news/nist-releases-open-source-platform-for-ai-safety-testing">NIST releases open-source platform for AI safety testing</a> (SC Media)</p><p><a href="https://gbhackers.com/acidpour-malware-linux-data-wipe/">AcidPour Malware Attacking Linux Data Storage Devices To Wipe Out Data</a> (GB Hackers)</p><p><a href="https://www.bleepingcomputer.com/news/security/whatsapp-for-windows-lets-python-php-scripts-execute-with-no-warning/">WhatsApp for Windows lets Python, PHP scripts execute with no warning</a> (Bleeping Computer)</p><p><a href="https://industrialcyber.co/regulation-standards-and-compliance/us-government-debuts-implementation-roadmap-for-national-standards-strategy-on-critical-and-emerging-technologies/">US government debuts Implementation Roadmap for national standards strategy on critical and emerging technologies</a> (Industrial Cyber)</p><p><a href="https://cyberscoop.com/cybersecurity-apprenticeships-senate-bill-labor-rosen-blackburn/">Bipartisan Senate bill would promote cybersecurity apprenticeship programs</a> (CyberScoop)</p><p><a href="https://www.thestack.technology/cisa-warns-of-three-new-critical-exploited-vulnerabilities/">CISA warns of three new critical exploited vulnerabilities</a> (The Stack)</p><p><a href="https://www.newscientist.com/article/2439853-ai-can-reveal-whats-on-your-screen-via-signals-leaking-from-cables/">AI can reveal what’s on your screen via signals leaking from cables</a> (New Scientist)</p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1587</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0606dac0-b95e-11ee-adc6-ffc87c567a9b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7644004172.mp3?updated=1722365358" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Are North Korean hackers going 'Seoul' searching?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2117/notes</link>
      <description>South Korea investigates a substantial leak of military intelligence to the north. Google fixes a Workspace authentication weakness. Wiz identifies an API authentication vulnerability in Selenium Grid. The UK’s Science Secretary warns Britain is highly vulnerable to cyber threats. Global shipping faces a surge in cyber attacks. Apple has resolved the iCloud Private Relay outage. Google Chrome offers to scan encrypted archives for malware. Barath Raghavan and Bruce Schneier examine the brittleness of modern IT infrastructure. Guest Brian Gumbel, President and COO at Dataminr, joins us to discuss the convergence of cyber-physical realms. Rick Howard previews his latest CSO Perspectives episode on the state of Zero Trust. Teaching AI crawlers some manners.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Brian Gumbel, President and COO at Dataminr, joins us to discuss the convergence of cyber-physical realms. Cybersecurity is no longer just a matter of protecting data on servers or computers, a cyber-attack can have tangible, real-world consequences.

CSO Perspectives
This week on N2K Pro’s CSO Perspectives podcast, host and N2K CSO Rick Howard focuses on “The current state of zero trust.” Hear a bit about it from Rick and Dave. You can find the full episode here if you are an N2K Pro subscriber, otherwise check out an extended sample here. 

Selected Reading
South Korea Reports Leak From Its Military Intelligence Command (New York Times)
Crooks Bypassed Google’s Email Verification to Create Workspace Accounts, Access 3rd-Party Services (Krebs on Security)
Selenium Grid Instances Exploited for Cryptomining (SecurityWeek)
UK ‘desperately exposed’ to cyber-threats and pandemics, says minister | UK security and counter-terrorism (The Guardian)
Cyber attacks on shipping rise amid geopolitical tensions (Financial Times)
Apple Fixes iCloud Private Relay After Extended Outage (MacRumors)
Chrome now asking for ZIP archive passwords to help detect malicious files (Cybernews)
The CrowdStrike Outage and Market-Driven Brittleness (Lawfare)
AI crawlers need to be more respectful (Read the Docs)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 29 Jul 2024 20:10:00 -0000</pubDate>
      <itunes:title>Are North Korean hackers going 'Seoul' searching?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2117</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>South Korea investigates a substantial leak of military intelligence to the north. Google fixes a Workspace authentication weakness. Wiz identifies an API authentication vulnerability in Selenium Grid. The UK’s Science Secretary warns Britain is highly vulnerable to cyber threats. Global shipping faces a surge in cyber attacks. Apple has resolved the iCloud Private Relay outage. Google Chrome offers to scan encrypted archives for malware. Barath Raghavan and Bruce Schneier examine the brittleness of modern IT infrastructure. Guest Brian Gumbel, President and COO at Dataminr, joins us to discuss the convergence of cyber-physical realms. Rick Howard previews his latest CSO Perspectives episode on the state of Zero Trust. Teaching AI crawlers some manners.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Brian Gumbel, President and COO at Dataminr, joins us to discuss the convergence of cyber-physical realms. Cybersecurity is no longer just a matter of protecting data on servers or computers, a cyber-attack can have tangible, real-world consequences.

CSO Perspectives
This week on N2K Pro’s CSO Perspectives podcast, host and N2K CSO Rick Howard focuses on “The current state of zero trust.” Hear a bit about it from Rick and Dave. You can find the full episode here if you are an N2K Pro subscriber, otherwise check out an extended sample here. 

Selected Reading
South Korea Reports Leak From Its Military Intelligence Command (New York Times)
Crooks Bypassed Google’s Email Verification to Create Workspace Accounts, Access 3rd-Party Services (Krebs on Security)
Selenium Grid Instances Exploited for Cryptomining (SecurityWeek)
UK ‘desperately exposed’ to cyber-threats and pandemics, says minister | UK security and counter-terrorism (The Guardian)
Cyber attacks on shipping rise amid geopolitical tensions (Financial Times)
Apple Fixes iCloud Private Relay After Extended Outage (MacRumors)
Chrome now asking for ZIP archive passwords to help detect malicious files (Cybernews)
The CrowdStrike Outage and Market-Driven Brittleness (Lawfare)
AI crawlers need to be more respectful (Read the Docs)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>South Korea investigates a substantial leak of military intelligence to the north. Google fixes a Workspace authentication weakness. Wiz identifies an API authentication vulnerability in Selenium Grid. The UK’s Science Secretary warns Britain is highly vulnerable to cyber threats. Global shipping faces a surge in cyber attacks. Apple has resolved the iCloud Private Relay outage. Google Chrome offers to scan encrypted archives for malware. Barath Raghavan and Bruce Schneier examine the brittleness of modern IT infrastructure. Guest Brian Gumbel, President and COO at Dataminr, joins us to discuss the convergence of cyber-physical realms. Rick Howard previews his latest CSO Perspectives episode on the state of Zero Trust. Teaching AI crawlers some manners.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/briangumbel/">Brian Gumbel</a>, President and COO at <a href="https://www.dataminr.com/">Dataminr</a>, joins us to discuss the convergence of cyber-physical realms. Cybersecurity is no longer just a matter of protecting data on servers or computers, a cyber-attack can have tangible, real-world consequences.</p><p><br></p><h2>CSO Perspectives</h2><p>This week on N2K Pro’s <a href="https://thecyberwire.com/podcasts/cso-perspectives">CSO Perspectives podcast</a>, host and <a href="https://www.n2k.com/">N2K</a> CSO <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> focuses on “The current state of zero trust.” Hear a bit about it from Rick and Dave. You can find the full episode <a href="https://thecyberwire.com/podcasts/cso-perspectives/116/notes">here</a> if you are an N2K Pro subscriber, otherwise check out an extended sample <a href="https://thecyberwire.com/podcasts/cso-perspectives-public/94/notes">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.nytimes.com/2024/07/27/world/asia/south-korea-intelligence-leaks-north-korea.html">South Korea Reports Leak From Its Military Intelligence Command</a> (New York Times)</p><p><a href="https://krebsonsecurity.com/2024/07/crooks-bypassed-googles-email-verification-to-create-workspace-accounts-access-3rd-party-services/?ref=metacurity.com">Crooks Bypassed Google’s Email Verification to Create Workspace Accounts, Access 3rd-Party Services </a>(Krebs on Security)</p><p><a href="https://www.securityweek.com/selenium-grid-instances-exploited-for-cryptomining/?ref=metacurity.com">Selenium Grid Instances Exploited for Cryptomining</a> (SecurityWeek)</p><p><a href="https://www.theguardian.com/uk-news/article/2024/jul/29/uk-desperately-exposed-to-cyber-threats-and-pandemics-says-minister">UK ‘desperately exposed’ to cyber-threats and pandemics, says minister | UK security and counter-terrorism </a><a href="https://www.theguardian.com/uk-news/article/2024/jul/29/uk-desperately-exposed-to-cyber-threats-and-pandemics-says-minister">(The Guardian)</a></p><p><a href="https://www.ft.com/content/c05c9b21-77bd-4ddf-82e1-02356acf0899">Cyber attacks on shipping rise amid geopolitical tensions</a> (Financial Times)</p><p><a href="https://www.macrumors.com/2024/07/29/apple-fixes-icloud-private-relay/">Apple Fixes iCloud Private Relay After Extended Outage</a> (MacRumors)</p><p><a href="https://cybernews.com/security/chrome-prompt-archive-passwords-detect-malicious-files/?source=mastodon&amp;medium=social&amp;campaign=cybernews&amp;content=post">Chrome now asking for ZIP archive passwords to help detect malicious files</a> (Cybernews)</p><p><a href="https://www.lawfaremedia.org/article/the-crowdstrike-outage-and-market-driven-brittleness">The CrowdStrike Outage and Market-Driven Brittleness</a> (Lawfare)</p><p><a href="https://about.readthedocs.com/blog/2024/07/ai-crawlers-abuse/">AI crawlers need to be more respectful</a> (Read the Docs)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2007</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[05cdc8b6-b95e-11ee-adc6-bb3c1d718d23]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2221569929.mp3?updated=1722280504" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The current state of the zero trust.</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/94/notes</link>
      <description>Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses the current state of zero trust with CyberWire Hash Table guest John Kindervag, the originator of the zero trust idea.

References:
Jonathan Jones, 2011. “Six Honest Serving Men” by Rudyard Kipling [Video]. YouTube.
Dave Bittner, Rick Howard, John Kindervag, Kapil Raina, 2021. Zeroing in on zero trust. [Podcast]. CyberWire-X Podcast - N2K Cyberwire.
Dawn Cappelli, Andrew Moore, Randall Trzeciak, 2012. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)  [Book]. SEI Series in Software Engineering). Goodreads. 
Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads.
John Kindervag, 2010. No More Chewy Centers: Introducing The Zero Trust Model Of Information Security [White Paper]. Palo Alto Networks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 29 Jul 2024 06:00:00 -0000</pubDate>
      <itunes:title>The current state of the zero trust.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>94</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses the current state of zero trust with CyberWire Hash Table guest John Kindervag, the originator of the zero trust idea.

References:
Jonathan Jones, 2011. “Six Honest Serving Men” by Rudyard Kipling [Video]. YouTube.
Dave Bittner, Rick Howard, John Kindervag, Kapil Raina, 2021. Zeroing in on zero trust. [Podcast]. CyberWire-X Podcast - N2K Cyberwire.
Dawn Cappelli, Andrew Moore, Randall Trzeciak, 2012. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)  [Book]. SEI Series in Software Engineering). Goodreads. 
Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads.
John Kindervag, 2010. No More Chewy Centers: Introducing The Zero Trust Model Of Information Security [White Paper]. Palo Alto Networks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, discusses the current state of zero trust with CyberWire Hash Table guest John Kindervag, the originator of the zero trust idea.</p><p><br></p><h2>References:</h2><p><a href="https://www.youtube.com/watch?v=WIn5CQ_XH1Q">Jonathan Jones, 2011. “Six Honest Serving Men” by Rudyard Kipling [Video]. YouTube.</a></p><p><a href="https://thecyberwire.com/podcasts/cyberwire-x/14/transcript">Dave Bittner, Rick Howard, John Kindervag, Kapil Raina, 2021. Zeroing in on zero trust. [Podcast]. CyberWire-X Podcast - N2K Cyberwire.</a></p><p><a href="https://www.goodreads.com/book/show/13705404-the-cert-guide-to-insider-threats">Dawn Cappelli, Andrew Moore, Randall Trzeciak, 2012. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)  [Book]. SEI Series in Software Engineering). Goodreads.</a> </p><p><a href="https://www.goodreads.com/book/show/75671183-cybersecurity-first-principles">Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads.</a></p><p><a href="https://media.paloaltonetworks.com/documents/Forrester-No-More-Chewy-Centers.pdf">John Kindervag, 2010. No More Chewy Centers: Introducing The Zero Trust Model Of Information Security [White Paper]. Palo Alto Networks.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1064</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f5537328-4b93-11ef-8293-ef20522b1608]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1519492350.mp3?updated=1722029080" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Camille Stewart: Technology becomes more of an equalizer. [Legal] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/26/notes</link>
      <description>Cybersecurity attorney Camille Stewart shares how her childhood affinity for making contracts pointed to her eventual career as an attorney. Having a computer scientist father contributed to Camille's technical acumen and desire to include technology in her life's work. Camille has worked various facets of cybersecurity law from the private sector, federal government, on the Hill and in the Executive Branch, and now as part of Big Tech as Head of Security Policy and Election Integrity for Google Play and Android where she creates policy geared towards making sure users are safe on their platform and equipped to make informed decisions.. We thank Camille for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 28 Jul 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Camille Stewart: Technology becomes more of an equalizer. [Legal] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>24</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cybersecurity attorney Camille Stewart shares how her childhood affinity for making contracts pointed to her eventual career as an attorney. Having a computer scientist father contributed to Camille's technical acumen and desire to include technology in her life's work. Camille has worked various facets of cybersecurity law from the private sector, federal government, on the Hill and in the Executive Branch, and now as part of Big Tech as Head of Security Policy and Election Integrity for Google Play and Android where she creates policy geared towards making sure users are safe on their platform and equipped to make informed decisions.. We thank Camille for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cybersecurity attorney Camille Stewart shares how her childhood affinity for making contracts pointed to her eventual career as an attorney. Having a computer scientist father contributed to Camille's technical acumen and desire to include technology in her life's work. Camille has worked various facets of cybersecurity law from the private sector, federal government, on the Hill and in the Executive Branch, and now as part of Big Tech as Head of Security Policy and Election Integrity for Google Play and Android where she creates policy geared towards making sure users are safe on their platform and equipped to make informed decisions.. We thank Camille for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>473</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9a3d9744-4b74-11ef-877b-370473a8325e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1345414480.mp3?updated=1722015266" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Streamlining the US Navy's innovation process: A conversation with Acting CTO Justin Fanelli. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/68/notes</link>
      <description>N2K’s Brandon Karpf speaks with guest Justin Fanelli, Acting CTO of the US Navy, about the US Navy streamlining the innovation process. For some background, you can refer to this article. 

Additional resources: 


PEO Digital Innovation Adoption Kit 

Atlantic Council’s Commission on Defense Innovation Adoption


For industry looking to engage with PEO Digital: Industry Engagement



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 28 Jul 2024 06:00:00 -0000</pubDate>
      <itunes:title>Streamlining the US Navy's innovation process: A conversation with Acting CTO Justin Fanelli. [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>68</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>N2K’s Brandon Karpf speaks with guest Justin Fanelli, Acting CTO of the US Navy, about the US Navy streamlining the innovation process. For some background, you can refer to this article. 

Additional resources: 


PEO Digital Innovation Adoption Kit 

Atlantic Council’s Commission on Defense Innovation Adoption


For industry looking to engage with PEO Digital: Industry Engagement



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.n2k.com/">N2K</a>’s <a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a> speaks with guest <a href="https://www.linkedin.com/in/justinfanelli/">Justin Fanelli</a>, Acting CTO of the <a href="https://www.navy.com/">US Navy</a>, about the US Navy streamlining the innovation process. For some background, you can refer to this <a href="https://www.afcea.org/signal-media/calling-innovators-navy-wants-you">article</a>. </p><h3><br></h3><h3>Additional resources: </h3><ul>
<li>
<a href="https://www.peodigital.navy.mil/Portals/96/Documents/PDFs/PEODigital_Innovation_Adoption_v3.pdf?ver=kfbqKeRadl-LcOJfRJ6TwQ%3d%3d">PEO Digital Innovation Adoption Kit</a> </li>
<li>Atlantic Council’s <a href="https://www.atlanticcouncil.org/programs/scowcroft-center-for-strategy-and-security/forward-defense/defense-innovation-adoption-commission/">Commission on Defense Innovation Adoption</a>
</li>
<li>For industry looking to engage with PEO Digital: <a href="https://www.peodigital.navy.mil/Industry/">Industry Engagement</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2150</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2c6a352e-4b79-11ef-9572-97a47d569549]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2472636434.mp3?updated=1722025771" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Black Basta ransomware riddle. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/339/notes</link>
      <description>Dick O'Brien from Symantec Threat Hunter team is talking about their work on "Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day." Also going to provide some background/history on Black Basta. CVE-2024-26169 in the Windows Error Reporting Service, patched on March 12, 2024, allowed privilege escalation. 
Despite initial claims of no active exploitation, recent analysis indicates it may have been exploited as a zero-day before the patch.
The research can be found here:
Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Jul 2024 07:00:00 -0000</pubDate>
      <itunes:title>The Black Basta ransomware riddle. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>339</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dick O'Brien from Symantec Threat Hunter team is talking about their work on "Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day." Also going to provide some background/history on Black Basta. CVE-2024-26169 in the Windows Error Reporting Service, patched on March 12, 2024, allowed privilege escalation. 
Despite initial claims of no active exploitation, recent analysis indicates it may have been exploited as a zero-day before the patch.
The research can be found here:
Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dick O'Brien from Symantec Threat Hunter team is talking about their work on "Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day." Also going to provide some background/history on Black Basta. CVE-2024-26169 in the Windows Error Reporting Service, patched on March 12, 2024, allowed privilege escalation. </p><p>Despite initial claims of no active exploitation, recent analysis indicates it may have been exploited as a zero-day before the patch.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/threat-intelligence/black-basta-ransomware-zero-day">Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1024</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1dea609a-4b6b-11ef-8bce-1bfbbeeb9bb0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4686304455.mp3?updated=1722012930" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FBI and DOJ thwart North Korean cyber scheme.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2116/notes</link>
      <description>A North Korean hacker is indicted for major cyberattacks. CrowdStrike’s in recovery mode. Phishing thrives in the wake of BSOD chaos. Wiz spells out no to Alphabet's $23bn offer. France goes full clean-up. Israel's secret shield in spyware saga. KOSA and COPPA 2.0 promise safer surfing for kids. N2K’s CSO Rick Howard speaks with Steve Schmidt, CSO of Amazon, about the culture of security and what it means to the CSO role. And last but not least, hacking can happen to anyone.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On today’s guest slot, N2K’s CSO Rick Howard speaks with Steve Schmidt, CSO of Amazon, about the culture of security and what it means to the CSO role. They touch upon the SEC reporting requirements and how testing is never done. Rick and Steve caught up at AWS re:Inforce 2024. 

Selected Reading
US indicts alleged North Korean state hacker for ransomware attacks on hospitals (The Record) 
North Korean Military Hacker Indicted for String of US Attacks (Metacurity)
CrowdStrike says over 97% of Windows sensors back online (Reuters)
Threat Actors leveraging the recent CrowdStrike update outage (FortiGuard Labs) 
Cyber-security firm rejects $23bn Google takeover (BBC)
ECB's cyber security test shows 'room for improvement' for banks (Reuters)  
France launches large-scale operation to fight cyber spying ahead of Olympics (The Record) 
Israel Maneuvered to Prevent Disclosure of State Secrets amid WhatsApp vs NSO Lawsuit (Forbidden Stories)  
KOSA, COPPA 2.0 Likely to Pass U.S. Senate (Inside Privacy) 
A North Korean Hacker Tricked a US Security Vendor Into Hiring Him—and Immediately Tried to Hack Them (WIRED) 
North Korean Fake IT Worker FAQ (KnowBe4) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 26 Jul 2024 20:10:00 -0000</pubDate>
      <itunes:title>FBI and DOJ thwart North Korean cyber scheme.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2116</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A North Korean hacker is indicted for major cyberattacks. CrowdStrike’s in recovery mode. Phishing thrives in the wake of BSOD chaos. Wiz spells out no to Alphabet's $23bn offer. France goes full clean-up. Israel's secret shield in spyware saga. KOSA and COPPA 2.0 promise safer surfing for kids. N2K’s CSO Rick Howard speaks with Steve Schmidt, CSO of Amazon, about the culture of security and what it means to the CSO role. And last but not least, hacking can happen to anyone.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On today’s guest slot, N2K’s CSO Rick Howard speaks with Steve Schmidt, CSO of Amazon, about the culture of security and what it means to the CSO role. They touch upon the SEC reporting requirements and how testing is never done. Rick and Steve caught up at AWS re:Inforce 2024. 

Selected Reading
US indicts alleged North Korean state hacker for ransomware attacks on hospitals (The Record) 
North Korean Military Hacker Indicted for String of US Attacks (Metacurity)
CrowdStrike says over 97% of Windows sensors back online (Reuters)
Threat Actors leveraging the recent CrowdStrike update outage (FortiGuard Labs) 
Cyber-security firm rejects $23bn Google takeover (BBC)
ECB's cyber security test shows 'room for improvement' for banks (Reuters)  
France launches large-scale operation to fight cyber spying ahead of Olympics (The Record) 
Israel Maneuvered to Prevent Disclosure of State Secrets amid WhatsApp vs NSO Lawsuit (Forbidden Stories)  
KOSA, COPPA 2.0 Likely to Pass U.S. Senate (Inside Privacy) 
A North Korean Hacker Tricked a US Security Vendor Into Hiring Him—and Immediately Tried to Hack Them (WIRED) 
North Korean Fake IT Worker FAQ (KnowBe4) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A North Korean hacker is indicted for major cyberattacks. CrowdStrike’s in recovery mode. Phishing thrives in the wake of BSOD chaos. Wiz spells out no to Alphabet's $23bn offer. France goes full clean-up. Israel's secret shield in spyware saga. KOSA and COPPA 2.0 promise safer surfing for kids. N2K’s CSO Rick Howard speaks with Steve Schmidt, CSO of Amazon, about the culture of security and what it means to the CSO role. And last but not least, hacking can happen to anyone.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On today’s guest slot, <a href="https://www.n2k.com/">N2K</a>’s CSO <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> speaks with <a href="https://www.linkedin.com/in/stephenschmidt1/">Steve Schmidt</a>, CSO of <a href="https://www.aboutamazon.com/">Amazon</a>, about the culture of security and what it means to the CSO role. They touch upon the SEC reporting requirements and how testing is never done. Rick and Steve caught up at <a href="https://reinforce.awsevents.com/">AWS re:Inforce 2024</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/us-indicts-north-korean-hacker-ransomware">US indicts alleged North Korean state hacker for ransomware attacks on hospitals</a> (The Record) </p><p><a href="https://www.metacurity.com/north-korean-military-hacker-indicted-for-string-of-us-attacks/">North Korean Military Hacker Indicted for String of US Attacks</a> (Metacurity)</p><p><a href="https://www.reuters.com/technology/cybersecurity/crowdstrike-says-over-97-windows-sensors-back-online-2024-07-25/">CrowdStrike says over 97% of Windows sensors back online</a> (Reuters)</p><p><a href="https://fortiguard.fortinet.com/threat-signal-report/5496">Threat Actors leveraging the recent CrowdStrike update outage</a> (FortiGuard Labs) </p><p><a href="https://www.bbc.com/news/articles/c3gdlng47k7o">Cyber-security firm rejects $23bn Google takeover</a> (BBC)</p><p><a href="https://www.reuters.com/technology/cybersecurity/ecbs-cyber-security-test-shows-room-improvement-banks-2024-07-26/">ECB's cyber security test shows 'room for improvement' for banks</a> (Reuters)  </p><p><a href="https://therecord.media/france-combat-cyber-spying-operation-olympics">France launches large-scale operation to fight cyber spying ahead of Olympics</a> (The Record) </p><p><a href="https://forbiddenstories.org/actualites_posts/israel-maneuvered-to-prevent-disclosure-of-state-secrets-amid-whatsapp-vs-nso-lawsuit/?ref=metacurity.com">Israel Maneuvered to Prevent Disclosure of State Secrets amid WhatsApp vs NSO Lawsuit</a> (Forbidden Stories)  </p><p><a href="https://www.insideprivacy.com/childrens-privacy/kosa-coppa-2-0-likely-to-pass-u-s-senate/">KOSA, COPPA 2.0 Likely to Pass U.S. Senate</a> (Inside Privacy) </p><p><a href="https://www.wired.com/story/north-korean-hacker-hired-ecurity-company-malware/">A North Korean Hacker Tricked a US Security Vendor Into Hiring Him—and Immediately Tried to Hack Them</a> (WIRED) </p><p><a href="https://blog.knowbe4.com/north-korean-fake-it-worker-faq">North Korean Fake IT Worker FAQ</a> (KnowBe4) </p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1814</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[05958208-b95e-11ee-adc6-5746af0f5a8b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8427866724.mp3?updated=1722020568" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Playing doctor with cyberattacks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2115/notes</link>
      <description>A North Korean hacking group targets healthcare, energy and finance. Leaked Leidos documents surface on the dark web. A Middle Eastern financial institution suffered a record-breaking DDoS attack. The latest tally on the fallout from the Crowdstrike outage. A cybersecurity audit of HHS reveals significant cloud security gaps. Docker patches a critical vulnerability for the second time. Google announced enhanced protections for Chrome users. In our latest Threat Vector segment, David Moulton speaks with Sama Manchanda, a Consultant at Unit 42, to explore the evolving landscape of social engineering attacks. If you’re heading to Paris for the Summer Olympics, smile for the AI cameras. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In this segment of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, engages with Sama Manchanda, a Consultant at Unit 42, to explore the evolving landscape of social engineering attacks, particularly focusing on vishing and smishing. 
As election season heats up, these threats are becoming more sophisticated, exploiting our reliance on mobile devices and psychological tactics. Sama provides expert insights into the latest trends, the psychological manipulations used in these attacks, and the specific challenges they pose to individuals and the democratic process. You can listen to Threat Vector every Thursday starting next week on the N2K CyberWire network. Check out the full episode with David and Sama here. 

Selected Reading
Mandiant: North Korean Hackers Targeting Healthcare, Energy (BankInfo Security)
Data pilfered from Pentagon IT supplier Leidos (The Register)
DDoS Attack Lasted for 6 Days, Record created for the duration of the Cyberattack (Cyber Security News)
Threat Actor Distributes Python-Based Information Stealer Using a Fake Falcon Sensor Update Lure (CrowdStrike)
Fortune 500 stands to lost $5bn plus from CrowdStrike incident (Computer Weekly)
HHS audit finds serious gaps in cloud security at agency office (SC Media)
Docker re-fixes a critical authorization bypass vulnerability (CSO Online)
Google Boosts Chrome Protections Against Malicious Files (SecurityWeek)
At The 2024 Summer Olympics, AI Is Watching You (WIRED) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 25 Jul 2024 20:10:00 -0000</pubDate>
      <itunes:title>Playing doctor with cyberattacks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2115</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A North Korean hacking group targets healthcare, energy and finance. Leaked Leidos documents surface on the dark web. A Middle Eastern financial institution suffered a record-breaking DDoS attack. The latest tally on the fallout from the Crowdstrike outage. A cybersecurity audit of HHS reveals significant cloud security gaps. Docker patches a critical vulnerability for the second time. Google announced enhanced protections for Chrome users. In our latest Threat Vector segment, David Moulton speaks with Sama Manchanda, a Consultant at Unit 42, to explore the evolving landscape of social engineering attacks. If you’re heading to Paris for the Summer Olympics, smile for the AI cameras. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In this segment of Threat Vector, David Moulton, Director of Thought Leadership at Unit 42, engages with Sama Manchanda, a Consultant at Unit 42, to explore the evolving landscape of social engineering attacks, particularly focusing on vishing and smishing. 
As election season heats up, these threats are becoming more sophisticated, exploiting our reliance on mobile devices and psychological tactics. Sama provides expert insights into the latest trends, the psychological manipulations used in these attacks, and the specific challenges they pose to individuals and the democratic process. You can listen to Threat Vector every Thursday starting next week on the N2K CyberWire network. Check out the full episode with David and Sama here. 

Selected Reading
Mandiant: North Korean Hackers Targeting Healthcare, Energy (BankInfo Security)
Data pilfered from Pentagon IT supplier Leidos (The Register)
DDoS Attack Lasted for 6 Days, Record created for the duration of the Cyberattack (Cyber Security News)
Threat Actor Distributes Python-Based Information Stealer Using a Fake Falcon Sensor Update Lure (CrowdStrike)
Fortune 500 stands to lost $5bn plus from CrowdStrike incident (Computer Weekly)
HHS audit finds serious gaps in cloud security at agency office (SC Media)
Docker re-fixes a critical authorization bypass vulnerability (CSO Online)
Google Boosts Chrome Protections Against Malicious Files (SecurityWeek)
At The 2024 Summer Olympics, AI Is Watching You (WIRED) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A North Korean hacking group targets healthcare, energy and finance. Leaked Leidos documents surface on the dark web. A Middle Eastern financial institution suffered a record-breaking DDoS attack. The latest tally on the fallout from the Crowdstrike outage. A cybersecurity audit of HHS reveals significant cloud security gaps. Docker patches a critical vulnerability for the second time. Google announced enhanced protections for Chrome users. In our latest Threat Vector segment, David Moulton speaks with Sama Manchanda, a Consultant at Unit 42, to explore the evolving landscape of social engineering attacks. If you’re heading to Paris for the Summer Olympics, smile for the AI cameras. </p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>In this segment of Threat Vector, <a href="https://www.linkedin.com/in/davidrmoulton">David Moulton</a>, Director of Thought Leadership at <a href="https://www.paloaltonetworks.com/">Unit 42</a>, engages with <a href="https://www.linkedin.com/in/samamanchanda/">Sama Manchanda</a>, a Consultant at Unit 42, to explore the evolving landscape of social engineering attacks, particularly focusing on vishing and smishing. </p><p>As election season heats up, these threats are becoming more sophisticated, exploiting our reliance on mobile devices and psychological tactics. Sama provides expert insights into the latest trends, the psychological manipulations used in these attacks, and the specific challenges they pose to individuals and the democratic process. You can listen to Threat Vector every Thursday starting next week on the N2K CyberWire network. Check out the full episode with David and Sama <a href="https://thecyberwire.com/podcasts/threat-vector/27/notes">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bankinfosecurity.com/mandiant-north-korean-hackers-targeting-healthcare-energy-a-25845">Mandiant: North Korean Hackers Targeting Healthcare, Energy</a> (BankInfo Security)</p><p><a href="https://www.theregister.com/2024/07/24/leidos_data_leak/">Data pilfered from Pentagon IT supplier Leidos</a> (The Register)</p><p><a href="https://cybersecuritynews.com/ddos-attack-lasted-6-days-record/">DDoS Attack Lasted for 6 Days, Record created for the duration of the Cyberattack</a> (Cyber Security News)</p><p><a href="https://www.crowdstrike.com/blog/threat-actor-distributes-python-based-information-stealer/">Threat Actor Distributes Python-Based Information Stealer Using a Fake Falcon Sensor Update Lure</a> (CrowdStrike)</p><p><a href="https://www.computerweekly.com/news/366598426/Fortune-500-stands-to-lost-5bn-plus-from-CrowdStrike-incident">Fortune 500 stands to lost $5bn plus from CrowdStrike incident</a> (Computer Weekly)</p><p><a href="https://www.scmagazine.com/news/hhs-audit-finds-serious-gaps-in-cloud-security-at-agency-office">HHS audit finds serious gaps in cloud security at agency office</a> (SC Media)</p><p><a href="https://www.csoonline.com/article/3477530/docker-re-fixes-a-critical-authorization-bypass-vulnerability.html">Docker re-fixes a critical authorization bypass vulnerability</a> (CSO Online)</p><p><a href="https://www.securityweek.com/google-boosts-chrome-protections-against-malicious-files/">Google Boosts Chrome Protections Against Malicious Files</a> (SecurityWeek)</p><p><a href="https://www.wired.com/story/at-the-olympics-ai-algorithms-are-watching-you/">At The 2024 Summer Olympics, AI Is Watching You</a> (WIRED) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1624</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[055c64dc-b95e-11ee-adc6-d70eeb69d4f4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2285734428.mp3?updated=1721935472" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ghost accounts haunt GitHub.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2114/notes</link>
      <description>Stargazer Goblin hosts malicious code repositories on GitHub. Crowdstrike blames buggy validations checks for last week’s major incident. The Breachforums database reveals threat actor OPSEC. Windows Hello for Business (WHfB) was found vulnerable to downgrade attacks. A medical center in the U.S. Virgin Islands is hit with ransomware. Interisle analyzes the phishing landscape. The FTC orders eight companies to explain algorithmic pricing. Meta cracks down on the Nigerian Yahoo Boys. A fake IT worker gets caught in the act. My conversation with Nic Fillingham and Wendy Zenone, co-hosts of Microsoft Security's "The Bluehat Podcast.” Researchers wonder if proving you’re human proves profitable for Google. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Nic Fillingham and Wendy Zenone, co-hosts of Microsoft Security's "The Bluehat Podcast," talking about what to expect on Bluehat on the N2K media network. You can catch the podcast every other Wednesday. Their latest episode launching today can be found here. 

Selected Reading
A Hacker ‘Ghost’ Network Is Quietly Spreading Malware on GitHub (WIRED)
CrowdStrike blames test software for taking down 8.5 million Windows machines (The Verge)
BreachForums v1 database leak is an OPSEC test for hackers (Bleeping Computer)
Goodbye? Attackers Can Bypass 'Windows Hello' Strong Authentication (Dark Reading)
Schneider Regional Medical Center hit by ransomware attack (Beyond Machines)
New phishing report names and shames TLDs, registrars (The Verge)
FTC Issues Orders to Eight Companies Seeking Information on Surveillance Pricing (FTC)
Meta bans 63,000 accounts belonging to Nigeria’s sextortionist Yahoo Boys (The Record)
How a North Korean Fake IT Worker Tried to Infiltrate Us (KnowBe4)
Forget security – Google's reCAPTCHA v2 is exploiting users for profit (The Register) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 24 Jul 2024 20:10:00 -0000</pubDate>
      <itunes:title>Ghost accounts haunt GitHub.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2114</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Stargazer Goblin hosts malicious code repositories on GitHub. Crowdstrike blames buggy validations checks for last week’s major incident. The Breachforums database reveals threat actor OPSEC. Windows Hello for Business (WHfB) was found vulnerable to downgrade attacks. A medical center in the U.S. Virgin Islands is hit with ransomware. Interisle analyzes the phishing landscape. The FTC orders eight companies to explain algorithmic pricing. Meta cracks down on the Nigerian Yahoo Boys. A fake IT worker gets caught in the act. My conversation with Nic Fillingham and Wendy Zenone, co-hosts of Microsoft Security's "The Bluehat Podcast.” Researchers wonder if proving you’re human proves profitable for Google. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Nic Fillingham and Wendy Zenone, co-hosts of Microsoft Security's "The Bluehat Podcast," talking about what to expect on Bluehat on the N2K media network. You can catch the podcast every other Wednesday. Their latest episode launching today can be found here. 

Selected Reading
A Hacker ‘Ghost’ Network Is Quietly Spreading Malware on GitHub (WIRED)
CrowdStrike blames test software for taking down 8.5 million Windows machines (The Verge)
BreachForums v1 database leak is an OPSEC test for hackers (Bleeping Computer)
Goodbye? Attackers Can Bypass 'Windows Hello' Strong Authentication (Dark Reading)
Schneider Regional Medical Center hit by ransomware attack (Beyond Machines)
New phishing report names and shames TLDs, registrars (The Verge)
FTC Issues Orders to Eight Companies Seeking Information on Surveillance Pricing (FTC)
Meta bans 63,000 accounts belonging to Nigeria’s sextortionist Yahoo Boys (The Record)
How a North Korean Fake IT Worker Tried to Infiltrate Us (KnowBe4)
Forget security – Google's reCAPTCHA v2 is exploiting users for profit (The Register) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Stargazer Goblin hosts malicious code repositories on GitHub. Crowdstrike blames buggy validations checks for last week’s major incident. The Breachforums database reveals threat actor OPSEC. Windows Hello for Business (WHfB) was found vulnerable to downgrade attacks. A medical center in the U.S. Virgin Islands is hit with ransomware. Interisle analyzes the phishing landscape. The FTC orders eight companies to explain algorithmic pricing. Meta cracks down on the Nigerian Yahoo Boys. A fake IT worker gets caught in the act. My conversation with Nic Fillingham and Wendy Zenone, co-hosts of Microsoft Security's "The Bluehat Podcast.” Researchers wonder if proving you’re human proves profitable for Google. </p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/nicfill/">Nic Fillingham</a> and <a href="https://www.linkedin.com/in/wendyzenone/">Wendy Zenone</a>, co-hosts of Microsoft Security's "<a href="https://thecyberwire.com/podcasts/the-bluehat-podcast">The Bluehat Podcast</a>," talking about what to expect on Bluehat on the N2K media network. You can catch the podcast every other Wednesday. Their latest episode launching today can be found <a href="https://thecyberwire.com/podcasts/the-bluehat-podcast/33/notes">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.wired.com/story/github-malware-spreading-network-stargazer-goblin/">A Hacker ‘Ghost’ Network Is Quietly Spreading Malware on GitHub</a> (WIRED)</p><p><a href="https://www.theverge.com/2024/7/24/24205020/crowdstrike-test-software-bug-windows-bsod-issue">CrowdStrike blames test software for taking down 8.5 million Windows machines</a> (The Verge)</p><p><a href="https://www.bleepingcomputer.com/news/security/breachforums-v1-database-leak-is-an-opsec-test-for-hackers/">BreachForums v1 database leak is an OPSEC test for hackers</a> (Bleeping Computer)</p><p><a href="https://www.darkreading.com/endpoint-security/goodbye-attackers-can-bypass-windows-hello-strong-authentication">Goodbye? Attackers Can Bypass 'Windows Hello' Strong Authentication</a> (Dark Reading)</p><p><a href="https://beyondmachines.net/event_details/schneider-regional-medical-center-hit-by-ransomware-attack-3-z-z-5-i/gD2P6Ple2L">Schneider Regional Medical Center hit by ransomware attack</a> (Beyond Machines)</p><p><a href="https://domainnamewire.com/2024/07/23/new-phishing-report-names-and-shames-tlds-registrars/">New phishing report names and shames TLDs, registrars </a>(The Verge)</p><p><a href="https://www.ftc.gov/news-events/news/press-releases/2024/07/ftc-issues-orders-eight-companies-seeking-information-surveillance-pricing">FTC Issues Orders to Eight Companies Seeking Information on Surveillance Pricing</a> (FTC)</p><p><a href="https://therecord.media/meta-bans-63000-accounts-sextortion-yahoo-boys-nigeria">Meta bans 63,000 accounts belonging to Nigeria’s sextortionist Yahoo Boys</a> (The Record)</p><p><a href="https://blog.knowbe4.com/how-a-north-korean-fake-it-worker-tried-to-infiltrate-us">How a North Korean Fake IT Worker Tried to Infiltrate Us</a> (KnowBe4)</p><p><a href="https://www.theregister.com/2024/07/24/googles_recaptchav2_labor/">Forget security – Google's reCAPTCHA v2 is exploiting users for profit</a> (The Register) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1992</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[05228924-b95e-11ee-adc6-27b6b6ff9607]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7123048332.mp3?updated=1721847212" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Don't mess with the NCA.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2113/notes</link>
      <description>UK law enforcement relieves DigitalStress. Congress summons Crowdstrike’s CEO to testify. FrostyGoop malware turned off the heat in Ukraine. EvilVideo is a zero-day exploit for Telegram. Daggerfly targets Hong Kong pro-democracy activists. Google has abandoned its plan to eliminate third-party cookies. The FCC settles with Tracfone Wireless over privacy and cybersecurity lapses. Wiz says no to Google and heads toward an IPO. N2K’s Brandon Karpf speaks with guest Justin Fanelli, Acting CTO of the US Navy, about streamlining the fleet’s innovation process. Target’s in-store AI misses the mark. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
N2K’s Brandon Karpf speaks with guest Justin Fanelli, Acting CTO of the US Navy, about the US Navy streamlining the innovation process. For some background, you can refer to this article. 

Additional resources: 


PEO Digital Innovation Adoption Kit 

Atlantic Council’s Commission on Defense Innovation Adoption


For industry looking to engage with PEO Digital: Industry Engagement



Selected Reading
Prolific DDoS Marketplace Shut Down by UK Law Enforcement (Infosecurity Magazine)
Congress Calls for Tech Outage Hearing to Grill CrowdStrike C.E.O. (The New York Times)
How Russia-Linked Malware Cut Heat to 600 Ukrainian Buildings in Deep Winter (WIRED)
Telegram zero-day for Android allowed malicious files to masquerade as videos (The Record)
Chinese Cyberespionage Group Expands Malware Arsenal (GovInfo Security)
Google rolls back decision to kill third-party cookies in Chrome (Bleeping Computer)
FCC, Tracfone Wireless reach $16M cyber and privacy settlement (CyberScoop)
Wiz rejects Google’s $23 billion takeover in favor of IPO (The Verge)
Target Employees Hate Its New AI Chatbot (Forbes)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Jul 2024 20:30:00 -0000</pubDate>
      <itunes:title>Don't mess with the NCA.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2113</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>UK law enforcement relieves DigitalStress. Congress summons Crowdstrike’s CEO to testify. FrostyGoop malware turned off the heat in Ukraine. EvilVideo is a zero-day exploit for Telegram. Daggerfly targets Hong Kong pro-democracy activists. Google has abandoned its plan to eliminate third-party cookies. The FCC settles with Tracfone Wireless over privacy and cybersecurity lapses. Wiz says no to Google and heads toward an IPO. N2K’s Brandon Karpf speaks with guest Justin Fanelli, Acting CTO of the US Navy, about streamlining the fleet’s innovation process. Target’s in-store AI misses the mark. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
N2K’s Brandon Karpf speaks with guest Justin Fanelli, Acting CTO of the US Navy, about the US Navy streamlining the innovation process. For some background, you can refer to this article. 

Additional resources: 


PEO Digital Innovation Adoption Kit 

Atlantic Council’s Commission on Defense Innovation Adoption


For industry looking to engage with PEO Digital: Industry Engagement



Selected Reading
Prolific DDoS Marketplace Shut Down by UK Law Enforcement (Infosecurity Magazine)
Congress Calls for Tech Outage Hearing to Grill CrowdStrike C.E.O. (The New York Times)
How Russia-Linked Malware Cut Heat to 600 Ukrainian Buildings in Deep Winter (WIRED)
Telegram zero-day for Android allowed malicious files to masquerade as videos (The Record)
Chinese Cyberespionage Group Expands Malware Arsenal (GovInfo Security)
Google rolls back decision to kill third-party cookies in Chrome (Bleeping Computer)
FCC, Tracfone Wireless reach $16M cyber and privacy settlement (CyberScoop)
Wiz rejects Google’s $23 billion takeover in favor of IPO (The Verge)
Target Employees Hate Its New AI Chatbot (Forbes)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>UK law enforcement relieves DigitalStress. Congress summons Crowdstrike’s CEO to testify. FrostyGoop malware turned off the heat in Ukraine. EvilVideo is a zero-day exploit for Telegram. Daggerfly targets Hong Kong pro-democracy activists. Google has abandoned its plan to eliminate third-party cookies. The FCC settles with Tracfone Wireless over privacy and cybersecurity lapses. Wiz says no to Google and heads toward an IPO. N2K’s Brandon Karpf speaks with guest Justin Fanelli, Acting CTO of the US Navy, about streamlining the fleet’s innovation process. Target’s in-store AI misses the mark. </p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.n2k.com/">N2K</a>’s <a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a> speaks with guest <a href="https://www.linkedin.com/in/justinfanelli/">Justin Fanelli</a>, Acting CTO of the <a href="https://www.navy.com/">US Navy</a>, about the US Navy streamlining the innovation process. For some background, you can refer to this <a href="https://www.afcea.org/signal-media/calling-innovators-navy-wants-you">article</a>. </p><p><br></p><h3>Additional resources: </h3><ul>
<li>
<a href="https://www.peodigital.navy.mil/Portals/96/Documents/PDFs/PEODigital_Innovation_Adoption_v3.pdf?ver=kfbqKeRadl-LcOJfRJ6TwQ%3d%3d">PEO Digital Innovation Adoption Kit</a> </li>
<li>Atlantic Council’s <a href="https://www.atlanticcouncil.org/programs/scowcroft-center-for-strategy-and-security/forward-defense/defense-innovation-adoption-commission/">Commission on Defense Innovation Adoption</a>
</li>
<li>For industry looking to engage with PEO Digital: <a href="https://www.peodigital.navy.mil/Industry/">Industry Engagement</a>
</li>
</ul><p><br></p><h2>Selected Reading</h2><p><a href="https://www.infosecurity-magazine.com/news/ddos-marketplace-shut-down-uk-law/">Prolific DDoS Marketplace Shut Down by UK Law Enforcement </a>(Infosecurity Magazine)</p><p><a href="https://www.nytimes.com/2024/07/22/technology/crowdstrike-outage-congress-hearing.html">Congress Calls for Tech Outage Hearing to Grill CrowdStrike C.E.O.</a> (The New York Times)</p><p><a href="https://www.wired.com/story/russia-ukraine-frostygoop-malware-heating-utility/">How Russia-Linked Malware Cut Heat to 600 Ukrainian Buildings in Deep Winter</a> (WIRED)</p><p><a href="https://therecord.media/telegram-zero-day-android-app-eset">Telegram zero-day for Android allowed malicious files to masquerade as videos</a> (The Record)</p><p><a href="https://www.govinfosecurity.com/chinese-cyberespionage-group-expands-malware-arsenal-a-25823">Chinese Cyberespionage Group Expands Malware Arsenal</a> (GovInfo Security)</p><p><a href="https://www.bleepingcomputer.com/news/security/google-rolls-back-decision-to-kill-third-party-cookies-in-chrome/">Google rolls back decision to kill third-party cookies in Chrome</a> (Bleeping Computer)</p><p><a href="https://cyberscoop.com/fcc-tracfone-wireless-reach-16m-cyber-and-privacy-settlement/">FCC, Tracfone Wireless reach $16M cyber and privacy settlement</a> (CyberScoop)</p><p><a href="https://www.theverge.com/2024/7/23/24204198/google-wiz-acquisition-called-off-23-billion-cloud-cybersecurity">Wiz rejects Google’s $23 billion takeover in favor of IPO</a> (The Verge)</p><p><a href="https://www.forbes.com/sites/cyrusfarivar/2024/07/23/target-employees-hate-its-new-ai-chatbot/">Target Employees Hate Its New AI Chatbot</a> (Forbes)</p><p><br></p><h2>Share your feedback.</h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1855</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5c0479a6-4927-11ef-b532-9f6b323689ae]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5631898742.mp3?updated=1721765592" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CrowdStrike and Microsoft battle blue screens across the globe.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2112/notes</link>
      <description>Mitigation continues on the global CrowdStrike outage. UK police arrest a suspected member of Scattered Spider. A scathing report from DHS says CISA ignored a directive to cut ties with a faulty contractor. Huntress finds SocGholish distributing AsyncRAT. Ransomware takes down the largest trial court in the U.S. A US regulator finds many major banks inadequately manage cyber risk. CISA adds three critical vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. Australian police forces combat SMS phishing attacks.  Our guest Chris Grove, Director of Cybersecurity Strategy at Nozomi Networks, shares insights on the challenges of protecting the upcoming Summer Olympics. Rick Howard looks at Cyber Threat Intelligence. Appreciating the value of internships.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
The 2024 Summer Olympics start later this week in Paris. Our guest Chris Grove, Director of Cybersecurity Strategy at Nozomi Networks, discusses how, in addition to consumer issues, the actual events, games and facilities at the Olympics could be at risk of an attack. 

This week on CSO Perspectives
This week on N2K Pro’s CSO Perspectives podcast, host and N2K CSO Rick Howard focus on “The current state of Cyber Threat Intelligence.” Hear a bit about it from Rick and Dave. You can find the full episode here if you are an N2K Pro subscriber, otherwise check out an extended sample here. 

Selected Reading
Special Report: IT Disruptions Continue as CrowdStrike Sees Crisis Receding (Metacurity)
Suspected Scattered Spider Member Arrested in UK (SecurityWeek)
DHS watchdog rebukes CISA and law enforcement training center for failing to protect data (The Record)
SocGholish malware used to spread AsyncRAT malware (Security Affairs)
California Officials Say Largest Trial Court in US Victim of Ransomware Attack (SecurityWeek)
Finance: Secret Bank Ratings Show US Regulator’s Concern on Handling Risk (Bloomberg)
U.S. CISA adds Adobe Commerce and Magento, SolarWinds Serv-U, and VMware vCenter Server bugs to its Known Exploited Vulnerabilities catalog (Security Affairs)
Australian police seize devices used to send over 318 million phishing texts - Security - Telco/ISP (iTnews)
Internships can be a gold mine for cybersecurity hiring (CSO Online)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 22 Jul 2024 20:10:00 -0000</pubDate>
      <itunes:title>CrowdStrike and Microsoft battle blue screens across the globe.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2112</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Mitigation continues on the global CrowdStrike outage. UK police arrest a suspected member of Scattered Spider. A scathing report from DHS says CISA ignored a directive to cut ties with a faulty contractor. Huntress finds SocGholish distributing AsyncRAT. Ransomware takes down the largest trial court in the U.S. A US regulator finds many major banks inadequately manage cyber risk. CISA adds three critical vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. Australian police forces combat SMS phishing attacks.  Our guest Chris Grove, Director of Cybersecurity Strategy at Nozomi Networks, shares insights on the challenges of protecting the upcoming Summer Olympics. Rick Howard looks at Cyber Threat Intelligence. Appreciating the value of internships.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
The 2024 Summer Olympics start later this week in Paris. Our guest Chris Grove, Director of Cybersecurity Strategy at Nozomi Networks, discusses how, in addition to consumer issues, the actual events, games and facilities at the Olympics could be at risk of an attack. 

This week on CSO Perspectives
This week on N2K Pro’s CSO Perspectives podcast, host and N2K CSO Rick Howard focus on “The current state of Cyber Threat Intelligence.” Hear a bit about it from Rick and Dave. You can find the full episode here if you are an N2K Pro subscriber, otherwise check out an extended sample here. 

Selected Reading
Special Report: IT Disruptions Continue as CrowdStrike Sees Crisis Receding (Metacurity)
Suspected Scattered Spider Member Arrested in UK (SecurityWeek)
DHS watchdog rebukes CISA and law enforcement training center for failing to protect data (The Record)
SocGholish malware used to spread AsyncRAT malware (Security Affairs)
California Officials Say Largest Trial Court in US Victim of Ransomware Attack (SecurityWeek)
Finance: Secret Bank Ratings Show US Regulator’s Concern on Handling Risk (Bloomberg)
U.S. CISA adds Adobe Commerce and Magento, SolarWinds Serv-U, and VMware vCenter Server bugs to its Known Exploited Vulnerabilities catalog (Security Affairs)
Australian police seize devices used to send over 318 million phishing texts - Security - Telco/ISP (iTnews)
Internships can be a gold mine for cybersecurity hiring (CSO Online)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Mitigation continues on the global CrowdStrike outage. UK police arrest a suspected member of Scattered Spider. A scathing report from DHS says CISA ignored a directive to cut ties with a faulty contractor. Huntress finds SocGholish distributing AsyncRAT. Ransomware takes down the largest trial court in the U.S. A US regulator finds many major banks inadequately manage cyber risk. CISA adds three critical vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog. Australian police forces combat SMS phishing attacks.  Our guest Chris Grove, Director of Cybersecurity Strategy at Nozomi Networks, shares insights on the challenges of protecting the upcoming Summer Olympics. Rick Howard looks at Cyber Threat Intelligence. Appreciating the value of internships.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>The <a href="https://olympics.com/en/paris-2024">2024 Summer Olympics</a> start later this week in Paris. Our guest <a href="https://www.linkedin.com/in/chris-grove-cissp-nsa-iam-nnce-192a0b/">Chris Grove</a>, Director of Cybersecurity Strategy at <a href="https://www.nozominetworks.com/">Nozomi Networks</a>, discusses how, in addition to consumer issues, the actual events, games and facilities at the Olympics could be at risk of an attack. </p><p><br></p><h2>This week on CSO Perspectives</h2><p>This week on N2K Pro’s <a href="https://thecyberwire.com/podcasts/cso-perspectives">CSO Perspectives podcast</a>, host and <a href="https://www.n2k.com/">N2K</a> CSO <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> focus on “The current state of Cyber Threat Intelligence.” Hear a bit about it from Rick and Dave. You can find the full episode <a href="https://thecyberwire.com/podcasts/cso-perspectives/115/notes">here</a> if you are an N2K Pro subscriber, otherwise check out an extended sample <a href="https://thecyberwire.com/podcasts/cso-perspectives-public/93/notes">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.metacurity.com/special-report-it-disruptions-continue-as-crowdstrike-sees-crisis-receding/">Special Report: IT Disruptions Continue as CrowdStrike Sees Crisis Receding</a> (Metacurity)</p><p><a href="https://www.securityweek.com/suspected-scattered-spider-member-arrested-in-uk/">Suspected Scattered Spider Member Arrested in UK</a> (SecurityWeek)</p><p><a href="https://therecord.media/dhs-inspector-general-report-cisa-data-security">DHS watchdog rebukes CISA and law enforcement training center for failing to protect data</a> (The Record)</p><p><a href="https://securityaffairs.com/166030/malware/socgholish-used-deliver-asyncrat.html">SocGholish malware used to spread AsyncRAT malware</a> (Security Affairs)</p><p><a href="https://www.securityweek.com/california-officials-say-largest-trial-court-in-us-victim-of-ransomware-attack/">California Officials Say Largest Trial Court in US Victim of Ransomware Attack </a>(SecurityWeek)</p><p><a href="https://www.bloomberg.com/news/articles/2024-07-21/secret-bank-ratings-show-us-regulator-s-concern-on-handling-risk">Finance: Secret Bank Ratings Show US Regulator’s Concern on Handling Risk</a> (Bloomberg)</p><p><a href="https://securityaffairs.com/165981/hacking/u-s-cisa-adds-adobe-commerce-and-magento-solarwinds-serv-u-and-vmware-vcenter-server-bugs-to-its-known-exploited-vulnerabilities-catalog.html">U.S. CISA adds Adobe Commerce and Magento, SolarWinds Serv-U, and VMware vCenter Server bugs to its Known Exploited Vulnerabilities catalog</a> (Security Affairs)</p><p><a href="https://www.itnews.com.au/news/australian-police-seize-devices-used-to-send-over-318-million-phishing-texts-610003">Australian police seize devices used to send over 318 million phishing texts - Security - Telco/ISP</a> (iTnews)</p><p><a href="https://www.csoonline.com/article/2518871/internships-can-be-a-gold-mine-for-cybersecurity-hiring.html">Internships can be a gold mine for cybersecurity hiring</a> (CSO Online)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2065</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04b25834-b95e-11ee-adc6-c3e1e2b592db]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3942908149.mp3?updated=1721676244" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The current state of Cyber Threat Intelligence.</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/93/notes</link>
      <description>Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of Cyber Threat Intelligence with CyberWire Hash Table guest John Hultquist, Mandiant’s Chief Analyst.

References:
Andy Greenberg, 2022. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book]. Goodreads.
Josephine Wolff, October 2023. How Hackers Swindled Vegas [Explainer]. Slate.
Rick Howard, 2023. Cybersecurity First Principles Book Appendix [Book Support Page]. N2K Cyberwire.
Staff, September 2023. mWISE Conference 2023 [Conference Website]. Mandiant.
Staff, n.d. VirusTotal Submissions Page [Landing Zone]. VirusTotal.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 22 Jul 2024 06:00:00 -0000</pubDate>
      <itunes:title>The current state of Cyber Threat Intelligence.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>93</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of Cyber Threat Intelligence with CyberWire Hash Table guest John Hultquist, Mandiant’s Chief Analyst.

References:
Andy Greenberg, 2022. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book]. Goodreads.
Josephine Wolff, October 2023. How Hackers Swindled Vegas [Explainer]. Slate.
Rick Howard, 2023. Cybersecurity First Principles Book Appendix [Book Support Page]. N2K Cyberwire.
Staff, September 2023. mWISE Conference 2023 [Conference Website]. Mandiant.
Staff, n.d. VirusTotal Submissions Page [Landing Zone]. VirusTotal.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of Cyber Threat Intelligence with CyberWire Hash Table guest John Hultquist, Mandiant’s Chief Analyst.</p><p><br></p><h2>References:</h2><p><a href="https://www.goodreads.com/book/show/60462182-tracers-in-the-dark">Andy Greenberg, 2022. Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency [Book]. Goodreads.</a></p><p><a href="https://slate.com/technology/2023/10/mgm-caesars-casinos-vegas-hacks-ransomware-gambling.html">Josephine Wolff, October 2023. How Hackers Swindled Vegas [Explainer]. Slate.</a></p><p><a href="https://www.n2k.com/cybersecurityfirstprinciplesbook">Rick Howard, 2023. Cybersecurity First Principles Book Appendix [Book Support Page]. N2K Cyberwire.</a></p><p><a href="https://mwise.mandiant.com/conf23">Staff, September 2023. mWISE Conference 2023 [Conference Website]. Mandiant.</a></p><p><a href="https://www.virustotal.com/gui/home/search">Staff, n.d. VirusTotal Submissions Page [Landing Zone]. VirusTotal.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1006</itunes:duration>
      <guid isPermaLink="false"><![CDATA[c603b97a-45e9-11ef-80c3-03b037d68b30]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2403567078.mp3?updated=1721406769" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: James Hadley: Spend time on what interests you. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/25/notes</link>
      <description>Founder and CEO of Immersive Labs James Hadley takes us through his career path from university to cybersecurity startup. James tells us about his first computer and how he liked to push it to its limits and then some. He joined GCHQ after college and consulted across government departments. Teaching in GCHQ's cyber summer school was where James felt a shift in his career. As a company founder, he shares that he is very driven, very fast and also very caring. James offers advice to those looking to get into the industry recommending they chase what interests them rather than certifications. We thank James for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 21 Jul 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: James Hadley: Spend time on what interests you. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>25</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Founder and CEO of Immersive Labs James Hadley takes us through his career path from university to cybersecurity startup. James tells us about his first computer and how he liked to push it to its limits and then some. He joined GCHQ after college and consulted across government departments. Teaching in GCHQ's cyber summer school was where James felt a shift in his career. As a company founder, he shares that he is very driven, very fast and also very caring. James offers advice to those looking to get into the industry recommending they chase what interests them rather than certifications. We thank James for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Founder and CEO of Immersive Labs James Hadley takes us through his career path from university to cybersecurity startup. James tells us about his first computer and how he liked to push it to its limits and then some. He joined GCHQ after college and consulted across government departments. Teaching in GCHQ's cyber summer school was where James felt a shift in his career. As a company founder, he shares that he is very driven, very fast and also very caring. James offers advice to those looking to get into the industry recommending they chase what interests them rather than certifications. We thank James for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>424</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[203bd500-45d9-11ef-8c50-a7564f0749ab]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1494306868.mp3?updated=1721398733" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Olympic scammers go for gold. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/338/notes</link>
      <description>This week, we are joined by Selena Larson, Staff Threat Researcher, Lead Intelligence Analysis and Strategy at Proofpoint, as well as host of the "Only Malware in the Building" podcast, as she is discussing their research on "Scammers Create Fraudulent Olympics Ticketing Websites." Proofpoint recently identified a fraudulent website selling fake tickets to the Paris 2024 Summer Olympics and quickly suspended the domain. 
This site was among many identified by the French Gendarmerie Nationale and Olympics partners, who have shut down 51 of 338 fraudulent websites, with 140 receiving formal notices from law enforcement.
The research can be found here:
Security Brief: Scammers Create Fraudulent Olympics Ticketing Websites

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Jul 2024 07:00:00 -0000</pubDate>
      <itunes:title>Olympic scammers go for gold. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>338</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, we are joined by Selena Larson, Staff Threat Researcher, Lead Intelligence Analysis and Strategy at Proofpoint, as well as host of the "Only Malware in the Building" podcast, as she is discussing their research on "Scammers Create Fraudulent Olympics Ticketing Websites." Proofpoint recently identified a fraudulent website selling fake tickets to the Paris 2024 Summer Olympics and quickly suspended the domain. 
This site was among many identified by the French Gendarmerie Nationale and Olympics partners, who have shut down 51 of 338 fraudulent websites, with 140 receiving formal notices from law enforcement.
The research can be found here:
Security Brief: Scammers Create Fraudulent Olympics Ticketing Websites

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by Selena Larson, Staff Threat Researcher, Lead Intelligence Analysis and Strategy at Proofpoint, as well as host of the "Only Malware in the Building" podcast, as she is discussing their research on "Scammers Create Fraudulent Olympics Ticketing Websites." Proofpoint recently identified a fraudulent website selling fake tickets to the Paris 2024 Summer Olympics and quickly suspended the domain. </p><p>This site was among many identified by the French Gendarmerie Nationale and Olympics partners, who have shut down 51 of 338 fraudulent websites, with 140 receiving formal notices from law enforcement.</p><p>The research can be found here:</p><ul><li><a href="https://www.proofpoint.com/uk/blog/threat-insight/security-brief-scammers-create-fraudulent-olympics-ticketing-websites">Security Brief: Scammers Create Fraudulent Olympics Ticketing Websites</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1290</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7e050ce-45f8-11ef-8724-47c6d8602584]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6377076363.mp3?updated=1721412914" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybersecurity snow day.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2111/notes</link>
      <description>A Crowdstrike update takes down IT systems worldwide. A U.S. District Court judge dismissed most charges against SolarWinds. Sophos examines the ransomware threat to the energy sector. European web hosting companies suspend Doppelgänger propaganda. An Australian digital prescription services provider confirms a ransomware attack affecting nearly 13 million. A pair of Lockbit operators plead guilty. N2K’s CSO Rick Howard speaks with AWS’ CISO Chris Betz about strong security cultures and AI. A look inside the world’s largest live-fire cyber-defense exercise. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guests
Dave is joined by Andy Ellis, to discuss today’s top story on the CrowdStrike-induced Microsoft outage.
N2K’s CSO Rick Howard recently caught up with AWS’ CISO Chris Betz at the AWS re:Inforce 2024 event. They  discuss strong security cultures and AI. You can watch Chris’ keynote from the event here. Read Chris’ blog post, “How the unique culture of security at AWS makes a difference.”

Selected Reading
Huge Microsoft Outage Linked to CrowdStrike Takes Down Computers Around the World (WIRED)
Counting the Costs of the Microsoft-CrowdStrike Outage (The New York Times)
Major Microsoft 365 outage caused by Azure configuration change (Bleeping Computer)
Most of SolarWinds hacking suit filed by SEC dismissed (SC Magazine)
Ransomware Remains a Major Threat to Energy (BankInfoSecurity)
Investigation prompts European hosting companies to suspend accounts linked to Russian disinfo (The Record)
MediSecure Data Breach Impacts 12.9 Million Individuals (SecurityWeek)
Russians plead guilty to involvement in LockBit ransomware attacks (Bleeping Computer)
Inside the world’s largest ‘live-fire’ cyber-defense exercise (CSO Online)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 19 Jul 2024 20:10:00 -0000</pubDate>
      <itunes:title>Cybersecurity snow day.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2111</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A Crowdstrike update takes down IT systems worldwide. A U.S. District Court judge dismissed most charges against SolarWinds. Sophos examines the ransomware threat to the energy sector. European web hosting companies suspend Doppelgänger propaganda. An Australian digital prescription services provider confirms a ransomware attack affecting nearly 13 million. A pair of Lockbit operators plead guilty. N2K’s CSO Rick Howard speaks with AWS’ CISO Chris Betz about strong security cultures and AI. A look inside the world’s largest live-fire cyber-defense exercise. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guests
Dave is joined by Andy Ellis, to discuss today’s top story on the CrowdStrike-induced Microsoft outage.
N2K’s CSO Rick Howard recently caught up with AWS’ CISO Chris Betz at the AWS re:Inforce 2024 event. They  discuss strong security cultures and AI. You can watch Chris’ keynote from the event here. Read Chris’ blog post, “How the unique culture of security at AWS makes a difference.”

Selected Reading
Huge Microsoft Outage Linked to CrowdStrike Takes Down Computers Around the World (WIRED)
Counting the Costs of the Microsoft-CrowdStrike Outage (The New York Times)
Major Microsoft 365 outage caused by Azure configuration change (Bleeping Computer)
Most of SolarWinds hacking suit filed by SEC dismissed (SC Magazine)
Ransomware Remains a Major Threat to Energy (BankInfoSecurity)
Investigation prompts European hosting companies to suspend accounts linked to Russian disinfo (The Record)
MediSecure Data Breach Impacts 12.9 Million Individuals (SecurityWeek)
Russians plead guilty to involvement in LockBit ransomware attacks (Bleeping Computer)
Inside the world’s largest ‘live-fire’ cyber-defense exercise (CSO Online)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Crowdstrike update takes down IT systems worldwide. A U.S. District Court judge dismissed most charges against SolarWinds. Sophos examines the ransomware threat to the energy sector. European web hosting companies suspend Doppelgänger propaganda. An Australian digital prescription services provider confirms a ransomware attack affecting nearly 13 million. A pair of Lockbit operators plead guilty. N2K’s CSO Rick Howard speaks with AWS’ CISO Chris Betz about strong security cultures and AI. A look inside the world’s largest live-fire cyber-defense exercise.<strong> </strong></p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guests</h2><p>Dave is joined by <a href="https://www.linkedin.com/in/csoandy/">Andy Ellis</a>, to discuss today’s top story on the CrowdStrike-induced Microsoft outage.</p><p><a href="https://www.n2k.com/">N2K</a>’s CSO <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> recently caught up with <a href="https://aws.amazon.com/security/">AWS</a>’ CISO <a href="https://www.linkedin.com/in/chris-betz-903b739b/">Chris Betz</a> at the AWS <a href="https://reinforce.awsevents.com/">re:Inforce 2024</a> event. They  discuss strong security cultures and AI. You can watch Chris’ keynote from the event <a href="https://reinforce.awsevents.com/on-demand/?trk=direct">here</a>. Read Chris’ blog post, “<a href="https://aws.amazon.com/blogs/security/how-the-unique-culture-of-security-at-aws-makes-a-difference/">How the unique culture of security at AWS makes a difference.</a>”</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.wired.com/story/microsoft-windows-outage-crowdstrike-global-it-probems/">Huge Microsoft Outage Linked to CrowdStrike Takes Down Computers Around the World </a>(WIRED)</p><p><a href="https://www.nytimes.com/2024/07/19/business/dealbook/tech-outage-crowdstrike-microsoft.html">Counting the Costs of the Microsoft-CrowdStrike Outage</a> (The New York Times)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/major-microsoft-365-outage-caused-by-azure-configuration-change/">Major Microsoft 365 outage caused by Azure configuration change</a> (Bleeping Computer)</p><p><a href="https://www.scmagazine.com/brief/most-of-solarwinds-hacking-suit-filed-by-sec-dismissed">Most of SolarWinds hacking suit filed by SEC dismissed</a> (SC Magazine)</p><p><a href="https://www.govinfosecurity.com/blogs/ransomware-remains-major-threat-to-energy-p-3671">Ransomware Remains a Major Threat to Energy</a> (BankInfoSecurity)</p><p><a href="https://therecord.media/european-web-hosting-companies-doppelganger-disinformation-shutdowns">Investigation prompts European hosting companies to suspend accounts linked to Russian disinfo</a> (The Record)</p><p><a href="https://www.securityweek.com/medisecure-data-breach-impacts-12-9-million-individuals/">MediSecure Data Breach Impacts 12.9 Million Individuals</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/russians-plead-guilty-to-involvement-in-lockbit-ransomware-attacks/">Russians plead guilty to involvement in LockBit ransomware attacks</a> (Bleeping Computer)</p><p><a href="https://www.csoonline.com/article/2518328/inside-the-worlds-largest-live-fire-cyber-defense-exercise.html">Inside the world’s largest ‘live-fire’ cyber-defense exercise</a> (CSO Online)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1905</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0479c5fa-b95e-11ee-adc6-23fbf6a6fabd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2942546184.mp3?updated=1721413624" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SSM On-Prem Flaw is a 10/10 disaster.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2110/notes</link>
      <description>Cisco has identified a critical security flaw in its SSM On-prem. The world's largest recreational boat and yacht retailer reports a data breach. The UK’s NHS warns of critically low blood stocks after a ransomware attack. Port Shadow enables VPN person in the middle attacks. Ivanti patches several high-severity vulnerabilities. FIN7 is advertising a security evasion tool on underground forums. Indian crypto exchange WazirX sees $230 million in assets suspiciously transferred. Wiz documents vulnerabilities in SAP AI Core. DDoS for hire team faces jail time. Guest Tomislav Pericin, Founder and Chief Software Architect of ReversingLabs, joins us to discuss their "Free Resource to Conduct Risk Assessments on Open-Source Software." Playing red-light green-light with traffic light controllers. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Tomislav Pericin, Founder and Chief Software Architect of ReversingLabs, joins us to discuss their "Free Resource to Conduct Risk Assessments on Open-Source Software." 

Selected Reading
Cisco discloses a 10.0 CVSS rating vulnerability in SSM On-Prem (Stack Diary)
Yacht giant MarineMax data breach impacts over 123,000 people (Bleeping Computer)
UK national blood stocks in 'very fragile' state following ransomware attack (The Record)
Port Shadow Attack Allows VPN Traffic Interception, Redirection (SecurityWeek)
Ivanti Issues Hotfix for High-Severity Endpoint Manager Vulnerability (SecurityWeek)
Cybercrime group FIN7 advertises new EDR bypass tool on hacking forums (Security Affairs)
WazirX reports security breach at crypto exchange following $230 million 'suspicious transfer' (TechCrunch)
SAPwned: SAP AI vulnerabilities expose customers’ cloud environments and private AI artifacts (Wiz Blog)
Jail time for operators of DDoS service used to crash thousands of devices (Cybernews)
Hackers could create traffic jams thanks to flaw in traffic light controller, researcher says (TechCrunch)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 18 Jul 2024 20:10:00 -0000</pubDate>
      <itunes:title>SSM On-Prem Flaw is a 10/10 disaster.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2110</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Cisco has identified a critical security flaw in its SSM On-prem. The world's largest recreational boat and yacht retailer reports a data breach. The UK’s NHS warns of critically low blood stocks after a ransomware attack. Port Shadow enables VPN person in the middle attacks. Ivanti patches several high-severity vulnerabilities. FIN7 is advertising a security evasion tool on underground forums. Indian crypto exchange WazirX sees $230 million in assets suspiciously transferred. Wiz documents vulnerabilities in SAP AI Core. DDoS for hire team faces jail time. Guest Tomislav Pericin, Founder and Chief Software Architect of ReversingLabs, joins us to discuss their "Free Resource to Conduct Risk Assessments on Open-Source Software." Playing red-light green-light with traffic light controllers. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Tomislav Pericin, Founder and Chief Software Architect of ReversingLabs, joins us to discuss their "Free Resource to Conduct Risk Assessments on Open-Source Software." 

Selected Reading
Cisco discloses a 10.0 CVSS rating vulnerability in SSM On-Prem (Stack Diary)
Yacht giant MarineMax data breach impacts over 123,000 people (Bleeping Computer)
UK national blood stocks in 'very fragile' state following ransomware attack (The Record)
Port Shadow Attack Allows VPN Traffic Interception, Redirection (SecurityWeek)
Ivanti Issues Hotfix for High-Severity Endpoint Manager Vulnerability (SecurityWeek)
Cybercrime group FIN7 advertises new EDR bypass tool on hacking forums (Security Affairs)
WazirX reports security breach at crypto exchange following $230 million 'suspicious transfer' (TechCrunch)
SAPwned: SAP AI vulnerabilities expose customers’ cloud environments and private AI artifacts (Wiz Blog)
Jail time for operators of DDoS service used to crash thousands of devices (Cybernews)
Hackers could create traffic jams thanks to flaw in traffic light controller, researcher says (TechCrunch)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cisco has identified a critical security flaw in its SSM On-prem. The world's largest recreational boat and yacht retailer reports a data breach. The UK’s NHS warns of critically low blood stocks after a ransomware attack. Port Shadow enables VPN person in the middle attacks. Ivanti patches several high-severity vulnerabilities. FIN7 is advertising a security evasion tool on underground forums. Indian crypto exchange WazirX sees $230 million in assets suspiciously transferred. Wiz documents vulnerabilities in SAP AI Core. DDoS for hire team faces jail time. Guest Tomislav Pericin, Founder and Chief Software Architect of ReversingLabs, joins us to discuss their "Free Resource to Conduct Risk Assessments on Open-Source Software." Playing red-light green-light with traffic light controllers. </p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/tomislav-peri%C4%8Din-746064286/">Tomislav Pericin</a>, Founder and Chief Software Architect of <a href="https://www.reversinglabs.com/">ReversingLabs</a>, joins us to discuss their "<a href="https://www.reversinglabs.com/newsroom/press-releases/reversinglabs-launches-spectra-assure-community-the-largest-free-resource-of-comprehensive-risk-assessments-on-open-source-software">Free Resource to Conduct Risk Assessments on Open-Source Software.</a>"<em> </em></p><p><br></p><h2>Selected Reading</h2><p><a href="https://stackdiary.com/cisco-discloses-cve-2024-20419-for-ssm-on-prem/">Cisco discloses a 10.0 CVSS rating vulnerability in SSM On-Prem</a> (Stack Diary)</p><p><a href="https://www.bleepingcomputer.com/news/security/yacht-giant-marinemax-data-breach-impacts-over-123-000-people/">Yacht giant MarineMax data breach impacts over 123,000 people</a> (Bleeping Computer)</p><p><a href="https://therecord.media/uk-blood-stocks-ransomware-attack-london-hospitals">UK national blood stocks in 'very fragile' state following ransomware attack</a> (The Record)</p><p><a href="https://www.securityweek.com/port-shadow-attack-allows-vpn-traffic-interception-redirection/">Port Shadow Attack Allows VPN Traffic Interception, Redirection </a>(SecurityWeek)</p><p><a href="https://www.securityweek.com/ivanti-issues-hotfix-for-high-severity-endpoint-manager-vulnerability/">Ivanti Issues Hotfix for High-Severity Endpoint Manager Vulnerability</a><a href="https://www.securityweek.com/port-shadow-attack-allows-vpn-traffic-interception-redirection/"> </a>(SecurityWeek)</p><p><a href="https://securityaffairs.com/165863/cyber-crime/fin7-advertising-security-evasion.html">Cybercrime group FIN7 advertises new EDR bypass tool on hacking forums</a> (Security Affairs)</p><p><a href="https://techcrunch.com/2024/07/18/indias-wazirx-confirms-security-breach-after-230-million-suspicious-transfer/">WazirX reports security breach at crypto exchange following $230 million 'suspicious transfer'</a> (TechCrunch)</p><p><a href="https://www.wiz.io/blog/sapwned-sap-ai-vulnerabilities-ai-security">SAPwned: SAP AI vulnerabilities expose customers’ cloud environments and private AI artifacts</a> (Wiz Blog)</p><p><a href="https://cybernews.com/cybercrime/astrostress-ddos-service-operators-sentenced">Jail time for operators of DDoS service used to crash thousands of devices</a> (Cybernews)</p><p><a href="https://techcrunch.com/2024/07/18/hackers-could-create-traffic-jams-thanks-to-flaw-in-traffic-light-controller-researcher-says/">Hackers could create traffic jams thanks to flaw in traffic light controller, researcher says</a> (TechCrunch)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1619</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[044190c2-b95e-11ee-adc6-e31b0599ed40]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8422165595.mp3?updated=1721327191" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Criminal networks crumble.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2109/notes</link>
      <description>Interpol pursues West African cybercrime groups. Bassett Furniture shuts down manufacturing following a ransomware attack. A gastroenterologist group notifies patients of a data breach. An Apache HugeGraph flaw is being actively exploited. Octo Tempest updates its toolkit. Satori uncovers evil twin campaigns on Google Play. The cost of the Change Healthcare breach crosses the two billion dollar mark. Cybersecurity venture funding saw a surge last quarter. Cyber regulatory agencies face legal challenges. On our Industry Insights segment, Trevor Hilligoss, Vice President of SpyCloud Labs at SpyCloud, joins us to talk about exploring the intricate world of cybercrime enablement services. Fighting disinformation is easier said than done. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Insights segment, Trevor Hilligoss, Vice President of SpyCloud Labs at SpyCloud, joins Dave to talk about exploring the intricate world of cybercrime enablement services. You can find out more about SpyCloud’s “How the Threat Actors at SpaxMedia Distribute Malware Globally” here.  

Selected Reading
Global Police Swoop on Black Axe Cybercrime Syndicate (Infosecurity Magazine)
Furniture giant shuts down manufacturing facilities after ransomware attack (The Record)
MNGI Digestive Health Data Breach Impacts 765,000 Individuals (SecurityWeek)
Apache HugeGraph Vulnerability Exploited in Wild (SecurityWeek)
Octo Tempest group adds RansomHub and Qilin ransomware to its arsenal (Security Affairs)
Report Identifies More Than 250 Evil Twin Mobile Applications (Security Boulevard)
Change Healthcare's Breach Costs Could Reach $2.5 Billion (GovInfo Security)
Cybersecurity Funding Jumps 144% In Q2 (Crunchbase)
The US Supreme Court Kneecapped US Cyber Strategy (WIRED)
Even the Best Tools to Fight Disinformation Are Not Enough (The New York Times) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 17 Jul 2024 20:10:00 -0000</pubDate>
      <itunes:title>Criminal networks crumble.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2109</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Interpol pursues West African cybercrime groups. Bassett Furniture shuts down manufacturing following a ransomware attack. A gastroenterologist group notifies patients of a data breach. An Apache HugeGraph flaw is being actively exploited. Octo Tempest updates its toolkit. Satori uncovers evil twin campaigns on Google Play. The cost of the Change Healthcare breach crosses the two billion dollar mark. Cybersecurity venture funding saw a surge last quarter. Cyber regulatory agencies face legal challenges. On our Industry Insights segment, Trevor Hilligoss, Vice President of SpyCloud Labs at SpyCloud, joins us to talk about exploring the intricate world of cybercrime enablement services. Fighting disinformation is easier said than done. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Insights segment, Trevor Hilligoss, Vice President of SpyCloud Labs at SpyCloud, joins Dave to talk about exploring the intricate world of cybercrime enablement services. You can find out more about SpyCloud’s “How the Threat Actors at SpaxMedia Distribute Malware Globally” here.  

Selected Reading
Global Police Swoop on Black Axe Cybercrime Syndicate (Infosecurity Magazine)
Furniture giant shuts down manufacturing facilities after ransomware attack (The Record)
MNGI Digestive Health Data Breach Impacts 765,000 Individuals (SecurityWeek)
Apache HugeGraph Vulnerability Exploited in Wild (SecurityWeek)
Octo Tempest group adds RansomHub and Qilin ransomware to its arsenal (Security Affairs)
Report Identifies More Than 250 Evil Twin Mobile Applications (Security Boulevard)
Change Healthcare's Breach Costs Could Reach $2.5 Billion (GovInfo Security)
Cybersecurity Funding Jumps 144% In Q2 (Crunchbase)
The US Supreme Court Kneecapped US Cyber Strategy (WIRED)
Even the Best Tools to Fight Disinformation Are Not Enough (The New York Times) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Interpol pursues West African cybercrime groups. Bassett Furniture shuts down manufacturing following a ransomware attack. A gastroenterologist group notifies patients of a data breach. An Apache HugeGraph flaw is being actively exploited. Octo Tempest updates its toolkit. Satori uncovers evil twin campaigns on Google Play. The cost of the Change Healthcare breach crosses the two billion dollar mark. Cybersecurity venture funding saw a surge last quarter. Cyber regulatory agencies face legal challenges. On our Industry Insights segment, Trevor Hilligoss, Vice President of SpyCloud Labs at SpyCloud, joins us to talk about exploring the intricate world of cybercrime enablement services. Fighting disinformation is easier said than done.<strong> </strong></p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Insights segment, <a href="https://www.linkedin.com/in/thilligoss/">Trevor Hilligoss</a>, Vice President of <a href="https://spycloud.com/resources/spycloud-labs/">SpyCloud Labs</a> at <a href="https://spycloud.com/">SpyCloud</a>, joins Dave to talk about exploring the intricate world of cybercrime enablement services. You can find out more about SpyCloud’s “How the Threat Actors at SpaxMedia Distribute Malware Globally” <a href="https://spycloud.com/blog/spaxmedia-threat-actors-malware-distribution/">here</a>.  </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.infosecurity-magazine.com/news/global-police-black-axe-cybercrime/">Global Police Swoop on Black Axe Cybercrime Syndicate</a> (Infosecurity Magazine)</p><p><a href="https://therecord.media/furniture-giant-manufacturing-shut-down-cyberattack">Furniture giant shuts down manufacturing facilities after ransomware attack</a> (The Record)</p><p><a href="https://www.securityweek.com/mngi-digestive-health-data-breach-impacts-765000-individuals/">MNGI Digestive Health Data Breach Impacts 765,000 Individuals</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/apache-hugegraph-vulnerability-exploited-in-wild/">Apache HugeGraph Vulnerability Exploited in Wild</a> (SecurityWeek)</p><p><a href="https://securityaffairs.com/165811/cyber-crime/octo-tempest-ransomhub-qilin-ransomware.html">Octo Tempest group adds RansomHub and Qilin ransomware to its arsenal</a> (Security Affairs)</p><p><a href="https://securityboulevard.com/2024/07/report-identifies-more-than-250-evil-twin-mobile-applications/">Report Identifies More Than 250 Evil Twin Mobile Applications</a> (Security Boulevard)</p><p><a href="https://www.govinfosecurity.com/change-healthcares-breach-costs-could-reach-25-billion-a-25786">Change Healthcare's Breach Costs Could Reach $2.5 Billion</a> (GovInfo Security)</p><p><a href="https://news.crunchbase.com/cybersecurity/cybersecurity-funding-venture-wiz-ai-cyera/">Cybersecurity Funding Jumps 144% In Q2</a> (Crunchbase)</p><p><a href="https://www.wired.com/story/us-supreme-court-chevron-deference-cybersecurity-policy/">The US Supreme Court Kneecapped US Cyber Strategy</a> (WIRED)</p><p><a href="https://www.nytimes.com/2024/07/11/technology/disinformation-tools.html">Even the Best Tools to Fight Disinformation Are Not Enough</a> (The New York Times) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1788</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04093f2e-b95e-11ee-adc6-cf3055ea5ddc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1076876235.mp3?updated=1721244862" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Squarespace's square off with hijacked domains.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2108/notes</link>
      <description>Some Squarespace users see their domains hijacked. Kaspersky Lab is shutting down US operations. BackPack APKs break malware analysis tools. Hackers use 7zip files to deliver Poco RAT malware. CISA’s red-teaming reveals security failings at an unnamed federal agency. Microsoft fixes an Outlook bug triggering false security alerts. Switzerland mandates open source software in the public sector. On our Industry Voices segment, N2K’s Rick Howard speaks with Alex Lawrence and Matt Stamper from Sysdig about their 555 Cloud Security Benchmark.  Bellingcat sleuths pinpoint an alleged cartel member. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, N2K’s Rick Howard speaks with Alex Lawrence and Matt Stamper from Sysdig about their 555 Cloud Security Benchmark. Learn more about the /555 benchmark.

Selected Reading
Researchers: Weak Security Defaults Enabled Squarespace Domains Hijacks (Krebs on Security)
Kaspersky Lab Closing U.S. Division; Laying Off Workers (Zero Day)
Beware of BadPack: One Weird Trick Being Used Against Android Devices (Palo Alto Networks Unit 42)
New Poco RAT Weaponizing 7zip Files Using Google Drive (GB Hackers)
CISA broke into a US federal agency, and no one noticed for a full 5 months (The Register)
Organizations Warned of Exploited GeoServer Vulnerability (Security Week)
Microsoft finally fixes Outlook alerts bug caused by December updates (Bleeping Computer)
New Open Source law in Switzerland (Joinup)
Exploring the Skyline: How we Located an Alleged Cartel Member in Dubai (Bellingcat)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Jul 2024 20:20:00 -0000</pubDate>
      <itunes:title>Squarespace's square off with hijacked domains.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2111</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Some Squarespace users see their domains hijacked. Kaspersky Lab is shutting down US operations. BackPack APKs break malware analysis tools. Hackers use 7zip files to deliver Poco RAT malware. CISA’s red-teaming reveals security failings at an unnamed federal agency. Microsoft fixes an Outlook bug triggering false security alerts. Switzerland mandates open source software in the public sector. On our Industry Voices segment, N2K’s Rick Howard speaks with Alex Lawrence and Matt Stamper from Sysdig about their 555 Cloud Security Benchmark.  Bellingcat sleuths pinpoint an alleged cartel member. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, N2K’s Rick Howard speaks with Alex Lawrence and Matt Stamper from Sysdig about their 555 Cloud Security Benchmark. Learn more about the /555 benchmark.

Selected Reading
Researchers: Weak Security Defaults Enabled Squarespace Domains Hijacks (Krebs on Security)
Kaspersky Lab Closing U.S. Division; Laying Off Workers (Zero Day)
Beware of BadPack: One Weird Trick Being Used Against Android Devices (Palo Alto Networks Unit 42)
New Poco RAT Weaponizing 7zip Files Using Google Drive (GB Hackers)
CISA broke into a US federal agency, and no one noticed for a full 5 months (The Register)
Organizations Warned of Exploited GeoServer Vulnerability (Security Week)
Microsoft finally fixes Outlook alerts bug caused by December updates (Bleeping Computer)
New Open Source law in Switzerland (Joinup)
Exploring the Skyline: How we Located an Alleged Cartel Member in Dubai (Bellingcat)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Some Squarespace users see their domains hijacked. Kaspersky Lab is shutting down US operations. BackPack APKs break malware analysis tools. Hackers use 7zip files to deliver Poco RAT malware. CISA’s red-teaming reveals security failings at an unnamed federal agency. Microsoft fixes an Outlook bug triggering false security alerts. Switzerland mandates open source software in the public sector. On our Industry Voices segment, N2K’s Rick Howard speaks with Alex Lawrence and Matt Stamper from Sysdig about their 555 Cloud Security Benchmark.  Bellingcat sleuths pinpoint an alleged cartel member. </p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Voices segment, <a href="https://www.n2k.com/">N2K</a>’s <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> speaks with <a href="https://www.linkedin.com/in/alexanderjlawrence/">Alex Lawrence</a> and Matt Stamper from <a href="https://sysdig.com/">Sysdig</a> about their 555 Cloud Security Benchmark. <a href="https://sysdig.com/555-benchmark/?utm_medium=website&amp;utm_source=555PodCast&amp;utm_campaign=555PodCast">Learn more</a> about the /555 benchmark.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://krebsonsecurity.com/2024/07/researchers-weak-security-defaults-enabled-squarespace-domains-hijacks/">Researchers: Weak Security Defaults Enabled Squarespace Domains Hijacks</a> (Krebs on Security)</p><p><a href="https://www.zetter-zeroday.com/kaspersky-lab-closing-u-s-division-laying-off-workers-2/">Kaspersky Lab Closing U.S. Division; Laying Off Workers</a> (Zero Day)</p><p><a href="https://unit42.paloaltonetworks.com/apk-badpack-malware-tampered-headers/">Beware of BadPack: One Weird Trick Being Used Against Android Devices</a> (Palo Alto Networks Unit 42)</p><p><a href="https://gbhackers.com/poco-rat-7zip-google-drive/">New Poco RAT Weaponizing 7zip Files Using Google Drive</a> (GB Hackers)</p><p><a href="https://www.theregister.com/2024/07/12/cisa_broke_into_fed_agency/?ref=metacurity.com">CISA broke into a US federal agency, and no one noticed for a full 5 months</a> (The Register)</p><p><a href="https://www.securityweek.com/organizations-warned-of-exploited-geoserver-vulnerability/">Organizations Warned of Exploited GeoServer Vulnerability</a> (Security Week)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-finally-fixes-outlook-alerts-bug-caused-by-december-updates/">Microsoft finally fixes Outlook alerts bug caused by December updates</a> (Bleeping Computer)</p><p><a href="https://joinup.ec.europa.eu/collection/open-source-observatory-osor/news/new-open-source-law-switzerland">New Open Source law in Switzerland </a>(Joinup)</p><p><a href="https://www.bellingcat.com/resources/2024/07/16/dubai-uae-cartel-organised-crime-geolocation-open-source-guide-technique-tools/">Exploring the Skyline: How we Located an Alleged Cartel Member in Dubai</a> (Bellingcat)</p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1853</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[03d03eea-b95e-11ee-adc6-4f22da6b65c0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6150941197.mp3?updated=1721159369" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Conspiracy theories in politics. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2107/notes</link>
      <description>The assassination attempt on former President Trump sparks online disinformation. AT&amp;T pays to have stolen data deleted. Rite Aid recovers from ransomware. A hacktivist group claims to have breached Disney’s Slack. Checkmarx researchers uncover Python packages exfiltrating user data. HardBit ransomware gets upgraded with enhanced obfuscation. Threat actors can weaponize proof-of-concept (PoC) exploits in as little as 22 minutes. Google may be in the market for Wiz. Rick Howard previews his analysis of the MITRE ATT&amp;CK framework. Blockchain sleuths follow the money. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

This Week on CSO Perspectives
Dave chats with Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, about his latest episode of CSO Perspectives which focuses on the current state of MITRE ATT&amp;CK. If you are a N2K Pro subscriber, you can find this installment of CSO Perspectives here. The accompanying essay is available here. If you’re not a subscriber and want to check out a sample of the discussion Rick has with his Hash Table members about MITRE ATT&amp;CK, you can find it here. 

Selected Reading
Conspiracy theories spread swiftly in hours after Trump rally shooting (The Washington Post)
AT&amp;T Paid a Hacker $370,000 to Delete Stolen Phone Records (WIRED)
Pharmacy Giant Rite Aid Hit By Ransomware (Infosecurity Magazine)
Disney's Internal Slack Breached? NullBulge Leaks 1.1 TiB of Data (HackRead)
Malicious Python packages found exfiltrating user data to Telegram bot (Computing)
HardBit ransomware version 4.0 supports new obfuscation techniques (Security Affairs)
Hackers use PoC exploits in attacks 22 minutes after release (Bleeping Computer)
Google is reportedly planning its biggest startup acquisition ever (The Verge)
Automotive SaaS provider CDK paid $25 million ransom to hackers (BeyondMachines.net)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 15 Jul 2024 20:10:00 -0000</pubDate>
      <itunes:title>Conspiracy theories in politics. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2107</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The assassination attempt on former President Trump sparks online disinformation. AT&amp;T pays to have stolen data deleted. Rite Aid recovers from ransomware. A hacktivist group claims to have breached Disney’s Slack. Checkmarx researchers uncover Python packages exfiltrating user data. HardBit ransomware gets upgraded with enhanced obfuscation. Threat actors can weaponize proof-of-concept (PoC) exploits in as little as 22 minutes. Google may be in the market for Wiz. Rick Howard previews his analysis of the MITRE ATT&amp;CK framework. Blockchain sleuths follow the money. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

This Week on CSO Perspectives
Dave chats with Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, about his latest episode of CSO Perspectives which focuses on the current state of MITRE ATT&amp;CK. If you are a N2K Pro subscriber, you can find this installment of CSO Perspectives here. The accompanying essay is available here. If you’re not a subscriber and want to check out a sample of the discussion Rick has with his Hash Table members about MITRE ATT&amp;CK, you can find it here. 

Selected Reading
Conspiracy theories spread swiftly in hours after Trump rally shooting (The Washington Post)
AT&amp;T Paid a Hacker $370,000 to Delete Stolen Phone Records (WIRED)
Pharmacy Giant Rite Aid Hit By Ransomware (Infosecurity Magazine)
Disney's Internal Slack Breached? NullBulge Leaks 1.1 TiB of Data (HackRead)
Malicious Python packages found exfiltrating user data to Telegram bot (Computing)
HardBit ransomware version 4.0 supports new obfuscation techniques (Security Affairs)
Hackers use PoC exploits in attacks 22 minutes after release (Bleeping Computer)
Google is reportedly planning its biggest startup acquisition ever (The Verge)
Automotive SaaS provider CDK paid $25 million ransom to hackers (BeyondMachines.net)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The assassination attempt on former President Trump sparks online disinformation. AT&amp;T pays to have stolen data deleted. Rite Aid recovers from ransomware. A hacktivist group claims to have breached Disney’s Slack. Checkmarx researchers uncover Python packages exfiltrating user data. HardBit ransomware gets upgraded with enhanced obfuscation. Threat actors can weaponize proof-of-concept (PoC) exploits in as little as 22 minutes. Google may be in the market for Wiz. Rick Howard previews his analysis of the MITRE ATT&amp;CK framework. Blockchain sleuths follow the money. </p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><h2><br></h2><h2><strong>This Week on CSO Perspectives</strong></h2><p>Dave chats with <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a>, The CSO, Chief Analyst, and Senior Fellow at <a href="https://www.n2k.com/">N2K</a> Cyber, about his latest episode of CSO Perspectives which focuses on the current state of MITRE ATT&amp;CK. If you are a N2K Pro subscriber, you can find this installment of CSO Perspectives <a href="https://thecyberwire.com/podcasts/cso-perspectives/114/notes">here</a>. The accompanying essay is available <a href="https://thecyberwire.com/stories/cc11327968f64a3290d4b67f1f23abc9/current-state-of-mitre-attck-the-essential-tool-to-support-the-intrusion-kill-chain-prevention-strategy">here</a>. If you’re not a subscriber and want to check out a sample of the discussion Rick has with his Hash Table members about MITRE ATT&amp;CK, you can find it <a href="https://thecyberwire.com/podcasts/cso-perspectives-public/92/notes">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.washingtonpost.com/politics/2024/07/14/trump-shooting-conspiracy-theories/">Conspiracy theories spread swiftly in hours after Trump rally shooting</a> (The Washington Post)</p><p><a href="https://www.wired.com/story/atandt-paid-hacker-300000-to-delete-stolen-call-records/">AT&amp;T Paid a Hacker $370,000 to Delete Stolen Phone Records</a> (WIRED)</p><p><a href="https://www.infosecurity-magazine.com/news/rite-aid-hit-ransomware/">Pharmacy Giant Rite Aid Hit By Ransomware</a> (Infosecurity Magazine)</p><p><a href="https://hackread.com/disneys-internal-slack-breached-nullbulge-leak-data/">Disney's Internal Slack Breached? NullBulge Leaks 1.1 TiB of Data</a> (HackRead)</p><p><a href="https://www.computing.co.uk/news/4335384/malicious-python-packages-exfiltrating-user-telegram-bot">Malicious Python packages found exfiltrating user data to Telegram bot</a> (Computing)</p><p><a href="https://securityaffairs.com/165735/malware/hardbit-ransomware-version-4-0.html">HardBit ransomware version 4.0 supports new obfuscation techniques</a> (Security Affairs)</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-use-poc-exploits-in-attacks-22-minutes-after-release/">Hackers use PoC exploits in attacks 22 minutes after release</a> (Bleeping Computer)</p><p><a href="https://www.theverge.com/2024/7/14/24198613/google-wiz-acquisition-talks-23-billion-cloud-cybersecurity">Google is reportedly planning its biggest startup acquisition ever</a> (The Verge)</p><p><a href="https://beyondmachines.net/event_details/automotive-saas-provider-cdk-paid-25-million-ransom-r-y-d-k-l/gD2P6Ple2L">Automotive SaaS provider CDK paid $25 million ransom to hackers</a> (BeyondMachines.net)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1574</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[03964ac8-b95e-11ee-adc6-57b2ea7bfa11]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5989255973.mp3?updated=1721067547" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The current state of MITRE ATT&amp;CK.</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/92/notes</link>
      <description>Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of MITRE ATT&amp;CK with CyberWire Hash Table guests Frank Duff, Tidal Cyber’s Chief Innovation Officer, Amy Robertson, MITRE Threat Intelligence Engineer and ATT&amp;CK Engagement lead, and Rick Doten, Centene’s VP of Information Security.

References:
Amy L. Robertson, 2024. ATT&amp;CK 2024 Roadmap  [Essay]. Medium.
Blake E. Strom, Andy Applebaum, Doug P. Miller, Kathryn C. Nickels, Adam G. Pennington, Cody B. Thomas, 2018. MITRE ATT&amp;CK: Design and Philosophy [Historical Paper]. MITRE.
Eric Hutchins, Michael Cloppert, Rohan Amin, 2010. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains [Historic Paper]. Lockheed Martin Corporation.
Nick Selby, 2014. One Year Later: The APT1 Report [Essay]. Dark Reading.
Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads.
Rick Howard, 2020. Intrusion kill chains: a first principle of cybersecurity.  [Podcast]. The CyberWire.
Rick Howard, 2022. Kill chain trifecta: Lockheed Martin, ATT&amp;CK, and Diamond. [Podcast]. The CyberWire.
Rick Howard, 2020. cyber threat intelligence (CTI) (noun) [Podcast]. Word Notes: The CyberWire.
Kevin Mandia, 2014. State of the Hack: One Year after the APT1 Report [RSA Conference Presentation]. YouTube. 
SAHIL BLOOM, 2023. The Blind Men &amp; the Elephant [Website]. The Curiosity Chronicle.
Sergio Caltagirone, Andrew Pendergast, and Christopher Betz. 05 July 2011. The Diamond Model of Intrusion Analysis. Center for Cyber Threat Intelligence and Threat Research.[Historical Paper]
Staff, n.d. Home Page [Website]. Tidal Cyber.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 15 Jul 2024 06:00:00 -0000</pubDate>
      <itunes:title>The current state of MITRE ATT&amp;CK.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>92</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of MITRE ATT&amp;CK with CyberWire Hash Table guests Frank Duff, Tidal Cyber’s Chief Innovation Officer, Amy Robertson, MITRE Threat Intelligence Engineer and ATT&amp;CK Engagement lead, and Rick Doten, Centene’s VP of Information Security.

References:
Amy L. Robertson, 2024. ATT&amp;CK 2024 Roadmap  [Essay]. Medium.
Blake E. Strom, Andy Applebaum, Doug P. Miller, Kathryn C. Nickels, Adam G. Pennington, Cody B. Thomas, 2018. MITRE ATT&amp;CK: Design and Philosophy [Historical Paper]. MITRE.
Eric Hutchins, Michael Cloppert, Rohan Amin, 2010. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains [Historic Paper]. Lockheed Martin Corporation.
Nick Selby, 2014. One Year Later: The APT1 Report [Essay]. Dark Reading.
Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads.
Rick Howard, 2020. Intrusion kill chains: a first principle of cybersecurity.  [Podcast]. The CyberWire.
Rick Howard, 2022. Kill chain trifecta: Lockheed Martin, ATT&amp;CK, and Diamond. [Podcast]. The CyberWire.
Rick Howard, 2020. cyber threat intelligence (CTI) (noun) [Podcast]. Word Notes: The CyberWire.
Kevin Mandia, 2014. State of the Hack: One Year after the APT1 Report [RSA Conference Presentation]. YouTube. 
SAHIL BLOOM, 2023. The Blind Men &amp; the Elephant [Website]. The Curiosity Chronicle.
Sergio Caltagirone, Andrew Pendergast, and Christopher Betz. 05 July 2011. The Diamond Model of Intrusion Analysis. Center for Cyber Threat Intelligence and Threat Research.[Historical Paper]
Staff, n.d. Home Page [Website]. Tidal Cyber.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of MITRE ATT&amp;CK with CyberWire Hash Table guests Frank Duff, Tidal Cyber’s Chief Innovation Officer, Amy Robertson, MITRE Threat Intelligence Engineer and ATT&amp;CK Engagement lead, and Rick Doten, Centene’s VP of Information Security.</p><p><br></p><h2>References:</h2><p><a href="https://medium.com/mitre-attack/attack-2024-roadmap-8dfc46d1ad1b">Amy L. Robertson, 2024. ATT&amp;CK 2024 Roadmap  [Essay]. Medium.</a></p><p><a href="https://www.mitre.org/sites/default/files/publications/pr-18-0944-11-mitre-attack-design-and-philosophy.pdf">Blake E. Strom, Andy Applebaum, Doug P. Miller, Kathryn C. Nickels, Adam G. Pennington, Cody B. Thomas, 2018. MITRE ATT&amp;CK: Design and Philosophy [Historical Paper]. MITRE.</a></p><p><a href="https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pd">Eric Hutchins, Michael Cloppert, Rohan Amin, 2010. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains [Historic Paper]. Lockheed Martin Corporation.</a></p><p><a href="https://www.darkreading.com/vulnerabilities-threats/one-year-later-the-apt1-report">Nick Selby, 2014. One Year Later: The APT1 Report [Essay]. Dark Reading.</a></p><p><a href="https://www.goodreads.com/book/show/75671183-cybersecurity-first-principles">Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads.</a></p><p><a href="https://thecyberwire.com/podcasts/cso-perspectives/8/notes">Rick Howard, 2020. Intrusion kill chains: a first principle of cybersecurity.  [Podcast]. The CyberWire.</a></p><p><a href="https://thecyberwire.com/podcasts/cso-perspectives/72/notes">Rick Howard, 2022. Kill chain trifecta: Lockheed Martin, ATT&amp;CK, and Diamond. [Podcast]. The CyberWire.</a></p><p><a href="https://thecyberwire.com/podcasts/word-notes/23/transcript">Rick Howard, 2020. cyber threat intelligence (CTI) (noun) [Podcast]. Word Notes: The CyberWire.</a></p><p><a href="https://www.youtube.com/watch?v=88o-uifbJSE">Kevin Mandia, 2014. State of the Hack: One Year after the APT1 Report [RSA Conference Presentation]. YouTube.</a> </p><p><a href="https://www.sahilbloom.com/newsletter/the-blind-men-the-elephant">SAHIL BLOOM, 2023. The Blind Men &amp; the Elephant [Website]. The Curiosity Chronicle.</a></p><p><a href="https://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf">Sergio Caltagirone, Andrew Pendergast, and Christopher Betz. 05 July 2011. The Diamond Model of Intrusion Analysis. Center for Cyber Threat Intelligence and Threat Research.[Historical Paper]</a></p><p><a href="https://www.tidalcyber.com/about-us">Staff, n.d. Home Page [Website]. Tidal Cyber.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1072</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ab42f4b4-408c-11ef-a9bc-c3f3b0f4d8bd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4904199553.mp3?updated=1720816647" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Malek Ben Salem: Taking those challenges. [R&amp;D] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/24/notes</link>
      <description>Americas Security R&amp;D Lead for Accenture Malek Ben Salem shares how she pivoted from her love of math and background in electrical engineering to a career in cybersecurity R&amp;D. Malek talks about her interest in astrophysics as a young girl, and how her affinity for math and taking on challenges lead her to a degree in electrical engineering. She grew her career using math for data mining and forecasting eventually pursuing a masters and PhD in computer science where she shifted her focus to cybersecurity. Malek now develops and applies new AI techniques to solve security problems at Accenture. We thank Malek for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Jul 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Malek Ben Salem: Taking those challenges. [R&amp;D] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>24</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Americas Security R&amp;D Lead for Accenture Malek Ben Salem shares how she pivoted from her love of math and background in electrical engineering to a career in cybersecurity R&amp;D. Malek talks about her interest in astrophysics as a young girl, and how her affinity for math and taking on challenges lead her to a degree in electrical engineering. She grew her career using math for data mining and forecasting eventually pursuing a masters and PhD in computer science where she shifted her focus to cybersecurity. Malek now develops and applies new AI techniques to solve security problems at Accenture. We thank Malek for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Americas Security R&amp;D Lead for Accenture Malek Ben Salem shares how she pivoted from her love of math and background in electrical engineering to a career in cybersecurity R&amp;D. Malek talks about her interest in astrophysics as a young girl, and how her affinity for math and taking on challenges lead her to a degree in electrical engineering. She grew her career using math for data mining and forecasting eventually pursuing a masters and PhD in computer science where she shifted her focus to cybersecurity. Malek now develops and applies new AI techniques to solve security problems at Accenture. We thank Malek for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>381</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[59bbaafc-405d-11ef-a598-3bf0193122e9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5114435124.mp3?updated=1720805689" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>On the prowl for mobile malware. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/337/notes</link>
      <description>This week, we are joined by Asheer Malhotra and Vitor Ventura from Cisco Talos, and they are discussing "Operation Celestial Force employs mobile and desktop malware to target Indian entities." Cisco Talos revealed Operation Celestial Force, an espionage campaign by the Pakistani threat group "Cosmic Leopard," targeting Indian defense, government, and technology sectors. 
Active for at least six years, the operation has recently increased its use of mobile malware and commercial spyware for surveillance.
The research can be found here:
Operation Celestial Force employs mobile and desktop malware to target Indian entities

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Jul 2024 07:00:00 -0000</pubDate>
      <itunes:title>On the prowl for mobile malware. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>337</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, we are joined by Asheer Malhotra and Vitor Ventura from Cisco Talos, and they are discussing "Operation Celestial Force employs mobile and desktop malware to target Indian entities." Cisco Talos revealed Operation Celestial Force, an espionage campaign by the Pakistani threat group "Cosmic Leopard," targeting Indian defense, government, and technology sectors. 
Active for at least six years, the operation has recently increased its use of mobile malware and commercial spyware for surveillance.
The research can be found here:
Operation Celestial Force employs mobile and desktop malware to target Indian entities

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by Asheer Malhotra and Vitor Ventura from Cisco Talos, and they are discussing "Operation Celestial Force employs mobile and desktop malware to target Indian entities." Cisco Talos revealed Operation Celestial Force, an espionage campaign by the Pakistani threat group "Cosmic Leopard," targeting Indian defense, government, and technology sectors. </p><p>Active for at least six years, the operation has recently increased its use of mobile malware and commercial spyware for surveillance.</p><p>The research can be found here:</p><ul><li class="ql-align-center"><a href="https://blog.talosintelligence.com/cosmic-leopard/">Operation Celestial Force employs mobile and desktop malware to target Indian entities</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1518</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[579f7f2a-405b-11ef-b395-678c797f05cf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2963458942.mp3?updated=1720795504" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AT&amp;T's not so LOL hack.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2106/notes</link>
      <description>AT&amp;T wireless announces a massive data breach. NATO will build a cyber defense center in Belgium. The White House outlines cybersecurity budget priorities.A popular phone spyware app suffers a major data breach.Some Linksys routers are sending user credentials in the clear. Sysdig describes Crystalray malware. A massive phishing campaign is exploiting Microsoft SharePoint servers. Germany strips Huawei and ZTE from 5G infrastructure. Our guest is Brigid Johnson, Director of AWS Identity, on the importance of identity management. The EU tells X-Twitter to clean up its act or pay the price.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
At the recent AWS re:Inforce 2024 conference, N2K’s Brandon Karpf spoke with Brigid Johnson, Director of AWS Identity, about the importance of identity and where we need to go. You can watch a replay of Brigid’s session at the event, IAM policy power hour, here. 

Selected Reading
AT&amp;T Details Massive Breach of Customers' Call and Text Logs (Data Breach Today)
NATO Set to Build New Cyber Defense Center (Infosecurity Magazine)
New Presidential memorandum sets cybersecurity priorities for FY 2026, tasking OMB and ONCD to evaluate submissions (Industrial Cyber)
mSpy Data Breach: Millions of Customers’ Data Exposed (GB Hackers)
Advance Auto Parts’ Snowflake Breach Hits 2.3 Million People (Infosecurity Magazine)
These Linksys routers are likely transmitting cleartext passwords (TechSpot)
Known SSH-Snake bites more victims with multiple OSS exploitation (CSO Online)
Beware of Phishing Attack that Abuses SharePoint Servers (Cyber Security News)
Germany to Strip Huawei From Its 5G Networks (The New York Times)
EU threatens Musk’s X with a fine of up to 6% of global turnover (The Record)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 12 Jul 2024 20:10:00 -0000</pubDate>
      <itunes:title>AT&amp;T's not so LOL hack.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2106</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>AT&amp;T wireless announces a massive data breach. NATO will build a cyber defense center in Belgium. The White House outlines cybersecurity budget priorities.A popular phone spyware app suffers a major data breach.Some Linksys routers are sending user credentials in the clear. Sysdig describes Crystalray malware. A massive phishing campaign is exploiting Microsoft SharePoint servers. Germany strips Huawei and ZTE from 5G infrastructure. Our guest is Brigid Johnson, Director of AWS Identity, on the importance of identity management. The EU tells X-Twitter to clean up its act or pay the price.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
At the recent AWS re:Inforce 2024 conference, N2K’s Brandon Karpf spoke with Brigid Johnson, Director of AWS Identity, about the importance of identity and where we need to go. You can watch a replay of Brigid’s session at the event, IAM policy power hour, here. 

Selected Reading
AT&amp;T Details Massive Breach of Customers' Call and Text Logs (Data Breach Today)
NATO Set to Build New Cyber Defense Center (Infosecurity Magazine)
New Presidential memorandum sets cybersecurity priorities for FY 2026, tasking OMB and ONCD to evaluate submissions (Industrial Cyber)
mSpy Data Breach: Millions of Customers’ Data Exposed (GB Hackers)
Advance Auto Parts’ Snowflake Breach Hits 2.3 Million People (Infosecurity Magazine)
These Linksys routers are likely transmitting cleartext passwords (TechSpot)
Known SSH-Snake bites more victims with multiple OSS exploitation (CSO Online)
Beware of Phishing Attack that Abuses SharePoint Servers (Cyber Security News)
Germany to Strip Huawei From Its 5G Networks (The New York Times)
EU threatens Musk’s X with a fine of up to 6% of global turnover (The Record)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>AT&amp;T wireless announces a massive data breach. NATO will build a cyber defense center in Belgium. The White House outlines cybersecurity budget priorities.A popular phone spyware app suffers a major data breach.Some Linksys routers are sending user credentials in the clear. Sysdig describes Crystalray malware. A massive phishing campaign is exploiting Microsoft SharePoint servers. Germany strips Huawei and ZTE from 5G infrastructure. Our guest is Brigid Johnson, Director of AWS Identity, on the importance of identity management. The EU tells X-Twitter to clean up its act or pay the price.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>At the recent <a href="https://reinforce.awsevents.com/">AWS re:Inforce 2024</a> conference, <a href="https://www.n2k.com/">N2K</a>’s <a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a> spoke with <a href="https://www.linkedin.com/in/brigid-johnson-36121148/">Brigid Johnson</a>, Director of <a href="https://aws.amazon.com/identity/">AWS</a> Identity, about the importance of identity and where we need to go. You can watch a replay of Brigid’s session at the event, IAM policy power hour, <a href="https://www.youtube.com/watch?v=MKhkLqN0AyY">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.databreachtoday.co.uk/att-details-massive-breach-subscribers-call-logs-a-25754">AT&amp;T Details Massive Breach of Customers' Call and Text Logs</a> (Data Breach Today)</p><p><a href="https://www.infosecurity-magazine.com/news/nato-build-new-cyber-defense-center/">NATO Set to Build New Cyber Defense Center</a> (Infosecurity Magazine)</p><p><a href="https://industrialcyber.co/threat-landscape/new-presidential-memorandum-sets-cybersecurity-priorities-for-fy-2026-tasking-omb-and-oncd-to-evaluate-submissions/">New Presidential memorandum sets cybersecurity priorities for FY 2026, tasking OMB and ONCD to evaluate submissions </a>(Industrial Cyber)</p><p><a href="https://gbhackers.com/mspy-data-breach/">mSpy Data Breach: Millions of Customers’ Data Exposed</a> (GB Hackers)</p><p><a href="https://www.infosecurity-magazine.com/news/advance-auto-parts-snowflake/">Advance Auto Parts’ Snowflake Breach Hits 2.3 Million People</a> (Infosecurity Magazine)</p><p><a href="https://www.techspot.com/news/103783-linksys-routers-likely-transmitting-cleartext-passwords.html">These Linksys routers are likely transmitting cleartext passwords</a> (TechSpot)</p><p><a href="https://www.csoonline.com/article/2516651/known-ssh-snake-bites-more-victims-with-multiple-oss-exploitation.html">Known SSH-Snake bites more victims with multiple OSS exploitation</a> (CSO Online)</p><p><a href="https://cybersecuritynews.com/phishing-attack-sharepoint-servers/">Beware of Phishing Attack that Abuses SharePoint Servers</a> (Cyber Security News)</p><p><a href="https://www.nytimes.com/2024/07/11/business/huawei-germany-ban.html">Germany to Strip Huawei From Its 5G Networks</a> (The New York Times)</p><p><a href="https://therecord.media/eu-threatens-x-with-fine-digital-services-act">EU threatens Musk’s X with a fine of up to 6% of global turnover</a> (The Record)</p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1841</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[035e03c0-b95e-11ee-adc6-0f3995740084]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1876466802.mp3?updated=1720813308" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Inside the crypto scam empire.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2105/notes</link>
      <description>A major Pig Butchering marketplace has ties to the Cambodian ruling family. Lulu Hypermarket suffers a data breach. GitLab patches critical flaws. Palo Alto Networks addresses BlastRadius. ViperSoftX malware variants grow ever more stealthy. A New Mexico man gets seven years for SWATting. State and local government employees are increasingly lured in by phishing attacks. Hackers impersonate live chat agents from Etsy and Upwork. The GOP’s official platform looks to roll back AI regulation. On today’s Threat Vector, David Moulton from Palo Alto Networks Unit 42 discusses the evolving threats of AI-generated malware with experts Rem Dudas and Bar Matalon. NATO brings the social media influencers to Washington.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
In this segment of Threat Vector, hosted by David Moulton, Director of Thought Leadership at Palo Alto Networks Unit 42, he explores the evolving world of AI-generated malware with guests, Rem Dudas, Senior Threat Intelligence Analyst, and Bar Matalon, Threat Intelligence Team Lead. From exploring the vulnerabilities in AI models to discussing the potential implications for cybersecurity, this episode offers a deep dive into the challenges and opportunities posed by this emerging threat. You can listen to the full episode here. 

Selected Reading
The $11 Billion Marketplace Enabling the Crypto Scam Economy (WIRED)
Hackers steal data of 200k Lulu customers in an alleged breach (CSO Online)
GitLab update addresses pipeline execution vulnerability (Developer Tech News)
Palo Alto Networks Addresses BlastRADIUS Vulnerability, Fixes Critical Bug in Expedition Tool (SecurityWeek)
ViperSoftX malware covertly runs PowerShell using AutoIT scripting (Bleeping Computer)
Man sentenced to 7 years for Westfield High School threat hoax (Current Publishing)
State, local governments facing deluge of phishing attacks (SC Media)
Hackers impersonate live chat support agents in new phishing scam (Cybernews)
2024 GOP platform would roll back tech regulations on AI, crypto (The Washington Post)
NATO's newest weapon is online content creators (The Washington Post) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 11 Jul 2024 20:10:00 -0000</pubDate>
      <itunes:title>Inside the crypto scam empire.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2108</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A major Pig Butchering marketplace has ties to the Cambodian ruling family. Lulu Hypermarket suffers a data breach. GitLab patches critical flaws. Palo Alto Networks addresses BlastRadius. ViperSoftX malware variants grow ever more stealthy. A New Mexico man gets seven years for SWATting. State and local government employees are increasingly lured in by phishing attacks. Hackers impersonate live chat agents from Etsy and Upwork. The GOP’s official platform looks to roll back AI regulation. On today’s Threat Vector, David Moulton from Palo Alto Networks Unit 42 discusses the evolving threats of AI-generated malware with experts Rem Dudas and Bar Matalon. NATO brings the social media influencers to Washington.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
In this segment of Threat Vector, hosted by David Moulton, Director of Thought Leadership at Palo Alto Networks Unit 42, he explores the evolving world of AI-generated malware with guests, Rem Dudas, Senior Threat Intelligence Analyst, and Bar Matalon, Threat Intelligence Team Lead. From exploring the vulnerabilities in AI models to discussing the potential implications for cybersecurity, this episode offers a deep dive into the challenges and opportunities posed by this emerging threat. You can listen to the full episode here. 

Selected Reading
The $11 Billion Marketplace Enabling the Crypto Scam Economy (WIRED)
Hackers steal data of 200k Lulu customers in an alleged breach (CSO Online)
GitLab update addresses pipeline execution vulnerability (Developer Tech News)
Palo Alto Networks Addresses BlastRADIUS Vulnerability, Fixes Critical Bug in Expedition Tool (SecurityWeek)
ViperSoftX malware covertly runs PowerShell using AutoIT scripting (Bleeping Computer)
Man sentenced to 7 years for Westfield High School threat hoax (Current Publishing)
State, local governments facing deluge of phishing attacks (SC Media)
Hackers impersonate live chat support agents in new phishing scam (Cybernews)
2024 GOP platform would roll back tech regulations on AI, crypto (The Washington Post)
NATO's newest weapon is online content creators (The Washington Post) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A major Pig Butchering marketplace has ties to the Cambodian ruling family. Lulu Hypermarket suffers a data breach. GitLab patches critical flaws. Palo Alto Networks addresses BlastRadius. ViperSoftX malware variants grow ever more stealthy. A New Mexico man gets seven years for SWATting. State and local government employees are increasingly lured in by phishing attacks. Hackers impersonate live chat agents from Etsy and Upwork. The GOP’s official platform looks to roll back AI regulation. On today’s Threat Vector, David Moulton from Palo Alto Networks Unit 42 discusses the evolving threats of AI-generated malware with experts Rem Dudas and Bar Matalon. NATO brings the social media influencers to Washington.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Threat Vector Segment</h2><p>In this segment of <a href="https://thecyberwire.com/podcasts/threat-vector">Threat Vector</a>, hosted by<a href="https://www.linkedin.com/in/davidrmoulton"> David Moulton</a>, Director of Thought Leadership at <a href="https://www.paloaltonetworks.com/">Palo Alto Networks Unit 42</a>, he explores the evolving world of AI-generated malware with guests,<a href="https://www.linkedin.com/in/rem-dudas-a859bb207"> Rem Dudas</a>, Senior Threat Intelligence Analyst, and<a href="https://www.linkedin.com/in/bar-matalon-5a87aa184"> Bar Matalon</a>, Threat Intelligence Team Lead. From exploring the vulnerabilities in AI models to discussing the potential implications for cybersecurity, this episode offers a deep dive into the challenges and opportunities posed by this emerging threat. You can listen to the full episode <a href="https://thecyberwire.com/podcasts/threat-vector/26/notes">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.wired.com/story/pig-butchering-scam-crypto-huione-guarantee/">The $11 Billion Marketplace Enabling the Crypto Scam Economy</a> (WIRED)</p><p><a href="https://www.csoonline.com/article/2516119/hackers-steal-data-of-200k-lulu-customers-in-an-alleged-breach.html">Hackers steal data of 200k Lulu customers in an alleged breach </a>(CSO Online)</p><p><a href="https://www.developer-tech.com/news/2024/jul/11/gitlab-update-addresses-pipeline-execution-vulnerability/">GitLab update addresses pipeline execution vulnerability</a> (Developer Tech News)</p><p><a href="https://www.securityweek.com/palo-alto-networks-addresses-blastradius-vulnerability-fixes-critical-bug-in-expedition-tool/">Palo Alto Networks Addresses BlastRADIUS Vulnerability, Fixes Critical Bug in Expedition Tool</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/vipersoftx-malware-covertly-runs-powershell-using-autoit-scripting/">ViperSoftX malware covertly runs PowerShell using AutoIT scripting</a> (Bleeping Computer)</p><p><a href="https://youarecurrent.com/2024/07/09/man-sentenced-to-7-years-for-westfield-high-school-threat-hoax/">Man sentenced to 7 years for Westfield High School threat hoax</a> (Current Publishing)</p><p><a href="https://www.scmagazine.com/news/state-local-governments-facing-deluge-of-phishing-attacks">State, local governments facing deluge of phishing attacks</a> (SC Media)</p><p><a href="https://cybernews.com/security/phishing-scam-live-chat-agents-steal-credit-card-info/?source=mastodon&amp;medium=social&amp;campaign=cybernews&amp;content=post">Hackers impersonate live chat support agents in new phishing scam</a> (Cybernews)</p><p><a href="https://www.washingtonpost.com/politics/2024/07/10/gop-platform-trump-tech-crypto-ai-musk/">2024 GOP platform would roll back tech regulations on AI, crypto </a>(The Washington Post)</p><p><a href="https://www.washingtonpost.com/technology/2024/07/10/nato-summit-influencers-summit-dc/">NATO's newest weapon is online content creators</a> (The Washington Post) </p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1542</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[032560d8-b95e-11ee-adc6-471e343f4f06]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3380557917.mp3?updated=1720724562" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Old school, new threat.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2104/notes</link>
      <description>Blast-RADIUS targets a network authentication protocol. The US disrupts a Russian disinformation campaign. Anonymous messaging app NGL is slapped with fines and user restrictions. The NEA addresses AI use in classrooms. Gay Furry Hackers release data from a conservative think tank. Microsoft and Apple change course on OpenAI board seats. Australia initiates a nationwide technology security review. A Patch Tuesday rundown. Guest Jack Cable, Senior Technical Advisor at CISA, with the latest from CISA's Secure by Design Alert series. Our friend Graham Cluley ties the knot. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Jack Cable, Senior Technical Advisor at CISA, joins us to share an update on CISA's Secure by Design Alert series. For some background, you can find CISA’s Secure by Design whitepaper here. Details on today’s update can be found here. 

Selected Reading
New Blast-RADIUS attack breaks 30-year-old protocol used in networks everywhere (Ars Technica)
US Disrupts AI-Powered Russian Bot Farm on X (SecurityWeek)
FTC says anonymous messaging app failed to stop ‘rampant cyberbullying’ (The Verge)
NEA Approves AI Guidance, But It’s Vital for Educators to Tread Carefully (EducationWeek)
Hackvists release two gigabytes of Heritage Foundation data (CyberScoop)
Microsoft and Apple ditch OpenAI board seats amid regulatory scrutiny (The Verge)
Australia instructs government entities to check for tech exposed to foreign control (The Record)
Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days (BleepingComputer)
Graham Cluley ties the knot (Mastodon) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 10 Jul 2024 20:20:00 -0000</pubDate>
      <itunes:title>Old school, new threat.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2104</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Blast-RADIUS targets a network authentication protocol. The US disrupts a Russian disinformation campaign. Anonymous messaging app NGL is slapped with fines and user restrictions. The NEA addresses AI use in classrooms. Gay Furry Hackers release data from a conservative think tank. Microsoft and Apple change course on OpenAI board seats. Australia initiates a nationwide technology security review. A Patch Tuesday rundown. Guest Jack Cable, Senior Technical Advisor at CISA, with the latest from CISA's Secure by Design Alert series. Our friend Graham Cluley ties the knot. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Jack Cable, Senior Technical Advisor at CISA, joins us to share an update on CISA's Secure by Design Alert series. For some background, you can find CISA’s Secure by Design whitepaper here. Details on today’s update can be found here. 

Selected Reading
New Blast-RADIUS attack breaks 30-year-old protocol used in networks everywhere (Ars Technica)
US Disrupts AI-Powered Russian Bot Farm on X (SecurityWeek)
FTC says anonymous messaging app failed to stop ‘rampant cyberbullying’ (The Verge)
NEA Approves AI Guidance, But It’s Vital for Educators to Tread Carefully (EducationWeek)
Hackvists release two gigabytes of Heritage Foundation data (CyberScoop)
Microsoft and Apple ditch OpenAI board seats amid regulatory scrutiny (The Verge)
Australia instructs government entities to check for tech exposed to foreign control (The Record)
Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days (BleepingComputer)
Graham Cluley ties the knot (Mastodon) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Blast-RADIUS targets a network authentication protocol. The US disrupts a Russian disinformation campaign. Anonymous messaging app NGL is slapped with fines and user restrictions. The NEA addresses AI use in classrooms. Gay Furry Hackers release data from a conservative think tank. Microsoft and Apple change course on OpenAI board seats. Australia initiates a nationwide technology security review. A Patch Tuesday rundown. Guest Jack Cable, Senior Technical Advisor at CISA, with the latest from CISA's Secure by Design Alert series. Our friend Graham Cluley ties the knot. </p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/jackcable/">Jack Cable</a>, Senior Technical Advisor at <a href="https://www.cisa.gov/">CISA</a>, joins us to share an update on CISA's <a href="https://www.cisa.gov/securebydesign/alerts">Secure by Design Alert</a> series. For some <a href="https://www.cisa.gov/securebydesign">background</a>, you can find CISA’s Secure by Design whitepaper <a href="https://www.cisa.gov/resources-tools/resources/secure-by-design">here</a>. Details on today’s update can be found <a href="https://www.cisa.gov/resources-tools/resources/secure-design-alert-eliminating-os-command-injection-vulnerabilities">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://arstechnica.com/security/2024/07/new-blast-radius-attack-breaks-30-year-old-protocol-used-in-networks-everywhere/">New Blast-RADIUS attack breaks 30-year-old protocol used in networks everywhere</a> (Ars Technica)</p><p><a href="https://www.securityweek.com/us-disrupts-ai-powered-russian-bot-farm-on-x/">US Disrupts AI-Powered Russian Bot Farm on X</a> (SecurityWeek)</p><p><a href="https://www.theverge.com/2024/7/9/24194886/anonymous-messaging-app-ngl-ftc-agreement-marketing-kids-coppa">FTC says anonymous messaging app failed to stop ‘rampant cyberbullying’</a> (The Verge)</p><p><a href="https://www.edweek.org/teaching-learning/nea-approves-ai-guidance-but-its-vital-for-educators-to-tread-carefully/2024/07">NEA Approves AI Guidance, But It’s Vital for Educators to Tread Carefully</a> (EducationWeek)</p><p><a href="https://cyberscoop.com/hackvists-release-two-gigabytes-of-heritage-foundation-data/">Hackvists release two gigabytes of Heritage Foundation data </a>(CyberScoop)</p><p><a href="https://www.theverge.com/2024/7/10/24195528/microsoft-apple-openai-board-observer-seat-drop-regulator-scrutiny">Microsoft and Apple ditch OpenAI board seats amid regulatory scrutiny</a> (The Verge)</p><p><a href="https://therecord.media/australia-government-agencies-check-technology-foreign-control">Australia instructs government entities to check for tech exposed to foreign control</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2024-patch-tuesday-fixes-142-flaws-4-zero-days/">Microsoft July 2024 Patch Tuesday fixes 142 flaws, 4 zero-days</a> (BleepingComputer)</p><p><a href="https://mastodon.green/@gcluley/112747428153447051">Graham Cluley ties the knot</a> (Mastodon) </p><p><br></p><h2>Share your feedback.</h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1769</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[02ec1792-b95e-11ee-adc6-e34ff740a9e5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5988966687.mp3?updated=1720641508" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Uniting against APT40.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2103/notes</link>
      <description>The UK’s NCSC highlights evolving cyberattack techniques used by Chinese state-sponsored actors.A severe cyberattack targets Frankfurt University of Applied Sciences. Russian government agencies fall under the spell of CloudSorcerer. CISA looks to Hipcheck Open Source security vulnerabilities. Avast decrypts DoNex ransomware. Neiman Marcus data breach exposes over 31 million customers. Lookout spots GuardZoo spyware. Cybersecurity funding surges. Our guest is Caroline Wong, Chief Strategy Officer at Cobalt, to discuss the state of pentesting and adapting to the impact of AI in cybersecurity. Scalpers Outsmart Ticketmaster’s Rotating Barcodes.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, Dave Bittner is joined by Caroline Wong, Chief Strategy Officer at Cobalt, to discuss the state of pentesting and adapting to the impact of AI in cybersecurity. You can learn more about the state of pentesting from Cobalt’s State of Pentesting 2024 report here. 

Selected Reading
The NCSC and partners issue alert about evolving techniques used by China state-sponsored cyber attacks (NCSC)
‘Serious hacker attack’ forces Frankfurt university to shut down IT systems (The Record)
New group exploits public cloud services to spy on Russian agencies, Kaspersky says (The Record)
Continued Progress Towards a Secure Open Source Ecosystem (CISA)
Decrypted: DoNex Ransomware and its Predecessors (Avast Threat Labs)
Neiman Marcus data breach: 31 million email addresses found exposed (Bleeping Computer)
GuardZoo spyware used by Houthis to target military personnel (Help Net Security)
Cybersecurity Funding Surges in Q2 2024: Pinpoint Search Group Report Highlights Year-Over-Year Growth (Pinpoint Search Group)
Scalpers Work With Hackers to Liberate Ticketmaster's ‘Non-Transferable’ Tickets (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Jul 2024 20:10:00 -0000</pubDate>
      <itunes:title>Uniting against APT40.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2106</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The UK’s NCSC highlights evolving cyberattack techniques used by Chinese state-sponsored actors.A severe cyberattack targets Frankfurt University of Applied Sciences. Russian government agencies fall under the spell of CloudSorcerer. CISA looks to Hipcheck Open Source security vulnerabilities. Avast decrypts DoNex ransomware. Neiman Marcus data breach exposes over 31 million customers. Lookout spots GuardZoo spyware. Cybersecurity funding surges. Our guest is Caroline Wong, Chief Strategy Officer at Cobalt, to discuss the state of pentesting and adapting to the impact of AI in cybersecurity. Scalpers Outsmart Ticketmaster’s Rotating Barcodes.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, Dave Bittner is joined by Caroline Wong, Chief Strategy Officer at Cobalt, to discuss the state of pentesting and adapting to the impact of AI in cybersecurity. You can learn more about the state of pentesting from Cobalt’s State of Pentesting 2024 report here. 

Selected Reading
The NCSC and partners issue alert about evolving techniques used by China state-sponsored cyber attacks (NCSC)
‘Serious hacker attack’ forces Frankfurt university to shut down IT systems (The Record)
New group exploits public cloud services to spy on Russian agencies, Kaspersky says (The Record)
Continued Progress Towards a Secure Open Source Ecosystem (CISA)
Decrypted: DoNex Ransomware and its Predecessors (Avast Threat Labs)
Neiman Marcus data breach: 31 million email addresses found exposed (Bleeping Computer)
GuardZoo spyware used by Houthis to target military personnel (Help Net Security)
Cybersecurity Funding Surges in Q2 2024: Pinpoint Search Group Report Highlights Year-Over-Year Growth (Pinpoint Search Group)
Scalpers Work With Hackers to Liberate Ticketmaster's ‘Non-Transferable’ Tickets (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The UK’s NCSC highlights evolving cyberattack techniques used by Chinese state-sponsored actors.A severe cyberattack targets Frankfurt University of Applied Sciences. Russian government agencies fall under the spell of CloudSorcerer. CISA looks to Hipcheck Open Source security vulnerabilities. Avast decrypts DoNex ransomware. Neiman Marcus data breach exposes over 31 million customers. Lookout spots GuardZoo spyware. Cybersecurity funding surges. Our guest is Caroline Wong, Chief Strategy Officer at Cobalt, to discuss the state of pentesting and adapting to the impact of AI in cybersecurity. Scalpers Outsmart Ticketmaster’s Rotating Barcodes.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Voices segment, Dave Bittner is joined by Caroline Wong, Chief Strategy Officer at Cobalt, to discuss the state of pentesting and adapting to the impact of AI in cybersecurity. You can learn more about the state of pentesting from Cobalt’s State of Pentesting 2024 report <a href="https://resource.cobalt.io/state-of-pentesting-2024">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.ncsc.gov.uk/news/ncsc-and-partners-issue-alert-about-evolving-techniques-used-by-china-state-sponsored-cyber-attacks">The NCSC and partners issue alert about evolving techniques used by China state-sponsored cyber attacks</a> (NCSC)</p><p><a href="https://therecord.media/serious-hacker-attack-shutdown-frankfurt">‘Serious hacker attack’ forces Frankfurt university to shut down IT systems</a> (The Record)</p><p><a href="https://therecord.media/cloudsorcerer-apt-kaspersky-research">New group exploits public cloud services to spy on Russian agencies, Kaspersky says</a> (The Record)</p><p><a href="https://www.cisa.gov/news-events/news/continued-progress-towards-secure-open-source-ecosystem">Continued Progress Towards a Secure Open Source Ecosystem</a> (CISA)</p><p><a href="https://decoded.avast.io/threatresearch/decrypted-donex-ransomware-and-its-predecessors/">Decrypted: DoNex Ransomware and its Predecessors</a> (Avast Threat Labs)</p><p><a href="https://www.bleepingcomputer.com/news/security/neiman-marcus-data-breach-31-million-email-addresses-found-exposed/">Neiman Marcus data breach: 31 million email addresses found exposed</a> (Bleeping Computer)</p><p><a href="https://www.helpnetsecurity.com/2024/07/09/guardzoo-spyware-target-military-personnel/">GuardZoo spyware used by Houthis to target military personnel</a> (Help Net Security)</p><p><a href="https://pinpointsearchgroup.com/cyber-security-vendor-funding-report-q2-2024/">Cybersecurity Funding Surges in Q2 2024: Pinpoint Search Group Report Highlights Year-Over-Year Growth</a> (Pinpoint Search Group)</p><p><a href="https://www.404media.co/scalpers-are-working-with-hackers-to-liberate-non-transferable-tickets-from-ticketmasters-ecosystem/">Scalpers Work With Hackers to Liberate Ticketmaster's ‘Non-Transferable’ Tickets</a> (404 Media)</p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1793</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[02b31906-b95e-11ee-adc6-af4f78fc88c3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9720147663.mp3?updated=1720549912" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The age old battle between iPhone and Android. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2102/notes</link>
      <description>Microsoft is phasing out Android use for employees in China. Mastodon patches a security flaw exposing private posts. OpenAI kept a previous breach close to the vest. Nearly 10 billion passwords are leaked online. A Republican senator presses CISA for more information about a January hack. A breach of the Egyptian Health Department impacts 122,000 individuals. South Africa's National Health Laboratory Service (NHLS) suffers a ransomware attack. Eldorado is a new ransomware-as-a-service offering. CISA adds a Cisco command injection vulnerability to its Known Exploited Vulnerabilities catalog. N2K’s CSO Rick Howard catches up with AWS’ Vice President of Global Services Security Hart Rossman to discuss extending your security around genAI.  Ransomware scrambles your peace of mind.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Recently N2K’s CSO Rick Howard caught up with AWS’ Vice President of Global Services Security Hart Rossman at the AWS re:Inforce event. They discussed extending your security around genAI. Watch Hart’s presentation from AWS re:Inforce 2024 - Securely accelerating generative AI innovation.

Selected Reading
Microsoft Orders China Staff to Switch From Android Phones to iPhones for Work (Bloomberg)
Mastodon: Security flaw allows unauthorized access to posts (Stack Diary)
A Hacker Stole OpenAI Secrets, Raising Fears That China Could, Too (The New York Times)
“A treasure trove for adversaries”: 10 billion stolen passwords have been shared online in the biggest data leak of all time (ITPro)
Senate leader demands answers from CISA on Ivanti-enabled hack of sensitive systems (The Record)
Egyptian Health Department Data Breach: 120,000 Users' Data Exposed (GB Hackers)
South African pathology labs down after ransomware attack (The Cape Independent)
New Eldorado ransomware targets Windows, VMware ESXi VMs (Bleeping Computer)
CISA adds Cisco NX-OS Command Injection bug to its Known Exploited Vulnerabilities catalog (Security Affairs)
New RUSI Report Exposes Psychological Toll of Ransomware, Urges Action (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 08 Jul 2024 20:10:00 -0000</pubDate>
      <itunes:title>The age old battle between iPhone and Android. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2102</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Microsoft is phasing out Android use for employees in China. Mastodon patches a security flaw exposing private posts. OpenAI kept a previous breach close to the vest. Nearly 10 billion passwords are leaked online. A Republican senator presses CISA for more information about a January hack. A breach of the Egyptian Health Department impacts 122,000 individuals. South Africa's National Health Laboratory Service (NHLS) suffers a ransomware attack. Eldorado is a new ransomware-as-a-service offering. CISA adds a Cisco command injection vulnerability to its Known Exploited Vulnerabilities catalog. N2K’s CSO Rick Howard catches up with AWS’ Vice President of Global Services Security Hart Rossman to discuss extending your security around genAI.  Ransomware scrambles your peace of mind.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Recently N2K’s CSO Rick Howard caught up with AWS’ Vice President of Global Services Security Hart Rossman at the AWS re:Inforce event. They discussed extending your security around genAI. Watch Hart’s presentation from AWS re:Inforce 2024 - Securely accelerating generative AI innovation.

Selected Reading
Microsoft Orders China Staff to Switch From Android Phones to iPhones for Work (Bloomberg)
Mastodon: Security flaw allows unauthorized access to posts (Stack Diary)
A Hacker Stole OpenAI Secrets, Raising Fears That China Could, Too (The New York Times)
“A treasure trove for adversaries”: 10 billion stolen passwords have been shared online in the biggest data leak of all time (ITPro)
Senate leader demands answers from CISA on Ivanti-enabled hack of sensitive systems (The Record)
Egyptian Health Department Data Breach: 120,000 Users' Data Exposed (GB Hackers)
South African pathology labs down after ransomware attack (The Cape Independent)
New Eldorado ransomware targets Windows, VMware ESXi VMs (Bleeping Computer)
CISA adds Cisco NX-OS Command Injection bug to its Known Exploited Vulnerabilities catalog (Security Affairs)
New RUSI Report Exposes Psychological Toll of Ransomware, Urges Action (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft is phasing out Android use for employees in China. Mastodon patches a security flaw exposing private posts. OpenAI kept a previous breach close to the vest. Nearly 10 billion passwords are leaked online. A Republican senator presses CISA for more information about a January hack. A breach of the Egyptian Health Department impacts 122,000 individuals. South Africa's National Health Laboratory Service (NHLS) suffers a ransomware attack. Eldorado is a new ransomware-as-a-service offering. CISA adds a Cisco command injection vulnerability to its Known Exploited Vulnerabilities catalog. N2K’s CSO Rick Howard catches up with AWS’ Vice President of Global Services Security Hart Rossman to discuss extending your security around genAI.  Ransomware scrambles your peace of mind.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Recently <a href="https://www.n2k.com/">N2K</a>’s CSO <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> caught up with <a href="https://aws.amazon.com/security/">AWS</a>’ Vice President of Global Services Security <a href="https://www.linkedin.com/in/hartrossman/">Hart Rossman</a> at the <a href="https://reinforce.awsevents.com/">AWS re:Inforce</a> event. They discussed extending your security around genAI. Watch Hart’s presentation from AWS re:Inforce 2024 - <a href="https://www.youtube.com/watch?v=S_4XflTsjZE">Securely accelerating generative AI innovation</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bloomberg.com/news/articles/2024-07-08/microsoft-orders-china-staff-to-switch-from-android-phones-to-iphones-for-work">Microsoft Orders China Staff to Switch From Android Phones to iPhones for Work</a> (Bloomberg)</p><p><a href="https://stackdiary.com/mastodon-security-flaw-allows-unauthorized-access-to-posts/">Mastodon: Security flaw allows unauthorized access to posts</a> (Stack Diary)</p><p><a href="https://www.nytimes.com/2024/07/04/technology/openai-hack.html">A Hacker Stole OpenAI Secrets, Raising Fears That China Could, Too</a> (The New York Times)</p><p><a href="https://www.itpro.com/security/data-breaches/a-treasure-trove-for-adversaries-10-billion-stolen-passwords-have-been-shared-online-in-the-biggest-data-leak-of-all-time">“A treasure trove for adversaries”: 10 billion stolen passwords have been shared online in the biggest data leak of all time</a> (ITPro)</p><p><a href="https://therecord.media/senator-grassley-cisa-letter-hack">Senate leader demands answers from CISA on Ivanti-enabled hack of sensitive systems</a> (The Record)</p><p><a href="https://gbhackers.com/egyptian-health-department-data-breach/">Egyptian Health Department Data Breach: 120,000 Users' Data Exposed</a> (GB Hackers)</p><p><a href="https://www.capeindependent.com/article/south-african-pathology-labs-down-after-ransomware-attack?ref=news.risky.biz">South African pathology labs down after ransomware attack </a>(The Cape Independent)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-eldorado-ransomware-targets-windows-vmware-esxi-vms/">New Eldorado ransomware targets Windows, VMware ESXi VMs</a> (Bleeping Computer)</p><p><a href="https://securityaffairs.com/165415/security/cisa-adds-cisco-nx-os-command-injection-bug-known-exploited-vulnerabilities-catalog.html">CISA adds Cisco NX-OS Command Injection bug to its Known Exploited Vulnerabilities catalog</a> (Security Affairs)</p><p><a href="https://www.infosecurity-magazine.com/news/report-exposes-psychological-toll/">New RUSI Report Exposes Psychological Toll of Ransomware, Urges Action</a> (Infosecurity Magazine)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1674</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[027b1f38-b95e-11ee-adc6-aba6c468fcb5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9813482925.mp3?updated=1720464858" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Richard Clarke: From presidential inspiration to cybersecurity policy pioneer. [Policy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/23/notes</link>
      <description>CEO and consultant Richard Clarke took his inspiration from President John F Kennedy and turned it into the first cybersecurity position in federal government. Determined to help change the mindset of war, Richard went to work for the Department of Defense at the Pentagon following college during the Vietnam War. From Assistant Secretary of the State Department, he moved to the White House to work for President George W. Bush's administration where he kept an eye on Al-Qaeda and was tasked to take on cybersecurity. Lacking any books or courses to give him a basic understanding of cybersecurity, Richard made it his mission to raise the level of cybersecurity knowledge. Currently as Chairman and CEO at Good Harbor Security Risk Management, Richard advises CISOs. We thank Richard for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 07 Jul 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Richard Clarke: From presidential inspiration to cybersecurity policy pioneer. [Policy] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>23</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CEO and consultant Richard Clarke took his inspiration from President John F Kennedy and turned it into the first cybersecurity position in federal government. Determined to help change the mindset of war, Richard went to work for the Department of Defense at the Pentagon following college during the Vietnam War. From Assistant Secretary of the State Department, he moved to the White House to work for President George W. Bush's administration where he kept an eye on Al-Qaeda and was tasked to take on cybersecurity. Lacking any books or courses to give him a basic understanding of cybersecurity, Richard made it his mission to raise the level of cybersecurity knowledge. Currently as Chairman and CEO at Good Harbor Security Risk Management, Richard advises CISOs. We thank Richard for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CEO and consultant Richard Clarke took his inspiration from President John F Kennedy and turned it into the first cybersecurity position in federal government. Determined to help change the mindset of war, Richard went to work for the Department of Defense at the Pentagon following college during the Vietnam War. From Assistant Secretary of the State Department, he moved to the White House to work for President George W. Bush's administration where he kept an eye on Al-Qaeda and was tasked to take on cybersecurity. Lacking any books or courses to give him a basic understanding of cybersecurity, Richard made it his mission to raise the level of cybersecurity knowledge. Currently as Chairman and CEO at Good Harbor Security Risk Management, Richard advises CISOs. We thank Richard for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>434</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f0402c80-3966-11ef-ba18-8717d82a0a73]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7814554900.mp3?updated=1720030276" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Welcome to New York, it's been waitin' for you. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/291/notes</link>
      <description>Joshua Miller from Proofpoint joins Dave to discuss findings on "Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware." In mid May, TA453, also known as Charming Kitten, APT42, Mint Sandstorm, and Yellow Garuda, was found sending a benign conversation lure masquerading as a senior fellow with the Royal United Services Institute (RUSI) to the public media contact for a nuclear security expert at a US-based think tank focused on foreign affairs.
The research states that "the email solicited feedback on a project called “Iran in the Global Security Context” and requested permission to send a draft for review." Proofpoint shares it's findings and what you can expect from the threat group.
The research can be found here:
Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Jul 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Welcome to New York, it's been waitin' for you. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>291</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joshua Miller from Proofpoint joins Dave to discuss findings on "Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware." In mid May, TA453, also known as Charming Kitten, APT42, Mint Sandstorm, and Yellow Garuda, was found sending a benign conversation lure masquerading as a senior fellow with the Royal United Services Institute (RUSI) to the public media contact for a nuclear security expert at a US-based think tank focused on foreign affairs.
The research states that "the email solicited feedback on a project called “Iran in the Global Security Context” and requested permission to send a draft for review." Proofpoint shares it's findings and what you can expect from the threat group.
The research can be found here:
Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joshua Miller from Proofpoint joins Dave to discuss findings on "Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware." In mid May, TA453, also known as Charming Kitten, APT42, Mint Sandstorm, and Yellow Garuda, was found sending a benign conversation lure masquerading as a senior fellow with the Royal United Services Institute (RUSI) to the public media contact for a nuclear security expert at a US-based think tank focused on foreign affairs.</p><p>The research states that "the email solicited feedback on a project called “Iran in the Global Security Context” and requested permission to send a draft for review." Proofpoint shares it's findings and what you can expect from the threat group.</p><p>The research can be found here:</p><ul><li><a href="https://www.proofpoint.com/us/blog/threat-insight/welcome-new-york-exploring-ta453s-foray-lnks-and-mac-malware">Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1112</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7b601a88-3894-11ef-9f82-2f9e03c1f767]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7067483658.mp3?updated=1719940441" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Deep dive into the 2024 Incident Response Report with Unit 42's Michael "Siko" Sikorski [Threat Vector]</title>
      <link>https://thecyberwire.com/podcasts/threat-vector/16/notes</link>
      <description>As our team is offline taking an extended break for the July 4th Independence Day holiday in the US, we thought you'd enjoy an episode from one of N2K Network shows, Threat Vector.

This episode of Threat Vector outlines a conversation between host David Moulton, Director of Thought Leadership at Palo Alto Networks Unit 42,  and Michael "Siko" Sikorski, Unit 42's CTO and VP of Engineering, discussing the Unit 42's 2024 Incident Response Report. 
They provide insights into key cyber threats and trends, including preferred attack vectors, the escalating use of AI by threat actors, software vulnerabilities, the concept of 'living off the land' attacks, and the importance of robust incident response strategies. They also address the rising trend of business disruption supply chain attacks and share recommendations for mitigating these cyber threats.
Resources:

Read the 2024 Unit 42 Incident Response report.

Listen to Beyond the Breach: Strategies Against Ivanti Vulnerabilities. 


﻿Join the conversation on our social media channels:


Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/unit42⁠⁠⁠⁠



Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠



Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠



LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠



YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠



Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠



About Threat Vector
Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.

Palo Alto Networks
Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 05 Jul 2024 05:00:00 -0000</pubDate>
      <itunes:title>Deep dive into the 2024 Incident Response Report with Unit 42's Michael "Siko" Sikorski [Threat Vector]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/85229b96-34bf-11ef-9ebe-f7ff7ce3281e/image/9addc9a593d8ebd3ba02bd8fc582047a.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>As our team is offline taking an extended break for the July 4th Independence Day holiday in the US, we thought you'd enjoy an episode from one of N2K Network shows, Threat Vector.

This episode of Threat Vector outlines a conversation between host David Moulton, Director of Thought Leadership at Palo Alto Networks Unit 42,  and Michael "Siko" Sikorski, Unit 42's CTO and VP of Engineering, discussing the Unit 42's 2024 Incident Response Report. 
They provide insights into key cyber threats and trends, including preferred attack vectors, the escalating use of AI by threat actors, software vulnerabilities, the concept of 'living off the land' attacks, and the importance of robust incident response strategies. They also address the rising trend of business disruption supply chain attacks and share recommendations for mitigating these cyber threats.
Resources:

Read the 2024 Unit 42 Incident Response report.

Listen to Beyond the Breach: Strategies Against Ivanti Vulnerabilities. 


﻿Join the conversation on our social media channels:


Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/unit42⁠⁠⁠⁠



Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠



Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠



LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠



YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠



Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠



About Threat Vector
Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.

Palo Alto Networks
Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong><em>As our team is offline taking an extended break for the July 4th Independence Day holiday in the US, we thought you'd enjoy an episode from one of N2K Network shows, </em></strong><a href="https://thecyberwire.com/podcasts/threat-vector"><strong><em>Threat Vector</em></strong></a><strong><em>.</em></strong></p><p><br></p><p>This episode of Threat Vector outlines a conversation between host <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a>, Director of Thought Leadership at Palo Alto Networks <a href="https://unit42.paloaltonetworks.com/">Unit 42</a>,  and <a href="https://www.linkedin.com/in/mikesiko/">Michael "Siko" Sikorski</a>, Unit 42's CTO and VP of Engineering, discussing the Unit 42's <a href="https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report">2024 Incident Response Report</a>. </p><p>They provide insights into key cyber threats and trends, including preferred attack vectors, the escalating use of AI by threat actors, software vulnerabilities, the concept of 'living off the land' attacks, and the importance of robust incident response strategies. They also address the rising trend of business disruption supply chain attacks and share recommendations for mitigating these cyber threats.</p><h3>Resources:</h3><ul>
<li>Read the <a href="https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report">2024 Unit 42 Incident Response report</a>.</li>
<li>Listen to <a href="https://thecyberwire.com/podcasts/threat-vector/15/notes">Beyond the Breach: Strategies Against Ivanti Vulnerabilities</a>. </li>
</ul><h3><br></h3><h3><strong>﻿Join the conversation on our social media channels:</strong></h3><ul>
<li>
<strong>Website</strong>: <a href="https://www.paloaltonetworks.com/unit42">⁠⁠⁠⁠https://www.paloaltonetworks.com/unit42⁠⁠⁠⁠</a>
</li>
<li>
<strong>Threat Research: </strong><a href="https://unit42.paloaltonetworks.com/">⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠</a>
</li>
<li>
<strong>Facebook: </strong><a href="https://www.facebook.com/LifeatPaloAltoNetworks/">⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠</a>
</li>
<li>
<strong>LinkedIn: </strong><a href="https://www.linkedin.com/company/unit42/">⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠</a>
</li>
<li>
<strong>YouTube: </strong><a href="https://www.youtube.com/channel/UCvJQO11qoCHYwZ4Ah4Jf-Tw">⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠</a>
</li>
<li>
<strong>Twitter: </strong><a href="https://twitter.com/PaloAltoNtwks">⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠</a>
</li>
</ul><p><br></p><h3><strong>About Threat Vector</strong></h3><p>Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.</p><p><br></p><p><strong>Palo Alto Networks</strong></p><p>Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. <a href="http://paloaltonetworks.com/">⁠http://paloaltonetworks.com⁠</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2589</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[85229b96-34bf-11ef-9ebe-f7ff7ce3281e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7125828012.mp3?updated=1719521673" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: The curious case of the missing IcedID. [Only Malware in the Building]</title>
      <link>https://thecyberwire.com/podcasts/only-malware-in-the-building/1/notes</link>
      <description>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. 
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about "The curious case of the missing IcedID." 
IcedID is a malware originally classified as a banking trojan and was first observed in 2017. It also acts as a loader for other malware, including ransomware, and was a favored payload used by multiple cybercriminal threat actors until fall 2023. 
Then, it all but disappeared. In its place, a new threat crawled: Latrodectus. Named after a spider, this new malware, created by the same people as IcedID, is now poised to take over where IcedID melted off. 
Today we look back at what happened to the once prominent payload, and what its successor’s spinning web of activity means for the overall landscape. 

And be sure to check out the latest episode of Only Malware in the Building here. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 04 Jul 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: The curious case of the missing IcedID. [Only Malware in the Building]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K Networks Dave Bittner and Rick Howard to uncover the stories behind notable cyberattacks. 
Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about "The curious case of the missing IcedID." 
IcedID is a malware originally classified as a banking trojan and was first observed in 2017. It also acts as a loader for other malware, including ransomware, and was a favored payload used by multiple cybercriminal threat actors until fall 2023. 
Then, it all but disappeared. In its place, a new threat crawled: Latrodectus. Named after a spider, this new malware, created by the same people as IcedID, is now poised to take over where IcedID melted off. 
Today we look back at what happened to the once prominent payload, and what its successor’s spinning web of activity means for the overall landscape. 

And be sure to check out the latest episode of Only Malware in the Building here. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is <a href="https://www.linkedin.com/in/selenalarson/">Selena Larson</a>, <a href="https://www.proofpoint.com/">Proofpoint</a> intelligence analyst and host of their podcast <a href="https://www.proofpoint.com/us/podcasts/discarded">DISCARDED</a>. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by <a href="https://www.n2k.com/">N2K</a> Networks <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> and <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> to uncover the stories behind notable cyberattacks. </p><p>Being a security researcher is a bit like being a detective: you gather clues, analyze the evidence, and consult the experts to solve the cyber puzzle. On this episode, we talk about "The curious case of the missing IcedID." </p><p>IcedID is a malware originally classified as a banking trojan and was first observed in 2017. It also acts as a loader for other malware, including ransomware, and was a favored payload used by multiple cybercriminal threat actors until fall 2023. </p><p>Then, it all but disappeared. In its place, a new threat crawled: Latrodectus. Named after a spider, this new malware, created by the same people as IcedID, is now poised to take over where IcedID melted off. </p><p>Today we look back at what happened to the once prominent payload, and what its successor’s spinning web of activity means for the overall landscape. </p><p><br></p><p>And be sure to check out the latest episode of Only Malware in the Building <a href="https://thecyberwire.com/podcasts/only-malware-in-the-building/2/notes">here</a>. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1378</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[48fbf48c-34bf-11ef-b362-83bb6760b22a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4597705239.mp3?updated=1719519730" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Supreme Court is bringing a judicial shakeup.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2101/notes</link>
      <description>The Supreme Court overturning Chevron deference brings uncertainty to cyber regulations. Stolen credentials unmask online sex abusers. CISA updates online maritime resilience tools. Patelco Credit Union suffers a ransomware attack. Spanish and Portuguese police arrested 54 individuals involved in a vishing fraud scheme. Splunk patches critical vulnerabilities in their enterprise offerings. HHS fines a Pennsylvania-based Health System $950,000 for potential HIPAA violations related to NotPetya. CISOs look to mitigate personal risks. On the Learning Layer we reveal the long-awaited results of Joe Carrigan’s CISSP certification journey. Avoiding an Independence Day grill-security flare-up. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Learning Layer
On today's Learning Layer segment, we share the results of Joe Carrigan's CISSP exam attempt! Hint: the test ended at 100 questions...Tune in to hear host Sam Meisenberg and Joe reflect on his test day experience and what advice he has for others who are in the homestretch of their studies.
Note, Joe's ISC2 CISSP certification journey used N2K’s comprehensive CISSP training course.

Selected Reading
US Supreme Court ruling will likely cause cyber regulation chaos (CSO Online)
Stolen credentials could unmask thousands of darknet child abuse website users (The Record)
CISA updates MTS Guide with enhanced tools for resilience assessment in maritime infrastructure (Industrial Cyber)
American Patelco Credit Union suffered a ransomware attack (Security Affairs)
Dozens of Arrests Disrupt €2.5m Vishing Gang (Infosecurity Magazine)
Splunk Patches High-Severity Vulnerabilities in Enterprise Product (SecurityWeek)
Feds Hit Health Entity With $950K Fine in Ransomware Attack (GovInfo Security)
How CISOs can protect their personal liability (CSO Online)
Traeger Grill D2 Wi-Fi Controller, Version 2.02.04 (Bishop Fox)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 03 Jul 2024 20:10:00 -0000</pubDate>
      <itunes:title>The Supreme Court is bringing a judicial shakeup.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2101</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The Supreme Court overturning Chevron deference brings uncertainty to cyber regulations. Stolen credentials unmask online sex abusers. CISA updates online maritime resilience tools. Patelco Credit Union suffers a ransomware attack. Spanish and Portuguese police arrested 54 individuals involved in a vishing fraud scheme. Splunk patches critical vulnerabilities in their enterprise offerings. HHS fines a Pennsylvania-based Health System $950,000 for potential HIPAA violations related to NotPetya. CISOs look to mitigate personal risks. On the Learning Layer we reveal the long-awaited results of Joe Carrigan’s CISSP certification journey. Avoiding an Independence Day grill-security flare-up. 
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Learning Layer
On today's Learning Layer segment, we share the results of Joe Carrigan's CISSP exam attempt! Hint: the test ended at 100 questions...Tune in to hear host Sam Meisenberg and Joe reflect on his test day experience and what advice he has for others who are in the homestretch of their studies.
Note, Joe's ISC2 CISSP certification journey used N2K’s comprehensive CISSP training course.

Selected Reading
US Supreme Court ruling will likely cause cyber regulation chaos (CSO Online)
Stolen credentials could unmask thousands of darknet child abuse website users (The Record)
CISA updates MTS Guide with enhanced tools for resilience assessment in maritime infrastructure (Industrial Cyber)
American Patelco Credit Union suffered a ransomware attack (Security Affairs)
Dozens of Arrests Disrupt €2.5m Vishing Gang (Infosecurity Magazine)
Splunk Patches High-Severity Vulnerabilities in Enterprise Product (SecurityWeek)
Feds Hit Health Entity With $950K Fine in Ransomware Attack (GovInfo Security)
How CISOs can protect their personal liability (CSO Online)
Traeger Grill D2 Wi-Fi Controller, Version 2.02.04 (Bishop Fox)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Supreme Court overturning Chevron deference brings uncertainty to cyber regulations. Stolen credentials unmask online sex abusers. CISA updates online maritime resilience tools. Patelco Credit Union suffers a ransomware attack. Spanish and Portuguese police arrested 54 individuals involved in a vishing fraud scheme. Splunk patches critical vulnerabilities in their enterprise offerings. HHS fines a Pennsylvania-based Health System $950,000 for potential HIPAA violations related to NotPetya. CISOs look to mitigate personal risks. On the Learning Layer we reveal the long-awaited results of Joe Carrigan’s CISSP certification journey. Avoiding an Independence Day grill-security flare-up. </p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Learning Layer</h2><p>On today's Learning Layer segment, we share the results of <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a>'s CISSP exam attempt! Hint: the test ended at 100 questions...Tune in to hear host <a href="https://www.linkedin.com/in/sam-meisenberg/">Sam Meisenberg</a> and Joe reflect on his test day experience and what advice he has for others who are in the homestretch of their studies.</p><p>Note, Joe's ISC2<a href="https://www.cybervista.net/certify/cissp/"> </a><a href="https://www.cybervista.net/certify/cissp/">CISSP certification</a> journey used N2K’s comprehensive<a href="https://certify.cybervista.net/products/isc2/cissp-training-course/?utm_source=CWDP&amp;utm_medium=LL&amp;utm_campaign=HH_CISSP"> </a><a href="https://certify.cybervista.net/products/isc2/cissp-training-course/?utm_source=CWDP&amp;utm_medium=LL&amp;utm_campaign=HH_CISSP">CISSP training course</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.csoonline.com/article/2512955/us-supreme-court-ruling-will-likely-cause-cyber-regulation-chaos.html">US Supreme Court ruling will likely cause cyber regulation chaos</a> (CSO Online)</p><p><a href="https://therecord.media/stolen-credentials-csam-unmasked-report">Stolen credentials could unmask thousands of darknet child abuse website users</a> (The Record)</p><p><a href="https://industrialcyber.co/transport/cisa-updates-mts-guide-with-enhanced-tools-for-resilience-assessment-in-maritime-infrastructure/">CISA updates MTS Guide with enhanced tools for resilience assessment in maritime infrastructure </a>(Industrial Cyber)</p><p><a href="https://securityaffairs.com/165152/hacking/patelco-credit-union-ransomware-attack.html">American Patelco Credit Union suffered a ransomware attack</a> (Security Affairs)</p><p><a href="https://www.infosecurity-magazine.com/news/dozens-arrests-disrupt-25m-vishing/">Dozens of Arrests Disrupt €2.5m Vishing Gang </a>(Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/splunk-patches-high-severity-vulnerabilities-in-enterprise-product/">Splunk Patches High-Severity Vulnerabilities in Enterprise Product</a> (SecurityWeek)</p><p><a href="https://www.govinfosecurity.com/feds-hit-health-entity-950k-fine-in-ransomware-attack-a-25677">Feds Hit Health Entity With $950K Fine in Ransomware Attack</a> (GovInfo Security)</p><p><a href="https://www.csoonline.com/article/2505459/how-cisos-can-protect-their-personal-liability.html">How CISOs can protect their personal liability</a> (CSO Online)</p><p><a href="https://bishopfox.com/blog/traeger-wifi-controller-advisory">Traeger Grill D2 Wi-Fi Controller, Version 2.02.04</a> (Bishop Fox)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1645</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01d1e49a-b95e-11ee-adc6-ab4e4650bfd8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6712499210.mp3?updated=1720033552" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Take a trip down regreSSHion lane.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2100/notes</link>
      <description>A new OpenSSH vulnerability affects Linux systems. The Supreme Court sends social media censorship cases back to the lower courts. Chinese hackers exploit a new Cisco zero-day. HubSpot investigates unauthorized access to customer accounts. Japanese media giant Kadokawa confirmed data leaks from a ransomware attack. FakeBat is a popular malware loader. Volcano Demon is a hot new ransomware group. Google launches a KVM hypervisor bug bounty program.  Johannes Ullrich from SANS Technology Institute discusses defending against API attacks. Goodnight, Sleep Tight, Don’t Let the Hackers Byte!
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest is Johannes Ullrich from SANS Technology Institute talking about defending against attacks affecting APIs and dangerous new attack techniques you need to know about. This conversation is based on Johannes’ presentations at the 2024 RSA Conference. You can learn more about them here: 

Attack and Defend: How to Defend Against Three Attacks Affecting APIs

The Five Most Dangerous New Attack Techniques You Need to Know About


Selected Reading
New regreSSHion OpenSSH RCE bug gives root on Linux servers (Bleeping Computer)
US Supreme Court sidesteps dispute on state laws regulating social media (Reuters)
China’s ‘Velvet Ant’ hackers caught exploiting new zero-day in Cisco devices (The Record)
HubSpot accounts breach under investigation (SC Media)
Japanese anime and gaming giant admits data leak following ransomware attack (The Record)
Exposing FakeBat loader: distribution methods and adversary infrastructure (Sekoia.io blog)
Halcyon Identifies New Ransomware Operator Volcano Demon Serving Up LukaLocker (Halcyon)
Google launches Bug Bounty Program for KVM Hypervisor (Stack Diary)
How to Get Root Access to Your Sleep Number Bed (Dillan Mills)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Jul 2024 20:10:00 -0000</pubDate>
      <itunes:title>Take a trip down regreSSHion lane.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2100</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A new OpenSSH vulnerability affects Linux systems. The Supreme Court sends social media censorship cases back to the lower courts. Chinese hackers exploit a new Cisco zero-day. HubSpot investigates unauthorized access to customer accounts. Japanese media giant Kadokawa confirmed data leaks from a ransomware attack. FakeBat is a popular malware loader. Volcano Demon is a hot new ransomware group. Google launches a KVM hypervisor bug bounty program.  Johannes Ullrich from SANS Technology Institute discusses defending against API attacks. Goodnight, Sleep Tight, Don’t Let the Hackers Byte!
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest is Johannes Ullrich from SANS Technology Institute talking about defending against attacks affecting APIs and dangerous new attack techniques you need to know about. This conversation is based on Johannes’ presentations at the 2024 RSA Conference. You can learn more about them here: 

Attack and Defend: How to Defend Against Three Attacks Affecting APIs

The Five Most Dangerous New Attack Techniques You Need to Know About


Selected Reading
New regreSSHion OpenSSH RCE bug gives root on Linux servers (Bleeping Computer)
US Supreme Court sidesteps dispute on state laws regulating social media (Reuters)
China’s ‘Velvet Ant’ hackers caught exploiting new zero-day in Cisco devices (The Record)
HubSpot accounts breach under investigation (SC Media)
Japanese anime and gaming giant admits data leak following ransomware attack (The Record)
Exposing FakeBat loader: distribution methods and adversary infrastructure (Sekoia.io blog)
Halcyon Identifies New Ransomware Operator Volcano Demon Serving Up LukaLocker (Halcyon)
Google launches Bug Bounty Program for KVM Hypervisor (Stack Diary)
How to Get Root Access to Your Sleep Number Bed (Dillan Mills)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A new OpenSSH vulnerability affects Linux systems. The Supreme Court sends social media censorship cases back to the lower courts. Chinese hackers exploit a new Cisco zero-day. HubSpot investigates unauthorized access to customer accounts. Japanese media giant Kadokawa confirmed data leaks from a ransomware attack. FakeBat is a popular malware loader. Volcano Demon is a hot new ransomware group. Google launches a KVM hypervisor bug bounty program.  Johannes Ullrich from SANS Technology Institute discusses defending against API attacks. Goodnight, Sleep Tight, Don’t Let the Hackers Byte!</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest is <a href="https://www.linkedin.com/in/johannesullrich/">Johannes Ullrich</a> from SANS Technology Institute talking about defending against attacks affecting APIs and dangerous new attack techniques you need to know about. This conversation is based on Johannes’ presentations at the 2024 RSA Conference. You can learn more about them here: </p><ul>
<li><a href="https://www.rsaconference.com/Library/presentation/usa/2024/attack%20and%20defend%20how%20to%20defend%20against%20three%20attacks%20affecting%20apis">Attack and Defend: How to Defend Against Three Attacks Affecting APIs</a></li>
<li><a href="https://www.rsaconference.com/Library/presentation/usa/2024/the%20five%20most%20dangerous%20new%20attack%20techniques%20you%20need%20to%20know%20about">The Five Most Dangerous New Attack Techniques You Need to Know About</a></li>
</ul><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/new-regresshion-openssh-rce-bug-gives-root-on-linux-servers/">New regreSSHion OpenSSH RCE bug gives root on Linux servers</a> (Bleeping Computer)</p><p><a href="https://www.reuters.com/legal/us-supreme-court-set-decide-fate-texas-florida-social-media-laws-2024-07-01/">US Supreme Court sidesteps dispute on state laws regulating social media</a> (Reuters)</p><p><a href="https://therecord.media/cisco-velvet-ant-hackers-china">China’s ‘Velvet Ant’ hackers caught exploiting new zero-day in Cisco devices</a> (The Record)</p><p><a href="https://www.scmagazine.com/brief/hubspot-accounts-breach-under-investigation">HubSpot accounts breach under investigation</a> (SC Media)</p><p><a href="https://therecord.media/japan-anime-giant-data-leak-ransomware">Japanese anime and gaming giant admits data leak following ransomware attack</a> (The Record)</p><p><a href="https://blog.sekoia.io/exposing-fakebat-loader-distribution-methods-and-adversary-infrastructure/">Exposing FakeBat loader: distribution methods and adversary infrastructure</a> (Sekoia.io blog)</p><p><a href="https://www.halcyon.ai/blog/halcyon-identifies-new-ransomware-operator-volcano-demon-serving-up-lukalocker">Halcyon Identifies New Ransomware Operator Volcano Demon Serving Up LukaLocker</a> (Halcyon)</p><p><a href="https://stackdiary.com/google-launches-bug-bounty-program-for-kvm-hypervisor/">Google launches Bug Bounty Program for KVM Hypervisor</a> (Stack Diary)</p><p><a href="https://dillan.org/articles/how-to-get-root-access-to-your-sleep-number-bed">How to Get Root Access to Your Sleep Number Bed</a> (Dillan Mills)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1714</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01993a00-b95e-11ee-adc6-73fca78fa5bf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3628164260.mp3?updated=1719949249" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A swift fix for a serious router bug.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2099/notes</link>
      <description>Juniper issues an emergency patch for its routers. A compromised helpdesk portal sends out phishing emails. Prudential updates the victim count in their February data breach. Rapid7 finds trojanized software installers in apps from a popular developer in India. Australian authorities arrest a man for running a fake mile-high WiFi network. Florida Man's Violent Bid for Bitcoin Ends Behind Bars. N2K’s CSO Rick Howard for a preview of his latest CSO Perspectives podcast episode on The Current State of Identity and Access Management (IAM). A scholarship scammer gets a one-way ticket home.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CSO Perspectives preview
N2K’s CSO Rick Howard for a preview of his latest CSO Perspectives podcast episode on The Current State of Identity and Access Management (IAM): A Rick-the-Toolman episode. N2K CyberWire Pro members can find the full episode here. Rick’s accompanying essay can be found here. If you are not yet an N2K CyberWire Pro member, you can get a preview of the episode here. 

Selected Reading
Juniper Networks Warns of Critical Authentication Bypass Vulnerability (SecurityWeek)
Router maker's support portal hacked, replies with MetaMask phishing (Bleeping Computer)
Prudential Financial Data Breach Impacts 2.5 Million (SecurityWeek)
Supply Chain Compromise Leads to Trojanized Installers for Notezilla, RecentX, Copywhiz (Rapid7 Blog)
Police allege ‘evil twin’ in-flight Wi-Fi used to steal info (The Register)
Inside a violent gang’s ruthless crypto-stealing home invasion spree (ARS Technica)
Cyber insurance costs finally stabilising, says Howden (Tech Monitor)
AI Transcript, Fake School Website: Student’s US Scholarship Scam Exposed on Reddit (Hackread)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 01 Jul 2024 20:30:00 -0000</pubDate>
      <itunes:title>A swift fix for a serious router bug.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2099</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Juniper issues an emergency patch for its routers. A compromised helpdesk portal sends out phishing emails. Prudential updates the victim count in their February data breach. Rapid7 finds trojanized software installers in apps from a popular developer in India. Australian authorities arrest a man for running a fake mile-high WiFi network. Florida Man's Violent Bid for Bitcoin Ends Behind Bars. N2K’s CSO Rick Howard for a preview of his latest CSO Perspectives podcast episode on The Current State of Identity and Access Management (IAM). A scholarship scammer gets a one-way ticket home.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CSO Perspectives preview
N2K’s CSO Rick Howard for a preview of his latest CSO Perspectives podcast episode on The Current State of Identity and Access Management (IAM): A Rick-the-Toolman episode. N2K CyberWire Pro members can find the full episode here. Rick’s accompanying essay can be found here. If you are not yet an N2K CyberWire Pro member, you can get a preview of the episode here. 

Selected Reading
Juniper Networks Warns of Critical Authentication Bypass Vulnerability (SecurityWeek)
Router maker's support portal hacked, replies with MetaMask phishing (Bleeping Computer)
Prudential Financial Data Breach Impacts 2.5 Million (SecurityWeek)
Supply Chain Compromise Leads to Trojanized Installers for Notezilla, RecentX, Copywhiz (Rapid7 Blog)
Police allege ‘evil twin’ in-flight Wi-Fi used to steal info (The Register)
Inside a violent gang’s ruthless crypto-stealing home invasion spree (ARS Technica)
Cyber insurance costs finally stabilising, says Howden (Tech Monitor)
AI Transcript, Fake School Website: Student’s US Scholarship Scam Exposed on Reddit (Hackread)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Juniper issues an emergency patch for its routers. A compromised helpdesk portal sends out phishing emails. Prudential updates the victim count in their February data breach. Rapid7 finds trojanized software installers in apps from a popular developer in India. Australian authorities arrest a man for running a fake mile-high WiFi network. Florida Man's Violent Bid for Bitcoin Ends Behind Bars. N2K’s CSO Rick Howard for a preview of his latest CSO Perspectives podcast episode on The Current State of Identity and Access Management (IAM). A scholarship scammer gets a one-way ticket home.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CSO Perspectives preview</h2><p>N2K’s CSO Rick Howard for a preview of his latest CSO Perspectives podcast episode on The Current State of Identity and Access Management (IAM): A Rick-the-Toolman episode. N2K CyberWire Pro members can find the full episode here. Rick’s accompanying essay can be found here. If you are not yet an N2K CyberWire Pro member, you can get a preview of the episode here. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/juniper-networks-warns-of-critical-authentication-bypass-vulnerability/">Juniper Networks Warns of Critical Authentication Bypass Vulnerability</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/router-makers-support-portal-hacked-replies-with-metamask-phishing/">Router maker's support portal hacked, replies with MetaMask phishing</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/prudential-financial-data-breach-impacts-2-5-million/">Prudential Financial Data Breach Impacts 2.5 Million</a> (SecurityWeek)</p><p><a href="https://www.rapid7.com/blog/post/2024/06/27/supply-chain-compromise-leads-to-trojanized-installers-for-notezilla-recentx-copywhiz/">Supply Chain Compromise Leads to Trojanized Installers for Notezilla, RecentX, Copywhiz</a> (Rapid7 Blog)</p><p><a href="https://www.theregister.com/2024/07/01/australia_evil_twin_wifi_airline_attack/">Police allege ‘evil twin’ in-flight Wi-Fi used to steal info</a> (The Register)</p><p><a href="https://arstechnica.com/security/2024/06/inside-a-violent-gangs-ruthless-crypto-stealing-home-invasion-spree/">Inside a violent gang’s ruthless crypto-stealing home invasion spree</a> (ARS Technica)</p><p><a href="https://techmonitor.ai/technology/cybersecurity/cyber-insurance-stabilising">Cyber insurance costs finally stabilising, says Howden</a> (Tech Monitor)</p><p><a href="https://hackread.com/ai-transcript-fake-school-site-student-scholarship-scam-reddit/">AI Transcript, Fake School Website: Student’s US Scholarship Scam Exposed on Reddit</a> (Hackread)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1306</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0161ad6a-b95e-11ee-adc6-171e51fcc552]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7069997557.mp3?updated=1719862635" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The current state of IAM: A Rick-the-toolman episode. </title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/91/notes</link>
      <description>Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K CyberWire, discusses the current state of Identity and Access Management (IAM) with CyberWire Hash Table guests Ted Wagner, SAP National Security Services, and Cassio Sampaio Chief Product Officer for Customer Identity, at Okta.

References:
John Kindervag, 2010. No More Chewy Centers: Introducing The Zero Trust Model Of Information Security [White Paper]. Palo Alto Networks.
Kim Key, 2024. Passkeys: What They Are and Why You Need Them ASAP [Explainer]. PCMag.
Lance Whitney, 2023. No More Passwords: How to Set Up Apple’s Passkeys for Easy Sign-ins [Explainer]. PCMag.
Rick Howard, 2022. Two-factor authentication: A Rick the Toolman episode [Podcast]. CSO Perspectives Podcast - The CyberWire.
Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads.
Rick Howard, 2023. Cybersecurity First Principles Appendix [Book Page]. N2K CyberWire.
Rick Howard, 2023. passkey (noun) [Podcast]. Word Notes Podcast - The CyberWire.
Staff, 2023. 2023 Gartner® Magic QuadrantTM for Access Management [Report]. Okta.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 01 Jul 2024 06:00:00 -0000</pubDate>
      <itunes:title>The current state of IAM: A Rick-the-toolman episode.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>91</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K CyberWire, discusses the current state of Identity and Access Management (IAM) with CyberWire Hash Table guests Ted Wagner, SAP National Security Services, and Cassio Sampaio Chief Product Officer for Customer Identity, at Okta.

References:
John Kindervag, 2010. No More Chewy Centers: Introducing The Zero Trust Model Of Information Security [White Paper]. Palo Alto Networks.
Kim Key, 2024. Passkeys: What They Are and Why You Need Them ASAP [Explainer]. PCMag.
Lance Whitney, 2023. No More Passwords: How to Set Up Apple’s Passkeys for Easy Sign-ins [Explainer]. PCMag.
Rick Howard, 2022. Two-factor authentication: A Rick the Toolman episode [Podcast]. CSO Perspectives Podcast - The CyberWire.
Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads.
Rick Howard, 2023. Cybersecurity First Principles Appendix [Book Page]. N2K CyberWire.
Rick Howard, 2023. passkey (noun) [Podcast]. Word Notes Podcast - The CyberWire.
Staff, 2023. 2023 Gartner® Magic QuadrantTM for Access Management [Report]. Okta.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K CyberWire, discusses the current state of Identity and Access Management (IAM) with CyberWire Hash Table guests Ted Wagner, SAP National Security Services, and Cassio Sampaio Chief Product Officer for Customer Identity, at Okta.</p><p><br></p><h2>References:</h2><p><a href="https://media.paloaltonetworks.com/documents/Forrester-No-More-Chewy-Centers.pdf">John Kindervag, 2010. No More Chewy Centers: Introducing The Zero Trust Model Of Information Security [White Paper]. Palo Alto Networks.</a></p><p><a href="https://www.pcmag.com/explainers/passwordless-authentication-what-it-is-and-why-you-need-it-asap">Kim Key, 2024. Passkeys: What They Are and Why You Need Them ASAP [Explainer]. PCMag.</a></p><p><a href="https://www.pcmag.com/how-to/no-more-passwords-how-to-set-up-apples-passkeys-for-easy-sign-ins">Lance Whitney, 2023. No More Passwords: How to Set Up Apple’s Passkeys for Easy Sign-ins [Explainer]. PCMag.</a></p><p><a href="https://thecyberwire.com/stories/fad1b54cf7d54837834e26cb68ae9ab6/two-factor-authentication-a-rick-the-toolman-episode">Rick Howard, 2022. Two-factor authentication: A Rick the Toolman episode [Podcast]. CSO Perspectives Podcast - The CyberWire.</a></p><p><a href="https://www.goodreads.com/book/show/75671183-cybersecurity-first-principles">Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads.</a></p><p><a href="https://www.n2k.com/cybersecurityfirstprinciplesbook">Rick Howard, 2023. Cybersecurity First Principles Appendix [Book Page]. N2K CyberWire.</a></p><p><a href="https://thecyberwire.com/podcasts/word-notes/149/transcript">Rick Howard, 2023. passkey (noun) [Podcast]. Word Notes Podcast - The CyberWire.</a></p><p><a href="https://www.okta.com/resources/gartner-magic-quadrant-access-management">Staff, 2023. 2023 Gartner® Magic QuadrantTM for Access Management [Report]. Okta.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>941</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f2ae71e2-358e-11ef-aa5c-9f9b73bae0a6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6371863643.mp3?updated=1719843217" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Carole Theriault: Constantly learning new things. [Media] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/22/notes</link>
      <description>Communications consultant and podcaster Carole Theriault always loved radio and through her career dabbled in many areas .She landed in a communications and podcasting role where she helps technical firms create audio and digital content. In fact, Carole is the CyberWire's UK Correspondent. She says cybersecurity is good place to go because of the many different avenues available and "you don't even have to be a tech head" (though Carole has quite a technical pedigree). Our thanks to Carole for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 30 Jun 2024 05:00:00 -0000</pubDate>
      <itunes:title>Encore: Carole Theriault: Constantly learning new things. [Media] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>22</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Communications consultant and podcaster Carole Theriault always loved radio and through her career dabbled in many areas .She landed in a communications and podcasting role where she helps technical firms create audio and digital content. In fact, Carole is the CyberWire's UK Correspondent. She says cybersecurity is good place to go because of the many different avenues available and "you don't even have to be a tech head" (though Carole has quite a technical pedigree). Our thanks to Carole for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Communications consultant and podcaster Carole Theriault always loved radio and through her career dabbled in many areas .She landed in a communications and podcasting role where she helps technical firms create audio and digital content. In fact, Carole is the CyberWire's UK Correspondent. She says cybersecurity is good place to go because of the many different avenues available and "you don't even have to be a tech head" (though Carole has quite a technical pedigree). Our thanks to Carole for sharing her story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>494</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6cea84d4-34c0-11ef-8e63-bfad5f5e70a5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9390546293.mp3?updated=1719519118" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>APT36's cyber blitz on India. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/336/notes</link>
      <description>Ismael Valenzuela, Vice President Threat Research &amp; Intelligence, from Blackberry Threat Research and Intelligence team is discussing their work on "Transparent Tribe Targets Indian Government, Defense, and Aerospace Sectors Leveraging Cross-Platform Programming Languages." BlackBerry has identified Transparent Tribe (APT36), a Pakistani-based advanced persistent threat group, targeting India's government, defense, and aerospace sectors from late 2023 to April 2024, using evolving toolkits and exploiting web services like Telegram and Google Drive. 
Evidence such as time zone settings and spear-phishing emails with Pakistani IP addresses supports their attribution, suggesting alignment with Pakistan's interests.
The research can be found here:
Transparent Tribe Targets Indian Government, Defense, and Aerospace Sectors Leveraging Cross-Platform Programming Languages

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 Jun 2024 07:00:00 -0000</pubDate>
      <itunes:title>APT36's cyber blitz on India. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>336</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ismael Valenzuela, Vice President Threat Research &amp; Intelligence, from Blackberry Threat Research and Intelligence team is discussing their work on "Transparent Tribe Targets Indian Government, Defense, and Aerospace Sectors Leveraging Cross-Platform Programming Languages." BlackBerry has identified Transparent Tribe (APT36), a Pakistani-based advanced persistent threat group, targeting India's government, defense, and aerospace sectors from late 2023 to April 2024, using evolving toolkits and exploiting web services like Telegram and Google Drive. 
Evidence such as time zone settings and spear-phishing emails with Pakistani IP addresses supports their attribution, suggesting alignment with Pakistan's interests.
The research can be found here:
Transparent Tribe Targets Indian Government, Defense, and Aerospace Sectors Leveraging Cross-Platform Programming Languages

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ismael Valenzuela, Vice President Threat Research &amp; Intelligence, from Blackberry Threat Research and Intelligence team is discussing their work on "Transparent Tribe Targets Indian Government, Defense, and Aerospace Sectors Leveraging Cross-Platform Programming Languages." BlackBerry has identified Transparent Tribe (APT36), a Pakistani-based advanced persistent threat group, targeting India's government, defense, and aerospace sectors from late 2023 to April 2024, using evolving toolkits and exploiting web services like Telegram and Google Drive. </p><p>Evidence such as time zone settings and spear-phishing emails with Pakistani IP addresses supports their attribution, suggesting alignment with Pakistan's interests.</p><p>The research can be found here:</p><ul><li><a href="https://blogs.blackberry.com/en/2024/05/transparent-tribe-targets-indian-government-defense-and-aerospace-sectors">Transparent Tribe Targets Indian Government, Defense, and Aerospace Sectors Leveraging Cross-Platform Programming Languages</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1133</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[80e7ea2a-358e-11ef-8bf9-57df624f1b02]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3595703640.mp3?updated=1719607933" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>TeamViewer and APT29 go toe to toe. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2098/notes</link>
      <description>TeamViewer tackles APT29 intrusion. Microsoft widens email breach alerts. Uncovering a malware epidemic. Google's distrust on Entrust. Safeguarding critical systems. FTC vs. MGM. Don’t forget to backup your data. Polyfill's accidental exposé. Our guest is Caitlyn Shim, Director of AWS Cloud Governance, and she recently joined N2K’s Rick Howard at AWS re:Inforce event. They're discussing  cloud governance, the growth and development of AWS, and diversity. And a telecom titan becomes telecom terror.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Caitlyn Shim, Director of AWS Cloud Governance, joined N2K’s Rick Howard at AWS re:Inforce event recently in Philadelphia, PA. They spoke about cloud governance, the growth and development of AWS, and diversity. Caitlyn was part of the Women of Amazon Security Panel at the event. You can read more about Caitlyn and her colleagues as they discuss their diverse paths into security and offer advice for those looking to enter the field  here. 

Selected Reading
TeamViewer investigating intrusion of corporate IT environment (The Record)
Microsoft reveals further emails compromised by Russian hack (Engadget)
Chicago Children's Hospital Says 791,000 Impacted by Ransomware Attack (SecurityWeek)
Unfurling Hemlock: New threat group uses cluster bomb campaign to distribute malware (Outpost 24)
Google to block sites using Entrust certificates in bombshell move (The Stack) 
US House Subcommittee examines critical infrastructure vulnerabilities, role of cyber insurance in resilience efforts (Industrial Cyber) 
FTC Defends Investigation Into Cyberattack on MGM as Casino Giant Seeks to Block Probe (The National Law Journal)
This is why you need backups: A cyber attack on an Indonesian data center caused havoc for public services – and its forcing a national rethink on data security (ITPro)
Polyfill.io, BootCDN, Bootcss, Staticfile attack traced to 1 operator (Bleeping Computer) 
ISP Sends Malware to Thousands of Customers to Stop Using File-Sharing Services (Cybersecurity News)  

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 28 Jun 2024 20:10:00 -0000</pubDate>
      <itunes:title>TeamViewer and APT29 go toe to toe. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2098</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>TeamViewer tackles APT29 intrusion. Microsoft widens email breach alerts. Uncovering a malware epidemic. Google's distrust on Entrust. Safeguarding critical systems. FTC vs. MGM. Don’t forget to backup your data. Polyfill's accidental exposé. Our guest is Caitlyn Shim, Director of AWS Cloud Governance, and she recently joined N2K’s Rick Howard at AWS re:Inforce event. They're discussing  cloud governance, the growth and development of AWS, and diversity. And a telecom titan becomes telecom terror.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Caitlyn Shim, Director of AWS Cloud Governance, joined N2K’s Rick Howard at AWS re:Inforce event recently in Philadelphia, PA. They spoke about cloud governance, the growth and development of AWS, and diversity. Caitlyn was part of the Women of Amazon Security Panel at the event. You can read more about Caitlyn and her colleagues as they discuss their diverse paths into security and offer advice for those looking to enter the field  here. 

Selected Reading
TeamViewer investigating intrusion of corporate IT environment (The Record)
Microsoft reveals further emails compromised by Russian hack (Engadget)
Chicago Children's Hospital Says 791,000 Impacted by Ransomware Attack (SecurityWeek)
Unfurling Hemlock: New threat group uses cluster bomb campaign to distribute malware (Outpost 24)
Google to block sites using Entrust certificates in bombshell move (The Stack) 
US House Subcommittee examines critical infrastructure vulnerabilities, role of cyber insurance in resilience efforts (Industrial Cyber) 
FTC Defends Investigation Into Cyberattack on MGM as Casino Giant Seeks to Block Probe (The National Law Journal)
This is why you need backups: A cyber attack on an Indonesian data center caused havoc for public services – and its forcing a national rethink on data security (ITPro)
Polyfill.io, BootCDN, Bootcss, Staticfile attack traced to 1 operator (Bleeping Computer) 
ISP Sends Malware to Thousands of Customers to Stop Using File-Sharing Services (Cybersecurity News)  

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>TeamViewer tackles APT29 intrusion. Microsoft widens email breach alerts. Uncovering a malware epidemic. Google's distrust on Entrust. Safeguarding critical systems. FTC vs. MGM. Don’t forget to backup your data. Polyfill's accidental exposé. Our guest is Caitlyn Shim, Director of AWS Cloud Governance, and she recently joined N2K’s Rick Howard at AWS re:Inforce event. They're discussing  cloud governance, the growth and development of AWS, and diversity. And a telecom titan becomes telecom terror.</p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/caitlynshim/">Caitlyn Shim</a>, Director of <a href="https://aws.amazon.com/cloudops/cloud-governance/">AWS Cloud Governance</a>, joined <a href="https://www.n2k.com/">N2K</a>’s <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> at <a href="https://reinforce.awsevents.com/">AWS re:Inforce</a> event recently in Philadelphia, PA. They spoke about cloud governance, the growth and development of AWS, and diversity. Caitlyn was part of the Women of Amazon Security Panel at the event. You can read more about Caitlyn and her colleagues as they discuss their diverse paths into security and offer advice for those looking to enter the field  <a href="https://aws.amazon.com/careers/life-at-aws-9-women-leading-cloud-security-at-amazon-and-aws/">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/teamviewer-investigating-intrusion-it">TeamViewer investigating intrusion of corporate IT environment</a> (The Record)</p><p><a href="https://www.engadget.com/microsoft-reveals-further-emails-compromised-by-russian-hack-130014275.html">Microsoft reveals further emails compromised by Russian hack</a> (Engadget)</p><p><a href="https://www.securityweek.com/chicago-childrens-hospital-says-791000-impacted-by-ransomware-attack/">Chicago Children's Hospital Says 791,000 Impacted by Ransomware Attack</a> (SecurityWeek)</p><p><a href="https://outpost24.com/blog/unfurling-hemlock-cluster-bomb-campaign/">Unfurling Hemlock: New threat group uses cluster bomb campaign to distribute malware</a> (Outpost 24)</p><p><a href="https://www.thestack.technology/google-to-block-sites-using-entrust-certificates-in-bombshell-move/">Google to block sites using Entrust certificates in bombshell move</a> (The Stack) </p><p><a href="https://industrialcyber.co/news/us-house-subcommittee-examines-critical-infrastructure-vulnerabilities-role-of-cyber-insurance-in-resilience-efforts/">US House Subcommittee examines critical infrastructure vulnerabilities, role of cyber insurance in resilience efforts</a> (Industrial Cyber) </p><p><a href="https://www.law.com/nationallawjournal/2024/06/26/ftc-defends-investigation-into-cyberattack-on-mgm-as-casino-giant-seeks-to-block-probe/?slreturn=20240527160753">FTC Defends Investigation Into Cyberattack on MGM as Casino Giant Seeks to Block Probe</a> (The National Law Journal)</p><p><a href="https://www.itpro.com/security/cyber-attacks/this-is-why-you-need-backups-a-cyber-attack-on-an-indonesian-data-center-caused-havoc-for-public-services-and-its-forcing-a-national-rethink-on-data-security">This is why you need backups: A cyber attack on an Indonesian data center caused havoc for public services – and its forcing a national rethink on data security</a> (ITPro)</p><p><a href="https://www.bleepingcomputer.com/news/security/polyfillio-bootcdn-bootcss-staticfile-attack-traced-to-1-operator/">Polyfill.io, BootCDN, Bootcss, Staticfile attack traced to 1 operator</a> (Bleeping Computer) </p><p><a href="https://cybersecuritynews.com/isp-sends-malware/#google_vignette">ISP Sends Malware to Thousands of Customers to Stop Using File-Sharing Services</a> (Cybersecurity News)  </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1373</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0129012c-b95e-11ee-adc6-235baffe03d8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8464129501.mp3?updated=1719602192" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Solution Spotlight: Progress on the National Cyber Workforce and Education Strategy. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/67/notes</link>
      <description>On this Solution Spotlight, guest Seeyew Mo, Assistant National Cyber Director, Office of the National Cyber Director at the White House, shares the nuances of the White House's skills-based approach (and how it's not only about hiring) with N2K President Simone Petrella. 

Seeyew shares a progress report on the National Cyber Workforce and Education Strategy nearly one year out. 

For more information, you can visit the press release: National Cyber Director Encourages Adoption of Skill-Based Hiring to Connect Americans to Good-Paying Cyber Jobs. 

﻿The progress report Seeyew and Simone discuss can be found here: National Cyber Workforce and Education Strategy: Initial Stages of Implementation. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 28 Jun 2024 05:00:00 -0000</pubDate>
      <itunes:title>Solution Spotlight: Progress on the National Cyber Workforce and Education Strategy. [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>67</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this Solution Spotlight, guest Seeyew Mo, Assistant National Cyber Director, Office of the National Cyber Director at the White House, shares the nuances of the White House's skills-based approach (and how it's not only about hiring) with N2K President Simone Petrella. 

Seeyew shares a progress report on the National Cyber Workforce and Education Strategy nearly one year out. 

For more information, you can visit the press release: National Cyber Director Encourages Adoption of Skill-Based Hiring to Connect Americans to Good-Paying Cyber Jobs. 

﻿The progress report Seeyew and Simone discuss can be found here: National Cyber Workforce and Education Strategy: Initial Stages of Implementation. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this Solution Spotlight, guest <a href="https://www.linkedin.com/in/seeyewmo/">Seeyew Mo</a>, Assistant National Cyber Director, <a href="https://www.whitehouse.gov/oncd/">Office of the National Cyber Director</a> at the White House, shares the nuances of the White House's skills-based approach (and how it's not only about hiring) with <a href="https://www.n2k.com/">N2K</a> President <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a>. </p><p><br></p><p>Seeyew shares a progress report on the <a href="https://www.whitehouse.gov/wp-content/uploads/2023/07/NCWES-2023.07.31.pdf">National Cyber Workforce and Education Strategy</a> nearly one year out. </p><p><br></p><p>For more information, you can visit the press release: <a href="https://www.whitehouse.gov/oncd/briefing-room/2024/04/29/press-release-wh-cyber-workforce-convening/">National Cyber Director Encourages Adoption of Skill-Based Hiring to Connect Americans to Good-Paying Cyber Jobs</a>. </p><p><br></p><p>﻿The progress report Seeyew and Simone discuss can be found here: <a href="https://www.whitehouse.gov/wp-content/uploads/2024/06/NCWES-Initial-Report-2024.06.25.pdf">National Cyber Workforce and Education Strategy: Initial Stages of Implementation</a>. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1901</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cb416558-34b5-11ef-b386-d3c7197390d6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2807976349.mp3?updated=1719515793" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>E-commerce or E-spying?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2097/notes</link>
      <description>Arkansas sues Temu over privacy issues. Polyfil returns and says they were wronged. An NYPD database was found vulnerable to manipulation. Google slays the DRAGONBRIDGE. Malwarebytes flags a new Mac stealer campaign. Patch your gas chromatographs. Microsoft warns of an AI jailbreak called Skeleton Key.  CISA tracks exploited vulnerabilities in GeoServer, the Linux kernel, and Roundcube Webmail.  In our  'Threat Vector' segment, host David Moulton speaks with Jim Foote, CEO of First Ascent Biomedical, about his transition from Chief Information Security Officer (CISO) to leading a biotech company utilizing AI to personalize cancer treatments. Metallica is not hawking metal crypto. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
In this segment of the Palo Alto Networks podcast 'Threat Vector,' host David Moulton speaks with Jim Foote, CEO of First Ascent Biomedical, about his transition from Chief Information Security Officer (CISO) to leading a biotech company utilizing AI to personalize cancer treatments. They discuss how Foote's personal experience with his son's cancer diagnosis drove him to apply cybersecurity principles in developing an innovative approach, called Functional Precision Medicine, which tailors cancer treatment to individual patients. The conversation also covers the role of mentorship, the importance of interdisciplinary skills, and the transformative potential of AI in both cybersecurity and medical fields. You can listen to the full episode here. 

Selected Reading
Arkansas AG lawsuit claims Temu’s shopping app is ‘dangerous malware’ (The Verge)
Polyfill claims it has been 'defamed', returns after domain shut down (Bleeping Computer)
NYPD officer database had security flaws that could have let hackers covertly modify officer data (City &amp; State New York)
Google TAG: New efforts to disrupt DRAGONBRIDGE spam activity (Google)
‘Poseidon’ Mac stealer distributed via Google ads (Malwarebytes)
Gas Chromatograph Hacking Could Have Serious Impact: Security Firm (SecurityWeek)
Microsoft warns of novel jailbreak affecting many generative AI models (CSO Online)
CISA Warns of Exploited GeoServer, Linux Kernel, and Roundcube Vulnerabilities (SecurityWeek)
Metallica’s X account hacked to promote crypto token (Cointelegraph)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 27 Jun 2024 20:10:00 -0000</pubDate>
      <itunes:title>E-commerce or E-spying?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2097</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Arkansas sues Temu over privacy issues. Polyfil returns and says they were wronged. An NYPD database was found vulnerable to manipulation. Google slays the DRAGONBRIDGE. Malwarebytes flags a new Mac stealer campaign. Patch your gas chromatographs. Microsoft warns of an AI jailbreak called Skeleton Key.  CISA tracks exploited vulnerabilities in GeoServer, the Linux kernel, and Roundcube Webmail.  In our  'Threat Vector' segment, host David Moulton speaks with Jim Foote, CEO of First Ascent Biomedical, about his transition from Chief Information Security Officer (CISO) to leading a biotech company utilizing AI to personalize cancer treatments. Metallica is not hawking metal crypto. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
In this segment of the Palo Alto Networks podcast 'Threat Vector,' host David Moulton speaks with Jim Foote, CEO of First Ascent Biomedical, about his transition from Chief Information Security Officer (CISO) to leading a biotech company utilizing AI to personalize cancer treatments. They discuss how Foote's personal experience with his son's cancer diagnosis drove him to apply cybersecurity principles in developing an innovative approach, called Functional Precision Medicine, which tailors cancer treatment to individual patients. The conversation also covers the role of mentorship, the importance of interdisciplinary skills, and the transformative potential of AI in both cybersecurity and medical fields. You can listen to the full episode here. 

Selected Reading
Arkansas AG lawsuit claims Temu’s shopping app is ‘dangerous malware’ (The Verge)
Polyfill claims it has been 'defamed', returns after domain shut down (Bleeping Computer)
NYPD officer database had security flaws that could have let hackers covertly modify officer data (City &amp; State New York)
Google TAG: New efforts to disrupt DRAGONBRIDGE spam activity (Google)
‘Poseidon’ Mac stealer distributed via Google ads (Malwarebytes)
Gas Chromatograph Hacking Could Have Serious Impact: Security Firm (SecurityWeek)
Microsoft warns of novel jailbreak affecting many generative AI models (CSO Online)
CISA Warns of Exploited GeoServer, Linux Kernel, and Roundcube Vulnerabilities (SecurityWeek)
Metallica’s X account hacked to promote crypto token (Cointelegraph)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Arkansas sues Temu over privacy issues. Polyfil returns and says they were wronged. An NYPD database was found vulnerable to manipulation. Google slays the DRAGONBRIDGE. Malwarebytes flags a new Mac stealer campaign. Patch your gas chromatographs. Microsoft warns of an AI jailbreak called Skeleton Key.  CISA tracks exploited vulnerabilities in GeoServer, the Linux kernel, and Roundcube Webmail.  In our  'Threat Vector' segment, host David Moulton speaks with Jim Foote, CEO of First Ascent Biomedical, about his transition from Chief Information Security Officer (CISO) to leading a biotech company utilizing AI to personalize cancer treatments. Metallica is not hawking metal crypto. </p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Threat Vector Segment</h2><p>In this segment of the <a href="https://www.paloaltonetworks.com/">Palo Alto Networks</a> podcast '<a href="https://thecyberwire.com/podcasts/threat-vector">Threat Vector</a>,' host <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a> speaks with <a href="https://www.linkedin.com/in/jim-foote-ba7526/">Jim Foote</a>, CEO of <a href="https://firstascentbiomedical.com/">First Ascent Biomedical</a>, about his transition from Chief Information Security Officer (CISO) to leading a biotech company utilizing AI to personalize cancer treatments. They discuss how Foote's personal experience with his son's cancer diagnosis drove him to apply cybersecurity principles in developing an innovative approach, called Functional Precision Medicine, which tailors cancer treatment to individual patients. The conversation also covers the role of mentorship, the importance of interdisciplinary skills, and the transformative potential of AI in both cybersecurity and medical fields. You can listen to the full episode <a href="https://thecyberwire.com/podcasts/threat-vector/25/notes">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.theverge.com/2024/6/26/24186673/arkansas-ag-lawsuit-temu-pinduoduo-malware">Arkansas AG lawsuit claims Temu’s shopping app is ‘dangerous malware’</a> (The Verge)</p><p><a href="https://www.bleepingcomputer.com/news/security/polyfill-claims-it-has-been-defamed-returns-after-domain-shut-down/">Polyfill claims it has been 'defamed', returns after domain shut down</a> (Bleeping Computer)</p><p><a href="https://www.cityandstateny.com/politics/2024/06/nypd-officer-database-had-security-flaws-could-have-let-hackers-covertly-modify-officer-data/397688/#cid=2008267">NYPD officer database had security flaws that could have let hackers covertly modify officer data</a> (City &amp; State New York)</p><p><a href="https://blog.google/threat-analysis-group/google-disrupted-dragonbridge-activity-q1-2024/">Google TAG: New efforts to disrupt DRAGONBRIDGE spam activity</a> (Google)</p><p><a href="https://www.malwarebytes.com/blog/news/2024/06/poseidon-mac-stealer-distributed-via-google-ads">‘Poseidon’ Mac stealer distributed via Google ads</a> (Malwarebytes)</p><p><a href="https://www.securityweek.com/gas-chromatograph-hacking-could-have-serious-impact-security-firm/">Gas Chromatograph Hacking Could Have Serious Impact: Security Firm </a>(SecurityWeek)</p><p><a href="https://www.csoonline.com/article/2507702/microsoft-warns-of-novel-jailbreak-affecting-many-generative-ai-models.html">Microsoft warns of novel jailbreak affecting many generative AI models</a> (CSO Online)</p><p><a href="https://www.securityweek.com/cisa-warns-of-exploited-geoserver-linux-kernel-and-roundcube-vulnerabilities/">CISA Warns of Exploited GeoServer, Linux Kernel, and Roundcube Vulnerabilities</a> (SecurityWeek)</p><p><a href="https://cointelegraph.com/news/metallica-x-account-hack-promote-crypto-token">Metallica’s X account hacked to promote crypto token</a> (Cointelegraph)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1436</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00f01ae2-b95e-11ee-adc6-ebbce869c958]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7259039761.mp3?updated=1719515851" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>2024 Cyber Talent Study by N2K and WiCyS. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/66/notes</link>
      <description>Maria Varmazis, N2K host of T-Minus Space Daily, talks with WiCyS Executive Director Lynn Dohm and N2K's Simone Petrella, Dr. Heather Monthie, and Jeff Welgan about the 2024 Cyber Talent Study. 

N2K and WiCyS have come together under a common mission to attract, retain, and advance more women in cybersecurity. Together, we strive to support women throughout their career journey, and secure the future of our industry.  

This groundbreaking report leverages skills data from the professional members of Women in CyberSecurity (WiCyS), and offers valuable insights into cybersecurity competencies within the industry. The Cyber Talent Study establishes a new benchmark for understanding the capabilities and potential of women in cybersecurity, and can be used to inform both individual training needs and organizational strategies for career advancement and skills enhancement. 

Resources: 

Landing page: WiCyS Partners with N2K to deepen understanding of cyber competencies within the industry.


Study Launch article: WiCyS Partners with N2K Networks for Pioneering Cyber Talent Study.



Key Takeaways:


Outstanding Performance: WiCyS members have demonstrated exceptional performance across several key areas of the NICE Framework, underscoring the importance of WiCyS’s training and development programs.


Strategic Insights: Analysis revealed remarkable strengths and areas for development, providing WiCyS with actionable data to tailor future programs and initiatives and ensure its members remain at the forefront of cybersecurity excellence.


Actionable Insights for Cybersecurity Workforce Development: The study revealed critical areas for targeted development to enhance cybersecurity workforce readiness. This insight empowers WiCyS to tailor its programs specifically to meet the diverse needs of its members, ensuring all participants are prepared to take on significant roles and lead in the cybersecurity industry.


Leadership Readiness Among WiCyS Members: The study highlights that WiCyS members are highly skilled and uniquely prepared for leadership roles within the cybersecurity industry. 


Proven Expertise in Critical Cybersecurity Domains: The data show the outstanding capabilities of WiCyS members within the cybersecurity landscape. Excelling in nearly every N2K Functional Area mapped to the NICE Framework, WiCyS members have shown they not only meet but exceed the standards in key domains.


You can access the final report of the 2024 Cyber Talent Study here.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 27 Jun 2024 05:00:00 -0000</pubDate>
      <itunes:title>2024 Cyber Talent Study by N2K and WiCyS. [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>66</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/d405055e-3335-11ef-9439-a7e43d15bf37/image/2d1f35042468eaf3af0c06c9ffc0b034.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Maria Varmazis, N2K host of T-Minus Space Daily, talks with WiCyS Executive Director Lynn Dohm and N2K's Simone Petrella, Dr. Heather Monthie, and Jeff Welgan about the 2024 Cyber Talent Study. 

N2K and WiCyS have come together under a common mission to attract, retain, and advance more women in cybersecurity. Together, we strive to support women throughout their career journey, and secure the future of our industry.  

This groundbreaking report leverages skills data from the professional members of Women in CyberSecurity (WiCyS), and offers valuable insights into cybersecurity competencies within the industry. The Cyber Talent Study establishes a new benchmark for understanding the capabilities and potential of women in cybersecurity, and can be used to inform both individual training needs and organizational strategies for career advancement and skills enhancement. 

Resources: 

Landing page: WiCyS Partners with N2K to deepen understanding of cyber competencies within the industry.


Study Launch article: WiCyS Partners with N2K Networks for Pioneering Cyber Talent Study.



Key Takeaways:


Outstanding Performance: WiCyS members have demonstrated exceptional performance across several key areas of the NICE Framework, underscoring the importance of WiCyS’s training and development programs.


Strategic Insights: Analysis revealed remarkable strengths and areas for development, providing WiCyS with actionable data to tailor future programs and initiatives and ensure its members remain at the forefront of cybersecurity excellence.


Actionable Insights for Cybersecurity Workforce Development: The study revealed critical areas for targeted development to enhance cybersecurity workforce readiness. This insight empowers WiCyS to tailor its programs specifically to meet the diverse needs of its members, ensuring all participants are prepared to take on significant roles and lead in the cybersecurity industry.


Leadership Readiness Among WiCyS Members: The study highlights that WiCyS members are highly skilled and uniquely prepared for leadership roles within the cybersecurity industry. 


Proven Expertise in Critical Cybersecurity Domains: The data show the outstanding capabilities of WiCyS members within the cybersecurity landscape. Excelling in nearly every N2K Functional Area mapped to the NICE Framework, WiCyS members have shown they not only meet but exceed the standards in key domains.


You can access the final report of the 2024 Cyber Talent Study here.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a>, N2K host of <a href="https://space.n2k.com/podcasts/t-minus">T-Minus Space Daily</a>, talks with <a href="https://www.wicys.org/">WiCyS</a> Executive Director <a href="https://www.linkedin.com/in/lynndohm/">Lynn Dohm</a> and <a href="https://www.n2k.com/">N2K</a>'s <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a>, <a href="https://www.linkedin.com/in/heathermonthie/">Dr. Heather Monthie</a>, and <a href="https://www.linkedin.com/in/jeff-welgan/">Jeff Welgan</a> about the 2024 Cyber Talent Study. </p><p><br></p><p>N2K and WiCyS have come together under a common mission to attract, retain, and advance more women in cybersecurity. Together, we strive to support women throughout their career journey, and secure the future of our industry.  </p><p><br></p><p>This groundbreaking report leverages skills data from the professional members of Women in CyberSecurity (WiCyS), and offers valuable insights into cybersecurity competencies within the industry. The Cyber Talent Study establishes a new benchmark for understanding the capabilities and potential of women in cybersecurity, and can be used to inform both individual training needs and organizational strategies for career advancement and skills enhancement. </p><p><br></p><h3>Resources: </h3><ul>
<li>Landing page: <a href="https://www.n2k.com/wicys">WiCyS Partners with N2K to deepen understanding of cyber competencies within the industry.</a>
</li>
<li>Study Launch article: <a href="https://thecyberwire.com/stories/26bb319eafd94f1eae68af038afd917c/wicys-partners-with-n2k-networks-for-pioneering-cyber-talent-study">WiCyS Partners with N2K Networks for Pioneering Cyber Talent Study.</a>
</li>
</ul><p><br></p><h3>Key Takeaways:</h3><ul>
<li>
<strong>Outstanding Performance:</strong> WiCyS members have demonstrated exceptional performance across several key areas of the NICE Framework, underscoring the importance of WiCyS’s training and development programs.</li>
<li>
<strong>Strategic Insights:</strong> Analysis revealed remarkable strengths and areas for development, providing WiCyS with actionable data to tailor future programs and initiatives and ensure its members remain at the forefront of cybersecurity excellence.</li>
<li>
<strong>Actionable Insights for Cybersecurity Workforce Development: </strong>The study revealed critical areas for targeted development to enhance cybersecurity workforce readiness. This insight empowers WiCyS to tailor its programs specifically to meet the diverse needs of its members, ensuring all participants are prepared to take on significant roles and lead in the cybersecurity industry.</li>
<li>
<strong>Leadership Readiness Among WiCyS Members: </strong>The study highlights that WiCyS members are highly skilled and uniquely prepared for leadership roles within the cybersecurity industry. </li>
<li>
<strong>Proven Expertise in Critical Cybersecurity Domains: </strong>The data show the outstanding capabilities of WiCyS members within the cybersecurity landscape. Excelling in nearly every N2K Functional Area mapped to the NICE Framework, WiCyS members have shown they not only meet but exceed the standards in key domains.</li>
</ul><p><br></p><p>You can access the final report of the 2024 Cyber Talent Study <a href="https://www.n2k.com/wicys">here</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2390</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d405055e-3335-11ef-9439-a7e43d15bf37]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6153192397.mp3?updated=1719419112" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>LockBit picks a brawl with banks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2096/notes</link>
      <description>LockBit drops files that may or may not be from the Federal Reserve. Progress Software patches additional flaws in MOVEit file transfer software. A popular polyfil open source library has been compromised. DHS starts staffing up its AI Corps. Legislation has been introduced to evaluate the manual operations of critical infrastructure during cyber attacks. Researchers discover a new e-skimmer targeting CMS platforms. A breach at Neiman Marchus affects nearly 65,000 people. South African health services grapple with ransomware amidst a monkeypox outbreak.  Medusa is back. On the Learning Layer, Sam and Joe discuss the CISSP's CAT format and how to walk into test day with confidence. The VA works to clear the backlog caused by the ransomware attack onChange Healthcare.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, which includes a simulated Computer Adaptive Test (CAT) final exam.
Sam and Joe discuss the CISSP's CAT format and how to walk into test day with confidence. Good luck Joe!

Selected Reading
Lockbit Leaks Files for Evolve Bank &amp; Trust in Its Alleged ‘Federal Reserve’ Data Dump (Metacurity)
Progress Software warns of new vulnerabilities in MOVEit Transfer and MOVEit Gateway (Cyber Daily)
Polyfill supply chain attack hits 100K+ sites (Sansec)
Exclusive: DHS hires first 10 AI Corps members (Axios)
US House bill seeks to assess manual operations of critical infrastructure during cyber attacks (Industrial Cyber)
Caesar Cipher Skimmer targets popular CMS used by e-stores (Security Affairs)
Neiman Marcus confirms breach. Is the customer data already for sale? (Malwarebytes)
South Africa’s national health lab hit with ransomware attack amid mpox outbreak (The Record)
New Medusa malware variants target Android users in seven countries (Bleeping Computer)
After Crippling Ransomware Attack, VA Is Still Dealing with Fallout, Trying to Pay Providers (Military.com)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 26 Jun 2024 20:10:00 -0000</pubDate>
      <itunes:title>LockBit picks a brawl with banks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2096</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>LockBit drops files that may or may not be from the Federal Reserve. Progress Software patches additional flaws in MOVEit file transfer software. A popular polyfil open source library has been compromised. DHS starts staffing up its AI Corps. Legislation has been introduced to evaluate the manual operations of critical infrastructure during cyber attacks. Researchers discover a new e-skimmer targeting CMS platforms. A breach at Neiman Marchus affects nearly 65,000 people. South African health services grapple with ransomware amidst a monkeypox outbreak.  Medusa is back. On the Learning Layer, Sam and Joe discuss the CISSP's CAT format and how to walk into test day with confidence. The VA works to clear the backlog caused by the ransomware attack onChange Healthcare.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, which includes a simulated Computer Adaptive Test (CAT) final exam.
Sam and Joe discuss the CISSP's CAT format and how to walk into test day with confidence. Good luck Joe!

Selected Reading
Lockbit Leaks Files for Evolve Bank &amp; Trust in Its Alleged ‘Federal Reserve’ Data Dump (Metacurity)
Progress Software warns of new vulnerabilities in MOVEit Transfer and MOVEit Gateway (Cyber Daily)
Polyfill supply chain attack hits 100K+ sites (Sansec)
Exclusive: DHS hires first 10 AI Corps members (Axios)
US House bill seeks to assess manual operations of critical infrastructure during cyber attacks (Industrial Cyber)
Caesar Cipher Skimmer targets popular CMS used by e-stores (Security Affairs)
Neiman Marcus confirms breach. Is the customer data already for sale? (Malwarebytes)
South Africa’s national health lab hit with ransomware attack amid mpox outbreak (The Record)
New Medusa malware variants target Android users in seven countries (Bleeping Computer)
After Crippling Ransomware Attack, VA Is Still Dealing with Fallout, Trying to Pay Providers (Military.com)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>LockBit drops files that may or may not be from the Federal Reserve. Progress Software patches additional flaws in MOVEit file transfer software. A popular polyfil open source library has been compromised. DHS starts staffing up its AI Corps. Legislation has been introduced to evaluate the manual operations of critical infrastructure during cyber attacks. Researchers discover a new e-skimmer targeting CMS platforms. A breach at Neiman Marchus affects nearly 65,000 people. South African health services grapple with ransomware amidst a monkeypox outbreak.  Medusa is back. On the Learning Layer, Sam and Joe discuss the CISSP's CAT format and how to walk into test day with confidence. The VA works to clear the backlog caused by the ransomware attack onChange Healthcare.</p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Learning Layer segment, host<a href="https://www.linkedin.com/in/sam-meisenberg/"> </a><a href="https://www.linkedin.com/in/sam-meisenberg/">Sam Meisenberg</a> and<a href="https://www.linkedin.com/in/joecarrigan/"> </a><a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a> continue their discussion of Joe's ISC2<a href="https://www.cybervista.net/certify/cissp/"> </a><a href="https://www.cybervista.net/certify/cissp/">CISSP certification</a> journey using N2K’s comprehensive<a href="https://certify.cybervista.net/products/isc2/cissp-training-course/?utm_source=CWDP&amp;utm_medium=LL&amp;utm_campaign=HH_CISSP"> </a><a href="https://certify.cybervista.net/products/isc2/cissp-training-course/?utm_source=CWDP&amp;utm_medium=LL&amp;utm_campaign=HH_CISSP">CISSP training course</a>, which includes a simulated Computer Adaptive Test (CAT) final exam.</p><p>Sam and Joe discuss the CISSP's CAT format and how to walk into test day with confidence. Good luck Joe!</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.metacurity.com/p/lockbit-leaks-files-evolve-bank-trust-alleged-federal-reserve-data-dump-company-tells-customers-inve">Lockbit Leaks Files for Evolve Bank &amp; Trust in Its Alleged ‘Federal Reserve’ Data Dump</a> (Metacurity)</p><p><a href="https://www.cyberdaily.au/security/10748-progress-software-warns-of-new-vulnerabilities-in-moveit-transfer-and-moveit-gateway">Progress Software warns of new vulnerabilities in MOVEit Transfer and MOVEit Gateway </a>(Cyber Daily)</p><p><a href="https://sansec.io/research/polyfill-supply-chain-attack">Polyfill supply chain attack hits 100K+ sites</a> (Sansec)</p><p><a href="https://www.axios.com/2024/06/25/dhs-ai-corps-taps-10-experts">Exclusive: DHS hires first 10 AI Corps members</a> (Axios)</p><p><a href="https://industrialcyber.co/regulation-standards-and-compliance/us-house-bill-seeks-to-assess-manual-operations-of-critical-infrastructure-during-cyber-attacks/">US House bill seeks to assess manual operations of critical infrastructure during cyber attacks</a> (Industrial Cyber)</p><p><a href="https://securityaffairs.com/164937/malware/caesar-cipher-skimmer-targets-popolar-cms-used-by-e-stores.html">Caesar Cipher Skimmer targets popular CMS used by e-stores</a> (Security Affairs)</p><p><a href="https://www.malwarebytes.com/blog/news/2024/06/neiman-marcus-confirms-breach-is-the-customer-data-already-for-sale">Neiman Marcus confirms breach. Is the customer data already for sale?</a> (Malwarebytes)</p><p><a href="https://therecord.media/south-africa-lab-ransomware-mpox-outbreak">South Africa’s national health lab hit with ransomware attack amid mpox outbreak</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-medusa-malware-variants-target-android-users-in-seven-countries/">New Medusa malware variants target Android users in seven countries</a> (Bleeping Computer)</p><p><a href="https://www.military.com/daily-news/2024/06/25/after-crippling-ransomware-attack-va-still-dealing-fallout-trying-pay-providers.html">After Crippling Ransomware Attack, VA Is Still Dealing with Fallout, Trying to Pay Providers</a> (Military.com)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1674</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00b7244e-b95e-11ee-adc6-b319077ca917]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5422197248.mp3?updated=1719430353" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>U.S. and China dance the telecom tango.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2095/notes</link>
      <description>The US scrutinizes Chinese telecoms. Indonesia’s national datacenter is hit with ransomware. RedJulliett targets organizations in Taiwan. Researchers can tell where you are going by how fast you get there. A previously dormant botnet targeting Redis servers becomes active. Thousands of customers may have had info compromised in an attack on Levi’s. A new industry alliance hopes to prevent memory-based cyberattacks. Guest Seeyew Mo, Assistant National Cyber Director, Office of the National Cyber Director at the White House, shares the nuances of the White House's skills-based approach with N2K President Simone Petrella. Assange agrees to a plea deal.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight, guest Seeyew Mo, Assistant National Cyber Director, Office of the National Cyber Director at the White House, shares the nuances of the White House's skills-based approach (and how it's not only about hiring) with N2K President Simone Petrella. Seeyew shares a progress report on the National Cyber Workforce and Education Strategy nearly one year out. For more information, you can visit the press release: National Cyber Director Encourages Adoption of Skill-Based Hiring to Connect Americans to Good-Paying Cyber Jobs. The progress report Seeyew and Simone discuss can be found here: National Cyber Workforce and Education Strategy: Initial Stages of Implementation. 

Selected Reading
Exclusive: US probing China Telecom, China Mobile over internet, cloud risks (Reuters) 
Indonesian government datacenter locked down in $8M ransomware rumble (The Register)
Taiwanese tech firms, universities, religious groups among targets in cyber-espionage campaign (The Record)
New security loophole allows spying on internet users' online activity (HelpNet Security)
P2PInfect botnet targets REdis servers with new ransomware module (Bleeping Computer)
Credential Stuffing Attack Hits 72,000 Levi’s Accounts (Infosecurity Magazine)
CHERI Backers Form Alliance to Promote Memory Safety Chip (GovInfo Security)
Julian Assange, WikiLeaks Founder, Agrees to Plead Guilty in Deal With U.S. (The New York Times) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Jun 2024 20:10:00 -0000</pubDate>
      <itunes:title>U.S. and China dance the telecom tango.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2095</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The US scrutinizes Chinese telecoms. Indonesia’s national datacenter is hit with ransomware. RedJulliett targets organizations in Taiwan. Researchers can tell where you are going by how fast you get there. A previously dormant botnet targeting Redis servers becomes active. Thousands of customers may have had info compromised in an attack on Levi’s. A new industry alliance hopes to prevent memory-based cyberattacks. Guest Seeyew Mo, Assistant National Cyber Director, Office of the National Cyber Director at the White House, shares the nuances of the White House's skills-based approach with N2K President Simone Petrella. Assange agrees to a plea deal.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight, guest Seeyew Mo, Assistant National Cyber Director, Office of the National Cyber Director at the White House, shares the nuances of the White House's skills-based approach (and how it's not only about hiring) with N2K President Simone Petrella. Seeyew shares a progress report on the National Cyber Workforce and Education Strategy nearly one year out. For more information, you can visit the press release: National Cyber Director Encourages Adoption of Skill-Based Hiring to Connect Americans to Good-Paying Cyber Jobs. The progress report Seeyew and Simone discuss can be found here: National Cyber Workforce and Education Strategy: Initial Stages of Implementation. 

Selected Reading
Exclusive: US probing China Telecom, China Mobile over internet, cloud risks (Reuters) 
Indonesian government datacenter locked down in $8M ransomware rumble (The Register)
Taiwanese tech firms, universities, religious groups among targets in cyber-espionage campaign (The Record)
New security loophole allows spying on internet users' online activity (HelpNet Security)
P2PInfect botnet targets REdis servers with new ransomware module (Bleeping Computer)
Credential Stuffing Attack Hits 72,000 Levi’s Accounts (Infosecurity Magazine)
CHERI Backers Form Alliance to Promote Memory Safety Chip (GovInfo Security)
Julian Assange, WikiLeaks Founder, Agrees to Plead Guilty in Deal With U.S. (The New York Times) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US scrutinizes Chinese telecoms. Indonesia’s national datacenter is hit with ransomware. RedJulliett targets organizations in Taiwan. Researchers can tell where you are going by how fast you get there. A previously dormant botnet targeting Redis servers becomes active. Thousands of customers may have had info compromised in an attack on Levi’s. A new industry alliance hopes to prevent memory-based cyberattacks. Guest Seeyew Mo, Assistant National Cyber Director, Office of the National Cyber Director at the White House, shares the nuances of the White House's skills-based approach with N2K President Simone Petrella. Assange agrees to a plea deal.</p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Solution Spotlight, guest <a href="https://www.linkedin.com/in/seeyewmo/">Seeyew Mo</a>, Assistant National Cyber Director, <a href="https://www.whitehouse.gov/oncd/">Office of the National Cyber Director</a> at the White House, shares the nuances of the White House's skills-based approach (and how it's not only about hiring) with <a href="https://www.n2k.com/">N2K</a> President <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a>. Seeyew shares a progress report on the <a href="https://www.whitehouse.gov/wp-content/uploads/2023/07/NCWES-2023.07.31.pdf">National Cyber Workforce and Education Strategy</a> nearly one year out. For more information, you can visit the press release: <a href="https://www.whitehouse.gov/oncd/briefing-room/2024/04/29/press-release-wh-cyber-workforce-convening/">National Cyber Director Encourages Adoption of Skill-Based Hiring to Connect Americans to Good-Paying Cyber Jobs</a>. The progress report Seeyew and Simone discuss can be found here: <a href="https://www.whitehouse.gov/wp-content/uploads/2024/06/NCWES-Initial-Report-2024.06.25.pdf">National Cyber Workforce and Education Strategy: Initial Stages of Implementation</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.reuters.com/business/media-telecom/us-probing-china-telecom-china-mobile-over-internet-cloud-risks-2024-06-25/">Exclusive: US probing China Telecom, China Mobile over internet, cloud risks </a>(Reuters)<a href="https://www.reuters.com/business/media-telecom/us-probing-china-telecom-china-mobile-over-internet-cloud-risks-2024-06-25/"> </a></p><p><a href="https://www.theregister.com/2024/06/24/indonesia_datacenter_ransomware/">Indonesian government datacenter locked down in $8M ransomware rumble</a> (The Register)</p><p><a href="https://therecord.media/taiwan-cyber-espionage-redjuliet-flax-typhoon">Taiwanese tech firms, universities, religious groups among targets in cyber-espionage campaign</a> (The Record)</p><p><a href="https://www.helpnetsecurity.com/2024/06/25/snailload-security-loophole-spy-users-online-activities/">New security loophole allows spying on internet users' online activity</a> (HelpNet Security)</p><p><a href="https://www.bleepingcomputer.com/news/security/p2pinfect-botnet-targets-redis-servers-with-new-ransomware-module/">P2PInfect botnet targets REdis servers with new ransomware module</a> (Bleeping Computer)</p><p><a href="https://www.infosecurity-magazine.com/news/credential-stuffing-72000-levis/">Credential Stuffing Attack Hits 72,000 Levi’s Accounts</a> (Infosecurity Magazine)</p><p><a href="https://www.govinfosecurity.com/cheri-backers-form-alliance-to-promote-memory-safety-chip-a-25604">CHERI Backers Form Alliance to Promote Memory Safety Chip</a> (GovInfo Security)</p><p><a href="https://www.nytimes.com/2024/06/24/us/politics/julian-assange-plea-deal.html?mid=1#cid=1996903">Julian Assange, WikiLeaks Founder, Agrees to Plead Guilty in Deal With U.S.</a> (The New York Times) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1699</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[007ebf3c-b95e-11ee-adc6-b7efd7df71d1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9082208061.mp3?updated=1719342538" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The claim heard ‘round the world.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2094/notes</link>
      <description>LockBit claims to have hit the Federal Reserve. CDK Global negotiates with BlackSuit to unlock car dealerships across the U.S. Treasury proposes a rule to restrict tech investments in China. An LA school district confirms a Snowflake related data breach. Rafel RAT hits outdated Android devices. The UK’s largest plutonium stockpiler pleads guilty to criminal charges of inadequate cybersecurity. Clearview AI settles privacy violations in a deal that could exceed fifty million dollars. North Korean hackers target aerospace and defense firms. Rick Howard previews CSOP Live. Our guest is Christie Terrill, CISO at Bishop Fox, discussing how organizations can best leverage offensive security tactics. Bug hunting gets a little too real.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Christie Terrill, CISO at Bishop Fox, joins to discuss how organizations can leverage offensive security tactics not just as strategies to prevent cyber incidents, but as a critical component of a cyberattack recovery process. 
Rick Howard sits down with Dave to share a preview of what’s to come at our upcoming CSOP Live event this Thursday, going beyond the headlines with our panel of Hash Table experts for an insightful discussion on emerging industry trends, recent threats and events, and the evolving role of executives in our field.
 
Selected Reading
LockBit claims the hack of the US Federal Reserve (securityaffairs)
Why are threat actors faking data breaches? (Help Net Security)
CDK Global outage caused by BlackSuit ransomware attack (bleepingcomputer)
US proposes rules to stop Americans from investing in Chinese technology with military uses (AP News)
Los Angeles Unified confirms student data stolen in Snowflake account hack (bleepingcomputer)
Ratel RAT targets outdated Android phones in ransomware attacks (bleepingcomputer)
Sellafield Pleads Guilty to Historic Cybersecurity Offenses (Infosecurity Magazine)
Sellafield nuclear waste site pleads guilty to IT security breaches (Financial Times)
Facial Recognition Startup Clearview AI Settles Privacy Suit (SecurityWeek)
New North Korean Hackers Attack Aerospace and Defense Companies (cybersecuritynews)
Spatial Computing Hack (Ryan Pickren)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 24 Jun 2024 20:10:00 -0000</pubDate>
      <itunes:title>The claim heard ‘round the world.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2094</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>LockBit claims to have hit the Federal Reserve. CDK Global negotiates with BlackSuit to unlock car dealerships across the U.S. Treasury proposes a rule to restrict tech investments in China. An LA school district confirms a Snowflake related data breach. Rafel RAT hits outdated Android devices. The UK’s largest plutonium stockpiler pleads guilty to criminal charges of inadequate cybersecurity. Clearview AI settles privacy violations in a deal that could exceed fifty million dollars. North Korean hackers target aerospace and defense firms. Rick Howard previews CSOP Live. Our guest is Christie Terrill, CISO at Bishop Fox, discussing how organizations can best leverage offensive security tactics. Bug hunting gets a little too real.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Christie Terrill, CISO at Bishop Fox, joins to discuss how organizations can leverage offensive security tactics not just as strategies to prevent cyber incidents, but as a critical component of a cyberattack recovery process. 
Rick Howard sits down with Dave to share a preview of what’s to come at our upcoming CSOP Live event this Thursday, going beyond the headlines with our panel of Hash Table experts for an insightful discussion on emerging industry trends, recent threats and events, and the evolving role of executives in our field.
 
Selected Reading
LockBit claims the hack of the US Federal Reserve (securityaffairs)
Why are threat actors faking data breaches? (Help Net Security)
CDK Global outage caused by BlackSuit ransomware attack (bleepingcomputer)
US proposes rules to stop Americans from investing in Chinese technology with military uses (AP News)
Los Angeles Unified confirms student data stolen in Snowflake account hack (bleepingcomputer)
Ratel RAT targets outdated Android phones in ransomware attacks (bleepingcomputer)
Sellafield Pleads Guilty to Historic Cybersecurity Offenses (Infosecurity Magazine)
Sellafield nuclear waste site pleads guilty to IT security breaches (Financial Times)
Facial Recognition Startup Clearview AI Settles Privacy Suit (SecurityWeek)
New North Korean Hackers Attack Aerospace and Defense Companies (cybersecuritynews)
Spatial Computing Hack (Ryan Pickren)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>LockBit claims to have hit the Federal Reserve. CDK Global negotiates with BlackSuit to unlock car dealerships across the U.S. Treasury proposes a rule to restrict tech investments in China. An LA school district confirms a Snowflake related data breach. Rafel RAT hits outdated Android devices. The UK’s largest plutonium stockpiler pleads guilty to criminal charges of inadequate cybersecurity. Clearview AI settles privacy violations in a deal that could exceed fifty million dollars. North Korean hackers target aerospace and defense firms. Rick Howard previews CSOP Live. Our guest is Christie Terrill, CISO at Bishop Fox, discussing how organizations can best leverage offensive security tactics. Bug hunting gets a little too real.</p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest Christie Terrill, CISO at Bishop Fox, joins to discuss how organizations can leverage offensive security tactics not just as strategies to prevent cyber incidents, but as a critical component of a cyberattack recovery process. </p><p>Rick Howard sits down with Dave to share a preview of what’s to come at our upcoming <a href="https://www.brighttalk.com/webcast/18820/614884?bt_tok=&amp;utm_campaign=N2K_Analyst%20Calls&amp;utm_medium=email&amp;_hsenc=p2ANqtz--OSHsGVtXjmLa4aV6bl395xjKVzdYJO-gxU53RMzX1Tlf4bJBZGLhbHhOUr0eBDLdPjgmyrkvUpfrKO4UpUYxp2mObSpa-B6Vzr76toKUUXqC1VmQ&amp;_hsmi=312907901&amp;utm_content=312907901&amp;utm_source=hs_email">CSOP Live event</a> this Thursday, going beyond the headlines with our panel of Hash Table experts for an insightful discussion on emerging industry trends, recent threats and events, and the evolving role of executives in our field.</p><p> </p><h2>Selected Reading</h2><p><a href="https://securityaffairs.com/164873/cyber-crime/lockbit-claims-hacked-us-federal-reserve.html">LockBit claims the hack of the US Federal Reserve</a> (securityaffairs)</p><p><a href="https://www.helpnetsecurity.com/2024/06/24/faking-data-breaches/">Why are threat actors faking data breaches?</a><a href="https://www.helpnetsecurity.com/2024/06/24/faking-data-breaches/"> (Help Net Security</a>)</p><p><a href="https://www.bleepingcomputer.com/news/security/cdk-global-outage-caused-by-blacksuit-ransomware-attack/">CDK Global outage caused by BlackSuit ransomware attack</a> (bleepingcomputer)</p><p><a href="https://apnews.com/article/china-technology-biden-outbound-invest-treasury-5710f7446b6de614d6ac8ea569904a9c">US proposes rules to stop Americans from investing in Chinese technology with military uses</a><a href="https://apnews.com/article/china-technology-biden-outbound-invest-treasury-5710f7446b6de614d6ac8ea569904a9c"> (AP News</a>)</p><p><a href="https://www.bleepingcomputer.com/news/security/los-angeles-unified-confirms-student-data-stolen-in-snowflake-account-hack/">Los Angeles Unified confirms student data stolen in Snowflake account hack</a> (bleepingcomputer)</p><p><a href="https://www.bleepingcomputer.com/news/security/ratel-rat-targets-outdated-android-phones-in-ransomware-attacks/">Ratel RAT targets outdated Android phones in ransomware attacks</a> (bleepingcomputer)</p><p><a href="https://www.infosecurity-magazine.com/news/sellafield-pleads-guilty/">Sellafield Pleads Guilty to Historic Cybersecurity Offenses</a><a href="https://www.infosecurity-magazine.com/news/sellafield-pleads-guilty/"> (Infosecurity Magazine</a>)</p><p><a href="https://www.ft.com/content/a91cb392-0a32-48b4-bc7a-5b2a1debbc96">Sellafield nuclear waste site pleads guilty to IT security breaches</a> (Financial Times)</p><p><a href="https://www.securityweek.com/facial-recognition-startup-clearview-ai-settles-privacy-suit/">Facial Recognition Startup Clearview AI Settles Privacy Suit</a><a href="https://www.securityweek.com/facial-recognition-startup-clearview-ai-settles-privacy-suit/"> (SecurityWeek</a>)</p><p><a href="https://cybersecuritynews.com/new-north-korean-hackers-attack-aerospace-and-defense-companies/">New North Korean Hackers Attack Aerospace and Defense Companies</a> (cybersecuritynews)</p><p><a href="https://www.ryanpickren.com/vision-pro-hack">Spatial Computing Hack</a><a href="https://www.ryanpickren.com/vision-pro-hack"> (Ryan Pickren</a>)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1810</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[004630f4-b95e-11ee-adc6-334a653d67e3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8956796025.mp3?updated=1719256752" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Sal Aurigemma: How things work. [Education] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/21/notes</link>
      <description>Associate Professor of Computer Information Systems at the University of Tulsa Sal Aurigemma shares how his interest in how things worked shaped his career path in nuclear power and computers, Being introduced to computers in high school and learning about the Chernobyl event led Sal to study nuclear engineering followed by time in the Navy as a submarine officer. On the submarine, Sal had to understand how systems worked from soup to nuts and that let him back to IT. As a computer engineer, Sal spent a lot of time on network troubleshooting and was eventually introduced to cybersecurity. Following 9/11, cybersecurity took on greater importance. Sal's research focuses on behavioral cybersecurity. To newcomers, he suggests heading into things with an open mind and doesn't recommend giving users 24-character passwords that have two upper, two lower, and two special characters that cannot be written down. We thank Sal for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 23 Jun 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Sal Aurigemma: How things work. [Education] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>21</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Associate Professor of Computer Information Systems at the University of Tulsa Sal Aurigemma shares how his interest in how things worked shaped his career path in nuclear power and computers, Being introduced to computers in high school and learning about the Chernobyl event led Sal to study nuclear engineering followed by time in the Navy as a submarine officer. On the submarine, Sal had to understand how systems worked from soup to nuts and that let him back to IT. As a computer engineer, Sal spent a lot of time on network troubleshooting and was eventually introduced to cybersecurity. Following 9/11, cybersecurity took on greater importance. Sal's research focuses on behavioral cybersecurity. To newcomers, he suggests heading into things with an open mind and doesn't recommend giving users 24-character passwords that have two upper, two lower, and two special characters that cannot be written down. We thank Sal for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Associate Professor of Computer Information Systems at the University of Tulsa Sal Aurigemma shares how his interest in how things worked shaped his career path in nuclear power and computers, Being introduced to computers in high school and learning about the Chernobyl event led Sal to study nuclear engineering followed by time in the Navy as a submarine officer. On the submarine, Sal had to understand how systems worked from soup to nuts and that let him back to IT. As a computer engineer, Sal spent a lot of time on network troubleshooting and was eventually introduced to cybersecurity. Following 9/11, cybersecurity took on greater importance. Sal's research focuses on behavioral cybersecurity. To newcomers, he suggests heading into things with an open mind and doesn't recommend giving users 24-character passwords that have two upper, two lower, and two special characters that cannot be written down. We thank Sal for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a4b0c95a-3001-11ef-aa80-2f2e87a04969]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5915435132.mp3?updated=1718997209" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Piercing the through the fog. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/335/notes</link>
      <description>Kerri Shafer-Page from Arctic Wolf joins us to discuss their work on "Lost in the Fog: A New Ransomware Threat." Starting in early May, Arctic Wolf's Incident Response team investigated Fog ransomware attacks on US education and recreation sectors, where attackers exploited compromised VPN credentials to access systems, disable Windows Defender, encrypt files, and delete backups.
Despite the uniformity in ransomware payloads and ransom notes, the organizational structure of the responsible groups remains unknown.
The research can be found here:
Lost in the Fog: A New Ransomware Threat

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Jun 2024 07:00:00 -0000</pubDate>
      <itunes:title>Piercing the through the fog. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>335</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Kerri Shafer-Page from Arctic Wolf joins us to discuss their work on "Lost in the Fog: A New Ransomware Threat." Starting in early May, Arctic Wolf's Incident Response team investigated Fog ransomware attacks on US education and recreation sectors, where attackers exploited compromised VPN credentials to access systems, disable Windows Defender, encrypt files, and delete backups.
Despite the uniformity in ransomware payloads and ransom notes, the organizational structure of the responsible groups remains unknown.
The research can be found here:
Lost in the Fog: A New Ransomware Threat

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kerri Shafer-Page from Arctic Wolf joins us to discuss their work on "Lost in the Fog: A New Ransomware Threat." Starting in early May, Arctic Wolf's Incident Response team investigated Fog ransomware attacks on US education and recreation sectors, where attackers exploited compromised VPN credentials to access systems, disable Windows Defender, encrypt files, and delete backups.</p><p>Despite the uniformity in ransomware payloads and ransom notes, the organizational structure of the responsible groups remains unknown.</p><p>The research can be found here:</p><ul><li><a href="https://arcticwolf.com/resources/blog/lost-in-the-fog-a-new-ransomware-threat/">Lost in the Fog: A New Ransomware Threat</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1016</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a62d5330-2ff1-11ef-83f9-339601034efe]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9863716657.mp3?updated=1718990709" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>U.S. tightens the cybersecurity belt.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2093/notes</link>
      <description>Biden bans Kaspersky over security concerns. Accenture says reports of them being breached are greatly exaggerated. SneakyChef targets diplomats in Africa, the Middle East, Europe and Asia. A serious firmware flaw affects Intel CPUs. More headaches for car dealerships relying on CDK Global. CISA Alerts Over 100,000 Individuals of Potential Data Breach in Chemical Security Tool Hack. SquidLoader targets Chinese organizations through phishing. A new nonprofit aims to establish certification standards in maritime cybersecurity. A sneak peek of our latest podcast, Only Malware in the Building. Using the court system for customer support.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Selena Larson, joined by Dave Bittner and Rick Howard, hosts the new podcast "Only Malware in the Building." This monthly collaboration between N2K CyberWire and Proofpoint delves into the most impactful and intriguing malware stories. Selena makes complex cybersecurity info fun and digestible, offering tech professionals clear, actionable insights. 

Selected Reading
Biden bans US sales of Kaspersky software over Russia ties (Reuters)
Exclusive: Accenture says data leak claims false, only 3 affected (Cyber Daily)
Chinese-aligned hacking group targeted more than a dozen government agencies, researchers find (CyberScoop)
Intel-powered computers affected by serious firmware flaw (CVE-2024-0762) (Help Net Security)
CDK warns: threat actors are calling customers, posing as support (bleepingcomputer)
Personal and Chemical Facility Information Potentially Accessed in CISA Hack (SecurityWeek)
New Highly Evasive SquidLoader Attacking Employees Mimic As Word Document (gbhackers)
New body IMCSO to elevate standards and streamline provisioning of cybersecurity services in Maritime (itsecurityguru)
US DHS partners with Indonesia to strengthen maritime cybersecurity in Indo-Pacific region (Industrial Cyber)
How small claims court became Meta's customer service hotline (engadget).
The curious case of the missing IcedID (Only Malware in the Building)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 21 Jun 2024 20:10:00 -0000</pubDate>
      <itunes:title>U.S. tightens the cybersecurity belt.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2093</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Biden bans Kaspersky over security concerns. Accenture says reports of them being breached are greatly exaggerated. SneakyChef targets diplomats in Africa, the Middle East, Europe and Asia. A serious firmware flaw affects Intel CPUs. More headaches for car dealerships relying on CDK Global. CISA Alerts Over 100,000 Individuals of Potential Data Breach in Chemical Security Tool Hack. SquidLoader targets Chinese organizations through phishing. A new nonprofit aims to establish certification standards in maritime cybersecurity. A sneak peek of our latest podcast, Only Malware in the Building. Using the court system for customer support.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Selena Larson, joined by Dave Bittner and Rick Howard, hosts the new podcast "Only Malware in the Building." This monthly collaboration between N2K CyberWire and Proofpoint delves into the most impactful and intriguing malware stories. Selena makes complex cybersecurity info fun and digestible, offering tech professionals clear, actionable insights. 

Selected Reading
Biden bans US sales of Kaspersky software over Russia ties (Reuters)
Exclusive: Accenture says data leak claims false, only 3 affected (Cyber Daily)
Chinese-aligned hacking group targeted more than a dozen government agencies, researchers find (CyberScoop)
Intel-powered computers affected by serious firmware flaw (CVE-2024-0762) (Help Net Security)
CDK warns: threat actors are calling customers, posing as support (bleepingcomputer)
Personal and Chemical Facility Information Potentially Accessed in CISA Hack (SecurityWeek)
New Highly Evasive SquidLoader Attacking Employees Mimic As Word Document (gbhackers)
New body IMCSO to elevate standards and streamline provisioning of cybersecurity services in Maritime (itsecurityguru)
US DHS partners with Indonesia to strengthen maritime cybersecurity in Indo-Pacific region (Industrial Cyber)
How small claims court became Meta's customer service hotline (engadget).
The curious case of the missing IcedID (Only Malware in the Building)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Biden bans Kaspersky over security concerns. Accenture says reports of them being breached are greatly exaggerated. SneakyChef targets diplomats in Africa, the Middle East, Europe and Asia. A serious firmware flaw affects Intel CPUs. More headaches for car dealerships relying on CDK Global. CISA Alerts Over 100,000 Individuals of Potential Data Breach in Chemical Security Tool Hack. SquidLoader targets Chinese organizations through phishing. A new nonprofit aims to establish certification standards in maritime cybersecurity. A sneak peek of our latest podcast, Only Malware in the Building. Using the court system for customer support.</p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest Selena Larson, joined by Dave Bittner and Rick Howard, hosts the new podcast "Only Malware in the Building." This monthly collaboration between N2K CyberWire and Proofpoint delves into the most impactful and intriguing malware stories. Selena makes complex cybersecurity info fun and digestible, offering tech professionals clear, actionable insights. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.reuters.com/technology/biden-ban-us-sales-kaspersky-software-over-ties-russia-source-says-2024-06-20/">Biden bans US sales of Kaspersky software over Russia ties (Reuters</a>)</p><p><a href="https://www.cyberdaily.au/security/10726-exclusive-accenture-says-data-leak-claims-false-only-3-affected">Exclusive: Accenture says data leak claims false, only 3 affected (Cyber Daily</a>)</p><p><a href="https://cyberscoop.com/chinese-aligned-hacking-group-targeted-more-than-a-dozen-government-agencies-researchers-find/">Chinese-aligned hacking group targeted more than a dozen government agencies, researchers find (CyberScoop</a>)</p><p><a href="https://www.helpnetsecurity.com/2024/06/21/cve-2024-0762/">Intel-powered computers affected by serious firmware flaw (CVE-2024-0762) (Help Net Security</a>)</p><p><a href="https://www.bleepingcomputer.com/news/security/cdk-warns-threat-actors-are-calling-customers-posing-as-support/">CDK warns: threat actors are calling customers, posing as support</a> (bleepingcomputer)</p><p><a href="https://www.securityweek.com/personal-and-facility-information-potentially-accessed-in-cisa-hack/">Personal and Chemical Facility Information Potentially Accessed in CISA Hack (SecurityWeek</a>)</p><p><a href="https://gbhackers.com/squidloader-malware-attack-disguise/">New Highly Evasive SquidLoader Attacking Employees Mimic As Word Document</a> (gbhackers)</p><p><a href="https://www.itsecurityguru.org/2024/06/21/new-body-imcso-to-elevate-standards-and-streamline-provisioning-of-cybersecurity-services-in-maritime/">New body IMCSO to elevate standards and streamline provisioning of cybersecurity services in Maritime</a> (itsecurityguru)</p><p><a href="https://industrialcyber.co/transport/us-dhs-partners-with-indonesia-to-strengthen-maritime-cybersecurity-in-indo-pacific-region/">US DHS partners with Indonesia to strengthen maritime cybersecurity in Indo-Pacific region (Industrial Cyber</a>)</p><p><a href="https://www.engadget.com/how-small-claims-court-became-metas-customer-service-hotline-160224479.html">How small claims court became Meta's customer service hotline</a> (engadget).</p><p><a href="https://thecyberwire.com/podcasts/only-malware-in-the-building/1/notes">The curious case of the missing IcedID</a> (Only Malware in the Building)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1739</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[000d0612-b95e-11ee-adc6-c342af398b02]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9217383337.mp3?updated=1718998078" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberattack leaves dealerships feeling stuck in neutral. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2092/notes</link>
      <description>Over 15,000 car dealerships hit the brakes after a software supplier cyber incident. The EU’s Chat Control gets put on hold. A hacker leaks contact details of over 33,000 Accenture employees. A major forklift manufacturer shuts down operations in the wake of a ransomware attack. IntelBroker claims to have leaked source code from Apple. An investigation questions the ethics of AI firm Perplexity. A radiology practice notifies over half a million people of a data breach. Federal contractors pay millions in fines for inadequate cyber security during the COVID-19 pandemic. Stolen files from the Kansas City Police department are posted online. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey. Remembering the work of MIT’s Arvind. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Learning Layer
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs.
With all eight domains wrapped up, Sam and Joe pivot to the homestretch of Joe's studies. With the test about two weeks away, Joe discusses his approach to retaining the information and filling any remaining knowledge gaps. 

Selected Reading
Car Dealerships Across US Halt Services After Cyberattack (Bloomberg)
Car Dealers Are Idle Across the US After Second Cyberattack  (Bloomberg)
EU Council has withdrawn the vote on Chat Control (Stack Diary)
Hacker Leaks Data of 33,000 Accenture Employees in Third-Party Breach (HackRead)
Crown Equipment confirms a cyberattack disrupted manufacturing (Bleeping Computer)
Threat actor claims to have breached Apple, allegedly stealing source code of several internal tools (9to5Mac)
Perplexity Is a Bullshit Machine (WIRED)
Radiology Practice Hack Affects Sensitive Data of 512,000 (GovInfo Security)
Federal contractors pay multimillion-dollar settlements over cybersecurity lapses (The Record)
BlackSuit ransomware publishes Kansas City, Kansas, police files (StateScoop)
Arvind, longtime MIT professor and prolific computer scientist, dies at 77 (MIT)  

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 20 Jun 2024 20:10:00 -0000</pubDate>
      <itunes:title>Cyberattack leaves dealerships feeling stuck in neutral. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2092</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Over 15,000 car dealerships hit the brakes after a software supplier cyber incident. The EU’s Chat Control gets put on hold. A hacker leaks contact details of over 33,000 Accenture employees. A major forklift manufacturer shuts down operations in the wake of a ransomware attack. IntelBroker claims to have leaked source code from Apple. An investigation questions the ethics of AI firm Perplexity. A radiology practice notifies over half a million people of a data breach. Federal contractors pay millions in fines for inadequate cyber security during the COVID-19 pandemic. Stolen files from the Kansas City Police department are posted online. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey. Remembering the work of MIT’s Arvind. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Learning Layer
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs.
With all eight domains wrapped up, Sam and Joe pivot to the homestretch of Joe's studies. With the test about two weeks away, Joe discusses his approach to retaining the information and filling any remaining knowledge gaps. 

Selected Reading
Car Dealerships Across US Halt Services After Cyberattack (Bloomberg)
Car Dealers Are Idle Across the US After Second Cyberattack  (Bloomberg)
EU Council has withdrawn the vote on Chat Control (Stack Diary)
Hacker Leaks Data of 33,000 Accenture Employees in Third-Party Breach (HackRead)
Crown Equipment confirms a cyberattack disrupted manufacturing (Bleeping Computer)
Threat actor claims to have breached Apple, allegedly stealing source code of several internal tools (9to5Mac)
Perplexity Is a Bullshit Machine (WIRED)
Radiology Practice Hack Affects Sensitive Data of 512,000 (GovInfo Security)
Federal contractors pay multimillion-dollar settlements over cybersecurity lapses (The Record)
BlackSuit ransomware publishes Kansas City, Kansas, police files (StateScoop)
Arvind, longtime MIT professor and prolific computer scientist, dies at 77 (MIT)  

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Over 15,000 car dealerships hit the brakes after a software supplier cyber incident. The EU’s Chat Control gets put on hold. A hacker leaks contact details of over 33,000 Accenture employees. A major forklift manufacturer shuts down operations in the wake of a ransomware attack. IntelBroker claims to have leaked source code from Apple. An investigation questions the ethics of AI firm Perplexity. A radiology practice notifies over half a million people of a data breach. Federal contractors pay millions in fines for inadequate cyber security during the COVID-19 pandemic. Stolen files from the Kansas City Police department are posted online. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey. Remembering the work of MIT’s Arvind. </p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Learning Layer</h2><p>On our Learning Layer segment, host<a href="https://www.linkedin.com/in/sam-meisenberg/"> </a><a href="https://www.linkedin.com/in/sam-meisenberg/">Sam Meisenberg</a> and<a href="https://www.linkedin.com/in/joecarrigan/"> </a><a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a> continue their discussion of Joe's ISC2<a href="https://www.cybervista.net/certify/cissp/"> </a><a href="https://www.cybervista.net/certify/cissp/">CISSP certification</a> journey using N2K’s comprehensive<a href="https://certify.cybervista.net/products/isc2/cissp-training-course/?utm_source=CWDP&amp;utm_medium=LL&amp;utm_campaign=HH_CISSP"> </a><a href="https://certify.cybervista.net/products/isc2/cissp-training-course/?utm_source=CWDP&amp;utm_medium=LL&amp;utm_campaign=HH_CISSP">CISSP training course</a>,<a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-pro/"> </a><a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-pro/">CISSP practice test</a>, and<a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-professional-cissp-practice-labs/"> </a><a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-professional-cissp-practice-labs/">CISSP practice labs</a>.</p><p>With all eight domains wrapped up, Sam and Joe pivot to the homestretch of Joe's studies. With the test about two weeks away, Joe discusses his approach to retaining the information and filling any remaining knowledge gaps. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bloomberg.com/news/articles/2024-06-19/cyberattack-hits-software-provider-for-car-dealers-across-the-us">Car Dealerships Across US Halt Services After Cyberattack</a> (Bloomberg)</p><p><a href="https://www.bloomberg.com/news/articles/2024-06-20/car-dealers-are-idle-across-the-us-after-second-cyberattack">Car Dealers Are Idle Across the US After Second Cyberattack </a> (Bloomberg)</p><p><a href="https://stackdiary.com/eu-council-has-withdrawn-the-vote-on-chat-control/">EU Council has withdrawn the vote on Chat Control</a> (Stack Diary)</p><p><a href="https://hackread.com/hacker-leaks-accenture-employees-data-breach/">Hacker Leaks Data of 33,000 Accenture Employees in Third-Party Breach</a> (HackRead)</p><p><a href="https://www.bleepingcomputer.com/news/security/crown-equipment-confirms-a-cyberattack-disrupted-manufacturing/">Crown Equipment confirms a cyberattack disrupted manufacturing</a> (Bleeping Computer)</p><p><a href="https://9to5mac.com/2024/06/19/threat-actor-claims-to-have-breached-apple-allegedly-stealing-source-code-of-several-internal-tools/">Threat actor claims to have breached Apple, allegedly stealing source code of several internal tools</a> (9to5Mac)</p><p><a href="https://www.wired.com/story/perplexity-is-a-bullshit-machine/">Perplexity Is a Bullshit Machine</a> (WIRED)</p><p><a href="https://www.govinfosecurity.com/radiology-practice-hack-affects-sensitive-data-512000-a-25569">Radiology Practice Hack Affects Sensitive Data of 512,000</a> (GovInfo Security)</p><p><a href="https://therecord.media/federal-contractors-pay-multimillion-settlement">Federal contractors pay multimillion-dollar settlements over cybersecurity lapses</a> (The Record)</p><p><a href="https://statescoop.com/blacksuit-ransomware-kansas-city-2024/">BlackSuit ransomware publishes Kansas City, Kansas, police files</a> (StateScoop)</p><p><a href="https://news.mit.edu/2024/computer-science-professor-arvind-dies-0618">Arvind, longtime MIT professor and prolific computer scientist, dies at 77</a> (MIT)  </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1492</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ffd41bae-b95d-11ee-adc6-57fa8d6e8bd4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7133652295.mp3?updated=1718907557" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>T-Minus Overview- Our Moon [T-Minus Radio Program]</title>
      <link>https://space.n2k.com/podcasts/t-minus/rs8</link>
      <description>Please enjoy this bonus episode from our T-Minus Space Daily team. The N2K CyberWire team is observing the Juneteenth holiday here in the US. 

Welcome to the T-Minus Overview Radio Show. In this program we’ll feature some of the conversations from our daily podcast with the people who are forging the path in the new space era, from industry leaders, technology experts and pioneers, to educators, policy makers, research organizations, and more.

Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.
T-Minus Guest
Our guests are Science Writer and Author Rebecca Boyle, and CEO and Founder, Chair and CEO of Lonestar Space Holdings, Chris Stott. 
T-Minus Crew Survey
We want to hear from you! Please complete our 4 question survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.
Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 19 Jun 2024 06:00:00 -0000</pubDate>
      <itunes:title>T-Minus Overview- Our Moon [T-Minus Radio Program]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ff9ba134-b95d-11ee-adc6-b71725d4d622/image/13c9453663ddd82c8639927c82f517ac.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle/>
      <itunes:summary>Please enjoy this bonus episode from our T-Minus Space Daily team. The N2K CyberWire team is observing the Juneteenth holiday here in the US. 

Welcome to the T-Minus Overview Radio Show. In this program we’ll feature some of the conversations from our daily podcast with the people who are forging the path in the new space era, from industry leaders, technology experts and pioneers, to educators, policy makers, research organizations, and more.

Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.
T-Minus Guest
Our guests are Science Writer and Author Rebecca Boyle, and CEO and Founder, Chair and CEO of Lonestar Space Holdings, Chris Stott. 
T-Minus Crew Survey
We want to hear from you! Please complete our 4 question survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.
Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em>Please enjoy this bonus episode from our </em><a href="https://space.n2k.com/podcasts/t-minus"><em>T-Minus Space Daily</em></a><em> team. The N2K CyberWire team is observing the Juneteenth holiday here in the US. </em></p><p><br></p><p>Welcome to the T-Minus Overview Radio Show. In this program we’ll feature some of the conversations from our daily podcast with the people who are forging the path in the new space era, from industry leaders, technology experts and pioneers, to educators, policy makers, research organizations, and more.</p><p><br></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our weekly intelligence roundup, <a href="https://space.n2k.com/newsletters/signals-and-space"><em>Signals and Space</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow T-Minus on <a href="https://www.linkedin.com/company/n2k-space/">LinkedIn</a> and <a href="https://www.instagram.com/n2kspace/">Instagram</a>.</p><h2>T-Minus Guest</h2><p>Our guests are Science Writer and Author <a href="https://www.linkedin.com/in/rboyle31/">Rebecca Boyle</a>, and CEO and Founder, Chair and CEO of Lonestar Space Holdings, <a href="https://www.linkedin.com/in/chris-stott-aa0820/">Chris Stott</a>. </p><h2>T-Minus Crew Survey</h2><p>We want to hear from you! Please complete our <a href="https://www.surveymonkey.com/r/BL5NFPW">4 question survey</a>. It’ll help us get better and deliver you the most mission-critical space intel every day.</p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/ung56qbvknfbj9z2">media kit</a>. Contact us at <a href="mailto:space@n2k.com">space@n2k.com</a> to request more info.</p><h2>Want to join us for an interview?</h2><p>Please send your pitch to <a href="mailto:space-editor@n2k.com">space-editor@n2k.com</a> and include your name, affiliation, and topic proposal.</p><p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1825</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ff9ba134-b95d-11ee-adc6-b71725d4d622]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6454829952.mp3?updated=1718733201" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Servers seized, terrorists teased.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2091/notes</link>
      <description>Europol and partners shut down 13 terrorist websites.  A data breach at the LA County Department of Public Health affects over two hundred thousand. The Take It Down act targets deepfake porn. The Five Eyes alliance update their strategies to protect critical infrastructure. VMware has disclosed two critical-rated vulnerabilities in vCenter Server. The alleged heads of the "Empire Market" dark web marketplace are charged in Chicago federal court. A new malware campaign tricks users into running malicious PowerShell “fixes.”Researchers thwart Memory Tagging Extensions in Arm chips. A major e-learning platform discloses a breach. On our Industry Voices segment, we are joined by Guy Guzner, CEO and Co-Founder of Savvy to discuss "Reimagining app and identity security for SaaS." Clearview AI offers plaintiffs a piece of the pie. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, we are joined by Guy Guzner, CEO and Co-Founder of Savvy to discuss "Reimagining app and identity security for SaaS."

Selected Reading
Europol Taken Down 13 Websites Linked to Terrorist Operations (GB Hackers)
Los Angeles Public Health Department Discloses Large Data Breach (Infosecurity Magazine)
New AI deepfake porn bill would require big tech to police and remove images (CNBC)
Five Eyes' Critical 5 nations focus on adapting to evolving cyber threats to boost critical infrastructure security, resilience (Industrial Cyber)
VMware by Broadcom warns of critical vCenter flaws (The Register)
Empire Market owners charged for enabling $430M in dark web transactions (Bleeping Computer)
From Clipboard to Compromise: A PowerShell Self-Pwn (Proofpoint US)
Arm Memory Tag Extensions broken by speculative execution (The Register)
Star ed-tech company discloses data breach (Cybernews)
Clearview AI Is So Broke It’s Now Offering Lawsuits Plaintiffs A Cut Of Its Extremely Dubious Future Fortunes (Techdirt)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Jun 2024 20:10:00 -0000</pubDate>
      <itunes:title>Servers seized, terrorists teased.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2091</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Europol and partners shut down 13 terrorist websites.  A data breach at the LA County Department of Public Health affects over two hundred thousand. The Take It Down act targets deepfake porn. The Five Eyes alliance update their strategies to protect critical infrastructure. VMware has disclosed two critical-rated vulnerabilities in vCenter Server. The alleged heads of the "Empire Market" dark web marketplace are charged in Chicago federal court. A new malware campaign tricks users into running malicious PowerShell “fixes.”Researchers thwart Memory Tagging Extensions in Arm chips. A major e-learning platform discloses a breach. On our Industry Voices segment, we are joined by Guy Guzner, CEO and Co-Founder of Savvy to discuss "Reimagining app and identity security for SaaS." Clearview AI offers plaintiffs a piece of the pie. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, we are joined by Guy Guzner, CEO and Co-Founder of Savvy to discuss "Reimagining app and identity security for SaaS."

Selected Reading
Europol Taken Down 13 Websites Linked to Terrorist Operations (GB Hackers)
Los Angeles Public Health Department Discloses Large Data Breach (Infosecurity Magazine)
New AI deepfake porn bill would require big tech to police and remove images (CNBC)
Five Eyes' Critical 5 nations focus on adapting to evolving cyber threats to boost critical infrastructure security, resilience (Industrial Cyber)
VMware by Broadcom warns of critical vCenter flaws (The Register)
Empire Market owners charged for enabling $430M in dark web transactions (Bleeping Computer)
From Clipboard to Compromise: A PowerShell Self-Pwn (Proofpoint US)
Arm Memory Tag Extensions broken by speculative execution (The Register)
Star ed-tech company discloses data breach (Cybernews)
Clearview AI Is So Broke It’s Now Offering Lawsuits Plaintiffs A Cut Of Its Extremely Dubious Future Fortunes (Techdirt)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Europol and partners shut down 13 terrorist websites.  A data breach at the LA County Department of Public Health affects over two hundred thousand. The Take It Down act targets deepfake porn. The Five Eyes alliance update their strategies to protect critical infrastructure. VMware has disclosed two critical-rated vulnerabilities in vCenter Server. The alleged heads of the "Empire Market" dark web marketplace are charged in Chicago federal court. A new malware campaign tricks users into running malicious PowerShell “fixes.”Researchers thwart Memory Tagging Extensions in Arm chips. A major e-learning platform discloses a breach. On our Industry Voices segment, we are joined by Guy Guzner, CEO and Co-Founder of Savvy to discuss "Reimagining app and identity security for SaaS." Clearview AI offers plaintiffs a piece of the pie. </p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/guyguzner/">Guy Guzner</a>, CEO and Co-Founder of <a href="https://www.savvy.security/">Savvy</a> to discuss "Reimagining app and identity security for SaaS."</p><p><br></p><h2>Selected Reading</h2><p><a href="https://gbhackers.com/europol-taken-down-13-websites/">Europol Taken Down 13 Websites Linked to Terrorist Operations</a> (GB Hackers)</p><p><a href="https://www.infosecurity-magazine.com/news/los-angeles-health-data-breach/">Los Angeles Public Health Department Discloses Large Data Breach</a> (Infosecurity Magazine)</p><p><a href="https://www.cnbc.com/2024/06/18/senate-ai-deepfake-porn-bill-big-tech.html">New AI deepfake porn bill would require big tech to police and remove images</a> (CNBC)</p><p><a href="https://industrialcyber.co/critical-infrastructure/five-eyes-critical-5-nations-focus-on-adapting-to-evolving-cyber-threats-to-boost-critical-infrastructure-security-resilience/">Five Eyes' Critical 5 nations focus on adapting to evolving cyber threats to boost critical infrastructure security, resilience</a> (Industrial Cyber)</p><p><a href="https://www.theregister.com/2024/06/18/vmware_criticial_vcenter_flaws/">VMware by Broadcom warns of critical vCenter flaws</a> (The Register)</p><p><a href="https://www.bleepingcomputer.com/news/legal/empire-market-owners-charged-for-enabling-430m-in-dark-web-transactions/">Empire Market owners charged for enabling $430M in dark web transactions</a> (Bleeping Computer)</p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/clipboard-compromise-powershell-self-pwn">From Clipboard to Compromise: A PowerShell Self-Pwn </a>(Proofpoint US)</p><p><a href="https://www.theregister.com/2024/06/18/arm_memory_tag_extensions_leak/">Arm Memory Tag Extensions broken by speculative execution</a> (The Register)</p><p><a href="https://cybernews.com/news/learnosity-discloses-data-breach/">Star ed-tech company discloses data breach</a> (Cybernews)</p><p><a href="https://www.techdirt.com/2024/06/17/clearview-ai-is-so-broke-its-now-offering-lawsuits-plaintiffs-a-cut-of-its-extremely-dubious-future-fortunes/">Clearview AI Is So Broke It’s Now Offering Lawsuits Plaintiffs A Cut Of Its Extremely Dubious Future Fortunes</a> (Techdirt)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1770</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ff62742c-b95d-11ee-adc6-7fe809d4bd50]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8051556001.mp3?updated=1718735381" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scattered Spider hacker snagged in Spain. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2090/notes</link>
      <description>Spanish authorities snag a top Scattered Spider hacker. HC3 issues an alert about PHP. WIRED chats with ShinyHunters about the breach affecting Snowflake customers. Meta delays LLM training over European privacy concerns. D-Link urges customers to upgrade routers against a factory installed backdoor. A new Linux malware uses emojis for command and control. Vermont’s Governor vetoes a groundbreaking privacy bill. California fines Blackbaud millions over a 2020 data breach. Guest Patrick Joyce, Proofpoint's Global Resident CISO, sharing some key challenges, expectations and priorities of chief information security officers (CISOs) worldwide. N2K’s CSO Rick Howard for a preview of his latest CSO Perspectives podcast episode on The Current State of XDR: A Rick-the-Toolman episode.  Be sure to change those virtual locks. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Patrick Joyce, Proofpoint's Global Resident CISO, sharing some key challenges, expectations and priorities of chief information security officers (CISOs) worldwide. You can learn more from their 2024 Voice of the CISO report. 

CSO Perspectives 
Dave is joined by N2K’s CSO Rick Howard for a preview of his latest CSO Perspectives podcast episode on The Current State of XDR: A Rick-the-Toolman episode. You can find the accompanying essay here. If you are not an N2K CyberWire Pro subscriber, you can catch the first half of the episode as a preview here. 

Selected Reading
Alleged Scattered Spider ringleader taken down in Spain after law enforcement crackdown (ITPro)
US HC3 issues alert on critical PHP vulnerability impacting healthcare sector (Industrial Cyber)
Hackers Detail How They Allegedly Stole Ticketmaster Data From Snowflake (WIRED)
Meta Pauses European GenAI Development Over Privacy Concerns (Infosecurity Magazine)
Hidden Backdoor in D-Link Routers Let Attacker Login as Admin (GB Hackers)
New Linux malware is controlled through emojis sent from Discord (Bleeping Computer)
Vermont governor rejects state’s tough data privacy bill (The Record)
Blackbaud must pay $6.75 million, improve security after lying about scope of 2020 hack (The Record)
Former IT employee gets 2.5 years for wiping 180 virtual servers (Bleeping Computer) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 17 Jun 2024 20:10:00 -0000</pubDate>
      <itunes:title>Scattered Spider hacker snagged in Spain. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2090</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Spanish authorities snag a top Scattered Spider hacker. HC3 issues an alert about PHP. WIRED chats with ShinyHunters about the breach affecting Snowflake customers. Meta delays LLM training over European privacy concerns. D-Link urges customers to upgrade routers against a factory installed backdoor. A new Linux malware uses emojis for command and control. Vermont’s Governor vetoes a groundbreaking privacy bill. California fines Blackbaud millions over a 2020 data breach. Guest Patrick Joyce, Proofpoint's Global Resident CISO, sharing some key challenges, expectations and priorities of chief information security officers (CISOs) worldwide. N2K’s CSO Rick Howard for a preview of his latest CSO Perspectives podcast episode on The Current State of XDR: A Rick-the-Toolman episode.  Be sure to change those virtual locks. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Patrick Joyce, Proofpoint's Global Resident CISO, sharing some key challenges, expectations and priorities of chief information security officers (CISOs) worldwide. You can learn more from their 2024 Voice of the CISO report. 

CSO Perspectives 
Dave is joined by N2K’s CSO Rick Howard for a preview of his latest CSO Perspectives podcast episode on The Current State of XDR: A Rick-the-Toolman episode. You can find the accompanying essay here. If you are not an N2K CyberWire Pro subscriber, you can catch the first half of the episode as a preview here. 

Selected Reading
Alleged Scattered Spider ringleader taken down in Spain after law enforcement crackdown (ITPro)
US HC3 issues alert on critical PHP vulnerability impacting healthcare sector (Industrial Cyber)
Hackers Detail How They Allegedly Stole Ticketmaster Data From Snowflake (WIRED)
Meta Pauses European GenAI Development Over Privacy Concerns (Infosecurity Magazine)
Hidden Backdoor in D-Link Routers Let Attacker Login as Admin (GB Hackers)
New Linux malware is controlled through emojis sent from Discord (Bleeping Computer)
Vermont governor rejects state’s tough data privacy bill (The Record)
Blackbaud must pay $6.75 million, improve security after lying about scope of 2020 hack (The Record)
Former IT employee gets 2.5 years for wiping 180 virtual servers (Bleeping Computer) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Spanish authorities snag a top Scattered Spider hacker. HC3 issues an alert about PHP. WIRED chats with ShinyHunters about the breach affecting Snowflake customers. Meta delays LLM training over European privacy concerns. D-Link urges customers to upgrade routers against a factory installed backdoor. A new Linux malware uses emojis for command and control. Vermont’s Governor vetoes a groundbreaking privacy bill. California fines Blackbaud millions over a 2020 data breach. Guest Patrick Joyce, Proofpoint's Global Resident CISO, sharing some key challenges, expectations and priorities of chief information security officers (CISOs) worldwide. N2K’s CSO Rick Howard for a preview of his latest CSO Perspectives podcast episode on The Current State of XDR: A Rick-the-Toolman episode.  Be sure to change those virtual locks. </p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/patrick-joyce-9436183/">Patrick Joyce</a>, <a href="https://www.proofpoint.com/us">Proofpoint</a>'s Global Resident CISO, sharing some key challenges, expectations and priorities of chief information security officers (CISOs) worldwide. You can learn more from their<a href="https://www.proofpoint.com/us/resources/white-papers/voice-of-the-ciso-report"> 2024 Voice of the CISO</a> report. </p><p><br></p><h2>CSO Perspectives </h2><p>Dave is joined by <a href="https://www.n2k.com/">N2K</a>’s CSO <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> for a preview of his latest <a href="https://thecyberwire.com/podcasts/cso-perspectives">CSO Perspectives podcast</a> episode on<a href="https://thecyberwire.com/podcasts/cso-perspectives/112/notes"> The Current State of XDR: A Rick-the-Toolman episode</a>. You can find the accompanying essay <a href="https://thecyberwire.com/stories/917491c0bb0c4b9da807fbaef184bd29/the-current-state-of-xdr-a-rick-the-toolman-essay">here</a>. If you are not an N2K CyberWire Pro subscriber, you can catch the first half of the episode as a preview <a href="https://thecyberwire.com/podcasts/cso-perspectives-public/90/notes">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.itpro.com/security/cyber-crime/alleged-scattered-spider-ringleader-taken-down-in-spain-after-law-enforcement-crackdown">Alleged Scattered Spider ringleader taken down in Spain after law enforcement crackdown</a> (ITPro)</p><p><a href="https://industrialcyber.co/medical/us-hc3-issues-alert-on-critical-php-vulnerability-impacting-healthcare-sector/">US HC3 issues alert on critical PHP vulnerability impacting healthcare sector</a> (Industrial Cyber)</p><p><a href="https://www.wired.com/story/epam-snowflake-ticketmaster-breach-shinyhunters/">Hackers Detail How They Allegedly Stole Ticketmaster Data From Snowflake</a> (WIRED)</p><p><a href="https://www.infosecurity-magazine.com/news/meta-pauses-europe-gen-ai-privacy/">Meta Pauses European GenAI Development Over Privacy Concerns </a>(Infosecurity Magazine)</p><p><a href="https://gbhackers.com/hidden-backdoor-in-d-link-routers/">Hidden Backdoor in D-Link Routers Let Attacker Login as Admin</a> (GB Hackers)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-linux-malware-is-controlled-through-emojis-sent-from-discord/">New Linux malware is controlled through emojis sent from Discord</a> (Bleeping Computer)</p><p><a href="https://therecord.media/vermont-governor-veto-comprehensive-data-privacy-bill">Vermont governor rejects state’s tough data privacy bill</a> (The Record)</p><p><a href="https://therecord.media/blackbaud-must-pay-settlement-california">Blackbaud must pay $6.75 million, improve security after lying about scope of 2020 hack</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/former-it-employee-gets-25-years-for-wiping-180-virtual-servers/">Former IT employee gets 2.5 years for wiping 180 virtual servers</a> (Bleeping Computer) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1855</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ff2919f2-b95d-11ee-adc6-0b6bbfd9e2eb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8564229925.mp3?updated=1718654039" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The current state of XDR: A Rick-the-toolman episode.</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/90/notes</link>
      <description>Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of “eXtended Detection and Response” (XDR) with CyberWire Hash Table guests Rick Doten, Centene’s VP of Security, and Milad Aslaner, Sentinel One’s XDR Product Manager.
References:
Alexandra Aguiar, 2023. Key Trends from the 2023 Hype Cycle for Security Operations [Gartner Hype Cycle Chart]. Noetic Cyber.
Daniel Suarez, 2006. Daemon [Book]. Goodreads. 
Dave Crocker, 2020. Who Invented Email, Email History, How Email Was Invented [Websote]. LivingInternet.
Eric Hutchins, Michael Cloppert, Rohan Amin, 2010, Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains [Paper] Lockheed Martin Corporation.
Jon Ramsey, Mark Ryland, 2022. AWS co-announces release of the Open Cybersecurity Schema Framework (OCSF) project [Press Release]. Amazon Web Services.
Nir Zuk, 2018. Palo Alto Networks Ignite USA ’18 Keynote [Presentation]. YouTube.
Raffael Marty, 2021. A Log Management History Lesson – From syslogd(8) to XDR [Youtube Video]. YouTube.
Raffael Marty, 2021. A history lesson on security logging, from syslogd to XDR [Essay]. VentureBeat.
Rick Howard, 2020. Daemon [Podcast]. Word Notes.
Rick Howard, 2021. XDR: from the Rick the Toolman Series. [Podcast and Essay]. CSO Perspectives, The CyberWire.
Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads.
Staff, n.d. Open Cybersecurity Schema Framework [Standard]. GitHub.
Staff, 2019. What is EDR? Endpoint Detection &amp; Response Defined [Explainer]. CrowdStrike.
Staff, 2020. Log Formats – a (Mostly) Complete Guide [Explainer]. Graylog. 
Stephen Watts, 2023. Common Event Format (CEF): An Introduction [Explainer]. Splunk.
Thomas Lintemuth, Peter Firstbrook, Ayelet Heyman, Craig Lawson, Jeremy D’Hoinne, 2023. Market Guide for Extended Detection and Response [Essay]. Gartner.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 17 Jun 2024 06:00:00 -0000</pubDate>
      <itunes:title>The current state of XDR: A Rick-the-toolman episode.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>90</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of “eXtended Detection and Response” (XDR) with CyberWire Hash Table guests Rick Doten, Centene’s VP of Security, and Milad Aslaner, Sentinel One’s XDR Product Manager.
References:
Alexandra Aguiar, 2023. Key Trends from the 2023 Hype Cycle for Security Operations [Gartner Hype Cycle Chart]. Noetic Cyber.
Daniel Suarez, 2006. Daemon [Book]. Goodreads. 
Dave Crocker, 2020. Who Invented Email, Email History, How Email Was Invented [Websote]. LivingInternet.
Eric Hutchins, Michael Cloppert, Rohan Amin, 2010, Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains [Paper] Lockheed Martin Corporation.
Jon Ramsey, Mark Ryland, 2022. AWS co-announces release of the Open Cybersecurity Schema Framework (OCSF) project [Press Release]. Amazon Web Services.
Nir Zuk, 2018. Palo Alto Networks Ignite USA ’18 Keynote [Presentation]. YouTube.
Raffael Marty, 2021. A Log Management History Lesson – From syslogd(8) to XDR [Youtube Video]. YouTube.
Raffael Marty, 2021. A history lesson on security logging, from syslogd to XDR [Essay]. VentureBeat.
Rick Howard, 2020. Daemon [Podcast]. Word Notes.
Rick Howard, 2021. XDR: from the Rick the Toolman Series. [Podcast and Essay]. CSO Perspectives, The CyberWire.
Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads.
Staff, n.d. Open Cybersecurity Schema Framework [Standard]. GitHub.
Staff, 2019. What is EDR? Endpoint Detection &amp; Response Defined [Explainer]. CrowdStrike.
Staff, 2020. Log Formats – a (Mostly) Complete Guide [Explainer]. Graylog. 
Stephen Watts, 2023. Common Event Format (CEF): An Introduction [Explainer]. Splunk.
Thomas Lintemuth, Peter Firstbrook, Ayelet Heyman, Craig Lawson, Jeremy D’Hoinne, 2023. Market Guide for Extended Detection and Response [Essay]. Gartner.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of “eXtended Detection and Response” (XDR) with CyberWire Hash Table guests Rick Doten, Centene’s VP of Security, and <a href="https://www.linkedin.com/in/miladca/overlay/about-this-profile/">Milad Aslaner</a>, Sentinel One’s XDR Product Manager.</p><h2>References:</h2><p><a href="https://noeticcyber.com/key-trends-2023-hype-cycle-security-operations/">Alexandra Aguiar, 2023. Key Trends from the 2023 Hype Cycle for Security Operations [Gartner Hype Cycle Chart]. Noetic Cyber.</a></p><p><a href="https://www.goodreads.com/book/show/6665847-daemon">Daniel Suarez, 2006. Daemon [Book]. Goodreads.</a> </p><p><a href="https://livinginternet.com/e/ei.htm">Dave Crocker, 2020. Who Invented Email, Email History, How Email Was Invented [Websote]. LivingInternet.</a></p><p><a href="https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdf">Eric Hutchins, Michael Cloppert, Rohan Amin, 2010, Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains [Paper] Lockheed Martin Corporation.</a></p><p><a href="https://aws.amazon.com/blogs/security/aws-co-announces-release-of-the-open-cybersecurity-schema-framework-ocsf-project/">Jon Ramsey, Mark Ryland, 2022. AWS co-announces release of the Open Cybersecurity Schema Framework (OCSF) project [Press Release]. Amazon Web Services.</a></p><p><a href="https://www.youtube.com/watch?v=c71uPTimW_A">Nir Zuk, 2018. Palo Alto Networks Ignite USA ’18 Keynote [Presentation]. YouTube.</a></p><p><a href="https://www.youtube.com/watch?v=v-VOSHyX5C4&amp;t=1s">Raffael Marty, 2021. A Log Management History Lesson – From syslogd(8) to XDR [Youtube Video]. YouTube</a>.</p><p><a href="https://venturebeat.com/business/a-history-lesson-on-security-logging-from-syslogd-to-xdr/">Raffael Marty, 2021. A history lesson on security logging, from syslogd to XDR [Essay]. VentureBeat.</a></p><p><a href="https://thecyberwire.com/podcasts/word-notes/30/transcript">Rick Howard, 2020. Daemon [Podcast]. Word Notes.</a></p><p><a href="https://thecyberwire.com/stories/9c1ad50a3dc049a6bd6fb11d412979dc/xdr-from-the-rick-the-toolman-series">Rick Howard, 2021. XDR: from the Rick the Toolman Series. [Podcast and Essay]. CSO Perspectives, The CyberWire.</a></p><p><a href="https://www.goodreads.com/book/show/75671183-cybersecurity-first-principles">Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads.</a></p><p><a href="https://github.com/ocsf">Staff, n.d. Open Cybersecurity Schema Framework [Standard]. GitHub.</a></p><p><a href="https://www.crowdstrike.com/cybersecurity-101/endpoint-security/endpoint-detection-and-response-edr/">Staff, 2019. What is EDR? Endpoint Detection &amp; Response Defined [Explainer]. CrowdStrike.</a></p><p><a href="https://graylog.org/post/log-formats-a-complete-guide/">Staff, 2020. Log Formats – a (Mostly) Complete Guide [Explainer]. Graylog.</a> </p><p><a href="https://www.splunk.com/en_us/blog/learn/common-event-format-cef.html">Stephen Watts, 2023. Common Event Format (CEF): An Introduction [Explainer]. Splunk.</a></p><p><a href="https://www.trellix.com/blogs/xdr/untangling-xdr-our-take-on-the-2023-gartner-market-guide">Thomas Lintemuth, Peter Firstbrook, Ayelet Heyman, Craig Lawson, Jeremy D’Hoinne, 2023. Market Guide for Extended Detection and Response [Essay]. Gartner.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1124</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fc9f30c0-2a84-11ef-8bd3-6bb0d1a3e773]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5493042763.mp3?updated=1718395321" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Rosa Smothers: Secure the planet. [Intelligence] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/20/notes</link>
      <description>Senior VP of Cyber Operations at KnowBe4, Rosa Smothers, talks about her career as an early cybersecurity professional in what she describes as the Wild, Wild West to her path through government intelligence work. Rosa shares how she always knew she wanted to be involved with computers and how being a big Star Trek nerd and fan particularly of Spock and Uhura helped shape her direction. Following 9/11, Rosa wanted to work for the government and pursue the bad guys and she did just that completing her bachelor's degree and starting in the Defense Intelligence Agency as a cyber threat analyst focusing on extremist groups. She joined the CIA and worked on things you see in the movies, things that are science fictionesque. Rosa recommends talking with people to get your feet wet to find your passion. We thank Rosa for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 16 Jun 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Rosa Smothers: Secure the planet. [Intelligence] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>20</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Senior VP of Cyber Operations at KnowBe4, Rosa Smothers, talks about her career as an early cybersecurity professional in what she describes as the Wild, Wild West to her path through government intelligence work. Rosa shares how she always knew she wanted to be involved with computers and how being a big Star Trek nerd and fan particularly of Spock and Uhura helped shape her direction. Following 9/11, Rosa wanted to work for the government and pursue the bad guys and she did just that completing her bachelor's degree and starting in the Defense Intelligence Agency as a cyber threat analyst focusing on extremist groups. She joined the CIA and worked on things you see in the movies, things that are science fictionesque. Rosa recommends talking with people to get your feet wet to find your passion. We thank Rosa for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Senior VP of Cyber Operations at KnowBe4, Rosa Smothers, talks about her career as an early cybersecurity professional in what she describes as the Wild, Wild West to her path through government intelligence work. Rosa shares how she always knew she wanted to be involved with computers and how being a big Star Trek nerd and fan particularly of Spock and Uhura helped shape her direction. Following 9/11, Rosa wanted to work for the government and pursue the bad guys and she did just that completing her bachelor's degree and starting in the Defense Intelligence Agency as a cyber threat analyst focusing on extremist groups. She joined the CIA and worked on things you see in the movies, things that are science fictionesque. Rosa recommends talking with people to get your feet wet to find your passion. We thank Rosa for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>437</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f8bb3d1a-2a88-11ef-9068-6f7d32ccf39d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1337970263.mp3?updated=1718395626" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exploring the mechanics of Infostealer malware. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/334/notes</link>
      <description>This week, we are joined by a Security Researcher from SpyCloud Labs, James, who is discussing their work on "Unpacking Infostealer Malware: What we’ve learned from reverse engineering LummaC2 and Atomic macOS Stealer."  Infostealer malware has become highly prevalent, with SpyCloud tracking over 50 families and finding that 1 in 5 digital identities are at risk.
This research analyzes the workings and intentions behind infostealers like LummaC2 and Atomic macOS Stealer, focusing on the types of data extracted and the broader security implications.
The research can be found here:

Reversing LummaC2 4.0: Updates, Bug Fixes

Reversing Atomic macOS Stealer: Binaries, Backdoors &amp; Browser Theft

How the Threat Actors at SpaxMedia Distribute Malware Globally


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Jun 2024 07:00:00 -0000</pubDate>
      <itunes:title>Exploring the mechanics of Infostealer malware. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>334</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, we are joined by a Security Researcher from SpyCloud Labs, James, who is discussing their work on "Unpacking Infostealer Malware: What we’ve learned from reverse engineering LummaC2 and Atomic macOS Stealer."  Infostealer malware has become highly prevalent, with SpyCloud tracking over 50 families and finding that 1 in 5 digital identities are at risk.
This research analyzes the workings and intentions behind infostealers like LummaC2 and Atomic macOS Stealer, focusing on the types of data extracted and the broader security implications.
The research can be found here:

Reversing LummaC2 4.0: Updates, Bug Fixes

Reversing Atomic macOS Stealer: Binaries, Backdoors &amp; Browser Theft

How the Threat Actors at SpaxMedia Distribute Malware Globally


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by a Security Researcher from SpyCloud Labs, James, who is discussing their work on "Unpacking Infostealer Malware: What we’ve learned from reverse engineering LummaC2 and Atomic macOS Stealer."  Infostealer malware has become highly prevalent, with SpyCloud tracking over 50 families and finding that 1 in 5 digital identities are at risk.</p><p>This research analyzes the workings and intentions behind infostealers like LummaC2 and Atomic macOS Stealer, focusing on the types of data extracted and the broader security implications.</p><p>The research can be found here:</p><ul>
<li><a href="https://spycloud.com/blog/reversing-lummac2/">Reversing LummaC2 4.0: Updates, Bug Fixes</a></li>
<li><a href="https://spycloud.com/blog/reverse-engineering-atomic-macos-stealer/">Reversing Atomic macOS Stealer: Binaries, Backdoors &amp; Browser Theft</a></li>
<li><a href="https://spycloud.com/blog/spaxmedia-threat-actors-malware-distribution/">How the Threat Actors at SpaxMedia Distribute Malware Globally</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1610</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[33297808-2a76-11ef-8466-7f44b1a63c4a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9333679876.mp3?updated=1718388621" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A hacking keeps you humble. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2089/notes</link>
      <description>Microsoft’s President admits security failures in congressional testimony. Paul Nakasone joins OpenAI’s board. The feds hold their first AI tabletop exercise. CISA reports on the integration of space-based infrastructure. Cleveland city hall remains closed after a cyber attack. Truist commercial bank confirms a data breach. Rockwell Automation patches three high-severity vulnerabilities. University of Illinois researchers develop autonomous AI hacking agents. Arynn Crow, Sr Manager of AWS User Authentication Products, talks with N2K’s Brandon Karpf about security through MFA and FIDO Alliance passkeys, and her work on the Digital Identity Advancement Foundation. Can an AI run for mayor?
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In the first of our interviews captured during the AWS re:Inforce event this past week, guest Arynn Crow, Senior Manager of AWS User Authentication Products, talks with N2K’s Brandon Karpf about security through MFA and FIDO Alliance passkeys, and her work on the Digital Identity Advancement Foundation.

Selected Reading
Microsoft Admits Security Failings Allowed China's US Government Hack (Infosecurity Magazine)
OpenAI adds Trump-appointed former NSA director Paul M. Nakasone to its board (The Washington Post)
CISA leads first tabletop exercise for AI cybersecurity (CyberScoop)
New CISA report addresses zero trust in space, boosting security for satellites and ground infrastructure (Industrial Cyber) 
CISA adds Android Pixel, Microsoft Windows, Progress Telerik Report Server bugs to its Known Exploited Vulnerabilities catalog (Security Affairs)
Insurance giant Globe Life investigating web portal breach (Bleeping Computer)
Cleveland remains paralyzed by cyberattack (News 5 Cleveland)
Truist Bank confirms breach after stolen data shows up on hacking forum (Bleeping Computer)
Rockwell Automation Patches High-Severity Vulnerabilities in FactoryTalk View SE (SecurityWeek)
Researchers at the University of Illinois have developed AI Agents that can Autonomously Hack Websites and Find Zero-Day Vulnerabilities (MarkTechPost)
Wyoming mayoral candidate wants to govern by AI bot (Ars Technica)  

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 14 Jun 2024 20:10:00 -0000</pubDate>
      <itunes:title>A hacking keeps you humble. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2089</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Microsoft’s President admits security failures in congressional testimony. Paul Nakasone joins OpenAI’s board. The feds hold their first AI tabletop exercise. CISA reports on the integration of space-based infrastructure. Cleveland city hall remains closed after a cyber attack. Truist commercial bank confirms a data breach. Rockwell Automation patches three high-severity vulnerabilities. University of Illinois researchers develop autonomous AI hacking agents. Arynn Crow, Sr Manager of AWS User Authentication Products, talks with N2K’s Brandon Karpf about security through MFA and FIDO Alliance passkeys, and her work on the Digital Identity Advancement Foundation. Can an AI run for mayor?
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In the first of our interviews captured during the AWS re:Inforce event this past week, guest Arynn Crow, Senior Manager of AWS User Authentication Products, talks with N2K’s Brandon Karpf about security through MFA and FIDO Alliance passkeys, and her work on the Digital Identity Advancement Foundation.

Selected Reading
Microsoft Admits Security Failings Allowed China's US Government Hack (Infosecurity Magazine)
OpenAI adds Trump-appointed former NSA director Paul M. Nakasone to its board (The Washington Post)
CISA leads first tabletop exercise for AI cybersecurity (CyberScoop)
New CISA report addresses zero trust in space, boosting security for satellites and ground infrastructure (Industrial Cyber) 
CISA adds Android Pixel, Microsoft Windows, Progress Telerik Report Server bugs to its Known Exploited Vulnerabilities catalog (Security Affairs)
Insurance giant Globe Life investigating web portal breach (Bleeping Computer)
Cleveland remains paralyzed by cyberattack (News 5 Cleveland)
Truist Bank confirms breach after stolen data shows up on hacking forum (Bleeping Computer)
Rockwell Automation Patches High-Severity Vulnerabilities in FactoryTalk View SE (SecurityWeek)
Researchers at the University of Illinois have developed AI Agents that can Autonomously Hack Websites and Find Zero-Day Vulnerabilities (MarkTechPost)
Wyoming mayoral candidate wants to govern by AI bot (Ars Technica)  

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft’s President admits security failures in congressional testimony. Paul Nakasone joins OpenAI’s board. The feds hold their first AI tabletop exercise. CISA reports on the integration of space-based infrastructure. Cleveland city hall remains closed after a cyber attack. Truist commercial bank confirms a data breach. Rockwell Automation patches three high-severity vulnerabilities. University of Illinois researchers develop autonomous AI hacking agents. Arynn Crow, Sr Manager of AWS User Authentication Products, talks with N2K’s Brandon Karpf about security through MFA and FIDO Alliance passkeys, and her work on the Digital Identity Advancement Foundation. Can an AI run for mayor?</p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>In the first of our interviews captured during the <a href="https://reinforce.awsevents.com/">AWS re:Inforce</a> event this past week, guest <a href="https://www.linkedin.com/in/arynn-crow-821761103/">Arynn Crow</a>, Senior Manager of <a href="https://aws.amazon.com/security/">AWS</a> User Authentication Products, talks with <a href="https://www.n2k.com/">N2K</a>’s <a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a> about security through MFA and FIDO Alliance passkeys, and her work on the <a href="https://digitalidadvancement.org/">Digital Identity Advancement Foundation</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.infosecurity-magazine.com/news/microsoft-failings-china/">Microsoft Admits Security Failings Allowed China's US Government Hack</a> (Infosecurity Magazine)</p><p><a href="https://www.washingtonpost.com/technology/2024/06/13/openai-board-paul-nakasone-nsa/">OpenAI adds Trump-appointed former NSA director Paul M. Nakasone to its board</a> (The Washington Post)</p><p><a href="https://cyberscoop.com/cisa-ai-tabletop-exercise-playbook/">CISA leads first tabletop exercise for AI cybersecurity</a> (CyberScoop)</p><p><a href="https://industrialcyber.co/critical-infrastructure/new-cisa-report-addresses-zero-trust-in-space-boosting-security-for-satellites-and-ground-infrastructure/">New CISA report addresses zero trust in space, boosting security for satellites and ground infrastructure</a> (Industrial Cyber) </p><p><a href="https://securityaffairs.com/164525/security/cisa-adds-android-pixel-microsoft-windows-progress-telerik-report-server-known-exploited-vulnerabilities-catalog.html">CISA adds Android Pixel, Microsoft Windows, Progress Telerik Report Server bugs to its Known Exploited Vulnerabilities catalog</a> (Security Affairs)</p><p><a href="https://www.bleepingcomputer.com/news/security/insurance-giant-globe-life-investigating-web-portal-breach/">Insurance giant Globe Life investigating web portal breach</a> (Bleeping Computer)</p><p><a href="https://www.news5cleveland.com/news/local-news/cleveland-metro/cleveland-remains-paralyzed-by-cyberattack">Cleveland remains paralyzed by cyberattack</a> (News 5 Cleveland)</p><p><a href="https://www.bleepingcomputer.com/news/security/truist-bank-confirms-data-breach-after-stolen-data-shows-up-on-hacking-forum/">Truist Bank confirms breach after stolen data shows up on hacking forum</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/rockwell-automation-patches-high-severity-vulnerabilities-in-factorytalk-view-se/">Rockwell Automation Patches High-Severity Vulnerabilities in FactoryTalk View SE</a> (SecurityWeek)</p><p><a href="https://www.marktechpost.com/2024/06/10/researchers-at-the-university-of-illinois-have-developed-ai-agents-that-can-autonomously-hack-websites-and-find-zero-day-vulnerabilities/">Researchers at the University of Illinois have developed AI Agents that can Autonomously Hack Websites and Find Zero-Day Vulnerabilities</a> (MarkTechPost)</p><p><a href="https://arstechnica.com/ai/2024/06/wyoming-mayoral-candidate-wants-to-govern-by-ai-bot/">Wyoming mayoral candidate wants to govern by AI bot</a> (Ars Technica)  </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1959</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[feef6252-b95d-11ee-adc6-fb3a0562e194]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7689620651.mp3?updated=1718392218" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Whistleblower warns of profit over protection.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2088/notes</link>
      <description>A whistleblower claims that Microsoft prioritized profit over security. U.S. warnings of global election interference continue to rise. Cyber insurance claims hit record levels. Location tracking firm Tile suffers a data breach. A new phishing kit creates Progressive Web Apps. Questioning the government’s cyber silence. On today’s Threat Vector segment, host David Moulton, Director of Thought Leadership at Unit 42, is joined by Data Privacy Attorney Daniel Rosenzweig. Together, they unravel the complexities of aligning data privacy and cybersecurity laws with technological advancements. AI powered cheating lands one student in hot water. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
In this segment of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, is joined by Data Privacy Attorney Daniel Rosenzweig. Together, they unravel the complexities of aligning data privacy and cybersecurity laws with technological advancements. Daniel shares his insights on the critical partnership between legal and tech teams. 
To hear David and Daniel’s full conversation and learn how a deep understanding of both legal and tech realms can empower businesses to navigate evolving legal frameworks, particularly in light of emerging AI technologies, listen here. Check out Threat Vector every other Thursday in your favorite podcast app. 
The information provided on this segment is not intended to constitute legal advice. All information presented is for general informational purposes only. The information contained may not constitute the most update, legal or interpretative compliance guidance. Contact your own attorney to obtain advice with respect to any particular legal matter.

Selected Reading
Microsoft Chose Profit Over Security and Left U.S. Government Vulnerable to Russian Hack, Whistleblower Says (ProPublica)
Microsoft president to testify about security lapses (IT News)
Spy agencies’ foreign influence hub says it is issuing more private warnings (The Record)
Cyber Insurance Claims Hit Record High in North America (Infosecurity Magazine)
Hacker Accesses Internal ‘Tile’ Tool That Provides Location Data to Cops (404 Media)
New phishing toolkit uses PWAs to steal login credentials (Bleeping Computer)
Microsoft’s Recall puts the Biden administration’s cyber credibility on the line (CyberScoop)
Turkish student creates custom AI device for cheating university exam, gets arrested (Ars Technica) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 13 Jun 2024 20:10:00 -0000</pubDate>
      <itunes:title>Whistleblower warns of profit over protection.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2088</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A whistleblower claims that Microsoft prioritized profit over security. U.S. warnings of global election interference continue to rise. Cyber insurance claims hit record levels. Location tracking firm Tile suffers a data breach. A new phishing kit creates Progressive Web Apps. Questioning the government’s cyber silence. On today’s Threat Vector segment, host David Moulton, Director of Thought Leadership at Unit 42, is joined by Data Privacy Attorney Daniel Rosenzweig. Together, they unravel the complexities of aligning data privacy and cybersecurity laws with technological advancements. AI powered cheating lands one student in hot water. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Threat Vector Segment
In this segment of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, is joined by Data Privacy Attorney Daniel Rosenzweig. Together, they unravel the complexities of aligning data privacy and cybersecurity laws with technological advancements. Daniel shares his insights on the critical partnership between legal and tech teams. 
To hear David and Daniel’s full conversation and learn how a deep understanding of both legal and tech realms can empower businesses to navigate evolving legal frameworks, particularly in light of emerging AI technologies, listen here. Check out Threat Vector every other Thursday in your favorite podcast app. 
The information provided on this segment is not intended to constitute legal advice. All information presented is for general informational purposes only. The information contained may not constitute the most update, legal or interpretative compliance guidance. Contact your own attorney to obtain advice with respect to any particular legal matter.

Selected Reading
Microsoft Chose Profit Over Security and Left U.S. Government Vulnerable to Russian Hack, Whistleblower Says (ProPublica)
Microsoft president to testify about security lapses (IT News)
Spy agencies’ foreign influence hub says it is issuing more private warnings (The Record)
Cyber Insurance Claims Hit Record High in North America (Infosecurity Magazine)
Hacker Accesses Internal ‘Tile’ Tool That Provides Location Data to Cops (404 Media)
New phishing toolkit uses PWAs to steal login credentials (Bleeping Computer)
Microsoft’s Recall puts the Biden administration’s cyber credibility on the line (CyberScoop)
Turkish student creates custom AI device for cheating university exam, gets arrested (Ars Technica) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A whistleblower claims that Microsoft prioritized profit over security. U.S. warnings of global election interference continue to rise. Cyber insurance claims hit record levels. Location tracking firm Tile suffers a data breach. A new phishing kit creates Progressive Web Apps. Questioning the government’s cyber silence. On today’s Threat Vector segment, host David Moulton, Director of Thought Leadership at Unit 42, is joined by Data Privacy Attorney Daniel Rosenzweig. Together, they unravel the complexities of aligning data privacy and cybersecurity laws with technological advancements. AI powered cheating lands one student in hot water. </p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Threat Vector Segment</h2><p>In this segment of Threat Vector, host<a href="https://www.linkedin.com/in/davidrmoulton/"> </a><a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a>, Director of Thought Leadership at<a href="https://www.paloaltonetworks.com/"> </a><a href="https://www.paloaltonetworks.com/">Unit 42</a>, is joined by Data Privacy Attorney<a href="https://www.linkedin.com/in/daniel-b-rosenzweig-45a91364"> </a><a href="https://www.linkedin.com/in/daniel-b-rosenzweig-45a91364">Daniel Rosenzweig</a>. Together, they unravel the complexities of aligning data privacy and cybersecurity laws with technological advancements. Daniel shares his insights on the critical partnership between legal and tech teams. </p><p>To hear David and Daniel’s full conversation and learn how a deep understanding of both legal and tech realms can empower businesses to navigate evolving legal frameworks, particularly in light of emerging AI technologies, listen <a href="https://thecyberwire.com/podcasts/threat-vector/24/notes">here</a>. Check out <a href="https://thecyberwire.com/podcasts/threat-vector">Threat Vector</a> every other Thursday in your favorite podcast app. </p><p><em>The information provided on this segment is not intended to constitute legal advice. All information presented is for general informational purposes only. The information contained may not constitute the most update, legal or interpretative compliance guidance. Contact your own attorney to obtain advice with respect to any particular legal matter.</em></p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.propublica.org/article/microsoft-solarwinds-golden-saml-data-breach-russian-hackers">Microsoft Chose Profit Over Security and Left U.S. Government Vulnerable to Russian Hack, Whistleblower Says</a> (ProPublica)</p><p><a href="https://www.itnews.com.au/news/microsoft-president-to-testify-about-security-lapses-608782">Microsoft president to testify about security lapses</a> (IT News)</p><p><a href="https://therecord.media/intelligence-agencies-foreign-malign-influence-center-more-warnings-issued">Spy agencies’ foreign influence hub says it is issuing more private warnings</a> (The Record)</p><p><a href="https://www.infosecurity-magazine.com/news/cyber-insurance-claims-record/">Cyber Insurance Claims Hit Record High in North America </a>(Infosecurity Magazine)</p><p><a href="https://www.404media.co/hacker-accesses-internal-tile-tool-that-provides-location-data-to-cops/">Hacker Accesses Internal ‘Tile’ Tool That Provides Location Data to Cops</a> (404 Media)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-phishing-toolkit-uses-pwas-to-steal-login-credentials/">New phishing toolkit uses PWAs to steal login credentials</a> (Bleeping Computer)</p><p><a href="https://cyberscoop.com/microsoft-recall-secure-by-design/">Microsoft’s Recall puts the Biden administration’s cyber credibility on the line</a> (CyberScoop)</p><p><a href="https://arstechnica.com/information-technology/2024/06/turkish-student-creates-custom-ai-device-for-cheating-university-exam-gets-arrested/">Turkish student creates custom AI device for cheating university exam, gets arrested</a> (Ars Technica) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1697</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[feb595ea-b95d-11ee-adc6-db389a2aa605]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6038408247.mp3?updated=1718303214" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>COATHANGER isn’t hanging up just quite yet. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2087/notes</link>
      <description>Dutch military intelligence warns of the Chinese Coathanger RAT. Pure Storage joins the growing list of Snowflake victims. JetBrains patches a GitHub IDE vulnerability. A data broker hits the brakes on selling driver location data. Flaws in VLC Media player allow remote code execution. Patch Tuesday updates. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey, taking on Domain 8, Software Development Security. Farewell, computer engineering legend Lynn Conway. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Learning Layer
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe take on Domain 8, Software Development Security, and tackle the following question:
At which step of the SDLC should security considerations be first integrated?

Functional requirements defining

Project initiation and planning

Testing and evaluation control

System design specification


Selected Reading
Dutch intelligence says Chinese hacking campaign ‘more extensive’ than previously known (The Record)
Pure Storage confirms data breach after Snowflake account hack (Bleeping Computer)
Users of JetBrains IDEs at risk of GitHub access token compromise (CVE-2024-37051) (Help Net Security)
GitHub phishing campaign wipes repos, extorts victims (SC Magazine)
Data broker shuts down product related to driver behavior patterns (The Record)
VLC Media Player Vulnerabilities Allow Remote Code Execution (Cyber Security News)
Microsoft June 2024 Patch Tuesday fixes 51 flaws, 18 RCEs (Bleeping Computer)
ICS Patch Tuesday: Advisories Published by Siemens, Schneider Electric, Aveva, CISA (SecurityWeek)
Column: Lynn Conway, leading computer scientist and transgender pioneer, dies at 85 (LA Times)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 12 Jun 2024 20:10:00 -0000</pubDate>
      <itunes:title>COATHANGER isn’t hanging up just quite yet. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2087</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Dutch military intelligence warns of the Chinese Coathanger RAT. Pure Storage joins the growing list of Snowflake victims. JetBrains patches a GitHub IDE vulnerability. A data broker hits the brakes on selling driver location data. Flaws in VLC Media player allow remote code execution. Patch Tuesday updates. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey, taking on Domain 8, Software Development Security. Farewell, computer engineering legend Lynn Conway. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Learning Layer
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe take on Domain 8, Software Development Security, and tackle the following question:
At which step of the SDLC should security considerations be first integrated?

Functional requirements defining

Project initiation and planning

Testing and evaluation control

System design specification


Selected Reading
Dutch intelligence says Chinese hacking campaign ‘more extensive’ than previously known (The Record)
Pure Storage confirms data breach after Snowflake account hack (Bleeping Computer)
Users of JetBrains IDEs at risk of GitHub access token compromise (CVE-2024-37051) (Help Net Security)
GitHub phishing campaign wipes repos, extorts victims (SC Magazine)
Data broker shuts down product related to driver behavior patterns (The Record)
VLC Media Player Vulnerabilities Allow Remote Code Execution (Cyber Security News)
Microsoft June 2024 Patch Tuesday fixes 51 flaws, 18 RCEs (Bleeping Computer)
ICS Patch Tuesday: Advisories Published by Siemens, Schneider Electric, Aveva, CISA (SecurityWeek)
Column: Lynn Conway, leading computer scientist and transgender pioneer, dies at 85 (LA Times)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dutch military intelligence warns of the Chinese Coathanger RAT. Pure Storage joins the growing list of Snowflake victims. JetBrains patches a GitHub IDE vulnerability. A data broker hits the brakes on selling driver location data. Flaws in VLC Media player allow remote code execution. Patch Tuesday updates. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey, taking on Domain 8, Software Development Security. Farewell, computer engineering legend Lynn Conway. </p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Learning Layer</h2><p>On our Learning Layer segment, host<a href="https://www.linkedin.com/in/sam-meisenberg/"> </a><a href="https://www.linkedin.com/in/sam-meisenberg/">Sam Meisenberg</a> and<a href="https://www.linkedin.com/in/joecarrigan/"> </a><a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a> continue their discussion of Joe's ISC2<a href="https://www.cybervista.net/certify/cissp/"> </a><a href="https://www.cybervista.net/certify/cissp/">CISSP certification</a> journey using N2K’s comprehensive<a href="https://certify.cybervista.net/products/isc2/cissp-training-course/?utm_source=CWDP&amp;utm_medium=LL&amp;utm_campaign=HH_CISSP"> </a><a href="https://certify.cybervista.net/products/isc2/cissp-training-course/?utm_source=CWDP&amp;utm_medium=LL&amp;utm_campaign=HH_CISSP">CISSP training course</a>,<a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-pro/"> </a><a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-pro/">CISSP practice test</a>, and<a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-professional-cissp-practice-labs/"> </a><a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-professional-cissp-practice-labs/">CISSP practice labs</a>. Sam and Joe take on Domain 8, Software Development Security, and tackle the following question:</p><p>At which step of the SDLC should security considerations be first integrated?</p><ol>
<li>Functional requirements defining</li>
<li>Project initiation and planning</li>
<li>Testing and evaluation control</li>
<li>System design specification</li>
</ol><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/dutch-intelligence-fortigate-vulnerability-espionage">Dutch intelligence says Chinese hacking campaign ‘more extensive’ than previously known</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/pure-storage-confirms-data-breach-after-snowflake-account-hack/">Pure Storage confirms data breach after Snowflake account hack</a> (Bleeping Computer)</p><p><a href="https://www.helpnetsecurity.com/2024/06/11/cve-2024-37051/">Users of JetBrains IDEs at risk of GitHub access token compromise (CVE-2024-37051)</a> (Help Net Security)</p><p><a href="https://www.scmagazine.com/news/github-phishing-campaign-wipes-repos-extorts-victims?mid=1#cid=1956297">GitHub phishing campaign wipes repos, extorts victims</a> (SC Magazine)</p><p><a href="https://therecord.media/data-broker-shuts-product-driver-patterns">Data broker shuts down product related to driver behavior patterns</a> (The Record)</p><p><a href="https://cybersecuritynews.com/vlc-media-player-vulnerabilities/">VLC Media Player Vulnerabilities Allow Remote Code Execution</a> (Cyber Security News)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-june-2024-patch-tuesday-fixes-51-flaws-18-rces/">Microsoft June 2024 Patch Tuesday fixes 51 flaws, 18 RCEs</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/ics-patch-tuesday-advisories-published-by-siemens-schneider-electric-aveva-cisa/">ICS Patch Tuesday: Advisories Published by Siemens, Schneider Electric, Aveva, CISA</a> (SecurityWeek)</p><p><a href="https://www.latimes.com/business/story/2024-06-11/lynn-conway-leading-computer-scientist-and-transgender-pioneer-dies-at-85">Column: Lynn Conway, leading computer scientist and transgender pioneer, dies at 85</a> (LA Times)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1522</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fe7cb518-b95d-11ee-adc6-afcc6d581b8d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4567627512.mp3?updated=1718220113" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hijacking your heritage.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2086/notes</link>
      <description>23andMe’s looming bankruptcy could pause class-action privacy lawsuits. The FCC focuses on BGP. The White House looks to big tech to help secure rural hospitals. Cylance confirms a data breach. Arm warns of GPU kernel driver vulnerabilities. The world's largest law firm faces class action over the MOVEit hack. SAP releases high priority patches. Apple redefines AI - literally - and offers up Private Cloud Compute at their developer’s conference. Guest Chris Novak, Senior Director of Cyber Security Consulting at Verizon, shares highlights and key takeaways of their recently published 2024 Data Breach Investigations Report (DBIR). Share your love — but not your passwords.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Chris Novak, Senior Director of Cyber Security Consulting at Verizon, shares highlights and key takeaways of their recently published 2024 Data Breach Investigations Report (DBIR).

Selected Reading
UK and Canada Launch Joint Probe Into 23andMe Breach While District Judge Says Bankruptcy Is Imminent (Metacurity)
FCC Advances BGP Security Rules for Broadband Providers (bankinfosecurity)
White House enlists Microsoft, Google for rural hospital cyberdefense (Beckers Health IT)
Cylance confirms data breach linked to 'third-party' platform (bleepingcomputer)
Arm warns of actively exploited flaw in Mali GPU kernel drivers (bleepingcomputer)
Law firm Kirkland sued in class action over MOVEit data breach (Reuters)
SAP Patches High-Severity Vulnerabilities in Financial Consolidation, NetWeaver (SecurityWeek)
Here's how Apple's keeping your cloud-processed AI data safe (and why it matters) (ZDNET)
When things go wrong: A digital sharing warning for couples (Malwarebytes)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Jun 2024 20:10:00 -0000</pubDate>
      <itunes:title>Hijacking your heritage.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2086</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>23andMe’s looming bankruptcy could pause class-action privacy lawsuits. The FCC focuses on BGP. The White House looks to big tech to help secure rural hospitals. Cylance confirms a data breach. Arm warns of GPU kernel driver vulnerabilities. The world's largest law firm faces class action over the MOVEit hack. SAP releases high priority patches. Apple redefines AI - literally - and offers up Private Cloud Compute at their developer’s conference. Guest Chris Novak, Senior Director of Cyber Security Consulting at Verizon, shares highlights and key takeaways of their recently published 2024 Data Breach Investigations Report (DBIR). Share your love — but not your passwords.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Chris Novak, Senior Director of Cyber Security Consulting at Verizon, shares highlights and key takeaways of their recently published 2024 Data Breach Investigations Report (DBIR).

Selected Reading
UK and Canada Launch Joint Probe Into 23andMe Breach While District Judge Says Bankruptcy Is Imminent (Metacurity)
FCC Advances BGP Security Rules for Broadband Providers (bankinfosecurity)
White House enlists Microsoft, Google for rural hospital cyberdefense (Beckers Health IT)
Cylance confirms data breach linked to 'third-party' platform (bleepingcomputer)
Arm warns of actively exploited flaw in Mali GPU kernel drivers (bleepingcomputer)
Law firm Kirkland sued in class action over MOVEit data breach (Reuters)
SAP Patches High-Severity Vulnerabilities in Financial Consolidation, NetWeaver (SecurityWeek)
Here's how Apple's keeping your cloud-processed AI data safe (and why it matters) (ZDNET)
When things go wrong: A digital sharing warning for couples (Malwarebytes)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>23andMe’s looming bankruptcy could pause class-action privacy lawsuits. The FCC focuses on BGP. The White House looks to big tech to help secure rural hospitals. Cylance confirms a data breach. Arm warns of GPU kernel driver vulnerabilities. The world's largest law firm faces class action over the MOVEit hack. SAP releases high priority patches. Apple redefines AI - literally - and offers up Private Cloud Compute at their developer’s conference. Guest Chris Novak, Senior Director of Cyber Security Consulting at Verizon, shares highlights and key takeaways of their recently published 2024 Data Breach Investigations Report (DBIR). Share your love — but not your passwords.</p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/chrisjnovak/">Chris Novak</a>, Senior Director of Cyber Security Consulting at <a href="https://www.verizon.com/business/">Verizon</a>, shares highlights and key takeaways of their recently published <a href="https://www.verizon.com/business/resources/reports/dbir/2024/summary-of-findings/">2024 Data Breach Investigations Report (DBIR)</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.metacurity.com/p/uk-canada-launch-joint-probe-23andme-breach-district-judge-says-bankruptcy-imminent">UK and Canada Launch Joint Probe Into 23andMe Breach While District Judge Says Bankruptcy Is Imminent</a> (Metacurity)</p><p><a href="https://www.bankinfosecurity.com/fcc-advances-bgp-security-rules-for-broadband-providers-a-25476">FCC Advances BGP Security Rules for Broadband Providers</a> (bankinfosecurity)</p><p><a href="https://www.beckershospitalreview.com/cybersecurity/white-house-enlists-microsoft-google-for-rural-hospital-cyber-defense.html">White House enlists Microsoft, Google for rural hospital cyberdefense</a> (Beckers Health IT)</p><p><a href="https://www.bleepingcomputer.com/news/security/cylance-confirms-data-breach-linked-to-third-party-platform/">Cylance confirms data breach linked to 'third-party' platform</a> (bleepingcomputer)</p><p><a href="https://www.bleepingcomputer.com/news/security/arm-warns-of-actively-exploited-flaw-in-mali-gpu-kernel-drivers/#google_vignette">Arm warns of actively exploited flaw in Mali GPU kernel drivers</a> (bleepingcomputer)</p><p><a href="https://www.reuters.com/legal/litigation/law-firm-kirkland-sued-class-action-over-moveit-data-breach-2024-06-10/">Law firm Kirkland sued in class action over MOVEit data breach</a><a href="https://www.reuters.com/legal/litigation/law-firm-kirkland-sued-class-action-over-moveit-data-breach-2024-06-10/"> (Reuters</a>)</p><p><a href="https://www.securityweek.com/sap-patches-high-severity-vulnerabilities-in-financial-consolidation-netweaver/">SAP Patches High-Severity Vulnerabilities in Financial Consolidation, NetWeaver</a><a href="https://www.securityweek.com/sap-patches-high-severity-vulnerabilities-in-financial-consolidation-netweaver/"> (SecurityWeek</a>)</p><p><a href="https://www.zdnet.com/article/heres-how-apples-keeping-your-cloud-processed-ai-data-safe-and-why-it-matters/">Here's how Apple's keeping your cloud-processed AI data safe (and why it matters)</a><a href="https://www.zdnet.com/article/heres-how-apples-keeping-your-cloud-processed-ai-data-safe-and-why-it-matters/"> (ZDNET</a>)</p><p><a href="https://www.malwarebytes.com/blog/news/2024/06/when-things-go-wrong-a-digital-sharing-warning-for-couples">When things go wrong: A digital sharing warning for couples</a><a href="https://www.malwarebytes.com/blog/news/2024/06/when-things-go-wrong-a-digital-sharing-warning-for-couples"> (Malwarebytes</a>)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1670</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fe436bd2-b95d-11ee-adc6-9b18e689574e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3608205736.mp3?updated=1718127061" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rethinking recalls. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2085/notes</link>
      <description>Microsoft makes Recall opt-in. The Senate holds hearings on federal cybersecurity standards. Snowflake’s scrutiny snowballs. New York Times source code is leaked online. Ransomware leads to British hospitals' desperate need for blood donors. Cisco Talos finds 15 serious vulnerabilities in PLCs. Sticky Werewolf targets Russia and Belarus. Frontier Communications warns 750,000 customers of a data breach. Chinese nationals get prison time in Zambia for cybercrimes. N2K’s CSO Rick Howard speaks with Danielle Ruderman, Security GTM Leader, AWS about what keeps CISOs up at night. DIY cell towers can land you in hot water. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
N2K’s CSO Rick Howard speaks with Danielle Ruderman, Security GTM Leader, AWS about what keeps CISOs up at night and learnings from AWS CISO Circles. Today, our team is at the AWS re:Inforce this week. Stay tuned for our coverage.

Selected Reading
Windows won’t take screenshots of everything you do after all — unless you opt in (The Verge) 
US Senate Committee holds hearing on harmonizing federal cybersecurity standards to address business challenges (Industrial Cyber)
What Snowflake isn't saying about its customer data breaches (TechCrunch)
New York Times source code stolen using exposed GitHub token (Bleeping Computer)
London Hospitals Seek Biologics Backup After Ransomware Hit (GovInfo Security)
Cisco Finds 15 Vulnerabilities in AutomationDirect PLCs (SecurityWeek)
Sticky Werewolf targets the aviation industry in Russia and Belarus (Security Affairs)
Frontier warns 750,000 of a data breach after extortion threats (Bleeping Computer)
22 Chinese Nationals Sentenced to Long Prison Terms in Zambia for Multinational Cybercrimes (SecurityWeek)
Two arrested in UK over fake cell tower smishing campaign (The Register)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 10 Jun 2024 20:10:00 -0000</pubDate>
      <itunes:title>Rethinking recalls. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2085</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Microsoft makes Recall opt-in. The Senate holds hearings on federal cybersecurity standards. Snowflake’s scrutiny snowballs. New York Times source code is leaked online. Ransomware leads to British hospitals' desperate need for blood donors. Cisco Talos finds 15 serious vulnerabilities in PLCs. Sticky Werewolf targets Russia and Belarus. Frontier Communications warns 750,000 customers of a data breach. Chinese nationals get prison time in Zambia for cybercrimes. N2K’s CSO Rick Howard speaks with Danielle Ruderman, Security GTM Leader, AWS about what keeps CISOs up at night. DIY cell towers can land you in hot water. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
N2K’s CSO Rick Howard speaks with Danielle Ruderman, Security GTM Leader, AWS about what keeps CISOs up at night and learnings from AWS CISO Circles. Today, our team is at the AWS re:Inforce this week. Stay tuned for our coverage.

Selected Reading
Windows won’t take screenshots of everything you do after all — unless you opt in (The Verge) 
US Senate Committee holds hearing on harmonizing federal cybersecurity standards to address business challenges (Industrial Cyber)
What Snowflake isn't saying about its customer data breaches (TechCrunch)
New York Times source code stolen using exposed GitHub token (Bleeping Computer)
London Hospitals Seek Biologics Backup After Ransomware Hit (GovInfo Security)
Cisco Finds 15 Vulnerabilities in AutomationDirect PLCs (SecurityWeek)
Sticky Werewolf targets the aviation industry in Russia and Belarus (Security Affairs)
Frontier warns 750,000 of a data breach after extortion threats (Bleeping Computer)
22 Chinese Nationals Sentenced to Long Prison Terms in Zambia for Multinational Cybercrimes (SecurityWeek)
Two arrested in UK over fake cell tower smishing campaign (The Register)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft makes Recall opt-in. The Senate holds hearings on federal cybersecurity standards. Snowflake’s scrutiny snowballs. New York Times source code is leaked online. Ransomware leads to British hospitals' desperate need for blood donors. Cisco Talos finds 15 serious vulnerabilities in PLCs. Sticky Werewolf targets Russia and Belarus. Frontier Communications warns 750,000 customers of a data breach. Chinese nationals get prison time in Zambia for cybercrimes. N2K’s CSO Rick Howard speaks with Danielle Ruderman, Security GTM Leader, AWS about what keeps CISOs up at night. DIY cell towers can land you in hot water. </p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>N2K’s CSO Rick Howard speaks with Danielle Ruderman, Security GTM Leader, AWS about what keeps CISOs up at night and learnings from AWS CISO Circles. Today, our team is at the AWS re:Inforce this week. Stay tuned for our coverage.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.theverge.com/2024/6/7/24173499/microsoft-windows-recall-response-security-concerns">Windows won’t take screenshots of everything you do after all — unless you opt in</a> (The Verge) </p><p><a href="https://industrialcyber.co/regulation-standards-and-compliance/us-senate-committee-holds-hearing-on-harmonizing-federal-cybersecurity-standards-to-address-business-challenges/">US Senate Committee holds hearing on harmonizing federal cybersecurity standards to address business challenges</a> (Industrial Cyber)</p><p><a href="https://techcrunch.com/2024/06/07/snowflake-ticketmaster-lendingtree-customer-data-breach/">What Snowflake isn't saying about its customer data breaches</a> (TechCrunch)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-york-times-source-code-stolen-using-exposed-github-token/">New York Times source code stolen using exposed GitHub token</a> (Bleeping Computer)</p><p><a href="https://www.govinfosecurity.com/london-hospitals-seek-biologics-backup-after-ransomware-hit-a-25464">London Hospitals Seek Biologics Backup After Ransomware Hit</a> (GovInfo Security)</p><p><a href="https://www.securityweek.com/cisco-finds-15-vulnerabilities-in-automationdirect-plcs/">Cisco Finds 15 Vulnerabilities in AutomationDirect PLCs</a> (SecurityWeek)</p><p><a href="https://securityaffairs.com/164345/hacking/sticky-werewolf-targets-aviation-industry.html">Sticky Werewolf targets the aviation industry in Russia and Belarus</a> (Security Affairs)</p><p><a href="https://www.bleepingcomputer.com/news/security/frontier-warns-750-000-of-a-data-breach-after-extorted-by-ransomhub/">Frontier warns 750,000 of a data breach after extortion threats</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/22-chinese-nationals-sentenced-to-long-prison-terms-in-zambia-for-multinational-cybercrimes/">22 Chinese Nationals Sentenced to Long Prison Terms in Zambia for Multinational Cybercrimes</a> (SecurityWeek)</p><p><a href="https://www.theregister.com/2024/06/10/two_arrested_in_uk_over/">Two arrested in UK over fake cell tower smishing campaign</a> (The Register)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1853</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fe0a5900-b95d-11ee-adc6-4788abf90458]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2593906064.mp3?updated=1718048226" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Geoff White: Suddenly all of the pieces start to line up. [Journalism] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/19/notes</link>
      <description>Investigative journalist and author Geoff White talks about tracing a line through the dots of his career covering technology. Geoff shares that he has always been "quite geeky," but came to covering technology after several roles in the journalism industry. Newspapers, magazines and television were all media Geoff worked in before covering technology. Geoff got into journalism not due to the glamour sometimes associated with it, but because he wanted to fight for the public to cover stories that helped those who didn't have massive amounts of money, power or a huge lobbying campaign in political circles. When writing his book, Crime Dot Com, Geoff reflected on the cybercrime and cybersecurity stories he's covered and saw how things started falling into place. Our thanks to Geoff for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 09 Jun 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Geoff White: Suddenly all of the pieces start to line up. [Journalism] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>19</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Investigative journalist and author Geoff White talks about tracing a line through the dots of his career covering technology. Geoff shares that he has always been "quite geeky," but came to covering technology after several roles in the journalism industry. Newspapers, magazines and television were all media Geoff worked in before covering technology. Geoff got into journalism not due to the glamour sometimes associated with it, but because he wanted to fight for the public to cover stories that helped those who didn't have massive amounts of money, power or a huge lobbying campaign in political circles. When writing his book, Crime Dot Com, Geoff reflected on the cybercrime and cybersecurity stories he's covered and saw how things started falling into place. Our thanks to Geoff for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Investigative journalist and author Geoff White talks about tracing a line through the dots of his career covering technology. Geoff shares that he has always been "quite geeky," but came to covering technology after several roles in the journalism industry. Newspapers, magazines and television were all media Geoff worked in before covering technology. Geoff got into journalism not due to the glamour sometimes associated with it, but because he wanted to fight for the public to cover stories that helped those who didn't have massive amounts of money, power or a huge lobbying campaign in political circles. When writing his book, Crime Dot Com, Geoff reflected on the cybercrime and cybersecurity stories he's covered and saw how things started falling into place. Our thanks to Geoff for sharing his story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>481</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a1b519c0-2504-11ef-94b6-a30897f9359e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8795584271.mp3?updated=1718395857" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Riding the hype for new Arc browser. [Rsearch Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/333/notes</link>
      <description>Jérôme Segura, Senior Director of Threat Intelligence at Malwarebytes, is discussing their work on "Threat actors ride the hype for newly released Arc browser." The Arc browser, newly released for Windows, has quickly garnered positive reviews but has also attracted cybercriminals who are using deceptive Google search ads to distribute malware disguised as the browser.
These malicious campaigns exploit the hype around Arc, using techniques like embedding malware in image files and utilizing the MEGA cloud platform for command and control, highlighting the need for caution with sponsored search results and the effectiveness of Endpoint Detection and Response (EDR) systems.
The research can be found here:
Threat actors ride the hype for newly released Arc browser

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Jun 2024 07:00:00 -0000</pubDate>
      <itunes:title>Riding the hype for new Arc browser. [Rsearch Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>333</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Jérôme Segura, Senior Director of Threat Intelligence at Malwarebytes, is discussing their work on "Threat actors ride the hype for newly released Arc browser." The Arc browser, newly released for Windows, has quickly garnered positive reviews but has also attracted cybercriminals who are using deceptive Google search ads to distribute malware disguised as the browser.
These malicious campaigns exploit the hype around Arc, using techniques like embedding malware in image files and utilizing the MEGA cloud platform for command and control, highlighting the need for caution with sponsored search results and the effectiveness of Endpoint Detection and Response (EDR) systems.
The research can be found here:
Threat actors ride the hype for newly released Arc browser

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jérôme Segura, Senior Director of Threat Intelligence at Malwarebytes, is discussing their work on "Threat actors ride the hype for newly released Arc browser." The Arc browser, newly released for Windows, has quickly garnered positive reviews but has also attracted cybercriminals who are using deceptive Google search ads to distribute malware disguised as the browser.</p><p>These malicious campaigns exploit the hype around Arc, using techniques like embedding malware in image files and utilizing the MEGA cloud platform for command and control, highlighting the need for caution with sponsored search results and the effectiveness of Endpoint Detection and Response (EDR) systems.</p><p>The research can be found here:</p><ul><li><a href="https://www.threatdown.com/blog/threat-actors-ride-the-hype-for-newly-released-arc-browser/">Threat actors ride the hype for newly released Arc browser</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1551</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[58b1c07a-24f5-11ef-8937-a72bdfc9a69d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1231924136.mp3?updated=1717783009" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A snapshot of security woes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2084/notes</link>
      <description>Microsoft's recall raises red flags. Ukraine's CERT sounds alarm. Russian hacktivists cause trouble in EU elections. DEVCORE uncovers critical code execution flaw. LastPass leaves users locked out. Apple commits to five years of iPhone security. An AI mail fail. Inside the FCC's plan to strengthen BGP protocol. Dave sits down with our guest Camille Stewart Gloster, Former Deputy National Cyber Director at the White House, as she shares a retrospective of her public service career. And let’s all Cheers to cybersecurity.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Camille Stewart Gloster, Former Deputy National Cyber Director at the White House, shares a retrospective of her public service career. Camille’s full conversation with Dave can be found on our weekly cybersecurity law, policy and privacy podcast, Caveat. You can listen to it here. 

Selected Reading
Microsoft’s Recall Feature Is Even More Hackable Than You Thought (WIRED)
Microsoft Research scientist gives non-answer when asked about Windows Recall privacy concerns (TechSpot) 
TotalRecall: A New Tool that Extracts Data From Windows 11 Recall Feature (Cyber Security News)
Exclusive: Senators express "serious concern" with Pentagon's Microsoft plan (Axios)
UAC-0020 used SPECTR Malware to target Ukraine defense forces (Security Affairs) 
Russian hacktivists vow mass attacks against EU elections (The Register)
Ransomware Actor Exploited CoinMiner Attacker's Proxy Server (Cyber Security News)
Critical PHP Remote Code Execution Flaw let Attackers Inject Malicious Scripts (Cyber Security News)
Users furious after LastPass down for hours (Cybernews)
Apple Says iPhones Will Get Security Updates for at Least 5 Years (SecurityWeek) 
EmailGPT Exposed to Prompt Injection Attacks (Infosecurity Magazine)
FCC Proposes BGP Security Reporting for Broadband Providers (SecurityWeek)
Unpacking the SEC 10-K cyber disclosures (PwC) 
Apple set to launch Passwords app, taking on LastPass and 1Password (TechSpot)
Wineloader Mimic As Ambassador Of India To Start The Infection Chain (Cyber Security News) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 07 Jun 2024 20:10:00 -0000</pubDate>
      <itunes:title>A snapshot of security woes.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2084</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Microsoft's recall raises red flags. Ukraine's CERT sounds alarm. Russian hacktivists cause trouble in EU elections. DEVCORE uncovers critical code execution flaw. LastPass leaves users locked out. Apple commits to five years of iPhone security. An AI mail fail. Inside the FCC's plan to strengthen BGP protocol. Dave sits down with our guest Camille Stewart Gloster, Former Deputy National Cyber Director at the White House, as she shares a retrospective of her public service career. And let’s all Cheers to cybersecurity.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Camille Stewart Gloster, Former Deputy National Cyber Director at the White House, shares a retrospective of her public service career. Camille’s full conversation with Dave can be found on our weekly cybersecurity law, policy and privacy podcast, Caveat. You can listen to it here. 

Selected Reading
Microsoft’s Recall Feature Is Even More Hackable Than You Thought (WIRED)
Microsoft Research scientist gives non-answer when asked about Windows Recall privacy concerns (TechSpot) 
TotalRecall: A New Tool that Extracts Data From Windows 11 Recall Feature (Cyber Security News)
Exclusive: Senators express "serious concern" with Pentagon's Microsoft plan (Axios)
UAC-0020 used SPECTR Malware to target Ukraine defense forces (Security Affairs) 
Russian hacktivists vow mass attacks against EU elections (The Register)
Ransomware Actor Exploited CoinMiner Attacker's Proxy Server (Cyber Security News)
Critical PHP Remote Code Execution Flaw let Attackers Inject Malicious Scripts (Cyber Security News)
Users furious after LastPass down for hours (Cybernews)
Apple Says iPhones Will Get Security Updates for at Least 5 Years (SecurityWeek) 
EmailGPT Exposed to Prompt Injection Attacks (Infosecurity Magazine)
FCC Proposes BGP Security Reporting for Broadband Providers (SecurityWeek)
Unpacking the SEC 10-K cyber disclosures (PwC) 
Apple set to launch Passwords app, taking on LastPass and 1Password (TechSpot)
Wineloader Mimic As Ambassador Of India To Start The Infection Chain (Cyber Security News) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft's recall raises red flags. Ukraine's CERT sounds alarm. Russian hacktivists cause trouble in EU elections. DEVCORE uncovers critical code execution flaw. LastPass leaves users locked out. Apple commits to five years of iPhone security. An AI mail fail. Inside the FCC's plan to strengthen BGP protocol. Dave sits down with our guest Camille Stewart Gloster, Former Deputy National Cyber Director at the White House, as she shares a retrospective of her public service career. And let’s all Cheers to cybersecurity.</p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/camillestewartesq/">Camille Stewart Gloster</a>, Former Deputy National Cyber Director at the White House, shares a retrospective of her public service career. Camille’s full conversation with Dave can be found on our weekly cybersecurity law, policy and privacy podcast, <a href="https://thecyberwire.com/podcasts/caveat">Caveat</a>. You can listen to it <a href="https://thecyberwire.com/podcasts/caveat/221/notes">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.wired.com/story/microsoft-windows-recall-privilege-escalation/">Microsoft’s Recall Feature Is Even More Hackable Than You Thought</a> (WIRED)</p><p><a href="https://www.techspot.com/news/103301-microsoft-research-scientist-gives-non-answer-when-asked.html">Microsoft Research scientist gives non-answer when asked about Windows Recall privacy concerns</a> (TechSpot) </p><p><a href="https://cybersecuritynews.com/totalrecall-windows-11-recall/">TotalRecall: A New Tool that Extracts Data From Windows 11 Recall Feature</a> (Cyber Security News)</p><p><a href="https://www.axios.com/2024/05/30/congress-letter-microsoft-pentagon-licensing">Exclusive: Senators express "serious concern" with Pentagon's Microsoft plan</a> (Axios)</p><p><a href="https://securityaffairs.com/164250/intelligence/spectr-malware-used-in-sicksync-campaign.html">UAC-0020 used SPECTR Malware to target Ukraine defense forces</a> (Security Affairs) </p><p><a href="https://www.theregister.com/2024/06/07/russian_hacktivists_eu_elections/">Russian hacktivists vow mass attacks against EU elections</a> (The Register)</p><p><a href="https://cybersecuritynews.com/ransomware-exploits-coinminer-proxy/">Ransomware Actor Exploited CoinMiner Attacker's Proxy Server</a> (Cyber Security News)</p><p><a href="https://cybersecuritynews.com/critical-php-remote-code-execution-vulnerability/">Critical PHP Remote Code Execution Flaw let Attackers Inject Malicious Scripts</a> (Cyber Security News)</p><p><a href="https://cybernews.com/news/lastpass-outage-leaves-users-furiouos/">Users furious after LastPass down for hours</a> (Cybernews)</p><p><a href="https://www.securityweek.com/apple-says-iphones-will-get-security-updates-for-at-least-5-years/">Apple Says iPhones Will Get Security Updates for at Least 5 Years</a> (SecurityWeek) </p><p><a href="https://www.infosecurity-magazine.com/news/emailgpt-exposed-prompt-injection/">EmailGPT Exposed to Prompt Injection Attacks</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/fcc-proposes-bgp-security-reporting-for-broadband-providers/">FCC Proposes BGP Security Reporting for Broadband Providers</a> (SecurityWeek)</p><p><a href="https://www.pwc.com/us/en/services/consulting/cybersecurity-risk-regulatory/sec-final-cybersecurity-disclosure-rules/sec-10-k-cyber-disclosures.html">Unpacking the SEC 10-K cyber disclosures</a> (PwC) </p><p><a href="https://www.techspot.com/news/103304-apple-set-unveil-dedicated-password-manager-app-challenge.html">Apple set to launch Passwords app, taking on LastPass and 1Password</a> (TechSpot)</p><p><a href="https://cybersecuritynews.com/wineloader-mimic-as-ambassador/#google_vignette">Wineloader Mimic As Ambassador Of India To Start The Infection Chain</a> (Cyber Security News) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1530</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fdce4550-b95d-11ee-adc6-633fe0bf26c5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6745403432.mp3?updated=1718637604" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA's calls for a JCDC makeover.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2083/notes</link>
      <description>CSAC recommends key changes to the  Joint Cyber Defense Collaborative. Cloud vendor Snowflake says single-factor authentication is to blame in their recent breach. Publishers sue Google over pirated ebooks. The FBI shares LockBit decryption keys. V3B is a phishing as a service campaign targeting banking customers. Commando Cat targets Docker servers to deploy crypto miners. Our guest is Danny Allan, Snyk's CTO, discussing how in the rush to implement GenAI, some companies are bypassing best practices and security policies. Club Penguin fans stumble upon a cache of secrets in the house of mouse.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest is Danny Allan, Snyk's CTO, discussing how in the rush to implement GenAI, companies bypass best practices and security policies. This highlights a clear gap between those in leadership looking to adopt AI tools and the teams who are utilizing them. Learn more in Snyk Organizational AI Readiness Report. 

Selected Reading
CISA advisors urge changes to JCDC's goals, operations, membership criteria (The Record)
CISA says 'patch now' to 7-year-old Oracle WebLogic bug (The Register)
Snowflake says users with single-factor authentication targeted in attack (SC Media)
Advance Auto Parts stolen data for sale after Snowflake attack (Bleeping Computer)
Major Publishers Sue Google Over Ads for Pirated Ebooks (Publishing Perspectives)
FBI unveils 7,000 decryption keys to aid LockBit victims (Silicon Republic)
 Hackers Attacking Banking Customers Using Phishing-As-A-Service V3B Toolkit (GB Hackers)
Commando Cat: A Novel Cryptojacking Attack Abusing Docker Remote API Servers (Trend Micro)
Club Penguin fans breached Disney Confluence server, stole 2.5GB of data (Bleeping Computer) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 06 Jun 2024 20:10:00 -0000</pubDate>
      <itunes:title>CISA's calls for a JCDC makeover.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2083</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CSAC recommends key changes to the  Joint Cyber Defense Collaborative. Cloud vendor Snowflake says single-factor authentication is to blame in their recent breach. Publishers sue Google over pirated ebooks. The FBI shares LockBit decryption keys. V3B is a phishing as a service campaign targeting banking customers. Commando Cat targets Docker servers to deploy crypto miners. Our guest is Danny Allan, Snyk's CTO, discussing how in the rush to implement GenAI, some companies are bypassing best practices and security policies. Club Penguin fans stumble upon a cache of secrets in the house of mouse.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest is Danny Allan, Snyk's CTO, discussing how in the rush to implement GenAI, companies bypass best practices and security policies. This highlights a clear gap between those in leadership looking to adopt AI tools and the teams who are utilizing them. Learn more in Snyk Organizational AI Readiness Report. 

Selected Reading
CISA advisors urge changes to JCDC's goals, operations, membership criteria (The Record)
CISA says 'patch now' to 7-year-old Oracle WebLogic bug (The Register)
Snowflake says users with single-factor authentication targeted in attack (SC Media)
Advance Auto Parts stolen data for sale after Snowflake attack (Bleeping Computer)
Major Publishers Sue Google Over Ads for Pirated Ebooks (Publishing Perspectives)
FBI unveils 7,000 decryption keys to aid LockBit victims (Silicon Republic)
 Hackers Attacking Banking Customers Using Phishing-As-A-Service V3B Toolkit (GB Hackers)
Commando Cat: A Novel Cryptojacking Attack Abusing Docker Remote API Servers (Trend Micro)
Club Penguin fans breached Disney Confluence server, stole 2.5GB of data (Bleeping Computer) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CSAC recommends key changes to the  Joint Cyber Defense Collaborative. Cloud vendor Snowflake says single-factor authentication is to blame in their recent breach. Publishers sue Google over pirated ebooks. The FBI shares LockBit decryption keys. V3B is a phishing as a service campaign targeting banking customers. Commando Cat targets Docker servers to deploy crypto miners. Our guest is Danny Allan, Snyk's CTO, discussing how in the rush to implement GenAI, some companies are bypassing best practices and security policies. Club Penguin fans stumble upon a cache of secrets in the house of mouse.</p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest is <a href="https://www.linkedin.com/in/dannyallan/">Danny Allan</a>, <a href="https://snyk.io/">Snyk</a>'s CTO, discussing how in the rush to implement GenAI, companies bypass best practices and security policies. This highlights a clear gap between those in leadership looking to adopt AI tools and the teams who are utilizing them. Learn more in <a href="https://snyk.io/reports/secure-adoption-in-the-genai-era/">Snyk Organizational AI Readiness Report</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/jcdc-changes-recommended-csac-cisa">CISA advisors urge changes to JCDC's goals, operations, membership criteria</a> (The Record)</p><p><a href="https://www.theregister.com/2024/06/06/oracle_weblogic_vulnerability_exploited/">CISA says 'patch now' to 7-year-old Oracle WebLogic bug</a> (The Register)</p><p><a href="https://www.scmagazine.com/news/snowflake-says-users-with-single-factor-authentication-targeted-in-attack">Snowflake says users with single-factor authentication targeted in attack</a> (SC Media)</p><p><a href="https://www.bleepingcomputer.com/news/security/advance-auto-parts-stolen-data-for-sale-after-snowflake-attack/">Advance Auto Parts stolen data for sale after Snowflake attack</a> (Bleeping Computer)</p><p><a href="https://publishingperspectives.com/2024/06/major-publishers-sue-google-over-ads-for-pirated-ebooks/">Major Publishers Sue Google Over Ads for Pirated Ebooks</a> (Publishing Perspectives)</p><p><a href="https://www.siliconrepublic.com/enterprise/fbi-lockbit-decryption-keys-ransomware">FBI unveils 7,000 decryption keys to aid LockBit victims</a> (Silicon Republic)</p><p><a href="https://gbhackers.com/hackers-banking-customers-phishing-v3b-toolkit/"> Hackers Attacking Banking Customers Using Phishing-As-A-Service V3B Toolkit</a> (GB Hackers)</p><p><a href="https://www.trendmicro.com/en_us/research/24/f/commando-cat-a-novel-cryptojacking-attack-.html">Commando Cat: A Novel Cryptojacking Attack Abusing Docker Remote API Servers</a> (Trend Micro)</p><p><a href="https://www.bleepingcomputer.com/news/security/club-penguin-fans-breached-disney-confluence-server-stole-25gb-of-data/">Club Penguin fans breached Disney Confluence server, stole 2.5GB of data</a> (Bleeping Computer) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1418</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fd921738-b95d-11ee-adc6-272c6d46a853]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5205438020.mp3?updated=1718206584" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Opening up on hidden secrets.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2082/notes</link>
      <description>OpenAI insiders describe a culture of recklessness and secrecy. Concerns over Uganda’s biometric ID system. Sophos uncovers a Chinese cyberespionage operation called Crimson Palace. Poland aims to sure up cyber defenses against Russia. Zyxel warns of critical vulnerabilities in legacy NAS products. Arctic Wolf tracks an amateurish ransomware variant named Fog. A TikTok zero-day targets high profile accounts. Cisco patches a Webex vulnerability that exposed German government meetings. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey, diving into Domain 7, Security Operations. A Canadian data breach leads to a class action payday. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Learning Layer
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe dive into Domain 7, Security Operations, and tackle the following question:
Which of the following is the MOST important goal of Disaster Recovery Planning?

Business continuity

Critical infrastructure restoration

Human Safety

Regulatory compliance


Selected Reading
OpenAI Whistle-Blowers Describe Reckless and Secretive Culture (The New York Times)
Uganda: Yoweri Museveni's Critics Targeted Via Biometric ID System (Bloomberg)
Chinese South China Sea Cyberespionage Campaign Unearthed (GovInfo Security)
Palau confirms 'major' cyberattack, points to China (Digital Journal)
Poland to invest $760 million in cyberdefense as Russian pressure mounts (The Record)
'NsaRescueAngel' Backdoor Account Again Discovered in Zyxel Products (SecurityWeek)
Arctic Wolf sniffs out new ransomware variant (CSO Online)
CNN, Paris Hilton, and Sony TikTok accounts hacked via DMs (Security Affairs)
Cisco Patches Webex Bugs Following Exposure of German Government Meetings (SecurityWeek)
ICBC must pay $15K to all who had data breached before JIBC attacks (Vancouver Sun) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 05 Jun 2024 20:10:00 -0000</pubDate>
      <itunes:title>Opening up on hidden secrets.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2082</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>OpenAI insiders describe a culture of recklessness and secrecy. Concerns over Uganda’s biometric ID system. Sophos uncovers a Chinese cyberespionage operation called Crimson Palace. Poland aims to sure up cyber defenses against Russia. Zyxel warns of critical vulnerabilities in legacy NAS products. Arctic Wolf tracks an amateurish ransomware variant named Fog. A TikTok zero-day targets high profile accounts. Cisco patches a Webex vulnerability that exposed German government meetings. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey, diving into Domain 7, Security Operations. A Canadian data breach leads to a class action payday. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Learning Layer
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe dive into Domain 7, Security Operations, and tackle the following question:
Which of the following is the MOST important goal of Disaster Recovery Planning?

Business continuity

Critical infrastructure restoration

Human Safety

Regulatory compliance


Selected Reading
OpenAI Whistle-Blowers Describe Reckless and Secretive Culture (The New York Times)
Uganda: Yoweri Museveni's Critics Targeted Via Biometric ID System (Bloomberg)
Chinese South China Sea Cyberespionage Campaign Unearthed (GovInfo Security)
Palau confirms 'major' cyberattack, points to China (Digital Journal)
Poland to invest $760 million in cyberdefense as Russian pressure mounts (The Record)
'NsaRescueAngel' Backdoor Account Again Discovered in Zyxel Products (SecurityWeek)
Arctic Wolf sniffs out new ransomware variant (CSO Online)
CNN, Paris Hilton, and Sony TikTok accounts hacked via DMs (Security Affairs)
Cisco Patches Webex Bugs Following Exposure of German Government Meetings (SecurityWeek)
ICBC must pay $15K to all who had data breached before JIBC attacks (Vancouver Sun) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>OpenAI insiders describe a culture of recklessness and secrecy. Concerns over Uganda’s biometric ID system. Sophos uncovers a Chinese cyberespionage operation called Crimson Palace. Poland aims to sure up cyber defenses against Russia. Zyxel warns of critical vulnerabilities in legacy NAS products. Arctic Wolf tracks an amateurish ransomware variant named Fog. A TikTok zero-day targets high profile accounts. Cisco patches a Webex vulnerability that exposed German government meetings. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey, diving into Domain 7, Security Operations. A Canadian data breach leads to a class action payday. </p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Learning Layer</h2><p>On our Learning Layer segment, host <a href="https://www.linkedin.com/in/sam-meisenberg/">Sam Meisenberg</a> and <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a> continue their discussion of Joe's ISC2 <a href="https://www.cybervista.net/certify/cissp/">CISSP certification</a> journey using N2K’s comprehensive <a href="https://certify.cybervista.net/products/isc2/cissp-training-course/?utm_source=CWDP&amp;utm_medium=LL&amp;utm_campaign=HH_CISSP">CISSP training course</a>, <a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-pro/">CISSP practice test</a>, and <a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-professional-cissp-practice-labs/">CISSP practice labs</a>. Sam and Joe dive into Domain 7, Security Operations, and tackle the following question:</p><p>Which of the following is the MOST important goal of Disaster Recovery Planning?</p><ol>
<li>Business continuity</li>
<li>Critical infrastructure restoration</li>
<li>Human Safety</li>
<li>Regulatory compliance</li>
</ol><p><br></p><h2>Selected Reading</h2><p><a href="https://www.nytimes.com/2024/06/04/technology/openai-culture-whistleblowers.html?u2g=i&amp;amp;unlocked_article_code=1.xE0.qXLu.0XwdynmvKcft">OpenAI Whistle-Blowers Describe Reckless and Secretive Culture</a> (The New York Times)</p><p><a href="https://www.bloomberg.com/news/features/2024-06-04/uganda-yoweri-museveni-s-critics-targeted-via-biometric-id-system">Uganda: Yoweri Museveni's Critics Targeted Via Biometric ID System</a> (Bloomberg)</p><p><a href="https://www.govinfosecurity.com/chinese-south-china-sea-cyberespionage-campaign-unearthed-a-25411">Chinese South China Sea Cyberespionage Campaign Unearthed</a> (GovInfo Security)</p><p><a href="https://www.digitaljournal.com/world/palau-confirms-major-cyberattack-points-to-china/article">Palau confirms 'major' cyberattack, points to China</a> (Digital Journal)</p><p><a href="https://therecord.media/poland-cyberdefense-spending-russian-attacks">Poland to invest $760 million in cyberdefense as Russian pressure mounts</a> (The Record)</p><p><a href="https://www.securityweek.com/nsarescueangel-backdoor-account-again-discovered-in-zyxel-products/">'NsaRescueAngel' Backdoor Account Again Discovered in Zyxel Products</a> (SecurityWeek)</p><p><a href="https://www.csoonline.com/article/2138646/arctic-wolf-sniffs-out-new-ransomware-variant.html">Arctic Wolf sniffs out new ransomware variant</a> (CSO Online)</p><p><a href="https://securityaffairs.com/164158/hacking/tiktok-accounts-hacked-via-dms.html">CNN, Paris Hilton, and Sony TikTok accounts hacked via DMs</a> (Security Affairs)</p><p><a href="https://www.securityweek.com/cisco-patches-webex-bugs-following-exposure-of-german-government-meetings/">Cisco Patches Webex Bugs Following Exposure of German Government Meetings</a> (SecurityWeek)</p><p><a href="https://vancouversun.com/news/local-news/icbc-ordered-to-pay-15000-each-to-people-who-had-data-breached-before-justice-institute-attacks">ICBC must pay $15K to all who had data breached before JIBC attacks</a> (Vancouver Sun) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1548</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fd561896-b95d-11ee-adc6-57d8350f34b4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2803633377.mp3?updated=1717614185" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware hit causes pathology paralysis.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2081/notes</link>
      <description>Ransomware disrupts London hospitals. Researchers discover serious vulnerabilities in Progress' Telerik Report Server and Atlassian Confluence Data Center and Server. Over three million people are affected by a breach at a debt collection agency. A report finds Rural hospitals vulnerable to ransomware. An Australian mining firm finds some of its data on the Dark Web. Google patches 37 Android vulnerabilities. Russian threat actors target the Summer Olympics in Paris. On our Industry Voices segment, we are joined by Sandy Bird, CTO at Sonrai. Sandy discusses the risks of unused identity infrastructure. The Amazon rainforest goes online.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, we are joined by Sandy Bird, CTO at Sonrai. Sandy discusses the risks of unused identity infrastructure. You can learn more about Sonrai’s work in this area by reviewing their Quantifying Cloud Access Risk: Overprivileged Identities and Zombie Identities report.

Selected Reading
Critical incident declared as ransomware attack disrupts multiple London hospitals (The Record)
CVE-2024-4358, CVE-2024-1800: Exploit Code Available for Critical Exploit Chain in Progress Telerik Report Server (Tenable)
Atlassian’s Confluence hit with critical remote code execution bugs (CSO Online)
Debt collection agency FBCS leaks information of 3 million US citizens (Malwarebytes)
Rural hospitals are particularly vulnerable to ransomware, report finds (CyberScoop)
Australian rare earths miner hit by cybersecurity breach (Mining Weekly)
37 Vulnerabilities Patched in Android (SecurityWeek)
Russia used fake AI Tom Cruise in Olympic disinformation campaign (Computer Weekly)
The Internet's Final Frontier: Remote Amazon Tribes (New York Times)

Listen to our newest podcast, “Only Malware in the Building.”
N2K and Proofpoint have teamed up to launch “Only Malware in the Building,” the newest podcast on the N2K CyberWire network. Each month our hosts Selena Larson, Proofpoint’s staff threat researcher, and N2K’s Rick Howard and Dave Bittner, explore the mysteries around today’s most intriguing cyber threats. Listen to the first episode and subscribe now.

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Jun 2024 20:10:00 -0000</pubDate>
      <itunes:title>Ransomware hit causes pathology paralysis.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2081</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Ransomware disrupts London hospitals. Researchers discover serious vulnerabilities in Progress' Telerik Report Server and Atlassian Confluence Data Center and Server. Over three million people are affected by a breach at a debt collection agency. A report finds Rural hospitals vulnerable to ransomware. An Australian mining firm finds some of its data on the Dark Web. Google patches 37 Android vulnerabilities. Russian threat actors target the Summer Olympics in Paris. On our Industry Voices segment, we are joined by Sandy Bird, CTO at Sonrai. Sandy discusses the risks of unused identity infrastructure. The Amazon rainforest goes online.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, we are joined by Sandy Bird, CTO at Sonrai. Sandy discusses the risks of unused identity infrastructure. You can learn more about Sonrai’s work in this area by reviewing their Quantifying Cloud Access Risk: Overprivileged Identities and Zombie Identities report.

Selected Reading
Critical incident declared as ransomware attack disrupts multiple London hospitals (The Record)
CVE-2024-4358, CVE-2024-1800: Exploit Code Available for Critical Exploit Chain in Progress Telerik Report Server (Tenable)
Atlassian’s Confluence hit with critical remote code execution bugs (CSO Online)
Debt collection agency FBCS leaks information of 3 million US citizens (Malwarebytes)
Rural hospitals are particularly vulnerable to ransomware, report finds (CyberScoop)
Australian rare earths miner hit by cybersecurity breach (Mining Weekly)
37 Vulnerabilities Patched in Android (SecurityWeek)
Russia used fake AI Tom Cruise in Olympic disinformation campaign (Computer Weekly)
The Internet's Final Frontier: Remote Amazon Tribes (New York Times)

Listen to our newest podcast, “Only Malware in the Building.”
N2K and Proofpoint have teamed up to launch “Only Malware in the Building,” the newest podcast on the N2K CyberWire network. Each month our hosts Selena Larson, Proofpoint’s staff threat researcher, and N2K’s Rick Howard and Dave Bittner, explore the mysteries around today’s most intriguing cyber threats. Listen to the first episode and subscribe now.

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ransomware disrupts London hospitals. Researchers discover serious vulnerabilities in Progress' Telerik Report Server and Atlassian Confluence Data Center and Server. Over three million people are affected by a breach at a debt collection agency. A report finds Rural hospitals vulnerable to ransomware. An Australian mining firm finds some of its data on the Dark Web. Google patches 37 Android vulnerabilities. Russian threat actors target the Summer Olympics in Paris. On our Industry Voices segment, we are joined by Sandy Bird, CTO at Sonrai. Sandy discusses the risks of unused identity infrastructure. The Amazon rainforest goes online.</p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Voices segment, we are joined by <a href="https://www.linkedin.com/in/sandy-bird-835b5576/">Sandy Bird</a>, CTO at Sonrai. Sandy discusses the risks of unused identity infrastructure. You can learn more about Sonrai’s work in this area by reviewing their <a href="http://sonrai.co/access-report">Quantifying Cloud Access Risk: Overprivileged Identities and Zombie Identities</a> report.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/london-hospitals-ransomware-attack-critical-incident-declared">Critical incident declared as ransomware attack disrupts multiple London hospitals</a> (The Record)</p><p><a href="https://www.tenable.com/blog/cve-2024-4358-cve-2024-1800-exploit-code-available-for-critical-exploit-chain">CVE-2024-4358, CVE-2024-1800: Exploit Code Available for Critical Exploit Chain in Progress Telerik Report Server</a> (Tenable)</p><p><a href="https://www.csoonline.com/article/2138177/atlassians-confluence-hit-with-critical-remote-code-execution-bugs.html">Atlassian’s Confluence hit with critical remote code execution bugs</a> (CSO Online)</p><p><a href="https://www.malwarebytes.com/blog/news/2024/06/debt-collection-agency-fbcs-leaks-information-of-3-million-us-citizens">Debt collection agency FBCS leaks information of 3 million US citizens</a> (Malwarebytes)</p><p><a href="https://cyberscoop.com/rural-hospital-ransomware-cyber/">Rural hospitals are particularly vulnerable to ransomware, report finds</a> (CyberScoop)</p><p><a href="https://www.miningweekly.com/article/australian-rare-earths-miner-hit-by-cybersecurity-breach-2024-06-04">Australian rare earths miner hit by cybersecurity breach</a> (Mining Weekly)</p><p><a href="https://www.securityweek.com/37-vulnerabilities-patched-in-android/">37 Vulnerabilities Patched in Android</a> (SecurityWeek)</p><p><a href="https://www.computerweekly.com/news/366587515/Russia-used-fake-AI-Tom-Cruise-in-Olympic-disinformation-campaign">Russia used fake AI Tom Cruise in Olympic disinformation campaign</a> (Computer Weekly)</p><p><a href="https://www.nytimes.com/2024/06/02/world/americas/starlink-internet-elon-musk-brazil-amazon.html?unlocked_article_code=1.xE0.Qwuo.GUGp27Zbl4Zb">The Internet's Final Frontier: Remote Amazon Tribes</a> (New York Times)</p><p><br></p><h2><strong>Listen to our newest podcast, “Only Malware in the Building.”</strong></h2><p><a href="https://www.n2k.com/">N2K</a> and <a href="https://www.proofpoint.com/us">Proofpoint</a> have teamed up to launch “<a href="https://thecyberwire.com/podcasts/only-malware-in-the-building">Only Malware in the Building</a>,” the newest podcast on the <a href="https://thecyberwire.com/podcasts">N2K CyberWire network</a>. Each month our hosts <a href="https://www.linkedin.com/in/selenalarson/">Selena Larson</a>, Proofpoint’s staff threat researcher, and N2K’s <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> and <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a>, explore the mysteries around today’s most intriguing cyber threats. Listen to the <a href="https://thecyberwire.com/podcasts/only-malware-in-the-building/1/notes">first episode</a> and subscribe now.</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1663</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fd19c242-b95d-11ee-adc6-db6194445ca3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5223434138.mp3?updated=1717527743" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Things aren’t looking so Shiny(Hunters) at cloud provider Snowflake.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2080/notes</link>
      <description>Signs point to a major cybersecurity event at cloud provider Snowflake. Hugging Face discloses "unauthorized access" to its Spaces platform. Australian legislation seeks jail time for deepfake porn. CISA adds two vulnerabilities to the KEV catalog. Spanish police investigate a potential breach of drivers license info. NSA shares mobile device best practices. Everbridge crisis management software company reports a data breach. N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard joins us to preview CSO Perspectives Season 14 which launches today! Google tries to explain those weird AI search results. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard joins Dave to preview CSO Perspectives Season 14 which launches today! The first episode explores SolarWinds and the SEC. This episode of CSO Perspectives has a companion essay. You can find it here. Not an N2K Pro subscriber? You can catch the first half of the episode here. 

Selected Reading
The Ticketmaster Data Breach May Be Just the Beginning (WIRED)
Hugging Face says it detected 'unauthorized access' to its AI model hosting platform (TechCrunch)
Jail time for those caught distributing deepfake porn under new Australian laws (The Guardian)
CISA warns of actively exploited Linux privilege elevation flaw (Bleeping Computer)
Spanish police investigate whether hackers stole millions of drivers' data (Reuters)
The NSA advises you to turn your phone off and back on once a week - here's why (ZDNET)
Everbridge warns of corporate systems breach exposing business data (Bleeping Computer)
Google’s AI Overview is flawed by design, and a new company blog post hints at why (Ars Technica) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 03 Jun 2024 20:10:00 -0000</pubDate>
      <itunes:title>Things aren’t looking so Shiny(Hunters) at cloud provider Snowflake.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2080</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Signs point to a major cybersecurity event at cloud provider Snowflake. Hugging Face discloses "unauthorized access" to its Spaces platform. Australian legislation seeks jail time for deepfake porn. CISA adds two vulnerabilities to the KEV catalog. Spanish police investigate a potential breach of drivers license info. NSA shares mobile device best practices. Everbridge crisis management software company reports a data breach. N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard joins us to preview CSO Perspectives Season 14 which launches today! Google tries to explain those weird AI search results. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard joins Dave to preview CSO Perspectives Season 14 which launches today! The first episode explores SolarWinds and the SEC. This episode of CSO Perspectives has a companion essay. You can find it here. Not an N2K Pro subscriber? You can catch the first half of the episode here. 

Selected Reading
The Ticketmaster Data Breach May Be Just the Beginning (WIRED)
Hugging Face says it detected 'unauthorized access' to its AI model hosting platform (TechCrunch)
Jail time for those caught distributing deepfake porn under new Australian laws (The Guardian)
CISA warns of actively exploited Linux privilege elevation flaw (Bleeping Computer)
Spanish police investigate whether hackers stole millions of drivers' data (Reuters)
The NSA advises you to turn your phone off and back on once a week - here's why (ZDNET)
Everbridge warns of corporate systems breach exposing business data (Bleeping Computer)
Google’s AI Overview is flawed by design, and a new company blog post hints at why (Ars Technica) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Signs point to a major cybersecurity event at cloud provider Snowflake. Hugging Face discloses "unauthorized access" to its Spaces platform. Australian legislation seeks jail time for deepfake porn. CISA adds two vulnerabilities to the KEV catalog. Spanish police investigate a potential breach of drivers license info. NSA shares mobile device best practices. Everbridge crisis management software company reports a data breach. N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard joins us to preview CSO Perspectives Season 14 which launches today! Google tries to explain those weird AI search results. </p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.n2k.com/">N2K</a>’s CSO, Chief Analyst, and Senior Fellow, <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> joins Dave to preview <a href="https://thecyberwire.com/podcasts/cso-perspectives">CSO Perspectives </a>Season 14 which launches today! The first episode explores <a href="https://thecyberwire.com/podcasts/cso-perspectives/111/notes">SolarWinds and the SEC</a>. This episode of CSO Perspectives has a companion essay. You can find it <a href="https://thecyberwire.com/stories/e2f7071723964da1b7b3f7354838bcf5/solarwinds-and-the-sec">here</a>. Not an N2K Pro subscriber? You can catch the first half of the episode <a href="https://thecyberwire.com/podcasts/cso-perspectives-public/89/notes">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.wired.com/story/snowflake-breach-ticketmaster-santander-ticketek-hacked/">The Ticketmaster Data Breach May Be Just the Beginning</a> (WIRED)</p><p><a href="https://techcrunch.com/2024/05/31/hugging-face-says-it-detected-unauthorized-access-to-its-ai-model-hosting-platform/">Hugging Face says it detected 'unauthorized access' to its AI model hosting platform</a> (TechCrunch)</p><p><a href="https://www.theguardian.com/australia-news/article/2024/jun/01/creating-or-sharing-deepfake-porn-without-consent-to-be-under-proposed-new-australian-laws">Jail time for those caught distributing deepfake porn under new Australian laws</a> (The Guardian)</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-actively-exploited-linux-privilege-elevation-flaw/">CISA warns of actively exploited Linux privilege elevation flaw</a> (Bleeping Computer)</p><p><a href="https://www.reuters.com/technology/cybersecurity/spanish-police-investigate-whether-hackers-stole-millions-drivers-data-2024-05-31/">Spanish police investigate whether hackers stole millions of drivers' data</a> (Reuters)</p><p><a href="https://www.zdnet.com/article/the-nsa-advises-you-to-turn-your-phone-off-and-back-on-once-a-week-heres-why/">The NSA advises you to turn your phone off and back on once a week - here's why</a> (ZDNET)</p><p><a href="https://www.bleepingcomputer.com/news/security/everbridge-warns-of-corporate-systems-breach-exposing-business-data/">Everbridge warns of corporate systems breach exposing business data</a> (Bleeping Computer)</p><p><a href="https://arstechnica.com/information-technology/2024/05/googles-ai-overview-is-flawed-by-design-and-a-new-company-blog-post-hints-at-why/">Google’s AI Overview is flawed by design, and a new company blog post hints at why</a> (Ars Technica) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><h2><br></h2><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1354</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fcddfff0-b95d-11ee-adc6-eff233835195]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4855409412.mp3?updated=1717440233" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Solution Spotlight on the 2024 NICE Conference Keynote: A Journey with No Destination: A CISO’s Pathway to a Cybersecurity Career. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/65/notes</link>
      <description>As part of our series on the 2024 NICE Conference, we turn our focus to the one of the keynote speakers of the conference. This year’s conference theme “Strengthening Ecosystems: Aligning Stakeholders to Bridge the Cybersecurity Workforce Gap” highlights the collective effort to strengthen the cybersecurity landscape. By joining forces with key partners, we can foster a more robust cybersecurity ecosystem to bridge the workforce gap. 
In her keynote coming up on Tuesday, June 4th, Deneen DeFiore, Chief Information Security Officer of United Airlines, will discuss "A Journey with No Destination: A CISO’s Pathway to a Cybersecurity Career." 
Prior to the conference, Simone Petrella, N2K President, caught up with Deneen DeFiore. They discussed Deneen's history with NICE, the importance of prioritizing cyber talent and workforce issues, what stakeholders need to more effectively tackle the cyber skills and experience gap across the profession, and more. 
Find out more about the The Workforce Framework for Cybersecurity (NICE Framework) (NIST Special Publication 800-181, revision 1). Listen to our podcast about the update. Stay tuned for our coverage of the 2024 NICE Conference. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 03 Jun 2024 06:00:00 -0000</pubDate>
      <itunes:title>Solution Spotlight on the 2024 NICE Conference Keynote: A Journey with No Destination: A CISO’s Pathway to a Cybersecurity Career. [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>65</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>As part of our series on the 2024 NICE Conference, we turn our focus to the one of the keynote speakers of the conference. This year’s conference theme “Strengthening Ecosystems: Aligning Stakeholders to Bridge the Cybersecurity Workforce Gap” highlights the collective effort to strengthen the cybersecurity landscape. By joining forces with key partners, we can foster a more robust cybersecurity ecosystem to bridge the workforce gap. 
In her keynote coming up on Tuesday, June 4th, Deneen DeFiore, Chief Information Security Officer of United Airlines, will discuss "A Journey with No Destination: A CISO’s Pathway to a Cybersecurity Career." 
Prior to the conference, Simone Petrella, N2K President, caught up with Deneen DeFiore. They discussed Deneen's history with NICE, the importance of prioritizing cyber talent and workforce issues, what stakeholders need to more effectively tackle the cyber skills and experience gap across the profession, and more. 
Find out more about the The Workforce Framework for Cybersecurity (NICE Framework) (NIST Special Publication 800-181, revision 1). Listen to our podcast about the update. Stay tuned for our coverage of the 2024 NICE Conference. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As part of our series on the <a href="https://niceconference.org/">2024 NICE Conference</a>, we turn our focus to the one of the keynote speakers of the conference. This year’s conference theme “Strengthening Ecosystems: Aligning Stakeholders to Bridge the Cybersecurity Workforce Gap” highlights the collective effort to strengthen the cybersecurity landscape. By joining forces with key partners, we can foster a more robust cybersecurity ecosystem to bridge the workforce gap. </p><p>In her keynote coming up on Tuesday, June 4th, <a href="https://www.linkedin.com/in/deneendefiore/">Deneen DeFiore</a>, Chief Information Security Officer of <a href="https://www.united.com/en/us/fly/company/about-united.html">United Airlines</a>, will discuss "A Journey with No Destination: A CISO’s Pathway to a Cybersecurity Career." </p><p>Prior to the conference, <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a>, <a href="https://n2k.com/">N2K</a> President, caught up with Deneen DeFiore. They discussed Deneen's history with NICE, the importance of prioritizing cyber talent and workforce issues, what stakeholders need to more effectively tackle the cyber skills and experience gap across the profession, and more. </p><p>Find out more about the <a href="https://doi.org/10.6028/NIST.SP.800-181r1">The Workforce Framework for Cybersecurity (NICE Framework)</a> (NIST Special Publication 800-181, revision 1). <a href="https://thecyberwire.com/podcasts/special-edition/59/notes">Listen to our podcast about the update</a>. Stay tuned for our coverage of the 2024 NICE Conference. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1294</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4e5362c4-1f86-11ef-a495-03d8472e315b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8831017848.mp3?updated=1717440848" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SolarWinds and the SEC.</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/89/notes</link>
      <description>Rick Howard, N2K’s CSO and The CyberWire’s Chief Analyst and Senior Fellow, presents the argument for why the SEC was misguided when it charged the SolarWinds CISO, Tim Brown, with fraud the after the Russian SVR compromised the SolarWinds flagship product, Orion. Our guests are, Steve Winterfeld, Akamai’s Advisory CISO, and Ted Wagner, SAP National Security Services CISO.
References:
Andrew Goldstein, Josef Ansorge, Matt Nguyen, Robert Deniston, 2024. Fatal Flaws in SEC’s Amended Complaint Against SolarWinds [Analysis]. Crime &amp; Corruption. 
Anna-Louise Jackson, 2023. Earnings Reports: What Do Quarterly Earnings Tell You? [Explainer]. Forbes.
Brian Koppelman, David Levien, Andrew Ross Sorkin, 2016 - 2023. Billions [TV Show]. IMDb.
Dan Goodin, 2024. Financial institutions have 30 days to disclose breaches under new rules [News]. Ars Technica.
David Katz, 021. Corporate Governance Update: “Materiality” in America and Abroad [Essay]. The Harvard Law School Forum on Corporate Governance. 
Jessica Corso, 2024. SEC Zeroes In On SolarWinds Exec In Revised Complaint [Analysis]. Law360.
Johnathan Rudy, 2024. SEC files Amended complaint against SolarWinds and CISO [Civil Action]. LinkedIn.
Joseph Menn, 2023. Former Uber security chief Sullivan avoids prison in data breach case [WWW DocumentNews]. The Washington Post.
Kim Zetter, 2014. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon [Book]. Goodreads.
Kim Zetter, 2023. SEC Targets SolarWinds’ CISO for Rare Legal Action Over Russian Hack [WWW Document]. ZERO DAY. 
Kim Zetter, 2023. SolarWinds: The Untold Story of the Boldest Supply-Chain Hack [Essay]. WIRED. 
Rick Howard, 2022. Cyber sand table series: OPM [Podcast]. The CyberWire - CSO Perspectives Podcast.
Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads.
Pam Baker, 2021. The SolarWinds hack timeline: Who knew what, and when? [Timeline]. CSO Online.
Staff, 2009. Generally Accepted Accounting Principles (Topic 105) [Standard]. PWC. 
Staff. 30 October 2023. SEC Charges SolarWinds and Chief Information Security Officer with Fraud, Internal Control Failures [Website]. The U.S. Securities and Exchange Commision.
Staff, 31 October 2023. Securities and Exchange Commission v. SolarWinds Corporation and Timothy G. Brown, No. 23-civ-9518 (SDNY) [Case]. The Securities and Exchange Commission. 
Staff, 29 March 2024. Cooley, Cybersecurity Leaders File Brief Opposing SEC’s SolarWinds Cyberattack Case [Press Release]. Cooley.
Stephanie Pell, Jennifer Lee , Shoba Pillay, Jen Patja Howell, 2024. The SEC SolarWinds Enforcement Action [Podcast]. The Lawfare Podcast.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 03 Jun 2024 06:00:00 -0000</pubDate>
      <itunes:title>SolarWinds and the SEC.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>89</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Rick Howard, N2K’s CSO and The CyberWire’s Chief Analyst and Senior Fellow, presents the argument for why the SEC was misguided when it charged the SolarWinds CISO, Tim Brown, with fraud the after the Russian SVR compromised the SolarWinds flagship product, Orion. Our guests are, Steve Winterfeld, Akamai’s Advisory CISO, and Ted Wagner, SAP National Security Services CISO.
References:
Andrew Goldstein, Josef Ansorge, Matt Nguyen, Robert Deniston, 2024. Fatal Flaws in SEC’s Amended Complaint Against SolarWinds [Analysis]. Crime &amp; Corruption. 
Anna-Louise Jackson, 2023. Earnings Reports: What Do Quarterly Earnings Tell You? [Explainer]. Forbes.
Brian Koppelman, David Levien, Andrew Ross Sorkin, 2016 - 2023. Billions [TV Show]. IMDb.
Dan Goodin, 2024. Financial institutions have 30 days to disclose breaches under new rules [News]. Ars Technica.
David Katz, 021. Corporate Governance Update: “Materiality” in America and Abroad [Essay]. The Harvard Law School Forum on Corporate Governance. 
Jessica Corso, 2024. SEC Zeroes In On SolarWinds Exec In Revised Complaint [Analysis]. Law360.
Johnathan Rudy, 2024. SEC files Amended complaint against SolarWinds and CISO [Civil Action]. LinkedIn.
Joseph Menn, 2023. Former Uber security chief Sullivan avoids prison in data breach case [WWW DocumentNews]. The Washington Post.
Kim Zetter, 2014. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon [Book]. Goodreads.
Kim Zetter, 2023. SEC Targets SolarWinds’ CISO for Rare Legal Action Over Russian Hack [WWW Document]. ZERO DAY. 
Kim Zetter, 2023. SolarWinds: The Untold Story of the Boldest Supply-Chain Hack [Essay]. WIRED. 
Rick Howard, 2022. Cyber sand table series: OPM [Podcast]. The CyberWire - CSO Perspectives Podcast.
Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads.
Pam Baker, 2021. The SolarWinds hack timeline: Who knew what, and when? [Timeline]. CSO Online.
Staff, 2009. Generally Accepted Accounting Principles (Topic 105) [Standard]. PWC. 
Staff. 30 October 2023. SEC Charges SolarWinds and Chief Information Security Officer with Fraud, Internal Control Failures [Website]. The U.S. Securities and Exchange Commision.
Staff, 31 October 2023. Securities and Exchange Commission v. SolarWinds Corporation and Timothy G. Brown, No. 23-civ-9518 (SDNY) [Case]. The Securities and Exchange Commission. 
Staff, 29 March 2024. Cooley, Cybersecurity Leaders File Brief Opposing SEC’s SolarWinds Cyberattack Case [Press Release]. Cooley.
Stephanie Pell, Jennifer Lee , Shoba Pillay, Jen Patja Howell, 2024. The SEC SolarWinds Enforcement Action [Podcast]. The Lawfare Podcast.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rick Howard, N2K’s CSO and The CyberWire’s Chief Analyst and Senior Fellow, presents the argument for why the SEC was misguided when it charged the SolarWinds CISO, Tim Brown, with fraud the after the Russian SVR compromised the SolarWinds flagship product, Orion. Our guests are, Steve Winterfeld, Akamai’s Advisory CISO, and Ted Wagner, SAP National Security Services CISO.</p><h2>References:</h2><p><a href="https://cc.cooley.com/2024/04/17/fatal-flaws-in-secs-amended-complaint-against-SolarWinds/">Andrew Goldstein, Josef Ansorge, Matt Nguyen, Robert Deniston, 2024. Fatal Flaws in SEC’s Amended Complaint Against SolarWinds [Analysis]. Crime &amp; Corruption.</a> </p><p><a href="https://www.forbes.com/advisor/investing/earnings-reports/">Anna-Louise Jackson, 2023. Earnings Reports: What Do Quarterly Earnings Tell You? [Explainer]. Forbes.</a></p><p><a href="https://www.imdb.com/title/tt4270492/">Brian Koppelman, David Levien, Andrew Ross Sorkin, 2016 - 2023. Billions [TV Show]. IMDb.</a></p><p><a href="https://arstechnica.com/security/2024/05/new-sec-requirements-give-institutions-30-days-to-disclose-security-incidents/">Dan Goodin, 2024. Financial institutions have 30 days to disclose breaches under new rules [News]. Ars Technica.</a></p><p><a href="https://corpgov.law.harvard.edu/2021/05/01/corporate-governance-update-materiality-in-america-and-abroad/">David Katz, 021. Corporate Governance Update: “Materiality” in America and Abroad [Essay]. The Harvard Law School Forum on Corporate Governance.</a> </p><p><a href="https://www.law360.com/articles/1804498/sec-zeroes-in-on-SolarWinds-exec-in-revised-complaint">Jessica Corso, 2024. SEC Zeroes In On SolarWinds Exec In Revised Complaint [Analysis]. Law360.</a></p><p><a href="https://www.linkedin.com/posts/johnathanrudy_sec-v-SolarWinds-amended-complaint-activity-7165098597980565504-_VHN/">Johnathan Rudy, 2024. SEC files Amended complaint against SolarWinds and CISO [Civil Action]. LinkedIn.</a></p><p><a href="https://www.washingtonpost.com/technology/2023/05/04/sullivan-sentencing-uber-executive/">Joseph Menn, 2023. Former Uber security chief Sullivan avoids prison in data breach case [WWW DocumentNews]. The Washington Post.</a></p><p><a href="https://www.goodreads.com/book/show/18465875-countdown-to-zero-da">Kim Zetter, 2014. Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon [Book]. Goodreads.</a></p><p><a href="https://www.zetter-zeroday.com/sec-targets-SolarWinds-ciso-for-possible/">Kim Zetter, 2023. SEC Targets SolarWinds’ CISO for Rare Legal Action Over Russian Hack [WWW Document]. ZERO DAY.</a> </p><p><a href="https://www.wired.com/story/the-untold-story-of-SolarWinds-the-boldest-supply-chain-hack-ever">Kim Zetter, 2023. SolarWinds: The Untold Story of the Boldest Supply-Chain Hack [Essay]. WIRED. </a></p><p><a href="https://thecyberwire.com/stories/d0d8b9995bd84c389112385dd95ec4ee/cyber-sand-table-series-opm">Rick Howard, 2022. Cyber sand table series: OPM [Podcast]. The CyberWire - CSO Perspectives Podcast.</a></p><p><a href="https://www.goodreads.com/book/show/75671183-cybersecurity-first-principles">Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads.</a></p><p><a href="https://www.csoonline.com/article/570537/the-SolarWinds-hack-timeline-who-knew-what-and-when.html">Pam Baker, 2021. The SolarWinds hack timeline: Who knew what, and when? [Timeline]. CSO Online.</a></p><p><a href="https://viewpoint.pwc.com/dt/us/en/fasb_financial_accou/asus_fulltext/2009/asu_200901generally_/asu_200901generally__US/asu_200901generally__US.html#pwc-topic.dita_1925093104179416">Staff, 2009. Generally Accepted Accounting Principles (Topic 105) [Standard]. PWC.</a> </p><p><a href="https://www.sec.gov/news/press-release/2023-227">Staff. 30 October 2023. SEC Charges SolarWinds and Chief Information Security Officer with Fraud, Internal Control Failures [Website]. The U.S. Securities and Exchange Commision.</a></p><p><a href="https://www.sec.gov/litigation/litreleases/lr-25887">Staff, 31 October 2023. Securities and Exchange Commission v. SolarWinds Corporation and Timothy G. Brown, No. 23-civ-9518 (SDNY) [Case]. The Securities and Exchange Commission.</a> </p><p><a href="https://www.cooley.com/news/coverage/2024/2024-03-29-cooley-cybersecurity-leaders-file-brief-opposing-secs-SolarWinds-cyberattack-case">Staff, 29 March 2024. Cooley, Cybersecurity Leaders File Brief Opposing SEC’s SolarWinds Cyberattack Case [Press Release]. Cooley</a>.</p><p><a href="https://www.lawfaremedia.org/article/the-lawfare-podcast-shoba-pillay-and-jennifer-lee-on-the-sec-SolarWinds-enforcement-action">Stephanie Pell, Jennifer Lee , Shoba Pillay, Jen Patja Howell, 2024. The SEC SolarWinds Enforcement Action [Podcast]. The Lawfare Podcast.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1220</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1d36b2b4-1f8f-11ef-999a-77de07c920a2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7832834748.mp3?updated=1717189699" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Solution Spotlight on the 2024 NICE Conference: Business Roundtable.</title>
      <link>https://thecyberwire.com/podcasts/special-edition/64/notes</link>
      <description>As part of our series on the 2024 NICE Conference, we turn our focus to the Business Roundtable. This year’s conference theme “Strengthening Ecosystems: Aligning Stakeholders to Bridge the Cybersecurity Workforce Gap” highlights the collective effort to strengthen the cybersecurity landscape. By joining forces with key partners, we can foster a more robust cybersecurity ecosystem to bridge the workforce gap. Business Roundtable is an association of chief executive officers of America’s leading companies working to promote a thriving U.S. economy and expanded opportunity for all Americans through sound public policy. 
The Business Roundtable launched its Cybersecurity Workforce Corporate Initiative in December of 2022. In coordination with its members and inputs from experts at Department of Commerce’s National Initiative for Cybersecurity Education (NICE), it recently released a Cybersecurity Workforce Playbook to help employers create entry points to cybersecurity careers and strengthen cybersecurity talent pipelines across various industries and sectors.
Simone Petrella, N2K President, speaks with Erin White, Business Roundtable's Senior Director, Corporate Initiatives, about the Cybersecurity Workforce Corporate Initiative, the recently released Cybersecurity Workforce Playbook, key takeaways for the private sector, and how the Business Roundtable and NICE are working together to support these initiatives.
Find out more about the The Workforce Framework for Cybersecurity (NICE Framework) (NIST Special Publication 800-181, revision 1). Stay tuned for our coverage of the 2024 NICE Conference. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 02 Jun 2024 06:00:00 -0000</pubDate>
      <itunes:title>Solution Spotlight on the 2024 NICE Conference: Business Roundtable.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>64</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>As part of our series on the 2024 NICE Conference, we turn our focus to the Business Roundtable. This year’s conference theme “Strengthening Ecosystems: Aligning Stakeholders to Bridge the Cybersecurity Workforce Gap” highlights the collective effort to strengthen the cybersecurity landscape. By joining forces with key partners, we can foster a more robust cybersecurity ecosystem to bridge the workforce gap. Business Roundtable is an association of chief executive officers of America’s leading companies working to promote a thriving U.S. economy and expanded opportunity for all Americans through sound public policy. 
The Business Roundtable launched its Cybersecurity Workforce Corporate Initiative in December of 2022. In coordination with its members and inputs from experts at Department of Commerce’s National Initiative for Cybersecurity Education (NICE), it recently released a Cybersecurity Workforce Playbook to help employers create entry points to cybersecurity careers and strengthen cybersecurity talent pipelines across various industries and sectors.
Simone Petrella, N2K President, speaks with Erin White, Business Roundtable's Senior Director, Corporate Initiatives, about the Cybersecurity Workforce Corporate Initiative, the recently released Cybersecurity Workforce Playbook, key takeaways for the private sector, and how the Business Roundtable and NICE are working together to support these initiatives.
Find out more about the The Workforce Framework for Cybersecurity (NICE Framework) (NIST Special Publication 800-181, revision 1). Stay tuned for our coverage of the 2024 NICE Conference. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As part of our series on the <a href="https://niceconference.org/">2024 NICE Conference</a>, we turn our focus to the <a href="https://www.businessroundtable.org/https://www.businessroundtable.org/">Business Roundtable</a>. This year’s conference theme “Strengthening Ecosystems: Aligning Stakeholders to Bridge the Cybersecurity Workforce Gap” highlights the collective effort to strengthen the cybersecurity landscape. By joining forces with key partners, we can foster a more robust cybersecurity ecosystem to bridge the workforce gap. Business Roundtable is an association of chief executive officers of America’s leading companies working to promote a thriving U.S. economy and expanded opportunity for all Americans through sound public policy. </p><p>The Business Roundtable launched its <a href="https://www.businessroundtable.org/corporate-initiatives#cybersecurity-workforce-initiative">Cybersecurity Workforce Corporate Initiative</a> in December of 2022. In coordination with its members and inputs from experts at Department of Commerce’s National Initiative for Cybersecurity Education (NICE), it recently released a <a href="https://www.businessroundtable.org/cybersecurity-workforce-playbook">Cybersecurity Workforce Playbook</a> to help employers create entry points to cybersecurity careers and strengthen cybersecurity talent pipelines across various industries and sectors.</p><p><a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a>, <a href="https://n2k.com/">N2K</a> President, speaks with <a href="https://www.linkedin.com/in/erin-white-88b9009/">Erin White</a>, Business Roundtable's Senior Director, Corporate Initiatives, about the Cybersecurity Workforce Corporate Initiative, the recently released Cybersecurity Workforce Playbook, key takeaways for the private sector, and how the Business Roundtable and NICE are working together to support these initiatives.</p><p>Find out more about the <a href="https://doi.org/10.6028/NIST.SP.800-181r1">The Workforce Framework for Cybersecurity (NICE Framework)</a> (NIST Special Publication 800-181, revision 1). Stay tuned for our coverage of the 2024 NICE Conference. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1648</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[476b43ba-1f80-11ef-adf2-8f09a1235934]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5079984043.mp3?updated=1717189978" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Diane M. Janosek: It's only together that we are going to rise. [Education] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/18/notes</link>
      <description>Commandant for the National Security Agency's National Cryptologic School Diane M. Janosek shares the story of her career going global Diane explains how she's always been drawn to doing things that could help and raise the nation. From a position as a law clerk during law school, to the role of a judicial clerk, and joining the White House Counsel's office, Diane was exposed to many things and felt she experienced the full circle. Moving on to the Pentagon and finally, the NSA, Diane transitioned into her current role where she orchestrates the educational environment for military and civilian cyber and cryptologists worldwide for the nation. Diane encourages those who love to learn to join the multidisciplinary cybersecurity field. Our thanks to Diane for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Jun 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Diane M. Janosek: It's only together that we are going to rise. [Education] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>18</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Commandant for the National Security Agency's National Cryptologic School Diane M. Janosek shares the story of her career going global Diane explains how she's always been drawn to doing things that could help and raise the nation. From a position as a law clerk during law school, to the role of a judicial clerk, and joining the White House Counsel's office, Diane was exposed to many things and felt she experienced the full circle. Moving on to the Pentagon and finally, the NSA, Diane transitioned into her current role where she orchestrates the educational environment for military and civilian cyber and cryptologists worldwide for the nation. Diane encourages those who love to learn to join the multidisciplinary cybersecurity field. Our thanks to Diane for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Commandant for the National Security Agency's National Cryptologic School Diane M. Janosek shares the story of her career going global Diane explains how she's always been drawn to doing things that could help and raise the nation. From a position as a law clerk during law school, to the role of a judicial clerk, and joining the White House Counsel's office, Diane was exposed to many things and felt she experienced the full circle. Moving on to the Pentagon and finally, the NSA, Diane transitioned into her current role where she orchestrates the educational environment for military and civilian cyber and cryptologists worldwide for the nation. Diane encourages those who love to learn to join the multidisciplinary cybersecurity field. Our thanks to Diane for sharing her story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>469</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[000abef0-1f86-11ef-806a-6b07c5a72fd1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9072714207.mp3?updated=1718395849" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>1700 IPs and counting. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/332/notes</link>
      <description>Amit Malik, Director of Threat Research at Uptycs, is sharing their work on "New Threat Detected: Inside Our Discovery of the Log4j Campaign and Its XMRig Malware." The Uptycs Threat Research Team has discovered a large-scale Log4j campaign involving over 1700 IPs, aiming to deploy XMRig cryptominer malware.
This ongoing operation was initially detected through the team's honeypot collection, prompting an in-depth analysis of the campaign. The research says "The JNDI plugin is particularly useful to attackers because it allows them not only to fetch the values of environment variables in the target system but also to freely define the URL and protocol resource for the JNDI network connection."
The research can be found here:
New Threat Detected: Inside Our Discovery of the Log4j Campaign and Its XMRig Malware

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Jun 2024 07:00:00 -0000</pubDate>
      <itunes:title>1700 IPs and counting. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>332</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Amit Malik, Director of Threat Research at Uptycs, is sharing their work on "New Threat Detected: Inside Our Discovery of the Log4j Campaign and Its XMRig Malware." The Uptycs Threat Research Team has discovered a large-scale Log4j campaign involving over 1700 IPs, aiming to deploy XMRig cryptominer malware.
This ongoing operation was initially detected through the team's honeypot collection, prompting an in-depth analysis of the campaign. The research says "The JNDI plugin is particularly useful to attackers because it allows them not only to fetch the values of environment variables in the target system but also to freely define the URL and protocol resource for the JNDI network connection."
The research can be found here:
New Threat Detected: Inside Our Discovery of the Log4j Campaign and Its XMRig Malware

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Amit Malik, Director of Threat Research at Uptycs, is sharing their work on "New Threat Detected: Inside Our Discovery of the Log4j Campaign and Its XMRig Malware." The Uptycs Threat Research Team has discovered a large-scale Log4j campaign involving over 1700 IPs, aiming to deploy XMRig cryptominer malware.</p><p>This ongoing operation was initially detected through the team's honeypot collection, prompting an in-depth analysis of the campaign. The research says "The JNDI plugin is particularly useful to attackers because it allows them not only to fetch the values of environment variables in the target system but also to freely define the URL and protocol resource for the JNDI network connection."</p><p>The research can be found here:</p><ul><li><a href="https://www.uptycs.com/blog/log4j-campaign-xmrig-malware">New Threat Detected: Inside Our Discovery of the Log4j Campaign and Its XMRig Malware</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>955</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8cabe43a-1f75-11ef-967d-d307e44ba983]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5893215177.mp3?updated=1717179824" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New cybersecurity bill aims to untangle federal regulations.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2079/notes</link>
      <description>Draft legislation looks to streamline federal cybersecurity regulations. Clarity.fm exposed personal information of business leaders and celebrities. Researchers find european politicians’ personal info for sale on the dark web. The BBC’s pension scheme suffers a breach. OpenAI disrupts covert influence operations making use of their platform. Hackers brick over 600,000 routers. Cracked copies of Microsoft office deliver a malware mix. A senator calls for accountability in the Change Healthcare ransomware attack. On our Industry Voices segment, we hear from SpyCloud’s Chip Witt, on navigating the threat of digital identity exposure. Florida man becomes Moscow’s fake-news puppet.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, we hear from Chip Witt, SpyCloud's SVP, Product Management, discussing navigating the threat of digital identity exposure. To learn more, check out SpyCloud’s Annual Identity Exposure Report 2024. 

Selected Reading
Senate chairman wants new White House-led panel to streamline federal cyber rules (The Record)
Data Leak Exposes Business Leaders and Top Celebrity Data (Hackread)
Information of Hundreds of European Politicians Found on Dark Web (SecurityWeek)
BBC Pension Scheme Breached, Exposing Employee Data (Infosecurity Magazine)
OpenAI accuses Russia, China, Iran, and Israel of misusing its GenAI tools for covert Ops (CSO Online)
Mystery malware destroys 600,000 routers from a single ISP during 72-hour span (Ars Technica)
Pirated Microsoft Office delivers malware cocktail on systems (Bleeping Computer)
UnitedHealth leaders 'should be held responsible' for installing inexperienced CISO, senator says (The Record)
Once a Sheriff’s Deputy in Florida, Now a Source of Disinformation From Russia (The New York Times) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 31 May 2024 20:10:00 -0000</pubDate>
      <itunes:title>New cybersecurity bill aims to untangle federal regulations.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2079</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Draft legislation looks to streamline federal cybersecurity regulations. Clarity.fm exposed personal information of business leaders and celebrities. Researchers find european politicians’ personal info for sale on the dark web. The BBC’s pension scheme suffers a breach. OpenAI disrupts covert influence operations making use of their platform. Hackers brick over 600,000 routers. Cracked copies of Microsoft office deliver a malware mix. A senator calls for accountability in the Change Healthcare ransomware attack. On our Industry Voices segment, we hear from SpyCloud’s Chip Witt, on navigating the threat of digital identity exposure. Florida man becomes Moscow’s fake-news puppet.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, we hear from Chip Witt, SpyCloud's SVP, Product Management, discussing navigating the threat of digital identity exposure. To learn more, check out SpyCloud’s Annual Identity Exposure Report 2024. 

Selected Reading
Senate chairman wants new White House-led panel to streamline federal cyber rules (The Record)
Data Leak Exposes Business Leaders and Top Celebrity Data (Hackread)
Information of Hundreds of European Politicians Found on Dark Web (SecurityWeek)
BBC Pension Scheme Breached, Exposing Employee Data (Infosecurity Magazine)
OpenAI accuses Russia, China, Iran, and Israel of misusing its GenAI tools for covert Ops (CSO Online)
Mystery malware destroys 600,000 routers from a single ISP during 72-hour span (Ars Technica)
Pirated Microsoft Office delivers malware cocktail on systems (Bleeping Computer)
UnitedHealth leaders 'should be held responsible' for installing inexperienced CISO, senator says (The Record)
Once a Sheriff’s Deputy in Florida, Now a Source of Disinformation From Russia (The New York Times) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Draft legislation looks to streamline federal cybersecurity regulations. Clarity.fm exposed personal information of business leaders and celebrities. Researchers find european politicians’ personal info for sale on the dark web. The BBC’s pension scheme suffers a breach. OpenAI disrupts covert influence operations making use of their platform. Hackers brick over 600,000 routers. Cracked copies of Microsoft office deliver a malware mix. A senator calls for accountability in the Change Healthcare ransomware attack. On our Industry Voices segment, we hear from SpyCloud’s Chip Witt, on navigating the threat of digital identity exposure. Florida man becomes Moscow’s fake-news puppet.</p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Voices segment, we hear from <a href="https://www.linkedin.com/in/chipwitt/">Chip Witt</a>, <a href="https://spycloud.com/">SpyCloud</a>'s SVP, Product Management, discussing navigating the threat of digital identity exposure. To learn more, check out <a href="https://spycloud.com/resource/spycloud-annual-identity-exposure-report-2024/">SpyCloud’s Annual Identity Exposure Report 2024</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/gary-peters-legislation-new-committee-oncd-harmonize-cyber-regulations">Senate chairman wants new White House-led panel to streamline federal cyber rules</a> (The Record)</p><p><a href="https://hackread.com/data-leak-exposes-business-leaders-celebrity-data/">Data Leak Exposes Business Leaders and Top Celebrity Data</a> (Hackread)</p><p><a href="https://www.securityweek.com/information-of-hundreds-of-european-politicians-found-on-dark-web/">Information of Hundreds of European Politicians Found on Dark Web</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/bbc-pension-breached-employee-data/">BBC Pension Scheme Breached, Exposing Employee Data</a> (Infosecurity Magazine)</p><p><a href="https://www.csoonline.com/article/2134290/openai-accuses-russia-china-iran-and-israel-of-misusing-its-genai-tools-for-covert-ops.html">OpenAI accuses Russia, China, Iran, and Israel of misusing its GenAI tools for covert Ops</a> (CSO Online)</p><p><a href="https://arstechnica.com/security/2024/05/mystery-malware-destroys-600000-routers-from-a-single-isp-during-72-hour-span/">Mystery malware destroys 600,000 routers from a single ISP during 72-hour span</a> (Ars Technica)</p><p><a href="https://www.bleepingcomputer.com/news/security/pirated-microsoft-office-delivers-malware-cocktail-on-systems/">Pirated Microsoft Office delivers malware cocktail on systems</a> (Bleeping Computer)</p><p><a href="https://therecord.media/unitedhealth-ciso-wyden-letter-sec-ftc">UnitedHealth leaders 'should be held responsible' for installing inexperienced CISO, senator says</a> (The Record)</p><p><a href="https://www.nytimes.com/2024/05/29/business/mark-dougan-russia-disinformation.html">Once a Sheriff’s Deputy in Florida, Now a Source of Disinformation From Russia</a> (The New York Times) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1791</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fca28e2a-b95d-11ee-adc6-5befbeb352b4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9485051500.mp3?updated=1717443921" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Operation Endgame: Hackers' hideouts exposed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2078/notes</link>
      <description>Operation Endgame takes down malware operations around the globe. A major botnet operator is arrested. Ticketmaster’s massive data breach is confirmed, and so is Google’s SEO algorithm leak. Journalists and activists in Europe were targeted with Pegasus spyware. Okta warns users of credential stuffing attacks. NIST hopes to clear out the NVD backlog. On our Threat Vector segment, host David Moulton speaks with Greg Jones, Chief Information Security Officer at Xavier University of Louisiana. Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA, joins us to discuss software security. LightSpy surveillance malware comes to macOS. ChatGPT briefly gets a god mode.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA, joins us to discuss software security.

Threat Vector
In this Threat Vector segment, host David Moulton speaks with Greg Jones, Chief Information Security Officer at Xavier University of Louisiana. Greg brings a wealth of knowledge from his military background and applies a disciplined, adaptive approach to securing one of America's most vibrant educational institutions. You can listen to David and Greg’s full discussion here. 

Selected Reading
Police seize malware loader servers, arrest four cybercriminals (Bleeping Computer)
Is Your Computer Part of ‘The Largest Botnet Ever?’ (Krebs on Security)
Ticketmaster hacked. Breach affects more than half a billion users. (Mashable)
Google confirms the leaked Search documents are real (The Verge)
Phones of journalists and activists in Europe targeted with Pegasus (CyberScoop)
Okta Warns of Credential Stuffing Attacks Targeting Cross-Origin Authentication (SecurityWeek)
NIST says NVD will be back on track by September 2024 (Help Net Security)
macOS version of elusive 'LightSpy' spyware tool discovered (Bleeping Computer)
Hacker Releases Jailbroken "Godmode" Version of ChatGPT (Futurism) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 30 May 2024 21:20:00 -0000</pubDate>
      <itunes:title>Operation Endgame: Hackers' hideouts exposed.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2078</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Operation Endgame takes down malware operations around the globe. A major botnet operator is arrested. Ticketmaster’s massive data breach is confirmed, and so is Google’s SEO algorithm leak. Journalists and activists in Europe were targeted with Pegasus spyware. Okta warns users of credential stuffing attacks. NIST hopes to clear out the NVD backlog. On our Threat Vector segment, host David Moulton speaks with Greg Jones, Chief Information Security Officer at Xavier University of Louisiana. Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA, joins us to discuss software security. LightSpy surveillance malware comes to macOS. ChatGPT briefly gets a god mode.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA, joins us to discuss software security.

Threat Vector
In this Threat Vector segment, host David Moulton speaks with Greg Jones, Chief Information Security Officer at Xavier University of Louisiana. Greg brings a wealth of knowledge from his military background and applies a disciplined, adaptive approach to securing one of America's most vibrant educational institutions. You can listen to David and Greg’s full discussion here. 

Selected Reading
Police seize malware loader servers, arrest four cybercriminals (Bleeping Computer)
Is Your Computer Part of ‘The Largest Botnet Ever?’ (Krebs on Security)
Ticketmaster hacked. Breach affects more than half a billion users. (Mashable)
Google confirms the leaked Search documents are real (The Verge)
Phones of journalists and activists in Europe targeted with Pegasus (CyberScoop)
Okta Warns of Credential Stuffing Attacks Targeting Cross-Origin Authentication (SecurityWeek)
NIST says NVD will be back on track by September 2024 (Help Net Security)
macOS version of elusive 'LightSpy' spyware tool discovered (Bleeping Computer)
Hacker Releases Jailbroken "Godmode" Version of ChatGPT (Futurism) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Operation Endgame takes down malware operations around the globe. A major botnet operator is arrested. Ticketmaster’s massive data breach is confirmed, and so is Google’s SEO algorithm leak. Journalists and activists in Europe were targeted with Pegasus spyware. Okta warns users of credential stuffing attacks. NIST hopes to clear out the NVD backlog. On our Threat Vector segment, host David Moulton speaks with Greg Jones, Chief Information Security Officer at Xavier University of Louisiana. Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA, joins us to discuss software security. LightSpy surveillance malware comes to macOS. ChatGPT briefly gets a god mode.</p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/eric-goldstein-15658223/">Eric Goldstein</a>, Executive Assistant Director for Cybersecurity at <a href="https://www.cisa.gov/">CISA</a>, joins us to discuss software security.</p><p><br></p><h2><strong>Threat Vector</strong></h2><p>In this <a href="https://thecyberwire.com/podcasts/threat-vector">Threat Vector</a> segment, host<a href="https://www.linkedin.com/in/davidrmoulton/"> David Moulton</a> speaks with<a href="https://www.linkedin.com/in/gregory-jones-60a55a8b/"> Greg Jones</a>, Chief Information Security Officer at<a href="https://www.xula.edu/"> Xavier University of Louisiana</a>. Greg brings a wealth of knowledge from his military background and applies a disciplined, adaptive approach to securing one of America's most vibrant educational institutions. You can listen to David and Greg’s full discussion <a href="https://thecyberwire.com/podcasts/threat-vector">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/police-seize-malware-loader-servers-arrest-four-cybercriminals/">Police seize malware loader servers, arrest four cybercriminals</a> (Bleeping Computer)</p><p><a href="https://krebsonsecurity.com/2024/05/is-your-computer-part-of-the-largest-botnet-ever/">Is Your Computer Part of ‘The Largest Botnet Ever?’</a> (Krebs on Security)</p><p><a href="https://mashable.com/article/ticketmaster-data-breach-shinyhunters-hack">Ticketmaster hacked. Breach affects more than half a billion users. </a>(Mashable)</p><p><a href="https://www.theverge.com/2024/5/29/24167407/google-search-algorithm-documents-leak-confirmation">Google confirms the leaked Search documents are real</a> (The Verge)</p><p><a href="https://cyberscoop.com/spyware-europe-nso-pegasus/">Phones of journalists and activists in Europe targeted with Pegasus</a> (CyberScoop)</p><p><a href="https://www.securityweek.com/okta-warns-of-credential-stuffing-attacks-targeting-cross-origin-authentication/">Okta Warns of Credential Stuffing Attacks Targeting Cross-Origin Authentication</a> (SecurityWeek)</p><p><a href="https://www.helpnetsecurity.com/2024/05/30/nist-nvd-back-on-track/">NIST says NVD will be back on track by September 2024</a> (Help Net Security)</p><p><a href="https://www.bleepingcomputer.com/news/security/macos-version-of-elusive-lightspy-spyware-tool-discovered/">macOS version of elusive 'LightSpy' spyware tool discovered</a> (Bleeping Computer)</p><p><a href="https://futurism.com/hackers-jailbroken-chatgpt-godmode">Hacker Releases Jailbroken "Godmode" Version of ChatGPT</a> (Futurism) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1990</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fc66cb6a-b95d-11ee-adc6-0b48f4f226e7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6935855041.mp3?updated=1717102882" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Alleged leaked files expose a dirty secret.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2077/notes</link>
      <description>An alleged leak of Google’s search algorithm contradicts the company’s public statements.  German researchers discover a critical vulnerability in a TP-Link router. Breachforums is back…maybe. The Seattle Public Library suffers a ransomware attack. A Georgia man gets ten years for money laundering and romance scams, and the Treasury department sanctions a group of botnet operators. 44,000 individuals are affected by the breach of a major U.S. title insurance company. Microsoft describes North Korea’s Moonstone Sleet. Advocating for a more architectural approach to cybersecurity. Maria Varmazis speaks with WiCyS Executive Director Lynn Dohm and a panel of N2K experts about the 2024 Cyber Talent Study. A cracked password results in a multimillion dollar windfall. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Learning Layer
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe dive into Domain 6: Security Assessment and Testing and tackle the following question together:
You are hiring a vendor to perform a penetration test that would simulate a breach from an insider threat. What type of test would be BEST to perform? 

Blue Box

Black Box

White-hat hack

White box


CyberWire Guest
Maria Varmazis, N2K host of T-Minus Space Daily, talks with WiCyS Executive Director Lynn Dohm and N2K's Simone Petrella, Dr. Heather Monthie, and Jeff Welgan about the 2024 Cyber Talent Study. You can find out more about the study here. 

Selected Reading
Google won’t comment on a potentially massive leak of its search algorithm documentation (The Verge)
Update TP-Link's Archer C5400X router now to fix remote takeover vulnerability (TechSpot)
Data leak site BreachForums is back, boasting Live Nation/Ticketmaster user data. But is it a trap? (Malwarebytes)
Ransomware attack on Seattle Public Library knocks out online systems (The Record)
Man Sentenced for Laundering Over $4.5M Obtained from Business Email Compromise and Romance Fraud Schemes (United States Department of Justice)
Treasury Sanctions a Cybercrime Network Associated with the 911 S5 Botnet (United States Department of Treasury)
First American December data breach impacts 44,000 people (Bleeping Computer)
Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks (Microsoft Security Blog)
Cybersecurity at a crossroads: Time to shift to an architectural approach (CSO Online)
How Researchers Cracked an 11-Year-Old Password to a $3 Million Crypto Wallet (WIRED) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 29 May 2024 20:10:00 -0000</pubDate>
      <itunes:title>Alleged leaked files expose a dirty secret.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2077</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>An alleged leak of Google’s search algorithm contradicts the company’s public statements.  German researchers discover a critical vulnerability in a TP-Link router. Breachforums is back…maybe. The Seattle Public Library suffers a ransomware attack. A Georgia man gets ten years for money laundering and romance scams, and the Treasury department sanctions a group of botnet operators. 44,000 individuals are affected by the breach of a major U.S. title insurance company. Microsoft describes North Korea’s Moonstone Sleet. Advocating for a more architectural approach to cybersecurity. Maria Varmazis speaks with WiCyS Executive Director Lynn Dohm and a panel of N2K experts about the 2024 Cyber Talent Study. A cracked password results in a multimillion dollar windfall. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Learning Layer
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe dive into Domain 6: Security Assessment and Testing and tackle the following question together:
You are hiring a vendor to perform a penetration test that would simulate a breach from an insider threat. What type of test would be BEST to perform? 

Blue Box

Black Box

White-hat hack

White box


CyberWire Guest
Maria Varmazis, N2K host of T-Minus Space Daily, talks with WiCyS Executive Director Lynn Dohm and N2K's Simone Petrella, Dr. Heather Monthie, and Jeff Welgan about the 2024 Cyber Talent Study. You can find out more about the study here. 

Selected Reading
Google won’t comment on a potentially massive leak of its search algorithm documentation (The Verge)
Update TP-Link's Archer C5400X router now to fix remote takeover vulnerability (TechSpot)
Data leak site BreachForums is back, boasting Live Nation/Ticketmaster user data. But is it a trap? (Malwarebytes)
Ransomware attack on Seattle Public Library knocks out online systems (The Record)
Man Sentenced for Laundering Over $4.5M Obtained from Business Email Compromise and Romance Fraud Schemes (United States Department of Justice)
Treasury Sanctions a Cybercrime Network Associated with the 911 S5 Botnet (United States Department of Treasury)
First American December data breach impacts 44,000 people (Bleeping Computer)
Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks (Microsoft Security Blog)
Cybersecurity at a crossroads: Time to shift to an architectural approach (CSO Online)
How Researchers Cracked an 11-Year-Old Password to a $3 Million Crypto Wallet (WIRED) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An alleged leak of Google’s search algorithm contradicts the company’s public statements.  German researchers discover a critical vulnerability in a TP-Link router. Breachforums is back…maybe. The Seattle Public Library suffers a ransomware attack. A Georgia man gets ten years for money laundering and romance scams, and the Treasury department sanctions a group of botnet operators. 44,000 individuals are affected by the breach of a major U.S. title insurance company. Microsoft describes North Korea’s Moonstone Sleet. Advocating for a more architectural approach to cybersecurity. Maria Varmazis speaks with WiCyS Executive Director Lynn Dohm and a panel of N2K experts about the 2024 Cyber Talent Study. A cracked password results in a multimillion dollar windfall. </p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Learning Layer</h2><p>On our Learning Layer segment, host <a href="https://www.linkedin.com/in/sam-meisenberg/">Sam Meisenberg</a> and <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a> continue their discussion of Joe's ISC2 <a href="https://www.cybervista.net/certify/cissp/">CISSP certification</a> journey using N2K’s comprehensive <a href="https://certify.cybervista.net/products/isc2/cissp-training-course/?utm_source=CWDP&amp;utm_medium=LL&amp;utm_campaign=HH_CISSP">CISSP training course</a>, <a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-pro/">CISSP practice test</a>, and <a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-professional-cissp-practice-labs/">CISSP practice labs</a>. Sam and Joe dive into Domain 6: Security Assessment and Testing and tackle the following question together:</p><p>You are hiring a vendor to perform a penetration test that would simulate a breach from an insider threat. What type of test would be BEST to perform? </p><ol>
<li>Blue Box</li>
<li>Black Box</li>
<li>White-hat hack</li>
<li>White box</li>
</ol><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a>, N2K host of<a href="https://space.n2k.com/podcasts/t-minus"> T-Minus Space Daily</a>, talks with <a href="https://www.wicys.org/">WiCyS</a> Executive Director <a href="https://www.linkedin.com/in/lynndohm/">Lynn Dohm</a> and <a href="https://www.n2k.com/">N2K</a>'s <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a>, <a href="https://www.linkedin.com/in/heathermonthie/">Dr. Heather Monthie</a>, and <a href="https://www.linkedin.com/in/jeff-welgan/">Jeff Welgan</a> about the 2024 Cyber Talent Study. You can find out more about the study <a href="https://thecyberwire.com/stories/26bb319eafd94f1eae68af038afd917c/wicys-partners-with-n2k-networks-for-pioneering-cyber-talent-study">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.theverge.com/2024/5/28/24166177/google-search-ranking-algorithm-leak-documents-link-seo">Google won’t comment on a potentially massive leak of its search algorithm documentation</a> (The Verge)</p><p><a href="https://www.techspot.com/news/103173-update-tp-link-archer-c5400x-router-now-fix.html">Update TP-Link's Archer C5400X router now to fix remote takeover vulnerability</a> (TechSpot)</p><p><a href="https://www.malwarebytes.com/blog/news/2024/05/data-leak-site-breachforums-is-back-boasting-live-nation-ticketmaster-user-data-but-is-it-a-trap">Data leak site BreachForums is back, boasting Live Nation/Ticketmaster user data. But is it a trap?</a> (Malwarebytes)</p><p><a href="https://therecord.media/ransomware-attack-seattle-knocks-out">Ransomware attack on Seattle Public Library knocks out online systems</a> (The Record)</p><p><a href="https://www.justice.gov/opa/pr/man-sentenced-laundering-over-45m-obtained-business-email-compromise-and-romance-fraud">Man Sentenced for Laundering Over $4.5M Obtained from Business Email Compromise and Romance Fraud Schemes</a> (United States Department of Justice)</p><p><a href="https://home.treasury.gov/news/press-releases/jy2375">Treasury Sanctions a Cybercrime Network Associated with the 911 S5 Botnet</a> (United States Department of Treasury)</p><p><a href="https://www.bleepingcomputer.com/news/security/first-american-december-data-breach-impacts-44-000-people/">First American December data breach impacts 44,000 people</a> (Bleeping Computer)</p><p><a href="https://www.microsoft.com/en-us/security/blog/2024/05/28/moonstone-sleet-emerges-as-new-north-korean-threat-actor-with-new-bag-of-tricks/">Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks</a> (Microsoft Security Blog)</p><p><a href="https://www.csoonline.com/article/2126804/cybersecurity-is-at-a-crossroads-its-time-to-shift-to-an-architectural-approach.html">Cybersecurity at a crossroads: Time to shift to an architectural approach</a> (CSO Online)</p><p><a href="https://www.wired.com/story/roboform-password-3-million-dollar-crypto-wallet/">How Researchers Cracked an 11-Year-Old Password to a $3 Million Crypto Wallet</a> (WIRED) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2218</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fc2b7376-b95d-11ee-adc6-df1bdbcea8cb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2528508296.mp3?updated=1717010180" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FBI untangles the web that is Scattered Spider.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2076/notes</link>
      <description>The FBI untangles Scattered Spider. The RansomHub group puts a deadline on Christie’s. Prescription services warn customers of data breaches. Personal data from public sector workers in India is leaked online. Check Point says check your VPNs. The Internet Archive suffers DDoS attacks. A Minesweeper clone installs malicious scripts. N2K T-Minus Space Daily podcast host Maria Varmazis speaks with guest Carrie Hernandez Marshall, CEO and Co-Founder from Rebel Space Technologies, about the need to extend cybersecurity into space. If you can’t beat ‘em, troll ‘em. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
N2K T-Minus Space Daily podcast host Maria Varmazis speaks with guest Carrie Hernandez Marshall, CEO and Co-Founder from Rebel Space Technologies, about the need to extend cybersecurity into space.

Selected Reading
Potent youth cybercrime ring made up of 1,000 people, FBI official says (CyberScoop)
Christie’s given Friday ransom deadline after threat group claims responsibility for cyber attack (ITPro)
Data Stolen From MediSecure for Sale on Dark Web (SecurityWeek)
2.8 Million Impacted by Data Breach at Prescription Services Firm Sav-Rx (SecurityWeek)
Data leak exposes personal data of Indian military and police (CSO Online)
Check Point warns of threat actors targeting its VPNs (TechMonitor)
Internet Archive Hit With DDoS Attack (PCMag)
Hackers phish finance orgs using trojanized Minesweeper clone (bleepingcomputer)
Cops Are Just Trolling Cybercriminals Now (WIRED) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 May 2024 20:10:00 -0000</pubDate>
      <itunes:title>FBI untangles the web that is Scattered Spider.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2076</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The FBI untangles Scattered Spider. The RansomHub group puts a deadline on Christie’s. Prescription services warn customers of data breaches. Personal data from public sector workers in India is leaked online. Check Point says check your VPNs. The Internet Archive suffers DDoS attacks. A Minesweeper clone installs malicious scripts. N2K T-Minus Space Daily podcast host Maria Varmazis speaks with guest Carrie Hernandez Marshall, CEO and Co-Founder from Rebel Space Technologies, about the need to extend cybersecurity into space. If you can’t beat ‘em, troll ‘em. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
N2K T-Minus Space Daily podcast host Maria Varmazis speaks with guest Carrie Hernandez Marshall, CEO and Co-Founder from Rebel Space Technologies, about the need to extend cybersecurity into space.

Selected Reading
Potent youth cybercrime ring made up of 1,000 people, FBI official says (CyberScoop)
Christie’s given Friday ransom deadline after threat group claims responsibility for cyber attack (ITPro)
Data Stolen From MediSecure for Sale on Dark Web (SecurityWeek)
2.8 Million Impacted by Data Breach at Prescription Services Firm Sav-Rx (SecurityWeek)
Data leak exposes personal data of Indian military and police (CSO Online)
Check Point warns of threat actors targeting its VPNs (TechMonitor)
Internet Archive Hit With DDoS Attack (PCMag)
Hackers phish finance orgs using trojanized Minesweeper clone (bleepingcomputer)
Cops Are Just Trolling Cybercriminals Now (WIRED) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FBI untangles Scattered Spider. The RansomHub group puts a deadline on Christie’s. Prescription services warn customers of data breaches. Personal data from public sector workers in India is leaked online. Check Point says check your VPNs. The Internet Archive suffers DDoS attacks. A Minesweeper clone installs malicious scripts. N2K T-Minus Space Daily podcast host Maria Varmazis speaks with guest Carrie Hernandez Marshall, CEO and Co-Founder from Rebel Space Technologies, about the need to extend cybersecurity into space. If you can’t beat ‘em, troll ‘em. </p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>N2K<a href="https://space.n2k.com/podcasts/t-minus"> </a><a href="https://space.n2k.com/podcasts/t-minus">T-Minus Space Daily</a> podcast host<a href="https://www.linkedin.com/in/varmazis?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAACcmioBIvUOYgJj_S9Ndqn6Z6puOpcB4n0&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BJ4fAG9maQUaK8Blu%2FIjNIg%3D%3D"> </a><a href="https://www.linkedin.com/in/varmazis?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAACcmioBIvUOYgJj_S9Ndqn6Z6puOpcB4n0&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BJ4fAG9maQUaK8Blu%2FIjNIg%3D%3D">Maria Varmazis</a> speaks with guest<a href="https://www.linkedin.com/in/carriehz/"> </a><a href="https://www.linkedin.com/in/carriehz/">Carrie Hernandez Marshall</a>, CEO and Co-Founder from<a href="https://www.rebelspacetech.com/"> </a><a href="https://www.rebelspacetech.com/">Rebel Space Technologies</a>, about the need to extend cybersecurity into space.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://cyberscoop.com/potent-youth-cybercrime-ring-made-up-of-1000-people-fbi-official-says/">Potent youth cybercrime ring made up of 1,000 people, FBI official says</a><a href="https://cyberscoop.com/potent-youth-cybercrime-ring-made-up-of-1000-people-fbi-official-says/"> </a>(CyberScoop)</p><p><a href="https://www.itpro.com/security/ransomware/christies-given-friday-ransom-deadline-after-threat-group-claims-responsibility-for-cyber-attack">Christie’s given Friday ransom deadline after threat group claims responsibility for cyber attack</a><a href="https://www.itpro.com/security/ransomware/christies-given-friday-ransom-deadline-after-threat-group-claims-responsibility-for-cyber-attack"> </a>(ITPro)</p><p><a href="https://www.securityweek.com/data-stolen-from-medisecure-for-sale-on-dark-web/">Data Stolen From MediSecure for Sale on Dark Web</a><a href="https://www.securityweek.com/data-stolen-from-medisecure-for-sale-on-dark-web/"> </a>(SecurityWeek)</p><p><a href="https://www.securityweek.com/2-8-million-impacted-by-data-breach-at-prescription-services-firm-sav-rx/">2.8 Million Impacted by Data Breach at Prescription Services Firm Sav-Rx</a> (SecurityWeek)</p><p><a href="https://www.csoonline.com/article/2127645/data-leak-exposes-personal-data-of-indian-military-and-police.html">Data leak exposes personal data of Indian military and police</a><a href="https://www.csoonline.com/article/2127645/data-leak-exposes-personal-data-of-indian-military-and-police.html"> </a>(CSO Online)</p><p><a href="https://techmonitor.ai/technology/cybersecurity/check-point-vpns">Check Point warns of threat actors targeting its VPNs</a> (TechMonitor)</p><p><a href="https://www.pcmag.com/news/internet-archive-hit-with-ddos-attack">Internet Archive Hit With DDoS Attack</a><a href="https://www.pcmag.com/news/internet-archive-hit-with-ddos-attack"> </a>(PCMag)</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-phish-finance-orgs-using-trojanized-minesweeper-clone/">Hackers phish finance orgs using trojanized Minesweeper clone</a> (bleepingcomputer)</p><p><a href="https://www.wired.com/story/cop-cybercriminal-hacker-psyops/">Cops Are Just Trolling Cybercriminals Now</a><a href="https://www.wired.com/story/cop-cybercriminal-hacker-psyops/"> </a>(WIRED) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1994</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fbf03f2c-b95d-11ee-adc6-5b530f02b3ce]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5303954582.mp3?updated=1716922695" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Memorial Day special.</title>
      <link>https://thecyberwire.com/podcasts/cso-perspectives-public/5571/notes</link>
      <description>Rick Howard, N2K CyberWire’s Chief Analyst, CSO, and Senior Fellow, commemorates Memorial Day.
References:
Abraham Lincoln, 1863. The Gettysburg Address [Speech]. Abraham Lincoln Online.
Amanda Onion, Original 2009, Updated 2023. Memorial Day 2022: Facts, Meaning &amp; Traditions [Essay]. HISTORY. 
Brent Hugh, 2021. A Brief History of “John Brown’s Body” [Essay]. Digital History. 
Bob Zeller, 2022. How Many Died in the American Civil War? [Essay]. HISTORY. 
General George Marshall, 2014. President Lincoln’s Letter to Mrs Bixby [Movie Clip - Saving Private Ryan]. YouTube. 
JOHN LOGAN, 1868. Logan’s Order Mandating Memorial Day [Order]. John A. Logan College.
John Williams, Chicago Symphony Orchestra, 2012. The People’s House: Lincoln (Original Motion Picture Soundtrack) [Song]. Apple Music.
John Williams, Chicago Symphony Orchestra, 2012. The Blue and the Grey: Lincoln (Original Motion Picture Soundtrack) [Song]. Apple Music - Web Playe. 
Livia Albeck-Ripka, 2023. A Brief History of Memorial Day [Essay]. The New York Times. 
Paul Robeson, 2021. John Brown’s Body [Song]. YouTube. 
Robert Rodat (Writer), Steven Spielberg (Director), Harve Presnell (Actor), 1998. Saving Private Ryan [Movie]. IMDb.
Staff, 2020. A Brief Biography of General John A. Logan [Biography]. John A. Logan College. 
Staff, 2024. Civil War Timeline [WWW Document], American Battlefield Trust.
Thomas Jefferson, 1776. Declaration of Independence: [Transcription]. National Archives. 
Winston Churchil, 1940. Never was so much owed by so many to so few - Winston Churchill Speeches [Speech]. YouTube. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 27 May 2024 06:00:00 -0000</pubDate>
      <itunes:title>Memorial Day special.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>10</itunes:season>
      <itunes:episode>5571</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Rick Howard, N2K CyberWire’s Chief Analyst, CSO, and Senior Fellow, commemorates Memorial Day.
References:
Abraham Lincoln, 1863. The Gettysburg Address [Speech]. Abraham Lincoln Online.
Amanda Onion, Original 2009, Updated 2023. Memorial Day 2022: Facts, Meaning &amp; Traditions [Essay]. HISTORY. 
Brent Hugh, 2021. A Brief History of “John Brown’s Body” [Essay]. Digital History. 
Bob Zeller, 2022. How Many Died in the American Civil War? [Essay]. HISTORY. 
General George Marshall, 2014. President Lincoln’s Letter to Mrs Bixby [Movie Clip - Saving Private Ryan]. YouTube. 
JOHN LOGAN, 1868. Logan’s Order Mandating Memorial Day [Order]. John A. Logan College.
John Williams, Chicago Symphony Orchestra, 2012. The People’s House: Lincoln (Original Motion Picture Soundtrack) [Song]. Apple Music.
John Williams, Chicago Symphony Orchestra, 2012. The Blue and the Grey: Lincoln (Original Motion Picture Soundtrack) [Song]. Apple Music - Web Playe. 
Livia Albeck-Ripka, 2023. A Brief History of Memorial Day [Essay]. The New York Times. 
Paul Robeson, 2021. John Brown’s Body [Song]. YouTube. 
Robert Rodat (Writer), Steven Spielberg (Director), Harve Presnell (Actor), 1998. Saving Private Ryan [Movie]. IMDb.
Staff, 2020. A Brief Biography of General John A. Logan [Biography]. John A. Logan College. 
Staff, 2024. Civil War Timeline [WWW Document], American Battlefield Trust.
Thomas Jefferson, 1776. Declaration of Independence: [Transcription]. National Archives. 
Winston Churchil, 1940. Never was so much owed by so many to so few - Winston Churchill Speeches [Speech]. YouTube. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rick Howard, N2K CyberWire’s Chief Analyst, CSO, and Senior Fellow, commemorates Memorial Day.</p><h2>References:</h2><p><a href="https://www.abrahamlincolnonline.org/lincoln/speeches/gettysburg.htm">Abraham Lincoln, 1863. The Gettysburg Address [Speech]. Abraham Lincoln Online.</a></p><p><a href="https://www.history.com/topics/holidays/memorial-day-history">Amanda Onion, Original 2009, Updated 2023. Memorial Day 2022: Facts, Meaning &amp; Traditions [Essay]. HISTORY.</a> </p><p><a href="https://www.digitalhistory.uh.edu/active_learning/explorations/brown/music1.cfm">Brent Hugh, 2021. A Brief History of “John Brown’s Body” [Essay]. Digital History.</a> </p><p><a href="https://www.history.com/news/american-civil-war-deaths">Bob Zeller, 2022. How Many Died in the American Civil War? [Essay]. HISTORY.</a> </p><p><a href="https://www.youtube.com/watch?v=rvwsdDRyXPw">General George Marshall, 2014. President Lincoln’s Letter to Mrs Bixby [Movie Clip - Saving Private Ryan]. YouTube.</a> </p><p><a href="https://www.jalc.edu/admissions/logans-order-mandating-memorial-day/">JOHN LOGAN, 1868. Logan’s Order Mandating Memorial Day [Order]. John A. Logan College.</a></p><p><a href="https://music.apple.com/us/album/lincoln-original-motion-picture-soundtrack/569934319">John Williams, Chicago Symphony Orchestra, 2012. The People’s House: Lincoln (Original Motion Picture Soundtrack) [Song]. Apple Music.</a></p><p><a href="https://music.apple.com/us/album/lincoln-original-motion-picture-soundtrack/569934319">John Williams, Chicago Symphony Orchestra, 2012. The Blue and the Grey: Lincoln (Original Motion Picture Soundtrack) [Song]. Apple Music - Web Playe.</a> </p><p><a href="https://www.nytimes.com/article/memorial-day-history.html">Livia Albeck-Ripka, 2023. A Brief History of Memorial Day [Essay]. The New York Times. </a></p><p><a href="https://www.youtube.com/watch?v=E1mpFCRbuFw">Paul Robeson, 2021. John Brown’s Body [Song]. YouTube.</a> </p><p><a href="https://www.imdb.com/title/tt0120815/">Robert Rodat (Writer), Steven Spielberg (Director), Harve Presnell (Actor), 1998. Saving Private Ryan [Movie]. IMDb.</a></p><p><a href="https://www.jalc.edu/admissions/a-brief-biography-of-general-john-a-logan/">Staff, 2020. A Brief Biography of General John A. Logan [Biography]. John A. Logan College.</a> </p><p><a href="https://www.battlefields.org/learn/articles/day-civil-war">Staff, 2024. Civil War Timeline [WWW Document], American Battlefield Trust.</a></p><p><a href="https://www.archives.gov/founding-docs/declaration-transcript">Thomas Jefferson, 1776. Declaration of Independence: [Transcription]. National Archives. </a></p><p><a href="https://www.youtube.com/watch?v=Y0t-RqjMH-A">Winston Churchil, 1940. Never was so much owed by so many to so few - Winston Churchill Speeches [Speech]. YouTube.</a> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1134</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[471c501a-1a04-11ef-a0ea-872383f3573f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8615876886.mp3?updated=1716580115" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Richard Torres: Getting that level of experience is going to be crucial. [Security Operations] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/17/notes</link>
      <description>Director of security operations at Syntax Richard Torres talks about his path leading him working in juvenile justice to becoming a private investigator to physical security at a nuclear power plant to cybersecurity presently. Always a fan of police shows, Richard became a member of the Air Force Junior ROTC in high school and began his path there. Richard shares the challenges of working in several facets of the security industry including his transition from SWAT team member to cybersecurity. He notes the role that diplomacy plays when you're trying to get honesty and be steered in the right direction. Our thanks to Richard for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 26 May 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Richard Torres: Getting that level of experience is going to be crucial. [Security Operations] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>17</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Director of security operations at Syntax Richard Torres talks about his path leading him working in juvenile justice to becoming a private investigator to physical security at a nuclear power plant to cybersecurity presently. Always a fan of police shows, Richard became a member of the Air Force Junior ROTC in high school and began his path there. Richard shares the challenges of working in several facets of the security industry including his transition from SWAT team member to cybersecurity. He notes the role that diplomacy plays when you're trying to get honesty and be steered in the right direction. Our thanks to Richard for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Director of security operations at Syntax Richard Torres talks about his path leading him working in juvenile justice to becoming a private investigator to physical security at a nuclear power plant to cybersecurity presently. Always a fan of police shows, Richard became a member of the Air Force Junior ROTC in high school and began his path there. Richard shares the challenges of working in several facets of the security industry including his transition from SWAT team member to cybersecurity. He notes the role that diplomacy plays when you're trying to get honesty and be steered in the right direction. Our thanks to Richard for sharing his story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>494</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8538b5a2-1a02-11ef-bddd-bb012579d522]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1935809002.mp3?updated=1716578661" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>International effort dismantles LockBit. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/331/notes</link>
      <description>Jon DiMaggio, a Chief Security Strategist at Analyst1, is sharing his work on "Ransomware Diaries Volume 5: Unmasking LockBit." On February 19, 2024, the National Crime Agency (NCA), a UK sovereign law enforcement agency, in collaboration with the FBI, Europol, and nine other countries under "Operation Cronos," disrupted the LockBit ransomware gang’s data leak site used for shaming, extorting, and leaking victim data.
The NCA greeted visitors to LockBit’s dark web leak site with a seizure banner, revealing they had been controlling LockBit’s infrastructure for some time, collecting information, acquiring victim decryption keys, and even compromising the new ransomware payload intended for LockBit 4.0.
The research can be found here:
Ransomware Diaries Volume 5: Unmasking LockBit

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 May 2024 07:00:00 -0000</pubDate>
      <itunes:title>International effort dismantles LockBit. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>331</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Jon DiMaggio, a Chief Security Strategist at Analyst1, is sharing his work on "Ransomware Diaries Volume 5: Unmasking LockBit." On February 19, 2024, the National Crime Agency (NCA), a UK sovereign law enforcement agency, in collaboration with the FBI, Europol, and nine other countries under "Operation Cronos," disrupted the LockBit ransomware gang’s data leak site used for shaming, extorting, and leaking victim data.
The NCA greeted visitors to LockBit’s dark web leak site with a seizure banner, revealing they had been controlling LockBit’s infrastructure for some time, collecting information, acquiring victim decryption keys, and even compromising the new ransomware payload intended for LockBit 4.0.
The research can be found here:
Ransomware Diaries Volume 5: Unmasking LockBit

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jon DiMaggio, a Chief Security Strategist at Analyst1, is sharing his work on "Ransomware Diaries Volume 5: Unmasking LockBit." On February 19, 2024, the National Crime Agency (NCA), a UK sovereign law enforcement agency, in collaboration with the FBI, Europol, and nine other countries under "Operation Cronos," disrupted the LockBit ransomware gang’s data leak site used for shaming, extorting, and leaking victim data.</p><p>The NCA greeted visitors to LockBit’s dark web leak site with a seizure banner, revealing they had been controlling LockBit’s infrastructure for some time, collecting information, acquiring victim decryption keys, and even compromising the new ransomware payload intended for LockBit 4.0.</p><p>The research can be found here:</p><ul><li><a href="https://analyst1.com/ransomware-diaries-volume-5-unmasking-lockbit-2/">Ransomware Diaries Volume 5: Unmasking LockBit</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1739</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b40efd0a-191c-11ef-a85b-4b11b7e6667c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5775328725.mp3?updated=1716482773" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybercriminals target London drugs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2075/notes</link>
      <description>LockBit drops 300 gigabytes of data from London Drugs. Video software used in courtrooms worldwide contains a backdoor. Google patches another Chrome zero-day. The EU seeks collaboration between research universities and intelligence agencies. Atlas Lion targets retailers with gift card scams. Researchers explore an Apple reappearing photo bug. Hackers access a Japanese solar power grid. Congress floats a bill to enhance cyber workforce diversity. Ben Yelin joins us with a groundbreaking legal case involving AI generated CSAM. Whistling past the expired domain graveyard. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Ben Yelin, co host of our Caveat podcast and Program Director for Public Policy &amp; External Affairs at the University of Maryland Center for Health and Homeland Security, discusses "FBI Arrests Man For Generating AI Child Sexual Abuse Imagery."

Selected Reading
Hackers release corporate data stolen from London Drugs, company says (The Star)
Crooks plant backdoor in software used by courtrooms around the world (Ars Technica)
Google fixes eighth actively exploited Chrome zero-day this year (Bleeping Computer)
EU wants universities to work with intelligence agencies to protect their research (The Record)
US retailers under attack by gift card-thieving cyber gang (Help Net Security)
Apple wasn’t storing deleted iOS photos in iCloud after all (Bleeping Computer)
Hijack of monitoring devices highlights cyber threat to solar power infrastructure (CSO Online)
New Diverse Cybersecurity Workforce bill to promote inclusivity, provide CISA with millions for outreach (Industrial Cyber)
When privacy expires: how I got access to tons of sensitive citizen data after buying cheap domains (INTI)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 24 May 2024 20:10:00 -0000</pubDate>
      <itunes:title>Cybercriminals target London drugs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2075</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>LockBit drops 300 gigabytes of data from London Drugs. Video software used in courtrooms worldwide contains a backdoor. Google patches another Chrome zero-day. The EU seeks collaboration between research universities and intelligence agencies. Atlas Lion targets retailers with gift card scams. Researchers explore an Apple reappearing photo bug. Hackers access a Japanese solar power grid. Congress floats a bill to enhance cyber workforce diversity. Ben Yelin joins us with a groundbreaking legal case involving AI generated CSAM. Whistling past the expired domain graveyard. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Ben Yelin, co host of our Caveat podcast and Program Director for Public Policy &amp; External Affairs at the University of Maryland Center for Health and Homeland Security, discusses "FBI Arrests Man For Generating AI Child Sexual Abuse Imagery."

Selected Reading
Hackers release corporate data stolen from London Drugs, company says (The Star)
Crooks plant backdoor in software used by courtrooms around the world (Ars Technica)
Google fixes eighth actively exploited Chrome zero-day this year (Bleeping Computer)
EU wants universities to work with intelligence agencies to protect their research (The Record)
US retailers under attack by gift card-thieving cyber gang (Help Net Security)
Apple wasn’t storing deleted iOS photos in iCloud after all (Bleeping Computer)
Hijack of monitoring devices highlights cyber threat to solar power infrastructure (CSO Online)
New Diverse Cybersecurity Workforce bill to promote inclusivity, provide CISA with millions for outreach (Industrial Cyber)
When privacy expires: how I got access to tons of sensitive citizen data after buying cheap domains (INTI)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>LockBit drops 300 gigabytes of data from London Drugs. Video software used in courtrooms worldwide contains a backdoor. Google patches another Chrome zero-day. The EU seeks collaboration between research universities and intelligence agencies. Atlas Lion targets retailers with gift card scams. Researchers explore an Apple reappearing photo bug. Hackers access a Japanese solar power grid. Congress floats a bill to enhance cyber workforce diversity. Ben Yelin joins us with a groundbreaking legal case involving AI generated CSAM. Whistling past the expired domain graveyard. </p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/benjamin-yelin-5b14114b/">Ben Yelin</a>, co host of our <a href="https://thecyberwire.com/podcasts/caveat">Caveat</a> podcast and Program Director for Public Policy &amp; External Affairs at the <a href="https://www.mdchhs.com/">University of Maryland Center for Health and Homeland Security</a>, discusses "<a href="https://www.404media.co/fbi-arrests-man-for-generating-ai-child-sexual-abuse-imagery/">FBI Arrests Man For Generating AI Child Sexual Abuse Imagery</a>."</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.thestar.com/news/canada/hackers-release-corporate-data-stolen-from-london-drugs-company-says/article_77186421-561a-5631-a596-b0515afea92b.html">Hackers release corporate data stolen from London Drugs, company says</a> (The Star)</p><p><a href="https://arstechnica.com/security/2024/05/crooks-plant-backdoor-in-software-used-by-courtrooms-around-the-world/">Crooks plant backdoor in software used by courtrooms around the world</a> (Ars Technica)</p><p><a href="https://www.bleepingcomputer.com/news/security/google-fixes-eighth-actively-exploited-chrome-zero-day-this-year/">Google fixes eighth actively exploited Chrome zero-day this year</a> (Bleeping Computer)</p><p><a href="https://therecord.media/eu-research-universities-intelligence-agencies-foreign-espionage">EU wants universities to work with intelligence agencies to protect their research</a> (The Record)</p><p><a href="https://www.helpnetsecurity.com/2024/05/24/storm-0539-gift-cards/">US retailers under attack by gift card-thieving cyber gang</a> (Help Net Security)</p><p><a href="https://www.bleepingcomputer.com/news/security/apple-wasnt-storing-deleted-ios-photos-in-icloud-after-all/">Apple wasn’t storing deleted iOS photos in iCloud after all</a> (Bleeping Computer)</p><p><a href="https://www.csoonline.com/article/2119281/hijack-of-monitoring-devices-highlights-cyber-threat-to-solar-power-infrastructure.html">Hijack of monitoring devices highlights cyber threat to solar power infrastructure</a> (CSO Online)</p><p><a href="https://industrialcyber.co/training-development/new-diverse-cybersecurity-workforce-bill-to-promote-inclusivity-in-cybersecurity-provide-cisa-with-millions-for-outreach/">New Diverse Cybersecurity Workforce bill to promote inclusivity, provide CISA with millions for outreach</a> (Industrial Cyber)</p><p><a href="https://inti.io/p/when-privacy-expires-how-i-got-access">When privacy expires: how I got access to tons of sensitive citizen data after buying cheap domains</a> (INTI)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1429</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fb78df86-b95d-11ee-adc6-2b8c49634db0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9423236218.mp3?updated=1716578150" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Checkmate at check in. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2074/notes</link>
      <description>Spyware is discovered on U.S. hotel check in systems. A Microsoft outage affects multiple services. Bitdefender uncovers Unfading Sea Haze. University of Maryland researchers find flaws in Apple’s Wi-Fi positioning system. Scotland’s NRS reveals a sensitive data leak. Rapid7 tracks the rise in zero-day exploits and mass compromise events. The SEC hits the operator of the New York Stock Exchange with a ten million dollar fine. Operation Diplomatic Specter targets political entities in the Middle East, Africa, and Asia. The FCC considers AI disclosure rules for political ads. N2K T-Minus Space Daily podcast host Maria Varmazis speaks with guests Brianna Bace and Unal Tatar PhD sharing their work on Legal Perspectives on Cyberattacks Targeting Space Systems. Tone-blasting underwater data centers. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
N2K T-Minus Space Daily podcast host Maria Varmazis speaks with guests Brianna Bace and Unal Tatar PhD sharing their work on their paper: Law in Orbit: International Legal Perspectives on Cyberattacks Targeting Space Systems. You can learn more about their work in this post. Check out T-Minus Space Daily for your daily space intelligence. 

Selected Reading
Spyware found on US hotel check-in computers ( TechCrunch)
Microsoft outage affects Bing, Copilot, DuckDuckGo and ChatGPT internet search (Bleeping Computer)
Deep Dive Into Unfading Sea Haze: A New Threat Actor in the South China Sea (Bitdefender)
 Apple’s Wi-Fi Positioning Can Be System Abused To Track Users (GB Hackers) 
National Records of Scotland Data Breached in NHS Cyber-Attack (Infosecurity Magazine)
Zero-Day Attacks and Supply Chain Compromises Surge, MFA Remains Underutilized: Rapid7 Report (SecurityWeek)
NYSE Operator Intercontinental Exchange Gets $10M SEC Fine Over 2021 Hack (SecurityWeek)
Operation Diplomatic Specter: An Active Chinese Cyberespionage Campaign Leverages Rare Tool Set to Target Governmental Entities in the Middle East, Africa and Asia (Palo Alto Networks Unit 42 Intel)
FCC chair proposes requirement for political ads to disclose when AI content is used (The Record)
Acoustic attacks could be a serious threat to the future of underwater data centers (TechSpot)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 23 May 2024 20:10:00 -0000</pubDate>
      <itunes:title>Checkmate at check in. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2074</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Spyware is discovered on U.S. hotel check in systems. A Microsoft outage affects multiple services. Bitdefender uncovers Unfading Sea Haze. University of Maryland researchers find flaws in Apple’s Wi-Fi positioning system. Scotland’s NRS reveals a sensitive data leak. Rapid7 tracks the rise in zero-day exploits and mass compromise events. The SEC hits the operator of the New York Stock Exchange with a ten million dollar fine. Operation Diplomatic Specter targets political entities in the Middle East, Africa, and Asia. The FCC considers AI disclosure rules for political ads. N2K T-Minus Space Daily podcast host Maria Varmazis speaks with guests Brianna Bace and Unal Tatar PhD sharing their work on Legal Perspectives on Cyberattacks Targeting Space Systems. Tone-blasting underwater data centers. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
N2K T-Minus Space Daily podcast host Maria Varmazis speaks with guests Brianna Bace and Unal Tatar PhD sharing their work on their paper: Law in Orbit: International Legal Perspectives on Cyberattacks Targeting Space Systems. You can learn more about their work in this post. Check out T-Minus Space Daily for your daily space intelligence. 

Selected Reading
Spyware found on US hotel check-in computers ( TechCrunch)
Microsoft outage affects Bing, Copilot, DuckDuckGo and ChatGPT internet search (Bleeping Computer)
Deep Dive Into Unfading Sea Haze: A New Threat Actor in the South China Sea (Bitdefender)
 Apple’s Wi-Fi Positioning Can Be System Abused To Track Users (GB Hackers) 
National Records of Scotland Data Breached in NHS Cyber-Attack (Infosecurity Magazine)
Zero-Day Attacks and Supply Chain Compromises Surge, MFA Remains Underutilized: Rapid7 Report (SecurityWeek)
NYSE Operator Intercontinental Exchange Gets $10M SEC Fine Over 2021 Hack (SecurityWeek)
Operation Diplomatic Specter: An Active Chinese Cyberespionage Campaign Leverages Rare Tool Set to Target Governmental Entities in the Middle East, Africa and Asia (Palo Alto Networks Unit 42 Intel)
FCC chair proposes requirement for political ads to disclose when AI content is used (The Record)
Acoustic attacks could be a serious threat to the future of underwater data centers (TechSpot)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Spyware is discovered on U.S. hotel check in systems. A Microsoft outage affects multiple services. Bitdefender uncovers Unfading Sea Haze. University of Maryland researchers find flaws in Apple’s Wi-Fi positioning system. Scotland’s NRS reveals a sensitive data leak. Rapid7 tracks the rise in zero-day exploits and mass compromise events. The SEC hits the operator of the New York Stock Exchange with a ten million dollar fine. Operation Diplomatic Specter targets political entities in the Middle East, Africa, and Asia. The FCC considers AI disclosure rules for political ads. N2K T-Minus Space Daily podcast host Maria Varmazis speaks with guests Brianna Bace and Unal Tatar PhD sharing their work on Legal Perspectives on Cyberattacks Targeting Space Systems. Tone-blasting underwater data centers. </p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>N2K<a href="https://space.n2k.com/podcasts/t-minus"> </a><a href="https://space.n2k.com/podcasts/t-minus">T-Minus Space Daily</a> podcast host<a href="https://www.linkedin.com/in/varmazis?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAACcmioBIvUOYgJj_S9Ndqn6Z6puOpcB4n0&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BJ4fAG9maQUaK8Blu%2FIjNIg%3D%3D"> </a><a href="https://www.linkedin.com/in/varmazis?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAACcmioBIvUOYgJj_S9Ndqn6Z6puOpcB4n0&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BJ4fAG9maQUaK8Blu%2FIjNIg%3D%3D">Maria Varmazis</a> speaks with guests<a href="https://www.linkedin.com/in/carriehz/"> </a><a href="https://www.linkedin.com/in/brianna-bace/">Brianna Bace</a> and <a href="https://www.linkedin.com/in/utatar/">Unal Tatar PhD</a> sharing their work on their paper: Law in Orbit: International Legal Perspectives on Cyberattacks Targeting Space Systems. You can learn more about their work in <a href="https://www.linkedin.com/feed/update/urn:li:activity:7180217291844861952/">this post</a>. Check out <a href="https://space.n2k.com/podcasts/t-minus">T-Minus Space Daily</a> for your daily space intelligence. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://techcrunch.com/2024/05/22/spyware-found-on-hotel-check-in-computers/">Spyware found on US hotel check-in computers </a>( TechCrunch)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-outage-affects-bing-copilot-duckduckgo-and-chatgpt-internet-search/">Microsoft outage affects Bing, Copilot, DuckDuckGo and ChatGPT internet search</a> (Bleeping Computer)</p><p><a href="https://www.bitdefender.com/blog/businessinsights/deep-dive-into-unfading-sea-haze-a-new-threat-actor-in-the-south-china-sea/">Deep Dive Into Unfading Sea Haze: A New Threat Actor in the South China Sea</a> (Bitdefender)</p><p><a href="https://gbhackers.com/apples-wi-fi-positioning/"> Apple’s Wi-Fi Positioning Can Be System Abused To Track Users</a> (GB Hackers) </p><p><a href="https://www.infosecurity-magazine.com/news/records-scotland-data-nhs-attack/">National Records of Scotland Data Breached in NHS Cyber-Attack </a>(Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/zero-day-attacks-and-supply-chain-compromises-surge-mfa-remains-underutilized-rapid7-report/">Zero-Day Attacks and Supply Chain Compromises Surge, MFA Remains Underutilized: Rapid7 Report</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/nyse-operator-intercontinental-exchange-gets-10m-sec-fine-over-2021-hack/">NYSE Operator Intercontinental Exchange Gets $10M SEC Fine Over 2021 Hack</a> (SecurityWeek)</p><p><a href="https://unit42.paloaltonetworks.com/operation-diplomatic-specter/">Operation Diplomatic Specter: An Active Chinese Cyberespionage Campaign Leverages Rare Tool Set to Target Governmental Entities in the Middle East, Africa and Asia</a> (Palo Alto Networks Unit 42 Intel)</p><p><a href="https://therecord.media/fcc-proposal-disclosure-ai-political-advertising">FCC chair proposes requirement for political ads to disclose when AI content is used</a> (The Record)</p><p><a href="https://www.techspot.com/news/103061-acoustic-attacks-could-serious-threat-future-underwater-data.html">Acoustic attacks could be a serious threat to the future of underwater data centers</a> (TechSpot)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2022</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fb3d4598-b95d-11ee-adc6-9b87afc66920]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7410397557.mp3?updated=1716487992" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Privacy nightmare or useful tool?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2073/notes</link>
      <description>Some say Microsoft’s Recall should be. A breach of a Texas healthcare provided affects over four hundred thousand. Police in the Philippines shut down services following a breach. Ivanti patches multiple products. GitHub fixes a critical authentication bypass vulnerability. Researchers discover critical vulnerabilities in Honeywell’s ControlEdge Unit Operations Controller. The DoD releases their Cybersecurity Reciprocity Playbook. Hackers leak a database with millions of Americans’ criminal records. Mastercard speeds fraud detection with AI. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey, diving into Domain 5: Identity and Access Management. Remembering a computing visionary. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Learning Layer
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Joe and Sam dive into Domain 5: Identity and Access Management (IAM) and tackle a question together about biometric configuration. Try the question yourself before listening to the discussion!
You are configuring a biometric hand scanner to secure your data center. Which of the following practices is BEST to follow?

Decrease the reader sensitivity

Increase the FAR

Decrease the FRR

Increase the reader sensitivity


Selected Reading
UK watchdog looking into Microsoft AI taking screenshots (BBC)
	How the new Microsoft Recall feature fundamentally undermines Windows security (DoublePulsar)
CentroMed Confirms Data Breach Affecting an Estimated 400k | Console and Associates, P.C. (JDSupra)
PNP suspends online services amid data breach probe (Philippine News Agency)
Ivanti Patches Critical Code Execution Vulnerabilities in Endpoint Manager (SecurityWeek)
Critical SAML Auth Bypass Vulnerability Found in GitHub Enterprise Server (Heimdal Security)
Critical Vulnerability in Honeywell Virtual Controller Allows Remote Code Execution (SecurityWeek)
DoD CIO debuts cybersecurity reciprocity playbook to streamline system authorizations, boost cybersecurity efficiency (Industrial Cyber)
Criminal record database of millions of Americans dumped online (Malwarebytes)
Mastercard Doubles Speed of Fraud Detection with Generative AI (Infosecurity Magazine)
Gordon Bell, Legendary Designer of Computers, Dies at 89 (Gizmodo) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 22 May 2024 20:10:00 -0000</pubDate>
      <itunes:title>Privacy nightmare or useful tool?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2073</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Some say Microsoft’s Recall should be. A breach of a Texas healthcare provided affects over four hundred thousand. Police in the Philippines shut down services following a breach. Ivanti patches multiple products. GitHub fixes a critical authentication bypass vulnerability. Researchers discover critical vulnerabilities in Honeywell’s ControlEdge Unit Operations Controller. The DoD releases their Cybersecurity Reciprocity Playbook. Hackers leak a database with millions of Americans’ criminal records. Mastercard speeds fraud detection with AI. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey, diving into Domain 5: Identity and Access Management. Remembering a computing visionary. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

Learning Layer
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Joe and Sam dive into Domain 5: Identity and Access Management (IAM) and tackle a question together about biometric configuration. Try the question yourself before listening to the discussion!
You are configuring a biometric hand scanner to secure your data center. Which of the following practices is BEST to follow?

Decrease the reader sensitivity

Increase the FAR

Decrease the FRR

Increase the reader sensitivity


Selected Reading
UK watchdog looking into Microsoft AI taking screenshots (BBC)
	How the new Microsoft Recall feature fundamentally undermines Windows security (DoublePulsar)
CentroMed Confirms Data Breach Affecting an Estimated 400k | Console and Associates, P.C. (JDSupra)
PNP suspends online services amid data breach probe (Philippine News Agency)
Ivanti Patches Critical Code Execution Vulnerabilities in Endpoint Manager (SecurityWeek)
Critical SAML Auth Bypass Vulnerability Found in GitHub Enterprise Server (Heimdal Security)
Critical Vulnerability in Honeywell Virtual Controller Allows Remote Code Execution (SecurityWeek)
DoD CIO debuts cybersecurity reciprocity playbook to streamline system authorizations, boost cybersecurity efficiency (Industrial Cyber)
Criminal record database of millions of Americans dumped online (Malwarebytes)
Mastercard Doubles Speed of Fraud Detection with Generative AI (Infosecurity Magazine)
Gordon Bell, Legendary Designer of Computers, Dies at 89 (Gizmodo) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Some say Microsoft’s Recall should be. A breach of a Texas healthcare provided affects over four hundred thousand. Police in the Philippines shut down services following a breach. Ivanti patches multiple products. GitHub fixes a critical authentication bypass vulnerability. Researchers discover critical vulnerabilities in Honeywell’s ControlEdge Unit Operations Controller. The DoD releases their Cybersecurity Reciprocity Playbook. Hackers leak a database with millions of Americans’ criminal records. Mastercard speeds fraud detection with AI. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey, diving into Domain 5: Identity and Access Management. Remembering a computing visionary. </p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>Learning Layer</h2><p>On our Learning Layer segment, host <a href="https://www.linkedin.com/in/sam-meisenberg/">Sam Meisenberg</a> and <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a> continue their discussion of Joe's ISC2 <a href="https://www.cybervista.net/certify/cissp/">CISSP certification</a> journey using N2K’s comprehensive <a href="https://certify.cybervista.net/products/isc2/cissp-training-course/?utm_source=CWDP&amp;utm_medium=LL&amp;utm_campaign=HH_CISSP">CISSP training course</a>, <a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-pro/">CISSP practice test</a>, and <a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-professional-cissp-practice-labs/">CISSP practice labs</a>. Joe and Sam dive into Domain 5: Identity and Access Management (IAM) and tackle a question together about biometric configuration. Try the question yourself before listening to the discussion!</p><p>You are configuring a biometric hand scanner to secure your data center. Which of the following practices is BEST to follow?</p><ol>
<li>Decrease the reader sensitivity</li>
<li>Increase the FAR</li>
<li>Decrease the FRR</li>
<li>Increase the reader sensitivity</li>
</ol><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bbc.com/news/articles/cpwwqp6nx14o">UK watchdog looking into Microsoft AI taking screenshots</a> (BBC)</p><p>	<a href="https://doublepulsar.com/how-the-new-microsoft-recall-feature-fundamentally-undermines-windows-security-aa072829f218">How the new Microsoft Recall feature fundamentally undermines Windows security</a> (DoublePulsar)</p><p><a href="https://www.jdsupra.com/legalnews/centromed-confirms-data-breach-7227284/">CentroMed Confirms Data Breach Affecting an Estimated 400k | Console and Associates, P.C.</a> (JDSupra)</p><p><a href="https://www.pna.gov.ph/articles/1225303">PNP suspends online services amid data breach probe</a> (Philippine News Agency)</p><p><a href="https://www.securityweek.com/ivanti-patches-critical-code-execution-vulnerabilities-in-endpoint-manager/">Ivanti Patches Critical Code Execution Vulnerabilities in Endpoint Manager</a> (SecurityWeek)</p><p><a href="https://heimdalsecurity.com/blog/critical-github-saml-auth-bypass-vulnerability/">Critical SAML Auth Bypass Vulnerability Found in GitHub Enterprise Server</a> (Heimdal Security)</p><p><a href="https://www.securityweek.com/critical-vulnerability-in-honeywell-virtual-controller-allows-remote-code-execution/">Critical Vulnerability in Honeywell Virtual Controller Allows Remote Code Execution</a> (SecurityWeek)</p><p><a href="https://industrialcyber.co/threats-attacks/dod-cio-debuts-cybersecurity-reciprocity-playbook-to-streamline-system-authorizations-boost-cybersecurity-efficiency/">DoD CIO debuts cybersecurity reciprocity playbook to streamline system authorizations, boost cybersecurity efficiency</a> (Industrial Cyber)</p><p><a href="https://www.malwarebytes.com/blog/news/2024/05/criminal-record-database-of-millions-of-americans-dumped-online">Criminal record database of millions of Americans dumped online</a> (Malwarebytes)</p><p><a href="https://www.infosecurity-magazine.com/news/mastercard-fraud-detection/">Mastercard Doubles Speed of Fraud Detection with Generative AI</a> (Infosecurity Magazine)</p><p><a href="https://gizmodo.com/gordon-bell-obituary-computer-legend-internet-microsoft-1851492263">Gordon Bell, Legendary Designer of Computers, Dies at 89</a> (Gizmodo) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1548</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fb011a0a-b95d-11ee-adc6-976ec43ec6ed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9364870025.mp3?updated=1716404349" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The secrets of a dark web drug lord.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2072/notes</link>
      <description>The alleged operator of Incognito Market is collared at JFK. The UK plans new ransomware reporting regulations. Time to update your JavaScript PDF library. CISA adds a healthcare interface engine to its Known Exploited Vulnerabilities (KEV) catalog. HHS launches a fifty million dollar program to help secure hospitals. A Fluent Bit vulnerability impacts major cloud platforms. The EPA issues a cybersecurity alert for drinking water systems. BiBi Wiper grows more aggressive. Siren is a new threat intelligence platform for open source software. On our Industry Voices segment, guest Amit Sinha, CEO of DigiCert, joins N2K’s Rick Howard to discuss “Innovation: balancing the good with the bad.” And is it just me, or does that AI assistant sound awfully familiar?
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, guest Amit Sinha, CEO of DigiCert, joins N2K’s Rick Howard to discuss “Innovation: balancing the good with the bad.” Rick caught up with Amit at the recent RSA Conference in San Francisco. 

Selected Reading
“Incognito Market” Owner Arrested for Operating One of the Largest Illegal Narcotics Marketplaces on the Internet (United States Department of Justice)
Exclusive: UK to propose mandatory reporting for ransomware attacks and licensing regime for all payments (The Record)
CVE-2024-4367 in PDF.js Allows JavaScript Execution, Potentially Affecting Millions of Websites: Update Now (SOCRadar)
CISA Warns of Attacks Exploiting NextGen Healthcare Mirth Connect Flaw (SecurityWeek)
Fluent Bit flaw discovered that impacts every major cloud provider (Tech Monitor)
EPA Issues Alert After Finding Critical Vulnerabilities in Drinking Water Systems (SecurityWeek)
New BiBi Wiper version also destroys the disk partition table (Bleeping Computer)
Enhancing Open Source Security: Introducing Siren by OpenSSF (OpenSSF)
HHS offering $50 million for proposals to improve hospital cybersecurity (The Record)
Scarlett Johansson Said No, but OpenAI’s Virtual Assistant Sounds Just Like Her (The New York Times)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 May 2024 20:10:00 -0000</pubDate>
      <itunes:title>The secrets of a dark web drug lord.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2072</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The alleged operator of Incognito Market is collared at JFK. The UK plans new ransomware reporting regulations. Time to update your JavaScript PDF library. CISA adds a healthcare interface engine to its Known Exploited Vulnerabilities (KEV) catalog. HHS launches a fifty million dollar program to help secure hospitals. A Fluent Bit vulnerability impacts major cloud platforms. The EPA issues a cybersecurity alert for drinking water systems. BiBi Wiper grows more aggressive. Siren is a new threat intelligence platform for open source software. On our Industry Voices segment, guest Amit Sinha, CEO of DigiCert, joins N2K’s Rick Howard to discuss “Innovation: balancing the good with the bad.” And is it just me, or does that AI assistant sound awfully familiar?
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, guest Amit Sinha, CEO of DigiCert, joins N2K’s Rick Howard to discuss “Innovation: balancing the good with the bad.” Rick caught up with Amit at the recent RSA Conference in San Francisco. 

Selected Reading
“Incognito Market” Owner Arrested for Operating One of the Largest Illegal Narcotics Marketplaces on the Internet (United States Department of Justice)
Exclusive: UK to propose mandatory reporting for ransomware attacks and licensing regime for all payments (The Record)
CVE-2024-4367 in PDF.js Allows JavaScript Execution, Potentially Affecting Millions of Websites: Update Now (SOCRadar)
CISA Warns of Attacks Exploiting NextGen Healthcare Mirth Connect Flaw (SecurityWeek)
Fluent Bit flaw discovered that impacts every major cloud provider (Tech Monitor)
EPA Issues Alert After Finding Critical Vulnerabilities in Drinking Water Systems (SecurityWeek)
New BiBi Wiper version also destroys the disk partition table (Bleeping Computer)
Enhancing Open Source Security: Introducing Siren by OpenSSF (OpenSSF)
HHS offering $50 million for proposals to improve hospital cybersecurity (The Record)
Scarlett Johansson Said No, but OpenAI’s Virtual Assistant Sounds Just Like Her (The New York Times)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The alleged operator of Incognito Market is collared at JFK. The UK plans new ransomware reporting regulations. Time to update your JavaScript PDF library. CISA adds a healthcare interface engine to its Known Exploited Vulnerabilities (KEV) catalog. HHS launches a fifty million dollar program to help secure hospitals. A Fluent Bit vulnerability impacts major cloud platforms. The EPA issues a cybersecurity alert for drinking water systems. BiBi Wiper grows more aggressive. Siren is a new threat intelligence platform for open source software. On our Industry Voices segment, guest Amit Sinha, CEO of DigiCert, joins N2K’s Rick Howard to discuss “Innovation: balancing the good with the bad.” And is it just me, or does that AI assistant sound awfully familiar?</p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Voices segment, guest <a href="https://www.linkedin.com/in/amitsinha/">Amit Sinha</a>, CEO of <a href="https://www.digicert.com/">DigiCert</a>, joins <a href="https://www.n2k.com/">N2K</a>’s <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> to discuss “Innovation: balancing the good with the bad.” Rick caught up with Amit at the recent <a href="https://www.rsaconference.com/usa">RSA Conference</a> in San Francisco. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.justice.gov/opa/pr/incognito-market-owner-arrested-operating-one-largest-illegal-narcotics-marketplaces">“Incognito Market” Owner Arrested for Operating One of the Largest Illegal Narcotics Marketplaces on the Internet</a> (United States Department of Justice)</p><p><a href="https://therecord.media/uk-proposal-mandatory-reporting-ransomware-attacks">Exclusive: UK to propose mandatory reporting for ransomware attacks and licensing regime for all payments</a> (The Record)</p><p><a href="https://socradar.io/cve-2024-4367-in-pdf-js-allows-javascript-execution-potentially-affecting-millions-of-websites-update-now/">CVE-2024-4367 in PDF.js Allows JavaScript Execution, Potentially Affecting Millions of Websites: Update Now</a> (SOCRadar)</p><p><a href="https://www.securityweek.com/cisa-warns-of-attacks-exploiting-nextgen-healthcare-mirth-connect-flaw/">CISA Warns of Attacks Exploiting NextGen Healthcare Mirth Connect Flaw</a> (SecurityWeek)</p><p><a href="https://techmonitor.ai/technology/cybersecurity/fluent-bit-flaw-discovered">Fluent Bit flaw discovered that impacts every major cloud provider</a> (Tech Monitor)</p><p><a href="https://www.securityweek.com/epa-issues-alert-after-finding-critical-vulnerabilities-in-drinking-water-systems/">EPA Issues Alert After Finding Critical Vulnerabilities in Drinking Water Systems</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-bibi-wiper-version-also-destroys-the-disk-partition-table/">New BiBi Wiper version also destroys the disk partition table</a> (Bleeping Computer)</p><p><a href="https://openssf.org/blog/2024/05/20/enhancing-open-source-security-introducing-siren-by-openssf/">Enhancing Open Source Security: Introducing Siren by OpenSSF</a> (OpenSSF)</p><p><a href="https://therecord.media/hhs-offering-funding-cybersecurity-hospital">HHS offering $50 million for proposals to improve hospital cybersecurity</a> (The Record)</p><p><a href="https://www.nytimes.com/2024/05/20/technology/scarlett-johannson-openai-voice.html">Scarlett Johansson Said No, but OpenAI’s Virtual Assistant Sounds Just Like Her</a> (The New York Times)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2011</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fac4fa0c-b95d-11ee-adc6-2b2957e14c41]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2510401198.mp3?updated=1716324827" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Double key encryption debate.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2071/notes</link>
      <description>Germany’s BSI sues Microsoft for more information on recent security incidents. Julian Assange can appeal his U.S. extradition. AI chatbots may have itchy trigger fingers. CISA warns of vulnerabilities affecting Google Chrome and D-Link routers. Ham Radio’s association suffers a data breach. New underground marketplaces pop up to replace BreachForums. An updated banking trojan targets users in Central and South America. Cybercom’s founders share its origin story.  Examining gender bias in open source software contributors. For our Industry Voices segment, guest Chris Pierson, CEO at BlackCloak, met up with N2K’s Brandon Karpf at the 2024 RSA Conference to discuss personal cybersecurity risks for executives. College students unlock free laundering — no money required. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, guest Chris Pierson, CEO at BlackCloak, met up with N2K’s Brandon Karpf at the 2024 RSA Conference. Chris and Brandon discussed personal cybersecurity risks for executives.

Selected Reading
BSI sues Microsoft for disclosure of information on security disaster (Ground News)
Assange Can Appeal U.S. Extradition, English Court Rules (The New York Times)
ChatGPT likes to fight. For military AI researchers, that’s a problem (Tech Brew)
CISA warns of hackers exploiting Chrome, EoL D-Link bugs (Bleeping Computer)
American Radio Relay League Hit by Cyberattack (SecurityWeek)
FBI seizes BreachForums infrastructure — but successor sites are already popping up (ITPro)
Grandoreiro Banking Trojan is Back With Major Updates (Infosecurity Magazine)
(PDF) Gender bias in open source: Pull request acceptance of women versus men (ResearchGate)
The inside story of Cyber Command’s creation (CSO Online)
Two Santa Cruz students uncover security bug that could let millions do their laundry for free (TechCrunch) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 20 May 2024 20:10:00 -0000</pubDate>
      <itunes:title>Double key encryption debate.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2071</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Germany’s BSI sues Microsoft for more information on recent security incidents. Julian Assange can appeal his U.S. extradition. AI chatbots may have itchy trigger fingers. CISA warns of vulnerabilities affecting Google Chrome and D-Link routers. Ham Radio’s association suffers a data breach. New underground marketplaces pop up to replace BreachForums. An updated banking trojan targets users in Central and South America. Cybercom’s founders share its origin story.  Examining gender bias in open source software contributors. For our Industry Voices segment, guest Chris Pierson, CEO at BlackCloak, met up with N2K’s Brandon Karpf at the 2024 RSA Conference to discuss personal cybersecurity risks for executives. College students unlock free laundering — no money required. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, guest Chris Pierson, CEO at BlackCloak, met up with N2K’s Brandon Karpf at the 2024 RSA Conference. Chris and Brandon discussed personal cybersecurity risks for executives.

Selected Reading
BSI sues Microsoft for disclosure of information on security disaster (Ground News)
Assange Can Appeal U.S. Extradition, English Court Rules (The New York Times)
ChatGPT likes to fight. For military AI researchers, that’s a problem (Tech Brew)
CISA warns of hackers exploiting Chrome, EoL D-Link bugs (Bleeping Computer)
American Radio Relay League Hit by Cyberattack (SecurityWeek)
FBI seizes BreachForums infrastructure — but successor sites are already popping up (ITPro)
Grandoreiro Banking Trojan is Back With Major Updates (Infosecurity Magazine)
(PDF) Gender bias in open source: Pull request acceptance of women versus men (ResearchGate)
The inside story of Cyber Command’s creation (CSO Online)
Two Santa Cruz students uncover security bug that could let millions do their laundry for free (TechCrunch) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Germany’s BSI sues Microsoft for more information on recent security incidents. Julian Assange can appeal his U.S. extradition. AI chatbots may have itchy trigger fingers. CISA warns of vulnerabilities affecting Google Chrome and D-Link routers. Ham Radio’s association suffers a data breach. New underground marketplaces pop up to replace BreachForums. An updated banking trojan targets users in Central and South America. Cybercom’s founders share its origin story.  Examining gender bias in open source software contributors. For our Industry Voices segment, guest Chris Pierson, CEO at BlackCloak, met up with N2K’s Brandon Karpf at the 2024 RSA Conference to discuss personal cybersecurity risks for executives. College students unlock free laundering — no money required. </p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Voices segment, guest <a href="https://www.linkedin.com/in/drchristopherpierson/">Chris Pierson</a>, CEO at <a href="https://blackcloak.io/">BlackCloak</a>, met up with <a href="https://www.n2k.com/">N2K</a>’s <a href="https://www.linkedin.com/in/brandon-karpf?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAC_NTGsBc2E8E6H8UXjNCs_zBoGJW7wzXdk&amp;lipi=urn%3Ali%3Apage%3Ad_flagship3_search_srp_all%3BdkW5z0VeRkOMIRe%2FkSVAaA%3D%3D">Brandon Karpf</a> at the <a href="https://www.rsaconference.com/usa">2024 RSA Conference</a>. Chris and Brandon discussed personal cybersecurity risks for executives.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://web.ground.news/article/bsi-sues-microsoft-for-disclosure-of-information-on-security-disaster">BSI sues Microsoft for disclosure of information on security disaster</a> (Ground News)</p><p><a href="https://www.nytimes.com/2024/05/20/world/europe/uk-assange-appeal.html?referringSource=articleShare&amp;amp;sgrp=c-cb">Assange Can Appeal U.S. Extradition, English Court Rules</a> (The New York Times)</p><p><a href="https://www.emergingtechbrew.com/stories/2024/05/14/military-ai-chatbots-research-hoover-institution">ChatGPT likes to fight. For military AI researchers, that’s a problem</a> (Tech Brew)</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-hackers-exploiting-chrome-eol-d-link-bugs/">CISA warns of hackers exploiting Chrome, EoL D-Link bugs</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/american-radio-relay-league-hit-by-cyberattack/">American Radio Relay League Hit by Cyberattack</a> (SecurityWeek)</p><p><a href="https://www.itpro.com/security/cyber-crime/fbi-seizes-breachforums-infrastructure-but-successor-sites-are-already-popping-up">FBI seizes BreachForums infrastructure — but successor sites are already popping up</a> (ITPro)</p><p><a href="https://www.infosecurity-magazine.com/news/grandoreiro-banking-trojan-major/">Grandoreiro Banking Trojan is Back With Major Updates</a> (Infosecurity Magazine)</p><p><a href="https://www.researchgate.net/publication/308716997_Gender_bias_in_open_source_Pull_request_acceptance_of_women_versus_men">(PDF) Gender bias in open source: Pull request acceptance of women versus men</a> (ResearchGate)</p><p><a href="https://www.csoonline.com/article/2110982/cartoons-starbucks-cards-and-hollywood-storyboards-how-us-cyber-command-came-to-be.html">The inside story of Cyber Command’s creation</a> (CSO Online)</p><p><a href="https://techcrunch.com/2024/05/17/csc-serviceworks-free-laundry-million-machines/">Two Santa Cruz students uncover security bug that could let millions do their laundry for free</a> (TechCrunch) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2359</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fa87c4d4-b95d-11ee-adc6-43018b643e01]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5170650263.mp3?updated=1716238165" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Monica Ruiz: Moving ahead when not many look like you. [Policy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/16/notes</link>
      <description>Cyber Initiative and Special Projects Fellow at the Hewlett Foundation Monica Ruiz shares her career development from aspirations of being a weather woman to her current role as a grantmaker and connector in cybersecurity. Monica discusses how her international study experience changed her outlook and brought her to the field of security. She shares the difficulties she faced as a woman of color when when not that many people look like you, and how she used that as her reason to move forward and better the cybersecurity field through her work. Our thanks to Monica for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 19 May 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Monica Ruiz: Moving ahead when not many look like you. [Policy] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>16</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cyber Initiative and Special Projects Fellow at the Hewlett Foundation Monica Ruiz shares her career development from aspirations of being a weather woman to her current role as a grantmaker and connector in cybersecurity. Monica discusses how her international study experience changed her outlook and brought her to the field of security. She shares the difficulties she faced as a woman of color when when not that many people look like you, and how she used that as her reason to move forward and better the cybersecurity field through her work. Our thanks to Monica for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber Initiative and Special Projects Fellow at the Hewlett Foundation Monica Ruiz shares her career development from aspirations of being a weather woman to her current role as a grantmaker and connector in cybersecurity. Monica discusses how her international study experience changed her outlook and brought her to the field of security. She shares the difficulties she faced as a woman of color when when not that many people look like you, and how she used that as her reason to move forward and better the cybersecurity field through her work. Our thanks to Monica for sharing her story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>461</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fcc660f6-148a-11ef-9266-5bc2a7352d1f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7814593326.mp3?updated=1715977566" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From secret images to encryption keys. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/330/notes</link>
      <description>This week, we are joined by Hosein Yavarzadeh from the University of California San Diego, as he is discussing his work on "Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor" This paper introduces new methods that let attackers read from and write to specific parts of high-performance CPUs, such as the path history register (PHR) and prediction history tables (PHTs). 
These methods allow two main types of attacks. One can reveal a program's control flow history, as shown by recovering a secret image through the libjpeg routines. The other enables detailed transient attacks, demonstrated by extracting an AES encryption key, highlighting significant security risks for these systems.
The research can be found here:
Graph: Growing number of threats leveraging Microsoft API

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 May 2024 07:00:00 -0000</pubDate>
      <itunes:title>From secret images to encryption keys. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>330</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, we are joined by Hosein Yavarzadeh from the University of California San Diego, as he is discussing his work on "Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor" This paper introduces new methods that let attackers read from and write to specific parts of high-performance CPUs, such as the path history register (PHR) and prediction history tables (PHTs). 
These methods allow two main types of attacks. One can reveal a program's control flow history, as shown by recovering a secret image through the libjpeg routines. The other enables detailed transient attacks, demonstrated by extracting an AES encryption key, highlighting significant security risks for these systems.
The research can be found here:
Graph: Growing number of threats leveraging Microsoft API

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by Hosein Yavarzadeh from the University of California San Diego, as he is discussing his work on "Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor" This paper introduces new methods that let attackers read from and write to specific parts of high-performance CPUs, such as the path history register (PHR) and prediction history tables (PHTs). </p><p>These methods allow two main types of attacks. One can reveal a program's control flow history, as shown by recovering a secret image through the libjpeg routines. The other enables detailed transient attacks, demonstrated by extracting an AES encryption key, highlighting significant security risks for these systems.</p><p>The research can be found here:</p><ul><li><a href="https://dl.acm.org/doi/10.1145/3620666.3651382">Graph: Growing number of threats leveraging Microsoft API</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1214</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1d61b91c-147e-11ef-9562-cb54b519a7a5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2877237481.mp3?updated=1716221421" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>10 years on: The 10th anniversary of the first indictment of Chinese PLA actors. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/63/notes</link>
      <description>On this Special Edition podcast, Dave Bittner speaks with guest Dave Hickton, Founding Director, Institute for Cyber Law, Policy, and Security at the University of Pittsburgh, and former US Attorney, on this 10th Anniversary of the first indictment of Chinese PLA actors. Hear directly from Mr. Hickton what lead to the indictment, the emotions that went along with this unprecedented action, and the legacy of the event. 
On May 19, 2014, a grand jury in the Western District of Pennsylvania (WDPA) indicted five Chinese military hackers for computer hacking, economic espionage and other offenses directed at six American victims in the U.S. nuclear power, metals and solar products industries. 
The indictment alleges that the defendants conspired to hack into American entities, to maintain unauthorized access to their computers and to steal information from those entities that would be useful to their competitors in China, including state-owned enterprises (SOEs). In some cases, it alleges, the conspirators stole trade secrets that would have been particularly beneficial to Chinese companies at the time they were stolen. In other cases, it alleges, the conspirators also stole sensitive, internal communications that would provide a competitor, or an adversary in litigation, with insight into the strategy and vulnerabilities of the American entity.
US Attorney Dave Hickton represented the Western District of Pennsylvania and was the signatory on the indictment. His team worked with the FBI Cyber Team in Pittsburgh, PA to bring about this historic action. 
Resources: 

Press Release: U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage 

Indictment


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 May 2024 06:00:00 -0000</pubDate>
      <itunes:title>10 years on: The 10th anniversary of the first indictment of Chinese PLA actors. [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this Special Edition podcast, Dave Bittner speaks with guest Dave Hickton, Founding Director, Institute for Cyber Law, Policy, and Security at the University of Pittsburgh, and former US Attorney, on this 10th Anniversary of the first indictment of Chinese PLA actors. Hear directly from Mr. Hickton what lead to the indictment, the emotions that went along with this unprecedented action, and the legacy of the event. 
On May 19, 2014, a grand jury in the Western District of Pennsylvania (WDPA) indicted five Chinese military hackers for computer hacking, economic espionage and other offenses directed at six American victims in the U.S. nuclear power, metals and solar products industries. 
The indictment alleges that the defendants conspired to hack into American entities, to maintain unauthorized access to their computers and to steal information from those entities that would be useful to their competitors in China, including state-owned enterprises (SOEs). In some cases, it alleges, the conspirators stole trade secrets that would have been particularly beneficial to Chinese companies at the time they were stolen. In other cases, it alleges, the conspirators also stole sensitive, internal communications that would provide a competitor, or an adversary in litigation, with insight into the strategy and vulnerabilities of the American entity.
US Attorney Dave Hickton represented the Western District of Pennsylvania and was the signatory on the indictment. His team worked with the FBI Cyber Team in Pittsburgh, PA to bring about this historic action. 
Resources: 

Press Release: U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage 

Indictment


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this Special Edition podcast, Dave Bittner speaks with guest <a href="https://www.linkedin.com/in/david-hickton-246702214/">Dave Hickton</a>, Founding Director, Institute for <a href="https://www.cyber.pitt.edu/">Cyber Law, Policy, and Security at the University of Pittsburgh</a>, and former US Attorney, on this 10th Anniversary of the first indictment of Chinese PLA actors. Hear directly from Mr. Hickton what lead to the indictment, the emotions that went along with this unprecedented action, and the legacy of the event. </p><p>On May 19, 2014, a grand jury in the <a href="https://www.justice.gov/usao-wdpa">Western District of Pennsylvania (WDPA) </a>indicted five Chinese military hackers for computer hacking, economic espionage and other offenses directed at six American victims in the U.S. nuclear power, metals and solar products industries. </p><p>The indictment alleges that the defendants conspired to hack into American entities, to maintain unauthorized access to their computers and to steal information from those entities that would be useful to their competitors in China, including state-owned enterprises (SOEs). In some cases, it alleges, the conspirators stole trade secrets that would have been particularly beneficial to Chinese companies at the time they were stolen. In other cases, it alleges, the conspirators also stole sensitive, internal communications that would provide a competitor, or an adversary in litigation, with insight into the strategy and vulnerabilities of the American entity.</p><p>US Attorney Dave Hickton represented the Western District of Pennsylvania and was the signatory on the indictment. His team worked with the FBI Cyber Team in Pittsburgh, PA to bring about this historic action. </p><h3>Resources: </h3><ul>
<li>Press Release: <a href="https://www.justice.gov/opa/pr/us-charges-five-chinese-military-hackers-cyber-espionage-against-us-corporations-and-labor">U.S. Charges Five Chinese Military Hackers for Cyber Espionage Against U.S. Corporations and a Labor Organization for Commercial Advantage</a> </li>
<li><a href="https://www.justice.gov/iso/opa/resources/5122014519132358461949.pdf">Indictment</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2433</itunes:duration>
      <guid isPermaLink="false"><![CDATA[634039c0-147b-11ef-aa50-8f743c98e377]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1975672958.mp3?updated=1715976204" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>MediSecure data breach hits Aussie healthcare.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2070/notes</link>
      <description>Australia warns of a large-scale ransomware data breach. The justice department charges five with helping North Korean IT workers evade sanctions. The FCC wants to beef up BGP. Antidot is a new Android banking trojan. The SEC enhances disclosure obligations. Researchers uncover vulnerabilities in GE ultrasound devices. A Baltimore neo-nazi pleads guilty to conspiring to take down an electrical grid. On our Solution Spotlight: N2K’s Simone Petrella speaks with Alicja Cade, Director in Google Cloud's Office of the CISO, about the CISO role, board communication, and cyber workforce development. “Tanks” for the warm water, but you can keep the vulnerabilities.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight: N2K’s Simone Petrella speaks with Alicja Cade, Director in Google Cloud's Office of the CISO, about the CISO role, board communication, and cyber workforce development. Simone and Alicja spoke at the 2024 RSA Conference. 

Selected Reading
Australian government warns of 'large-scale ransomware data breach' (The Record)
US exposes scheme enabling North Korean IT workers to bypass sanctions (Help Net Security)
FCC proposes BGP security measures (Network World)
BGP: What is border gateway protocol, and how does it work? (Network World)
New 'Antidot' Android Trojan Allows Cybercriminals to Hack Devices, Steal Data (SecurityWeek)
SEC beefs up data privacy rules (Investment Executive)
GE Ultrasound Gear Riddled With Bugs, Open to Ransomware &amp; Data Theft (DarkReading)
Baltimore County woman pleads guilty to conspiring with neo-Nazi leader to attack energy grid (The Baltimore banner)
How I upgraded my water heater and discovered how bad smart home security can be (Ars Technica)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 17 May 2024 20:10:00 -0000</pubDate>
      <itunes:title>MediSecure data breach hits Aussie healthcare.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2070</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Australia warns of a large-scale ransomware data breach. The justice department charges five with helping North Korean IT workers evade sanctions. The FCC wants to beef up BGP. Antidot is a new Android banking trojan. The SEC enhances disclosure obligations. Researchers uncover vulnerabilities in GE ultrasound devices. A Baltimore neo-nazi pleads guilty to conspiring to take down an electrical grid. On our Solution Spotlight: N2K’s Simone Petrella speaks with Alicja Cade, Director in Google Cloud's Office of the CISO, about the CISO role, board communication, and cyber workforce development. “Tanks” for the warm water, but you can keep the vulnerabilities.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight: N2K’s Simone Petrella speaks with Alicja Cade, Director in Google Cloud's Office of the CISO, about the CISO role, board communication, and cyber workforce development. Simone and Alicja spoke at the 2024 RSA Conference. 

Selected Reading
Australian government warns of 'large-scale ransomware data breach' (The Record)
US exposes scheme enabling North Korean IT workers to bypass sanctions (Help Net Security)
FCC proposes BGP security measures (Network World)
BGP: What is border gateway protocol, and how does it work? (Network World)
New 'Antidot' Android Trojan Allows Cybercriminals to Hack Devices, Steal Data (SecurityWeek)
SEC beefs up data privacy rules (Investment Executive)
GE Ultrasound Gear Riddled With Bugs, Open to Ransomware &amp; Data Theft (DarkReading)
Baltimore County woman pleads guilty to conspiring with neo-Nazi leader to attack energy grid (The Baltimore banner)
How I upgraded my water heater and discovered how bad smart home security can be (Ars Technica)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Australia warns of a large-scale ransomware data breach. The justice department charges five with helping North Korean IT workers evade sanctions. The FCC wants to beef up BGP. Antidot is a new Android banking trojan. The SEC enhances disclosure obligations. Researchers uncover vulnerabilities in GE ultrasound devices. A Baltimore neo-nazi pleads guilty to conspiring to take down an electrical grid. On our Solution Spotlight: N2K’s Simone Petrella speaks with Alicja Cade, Director in Google Cloud's Office of the CISO, about the CISO role, board communication, and cyber workforce development. “Tanks” for the warm water, but you can keep the vulnerabilities.</p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Solution Spotlight: <a href="https://www.n2k.com/">N2K</a>’s <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a> speaks with <a href="https://www.linkedin.com/in/alicja-cade-37908a6/">Alicja Cade</a>, Director in <a href="https://cloud.google.com/">Google Cloud</a>'s Office of the CISO, about the CISO role, board communication, and cyber workforce development. Simone and Alicja spoke at the <a href="https://www.rsaconference.com/usa">2024 RSA Conference</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/medisecure-data-breach-ransomware-australia-healthcare">Australian government warns of 'large-scale ransomware data breach'</a> (The Record)</p><p><a href="https://www.helpnetsecurity.com/2024/05/17/north-korean-it-workers/">US exposes scheme enabling North Korean IT workers to bypass sanctions</a> (Help Net Security)</p><p><a href="https://www.networkworld.com/article/2111862/fcc-proposes-bgp-security-measures.html">FCC proposes BGP security measures </a>(Network World)</p><p><a href="https://www.networkworld.com/article/969572/bgp-what-is-border-gateway-protocol-and-how-does-it-work.html">BGP: What is border gateway protocol, and how does it work?</a><a href="https://www.networkworld.com/article/969572/bgp-what-is-border-gateway-protocol-and-how-does-it-work.html"> (Network World</a>)</p><p><a href="https://www.securityweek.com/new-antidot-android-trojan-allows-cybercriminals-to-hack-devices-steal-data/">New 'Antidot' Android Trojan Allows Cybercriminals to Hack Devices, Steal Data</a><a href="https://www.securityweek.com/new-antidot-android-trojan-allows-cybercriminals-to-hack-devices-steal-data/"> (SecurityWeek</a>)</p><p><a href="https://www.investmentexecutive.com/news/from-the-regulators/sec-beefs-up-data-privacy-rules/">SEC beefs up data privacy rules</a><a href="https://www.investmentexecutive.com/news/from-the-regulators/sec-beefs-up-data-privacy-rules/"> (Investment Executive</a>)</p><p><a href="https://www.darkreading.com/vulnerabilities-threats/ge-ultrasound-gear-riddled-with-bugs-open-to-ransomware-data-theft">GE Ultrasound Gear Riddled With Bugs, Open to Ransomware &amp; Data Theft</a> (DarkReading)</p><p><a href="https://www.thebaltimorebanner.com/community/criminal-justice/sarah-beth-clendaniel-guilty-plea-energy-grid-attack-neo-nazi-leader-maryland-MRY5ERSAVZF7BBWJEIB2HQML2Q/">Baltimore County woman pleads guilty to conspiring with neo-Nazi leader to attack energy grid</a> (The Baltimore banner)</p><p><a href="https://arstechnica.com/gadgets/2024/05/how-i-upgraded-my-water-heater-and-discovered-how-bad-smart-home-security-can-be/">How I upgraded my water heater and discovered how bad smart home security can be</a> (Ars Technica)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1701</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fa4b07a6-b95d-11ee-adc6-8f32a52e2df1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1298140347.mp3?updated=1715969822" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FBI strikes against a cybercrime syndicate.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2069/notes</link>
      <description>The FBI seizes BreachForums. NCSC rolls out a 'Share and Defend' initiative. ESports gaming gets a level up in their security. The spammer becomes the scammer. Bitdefender is sounding the alarm. The city of Wichita gets a wake-up call. In our Threat Vector segment, host David Moulton discusses the challenges and opportunities of AI adoption with guest Mike Spisak, the Managing Director of Proactive Security at Unit 42. And no one likes a cyber budgeting blunder.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In our Threat Vector segment, David Moulton, Director of Thought Leadership at Unit 42, discusses the challenges and opportunities of AI adoption with guest Mike Spisak, Managing Director of Proactive Security at Unit 42. They emphasize the importance of early security involvement in the AI development lifecycle and the crucial role of inventorying AI usage to tailor protection measures. You can listen to the full episode here. 

Selected Reading
FBI seize BreachForums hacking forum used to leak stolen data (Bleeping Computer) 
New UK system will see ISPs benefit from same protections as government networks (The Record)
Riot Games, Cisco to Connect and Protect League of Legends Esports Through Expanded Global Partnership (Cisco) 
To the Moon and back(doors): Lunar landing in diplomatic missions (WeLiveSecurity)
New Black Basta Social Engineering Scheme (ReliaQuest)
IoT Cameras Exposed by Chainable Exploits, Millions Affected (HackRead)
Kimsuky APT Using Newly Discovered Gomir Linux Backdoor (Decipher)
Law enforcement data stolen in Wichita ransomware attack (The Record) 
Nigeria Halts Cybersecurity Tax After Public Outrage (Dark Reading) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 16 May 2024 20:10:00 -0000</pubDate>
      <itunes:title>FBI strikes against a cybercrime syndicate.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2069</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The FBI seizes BreachForums. NCSC rolls out a 'Share and Defend' initiative. ESports gaming gets a level up in their security. The spammer becomes the scammer. Bitdefender is sounding the alarm. The city of Wichita gets a wake-up call. In our Threat Vector segment, host David Moulton discusses the challenges and opportunities of AI adoption with guest Mike Spisak, the Managing Director of Proactive Security at Unit 42. And no one likes a cyber budgeting blunder.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In our Threat Vector segment, David Moulton, Director of Thought Leadership at Unit 42, discusses the challenges and opportunities of AI adoption with guest Mike Spisak, Managing Director of Proactive Security at Unit 42. They emphasize the importance of early security involvement in the AI development lifecycle and the crucial role of inventorying AI usage to tailor protection measures. You can listen to the full episode here. 

Selected Reading
FBI seize BreachForums hacking forum used to leak stolen data (Bleeping Computer) 
New UK system will see ISPs benefit from same protections as government networks (The Record)
Riot Games, Cisco to Connect and Protect League of Legends Esports Through Expanded Global Partnership (Cisco) 
To the Moon and back(doors): Lunar landing in diplomatic missions (WeLiveSecurity)
New Black Basta Social Engineering Scheme (ReliaQuest)
IoT Cameras Exposed by Chainable Exploits, Millions Affected (HackRead)
Kimsuky APT Using Newly Discovered Gomir Linux Backdoor (Decipher)
Law enforcement data stolen in Wichita ransomware attack (The Record) 
Nigeria Halts Cybersecurity Tax After Public Outrage (Dark Reading) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FBI seizes BreachForums. NCSC rolls out a 'Share and Defend' initiative. ESports gaming gets a level up in their security. The spammer becomes the scammer. Bitdefender is sounding the alarm. The city of Wichita gets a wake-up call. In our Threat Vector segment, host David Moulton discusses the challenges and opportunities of AI adoption with guest Mike Spisak, the Managing Director of Proactive Security at Unit 42. And no one likes a cyber budgeting blunder.</p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>In our <a href="https://thecyberwire.com/podcasts/threat-vector">Threat Vector</a> segment, <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a>, Director of Thought Leadership at <a href="https://www.paloaltonetworks.com/">Unit 42</a>, discusses the challenges and opportunities of AI adoption with guest <a href="https://www.linkedin.com/in/mike-spisak/">Mike Spisak</a>, Managing Director of Proactive Security at Unit 42. They emphasize the importance of early security involvement in the AI development lifecycle and the crucial role of inventorying AI usage to tailor protection measures. You can listen to the full episode <a href="https://thecyberwire.com/podcasts/threat-vector/22/notes">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/fbi-seize-breachforums-hacking-forum-used-to-leak-stolen-data/">FBI seize BreachForums hacking forum used to leak stolen data</a> (Bleeping Computer) </p><p><a href="https://therecord.media/uk-ncsc-share-and-defend-system-isps">New UK system will see ISPs benefit from same protections as government networks</a> (The Record)</p><p><a href="https://newsroom.cisco.com/c/r/newsroom/en/us/rss-feeds.html?source=rss">Riot Games, Cisco to Connect and Protect League of Legends Esports Through Expanded Global Partnership</a> (Cisco) </p><p><a href="https://www.welivesecurity.com/en/eset-research/moon-backdoors-lunar-landing-diplomatic-missions/">To the Moon and back(doors): Lunar landing in diplomatic missions</a> (WeLiveSecurity)</p><p><a href="https://www.reliaquest.com/blog/new-black-basta-social-engineering-scheme/">New Black Basta Social Engineering Scheme </a>(ReliaQuest)</p><p><a href="https://www.hackread.com/iot-cameras-exposed-by-chainable-exploits/#google_vignette">IoT Cameras Exposed by Chainable Exploits, Millions Affected</a> (HackRead)</p><p><a href="https://duo.com/decipher/kimsuky-apt-using-newly-discovered-gomir-linux-backdoor">Kimsuky APT Using Newly Discovered Gomir Linux Backdoor</a> (Decipher)</p><p><a href="https://therecord.media/law-enforcement-data-stolen-wichita-ransomware">Law enforcement data stolen in Wichita ransomware attack</a> (The Record) </p><p><a href="https://www.darkreading.com/cyber-risk/nigeria-halts-cybersecurity-tax-after-public-outrage">Nigeria Halts Cybersecurity Tax After Public Outrage</a> (Dark Reading) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1496</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fa0f92a2-b95d-11ee-adc6-6fc4c09204e9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6336578065.mp3?updated=1715885214" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A bipartisan blueprint for American leadership.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2068/notes</link>
      <description>U.S. Senators look to enhance American leadership in AI. Federal Agencies Warn of Rising Cyberattacks on Civil Society. The Pentagon says they’re satisfied with Microsoft’s post-breach security pivots. Patch Tuesday updates. A Mississippi health system alerts users of a post-ransomware data breach. The FTC cautions automakers over data collection. CISOs feel pressure to understate cyber risks. On the Learning Layer, Sam and Joe continue their certification journey. Guest Sarah Powazek of UC Berkeley's Center for Long-Term Cybersecurity (CLTC) speaks with N2K’s Brandon Karpf about cyber civil defense clinics. A crypto mixing service developer finds himself behind bars.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Sarah Powazek of UC Berkeley's Center for Long-Term Cybersecurity (CLTC) speaks with N2K’s Brandon Karpf at 2024 RSA Conference about cyber civil defense clinics and the CLTC. Learn about their upcoming Cyber Civil Defense Summit being held at the International Spy Museum in Washington DC next month. 

Learning Layer
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe discuss how to use the midterm exam and Test Day Strategy video. 

Selected Reading
Senators Propose $32 Billion in Annual A.I. Spending but Defer Regulation (The New York Times)
Civil society under increasing threats from 'malicious' state cyber actors, US warns (The Record)
Post-data breach, DOD held 'very candid discussions' with Microsoft (DefenseScoop)
Microsoft issues patches for over 60 software vulnerabilities (Tech Monitor)
Adobe releases May 2024 fixes for critical issues in Reader, Acrobat, Illustrator and other products (BeyondMachines.net)
CISA issues ICS advisories on hardware vulnerabilities from Rockwell, SUBNET, Johnson Controls, Mitsubishi Electric (Industrial Cyber)
900k Impacted by Data Breach at Mississippi Healthcare Provider (SecurityWeek)
FTC fires 'shot across the bow' at automakers over connected-car data privacy (The Record)
Security leaders report pressure from boards to downplay cyber risks (​​ITPro)
Tornado Cash Developer Jailed for Laundering Billions of Dollars (GB Hackers)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 15 May 2024 20:10:00 -0000</pubDate>
      <itunes:title>A bipartisan blueprint for American leadership.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2068</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>U.S. Senators look to enhance American leadership in AI. Federal Agencies Warn of Rising Cyberattacks on Civil Society. The Pentagon says they’re satisfied with Microsoft’s post-breach security pivots. Patch Tuesday updates. A Mississippi health system alerts users of a post-ransomware data breach. The FTC cautions automakers over data collection. CISOs feel pressure to understate cyber risks. On the Learning Layer, Sam and Joe continue their certification journey. Guest Sarah Powazek of UC Berkeley's Center for Long-Term Cybersecurity (CLTC) speaks with N2K’s Brandon Karpf about cyber civil defense clinics. A crypto mixing service developer finds himself behind bars.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Sarah Powazek of UC Berkeley's Center for Long-Term Cybersecurity (CLTC) speaks with N2K’s Brandon Karpf at 2024 RSA Conference about cyber civil defense clinics and the CLTC. Learn about their upcoming Cyber Civil Defense Summit being held at the International Spy Museum in Washington DC next month. 

Learning Layer
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe discuss how to use the midterm exam and Test Day Strategy video. 

Selected Reading
Senators Propose $32 Billion in Annual A.I. Spending but Defer Regulation (The New York Times)
Civil society under increasing threats from 'malicious' state cyber actors, US warns (The Record)
Post-data breach, DOD held 'very candid discussions' with Microsoft (DefenseScoop)
Microsoft issues patches for over 60 software vulnerabilities (Tech Monitor)
Adobe releases May 2024 fixes for critical issues in Reader, Acrobat, Illustrator and other products (BeyondMachines.net)
CISA issues ICS advisories on hardware vulnerabilities from Rockwell, SUBNET, Johnson Controls, Mitsubishi Electric (Industrial Cyber)
900k Impacted by Data Breach at Mississippi Healthcare Provider (SecurityWeek)
FTC fires 'shot across the bow' at automakers over connected-car data privacy (The Record)
Security leaders report pressure from boards to downplay cyber risks (​​ITPro)
Tornado Cash Developer Jailed for Laundering Billions of Dollars (GB Hackers)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>U.S. Senators look to enhance American leadership in AI. Federal Agencies Warn of Rising Cyberattacks on Civil Society. The Pentagon says they’re satisfied with Microsoft’s post-breach security pivots. Patch Tuesday updates. A Mississippi health system alerts users of a post-ransomware data breach. The FTC cautions automakers over data collection. CISOs feel pressure to understate cyber risks. On the Learning Layer, Sam and Joe continue their certification journey. Guest Sarah Powazek of UC Berkeley's Center for Long-Term Cybersecurity (CLTC) speaks with N2K’s Brandon Karpf about cyber civil defense clinics. A crypto mixing service developer finds himself behind bars.</p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/s-powazek/">Sarah Powazek</a> of <a href="https://cltc.berkeley.edu/">UC Berkeley's Center for Long-Term Cybersecurity (CLTC)</a> speaks with N2K’s Brandon Karpf at 2024 RSA Conference about cyber civil defense clinics and the CLTC. Learn about their upcoming <a href="https://cybercivildefensesummit.org/">Cyber Civil Defense Summit</a> being held at the International Spy Museum in Washington DC next month. </p><p><br></p><h2>Learning Layer</h2><p>On our Learning Layer segment, host <a href="https://www.linkedin.com/in/sam-meisenberg/">Sam Meisenberg</a> and <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a> continue their discussion of Joe's ISC2 <a href="https://www.cybervista.net/certify/cissp/">CISSP certification</a> journey using N2K’s comprehensive <a href="https://certify.cybervista.net/products/isc2/cissp-training-course/?utm_source=CWDP&amp;utm_medium=LL&amp;utm_campaign=HH_CISSP">CISSP training course</a>, <a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-pro/">CISSP practice test</a>, and <a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-professional-cissp-practice-labs/">CISSP practice labs</a>. Sam and Joe discuss how to use the midterm exam and Test Day Strategy video. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.nytimes.com/2024/05/15/technology/ai-schumer-roadmap-congress.html">Senators Propose $32 Billion in Annual A.I. Spending but Defer Regulation</a> (The New York Times)</p><p><a href="https://therecord.media/civil-society-under-threat-nation-state-hacking">Civil society under increasing threats from 'malicious' state cyber actors, US warns</a> (The Record)</p><p><a href="https://defensescoop.com/2024/05/14/post-data-breach-dod-microsoft-discussions-john-sherman/">Post-data breach, DOD held 'very candid discussions' with Microsoft</a> (DefenseScoop)</p><p><a href="https://techmonitor.ai/technology/cybersecurity/microsoft-software-vulnerabilities">Microsoft issues patches for over 60 software vulnerabilities</a> (Tech Monitor)</p><p><a href="https://beyondmachines.net/event_details/adobe-releases-may-2024-fixes-for-critical-issues-in-reader-acrobat-illustrator-and-other-products-s-u-e-8-s/gD2P6Ple2L">Adobe releases May 2024 fixes for critical issues in Reader, Acrobat, Illustrator and other products</a> (BeyondMachines.net)</p><p><a href="https://industrialcyber.co/cisa/cisa-issues-ics-advisories-on-hardware-vulnerabilities-from-rockwell-subnet-johnson-controls-mitsubishi-electric/">CISA issues ICS advisories on hardware vulnerabilities from Rockwell, SUBNET, Johnson Controls, Mitsubishi Electric</a> (Industrial Cyber)</p><p><a href="https://www.securityweek.com/900k-impacted-by-data-breach-at-mississippi-healthcare-provider/">900k Impacted by Data Breach at Mississippi Healthcare Provider</a> (SecurityWeek)</p><p><a href="https://therecord.media/ftc-connected-cars-data-privacy-geolocation">FTC fires 'shot across the bow' at automakers over connected-car data privacy</a> (The Record)</p><p><a href="https://www.itpro.com/security/security-leaders-report-pressure-from-boards-to-downplay-cyber-risks">Security leaders report pressure from boards to downplay cyber risks</a> (​​ITPro)</p><p><a href="https://gbhackers.com/tornado-cash-developer-jailed/">Tornado Cash Developer Jailed for Laundering Billions of Dollars</a> (GB Hackers)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><h2><br></h2><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2179</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f9d3fa12-b95d-11ee-adc6-37f30fe92795]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2833324581.mp3?updated=1715794464" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Google strikes back. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2067/notes</link>
      <description>Google patches another Chrome zero-day. UK insurance agencies and the NCSC team up to reduce ransom payments. The FCC designates a robocall scam group. Vermont passes strong data privacy laws. A malicious Python package targets macOS users. ESET unpacks Ebury malware. Don’t answer Jenny’s email. Guest is author Barbara McQuade discussing her book "Attack from Within: How Disinformation is Sabotaging America.”  The White House says, “Keep your crypto mining away from our missile silos!” 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Barbara McQuade joins us to discuss her book "Attack from Within: How Disinformation is Sabotaging America" with Caveat co host Ben Yelin. You can hear Barbara and Ben’s full conversation on last week’s episode of Caveat here. You can catch Caveat on your favorite podcast app each Thursday where hosts Dave and Ben examine the latest in surveillance, digital privacy, cybersecurity law and policy. 

Selected Reading
Google Patches Second Chrome Zero-Day in One Week (SecurityWeek)
UK Insurance and NCSC Join Forces to Fight Ransomware Payments (Infosecurity Magazine)
FCC Warns of 'Royal Tiger' Robocall Scammers (SecurityWeek)
Vermont passes data privacy law allowing consumers to sue companies (The Record)
PyPi package backdoors Macs using the Sliver pen-testing suite (Bleeping Computer)
Apple backports fix for RTKit iOS zero-day to older iPhones (Bleeping Computer)
Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain (WeLiveSecurity)
Security Experts Issue Jenny Green Email Warning For Millions (Forbes)
US government shuts down Chinese-owned cryptomine near nuclear missile base in Wyoming (Data Centre Dynamics)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 May 2024 20:10:00 -0000</pubDate>
      <itunes:title>Google strikes back. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2067</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Google patches another Chrome zero-day. UK insurance agencies and the NCSC team up to reduce ransom payments. The FCC designates a robocall scam group. Vermont passes strong data privacy laws. A malicious Python package targets macOS users. ESET unpacks Ebury malware. Don’t answer Jenny’s email. Guest is author Barbara McQuade discussing her book "Attack from Within: How Disinformation is Sabotaging America.”  The White House says, “Keep your crypto mining away from our missile silos!” 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Barbara McQuade joins us to discuss her book "Attack from Within: How Disinformation is Sabotaging America" with Caveat co host Ben Yelin. You can hear Barbara and Ben’s full conversation on last week’s episode of Caveat here. You can catch Caveat on your favorite podcast app each Thursday where hosts Dave and Ben examine the latest in surveillance, digital privacy, cybersecurity law and policy. 

Selected Reading
Google Patches Second Chrome Zero-Day in One Week (SecurityWeek)
UK Insurance and NCSC Join Forces to Fight Ransomware Payments (Infosecurity Magazine)
FCC Warns of 'Royal Tiger' Robocall Scammers (SecurityWeek)
Vermont passes data privacy law allowing consumers to sue companies (The Record)
PyPi package backdoors Macs using the Sliver pen-testing suite (Bleeping Computer)
Apple backports fix for RTKit iOS zero-day to older iPhones (Bleeping Computer)
Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain (WeLiveSecurity)
Security Experts Issue Jenny Green Email Warning For Millions (Forbes)
US government shuts down Chinese-owned cryptomine near nuclear missile base in Wyoming (Data Centre Dynamics)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Google patches another Chrome zero-day. UK insurance agencies and the NCSC team up to reduce ransom payments. The FCC designates a robocall scam group. Vermont passes strong data privacy laws. A malicious Python package targets macOS users. ESET unpacks Ebury malware. Don’t answer Jenny’s email. Guest is author Barbara McQuade discussing her book "Attack from Within: How Disinformation is Sabotaging America.”  The White House says, “Keep your crypto mining away from our missile silos!” </p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/barbara-mcquade-95392b5/">Barbara McQuade</a> joins us to discuss her book "<a href="https://barbaramcquade.squarespace.com/attackfromwithin">Attack from Within: How Disinformation is Sabotaging America</a>" with <a href="https://thecyberwire.com/podcasts/caveat">Caveat</a> co host <a href="https://www.linkedin.com/in/benjamin-yelin-5b14114b/">Ben Yelin</a>. You can hear Barbara and Ben’s full conversation on last week’s episode of Caveat <a href="https://thecyberwire.com/podcasts/caveat/218/notes">here</a>. You can catch Caveat on your favorite podcast app each Thursday where hosts Dave and Ben examine the latest in surveillance, digital privacy, cybersecurity law and policy. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/google-patches-second-chrome-zero-day-in-one-week/">Google Patches Second Chrome Zero-Day in One Week</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/uk-insurance-ncsc-ransomware/">UK Insurance and NCSC Join Forces to Fight Ransomware Payments</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/fcc-warns-of-royal-tiger-robocall-scammers/">FCC Warns of 'Royal Tiger' Robocall Scammers</a> (SecurityWeek)</p><p><a href="https://therecord.media/vermont-passes-data-privacy-law">Vermont passes data privacy law allowing consumers to sue companies</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/pypi-package-backdoors-macs-using-the-sliver-pen-testing-suite/">PyPi package backdoors Macs using the Sliver pen-testing suite</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/apple/apple-backports-fix-for-rtkit-ios-zero-day-to-older-iphones/">Apple backports fix for RTKit iOS zero-day to older iPhones</a> (Bleeping Computer)</p><p><a href="https://www.welivesecurity.com/en/eset-research/ebury-alive-unseen-400k-linux-servers-compromised-cryptotheft-financial-gain/">Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain</a> (WeLiveSecurity)</p><p><a href="https://www.forbes.com/sites/daveywinder/2024/05/14/security-experts-issue-jenny-green-email-warning-for-millions/">Security Experts Issue Jenny Green Email Warning For Millions</a> (Forbes)</p><p><a href="https://www.datacenterdynamics.com/en/news/us-government-shuts-down-chinese-owned-cryptomine-near-nuclear-missile-base-in-wyoming/">US government shuts down Chinese-owned cryptomine near nuclear missile base in Wyoming</a> (Data Centre Dynamics)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1706</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f997f4d6-b95d-11ee-adc6-bf3399fafee0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2255753515.mp3?updated=1715712659" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A battle for digital sovereignty.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2066/notes</link>
      <description>IntelBroker claims to have breached a Europol online platform. The U.S. and China are set to discuss AI security. U.S. agencies warn against BlackBasta ransomware operators. A claimed Russian group attacks British local newspapers. Cinterion cellular modems are vulnerable to malicious SMS attacks. A UK IT contractor allegedly failed to report a major data breach for months. Generative AI is a double edged sword for CISOs. Reality Defender wins the RSA Conference's Innovation Sandbox competition. Our guest is Chris Betz, CISO of AWS, discussing how to build a strong culture of security. Solar storms delay the planting of corn. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Chris Betz, CISO of AWS, discussing how to build a strong culture of security. In his blog, Chris writes about how AWS’s security culture starts at the top, and it extends through every part of the organization. 

Selected Reading
Europol confirms web portal breach, says no operational data stolen (Bleeping Computer)
US and China to Hold Discussions on AI Risks and Security (BankInfo Security)
CISA, FBI, HHS, MS-ISAC warn critical infrastructure sector of Black Basta hacker group; provide mitigations (Industrial Cyber)
'Russian' hackers deface potentially hundreds of local British news sites (The Record)
Cinterion IoT Cellular Modules Vulnerable to SMS Compromise (GovInfo Security)
MoD hack: IT contractor concealed major hack for months (Computing)
AI's rapid growth puts pressure on CISOs to adapt to new security risks (Help Net Security)
Reality Defender Wins RSAC Innovation Sandbox Competition (Dark Reading)
Solar Storms are disrupting farmer GPS systems during critical planting time (The Verge) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 13 May 2024 20:10:00 -0000</pubDate>
      <itunes:title>A battle for digital sovereignty.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2066</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>IntelBroker claims to have breached a Europol online platform. The U.S. and China are set to discuss AI security. U.S. agencies warn against BlackBasta ransomware operators. A claimed Russian group attacks British local newspapers. Cinterion cellular modems are vulnerable to malicious SMS attacks. A UK IT contractor allegedly failed to report a major data breach for months. Generative AI is a double edged sword for CISOs. Reality Defender wins the RSA Conference's Innovation Sandbox competition. Our guest is Chris Betz, CISO of AWS, discussing how to build a strong culture of security. Solar storms delay the planting of corn. 
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Chris Betz, CISO of AWS, discussing how to build a strong culture of security. In his blog, Chris writes about how AWS’s security culture starts at the top, and it extends through every part of the organization. 

Selected Reading
Europol confirms web portal breach, says no operational data stolen (Bleeping Computer)
US and China to Hold Discussions on AI Risks and Security (BankInfo Security)
CISA, FBI, HHS, MS-ISAC warn critical infrastructure sector of Black Basta hacker group; provide mitigations (Industrial Cyber)
'Russian' hackers deface potentially hundreds of local British news sites (The Record)
Cinterion IoT Cellular Modules Vulnerable to SMS Compromise (GovInfo Security)
MoD hack: IT contractor concealed major hack for months (Computing)
AI's rapid growth puts pressure on CISOs to adapt to new security risks (Help Net Security)
Reality Defender Wins RSAC Innovation Sandbox Competition (Dark Reading)
Solar Storms are disrupting farmer GPS systems during critical planting time (The Verge) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>IntelBroker claims to have breached a Europol online platform. The U.S. and China are set to discuss AI security. U.S. agencies warn against BlackBasta ransomware operators. A claimed Russian group attacks British local newspapers. Cinterion cellular modems are vulnerable to malicious SMS attacks. A UK IT contractor allegedly failed to report a major data breach for months. Generative AI is a double edged sword for CISOs. Reality Defender wins the RSA Conference's Innovation Sandbox competition. Our guest is Chris Betz, CISO of AWS, discussing how to build a strong culture of security. Solar storms delay the planting of corn.<strong> </strong></p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/chris-betz-903b739b/">Chris Betz</a>, CISO of <a href="https://aws.amazon.com/security/">AWS</a>, discussing how to build a strong culture of security. In his <a href="https://aws.amazon.com/blogs/security/how-the-unique-culture-of-security-at-aws-makes-a-difference/">blog</a>, Chris writes about how AWS’s security culture starts at the top, and it extends through every part of the organization. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/europol-confirms-web-portal-breach-says-no-operational-data-stolen/">Europol confirms web portal breach, says no operational data stolen</a> (Bleeping Computer)</p><p><a href="https://www.bankinfosecurity.com/us-china-to-hold-discussions-on-ai-risks-security-a-25181">US and China to Hold Discussions on AI Risks and Security</a> (BankInfo Security)</p><p><a href="https://industrialcyber.co/cisa/cisa-fbi-hhs-ms-isac-warn-critical-infrastructure-sector-of-black-basta-hacker-group-provide-mitigations/">CISA, FBI, HHS, MS-ISAC warn critical infrastructure sector of Black Basta hacker group; provide mitigations</a> (Industrial Cyber)</p><p><a href="https://therecord.media/newsquest-media-group-british-newspaper-websites-defaced">'Russian' hackers deface potentially hundreds of local British news sites</a> (The Record)</p><p><a href="https://www.govinfosecurity.com/cinterion-iot-cellular-modules-vulnerable-to-sms-compromise-a-25183">Cinterion IoT Cellular Modules Vulnerable to SMS Compromise</a> (GovInfo Security)</p><p><a href="https://www.computing.co.uk/news/4207119/mod-hack-contractor-concealed-major-hack-months">MoD hack: IT contractor concealed major hack for months</a> (Computing)</p><p><a href="https://www.helpnetsecurity.com/2024/05/13/genai-ciso-role/">AI's rapid growth puts pressure on CISOs to adapt to new security risks</a> (Help Net Security)</p><p><a href="https://www.darkreading.com/cyber-risk/reality-defender-wins-rsac-innovation-sandbox">Reality Defender Wins RSAC Innovation Sandbox Competition</a> (Dark Reading)</p><p><a href="https://www.theverge.com/2024/5/12/24154779/solar-storms-farmer-gps-john-deer">Solar Storms are disrupting farmer GPS systems during critical planting time</a> (The Verge) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1696</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f95712b8-b95d-11ee-adc6-3741e8d07353]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7224905972.mp3?updated=1715623185" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Brandon Robinson: Built from the ground up. [Sales Engineer] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/15/notes</link>
      <description>Cybersecurity Sales Engineer Brandon Robinson shares how he built his career in technology and the barriers he experienced along the way. He talks about how his job involves him interacting with customers at the highest levels making sure their solution is meeting needs. In addition, Brandon describes how as a black man and a trailblazer, he's been met with resistance. His positive spin on moving ahead involves relying on himself. Brandon's advice: find your passion, don't be intimidated and you will be met with success. Our thanks to Brandon for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 12 May 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Brandon Robinson: Built from the ground up. [Sales Engineer] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>15</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cybersecurity Sales Engineer Brandon Robinson shares how he built his career in technology and the barriers he experienced along the way. He talks about how his job involves him interacting with customers at the highest levels making sure their solution is meeting needs. In addition, Brandon describes how as a black man and a trailblazer, he's been met with resistance. His positive spin on moving ahead involves relying on himself. Brandon's advice: find your passion, don't be intimidated and you will be met with success. Our thanks to Brandon for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cybersecurity Sales Engineer Brandon Robinson shares how he built his career in technology and the barriers he experienced along the way. He talks about how his job involves him interacting with customers at the highest levels making sure their solution is meeting needs. In addition, Brandon describes how as a black man and a trailblazer, he's been met with resistance. His positive spin on moving ahead involves relying on himself. Brandon's advice: find your passion, don't be intimidated and you will be met with success. Our thanks to Brandon for sharing his story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>420</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0d242862-0ef9-11ef-a9e4-a3ec860bf156]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6915730231.mp3?updated=1715365131" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The double-edged sword of cyber espionage. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/329/notes</link>
      <description>Dick O'Brien from Symantec Threat Hunter team is discussing their research on  “Graph: Growing number of threats leveraging Microsoft API.” The team observed an increasing number of threats that have begun to leverage the Microsoft Graph API, usually to facilitate communications with command-and-control (C&amp;C) infrastructure hosted on Microsoft cloud services. 
The research states "the technique was most recently used in an attack against an organization in Ukraine, where a previously undocumented piece of malware used the Graph API to leverage Microsoft OneDrive for C&amp;C purposes."
The research can be found here:
Graph: Growing number of threats leveraging Microsoft API

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 May 2024 07:00:00 -0000</pubDate>
      <itunes:title>The double-edged sword of cyber espionage. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>329</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dick O'Brien from Symantec Threat Hunter team is discussing their research on  “Graph: Growing number of threats leveraging Microsoft API.” The team observed an increasing number of threats that have begun to leverage the Microsoft Graph API, usually to facilitate communications with command-and-control (C&amp;C) infrastructure hosted on Microsoft cloud services. 
The research states "the technique was most recently used in an attack against an organization in Ukraine, where a previously undocumented piece of malware used the Graph API to leverage Microsoft OneDrive for C&amp;C purposes."
The research can be found here:
Graph: Growing number of threats leveraging Microsoft API

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dick O'Brien from Symantec Threat Hunter team is discussing their research on  “Graph: Growing number of threats leveraging Microsoft API.” The team observed an increasing number of threats that have begun to leverage the Microsoft Graph API, usually to facilitate communications with command-and-control (C&amp;C) infrastructure hosted on Microsoft cloud services. </p><p>The research states "the technique was most recently used in an attack against an organization in Ukraine, where a previously undocumented piece of malware used the Graph API to leverage Microsoft OneDrive for C&amp;C purposes."</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/graph-api-threats">Graph: Growing number of threats leveraging Microsoft API</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1099</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8aeb5430-0ee2-11ef-abfd-2bee4213bff0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5680495987.mp3?updated=1715356420" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Treasury's offensive in financial defense.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2065/notes</link>
      <description>Project Fortress looks to protect the US financial system. News from San Francisco as RSA Conference winds down. Dell warns customers of compromised data. Google updates Chrome after a zero day is exploited in the wild. Colleges in Quebec are disrupted by a cyberattack. CopyCop uses generative AI for misinformation. The FBI looks to snag members of Scattered Spider. Betsy Carmelite, Principal at Booz Allen, shares our final Woman on the Street today from the 2024 RSA Conference. Guest Deepen Desai, Chief Security Officer at Zscaler, joins us to offer some highlights on their AI security report. A solar storm’s a-comin’.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Betsy Carmelite, Principal at Booz Allen, shares our final Woman on the Street today. N2K’s Brandon Karpf caught up with Betsy to share insights from the 2024 RSA Conference. 
Guest Deepen Desai, Chief Security Officer at Zscaler, joins us to offer some highlights on their AI security report.

Selected Reading
Treasury launches ‘Project Fortress,’ an alliance with banks against hackers (CNN Business)
Cyberthreat landscape permanently altered by Chinese operations, US officials say (The Record)
White House to Push Cybersecurity Standards on Hospitals (Bloomberg)
Dell warns of “incident” that may have leaked customers’ personal info (Ars Technica)
Google fixes fifth Chrome zero-day exploited in attacks this year (Bleeping Computer)
Cyberattack shuts down 4 Quebec CEGEPs, cancelling classes and exams (CBC News)
AI-Powered Russian Network Pushes Fake Political News (Infosecurity Magazine)
University System of Georgia: 800K exposed in 2023 MOVEit attack (Bleeping Computer)
FBI working towards nabbing Scattered Spider hackers, official says (Reuters)
Severe solar storm threatens power grids and navigation systems (Financial Post)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 10 May 2024 20:10:00 -0000</pubDate>
      <itunes:title>Treasury's offensive in financial defense.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2065</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Project Fortress looks to protect the US financial system. News from San Francisco as RSA Conference winds down. Dell warns customers of compromised data. Google updates Chrome after a zero day is exploited in the wild. Colleges in Quebec are disrupted by a cyberattack. CopyCop uses generative AI for misinformation. The FBI looks to snag members of Scattered Spider. Betsy Carmelite, Principal at Booz Allen, shares our final Woman on the Street today from the 2024 RSA Conference. Guest Deepen Desai, Chief Security Officer at Zscaler, joins us to offer some highlights on their AI security report. A solar storm’s a-comin’.
Our 2024 N2K CyberWire Audience Survey is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Betsy Carmelite, Principal at Booz Allen, shares our final Woman on the Street today. N2K’s Brandon Karpf caught up with Betsy to share insights from the 2024 RSA Conference. 
Guest Deepen Desai, Chief Security Officer at Zscaler, joins us to offer some highlights on their AI security report.

Selected Reading
Treasury launches ‘Project Fortress,’ an alliance with banks against hackers (CNN Business)
Cyberthreat landscape permanently altered by Chinese operations, US officials say (The Record)
White House to Push Cybersecurity Standards on Hospitals (Bloomberg)
Dell warns of “incident” that may have leaked customers’ personal info (Ars Technica)
Google fixes fifth Chrome zero-day exploited in attacks this year (Bleeping Computer)
Cyberattack shuts down 4 Quebec CEGEPs, cancelling classes and exams (CBC News)
AI-Powered Russian Network Pushes Fake Political News (Infosecurity Magazine)
University System of Georgia: 800K exposed in 2023 MOVEit attack (Bleeping Computer)
FBI working towards nabbing Scattered Spider hackers, official says (Reuters)
Severe solar storm threatens power grids and navigation systems (Financial Post)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Project Fortress looks to protect the US financial system. News from San Francisco as RSA Conference winds down. Dell warns customers of compromised data. Google updates Chrome after a zero day is exploited in the wild. Colleges in Quebec are disrupted by a cyberattack. CopyCop uses generative AI for misinformation. The FBI looks to snag members of Scattered Spider. Betsy Carmelite, Principal at Booz Allen, shares our final Woman on the Street today from the 2024 RSA Conference. Guest Deepen Desai, Chief Security Officer at Zscaler, joins us to offer some highlights on their AI security report. A solar storm’s a-comin’.</p><p>Our <a href="https://www.surveymonkey.com/r/2024_n2k-cw-audience_podcast">2024 N2K CyberWire Audience Survey</a> is underway, make your voice heard and get in the running for a $100 Amazon gift card. Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/betsy-carmelite-pmp-133374110/">Betsy Carmelite</a>, Principal at <a href="https://www.boozallen.com/">Booz Allen</a>, shares our final Woman on the Street today. <a href="https://www.n2k.com/">N2K</a>’s <a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a> caught up with Betsy to share insights from the <a href="https://www.rsaconference.com/usa">2024 RSA Conference</a>. </p><p>Guest <a href="https://www.linkedin.com/in/deepen-desai-48487b2/">Deepen Desai</a>, Chief Security Officer at <a href="https://www.zscaler.com/">Zscaler</a>, joins us to offer some highlights on their <a href="https://info.zscaler.com/resources-industry-reports-threatlabz-ai-security-2024">AI security report</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.cnn.com/2024/05/09/business/treasury-launches-project-fortress/index.html">Treasury launches ‘Project Fortress,’ an alliance with banks against hackers</a> (CNN Business)</p><p><a href="https://therecord.media/cyberthreat-landscape-altered-chinese-operations">Cyberthreat landscape permanently altered by Chinese operations, US officials say</a> (The Record)</p><p><a href="https://www.bloomberg.com/news/articles/2024-05-09/white-house-to-push-cybersecurity-standards-on-hospitals">White House to Push Cybersecurity Standards on Hospitals</a> (Bloomberg)</p><p><a href="https://arstechnica.com/security/2024/05/dell-warns-of-incident-that-may-have-leaked-customers-personal-info/">Dell warns of “incident” that may have leaked customers’ personal info</a> (Ars Technica)</p><p><a href="https://www.bleepingcomputer.com/news/security/google-fixes-fifth-chrome-zero-day-vulnerability-exploited-in-attacks-in-2024/#google_vignette">Google fixes fifth Chrome zero-day exploited in attacks this year</a> (Bleeping Computer)</p><p><a href="https://www.cbc.ca/news/canada/montreal/cyberattack-cegeps-quebec-1.7198026">Cyberattack shuts down 4 Quebec CEGEPs, cancelling classes and exams</a> (CBC News)</p><p><a href="https://www.infosecurity-magazine.com/news/aipowered-russian-network-fake-news/">AI-Powered Russian Network Pushes Fake Political News</a> (Infosecurity Magazine)</p><p><a href="https://www.bleepingcomputer.com/news/security/university-system-of-georgia-800k-exposed-in-2023-moveit-attack/">University System of Georgia: 800K exposed in 2023 MOVEit attack</a> (Bleeping Computer)</p><p><a href="https://www.reuters.com/world/us/fbi-working-towards-nabbing-scattered-spider-hackers-official-says-2024-05-10/">FBI working towards nabbing Scattered Spider hackers, official says</a> (Reuters)</p><p><a href="https://financialpost.com/pmn/business-pmn/severe-solar-storm-threatens-power-grids-and-navigation-systems">Severe solar storm threatens power grids and navigation systems</a> (Financial Post)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2406</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f91aaf94-b95d-11ee-adc6-079aa68b5847]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6838164513.mp3?updated=1715370389" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Healthcare in the crosshairs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2064/notes</link>
      <description>Ascension healthcare shuts down systems following a cybersecurity event. Updates from RSA Conference. The FDA recalls an insulin pump app. Polish officials blame Russia for recent cyber attacks. IntelBroker claims to have compromised a pair of UK banks. New Mexico’s top cop accuses Meta of failing to protect kids. British Columbia reports "sophisticated cybersecurity incidents" on government networks. Researchers uncover a vulnerability in UPS software affecting critical infrastructure. Zscaler investigates a claimed data breach. On the Learning Layer, host Sam Meisenberg and N2K’s Urban Alliance Intern, David Nguyen, discuss David's AZ-900 exam experience. The Library of Congress stands strong.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Caleb Barlow, CEO at Cyberbit, is our Man on the Street today. N2K’s Brandon Karpf caught up with Caleb to talk about the 2024 RSA Conference. 
Learning Layer
On our bonus Learning Layer segment, host Sam Meisenberg and N2K’s Urban Alliance Intern, David Nguyen, discuss David's AZ-900 exam experience, including some remote proctoring issues. David gives tips and strategies for those gearing up for their own exam. 

Selected Reading
Ascension healthcare takes systems offline after cyberattack (Bleeping Computer)
With nation-state threats in mind, nearly 70 software firms agree to Secure by Design pledge (The Record)
CISA starts CVE "vulnrichment" program (Help Net Security)
Cyber director sees potential for a new era in White House office (The Record)
FDA recalls defective iOS app that injured over 200 insulin pump users (The Verge)
Poland says it was targeted by Russian military intelligence hackers (The Record)
IntelBroker Hacker Leaks Alleged HSBC &amp; Barclays Bank Data (Hack Read)
Undercover operation nets arrests as New Mexico's top prosecutor blames Meta for online predators (AP News)
B.C. government hit by ’sophisticated cybersecurity incidents’ (Vancouver Sun)
Cyble detects critical vulnerabilities in CyberPower PowerPanel Business Software used in critical infrastructure (Industrial Cyber)
Zscaler is investigating data breach claims (Industrial Cyber)
Thwarted cyberattack targeted Library of Congress in tandem with October British Library breach (Nextgov/FCW) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 09 May 2024 20:10:00 -0000</pubDate>
      <itunes:title>Healthcare in the crosshairs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2064</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Ascension healthcare shuts down systems following a cybersecurity event. Updates from RSA Conference. The FDA recalls an insulin pump app. Polish officials blame Russia for recent cyber attacks. IntelBroker claims to have compromised a pair of UK banks. New Mexico’s top cop accuses Meta of failing to protect kids. British Columbia reports "sophisticated cybersecurity incidents" on government networks. Researchers uncover a vulnerability in UPS software affecting critical infrastructure. Zscaler investigates a claimed data breach. On the Learning Layer, host Sam Meisenberg and N2K’s Urban Alliance Intern, David Nguyen, discuss David's AZ-900 exam experience. The Library of Congress stands strong.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Caleb Barlow, CEO at Cyberbit, is our Man on the Street today. N2K’s Brandon Karpf caught up with Caleb to talk about the 2024 RSA Conference. 
Learning Layer
On our bonus Learning Layer segment, host Sam Meisenberg and N2K’s Urban Alliance Intern, David Nguyen, discuss David's AZ-900 exam experience, including some remote proctoring issues. David gives tips and strategies for those gearing up for their own exam. 

Selected Reading
Ascension healthcare takes systems offline after cyberattack (Bleeping Computer)
With nation-state threats in mind, nearly 70 software firms agree to Secure by Design pledge (The Record)
CISA starts CVE "vulnrichment" program (Help Net Security)
Cyber director sees potential for a new era in White House office (The Record)
FDA recalls defective iOS app that injured over 200 insulin pump users (The Verge)
Poland says it was targeted by Russian military intelligence hackers (The Record)
IntelBroker Hacker Leaks Alleged HSBC &amp; Barclays Bank Data (Hack Read)
Undercover operation nets arrests as New Mexico's top prosecutor blames Meta for online predators (AP News)
B.C. government hit by ’sophisticated cybersecurity incidents’ (Vancouver Sun)
Cyble detects critical vulnerabilities in CyberPower PowerPanel Business Software used in critical infrastructure (Industrial Cyber)
Zscaler is investigating data breach claims (Industrial Cyber)
Thwarted cyberattack targeted Library of Congress in tandem with October British Library breach (Nextgov/FCW) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ascension healthcare shuts down systems following a cybersecurity event. Updates from RSA Conference. The FDA recalls an insulin pump app. Polish officials blame Russia for recent cyber attacks. IntelBroker claims to have compromised a pair of UK banks. New Mexico’s top cop accuses Meta of failing to protect kids. British Columbia reports "sophisticated cybersecurity incidents" on government networks. Researchers uncover a vulnerability in UPS software affecting critical infrastructure. Zscaler investigates a claimed data breach. On the Learning Layer, host Sam Meisenberg and N2K’s Urban Alliance Intern, David Nguyen, discuss David's AZ-900 exam experience. The Library of Congress stands strong.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/calebbarlow/">Caleb Barlow</a>, CEO at <a href="https://www.cyberbit.com/">Cyberbit</a>, is our Man on the Street today. <a href="https://www.n2k.com/">N2K</a>’s <a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a> caught up with Caleb to talk about the <a href="https://www.rsaconference.com/usa">2024 RSA Conference</a>. </p><h3>Learning Layer</h3><p>On our bonus Learning Layer segment, host <a href="https://www.linkedin.com/in/sam-meisenberg/">Sam Meisenberg</a> and <a href="https://www.n2k.com/">N2K</a>’s <a href="https://www.urbanalliance.org/contact-us/">Urban Alliance</a> Intern, <a href="https://www.linkedin.com/in/davidt-nguyen/">David Nguyen</a>, discuss David's <a href="https://certify.cybervista.net/products/microsoft/microsoft-azure-fundamentals-practice-test/">AZ-900 exam</a> experience, including some remote proctoring issues. David gives tips and strategies for those gearing up for their own exam. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/ascension-healthcare-takes-systems-offline-after-cyberattack/">Ascension healthcare takes systems offline after cyberattack</a> (Bleeping Computer)</p><p><a href="https://therecord.media/secure-by-design-companies-cisa-rsa">With nation-state threats in mind, nearly 70 software firms agree to Secure by Design pledge</a> (The Record)</p><p><a href="https://www.helpnetsecurity.com/2024/05/09/cisa-vulnrichment-cve-enrichment/">CISA starts CVE "vulnrichment" program </a>(Help Net Security)</p><p><a href="https://therecord.media/harry-coker-rsa-oncd-leadership-challenges">Cyber director sees potential for a new era in White House office</a> (The Record)</p><p><a href="https://www.theverge.com/2024/5/9/24152633/fda-recall-tandem-diabetes-care-insulin-pump-mobile-app">FDA recalls defective iOS app that injured over 200 insulin pump users</a> (The Verge)</p><p><a href="https://therecord.media/poland-cyber-espionage-russia-gru">Poland says it was targeted by Russian military intelligence hackers</a> (The Record)</p><p><a href="https://www.hackread.com/intelbroker-hacker-hsbc-barclays-data-breach/">IntelBroker Hacker Leaks Alleged HSBC &amp; Barclays Bank Data</a> (Hack Read)</p><p><a href="https://apnews.com/article/meta-new-mexico-facebook-children-d66b3eee51772acfe13359002522de33">Undercover operation nets arrests as New Mexico's top prosecutor blames Meta for online predators </a>(AP News)</p><p><a href="https://vancouversun.com/news/local-news/b-c-government-hit-by-sophisticated-cybersecurity-incidents">B.C. government hit by ’sophisticated cybersecurity incidents’</a> (Vancouver Sun)</p><p><a href="https://industrialcyber.co/critical-infrastructure/cyble-detects-critical-vulnerabilities-in-cyberpower-powerpanel-business-software-used-in-critical-infrastructure/">Cyble detects critical vulnerabilities in CyberPower PowerPanel Business Software used in critical infrastructure</a> (Industrial Cyber)</p><p><a href="https://securityaffairs.com/162927/cyber-crime/zscaler-investigating-data-breach-claims.html">Zscaler is investigating data breach claims</a> (Industrial Cyber)</p><p><a href="https://www.nextgov.com/cybersecurity/2024/05/thwarted-cyberattack-targeted-library-congress-tandem-october-british-library-breach/396399/">Thwarted cyberattack targeted Library of Congress in tandem with October British Library breach</a> (Nextgov/FCW) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2490</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f8de83e8-b95d-11ee-adc6-874e966829be]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7439496064.mp3?updated=1715280945" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The takedown of a ransomware ringleader. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2063/notes</link>
      <description>International law enforcement put a leash on a LockBit leader. Updates from RSA Conference, including our Man on the Street Rob Boyce, Managing Director at Accenture. TikTok sues the U.S. government. The Commerce Department restricts chip sales to Huawei. A third-party breach exposes payroll records of Britain’s armed forces. BogusBazaar operates over 75,000 fake webshops. Android security updates address 26 vulnerabilities. A Philadelphia real estate investment trust gets hit with ransomware. BetterHelp will pay $7.8 million to settle FTC charges of health data misuse. On the Learning Layer, Sam and Joe dive into CISSP Domain 4, Communication and Network Security, and discuss networking, the OSI model, and firewalls. AI steals the Met Gala spotlight.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Rob Boyce, Managing Director at Accenture is our Man on the Street today. Rob stops by to share his thoughts on the 2024 RSA Conference. 

Learning Layer
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe dive into CISSP Domain 4, Communication and Network Security, and discuss networking, the OSI model, and firewalls, which includes:

4.1 Assess and implement secure design principles in network architectures

4.2 Secure network components

4.3 Implement secure communication channels according to design


Selected Reading
International law enforcement put a leash on a LockBit leader. Updates from RSA Conference, including our Man on the Street Rob Boyce, Managing Director at Accenture. TikTok sues the U.S. government. The Commerce Department restricts chip sales to Huawei. A third-party breach exposes payroll records of Britain’s armed forces. BogusBazaar operates over 75,000 fake webshops. Android security updates address 26 vulnerabilities. A Philadelphia real estate investment trust gets hit with ransomware. BetterHelp will pay $7.8 million to settle FTC charges of health data misuse. On the Learning Layer, Sam and Joe dive into CISSP Domain 4, Communication and Network Security, and discuss networking, the OSI model, and firewalls. AI steals the Met Gala spotlight.

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 08 May 2024 20:10:00 -0000</pubDate>
      <itunes:title>The takedown of a ransomware ringleader. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2063</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>International law enforcement put a leash on a LockBit leader. Updates from RSA Conference, including our Man on the Street Rob Boyce, Managing Director at Accenture. TikTok sues the U.S. government. The Commerce Department restricts chip sales to Huawei. A third-party breach exposes payroll records of Britain’s armed forces. BogusBazaar operates over 75,000 fake webshops. Android security updates address 26 vulnerabilities. A Philadelphia real estate investment trust gets hit with ransomware. BetterHelp will pay $7.8 million to settle FTC charges of health data misuse. On the Learning Layer, Sam and Joe dive into CISSP Domain 4, Communication and Network Security, and discuss networking, the OSI model, and firewalls. AI steals the Met Gala spotlight.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Rob Boyce, Managing Director at Accenture is our Man on the Street today. Rob stops by to share his thoughts on the 2024 RSA Conference. 

Learning Layer
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe dive into CISSP Domain 4, Communication and Network Security, and discuss networking, the OSI model, and firewalls, which includes:

4.1 Assess and implement secure design principles in network architectures

4.2 Secure network components

4.3 Implement secure communication channels according to design


Selected Reading
International law enforcement put a leash on a LockBit leader. Updates from RSA Conference, including our Man on the Street Rob Boyce, Managing Director at Accenture. TikTok sues the U.S. government. The Commerce Department restricts chip sales to Huawei. A third-party breach exposes payroll records of Britain’s armed forces. BogusBazaar operates over 75,000 fake webshops. Android security updates address 26 vulnerabilities. A Philadelphia real estate investment trust gets hit with ransomware. BetterHelp will pay $7.8 million to settle FTC charges of health data misuse. On the Learning Layer, Sam and Joe dive into CISSP Domain 4, Communication and Network Security, and discuss networking, the OSI model, and firewalls. AI steals the Met Gala spotlight.

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>International law enforcement put a leash on a LockBit leader. Updates from RSA Conference, including our Man on the Street Rob Boyce, Managing Director at Accenture. TikTok sues the U.S. government. The Commerce Department restricts chip sales to Huawei. A third-party breach exposes payroll records of Britain’s armed forces. BogusBazaar operates over 75,000 fake webshops. Android security updates address 26 vulnerabilities. A Philadelphia real estate investment trust gets hit with ransomware. BetterHelp will pay $7.8 million to settle FTC charges of health data misuse. On the Learning Layer, Sam and Joe dive into CISSP Domain 4, Communication and Network Security, and discuss networking, the OSI model, and firewalls. AI steals the Met Gala spotlight.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/therobertjboyce/">Rob Boyce</a>, Managing Director at Accenture is our Man on the Street today. Rob stops by to share his thoughts on the <a href="https://www.rsaconference.com/usa">2024 RSA Conference</a>. </p><p><br></p><h2>Learning Layer</h2><p>On our Learning Layer segment, host <a href="https://www.linkedin.com/in/sam-meisenberg/">Sam Meisenberg</a> and <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a> continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive <a href="https://certify.cybervista.net/products/isc2/cissp-training-course/?utm_source=CWDP&amp;utm_medium=LL&amp;utm_campaign=HH_CISSP">CISSP training course</a>, <a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-pro/">CISSP practice test</a>, and <a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-professional-cissp-practice-labs/">CISSP practice labs</a>. Sam and Joe dive into CISSP Domain 4, Communication and Network Security, and discuss networking, the OSI model, and firewalls, which includes:</p><ul>
<li>4.1 Assess and implement secure design principles in network architectures</li>
<li>4.2 Secure network components</li>
<li>4.3 Implement secure communication channels according to design</li>
</ul><p><br></p><h2>Selected Reading</h2><p>International law enforcement put a leash on a LockBit leader. Updates from RSA Conference, including our Man on the Street Rob Boyce, Managing Director at Accenture. TikTok sues the U.S. government. The Commerce Department restricts chip sales to Huawei. A third-party breach exposes payroll records of Britain’s armed forces. BogusBazaar operates over 75,000 fake webshops. Android security updates address 26 vulnerabilities. A Philadelphia real estate investment trust gets hit with ransomware. BetterHelp will pay $7.8 million to settle FTC charges of health data misuse. On the Learning Layer, Sam and Joe dive into CISSP Domain 4, Communication and Network Security, and discuss networking, the OSI model, and firewalls. AI steals the Met Gala spotlight.</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2107</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f8a25788-b95d-11ee-adc6-5be3612d82dd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8465538535.mp3?updated=1715192969" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hack-proofing the future to shape cyberspace.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2062/notes</link>
      <description>Secretary Blinken and Senator Warner weigh in on cybersecurity at RSA Conference. Ransomware profits are falling. Proton Mail is under scrutiny for information sharing. A senior British lawmaker blames China for a UK cyberattack. Medstar Health notifies patients of a potential data breach. A study finds cybersecurity education programs across the U.S vary wildly. Brandon Karpf, N2K Man on the Street, stops by to share his thoughts on the 2024 RSA Conference. An Australian pension fund gets lost in the clouds.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guests
Brandon Karpf, N2K Man on the Street, stops by to share his thoughts on the 2024 RSA Conference. 

Selected Reading
Blinken unveils State Dept. strategy for ‘vibrant, open and secure technological future’ (The Record)
Warner: Lawmakers 'in process' of finding Section 702 fix (The Record)
Ransomware operations are becoming less profitable (Help Net Security)
Proton Mail Discloses User Data Leading to Arrest in Spain (Restore Privacy)
UK says defence ministry targeted in cyberattack (Digital Journal)
Novel attack against virtually all VPN apps neuters their entire purpose (Ars Technica)
MedStar Health data breach affects 183,079 patients (WUSA9)
Researchers say cybersecurity education varies widely in US (Tech Xplore)
System outage affecting UniSuper services (UniSuper) 
UniSuper private cloud, secondary systems taken out by "rare" Google Cloud "issues" (iTnews)
Superannuation: What It Is, How It Works, Types of Plans (Investopedia)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 May 2024 20:30:00 -0000</pubDate>
      <itunes:title>Hack-proofing the future to shape cyberspace.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2062</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Secretary Blinken and Senator Warner weigh in on cybersecurity at RSA Conference. Ransomware profits are falling. Proton Mail is under scrutiny for information sharing. A senior British lawmaker blames China for a UK cyberattack. Medstar Health notifies patients of a potential data breach. A study finds cybersecurity education programs across the U.S vary wildly. Brandon Karpf, N2K Man on the Street, stops by to share his thoughts on the 2024 RSA Conference. An Australian pension fund gets lost in the clouds.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guests
Brandon Karpf, N2K Man on the Street, stops by to share his thoughts on the 2024 RSA Conference. 

Selected Reading
Blinken unveils State Dept. strategy for ‘vibrant, open and secure technological future’ (The Record)
Warner: Lawmakers 'in process' of finding Section 702 fix (The Record)
Ransomware operations are becoming less profitable (Help Net Security)
Proton Mail Discloses User Data Leading to Arrest in Spain (Restore Privacy)
UK says defence ministry targeted in cyberattack (Digital Journal)
Novel attack against virtually all VPN apps neuters their entire purpose (Ars Technica)
MedStar Health data breach affects 183,079 patients (WUSA9)
Researchers say cybersecurity education varies widely in US (Tech Xplore)
System outage affecting UniSuper services (UniSuper) 
UniSuper private cloud, secondary systems taken out by "rare" Google Cloud "issues" (iTnews)
Superannuation: What It Is, How It Works, Types of Plans (Investopedia)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Secretary Blinken and Senator Warner weigh in on cybersecurity at RSA Conference. Ransomware profits are falling. Proton Mail is under scrutiny for information sharing. A senior British lawmaker blames China for a UK cyberattack. Medstar Health notifies patients of a potential data breach. A study finds cybersecurity education programs across the U.S vary wildly. Brandon Karpf, N2K Man on the Street, stops by to share his thoughts on the 2024 RSA Conference. An Australian pension fund gets lost in the clouds.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guests</h2><p><a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a>, <a href="https://www.n2k.com/">N2K</a> Man on the Street, stops by to share his thoughts on the <a href="https://www.rsaconference.com/usa">2024 RSA Conference</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/state-department-international-cyber-strategy-blinken-rsa">Blinken unveils State Dept. strategy for ‘vibrant, open and secure technological future’</a> (The Record)</p><p><a href="https://therecord.media/section-702-renewal-ecsps-mark-warner">Warner: Lawmakers 'in process' of finding Section 702 fix</a> (The Record)</p><p><a href="https://www.helpnetsecurity.com/2024/05/07/ransomware-payments-falling/">Ransomware operations are becoming less profitable</a> (Help Net Security)</p><p><a href="https://restoreprivacy.com/protonmail-discloses-user-data-leading-to-arrest-in-spain/">Proton Mail Discloses User Data Leading to Arrest in Spain</a> (Restore Privacy)</p><p><a href="https://www.digitaljournal.com/world/uk-says-defence-ministry-targeted-in-cyberattack/article">UK says defence ministry targeted in cyberattack</a> (Digital Journal)</p><p><a href="https://arstechnica.com/security/2024/05/novel-attack-against-virtually-all-vpn-apps-neuters-their-entire-purpose/">Novel attack against virtually all VPN apps neuters their entire purpose</a> (Ars Technica)</p><p><a href="https://www.wusa9.com/article/news/health/medstar-health-data-breach-affects-patients-information/65-c0073477-1ed7-4c1e-83bb-2428858f32e2">MedStar Health data breach affects 183,079 patients</a> (WUSA9)</p><p><a href="https://techxplore.com/news/2024-05-cybersecurity-varies-widely.html">Researchers say cybersecurity education varies widely in US</a> (Tech Xplore)</p><p><a href="https://www.unisuper.com.au/contact-us/outage-update">System outage affecting UniSuper services</a> (UniSuper) </p><p><a href="https://www.itnews.com.au/news/unisuper-private-cloud-secondary-systems-taken-out-by-rare-google-cloud-issues-607744">UniSuper private cloud, secondary systems taken out by "rare" Google Cloud "issues"</a> (iTnews)</p><p><a href="https://www.investopedia.com/terms/s/superannuation.asp">Superannuation: What It Is, How It Works, Types of Plans</a> (Investopedia)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1570</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f865ef64-b95d-11ee-adc6-4ba4f337f098]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6810256993.mp3?updated=1715111884" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Charting the course: Biden's blueprint for global cybersecurity.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2061/notes</link>
      <description>Secretary of State Antony Blinken is set to unveil a new international cybersecurity strategy at the RSA Conference in San Francisco. Paris prepares for Olympic-sized cybersecurity threats. Wichita, Kansas is recovering from a ransomware attack. A massive data breach hits citizens of El Salvador. Researchers steal cookies to bypass authentication. Cuckoo malware targets macOS systems. Iranian threat actors pose as journalists to infiltrate network targets. A former Microsoft insider analyzes the company’s recommitment to cybersecurity. Guest Mark Terenzoni, Director of Risk Management at AWS, joins N2K’s Rick Howard to discuss the benefits of security lakes in a post-AI world. Ukrainian officials introduce an AI generated spokesperson. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Mark Terenzoni, Director of Risk Management at AWS, joins N2K’s Rick Howard to discuss the benefits of security lakes and other security considerations for a post-AI world. Read Mark's blog on the subject. 

Selected Reading
Biden administration rolls out international cybersecurity plan (POLITICO)
Paris 2024 gearing up to face unprecedented cybersecurity threat (Reuters)
Wichita government shuts down systems after ransomware incident (The Record)
El Salvador suffered a massive leak of biometric data (Security Affairs)
Stealing cookies: Researchers describe how to bypass modern authentication (CyberScoop)
Malware: Cuckoo Behaves Like Cross Between Infostealer and Spyware (Kandji)
Iranian hackers pose as journalists to push backdoor malware (Bleeping Computer)
Breaking down Microsoft’s pivot to placing cybersecurity as a top priority (DoublePulsar)
Ukraine unveils AI-generated foreign ministry spokesperson | Artificial intelligence (AI) (The Guardian)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 06 May 2024 20:10:00 -0000</pubDate>
      <itunes:title>Charting the course: Biden's blueprint for global cybersecurity.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2061</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Secretary of State Antony Blinken is set to unveil a new international cybersecurity strategy at the RSA Conference in San Francisco. Paris prepares for Olympic-sized cybersecurity threats. Wichita, Kansas is recovering from a ransomware attack. A massive data breach hits citizens of El Salvador. Researchers steal cookies to bypass authentication. Cuckoo malware targets macOS systems. Iranian threat actors pose as journalists to infiltrate network targets. A former Microsoft insider analyzes the company’s recommitment to cybersecurity. Guest Mark Terenzoni, Director of Risk Management at AWS, joins N2K’s Rick Howard to discuss the benefits of security lakes in a post-AI world. Ukrainian officials introduce an AI generated spokesperson. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Mark Terenzoni, Director of Risk Management at AWS, joins N2K’s Rick Howard to discuss the benefits of security lakes and other security considerations for a post-AI world. Read Mark's blog on the subject. 

Selected Reading
Biden administration rolls out international cybersecurity plan (POLITICO)
Paris 2024 gearing up to face unprecedented cybersecurity threat (Reuters)
Wichita government shuts down systems after ransomware incident (The Record)
El Salvador suffered a massive leak of biometric data (Security Affairs)
Stealing cookies: Researchers describe how to bypass modern authentication (CyberScoop)
Malware: Cuckoo Behaves Like Cross Between Infostealer and Spyware (Kandji)
Iranian hackers pose as journalists to push backdoor malware (Bleeping Computer)
Breaking down Microsoft’s pivot to placing cybersecurity as a top priority (DoublePulsar)
Ukraine unveils AI-generated foreign ministry spokesperson | Artificial intelligence (AI) (The Guardian)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Secretary of State Antony Blinken is set to unveil a new international cybersecurity strategy at the RSA Conference in San Francisco. Paris prepares for Olympic-sized cybersecurity threats. Wichita, Kansas is recovering from a ransomware attack. A massive data breach hits citizens of El Salvador. Researchers steal cookies to bypass authentication. Cuckoo malware targets macOS systems. Iranian threat actors pose as journalists to infiltrate network targets. A former Microsoft insider analyzes the company’s recommitment to cybersecurity. Guest Mark Terenzoni, Director of Risk Management at AWS, joins N2K’s Rick Howard to discuss the benefits of security lakes in a post-AI world. Ukrainian officials introduce an AI generated spokesperson. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/markterenzoni/">Mark Terenzoni</a>, Director of Risk Management at <a href="https://aws.amazon.com/products/security/">AWS</a>, joins N2K’s Rick Howard to discuss the benefits of security lakes and other security considerations for a post-AI world. Read Mark's <a href="https://aws.amazon.com/blogs/security/how-amazon-security-lake-is-helping-customers-simplify-security-data-management-for-proactive-threat-analysis/">blog</a> on the subject. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.politico.com/news/2024/05/06/biden-international-cybersecurity-plan-00156190">Biden administration rolls out international cybersecurity plan</a> (POLITICO)</p><p><a href="https://www.reuters.com/technology/cybersecurity/paris-2024-gearing-up-face-unprecedented-cybersecurity-threat-2024-05-06/">Paris 2024 gearing up to face unprecedented cybersecurity threat</a> (Reuters)</p><p><a href="https://therecord.media/wichita-kansas-government-ransomware-attack">Wichita government shuts down systems after ransomware incident</a> (The Record)</p><p><a href="https://securityaffairs.com/162790/data-breach/el-salvador-massive-leak-biometric-data.html">El Salvador suffered a massive leak of biometric data</a> (Security Affairs)</p><p><a href="https://cyberscoop.com/stealing-cookies-researchers-describe-how-to-bypass-modern-authentication/">Stealing cookies: Researchers describe how to bypass modern authentication</a> (CyberScoop)</p><p><a href="https://blog.kandji.io/malware-cuckoo-infostealer-spyware">Malware: Cuckoo Behaves Like Cross Between Infostealer and Spyware</a> (Kandji)</p><p><a href="https://www.bleepingcomputer.com/news/security/iranian-hackers-pose-as-journalists-to-push-backdoor-malware/">Iranian hackers pose as journalists to push backdoor malware</a> (Bleeping Computer)</p><p><a href="https://doublepulsar.com/breaking-down-microsofts-pivot-to-placing-cybersecurity-as-a-top-priority-734467a8db01">Breaking down Microsoft’s pivot to placing cybersecurity as a top priority </a>(DoublePulsar)</p><p><a href="https://www.theguardian.com/technology/article/2024/may/03/ukraine-ai-foreign-ministry-spokesperson">Ukraine unveils AI-generated foreign ministry spokesperson | Artificial intelligence (AI)</a> (The Guardian)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1623</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f828f0d2-b95d-11ee-adc6-47ff5623b523]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1154387795.mp3?updated=1715102276" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Elizabeth Wharton: Strong shoulders for someone else to stand on. [Legal] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/14/notes</link>
      <description>Technology attorney and startup chief of staff Elizabeth Wharton shares her experiences and how she came to work with companies in technology. Elizabeth talks about how she always liked solving problems and Nancy Drew mysteries, but not litigation. These morphed finding into her home in the policy legal world and some time later, technology law. Elizabeth describes how she loves planning and strategy in her work and encourages others to ask questions and absorb all of the information. Our thanks to Elizabeth for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 05 May 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Elizabeth Wharton: Strong shoulders for someone else to stand on. [Legal] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>14</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Technology attorney and startup chief of staff Elizabeth Wharton shares her experiences and how she came to work with companies in technology. Elizabeth talks about how she always liked solving problems and Nancy Drew mysteries, but not litigation. These morphed finding into her home in the policy legal world and some time later, technology law. Elizabeth describes how she loves planning and strategy in her work and encourages others to ask questions and absorb all of the information. Our thanks to Elizabeth for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Technology attorney and startup chief of staff Elizabeth Wharton shares her experiences and how she came to work with companies in technology. Elizabeth talks about how she always liked solving problems and Nancy Drew mysteries, but not litigation. These morphed finding into her home in the policy legal world and some time later, technology law. Elizabeth describes how she loves planning and strategy in her work and encourages others to ask questions and absorb all of the information. Our thanks to Elizabeth for sharing her story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>433</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8c978534-097d-11ef-9e7f-87c926395be6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8758537283.mp3?updated=1718395728" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Geopolitical tensions rise with China. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/328/notes</link>
      <description>Adam Marré, CISO at Arctic Wolf, is diving deep into geopolitical tension with China including APT31, iSoon and TikTok with Dave this week. They also discuss some of the history behind China cyber operations.
Adam shares information on how different APT groups are able to create spear phishing campaigns, and provides info on how to combat these groups.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 May 2024 05:00:00 -0000</pubDate>
      <itunes:title>Geopolitical tensions rise with China. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>328</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Adam Marré, CISO at Arctic Wolf, is diving deep into geopolitical tension with China including APT31, iSoon and TikTok with Dave this week. They also discuss some of the history behind China cyber operations.
Adam shares information on how different APT groups are able to create spear phishing campaigns, and provides info on how to combat these groups.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Adam Marré, CISO at Arctic Wolf, is diving deep into geopolitical tension with China including APT31, iSoon and TikTok with Dave this week. They also discuss some of the history behind China cyber operations.</p><p>Adam shares information on how different APT groups are able to create spear phishing campaigns, and provides info on how to combat these groups.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2002</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[db37c620-097a-11ef-becb-979f339f6500]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1680129398.mp3?updated=1714763428" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware attack turns legal attack.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2060/notes</link>
      <description>A Texas operator of rehab facilities faces multiple lawsuits after a ransomware attack. Microsoft warns Android developers to steer clear of the Dirty Stream. The Feds warn of North Korean social engineering. A flaw in the R programming language has been patched. Zloader borrows stealthiness from ZeuS. The GAO highlights gaps in NASA’s cybersecurity measures. Indonesia is a spyware hot-spot. Germany summons a top Russian envoy to address cyber-attacks linked to Russian military intelligence. An Israeli PI is arrested in London following allegations of a cyberespionage campaign. In our Industry Voices segment, Allison Ritter, Senior Product Manager from Cyberbit shares her career journey, off the bench and onto the court. A cybersecurity consultant allegedly attempts to extort a one-point-five million dollar exit package. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, Allison Ritter, Senior Product Manager from Cyberbit, shares her cybersecurity journey: “Off the bench and onto the court.”

Selected Reading
Rehab Hospital Chain Hack Affects 101,000; Facing 6 Lawsuits (GovInfo Security)
Microsoft Warns of 'Dirty Stream' Vulnerability in Popular Android Apps (SecurityWeek)
U.S. Govt Warns of Massive Social Engineering Attack from North Korean Hackers (GB Hackers)
R-bitrary Code Execution: Vulnerability in R's Deserialization (HiddenLayer)
ZLoader Malware adds Zeus's anti-analysis feature (Security Affairs)
GAO report indicates that NASA should update spacecraft acquisition policies and standards for cybersecurity (Industrial Cyber) 
Indonesia is a Spyware Haven, Amnesty International Finds (InfoSecurity Magazine)
Germany summons Russian envoy over 2023 cyber-attacks (The Guardian)
Israeli private eye arrested in London over alleged hacking for US firm (Reuters)
Cybersecurity consultant arrested after allegedly extorting IT firm (Bleeping Computer) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 03 May 2024 20:30:00 -0000</pubDate>
      <itunes:title>Ransomware attack turns legal attack.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2060</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A Texas operator of rehab facilities faces multiple lawsuits after a ransomware attack. Microsoft warns Android developers to steer clear of the Dirty Stream. The Feds warn of North Korean social engineering. A flaw in the R programming language has been patched. Zloader borrows stealthiness from ZeuS. The GAO highlights gaps in NASA’s cybersecurity measures. Indonesia is a spyware hot-spot. Germany summons a top Russian envoy to address cyber-attacks linked to Russian military intelligence. An Israeli PI is arrested in London following allegations of a cyberespionage campaign. In our Industry Voices segment, Allison Ritter, Senior Product Manager from Cyberbit shares her career journey, off the bench and onto the court. A cybersecurity consultant allegedly attempts to extort a one-point-five million dollar exit package. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, Allison Ritter, Senior Product Manager from Cyberbit, shares her cybersecurity journey: “Off the bench and onto the court.”

Selected Reading
Rehab Hospital Chain Hack Affects 101,000; Facing 6 Lawsuits (GovInfo Security)
Microsoft Warns of 'Dirty Stream' Vulnerability in Popular Android Apps (SecurityWeek)
U.S. Govt Warns of Massive Social Engineering Attack from North Korean Hackers (GB Hackers)
R-bitrary Code Execution: Vulnerability in R's Deserialization (HiddenLayer)
ZLoader Malware adds Zeus's anti-analysis feature (Security Affairs)
GAO report indicates that NASA should update spacecraft acquisition policies and standards for cybersecurity (Industrial Cyber) 
Indonesia is a Spyware Haven, Amnesty International Finds (InfoSecurity Magazine)
Germany summons Russian envoy over 2023 cyber-attacks (The Guardian)
Israeli private eye arrested in London over alleged hacking for US firm (Reuters)
Cybersecurity consultant arrested after allegedly extorting IT firm (Bleeping Computer) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Texas operator of rehab facilities faces multiple lawsuits after a ransomware attack. Microsoft warns Android developers to steer clear of the Dirty Stream. The Feds warn of North Korean social engineering. A flaw in the R programming language has been patched. Zloader borrows stealthiness from ZeuS. The GAO highlights gaps in NASA’s cybersecurity measures. Indonesia is a spyware hot-spot. Germany summons a top Russian envoy to address cyber-attacks linked to Russian military intelligence. An Israeli PI is arrested in London following allegations of a cyberespionage campaign. In our Industry Voices segment, Allison Ritter, Senior Product Manager from Cyberbit shares her career journey, off the bench and onto the court. A cybersecurity consultant allegedly attempts to extort a one-point-five million dollar exit package. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Voices segment, <a href="https://www.linkedin.com/in/allisonroseritter/">Allison Ritter</a>, Senior Product Manager from <a href="https://www.cyberbit.com/">Cyberbit</a>, shares her cybersecurity journey: “Off the bench and onto the court.”</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.govinfosecurity.com/rehab-hospital-chain-hack-affects-101000-facing-6-lawsuits-a-25004">Rehab Hospital Chain Hack Affects 101,000; Facing 6 Lawsuits</a> (GovInfo Security)</p><p><a href="https://www.securityweek.com/microsoft-warns-of-dirty-stream-vulnerability-in-popular-android-apps/">Microsoft Warns of 'Dirty Stream' Vulnerability in Popular Android Apps</a> (SecurityWeek)</p><p><a href="https://gbhackers.com/u-s-govt-warns/">U.S. Govt Warns of Massive Social Engineering Attack from North Korean Hackers</a> (GB Hackers)</p><p><a href="https://hiddenlayer.com/research/r-bitrary-code-execution/">R-bitrary Code Execution: Vulnerability in R's Deserialization</a> (HiddenLayer)</p><p><a href="https://securityaffairs.com/162688/cyber-crime/zloader-malware-anti-analysis-feature.html">ZLoader Malware adds Zeus's anti-analysis feature</a> (Security Affairs)</p><p><a href="https://industrialcyber.co/news/gao-report-indicates-that-nasa-should-update-spacecraft-acquisition-policies-and-standards-for-cybersecurity/">GAO report indicates that NASA should update spacecraft acquisition policies and standards for cybersecurity</a> (Industrial Cyber) </p><p><a href="https://www.infosecurity-magazine.com/news/indonesia-spyware-haven-amnesty/">Indonesia is a Spyware Haven, Amnesty International Finds</a> (InfoSecurity Magazine)</p><p><a href="https://www.theguardian.com/world/article/2024/may/03/germany-says-russians-behind-intolerable-cyber-attack-last-year">Germany summons Russian envoy over 2023 cyber-attacks</a> (The Guardian)</p><p><a href="https://www.reuters.com/world/israeli-private-eye-arrested-uk-over-alleged-hacking-us-pr-firm-2024-05-02/">Israeli private eye arrested in London over alleged hacking for US firm</a> (Reuters)</p><p><a href="https://www.bleepingcomputer.com/news/legal/cybersecurity-consultant-arrested-after-allegedly-extorting-it-firm/">Cybersecurity consultant arrested after allegedly extorting IT firm</a> (Bleeping Computer) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2021</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f7ec0c8a-b95d-11ee-adc6-93a18a36f990]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6397840441.mp3?updated=1714766544" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dropbox sign breach exposes secrets.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2059/notes</link>
      <description>Dropbox’s secure signature service suffers a breach. CISA is set to announce a voluntary pledge toward enhanced security. Five Eyes partners issue security recommendations for critical infrastructure. Microsoft acknowledges VPN issues after recent security updates. LockBit releases data from a hospital in France. One of REvil’s leaders gets 14 years in prison. An Phishing-as-a-Service provider gets taken down by international law enforcement. China limits Teslas over security concerns. In our Threat Vector segment, David Moulton from Unit 42 explores Adversarial AI and Deepfakes with two expert guests, Billy Hewlett, and Tony Huynh. NightDragon founder and CEO Dave Dewalt joins us with a preview of next week’s NightDragon Innovation Summit 2024 at RSAC. And celebrating the 60th  anniversary of the BASIC programming language.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In our Threat Vector segment, David Moulton, Director of Thought Leadership at Unit 42, explores Adversarial AI and Deepfakes as part of the ongoing series “AI’s Impact in Cybersecurity'' with two expert guests, Billy Hewlett, Senior Director of AI Research at Palo Alto Networks, and Tony Huynh, a Security Engineer specializing in AI and deepfakes. They unpack the escalating risks posed by adversarial AI in cybersecurity. You can catch Threat Vector every other Thursday on the N2K CyberWire network and where you get all of your favorite podcasts. Listen to David’s full discussion with Billy and Tony here. 

Plus, NightDragon Founder and CEO Dave Dewalt joins us with a preview of next week’s NightDragon Innovation Summit 2024 at RSAC including a look into his “State of the Cyber Union” keynote.

Selected Reading
Security Breach Exposes Dropbox Sign Users (Infosecurity Magazine)
The US Government Is Asking Big Tech to Promise Better Cybersecurity (WIRED)
CISA adds GitLab flaw to its Known Exploited Vulnerabilities catalog (Security Affairs)
Russian Hackers Target Industrial Systems in North America, Europe (SecurityWeek)
Microsoft says April Windows updates break VPN connections (Bleeping Computer)
LockBit publishes confidential data stolen from Cannes hospital in France (The Record)
Ukrainian sentenced to almost 14 years for infecting thousands with REvil ransomware (The Record)
LabHost Crackdown: 37 Arrested In Global Cybercrime Bust (Security Boulevard)
Tesla cars to be banned from Chinese government buildings amid security fears — report (Drive)
The BASIC programming language turns 60 (Ars Technica)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 02 May 2024 20:10:00 -0000</pubDate>
      <itunes:title>Dropbox sign breach exposes secrets.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2059</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Dropbox’s secure signature service suffers a breach. CISA is set to announce a voluntary pledge toward enhanced security. Five Eyes partners issue security recommendations for critical infrastructure. Microsoft acknowledges VPN issues after recent security updates. LockBit releases data from a hospital in France. One of REvil’s leaders gets 14 years in prison. An Phishing-as-a-Service provider gets taken down by international law enforcement. China limits Teslas over security concerns. In our Threat Vector segment, David Moulton from Unit 42 explores Adversarial AI and Deepfakes with two expert guests, Billy Hewlett, and Tony Huynh. NightDragon founder and CEO Dave Dewalt joins us with a preview of next week’s NightDragon Innovation Summit 2024 at RSAC. And celebrating the 60th  anniversary of the BASIC programming language.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In our Threat Vector segment, David Moulton, Director of Thought Leadership at Unit 42, explores Adversarial AI and Deepfakes as part of the ongoing series “AI’s Impact in Cybersecurity'' with two expert guests, Billy Hewlett, Senior Director of AI Research at Palo Alto Networks, and Tony Huynh, a Security Engineer specializing in AI and deepfakes. They unpack the escalating risks posed by adversarial AI in cybersecurity. You can catch Threat Vector every other Thursday on the N2K CyberWire network and where you get all of your favorite podcasts. Listen to David’s full discussion with Billy and Tony here. 

Plus, NightDragon Founder and CEO Dave Dewalt joins us with a preview of next week’s NightDragon Innovation Summit 2024 at RSAC including a look into his “State of the Cyber Union” keynote.

Selected Reading
Security Breach Exposes Dropbox Sign Users (Infosecurity Magazine)
The US Government Is Asking Big Tech to Promise Better Cybersecurity (WIRED)
CISA adds GitLab flaw to its Known Exploited Vulnerabilities catalog (Security Affairs)
Russian Hackers Target Industrial Systems in North America, Europe (SecurityWeek)
Microsoft says April Windows updates break VPN connections (Bleeping Computer)
LockBit publishes confidential data stolen from Cannes hospital in France (The Record)
Ukrainian sentenced to almost 14 years for infecting thousands with REvil ransomware (The Record)
LabHost Crackdown: 37 Arrested In Global Cybercrime Bust (Security Boulevard)
Tesla cars to be banned from Chinese government buildings amid security fears — report (Drive)
The BASIC programming language turns 60 (Ars Technica)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dropbox’s secure signature service suffers a breach. CISA is set to announce a voluntary pledge toward enhanced security. Five Eyes partners issue security recommendations for critical infrastructure. Microsoft acknowledges VPN issues after recent security updates. LockBit releases data from a hospital in France. One of REvil’s leaders gets 14 years in prison. An Phishing-as-a-Service provider gets taken down by international law enforcement. China limits Teslas over security concerns. In our Threat Vector segment, David Moulton from Unit 42 explores Adversarial AI and Deepfakes with two expert guests, Billy Hewlett, and Tony Huynh. NightDragon founder and CEO Dave Dewalt joins us with a preview of next week’s NightDragon Innovation Summit 2024 at RSAC. And celebrating the 60th  anniversary of the BASIC programming language.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>In our Threat Vector segment, <a href="https://www.linkedin.com/in/davidrmoulton">David Moulton</a>, Director of Thought Leadership at Unit 42, explores Adversarial AI and Deepfakes as part of the ongoing series “AI’s Impact in Cybersecurity'' with two expert guests, <a href="https://www.linkedin.com/in/william-hewlett-81357631/">Billy Hewlett</a>, Senior Director of AI Research at Palo Alto Networks, and <a href="https://www.linkedin.com/in/tonythanhlonghuynh/">Tony Huynh</a>, a Security Engineer specializing in AI and deepfakes. They unpack the escalating risks posed by adversarial AI in cybersecurity. You can catch <a href="https://thecyberwire.com/podcasts/threat-vector">Threat Vector</a> every other Thursday on the N2K CyberWire network and where you get all of your favorite podcasts. Listen to David’s full discussion with Billy and Tony <a href="https://thecyberwire.com/podcasts/threat-vector/20/notes">here</a>. </p><p><br></p><p>Plus, <a href="https://www.nightdragon.com/">NightDragon</a> Founder and CEO <a href="https://www.linkedin.com/in/ddewalt/">Dave Dewalt</a> joins us with a preview of next week’s NightDragon Innovation Summit 2024 at RSAC including a look into his “State of the Cyber Union” keynote.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.infosecurity-magazine.com/news/security-breach-dropbox-sign/">Security Breach Exposes Dropbox Sign Users</a> (Infosecurity Magazine)</p><p><a href="https://www.wired.com/story/cisa-cybersecurity-pledge/">The US Government Is Asking Big Tech to Promise Better Cybersecurity</a> (WIRED)</p><p><a href="https://securityaffairs.com/162646/security/gitlab-known-exploited-vulnerabilities-catalog.html">CISA adds GitLab flaw to its Known Exploited Vulnerabilities catalog</a> (Security Affairs)</p><p><a href="https://www.securityweek.com/russian-hackers-target-industrial-systems-in-north-america-europe/">Russian Hackers Target Industrial Systems in North America, Europe</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-says-april-windows-updates-break-vpn-connections/">Microsoft says April Windows updates break VPN connections</a> (Bleeping Computer)</p><p><a href="https://therecord.media/lockbit-ransomware-hopital-de-cannes-data-published">LockBit publishes confidential data stolen from Cannes hospital in France</a> (The Record)</p><p><a href="https://therecord.media/revil-ransomware-yaroslav-vasinskyi-prison-sentence">Ukrainian sentenced to almost 14 years for infecting thousands with REvil ransomware</a> (The Record)</p><p><a href="https://securityboulevard.com/2024/05/labhost-crackdown-37-arrested-in-global-cybercrime-bust/">LabHost Crackdown: 37 Arrested In Global Cybercrime Bust</a> (Security Boulevard)</p><p><a href="https://www.drive.com.au/news/tesla-vehicles-to-face-entry-bans-in-chinese-government-buildings-as-security-concerns-increase-report/">Tesla cars to be banned from Chinese government buildings amid security fears — report</a> (Drive)</p><p><a href="https://arstechnica.com/gadgets/2024/05/the-basic-programming-language-turns-60/">The BASIC programming language turns 60</a> (Ars Technica)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2079</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f7aef840-b95d-11ee-adc6-733fb8966830]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9229060897.mp3?updated=1714679007" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Retirement plan breach shakes financial giant.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2058/notes</link>
      <description>A breach at J.P. Morgan Chase exposes data of over 451,000 individuals. President Biden Signs a National Security Memorandum to Strengthen and Secure U.S. Critical Infrastructure. Verizon’s DBIR is out. Cornell researchers unveil a worm called Morris II. A prominent newspaper group sues OpenAI. Marriott admits to using inadequate encryption. A Finnish man gets six years in prison for hacking a psychotherapy center. Qantas customers had unauthorized access to strangers’ travel data. The Feds look to shift hiring requirements toward skills. In our Industry Voices segment, Steve Riley, Vice President and Field CTO at Netskope, discusses generative AI and governance. Major automakers take a wrong turn on privacy. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today on Industry Voices, Steve Riley, Vice President and Field CTO at Netskope, discusses generative AI and governance. For more of Steve’s insights into gen AI, check out his article in Forbes. 

Selected Reading
Breach at J.P. Morgan Exposes Data of 451,000 Plan Participants (PLANADVISER)
White House releases National Security Memorandum on critical infrastructure security and resilience (Industrial Cyber)
DBIR Report 2024 - Summary of Findings (Verizon)
Experimental Morris II worm can exploit popular AI services to steal data and spread malware (Computing)
Major U.S. newspapers sue OpenAI, Microsoft for copyright infringement (Axios)
Marriott admits it falsely claimed for five years it was using encryption during 2018 breach (CSO Online)
Finnish hacker imprisoned for accessing thousands of psychotherapy records and demanding ransoms (AP News)
Qantas Airways Says App Showed Customers Each Other's Data (GovInfo Security)
Agencies to turn toward ‘skill-based hiring’ for cyber and tech jobs, ONCD says (CyberScoop)
Carmakers lying about requiring warrants before sharing location data, Senate probe finds (The Record)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 01 May 2024 20:10:00 -0000</pubDate>
      <itunes:title>Retirement plan breach shakes financial giant.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2058</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A breach at J.P. Morgan Chase exposes data of over 451,000 individuals. President Biden Signs a National Security Memorandum to Strengthen and Secure U.S. Critical Infrastructure. Verizon’s DBIR is out. Cornell researchers unveil a worm called Morris II. A prominent newspaper group sues OpenAI. Marriott admits to using inadequate encryption. A Finnish man gets six years in prison for hacking a psychotherapy center. Qantas customers had unauthorized access to strangers’ travel data. The Feds look to shift hiring requirements toward skills. In our Industry Voices segment, Steve Riley, Vice President and Field CTO at Netskope, discusses generative AI and governance. Major automakers take a wrong turn on privacy. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today on Industry Voices, Steve Riley, Vice President and Field CTO at Netskope, discusses generative AI and governance. For more of Steve’s insights into gen AI, check out his article in Forbes. 

Selected Reading
Breach at J.P. Morgan Exposes Data of 451,000 Plan Participants (PLANADVISER)
White House releases National Security Memorandum on critical infrastructure security and resilience (Industrial Cyber)
DBIR Report 2024 - Summary of Findings (Verizon)
Experimental Morris II worm can exploit popular AI services to steal data and spread malware (Computing)
Major U.S. newspapers sue OpenAI, Microsoft for copyright infringement (Axios)
Marriott admits it falsely claimed for five years it was using encryption during 2018 breach (CSO Online)
Finnish hacker imprisoned for accessing thousands of psychotherapy records and demanding ransoms (AP News)
Qantas Airways Says App Showed Customers Each Other's Data (GovInfo Security)
Agencies to turn toward ‘skill-based hiring’ for cyber and tech jobs, ONCD says (CyberScoop)
Carmakers lying about requiring warrants before sharing location data, Senate probe finds (The Record)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A breach at J.P. Morgan Chase exposes data of over 451,000 individuals. President Biden Signs a National Security Memorandum to Strengthen and Secure U.S. Critical Infrastructure. Verizon’s DBIR is out. Cornell researchers unveil a worm called Morris II. A prominent newspaper group sues OpenAI. Marriott admits to using inadequate encryption. A Finnish man gets six years in prison for hacking a psychotherapy center. Qantas customers had unauthorized access to strangers’ travel data. The Feds look to shift hiring requirements toward skills. In our Industry Voices segment, Steve Riley, Vice President and Field CTO at Netskope, discusses generative AI and governance. Major automakers take a wrong turn on privacy. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today on Industry Voices, <a href="https://www.linkedin.com/in/steverileysea/">Steve Riley</a>, Vice President and Field CTO at <a href="https://www.netskope.com/">Netskope</a>, discusses generative AI and governance. For more of Steve’s insights into gen AI, check out <a href="https://www.forbes.com/sites/forbestechcouncil/2023/09/18/are-generative-ai-risks-actually-impacting-your-security-posture/?sh=603775e85fca">his article in Forbes</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.planadviser.com/breach-j-p-morgan-exposes-data-451000-plan-participants/">Breach at J.P. Morgan Exposes Data of 451,000 Plan Participants</a> (PLANADVISER)</p><p><a href="https://industrialcyber.co/critical-infrastructure/white-house-releases-national-security-memorandum-on-critical-infrastructure-security-and-resilience/">White House releases National Security Memorandum on critical infrastructure security and resilience</a> (Industrial Cyber)</p><p><a href="https://www.verizon.com/business/resources/reports/dbir/2024/summary-of-findings/">DBIR Report 2024 - Summary of Findings</a> (Verizon)</p><p><a href="https://www.computing.co.uk/news/4203370/experimental-morris-ii-worm-exploit-popular-ai-services-steal-spread-malware">Experimental Morris II worm can exploit popular AI services to steal data and spread malware</a> (Computing)</p><p><a href="https://www.axios.com/2024/04/30/microsoft-openai-lawsuit-copyright-newspapers-alden-global">Major U.S. newspapers sue OpenAI, Microsoft for copyright infringement</a> (Axios)</p><p><a href="https://www.csoonline.com/article/2096365/marriott-admits-it-falsely-claimed-for-five-years-it-was-using-encryption-during-2018-breach.html">Marriott admits it falsely claimed for five years it was using encryption during 2018 breach</a> (CSO Online)</p><p><a href="https://apnews.com/article/finland-court-hacking-ransom-psychotherapy-center-b03183e5ca66a768d743f7e84b368829">Finnish hacker imprisoned for accessing thousands of psychotherapy records and demanding ransoms</a> (AP News)</p><p><a href="https://www.govinfosecurity.com/qantas-airways-says-app-showed-customers-each-others-data-a-24987">Qantas Airways Says App Showed Customers Each Other's Data</a> (GovInfo Security)</p><p><a href="https://cyberscoop.com/cybersecurity-tech-jobs-skill-based-hiring-white-house/">Agencies to turn toward ‘skill-based hiring’ for cyber and tech jobs, ONCD says </a>(CyberScoop)</p><p><a href="https://therecord.media/carmakers-lying-about-warrants-location-data">Carmakers lying about requiring warrants before sharing location data, Senate probe finds</a> (The Record)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2037</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f7727d70-b95d-11ee-adc6-139eda6071f1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9020250404.mp3?updated=1714592175" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware is just a prescription for chaos.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2057/notes</link>
      <description>UnitedHealth’s CEO testimony before congress reveals details of the massive data breach. Major US mobile carriers are hit with hefty fines for sharing customer data. Muddling Meerkat manipulates DNS. A report from Sophos says ransomware payments skyrocketed this past year. The DOE addresses risks and benefits of AI. LightSpy malware targets macOS. A crucial Kansas City weather and traffic system is disabled by a cyberattack. A Canadian pharmacy chain shuts down temporarily following a cyberattack. Guest Kayla Williams, CISO from Devo, joins us to share CISO insights into the pressure of their roles they feel mounting on them and gives us a look into their plans for RSAC 2024. Pay attention - that AWS meter may be running. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Kayla Williams, CISO from Devo, joins us to share CISO insights into the pressure of their roles they feel mounting on them and gives us a look into their plans for RSAC 2024.

Selected Reading
Change Healthcare hackers broke in using stolen credentials — and no MFA, says UHG CEO (TechCrunch)
FCC Fines Carriers $200m For Selling User Location Data (Infosecurity Magazine)
Muddling Meerkat hackers manipulate DNS using China’s Great Firewall (Bleeping Computer)
Ransom Payments Surge by 500% to an Average of $2m (Infosecurity Magazine)
US DOE rolls out initial assessment report on AI benefits and risks for critical energy infrastructure (Industrial Cyber) 
LightSpy malware has made a comeback, and this time it's coming after your macOS devices (ITPro)
Kansas City system providing roadside weather, traffic info taken down by cyberattack (The Record)
London Drugs pharmacy chain closes stores after cyberattack (Bleeping Computer)
An Empty S3 Bucket Can Make Your AWS Bills Explode (GB Hackers) - kicker
How an empty S3 bucket can make your AWS bill explode (Medium)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Apr 2024 20:10:00 -0000</pubDate>
      <itunes:title>Ransomware is just a prescription for chaos.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2057</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>UnitedHealth’s CEO testimony before congress reveals details of the massive data breach. Major US mobile carriers are hit with hefty fines for sharing customer data. Muddling Meerkat manipulates DNS. A report from Sophos says ransomware payments skyrocketed this past year. The DOE addresses risks and benefits of AI. LightSpy malware targets macOS. A crucial Kansas City weather and traffic system is disabled by a cyberattack. A Canadian pharmacy chain shuts down temporarily following a cyberattack. Guest Kayla Williams, CISO from Devo, joins us to share CISO insights into the pressure of their roles they feel mounting on them and gives us a look into their plans for RSAC 2024. Pay attention - that AWS meter may be running. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Kayla Williams, CISO from Devo, joins us to share CISO insights into the pressure of their roles they feel mounting on them and gives us a look into their plans for RSAC 2024.

Selected Reading
Change Healthcare hackers broke in using stolen credentials — and no MFA, says UHG CEO (TechCrunch)
FCC Fines Carriers $200m For Selling User Location Data (Infosecurity Magazine)
Muddling Meerkat hackers manipulate DNS using China’s Great Firewall (Bleeping Computer)
Ransom Payments Surge by 500% to an Average of $2m (Infosecurity Magazine)
US DOE rolls out initial assessment report on AI benefits and risks for critical energy infrastructure (Industrial Cyber) 
LightSpy malware has made a comeback, and this time it's coming after your macOS devices (ITPro)
Kansas City system providing roadside weather, traffic info taken down by cyberattack (The Record)
London Drugs pharmacy chain closes stores after cyberattack (Bleeping Computer)
An Empty S3 Bucket Can Make Your AWS Bills Explode (GB Hackers) - kicker
How an empty S3 bucket can make your AWS bill explode (Medium)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>UnitedHealth’s CEO testimony before congress reveals details of the massive data breach. Major US mobile carriers are hit with hefty fines for sharing customer data. Muddling Meerkat manipulates DNS. A report from Sophos says ransomware payments skyrocketed this past year. The DOE addresses risks and benefits of AI. LightSpy malware targets macOS. A crucial Kansas City weather and traffic system is disabled by a cyberattack. A Canadian pharmacy chain shuts down temporarily following a cyberattack. Guest Kayla Williams, CISO from Devo, joins us to share CISO insights into the pressure of their roles they feel mounting on them and gives us a look into their plans for RSAC 2024. Pay attention - that AWS meter may be running. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest Kayla Williams, CISO from Devo, joins us to share CISO insights into the pressure of their roles they feel mounting on them and gives us a look into their plans for RSAC 2024.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://techcrunch.com/2024/04/30/uhg-change-healthcare-ransomware-compromised-credentials-mfa/">Change Healthcare hackers broke in using stolen credentials — and no MFA, says UHG CEO</a> (TechCrunch)</p><p><a href="https://www.infosecurity-magazine.com/news/fcc-fines-carriers-200m-selling/">FCC Fines Carriers $200m For Selling User Location Data</a> (Infosecurity Magazine)</p><p><a href="https://www.bleepingcomputer.com/news/security/muddling-meerkat-hackers-manipulate-dns-using-chinas-great-firewall/">Muddling Meerkat hackers manipulate DNS using China’s Great Firewall</a> (Bleeping Computer)</p><p><a href="https://www.infosecurity-magazine.com/news/ransom-payments-surge-500/">Ransom Payments Surge by 500% to an Average of $2m</a> (Infosecurity Magazine)</p><p><a href="https://industrialcyber.co/ai/us-doe-rolls-out-initial-assessment-report-on-ai-benefits-and-risks-for-critical-energy-infrastructure/">US DOE rolls out initial assessment report on AI benefits and risks for critical energy infrastructure</a> (Industrial Cyber) </p><p><a href="https://www.itpro.com/security/lightspy-malware-has-made-a-comeback-and-this-time-its-coming-after-your-macos-devices">LightSpy malware has made a comeback, and this time it's coming after your macOS devices</a> (ITPro)</p><p><a href="https://therecord.media/kansas-city-traffic-system-cyberattack">Kansas City system providing roadside weather, traffic info taken down by cyberattack</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/london-drugs-pharmacy-chain-closes-stores-after-cyberattack/">London Drugs pharmacy chain closes stores after cyberattack</a> (Bleeping Computer)</p><p><a href="https://gbhackers.com/empty-s3-bucket-bills-explode/">An Empty S3 Bucket Can Make Your AWS Bills Explode</a> (GB Hackers) - kicker</p><p><a href="https://medium.com/@maciej.pocwierz/how-an-empty-s3-bucket-can-make-your-aws-bill-explode-934a383cb8b1">How an empty S3 bucket can make your AWS bill explode </a>(Medium)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1476</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f7361fce-b95d-11ee-adc6-6bb94ee12136]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1761568169.mp3?updated=1714504716" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An unprecedented surge in credential stuffing.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2056/notes</link>
      <description>Okta warns of a credential stuffing spike. A congressman looks to the EPA to protect water systems from cyber threats. CISA unveils security guidelines for critical infrastructure. Researchers discover a stealthy botnet-as-a-service coming from China. The UK prohibits easy IoT passwords. New vulnerabilities are found in Intel processors. A global bank CEO shares insights on cybersecurity. Users report mandatory Apple ID resets. A preview of N2K CyberWire activity at RSA Conference. Police in Japan find a clever way to combat gift card fraud. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
It’s the week before the 2024 RSA Conference. Today, we have N2K’s own Rick Howard, Brandon Karpf, and Dave Bittner previewing N2K’s upcoming activities and where you can find our team at RSAC 2024.

Special Edition: Threat Vector
Understanding the Midnight Eclipse Activity and CVE 2024-3400: Host David Moulton and Andy Piazza, Sr. Director of Threat Intelligence at Unit 42, dive into the critical vulnerability CVE-2024-3400 found in PAN-OS software of Palo Alto Networks, emphasizing the importance of immediate patching and mitigation strategies for such vulnerabilities, especially when they affect edge devices like firewalls or VPNs. 

Selected Reading
Okta warns customers about credential stuffing onslaught (Help Net Security)
Crawford puts forward bill on cybersecurity risks to water systems (The Arkansas Democrat-Gazette) 
CISA unveils guidelines for AI and critical infrastructure (FedScoop)
Chinese Botnet As-A-Service Bypasses Cloudflare &amp; Other DDoS Protection Services (GB Hackers)
UK becomes first country to ban default bad passwords on IoT devices (The Record)
Researchers unveil novel attack methods targeting Intel's conditional branch predictor (Help Net Security)
Standard Chartered CEO on why cybersecurity has become a 'disproportionately huge topic' at board meetings (The Record)
Security Bite: Did Apple just declare war on Adload malware? (9to5Mac)
Apple users are being locked out of their Apple IDs with no explanation (9to5Mac)
Japanese police create fake support scam payment cards to warn victims (Bleeping Computer)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 29 Apr 2024 20:10:00 -0000</pubDate>
      <itunes:title>An unprecedented surge in credential stuffing.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2056</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Okta warns of a credential stuffing spike. A congressman looks to the EPA to protect water systems from cyber threats. CISA unveils security guidelines for critical infrastructure. Researchers discover a stealthy botnet-as-a-service coming from China. The UK prohibits easy IoT passwords. New vulnerabilities are found in Intel processors. A global bank CEO shares insights on cybersecurity. Users report mandatory Apple ID resets. A preview of N2K CyberWire activity at RSA Conference. Police in Japan find a clever way to combat gift card fraud. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
It’s the week before the 2024 RSA Conference. Today, we have N2K’s own Rick Howard, Brandon Karpf, and Dave Bittner previewing N2K’s upcoming activities and where you can find our team at RSAC 2024.

Special Edition: Threat Vector
Understanding the Midnight Eclipse Activity and CVE 2024-3400: Host David Moulton and Andy Piazza, Sr. Director of Threat Intelligence at Unit 42, dive into the critical vulnerability CVE-2024-3400 found in PAN-OS software of Palo Alto Networks, emphasizing the importance of immediate patching and mitigation strategies for such vulnerabilities, especially when they affect edge devices like firewalls or VPNs. 

Selected Reading
Okta warns customers about credential stuffing onslaught (Help Net Security)
Crawford puts forward bill on cybersecurity risks to water systems (The Arkansas Democrat-Gazette) 
CISA unveils guidelines for AI and critical infrastructure (FedScoop)
Chinese Botnet As-A-Service Bypasses Cloudflare &amp; Other DDoS Protection Services (GB Hackers)
UK becomes first country to ban default bad passwords on IoT devices (The Record)
Researchers unveil novel attack methods targeting Intel's conditional branch predictor (Help Net Security)
Standard Chartered CEO on why cybersecurity has become a 'disproportionately huge topic' at board meetings (The Record)
Security Bite: Did Apple just declare war on Adload malware? (9to5Mac)
Apple users are being locked out of their Apple IDs with no explanation (9to5Mac)
Japanese police create fake support scam payment cards to warn victims (Bleeping Computer)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Okta warns of a credential stuffing spike. A congressman looks to the EPA to protect water systems from cyber threats. CISA unveils security guidelines for critical infrastructure. Researchers discover a stealthy botnet-as-a-service coming from China. The UK prohibits easy IoT passwords. New vulnerabilities are found in Intel processors. A global bank CEO shares insights on cybersecurity. Users report mandatory Apple ID resets. A preview of N2K CyberWire activity at RSA Conference. Police in Japan find a clever way to combat gift card fraud. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>It’s the week before the 2024 RSA Conference. Today, we have <a href="https://www.n2k.com/">N2K</a>’s own <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a>, <a href="https://www.linkedin.com/in/brandon-karpf/">Brandon Karpf</a>, and <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> previewing N2K’s upcoming activities and where you can find our team at <a href="https://www.rsaconference.com/usa">RSAC 2024</a>.</p><p><br></p><h2>Special Edition: Threat Vector</h2><p><a href="https://thecyberwire.com/podcasts/threat-vector/21/notes">Understanding the Midnight Eclipse Activity and CVE 2024-3400</a>: Host David Moulton and Andy Piazza, Sr. Director of Threat Intelligence at Unit 42, dive into the critical vulnerability CVE-2024-3400 found in PAN-OS software of Palo Alto Networks, emphasizing the importance of immediate patching and mitigation strategies for such vulnerabilities, especially when they affect edge devices like firewalls or VPNs. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.helpnetsecurity.com/2024/04/29/okta-credential-stuffing/">Okta warns customers about credential stuffing onslaught</a> (Help Net Security)</p><p><a href="https://www.arkansasonline.com/news/2024/apr/29/crawford-puts-forward-bill-on-cybersecurity-risks/">Crawford puts forward bill on cybersecurity risks to water systems</a> (The Arkansas Democrat-Gazette) </p><p><a href="https://fedscoop.com/cisa-unveils-guidelines-for-ai-and-critical-infrastructure/">CISA unveils guidelines for AI and critical infrastructure</a> (FedScoop)</p><p><a href="https://gbhackers.com/chinese-botnet-bypasses-ddos-protection/">Chinese Botnet As-A-Service Bypasses Cloudflare &amp; Other DDoS Protection Services</a> (GB Hackers)</p><p><a href="https://therecord.media/united-kingdom-bans-defalt-passwords-iot-devices">UK becomes first country to ban default bad passwords on IoT devices</a> (The Record)</p><p><a href="https://www.helpnetsecurity.com/2024/04/29/intel-processors-novel-attacks/">Researchers unveil novel attack methods targeting Intel's conditional branch predictor</a> (Help Net Security)</p><p><a href="https://therecord.media/standard-chartered-ceo-bill-winters-cybersecurity-culture-board-focus">Standard Chartered CEO on why cybersecurity has become a 'disproportionately huge topic' at board meetings</a> (The Record)</p><p><a href="https://9to5mac.com/2024/04/28/security-bite-did-apple-just-declare-war-on-adload-malware/">Security Bite: Did Apple just declare war on Adload malware?</a> (9to5Mac)</p><p><a href="https://9to5mac.com/2024/04/26/signed-out-of-apple-id-account-problem-password/">Apple users are being locked out of their Apple IDs with no explanation</a> (9to5Mac)</p><p><a href="https://www.bleepingcomputer.com/news/security/japanese-police-create-fake-support-scam-payment-cards-to-warn-victims/">Japanese police create fake support scam payment cards to warn victims</a> (Bleeping Computer)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1542</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f6f8bf9e-b95d-11ee-adc6-53ec102b6c15]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5468494913.mp3?updated=1714417095" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Jack Rhysider: Get your experience points in everything. [Media] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/13/notes</link>
      <description>Host of Darknet Diaries podcast Jack Rhysider shares his experiences from studying computer engineering at university to his strategy of using gamification on his career that led to him landing in the security space. Jack talks about how his wide experiences came together in security and what prompted him to learn podcasting. Jack endeavors to share the whole story through his podcasts while making them entertaining, enlightening and inspirational. Our thanks to Jack for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 28 Apr 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Jack Rhysider: Get your experience points in everything. [Media] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>13</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Host of Darknet Diaries podcast Jack Rhysider shares his experiences from studying computer engineering at university to his strategy of using gamification on his career that led to him landing in the security space. Jack talks about how his wide experiences came together in security and what prompted him to learn podcasting. Jack endeavors to share the whole story through his podcasts while making them entertaining, enlightening and inspirational. Our thanks to Jack for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Host of Darknet Diaries podcast Jack Rhysider shares his experiences from studying computer engineering at university to his strategy of using gamification on his career that led to him landing in the security space. Jack talks about how his wide experiences came together in security and what prompted him to learn podcasting. Jack endeavors to share the whole story through his podcasts while making them entertaining, enlightening and inspirational. Our thanks to Jack for sharing his story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>474</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[246ff0f6-03ef-11ef-85e9-43a6249291bc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6502621622.mp3?updated=1714151218" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cerber ransomware strikes Linux. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/327/notes</link>
      <description>Christopher Doman, Co-Founder and CTO at Cado Security, is talking about their research on "Cerber Ransomware: Dissecting the three heads." This research delves into Cerber ransomware being deployed onto servers running the Confluence application via the CVE-2023-22518 exploit. 
The research states "Cerber emerged and was at the peak of its activity around 2016, and has since only occasional campaigns, most recently targeting the aforementioned Confluence vulnerability."
The research can be found here:
Cerber Ransomware: Dissecting the three heads

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Apr 2024 07:00:00 -0000</pubDate>
      <itunes:title>Cerber ransomware strikes Linux. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>327</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Christopher Doman, Co-Founder and CTO at Cado Security, is talking about their research on "Cerber Ransomware: Dissecting the three heads." This research delves into Cerber ransomware being deployed onto servers running the Confluence application via the CVE-2023-22518 exploit. 
The research states "Cerber emerged and was at the peak of its activity around 2016, and has since only occasional campaigns, most recently targeting the aforementioned Confluence vulnerability."
The research can be found here:
Cerber Ransomware: Dissecting the three heads

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Christopher Doman, Co-Founder and CTO at Cado Security, is talking about their research on "Cerber Ransomware: Dissecting the three heads." This research delves into Cerber ransomware being deployed onto servers running the Confluence application via the CVE-2023-22518 exploit. </p><p>The research states "Cerber emerged and was at the peak of its activity around 2016, and has since only occasional campaigns, most recently targeting the aforementioned Confluence vulnerability."</p><p>The research can be found here:</p><ul><li><a href="https://www.cadosecurity.com/blog/cerber-ransomware-dissecting-the-three-heads">Cerber Ransomware: Dissecting the three heads</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>694</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[67d0029c-03ee-11ef-b63b-97956b423881]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5235967790.mp3?updated=1714146071" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kaiser Permanente's privacy predicament.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2055/notes</link>
      <description>Healthcare providers report breaches affecting millions. PlugX malware is found in over 170 countries. Hackers exploit an old vulnerability to launch Cobalt Strike. A popular Wordpress plugin is under active exploitation. Developing nations may serve as a test bed for malware developers. German authorities question Microsoft over Russian hacks. CISA celebrates the success of their ransomware warning program. Our guest is Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA, discussing open source software. Password trends are a mixed bag.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA, discussing open source software.

Selected Reading
Kaiser Permanente data breach may have impacted 13.4 million patients (Security Affairs)
LA County Health Services: Patients' data exposed in phishing attack (Bleeping Computer)
China-linked PlugX malware infections found in more than 170 countries (The Record)
Hackers Exploit Old Microsoft Office 0-day to Deliver Cobalt Strike (GB Hackers)
Critical WordPress Automatic Plugin Vulnerability Exploited to Inject Backdoors (SecurityWeek)
Cybercriminals are using developing nations as test beds for ransomware attacks (TechSpot)
Microsoft Questioned by German Lawmakers About Russian Hack (GovInfo Security)
More than 800 vulnerabilities resolved through CISA ransomware notification pilot (The Record)
Most people still rely on memory or pen and paper for password management (Help Net Security)  

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 26 Apr 2024 20:10:00 -0000</pubDate>
      <itunes:title>Kaiser Permanente's privacy predicament.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2055</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Healthcare providers report breaches affecting millions. PlugX malware is found in over 170 countries. Hackers exploit an old vulnerability to launch Cobalt Strike. A popular Wordpress plugin is under active exploitation. Developing nations may serve as a test bed for malware developers. German authorities question Microsoft over Russian hacks. CISA celebrates the success of their ransomware warning program. Our guest is Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA, discussing open source software. Password trends are a mixed bag.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA, discussing open source software.

Selected Reading
Kaiser Permanente data breach may have impacted 13.4 million patients (Security Affairs)
LA County Health Services: Patients' data exposed in phishing attack (Bleeping Computer)
China-linked PlugX malware infections found in more than 170 countries (The Record)
Hackers Exploit Old Microsoft Office 0-day to Deliver Cobalt Strike (GB Hackers)
Critical WordPress Automatic Plugin Vulnerability Exploited to Inject Backdoors (SecurityWeek)
Cybercriminals are using developing nations as test beds for ransomware attacks (TechSpot)
Microsoft Questioned by German Lawmakers About Russian Hack (GovInfo Security)
More than 800 vulnerabilities resolved through CISA ransomware notification pilot (The Record)
Most people still rely on memory or pen and paper for password management (Help Net Security)  

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Healthcare providers report breaches affecting millions. PlugX malware is found in over 170 countries. Hackers exploit an old vulnerability to launch Cobalt Strike. A popular Wordpress plugin is under active exploitation. Developing nations may serve as a test bed for malware developers. German authorities question Microsoft over Russian hacks. CISA celebrates the success of their ransomware warning program. Our guest is Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA, discussing open source software. Password trends are a mixed bag.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/eric-goldstein-15658223/">Eric Goldstein</a>, Executive Assistant Director for Cybersecurity at <a href="https://www.cisa.gov/">CISA</a>, discussing open source software.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://securityaffairs.com/162347/data-breach/kaiser-permanente-data-breach.html">Kaiser Permanente data breach may have impacted 13.4 million patients</a> (Security Affairs)</p><p><a href="https://www.bleepingcomputer.com/news/security/la-county-health-services-thousands-of-patients-data-exposed-in-email-breach/">LA County Health Services: Patients' data exposed in phishing attack</a> (Bleeping Computer)</p><p><a href="https://therecord.media/plugx-malware-infections-more-than-170-countries">China-linked PlugX malware infections found in more than 170 countries</a> (The Record)</p><p><a href="https://gbhackers.com/hackers-exploit-old-microsoft-office/">Hackers Exploit Old Microsoft Office 0-day to Deliver Cobalt Strike</a> (GB Hackers)</p><p><a href="https://www.securityweek.com/critical-wordpress-automatic-plugin-vulnerability-exploited-to-inject-backdoors/">Critical WordPress Automatic Plugin Vulnerability Exploited to Inject Backdoors</a> (SecurityWeek)</p><p><a href="https://www.techspot.com/news/102751-cybercriminals-use-developing-nations-test-beds-ransomware-attacks.html">Cybercriminals are using developing nations as test beds for ransomware attacks </a>(TechSpot)</p><p><a href="https://www.govinfosecurity.com/microsoft-questioned-by-german-lawmakers-about-russian-hack-a-24946">Microsoft Questioned by German Lawmakers About Russian Hack</a> (GovInfo Security)</p><p><a href="https://therecord.media/vulnerabilities-resolved-through-cisa-pilot">More than 800 vulnerabilities resolved through CISA ransomware notification pilot</a> (The Record)</p><p><a href="https://www.helpnetsecurity.com/2024/04/26/current-user-password-practices/">Most people still rely on memory or pen and paper for password management</a> (Help Net Security)  </p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1371</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f6bd6250-b95d-11ee-adc6-839b09237d4b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8574466229.mp3?updated=1714157158" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber Talent Insights: Strengthening the cyber talent pipeline apparatus. (Part 3 of 3) [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/62/notes</link>
      <description>Join us for this special three-part series where the N2K Cyber Talent Insights team guides you through effective strategies to develop your cybersecurity team, helping you stay ahead in the constantly changing cybersecurity landscape. 
In this episode, we center our conversation around the Cyber Workforce Pipeline. We discuss where the next great wave of talent is going to come.
We talk more about these sources of new talent, such as K-12 programs, higher education, and trade school programs, transitioning military, and other initiatives and programs focused on cultivating the next generation of cyber professionals.

Explore Cyber Talent Insights
N2K’s Cyber Talent Insights provides security leaders measurable and actionable insights on your organization’s current cyber roles and capabilities to maximize your talent investments and build a business case for better hiring, developing, maintaining, and retaining your technical talent pools. Learn how at n2k.com/talent-insights.

Connect with the N2K Cyber Workforce team on Linkedin:


Dr. Sasha Vanterpool, Cyber Workforce Consultant 


Dr. Heather Monthie, Cybersecurity Workforce Consultant


Jeff Welgan, Chief Learning Officer


Resources for developing your cybersecurity teams:

N2K Cyber Workforce Strategy Guide

Workforce Media Resources

Strategic Cyber Workforce Intelligence resources for your organization

Cyber Talent Acquisition Woes for Enterprises


Workforce Intelligence: What it is and why you need it for cyber teams webinar


Setting Better Cyber Job Expectations to Attract &amp; Retain Talent webinar


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 26 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>Cyber Talent Insights: Strengthening the cyber talent pipeline apparatus. (Part 3 of 3) [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>62</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c60f8d54-0368-11ef-ad08-6380180852dd/image/489ed6c8f3f9dcaaccb26fe942c4b2f5.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Join us for this special three-part series where the N2K Cyber Talent Insights team guides you through effective strategies to develop your cybersecurity team, helping you stay ahead in the constantly changing cybersecurity landscape. 
In this episode, we center our conversation around the Cyber Workforce Pipeline. We discuss where the next great wave of talent is going to come.
We talk more about these sources of new talent, such as K-12 programs, higher education, and trade school programs, transitioning military, and other initiatives and programs focused on cultivating the next generation of cyber professionals.

Explore Cyber Talent Insights
N2K’s Cyber Talent Insights provides security leaders measurable and actionable insights on your organization’s current cyber roles and capabilities to maximize your talent investments and build a business case for better hiring, developing, maintaining, and retaining your technical talent pools. Learn how at n2k.com/talent-insights.

Connect with the N2K Cyber Workforce team on Linkedin:


Dr. Sasha Vanterpool, Cyber Workforce Consultant 


Dr. Heather Monthie, Cybersecurity Workforce Consultant


Jeff Welgan, Chief Learning Officer


Resources for developing your cybersecurity teams:

N2K Cyber Workforce Strategy Guide

Workforce Media Resources

Strategic Cyber Workforce Intelligence resources for your organization

Cyber Talent Acquisition Woes for Enterprises


Workforce Intelligence: What it is and why you need it for cyber teams webinar


Setting Better Cyber Job Expectations to Attract &amp; Retain Talent webinar


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<h3>
<em>Join us for this special three-part series where the N2K Cyber Talent Insights team guides you through effective strategies to develop your cybersecurity team, helping you stay ahead in the constantly changing cybersecurity landscape.</em> </h3><p>In this episode, we center our conversation around the Cyber Workforce Pipeline. We discuss where the next great wave of talent is going to come.</p><p>We talk more about these sources of new talent, such as K-12 programs, higher education, and trade school programs, transitioning military, and other initiatives and programs focused on cultivating the next generation of cyber professionals.</p><p><br></p><h3>Explore Cyber Talent Insights</h3><p>N2K’s Cyber Talent Insights provides security leaders measurable and actionable insights on your organization’s current cyber roles and capabilities to maximize your talent investments and build a business case for better hiring, developing, maintaining, and retaining your technical talent pools. Learn how at <a href="http://n2k.com/talent-insights">n2k.com/talent-insights.</a></p><p><br></p><h3>Connect with the N2K Cyber Workforce team on Linkedin:</h3><ul>
<li>
<a href="https://www.linkedin.com/in/sashavanterpool/">Dr. Sasha Vanterpool</a>, Cyber Workforce Consultant </li>
<li>
<a href="https://www.linkedin.com/in/heathermonthie/">Dr. Heather Monthie</a>, Cybersecurity Workforce Consultant</li>
<li>
<a href="https://www.linkedin.com/in/jeff-welgan/">Jeff Welgan</a>, Chief Learning Officer</li>
</ul><p><br></p><h3>Resources for developing your cybersecurity teams:</h3><ul>
<li><a href="https://www.n2k.com/strategy-guide%20">N2K Cyber Workforce Strategy Guide</a></li>
<li><a href="https://www.n2k.com/workforce-media-episodes%20">Workforce Media Resources</a></li>
<li><a href="https://www.n2k.com/resources/tag/workforce-intelligence">Strategic Cyber Workforce Intelligence resources for your organization</a></li>
<li><a href="https://www.n2k.com/resources/cyber-talent-acquisition-woes-for-enterprises">Cyber Talent Acquisition Woes for Enterprises</a></li>
<li>
<a href="https://www.brighttalk.com/webcast/18820/586708%20">Workforce Intelligence: What it is and why you need it for cyber teams</a> webinar</li>
<li>
<a href="https://www.brighttalk.com/webcast/18820/592220?utm_source=brighttalk-portal&amp;utm_medium=web&amp;utm_campaign=channel-page&amp;utm_content=recorded">Setting Better Cyber Job Expectations to Attract &amp; Retain Talent</a> webinar</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3120</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c60f8d54-0368-11ef-ad08-6380180852dd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9443910174.mp3?updated=1714132447" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The shadowy adversary in Cisco's crosshairs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2054/notes</link>
      <description>Cisco releases urgent patches for their Adaptive Security Appliances. Android powered smart TVs could expose Gmail inboxes. The FTC refunds millions to Amazon Ring customers. The DOJ charges crypto-mixers with money laundering. A critical vulnerability has been disclosed in the Flowmon network monitoring tool. A Swiss blood donation company reopens following a ransomware attack. Multiple vulnerabilities are discovered in the Brocade SANnav storage area network management application. Brokewell is a new Android banking trojan. Meta’s ad business continues to face scrutiny in the EU.  Ann Johnson, host of Microsoft Security’s Afternoon Cyber Tea podcast speaks with LinkedIn's CISO Geoff Belknap. And an AI Deepfake Sparks a Community Crisis.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
We are joined by Ann Johnson, host of Microsoft Security’s Afternoon Cyber Tea podcast talking with Geoff Belknap sharing "Insights from LinkedIn's CISO." You can listen to their full discussion here. 

Selected Reading
'ArcaneDoor' Cyberspies Hacked Cisco Firewalls to Access Government Networks (WIRED)
Cisco Releases Security Updates Addressing ArcaneDoor Campaign, Exploited Vulnerabilities in ASA and FTD (NHS England Digital)
Android TVs Can Expose User Email Inboxes (404 Media)
FTC Sending $5.6 Million in Refunds to Ring Customers Over Security Failures (SecurityWeek)
Southern District of New York | Founders And CEO Of Cryptocurrency Mixing Service Arrested And Charged With Money Laundering And Unlicensed Money Transmitting Offenses (United States Department of Justice)
Maximum severity Flowmon bug has a public exploit, patch now (Bleeping Computer)
Plasma donation company Octapharma slowly reopening as BlackSuit gang claims attack (The Record)
New Brokewell malware takes over Android devices, steals data (Bleeping Computer)
Vulnerabilities Expose Brocade SAN Appliances, Switches to Hacking (SecurityWeek)
Meta could face further squeeze on surveillance ads model in EU (TechCrunch)
Baltimore County educator framed principal with AI-generated voice, police say (Baltimore Banner)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 25 Apr 2024 20:10:00 -0000</pubDate>
      <itunes:title>The shadowy adversary in Cisco's crosshairs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2054</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Cisco releases urgent patches for their Adaptive Security Appliances. Android powered smart TVs could expose Gmail inboxes. The FTC refunds millions to Amazon Ring customers. The DOJ charges crypto-mixers with money laundering. A critical vulnerability has been disclosed in the Flowmon network monitoring tool. A Swiss blood donation company reopens following a ransomware attack. Multiple vulnerabilities are discovered in the Brocade SANnav storage area network management application. Brokewell is a new Android banking trojan. Meta’s ad business continues to face scrutiny in the EU.  Ann Johnson, host of Microsoft Security’s Afternoon Cyber Tea podcast speaks with LinkedIn's CISO Geoff Belknap. And an AI Deepfake Sparks a Community Crisis.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
We are joined by Ann Johnson, host of Microsoft Security’s Afternoon Cyber Tea podcast talking with Geoff Belknap sharing "Insights from LinkedIn's CISO." You can listen to their full discussion here. 

Selected Reading
'ArcaneDoor' Cyberspies Hacked Cisco Firewalls to Access Government Networks (WIRED)
Cisco Releases Security Updates Addressing ArcaneDoor Campaign, Exploited Vulnerabilities in ASA and FTD (NHS England Digital)
Android TVs Can Expose User Email Inboxes (404 Media)
FTC Sending $5.6 Million in Refunds to Ring Customers Over Security Failures (SecurityWeek)
Southern District of New York | Founders And CEO Of Cryptocurrency Mixing Service Arrested And Charged With Money Laundering And Unlicensed Money Transmitting Offenses (United States Department of Justice)
Maximum severity Flowmon bug has a public exploit, patch now (Bleeping Computer)
Plasma donation company Octapharma slowly reopening as BlackSuit gang claims attack (The Record)
New Brokewell malware takes over Android devices, steals data (Bleeping Computer)
Vulnerabilities Expose Brocade SAN Appliances, Switches to Hacking (SecurityWeek)
Meta could face further squeeze on surveillance ads model in EU (TechCrunch)
Baltimore County educator framed principal with AI-generated voice, police say (Baltimore Banner)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cisco releases urgent patches for their Adaptive Security Appliances. Android powered smart TVs could expose Gmail inboxes. The FTC refunds millions to Amazon Ring customers. The DOJ charges crypto-mixers with money laundering. A critical vulnerability has been disclosed in the Flowmon network monitoring tool. A Swiss blood donation company reopens following a ransomware attack. Multiple vulnerabilities are discovered in the Brocade SANnav storage area network management application. Brokewell is a new Android banking trojan. Meta’s ad business continues to face scrutiny in the EU.  Ann Johnson, host of Microsoft Security’s Afternoon Cyber Tea podcast speaks with LinkedIn's CISO Geoff Belknap. And an AI Deepfake Sparks a Community Crisis.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>We are joined by <a href="https://www.linkedin.com/in/ann-johnsons/">Ann Johnson</a>, host of <a href="https://www.microsoft.com/en-us/security">Microsoft Security</a>’s <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea</a> podcast talking with <a href="https://www.linkedin.com/in/geoffbelknap/">Geoff Belknap</a> sharing "Insights from <a href="https://www.linkedin.com/">LinkedIn</a>'s CISO." You can listen to their full discussion <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea/95/notes">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.wired.com/story/arcanedoor-cyberspies-hacked-cisco-firewalls-to-access-government-networks/">'ArcaneDoor' Cyberspies Hacked Cisco Firewalls to Access Government Networks</a> (WIRED)</p><p><a href="https://digital.nhs.uk/cyber-alerts/2024/cc-4483">Cisco Releases Security Updates Addressing ArcaneDoor Campaign, Exploited Vulnerabilities in ASA and FTD</a><a href="https://digital.nhs.uk/cyber-alerts/2024/cc-4483"> (NHS England Digital)</a></p><p><a href="https://www.404media.co/android-tvs-can-expose-user-email-inboxes/">Android TVs Can Expose User Email Inboxes</a> (404 Media)</p><p><a href="https://www.securityweek.com/ftc-sending-5-6-million-in-refunds-to-ring-customers-over-security-failures/">FTC Sending $5.6 Million in Refunds to Ring Customers Over Security Failures</a> (SecurityWeek)</p><p><a href="https://www.justice.gov/usao-sdny/pr/founders-and-ceo-cryptocurrency-mixing-service-arrested-and-charged-money-laundering">Southern District of New York | Founders And CEO Of Cryptocurrency Mixing Service Arrested And Charged With Money Laundering And Unlicensed Money Transmitting Offenses</a> (United States Department of Justice)</p><p><a href="https://www.bleepingcomputer.com/news/security/maximum-severity-flowmon-bug-has-a-public-exploit-patch-now/">Maximum severity Flowmon bug has a public exploit, patch now</a> (Bleeping Computer)</p><p><a href="https://therecord.media/plasma-donation-company-cyberattack-blacksuit">Plasma donation company Octapharma slowly reopening as BlackSuit gang claims attack</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-brokewell-malware-takes-over-android-devices-steals-data/">New Brokewell malware takes over Android devices, steals data</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/vulnerabilities-expose-brocade-san-appliances-switches-to-hacking/">Vulnerabilities Expose Brocade SAN Appliances, Switches to Hacking</a> (SecurityWeek)</p><p><a href="https://techcrunch.com/2024/04/25/meta-ads-data-retention-ag-opinion/">Meta could face further squeeze on surveillance ads model in EU</a> (TechCrunch)</p><p><a href="https://www.thebaltimorebanner.com/education/k-12-schools/eric-eiswert-ai-audio-baltimore-county-YBJNJAS6OZEE5OQVF5LFOFYN6M/">Baltimore County educator framed principal with AI-generated voice, police say</a> (Baltimore Banner)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1411</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f6820fc0-b95d-11ee-adc6-976e5159eea9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9475100262.mp3?updated=1714071351" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Iran's covert cyber operations exposed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2053/notes</link>
      <description>The DOJ indicts four Iranian nationals on hacking charges. Legislation to ban or force the sale of TikTok heads to the President’s desk. A Russian hack group claims a cyberattack on an Indiana water treatment plant. A roundup of dark web data leaks. Mandiant monitors dropping dwell times. Bcrypt bogs down brute-forcing. North Korean hackers target defense secrets. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey. On our Industry Voices segment, Tony Velleca, CEO of CyberProof, joins us to explore some of the pain points that CISOs &amp; CIOs are experiencing today, and how they can improve their cyber readiness. Ransomware may leave the shelves in Sweden’s liquor stores bare. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guests
Learning Layer
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe discuss content and study strategies for CISSP Domain 3 Security Architecture and Engineering, and discuss encryption and non-repudiation. Specifically they cover sub-domain 3.6, "Select and determine cryptographic solutions," which includes:

Cryptographic life cycle

Cryptographic method

Public key infrastructure (PKI).


Industry Voices
On our Industry Voices segment, Tony Velleca, CEO of CyberProof, joins us to explore some of the pain points that CISOs &amp; CIOs are experiencing today, and how they can improve their cyber readiness. 

Selected Reading
Rewards Up to $10 Million for Information on Iranian Hackers (GB Hackers)
Congress passes bill that could ban TikTok after years of false starts (Washington Post)
Russian hackers claim cyberattack on Indiana water plant (The Record)
Major Data Leaks from Honda Vietnam, US Airports, and Chinese Huawei/iPhone Users (SOCRadar® Cyber Intelligence Inc.)
Global attacker median dwell time continues to fall (Help Net Security)
New Password Cracking Analysis Targets Bcrypt (SecurityWeek)
North Korean Hackers Target Dozens of Defense Companies (Infosecurity Magazine)
​​Hackers hijack antivirus updates to drop GuptiMiner malware (Bleeping Computer)
Sweden's liquor shelves to run empty this week due to ransomware attack (The Record)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 24 Apr 2024 20:10:00 -0000</pubDate>
      <itunes:title>Iran's covert cyber operations exposed.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2053</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The DOJ indicts four Iranian nationals on hacking charges. Legislation to ban or force the sale of TikTok heads to the President’s desk. A Russian hack group claims a cyberattack on an Indiana water treatment plant. A roundup of dark web data leaks. Mandiant monitors dropping dwell times. Bcrypt bogs down brute-forcing. North Korean hackers target defense secrets. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey. On our Industry Voices segment, Tony Velleca, CEO of CyberProof, joins us to explore some of the pain points that CISOs &amp; CIOs are experiencing today, and how they can improve their cyber readiness. Ransomware may leave the shelves in Sweden’s liquor stores bare. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guests
Learning Layer
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe discuss content and study strategies for CISSP Domain 3 Security Architecture and Engineering, and discuss encryption and non-repudiation. Specifically they cover sub-domain 3.6, "Select and determine cryptographic solutions," which includes:

Cryptographic life cycle

Cryptographic method

Public key infrastructure (PKI).


Industry Voices
On our Industry Voices segment, Tony Velleca, CEO of CyberProof, joins us to explore some of the pain points that CISOs &amp; CIOs are experiencing today, and how they can improve their cyber readiness. 

Selected Reading
Rewards Up to $10 Million for Information on Iranian Hackers (GB Hackers)
Congress passes bill that could ban TikTok after years of false starts (Washington Post)
Russian hackers claim cyberattack on Indiana water plant (The Record)
Major Data Leaks from Honda Vietnam, US Airports, and Chinese Huawei/iPhone Users (SOCRadar® Cyber Intelligence Inc.)
Global attacker median dwell time continues to fall (Help Net Security)
New Password Cracking Analysis Targets Bcrypt (SecurityWeek)
North Korean Hackers Target Dozens of Defense Companies (Infosecurity Magazine)
​​Hackers hijack antivirus updates to drop GuptiMiner malware (Bleeping Computer)
Sweden's liquor shelves to run empty this week due to ransomware attack (The Record)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The DOJ indicts four Iranian nationals on hacking charges. Legislation to ban or force the sale of TikTok heads to the President’s desk. A Russian hack group claims a cyberattack on an Indiana water treatment plant. A roundup of dark web data leaks. Mandiant monitors dropping dwell times. Bcrypt bogs down brute-forcing. North Korean hackers target defense secrets. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey. On our Industry Voices segment, Tony Velleca, CEO of CyberProof, joins us to explore some of the pain points that CISOs &amp; CIOs are experiencing today, and how they can improve their cyber readiness. Ransomware may leave the shelves in Sweden’s liquor stores bare. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guests</h2><h3>Learning Layer</h3><p>On our Learning Layer segment, host <a href="https://www.linkedin.com/in/sam-meisenberg/">Sam Meisenberg</a> and <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a> continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive <a href="https://certify.cybervista.net/products/isc2/cissp-training-course/?utm_source=CWDP&amp;utm_medium=LL&amp;utm_campaign=HH_CISSP">CISSP training course</a>, <a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-pro/">CISSP practice test</a>, and <a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-professional-cissp-practice-labs/">CISSP practice labs</a>. Sam and Joe discuss content and study strategies for CISSP Domain 3 Security Architecture and Engineering, and discuss encryption and non-repudiation. Specifically they cover sub-domain 3.6, "Select and determine cryptographic solutions," which includes:</p><ul>
<li>Cryptographic life cycle</li>
<li>Cryptographic method</li>
<li>Public key infrastructure (PKI).</li>
</ul><h2><br></h2><h2>Industry Voices</h2><p>On our Industry Voices segment, <a href="https://www.linkedin.com/in/tony-velleca-90224b/">Tony Velleca</a>, CEO of <a href="https://go.cyberproof.com/">CyberProof</a>, joins us to explore some of the pain points that CISOs &amp; CIOs are experiencing today, and how they can improve their cyber readiness. </p><h2><br></h2><h2>Selected Reading</h2><p><a href="https://gbhackers.com/rewards-up-to-10-million-for-information-on-iranian-hackers/">Rewards Up to $10 Million for Information on Iranian Hackers</a> (GB Hackers)</p><p><a href="https://www.washingtonpost.com/technology/2024/04/23/tiktok-ban-senate-vote-sale-biden/">Congress passes bill that could ban TikTok after years of false starts</a> (Washington Post)</p><p><a href="https://therecord.media/russia-hackers-cyberattack-tipton-indiana">Russian hackers claim cyberattack on Indiana water plant</a> (The Record)</p><p><a href="https://socradar.io/major-data-leaks-from-honda-vietnam-us-airports-and-chinese-huawei-iphone-users/">Major Data Leaks from Honda Vietnam, US Airports, and Chinese Huawei/iPhone Users</a> (SOCRadar® Cyber Intelligence Inc.)</p><p><a href="https://www.helpnetsecurity.com/2024/04/24/2023-attacker-dwell-time/">Global attacker median dwell time continues to fall</a> (Help Net Security)</p><p><a href="https://www.securityweek.com/new-password-cracking-analysis-targets-bcrypt/">New Password Cracking Analysis Targets Bcrypt</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/north-korean-hackers-dozens/">North Korean Hackers Target Dozens of Defense Companies</a> (Infosecurity Magazine)</p><p>​​<a href="https://www.bleepingcomputer.com/news/security/hackers-hijack-antivirus-updates-to-drop-guptiminer-malware/">Hackers hijack antivirus updates to drop GuptiMiner malware</a> (Bleeping Computer)</p><p><a href="https://therecord.media/sweden-ransomware-liquor-shortage-skanlog-systembolaget">Sweden's liquor shelves to run empty this week due to ransomware attack</a> (The Record)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2178</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f6468950-b95d-11ee-adc6-ff4dd014ff23]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9829518437.mp3?updated=1713986892" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Visa crackdown against spyware swindlers.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2052/notes</link>
      <description>The State Department puts visa restrictions on spyware developers. UnitedHealth says its recent breach could affect tens of millions of Americans. LockBit leaks data allegedly stolen from the DC government. Microsoft says APT28 has hatched a GooseEgg. The White House and HHS update HIPAA rules to protect private medical data. Keyboard apps prove vulnerable. A New Hampshire hospital suffers a data breach. Microsoft’s DRM may be vulnerable to compromise. On our Industry Voices segment, Ian Leatherman, Security Strategist at Microsoft, discusses raising the bar for security in the software supply chain. GoogleTeller just can’t keep quiet. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, Ian Leatherman, Security Strategist at Microsoft, discusses raising the bar for security in the software supply chain.

Selected Reading
U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity (Security Affairs)
UnitedHealth Group Previews Massive Change Healthcare Breach (GovInfo Security)
Ransomware Gang Leaks Data Allegedly Stolen From Government Contractor (SecurityWeek)
Russian APT28 Group in New “GooseEgg” Hacking Campaign (Infosecurity Magazine)
HHS strengthens privacy protections for reproductive health patients and providers (The Record)
The not-so-silent type: Vulnerabilities across keyboard apps reveal keystrokes to network eavesdroppers (The Citizen Lab)
Records of almost 2,800 CMC patients vulnerable in 'data security incident': hospital | Crime (Union Leader) 
Microsoft DRM Hack Could Allow Movie Downloads From Popular Streaming Services (SecurityWeek)
The creepy sound of online trackers (Axbom) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Apr 2024 20:10:00 -0000</pubDate>
      <itunes:title>Visa crackdown against spyware swindlers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2052</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The State Department puts visa restrictions on spyware developers. UnitedHealth says its recent breach could affect tens of millions of Americans. LockBit leaks data allegedly stolen from the DC government. Microsoft says APT28 has hatched a GooseEgg. The White House and HHS update HIPAA rules to protect private medical data. Keyboard apps prove vulnerable. A New Hampshire hospital suffers a data breach. Microsoft’s DRM may be vulnerable to compromise. On our Industry Voices segment, Ian Leatherman, Security Strategist at Microsoft, discusses raising the bar for security in the software supply chain. GoogleTeller just can’t keep quiet. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, Ian Leatherman, Security Strategist at Microsoft, discusses raising the bar for security in the software supply chain.

Selected Reading
U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity (Security Affairs)
UnitedHealth Group Previews Massive Change Healthcare Breach (GovInfo Security)
Ransomware Gang Leaks Data Allegedly Stolen From Government Contractor (SecurityWeek)
Russian APT28 Group in New “GooseEgg” Hacking Campaign (Infosecurity Magazine)
HHS strengthens privacy protections for reproductive health patients and providers (The Record)
The not-so-silent type: Vulnerabilities across keyboard apps reveal keystrokes to network eavesdroppers (The Citizen Lab)
Records of almost 2,800 CMC patients vulnerable in 'data security incident': hospital | Crime (Union Leader) 
Microsoft DRM Hack Could Allow Movie Downloads From Popular Streaming Services (SecurityWeek)
The creepy sound of online trackers (Axbom) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The State Department puts visa restrictions on spyware developers. UnitedHealth says its recent breach could affect tens of millions of Americans. LockBit leaks data allegedly stolen from the DC government. Microsoft says APT28 has hatched a GooseEgg. The White House and HHS update HIPAA rules to protect private medical data. Keyboard apps prove vulnerable. A New Hampshire hospital suffers a data breach. Microsoft’s DRM may be vulnerable to compromise. On our Industry Voices segment, Ian Leatherman, Security Strategist at Microsoft, discusses raising the bar for security in the software supply chain. GoogleTeller just can’t keep quiet. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Voices segment, <a href="https://www.linkedin.com/in/ian-leatherman/">Ian Leatherman</a>, Security Strategist at <a href="https://www.microsoft.com/en-us/">Microsoft</a>, discusses raising the bar for security in the software supply chain.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://securityaffairs.com/162187/laws-and-regulations/visa-restrictions-commercial-spyware.html">U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity</a> (Security Affairs)</p><p><a href="https://www.govinfosecurity.com/unitedhealth-group-previews-massive-change-healthcare-breach-a-24924">UnitedHealth Group Previews Massive Change Healthcare Breach</a> (GovInfo Security)</p><p><a href="https://www.securityweek.com/ransomware-gang-leaks-data-allegedly-stolen-from-government-contractor/">Ransomware Gang Leaks Data Allegedly Stolen From Government Contractor</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/russian-apt28-gooseegg-hacking/">Russian APT28 Group in New “GooseEgg” Hacking Campaign</a> (Infosecurity Magazine)</p><p><a href="https://therecord.media/hhs-privacy-protections-reproductive-healthcare">HHS strengthens privacy protections for reproductive health patients and providers</a> (The Record)</p><p><a href="https://citizenlab.ca/2024/04/vulnerabilities-across-keyboard-apps-reveal-keystrokes-to-network-eavesdroppers/">The not-so-silent type: Vulnerabilities across keyboard apps reveal keystrokes to network eavesdroppers </a>(The Citizen Lab)</p><p><a href="https://www.unionleader.com/news/crime/records-of-almost-2-800-cmc-patients-vulnerable-in-data-security-incident-hospital/article_e801c22e-00d9-11ef-b886-33b55235cd9d.html">Records of almost 2,800 CMC patients vulnerable in 'data security incident': hospital | Crime </a><a href="https://www.unionleader.com/news/crime/records-of-almost-2-800-cmc-patients-vulnerable-in-data-security-incident-hospital/article_e801c22e-00d9-11ef-b886-33b55235cd9d.html">(Union Leader) </a></p><p><a href="https://www.securityweek.com/microsoft-drm-hacking-could-allow-movie-downloads-from-popular-streaming-services/">Microsoft DRM Hack Could Allow Movie Downloads From Popular Streaming Services</a> (SecurityWeek)</p><p><a href="https://axbom.com/the-creepy-sound-of-online-trackers/">The creepy sound of online trackers</a> (Axbom) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1792</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f60af124-b95d-11ee-adc6-b38f67e57ed0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2550847490.mp3?updated=1713900422" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Renewed surveillance sparks controversy.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2051/notes</link>
      <description>Section 702 gets another two years.  MITRE suffers a breach through an Ivanti VPN. CrushFTP urges customers to patch an actively exploited flaw. SafeBreach researchers disclose vulnerabilities in Windows Defender that allow remote file deletion. Ukrainian soldiers see increased attention from data-stealing apps. GitHub’s comments are being exploited to distribute malware. VW confirms legacy Chinese espionage and data breaches. CISA crowns winners of the President’s Cup Cybersecurity Competition. Cecilia Marinier, Director, Innovation and Programs at RSA Conference, and Niloo Razi Howe, Senior Operating Partner at Energy Impact Partners &amp; judge, review the top Innovation Sandbox contest finalists in anticipation of RSAC 2024. Targeting kids online puts perpetrators in the malware crosshairs. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
We have two guests today. Cecilia Marinier, Director, Innovation and Programs at RSA Conference, and Niloo Razi Howe, Senior Operating Partner at Energy Impact Partners &amp; judge, review the top Innovation Sandbox contest finalists and what to look for on the innovation front at RSAC 2024. For 18 years, cybersecurity's boldest new innovators have competed in the RSAC Innovation Sandbox contest to put the spotlight on their potentially game-changing ideas. This year, 10 finalists will once again have three minutes to make their pitch to a panel of judges. Since the start of the contest, the Top 10 Finalists have collectively seen over 80 acquisitions and $13.5 billion in investments. Innovation Sandbox will take place on Monday, May 6th at 10:50am PT.

Selected Reading
Warrantless spying powers extended to 2026 with Biden’s signature (The Record)
MITRE breached by nation-state threat actor via Ivanti zero-days (Help Net Security)
CrushFTP File Transfer Vulnerability Lets Attackers Download System Files (Infosecurity Magazine)
Researchers Claim that Windows Defender Can Be Bypassed (GB Hackers)
Ukrainian soldiers’ apps increasingly targeted for spying, cyber agency warns  (The Record)
GitHub comments abused to push malware via Microsoft repo URLs (Bleeping Computer)
Presumably Chinese industrial spies stole VW data on e-drive technology (Bleeping Computer)
CISA declares winners of President’s Cup cybersecurity competition, with Artificially Intelligent team leading (Industrial Cyber)
Malware dev lures child exploiters into honeytrap to extort them (Bleeping Computer)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 22 Apr 2024 20:10:00 -0000</pubDate>
      <itunes:title>Renewed surveillance sparks controversy.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2051</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Section 702 gets another two years.  MITRE suffers a breach through an Ivanti VPN. CrushFTP urges customers to patch an actively exploited flaw. SafeBreach researchers disclose vulnerabilities in Windows Defender that allow remote file deletion. Ukrainian soldiers see increased attention from data-stealing apps. GitHub’s comments are being exploited to distribute malware. VW confirms legacy Chinese espionage and data breaches. CISA crowns winners of the President’s Cup Cybersecurity Competition. Cecilia Marinier, Director, Innovation and Programs at RSA Conference, and Niloo Razi Howe, Senior Operating Partner at Energy Impact Partners &amp; judge, review the top Innovation Sandbox contest finalists in anticipation of RSAC 2024. Targeting kids online puts perpetrators in the malware crosshairs. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
We have two guests today. Cecilia Marinier, Director, Innovation and Programs at RSA Conference, and Niloo Razi Howe, Senior Operating Partner at Energy Impact Partners &amp; judge, review the top Innovation Sandbox contest finalists and what to look for on the innovation front at RSAC 2024. For 18 years, cybersecurity's boldest new innovators have competed in the RSAC Innovation Sandbox contest to put the spotlight on their potentially game-changing ideas. This year, 10 finalists will once again have three minutes to make their pitch to a panel of judges. Since the start of the contest, the Top 10 Finalists have collectively seen over 80 acquisitions and $13.5 billion in investments. Innovation Sandbox will take place on Monday, May 6th at 10:50am PT.

Selected Reading
Warrantless spying powers extended to 2026 with Biden’s signature (The Record)
MITRE breached by nation-state threat actor via Ivanti zero-days (Help Net Security)
CrushFTP File Transfer Vulnerability Lets Attackers Download System Files (Infosecurity Magazine)
Researchers Claim that Windows Defender Can Be Bypassed (GB Hackers)
Ukrainian soldiers’ apps increasingly targeted for spying, cyber agency warns  (The Record)
GitHub comments abused to push malware via Microsoft repo URLs (Bleeping Computer)
Presumably Chinese industrial spies stole VW data on e-drive technology (Bleeping Computer)
CISA declares winners of President’s Cup cybersecurity competition, with Artificially Intelligent team leading (Industrial Cyber)
Malware dev lures child exploiters into honeytrap to extort them (Bleeping Computer)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Section 702 gets another two years.  MITRE suffers a breach through an Ivanti VPN. CrushFTP urges customers to patch an actively exploited flaw. SafeBreach researchers disclose vulnerabilities in Windows Defender that allow remote file deletion. Ukrainian soldiers see increased attention from data-stealing apps. GitHub’s comments are being exploited to distribute malware. VW confirms legacy Chinese espionage and data breaches. CISA crowns winners of the President’s Cup Cybersecurity Competition. Cecilia Marinier, Director, Innovation and Programs at RSA Conference, and Niloo Razi Howe, Senior Operating Partner at Energy Impact Partners &amp; judge, review the top Innovation Sandbox contest finalists in anticipation of RSAC 2024. Targeting kids online puts perpetrators in the malware crosshairs. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>We have two guests today. <a href="https://www.linkedin.com/in/cecilia-murtagh-marinier-14967/">Cecilia Marinier</a>, Director, Innovation and Programs at <a href="https://www.rsaconference.com/">RSA Conference</a>, and <a href="https://www.linkedin.com/in/niloofarhowe/">Niloo Razi Howe</a>, Senior Operating Partner at <a href="https://www.energyimpactpartners.com/">Energy Impact Partners</a> &amp; judge, review the top <a href="https://www.rsaconference.com/usa/programs/innovation-sandbox">Innovation Sandbox</a> contest finalists and what to look for on the innovation front at RSAC 2024. For 18 years, cybersecurity's boldest new innovators have competed in the RSAC Innovation Sandbox contest to put the spotlight on their potentially game-changing ideas. This year, 10 finalists will once again have three minutes to make their pitch to a panel of judges. Since the start of the contest, the Top 10 Finalists have collectively seen over 80 acquisitions and $13.5 billion in investments. Innovation Sandbox will take place on Monday, May 6th at 10:50am PT.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/fisa-section-702-bill-biden-signature">Warrantless spying powers extended to 2026 with Biden’s signature</a> (The Record)</p><p><a href="https://www.helpnetsecurity.com/2024/04/22/mitre-breached/">MITRE breached by nation-state threat actor via Ivanti zero-days</a> (Help Net Security)</p><p><a href="https://www.infosecurity-magazine.com/news/crushftp-file-transfer/">CrushFTP File Transfer Vulnerability Lets Attackers Download System Fi</a>les (Infosecurity Magazine)</p><p><a href="https://gbhackers.com/research-windows-defender-bypassed/">Researchers Claim that Windows Defender Can Be Bypassed</a> (GB Hackers)</p><p><a href="https://therecord.media/ukraine-military-personnel-cyber-espionage-uac-0184">Ukrainian soldiers’ apps increasingly targeted for spying, cyber agency warns</a>  (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/github-comments-abused-to-push-malware-via-microsoft-repo-urls/">GitHub comments abused to push malware via Microsoft repo URLs</a> (Bleeping Computer)</p><p><a href="https://www.heise.de/en/news/Presumably-Chinese-industrial-spies-stole-VW-data-on-e-drive-technology-9692416.html">Presumably Chinese industrial spies stole VW data on e-drive technology</a> (Bleeping Computer)</p><p><a href="https://industrialcyber.co/cisa/cisa-declares-winners-of-presidents-cup-cybersecurity-competition-with-artificially-intelligent-team-leading/">CISA declares winners of President’s Cup cybersecurity competition, with Artificially Intelligent team leading</a> (Industrial Cyber)</p><p><a href="https://www.bleepingcomputer.com/news/security/malware-dev-lures-child-exploiters-into-honeytrap-to-extort-them/">Malware dev lures child exploiters into honeytrap to extort them</a> (Bleeping Computer)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1777</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[94e4bfb4-b95e-11ee-8cf8-1760e90905f3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3260726056.mp3?updated=1713811703" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Kiersten Todt: problem solving and building solutions. [Policy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/12/notes</link>
      <description>Managing director of the Cyber Readiness Institute Kiersten Todt shares how she came to be in the cybersecurity industry helping to provide free tools and resources for small businesses through a nonprofit. She describes how her work on the Hill prior to and just after 9/11 changed. Kiersten talks about the diversity of skills that benefit work in cybersecurity and offers her advice on going after what you want to do. Our thanks to Kiersten for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 21 Apr 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Kiersten Todt: problem solving and building solutions. [Policy] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>12</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Managing director of the Cyber Readiness Institute Kiersten Todt shares how she came to be in the cybersecurity industry helping to provide free tools and resources for small businesses through a nonprofit. She describes how her work on the Hill prior to and just after 9/11 changed. Kiersten talks about the diversity of skills that benefit work in cybersecurity and offers her advice on going after what you want to do. Our thanks to Kiersten for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Managing director of the Cyber Readiness Institute Kiersten Todt shares how she came to be in the cybersecurity industry helping to provide free tools and resources for small businesses through a nonprofit. She describes how her work on the Hill prior to and just after 9/11 changed. Kiersten talks about the diversity of skills that benefit work in cybersecurity and offers her advice on going after what you want to do. Our thanks to Kiersten for sharing her story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>446</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b93bc76c-fe74-11ee-bb66-ff92376b6cb4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9807720337.mp3?updated=1713549044" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cloud Architect vs Detection Engineer: Mutual benefit. [CyberWire-X]</title>
      <link>https://thecyberwire.com/podcasts/cyberwire-x/50/notes</link>
      <description>In this episode of CyberWire-X, N2K CyberWire’s Podcast host Dave Bittner is joined by Brian Davis, Principal Software Engineer, and Thomas Gardner, Senior Detection Engineer, both from Red Canary. They engage in a cloud architect vs. detection engineer discussion. Through the conversation, they illustrate how one person benefits the other's work and how they work together. Red Canary is our CyberWire-X episode sponsor.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 21 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>Cloud Architect vs Detection Engineer: Mutual benefit. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>50</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode of CyberWire-X, N2K CyberWire’s Podcast host Dave Bittner is joined by Brian Davis, Principal Software Engineer, and Thomas Gardner, Senior Detection Engineer, both from Red Canary. They engage in a cloud architect vs. detection engineer discussion. Through the conversation, they illustrate how one person benefits the other's work and how they work together. Red Canary is our CyberWire-X episode sponsor.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of CyberWire-X, N2K CyberWire’s Podcast host <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> is joined by <a href="https://www.linkedin.com/in/brianthedavis/">Brian Davis</a>, Principal Software Engineer, and <a href="https://www.linkedin.com/in/thomas-gardner-4a090841/">Thomas Gardner</a>, Senior Detection Engineer, both from Red Canary. They engage in a cloud architect vs. detection engineer discussion. Through the conversation, they illustrate how one person benefits the other's work and how they work together. <a href="https://redcanary.com/">Red Canary</a> is our CyberWire-X episode sponsor.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1103</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a176bbb0-fe73-11ee-8c9e-77eb4c92107f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4055671050.mp3?updated=1713470208" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The art of information gathering. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/326/notes</link>
      <description>Greg Lesnewich, senior threat researcher at Proofpoint, sits down to discuss "From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering." Since 2023, TA427 has directly solicited foreign policy experts for their opinions on nuclear disarmament, US-ROK policies, and sanction topics via benign conversation starting emails. 
The research states "While our researchers have consistently observed TA427 rely on social engineering tactics and regularly rotating its email infrastructure, in December 2023 the threat actor began to abuse lax Domain-based Message Authentication, Reporting and Conformance (DMARC) policies to spoof various personas and, in February 2024, began incorporating web beacons for target profiling."
The research can be found here:
From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Apr 2024 07:00:00 -0000</pubDate>
      <itunes:title>The art of information gathering. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>326</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Greg Lesnewich, senior threat researcher at Proofpoint, sits down to discuss "From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering." Since 2023, TA427 has directly solicited foreign policy experts for their opinions on nuclear disarmament, US-ROK policies, and sanction topics via benign conversation starting emails. 
The research states "While our researchers have consistently observed TA427 rely on social engineering tactics and regularly rotating its email infrastructure, in December 2023 the threat actor began to abuse lax Domain-based Message Authentication, Reporting and Conformance (DMARC) policies to spoof various personas and, in February 2024, began incorporating web beacons for target profiling."
The research can be found here:
From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Greg Lesnewich, senior threat researcher at Proofpoint, sits down to discuss "From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering." Since 2023, TA427 has directly solicited foreign policy experts for their opinions on nuclear disarmament, US-ROK policies, and sanction topics via benign conversation starting emails. </p><p>The research states "While our researchers have consistently observed TA427 rely on social engineering tactics and regularly rotating its email infrastructure, in December 2023 the threat actor began to abuse lax Domain-based Message Authentication, Reporting and Conformance (DMARC) policies to spoof various personas and, in February 2024, began incorporating web beacons for target profiling."</p><p>The research can be found here:</p><ul><li><a href="https://www.proofpoint.com/us/blog/threat-insight/social-engineering-dmarc-abuse-ta427s-art-information-gathering">From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1668</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[abb6325c-00b4-11ef-8254-d7d43cb140a1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6950325243.mp3?updated=1713555322" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Swift responses to cyberattacks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2050/notes</link>
      <description>Two swift responses to recent cyberattacks. Frontier Communications discloses cyberattack. Texas town repels water system cyberattack by unplugging. List of undesirables falls into the wrong hands. CryptoChameleon phishing kit impersonates LastPass. Ransomware payments trending down in Q1 2024 and a warning for small to medium-sized businesses. US auto manufacturers targeted by FIN7. Akira ransomware has made $42 million since March 2023. No more WhatsApp or Threads in China. Concerning drop in US cybersecurity job listings. Our guest is Zscaler’s Chief Security Officer Deepen Desai exploring encrypted attacks amidst the AI revolution. Meghan Markle hacked by Kate supporters. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Deepen Desai, Chief Security Officer and SVP Security Engineering &amp; Research at Zscaler, joins us to talk about exploring encrypted attacks amidst the AI revolution.

Selected Reading
Frontier Communications Shuts Down Systems Following Cyberattack (SecurityWeek)
Tiny Texas City Repels Russia-Tied Hackers Eyeing Water System (Bloomberg) 
Cybercriminals threaten to leak all 5 million records from stolen database of high-risk individuals (The Register) 
Advanced Phishing Kit Adds LastPass Branding for Use in Phishing Campaigns (LastPass)
Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs beware! (Help Net Security)
FIN7 cybercriminals targeted large U.S. automotive manufacturer last year (The Record) 
Akira Ransomware Made Over $42 Million in One Year: Agencies (SecurityWeek) 
Apple pulls WhatsApp, Threads from China App Store following state order (TechCrunch)
Alarming Decline in Cybersecurity Job Postings in the US (Infosecurity Magazine)
Meghan Markle's new lifestyle website hijacked by anonymous user whose ‘thoughts are with Kate’ (GB News)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 19 Apr 2024 20:30:00 -0000</pubDate>
      <itunes:title>Swift responses to cyberattacks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2050</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Two swift responses to recent cyberattacks. Frontier Communications discloses cyberattack. Texas town repels water system cyberattack by unplugging. List of undesirables falls into the wrong hands. CryptoChameleon phishing kit impersonates LastPass. Ransomware payments trending down in Q1 2024 and a warning for small to medium-sized businesses. US auto manufacturers targeted by FIN7. Akira ransomware has made $42 million since March 2023. No more WhatsApp or Threads in China. Concerning drop in US cybersecurity job listings. Our guest is Zscaler’s Chief Security Officer Deepen Desai exploring encrypted attacks amidst the AI revolution. Meghan Markle hacked by Kate supporters. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Deepen Desai, Chief Security Officer and SVP Security Engineering &amp; Research at Zscaler, joins us to talk about exploring encrypted attacks amidst the AI revolution.

Selected Reading
Frontier Communications Shuts Down Systems Following Cyberattack (SecurityWeek)
Tiny Texas City Repels Russia-Tied Hackers Eyeing Water System (Bloomberg) 
Cybercriminals threaten to leak all 5 million records from stolen database of high-risk individuals (The Register) 
Advanced Phishing Kit Adds LastPass Branding for Use in Phishing Campaigns (LastPass)
Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs beware! (Help Net Security)
FIN7 cybercriminals targeted large U.S. automotive manufacturer last year (The Record) 
Akira Ransomware Made Over $42 Million in One Year: Agencies (SecurityWeek) 
Apple pulls WhatsApp, Threads from China App Store following state order (TechCrunch)
Alarming Decline in Cybersecurity Job Postings in the US (Infosecurity Magazine)
Meghan Markle's new lifestyle website hijacked by anonymous user whose ‘thoughts are with Kate’ (GB News)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Two swift responses to recent cyberattacks. Frontier Communications discloses cyberattack. Texas town repels water system cyberattack by unplugging. List of undesirables falls into the wrong hands. CryptoChameleon phishing kit impersonates LastPass. Ransomware payments trending down in Q1 2024 and a warning for small to medium-sized businesses. US auto manufacturers targeted by FIN7. Akira ransomware has made $42 million since March 2023. No more WhatsApp or Threads in China. Concerning drop in US cybersecurity job listings. Our guest is Zscaler’s Chief Security Officer Deepen Desai exploring encrypted attacks amidst the AI revolution. Meghan Markle hacked by Kate supporters. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/deepen-desai-48487b2/">Deepen Desai</a>, Chief Security Officer and SVP Security Engineering &amp; Research at <a href="https://www.zscaler.com/">Zscaler</a>, joins us to talk about exploring encrypted attacks amidst the AI revolution.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/frontier-communications-shuts-down-systems-following-cyberattack/">Frontier Communications Shuts Down Systems Following Cyberattack</a> (SecurityWeek)</p><p><a href="https://www.bloomberg.com/news/articles/2024-04-19/tiny-texas-city-repels-russia-tied-hackers-eyeing-water-system">Tiny Texas City Repels Russia-Tied Hackers Eyeing Water System</a> (Bloomberg) </p><p><a href="https://www.theregister.com/2024/04/19/cybercriminals_threaten_to_leak_all/">Cybercriminals threaten to leak all 5 million records from stolen database of high-risk individuals</a> (The Register) </p><p><a href="https://blog.lastpass.com/posts/2024/04/advanced-phishing-kit-adds-lastpass-branding-for-use-in-phishing-campaigns">Advanced Phishing Kit Adds LastPass Branding for Use in Phishing Campaigns</a> (LastPass)</p><p><a href="https://www.helpnetsecurity.com/2024/04/19/ransomware-q1-2024-payments/">Ransomware in Q1 2024: Frequency, size of payments trending downwards, SMBs beware! </a>(Help Net Security)</p><p><a href="https://therecord.media/cybercriminals-targeted-carmaker-blackberry">FIN7 cybercriminals targeted large U.S. automotive manufacturer last year</a> (The Record) </p><p><a href="https://www.securityweek.com/akira-ransomware-made-over-42-million-in-one-year-agencies/">Akira Ransomware Made Over $42 Million in One Year: Agencies</a> (SecurityWeek) </p><p><a href="https://techcrunch.com/2024/04/19/threads-whatsapp-removed-from-china-app-store/">Apple pulls WhatsApp, Threads from China App Store following state order</a> (TechCrunch)</p><p><a href="https://www.infosecurity-magazine.com/news/alarming-decline-cyber-jobs-us/">Alarming Decline in Cybersecurity Job Postings in the US</a> (Infosecurity Magazine)</p><p><a href="https://www.gbnews.com/royal/meghan-markle-lifestyle-website-hijacked-kate-middleton-news">Meghan Markle's new lifestyle website hijacked by anonymous user whose ‘thoughts are with Kate’</a><em> </em>(GB News)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1522</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[94a934c6-b95e-11ee-8cf8-772dbf62318a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8281770214.mp3?updated=1713557188" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber Talent Insights: Charting your path in cybersecurity. (Part 2 of 3) [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/61/notes</link>
      <description>Join us for this special three-part series where the N2K Cyber Talent Insights team guides you through effective strategies to develop your cybersecurity team, helping you stay ahead in the constantly changing cybersecurity landscape. 

In this episode, we shift our point of view to provide guidance for an individual's first career or perhaps considering a career change transitioning into the field. We discuss a market-driven approach to career development. We also explore how to discover one’s niche in cybersecurity, including how to stand out in this competitive market and align personal interests with career goals. Lastly, we examine the role certifications play when navigating your path throughout the talent acquisition, development, and retention of the cybersecurity workforce management lifecycle.  

Explore Cyber Talent Insights
N2K’s Cyber Talent Insights provides security leaders measurable and actionable insights on your organization’s current cyber roles and capabilities to maximize your talent investments and build a business case for better hiring, developing, maintaining, and retaining your technical talent pools. Learn how at n2k.com/talent-insights.

Connect with the N2K Cyber Workforce team on Linkedin:


Dr. Sasha Vanterpool, Cyber Workforce Consultant 


Dr. Heather Monthie, Cybersecurity Workforce Consultant


Jeff Welgan, Chief Learning Officer


Resources for developing your cybersecurity teams:

N2K Cyber Workforce Strategy Guide

Workforce Media Resources

Cyber Talent Acquisition Woes for Enterprises


Workforce Intelligence: What it is and why you need it for cyber teams webinar


Setting Better Cyber Job Expectations to Attract &amp; Retain Talent webinar


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 19 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>Cyber Talent Insights: Charting your path in cybersecurity. (Part 2 of 3) [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>61</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0232fe9c-fe73-11ee-a8ad-8b64d10f9bbd/image/489ed6c8f3f9dcaaccb26fe942c4b2f5.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Join us for this special three-part series where the N2K Cyber Talent Insights team guides you through effective strategies to develop your cybersecurity team, helping you stay ahead in the constantly changing cybersecurity landscape. 

In this episode, we shift our point of view to provide guidance for an individual's first career or perhaps considering a career change transitioning into the field. We discuss a market-driven approach to career development. We also explore how to discover one’s niche in cybersecurity, including how to stand out in this competitive market and align personal interests with career goals. Lastly, we examine the role certifications play when navigating your path throughout the talent acquisition, development, and retention of the cybersecurity workforce management lifecycle.  

Explore Cyber Talent Insights
N2K’s Cyber Talent Insights provides security leaders measurable and actionable insights on your organization’s current cyber roles and capabilities to maximize your talent investments and build a business case for better hiring, developing, maintaining, and retaining your technical talent pools. Learn how at n2k.com/talent-insights.

Connect with the N2K Cyber Workforce team on Linkedin:


Dr. Sasha Vanterpool, Cyber Workforce Consultant 


Dr. Heather Monthie, Cybersecurity Workforce Consultant


Jeff Welgan, Chief Learning Officer


Resources for developing your cybersecurity teams:

N2K Cyber Workforce Strategy Guide

Workforce Media Resources

Cyber Talent Acquisition Woes for Enterprises


Workforce Intelligence: What it is and why you need it for cyber teams webinar


Setting Better Cyber Job Expectations to Attract &amp; Retain Talent webinar


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<h3>
<em>Join us for this special three-part series where the N2K Cyber Talent Insights team guides you through effective strategies to develop your cybersecurity team, helping you stay ahead in the constantly changing cybersecurity landscape.</em> </h3><p><br></p><p>In this episode, we shift our point of view to provide guidance for an individual's first career or perhaps considering a career change transitioning into the field. We discuss a market-driven approach to career development. We also explore how to discover one’s niche in cybersecurity, including how to stand out in this competitive market and align personal interests with career goals. Lastly, we examine the role certifications play when navigating your path throughout the talent acquisition, development, and retention of the cybersecurity workforce management lifecycle.  </p><h3><br></h3><h3>Explore Cyber Talent Insights</h3><p>N2K’s Cyber Talent Insights provides security leaders measurable and actionable insights on your organization’s current cyber roles and capabilities to maximize your talent investments and build a business case for better hiring, developing, maintaining, and retaining your technical talent pools. Learn how at <a href="http://n2k.com/talent-insights">n2k.com/talent-insights.</a></p><p><br></p><h3>Connect with the N2K Cyber Workforce team on Linkedin:</h3><ul>
<li>
<a href="https://www.linkedin.com/in/sashavanterpool/">Dr. Sasha Vanterpool</a>, Cyber Workforce Consultant </li>
<li>
<a href="https://www.linkedin.com/in/heathermonthie/">Dr. Heather Monthie</a>, Cybersecurity Workforce Consultant</li>
<li>
<a href="https://www.linkedin.com/in/jeff-welgan/">Jeff Welgan</a>, Chief Learning Officer</li>
</ul><p><br></p><h3>Resources for developing your cybersecurity teams:</h3><ul>
<li><a href="https://www.n2k.com/strategy-guide%20">N2K Cyber Workforce Strategy Guide</a></li>
<li><a href="https://www.n2k.com/workforce-media-episodes%20">Workforce Media Resources</a></li>
<li><a href="https://www.n2k.com/resources/cyber-talent-acquisition-woes-for-enterprises">Cyber Talent Acquisition Woes for Enterprises</a></li>
<li>
<a href="https://www.brighttalk.com/webcast/18820/586708%20">Workforce Intelligence: What it is and why you need it for cyber teams</a> webinar</li>
<li>
<a href="https://www.brighttalk.com/webcast/18820/592220?utm_source=brighttalk-portal&amp;utm_medium=web&amp;utm_campaign=channel-page&amp;utm_content=recorded">Setting Better Cyber Job Expectations to Attract &amp; Retain Talent</a> webinar</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2984</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0232fe9c-fe73-11ee-a8ad-8b64d10f9bbd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5601611683.mp3?updated=1713475891" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From phishing to felony.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2049/notes</link>
      <description>A major Phishing-as-a-service operation gets taken down by international law enforcement. US election officials are warned of nation-state influence operations. The house votes to limit the feds’ purchase of citizens personal data. A Michigan healthcare provider suffered a ransomware attack. Critical infrastructure providers struggle to trust cybersecurity tools. Cloudflare reports on DDoS. Kaspersky uncovers new Android banking malware. Kubernetes cryptominers leverage previously patched flaws. The Massachusetts Attorney General emphasizes the responsible use of AI. Our guest Caleb Barlow, CEO of Cyberbit, joins us to talk about badge swipe fraud as more are returning to the office. Colorado passes a law to keep big tech out of our heads. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest and podcast partner Caleb Barlow, CEO of Cyberbit, joins us to talk about badge swipe fraud as more are returning to the office. Are your employees faking their badge swipes?

Selected Reading
LabHost phishing service with 40,000 domains disrupted, 37 arrested (Bleeping Computer)
US Election Officials Told to Prepare for Nation-State Influence Campa (Infosecurity Magazine)
House votes in favor of curtailing government transactions with data brokers (The Record)
180k Impacted by Data Breach at Michigan Healthcare Organization (SecurityWeek)
Trust in Cyber Takes a Knock as CNI Budgets Flatline (Infosecurity Magazine)
DDoS threat report for 2024 Q1 (Cloudflare) 
SoumniBot malware exploits Android bugs to evade detection (Bleeping Computer)
Hackers hijack OpenMetadata apps in Kubernetes cryptomining attacks (Bleeping Computer)
Massachusetts official warns AI systems subject to consumer protection, anti-bias laws (AP News)
Your Brain Waves Are Up for Sale. A New Law Wants to Change That (NY Times)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 18 Apr 2024 20:10:00 -0000</pubDate>
      <itunes:title>From phishing to felony.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2049</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A major Phishing-as-a-service operation gets taken down by international law enforcement. US election officials are warned of nation-state influence operations. The house votes to limit the feds’ purchase of citizens personal data. A Michigan healthcare provider suffered a ransomware attack. Critical infrastructure providers struggle to trust cybersecurity tools. Cloudflare reports on DDoS. Kaspersky uncovers new Android banking malware. Kubernetes cryptominers leverage previously patched flaws. The Massachusetts Attorney General emphasizes the responsible use of AI. Our guest Caleb Barlow, CEO of Cyberbit, joins us to talk about badge swipe fraud as more are returning to the office. Colorado passes a law to keep big tech out of our heads. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest and podcast partner Caleb Barlow, CEO of Cyberbit, joins us to talk about badge swipe fraud as more are returning to the office. Are your employees faking their badge swipes?

Selected Reading
LabHost phishing service with 40,000 domains disrupted, 37 arrested (Bleeping Computer)
US Election Officials Told to Prepare for Nation-State Influence Campa (Infosecurity Magazine)
House votes in favor of curtailing government transactions with data brokers (The Record)
180k Impacted by Data Breach at Michigan Healthcare Organization (SecurityWeek)
Trust in Cyber Takes a Knock as CNI Budgets Flatline (Infosecurity Magazine)
DDoS threat report for 2024 Q1 (Cloudflare) 
SoumniBot malware exploits Android bugs to evade detection (Bleeping Computer)
Hackers hijack OpenMetadata apps in Kubernetes cryptomining attacks (Bleeping Computer)
Massachusetts official warns AI systems subject to consumer protection, anti-bias laws (AP News)
Your Brain Waves Are Up for Sale. A New Law Wants to Change That (NY Times)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A major Phishing-as-a-service operation gets taken down by international law enforcement. US election officials are warned of nation-state influence operations. The house votes to limit the feds’ purchase of citizens personal data. A Michigan healthcare provider suffered a ransomware attack. Critical infrastructure providers struggle to trust cybersecurity tools. Cloudflare reports on DDoS. Kaspersky uncovers new Android banking malware. Kubernetes cryptominers leverage previously patched flaws. The Massachusetts Attorney General emphasizes the responsible use of AI. Our guest Caleb Barlow, CEO of Cyberbit, joins us to talk about badge swipe fraud as more are returning to the office. Colorado passes a law to keep big tech out of our heads. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest and podcast partner <a href="https://www.linkedin.com/in/calebbarlow/">Caleb Barlow</a>, CEO of <a href="https://www.cyberbit.com/">Cyberbit</a>, joins us to talk about badge swipe fraud as more are returning to the office. Are your employees faking their badge swipes?</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/labhost-phishing-service-with-40-000-domains-disrupted-37-arrested/">LabHost phishing service with 40,000 domains disrupted, 37 arrested</a> (Bleeping Computer)</p><p><a href="https://www.infosecurity-magazine.com/news/us-election-officials-nation-state/">US Election Officials Told to Prepare for Nation-State Influence Campa</a> (Infosecurity Magazine)</p><p><a href="https://therecord.media/data-brokers-legislation-government-purchases-cai">House votes in favor of curtailing government transactions with data brokers</a> (The Record)</p><p><a href="https://www.securityweek.com/180k-impacted-by-data-breach-at-michigan-healthcare-organization/">180k Impacted by Data Breach at Michigan Healthcare Organization</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/trust-cyber-cni-budgets-flatline/">Trust in Cyber Takes a Knock as CNI Budgets Flatline</a> (Infosecurity Magazine)</p><p><a href="https://blog.cloudflare.com/ddos-threat-report-for-2024-q1">DDoS threat report for 2024 Q1</a> (Cloudflare) </p><p><a href="https://www.bleepingcomputer.com/news/security/soumnibot-malware-exploits-android-bugs-to-evade-detection/">SoumniBot malware exploits Android bugs to evade detection</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-hijack-openmetadata-apps-in-kubernetes-cryptomining-attacks/">Hackers hijack OpenMetadata apps in Kubernetes cryptomining attacks</a> (Bleeping Computer)</p><p><a href="https://apnews.com/article/artificial-intelligence-consumer-protection-massachusetts-attorney-general-b0d2ff3addba47204cab2a49ebdd3092">Massachusetts official warns AI systems subject to consumer protection, anti-bias laws</a> (AP News)</p><p><a href="https://www.nytimes.com/2024/04/17/science/colorado-brain-data-privacy.html?referringSource=articleShare">Your Brain Waves Are Up for Sale. A New Law Wants to Change That</a> (NY Times)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1695</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[946fce3e-b95e-11ee-8cf8-33cd8eb6a08d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7027840924.mp3?updated=1713467361" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The rebirth of Russia's cyber warfare.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2048/notes</link>
      <description>A Russian hacker group boldly targets critical infrastructure. The Change Healthcare ransomware attack is projected to cost over a billion dollars. Three hundred bucks is the going rate for a SIM swap. PuTTY potentially reveals private keys. Cisco Talos reports a surge in brute-force attacks. Ivanti updates its MDM product. Omni Hotels &amp; Resorts confirm a data breach. Financially motivated hackers target Businesses in Latin America with steganography. A prolific cryptojacker faces decades in prison. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey. The ransomware equivalent of a Saturday night special. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe discuss content and study strategies for Domain 2, Asset Security. 

Resources:
Domain 2, Asset Security
Identify and securely provision information assets, establish handling requirements, manage the data lifecycle, and apply data security controls to comply with applicable laws.

2.1 Identify and classify information and assets

2.2 Establish information and asset handling requirements

2.3 Provision resources securely

2.4 Manage data lifecycle

2.5 Ensure appropriate asset retention (e.g., End-of-Life (EOL), End-of-Support (EOS))

2.6 Determine data security controls and compliance requirements

Are you studying for the CISSP exam, considering taking the test soon, or did you have an unsuccessful exam experience? Here are some CISSP exam pitfalls to avoid so that you’re confident and successful on exam day.

Selected Reading
Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities (WIRED)
T-Mobile, Verizon workers get texts offering $300 for SIM swaps (Bleeping Computer)
PuTTY SSH client flaw allows recovery of cryptographic private keys (Bleeping Computer) 
Large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentials (Talos Intelligence)
Ivanti Patches Two Critical Avalanche Flaws in Major Update (Infosecurity Magazine)
Omni Hotels confirms data compromise in apparent ransomware attack (SC Media)
Steganography Campaign Targets Global Enterprises (GovInfo Security)
Nebraska man allegedly defrauded cloud providers of millions via cryptojacking (The Record)
Ransomware attack has cost UnitedHealth $872 million; total expected to surpass $1 billion (The Record)
‘Junk gun’ ransomware: Peashooters can still pack a punch (Sophos News) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 17 Apr 2024 20:10:00 -0000</pubDate>
      <itunes:title>The rebirth of Russia's cyber warfare.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2048</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A Russian hacker group boldly targets critical infrastructure. The Change Healthcare ransomware attack is projected to cost over a billion dollars. Three hundred bucks is the going rate for a SIM swap. PuTTY potentially reveals private keys. Cisco Talos reports a surge in brute-force attacks. Ivanti updates its MDM product. Omni Hotels &amp; Resorts confirm a data breach. Financially motivated hackers target Businesses in Latin America with steganography. A prolific cryptojacker faces decades in prison. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey. The ransomware equivalent of a Saturday night special. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe discuss content and study strategies for Domain 2, Asset Security. 

Resources:
Domain 2, Asset Security
Identify and securely provision information assets, establish handling requirements, manage the data lifecycle, and apply data security controls to comply with applicable laws.

2.1 Identify and classify information and assets

2.2 Establish information and asset handling requirements

2.3 Provision resources securely

2.4 Manage data lifecycle

2.5 Ensure appropriate asset retention (e.g., End-of-Life (EOL), End-of-Support (EOS))

2.6 Determine data security controls and compliance requirements

Are you studying for the CISSP exam, considering taking the test soon, or did you have an unsuccessful exam experience? Here are some CISSP exam pitfalls to avoid so that you’re confident and successful on exam day.

Selected Reading
Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities (WIRED)
T-Mobile, Verizon workers get texts offering $300 for SIM swaps (Bleeping Computer)
PuTTY SSH client flaw allows recovery of cryptographic private keys (Bleeping Computer) 
Large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentials (Talos Intelligence)
Ivanti Patches Two Critical Avalanche Flaws in Major Update (Infosecurity Magazine)
Omni Hotels confirms data compromise in apparent ransomware attack (SC Media)
Steganography Campaign Targets Global Enterprises (GovInfo Security)
Nebraska man allegedly defrauded cloud providers of millions via cryptojacking (The Record)
Ransomware attack has cost UnitedHealth $872 million; total expected to surpass $1 billion (The Record)
‘Junk gun’ ransomware: Peashooters can still pack a punch (Sophos News) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Russian hacker group boldly targets critical infrastructure. The Change Healthcare ransomware attack is projected to cost over a billion dollars. Three hundred bucks is the going rate for a SIM swap. PuTTY potentially reveals private keys. Cisco Talos reports a surge in brute-force attacks. Ivanti updates its MDM product. Omni Hotels &amp; Resorts confirm a data breach. Financially motivated hackers target Businesses in Latin America with steganography. A prolific cryptojacker faces decades in prison. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey. The ransomware equivalent of a Saturday night special. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Learning Layer segment, host <a href="https://www.linkedin.com/in/sam-meisenberg/">Sam Meisenberg</a> and <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a> continue their discussion of Joe's ISC2 CISSP certification journey using N2K’s comprehensive <a href="https://certify.cybervista.net/products/isc2/cissp-training-course/?utm_source=CWDP&amp;utm_medium=LL&amp;utm_campaign=HH_CISSP">CISSP training course</a>, <a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-pro/">CISSP practice test</a>, and <a href="https://certify.cybervista.net/products/isc2/certified-information-systems-security-professional-cissp-practice-labs/">CISSP practice labs</a>. Sam and Joe discuss content and study strategies for Domain 2, Asset Security. </p><p><br></p><h2>Resources:</h2><p><a href="https://www.cybervista.net/certify/cissp/">Domain 2, Asset Security</a></p><p>Identify and securely provision information assets, establish handling requirements, manage the data lifecycle, and apply data security controls to comply with applicable laws.</p><ul>
<li>2.1 Identify and classify information and assets</li>
<li>2.2 Establish information and asset handling requirements</li>
<li>2.3 Provision resources securely</li>
<li>2.4 Manage data lifecycle</li>
<li>2.5 Ensure appropriate asset retention (e.g., End-of-Life (EOL), End-of-Support (EOS))</li>
<li>2.6 Determine data security controls and compliance requirements</li>
</ul><p>Are you studying for the CISSP exam, considering taking the test soon, or did you have an unsuccessful exam experience? Here are <a href="https://certify.cybervista.net/you-studied-you-didnt-pass-cissp-exam-why/">some CISSP exam pitfalls to avoid</a> so that you’re confident and successful on exam day.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.wired.com/story/cyber-army-of-russia-reborn-sandworm-us-cyberattacks">Hackers Linked to Russia’s Military Claim Credit for Sabotaging US Water Utilities</a> (WIRED)</p><p><a href="https://www.bleepingcomputer.com/news/security/t-mobile-verizon-workers-get-texts-offering-300-for-sim-swaps/">T-Mobile, Verizon workers get texts offering $300 for SIM swaps</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/putty-ssh-client-flaw-allows-recovery-of-cryptographic-private-keys/">PuTTY SSH client flaw allows recovery of cryptographic private keys</a> (Bleeping Computer) </p><p><a href="https://blog.talosintelligence.com/large-scale-brute-force-activity-targeting-vpns-ssh-services-with-commonly-used-login-credentials/">Large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentials</a> (Talos Intelligence)</p><p><a href="https://www.infosecurity-magazine.com/news/ivanti-patches-two-critical/">Ivanti Patches Two Critical Avalanche Flaws in Major Update </a>(Infosecurity Magazine)</p><p><a href="https://www.scmagazine.com/news/omni-hotels-confirms-data-compromise-in-apparent-ransomware-attack">Omni Hotels confirms data compromise in apparent ransomware attack</a> (SC Media)</p><p><a href="https://www.govinfosecurity.com/steganography-campaign-targets-global-enterprises-a-24873">Steganography Campaign Targets Global Enterprises</a> (GovInfo Security)</p><p><a href="https://therecord.media/nebraska-man-cryptojacking-indictment">Nebraska man allegedly defrauded cloud providers of millions via cryptojacking</a> (The Record)</p><p><a href="https://therecord.media/ransomware-unitedhealth-costs-billions-still-climbing">Ransomware attack has cost UnitedHealth $872 million; total expected to surpass $1 billion</a> (The Record)</p><p><a href="https://news.sophos.com/en-us/2024/04/17/junk-gun-ransomware-peashooters-can-still-pack-a-punch/">‘Junk gun’ ransomware: Peashooters can still pack a punch</a> (Sophos News) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1564</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9436c724-b95e-11ee-8cf8-cbcfae8ff77c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5067431610.mp3?updated=1713380296" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Weathering the phishing front.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2047/notes</link>
      <description>Cisco Dou warns of a third-party MFA-related breach. MGM Resorts sues to stop an FTC breach investigation. Meanwhile the FTC dings another mental telehealth service provider. Open Source foundations call for caution after social engineering attempts. The NSA shares guidance for securing AI systems. IntelBroker claims to have hit a US geospatial intelligence firm. The UK clamps down on deepfakes. Hard-coded passwords provide the key to smart-lock vulnerabilities. On our Industry Voices segment, Ryan Lougheed, Director of Product Management at Onspring, discusses the benefits of artificial intelligence in governance, risk and compliance (GRC). A Law Firm’s Misclick Ends 21 Years of Matrimony. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, Ryan Lougheed, Director of Product Management at Onspring, discusses the benefits of artificial intelligence in governance, risk and compliance (GRC).

Selected Reading
Cisco Duo MFA logs exposed in third-party data breach (ITPro)
Casino operator MGM sues FTC to block probe into 2023 hack (Reuters)
Open Source Leaders Warn of XZ Utils-Like Takeover Attempts (Infosecurity Magazine)
FTC Bans Online Mental Health Firm From Sharing Certain Data (GovInfo Security)
New NSA guidance identifies need to update AI systems to address changing risks, bolster security (Industrial Cyber)
IntelBroker Claims Space-Eyes Breach, Targeting US National Security Data (HackRead) 
Creating sexually explicit deepfakes to become a criminal offence (BBC)
CISA warns of critical vulnerability in Chirp smart locks (The Register)
Wrong couple divorced after computer error by law firm Vardag's (BBC)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Apr 2024 20:10:00 -0000</pubDate>
      <itunes:title>Weathering the phishing front.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>2047</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Cisco Dou warns of a third-party MFA-related breach. MGM Resorts sues to stop an FTC breach investigation. Meanwhile the FTC dings another mental telehealth service provider. Open Source foundations call for caution after social engineering attempts. The NSA shares guidance for securing AI systems. IntelBroker claims to have hit a US geospatial intelligence firm. The UK clamps down on deepfakes. Hard-coded passwords provide the key to smart-lock vulnerabilities. On our Industry Voices segment, Ryan Lougheed, Director of Product Management at Onspring, discusses the benefits of artificial intelligence in governance, risk and compliance (GRC). A Law Firm’s Misclick Ends 21 Years of Matrimony. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, Ryan Lougheed, Director of Product Management at Onspring, discusses the benefits of artificial intelligence in governance, risk and compliance (GRC).

Selected Reading
Cisco Duo MFA logs exposed in third-party data breach (ITPro)
Casino operator MGM sues FTC to block probe into 2023 hack (Reuters)
Open Source Leaders Warn of XZ Utils-Like Takeover Attempts (Infosecurity Magazine)
FTC Bans Online Mental Health Firm From Sharing Certain Data (GovInfo Security)
New NSA guidance identifies need to update AI systems to address changing risks, bolster security (Industrial Cyber)
IntelBroker Claims Space-Eyes Breach, Targeting US National Security Data (HackRead) 
Creating sexually explicit deepfakes to become a criminal offence (BBC)
CISA warns of critical vulnerability in Chirp smart locks (The Register)
Wrong couple divorced after computer error by law firm Vardag's (BBC)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cisco Dou warns of a third-party MFA-related breach. MGM Resorts sues to stop an FTC breach investigation. Meanwhile the FTC dings another mental telehealth service provider. Open Source foundations call for caution after social engineering attempts. The NSA shares guidance for securing AI systems. IntelBroker claims to have hit a US geospatial intelligence firm. The UK clamps down on deepfakes. Hard-coded passwords provide the key to smart-lock vulnerabilities. On our Industry Voices segment, Ryan Lougheed, Director of Product Management at Onspring, discusses the benefits of artificial intelligence in governance, risk and compliance (GRC). A Law Firm’s Misclick Ends 21 Years of Matrimony.<strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Voices segment, <a href="https://www.linkedin.com/in/ryan-lougheed/">Ryan Lougheed</a>, Director of Product Management at <a href="https://onspring.com/">Onspring</a>, discusses the benefits of artificial intelligence in governance, risk and compliance (GRC).</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.itpro.com/security/cisco-duo-mfa-logs-exposed-in-third-party-data-breach">Cisco Duo MFA logs exposed in third-party data breach</a> (ITPro)</p><p><a href="https://www.reuters.com/legal/casino-operator-mgm-sues-ftc-block-probe-into-2023-hack-2024-04-15/">Casino operator MGM sues FTC to block probe into 2023 hack</a> (Reuters)</p><p><a href="https://www.infosecurity-magazine.com/news/open-source-xz-utilslike-takeover/">Open Source Leaders Warn of XZ Utils-Like Takeover Attempts</a> (Infosecurity Magazine)</p><p><a href="https://www.govinfosecurity.com/ftc-bans-online-mental-health-firm-from-sharing-certain-data-a-24865">FTC Bans Online Mental Health Firm From Sharing Certain Data</a> (GovInfo Security)</p><p><a href="https://industrialcyber.co/ai/new-nsa-guidance-identifies-need-to-update-ai-systems-to-address-changing-risks-bolster-security/">New NSA guidance identifies need to update AI systems to address changing risks, bolster security</a> (Industrial Cyber)</p><p><a href="https://www.hackread.com/intelbroker-space-eyes-breach-us-national-security-data/">IntelBroker Claims Space-Eyes Breach, Targeting US National Security Data</a> (HackRead) </p><p><a href="https://www.bbc.com/news/uk-68823042">Creating sexually explicit deepfakes to become a criminal offence</a> (BBC)</p><p><a href="https://www.theregister.com/2024/04/15/critical_vulnerability_chirp_lock/">CISA warns of critical vulnerability in Chirp smart locks</a> (The Register)</p><p><a href="https://www.bbc.com/news/uk-68821406">Wrong couple divorced after computer error by law firm Vardag's</a> (BBC)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1796</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[93fde706-b95e-11ee-8cf8-bf5d0adc182f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4233527153.mp3?updated=1713294640" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hunting vulnerabilities.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2046/notes</link>
      <description>Palo Alto Networks releases hotfixes for an exploited zero-day. Delinea issues an urgent update for a critical flaw. Giant Tiger data is leaked online. A European semiconductor manufacturer deals with a data breach. Roku suffers its second breach of the year. Operators of the Hive RAT face charges.  A former Amazon security engineer gets three years in prison for hacking cryptocurrency exchanges. Zambian officials arrest 77 in a scam call center crack down. Our guest Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division describes dual ransomware. And Rob Boyce, Managing Director at Accenture, shares his thoughts on security testing of generative AI. And selling Pokemon cheats leaves one man in Japan feeling like he had a run-in with a Scaldiburn.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we have two guests, Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division discussing dual ransomware. Followed by Rob Boyce, Managing Director at Accenture, sharing some thoughts on security testing of generative AI.
Selected Reading
Palo Alto Networks Releases Fixes for Firewall Zero-Day as First Attribution Attempts Emerge (SecurityWeek)
A critical vulnerability in Delinea Secret Server allows auth bypass, admin access (Help Net Security)
Hacker claims Giant Tiger data breach, leaks 2.8M records online (Bleeping Computer)
Press statement: Nexperia IT Breach (Nexperia)
Roku issues warning over massive customer account breach (ITPro)
Two People Arrested in Australia and US for Development and Sale of Hive RAT (SecurityWeek)
Ex-Amazon engineer gets 3 years for hacking crypto exchanges (Bleeping Computer)
Zambia arrests 77 people in swoop on "scam" call centre (Bitdefender)
Japanese Police Arrest 36-Year-Old Man on Suspicion of Tampering With Pokémon Violet Save Data (IGN) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 15 Apr 2024 20:10:00 -0000</pubDate>
      <itunes:title>Hunting vulnerabilities.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2046</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Palo Alto Networks releases hotfixes for an exploited zero-day. Delinea issues an urgent update for a critical flaw. Giant Tiger data is leaked online. A European semiconductor manufacturer deals with a data breach. Roku suffers its second breach of the year. Operators of the Hive RAT face charges.  A former Amazon security engineer gets three years in prison for hacking cryptocurrency exchanges. Zambian officials arrest 77 in a scam call center crack down. Our guest Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division describes dual ransomware. And Rob Boyce, Managing Director at Accenture, shares his thoughts on security testing of generative AI. And selling Pokemon cheats leaves one man in Japan feeling like he had a run-in with a Scaldiburn.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we have two guests, Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division discussing dual ransomware. Followed by Rob Boyce, Managing Director at Accenture, sharing some thoughts on security testing of generative AI.
Selected Reading
Palo Alto Networks Releases Fixes for Firewall Zero-Day as First Attribution Attempts Emerge (SecurityWeek)
A critical vulnerability in Delinea Secret Server allows auth bypass, admin access (Help Net Security)
Hacker claims Giant Tiger data breach, leaks 2.8M records online (Bleeping Computer)
Press statement: Nexperia IT Breach (Nexperia)
Roku issues warning over massive customer account breach (ITPro)
Two People Arrested in Australia and US for Development and Sale of Hive RAT (SecurityWeek)
Ex-Amazon engineer gets 3 years for hacking crypto exchanges (Bleeping Computer)
Zambia arrests 77 people in swoop on "scam" call centre (Bitdefender)
Japanese Police Arrest 36-Year-Old Man on Suspicion of Tampering With Pokémon Violet Save Data (IGN) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Palo Alto Networks releases hotfixes for an exploited zero-day. Delinea issues an urgent update for a critical flaw. Giant Tiger data is leaked online. A European semiconductor manufacturer deals with a data breach. Roku suffers its second breach of the year. Operators of the Hive RAT face charges.  A former Amazon security engineer gets three years in prison for hacking cryptocurrency exchanges. Zambian officials arrest 77 in a scam call center crack down. Our guest Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division describes dual ransomware. And Rob Boyce, Managing Director at Accenture, shares his thoughts on security testing of generative AI. And selling Pokemon cheats leaves one man in Japan feeling like he had a run-in with a Scaldiburn.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today, we have two guests, Deputy Assistant Director <a href="https://www.linkedin.com/in/cynthia-kaiser-cyber/">Cynthia Kaiser</a> from the <a href="https://www.fbi.gov/investigate/cyber">FBI Cyber Division</a> discussing dual ransomware. Followed by <a href="https://www.linkedin.com/in/therobertjboyce/">Rob Boyce</a>, Managing Director at <a href="https://www.accenture.com/us-en">Accenture</a>, sharing some thoughts on security testing of generative AI.</p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/palo-alto-networks-releases-fixes-for-firewall-zero-day-as-first-attribution-attempts-emerge/">Palo Alto Networks Releases Fixes for Firewall Zero-Day as First Attribution Attempts Emerge</a> (SecurityWeek)</p><p><a href="https://www.helpnetsecurity.com/2024/04/15/delinea-secret-server-vulnerability/">A critical vulnerability in Delinea Secret Server allows auth bypass, admin access </a>(Help Net Security)</p><p><a href="https://www.bleepingcomputer.com/news/security/hacker-claims-giant-tiger-data-breach-leaks-28m-records-online/">Hacker claims Giant Tiger data breach, leaks 2.8M records online</a> (Bleeping Computer)</p><p><a href="https://www.nexperia.com/about/news-events/press-releases/Press-statement--Nexperia-IT-Breach">Press statement: Nexperia IT Breach</a> (Nexperia)</p><p><a href="https://www.itpro.com/security/data-breaches/roku-issues-warning-over-massive-customer-account-breach">Roku issues warning over massive customer account breach</a> (ITPro)</p><p><a href="https://www.securityweek.com/two-people-arrested-in-australia-and-us-for-development-and-sale-of-hive-rat/">Two People Arrested in Australia and US for Development and Sale of Hive RAT </a>(SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/ex-amazon-engineer-gets-3-years-for-hacking-crypto-exchanges/">Ex-Amazon engineer gets 3 years for hacking crypto exchanges</a> (Bleeping Computer)</p><p><a href="https://www.bitdefender.com/blog/hotforsecurity/zambia-arrests-77-people-in-swoop-on-scam-call-centre/">Zambia arrests 77 people in swoop on "scam" call centre</a> (Bitdefender)</p><p><a href="https://www.ign.com/articles/japanese-police-arrest-36-year-old-man-on-suspicion-of-tampering-with-pokemon-violet-save-data">Japanese Police Arrest 36-Year-Old Man on Suspicion of Tampering With Pokémon Violet Save Data</a> (IGN) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1572</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[93c0bf20-b95e-11ee-8cf8-875a330e97b4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7045274796.mp3?updated=1713207978" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AWS in Orbit: Extending the resilient edge to space. [T-Minus AWS in Orbit]</title>
      <link>https://space.n2k.com/podcasts/t-minus/aws-in-orbit-9</link>
      <description>You can learn more about AWS in Orbit at space.n2k.com/aws.
N2K Space is working with AWS to bring the AWS in Orbit podcast series to the 39th Space Symposium in Colorado Springs from April 8-11. 
Our guests today are ​​Clint Crosier, Director at AWS Aerospace and Satellite, and Jim Tran, Vice President of Government Solutions at Iridium.
AWS in Orbit is a podcast collaboration between N2K Networks and AWS to offer listeners an in-depth look at the transformative intersection of cloud computing, space technologies, and generative AI.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.
Selected Reading
AWS Aerospace and Satellite
Audience Survey
We want to hear from you! Please complete our short survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.
Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 15 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>AWS in Orbit: Extending the resilient edge to space. [T-Minus AWS in Orbit]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>9</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b06a5f96-f8d8-11ee-9112-cfe0a6c28acc/image/20cae515f1d73aa3738da2cd590ed74f.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>We speak to AWS Aerospace and Satellite, and Iridium about extending the resilient edge to space.</itunes:subtitle>
      <itunes:summary>You can learn more about AWS in Orbit at space.n2k.com/aws.
N2K Space is working with AWS to bring the AWS in Orbit podcast series to the 39th Space Symposium in Colorado Springs from April 8-11. 
Our guests today are ​​Clint Crosier, Director at AWS Aerospace and Satellite, and Jim Tran, Vice President of Government Solutions at Iridium.
AWS in Orbit is a podcast collaboration between N2K Networks and AWS to offer listeners an in-depth look at the transformative intersection of cloud computing, space technologies, and generative AI.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.
Selected Reading
AWS Aerospace and Satellite
Audience Survey
We want to hear from you! Please complete our short survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.
Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>You can learn more about AWS in Orbit at <a href="https://space.n2k.com/aws">space.n2k.com/aws</a>.</p><p>N2K Space is working with AWS to bring the AWS in Orbit podcast series to the 39th Space Symposium in Colorado Springs from April 8-11. </p><p>Our guests today are ​​<a href="https://www.linkedin.com/in/clint-crosier-maj-gen-air-force-space-force-retired-aa7a27175/">Clint Crosier</a>, Director at AWS Aerospace and Satellite, and <a href="https://www.linkedin.com/in/jim-t-15825b11a/">Jim Tran</a>, Vice President of Government Solutions at <a href="https://www.iridium.com/">Iridium</a>.</p><p>AWS in Orbit is a podcast collaboration between N2K Networks and AWS to offer listeners an in-depth look at the transformative intersection of cloud computing, space technologies, and generative AI.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our weekly intelligence roundup, <a href="https://space.n2k.com/newsletters/signals-and-space">Signals and Space</a>, and you’ll never miss a beat. And be sure to follow T-Minus on <a href="https://www.linkedin.com/company/n2k-space/">LinkedIn</a> and <a href="https://www.instagram.com/tminusdaily/">Instagram</a>.</p><h2>Selected Reading</h2><p><a href="https://aws.amazon.com/aerospace-and-satellite/?trk=c9d66aa7-01dc-4cbe-93b1-2c987a64a1d9&amp;sc_channel=el">AWS Aerospace and Satellite</a></p><h2>Audience Survey</h2><p>We want to hear from you! Please complete our <a href="https://www.surveymonkey.com/r/BL5NFPW">short survey</a>. It’ll help us get better and deliver you the most mission-critical space intel every day.</p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/ung56qbvknfbj9z2">media kit</a>. Contact us at <a href="mailto:space@n2k.com">space@n2k.com</a> to request more info.</p><h2>Want to join us for an interview?</h2><p>Please send your pitch to <a href="mailto:space-editor@n2k.com">space-editor@n2k.com</a> and include your name, affiliation, and topic proposal.</p><p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1472</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b06a5f96-f8d8-11ee-9112-cfe0a6c28acc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3278352179.mp3?updated=1712861575" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Stu Sjouwerman: Trying for a win, win, win game. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/11/notes</link>
      <description>Founder and CEO Stu Sjouwerman takes us on a journey of how his career developed from starting a software service company to currently focusing on the infosec side of the business where his team essentially helps to create human firewalls. Stu talks about learning all aspects of the business while creating startups and suggests you learn to speak the language of the area you are looking to get into. He even touches on predicting the future and taking over the world. Our thanks to Stu for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 14 Apr 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Stu Sjouwerman: Trying for a win, win, win game. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>11</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Founder and CEO Stu Sjouwerman takes us on a journey of how his career developed from starting a software service company to currently focusing on the infosec side of the business where his team essentially helps to create human firewalls. Stu talks about learning all aspects of the business while creating startups and suggests you learn to speak the language of the area you are looking to get into. He even touches on predicting the future and taking over the world. Our thanks to Stu for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Founder and CEO Stu Sjouwerman takes us on a journey of how his career developed from starting a software service company to currently focusing on the infosec side of the business where his team essentially helps to create human firewalls. Stu talks about learning all aspects of the business while creating startups and suggests you learn to speak the language of the area you are looking to get into. He even touches on predicting the future and taking over the world. Our thanks to Stu for sharing his story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>356</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[874cc16a-f8e4-11ee-8b31-c70fed70cfc8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8925944289.mp3?updated=1712937248" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AWS in Orbit: Building a resilient outernet. [T-Minus AWS in Orbit]</title>
      <link>https://space.n2k.com/podcasts/t-minus/aws-in-orbit-8</link>
      <description>You can learn more about AWS in Orbit at space.n2k.com/aws.
N2K Space is working with AWS to bring the AWS in Orbit podcast series to the 39th Space Symposium in Colorado Springs from April 8-11. 
Our guests today are ​​Salem El Nimri, Chief of Space Technology at AWS Aerospace and Satellite, and Declan Ganley, Chairman and CEO at Rivada Space Networks.
AWS in Orbit is a podcast collaboration between N2K Networks and AWS to offer listeners an in-depth look at the transformative intersection of cloud computing, space technologies, and generative AI.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.
Selected Reading
AWS Aerospace and Satellite
Audience Survey
We want to hear from you! Please complete our short survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.
Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 14 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>AWS in Orbit: Building a resilient outernet. [T-Minus AWS in Orbit]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/87dbf8c8-f8d8-11ee-a7c4-3f3e2cd10810/image/19b7e4429d5d02c5ee48b52e5de530f6.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>We speak to AWS Aerospace and Satellite, and Rivada Space Networks about enabling secure point-to-point global connectivity, and the opportunities of establishing a low-latency optical-link communication mesh network in low earth orbit.</itunes:subtitle>
      <itunes:summary>You can learn more about AWS in Orbit at space.n2k.com/aws.
N2K Space is working with AWS to bring the AWS in Orbit podcast series to the 39th Space Symposium in Colorado Springs from April 8-11. 
Our guests today are ​​Salem El Nimri, Chief of Space Technology at AWS Aerospace and Satellite, and Declan Ganley, Chairman and CEO at Rivada Space Networks.
AWS in Orbit is a podcast collaboration between N2K Networks and AWS to offer listeners an in-depth look at the transformative intersection of cloud computing, space technologies, and generative AI.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.
Selected Reading
AWS Aerospace and Satellite
Audience Survey
We want to hear from you! Please complete our short survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.
Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>You can learn more about AWS in Orbit at <a href="https://space.n2k.com/aws">space.n2k.com/aws</a>.</p><p>N2K Space is working with AWS to bring the AWS in Orbit podcast series to the 39th Space Symposium in Colorado Springs from April 8-11. </p><p>Our guests today are ​​<a href="https://www.linkedin.com/in/salem-el-nimri-76a10924/">Salem El Nimri</a>, Chief of Space Technology at AWS Aerospace and Satellite, and <a href="https://www.rivada.com/team-members/declan-j-ganley/">Declan Ganley</a>, Chairman and CEO at <a href="https://www.rivada.com/#space">Rivada Space Networks.</a></p><p>AWS in Orbit is a podcast collaboration between N2K Networks and AWS to offer listeners an in-depth look at the transformative intersection of cloud computing, space technologies, and generative AI.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our weekly intelligence roundup, <a href="https://space.n2k.com/newsletters/signals-and-space">Signals and Space</a>, and you’ll never miss a beat. And be sure to follow T-Minus on <a href="https://www.linkedin.com/company/n2k-space/">LinkedIn</a> and <a href="https://www.instagram.com/tminusdaily/">Instagram</a>.</p><h2>Selected Reading</h2><p><a href="https://aws.amazon.com/aerospace-and-satellite/?trk=c9d66aa7-01dc-4cbe-93b1-2c987a64a1d9&amp;sc_channel=el">AWS Aerospace and Satellite</a></p><h2>Audience Survey</h2><p>We want to hear from you! Please complete our <a href="https://www.surveymonkey.com/r/BL5NFPW">short survey</a>. It’ll help us get better and deliver you the most mission-critical space intel every day.</p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/ung56qbvknfbj9z2">media kit</a>. Contact us at <a href="mailto:space@n2k.com">space@n2k.com</a> to request more info.</p><h2>Want to join us for an interview?</h2><p>Please send your pitch to <a href="mailto:space-editor@n2k.com">space-editor@n2k.com</a> and include your name, affiliation, and topic proposal.</p><p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1322</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[87dbf8c8-f8d8-11ee-a7c4-3f3e2cd10810]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6027529767.mp3?updated=1712871210" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Breaking down a high-severity vulnerability in Kubernetes. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/325/notes</link>
      <description>Tomer Peled, a Security &amp; Vulnerability Researcher from Akamai is sharing their work on "What a Cluster: Local Volumes Vulnerability in Kubernetes." This research focuses on a high-severity vulnerability in Kubernetes, allowing for remote code execution with system privileges on all Windows endpoints within a Kubernetes cluster.
The research states "The discovery of this vulnerability led to the discovery of two others that share the same root cause: insecure function call and lack of user input sanitization."
The research can be found here:
What a Cluster: Local Volumes Vulnerability in Kubernetes

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Apr 2024 07:00:00 -0000</pubDate>
      <itunes:title>Breaking down a high-severity vulnerability in Kubernetes. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>325</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Tomer Peled, a Security &amp; Vulnerability Researcher from Akamai is sharing their work on "What a Cluster: Local Volumes Vulnerability in Kubernetes." This research focuses on a high-severity vulnerability in Kubernetes, allowing for remote code execution with system privileges on all Windows endpoints within a Kubernetes cluster.
The research states "The discovery of this vulnerability led to the discovery of two others that share the same root cause: insecure function call and lack of user input sanitization."
The research can be found here:
What a Cluster: Local Volumes Vulnerability in Kubernetes

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tomer Peled, a Security &amp; Vulnerability Researcher from Akamai is sharing their work on "What a Cluster: Local Volumes Vulnerability in Kubernetes." This research focuses on a high-severity vulnerability in Kubernetes, allowing for remote code execution with system privileges on all Windows endpoints within a Kubernetes cluster.</p><p>The research states "The discovery of this vulnerability led to the discovery of two others that share the same root cause: insecure function call and lack of user input sanitization."</p><p>The research can be found here:</p><ul><li><a href="https://www.akamai.com/blog/security-research/kubernetes-local-volumes-command-injection-vulnerability-rce-system-privileges">What a Cluster: Local Volumes Vulnerability in Kubernetes</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>705</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b43982a6-f94f-11ee-adbd-5fb5792639cd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6700988330.mp3?updated=1713190276" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Privacy, power, and the path forward.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2045/notes</link>
      <description>Section 702 edges closer to a vote. CISA provides guidance on Sisense and Microsoft breaches. A major conservative think tank reports a breach. Obsolete D-Link devices are under active exploitation, and Palo Alto warns of a zero-day. Raspberry Robin grows more stealthy. A lastpass employee thwarts a deepfake phishing attempt. Are AI models growing more persuasive? Our guest Kevin Magee from Microsoft Canada joins us to talk about cross domain prompt injection and AI. Floppies keep the trains running on time. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest and podcast partner Kevin Magee from Microsoft Canada joins us to talk about cross domain prompt injection and AI. 

Selected Reading
Compromise of Sisense Customer Data (CISA)
ED 24-02: Mitigating the Significant Risk from Nation-State Compromise of Microsoft Corporate Email System (CISA)
US think tank Heritage Foundation hit by cyberattack (TechCrunch)
Exploitation of Unpatched D-Link NAS Device Vulnerabilities Soars (SecurityWeek)
Palo Alto Networks Warns About Critical Zero-Day in PAN-OS (Infosecurity Magazine)
Hackers are using Windows script files to spread malware and swerve antivirus software ( ITPro)
LastPass Employee Targeted With Deepfake Calls (SecurityWeek)
Anthropic says its AI models are as persuasive as humans (Axios)
5.25-inch floppy disks expected to help run San Francisco trains until 2030 (Ars Technica)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 12 Apr 2024 20:10:00 -0000</pubDate>
      <itunes:title>Privacy, power, and the path forward.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2045</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Section 702 edges closer to a vote. CISA provides guidance on Sisense and Microsoft breaches. A major conservative think tank reports a breach. Obsolete D-Link devices are under active exploitation, and Palo Alto warns of a zero-day. Raspberry Robin grows more stealthy. A lastpass employee thwarts a deepfake phishing attempt. Are AI models growing more persuasive? Our guest Kevin Magee from Microsoft Canada joins us to talk about cross domain prompt injection and AI. Floppies keep the trains running on time. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest and podcast partner Kevin Magee from Microsoft Canada joins us to talk about cross domain prompt injection and AI. 

Selected Reading
Compromise of Sisense Customer Data (CISA)
ED 24-02: Mitigating the Significant Risk from Nation-State Compromise of Microsoft Corporate Email System (CISA)
US think tank Heritage Foundation hit by cyberattack (TechCrunch)
Exploitation of Unpatched D-Link NAS Device Vulnerabilities Soars (SecurityWeek)
Palo Alto Networks Warns About Critical Zero-Day in PAN-OS (Infosecurity Magazine)
Hackers are using Windows script files to spread malware and swerve antivirus software ( ITPro)
LastPass Employee Targeted With Deepfake Calls (SecurityWeek)
Anthropic says its AI models are as persuasive as humans (Axios)
5.25-inch floppy disks expected to help run San Francisco trains until 2030 (Ars Technica)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Section 702 edges closer to a vote. CISA provides guidance on Sisense and Microsoft breaches. A major conservative think tank reports a breach. Obsolete D-Link devices are under active exploitation, and Palo Alto warns of a zero-day. Raspberry Robin grows more stealthy. A lastpass employee thwarts a deepfake phishing attempt. Are AI models growing more persuasive? Our guest Kevin Magee from Microsoft Canada joins us to talk about cross domain prompt injection and AI. Floppies keep the trains running on time.<strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest and podcast partner <a href="https://www.linkedin.com/in/kmagee/">Kevin Magee</a> from <a href="https://www.microsoft.com/en-ca/about/our-company">Microsoft Canada</a> joins us to talk about cross domain prompt injection and AI. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.cisa.gov/news-events/alerts/2024/04/11/compromise-sisense-customer-data">Compromise of Sisense Customer Data</a> (CISA)</p><p><a href="https://www.cisa.gov/news-events/directives/ed-24-02-mitigating-significant-risk-nation-state-compromise-microsoft-corporate-email-system">ED 24-02: Mitigating the Significant Risk from Nation-State Compromise of Microsoft Corporate Email System</a> (CISA)</p><p><a href="https://techcrunch.com/2024/04/12/heritage-foundation-cyberattack/">US think tank Heritage Foundation hit by cyberattack</a> (TechCrunch)</p><p><a href="https://www.securityweek.com/exploitation-of-unpatched-d-link-nas-device-vulnerabilities-soars/">Exploitation of Unpatched D-Link NAS Device Vulnerabilities Soars</a> (SecurityWeek)</p><p><a href="https://www.infosecurity-magazine.com/news/palo-alto-critical-zero-day/">Palo Alto Networks Warns About Critical Zero-Day in PAN-OS</a> (Infosecurity Magazine)</p><p><a href="https://www.itpro.com/security/hackers-are-using-windows-script-files-to-spread-malware-and-swerve-antivirus-software">Hackers are using Windows script files to spread malware and swerve antivirus software</a> ( ITPro)</p><p><a href="https://www.securityweek.com/lastpass-employee-targeted-with-deepfake-calls/">LastPass Employee Targeted With Deepfake Calls</a> (SecurityWeek)</p><p><a href="https://www.axios.com/2024/04/10/anthropic-claude-persuasion-turing-test?utm_placement=newsletter">Anthropic says its AI models are as persuasive as humans</a> (Axios)</p><p><a href="https://arstechnica.com/gadgets/2024/04/5-25-inch-floppy-disks-expected-to-help-run-san-francisco-trains-until-2030/">5.25-inch floppy disks expected to help run San Francisco trains until 2030</a> (Ars Technica)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1474</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9384be58-b95e-11ee-8cf8-3b330fda0c5e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2478340738.mp3?updated=1712946093" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber Talent Insights: Navigating the landscape for enterprise organizations. (Part 1 of 3) [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/60/notes</link>
      <description>Join us for this special three-part series where the N2K Cyber Talent Insights team guides you through effective strategies to develop your cybersecurity team, helping you stay ahead in the constantly changing cybersecurity landscape. 
In the first episode of the series on cybersecurity workforce development, we dive into the complex world of cyber workforce management and planning, particularly as it pertains to the perspective of the enterprise.
We explore the current state of the cybersecurity workforce, navigate various challenges in talent acquisition, and explore the nuances of job classifications, titles, compensation, and the dynamics of remote, onsite, and hybrid work environments. 
Our experts further address talent development strategies like professional development, training, conferences, mentorship programs, communities of interest, and corporate cyber academies. 
Finally, we touch upon the critical aspect of talent retention, an essential component in closing the cybersecurity talent gap. We hope you will join us on this journey.
Connect with the N2K Cyber Workforce team on Linkedin:


Dr. Sasha Vanterpool, Cyber Workforce Consultant 


Dr. Heather Monthie, Cybersecurity Workforce Consultant


Jeff Welgan, Chief Learning Officer


Resources for developing your cybersecurity teams:

N2K Cyber Workforce Strategy Guide

Workforce Media Resources

Strategic Cyber Workforce Intelligence resources for your organization

Cyber Talent Acquistion Woes for Enterprises


Workforce Intelligence: What it is and why you need it for cyber teams webinar


Setting Better Cyber Job Expectations to Attract &amp; Retain Talent webinar


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 12 Apr 2024 05:00:00 -0000</pubDate>
      <itunes:title>Cyber Talent Insights: Navigating the landscape for enterprise organizations. (Part 1 of 3) [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>60</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/13f90ec6-f844-11ee-b1e9-7f01015616d5/image/489ed6c8f3f9dcaaccb26fe942c4b2f5.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Join us for this special three-part series where the N2K Cyber Talent Insights team guides you through effective strategies to develop your cybersecurity team, helping you stay ahead in the constantly changing cybersecurity landscape. 
In the first episode of the series on cybersecurity workforce development, we dive into the complex world of cyber workforce management and planning, particularly as it pertains to the perspective of the enterprise.
We explore the current state of the cybersecurity workforce, navigate various challenges in talent acquisition, and explore the nuances of job classifications, titles, compensation, and the dynamics of remote, onsite, and hybrid work environments. 
Our experts further address talent development strategies like professional development, training, conferences, mentorship programs, communities of interest, and corporate cyber academies. 
Finally, we touch upon the critical aspect of talent retention, an essential component in closing the cybersecurity talent gap. We hope you will join us on this journey.
Connect with the N2K Cyber Workforce team on Linkedin:


Dr. Sasha Vanterpool, Cyber Workforce Consultant 


Dr. Heather Monthie, Cybersecurity Workforce Consultant


Jeff Welgan, Chief Learning Officer


Resources for developing your cybersecurity teams:

N2K Cyber Workforce Strategy Guide

Workforce Media Resources

Strategic Cyber Workforce Intelligence resources for your organization

Cyber Talent Acquistion Woes for Enterprises


Workforce Intelligence: What it is and why you need it for cyber teams webinar


Setting Better Cyber Job Expectations to Attract &amp; Retain Talent webinar


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<h3>
<em>Join us for this special three-part series where the N2K Cyber Talent Insights team guides you through effective strategies to develop your cybersecurity team, helping you stay ahead in the constantly changing cybersecurity landscape.</em> </h3><p>In the first episode of the series on cybersecurity workforce development, we dive into the complex world of cyber workforce management and planning, particularly as it pertains to the perspective of the enterprise.</p><p>We explore the current state of the cybersecurity workforce, navigate various challenges in talent acquisition, and explore the nuances of job classifications, titles, compensation, and the dynamics of remote, onsite, and hybrid work environments. </p><p>Our experts further address talent development strategies like professional development, training, conferences, mentorship programs, communities of interest, and corporate cyber academies. </p><p>Finally, we touch upon the critical aspect of talent retention, an essential component in closing the cybersecurity talent gap. We hope you will join us on this journey.</p><h3>Connect with the N2K Cyber Workforce team on Linkedin:</h3><ul>
<li>
<a href="https://www.linkedin.com/in/sashavanterpool/">Dr. Sasha Vanterpool</a>, Cyber Workforce Consultant </li>
<li>
<a href="https://www.linkedin.com/in/heathermonthie/">Dr. Heather Monthie</a>, Cybersecurity Workforce Consultant</li>
<li>
<a href="https://www.linkedin.com/in/jeff-welgan/">Jeff Welgan</a>, Chief Learning Officer</li>
</ul><p><br></p><h3>Resources for developing your cybersecurity teams:</h3><ul>
<li><a href="https://www.n2k.com/strategy-guide%20">N2K Cyber Workforce Strategy Guide</a></li>
<li><a href="https://www.n2k.com/workforce-media-episodes%20">Workforce Media Resources</a></li>
<li><a href="https://www.n2k.com/resources/tag/workforce-intelligence">Strategic Cyber Workforce Intelligence resources for your organization</a></li>
<li><a href="https://www.n2k.com/resources/cyber-talent-acquisition-woes-for-enterprises">Cyber Talent Acquistion Woes for Enterprises</a></li>
<li>
<a href="https://www.brighttalk.com/webcast/18820/586708%20">Workforce Intelligence: What it is and why you need it for cyber teams</a> webinar</li>
<li>
<a href="https://www.brighttalk.com/webcast/18820/592220?utm_source=brighttalk-portal&amp;utm_medium=web&amp;utm_campaign=channel-page&amp;utm_content=recorded">Setting Better Cyber Job Expectations to Attract &amp; Retain Talent</a> webinar</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2477</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[13f90ec6-f844-11ee-b1e9-7f01015616d5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1006020724.mp3?updated=1713474662" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Apple's worldwide warning on mercenary attacks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2044/notes</link>
      <description>Apple warns targeted users of mercenary spyware attacks. CISA expands its Malware Next-Gen service to the private sector. US Cyber Command chronicles their “hunt forward” operations. Taxi fleets leak customer data. Trend Micro tracks DeuterBear malware. The BatBadBut vulnerability enables command injection on Windows. Cybercriminals manipulate GitHub's search functionality. Scully Spider may be utilizing AI generated Powershells scripts. A study from ISC2 shed’s light on salary disparities. On our Threat Vector segment, host David Moulton, Director of Thought Leadership at Unit 42, welcomes Donnie Hasseltine, VP of Security at Second Front Systems and a former Recon Marine, as they delve into the indispensable role of a military mindset in cybersecurity. Guest Dr. Sasha Vanterpool, Cyber Workforce Consultant with N2K, introducing the new podcast series Cyber Talent Insights. And AI music sings the license. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guests
On our Threat Vector segment, host David Moulton, Director of Thought Leadership at Unit 42, welcomes Donnie Hasseltine, VP of Security at Second Front Systems and a former Recon Marine, as they delve into the indispensable role of a military mindset in cybersecurity. You can listen to the full conversation here. 
Guest Dr. Sasha Vanterpool, Cyber Workforce Consultant with N2K, introducing the new podcast series Cyber Talent Insights that is launching on Friday, April 12, 2024. You can read more about Cyber Talent Insights here.

Selected Reading
iPhone users in 92 countries received a spyware attack warning from Apple (Engadget)
CISA to expand automated malware analysis system beyond government agencies (The Record)
US Cyber Force Assisted Foreign Governments 22 Times in 2023 (SecurityWeek)
Taxi software vendor exposes personal details of nearly 300K (The Register)
Cyberespionage Group Earth Hundun's Continuous Refinement of Waterbear and Deuterbear (Trend Micro)
BatBadBut: You can't securely execute commands on Windows (Flatt)
New Technique to Trick Developers Detected in an Open Source Supply Chain Attack (Checkmarx)
Malicious PowerShell script pushing malware looks AI-written (Bleeping Computer)
Women make less than men in US cyber jobs — but the gap is narrowing (CyberScoop)
Permission is hereby granted (Suno) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 11 Apr 2024 20:10:00 -0000</pubDate>
      <itunes:title>Apple's worldwide warning on mercenary attacks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2044</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Apple warns targeted users of mercenary spyware attacks. CISA expands its Malware Next-Gen service to the private sector. US Cyber Command chronicles their “hunt forward” operations. Taxi fleets leak customer data. Trend Micro tracks DeuterBear malware. The BatBadBut vulnerability enables command injection on Windows. Cybercriminals manipulate GitHub's search functionality. Scully Spider may be utilizing AI generated Powershells scripts. A study from ISC2 shed’s light on salary disparities. On our Threat Vector segment, host David Moulton, Director of Thought Leadership at Unit 42, welcomes Donnie Hasseltine, VP of Security at Second Front Systems and a former Recon Marine, as they delve into the indispensable role of a military mindset in cybersecurity. Guest Dr. Sasha Vanterpool, Cyber Workforce Consultant with N2K, introducing the new podcast series Cyber Talent Insights. And AI music sings the license. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guests
On our Threat Vector segment, host David Moulton, Director of Thought Leadership at Unit 42, welcomes Donnie Hasseltine, VP of Security at Second Front Systems and a former Recon Marine, as they delve into the indispensable role of a military mindset in cybersecurity. You can listen to the full conversation here. 
Guest Dr. Sasha Vanterpool, Cyber Workforce Consultant with N2K, introducing the new podcast series Cyber Talent Insights that is launching on Friday, April 12, 2024. You can read more about Cyber Talent Insights here.

Selected Reading
iPhone users in 92 countries received a spyware attack warning from Apple (Engadget)
CISA to expand automated malware analysis system beyond government agencies (The Record)
US Cyber Force Assisted Foreign Governments 22 Times in 2023 (SecurityWeek)
Taxi software vendor exposes personal details of nearly 300K (The Register)
Cyberespionage Group Earth Hundun's Continuous Refinement of Waterbear and Deuterbear (Trend Micro)
BatBadBut: You can't securely execute commands on Windows (Flatt)
New Technique to Trick Developers Detected in an Open Source Supply Chain Attack (Checkmarx)
Malicious PowerShell script pushing malware looks AI-written (Bleeping Computer)
Women make less than men in US cyber jobs — but the gap is narrowing (CyberScoop)
Permission is hereby granted (Suno) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Apple warns targeted users of mercenary spyware attacks. CISA expands its Malware Next-Gen service to the private sector. US Cyber Command chronicles their “hunt forward” operations. Taxi fleets leak customer data. Trend Micro tracks DeuterBear malware. The BatBadBut vulnerability enables command injection on Windows. Cybercriminals manipulate GitHub's search functionality. Scully Spider may be utilizing AI generated Powershells scripts. A study from ISC2 shed’s light on salary disparities. On our Threat Vector segment, host David Moulton, Director of Thought Leadership at Unit 42, welcomes Donnie Hasseltine, VP of Security at Second Front Systems and a former Recon Marine, as they delve into the indispensable role of a military mindset in cybersecurity. Guest Dr. Sasha Vanterpool, Cyber Workforce Consultant with N2K, introducing the new podcast series Cyber Talent Insights. And AI music sings the license. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guests</h2><p>On our<a href="https://thecyberwire.com/podcasts/threat-vector"> Threat Vector</a> segment, host<a href="https://www.linkedin.com/in/davidrmoulton/"> David Moulton</a>, Director of Thought Leadership at<a href="https://unit42.paloaltonetworks.com/"> Unit 42</a>, welcomes<a href="https://www.linkedin.com/in/george-d-hasseltine/"> Donnie Hasseltine</a>, VP of Security at<a href="https://www.secondfront.com/"> Second Front Systems</a> and a former Recon Marine, as they delve into the indispensable role of a military mindset in cybersecurity. You can listen to the full conversation <a href="https://thecyberwire.com/podcasts/threat-vector/19/notes">here</a>. </p><p>Guest <a href="https://www.linkedin.com/in/sashavanterpool/">Dr. Sasha Vanterpool</a>, Cyber Workforce Consultant with <a href="https://www.n2k.com/">N2K</a>, introducing the new podcast series Cyber Talent Insights that is launching on Friday, April 12, 2024. You can read more about Cyber Talent Insights <a href="https://thecyberwire.com/stories/37fda5967a4e41a9a6697d89ffa550af/cyber-talent-insights-special-series-podcast-launching-friday-april-12th">here</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.engadget.com/iphone-users-in-92-countries-received-a-spyware-attack-warning-from-apple-104554943.html">iPhone users in 92 countries received a spyware attack warning from Apple</a> (Engadget)</p><p><a href="https://therecord.media/cisa-malware-next-gen-automated-system-public">CISA to expand automated malware analysis system beyond government agencies</a> (The Record)</p><p><a href="https://www.securityweek.com/us-cyber-force-assisted-foreign-governments-22-times-in-2023/">US Cyber Force Assisted Foreign Governments 22 Times in 2023</a> (SecurityWeek)</p><p><a href="https://go.theregister.com/feed/www.theregister.com/2024/04/11/icabbi_database_exposure/">Taxi software vendor exposes personal details of nearly 300K</a> (The Register)</p><p><a href="https://www.trendmicro.com/en_us/research/24/d/earth-hundun-waterbear-deuterbear.html">Cyberespionage Group Earth Hundun's Continuous Refinement of Waterbear and Deuterbear</a> (Trend Micro)</p><p><a href="https://flatt.tech/research/posts/batbadbut-you-cant-securely-execute-commands-on-windows/">BatBadBut: You can't securely execute commands on Windows</a> (Flatt)</p><p><a href="https://checkmarx.com/blog/new-technique-to-trick-developers-detected-in-an-open-source-supply-chain-attack/">New Technique to Trick Developers Detected in an Open Source Supply Chain Attack</a> (Checkmarx)</p><p><a href="https://www.bleepingcomputer.com/news/security/malicious-powershell-script-pushing-malware-looks-ai-written/">Malicious PowerShell script pushing malware looks AI-written</a> (Bleeping Computer)</p><p><a href="https://cyberscoop.com/women-make-less-than-men-in-us-cyber-jobs-but-the-gap-is-narrowing/">Women make less than men in US cyber jobs — but the gap is narrowing</a> (CyberScoop)</p><p><a href="https://suno.com/song/da6d4a83-1001-4694-8c28-648a6e8bad0a/">Permission is hereby granted</a> (Suno) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2245</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[93465366-b95e-11ee-8cf8-bbbaec0a88d4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1642603539.mp3?updated=1712863161" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From deadlock to debate on a revised Section 702 bill.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2043/notes</link>
      <description>The House moves forward on Section 702 reauthorization. Ukraine suspends a top cybersecurity official. A Wisconsin health coop suffers a data breach. Sophos uncovers a malicious backdoor. Fortinet issues patches for critical and high severity vulnerabilities. A Microsoft server exposed employee passwords, keys, and credentials. LG releases patches to secure smart TVs. The IMF warns of cyberattacks potential to trigger bank runs. It was a busy patch Tuesday. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's CISSP study journey and how to avoid frustration when you get a practice question wrong. X marks the spot where Elon’s impulsiveness turns chaotic. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's CISSP study journey and discuss Domain 1, Security and Risk Management. They cover note-taking best practices and how to avoid getting frustrated when you get a practice question wrong.

Selected Reading
House sets up debate on Section 702 bill, along with votes on proposed changes (The Record)
Ukrainian security service’s cyber chief suspended following media investigation (The Record)
530k Impacted by Data Breach at Wisconsin Healthcare Organization (SecurityWeek)
Smoke and (screen) mirrors: A strange signed backdoor (Sophos News)
Fortinet reports FortiClient critical flaw and issues in FortiOS and FortiProxy (Beyond Machines)
Microsoft left internal passwords exposed in latest security blunder (The Verge)
LG releases updates for vulnerabilities that could allow hackers to gain access to TVs (The Record)
Extreme cyberattacks could cause bank runs, IMF warns (Silicon Republic)
Johannes Ulrich's summary of MS patch Tuesday (SANS Internet Storm Center)
X automatically changed 'Twitter' to 'X' in users' posts, breaking legit URLs (Mashable) 
Example from X/Twitter story: https://wetdry.world/@seraph/112241754503585255

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 10 Apr 2024 20:10:00 -0000</pubDate>
      <itunes:title>From deadlock to debate on a revised Section 702 bill.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2043</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The House moves forward on Section 702 reauthorization. Ukraine suspends a top cybersecurity official. A Wisconsin health coop suffers a data breach. Sophos uncovers a malicious backdoor. Fortinet issues patches for critical and high severity vulnerabilities. A Microsoft server exposed employee passwords, keys, and credentials. LG releases patches to secure smart TVs. The IMF warns of cyberattacks potential to trigger bank runs. It was a busy patch Tuesday. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's CISSP study journey and how to avoid frustration when you get a practice question wrong. X marks the spot where Elon’s impulsiveness turns chaotic. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's CISSP study journey and discuss Domain 1, Security and Risk Management. They cover note-taking best practices and how to avoid getting frustrated when you get a practice question wrong.

Selected Reading
House sets up debate on Section 702 bill, along with votes on proposed changes (The Record)
Ukrainian security service’s cyber chief suspended following media investigation (The Record)
530k Impacted by Data Breach at Wisconsin Healthcare Organization (SecurityWeek)
Smoke and (screen) mirrors: A strange signed backdoor (Sophos News)
Fortinet reports FortiClient critical flaw and issues in FortiOS and FortiProxy (Beyond Machines)
Microsoft left internal passwords exposed in latest security blunder (The Verge)
LG releases updates for vulnerabilities that could allow hackers to gain access to TVs (The Record)
Extreme cyberattacks could cause bank runs, IMF warns (Silicon Republic)
Johannes Ulrich's summary of MS patch Tuesday (SANS Internet Storm Center)
X automatically changed 'Twitter' to 'X' in users' posts, breaking legit URLs (Mashable) 
Example from X/Twitter story: https://wetdry.world/@seraph/112241754503585255

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The House moves forward on Section 702 reauthorization. Ukraine suspends a top cybersecurity official. A Wisconsin health coop suffers a data breach. Sophos uncovers a malicious backdoor. Fortinet issues patches for critical and high severity vulnerabilities. A Microsoft server exposed employee passwords, keys, and credentials. LG releases patches to secure smart TVs. The IMF warns of cyberattacks potential to trigger bank runs. It was a busy patch Tuesday. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's CISSP study journey and how to avoid frustration when you get a practice question wrong. X marks the spot where Elon’s impulsiveness turns chaotic. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Learning Layer segment, host <a href="https://www.linkedin.com/in/sam-meisenberg/">Sam Meisenberg</a> and <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a> continue their discussion of Joe's <a href="https://certify.cybervista.net/products/isc2/cissp-training-course/?utm_source=CWDP&amp;utm_medium=LL&amp;utm_campaign=HH_CISSP">CISSP study</a> journey and discuss Domain 1, Security and Risk Management. They cover note-taking best practices and how to avoid getting frustrated when you get a practice question wrong.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/house-rules-debate-section-702-renewal-third-try">House sets up debate on Section 702 bill, along with votes on proposed changes</a> (The Record)</p><p><a href="https://therecord.media/ukraine-cybersecurity-sbu-illia-vitiuk-suspended">Ukrainian security service’s cyber chief suspended following media investigation</a> (The Record)</p><p><a href="https://www.securityweek.com/530k-impacted-by-data-breach-at-wisconsin-healthcare-organization/">530k Impacted by Data Breach at Wisconsin Healthcare Organization</a> (SecurityWeek)</p><p><a href="https://news.sophos.com/en-us/2024/04/09/smoke-and-screen-mirrors-a-strange-signed-backdoor/">Smoke and (screen) mirrors: A strange signed backdoor</a> (Sophos News)</p><p><a href="https://beyondmachines.net/event_details/fortinet-reports-forticlient-critical-flaw-and-issues-in-fortios-and-fortiproxy-w-n-u-9-m/gD2P6Ple2L">Fortinet reports FortiClient critical flaw and issues in FortiOS and FortiProxy</a> (Beyond Machines)</p><p><a href="https://www.theverge.com/2024/4/10/24126057/microsoft-azure-server-internal-passwords-exposed-cybersecurity">Microsoft left internal passwords exposed in latest security blunder</a> (The Verge)</p><p><a href="https://therecord.media/lg-patches-vulnerabilities-tv">LG releases updates for vulnerabilities that could allow hackers to gain access to TVs</a> (The Record)</p><p><a href="https://www.siliconrepublic.com/enterprise/imf-financial-sector-bank-runs-cyberattacks">Extreme cyberattacks could cause bank runs, IMF warns</a> (Silicon Republic)</p><p><a href="https://isc.sans.edu/diary/April%202024%20Microsoft%20Patch%20Tuesday%20Summary/30822">Johannes Ulrich's summary of MS patch Tuesday</a> (SANS Internet Storm Center)</p><p><a href="https://mashable.com/article/twitter-dot-com-posts-change-to-x-dot-com-ios">X automatically changed 'Twitter' to 'X' in users' posts, breaking legit URLs</a> (Mashable) </p><p>Example from X/Twitter story: <a href="https://wetdry.world/@seraph/112241754503585255">https://wetdry.world/@seraph/112241754503585255</a></p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[930940e8-b95e-11ee-8cf8-8324952d5fb1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3362564712.mp3?updated=1712776875" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unraveling a healthcare ransomware web. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2042/notes</link>
      <description>Change Healthcare gets hit with another ransom demand. A French football team warns fans of a cyberattack. The Home Depot breach is chalked up to a misconfigured SaaS application. The FCC looks to sure up car connectivity security to protect survivors of domestic violence. Targus reports a disruptive cyberattack. A massive doxxing event hits El Salvador. India's top audio and wearables brand investigates a customer data breach. The Israeli military jams GPS. Microsoft Security’s Ann Johnson, host of Afternoon Cyber Tea podcast, shares a segment of her latest episode featuring Jason Healey, founding scholar and director for cyber efforts at Columbia's School of International and Public Affairs. They discuss nurturing trust in cybersecurity. And, I’ll have a burger with a side of surveillance. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, Microsoft Security’s Ann Johnson, host of Afternoon Cyber Tea podcast, shares a segment of her latest episode featuring Jason Healey, founding scholar and director for cyber efforts at Columbia's School of International and Public Affairs. They discuss nurturing trust in cybersecurity. You can listen to the full episode here.

Selected Reading
Change Healthcare breach data may be in hands of new ransomware group (SC Media)
French football club PSG says ticketing system targeted by cyberattack (The Record)
Misconfigured SaaS applications led to the Home Depot data breach, and experts say it’s no surprise (ITPro)
FCC opens rulemaking to probe connected car stalking (The Record)
Targus discloses cyberattack after hackers detected on file servers (Bleeping Computer)
Hacker doxxes nearly every adult in El Salvador (Protos)
Hit with massive data breach, boAt loses data of 7.5 million customers (Forbes)
Israel’s Scrambled GPS Signals Turn Life Upside Down in Tel Aviv (Bloomberg)
How fast food is becoming a new surveillance ground (Fast Company)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Apr 2024 20:10:00 -0000</pubDate>
      <itunes:title>Unraveling a healthcare ransomware web. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2042</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Change Healthcare gets hit with another ransom demand. A French football team warns fans of a cyberattack. The Home Depot breach is chalked up to a misconfigured SaaS application. The FCC looks to sure up car connectivity security to protect survivors of domestic violence. Targus reports a disruptive cyberattack. A massive doxxing event hits El Salvador. India's top audio and wearables brand investigates a customer data breach. The Israeli military jams GPS. Microsoft Security’s Ann Johnson, host of Afternoon Cyber Tea podcast, shares a segment of her latest episode featuring Jason Healey, founding scholar and director for cyber efforts at Columbia's School of International and Public Affairs. They discuss nurturing trust in cybersecurity. And, I’ll have a burger with a side of surveillance. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, Microsoft Security’s Ann Johnson, host of Afternoon Cyber Tea podcast, shares a segment of her latest episode featuring Jason Healey, founding scholar and director for cyber efforts at Columbia's School of International and Public Affairs. They discuss nurturing trust in cybersecurity. You can listen to the full episode here.

Selected Reading
Change Healthcare breach data may be in hands of new ransomware group (SC Media)
French football club PSG says ticketing system targeted by cyberattack (The Record)
Misconfigured SaaS applications led to the Home Depot data breach, and experts say it’s no surprise (ITPro)
FCC opens rulemaking to probe connected car stalking (The Record)
Targus discloses cyberattack after hackers detected on file servers (Bleeping Computer)
Hacker doxxes nearly every adult in El Salvador (Protos)
Hit with massive data breach, boAt loses data of 7.5 million customers (Forbes)
Israel’s Scrambled GPS Signals Turn Life Upside Down in Tel Aviv (Bloomberg)
How fast food is becoming a new surveillance ground (Fast Company)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Change Healthcare gets hit with another ransom demand. A French football team warns fans of a cyberattack. The Home Depot breach is chalked up to a misconfigured SaaS application. The FCC looks to sure up car connectivity security to protect survivors of domestic violence. Targus reports a disruptive cyberattack. A massive doxxing event hits El Salvador. India's top audio and wearables brand investigates a customer data breach. The Israeli military jams GPS. Microsoft Security’s Ann Johnson, host of Afternoon Cyber Tea podcast, shares a segment of her latest episode featuring Jason Healey, founding scholar and director for cyber efforts at Columbia's School of International and Public Affairs. They discuss nurturing trust in cybersecurity. And, I’ll have a burger with a side of surveillance.<strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today, <a href="https://www.microsoft.com/en-us/security/business/services/microsoft-security-enterprise-services">Microsoft Security</a>’s <a href="https://www.linkedin.com/in/ann-johnsons/">Ann Johnson</a>, host of <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea podcast</a>, shares a segment of her latest episode featuring <a href="https://www.linkedin.com/in/jasonhealey/">Jason Healey</a>, founding scholar and director for cyber efforts at <a href="https://www.sipa.columbia.edu/">Columbia's School of International and Public Affairs</a>. They discuss nurturing trust in cybersecurity. You can listen to the full episode <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea/94/notes">here</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.scmagazine.com/news/change-healthcare-breach-data-may-be-in-hands-of-new-ransomware-group">Change Healthcare breach data may be in hands of new ransomware group</a> (SC Media)</p><p><a href="https://therecord.media/paris-saint-germain-cyberattack-ticketing-system">French football club PSG says ticketing system targeted by cyberattack</a> (The Record)</p><p><a href="https://www.itpro.com/security/misconfigured-saas-applications-led-to-the-home-depot-data-breach-and-experts-say-its-no-surprise">Misconfigured SaaS applications led to the Home Depot data breach, and experts say it’s no surprise</a> (ITPro)</p><p><a href="https://therecord.media/fcc-connected-car-stalking-rulemaking">FCC opens rulemaking to probe connected car stalking</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/targus-discloses-cyberattack-after-hackers-detected-on-file-servers/">Targus discloses cyberattack after hackers detected on file servers</a> (Bleeping Computer)</p><p><a href="https://protos.com/hacker-doxxes-nearly-every-adult-in-el-salvador/">Hacker doxxes nearly every adult in El Salvador</a> (Protos)</p><p><a href="https://www.forbesindia.com/article/news/hit-with-massive-data-breach-boat-loses-data-of-75-million-customers/92483/1">Hit with massive data breach, boAt loses data of 7.5 million customers</a> (Forbes)</p><p><a href="https://www.bloomberg.com/news/newsletters/2024-04-09/israel-s-scrambled-gps-signals-turn-life-upside-down-in-tel-aviv">Israel’s Scrambled GPS Signals Turn Life Upside Down in Tel Aviv</a> (Bloomberg)</p><p><a href="https://www.fastcompany.com/91087484/how-fast-food-is-becoming-a-new-surveillance-ground">How fast food is becoming a new surveillance ground</a> (Fast Company)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1442</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f3b73324-b95d-11ee-adc6-17f04e32afdd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8079847887.mp3?updated=1712687981" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A possible breakthrough in data privacy legislation.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2041/notes</link>
      <description>Might there be motion from Congress on data privacy legislation? Maryland passes a pair of privacy bills. A database allegedly from the EPA shows up on Russian cybercrime forums. HHS issues an alert for the Healthcare and Public Health sectors. CISA gears up for their Cyber Storm. A leading UK veterinary service provider suffers a cyber incident. A hardcoded backdoor is discovered in deprecated Network Attached Storage devices. NSA’s new cybersecurity director takes the reins. Guest Caleb Barlow, CEO of Cyberbit, shares his insights on the evolving role of the CISO. The bull market for Zero-days.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Caleb Barlow, CEO of Cyberbit, discussing how we need to think about the role and position of the CISO.

Selected Reading
A Breakthrough Online Privacy Proposal Hits Congress (WIRED)
Maryland Passes 2 Major Privacy Bills, Despite Tech Industry Pushback (The New York Times)
US Environmental Protection Agency Allegedly Hacked, 8.5M User Data Leaked (HACKREAD)
U.S. Department of Health warns of attacks against IT help desks (Security Affairs)
CISA’s ‘Cyber Storm’ will help it update National Cyber Incident Response Plan (Federal News Network)
Veterinary Giant CVS Reveals Major Cyber-Attack (Infosecurity Magazine)
Over 92,000 exposed D-Link NAS devices have a backdoor account (Bleeping Computer)
NSA Appoints Dave Luber as Cybersecurity Director (SecurityWeek)
Price of zero-day exploits rises as companies harden products against hackers (TechCrunch) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 08 Apr 2024 20:10:00 -0000</pubDate>
      <itunes:title>A possible breakthrough in data privacy legislation.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2041</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Might there be motion from Congress on data privacy legislation? Maryland passes a pair of privacy bills. A database allegedly from the EPA shows up on Russian cybercrime forums. HHS issues an alert for the Healthcare and Public Health sectors. CISA gears up for their Cyber Storm. A leading UK veterinary service provider suffers a cyber incident. A hardcoded backdoor is discovered in deprecated Network Attached Storage devices. NSA’s new cybersecurity director takes the reins. Guest Caleb Barlow, CEO of Cyberbit, shares his insights on the evolving role of the CISO. The bull market for Zero-days.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Caleb Barlow, CEO of Cyberbit, discussing how we need to think about the role and position of the CISO.

Selected Reading
A Breakthrough Online Privacy Proposal Hits Congress (WIRED)
Maryland Passes 2 Major Privacy Bills, Despite Tech Industry Pushback (The New York Times)
US Environmental Protection Agency Allegedly Hacked, 8.5M User Data Leaked (HACKREAD)
U.S. Department of Health warns of attacks against IT help desks (Security Affairs)
CISA’s ‘Cyber Storm’ will help it update National Cyber Incident Response Plan (Federal News Network)
Veterinary Giant CVS Reveals Major Cyber-Attack (Infosecurity Magazine)
Over 92,000 exposed D-Link NAS devices have a backdoor account (Bleeping Computer)
NSA Appoints Dave Luber as Cybersecurity Director (SecurityWeek)
Price of zero-day exploits rises as companies harden products against hackers (TechCrunch) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Might there be motion from Congress on data privacy legislation? Maryland passes a pair of privacy bills. A database allegedly from the EPA shows up on Russian cybercrime forums. HHS issues an alert for the Healthcare and Public Health sectors. CISA gears up for their Cyber Storm. A leading UK veterinary service provider suffers a cyber incident. A hardcoded backdoor is discovered in deprecated Network Attached Storage devices. NSA’s new cybersecurity director takes the reins. Guest Caleb Barlow, CEO of Cyberbit, shares his insights on the evolving role of the CISO. The bull market for Zero-days.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/calebbarlow/">Caleb Barlow</a>, CEO of <a href="https://www.cyberbit.com/">Cyberbit</a>, discussing how we need to think about the role and position of the CISO.</p><h2><br></h2><h2>Selected Reading</h2><p><a href="https://www.wired.com/story/apra-congress-online-privacy-proposal/?utm_source=press.coop">A Breakthrough Online Privacy Proposal Hits Congress</a> (WIRED)</p><p><a href="https://www.nytimes.com/2024/04/07/technology/maryland-children-privacy-laws-technology.html?unlocked_article_code=1.i00.QF7Z.XX4yD2UemtPp&amp;amp;smid=nytcore-ios-share&amp;amp;referringSource=articleShare&amp;amp;ugrp=m">Maryland Passes 2 Major Privacy Bills, Despite Tech Industry Pushback</a> (The New York Times)</p><p><a href="https://www.hackread.com/us-environmental-protection-agency-hacked-data-leaked/">US Environmental Protection Agency Allegedly Hacked, 8.5M User Data Leaked</a> (HACKREAD)</p><p><a href="https://securityaffairs.com/161566/hacking/healthcare-it-help-desks-attacks.html">U.S. Department of Health warns of attacks against IT help desks</a> (Security Affairs)</p><p><a href="https://federalnewsnetwork.com/cybersecurity/2024/04/cisas-cyber-storm-will-help-it-update-national-cyber-incident-response-plan/">CISA’s ‘Cyber Storm’ will help it update National Cyber Incident Response Plan</a> (Federal News Network)</p><p><a href="https://www.infosecurity-magazine.com/news/veterinary-giant-cvs-reveals-major/">Veterinary Giant CVS Reveals Major Cyber-Attack</a> (Infosecurity Magazine)</p><p><a href="https://www.bleepingcomputer.com/news/security/over-92-000-exposed-d-link-nas-devices-have-a-backdoor-account/">Over 92,000 exposed D-Link NAS devices have a backdoor account</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/nsa-appoints-dave-luber-as-cybersecurity-director/">NSA Appoints Dave Luber as Cybersecurity Director</a> (SecurityWeek)</p><p><a href="https://techcrunch.com/2024/04/06/price-of-zero-day-exploits-rises-as-companies-harden-products-against-hackers/">Price of zero-day exploits rises as companies harden products against hackers</a> (TechCrunch) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1533</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f37dc56c-b95d-11ee-adc6-b7aeffc25e4e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6804911443.mp3?updated=1712603122" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Selena Larson: The Green Goldfish and cyber threat intelligence. [Analyst] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/10/notes</link>
      <description>Cyber threat intelligence analyst Selena Larson takes us on her career journey from being a journalist to making the switch to industrial security. As a child who wrote a book about a green goldfish who dealt with bullying, Selena always liked investigating and researching things. Specializing in cybersecurity journalism led to the realization of how closely aligned or similar skills are required from an investigative journalist and a cyber threat intelligence analyst. Our thanks to Selena for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 07 Apr 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Selena Larson: The Green Goldfish and cyber threat intelligence. [Analyst] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cyber threat intelligence analyst Selena Larson takes us on her career journey from being a journalist to making the switch to industrial security. As a child who wrote a book about a green goldfish who dealt with bullying, Selena always liked investigating and researching things. Specializing in cybersecurity journalism led to the realization of how closely aligned or similar skills are required from an investigative journalist and a cyber threat intelligence analyst. Our thanks to Selena for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber threat intelligence analyst Selena Larson takes us on her career journey from being a journalist to making the switch to industrial security. As a child who wrote a book about a green goldfish who dealt with bullying, Selena always liked investigating and researching things. Specializing in cybersecurity journalism led to the realization of how closely aligned or similar skills are required from an investigative journalist and a cyber threat intelligence analyst. Our thanks to Selena for sharing her story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>460</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8419536e-f371-11ee-bd49-d79111573b6d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3439711983.mp3?updated=1712338195" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leaking your AWS API keys, on purpose? [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/324/notes</link>
      <description>Noah Pack, a SANS Internet Storm Center Intern, sits down to discuss research on "What happens when you accidentally leak your AWS API keys?" This research is a guest diary from Noah and shares a project he worked on after seeing an online video of someone who created a python script that emailed colleges asking for free swag to be shipped to him.
The research states "In this article, I will share some research, resources, and real-world data related to leaked AWS API keys." In this research, Noah shares what he learned while implementing his experiment.
The research can be found here:
What happens when you accidentally leak your AWS API keys? [Guest Diary]

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Apr 2024 07:00:00 -0000</pubDate>
      <itunes:title>Leaking your AWS API keys, on purpose? [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>324</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Noah Pack, a SANS Internet Storm Center Intern, sits down to discuss research on "What happens when you accidentally leak your AWS API keys?" This research is a guest diary from Noah and shares a project he worked on after seeing an online video of someone who created a python script that emailed colleges asking for free swag to be shipped to him.
The research states "In this article, I will share some research, resources, and real-world data related to leaked AWS API keys." In this research, Noah shares what he learned while implementing his experiment.
The research can be found here:
What happens when you accidentally leak your AWS API keys? [Guest Diary]

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Noah Pack, a SANS Internet Storm Center Intern, sits down to discuss research on "What happens when you accidentally leak your AWS API keys?" This research is a guest diary from Noah and shares a project he worked on after seeing an online video of someone who created a python script that emailed colleges asking for free swag to be shipped to him.</p><p>The research states "In this article, I will share some research, resources, and real-world data related to leaked AWS API keys." In this research, Noah shares what he learned while implementing his experiment.</p><p>The research can be found here:</p><ul><li><a href="https://isc.sans.edu/diary/What+happens+when+you+accidentally+leak+your+AWS+API+keys+Guest+Diary/30730">What happens when you accidentally leak your AWS API keys? [Guest Diary]</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1350</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3366e454-f38a-11ee-98fd-13602e2d96bb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5073413957.mp3?updated=1712345834" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Deciphering the Acuity cybersecurity incident.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2040/notes</link>
      <description>Acuity downplays its recent breach. IcedID gives way to a new malware strain. Russia arrests alleged credit card thieves. Wiz uncovers security flaws in Hugging Face AI models. NERC and the E-ISAC review lessons learned from simulated attacks on the electrical grid. UK police track honey traps targeting MPs. Microsoft says China is actively trying to influence US elections. A major global lens maker suffers a cyber attack.  Guest Dick O'Brien from the Symantec Threat Hunter Team shares how ransomware operators adapt to disruption. And SEO under threat of legal action. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Dick O'Brien from Symantec Threat Hunter Team by Broadcom shares how ransomware operators adapt to disruption. Get more details in the blog: Ransomware: Attacks Continue to Rise as Operators Adapt to Disruption.

Selected Reading
Acuity Responds to US Government Data Theft Claims, Says Hackers Obtained Old Info (SecurityWeek)
New Latrodectus malware replaces IcedID in network breaches (bleepingcomputer)
Magecart-style hackers charged by Russia in theft of 160,000 credit cards (The Record)
Wiz Discovers Flaws in GenAI Models Enabling Customer Data Theft (Infosecurity Magazine)
Lessons learned from electrical grid security exercise (nerc)
British police investigating ‘honey trap’ WhatsApp messages sent to MPs (The Record)
China is trying to influence US elections with AI, Microsoft claims (siliconrepublic)
Lens Maker Hoya Scrambling to Restore Systems Following Cyberattack (SecurityWeek)
A ‘Law Firm’ of AI Generated Lawyers Is Sending Fake Threats as an SEO Scam (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 05 Apr 2024 20:10:00 -0000</pubDate>
      <itunes:title>Deciphering the Acuity cybersecurity incident.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2040</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Acuity downplays its recent breach. IcedID gives way to a new malware strain. Russia arrests alleged credit card thieves. Wiz uncovers security flaws in Hugging Face AI models. NERC and the E-ISAC review lessons learned from simulated attacks on the electrical grid. UK police track honey traps targeting MPs. Microsoft says China is actively trying to influence US elections. A major global lens maker suffers a cyber attack.  Guest Dick O'Brien from the Symantec Threat Hunter Team shares how ransomware operators adapt to disruption. And SEO under threat of legal action. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Dick O'Brien from Symantec Threat Hunter Team by Broadcom shares how ransomware operators adapt to disruption. Get more details in the blog: Ransomware: Attacks Continue to Rise as Operators Adapt to Disruption.

Selected Reading
Acuity Responds to US Government Data Theft Claims, Says Hackers Obtained Old Info (SecurityWeek)
New Latrodectus malware replaces IcedID in network breaches (bleepingcomputer)
Magecart-style hackers charged by Russia in theft of 160,000 credit cards (The Record)
Wiz Discovers Flaws in GenAI Models Enabling Customer Data Theft (Infosecurity Magazine)
Lessons learned from electrical grid security exercise (nerc)
British police investigating ‘honey trap’ WhatsApp messages sent to MPs (The Record)
China is trying to influence US elections with AI, Microsoft claims (siliconrepublic)
Lens Maker Hoya Scrambling to Restore Systems Following Cyberattack (SecurityWeek)
A ‘Law Firm’ of AI Generated Lawyers Is Sending Fake Threats as an SEO Scam (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Acuity downplays its recent breach. IcedID gives way to a new malware strain. Russia arrests alleged credit card thieves. Wiz uncovers security flaws in Hugging Face AI models. NERC and the E-ISAC review lessons learned from simulated attacks on the electrical grid. UK police track honey traps targeting MPs. Microsoft says China is actively trying to influence US elections. A major global lens maker suffers a cyber attack.  Guest Dick O'Brien from the Symantec Threat Hunter Team shares how ransomware operators adapt to disruption. And SEO under threat of legal action. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/dicko1/">Dick O'Brien</a> from <a href="https://www.broadcom.com/">Symantec Threat Hunter Team by Broadcom</a> shares how ransomware operators adapt to disruption. Get more details in the blog: <a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ransomware-attacks-exploits">Ransomware: Attacks Continue to Rise as Operators Adapt to Disruption</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/acuity-responds-to-us-government-data-theft-claims-says-hackers-obtained-old-info/">Acuity Responds to US Government Data Theft Claims, Says Hackers Obtained Old Info</a><a href="https://www.securityweek.com/acuity-responds-to-us-government-data-theft-claims-says-hackers-obtained-old-info/"> (SecurityWeek</a>)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-latrodectus-malware-replaces-icedid-in-network-breaches/">New Latrodectus malware replaces IcedID in network breaches</a> (bleepingcomputer)</p><p><a href="https://therecord.media/russia-charges-alleged-magecart-style-hackers-credit-cards">Magecart-style hackers charged by Russia in theft of 160,000 credit cards</a> (The Record)</p><p><a href="https://www.infosecurity-magazine.com/news/wiz-discovers-flaws-generative-ai/">Wiz Discovers Flaws in GenAI Models Enabling Customer Data Theft</a><a href="https://www.infosecurity-magazine.com/news/wiz-discovers-flaws-generative-ai/"> (Infosecurity Magazine</a>)</p><p><a href="https://www.nerc.com/pa/CI/ESISAC/GridEx/GridEx%20VII%20Report.pdf">Lessons learned from electrical grid security exercise</a> (nerc)</p><p><a href="https://therecord.media/uk-police-honey-trap-whatsapp-investigation">British police investigating ‘honey trap’ WhatsApp messages sent to MPs</a> (The Record)</p><p><a href="https://www.siliconrepublic.com/enterprise/china-us-elections-ai-fake-social-media">China is trying to influence US elections with AI, Microsoft claims</a> (siliconrepublic)</p><p><a href="https://www.securityweek.com/lens-maker-hoya-scrambling-to-restore-systems-following-cyberattack/">Lens Maker Hoya Scrambling to Restore Systems Following Cyberattack</a><a href="https://www.securityweek.com/lens-maker-hoya-scrambling-to-restore-systems-following-cyberattack/"> (SecurityWeek</a>)</p><p><a href="https://www.404media.co/a-law-firm-of-ai-generated-lawyers-is-sending-fake-threats-as-an-seo-scam/">A ‘Law Firm’ of AI Generated Lawyers Is Sending Fake Threats as an SEO Scam</a> (404 Media)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1672</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f344f534-b95d-11ee-adc6-0f6f285166e5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9650950036.mp3?updated=1712341498" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Securing secrets: The State Department's cyber hunt.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2039/notes</link>
      <description>The State Department investigates an alleged breach. The FCC looks at regulating connected vehicles. A big-tech consortium hopes to mitigate AI-related job losses. Google aims to thwart cookie-thieves. SurveyLama exposes sensitive info of over four millions users. Omni Hotels &amp; Resorts is recovering from a cyberattack. A national cancer treatment center suffers a breach. How cyber is approached on both sides of the pond. In our Industry Voices segment , George Jones, CISO at Critical Start, discusses strategies for maximizing cybersecurity investments to achieve optimal risk reduction. Playing the identity theft long-game. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On Industry Voices, guest George Jones, CISO at Critical Start, joins us to share thoughts on the topic "Spend Smarter, Risk Less: Cybersecurity ROI Strategies for Security Leaders." George discusses strategies for maximizing cybersecurity investments to achieve optimal risk reduction. 

Selected Reading
Threat Actor Claims Classified Five Eyes Data Theft (Infosecurity Magazine)
Automakers and FCC square off over potential regulations for connected cars (The Record)
Big tech companies form new consortium to allay fears of AI job takeovers (TechCrunch)
Amazon is cutting hundreds of jobs in its cloud computing unit AWS (NPR)
Google Proposes Method for Stopping Multifactor Runaround (GovInfo Security)
Google fixes two Pixel zero-day flaws exploited by forensics firms (Bleeping Computer)
SurveyLama data breach exposes info of 4.4 million users (Bleeping Computer)
Omni Hotels confirms cyberattack behind ongoing IT outage (Bleeping Computer)
The US or the UK: Where Should You Get a Cybersecurity Job? (GovInfo Security)
US Cancer Center Data Breach Impacting 800,000 (SecurityWeek)
Iowa sysadmin pleads guilty to 33-year identity theft of former coworker (The Register) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 04 Apr 2024 20:10:00 -0000</pubDate>
      <itunes:title>Securing secrets: The State Department's cyber hunt.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2039</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The State Department investigates an alleged breach. The FCC looks at regulating connected vehicles. A big-tech consortium hopes to mitigate AI-related job losses. Google aims to thwart cookie-thieves. SurveyLama exposes sensitive info of over four millions users. Omni Hotels &amp; Resorts is recovering from a cyberattack. A national cancer treatment center suffers a breach. How cyber is approached on both sides of the pond. In our Industry Voices segment , George Jones, CISO at Critical Start, discusses strategies for maximizing cybersecurity investments to achieve optimal risk reduction. Playing the identity theft long-game. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On Industry Voices, guest George Jones, CISO at Critical Start, joins us to share thoughts on the topic "Spend Smarter, Risk Less: Cybersecurity ROI Strategies for Security Leaders." George discusses strategies for maximizing cybersecurity investments to achieve optimal risk reduction. 

Selected Reading
Threat Actor Claims Classified Five Eyes Data Theft (Infosecurity Magazine)
Automakers and FCC square off over potential regulations for connected cars (The Record)
Big tech companies form new consortium to allay fears of AI job takeovers (TechCrunch)
Amazon is cutting hundreds of jobs in its cloud computing unit AWS (NPR)
Google Proposes Method for Stopping Multifactor Runaround (GovInfo Security)
Google fixes two Pixel zero-day flaws exploited by forensics firms (Bleeping Computer)
SurveyLama data breach exposes info of 4.4 million users (Bleeping Computer)
Omni Hotels confirms cyberattack behind ongoing IT outage (Bleeping Computer)
The US or the UK: Where Should You Get a Cybersecurity Job? (GovInfo Security)
US Cancer Center Data Breach Impacting 800,000 (SecurityWeek)
Iowa sysadmin pleads guilty to 33-year identity theft of former coworker (The Register) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The State Department investigates an alleged breach. The FCC looks at regulating connected vehicles. A big-tech consortium hopes to mitigate AI-related job losses. Google aims to thwart cookie-thieves. SurveyLama exposes sensitive info of over four millions users. Omni Hotels &amp; Resorts is recovering from a cyberattack. A national cancer treatment center suffers a breach. How cyber is approached on both sides of the pond. In our Industry Voices segment , George Jones, CISO at Critical Start, discusses strategies for maximizing cybersecurity investments to achieve optimal risk reduction. Playing the identity theft long-game. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On Industry Voices, guest <a href="https://www.linkedin.com/in/georgejones512/">George Jones</a>, CISO at <a href="https://www.criticalstart.com/">Critical Start</a>, joins us to share thoughts on the topic "Spend Smarter, Risk Less: Cybersecurity ROI Strategies for Security Leaders." George discusses strategies for maximizing cybersecurity investments to achieve optimal risk reduction. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.infosecurity-magazine.com/news/threat-actor-classified-five-eyes/">Threat Actor Claims Classified Five Eyes Data Theft</a> (Infosecurity Magazine)</p><p><a href="https://therecord.media/fcc-automakers-connected-cars-regulation-mvnos">Automakers and FCC square off over potential regulations for connected cars</a> (The Record)</p><p><a href="https://techcrunch.com/2024/04/04/big-tech-companies-form-new-consortium-to-allay-fears-of-ai-job-takeovers/">Big tech companies form new consortium to allay fears of AI job takeovers</a> (TechCrunch)</p><p><a href="https://www.npr.org/2024/04/04/1242718244/amazon-cutting-jobs-cloud-computing">Amazon is cutting hundreds of jobs in its cloud computing unit AWS</a> (NPR)</p><p><a href="https://www.govinfosecurity.com/google-proposes-method-for-stopping-multifactor-runaround-a-24770">Google Proposes Method for Stopping Multifactor Runaround</a> (GovInfo Security)</p><p><a href="https://www.bleepingcomputer.com/news/security/google-fixes-two-pixel-zero-day-flaws-exploited-by-forensics-firms/">Google fixes two Pixel zero-day flaws exploited by forensics firms</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/surveylama-data-breach-exposes-info-of-44-million-users/">SurveyLama data breach exposes info of 4.4 million users</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/omni-hotels-confirms-cyberattack-behind-ongoing-it-outage/">Omni Hotels confirms cyberattack behind ongoing IT outage</a> (Bleeping Computer)</p><p><a href="https://www.govinfosecurity.com/blogs/us-or-uk-where-should-you-get-cybersecurity-job-p-3602">The US or the UK: Where Should You Get a Cybersecurity Job?</a> (GovInfo Security)</p><p><a href="https://www.securityweek.com/us-cancer-center-data-breach-impacting-800000/">US Cancer Center Data Breach Impacting 800,000</a> (SecurityWeek)</p><p><a href="https://www.theregister.com/2024/04/03/sysadmin_33_year_id_theft/">Iowa sysadmin pleads guilty to 33-year identity theft of former coworker</a> (The Register) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1993</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f30b8006-b95d-11ee-adc6-87af5ac15264]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9679439722.mp3?updated=1712256832" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Biden administration brings down the hammer. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2038/notes</link>
      <description>The Cyber Safety Review Board hands Microsoft a scathing report. Jackson County, Missouri declares a state of emergency following a ransomware attack. The concerning growth of Chinese brands in U.S. critical infrastructure. Malware campaigns make use of YouTube. OWASP issues a data breach warning. Trend Micro tracks LockBit’s faltering rebound. India’s government cloud service leaks personal data. ChatGPT jailbreaks spread on popular hacker forums. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's CISSP study journey and focus on the when and how of studying for Domain 1. And you can no longer just walk out of an Amazon grocery store. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's CISSP study journey and focus on the when and how of studying for Domain 1. 
Resources for this session: 
Effect of sunlight exposure on cognitive function among depressed and non-depressed participants: a REGARDS cross-sectional study

Selected Reading
Scathing federal report rips Microsoft for shoddy security, insincerity in response to Chinese hack (AP News)
Missouri county declares state of emergency amid suspected ransomware attack (Ars Technica)
Forescout research finds surge in Chinese-manufactured devices on US networks, including critical infrastructure (Industrial Cyber)
YouTube channels found using pirated video games as bait for malware campaign (The Record)
OWASP issues data breach alert after misconfigured server leaked member resumes (ITPro)
Trend Micro: LockBit ransomware gang's comeback is failing (TechTarget)
Indian government’s cloud spilled citizens’ personal data online for years (TechCrunch)
ChatGPT jailbreak prompts proliferate on hacker forums (SC Media)
Amazon Ditches 'Just Walk Out' Checkouts at Its Grocery Stores (Gizmodo) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 03 Apr 2024 20:10:00 -0000</pubDate>
      <itunes:title>Biden administration brings down the hammer. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2038</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The Cyber Safety Review Board hands Microsoft a scathing report. Jackson County, Missouri declares a state of emergency following a ransomware attack. The concerning growth of Chinese brands in U.S. critical infrastructure. Malware campaigns make use of YouTube. OWASP issues a data breach warning. Trend Micro tracks LockBit’s faltering rebound. India’s government cloud service leaks personal data. ChatGPT jailbreaks spread on popular hacker forums. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's CISSP study journey and focus on the when and how of studying for Domain 1. And you can no longer just walk out of an Amazon grocery store. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's CISSP study journey and focus on the when and how of studying for Domain 1. 
Resources for this session: 
Effect of sunlight exposure on cognitive function among depressed and non-depressed participants: a REGARDS cross-sectional study

Selected Reading
Scathing federal report rips Microsoft for shoddy security, insincerity in response to Chinese hack (AP News)
Missouri county declares state of emergency amid suspected ransomware attack (Ars Technica)
Forescout research finds surge in Chinese-manufactured devices on US networks, including critical infrastructure (Industrial Cyber)
YouTube channels found using pirated video games as bait for malware campaign (The Record)
OWASP issues data breach alert after misconfigured server leaked member resumes (ITPro)
Trend Micro: LockBit ransomware gang's comeback is failing (TechTarget)
Indian government’s cloud spilled citizens’ personal data online for years (TechCrunch)
ChatGPT jailbreak prompts proliferate on hacker forums (SC Media)
Amazon Ditches 'Just Walk Out' Checkouts at Its Grocery Stores (Gizmodo) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Cyber Safety Review Board hands Microsoft a scathing report. Jackson County, Missouri declares a state of emergency following a ransomware attack. The concerning growth of Chinese brands in U.S. critical infrastructure. Malware campaigns make use of YouTube. OWASP issues a data breach warning. Trend Micro tracks LockBit’s faltering rebound. India’s government cloud service leaks personal data. ChatGPT jailbreaks spread on popular hacker forums. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's CISSP study journey and focus on the when and how of studying for Domain 1. And you can no longer just walk out of an Amazon grocery store. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Learning Layer segment, host <a href="https://www.linkedin.com/in/sam-meisenberg/">Sam Meisenberg</a> and <a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a> continue their discussion of Joe's <a href="https://certify.cybervista.net/products/isc2/cissp-training-course/?utm_source=CWDP&amp;utm_medium=LL&amp;utm_campaign=HH_CISSP">CISSP study</a> journey and focus on the when and how of studying for Domain 1. </p><p>Resources for this session: </p><ul><li><a href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC2728098/">Effect of sunlight exposure on cognitive function among depressed and non-depressed participants: a REGARDS cross-sectional study</a></li></ul><p><br></p><h2>Selected Reading</h2><p><a href="https://apnews.com/article/microsoft-cybersecurity-hack-raimondo-breach-b0901a93cca2ffaf05edacbfb9ecf3da">Scathing federal report rips Microsoft for shoddy security, insincerity in response to Chinese hack</a> (AP News)</p><p><a href="https://arstechnica.com/security/2024/04/missouri-county-declares-state-of-emergency-amid-suspected-ransomware-attack/">Missouri county declares state of emergency amid suspected ransomware attack</a> (Ars Technica)</p><p><a href="https://industrialcyber.co/critical-infrastructure/forescout-research-finds-surge-in-chinese-manufactured-devices-on-us-networks-including-critical-infrastructure/">Forescout research finds surge in Chinese-manufactured devices on US networks, including critical infrastructure </a>(Industrial Cyber)</p><p><a href="https://therecord.media/youtube-infostealer-campaign-cracked-pirated-video-games">YouTube channels found using pirated video games as bait for malware campaign</a> (The Record)</p><p><a href="https://www.itpro.com/security/owasp-issues-data-breach-alert-after-misconfigured-server-leaked-member-resumes">OWASP issues data breach alert after misconfigured server leaked member resumes</a> (ITPro)</p><p><a href="https://www.techtarget.com/searchsecurity/news/366577762/Trend-Micro-LockBit-ransomware-gangs-comeback-is-failing">Trend Micro: LockBit ransomware gang's comeback is failing</a> (TechTarget)</p><p><a href="https://techcrunch.com/2024/04/02/indian-government-cloud-spilled-citizens-personal-data-online-for-years/">Indian government’s cloud spilled citizens’ personal data online for years</a> (TechCrunch)</p><p><a href="https://www.scmagazine.com/news/chatgpt-jailbreak-prompts-proliferate-on-hacker-forums">ChatGPT jailbreak prompts proliferate on hacker forums</a> (SC Media)</p><p><a href="https://gizmodo.com/amazon-reportedly-ditches-just-walk-out-grocery-stores-1851381116">Amazon Ditches 'Just Walk Out' Checkouts at Its Grocery Stores</a> (Gizmodo) </p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1610</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f2d2c2de-b95d-11ee-adc6-ab0edc1da128]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2459625997.mp3?updated=1712171504" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From lawsuit to logoff: Google's incognito mode makeover.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2037/notes</link>
      <description>Google agrees to delete billions of user records. NIST addresses the NVD backlog. India rescues hundreds of citizens from scam jobs in Cambodia. The UK and US agree to collaborate on AI safety. The FTC tracks an explosion in impersonation fraud. A PandaBuy breach exposes over 1.3 million customers. Prudential Financial informs over 36,000 customers of a data breach. A look at safeguarding sensitive data. Our guest is Jeff Reich, Executive Director of the Identity Defined Security Alliance (IDSA), with insights on identity security best practices. A dash of curiosity reveals a hotel chain vulnerability. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Jeff Reich, Executive Director of the Identity Defined Security Alliance (IDSA), sharing insights on identity security best practices, identity and access sprawl, and how Generative AI is helping and hurting identity management. The IDSA’s Identity Management Day 2024 is coming up on April 9, 2024.

Selected Reading
Google agreed to erase billions of browser records to settle a class action lawsuit (Security Affairs)
Vulnerability database backlog due to increased volume, changes in 'support,' NIST says (The Record)
India rescues 250 citizens enslaved by Cambodian cybercrime gang (Bleeping Computer)
The US and UK are teaming up to test the safety of AI models (Engadget)
Impersonation Scams Net Fraudsters $1.1bn in a Year ( Infosecurity Magazine)
PandaBuy data breach allegedly impacted +1.3M customers (Security Affairs)
Prudential Financial Data Breach Impacts 36,000 (SecurityWeek)
How to bridge the gap between the IT and legal staffs to better combat insider risk (SC Media)
IBIS hotel check-in terminal keypad-code leakage (Pentagrid AG)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Apr 2024 20:10:00 -0000</pubDate>
      <itunes:title>From lawsuit to logoff: Google's incognito mode makeover.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2037</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Google agrees to delete billions of user records. NIST addresses the NVD backlog. India rescues hundreds of citizens from scam jobs in Cambodia. The UK and US agree to collaborate on AI safety. The FTC tracks an explosion in impersonation fraud. A PandaBuy breach exposes over 1.3 million customers. Prudential Financial informs over 36,000 customers of a data breach. A look at safeguarding sensitive data. Our guest is Jeff Reich, Executive Director of the Identity Defined Security Alliance (IDSA), with insights on identity security best practices. A dash of curiosity reveals a hotel chain vulnerability. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Jeff Reich, Executive Director of the Identity Defined Security Alliance (IDSA), sharing insights on identity security best practices, identity and access sprawl, and how Generative AI is helping and hurting identity management. The IDSA’s Identity Management Day 2024 is coming up on April 9, 2024.

Selected Reading
Google agreed to erase billions of browser records to settle a class action lawsuit (Security Affairs)
Vulnerability database backlog due to increased volume, changes in 'support,' NIST says (The Record)
India rescues 250 citizens enslaved by Cambodian cybercrime gang (Bleeping Computer)
The US and UK are teaming up to test the safety of AI models (Engadget)
Impersonation Scams Net Fraudsters $1.1bn in a Year ( Infosecurity Magazine)
PandaBuy data breach allegedly impacted +1.3M customers (Security Affairs)
Prudential Financial Data Breach Impacts 36,000 (SecurityWeek)
How to bridge the gap between the IT and legal staffs to better combat insider risk (SC Media)
IBIS hotel check-in terminal keypad-code leakage (Pentagrid AG)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Google agrees to delete billions of user records. NIST addresses the NVD backlog. India rescues hundreds of citizens from scam jobs in Cambodia. The UK and US agree to collaborate on AI safety. The FTC tracks an explosion in impersonation fraud. A PandaBuy breach exposes over 1.3 million customers. Prudential Financial informs over 36,000 customers of a data breach. A look at safeguarding sensitive data. Our guest is Jeff Reich, Executive Director of the Identity Defined Security Alliance (IDSA), with insights on identity security best practices. A dash of curiosity reveals a hotel chain vulnerability. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/jreich/">Jeff Reich</a>, Executive Director of the <a href="https://www.idsalliance.org/">Identity Defined Security Alliance (IDSA)</a>, sharing insights on identity security best practices, identity and access sprawl, and how Generative AI is helping and hurting identity management. The IDSA’s <a href="https://www.idsalliance.org/event/identity-management-day-2024">Identity Management Day 2024</a> is coming up on April 9, 2024.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://securityaffairs.com/161384/laws-and-regulations/google-delete-incognito-mode-browsing-activity.html">Google agreed to erase billions of browser records to settle a class action lawsuit</a> (Security Affairs)</p><p><a href="https://therecord.media/vulnerability-database-backlog-nist-support">Vulnerability database backlog due to increased volume, changes in 'support,' NIST says</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/india-rescues-250-citizens-enslaved-by-cambodian-cybercrime-gang/">India rescues 250 citizens enslaved by Cambodian cybercrime gang</a> (Bleeping Computer)</p><p><a href="https://www.engadget.com/the-us-and-uk-are-teaming-up-to-test-the-safety-of-ai-models-063002266.html">The US and UK are teaming up to test the safety of AI models</a> (Engadget)</p><p><a href="https://www.infosecurity-magazine.com/news/impersonation-scams-net-fraudsters/">Impersonation Scams Net Fraudsters $1.1bn in a Year </a>( Infosecurity Magazine)</p><p><a href="https://securityaffairs.com/161355/data-breach/pandabuy-data-breach.html">PandaBuy data breach allegedly impacted +1.3M customers</a> (Security Affairs)</p><p><a href="https://www.securityweek.com/36000-impacted-by-prudential-financial-data-breach/">Prudential Financial Data Breach Impacts 36,000 </a>(SecurityWeek)</p><p><a href="https://www.scmagazine.com/perspective/how-to-bridge-the-gap-between-the-it-and-legal-around-insider-risk">How to bridge the gap between the IT and legal staffs to better combat insider risk</a> (SC Media)</p><p><a href="https://www.pentagrid.ch/en/blog/ibis-hotel-check-in-terminal-keypad-code-leakage/">IBIS hotel check-in terminal keypad-code leakage</a> (Pentagrid AG)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1849</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f299b2e6-b95d-11ee-adc6-abe84f651e06]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5650692499.mp3?updated=1712084124" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unmasking the xzploitation.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2036/notes</link>
      <description>The xz backdoor sets the open source community back on its heels. AT&amp;T resets passwords on millions of customer accounts. Researchers track a macOS infostealer. Poland investigates past internal use of Pegasus spyware. The latest Vultur banking trojan grows trickier than ever. We note the passing of a security legend. On our Solution Spotlight, N2K President Simone Petrella talks about “Bits, Bytes, and Loyalty: How to Improve Team Retention” with Yameen Huq of the Aspen Institute. A ghost ship trips Africa’s internet. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight, N2K President Simone Petrella talks about “Bits, Bytes, and Loyalty: How to Improve Team Retention” with Yameen Huq of the Aspen Institute.

Selected Reading
What we know about the xz Utils backdoor that almost infected the world (Ars Technica)
AT&amp;T resets account passcodes after millions of customer records leak online (TechCrunch)
Info stealer attacks target macOS users (Security Affairs)
Poland launches inquiry into previous government’s spyware use (The Guardian)
Vultur banking malware for Android poses as McAfee Security app (Bleeping Computer)
Ross Anderson, professor and famed author of ‘Security Engineering,’ passes away (The Record)
A Ghost Ship’s Doomed Journey Through the Gate of Tears (WIRED) 
Swapping scripts nightmare. (N2K)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 01 Apr 2024 20:10:00 -0000</pubDate>
      <itunes:title>Unmasking the xzploitation.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2036</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The xz backdoor sets the open source community back on its heels. AT&amp;T resets passwords on millions of customer accounts. Researchers track a macOS infostealer. Poland investigates past internal use of Pegasus spyware. The latest Vultur banking trojan grows trickier than ever. We note the passing of a security legend. On our Solution Spotlight, N2K President Simone Petrella talks about “Bits, Bytes, and Loyalty: How to Improve Team Retention” with Yameen Huq of the Aspen Institute. A ghost ship trips Africa’s internet. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight, N2K President Simone Petrella talks about “Bits, Bytes, and Loyalty: How to Improve Team Retention” with Yameen Huq of the Aspen Institute.

Selected Reading
What we know about the xz Utils backdoor that almost infected the world (Ars Technica)
AT&amp;T resets account passcodes after millions of customer records leak online (TechCrunch)
Info stealer attacks target macOS users (Security Affairs)
Poland launches inquiry into previous government’s spyware use (The Guardian)
Vultur banking malware for Android poses as McAfee Security app (Bleeping Computer)
Ross Anderson, professor and famed author of ‘Security Engineering,’ passes away (The Record)
A Ghost Ship’s Doomed Journey Through the Gate of Tears (WIRED) 
Swapping scripts nightmare. (N2K)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The xz backdoor sets the open source community back on its heels. AT&amp;T resets passwords on millions of customer accounts. Researchers track a macOS infostealer. Poland investigates past internal use of Pegasus spyware. The latest Vultur banking trojan grows trickier than ever. We note the passing of a security legend. On our Solution Spotlight, N2K President Simone Petrella talks about “Bits, Bytes, and Loyalty: How to Improve Team Retention” with Yameen Huq of the Aspen Institute. A ghost ship trips Africa’s internet.<strong> </strong></p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Solution Spotlight, N2K President <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a> talks about “<a href="https://www.aspendigital.org/report/bits-bytes-loyalty/">Bits, Bytes, and Loyalty: How to Improve Team Retention</a>” with <a href="https://www.linkedin.com/in/yameen-huq-8693442b/">Yameen Huq</a> of the <a href="https://www.aspeninstitute.org/">Aspen Institute</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://arstechnica.com/security/2024/04/what-we-know-about-the-xz-utils-backdoor-that-almost-infected-the-world/">What we know about the xz Utils backdoor that almost infected the world </a>(Ars Technica)</p><p><a href="https://techcrunch.com/2024/03/30/att-reset-account-passcodes-customer-data/">AT&amp;T resets account passcodes after millions of customer records leak online </a>(TechCrunch)</p><p><a href="https://securityaffairs.com/161287/malware/info-stealer-malware-macos.html">Info stealer attacks target macOS users</a> (Security Affairs)</p><p><a href="https://www.theguardian.com/world/2024/apr/01/poland-launches-inquiry-into-previous-governments-spyware-use">Poland launches inquiry into previous government’s spyware use</a> (The Guardian)</p><p><a href="https://www.bleepingcomputer.com/news/security/vultur-banking-malware-for-android-poses-as-mcafee-security-app/">Vultur banking malware for Android poses as McAfee Security app</a> (Bleeping Computer)</p><p><a href="https://therecord.media/ross-anderson-cambridge-professor-passes-away">Ross Anderson, professor and famed author of ‘Security Engineering,’ passes away</a> (The Record)</p><p><a href="https://www.wired.com/story/houthi-internet-cables-ship-anchor-path/">A Ghost Ship’s Doomed Journey Through the Gate of Tears</a> (WIRED) </p><p><a href="https://www.youtube.com/watch?v=XFdeHB5BCqg">Swapping scripts nightmare.</a> (N2K)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1757</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f25fb8de-b95d-11ee-adc6-6f48e8630295]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9754389852.mp3?updated=1711999610" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Liji Samuel: Leaping beyond the barrier. [Certification] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/156/notes</link>
      <description>Liji Samuel from NSA sits down to share her exciting career path through the years until she found a job working for as Chief of Standards and Certification at NSA's Cyber Collaboration Center. She starts by sharing that she had always wanted to work in the STEM field, explaining that growing up she was surrounded with older cousins who were choosing STEM careers and it became an interesting topic for her. She accounts working for a number of companies that helped her grow into the role she is in now. Cybersecurity became a big buzzword for her, causing her to step out of the agency into US cyber command to help take up a management position for the architecture and engineering division. From there, she continued her cybersecurity journey first as the exploration director before moving into where she is now. Liji shares that there were barriers along the way that she had to endure and hop over to get to the right path. She says "So there are challenges and barriers that come across constantly with our work. Um, one just has to pause and reflect on how we can work with it, around it, or influence like our stakeholders and jointly create a vision around it." We thank Liji for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 31 Mar 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Liji Samuel: Leaping beyond the barrier. [Certification] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>156</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Liji Samuel from NSA sits down to share her exciting career path through the years until she found a job working for as Chief of Standards and Certification at NSA's Cyber Collaboration Center. She starts by sharing that she had always wanted to work in the STEM field, explaining that growing up she was surrounded with older cousins who were choosing STEM careers and it became an interesting topic for her. She accounts working for a number of companies that helped her grow into the role she is in now. Cybersecurity became a big buzzword for her, causing her to step out of the agency into US cyber command to help take up a management position for the architecture and engineering division. From there, she continued her cybersecurity journey first as the exploration director before moving into where she is now. Liji shares that there were barriers along the way that she had to endure and hop over to get to the right path. She says "So there are challenges and barriers that come across constantly with our work. Um, one just has to pause and reflect on how we can work with it, around it, or influence like our stakeholders and jointly create a vision around it." We thank Liji for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Liji Samuel from NSA sits down to share her exciting career path through the years until she found a job working for as Chief of Standards and Certification at NSA's Cyber Collaboration Center. She starts by sharing that she had always wanted to work in the STEM field, explaining that growing up she was surrounded with older cousins who were choosing STEM careers and it became an interesting topic for her. She accounts working for a number of companies that helped her grow into the role she is in now. Cybersecurity became a big buzzword for her, causing her to step out of the agency into US cyber command to help take up a management position for the architecture and engineering division. From there, she continued her cybersecurity journey first as the exploration director before moving into where she is now. Liji shares that there were barriers along the way that she had to endure and hop over to get to the right path. She says "So there are challenges and barriers that come across constantly with our work. Um, one just has to pause and reflect on how we can work with it, around it, or influence like our stakeholders and jointly create a vision around it." We thank Liji for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>592</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f18de4c4-ec7c-11ee-bb2b-b752ca35aef3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9117585977.mp3?updated=1711573400" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The supply chain in disarray. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/323/notes</link>
      <description>Elad, a Senior Security Researcher from Cycode is sharing their research on "Cycode Discovers a Supply Chain Vulnerability in Bazel." This security flaw could let hackers inject harmful code, potentially affecting millions of projects and users, including Kubernetes, Angular, Uber, LinkedIn, Databricks, DropBox, Nvidia, Google, and many more.
The research states "We reported the vulnerability to Google via its Vulnerability Reward Program, where they acknowledged our discovery and proceeded to address and fix the vulnerable components."
Please take a moment to fill out an audience survey! Let us know how we are doing! 
The research can be found here:
Cycode Discovers a Supply Chain Vulnerability in Bazel

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Mar 2024 05:00:00 -0000</pubDate>
      <itunes:title>The supply chain in disarray. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>323</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Elad, a Senior Security Researcher from Cycode is sharing their research on "Cycode Discovers a Supply Chain Vulnerability in Bazel." This security flaw could let hackers inject harmful code, potentially affecting millions of projects and users, including Kubernetes, Angular, Uber, LinkedIn, Databricks, DropBox, Nvidia, Google, and many more.
The research states "We reported the vulnerability to Google via its Vulnerability Reward Program, where they acknowledged our discovery and proceeded to address and fix the vulnerable components."
Please take a moment to fill out an audience survey! Let us know how we are doing! 
The research can be found here:
Cycode Discovers a Supply Chain Vulnerability in Bazel

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Elad, a Senior Security Researcher from Cycode is sharing their research on "Cycode Discovers a Supply Chain Vulnerability in Bazel." This security flaw could let hackers inject harmful code, potentially affecting millions of projects and users, including Kubernetes, Angular, Uber, LinkedIn, Databricks, DropBox, Nvidia, Google, and many more.</p><p>The research states "We reported the vulnerability to Google via its Vulnerability Reward Program, where they acknowledged our discovery and proceeded to address and fix the vulnerable components."</p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em></p><p>The research can be found here:</p><ul><li><a href="https://cycode.com/blog/cycode-discovers-a-supply-chain-vulnerability-in-bazel/">Cycode Discovers a Supply Chain Vulnerability in Bazel</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>956</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c54dd802-edfc-11ee-b6d3-53c97a8b8763]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1830562181.mp3?updated=1711736097" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pentagon’s cybersecurity roadmap. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2035/notes</link>
      <description>The Pentagon unveils its cybersecurity roadmap. A major Massachusetts health insurer reveals a massive data breach. Hot Topic reports credential stuffing. Cisco warns of password spraying targeting VPNs. The FS-ISAC highlights the risk of generative AI to financial institutions. The FEC considers efforts to combat deceptive artificial intelligence. A look at Thread Hijacking attacks. Guests Linda Gray Martin and Britta Glade from RSA Conference join us to discuss what's new and what to look forward to at this year’s big show. Plus my conversation with Eric Goldstein, Executive Assistant Director for Cybersecurity at  CISA, with insights on their recent Notice of Proposed Rulemaking. And Baltimore’s tragic bridge collapse lays bare the degeneration of X-Twitter. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guests Linda Gray Martin, Senior Vice President for Operations, and Britta Glade, Vice President for Content and Curation, join us to discuss what's new and what to look forward to at RSA Conference 2024. This year’s theme is the Art of Possible. 
Also joining us is Eric Goldstein, Executive Assistant Director for Cybersecurity at  CISA, sharing their CIRCIA Notice of Proposed Rulemaking.

Selected Reading
Pentagon lays out strategy to improve defense industrial base cybersecurity (The Record)
Massachusetts Health Insurer Data Breach Impacts 2.8 Million (SecurityWeek)
American fast-fashion firm Hot Topic hit by credential stuffing attacks (Security Affairs)
Cisco Warns of Password Spraying Attacks Exploiting VPN Services (Cybersecurity News)
AI abuse and misinformation campaigns threaten financial institutions (Help Net Security)
Federal Elections Commission Considers Regulating AI (BankInfo Security)
Thread Hijacking: Phishes That Prey on Your Curiosity (Krebs on Security)
The slow death of X-Twitter is measured in disasters like the Baltimore bridge collapse (Vox)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 29 Mar 2024 20:00:00 -0000</pubDate>
      <itunes:title>Pentagon’s cybersecurity roadmap. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2035</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The Pentagon unveils its cybersecurity roadmap. A major Massachusetts health insurer reveals a massive data breach. Hot Topic reports credential stuffing. Cisco warns of password spraying targeting VPNs. The FS-ISAC highlights the risk of generative AI to financial institutions. The FEC considers efforts to combat deceptive artificial intelligence. A look at Thread Hijacking attacks. Guests Linda Gray Martin and Britta Glade from RSA Conference join us to discuss what's new and what to look forward to at this year’s big show. Plus my conversation with Eric Goldstein, Executive Assistant Director for Cybersecurity at  CISA, with insights on their recent Notice of Proposed Rulemaking. And Baltimore’s tragic bridge collapse lays bare the degeneration of X-Twitter. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guests Linda Gray Martin, Senior Vice President for Operations, and Britta Glade, Vice President for Content and Curation, join us to discuss what's new and what to look forward to at RSA Conference 2024. This year’s theme is the Art of Possible. 
Also joining us is Eric Goldstein, Executive Assistant Director for Cybersecurity at  CISA, sharing their CIRCIA Notice of Proposed Rulemaking.

Selected Reading
Pentagon lays out strategy to improve defense industrial base cybersecurity (The Record)
Massachusetts Health Insurer Data Breach Impacts 2.8 Million (SecurityWeek)
American fast-fashion firm Hot Topic hit by credential stuffing attacks (Security Affairs)
Cisco Warns of Password Spraying Attacks Exploiting VPN Services (Cybersecurity News)
AI abuse and misinformation campaigns threaten financial institutions (Help Net Security)
Federal Elections Commission Considers Regulating AI (BankInfo Security)
Thread Hijacking: Phishes That Prey on Your Curiosity (Krebs on Security)
The slow death of X-Twitter is measured in disasters like the Baltimore bridge collapse (Vox)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Pentagon unveils its cybersecurity roadmap. A major Massachusetts health insurer reveals a massive data breach. Hot Topic reports credential stuffing. Cisco warns of password spraying targeting VPNs. The FS-ISAC highlights the risk of generative AI to financial institutions. The FEC considers efforts to combat deceptive artificial intelligence. A look at Thread Hijacking attacks. Guests Linda Gray Martin and Britta Glade from RSA Conference join us to discuss what's new and what to look forward to at this year’s big show. Plus my conversation with Eric Goldstein, Executive Assistant Director for Cybersecurity at  CISA, with insights on their recent Notice of Proposed Rulemaking. And Baltimore’s tragic bridge collapse lays bare the degeneration of X-Twitter. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guests <a href="https://www.linkedin.com/in/linda-gray-martin-223708/">Linda Gray Martin</a>, Senior Vice President for Operations, and <a href="https://www.linkedin.com/in/britta-glade-5251003/">Britta Glade</a>, Vice President for Content and Curation, join us to discuss what's new and what to look forward to at <a href="https://www.rsaconference.com/usa">RSA Conference 2024</a>. This year’s theme is the <a href="https://www.rsaconference.com/about/themes">Art of Possible</a>. </p><p>Also joining us is <a href="https://www.linkedin.com/in/eric-goldstein-15658223/">Eric Goldstein</a>, Executive Assistant Director for Cybersecurity at  CISA, sharing their <a href="https://www.cisa.gov/news-events/news/cisa-marks-important-milestone-addressing-cyber-incidents-seeks-input-circia-notice-proposed">CIRCIA Notice of Proposed Rulemaking</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/pentagon-unveils-first-ever-defense-industrial-base-strategy">Pentagon lays out strategy to improve defense industrial base cybersecurity</a> (The Record)</p><p><a href="https://www.securityweek.com/massachusetts-health-insurer-data-breach-impacts-2-8-million/">Massachusetts Health Insurer Data Breach Impacts 2.8 Million </a>(SecurityWeek)</p><p><a href="https://securityaffairs.com/161192/data-breach/hot-topic-suffered-credential-stuffing-attacks.html">American fast-fashion firm Hot Topic hit by credential stuffing attacks</a> (Security Affairs)</p><p><a href="https://cybersecuritynews.com/password-spraying-exploiting-vpn-services/">Cisco Warns of Password Spraying Attacks Exploiting VPN Services</a> (Cybersecurity News)</p><p><a href="https://www.helpnetsecurity.com/2024/03/29/financial-firms-cyberthreats/">AI abuse and misinformation campaigns threaten financial institutions </a>(Help Net Security)</p><p><a href="https://www.bankinfosecurity.com/federal-elections-commission-considers-regulating-ai-a-24732">Federal Elections Commission Considers Regulating AI</a> (BankInfo Security)</p><p><a href="https://krebsonsecurity.com/2024/03/thread-hijacking-phishes-that-prey-on-your-curiosity/">Thread Hijacking: Phishes That Prey on Your Curiosity</a> (Krebs on Security)</p><p><a href="https://www.vox.com/technology/24113765/twitter-x-misinformation-baltimore-bridge-collapse">The slow death of X-Twitter is measured in disasters like the Baltimore bridge collapse</a> (Vox)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><h2><br></h2><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1963</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f2270840-b95d-11ee-adc6-cbbba49e761b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1161752898.mp3?updated=1711740241" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AWS in Orbit: Monitoring critical road infrastructure at scale with Alteia and the World Bank. [T-Minus AWS in Orbit]</title>
      <link>https://space.n2k.com/podcasts/t-minus/aws-in-orbit-3</link>
      <description>You can learn more about AWS in Orbit at space.n2k.com/aws.
Baptiste Tripard is the Chief Marketing Officer at Alteia. Aiga Stokenberga is the Senior Transport Economist at the World Bank.
We explore how Alteia and the World Bank are leveraging AWS's cloud, AI, and space capabilities to monitor critical road networks at scale to support large scale infrastructure investments. From road networks to bridges, they share real-world applications that are making a difference in emerging economies.
AWS in Orbit is a podcast collaboration between N2K and AWS to offer listeners an in-depth look at the transformative intersection of cloud computing, space technologies, and generative AI. You can learn more about AWS in Orbit at space.n2k.com/aws.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.
Selected Reading
AWS Aerospace and Satellite
AWS re:Invent
Alteia and the World Bank assess and enhance road infrastructure data quality at scale using AWS
Audience Survey
We want to hear from you! Please complete our short survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.
Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 29 Mar 2024 05:00:00 -0000</pubDate>
      <itunes:title>AWS in Orbit: Monitoring critical road infrastructure at scale with Alteia and the World Bank. [T-Minus AWS in Orbit]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/eeb405ee-ead8-11ee-b941-8780c695c397/image/4bd2f40b9acb61e27a84db61dae7caa8.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Alteia and the World Bank are leveraging AWS's cloud, AI, and space capabilities to monitor critical road networks to support infrastructure investments.</itunes:subtitle>
      <itunes:summary>You can learn more about AWS in Orbit at space.n2k.com/aws.
Baptiste Tripard is the Chief Marketing Officer at Alteia. Aiga Stokenberga is the Senior Transport Economist at the World Bank.
We explore how Alteia and the World Bank are leveraging AWS's cloud, AI, and space capabilities to monitor critical road networks at scale to support large scale infrastructure investments. From road networks to bridges, they share real-world applications that are making a difference in emerging economies.
AWS in Orbit is a podcast collaboration between N2K and AWS to offer listeners an in-depth look at the transformative intersection of cloud computing, space technologies, and generative AI. You can learn more about AWS in Orbit at space.n2k.com/aws.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.
Selected Reading
AWS Aerospace and Satellite
AWS re:Invent
Alteia and the World Bank assess and enhance road infrastructure data quality at scale using AWS
Audience Survey
We want to hear from you! Please complete our short survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.
Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>You can learn more about AWS in Orbit at <a href="https://space.n2k.com/aws">space.n2k.com/aws</a>.</p><p><a href="https://www.linkedin.com/in/baptiste-tripard-18825948/">Baptiste Tripard</a> is the Chief Marketing Officer at Alteia. <a href="https://www.linkedin.com/in/aiga-stokenberga-7143543b/">Aiga Stokenberga</a> is the Senior Transport Economist at the World Bank.</p><p>We explore how Alteia and the World Bank are leveraging AWS's cloud, AI, and space capabilities to monitor critical road networks at scale to support large scale infrastructure investments. From road networks to bridges, they share real-world applications that are making a difference in emerging economies.</p><p>AWS in Orbit is a podcast collaboration between N2K and AWS to offer listeners an in-depth look at the transformative intersection of cloud computing, space technologies, and generative AI. You can learn more about AWS in Orbit at <a href="https://space.n2k.com/aws">space.n2k.com/aws</a>.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our weekly intelligence roundup, <a href="https://space.n2k.com/newsletters/signals-and-space"><em>Signals and Space</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow T-Minus on <a href="https://www.linkedin.com/company/n2k-space/">LinkedIn</a> and <a href="https://www.instagram.com/n2kspace/">Instagram</a>.</p><h2>Selected Reading</h2><p><a href="https://aws.amazon.com/aerospace-and-satellite/?trk=c9d66aa7-01dc-4cbe-93b1-2c987a64a1d9&amp;sc_channel=el">AWS Aerospace and Satellite</a></p><p><a href="https://reinvent.awsevents.com/">AWS re:Invent</a></p><p><a href="https://aws.amazon.com/blogs/publicsector/alteia-and-the-world-bank-assess-and-enhance-road-infrastructure-at-scale-using-aws/">Alteia and the World Bank assess and enhance road infrastructure data quality at scale using AWS</a></p><h2>Audience Survey</h2><p>We want to hear from you! Please complete our <a href="https://www.surveymonkey.com/r/BL5NFPW">short survey</a>. It’ll help us get better and deliver you the most mission-critical space intel every day.</p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/ung56qbvknfbj9z2">media kit</a>. Contact us at <a href="mailto:space@n2k.com">space@n2k.com</a> to request more info.</p><h2>Want to join us for an interview?</h2><p>Please send your pitch to <a href="mailto:space-editor@n2k.com">space-editor@n2k.com</a> and include your name, affiliation, and topic proposal.</p><p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2326</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eeb405ee-ead8-11ee-b941-8780c695c397]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5205091407.mp3?updated=1712266795" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A battle against malware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2034/notes</link>
      <description>PyPI puts a temporary hold on operations. OMB outlines federal AI governance. Germany sounds the alarm on Microsoft Exchange server updates. Cisco patches potential denial of service vulnerabilities. The US puts a big bounty on BlackCat. Darcula and Tycoon are sophisticated phishing as a service platforms. Don’t dilly-dally on the latest Chrome update. On our Threat Vector segment, host David Moulton has guest Sam Rubin, VP and Global Head of Operations at Unit 42, to discuss Sam's testimony to the US Congress on the multifaceted landscape of ransomware attacks, AI, and automation, the need for more cybersecurity education. And Data brokers reveal alleged visitors to pedophile island. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On the Threat Vector segment, host David Moulton has guest Sam Rubin, VP and Global Head of Operations at Unit 42. They discuss Sam's testimony to the US Congress on the multifaceted landscape of ransomware attacks, AI, and automation, the need for more cybersecurity education and more. Listen to the full episode with David and Sam's in-depth discussion. Read Sam Rubin's testimony.

Selected Reading
PyPi Is Under Attack: Project Creation and User Registration Suspended (Malware News)
OMB Issues First Governmentwide AI Risk Mitigation Rules (GovInfo Security)
German cyber agency warns 17,000 Microsoft Exchange servers are vulnerable to critical bugs (The Record)
Cisco Patches DoS Vulnerabilities in Networking Products (Security Week)
US offers a $10 million bounty for information on UnitedHealth hackers (ITPro)
IPhone Users Beware! Darcula Phishing Service Attacking Via IMessage (GB Hackers)
Tycoon 2FA, the popular phishing kit built to bypass Microsoft and Gmail 2FA security protections, just got a major upgrade — and it’s now even harder to detect (ITPro)
Update Chrome now! Google patches possible drive-by vulnerability (Malwarebytes)
Jeffrey Epstein's Island Visitors Exposed by Data Broker (WIRED) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2024 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 28 Mar 2024 20:10:00 -0000</pubDate>
      <itunes:title>A battle against malware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2034</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>PyPI puts a temporary hold on operations. OMB outlines federal AI governance. Germany sounds the alarm on Microsoft Exchange server updates. Cisco patches potential denial of service vulnerabilities. The US puts a big bounty on BlackCat. Darcula and Tycoon are sophisticated phishing as a service platforms. Don’t dilly-dally on the latest Chrome update. On our Threat Vector segment, host David Moulton has guest Sam Rubin, VP and Global Head of Operations at Unit 42, to discuss Sam's testimony to the US Congress on the multifaceted landscape of ransomware attacks, AI, and automation, the need for more cybersecurity education. And Data brokers reveal alleged visitors to pedophile island. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On the Threat Vector segment, host David Moulton has guest Sam Rubin, VP and Global Head of Operations at Unit 42. They discuss Sam's testimony to the US Congress on the multifaceted landscape of ransomware attacks, AI, and automation, the need for more cybersecurity education and more. Listen to the full episode with David and Sam's in-depth discussion. Read Sam Rubin's testimony.

Selected Reading
PyPi Is Under Attack: Project Creation and User Registration Suspended (Malware News)
OMB Issues First Governmentwide AI Risk Mitigation Rules (GovInfo Security)
German cyber agency warns 17,000 Microsoft Exchange servers are vulnerable to critical bugs (The Record)
Cisco Patches DoS Vulnerabilities in Networking Products (Security Week)
US offers a $10 million bounty for information on UnitedHealth hackers (ITPro)
IPhone Users Beware! Darcula Phishing Service Attacking Via IMessage (GB Hackers)
Tycoon 2FA, the popular phishing kit built to bypass Microsoft and Gmail 2FA security protections, just got a major upgrade — and it’s now even harder to detect (ITPro)
Update Chrome now! Google patches possible drive-by vulnerability (Malwarebytes)
Jeffrey Epstein's Island Visitors Exposed by Data Broker (WIRED) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2024 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>PyPI puts a temporary hold on operations. OMB outlines federal AI governance. Germany sounds the alarm on Microsoft Exchange server updates. Cisco patches potential denial of service vulnerabilities. The US puts a big bounty on BlackCat. Darcula and Tycoon are sophisticated phishing as a service platforms. Don’t dilly-dally on the latest Chrome update. On our Threat Vector segment, host David Moulton has guest Sam Rubin, VP and Global Head of Operations at Unit 42, to discuss Sam's testimony to the US Congress on the multifaceted landscape of ransomware attacks, AI, and automation, the need for more cybersecurity education. And Data brokers reveal alleged visitors to pedophile island. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On the Threat Vector segment, host<a href="https://www.linkedin.com/in/davidrmoulton/"> David Moulton</a> has guest<a href="https://www.linkedin.com/in/samsrubin/"> Sam Rubin</a>, VP and Global Head of Operations at<a href="https://unit42.paloaltonetworks.com/"> Unit 42</a>. They discuss Sam's testimony to the US Congress on the multifaceted landscape of ransomware attacks, AI, and automation, the need for more cybersecurity education and more. Listen to the<a href="https://thecyberwire.com/podcasts/threat-vector/18/notes"> full episode</a> with David and Sam's in-depth discussion.<a href="https://oversight.house.gov/wp-content/uploads/2023/09/Sam-Rubin-Testimony-Palo-Alto-Networks.pdf"> Read Sam Rubin's testimony</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://malware.news/t/pypi-is-under-attack-project-creation-and-user-registration-suspended/80193">PyPi Is Under Attack: Project Creation and User Registration Suspended</a> (Malware News)</p><p><a href="https://www.govinfosecurity.com/omb-issues-first-governmentwide-ai-risk-mitigation-rules-a-24723">OMB Issues First Governmentwide AI Risk Mitigation Rules</a> (GovInfo Security)</p><p><a href="https://therecord.media/germany-bsi-microsoft-exchange-vulnerability-warning">German cyber agency warns 17,000 Microsoft Exchange servers are vulnerable to critical bugs</a> (The Record)</p><p><a href="https://www.securityweek.com/cisco-patches-dos-vulnerabilities-in-networking-products/">Cisco Patches DoS Vulnerabilities in Networking Products</a> (Security Week)</p><p><a href="https://www.itpro.com/security/ransomware/us-offers-a-dollar10-million-bounty-for-information-on-unitedhealth-hackers">US offers a $10 million bounty for information on UnitedHealth hackers</a> (ITPro)</p><p><a href="https://gbhackers.com/iphone-users-darcula-phishing-imessage/">IPhone Users Beware! Darcula Phishing Service Attacking Via IMessage</a> (GB Hackers)</p><p><a href="https://www.itpro.com/security/tycoon-2fa-the-popular-phishing-kit-built-to-bypass-microsoft-and-gmail-2fa-security-protections-just-got-a-major-upgrade-and-its-now-even-harder-to-detect">Tycoon 2FA, the popular phishing kit built to bypass Microsoft and Gmail 2FA security protections, just got a major upgrade — and it’s now even harder to detect</a> (ITPro)</p><p><a href="https://www.malwarebytes.com/blog/news/2024/03/update-chrome-now-google-patches-possible-drive-by-vulnerability">Update Chrome now! Google patches possible drive-by vulnerability</a> (Malwarebytes)</p><p><a href="https://www.wired.com/story/jeffrey-epstein-island-visitors-data-broker-leak/">Jeffrey Epstein's Island Visitors Exposed by Data Broker</a> (WIRED) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2024 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1616</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f1ef08b4-b95d-11ee-adc6-eb7dee50c926]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8427244714.mp3?updated=1711741173" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jennifer Walsmith: Pioneering and defining possible. [Cyber Solutions] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/63/notes</link>
      <description>Vice President for Cyber and Information Solutions within Mission Systems at Northrop Grumman, Jennifer Walsmith takes us on her pioneering career journey. Following in her father's footsteps at the National Security Agency, Jennifer began her career out of high school in computer systems analysis. Jennifer notes she saw the value of a college degree and at her parents' urging attended night school. She completed her bachelors in computer science at University of Maryland, Baltimore County with the support of the NSA. Jennifer talks about the support of her team at NSA where she was one of the first women to have a career and a family, raising two children while working. Upon retirement from government service, Jennifer chose an organization with values that closely matched her own and uses her position to help her team define possible where they sometimes think they can't. We thank Jennifer for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 28 Mar 2024 07:00:00 -0000</pubDate>
      <itunes:title>Jennifer Walsmith: Pioneering and defining possible. [Cyber Solutions] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>63</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Vice President for Cyber and Information Solutions within Mission Systems at Northrop Grumman, Jennifer Walsmith takes us on her pioneering career journey. </itunes:subtitle>
      <itunes:summary>Vice President for Cyber and Information Solutions within Mission Systems at Northrop Grumman, Jennifer Walsmith takes us on her pioneering career journey. Following in her father's footsteps at the National Security Agency, Jennifer began her career out of high school in computer systems analysis. Jennifer notes she saw the value of a college degree and at her parents' urging attended night school. She completed her bachelors in computer science at University of Maryland, Baltimore County with the support of the NSA. Jennifer talks about the support of her team at NSA where she was one of the first women to have a career and a family, raising two children while working. Upon retirement from government service, Jennifer chose an organization with values that closely matched her own and uses her position to help her team define possible where they sometimes think they can't. We thank Jennifer for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Vice President for Cyber and Information Solutions within Mission Systems at Northrop Grumman, Jennifer Walsmith takes us on her pioneering career journey. Following in her father's footsteps at the National Security Agency, Jennifer began her career out of high school in computer systems analysis. Jennifer notes she saw the value of a college degree and at her parents' urging attended night school. She completed her bachelors in computer science at University of Maryland, Baltimore County with the support of the NSA. Jennifer talks about the support of her team at NSA where she was one of the first women to have a career and a family, raising two children while working. Upon retirement from government service, Jennifer chose an organization with values that closely matched her own and uses her position to help her team define possible where they sometimes think they can't. We thank Jennifer for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>459</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b5ef6ee-eac2-11ee-88a0-0710940fcc29]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5226812548.mp3?updated=1629299980" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>If there's something strange in your neighborhood, don't call Facebook.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2033/notes</link>
      <description>Facebook's Secret Mission to Unmask Snapchat. The White House wants AI audits. Hackers exploit the open-source Ray AI framework. Finnish Police ID those responsible for the 2021 parliament breach. Operation FlightNight targets Indian government and energy sectors. Chinese APT groups target ASEAN entities. A notorious robocaller is rung up for nearly ten million dollars. In our latest Learning Layer, join Sam Meisenberg as he unpacks the intricacies of the CISSP diagnostic with Joe Carrigan from Johns Hopkins University. And Ann Johnson from Microsoft's Afternoon Cyber Tea visits the world of Smashing Security with Graham Cluley and Carole Theriault . And the UK’s watchers need watching.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guests
Join us for part three as this Learning Layer special series continues. Learning Layer host Sam Meisenberg talks with Joe Carrigan from Johns Hopkins University Information Security Institute, and co-host of Hacking Humans podcast. In this segment, they continue to discuss the results of Joe's CISSP diagnostic and dive deep into one of the assessment questions. Learn more about ISC2’s Certified Information Systems Security Professional (CISSP) certification, and explore our online certification courses, practice tests, and labs that ensure that you’re ready for exam day.
Microsoft Security’s Ann Johnson, host of the Afternoon Cyber Tea podcast, goes inside the Smashing Security podcast with Graham Cluley and Carole Theriault. 
Selected Reading
Facebook snooped on users’ Snapchat traffic in secret project, documents reveal (TechCrunch)
NTIA Pushes for Independent Audits of AI Systems (GovInfo Security)
Thousands of companies using Ray framework exposed to cyberattacks, researchers say (The Record)
Finland confirms APT31 hackers behind 2021 parliament breach (BleepingComputer)
Operation FlightNight: Indian Government Entities and Energy Sector Targeted by Cyber Espionage Campaign (EclecticIQ)
Chinese Hackers Target ASEAN Entities in Espionage Campaign (Infosecurity Magazine)
Federal Court Enters $9.9M Penalty and Injunction Against Man Found to Have Caused Thousands of Unlawful Spoofed Robocalls (US Department of Justice)
UK counter-eavesdropping agency gets slap on the wrist for eavesdropping (The Record) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 27 Mar 2024 20:10:00 -0000</pubDate>
      <itunes:title>If there's something strange in your neighborhood, don't call Facebook.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2033</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Facebook's Secret Mission to Unmask Snapchat. The White House wants AI audits. Hackers exploit the open-source Ray AI framework. Finnish Police ID those responsible for the 2021 parliament breach. Operation FlightNight targets Indian government and energy sectors. Chinese APT groups target ASEAN entities. A notorious robocaller is rung up for nearly ten million dollars. In our latest Learning Layer, join Sam Meisenberg as he unpacks the intricacies of the CISSP diagnostic with Joe Carrigan from Johns Hopkins University. And Ann Johnson from Microsoft's Afternoon Cyber Tea visits the world of Smashing Security with Graham Cluley and Carole Theriault . And the UK’s watchers need watching.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guests
Join us for part three as this Learning Layer special series continues. Learning Layer host Sam Meisenberg talks with Joe Carrigan from Johns Hopkins University Information Security Institute, and co-host of Hacking Humans podcast. In this segment, they continue to discuss the results of Joe's CISSP diagnostic and dive deep into one of the assessment questions. Learn more about ISC2’s Certified Information Systems Security Professional (CISSP) certification, and explore our online certification courses, practice tests, and labs that ensure that you’re ready for exam day.
Microsoft Security’s Ann Johnson, host of the Afternoon Cyber Tea podcast, goes inside the Smashing Security podcast with Graham Cluley and Carole Theriault. 
Selected Reading
Facebook snooped on users’ Snapchat traffic in secret project, documents reveal (TechCrunch)
NTIA Pushes for Independent Audits of AI Systems (GovInfo Security)
Thousands of companies using Ray framework exposed to cyberattacks, researchers say (The Record)
Finland confirms APT31 hackers behind 2021 parliament breach (BleepingComputer)
Operation FlightNight: Indian Government Entities and Energy Sector Targeted by Cyber Espionage Campaign (EclecticIQ)
Chinese Hackers Target ASEAN Entities in Espionage Campaign (Infosecurity Magazine)
Federal Court Enters $9.9M Penalty and Injunction Against Man Found to Have Caused Thousands of Unlawful Spoofed Robocalls (US Department of Justice)
UK counter-eavesdropping agency gets slap on the wrist for eavesdropping (The Record) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Facebook's Secret Mission to Unmask Snapchat. The White House wants AI audits. Hackers exploit the open-source Ray AI framework. Finnish Police ID those responsible for the 2021 parliament breach. Operation FlightNight targets Indian government and energy sectors. Chinese APT groups target ASEAN entities. A notorious robocaller is rung up for nearly ten million dollars. In our latest Learning Layer, join Sam Meisenberg as he unpacks the intricacies of the CISSP diagnostic with Joe Carrigan from Johns Hopkins University. And Ann Johnson from Microsoft's Afternoon Cyber Tea visits the world of Smashing Security with Graham Cluley and Carole Theriault . And the UK’s watchers need watching.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guests</h2><p>Join us for part three as this Learning Layer special series continues. Learning Layer host<a href="https://www.linkedin.com/in/sam-meisenberg/"> Sam Meisenberg</a> talks with<a href="https://www.linkedin.com/in/joecarrigan/"> Joe Carrigan</a> from<a href="https://isi.jhu.edu/"> Johns Hopkins University Information Security Institute</a>, and co-host of<a href="https://thecyberwire.com/podcasts/hacking-humans"> Hacking Humans</a> podcast. In this segment, they continue to discuss the results of Joe's CISSP diagnostic and dive deep into one of the assessment questions. Learn more about ISC2’s <a href="https://certify.cybervista.net/products/isc2/cissp-training-course/?utm_source=CWDP&amp;utm_medium=LL&amp;utm_campaign=HH_CISSP">Certified Information Systems Security Professional (CISSP) certification</a>, and explore our online certification courses, practice tests, and labs that ensure that you’re ready for exam day.</p><p><a href="https://www.microsoft.com/en-us/security">Microsoft Security</a>’s <a href="https://www.linkedin.com/in/ann-johnsons/">Ann Johnson</a>, host of the <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea</a> podcast, goes inside the <a href="https://www.smashingsecurity.com/">Smashing Security</a> podcast with <a href="https://www.linkedin.com/in/grahamcluley/">Graham Cluley</a> and <a href="https://www.linkedin.com/in/caroletheriault/">Carole Theriault</a>. </p><h2>Selected Reading</h2><p><a href="https://techcrunch.com/2024/03/26/facebook-secret-project-snooped-snapchat-user-traffic/">Facebook snooped on users’ Snapchat traffic in secret project, documents reveal</a> (TechCrunch)</p><p><a href="https://www.govinfosecurity.com/ntia-pushes-for-independent-audits-ai-systems-a-24715">NTIA Pushes for Independent Audits of AI Systems</a> (GovInfo Security)</p><p><a href="https://therecord.media/thousands-exposed-to-ray-framework-vulnerability">Thousands of companies using Ray framework exposed to cyberattacks, researchers say</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/finland-confirms-apt31-hackers-behind-2021-parliament-breach/">Finland confirms APT31 hackers behind 2021 parliament breach</a> (BleepingComputer)</p><p><a href="https://blog.eclecticiq.com/operation-flightnight-indian-government-entities-and-energy-sector-targeted-by-cyber-espionage-campaign">Operation FlightNight: Indian Government Entities and Energy Sector Targeted by Cyber Espionage Campaign</a> (EclecticIQ)</p><p><a href="https://www.infosecurity-magazine.com/news/chinese-apt-asean-entities/">Chinese Hackers Target ASEAN Entities in Espionage Campaign </a>(Infosecurity Magazine)</p><p><a href="https://www.justice.gov/opa/pr/federal-court-enters-99m-penalty-and-injunction-against-man-found-have-caused-thousands">Federal Court Enters $9.9M Penalty and Injunction Against Man Found to Have Caused Thousands of Unlawful Spoofed Robocalls</a> (US Department of Justice)</p><p><a href="https://therecord.media/uk-nace-unlawful-surveillance-journalistic-source">UK counter-eavesdropping agency gets slap on the wrist for eavesdropping</a> (The Record) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1911</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f1b614d2-b95d-11ee-adc6-bbff52ac5630]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4613572615.mp3?updated=1711652387" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exposing Muddled Libra's meticulous tactics with Incident Responder Stephanie Regan [Threat Vector]</title>
      <link>https://thecyberwire.com/podcasts/threat-vector/3/notes</link>
      <description>In honor of Women's History Month, please enjoy this episode of the Palo Alto Networks Unit 42's Threat Vector podcast featuring host David Moulton's discussion with Jacqueline Wudyka about the SEC's Cybersecurity Law.

In this episode, join host David Moulton as he speaks with Stephanie Regan, a senior consultant at Unit 42. Stephanie, with a background in law enforcement, specializes in compromise assessment and incident response. Discover her insights into combating the Muddled Libra threat group and similar adversaries.
Stephanie highlights the crucial role of reconnaissance in investigations and the importance of strong multi-factor authentication (MFA) to counter phishing and social engineering attacks. She delves into techniques like domain typo squatting and shares how domain monitoring can thwart attackers.
Learn how Unit 42 assists clients in recovering from attacks, especially those by Muddled Libra. Stephanie emphasizes rapid response and coordination, including using out-of-band communications to outmaneuver threat actors.

You can learn more about Muddled Libra at
https://unit42.paloaltonetworks.com/muddled-libra/ where Kristopher was the lead author for the Threat Group Assessment: Muddled Libra.

Join the conversation on our social media channels:
Website: ⁠https://www.paloaltonetworks.com/unit42⁠
Threat Research: ⁠https://unit42.paloaltonetworks.com/⁠
Facebook: ⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠
LinkedIn: ⁠https://www.linkedin.com/company/unit42/⁠
YouTube: ⁠@PaloAltoNetworksUnit42⁠
Twitter: ⁠https://twitter.com/PaloAltoNtwks⁠

About Threat Vector
Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.

PALO ALTO NETWORKS
Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 27 Mar 2024 04:00:00 -0000</pubDate>
      <itunes:title>Exposing Muddled Libra's meticulous tactics with Incident Responder Stephanie Regan [Threat Vector]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/770f2f3c-e15f-11ee-85f4-e75e92fbe244/image/d5251fa8d553eda3dc86019792e0d060.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In honor of Women's History Month, please enjoy this episode of the Palo Alto Networks Unit 42's Threat Vector podcast featuring host David Moulton's discussion with Jacqueline Wudyka about the SEC's Cybersecurity Law.

In this episode, join host David Moulton as he speaks with Stephanie Regan, a senior consultant at Unit 42. Stephanie, with a background in law enforcement, specializes in compromise assessment and incident response. Discover her insights into combating the Muddled Libra threat group and similar adversaries.
Stephanie highlights the crucial role of reconnaissance in investigations and the importance of strong multi-factor authentication (MFA) to counter phishing and social engineering attacks. She delves into techniques like domain typo squatting and shares how domain monitoring can thwart attackers.
Learn how Unit 42 assists clients in recovering from attacks, especially those by Muddled Libra. Stephanie emphasizes rapid response and coordination, including using out-of-band communications to outmaneuver threat actors.

You can learn more about Muddled Libra at
https://unit42.paloaltonetworks.com/muddled-libra/ where Kristopher was the lead author for the Threat Group Assessment: Muddled Libra.

Join the conversation on our social media channels:
Website: ⁠https://www.paloaltonetworks.com/unit42⁠
Threat Research: ⁠https://unit42.paloaltonetworks.com/⁠
Facebook: ⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠
LinkedIn: ⁠https://www.linkedin.com/company/unit42/⁠
YouTube: ⁠@PaloAltoNetworksUnit42⁠
Twitter: ⁠https://twitter.com/PaloAltoNtwks⁠

About Threat Vector
Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.

PALO ALTO NETWORKS
Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong><em>In honor of Women's History Month, please enjoy this episode of the Palo Alto Networks Unit 42's Threat Vector podcast featuring host David Moulton's discussion with Jacqueline Wudyka about the SEC's Cybersecurity Law.</em></strong></p><p><br></p><p><strong><em></em></strong>In this episode, join host David Moulton as he speaks with Stephanie Regan, a senior consultant at Unit 42. Stephanie, with a background in law enforcement, specializes in compromise assessment and incident response. Discover her insights into combating the Muddled Libra threat group and similar adversaries.</p><p>Stephanie highlights the crucial role of reconnaissance in investigations and the importance of strong multi-factor authentication (MFA) to counter phishing and social engineering attacks. She delves into techniques like domain typo squatting and shares how domain monitoring can thwart attackers.</p><p>Learn how Unit 42 assists clients in recovering from attacks, especially those by Muddled Libra. Stephanie emphasizes rapid response and coordination, including using out-of-band communications to outmaneuver threat actors.</p><p><br></p><h3>You can learn more about Muddled Libra at</h3><p>https://unit42.paloaltonetworks.com/muddled-libra/ where Kristopher was the lead author for the Threat Group Assessment: Muddled Libra.</p><p><br></p><h3><strong>Join the conversation on our social media channels:</strong></h3><p>Website: <a href="https://www.paloaltonetworks.com/unit42">⁠https://www.paloaltonetworks.com/unit42⁠</a></p><p>Threat Research: <a href="https://unit42.paloaltonetworks.com/">⁠https://unit42.paloaltonetworks.com/⁠</a></p><p>Facebook: <a href="https://www.facebook.com/LifeatPaloAltoNetworks/">⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠</a></p><p>LinkedIn: <a href="https://www.linkedin.com/company/unit42/">⁠https://www.linkedin.com/company/unit42/⁠</a></p><p>YouTube: <a href="https://www.youtube.com/channel/UCvJQO11qoCHYwZ4Ah4Jf-Tw">⁠@PaloAltoNetworksUnit42⁠</a></p><p>Twitter: <a href="https://twitter.com/PaloAltoNtwks">⁠https://twitter.com/PaloAltoNtwks⁠</a></p><p><br></p><h3><strong>About Threat Vector</strong></h3><p><em>Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.</em></p><h3><br></h3><h3><strong>PALO ALTO NETWORKS</strong></h3><p>Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. <a href="http://paloaltonetworks.com/">⁠http://paloaltonetworks.com⁠</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>466</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8b4517af-183c-4d11-bcfd-6cbc1ced2d0c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9843233424.mp3?updated=1744827385" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The great firewall breached: China's covert cyber assault on America exposed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2032/notes</link>
      <description>An alleged sinister hacking plot by China. CISA and the FBI issued a 'secure-by-design' alert. Ransomware hits municipalities in Florida and Texas. The EU sets regulations to safeguard the upcoming European Parliament elections. ReversingLabs describe a suspicious NuGet package. Senator Bill Cassidy questions a costly breach at HHS. A data center landlord sues over requests to reveal its customers. On our Industry Voices segment, Jason Kikta, CISO &amp; Senior Vice President of Product at Automox, discusses ways to increase IT efficiency while avoiding tool overload &amp; complexity. And Google's AI Throws Users a Malicious Bone.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, Jason Kikta, CISO &amp; Senior Vice President of Product at Automox, discusses ways to increase IT efficiency including automation &amp; tool streamlining, IT automation/automated patching, and tool overload &amp; complexity. You can learn more in Automox’s 2024 State of IT Operations Research Report.

Selected Reading
Millions of Americans caught up in Chinese hacking plot (BBC)
US Government Urges Software Makers to Eliminate SQL Injection Vulnerabilities (SecurityWeek)
CISA adds FortiClient EMS, Ivanti EPM CSA, Nice Linear eMerge E3-Series bugs to its Known Exploited Vulnerabilities catalog (Security Affairs)
St. Cloud most recent in string of Florida cities hit with ransomware (The Record)
Hackers demand $700K in ransomware attack on Tarrant Appraisal District (MSN)
The impact of compromised backups on ransomware outcomes (Sophos News)
EU sets rules for Big Tech to tackle interference in European Parliament elections (The Record)
Suspicious NuGet package grabs data from industrial systems (ReversingLabs)
Senator demands answers from HHS about $7.5 million cyber theft in 2023 (The Record)
Data center landlord refuses Fairfax County demand for tenant information (Washington Business Journal)
Google's AI-powered search feature recommends malicious sites, including scams and malware (TechSpot)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Mar 2024 20:30:00 -0000</pubDate>
      <itunes:title>The great firewall breached: China's covert cyber assault on America exposed.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2032</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>An alleged sinister hacking plot by China. CISA and the FBI issued a 'secure-by-design' alert. Ransomware hits municipalities in Florida and Texas. The EU sets regulations to safeguard the upcoming European Parliament elections. ReversingLabs describe a suspicious NuGet package. Senator Bill Cassidy questions a costly breach at HHS. A data center landlord sues over requests to reveal its customers. On our Industry Voices segment, Jason Kikta, CISO &amp; Senior Vice President of Product at Automox, discusses ways to increase IT efficiency while avoiding tool overload &amp; complexity. And Google's AI Throws Users a Malicious Bone.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, Jason Kikta, CISO &amp; Senior Vice President of Product at Automox, discusses ways to increase IT efficiency including automation &amp; tool streamlining, IT automation/automated patching, and tool overload &amp; complexity. You can learn more in Automox’s 2024 State of IT Operations Research Report.

Selected Reading
Millions of Americans caught up in Chinese hacking plot (BBC)
US Government Urges Software Makers to Eliminate SQL Injection Vulnerabilities (SecurityWeek)
CISA adds FortiClient EMS, Ivanti EPM CSA, Nice Linear eMerge E3-Series bugs to its Known Exploited Vulnerabilities catalog (Security Affairs)
St. Cloud most recent in string of Florida cities hit with ransomware (The Record)
Hackers demand $700K in ransomware attack on Tarrant Appraisal District (MSN)
The impact of compromised backups on ransomware outcomes (Sophos News)
EU sets rules for Big Tech to tackle interference in European Parliament elections (The Record)
Suspicious NuGet package grabs data from industrial systems (ReversingLabs)
Senator demands answers from HHS about $7.5 million cyber theft in 2023 (The Record)
Data center landlord refuses Fairfax County demand for tenant information (Washington Business Journal)
Google's AI-powered search feature recommends malicious sites, including scams and malware (TechSpot)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An alleged sinister hacking plot by China. CISA and the FBI issued a 'secure-by-design' alert. Ransomware hits municipalities in Florida and Texas. The EU sets regulations to safeguard the upcoming European Parliament elections. ReversingLabs describe a suspicious NuGet package. Senator Bill Cassidy questions a costly breach at HHS. A data center landlord sues over requests to reveal its customers. On our Industry Voices segment, Jason Kikta, CISO &amp; Senior Vice President of Product at Automox, discusses ways to increase IT efficiency while avoiding tool overload &amp; complexity. And Google's AI Throws Users a Malicious Bone.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Voices segment, <a href="https://www.linkedin.com/in/jkikta/">Jason Kikta</a>, CISO &amp; Senior Vice President of Product at <a href="https://www.automox.com/">Automox</a>, discusses ways to increase IT efficiency including automation &amp; tool streamlining, IT automation/automated patching, and tool overload &amp; complexity. You can learn more in Automox’s <a href="https://www.automox.com/resources/webinars-videos/on-demand-2024-state-of-itops-review">2024 State of IT Operations Research Report</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bbc.com/news/world-us-canada-68659095">Millions of Americans caught up in Chinese hacking plot </a>(BBC)</p><p><a href="https://www.securityweek.com/us-government-urges-software-makers-to-eliminate-sql-injection-vulnerabilities/">US Government Urges Software Makers to Eliminate SQL Injection Vulnerabilities </a>(SecurityWeek)</p><p><a href="https://securityaffairs.com/161057/security/cisa-adds-forticlient-ems-ivanti-epm-csa-nice-linear-emerge-e3-series-bugs-to-its-known-exploited-vulnerabilities-catalog.html">CISA adds FortiClient EMS, Ivanti EPM CSA, Nice Linear eMerge E3-Series bugs to its Known Exploited Vulnerabilities catalog</a> (Security Affairs)</p><p><a href="https://therecord.media/st-cloud-hit-with-ransomware-florida-string">St. Cloud most recent in string of Florida cities hit with ransomware</a> (The Record)</p><p><a href="https://www.msn.com/en-us/news/us/hackers-demand-700k-in-ransomware-attack-on-tarrant-appraisal-district/ar-BB1kx1QE">Hackers demand $700K in ransomware attack on Tarrant Appraisal District</a> (MSN)</p><p><a href="https://news.sophos.com/en-us/2024/03/26/the-impact-of-compromised-backups-on-ransomware-outcomes/">The impact of compromised backups on ransomware outcomes </a>(Sophos News)</p><p><a href="https://therecord.media/european-parliament-elections-interferance-big-tech-rules">EU sets rules for Big Tech to tackle interference in European Parliament elections</a> (The Record)</p><p><a href="https://www.reversinglabs.com/blog/suspicious-nuget-package-grabs-data-from-industrial-systems">Suspicious NuGet package grabs data from industrial systems</a> (ReversingLabs)</p><p><a href="https://therecord.media/hhs-reported-grant-payment-scam-sen-bill-cassidy-letter">Senator demands answers from HHS about $7.5 million cyber theft in 2023</a> (The Record)</p><p><a href="https://www.bizjournals.com/washington/news/2024/03/21/fairfax-county-coresite-data-center-tenant-lawsuit.html?j=34770622&amp;senddate=2024-03-21&amp;empos=p4">Data center landlord refuses Fairfax County demand for tenant information</a> (Washington Business Journal)</p><p><a href="https://www.techspot.com/news/102394-google-ai-powered-search-feature-recommends-malicious-sites.html">Google's AI-powered search feature recommends malicious sites, including scams and malware</a> (TechSpot)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1726</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f17c5260-b95d-11ee-adc6-b7424c940edb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4656506200.mp3?updated=1711479746" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dr. Rois Ni Thuama: Get into the game. [Cyber governance] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/81/notes</link>
      <description>Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pause her studies. While there, she began making music videos and wildlife documentaries. Upon her return to London, Rois started working in corporate governance and risk at a music technology startup. This ignited her enthusiasm for startups. She now works in a company with several coworkers from that tech startup doing cyber governance. Rois advises law students of many ways into the industry including doing coding, learning risk management, and understanding privacy legislation, and then "just get into the game." We thank Rois for sharing her story. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Mar 2024 07:00:00 -0000</pubDate>
      <itunes:title>Dr. Rois Ni Thuama: Get into the game. [Cyber governance] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>81</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. </itunes:subtitle>
      <itunes:summary>Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pause her studies. While there, she began making music videos and wildlife documentaries. Upon her return to London, Rois started working in corporate governance and risk at a music technology startup. This ignited her enthusiasm for startups. She now works in a company with several coworkers from that tech startup doing cyber governance. Rois advises law students of many ways into the industry including doing coding, learning risk management, and understanding privacy legislation, and then "just get into the game." We thank Rois for sharing her story. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pause her studies. While there, she began making music videos and wildlife documentaries. Upon her return to London, Rois started working in corporate governance and risk at a music technology startup. This ignited her enthusiasm for startups. She now works in a company with several coworkers from that tech startup doing cyber governance. Rois advises law students of many ways into the industry including doing coding, learning risk management, and understanding privacy legislation, and then "just get into the game." We thank Rois for sharing her story. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>485</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9457963a-63fb-11ec-bd74-bb862404d51a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7747030798.mp3?updated=1640222868" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Python developers under attack.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2031/notes</link>
      <description>A supply chain attack targets python developers. Russia targets German political parties. Romanian and Spanish police dismantle a cyber-fraud gang. Pwn2Own prompts quick patches from Mozilla. President Biden nominates the first assistant secretary of defense for cyber policy at the Pentagon. An influential think tank calls for a dedicated cyber service in the US. Unit42 tracks a StrelaStealer surge. GM reverses its data sharing practice. Our guest is Anna Belak, Director of the Office of Cybersecurity Strategy at Sysdig, who shares trends in cloud-native security. And a Fordham Law School professor suggests AI creators take a page from medical doctors. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Anna Belak, Director of the Office of Cybersecurity Strategy at Sysdig, shares trends in cloud-native security. To learn more, you can check out Sysdig’s 2024 Cloud-Native Security and Usage Report. 

Selected Reading
Top Python Developers Hacked in Sophisticated Supply Chain Attack (SecurityWeek)
Russian hackers target German political parties with WineLoader malware (Bleeping Computer)
Police Bust Multimillion-Dollar Holiday Fraud Gang (Infosecurity Magazine)
Mozilla Patches Firefox Zero-Days Exploited at Pwn2Own (SecurityWeek)
Biden nominates first assistant defense secretary for cyber policy (Nextgov/FCW)
Pentagon, Congress have a ‘limited window’ to properly create a Cyber Force (The Record)
StrelaStealer targeted over 100 organizations across the EU and US (Security Affairs)
General Motors Quits Sharing Driving Behavior With Data Brokers (The New York Times)
AI's Hippocratic Oath by Chinmayi Sharma (SSRN)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 25 Mar 2024 21:30:00 -0000</pubDate>
      <itunes:title>Python developers under attack.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2031</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A supply chain attack targets python developers. Russia targets German political parties. Romanian and Spanish police dismantle a cyber-fraud gang. Pwn2Own prompts quick patches from Mozilla. President Biden nominates the first assistant secretary of defense for cyber policy at the Pentagon. An influential think tank calls for a dedicated cyber service in the US. Unit42 tracks a StrelaStealer surge. GM reverses its data sharing practice. Our guest is Anna Belak, Director of the Office of Cybersecurity Strategy at Sysdig, who shares trends in cloud-native security. And a Fordham Law School professor suggests AI creators take a page from medical doctors. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Anna Belak, Director of the Office of Cybersecurity Strategy at Sysdig, shares trends in cloud-native security. To learn more, you can check out Sysdig’s 2024 Cloud-Native Security and Usage Report. 

Selected Reading
Top Python Developers Hacked in Sophisticated Supply Chain Attack (SecurityWeek)
Russian hackers target German political parties with WineLoader malware (Bleeping Computer)
Police Bust Multimillion-Dollar Holiday Fraud Gang (Infosecurity Magazine)
Mozilla Patches Firefox Zero-Days Exploited at Pwn2Own (SecurityWeek)
Biden nominates first assistant defense secretary for cyber policy (Nextgov/FCW)
Pentagon, Congress have a ‘limited window’ to properly create a Cyber Force (The Record)
StrelaStealer targeted over 100 organizations across the EU and US (Security Affairs)
General Motors Quits Sharing Driving Behavior With Data Brokers (The New York Times)
AI's Hippocratic Oath by Chinmayi Sharma (SSRN)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A supply chain attack targets python developers. Russia targets German political parties. Romanian and Spanish police dismantle a cyber-fraud gang. Pwn2Own prompts quick patches from Mozilla. President Biden nominates the first assistant secretary of defense for cyber policy at the Pentagon. An influential think tank calls for a dedicated cyber service in the US. Unit42 tracks a StrelaStealer surge. GM reverses its data sharing practice. Our guest is Anna Belak, Director of the Office of Cybersecurity Strategy at Sysdig, who shares trends in cloud-native security. And a Fordham Law School professor suggests AI creators take a page from medical doctors. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/aabelak/">Anna Belak</a>, Director of the Office of Cybersecurity Strategy at <a href="https://sysdig.com/">Sysdig</a>, shares trends in cloud-native security. To learn more, you can check out Sysdig’s <a href="https://sysdig.com/2024-cloud-native-security-and-usage-report/">2024 Cloud-Native Security and Usage Report</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/top-python-developers-hacked-in-sophisticated-supply-chain-attack/">Top Python Developers Hacked in Sophisticated Supply Chain Attack </a>(SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/russian-hackers-target-german-political-parties-with-wineloader-malware/">Russian hackers target German political parties with WineLoader malware</a> (Bleeping Computer)</p><p><a href="https://www.infosecurity-magazine.com/news/police-bust-holiday-fraud-gang/">Police Bust Multimillion-Dollar Holiday Fraud Gang</a> (Infosecurity Magazine)</p><p><a href="https://www.securityweek.com/mozilla-patches-firefox-zero-days-exploited-at-pwn2own/">Mozilla Patches Firefox Zero-Days Exploited at Pwn2Own</a> (SecurityWeek)</p><p><a href="https://www.nextgov.com/cybersecurity/2024/03/biden-nominates-first-assistant-defense-secretary-cyber-policy/395154/">Biden nominates first assistant defense secretary for cyber policy</a> (Nextgov/FCW)</p><p><a href="https://therecord.media/military-cyber-force-study-fdd">Pentagon, Congress have a ‘limited window’ to properly create a Cyber Force</a> (The Record)</p><p><a href="https://securityaffairs.com/161022/cyber-crime/strelastealer-malware-eu-us.html">StrelaStealer targeted over 100 organizations across the EU and US</a> (Security Affairs)</p><p><a href="https://www.nytimes.com/2024/03/22/technology/gm-onstar-driver-data.html?unlocked_article_code=1.e00.VrsZ.qin8M6fUUyk-">General Motors Quits Sharing Driving Behavior With Data Brokers</a> (The New York Times)</p><p><a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4759742">AI's Hippocratic Oath by Chinmayi Sharma</a> (SSRN)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1713</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f1440694-b95d-11ee-adc6-b72bee703fd0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3944501481.mp3?updated=1711401770" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Marcelle Lee: Cyber sleuth detecting emerging threats. [Research] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/46/notes</link>
      <description>Senior security researcher from Secureworks Marcelle Lee shares her career journey into cybersecurity and how she helps solve hard problems in her daily work. Marcelle came into cybersecurity not through any traditional path. She describes her route from a different field and starting in cyber at her local community college through a grant program. Marcelle took full advantage of the opportunities she had and grew her career from there. She recommends finding your specialty, but continue to build other skills. As a woman in the field, she is a strong proponent of diversity and encouraging others to find what excites them. And, we thank Marcelle for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 24 Mar 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Marcelle Lee: Cyber sleuth detecting emerging threats. [Research] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>46</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Senior security researcher from Secureworks Marcelle Lee shares her career journey into cybersecurity and how she helps solve hard problems in her daily work. Marcelle came into cybersecurity not through any traditional path. She describes her route from a different field and starting in cyber at her local community college through a grant program. Marcelle took full advantage of the opportunities she had and grew her career from there. She recommends finding your specialty, but continue to build other skills. As a woman in the field, she is a strong proponent of diversity and encouraging others to find what excites them. And, we thank Marcelle for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Senior security researcher from Secureworks Marcelle Lee shares her career journey into cybersecurity and how she helps solve hard problems in her daily work. Marcelle came into cybersecurity not through any traditional path. She describes her route from a different field and starting in cyber at her local community college through a grant program. Marcelle took full advantage of the opportunities she had and grew her career from there. She recommends finding your specialty, but continue to build other skills. As a woman in the field, she is a strong proponent of diversity and encouraging others to find what excites them. And, we thank Marcelle for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>475</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[066b65b6-e87b-11ee-9409-37e850b9b789]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1733622075.mp3?updated=1711139127" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>HijackLoader unleashed: Evolving threats and sneaky tactics. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/322/notes</link>
      <description>Liviu Arsene from CrowdStrike joins to discuss their research "HijackLoader Expands Techniques to Improve Defense Evasion." The research has found that HijackLoader continues to become increasingly popular among adversaries for deploying additional payloads and tooling.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. Researchers state "this new approach has the potential to make defense evasion stealthier."
Please take a moment to fill out an audience survey! Let us know how we are doing! 
The research can be found here:
HijackLoader Expands Techniques to Improve Defense Evasion

And be sure to join our live webinar: CISOs are the new Architects (of the Workforce)
Join N2K’s Simone Petrella and Intuit’s Kim Jones on Wednesday, March 27th for an online discussion about the pivotal role security leaders play in shaping the security workforce landscape, and how we can start showing up for the future of our industry. Learn more and register on the event page.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Mar 2024 07:00:00 -0000</pubDate>
      <itunes:title>HijackLoader unleashed: Evolving threats and sneaky tactics. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>322</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Liviu Arsene from CrowdStrike joins to discuss their research "HijackLoader Expands Techniques to Improve Defense Evasion." The research has found that HijackLoader continues to become increasingly popular among adversaries for deploying additional payloads and tooling.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. Researchers state "this new approach has the potential to make defense evasion stealthier."
Please take a moment to fill out an audience survey! Let us know how we are doing! 
The research can be found here:
HijackLoader Expands Techniques to Improve Defense Evasion

And be sure to join our live webinar: CISOs are the new Architects (of the Workforce)
Join N2K’s Simone Petrella and Intuit’s Kim Jones on Wednesday, March 27th for an online discussion about the pivotal role security leaders play in shaping the security workforce landscape, and how we can start showing up for the future of our industry. Learn more and register on the event page.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Liviu Arsene from CrowdStrike joins to discuss their research "HijackLoader Expands Techniques to Improve Defense Evasion." The research has found that HijackLoader continues to become increasingly popular among adversaries for deploying additional payloads and tooling.</p><p>In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. Researchers state "this new approach has the potential to make defense evasion stealthier."</p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em></p><p>The research can be found here:</p><ul><li><a href="https://www.crowdstrike.com/blog/hijackloader-expands-techniques/">HijackLoader Expands Techniques to Improve Defense Evasion</a></li></ul><p><br></p><p><strong>And be sure to join our live webinar: CISOs are the new Architects (of the Workforce)</strong></p><p>Join N2K’s Simone Petrella and Intuit’s Kim Jones on Wednesday, March 27th for an online discussion about the pivotal role security leaders play in shaping the security workforce landscape, and how we can start showing up for the future of our industry. Learn more and register on the <a href="https://www.brighttalk.com/webcast/18820/607438?bt_tok=%7B%7Brecord.BT_fastpass_token%7D%7D&amp;utm_source=N2KNetworks&amp;utm_medium=brighttalk&amp;utm_campaign=607438">event page</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1213</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ba672f4c-e889-11ee-b124-3f430a16a236]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1483440792.mp3?updated=1711134352" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When it rains, it pours. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2030/notes</link>
      <description>Advanced wiper malware hits Ukraine. Nemesis gets dismantled. Apple deals with an unpatchable vulnerability. FortiGuard rises to the rescue. CISA and FBI join forces against DDoS attacks. US airlines data security and privacy policies are under review. Hackers hit thousands in Jacksonville Beach. Geoffrey Mattson, CEO of Xage Security  sits down to discuss CISA's 2024 JCDC priorities. And Hotel keycard locks can’t be that hard to crack.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Geoffrey Mattson, CEO of Xage Security, joins us to discuss CISA's 2024 JCDC priorities. You can connect with Geoff on LinkedIn and learn more about Xage Security on their website and read about the JCDC 2024 Priorities here. 
Geoff’s interview first appeared on March 21st’s episode of T-Minus Space Daily. Check out T-Minus here. 

Selected Reading
Sandworm-linked group likely knocked down Ukrainian internet providers (The Record) 
AcidPour wiper suspected to be used against Ukrainian telecom networks (SC Media)
Never-before-seen data wiper may have been used by Russia against Ukraine (Ars Technica)
AcidPour | New Embedded Wiper Variant of AcidRain Appears in Ukraine (SentinelOne)
F5, ScreenConnect vulnerabilities leveraged in global Chinese cyberattacks (SC Media)
Nemesis darknet marketplace raided in Germany-led operation (The Record)
Unpatchable vulnerability in Apple chip leaks secret encryption keys (Ars Technica)
Exploit Released For Critical Fortinet RCE Flaw: Patch Soon! (GBHackers on Security) 
CISA &amp; FBI Released Guide to Respond for DDoS Attacks (Cyber Security News) 
CISA, FBI, and MS-ISAC Release Update to Joint Guidance on Distributed Denial-of-Service Techniques (CISA) 
US airlines’ data security, privacy policies to be under federal review (SC Media) 
Jacksonville Beach and other US municipalities report data breaches following cyberattacks (The Record) 
Hackers Found a Way to Open Any of 3 Million Hotel Keycard Locks in Seconds (WIRED)  

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 22 Mar 2024 20:10:00 -0000</pubDate>
      <itunes:title>When it rains, it pours. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2030</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Advanced wiper malware hits Ukraine. Nemesis gets dismantled. Apple deals with an unpatchable vulnerability. FortiGuard rises to the rescue. CISA and FBI join forces against DDoS attacks. US airlines data security and privacy policies are under review. Hackers hit thousands in Jacksonville Beach. Geoffrey Mattson, CEO of Xage Security  sits down to discuss CISA's 2024 JCDC priorities. And Hotel keycard locks can’t be that hard to crack.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Geoffrey Mattson, CEO of Xage Security, joins us to discuss CISA's 2024 JCDC priorities. You can connect with Geoff on LinkedIn and learn more about Xage Security on their website and read about the JCDC 2024 Priorities here. 
Geoff’s interview first appeared on March 21st’s episode of T-Minus Space Daily. Check out T-Minus here. 

Selected Reading
Sandworm-linked group likely knocked down Ukrainian internet providers (The Record) 
AcidPour wiper suspected to be used against Ukrainian telecom networks (SC Media)
Never-before-seen data wiper may have been used by Russia against Ukraine (Ars Technica)
AcidPour | New Embedded Wiper Variant of AcidRain Appears in Ukraine (SentinelOne)
F5, ScreenConnect vulnerabilities leveraged in global Chinese cyberattacks (SC Media)
Nemesis darknet marketplace raided in Germany-led operation (The Record)
Unpatchable vulnerability in Apple chip leaks secret encryption keys (Ars Technica)
Exploit Released For Critical Fortinet RCE Flaw: Patch Soon! (GBHackers on Security) 
CISA &amp; FBI Released Guide to Respond for DDoS Attacks (Cyber Security News) 
CISA, FBI, and MS-ISAC Release Update to Joint Guidance on Distributed Denial-of-Service Techniques (CISA) 
US airlines’ data security, privacy policies to be under federal review (SC Media) 
Jacksonville Beach and other US municipalities report data breaches following cyberattacks (The Record) 
Hackers Found a Way to Open Any of 3 Million Hotel Keycard Locks in Seconds (WIRED)  

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Advanced wiper malware hits Ukraine. Nemesis gets dismantled. Apple deals with an unpatchable vulnerability. FortiGuard rises to the rescue. CISA and FBI join forces against DDoS attacks. US airlines data security and privacy policies are under review. Hackers hit thousands in Jacksonville Beach. Geoffrey Mattson, CEO of Xage Security  sits down to discuss CISA's 2024 JCDC priorities. And Hotel keycard locks can’t be that hard to crack.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest Geoffrey Mattson, CEO of Xage Security, joins us to discuss CISA's 2024 JCDC priorities. You can connect with Geoff on <a href="https://www.linkedin.com/in/geoffreyamattson/">LinkedIn</a> and learn more about Xage Security on their <a href="https://xage.com/">website</a> and read about the JCDC 2024 Priorities <a href="https://www.cisa.gov/news-events/news/extending-breadth-and-depth-our-partnerships-jcdc-2024-priorities">here</a>. </p><p>Geoff’s interview first appeared on March 21st’s episode of T-Minus Space Daily. Check out T-Minus <a href="https://space.n2k.com/podcasts/t-minus/239">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/ukraine-isps-attacks-solntsepek-sandworm-gru">Sandworm-linked group likely knocked down Ukrainian internet providers </a>(The Record) </p><p><a href="https://www.scmagazine.com/brief/acidpour-wiper-suspected-to-be-used-against-ukrainian-telecom-networks">AcidPour wiper suspected to be used against Ukrainian telecom networks</a> (SC Media)</p><p><a href="https://arstechnica.com/security/2024/03/never-before-seen-data-wiper-may-have-been-used-by-russia-against-ukraine/">Never-before-seen data wiper may have been used by Russia against Ukraine</a> (Ars Technica)</p><p><a href="https://www.sentinelone.com/labs/acidpour-new-embedded-wiper-variant-of-acidrain-appears-in-ukraine/">AcidPour | New Embedded Wiper Variant of AcidRain Appears in Ukraine</a> (SentinelOne)</p><p><a href="https://www.scmagazine.com/brief/f5-screenconnect-vulnerabilities-leveraged-in-global-chinese-cyberattacks">F5, ScreenConnect vulnerabilities leveraged in global Chinese cyberattacks</a> (SC Media)</p><p><a href="https://therecord.media/nemesis-cybercrime-market-takedown-germany">Nemesis darknet marketplace raided in Germany-led operation</a> (The Record)</p><p><a href="https://arstechnica.com/security/2024/03/hackers-can-extract-secret-encryption-keys-from-apples-mac-chips/">Unpatchable vulnerability in Apple chip leaks secret encryption keys</a> (Ars Technica)</p><p><a href="https://gbhackers.com/exploit-fortinet-rce-flaw-patch/">Exploit Released For Critical Fortinet RCE Flaw: Patch Soon!</a> (GBHackers on Security) </p><p><a href="https://cybersecuritynews.com/cisa-fbi-released-guide-ddos-attacks/">CISA &amp; FBI Released Guide to Respond for DDoS Attacks</a> (Cyber Security News) </p><p><a href="https://www.cisa.gov/news-events/alerts/2024/03/21/cisa-fbi-and-ms-isac-release-update-joint-guidance-distributed-denial-service-techniques">CISA, FBI, and MS-ISAC Release Update to Joint Guidance on Distributed Denial-of-Service Techniques</a> (CISA) </p><p><a href="https://www.scmagazine.com/brief/us-airlines-data-security-privacy-policies-to-be-under-federal-review">US airlines’ data security, privacy policies to be under federal review</a> (SC Media) </p><p><a href="https://therecord.media/jacksonville-beach-municipalities-hit-by-cyberattacks">Jacksonville Beach and other US municipalities report data breaches following cyberattacks</a> (The Record) </p><p><a href="https://www.wired.com/story/saflok-hotel-lock-unsaflok-hack-technique/">Hackers Found a Way to Open Any of 3 Million Hotel Keycard Locks in Seconds </a>(WIRED)  </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1655</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f10b53b2-b95d-11ee-adc6-9746a34d1c70]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5114580505.mp3?updated=1711136456" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A CIA Psychologist on the Minds of World Leaders, Pt. 2 with Dr. Ursula Wilder [SpyCast]</title>
      <link>https://thecyberwire.com/podcasts/spycast/622/notes</link>
      <description>In honor of Women's History Month, please enjoy this episode of the International Spy Museum's SpyCast podcast featuring part 2 of Andrew Hammond's discussion with Dr. Ursula Wilder of the Central Intelligence Agency. 

Summary
Dr. Ursula Wilder (LinkedIn) joins Andrew (X; LinkedIn) to discuss the intersections between psychology and intelligence. Ursula is a clinical psychologist with over two decades of experience working at the Central Intelligence Agency. 

What You’ll Learn
Intelligence

How psychology can be useful to national security

Historical examples of leadership analysis 

Leadership personality assessments &amp; the Cuban Missile Crisis

Psychoanalytic theory and espionage 

Reflections	

Human nature throughout history

History repeating itself 

And much, much more …

Quotes of the Week
“Together, these documents are quite powerful. The psych assessments are very, very carefully, tightly held and are classified at a high level. Every intelligence officer has this fantasy about seeing the file that's kept on them by the opponents.” – Dr. Ursula Wilder.

Resources 
SURFACE SKIM
*SpyCasts*


Agent of Betrayal, FBI Spy Robert Hanssen with CBS’ Major Garrett and Friends (2023)


The North Korean Defector with Former DPRK Agent Kim, Hyun Woo (2023)


SPY@20 – “The Spy of the Century” with Curators Alexis and Andrew on Kim Philby (2022)


“How Spies Think” – 10 Lessons in Intelligence with Sir David Omand (2020)

*Beginner Resources*


What is Psychoanalysis? Institute of Psychoanalysis, YouTube (2011) [3 min. video]


Psychologists in the CIA, American Psychological Association (2002) [Short article]


7 Reasons to Study Psychology, University of Toronto (n.d.) [Short article]

DEEPER DIVE
Books


Freud and Beyond, S. A. Mitchell (Basic Books, 2016)


Narcissism and Politics: Dreams of Glory, J. M. Post (Cambridge University Press, 2014)


The True Believer: Thoughts on the Nature of Mass Movements, E. Hoffer (Harper Perennial Modern Classics, 2010) 


Team of Rivals: The Political Genius of Abraham Lincoln, D. K. Goodwin (Simon &amp; Schuster, 2004)


Leaders, Fools, and Impostors: Essays on the Psychology of Leadership, M. F. R. Kets de Vries (iUniverse, 2003) 

Primary Sources 


Charles de Gaulle to Pamela Digby Churchill (1942) 


Blood, Toil, Tears and Sweat (1940)


Memoirs of Ulysses S. Grant (1885)


Gettysburg Address (1863) 


House Divided Speech (1858)


Excerpt on Cleopatra from Plutarch's Life of Julius Caesar (ca. 2nd century AD)


Plutarch’s The Life of Alexander (ca. 2nd century AD) 

Appian’s The Civil Wars (ca. 2nd century AD) 


Virgil’s The Aeneid (19 B.C.E) 

*Wildcard Resource*


On Dreams by Sigmund Freud (1901)

In this simplified version of the father of psychoanalysis’ seminal book The Interpretation of Dreams, you can get a small taste for Freudian philosophy. Freud believed that dreams were a reflection of the subconscious mind and that studying a person’s dreams can elucidate their inner wants and needs. What are your dreams telling you? 


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 22 Mar 2024 05:00:00 -0000</pubDate>
      <itunes:title>A CIA Psychologist on the Minds of World Leaders, Pt. 2 with Dr. Ursula Wilder [SpyCast]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>622</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In honor of Women's History Month, please enjoy this episode of the International Spy Museum's SpyCast podcast featuring part 2 of Andrew Hammond's discussion with Dr. Ursula Wilder of the Central Intelligence Agency. 

Summary
Dr. Ursula Wilder (LinkedIn) joins Andrew (X; LinkedIn) to discuss the intersections between psychology and intelligence. Ursula is a clinical psychologist with over two decades of experience working at the Central Intelligence Agency. 

What You’ll Learn
Intelligence

How psychology can be useful to national security

Historical examples of leadership analysis 

Leadership personality assessments &amp; the Cuban Missile Crisis

Psychoanalytic theory and espionage 

Reflections	

Human nature throughout history

History repeating itself 

And much, much more …

Quotes of the Week
“Together, these documents are quite powerful. The psych assessments are very, very carefully, tightly held and are classified at a high level. Every intelligence officer has this fantasy about seeing the file that's kept on them by the opponents.” – Dr. Ursula Wilder.

Resources 
SURFACE SKIM
*SpyCasts*


Agent of Betrayal, FBI Spy Robert Hanssen with CBS’ Major Garrett and Friends (2023)


The North Korean Defector with Former DPRK Agent Kim, Hyun Woo (2023)


SPY@20 – “The Spy of the Century” with Curators Alexis and Andrew on Kim Philby (2022)


“How Spies Think” – 10 Lessons in Intelligence with Sir David Omand (2020)

*Beginner Resources*


What is Psychoanalysis? Institute of Psychoanalysis, YouTube (2011) [3 min. video]


Psychologists in the CIA, American Psychological Association (2002) [Short article]


7 Reasons to Study Psychology, University of Toronto (n.d.) [Short article]

DEEPER DIVE
Books


Freud and Beyond, S. A. Mitchell (Basic Books, 2016)


Narcissism and Politics: Dreams of Glory, J. M. Post (Cambridge University Press, 2014)


The True Believer: Thoughts on the Nature of Mass Movements, E. Hoffer (Harper Perennial Modern Classics, 2010) 


Team of Rivals: The Political Genius of Abraham Lincoln, D. K. Goodwin (Simon &amp; Schuster, 2004)


Leaders, Fools, and Impostors: Essays on the Psychology of Leadership, M. F. R. Kets de Vries (iUniverse, 2003) 

Primary Sources 


Charles de Gaulle to Pamela Digby Churchill (1942) 


Blood, Toil, Tears and Sweat (1940)


Memoirs of Ulysses S. Grant (1885)


Gettysburg Address (1863) 


House Divided Speech (1858)


Excerpt on Cleopatra from Plutarch's Life of Julius Caesar (ca. 2nd century AD)


Plutarch’s The Life of Alexander (ca. 2nd century AD) 

Appian’s The Civil Wars (ca. 2nd century AD) 


Virgil’s The Aeneid (19 B.C.E) 

*Wildcard Resource*


On Dreams by Sigmund Freud (1901)

In this simplified version of the father of psychoanalysis’ seminal book The Interpretation of Dreams, you can get a small taste for Freudian philosophy. Freud believed that dreams were a reflection of the subconscious mind and that studying a person’s dreams can elucidate their inner wants and needs. What are your dreams telling you? 


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<h3><br></h3><h3><strong><em>In honor of Women's History Month, please enjoy this episode of the International Spy Museum's SpyCast podcast featuring part 2 of Andrew Hammond's discussion with Dr. Ursula Wilder of the Central Intelligence Agency. </em></strong></h3><h3><br></h3><p><strong>Summary</strong></p><p>Dr. Ursula Wilder (<a href="https://www.linkedin.com/in/ursula-m-wilder-5a5b87148/">LinkedIn</a>) joins Andrew (<a href="https://twitter.com/spyhistorian">X</a>; <a href="https://www.linkedin.com/in/andrew-hammond-09344936/">LinkedIn)</a> to discuss the intersections between psychology and intelligence. Ursula is a clinical psychologist with over two decades of experience working at the Central Intelligence Agency. </p><h3><br></h3><h3><strong>What You’ll Learn</strong></h3><h3><strong>Intelligence</strong></h3><ul>
<li>How psychology can be useful to national security</li>
<li>Historical examples of leadership analysis </li>
<li>Leadership personality assessments &amp; the Cuban Missile Crisis</li>
<li>Psychoanalytic theory and espionage </li>
</ul><h3><strong>Reflections	</strong></h3><ul>
<li>Human nature throughout history</li>
<li>History repeating itself </li>
</ul><h3><strong>And much, much more …</strong></h3><h3><br></h3><h3><strong>Quotes of the Week</strong></h3><p><em>“Together, these documents are quite powerful. The psych assessments are very, very carefully, tightly held and are classified at a high level. Every intelligence officer has this fantasy about seeing the file that's kept on them by the opponents.” </em>– Dr. Ursula Wilder.</p><p><br></p><h3><strong>Resources </strong></h3><h3><strong>SURFACE SKIM</strong></h3><h3><strong>*SpyCasts*</strong></h3><ul>
<li>
<a href="https://thecyberwire.com/podcasts/spycast/610/notes">Agent of Betrayal, FBI Spy Robert Hanssen</a> with CBS’ Major Garrett and Friends (2023)</li>
<li>
<a href="https://thecyberwire.com/podcasts/spycast/591/notes">The North Korean Defector</a> with Former DPRK Agent Kim, Hyun Woo (2023)</li>
<li>
<a href="https://thecyberwire.com/podcasts/spycast/548/notes">SPY@20 – “The Spy of the Century”</a> with Curators Alexis and Andrew on Kim Philby (2022)</li>
<li>
<a href="https://thecyberwire.com/podcasts/spycast/456/notes">“How Spies Think” – 10 Lessons in Intelligence</a> with Sir David Omand (2020)</li>
</ul><h3><strong>*Beginner Resources*</strong></h3><ul>
<li>
<a href="https://www.youtube.com/watch?v=uM2FGc0wDg8">What is Psychoanalysis?</a> Institute of Psychoanalysis, <em>YouTube</em> (2011) [3 min. video]</li>
<li>
<a href="https://www.apa.org/monitor/apr02/cia">Psychologists in the CIA</a>, <em>American Psychological Association</em> (2002) [Short article]</li>
<li>
<a href="https://www.psych.utoronto.ca/our-department/7-reasons-study-psychology">7 Reasons to Study Psychology</a>, <em>University of Toronto</em> (n.d.) [Short article]</li>
</ul><h3><strong>DEEPER DIVE</strong></h3><h3><strong>Books</strong></h3><ul>
<li>
<em>Freud and Beyond</em>, S. A. Mitchell (Basic Books, 2016)</li>
<li>
<em>Narcissism and Politics: Dreams of Glory</em>, J. M. Post (Cambridge University Press, 2014)</li>
<li>
<em>The True Believer: Thoughts on the Nature of Mass Movements</em>, E. Hoffer (Harper Perennial Modern Classics, 2010) </li>
<li>
<em>Team of Rivals: The Political Genius of Abraham Lincoln</em>, D. K. Goodwin (Simon &amp; Schuster, 2004)</li>
<li>
<em>Leaders, Fools, and Impostors: Essays on the Psychology of Leadership</em>, M. F. R. Kets de Vries (iUniverse, 2003) </li>
</ul><h3><strong>Primary Sources </strong></h3><ul>
<li>
<a href="https://www.loc.gov/exhibits/churchill/interactive/_html/wc0159.html">Charles de Gaulle to Pamela Digby Churchill</a> (1942) </li>
<li>
<a href="https://www.parliament.uk/about/living-heritage/transformingsociety/private-lives/yourcountry/collections/churchillexhibition/churchill-the-orator/blood-toil-sweat-and-tears/">Blood, Toil, Tears and Sweat</a> (1940)</li>
<li>
<a href="https://www.gutenberg.org/files/4367/4367-h/4367-h.htm">Memoirs of Ulysses S. Grant</a> (1885)</li>
<li>
<a href="https://home.nps.gov/liho/learn/historyculture/gettysburgaddress.htm">Gettysburg Address</a> (1863) </li>
<li>
<a href="https://home.nps.gov/liho/learn/historyculture/housedivided.htm">House Divided Speech</a> (1858)</li>
<li>
<a href="https://bingweb.binghamton.edu/~jstarks/cleoplut.html">Excerpt on Cleopatra from Plutarch's Life of Julius Caesar</a> (ca. 2nd century AD)</li>
<li>
<a href="https://penelope.uchicago.edu/Thayer/e/roman/texts/plutarch/lives/alexander*/3.html">Plutarch’s The Life of Alexander</a> (ca. 2nd century AD) </li>
<li>Appian’s <a href="https://penelope.uchicago.edu/thayer/e/roman/texts/appian/civil_wars/1*.html">The Civil Wars</a> (ca. 2nd century AD) </li>
<li>
<a href="https://classics.mit.edu/Virgil/aeneid.html">Virgil’s The Aeneid</a> (19 B.C.E) </li>
</ul><h3><strong>*Wildcard Resource*</strong></h3><ul>
<li>
<a href="https://www.sas.upenn.edu/~cavitch/pdf-library/Freud_SE_On_Dreams_complete.pdf">On Dreams</a> by Sigmund Freud (1901)</li>
<li class="ql-indent-1">In this simplified version of the father of psychoanalysis’ seminal book <em>The Interpretation of Dreams,</em> you can get a small taste for Freudian philosophy. Freud believed that dreams were a reflection of the subconscious mind and that studying a person’s dreams can elucidate their inner wants and needs. What are your dreams telling you? </li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3634</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ad1d6a92-dd88-11ee-b042-cb822c7a9e31]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4079242979.mp3?updated=1708721648" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Safeguarding American data from foreign hands.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2029/notes</link>
      <description>The House Unanimously Passes a Bill to Halt Sale of American Data to Foreign Foes. The U.S. Sanctions Russian Individuals and Entities for a Global Disinformation Campaign. China warns of cyber threats from foreign hacking groups. A logistics firm isolates its Canadian division after a cyber attack. Ivanti warns of another critical vulnerability. Researchers find hundreds of vulnerable Firebase instances. Microsoft phases out weaker encryption. Formula One fans fight phishing in the fast lane. Glassdoor is accused of adding real names to profiles without user consent. Our guest is Adam Meyers, SVP of Counter Adversary Operations at CrowdStrike, discussing how adversaries are attacking cloud environments and why it’s an increasingly popular attack surface. And Pwn2Own winners take home their second Tesla. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Adam Meyers, SVP of Counter Adversary Operations at CrowdStrike, discussing how adversaries are attacking cloud environments and why it’s an increasingly popular attack surface – especially as more companies implement AI. For more information, check out CrowdStrike’s 2024 Global Threat Report. 

Selected Reading
House unanimously passes bill to block data brokers from selling Americans’ info to foreign adversaries (The Record)
Treasury Sanctions Actors Supporting Kremlin-Directed Malign Influence Efforts (US Treasury Department)
China warns foreign hackers are infiltrating ‘hundreds’ of business and government networks (SCMP)
International freight tech firm isolates Canada operations after cyberattack (The Record)
Ivanti urges customers to fix critical RCE flaw in Standalone Sentry solution (Security Affairs)
19 million plaintext passwords exposed by incorrectly configured Firebase instances (Malwarebytes)
Microsoft deprecates 1024-bit Windows RSA keys — now would be a good time to get machine identity management in order (ITPro)
Users ditch Glassdoor, stunned by site adding real names without consent (Ars Technica)
Famous Spa GP F1 race comms hijacked by phishing scammers (Cyber Daily)
Security Researchers Win Second Tesla At Pwn2Own (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 21 Mar 2024 20:10:00 -0000</pubDate>
      <itunes:title>Safeguarding American data from foreign hands.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2029</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The House Unanimously Passes a Bill to Halt Sale of American Data to Foreign Foes. The U.S. Sanctions Russian Individuals and Entities for a Global Disinformation Campaign. China warns of cyber threats from foreign hacking groups. A logistics firm isolates its Canadian division after a cyber attack. Ivanti warns of another critical vulnerability. Researchers find hundreds of vulnerable Firebase instances. Microsoft phases out weaker encryption. Formula One fans fight phishing in the fast lane. Glassdoor is accused of adding real names to profiles without user consent. Our guest is Adam Meyers, SVP of Counter Adversary Operations at CrowdStrike, discussing how adversaries are attacking cloud environments and why it’s an increasingly popular attack surface. And Pwn2Own winners take home their second Tesla. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Adam Meyers, SVP of Counter Adversary Operations at CrowdStrike, discussing how adversaries are attacking cloud environments and why it’s an increasingly popular attack surface – especially as more companies implement AI. For more information, check out CrowdStrike’s 2024 Global Threat Report. 

Selected Reading
House unanimously passes bill to block data brokers from selling Americans’ info to foreign adversaries (The Record)
Treasury Sanctions Actors Supporting Kremlin-Directed Malign Influence Efforts (US Treasury Department)
China warns foreign hackers are infiltrating ‘hundreds’ of business and government networks (SCMP)
International freight tech firm isolates Canada operations after cyberattack (The Record)
Ivanti urges customers to fix critical RCE flaw in Standalone Sentry solution (Security Affairs)
19 million plaintext passwords exposed by incorrectly configured Firebase instances (Malwarebytes)
Microsoft deprecates 1024-bit Windows RSA keys — now would be a good time to get machine identity management in order (ITPro)
Users ditch Glassdoor, stunned by site adding real names without consent (Ars Technica)
Famous Spa GP F1 race comms hijacked by phishing scammers (Cyber Daily)
Security Researchers Win Second Tesla At Pwn2Own (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The House Unanimously Passes a Bill to Halt Sale of American Data to Foreign Foes. The U.S. Sanctions Russian Individuals and Entities for a Global Disinformation Campaign. China warns of cyber threats from foreign hacking groups. A logistics firm isolates its Canadian division after a cyber attack. Ivanti warns of another critical vulnerability. Researchers find hundreds of vulnerable Firebase instances. Microsoft phases out weaker encryption. Formula One fans fight phishing in the fast lane. Glassdoor is accused of adding real names to profiles without user consent. Our guest is Adam Meyers, SVP of Counter Adversary Operations at CrowdStrike, discussing how adversaries are attacking cloud environments and why it’s an increasingly popular attack surface. And Pwn2Own winners take home their second Tesla. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/adam-meyers-7a58481/">Adam Meyers</a>, SVP of Counter Adversary Operations at <a href="https://www.crowdstrike.com/en-us/">CrowdStrike</a>, discussing how adversaries are attacking cloud environments and why it’s an increasingly popular attack surface – especially as more companies implement AI. For more information, check out CrowdStrike’s <a href="https://www.crowdstrike.com/global-threat-report/">2024 Global Threat Report</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/house-passes-bill-to-block-data-brokers-from-selling-info-to-foreign-adversaries">House unanimously passes bill to block data brokers from selling Americans’ info to foreign adversaries</a> (The Record)</p><p><a href="https://home.treasury.gov/news/press-releases/jy2195">Treasury Sanctions Actors Supporting Kremlin-Directed Malign Influence Efforts</a> (US Treasury Department)</p><p><a href="https://www.scmp.com/news/china/politics/article/3256216/china-warns-foreign-hackers-are-infiltrating-hundreds-business-and-government-networks">China warns foreign hackers are infiltrating ‘hundreds’ of business and government networks</a> (SCMP)</p><p><a href="https://therecord.media/radiant-logistics-cyberattack-canada-operations">International freight tech firm isolates Canada operations after cyberattack</a> (The Record)</p><p><a href="https://securityaffairs.com/160864/security/ivanti-critical-rce.html">Ivanti urges customers to fix critical RCE flaw in Standalone Sentry solution</a> (Security Affairs)</p><p><a href="https://www.malwarebytes.com/blog/personal/2024/03/19-million-plaintext-passwords-exposed-by-incorrectly-configured-firebase-instances">19 million plaintext passwords exposed by incorrectly configured Firebase instances</a> (Malwarebytes)</p><p><a href="https://www.itpro.com/security/microsoft-deprecates-1024-bit-windows-rsa-keys-now-would-be-a-good-time-to-get-machine-identity-management-in-order">Microsoft deprecates 1024-bit Windows RSA keys — now would be a good time to get machine identity management in order</a> (ITPro)</p><p><a href="https://arstechnica.com/tech-policy/2024/03/glassdoor-adding-users-real-names-job-info-to-profiles-without-consent/">Users ditch Glassdoor, stunned by site adding real names without consent</a> (Ars Technica)</p><p><a href="https://www.cyberdaily.au/security/10351-famous-spa-gp-f1-race-comms-hijacked-by-phishing-scammers">Famous Spa GP F1 race comms hijacked by phishing scammers</a> (Cyber Daily)</p><p><a href="https://www.infosecurity-magazine.com/news/security-researchers-win-second/">Security Researchers Win Second Tesla At Pwn2Own </a>(Infosecurity Magazine)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2204</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f0d2c1c8-b95d-11ee-adc6-c3cfd47a056c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2293827286.mp3?updated=1711045994" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sloane Menkes: What is the 2%? [Consultant] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/89/notes</link>
      <description>Principal in PricewaterhouseCoopers Cyber Risk and Regulatory Practice, Sloane Menkes, shares her story of how non-linear math helped to shape her life and career. Sloane credits a high school classmate for inspiring her mantra "What is the 2%?" that she employs when she feels like things are shutting down. She talks about her experiences in calculus class at the US AIr Force Academy that helped to enlighten her and inform the intuitive problem solving skill or way of thinking that she'd been employing in her life. She joined Office of Special Investigations and working with Howard Schmidt is where Sloane first started to get interested in cybersecurity. She shares what she loves about the consulting role is that the environment is constantly changing, and she offers some advice for women interested in cybersecurity. We thank Sloane for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 21 Mar 2024 07:00:00 -0000</pubDate>
      <itunes:title>Sloane Menkes: What is the 2%? [Consultant] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>89</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Principal in PricewaterhouseCoopers Cyber Risk and Regulatory Practice, Sloane Menkes, shares her story of how non-linear math helped to shape her life and career. </itunes:subtitle>
      <itunes:summary>Principal in PricewaterhouseCoopers Cyber Risk and Regulatory Practice, Sloane Menkes, shares her story of how non-linear math helped to shape her life and career. Sloane credits a high school classmate for inspiring her mantra "What is the 2%?" that she employs when she feels like things are shutting down. She talks about her experiences in calculus class at the US AIr Force Academy that helped to enlighten her and inform the intuitive problem solving skill or way of thinking that she'd been employing in her life. She joined Office of Special Investigations and working with Howard Schmidt is where Sloane first started to get interested in cybersecurity. She shares what she loves about the consulting role is that the environment is constantly changing, and she offers some advice for women interested in cybersecurity. We thank Sloane for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Principal in PricewaterhouseCoopers Cyber Risk and Regulatory Practice, Sloane Menkes, shares her story of how non-linear math helped to shape her life and career. Sloane credits a high school classmate for inspiring her mantra "What is the 2%?" that she employs when she feels like things are shutting down. She talks about her experiences in calculus class at the US AIr Force Academy that helped to enlighten her and inform the intuitive problem solving skill or way of thinking that she'd been employing in her life. She joined Office of Special Investigations and working with Howard Schmidt is where Sloane first started to get interested in cybersecurity. She shares what she loves about the consulting role is that the environment is constantly changing, and she offers some advice for women interested in cybersecurity. We thank Sloane for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>506</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[96504d0e-e53d-11ee-adbb-9f8e326d2de2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7994933587.mp3?updated=1645736279" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Biden's cyber splash in protecting the nation's water systems. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2028/notes</link>
      <description>The White House Mobilizes a National Effort to Shield Water Systems from Cyber Threats and Announces Major Investment in U.S. Chip Manufacturing. The U.S. and Allies Issue Fresh Warnings on China's Volt Typhoon Cyber Threats to Critical Infrastructure. Microsoft Streamlines 365 Services with a Unified Cloud Domain. Ukrainian authorities take down a credential theft operation. LockBit claims another pharmaceutical company. A popular Wordpress plugin puts tens of thousands of websites at risk. A breach at Mintlify compromises GitHub tokens. An Idaho man pleads guilty to online extortion. The SEC fines firms for AI washing. We’ve got part two of our continuing Learning Layer series with Joe Carrigan and Sam Meisenberg logging Joe’s journey toward his CISSP certification.  And password stuffing Pokemon. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Join us as part two of the Learning Layer special series kicks off. Over the next several weekly episodes of the Learning Layer, host Sam Meisenberg talks with Joe Carrigan from Johns Hopkins University Information Security Institute, and co-host of Hacking Humans podcast. On this episode, they continue to discuss Joe's journey to becoming a CISSP as well as discussing step one of Joe's study journey: the diagnostic assessment.

Selected Reading
White House Calls on States to Boost Cybersecurity in Water Sector (SecurityWeek)
Five Eyes issue another China Volt Typhoon warning (The Register)
Biden to Tout Government Investing $8.5 Billion in Intel's Computer Chip Plants in Four States (VoaNews)
Microsoft Notifies DevOps Teams That Major Domain Change Is Coming (Cybersecurity News)
Ukraine Arrests Hackers for Selling 100 Million Email, Instagram Accounts (Hack Read)
Pharmaceutical development company investigating cyberattack after LockBit posting (The Record)
WordPress Plugin Flaw Exposes 40,000+ Websites to Cyber Attack (GBHackers)
Mintlify Confirms Data Breach Through Compromised GitHub Tokens (Hack Read)
‘Lifelock’ hacker pleads guilty to extorting medical clinics (The Record)
What does 'AI Washing' mean? Firms Fined $400K by SEC for Exaggerated Statements (Cybersecurity News)
Pokémon resets some users’ passwords after hacking attempts (TechCrunch)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 20 Mar 2024 20:10:00 -0000</pubDate>
      <itunes:title>Biden's cyber splash in protecting the nation's water systems. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2028</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The White House Mobilizes a National Effort to Shield Water Systems from Cyber Threats and Announces Major Investment in U.S. Chip Manufacturing. The U.S. and Allies Issue Fresh Warnings on China's Volt Typhoon Cyber Threats to Critical Infrastructure. Microsoft Streamlines 365 Services with a Unified Cloud Domain. Ukrainian authorities take down a credential theft operation. LockBit claims another pharmaceutical company. A popular Wordpress plugin puts tens of thousands of websites at risk. A breach at Mintlify compromises GitHub tokens. An Idaho man pleads guilty to online extortion. The SEC fines firms for AI washing. We’ve got part two of our continuing Learning Layer series with Joe Carrigan and Sam Meisenberg logging Joe’s journey toward his CISSP certification.  And password stuffing Pokemon. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Join us as part two of the Learning Layer special series kicks off. Over the next several weekly episodes of the Learning Layer, host Sam Meisenberg talks with Joe Carrigan from Johns Hopkins University Information Security Institute, and co-host of Hacking Humans podcast. On this episode, they continue to discuss Joe's journey to becoming a CISSP as well as discussing step one of Joe's study journey: the diagnostic assessment.

Selected Reading
White House Calls on States to Boost Cybersecurity in Water Sector (SecurityWeek)
Five Eyes issue another China Volt Typhoon warning (The Register)
Biden to Tout Government Investing $8.5 Billion in Intel's Computer Chip Plants in Four States (VoaNews)
Microsoft Notifies DevOps Teams That Major Domain Change Is Coming (Cybersecurity News)
Ukraine Arrests Hackers for Selling 100 Million Email, Instagram Accounts (Hack Read)
Pharmaceutical development company investigating cyberattack after LockBit posting (The Record)
WordPress Plugin Flaw Exposes 40,000+ Websites to Cyber Attack (GBHackers)
Mintlify Confirms Data Breach Through Compromised GitHub Tokens (Hack Read)
‘Lifelock’ hacker pleads guilty to extorting medical clinics (The Record)
What does 'AI Washing' mean? Firms Fined $400K by SEC for Exaggerated Statements (Cybersecurity News)
Pokémon resets some users’ passwords after hacking attempts (TechCrunch)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The White House Mobilizes a National Effort to Shield Water Systems from Cyber Threats and Announces Major Investment in U.S. Chip Manufacturing. The U.S. and Allies Issue Fresh Warnings on China's Volt Typhoon Cyber Threats to Critical Infrastructure. Microsoft Streamlines 365 Services with a Unified Cloud Domain. Ukrainian authorities take down a credential theft operation. LockBit claims another pharmaceutical company. A popular Wordpress plugin puts tens of thousands of websites at risk. A breach at Mintlify compromises GitHub tokens. An Idaho man pleads guilty to online extortion. The SEC fines firms for AI washing. We’ve got part two of our continuing Learning Layer series with Joe Carrigan and Sam Meisenberg logging Joe’s journey toward his CISSP certification.  And password stuffing Pokemon. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Join us as part two of the Learning Layer special series kicks off. Over the next several weekly episodes of the Learning Layer, host<a href="https://www.linkedin.com/in/sam-meisenberg/"> Sam Meisenberg</a> talks with<a href="https://www.linkedin.com/in/joecarrigan/"> Joe Carrigan</a> from<a href="https://isi.jhu.edu/"> Johns Hopkins University Information Security Institute</a>, and co-host of<a href="https://thecyberwire.com/podcasts/hacking-humans"> Hacking Humans</a> podcast. On this episode, they continue to discuss Joe's journey to becoming a CISSP as well as discussing step one of Joe's study journey: the diagnostic assessment.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/white-house-calls-on-states-to-boost-cybersecurity-in-water-sector/">White House Calls on States to Boost Cybersecurity in Water Sector</a><a href="https://www.securityweek.com/white-house-calls-on-states-to-boost-cybersecurity-in-water-sector/"> (SecurityWeek</a>)</p><p><a href="https://www.theregister.com/2024/03/20/five_eyes_volt_typhoon/">Five Eyes issue another China Volt Typhoon warning</a><a href="https://www.theregister.com/2024/03/20/five_eyes_volt_typhoon/"> (The Register</a>)</p><p><a href="https://www.voanews.com/a/biden-to-tout-government-investing-8-5-billion-in-intel-s-computer-chip-plants-in-four-states-/7535157.html">Biden to Tout Government Investing $8.5 Billion in Intel's Computer Chip Plants in Four States</a> (VoaNews)</p><p><a href="https://cybersecuritynews.com/microsoft-domain-change-devops-notice/">Microsoft Notifies DevOps Teams That Major Domain Change Is Coming</a> (Cybersecurity News)</p><p><a href="https://www.hackread.com/ukraine-arrests-hackers-selling-100-million-accounts/">Ukraine Arrests Hackers for Selling 100 Million Email, Instagram Accounts</a> (Hack Read)</p><p><a href="https://therecord.media/pharmaceutical-development-company-investigating-cyber-incident-lockbit">Pharmaceutical development company investigating cyberattack after LockBit posting</a> (The Record)</p><p><a href="https://gbhackers.com/wordpress-plugin-flaw-2/">WordPress Plugin Flaw Exposes 40,000+ Websites to Cyber Attack</a> (GBHackers)</p><p><a href="https://www.hackread.com/mintlify-data-breach-compromised-github-tokens/">Mintlify Confirms Data Breach Through Compromised GitHub Tokens</a> (Hack Read)</p><p><a href="https://therecord.media/lifelock-hacker-pleads-guilty-to-attacks-on-medical-clinics">‘Lifelock’ hacker pleads guilty to extorting medical clinics</a> (The Record)</p><p><a href="https://cybersecuritynews.com/ai-washing-mean-firms-fined/">What does 'AI Washing' mean? Firms Fined $400K by SEC for Exaggerated Statements</a> (Cybersecurity News)</p><p><a href="https://techcrunch.com/2024/03/19/pokemon-resets-some-users-passwords-after-hacking-attempts/">Pokémon resets some users’ passwords after hacking attempts</a><a href="https://techcrunch.com/2024/03/19/pokemon-resets-some-users-passwords-after-hacking-attempts/"> (TechCrunch</a>)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1466</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f099c382-b95d-11ee-adc6-07ace3e2a4d6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2251599309.mp3?updated=1710960309" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The SEC's Cybersecurity Law, a New Compliance Era with Jacqueline Wudyka. [Threat Vector]</title>
      <link>https://thecyberwire.com/podcasts/threat-vector/17/notes</link>
      <description>In honor of Women's History Month, please enjoy this episode of the Palo Alto Networks Unit 42's Threat Vector podcast featuring host David Moulton's discussion with Jacqueline Wudyka about the SEC's Cybersecurity Law.

In this episode of Threat Vector, we dive deep into the new SEC cybersecurity regulations that reshape how public companies handle cyber risks. Legal expert and Unit 42 Consultant Jacqueline Wudyka brings a unique perspective on the challenges of defining 'materiality,' the enforcement hurdles, and the impact on the cybersecurity landscape. 
Whether you're a cybersecurity professional, legal expert, or just keen on understanding the latest in cyber law, this episode is packed with insights and strategies for navigating this new terrain. Tune in to stay ahead in the world of cybersecurity compliance!
If you're interested to learn more about Unit 42's world-class visit https://www.paloaltonetworks.com/unit42

﻿Join the conversation on our social media channels:


Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/unit42⁠⁠⁠⁠



Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠



Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠



LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠



YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠



Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 20 Mar 2024 04:00:00 -0000</pubDate>
      <itunes:title>The SEC's Cybersecurity Law, a New Compliance Era with Jacqueline Wudyka. [Threat Vector]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>17</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/e4a35f8c-aa64-11ee-9f45-d73e66c5523f/image/4d8fb510851ee91c3026465e8caee4d7.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In honor of Women's History Month, please enjoy this episode of the Palo Alto Networks Unit 42's Threat Vector podcast featuring host David Moulton's discussion with Jacqueline Wudyka about the SEC's Cybersecurity Law.

In this episode of Threat Vector, we dive deep into the new SEC cybersecurity regulations that reshape how public companies handle cyber risks. Legal expert and Unit 42 Consultant Jacqueline Wudyka brings a unique perspective on the challenges of defining 'materiality,' the enforcement hurdles, and the impact on the cybersecurity landscape. 
Whether you're a cybersecurity professional, legal expert, or just keen on understanding the latest in cyber law, this episode is packed with insights and strategies for navigating this new terrain. Tune in to stay ahead in the world of cybersecurity compliance!
If you're interested to learn more about Unit 42's world-class visit https://www.paloaltonetworks.com/unit42

﻿Join the conversation on our social media channels:


Website: ⁠⁠⁠⁠https://www.paloaltonetworks.com/unit42⁠⁠⁠⁠



Threat Research: ⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠



Facebook: ⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠



LinkedIn: ⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠



YouTube: ⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠



Twitter: ⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong><em>In honor of Women's History Month, please enjoy this episode of the Palo Alto Networks Unit 42's Threat Vector podcast featuring host David Moulton's discussion with Jacqueline Wudyka about the SEC's Cybersecurity Law.</em></strong></p><p><br></p><p>In this episode of Threat Vector, we dive deep into the new SEC cybersecurity regulations that reshape how public companies handle cyber risks. Legal expert and Unit 42 Consultant Jacqueline Wudyka brings a unique perspective on the challenges of defining 'materiality,' the enforcement hurdles, and the impact on the cybersecurity landscape. </p><p>Whether you're a cybersecurity professional, legal expert, or just keen on understanding the latest in cyber law, this episode is packed with insights and strategies for navigating this new terrain. Tune in to stay ahead in the world of cybersecurity compliance!</p><p>If you're interested to learn more about Unit 42's world-class visit <a href="https://www.paloaltonetworks.com/unit42">https://www.paloaltonetworks.com/unit42</a></p><h2><br></h2><h3><strong>﻿Join the conversation on our social media channels:</strong></h3><ul>
<li>
<strong>Website</strong>: <a href="https://www.paloaltonetworks.com/unit42">⁠⁠⁠⁠https://www.paloaltonetworks.com/unit42⁠⁠⁠⁠</a>
</li>
<li>
<strong>Threat Research: </strong><a href="https://unit42.paloaltonetworks.com/">⁠⁠⁠⁠https://unit42.paloaltonetworks.com/⁠⁠⁠⁠</a>
</li>
<li>
<strong>Facebook: </strong><a href="https://www.facebook.com/LifeatPaloAltoNetworks/">⁠⁠⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠⁠⁠</a>
</li>
<li>
<strong>LinkedIn: </strong><a href="https://www.linkedin.com/company/unit42/">⁠⁠⁠⁠https://www.linkedin.com/company/unit42/⁠⁠⁠⁠</a>
</li>
<li>
<strong>YouTube: </strong><a href="https://www.youtube.com/channel/UCvJQO11qoCHYwZ4Ah4Jf-Tw">⁠⁠⁠⁠@PaloAltoNetworksUnit42⁠⁠⁠⁠</a>
</li>
<li>
<strong>Twitter: </strong><a href="https://twitter.com/PaloAltoNtwks">⁠⁠⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠⁠⁠</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1590</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f4ec9706-e15e-11ee-9fcf-ff9747f9c75c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5951983198.mp3?updated=1744830846" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SIM swap scammer pleads guilty. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2027/notes</link>
      <description>A SIM-swapper faces prison and fines. Here come the class action suits against UnitedHealth Group. Aviation and Aerospace find themselves in the cyber crosshairs. A major mortgage lender suffers a major data breach. A look at election misinformation. The UK shares guidance on migrating SCADA systems to the cloud. Collaborative efforts to contain Smoke Loader. Trend Micro uncovers Earth Krahang. Troy Hunt weighs in on the alleged AT&amp;T data breach. Ben Yelin unpacks the case between OpenAI and the New York Times. And fool me once, shame on you…
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Ben Yelin, Program Director at University of Maryland’s Center for Health and Homeland Security and cohost of our Caveat podcast, discusses the article on how “OpenAI says New York Times ‘hacked’ ChatGPT to build copyright lawsuit.”  

Selected Reading
District of New Jersey | Former Telecommunications Company Manager Admits Role in SIM Swapping Scheme (United States Department of Justice)
Cash-Strapped Women's Clinic Sues UnitedHealth Over Attack (Gov Info Security)
Nations Direct Mortgage Data Breach Impacts 83,000 Individuals (SecurityWeek)
Preparing Society for AI-Driven Disinformation in the 2024 Election Cycle (SecurityWeek)
NCSC Publishes Security Guidance for Cloud-Hosted SCADA (Infosecurity Magazine)
Unit 42 Collaborative Research With Ukraine’s Cyber Agency To Uncover the Smoke Loader Backdoor (Palo Alto Networks Unit 42)
Prolific Chinese Threat Campaign Targets 100+ Victims (Infosecurity Magazine)
Troy Hunt: Inside the Massive Alleged AT&amp;T Data Breach (Troy Hunt)
Kids’ Cartoons Get a Free Pass From YouTube’s Deepfake Disclosure Rules (WIRED)
Ransomware Groups: Trust Us. Uh, Don't. (BankInfoSecurity)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Mar 2024 20:10:00 -0000</pubDate>
      <itunes:title>SIM swap scammer pleads guilty. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2027</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A SIM-swapper faces prison and fines. Here come the class action suits against UnitedHealth Group. Aviation and Aerospace find themselves in the cyber crosshairs. A major mortgage lender suffers a major data breach. A look at election misinformation. The UK shares guidance on migrating SCADA systems to the cloud. Collaborative efforts to contain Smoke Loader. Trend Micro uncovers Earth Krahang. Troy Hunt weighs in on the alleged AT&amp;T data breach. Ben Yelin unpacks the case between OpenAI and the New York Times. And fool me once, shame on you…
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Ben Yelin, Program Director at University of Maryland’s Center for Health and Homeland Security and cohost of our Caveat podcast, discusses the article on how “OpenAI says New York Times ‘hacked’ ChatGPT to build copyright lawsuit.”  

Selected Reading
District of New Jersey | Former Telecommunications Company Manager Admits Role in SIM Swapping Scheme (United States Department of Justice)
Cash-Strapped Women's Clinic Sues UnitedHealth Over Attack (Gov Info Security)
Nations Direct Mortgage Data Breach Impacts 83,000 Individuals (SecurityWeek)
Preparing Society for AI-Driven Disinformation in the 2024 Election Cycle (SecurityWeek)
NCSC Publishes Security Guidance for Cloud-Hosted SCADA (Infosecurity Magazine)
Unit 42 Collaborative Research With Ukraine’s Cyber Agency To Uncover the Smoke Loader Backdoor (Palo Alto Networks Unit 42)
Prolific Chinese Threat Campaign Targets 100+ Victims (Infosecurity Magazine)
Troy Hunt: Inside the Massive Alleged AT&amp;T Data Breach (Troy Hunt)
Kids’ Cartoons Get a Free Pass From YouTube’s Deepfake Disclosure Rules (WIRED)
Ransomware Groups: Trust Us. Uh, Don't. (BankInfoSecurity)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A SIM-swapper faces prison and fines. Here come the class action suits against UnitedHealth Group. Aviation and Aerospace find themselves in the cyber crosshairs. A major mortgage lender suffers a major data breach. A look at election misinformation. The UK shares guidance on migrating SCADA systems to the cloud. Collaborative efforts to contain Smoke Loader. Trend Micro uncovers Earth Krahang. Troy Hunt weighs in on the alleged AT&amp;T data breach. Ben Yelin unpacks the case between OpenAI and the New York Times. And fool me once, shame on you…</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/benjamin-yelin-5b14114b/">Ben Yelin</a>, Program Director at <a href="https://www.mdchhs.com/">University of Maryland’s Center for Health and Homeland Security</a> and cohost of our <a href="https://thecyberwire.com/podcasts/caveat">Caveat</a> podcast, discusses the article on how “<a href="https://www.reuters.com/technology/cybersecurity/openai-says-new-york-times-hacked-chatgpt-build-copyright-lawsuit-2024-02-27/">OpenAI says New York Times ‘hacked’ ChatGPT to build copyright lawsuit</a>.”  </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.justice.gov/usao-nj/pr/former-telecommunications-company-manager-admits-role-sim-swapping-scheme">District of New Jersey | Former Telecommunications Company Manager Admits Role in SIM Swapping Scheme </a><a href="https://www.justice.gov/usao-nj/pr/former-telecommunications-company-manager-admits-role-sim-swapping-scheme">(United States Department of Justice</a>)</p><p><a href="https://www.govinfosecurity.com/cash-strapped-womens-clinic-sues-unitedhealth-over-attack-a-24628">Cash-Strapped Women's Clinic Sues UnitedHealth Over Attack</a> (Gov Info Security)</p><p><a href="https://www.securityweek.com/nations-direct-mortgage-data-breach-impacts-83000-individuals/">Nations Direct Mortgage Data Breach Impacts 83,000 Individuals</a> <a href="https://www.securityweek.com/preparing-society-for-ai-driven-disinformation-in-the-2024-election-cycle/">(SecurityWeek</a>)</p><p><a href="https://www.securityweek.com/preparing-society-for-ai-driven-disinformation-in-the-2024-election-cycle/">Preparing Society for AI-Driven Disinformation in the 2024 Election Cycle</a><a href="https://www.securityweek.com/preparing-society-for-ai-driven-disinformation-in-the-2024-election-cycle/"> (SecurityWeek</a>)</p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-security-guidance-cloudhosted/">NCSC Publishes Security Guidance for Cloud-Hosted SCADA</a><a href="https://www.infosecurity-magazine.com/news/ncsc-security-guidance-cloudhosted/"> (Infosecurity Magazine</a>)</p><p><a href="https://unit42.paloaltonetworks.com/unit-42-scpc-ssscip-uncover-smoke-loader-phishing/">Unit 42 Collaborative Research With Ukraine’s Cyber Agency To Uncover the Smoke Loader Backdoor</a> (Palo Alto Networks Unit 42)</p><p><a href="https://www.infosecurity-magazine.com/news/chinese-campaign-targets-100/">Prolific Chinese Threat Campaign Targets 100+ Victims</a><a href="https://www.infosecurity-magazine.com/news/chinese-campaign-targets-100/"> (Infosecurity Magazine</a>)</p><p><a href="https://www.troyhunt.com/inside-the-massive-alleged-att-data-breach/">Troy Hunt: Inside the Massive Alleged AT&amp;T Data Breach</a> (Troy Hunt)</p><p><a href="https://www.wired.com/story/kids-cartoons-free-pass-youtube-deepfake-disclosure-rules/">Kids’ Cartoons Get a Free Pass From YouTube’s Deepfake Disclosure Rules</a><a href="https://www.wired.com/story/kids-cartoons-free-pass-youtube-deepfake-disclosure-rules/"> (WIRED</a>)</p><p><a href="https://www.govinfosecurity.com/blogs/ransomware-groups-trust-us-uh-dont-p-3587">Ransomware Groups: Trust Us. Uh, Don't.</a><a href="https://www.govinfosecurity.com/blogs/ransomware-groups-trust-us-uh-dont-p-3587"> (BankInfoSecurity</a>)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1621</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f0618ab2-b95d-11ee-adc6-836d9ace1391]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9811964873.mp3?updated=1710877538" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Roselle Safran: So much opportunity. [Entrepreneur] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/87/notes</link>
      <description>CEO and Founder of KeyCaliber, Roselle Safran, takes us on her circuitous career journey from startup to White House and back to startup again. With a degree in civil engineering, Roselle veered off into a more technical role at a startup and she says "caught the startup bug." After convincing a hiring manager that she could learn on the job, she transitioned to computer forensics and started on the path of cybersecurity. Roselle worked in government for the Department of Homeland Security and then to the Executive Office of the President leading all of the security operations. She jumped back into the world of startups and has stayed there. Roselle tells people interested in a career in cybersecurity to just apply. Learn as much as you can and go for it. We thank Roselle for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Mar 2024 07:00:00 -0000</pubDate>
      <itunes:title>Roselle Safran: So much opportunity. [Entrepreneur] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>87</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>CEO and Founder of KeyCaliber, Roselle Safran, takes us on her circuitous career journey from startup to White House and back to startup again.  </itunes:subtitle>
      <itunes:summary>CEO and Founder of KeyCaliber, Roselle Safran, takes us on her circuitous career journey from startup to White House and back to startup again. With a degree in civil engineering, Roselle veered off into a more technical role at a startup and she says "caught the startup bug." After convincing a hiring manager that she could learn on the job, she transitioned to computer forensics and started on the path of cybersecurity. Roselle worked in government for the Department of Homeland Security and then to the Executive Office of the President leading all of the security operations. She jumped back into the world of startups and has stayed there. Roselle tells people interested in a career in cybersecurity to just apply. Learn as much as you can and go for it. We thank Roselle for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CEO and Founder of KeyCaliber, Roselle Safran, takes us on her circuitous career journey from startup to White House and back to startup again. With a degree in civil engineering, Roselle veered off into a more technical role at a startup and she says "caught the startup bug." After convincing a hiring manager that she could learn on the job, she transitioned to computer forensics and started on the path of cybersecurity. Roselle worked in government for the Department of Homeland Security and then to the Executive Office of the President leading all of the security operations. She jumped back into the world of startups and has stayed there. Roselle tells people interested in a career in cybersecurity to just apply. Learn as much as you can and go for it. We thank Roselle for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>412</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f8e6dcb8-e53c-11ee-bacd-dfb7aa2b3e58]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2019857454.mp3?updated=1644517042" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The hot pursuit of Volt Typhoon. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2026/notes</link>
      <description>Volt Typhoon retains the attention of US investigators. The IMF reports a cyber breach. Fujitsu finds malware on internal systems. Securonix researchers describe DEEP#GOSU targeting South Korea. Subsea cable breaks leave West and Central Africa offline. Health care groups oppose enhanced cyber security regulations. A Pennsylvania school district grapples with a ransomware attack. AT&amp;T denies a data leak. Our guest Kevin Magee of Microsoft Canada shared his experiments with board reporting. And Apex Legends eSports competitors get some unexpected upgrades. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest today is Kevin Magee of Microsoft Canada sharing his experiments using N2K’s CSO Rick Howard's forecasting methodology from his Cybersecurity First Principles book regarding board reporting. 

Selected Reading
US is still chasing down pieces of Chinese hacking operation, NSA official says (The Record)
IMF Investigates Serious Cybersecurity Breach (Infosecurity Magazine)
Tech giant Fujitsu says it was hacked, warns of data breach (TechCrunch)
Analysis of New DEEP#GOSU Attack Campaign Likely Associated with North Korean Kimsuky Targeting Victims with Stealthy Malware (securonix)
Ghana says repairs on subsea cables could take five weeks  (Reuters)
Health care groups resist cybersecurity rules in wake of landmark breach (CyberScoop)
Pennsylvania’s Scranton School District dealing with ransomware attack (The Record)
AT&amp;T says leaked data of 70 million people is not from its systems (BleepingComputer)
The Aviation and Aerospace Sectors Face Skyrocketing Cyber Threats (Security Affairs)
Massive ‘Apex Legends’ Hack Disrupts NA Finals, Raises Serious Security Concerns (Forbes)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 18 Mar 2024 20:10:00 -0000</pubDate>
      <itunes:title>The hot pursuit of Volt Typhoon. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2026</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Volt Typhoon retains the attention of US investigators. The IMF reports a cyber breach. Fujitsu finds malware on internal systems. Securonix researchers describe DEEP#GOSU targeting South Korea. Subsea cable breaks leave West and Central Africa offline. Health care groups oppose enhanced cyber security regulations. A Pennsylvania school district grapples with a ransomware attack. AT&amp;T denies a data leak. Our guest Kevin Magee of Microsoft Canada shared his experiments with board reporting. And Apex Legends eSports competitors get some unexpected upgrades. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest today is Kevin Magee of Microsoft Canada sharing his experiments using N2K’s CSO Rick Howard's forecasting methodology from his Cybersecurity First Principles book regarding board reporting. 

Selected Reading
US is still chasing down pieces of Chinese hacking operation, NSA official says (The Record)
IMF Investigates Serious Cybersecurity Breach (Infosecurity Magazine)
Tech giant Fujitsu says it was hacked, warns of data breach (TechCrunch)
Analysis of New DEEP#GOSU Attack Campaign Likely Associated with North Korean Kimsuky Targeting Victims with Stealthy Malware (securonix)
Ghana says repairs on subsea cables could take five weeks  (Reuters)
Health care groups resist cybersecurity rules in wake of landmark breach (CyberScoop)
Pennsylvania’s Scranton School District dealing with ransomware attack (The Record)
AT&amp;T says leaked data of 70 million people is not from its systems (BleepingComputer)
The Aviation and Aerospace Sectors Face Skyrocketing Cyber Threats (Security Affairs)
Massive ‘Apex Legends’ Hack Disrupts NA Finals, Raises Serious Security Concerns (Forbes)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Volt Typhoon retains the attention of US investigators. The IMF reports a cyber breach. Fujitsu finds malware on internal systems. Securonix researchers describe DEEP#GOSU targeting South Korea. Subsea cable breaks leave West and Central Africa offline. Health care groups oppose enhanced cyber security regulations. A Pennsylvania school district grapples with a ransomware attack. AT&amp;T denies a data leak. Our guest Kevin Magee of Microsoft Canada shared his experiments with board reporting. And Apex Legends eSports competitors get some unexpected upgrades. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest today is <a href="https://www.linkedin.com/in/kmagee/">Kevin Magee</a> of <a href="https://www.microsoft.com/en-ca/sites/partner-hub/security.aspx">Microsoft Canada</a> sharing his experiments using <a href="https://www.n2k.com/">N2K</a>’s CSO <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a>'s forecasting methodology from his <a href="https://www.amazon.com/Cybersecurity-First-Principles-Strategy-Tactics/dp/1394173083/ref=cm_cr_arp_d_product_top?ie=UTF8">Cybersecurity First Principles</a> book regarding board reporting. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/china-hacking-volt-typhoon-response-nsa-rob-joyce">US is still chasing down pieces of Chinese hacking operation, NSA official says</a> (The Record)</p><p><a href="https://www.infosecurity-magazine.com/news/imf-investigates-serious/">IMF Investigates Serious Cybersecurity Breach</a><a href="https://www.infosecurity-magazine.com/news/imf-investigates-serious/"> (Infosecurity Magazine</a>)</p><p><a href="https://techcrunch.com/2024/03/18/fujitsu-tech-giant-hacked-customer-data-breach/">Tech giant Fujitsu says it was hacked, warns of data breach</a><a href="https://techcrunch.com/2024/03/18/fujitsu-tech-giant-hacked-customer-data-breach/"> (TechCrunch</a>)</p><p><a href="https://www.securonix.com/blog/securonix-threat-research-security-advisory-new-deepgosu-attack-campaign/">Analysis of New DEEP#GOSU Attack Campaign Likely Associated with North Korean Kimsuky Targeting Victims with Stealthy Malware</a> (securonix)</p><p><a href="https://www.reuters.com/world/africa/ghana-says-repairs-subsea-cables-could-take-five-weeks-2024-03-16/">Ghana says repairs on subsea cables could take five weeks </a><a href="https://www.reuters.com/world/africa/ghana-says-repairs-subsea-cables-could-take-five-weeks-2024-03-16/"> (Reuters</a>)</p><p><a href="https://cyberscoop.com/health-care-groups-resist-cybersecurity-rules-in-wake-of-landmark-breach/">Health care groups resist cybersecurity rules in wake of landmark breach</a><a href="https://cyberscoop.com/health-care-groups-resist-cybersecurity-rules-in-wake-of-landmark-breach/"> (CyberScoop</a>)</p><p><a href="https://therecord.media/pennsylvania-scranton-school-district-ransomware-attack">Pennsylvania’s Scranton School District dealing with ransomware attack</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/att-says-leaked-data-of-70-million-people-is-not-from-its-systems/">AT&amp;T says leaked data of 70 million people is not from its systems</a> (BleepingComputer)</p><p><a href="https://securityaffairs.com/160664/uncategorized/aviation-and-aerospace-sectors-cyber-threats.html">The Aviation and Aerospace Sectors Face Skyrocketing Cyber Threats</a> (Security Affairs)</p><p><a href="https://www.forbes.com/sites/paultassi/2024/03/17/massive-apex-legends-hack-disrupts-na-finals-raises-serious-security-questions/">Massive ‘Apex Legends’ Hack Disrupts NA Finals, Raises Serious Security Concerns</a> (Forbes)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1475</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f0291e3e-b95d-11ee-adc6-6f57a97659b8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6244427359.mp3?updated=1710790356" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Dawn Cappelli: Becoming the cyber fairy godmother. [OT] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/150/notes</link>
      <description>Dawn Cappelli, OT CERT Director at Dragos, sits down to share what she has learned after her 25+ year career in the industry. She recalls wanting to have been a rockstar when she grew up, now she refers to herself as the fairy godmother of security. She shares some of the amazing things she got to work on throughout her career, including working with the Secret Service when the Olympics came to Salt Lake City, Utah in 2002. She shares how she was able to rise through the ranks to get to where she is now. Dawn talks about how she wasn't ready to retire quite yet because she loved the industry so much, saying "I retired, but I knew I still loved security. I have this passion for protection and so Dragos came along and they offered me this role of Director of OT CERT. I feel like I'm the security fairy godmother." She shares words of wisdom for all trying to get into the industry, saying that you need to always take the risk like she did when she first started her career. We thank Dawn for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 17 Mar 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Dawn Cappelli: Becoming the cyber fairy godmother. [OT] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>150</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dawn Cappelli, OT CERT Director at Dragos, sits down to share what she has learned after her 25+ year career in the industry. She recalls wanting to have been a rockstar when she grew up, now she refers to herself as the fairy godmother of security. She shares some of the amazing things she got to work on throughout her career, including working with the Secret Service when the Olympics came to Salt Lake City, Utah in 2002. She shares how she was able to rise through the ranks to get to where she is now. Dawn talks about how she wasn't ready to retire quite yet because she loved the industry so much, saying "I retired, but I knew I still loved security. I have this passion for protection and so Dragos came along and they offered me this role of Director of OT CERT. I feel like I'm the security fairy godmother." She shares words of wisdom for all trying to get into the industry, saying that you need to always take the risk like she did when she first started her career. We thank Dawn for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dawn Cappelli, OT CERT Director at Dragos, sits down to share what she has learned after her 25+ year career in the industry. She recalls wanting to have been a rockstar when she grew up, now she refers to herself as the fairy godmother of security. She shares some of the amazing things she got to work on throughout her career, including working with the Secret Service when the Olympics came to Salt Lake City, Utah in 2002. She shares how she was able to rise through the ranks to get to where she is now. Dawn talks about how she wasn't ready to retire quite yet because she loved the industry so much, saying "I retired, but I knew I still loved security. I have this passion for protection and so Dragos came along and they offered me this role of Director of OT CERT. I feel like I'm the security fairy godmother." She shares words of wisdom for all trying to get into the industry, saying that you need to always take the risk like she did when she first started her career. We thank Dawn for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>602</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fde11b3e-e2d5-11ee-9a46-4f72c7150210]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5163282461.mp3?updated=1710512167" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unveiling the updated NICE Framework &amp; cybersecurity education’s future. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/59/notes</link>
      <description>The Workforce Framework for Cybersecurity (NICE Framework) (NIST Special Publication 800-181, revision 1) provides a set of building blocks for describing the Tasks, Knowledge, and Skills (TKS) that are needed to perform cybersecurity work by individuals or teams. Through these building blocks, the NICE Framework enables organizations to develop their workforces to perform cybersecurity work, and it helps learners to explore cybersecurity work and to engage in appropriate learning activities to develop their knowledge and skills.
On this Special Edition podcast, N2K CyberWire's Dave Bittner is joined by the team at NIST and FIU's Jack D. Gordon Institute for Public Policy to delve into the history of the NICE Framework through its latest update and looking into the future. Brian Fonseca, Director at the Jack D. Gordon Institute for Public Policy, shares an introduction to the NICE Framework. Karen Wetzel, NICE Framework Manager, discusses the updates to the framework. Rodney Petersen, Director of NICE, talks about what these updates mean to cybersecurity education's future.
Resources:

NICE Framework Resource Center

Getting Started with the NICE Framework


2024 NICE Conference and Expo: Strengthening Ecosystems: Aligning Stakeholders to Bridge the Cybersecurity Workforce Gap

Take advantage of the early bird pricing until March 19, 2024. Don’t miss out on this opportunity!


Jack D. Gordon Institute for Public Policy at Florida International University (FIU)

Veterans and First Responders Training Initiative

Intelligence Fellowship


And be sure to check out our live webinar: CISOs are the new Architects (of the Workforce)
Join N2K’s Simone Petrella and Intuit’s Kim Jones on Wednesday, March 27th for an online discussion about the pivotal role security leaders play in shaping the security workforce landscape, and how we can start showing up for the future of our industry. Learn more and register on the event page.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 17 Mar 2024 07:00:00 -0000</pubDate>
      <itunes:title>Unveiling the updated NICE Framework &amp; cybersecurity education’s future. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>59</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Workforce Framework for Cybersecurity (NICE Framework) (NIST Special Publication 800-181, revision 1) provides a set of building blocks for describing the Tasks, Knowledge, and Skills (TKS) that are needed to perform cybersecurity work by individuals or teams. Through these building blocks, the NICE Framework enables organizations to develop their workforces to perform cybersecurity work, and it helps learners to explore cybersecurity work and to engage in appropriate learning activities to develop their knowledge and skills.
On this Special Edition podcast, N2K CyberWire's Dave Bittner is joined by the team at NIST and FIU's Jack D. Gordon Institute for Public Policy to delve into the history of the NICE Framework through its latest update and looking into the future. Brian Fonseca, Director at the Jack D. Gordon Institute for Public Policy, shares an introduction to the NICE Framework. Karen Wetzel, NICE Framework Manager, discusses the updates to the framework. Rodney Petersen, Director of NICE, talks about what these updates mean to cybersecurity education's future.
Resources:

NICE Framework Resource Center

Getting Started with the NICE Framework


2024 NICE Conference and Expo: Strengthening Ecosystems: Aligning Stakeholders to Bridge the Cybersecurity Workforce Gap

Take advantage of the early bird pricing until March 19, 2024. Don’t miss out on this opportunity!


Jack D. Gordon Institute for Public Policy at Florida International University (FIU)

Veterans and First Responders Training Initiative

Intelligence Fellowship


And be sure to check out our live webinar: CISOs are the new Architects (of the Workforce)
Join N2K’s Simone Petrella and Intuit’s Kim Jones on Wednesday, March 27th for an online discussion about the pivotal role security leaders play in shaping the security workforce landscape, and how we can start showing up for the future of our industry. Learn more and register on the event page.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The <a href="https://doi.org/10.6028/NIST.SP.800-181r1">Workforce Framework for Cybersecurity (NICE Framework)</a> (NIST Special Publication 800-181, revision 1) provides a set of building blocks for describing the Tasks, Knowledge, and Skills (TKS) that are needed to perform cybersecurity work by individuals or teams. Through these building blocks, the NICE Framework enables organizations to develop their workforces to perform cybersecurity work, and it helps learners to explore cybersecurity work and to engage in appropriate learning activities to develop their knowledge and skills.</p><p>On this Special Edition podcast, N2K CyberWire's <a href="https://www.linkedin.com/in/dave-bittner-27231a4/">Dave Bittner</a> is joined by the team at NIST and FIU's Jack D. Gordon Institute for Public Policy to delve into the history of the NICE Framework through its latest update and looking into the future. <a href="https://www.linkedin.com/in/brianpfonseca/">Brian Fonseca</a>, Director at the Jack D. Gordon Institute for Public Policy, shares an introduction to the NICE Framework. <a href="https://www.linkedin.com/in/wetzel/">Karen Wetzel</a>, NICE Framework Manager, discusses the updates to the framework. <a href="https://www.linkedin.com/in/rodneypetersen/">Rodney Petersen</a>, Director of NICE, talks about what these updates mean to cybersecurity education's future.</p><p>Resources:</p><ul>
<li><a href="https://www.nist.gov/itl/applied-cybersecurity/nice/nice-framework-resource-center">NICE Framework Resource Center</a></li>
<li><a href="https://www.nist.gov/itl/applied-cybersecurity/nice/nice-framework-resource-center/getting-started">Getting Started with the NICE Framework</a></li>
<li>
<a href="https://niceconference.org/">2024 NICE Conference and Expo</a>: Strengthening Ecosystems: Aligning Stakeholders to Bridge the Cybersecurity Workforce Gap</li>
<li class="ql-indent-1">Take advantage of the <a href="https://niceconference.org/registration-landing/">early bird pricing</a> until March 19, 2024. Don’t miss out on this opportunity!</li>
<li>
<a href="http://gordoninstitute.fiu.edu/">Jack D. Gordon Institute for Public Policy</a> at Florida International University (FIU)</li>
<li><a href="https://gordoninstitute.fiu.edu/cybersecurity-policy/veterans-and-first-responders-training/index.html">Veterans and First Responders Training Initiative</a></li>
<li><a href="https://gordoninstitute.fiu.edu/academics/intelligence-fellowship/index.html">Intelligence Fellowship</a></li>
</ul><p><br></p><p><strong>And be sure to check out our live webinar: CISOs are the new Architects (of the Workforce)</strong></p><p>Join N2K’s Simone Petrella and Intuit’s Kim Jones on Wednesday, March 27th for an online discussion about the pivotal role security leaders play in shaping the security workforce landscape, and how we can start showing up for the future of our industry. Learn more and register on the <a href="https://www.brighttalk.com/webcast/18820/607438?bt_tok=%7B%7Brecord.BT_fastpass_token%7D%7D&amp;utm_source=N2KNetworks&amp;utm_medium=brighttalk&amp;utm_campaign=607438">event page</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2672</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[86e19974-e30b-11ee-89ff-3fafc1f2a553]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3837873504.mp3?updated=1712179567" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Inside SendGrid's phishy business. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/321/notes</link>
      <description>Robert Duncan from Netcraft is sharing their research on "Phishception - SendGrid abused to host phishing attacks impersonating itself." Netcraft has recently observed that criminals abused Twilio SendGrid’s email delivery, API, and marketing services to launch a phishing campaign impersonating itself. 
Hackers behind this novel phishing campaign used SendGrid’s Tracking Settings feature, which allows users to track clicks, opens, and subscriptions with SendGrid. The malicious link was masked behind a tracking link hosted by SendGrid. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
The research can be found here:
Phishception – SendGrid is abused to host phishing attacks impersonating itself

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Mar 2024 07:00:00 -0000</pubDate>
      <itunes:title>Inside SendGrid's phishy business. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>321</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Robert Duncan from Netcraft is sharing their research on "Phishception - SendGrid abused to host phishing attacks impersonating itself." Netcraft has recently observed that criminals abused Twilio SendGrid’s email delivery, API, and marketing services to launch a phishing campaign impersonating itself. 
Hackers behind this novel phishing campaign used SendGrid’s Tracking Settings feature, which allows users to track clicks, opens, and subscriptions with SendGrid. The malicious link was masked behind a tracking link hosted by SendGrid. 
Please take a moment to fill out an audience survey! Let us know how we are doing! 
The research can be found here:
Phishception – SendGrid is abused to host phishing attacks impersonating itself

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Robert Duncan from Netcraft is sharing their research on "Phishception - SendGrid abused to host phishing attacks impersonating itself." Netcraft has recently observed that criminals abused Twilio SendGrid’s email delivery, API, and marketing services to launch a phishing campaign impersonating itself. </p><p>Hackers behind this novel phishing campaign used SendGrid’s Tracking Settings feature, which allows users to track clicks, opens, and subscriptions with SendGrid. The malicious link was masked behind a tracking link hosted by SendGrid. </p><p><em>Please take a moment to fill out an </em><a href="https://www.surveymonkey.com/r/cwcv-listener"><em>audience survey</em></a><em>! Let us know how we are doing! </em></p><p>The research can be found here:</p><ul><li><a href="https://www.netcraft.com/blog/popular-email-platform-used-to-impersonate-itself/">Phishception – SendGrid is abused to host phishing attacks impersonating itself</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1675</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[23954430-e309-11ee-a0dc-27194fcdee73]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2146271399.mp3?updated=1710533409" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Flight fiasco: UK Defence Minister's jet faces GPS jamming.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2025/notes</link>
      <description>Russia’s accused of jamming a jet carrying the UK’s defense minister. Senators introduce a bipartisan Section 702 compromise bill. The Cybercrime Atlas initiative seeks to dismantle cybercrime. StopCrypt ransomware grows stealthier. A Scottish healthcare provider is under cyber attack. Workers in France are at risk of data exposure. CERT-BE warns of critical vulnerabilities in Arcserve UDP software. The FCC approves IoT device labeling. Researchers snoop on AI chat responses. A MITRE-Harris poll tracks citizens’ concern over critical infrastructure. On our Solution Spotlight, N2K President Simone Petrella discusses the shortage of ethical hackers against the rise of AI with IOActive's CTO Gunter Ollmann. The FTC fines notorious tech support scammers. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight, N2K President Simone Petrella discusses the shortage of ethical hackers against the rise of AI with IOActive's CTO Gunter Ollmann.

Coming this weekend
Tune in to the CyberWire Daily Podcast feed on Sunday for a Special Edition podcast we produced in collaboration with our partners at NICE, “Unveiling the updated NICE Framework &amp; cybersecurity education’s future.” We delve into the history of the NICE Framework, dig into its latest update, and look into the future of cybersecurity education.

Selected Reading
Defence Secretary jet hit by an electronic warfare attack in Poland (Security Affairs)
Russia believed to have jammed signal on UK defence minister's plane - source (Reuters)
Senators propose a compromise over hot-button Section 702 renewal (The Record)
WEF effort to disrupt cybercrime moves into operations phase (The Register)
StopCrypt: Most widely distributed ransomware now evades detection (Bleeping Computer)
Scottish health service says ‘focused and ongoing cyber attack’ may disrupt services (The Record)
Massive Data Breach Exposes Info of 43 Million French Workers (Hack Read)
WARNING: THREE VULNERABILITIES IN ARCSERVE UDP SOFTWARE DEMAND URGENT ACTION, PATCH IMMEDIATELY! (certbe)
FCC approves cybersecurity label for consumer devices  (CyberScoop)
Hackers can read private AI-assistant chats even though they’re encrypted  (Ars Technica)
MITRE-Harris poll reveals US public's concerns over critical infrastructure and perceived risks  (Industrial Cyber)
Tech Support Firms Agree to $26M FTC Settlement Over Fake Services (SecurityWeek)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 15 Mar 2024 20:10:00 -0000</pubDate>
      <itunes:title>Flight fiasco: UK Defence Minister's jet faces GPS jamming.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2025</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Russia’s accused of jamming a jet carrying the UK’s defense minister. Senators introduce a bipartisan Section 702 compromise bill. The Cybercrime Atlas initiative seeks to dismantle cybercrime. StopCrypt ransomware grows stealthier. A Scottish healthcare provider is under cyber attack. Workers in France are at risk of data exposure. CERT-BE warns of critical vulnerabilities in Arcserve UDP software. The FCC approves IoT device labeling. Researchers snoop on AI chat responses. A MITRE-Harris poll tracks citizens’ concern over critical infrastructure. On our Solution Spotlight, N2K President Simone Petrella discusses the shortage of ethical hackers against the rise of AI with IOActive's CTO Gunter Ollmann. The FTC fines notorious tech support scammers. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight, N2K President Simone Petrella discusses the shortage of ethical hackers against the rise of AI with IOActive's CTO Gunter Ollmann.

Coming this weekend
Tune in to the CyberWire Daily Podcast feed on Sunday for a Special Edition podcast we produced in collaboration with our partners at NICE, “Unveiling the updated NICE Framework &amp; cybersecurity education’s future.” We delve into the history of the NICE Framework, dig into its latest update, and look into the future of cybersecurity education.

Selected Reading
Defence Secretary jet hit by an electronic warfare attack in Poland (Security Affairs)
Russia believed to have jammed signal on UK defence minister's plane - source (Reuters)
Senators propose a compromise over hot-button Section 702 renewal (The Record)
WEF effort to disrupt cybercrime moves into operations phase (The Register)
StopCrypt: Most widely distributed ransomware now evades detection (Bleeping Computer)
Scottish health service says ‘focused and ongoing cyber attack’ may disrupt services (The Record)
Massive Data Breach Exposes Info of 43 Million French Workers (Hack Read)
WARNING: THREE VULNERABILITIES IN ARCSERVE UDP SOFTWARE DEMAND URGENT ACTION, PATCH IMMEDIATELY! (certbe)
FCC approves cybersecurity label for consumer devices  (CyberScoop)
Hackers can read private AI-assistant chats even though they’re encrypted  (Ars Technica)
MITRE-Harris poll reveals US public's concerns over critical infrastructure and perceived risks  (Industrial Cyber)
Tech Support Firms Agree to $26M FTC Settlement Over Fake Services (SecurityWeek)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russia’s accused of jamming a jet carrying the UK’s defense minister. Senators introduce a bipartisan Section 702 compromise bill. The Cybercrime Atlas initiative seeks to dismantle cybercrime. StopCrypt ransomware grows stealthier. A Scottish healthcare provider is under cyber attack. Workers in France are at risk of data exposure. CERT-BE warns of critical vulnerabilities in Arcserve UDP software. The FCC approves IoT device labeling. Researchers snoop on AI chat responses. A MITRE-Harris poll tracks citizens’ concern over critical infrastructure. On our Solution Spotlight, N2K President Simone Petrella discusses the shortage of ethical hackers against the rise of AI with IOActive's CTO Gunter Ollmann. The FTC fines notorious tech support scammers. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Solution Spotlight, <a href="https://www.n2k.com/">N2K</a> President <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a> discusses the shortage of ethical hackers against the rise of AI with <a href="https://ioactive.com/">IOActive</a>'s CTO <a href="https://www.linkedin.com/in/gunterollmann/">Gunter Ollmann</a>.</p><p><br></p><h2>Coming this weekend</h2><p>Tune in to the CyberWire Daily Podcast feed on Sunday for a <a href="https://thecyberwire.com/podcasts/special-edition">Special Edition</a> podcast we produced in collaboration with our partners at NICE, “Unveiling the updated NICE Framework &amp; cybersecurity education’s future.” We delve into the history of the NICE Framework, dig into its latest update, and look into the future of cybersecurity education.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://securityaffairs.com/160499/cyber-warfare-2/electronic-warfare-hit-defence-secretary-jet.html">Defence Secretary jet hit by an electronic warfare attack in Poland</a> (Security Affairs)</p><p><a href="https://www.reuters.com/world/uk/russia-believed-have-jammed-signal-uk-defence-ministers-plane-source-2024-03-14/">Russia believed to have jammed signal on UK defence minister's plane - source (Reuters</a>)</p><p><a href="https://therecord.media/senators-durbin-lee-propose-section-702-compromise">Senators propose a compromise over hot-button Section 702 renewal</a> (The Record)</p><p><a href="https://www.theregister.com/2024/03/14/wef_cybercrime_atlas/">WEF effort to disrupt cybercrime moves into operations phase (The Register</a>)</p><p><a href="https://www.bleepingcomputer.com/news/security/stopcrypt-most-widely-distributed-ransomware-now-evades-detection/">StopCrypt: Most widely distributed ransomware now evades detection</a> (Bleeping Computer)</p><p><a href="https://therecord.media/scottish-nhs-cyberattack-healthcare-dumfries-galloway">Scottish health service says ‘focused and ongoing cyber attack’ may disrupt services</a> (The Record)</p><p><a href="https://www.hackread.com/massive-data-breach-43-million-french-workers/">Massive Data Breach Exposes Info of 43 Million French Workers</a> (Hack Read)</p><p><a href="https://cert.be/en/advisory/warning-three-vulnerabilities-arcserve-udp-software-demand-urgent-action-patch-immediately">WARNING: THREE VULNERABILITIES IN ARCSERVE UDP SOFTWARE DEMAND URGENT ACTION, PATCH IMMEDIATELY!</a> (certbe)</p><p><a href="https://cyberscoop.com/fcc-cyber-trust-mark/">FCC approves cybersecurity label for consumer devices  (CyberScoop</a>)</p><p><a href="https://arstechnica.com/security/2024/03/hackers-can-read-private-ai-assistant-chats-even-though-theyre-encrypted/">Hackers can read private AI-assistant chats even though they’re encrypted  (Ars Technica</a>)</p><p><a href="https://industrialcyber.co/critical-infrastructure/mitre-harris-poll-reveals-us-publics-concerns-over-critical-infrastructure-and-perceived-risks/">MITRE-Harris poll reveals US public's concerns over critical infrastructure and perceived risks  (Industrial Cyber</a>)</p><p><a href="https://www.securityweek.com/tech-support-firms-agree-to-26m-ftc-settlement-over-fake-services/">Tech Support Firms Agree to $26M FTC Settlement Over Fake Services (SecurityWeek</a><em>)</em></p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1874</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eff03b3c-b95d-11ee-adc6-f78ee0f267a4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8824238106.mp3?updated=1710529750" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A CIA Psychologist on the Minds of World Leaders, Pt. 1 with Dr. Ursula Wilder [SpyCast]</title>
      <link>https://thecyberwire.com/podcasts/spycast/621/notes</link>
      <description>In honor of Women's History Month, please enjoy this episode of the International Spy Museum's SpyCast podcast featuring part 1 of Andrew Hammond's discussion with Dr. Ursula Wilder of the Central Intelligence Agency. 

Summary
Dr. Ursula Wilder (LinkedIn) joins Andrew (X; LinkedIn) to discuss the intersections between psychology and intelligence. Ursula is a clinical psychologist with over two decades of experience working at the Central Intelligence Agency. 

What You’ll Learn
Intelligence

How psychology can be useful to national security

Historical examples of leadership analysis 

Leadership personality assessments &amp; the Cuban Missile Crisis

Psychoanalytic theory and espionage 

Reflections	

Human nature throughout history

History repeating itself 

And much, much more …

Quotes of the Week
“Together, these documents are quite powerful. The psych assessments are very, very carefully, tightly held and are classified at a high level. Every intelligence officer has this fantasy about seeing the file that's kept on them by the opponents.”

Resources 
SURFACE SKIM
*SpyCasts*


Agent of Betrayal, FBI Spy Robert Hanssen with CBS’ Major Garrett and Friends (2023)


The North Korean Defector with Former DPRK Agent Kim, Hyun Woo (2023)


SPY@20 – “The Spy of the Century” with Curators Alexis and Andrew on Kim Philby (2022)


“How Spies Think” – 10 Lessons in Intelligence with Sir David Omand (2020)

*Beginner Resources*


What is Psychoanalysis? Institute of Psychoanalysis, YouTube (2011) [3 min. video]


Psychologists in the CIA, American Psychological Association (2002) [Short article]


7 Reasons to Study Psychology, University of Toronto (n.d.) [Short article]

DEEPER DIVE
Books


Freud and Beyond, S. A. Mitchell (Basic Books, 2016)


Narcissism and Politics: Dreams of Glory, J. M. Post (Cambridge University Press, 2014)


The True Believer: Thoughts on the Nature of Mass Movements, E. Hoffer (Harper Perennial Modern Classics, 2010) 


Team of Rivals: The Political Genius of Abraham Lincoln, D. K. Goodwin (Simon &amp; Schuster, 2004)


Leaders, Fools, and Impostors: Essays on the Psychology of Leadership, M. F. R. Kets de Vries (iUniverse, 2003) 

Primary Sources 


Charles de Gaulle to Pamela Digby Churchill (1942) 


Blood, Toil, Tears and Sweat (1940)


Memoirs of Ulysses S. Grant (1885)


Gettysburg Address (1863) 


House Divided Speech (1858)


Excerpt on Cleopatra from Plutarch's Life of Julius Caesar (ca. 2nd century AD)


Plutarch’s The Life of Alexander (ca. 2nd century AD) 

Appian’s The Civil Wars (ca. 2nd century AD) 


Virgil’s The Aeneid (19 B.C.E) 

*Wildcard Resource*


On Dreams by Sigmund Freud (1901)

In this simplified version of the father of psychoanalysis’ seminal book The Interpretation of Dreams, you can get a small taste for Freudian philosophy. Freud believed that dreams were a reflection of the subconscious mind and that studying a person’s dreams can elucidate their inner wants and needs. What are your dreams telling you? 


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 15 Mar 2024 05:00:00 -0000</pubDate>
      <itunes:title>A CIA Psychologist on the Minds of World Leaders, Pt. 1 with Dr. Ursula Wilder [SpyCast]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>621</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In honor of Women's History Month, please enjoy this episode of the International Spy Museum's SpyCast podcast featuring part 1 of Andrew Hammond's discussion with Dr. Ursula Wilder of the Central Intelligence Agency. 

Summary
Dr. Ursula Wilder (LinkedIn) joins Andrew (X; LinkedIn) to discuss the intersections between psychology and intelligence. Ursula is a clinical psychologist with over two decades of experience working at the Central Intelligence Agency. 

What You’ll Learn
Intelligence

How psychology can be useful to national security

Historical examples of leadership analysis 

Leadership personality assessments &amp; the Cuban Missile Crisis

Psychoanalytic theory and espionage 

Reflections	

Human nature throughout history

History repeating itself 

And much, much more …

Quotes of the Week
“Together, these documents are quite powerful. The psych assessments are very, very carefully, tightly held and are classified at a high level. Every intelligence officer has this fantasy about seeing the file that's kept on them by the opponents.”

Resources 
SURFACE SKIM
*SpyCasts*


Agent of Betrayal, FBI Spy Robert Hanssen with CBS’ Major Garrett and Friends (2023)


The North Korean Defector with Former DPRK Agent Kim, Hyun Woo (2023)


SPY@20 – “The Spy of the Century” with Curators Alexis and Andrew on Kim Philby (2022)


“How Spies Think” – 10 Lessons in Intelligence with Sir David Omand (2020)

*Beginner Resources*


What is Psychoanalysis? Institute of Psychoanalysis, YouTube (2011) [3 min. video]


Psychologists in the CIA, American Psychological Association (2002) [Short article]


7 Reasons to Study Psychology, University of Toronto (n.d.) [Short article]

DEEPER DIVE
Books


Freud and Beyond, S. A. Mitchell (Basic Books, 2016)


Narcissism and Politics: Dreams of Glory, J. M. Post (Cambridge University Press, 2014)


The True Believer: Thoughts on the Nature of Mass Movements, E. Hoffer (Harper Perennial Modern Classics, 2010) 


Team of Rivals: The Political Genius of Abraham Lincoln, D. K. Goodwin (Simon &amp; Schuster, 2004)


Leaders, Fools, and Impostors: Essays on the Psychology of Leadership, M. F. R. Kets de Vries (iUniverse, 2003) 

Primary Sources 


Charles de Gaulle to Pamela Digby Churchill (1942) 


Blood, Toil, Tears and Sweat (1940)


Memoirs of Ulysses S. Grant (1885)


Gettysburg Address (1863) 


House Divided Speech (1858)


Excerpt on Cleopatra from Plutarch's Life of Julius Caesar (ca. 2nd century AD)


Plutarch’s The Life of Alexander (ca. 2nd century AD) 

Appian’s The Civil Wars (ca. 2nd century AD) 


Virgil’s The Aeneid (19 B.C.E) 

*Wildcard Resource*


On Dreams by Sigmund Freud (1901)

In this simplified version of the father of psychoanalysis’ seminal book The Interpretation of Dreams, you can get a small taste for Freudian philosophy. Freud believed that dreams were a reflection of the subconscious mind and that studying a person’s dreams can elucidate their inner wants and needs. What are your dreams telling you? 


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<h3><strong><em>In honor of Women's History Month, please enjoy this episode of the International Spy Museum's SpyCast podcast featuring part 1 of Andrew Hammond's discussion with Dr. Ursula Wilder of the Central Intelligence Agency. </em></strong></h3><h3><br></h3><p><strong>Summary</strong></p><p>Dr. Ursula Wilder (<a href="https://www.linkedin.com/in/ursula-m-wilder-5a5b87148/">LinkedIn</a>) joins Andrew (<a href="https://twitter.com/spyhistorian">X</a>; <a href="https://www.linkedin.com/in/andrew-hammond-09344936/">LinkedIn)</a> to discuss the intersections between psychology and intelligence. Ursula is a clinical psychologist with over two decades of experience working at the Central Intelligence Agency. </p><h3><br></h3><h3><strong>What You’ll Learn</strong></h3><h3><strong>Intelligence</strong></h3><ul>
<li>How psychology can be useful to national security</li>
<li>Historical examples of leadership analysis </li>
<li>Leadership personality assessments &amp; the Cuban Missile Crisis</li>
<li>Psychoanalytic theory and espionage </li>
</ul><h3><strong>Reflections	</strong></h3><ul>
<li>Human nature throughout history</li>
<li>History repeating itself </li>
</ul><h3><strong>And much, much more …</strong></h3><h3><br></h3><h3><strong>Quotes of the Week</strong></h3><p><em>“Together, these documents are quite powerful. The psych assessments are very, very carefully, tightly held and are classified at a high level. Every intelligence officer has this fantasy about seeing the file that's kept on them by the opponents.”</em></p><p><br></p><h3><strong>Resources </strong></h3><h3><strong>SURFACE SKIM</strong></h3><h3><strong>*SpyCasts*</strong></h3><ul>
<li>
<a href="https://thecyberwire.com/podcasts/spycast/610/notes">Agent of Betrayal, FBI Spy Robert Hanssen</a> with CBS’ Major Garrett and Friends (2023)</li>
<li>
<a href="https://thecyberwire.com/podcasts/spycast/591/notes">The North Korean Defector</a> with Former DPRK Agent Kim, Hyun Woo (2023)</li>
<li>
<a href="https://thecyberwire.com/podcasts/spycast/548/notes">SPY@20 – “The Spy of the Century”</a> with Curators Alexis and Andrew on Kim Philby (2022)</li>
<li>
<a href="https://thecyberwire.com/podcasts/spycast/456/notes">“How Spies Think” – 10 Lessons in Intelligence</a> with Sir David Omand (2020)</li>
</ul><h3><strong>*Beginner Resources*</strong></h3><ul>
<li>
<a href="https://www.youtube.com/watch?v=uM2FGc0wDg8">What is Psychoanalysis?</a> Institute of Psychoanalysis, <em>YouTube</em> (2011) [3 min. video]</li>
<li>
<a href="https://www.apa.org/monitor/apr02/cia">Psychologists in the CIA</a>, <em>American Psychological Association</em> (2002) [Short article]</li>
<li>
<a href="https://www.psych.utoronto.ca/our-department/7-reasons-study-psychology">7 Reasons to Study Psychology</a>, <em>University of Toronto</em> (n.d.) [Short article]</li>
</ul><h3><strong>DEEPER DIVE</strong></h3><h3><strong>Books</strong></h3><ul>
<li>
<em>Freud and Beyond</em>, S. A. Mitchell (Basic Books, 2016)</li>
<li>
<em>Narcissism and Politics: Dreams of Glory</em>, J. M. Post (Cambridge University Press, 2014)</li>
<li>
<em>The True Believer: Thoughts on the Nature of Mass Movements</em>, E. Hoffer (Harper Perennial Modern Classics, 2010) </li>
<li>
<em>Team of Rivals: The Political Genius of Abraham Lincoln</em>, D. K. Goodwin (Simon &amp; Schuster, 2004)</li>
<li>
<em>Leaders, Fools, and Impostors: Essays on the Psychology of Leadership</em>, M. F. R. Kets de Vries (iUniverse, 2003) </li>
</ul><h3><strong>Primary Sources </strong></h3><ul>
<li>
<a href="https://www.loc.gov/exhibits/churchill/interactive/_html/wc0159.html">Charles de Gaulle to Pamela Digby Churchill</a> (1942) </li>
<li>
<a href="https://www.parliament.uk/about/living-heritage/transformingsociety/private-lives/yourcountry/collections/churchillexhibition/churchill-the-orator/blood-toil-sweat-and-tears/">Blood, Toil, Tears and Sweat</a> (1940)</li>
<li>
<a href="https://www.gutenberg.org/files/4367/4367-h/4367-h.htm">Memoirs of Ulysses S. Grant</a> (1885)</li>
<li>
<a href="https://home.nps.gov/liho/learn/historyculture/gettysburgaddress.htm">Gettysburg Address</a> (1863) </li>
<li>
<a href="https://home.nps.gov/liho/learn/historyculture/housedivided.htm">House Divided Speech</a> (1858)</li>
<li>
<a href="https://bingweb.binghamton.edu/~jstarks/cleoplut.html">Excerpt on Cleopatra from Plutarch's Life of Julius Caesar</a> (ca. 2nd century AD)</li>
<li>
<a href="https://penelope.uchicago.edu/Thayer/e/roman/texts/plutarch/lives/alexander*/3.html">Plutarch’s The Life of Alexander</a> (ca. 2nd century AD) </li>
<li>Appian’s <a href="https://penelope.uchicago.edu/thayer/e/roman/texts/appian/civil_wars/1*.html">The Civil Wars</a> (ca. 2nd century AD) </li>
<li>
<a href="https://classics.mit.edu/Virgil/aeneid.html">Virgil’s The Aeneid</a> (19 B.C.E) </li>
</ul><h3><strong>*Wildcard Resource*</strong></h3><ul>
<li>
<a href="https://www.sas.upenn.edu/~cavitch/pdf-library/Freud_SE_On_Dreams_complete.pdf">On Dreams</a> by Sigmund Freud (1901)</li>
<li class="ql-indent-1">In this simplified version of the father of psychoanalysis’ seminal book <em>The Interpretation of Dreams,</em> you can get a small taste for Freudian philosophy. Freud believed that dreams were a reflection of the subconscious mind and that studying a person’s dreams can elucidate their inner wants and needs. What are your dreams telling you? </li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3873</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[65a022c2-db30-11ee-8781-87c52afd2d8f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8562583065.mp3?updated=1708123264" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>TikTok showdown: U.S. lawmakers target privacy and security.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2024/notes</link>
      <description>The US House votes to enact restrictions on TikTok. HHS launches an investigation into Change Healthcare. An Irish Covid-19 portal puts over a million vaccination records at risk. Google distributes $10 million in bug bounty rewards. Nissan Oceana reports a data breach resulting from an Akira ransomware attack. Meta sues a former VP for alleged data theft.  eSentire sees Blind Eagle focusing on the manufacturing sector. Claroty outlines threats to health care devices. A major provider of yachts is rocked by a cyber incident. In our Threat Vector segment, David Moulton explores the new SEC cybersecurity regulations with legal expert and Unit 42 Consultant Jacqueline Wudyka. And ransomware victims want their overtime pay. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On the Threat Vector segment, host David Moulton explores the new SEC cybersecurity regulations that reshape how public companies handle cyber risks with legal expert and Unit 42 Consultant Jacqueline Wudyka. They discuss the challenges of defining 'materiality,' the enforcement hurdles, and the impact on the cybersecurity landscape. 

Selected Reading
Bill that could spur TikTok ban gains House OK  (SC Media)
What would a TikTok ban look like for users? (NBC News)
HHS to investigate UnitedHealth and ransomware attack on Change Healthcare (The Record)
How a user access bug in Ireland’s vaccination website exposed more than a million records (ITPro)
Google Paid $10m in Bug Bounties to Security Researchers in 2023 (Infosecurity Magazine)
Nearly 100K impacted by Nissan Oceania cyberattack (SC Media)
Meta Sues Former VP After Defection to AI Startup (Infosecurity Magazine)
Malware Analysis: Blind Eagle's North American Journey (esentire)
Only 13% of medical devices support endpoint protection agents (Help Net Security)
Billion-dollar boat seller MarineMax reports cyberattack to SEC (The Record)
City workers not getting paid overtime amid Hamilton's ransomware attack: unions (CBS News)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 14 Mar 2024 20:10:00 -0000</pubDate>
      <itunes:title>TikTok showdown: U.S. lawmakers target privacy and security.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2024</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The US House votes to enact restrictions on TikTok. HHS launches an investigation into Change Healthcare. An Irish Covid-19 portal puts over a million vaccination records at risk. Google distributes $10 million in bug bounty rewards. Nissan Oceana reports a data breach resulting from an Akira ransomware attack. Meta sues a former VP for alleged data theft.  eSentire sees Blind Eagle focusing on the manufacturing sector. Claroty outlines threats to health care devices. A major provider of yachts is rocked by a cyber incident. In our Threat Vector segment, David Moulton explores the new SEC cybersecurity regulations with legal expert and Unit 42 Consultant Jacqueline Wudyka. And ransomware victims want their overtime pay. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On the Threat Vector segment, host David Moulton explores the new SEC cybersecurity regulations that reshape how public companies handle cyber risks with legal expert and Unit 42 Consultant Jacqueline Wudyka. They discuss the challenges of defining 'materiality,' the enforcement hurdles, and the impact on the cybersecurity landscape. 

Selected Reading
Bill that could spur TikTok ban gains House OK  (SC Media)
What would a TikTok ban look like for users? (NBC News)
HHS to investigate UnitedHealth and ransomware attack on Change Healthcare (The Record)
How a user access bug in Ireland’s vaccination website exposed more than a million records (ITPro)
Google Paid $10m in Bug Bounties to Security Researchers in 2023 (Infosecurity Magazine)
Nearly 100K impacted by Nissan Oceania cyberattack (SC Media)
Meta Sues Former VP After Defection to AI Startup (Infosecurity Magazine)
Malware Analysis: Blind Eagle's North American Journey (esentire)
Only 13% of medical devices support endpoint protection agents (Help Net Security)
Billion-dollar boat seller MarineMax reports cyberattack to SEC (The Record)
City workers not getting paid overtime amid Hamilton's ransomware attack: unions (CBS News)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US House votes to enact restrictions on TikTok. HHS launches an investigation into Change Healthcare. An Irish Covid-19 portal puts over a million vaccination records at risk. Google distributes $10 million in bug bounty rewards. Nissan Oceana reports a data breach resulting from an Akira ransomware attack. Meta sues a former VP for alleged data theft.  eSentire sees Blind Eagle focusing on the manufacturing sector. Claroty outlines threats to health care devices. A major provider of yachts is rocked by a cyber incident. In our Threat Vector segment, David Moulton explores the new SEC cybersecurity regulations with legal expert and Unit 42 Consultant Jacqueline Wudyka. And ransomware victims want their overtime pay. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On the Threat Vector segment, host <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a> explores the new SEC cybersecurity regulations that reshape how public companies handle cyber risks with legal expert and <a href="https://start.paloaltonetworks.com/2023-unit42-ransomware-extortion-report?utm_source=google-jg-amer-unit42-unrc-unpr&amp;utm_medium=paid_search&amp;utm_campaign=google-unit42-more_prepared-amer-multi-lead_gen-en&amp;utm_content=gs-20369915902-151765342072-665533446612&amp;utm_term=palo%20alto%20unit%2042&amp;sfdcid=7014u000001VVbzAAG&amp;cq_plac=&amp;cq_net=g&amp;gad_source=1&amp;gclid=CjwKCAjw17qvBhBrEiwA1rU9wz3IeIZrim9x4RmJU3tLyniWl4ay9SPjIKm1ra3RRkQC-iEr-zO8bxoCQfIQAvD_BwE">Unit 42</a> Consultant <a href="https://www.linkedin.com/in/jacquelinewudyka/">Jacqueline Wudyka</a>. They discuss the challenges of defining 'materiality,' the enforcement hurdles, and the impact on the cybersecurity landscape. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.scmagazine.com/brief/bill-that-could-spur-tiktok-ban-gains-house-ok">Bill that could spur TikTok ban gains House OK </a><a href="https://www.scmagazine.com/brief/bill-that-could-spur-tiktok-ban-gains-house-ok"> (SC Media</a>)</p><p><a href="https://www.nbcnews.com/tech/tech-news/tiktok-ban-bill-congress-senate-means-date-rcna143189">What would a TikTok ban look like for users?</a> (NBC News)</p><p><a href="https://therecord.media/hhs-investigating-unitedhealth-after-ransomware-attack">HHS to investigate UnitedHealth and ransomware attack on Change Healthcare</a> (The Record)</p><p><a href="https://www.itpro.com/security/how-a-user-access-bug-in-irelands-vaccination-website-exposed-more-than-a-million-records">How a user access bug in Ireland’s vaccination website exposed more than a million records</a><a href="https://www.itpro.com/security/how-a-user-access-bug-in-irelands-vaccination-website-exposed-more-than-a-million-records"> (ITPro</a>)</p><p><a href="https://www.infosecurity-magazine.com/news/google-paid-10m-bug-bounties/">Google Paid $10m in Bug Bounties to Security Researchers in 2023</a> <a href="https://www.infosecurity-magazine.com/news/meta-sues-former-vp-defection-ai/">(Infosecurity Magazine</a>)</p><p><a href="https://www.scmagazine.com/brief/nearly-100k-impacted-by-nissan-oceania-cyberattack">Nearly 100K impacted by Nissan Oceania cyberattack</a><a href="https://www.scmagazine.com/brief/nearly-100k-impacted-by-nissan-oceania-cyberattack"> (SC Media</a>)</p><p><a href="https://www.infosecurity-magazine.com/news/meta-sues-former-vp-defection-ai/">Meta Sues Former VP After Defection to AI Startup</a><a href="https://www.infosecurity-magazine.com/news/meta-sues-former-vp-defection-ai/"> (Infosecurity Magazine</a>)</p><p><a href="https://www.esentire.com/blog/blind-eagles-north-american-journey">Malware Analysis: Blind Eagle's North American Journey</a> (esentire)</p><p><a href="https://www.helpnetsecurity.com/2024/03/14/medical-devices-cybersecurity-concerns/">Only 13% of medical devices support endpoint protection agents</a><a href="https://www.helpnetsecurity.com/2024/03/14/medical-devices-cybersecurity-concerns/"> (Help Net Security</a>)</p><p><a href="https://therecord.media/boat-seller-marinemax-reports-cyberattack-sec">Billion-dollar boat seller MarineMax reports cyberattack to SEC</a> (The Record)</p><p><a href="https://www.cbc.ca/news/canada/hamilton/city-workers-no-overtime-pay-ransomware-cyber-attack-1.7141261">City workers not getting paid overtime amid Hamilton's ransomware attack: unions</a> (CBS News)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1666</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[efb73d32-b95d-11ee-adc6-4f143ea722f9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2070819266.mp3?updated=1710444021" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Teresa Rothaar: Outwork the competition. [Analyst] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/131/notes</link>
      <description>Teresa Rothaar, a governance, risk, and compliance (GRC) analyst at Keeper Security sits down to share her story, from performer to cyber. She fell in love with writing as a young girl, she experimented with writing fanfiction which made her want to grow up to be in the arts. After attending college she found that she was good at math, lighting the way for her to start her cyber career. Teresa moved to being a writer at Keeper, finding she wanted to spread out and try more, so she ended up becoming an analyst while still doing writing on the side. She quotes David Duchovny in an interview once, explaining how sometimes you need to keep your head down and outwork others. Teresa said this resonated with her, saying, "that's how I went from a foreclosure box on the porch to where I am now. I have a good job and, and I have a career and I have a really good career and I absolutely love it." We thank Teresa for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 14 Mar 2024 07:00:00 -0000</pubDate>
      <itunes:title>Teresa Rothaar: Outwork the competition. [Analyst] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>131</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Teresa Rothaar, a governance, risk, and compliance (GRC) analyst at Keeper Security sits down to share her story, from performer to cyber. She fell in love with writing as a young girl, she experimented with writing fanfiction which made her want to grow up to be in the arts. After attending college she found that she was good at math, lighting the way for her to start her cyber career. Teresa moved to being a writer at Keeper, finding she wanted to spread out and try more, so she ended up becoming an analyst while still doing writing on the side. She quotes David Duchovny in an interview once, explaining how sometimes you need to keep your head down and outwork others. Teresa said this resonated with her, saying, "that's how I went from a foreclosure box on the porch to where I am now. I have a good job and, and I have a career and I have a really good career and I absolutely love it." We thank Teresa for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Teresa Rothaar, a governance, risk, and compliance (GRC) analyst at Keeper Security sits down to share her story, from performer to cyber. She fell in love with writing as a young girl, she experimented with writing fanfiction which made her want to grow up to be in the arts. After attending college she found that she was good at math, lighting the way for her to start her cyber career. Teresa moved to being a writer at Keeper, finding she wanted to spread out and try more, so she ended up becoming an analyst while still doing writing on the side. She quotes David Duchovny in an interview once, explaining how sometimes you need to keep your head down and outwork others. Teresa said this resonated with her, saying, "that's how I went from a foreclosure box on the porch to where I am now. I have a good job and, and I have a career and I have a really good career and I absolutely love it." We thank Teresa for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>438</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b6a35e8-dfbb-11ee-91d7-0703f568018e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2112527774.mp3?updated=1673039060" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The usual suspects are up to their usual tricks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2023/notes</link>
      <description>ODNI’s Annual Threat Assessment highlights the usual suspects. The White House meets with UnitedHealth Group’s CEO. A convicted LockBit operator gets four years in prison. The Clop ransomware group leaks data from major universities. Equilend discloses a data breach. Fortinet announces critical and high-severity vulnerabilities. GhostRace exploits speculative race conditions in popular CPUs. Incognito Market pulls the rug and extorts its users. Patch Tuesday notes. On the Learning Layer, Sam Meisenberg talks with Joe Carrigan from Johns Hopkins University Information Security Institute, and co-host of Hacking Humans podcast. They explore Joe's journey on the road to taking his CISSP test. And, I do not authorize Facebook, Meta or any of its subsidiaries to use this podcast.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Join us as a Learning Layer special series kicks off. Over the next several weekly episodes of the Learning Layer, host Sam Meisenberg talks with Joe Carrigan from Johns Hopkins University Information Security Institute, and co-host of Hacking Humans podcast. On this episode, they explore Joe's journey as he embarks on the road to taking his CISSP test after fourteen years in the cyber industry, and why he decided to get it now. Learn more about ISC2’s Certified Information Systems Security Professional (CISSP) certification, and explore our online certification courses, practice tests, and labs that ensure that you’re ready for exam day.

Selected Reading
ODNI's 2024 Threat Assessment: China, Russia, North Korea pose major cyber threats amid global instability - Industrial Cyber (Industrial Cyber)
White House meets with UnitedHealth CEO over hack  (Reuters)
LockBit ransomware affiliate gets four years in jail, to pay $860k (bleepingcomputer)
Stanford University ransomware attack impacts 27K  (SC Media)
EquiLend Employee Data Breached After January Ransomware Attack (HACKread)
Fortinet reports two critical and three high severity issues, plan to patch (beyondmachines)
Major CPU, Software Vendors Impacted by New GhostRace Attack (SecurityWeek)
Incognito Market: The not-so-secure dark web drug marketplace  (Graham Cluley)
Microsoft Patch Tuesday – Major Flaws In Office, Exchange And SQL Server (cybersecuritynews)
New Facebook photo rule hoax spreads (Malwarebytes) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 13 Mar 2024 20:30:00 -0000</pubDate>
      <itunes:title>The usual suspects are up to their usual tricks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2023</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>ODNI’s Annual Threat Assessment highlights the usual suspects. The White House meets with UnitedHealth Group’s CEO. A convicted LockBit operator gets four years in prison. The Clop ransomware group leaks data from major universities. Equilend discloses a data breach. Fortinet announces critical and high-severity vulnerabilities. GhostRace exploits speculative race conditions in popular CPUs. Incognito Market pulls the rug and extorts its users. Patch Tuesday notes. On the Learning Layer, Sam Meisenberg talks with Joe Carrigan from Johns Hopkins University Information Security Institute, and co-host of Hacking Humans podcast. They explore Joe's journey on the road to taking his CISSP test. And, I do not authorize Facebook, Meta or any of its subsidiaries to use this podcast.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Join us as a Learning Layer special series kicks off. Over the next several weekly episodes of the Learning Layer, host Sam Meisenberg talks with Joe Carrigan from Johns Hopkins University Information Security Institute, and co-host of Hacking Humans podcast. On this episode, they explore Joe's journey as he embarks on the road to taking his CISSP test after fourteen years in the cyber industry, and why he decided to get it now. Learn more about ISC2’s Certified Information Systems Security Professional (CISSP) certification, and explore our online certification courses, practice tests, and labs that ensure that you’re ready for exam day.

Selected Reading
ODNI's 2024 Threat Assessment: China, Russia, North Korea pose major cyber threats amid global instability - Industrial Cyber (Industrial Cyber)
White House meets with UnitedHealth CEO over hack  (Reuters)
LockBit ransomware affiliate gets four years in jail, to pay $860k (bleepingcomputer)
Stanford University ransomware attack impacts 27K  (SC Media)
EquiLend Employee Data Breached After January Ransomware Attack (HACKread)
Fortinet reports two critical and three high severity issues, plan to patch (beyondmachines)
Major CPU, Software Vendors Impacted by New GhostRace Attack (SecurityWeek)
Incognito Market: The not-so-secure dark web drug marketplace  (Graham Cluley)
Microsoft Patch Tuesday – Major Flaws In Office, Exchange And SQL Server (cybersecuritynews)
New Facebook photo rule hoax spreads (Malwarebytes) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>ODNI’s Annual Threat Assessment highlights the usual suspects. The White House meets with UnitedHealth Group’s CEO. A convicted LockBit operator gets four years in prison. The Clop ransomware group leaks data from major universities. Equilend discloses a data breach. Fortinet announces critical and high-severity vulnerabilities. GhostRace exploits speculative race conditions in popular CPUs. Incognito Market pulls the rug and extorts its users. Patch Tuesday notes. On the Learning Layer, Sam Meisenberg talks with Joe Carrigan from Johns Hopkins University Information Security Institute, and co-host of Hacking Humans podcast. They explore Joe's journey on the road to taking his CISSP test. And, I do not authorize Facebook, Meta or any of its subsidiaries to use this podcast.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Join us as a Learning Layer special series kicks off. Over the next several weekly episodes of the Learning Layer, host<a href="https://www.linkedin.com/in/sam-meisenberg/"> </a><a href="https://www.linkedin.com/in/sam-meisenberg/">Sam Meisenberg</a> talks with<a href="https://www.linkedin.com/in/joecarrigan/"> </a><a href="https://www.linkedin.com/in/joecarrigan/">Joe Carrigan</a> from<a href="https://isi.jhu.edu/"> </a><a href="https://isi.jhu.edu/">Johns Hopkins University Information Security Institute</a>, and co-host of<a href="https://thecyberwire.com/podcasts/hacking-humans"> </a><a href="https://thecyberwire.com/podcasts/hacking-humans">Hacking Humans</a> podcast. On this episode, they explore Joe's journey as he embarks on the road to taking his<a href="https://www.isc2.org/certifications/cissp"> </a><a href="https://www.isc2.org/certifications/cissp">CISSP</a> test after fourteen years in the cyber industry, and why he decided to get it now. Learn more about ISC2’s <a href="https://certify.cybervista.net/products/isc2/cissp-training-course/?utm_source=CWDP&amp;utm_medium=LL&amp;utm_campaign=HH_CISSP">Certified Information Systems Security Professional (CISSP) certification</a>, and explore our online certification courses, practice tests, and labs that ensure that you’re ready for exam day.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://industrialcyber.co/reports/odnis-2024-threat-assessment-china-russia-north-korea-pose-major-cyber-threats-amid-rising-global-instability/">ODNI's 2024 Threat Assessment: China, Russia, North Korea pose major cyber threats amid global instability - Industrial Cyber</a> (Industrial Cyber)</p><p><a href="https://www.reuters.com/world/us/white-house-summons-unitedhealth-ceo-over-hack-washington-post-reports-2024-03-12/">White House meets with UnitedHealth CEO over hack </a><a href="https://www.reuters.com/world/us/white-house-summons-unitedhealth-ceo-over-hack-washington-post-reports-2024-03-12/"> (Reuters</a>)</p><p><a href="https://www.bleepingcomputer.com/news/security/lockbit-ransomware-affiliate-gets-four-years-in-jail-to-pay-860k/">LockBit ransomware affiliate gets four years in jail, to pay $860k</a> (bleepingcomputer)</p><p><a href="https://www.scmagazine.com/brief/stanford-university-ransomware-attack-impacts-27k">Stanford University ransomware attack impacts 27K </a><a href="https://www.scmagazine.com/brief/stanford-university-ransomware-attack-impacts-27k"> (SC Media</a>)</p><p><a href="https://www.hackread.com/equilend-employee-data-breach-ransomware-attack/">EquiLend Employee Data Breached After January Ransomware Attack</a> (HACKread)</p><p><a href="https://beyondmachines.net/event_details/fortinet-reports-two-critical-and-three-high-severity-issues-plan-to-patch-8-0-x-j-f/gD2P6Ple2L">Fortinet reports two critical and three high severity issues, plan to patch</a> (beyondmachines)</p><p><a href="https://www.securityweek.com/major-cpu-software-vendors-impacted-by-new-ghostrace-attack/">Major CPU, Software Vendors Impacted by New GhostRace Attack </a><a href="https://www.securityweek.com/major-cpu-software-vendors-impacted-by-new-ghostrace-attack/">(SecurityWeek</a>)</p><p><a href="https://grahamcluley.com/incognito-market-the-not-so-secure-dark-web-drug-marketplace/">Incognito Market: The not-so-secure dark web drug marketplace </a><a href="https://grahamcluley.com/incognito-market-the-not-so-secure-dark-web-drug-marketplace/"> (Graham Cluley</a>)</p><p><a href="https://cybersecuritynews.com/microsoft-patch-tuesday-march-2024/">Microsoft Patch Tuesday – Major Flaws In Office, Exchange And SQL Server</a> (cybersecuritynews)</p><p><a href="https://www.malwarebytes.com/blog/news/2024/03/new-facebook-photo-rule-hoax-spreads">New Facebook photo rule hoax spreads</a><a href="https://www.malwarebytes.com/blog/news/2024/03/new-facebook-photo-rule-hoax-spreads"> (Malwarebytes</a>) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1512</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ef7e7d94-b95d-11ee-adc6-57b73589d506]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7821047093.mp3?updated=1710359996" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Biden's budget boost for cybersecurity.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2022/notes</link>
      <description>Biden’s budget earmarks thirteen billion bucks for cybersecurity. DOJ targets AI abuse. A US trade mission to the Philippines includes cyber training. CISA and OMB release a secure software attestation form. CyberArk explores AI worms. Russia arrests a South Korean on cyber espionage charges. French government agencies are hit with DDoS attacks. Jessica Brandt is named director of the Foreign Malign Influence Center. Afternoon Cyber Tea host Ann Johnson speaks with her guest Keren Elazari about the hacker mindset. Google builds itself the Bermuda Triangle of Broadband. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Afternoon Cyber Tea host Ann Johnson talks with her guest Keren Elazari about the hacker mindset. To hear the full conversation, please listen to the episode of Afternoon Cyber Tea.

Selected Reading
US Federal Budget Proposes $27.5B for Cybersecurity (GovInfo Security)
Justice Department Beefs up Focus on Artificial Intelligence Enforcement, Warns of Harsher Sentences (SecurityWeek)
Microsoft to train 100,000 Philippine women in AI, cybersecurity (South China Morning Post)
US launches secure software development attestation form to enhance federal cybersecurity (Industrial Cyber)
The Rise of AI Worms in Cybersecurity (Security Boulevard)
South Korean detained earlier this year is accused of espionage in Russia, state news agency says (Associated Press) 
Massive cyberattacks hit French government agencies (Security Affairs)
ODNI appoints new election security leader ahead of presidential race (The Record)
Google’s self-designed office swallows Wi-Fi “like the Bermuda Triangle” ( Ars Technica)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Mar 2024 20:10:00 -0000</pubDate>
      <itunes:title>Biden's budget boost for cybersecurity.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2022</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Biden’s budget earmarks thirteen billion bucks for cybersecurity. DOJ targets AI abuse. A US trade mission to the Philippines includes cyber training. CISA and OMB release a secure software attestation form. CyberArk explores AI worms. Russia arrests a South Korean on cyber espionage charges. French government agencies are hit with DDoS attacks. Jessica Brandt is named director of the Foreign Malign Influence Center. Afternoon Cyber Tea host Ann Johnson speaks with her guest Keren Elazari about the hacker mindset. Google builds itself the Bermuda Triangle of Broadband. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Afternoon Cyber Tea host Ann Johnson talks with her guest Keren Elazari about the hacker mindset. To hear the full conversation, please listen to the episode of Afternoon Cyber Tea.

Selected Reading
US Federal Budget Proposes $27.5B for Cybersecurity (GovInfo Security)
Justice Department Beefs up Focus on Artificial Intelligence Enforcement, Warns of Harsher Sentences (SecurityWeek)
Microsoft to train 100,000 Philippine women in AI, cybersecurity (South China Morning Post)
US launches secure software development attestation form to enhance federal cybersecurity (Industrial Cyber)
The Rise of AI Worms in Cybersecurity (Security Boulevard)
South Korean detained earlier this year is accused of espionage in Russia, state news agency says (Associated Press) 
Massive cyberattacks hit French government agencies (Security Affairs)
ODNI appoints new election security leader ahead of presidential race (The Record)
Google’s self-designed office swallows Wi-Fi “like the Bermuda Triangle” ( Ars Technica)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Biden’s budget earmarks thirteen billion bucks for cybersecurity. DOJ targets AI abuse. A US trade mission to the Philippines includes cyber training. CISA and OMB release a secure software attestation form. CyberArk explores AI worms. Russia arrests a South Korean on cyber espionage charges. French government agencies are hit with DDoS attacks. Jessica Brandt is named director of the Foreign Malign Influence Center. Afternoon Cyber Tea host Ann Johnson speaks with her guest Keren Elazari about the hacker mindset. Google builds itself the Bermuda Triangle of Broadband. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Afternoon Cyber Tea host <a href="https://www.linkedin.com/in/ann-johnsons/">Ann Johnson</a> talks with her guest <a href="https://www.linkedin.com/in/kerene/?originalSubdomain=il">Keren Elazari</a> about the hacker mindset. To hear the full conversation, please listen to the <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea/92/notes">episode</a> of <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.govinfosecurity.com/us-federal-budget-proposes-275b-for-cybersecurity-a-24575">US Federal Budget Proposes $27.5B for Cybersecurity</a> (GovInfo Security)</p><p><a href="https://www.securityweek.com/justice-department-beefs-up-focus-on-artificial-intelligence-enforcement-warns-of-harsher-sentences/">Justice Department Beefs up Focus on Artificial Intelligence Enforcement, Warns of Harsher Sentences </a>(SecurityWeek)</p><p><a href="https://www.scmp.com/news/asia/southeast-asia/article/3255084/microsoft-train-100000-philippine-women-ai-cybersecurity">Microsoft to train 100,000 Philippine women in AI, cybersecurity </a>(South China Morning Post)</p><p><a href="https://industrialcyber.co/cisa/us-launches-secure-software-development-attestation-form-to-enhance-federal-cybersecurity/">US launches secure software development attestation form to enhance federal cybersecurity </a>(Industrial Cyber)</p><p><a href="https://securityboulevard.com/2024/03/the-rise-of-ai-worms-in-cybersecurity/">The Rise of AI Worms in Cybersecurity </a>(Security Boulevard)</p><p><a href="https://apnews.com/article/russia-south-korea-spying-ba8f0c260b1c8a9b203d39c3d90f75c2">South Korean detained earlier this year is accused of espionage in Russia, state news agency says</a> (Associated Press) </p><p><a href="https://securityaffairs.com/160374/hacking/massive-cyberattacks-hit-french-government-agencies.html">Massive cyberattacks hit French government agencies</a> (Security Affairs)</p><p><a href="https://therecord.media/jessica-brandt-election-security-odni-foreign-malign-influence-center">ODNI appoints new election security leader ahead of presidential race</a> (The Record)</p><p><a href="https://arstechnica.com/gadgets/2024/03/googles-self-designed-office-swallows-wi-fi-like-the-bermuda-triangle/">Google’s self-designed office swallows Wi-Fi “like the Bermuda Triangle”</a> ( Ars Technica)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1270</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ef45bb62-b95d-11ee-adc6-2fd07345038b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7605166987.mp3?updated=1710262890" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kyla Guru: You are a key piece to our national security. [Education] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/34/notes</link>
      <description>Founder and CEO of nonprofit Bits N' Bytes Cybersecurity Education and undergraduate student at Stanford University, Kyla Guru shares her journey from GenCyber Camp to becoming a cybersecurity thought leader. Seeing the need. for cybersecurity education in her own community spurred Kyla into action engaging our civilian population in understanding their role in the cybersecurity space. Kyla recommends putting yourself out there: taking courses, getting more knowledge, getting internships, meeting people and going to conferences. Kyla thinks her generation has an inquisitive mind and feels that is where advocacy and education come in with cybersecurity. She shares for any young person "thinking about maybe starting something in security, this is definitely the time to do so." And, we thank Kyla for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Mar 2024 07:00:00 -0000</pubDate>
      <itunes:title>Kyla Guru: You are a key piece to our national security. [Education] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>34</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Founder and CEO of Bits N' Bytes Cybersecurity Education and student at Stanford University Kyla Guru on her journey to cybersecurity thought leader. </itunes:subtitle>
      <itunes:summary>Founder and CEO of nonprofit Bits N' Bytes Cybersecurity Education and undergraduate student at Stanford University, Kyla Guru shares her journey from GenCyber Camp to becoming a cybersecurity thought leader. Seeing the need. for cybersecurity education in her own community spurred Kyla into action engaging our civilian population in understanding their role in the cybersecurity space. Kyla recommends putting yourself out there: taking courses, getting more knowledge, getting internships, meeting people and going to conferences. Kyla thinks her generation has an inquisitive mind and feels that is where advocacy and education come in with cybersecurity. She shares for any young person "thinking about maybe starting something in security, this is definitely the time to do so." And, we thank Kyla for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Founder and CEO of nonprofit Bits N' Bytes Cybersecurity Education and undergraduate student at Stanford University, Kyla Guru shares her journey from GenCyber Camp to becoming a cybersecurity thought leader. Seeing the need. for cybersecurity education in her own community spurred Kyla into action engaging our civilian population in understanding their role in the cybersecurity space. Kyla recommends putting yourself out there: taking courses, getting more knowledge, getting internships, meeting people and going to conferences. Kyla thinks her generation has an inquisitive mind and feels that is where advocacy and education come in with cybersecurity. She shares for any young person "thinking about maybe starting something in security, this is definitely the time to do so." And, we thank Kyla for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>334</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2275db60-dfbb-11ee-9abe-dfc0dfb7eda4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6660439957.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA’s news trifecta. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2021/notes</link>
      <description>A roundup of news out of CISA. California reveals data brokers selling the sensitive information of minors. Permiso Security shares an open-source cloud intrusion detection tool. Darktrace highlights a campaign exploiting DropBox.  EU's Cyber Solidarity Act forges ahead. A White House committee urges new economic incentives for securing OT systems. Paysign investigates claims of a data breach.  Our guest is Alex Cox, Director Threat Intelligence, Mitigation, and Escalation at LastPass, to discuss what to expect after LockBit. And Axios highlights the clowns and fools behind ransomware attacks.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Alex Cox, Director, Threat Intelligence, Mitigation, Escalation (TIME) at LastPass, joins us to discuss what to expect after LockBit.

Selected Reading
Top US cybersecurity agency hacked and forced to take some systems offline (CNN Politics)
CISA’s open source software security initiatives detailed (SC Media)
GAO uncovers mixed feedback on CISA's OT cybersecurity services when it comes to addressing risks (Industrial Cyber)
Dozens of data brokers disclose selling reproductive healthcare info, precise geolocation and data belonging to minors (The Record)
New Open Source Tool Hunts for APT Activity in the Cloud (SecurityWeek)
Dropbox Abused in New Phishing, Malspam Scam to Steal SaaS Logins (HACKREAD)
Everything you need to know about the EU's Cyber Solidarity Act (ITPro)
White House advisory group says market forces ‘insufficient’ to drive cybersecurity in critical infrastructure (CyberScoop)
Paysign investigating reports of consumer information data breach (The Record)
The clowns and fools behind ransomware attacks (Axios) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 11 Mar 2024 20:10:00 -0000</pubDate>
      <itunes:title>CISA’s news trifecta. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2021</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A roundup of news out of CISA. California reveals data brokers selling the sensitive information of minors. Permiso Security shares an open-source cloud intrusion detection tool. Darktrace highlights a campaign exploiting DropBox.  EU's Cyber Solidarity Act forges ahead. A White House committee urges new economic incentives for securing OT systems. Paysign investigates claims of a data breach.  Our guest is Alex Cox, Director Threat Intelligence, Mitigation, and Escalation at LastPass, to discuss what to expect after LockBit. And Axios highlights the clowns and fools behind ransomware attacks.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Alex Cox, Director, Threat Intelligence, Mitigation, Escalation (TIME) at LastPass, joins us to discuss what to expect after LockBit.

Selected Reading
Top US cybersecurity agency hacked and forced to take some systems offline (CNN Politics)
CISA’s open source software security initiatives detailed (SC Media)
GAO uncovers mixed feedback on CISA's OT cybersecurity services when it comes to addressing risks (Industrial Cyber)
Dozens of data brokers disclose selling reproductive healthcare info, precise geolocation and data belonging to minors (The Record)
New Open Source Tool Hunts for APT Activity in the Cloud (SecurityWeek)
Dropbox Abused in New Phishing, Malspam Scam to Steal SaaS Logins (HACKREAD)
Everything you need to know about the EU's Cyber Solidarity Act (ITPro)
White House advisory group says market forces ‘insufficient’ to drive cybersecurity in critical infrastructure (CyberScoop)
Paysign investigating reports of consumer information data breach (The Record)
The clowns and fools behind ransomware attacks (Axios) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A roundup of news out of CISA. California reveals data brokers selling the sensitive information of minors. Permiso Security shares an open-source cloud intrusion detection tool. Darktrace highlights a campaign exploiting DropBox.  EU's Cyber Solidarity Act forges ahead. A White House committee urges new economic incentives for securing OT systems. Paysign investigates claims of a data breach.  Our guest is Alex Cox, Director Threat Intelligence, Mitigation, and Escalation at LastPass, to discuss what to expect after LockBit. And Axios highlights the clowns and fools behind ransomware attacks.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/alexjcox/">Alex Cox</a>, Director, Threat Intelligence, Mitigation, Escalation (TIME) at <a href="https://www.lastpass.com/">LastPass</a>, joins us to discuss what to expect after LockBit.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.cnn.com/2024/03/08/politics/top-us-cybersecurity-agency-cisa-hacked/index.html">Top US cybersecurity agency hacked and forced to take some systems offline</a> (CNN Politics)</p><p><a href="https://www.scmagazine.com/brief/cisas-open-source-software-security-initiatives-detailed">CISA’s open source software security initiatives detailed</a> (SC Media)</p><p><a href="https://industrialcyber.co/reports/gao-uncovers-mixed-feedback-on-cisas-ot-cybersecurity-services-when-it-comes-to-addressing-risks/">GAO uncovers mixed feedback on CISA's OT cybersecurity services when it comes to addressing risks</a> (Industrial Cyber)</p><p><a href="https://therecord.media/dozens-of-data-brokers-disclose-selling-info-on-kids-geolocation-data-reproductive-health">Dozens of data brokers disclose selling reproductive healthcare info, precise geolocation and data belonging to minors</a> (The Record)</p><p><a href="https://www.securityweek.com/new-open-source-tool-hunts-for-apt-activity-in-the-cloud/">New Open Source Tool Hunts for APT Activity in the Cloud</a> (SecurityWeek)</p><p><a href="https://www.hackread.com/dropbox-phishing-malspam-scam-saas-logins/">Dropbox Abused in New Phishing, Malspam Scam to Steal SaaS Logins</a> (HACKREAD)</p><p><a href="https://www.itpro.com/security/everything-you-need-to-know-about-the-eus-cyber-solidarity-act">Everything you need to know about the EU's Cyber Solidarity Act</a> (ITPro)</p><p><a href="https://cyberscoop.com/nstac-white-house-advisory-group-critical-infrastructure/">White House advisory group says market forces ‘insufficient’ to drive cybersecurity in critical infrastructure</a> (CyberScoop)</p><p><a href="https://therecord.media/paysign-investigating-reports-of-data-breach">Paysign investigating reports of consumer information data breach</a> (The Record)</p><p><a href="https://www.axios.com/2024/03/08/ransomware-hack-scams-chaos">The clowns and fools behind ransomware attacks</a> (Axios) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1779</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ef0d0f9c-b95d-11ee-adc6-77af74a5ab49]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1515080109.mp3?updated=1710185477" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Swati Shekhar: Challenges increase your risk appetite. [Engineering] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/75/notes</link>
      <description>Ground Labs' Head of Engineering, Swati Shekhar, shares her circuitous route from and back to engineering. Always being interested in leveraging the tools available to solve problems, Swati talks about how she found her place in engineering. She mentions how she had her first real experience with a computer when she was 17 in her first year at college. Aside from being one of 30 young women in a sea of 500 young men there, Swati described it as a "good culture shock because anything that takes you out of your comfort zone actually makes you learn and grow." She notes that challenges experienced in life increase your risk appetite so significantly. Swati advises those looking to make a job change to be certain of what is attracting them and to be yourself. We thank Swati for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 10 Mar 2024 07:00:00 -0000</pubDate>
      <itunes:title>Encore: Swati Shekhar: Challenges increase your risk appetite. [Engineering] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>75</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ground Labs' Head of Engineering, Swati Shekhar, shares her circuitous route from and back to engineering. Always being interested in leveraging the tools available to solve problems, Swati talks about how she found her place in engineering. She mentions how she had her first real experience with a computer when she was 17 in her first year at college. Aside from being one of 30 young women in a sea of 500 young men there, Swati described it as a "good culture shock because anything that takes you out of your comfort zone actually makes you learn and grow." She notes that challenges experienced in life increase your risk appetite so significantly. Swati advises those looking to make a job change to be certain of what is attracting them and to be yourself. We thank Swati for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ground Labs' Head of Engineering, Swati Shekhar, shares her circuitous route from and back to engineering. Always being interested in leveraging the tools available to solve problems, Swati talks about how she found her place in engineering. She mentions how she had her first real experience with a computer when she was 17 in her first year at college. Aside from being one of 30 young women in a sea of 500 young men there, Swati described it as a "good culture shock because anything that takes you out of your comfort zone actually makes you learn and grow." She notes that challenges experienced in life increase your risk appetite so significantly. Swati advises those looking to make a job change to be certain of what is attracting them and to be yourself. We thank Swati for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>664</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2af98b24-dd81-11ee-8227-f798cae9db0d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5140686033.mp3?updated=1709925987" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Setting better cyber job expectations to attract and retain talent. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/58/notes</link>
      <description>In honor of Women's History Month, please enjoy this encore of Dr. Sasha Vanterpool's webinar. 
In this webinar, N2K Networks Cyber Workforce Consultant Dr. Sasha Vanterpool shares how to update job descriptions to better reflect cyber role expectations to improve hiring, training, and retention.
To view the original webinar on demand, visit here.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 10 Mar 2024 06:00:00 -0000</pubDate>
      <itunes:title>Setting better cyber job expectations to attract and retain talent. [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>9</itunes:season>
      <itunes:episode>58</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In honor of Women's History Month, please enjoy this encore of Dr. Sasha Vanterpool's webinar. 
In this webinar, N2K Networks Cyber Workforce Consultant Dr. Sasha Vanterpool shares how to update job descriptions to better reflect cyber role expectations to improve hiring, training, and retention.
To view the original webinar on demand, visit here.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<h3><strong><em>In honor of Women's History Month, please enjoy this encore of Dr. Sasha Vanterpool's webinar. </em></strong></h3><p>In this webinar, N2K Networks Cyber Workforce Consultant Dr. Sasha Vanterpool shares how to update job descriptions to better reflect cyber role expectations to improve hiring, training, and retention.</p><p>To view the original webinar on demand, visit <a href="https://www.brighttalk.com/webcast/18820/592220?utm_source=brighttalk-portal&amp;utm_medium=web&amp;utm_campaign=channel-page&amp;utm_content=recorded">here</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1082</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[24a5e796-dd8a-11ee-b6e6-13206a4c4773]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4988878393.mp3?updated=1709848002" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Understanding the multi-tiered impact of ransomware. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/320/notes</link>
      <description>This week we are joined by Jamie MacColl and Dr. Pia Hüsch from RUSI discussing their work on "Ransomware: Victim Insights on Harms to Individuals, Organisations and Society." The research reveals some of the harms caused by ransomware, including physical, financial, reputational, psychological and social harms.
Researchers state "Based on interviews with victims and incident responders, this paper outlines the harm ransomware causes to organisations, individuals, the UK economy, national security and wider society."
The research can be found here:
Ransomware: Victim Insights on Harms to Individuals, Organisations and Society

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Mar 2024 08:00:00 -0000</pubDate>
      <itunes:title>Understanding the multi-tiered impact of ransomware. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>320</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week we are joined by Jamie MacColl and Dr. Pia Hüsch from RUSI discussing their work on "Ransomware: Victim Insights on Harms to Individuals, Organisations and Society." The research reveals some of the harms caused by ransomware, including physical, financial, reputational, psychological and social harms.
Researchers state "Based on interviews with victims and incident responders, this paper outlines the harm ransomware causes to organisations, individuals, the UK economy, national security and wider society."
The research can be found here:
Ransomware: Victim Insights on Harms to Individuals, Organisations and Society

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by Jamie MacColl and Dr. Pia Hüsch from RUSI discussing their work on "Ransomware: Victim Insights on Harms to Individuals, Organisations and Society." The research reveals some of the harms caused by ransomware, including physical, financial, reputational, psychological and social harms.</p><p>Researchers state "Based on interviews with victims and incident responders, this paper outlines the harm ransomware causes to organisations, individuals, the UK economy, national security and wider society."</p><p>The research can be found here:</p><ul><li><a href="https://www.rusi.org/explore-our-research/publications/occasional-papers/ransomware-victim-insights-harms-individuals-organisations-and-society">Ransomware: Victim Insights on Harms to Individuals, Organisations and Society</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1135</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f13e5498-dd6f-11ee-aa3d-73bf30224f84]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8057464228.mp3?updated=1710172669" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From breach to battle: The escalating threat of Midnight Blizzard. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2020/notes</link>
      <description>Russian hackers persist against Microsoft’s internal systems. Change Healthcare systems are slowly coming back online. Russian propaganda sites masquerade as local news. Swiss government info is leaked on the darknet.  Krebs on Security turns the tables on the Radaris online data broker. The NSA highlights the fundamentals of Zero Trust. The British Library publishes lessons learned from their ransomware attack. Researchers run a global prompt hacking competition. CheckPoint looks at Magnet Goblin. Experts highlight the need for psychological safety in cyber security. Our guest is Dinah Davis, Founder and Editor-In-Chief of Code Like A Girl, sharing the work they do to inspire young women to consider a career in technology. And the I-Soon leak reveals the seedy underbelly of Chinese cyber operations.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest is Dinah Davis, Founder and Editor-In-Chief of Code Like A Girl, sharing the work they do to inspire young women to consider a career in technology.

Selected Reading
Microsoft says Russian-state sponsored hackers have been able to access internal systems  (Reuters) 
Change Healthcare brings some systems back online after cyberattack (The Record)
Spate of Mock News Sites With Russian Ties Pop Up in U.S  (The New York Times)
Play ransomware attack on Xplain exposed 65,000 files containing data relevant to the Swiss Federal Administration (Security Affairs)
A Close Up Look at the Consumer Data Broker Radaris (krebsonsecurity)
NSA Details Seven Pillars Of Zero Trust (GB Hackers)
LEARNING LESSONS FROM THE CYBER-ATTACK British Library cyber incident review (British Library)
A Taxonomy of Prompt Injection Attacks  (Schneier on Security)
https://arxiv.org/pdf/2311.16119.pdf (Research)
Magnet Goblin Targets Publicly Facing Servers Using 1-Day Vulnerabilities  (Check Point Research)
Why 'psychological safety' is so important for building a robust security culture (ITPro)
Inside Chinese hacking company’s culture of influence, alcohol and sex (C4isernet)
International Women's Day (International Women’s Day) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 08 Mar 2024 21:10:00 -0000</pubDate>
      <itunes:title>From breach to battle: The escalating threat of Midnight Blizzard. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2020</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Russian hackers persist against Microsoft’s internal systems. Change Healthcare systems are slowly coming back online. Russian propaganda sites masquerade as local news. Swiss government info is leaked on the darknet.  Krebs on Security turns the tables on the Radaris online data broker. The NSA highlights the fundamentals of Zero Trust. The British Library publishes lessons learned from their ransomware attack. Researchers run a global prompt hacking competition. CheckPoint looks at Magnet Goblin. Experts highlight the need for psychological safety in cyber security. Our guest is Dinah Davis, Founder and Editor-In-Chief of Code Like A Girl, sharing the work they do to inspire young women to consider a career in technology. And the I-Soon leak reveals the seedy underbelly of Chinese cyber operations.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest is Dinah Davis, Founder and Editor-In-Chief of Code Like A Girl, sharing the work they do to inspire young women to consider a career in technology.

Selected Reading
Microsoft says Russian-state sponsored hackers have been able to access internal systems  (Reuters) 
Change Healthcare brings some systems back online after cyberattack (The Record)
Spate of Mock News Sites With Russian Ties Pop Up in U.S  (The New York Times)
Play ransomware attack on Xplain exposed 65,000 files containing data relevant to the Swiss Federal Administration (Security Affairs)
A Close Up Look at the Consumer Data Broker Radaris (krebsonsecurity)
NSA Details Seven Pillars Of Zero Trust (GB Hackers)
LEARNING LESSONS FROM THE CYBER-ATTACK British Library cyber incident review (British Library)
A Taxonomy of Prompt Injection Attacks  (Schneier on Security)
https://arxiv.org/pdf/2311.16119.pdf (Research)
Magnet Goblin Targets Publicly Facing Servers Using 1-Day Vulnerabilities  (Check Point Research)
Why 'psychological safety' is so important for building a robust security culture (ITPro)
Inside Chinese hacking company’s culture of influence, alcohol and sex (C4isernet)
International Women's Day (International Women’s Day) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russian hackers persist against Microsoft’s internal systems. Change Healthcare systems are slowly coming back online. Russian propaganda sites masquerade as local news. Swiss government info is leaked on the darknet.  Krebs on Security turns the tables on the Radaris online data broker. The NSA highlights the fundamentals of Zero Trust. The British Library publishes lessons learned from their ransomware attack. Researchers run a global prompt hacking competition. CheckPoint looks at Magnet Goblin. Experts highlight the need for psychological safety in cyber security. Our guest is Dinah Davis, Founder and Editor-In-Chief of Code Like A Girl, sharing the work they do to inspire young women to consider a career in technology. And the I-Soon leak reveals the seedy underbelly of Chinese cyber operations.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest is <a href="https://www.linkedin.com/in/dinahdavis/">Dinah Davis</a>, Founder and Editor-In-Chief of <a href="https://code.likeagirl.io/">Code Like A Girl</a>, sharing the work they do to inspire young women to consider a career in technology.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.reuters.com/technology/cybersecurity/microsoft-says-cyber-threat-actor-has-been-able-access-internal-systems-2024-03-08/">Microsoft says Russian-state sponsored hackers have been able to access internal systems </a><a href="https://www.reuters.com/technology/cybersecurity/microsoft-says-cyber-threat-actor-has-been-able-access-internal-systems-2024-03-08/"> (Reuters</a>) </p><p><a href="https://therecord.media/change-healthcare-brings-some-systems-online">Change Healthcare brings some systems back online after cyberattack</a> (The Record)</p><p><a href="https://www.nytimes.com/2024/03/07/business/media/russia-us-news-sites.html">Spate of Mock News Sites With Russian Ties Pop Up in U.S  </a><a href="https://www.nytimes.com/2024/03/07/business/media/russia-us-news-sites.html">(The New York Times</a>)</p><p><a href="https://securityaffairs.com/160174/data-breach/xplain-data-breach-report.html">Play ransomware attack on Xplain exposed 65,000 files containing data relevant to the Swiss Federal Administration</a> (Security Affairs)</p><p><a href="https://krebsonsecurity.com/2024/03/a-close-up-look-at-the-consumer-data-broker-radaris/">A Close Up Look at the Consumer Data Broker Radaris</a> (krebsonsecurity)</p><p><a href="https://gbhackers.com/nsa-seven-pillars-zero-trust/">NSA Details Seven Pillars Of Zero Trust</a> (GB Hackers)</p><p><a href="https://www.bl.uk/home/british-library-cyber-incident-review-8-march-2024.pdf">LEARNING LESSONS FROM THE CYBER-ATTACK British Library cyber incident review</a> (British Library)</p><p><a href="https://www.schneier.com/blog/archives/2024/03/a-taxonomy-of-prompt-injection-attacks.html">A Taxonomy of Prompt Injection Attacks </a> (Schneier on Security)</p><p><a href="https://arxiv.org/pdf/2311.16119.pdf">https://arxiv.org/pdf/2311.16119.pdf</a> (Research)</p><p><a href="https://research.checkpoint.com/2024/magnet-goblin-targets-publicly-facing-servers-using-1-day-vulnerabilities/">Magnet Goblin Targets Publicly Facing Servers Using 1-Day Vulnerabilities </a><a href="https://research.checkpoint.com/2024/magnet-goblin-targets-publicly-facing-servers-using-1-day-vulnerabilities/"> (Check Point Research</a>)</p><p><a href="https://www.itpro.com/security/why-psychological-safety-is-so-important-for-building-a-robust-security-culture">Why 'psychological safety' is so important for building a robust security culture</a><a href="https://www.itpro.com/security/why-psychological-safety-is-so-important-for-building-a-robust-security-culture"> (ITPro</a>)</p><p><a href="https://www.c4isrnet.com/cyber/2024/03/08/inside-chinese-hacking-companys-culture-of-influence-alcohol-and-sex/">Inside Chinese hacking company’s culture of influence, alcohol and sex</a> (C4isernet)</p><p><a href="https://www.internationalwomensday.com/">International Women's Day</a> (International Women’s Day) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1920</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eed53da6-b95d-11ee-adc6-df4ce346f118]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2046133366.mp3?updated=1709930734" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Breaking Through: Securing the advancement of women in cybersecurity. {Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/56/notes</link>
      <description>In honor of International Women's Day, please enjoy this encore of our 2023 Women in Cyber panel. 
In the dynamic field of cybersecurity, it’s well established that creating more opportunities for diversity and inclusion is essential for developing a highly skilled workforce. As an industry, we are starting to see the fruits of that labor, but there is a growing need for diverse leadership to nurture continuous innovation and resilience in cybersecurity.
As part of N2K’s 2023 Women in Cyber content series, we’re excited to host an engaging virtual panel discussion moderated by N2K's President Simone Petrella featuring insights, experiences, and strategies for advancing more women into leadership roles within the field.
This virtual discussion explores different areas including:

Navigating the Cybersecurity Landscape: Gain insights into our guests' career journeys, including mentors, challenges, and success, and how the evolving landscape may present different challenges and opportunities for women.

Building a Supportive Ecosystem: Explore the importance of mentorship, allyship, and a strong network in propelling women into leadership, and how to create an environment where everyone can thrive.

Closing the Gender Gap: Delve into actionable strategies and best practices for organizations to promote gender diversity in their cybersecurity leadership teams.

The Future of Cybersecurity Leadership: Gain a forward-looking perspective on the evolving role of women in shaping the future of cybersecurity.

This panel discussion is a must-listen event for professionals, leaders, and aspiring cybersecurity experts who are committed to promoting diversity and empowering women to excel in cybersecurity leadership. Don't miss the opportunity to be part of this inspiring conversation and drive positive change in the industry.
Panelists:


Abisoye Ajayi, Cyber &amp; Analytics Manager at Tulsa Innovation Labs


Koma Gandy, VP, Leadership &amp; Business at Skillsoft


Lauren Zabierek, Sr. Advisor at CISA


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 08 Mar 2024 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Breaking Through: Securing the advancement of women in cybersecurity. {Special Editions]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>56</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In honor of International Women's Day, please enjoy this encore of our 2023 Women in Cyber panel. 
In the dynamic field of cybersecurity, it’s well established that creating more opportunities for diversity and inclusion is essential for developing a highly skilled workforce. As an industry, we are starting to see the fruits of that labor, but there is a growing need for diverse leadership to nurture continuous innovation and resilience in cybersecurity.
As part of N2K’s 2023 Women in Cyber content series, we’re excited to host an engaging virtual panel discussion moderated by N2K's President Simone Petrella featuring insights, experiences, and strategies for advancing more women into leadership roles within the field.
This virtual discussion explores different areas including:

Navigating the Cybersecurity Landscape: Gain insights into our guests' career journeys, including mentors, challenges, and success, and how the evolving landscape may present different challenges and opportunities for women.

Building a Supportive Ecosystem: Explore the importance of mentorship, allyship, and a strong network in propelling women into leadership, and how to create an environment where everyone can thrive.

Closing the Gender Gap: Delve into actionable strategies and best practices for organizations to promote gender diversity in their cybersecurity leadership teams.

The Future of Cybersecurity Leadership: Gain a forward-looking perspective on the evolving role of women in shaping the future of cybersecurity.

This panel discussion is a must-listen event for professionals, leaders, and aspiring cybersecurity experts who are committed to promoting diversity and empowering women to excel in cybersecurity leadership. Don't miss the opportunity to be part of this inspiring conversation and drive positive change in the industry.
Panelists:


Abisoye Ajayi, Cyber &amp; Analytics Manager at Tulsa Innovation Labs


Koma Gandy, VP, Leadership &amp; Business at Skillsoft


Lauren Zabierek, Sr. Advisor at CISA


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<h3><strong><em>In honor of International Women's Day, please enjoy this encore of our 2023 Women in Cyber panel. </em></strong></h3><p>In the dynamic field of cybersecurity, it’s well established that creating more opportunities for diversity and inclusion is essential for developing a highly skilled workforce. As an industry, we are starting to see the fruits of that labor, but there is a growing need for diverse leadership to nurture continuous innovation and resilience in cybersecurity.</p><p>As part of N2K’s 2023 Women in Cyber content series, we’re excited to host an engaging virtual panel discussion moderated by N2K's President <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a> featuring insights, experiences, and strategies for advancing more women into leadership roles within the field.</p><p>This virtual discussion explores different areas including:</p><ul>
<li>Navigating the Cybersecurity Landscape: Gain insights into our guests' career journeys, including mentors, challenges, and success, and how the evolving landscape may present different challenges and opportunities for women.</li>
<li>Building a Supportive Ecosystem: Explore the importance of mentorship, allyship, and a strong network in propelling women into leadership, and how to create an environment where everyone can thrive.</li>
<li>Closing the Gender Gap: Delve into actionable strategies and best practices for organizations to promote gender diversity in their cybersecurity leadership teams.</li>
<li>The Future of Cybersecurity Leadership: Gain a forward-looking perspective on the evolving role of women in shaping the future of cybersecurity.</li>
</ul><p>This panel discussion is a must-listen event for professionals, leaders, and aspiring cybersecurity experts who are committed to promoting diversity and empowering women to excel in cybersecurity leadership. Don't miss the opportunity to be part of this inspiring conversation and drive positive change in the industry.</p><h3>Panelists:</h3><ul>
<li>
<a href="https://www.linkedin.com/in/abisoyeajayiakinfolarin/">Abisoye Ajayi</a>, Cyber &amp; Analytics Manager at Tulsa Innovation Labs</li>
<li>
<a href="https://www.linkedin.com/in/koma-gandy/">Koma Gandy</a>, VP, Leadership &amp; Business at Skillsoft</li>
<li>
<a href="https://www.linkedin.com/in/laurenz1010/">Lauren Zabierek</a>, Sr. Advisor at CISA</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3046</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e8c3680a-db2e-11ee-a798-730b18d7a337]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8911064831.mp3?updated=1700077246" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A secret scheme resulting in stolen secrets.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2019/notes</link>
      <description>A former Google software engineer is charged with stealing AI tech for China. State attorneys general from forty-one states call out Meta over account takeover issues. Researchers demonstrate a Stuxnet-like attack using PLCs. Buyer beware - A miniPC comes equipped with pre installed malware. A Microsoft engineer wants the FTC to take a closer look at Copilot Designer. There’s a snake in Facebook’s walled garden. Bruce Schneier wonders if AI can strengthen democracy. On our Industry Voices segment, guest Jason Lamar, Senior Vice President of Product at Cobalt, joins us to discuss offensive security strategy. And NIST works hard to keep their innovations above water.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, guest Jason Lamar, Senior Vice President of Product at Cobalt, joins us to discuss offensive security strategy. You can find out more from Cobalt’s OffSec Shift report here. 

Selected Reading
Former Google Engineer Charged With Stealing AI Secrets (Infosecurity Magazine)
Several States Attorneys General have written to Meta demanding better account recovery (NY gov)
Remote Stuxnet-Style Attack Possible With Web-Based PLC Malware: Researchers  (SecurityWeek)
Whoops! ACEMAGIC ships mini PCs with free bonus pre-installed malware  (Graham Cluley)
Microsoft AI engineer warns FTC about Copilot Designer safety concerns  (The Verge)
Snake, a new Info Stealer spreads through Facebook messages (Security Affairs)
NSA Details Seven Pillars Of Zero Trust (gbhackers)
How Public AI Can Strengthen Democracy  (Schneier on Security)
This agency is tasked with keeping AI safe. Its offices are crumbling. (WashingtonPost)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 07 Mar 2024 21:10:00 -0000</pubDate>
      <itunes:title>A secret scheme resulting in stolen secrets.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2019</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A former Google software engineer is charged with stealing AI tech for China. State attorneys general from forty-one states call out Meta over account takeover issues. Researchers demonstrate a Stuxnet-like attack using PLCs. Buyer beware - A miniPC comes equipped with pre installed malware. A Microsoft engineer wants the FTC to take a closer look at Copilot Designer. There’s a snake in Facebook’s walled garden. Bruce Schneier wonders if AI can strengthen democracy. On our Industry Voices segment, guest Jason Lamar, Senior Vice President of Product at Cobalt, joins us to discuss offensive security strategy. And NIST works hard to keep their innovations above water.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, guest Jason Lamar, Senior Vice President of Product at Cobalt, joins us to discuss offensive security strategy. You can find out more from Cobalt’s OffSec Shift report here. 

Selected Reading
Former Google Engineer Charged With Stealing AI Secrets (Infosecurity Magazine)
Several States Attorneys General have written to Meta demanding better account recovery (NY gov)
Remote Stuxnet-Style Attack Possible With Web-Based PLC Malware: Researchers  (SecurityWeek)
Whoops! ACEMAGIC ships mini PCs with free bonus pre-installed malware  (Graham Cluley)
Microsoft AI engineer warns FTC about Copilot Designer safety concerns  (The Verge)
Snake, a new Info Stealer spreads through Facebook messages (Security Affairs)
NSA Details Seven Pillars Of Zero Trust (gbhackers)
How Public AI Can Strengthen Democracy  (Schneier on Security)
This agency is tasked with keeping AI safe. Its offices are crumbling. (WashingtonPost)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A former Google software engineer is charged with stealing AI tech for China. State attorneys general from forty-one states call out Meta over account takeover issues. Researchers demonstrate a Stuxnet-like attack using PLCs. Buyer beware - A miniPC comes equipped with pre installed malware. A Microsoft engineer wants the FTC to take a closer look at Copilot Designer. There’s a snake in Facebook’s walled garden. Bruce Schneier wonders if AI can strengthen democracy. On our Industry Voices segment, guest Jason Lamar, Senior Vice President of Product at Cobalt, joins us to discuss offensive security strategy. And NIST works hard to keep their innovations above water.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Voices segment, guest <a href="https://www.linkedin.com/in/jasonlamar/">Jason Lamar</a>, Senior Vice President of Product at <a href="https://www.cobalt.io/">Cobalt</a>, joins us to discuss offensive security strategy. You can find out more from Cobalt’s OffSec Shift report <a href="https://resource.cobalt.io/offsec-shift?utm_campaign=OffSec%20Shift%20Report&amp;utm_source=cyberwire&amp;utm_medium=industry%20voices&amp;utm_content=offsec%20shift%20report">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.infosecurity-magazine.com/news/google-staffer-charged-stealing/">Former Google Engineer Charged With Stealing AI Secrets (Infosecurity Magazine</a>)</p><p><a href="https://ag.ny.gov/sites/default/files/letters/multistate-letter-on-account-takovers_ltrhd_1.pdf">Several States Attorneys General have written to Meta demanding better account recovery</a> (NY gov)</p><p><a href="https://www.securityweek.com/remote-stuxnet-style-attack-possible-with-web-based-plc-malware-researchers/">Remote Stuxnet-Style Attack Possible With Web-Based PLC Malware: Researchers  (SecurityWeek</a>)</p><p><a href="https://grahamcluley.com/whoops-acemagic-ships-mini-pcs-with-free-bonus-pre-installed-malware/">Whoops! ACEMAGIC ships mini PCs with free bonus pre-installed malware  (Graham Cluley</a>)</p><p><a href="https://www.theverge.com/2024/3/6/24092191/microsoft-ai-engineer-copilot-designer-ftc-safety-concerns">Microsoft AI engineer warns FTC about Copilot Designer safety concerns  (The Verge</a>)</p><p><a href="https://securityaffairs.com/160131/malware/snake-info-stealer.html">Snake, a new Info Stealer spreads through Facebook messages</a> (Security Affairs)</p><p><a href="https://gbhackers.com/nsa-seven-pillars-zero-trust/">NSA Details Seven Pillars Of Zero Trust</a> (gbhackers)</p><p><a href="https://www.schneier.com/blog/archives/2024/03/how-public-ai-can-strengthen-democracy.html">How Public AI Can Strengthen Democracy  (Schneier on Security</a>)</p><p><a href="https://www.washingtonpost.com/technology/2024/03/06/nist-ai-safety-lab-decaying/">This agency is tasked with keeping AI safe. Its offices are crumbling.</a> (WashingtonPost)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1618</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ee9c55cc-b95d-11ee-adc6-e3df694b0dca]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7894330620.mp3?updated=1709913169" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Dinah Davis: Building your network. [R&amp;D] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/40/notes</link>
      <description>In honor of International Women's Day, please enjoy this encore of Dinah Davis sharing her story.
Coming from her love of math, VP of R&amp;D at Arctic Wolf Networks Dinah Davis shares how she arrived in the cybersecurity industry after finding her niche. Dinah recalls how at a time of indecision, a computer course at university and a job with the Canadian government helped to solidify her career direction. Dinah mentions how "security and cryptography specifically was this perfect mix of real world problem solving and mathematics and computer science all combined into one ball of happiness." Networking played a key role in Dinah's journey. She recommends that those interested in joining the field to go for what they believe in. And, we thank Dinah for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 07 Mar 2024 08:00:00 -0000</pubDate>
      <itunes:title>Encore: Dinah Davis: Building your network. [R&amp;D] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>40</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In honor of International Women's Day, please enjoy this encore of Dinah Davis sharing her story.
Coming from her love of math, VP of R&amp;D at Arctic Wolf Networks Dinah Davis shares how she arrived in the cybersecurity industry after finding her niche. Dinah recalls how at a time of indecision, a computer course at university and a job with the Canadian government helped to solidify her career direction. Dinah mentions how "security and cryptography specifically was this perfect mix of real world problem solving and mathematics and computer science all combined into one ball of happiness." Networking played a key role in Dinah's journey. She recommends that those interested in joining the field to go for what they believe in. And, we thank Dinah for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In honor of International Women's Day, please enjoy this encore of Dinah Davis sharing her story.</p><p>Coming from her love of math, VP of R&amp;D at Arctic Wolf Networks Dinah Davis shares how she arrived in the cybersecurity industry after finding her niche. Dinah recalls how at a time of indecision, a computer course at university and a job with the Canadian government helped to solidify her career direction. Dinah mentions how "security and cryptography specifically was this perfect mix of real world problem solving and mathematics and computer science all combined into one ball of happiness." Networking played a key role in Dinah's journey. She recommends that those interested in joining the field to go for what they believe in. And, we thank Dinah for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>490</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[71e705e4-da6f-11ee-838e-6fde56effc98]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3846982843.mp3?updated=1709842411" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No cyber blues on Super Tuesday.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2018/notes</link>
      <description>CISA says Super Tuesday ran smoothly. The White House sanctions spyware vendors. The DoD launches its Cyber Operational Readiness Assessment program. NIST unveils an updated NICE Framework. Apple patches a pair of zero-days. The GhostSec and Stormous ransomware gangs join forces. Cado Security tracks a new Golang-based malware campaign. Google updates its search algorithms to fight spammy content. Canada's financial intelligence agency suffers a cyber incident. On our Industry Voices segment, our guest Amitai Cohen, Attack Vector Intel Lead at Wiz joins us to discuss cloud threats. Moonlighting on the dark side. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, our guest Amitai Cohen, Attack Vector Intel Lead at Wiz and host of their Crying Out Cloud podcast, joins us to discuss cloud threats. Learn more in Wiz's State of the AI Cloud report. 

Selected Reading
No security issues as Super Tuesday draws to a close, CISA official says (The Record)
Biden administration sanctions makers of commercial spyware used to surveil US (CNN Business)
US DoD launches CORA program to revolutionize cybersecurity strategy (Industrial Cyber)
Unveiling NICE Framework Components v1.0.0: Explore the Latest Updates Today! (NIST)
Update your iPhones and iPads now: Apple patches security vulnerabilities in iOS and iPadOS (Malwarebytes)
Watch out, GhostSec and Stourmous groups jointly conducting ransomware attacks (Security Affairs)
Hackers target Docker, Hadoop, Redis, Confluence with new Golang malware (Bleeping Computer)
Google is starting to squash more spam and AI in search results (The Verge)
Cyberattack forces Canada’s financial intelligence agency to take systems offline (The Record)
Cyber Pros Turn to Cybercrime as Salaries Stagnate (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 06 Mar 2024 21:10:00 -0000</pubDate>
      <itunes:title>No cyber blues on Super Tuesday.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2018</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA says Super Tuesday ran smoothly. The White House sanctions spyware vendors. The DoD launches its Cyber Operational Readiness Assessment program. NIST unveils an updated NICE Framework. Apple patches a pair of zero-days. The GhostSec and Stormous ransomware gangs join forces. Cado Security tracks a new Golang-based malware campaign. Google updates its search algorithms to fight spammy content. Canada's financial intelligence agency suffers a cyber incident. On our Industry Voices segment, our guest Amitai Cohen, Attack Vector Intel Lead at Wiz joins us to discuss cloud threats. Moonlighting on the dark side. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, our guest Amitai Cohen, Attack Vector Intel Lead at Wiz and host of their Crying Out Cloud podcast, joins us to discuss cloud threats. Learn more in Wiz's State of the AI Cloud report. 

Selected Reading
No security issues as Super Tuesday draws to a close, CISA official says (The Record)
Biden administration sanctions makers of commercial spyware used to surveil US (CNN Business)
US DoD launches CORA program to revolutionize cybersecurity strategy (Industrial Cyber)
Unveiling NICE Framework Components v1.0.0: Explore the Latest Updates Today! (NIST)
Update your iPhones and iPads now: Apple patches security vulnerabilities in iOS and iPadOS (Malwarebytes)
Watch out, GhostSec and Stourmous groups jointly conducting ransomware attacks (Security Affairs)
Hackers target Docker, Hadoop, Redis, Confluence with new Golang malware (Bleeping Computer)
Google is starting to squash more spam and AI in search results (The Verge)
Cyberattack forces Canada’s financial intelligence agency to take systems offline (The Record)
Cyber Pros Turn to Cybercrime as Salaries Stagnate (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA says Super Tuesday ran smoothly. The White House sanctions spyware vendors. The DoD launches its Cyber Operational Readiness Assessment program. NIST unveils an updated NICE Framework. Apple patches a pair of zero-days. The GhostSec and Stormous ransomware gangs join forces. Cado Security tracks a new Golang-based malware campaign. Google updates its search algorithms to fight spammy content. Canada's financial intelligence agency suffers a cyber incident. On our Industry Voices segment, our guest Amitai Cohen, Attack Vector Intel Lead at Wiz joins us to discuss cloud threats. Moonlighting on the dark side. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Voices segment, our guest <a href="https://www.linkedin.com/in/amitaico/?originalSubdomain=il">Amitai Cohen</a>, Attack Vector Intel Lead at <a href="https://www.wiz.io/">Wiz</a> and host of their <a href="https://www.wiz.io/crying-out-cloud">Crying Out Cloud</a> podcast, joins us to discuss cloud threats. Learn more in Wiz's <a href="https://www.wiz.io/blog/key-findings-from-the-state-of-ai-in-the-cloud-report-2024">State of the AI Cloud report</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/no-security-threats-to-primaries-cisa-says">No security issues as Super Tuesday draws to a close, CISA official says</a> (The Record)</p><p><a href="https://www.cnn.com/2024/03/05/business/biden-administration-sanction-commercial-spyware/index.html">Biden administration sanctions makers of commercial spyware used to surveil US</a> (CNN Business)</p><p><a href="https://industrialcyber.co/critical-infrastructure/us-dod-launches-cora-program-to-revolutionize-cybersecurity-strategy/">US DoD launches CORA program to revolutionize cybersecurity strategy</a> (Industrial Cyber)</p><p><a href="https://www.nist.gov/news-events/news/2024/03/unveiling-nice-framework-components-v100-explore-latest-updates-today">Unveiling NICE Framework Components v1.0.0: Explore the Latest Updates Today!</a> (NIST)</p><p><a href="https://www.malwarebytes.com/blog/news/2024/03/update-your-iphones-and-ipads-now-apple-patches-security-vulnerabilities-in-ios-and-ipados">Update your iPhones and iPads now: Apple patches security vulnerabilities in iOS and iPadOS</a> (Malwarebytes)</p><p><a href="https://securityaffairs.com/160066/cyber-crime/ghostsec-stourmous-ransomware.html">Watch out, GhostSec and Stourmous groups jointly conducting ransomware attacks</a> (Security Affairs)</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-target-docker-hadoop-redis-confluence-with-new-golang-malware/">Hackers target Docker, Hadoop, Redis, Confluence with new Golang malware</a> (Bleeping Computer)</p><p><a href="https://www.theverge.com/2024/3/5/24091099/google-search-high-quality-results-spam-ai-content">Google is starting to squash more spam and AI in search results</a> (The Verge)</p><p><a href="https://therecord.media/canada-fintrac-cyberattack-systems-offline">Cyberattack forces Canada’s financial intelligence agency to take systems offline</a> (The Record)</p><p><a href="https://www.infosecurity-magazine.com/news/cyber-pros-cybercrime-salaries/">Cyber Pros Turn to Cybercrime as Salaries Stagnate </a>(Infosecurity Magazine)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1913</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ee63b1cc-b95d-11ee-adc6-a7748e3103d9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3227053689.mp3?updated=1709754715" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From Nation States to Cybercriminals: AI's Influence on Attacks with Wendi Whitmore [Threat Vector]</title>
      <link>https://thecyberwire.com/podcasts/threat-vector/5/notes</link>
      <description>In honor of  Women's History Month, please enjoy this episode of the Palo Alto Networks' Unit 42 podcast, Threat Vector, featuring David Moulton's discussion with Wendi Whitmore about the evolving threat landscape. 

In this conversation, David Moulton from Unit 42 discusses the evolving threat landscape with Wendi Whitmore, SVP of Unit 42. Wendi highlights the increasing scale, sophistication, and speed of cyberattacks, with examples like the recent Clop ransomware incident, and emphasizes that attackers, including nation-state actors and cybercriminals, are leveraging AI, particularly generative AI, to operate faster and more effectively, especially in social engineering tactics.
To protect against these threats, businesses must focus on speed of response, automated integration of security tools, and operationalized capabilities and processes. The conversation underscores the importance of staying vigilant and leveraging technology to defend against the rapidly changing threat landscape.
Theat Group Assessments https://unit42.paloaltonetworks.com/category/threat-briefs-assessments/

Please share your thoughts with us for future Threat Vector segments by taking our ⁠brief survey⁠.

Join the conversation on our social media channels:
Website: ⁠⁠https://www.paloaltonetworks.com/unit42⁠⁠
Threat Research: ⁠⁠https://unit42.paloaltonetworks.com/⁠⁠
Facebook: ⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠
LinkedIn: ⁠⁠https://www.linkedin.com/company/unit42/⁠⁠
YouTube: ⁠⁠@PaloAltoNetworksUnit42⁠⁠
Twitter: ⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠

About Threat Vector
Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.

PALO ALTO NETWORKS
Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Mar 2024 21:30:00 -0000</pubDate>
      <itunes:title>From Nation States to Cybercriminals: AI's Influence on Attacks with Wendi Whitmore [Threat Vector]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>5</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/847fa6b0-db33-11ee-8607-a31ccc3fb368/image/d5251fa8d553eda3dc86019792e0d060.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In honor of  Women's History Month, please enjoy this episode of the Palo Alto Networks' Unit 42 podcast, Threat Vector, featuring David Moulton's discussion with Wendi Whitmore about the evolving threat landscape. 

In this conversation, David Moulton from Unit 42 discusses the evolving threat landscape with Wendi Whitmore, SVP of Unit 42. Wendi highlights the increasing scale, sophistication, and speed of cyberattacks, with examples like the recent Clop ransomware incident, and emphasizes that attackers, including nation-state actors and cybercriminals, are leveraging AI, particularly generative AI, to operate faster and more effectively, especially in social engineering tactics.
To protect against these threats, businesses must focus on speed of response, automated integration of security tools, and operationalized capabilities and processes. The conversation underscores the importance of staying vigilant and leveraging technology to defend against the rapidly changing threat landscape.
Theat Group Assessments https://unit42.paloaltonetworks.com/category/threat-briefs-assessments/

Please share your thoughts with us for future Threat Vector segments by taking our ⁠brief survey⁠.

Join the conversation on our social media channels:
Website: ⁠⁠https://www.paloaltonetworks.com/unit42⁠⁠
Threat Research: ⁠⁠https://unit42.paloaltonetworks.com/⁠⁠
Facebook: ⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠
LinkedIn: ⁠⁠https://www.linkedin.com/company/unit42/⁠⁠
YouTube: ⁠⁠@PaloAltoNetworksUnit42⁠⁠
Twitter: ⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠

About Threat Vector
Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.

PALO ALTO NETWORKS
Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. ⁠http://paloaltonetworks.com⁠
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<h3><strong><em>In honor of  Women's History Month, please enjoy this episode of the Palo Alto Networks' Unit 42 podcast, Threat Vector, featuring David Moulton's discussion with Wendi Whitmore about the evolving threat landscape. </em></strong></h3><p><br></p><p>In this conversation, David Moulton from Unit 42 discusses the evolving threat landscape with Wendi Whitmore, SVP of Unit 42. Wendi highlights the increasing scale, sophistication, and speed of cyberattacks, with examples like the recent Clop ransomware incident, and emphasizes that attackers, including nation-state actors and cybercriminals, are leveraging AI, particularly generative AI, to operate faster and more effectively, especially in social engineering tactics.</p><p>To protect against these threats, businesses must focus on speed of response, automated integration of security tools, and operationalized capabilities and processes. The conversation underscores the importance of staying vigilant and leveraging technology to defend against the rapidly changing threat landscape.</p><p><strong>Theat Group Assessments </strong>https://unit42.paloaltonetworks.com/category/threat-briefs-assessments/</p><p><br></p><p>Please share your thoughts with us for future Threat Vector segments by taking our <a href="https://www.surveymonkey.com/r/U42_TV_s">⁠brief survey⁠</a>.</p><p><br></p><p><strong>Join the conversation on our social media channels:</strong></p><p>Website: <a href="https://www.paloaltonetworks.com/unit42">⁠⁠https://www.paloaltonetworks.com/unit42⁠⁠</a></p><p>Threat Research: <a href="https://unit42.paloaltonetworks.com/">⁠⁠https://unit42.paloaltonetworks.com/⁠⁠</a></p><p>Facebook: <a href="https://www.facebook.com/LifeatPaloAltoNetworks/">⁠⁠https://www.facebook.com/LifeatPaloAltoNetworks/⁠⁠</a></p><p>LinkedIn: <a href="https://www.linkedin.com/company/unit42/">⁠⁠https://www.linkedin.com/company/unit42/⁠⁠</a></p><p>YouTube: <a href="https://www.youtube.com/channel/UCvJQO11qoCHYwZ4Ah4Jf-Tw">⁠⁠@PaloAltoNetworksUnit42⁠⁠</a></p><p>Twitter: <a href="https://twitter.com/PaloAltoNtwks">⁠⁠https://twitter.com/PaloAltoNtwks⁠⁠</a></p><p><br></p><p><strong>About Threat Vector</strong></p><p>Unit 42 Threat Vector is the compass in the world of cyberthreats. Hear about Unit 42’s unique threat intelligence insights, new threat actor TTPs, real-world case studies, and learn how the team works together to discover these threats. Unit 42 will equip listeners with the knowledge and insight to proactively prepare and stay ahead in the ever-evolving threat landscape.</p><p><br></p><p><strong>PALO ALTO NETWORKS</strong></p><p>Palo Alto Networks enables your team to prevent successful cyberattacks with an automated approach that delivers consistent security across the cloud, network, and mobile. <a href="http://paloaltonetworks.com">⁠http://paloaltonetworks.com⁠</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>450</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1e4a360c-5160-4ef8-8317-e088e9ed6829]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1185808310.mp3?updated=1744827816" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Change Healthcare hackers cash in $22 million ransom.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2017/notes</link>
      <description>Is the ALPHV gang pulling up a twenty two million dollar rug? Meta platforms are experiencing outages.  Ukraine claims a cyberattack on the Russian Ministry of Defense. Malicious phishers hope to hook hashes. TeamCity users are warned of critical vulnerabilities. The Discord leaker pleads guilty. AmEx suffers a third-party data breach. Amazon is flooded with fake copycat publications. Our guest is Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division to discuss Volt Typhoon. And, Dude, she is just not that into you.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division joins us to discuss Volt Typhoon.

Selected Reading
Hackers Behind the Change Healthcare Ransomware Attack Just Received a $22 Million Payment  (WIRED)
Ukraine claims it hacked Russian Ministry of Defense servers (Bleeping Computer)
Hundreds of orgs targeted with emails aimed at stealing NTLM authentication hashes (Help Net Security)
TeamCity Users Urged to Patch Critical Vulnerabilities (Infosecurity Magazine)
Pentagon leak defendant Jack Teixeira pleads guilty, faces years in prison (Reuters)
American Express credit cards exposed in third-party data breach (Bleeping Computer)
Tech writer Kara Swisher has a new book. Enter the AI-generated scams. (Bleeping Computer)
Retired Army officer charged with sharing classified information about Ukraine on foreign dating site (CBS News) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Mar 2024 21:10:00 -0000</pubDate>
      <itunes:title>Change Healthcare hackers cash in $22 million ransom.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2017</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Is the ALPHV gang pulling up a twenty two million dollar rug? Meta platforms are experiencing outages.  Ukraine claims a cyberattack on the Russian Ministry of Defense. Malicious phishers hope to hook hashes. TeamCity users are warned of critical vulnerabilities. The Discord leaker pleads guilty. AmEx suffers a third-party data breach. Amazon is flooded with fake copycat publications. Our guest is Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division to discuss Volt Typhoon. And, Dude, she is just not that into you.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division joins us to discuss Volt Typhoon.

Selected Reading
Hackers Behind the Change Healthcare Ransomware Attack Just Received a $22 Million Payment  (WIRED)
Ukraine claims it hacked Russian Ministry of Defense servers (Bleeping Computer)
Hundreds of orgs targeted with emails aimed at stealing NTLM authentication hashes (Help Net Security)
TeamCity Users Urged to Patch Critical Vulnerabilities (Infosecurity Magazine)
Pentagon leak defendant Jack Teixeira pleads guilty, faces years in prison (Reuters)
American Express credit cards exposed in third-party data breach (Bleeping Computer)
Tech writer Kara Swisher has a new book. Enter the AI-generated scams. (Bleeping Computer)
Retired Army officer charged with sharing classified information about Ukraine on foreign dating site (CBS News) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Is the ALPHV gang pulling up a twenty two million dollar rug? Meta platforms are experiencing outages.  Ukraine claims a cyberattack on the Russian Ministry of Defense. Malicious phishers hope to hook hashes. TeamCity users are warned of critical vulnerabilities. The Discord leaker pleads guilty. AmEx suffers a third-party data breach. Amazon is flooded with fake copycat publications. Our guest is Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division to discuss Volt Typhoon. And, Dude, she is just not that into you.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest Deputy Assistant Director <a href="https://www.linkedin.com/in/cynthia-kaiser-cyber/">Cynthia Kaiser</a> from the <a href="https://www.fbi.gov/investigate/cyber">FBI Cyber Division</a> joins us to discuss Volt Typhoon.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.wired.com/story/alphv-change-healthcare-ransomware-payment/">Hackers Behind the Change Healthcare Ransomware Attack Just Received a $22 Million Payment  </a><a href="https://www.wired.com/story/alphv-change-healthcare-ransomware-payment/">(WIRED</a>)</p><p><a href="https://www.bleepingcomputer.com/news/security/ukraine-claims-it-hacked-russian-ministry-of-defense-servers/#:~:text=As%20a%20result%20of%20the,for%20protecting%20and%20encrypting%20data">Ukraine claims it hacked Russian Ministry of Defense servers</a> (Bleeping Computer)</p><p><a href="https://www.helpnetsecurity.com/2024/03/05/steals-ntlm-hashes-email/">Hundreds of orgs targeted with emails aimed at stealing NTLM authentication hashes</a> (Help Net Security)</p><p><a href="https://www.infosecurity-magazine.com/news/teamcity-urged-patch-critical/">TeamCity Users Urged to Patch Critical Vulnerabilities</a> (Infosecurity Magazine)</p><p><a href="https://www.reuters.com/legal/jack-teixeira-plead-guilty-massive-leak-pentagon-secrets-2024-03-04/">Pentagon leak defendant Jack Teixeira pleads guilty, faces years in prison</a> (Reuters)</p><p><a href="https://www.bleepingcomputer.com/news/security/american-express-credit-cards-exposed-in-third-party-data-breach/">American Express credit cards exposed in third-party data breach</a> (Bleeping Computer)</p><p><a href="https://www.washingtonpost.com/technology/2024/03/01/amazon-ai-fake-books-authors/">Tech writer Kara Swisher has a new book. Enter the AI-generated scams.</a> (Bleeping Computer)</p><p><a href="https://www.cbsnews.com/news/retired-army-officer-david-slater-sharing-ukraine-classified-information-dating-site/">Retired Army officer charged with sharing classified information about Ukraine on foreign dating site</a> (CBS News) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1341</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ee26dbda-b95d-11ee-adc6-b72b3335a35a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4853041112.mp3?updated=1709669110" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Monica Ruiz: Moving ahead when not many look like you. [Policy]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/16/notes</link>
      <description>In honor of International Women's Day, please enjoy this encore of Monica Ruiz sharing her story.
Cyber Initiative and Special Projects Fellow at the Hewlett Foundation Monica Ruiz shares her career development from aspirations of being a weather woman to her current role as a grantmaker and connector in cybersecurity. Monica discusses how her international study experience changed her outlook and brought her to the field of security. She shares the difficulties she faced as a woman of color when when not that many people look like you, and how she used that as her reason to move forward and better the cybersecurity field through her work. Our thanks to Monica for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Mar 2024 08:00:00 -0000</pubDate>
      <itunes:title>Encore: Monica Ruiz: Moving ahead when not many look like you. [Policy]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>16</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In honor of International Women's Day, please enjoy this encore of Monica Ruiz sharing her story.
Cyber Initiative and Special Projects Fellow at the Hewlett Foundation Monica Ruiz shares her career development from aspirations of being a weather woman to her current role as a grantmaker and connector in cybersecurity. Monica discusses how her international study experience changed her outlook and brought her to the field of security. She shares the difficulties she faced as a woman of color when when not that many people look like you, and how she used that as her reason to move forward and better the cybersecurity field through her work. Our thanks to Monica for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In honor of International Women's Day, please enjoy this encore of Monica Ruiz sharing her story.</p><p>Cyber Initiative and Special Projects Fellow at the Hewlett Foundation Monica Ruiz shares her career development from aspirations of being a weather woman to her current role as a grantmaker and connector in cybersecurity. Monica discusses how her international study experience changed her outlook and brought her to the field of security. She shares the difficulties she faced as a woman of color when when not that many people look like you, and how she used that as her reason to move forward and better the cybersecurity field through her work. Our thanks to Monica for sharing her story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>461</itunes:duration>
      <guid isPermaLink="false"><![CDATA[c2a603b0-da68-11ee-84db-f3d20b47d845]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1938705852.mp3?updated=1709842376" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberattack causes a code red on US healthcare.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2016/notes</link>
      <description>The US healthcare sector is struggling to recover from a cyberattack. Russia listens in via Webex. The former head of NCSC calls for a ransomware payment ban. An Indian content farm mimics legitimate online news sites. The FTC reminds landlords that algorithmic price fixing is illegal. FCC employees are targeted by a phishing campaign. Experts weigh in on NIST’s updated cybersecurity framework. Police shut down the largest German-speaking cybercrime market. Guest Mike Hanley, Chief Security Officer and the Senior Vice President of Engineering at GitHub, shares insights with Ann Johnson of Afternoon Cyber Tea. And celebrating the most inspiring women in cyber.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
Guest Mike Hanley, Chief Security Officer and the Senior Vice President of Engineering at GitHub, shares insights with Ann Johnson of Afternoon Cyber Tea. You can hear their full discussion here, and tune in to Microsoft Security’s Afternoon Cyber Tea every other Tuesday on the N2K’s CyberWire Network.  

Selected Reading
Health-care hack spreads pain across hospitals and doctors nationwide (Washington Post)
Russia’s chief propagandist leaks intercepted German military Webex conversation (The Record)
Cyber ransoms are too profitable. Let’s make paying illegal (The Times UK)
News farm impersonates 60+ major outlets: BBC, CNN, CNBC, Guardian… (Bleeping Computer)
Price fixing by algorithm is still price fixing (Federal Trade Commission)
FCC Employees Targeted in Sophisticated Phishing Attacks (SecurityWeek)
Industry Reactions to NIST Cybersecurity Framework 2.0: Feedback Friday (SecurityWeek)
Germany takes down cybercrime market with over 180,000 users (Bleeping Computer)
Exceptional Women Recognised for Contribution to Cyber Industry at Most Inspiring Women in Cyber Awards 2024 (IT Security Guru)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 04 Mar 2024 21:10:00 -0000</pubDate>
      <itunes:title>Cyberattack causes a code red on US healthcare.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2016</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The US healthcare sector is struggling to recover from a cyberattack. Russia listens in via Webex. The former head of NCSC calls for a ransomware payment ban. An Indian content farm mimics legitimate online news sites. The FTC reminds landlords that algorithmic price fixing is illegal. FCC employees are targeted by a phishing campaign. Experts weigh in on NIST’s updated cybersecurity framework. Police shut down the largest German-speaking cybercrime market. Guest Mike Hanley, Chief Security Officer and the Senior Vice President of Engineering at GitHub, shares insights with Ann Johnson of Afternoon Cyber Tea. And celebrating the most inspiring women in cyber.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
Guest Mike Hanley, Chief Security Officer and the Senior Vice President of Engineering at GitHub, shares insights with Ann Johnson of Afternoon Cyber Tea. You can hear their full discussion here, and tune in to Microsoft Security’s Afternoon Cyber Tea every other Tuesday on the N2K’s CyberWire Network.  

Selected Reading
Health-care hack spreads pain across hospitals and doctors nationwide (Washington Post)
Russia’s chief propagandist leaks intercepted German military Webex conversation (The Record)
Cyber ransoms are too profitable. Let’s make paying illegal (The Times UK)
News farm impersonates 60+ major outlets: BBC, CNN, CNBC, Guardian… (Bleeping Computer)
Price fixing by algorithm is still price fixing (Federal Trade Commission)
FCC Employees Targeted in Sophisticated Phishing Attacks (SecurityWeek)
Industry Reactions to NIST Cybersecurity Framework 2.0: Feedback Friday (SecurityWeek)
Germany takes down cybercrime market with over 180,000 users (Bleeping Computer)
Exceptional Women Recognised for Contribution to Cyber Industry at Most Inspiring Women in Cyber Awards 2024 (IT Security Guru)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US healthcare sector is struggling to recover from a cyberattack. Russia listens in via Webex. The former head of NCSC calls for a ransomware payment ban. An Indian content farm mimics legitimate online news sites. The FTC reminds landlords that algorithmic price fixing is illegal. FCC employees are targeted by a phishing campaign. Experts weigh in on NIST’s updated cybersecurity framework. Police shut down the largest German-speaking cybercrime market. Guest Mike Hanley, Chief Security Officer and the Senior Vice President of Engineering at GitHub, shares insights with Ann Johnson of Afternoon Cyber Tea. And celebrating the most inspiring women in cyber.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826">LinkedIn</a>.</p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/michael-hanley-b6508913/">Mike Hanley</a>, Chief Security Officer and the Senior Vice President of Engineering at <a href="https://github.com/">GitHub</a>, shares insights with <a href="https://www.linkedin.com/in/ann-johnsons/">Ann Johnson</a> of Afternoon Cyber Tea. You can hear their full discussion <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea/91/notes">here</a>, and tune in to Microsoft Security’s <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea</a> every other Tuesday on the N2K’s CyberWire Network.  </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.washingtonpost.com/business/2024/03/03/change-health-care-hack-hospitals/">Health-care hack spreads pain across hospitals and doctors nationwide</a> (Washington Post)</p><p><a href="https://therecord.media/german-air-force-conversation-leaked-russia">Russia’s chief propagandist leaks intercepted German military Webex conversation</a> (The Record)</p><p><a href="https://www.thetimes.co.uk/article/cyber-ransoms-are-too-profitable-lets-make-paying-illegal-kc8cmhxs0">Cyber ransoms are too profitable. Let’s make paying illegal</a> (The Times UK)</p><p><a href="https://www.bleepingcomputer.com/news/security/news-farm-impersonates-60-plus-major-outlets-bbc-cnn-cnbc-guardian/">News farm impersonates 60+ major outlets: BBC, CNN, CNBC, Guardian…</a> (Bleeping Computer)</p><p><a href="https://www.ftc.gov/business-guidance/blog/2024/03/price-fixing-algorithm-still-price-fixing">Price fixing by algorithm is still price fixing </a>(Federal Trade Commission)</p><p><a href="https://www.securityweek.com/fcc-employees-targeted-in-sophisticated-phishing-attacks/">FCC Employees Targeted in Sophisticated Phishing Attacks</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/industry-reactions-to-nist-cybersecurity-framework-2-0-feedback-friday/">Industry Reactions to NIST Cybersecurity Framework 2.0: Feedback Friday</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/legal/germany-takes-down-cybercrime-market-with-over-180-000-users/">Germany takes down cybercrime market with over 180,000 users</a> (Bleeping Computer)</p><p><a href="https://www.itsecurityguru.org/2024/03/04/exceptional-women-recognised-for-contribution-to-cyber-industry-at-most-inspiring-women-in-cyber-awards-2024/">Exceptional Women Recognised for Contribution to Cyber Industry at Most Inspiring Women in Cyber Awards 2024</a> (IT Security Guru)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1441</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[edee74de-b95d-11ee-adc6-8f09b8362396]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9736227059.mp3?updated=1709580309" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Pattie Dillon: Take the leap. [Anti-fraud] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/69/notes</link>
      <description>Product Manager in Anti-Fraud Solutions at SpyCloud, Pattie Dillon shares her journey from raising her family to specializing in the anti-fraud space. Upon reentering the workforce, Pattie worked on identity verification and developed a system with privacy concerns in mind. She moved to work in gift cards and was exposed to money laundering. Traveling along the fraud spectrum, Pattie learned about underground data and feels that this data can be leveraged to actually prevent and fight online fraud. Pattie believes if you don't try, you'll never know. We know we appreciate Pattie sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 03 Mar 2024 08:00:00 -0000</pubDate>
      <itunes:title>Encore: Pattie Dillon: Take the leap. [Anti-fraud] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>69</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Product Manager in Anti-Fraud Solutions at SpyCloud, Pattie Dillon shares her journey from raising her family to specializing in the anti-fraud space. Upon reentering the workforce, Pattie worked on identity verification and developed a system with privacy concerns in mind. She moved to work in gift cards and was exposed to money laundering. Traveling along the fraud spectrum, Pattie learned about underground data and feels that this data can be leveraged to actually prevent and fight online fraud. Pattie believes if you don't try, you'll never know. We know we appreciate Pattie sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Product Manager in Anti-Fraud Solutions at SpyCloud, Pattie Dillon shares her journey from raising her family to specializing in the anti-fraud space. Upon reentering the workforce, Pattie worked on identity verification and developed a system with privacy concerns in mind. She moved to work in gift cards and was exposed to money laundering. Traveling along the fraud spectrum, Pattie learned about underground data and feels that this data can be leveraged to actually prevent and fight online fraud. Pattie believes if you don't try, you'll never know. We know we appreciate Pattie sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>546</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a53d1504-d80e-11ee-aec0-ebf321a6cd23]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4544139227.mp3?updated=1709327361" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The return of a malware menace. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/319/notes</link>
      <description>This week we are joined by, Selena Larson from Proofpoint, who is discussing their research, "Bumblebee Buzzes Back in Black." Bumblebee is a sophisticated downloader used by multiple cybercriminal threat actors and was a favored payload from its first appearance in March 2022 through October 2023 before disappearing.
After a four month hiatus, Proofpoint researchers found that the downloader returned. Its return aligns with a surge of cybercriminal threat activity after a notable absence of many threat actors and malware. 
The research can be found here: 

Bumblebee Buzzes Back in Black 

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Mar 2024 08:00:00 -0000</pubDate>
      <itunes:title>The return of a malware menace. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>319</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week we are joined by, Selena Larson from Proofpoint, who is discussing their research, "Bumblebee Buzzes Back in Black." Bumblebee is a sophisticated downloader used by multiple cybercriminal threat actors and was a favored payload from its first appearance in March 2022 through October 2023 before disappearing.
After a four month hiatus, Proofpoint researchers found that the downloader returned. Its return aligns with a surge of cybercriminal threat activity after a notable absence of many threat actors and malware. 
The research can be found here: 

Bumblebee Buzzes Back in Black 

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we are joined by, Selena Larson from Proofpoint, who is discussing their research, "Bumblebee Buzzes Back in Black." Bumblebee is a sophisticated downloader used by multiple cybercriminal threat actors and was a favored payload from its first appearance in March 2022 through October 2023 before disappearing.</p><p>After a four month hiatus, Proofpoint researchers found that the downloader returned. Its return aligns with a surge of cybercriminal threat activity after a notable absence of many threat actors and malware. </p><p>The research can be found here: </p><ul><li>
<a href="https://www.proofpoint.com/us/blog/threat-insight/bumblebee-buzzes-back-black">Bumblebee Buzzes Back in Black</a> </li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1148</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a40e4058-d805-11ee-b974-272a06eb65a3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6571512505.mp3?updated=1709327024" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>WhatsApp's legal triumph cracks the spyware vault.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2015/notes</link>
      <description>A court orders NSO Group to hand over their source code. The Five Eyes reiterate warnings about Ivanti products. Researchers demonstrate a generative AI worm. Fulton County calls LockBit’s bluff. SMS codes went unprotected online. Golden Corral serves up a buffet of personal data. Ransom demands continue to climb. A US Senator calls on the FTC to investigate auto industry privacy practices. Dressing up data centers. Our guest is Dominic Rizzo, founder and director of OpenTitan and CEO at zeroRISC, discussing the first open-source silicon project to reach commercial availability. And Cops can’t keep their suspects straight. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest is Dominic Rizzo, founder and director of OpenTitan and CEO at zeroRISC, discussing the first open-source silicon project to reach commercial availability. You can find the press release here. 

Selected Reading
Five Eyes Warn of Ivanti Vulnerabilities Exploitation, Detection Tools Insufficient (Infosecurity Magazine)
A leaky database spilled 2FA codes for the world’s tech giants (TechCrunch)
Report: Average Initial Ransomware Demand in 2023 Reached $600K (Security Boulevard)
Here Come the AI Worms (WIRED)
Golden Corral restaurant chain data breach impacts 183,000 people (Bleeping Computer)
Hackers stole 'sensitive' data from Taiwan telecom giant: ministry(Tech Xplore)
CISA adds Microsoft Streaming Service bug to its Known Exploited Vulnerabilities catalog (Security Affairs)
Senator asks FTC to investigate automakers’ data privacy practices (The Record)
Looking good, feeling safe – data center security by design (Data Center Dynamics)
Cops visit school of 'wrong person's child,' mix up victims and suspects in epic data fail (The Register)
OpenTitan® Partnership Makes History as First Open-Source Silicon Project to Reach Commercial Availability (lowRISC)
Creating Connections: Embracing change. (N2K Women in STEM newsletter) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 01 Mar 2024 21:10:00 -0000</pubDate>
      <itunes:title>WhatsApp's legal triumph cracks the spyware vault.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2015</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A court orders NSO Group to hand over their source code. The Five Eyes reiterate warnings about Ivanti products. Researchers demonstrate a generative AI worm. Fulton County calls LockBit’s bluff. SMS codes went unprotected online. Golden Corral serves up a buffet of personal data. Ransom demands continue to climb. A US Senator calls on the FTC to investigate auto industry privacy practices. Dressing up data centers. Our guest is Dominic Rizzo, founder and director of OpenTitan and CEO at zeroRISC, discussing the first open-source silicon project to reach commercial availability. And Cops can’t keep their suspects straight. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest is Dominic Rizzo, founder and director of OpenTitan and CEO at zeroRISC, discussing the first open-source silicon project to reach commercial availability. You can find the press release here. 

Selected Reading
Five Eyes Warn of Ivanti Vulnerabilities Exploitation, Detection Tools Insufficient (Infosecurity Magazine)
A leaky database spilled 2FA codes for the world’s tech giants (TechCrunch)
Report: Average Initial Ransomware Demand in 2023 Reached $600K (Security Boulevard)
Here Come the AI Worms (WIRED)
Golden Corral restaurant chain data breach impacts 183,000 people (Bleeping Computer)
Hackers stole 'sensitive' data from Taiwan telecom giant: ministry(Tech Xplore)
CISA adds Microsoft Streaming Service bug to its Known Exploited Vulnerabilities catalog (Security Affairs)
Senator asks FTC to investigate automakers’ data privacy practices (The Record)
Looking good, feeling safe – data center security by design (Data Center Dynamics)
Cops visit school of 'wrong person's child,' mix up victims and suspects in epic data fail (The Register)
OpenTitan® Partnership Makes History as First Open-Source Silicon Project to Reach Commercial Availability (lowRISC)
Creating Connections: Embracing change. (N2K Women in STEM newsletter) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A court orders NSO Group to hand over their source code. The Five Eyes reiterate warnings about Ivanti products. Researchers demonstrate a generative AI worm. Fulton County calls LockBit’s bluff. SMS codes went unprotected online. Golden Corral serves up a buffet of personal data. Ransom demands continue to climb. A US Senator calls on the FTC to investigate auto industry privacy practices. Dressing up data centers. Our guest is Dominic Rizzo, founder and director of OpenTitan and CEO at zeroRISC, discussing the first open-source silicon project to reach commercial availability. And Cops can’t keep their suspects straight. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest is <a href="https://www.linkedin.com/in/dominic-rizzo-b353a628/">Dominic Rizzo</a>, founder and director of OpenTitan and CEO at zeroRISC, discussing the first open-source silicon project to reach commercial availability. You can find the press release <a href="https://lowrisc.org/news/2024/02/opentitan-commercial-availability/">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.infosecurity-magazine.com/news/five-eyes-warn-ivanti/">Five Eyes Warn of Ivanti Vulnerabilities Exploitation, Detection Tools Insufficient</a> (Infosecurity Magazine)</p><p><a href="https://techcrunch.com/2024/02/29/leaky-database-two-factor-codes/">A leaky database spilled 2FA codes for the world’s tech giants </a>(TechCrunch)</p><p><a href="https://securityboulevard.com/2024/03/report-average-initial-ransomware-demand-in-2023-reached-600k/">Report: Average Initial Ransomware Demand in 2023 Reached $600K </a>(Security Boulevard)</p><p><a href="https://www.wired.com/story/here-come-the-ai-worms/">Here Come the AI Worms</a> (WIRED)</p><p><a href="https://www.bleepingcomputer.com/news/security/golden-corral-restaurant-chain-data-breach-impacts-183-000-people/">Golden Corral restaurant chain data breach impacts 183,000 people</a> (Bleeping Computer)</p><p><a href="https://techxplore.com/news/2024-03-hackers-stole-sensitive-taiwan-telecom.html">Hackers stole 'sensitive' data from Taiwan telecom giant: ministry</a>(Tech Xplore)</p><p><a href="https://securityaffairs.com/159796/security/cisa-adds-microsoft-streaming-service-bug-known-exploited-vulnerabilities-catalog.html">CISA adds Microsoft Streaming Service bug to its Known Exploited Vulnerabilities catalog</a> (Security Affairs)</p><p><a href="https://therecord.media/senator-asks-ftc-to-investigate-automaker-privacy-practices">Senator asks FTC to investigate automakers’ data privacy practices</a> (The Record)</p><p><a href="https://www.datacenterdynamics.com/en/analysis/looking-good-feeling-safe-data-center-security-by-design/">Looking good, feeling safe – data center security by design</a> (Data Center Dynamics)</p><p><a href="https://www.theregister.com/2024/03/01/west_midlands_police_data_protection/">Cops visit school of 'wrong person's child,' mix up victims and suspects in epic data fail</a> (The Register)</p><p><a href="https://lowrisc.org/news/2024/02/opentitan-commercial-availability/">OpenTitan® Partnership Makes History as First Open-Source Silicon Project to Reach Commercial Availability</a> (lowRISC)</p><p><a href="https://thecyberwire.com/newsletters/creating-connections/5/2">Creating Connections: Embracing change.</a> (N2K Women in STEM newsletter) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1804</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[edb5295e-b95d-11ee-adc6-ffe57866be76]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2441725857.mp3?updated=1709321319" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Iran's cyber quest in Middle Eastern aerospace.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2014/notes</link>
      <description>Iran-Linked Cyber-Espionage Targets Middle East's Aerospace and Defense. SpaceX is accused of limiting satellite internet for US troops. Savvy Seahorse' Floods the Net with Investment Scams. GUloader Malware draws on a crafty graphic attack vector. Repo confusion attacks persist. European consumer groups question Meta’s data collection options. Allegations of Russia targeting civilian critical infrastructure in Ukraine. Cisco patches high-severity flaws. The US puts a Canadian cyber firm on its Entity List. On the Threat Vector segment, we have a conversation between host David Moulton and Michael "Siko" Sikorski, Unit 42's CTO and VP of Engineering, discussing Unit 42's 2024 Incident Response Report. And the counter-productive messaging in anti-piracy campaigns. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On the Threat Vector segment, we have a conversation between host David Moulton, Director of Thought Leadership at Palo Alto Networks Unit 42,  and Michael "Siko" Sikorski, Unit 42's CTO and VP of Engineering, discussing the Unit 42's 2024 Incident Response Report. 

Selected Reading
Suspected Iranian cyber-espionage campaign targets Middle East aerospace, defense industries (The Record)
US tells Musk to allow service in Taiwan (Taipei Times)
SpaceX Refutes Claim It’s Withholding Starshield in Taiwan (Bloomberg) 
Beware the Shallow Waters: Savvy Seahorse Lures Victims to Fake Investment Platforms Through Facebook Ads (infoblox)
GUloader Unmasked: Decrypting the Threat of Malicious SVG Files  (McAfee Blog)
Over 100,000 Infected Repos Found on GitHub (Apiiro)
Rights groups file GDPR suits on Meta's pay-or-consent model (The Register)
Russia Attacked Ukraine's Power Grid at Least 66 Times to ‘Freeze It Into Submission’ (WIRED)
Cisco Patches High-Severity Vulnerabilities in Data Center OS  (SecurityWeek)
Network intelligence company Sandvine banned from trading in the US  (SC Media)
Intimidating anti-piracy warnings have the opposite effect on men, new study says (TechSpot)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 29 Feb 2024 21:10:00 -0000</pubDate>
      <itunes:title>Iran's cyber quest in Middle Eastern aerospace.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2014</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Iran-Linked Cyber-Espionage Targets Middle East's Aerospace and Defense. SpaceX is accused of limiting satellite internet for US troops. Savvy Seahorse' Floods the Net with Investment Scams. GUloader Malware draws on a crafty graphic attack vector. Repo confusion attacks persist. European consumer groups question Meta’s data collection options. Allegations of Russia targeting civilian critical infrastructure in Ukraine. Cisco patches high-severity flaws. The US puts a Canadian cyber firm on its Entity List. On the Threat Vector segment, we have a conversation between host David Moulton and Michael "Siko" Sikorski, Unit 42's CTO and VP of Engineering, discussing Unit 42's 2024 Incident Response Report. And the counter-productive messaging in anti-piracy campaigns. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On the Threat Vector segment, we have a conversation between host David Moulton, Director of Thought Leadership at Palo Alto Networks Unit 42,  and Michael "Siko" Sikorski, Unit 42's CTO and VP of Engineering, discussing the Unit 42's 2024 Incident Response Report. 

Selected Reading
Suspected Iranian cyber-espionage campaign targets Middle East aerospace, defense industries (The Record)
US tells Musk to allow service in Taiwan (Taipei Times)
SpaceX Refutes Claim It’s Withholding Starshield in Taiwan (Bloomberg) 
Beware the Shallow Waters: Savvy Seahorse Lures Victims to Fake Investment Platforms Through Facebook Ads (infoblox)
GUloader Unmasked: Decrypting the Threat of Malicious SVG Files  (McAfee Blog)
Over 100,000 Infected Repos Found on GitHub (Apiiro)
Rights groups file GDPR suits on Meta's pay-or-consent model (The Register)
Russia Attacked Ukraine's Power Grid at Least 66 Times to ‘Freeze It Into Submission’ (WIRED)
Cisco Patches High-Severity Vulnerabilities in Data Center OS  (SecurityWeek)
Network intelligence company Sandvine banned from trading in the US  (SC Media)
Intimidating anti-piracy warnings have the opposite effect on men, new study says (TechSpot)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iran-Linked Cyber-Espionage Targets Middle East's Aerospace and Defense. SpaceX is accused of limiting satellite internet for US troops. Savvy Seahorse' Floods the Net with Investment Scams. GUloader Malware draws on a crafty graphic attack vector. Repo confusion attacks persist. European consumer groups question Meta’s data collection options. Allegations of Russia targeting civilian critical infrastructure in Ukraine. Cisco patches high-severity flaws. The US puts a Canadian cyber firm on its Entity List. On the Threat Vector segment, we have a conversation between host David Moulton and Michael "Siko" Sikorski, Unit 42's CTO and VP of Engineering, discussing Unit 42's 2024 Incident Response Report. And the counter-productive messaging in anti-piracy campaigns. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On the Threat Vector segment, we have a conversation between host<a href="https://www.linkedin.com/in/davidrmoulton/"> David Moulton</a>, Director of Thought Leadership at Palo Alto Networks<a href="https://unit42.paloaltonetworks.com/"> Unit 42</a>,  and<a href="https://www.linkedin.com/in/mikesiko/"> Michael "Siko" Sikorski</a>, Unit 42's CTO and VP of Engineering, discussing the Unit 42's<a href="https://www.paloaltonetworks.com/resources/research/unit-42-incident-response-report"> 2024 Incident Response Report</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/iran-cyber-espionage-campaign-targeting-middle-east-defense-aerospace">Suspected Iranian cyber-espionage campaign targets Middle East aerospace, defense industries</a> (The Record)</p><p><a href="https://www.taipeitimes.com/News/front/archives/2024/02/26/2003814085">US tells Musk to allow service in Taiwan</a><a href="https://www.taipeitimes.com/News/front/archives/2024/02/26/2003814085"> (Taipei Times</a>)</p><p><a href="https://www.bloomberg.com/news/articles/2024-02-26/spacex-refutes-claim-it-s-withholding-starshield-in-taiwan">SpaceX Refutes Claim It’s Withholding Starshield in Taiwan </a><a href="https://www.bloomberg.com/news/articles/2024-02-26/spacex-refutes-claim-it-s-withholding-starshield-in-taiwan">(Bloomberg</a>) </p><p><a href="https://blogs.infoblox.com/cyber-threat-intelligence/beware-the-shallow-waters-savvy-seahorse-lures-victims-to-fake-investment-platforms-through-facebook-ads/">Beware the Shallow Waters: Savvy Seahorse Lures Victims to Fake Investment Platforms Through Facebook Ads</a> (infoblox)</p><p><a href="https://www.mcafee.com/blogs/other-blogs/mcafee-labs/guloader-unmasked-decrypting-the-threat-of-malicious-svg-files/">GUloader Unmasked: Decrypting the Threat of Malicious SVG Files </a> (McAfee Blog)</p><p><a href="https://apiiro.com/blog/malicious-code-campaign-github-repo-confusion-attack/">Over 100,000 Infected Repos Found on GitHub</a> (Apiiro)</p><p><a href="https://www.theregister.com/2024/02/29/meta_gdpr_complaints/">Rights groups file GDPR suits on Meta's pay-or-consent model</a> (The Register)</p><p><a href="https://www.wired.com/story/russia-ukraine-power-war-crimes/">Russia Attacked Ukraine's Power Grid at Least 66 Times to ‘Freeze It Into Submission’</a> (WIRED)</p><p><a href="https://www.securityweek.com/cisco-patches-high-severity-vulnerabilities-in-data-center-os/">Cisco Patches High-Severity Vulnerabilities in Data Center OS </a> (SecurityWeek)</p><p><a href="https://www.scmagazine.com/brief/network-intelligence-company-sandvine-banned-from-trading-in-the-us">Network intelligence company Sandvine banned from trading in the US  </a><a href="https://www.scmagazine.com/brief/network-intelligence-company-sandvine-banned-from-trading-in-the-us">(SC Media</a>)</p><p><a href="https://www.techspot.com/news/101996-intimidating-anti-piracy-warnings-have-opposite-effect-men.html">Intimidating anti-piracy warnings have the opposite effect on men, new study says</a> (TechSpot)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1543</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ed78b168-b95d-11ee-adc6-3753cf32d243]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4829453765.mp3?updated=1709237606" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Protecting American data.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2013/notes</link>
      <description>President Biden is set to sign an executive order restricting overseas sharing by data brokers. US Federal agencies warn of exploited Ubiquiti EdgeRouters. A new ransomware operator claims to have hacked Epic Games. A cross-site scripting issue leaves millions of Wordpress sites vulnerable. The Rhysida ransomware group posts a multi-million dollar ransom demand on a Children’s Hospital in Chicago. Mandiant tracks Chinese threat actors targeting Ivanti VPNs. The former head of DHS weighs in on a federal cyber insurance backstop. Domain Registrars offer bulk name blocking for brands. Our guest is Magpie Graham, Principal Adversary Hunter Technical Director at Dragos, reviews the key findings of Dragos’ Cybersecurity Year in Review report. Cameo celebrities are taken out of context for political gains.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Magpie Graham, Principal Adversary Hunter Technical Director at Dragos, reviews the key findings of Dragos’ Cybersecurity Year in Review report. You can download a copy of the report here. To hear the full interview with Magpie, check out Control Loop. 

Selected Reading
Biden Executive Order Targets Bulk Data Transfers to China (GovInfo Security)
FBI Alert: Russian Hackers Target Ubiquiti Routers for Data, Botnet Creation (HACKREAD)
Fortnite game developer Epic Games allegedly hacked (Cyber Daily)
LiteSpeed Cache Plugin XSS Flaw Exposes 4M+ Million Sites to Attack (Cyber Security News)
Ransomware gang seeks $3.4 million after attacking children’s hospital (The Record)
Chinese Cyberspies Use New Malware in Ivanti VPN Attacks (SecurityWeek)
A Cyber Insurance Backstop (Schneier on Security)
Cyberwar Podcast with Kate and Alex - Special Guest Michael Chertoff 
Registrars can now block all domains that resemble brand names (BleepingComputer)
Cameo is being used for political propaganda — by tricking the stars involved (NPR)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 28 Feb 2024 21:10:00 -0000</pubDate>
      <itunes:title>Protecting American data.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2013</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>President Biden is set to sign an executive order restricting overseas sharing by data brokers. US Federal agencies warn of exploited Ubiquiti EdgeRouters. A new ransomware operator claims to have hacked Epic Games. A cross-site scripting issue leaves millions of Wordpress sites vulnerable. The Rhysida ransomware group posts a multi-million dollar ransom demand on a Children’s Hospital in Chicago. Mandiant tracks Chinese threat actors targeting Ivanti VPNs. The former head of DHS weighs in on a federal cyber insurance backstop. Domain Registrars offer bulk name blocking for brands. Our guest is Magpie Graham, Principal Adversary Hunter Technical Director at Dragos, reviews the key findings of Dragos’ Cybersecurity Year in Review report. Cameo celebrities are taken out of context for political gains.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Magpie Graham, Principal Adversary Hunter Technical Director at Dragos, reviews the key findings of Dragos’ Cybersecurity Year in Review report. You can download a copy of the report here. To hear the full interview with Magpie, check out Control Loop. 

Selected Reading
Biden Executive Order Targets Bulk Data Transfers to China (GovInfo Security)
FBI Alert: Russian Hackers Target Ubiquiti Routers for Data, Botnet Creation (HACKREAD)
Fortnite game developer Epic Games allegedly hacked (Cyber Daily)
LiteSpeed Cache Plugin XSS Flaw Exposes 4M+ Million Sites to Attack (Cyber Security News)
Ransomware gang seeks $3.4 million after attacking children’s hospital (The Record)
Chinese Cyberspies Use New Malware in Ivanti VPN Attacks (SecurityWeek)
A Cyber Insurance Backstop (Schneier on Security)
Cyberwar Podcast with Kate and Alex - Special Guest Michael Chertoff 
Registrars can now block all domains that resemble brand names (BleepingComputer)
Cameo is being used for political propaganda — by tricking the stars involved (NPR)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>President Biden is set to sign an executive order restricting overseas sharing by data brokers. US Federal agencies warn of exploited Ubiquiti EdgeRouters. A new ransomware operator claims to have hacked Epic Games. A cross-site scripting issue leaves millions of Wordpress sites vulnerable. The Rhysida ransomware group posts a multi-million dollar ransom demand on a Children’s Hospital in Chicago. Mandiant tracks Chinese threat actors targeting Ivanti VPNs. The former head of DHS weighs in on a federal cyber insurance backstop. Domain Registrars offer bulk name blocking for brands. Our guest is Magpie Graham, Principal Adversary Hunter Technical Director at Dragos, reviews the key findings of Dragos’ Cybersecurity Year in Review report. Cameo celebrities are taken out of context for political gains.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/malwaremagpie/">Magpie Graham</a>, Principal Adversary Hunter Technical Director at <a href="https://www.dragos.com/">Dragos</a>, reviews the key findings of Dragos’ Cybersecurity Year in Review report. You can download a copy of the report <a href="https://hub.dragos.com/ot-cybersecurity-year-in-review-2023?utm_source=control_loop&amp;utm_medium=eblast&amp;utm_campaign=2023_year_in_review_full_report_via_control_loop">here</a>. To hear the full interview with Magpie, check out <a href="https://thecyberwire.com/podcasts/control-loop/44/notes">Control Loop</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.govinfosecurity.com/biden-executive-order-targets-bulk-data-transfers-to-china-a-24462">Biden Executive Order Targets Bulk Data Transfers to China</a> (GovInfo Security)</p><p><a href="https://www.hackread.com/fbi-alert-russian-hackers-ubiquiti-routers-botnet/">FBI Alert: Russian Hackers Target Ubiquiti Routers for Data, Botnet Creation</a> (HACKREAD)</p><p><a href="https://www.cyberdaily.au/culture/10241-fortnite-game-dev-epic-games-allegedly-hacked">Fortnite game developer Epic Games allegedly hacked </a>(Cyber Daily)</p><p><a href="https://cybersecuritynews.com/litespeed-cache-plugin-xss-flaw/">LiteSpeed Cache Plugin XSS Flaw Exposes 4M+ Million Sites to Attack</a> (Cyber Security News)</p><p><a href="https://therecord.media/lurie-childrens-hospital-chicago-ransomware-rhysida">Ransomware gang seeks $3.4 million after attacking children’s hospital</a> (The Record)</p><p><a href="https://www.securityweek.com/chinese-cyberspies-use-new-malware-in-ivanti-vpn-attacks/">Chinese Cyberspies Use New Malware in Ivanti VPN Attacks</a> (SecurityWeek)</p><p><a href="https://www.schneier.com/blog/archives/2024/02/a-cyber-insurance-backstop.html">A Cyber Insurance Backstop </a>(Schneier on Security)</p><p><a href="https://open.spotify.com/episode/7BPioD3DyU3lWxStwafeGI">Cyberwar Podcast with Kate and Alex - Special Guest Michael Chertoff</a> </p><p><a href="https://www.bleepingcomputer.com/news/technology/registrars-can-now-block-all-domains-that-resemble-brand-names/">Registrars can now block all domains that resemble brand names</a> (BleepingComputer)</p><p><a href="https://www.npr.org/2024/02/27/1234114383/cameo-is-being-used-for-political-propaganda-by-tricking-the-stars-involved">Cameo is being used for political propaganda — by tricking the stars involved</a><em> </em>(NPR)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1860</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ed3b7a96-b95d-11ee-adc6-bb46f041a347]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4191358861.mp3?updated=1709144718" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Out with the old, in with the new.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2012/notes</link>
      <description>NIST’s Cybersecurity Framework gets an upgrade. ONCD makes a case against memory-related software bugs. A recent cyberattack targets Canada's Royal Canadian Mounted Police. US dethrones Russia as top target in cyber breaches. Caveat podcast cohost Ben Yelin discusses remedies in the generative AI copyright cases.And, Reggaeton Be Gone, a creative way to deal with your neighbors’ music choices. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Ben Yelin, cohost of Caveat podcast and Program Director, Public Policy &amp; External Affairs at University of Maryland Center for Health and Homeland Security, thinking about remedies in the generative AI copyright cases. You can find the Lawfare article Ben references here.  

Selected Reading
NIST Releases Version 2.0 of Landmark Cybersecurity Framework (NIST)
After decades of memory-related software bugs, White House calls on industry to act (The Record) 
Canada's RCMP, Global Affairs Hit by Cyberattacks (SecurityWeek)
A cyber attack hit the Royal Canadian Mounted Police (Security Affairs) 
UK email mistake put ‘lives at risk’ for Afghans who had worked with British military (The Record) 
Russia and Belarus targeted by at least 14 nation-state hacker groups, researchers say (The Record) 
Number of data breaches falls globally, triples in the US (TechSpot)
Steel giant ThyssenKrupp confirms cyberattack on automotive division (Bleeping Computer)
The Change Healthcare cyberattack is still impacting pharmacies. It's a bigger deal than you think (Fast Company)
US Pharmacy Outage Triggered by 'Blackcat' Ransomware at UnitedHealth Unit, Sources Say (US News and World Report) 
Getting Ahead of Cybersecurity Materiality Mayhem (Security Boulevard) 
Raspberry Pi maker builds device to hack neighbor's Bluetooth speakers that were streaming annoying music (TechSpot)
Reggaeton Be Gone (Hackster.io)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Feb 2024 21:10:00 -0000</pubDate>
      <itunes:title>Out with the old, in with the new.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2012</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>NIST’s Cybersecurity Framework gets an upgrade. ONCD makes a case against memory-related software bugs. A recent cyberattack targets Canada's Royal Canadian Mounted Police. US dethrones Russia as top target in cyber breaches. Caveat podcast cohost Ben Yelin discusses remedies in the generative AI copyright cases.And, Reggaeton Be Gone, a creative way to deal with your neighbors’ music choices. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Ben Yelin, cohost of Caveat podcast and Program Director, Public Policy &amp; External Affairs at University of Maryland Center for Health and Homeland Security, thinking about remedies in the generative AI copyright cases. You can find the Lawfare article Ben references here.  

Selected Reading
NIST Releases Version 2.0 of Landmark Cybersecurity Framework (NIST)
After decades of memory-related software bugs, White House calls on industry to act (The Record) 
Canada's RCMP, Global Affairs Hit by Cyberattacks (SecurityWeek)
A cyber attack hit the Royal Canadian Mounted Police (Security Affairs) 
UK email mistake put ‘lives at risk’ for Afghans who had worked with British military (The Record) 
Russia and Belarus targeted by at least 14 nation-state hacker groups, researchers say (The Record) 
Number of data breaches falls globally, triples in the US (TechSpot)
Steel giant ThyssenKrupp confirms cyberattack on automotive division (Bleeping Computer)
The Change Healthcare cyberattack is still impacting pharmacies. It's a bigger deal than you think (Fast Company)
US Pharmacy Outage Triggered by 'Blackcat' Ransomware at UnitedHealth Unit, Sources Say (US News and World Report) 
Getting Ahead of Cybersecurity Materiality Mayhem (Security Boulevard) 
Raspberry Pi maker builds device to hack neighbor's Bluetooth speakers that were streaming annoying music (TechSpot)
Reggaeton Be Gone (Hackster.io)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>NIST’s Cybersecurity Framework gets an upgrade. ONCD makes a case against memory-related software bugs. A recent cyberattack targets Canada's Royal Canadian Mounted Police. US dethrones Russia as top target in cyber breaches. Caveat podcast cohost Ben Yelin discusses remedies in the generative AI copyright cases.And, Reggaeton Be Gone, a creative way to deal with your neighbors’ music choices. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/benjamin-yelin-5b14114b/">Ben Yelin</a>, cohost of <a href="https://thecyberwire.com/podcasts/caveat">Caveat</a> podcast and Program Director, Public Policy &amp; External Affairs at University of <a href="https://www.mdchhs.com/">Maryland Center for Health and Homeland Security</a>, thinking about remedies in the generative AI copyright cases. You can find the Lawfare article Ben references <a href="https://www.lawfaremedia.org/article/how-to-think-about-remedies-in-the-generative-ai-copyright-cases">here</a>.  </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.nist.gov/news-events/news/2024/02/nist-releases-version-20-landmark-cybersecurity-framework">NIST Releases Version 2.0 of Landmark Cybersecurity Framework</a> (NIST)</p><p><a href="https://therecord.media/memory-related-software-bugs-white-house-code-report-oncd">After decades of memory-related software bugs, White House calls on industry to act</a> (The Record) </p><p><a href="https://www.securityweek.com/canadas-rcmp-global-affairs-hit-by-cyberattacks/">Canada's RCMP, Global Affairs Hit by Cyberattacks</a> (SecurityWeek)</p><p><a href="https://securityaffairs.com/159568/hacking/cyber-attack-hit-royal-canadian-mounted-police.html">A cyber attack hit the Royal Canadian Mounted Police</a> (Security Affairs) </p><p><a href="https://therecord.media/ministry-of-defence-fined-email-mistake-afghans">UK email mistake put ‘lives at risk’ for Afghans who had worked with British military</a> (The Record) </p><p><a href="https://therecord.media/russia-belarus-cyberthreat-research-facct">Russia and Belarus targeted by at least 14 nation-state hacker groups, researchers say</a> (The Record) </p><p><a href="https://www.techspot.com/news/102040-number-data-breaches-falls-globally-triples-us.html">Number of data breaches falls globally, triples in the US </a>(TechSpot)</p><p><a href="https://www.bleepingcomputer.com/news/security/steel-giant-thyssenkrupp-confirms-cyberattack-on-automotive-division/">Steel giant ThyssenKrupp confirms cyberattack on automotive division</a> (Bleeping Computer)</p><p><a href="https://www.fastcompany.com/91037949/change-healthcare-cyber-attack-update-pharmacies-big-deal">The Change Healthcare cyberattack is still impacting pharmacies. It's a bigger deal than you think</a> (Fast Company)</p><p><a href="https://www.usnews.com/news/technology/articles/2024-02-26/cyber-security-outage-at-change-healthcare-continues-for-sixth-straight-day">US Pharmacy Outage Triggered by 'Blackcat' Ransomware at UnitedHealth Unit, Sources Say</a> (US News and World Report) </p><p><a href="https://securityboulevard.com/2024/02/getting-ahead-of-cybersecurity-materiality-mayhem/">Getting Ahead of Cybersecurity Materiality Mayhem </a>(Security Boulevard) </p><p><a href="https://www.techspot.com/news/102038-raspberry-pi-maker-builds-device-hack-neighbor-bluetooth.html">Raspberry Pi maker builds device to hack neighbor's Bluetooth speakers that were streaming annoying music</a> (TechSpot)</p><p><a href="https://www.hackster.io/roni-bandini/reggaeton-be-gone-e5b6e2">Reggaeton Be Gone</a> (Hackster.io)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1237</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ecfe733a-b95d-11ee-adc6-ab83815a3935]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9534312112.mp3?updated=1709065576" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>LockBit reloaded: Unveiling the next chapter in cybercrime.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2011/notes</link>
      <description>LockBits reawakening. China's ramp up to safety for vital sectors. Data leak leaves China feeling exposed. Malware hidden by North Korea in fake developer job listings. UK Watchdog rebukes firm for biometric scanning of staff at leisure centers. SVR found adapting for the cloud environment. DOE proposes cybersecurity guidelines for the electric sector. Wideness of breach in the financial industry revealed. Moving on to better things. Things are looking up in the cybersecurity startup ecosystem. UK's National Cyber Security Centre announced they are launching a Cyber Governance Training Pack for boards. N2K’s President Simone Petrella talks with Elastic's CISO Mandy Andress about the CISO role and the intersection of cybersecurity, law, and organizational strategy. And, there’s a facial recognition battle going on at Waterloo, the University of Waterloo that is. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Simone Petrella, N2K’s President, talks with Mandy Andress, Elastic's CISO, about the CISO role and the intersection of cybersecurity, law, and organizational strategy.

Selected Reading
LockBit Ransomware Gang Resurfaces With New Site (SecurityWeek)
LockBit ransomware gang attempts to relaunch its services following takedown (The Record) 
China to increase protections against hacking for key industries (Reuters)
The I-Soon data leak unveils China's cyber espionage tactics, techniques, procedures, and capabilities. (N2K CyberWire)
Fake Developer Jobs Laced With Malware (Phylum Blog)
Data watchdog tells off outsourcing giant for scanning staff biometrics despite 'power imbalance' (The Register) 
SVR cyber actors adapt tactics for initial cloud access (National Cyber Security Centre)
New DOE-Funded Initiative Outlines Proposed Cybersecurity Baselines for Electric Distribution Systems (Energy.gov) 
LoanDepot says about 17 million customers had personal data and Social Security numbers stolen during cyberattack (TechCrunch)  	
	Actual filing to Office of Maine Attorney General: Data Breach Notifications - Consumer Protection (Maine.gov) 
U-Haul data breach affects 67,000 customers in US and Canada (AZ Central)
	Actual filing to Office of Maine AG: Data Breach Notifications - Consumer Protection (Maine.gov)  
Funding Down, Optimism Up: The Bright Spots For Cybersecurity Startups In 2024 (Forbes)
NCSC to Offer Cyber Governance Guidance to Boards (InfoSecurity Magazine) 
'Facial recognition' error message on vending machine sparks concern at University of Waterloo (CTV News) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 26 Feb 2024 21:50:00 -0000</pubDate>
      <itunes:title>LockBit reloaded: Unveiling the next chapter in cybercrime.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2011</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>LockBits reawakening. China's ramp up to safety for vital sectors. Data leak leaves China feeling exposed. Malware hidden by North Korea in fake developer job listings. UK Watchdog rebukes firm for biometric scanning of staff at leisure centers. SVR found adapting for the cloud environment. DOE proposes cybersecurity guidelines for the electric sector. Wideness of breach in the financial industry revealed. Moving on to better things. Things are looking up in the cybersecurity startup ecosystem. UK's National Cyber Security Centre announced they are launching a Cyber Governance Training Pack for boards. N2K’s President Simone Petrella talks with Elastic's CISO Mandy Andress about the CISO role and the intersection of cybersecurity, law, and organizational strategy. And, there’s a facial recognition battle going on at Waterloo, the University of Waterloo that is. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Simone Petrella, N2K’s President, talks with Mandy Andress, Elastic's CISO, about the CISO role and the intersection of cybersecurity, law, and organizational strategy.

Selected Reading
LockBit Ransomware Gang Resurfaces With New Site (SecurityWeek)
LockBit ransomware gang attempts to relaunch its services following takedown (The Record) 
China to increase protections against hacking for key industries (Reuters)
The I-Soon data leak unveils China's cyber espionage tactics, techniques, procedures, and capabilities. (N2K CyberWire)
Fake Developer Jobs Laced With Malware (Phylum Blog)
Data watchdog tells off outsourcing giant for scanning staff biometrics despite 'power imbalance' (The Register) 
SVR cyber actors adapt tactics for initial cloud access (National Cyber Security Centre)
New DOE-Funded Initiative Outlines Proposed Cybersecurity Baselines for Electric Distribution Systems (Energy.gov) 
LoanDepot says about 17 million customers had personal data and Social Security numbers stolen during cyberattack (TechCrunch)  	
	Actual filing to Office of Maine Attorney General: Data Breach Notifications - Consumer Protection (Maine.gov) 
U-Haul data breach affects 67,000 customers in US and Canada (AZ Central)
	Actual filing to Office of Maine AG: Data Breach Notifications - Consumer Protection (Maine.gov)  
Funding Down, Optimism Up: The Bright Spots For Cybersecurity Startups In 2024 (Forbes)
NCSC to Offer Cyber Governance Guidance to Boards (InfoSecurity Magazine) 
'Facial recognition' error message on vending machine sparks concern at University of Waterloo (CTV News) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>LockBits reawakening. China's ramp up to safety for vital sectors. Data leak leaves China feeling exposed. Malware hidden by North Korea in fake developer job listings. UK Watchdog rebukes firm for biometric scanning of staff at leisure centers. SVR found adapting for the cloud environment. DOE proposes cybersecurity guidelines for the electric sector. Wideness of breach in the financial industry revealed. Moving on to better things. Things are looking up in the cybersecurity startup ecosystem. UK's National Cyber Security Centre announced they are launching a Cyber Governance Training Pack for boards. N2K’s President Simone Petrella talks with Elastic's CISO Mandy Andress about the CISO role and the intersection of cybersecurity, law, and organizational strategy. And, there’s a facial recognition battle going on at Waterloo, the University of Waterloo that is. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a>, <a href="https://www.n2k.com/">N2K</a>’s President, talks with <a href="https://www.linkedin.com/in/mandyandress/">Mandy Andress</a>, <a href="https://www.elastic.co/">Elastic</a>'s CISO, about the CISO role and the intersection of cybersecurity, law, and organizational strategy.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/lockbit-ransomware-gang-resurfaces-with-new-site/">LockBit Ransomware Gang Resurfaces With New Site</a> (SecurityWeek)</p><p><a href="https://therecord.media/lockbit-relaunch-attempt-follwing-takedown">LockBit ransomware gang attempts to relaunch its services following takedown</a> (The Record) </p><p><a href="https://www.reuters.com/technology/cybersecurity/china-increase-protections-against-hacking-key-industries-2024-02-26/">China to increase protections against hacking for key industries</a> (Reuters)</p><p><a href="https://thecyberwire.com/stories/05ba5c2ff18f4af5abc30ebe28c968bf/the-i-soon-data-leak-unveils-chinas-cyber-espionage-tactics-techniques-procedures-and-capabilities">The I-Soon data leak unveils China's cyber espionage tactics, techniques, procedures, and capabilities.</a> (N2K CyberWire)</p><p><a href="https://blog.phylum.io/smuggling-malware-in-test-code/">Fake Developer Jobs Laced With Malware</a> (Phylum Blog)</p><p><a href="https://www.theregister.com/2024/02/26/uk_data_protection_watchdog_halts/">Data watchdog tells off outsourcing giant for scanning staff biometrics despite 'power imbalance'</a> (The Register) </p><p><a href="https://www.ncsc.gov.uk/news/svr-cyber-actors-adapt-tactics-for-initial-cloud-access">SVR cyber actors adapt tactics for initial cloud access</a> (National Cyber Security Centre)</p><p><a href="https://www.energy.gov/ceser/articles/new-doe-funded-initiative-outlines-proposed-cybersecurity-baselines-electric">New DOE-Funded Initiative Outlines Proposed Cybersecurity Baselines for Electric Distribution Systems</a> (Energy.gov) </p><p><a href="https://techcrunch.com/2024/02/26/loandepot-millions-sensitive-personal-data-ransomware/">LoanDepot says about 17 million customers had personal data and Social Security numbers stolen during cyberattack</a> (TechCrunch)  	</p><p>	Actual filing to Office of Maine Attorney General: <a href="https://apps.web.maine.gov/online/aeviewer/ME/40/2b910ff6-9bd0-4fcf-a766-cd2c0bc85dec.shtml?1708971900">Data Breach Notifications - Consumer Protection</a> (Maine.gov) </p><p><a href="https://www.azcentral.com/story/money/business/consumers/2024/02/23/u-haul-data-breach/72713283007/">U-Haul data breach affects 67,000 customers in US and Canada</a> (AZ Central)</p><p>	Actual filing to Office of Maine AG: <a href="https://apps.web.maine.gov/online/aeviewer/ME/40/8cbdef9d-3c2c-48e1-b36e-d202df6bd1af.shtml">Data Breach Notifications - Consumer Protection</a> (Maine.gov)  </p><p><a href="https://www.forbes.com/sites/forbesfinancecouncil/2024/02/26/funding-down-optimism-up-the-bright-spots-for-cybersecurity-startups-in-2024/?sh=1058f88f4843">Funding Down, Optimism Up: The Bright Spots For Cybersecurity Startups In 2024</a> (Forbes)</p><p><a href="https://www.infosecurity-magazine.com/news/ncsc-offer-cybergovernance/">NCSC to Offer Cyber Governance Guidance to Boards</a> (InfoSecurity Magazine) </p><p><a href="https://kitchener.ctvnews.ca/facial-recognition-error-message-on-vending-machine-sparks-concern-at-university-of-waterloo-1.6779835">'Facial recognition' error message on vending machine sparks concern at University of Waterloo</a> (CTV News) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1397</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ecc12520-b95d-11ee-adc6-331d86d0db07]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4140058622.mp3?updated=1708983525" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Chris Cochran: Rely on your strengths in the areas of the unknown. [Engineering] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/9/notes</link>
      <description>Director of Security Engineering at Marqeta and Host of Hacker Valley Studio podcast Chris Cochran describes his transitions throughout the cybersecurity industry, from an intelligence job with the Marine Corps, to starting the intelligence apparatus for the House of Representatives, then on to leading Netflix's threat intelligence capability. Chris points out that when pivoting to different roles and responsibilities, you must rely on your own strengths to move forward and bring value to your work Our thanks to Chris for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 25 Feb 2024 08:00:00 -0000</pubDate>
      <itunes:title>Encore: Chris Cochran: Rely on your strengths in the areas of the unknown. [Engineering] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>9</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Director of Security Engineering at Marqeta and Host of Hacker Valley Studio podcast Chris Cochran describes his transitions throughout the cybersecurity industry, from an intelligence job with the Marine Corps, to starting the intelligence apparatus for the House of Representatives, then on to leading Netflix's threat intelligence capability. Chris points out that when pivoting to different roles and responsibilities, you must rely on your own strengths to move forward and bring value to your work Our thanks to Chris for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Director of Security Engineering at Marqeta and Host of Hacker Valley Studio podcast Chris Cochran describes his transitions throughout the cybersecurity industry, from an intelligence job with the Marine Corps, to starting the intelligence apparatus for the House of Representatives, then on to leading Netflix's threat intelligence capability. Chris points out that when pivoting to different roles and responsibilities, you must rely on your own strengths to move forward and bring value to your work Our thanks to Chris for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>342</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[70be79e6-d25d-11ee-a118-2feccd67d836]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9076607665.mp3?updated=1708701168" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Web host havoc: Unveiling the Manic Menagerie campaign. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/318/notes</link>
      <description>Assaf Dahan and Daniel Frank from Palo Alto Networks Cortex sit down with Dave to talk about their research "Manic Menagerie 2.0: The Evolution of a Highly Motivated Threat Actor." From late 2020 to late 2022, Unit 42 researchers discovered an active campaign that targeted several web hosting and IT providers in the United States and European Union.
The research states "They have further deepened their foothold in victims’ environments by mass deployment of web shells, which granted them sustained access, as well as access to internal resources of the compromised websites."
The research can be found here:
Manic Menagerie 2.0: The Evolution of a Highly Motivated Threat Actor

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Feb 2024 08:00:00 -0000</pubDate>
      <itunes:title>Web host havoc: Unveiling the Manic Menagerie campaign. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>318</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Assaf Dahan and Daniel Frank from Palo Alto Networks Cortex sit down with Dave to talk about their research "Manic Menagerie 2.0: The Evolution of a Highly Motivated Threat Actor." From late 2020 to late 2022, Unit 42 researchers discovered an active campaign that targeted several web hosting and IT providers in the United States and European Union.
The research states "They have further deepened their foothold in victims’ environments by mass deployment of web shells, which granted them sustained access, as well as access to internal resources of the compromised websites."
The research can be found here:
Manic Menagerie 2.0: The Evolution of a Highly Motivated Threat Actor

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Assaf Dahan and Daniel Frank from Palo Alto Networks Cortex sit down with Dave to talk about their research "Manic Menagerie 2.0: The Evolution of a Highly Motivated Threat Actor." From late 2020 to late 2022, Unit 42 researchers discovered an active campaign that targeted several web hosting and IT providers in the United States and European Union.</p><p>The research states "They have further deepened their foothold in victims’ environments by mass deployment of web shells, which granted them sustained access, as well as access to internal resources of the compromised websites."</p><p>The research can be found here:</p><ul><li><a href="https://unit42.paloaltonetworks.com/manic-menagerie-targets-web-hosting-and-it/">Manic Menagerie 2.0: The Evolution of a Highly Motivated Threat Actor</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1305</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4779ad96-d28d-11ee-b4f0-f7d4f395ddeb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8155629112.mp3?updated=1708715286" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Crackdown on privacy leads to a multi-million dollar fine.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2010/notes</link>
      <description>The FTC fines Avast over privacy violations. ConnectWise's ScreenConnect is under active exploitation. AT&amp;T restores services nationwide. An Australian telecom provider suffers a data breach. EU Member States publish a cybersecurity and resilience report. Microsoft unleashes a PyRIT. A new infostealer targets the oil and gas sector. A cyberattack cripples a major US healthcare provider. Our guest is Kevin Magee from Microsoft Canada with insights on why cybersecurity startups in Ireland are having so much success building new companies there. And  a USB device is buzzing with malware.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Kevin Magee from Microsoft Canada talks about recently meeting 15 cybersecurity startups in Ireland and finding out why they are having so much success building new companies there. 

Selected Reading
FTC Order Will Ban Avast from Selling Browsing Data for Advertising Purposes, Require It to Pay $16.5 Million Over Charges the Firm Sold Browsing Data After Claiming Its Products Would Block Online Tracking (FTC)
Cybercriminal groups actively exploiting ‘catastrophic’ ScreenConnect bug (The Record)
AT&amp;T services resume, company blames "incorrect process" (Data Center Dynamics)
230k Individuals Impacted by Data Breach at Australian Telco Tangerine (SecurityWeek)
EU releases comprehensive risk assessment report on cybersecurity, resilience of communication networks (Industrial Cyber)
Microsoft Releases Red Teaming Tool for Generative AI (SecurityWeek)
New Infostealer Malware Attacking Oil and Gas Industry (GB Hackers on Security)
UnitedHealth says Change Healthcare hacked by nation state, as US pharmacy outages drag on (TechCrunch)
Vibrator virus steals your personal information (Malwarebytes)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 23 Feb 2024 21:10:00 -0000</pubDate>
      <itunes:title>Crackdown on privacy leads to a multi-million dollar fine.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2010</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The FTC fines Avast over privacy violations. ConnectWise's ScreenConnect is under active exploitation. AT&amp;T restores services nationwide. An Australian telecom provider suffers a data breach. EU Member States publish a cybersecurity and resilience report. Microsoft unleashes a PyRIT. A new infostealer targets the oil and gas sector. A cyberattack cripples a major US healthcare provider. Our guest is Kevin Magee from Microsoft Canada with insights on why cybersecurity startups in Ireland are having so much success building new companies there. And  a USB device is buzzing with malware.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Kevin Magee from Microsoft Canada talks about recently meeting 15 cybersecurity startups in Ireland and finding out why they are having so much success building new companies there. 

Selected Reading
FTC Order Will Ban Avast from Selling Browsing Data for Advertising Purposes, Require It to Pay $16.5 Million Over Charges the Firm Sold Browsing Data After Claiming Its Products Would Block Online Tracking (FTC)
Cybercriminal groups actively exploiting ‘catastrophic’ ScreenConnect bug (The Record)
AT&amp;T services resume, company blames "incorrect process" (Data Center Dynamics)
230k Individuals Impacted by Data Breach at Australian Telco Tangerine (SecurityWeek)
EU releases comprehensive risk assessment report on cybersecurity, resilience of communication networks (Industrial Cyber)
Microsoft Releases Red Teaming Tool for Generative AI (SecurityWeek)
New Infostealer Malware Attacking Oil and Gas Industry (GB Hackers on Security)
UnitedHealth says Change Healthcare hacked by nation state, as US pharmacy outages drag on (TechCrunch)
Vibrator virus steals your personal information (Malwarebytes)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FTC fines Avast over privacy violations. ConnectWise's ScreenConnect is under active exploitation. AT&amp;T restores services nationwide. An Australian telecom provider suffers a data breach. EU Member States publish a cybersecurity and resilience report. Microsoft unleashes a PyRIT. A new infostealer targets the oil and gas sector. A cyberattack cripples a major US healthcare provider. Our guest is Kevin Magee from Microsoft Canada with insights on why cybersecurity startups in Ireland are having so much success building new companies there. And  a USB device is buzzing with malware.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/kmagee/">Kevin Magee</a> from <a href="https://www.microsoft.com/en-ca/about/our-company.aspx">Microsoft Canada</a> talks about recently meeting 15 cybersecurity startups in Ireland and finding out why they are having so much success building new companies there. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.ftc.gov/news-events/news/press-releases/2024/02/ftc-order-will-ban-avast-selling-browsing-data-advertising-purposes-require-it-pay-165-million-over">FTC Order Will Ban Avast from Selling Browsing Data for Advertising Purposes, Require It to Pay $16.5 Million Over Charges the Firm Sold Browsing Data After Claiming Its Products Would Block Online Tracking</a> (FTC)</p><p><a href="https://therecord.media/connectwise-screenconnect-bug-cybercrime-exploitation">Cybercriminal groups actively exploiting ‘catastrophic’ ScreenConnect bug</a> (The Record)</p><p><a href="https://www.datacenterdynamics.com/en/news/att-services-resume-company-blames-incorrect-process/">AT&amp;T services resume, company blames "incorrect process"</a> (Data Center Dynamics)</p><p><a href="https://www.securityweek.com/230k-individuals-impacted-by-data-breach-at-australian-telco-tangerine/">230k Individuals Impacted by Data Breach at Australian Telco Tangerine </a>(SecurityWeek)</p><p><a href="https://industrialcyber.co/news/eu-releases-comprehensive-risk-assessment-report-on-cybersecurity-resilience-of-communication-networks/">EU releases comprehensive risk assessment report on cybersecurity, resilience of communication networks</a> (Industrial Cyber)</p><p><a href="https://www.securityweek.com/microsoft-releases-red-teaming-tool-for-generative-ai/">Microsoft Releases Red Teaming Tool for Generative AI</a> (SecurityWeek)</p><p><a href="https://gbhackers.com/new-rhadamanthys-infostealer/">New Infostealer Malware Attacking Oil and Gas Industry</a> (GB Hackers on Security)</p><p><a href="https://techcrunch.com/2024/02/22/unitedhealth-change-healthcare-hacked-nation-state-outage/">UnitedHealth says Change Healthcare hacked by nation state, as US pharmacy outages drag on</a> (TechCrunch)</p><p><a href="https://www.malwarebytes.com/blog/news/2024/02/vibrator-virus-steals-your-personal-information">Vibrator virus steals your personal information</a> (Malwarebytes)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1464</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ec83fa56-b95d-11ee-adc6-032d1d02a0c7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7939064540.mp3?updated=1708721375" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AT&amp;T outage leaves major cities offline.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2009/notes</link>
      <description>AT&amp;T experiences a major outage. The LockBit takedown continues. An updated Doppelgänger is spreading misinformation. A roundup of critical infrastructure initiatives. Toshiba and Orange make a quantum leap. An eyecare provider hack comes into focus. A phony iphone repair scheme leads to convictions. In our Learning Layer segment, Sam Meisenberg shares the latest learning science research. And we are shocked - shocked! - to discover that phone chargers can be used to attack our devices. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On this month’s Learning Layer segment, host Sam Meisenberg of N2K discusses learning science research. Sam breaks down research about quizzes and their impact on learner motivation and long term retention. Want to know more? Sam suggests you check out The Value of Using Tests in Education as Tools for Learning—Not Just for Assessment.

Selected Reading
AT&amp;T, Verizon and T-Mobile customers hit by widespread cellular outages in U.S. (NBC News)
US Offering $10M for LockBit Leaders as Law Enforcement Taunts Cybercriminals (SecurityWeek)
LockBit Group Prepped New Crypto-Locker Before Takedown (Gov Info Security)
Ukraine arrests father-son duo in Lockbit cybercrime bust (Reuters)
Russian Cyberwarfare campaign (ClearSky Cyber Security)
US Coast Guard issues cybersecurity directive for Chinese-made cranes after Biden's Executive Order (Industrial Cyber) 
US agencies release joint fact sheet to strengthen cybersecurity in water and wastewater systems (Industrial Cyber) 
E-ISAC 2023 report highlights cybersecurity triumphs and challenges in electricity sector (Industrial Cyber) 
Toshiba and Orange test quantum encryption on traditional network (Computer Weekly)
Hack at Services Firm Hits 2.4 Million Eye Doctor Patients (Gov Info Security)
Chinese Duo Found Guilty of $3m Apple Fraud Plot (Infosecurity Magazine)
VoltSchemer attacks use wireless chargers to inject voice commands, fry phones (BleepingComputer) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 22 Feb 2024 21:10:00 -0000</pubDate>
      <itunes:title>AT&amp;T outage leaves major cities offline.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2009</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>AT&amp;T experiences a major outage. The LockBit takedown continues. An updated Doppelgänger is spreading misinformation. A roundup of critical infrastructure initiatives. Toshiba and Orange make a quantum leap. An eyecare provider hack comes into focus. A phony iphone repair scheme leads to convictions. In our Learning Layer segment, Sam Meisenberg shares the latest learning science research. And we are shocked - shocked! - to discover that phone chargers can be used to attack our devices. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On this month’s Learning Layer segment, host Sam Meisenberg of N2K discusses learning science research. Sam breaks down research about quizzes and their impact on learner motivation and long term retention. Want to know more? Sam suggests you check out The Value of Using Tests in Education as Tools for Learning—Not Just for Assessment.

Selected Reading
AT&amp;T, Verizon and T-Mobile customers hit by widespread cellular outages in U.S. (NBC News)
US Offering $10M for LockBit Leaders as Law Enforcement Taunts Cybercriminals (SecurityWeek)
LockBit Group Prepped New Crypto-Locker Before Takedown (Gov Info Security)
Ukraine arrests father-son duo in Lockbit cybercrime bust (Reuters)
Russian Cyberwarfare campaign (ClearSky Cyber Security)
US Coast Guard issues cybersecurity directive for Chinese-made cranes after Biden's Executive Order (Industrial Cyber) 
US agencies release joint fact sheet to strengthen cybersecurity in water and wastewater systems (Industrial Cyber) 
E-ISAC 2023 report highlights cybersecurity triumphs and challenges in electricity sector (Industrial Cyber) 
Toshiba and Orange test quantum encryption on traditional network (Computer Weekly)
Hack at Services Firm Hits 2.4 Million Eye Doctor Patients (Gov Info Security)
Chinese Duo Found Guilty of $3m Apple Fraud Plot (Infosecurity Magazine)
VoltSchemer attacks use wireless chargers to inject voice commands, fry phones (BleepingComputer) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>AT&amp;T experiences a major outage. The LockBit takedown continues. An updated Doppelgänger is spreading misinformation. A roundup of critical infrastructure initiatives. Toshiba and Orange make a quantum leap. An eyecare provider hack comes into focus. A phony iphone repair scheme leads to convictions. In our Learning Layer segment, Sam Meisenberg shares the latest learning science research. And we are shocked - shocked! - to discover that phone chargers can be used to attack our devices. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On this month’s Learning Layer segment, host <a href="https://www.linkedin.com/in/sam-meisenberg/">Sam Meisenberg</a> of <a href="https://www.n2k.com/">N2K</a> discusses learning science research. Sam breaks down research about quizzes and their impact on learner motivation and long term retention. Want to know more? Sam suggests you check out <a href="https://link.springer.com/article/10.1007/s10648-023-09808-3">The Value of Using Tests in Education as Tools for Learning—Not Just for Assessment</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.nbcnews.com/news/us-news/t-verizon-t-mobile-customers-hit-widespread-cellular-outages-us-rcna139938">AT&amp;T, Verizon and T-Mobile customers hit by widespread cellular outages in U.S.</a> (NBC News)</p><p><a href="https://www.securityweek.com/us-offering-10m-for-lockbit-leaders-as-law-enforcement-taunts-cybercriminals/">US Offering $10M for LockBit Leaders as Law Enforcement Taunts Cybercriminals </a>(SecurityWeek)</p><p><a href="https://www.govinfosecurity.com/lockbit-group-prepped-new-crypto-locker-before-takedown-a-24422">LockBit Group Prepped New Crypto-Locker Before Takedown</a> (Gov Info Security)</p><p><a href="https://www.reuters.com/technology/cybersecurity/ukraine-arrests-father-son-duo-lockbit-cybercrime-bust-2024-02-21/">Ukraine arrests father-son duo in Lockbit cybercrime bust </a>(Reuters)</p><p><a href="https://www.clearskysec.com/dg/">Russian Cyberwarfare campaign</a> (ClearSky Cyber Security)</p><p><a href="https://industrialcyber.co/regulation-standards-and-compliance/us-coast-guard-issues-cybersecurity-directive-for-chinese-made-cranes-after-bidens-executive-order/">US Coast Guard issues cybersecurity directive for Chinese-made cranes after Biden's Executive Order</a> (Industrial Cyber) </p><p><a href="https://industrialcyber.co/utilities-energy-power-water-waste/us-agencies-release-joint-fact-sheet-to-strengthen-cybersecurity-in-water-and-wastewater-systems/">US agencies release joint fact sheet to strengthen cybersecurity in water and wastewater systems</a> (Industrial Cyber) </p><p><a href="https://industrialcyber.co/reports/e-isac-2023-report-highlights-cybersecurity-triumphs-and-challenges-in-electricity-sector/">E-ISAC 2023 report highlights cybersecurity triumphs and challenges in electricity sector</a> (Industrial Cyber) </p><p><a href="https://www.computerweekly.com/news/366571014/Toshiba-and-Orange-test-quantum-encryption-on-traditional-network">Toshiba and Orange test quantum encryption on traditional network</a> (Computer Weekly)</p><p><a href="https://www.govinfosecurity.com/hack-at-services-firm-hits-24-million-eye-doctor-patients-a-24418">Hack at Services Firm Hits 2.4 Million Eye Doctor Patients</a> (Gov Info Security)</p><p><a href="https://www.infosecurity-magazine.com/news/chinese-duo-guilty-3m-apple-fraud/">Chinese Duo Found Guilty of $3m Apple Fraud Plot </a>(Infosecurity Magazine)</p><p><a href="https://www.bleepingcomputer.com/news/security/voltschemer-attacks-use-wireless-chargers-to-inject-voice-commands-fry-phones/">VoltSchemer attacks use wireless chargers to inject voice commands, fry phones</a> (BleepingComputer) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1458</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ec47b7c6-b95d-11ee-adc6-bb7d6947ca7c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1929383384.mp3?updated=1708630857" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Anchoring security for US ports. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2008/notes</link>
      <description>President Biden to sign EO to bolster maritime port security. Apple announces post-quantum encryption for iMessage. Malwarebytes examines the i-Soon data leak. Law enforcement airs LockBit’s dirty laundry. Varonis highlights vulnerabilities affecting Salesforce platforms. An appeals court overturns a $1 billion piracy verdict. NSA’s Rob Joyce announces his retirement. Anne Neuberger chats with WIRED.  A leading staffing firm finds its data for sale on the dark web. In our sponsored Industry Voices segment, Navneet Singh, VP of Marketing Network Security at Palo Alto Networks, discusses the transition to the cloud and shares some examples from healthcare. Hackers and hobbyists push back on the proposed Flipper Zero ban. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, Navneet Singh, VP of Marketing Network Security at Palo Alto Networks, discusses the transition to the cloud and shares some examples in healthcare.

Selected Reading
Biden to sign executive order to give Coast Guard added authority over maritime cyber threats (CyberScoop)
Apple Announces 'Groundbreaking' New Security Protocol for iMessage (MacRumors)
A first analysis of the i-Soon data leak (Malwarebytes)
Cops turn LockBit ransomware gang's countdown timers against them (The Register)
Security Vulnerabilities in Apex Code Could Leak Salesforce Data (Varonis)
Court blocks $1 billion copyright ruling that punished ISP for its users’ piracy (Ars Technica)
NSA cyber director to step down after 34 years of service (Nextgov/FCW)
Anne Neuberger, a Top White House Cyber Official, Is Staying Surprisingly Optimistic (WIRED)
Critical flaw found in deprecated VMware EAP. Uninstall it immediately (Security Affairs)
Hackers Claim Data Breach at Staffing Giant Robert Half, Sell Sensitive Data (HackRead)
Save Flipper (Save Flipper)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 21 Feb 2024 21:10:00 -0000</pubDate>
      <itunes:title>Anchoring security for US ports. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2008</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>President Biden to sign EO to bolster maritime port security. Apple announces post-quantum encryption for iMessage. Malwarebytes examines the i-Soon data leak. Law enforcement airs LockBit’s dirty laundry. Varonis highlights vulnerabilities affecting Salesforce platforms. An appeals court overturns a $1 billion piracy verdict. NSA’s Rob Joyce announces his retirement. Anne Neuberger chats with WIRED.  A leading staffing firm finds its data for sale on the dark web. In our sponsored Industry Voices segment, Navneet Singh, VP of Marketing Network Security at Palo Alto Networks, discusses the transition to the cloud and shares some examples from healthcare. Hackers and hobbyists push back on the proposed Flipper Zero ban. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, Navneet Singh, VP of Marketing Network Security at Palo Alto Networks, discusses the transition to the cloud and shares some examples in healthcare.

Selected Reading
Biden to sign executive order to give Coast Guard added authority over maritime cyber threats (CyberScoop)
Apple Announces 'Groundbreaking' New Security Protocol for iMessage (MacRumors)
A first analysis of the i-Soon data leak (Malwarebytes)
Cops turn LockBit ransomware gang's countdown timers against them (The Register)
Security Vulnerabilities in Apex Code Could Leak Salesforce Data (Varonis)
Court blocks $1 billion copyright ruling that punished ISP for its users’ piracy (Ars Technica)
NSA cyber director to step down after 34 years of service (Nextgov/FCW)
Anne Neuberger, a Top White House Cyber Official, Is Staying Surprisingly Optimistic (WIRED)
Critical flaw found in deprecated VMware EAP. Uninstall it immediately (Security Affairs)
Hackers Claim Data Breach at Staffing Giant Robert Half, Sell Sensitive Data (HackRead)
Save Flipper (Save Flipper)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>President Biden to sign EO to bolster maritime port security. Apple announces post-quantum encryption for iMessage. Malwarebytes examines the i-Soon data leak. Law enforcement airs LockBit’s dirty laundry. Varonis highlights vulnerabilities affecting Salesforce platforms. An appeals court overturns a $1 billion piracy verdict. NSA’s Rob Joyce announces his retirement. Anne Neuberger chats with WIRED.  A leading staffing firm finds its data for sale on the dark web. In our sponsored Industry Voices segment, Navneet Singh, VP of Marketing Network Security at Palo Alto Networks, discusses the transition to the cloud and shares some examples from healthcare. Hackers and hobbyists push back on the proposed Flipper Zero ban. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Voices segment, <a href="https://www.linkedin.com/in/nasingh/">Navneet Singh</a>, VP of Marketing Network Security at <a href="http://paloaltonetworks.com/networksecurityplatform">Palo Alto Networks</a>, discusses the transition to the cloud and shares some examples in healthcare.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://cyberscoop.com/biden-executive-order-coast-guard-cyber/">Biden to sign executive order to give Coast Guard added authority over maritime cyber threats</a> (CyberScoop)</p><p><a href="https://www.macrumors.com/2024/02/21/apple-announces-imessage-security-upgrade/">Apple Announces 'Groundbreaking' New Security Protocol for iMessage </a>(MacRumors)</p><p><a href="https://www.malwarebytes.com/blog/news/2024/02/a-first-analysis-of-the-i-soon-data-leak">A first analysis of the i-Soon data leak </a>(Malwarebytes)</p><p><a href="https://www.theregister.com/2024/02/20/nca_lockbit_takedown/">Cops turn LockBit ransomware gang's countdown timers against them </a>(The Register)</p><p><a href="https://www.varonis.com/blog/apex-code-vulnerabilities">Security Vulnerabilities in Apex Code Could Leak Salesforce Data</a> (Varonis)</p><p><a href="https://arstechnica.com/tech-policy/2024/02/court-blocks-1-billion-copyright-ruling-that-punished-isp-for-its-users-piracy/">Court blocks $1 billion copyright ruling that punished ISP for its users’ piracy</a> (Ars Technica)</p><p><a href="https://www.nextgov.com/people/2024/02/nsa-cyber-director-step-down-after-34-years-service/394304/">NSA cyber director to step down after 34 years of service </a>(Nextgov/FCW)</p><p><a href="https://www.wired.com/story/anne-neuberger-cybersecurity-q-and-a/">Anne Neuberger, a Top White House Cyber Official, Is Staying Surprisingly Optimistic </a>(WIRED)</p><p><a href="https://securityaffairs.com/159441/security/critical-flaw-deprecated-vmware-eap.html">Critical flaw found in deprecated VMware EAP. Uninstall it immediately</a> (Security Affairs)</p><p><a href="https://www.hackread.com/hackers-claim-robert-half-data-breach/">Hackers Claim Data Breach at Staffing Giant Robert Half, Sell Sensitive Data</a> (HackRead)</p><p><a href="https://saveflipper.ca/">Save Flipper</a> (Save Flipper)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1842</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ec0b5a38-b95d-11ee-adc6-8f83adde73a0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8626894392.mp3?updated=1708545673" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The reign of digital terror ends. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2007/notes</link>
      <description>Operation Cronos leaves LockBit operations on borrowed time. An alleged leak reveals internal operations from the Chinese Ministry of Public Security. An Israeli airline thwarts communications hijacking attempts. The alleged Raccoon Infostealer operator has been extradited to the US. ConnectWise patches critical vulnerabilities. Schneider Electric confirms a Cactus ransomware attack. Alleged Maryland money launderers face indictments. Russian hackers target media outlets in Ukraine. Our guest is Tomislav Pericin, Chief Software Architect at Reversing Labs , on the rise of software supply chain attacks. and Tinder hopes to reel in the catfish.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest is Tomislav Pericin, ReversingLabs Chief Software Architect, talking about the rise of software supply chain attacks. Learn more in their 2024 State of Software Supply Chain Security Report. 

Selected Reading
Police arrests LockBit ransomware members, release decryptor in global crackdown (BleepingComputer)
U.S. and U.K. Disrupt LockBit Ransomware Variant (US Justice Department)
Chinese Ministry Of Public Security Breach: Data On GitHub (The Cyber Express)
Massive “i-Soon” leak reveals Chinese firm's hacking tools, targets, including NATO (The Stack)
I-S00N Leaked Chinese foreign government infiltration intel on Github : r/cybersecurity (Reddit)
Israeli Aircraft Survive “Cyber-Hijacking” Attempts (Infosecurity Magazine)
Raccoon Infostealer operator extradited to the United States (Malwarebytes)
Critical ConnectWise ScreenConnect vulnerabilities fixed, patch ASAP! (Help Net Security)
Schneider Electric confirms data was stolen in Cactus ransomware attack (IT Pro)
Maryland Busts $9.5 Million #BEC Money Laundering Ring (CyberCrime &amp; Doing Time)
Several Ukrainian media outlets attacked by Russian hackers (The Record)
Tinder Expands ID Checks Amid Rise in AI Scams, Dating Crimes (Bloomberg)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Feb 2024 21:10:00 -0000</pubDate>
      <itunes:title>The reign of digital terror ends. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2007</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Operation Cronos leaves LockBit operations on borrowed time. An alleged leak reveals internal operations from the Chinese Ministry of Public Security. An Israeli airline thwarts communications hijacking attempts. The alleged Raccoon Infostealer operator has been extradited to the US. ConnectWise patches critical vulnerabilities. Schneider Electric confirms a Cactus ransomware attack. Alleged Maryland money launderers face indictments. Russian hackers target media outlets in Ukraine. Our guest is Tomislav Pericin, Chief Software Architect at Reversing Labs , on the rise of software supply chain attacks. and Tinder hopes to reel in the catfish.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest is Tomislav Pericin, ReversingLabs Chief Software Architect, talking about the rise of software supply chain attacks. Learn more in their 2024 State of Software Supply Chain Security Report. 

Selected Reading
Police arrests LockBit ransomware members, release decryptor in global crackdown (BleepingComputer)
U.S. and U.K. Disrupt LockBit Ransomware Variant (US Justice Department)
Chinese Ministry Of Public Security Breach: Data On GitHub (The Cyber Express)
Massive “i-Soon” leak reveals Chinese firm's hacking tools, targets, including NATO (The Stack)
I-S00N Leaked Chinese foreign government infiltration intel on Github : r/cybersecurity (Reddit)
Israeli Aircraft Survive “Cyber-Hijacking” Attempts (Infosecurity Magazine)
Raccoon Infostealer operator extradited to the United States (Malwarebytes)
Critical ConnectWise ScreenConnect vulnerabilities fixed, patch ASAP! (Help Net Security)
Schneider Electric confirms data was stolen in Cactus ransomware attack (IT Pro)
Maryland Busts $9.5 Million #BEC Money Laundering Ring (CyberCrime &amp; Doing Time)
Several Ukrainian media outlets attacked by Russian hackers (The Record)
Tinder Expands ID Checks Amid Rise in AI Scams, Dating Crimes (Bloomberg)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Operation Cronos leaves LockBit operations on borrowed time. An alleged leak reveals internal operations from the Chinese Ministry of Public Security. An Israeli airline thwarts communications hijacking attempts. The alleged Raccoon Infostealer operator has been extradited to the US. ConnectWise patches critical vulnerabilities. Schneider Electric confirms a Cactus ransomware attack. Alleged Maryland money launderers face indictments. Russian hackers target media outlets in Ukraine. Our guest is Tomislav Pericin, Chief Software Architect at Reversing Labs , on the rise of software supply chain attacks. and Tinder hopes to reel in the catfish.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest is <a href="https://www.linkedin.com/in/tomislav-peri%C4%8Din-746064286/">Tomislav Pericin</a>, <a href="https://www.reversinglabs.com/">ReversingLabs</a> Chief Software Architect, talking about the rise of software supply chain attacks. Learn more in their <a href="https://www.reversinglabs.com/newsroom/press-releases/software-supply-chain-attacks-regulation-and-litigation-increase-as-barriers-to-entry-drop">2024 State of Software Supply Chain Security Report</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/police-arrests-lockbit-ransomware-members-release-decryptor-in-global-crackdown/">Police arrests LockBit ransomware members, release decryptor in global crackdown</a> (BleepingComputer)</p><p><a href="https://www.justice.gov/opa/pr/us-and-uk-disrupt-lockbit-ransomware-variant">U.S. and U.K. Disrupt LockBit Ransomware Variant</a> (US Justice Department)</p><p><a href="https://thecyberexpress.com/chinese-ministry-of-public-security-breach/">Chinese Ministry Of Public Security Breach: Data On GitHub</a> (The Cyber Express)</p><p><a href="https://www.thestack.technology/i-soon-leaks-chinese-hacker-company/">Massive “i-Soon” leak reveals Chinese firm's hacking tools, targets, including NATO</a> (The Stack)</p><p><a href="https://www.reddit.com/r/cybersecurity/comments/1av4yp9/is00n_leaked_chinese_foreign_government/">I-S00N Leaked Chinese foreign government infiltration intel on Github : r/cybersecurity</a> (Reddit)</p><p><a href="https://www.infosecurity-magazine.com/news/israeli-aircraft-survive/">Israeli Aircraft Survive “Cyber-Hijacking” Attempts </a>(Infosecurity Magazine)</p><p><a href="https://www.malwarebytes.com/blog/news/2024/02/raccoon-infostealer-operator-extradited-to-the-united-states">Raccoon Infostealer operator extradited to the United States</a> (Malwarebytes)</p><p><a href="https://www.helpnetsecurity.com/2024/02/20/connectwise-screenconnect-vulnerabilities/">Critical ConnectWise ScreenConnect vulnerabilities fixed, patch ASAP! </a>(Help Net Security)</p><p><a href="https://www.itpro.com/security/ransomware/schneider-electric-confirms-data-was-stolen-in-cactus-ransomware-attack">Schneider Electric confirms data was stolen in Cactus ransomware attack </a>(IT Pro)</p><p><a href="https://garwarner.blogspot.com/2024/02/maryland-busts-95-million-bec-money.html">Maryland Busts $9.5 Million #BEC Money Laundering Ring</a> (CyberCrime &amp; Doing Time)</p><p><a href="https://therecord.media/ukrainian-news-outlets-attacked-by-russian-hackers">Several Ukrainian media outlets attacked by Russian hackers</a> (The Record)</p><p><a href="https://www.bloomberg.com/news/articles/2024-02-20/tinder-expands-id-checks-amid-rise-in-ai-scams-dating-crimes">Tinder Expands ID Checks Amid Rise in AI Scams, Dating Crimes</a> (Bloomberg)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1448</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ebce70dc-b95d-11ee-adc6-9f425cba63fd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4472143416.mp3?updated=1708460068" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AWS in Orbit: Leveraging generative AI to do more at the rugged space edge with AWS. [T-Minus]</title>
      <link>https://space.n2k.com/aws</link>
      <description>Kathy O’Donnell is the leader of Space Solutions Architecture for AWS Aerospace and Satellite. In this extended conversation, we dive into how AWS is supporting generative AI in the space domain. She walks us through some incredible case studies with AWS customers who are using generative AI and space technologies to improve life here on Earth.
Learn more about generative AI use cases for space at AWS re:Invent.
AWS in Orbit is a podcast collaboration between N2K Networks and AWS to offer listeners an in-depth look at the transformative intersection of cloud computing, space technologies, and generative AI. You can learn more about AWS in Orbit at space.n2k.com/aws.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.
Selected Reading
AWS successfully runs AWS compute and machine learning services on an orbiting satellite in a first-of-its kind space experiment | AWS Public Sector Blog
AWS re:Invent 2022 - Accelerate Geospatial ML with Amazon SageMaker (AER204) 
AWS re:Invent 2023
Audience Survey
We want to hear from you! Please complete our 4 question survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 19 Feb 2024 16:40:00 -0000</pubDate>
      <itunes:title>AWS in Orbit: Leveraging generative AI to do more at the rugged space edge with AWS. [T-Minus]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/d3cd7ee6-ccfa-11ee-b96e-73dad6661c41/image/67b973.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Kathy O’Donnell is the leader of Space Solutions Architecture at AWS. We dive into case studies with companies using generative AI and space tech to improve life here on Earth. </itunes:subtitle>
      <itunes:summary>Kathy O’Donnell is the leader of Space Solutions Architecture for AWS Aerospace and Satellite. In this extended conversation, we dive into how AWS is supporting generative AI in the space domain. She walks us through some incredible case studies with AWS customers who are using generative AI and space technologies to improve life here on Earth.
Learn more about generative AI use cases for space at AWS re:Invent.
AWS in Orbit is a podcast collaboration between N2K Networks and AWS to offer listeners an in-depth look at the transformative intersection of cloud computing, space technologies, and generative AI. You can learn more about AWS in Orbit at space.n2k.com/aws.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.
Selected Reading
AWS successfully runs AWS compute and machine learning services on an orbiting satellite in a first-of-its kind space experiment | AWS Public Sector Blog
AWS re:Invent 2022 - Accelerate Geospatial ML with Amazon SageMaker (AER204) 
AWS re:Invent 2023
Audience Survey
We want to hear from you! Please complete our 4 question survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/klodonnell/">Kathy O’Donnell</a> is the leader of Space Solutions Architecture for <a href="https://aws.amazon.com/aerospace-and-satellite/?trk=929a1384-6fbc-4ad7-9daf-d38d009b6a44&amp;sc_channel=el">AWS Aerospace and Satellite</a>. In this extended conversation, we dive into how AWS is supporting generative AI in the space domain. She walks us through some incredible case studies with AWS customers who are using generative AI and space technologies to improve life here on Earth.</p><p>Learn more about generative AI use cases for space at <a href="https://reinvent.awsevents.com/">AWS re:Invent</a>.</p><p>AWS in Orbit is a podcast collaboration between N2K Networks and AWS to offer listeners an in-depth look at the transformative intersection of cloud computing, space technologies, and generative AI. You can learn more about AWS in Orbit at <a href="https://space.n2k.com/aws">space.n2k.com/aws</a>.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our weekly intelligence roundup, <a href="https://space.n2k.com/newsletters/signals-and-space"><em>Signals and Space</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow T-Minus on <a href="https://www.linkedin.com/company/n2k-space/">LinkedIn</a> and <a href="https://www.instagram.com/n2kspace/">Instagram</a>.</p><h2>Selected Reading</h2><p><a href="https://aws.amazon.com/blogs/publicsector/aws-successfully-runs-aws-compute-machine-learning-services-orbiting-satellite-first-space-experiment/">AWS successfully runs AWS compute and machine learning services on an orbiting satellite in a first-of-its kind space experiment | AWS Public Sector Blog</a></p><p><a href="https://www.youtube.com/watch?v=K3upsR51p9A">AWS re:Invent 2022 - Accelerate Geospatial ML with Amazon SageMaker (AER204)</a> </p><p><a href="https://reinvent.awsevents.com/">AWS re:Invent 2023</a></p><h2>Audience Survey</h2><p>We want to hear from you! Please complete our <a href="https://www.surveymonkey.com/r/BL5NFPW">4 question survey</a>. It’ll help us get better and deliver you the most mission-critical space intel every day.</p><h2>Want to join us for an interview?</h2><p>Please send your pitch to <a href="mailto:space-editor@n2k.com">space-editor@n2k.com</a> and include your name, affiliation, and topic proposal.</p><p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2540</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d3cd7ee6-ccfa-11ee-b96e-73dad6661c41]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1061554134.mp3?updated=1712266881" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What’s a CNAPP: Cloud-Native Application Protection Platform? [CyberWire-X]</title>
      <link>https://thecyberwire.com/podcasts/cyberwire-x/49/notes</link>
      <description>In this episode of CyberWire-X, N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by Tim Miller, Technical Marketing Engineer for Panoptica, Cisco's Cloud Application Security solution, (Panoptica is the result of Cisco's incubation engine (Outshift) for new products and markets), and Kevin Ford, Esri’s CISO. They discuss the complexity reduction need that Cloud-Native Application Protection Platforms (CNAPPs) provide. Outshift by Cisco is our CyberWire-X episode sponsor.
To learn more about Cloud-Native Application Protection Platforms, check out Panoptica’s website at https://panoptica.app and consider attending the Cisco Live EMEA in Amsterdam, February 5-8, 2024.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 19 Feb 2024 06:00:00 -0000</pubDate>
      <itunes:title>What’s a CNAPP: Cloud-Native Application Protection Platform? [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>49</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode of CyberWire-X, N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by Tim Miller, Technical Marketing Engineer for Panoptica, Cisco's Cloud Application Security solution, (Panoptica is the result of Cisco's incubation engine (Outshift) for new products and markets), and Kevin Ford, Esri’s CISO. They discuss the complexity reduction need that Cloud-Native Application Protection Platforms (CNAPPs) provide. Outshift by Cisco is our CyberWire-X episode sponsor.
To learn more about Cloud-Native Application Protection Platforms, check out Panoptica’s website at https://panoptica.app and consider attending the Cisco Live EMEA in Amsterdam, February 5-8, 2024.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of CyberWire-X, N2K’s CSO, Chief Analyst, and Senior Fellow, <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a>, is joined by <a href="https://www.linkedin.com/in/timothyemiller/">Tim Miller</a>, Technical Marketing Engineer for Panoptica, Cisco's Cloud Application Security solution, (Panoptica is the result of Cisco's incubation engine (Outshift) for new products and markets), and <a href="https://www.linkedin.com/in/kevinfordcs/">Kevin Ford</a>, Esri’s CISO. They discuss the complexity reduction need that Cloud-Native Application Protection Platforms (CNAPPs) provide. <a href="https://outshift.cisco.com/">Outshift by Cisco</a> is our CyberWire-X episode sponsor.</p><p>To learn more about Cloud-Native Application Protection Platforms, check out Panoptica’s website at <a href="https://panoptica.app">https://panoptica.app</a> and consider attending the <a href="https://outshift.cisco.com/events/cleu24">Cisco Live EMEA in Amsterdam, February 5-8, 2024.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1932</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[514f767c-ccfa-11ee-85db-e3e49a4fb3f5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8093521844.mp3?updated=1706048877" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Dominique Shelton Leipzig: No matter the statistics, even if against the odds, focus on what you want. [Legal] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/8/notes</link>
      <description>Privacy and data security lawyer, Dominique Shelton Leipzig shares that she has always wanted to be a lawyer, ever since she was a little girl. She talks about what her role is with clients in protecting and managing their data, sometimes adhering to up to 134 different data protection laws for global companies. Learn that not a lot has changed for an African-American woman partner at an Amlaw 100 firm as far as diversity during Dominique's career, and how Dominique suggests young lawyers should address those odds. Our thanks to Dominque for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 18 Feb 2024 08:00:00 -0000</pubDate>
      <itunes:title>Encore: Dominique Shelton Leipzig: No matter the statistics, even if against the odds, focus on what you want. [Legal] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Privacy and data security lawyer, Dominique Shelton Leipzig shares that she has always wanted to be a lawyer, ever since she was a little girl. She talks about what her role is with clients in protecting and managing their data, sometimes adhering to up to 134 different data protection laws for global companies. Learn that not a lot has changed for an African-American woman partner at an Amlaw 100 firm as far as diversity during Dominique's career, and how Dominique suggests young lawyers should address those odds. Our thanks to Dominque for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Privacy and data security lawyer, Dominique Shelton Leipzig shares that she has always wanted to be a lawyer, ever since she was a little girl. She talks about what her role is with clients in protecting and managing their data, sometimes adhering to up to 134 different data protection laws for global companies. Learn that not a lot has changed for an African-American woman partner at an Amlaw 100 firm as far as diversity during Dominique's career, and how Dominique suggests young lawyers should address those odds. Our thanks to Dominque for sharing her story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[37c9b2da-ccf0-11ee-9b0e-278b2f3c1920]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9406036420.mp3?updated=1708104510" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hackers come hopping back. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/317/notes</link>
      <description>Ori David from Akamai is sharing their research "Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal." FritzFrog takes advantage of the fact that only internet facing applications were prioritized for Log4Shell patching and targets internal hosts, meaning that a breach of any asset in the network by FritzFrog can expose unpatched internal assets to exploitation. 
The research states "FritzFrog has traditionally hopped around by using SSH brute force, and has successfully compromised thousands of targets over the years as a result." Over the years Akamai has seen more than 20,000 FritzFrog attacks, and 1,500+ victims.
The research can be found here:
Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Feb 2024 08:00:00 -0000</pubDate>
      <itunes:title>Hackers come hopping back. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>317</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ori David from Akamai is sharing their research "Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal." FritzFrog takes advantage of the fact that only internet facing applications were prioritized for Log4Shell patching and targets internal hosts, meaning that a breach of any asset in the network by FritzFrog can expose unpatched internal assets to exploitation. 
The research states "FritzFrog has traditionally hopped around by using SSH brute force, and has successfully compromised thousands of targets over the years as a result." Over the years Akamai has seen more than 20,000 FritzFrog attacks, and 1,500+ victims.
The research can be found here:
Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ori David from Akamai is sharing their research "Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal." FritzFrog takes advantage of the fact that only internet facing applications were prioritized for Log4Shell patching and targets internal hosts, meaning that a breach of any asset in the network by FritzFrog can expose unpatched internal assets to exploitation. </p><p>The research states "FritzFrog has traditionally hopped around by using SSH brute force, and has successfully compromised thousands of targets over the years as a result." Over the years Akamai has seen more than 20,000 FritzFrog attacks, and 1,500+ victims.</p><p>The research can be found here:</p><ul><li><a href="https://www.akamai.com/blog/security-research/fritzfrog-botnet-new-capabilities-log4shell">Frog4Shell — FritzFrog Botnet Adds One-Days to Its Arsenal</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1096</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c2de8270-ccef-11ee-a299-f3d1edafefe3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6067710334.mp3?updated=1708097659" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FBI initiates router revolution.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2006/notes</link>
      <description>The FBI kicks Moobot out of small business routers. Sensitive data has been stolen from a state government network. AMC proposes a multi-million-dollar settlement after improperly sharing subscriber’s viewing habits. The U.S. targets an Iranian military ship in the Red Sea with a cyberattack. Lawmakers propose transparency in the use of algorithms in criminal trials. CERT-EU highlights a spear phishing spike. An infamous Zeus and IcedID operator pleads guilty. Our guests are Dr. Josh Brunty, Head Coach, and Brad Wolfenden, Program Director, of US Cyber Games join us to share the details of how their 2024 season is shaping up. And AI comes to video.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Dr. Josh Brunty, Head Coach, and Brad Wolfenden, Program Director, of US Cyber Games join us to share the details of how the 2024 season is shaping up.

Selected Reading
US disrupts Russian hacking campaign that infiltrated home, small business routers: DOJ (ABC News) 
U.S. State Government Network Hacked Via Former Employee Account (Cyber Security News)
CISA Urges Patching of Cisco ASA Flaw Exploited in Ransomware Attacks (SecurityWeek)
AMC to pay $8M for allegedly violating 1988 law with use of Meta Pixel (Ars Technica)
U.S. conducted cyberattack on suspected Iranian spy ship (NBC News)
New bill would let defendants inspect algorithms used against them in court (The Verge)
Hackers Exploit EU Agenda in Spear Phishing Campaigns (Infosecurity Magazine)
Ukrainian Hacker Pleads Guilty for Leading Zeus &amp; IcedID Malware Attacks (GBHackers on security)
OpenAI introduces Sora, its text-to-video AI model  (The Verge) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 16 Feb 2024 21:10:00 -0000</pubDate>
      <itunes:title>FBI initiates router revolution.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2006</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The FBI kicks Moobot out of small business routers. Sensitive data has been stolen from a state government network. AMC proposes a multi-million-dollar settlement after improperly sharing subscriber’s viewing habits. The U.S. targets an Iranian military ship in the Red Sea with a cyberattack. Lawmakers propose transparency in the use of algorithms in criminal trials. CERT-EU highlights a spear phishing spike. An infamous Zeus and IcedID operator pleads guilty. Our guests are Dr. Josh Brunty, Head Coach, and Brad Wolfenden, Program Director, of US Cyber Games join us to share the details of how their 2024 season is shaping up. And AI comes to video.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Dr. Josh Brunty, Head Coach, and Brad Wolfenden, Program Director, of US Cyber Games join us to share the details of how the 2024 season is shaping up.

Selected Reading
US disrupts Russian hacking campaign that infiltrated home, small business routers: DOJ (ABC News) 
U.S. State Government Network Hacked Via Former Employee Account (Cyber Security News)
CISA Urges Patching of Cisco ASA Flaw Exploited in Ransomware Attacks (SecurityWeek)
AMC to pay $8M for allegedly violating 1988 law with use of Meta Pixel (Ars Technica)
U.S. conducted cyberattack on suspected Iranian spy ship (NBC News)
New bill would let defendants inspect algorithms used against them in court (The Verge)
Hackers Exploit EU Agenda in Spear Phishing Campaigns (Infosecurity Magazine)
Ukrainian Hacker Pleads Guilty for Leading Zeus &amp; IcedID Malware Attacks (GBHackers on security)
OpenAI introduces Sora, its text-to-video AI model  (The Verge) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FBI kicks Moobot out of small business routers. Sensitive data has been stolen from a state government network. AMC proposes a multi-million-dollar settlement after improperly sharing subscriber’s viewing habits. The U.S. targets an Iranian military ship in the Red Sea with a cyberattack. Lawmakers propose transparency in the use of algorithms in criminal trials. CERT-EU highlights a spear phishing spike. An infamous Zeus and IcedID operator pleads guilty. Our guests are Dr. Josh Brunty, Head Coach, and Brad Wolfenden, Program Director, of US Cyber Games join us to share the details of how their 2024 season is shaping up. And AI comes to video.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/joshbrunty/">Dr. Josh Brunty</a>, Head Coach, and <a href="https://www.linkedin.com/in/bradleywolfenden/">Brad Wolfenden</a>, Program Director, of <a href="https://www.uscybergames.com/">US Cyber Games</a> join us to share the details of how the 2024 season is shaping up.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://abcnews.go.com/Politics/us-disrupts-russian-hacking-campaign-infiltrated-home-small/story?id=107258976">US disrupts Russian hacking campaign that infiltrated home, small business routers: DOJ</a> (ABC News) </p><p><a href="https://cybersecuritynews.com/u-s-state-government-network-hacked/">U.S. State Government Network Hacked Via Former Employee Account</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/cisa-urges-patching-of-cisco-asa-flaw-exploited-in-ransomware-attacks/">CISA Urges Patching of Cisco ASA Flaw Exploited in Ransomware Attacks </a>(SecurityWeek)</p><p><a href="https://arstechnica.com/tech-policy/2024/02/amc-to-pay-8m-for-allegedly-violating-1988-law-with-use-of-meta-pixel/">AMC to pay $8M for allegedly violating 1988 law with use of Meta Pixel </a>(Ars Technica)</p><p><a href="https://www.nbcnews.com/news/investigations/us-conducted-cyberattack-suspected-iranian-spy-ship-rcna138638">U.S. conducted cyberattack on suspected Iranian spy ship</a> (NBC News)</p><p><a href="https://www.theverge.com/2024/2/15/24074214/justice-in-forensic-algorithms-act-democrats-mark-takano-dwight-evans">New bill would let defendants inspect algorithms used against them in court </a>(The Verge)</p><p><a href="https://www.infosecurity-magazine.com/news/hackers-exploit-eu-agenda-spear/">Hackers Exploit EU Agenda in Spear Phishing Campaigns </a>(Infosecurity Magazine)</p><p><a href="https://gbhackers.com/ukrainian-hacker-pleads-guilty/">Ukrainian Hacker Pleads Guilty for Leading Zeus &amp; IcedID Malware Attacks</a> (GBHackers on security)</p><p><a href="https://www.theverge.com/2024/2/15/24074151/openai-sora-text-to-video-ai">OpenAI introduces Sora, its text-to-video AI model</a> <a href="https://www.theverge.com/2024/2/15/24074214/justice-in-forensic-algorithms-act-democrats-mark-takano-dwight-evans"> </a>(The Verge) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><h2><br></h2><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1752</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8aa210c4-b95e-11ee-8cf8-a7e4a9f17f7c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2112213807.mp3?updated=1708114406" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An AI arms race.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2005/notes</link>
      <description>Microsoft highlights adversaries experiments with AI LLMs. A misconfiguration exposes a decades worth of emails. SentinelOne describes Kryptina ransomware as a service. The European Court of Human Rights rules against backdoors. Senator Wyden calls out a location data broker. GoldFactory steals facial scans to bypass bank security. The Glow fertility app exposes the data of twenty five million users. Qakbot returns. Our Guest Rob Boyce from Accenture talks about tailored extortion. And hacking the airport taxi line leads to prison. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Rob Boyce from Accenture talks about tailored extortion as actors continue to shift to pure data extortion, with old and new tactics.

Selected Reading
State-backed hackers are experimenting with OpenAI models (Cyberscoop)
Staying ahead of threat actors in the age of AI (Microsoft)
U.S. Internet Leaked Years of Internal, Customer Emails (Krebs on security)
Kryptina RaaS | From Underground Commodity to Open Source Threat  (SentinelOne)
Backdoors that let cops decrypt messages violate human rights, EU court says (Arstechnica)
A company tracked visits to 600 Planned Parenthood locations for anti-abortion ads, senator says (POLITICO)
Cybercriminals are stealing Face ID scans to break into mobile banking accounts (theregister)
Fertility tracker Glow fixes bug that exposed users’ personal data (TechCrunch)
New Qbot malware variant uses fake Adobe installer popup for evasion (bleepingcomputer)
Duo headed to prison for charging cabbies to skip JFK Airport line with Russian hackers' aid (nydailynews)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 15 Feb 2024 21:10:00 -0000</pubDate>
      <itunes:title>An AI arms race.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2005</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Microsoft highlights adversaries experiments with AI LLMs. A misconfiguration exposes a decades worth of emails. SentinelOne describes Kryptina ransomware as a service. The European Court of Human Rights rules against backdoors. Senator Wyden calls out a location data broker. GoldFactory steals facial scans to bypass bank security. The Glow fertility app exposes the data of twenty five million users. Qakbot returns. Our Guest Rob Boyce from Accenture talks about tailored extortion. And hacking the airport taxi line leads to prison. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Rob Boyce from Accenture talks about tailored extortion as actors continue to shift to pure data extortion, with old and new tactics.

Selected Reading
State-backed hackers are experimenting with OpenAI models (Cyberscoop)
Staying ahead of threat actors in the age of AI (Microsoft)
U.S. Internet Leaked Years of Internal, Customer Emails (Krebs on security)
Kryptina RaaS | From Underground Commodity to Open Source Threat  (SentinelOne)
Backdoors that let cops decrypt messages violate human rights, EU court says (Arstechnica)
A company tracked visits to 600 Planned Parenthood locations for anti-abortion ads, senator says (POLITICO)
Cybercriminals are stealing Face ID scans to break into mobile banking accounts (theregister)
Fertility tracker Glow fixes bug that exposed users’ personal data (TechCrunch)
New Qbot malware variant uses fake Adobe installer popup for evasion (bleepingcomputer)
Duo headed to prison for charging cabbies to skip JFK Airport line with Russian hackers' aid (nydailynews)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft highlights adversaries experiments with AI LLMs. A misconfiguration exposes a decades worth of emails. SentinelOne describes Kryptina ransomware as a service. The European Court of Human Rights rules against backdoors. Senator Wyden calls out a location data broker. GoldFactory steals facial scans to bypass bank security. The Glow fertility app exposes the data of twenty five million users. Qakbot returns. Our Guest Rob Boyce from Accenture talks about tailored extortion. And hacking the airport taxi line leads to prison. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/therobertjboyce/">Rob Boyce</a> from <a href="https://www.accenture.com/us-en">Accenture</a> talks about tailored extortion as actors continue to shift to pure data extortion, with old and new tactics.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://cyberscoop.com/openai-microsoft-apt-llm/">State-backed hackers are experimenting with OpenAI models </a>(Cyberscoop)</p><p><a href="https://www.microsoft.com/en-us/security/blog/2024/02/14/staying-ahead-of-threat-actors-in-the-age-of-ai/">Staying ahead of threat actors in the age of AI </a>(Microsoft)</p><p><a href="https://krebsonsecurity.com/2024/02/u-s-internet-leaked-years-of-internal-customer-emails/">U.S. Internet Leaked Years of Internal, Customer Emails </a>(Krebs on security)</p><p><a href="https://www.sentinelone.com/blog/kryptina-raas-from-underground-commodity-to-open-source-threat/">Kryptina RaaS | From Underground Commodity to Open Source Threat </a> (SentinelOne)</p><p><a href="https://arstechnica.com/tech-policy/2024/02/human-rights-court-takes-stand-against-weakening-of-end-to-end-encryption/">Backdoors that let cops decrypt messages violate human rights, EU court says</a> (Arstechnica)</p><p><a href="https://www.politico.com/news/2024/02/13/planned-parenthood-location-track-abortion-ads-00141172">A company tracked visits to 600 Planned Parenthood locations for anti-abortion ads, senator says</a> (POLITICO)</p><p><a href="https://www.theregister.com/2024/02/15/cybercriminals_stealing_face_id/">Cybercriminals are stealing Face ID scans to break into mobile banking accounts</a> (theregister)</p><p><a href="https://techcrunch.com/2024/02/13/fertility-tracker-glow-fixes-bugs-that-exposed-users-personal-data/">Fertility tracker Glow fixes bug that exposed users’ personal data</a> (TechCrunch)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-qbot-malware-variant-uses-fake-adobe-installer-popup-for-evasion/">New Qbot malware variant uses fake Adobe installer popup for evasion</a> (bleepingcomputer)</p><p><a href="https://www.nydailynews.com/2024/02/12/jfk-airport-cab-line-scam-daniel-abayev-peter-leyman/">Duo headed to prison for charging cabbies to skip JFK Airport line with Russian hackers' aid</a> (nydailynews)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1485</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eb10c12c-b95d-11ee-adc6-bf55b8c9a81e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6577808711.mp3?updated=1708027791" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>It’s always DNS, but that may just be FUD.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2004/notes</link>
      <description>It’s always DNS, but that may just be FUD. The DoD notifies victims of a cloud email server leak. New Jersey cops sue online data brokers. Crooks use WiFi jammers to thwart security systems. A copyright case against OpenAI is partially dismissed. Patch Tuesday includes two actively exploited zero days. CharmingCypress gathers political intelligence. Ann Johnson from Microsoft Security’s Afternoon Cyber Tea podcast talks with Frank Cilluffo, Director for Cyber and Critical Infrastructure Security at the McCrary Institute of Auburn University, about cyber and critical infrastructure. And beware Cupid’s misleading arrow.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Ann Johnson from Microsoft Security’s Afternoon Cyber Tea podcast talks with Frank Cilluffo, Director for Cyber and Critical Infrastructure Security at the McCrary Institute of Auburn University, about cyber and critical infrastructure. Check out the episode with the full conversation between Ann and Frank here. 

Selected Reading
KeyTrap DNS Attack Could Disable Large Parts of Internet: Researchers (SecurityWeek)
US military notifies 20,000 of data breach after cloud email leak (TechCrunch)
New Jersey law enforcement officers sue 118 data brokers for not removing personal info (The Record)
Minnesota burglars are using Wi-Fi jammers to disable home security systems (TechSpot)
Sarah Silverman’s lawsuit against OpenAI partially dismissed (The Verge)
Microsoft February 2024 Patch Tuesday fixes 2 zero-days, 73 flaws (BleepingComputer)
DarkMe Malware Targets Traders Using Microsoft SmartScreen Zero-Day Vulnerability (The Hacker News)
CharmingCypress Use Poisoned VPN Apps to Install Backdoor (Cyber Security News)
Beyond the Hype: Questioning FUD in Cybersecurity Marketing  (SecurityWeek)
Valentine's Day Scams Woo the Lonely-Hearted (Security Boulevard) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 14 Feb 2024 21:10:00 -0000</pubDate>
      <itunes:title>It’s always DNS, but that may just be FUD.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2004</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>It’s always DNS, but that may just be FUD. The DoD notifies victims of a cloud email server leak. New Jersey cops sue online data brokers. Crooks use WiFi jammers to thwart security systems. A copyright case against OpenAI is partially dismissed. Patch Tuesday includes two actively exploited zero days. CharmingCypress gathers political intelligence. Ann Johnson from Microsoft Security’s Afternoon Cyber Tea podcast talks with Frank Cilluffo, Director for Cyber and Critical Infrastructure Security at the McCrary Institute of Auburn University, about cyber and critical infrastructure. And beware Cupid’s misleading arrow.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Ann Johnson from Microsoft Security’s Afternoon Cyber Tea podcast talks with Frank Cilluffo, Director for Cyber and Critical Infrastructure Security at the McCrary Institute of Auburn University, about cyber and critical infrastructure. Check out the episode with the full conversation between Ann and Frank here. 

Selected Reading
KeyTrap DNS Attack Could Disable Large Parts of Internet: Researchers (SecurityWeek)
US military notifies 20,000 of data breach after cloud email leak (TechCrunch)
New Jersey law enforcement officers sue 118 data brokers for not removing personal info (The Record)
Minnesota burglars are using Wi-Fi jammers to disable home security systems (TechSpot)
Sarah Silverman’s lawsuit against OpenAI partially dismissed (The Verge)
Microsoft February 2024 Patch Tuesday fixes 2 zero-days, 73 flaws (BleepingComputer)
DarkMe Malware Targets Traders Using Microsoft SmartScreen Zero-Day Vulnerability (The Hacker News)
CharmingCypress Use Poisoned VPN Apps to Install Backdoor (Cyber Security News)
Beyond the Hype: Questioning FUD in Cybersecurity Marketing  (SecurityWeek)
Valentine's Day Scams Woo the Lonely-Hearted (Security Boulevard) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>It’s always DNS, but that may just be FUD. The DoD notifies victims of a cloud email server leak. New Jersey cops sue online data brokers. Crooks use WiFi jammers to thwart security systems. A copyright case against OpenAI is partially dismissed. Patch Tuesday includes two actively exploited zero days. CharmingCypress gathers political intelligence. Ann Johnson from Microsoft Security’s Afternoon Cyber Tea podcast talks with Frank Cilluffo, Director for Cyber and Critical Infrastructure Security at the McCrary Institute of Auburn University, about cyber and critical infrastructure. And beware Cupid’s misleading arrow.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/ann-johnsons/">Ann Johnson</a> from <a href="https://www.microsoft.com/en-us/security">Microsoft Security</a>’s <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea</a> podcast talks with <a href="https://www.linkedin.com/in/frank-cilluffo/">Frank Cilluffo</a>, Director for Cyber and Critical Infrastructure Security at the <a href="https://mccrary.auburn.edu/">McCrary Institute</a> of Auburn University, about cyber and critical infrastructure. Check out the episode with the full conversation between Ann and Frank <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea/90/notes">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/">KeyTrap DNS Attack Could Disable Large Parts of Internet: Researchers</a> (SecurityWeek)</p><p><a href="https://techcrunch.com/2024/02/14/department-defense-data-breach-microsoft-cloud-email/">US military notifies 20,000 of data breach after cloud email leak </a>(TechCrunch)</p><p><a href="https://therecord.media/new-jersey-law-enforcement-sues-data-brokers">New Jersey law enforcement officers sue 118 data brokers for not removing personal info</a> (The Record)</p><p><a href="https://www.techspot.com/news/101866-minnesota-burglars-using-wi-fi-jammers-disable-home.html">Minnesota burglars are using Wi-Fi jammers to disable home security systems</a> (TechSpot)</p><p><a href="https://www.theverge.com/2024/2/13/24072131/sarah-silverman-paul-tremblay-openai-chatgpt-copyright-lawsuit">Sarah Silverman’s lawsuit against OpenAI partially dismissed</a> (The Verge)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-february-2024-patch-tuesday-fixes-2-zero-days-73-flaws/">Microsoft February 2024 Patch Tuesday fixes 2 zero-days, 73 flaws</a> (BleepingComputer)</p><p><a href="https://thehackernews.com/2024/02/darkme-malware-targets-traders-using.html">DarkMe Malware Targets Traders Using Microsoft SmartScreen Zero-Day Vulnerability</a> (The Hacker News)</p><p><a href="https://cybersecuritynews.com/charmingcypress-poisoned-vpn-apps/">CharmingCypress Use Poisoned VPN Apps to Install Backdoor</a> (Cyber Security News)</p><p><a href="https://www.securityweek.com/beyond-the-hype-questioning-fud-in-cybersecurity-marketing/">Beyond the Hype: Questioning FUD in Cybersecurity Marketing </a> (SecurityWeek)</p><p><a href="https://securityboulevard.com/2024/02/valentines-day-scams-woo-the-lonely-hearted/">Valentine's Day Scams Woo the Lonely-Hearted</a> (Security Boulevard) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1391</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ead4bb0a-b95d-11ee-adc6-f74a9e4b37fa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5005974900.mp3?updated=1707940417" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing threats unleashed. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2003/notes</link>
      <description>Attackers lock up Azure accounts with MFA. Bank of America alerts customers to a third party data breach. Malicious cyber activity targets elections worldwide. CISA highlights a vulnerability in Roundcube Webmail. Lawmakers introduce a bipartisan bill to enhance healthcare cybersecurity. Siemens and Schneider Electric address multiple industrial vulnerabilities. Perception in tech gender parity still has a ways to go. Dave Bittner speaks with Guests Andrew Scott, Associate Director of China Operations at CISA, and Brett Leatherman, Section Chief for Cyber at the FBI, about Chinese threat actor Volt Typhoon. And the scourge of online obituary spam. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guests Andrew Scott, Associate Director of China Operations at CISA, and Brett Leatherman, Section Chief at FBI, discussing  PRC/Volt Typhoon advisory and living off the land guidance. Read the press release on “U.S. and International Partners Publish Cybersecurity Advisory on People’s Republic of China State-Sponsored Hacking of U.S. Critical Infrastructure.”

Selected Reading
Ongoing campaign compromises senior execs’ Azure accounts, locks them using MFA (Ars Technica) 
Bank of America warns customers of data breach after vendor hack (BleepingComputer)
Global Malicious Activity Targeting Elections is Skyrocketing (Security Affairs)
CISA Warns Of Active Attacks on Roundcube Webmail XSS Vulnerability (CISA)
Bipartisan Senate Bill Requires HHS to Bolster Cyber Efforts (Gov Info Security)
ICS Patch Tuesday: Siemens Addresses 270 Vulnerabilities (SecurityWeek) 
Four in five men in tech say women are treated equally, as women criticise ‘invisible challenges’ (Euronews)
The rise of obituary spam (The Verge) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Feb 2024 21:20:00 -0000</pubDate>
      <itunes:title>Phishing threats unleashed. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2003</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Attackers lock up Azure accounts with MFA. Bank of America alerts customers to a third party data breach. Malicious cyber activity targets elections worldwide. CISA highlights a vulnerability in Roundcube Webmail. Lawmakers introduce a bipartisan bill to enhance healthcare cybersecurity. Siemens and Schneider Electric address multiple industrial vulnerabilities. Perception in tech gender parity still has a ways to go. Dave Bittner speaks with Guests Andrew Scott, Associate Director of China Operations at CISA, and Brett Leatherman, Section Chief for Cyber at the FBI, about Chinese threat actor Volt Typhoon. And the scourge of online obituary spam. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guests Andrew Scott, Associate Director of China Operations at CISA, and Brett Leatherman, Section Chief at FBI, discussing  PRC/Volt Typhoon advisory and living off the land guidance. Read the press release on “U.S. and International Partners Publish Cybersecurity Advisory on People’s Republic of China State-Sponsored Hacking of U.S. Critical Infrastructure.”

Selected Reading
Ongoing campaign compromises senior execs’ Azure accounts, locks them using MFA (Ars Technica) 
Bank of America warns customers of data breach after vendor hack (BleepingComputer)
Global Malicious Activity Targeting Elections is Skyrocketing (Security Affairs)
CISA Warns Of Active Attacks on Roundcube Webmail XSS Vulnerability (CISA)
Bipartisan Senate Bill Requires HHS to Bolster Cyber Efforts (Gov Info Security)
ICS Patch Tuesday: Siemens Addresses 270 Vulnerabilities (SecurityWeek) 
Four in five men in tech say women are treated equally, as women criticise ‘invisible challenges’ (Euronews)
The rise of obituary spam (The Verge) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Attackers lock up Azure accounts with MFA. Bank of America alerts customers to a third party data breach. Malicious cyber activity targets elections worldwide. CISA highlights a vulnerability in Roundcube Webmail. Lawmakers introduce a bipartisan bill to enhance healthcare cybersecurity. Siemens and Schneider Electric address multiple industrial vulnerabilities. Perception in tech gender parity still has a ways to go. Dave Bittner speaks with Guests Andrew Scott, Associate Director of China Operations at CISA, and Brett Leatherman, Section Chief for Cyber at the FBI, about Chinese threat actor Volt Typhoon. And the scourge of online obituary spam. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guests <a href="https://www.linkedin.com/in/andrewcscott/">Andrew Scott</a>, Associate Director of China Operations at CISA, and <a href="https://www.linkedin.com/in/bleatherman/">Brett Leatherman</a>, Section Chief at FBI, discussing  PRC/Volt Typhoon advisory and living off the land guidance. Read the <a href="https://www.cisa.gov/news-events/news/us-and-international-partners-publish-cybersecurity-advisory-peoples-republic-china-state-sponsored">press release</a> on “U.S. and International Partners Publish Cybersecurity Advisory on People’s Republic of China State-Sponsored Hacking of U.S. Critical Infrastructure.”</p><p><br></p><h2>Selected Reading</h2><p><a href="https://arstechnica.com/security/2024/02/ongoing-campaign-compromises-senior-execs-azure-accounts-locks-them-using-mfa/">Ongoing campaign compromises senior execs’ Azure accounts, locks them using MFA</a> (Ars Technica) </p><p><a href="https://www.bleepingcomputer.com/news/security/bank-of-america-warns-customers-of-data-breach-after-vendor-hack/">Bank of America warns customers of data breach after vendor hack</a> (BleepingComputer)</p><p><a href="https://securityaffairs.com/159062/hacking/global-malicious-activity-targeting-elections.html">Global Malicious Activity Targeting Elections is Skyrocketing</a> (Security Affairs)</p><p><a href="https://cybersecuritynews.com/cisa-roundcube-xss-vulnerability/">CISA Warns Of Active Attacks on Roundcube Webmail XSS Vulnerability</a> (CISA)</p><p><a href="https://www.govinfosecurity.com/bipartisan-senate-bill-requires-hhs-to-bolster-cyber-efforts-a-24345">Bipartisan Senate Bill Requires HHS to Bolster Cyber Efforts</a> (Gov Info Security)</p><p><a href="https://www.securityweek.com/ics-patch-tuesday-siemens-addresses-270-vulnerabilities/">ICS Patch Tuesday: Siemens Addresses 270 Vulnerabilities</a> (SecurityWeek) </p><p><a href="https://www.euronews.com/next/2024/02/11/four-in-five-men-in-tech-say-women-are-treated-equally-as-women-criticise-invisible-challe">Four in five men in tech say women are treated equally, as women criticise ‘invisible challenges’</a> (Euronews)</p><p><a href="https://www.theverge.com/24065145/ai-obituary-spam-generative-clickbait">The rise of obituary spam</a> (The Verge) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1819</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ea955136-b95d-11ee-adc6-8f3ccf978e1a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6629385195.mp3?updated=1707857489" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DOJ strikes justice. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2002/notes</link>
      <description>The DOJ shuts down the Warzone rat. Ransomware hits over twenty Romanian hospitals, and Rysida gets a decryptor. Canada may ban the Flipper Zero. Chinese espionage claims against the US are light on facts. Australia looks to criminalize doxxing. Federal IT leaders seek better coordination with CISA and the JCDC. Wired looks at the effect of cyberattacks on inequality. Our guest is Manny Felix, Founder and CEO of US Cyber Initiative, sharing their work in unlocking cyber career opportunities for young people. And this thumb drive will self-destruct in five seconds.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Manuel "Manny" Felix, Founder and CEO of US Cyber Initiative, sharing their work in unlocking career opportunities for young people who are interested in cyber and emergent technology. US Cyber Initiative grew out of AZ Cyber. Learn more about AZ Cyber here. 

Selected Reading
DOJ shuts down ‘Warzone’ malware vendor and charges two in connection (The Record)
Ransomware attack forces 18 Romanian hospitals to go offline (BleepingComputer)
Decryptor for Rhysida ransomware is available (Help Net Security)
Canada moves to ban the Flipper Zero amid rising auto theft concerns (TECHSPOT)
China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage (SentinelOne)
‘Doxxing’ laws to be brought forward after Jewish WhatsApp leak  (The Sydney Morning Herald)
Exclusive: Duke Energy to remove Chinese battery giant CATL from Marine Corps Base (Reuters)
Federal IT officials call on CISA for tougher standards, more coordination (FedScoop)
Priorities of the Joint Cyber Defense Collaborative for 2024 (CISA)
The Hidden Injustice of Cyberattacks (WIRED)
Ovrdrive USB stick with data-hiding and overheating self-destruct features nears crowdfunding goal (TechSpot)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 12 Feb 2024 21:10:00 -0000</pubDate>
      <itunes:title>DOJ strikes justice. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2002</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The DOJ shuts down the Warzone rat. Ransomware hits over twenty Romanian hospitals, and Rysida gets a decryptor. Canada may ban the Flipper Zero. Chinese espionage claims against the US are light on facts. Australia looks to criminalize doxxing. Federal IT leaders seek better coordination with CISA and the JCDC. Wired looks at the effect of cyberattacks on inequality. Our guest is Manny Felix, Founder and CEO of US Cyber Initiative, sharing their work in unlocking cyber career opportunities for young people. And this thumb drive will self-destruct in five seconds.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Manuel "Manny" Felix, Founder and CEO of US Cyber Initiative, sharing their work in unlocking career opportunities for young people who are interested in cyber and emergent technology. US Cyber Initiative grew out of AZ Cyber. Learn more about AZ Cyber here. 

Selected Reading
DOJ shuts down ‘Warzone’ malware vendor and charges two in connection (The Record)
Ransomware attack forces 18 Romanian hospitals to go offline (BleepingComputer)
Decryptor for Rhysida ransomware is available (Help Net Security)
Canada moves to ban the Flipper Zero amid rising auto theft concerns (TECHSPOT)
China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage (SentinelOne)
‘Doxxing’ laws to be brought forward after Jewish WhatsApp leak  (The Sydney Morning Herald)
Exclusive: Duke Energy to remove Chinese battery giant CATL from Marine Corps Base (Reuters)
Federal IT officials call on CISA for tougher standards, more coordination (FedScoop)
Priorities of the Joint Cyber Defense Collaborative for 2024 (CISA)
The Hidden Injustice of Cyberattacks (WIRED)
Ovrdrive USB stick with data-hiding and overheating self-destruct features nears crowdfunding goal (TechSpot)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The DOJ shuts down the Warzone rat. Ransomware hits over twenty Romanian hospitals, and Rysida gets a decryptor. Canada may ban the Flipper Zero. Chinese espionage claims against the US are light on facts. Australia looks to criminalize doxxing. Federal IT leaders seek better coordination with CISA and the JCDC. Wired looks at the effect of cyberattacks on inequality. Our guest is Manny Felix, Founder and CEO of US Cyber Initiative, sharing their work in unlocking cyber career opportunities for young people. And this thumb drive will self-destruct in five seconds.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p><a href="https://www.linkedin.com/in/ma-felix/">Manuel "Manny" Felix</a>, Founder and CEO of <a href="https://www.linkedin.com/company/us-cyber-initiative/">US Cyber Initiative</a>, sharing their work in unlocking career opportunities for young people who are interested in cyber and emergent technology. US Cyber Initiative grew out of AZ Cyber. Learn more about AZ Cyber <a href="https://azcyber.org/">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/doj-shuts-down-warzone-malware-vendor">DOJ shuts down ‘Warzone’ malware vendor and charges two in connection</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-attack-forces-18-romanian-hospitals-to-go-offline/">Ransomware attack forces 18 Romanian hospitals to go offline</a> (BleepingComputer)</p><p><a href="https://www.helpnetsecurity.com/2024/02/12/rhysida-ransomware-decryptor/">Decryptor for Rhysida ransomware is available</a> (Help Net Security)</p><p><a href="https://www.techspot.com/news/101846-canada-moves-ban-flipper-zero-amid-rising-auto.html">Canada moves to ban the Flipper Zero amid rising auto theft concerns</a> (TECHSPOT)</p><p><a href="https://www.sentinelone.com/labs/chinas-cyber-revenge-why-the-prc-fails-to-back-its-claims-of-western-espionage/">China’s Cyber Revenge | Why the PRC Fails to Back Its Claims of Western Espionage </a>(SentinelOne)</p><p><a href="https://www.smh.com.au/politics/federal/doxxing-laws-to-be-brought-forward-after-jewish-whatsapp-leak-20240212-p5f4cc.html?ref=rss&amp;mid=1#cid=1619702">‘Doxxing’ laws to be brought forward after Jewish WhatsApp leak</a>  (The Sydney Morning Herald)</p><p><a href="https://www.reuters.com/business/energy/duke-energy-remove-chinese-battery-giant-catl-marine-corps-base-2024-02-09/?utm_source=www.metacurity.com&amp;utm_medium=referral&amp;utm_campaign=feds-seize-data-stealing-warzone-rat-websites-arrest-two">Exclusive: Duke Energy to remove Chinese battery giant CATL from Marine Corps Base</a> (Reuters)</p><p><a href="https://fedscoop.com/federal-agencies-cisa-jcdc-coordination-standards/">Federal IT officials call on CISA for tougher standards, more coordination</a> (FedScoop)</p><p><a href="https://www.cisa.gov/news-events/alerts/2024/02/12/priorities-joint-cyber-defense-collaborative-2024">Priorities of the Joint Cyber Defense Collaborative for 2024</a> (CISA)</p><p><a href="https://www.wired.com/story/cybersecurity-marginalized-communities-problem/">The Hidden Injustice of Cyberattacks </a>(WIRED)</p><p><a href="https://www.techspot.com/news/101848-ovrdrive-usb-stick-unique-self-destruct-data-hiding.html">Ovrdrive USB stick with data-hiding and overheating self-destruct features nears crowdfunding goal</a> (TechSpot)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1831</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ea59ffa0-b95d-11ee-adc6-377a4859af4e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4871218571.mp3?updated=1707767710" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Graham Cluley: Have to be able to communicate to everybody. [Media] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/7/notes</link>
      <description>Computer security writer, podcaster and public speaker Graham Cluley describes learning to program on his own from magazines, creating text adventure games for donations, and his journey from programming to presenting and writing with a bit of tap dancing on the side. Along the way, Graham collaborated with others and learned to communicate so that all could understand, not just techies. Our thanks to Graham for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 11 Feb 2024 08:00:00 -0000</pubDate>
      <itunes:title>Encore: Graham Cluley: Have to be able to communicate to everybody. [Media] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>7</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Computer security writer, podcaster and public speaker Graham Cluley describes learning to program on his own from magazines, creating text adventure games for donations, and his journey from programming to presenting and writing with a bit of tap dancing on the side. Along the way, Graham collaborated with others and learned to communicate so that all could understand, not just techies. Our thanks to Graham for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Computer security writer, podcaster and public speaker Graham Cluley describes learning to program on his own from magazines, creating text adventure games for donations, and his journey from programming to presenting and writing with a bit of tap dancing on the side. Along the way, Graham collaborated with others and learned to communicate so that all could understand, not just techies. Our thanks to Graham for sharing his story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>356</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f7f26924-c77f-11ee-9a27-975468ab5588]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6474654291.mp3?updated=1707506481" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware is coming. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/316/notes</link>
      <description>Jon DiMaggio, Chief Security Strategist for Analyst1, is discussing his research on "Ransomware Diaries Volume 4: Ransomed and Exposed - The Story of RansomedVC." While there is evidence to support that RansomedVC runs cybercrime operations, Jon questions the claims it made regarding the authenticity of the data it stole and the methods it used to extort victims.
The research states "I uncovered sensitive information about the group's leader, Ransomed Support (also known as Impotent), relating to secrets from his past." In this episode John shares his 6 key findings after spending months engaging with the lead criminal who runs RansomedVC.
The research can be found here:
Ransomware Diaries Volume 4: Ransomed and Exposed - The Story of RansomedVC

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Feb 2024 08:00:00 -0000</pubDate>
      <itunes:title>Ransomware is coming. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>316</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Jon DiMaggio, Chief Security Strategist for Analyst1, is discussing his research on "Ransomware Diaries Volume 4: Ransomed and Exposed - The Story of RansomedVC." While there is evidence to support that RansomedVC runs cybercrime operations, Jon questions the claims it made regarding the authenticity of the data it stole and the methods it used to extort victims.
The research states "I uncovered sensitive information about the group's leader, Ransomed Support (also known as Impotent), relating to secrets from his past." In this episode John shares his 6 key findings after spending months engaging with the lead criminal who runs RansomedVC.
The research can be found here:
Ransomware Diaries Volume 4: Ransomed and Exposed - The Story of RansomedVC

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jon DiMaggio, Chief Security Strategist for Analyst1, is discussing his research on "Ransomware Diaries Volume 4: Ransomed and Exposed - The Story of RansomedVC." While there is evidence to support that RansomedVC runs cybercrime operations, Jon questions the claims it made regarding the authenticity of the data it stole and the methods it used to extort victims.</p><p>The research states "I uncovered sensitive information about the group's leader, Ransomed Support (also known as Impotent), relating to secrets from his past." In this episode John shares his 6 key findings after spending months engaging with the lead criminal who runs RansomedVC.</p><p>The research can be found here:</p><ul><li><a href="https://analyst1.com/ransomware-diaries-volume-4/">Ransomware Diaries Volume 4: Ransomed and Exposed - The Story of RansomedVC</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1728</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0dc4d386-c780-11ee-a985-77fc691be35c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1613287207.mp3?updated=1707505693" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Imitation game: LastPass vs LassPass.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2001/notes</link>
      <description>A LastPass imitator sneaks its way past Apple’s app store review. Bitdefender identifies a new macOS backdoor. The Air Force and Space Force collaborate for stronger cyber defense. CISA offers an election security advisory program. The FCC bans AI robocalls. The Feds put a bounty on the Hive ransomware group. Senators introduce a bipartisan drone security act. Cisco Talos IDs a new cyber espionage campaign. Fighting the good fight against software bloat. On our Solution Spotlight, N2K President Simone Petrella talks with Amy Kardel, Senior Vice President for Strategic Workforce Relationships at CompTIA about the cyber talent gap. And sports fans check your passwords. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight, N2K President Simone Petrella talks with Amy Kardel, Senior Vice President for Strategic Workforce Relationships at CompTIA about their perspectives and initiatives in response to the cyber talent gap.

Selected Reading
Fake LastPass App Sneaks Past Apple's Review Team (MacRumors)
Warning: Fraudulent App Impersonating LastPass Currently Available in Apple App Store (LastPass)
New Rust-Based macOS Backdoor Steals Files, Linked to Ransomware Groups (HACKREAD)
New Department of Air Force partnership brings cyber, space and information units closer (DefenseScoop)
Federal Cybersecurity Agency Launches Program to Boost Support for State, Local Election Offices (SecurityWeek)
FCC votes to outlaw scam robocalls that use AI-generated voices (CNN Business)
US offers $10 million for tips on Hive ransomware leadership (Bleeping Computer)
New legislation would give NIST drone cybersecurity responsibilities (FedScoop) 
New Zardoor backdoor used in long-term cyber espionage operation targeting an Islamic organization (Talos Intelligence)
Why Bloat Is Still Software’s Biggest Vulnerability (IEEE Spectrum)
Super Bowl of Passwords: Chiefs vs. 49ers in the Battle of Cybersecurity (Security Boulevard)
Taylor Swift's Influence on Cybersecurity (Enzoic)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 09 Feb 2024 21:30:00 -0000</pubDate>
      <itunes:title>Imitation game: LastPass vs LassPass.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2001</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A LastPass imitator sneaks its way past Apple’s app store review. Bitdefender identifies a new macOS backdoor. The Air Force and Space Force collaborate for stronger cyber defense. CISA offers an election security advisory program. The FCC bans AI robocalls. The Feds put a bounty on the Hive ransomware group. Senators introduce a bipartisan drone security act. Cisco Talos IDs a new cyber espionage campaign. Fighting the good fight against software bloat. On our Solution Spotlight, N2K President Simone Petrella talks with Amy Kardel, Senior Vice President for Strategic Workforce Relationships at CompTIA about the cyber talent gap. And sports fans check your passwords. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight, N2K President Simone Petrella talks with Amy Kardel, Senior Vice President for Strategic Workforce Relationships at CompTIA about their perspectives and initiatives in response to the cyber talent gap.

Selected Reading
Fake LastPass App Sneaks Past Apple's Review Team (MacRumors)
Warning: Fraudulent App Impersonating LastPass Currently Available in Apple App Store (LastPass)
New Rust-Based macOS Backdoor Steals Files, Linked to Ransomware Groups (HACKREAD)
New Department of Air Force partnership brings cyber, space and information units closer (DefenseScoop)
Federal Cybersecurity Agency Launches Program to Boost Support for State, Local Election Offices (SecurityWeek)
FCC votes to outlaw scam robocalls that use AI-generated voices (CNN Business)
US offers $10 million for tips on Hive ransomware leadership (Bleeping Computer)
New legislation would give NIST drone cybersecurity responsibilities (FedScoop) 
New Zardoor backdoor used in long-term cyber espionage operation targeting an Islamic organization (Talos Intelligence)
Why Bloat Is Still Software’s Biggest Vulnerability (IEEE Spectrum)
Super Bowl of Passwords: Chiefs vs. 49ers in the Battle of Cybersecurity (Security Boulevard)
Taylor Swift's Influence on Cybersecurity (Enzoic)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A LastPass imitator sneaks its way past Apple’s app store review. Bitdefender identifies a new macOS backdoor. The Air Force and Space Force collaborate for stronger cyber defense. CISA offers an election security advisory program. The FCC bans AI robocalls. The Feds put a bounty on the Hive ransomware group. Senators introduce a bipartisan drone security act. Cisco Talos IDs a new cyber espionage campaign. Fighting the good fight against software bloat. On our Solution Spotlight, N2K President Simone Petrella talks with Amy Kardel, Senior Vice President for Strategic Workforce Relationships at CompTIA about the cyber talent gap. And sports fans check your passwords. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Solution Spotlight, <a href="https://www.n2k.com/">N2K</a> President <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a> talks with <a href="https://www.linkedin.com/in/amykardel/">Amy Kardel</a>, Senior Vice President for Strategic Workforce Relationships at <a href="https://www.comptia.org/">CompTIA</a> about their perspectives and initiatives in response to the cyber talent gap.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.macrumors.com/2024/02/08/fake-lastpass-app-in-apple-app-store/?utm_source=dlvr.it&amp;utm_medium=mastodon">Fake LastPass App Sneaks Past Apple's Review Team</a> (MacRumors)</p><p><a href="https://blog.lastpass.com/2024/02/warning-fraudulent-app-impersonating-lastpass-currently-available-in-apple-app-store/">Warning: Fraudulent App Impersonating LastPass Currently Available in Apple App Store</a> (LastPass)</p><p><a href="https://www.hackread.com/rust-macos-backdoor-steals-files-ransomware-groups/">New Rust-Based macOS Backdoor Steals Files, Linked to Ransomware Groups</a> (HACKREAD)</p><p><a href="https://defensescoop.com/2024/02/07/department-air-force-tightens-cyber-space-partnership/">New Department of Air Force partnership brings cyber, space and information units closer</a> (DefenseScoop)</p><p><a href="https://www.securityweek.com/federal-cybersecurity-agency-launches-program-to-boost-support-for-state-local-election-offices/">Federal Cybersecurity Agency Launches Program to Boost Support for State, Local Election Offices </a>(SecurityWeek)</p><p><a href="https://www.cnn.com/2024/02/08/tech/fcc-scam-robocalls-ai-generated-voices?cid=ios_app">FCC votes to outlaw scam robocalls that use AI-generated voices</a> (CNN Business)</p><p><a href="https://www.bleepingcomputer.com/news/security/us-offers-10-million-for-tips-on-hive-ransomware-leadership/">US offers $10 million for tips on Hive ransomware leadership</a> (Bleeping Computer)</p><p><a href="https://fedscoop.com/new-legislation-would-give-nist-drone-cybersecurity-responsibilities/">New legislation would give NIST drone cybersecurity responsibilities </a><a href="https://fedscoop.com/new-legislation-would-give-nist-drone-cybersecurity-responsibilities/">(FedScoop)</a><a href="https://fedscoop.com/new-legislation-would-give-nist-drone-cybersecurity-responsibilities/"> </a></p><p><a href="https://blog.talosintelligence.com/new-zardoor-backdoor/">New Zardoor backdoor used in long-term cyber espionage operation targeting an Islamic organization</a> (Talos Intelligence)</p><p><a href="https://spectrum.ieee.org/lean-software-development">Why Bloat Is Still Software’s Biggest Vulnerability</a> (IEEE Spectrum)</p><p><a href="https://securityboulevard.com/2024/02/super-bowl-of-passwords-chiefs-vs-49ers-in-the-battle-of-cybersecurity/">Super Bowl of Passwords: Chiefs vs. 49ers in the Battle of Cybersecurity </a>(Security Boulevard)</p><p><a href="https://www.enzoic.com/blog/taylor-swifts-influence-on-cybersecurity/">Taylor Swift's Influence on Cybersecurity</a> (Enzoic)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1742</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ea1e98fc-b95d-11ee-adc6-7b6fd47ff6a1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4101560092.mp3?updated=1707513214" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Volt Typhoon’s stealthy threat to US critical infrastructure.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2000/notes</link>
      <description>A joint advisory warns of Volt Typhoon’s extended network infiltration. Check your Cisco devices for patches. Fortinet clarifies its latest vulnerabilities. Internet outages plague Pakistan on election day. Kaspersky describes the new Coyote banking trojan. Cyber insurance is projected to reach new heights. The White House appoints a leader for the AI Safety Institute, and sees pushback on proposed reporting regulations. Can we hold AI liable for its foreseeable harms? Joe Carrigan joins us with insights on the Mother of All Data Breaches. The potential of Passkeys versus the comfort of passwords.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Podcast partner and Hacking Humans co-host Joe Carrigan stops by today to discuss the mother of all data breaches.

Selected Reading
Chinese hackers hid in US infrastructure network for 5 years (BleepingComputer) 
Akira, LockBit actively searching for vulnerable Cisco ASA devices (Help Net Security)
Cisco fixes critical Expressway Series CSRF vulnerabilities (SecurityAffairs)
Fortinet warns of new FortiSIEM RCE bugs in confusing disclosure (BleepingComputer) 
Pakistani telcos suffer widespread Internet blackouts on election day (DCD)
Coyote: A multi-stage banking Trojan abusing the Squirrel installer (Securelist)
Cyber insurance market growing dramatically, Triple-I Finds (AI-TechPark)
Biden Administration Names a Director of the New AI Safety Institute (SecurityWeek)
No one's happy with latest US cyber incident reporting plan (The Register)
DHS Is Recruiting Techies for the AI Corps (BankInfoSecurity)
Can the courts save us from dangerous AI? (Vox)
I Stopped Using Passwords. It's Great—and a Total Mess (WIRED)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 08 Feb 2024 21:10:00 -0000</pubDate>
      <itunes:title>Volt Typhoon’s stealthy threat to US critical infrastructure.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>2000</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A joint advisory warns of Volt Typhoon’s extended network infiltration. Check your Cisco devices for patches. Fortinet clarifies its latest vulnerabilities. Internet outages plague Pakistan on election day. Kaspersky describes the new Coyote banking trojan. Cyber insurance is projected to reach new heights. The White House appoints a leader for the AI Safety Institute, and sees pushback on proposed reporting regulations. Can we hold AI liable for its foreseeable harms? Joe Carrigan joins us with insights on the Mother of All Data Breaches. The potential of Passkeys versus the comfort of passwords.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Podcast partner and Hacking Humans co-host Joe Carrigan stops by today to discuss the mother of all data breaches.

Selected Reading
Chinese hackers hid in US infrastructure network for 5 years (BleepingComputer) 
Akira, LockBit actively searching for vulnerable Cisco ASA devices (Help Net Security)
Cisco fixes critical Expressway Series CSRF vulnerabilities (SecurityAffairs)
Fortinet warns of new FortiSIEM RCE bugs in confusing disclosure (BleepingComputer) 
Pakistani telcos suffer widespread Internet blackouts on election day (DCD)
Coyote: A multi-stage banking Trojan abusing the Squirrel installer (Securelist)
Cyber insurance market growing dramatically, Triple-I Finds (AI-TechPark)
Biden Administration Names a Director of the New AI Safety Institute (SecurityWeek)
No one's happy with latest US cyber incident reporting plan (The Register)
DHS Is Recruiting Techies for the AI Corps (BankInfoSecurity)
Can the courts save us from dangerous AI? (Vox)
I Stopped Using Passwords. It's Great—and a Total Mess (WIRED)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A joint advisory warns of Volt Typhoon’s extended network infiltration. Check your Cisco devices for patches. Fortinet clarifies its latest vulnerabilities. Internet outages plague Pakistan on election day. Kaspersky describes the new Coyote banking trojan. Cyber insurance is projected to reach new heights. The White House appoints a leader for the AI Safety Institute, and sees pushback on proposed reporting regulations. Can we hold AI liable for its foreseeable harms? Joe Carrigan joins us with insights on the Mother of All Data Breaches. The potential of Passkeys versus the comfort of passwords.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Podcast partner and <a href="https://thecyberwire.com/podcasts/hacking-humans">Hacking Humans</a> co-host <a href="https://www.linkedin.com/in/joecarrigan">Joe Carrigan</a> stops by today to discuss the mother of all data breaches.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/chinese-hackers-hid-in-us-infrastructure-network-for-5-years/">Chinese hackers hid in US infrastructure network for 5 years</a> (BleepingComputer) </p><p><a href="https://www.helpnetsecurity.com/2024/02/08/ransomware-cisco-asa-vulnerabilities/">Akira, LockBit actively searching for vulnerable Cisco ASA devices </a>(Help Net Security)</p><p><a href="https://securityaffairs.com/158830/security/cisco-fixes-critical-expressway-series-csrf-vulnerabilities.html">Cisco fixes critical Expressway Series CSRF vulnerabilities</a> (SecurityAffairs)</p><p><a href="https://www.bleepingcomputer.com/news/security/fortinet-warns-of-new-fortisiem-rce-bugs-in-confusing-disclosure/">Fortinet warns of new FortiSIEM RCE bugs in confusing disclosure</a> (BleepingComputer) </p><p><a href="https://www.datacenterdynamics.com/en/news/pakistani-telcos-suffer-widespread-internet-blackouts-on-election-day/">Pakistani telcos suffer widespread Internet blackouts on election day</a> (DCD)</p><p><a href="https://securelist.com/coyote-multi-stage-banking-trojan/111846/">Coyote: A multi-stage banking Trojan abusing the Squirrel installer </a>(Securelist)</p><p><a href="https://ai-techpark.com/cyber-insurance-market-growing-dramatically-triple-i-finds/">Cyber insurance market growing dramatically, Triple-I Finds </a>(AI-TechPark)</p><p><a href="https://www.securityweek.com/biden-administration-names-a-director-of-the-new-ai-safety-institute/">Biden Administration Names a Director of the New AI Safety Institute </a>(SecurityWeek)</p><p><a href="https://www.theregister.com/2024/02/08/us_tech_industry_changes/">No one's happy with latest US cyber incident reporting plan</a> (The Register)</p><p><a href="https://www.govinfosecurity.com/dhs-recruiting-techies-for-ai-corps-a-24297">DHS Is Recruiting Techies for the AI Corps </a>(BankInfoSecurity)</p><p><a href="https://www.vox.com/future-perfect/2024/2/7/24062374/ai-openai-anthropic-deepmind-legal-liability-gabriel-weil">Can the courts save us from dangerous AI?</a> (Vox)</p><p><a href="https://www.wired.com/story/stopped-using-passwords-passkeys/">I Stopped Using Passwords. It's Great—and a Total Mess</a> (WIRED)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1647</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e9e3e162-b95d-11ee-adc6-934d5c2af003]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4039622672.mp3?updated=1707424146" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Taking a bite out of Apple.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1999/notes</link>
      <description>A security researcher has been charged in an alleged multi-million dollar theft scheme targeting Apple. A House committee hearing explores OT security. Fortinet withdraws accidental CVEs. 2023 saw record highs in ransomware payments. A youtuber finds a cheap and easy bypass for Bitlocker encryption. Political pressure proves challenging for the JCDC. New Hampshire tracks down those fake Biden robocalls. European security agencies bolster warnings about Ivanti devices. HHS fines a New York medical center millions over an identity theft ring. On our sponsored Industry Voices segment, Navneet Singh, Vice President of Marketing Network Security at Palo Alto Networks, shares some practical examples of healthcare organizations transitioning to the cloud. Giving that toothbrush story the brushoff.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, Navneet Singh, Vice President of Marketing Network Security at Palo Alto Networks, discusses the transition to the cloud and shares some practical examples in healthcare.

Selected Reading
A Security Researcher Allegedly Scammed Apple (404 Media)
US House Homeland Security subcommittee addresses OT threats, CISA's role in securing OT - Industrial Cyber (Industrial Cyber)
Operational Technology disruptions: An eye on the water sector. Robert M. Lee’s opening statement to before the U.S. Congressional Subcommittee on Cybersecurity and Infrastructure Protection. (Control Loop podcast)
Securing Operational Technology: A Deep Dive into the Water Sector (Homeland Security Events YouTube)
Fortinet Patches Critical Vulnerabilities in FortiSIEM (SecurityWeek)
Fortinet snafu: Critical FortiSIEM CVEs are duplicates, issued in error (Bleeping Computer)
Ransomware hackers raked in $1 billion last year from victims (NBC News)
BitLocker encryption broken in 43 seconds with sub-$10 Raspberry Pi Pico — key can be sniffed when using an external TPM (Tom’s Hardware)
The far right is scaring away Washington's private hacker army (POLITICO)
N.H. attorney general says he found source of fake Biden robocalls (NBC News)
European security agencies publish joint statement on Ivanti Connect Secure, Policy Secure vulnerabilities (Industrial Cyber)
Medical Center Fined $4.75M in Insider ID Theft Incident (GovInfoSecurity)
Surprising 3 Million Hacked Toothbrushes Story Goes Viral—Is It True? (Forbes)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 07 Feb 2024 21:10:00 -0000</pubDate>
      <itunes:title>Taking a bite out of Apple.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1999</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A security researcher has been charged in an alleged multi-million dollar theft scheme targeting Apple. A House committee hearing explores OT security. Fortinet withdraws accidental CVEs. 2023 saw record highs in ransomware payments. A youtuber finds a cheap and easy bypass for Bitlocker encryption. Political pressure proves challenging for the JCDC. New Hampshire tracks down those fake Biden robocalls. European security agencies bolster warnings about Ivanti devices. HHS fines a New York medical center millions over an identity theft ring. On our sponsored Industry Voices segment, Navneet Singh, Vice President of Marketing Network Security at Palo Alto Networks, shares some practical examples of healthcare organizations transitioning to the cloud. Giving that toothbrush story the brushoff.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Industry Voices segment, Navneet Singh, Vice President of Marketing Network Security at Palo Alto Networks, discusses the transition to the cloud and shares some practical examples in healthcare.

Selected Reading
A Security Researcher Allegedly Scammed Apple (404 Media)
US House Homeland Security subcommittee addresses OT threats, CISA's role in securing OT - Industrial Cyber (Industrial Cyber)
Operational Technology disruptions: An eye on the water sector. Robert M. Lee’s opening statement to before the U.S. Congressional Subcommittee on Cybersecurity and Infrastructure Protection. (Control Loop podcast)
Securing Operational Technology: A Deep Dive into the Water Sector (Homeland Security Events YouTube)
Fortinet Patches Critical Vulnerabilities in FortiSIEM (SecurityWeek)
Fortinet snafu: Critical FortiSIEM CVEs are duplicates, issued in error (Bleeping Computer)
Ransomware hackers raked in $1 billion last year from victims (NBC News)
BitLocker encryption broken in 43 seconds with sub-$10 Raspberry Pi Pico — key can be sniffed when using an external TPM (Tom’s Hardware)
The far right is scaring away Washington's private hacker army (POLITICO)
N.H. attorney general says he found source of fake Biden robocalls (NBC News)
European security agencies publish joint statement on Ivanti Connect Secure, Policy Secure vulnerabilities (Industrial Cyber)
Medical Center Fined $4.75M in Insider ID Theft Incident (GovInfoSecurity)
Surprising 3 Million Hacked Toothbrushes Story Goes Viral—Is It True? (Forbes)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A security researcher has been charged in an alleged multi-million dollar theft scheme targeting Apple. A House committee hearing explores OT security. Fortinet withdraws accidental CVEs. 2023 saw record highs in ransomware payments. A youtuber finds a cheap and easy bypass for Bitlocker encryption. Political pressure proves challenging for the JCDC. New Hampshire tracks down those fake Biden robocalls. European security agencies bolster warnings about Ivanti devices. HHS fines a New York medical center millions over an identity theft ring. On our sponsored Industry Voices segment, Navneet Singh, Vice President of Marketing Network Security at Palo Alto Networks, shares some practical examples of healthcare organizations transitioning to the cloud. Giving that toothbrush story the brushoff.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Industry Voices segment, <a href="https://www.linkedin.com/in/nasingh/">Navneet Singh</a>, Vice President of Marketing Network Security at <a href="http://paloaltonetworks.com/networksecurityplatform">Palo Alto Networks</a>, discusses the transition to the cloud and shares some practical examples in healthcare.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.404media.co/email/7a5b9a75-09b1-4f28-b6c4-a699dd5c9248/">A Security Researcher Allegedly Scammed Apple</a> (404 Media)</p><p><a href="https://industrialcyber.co/utilities-energy-power-water-waste/us-house-homeland-security-subcommittee-addresses-ot-threats-cisas-role-in-securing-ot/">US House Homeland Security subcommittee addresses OT threats, CISA's role in securing OT - Industrial Cyber</a><em> </em>(Industrial Cyber)</p><p><a href="https://thecyberwire.com/podcasts/control-loop/43/notes">Operational Technology disruptions: An eye on the water sector. Robert M. Lee’s opening statement to before the U.S. Congressional Subcommittee on Cybersecurity and Infrastructure Protection.</a> (Control Loop podcast)</p><p><a href="https://www.youtube.com/watch?v=LNcX7MCJfnU&amp;t=594s">Securing Operational Technology: A Deep Dive into the Water Sector</a> (Homeland Security Events YouTube)</p><p><a href="https://www.securityweek.com/fortinet-patches-critical-vulnerabilities-in-fortisiem/">Fortinet Patches Critical Vulnerabilities in FortiSIEM</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/fortinet-snafu-critical-fortisiem-cves-are-duplicates-issued-in-error/">Fortinet snafu: Critical FortiSIEM CVEs are duplicates, issued in error</a> (Bleeping Computer)</p><p><a href="https://www.nbcnews.com/tech/security/ransomware-hackers-raked-1-billion-last-year-victims-rcna137445">Ransomware hackers raked in $1 billion last year from victims</a> (NBC News)</p><p><a href="https://www.tomshardware.com/pc-components/cpus/youtuber-breaks-bitlocker-encryption-in-less-than-43-seconds-with-sub-dollar10-raspberry-pi-pico">BitLocker encryption broken in 43 seconds with sub-$10 Raspberry Pi Pico — key can be sniffed when using an external TPM</a> (Tom’s Hardware)</p><p><a href="https://www.politico.com/news/2024/02/06/far-right-washington-private-hackers-00139413">The far right is scaring away Washington's private hacker army </a>(POLITICO)</p><p><a href="https://www.nbcnews.com/politics/2024-election/nh-attorney-general-says-found-source-fake-biden-robocalls-rcna137499">N.H. attorney general says he found source of fake Biden robocalls</a> (NBC News)</p><p><a href="https://industrialcyber.co/threat-landscape/european-security-agencies-publish-joint-statement-on-ivanti-connect-secure-policy-secure-vulnerabilities/">European security agencies publish joint statement on Ivanti Connect Secure, Policy Secure vulnerabilities</a> (Industrial Cyber)</p><p><a href="https://www.govinfosecurity.com/medical-center-fined-475m-in-insider-id-theft-incident-a-24293">Medical Center Fined $4.75M in Insider ID Theft Incident</a> (GovInfoSecurity)</p><p><a href="https://www.forbes.com/sites/daveywinder/2024/02/07/surprising-3-million-hacked-toothbrushes-story-goes-viral-is-it-true/">Surprising 3 Million Hacked Toothbrushes Story Goes Viral—Is It True?</a> (Forbes)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1909</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e9a8d8ce-b95d-11ee-adc6-1b531fbfaf13]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3068560534.mp3?updated=1707335848" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cracking down on spyware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1998/notes</link>
      <description>The global community confronts spyware. Canon patches critical vulnerabilities in printers. Barracuda recommends mitigations for Web Application Firewall issues. Group-IB warns of ResumeLooters. Millions are at risk after a data breach in France. Research from the UK reveals contradictory approaches to cybersecurity. Meta’s Oversight Board recommends updates to Facebook’s Manipulated Media policy. We’ve got a special segment from the Threat Vector podcast examining Ivanti's Connect Secure and Policy Secure products. And it’s time to brush up on IOT security. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In a special segment from Palo Alto Networks’ Threat Vector podcast, host David Moulton, Director of Thought Leadership at Unit 42, along with guests Sam Rubin, VP, Global Head of Operations, and Ingrid Parker, Senior Manager of the Intel Response Unit, dives deep into the critical vulnerabilities found in Ivanti's Connect Secure and Policy Secure products. You can check out the full conversation here. 

Selected Reading
US to restrict visas for those who misuse commercial spyware (Reuters)
Britain and France assemble diplomats for international agreement on spyware (The Record)
Israeli government absent from London spyware conference and pledge (The Record)
Government hackers targeted iPhones owners with zero-days, Google says (TechCrunch)
Google agrees to pay $350 million settlement in security lapse case (Washington Post)
Canon Patches 7 Critical Vulnerabilities in Small Office Printers  (SecurityWeek)
Barracuda Disclosed Critical Vulnerabilities in WAF, Affecting File Upload and JSON Protection (SOCRadar)
ResumeLooters target job search sites in extensive data heist (Help Net Security)
Millions at risk of fraud after massive health data hack in France (The Connexion)
Fragmented cybersecurity vendor landscape is exacerbating risks and compounding skills shortages, SenseOn research reveals (IT Security Guru)
Meta’s Oversight Board Urges a Policy Change After a Fake Biden Video (InfoSecurity Magazine)
Toothbrushes are a cybersecurity risk, too: millions participate in DDoS attacks (Cybernews)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Feb 2024 21:10:00 -0000</pubDate>
      <itunes:title>Cracking down on spyware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1998</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The global community confronts spyware. Canon patches critical vulnerabilities in printers. Barracuda recommends mitigations for Web Application Firewall issues. Group-IB warns of ResumeLooters. Millions are at risk after a data breach in France. Research from the UK reveals contradictory approaches to cybersecurity. Meta’s Oversight Board recommends updates to Facebook’s Manipulated Media policy. We’ve got a special segment from the Threat Vector podcast examining Ivanti's Connect Secure and Policy Secure products. And it’s time to brush up on IOT security. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In a special segment from Palo Alto Networks’ Threat Vector podcast, host David Moulton, Director of Thought Leadership at Unit 42, along with guests Sam Rubin, VP, Global Head of Operations, and Ingrid Parker, Senior Manager of the Intel Response Unit, dives deep into the critical vulnerabilities found in Ivanti's Connect Secure and Policy Secure products. You can check out the full conversation here. 

Selected Reading
US to restrict visas for those who misuse commercial spyware (Reuters)
Britain and France assemble diplomats for international agreement on spyware (The Record)
Israeli government absent from London spyware conference and pledge (The Record)
Government hackers targeted iPhones owners with zero-days, Google says (TechCrunch)
Google agrees to pay $350 million settlement in security lapse case (Washington Post)
Canon Patches 7 Critical Vulnerabilities in Small Office Printers  (SecurityWeek)
Barracuda Disclosed Critical Vulnerabilities in WAF, Affecting File Upload and JSON Protection (SOCRadar)
ResumeLooters target job search sites in extensive data heist (Help Net Security)
Millions at risk of fraud after massive health data hack in France (The Connexion)
Fragmented cybersecurity vendor landscape is exacerbating risks and compounding skills shortages, SenseOn research reveals (IT Security Guru)
Meta’s Oversight Board Urges a Policy Change After a Fake Biden Video (InfoSecurity Magazine)
Toothbrushes are a cybersecurity risk, too: millions participate in DDoS attacks (Cybernews)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The global community confronts spyware. Canon patches critical vulnerabilities in printers. Barracuda recommends mitigations for Web Application Firewall issues. Group-IB warns of ResumeLooters. Millions are at risk after a data breach in France. Research from the UK reveals contradictory approaches to cybersecurity. Meta’s Oversight Board recommends updates to Facebook’s Manipulated Media policy. We’ve got a special segment from the Threat Vector podcast examining Ivanti's Connect Secure and Policy Secure products. And it’s time to brush up on IOT security. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>In a special segment from Palo Alto Networks’ <a href="https://thecyberwire.com/podcasts/threat-vector">Threat Vector podcast</a>, host <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a>, Director of Thought Leadership at Unit 42, along with guests <a href="https://www.linkedin.com/in/samsrubin/">Sam Rubin</a>, VP, Global Head of Operations, and <a href="https://www.linkedin.com/in/ingrid-a-parker/">Ingrid Parker</a>, Senior Manager of the Intel Response Unit, dives deep into the critical vulnerabilities found in Ivanti's Connect Secure and Policy Secure products. You can check out the full conversation <a href="https://thecyberwire.com/podcasts/threat-vector/15/notes">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.reuters.com/world/us/us-announces-visa-restriction-policy-those-misusing-commercial-spyware-2024-02-05/">US to restrict visas for those who misuse commercial spyware </a>(Reuters)</p><p><a href="https://therecord.media/britain-france-assemble-diplomats-international-agreement">Britain and France assemble diplomats for international agreement on spyware</a> (The Record)</p><p><a href="https://therecord.media/israel-absent-from-london-spyware-conference-and-pledge">Israeli government absent from London spyware conference and pledge</a> (The Record)</p><p><a href="https://techcrunch.com/2024/02/06/government-hackers-targeted-iphones-owners-with-zero-days-google-says/">Government hackers targeted iPhones owners with zero-days, Google says</a> (TechCrunch)</p><p><a href="https://www.washingtonpost.com/technology/2024/02/05/google-plus-settlement-lawsuit-class-action/">Google agrees to pay $350 million settlement in security lapse case </a>(Washington Post)</p><p><a href="https://www.securityweek.com/canon-patches-7-critical-vulnerabilities-in-small-office-printers/">Canon Patches 7 Critical Vulnerabilities in Small Office Printers </a> (SecurityWeek)</p><p><a href="https://socradar.io/barracuda-disclosed-critical-vulnerabilities-in-waf-affecting-file-upload-and-json-protection/">Barracuda Disclosed Critical Vulnerabilities in WAF, Affecting File Upload and JSON Protection</a> (SOCRadar)</p><p><a href="https://www.helpnetsecurity.com/2024/02/06/resumelooters-target-job-search-sites-data-heist/">ResumeLooters target job search sites in extensive data heist</a> (Help Net Security)</p><p><a href="https://www.connexionfrance.com/article/French-news/Millions-at-risk-of-fraud-after-massive-health-data-hack-in-France">Millions at risk of fraud after massive health data hack in France</a> (The Connexion)</p><p><a href="https://www.itsecurityguru.org/2024/02/06/fragmented-cybersecurity-vendor-landscape-is-exacerbating-risks-and-compounding-skills-shortages-senseon-research-reveals/">Fragmented cybersecurity vendor landscape is exacerbating risks and compounding skills shortages, SenseOn research reveals</a> (IT Security Guru)</p><p><a href="https://www.infosecurity-magazine.com/news/meta-oversight-board-policy-change/">Meta’s Oversight Board Urges a Policy Change After a Fake Biden Video</a> (InfoSecurity Magazine)</p><p><a href="https://cybernews.com/news/toothbrushes-participate-in-ddos-attacks/">Toothbrushes are a cybersecurity risk, too: millions participate in DDoS attacks</a> (Cybernews)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1656</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e96de53e-b95d-11ee-adc6-330b7f790efb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2112595993.mp3?updated=1707251453" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A serious breach showdown.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1997/notes</link>
      <description>Anydesk confirms a serious breach. Clorox and Johnson Controls file cyber incidents with the SEC. There’s already a potential Apple Vision Pro kernel exploit. A $25 million deepfake scam. Akamai research hops on the FritzFrog botnet. The US sanctions Iranians for attacks on American water plants. Commando Cat targets Docker API endpoints. Pennsylvania courts fall victim to a DDoS attack. A new leader takes the reins at US Cyber Command and the NSA. Our guest is Dr. Heather Monthie from N2K Networks, with insights on the White House's recent easing of education requirements for federal contract jobs. And remembering one of the great cryptology communicators. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
Guest Heather Monthie from N2K Networks shares some insight into the White House's recent easing of education requirements for federal contract jobs. You can find the background to that in our Selected Reading section. 

Selected Reading
AnyDesk, an enterprise remote software platform used by major firms including Raytheon and Samsung, suffered a security breach - here’s what you need to know (IT Pro)
Clorox and Johnson Controls Reveal $76m Cyber-Attack Bill (Infosecurity Magazine)
MIT student claims to hack Apple Vision Pro on launch day (Cybernews)
Finance worker pays out $25 million after video call with deepfake ‘chief financial officer’ (CNN)
FritzFrog botnet is exploiting Log4Shell bug now, experts say (The Record)
US sanctions Iranian officials over cyber-attacks on water plants (BBC)
The Nine Lives of Commando Cat: Analysing a Novel Malware Campaign Targeting Docker  (Cado Security)
Pennsylvania court agency's website hit by disabling cyberattack, officials say (ABC News)
Cyber Command, NSA usher in Haugh as new chief (The Record)
White House moves to ease education requirements for federal cyber contracting jobs (CyberScoop)
White House moves to ease education requirements for federal cyber contracting jobs (GAO)
David Kahn, historian who cracked the code of cryptology, dies at 93 (Washington Post)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 05 Feb 2024 21:10:00 -0000</pubDate>
      <itunes:title>A serious breach showdown.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1997</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Anydesk confirms a serious breach. Clorox and Johnson Controls file cyber incidents with the SEC. There’s already a potential Apple Vision Pro kernel exploit. A $25 million deepfake scam. Akamai research hops on the FritzFrog botnet. The US sanctions Iranians for attacks on American water plants. Commando Cat targets Docker API endpoints. Pennsylvania courts fall victim to a DDoS attack. A new leader takes the reins at US Cyber Command and the NSA. Our guest is Dr. Heather Monthie from N2K Networks, with insights on the White House's recent easing of education requirements for federal contract jobs. And remembering one of the great cryptology communicators. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
Guest Heather Monthie from N2K Networks shares some insight into the White House's recent easing of education requirements for federal contract jobs. You can find the background to that in our Selected Reading section. 

Selected Reading
AnyDesk, an enterprise remote software platform used by major firms including Raytheon and Samsung, suffered a security breach - here’s what you need to know (IT Pro)
Clorox and Johnson Controls Reveal $76m Cyber-Attack Bill (Infosecurity Magazine)
MIT student claims to hack Apple Vision Pro on launch day (Cybernews)
Finance worker pays out $25 million after video call with deepfake ‘chief financial officer’ (CNN)
FritzFrog botnet is exploiting Log4Shell bug now, experts say (The Record)
US sanctions Iranian officials over cyber-attacks on water plants (BBC)
The Nine Lives of Commando Cat: Analysing a Novel Malware Campaign Targeting Docker  (Cado Security)
Pennsylvania court agency's website hit by disabling cyberattack, officials say (ABC News)
Cyber Command, NSA usher in Haugh as new chief (The Record)
White House moves to ease education requirements for federal cyber contracting jobs (CyberScoop)
White House moves to ease education requirements for federal cyber contracting jobs (GAO)
David Kahn, historian who cracked the code of cryptology, dies at 93 (Washington Post)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Anydesk confirms a serious breach. Clorox and Johnson Controls file cyber incidents with the SEC. There’s already a potential Apple Vision Pro kernel exploit. A $25 million deepfake scam. Akamai research hops on the FritzFrog botnet. The US sanctions Iranians for attacks on American water plants. Commando Cat targets Docker API endpoints. Pennsylvania courts fall victim to a DDoS attack. A new leader takes the reins at US Cyber Command and the NSA. Our guest is Dr. Heather Monthie from N2K Networks, with insights on the White House's recent easing of education requirements for federal contract jobs. And remembering one of the great cryptology communicators. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/heathermonthie/">Heather Monthie</a> from <a href="https://www.n2k.com/talent-insights">N2K Networks</a> shares some insight into the White House's recent easing of education requirements for federal contract jobs. You can find the background to that in our Selected Reading section. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.itpro.com/security/cyber-attacks/anydesk-an-enterprise-remote-software-platform-used-by-major-firms-including-raytheon-and-samsung-suffered-a-security-breach-heres-what-you-need-to-know">AnyDesk, an enterprise remote software platform used by major firms including Raytheon and Samsung, suffered a security breach - here’s what you need to know</a> (IT Pro)</p><p><a href="https://www.infosecurity-magazine.com/news/clorox-johnson-controls-76m/">Clorox and Johnson Controls Reveal $76m Cyber-Attack Bill</a> (Infosecurity Magazine)</p><p><a href="https://cybernews.com/news/apple-vision-pro-kernel-exploit/?utm_source=mastodon&amp;utm_medium=social&amp;utm_campaign=cybernews&amp;utm_content=post">MIT student claims to hack Apple Vision Pro on launch day</a> (Cybernews)</p><p><a href="https://www.cnn.com/2024/02/04/asia/deepfake-cfo-scam-hong-kong-intl-hnk/index.html">Finance worker pays out $25 million after video call with deepfake ‘chief financial officer’</a> (CNN)</p><p><a href="https://therecord.media/botnet-fritzfrog-log4shell-exploitation-internal-networks">FritzFrog botnet is exploiting Log4Shell bug now, experts say</a> (The Record)</p><p><a href="https://www.bbc.com/news/world-us-canada-68186945">US sanctions Iranian officials over cyber-attacks on water plants</a> (BBC)</p><p><a href="https://www.cadosecurity.com/the-nine-lives-of-commando-cat-analysing-a-novel-malware-campaign-targeting-docker/">The Nine Lives of Commando Cat: Analysing a Novel Malware Campaign Targeting Docker </a> (Cado Security)</p><p><a href="https://abcnews.go.com/Technology/wireStory/pennsylvania-statewide-court-agencys-website-hit-disabling-cyberattack-106951921">Pennsylvania court agency's website hit by disabling cyberattack, officials say</a> (ABC News)</p><p><a href="https://therecord.media/cyber-command-nsa-usher-in-haugh-as-new-chief">Cyber Command, NSA usher in Haugh as new chief</a> (The Record)</p><p><a href="https://cyberscoop.com/harry-coker-education-requirements-federal-cybersecurity-jobs/">White House moves to ease education requirements for federal cyber contracting jobs </a>(CyberScoop)</p><p><a href="https://itvmo.gsa.gov/news/white-house-moves-to-ease-education-requirements-for-federal-cyber-contracting-jobs/#:~:text=Reducing%20Educational%20Barriers%3A%20Coker%20is,increase%20diversity%20within%20the%20field">White House moves to ease education requirements for federal cyber contracting jobs </a>(GAO)</p><p><a href="https://www.washingtonpost.com/obituaries/2024/02/01/david-kahn-codebreakers-nsa-dead/">David Kahn, historian who cracked the code of cryptology, dies at 93</a> (Washington Post)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1807</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e93216bc-b95d-11ee-adc6-932c64883da2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9883239639.mp3?updated=1707164344" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Bilyana Lilly: Turn challenges into opportunities. [Policy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/6/notes</link>
      <description>Cybersecurity and disinformation researcher Bilyana Lilly shares her career path from studying where she was always a foreigner to an expert on the Russian perspective. While studying international law in Kosovo, Bilyana realized there are no winners in war. Through her work, she hopes to bring a greater understanding of Russia's strategic thinking. Our thanks to Bilyana for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 04 Feb 2024 08:10:00 -0000</pubDate>
      <itunes:title>Encore: Bilyana Lilly: Turn challenges into opportunities. [Policy] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>6</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cybersecurity and disinformation researcher Bilyana Lilly shares her career path from studying where she was always a foreigner to an expert on the Russian perspective. While studying international law in Kosovo, Bilyana realized there are no winners in war. Through her work, she hopes to bring a greater understanding of Russia's strategic thinking. Our thanks to Bilyana for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cybersecurity and disinformation researcher Bilyana Lilly shares her career path from studying where she was always a foreigner to an expert on the Russian perspective. While studying international law in Kosovo, Bilyana realized there are no winners in war. Through her work, she hopes to bring a greater understanding of Russia's strategic thinking. Our thanks to Bilyana for sharing her story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>340</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c19a0702-c20b-11ee-a05a-6fa80053b2c1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1358975465.mp3?updated=1706906817" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Weathering the internet storm. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/315/notes</link>
      <description>Johannes Ullrich from SANS talking about the Internet Storm Center and how they do research. Internet Storm Center was created as a mix of manual reports submitted by security analysts during Y2K and automated firewall collection started by DShield.
The research shares how SANS used their "agile honeypots" to "zoom in" on events to more effectively collect data targeting specific vulnerabilities. Internet Storm Center has been noted on three separate attacks that were observed.
The research can be found here:

Jenkins Brute Force Scans

Scans for Ivanti Connect "Secure" VPN Vulnerability (CVE-2023-46805, CVE-2024-21887)

Scans/Exploit Attempts for Atlassian Confluence RCE Vulnerability CVE-2023-22527


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Feb 2024 08:10:00 -0000</pubDate>
      <itunes:title>Weathering the internet storm. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>315</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Johannes Ullrich from SANS talking about the Internet Storm Center and how they do research. Internet Storm Center was created as a mix of manual reports submitted by security analysts during Y2K and automated firewall collection started by DShield.
The research shares how SANS used their "agile honeypots" to "zoom in" on events to more effectively collect data targeting specific vulnerabilities. Internet Storm Center has been noted on three separate attacks that were observed.
The research can be found here:

Jenkins Brute Force Scans

Scans for Ivanti Connect "Secure" VPN Vulnerability (CVE-2023-46805, CVE-2024-21887)

Scans/Exploit Attempts for Atlassian Confluence RCE Vulnerability CVE-2023-22527


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Johannes Ullrich from SANS talking about the Internet Storm Center and how they do research. Internet Storm Center was created as a mix of manual reports submitted by security analysts during Y2K and automated firewall collection started by DShield.</p><p>The research shares how SANS used their "agile honeypots" to "zoom in" on events to more effectively collect data targeting specific vulnerabilities. Internet Storm Center has been noted on three separate attacks that were observed.</p><p>The research can be found here:</p><ul>
<li><a href="https://isc.sans.edu/diary/Jenkins+Brute+Force+Scans/30546/">Jenkins Brute Force Scans</a></li>
<li><a href="https://isc.sans.edu/diary/Scans+for+Ivanti+Connect+Secure+VPN+Vulnerability+CVE202346805+CVE202421887/30562/">Scans for Ivanti Connect "Secure" VPN Vulnerability (CVE-2023-46805, CVE-2024-21887)</a></li>
<li><a href="https://isc.sans.edu/diary/Scans%20Exploit%20Attempts%20for%20Atlassian%20Confluence%20RCE%20Vulnerability%20CVE-2023-22527/30576">Scans/Exploit Attempts for Atlassian Confluence RCE Vulnerability CVE-2023-22527</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1417</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7a947420-c1fa-11ee-8efa-db15b8fa14b1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3667163966.mp3?updated=1706898347" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A digital leaker gets 40 years behind bars.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1996/notes</link>
      <description>Former CIA leaker sentenced to 40 years. Interpol arrests suspected cybercriminals and takes down servers. Cloudflare discloses a Thanksgiving Day data breach. The FBI removes malware from outdated routers. President Biden plans to veto a Republican-led bill overturning cyber disclosure rules. Attackers target poorly managed Linux systems. Infected USB devices take advantage of popular websites for malware distribution. Blackbaud faces a data deletion mandate from the FTC. Our guest is Adam Marré, CISO of Arctic Wolf, to kick off our continuing discussion of 2024 election security. A cybersecurity incident in Georgia leads to a murder suspect on the run.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Adam Marré, CISO of Arctic Wolf, joins us to begin our discussion of election security in 2024. Adam will be sharing their Election Cybersecurity Survey outlining key cybersecurity threats to the 2024 election season. 

Selected Reading
40 years in prison for ex-CIA coder who leaked hacking tools to WikiLeaks (Digital Journey)
Interpol arrests more than 30 cybercriminals in global ‘Synergia’ operation (The Record)
Cloudflare Hacked After State Actor Leverages Okta Breach (HACKREAD)
FBI removes malware from hundreds of routers across the US (Malwarebytes)
Biden to Veto Attempt to Overturn SEC Cyber Incident Disclosure Rules (SecurityWeek)
Threat Actors Installing Linux Backdoor Accounts (ASEC)
USB Malware Chained with Text Strings on Legitimate Websites Attacks Users (Cybersecurity News)
FTC settles with Blackbaud over poor data practices leading to massive hack (The Record)
Murder suspect mistakenly released from jail after 'cybersecurity incident'  (ABC News)  

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 02 Feb 2024 21:10:00 -0000</pubDate>
      <itunes:title>A digital leaker gets 40 years behind bars.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1996</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Former CIA leaker sentenced to 40 years. Interpol arrests suspected cybercriminals and takes down servers. Cloudflare discloses a Thanksgiving Day data breach. The FBI removes malware from outdated routers. President Biden plans to veto a Republican-led bill overturning cyber disclosure rules. Attackers target poorly managed Linux systems. Infected USB devices take advantage of popular websites for malware distribution. Blackbaud faces a data deletion mandate from the FTC. Our guest is Adam Marré, CISO of Arctic Wolf, to kick off our continuing discussion of 2024 election security. A cybersecurity incident in Georgia leads to a murder suspect on the run.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Adam Marré, CISO of Arctic Wolf, joins us to begin our discussion of election security in 2024. Adam will be sharing their Election Cybersecurity Survey outlining key cybersecurity threats to the 2024 election season. 

Selected Reading
40 years in prison for ex-CIA coder who leaked hacking tools to WikiLeaks (Digital Journey)
Interpol arrests more than 30 cybercriminals in global ‘Synergia’ operation (The Record)
Cloudflare Hacked After State Actor Leverages Okta Breach (HACKREAD)
FBI removes malware from hundreds of routers across the US (Malwarebytes)
Biden to Veto Attempt to Overturn SEC Cyber Incident Disclosure Rules (SecurityWeek)
Threat Actors Installing Linux Backdoor Accounts (ASEC)
USB Malware Chained with Text Strings on Legitimate Websites Attacks Users (Cybersecurity News)
FTC settles with Blackbaud over poor data practices leading to massive hack (The Record)
Murder suspect mistakenly released from jail after 'cybersecurity incident'  (ABC News)  

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Former CIA leaker sentenced to 40 years. Interpol arrests suspected cybercriminals and takes down servers. Cloudflare discloses a Thanksgiving Day data breach. The FBI removes malware from outdated routers. President Biden plans to veto a Republican-led bill overturning cyber disclosure rules. Attackers target poorly managed Linux systems. Infected USB devices take advantage of popular websites for malware distribution. Blackbaud faces a data deletion mandate from the FTC. Our guest is Adam Marré, CISO of Arctic Wolf, to kick off our continuing discussion of 2024 election security. A cybersecurity incident in Georgia leads to a murder suspect on the run.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/adam-marre/">Adam Marré</a>, CISO of <a href="https://arcticwolf.com/">Arctic Wolf</a>, joins us to begin our discussion of election security in 2024. Adam will be sharing their <a href="https://arcticwolf.com/resources/blog/behind-the-ballot-insights-from-arctic-wolfs-2024-election-security-survey/">Election Cybersecurity Survey</a> outlining key cybersecurity threats to the 2024 election season. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.digitaljournal.com/tech-science/40-years-in-prison-for-ex-cia-coder-who-leaked-hacking-tools-to-wikileaks/article">40 years in prison for ex-CIA coder who leaked hacking tools to WikiLeaks</a> (Digital Journey)</p><p><a href="https://therecord.media/interpol-arrests-cybercriminals-in-large-operation">Interpol arrests more than 30 cybercriminals in global ‘Synergia’ operation</a> (The Record)</p><p><a href="https://www.hackread.com/cloudflare-hacked-state-actor-okta-breach/">Cloudflare Hacked After State Actor Leverages Okta Breach</a> (HACKREAD)</p><p><a href="https://www.malwarebytes.com/blog/news/2024/02/fbi-removes-malware-from-hundreds-of-routers-across-the-us">FBI removes malware from hundreds of routers across the US</a> (Malwarebytes)</p><p><a href="https://www.securityweek.com/biden-to-veto-attempt-to-overturn-sec-cyber-incident-disclosure-rules/">Biden to Veto Attempt to Overturn SEC Cyber Incident Disclosure Rules </a>(SecurityWeek)</p><p><a href="https://asec.ahnlab.com/en/61185/">Threat Actors Installing Linux Backdoor Accounts</a> (ASEC)</p><p><a href="https://cybersecuritynews.com/usb-malware-with-text-strings/">USB Malware Chained with Text Strings on Legitimate Websites Attacks Users</a> (Cybersecurity News)</p><p><a href="https://therecord.media/ftc-settles-with-blackbaud-over-data-handling-breach">FTC settles with Blackbaud over poor data practices leading to massive hack</a> (The Record)</p><p><a href="https://abcnews.go.com/US/police-searching-murder-suspect-mistakenly-released-georgia-jail/story?id=106867348">Murder suspect mistakenly released from jail after 'cybersecurity incident' </a> (ABC News)  </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1612</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e8f6fdd4-b95d-11ee-adc6-0321456250ab]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5658438784.mp3?updated=1706905442" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Defending America against China's ominous onslaught.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1995/notes</link>
      <description>Directors Wray and Easterly warn congress of threats from Chinese hackers. Myanmar authorities extradite pig butchering suspects. Automation remains a challenge. Snyk Security Labs plugs holes in “Leaky Vessels.” Pegasus spyware targets human rights groups in Jordan. Subtle-paws scratch at Ukrainian military personnel. White Phoenix brings your ransomed files back from the ashes. In today’s Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, speaks with MDR Senior Manager Oded Awaskar, about how AI might change the world of security operations and threat-hunting. A wee lil trick for bypassing Chat GPT guardrails.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In today’s segment of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, speaks with Oded Awaskar, an MDR Senior Manager, about threat-hunting and how AI and ML might change the world of security operations and threat-hunting. Tune in to Palo Alto Networks’ biweekly Threat Vector podcast on our network for the full conversation.
If you are interested to learn more about Unit 42 World-Renowned threat hunters, visit https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting and https://www.paloaltonetworks.com/unit42/respond/managed-detection-response
In coming episodes, David will discuss the impact of the SEC Cyber Rules with Jacqueline Wudyka and share a conversation with Sam Rubin, Global Head of Operations for Unit 42, about his testimony at the Congressional hearing on the growing threat of ransomware.

Selected Reading
Wray warns Chinese hackers are aiming to 'wreak havoc' on U.S. critical infrastructure (NPR)
FBI director warns Chinese hackers aim to 'wreak havoc' on U.S. critical infrastructure (NBC News)
Opening Statement by CISA Director Jen Easterly (CISA on YouTube)
FBI issues dramatic public warning: Chinese hackers are preparing to 'wreak havoc' on the US (CNN on YouTube) 
CISA orders federal agencies to disconnect Ivanti VPN appliances by Saturday (Bleeping Computer)
iPhone Under Attack: U.S. Government Issues 21 Days To Comply Warning (Forbes)
Why Are Cybersecurity Automation Projects Failing? (Security Week)
Crime bosses behind Myanmar cyber ‘fraud dens’ handed over to Chinese government (The Record)
Leaky Vessels: Docker and runc Container Breakout Vulnerabilities (Snyk)
At Least 30 Journalists, Lawyers and Activists Hacked With Pegasus in Jordan, Forensic Probe Finds (SecurityWeek)
Online ransomware decryptor helps recover partially encrypted files (Bleeping Computer)
Analysis and Detection of STEADY#URSA Attack Campaign Targeting Ukraine Military Dropping New Covert SUBTLE-PAWS PowerShell Backdoor (Securonix)
OpenAI's GPT-4 safety systems broken by Scots Gaelic (The Register)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 01 Feb 2024 21:10:00 -0000</pubDate>
      <itunes:title>Defending America against China's ominous onslaught.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1995</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Directors Wray and Easterly warn congress of threats from Chinese hackers. Myanmar authorities extradite pig butchering suspects. Automation remains a challenge. Snyk Security Labs plugs holes in “Leaky Vessels.” Pegasus spyware targets human rights groups in Jordan. Subtle-paws scratch at Ukrainian military personnel. White Phoenix brings your ransomed files back from the ashes. In today’s Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, speaks with MDR Senior Manager Oded Awaskar, about how AI might change the world of security operations and threat-hunting. A wee lil trick for bypassing Chat GPT guardrails.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In today’s segment of Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, speaks with Oded Awaskar, an MDR Senior Manager, about threat-hunting and how AI and ML might change the world of security operations and threat-hunting. Tune in to Palo Alto Networks’ biweekly Threat Vector podcast on our network for the full conversation.
If you are interested to learn more about Unit 42 World-Renowned threat hunters, visit https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting and https://www.paloaltonetworks.com/unit42/respond/managed-detection-response
In coming episodes, David will discuss the impact of the SEC Cyber Rules with Jacqueline Wudyka and share a conversation with Sam Rubin, Global Head of Operations for Unit 42, about his testimony at the Congressional hearing on the growing threat of ransomware.

Selected Reading
Wray warns Chinese hackers are aiming to 'wreak havoc' on U.S. critical infrastructure (NPR)
FBI director warns Chinese hackers aim to 'wreak havoc' on U.S. critical infrastructure (NBC News)
Opening Statement by CISA Director Jen Easterly (CISA on YouTube)
FBI issues dramatic public warning: Chinese hackers are preparing to 'wreak havoc' on the US (CNN on YouTube) 
CISA orders federal agencies to disconnect Ivanti VPN appliances by Saturday (Bleeping Computer)
iPhone Under Attack: U.S. Government Issues 21 Days To Comply Warning (Forbes)
Why Are Cybersecurity Automation Projects Failing? (Security Week)
Crime bosses behind Myanmar cyber ‘fraud dens’ handed over to Chinese government (The Record)
Leaky Vessels: Docker and runc Container Breakout Vulnerabilities (Snyk)
At Least 30 Journalists, Lawyers and Activists Hacked With Pegasus in Jordan, Forensic Probe Finds (SecurityWeek)
Online ransomware decryptor helps recover partially encrypted files (Bleeping Computer)
Analysis and Detection of STEADY#URSA Attack Campaign Targeting Ukraine Military Dropping New Covert SUBTLE-PAWS PowerShell Backdoor (Securonix)
OpenAI's GPT-4 safety systems broken by Scots Gaelic (The Register)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Directors Wray and Easterly warn congress of threats from Chinese hackers. Myanmar authorities extradite pig butchering suspects. Automation remains a challenge. Snyk Security Labs plugs holes in “Leaky Vessels.” Pegasus spyware targets human rights groups in Jordan. Subtle-paws scratch at Ukrainian military personnel. White Phoenix brings your ransomed files back from the ashes. In today’s Threat Vector, host David Moulton, Director of Thought Leadership at Unit 42, speaks with MDR Senior Manager Oded Awaskar, about how AI might change the world of security operations and threat-hunting. A wee lil trick for bypassing Chat GPT guardrails.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>In today’s segment of Threat Vector, host <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a>, Director of Thought Leadership at Unit 42, speaks with <a href="https://www.linkedin.com/in/oa82547610a/">Oded Awaskar</a>, an MDR Senior Manager, about threat-hunting and how AI and ML might change the world of security operations and threat-hunting. Tune in to Palo Alto Networks’ biweekly <a href="https://thecyberwire.com/podcasts/threat-vector/14/notes">Threat Vector</a> podcast on our network for the full conversation.</p><p>If you are interested to learn more about Unit 42 World-Renowned threat hunters, visit<a href="https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting"> https://www.paloaltonetworks.com/unit42/respond/managed-threat-hunting</a> and<a href="https://www.paloaltonetworks.com/unit42/respond/managed-detection-response"> https://www.paloaltonetworks.com/unit42/respond/managed-detection-response</a></p><p>In coming episodes, David will discuss the impact of the SEC Cyber Rules with <a href="https://www.linkedin.com/in/jacquelinewudyka/">Jacqueline Wudyka</a> and share a conversation with <a href="https://www.linkedin.com/in/samsrubin/">Sam Rubin</a>, Global Head of Operations for Unit 42, about <a href="https://www.paloaltonetworks.com/blog/2023/09/combating-ransomware-attacks-insights/">his testimony at the Congressional hearing on the growing threat of ransomware</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.npr.org/2024/01/31/1228153857/wray-chinese-hackers-national-security">Wray warns Chinese hackers are aiming to 'wreak havoc' on U.S. critical infrastructure</a> (NPR)</p><p><a href="https://www.nbcnews.com/news/amp/rcna136524">FBI director warns Chinese hackers aim to 'wreak havoc' on U.S. critical infrastructure</a> (NBC News)</p><p><a href="https://m.youtube.com/watch?si=VUfyigd_I8XMh2jM&amp;v=kWFihTC2pOs&amp;feature=youtu.be">Opening Statement by CISA Director Jen Easterly</a> (CISA on YouTube)</p><p><a href="https://youtu.be/prsWw4q8XOM">FBI issues dramatic public warning: Chinese hackers are preparing to 'wreak havoc' on the US</a> (CNN on YouTube) </p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-federal-agencies-to-disconnect-ivanti-vpn-appliances-by-saturday/">CISA orders federal agencies to disconnect Ivanti VPN appliances by Saturday</a> (Bleeping Computer)</p><p><a href="https://www.forbes.com/sites/daveywinder/2024/02/01/iphone-under-attack-us-government-issues-21-days-to-comply-warning/">iPhone Under Attack: U.S. Government Issues 21 Days To Comply Warning</a> (Forbes)</p><p><a href="https://www.securityweek.com/why-are-cybersecurity-automation-projects-failing/">Why Are Cybersecurity Automation Projects Failing?</a> (Security Week)</p><p><a href="https://therecord.media/myanmar-hands-over-cyber-crime-bosses-to-china">Crime bosses behind Myanmar cyber ‘fraud dens’ handed over to Chinese government</a> (The Record)</p><p><a href="https://snyk.io/blog/leaky-vessels-docker-runc-container-breakout-vulnerabilities/">Leaky Vessels: Docker and runc Container Breakout Vulnerabilities </a>(Snyk)</p><p><a href="https://www.securityweek.com/at-least-30-journalists-lawyers-and-activists-hacked-with-pegasus-in-jordan-forensic-probe-finds/">At Least 30 Journalists, Lawyers and Activists Hacked With Pegasus in Jordan, Forensic Probe Finds</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/online-ransomware-decryptor-helps-recover-partially-encrypted-files/">Online ransomware decryptor helps recover partially encrypted files</a> (Bleeping Computer)</p><p><a href="https://www.securonix.com/blog/security-advisory-steadyursa-attack-campaign-targets-ukraine-military/">Analysis and Detection of STEADY#URSA Attack Campaign Targeting Ukraine Military Dropping New Covert SUBTLE-PAWS PowerShell Backdoor</a> (Securonix)</p><p><a href="https://www.theregister.com/2024/01/31/gpt4_gaelic_safety/">OpenAI's GPT-4 safety systems broken by Scots Gaelic</a> (The Register)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1778</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e8baca58-b95d-11ee-adc6-83125ce0b8d9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8079093313.mp3?updated=1706820018" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>VPN compromise causes concerns.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1994/notes</link>
      <description>Global Affairs Canada investigates a major data breach. New York sues Citibank over inadequate online security. Alpha ransomware launches a dedicated leak site on the dark web. A leaked database with 50 million records may or may not be real. CISA and the FBI provide guidance for SOHO routers.Patch ‘em if ya got ‘em. Krustyloader exploits Ivanti weaknesses. Unit 42 tracks a large-scale scareware campaign. Alex Stamos calls Microsoft’s security strategies “morally indefensible.” Our guests are Gianna Whitver and Maria Velasquez from the Cybersecurity Marketing Society to talk about their new podcast "Breaking Through in Cybersecurity Marketing." And do you have what it takes to protect his majesty’s royal laptop?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guests Gianna Whitver and Maria Velasquez from the Cybersecurity Marketing Society join Dave to share about their podcast "Breaking Through in Cybersecurity Marketing" that is joining the N2K network. You can listen to their newest episode on our network. 

Selected Reading
Global Affairs investigating 'malicious' hack after VPN compromised for over one month (National Post) 
Lawsuit: Citibank refused to reimburse scam victims who lost “life savings”  (Ars Technica)
Unveiling Alpha Ransomware: A Deep Dive into Its Operations (Netenrich)
Nearly 50 million Europcar customer records put up for sale on the dark web – or were they? (ITPro)
Apple and Google Just Patched Their First Zero-Day Flaws of the Year (WIRED)
Threat actors exploit Ivanti VPN bugs to deploy KrustyLoader Malware (Security Affairs)
ApateWeb: An Evasive Large-Scale Scareware and PUP Delivery Campaign (Palo Alto Networks)
Microsoft's Dangerous Addiction To Security Revenue (LinkedIn)
Be the Royal Family’s Cybersecurity Manager, and get a cut-price honey dipper! (Graham Cluley) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 31 Jan 2024 21:30:00 -0000</pubDate>
      <itunes:title>VPN compromise causes concerns.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1994</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Global Affairs Canada investigates a major data breach. New York sues Citibank over inadequate online security. Alpha ransomware launches a dedicated leak site on the dark web. A leaked database with 50 million records may or may not be real. CISA and the FBI provide guidance for SOHO routers.Patch ‘em if ya got ‘em. Krustyloader exploits Ivanti weaknesses. Unit 42 tracks a large-scale scareware campaign. Alex Stamos calls Microsoft’s security strategies “morally indefensible.” Our guests are Gianna Whitver and Maria Velasquez from the Cybersecurity Marketing Society to talk about their new podcast "Breaking Through in Cybersecurity Marketing." And do you have what it takes to protect his majesty’s royal laptop?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guests Gianna Whitver and Maria Velasquez from the Cybersecurity Marketing Society join Dave to share about their podcast "Breaking Through in Cybersecurity Marketing" that is joining the N2K network. You can listen to their newest episode on our network. 

Selected Reading
Global Affairs investigating 'malicious' hack after VPN compromised for over one month (National Post) 
Lawsuit: Citibank refused to reimburse scam victims who lost “life savings”  (Ars Technica)
Unveiling Alpha Ransomware: A Deep Dive into Its Operations (Netenrich)
Nearly 50 million Europcar customer records put up for sale on the dark web – or were they? (ITPro)
Apple and Google Just Patched Their First Zero-Day Flaws of the Year (WIRED)
Threat actors exploit Ivanti VPN bugs to deploy KrustyLoader Malware (Security Affairs)
ApateWeb: An Evasive Large-Scale Scareware and PUP Delivery Campaign (Palo Alto Networks)
Microsoft's Dangerous Addiction To Security Revenue (LinkedIn)
Be the Royal Family’s Cybersecurity Manager, and get a cut-price honey dipper! (Graham Cluley) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Global Affairs Canada investigates a major data breach. New York sues Citibank over inadequate online security. Alpha ransomware launches a dedicated leak site on the dark web. A leaked database with 50 million records may or may not be real. CISA and the FBI provide guidance for SOHO routers.Patch ‘em if ya got ‘em. Krustyloader exploits Ivanti weaknesses. Unit 42 tracks a large-scale scareware campaign. Alex Stamos calls Microsoft’s security strategies “morally indefensible.” Our guests are Gianna Whitver and Maria Velasquez from the Cybersecurity Marketing Society to talk about their new podcast "Breaking Through in Cybersecurity Marketing." And do you have what it takes to protect his majesty’s royal laptop?</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guests <a href="https://www.linkedin.com/in/giannawhitver/">Gianna Whitver</a> and <a href="https://www.linkedin.com/in/maria-vepa/">Maria Velasquez</a> from the <a href="https://cybersecuritymarketingsociety.com/">Cybersecurity Marketing Society</a> join Dave to share about their podcast "<a href="https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing">Breaking Through in Cybersecurity Marketing</a>" that is joining the N2K network. You can listen to their <a href="https://thecyberwire.com/podcasts/breaking-through-in-cybersecurity-marketing/101/notes">newest episode</a> on our network. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://nationalpost.com/news/canada/global-affairs-vpn-data-breach">Global Affairs investigating 'malicious' hack after VPN compromised for over one month</a> (National Post) </p><p><a href="https://arstechnica.com/tech-policy/2024/01/lawsuit-citibank-refused-to-reimburse-scam-victims-who-lost-life-savings/">Lawsuit: Citibank refused to reimburse scam victims who lost “life savings”</a>  (Ars Technica)</p><p><a href="https://netenrich.com/blog/alpha-ransomware-a-deep-dive-into-its-operations">Unveiling Alpha Ransomware: A Deep Dive into Its Operations</a> (Netenrich)</p><p><a href="https://www.itpro.com/security/nearly-50-million-europcar-customer-records-put-up-for-sale-on-the-dark-web-or-were-they">Nearly 50 million Europcar customer records put up for sale on the dark web – or were they?</a> (ITPro)</p><p><a href="https://www.wired.com/story/apple-google-zero-day-flaws-critical-update-january-2024/">Apple and Google Just Patched Their First Zero-Day Flaws of the Year</a> (WIRED)</p><p><a href="https://securityaffairs.com/158393/malware/ivanti-connect-secure-vpn-deliver-krustyloader.html">Threat actors exploit Ivanti VPN bugs to deploy KrustyLoader Malware</a> (Security Affairs)</p><p><a href="https://unit42.paloaltonetworks.com/apateweb-scareware-pup-delivery-campaign/">ApateWeb: An Evasive Large-Scale Scareware and PUP Delivery Campaign</a> (Palo Alto Networks)</p><p><a href="https://www.linkedin.com/pulse/microsofts-dangerous-addiction-security-revenue-alex-stamos-1ukzc">Microsoft's Dangerous Addiction To Security Revenue</a> (LinkedIn)</p><p><a href="https://grahamcluley.com/be-the-royal-familys-cybersecurity-manager-and-get-a-cut-price-honey-dipper/">Be the Royal Family’s Cybersecurity Manager, and get a cut-price honey dipper!</a> (Graham Cluley) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1685</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e881b2c2-b95d-11ee-adc6-9b1c0e3604c6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5058157638.mp3?updated=1706734567" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A Typhoon counter.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1993/notes</link>
      <description>The U.S. counters a Chinese hacking campaign. Juniper issues out of band patches. Schneider Electric suffers a ransomware attack. Over a million and a half individuals are affected by an insurance consulting firm breach. AT&amp;T finds DarkGate malware leveraging Microsoft teams. The White House is set to require AI developers to share safety test results. Resecurity finds high level credentials posted online. Zscaler says Zloader malware is back. The Georgia county prosecuting former President Trump got hit with a cyberattack. Microsoft’s Ann Johnson speaks with guest Deneen DeFiore, Vice President and Chief Information Security Officer at United Airlines, about cybersecurity at 35,000 feet. And yesterday’s airborne joker is off the hook. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Ann Johnson, host of Microsoft Security’s Afternoon Cyber Tea podcast, talks with guest Deneen DeFiore, Vice President and Chief Information Security Officer at United Airlines, about cybersecurity at 35,000 feet.

Selected Reading
Exclusive: US disabled Chinese hacking network targeting critical infrastructure (Reuters)
China-Linked Hackers Target Myanmar's Top Ministries with Backdoor Blitz (The Hacker News)
Juniper Networks Releases Urgent Junos OS Updates for High-Severity Flaws (The Hacker News)
Schneider Electric confirms it was hit by ransomware attack (Silicon Republic)
1.5 Million Affected by Data Breach at Insurance Broker Keenan &amp; Associates (SecurityWeek)
DarkGate malware delivered via Microsoft Teams - detection and response (AT&amp;T)
AI companies will need to start reporting their safety tests to the US government (AP)
Hundreds of network operators’ credentials found circulating in Dark Web (Security Affairs)
New ZLoader Malware Variant Surfaces with 64-bit Windows Compatibility (The Hacker News)
Cyberattack Hits Georgia County Where Trump Is Charged (Bloomberg)
British man acquitted over London-Spain flight bomb hoax (BBC)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Jan 2024 21:10:00 -0000</pubDate>
      <itunes:title>A Typhoon counter.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1993</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The U.S. counters a Chinese hacking campaign. Juniper issues out of band patches. Schneider Electric suffers a ransomware attack. Over a million and a half individuals are affected by an insurance consulting firm breach. AT&amp;T finds DarkGate malware leveraging Microsoft teams. The White House is set to require AI developers to share safety test results. Resecurity finds high level credentials posted online. Zscaler says Zloader malware is back. The Georgia county prosecuting former President Trump got hit with a cyberattack. Microsoft’s Ann Johnson speaks with guest Deneen DeFiore, Vice President and Chief Information Security Officer at United Airlines, about cybersecurity at 35,000 feet. And yesterday’s airborne joker is off the hook. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Ann Johnson, host of Microsoft Security’s Afternoon Cyber Tea podcast, talks with guest Deneen DeFiore, Vice President and Chief Information Security Officer at United Airlines, about cybersecurity at 35,000 feet.

Selected Reading
Exclusive: US disabled Chinese hacking network targeting critical infrastructure (Reuters)
China-Linked Hackers Target Myanmar's Top Ministries with Backdoor Blitz (The Hacker News)
Juniper Networks Releases Urgent Junos OS Updates for High-Severity Flaws (The Hacker News)
Schneider Electric confirms it was hit by ransomware attack (Silicon Republic)
1.5 Million Affected by Data Breach at Insurance Broker Keenan &amp; Associates (SecurityWeek)
DarkGate malware delivered via Microsoft Teams - detection and response (AT&amp;T)
AI companies will need to start reporting their safety tests to the US government (AP)
Hundreds of network operators’ credentials found circulating in Dark Web (Security Affairs)
New ZLoader Malware Variant Surfaces with 64-bit Windows Compatibility (The Hacker News)
Cyberattack Hits Georgia County Where Trump Is Charged (Bloomberg)
British man acquitted over London-Spain flight bomb hoax (BBC)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The U.S. counters a Chinese hacking campaign. Juniper issues out of band patches. Schneider Electric suffers a ransomware attack. Over a million and a half individuals are affected by an insurance consulting firm breach. AT&amp;T finds DarkGate malware leveraging Microsoft teams. The White House is set to require AI developers to share safety test results. Resecurity finds high level credentials posted online. Zscaler says Zloader malware is back. The Georgia county prosecuting former President Trump got hit with a cyberattack. Microsoft’s Ann Johnson speaks with guest Deneen DeFiore, Vice President and Chief Information Security Officer at United Airlines, about cybersecurity at 35,000 feet. And yesterday’s airborne joker is off the hook. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Ann Johnson, host of Microsoft Security’s Afternoon Cyber Tea podcast, talks with guest Deneen DeFiore, Vice President and Chief Information Security Officer at United Airlines, about cybersecurity at 35,000 feet.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.reuters.com/world/us/us-disabled-chinese-hacking-network-targeting-critical-infrastructure-sources-2024-01-29/">Exclusive: US disabled Chinese hacking network targeting critical infrastructure</a> (Reuters)</p><p><a href="https://thehackernews.com/2024/01/china-linked-hackers-target-myanmars.html">China-Linked Hackers Target Myanmar's Top Ministries with Backdoor Blitz</a> (The Hacker News)</p><p><a href="https://thehackernews.com/2024/01/juniper-networks-releases-urgent-junos.html">Juniper Networks Releases Urgent Junos OS Updates for High-Severity Flaws</a> (The Hacker News)</p><p><a href="https://www.siliconrepublic.com/enterprise/schneider-electric-sustainability-cactus-ransomware">Schneider Electric confirms it was hit by ransomware attack</a> (Silicon Republic)</p><p><a href="https://www.securityweek.com/1-5-million-affected-by-data-breach-at-insurance-broker-keenan-associates/">1.5 Million Affected by Data Breach at Insurance Broker Keenan &amp; Associates</a> (SecurityWeek)</p><p><a href="https://cybersecurity.att.com/blogs/security-essentials/darkgate-malware-delivered-via-microsoft-teams-detection-and-response">DarkGate malware delivered via Microsoft Teams - detection and response</a> (AT&amp;T)</p><p><a href="https://apnews.com/article/biden-ai-artificial-intelligence-safe-395591bcde523416db88767fa54f30f5">AI companies will need to start reporting their safety tests to the US government</a> (AP)</p><p><a href="https://securityaffairs.com/158329/cyber-crime/network-operators-credentials-found-in-dark-web.html">Hundreds of network operators’ credentials found circulating in Dark Web</a> (Security Affairs)</p><p><a href="https://thehackernews.com/2024/01/new-zloader-malware-variant-surfaces.html">New ZLoader Malware Variant Surfaces with 64-bit Windows Compatibility</a> (The Hacker News)</p><p><a href="https://www.bloomberg.com/news/articles/2024-01-29/cyberattack-hits-georgia-county-where-trump-is-charged">Cyberattack Hits Georgia County Where Trump Is Charged</a> (Bloomberg)</p><p><a href="https://www.bbc.com/news/world-europe-68099669">British man acquitted over London-Spain flight bomb hoax</a> (BBC)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show.</p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1406</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e846199c-b95d-11ee-adc6-4f5ec5aceee9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4729663005.mp3?updated=1706644510" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Seeking dismissal of SEC allegations.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1992/notes</link>
      <description>Solarwinds seeks dismissal of SEC allegations. Urgent calls to implement fixes for Jenkins open-source software automation tools. A New Jersey township closes schools and offices after a cyberattack. The Centre for Cybersecurity Belgium warns of a critical vulnerability in GitLab. The FBI arrests a notorious swatter. HHS releases cybersecurity performance goals. The feds remind organizations to preserve online messaging. Mercedes-Benz exposes data after an authentication token was left unsecured. A dark web drug dealer pleads guilty. Our guest is Caleb Barlow from Cyberbit, discussing hacker celebrities and why yours truly did not make the list. And threats of airport terrorism on public WiFi is no joking matter.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Podcast partner Caleb Barlow, CEO of Cyberbit, discusses hacker celebrities and why our own Dave Bittner did not make the list.

Selected Reading
SolarWinds Seeks Dismissal of ‘Unfounded’ SEC Cybersecurity Suit  (Bloomberg Law)
Fix Available for Critical Jenkins Flaw That Leads to RCE Attacks (Security Boulevard)
Freehold Township district: All schools and offices closed Monday due to cybersecurity incident (News12 New Jersey)
WARNING: CRITICAL ARBITRARY FILE WRITE VULNERABILITY IN GITLAB CE/EE, PATCH IMMEDIATELY! (Centre for Cybersecurity Belgium)
Police Arrest Teen Said to Be Linked to Hundreds of Swatting Attacks (WIRED)
HHS debuts voluntary cybersecurity performance goals to enhance healthcare sector resilience (Industrial Cyber)
Don’t Delete Slack or Signal Chats, US Agencies Warn Companies (Bloomberg Law)
How a mistakenly published password exposed Mercedes-Benz source code (TechCrunch)
Dark Web Drugs Vendor Forfeits $150m After Guilty Plea (Infosecurity Magazine)
‘On My Way to Blow Up the Plane’: Teen Faces Huge Fine After Joke Leads to Fighter Jets Scrambling (Gizmodo)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 29 Jan 2024 21:10:00 -0000</pubDate>
      <itunes:title>Seeking dismissal of SEC allegations.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1992</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Solarwinds seeks dismissal of SEC allegations. Urgent calls to implement fixes for Jenkins open-source software automation tools. A New Jersey township closes schools and offices after a cyberattack. The Centre for Cybersecurity Belgium warns of a critical vulnerability in GitLab. The FBI arrests a notorious swatter. HHS releases cybersecurity performance goals. The feds remind organizations to preserve online messaging. Mercedes-Benz exposes data after an authentication token was left unsecured. A dark web drug dealer pleads guilty. Our guest is Caleb Barlow from Cyberbit, discussing hacker celebrities and why yours truly did not make the list. And threats of airport terrorism on public WiFi is no joking matter.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Podcast partner Caleb Barlow, CEO of Cyberbit, discusses hacker celebrities and why our own Dave Bittner did not make the list.

Selected Reading
SolarWinds Seeks Dismissal of ‘Unfounded’ SEC Cybersecurity Suit  (Bloomberg Law)
Fix Available for Critical Jenkins Flaw That Leads to RCE Attacks (Security Boulevard)
Freehold Township district: All schools and offices closed Monday due to cybersecurity incident (News12 New Jersey)
WARNING: CRITICAL ARBITRARY FILE WRITE VULNERABILITY IN GITLAB CE/EE, PATCH IMMEDIATELY! (Centre for Cybersecurity Belgium)
Police Arrest Teen Said to Be Linked to Hundreds of Swatting Attacks (WIRED)
HHS debuts voluntary cybersecurity performance goals to enhance healthcare sector resilience (Industrial Cyber)
Don’t Delete Slack or Signal Chats, US Agencies Warn Companies (Bloomberg Law)
How a mistakenly published password exposed Mercedes-Benz source code (TechCrunch)
Dark Web Drugs Vendor Forfeits $150m After Guilty Plea (Infosecurity Magazine)
‘On My Way to Blow Up the Plane’: Teen Faces Huge Fine After Joke Leads to Fighter Jets Scrambling (Gizmodo)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Solarwinds seeks dismissal of SEC allegations. Urgent calls to implement fixes for Jenkins open-source software automation tools. A New Jersey township closes schools and offices after a cyberattack. The Centre for Cybersecurity Belgium warns of a critical vulnerability in GitLab. The FBI arrests a notorious swatter. HHS releases cybersecurity performance goals. The feds remind organizations to preserve online messaging. Mercedes-Benz exposes data after an authentication token was left unsecured. A dark web drug dealer pleads guilty. Our guest is Caleb Barlow from Cyberbit, discussing hacker celebrities and why yours truly did not make the list. And threats of airport terrorism on public WiFi is no joking matter.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Podcast partner <a href="https://www.linkedin.com/in/calebbarlow/">Caleb Barlow</a>, CEO of <a href="https://www.cyberbit.com/">Cyberbit</a>, discusses hacker celebrities and why our own Dave Bittner did not make the list.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://news.bloomberglaw.com/privacy-and-data-security/solarwinds-seeks-dismissal-of-unfounded-sec-cybersecurity-suit">SolarWinds Seeks Dismissal of ‘Unfounded’ SEC Cybersecurity Suit</a>  (Bloomberg Law)</p><p><a href="https://securityboulevard.com/2024/01/fix-available-for-critical-jenkins-flaw-that-leads-to-rce-attacks/">Fix Available for Critical Jenkins Flaw That Leads to RCE Attacks </a>(Security Boulevard)</p><p><a href="https://newjersey.news12.com/freehold-township-district-all-schools-and-offices-closed-monday-due-to-cybersecurity-incident">Freehold Township district: All schools and offices closed Monday due to cybersecurity incident</a> (News12 New Jersey)</p><p><a href="https://cert.be/en/advisory/warning-critical-arbitrary-file-write-vulnerability-gitlab-ceee-patch-immediately">WARNING: CRITICAL ARBITRARY FILE WRITE VULNERABILITY IN GITLAB CE/EE, PATCH IMMEDIATELY!</a> (Centre for Cybersecurity Belgium)</p><p><a href="https://www.wired.com/story/torswats-swatting-arrest/">Police Arrest Teen Said to Be Linked to Hundreds of Swatting Attacks</a> (WIRED)</p><p><a href="https://industrialcyber.co/threats-attacks/hhs-debuts-voluntary-cybersecurity-performance-goals-to-enhance-healthcare-sector-resilience/">HHS debuts voluntary cybersecurity performance goals to enhance healthcare sector resilience</a> (Industrial Cyber)</p><p><a href="https://news.bloomberglaw.com/antitrust/dont-delete-slack-or-signal-chats-us-agencies-warn-companies">Don’t Delete Slack or Signal Chats, US Agencies Warn Companies</a> (Bloomberg Law)</p><p><a href="https://techcrunch.com/2024/01/26/mercedez-benz-token-exposed-source-code-github/">How a mistakenly published password exposed Mercedes-Benz source code</a> (TechCrunch)</p><p><a href="https://www.infosecurity-magazine.com/news/dark-web-drugs-vendor-150m-guilty/">Dark Web Drugs Vendor Forfeits $150m After Guilty Plea </a>(Infosecurity Magazine)</p><p><a href="https://gizmodo.com/teen-fine-joke-text-taliban-jets-scramble-in-spain-1851192668">‘On My Way to Blow Up the Plane’: Teen Faces Huge Fine After Joke Leads to Fighter Jets Scrambling</a> (Gizmodo)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1489</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e809730c-b95d-11ee-adc6-cf7237681f43]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9334415299.mp3?updated=1706558559" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rashmi Bharathan: Connecting is important. [Auditor] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/180/notes</link>
      <description>Rashmi Bharathan, an Information Technology Internal Auditor from Wintrust Financial Corporation sits down to share her story as a woman with 10 years in the IT industry and how she got her start. From childhood Rashmi always wanted to be a good leader, helping those around her, now she shares how helping people is a passion of hers and spends a lot of her time volunteering to help those coming into this industry. She says "It's all about, you should know your connections. That is more important. So I would say that networking and volunteering is really going to help you to grow in your career," sharing that community is the key to her success and working hard to network has been a great help to her to get her where she is today. We thank Rashmi for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 28 Jan 2024 08:10:00 -0000</pubDate>
      <itunes:title>Rashmi Bharathan: Connecting is important. [Auditor] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>180</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Rashmi Bharathan, an Information Technology Internal Auditor from Wintrust Financial Corporation sits down to share her story as a woman with 10 years in the IT industry and how she got her start. From childhood Rashmi always wanted to be a good leader, helping those around her, now she shares how helping people is a passion of hers and spends a lot of her time volunteering to help those coming into this industry. She says "It's all about, you should know your connections. That is more important. So I would say that networking and volunteering is really going to help you to grow in your career," sharing that community is the key to her success and working hard to network has been a great help to her to get her where she is today. We thank Rashmi for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rashmi Bharathan, an Information Technology Internal Auditor from Wintrust Financial Corporation sits down to share her story as a woman with 10 years in the IT industry and how she got her start. From childhood Rashmi always wanted to be a good leader, helping those around her, now she shares how helping people is a passion of hers and spends a lot of her time volunteering to help those coming into this industry. She says "It's all about, you should know your connections. That is more important. So I would say that networking and volunteering is really going to help you to grow in your career," sharing that community is the key to her success and working hard to network has been a great help to her to get her where she is today. We thank Rashmi for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>488</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e640172e-beb7-11ee-9452-93889e1131f4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4200272613.mp3?updated=1706301305" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What’s a CNAPP: Cloud-Native Application Protection Platform? [CyberWire-X]</title>
      <link>https://thecyberwire.com/podcasts/cyberwire-x/49/notes</link>
      <description>In this episode of CyberWire-X, N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by Tim Miller, Technical Marketing Engineer for Panoptica, Cisco's Cloud Application Security solution, (Panoptica is the result of Cisco's incubation engine (Outshift) for new products and markets), and Kevin Ford, Esri’s CISO. They discuss the complexity reduction need that Cloud-Native Application Protection Platforms (CNAPPs) provide. Outshift by Cisco is our CyberWire-X episode sponsor.
To learn more about Cloud-Native Application Protection Platforms, check out Panoptica’s website at https://panoptica.app and consider attending the Cisco Live EMEA in Amsterdam, February 5-8, 2024.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 28 Jan 2024 06:00:00 -0000</pubDate>
      <itunes:title>What’s a CNAPP: Cloud-Native Application Protection Platform? [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>49</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode of CyberWire-X, N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by Tim Miller, Technical Marketing Engineer for Panoptica, Cisco's Cloud Application Security solution, (Panoptica is the result of Cisco's incubation engine (Outshift) for new products and markets), and Kevin Ford, Esri’s CISO. They discuss the complexity reduction need that Cloud-Native Application Protection Platforms (CNAPPs) provide. Outshift by Cisco is our CyberWire-X episode sponsor.
To learn more about Cloud-Native Application Protection Platforms, check out Panoptica’s website at https://panoptica.app and consider attending the Cisco Live EMEA in Amsterdam, February 5-8, 2024.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of CyberWire-X, N2K’s CSO, Chief Analyst, and Senior Fellow, <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a>, is joined by <a href="https://www.linkedin.com/in/timothyemiller/">Tim Miller</a>, Technical Marketing Engineer for Panoptica, Cisco's Cloud Application Security solution, (Panoptica is the result of Cisco's incubation engine (Outshift) for new products and markets), and <a href="https://www.linkedin.com/in/kevinfordcs/">Kevin Ford</a>, Esri’s CISO. They discuss the complexity reduction need that Cloud-Native Application Protection Platforms (CNAPPs) provide. <a href="https://outshift.cisco.com/">Outshift by Cisco</a> is our CyberWire-X episode sponsor.</p><p>To learn more about Cloud-Native Application Protection Platforms, check out Panoptica’s website at <a href="https://panoptica.app">https://panoptica.app</a> and consider attending the <a href="https://outshift.cisco.com/events/cleu24">Cisco Live EMEA in Amsterdam, February 5-8, 2024.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1932</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fd914a42-ba3e-11ee-bed4-a70f0ceca89e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1668246445.mp3?updated=1706048877" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hooked on pirated macOS applications. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/314/notes</link>
      <description>Jaron Bradley from Jamf Threat Labs is sharing their work on "Jamf Threat Labs discovers new malware embedded in pirated applications." Jamf Threat Labs has detected a series of pirated macOS applications that have been modified to communicate to attacker infrastructure.
The research states "These applications are being hosted on Chinese pirating websites in order to gain victims." The discovery marks new and advanced malware, similar to the ZuRu malware, first discovered by Objective-See in 2021 within the iTerm2 application.
The research can be found here:
Jamf Threat Labs discovers new malware embedded in pirated applications

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Jan 2024 08:10:00 -0000</pubDate>
      <itunes:title>Hooked on pirated macOS applications. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>314</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Jaron Bradley from Jamf Threat Labs is sharing their work on "Jamf Threat Labs discovers new malware embedded in pirated applications." Jamf Threat Labs has detected a series of pirated macOS applications that have been modified to communicate to attacker infrastructure.
The research states "These applications are being hosted on Chinese pirating websites in order to gain victims." The discovery marks new and advanced malware, similar to the ZuRu malware, first discovered by Objective-See in 2021 within the iTerm2 application.
The research can be found here:
Jamf Threat Labs discovers new malware embedded in pirated applications

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jaron Bradley from Jamf Threat Labs is sharing their work on "Jamf Threat Labs discovers new malware embedded in pirated applications." Jamf Threat Labs has detected a series of pirated macOS applications that have been modified to communicate to attacker infrastructure.</p><p>The research states "These applications are being hosted on Chinese pirating websites in order to gain victims." The discovery marks new and advanced malware, similar to the ZuRu malware, first discovered by Objective-See in 2021 within the iTerm2 application.</p><p>The research can be found here:</p><ul><li><a href="https://www.jamf.com/blog/jtl-malware-pirated-applications/">Jamf Threat Labs discovers new malware embedded in pirated applications</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1260</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[89d4f14a-bc86-11ee-badc-cb3e6bb97353]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6355061385.mp3?updated=1706283723" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A new purchase is cause for a call out.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1991/notes</link>
      <description>Senator Wyden calls out the NSA for purchasing American’s internet records. Senators look to add IT and ICS environments to federal employee cyber competitions. The FTC asks big tech about their investments in AI. Turns out the GSA bought a bunch of Chinese security cameras. Akira ransomware claims a breach of Lush cosmetics. ESET reports on the Blackwood cyberespionage group. Wired looks at Predatory Sparrow. The U.S. stands firm on the United Nations Cybercrime Treaty. Our guest is Tony Surak, CMO &amp; Operating Partner from DataTribe, with insights on the state of venture capital in cyber. And a Trickbot gang member will be doing some time.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Tony Surak from DataTribe joins us to share his take on the state of the VC cyber market.

Selected Reading
Wyden Releases Documents Confirming the NSA Buys Americans’ Internet Browsing Records; Calls on Intelligence Community to Stop Buying U.S. Data Obtained Unlawfully From Data Brokers, Violating Recent FTC Order 
Senate Committee debuts bipartisan bill to add OT, ICS environments to federal employee cyber competition 
FTC officially asks Big Tech about their AI deals | Cybernews 
GSA Sparks Security Fears After Buying Risky Chinese Cameras
Akira ransomware gang says it stole passport scans from Lush • The Register
Elusive Chinese Cyberspy Group Hijacks Software Updates to Deliver Malware - SecurityWeek
How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar | WIRED
On eve of final negotiations, US says consensus growing around ‘narrow’ UN cybercrime treaty
Trickbot malware developer sentenced to 5 years behind bars • The Register

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 26 Jan 2024 21:10:00 -0000</pubDate>
      <itunes:title>A new purchase is cause for a call out.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1991</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Senator Wyden calls out the NSA for purchasing American’s internet records. Senators look to add IT and ICS environments to federal employee cyber competitions. The FTC asks big tech about their investments in AI. Turns out the GSA bought a bunch of Chinese security cameras. Akira ransomware claims a breach of Lush cosmetics. ESET reports on the Blackwood cyberespionage group. Wired looks at Predatory Sparrow. The U.S. stands firm on the United Nations Cybercrime Treaty. Our guest is Tony Surak, CMO &amp; Operating Partner from DataTribe, with insights on the state of venture capital in cyber. And a Trickbot gang member will be doing some time.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Tony Surak from DataTribe joins us to share his take on the state of the VC cyber market.

Selected Reading
Wyden Releases Documents Confirming the NSA Buys Americans’ Internet Browsing Records; Calls on Intelligence Community to Stop Buying U.S. Data Obtained Unlawfully From Data Brokers, Violating Recent FTC Order 
Senate Committee debuts bipartisan bill to add OT, ICS environments to federal employee cyber competition 
FTC officially asks Big Tech about their AI deals | Cybernews 
GSA Sparks Security Fears After Buying Risky Chinese Cameras
Akira ransomware gang says it stole passport scans from Lush • The Register
Elusive Chinese Cyberspy Group Hijacks Software Updates to Deliver Malware - SecurityWeek
How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar | WIRED
On eve of final negotiations, US says consensus growing around ‘narrow’ UN cybercrime treaty
Trickbot malware developer sentenced to 5 years behind bars • The Register

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Senator Wyden calls out the NSA for purchasing American’s internet records. Senators look to add IT and ICS environments to federal employee cyber competitions. The FTC asks big tech about their investments in AI. Turns out the GSA bought a bunch of Chinese security cameras. Akira ransomware claims a breach of Lush cosmetics. ESET reports on the Blackwood cyberespionage group. Wired looks at Predatory Sparrow. The U.S. stands firm on the United Nations Cybercrime Treaty. Our guest is Tony Surak, CMO &amp; Operating Partner from DataTribe, with insights on the state of venture capital in cyber. And a Trickbot gang member will be doing some time.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest Tony Surak from DataTribe joins us to share his take on the state of the VC cyber market.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.wyden.senate.gov/news/press-releases/wyden-releases-documents-confirming-the-nsa-buys-americans-internet-browsing-records-calls-on-intelligence-community-to-stop-buying-us-data-obtained-unlawfully-from-data-brokers-violating-recent-ftc-order">Wyden Releases Documents Confirming the NSA Buys Americans’ Internet Browsing Records; Calls on Intelligence Community to Stop Buying U.S. Data Obtained Unlawfully From Data Brokers, Violating Recent FTC Order</a> </p><p><a href="https://industrialcyber.co/regulation-standards-and-compliance/senate-committee-debuts-bipartisan-bill-to-add-ot-ics-environments-to-federal-employee-cyber-competition/">Senate Committee debuts bipartisan bill to add OT, ICS environments to federal employee cyber competition</a> </p><p><a href="https://cybernews.com/news/ftc-big-tech-ai-investments-inquiry/?utm_source=mastodon&amp;utm_medium=social&amp;utm_campaign=cybernews&amp;utm_content=post">FTC officially asks Big Tech about their AI deals | Cybernews</a> </p><p><a href="https://www.databreachtoday.com/gsa-sparks-security-fears-after-buying-risky-chinese-cameras-a-24179?mid=1#cid=1562240">GSA Sparks Security Fears After Buying Risky Chinese Cameras</a></p><p><a href="https://go.theregister.com/feed/www.theregister.com/2024/01/26/akira_lush_ransomware/">Akira ransomware gang says it stole passport scans from Lush • The Register</a></p><p><a href="https://www.securityweek.com/elusive-chinese-cyberspy-group-hijacks-software-updates-to-deliver-malware/">Elusive Chinese Cyberspy Group Hijacks Software Updates to Deliver Malware - SecurityWeek</a></p><p><a href="https://www.wired.com/story/predatory-sparrow-cyberattack-timeline/">How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar | WIRED</a></p><p><a href="https://therecord.media/consensus-growing-around-cybercrime-treaty">On eve of final negotiations, US says consensus growing around ‘narrow’ UN cybercrime treaty</a></p><p><a href="https://go.theregister.com/feed/www.theregister.com/2024/01/25/trickbot_malware_dev_sentenced/">Trickbot malware developer sentenced to 5 years behind bars • The Register</a></p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1577</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e7cc8820-b95d-11ee-adc6-f78417016285]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3814901782.mp3?updated=1706306189" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Another day, another Blizzard attack.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1990/notes</link>
      <description>Cozy Bear breaches Hewlett Packard Enterprise. An investigation reveals global surveillance based on digital advertising. Cisco patches critical vulnerabilities. Meta aims to enhance the online safety of minors.  iOS notifications are exploited for tracking. EquiLend’s systems go offline after a cyberattack.  A DC theater faced financial crisis after seeing their bank account drained. Critical infrastructure is targeted in Ukraine.  The latest insights on ransomware. Guest Lance Hood joins us from TransUnion to share how fraud attacks on financial industry call centers are rising. And Teslas get POwned in Tokyo.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Lance Hood joins us from TransUnion to share how fraud attacks on financial industry call centers are rising.

Selected Reading
Hewlett Packard Enterprise tells SEC it was breached by Russia’s 'Cozy Bear' hackers (The Record)
Inside a Global Phone Spy Tool Monitoring Billions (404 Media)
Cisco Patches Critical Vulnerability in Enterprise Collaboration Products (SecurityWeek)
Instagram and Facebook will now prevent strangers from messaging minors by default (The Verge)
Research Reveals How iPhone Push Notifications Leak User Data (MacRumors)
Financial tech firm EquiLend says recovery after cyberattack ‘may take several days’ (The Record)
'No gift is too small' | GALA Hispanic Theater asking for donations after hackers drain bank accounts (WUSA9)
Ukrainian energy giant, postal service, transportation agencies hit by cyberattacks (The Record)
The 2024 Ransomware Threat Landscape (Symantec Enterprise Blogs)
Who pays, and why: A researcher examines the ransomware victim’s mindset (The Record)
Tesla Hack Earns Researchers $100,000 at Pwn2Own Automotive - SecurityWeek (SecurityWeek)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 25 Jan 2024 21:10:00 -0000</pubDate>
      <itunes:title>Another day, another Blizzard attack.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1990</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Cozy Bear breaches Hewlett Packard Enterprise. An investigation reveals global surveillance based on digital advertising. Cisco patches critical vulnerabilities. Meta aims to enhance the online safety of minors.  iOS notifications are exploited for tracking. EquiLend’s systems go offline after a cyberattack.  A DC theater faced financial crisis after seeing their bank account drained. Critical infrastructure is targeted in Ukraine.  The latest insights on ransomware. Guest Lance Hood joins us from TransUnion to share how fraud attacks on financial industry call centers are rising. And Teslas get POwned in Tokyo.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Lance Hood joins us from TransUnion to share how fraud attacks on financial industry call centers are rising.

Selected Reading
Hewlett Packard Enterprise tells SEC it was breached by Russia’s 'Cozy Bear' hackers (The Record)
Inside a Global Phone Spy Tool Monitoring Billions (404 Media)
Cisco Patches Critical Vulnerability in Enterprise Collaboration Products (SecurityWeek)
Instagram and Facebook will now prevent strangers from messaging minors by default (The Verge)
Research Reveals How iPhone Push Notifications Leak User Data (MacRumors)
Financial tech firm EquiLend says recovery after cyberattack ‘may take several days’ (The Record)
'No gift is too small' | GALA Hispanic Theater asking for donations after hackers drain bank accounts (WUSA9)
Ukrainian energy giant, postal service, transportation agencies hit by cyberattacks (The Record)
The 2024 Ransomware Threat Landscape (Symantec Enterprise Blogs)
Who pays, and why: A researcher examines the ransomware victim’s mindset (The Record)
Tesla Hack Earns Researchers $100,000 at Pwn2Own Automotive - SecurityWeek (SecurityWeek)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cozy Bear breaches Hewlett Packard Enterprise. An investigation reveals global surveillance based on digital advertising. Cisco patches critical vulnerabilities. Meta aims to enhance the online safety of minors.  iOS notifications are exploited for tracking. EquiLend’s systems go offline after a cyberattack.  A DC theater faced financial crisis after seeing their bank account drained. Critical infrastructure is targeted in Ukraine.  The latest insights on ransomware. Guest Lance Hood joins us from TransUnion to share how fraud attacks on financial industry call centers are rising. And Teslas get POwned in Tokyo.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/lancehood/">Lance Hood</a> joins us from <a href="https://www.transunion.com/">TransUnion</a> to share how fraud attacks on financial industry call centers are rising.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/hpe-tells-sec-breached-by-cozy-bear">Hewlett Packard Enterprise tells SEC it was breached by Russia’s 'Cozy Bear' hackers</a> (The Record)</p><p><a href="https://www.404media.co/inside-global-phone-spy-tool-patternz-nuviad-real-time-bidding/">Inside a Global Phone Spy Tool Monitoring Billions</a> (404 Media)</p><p><a href="https://www.securityweek.com/cisco-patches-critical-vulnerability-in-enterprise-collaboration-products/">Cisco Patches Critical Vulnerability in Enterprise Collaboration Products</a> (SecurityWeek)</p><p><a href="https://www.theverge.com/2024/1/25/24050207/meta-instagram-messenger-messaging-restrictions-minors-teens-parental-settings?utm_content=buffer66c85&amp;utm_medium=social&amp;utm_source=bufferapp.com&amp;utm_campaign=buffer">Instagram and Facebook will now prevent strangers from messaging minors by default</a> (The Verge)</p><p><a href="https://www.macrumors.com/2024/01/25/push-notifications-leak-user-data/?utm_source=dlvr.it&amp;utm_medium=mastodon">Research Reveals How iPhone Push Notifications Leak User Data</a> (MacRumors)</p><p><a href="https://therecord.media/equilend-cyberattack-financial-recovery-two-days">Financial tech firm EquiLend says recovery after cyberattack ‘may take several days’</a> (The Record)</p><p><a href="https://www.wusa9.com/article/news/local/dc/gala-theater-asking-donations-hackers-drain-bank-accounts/65-30c4af0c-25ac-4334-b797-5ba870da4a92">'No gift is too small' | GALA Hispanic Theater asking for donations after hackers drain bank accounts</a> (WUSA9)</p><p><a href="https://therecord.media/ukraine-cyberattacks-energy-postal-transportation">Ukrainian energy giant, postal service, transportation agencies hit by cyberattacks</a> (The Record)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/ransomware-threat-landscape-2024">The 2024 Ransomware Threat Landscape</a> (Symantec Enterprise Blogs)</p><p><a href="https://therecord.media/ransomware-victim-mindset-dutch-study-tom-meurs">Who pays, and why: A researcher examines the ransomware victim’s mindset</a> (The Record)</p><p><a href="https://www.securityweek.com/tesla-infotainment-hack-earns-researchers-100000-at-pwn2own-automotive/">Tesla Hack Earns Researchers $100,000 at Pwn2Own Automotive - SecurityWeek</a><em> </em>(SecurityWeek)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1772</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e78dd49a-b95d-11ee-adc6-0be09dc64336]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1328937290.mp3?updated=1706211261" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The fight against exploiting Americans.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1989/notes</link>
      <description>Biden prepares executive order on foreign access to data. Britain’s NCSC warns of a significant ransomware increase. Cisco Talos confirms ransomware surge. BuyGoods.com leaks PII and KYC data. Fortra faces scrutiny over slow disclosure. AI fights financial fraud. Intel471 highlights bulletproof hosting. NSO Group lobbies to revamp their image. Tussling in Missouri over election security. Integrating cyber education. Our guests are N2K President Simone Petrella and WiCyS Executive Director Lynn Dohm talking about a new partnership for a comprehensive Cyber Talent Study. And the moral panic of Furbies.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guests are N2K President Simone Petrella and WiCyS Executive Director Lynn Dohm talking with Dave Bittner about a new partnership for a comprehensive Cyber Talent Study to deepen the collective understanding of cybersecurity competencies within the industry.

Selected Reading
Biden Seeks to Stop Countries From Exploiting Americans’ Data for Espionage (Bloomberg)
British intelligence warns AI will cause surge in ransomware volume and impact (The Record)
Significant increase in ransomware activity found in Talos IR engagements, while education remains one of the most-targeted sectors (Talos)
Global Retailer BuyGoods.com Leaks 198GB of Internal and User PII, KYC data (HACKREAD)
Fortra blasted over slow response to critical GoAnywhere file transfer bug (SC Media)
Gen AI Expected to Bring Big Changes to Banking Sector (GovInfo Security)
Why Bulletproof Hosting is Key to Cybercrime-as-a-Service (Infosecurity Magazine)
Notorious Spyware Maker NSO Group Is Quietly Plotting a Comeback (WIRED)
Missouri secretary of state accused of withholding cybersecurity reviews of election authorities (StateScoop)
Cybersecurity education from childhood is a vital tool: 72% of children worldwide have experienced at least one type of cyber threat (Check Point) 
These Are the Notorious NSA Furby Documents Showing Spy Agency Freaking Out About Embedded AI in Children's Toy (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 24 Jan 2024 21:10:00 -0000</pubDate>
      <itunes:title>The fight against exploiting Americans.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1989</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Biden prepares executive order on foreign access to data. Britain’s NCSC warns of a significant ransomware increase. Cisco Talos confirms ransomware surge. BuyGoods.com leaks PII and KYC data. Fortra faces scrutiny over slow disclosure. AI fights financial fraud. Intel471 highlights bulletproof hosting. NSO Group lobbies to revamp their image. Tussling in Missouri over election security. Integrating cyber education. Our guests are N2K President Simone Petrella and WiCyS Executive Director Lynn Dohm talking about a new partnership for a comprehensive Cyber Talent Study. And the moral panic of Furbies.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guests are N2K President Simone Petrella and WiCyS Executive Director Lynn Dohm talking with Dave Bittner about a new partnership for a comprehensive Cyber Talent Study to deepen the collective understanding of cybersecurity competencies within the industry.

Selected Reading
Biden Seeks to Stop Countries From Exploiting Americans’ Data for Espionage (Bloomberg)
British intelligence warns AI will cause surge in ransomware volume and impact (The Record)
Significant increase in ransomware activity found in Talos IR engagements, while education remains one of the most-targeted sectors (Talos)
Global Retailer BuyGoods.com Leaks 198GB of Internal and User PII, KYC data (HACKREAD)
Fortra blasted over slow response to critical GoAnywhere file transfer bug (SC Media)
Gen AI Expected to Bring Big Changes to Banking Sector (GovInfo Security)
Why Bulletproof Hosting is Key to Cybercrime-as-a-Service (Infosecurity Magazine)
Notorious Spyware Maker NSO Group Is Quietly Plotting a Comeback (WIRED)
Missouri secretary of state accused of withholding cybersecurity reviews of election authorities (StateScoop)
Cybersecurity education from childhood is a vital tool: 72% of children worldwide have experienced at least one type of cyber threat (Check Point) 
These Are the Notorious NSA Furby Documents Showing Spy Agency Freaking Out About Embedded AI in Children's Toy (404 Media)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Biden prepares executive order on foreign access to data. Britain’s NCSC warns of a significant ransomware increase. Cisco Talos confirms ransomware surge. BuyGoods.com leaks PII and KYC data. Fortra faces scrutiny over slow disclosure. AI fights financial fraud. Intel471 highlights bulletproof hosting. NSO Group lobbies to revamp their image. Tussling in Missouri over election security. Integrating cyber education. Our guests are N2K President Simone Petrella and WiCyS Executive Director Lynn Dohm talking about a new partnership for a comprehensive Cyber Talent Study. And the moral panic of Furbies.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today’s guests are <a href="https://www.n2k.com/">N2K</a> President <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a> and <a href="https://www.wicys.org/">WiCyS</a> Executive Director <a href="https://www.linkedin.com/in/lynndohm/">Lynn Dohm</a> talking with Dave Bittner about a new partnership for a comprehensive <a href="https://thecyberwire.com/stories/26bb319eafd94f1eae68af038afd917c/wicys-partners-with-n2k-networks-for-pioneering-cyber-talent-study">Cyber Talent Study</a> to deepen the collective understanding of cybersecurity competencies within the industry.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bloomberg.com/news/articles/2024-01-23/biden-seeks-to-stop-countries-from-exploiting-americans-data-for-espionage">Biden Seeks to Stop Countries From Exploiting Americans’ Data for Espionage</a> (Bloomberg)</p><p><a href="https://therecord.media/british-intelligence-warns-ai-will-cause-surge-in-ransomware">British intelligence warns AI will cause surge in ransomware volume and impact</a> (The Record)</p><p><a href="https://blog.talosintelligence.com/talos-ir-quarterly-report-q4-2023/">Significant increase in ransomware activity found in Talos IR engagements, while education remains one of the most-targeted sectors</a> (Talos)</p><p><a href="https://www.hackread.com/online-retailer-buygoods-com-pii-kyc-data-leak/">Global Retailer BuyGoods.com Leaks 198GB of Internal and User PII, KYC data</a> (HACKREAD)</p><p><a href="https://www.scmagazine.com/news/fortra-blasted-over-slow-response-to-critical-goanywhere-file-transfer-bug">Fortra blasted over slow response to critical GoAnywhere file transfer bug</a> (SC Media)</p><p><a href="https://www.govinfosecurity.com/gen-ai-expected-to-bring-big-changes-to-banking-sector-a-24172">Gen AI Expected to Bring Big Changes to Banking Sector</a> (GovInfo Security)</p><p><a href="https://www.infosecurity-magazine.com/news/why-bulletproof-hosting-key-caas/">Why Bulletproof Hosting is Key to Cybercrime-as-a-Service</a> (Infosecurity Magazine)</p><p><a href="https://www.wired.com/story/nso-group-lobbying-israel-hamas-war/">Notorious Spyware Maker NSO Group Is Quietly Plotting a Comeback</a> (WIRED)</p><p><a href="https://statescoop.com/missouri-jay-ashcroft-cybersecurity-reports-elections/">Missouri secretary of state accused of withholding cybersecurity reviews of election authorities</a> (StateScoop)</p><p><a href="https://blog.checkpoint.com/security/cybersecurity-education-from-childhood-is-a-vital-tool-72-of-children-worldwide-have-experienced-at-least-one-type-of-cyber-threat/">Cybersecurity education from childhood is a vital tool: 72% of children worldwide have experienced at least one type of cyber threat</a> (Check Point) </p><p><a href="https://www.404media.co/these-are-the-notorious-nsa-furby-documents-showing-spy-agency-freaking-out-about-childrens-toy/">These Are the Notorious NSA Furby Documents Showing Spy Agency Freaking Out About Embedded AI in Children's Toy</a> (404 Media)</p><h2><br></h2><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1922</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e751f5ba-b95d-11ee-adc6-c7b917344bce]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4570085998.mp3?updated=1706127678" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The mother of all data breaches.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1988/notes</link>
      <description>The mother of all data breaches. CISA director Easterly is the victim of a swatting incident. An AI robocall in New Hampshire seeks to sway the election. Australia sanctions an alleged Russian cyber-crime operator. Atlassian Confluence servers are under active exploitation. Apple patches a webkit zero-day. Black Basta hits a major UK water provider. Hackers who targeted an Indian ISP launch and online search portal. A Massachusetts hospital suffered a Christmas day ransomware attack. Ann Johnson host of the Afternoon Cyber Tea podcast, speaks with Caitlin Sarian, known to many as Cybersecurity Girl. And HP claims bricked printers are a security feature, not a bug. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Microsoft Security’s Afternoon Cyber Tea podcast host, Ann Johnson, speaks with Caitlin Sarian, known to many as Cybersecurity Girl, a leading influencer with a cybersecurity-focused social presence. Listen to the full interview here. 

Selected Reading
Mother of All Breaches: ​a Historic Data Leak Reveals 26 Billion Records (Cybernews)
CISA’s Easterly the target of ‘harrowing’ swatting incident (The Record)
AI robocalls impersonate President Biden in an apparent attempt to suppress votes in New Hampshire (PBS NewsHour)
Hear fake Biden robocall urging voters not to vote in New Hampshire (YouTube)
Medibank hack: Russian sanctioned over Australia's worst data breach (BBC)
Hackers start exploiting critical Atlassian Confluence RCE flaw (BleepingComputer)
iOS 17.3 and macOS Sonoma 14.3 Patch WebKit Vulnerability That May Have Been Exploited (MacRumors)
UK water company that serves millions confirms system attackIndian ISP Hathway Data Breach (The Record)
Hacker Leaks 4 Million Users, KYC Data (HACKREAD)
Massachusetts hospital claimed to be targeted by Money Message ransomware (SC Media)
HP's CEO spells it out: You're a 'bad investment' if you don't buy HP supplies (The Register)
HP CEO evokes James Bond-style hack via ink cartridges (Ars Technica)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Jan 2024 21:10:00 -0000</pubDate>
      <itunes:title>The mother of all data breaches.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1988</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The mother of all data breaches. CISA director Easterly is the victim of a swatting incident. An AI robocall in New Hampshire seeks to sway the election. Australia sanctions an alleged Russian cyber-crime operator. Atlassian Confluence servers are under active exploitation. Apple patches a webkit zero-day. Black Basta hits a major UK water provider. Hackers who targeted an Indian ISP launch and online search portal. A Massachusetts hospital suffered a Christmas day ransomware attack. Ann Johnson host of the Afternoon Cyber Tea podcast, speaks with Caitlin Sarian, known to many as Cybersecurity Girl. And HP claims bricked printers are a security feature, not a bug. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Microsoft Security’s Afternoon Cyber Tea podcast host, Ann Johnson, speaks with Caitlin Sarian, known to many as Cybersecurity Girl, a leading influencer with a cybersecurity-focused social presence. Listen to the full interview here. 

Selected Reading
Mother of All Breaches: ​a Historic Data Leak Reveals 26 Billion Records (Cybernews)
CISA’s Easterly the target of ‘harrowing’ swatting incident (The Record)
AI robocalls impersonate President Biden in an apparent attempt to suppress votes in New Hampshire (PBS NewsHour)
Hear fake Biden robocall urging voters not to vote in New Hampshire (YouTube)
Medibank hack: Russian sanctioned over Australia's worst data breach (BBC)
Hackers start exploiting critical Atlassian Confluence RCE flaw (BleepingComputer)
iOS 17.3 and macOS Sonoma 14.3 Patch WebKit Vulnerability That May Have Been Exploited (MacRumors)
UK water company that serves millions confirms system attackIndian ISP Hathway Data Breach (The Record)
Hacker Leaks 4 Million Users, KYC Data (HACKREAD)
Massachusetts hospital claimed to be targeted by Money Message ransomware (SC Media)
HP's CEO spells it out: You're a 'bad investment' if you don't buy HP supplies (The Register)
HP CEO evokes James Bond-style hack via ink cartridges (Ars Technica)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The mother of all data breaches. CISA director Easterly is the victim of a swatting incident. An AI robocall in New Hampshire seeks to sway the election. Australia sanctions an alleged Russian cyber-crime operator. Atlassian Confluence servers are under active exploitation. Apple patches a webkit zero-day. Black Basta hits a major UK water provider. Hackers who targeted an Indian ISP launch and online search portal. A Massachusetts hospital suffered a Christmas day ransomware attack. Ann Johnson host of the Afternoon Cyber Tea podcast, speaks with Caitlin Sarian, known to many as Cybersecurity Girl. And HP claims bricked printers are a security feature, not a bug. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Microsoft Security’s <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea podcast</a> host, <a href="https://www.linkedin.com/in/ann-johnsons/">Ann Johnson</a>, speaks with <a href="https://www.linkedin.com/in/caitlin-sarian/">Caitlin Sarian</a>, known to many as Cybersecurity Girl, a leading influencer with a cybersecurity-focused social presence. Listen to the full interview <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea/88/notes">here</a>. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://cybernews.com/security/billions-passwords-credentials-leaked-mother-of-all-breaches/">Mother of All Breaches: ​a Historic Data Leak Reveals 26 Billion Records</a> (Cybernews)</p><p><a href="https://therecord.media/cisa-jen-easterly-swatting-incident">CISA’s Easterly the target of ‘harrowing’ swatting incident</a> (The Record)</p><p><a href="https://www.pbs.org/newshour/politics/ai-robocalls-impersonate-president-biden-in-an-apparent-attempt-to-suppress-votes-in-new-hampshire">AI robocalls impersonate President Biden in an apparent attempt to suppress votes in New Hampshire</a> (PBS NewsHour)</p><p><a href="https://youtube.com/shorts/-uSMUNAFHHw?si=XqJiV0Sq-c9MWbWw">Hear fake Biden robocall urging voters not to vote in New Hampshire</a> (YouTube)</p><p><a href="https://www.bbc.com/news/world-australia-68064850">Medibank hack: Russian sanctioned over Australia's worst data breach</a> (BBC)</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-start-exploiting-critical-atlassian-confluence-rce-flaw/">Hackers start exploiting critical Atlassian Confluence RCE flaw</a> (BleepingComputer)</p><p><a href="https://www.macrumors.com/2024/01/22/ios-17-3-webkit-vulnerability-patch/">iOS 17.3 and macOS Sonoma 14.3 Patch WebKit Vulnerability That May Have Been Exploited</a> (MacRumors)</p><p><a href="https://www.theregister.com/2024/01/23/southern_water_confirms_cyberattack/">UK water company that serves millions confirms system attack</a><a href="https://www.hackread.com/indian-isp-hathway-data-breach-user-data-kyc-leak/">Indian ISP Hathway Data Breach</a> (The Record)</p><p><a href="https://www.hackread.com/indian-isp-hathway-data-breach-user-data-kyc-leak/">Hacker Leaks 4 Million Users, KYC Data</a> (HACKREAD)</p><p><a href="https://www.scmagazine.com/brief/massachusetts-hospital-claimed-to-be-targeted-by-money-message-ransomware">Massachusetts hospital claimed to be targeted by Money Message ransomware</a> (SC Media)</p><p><a href="https://www.theregister.com/2024/01/19/hps_ceo_spells_it_out/">HP's CEO spells it out: You're a 'bad investment' if you don't buy HP supplies</a> (The Register)</p><p><a href="https://arstechnica.com/gadgets/2024/01/hp-ceo-blocking-third-party-ink-from-printers-fights-viruses/">HP CEO evokes James Bond-style hack via ink cartridges </a>(Ars Technica)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1549</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e7169970-b95d-11ee-adc6-cbbe64c78cf7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1534055182.mp3?updated=1706042354" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Midnight Blizzard brings the storm.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1987/notes</link>
      <description>Russian state hackers breach Microsoft. LockBit claims Subway restaurants hack. A Swedish datacenter is hit with ransomware. VMware patches a vulnerability targeted by Chinese espionage groups. Sentinel Labs warns of North Korean APTs focus on cybersecurity pros. FTC order another data broker to restrict location data. US Feds release security guidance for water and wastewater sectors. Senators question the DOJ on facial recognition technology. Ukraine’s Monobank gets DDoSed. N2K’s CSO Rick Howard joins us to share some insight into what he and the Hash Table are cooking up for the upcoming season of his CSO Perspectives podcast. The passing of a Time Lord. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
N2K’s CSO Rick Howard joins us to share some insight into what he and the Hash Table are cooking up for the upcoming season of his CSO Perspectives podcast launching next month.   

Selected Reading
Microsoft: Russian Hackers Had Access to Executives' Emails (GovInfo Security)
LockBit ransomware gang claims the attack on the sandwich chain Subway (Security Affairs)
Ransomware hits cloud service Tietoevry; numerous Swedish customers affected (The Record)
Chinese Espionage Group UNC3886 Found Exploiting CVE-2023-34048 Since Late 2021 (Mandiant)
North Korea’s ScarCruft APT group targets infosec pros (CSO Online)
FTC Order Will Ban InMarket from Selling Precise Consumer Location Data (Federal Trade Commission)
US Gov Publishes Cybersecurity Guidance for Water and Wastewater Utilities (SecurityWeek)
Ukraine’s Monobank hit with massive DDoS attack (Silicon Republic)
Senators ask DOJ to investigate whether facial recognition tech violates Civil Rights Act (The Record)
RIP, Internet’s Time Lord (On My Om)
Network Time Protocol (NTP) attack (noun) (Word Notes podcast)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 22 Jan 2024 21:10:00 -0000</pubDate>
      <itunes:title>Midnight Blizzard brings the storm.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1987</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Russian state hackers breach Microsoft. LockBit claims Subway restaurants hack. A Swedish datacenter is hit with ransomware. VMware patches a vulnerability targeted by Chinese espionage groups. Sentinel Labs warns of North Korean APTs focus on cybersecurity pros. FTC order another data broker to restrict location data. US Feds release security guidance for water and wastewater sectors. Senators question the DOJ on facial recognition technology. Ukraine’s Monobank gets DDoSed. N2K’s CSO Rick Howard joins us to share some insight into what he and the Hash Table are cooking up for the upcoming season of his CSO Perspectives podcast. The passing of a Time Lord. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
N2K’s CSO Rick Howard joins us to share some insight into what he and the Hash Table are cooking up for the upcoming season of his CSO Perspectives podcast launching next month.   

Selected Reading
Microsoft: Russian Hackers Had Access to Executives' Emails (GovInfo Security)
LockBit ransomware gang claims the attack on the sandwich chain Subway (Security Affairs)
Ransomware hits cloud service Tietoevry; numerous Swedish customers affected (The Record)
Chinese Espionage Group UNC3886 Found Exploiting CVE-2023-34048 Since Late 2021 (Mandiant)
North Korea’s ScarCruft APT group targets infosec pros (CSO Online)
FTC Order Will Ban InMarket from Selling Precise Consumer Location Data (Federal Trade Commission)
US Gov Publishes Cybersecurity Guidance for Water and Wastewater Utilities (SecurityWeek)
Ukraine’s Monobank hit with massive DDoS attack (Silicon Republic)
Senators ask DOJ to investigate whether facial recognition tech violates Civil Rights Act (The Record)
RIP, Internet’s Time Lord (On My Om)
Network Time Protocol (NTP) attack (noun) (Word Notes podcast)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russian state hackers breach Microsoft. LockBit claims Subway restaurants hack. A Swedish datacenter is hit with ransomware. VMware patches a vulnerability targeted by Chinese espionage groups. Sentinel Labs warns of North Korean APTs focus on cybersecurity pros. FTC order another data broker to restrict location data. US Feds release security guidance for water and wastewater sectors. Senators question the DOJ on facial recognition technology. Ukraine’s Monobank gets DDoSed. N2K’s CSO Rick Howard joins us to share some insight into what he and the Hash Table are cooking up for the upcoming season of his CSO Perspectives podcast. The passing of a Time Lord. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>N2K’s CSO <a href="https://www.linkedin.com/in/rickhoward/">Rick Howard</a> joins us to share some insight into what he and the <a href="https://thecyberwire.com/pages/hashtable.html">Hash Table</a> are cooking up for the upcoming season of his <a href="https://thecyberwire.com/podcasts/cso-perspectives-public">CSO Perspectives podcast</a> launching next month.   </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.govinfosecurity.com/microsoft-russian-hackers-had-access-to-executives-emails-a-24152">Microsoft: Russian Hackers Had Access to Executives' Emails</a> (GovInfo Security)</p><p><a href="https://securityaffairs.com/157852/cyber-crime/lockbit-hacked-sandwich-chain-subway.html">LockBit ransomware gang claims the attack on the sandwich chain Subway</a> (Security Affairs)</p><p><a href="https://therecord.media/tietoevry-ransomware-attack-sweden-cloud-services-datacenter">Ransomware hits cloud service Tietoevry; numerous Swedish customers affected</a> (The Record)</p><p><a href="https://www.mandiant.com/resources/blog/chinese-vmware-exploitation-since-2021">Chinese Espionage Group UNC3886 Found Exploiting CVE-2023-34048 Since Late 2021</a> (Mandiant)</p><p><a href="https://www.csoonline.com/article/1296496/north-koreas-scarcruft-apt-group-targets-infosec-pros.html">North Korea’s ScarCruft APT group targets infosec pros</a> (CSO Online)</p><p><a href="https://www.ftc.gov/news-events/news/press-releases/2024/01/ftc-order-will-ban-inmarket-selling-precise-consumer-location-data">FTC Order Will Ban InMarket from Selling Precise Consumer Location Data </a>(Federal Trade Commission)</p><p><a href="https://www.securityweek.com/us-gov-publishes-cybersecurity-guidance-for-water-and-wastewater-utilities/">US Gov Publishes Cybersecurity Guidance for Water and Wastewater Utilities</a> (SecurityWeek)</p><p><a href="https://www.siliconrepublic.com/enterprise/ukraine-monobank-ddos-cyberattack-russia">Ukraine’s Monobank hit with massive DDoS attack</a> (Silicon Republic)</p><p><a href="https://therecord.media/senators-ask-doj-to-investigate-facial-recognition">Senators ask DOJ to investigate whether facial recognition tech violates Civil Rights Act</a> (The Record)</p><p><a href="https://om.co/2024/01/19/rip-internets-time-lord/">RIP, Internet’s Time Lord</a> (On My Om)</p><p><a href="https://thecyberwire.com/podcasts/word-notes/19/notes">Network Time Protocol (NTP) attack (noun)</a> (Word Notes podcast)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1439</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e6d3bd1c-b95d-11ee-adc6-b311af96653f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8764644356.mp3?updated=1705955474" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Matt Devost: Solving hard problems and pursuing your passions. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/5/notes</link>
      <description>CEO, Matt Devost, describes many firsts in his career including hacking into systems on an aircraft carrier at sea. He shares how he enjoys solving hard problems and the red teamer perspective, and how he was able to translate those into a career. For those interested in cybersecurity, Matt advises opportunities for self-directed learning including heading down to your basement and building your own lab. Our thanks to Matt for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 21 Jan 2024 08:10:00 -0000</pubDate>
      <itunes:title>Encore: Matt Devost: Solving hard problems and pursuing your passions. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>5</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CEO, Matt Devost, describes many firsts in his career including hacking into systems on an aircraft carrier at sea. He shares how he enjoys solving hard problems and the red teamer perspective, and how he was able to translate those into a career. For those interested in cybersecurity, Matt advises opportunities for self-directed learning including heading down to your basement and building your own lab. Our thanks to Matt for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CEO, Matt Devost, describes many firsts in his career including hacking into systems on an aircraft carrier at sea. He shares how he enjoys solving hard problems and the red teamer perspective, and how he was able to translate those into a career. For those interested in cybersecurity, Matt advises opportunities for self-directed learning including heading down to your basement and building your own lab. Our thanks to Matt for sharing his story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>363</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[70c19ed8-b6dc-11ee-8f21-eb08e9c942f0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1700948353.mp3?updated=1705676723" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Two viewpoints on the National Cybersecurity Strategy. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/51/notes</link>
      <description>Earlier this month, the White House released the National Cybersecurity Strategy, the first issued since 2018. The strategy refocuses roles, responsibilities, and resource allocations in the digital ecosystem, with a five pillar approach. Those pillars are: defending critical infrastructure, disrupting threat actors, shaping market forces to drive security and resilience, investing in a resilient future, and forging international partnerships.
We wanted to delve into the strategy and its intended effects further, so Dave Bittner spoke with representatives from industry and inside government. Dave first speaks with Adam Isles, Principal and Head of Cybersecurity Practice at The Chertoff Group, sharing industry's take on the strategy. Following that conversation, Dave had a discussion with Steve Kelly, Special Assistant to the President and Senior Director for Cybersecurity and Emerging Technology at the National Security Council, for a look at the strategy from inside the White House.
Links to resources:


Point of View: 2023 National Cybersecurity Strategy The Chertoff Group's blog

National Cybersecurity Strategy 2023


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 21 Jan 2024 06:00:00 -0000</pubDate>
      <itunes:title>Two viewpoints on the National Cybersecurity Strategy. [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>51</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Earlier this month, the White House released the National Cybersecurity Strategy, the first issued since 2018. The strategy refocuses roles, responsibilities, and resource allocations in the digital ecosystem, with a five pillar approach. Those pillars are: defending critical infrastructure, disrupting threat actors, shaping market forces to drive security and resilience, investing in a resilient future, and forging international partnerships.
We wanted to delve into the strategy and its intended effects further, so Dave Bittner spoke with representatives from industry and inside government. Dave first speaks with Adam Isles, Principal and Head of Cybersecurity Practice at The Chertoff Group, sharing industry's take on the strategy. Following that conversation, Dave had a discussion with Steve Kelly, Special Assistant to the President and Senior Director for Cybersecurity and Emerging Technology at the National Security Council, for a look at the strategy from inside the White House.
Links to resources:


Point of View: 2023 National Cybersecurity Strategy The Chertoff Group's blog

National Cybersecurity Strategy 2023


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Earlier this month, the White House released the National Cybersecurity Strategy, the first issued since 2018. The strategy refocuses roles, responsibilities, and resource allocations in the digital ecosystem, with a five pillar approach. Those pillars are: defending critical infrastructure, disrupting threat actors, shaping market forces to drive security and resilience, investing in a resilient future, and forging international partnerships.</p><p>We wanted to delve into the strategy and its intended effects further, so Dave Bittner spoke with representatives from industry and inside government. Dave first speaks with <a href="https://www.linkedin.com/in/adam-isles-038614b/">Adam Isles</a>, Principal and Head of Cybersecurity Practice at The Chertoff Group, sharing industry's take on the strategy. Following that conversation, Dave had a discussion with <a href="https://www.linkedin.com/in/steven-m-kelly-cissp-b9a295187/">Steve Kelly</a>, Special Assistant to the President and Senior Director for Cybersecurity and Emerging Technology at the National Security Council, for a look at the strategy from inside the White House.</p><p>Links to resources:</p><ul>
<li>
<a href="https://www.chertoffgroup.com/blog/2023-national-cybersecurity-strategy">Point of View: 2023 National Cybersecurity Strategy</a> The Chertoff Group's blog</li>
<li><a href="https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf">National Cybersecurity Strategy 2023</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1923</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e9a15832-b571-11ee-b154-2fc8d1f821d7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6111978766.mp3?updated=1679681717" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A firewall wake up call. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/313/notes</link>
      <description>Jon Williams from Bishop Fox is sharing their research on "It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable." SonicWall published advisories for CVE-2022-22274 and CVE-2023-0656 a year apart after finding that NGFW series 6 and 7 devices are affected by two unauthenticated denial-of-service vulnerabilities.
The research states "Our research found that the two issues are fundamentally the same but exploitable at different HTTP URI paths due to reuse of a vulnerable code pattern." They also found that when they scanned SonicWall firewalls with management interfaces exposed to the internet, they found that 76% are vulnerable to one or both issues.
The research can be found here:
It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Jan 2024 08:10:00 -0000</pubDate>
      <itunes:title>A firewall wake up call. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>313</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Jon Williams from Bishop Fox is sharing their research on "It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable." SonicWall published advisories for CVE-2022-22274 and CVE-2023-0656 a year apart after finding that NGFW series 6 and 7 devices are affected by two unauthenticated denial-of-service vulnerabilities.
The research states "Our research found that the two issues are fundamentally the same but exploitable at different HTTP URI paths due to reuse of a vulnerable code pattern." They also found that when they scanned SonicWall firewalls with management interfaces exposed to the internet, they found that 76% are vulnerable to one or both issues.
The research can be found here:
It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jon Williams from Bishop Fox is sharing their research on "It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable." SonicWall published advisories for CVE-2022-22274 and CVE-2023-0656 a year apart after finding that NGFW series 6 and 7 devices are affected by two unauthenticated denial-of-service vulnerabilities.</p><p>The research states "Our research found that the two issues are fundamentally the same but exploitable at different HTTP URI paths due to reuse of a vulnerable code pattern." They also found that when they scanned SonicWall firewalls with management interfaces exposed to the internet, they found that 76% are vulnerable to one or both issues.</p><p>The research can be found here:</p><ul><li><a href="https://bishopfox.com/blog/its-2024-and-over-178-000-sonicwall-firewalls-are-publicly-exploitable">It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1261</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3516c3a6-b707-11ee-a498-ebc9e07fc608]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5927702620.mp3?updated=1705694985" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New malware, new threats.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1986/notes</link>
      <description>Microsoft warns of an Iranian cyberespionage group. The CyberSafety Review Board receives critical reviews of its own. VMWare warns of active product exploitation. Tax info gets leaked in accounting firm breach. Kansas State University reports a cyber incident. CISA adds Citrix Netscaler vulnerabilities to its Known Exploited Vulnerabilities catalog. Councils in the UK suffer online disruptions. Cyber insurance can be a double edged sword. More email security breaches lead to firings. In our Solution Spotlight, N2K President Simone Petrella speaks with Michelle Amante of the Partnership for Public Service With an update on the Cybersecurity Talent Initiative. And it’s shields up for Generation Z.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On the Solution Spotlight, N2K President Simone Petrella speaks with Michelle Amante of the Partnership for Public Service sharing an update on the Cybersecurity Talent Initiative and how federal agencies and early career existing talent that may be interested in the program’s offerings.

Selected Reading
Microsoft: Iranian hackers target researchers with new MediaPl malware (Bleeping Computer)
Cyber Safety Review Board needs stronger authorities, more independence, experts say (Cyberscoop)
VMware vCenter Server Vulnerability Exploited in Wild (SecurityWeek)
ELO accounting data breach sparks tax fraud (Cybernews)
Cyber attacks on Kent councils disrupt online services (BBC)
Kansas State University suffered a serious cybersecurity incident (SecurityAffairs)
CISA urges urgent patching of two actively exploited Citrix NetScaler vulnerabilities (Malwarebytes)
Cyber Insurance in the Age of Ransomware: Protection or Provocation? (SOCRadar)
Four-in-ten employees sacked over email security breaches as firms tackle “truly staggering” increase in attacks (IT Pro)
Think boomers are most vulnerable to cybersecurity attacks? Wrong. It's actually Gen Z (CBC)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2024 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 19 Jan 2024 21:10:00 -0000</pubDate>
      <itunes:title>New malware, new threats.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1986</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Microsoft warns of an Iranian cyberespionage group. The CyberSafety Review Board receives critical reviews of its own. VMWare warns of active product exploitation. Tax info gets leaked in accounting firm breach. Kansas State University reports a cyber incident. CISA adds Citrix Netscaler vulnerabilities to its Known Exploited Vulnerabilities catalog. Councils in the UK suffer online disruptions. Cyber insurance can be a double edged sword. More email security breaches lead to firings. In our Solution Spotlight, N2K President Simone Petrella speaks with Michelle Amante of the Partnership for Public Service With an update on the Cybersecurity Talent Initiative. And it’s shields up for Generation Z.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On the Solution Spotlight, N2K President Simone Petrella speaks with Michelle Amante of the Partnership for Public Service sharing an update on the Cybersecurity Talent Initiative and how federal agencies and early career existing talent that may be interested in the program’s offerings.

Selected Reading
Microsoft: Iranian hackers target researchers with new MediaPl malware (Bleeping Computer)
Cyber Safety Review Board needs stronger authorities, more independence, experts say (Cyberscoop)
VMware vCenter Server Vulnerability Exploited in Wild (SecurityWeek)
ELO accounting data breach sparks tax fraud (Cybernews)
Cyber attacks on Kent councils disrupt online services (BBC)
Kansas State University suffered a serious cybersecurity incident (SecurityAffairs)
CISA urges urgent patching of two actively exploited Citrix NetScaler vulnerabilities (Malwarebytes)
Cyber Insurance in the Age of Ransomware: Protection or Provocation? (SOCRadar)
Four-in-ten employees sacked over email security breaches as firms tackle “truly staggering” increase in attacks (IT Pro)
Think boomers are most vulnerable to cybersecurity attacks? Wrong. It's actually Gen Z (CBC)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2024 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft warns of an Iranian cyberespionage group. The CyberSafety Review Board receives critical reviews of its own. VMWare warns of active product exploitation. Tax info gets leaked in accounting firm breach. Kansas State University reports a cyber incident. CISA adds Citrix Netscaler vulnerabilities to its Known Exploited Vulnerabilities catalog. Councils in the UK suffer online disruptions. Cyber insurance can be a double edged sword. More email security breaches lead to firings. In our Solution Spotlight, N2K President Simone Petrella speaks with Michelle Amante of the Partnership for Public Service With an update on the Cybersecurity Talent Initiative. And it’s shields up for Generation Z.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On the Solution Spotlight, <a href="https://www.n2k.com/">N2K</a> President <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a> speaks with <a href="https://www.linkedin.com/in/michelle-amante-1804352/">Michelle Amante</a> of the Partnership for Public Service sharing an update on the <a href="https://gogovernment.org/fellowship/cybersecurity-talent-initiative/">Cybersecurity Talent Initiative</a> and how federal agencies and early career existing talent that may be interested in the program’s offerings.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-iranian-hackers-target-researchers-with-new-mediapl-malware/">Microsoft: Iranian hackers target researchers with new MediaPl malware</a> (Bleeping Computer)</p><p><a href="https://cyberscoop.com/csrb-hearing-authority-transparency/">Cyber Safety Review Board needs stronger authorities, more independence, experts say </a>(Cyberscoop)</p><p><a href="https://www.securityweek.com/vmware-vcenter-server-vulnerability-exploited-in-wild/">VMware vCenter Server Vulnerability Exploited in Wild</a> (SecurityWeek)</p><p><a href="https://cybernews.com/news/elo-accounting-data-breach-tax-fraud/">ELO accounting data breach sparks tax fraud</a> (Cybernews)</p><p><a href="https://www.bbc.com/news/uk-england-kent-68023647">Cyber attacks on Kent councils disrupt online services</a> (BBC)</p><p><a href="https://securityaffairs.com/157729/security/kansas-state-university-cyber-attack.html">Kansas State University suffered a serious cybersecurity incident</a> (SecurityAffairs)</p><p><a href="https://www.malwarebytes.com/blog/news/2024/01/cisa-urges-urgent-patching-of-two-actively-exploited-citrix-netscaler-vulnerabilities">CISA urges urgent patching of two actively exploited Citrix NetScaler vulnerabilities</a> (Malwarebytes)</p><p><a href="https://socradar.io/cyber-insurance-in-the-age-of-ransomware-protection-or-provocation/">Cyber Insurance in the Age of Ransomware: Protection or Provocation?</a> (SOCRadar)</p><p><a href="https://www.itpro.com/security/four-in-ten-employees-sacked-over-email-security-breaches-as-firms-tackle-truly-staggering-increase-in-attacks">Four-in-ten employees sacked over email security breaches as firms tackle “truly staggering” increase in attacks</a> (IT Pro)</p><p><a href="https://ca.news.yahoo.com/think-boomers-most-vulnerable-cybersecurity-120000496.html">Think boomers are most vulnerable to cybersecurity attacks? Wrong. It's actually Gen Z</a> (CBC)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2024 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1594</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ebba1f34-b6ff-11ee-9296-d7589b66d3a7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9671051948.mp3?updated=1705693091" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A credential dump hits the online underground.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1985/notes</link>
      <description>A massive credential dump hits the online underground. CISA and the FBI issue joint guidance on drones. TensorFlow frameworks are prone to misconfigurations. Swiss federal agencies are targets of nuisance DDoS. Cybercriminals hit vulnerable Docker servers. Quarkslab identifies PixieFAIL in UEFI implementations. Google patches Chrome zero-day. The Bigpanzi botnet infects smart TVs. Proofpoint notes the return of TA866. In our Threat Vector segment, David Moulton dives into the evolving world of AI in cybersecurity with Kyle Wilhoit, director of threat research at Unit 42. And we are shocked- SHOCKED! - to learn that Facebook is tracking us. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
This segment of Threat Vector dives into the evolving world of AI in cybersecurity with Kyle Wilhoit, director of threat research at Unit 42. This thought-provoking discussion, hosted by David Moulton, director of thought leadership at Unit 42, ffocuses on the current state and future trends of AI in cyberthreats. Discover how AI is reshaping the landscape of cyberattacks, the role of generative AI in threat actor tactics, and the challenges of attribution in AI-driven cyberattacks. Visit Unit 42 by Palo Alto Networks﻿ to learn more. 
Check out the Threat Vector podcast and follow it on your favorite podcast app. 

Selected Reading
Researcher uncovers one of the biggest password dumps in recent history (Ars Technica)
Troy Hunt: Inside the Massive Naz.API Credential Stuffing List (Troy Hunt)
Feds warn China-made drones pose risk to US critical infrastructure (SC Media)
TensorFlow CI/CD Flaw Exposed Supply Chain to Poisoning Attacks (The Hacker News)
Swiss Government Reports Nuisance-Level DDoS Disruptions (Data Breach Today)
Malware Exploits 9Hits, Turns Docker Servers into Traffic Boosted Crypto Miners (HACKREAD)
PixieFail: Nine flaws in UEFI open-source reference implementation (Security Affairs)
Update Chrome! Google patches actively exploited zero-day vulnerability (Malwarebytes)
Cybercrime crew infects 172,000 smart TVs and set-top boxes (Risky Biz News)
Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware (Google Threat Analysis Group)
Security Brief: TA866 Returns with a Large Email Campaign (Proofpoint)
Each Facebook User Is Monitored by Thousands of Companies (Consumer Reports)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 18 Jan 2024 21:10:00 -0000</pubDate>
      <itunes:title>A credential dump hits the online underground.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1985</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A massive credential dump hits the online underground. CISA and the FBI issue joint guidance on drones. TensorFlow frameworks are prone to misconfigurations. Swiss federal agencies are targets of nuisance DDoS. Cybercriminals hit vulnerable Docker servers. Quarkslab identifies PixieFAIL in UEFI implementations. Google patches Chrome zero-day. The Bigpanzi botnet infects smart TVs. Proofpoint notes the return of TA866. In our Threat Vector segment, David Moulton dives into the evolving world of AI in cybersecurity with Kyle Wilhoit, director of threat research at Unit 42. And we are shocked- SHOCKED! - to learn that Facebook is tracking us. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
This segment of Threat Vector dives into the evolving world of AI in cybersecurity with Kyle Wilhoit, director of threat research at Unit 42. This thought-provoking discussion, hosted by David Moulton, director of thought leadership at Unit 42, ffocuses on the current state and future trends of AI in cyberthreats. Discover how AI is reshaping the landscape of cyberattacks, the role of generative AI in threat actor tactics, and the challenges of attribution in AI-driven cyberattacks. Visit Unit 42 by Palo Alto Networks﻿ to learn more. 
Check out the Threat Vector podcast and follow it on your favorite podcast app. 

Selected Reading
Researcher uncovers one of the biggest password dumps in recent history (Ars Technica)
Troy Hunt: Inside the Massive Naz.API Credential Stuffing List (Troy Hunt)
Feds warn China-made drones pose risk to US critical infrastructure (SC Media)
TensorFlow CI/CD Flaw Exposed Supply Chain to Poisoning Attacks (The Hacker News)
Swiss Government Reports Nuisance-Level DDoS Disruptions (Data Breach Today)
Malware Exploits 9Hits, Turns Docker Servers into Traffic Boosted Crypto Miners (HACKREAD)
PixieFail: Nine flaws in UEFI open-source reference implementation (Security Affairs)
Update Chrome! Google patches actively exploited zero-day vulnerability (Malwarebytes)
Cybercrime crew infects 172,000 smart TVs and set-top boxes (Risky Biz News)
Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware (Google Threat Analysis Group)
Security Brief: TA866 Returns with a Large Email Campaign (Proofpoint)
Each Facebook User Is Monitored by Thousands of Companies (Consumer Reports)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A massive credential dump hits the online underground. CISA and the FBI issue joint guidance on drones. TensorFlow frameworks are prone to misconfigurations. Swiss federal agencies are targets of nuisance DDoS. Cybercriminals hit vulnerable Docker servers. Quarkslab identifies PixieFAIL in UEFI implementations. Google patches Chrome zero-day. The Bigpanzi botnet infects smart TVs. Proofpoint notes the return of TA866. In our Threat Vector segment, David Moulton dives into the evolving world of AI in cybersecurity with Kyle Wilhoit, director of threat research at Unit 42. And we are shocked- SHOCKED! - to learn that Facebook is tracking us. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>This segment of Threat Vector dives into the evolving world of AI in cybersecurity with<a href="https://www.linkedin.com/in/kylewilhoit/"> </a><a href="https://www.linkedin.com/in/kylewilhoit/">Kyle Wilhoit</a>, director of threat research at<a href="https://www.paloaltonetworks.com/unit42"> </a><a href="https://www.paloaltonetworks.com/unit42">Unit 42</a>. This thought-provoking discussion, hosted by<a href="https://www.linkedin.com/in/davidrmoulton"> </a><a href="https://www.linkedin.com/in/davidrmoulton">David Moulton</a>, director of thought leadership at Unit 42, ffocuses on the current state and future trends of AI in cyberthreats. Discover how AI is reshaping the landscape of cyberattacks, the role of generative AI in threat actor tactics, and the challenges of attribution in AI-driven cyberattacks. Visit<a href="https://www.paloaltonetworks.com/unit42"> </a><a href="https://www.paloaltonetworks.com/unit42">Unit 42 by Palo Alto Networks</a>﻿ to learn more. </p><p>Check out the <a href="https://thecyberwire.com/podcasts/threat-vector">Threat Vector</a> podcast and follow it on your favorite podcast app. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://arstechnica.com/security/2024/01/71-million-passwords-for-facebook-coinbase-and-others-found-for-sale/">Researcher uncovers one of the biggest password dumps in recent history</a> (Ars Technica)</p><p><a href="https://www.troyhunt.com/inside-the-massive-naz-api-credential-stuffing-list/">Troy Hunt: Inside the Massive Naz.API Credential Stuffing List</a> (Troy Hunt)</p><p><a href="https://www.scmagazine.com/news/feds-warn-china-made-drones-a-risk-to-uss-critical-infrastructure">Feds warn China-made drones pose risk to US critical infrastructure</a> (SC Media)</p><p><a href="https://thehackernews.com/2024/01/tensorflow-cicd-flaw-exposed-supply.html">TensorFlow CI/CD Flaw Exposed Supply Chain to Poisoning Attacks</a> (The Hacker News)</p><p><a href="https://www.databreachtoday.co.uk/blogs/swiss-government-reports-nuisance-level-ddos-disruptions-p-3554">Swiss Government Reports Nuisance-Level DDoS Disruptions</a> (Data Breach Today)</p><p><a href="https://www.hackread.com/docker-servers-malware-traffic-boosted-cryptominers/">Malware Exploits 9Hits, Turns Docker Servers into Traffic Boosted Crypto Miners</a> (HACKREAD)</p><p><a href="https://securityaffairs.com/157683/hacking/pixiefail-uefi-vulnerabilities.html">PixieFail: Nine flaws in UEFI open-source reference implementation</a> (Security Affairs)</p><p><a href="https://www.malwarebytes.com/blog/news/2024/01/update-chrome-google-patches-actively-exploited-zero-day-vulnerability">Update Chrome! Google patches actively exploited zero-day vulnerability</a> (Malwarebytes)</p><p><a href="https://riskybiznews.substack.com/p/risky-biz-news-cybercrime-crew-infects">Cybercrime crew infects 172,000 smart TVs and set-top boxes</a> (Risky Biz News)</p><p><a href="https://blog.google/threat-analysis-group/google-tag-coldriver-russian-phishing-malware/">Russian threat group COLDRIVER expands its targeting of Western officials to include the use of malware</a> (Google Threat Analysis Group)</p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/security-brief-ta866-returns-large-email-campaign">Security Brief: TA866 Returns with a Large Email Campaign</a> (Proofpoint)</p><p><a href="https://www.consumerreports.org/electronics/privacy/each-facebook-user-is-monitored-by-thousands-of-companies-a5824207467/">Each Facebook User Is Monitored by Thousands of Companies</a> (Consumer Reports)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1512</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fdf70522-b637-11ee-bca8-4bf96d639a5e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9337741467.mp3?updated=1705607195" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exploring the cosmic frontier: Unveiling the future of space law. [Caveat]</title>
      <link>https://thecyberwire.com/podcasts/caveat/202/notes</link>
      <description>Bryce Kennedy, President of the Association of Commercial Space Professionals (ACSP), is sharing what is on horizon in space law. Bryce is also a space lawyer and a regular contributor to our T-Minus daily space podcast right here on the N2K podcast network.
You can hear more from the T-Minus space daily show here.
While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. 
Caveat Briefing
A companion weekly newsletter is available CyberWire Pro members on the CyberWire's website. If you are a member, make sure you subscribe to receive our weekly wrap-up of privacy, policy, and research news, focused on incidents, techniques, tips, compliance, rights, trends, threats, policy, and influence ops delivered to you inbox each Thursday.
Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com. Hope to hear from you.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 18 Jan 2024 08:00:00 -0000</pubDate>
      <itunes:title>Exploring the cosmic frontier: Unveiling the future of space law. [Caveat]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>202</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Bryce Kennedy, President of the Association of Commercial Space Professionals (ACSP), is sharing what is on horizon in space law. Bryce is also a space lawyer and a regular contributor to our T-Minus daily space podcast right here on the N2K podcast network.
You can hear more from the T-Minus space daily show here.
While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. 
Caveat Briefing
A companion weekly newsletter is available CyberWire Pro members on the CyberWire's website. If you are a member, make sure you subscribe to receive our weekly wrap-up of privacy, policy, and research news, focused on incidents, techniques, tips, compliance, rights, trends, threats, policy, and influence ops delivered to you inbox each Thursday.
Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com. Hope to hear from you.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Bryce Kennedy, President of the Association of Commercial Space Professionals (ACSP), is sharing what is on horizon in space law. Bryce is also a space lawyer and a regular contributor to our T-Minus daily space podcast right here on the N2K podcast network.</p><p>You can hear more from the T-Minus space daily show <a href="https://space.n2k.com/podcasts/t-minus">here</a>.</p><p><em>While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. </em></p><h2><strong>Caveat Briefing</strong></h2><p>A companion weekly newsletter is available CyberWire Pro members on the CyberWire's website. If you are a member, make sure you subscribe to receive our weekly wrap-up of privacy, policy, and research news, focused on incidents, techniques, tips, compliance, rights, trends, threats, policy, and influence ops delivered to you inbox each Thursday.</p><p><em>Got a question you'd like us to answer on our show? You can send your audio file to </em><a href="mailto:caveat@thecyberwire.com"><em>caveat@thecyberwire.com</em></a><em>. Hope to hear from you.</em></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1594</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3672f12e-b57d-11ee-b43c-6b2745de6012]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7946607881.mp3?updated=1705527340" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Maximum severity vulnerability needs critical updates. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1984/notes</link>
      <description>Atlassian issues critical updates. CISA and the FBI warn of AndroxGh0st. A GPU vulnerability hits major manufacturers. A Foxconn subsidiary in Taiwan gets hacked. Australians suffer breached credit cards through credential stuffing. A parade of horrible hackers and scammers. CISO accountability is highlighted at ShmooCon. Cybersecurity VC funding plummets. On the Learning Layer, N2K’s Executive Director of Product Innovation Sam Meisenberg lets us in on an A+ tutoring session. Don’t ask ChatGPT to handle your Amazon product listings. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On the Learning Layer with N2K’s Executive Director of Product Innovation Sam Meisenberg lets us in on an A+ tutoring session he held with Jaden Dicks.

Selected Reading
Atlassian’s Confluence Data Center and Server Affected by Critical RCE Vulnerability, CVE-2023-22527: Patch Now (SOCRadar)
FBI, CISA warn of AndroxGh0st botnet for victim identification and exploitation (Security Affairs)
A new vulnerability affecting Apple, AMD, and Qualcomm GPUs could expose AI data (TechSpot)
Taiwan’s Foxconn subsidiary faces cyberattack (Taiwan News)
15,000 Aussies Affected After Binge, The Iconic Hacked (Pedestrian)
Hackers post disturbing videos to online forum used by UC Irvine students (ABC7)
Heartless scammers prey on hundreds of lost pet owners, demanding ransoms or else… (Bitdefender)
As hacks worsen, SEC turns up the heat on CISOs (TechCrunch)
Cybersecurity Startup Funding Hits 5-Year Low, Drops 50% From 2022 (Crunchbase)
Amazon Is Selling Products With AI-Generated Names Like "I Cannot Fulfill This Request It Goes Against OpenAI Use Policy" (Futurism)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 17 Jan 2024 21:10:00 -0000</pubDate>
      <itunes:title>Maximum severity vulnerability needs critical updates. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1984</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Atlassian issues critical updates. CISA and the FBI warn of AndroxGh0st. A GPU vulnerability hits major manufacturers. A Foxconn subsidiary in Taiwan gets hacked. Australians suffer breached credit cards through credential stuffing. A parade of horrible hackers and scammers. CISO accountability is highlighted at ShmooCon. Cybersecurity VC funding plummets. On the Learning Layer, N2K’s Executive Director of Product Innovation Sam Meisenberg lets us in on an A+ tutoring session. Don’t ask ChatGPT to handle your Amazon product listings. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On the Learning Layer with N2K’s Executive Director of Product Innovation Sam Meisenberg lets us in on an A+ tutoring session he held with Jaden Dicks.

Selected Reading
Atlassian’s Confluence Data Center and Server Affected by Critical RCE Vulnerability, CVE-2023-22527: Patch Now (SOCRadar)
FBI, CISA warn of AndroxGh0st botnet for victim identification and exploitation (Security Affairs)
A new vulnerability affecting Apple, AMD, and Qualcomm GPUs could expose AI data (TechSpot)
Taiwan’s Foxconn subsidiary faces cyberattack (Taiwan News)
15,000 Aussies Affected After Binge, The Iconic Hacked (Pedestrian)
Hackers post disturbing videos to online forum used by UC Irvine students (ABC7)
Heartless scammers prey on hundreds of lost pet owners, demanding ransoms or else… (Bitdefender)
As hacks worsen, SEC turns up the heat on CISOs (TechCrunch)
Cybersecurity Startup Funding Hits 5-Year Low, Drops 50% From 2022 (Crunchbase)
Amazon Is Selling Products With AI-Generated Names Like "I Cannot Fulfill This Request It Goes Against OpenAI Use Policy" (Futurism)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Atlassian issues critical updates. CISA and the FBI warn of AndroxGh0st. A GPU vulnerability hits major manufacturers. A Foxconn subsidiary in Taiwan gets hacked. Australians suffer breached credit cards through credential stuffing. A parade of horrible hackers and scammers. CISO accountability is highlighted at ShmooCon. Cybersecurity VC funding plummets. On the Learning Layer, N2K’s Executive Director of Product Innovation Sam Meisenberg lets us in on an A+ tutoring session. Don’t ask ChatGPT to handle your Amazon product listings. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On the Learning Layer with <a href="https://www.n2k.com/">N2K’s</a> Executive Director of Product Innovation <a href="https://www.linkedin.com/in/sam-meisenberg/">Sam Meisenberg</a> lets us in on an A+ tutoring session he held with <a href="https://www.linkedin.com/in/jaden-dicks-2488a4283/">Jaden Dicks</a>.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://socradar.io/atlassians-confluence-data-center-and-server-affected-by-critical-rce-vulnerability-cve-2023-22527-patch-now/">Atlassian’s Confluence Data Center and Server Affected by Critical RCE Vulnerability, CVE-2023-22527: Patch Now</a> (SOCRadar)</p><p><a href="https://securityaffairs.com/157622/cyber-crime/androxgh0st-botnet-alert.html">FBI, CISA warn of AndroxGh0st botnet for victim identification and exploitation</a> (Security Affairs)</p><p><a href="https://www.techspot.com/news/101543-new-vulnerability-affecting-apple-amd-qualcomm-gpus-could.html">A new vulnerability affecting Apple, AMD, and Qualcomm GPUs could expose AI data</a> (TechSpot)</p><p><a href="https://www.taiwannews.com.tw/en/news/5079976">Taiwan’s Foxconn subsidiary faces cyberattack</a> (Taiwan News)</p><p><a href="https://www.pedestrian.tv/news/binge-the-iconic-hacked/">15,000 Aussies Affected After Binge, The Iconic Hacked</a> (Pedestrian)</p><p><a href="https://abc7.com/uc-irvine-hackers-gruesome-videos-hacking/14331270/">Hackers post disturbing videos to online forum used by UC Irvine students</a> (ABC7)</p><p><a href="https://www.bitdefender.com/blog/hotforsecurity/heartless-scammers-prey-on-hundreds-of-lost-pet-owners-demanding-ransoms-or-else/">Heartless scammers prey on hundreds of lost pet owners, demanding ransoms or else…</a> (Bitdefender)</p><p><a href="https://techcrunch.com/2024/01/17/security-leadership-ciso-heat-risk/">As hacks worsen, SEC turns up the heat on CISOs </a>(TechCrunch)</p><p><a href="https://news.crunchbase.com/cybersecurity/funding-drops-eoy-2023/">Cybersecurity Startup Funding Hits 5-Year Low, Drops 50% From 2022</a> (Crunchbase)</p><p><a href="https://futurism.com/amazon-products-ai-generated">Amazon Is Selling Products With AI-Generated Names Like "I Cannot Fulfill This Request It Goes Against OpenAI Use Policy"</a> (Futurism)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1788</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2c56f94c-b573-11ee-a86e-6f8cd942c0cb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7316451010.mp3?updated=1705523110" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Vulnerabilities and security risks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1983/notes</link>
      <description>Ivanti products are under active zero-day exploitation. Phemedrone is a new open-source info-stealer. Bishop Fox finds exposed SonicWall firewalls. GitLab and VMware patch critical vulnerabilities. The Secret Service foils a phishing scam. Europol shuts down a cryptojacking campaign. Ransomware hits a Majorca municipality. RUSI looks at ransomware. Ben Yelin explains the New York Times going after OpenAI over the data scraping. And the sad case of an Ohio lottery winner. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest and partner Ben Yelin joins us today to discuss “The Most Critical Elements of the FTC’s Health Breach Rulemaking.” Ben is the Program Director for Public Policy &amp; External Affairs at the University of Maryland Center for Health and Homeland Security and Co-Host of N2K’s Caveat Podcast.

Selected Reading
Ivanti Connect Secure zero-days now under mass exploitation (Bleeping Computer)
Windows SmartScreen flaw exploited to drop Phemedrone malware (Bleeping Computer)
Over 178,000 SonicWall next-generation firewalls (NGFW) online exposed to hack (Security Affairs)
GitLab Fixes Password Reset Bug That Allows Account Takeover (Security Boulevard)
Patches Available for a Critical Vulnerability in VMware Aria Automation: CVE-2023-34063 (Malware News)
US court docs expose fake antivirus renewal phishing tactics (Bleeping Computer)
Hacker spins up 1 million virtual servers to illegally mine crypto (Bleeping Computer)
Ransomware gang demands €10 million after attacking Spanish council (The Record)
Ransomware: Victim Insights on Harms to Individuals, Organisations and Society (Royal United Services Institute)
Cybersecurity incident delays payouts for big Ohio Lottery winners (Beacon Journal)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Jan 2024 21:10:00 -0000</pubDate>
      <itunes:title>Vulnerabilities and security risks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1983</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ivanti products are under active zero-day exploitation. Phemedrone is a new open-source info-stealer. Bishop Fox finds exposed SonicWall firewalls. GitLab and VMware patch critical vulnerabilities. The Secret Service foils a phishing scam. Europol shuts down a cryptojacking campaign. Ransomware hits a Majorca municipality. RUSI looks at ransomware. Ben Yelin explains the New York Times going after OpenAI over the data scraping. And the sad case of an Ohio lottery winner. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest and partner Ben Yelin joins us today to discuss “The Most Critical Elements of the FTC’s Health Breach Rulemaking.” Ben is the Program Director for Public Policy &amp; External Affairs at the University of Maryland Center for Health and Homeland Security and Co-Host of N2K’s Caveat Podcast.

Selected Reading
Ivanti Connect Secure zero-days now under mass exploitation (Bleeping Computer)
Windows SmartScreen flaw exploited to drop Phemedrone malware (Bleeping Computer)
Over 178,000 SonicWall next-generation firewalls (NGFW) online exposed to hack (Security Affairs)
GitLab Fixes Password Reset Bug That Allows Account Takeover (Security Boulevard)
Patches Available for a Critical Vulnerability in VMware Aria Automation: CVE-2023-34063 (Malware News)
US court docs expose fake antivirus renewal phishing tactics (Bleeping Computer)
Hacker spins up 1 million virtual servers to illegally mine crypto (Bleeping Computer)
Ransomware gang demands €10 million after attacking Spanish council (The Record)
Ransomware: Victim Insights on Harms to Individuals, Organisations and Society (Royal United Services Institute)
Cybersecurity incident delays payouts for big Ohio Lottery winners (Beacon Journal)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ivanti products are under active zero-day exploitation. Phemedrone is a new open-source info-stealer. Bishop Fox finds exposed SonicWall firewalls. GitLab and VMware patch critical vulnerabilities. The Secret Service foils a phishing scam. Europol shuts down a cryptojacking campaign. Ransomware hits a Majorca municipality. RUSI looks at ransomware. Ben Yelin explains the New York Times going after OpenAI over the data scraping. And the sad case of an Ohio lottery winner. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest and partner <a href="https://www.linkedin.com/in/benjamin-yelin-5b14114b/">Ben Yelin</a> joins us today to discuss “<a href="https://www.lawfaremedia.org/article/the-most-critical-elements-of-the-ftc-s-health-breach-rulemaking">The Most Critical Elements of the FTC’s Health Breach Rulemaking</a>.” Ben is the Program Director for Public Policy &amp; External Affairs at the <a href="https://www.mdchhs.com/">University of Maryland Center for Health and Homeland Security</a> and Co-Host of N2K’s Caveat Podcast.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/ivanti-connect-secure-zero-days-now-under-mass-exploitation/">Ivanti Connect Secure zero-days now under mass exploitation</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/windows-smartscreen-flaw-exploited-to-drop-phemedrone-malware/">Windows SmartScreen flaw exploited to drop Phemedrone malware</a> (Bleeping Computer)</p><p><a href="https://securityaffairs.com/157524/hacking/vulnerable-sonicwall-ngfw-exposed-online.html">Over 178,000 SonicWall next-generation firewalls (NGFW) online exposed to hack</a> (Security Affairs)</p><p><a href="https://securityboulevard.com/2024/01/gitlab-fixes-password-reset-bug-that-allows-account-takeover/">GitLab Fixes Password Reset Bug That Allows Account Takeover </a>(Security Boulevard)</p><p><a href="https://malware.news/t/patches-available-for-a-critical-vulnerability-in-vmware-aria-automation-cve-2023-34063/77639">Patches Available for a Critical Vulnerability in VMware Aria Automation: CVE-2023-34063</a> (Malware News)</p><p><a href="https://www.bleepingcomputer.com/news/security/us-court-docs-expose-fake-antivirus-renewal-phishing-tactics/">US court docs expose fake antivirus renewal phishing tactics</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/hacker-spins-up-1-million-virtual-servers-to-illegally-mine-crypto/">Hacker spins up 1 million virtual servers to illegally mine crypto</a> (Bleeping Computer)</p><p><a href="https://therecord.media/calvia-spain-ransomware-attack-10-million-euros-demand">Ransomware gang demands €10 million after attacking Spanish council</a> (The Record)</p><p><a href="https://www.rusi.org/explore-our-research/publications/occasional-papers/ransomware-victim-insights-harms-individuals-organisations-and-society">Ransomware: Victim Insights on Harms to Individuals, Organisations and Society</a> (Royal United Services Institute)</p><p><a href="https://www.beaconjournal.com/story/news/2024/01/12/cybersecurity-incident-delays-payouts-for-big-ohio-lottery-winners/72191852007/">Cybersecurity incident delays payouts for big Ohio Lottery winners</a> (Beacon Journal)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1610</itunes:duration>
      <guid isPermaLink="false"><![CDATA[ce101b06-b4a6-11ee-b8d1-cb604c9769c4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4381038476.mp3?updated=1705434872" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Putting a dent in the cybersecurity workforce gap. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/57/notes</link>
      <description>In this special edition of Solution Spotlight, N2K President, Simone Petrella is talking with ISC2 CEO Clar Rosso about putting a dent in the cybersecurity workforce gap through empowerment, breaking down barriers and expanding DE&amp;I initiatives.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 15 Jan 2024 08:10:00 -0000</pubDate>
      <itunes:title>Putting a dent in the cybersecurity workforce gap. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>57</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this special edition of Solution Spotlight, N2K President, Simone Petrella is talking with ISC2 CEO Clar Rosso about putting a dent in the cybersecurity workforce gap through empowerment, breaking down barriers and expanding DE&amp;I initiatives.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this special edition of Solution Spotlight, N2K President, Simone Petrella is talking with ISC2 CEO Clar Rosso about putting a dent in the cybersecurity workforce gap through empowerment, breaking down barriers and expanding DE&amp;I initiatives.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1863</itunes:duration>
      <guid isPermaLink="false"><![CDATA[b98fc2d2-b16b-11ee-abdb-8b158adeac86]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7922118820.mp3?updated=1705077783" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Examining the current state of security orchestration. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/48/notes</link>
      <description>In this encore episode of CyberWire-X, N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by guest Rohit Dhamankar, Fortra's Vice President of Product Strategy, and Hash Table member Steve Winterfeld, Akamai's Advisory CISO to discuss CISO initiatives such as vendor consolidation, automation, and attack surface management as a way to determine if it’s possible to achieve both increased security maturity and decreased operational load. This session covers common mistakes when adopting security technologies, including the pros and cons of AI, and how to better collaborate together.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 15 Jan 2024 06:10:00 -0000</pubDate>
      <itunes:title>Encore: Examining the current state of security orchestration. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>48</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this encore episode of CyberWire-X, N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by guest Rohit Dhamankar, Fortra's Vice President of Product Strategy, and Hash Table member Steve Winterfeld, Akamai's Advisory CISO to discuss CISO initiatives such as vendor consolidation, automation, and attack surface management as a way to determine if it’s possible to achieve both increased security maturity and decreased operational load. This session covers common mistakes when adopting security technologies, including the pros and cons of AI, and how to better collaborate together.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this encore episode of CyberWire-X, N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by guest Rohit Dhamankar, Fortra's Vice President of Product Strategy, and Hash Table member Steve Winterfeld, Akamai's Advisory CISO to discuss CISO initiatives such as vendor consolidation, automation, and attack surface management as a way to determine if it’s possible to achieve both increased security maturity and decreased operational load. This session covers common mistakes when adopting security technologies, including the pros and cons of AI, and how to better collaborate together.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1873</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d11ba3f2-afeb-11ee-a34e-ffda8d501578]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9263839426.mp3?updated=1700072969" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Kathleen Booth: Get your foot in the door and prove your worth. [Marketing] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/4/notes</link>
      <description>Vice President of Marketing, Kathleen Booth, shares her career path from political science and international development to marketing for a cybersecurity company. Early dreams of acting morphed into goals of making the world a better place. Chief marketer and podcaster Kathleen is doing just that. She shares how proving your worth can lead to success. Listen for Kathleen's advice on getting your foot in the door. Our thanks to Kathleen for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 14 Jan 2024 08:10:00 -0000</pubDate>
      <itunes:title>Encore: Kathleen Booth: Get your foot in the door and prove your worth. [Marketing] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Vice President of Marketing, Kathleen Booth, shares her career path from political science and international development to marketing for a cybersecurity company. Early dreams of acting morphed into goals of making the world a better place. Chief marketer and podcaster Kathleen is doing just that. She shares how proving your worth can lead to success. Listen for Kathleen's advice on getting your foot in the door. Our thanks to Kathleen for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Vice President of Marketing, Kathleen Booth, shares her career path from political science and international development to marketing for a cybersecurity company. Early dreams of acting morphed into goals of making the world a better place. Chief marketer and podcaster Kathleen is doing just that. She shares how proving your worth can lead to success. Listen for Kathleen's advice on getting your foot in the door. Our thanks to Kathleen for sharing her story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>321</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2546af48-b15f-11ee-8816-bf2eab90454a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1324532483.mp3?updated=1705073347" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dual Russian cyber gangs hit 23 companies. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/312/notes</link>
      <description>Ryan Westman, Senior Manager, Threat Intelligence, eSentire's Threat Response Unit (TRU), is discussing their research "Two Russian-speaking cyber gangs attack employees from 23 different companies." They are using malicious Google ads, promoting popular business software such as Zoom, Slack, and Adobe.
The customers targeted are companies in the manufacturing, software, legal, retail and healthcare industries. The attacking threat actors belong to the Russian-speaking Malware-as-a-Service (MaaS) groups called BatLoader and FakeBat.
The research can be found here:
Two Competing, Russian-Speaking Cybercrime Groups Attack Employees from 23 Companies in the Manufacturing, Software, Legal, Retail, and Healthcare Sectors Using Malicious Google Ads

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Jan 2024 08:10:00 -0000</pubDate>
      <itunes:title>Dual Russian cyber gangs hit 23 companies. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>312</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ryan Westman, Senior Manager, Threat Intelligence, eSentire's Threat Response Unit (TRU), is discussing their research "Two Russian-speaking cyber gangs attack employees from 23 different companies." They are using malicious Google ads, promoting popular business software such as Zoom, Slack, and Adobe.
The customers targeted are companies in the manufacturing, software, legal, retail and healthcare industries. The attacking threat actors belong to the Russian-speaking Malware-as-a-Service (MaaS) groups called BatLoader and FakeBat.
The research can be found here:
Two Competing, Russian-Speaking Cybercrime Groups Attack Employees from 23 Companies in the Manufacturing, Software, Legal, Retail, and Healthcare Sectors Using Malicious Google Ads

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ryan Westman, Senior Manager, Threat Intelligence, eSentire's Threat Response Unit (TRU), is discussing their research "Two Russian-speaking cyber gangs attack employees from 23 different companies." They are using malicious Google ads, promoting popular business software such as Zoom, Slack, and Adobe.</p><p>The customers targeted are companies in the manufacturing, software, legal, retail and healthcare industries. The attacking threat actors belong to the Russian-speaking Malware-as-a-Service (MaaS) groups called BatLoader and FakeBat.</p><p>The research can be found here:</p><ul><li><a href="https://www.esentire.com/resources/library/two-competing-russian-speaking-cybercrime-groups-attack">Two Competing, Russian-Speaking Cybercrime Groups Attack Employees from 23 Companies in the Manufacturing, Software, Legal, Retail, and Healthcare Sectors Using Malicious Google Ads</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1018</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7249f8c4-b18a-11ee-b513-07a01d45b69b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3587034656.mp3?updated=1705091943" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Casting a wider hiring net.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1982/notes</link>
      <description>The Feds look to cast a wider hiring net. Legislators focus on deepfakes. Cookie stealers bypass MFA on Google accounts. A Fast food hiring chat bot got hacked. Medusa casts her gaze toward extortion. Akira ransomware is active in Finland. GitLab patches critical vulnerabilities. Bosch thermostats are vulnerable to some hot firmware. CSAM vendors’ crypto sophistication grows. CISA released ICS advisories. On our Solution Spotlight, N2K’s Simone Petrella speaks with Kim Jones, Director of Intuit's CyberCRAFT team, about the SEC's heightened focus on cybersecurity. And a little listener feedback, Karaoke style.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight, N2K’s Simone Petrella discusses a possible hurdle with Kim Jones, Director of Intuit's CyberCRAFT team. They talk about the SEC's heightened focus on cybersecurity.

Selected Reading
An analysis of cyberattacks against Danish energy infrastructure. Cryptomining campaign targets weak SSH passwords. (CyberWire)
White House moves to ease education requirements for federal cyber contracting jobs (CyberScoop)
State Legislators Tighten A.I. Rules to Combat Deceptive Election Ads (New York Times)
Info-stealers can steal cookies for permanent access to your Google account (Malwarebytes)
Hackers Break into AI Hiring Chatbot, Could Hire and Reject Fast Food Applicants (404 Media)
Medusa Ransomware Turning Your Files into Stone (Unit 42 by Palo Alto Networks)
Akira ransomware attackers are wiping NAS and tape backups  (Help Net Security)
Urgent: GitLab Releases Patch for Critical Vulnerabilities - Update ASAP (The Hacker News)
Vulnerability Puts Bosch Smart Thermostats at Risk of Compromise (Infosecurity Magazine)
Child Abusers Are Getting Better at Using Crypto to Cover Their Tracks (WIRED)
CISA Releases Nine Industrial Control Systems Advisories (CISA)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 12 Jan 2024 21:10:00 -0000</pubDate>
      <itunes:title>Casting a wider hiring net.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1982</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Feds look to cast a wider hiring net. Legislators focus on deepfakes. Cookie stealers bypass MFA on Google accounts. A Fast food hiring chat bot got hacked. Medusa casts her gaze toward extortion. Akira ransomware is active in Finland. GitLab patches critical vulnerabilities. Bosch thermostats are vulnerable to some hot firmware. CSAM vendors’ crypto sophistication grows. CISA released ICS advisories. On our Solution Spotlight, N2K’s Simone Petrella speaks with Kim Jones, Director of Intuit's CyberCRAFT team, about the SEC's heightened focus on cybersecurity. And a little listener feedback, Karaoke style.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight, N2K’s Simone Petrella discusses a possible hurdle with Kim Jones, Director of Intuit's CyberCRAFT team. They talk about the SEC's heightened focus on cybersecurity.

Selected Reading
An analysis of cyberattacks against Danish energy infrastructure. Cryptomining campaign targets weak SSH passwords. (CyberWire)
White House moves to ease education requirements for federal cyber contracting jobs (CyberScoop)
State Legislators Tighten A.I. Rules to Combat Deceptive Election Ads (New York Times)
Info-stealers can steal cookies for permanent access to your Google account (Malwarebytes)
Hackers Break into AI Hiring Chatbot, Could Hire and Reject Fast Food Applicants (404 Media)
Medusa Ransomware Turning Your Files into Stone (Unit 42 by Palo Alto Networks)
Akira ransomware attackers are wiping NAS and tape backups  (Help Net Security)
Urgent: GitLab Releases Patch for Critical Vulnerabilities - Update ASAP (The Hacker News)
Vulnerability Puts Bosch Smart Thermostats at Risk of Compromise (Infosecurity Magazine)
Child Abusers Are Getting Better at Using Crypto to Cover Their Tracks (WIRED)
CISA Releases Nine Industrial Control Systems Advisories (CISA)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Feds look to cast a wider hiring net. Legislators focus on deepfakes. Cookie stealers bypass MFA on Google accounts. A Fast food hiring chat bot got hacked. Medusa casts her gaze toward extortion. Akira ransomware is active in Finland. GitLab patches critical vulnerabilities. Bosch thermostats are vulnerable to some hot firmware. CSAM vendors’ crypto sophistication grows. CISA released ICS advisories. On our Solution Spotlight, N2K’s Simone Petrella speaks with Kim Jones, Director of Intuit's CyberCRAFT team, about the SEC's heightened focus on cybersecurity. And a little listener feedback, Karaoke style.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Solution Spotlight, N2K’s Simone Petrella discusses a possible hurdle with Kim Jones, Director of Intuit's CyberCRAFT team. They talk about the SEC's heightened focus on cybersecurity.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://thecyberwire.com/newsletters/daily-briefing/13/9">An analysis of cyberattacks against Danish energy infrastructure. Cryptomining campaign targets weak SSH passwords.</a> (CyberWire)</p><p><a href="https://cyberscoop.com/harry-coker-education-requirements-federal-cybersecurity-jobs/">White House moves to ease education requirements for federal cyber contracting jobs</a> (CyberScoop)</p><p><a href="https://www.nytimes.com/2024/01/11/us/ai-election-ads-state-legislators.html">State Legislators Tighten A.I. Rules to Combat Deceptive Election Ads</a> (New York Times)</p><p><a href="https://www.malwarebytes.com/blog/news/2024/01/info-stealers-can-steal-cookies-for-permanent-access-to-your-google-account">Info-stealers can steal cookies for permanent access to your Google account</a> (Malwarebytes)</p><p><a href="https://www.404media.co/hackers-break-into-hiring-ai-chat-bot-chattr/">Hackers Break into AI Hiring Chatbot, Could Hire and Reject Fast Food Applicants</a> (404 Media)</p><p><a href="https://unit42.paloaltonetworks.com/medusa-ransomware-escalation-new-leak-site/">Medusa Ransomware Turning Your Files into Stone</a> (Unit 42 by Palo Alto Networks)</p><p><a href="https://www.helpnetsecurity.com/2024/01/12/finland-akira-ransomware/">Akira ransomware attackers are wiping NAS and tape backups </a> (Help Net Security)</p><p><a href="https://thehackernews.com/2024/01/urgent-gitlab-releases-patch-for.html">Urgent: GitLab Releases Patch for Critical Vulnerabilities - Update ASAP</a> (The Hacker News)</p><p><a href="https://www.infosecurity-magazine.com/news/vulnerability-bosch-smart/">Vulnerability Puts Bosch Smart Thermostats at Risk of Compromise</a> (Infosecurity Magazine)</p><p><a href="https://www.wired.com/story/csam-sellers-monero-rise/">Child Abusers Are Getting Better at Using Crypto to Cover Their Tracks</a> (WIRED)</p><p><a href="https://www.cisa.gov/news-events/alerts/2024/01/11/cisa-releases-nine-industrial-control-systems-advisories">CISA Releases Nine Industrial Control Systems Advisories</a> (CISA)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1754</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7b3cc3d0-b180-11ee-bf31-b7b4d4030582]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4269169560.mp3?updated=1705089562" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unveiling the Shadow Strike: A zero-day assault on Ivanti VPN users.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1981/notes</link>
      <description>A zero-day hits Ivanti VPN customers. CISA highlights an active MS Sharepoint Server flaw. Cisco patches a critical vulnerability. Atomic Stealer gets updates. Sensitive school emergency planning documents are exposed online. The FCC reports on risky communications equipment. The White House will introduce new cybersecurity requirements for hospitals. Mandiant explains their X-Twitter hack. Our guest is Palo Alto Networks’ Unit 42’s David Moulton, host of the new Threat Vector podcast. And we are shocked - shocked! - to learn that an online sex for money scheme is a scam. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest David Moulton from Palo Alto Networks joins us to talk about Threat Vector. It’s Unit 42’s segment turned podcast on the N2K media network.

Selected Reading
Ivanti customers urged to patch vulnerabilities allegedly exploited by Chinese state hackers (The Record)
CISA Urges Patching of Exploited SharePoint Server Vulnerability (SecurityWeek)
Critical Cisco Unity Connection flaw gives attackers root privileges. Patch now! (CVE-2024-20272) (Help Net Security)
Atomic Stealer Gets an Upgrade - Targeting Mac Users with Encrypted Payload (The Hacker News)
FCC's Reimbursement Program shows progress in removing national security risks from communication networks (Industrial Cyber)
After Barrage of Hacks, Hospitals Will Face New Federal Cybersecurity Rules Tied to Funding (The Messenger)
US School Shooter Emergency Plans Exposed in a Highly Sensitive Database Leak (WIRED)
Mandiant’s X Account Was Hacked in Brute-Force Password Attack (Infosecurity Magazine)
Believing they would be paid a fortune for having sex with women, hundreds of Indian men scammed out of cash  (Graham Cluely)

Threat Vector Links.
To get more information on Medusa ransomware, listen to this episode of Threat Vector.  

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 11 Jan 2024 21:10:00 -0000</pubDate>
      <itunes:title>Unveiling the Shadow Strike: A zero-day assault on Ivanti VPN users.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1981</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A zero-day hits Ivanti VPN customers. CISA highlights an active MS Sharepoint Server flaw. Cisco patches a critical vulnerability. Atomic Stealer gets updates. Sensitive school emergency planning documents are exposed online. The FCC reports on risky communications equipment. The White House will introduce new cybersecurity requirements for hospitals. Mandiant explains their X-Twitter hack. Our guest is Palo Alto Networks’ Unit 42’s David Moulton, host of the new Threat Vector podcast. And we are shocked - shocked! - to learn that an online sex for money scheme is a scam. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest David Moulton from Palo Alto Networks joins us to talk about Threat Vector. It’s Unit 42’s segment turned podcast on the N2K media network.

Selected Reading
Ivanti customers urged to patch vulnerabilities allegedly exploited by Chinese state hackers (The Record)
CISA Urges Patching of Exploited SharePoint Server Vulnerability (SecurityWeek)
Critical Cisco Unity Connection flaw gives attackers root privileges. Patch now! (CVE-2024-20272) (Help Net Security)
Atomic Stealer Gets an Upgrade - Targeting Mac Users with Encrypted Payload (The Hacker News)
FCC's Reimbursement Program shows progress in removing national security risks from communication networks (Industrial Cyber)
After Barrage of Hacks, Hospitals Will Face New Federal Cybersecurity Rules Tied to Funding (The Messenger)
US School Shooter Emergency Plans Exposed in a Highly Sensitive Database Leak (WIRED)
Mandiant’s X Account Was Hacked in Brute-Force Password Attack (Infosecurity Magazine)
Believing they would be paid a fortune for having sex with women, hundreds of Indian men scammed out of cash  (Graham Cluely)

Threat Vector Links.
To get more information on Medusa ransomware, listen to this episode of Threat Vector.  

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A zero-day hits Ivanti VPN customers. CISA highlights an active MS Sharepoint Server flaw. Cisco patches a critical vulnerability. Atomic Stealer gets updates. Sensitive school emergency planning documents are exposed online. The FCC reports on risky communications equipment. The White House will introduce new cybersecurity requirements for hospitals. Mandiant explains their X-Twitter hack. Our guest is Palo Alto Networks’ Unit 42’s David Moulton, host of the new Threat Vector podcast. And we are shocked - shocked! - to learn that an online sex for money scheme is a scam. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a> from <a href="https://unit42.paloaltonetworks.com/">Palo Alto Networks</a> joins us to talk about Threat Vector. It’s Unit 42’s segment turned podcast on the N2K media network.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://therecord.media/ivanti-customers-patch-chinese-hackers">Ivanti customers urged to patch vulnerabilities allegedly exploited by Chinese state hackers</a> (The Record)</p><p><a href="https://www.securityweek.com/cisa-urges-patching-of-exploited-sharepoint-server-vulnerability/">CISA Urges Patching of Exploited SharePoint Server Vulnerability</a> (SecurityWeek)</p><p><a href="https://www.helpnetsecurity.com/2024/01/11/cve-2024-20272/">Critical Cisco Unity Connection flaw gives attackers root privileges. Patch now! (CVE-2024-20272)</a> (Help Net Security)</p><p><a href="https://thehackernews.com/2024/01/atomic-stealer-gets-upgrade-targeting.html">Atomic Stealer Gets an Upgrade - Targeting Mac Users with Encrypted Payload</a> (The Hacker News)</p><p><a href="https://industrialcyber.co/critical-infrastructure/fccs-reimbursement-program-shows-progress-in-removing-national-security-risks-from-communication-networks/">FCC's Reimbursement Program shows progress in removing national security risks from communication networks</a> (Industrial Cyber)</p><p><a href="https://themessenger.com/tech/hospital-cybersecurity-rules-hhs-hackers-white-house">After Barrage of Hacks, Hospitals Will Face New Federal Cybersecurity Rules Tied to Funding </a>(The Messenger)</p><p><a href="https://www.wired.com/story/us-school-shooter-emergency-plans-leak/">US School Shooter Emergency Plans Exposed in a Highly Sensitive Database Leak</a> (WIRED)</p><p><a href="https://www.infosecurity-magazine.com/news/mandiant-x-account-brute-force/">Mandiant’s X Account Was Hacked in Brute-Force Password Attack</a> (Infosecurity Magazine)</p><p><a href="https://grahamcluley.com/believing-they-would-be-paid-a-fortune-for-having-sex-with-women-hundreds-of-indian-men-scammed-out-of-cash/">Believing they would be paid a fortune for having sex with women, hundreds of Indian men scammed out of cash </a> (Graham Cluely)</p><p><br></p><h2>Threat Vector Links.</h2><p>To get more information on Medusa ransomware, listen to this episode of <a href="https://thecyberwire.com/podcasts/threat-vector/13/notes">Threat Vector. </a> </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1612</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e6deabbe-b0b1-11ee-a5dc-4bc5db787825]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5658631822.mp3?updated=1705090042" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A pivotal global menace. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1980/notes</link>
      <description>The World Economic Forum names AI a top global threat. The SEC suffers social media breach. The FTC settles with a data broker over location data sales. A massive data leak hits Brazil. Chinese researchers claim and AirDrop hack. A major real estate firm suffers data theft. Pikabot loader is seeing use by spammers. Ukraine’s Blackhit hits Russia’s M9 Telecom. Stuxnet methods are revealed. A Patch Tuesday rundown. Our guest is ​​Tim Eades from the Cyber Mentor Fund to discuss the growing prevalence of restoration as a part of incident response. And Hackers could screw up a wrench.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest ​​Tim Eades from Cyber Mentor Fund joins us to discuss the growing prevalence of restoration as a part of incident response. 

Selected Reading
AI-powered misinformation is the world's biggest short-term threat, Davos report says (AP News)
NSA: Benefits of generative AI in cyber security will outweigh the bad (IT Pro)
SEC account on X ‘compromised’ and regulator has not approved bitcoin ETFs (MarketWatch)
SEC did not have 2FA enabled: X safety team on fake Bitcoin ETF post (Cointelegraph)
FTC Order Prohibits Data Broker X-Mode Social and Outlogic from Selling Sensitive Location Data (Federal Trade Commission)
Entire population of Brazil possibly exposed in massive data leak (Security Affairs)
China says state-backed experts crack Apple's AirDrop (Digital Journal)
Fidelity National Financial says hackers stole data on 1.3 million customers (TechCrunch)
Water Curupira Hackers Launch Pikabot Malware Attack on Windows Machine (GBHackers On Security)
Ukrainian “Blackjack” Hackers Take Out Russian ISP (Infosecurity Magazine)
Ukraine is on the front lines of global cyber security (Atlantic Council) 
Dutch Engineer Used Water Pump to Get Billion-Dollar Stuxnet Malware Into Iranian Nuclear Facility: Report (SecurityWeek)
New research paper explores post-quantum cryptography for critical infrastructure cybersecurity (Industrial Cyber)
AI Helps U.S. Intelligence Track Hackers Targeting Critical Infrastructure (Wall Street Journal)
Hewlett Packard Enterprise nears $13 billion deal to buy Juniper Networks (Reuters)
January Patch Tuesday: New year, more Windows bugs (The Register)
Cybersecurity Advisory: Apache Struts Vulnerability CVE-2023-50164 (Uptycs)
Hackers can infect network-connected wrenches to install ransomware (Ars Technica) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 10 Jan 2024 21:10:00 -0000</pubDate>
      <itunes:title>A pivotal global menace. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1980</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The World Economic Forum names AI a top global threat. The SEC suffers social media breach. The FTC settles with a data broker over location data sales. A massive data leak hits Brazil. Chinese researchers claim and AirDrop hack. A major real estate firm suffers data theft. Pikabot loader is seeing use by spammers. Ukraine’s Blackhit hits Russia’s M9 Telecom. Stuxnet methods are revealed. A Patch Tuesday rundown. Our guest is ​​Tim Eades from the Cyber Mentor Fund to discuss the growing prevalence of restoration as a part of incident response. And Hackers could screw up a wrench.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest ​​Tim Eades from Cyber Mentor Fund joins us to discuss the growing prevalence of restoration as a part of incident response. 

Selected Reading
AI-powered misinformation is the world's biggest short-term threat, Davos report says (AP News)
NSA: Benefits of generative AI in cyber security will outweigh the bad (IT Pro)
SEC account on X ‘compromised’ and regulator has not approved bitcoin ETFs (MarketWatch)
SEC did not have 2FA enabled: X safety team on fake Bitcoin ETF post (Cointelegraph)
FTC Order Prohibits Data Broker X-Mode Social and Outlogic from Selling Sensitive Location Data (Federal Trade Commission)
Entire population of Brazil possibly exposed in massive data leak (Security Affairs)
China says state-backed experts crack Apple's AirDrop (Digital Journal)
Fidelity National Financial says hackers stole data on 1.3 million customers (TechCrunch)
Water Curupira Hackers Launch Pikabot Malware Attack on Windows Machine (GBHackers On Security)
Ukrainian “Blackjack” Hackers Take Out Russian ISP (Infosecurity Magazine)
Ukraine is on the front lines of global cyber security (Atlantic Council) 
Dutch Engineer Used Water Pump to Get Billion-Dollar Stuxnet Malware Into Iranian Nuclear Facility: Report (SecurityWeek)
New research paper explores post-quantum cryptography for critical infrastructure cybersecurity (Industrial Cyber)
AI Helps U.S. Intelligence Track Hackers Targeting Critical Infrastructure (Wall Street Journal)
Hewlett Packard Enterprise nears $13 billion deal to buy Juniper Networks (Reuters)
January Patch Tuesday: New year, more Windows bugs (The Register)
Cybersecurity Advisory: Apache Struts Vulnerability CVE-2023-50164 (Uptycs)
Hackers can infect network-connected wrenches to install ransomware (Ars Technica) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The World Economic Forum names AI a top global threat. The SEC suffers social media breach. The FTC settles with a data broker over location data sales. A massive data leak hits Brazil. Chinese researchers claim and AirDrop hack. A major real estate firm suffers data theft. Pikabot loader is seeing use by spammers. Ukraine’s Blackhit hits Russia’s M9 Telecom. Stuxnet methods are revealed. A Patch Tuesday rundown. Our guest is <a href="https://www.linkedin.com/in/tieades/">​​Tim Eades</a> from the <a href="https://cybermentorfund.com/">Cyber Mentor Fund</a> to discuss the growing prevalence of restoration as a part of incident response. And Hackers could screw up a wrench.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/tieades/">​​Tim Eades</a> from <a href="https://cybermentorfund.com/">Cyber Mentor Fund</a> joins us to discuss the growing prevalence of restoration as a part of incident response. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://apnews.com/article/artificial-intelligence-davos-misinformation-disinformation-climate-change-106a1347ca9f987bf71da1f86a141968">AI-powered misinformation is the world's biggest short-term threat, Davos report says </a>(AP News)</p><p><a href="https://www.itpro.com/security/nsa-benefits-of-generative-ai-in-cyber-security-will-outweigh-the-bad">NSA: Benefits of generative AI in cyber security will outweigh the bad</a> (IT Pro)</p><p><a href="https://www.marketwatch.com/story/sec-approves-spot-bitcoin-etf-paving-ways-for-more-investors-to-gain-exposure-d9494af4">SEC account on X ‘compromised’ and regulator has not approved bitcoin ETFs</a> (MarketWatch)</p><p><a href="https://cointelegraph.com/news/sec-twitter-account-hacked-2fa-x-reveals">SEC did not have 2FA enabled: X safety team on fake Bitcoin ETF post</a> (Cointelegraph)</p><p><a href="https://www.ftc.gov/news-events/news/press-releases/2024/01/ftc-order-prohibits-data-broker-x-mode-social-outlogic-selling-sensitive-location-data">FTC Order Prohibits Data Broker X-Mode Social and Outlogic from Selling Sensitive Location Data </a>(Federal Trade Commission)</p><p><a href="https://securityaffairs.com/157203/security/entire-population-of-brazil-possibly-exposed-in-massive-data-leak.html">Entire population of Brazil possibly exposed in massive data leak</a> (Security Affairs)</p><p><a href="https://www.digitaljournal.com/tech-science/china-says-state-backed-experts-crack-apples-airdrop-2/article">China says state-backed experts crack Apple's AirDrop</a> (Digital Journal)</p><p><a href="https://techcrunch.com/2024/01/09/fidelity-national-financial-data-breach/">Fidelity National Financial says hackers stole data on 1.3 million customers</a> (TechCrunch)</p><p><a href="https://gbhackers.com/water-curupira-hackers-pikabot-malware/">Water Curupira Hackers Launch Pikabot Malware Attack on Windows Machine</a> (GBHackers On Security)</p><p><a href="https://www.infosecurity-magazine.com/news/ukrainian-blackjack-hackers/">Ukrainian “Blackjack” Hackers Take Out Russian ISP</a> (Infosecurity Magazine)</p><p><a href="https://www.atlanticcouncil.org/blogs/ukrainealert/ukraine-is-on-the-front-lines-of-global-cyber-security/">Ukraine is on the front lines of global cyber security</a> (Atlantic Council) </p><p><a href="https://www.securityweek.com/dutch-engineer-used-water-pump-to-get-billion-dollar-stuxnet-malware-into-iranian-nuclear-facility-report/">Dutch Engineer Used Water Pump to Get Billion-Dollar Stuxnet Malware Into Iranian Nuclear Facility: Report </a>(SecurityWeek)</p><p><a href="https://industrialcyber.co/critical-infrastructure/new-research-paper-explores-post-quantum-cryptography-for-critical-infrastructure-cybersecurity/">New research paper explores post-quantum cryptography for critical infrastructure cybersecurity </a>(Industrial Cyber)</p><p><a href="https://www.wsj.com/articles/ai-helps-u-s-intelligence-track-hackers-targeting-critical-infrastructure-944553fa">AI Helps U.S. Intelligence Track Hackers Targeting Critical Infrastructure</a> (Wall Street Journal)</p><p><a href="https://www.reuters.com/markets/deals/hewlett-packard-enterprise-nears-13-bln-deal-buy-juniper-networks-wsj-2024-01-08/">Hewlett Packard Enterprise nears $13 billion deal to buy Juniper Networks</a> (Reuters)</p><p><a href="https://www.theregister.com/2024/01/09/january_patch_tuesday/">January Patch Tuesday: New year, more Windows bugs</a> (The Register)</p><p><a href="https://www.uptycs.com/blog/apache-struts-vulnerability-cve-2023-50164">Cybersecurity Advisory: Apache Struts Vulnerability CVE-2023-50164</a> (Uptycs)</p><p><a href="https://arstechnica.com/security/2024/01/network-connected-wrenches-used-in-factories-can-be-hacked-for-sabotage-or-ransomware/">Hackers can infect network-connected wrenches to install ransomware</a> (Ars Technica) </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1647</itunes:duration>
      <guid isPermaLink="false"><![CDATA[36a822ee-aff2-11ee-a9f0-0be18dee955c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7309753601.mp3?updated=1704917415" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Swatting on the rise. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1979/notes</link>
      <description>Swatting is on the rise. LoanDepot, the Toronto Zoo and the World Council of Churches all confirm ransomware attacks. Iran-linked hackers target Albania. Sea Turtle focuses on espionage and information theft. Fake “security researchers” offer phony ransomware recovery services. Could AI make KYC  EOL? Avast enhances Babuk decryption. Joe Carrigan looks at the human side of email security. And a group of midwives fail to deliver.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we are joined by Joe Carrigan from JHU ISI on the human elements that impact email security 

Selected Reading
Tanya Chutkan, the judge overseeing Trump's federal election interference case, appears to be victim of 'swatting'
Special counsel Jack Smith was targeted by attempted swatting on Christmas Day
LoanDepot Takes Systems Offline Following Ransomware Attack
Toronto Zoo hit by ransomware attack | Cybernews
Rhysida ransomware gang takes responsibility for attack on World Council of Churches
Wiper malware found in analysis of Iran-linked attacks on Albanian institutions
Turkish espionage campaigns in the Netherlands
"Security researcher" offers to delete data stolen by ransomware attackers
Gen AI could make KYC effectively useless | TechCrunch 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Jan 2024 21:10:00 -0000</pubDate>
      <itunes:title>Swatting on the rise. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1979</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Swatting is on the rise. LoanDepot, the Toronto Zoo and the World Council of Churches all confirm ransomware attacks. Iran-linked hackers target Albania. Sea Turtle focuses on espionage and information theft. Fake “security researchers” offer phony ransomware recovery services. Could AI make KYC  EOL? Avast enhances Babuk decryption. Joe Carrigan looks at the human side of email security. And a group of midwives fail to deliver.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we are joined by Joe Carrigan from JHU ISI on the human elements that impact email security 

Selected Reading
Tanya Chutkan, the judge overseeing Trump's federal election interference case, appears to be victim of 'swatting'
Special counsel Jack Smith was targeted by attempted swatting on Christmas Day
LoanDepot Takes Systems Offline Following Ransomware Attack
Toronto Zoo hit by ransomware attack | Cybernews
Rhysida ransomware gang takes responsibility for attack on World Council of Churches
Wiper malware found in analysis of Iran-linked attacks on Albanian institutions
Turkish espionage campaigns in the Netherlands
"Security researcher" offers to delete data stolen by ransomware attackers
Gen AI could make KYC effectively useless | TechCrunch 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Swatting is on the rise. LoanDepot, the Toronto Zoo and the World Council of Churches all confirm ransomware attacks. Iran-linked hackers target Albania. Sea Turtle focuses on espionage and information theft. Fake “security researchers” offer phony ransomware recovery services. Could AI make KYC  EOL? Avast enhances Babuk decryption. Joe Carrigan looks at the human side of email security. And a group of midwives fail to deliver.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today, we are joined by <a href="https://www.linkedin.com/in/joecarrigan/x">Joe Carrigan</a> from JHU ISI on the human elements that impact email security </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.nbcnews.com/politics/donald-trump/tanya-chutkan-judge-overseeing-trumps-federal-election-interference-ca-rcna132856">Tanya Chutkan, the judge overseeing Trump's federal election interference case, appears to be victim of 'swatting'</a></p><p><a href="https://www.nbcnews.com/politics/politics-news/special-counsel-jack-smith-was-targeted-attempted-swatting-christmas-d-rcna132964">Special counsel Jack Smith was targeted by attempted swatting on Christmas Day</a></p><p><a href="https://www.securityweek.com/loandepot-takes-systems-offline-following-ransomware-attack/">LoanDepot Takes Systems Offline Following Ransomware Attack</a></p><p><a href="https://cybernews.com/security/toronto-zoo-hit-by-ransomware-attack/">Toronto Zoo hit by ransomware attack | Cybernews</a></p><p><a href="https://beyondmachines.net/event_details/rhysida-ransomware-gang-takes-responsibility-for-attack-on-world-council-of-churches-6-v-i-i-3/gD2P6Ple2L">Rhysida ransomware gang takes responsibility for attack on World Council of Churches</a></p><p><a href="https://therecord.media/albania-parliament-telecoms-airline-cyberattacks-wiper-malware">Wiper malware found in analysis of Iran-linked attacks on Albanian institutions</a></p><p><a href="https://www.huntandhackett.com/blog/turkish-espionage-campaigns">Turkish espionage campaigns in the Netherlands</a></p><p><a href="https://www.helpnetsecurity.com/2024/01/09/delete-stolen-data-ransomware/">"Security researcher" offers to delete data stolen by ransomware attackers</a></p><p><a href="https://techcrunch.com/2024/01/08/gen-ai-could-make-kyc-effectively-useless/">Gen AI could make KYC effectively useless | TechCrunch</a> </p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1499</itunes:duration>
      <guid isPermaLink="false"><![CDATA[0a6dc004-af2e-11ee-8fb7-6f807eb9039b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3118549997.mp3?updated=1704833242" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A conclusion on the xDedic Marketplace investigation.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1978/notes</link>
      <description>The DOJ concludes its xDedic Marketplace investigation. A cyberattack shuts down a major mortgage lender. The Swiss Air Force suffers third party breach. An update on SilverRAT. The Space Force emphasizes collaboration for effective cyber growth. The DOE announces cyber resilience funding. Merck reaches a settlement on NotPetya. NIST warns of AI threats. Our guest is Dragos CEO Robert M. Lee, with a look at intellectual property theft in manufacturing. And Chump Change fines for big tech. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we are joined by Robert M. Lee, founder and CEO of Dragos, to discuss intellectual property theft in manufacturing. 

Selected Reading
AsyncRAT campaign targets US infrastructure. (CyberWire)
19 Individuals Worldwide Charged In Transnational Cybercrime Investigation Of The xDedic Marketplace (US Department of Justice)
Space Force is crafting in-house cyber teams but sees need for closer work with USCYBERCOM (Nextgov/FCW)
Energy Department has cyber threats to infrastructure in mind with $70 million funding offer (FedScoop)
Swiss Air Force documents exposed via cyber attack on third party (BeyondMachines.net)
Major IT, Crypto Firms Exposed to Supply Chain Compromise via New Class of CI/CD Attack (SecurityWeek)
Merck settles with insurers who denied $700 million NotPetya claim (The Record)
Syrian Threat Group Peddles Destructive SilverRAT (DarkReading)
NIST Warns of Security and Privacy Risks from Rapid AI System Deployment (The Hacker News)
Mortgage firm loanDepot cyberattack impacts IT systems, payment portal (BleepingComputer)
Big Tech has already made enough money in 2024 to pay all its 2023 fines (Proton)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 08 Jan 2024 21:40:00 -0000</pubDate>
      <itunes:title>A conclusion on the xDedic Marketplace investigation.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1978</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The DOJ concludes its xDedic Marketplace investigation. A cyberattack shuts down a major mortgage lender. The Swiss Air Force suffers third party breach. An update on SilverRAT. The Space Force emphasizes collaboration for effective cyber growth. The DOE announces cyber resilience funding. Merck reaches a settlement on NotPetya. NIST warns of AI threats. Our guest is Dragos CEO Robert M. Lee, with a look at intellectual property theft in manufacturing. And Chump Change fines for big tech. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we are joined by Robert M. Lee, founder and CEO of Dragos, to discuss intellectual property theft in manufacturing. 

Selected Reading
AsyncRAT campaign targets US infrastructure. (CyberWire)
19 Individuals Worldwide Charged In Transnational Cybercrime Investigation Of The xDedic Marketplace (US Department of Justice)
Space Force is crafting in-house cyber teams but sees need for closer work with USCYBERCOM (Nextgov/FCW)
Energy Department has cyber threats to infrastructure in mind with $70 million funding offer (FedScoop)
Swiss Air Force documents exposed via cyber attack on third party (BeyondMachines.net)
Major IT, Crypto Firms Exposed to Supply Chain Compromise via New Class of CI/CD Attack (SecurityWeek)
Merck settles with insurers who denied $700 million NotPetya claim (The Record)
Syrian Threat Group Peddles Destructive SilverRAT (DarkReading)
NIST Warns of Security and Privacy Risks from Rapid AI System Deployment (The Hacker News)
Mortgage firm loanDepot cyberattack impacts IT systems, payment portal (BleepingComputer)
Big Tech has already made enough money in 2024 to pay all its 2023 fines (Proton)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The DOJ concludes its xDedic Marketplace investigation. A cyberattack shuts down a major mortgage lender. The Swiss Air Force suffers third party breach. An update on SilverRAT. The Space Force emphasizes collaboration for effective cyber growth. The DOE announces cyber resilience funding. Merck reaches a settlement on NotPetya. NIST warns of AI threats. Our guest is Dragos CEO Robert M. Lee, with a look at intellectual property theft in manufacturing. And Chump Change fines for big tech. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today, we are joined by <a href="https://www.linkedin.com/in/robmichaellee/">Robert M. Lee</a>, founder and CEO of <a href="https://www.dragos.com/">Dragos</a>, to discuss intellectual property theft in manufacturing. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://thecyberwire.com/newsletters/daily-briefing/13/5">AsyncRAT campaign targets US infrastructure.</a> (CyberWire)</p><p><a href="https://www.justice.gov/usao-mdfl/pr/19-individuals-worldwide-charged-transnational-cybercrime-investigation-xdedic">19 Individuals Worldwide Charged In Transnational Cybercrime Investigation Of The xDedic Marketplace</a> (US Department of Justice)</p><p><a href="https://www.nextgov.com/cybersecurity/2024/01/space-force-crafting-house-cyber-teams-sees-need-closer-work-uscybercom/393172/">Space Force is crafting in-house cyber teams but sees need for closer work with USCYBERCOM</a> (Nextgov/FCW)</p><p><a href="https://fedscoop.com/energy-department-cybersecurity-infrastructure-funding/">Energy Department has cyber threats to infrastructure in mind with $70 million funding offer </a>(FedScoop)</p><p><a href="https://beyondmachines.net/event_details/swiss-air-force-documents-exposed-via-cyber-attack-on-third-party-b-j-c-u-l/gD2P6Ple2L">Swiss Air Force documents exposed via cyber attack on third party</a> (BeyondMachines.net)</p><p><a href="https://www.securityweek.com/major-it-crypto-firms-exposed-to-supply-chain-compromise-via-new-class-of-ci-cd-attack/">Major IT, Crypto Firms Exposed to Supply Chain Compromise via New Class of CI/CD Attack</a> (SecurityWeek)</p><p><a href="https://therecord.media/merck-insurance-settlement-notpetya">Merck settles with insurers who denied $700 million NotPetya claim</a> (The Record)</p><p><a href="https://www.darkreading.com/cyberattacks-data-breaches/syrian-threat-group-peddles-destructive-silverrat">Syrian Threat Group Peddles Destructive SilverRAT</a> (DarkReading)</p><p><a href="https://thehackernews.com/2024/01/nist-warns-of-security-and-privacy.html?mid=1#cid=1503161">NIST Warns of Security and Privacy Risks from Rapid AI System Deployment</a> (The Hacker News)</p><p><a href="https://www.bleepingcomputer.com/news/security/mortgage-firm-loandepot-cyberattack-impacts-it-systems-payment-portal/">Mortgage firm loanDepot cyberattack impacts IT systems, payment portal</a> (BleepingComputer)</p><p><a href="https://proton.me/blog/big-tech-2023-fines-vs-revenue">Big Tech has already made enough money in 2024 to pay all its 2023 fines</a> (Proton)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1433</itunes:duration>
      <guid isPermaLink="false"><![CDATA[cd39e69a-ae65-11ee-ab0e-bfd00c453015]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6391830146.mp3?updated=1704749084" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore:Johannes Ullrich: Superhero origin stories and lessons that last. [Education] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/3/notes</link>
      <description>Dean of Research, Johannes Ullrich, relays his experiences from studying the hard sciences to his career shift to cybersecurity. Basic principles, superhero origin stories, physics labs and radiation all figure in. And there’s a lot in common with network security best practices. Have a listen to what Johannes has learned and what he hopes to impart on his students. Our thanks to Johannes for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 07 Jan 2024 08:10:00 -0000</pubDate>
      <itunes:title>Encore:Johannes Ullrich: Superhero origin stories and lessons that last. [Education] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dean of Research, Johannes Ullrich, relays his experiences from studying the hard sciences to his career shift to cybersecurity. Basic principles, superhero origin stories, physics labs and radiation all figure in. And there’s a lot in common with network security best practices. Have a listen to what Johannes has learned and what he hopes to impart on his students. Our thanks to Johannes for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dean of Research, Johannes Ullrich, relays his experiences from studying the hard sciences to his career shift to cybersecurity. Basic principles, superhero origin stories, physics labs and radiation all figure in. And there’s a lot in common with network security best practices. Have a listen to what Johannes has learned and what he hopes to impart on his students. Our thanks to Johannes for sharing his story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>339</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[308d6fcc-ac19-11ee-a238-0785d390a853]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1646110413.mp3?updated=1704471637" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Diving deep into Phobos ransomware. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/311/notes</link>
      <description>Guilherme Venere from Cisco Talos joins to discuss their research on "A deep dive into Phobos ransomware, recently deployed by 8Base group." Cisco Talos discovered that 8Base’s Phobos ransomware payload contains an embedded configuration, which is a significant difference between 8Base’s Phobos variant and other Phobos samples that have been observed in the wild since 2019. 
In this 2-part research series, Talos conducts a deep dive into the Phobos ransomware, including its affiliate structure, activity and capabilities, as well as the one private key that could enable decryption of all the samples analyzed. 
The research can be found here:















A deep dive into Phobos ransomware, recently deployed by 8Base group















Understanding the Phobos affiliate structure and activity
















Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Jan 2024 08:00:00 -0000</pubDate>
      <itunes:title>Diving deep into Phobos ransomware. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>311</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guilherme Venere from Cisco Talos joins to discuss their research on "A deep dive into Phobos ransomware, recently deployed by 8Base group." Cisco Talos discovered that 8Base’s Phobos ransomware payload contains an embedded configuration, which is a significant difference between 8Base’s Phobos variant and other Phobos samples that have been observed in the wild since 2019. 
In this 2-part research series, Talos conducts a deep dive into the Phobos ransomware, including its affiliate structure, activity and capabilities, as well as the one private key that could enable decryption of all the samples analyzed. 
The research can be found here:















A deep dive into Phobos ransomware, recently deployed by 8Base group















Understanding the Phobos affiliate structure and activity
















Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guilherme Venere from Cisco Talos joins to discuss their research on "A deep dive into Phobos ransomware, recently deployed by 8Base group." Cisco Talos discovered that 8Base’s Phobos ransomware payload contains an embedded configuration, which is a significant difference between 8Base’s Phobos variant and other Phobos samples that have been observed in the wild since 2019. </p><p>In this 2-part research series, Talos conducts a deep dive into the Phobos ransomware, including its affiliate structure, activity and capabilities, as well as the one private key that could enable decryption of all the samples analyzed. </p><p>The research can be found here:</p><ul>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><a href="https://blog.talosintelligence.com/deep-dive-into-phobos-ransomware/">A deep dive into Phobos ransomware, recently deployed by 8Base group</a></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><a href="https://blog.talosintelligence.com/understanding-the-phobos-affiliate-structure/">Understanding the Phobos affiliate structure and activity</a></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1325</itunes:duration>
      <guid isPermaLink="false"><![CDATA[2ccc9104-ac16-11ee-96f4-ff4af77afb8f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2251197018.mp3?updated=1704491130" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Disruptions to the internet. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1977/notes</link>
      <description>BGP attack disrupts Internet service. Data breach law firm breached. Remcos RAT returns. Poison packages in the PyPI repository. Hacktivist personae and GRU fronts. BreachForums impresario re-arrested. Cyber National Mission Force gets a new leader. On our Solution Spotlight, Simone Petrella talks with ISC2 CEO Clar Rosso about putting a dent in the cybersecurity workforce gap. LinkedIn as a dating platform?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight, N2K President Simone Petrella talks with ISC2 CEO Clar Rosso about putting a dent in the cybersecurity workforce gap through empowerment, breaking down barriers and expanding Diversity, Equity and Inclusion (DE&amp;I) initiatives.

Selected Reading
BGP attack disrupts Internet service. Pirated Zeppelin ransomware source code for sale in a C2C souk. BreachForums impresario re-arrested. (CyberWire)
Hacker hijacks Orange Spain RIPE account to cause BGP havoc (Bleeping Computer)
RIPE Account Hacking Leads to Major Internet Outage at Orange Spain (SecurityWeek)
Law firm that handles data breaches was hit by data breach (TechCrunch)
UAC-0050 Group Using New Phishing Tactics to Distribute Remcos RAT (The Hacker News)
EXPERTS FOUND 3 MALICIOUS PACKAGES HIDING CRYPTO MINERS IN PYPI REPOSITORY (SecurityAffairs)
BreachForums administrator detained after violating parole (The Record)
Russian hackers wiped thousands of systems in KyivStar attack (Bleeping Computer)
US military’s Cyber National Mission Force gets a new chief (The Record)
The Hottest New Dating Site: LinkedIn (Business Insider)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 05 Jan 2024 21:10:00 -0000</pubDate>
      <itunes:title>Disruptions to the internet. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1977</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>BGP attack disrupts Internet service. Data breach law firm breached. Remcos RAT returns. Poison packages in the PyPI repository. Hacktivist personae and GRU fronts. BreachForums impresario re-arrested. Cyber National Mission Force gets a new leader. On our Solution Spotlight, Simone Petrella talks with ISC2 CEO Clar Rosso about putting a dent in the cybersecurity workforce gap. LinkedIn as a dating platform?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On our Solution Spotlight, N2K President Simone Petrella talks with ISC2 CEO Clar Rosso about putting a dent in the cybersecurity workforce gap through empowerment, breaking down barriers and expanding Diversity, Equity and Inclusion (DE&amp;I) initiatives.

Selected Reading
BGP attack disrupts Internet service. Pirated Zeppelin ransomware source code for sale in a C2C souk. BreachForums impresario re-arrested. (CyberWire)
Hacker hijacks Orange Spain RIPE account to cause BGP havoc (Bleeping Computer)
RIPE Account Hacking Leads to Major Internet Outage at Orange Spain (SecurityWeek)
Law firm that handles data breaches was hit by data breach (TechCrunch)
UAC-0050 Group Using New Phishing Tactics to Distribute Remcos RAT (The Hacker News)
EXPERTS FOUND 3 MALICIOUS PACKAGES HIDING CRYPTO MINERS IN PYPI REPOSITORY (SecurityAffairs)
BreachForums administrator detained after violating parole (The Record)
Russian hackers wiped thousands of systems in KyivStar attack (Bleeping Computer)
US military’s Cyber National Mission Force gets a new chief (The Record)
The Hottest New Dating Site: LinkedIn (Business Insider)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>BGP attack disrupts Internet service. Data breach law firm breached. Remcos RAT returns. Poison packages in the PyPI repository. Hacktivist personae and GRU fronts. BreachForums impresario re-arrested. Cyber National Mission Force gets a new leader. On our Solution Spotlight, Simone Petrella talks with ISC2 CEO Clar Rosso about putting a dent in the cybersecurity workforce gap. LinkedIn as a dating platform?</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On our Solution Spotlight, N2K President <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a> talks with<a href="https://www.isc2.org/"> ISC2</a> CEO <a href="https://www.linkedin.com/in/clarrosso/">Clar Rosso</a> about putting a dent in the cybersecurity workforce gap through empowerment, breaking down barriers and expanding Diversity, Equity and Inclusion (DE&amp;I) initiatives.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://thecyberwire.com/newsletters/daily-briefing/13/4">BGP attack disrupts Internet service. Pirated Zeppelin ransomware source code for sale in a C2C souk. BreachForums impresario re-arrested.</a> (CyberWire)</p><p><a href="https://www.bleepingcomputer.com/news/security/hacker-hijacks-orange-spain-ripe-account-to-cause-bgp-havoc/">Hacker hijacks Orange Spain RIPE account to cause BGP havoc</a> (Bleeping Computer)</p><p><a href="https://www.securityweek.com/ripe-account-hacking-leads-to-major-internet-outage-at-orange-spain/">RIPE Account Hacking Leads to Major Internet Outage at Orange Spain</a> (SecurityWeek)</p><p><a href="https://techcrunch.com/2024/01/04/orrick-law-firm-data-breach/">Law firm that handles data breaches was hit by data breach</a> (TechCrunch)</p><p><a href="https://thehackernews.com/2024/01/uac-0050-group-using-new-phishing.html">UAC-0050 Group Using New Phishing Tactics to Distribute Remcos RAT</a> (The Hacker News)</p><p><a href="https://securityaffairs.com/156897/malware/malicious-packages-pypi-repository.html?mid=1#cid=1498034">EXPERTS FOUND 3 MALICIOUS PACKAGES HIDING CRYPTO MINERS IN PYPI REPOSITORY</a> (SecurityAffairs)</p><p><a href="https://therecord.media/breachforums-administrator-arrested-violating-parole">BreachForums administrator detained after violating parole</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/russian-hackers-wiped-thousands-of-systems-in-kyivstar-attack/#google_vignette">Russian hackers wiped thousands of systems in KyivStar attack</a> (Bleeping Computer)</p><p><a href="https://therecord.media/cyber-national-mission-force-lorna-mahlock">US military’s Cyber National Mission Force gets a new chief</a> (The Record)</p><p><a href="https://www.businessinsider.com/linkedin-is-a-dating-app-remote-work-online-romance-2024-1">The Hottest New Dating Site: LinkedIn</a> (Business Insider)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1523</itunes:duration>
      <guid isPermaLink="false"><![CDATA[5a809634-ac09-11ee-adba-1b2619012194]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5771246688.mp3?updated=1704487608" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russian hackers hide in Ukraine telecoms for months.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1976/notes</link>
      <description>Sandworm was in Kyivstar's networks for months. Museums face online outages. Emsisoft suggests a ransomware payment ban. An ambulance service suffers a data breach. Mandiant’s social media gets hacked. GXC Team's latest offerings in the C2C underground market. 23andMe blames their breach on password reuse. Lawyers are using outdated encryption.  On today’s Threat Vector segment, David Moulton chats with Garrett Boyd,  senior consultant at Palo Alto Networks Unit 42  about the importance of internal training and mentorship in cybersecurity. And in Russia, holiday cheers turn to political jeers. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On today’s Threat Vector segment with David Moulton features Garrett Boyd, a senior consultant at Unit 42 by Palo Alto Networks with a background as a Marine and professor, discusses the importance of internal training and mentorship in cybersecurity. He provides insights into how training prepares professionals for industry challenges and how mentorship fosters professional growth and innovation. Garrett emphasizes the need for a mentorship culture in organizations and the responsibility of both mentors and mentees in this dynamic. The episode highlights the transformative impact of mentorship through personal experiences and concludes with an invitation for listeners to share their stories and a reminder to stay vigilant in the digital world.

Threat Vector
To learn what is top of mind each month from the experts at Unit 42 sign up for their Threat Intel Bulletin. 

Selected Reading
Compromised accounts and C2C markets. Cyberespionage and state-directed hacktivism. (CyberWire)
Exclusive: Russian hackers were inside Ukraine telecoms giant for months (Reuters)
Hackers linked to Russian spy agency claim cyberattack on Ukrainian cell network (reuters)
Museum World Hit by Cyberattack on Widely Used Software (The New York Times)
The State of Ransomware in the U.S.: Report and Statistics 2023 (Emsisoft)
Nearly 1 million affected by ambulance service data breach (The Record)
Mandiant’s account on X hacked to push cryptocurrency scam (Bleeping Computer)
Cybercriminals Implemented Artificial Intelligence (AI) For Invoice Fraud (Resecurity)
23andMe tells victims it’s their fault that their data was breached (TechCrunch+)
The Curious Case of MD5 (katelynsills)
Firmware prank causes LED curtain in Russia to display ‘Slava Ukraini’ — police arrest apartment owner (The Record)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 04 Jan 2024 21:10:00 -0000</pubDate>
      <itunes:title>Russian hackers hide in Ukraine telecoms for months.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1976</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Sandworm was in Kyivstar's networks for months. Museums face online outages. Emsisoft suggests a ransomware payment ban. An ambulance service suffers a data breach. Mandiant’s social media gets hacked. GXC Team's latest offerings in the C2C underground market. 23andMe blames their breach on password reuse. Lawyers are using outdated encryption.  On today’s Threat Vector segment, David Moulton chats with Garrett Boyd,  senior consultant at Palo Alto Networks Unit 42  about the importance of internal training and mentorship in cybersecurity. And in Russia, holiday cheers turn to political jeers. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On today’s Threat Vector segment with David Moulton features Garrett Boyd, a senior consultant at Unit 42 by Palo Alto Networks with a background as a Marine and professor, discusses the importance of internal training and mentorship in cybersecurity. He provides insights into how training prepares professionals for industry challenges and how mentorship fosters professional growth and innovation. Garrett emphasizes the need for a mentorship culture in organizations and the responsibility of both mentors and mentees in this dynamic. The episode highlights the transformative impact of mentorship through personal experiences and concludes with an invitation for listeners to share their stories and a reminder to stay vigilant in the digital world.

Threat Vector
To learn what is top of mind each month from the experts at Unit 42 sign up for their Threat Intel Bulletin. 

Selected Reading
Compromised accounts and C2C markets. Cyberespionage and state-directed hacktivism. (CyberWire)
Exclusive: Russian hackers were inside Ukraine telecoms giant for months (Reuters)
Hackers linked to Russian spy agency claim cyberattack on Ukrainian cell network (reuters)
Museum World Hit by Cyberattack on Widely Used Software (The New York Times)
The State of Ransomware in the U.S.: Report and Statistics 2023 (Emsisoft)
Nearly 1 million affected by ambulance service data breach (The Record)
Mandiant’s account on X hacked to push cryptocurrency scam (Bleeping Computer)
Cybercriminals Implemented Artificial Intelligence (AI) For Invoice Fraud (Resecurity)
23andMe tells victims it’s their fault that their data was breached (TechCrunch+)
The Curious Case of MD5 (katelynsills)
Firmware prank causes LED curtain in Russia to display ‘Slava Ukraini’ — police arrest apartment owner (The Record)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sandworm was in Kyivstar's networks for months. Museums face online outages. Emsisoft suggests a ransomware payment ban. An ambulance service suffers a data breach. Mandiant’s social media gets hacked. GXC Team's latest offerings in the C2C underground market. 23andMe blames their breach on password reuse. Lawyers are using outdated encryption.  On today’s Threat Vector segment, David Moulton chats with Garrett Boyd,  senior consultant at Palo Alto Networks Unit 42  about the importance of internal training and mentorship in cybersecurity. And in Russia, holiday cheers turn to political jeers. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On today’s Threat Vector segment with<a href="https://www.linkedin.com/in/davidrmoulton/"> </a><a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a> features<a href="https://www.linkedin.com/in/garrett-e-boyd/"> </a><a href="https://www.linkedin.com/in/garrett-e-boyd/">Garrett Boyd</a>, a senior consultant at <a href="https://unit42.paloaltonetworks.com/">Unit 42 by Palo Alto Networks</a> with a background as a Marine and professor, discusses the importance of internal training and mentorship in cybersecurity. He provides insights into how training prepares professionals for industry challenges and how mentorship fosters professional growth and innovation. Garrett emphasizes the need for a mentorship culture in organizations and the responsibility of both mentors and mentees in this dynamic. The episode highlights the transformative impact of mentorship through personal experiences and concludes with an invitation for listeners to share their stories and a reminder to stay vigilant in the digital world.</p><p><br></p><h2><strong>Threat Vector</strong></h2><p>To learn what is top of mind each month from the experts at Unit 42 sign up for their <a href="https://start.paloaltonetworks.com/unit42-threat-intel-bulletin.html">Threat Intel Bulletin</a>. </p><h2><br></h2><h2>Selected Reading</h2><p><a href="https://thecyberwire.com/newsletters/daily-briefing/13/3">Compromised accounts and C2C markets. Cyberespionage and state-directed hacktivism.</a> (CyberWire)</p><p><a href="https://www.reuters.com/world/europe/russian-hackers-were-inside-ukraine-telecoms-giant-months-cyber-spy-chief-2024-01-04/">Exclusive: Russian hackers were inside Ukraine telecoms giant for months </a>(Reuters)</p><p><a href="https://www.reuters.com/technology/cybersecurity/ukraine-says-russian-intelligence-linked-hackers-claim-cyberattack-mobile-2023-12-13/">Hackers linked to Russian spy agency claim cyberattack on Ukrainian cell network</a> (reuters)</p><p><a href="https://www.nytimes.com/2024/01/03/arts/design/museum-cyberattack.html">Museum World Hit by Cyberattack on Widely Used Software</a> (The New York Times)</p><p><a href="https://www.emsisoft.com/en/blog/44987/the-state-of-ransomware-in-the-u-s-report-and-statistics-2023/">The State of Ransomware in the U.S.: Report and Statistics 2023</a> (Emsisoft)</p><p><a href="https://therecord.media/transformative-healthcare-data-breach-ambulance">Nearly 1 million affected by ambulance service data breach</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/mandiants-account-on-x-hacked-to-push-cryptocurrency-scam/#google_vignette">Mandiant’s account on X hacked to push cryptocurrency scam</a> (Bleeping Computer)</p><p><a href="https://www.resecurity.com/blog/article/cybercriminals-implemented-artificial-intelligence-ai-for-invoice-fraud">Cybercriminals Implemented Artificial Intelligence (AI) For Invoice Fraud</a> (Resecurity)</p><p><a href="https://techcrunch.com/2024/01/03/23andme-tells-victims-its-their-fault-that-their-data-was-breached/?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;guce_referrer_sig=AQAAAM6BJHPYILhIfZcBDmYKtWXC8yQtmshzW0aBSOloAVoa_bwLsVDGUGF0fyoPGJioxD3tpBuGFFrZAcf2xRJQg0-fgccT-iE5mmMipvjVRl9DwTj48x-WLbFvFmdKn0ZQRr1U9ScOsfkbc248q2cvJBXEyXL3qbf4uIRVhxsc_wuG">23andMe tells victims it’s their fault that their data was breached</a> (TechCrunch+)</p><p><a href="https://katelynsills.com/law/the-curious-case-of-md5/">The Curious Case of MD5</a> (katelynsills)</p><p><a href="https://therecord.media/russia-ukraine-firmware-prank-led-curtain-arrest">Firmware prank causes LED curtain in Russia to display ‘Slava Ukraini’ — police arrest apartment owner</a> (The Record)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1560</itunes:duration>
      <guid isPermaLink="false"><![CDATA[d2381f9e-ab37-11ee-86b6-377ef4641ed1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6498027039.mp3?updated=1704397853" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A digital disappearance in Utah.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1975/notes</link>
      <description>Cyber-kidnapping in Utah. Hospitals sue for data recovery. The US Department of Homeland Security assesses cyber threats to the US. Mac malware is on the rise. Cameras hacked by Russian intelligence services provide targeting information. Ransomware roundup. An NPM dependency campaign. Google recommends enhanced safe browsing. Rob Boyce from Accenture describes the Five Families and the trend of hacker collaboration. And the FTC wants to hear your cloned voice.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we are joined by Rob Boyce from Accenture talking about the Five Families, the trend of hacker collaboration. 

Selected Reading
Missing Riverdale foreign exchange student found near Brigham City in case of ‘cyber kidnapping’ (ABC4)
What is ‘cyber kidnapping’ and what can you do to stay safe online? (Deseret News)
Hospitals ask courts to force cloud storage firm to return stolen data (BleepingComputer)
Homeland Threat Assessment (US Department of Homeland Security)
 The Mac Malware of 2023 (Objective-See)
SBU blocks webcams that ‘flashed’ operation of air defense during missile attack on Kyiv on Jan 2 (Interfax-Ukraine)
Ukraine says Russia hacked web cameras to spy on targets in Kyiv (The Record) 
Akumin radiology and oncology reports ransomware attack and data breach (beyondmachines)
Coop supermarket chain hit by ransomware cyberattack (beyondmachines)
When “Everything” Goes Wrong: NPM Dependency-Hell Campaign – 2024 Edition (Checkmarx)
Accounts in danger: Google recommends enhanced safe browsing and extra care (cybernews)
The FTC Voice Cloning Challenge (FTC)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 03 Jan 2024 21:10:00 -0000</pubDate>
      <itunes:title>A digital disappearance in Utah.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1975</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cyber-kidnapping in Utah. Hospitals sue for data recovery. The US Department of Homeland Security assesses cyber threats to the US. Mac malware is on the rise. Cameras hacked by Russian intelligence services provide targeting information. Ransomware roundup. An NPM dependency campaign. Google recommends enhanced safe browsing. Rob Boyce from Accenture describes the Five Families and the trend of hacker collaboration. And the FTC wants to hear your cloned voice.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, we are joined by Rob Boyce from Accenture talking about the Five Families, the trend of hacker collaboration. 

Selected Reading
Missing Riverdale foreign exchange student found near Brigham City in case of ‘cyber kidnapping’ (ABC4)
What is ‘cyber kidnapping’ and what can you do to stay safe online? (Deseret News)
Hospitals ask courts to force cloud storage firm to return stolen data (BleepingComputer)
Homeland Threat Assessment (US Department of Homeland Security)
 The Mac Malware of 2023 (Objective-See)
SBU blocks webcams that ‘flashed’ operation of air defense during missile attack on Kyiv on Jan 2 (Interfax-Ukraine)
Ukraine says Russia hacked web cameras to spy on targets in Kyiv (The Record) 
Akumin radiology and oncology reports ransomware attack and data breach (beyondmachines)
Coop supermarket chain hit by ransomware cyberattack (beyondmachines)
When “Everything” Goes Wrong: NPM Dependency-Hell Campaign – 2024 Edition (Checkmarx)
Accounts in danger: Google recommends enhanced safe browsing and extra care (cybernews)
The FTC Voice Cloning Challenge (FTC)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber-kidnapping in Utah. Hospitals sue for data recovery. The US Department of Homeland Security assesses cyber threats to the US. Mac malware is on the rise. Cameras hacked by Russian intelligence services provide targeting information. Ransomware roundup. An NPM dependency campaign. Google recommends enhanced safe browsing. Rob Boyce from Accenture describes the Five Families and the trend of hacker collaboration. And the FTC wants to hear your cloned voice.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today, we are joined by <a href="https://www.linkedin.com/in/therobertjboyce/">Rob Boyce</a> from <a href="https://www.accenture.com/us-en">Accenture</a> talking about the Five Families, the trend of hacker collaboration. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.abc4.com/news/northern-utah/missing-riverdale-foreign-exchange-student-found-near-brigham-city-in-case-of-cyber-kidnapping/">Missing Riverdale foreign exchange student found near Brigham City in case of ‘cyber kidnapping’</a> (ABC4)</p><p><a href="https://www.deseret.com/2024/1/2/24022700/what-is-cyber-kidnapping">What is ‘cyber kidnapping’ and what can you do to stay safe online?</a> (Deseret News)</p><p><a href="https://www.bleepingcomputer.com/news/security/hospitals-ask-courts-to-force-cloud-storage-firm-to-return-stolen-data/">Hospitals ask courts to force cloud storage firm to return stolen data</a> (BleepingComputer)</p><p><a href="https://www.dhs.gov/sites/default/files/2023-09/23_0913_ia_23-333-ia_u_homeland-threat-assessment-2024_508C_V6_13Sep23.pdf">Homeland Threat Assessment</a> (US Department of Homeland Security)</p><p> <a href="https://objective-see.org/blog/blog_0x77.html">The Mac Malware of 2023</a> (Objective-See)</p><p><a href="https://en.interfax.com.ua/news/general/958135.html">SBU blocks webcams that ‘flashed’ operation of air defense during missile attack on Kyiv on Jan 2 </a>(Interfax-Ukraine)</p><p><a href="https://therecord.media/ukraine-says-russia-hacked-web-cameras-to-spy-on-kyiv-targets">Ukraine says Russia hacked web cameras to spy on targets in Kyiv</a> (The Record) </p><p><a href="https://beyondmachines.net/event_details/akumin-radiology-and-oncology-reports-ransomware-attack-and-data-breach-m-p-o-7-l/gD2P6Ple2L">Akumin radiology and oncology reports ransomware attack and data breach</a> (beyondmachines)</p><p><a href="https://beyondmachines.net/event_details/coop-supermarket-chain-hit-by-ransomware-cyberattack-d-4-b-y-c/gD2P6Ple2L">Coop supermarket chain hit by ransomware cyberattack</a> (beyondmachines)</p><p><a href="https://checkmarx.com/blog/when-everything-goes-wrong-npm-dependency-hell-campaign-2024-edition/">When “Everything” Goes Wrong: NPM Dependency-Hell Campaign – 2024 Edition</a> (Checkmarx)</p><p><a href="https://cybernews.com/security/google-recommends-enhanced-safe-browsing-protect-accounts/#google_vignette">Accounts in danger: Google recommends enhanced safe browsing and extra care</a> (cybernews)</p><p><a href="https://www.ftc.gov/news-events/contests/ftc-voice-cloning-challenge">The FTC Voice Cloning Challenge</a> (FTC)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1466</itunes:duration>
      <guid isPermaLink="false"><![CDATA[1cbaae0a-aa71-11ee-ad60-77feb3c3b5b4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1627608527.mp3?updated=1704312248" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Apple's clickless exploit.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1974/notes</link>
      <description>A zero-click exploit affects iPhones belonging to Kaspersky employees. A GRU cyber campaign incorporates novel malware. The Indian government targets Apple over hacking attempts. Microsoft disables App Installer. Australian courts’ AV is compromised. A BlackBasta decryptor is released. Cyber Toufan claims attacks against Israeli targets. Patients in Oklahoma face online extortion. LoanCare customers’ data is at risk. Google settles a private browsing lawsuit. Barracuda patches a zero-day. That Chinese spy balloon was making a local call. And then Caleb Barlow, a friend of our show, shares password security tips you should know. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Caleb Barlow, CEO of Cyberbit, joins us today to share helpful tips to remember those passwords. 

Selected Reading
4-year campaign backdoored iPhones using possibly the most advanced exploit ever (Ars Technica) 
New malware found in analysis of Russian hacks on Ukraine, Poland (The Record)
Russian Military Intelligence Blamed for Blitzkrieg Hacks (GovInfo Security)
India targets Apple over its phone hacking notifications (Washington Post)
Microsoft disables App Installer after observing financially motivated threat actor activity (Cybernews) 
Microsoft disables App Installer after observing financially motivated threat actor activity (Cybernews) 
Cyber attack on Victoria's court system may have exposed recordings of sensitive cases (ABC News) 
New Black Basta decryptor exploits ransomware flaw to recover files (Bleeping Computer)
Pro-Palestinian operation claims dozens of data breaches against Israeli firms (The Record)
Integris Health patients get extortion emails after cyberattack (Bleeping Computer) 
AG: Corewell Health reports another data breach; affects 1 million patients (The Oakland Press)
LoanCare Notifying 1.3 Million of Data Breach Following Cyberattack on Parent Company (Security Week)
Google settles $5 billion consumer privacy lawsuit (Reuters)
Barracuda fixed a new ESG zero-day exploited by Chinese group UNC4841 (Security Affairs)
U.S. intelligence officials determined the Chinese spy balloon used a U.S. internet provider to communicate (NBC News)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Jan 2024 21:10:00 -0000</pubDate>
      <itunes:title>Apple's clickless exploit.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>1974</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A zero-click exploit affects iPhones belonging to Kaspersky employees. A GRU cyber campaign incorporates novel malware. The Indian government targets Apple over hacking attempts. Microsoft disables App Installer. Australian courts’ AV is compromised. A BlackBasta decryptor is released. Cyber Toufan claims attacks against Israeli targets. Patients in Oklahoma face online extortion. LoanCare customers’ data is at risk. Google settles a private browsing lawsuit. Barracuda patches a zero-day. That Chinese spy balloon was making a local call. And then Caleb Barlow, a friend of our show, shares password security tips you should know. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Caleb Barlow, CEO of Cyberbit, joins us today to share helpful tips to remember those passwords. 

Selected Reading
4-year campaign backdoored iPhones using possibly the most advanced exploit ever (Ars Technica) 
New malware found in analysis of Russian hacks on Ukraine, Poland (The Record)
Russian Military Intelligence Blamed for Blitzkrieg Hacks (GovInfo Security)
India targets Apple over its phone hacking notifications (Washington Post)
Microsoft disables App Installer after observing financially motivated threat actor activity (Cybernews) 
Microsoft disables App Installer after observing financially motivated threat actor activity (Cybernews) 
Cyber attack on Victoria's court system may have exposed recordings of sensitive cases (ABC News) 
New Black Basta decryptor exploits ransomware flaw to recover files (Bleeping Computer)
Pro-Palestinian operation claims dozens of data breaches against Israeli firms (The Record)
Integris Health patients get extortion emails after cyberattack (Bleeping Computer) 
AG: Corewell Health reports another data breach; affects 1 million patients (The Oakland Press)
LoanCare Notifying 1.3 Million of Data Breach Following Cyberattack on Parent Company (Security Week)
Google settles $5 billion consumer privacy lawsuit (Reuters)
Barracuda fixed a new ESG zero-day exploited by Chinese group UNC4841 (Security Affairs)
U.S. intelligence officials determined the Chinese spy balloon used a U.S. internet provider to communicate (NBC News)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A zero-click exploit affects iPhones belonging to Kaspersky employees. A GRU cyber campaign incorporates novel malware. The Indian government targets Apple over hacking attempts. Microsoft disables App Installer. Australian courts’ AV is compromised. A BlackBasta decryptor is released. Cyber Toufan claims attacks against Israeli targets. Patients in Oklahoma face online extortion. LoanCare customers’ data is at risk. Google settles a private browsing lawsuit. Barracuda patches a zero-day. That Chinese spy balloon was making a local call. And then Caleb Barlow, a friend of our show, shares password security tips you should know. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.</p><p><br></p><h2>CyberWire Guest</h2><p>Caleb Barlow, CEO of Cyberbit, joins us today to share helpful tips to remember those passwords. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://arstechnica.com/security/2023/12/exploit-used-in-mass-iphone-infection-campaign-targeted-secret-hardware-feature/">4-year campaign backdoored iPhones using possibly the most advanced exploit ever</a> (Ars Technica) </p><p><a href="https://therecord.media/fancy-bear-apt28-ukraine-new-malware-masepie">New malware found in analysis of Russian hacks on Ukraine, Poland</a> (The Record)</p><p><a href="https://www.govinfosecurity.com/russian-military-intelligence-blamed-for-blitzkrieg-hacks-a-24002">Russian Military Intelligence Blamed for Blitzkrieg Hacks</a> (GovInfo Security)</p><p><a href="https://www.washingtonpost.com/world/2023/12/27/india-apple-iphone-hacking/">India targets Apple over its phone hacking notifications</a> (Washington Post)</p><p><a href="https://cybernews.com/news/microsoft-disables-app-installer-after-observing-financially-motivated-threat-actor-activity/#google_vignette">Microsoft disables App Installer after observing financially motivated threat actor activity </a>(Cybernews) </p><p><a href="https://cybernews.com/news/microsoft-disables-app-installer-after-observing-financially-motivated-threat-actor-activity/">Microsoft disables App Installer after observing financially motivated threat actor activity</a> (Cybernews) </p><p><a href="https://www.abc.net.au/news/2024-01-02/victoria-court-system-targeted-in-cyber-attack-russian-hackers/103272118">Cyber attack on Victoria's court system may have exposed recordings of sensitive cases</a> (ABC News) </p><p><a href="https://www.bleepingcomputer.com/news/security/new-black-basta-decryptor-exploits-ransomware-flaw-to-recover-files/#google_vignette">New Black Basta decryptor exploits ransomware flaw to recover files</a> (Bleeping Computer)</p><p><a href="https://therecord.media/cyber-toufan-data-breaches-israel-iran-palestinians">Pro-Palestinian operation claims dozens of data breaches against Israeli firms</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/integris-health-patients-get-extortion-emails-after-cyberattack/">Integris Health patients get extortion emails after cyberattack</a> (Bleeping Computer) </p><p><a href="https://www.theoaklandpress.com/2023/12/27/ags-office-corewell-health-reports-data-breach-affecting-1-million-patients/">AG: Corewell Health reports another data breach; affects 1 million patients</a> (The Oakland Press)</p><p><a href="https://www.securityweek.com/loancare-notifying-1-3-million-of-data-breach-following-cyberattack-on-parent-company/">LoanCare Notifying 1.3 Million of Data Breach Following Cyberattack on Parent Company</a> (Security Week)</p><p><a href="https://www.reuters.com/legal/google-settles-5-billion-consumer-privacy-lawsuit-2023-12-28/">Google settles $5 billion consumer privacy lawsuit</a> (Reuters)</p><p><a href="https://securityaffairs.com/156502/breaking-news/barracuda-fixed-a-new-esg-zero-day-exploited-by-chinese-group-unc4841.html?mid=1#cid=1475052">Barracuda fixed a new ESG zero-day exploited by Chinese group UNC4841</a> (Security Affairs)</p><p><a href="https://www.nbcnews.com/news/investigations/us-intelligence-officials-determined-chinese-spy-balloon-used-us-inter-rcna131150">U.S. intelligence officials determined the Chinese spy balloon used a U.S. internet provider to communicate</a> (NBC News)</p><p><br></p><h2>Share your feedback.</h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1532</itunes:duration>
      <guid isPermaLink="false"><![CDATA[6c79bca4-a9ab-11ee-8aeb-879218310064]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9958414265.mp3?updated=1704227538" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Microsoft EVP Charlie Bell on the Future of Security [Afternoon Cyber Tea]</title>
      <link>https://thecyberwire.com/podcasts/afternoon-cyber-tea/78/notes</link>
      <description>Microsoft Security EVP Charlie Bell joins Ann on this week's episode of Afternoon Cyber Tea. Charlie has over four decades in the tech industry, from developing space shuttle software to leading the creation of Amazon Web Services' decentralized engineering system and now leading Microsoft’s effort to make the digital world safe and secure for everyone on the planet. Ann and Charlie discuss AI, the Security ecosystem, and why he thinks speed and acceleration of problem-solving are so relevant today. 
 
Resources:
View Charlie Bell on LinkedIn  
View Ann Johnson on LinkedIn 
  
Related Microsoft Podcasts:         
Listen to: Uncovering Hidden Risks 
Listen to: Security Unlocked  
Listen to: Security Unlocked: CISO Series with Bret Arsenault   
   
Discover and follow other Microsoft podcasts at microsoft.com/podcasts

Afternoon Cyber Tea with Ann Johnson is produced by Microsoft and distributed as part of The CyberWire Network. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 01 Jan 2024 11:10:00 -0000</pubDate>
      <itunes:title>Microsoft EVP Charlie Bell on the Future of Security [Afternoon Cyber Tea]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>78</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Microsoft Security EVP Charlie Bell joins Ann on this week's episode of Afternoon Cyber Tea. Charlie has over four decades in the tech industry, from developing space shuttle software to leading the creation of Amazon Web Services' decentralized engineering system and now leading Microsoft’s effort to make the digital world safe and secure for everyone on the planet. Ann and Charlie discuss AI, the Security ecosystem, and why he thinks speed and acceleration of problem-solving are so relevant today. 
 
Resources:
View Charlie Bell on LinkedIn  
View Ann Johnson on LinkedIn 
  
Related Microsoft Podcasts:         
Listen to: Uncovering Hidden Risks 
Listen to: Security Unlocked  
Listen to: Security Unlocked: CISO Series with Bret Arsenault   
   
Discover and follow other Microsoft podcasts at microsoft.com/podcasts

Afternoon Cyber Tea with Ann Johnson is produced by Microsoft and distributed as part of The CyberWire Network. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft Security EVP Charlie Bell joins Ann on this week's episode of Afternoon Cyber Tea. Charlie has over four decades in the tech industry, from developing space shuttle software to leading the creation of Amazon Web Services' decentralized engineering system and now leading Microsoft’s effort to make the digital world safe and secure for everyone on the planet. Ann and Charlie discuss AI, the Security ecosystem, and why he thinks speed and acceleration of problem-solving are so relevant today. </p><p> </p><p><strong>Resources:</strong></p><p><a href="https://www.linkedin.com/in/charlie--bell/">View Charlie Bell on LinkedIn</a>  </p><p><a href="https://www.linkedin.com/in/ann-johnsons/">View Ann Johnson on LinkedIn</a> </p><p>  </p><p><strong>Related Microsoft Podcasts:       </strong>  </p><p>Listen to:<a href="https://thecyberwire.com/podcasts/uncovering-hidden-risks"> Uncovering Hidden Risks</a> </p><p>Listen to:<a href="https://securityunlockedpodcast.com/"> Security Unlocked</a>  </p><p>Listen to:<a href="https://securityunlockedcisoseries.com/"> Security Unlocked: CISO Series with Bret Arsenault</a>   </p><p>   </p><p>Discover and follow other Microsoft podcasts at<a href="https://news.microsoft.com/podcasts/"> microsoft.com/podcasts</a></p><p><br></p><p><em>Afternoon Cyber Tea with Ann Johnson is produced by Microsoft and distributed as part of The CyberWire Network. </em></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1709</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[967f1ce2-9f65-11ee-9c0b-1fee9afa24da]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8743794887.mp3?updated=1691184387" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Tom Quinn: The mark of making a difference. [CISO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/2/notes</link>
      <description>Financial firm CISO, Tom Quinn, takes us from his first experience with modern computers in the military to his current role as a Chief Information Security Officer. It's important to understand how the technology works, but it's also important to understand how people work. And, to make a difference. Our thanks to Tom for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 31 Dec 2023 08:10:00 -0000</pubDate>
      <itunes:title>Encore: Tom Quinn: The mark of making a difference. [CISO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Financial firm CISO, Tom Quinn, takes us from his first experience with modern computers in the military to his current role as a Chief Information Security Officer. It's important to understand how the technology works, but it's also important to understand how people work. And, to make a difference. Our thanks to Tom for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Financial firm CISO, Tom Quinn, takes us from his first experience with modern computers in the military to his current role as a Chief Information Security Officer. It's important to understand how the technology works, but it's also important to understand how people work. And, to make a difference. Our thanks to Tom for sharing his story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>291</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[42f0deea-a0db-11ee-8ddb-53778bfcbef7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2458108810.mp3?updated=1703257643" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: What malicious campaign is lurking under the surface? [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/243/notes</link>
      <description>Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign.
The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed analysis of the malware and exploits used.
The research can be found here:
Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Dec 2023 08:10:00 -0000</pubDate>
      <itunes:title>Encore: What malicious campaign is lurking under the surface? [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>243</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign.
The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed analysis of the malware and exploits used.
The research can be found here:
Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign.</p><p>The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed analysis of the malware and exploits used.</p><p>The research can be found here:</p><ul><li><a href="https://www.cybereason.com/blog/operation-cuckoobees-cybereason-uncovers-massive-chinese-intellectual-property-theft-operation">Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1293</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[955ee856-a0e1-11ee-89b3-97f19c75581b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6387264964.mp3?updated=1703260185" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>T-Minus Overview- Space Cybersecurity. [t-minus]</title>
      <link>https://space.n2k.com/podcasts/t-minus/rs5</link>
      <description>Welcome to the T-Minus Overview Radio Show. In this program we’ll feature some of the conversations from our daily podcast with the people who are forging the path in the new space era, from industry leaders, technology experts and pioneers, to educators, policy makers, research organizations, and more. In this episode we’re covering cybersecurity for space. What is it? What are the threats to space systems, why is there such an emphasis on it right now, and what are people doing about it? 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.
T-Minus Guest
Our first guest is Renee Wynn, former CIO of NASA. Our second guest is Matthieu Bailly, Vice President of Space at CYSEC, a cybersecurity company based in Lausanne, Switzerland. Our third guest speaking to T-Minus Producer Alice Carruth, is Steve Luczynski, Board Chairman of the Aerospace Village.
T-Minus Crew Survey
We want to hear from you! Please complete our 4 question survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.
Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 29 Dec 2023 10:00:00 -0000</pubDate>
      <itunes:title>T-Minus Overview- Space Cybersecurity. [t-minus]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>5</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/813a6878-a0fa-11ee-bfeb-2fe3d11786f9/image/t-minus-OverviewRadioShow_Social-Square.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Welcome to the T-Minus Overview Radio Show featuring conversations with experts from the space industry about cybersecurity in space.</itunes:subtitle>
      <itunes:summary>Welcome to the T-Minus Overview Radio Show. In this program we’ll feature some of the conversations from our daily podcast with the people who are forging the path in the new space era, from industry leaders, technology experts and pioneers, to educators, policy makers, research organizations, and more. In this episode we’re covering cybersecurity for space. What is it? What are the threats to space systems, why is there such an emphasis on it right now, and what are people doing about it? 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.
T-Minus Guest
Our first guest is Renee Wynn, former CIO of NASA. Our second guest is Matthieu Bailly, Vice President of Space at CYSEC, a cybersecurity company based in Lausanne, Switzerland. Our third guest speaking to T-Minus Producer Alice Carruth, is Steve Luczynski, Board Chairman of the Aerospace Village.
T-Minus Crew Survey
We want to hear from you! Please complete our 4 question survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.
Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to the T-Minus Overview Radio Show. In this program we’ll feature some of the conversations from our daily podcast with the people who are forging the path in the new space era, from industry leaders, technology experts and pioneers, to educators, policy makers, research organizations, and more. In this episode we’re covering cybersecurity for space. What is it? What are the threats to space systems, why is there such an emphasis on it right now, and what are people doing about it? </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our weekly intelligence roundup, <a href="https://space.n2k.com/newsletters/signals-and-space"><em>Signals and Space</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow T-Minus on <a href="https://www.linkedin.com/company/n2k-space/">LinkedIn</a> and <a href="https://www.instagram.com/n2kspace/">Instagram</a>.</p><h2>T-Minus Guest</h2><p>Our first guest is Renee Wynn, former CIO of NASA. Our second guest is Matthieu Bailly, Vice President of Space at CYSEC, a cybersecurity company based in Lausanne, Switzerland. Our third guest speaking to T-Minus Producer Alice Carruth, is Steve Luczynski, Board Chairman of the Aerospace Village.</p><h2>T-Minus Crew Survey</h2><p>We want to hear from you! Please complete our <a href="https://www.surveymonkey.com/r/BL5NFPW">4 question survey</a>. It’ll help us get better and deliver you the most mission-critical space intel every day.</p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/ung56qbvknfbj9z2">media kit</a>. Contact us at <a href="mailto:space@n2k.com">space@n2k.com</a> to request more info.</p><h2>Want to join us for an interview?</h2><p>Please send your pitch to <a href="mailto:space-editor@n2k.com">space-editor@n2k.com</a> and include your name, affiliation, and topic proposal.</p><p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1233</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[813a6878-a0fa-11ee-bfeb-2fe3d11786f9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6662810222.mp3?updated=1703267039" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Peter Bauer: CEO of Mimecast [Cyber CEOs Decoded]</title>
      <link>https://thecyberwire.com/podcasts/cyber-ceos-decoded/10/notes</link>
      <description>In this episode, Marc catches up with Mimecast CEO and co-founder Peter Bauer. They cover Peter's CEO journey, including what it was like growing up in South Africa, why he opted out of attending university, highlights from Mimecast's 20-year history, and what Peter learned from taking the company public — and then private again.
You'll also learn: 



When and how to raise capital, and how to manage meeting the board's expectations. 



How CEOs can overcome self-doubt and continuously reimagine their role to look at challenges with new eyes. 



How to view the company's history as a story with chapters and eras, and why it's important to always believe you're at the beginning of the book. 




Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 28 Dec 2023 08:10:00 -0000</pubDate>
      <itunes:title>Peter Bauer: CEO of Mimecast [Cyber CEOs Decoded]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode, Marc catches up with Mimecast CEO and co-founder Peter Bauer. They cover Peter's CEO journey, including what it was like growing up in South Africa, why he opted out of attending university, highlights from Mimecast's 20-year history, and what Peter learned from taking the company public — and then private again.
You'll also learn: 



When and how to raise capital, and how to manage meeting the board's expectations. 



How CEOs can overcome self-doubt and continuously reimagine their role to look at challenges with new eyes. 



How to view the company's history as a story with chapters and eras, and why it's important to always believe you're at the beginning of the book. 




Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Marc catches up with Mimecast CEO and co-founder Peter Bauer. They cover Peter's CEO journey, including what it was like growing up in South Africa, why he opted out of attending university, highlights from Mimecast's 20-year history, and what Peter learned from taking the company public — and then private again.</p><p>You'll also learn: </p><ul>
<li><br></li>
<li>When and how to raise capital, and how to manage meeting the board's expectations. </li>
<li><br></li>
<li>How CEOs can overcome self-doubt and continuously reimagine their role to look at challenges with new eyes. </li>
<li><br></li>
<li>How to view the company's history as a story with chapters and eras, and why it's important to always believe you're at the beginning of the book. </li>
<li><br></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2621</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7233f75e-9f65-11ee-9e52-ff94e204a85b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8804101439.mp3?updated=1685562224" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>NACD Accelerate, Ian Furr’s Volunteer Work, &amp; Bidemi (Bid) Ologunde Member Spotlight [RH-ISAC Podcast]</title>
      <link>https://thecyberwire.com/podcasts/rh-isac/31/notes</link>
      <description>In this episode of the Retail &amp; Hospitality ISAC podcast, host Luke Vander Linden is joined by John Scrimsher, chief information security officer (CISO) at Kontoor Brands, Inc., and Marcel Bucsescu, senior director of credentialing and strategic engagement at NACD, to expand upon the NACD Accelerate program. Then Ian Furr, security integration engineer at RH-ISAC, talks about his volunteer work with the Information Technology Disaster Resource Center (ITDRC) and the Fairfax County Fire and Rescue Department. Finally, Luke chats with Bidemi (Bid) Ologunde, intelligence analyst at Expedia Group, about his own podcast, The Bid Picture, background, and the trajectory of cybersecurity.
Thank you to Fortinet for their sponsorship of the Retail &amp; Hospitality ISAC podcast.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 27 Dec 2023 08:10:00 -0000</pubDate>
      <itunes:title>NACD Accelerate, Ian Furr’s Volunteer Work, &amp; Bidemi (Bid) Ologunde Member Spotlight [RH-ISAC Podcast]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>This episode features the NACD Accelerate program, RH-ISAC's Ian Furr on his volunteer work, and a member spotlight on Bid Ologunde.</itunes:subtitle>
      <itunes:summary>In this episode of the Retail &amp; Hospitality ISAC podcast, host Luke Vander Linden is joined by John Scrimsher, chief information security officer (CISO) at Kontoor Brands, Inc., and Marcel Bucsescu, senior director of credentialing and strategic engagement at NACD, to expand upon the NACD Accelerate program. Then Ian Furr, security integration engineer at RH-ISAC, talks about his volunteer work with the Information Technology Disaster Resource Center (ITDRC) and the Fairfax County Fire and Rescue Department. Finally, Luke chats with Bidemi (Bid) Ologunde, intelligence analyst at Expedia Group, about his own podcast, The Bid Picture, background, and the trajectory of cybersecurity.
Thank you to Fortinet for their sponsorship of the Retail &amp; Hospitality ISAC podcast.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of the Retail &amp; Hospitality ISAC podcast, host Luke Vander Linden is joined by John Scrimsher, chief information security officer (CISO) at Kontoor Brands, Inc., and Marcel Bucsescu, senior director of credentialing and strategic engagement at NACD, to expand upon the <a href="https://www.nacdonline.org/membership/accelerate.cfm?ItemNumber=68720">NACD Accelerate program</a>. Then Ian Furr, security integration engineer at RH-ISAC, talks about his volunteer work with the <a href="https://www.itdrc.org/">Information Technology Disaster Resource Center (ITDRC)</a> and the Fairfax County Fire and Rescue Department. Finally, Luke chats with Bidemi (Bid) Ologunde, intelligence analyst at Expedia Group, about his own podcast, <a href="https://podcasts.apple.com/us/podcast/the-bid-picture-cybersecurity-intelligence-analysis/id1548396104">The Bid Picture</a>, background, and the trajectory of cybersecurity.</p><p><em>Thank you to Fortinet for their sponsorship of the Retail &amp; Hospitality ISAC podcast.</em></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>4108</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4c179724-9f65-11ee-8383-877be4f5bb6c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1538990246.mp3?updated=1689620455" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Active visibility into OT systems. [Control Loop]</title>
      <link>https://thecyberwire.com/podcasts/control-loop/37/notes</link>
      <description>Rockwell Stratix routers vulnerable to Cisco zero-day. SecurityWeek’s ICS Cyber Security Conference. Malware attacks against IoT devices increase by 400%. Nuclear power plant operator cited over cybersecurity plan. CISA’s ICS advisories. Guest Garrett Bladow, Distinguished Engineer at Dragos, joins us from the CyberCon 2023 event in Bismarck, North Dakota. Garrett discusses active visibility into OT systems. On the Learning Lab, Mark Urban shares the second part of his conversation about cyber threat intelligence with Paul Lukoskie, who is Dragos’ Director of Intelligence Services.

Control Loop News Brief.
Rockwell Stratix routers vulnerable to Cisco zero-day.
PN1653 | Stratix® 5800 &amp; 5200 vulnerable to Cisco IOS XE Web UI Privilege Escalation (Active Exploit) (Rockwell Automation)
SecurityWeek’s ICS Cyber Security Conference.
2023 ICS Cybersecurity Conference (SecurityWeek)
Malware attacks against IoT devices increase by 400%.
Zscaler ThreatLabz 2023 Enterprise IoT and OT Threat Report (Zscaler)
Nuclear power plant operator cited over cybersecurity plan.
UK Cites Nuclear Plant Operator Over Cybersecurity Strategy (Silicon UK)
Rockwell and Dragos announce partnership.
Dragos and Rockwell Automation Strengthen Industrial Control System Cybersecurity for Manufacturers with Expanded Capabilities (Business Wire)
CISA’s ICS advisories.
CISA Releases Two Industrial Control Systems Advisories (CISA)
Hitachi Energy’s RTU500 Series Product (Update B) (CISA)
CISA Releases Nine Industrial Control Systems Advisories (CISA)

Control Loop Interview.
Guest is Garrett Bladow, Distinguished Engineer at Dragos, discussing active visibility into OT systems. 

Control Loop Learning Lab.
On the Learning Lab, Mark Urban is joined by Dragos’ Director of Intelligence Services, Paul Lukoskie, for part two of their discussion on cyber threat intelligence.

Control Loop OT Cybersecurity Briefing.
A companion monthly newsletter is available through free subscription and on the CyberWire's website.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 27 Dec 2023 08:10:00 -0000</pubDate>
      <itunes:title>Encore: Active visibility into OT systems. [Control Loop]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>37</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Rockwell Stratix routers vulnerable to Cisco zero-day. SecurityWeek’s ICS Cyber Security Conference. Malware attacks against IoT devices increase by 400%. Nuclear power plant operator cited over cybersecurity plan. CISA’s ICS advisories. Guest Garrett Bladow, Distinguished Engineer at Dragos, joins us from the CyberCon 2023 event in Bismarck, North Dakota. Garrett discusses active visibility into OT systems. On the Learning Lab, Mark Urban shares the second part of his conversation about cyber threat intelligence with Paul Lukoskie, who is Dragos’ Director of Intelligence Services.

Control Loop News Brief.
Rockwell Stratix routers vulnerable to Cisco zero-day.
PN1653 | Stratix® 5800 &amp; 5200 vulnerable to Cisco IOS XE Web UI Privilege Escalation (Active Exploit) (Rockwell Automation)
SecurityWeek’s ICS Cyber Security Conference.
2023 ICS Cybersecurity Conference (SecurityWeek)
Malware attacks against IoT devices increase by 400%.
Zscaler ThreatLabz 2023 Enterprise IoT and OT Threat Report (Zscaler)
Nuclear power plant operator cited over cybersecurity plan.
UK Cites Nuclear Plant Operator Over Cybersecurity Strategy (Silicon UK)
Rockwell and Dragos announce partnership.
Dragos and Rockwell Automation Strengthen Industrial Control System Cybersecurity for Manufacturers with Expanded Capabilities (Business Wire)
CISA’s ICS advisories.
CISA Releases Two Industrial Control Systems Advisories (CISA)
Hitachi Energy’s RTU500 Series Product (Update B) (CISA)
CISA Releases Nine Industrial Control Systems Advisories (CISA)

Control Loop Interview.
Guest is Garrett Bladow, Distinguished Engineer at Dragos, discussing active visibility into OT systems. 

Control Loop Learning Lab.
On the Learning Lab, Mark Urban is joined by Dragos’ Director of Intelligence Services, Paul Lukoskie, for part two of their discussion on cyber threat intelligence.

Control Loop OT Cybersecurity Briefing.
A companion monthly newsletter is available through free subscription and on the CyberWire's website.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rockwell Stratix routers vulnerable to Cisco zero-day. SecurityWeek’s ICS Cyber Security Conference. Malware attacks against IoT devices increase by 400%. Nuclear power plant operator cited over cybersecurity plan. CISA’s ICS advisories. Guest <a href="https://www.linkedin.com/in/garrett-bladow/">Garrett Bladow</a>, Distinguished Engineer at Dragos, joins us from the CyberCon 2023 event in Bismarck, North Dakota. Garrett discusses active visibility into OT systems. On the Learning Lab, <a href="https://www.linkedin.com/in/urbsm/">Mark Urban</a> shares the second part of his conversation about cyber threat intelligence with <a href="https://www.linkedin.com/in/paul-lukoskie-11411b21/">Paul Lukoskie</a>, who is Dragos’ Director of Intelligence Services.</p><p><br></p><h2>Control Loop News Brief.</h2><h3>Rockwell Stratix routers vulnerable to Cisco zero-day.</h3><p><a href="https://www.rockwellautomation.com/en-in/support/advisory.PN1653.html">PN1653 | Stratix® 5800 &amp; 5200 vulnerable to Cisco IOS XE Web UI Privilege Escalation (Active Exploit)</a> (Rockwell Automation)</p><h3>SecurityWeek’s ICS Cyber Security Conference.</h3><p><a href="https://www.icscybersecurityconference.com/">2023 ICS Cybersecurity Conference</a> (SecurityWeek)</p><h3>Malware attacks against IoT devices increase by 400%.</h3><p><a href="https://info.zscaler.com/resources-industry-reports-threatlabz-2023-enterprise-ioT-ot-threat-report">Zscaler ThreatLabz 2023 Enterprise IoT and OT Threat Report</a> (Zscaler)</p><h3>Nuclear power plant operator cited over cybersecurity plan.</h3><p><a href="https://www.silicon.co.uk/security/security-management/uk-cites-nuclear-plant-operator-over-cybersecurity-strategy-535056">UK Cites Nuclear Plant Operator Over Cybersecurity Strategy</a> (Silicon UK)</p><h3>Rockwell and Dragos announce partnership.</h3><p><a href="https://www.businesswire.com/news/home/20231031876385/en/Dragos-and-Rockwell-Automation-Strengthen-Industrial-Control-System-Cybersecurity-for-Manufacturers-with-Expanded-Capabilities">Dragos and Rockwell Automation Strengthen Industrial Control System Cybersecurity for Manufacturers with Expanded Capabilities</a> (Business Wire)</p><h3>CISA’s ICS advisories.</h3><p><a href="https://www.cisa.gov/news-events/alerts/2023/10/17/cisa-releases-two-industrial-control-systems-advisories">CISA Releases Two Industrial Control Systems Advisories</a> (CISA)</p><p><a href="https://www.cisa.gov/news-events/ics-advisories/icsa-23-143-02">Hitachi Energy’s RTU500 Series Product (Update B)</a> (CISA)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/10/26/cisa-releases-nine-industrial-control-systems-advisories">CISA Releases Nine Industrial Control Systems Advisories</a> (CISA)</p><h2><br></h2><h2>Control Loop Interview.</h2><p>Guest is <a href="https://www.linkedin.com/in/garrett-bladow/">Garrett Bladow</a>, Distinguished Engineer at Dragos, discussing active visibility into OT systems. </p><h2><br></h2><h2>Control Loop Learning Lab.</h2><p>On the Learning Lab, <a href="https://www.linkedin.com/in/urbsm/">Mark Urban</a> is joined by Dragos’ Director of Intelligence Services, <a href="https://www.linkedin.com/in/paul-lukoskie-11411b21/">Paul Lukoskie</a>, for part two of their discussion on cyber threat intelligence.</p><h2><br></h2><h2>Control Loop OT Cybersecurity Briefing.</h2><p>A companion monthly newsletter is available through free subscription and on the <a href="https://thecyberwire.com/newsletters/control-loop">CyberWire's website</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2553</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7c4ceca2-a0e4-11ee-a590-83734e19771e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5790040826.mp3?updated=1726597961" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>“Espionage and the Metaverse” – with Cathy Hackl [SpyCast]</title>
      <link>https://thecyberwire.com/podcasts/spycast/577/notes</link>
      <description>Summary
Cathy Hackl (Twitter, LinkedIn) joins Andrew (Twitter; LinkedIn) to discuss the potential implications of the metaverse on intelligence. Cathy has been called the “Godmother of the Metaverse.”

What You’ll Learn
Intelligence



What the metaverse is



Security and counterintelligence in a virtual world



Futurism within intelligence agencies 



Potential risks and consequences of the metaverse



Reflections



How virtual spaces can affect our physical world



The necessity to evolve alongside technology



And much, much more …

Episode Notes
The web will continue to evolve and change with time, but what’s coming next? And how will this evolution affect the ways that intelligence organizations around the world conduct their operations?
This week on SpyCast, Cathy Hackl joins Andrew to explain what the metaverse is, what we can expect from living in this new virtual world, and how intelligence agencies can begin planning for the Web 3 future. Cathy Hackl has been dubbed the “Godmother of the Metaverse” 

Resources
Featured Resource






Into the Metaverse: The Essential Guide to the Business Opportunities of the Web3 Era, Cathy Hackl (Bloomsbury, 2023) 






Metaverse Marketing [Cathy’s podcast]




*Beginner Resources*






What Is the Metaverse, Exactly?, Wired (2022) [Article]






Web 3.0 Explained In 5 Minutes, YouTube (2022) [5 min. Video]






12 new tech terms you need to understand the future, R. Gray, BBC (2018)




*SpyCasts*






How Artificial Intelligence is Changing the Spy Game – with Mike Susong (2022)






Trafficking Data: The Digital Struggle with China -- with Aynne Kokas (2022)






The FBI &amp; Cyber – with Cyber Division Chief Bryan Vorndran (Part 1 of 2)






The FBI &amp; Cyber – with Cyber Division Chief Bryan Vorndran (Part 2 of 2) 




*Wildcard Resource*
Watch the world’s first metaverse music video, Snoop Dogg’s “House I Built,” here!

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Dec 2023 08:10:00 -0000</pubDate>
      <itunes:title>“Espionage and the Metaverse” – with Cathy Hackl [SpyCast]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>577</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Summary
Cathy Hackl (Twitter, LinkedIn) joins Andrew (Twitter; LinkedIn) to discuss the potential implications of the metaverse on intelligence. Cathy has been called the “Godmother of the Metaverse.”

What You’ll Learn
Intelligence



What the metaverse is



Security and counterintelligence in a virtual world



Futurism within intelligence agencies 



Potential risks and consequences of the metaverse



Reflections



How virtual spaces can affect our physical world



The necessity to evolve alongside technology



And much, much more …

Episode Notes
The web will continue to evolve and change with time, but what’s coming next? And how will this evolution affect the ways that intelligence organizations around the world conduct their operations?
This week on SpyCast, Cathy Hackl joins Andrew to explain what the metaverse is, what we can expect from living in this new virtual world, and how intelligence agencies can begin planning for the Web 3 future. Cathy Hackl has been dubbed the “Godmother of the Metaverse” 

Resources
Featured Resource






Into the Metaverse: The Essential Guide to the Business Opportunities of the Web3 Era, Cathy Hackl (Bloomsbury, 2023) 






Metaverse Marketing [Cathy’s podcast]




*Beginner Resources*






What Is the Metaverse, Exactly?, Wired (2022) [Article]






Web 3.0 Explained In 5 Minutes, YouTube (2022) [5 min. Video]






12 new tech terms you need to understand the future, R. Gray, BBC (2018)




*SpyCasts*






How Artificial Intelligence is Changing the Spy Game – with Mike Susong (2022)






Trafficking Data: The Digital Struggle with China -- with Aynne Kokas (2022)






The FBI &amp; Cyber – with Cyber Division Chief Bryan Vorndran (Part 1 of 2)






The FBI &amp; Cyber – with Cyber Division Chief Bryan Vorndran (Part 2 of 2) 




*Wildcard Resource*
Watch the world’s first metaverse music video, Snoop Dogg’s “House I Built,” here!

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<h3><strong>Summary</strong></h3><p>Cathy Hackl (<a href="https://twitter.com/CathyHackl?ref_src=twsrc%255Egoogle%257Ctwcamp%255Eserp%257Ctwgr%255Eauthor">Twitter</a>, <a href="https://www.linkedin.com/in/cathyhackl">LinkedIn</a>) joins Andrew (<a href="https://twitter.com/spyhistorian">Twitter</a>; <a href="https://www.linkedin.com/in/andrew-hammond-09344936/">LinkedIn)</a> to discuss the potential implications of the metaverse on intelligence. Cathy has been called the “Godmother of the Metaverse.”</p><p><br></p><h3><strong>What You’ll Learn</strong></h3><h3><strong>Intelligence</strong></h3><ul>
<li><br></li>
<li>What the metaverse is</li>
<li><br></li>
<li>Security and counterintelligence in a virtual world</li>
<li><br></li>
<li>Futurism within intelligence agencies </li>
<li><br></li>
<li>Potential risks and consequences of the metaverse</li>
<li><br></li>
</ul><h3><strong>Reflections</strong></h3><ul>
<li><br></li>
<li>How virtual spaces can affect our physical world</li>
<li><br></li>
<li>The necessity to evolve alongside technology</li>
<li><br></li>
</ul><h3><strong>And much, much more …</strong></h3><p><br></p><h3><strong>Episode Notes</strong></h3><p>The web will continue to evolve and change with time, but what’s coming next? And how will this evolution affect the ways that intelligence organizations around the world conduct their operations?</p><p>This week on SpyCast, Cathy Hackl joins Andrew to explain what the metaverse is, what we can expect from living in this new virtual world, and how intelligence agencies can begin planning for the Web 3 future. Cathy Hackl has been dubbed the “Godmother of the Metaverse” </p><p><br></p><h3><strong>Resources</strong></h3><h3><strong>Featured Resource</strong></h3><ul>
<li><br></li>
<li><br></li>
<li>
<em>Into the Metaverse: The Essential Guide to the Business Opportunities of the Web3 Era</em>, Cathy Hackl (Bloomsbury, 2023) </li>
<li><br></li>
<li><br></li>
<li>
<a href="https://podcasts.apple.com/us/podcast/metaverse-marketing/id1586989316">Metaverse Marketing</a> [Cathy’s podcast]</li>
<li><br></li>
</ul><h3><br></h3><h3><strong>*Beginner Resources*</strong></h3><ul>
<li><br></li>
<li><br></li>
<li>
<a href="https://www.wired.com/story/what-is-the-metaverse/">What Is the Metaverse, Exactly?</a>, <em>Wired </em>(2022) [Article]</li>
<li><br></li>
<li><br></li>
<li>
<a href="https://www.youtube.com/watch?v=0tZFQs7qBfQ">Web 3.0 Explained In 5 Minutes</a>, <em>YouTube </em>(2022) [5 min. Video]</li>
<li><br></li>
<li><br></li>
<li>
<a href="https://www.bbc.com/future/article/20180731-the-new-tech-vocabulary-you-need-to-understand-the-future">12 new tech terms you need to understand the future</a>, R. Gray, BBC (2018)</li>
<li><br></li>
</ul><h3><br></h3><h3>*<strong>SpyCasts</strong>*</h3><ul>
<li><br></li>
<li><br></li>
<li>
<a href="https://thecyberwire.com/podcasts/spycast/553/notes">How Artificial Intelligence is Changing the Spy Game</a> – with Mike Susong (2022)</li>
<li><br></li>
<li><br></li>
<li>
<a href="https://thecyberwire.com/podcasts/spycast/564/notes">Trafficking Data: The Digital Struggle with China</a> -- with Aynne Kokas (2022)</li>
<li><br></li>
<li><br></li>
<li>
<a href="https://thecyberwire.com/podcasts/spycast/565/notes">The FBI &amp; Cyber</a> – with Cyber Division Chief Bryan Vorndran (Part 1 of 2)</li>
<li><br></li>
<li><br></li>
<li>
<a href="https://thecyberwire.com/podcasts/spycast/566/notes">The FBI &amp; Cyber</a> – with Cyber Division Chief Bryan Vorndran (Part 2 of 2) </li>
<li><br></li>
</ul><h3><br></h3><h3><strong>*Wildcard Resource*</strong></h3><ul><li>Watch the world’s first metaverse music video, Snoop Dogg’s “House I Built,” <a href="https://www.billboard.com/music/rb-hip-hop/snoop-dogg-releases-first-ever-metaverse-music-video-with-house-i-built-1235053365/">here</a>!</li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3595</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0d6e274a-9f65-11ee-9fcb-e3897f5195bd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9695289517.mp3?updated=1678121919" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Artificial Intelligence: Insights &amp; Oddities [8th Layer Insights]</title>
      <link>https://thecyberwire.com/podcasts/8th-layer-insights/40/notes</link>
      <description>On this episode, Perry celebrates the one year birthday of ChatGPT by taking a look at AI from technological, philosophical, and folkloric perspectives. We see how AI was formed based on human words and works, and how it can now shape the future of human legend and belief.
Guests:







Brandon Karpf, Vice President at N2K Networks (LinkedIn) (Website)







Dr. Lynne S. McNeill, Associate Professor at Utah State University (LinkedIn) (Twitter)







Dr. John Laudun, Professor at University of Louisiana at Lafayette (LinkedIn) (Twitter) (Website)







Lev Gorelov, Research Director at Handshake Consulting (LinkedIn) (Twitter) (Website)







Resources














Interview with the AI, part one, by the Brandon Karpf / the CyberWire














'Hard Fork': An Interview With Sam Altman, by The New York Times














The Exciting, Perilous Journey Toward AGI, Ilya Sutskever TED Talk














Ilya: the AI scientist shaping the world, by The Guardian














Meet Loab, the AI Art Woman Haunting the Internet: Is she a demon? A Cryptid? Or nothing at all..., the Guardian














In 2016, Microsoft’s Racist Chatbot Revealed the Dangers of Online Conversation The bot learned language from people on Twitter—but it also learned values, IEEE Spectrum







Perry's Digital Folklore episode about AI














Handshake's Generative AI Masterclass on Maven








Perry's Books (Amazon Associate links)














Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter














The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer








Be sure to check out Perry's other show, Digital Folklore. It's all about the oddities and importance of online culture. Head over to the show's website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, shop for merch, support the show on Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news.
Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
8Li cover art by Chris Machowski @ https://www.RansomWear.net/.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:







LinkedIn







Twitter







Instagram







Email: perry [at] 8thLayerMedia [dot] com








Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Dec 2023 08:10:00 -0000</pubDate>
      <itunes:title>Artificial Intelligence: Insights &amp; Oddities [8th Layer Insights]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this episode, Perry celebrates the one year birthday of ChatGPT by taking a look at AI from technological, philosophical, and folkloric perspectives. We see how AI was formed based on human words and works, and how it can now shape the future of human legend and belief.
Guests:







Brandon Karpf, Vice President at N2K Networks (LinkedIn) (Website)







Dr. Lynne S. McNeill, Associate Professor at Utah State University (LinkedIn) (Twitter)







Dr. John Laudun, Professor at University of Louisiana at Lafayette (LinkedIn) (Twitter) (Website)







Lev Gorelov, Research Director at Handshake Consulting (LinkedIn) (Twitter) (Website)







Resources














Interview with the AI, part one, by the Brandon Karpf / the CyberWire














'Hard Fork': An Interview With Sam Altman, by The New York Times














The Exciting, Perilous Journey Toward AGI, Ilya Sutskever TED Talk














Ilya: the AI scientist shaping the world, by The Guardian














Meet Loab, the AI Art Woman Haunting the Internet: Is she a demon? A Cryptid? Or nothing at all..., the Guardian














In 2016, Microsoft’s Racist Chatbot Revealed the Dangers of Online Conversation The bot learned language from people on Twitter—but it also learned values, IEEE Spectrum







Perry's Digital Folklore episode about AI














Handshake's Generative AI Masterclass on Maven








Perry's Books (Amazon Associate links)














Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors, by Perry Carpenter














The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer by Perry Carpenter &amp; Kai Roer








Be sure to check out Perry's other show, Digital Folklore. It's all about the oddities and importance of online culture. Head over to the show's website (https://digitalfolklore.fm/) to see our custom artwork, subscribe to the newsletter, shop for merch, support the show on Patreon, and more. Want to check out what others are saying? Here's some recent press about the show: https://digitalfolklore.fm/in-the-news.
Production Credits:
Music and Sound Effects by Blue Dot Sessions, Envato Elements, Storyblocks, &amp; EpidemicSound.
8Li cover art by Chris Machowski @ https://www.RansomWear.net/.
8th Layer Insights theme music composed and performed by Marcos Moscat @ https://www.GameMusicTown.com/
Want to get in touch with Perry? Here's how:







LinkedIn







Twitter







Instagram







Email: perry [at] 8thLayerMedia [dot] com








Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this episode, Perry celebrates the one year birthday of ChatGPT by taking a look at AI from technological, philosophical, and folkloric perspectives. We see how AI was formed based on human words and works, and how it can now shape the future of human legend and belief.</p><h3>Guests:</h3><ul>
<li><br></li>
<li><br></li>
<li><br></li>
<li>Brandon Karpf, Vice President at N2K Networks (<a href="https://www.linkedin.com/in/brandon-karpf/">LinkedIn</a>) (<a href="https://thecyberwire.com/pages/meet-the-team.html">Website</a>)</li>
<li><br></li>
<li><br></li>
<li><br></li>
<li>Dr. Lynne S. McNeill, Associate Professor at Utah State University (<a href="https://www.linkedin.com/in/lynnesmcneill/">LinkedIn</a>) (<a href="https://twitter.com/lynneSmcneill">Twitter</a>)</li>
<li><br></li>
<li><br></li>
<li><br></li>
<li>Dr. John Laudun, Professor at University of Louisiana at Lafayette (<a href="https://www.linkedin.com/in/johnlaudun/">LinkedIn</a>) (<a href="https://twitter.com/johnlaudun">Twitter</a>) (<a href="https://johnlaudun.net/">Website</a>)</li>
<li><br></li>
<li><br></li>
<li><br></li>
<li>Lev Gorelov, Research Director at Handshake Consulting (<a href="https://www.linkedin.com/in/levgorelov/">LinkedIn</a>) (<a href="https://twitter.com/handshake_fyi">Twitter</a>) (<a href="https://handshake.fyi/">Website</a>)</li>
<li><br></li>
<li><br></li>
<li><br></li>
</ul><h3>Resources</h3><ul>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li>
<a href="https://thecyberwire.com/podcasts/special-edition/48/notes">Interview with the AI, part one</a>, by the Brandon Karpf / the CyberWire</li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li>
<a href="https://www.youtube.com/watch?v=wBX4xeefPiA&amp;t=60s&amp;ab_channel=NewYorkTimesPodcasts">'Hard Fork': An Interview With Sam Altman</a>, by The New York Times</li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li>
<a href="https://www.youtube.com/watch?v=SEkGLj0bwAU&amp;ab_channel=TED">The Exciting, Perilous Journey Toward AGI</a>, Ilya Sutskever TED Talk</li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li>
<a href="https://www.theguardian.com/technology/video/2023/nov/02/ilya-the-ai-scientist-shaping-the-world">Ilya: the AI scientist shaping the world</a>, by The Guardian</li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li>
<a href="https://www.cnet.com/science/what-is-loab-the-haunting-ai-art-woman-explained/">Meet Loab, the AI Art Woman Haunting the Internet: Is she a demon? A Cryptid? Or nothing at all...</a>, the Guardian</li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li>
<a href="https://spectrum.ieee.org/in-2016-microsofts-racist-chatbot-revealed-the-dangers-of-online-conversation">In 2016, Microsoft’s Racist Chatbot Revealed the Dangers of Online Conversation The bot learned language from people on Twitter—but it also learned values</a>, IEEE Spectrum</li>
<li><br></li>
<li><br></li>
<li><br></li>
<li>Perry's <a href="https://pod.link/1657374458/episode/f341e328e9baa854a52e210d34762c7c">Digital Folklore episode</a> about AI</li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li>
<a href="https://maven.com/handshake/tech-bootcamp">Handshake's Generative AI Masterclass</a> on Maven</li>
<li><br></li>
<li><br></li>
<li><br></li>
</ul><p><br></p><h3>Perry's Books (Amazon Associate links)</h3><ul>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li>
<a href="https://amzn.to/3MSIo8e">Transformational Security Awareness: What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors</a>, by Perry Carpenter</li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li>
<a href="https://amzn.to/3opaCgQ">The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer</a> by Perry Carpenter &amp; Kai Roer</li>
<li><br></li>
<li><br></li>
<li><br></li>
</ul><p><br></p><p><strong>Be sure to check out Perry's other show, <em>Digital Folklore.</em> </strong>It's all about the oddities and importance of online culture. Head over to the show's website (<a href="https://digitalfolklore.fm/">https://digitalfolklore.fm/</a>) to see our custom artwork, subscribe to the <a href="https://digitalfolklore.fm/home#newsletter">newsletter</a>, shop for <a href="https://digitalfolklore.fm/shop">merch</a>, support the show on <a href="https://www.patreon.com/digitalfolklore">Patreon</a>, and more. Want to check out what others are saying? Here's some recent press about the show: <a href="https://digitalfolklore.fm/in-the-news">https://digitalfolklore.fm/in-the-news</a>.</p><h3>Production Credits:</h3><p>Music and Sound Effects by <a href="https://www.sessions.blue/">Blue Dot Sessions</a>, <a href="https://elements.envato.com/">Envato Elements</a>, <a href="https://www.storyblocks.com/">Storyblocks</a>, &amp; <a href="https://www.epidemicsound.com/">EpidemicSound</a>.</p><p>8Li cover art by Chris Machowski @ <a href="https://www.ransomwear.net/">https://www.RansomWear.net/</a>.</p><p>8th Layer Insights theme music composed and performed by Marcos Moscat @ <a href="https://www.gamemusictown.com/">https://www.GameMusicTown.com/</a></p><h3>Want to get in touch with Perry? Here's how:</h3><ul>
<li><br></li>
<li><br></li>
<li><br></li>
<li><a href="https://www.linkedin.com/in/perrycarpenter/">LinkedIn</a></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><a href="https://twitter.com/PerryCarpenter">Twitter</a></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><a href="https://www.instagram.com/8lipodcast/">Instagram</a></li>
<li><br></li>
<li><br></li>
<li><br></li>
<li><strong>Email: perry [at] 8thLayerMedia [dot] com</strong></li>
<li><br></li>
<li><br></li>
<li><br></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3942</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[27bcba94-9e8e-11ee-916e-7f1d0b992532]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8256158619.mp3?updated=1740073619" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Solution Spotlight: Simone Petrella and Camille Stewart Gloster discuss the White House's cybersecurity workforce and education strategy. [Interview Selects]</title>
      <link>https://thecyberwire.com/podcasts/interview-selects/183/notes</link>
      <description>This interview from August 18th, 2023 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Simone Petrella sits down with Camille Stewart Gloster, Deputy National Cyber Director at the The White House discuss the White House's cybersecurity workforce and education strategy.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 25 Dec 2023 08:00:00 -0000</pubDate>
      <itunes:title>Solution Spotlight: Simone Petrella and Camille Stewart Gloster discuss the White House's cybersecurity workforce and education strategy. [Interview Selects]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>183</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This interview from August 18th, 2023 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Simone Petrella sits down with Camille Stewart Gloster, Deputy National Cyber Director at the The White House discuss the White House's cybersecurity workforce and education strategy.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This interview from August 18th, 2023 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Simone Petrella sits down with Camille Stewart Gloster, Deputy National Cyber Director at the The White House discuss the White House's cybersecurity workforce and education strategy.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1192</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e227f39c-a034-11ee-8f50-7bd425175560]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3809728725.mp3?updated=1703191386" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire: The 12 Days of Malware. [Special Edition]</title>
      <link>https://thecyberwire.com/stories/f765b7d394aa4c16840fd96d405c2ee7/the-cyberwire-the-12-days-of-malware</link>
      <description>Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings &amp; Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out our video for the full effect!

The 12 Days of Malware lyrics
On the first day of Christmas, my malware gave to me:
A keylogger logging my keys.

On the second day of Christmas, my malware gave to me:
2 Trojan Apps...
And a keylogger logging my keys.

On the third day of Christmas, my malware gave to me:
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fourth day of Christmas, my malware gave to me:
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fifth day of Christmas, my malware gave to me:
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the sixth day of Christmas, my malware gave to me:
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the seventh day of Christmas, my malware gave to me:
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eighth day of Christmas, my malware gave to me:
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the ninth day of Christmas, my malware gave to me:
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the tenth day of Christmas, my malware gave to me:
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eleventh day of Christmas, my malware gave to me:
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the twelfth day of Christmas, my malware gave to me:
12 Hackers hacking...
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Dec 2023 08:00:00 -0000</pubDate>
      <itunes:title>The CyberWire: The 12 Days of Malware. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings &amp; Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out our video for the full effect!

The 12 Days of Malware lyrics
On the first day of Christmas, my malware gave to me:
A keylogger logging my keys.

On the second day of Christmas, my malware gave to me:
2 Trojan Apps...
And a keylogger logging my keys.

On the third day of Christmas, my malware gave to me:
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fourth day of Christmas, my malware gave to me:
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fifth day of Christmas, my malware gave to me:
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the sixth day of Christmas, my malware gave to me:
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the seventh day of Christmas, my malware gave to me:
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eighth day of Christmas, my malware gave to me:
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the ninth day of Christmas, my malware gave to me:
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the tenth day of Christmas, my malware gave to me:
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eleventh day of Christmas, my malware gave to me:
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the twelfth day of Christmas, my malware gave to me:
12 Hackers hacking...
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings &amp; Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out <a href="thecyberwire.com/stories/f765b7d394aa4c16840fd96d405c2ee7/the-cyberwire-the-12-days-of-malware">our video</a> for the full effect!</p><p><br></p><p><strong>The 12 Days of Malware lyrics</strong></p><p><em>On the first day of Christmas, my malware gave to me:</em></p><p><em>A keylogger logging my keys.</em></p><p><br></p><p><em>On the second day of Christmas, my malware gave to me:</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the third day of Christmas, my malware gave to me:</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the fourth day of Christmas, my malware gave to me:</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the fifth day of Christmas, my malware gave to me:</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the sixth day of Christmas, my malware gave to me:</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the seventh day of Christmas, my malware gave to me:</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the eighth day of Christmas, my malware gave to me:</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the ninth day of Christmas, my malware gave to me:</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the tenth day of Christmas, my malware gave to me:</em></p><p><em>10 Darknet markets...</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days! (Bah-dum-dum-dum!)</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the eleventh day of Christmas, my malware gave to me:</em></p><p><em>11 Phishers phishing...</em></p><p><em>10 Darknet markets...</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days! (Bah-dum-dum-dum!)</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the twelfth day of Christmas, my malware gave to me:</em></p><p><em>12 Hackers hacking...</em></p><p><em>11 Phishers phishing...</em></p><p><em>10 Darknet markets...</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>448</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[968a1f42-9e80-11ee-9b1d-d7e969a848ce]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4266925179.mp3?updated=1640203827" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sentenced to hospital detention.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1973/notes</link>
      <description>A Lapsus$ hacker is sentenced to hospital detention. Online ads and phishing drain crypto wallets. Cyberespionage continues. LockBit and ALPHV say they want to form a ransomware cartel. The 8220 gang's cryptojacking. DarkGate RAT's propagation. The evolution of Bandook. A prominent title insurance company takes systems offline. Rick Howard speaks with guests John Goodman &amp; Amanda Satterwhite of Accenture Federal Services about the launch of a public sector Cybersecurity Center of Excellence. And Trump’s Dumps lead to BidenCash.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
N2K’s Rick Howard talks with guests John Goodman &amp; Amanda Satterwhite of Accenture Federal Services about the launch of a public sector Cybersecurity Center of Excellence in conjunction with Google.

Selected Reading
The infamous GTA VI hacker has been convicted - and the story is simply absurd (IT Pro)
Crypto drainer steals $59 million from 63k people in Twitter ad push (Bleeping Computer)
Threat Actor 'UAC-0099' Continues to Target Ukraine (Deep Instinct) 
‘Today FBI Got Him, Tomorrow They Will Get Me’: LockBit, BlackCat Unite to Form Cyber Cartel (The Cyber Express) 
Imperva Detects Undocumented 8220 Gang Activities (Imperva)
BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates (Proofpoint)
Bandook - A Persistent Threat That Keeps Evolving (Fortinet)
First American takes IT systems offline after cyberattack (Bleeping Computer)
BidenCash darkweb market gives 1.9 million credit cards for free (Bleeping Computer)
BidenCash (Searchlight Cyber)
Russia Seizes Ferum, Sky-Fraud, UAS, and Trump’s Dumps—and Signals More Takedowns to Come [Updated] (Flashpoint)

Share your feedback.Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 22 Dec 2023 21:10:00 -0000</pubDate>
      <itunes:title>Sentenced to hospital detention.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1973</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A Lapsus$ hacker is sentenced to hospital detention. Online ads and phishing drain crypto wallets. Cyberespionage continues. LockBit and ALPHV say they want to form a ransomware cartel. The 8220 gang's cryptojacking. DarkGate RAT's propagation. The evolution of Bandook. A prominent title insurance company takes systems offline. Rick Howard speaks with guests John Goodman &amp; Amanda Satterwhite of Accenture Federal Services about the launch of a public sector Cybersecurity Center of Excellence. And Trump’s Dumps lead to BidenCash.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
N2K’s Rick Howard talks with guests John Goodman &amp; Amanda Satterwhite of Accenture Federal Services about the launch of a public sector Cybersecurity Center of Excellence in conjunction with Google.

Selected Reading
The infamous GTA VI hacker has been convicted - and the story is simply absurd (IT Pro)
Crypto drainer steals $59 million from 63k people in Twitter ad push (Bleeping Computer)
Threat Actor 'UAC-0099' Continues to Target Ukraine (Deep Instinct) 
‘Today FBI Got Him, Tomorrow They Will Get Me’: LockBit, BlackCat Unite to Form Cyber Cartel (The Cyber Express) 
Imperva Detects Undocumented 8220 Gang Activities (Imperva)
BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates (Proofpoint)
Bandook - A Persistent Threat That Keeps Evolving (Fortinet)
First American takes IT systems offline after cyberattack (Bleeping Computer)
BidenCash darkweb market gives 1.9 million credit cards for free (Bleeping Computer)
BidenCash (Searchlight Cyber)
Russia Seizes Ferum, Sky-Fraud, UAS, and Trump’s Dumps—and Signals More Takedowns to Come [Updated] (Flashpoint)

Share your feedback.Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Lapsus$ hacker is sentenced to hospital detention. Online ads and phishing drain crypto wallets. Cyberespionage continues. LockBit and ALPHV say they want to form a ransomware cartel. The 8220 gang's cryptojacking. DarkGate RAT's propagation. The evolution of Bandook. A prominent title insurance company takes systems offline. Rick Howard speaks with guests John Goodman &amp; Amanda Satterwhite of Accenture Federal Services about the launch of a public sector Cybersecurity Center of Excellence. And Trump’s Dumps lead to BidenCash.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>N2K’s Rick Howard talks with guests <a href="https://www.linkedin.com/in/johnbgoodman/">John Goodman</a> &amp; <a href="https://www.linkedin.com/in/mandysatterwhite/">Amanda Satterwhite</a> of <a href="https://www.accenture.com/us-en/industries/afs-index">Accenture Federal Services</a> about the launch of a <a href="https://newsroom.accenture.com/news/2023/accenture-federal-services-and-google-public-sector-launch-cybersecurity-center-of-excellence">public sector Cybersecurity Center of Excellence</a> in conjunction with Google.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.itpro.com/security/the-infamous-gta-vi-hacker-has-been-convicted-and-the-story-is-simply-absurd">The infamous GTA VI hacker has been convicted - and the story is simply absurd</a> (IT Pro)</p><p><a href="https://www.bleepingcomputer.com/news/security/crypto-drainer-steals-59-million-from-63k-people-in-twitter-ad-push/#google_vignette">Crypto drainer steals $59 million from 63k people in Twitter ad push</a> (Bleeping Computer)</p><p><a href="https://www.deepinstinct.com/blog/threat-actor-uac-0099-continues-to-target-ukraine">Threat Actor 'UAC-0099' Continues to Target Ukraine</a> (Deep Instinct) </p><p><a href="https://thecyberexpress.com/lockbit-and-blackcat-join-to-form-cyber-cartel/">‘Today FBI Got Him, Tomorrow They Will Get Me’: LockBit, BlackCat Unite to Form Cyber Cartel </a>(The Cyber Express) </p><p><a href="https://www.imperva.com/blog/imperva-detects-undocumented-8220-gang-activities/">Imperva Detects Undocumented 8220 Gang Activities</a> (Imperva)</p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/battleroyal-darkgate-cluster-spreads-email-and-fake-browser-updates">BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates</a> (Proofpoint)</p><p><a href="https://www.fortinet.com/blog/threat-research/bandook-persistent-threat-that-keeps-evolving">Bandook - A Persistent Threat That Keeps Evolving</a> (Fortinet)</p><p><a href="https://www.bleepingcomputer.com/news/security/first-american-takes-it-systems-offline-after-cyberattack/?mid=1#cid=1472224">First American takes IT systems offline after cyberattack</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/bidencash-darkweb-market-gives-19-million-credit-cards-for-free/">BidenCash darkweb market gives 1.9 million credit cards for free</a> (Bleeping Computer)</p><p><a href="https://www.slcyber.io/dark-web/bidencash/">BidenCash</a> (Searchlight Cyber)</p><p><a href="https://flashpoint.io/blog/russia-seizes-ferum-skyfraud-uas-trumpsdumps-carding-forums/">Russia Seizes Ferum, Sky-Fraud, UAS, and Trump’s Dumps—and Signals More Takedowns to Come</a> [Updated] (Flashpoint)</p><h2><br></h2><h2><strong>Share your feedback.Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1426</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[169fb4a4-2b53-11ee-9c79-ebe8e5ba6bab]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9891314027.mp3?updated=1703274179" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kingdom come, kingdom fall.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1972/notes</link>
      <description>German officials take down a dark web market. Google patched zero-day. Terrapin attack targets SSL. A look at payment fraud. Agent Tesla is spreading through an old vulnerability. An iPhone thief explains his techniques. Ukrainian reprisals for Russia's Kyivstar attack. Israeli officials warn of data wipers. Rick Howard speaks with Scott Roberts of Interpress about Driving Intelligence with MITRE ATT&amp;CK, and leveraging limited resources to build an evolving threat repository. And go ahead and click that like button - just don’t expect to get paid.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest Scott Roberts of Interpres joins N2K’s Rick Howard from the recent MITRE ATT&amp;CKcon event. They discuss driving intelligence with MITRE ATT&amp;CK: Leveraging limited resources to build evolving threat repository. 

Selected Reading
German police takes down Kingdom Market cybercrime marketplace (BleepingComputer)
GOOGLE ADDRESSED A NEW ACTIVELY EXPLOITED CHROME ZERO-DAY (Securityaffairs)
SSH protects the world’s most sensitive networks. It just got a lot weaker (Ars Technica)
Annual Payment Fraud Intelligence Report: 2023 (Recorded Future)
Threat Actors Exploit CVE-2017-11882 To Deliver Agent Tesla (Zscaler)
iPhone Thief Explains How He Breaks Into Your Phone (Wall Street Journal)
Ukrainian hackers breach Rosvodokanal, seize data of Russia's largest private water utility (RBC Ukraine)
Fake F5 BIG-IP zero-day warning emails push data wipers (BleepingComputer)
“Get Paid to Like Videos”? This YouTube Scam Leads to Empty Wallets (Hack Read)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 21 Dec 2023 21:10:00 -0000</pubDate>
      <itunes:title>Kingdom come, kingdom fall.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1972</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>German officials take down a dark web market. Google patched zero-day. Terrapin attack targets SSL. A look at payment fraud. Agent Tesla is spreading through an old vulnerability. An iPhone thief explains his techniques. Ukrainian reprisals for Russia's Kyivstar attack. Israeli officials warn of data wipers. Rick Howard speaks with Scott Roberts of Interpress about Driving Intelligence with MITRE ATT&amp;CK, and leveraging limited resources to build an evolving threat repository. And go ahead and click that like button - just don’t expect to get paid.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest Scott Roberts of Interpres joins N2K’s Rick Howard from the recent MITRE ATT&amp;CKcon event. They discuss driving intelligence with MITRE ATT&amp;CK: Leveraging limited resources to build evolving threat repository. 

Selected Reading
German police takes down Kingdom Market cybercrime marketplace (BleepingComputer)
GOOGLE ADDRESSED A NEW ACTIVELY EXPLOITED CHROME ZERO-DAY (Securityaffairs)
SSH protects the world’s most sensitive networks. It just got a lot weaker (Ars Technica)
Annual Payment Fraud Intelligence Report: 2023 (Recorded Future)
Threat Actors Exploit CVE-2017-11882 To Deliver Agent Tesla (Zscaler)
iPhone Thief Explains How He Breaks Into Your Phone (Wall Street Journal)
Ukrainian hackers breach Rosvodokanal, seize data of Russia's largest private water utility (RBC Ukraine)
Fake F5 BIG-IP zero-day warning emails push data wipers (BleepingComputer)
“Get Paid to Like Videos”? This YouTube Scam Leads to Empty Wallets (Hack Read)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>German officials take down a dark web market. Google patched zero-day. Terrapin attack targets SSL. A look at payment fraud. Agent Tesla is spreading through an old vulnerability. An iPhone thief explains his techniques. Ukrainian reprisals for Russia's Kyivstar attack. Israeli officials warn of data wipers. Rick Howard speaks with Scott Roberts of Interpress about Driving Intelligence with MITRE ATT&amp;CK, and leveraging limited resources to build an evolving threat repository. And go ahead and click that like button - just don’t expect to get paid.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today’s guest <a href="https://www.linkedin.com/in/scottroberts/">Scott Roberts</a> of <a href="https://interpressecurity.com/">Interpres</a> joins N2K’s Rick Howard from the recent MITRE ATT&amp;CKcon event. They discuss driving intelligence with MITRE ATT&amp;CK: Leveraging limited resources to build evolving threat repository. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/german-police-takes-down-kingdom-market-cybercrime-marketplace/#google_vignette">German police takes down Kingdom Market cybercrime marketplace</a> (BleepingComputer)</p><p><a href="https://securityaffairs.com/156231/security/google-addressed-a-new-actively-exploited-chrome-zero-day.html">GOOGLE ADDRESSED A NEW ACTIVELY EXPLOITED CHROME ZERO-DAY</a> (Securityaffairs)</p><p><a href="https://arstechnica.com/security/2023/12/hackers-can-break-ssh-channel-integrity-using-novel-data-corruption-attack/">SSH protects the world’s most sensitive networks. It just got a lot weaker</a> (Ars Technica)</p><p><a href="https://www.recordedfuture.com/annual-payment-fraud-intelligence-report-2023">Annual Payment Fraud Intelligence Report: 2023</a> (Recorded Future)</p><p><a href="https://www.zscaler.com/blogs/security-research/threat-actors-exploit-cve-2017-11882-deliver-agent-tesla">Threat Actors Exploit CVE-2017-11882 To Deliver Agent Tesla</a> (Zscaler)</p><p><a href="https://www.youtube.com/watch?v=gi96HKr2vo8">iPhone Thief Explains How He Breaks Into Your Phone</a> (Wall Street Journal)</p><p><a href="https://newsukraine.rbc.ua/news/ukrainian-hackers-breach-rosvodokanal-seize-1703107044.html">Ukrainian hackers breach Rosvodokanal, seize data of Russia's largest private water utility</a> (RBC Ukraine)</p><p><a href="https://www.bleepingcomputer.com/news/security/fake-f5-big-ip-zero-day-warning-emails-push-data-wipers/#google_vignette">Fake F5 BIG-IP zero-day warning emails push data wipers</a> (BleepingComputer)</p><p><a href="https://www.hackread.com/get-paid-to-like-videos-this-youtube-scam/#google_vignette">“Get Paid to Like Videos”? This YouTube Scam Leads to Empty Wallets</a> (Hack Read)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1304</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16908114-2b53-11ee-9c79-eb6bda36de8e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9321355479.mp3?updated=1703189206" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leading the charge in cybercrime take downs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1971/notes</link>
      <description>Interpol leads cybercrime take downs. ALPHV/Blackcat is in a “tug of Tor” with the FBI.  The Senate confirms a new leader for Cyber Command and NSA. Rite Aid is banned from using facial recognition. CISA prepares a new approach to information sharing. Remote encryption of ransomware. CitrixBleed is exploited to access customer data. An update on the Kyivstar cyberattack. The Tallinn Mechanism solidifies Western support for Ukraine's cybersecurity. In today’s Learning Layer segment, host Sam Meisenberg talks with Shelby Ludtke about passing the new ISC2 Certified in Cybersecurity (CC) exam. And GCHQ introduces youngsters to code breaking.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In our Learning Layer segment today, host Sam Meisenberg talks with Shelby Ludtke about passing the new ISC2 Certified in Cybersecurity (CC) exam. For more information on practice tests, please visit N2K’s certification page. 

Learning Layer links
Practice tests

Selected Reading
Interpol operation arrests 3,500 cybercriminals, seizes $300 million (Bleeping Computer)
AlphV claims to have ‘unseized’ its darkweb domain from the FBI. What’s happening? (The Record)
Senate confirms Biden’s pick for Cyber Command, NSA (The Record)
Rite Aid Banned from Using AI Facial Recognition After FTC Says Retailer Deployed Technology without Reasonable Safeguards (Federal Trade Commission)
Enabling Threat-Informed Cybersecurity: Evolving CISA’s Approach to Cyber Threat Information Sharing (CISA)
CryptoGuard: An asymmetric approach to the ransomware battle (Sophos)
Notice To Customers of Data Security Incident (Businesswire)
Ukraine's Kyivstar says it is fully operational after cyber attack (Reuters)
UK and partners form The Tallinn Mechanism for cyber security (Gov.UK)
GCHQ Christmas challenge: Agency reveals 2023 codebreaker (BBC)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 20 Dec 2023 21:10:00 -0000</pubDate>
      <itunes:title>Leading the charge in cybercrime take downs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1971</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Interpol leads cybercrime take downs. ALPHV/Blackcat is in a “tug of Tor” with the FBI.  The Senate confirms a new leader for Cyber Command and NSA. Rite Aid is banned from using facial recognition. CISA prepares a new approach to information sharing. Remote encryption of ransomware. CitrixBleed is exploited to access customer data. An update on the Kyivstar cyberattack. The Tallinn Mechanism solidifies Western support for Ukraine's cybersecurity. In today’s Learning Layer segment, host Sam Meisenberg talks with Shelby Ludtke about passing the new ISC2 Certified in Cybersecurity (CC) exam. And GCHQ introduces youngsters to code breaking.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
In our Learning Layer segment today, host Sam Meisenberg talks with Shelby Ludtke about passing the new ISC2 Certified in Cybersecurity (CC) exam. For more information on practice tests, please visit N2K’s certification page. 

Learning Layer links
Practice tests

Selected Reading
Interpol operation arrests 3,500 cybercriminals, seizes $300 million (Bleeping Computer)
AlphV claims to have ‘unseized’ its darkweb domain from the FBI. What’s happening? (The Record)
Senate confirms Biden’s pick for Cyber Command, NSA (The Record)
Rite Aid Banned from Using AI Facial Recognition After FTC Says Retailer Deployed Technology without Reasonable Safeguards (Federal Trade Commission)
Enabling Threat-Informed Cybersecurity: Evolving CISA’s Approach to Cyber Threat Information Sharing (CISA)
CryptoGuard: An asymmetric approach to the ransomware battle (Sophos)
Notice To Customers of Data Security Incident (Businesswire)
Ukraine's Kyivstar says it is fully operational after cyber attack (Reuters)
UK and partners form The Tallinn Mechanism for cyber security (Gov.UK)
GCHQ Christmas challenge: Agency reveals 2023 codebreaker (BBC)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Interpol leads cybercrime take downs. ALPHV/Blackcat is in a “tug of Tor” with the FBI.  The Senate confirms a new leader for Cyber Command and NSA. Rite Aid is banned from using facial recognition. CISA prepares a new approach to information sharing. Remote encryption of ransomware. CitrixBleed is exploited to access customer data. An update on the Kyivstar cyberattack. The Tallinn Mechanism solidifies Western support for Ukraine's cybersecurity. In today’s Learning Layer segment, host Sam Meisenberg talks with Shelby Ludtke about passing the new ISC2 Certified in Cybersecurity (CC) exam. And GCHQ introduces youngsters to code breaking.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>In our Learning Layer segment today, host <a href="https://www.linkedin.com/in/sam-meisenberg-62793369/">Sam Meisenberg</a> talks with <a href="https://www.linkedin.com/in/shelbyludtke/">Shelby Ludtke</a> about passing the new ISC2 <a href="https://www.isc2.org/certifications/cc">Certified in Cybersecurity</a> (CC) exam. For more information on practice tests, please visit <a href="http://n2k.com/certify">N2K’s certification page</a>. </p><p><br></p><h2>Learning Layer links</h2><p><a href="https://certify.cybervista.net/products/?filter_product-type=practice-test&amp;_type=practice-test">Practice tests</a></p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/interpol-operation-arrests-3-500-cybercriminals-seizes-300-million/#google_vignette">Interpol operation arrests 3,500 cybercriminals, seizes $300 million</a> (Bleeping Computer)</p><p><a href="https://therecord.media/alphv-blackcat-ransomware-seized-sites-onion-tor-darkweb-fbi">AlphV claims to have ‘unseized’ its darkweb domain from the FBI. What’s happening?</a> (The Record)</p><p><a href="https://therecord.media/timothy-haugh-nsa-cyber-command-confirmed-senate">Senate confirms Biden’s pick for Cyber Command, NSA</a> (The Record)</p><p><a href="https://www.ftc.gov/news-events/news/press-releases/2023/12/rite-aid-banned-using-ai-facial-recognition-after-ftc-says-retailer-deployed-technology-without">Rite Aid Banned from Using AI Facial Recognition After FTC Says Retailer Deployed Technology without Reasonable Safeguards </a>(Federal Trade Commission)</p><p><a href="https://www.cisa.gov/news-events/news/enabling-threat-informed-cybersecurity-evolving-cisas-approach-cyber-threat-information-sharing">Enabling Threat-Informed Cybersecurity: Evolving CISA’s Approach to Cyber Threat Information Sharing</a> (CISA)</p><p><a href="https://news.sophos.com/en-us/2023/12/20/cryptoguard-an-asymmetric-approach-to-the-ransomware-battle/">CryptoGuard: An asymmetric approach to the ransomware battle</a> (Sophos)</p><p><a href="https://www.businesswire.com/news/home/20231218979935/en/Notice-To-Customers-of-Data-Security-Incident/">Notice To Customers of Data Security Incident</a> (Businesswire)</p><p><a href="https://www.reuters.com/business/media-telecom/ukraines-kyivstar-reports-difficulties-with-voice-communications-2023-12-20/">Ukraine's Kyivstar says it is fully operational after cyber attack</a> (Reuters)</p><p><a href="https://www.gov.uk/government/news/uk-and-partners-form-the-tallinn-mechanism-for-cyber-security">UK and partners form The Tallinn Mechanism for cyber security</a> (Gov.UK)</p><p><a href="https://www.bbc.com/news/uk-67707647">GCHQ Christmas challenge: Agency reveals 2023 codebreaker</a> (BBC)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1685</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16af7556-2b53-11ee-9c79-2bddf377aa72]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6736711381.mp3?updated=1703103623" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A dark web take down. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1970/notes</link>
      <description>The FBI takes down ALPHV/BlackCat. Comcast reveals breach of nearly 36 million Xfinity customers. Microsoft and Cyberspace Solarium Commission release water sector security report. Malware increasingly uses public infrastructure. Iran's Seedworm and its telco targets. QR code scams. Feds release joint analysis of 2022 election integrity. Joint advisory on Play ransomware group. In today’s Mr Security Answer Person, John Pescatore considers the risks of AI. Rick Howard talks with Lauren Brennan of GuidePoint Security about evaluating and maturing your SOC. Iranian gas stations running on empty.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guests
John Pescastore joins us for Mr. Security Answer Person to address the question, “Things seem to be moving quickly with AI, what is your feeling about that positioning for early 2024?”
Today’s guest is Lauren Brennan of GuidePoint Security. N2K’s Rick Howard caught up with Lauren recently  at the MITRE ATT&amp;CKcon 4.0. They discussed evaluating and maturing your SOC.

Selected Reading
Authorities claim seizure of notorious ALPHV ransomware gang’s dark web leak site (TechCrunch+)
Comcast says hackers stole data of close to 36 million Xfinity customers (TechCrunch+)
Microsoft, Cyberspace Solarium Commission propose measures to strengthen water sector cybersecurity (Industrial Cyber)
Malware leveraging public infrastructure like GitHub on the rise (Reversing Labs)
Seedworm: Iranian Hackers Target Telecoms Orgs in North and East Africa (Symantec)
“Quishing” you a Happy Holiday Season (netcraft)
2022 Election Not Impacted by Chinese, Russian Cyber Activity: DOJ, DHS (Securityweek)
US and Australia Warn of Play Ransomware Threat (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Dec 2023 21:10:00 -0000</pubDate>
      <itunes:title>A dark web take down. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1970</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The FBI takes down ALPHV/BlackCat. Comcast reveals breach of nearly 36 million Xfinity customers. Microsoft and Cyberspace Solarium Commission release water sector security report. Malware increasingly uses public infrastructure. Iran's Seedworm and its telco targets. QR code scams. Feds release joint analysis of 2022 election integrity. Joint advisory on Play ransomware group. In today’s Mr Security Answer Person, John Pescatore considers the risks of AI. Rick Howard talks with Lauren Brennan of GuidePoint Security about evaluating and maturing your SOC. Iranian gas stations running on empty.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guests
John Pescastore joins us for Mr. Security Answer Person to address the question, “Things seem to be moving quickly with AI, what is your feeling about that positioning for early 2024?”
Today’s guest is Lauren Brennan of GuidePoint Security. N2K’s Rick Howard caught up with Lauren recently  at the MITRE ATT&amp;CKcon 4.0. They discussed evaluating and maturing your SOC.

Selected Reading
Authorities claim seizure of notorious ALPHV ransomware gang’s dark web leak site (TechCrunch+)
Comcast says hackers stole data of close to 36 million Xfinity customers (TechCrunch+)
Microsoft, Cyberspace Solarium Commission propose measures to strengthen water sector cybersecurity (Industrial Cyber)
Malware leveraging public infrastructure like GitHub on the rise (Reversing Labs)
Seedworm: Iranian Hackers Target Telecoms Orgs in North and East Africa (Symantec)
“Quishing” you a Happy Holiday Season (netcraft)
2022 Election Not Impacted by Chinese, Russian Cyber Activity: DOJ, DHS (Securityweek)
US and Australia Warn of Play Ransomware Threat (Infosecurity Magazine)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FBI takes down ALPHV/BlackCat. Comcast reveals breach of nearly 36 million Xfinity customers. Microsoft and Cyberspace Solarium Commission release water sector security report. Malware increasingly uses public infrastructure. Iran's Seedworm and its telco targets. QR code scams. Feds release joint analysis of 2022 election integrity. Joint advisory on Play ransomware group. In today’s Mr Security Answer Person, John Pescatore considers the risks of AI. Rick Howard talks with Lauren Brennan of GuidePoint Security about evaluating and maturing your SOC. Iranian gas stations running on empty.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guests</h2><p><a href="https://www.linkedin.com/in/john-p-746a8/">John Pescastore</a> joins us for Mr. Security Answer Person to address the question, “Things seem to be moving quickly with AI, what is your feeling about that positioning for early 2024?”</p><p>Today’s guest is <a href="https://www.linkedin.com/in/cyberlaure/">Lauren Brennan</a> of <a href="https://www.guidepointsecurity.com/">GuidePoint Security</a>. N2K’s Rick Howard caught up with Lauren recently  at the <a href="https://www.mitre.org/events/attackcon-4">MITRE ATT&amp;CKcon 4.0</a>. They discussed evaluating and maturing your SOC.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://techcrunch.com/2023/12/19/alphv-blackcat-ransomware-seizure/">Authorities claim seizure of notorious ALPHV ransomware gang’s dark web leak site</a> (TechCrunch+)</p><p><a href="https://techcrunch.com/2023/12/19/alphv-blackcat-ransomware-seizure/">Comcast says hackers stole data of close to 36 million Xfinity customers</a> (TechCrunch+)</p><p><a href="https://industrialcyber.co/utilities-energy-power-water-waste/microsoft-cyberspace-solarium-commission-propose-measures-to-strengthen-water-sector-cybersecurity/">Microsoft, Cyberspace Solarium Commission propose measures to strengthen water sector cybersecurity</a> (Industrial Cyber)</p><p><a href="https://www.reversinglabs.com/blog/malware-leveraging-public-infrastructure-like-github-on-the-rise">Malware leveraging public infrastructure like GitHub on the rise</a> (Reversing Labs)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/iran-apt-seedworm-africa-telecoms">Seedworm: Iranian Hackers Target Telecoms Orgs in North and East Africa</a> (Symantec)</p><p><a href="https://www.netcraft.com/blog/quishing-you-a-happy-holiday-season/">“Quishing” you a Happy Holiday Season</a> (netcraft)</p><p><a href="https://www.securityweek.com/2022-election-not-impacted-by-chinese-russian-cyber-activity-doj-dhs/">2022 Election Not Impacted by Chinese, Russian Cyber Activity: DOJ, DHS</a> (Securityweek)</p><p><a href="https://www.infosecurity-magazine.com/news/us-australia-ransomware-threat/">US and Australia Warn of Play Ransomware Threat</a> (Infosecurity Magazine)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1746</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16de7176-2b53-11ee-9c79-a77fbb827e33]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3351713775.mp3?updated=1703017350" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>14 million customers and stolen data.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1969/notes</link>
      <description>A US mortgage company reveals major data breach. Updates from CISA. NSA provides guidance on SBOMs. MongoDB warns customers of a breach. BlackCat/ALPHV is still a market leader, but feeling competitive pressure. Reassessing the effects of Log4shell. The International Committee of the Red Cross calls for restraint in cyber warfare. Ransomware hits a cancer center. Ann Johnson, host of Microsoft Security’s Afternoon Cyber Tea podcast goes beyond basics with her guest Tanya Janca, founder of WeHackPurple. And what can I do to make you take home this chatbot today?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
Host of Microsoft Security’s Afternoon Cyber Tea podcast, Ann Johnson, goes beyond basics with her guest Tanya Janca, founder of WeHackPurple. Ann’s full discussion with Tanya can be heard here. You can catch Afternoon Cyber Tea every other Tuesday on your favorite podcast apps and the N2K Network. 
Selected Reading
Mr. Cooper reveals breach exposed 14.6 million clients (Cybernews)
Enhancing Cyber Resilience: Insights from the CISA Healthcare and Public Health Sector Risk and Vulnerability Assessment (CISA)
NSA Issues Guidance on Incorporating SBOMs to Improve Cybersecurity (Security Week)
MongoDB says customer data was exposed in a cyberattack (Bleeping Computer)
ALPHV Targeting: Ransomware &amp; Digital Extortion (ZeroFox)
A Log4Shell Retrospective - Overblown and Exaggerated (VulnCheck)
We call on States to stop turning a blind eye to the participation of civilian hackers in armed conflict (ICRC)
Seattle cancer center confirms cyberattack after ransomware gang threats (The Record)
What can I do to make you take home this chatbot today? (Mastodon)
Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 18 Dec 2023 21:10:00 -0000</pubDate>
      <itunes:title>14 million customers and stolen data.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1969</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A US mortgage company reveals major data breach. Updates from CISA. NSA provides guidance on SBOMs. MongoDB warns customers of a breach. BlackCat/ALPHV is still a market leader, but feeling competitive pressure. Reassessing the effects of Log4shell. The International Committee of the Red Cross calls for restraint in cyber warfare. Ransomware hits a cancer center. Ann Johnson, host of Microsoft Security’s Afternoon Cyber Tea podcast goes beyond basics with her guest Tanya Janca, founder of WeHackPurple. And what can I do to make you take home this chatbot today?
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guest
Host of Microsoft Security’s Afternoon Cyber Tea podcast, Ann Johnson, goes beyond basics with her guest Tanya Janca, founder of WeHackPurple. Ann’s full discussion with Tanya can be heard here. You can catch Afternoon Cyber Tea every other Tuesday on your favorite podcast apps and the N2K Network. 
Selected Reading
Mr. Cooper reveals breach exposed 14.6 million clients (Cybernews)
Enhancing Cyber Resilience: Insights from the CISA Healthcare and Public Health Sector Risk and Vulnerability Assessment (CISA)
NSA Issues Guidance on Incorporating SBOMs to Improve Cybersecurity (Security Week)
MongoDB says customer data was exposed in a cyberattack (Bleeping Computer)
ALPHV Targeting: Ransomware &amp; Digital Extortion (ZeroFox)
A Log4Shell Retrospective - Overblown and Exaggerated (VulnCheck)
We call on States to stop turning a blind eye to the participation of civilian hackers in armed conflict (ICRC)
Seattle cancer center confirms cyberattack after ransomware gang threats (The Record)
What can I do to make you take home this chatbot today? (Mastodon)
Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A US mortgage company reveals major data breach. Updates from CISA. NSA provides guidance on SBOMs. MongoDB warns customers of a breach. BlackCat/ALPHV is still a market leader, but feeling competitive pressure. Reassessing the effects of Log4shell. The International Committee of the Red Cross calls for restraint in cyber warfare. Ransomware hits a cancer center. Ann Johnson, host of Microsoft Security’s Afternoon Cyber Tea podcast goes beyond basics with her guest Tanya Janca, founder of WeHackPurple. And what can I do to make you take home this chatbot today?</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.</p><h2>CyberWire Guest</h2><p>Host of Microsoft Security’s Afternoon Cyber Tea podcast, Ann Johnson, goes beyond basics with her guest Tanya Janca, founder of WeHackPurple. Ann’s full discussion with Tanya can be heard here. You can catch Afternoon Cyber Tea every other Tuesday on your favorite podcast apps and the N2K Network. </p><h2>Selected Reading</h2><p><a href="https://cybernews.com/news/mr-cooper-breach-exposed-millions/#google_vignette">Mr. Cooper reveals breach exposed 14.6 million clients</a> (Cybernews)</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-349a">Enhancing Cyber Resilience: Insights from the CISA Healthcare and Public Health Sector Risk and Vulnerability Assessment</a> (CISA)</p><p><a href="https://www.securityweek.com/nsa-issues-guidance-on-incorporating-sboms-to-improve-cybersecurity/">NSA Issues Guidance on Incorporating SBOMs to Improve Cybersecurity</a> (Security Week)</p><p><a href="https://www.bleepingcomputer.com/news/security/mongodb-says-customer-data-was-exposed-in-a-cyberattack/">MongoDB says customer data was exposed in a cyberattack </a>(Bleeping Computer)</p><p><a href="https://www.zerofox.com/resources/alphv-targeting-ransomware-digital-extortion/">ALPHV Targeting: Ransomware &amp; Digital Extortion</a> (ZeroFox)</p><p><a href="https://vulncheck.com/blog/log4shell-retro">A Log4Shell Retrospective - Overblown and Exaggerated</a> (VulnCheck)</p><p><a href="https://www.icrc.org/en/statement-cyber-oewg-sixth-session">We call on States to stop turning a blind eye to the participation of civilian hackers in armed conflict</a> (ICRC)</p><p><a href="https://therecord.media/seattle-fred-hutch-cancer-center-ransomware-attack">Seattle cancer center confirms cyberattack after ransomware gang threats</a> (The Record)</p><p><a href="https://stoney.monster/@stoneymonster/111592567052438463">What can I do to make you take home this chatbot today?</a> (Mastodon)</p><h2>Share your feedback.</h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. </p><p>Want to hear your company in the show?</p><p>You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1398</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16ee4d58-2b53-11ee-9c79-c3e8472399fd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9483443789.mp3?updated=1702929840" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Oren Koren: Crossing music and cybersecurity. [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/179/notes</link>
      <description>Oren Koren, Co-Founder and Chief Product Officer from Veriti sits down to share his amazing story. Before entering the vendor side of the cyber world, Oren served for 14 years in the Israeli 8200 unit where he led a variety of cybersecurity activities and researches that eventually earned him four 8200-unit cyber innovation awards. When he left the Israel Defense Forces, he joined Check Point Software to lead their AI-based innovations and advanced data analytics projects that redefined threat hunting and SIEM applications. This eventually inspired him to start his own company, with fellow co-founder Adi Ikan. Oren shares that he had a love for music growing up, and wanted to be a musician, saying music was the catalyst to him becoming interested in the cyber field, saying "I believe the music helped me a bit with my career in cybersecurity." We thank Oren for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 17 Dec 2023 08:10:00 -0000</pubDate>
      <itunes:title>Oren Koren: Crossing music and cybersecurity. [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>179</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Oren Koren, Co-Founder and Chief Product Officer from Veriti sits down to share his amazing story. Before entering the vendor side of the cyber world, Oren served for 14 years in the Israeli 8200 unit where he led a variety of cybersecurity activities and researches that eventually earned him four 8200-unit cyber innovation awards. When he left the Israel Defense Forces, he joined Check Point Software to lead their AI-based innovations and advanced data analytics projects that redefined threat hunting and SIEM applications. This eventually inspired him to start his own company, with fellow co-founder Adi Ikan. Oren shares that he had a love for music growing up, and wanted to be a musician, saying music was the catalyst to him becoming interested in the cyber field, saying "I believe the music helped me a bit with my career in cybersecurity." We thank Oren for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Oren Koren, Co-Founder and Chief Product Officer from Veriti sits down to share his amazing story. Before entering the vendor side of the cyber world, Oren served for 14 years in the Israeli 8200 unit where he led a variety of cybersecurity activities and researches that eventually earned him four 8200-unit cyber innovation awards. When he left the Israel Defense Forces, he joined Check Point Software to lead their AI-based innovations and advanced data analytics projects that redefined threat hunting and SIEM applications. This eventually inspired him to start his own company, with fellow co-founder Adi Ikan. Oren shares that he had a love for music growing up, and wanted to be a musician, saying music was the catalyst to him becoming interested in the cyber field, saying "I believe the music helped me a bit with my career in cybersecurity." We thank Oren for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>497</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b0e21b38-9b88-11ee-a4dc-fbf5ea30b060]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7734931127.mp3?updated=1702670826" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shedding light on fighting Ursa. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/310/notes</link>
      <description>Host of the CyberWire Daily podcast segment Threat Vector, David Moulton sits down with Mike "Siko" Sikorski from Palo Alto Networks Unit 42 to discuss their research on "Fighting Ursa Aka APT28: Illuminating a Covert Campaign."
Unit 42 just published new threat intelligence on Fighting Ursa (aka APT28), a group associated with Russia's military intelligence, on how they are exploiting a Microsoft Outlook vulnerability (CVE-2023-23397) to target organizations in NATO member countries, Ukraine, Jordan, and the UAE. These organizations are of strategic importance in defense, foreign affairs, economy, energy, transportation, and telecommunications.
The research can be found here:
Fighting Ursa Aka APT28: Illuminating a Covert Campaign

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Dec 2023 08:00:00 -0000</pubDate>
      <itunes:title>Shedding light on Fighting Ursa. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>310</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Host of the CyberWire Daily podcast segment Threat Vector, David Moulton sits down with Mike "Siko" Sikorski from Palo Alto Networks Unit 42 to discuss their research on "Fighting Ursa Aka APT28: Illuminating a Covert Campaign."
Unit 42 just published new threat intelligence on Fighting Ursa (aka APT28), a group associated with Russia's military intelligence, on how they are exploiting a Microsoft Outlook vulnerability (CVE-2023-23397) to target organizations in NATO member countries, Ukraine, Jordan, and the UAE. These organizations are of strategic importance in defense, foreign affairs, economy, energy, transportation, and telecommunications.
The research can be found here:
Fighting Ursa Aka APT28: Illuminating a Covert Campaign

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Host of the CyberWire Daily podcast segment Threat Vector, David Moulton sits down with Mike "Siko" Sikorski from Palo Alto Networks Unit 42 to discuss their research on "Fighting Ursa Aka APT28: Illuminating a Covert Campaign."</p><p>Unit 42 just published new threat intelligence on Fighting Ursa (aka APT28), a group associated with Russia's military intelligence, on how they are exploiting a Microsoft Outlook vulnerability (CVE-2023-23397) to target organizations in NATO member countries, Ukraine, Jordan, and the UAE. These organizations are of strategic importance in defense, foreign affairs, economy, energy, transportation, and telecommunications.</p><p>The research can be found here:</p><ul><li><a href="https://unit42.paloaltonetworks.com/russian-apt-fighting-ursa-exploits-cve-2023-233397/">Fighting Ursa Aka APT28: Illuminating a Covert Campaign</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1227</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a6d6c1d2-9b7b-11ee-8411-fbecce04ae4e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6352911297.mp3?updated=1702666929" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Remapping privacy.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1968/notes</link>
      <description>Google boosts Maps privacy, a court shields password disclosure, feds foil a massive scam operation, Iran-Israel cyber tensions escalate, Idaho National Labs reports a significant data breach, a security engineer's cybercrime confession.  N2K’s Rick Howard reports from the recent MITRE ATT&amp;CK con, speaking with Blake Strom of Microsoft about 10 years of the MITRE ATT&amp;CK Framework. And Brian Krebs' relentless investigation into the Target breach.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, N2K’s Rick Howard recently attended the MITRE ATT&amp;CK Con. While there, Rick spoke with Blake Strom of Microsoft and they discussed 10 years of MITRE ATT&amp;CK Framework.

Selected Reading
Google is rolling out new protections for our location data (The Washington Post)
Four men indicted in $80 million ‘pig butchering’ scheme (CNBC)
Just In: Crypto Hacker Shakeeb Ahmed Admits to $12 Million Heist (BET US)
Suspects can refuse to provide phone passcodes to police, court rules (Ars Technica)
Gaza Cybergang | Unified Front Targeting Hamas Opposition (Sentinal Labs)
Israeli CEO recruits Muslim hackers to fight Hamas in cyberwarfare (The Jerusalem Post)
 Personal Information of 45,000 Individuals Stolen in Idaho National Laboratory Data Breach (Securityweek)
Ten Years Later, New Clues in the Target Breach (krebsonsecurity)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 15 Dec 2023 21:10:00 -0000</pubDate>
      <itunes:title>Remapping privacy.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1968</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Google boosts Maps privacy, a court shields password disclosure, feds foil a massive scam operation, Iran-Israel cyber tensions escalate, Idaho National Labs reports a significant data breach, a security engineer's cybercrime confession.  N2K’s Rick Howard reports from the recent MITRE ATT&amp;CK con, speaking with Blake Strom of Microsoft about 10 years of the MITRE ATT&amp;CK Framework. And Brian Krebs' relentless investigation into the Target breach.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today, N2K’s Rick Howard recently attended the MITRE ATT&amp;CK Con. While there, Rick spoke with Blake Strom of Microsoft and they discussed 10 years of MITRE ATT&amp;CK Framework.

Selected Reading
Google is rolling out new protections for our location data (The Washington Post)
Four men indicted in $80 million ‘pig butchering’ scheme (CNBC)
Just In: Crypto Hacker Shakeeb Ahmed Admits to $12 Million Heist (BET US)
Suspects can refuse to provide phone passcodes to police, court rules (Ars Technica)
Gaza Cybergang | Unified Front Targeting Hamas Opposition (Sentinal Labs)
Israeli CEO recruits Muslim hackers to fight Hamas in cyberwarfare (The Jerusalem Post)
 Personal Information of 45,000 Individuals Stolen in Idaho National Laboratory Data Breach (Securityweek)
Ten Years Later, New Clues in the Target Breach (krebsonsecurity)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Google boosts Maps privacy, a court shields password disclosure, feds foil a massive scam operation, Iran-Israel cyber tensions escalate, Idaho National Labs reports a significant data breach, a security engineer's cybercrime confession.  N2K’s Rick Howard reports from the recent MITRE ATT&amp;CK con, speaking with Blake Strom of Microsoft about 10 years of the MITRE ATT&amp;CK Framework. And Brian Krebs' relentless investigation into the Target breach.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today, N2K’s Rick Howard recently attended the MITRE ATT&amp;CK Con. While there, Rick spoke with <a href="https://www.linkedin.com/in/blake-strom-274122ba/">Blake Strom</a> of <a href="https://www.microsoft.com/en-us/professionalservices/security">Microsoft</a> and they discussed 10 years of MITRE ATT&amp;CK Framework.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.washingtonpost.com/technology/2023/12/14/google-maps-location-history/">Google is rolling out new protections for our location data</a> (The Washington Post)</p><p><a href="https://www.cnbc.com/2023/12/14/pig-butchering-scam-results-in-four-indictments-two-arrests-doj.html">Four men indicted in $80 million ‘pig butchering’ scheme</a> (CNBC)</p><p><a href="https://coingape.com/just-in-crypto-hacker-shakeeb-ahmed-admits-to-12-million-heist/">Just In: Crypto Hacker Shakeeb Ahmed Admits to $12 Million Heist</a> (BET US)</p><p><a href="https://arstechnica.com/tech-policy/2023/12/suspects-can-refuse-to-provide-phone-passcodes-to-police-court-rules/?utm_brand=arstechnica&amp;utm_social-type=owned&amp;utm_source=mastodon&amp;utm_medium=social">Suspects can refuse to provide phone passcodes to police, court rules</a> (Ars Technica)</p><p><a href="https://www.sentinelone.com/labs/gaza-cybergang-unified-front-targeting-hamas-opposition/">Gaza Cybergang | Unified Front Targeting Hamas Opposition</a> (Sentinal Labs)</p><p><a href="https://www.jpost.com/israel-hamas-war/article-777827">Israeli CEO recruits Muslim hackers to fight Hamas in cyberwarfare</a> (The Jerusalem Post)</p><p><a href="https://www.securityweek.com/personal-information-of-45000-individuals-stolen-in-idaho-national-laboratory-data-breach/"> Personal Information of 45,000 Individuals Stolen in Idaho National Laboratory Data Breach</a> (Securityweek)</p><p><a href="https://krebsonsecurity.com/2023/12/ten-years-later-new-clues-in-the-target-breach/">Ten Years Later, New Clues in the Target Breach</a> (krebsonsecurity)</p><p><br></p><p><strong>Share your feedback.</strong></p><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1445</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1671f76c-2b53-11ee-9c79-73f997b8e30a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4595133048.mp3?updated=1702668138" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Taking down the storm.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1967/notes</link>
      <description>Microsoft takes down the Storm-1152 cybercrime operation. “GambleForce” is a newly discovered threat actor.  The SVR exploits a JetBrains TeamCity vulnerability. US Postal Service impersonation. Malicious ads associated with Zoom. An update on the cyberattack against Kyivstar. Apache issues a Struts 2 security advisory. The FCC adopts new data breach rules.  In our latest Threat Vector segment, David Moulton and Palo Alto Networks Madeline Sedgwick discuss the skills and methods necessary for understanding threat actor intent and behaviors. And the State Department's Global Engagement Center is under fire.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On the Threat Vector segment with Palo Alto Networks Unit 42’s David Moulton, hear about decoding cyber adversaries. David discusses unveiling intent and behavior in the world of threat hunting with Madeline Sedgwick.

Selected Reading
Microsoft disrupts cybercrime operation selling fraudulent accounts to notorious hacking gang (TechCrunch+)
New hacker group GambleForce targets government and gambling sites in Asia Pacific using SQL injections (Group-IB)
Russian Foreign Intelligence Service (SVR) Exploiting JetBrains TeamCity CVE Globally (Joint Advisory)
Malvertisers zoom in on cryptocurrencies and initial access (MalwareBytes)
Russian hacker group claims responsibility for Kyivstar cyberattack (The Kyiv Independent) 
New Critical RCE Vulnerability Discovered in Apache Struts 2 - Patch Now (The Hacker News)
FCC Adopts Updates to Data Breach Rules, Sets Up Privacy Battle (Bloomberg Law)
State Dept.’s Fight Against Disinformation Comes Under Attack (The New York Times)

Threat Vector.
In this Threat Vector segment, David Moulton and Palo Alto Networks Madeline Sedgwick discuss the skills and methods necessary for understanding threat actor intent and behaviors. Madeline, a Senior Cyber Research Engineer and Threat Analyst for the Cortex Xpanse team at Palo Alto Networks, shares insights into how analyzing adversary behavior helps in anticipating threats and avoiding guesswork. They discuss the value of understanding both system dynamics and human behavior in cybersecurity, emphasizing that cyber adversaries are limited by the same laws of internet physics.
Please share your thoughts with us for future Threat Vector segments by taking our brief survey.
To learn what is top of mind each month from the experts at Unit 42 sign up for their Threat Intel Bulletin. 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 14 Dec 2023 21:10:00 -0000</pubDate>
      <itunes:title>Taking down the storm.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1967</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Microsoft takes down the Storm-1152 cybercrime operation. “GambleForce” is a newly discovered threat actor.  The SVR exploits a JetBrains TeamCity vulnerability. US Postal Service impersonation. Malicious ads associated with Zoom. An update on the cyberattack against Kyivstar. Apache issues a Struts 2 security advisory. The FCC adopts new data breach rules.  In our latest Threat Vector segment, David Moulton and Palo Alto Networks Madeline Sedgwick discuss the skills and methods necessary for understanding threat actor intent and behaviors. And the State Department's Global Engagement Center is under fire.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On the Threat Vector segment with Palo Alto Networks Unit 42’s David Moulton, hear about decoding cyber adversaries. David discusses unveiling intent and behavior in the world of threat hunting with Madeline Sedgwick.

Selected Reading
Microsoft disrupts cybercrime operation selling fraudulent accounts to notorious hacking gang (TechCrunch+)
New hacker group GambleForce targets government and gambling sites in Asia Pacific using SQL injections (Group-IB)
Russian Foreign Intelligence Service (SVR) Exploiting JetBrains TeamCity CVE Globally (Joint Advisory)
Malvertisers zoom in on cryptocurrencies and initial access (MalwareBytes)
Russian hacker group claims responsibility for Kyivstar cyberattack (The Kyiv Independent) 
New Critical RCE Vulnerability Discovered in Apache Struts 2 - Patch Now (The Hacker News)
FCC Adopts Updates to Data Breach Rules, Sets Up Privacy Battle (Bloomberg Law)
State Dept.’s Fight Against Disinformation Comes Under Attack (The New York Times)

Threat Vector.
In this Threat Vector segment, David Moulton and Palo Alto Networks Madeline Sedgwick discuss the skills and methods necessary for understanding threat actor intent and behaviors. Madeline, a Senior Cyber Research Engineer and Threat Analyst for the Cortex Xpanse team at Palo Alto Networks, shares insights into how analyzing adversary behavior helps in anticipating threats and avoiding guesswork. They discuss the value of understanding both system dynamics and human behavior in cybersecurity, emphasizing that cyber adversaries are limited by the same laws of internet physics.
Please share your thoughts with us for future Threat Vector segments by taking our brief survey.
To learn what is top of mind each month from the experts at Unit 42 sign up for their Threat Intel Bulletin. 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft takes down the Storm-1152 cybercrime operation. “GambleForce” is a newly discovered threat actor.  The SVR exploits a JetBrains TeamCity vulnerability. US Postal Service impersonation. Malicious ads associated with Zoom. An update on the cyberattack against Kyivstar. Apache issues a Struts 2 security advisory. The FCC adopts new data breach rules.  In our latest Threat Vector segment, David Moulton and Palo Alto Networks<a href="https://www.linkedin.com/in/mesedgwick/"> Madeline Sedgwick</a> discuss the skills and methods necessary for understanding threat actor intent and behaviors. And the State Department's Global Engagement Center is under fire.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On the Threat Vector segment with Palo Alto Networks <a href="https://unit42.paloaltonetworks.com/">Unit 42</a>’s <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a>, hear about decoding cyber adversaries. David discusses unveiling intent and behavior in the world of threat hunting with <a href="https://www.linkedin.com/in/mesedgwick/">Madeline Sedgwick</a>.</p><h2><br></h2><h2>Selected Reading</h2><p><a href="https://techcrunch.com/2023/12/14/microsoft-disrupts-cybercrime-operation-selling-fraudulent-accounts-to-notorious-hacking-gang/">Microsoft disrupts cybercrime operation selling fraudulent accounts to notorious hacking gang</a> (TechCrunch+)</p><p><a href="https://www.group-ib.com/media-center/press-releases/gambleforce-gang/">New hacker group GambleForce targets government and gambling sites in Asia Pacific using SQL injections</a> (Group-IB)</p><p><a href="https://dd80b675424c132b90b3-e48385e382d2e5d17821a5e1d8e4c86b.ssl.cf1.rackcdn.com/external/aa23-347a-russian-foreign-intelligence-service-svr-exploiting-jetbrains-teamcity-cve-globally.pdf">Russian Foreign Intelligence Service (SVR) Exploiting JetBrains TeamCity CVE Globally</a> (Joint Advisory)</p><p><a href="https://www.malwarebytes.com/blog/threat-intelligence/2023/12/malvertisers-zoom-in-on-cryptocurrencies-and-initial-access">Malvertisers zoom in on cryptocurrencies and initial access</a> (MalwareBytes)</p><p><a href="https://kyivindependent.com/sbu-russian-hacker-group-reponsible-for-kyiv-star-cyberattack/">Russian hacker group claims responsibility for Kyivstar cyberattack</a> (The Kyiv Independent) </p><p><a href="https://thehackernews.com/2023/12/new-critical-rce-vulnerability.html">New Critical RCE Vulnerability Discovered in Apache Struts 2 - Patch Now</a> (The Hacker News)</p><p><a href="https://news.bloomberglaw.com/privacy-and-data-security/fcc-adopts-updates-to-data-breach-rules-sets-up-privacy-battle">FCC Adopts Updates to Data Breach Rules, Sets Up Privacy Battle</a> (Bloomberg Law)</p><p><a href="https://www.nytimes.com/2023/12/14/technology/state-department-disinformation-criticism.html">State Dept.’s Fight Against Disinformation Comes Under Attack</a> (The New York Times)</p><p><br></p><h2><strong>Threat Vector.</strong></h2><p>In this Threat Vector segment, David Moulton and Palo Alto Networks<a href="https://www.linkedin.com/in/mesedgwick/"> Madeline Sedgwick</a> discuss the skills and methods necessary for understanding threat actor intent and behaviors. Madeline, a Senior Cyber Research Engineer and Threat Analyst for the Cortex Xpanse team at Palo Alto Networks, shares insights into how analyzing adversary behavior helps in anticipating threats and avoiding guesswork. They discuss the value of understanding both system dynamics and human behavior in cybersecurity, emphasizing that cyber adversaries are limited by the same laws of internet physics.</p><p>Please share your thoughts with us for future Threat Vector segments by taking our <a href="https://www.surveymonkey.com/r/N2K_TV_p">brief survey</a>.</p><p>To learn what is top of mind each month from the experts at Unit 42 sign up for their <a href="https://start.paloaltonetworks.com/unit42-threat-intel-bulletin.html">Threat Intel Bulletin</a>. </p><p><br></p><p><strong>Share your feedback.</strong></p><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1499</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16811c10-2b53-11ee-9c79-a3d7fbf7c459]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1137139000.mp3?updated=1702590726" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The United Kingdom's catastrophic ransomware attack. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1966/notes</link>
      <description>The UK faces a looming threat of a catastrophic ransomware attack. The Senate confirms a new National Cyber Director. The rivalry between malware groups BatLoader and FakeBat. BazarCall phishing attack and its unusual use of Google Forms. A serious vulnerability threatens K-12 student data. Spiderman game developer Insomniac Games becomes the latest ransomware victim. Today’s guest is Tim Starks from the Washington Post’s Cybersecurity 202 with China’s influence operations in Taiwan, along with a look back at 2023. We'll touch on Microsoft's Patch Tuesday and why outdated password policies are still a problem.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest is Tim Starks from the Washington Post’s Cybersecurity 202. Tim and Dave discuss China’s influence operations in Taiwan, along with a look back at 2023. 

Selected Reading
UK at high risk of ‘catastrophic ransomware attack’, report says (The Guardian)
Roll Call Vote 118th Congress - 1st Session  (United States Senate)
How Does Access Impact Risk? (IST)
API and App Security: Q3 2023 Snapshot (ThreatX)
The Kids Aren’t Alright: Vulnerabilities in Edulog Portal Revealed K-12 Student Location Data (tenable)
Press and pressure: Ransomware gangs and the media (Sophos)
BazarCall Attack Leverages Google Forms to Increase Perceived Credibility (Abnormal)
Two Competing, Russian-Speaking Cybercrime Groups Attack Employees from 23 Companies in the Manufacturing, Software, Legal, Retail, and Healthcare Sectors Using Malicious Google Ads (esentire)
Spider-Man 2 developer Insomniac Games hit by Rhysida ransomware attack  (cyberdaily)
Microsoft Patch Tuesday December 2023 (Sans)
Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 13 Dec 2023 21:10:00 -0000</pubDate>
      <itunes:title>The United Kingdom's catastrophic ransomware attack. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1966</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The UK faces a looming threat of a catastrophic ransomware attack. The Senate confirms a new National Cyber Director. The rivalry between malware groups BatLoader and FakeBat. BazarCall phishing attack and its unusual use of Google Forms. A serious vulnerability threatens K-12 student data. Spiderman game developer Insomniac Games becomes the latest ransomware victim. Today’s guest is Tim Starks from the Washington Post’s Cybersecurity 202 with China’s influence operations in Taiwan, along with a look back at 2023. We'll touch on Microsoft's Patch Tuesday and why outdated password policies are still a problem.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Today’s guest is Tim Starks from the Washington Post’s Cybersecurity 202. Tim and Dave discuss China’s influence operations in Taiwan, along with a look back at 2023. 

Selected Reading
UK at high risk of ‘catastrophic ransomware attack’, report says (The Guardian)
Roll Call Vote 118th Congress - 1st Session  (United States Senate)
How Does Access Impact Risk? (IST)
API and App Security: Q3 2023 Snapshot (ThreatX)
The Kids Aren’t Alright: Vulnerabilities in Edulog Portal Revealed K-12 Student Location Data (tenable)
Press and pressure: Ransomware gangs and the media (Sophos)
BazarCall Attack Leverages Google Forms to Increase Perceived Credibility (Abnormal)
Two Competing, Russian-Speaking Cybercrime Groups Attack Employees from 23 Companies in the Manufacturing, Software, Legal, Retail, and Healthcare Sectors Using Malicious Google Ads (esentire)
Spider-Man 2 developer Insomniac Games hit by Rhysida ransomware attack  (cyberdaily)
Microsoft Patch Tuesday December 2023 (Sans)
Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The UK faces a looming threat of a catastrophic ransomware attack. The Senate confirms a new National Cyber Director. The rivalry between malware groups BatLoader and FakeBat. BazarCall phishing attack and its unusual use of Google Forms. A serious vulnerability threatens K-12 student data. Spiderman game developer Insomniac Games becomes the latest ransomware victim. Today’s guest is Tim Starks from the Washington Post’s Cybersecurity 202 with China’s influence operations in Taiwan, along with a look back at 2023. We'll touch on Microsoft's Patch Tuesday and why outdated password policies are still a problem.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Today’s guest is Tim Starks from the Washington Post’s Cybersecurity 202. Tim and Dave discuss China’s influence operations in Taiwan, along with a look back at 2023. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.theguardian.com/technology/2023/dec/13/uk-at-high-risk-of-catastrophic-ransomware-attack-report-says">UK at high risk of ‘catastrophic ransomware attack’, report says</a> (The Guardian)</p><p><a href="https://www.senate.gov/legislative/LIS/roll_call_votes/vote1181/vote_118_1_00338.htm">Roll Call Vote 118th Congress - 1st Session </a> (United States Senate)</p><p><a href="https://securityandtechnology.org/ai-foundation-model-access-initiative/how-does-access-impact-risk/">How Does Access Impact Risk?</a> (IST)</p><p><a href="https://www.threatx.com/blog/api-and-app-security-q3-2023-snapshot/">API and App Security: Q3 2023 Snapshot</a> (ThreatX)</p><p><a href="https://www.tenable.com/blog/the-kids-arent-alright-vulnerabilities-in-edulog-portal-revealed-k-12-student-location-data">The Kids Aren’t Alright: Vulnerabilities in Edulog Portal Revealed K-12 Student Location Data</a> (tenable)</p><p><a href="https://news.sophos.com/en-us/2023/12/13/press-and-pressure-ransomware-gangs-and-the-media/">Press and pressure: Ransomware gangs and the media</a> (Sophos)</p><p><a href="https://abnormalsecurity.com/blog/bazarcall-attack-leverages-google-forms">BazarCall Attack Leverages Google Forms to Increase Perceived Credibility</a> (Abnormal)</p><p><a href="https://www.esentire.com/resources/library/two-competing-russian-speaking-cybercrime-groups-attack">Two Competing, Russian-Speaking Cybercrime Groups Attack Employees from 23 Companies in the Manufacturing, Software, Legal, Retail, and Healthcare Sectors Using Malicious Google Ads</a> (esentire)</p><p><a href="https://www.cyberdaily.au/culture/9931-spider-man-2-developer-insomniac-games-hit-by-rhysida-ransomware-attack">Spider-Man 2 developer Insomniac Games hit by Rhysida ransomware attack </a> (cyberdaily)</p><p><a href="https://isc.sans.edu/forums/diary/Microsoft+Patch+Tuesday+December+2023/30480/">Microsoft Patch Tuesday December 2023</a> (Sans)</p><p><strong>Share your feedback.</strong></p><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1497</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16bf1c36-2b53-11ee-9c79-b3b7c0a38178]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5951569830.mp3?updated=1702498384" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An internet blackout.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1965/notes</link>
      <description>A cyberattack on Ukraine's largest telecom operator. Ukraine's GUR claims a hit on Russia's tax service, while the fate of the ALPHV/BlackCat group remains shrouded in mystery. The Air Force disciplines members over a classified documents breach, and Apple releases urgent security updates. From Spain, a significant arrest in the Kelvin Security hacking group. On today’s Industry Voices segment, my conversation with Andre Durand,  CEO and Founder of Ping Identity, on digital experiences, brand trust and loyalty, behaviors and attitudes towards security, authentication and fraud. Plus, a cautionary tale about burning bridges.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On today’s Industry Voices segment, we speak with Andre Durand, the CEO and Founder of Ping Identity. Andre discusses the state of digital experiences. Ping recently commissioned a study to better understand the changing sentiments around digital experiences, brand trust and loyalty, behaviors and attitudes towards security, authentication and fraud, as well as digital wallets and the use of decentralized identity.

Selected Reading
Ukraine’s Mobile Operator Kyivstar Facing ‘Powerful’ Cyberattack (Bloomberg)
Ukraine's top mobile operator hit by biggest cyber attack of war so far (Reuters)
GUR says it has hacked servers of Russian tax service (Interfax-Ukraine)
ALPHV/BlackCat Site Downed After Suspected Police Action (Infosecurity Magazine)
BlackCat ransomware site down amidst rumours of law enforcement action (Computing)
No confirmation on rumored ALPHV/BlackCat site takedown by law enforcement (SC Media)
Cloudflare 2023 Year in Review (Cloudflare)
Bitsight and Google collaborate to reveal global cybersecurity performance (Bitsight)
15 Air National Guardsmen disciplined in Discord server leak (C4ISRNET)
Apple emergency updates fix recent zero-days on older iPhones (Bleeping Computer)
Kelvin Security hacking group leader arrested in Spain (Bleeping Computer)
Cloud engineer gets 2 years for wiping ex-employer’s code repos (Bleeping Computer)
Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Dec 2023 21:10:00 -0000</pubDate>
      <itunes:title>An internet blackout.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1965</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A cyberattack on Ukraine's largest telecom operator. Ukraine's GUR claims a hit on Russia's tax service, while the fate of the ALPHV/BlackCat group remains shrouded in mystery. The Air Force disciplines members over a classified documents breach, and Apple releases urgent security updates. From Spain, a significant arrest in the Kelvin Security hacking group. On today’s Industry Voices segment, my conversation with Andre Durand,  CEO and Founder of Ping Identity, on digital experiences, brand trust and loyalty, behaviors and attitudes towards security, authentication and fraud. Plus, a cautionary tale about burning bridges.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On today’s Industry Voices segment, we speak with Andre Durand, the CEO and Founder of Ping Identity. Andre discusses the state of digital experiences. Ping recently commissioned a study to better understand the changing sentiments around digital experiences, brand trust and loyalty, behaviors and attitudes towards security, authentication and fraud, as well as digital wallets and the use of decentralized identity.

Selected Reading
Ukraine’s Mobile Operator Kyivstar Facing ‘Powerful’ Cyberattack (Bloomberg)
Ukraine's top mobile operator hit by biggest cyber attack of war so far (Reuters)
GUR says it has hacked servers of Russian tax service (Interfax-Ukraine)
ALPHV/BlackCat Site Downed After Suspected Police Action (Infosecurity Magazine)
BlackCat ransomware site down amidst rumours of law enforcement action (Computing)
No confirmation on rumored ALPHV/BlackCat site takedown by law enforcement (SC Media)
Cloudflare 2023 Year in Review (Cloudflare)
Bitsight and Google collaborate to reveal global cybersecurity performance (Bitsight)
15 Air National Guardsmen disciplined in Discord server leak (C4ISRNET)
Apple emergency updates fix recent zero-days on older iPhones (Bleeping Computer)
Kelvin Security hacking group leader arrested in Spain (Bleeping Computer)
Cloud engineer gets 2 years for wiping ex-employer’s code repos (Bleeping Computer)
Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cyberattack on Ukraine's largest telecom operator. Ukraine's GUR claims a hit on Russia's tax service, while the fate of the ALPHV/BlackCat group remains shrouded in mystery. The Air Force disciplines members over a classified documents breach, and Apple releases urgent security updates. From Spain, a significant arrest in the Kelvin Security hacking group. On today’s Industry Voices segment, my conversation with Andre Durand,  CEO and Founder of Ping Identity, on digital experiences, brand trust and loyalty, behaviors and attitudes towards security, authentication and fraud. Plus, a cautionary tale about burning bridges.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On today’s Industry Voices segment, we speak with <a href="https://www.linkedin.com/in/andredurand/">Andre Durand</a>, the CEO and Founder of <a href="https://www.pingidentity.com/en.html">Ping Identity</a>. Andre discusses the state of digital experiences. Ping recently commissioned a study to better understand the changing sentiments around digital experiences, brand trust and loyalty, behaviors and attitudes towards security, authentication and fraud, as well as digital wallets and the use of decentralized identity.</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bloomberg.com/news/articles/2023-12-12/ukraine-s-kyivstar-says-it-faces-powerful-cyberattack">Ukraine’s Mobile Operator Kyivstar Facing ‘Powerful’ Cyberattack</a> (Bloomberg)</p><p><a href="https://www.reuters.com/technology/cybersecurity/ukraines-biggest-mobile-operator-suffers-massive-hacker-attack-statement-2023-12-12/">Ukraine's top mobile operator hit by biggest cyber attack of war so far</a> (Reuters)</p><p><a href="https://en.interfax.com.ua/news/general/953643.html">GUR says it has hacked servers of Russian tax service</a> (Interfax-Ukraine)</p><p><a href="https://www.infosecurity-magazine.com/news/alphvblackcat-site-downed-police/">ALPHV/BlackCat Site Downed After Suspected Police Action</a> (Infosecurity Magazine)</p><p><a href="https://www.computing.co.uk/news/4155785/blackcat-ransomware-site-amidst-rumours-law-enforcement-action">BlackCat ransomware site down amidst rumours of law enforcement action</a> (Computing)</p><p><a href="https://www.scmagazine.com/news/no-confirmation-on-rumored-alphvblackcat-site-takedown">No confirmation on rumored ALPHV/BlackCat site takedown by law enforcement</a> (SC Media)</p><p><a href="https://blog.cloudflare.com/radar-2023-year-in-review/">Cloudflare 2023 Year in Review</a> (Cloudflare)</p><p><a href="https://www.bitsight.com/blog/bitsight-and-google-collaborate-reveal-global-cybersecurity-performance">Bitsight and Google collaborate to reveal global cybersecurity performance</a> (Bitsight)</p><p><a href="https://www.c4isrnet.com/news/your-military/2023/12/11/15-air-national-guardsmen-disciplined-in-discord-server-leak/?mid=1#cid=1447856">15 Air National Guardsmen disciplined in Discord server leak</a> (C4ISRNET)</p><p><a href="https://www.bleepingcomputer.com/news/apple/apple-emergency-updates-fix-recent-zero-days-on-older-iphones/">Apple emergency updates fix recent zero-days on older iPhones</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/kelvin-security-hacking-group-leader-arrested-in-spain/">Kelvin Security hacking group leader arrested in Spain</a> (Bleeping Computer)</p><p><a href="https://www.bleepingcomputer.com/news/security/cloud-engineer-gets-2-years-for-wiping-ex-employers-code-repos/">Cloud engineer gets 2 years for wiping ex-employer’s code repos</a> (Bleeping Computer)</p><p><strong>Share your feedback.</strong></p><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1562</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16cf2022-2b53-11ee-9c79-f32a0f21b6e1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4633388679.mp3?updated=1702411951" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>China sets sights on US critical infrastructure.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1964/notes</link>
      <description>China allegedly targets US critical infrastructure, while a small Irish village goes without water due to an Iranian CyberAv3ngers attack. The EU sets a global precedent with new AI regulations. Unraveling the latest maneuvers of the Lazarus Group. The Sandman APT's links to Chinese cyber threats. "5Ghoul" vulnerabilities represent  a new challenge in telecom security. The deceptive dangers of the MrAnon infostealer in a booking app. The GRU's phishing tactics lead to the spread of Headlace malware. On today’s Solution Spotlight segment, Kristie Grinnell from DXC Technology talks with N2K’s President Simone Petrella about DXC’s “All in on Cyber” program. And 23andMe's controversial update to its terms and conditions.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On today’s Solution Spotlight segment, Kristie Grinnell from DXC Technology talks with N2K’s President Simone Petrella about DXC’s “All in on Cyber” program. Kristie is DXC’s Senior Vice President and Chief Information Officer. 

Selected Reading
China’s cyber army is invading critical US services (Washington Post) 
Hackers hit Erris water in stance over Israel (Western People)
FBI: Cyberattack against Aliquippa water authority was a targeted 'escalation' on overlooked technology (Post Gazette)
White House aide says Iranian hack of US waterworks is call to action (C4ISRNet)
EU reaches deal on landmark AI bill, racing ahead of US (Washington Post) 
Operation Blacksmith: Lazarus targets organizations worldwide using novel Telegram-based malware written in DLang (Cisco Talos)
Sandman APT | China-Based Adversaries Embrace Lua (SentinelOne)
5Ghoul  : Unleashing Chaos on 5G Edge Devices (Singapore University of Technology and Design)
MrAnon Stealer Spreads via Email with Fake Hotel Booking PDF (Fortinet) 
ITG05 operations leverage Israel-Hamas conflict lures to deliver Headlace malware (Security Intelligence)
23andMe changes terms of service amid legal fallout from data breach (Axios)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 11 Dec 2023 21:10:00 -0000</pubDate>
      <itunes:title>China sets sights on US critical infrastructure.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1964</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>China allegedly targets US critical infrastructure, while a small Irish village goes without water due to an Iranian CyberAv3ngers attack. The EU sets a global precedent with new AI regulations. Unraveling the latest maneuvers of the Lazarus Group. The Sandman APT's links to Chinese cyber threats. "5Ghoul" vulnerabilities represent  a new challenge in telecom security. The deceptive dangers of the MrAnon infostealer in a booking app. The GRU's phishing tactics lead to the spread of Headlace malware. On today’s Solution Spotlight segment, Kristie Grinnell from DXC Technology talks with N2K’s President Simone Petrella about DXC’s “All in on Cyber” program. And 23andMe's controversial update to its terms and conditions.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On today’s Solution Spotlight segment, Kristie Grinnell from DXC Technology talks with N2K’s President Simone Petrella about DXC’s “All in on Cyber” program. Kristie is DXC’s Senior Vice President and Chief Information Officer. 

Selected Reading
China’s cyber army is invading critical US services (Washington Post) 
Hackers hit Erris water in stance over Israel (Western People)
FBI: Cyberattack against Aliquippa water authority was a targeted 'escalation' on overlooked technology (Post Gazette)
White House aide says Iranian hack of US waterworks is call to action (C4ISRNet)
EU reaches deal on landmark AI bill, racing ahead of US (Washington Post) 
Operation Blacksmith: Lazarus targets organizations worldwide using novel Telegram-based malware written in DLang (Cisco Talos)
Sandman APT | China-Based Adversaries Embrace Lua (SentinelOne)
5Ghoul  : Unleashing Chaos on 5G Edge Devices (Singapore University of Technology and Design)
MrAnon Stealer Spreads via Email with Fake Hotel Booking PDF (Fortinet) 
ITG05 operations leverage Israel-Hamas conflict lures to deliver Headlace malware (Security Intelligence)
23andMe changes terms of service amid legal fallout from data breach (Axios)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>China allegedly targets US critical infrastructure, while a small Irish village goes without water due to an Iranian CyberAv3ngers attack. The EU sets a global precedent with new AI regulations. Unraveling the latest maneuvers of the Lazarus Group. The Sandman APT's links to Chinese cyber threats. "5Ghoul" vulnerabilities represent  a new challenge in telecom security. The deceptive dangers of the MrAnon infostealer in a booking app. The GRU's phishing tactics lead to the spread of Headlace malware. On today’s Solution Spotlight segment, Kristie Grinnell from DXC Technology talks with N2K’s President Simone Petrella about DXC’s “All in on Cyber” program. And 23andMe's controversial update to its terms and conditions.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><h2><br></h2><h2>CyberWire Guest</h2><p>On today’s Solution Spotlight segment, <a href="https://www.linkedin.com/in/kristiegrinnell/">Kristie Grinnell</a> from <a href="https://dxc.com/us/en">DXC Technology</a> talks with N2K’s President <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a> about DXC’s “<a href="https://dxc.com/us/en/insights/perspectives/report/dxc-security-threat-intelligence-report/2023/october/the-importance-of-being-all-in-on-cyber#:~:text=At%20DXC%20Technology%2C%20we%20chose,a%20shared%20responsibility%20for%20cybersecurity.">All in on Cyber</a>” program. Kristie is DXC’s Senior Vice President and Chief Information Officer. </p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.washingtonpost.com/technology/2023/12/11/china-hacking-hawaii-pacific-taiwan-conflict/">China’s cyber army is invading critical US services</a> (Washington Post) </p><p><a href="https://westernpeople.ie/news/hackers-hit-erris-water-in-stance-over-israel_arid-4982.html">Hackers hit Erris water in stance over Israel</a> (Western People)</p><p><a href="https://www.post-gazette.com/business/tech-news/2023/12/10/fbi-cyber-attack-infrastructure-technology-aliquippa/stories/202312110010">FBI: Cyberattack against Aliquippa water authority was a targeted 'escalation' on overlooked technology</a> (Post Gazette)</p><p><a href="https://www.c4isrnet.com/federal-oversight/doj-fbi/2023/12/10/white-house-aide-says-iranian-hack-of-us-waterworks-is-call-to-action/">White House aide says Iranian hack of US waterworks is call to action</a> (C4ISRNet)</p><p><a href="https://www.washingtonpost.com/technology/2023/12/08/ai-act-regulation-eu/">EU reaches deal on landmark AI bill, racing ahead of US</a> (Washington Post) </p><p><a href="https://blog.talosintelligence.com/lazarus_new_rats_dlang_and_telegram/">Operation Blacksmith: Lazarus targets organizations worldwide using novel Telegram-based malware written in DLang</a> (Cisco Talos)</p><p><a href="https://www.sentinelone.com/labs/sandman-apt-china-based-adversaries-embrace-lua/">Sandman APT | China-Based Adversaries Embrace Lua</a> (SentinelOne)</p><p><a href="https://asset-group.github.io/disclosures/5ghoul/">5Ghoul  : Unleashing Chaos on 5G Edge Devices</a> (Singapore University of Technology and Design)</p><p><a href="https://www.fortinet.com/blog/threat-research/mranon-stealer-spreads-via-email-with-fake-hotel-booking-pdf">MrAnon Stealer Spreads via Email with Fake Hotel Booking PDF</a> (Fortinet) </p><p><a href="https://securityintelligence.com/x-force/itg05-ops-leverage-Israel-Hamas-conflict-lures-to-deliver-headlace-malware/">ITG05 operations leverage Israel-Hamas conflict lures to deliver Headlace malware</a> (Security Intelligence)</p><p><a href="https://www.axios.com/2023/12/07/23andme-terms-of-service-update-data-breach">23andMe changes terms of service amid legal fallout from data breach</a> (Axios)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><h2><br></h2><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1814</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16fe9cda-2b53-11ee-9c79-1b41e6fa0b96]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8896343594.mp3?updated=1702325037" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Tracy Maleeff: Ask more people to dance. [Analyst] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/1/notes</link>
      <description>Cyber analyst, Tracy Maleeff, shares her unexpected journey from the library to cybersecurity and offers advice for those both seeking to make a change and those doing the hiring. It's not just about the invitation, it's more than that. Our thanks to Tracy for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 10 Dec 2023 08:00:00 -0000</pubDate>
      <itunes:title>Encore: Tracy Maleeff: Ask more people to dance. [Analyst] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cyber analyst, Tracy Maleeff, shares her unexpected journey from the library to cybersecurity and offers advice for those both seeking to make a change and those doing the hiring. It's not just about the invitation, it's more than that. Our thanks to Tracy for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber analyst, Tracy Maleeff, shares her unexpected journey from the library to cybersecurity and offers advice for those both seeking to make a change and those doing the hiring. It's not just about the invitation, it's more than that. Our thanks to Tracy for sharing her story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>244</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[518d291a-9535-11ee-b4ae-d3724621d0c0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5926405879.mp3?updated=1701976940" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AWS in Orbit: Monitoring critical road infrastructure at scale with Alteia and the World Bank. [T-Minus AWS in Orbit]</title>
      <link>https://space.n2k.com/podcasts/t-minus/aws-in-orbit-3</link>
      <description>You can learn more about AWS in Orbit at space.n2k.com/aws.
Baptiste Tripard is the Chief Marketing Officer at Alteia. Aiga Stokenberga is the Senior Transport Economist at the World Bank.
We explore how Alteia and the World Bank are leveraging AWS's cloud, AI, and space capabilities to monitor critical road networks at scale to support large scale infrastructure investments. From road networks to bridges, they share real-world applications that are making a difference in emerging economies.
AWS in Orbit is a podcast collaboration between N2K and AWS to offer listeners an in-depth look at the transformative intersection of cloud computing, space technologies, and generative AI. You can learn more about AWS in Orbit at space.n2k.com/aws.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.
Selected Reading
AWS Aerospace and Satellite
AWS re:Invent
Alteia and the World Bank assess and enhance road infrastructure data quality at scale using AWS
Audience Survey
We want to hear from you! Please complete our short survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.
Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Dec 2023 18:52:00 -0000</pubDate>
      <itunes:title>AWS in Orbit: Monitoring critical road infrastructure at scale with Alteia and the World Bank. [T-Minus AWS in Orbit]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/dacd116a-ead8-11ee-b104-a327d8da3ce5/image/4bd2f40b9acb61e27a84db61dae7caa8.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Alteia and the World Bank are leveraging AWS's cloud, AI, and space capabilities to monitor critical road networks to support infrastructure investments.</itunes:subtitle>
      <itunes:summary>You can learn more about AWS in Orbit at space.n2k.com/aws.
Baptiste Tripard is the Chief Marketing Officer at Alteia. Aiga Stokenberga is the Senior Transport Economist at the World Bank.
We explore how Alteia and the World Bank are leveraging AWS's cloud, AI, and space capabilities to monitor critical road networks at scale to support large scale infrastructure investments. From road networks to bridges, they share real-world applications that are making a difference in emerging economies.
AWS in Orbit is a podcast collaboration between N2K and AWS to offer listeners an in-depth look at the transformative intersection of cloud computing, space technologies, and generative AI. You can learn more about AWS in Orbit at space.n2k.com/aws.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.
Selected Reading
AWS Aerospace and Satellite
AWS re:Invent
Alteia and the World Bank assess and enhance road infrastructure data quality at scale using AWS
Audience Survey
We want to hear from you! Please complete our short survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.
Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>You can learn more about AWS in Orbit at <a href="https://space.n2k.com/aws">space.n2k.com/aws</a>.</p><p><a href="https://www.linkedin.com/in/baptiste-tripard-18825948/">Baptiste Tripard</a> is the Chief Marketing Officer at Alteia. <a href="https://www.linkedin.com/in/aiga-stokenberga-7143543b/">Aiga Stokenberga</a> is the Senior Transport Economist at the World Bank.</p><p>We explore how Alteia and the World Bank are leveraging AWS's cloud, AI, and space capabilities to monitor critical road networks at scale to support large scale infrastructure investments. From road networks to bridges, they share real-world applications that are making a difference in emerging economies.</p><p>AWS in Orbit is a podcast collaboration between N2K and AWS to offer listeners an in-depth look at the transformative intersection of cloud computing, space technologies, and generative AI. You can learn more about AWS in Orbit at <a href="https://space.n2k.com/aws">space.n2k.com/aws</a>.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our weekly intelligence roundup, <a href="https://space.n2k.com/newsletters/signals-and-space"><em>Signals and Space</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow T-Minus on <a href="https://www.linkedin.com/company/n2k-space/">LinkedIn</a> and <a href="https://www.instagram.com/n2kspace/">Instagram</a>.</p><h2>Selected Reading</h2><p><a href="https://aws.amazon.com/aerospace-and-satellite/?trk=c9d66aa7-01dc-4cbe-93b1-2c987a64a1d9&amp;sc_channel=el">AWS Aerospace and Satellite</a></p><p><a href="https://reinvent.awsevents.com/">AWS re:Invent</a></p><p><a href="https://aws.amazon.com/blogs/publicsector/alteia-and-the-world-bank-assess-and-enhance-road-infrastructure-at-scale-using-aws/">Alteia and the World Bank assess and enhance road infrastructure data quality at scale using AWS</a></p><h2>Audience Survey</h2><p>We want to hear from you! Please complete our <a href="https://www.surveymonkey.com/r/BL5NFPW">short survey</a>. It’ll help us get better and deliver you the most mission-critical space intel every day.</p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/ung56qbvknfbj9z2">media kit</a>. Contact us at <a href="mailto:space@n2k.com">space@n2k.com</a> to request more info.</p><h2>Want to join us for an interview?</h2><p>Please send your pitch to <a href="mailto:space-editor@n2k.com">space-editor@n2k.com</a> and include your name, affiliation, and topic proposal.</p><p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2326</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dacd116a-ead8-11ee-b104-a327d8da3ce5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3401238491.mp3?updated=1712266795" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>On the hunt for popping up kernel drives. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/309/notes</link>
      <description>Dana Behling, researcher from Carbon Black, sharing their work on "Hunting Vulnerable Kernel Drivers." The Carbon Black Threat Analysis Unit (TAU) discovered 34 unique vulnerable drivers, six of which allow kernel memory access, accepting firmware access.
TAU reported the issues to the vendors whose drivers had valid signatures at the time of discovery, but only two vendors fixed the vulnerabilities. TAU is calling for more comprehensive approaches in the future than the current banned-list method used by Microsoft. The research states "By exploiting the vulnerable drivers, an attacker without the system privilege may erase/alter firmware, and/or elevate privileges."
The research can be found here:
Hunting Vulnerable Kernel Drivers

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Dec 2023 08:10:00 -0000</pubDate>
      <itunes:title>On the hunt for popping up kernel drives. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>309</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dana Behling, researcher from Carbon Black, sharing their work on "Hunting Vulnerable Kernel Drivers." The Carbon Black Threat Analysis Unit (TAU) discovered 34 unique vulnerable drivers, six of which allow kernel memory access, accepting firmware access.
TAU reported the issues to the vendors whose drivers had valid signatures at the time of discovery, but only two vendors fixed the vulnerabilities. TAU is calling for more comprehensive approaches in the future than the current banned-list method used by Microsoft. The research states "By exploiting the vulnerable drivers, an attacker without the system privilege may erase/alter firmware, and/or elevate privileges."
The research can be found here:
Hunting Vulnerable Kernel Drivers

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dana Behling, researcher from Carbon Black, sharing their work on "Hunting Vulnerable Kernel Drivers." The Carbon Black Threat Analysis Unit (TAU) discovered 34 unique vulnerable drivers, six of which allow kernel memory access, accepting firmware access.</p><p>TAU reported the issues to the vendors whose drivers had valid signatures at the time of discovery, but only two vendors fixed the vulnerabilities. TAU is calling for more comprehensive approaches in the future than the current banned-list method used by Microsoft. The research states "By exploiting the vulnerable drivers, an attacker without the system privilege may erase/alter firmware, and/or elevate privileges."</p><p>The research can be found here:</p><ul><li><a href="https://blogs.vmware.com/security/2023/10/hunting-vulnerable-kernel-drivers.html">Hunting Vulnerable Kernel Drivers</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>902</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[68d1222a-9535-11ee-942b-37b9549a32bc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8651220355.mp3?updated=1701961545" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russia here, Russia there, Russia everywhere. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1963/notes</link>
      <description>Legal action against Star Blizzard's FSB operators. A critical Bluetooth vulnerability has been discovered. How the GRU faked celebrity videos in its Doppelgänger campaign. The persistence of Log4j vulnerabilities. Lack of encryption as a contributor to data loss. Supply chain breaches plague the energy sector. Our guest is Allan Liska, creator of a new comic book featuring the adventures of Johnny Dollar, a hard-nosed cyber insurance investigator. And Russian activists make clever use of QR codes.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Allan Liska, creator of Green Archer Comics, shares the first installment in a new comic book series: "Yours Truly, Johnny Dollar #1." The series follows the adventures of Johnny Dollar, a hard-nosed cyber insurance investigator, as he takes on ransomware attacks, insider threats and more. The series is based on a popular radio serial of the same name that ran from 1949 through 1962, now reimagined for the digital age.

Selected Reading
Russian FSB Cyber Actor Star Blizzard Continues Worldwide Spear-phishing Campaigns (CISA)
The cyberattacks also allegedly took aim at U.S. energy networks and American spies. (Wall Street Journal)
Russian Star Blizzard hackers linked to efforts to hamper war crimes investigation (The Guardian)
U.S. Takes Action to Further Disrupt Russian Cyber Activities (US Department of State)
Rewards for Justice (Rewards for Justice)
Two Russian Nationals Working with Russia’s Federal Security Service Charged with Global Computer Intrusion Campaign (US Department of Justice)
United States and the United Kingdom Sanction Members of Russian State Intelligence-Sponsored Advanced Persistent Threat Group (US Department of Treasury)
Critical Bluetooth Flaw Exposes Android, Apple &amp; Linux Devices to Takeover (DarkReading)
Obfuscation and AI Content in the Russian Influence Network “Doppelgänger” Signals Evolving Tactics (Recorded Future)
Russian influence and cyber operations adapt for long haul and exploit war fatigue (Microsoft)
State of Log4j Vulnerabilities: How Much Did Log4Shell Change? (Veracode)
ESG Report Operationalizing Encryption and Key Management (Fortanix)
Russian opposition activists use QR codes to spread anti-Putin messages (The Record)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our 5 question survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 08 Dec 2023 21:20:00 -0000</pubDate>
      <itunes:title>Russia here, Russia there, Russia everywhere. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1963</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Legal action against Star Blizzard's FSB operators. A critical Bluetooth vulnerability has been discovered. How the GRU faked celebrity videos in its Doppelgänger campaign. The persistence of Log4j vulnerabilities. Lack of encryption as a contributor to data loss. Supply chain breaches plague the energy sector. Our guest is Allan Liska, creator of a new comic book featuring the adventures of Johnny Dollar, a hard-nosed cyber insurance investigator. And Russian activists make clever use of QR codes.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Guest Allan Liska, creator of Green Archer Comics, shares the first installment in a new comic book series: "Yours Truly, Johnny Dollar #1." The series follows the adventures of Johnny Dollar, a hard-nosed cyber insurance investigator, as he takes on ransomware attacks, insider threats and more. The series is based on a popular radio serial of the same name that ran from 1949 through 1962, now reimagined for the digital age.

Selected Reading
Russian FSB Cyber Actor Star Blizzard Continues Worldwide Spear-phishing Campaigns (CISA)
The cyberattacks also allegedly took aim at U.S. energy networks and American spies. (Wall Street Journal)
Russian Star Blizzard hackers linked to efforts to hamper war crimes investigation (The Guardian)
U.S. Takes Action to Further Disrupt Russian Cyber Activities (US Department of State)
Rewards for Justice (Rewards for Justice)
Two Russian Nationals Working with Russia’s Federal Security Service Charged with Global Computer Intrusion Campaign (US Department of Justice)
United States and the United Kingdom Sanction Members of Russian State Intelligence-Sponsored Advanced Persistent Threat Group (US Department of Treasury)
Critical Bluetooth Flaw Exposes Android, Apple &amp; Linux Devices to Takeover (DarkReading)
Obfuscation and AI Content in the Russian Influence Network “Doppelgänger” Signals Evolving Tactics (Recorded Future)
Russian influence and cyber operations adapt for long haul and exploit war fatigue (Microsoft)
State of Log4j Vulnerabilities: How Much Did Log4Shell Change? (Veracode)
ESG Report Operationalizing Encryption and Key Management (Fortanix)
Russian opposition activists use QR codes to spread anti-Putin messages (The Record)

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our 5 question survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Legal action against Star Blizzard's FSB operators. A critical Bluetooth vulnerability has been discovered. How the GRU faked celebrity videos in its Doppelgänger campaign. The persistence of Log4j vulnerabilities. Lack of encryption as a contributor to data loss. Supply chain breaches plague the energy sector. Our guest is Allan Liska, creator of a new comic book featuring the adventures of Johnny Dollar, a hard-nosed cyber insurance investigator. And Russian activists make clever use of QR codes.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing">Daily Briefing</a>, and you’ll never miss a beat. And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><h2><br></h2><h2>CyberWire Guest</h2><p>Guest <a href="https://www.linkedin.com/in/allan2/">Allan Liska</a>, creator of <a href="https://www.greenarcher.io/">Green Archer Comics</a>, shares the first installment in a new comic book series: "Yours Truly, Johnny Dollar #1." The series follows the adventures of Johnny Dollar, a hard-nosed cyber insurance investigator, as he takes on ransomware attacks, insider threats and more. The series is based on a popular radio serial of the same name that ran from 1949 through 1962, now reimagined for the digital age.</p><h2><br></h2><h2>Selected Reading</h2><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-341a">Russian FSB Cyber Actor Star Blizzard Continues Worldwide Spear-phishing Campaigns</a> (CISA)</p><p><a href="https://www.wsj.com/world/u-s-and-u-k-accuse-russia-of-global-hacking-spree-targeting-british-elections-17761803">The cyberattacks also allegedly took aim at U.S. energy networks and American spies.</a> (Wall Street Journal)</p><p><a href="https://www.theguardian.com/world/2023/dec/07/russian-star-blizzard-hackers-linked-to-efforts-to-hamper-war-crimes-investigation">Russian Star Blizzard hackers linked to efforts to hamper war crimes investigation</a> (The Guardian)</p><p><a href="https://www.state.gov/u-s-takes-action-to-further-disrupt-russian-cyber-activities/">U.S. Takes Action to Further Disrupt Russian Cyber Activities</a> (US Department of State)</p><p><a href="https://rewardsforjustice.net/">Rewards for Justice</a> (Rewards for Justice)</p><p><a href="https://www.justice.gov/opa/pr/two-russian-nationals-working-russias-federal-security-service-charged-global-computer?_gl=1*1amjgaa*_gcl_au*MTcyMzkwMTI4OS4xNzAxOTczMDA1">Two Russian Nationals Working with Russia’s Federal Security Service Charged with Global Computer Intrusion Campaign</a> (US Department of Justice)</p><p><a href="https://home.treasury.gov/news/press-releases/jy1962">United States and the United Kingdom Sanction Members of Russian State Intelligence-Sponsored Advanced Persistent Threat Group</a> (US Department of Treasury)</p><p><a href="https://www.darkreading.com/vulnerabilities-threats/critical-bluetooth-flaw-exposes-android-apple-and-linux-devices-to-keystroke-injection-attack">Critical Bluetooth Flaw Exposes Android, Apple &amp; Linux Devices to Takeover</a> (DarkReading)</p><p><a href="https://www.recordedfuture.com/russian-influence-network-doppelgangers-ai-content-tactics">Obfuscation and AI Content in the Russian Influence Network “Doppelgänger” Signals Evolving Tactics</a> (Recorded Future)</p><p><a href="https://blogs.microsoft.com/on-the-issues/2023/12/07/russia-ukraine-digital-threat-celebrity-cameo-mtac/">Russian influence and cyber operations adapt for long haul and exploit war fatigue</a> (Microsoft)</p><p><a href="https://www.veracode.com/blog/research/state-log4j-vulnerabilities-how-much-did-log4shell-change">State of Log4j Vulnerabilities: How Much Did Log4Shell Change?</a> (Veracode)</p><p><a href="https://resources.fortanix.com/esg-report-operationalizing-encryption-and-key-management">ESG Report Operationalizing Encryption and Key Management</a> (Fortanix)</p><p><a href="https://therecord.media/russia-opposition-qr-codes-billboards">Russian opposition activists use QR codes to spread anti-Putin messages</a> (The Record)</p><p><br></p><h2><strong>Share your feedback.</strong></h2><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">5 question survey</a> as we continually work to improve the show. </p><h2><br></h2><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1565</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16628138-2b53-11ee-9c79-cf1a11272ff6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1855015867.mp3?updated=1702325123" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New vulnerability packs a punch.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1962/notes</link>
      <description>Unpacking LogoFAIL's threat to Windows and Linux. The US DHS's new healthcare cybersecurity strategy, and dual Russian influence campaigns. A look at supply chain risks, increased bot activity in retail, Meta's end-to-end encryption in Messenger and Android's Autospill vulnerability. On today’s Industry Voices segment, we welcome Todd Thorsen, CISO from CrashPlan, with insights on data resiliency. And the discovery of an alleged software 'kill switch' in Polish trains.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On today’s Industry Voices segment, we welcome Todd Thorsen, CISO from CrashPlan. Todd discusses data resiliency.
 In an era where ransomware and malicious attacks are relentless, even the most secure organizations are not immune. These attacks can cripple organizations financially, operationally, and damage their reputation and compliance standing. My guest today is Todd Thorsen, CISO from CrashPlan. In this sponsored Industry Voices segment, we delve into crucial strategies for bolstering data resiliency.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/232

Selected Reading
Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack (Ars Technica) 
CISA, NSA, FBI and International Cybersecurity Authorities Publish Guide on The Case for Memory Safe Roadmaps (CISA) 
The Case for Memory Safe Roadmaps (Joint release)
HEALTHCARE  SECTOR CYBERSECURITY (US Department of Health and Human Services)
HHS releases cybersecurity strategy for health care sector (American Hospital Association)
Fake Taylor Swift Quotes Are Being Used to Spread Anti-Ukraine Propaganda (WIRED)
Obfuscation and AI Content in the Russian Influence Network “Doppelgänger” Signals Evolving Tactics (Recorded Future)
Britain summons Russian ambassador over years-long FSB cyberespionage campaign (Reuters)
NCSC exposes Russian cyber attacks on UK political processes (ComputerWeekly)
Russian FSB cyber actor Star Blizzard continues worldwide spear-phishing campaigns (NCSC)
Defending Democracy (NCSC)
The State of Supply Chain Defense: Annual Global Insights Report (BlueVoyant)
2023 Holiday Bad Bot Report (Kasada)
Facebook and Messenger to automatically encrypt messages (BBC)
Your mobile password manager might be exposing your credentials (TechCrunch)
Dieselgate, but for trains – some heavyweight hardware hacking (BadCyber)
Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 07 Dec 2023 21:20:00 -0000</pubDate>
      <itunes:title>New vulnerability packs a punch.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1962</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Unpacking LogoFAIL's threat to Windows and Linux. The US DHS's new healthcare cybersecurity strategy, and dual Russian influence campaigns. A look at supply chain risks, increased bot activity in retail, Meta's end-to-end encryption in Messenger and Android's Autospill vulnerability. On today’s Industry Voices segment, we welcome Todd Thorsen, CISO from CrashPlan, with insights on data resiliency. And the discovery of an alleged software 'kill switch' in Polish trains.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
On today’s Industry Voices segment, we welcome Todd Thorsen, CISO from CrashPlan. Todd discusses data resiliency.
 In an era where ransomware and malicious attacks are relentless, even the most secure organizations are not immune. These attacks can cripple organizations financially, operationally, and damage their reputation and compliance standing. My guest today is Todd Thorsen, CISO from CrashPlan. In this sponsored Industry Voices segment, we delve into crucial strategies for bolstering data resiliency.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/232

Selected Reading
Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack (Ars Technica) 
CISA, NSA, FBI and International Cybersecurity Authorities Publish Guide on The Case for Memory Safe Roadmaps (CISA) 
The Case for Memory Safe Roadmaps (Joint release)
HEALTHCARE  SECTOR CYBERSECURITY (US Department of Health and Human Services)
HHS releases cybersecurity strategy for health care sector (American Hospital Association)
Fake Taylor Swift Quotes Are Being Used to Spread Anti-Ukraine Propaganda (WIRED)
Obfuscation and AI Content in the Russian Influence Network “Doppelgänger” Signals Evolving Tactics (Recorded Future)
Britain summons Russian ambassador over years-long FSB cyberespionage campaign (Reuters)
NCSC exposes Russian cyber attacks on UK political processes (ComputerWeekly)
Russian FSB cyber actor Star Blizzard continues worldwide spear-phishing campaigns (NCSC)
Defending Democracy (NCSC)
The State of Supply Chain Defense: Annual Global Insights Report (BlueVoyant)
2023 Holiday Bad Bot Report (Kasada)
Facebook and Messenger to automatically encrypt messages (BBC)
Your mobile password manager might be exposing your credentials (TechCrunch)
Dieselgate, but for trains – some heavyweight hardware hacking (BadCyber)
Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Unpacking LogoFAIL's threat to Windows and Linux. The US DHS's new healthcare cybersecurity strategy, and dual Russian influence campaigns. A look at supply chain risks, increased bot activity in retail, Meta's end-to-end encryption in Messenger and Android's Autospill vulnerability. On today’s Industry Voices segment, we welcome Todd Thorsen, CISO from CrashPlan, with insights on data resiliency. And the discovery of an alleged software 'kill switch' in Polish trains.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>On today’s Industry Voices segment, we welcome <a href="https://www.linkedin.com/in/todd-thorsen-7015bb65/">Todd Thorsen</a>, CISO from <a href="https://www.crashplan.com/">CrashPlan</a>. Todd discusses data resiliency.</p><p> In an era where ransomware and malicious attacks are relentless, even the most secure organizations are not immune. These attacks can cripple organizations financially, operationally, and damage their reputation and compliance standing. My guest today is Todd Thorsen, CISO from CrashPlan. In this sponsored Industry Voices segment, we delve into crucial strategies for bolstering data resiliency.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/232</p><p><br></p><h2>Selected Reading</h2><p><a href="https://arstechnica.com/security/2023/12/just-about-every-windows-and-linux-device-vulnerable-to-new-logofail-firmware-attack/">Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack</a> (Ars Technica) </p><p><a href="https://content.govdelivery.com/accounts/USDHSCISA/bulletins/37e992b">CISA, NSA, FBI and International Cybersecurity Authorities Publish Guide on The Case for Memory Safe Roadmaps</a> (CISA) </p><p><a href="https://www.cisa.gov/sites/default/files/2023-12/The-Case-for-Memory-Safe-Roadmaps-508c.pdf">The Case for Memory Safe Roadmaps</a> (Joint release)</p><p><a href="https://aspr.hhs.gov/cyber/Documents/Health-Care-Sector-Cybersecurity-Dec2023-508.pdf">HEALTHCARE  SECTOR CYBERSECURITY</a> (US Department of Health and Human Services)</p><p><a href="https://www.aha.org/news/headline/2023-12-06-hhs-releases-cybersecurity-strategy-health-care-sector">HHS releases cybersecurity strategy for health care sector</a> (American Hospital Association)</p><p><a href="https://www.wired.com/story/russia-ukraine-taylor-swift-disinformation/">Fake Taylor Swift Quotes Are Being Used to Spread Anti-Ukraine Propaganda</a> (WIRED)</p><p><a href="https://www.recordedfuture.com/russian-influence-network-doppelgangers-ai-content-tactics">Obfuscation and AI Content in the Russian Influence Network “Doppelgänger” Signals Evolving Tactics</a> (Recorded Future)</p><p><a href="https://www.reuters.com/world/uk/britain-summons-russian-ambassador-over-fsb-cyberespionage-2023-12-07/">Britain summons Russian ambassador over years-long FSB cyberespionage campaign</a> (Reuters)</p><p><a href="https://www.computerweekly.com/news/366562435/NCSC-exposes-Russian-cyber-attacks-on-UK-political-processes">NCSC exposes Russian cyber attacks on UK political processes</a> (ComputerWeekly)</p><p><a href="https://www.ncsc.gov.uk/news/star-blizzard-continues-spear-phishing-campaigns">Russian FSB cyber actor Star Blizzard continues worldwide spear-phishing campaigns</a> (NCSC)</p><p><a href="https://www.ncsc.gov.uk/collection/defending-democracy">Defending Democracy</a> (NCSC)</p><p><a href="https://www.bluevoyant.com/resources/the-state-of-supply-chain-defense-2023">The State of Supply Chain Defense: Annual Global Insights Report</a> (BlueVoyant)</p><p><a href="https://www.bluevoyant.com/resources/the-state-of-supply-chain-defense-2023">2023 Holiday Bad Bot Report</a> (Kasada)</p><p><a href="https://www.bbc.com/news/technology-67646047">Facebook and Messenger to automatically encrypt messages</a> (BBC)</p><p><a href="https://techcrunch.com/2023/12/06/your-mobile-password-manager-might-be-exposing-your-credentials/">Your mobile password manager might be exposing your credentials</a> (TechCrunch)</p><p><a href="https://badcyber.com/dieselgate-but-for-trains-some-heavyweight-hardware-hacking/">Dieselgate, but for trains – some heavyweight hardware hacking</a> (BadCyber)</p><p><strong>Share your feedback.</strong></p><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1683</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16525a92-2b53-11ee-9c79-4bd3b28e195e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5730873322.mp3?updated=1702067901" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Push notifications pushing surveillance.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1961/notes</link>
      <description>Governments target push notification metadata. Dissecting the latest GRU cyber activities. A look at  Russia's AI-powered Doppelgänger influence campaigns, and how cyber warfare is evolving beyond the battlefield. We've got updates on the Adobe ColdFusion vulnerability, the expanding 23andMe data breach, and insights into the financial impacts of ransomware. Our guest is Camille Stewart Gloster, Deputy National Cyber Director for Technology &amp; Ecosystem Security from the Office of the National Cyber Director at the White House. Plus, discover how the TSA is embracing AI for future security. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Camille Stewart Gloster, Deputy National Cyber Director, Technology &amp; Ecosystem Security from the Office of the National Cyber Director at the White House. Camille shares her views on women in cybersecurity, their efforts in diversity, equity and inclusion and what she sees for the future.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/231

Selected Reading
Governments spying on Apple, Google users through push notifications - US senator (Reuters) 
Obfuscation and AI Content in the Russian Influence Network “Doppelgänger” Signals Evolving Tactics (Recorded Future)
Russian AI-generated propaganda struggles to find an audience (CyberScoop)
How cybersecurity teams should prepare for geopolitical crisis spillover (CSO)
Russia’s Fancy Bear launches mass credential collection campaigns (CSO)
The Dragos Community Defense Program Helps Secure Industrial Infrastructure for Small Utilities (Dragos)
Threat Actors Exploit Adobe ColdFusion CVE-2023-26360 for Initial Access to Government Servers (CISA)
CVE-2023-26360 Detail (NIST)
SEC on 23andMe breach (SEC) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 06 Dec 2023 21:10:00 -0000</pubDate>
      <itunes:title>Push notifications pushing surveillance.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1961</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Governments target push notification metadata. Dissecting the latest GRU cyber activities. A look at  Russia's AI-powered Doppelgänger influence campaigns, and how cyber warfare is evolving beyond the battlefield. We've got updates on the Adobe ColdFusion vulnerability, the expanding 23andMe data breach, and insights into the financial impacts of ransomware. Our guest is Camille Stewart Gloster, Deputy National Cyber Director for Technology &amp; Ecosystem Security from the Office of the National Cyber Director at the White House. Plus, discover how the TSA is embracing AI for future security. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.

CyberWire Guest
Our guest is Camille Stewart Gloster, Deputy National Cyber Director, Technology &amp; Ecosystem Security from the Office of the National Cyber Director at the White House. Camille shares her views on women in cybersecurity, their efforts in diversity, equity and inclusion and what she sees for the future.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/231

Selected Reading
Governments spying on Apple, Google users through push notifications - US senator (Reuters) 
Obfuscation and AI Content in the Russian Influence Network “Doppelgänger” Signals Evolving Tactics (Recorded Future)
Russian AI-generated propaganda struggles to find an audience (CyberScoop)
How cybersecurity teams should prepare for geopolitical crisis spillover (CSO)
Russia’s Fancy Bear launches mass credential collection campaigns (CSO)
The Dragos Community Defense Program Helps Secure Industrial Infrastructure for Small Utilities (Dragos)
Threat Actors Exploit Adobe ColdFusion CVE-2023-26360 for Initial Access to Government Servers (CISA)
CVE-2023-26360 Detail (NIST)
SEC on 23andMe breach (SEC) 

Share your feedback.
We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. 

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Governments target push notification metadata. Dissecting the latest GRU cyber activities. A look at  Russia's AI-powered Doppelgänger influence campaigns, and how cyber warfare is evolving beyond the battlefield. We've got updates on the Adobe ColdFusion vulnerability, the expanding 23andMe data breach, and insights into the financial impacts of ransomware. Our guest is Camille Stewart Gloster, Deputy National Cyber Director for Technology &amp; Ecosystem Security from the Office of the National Cyber Director at the White House. Plus, discover how the TSA is embracing AI for future security. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest is <a href="https://www.linkedin.com/in/camillestewartesq/">Camille Stewart Gloster</a>, Deputy National Cyber Director, Technology &amp; Ecosystem Security from the <a href="https://www.whitehouse.gov/oncd/#:~:text=The%20Office%20of%20the%20National,President%20at%20the%20White%20House.">Office of the National Cyber Director</a> at the White House. Camille shares her views on women in cybersecurity, their efforts in diversity, equity and inclusion and what she sees for the future.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/231</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.reuters.com/technology/cybersecurity/governments-spying-apple-google-users-through-push-notifications-us-senator-2023-12-06/">Governments spying on Apple, Google users through push notifications - US senator</a> (Reuters) </p><p><a href="https://www.recordedfuture.com/russian-influence-network-doppelgangers-ai-content-tactics">Obfuscation and AI Content in the Russian Influence Network “Doppelgänger” Signals Evolving Tactics</a> (Recorded Future)</p><p><a href="https://cyberscoop.com/russia-ai-propaganda-news/">Russian AI-generated propaganda struggles to find an audience</a> (CyberScoop)</p><p><a href="https://www.csoonline.com/article/1249324/how-cybersecurity-teams-should-prepare-for-geopolitical-crisis-spillover.html">How cybersecurity teams should prepare for geopolitical crisis spillover</a> (CSO)</p><p><a href="https://www.csoonline.com/article/1251293/russias-fancy-bear-launches-mass-credential-collection-campaigns-exploiting-outlook-and-winrar-flaws.html">Russia’s Fancy Bear launches mass credential collection campaigns</a> (CSO)</p><p><a href="https://www.dragos.com/blog/dragos-community-defense-program-helps-secure-industrial-infrastructure-for-small-utilities/">The Dragos Community Defense Program Helps Secure Industrial Infrastructure for Small Utilities </a>(Dragos)</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-339a">Threat Actors Exploit Adobe ColdFusion CVE-2023-26360 for Initial Access to Government Servers</a> (CISA)</p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-26360">CVE-2023-26360 Detail </a>(NIST)</p><p><a href="https://www.sec.gov/ix?doc=/Archives/edgar/data/1804591/000119312523287449/d242666d8ka.htm">SEC on 23andMe breach</a> (SEC) </p><p><br></p><p><strong>Share your feedback.</strong></p><p>We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our <a href="https://www.surveymonkey.com/r/cwdp-listener">brief listener survey</a> as we continually work to improve the show. </p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1534</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16427186-2b53-11ee-9c79-87a19154e5ba]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3121305102.mp3?updated=1701892896" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sleeper malware denied at Sellafield nuclear site.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1960/notes</link>
      <description>The UK Government's denial of a cyber incident at Sellafield. There’s been a surge in Iranian cyberattacks on US infrastructure. Misuse of Apple's lockdown mode, the mysterious AeroBlade's activities in aerospace, and a clever "Disney+" scam. Plus The latest application security trends, and a new cybersecurity futures study. In our Industry Voices segment, On today’s Industry Voices segment, we welcome Matt Radolec, Vice President of Incident Response and Cloud Operations at Varonis explaining the intersection of AI, cloud and insider threats. And insights on resilience from the UK's Deputy PM.

CyberWire Guest
On today’s Industry Voices segment, we welcome Matt Radolec. Matt is Vice President of Incident Response and Cloud Operations at Varonis. He talks about the  intersection of AI, cloud and insider threats.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/230

Selected Reading
Sellafield nuclear site hacked by groups linked to Russia and China (The Guardian)
Response to a news report on cyber security at Sellafield (GOV.UK)
Guardian news article (Office of Nuclear Regulation)
Ministers pressed by Labour over cyber-attack at Sellafield by foreign groups (The Guardian)
US warns Iranian terrorist crew broke into 'multiple' US water facilities (The Register)
Florida water agency latest to confirm cyber incident as feds warn of nation-state attacks (The Record)
AeroBlade on the Hunt Targeting the U.S. Aerospace Industry (Blackberry)
Fake Lockdown Mode: A post-exploitation tampering technique (Jamf)
Disney+ Impersonated in Elaborate Multi-Stage Email Attack with Personalized Attachments (Abnormal Security)
Building Security in Maturity Model (BSIMM) report (Synopsis)
Deputy Prime Minister annual Resilience Statement (GOV.UK)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Dec 2023 21:10:00 -0000</pubDate>
      <itunes:title>Sleeper malware denied at Sellafield nuclear site.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1960</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The UK Government's denial of a cyber incident at Sellafield. There’s been a surge in Iranian cyberattacks on US infrastructure. Misuse of Apple's lockdown mode, the mysterious AeroBlade's activities in aerospace, and a clever "Disney+" scam. Plus The latest application security trends, and a new cybersecurity futures study. In our Industry Voices segment, On today’s Industry Voices segment, we welcome Matt Radolec, Vice President of Incident Response and Cloud Operations at Varonis explaining the intersection of AI, cloud and insider threats. And insights on resilience from the UK's Deputy PM.

CyberWire Guest
On today’s Industry Voices segment, we welcome Matt Radolec. Matt is Vice President of Incident Response and Cloud Operations at Varonis. He talks about the  intersection of AI, cloud and insider threats.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/230

Selected Reading
Sellafield nuclear site hacked by groups linked to Russia and China (The Guardian)
Response to a news report on cyber security at Sellafield (GOV.UK)
Guardian news article (Office of Nuclear Regulation)
Ministers pressed by Labour over cyber-attack at Sellafield by foreign groups (The Guardian)
US warns Iranian terrorist crew broke into 'multiple' US water facilities (The Register)
Florida water agency latest to confirm cyber incident as feds warn of nation-state attacks (The Record)
AeroBlade on the Hunt Targeting the U.S. Aerospace Industry (Blackberry)
Fake Lockdown Mode: A post-exploitation tampering technique (Jamf)
Disney+ Impersonated in Elaborate Multi-Stage Email Attack with Personalized Attachments (Abnormal Security)
Building Security in Maturity Model (BSIMM) report (Synopsis)
Deputy Prime Minister annual Resilience Statement (GOV.UK)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The UK Government's denial of a cyber incident at Sellafield. There’s been a surge in Iranian cyberattacks on US infrastructure. Misuse of Apple's lockdown mode, the mysterious AeroBlade's activities in aerospace, and a clever "Disney+" scam. Plus The latest application security trends, and a new cybersecurity futures study. In our Industry Voices segment, On today’s Industry Voices segment, we welcome Matt Radolec, Vice President of Incident Response and Cloud Operations at Varonis explaining the intersection of AI, cloud and insider threats. And insights on resilience from the UK's Deputy PM.</p><p><br></p><h2>CyberWire Guest</h2><p>On today’s Industry Voices segment, we welcome <a href="https://www.linkedin.com/in/matthew-radolec-1b54974b/">Matt Radolec</a>. Matt is Vice President of Incident Response and Cloud Operations at <a href="https://www.varonis.com/">Varonis</a>. He talks about the  intersection of AI, cloud and insider threats.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/230</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.theguardian.com/business/2023/dec/04/sellafield-nuclear-site-hacked-groups-russia-china">Sellafield nuclear site hacked by groups linked to Russia and China</a> (The Guardian)</p><p><a href="https://www.gov.uk/government/news/response-to-a-news-report-on-cyber-security-at-sellafield">Response to a news report on cyber security at Sellafield</a> (GOV.UK)</p><p><a href="https://news.onr.org.uk/2023/12/guardian-news-article/">Guardian news article</a> (Office of Nuclear Regulation)</p><p><a href="https://www.theguardian.com/environment/2023/dec/05/ministers-pressed-by-labour-over-cyber-attack-at-sellafield-by-foreign-groups">Ministers pressed by Labour over cyber-attack at Sellafield by foreign groups</a> (The Guardian)</p><p><a href="https://www.theregister.com/2023/12/04/iran_terrorist_us_water_attacks/">US warns Iranian terrorist crew broke into 'multiple' US water facilities</a> (The Register)</p><p><a href="https://therecord.media/florida-water-agency-ransomware-cisa-warning-utilities">Florida water agency latest to confirm cyber incident as feds warn of nation-state attacks</a> (The Record)</p><p><a href="https://blogs.blackberry.com/en/2023/11/aeroblade-on-the-hunt-targeting-us-aerospace-industry">AeroBlade on the Hunt Targeting the U.S. Aerospace Industry</a> (Blackberry)</p><p><a href="https://www.jamf.com/blog/fake-lockdown-mode/">Fake Lockdown Mode: A post-exploitation tampering technique</a> (Jamf)</p><p><a href="https://abnormalsecurity.com/blog/disney-plus-attack-personalized-attachments">Disney+ Impersonated in Elaborate Multi-Stage Email Attack with Personalized Attachments</a> (Abnormal Security)</p><p><a href="https://www.synopsys.com/software-integrity/resources/analyst-reports/bsimm.html">Building Security in Maturity Model (BSIMM) report</a> (Synopsis)</p><p><a href="https://www.gov.uk/government/speeches/deputy-prime-minister-annual-resilience-statement">Deputy Prime Minister annual Resilience Statement</a> (GOV.UK)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1396</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16328cc6-2b53-11ee-9c79-2ff442a7e6cc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6368673121.mp3?updated=1701807314" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Iran behind attacks on PLCs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1959/notes</link>
      <description>The US and Israel attribute attacks on PLCs to Iran. Agent Raccoon backdoors organizations on three continents. XDSpy is reported to be phishing the Russian defense sector. Trends in digital banking fraud. Repojacking Go module repositories. Ann Johnson from Afternoon Cyber Tea speaks with Lynn Dohm, executive director of WiCyS, about the power of diverse perspectives. And when it comes to security, don't look to the stars.

CyberWire Guest
Guest is Ann Johnson from Afternoon Cyber Tea talking with Lynn Dohm, executive director of WiCyS, about the power of diverse perspectives. Tune in to Microsoft Security’s Afternoon Cyber Tea podcast every other Tuesday on the N2K Network. You can hear Ann’s full interview with Lynn here. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/229

Selected Reading
IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities (CISA)
Water and Wastewater Cybersecurity (CISA)
P2Pinfect - New Variant Targets MIPS Devices (Cado)
New Tool Set Found Used Against Organizations in the Middle East, Africa and the US (Palo Alto Networks Unit 42)
XDSpy hackers attack military-industrial companies in Russia (The Record)
Mobile Emulators Eclipse Bots in 2023 as Preferred Fraud Vector in North America (PR Newswire)
Hijackable Go Module Repositories (VulnCheck)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 04 Dec 2023 21:10:00 -0000</pubDate>
      <itunes:title>Iran behind attacks on PLCs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1959</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>The US and Israel attribute attacks on PLCs to Iran. Agent Raccoon backdoors organizations on three continents. XDSpy is reported to be phishing the Russian defense sector. Trends in digital banking fraud. Repojacking Go module repositories. Ann Johnson from Afternoon Cyber Tea speaks with Lynn Dohm, executive director of WiCyS, about the power of diverse perspectives. And when it comes to security, don't look to the stars.

CyberWire Guest
Guest is Ann Johnson from Afternoon Cyber Tea talking with Lynn Dohm, executive director of WiCyS, about the power of diverse perspectives. Tune in to Microsoft Security’s Afternoon Cyber Tea podcast every other Tuesday on the N2K Network. You can hear Ann’s full interview with Lynn here. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/229

Selected Reading
IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities (CISA)
Water and Wastewater Cybersecurity (CISA)
P2Pinfect - New Variant Targets MIPS Devices (Cado)
New Tool Set Found Used Against Organizations in the Middle East, Africa and the US (Palo Alto Networks Unit 42)
XDSpy hackers attack military-industrial companies in Russia (The Record)
Mobile Emulators Eclipse Bots in 2023 as Preferred Fraud Vector in North America (PR Newswire)
Hijackable Go Module Repositories (VulnCheck)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US and Israel attribute attacks on PLCs to Iran. Agent Raccoon backdoors organizations on three continents. XDSpy is reported to be phishing the Russian defense sector. Trends in digital banking fraud. Repojacking Go module repositories. Ann Johnson from Afternoon Cyber Tea speaks with Lynn Dohm, executive director of WiCyS, about the power of diverse perspectives. And when it comes to security, don't look to the stars.</p><p><br></p><h2>CyberWire Guest</h2><p>Guest is <a href="https://www.linkedin.com/in/ann-johnsons/">Ann Johnson</a> from Afternoon Cyber Tea talking with <a href="https://www.linkedin.com/in/lynndohm/">Lynn Dohm</a>, executive director of <a href="https://www.wicys.org/">WiCyS</a>, about the power of diverse perspectives. Tune in to <a href="https://www.microsoft.com/en-us/security">Microsoft Security</a>’s <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea">Afternoon Cyber Tea podcast</a> every other Tuesday on the N2K Network. You can hear Ann’s full interview with Lynn <a href="https://thecyberwire.com/podcasts/afternoon-cyber-tea/86/notes">here</a>. </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/229</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-335a">IRGC-Affiliated Cyber Actors Exploit PLCs in Multiple Sectors, Including U.S. Water and Wastewater Systems Facilities</a> (CISA)</p><p><a href="https://www.cisa.gov/water">Water and Wastewater Cybersecurity</a> (CISA)</p><p><a href="https://www.cadosecurity.com/p2pinfect-new-variant-targets-mips-devices/">P2Pinfect - New Variant Targets MIPS Devices</a> (Cado)</p><p><a href="https://unit42.paloaltonetworks.com/new-toolset-targets-middle-east-africa-usa/">New Tool Set Found Used Against Organizations in the Middle East, Africa and the US</a> (Palo Alto Networks Unit 42)</p><p><a href="https://therecord.media/xdspy-hackers-target-russian-military-industrial-companies">XDSpy hackers attack military-industrial companies in Russia</a> (The Record)</p><p><a href="https://www.prnewswire.co.uk/news-releases/mobile-emulators-eclipse-bots-in-2023-as-preferred-fraud-vector-in-north-america-302003781.html">Mobile Emulators Eclipse Bots in 2023 as Preferred Fraud Vector in North America</a> (PR Newswire)</p><p><a href="https://vulncheck.com/blog/go-repojacking">Hijackable Go Module Repositories</a> (VulnCheck)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1167</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1622a0b8-2b53-11ee-9c79-9f133bf7d709]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6699367924.mp3?updated=1701723061" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bernard Brantley: Tomorrow is a new day. [CISO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/178/notes</link>
      <description>Bernard Brantley, CISO from Corelight sits down to share his inspiring career path with others. Bernard started at the very bottom of the tech stack, and shares how he was extremely unclear about what it was that he wanted to do in life and how he was going to get there. Ultimately he reached a point now where he has the self confidence and an incredible level of success that allows him to be authentic and proudly share his story. Bernard overcame dropping out of the military academy and was trying to figure out how he could take these big dreams and aspirations he had as a child and turn them into something fruitful as an adult. Working his way up from the bottom he is now sharing how he overcomes those days of adversity, saying "I spend minimum time trying to like spin my wheels or, kind of stay in frustration or a down period and, and really, uh, try as quickly as possible to move from, "hey, this was a tough day" to, to, into, "all right, uh, this was a tough day because maybe I didn't commit enough time in this area, or maybe I could have had a bit better conversation with this person." We thank Bernard for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 03 Dec 2023 08:10:00 -0000</pubDate>
      <itunes:title>Bernard Brantley: Tomorrow is a new day. [CISO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>178</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Bernard Brantley, CISO from Corelight sits down to share his inspiring career path with others. Bernard started at the very bottom of the tech stack, and shares how he was extremely unclear about what it was that he wanted to do in life and how he was going to get there. Ultimately he reached a point now where he has the self confidence and an incredible level of success that allows him to be authentic and proudly share his story. Bernard overcame dropping out of the military academy and was trying to figure out how he could take these big dreams and aspirations he had as a child and turn them into something fruitful as an adult. Working his way up from the bottom he is now sharing how he overcomes those days of adversity, saying "I spend minimum time trying to like spin my wheels or, kind of stay in frustration or a down period and, and really, uh, try as quickly as possible to move from, "hey, this was a tough day" to, to, into, "all right, uh, this was a tough day because maybe I didn't commit enough time in this area, or maybe I could have had a bit better conversation with this person." We thank Bernard for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Bernard Brantley, CISO from Corelight sits down to share his inspiring career path with others. Bernard started at the very bottom of the tech stack, and shares how he was extremely unclear about what it was that he wanted to do in life and how he was going to get there. Ultimately he reached a point now where he has the self confidence and an incredible level of success that allows him to be authentic and proudly share his story. Bernard overcame dropping out of the military academy and was trying to figure out how he could take these big dreams and aspirations he had as a child and turn them into something fruitful as an adult. Working his way up from the bottom he is now sharing how he overcomes those days of adversity, saying "I spend minimum time trying to like spin my wheels or, kind of stay in frustration or a down period and, and really, uh, try as quickly as possible to move from, "hey, this was a tough day" to, to, into, "all right, uh, this was a tough day because maybe I didn't commit enough time in this area, or maybe I could have had a bit better conversation with this person." We thank Bernard for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>528</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f7a6136a-9090-11ee-a910-43b56087f427]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9241200499.mp3?updated=1701294338" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exploits and vulnerabilities. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/308/notes</link>
      <description>Ryan from Bishop Fox joins to describe their work on "Building an Exploit for FortiGate Vulnerability CVE-2023-27997." After Lexfo published details of a pre-authentication remote code injection vulnerability in the Fortinet SSL VPN, Bishop Fox worked up a proof of concept demo.
This research share how they were able to create that proof-of-concept exploit, step by step. The researchers state "Our debugging environment consisted of a FortiGate 7.2.4 virtual machine which we modified to disable some self-verification functionality. After bypassing these integrity checks, we were able to install an SSH server, BusyBox, and debugging tools such as GDB."
The research can be found here:
Building an Exploit for FortiGate Vulnerability CVE-2023-27997

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Dec 2023 08:10:00 -0000</pubDate>
      <itunes:title>Exploits and vulnerabilities. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>308</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ryan from Bishop Fox joins to describe their work on "Building an Exploit for FortiGate Vulnerability CVE-2023-27997." After Lexfo published details of a pre-authentication remote code injection vulnerability in the Fortinet SSL VPN, Bishop Fox worked up a proof of concept demo.
This research share how they were able to create that proof-of-concept exploit, step by step. The researchers state "Our debugging environment consisted of a FortiGate 7.2.4 virtual machine which we modified to disable some self-verification functionality. After bypassing these integrity checks, we were able to install an SSH server, BusyBox, and debugging tools such as GDB."
The research can be found here:
Building an Exploit for FortiGate Vulnerability CVE-2023-27997

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ryan from Bishop Fox joins to describe their work on "Building an Exploit for FortiGate Vulnerability CVE-2023-27997." After Lexfo published details of a pre-authentication remote code injection vulnerability in the Fortinet SSL VPN, Bishop Fox worked up a proof of concept demo.</p><p>This research share how they were able to create that proof-of-concept exploit, step by step. The researchers state "Our debugging environment consisted of a FortiGate 7.2.4 virtual machine which we modified to disable some self-verification functionality. After bypassing these integrity checks, we were able to install an SSH server, BusyBox, and debugging tools such as GDB."</p><p>The research can be found here:</p><ul><li><a href="https://bishopfox.com/blog/building-exploit-fortigate-vulnerability-cve-2023-27997">Building an Exploit for FortiGate Vulnerability CVE-2023-27997</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1128</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[72815294-908b-11ee-835d-dfae359812f8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5230939650.mp3?updated=1701286137" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Wyden blocks the senate vote.</title>
      <description>Senator Wyden blocks the Senate vote on the new NSA and Cyber Command lead. GPS interference is attributed to Iran. Meta identifies and removes Chinese and Russian accounts and groups for coordinated inauthenticity. The EU Council president proposes ‘European cyber force’ with ‘offensive capabilities’. Twisted Spider is observed conducting new ransomware campaigns. Staples sustains a cyberattack. Apple releases security updates for two actively exploited zero-days. On today’s Mr. Security Answer Person segment, John Pescatore joins us to talk about Microsoft's Secure Future Initiative. And how can you tell if your bot is involved in insider trading?

CyberWire Guests
On today’s Mr. Security Answer Person segment, John Pescatore joins us to talk about Microsoft's Secure Future Initiative. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/228

Selected Reading
Wyden to block Senate vote on new NSA, Cyber Command lead (Politico)
Meaconing, Intrusion, Jamming, and Interference Reporting (Federation of American Scientists)
Commercial Flights Are Experiencing 'Unthinkable' GPS Attacks and Nobody Knows What to Do (Vice)
GPS Spoofing Traced To Iran (Location Business News)
Adversarial Threat Report, Third Quarter 2023 (Meta)
EU Council president proposes ‘European cyber force’ with ‘offensive capabilities’ (The Record)
Microsoft warns of new ransomware campaign by Twisted Spider group (Computing)
Staples confirms cyberattack behind service outages, delivery issues (BleepingComputer)
Technical Report: Large Language Models can Strategically Deceive their Users when Put Under Pressure (Cornell University)
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 01 Dec 2023 21:10:00 -0000</pubDate>
      <itunes:title>Wyden blocks the senate vote.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1958</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>https://thecyberwire.com/podcasts/daily-podcast/1958/notes</itunes:subtitle>
      <itunes:summary>Senator Wyden blocks the Senate vote on the new NSA and Cyber Command lead. GPS interference is attributed to Iran. Meta identifies and removes Chinese and Russian accounts and groups for coordinated inauthenticity. The EU Council president proposes ‘European cyber force’ with ‘offensive capabilities’. Twisted Spider is observed conducting new ransomware campaigns. Staples sustains a cyberattack. Apple releases security updates for two actively exploited zero-days. On today’s Mr. Security Answer Person segment, John Pescatore joins us to talk about Microsoft's Secure Future Initiative. And how can you tell if your bot is involved in insider trading?

CyberWire Guests
On today’s Mr. Security Answer Person segment, John Pescatore joins us to talk about Microsoft's Secure Future Initiative. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/228

Selected Reading
Wyden to block Senate vote on new NSA, Cyber Command lead (Politico)
Meaconing, Intrusion, Jamming, and Interference Reporting (Federation of American Scientists)
Commercial Flights Are Experiencing 'Unthinkable' GPS Attacks and Nobody Knows What to Do (Vice)
GPS Spoofing Traced To Iran (Location Business News)
Adversarial Threat Report, Third Quarter 2023 (Meta)
EU Council president proposes ‘European cyber force’ with ‘offensive capabilities’ (The Record)
Microsoft warns of new ransomware campaign by Twisted Spider group (Computing)
Staples confirms cyberattack behind service outages, delivery issues (BleepingComputer)
Technical Report: Large Language Models can Strategically Deceive their Users when Put Under Pressure (Cornell University)
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Senator Wyden blocks the Senate vote on the new NSA and Cyber Command lead. GPS interference is attributed to Iran. Meta identifies and removes Chinese and Russian accounts and groups for coordinated inauthenticity. The EU Council president proposes ‘European cyber force’ with ‘offensive capabilities’. Twisted Spider is observed conducting new ransomware campaigns. Staples sustains a cyberattack. Apple releases security updates for two actively exploited zero-days. On today’s Mr. Security Answer Person segment, John Pescatore joins us to talk about Microsoft's Secure Future Initiative. And how can you tell if your bot is involved in insider trading?</p><p><br></p><h2>CyberWire Guests</h2><p>On today’s Mr. Security Answer Person segment, <a href="https://www.linkedin.com/in/john-p-746a8/">John Pescatore</a> joins us to talk about Microsoft's <a href="https://blogs.microsoft.com/on-the-issues/2023/11/02/secure-future-initiative-sfi-cybersecurity-cyberattacks/">Secure Future Initiative</a>. </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/228</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.politico.com/news/2023/11/30/wyden-block-senate-vote-nsa-cyber-command-00129432">Wyden to block Senate vote on new NSA, Cyber Command lead</a> (Politico)</p><p><a href="https://irp.fas.org/doddir/army/fm24-33/fm243_5.htm#:~:text=Meaconing.,their%20intended%20targets%20or%20destinations">Meaconing, Intrusion, Jamming, and Interference Reporting</a> (Federation of American Scientists)</p><p><a href="https://www.vice.com/en/article/m7bk3v/commercial-flights-are-experiencing-unthinkable-gps-attacks-and-nobody-knows-what-to-do">Commercial Flights Are Experiencing 'Unthinkable' GPS Attacks and Nobody Knows What to Do</a> (Vice)</p><p><a href="https://locationbusinessnews.substack.com/p/gps-spoofing-traced-to-iran">GPS Spoofing Traced To Iran</a> (Location Business News)</p><p><a href="https://transparency.fb.com/sr/Q3-2023-Adversarial-threat-report">Adversarial Threat Report</a>, Third Quarter 2023 (Meta)</p><p><a href="https://therecord.media/offensive-cyber-force-proposal-european-council-president">EU Council president proposes ‘European cyber force’ with ‘offensive capabilities’</a> (The Record)</p><p><a href="https://www.computing.co.uk/news/4152263/microsoft-warns-ransomware-campaign-twisted-spider-group">Microsoft warns of new ransomware campaign by Twisted Spider group</a> (Computing)</p><p><a href="https://www.bleepingcomputer.com/news/security/staples-confirms-cyberattack-behind-service-outages-delivery-issues/">Staples confirms cyberattack behind service outages, delivery issues</a> (BleepingComputer)</p><p><a href="https://arxiv.org/abs/2311.07590">Technical Report: Large Language Models can Strategically Deceive their Users when Put Under Pressure</a> (Cornell University)</p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1300</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16121860-2b53-11ee-9c79-033dcdccdfcd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1814344598.mp3?updated=1701461947" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Widespread exploitation of severe vulnerability in ownCloud.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1957/notes</link>
      <description>Reports of a Critical Vulnerability in ownCloud. Sites serving bogus McAfee virus alerts. Japan’s space agency reports a breach. Okta revises the impact of their recent breach. Cryptomixer gets taken down in an international law enforcement operation. "SugarGh0st" RAT prospects targets in Uzbekistan and South Korea. NATO cyber exercise runs against the background of Russia's hybrid war.  On today’s Threat Vector segment, David Moulton of Palo Alto Networks’ Unit 42 talks with guest John Huebner about the intricacies of managing threat intelligence feeds. And Russian DDoS’ers are looking for volunteers. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guests
On today’s Threat Vector segment, David Moulton of Palo Alto Networks’ Unit 42 talks with guest John Huebner, an XSIAM Consultant at Palo Alto Networks. David and John delve into the intricacies of managing threat intelligence feeds in cybersecurity. They discuss the challenges organizations face in sifting valuable intelligence from the noise, emphasizing the importance of risk assessments in guiding the selection and tuning of these feeds.
Threat Vector
Please share your thoughts with us for future Threat Vector segments by taking our brief survey.
To learn what is top of mind each month from the experts at Unit 42 sign up for their Threat Intel Bulletin. 
T-Minus commentary on JAXA’s cyber threat. 
Dave is joined by T-Minus Space Daily host, Maria Varmazis, to discuss the significant cyber threat faced by Japan’s Aerospace Exploration Agency, known as JAXA. Listen to yesterday’s episode of T-Minus where they covered the incident. 
Selected Reading
ownCloud vulnerability with maximum 10 severity score comes under “mass” exploitation (Ars Technica)
Associated Press, ESPN, CBS among top sites serving fake virus alerts (Malwarebytes)
VIDAR INFOSTEALER STEALS BOOKING.COM CREDENTIALS IN FRAUD SCAM (Secureworks)
Japan space agency hit with cyberattack, rocket and satellite info not accessed (Reuters)
Okta October breach affected 134 orgs, biz admits (The Register)
October Customer Support Security Incident - Update and Recommended Actions (Okta)
Okta Hack Update Shows Challenges in Rapid Cyber Disclosures (Wall Street Journal)
US seizes Sinbad crypto mixer used by North Korean Lazarus hackers (Bleeping Computer)
Treasury Sanctions Mixer Used by the DPRK to Launder Stolen Virtual Currency (US Department of Treasury)
Crypto Country:  North Korea’s Targeting of Cryptocurrency (Recorded Future)
New SugarGh0st RAT targets Uzbekistan government and South Korea (Cisco Talos)
Russian hackers pose ‘high’ threat level to EU, bloc’s cyber team warns (Politico)
NATO Holds Cyber Defense Exercise as Wartime Hacking Threats Rise (Wall Street Journal)

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 30 Nov 2023 21:10:00 -0000</pubDate>
      <itunes:title>Widespread exploitation of severe vulnerability in ownCloud.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1957</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Reports of a Critical Vulnerability in ownCloud. Sites serving bogus McAfee virus alerts. Japan’s space agency reports a breach. Okta revises the impact of their recent breach. Cryptomixer gets taken down in an international law enforcement operation. "SugarGh0st" RAT prospects targets in Uzbekistan and South Korea. NATO cyber exercise runs against the background of Russia's hybrid war.  On today’s Threat Vector segment, David Moulton of Palo Alto Networks’ Unit 42 talks with guest John Huebner about the intricacies of managing threat intelligence feeds. And Russian DDoS’ers are looking for volunteers. 
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you’ll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn.
CyberWire Guests
On today’s Threat Vector segment, David Moulton of Palo Alto Networks’ Unit 42 talks with guest John Huebner, an XSIAM Consultant at Palo Alto Networks. David and John delve into the intricacies of managing threat intelligence feeds in cybersecurity. They discuss the challenges organizations face in sifting valuable intelligence from the noise, emphasizing the importance of risk assessments in guiding the selection and tuning of these feeds.
Threat Vector
Please share your thoughts with us for future Threat Vector segments by taking our brief survey.
To learn what is top of mind each month from the experts at Unit 42 sign up for their Threat Intel Bulletin. 
T-Minus commentary on JAXA’s cyber threat. 
Dave is joined by T-Minus Space Daily host, Maria Varmazis, to discuss the significant cyber threat faced by Japan’s Aerospace Exploration Agency, known as JAXA. Listen to yesterday’s episode of T-Minus where they covered the incident. 
Selected Reading
ownCloud vulnerability with maximum 10 severity score comes under “mass” exploitation (Ars Technica)
Associated Press, ESPN, CBS among top sites serving fake virus alerts (Malwarebytes)
VIDAR INFOSTEALER STEALS BOOKING.COM CREDENTIALS IN FRAUD SCAM (Secureworks)
Japan space agency hit with cyberattack, rocket and satellite info not accessed (Reuters)
Okta October breach affected 134 orgs, biz admits (The Register)
October Customer Support Security Incident - Update and Recommended Actions (Okta)
Okta Hack Update Shows Challenges in Rapid Cyber Disclosures (Wall Street Journal)
US seizes Sinbad crypto mixer used by North Korean Lazarus hackers (Bleeping Computer)
Treasury Sanctions Mixer Used by the DPRK to Launder Stolen Virtual Currency (US Department of Treasury)
Crypto Country:  North Korea’s Targeting of Cryptocurrency (Recorded Future)
New SugarGh0st RAT targets Uzbekistan government and South Korea (Cisco Talos)
Russian hackers pose ‘high’ threat level to EU, bloc’s cyber team warns (Politico)
NATO Holds Cyber Defense Exercise as Wartime Hacking Threats Rise (Wall Street Journal)

Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at cyberwire@n2k.com to request more info.
The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Reports of a Critical Vulnerability in ownCloud. Sites serving bogus McAfee virus alerts. Japan’s space agency reports a breach. Okta revises the impact of their recent breach. Cryptomixer gets taken down in an international law enforcement operation. "SugarGh0st" RAT prospects targets in Uzbekistan and South Korea. NATO cyber exercise runs against the background of Russia's hybrid war.  On today’s Threat Vector segment, David Moulton of Palo Alto Networks’ Unit 42 talks with guest John Huebner about the intricacies of managing threat intelligence feeds. And Russian DDoS’ers are looking for volunteers. </p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our daily intelligence roundup, <a href="https://thecyberwire.com/newsletters/daily-briefing"><em>Daily Briefing</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow CyberWire Daily on <a href="https://www.linkedin.com/company/10454826/admin/feed/posts/">LinkedIn</a>.</p><h2>CyberWire Guests</h2><p>On today’s Threat Vector segment, <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a> of Palo Alto Networks’ Unit 42 talks with guest<a href="https://www.linkedin.com/in/jon-huebner-522068184/"> John Huebner</a>, an XSIAM Consultant at Palo Alto Networks. David and John delve into the intricacies of managing threat intelligence feeds in cybersecurity. They discuss the challenges organizations face in sifting valuable intelligence from the noise, emphasizing the importance of risk assessments in guiding the selection and tuning of these feeds.</p><p><strong>Threat Vector</strong></p><p>Please share your thoughts with us for future Threat Vector segments by taking our <a href="https://www.surveymonkey.com/r/N2K_TV_p">brief survey</a>.</p><p>To learn what is top of mind each month from the experts at Unit 42 sign up for their <a href="https://start.paloaltonetworks.com/unit42-threat-intel-bulletin.html">Threat Intel Bulletin</a>. </p><p><strong>T-Minus commentary on JAXA’s cyber threat. </strong></p><p>Dave is joined by <a href="https://space.n2k.com/podcasts/t-minus">T-Minus Space Daily</a> host, <a href="https://www.linkedin.com/in/varmazis/">Maria Varmazis</a>, to discuss the significant cyber threat faced by Japan’s Aerospace Exploration Agency, known as JAXA. Listen to <a href="https://space.n2k.com/podcasts/t-minus/166">yesterday’s episode of T-Minus</a> where they covered the incident. </p><h2>Selected Reading</h2><p><a href="https://arstechnica.com/security/2023/11/owncloud-vulnerability-with-a-maximum-10-severity-rating-comes-under-mass-exploitation/">ownCloud vulnerability with maximum 10 severity score comes under “mass” exploitation</a> (Ars Technica)</p><p><a href="https://www.malwarebytes.com/blog/threat-intelligence/2023/11/associated-press-espn-cbs-among-top-sites-serving-fake-virus-alerts">Associated Press, ESPN, CBS among top sites serving fake virus alerts</a> (Malwarebytes)</p><p><a href="https://www.secureworks.com/blog/vidar-infostealer-steals-booking-com-credentials-in-fraud-scam">VIDAR INFOSTEALER STEALS BOOKING.COM CREDENTIALS IN FRAUD SCAM</a> (Secureworks)</p><p><a href="https://www.reuters.com/technology/cybersecurity/japan-space-agency-hit-with-cyberattack-this-summer-media-2023-11-29/">Japan space agency hit with cyberattack, rocket and satellite info not accessed</a> (Reuters)</p><p><a href="https://www.theregister.com/2023/11/06/security_in_brief/">Okta October breach affected 134 orgs, biz admits</a> (The Register)</p><p><a href="https://sec.okta.com/harfiles">October Customer Support Security Incident - Update and Recommended Actions</a> (Okta)</p><p><a href="https://www.wsj.com/articles/okta-says-hackers-stole-data-for-all-customer-support-users-5204611f">Okta Hack Update Shows Challenges in Rapid Cyber Disclosures</a> (Wall Street Journal)</p><p><a href="https://www.bleepingcomputer.com/news/security/us-seizes-sinbad-crypto-mixer-used-by-north-korean-lazarus-hackers/#google_vignette">US seizes Sinbad crypto mixer used by North Korean Lazarus hackers</a> (Bleeping Computer)</p><p><a href="https://home.treasury.gov/news/press-releases/jy1933">Treasury Sanctions Mixer Used by the DPRK to Launder Stolen Virtual Currency</a> (US Department of Treasury)</p><p><a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-1130.pdf">Crypto Country:  North Korea’s Targeting of Cryptocurrency</a> (Recorded Future)</p><p><a href="https://blog.talosintelligence.com/new-sugargh0st-rat/">New SugarGh0st RAT targets Uzbekistan government and South Korea</a> (Cisco Talos)</p><p><a href="https://www.politico.eu/article/threat-eu-high-russia-hackers-launch-cyberattacks-fancy-bear-election/">Russian hackers pose ‘high’ threat level to EU, bloc’s cyber team warns</a> (Politico)</p><p><a href="https://www.wsj.com/articles/nato-holds-cyber-defense-exercise-as-wartime-hacking-threats-rise-aef08a27">NATO Holds Cyber Defense Exercise as Wartime Hacking Threats Rise</a> (Wall Street Journal)</p><p><br></p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/5ncb2vvpz2ntg95q">media kit</a>. Contact us at <a href="mailto:cyberwire@n2k.com">cyberwire@n2k.com</a> to request more info.</p><p>The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1611</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[152254ec-2b53-11ee-9c79-0bc25ef3422b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4235624212.mp3?updated=1701375121" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Major crackdown on international cybersecurity.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1956/notes</link>
      <description>A major ransomware gang is taken down in an international sweep. CISA and the WaterISAC respond to the Aliquippa cyberattack. Attacks against infrastructure operators hit business systems. Qlik Sense installations are hit with Cactus ransomware. Researchers discover a Google Workspace vulnerability. A hacktivist auxiliary compromises a Russian media site.  In an exclusive interview, Eric Goldstein, Executive Assistant Director at CISA, describes their new Secure by Design Alerts program launching today. Tim Starks from the Washington Post shares some insights on the latest legislation dealing with section 702 surveillance. And security teams need not polish up that resumé after a breach. 

CyberWire Guest
We have 2 guests today. First, Dave recently spoke with Eric Goldstein, Executive Assistant Director at CISA, about their new Secure by Design Alerts program that launched today. 
And, Tim Starks from the Washington Post’s Cybersecurity 202 stopped by to share some insight into some of the latest trending cybersecurity headlines. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/226

Selected Reading
Police dismantle ransomware group behind attacks in 71 countries (Bleeping Computer)
Ransomware group dismantled in Ukraine in a major international operation supported by Eurojust and Europol (Eurojust)
Water and Wastewater Cybersecurity (CISA)
(TLP:CLEAR) Water Utility Control System Cyber Incident Advisory: ICS/SCADA Incident at Municipal Water Authority of Aliquippa (Water ISAC)
Iran hits Pennsylvania water utility. (CyberWire)
North Texas water utility serving 2 million hit with cyberattack (The Record) 
DAIXIN TEAM GROUP CLAIMED THE HACK OF NORTH TEXAS MUNICIPAL WATER DISTRICT (Security Affairs)
Slovenian power company hit by ransomware (Help Net Security)
Qlik Sense Exploited in Cactus Ransomware Campaign (Arctic Wolf)
Qlik Sense Enterprise for Windows - New Security Patches Available Now (Qlik)
DeleFriend: Severe design flaw in Domain Wide Delegation could leave Google Workspace vulnerable for takeover (Hunters) 
Researchers Claim Design Flaw in Google Workspace Puts Organizations at Risk (Dark Reading)
Use IAM securely (Google) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 29 Nov 2023 21:10:00 -0000</pubDate>
      <itunes:title>Major crackdown on international cybersecurity.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1956</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A major ransomware gang is taken down in an international sweep. CISA and the WaterISAC respond to the Aliquippa cyberattack. Attacks against infrastructure operators hit business systems. Qlik Sense installations are hit with Cactus ransomware. Researchers discover a Google Workspace vulnerability. A hacktivist auxiliary compromises a Russian media site.  In an exclusive interview, Eric Goldstein, Executive Assistant Director at CISA, describes their new Secure by Design Alerts program launching today. Tim Starks from the Washington Post shares some insights on the latest legislation dealing with section 702 surveillance. And security teams need not polish up that resumé after a breach. 

CyberWire Guest
We have 2 guests today. First, Dave recently spoke with Eric Goldstein, Executive Assistant Director at CISA, about their new Secure by Design Alerts program that launched today. 
And, Tim Starks from the Washington Post’s Cybersecurity 202 stopped by to share some insight into some of the latest trending cybersecurity headlines. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/226

Selected Reading
Police dismantle ransomware group behind attacks in 71 countries (Bleeping Computer)
Ransomware group dismantled in Ukraine in a major international operation supported by Eurojust and Europol (Eurojust)
Water and Wastewater Cybersecurity (CISA)
(TLP:CLEAR) Water Utility Control System Cyber Incident Advisory: ICS/SCADA Incident at Municipal Water Authority of Aliquippa (Water ISAC)
Iran hits Pennsylvania water utility. (CyberWire)
North Texas water utility serving 2 million hit with cyberattack (The Record) 
DAIXIN TEAM GROUP CLAIMED THE HACK OF NORTH TEXAS MUNICIPAL WATER DISTRICT (Security Affairs)
Slovenian power company hit by ransomware (Help Net Security)
Qlik Sense Exploited in Cactus Ransomware Campaign (Arctic Wolf)
Qlik Sense Enterprise for Windows - New Security Patches Available Now (Qlik)
DeleFriend: Severe design flaw in Domain Wide Delegation could leave Google Workspace vulnerable for takeover (Hunters) 
Researchers Claim Design Flaw in Google Workspace Puts Organizations at Risk (Dark Reading)
Use IAM securely (Google) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A major ransomware gang is taken down in an international sweep. CISA and the WaterISAC respond to the Aliquippa cyberattack. Attacks against infrastructure operators hit business systems. Qlik Sense installations are hit with Cactus ransomware. Researchers discover a Google Workspace vulnerability. A hacktivist auxiliary compromises a Russian media site.  In an exclusive interview, Eric Goldstein, Executive Assistant Director at CISA, describes their new Secure by Design Alerts program launching today. Tim Starks from the Washington Post shares some insights on the latest legislation dealing with section 702 surveillance. And security teams need not polish up that resumé after a breach. </p><p><br></p><h2>CyberWire Guest</h2><p>We have 2 guests today. First, Dave recently spoke with <a href="https://www.linkedin.com/in/eric-goldstein-15658223/">Eric Goldstein</a>, Executive Assistant Director at CISA, about their new <a href="https://www.cisa.gov/news-events/alerts/2023/11/29/cisa-releases-first-secure-design-alert">Secure by Design Alerts</a> program that launched today. </p><p>And, <a href="https://www.linkedin.com/in/tstarks/">Tim Starks</a> from the Washington Post’s <a href="https://www.washingtonpost.com/politics/the-202-newsletters/the-cybersecurity-202/">Cybersecurity 202</a> stopped by to share some insight into some of the latest trending cybersecurity headlines. </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/226</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.bleepingcomputer.com/news/security/police-dismantle-ransomware-group-behind-attacks-in-71-countries/#google_vignette">Police dismantle ransomware group behind attacks in 71 countries</a> (Bleeping Computer)</p><p><a href="https://www.eurojust.europa.eu/news/ransomware-group-dismantled-ukraine-major-operation-supported-eurojust-europol">Ransomware group dismantled in Ukraine in a major international operation supported by Eurojust and Europol</a> (Eurojust)</p><p><a href="https://www.cisa.gov/water">Water and Wastewater Cybersecurity</a> (CISA)</p><p><a href="https://www.waterisac.org/portal/tlpclear-water-utility-control-system-cyber-incident-advisory-icsscada-incident-municipal">(TLP:CLEAR) Water Utility Control System Cyber Incident Advisory: ICS/SCADA Incident at Municipal Water Authority of Aliquippa</a> (Water ISAC)</p><p><a href="https://thecyberwire.com/stories/9b2c71a40e324a2798af0add5c1c35a8/iran-hits-pennsylvania-water-utility">Iran hits Pennsylvania water utility.</a> (CyberWire)</p><p><a href="https://therecord.media/north-texas-water-utility-cyberattack">North Texas water utility serving 2 million hit with cyberattack</a> (The Record) </p><p><a href="https://securityaffairs.com/154881/cyber-crime/daixin-team-north-texas-municipal-water-district.html">DAIXIN TEAM GROUP CLAIMED THE HACK OF NORTH TEXAS MUNICIPAL WATER DISTRICT</a> (Security Affairs)</p><p><a href="https://www.helpnetsecurity.com/2023/11/28/slovenian-power-company-ransomware/">Slovenian power company hit by ransomware</a> (Help Net Security)</p><p><a href="https://www.arcticwolf.com/resources/blog/qlik-sense-exploited-in-cactus-ransomware-campaign/">Qlik Sense Exploited in Cactus Ransomware Campaign</a> (Arctic Wolf)</p><p><a href="https://community.qlik.com/t5/Support-Updates/Qlik-Sense-Enterprise-for-Windows-New-Security-Patches-Available/ba-p/2108549">Qlik Sense Enterprise for Windows - New Security Patches Available Now </a>(Qlik)</p><p><a href="https://www.hunters.security/en/blog/delefriend-a-newly-discovered-design-flaw-in-domain-wide-delegation-could-leave-google-workspace-vulnerable-for-takeover">DeleFriend: Severe design flaw in Domain Wide Delegation could leave Google Workspace vulnerable for takeover</a> (Hunters) </p><p><a href="https://www.darkreading.com/cloud-security/vendor-claims-design-flaw-in-google-workspace-is-putting-organizations-at-risk">Researchers Claim Design Flaw in Google Workspace Puts Organizations at Risk</a> (Dark Reading)</p><p><a href="https://cloud.google.com/iam/docs/using-iam-securely#least_privilege">Use IAM securely</a> (Google) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1720</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[15836d0e-2b53-11ee-9c79-872b8704d7f4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9027508513.mp3?updated=1701287899" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hospitals on the hotplate after ransomware attacks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1955/notes</link>
      <description>Ransomware targets healthcare organizations. WildCard deploys SysJoker malware. DPRK cryptocurrency theft. The status of Ukraine's IT Army. A Russian news outlet unmasks Killmilk. Our Industry Insights guest today is Guy Bejerano, CEO and Co-Founder of SafeBreach, discussing risk reduction in action. And there’s discord on dark markets about large language models.

CyberWire Guest
Our Industry Insights guest today is Guy Bejerano, CEO and Co-Founder of SafeBreach, discussing risk reduction in action: the future of BAS and continuous threat exposure management.
You can connect with Guy on LinkedIn and find out more about SafeBreach on their website.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/225

Giving Tuesday
Our team offers up some suggestions for Giving Tuesday should you feel inclined to join us in sharing your time, talents or treasures on this day of giving back. 
Arizona Cyber Initiative
Association for Women in Science
BlackGirlsHack
Cyber Guild
Exceptional Minds
G{Code}
Girls Who Code
Lurie Children's Hospital
NFAR
Melwood
Tech Kids Unlimited
WiCyS
Women of Cyberjutsu

Selected Reading
Cyberattack on US hospital owner diverts ambulances from emergency rooms in multiple states (CNN) 
Portneuf Medical Center experienced ransomware attack. Hospital is adapting with pencils and paper (East Idaho News)
Ardent Health Services Reports Information Technology Security Incident (BusinessWire)
Vanderbilt University Medical Center investigating cybersecurity incident (The Record)
Criminal hacking group breaches data, including Premier Health (WDTN 2 News)
Global Threat Intelligence Report (Blackberry)
ISRAEL-HAMAS WAR SPOTLIGHT: SHAKING THE RUST OFF SYSJOKER (Check Point Research)
Operation Electric Powder – Who is targeting Israel Electric Company? (ClearSky Cyber Security)
New Rust-based SysJoker backdoor linked to Hamas hackers (Bleeping Computer)
WildCard: The APT Behind SysJoker Targets Critical Sectors in Israel (Intezer)
DPRK Crypto Theft | macOS RustBucket Droppers Pivot to Deliver KandyKorn Payloads (SentinelOne) 
Leader of pro-Russia DDoS crew Killnet 'unmasked' by Russian state media (The Register) 
Ukraine’s Volunteer IT Army Confronts Tech, Legal Challenges (CEPA)
Cybercriminals can’t agree on GPTs (Sophos)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Nov 2023 21:10:00 -0000</pubDate>
      <itunes:title>Hospitals on the hotplate after ransomware attacks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1955</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Ransomware targets healthcare organizations. WildCard deploys SysJoker malware. DPRK cryptocurrency theft. The status of Ukraine's IT Army. A Russian news outlet unmasks Killmilk. Our Industry Insights guest today is Guy Bejerano, CEO and Co-Founder of SafeBreach, discussing risk reduction in action. And there’s discord on dark markets about large language models.

CyberWire Guest
Our Industry Insights guest today is Guy Bejerano, CEO and Co-Founder of SafeBreach, discussing risk reduction in action: the future of BAS and continuous threat exposure management.
You can connect with Guy on LinkedIn and find out more about SafeBreach on their website.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/225

Giving Tuesday
Our team offers up some suggestions for Giving Tuesday should you feel inclined to join us in sharing your time, talents or treasures on this day of giving back. 
Arizona Cyber Initiative
Association for Women in Science
BlackGirlsHack
Cyber Guild
Exceptional Minds
G{Code}
Girls Who Code
Lurie Children's Hospital
NFAR
Melwood
Tech Kids Unlimited
WiCyS
Women of Cyberjutsu

Selected Reading
Cyberattack on US hospital owner diverts ambulances from emergency rooms in multiple states (CNN) 
Portneuf Medical Center experienced ransomware attack. Hospital is adapting with pencils and paper (East Idaho News)
Ardent Health Services Reports Information Technology Security Incident (BusinessWire)
Vanderbilt University Medical Center investigating cybersecurity incident (The Record)
Criminal hacking group breaches data, including Premier Health (WDTN 2 News)
Global Threat Intelligence Report (Blackberry)
ISRAEL-HAMAS WAR SPOTLIGHT: SHAKING THE RUST OFF SYSJOKER (Check Point Research)
Operation Electric Powder – Who is targeting Israel Electric Company? (ClearSky Cyber Security)
New Rust-based SysJoker backdoor linked to Hamas hackers (Bleeping Computer)
WildCard: The APT Behind SysJoker Targets Critical Sectors in Israel (Intezer)
DPRK Crypto Theft | macOS RustBucket Droppers Pivot to Deliver KandyKorn Payloads (SentinelOne) 
Leader of pro-Russia DDoS crew Killnet 'unmasked' by Russian state media (The Register) 
Ukraine’s Volunteer IT Army Confronts Tech, Legal Challenges (CEPA)
Cybercriminals can’t agree on GPTs (Sophos)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ransomware targets healthcare organizations. WildCard deploys SysJoker malware. DPRK cryptocurrency theft. The status of Ukraine's IT Army. A Russian news outlet unmasks Killmilk. Our Industry Insights guest today is Guy Bejerano, CEO and Co-Founder of SafeBreach, discussing risk reduction in action. And there’s discord on dark markets about large language models.</p><p><br></p><h2>CyberWire Guest</h2><p>Our Industry Insights guest today is Guy Bejerano, CEO and Co-Founder of SafeBreach, discussing risk reduction in action: the future of BAS and continuous threat exposure management.</p><p>You can connect with Guy on <a href="https://www.linkedin.com/in/guy-bejerano-3a6524/">LinkedIn</a> and find out more about SafeBreach on their <a href="https://www.safebreach.com/">website</a>.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/225</p><p><br></p><h2>Giving Tuesday</h2><p>Our team offers up some suggestions for <a href="https://www.givingtuesday.org/">Giving Tuesday</a> should you feel inclined to join us in sharing your time, talents or treasures on this day of giving back. </p><p><a href="https://azcyber.org/donate/">Arizona Cyber Initiative</a></p><p><a href="https://awis.org/donate">Association for Women in Science</a></p><p><a href="https://blackgirlshack.org/Donate-Now">BlackGirlsHack</a></p><p><a href="https://thecyberguild.org/about/">Cyber Guild</a></p><p><a href="https://exceptional-minds.org/">Exceptional Minds</a></p><p><a href="https://gcodehousedonate.org/">G{Code}</a></p><p><a href="https://give.girlswhocode.com/give/77372/#!/donation/checkout">Girls Who Code</a></p><p><a href="https://events.luriechildrens.org/community-fundraising/murphys-holiday-joy-toy-drive-for-luries-hospital-2023">Lurie Children's Hospital</a></p><p><a href="https://nfar.org/">NFAR</a></p><p><a href="https://melwood.org/">Melwood</a></p><p><a href="https://techkidsunlimited.org/">Tech Kids Unlimited</a></p><p><a href="https://www.wicys.org/support/donate/">WiCyS</a></p><p><a href="https://womenscyberjutsu.org/donations/">Women of Cyberjutsu</a></p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.cnn.com/2023/11/27/politics/cyberattack-hospital-diverts-ambulances">Cyberattack on US hospital owner diverts ambulances from emergency rooms in multiple states</a> (CNN) </p><p><a href="https://www.eastidahonews.com/2023/11/portneuf-medical-center-experienced-ransomware-attack-hospital-is-adapting-with-pencils-and-paper/">Portneuf Medical Center experienced ransomware attack. Hospital is adapting with pencils and paper</a> (East Idaho News)</p><p><a href="https://www.businesswire.com/news/home/20231127719251/en/Ardent-Health-Services-Reports-Information-Technology-Security-Incident">Ardent Health Services Reports Information Technology Security Incident</a> (BusinessWire)</p><p><a href="https://therecord.media/vanderbilt-university-medical-center-investigating-cyber-incident-meow-ransomware">Vanderbilt University Medical Center investigating cybersecurity incident</a> (The Record)</p><p><a href="https://www.wdtn.com/as-seen-on-2-news/criminal-hacking-group-breaches-data-including-premier-health/">Criminal hacking group breaches data, including Premier Health</a> (WDTN 2 News)</p><p><a href="https://www.blackberry.com/us/en/solutions/threat-intelligence/threat-report">Global Threat Intelligence Report</a> (Blackberry)</p><p><a href="https://research.checkpoint.com/2023/israel-hamas-war-spotlight-shaking-the-rust-off-sysjoker/">ISRAEL-HAMAS WAR SPOTLIGHT: SHAKING THE RUST OFF SYSJOKER</a> (Check Point Research)</p><p><a href="https://www.clearskysec.com/iec/">Operation Electric Powder – Who is targeting Israel Electric Company?</a> (ClearSky Cyber Security)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-rust-based-sysjoker-backdoor-linked-to-hamas-hackers/#google_vignette">New Rust-based SysJoker backdoor linked to Hamas hackers</a> (Bleeping Computer)</p><p><a href="https://intezer.com/blog/research/wildcard-evolution-of-sysjoker-cyber-threat/">WildCard: The APT Behind SysJoker Targets Critical Sectors in Israel</a> (Intezer)</p><p><a href="https://www.sentinelone.com/blog/dprk-crypto-theft-macos-rustbucket-droppers-pivot-to-deliver-kandykorn-payloads/">DPRK Crypto Theft | macOS RustBucket Droppers Pivot to Deliver KandyKorn Payloads </a>(SentinelOne) </p><p><a href="https://www.theregister.com/2023/11/27/leader_of_prorussia_ddos_crew/">Leader of pro-Russia DDoS crew Killnet 'unmasked' by Russian state media</a> (The Register) </p><p><a href="https://cepa.org/article/ukraine-volunteer-it-army-confronts-tech-legal-challenges/">Ukraine’s Volunteer IT Army Confronts Tech, Legal Challenges</a> (CEPA)</p><p><a href="https://news.sophos.com/en-us/2023/11/28/cybercriminals-cant-agree-on-gpts/?mid=1#cid=1406120">Cybercriminals can’t agree on GPTs</a> (Sophos)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1446</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1592edec-2b53-11ee-9c79-d72382069fe9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2397651226.mp3?updated=1701201944" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacktivists assemble to attack Pennsylvania water utility.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1954/notes</link>
      <description>Iranian hacktivists claim an attack on a Pennsylvania water utility. North Korea's increased attention to supply-chains. Rhysida's action against British and Chinese targets. Sandworm activity puts European power utilities on alert. Neanderthals and the Telekopye bot. Mirai-based botnet activity. Our guest is Chris Betz, the new CISO of AWS Security, with insights on the upcoming AWS re:Invent conference. And just how easy is it to track the comings and goings at Mar-a-Lago?

CyberWire Guest
Our guest today is Chris Betz, the new CISO of AWS Security giving us some insight into what to expect at the AWS re:Invent conference.
You can connect with Chris on LinkedIn and find out more about AWS re:Invent on the event website.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/224

Selected Reading
Municipal Water Authority of Aliquippa hacked by Iranian-backed cyber group (KDKA News)
Iranian-linked cyber army had partial control of Aliquippa water system (Beaver Countian)
Cyber Av3ngers Claim Israeli MEKOROT National Water Company Hack (Cyberwarzone)
A hack in hand is worth two in the bush (Securelist by Kaspersky)
Diamond Sleet supply chain compromise distributes a modified CyberLink installer (Microsoft)
UK and Republic of Korea issue warning about DPRK state-linked cyber actors attacking software supply chains (National Cyber Security Centre)
Rhysida (SentinelOne)
Rhysida, the new ransomware gang behind British Library cyber-attack (The Guardian)
RHYSIDA RANSOMWARE GANG CLAIMED CHINA ENERGY HACK (Security Affairs)
#StopRansomware: Rhysida Ransomware (CISA)
Russia continuing cyberthreats against NATO countries (Defence Industry Europe)
Europe’s grid is under a cyberattack deluge, industry warns (Politico)
Telekopye: Chamber of Neanderthals’ secrets (ESET)
InfectedSlurs Botnet Spreads Mirai via Zero-Days (Akamai)
We Spied on Trump’s ‘Southern White House’ From Our Couches (Rolling Stone)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 27 Nov 2023 21:40:00 -0000</pubDate>
      <itunes:title>Hacktivists assemble to attack Pennsylvania water utility.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1954</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Iranian hacktivists claim an attack on a Pennsylvania water utility. North Korea's increased attention to supply-chains. Rhysida's action against British and Chinese targets. Sandworm activity puts European power utilities on alert. Neanderthals and the Telekopye bot. Mirai-based botnet activity. Our guest is Chris Betz, the new CISO of AWS Security, with insights on the upcoming AWS re:Invent conference. And just how easy is it to track the comings and goings at Mar-a-Lago?

CyberWire Guest
Our guest today is Chris Betz, the new CISO of AWS Security giving us some insight into what to expect at the AWS re:Invent conference.
You can connect with Chris on LinkedIn and find out more about AWS re:Invent on the event website.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/224

Selected Reading
Municipal Water Authority of Aliquippa hacked by Iranian-backed cyber group (KDKA News)
Iranian-linked cyber army had partial control of Aliquippa water system (Beaver Countian)
Cyber Av3ngers Claim Israeli MEKOROT National Water Company Hack (Cyberwarzone)
A hack in hand is worth two in the bush (Securelist by Kaspersky)
Diamond Sleet supply chain compromise distributes a modified CyberLink installer (Microsoft)
UK and Republic of Korea issue warning about DPRK state-linked cyber actors attacking software supply chains (National Cyber Security Centre)
Rhysida (SentinelOne)
Rhysida, the new ransomware gang behind British Library cyber-attack (The Guardian)
RHYSIDA RANSOMWARE GANG CLAIMED CHINA ENERGY HACK (Security Affairs)
#StopRansomware: Rhysida Ransomware (CISA)
Russia continuing cyberthreats against NATO countries (Defence Industry Europe)
Europe’s grid is under a cyberattack deluge, industry warns (Politico)
Telekopye: Chamber of Neanderthals’ secrets (ESET)
InfectedSlurs Botnet Spreads Mirai via Zero-Days (Akamai)
We Spied on Trump’s ‘Southern White House’ From Our Couches (Rolling Stone)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iranian hacktivists claim an attack on a Pennsylvania water utility. North Korea's increased attention to supply-chains. Rhysida's action against British and Chinese targets. Sandworm activity puts European power utilities on alert. Neanderthals and the Telekopye bot. Mirai-based botnet activity. Our guest is Chris Betz, the new CISO of AWS Security, with insights on the upcoming AWS re:Invent conference. And just how easy is it to track the comings and goings at Mar-a-Lago?</p><p><br></p><h2>CyberWire Guest</h2><p>Our guest today is Chris Betz, the new CISO of AWS Security giving us some insight into what to expect at the AWS re:Invent conference.</p><p>You can connect with Chris on <a href="https://www.linkedin.com/in/chris-betz-903b739b/">LinkedIn</a> and find out more about AWS re:Invent on the <a href="https://reinvent.awsevents.com/?trk=5ca28cca-d1b0-4a61-838f-796c9e820cc3">event website</a>.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/224</p><p><br></p><h2>Selected Reading</h2><p><a href="https://www.cbsnews.com/pittsburgh/news/municipal-water-authority-of-aliquippa-hacked-iranian-backed-cyber-group/">Municipal Water Authority of Aliquippa hacked by Iranian-backed cyber group</a> (KDKA News)</p><p><a href="https://beavercountian.com/content/special-coverage/iranian-linked-cyber-army-had-partial-control-of-aliquippa-water-system">Iranian-linked cyber army had partial control of Aliquippa water system</a> (Beaver Countian)</p><p><a href="https://cyberwarzone.com/cyber-av3ngers-claim-israeli-mekorot-national-water-company-hack/">Cyber Av3ngers Claim Israeli MEKOROT National Water Company Hack</a> (Cyberwarzone)</p><p><a href="https://securelist.com/a-hack-in-hand-is-worth-two-in-the-bush/110794/">A hack in hand is worth two in the bush</a> (Securelist by Kaspersky)</p><p><a href="https://www.microsoft.com/en-us/security/blog/2023/11/22/diamond-sleet-supply-chain-compromise-distributes-a-modified-cyberlink-installer/">Diamond Sleet supply chain compromise distributes a modified CyberLink installer</a> (Microsoft)</p><p><a href="https://www.ncsc.gov.uk/news/uk-republic-of-korea-issue-warning-dprk-state-linked-cyber-actors-attacking-software-supply-chains">UK and Republic of Korea issue warning about DPRK state-linked cyber actors attacking software supply chains</a> (National Cyber Security Centre)</p><p><a href="https://www.sentinelone.com/anthology/rhysida/">Rhysida</a> (SentinelOne)</p><p><a href="https://www.theguardian.com/technology/2023/nov/24/rhysida-the-new-ransomware-gang-behind-british-library-cyber-attack">Rhysida, the new ransomware gang behind British Library cyber-attack</a> (The Guardian)</p><p><a href="https://securityaffairs.com/154785/cyber-crime/rhysida-ransomware-china-energy.html">RHYSIDA RANSOMWARE GANG CLAIMED CHINA ENERGY HACK</a> (Security Affairs)</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-319a">#StopRansomware: Rhysida Ransomware </a>(CISA)</p><p><a href="https://defence-industry.eu/russia-continuing-cyberthreats-against-nato-countries/">Russia continuing cyberthreats against NATO countries</a> (Defence Industry Europe)</p><p><a href="https://www.politico.eu/article/energy-power-europe-grid-is-under-a-cyberattack-deluge-industry-warns/">Europe’s grid is under a cyberattack deluge, industry warns</a> (Politico)</p><p><a href="https://www.welivesecurity.com/en/eset-research/telekopye-chamber-neanderthals-secrets/">Telekopye: Chamber of Neanderthals’ secrets</a> (ESET)</p><p><a href="https://www.akamai.com/blog/security-research/new-rce-botnet-spreads-mirai-via-zero-days">InfectedSlurs Botnet Spreads Mirai via Zero-Days</a> (Akamai)</p><p><a href="https://www.rollingstone.com/culture/culture-features/data-brokers-trump-tech-spying-privacy-threat-1234897098/">We Spied on Trump’s ‘Southern White House’ From Our Couches</a> (Rolling Stone)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1249</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[15a342dc-2b53-11ee-9c79-ebfe0b5c8fca]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5743430513.mp3?updated=1701119568" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chris Hare: Find just three people. [Development] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/177/notes</link>
      <description>This week, we invite our very own Chris Hare, N2K's Project Management Specialist Content Developer, to join and discuss her career. Growing up, Chris shares that she wanted to be a veterinarian, which slowly turned into her becoming a writer for the first part of her career. She shares that she started off writing marketing copy for the technology and E-commerce space, writing for everyone from NASA to adopting the written voice of the comedian, Wayne Brady. She shares that she was able to come up into her career after finding three people that were willing to help her when she needed it. She says "I became what I like to think of as a Pied Piper of seeking out three types of people. First, someone who needed help. Second, a person who served as a mechanism for my self improvement through my jealousy of them. And third, a person who gave me the nudge to continuously improve." We thank Chris for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 26 Nov 2023 08:00:00 -0000</pubDate>
      <itunes:title>Chris Hare: Find just three people. [Development] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>177</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, we invite our very own Chris Hare, N2K's Project Management Specialist Content Developer, to join and discuss her career. Growing up, Chris shares that she wanted to be a veterinarian, which slowly turned into her becoming a writer for the first part of her career. She shares that she started off writing marketing copy for the technology and E-commerce space, writing for everyone from NASA to adopting the written voice of the comedian, Wayne Brady. She shares that she was able to come up into her career after finding three people that were willing to help her when she needed it. She says "I became what I like to think of as a Pied Piper of seeking out three types of people. First, someone who needed help. Second, a person who served as a mechanism for my self improvement through my jealousy of them. And third, a person who gave me the nudge to continuously improve." We thank Chris for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we invite our very own Chris Hare, N2K's Project Management Specialist Content Developer, to join and discuss her career. Growing up, Chris shares that she wanted to be a veterinarian, which slowly turned into her becoming a writer for the first part of her career. She shares that she started off writing marketing copy for the technology and E-commerce space, writing for everyone from NASA to adopting the written voice of the comedian, Wayne Brady. She shares that she was able to come up into her career after finding three people that were willing to help her when she needed it. She says "I became what I like to think of as a Pied Piper of seeking out three types of people. First, someone who needed help. Second, a person who served as a mechanism for my self improvement through my jealousy of them. And third, a person who gave me the nudge to continuously improve." We thank Chris for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>474</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[708f0aee-8988-11ee-ba1a-5f66acaea4e2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8814361777.mp3?updated=1700770109" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Another infection with new malware. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/259/notes</link>
      <description>Larry Cashdollar, Principal Security Intelligence Response Engineer from Akamai Technologies, joins Dave to talk about their research on "KmsdBot: The Attack and Mine Malware." Akamai's Security Research team has found a new malware that infected their honeypot, which they have dubbed KmsdBot. 
The research states "The malware attacks using UDP, TCP, HTTP POST, and GET, along with a command and control infrastructure (C2), which communicates over TCP." The botnet targets weak login credentials and then infects systems via an SSH connection.
The research can be found here:
KmsdBot: The Attack and Mine Malware

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Nov 2023 08:10:00 -0000</pubDate>
      <itunes:title>Encore: Another infection with new malware. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>259</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Larry Cashdollar, Principal Security Intelligence Response Engineer from Akamai Technologies, joins Dave to talk about their research on "KmsdBot: The Attack and Mine Malware." Akamai's Security Research team has found a new malware that infected their honeypot, which they have dubbed KmsdBot. 
The research states "The malware attacks using UDP, TCP, HTTP POST, and GET, along with a command and control infrastructure (C2), which communicates over TCP." The botnet targets weak login credentials and then infects systems via an SSH connection.
The research can be found here:
KmsdBot: The Attack and Mine Malware

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Larry Cashdollar, Principal Security Intelligence Response Engineer from Akamai Technologies, joins Dave to talk about their research on "KmsdBot: The Attack and Mine Malware." Akamai's Security Research team has found a new malware that infected their honeypot, which they have dubbed KmsdBot. </p><p>The research states "The malware attacks using UDP, TCP, HTTP POST, and GET, along with a command and control infrastructure (C2), which communicates over TCP." The botnet targets weak login credentials and then infects systems via an SSH connection.</p><p>The research can be found here:</p><ul><li><a href="https://www.akamai.com/blog/security-research/kmdsbot-the-attack-and-mine-malware">KmsdBot: The Attack and Mine Malware</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1165</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[607da614-894d-11ee-a882-5ffdaf33fbed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7206967454.mp3?updated=1700667837" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Solution Spotlight: Simone Petrella is speaking with Tatyana Bolton from Google about ways to tackle the cyber talent gap. [Interview Selects]</title>
      <link>https://thecyberwire.com/podcasts/interview-selects/182/notes</link>
      <description>This interview from October 20th, 2023 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, our very own Simone Petrella is speaking with Tatyana Bolton from Google about ways to tackle the cyber talent gap.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 24 Nov 2023 08:00:00 -0000</pubDate>
      <itunes:title>Solution Spotlight: Simone Petrella is speaking with Tatyana Bolton from Google about ways to tackle the cyber talent gap. [Interview Selects]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>182</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This interview from October 20th, 2023 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, our very own Simone Petrella is speaking with Tatyana Bolton from Google about ways to tackle the cyber talent gap.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This interview from October 20th, 2023 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, our very own Simone Petrella is speaking with Tatyana Bolton from Google about ways to tackle the cyber talent gap.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1462</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d212074c-88b3-11ee-9d28-f77fc28ab953]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9160870017.mp3?updated=1700601865" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cops in the catfish game. [Hacking Humans Goes to the Movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/24/notes</link>
      <description>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie: Chicago P.D.


Rick's clip from the movie: The Imitation Game



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 23 Nov 2023 08:10:00 -0000</pubDate>
      <itunes:title>Cops in the catfish game. [Hacking Humans Goes to the Movies]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>24</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie: Chicago P.D.


Rick's clip from the movie: The Imitation Game



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Dave's clip from the movie: <a href="https://www.youtube.com/watch?v=n7KrUo7ZehA">Chicago P.D.</a>
</li>
<li>Rick's clip from the movie: <a href="https://www.imdb.com/title/tt2084970/">The Imitation Game</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1758</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[830d8246-88a1-11ee-a8c8-9be3a6700c14]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1867900454.mp3?updated=1700580462" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>On the eve of the holiday season, officials in many countries issue warnings and take action against cybercrime. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1953/notes</link>
      <description>CISA issues joint Cybersecurity Advisory on Citrix Bleed. Law enforcement takes down "pig butchering" operations. Altman will return to OpenAI. Israeli honeypots deployed during the war. A renaissance in electronic warfare. And a response in the form of countermeasures. Ihab Shraim, Chief Technology Officer at CSC, shares how the growing popularity of AI is giving cybercriminals a new avenue to take advantage of some of the largest companies in the world. And online safety during the holidays. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/223

Selected reading.
CISA issues joint Cybersecurity Advisory on Citrix Bleed. (CyberWire)
Cyber Scam Organization Disrupted Through Seizure of Nearly $9M in Crypto (U.S. Department of Justice)
China Rounds Up 31,000 Suspects in Sweeping ‘Pig-Butchering’ Crackdown (Wall Street Journal)
OpenAI Says Sam Altman to Return as CEO (Wall Street Journal)
Altman Agrees to Internal Investigation Upon Return to OpenAI (Information)
Sam Altman, OpenAI Board Open Talks to Negotiate His Possible Return (Bloomberg)
Before Altman’s Ouster, OpenAI’s Board Was Divided and Feuding (New York Times)
Altman Argued With OpenAI Board Member Toner Before Ouster (Information)
The Invisible War in Ukraine Being Fought Over Radio Waves (New York Times)
Exclusive: This pizza box-sized equipment could be key to Ukraine keeping the lights on this winter (CNN)
Commercial Flights Are Experiencing 'Unthinkable' GPS Attacks and Nobody Knows What to Do (Vice)
Shopping securely on Black Friday (and beyond). (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 22 Nov 2023 21:10:00 -0000</pubDate>
      <itunes:title>On the eve of the holiday season, officials in many countries issue warnings and take action against cybercrime. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1953</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA issues joint Cybersecurity Advisory on Citrix Bleed. Law enforcement takes down "pig butchering" operations. Altman will return to OpenAI. Israeli honeypots deployed during the war. A renaissance in electronic warfare. And a response in the form of countermeasures. Ihab Shraim, Chief Technology Officer at CSC, shares how the growing popularity of AI is giving cybercriminals a new avenue to take advantage of some of the largest companies in the world. And online safety during the holidays. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/223

Selected reading.
CISA issues joint Cybersecurity Advisory on Citrix Bleed. (CyberWire)
Cyber Scam Organization Disrupted Through Seizure of Nearly $9M in Crypto (U.S. Department of Justice)
China Rounds Up 31,000 Suspects in Sweeping ‘Pig-Butchering’ Crackdown (Wall Street Journal)
OpenAI Says Sam Altman to Return as CEO (Wall Street Journal)
Altman Agrees to Internal Investigation Upon Return to OpenAI (Information)
Sam Altman, OpenAI Board Open Talks to Negotiate His Possible Return (Bloomberg)
Before Altman’s Ouster, OpenAI’s Board Was Divided and Feuding (New York Times)
Altman Argued With OpenAI Board Member Toner Before Ouster (Information)
The Invisible War in Ukraine Being Fought Over Radio Waves (New York Times)
Exclusive: This pizza box-sized equipment could be key to Ukraine keeping the lights on this winter (CNN)
Commercial Flights Are Experiencing 'Unthinkable' GPS Attacks and Nobody Knows What to Do (Vice)
Shopping securely on Black Friday (and beyond). (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA issues joint Cybersecurity Advisory on Citrix Bleed. Law enforcement takes down "pig butchering" operations. Altman will return to OpenAI. Israeli honeypots deployed during the war. A renaissance in electronic warfare. And a response in the form of countermeasures. Ihab Shraim, Chief Technology Officer at CSC, shares how the growing popularity of AI is giving cybercriminals a new avenue to take advantage of some of the largest companies in the world. And online safety during the holidays. </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/223</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/stories/9e8a4e04f63f4219b6deef5725055093/cisa-issues-joint-cybersecurity-advisory-on-citrix-bleed">CISA issues joint Cybersecurity Advisory on Citrix Bleed.</a> (CyberWire)</p><p><a href="https://www.justice.gov/opa/pr/cyber-scam-organization-disrupted-through-seizure-nearly-9m-crypto">Cyber Scam Organization Disrupted Through Seizure of Nearly $9M in Crypto</a> (U.S. Department of Justice)</p><p><a href="https://www.wsj.com/world/asia/china-rounds-up-31-000-suspects-in-sweeping-pig-butchering-crackdown-00af42f0">China Rounds Up 31,000 Suspects in Sweeping ‘Pig-Butchering’ Crackdown</a> (Wall Street Journal)</p><p><a href="https://www.wsj.com/tech/openai-says-sam-altman-to-return-as-ceo-766349a5">OpenAI Says Sam Altman to Return as CEO</a> (Wall Street Journal)</p><p><a href="https://www.theinformation.com/articles/breaking-sam-altman-to-return-as-openai-ceo?rc=piqru4">Altman Agrees to Internal Investigation Upon Return to OpenAI</a> (Information)</p><p><a href="https://www.bloomberg.com/news/articles/2023-11-21/altman-openai-board-open-talks-to-negotiate-his-possible-return">Sam Altman, OpenAI Board Open Talks to Negotiate His Possible Return</a> (Bloomberg)</p><p><a href="https://www.nytimes.com/2023/11/21/technology/openai-altman-board-fight.html">Before Altman’s Ouster, OpenAI’s Board Was Divided and Feuding</a> (New York Times)</p><p><a href="https://www.theinformation.com/articles/altman-argued-with-openai-board-member-toner-before-ouster?rc=piqru4">Altman Argued With OpenAI Board Member Toner Before Ouster</a> (Information)</p><p><a href="https://www.nytimes.com/2023/11/19/technology/russia-ukraine-electronic-warfare-drone-signals.html">The Invisible War in Ukraine Being Fought Over Radio Waves</a> (New York Times)</p><p><a href="https://www.cnn.com/2023/11/21/politics/ukraine-power-grid-equipment-cisco/index.html">Exclusive: This pizza box-sized equipment could be key to Ukraine keeping the lights on this winter</a> (CNN)</p><p><a href="https://www.vice.com/en/article/m7bk3v/commercial-flights-are-experiencing-unthinkable-gps-attacks-and-nobody-knows-what-to-do">Commercial Flights Are Experiencing 'Unthinkable' GPS Attacks and Nobody Knows What to Do</a> (Vice)</p><p><a href="https://thecyberwire.com/stories/975cf484199f453d86281cc2959506cd/shopping-securely-on-black-friday-and-beyond">Shopping securely on Black Friday (and beyond).</a> (CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1384</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[15533e40-2b53-11ee-9c79-472ec47bf11d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1409273940.mp3?updated=1700685260" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Threat actors with mixed motives: from the political to the financial.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1952/notes</link>
      <description>OpenAI's continuing turmoil. Crypto firm sustains API attack. Konni campaign phishes with a Russian document as bait. LockBit's third-party compromise of Canadian government personnel data. Ukraine removes senior security officials under suspicion of graft. Dave Bittner sits down with Steve Winterfeld from Akamai to discuss emerging threats in the financial services sector. And Idaho National Laboratory sustains data breach.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/222

Selected reading.
Company that created ChatGPT is thrown into turmoil after Microsoft hires its ousted CEO (AP News)
The Doomed Mission Behind Sam Altman’s Shock Ouster From OpenAI (Bloomberg)
Briefing: OpenAI Execs to Continue Discussions With Altman, Board: Memo (The Information)
OpenAI in ‘Intense Discussions’ to Quell Potential Staff Mutiny (Bloomberg)
Microsoft Wants to Work With Altman, No Matter What, Says CEO (Bloomberg)
Briefing: Microsoft CEO Nadella Says Altman Could End Up at Microsoft or OpenAI; Board Governance Should Change (The Information)
Sam Altman's AI 'mission continues' at Microsoft, future of OpenAI and ChatGPT uncertain (ZDNET)
OpenAI’s Customers Consider Defecting to Anthropic, Microsoft, Google (The Information)
OpenAI’s Board Approached Anthropic About Merger (The Information)
The Vast Majority of OpenAI Employees Ask the Board to Resign (The Information)
Konni Campaign Distributed Via Malicious Document (Fortinet Blog) 
Ukraine sacks top cyber defence officials amid graft probe (Reuters)
Two top Ukrainian cyber officials dismissed amid embezzlement probe (Record)
Ukraine fires top cybersecurity officials (TechCrunch)
Ukraine-Russia war: Ukraine sacks 'corrupt' cyber defence chiefs (The Telegraph)
Kronos Research halts trading amid $25M API key hack investigation (Cointelegraph)
Kronos Research Loses $26 Million in Unauthorized API Access Incident (Bitcoin News)
Canadian government discloses data breach after contractor hacks (BleepingComputer)
Idaho National Laboratory experiences massive data breach; employee information leaked online (East Idaho News)
Detailed data on employees of U.S. national security lab leak online (CyberScoop)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Nov 2023 21:10:00 -0000</pubDate>
      <itunes:title>Threat actors with mixed motives: from the political to the financial.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1952</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>OpenAI's continuing turmoil. Crypto firm sustains API attack. Konni campaign phishes with a Russian document as bait. LockBit's third-party compromise of Canadian government personnel data. Ukraine removes senior security officials under suspicion of graft. Dave Bittner sits down with Steve Winterfeld from Akamai to discuss emerging threats in the financial services sector. And Idaho National Laboratory sustains data breach.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/222

Selected reading.
Company that created ChatGPT is thrown into turmoil after Microsoft hires its ousted CEO (AP News)
The Doomed Mission Behind Sam Altman’s Shock Ouster From OpenAI (Bloomberg)
Briefing: OpenAI Execs to Continue Discussions With Altman, Board: Memo (The Information)
OpenAI in ‘Intense Discussions’ to Quell Potential Staff Mutiny (Bloomberg)
Microsoft Wants to Work With Altman, No Matter What, Says CEO (Bloomberg)
Briefing: Microsoft CEO Nadella Says Altman Could End Up at Microsoft or OpenAI; Board Governance Should Change (The Information)
Sam Altman's AI 'mission continues' at Microsoft, future of OpenAI and ChatGPT uncertain (ZDNET)
OpenAI’s Customers Consider Defecting to Anthropic, Microsoft, Google (The Information)
OpenAI’s Board Approached Anthropic About Merger (The Information)
The Vast Majority of OpenAI Employees Ask the Board to Resign (The Information)
Konni Campaign Distributed Via Malicious Document (Fortinet Blog) 
Ukraine sacks top cyber defence officials amid graft probe (Reuters)
Two top Ukrainian cyber officials dismissed amid embezzlement probe (Record)
Ukraine fires top cybersecurity officials (TechCrunch)
Ukraine-Russia war: Ukraine sacks 'corrupt' cyber defence chiefs (The Telegraph)
Kronos Research halts trading amid $25M API key hack investigation (Cointelegraph)
Kronos Research Loses $26 Million in Unauthorized API Access Incident (Bitcoin News)
Canadian government discloses data breach after contractor hacks (BleepingComputer)
Idaho National Laboratory experiences massive data breach; employee information leaked online (East Idaho News)
Detailed data on employees of U.S. national security lab leak online (CyberScoop)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>OpenAI's continuing turmoil. Crypto firm sustains API attack. Konni campaign phishes with a Russian document as bait. LockBit's third-party compromise of Canadian government personnel data. Ukraine removes senior security officials under suspicion of graft. Dave Bittner sits down with Steve Winterfeld from Akamai to discuss emerging threats in the financial services sector. And Idaho National Laboratory sustains data breach.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/222</p><p><br></p><h2>Selected reading.</h2><p><a href="https://apnews.com/article/altman-ai-chatgpt-leadership-microsoft-a110b173c3eff4a374992017f05cd45a?">Company that created ChatGPT is thrown into turmoil after Microsoft hires its ousted CEO</a> (AP News)</p><p><a href="https://www.bloomberg.com/news/articles/2023-11-20/sam-altman-openai-latest-inside-his-shock-firing-by-the-board">The Doomed Mission Behind Sam Altman’s Shock Ouster From OpenAI</a> (Bloomberg)</p><p><a href="https://www.theinformation.com/briefings/openai-execs-to-continue-discussions-with-altman-board-memo">Briefing: OpenAI Execs to Continue Discussions With Altman, Board: Memo</a> (The Information)</p><p><a href="https://www.bloomberg.com/news/articles/2023-11-21/openai-in-intense-discussions-to-unify-company-memo-says">OpenAI in ‘Intense Discussions’ to Quell Potential Staff Mutiny</a> (Bloomberg)</p><p><a href="https://www.bloomberg.com/news/articles/2023-11-20/microsoft-ceo-signals-willingness-to-have-altman-rejoin-opena">Microsoft Wants to Work With Altman, No Matter What, Says CEO</a> (Bloomberg)</p><p><a href="https://www.theinformation.com/briefings/microsoft-ceo-nadella-altman-microsoft-or-openai-board-governance">Briefing: Microsoft CEO Nadella Says Altman Could End Up at Microsoft or OpenAI; Board Governance Should Change</a> (The Information)</p><p><a href="https://www.zdnet.com/article/sam-altmans-ai-mission-continues-at-microsoft-future-of-openai-and-chatgpt-uncertain/">Sam Altman's AI 'mission continues' at Microsoft, future of OpenAI and ChatGPT uncertain</a> (ZDNET)</p><p><a href="https://www.theinformation.com/articles/openais-customers-consider-defecting-to-anthropic-google-cohere">OpenAI’s Customers Consider Defecting to Anthropic, Microsoft, Google</a> (The Information)</p><p><a href="https://www.theinformation.com/articles/openai-approached-anthropic-about-merger">OpenAI’s Board Approached Anthropic About Merger</a> (The Information)</p><p><a href="https://www.theinformation.com/articles/the-vast-majority-of-openai-employees-ask-the-board-to-resign">The Vast Majority of OpenAI Employees Ask the Board to Resign</a> (The Information)</p><p><a href="https://www.fortinet.com/blog/threat-research/konni-campaign-distributed-via-malicious-document">Konni Campaign Distributed Via Malicious Document</a> (Fortinet Blog) </p><p><a href="https://www.reuters.com/world/europe/top-ukrainian-cyber-defence-officials-sacked-amid-corruption-probe-2023-11-20/">Ukraine sacks top cyber defence officials amid graft probe</a> (Reuters)</p><p><a href="https://therecord.media/two-ukraine-cyber-officials-dismissed-amid-embezzlement-probe">Two top Ukrainian cyber officials dismissed amid embezzlement probe</a> (Record)</p><p><a href="https://techcrunch.com/2023/11/20/ukraine-fires-senior-cybersecurity-officials-ssscip/">Ukraine fires top cybersecurity officials</a> (TechCrunch)</p><p><a href="https://www.telegraph.co.uk/world-news/2023/11/20/ukraine-russia-war-news-live-putin-zelensky-latest/">Ukraine-Russia war: Ukraine sacks 'corrupt' cyber defence chiefs</a> (The Telegraph)</p><p><a href="https://cointelegraph.com/news/kronos-research-halts-trading-25-m-hack-investigation">Kronos Research halts trading amid $25M API key hack investigation</a> (Cointelegraph)</p><p><a href="https://news.bitcoin.com/kronos-research-loses-26-million-in-unauthorized-api-access-incident/">Kronos Research Loses $26 Million in Unauthorized API Access Incident</a> (Bitcoin News)</p><p><a href="https://www.bleepingcomputer.com/news/security/canadian-government-discloses-data-breach-after-contractor-hacks/">Canadian government discloses data breach after contractor hacks</a> (BleepingComputer)</p><p><a href="https://www.eastidahonews.com/2023/11/idaho-national-laboratory-experiences-massive-data-breach-employee-information-leaked-online/">Idaho National Laboratory experiences massive data breach; employee information leaked online</a> (East Idaho News)</p><p><a href="https://cyberscoop.com/idaho-national-laboratory-siegedsec/">Detailed data on employees of U.S. national security lab leak online</a> (CyberScoop)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1355</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[15c3c1a6-2b53-11ee-9c79-93c93df17672]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5872913456.mp3?updated=1700597142" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fortunes of commerce in Silicon Valley; fortunes of war on the banks of the Dnipro.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1951/notes</link>
      <description>Leadership turmoil at OpenAI. Citrix Bleed vulnerability implicated in ransomware attacks. QakBot seems to have a successor. The FSB deploys LitterDrifter in cyberespionage against Ukraine. Russian security firm says China and North Korea are the source of most cyberattacks against Russia. Privateers and auxiliaries engage targets of opportunity. Ann Johnson from Afternoon Cyber Tea talks about leading edge cyber innovation with Nadav Zafrir. And alleged war crimes may include cyber operations conducted in support of other, conventional, kinetic war crimes.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/221

Selected reading.
OpenAI announces leadership transition (OpenAI)
A statement from Microsoft Chairman and CEO Satya Nadella (The Official Microsoft Blog)
A timeline of Sam Altman’s ouster from OpenAI and Microsoft appointment (Reuters) 
Sam Altman leaves OpenAI: Everything you need to know (Computing)
OpenAI Employees Threaten to Quit Unless Board Resigns (Wall Street Journal)
Sam Altman to Join Microsoft Following OpenAI Ouster (Wall Street Journal)
Dozens of Staffers Quit OpenAI After Sutskever Says Altman Won’t Return (The Information)
AI to accelerate your security defenses (IBM)
OpenAI’s Board Set Back the Promise of Artificial Intelligence (The Information)
A New AI Lexicon: Existential Risk (AI Now)
Hackers Are Exploiting a Flaw in Citrix Software Despite Fix (Bloomberg)
Medusa ransomware gang claims Toyota Financial Services hack (Security Affairs) 
CitrixBleed Vulnerability Exploitation Suspected in Toyota Ransomware Attack (SecurityWeek) 
Yamaha and WellLife Network confirm cyber incidents after ransomware gang claims attacks (Record)
Are DarkGate and PikaBot the New QakBot? (Cofense)
Decrypting Danger: Check Point Research deep-dive into cyber espionage tactics by Russian-origin attackers targeting Ukrainian entities (Check Point Blog)
Malware Spotlight - Into the Trash: Analyzing LitterDrifter (Check Point Research) 
Russian APT Gamaredon uses USB worm LitterDrifter against Ukraine (Security Affairs) 
Russian Cyber Espionage Group Deploys LitterDrifter USB Worm in Targeted Attacks (The Hacker News) 
Remarks by Assistant Secretary Graham Steele at the Federal Insurance Office and NYU Stern Volatility and Risk Institute Conference on Catastrophic Cyber Risk and a Potential Federal Insurance Response (U.S. Department of the Treasury) 
Russian analysts point finger at China, North Korea over cyber activity (Record) 
How Pro-Ukrainian Hackers Have Undermined Russia's War Every Step Of The Way (WorldCrunch)
Ukraine says it has evidence of 109,000 Russian war crimes (POLITICO)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 20 Nov 2023 21:00:00 -0000</pubDate>
      <itunes:title>Fortunes of commerce in Silicon Valley; fortunes of war on the banks of the Dnipro.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1951</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Leadership turmoil at OpenAI. Citrix Bleed vulnerability implicated in ransomware attacks. QakBot seems to have a successor. The FSB deploys LitterDrifter in cyberespionage against Ukraine. Russian security firm says China and North Korea are the source of most cyberattacks against Russia. Privateers and auxiliaries engage targets of opportunity. Ann Johnson from Afternoon Cyber Tea talks about leading edge cyber innovation with Nadav Zafrir. And alleged war crimes may include cyber operations conducted in support of other, conventional, kinetic war crimes.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/221

Selected reading.
OpenAI announces leadership transition (OpenAI)
A statement from Microsoft Chairman and CEO Satya Nadella (The Official Microsoft Blog)
A timeline of Sam Altman’s ouster from OpenAI and Microsoft appointment (Reuters) 
Sam Altman leaves OpenAI: Everything you need to know (Computing)
OpenAI Employees Threaten to Quit Unless Board Resigns (Wall Street Journal)
Sam Altman to Join Microsoft Following OpenAI Ouster (Wall Street Journal)
Dozens of Staffers Quit OpenAI After Sutskever Says Altman Won’t Return (The Information)
AI to accelerate your security defenses (IBM)
OpenAI’s Board Set Back the Promise of Artificial Intelligence (The Information)
A New AI Lexicon: Existential Risk (AI Now)
Hackers Are Exploiting a Flaw in Citrix Software Despite Fix (Bloomberg)
Medusa ransomware gang claims Toyota Financial Services hack (Security Affairs) 
CitrixBleed Vulnerability Exploitation Suspected in Toyota Ransomware Attack (SecurityWeek) 
Yamaha and WellLife Network confirm cyber incidents after ransomware gang claims attacks (Record)
Are DarkGate and PikaBot the New QakBot? (Cofense)
Decrypting Danger: Check Point Research deep-dive into cyber espionage tactics by Russian-origin attackers targeting Ukrainian entities (Check Point Blog)
Malware Spotlight - Into the Trash: Analyzing LitterDrifter (Check Point Research) 
Russian APT Gamaredon uses USB worm LitterDrifter against Ukraine (Security Affairs) 
Russian Cyber Espionage Group Deploys LitterDrifter USB Worm in Targeted Attacks (The Hacker News) 
Remarks by Assistant Secretary Graham Steele at the Federal Insurance Office and NYU Stern Volatility and Risk Institute Conference on Catastrophic Cyber Risk and a Potential Federal Insurance Response (U.S. Department of the Treasury) 
Russian analysts point finger at China, North Korea over cyber activity (Record) 
How Pro-Ukrainian Hackers Have Undermined Russia's War Every Step Of The Way (WorldCrunch)
Ukraine says it has evidence of 109,000 Russian war crimes (POLITICO)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Leadership turmoil at OpenAI. Citrix Bleed vulnerability implicated in ransomware attacks. QakBot seems to have a successor. The FSB deploys LitterDrifter in cyberespionage against Ukraine. Russian security firm says China and North Korea are the source of most cyberattacks against Russia. Privateers and auxiliaries engage targets of opportunity. Ann Johnson from Afternoon Cyber Tea talks about leading edge cyber innovation with Nadav Zafrir. And alleged war crimes may include cyber operations conducted in support of other, conventional, kinetic war crimes.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/221</p><p><br></p><h2>Selected reading.</h2><p><a href="https://openai.com/blog/openai-announces-leadership-transition?ref=thestack.technology">OpenAI announces leadership transition</a> (OpenAI)</p><p><a href="https://blogs.microsoft.com/blog/2023/11/17/a-statement-from-microsoft-chairman-and-ceo-satya-nadella/">A statement from Microsoft Chairman and CEO Satya Nadella</a> (The Official Microsoft Blog)</p><p><a href="https://www.reuters.com/technology/openai-ouster-microsoft-ai-research-ceo-sam-altmans-tumultuous-weekend-2023-11-20/">A timeline of Sam Altman’s ouster from OpenAI and Microsoft appointment</a> (Reuters) </p><p><a href="https://www.computing.co.uk/news/4148261/sam-altman-leaves-openai-everything">Sam Altman leaves OpenAI: Everything you need to know </a>(Computing)</p><p><a href="https://www.wsj.com/tech/openai-employees-threaten-to-quit-unless-board-resigns-bbd5cc86?">OpenAI Employees Threaten to Quit Unless Board Resigns</a> (Wall Street Journal)</p><p><a href="https://www.wsj.com/tech/ai/openai-leadership-hangs-in-balance-as-sam-altmans-counte-rebellion-gains-steam-47276fa8">Sam Altman to Join Microsoft Following OpenAI Ouster</a> (Wall Street Journal)</p><p><a href="https://www.theinformation.com/articles/dozens-of-staffers-quit-openai-after-sutskever-says-altman-wont-return">Dozens of Staffers Quit OpenAI After Sutskever Says Altman Won’t Return</a> (The Information)</p><p><a href="https://www.ibm.com/ai-cybersecurity">AI to accelerate your security defenses</a> (IBM)</p><p><a href="https://www.theinformation.com/articles/openais-board-set-back-the-promise-of-artificial-intelligence">OpenAI’s Board Set Back the Promise of Artificial Intelligence</a> (The Information)</p><p><a href="https://ainowinstitute.org/publication/a-new-ai-lexicon-existential-risk">A New AI Lexicon: Existential Risk</a> (AI Now)</p><p><a href="https://www.bloomberg.com/news/articles/2023-11-19/hackers-are-exploiting-a-flaw-in-citrix-software-despite-fix#xj4y7vzkg">Hackers Are Exploiting a Flaw in Citrix Software Despite Fix</a> (Bloomberg)</p><p><a href="https://securityaffairs.com/154319/data-breach/toyota-financial-services-medusa-ransomware.html">Medusa ransomware gang claims Toyota Financial Services hack</a> (Security Affairs) </p><p><a href="https://www.securityweek.com/citrixbleed-vulnerability-exploitation-suspected-in-toyota-ransomware-attack/">CitrixBleed Vulnerability Exploitation Suspected in Toyota Ransomware Attack</a> (SecurityWeek) </p><p><a href="https://therecord.media/yamaha-welllife-network-confirm-cyberattacks">Yamaha and WellLife Network confirm cyber incidents after ransomware gang claims attacks</a> (Record)</p><p><a href="https://cofense.com/blog/are-darkgate-and-pikabot-the-new-qakbot/">Are DarkGate and PikaBot the New QakBot?</a> (Cofense)</p><p><a href="https://blog.checkpoint.com/research/decrypting-danger-check-point-research-deep-dive-into-cyber-espionage-tactics-by-russian-origin-attackers-targeting-ukrainian-entities/">Decrypting Danger: Check Point Research deep-dive into cyber espionage tactics by Russian-origin attackers targeting Ukrainian entities</a> (Check Point Blog)</p><p><a href="https://research.checkpoint.com/2023/malware-spotlight-into-the-trash-analyzing-litterdrifter/">Malware Spotlight - Into the Trash: Analyzing LitterDrifter</a> (Check Point Research) </p><p><a href="https://securityaffairs.com/154362/apt/gamaredon-apt-litterdrifter-usb.html">Russian APT Gamaredon uses USB worm LitterDrifter against Ukraine</a> (Security Affairs) </p><p><a href="https://thehackernews.com/2023/11/russian-cyber-espionage-group-deploys.html">Russian Cyber Espionage Group Deploys LitterDrifter USB Worm in Targeted Attacks</a> (The Hacker News) </p><p><a href="https://home.treasury.gov/news/press-releases/jy1922">Remarks by Assistant Secretary Graham Steele at the Federal Insurance Office and NYU Stern Volatility and Risk Institute Conference on Catastrophic Cyber Risk and a Potential Federal Insurance Response</a> (U.S. Department of the Treasury) </p><p><a href="https://therecord.media/russian-analysts-point-finger-at-china">Russian analysts point finger at China, North Korea over cyber activity</a> (Record) </p><p><a href="https://worldcrunch.com/focus/hackers-ukraine-war">How Pro-Ukrainian Hackers Have Undermined Russia's War Every Step Of The Way</a> (WorldCrunch)</p><p><a href="https://www.politico.com/news/2023/11/18/ukraine-russia-war-crimes-00127936">Ukraine says it has evidence of 109,000 Russian war crimes</a> (POLITICO)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1153</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[15b3cbd4-2b53-11ee-9c79-c3e26149db8f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4983609168.mp3?updated=1700512454" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ian Blumenfeld: Swimming in a pool of cyber. [Research] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/176/notes</link>
      <description>Ian Blumenfeld, a Research Director from Two Six Technologies sits down to share his story with us. Ian begins his story by sharing he wanted to be a scientist, slowly he began to figure out and pinpoint more of what he liked about science, which ended up being math. Ian explains how math began to become a passion for him, and he eventually tried to pursue a career in it by teaching. He discovered teaching was not the thing for him and then started to move into the direction he wanted too, taking on more and more challenging roles until he landed where he is today. Ian says "If you're a smart person and you have skills in coding, you can swim. So it's okay to jump. It's okay to jump into the lake, you can swim. Something will get you out. You will have, you will be able to find a job. So, if you see something that looks cool, if you see something that advances you to the next stage of your career, if you have to take a little bit of a risk, it's okay." Ian wants to be someone who helped make the world a little better when it comes to code and wants to shares his desires and passions with the community. We thank Ian for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 19 Nov 2023 08:10:00 -0000</pubDate>
      <itunes:title>Ian Blumenfeld: Swimming in a pool of cyber. [Research] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>176</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ian Blumenfeld, a Research Director from Two Six Technologies sits down to share his story with us. Ian begins his story by sharing he wanted to be a scientist, slowly he began to figure out and pinpoint more of what he liked about science, which ended up being math. Ian explains how math began to become a passion for him, and he eventually tried to pursue a career in it by teaching. He discovered teaching was not the thing for him and then started to move into the direction he wanted too, taking on more and more challenging roles until he landed where he is today. Ian says "If you're a smart person and you have skills in coding, you can swim. So it's okay to jump. It's okay to jump into the lake, you can swim. Something will get you out. You will have, you will be able to find a job. So, if you see something that looks cool, if you see something that advances you to the next stage of your career, if you have to take a little bit of a risk, it's okay." Ian wants to be someone who helped make the world a little better when it comes to code and wants to shares his desires and passions with the community. We thank Ian for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ian Blumenfeld, a Research Director from Two Six Technologies sits down to share his story with us. Ian begins his story by sharing he wanted to be a scientist, slowly he began to figure out and pinpoint more of what he liked about science, which ended up being math. Ian explains how math began to become a passion for him, and he eventually tried to pursue a career in it by teaching. He discovered teaching was not the thing for him and then started to move into the direction he wanted too, taking on more and more challenging roles until he landed where he is today. Ian says "If you're a smart person and you have skills in coding, you can swim. So it's okay to jump. It's okay to jump into the lake, you can swim. Something will get you out. You will have, you will be able to find a job. So, if you see something that looks cool, if you see something that advances you to the next stage of your career, if you have to take a little bit of a risk, it's okay." Ian wants to be someone who helped make the world a little better when it comes to code and wants to shares his desires and passions with the community. We thank Ian for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>539</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[54e554da-858f-11ee-bdd8-07b542a334e2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1003410052.mp3?updated=1700256196" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Breaking Through: Securing the advancement of women in cybersecurity. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/56/notes</link>
      <description>In the dynamic field of cybersecurity, it’s well established that creating more opportunities for diversity and inclusion is essential for developing a highly skilled workforce. As an industry, we are starting to see the fruits of that labor, but there is a growing need for diverse leadership to nurture continuous innovation and resilience in cybersecurity.
As part of N2K’s 2023 Women in Cyber content series, we’re excited to host an engaging virtual panel discussion moderated by N2K's President Simone Petrella featuring insights, experiences, and strategies for advancing more women into leadership roles within the field.
This virtual discussion explores different areas including:

Navigating the Cybersecurity Landscape: Gain insights into our guests' career journeys, including mentors, challenges, and success, and how the evolving landscape may present different challenges and opportunities for women.

Building a Supportive Ecosystem: Explore the importance of mentorship, allyship, and a strong network in propelling women into leadership, and how to create an environment where everyone can thrive.

Closing the Gender Gap: Delve into actionable strategies and best practices for organizations to promote gender diversity in their cybersecurity leadership teams.

The Future of Cybersecurity Leadership: Gain a forward-looking perspective on the evolving role of women in shaping the future of cybersecurity.

This panel discussion is a must-listen event for professionals, leaders, and aspiring cybersecurity experts who are committed to promoting diversity and empowering women to excel in cybersecurity leadership. Don't miss the opportunity to be part of this inspiring conversation and drive positive change in the industry.
Panelists:


Abisoye Ajayi, Cyber &amp; Analytics Manager at Tulsa Innovation Labs


Koma Gandy, VP, Leadership &amp; Business at Skillsoft


Lauren Zabierek, Sr. Advisor at CISA


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 19 Nov 2023 06:10:00 -0000</pubDate>
      <itunes:title>Breaking Through: Securing the advancement of women in cybersecurity. [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>56</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In the dynamic field of cybersecurity, it’s well established that creating more opportunities for diversity and inclusion is essential for developing a highly skilled workforce. As an industry, we are starting to see the fruits of that labor, but there is a growing need for diverse leadership to nurture continuous innovation and resilience in cybersecurity.
As part of N2K’s 2023 Women in Cyber content series, we’re excited to host an engaging virtual panel discussion moderated by N2K's President Simone Petrella featuring insights, experiences, and strategies for advancing more women into leadership roles within the field.
This virtual discussion explores different areas including:

Navigating the Cybersecurity Landscape: Gain insights into our guests' career journeys, including mentors, challenges, and success, and how the evolving landscape may present different challenges and opportunities for women.

Building a Supportive Ecosystem: Explore the importance of mentorship, allyship, and a strong network in propelling women into leadership, and how to create an environment where everyone can thrive.

Closing the Gender Gap: Delve into actionable strategies and best practices for organizations to promote gender diversity in their cybersecurity leadership teams.

The Future of Cybersecurity Leadership: Gain a forward-looking perspective on the evolving role of women in shaping the future of cybersecurity.

This panel discussion is a must-listen event for professionals, leaders, and aspiring cybersecurity experts who are committed to promoting diversity and empowering women to excel in cybersecurity leadership. Don't miss the opportunity to be part of this inspiring conversation and drive positive change in the industry.
Panelists:


Abisoye Ajayi, Cyber &amp; Analytics Manager at Tulsa Innovation Labs


Koma Gandy, VP, Leadership &amp; Business at Skillsoft


Lauren Zabierek, Sr. Advisor at CISA


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In the dynamic field of cybersecurity, it’s well established that creating more opportunities for diversity and inclusion is essential for developing a highly skilled workforce. As an industry, we are starting to see the fruits of that labor, but there is a growing need for diverse leadership to nurture continuous innovation and resilience in cybersecurity.</p><p>As part of N2K’s 2023 Women in Cyber content series, we’re excited to host an engaging virtual panel discussion moderated by N2K's President <a href="https://www.linkedin.com/in/simone-petrella/">Simone Petrella</a> featuring insights, experiences, and strategies for advancing more women into leadership roles within the field.</p><p>This virtual discussion explores different areas including:</p><ul>
<li>Navigating the Cybersecurity Landscape: Gain insights into our guests' career journeys, including mentors, challenges, and success, and how the evolving landscape may present different challenges and opportunities for women.</li>
<li>Building a Supportive Ecosystem: Explore the importance of mentorship, allyship, and a strong network in propelling women into leadership, and how to create an environment where everyone can thrive.</li>
<li>Closing the Gender Gap: Delve into actionable strategies and best practices for organizations to promote gender diversity in their cybersecurity leadership teams.</li>
<li>The Future of Cybersecurity Leadership: Gain a forward-looking perspective on the evolving role of women in shaping the future of cybersecurity.</li>
</ul><p>This panel discussion is a must-listen event for professionals, leaders, and aspiring cybersecurity experts who are committed to promoting diversity and empowering women to excel in cybersecurity leadership. Don't miss the opportunity to be part of this inspiring conversation and drive positive change in the industry.</p><h3>Panelists:</h3><ul>
<li>
<a href="https://www.linkedin.com/in/abisoyeajayiakinfolarin/">Abisoye Ajayi</a>, Cyber &amp; Analytics Manager at Tulsa Innovation Labs</li>
<li>
<a href="https://www.linkedin.com/in/koma-gandy/">Koma Gandy</a>, VP, Leadership &amp; Business at Skillsoft</li>
<li>
<a href="https://www.linkedin.com/in/laurenz1010/">Lauren Zabierek</a>, Sr. Advisor at CISA</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3046</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[26fa4238-8567-11ee-b747-df8971ebe455]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3763809932.mp3?updated=1700077246" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The malicious YoroTrooper in disguise. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/307/notes</link>
      <description>Asheer Malhotra from Cisco Talos discussing their research and findings on "Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan." Cisco Talos' research team, released research attributing the work of the espionage-focused threat actor, YoroTrooper, to individuals based in Kazakhstan.
The research states "YoroTrooper attempts to obfuscate the origin of their operations, employing various tactics to make its malicious activity appear to emanate from Azerbaijan, such as using VPN exit nodes local to that region." They also found that the YoroTrooper continues to rely heavily on phishing emails that direct victims to credential harvesting sites.
The research can be found here:
Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Nov 2023 08:10:00 -0000</pubDate>
      <itunes:title>The malicious YoroTrooper in disguise. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>307</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Asheer Malhotra from Cisco Talos discussing their research and findings on "Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan." Cisco Talos' research team, released research attributing the work of the espionage-focused threat actor, YoroTrooper, to individuals based in Kazakhstan.
The research states "YoroTrooper attempts to obfuscate the origin of their operations, employing various tactics to make its malicious activity appear to emanate from Azerbaijan, such as using VPN exit nodes local to that region." They also found that the YoroTrooper continues to rely heavily on phishing emails that direct victims to credential harvesting sites.
The research can be found here:
Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Asheer Malhotra from Cisco Talos discussing their research and findings on "Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan." Cisco Talos' research team, released research attributing the work of the espionage-focused threat actor, YoroTrooper, to individuals based in Kazakhstan.</p><p>The research states "YoroTrooper attempts to obfuscate the origin of their operations, employing various tactics to make its malicious activity appear to emanate from Azerbaijan, such as using VPN exit nodes local to that region." They also found that the YoroTrooper continues to rely heavily on phishing emails that direct victims to credential harvesting sites.</p><p>The research can be found here:</p><ul><li><a href="https://blog.talosintelligence.com/attributing-yorotrooper/">Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>995</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[200e7b08-8588-11ee-a814-178b2be3c074]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1454075464.mp3?updated=1700158276" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AWS in Orbit: Securing the space frontier with AI cybersecurity solutions. [T-Minus AWS in Orbit]</title>
      <link>https://space.n2k.com/podcasts/t-minus/aws-in-orbit-2</link>
      <description>Buffy Wajvoda is the Global Leader for Space Solutions Architecture at AWS Aerospace and Satellite. In this extended conversation, we dive into how AWS is supporting cybersecurity in the space domain. You can learn more at AWS re:Invent.
AWS in Orbit is a podcast collaboration between N2K and AWS to offer listeners an in-depth look at the transformative intersection of cloud computing, space technologies, and generative AI. You can learn more about AWS in Orbit at space.n2k.com/aws.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.
Selected Reading
AWS re:Invent
The security attendee’s guide to AWS re:Invent 2023- AWS Blog
Viasat Deploys Resilient Tactical Edge Capability with AWS- YouTube
How We Sent an AWS Snowcone into Orbit- AWS Blog
How to improve your security incident response processes with Jupyter notebooks- AWS Blog 
Supporting security assessors in the Canadian public sector with AWS and Deloitte- AWS Blog
Establishing hybrid connectivity within a Canadian Centre for Cyber Security Medium Cloud reference architecture- AWS Blog  
Evolving cyber threats demand new security approaches – The benefits of a unified and global IT/OT SOC- AWS Blog
Audience Survey
We want to hear from you! Please complete our short survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.
Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Nov 2023 08:00:00 -0000</pubDate>
      <itunes:title>AWS in Orbit: Securing the space frontier with AI cybersecurity solutions. [T-Minus AWS in Orbit]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bbc88b9e-83e2-11ee-b347-1f11a29a2876/image/Wajvoda_Instagram.png?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>We dive into space cybersecurity challenges, opportunities, and what’s over the horizon with AWS, generative AI, and space tech with Buffy Wajvoda.</itunes:subtitle>
      <itunes:summary>Buffy Wajvoda is the Global Leader for Space Solutions Architecture at AWS Aerospace and Satellite. In this extended conversation, we dive into how AWS is supporting cybersecurity in the space domain. You can learn more at AWS re:Invent.
AWS in Orbit is a podcast collaboration between N2K and AWS to offer listeners an in-depth look at the transformative intersection of cloud computing, space technologies, and generative AI. You can learn more about AWS in Orbit at space.n2k.com/aws.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on LinkedIn and Instagram.
Selected Reading
AWS re:Invent
The security attendee’s guide to AWS re:Invent 2023- AWS Blog
Viasat Deploys Resilient Tactical Edge Capability with AWS- YouTube
How We Sent an AWS Snowcone into Orbit- AWS Blog
How to improve your security incident response processes with Jupyter notebooks- AWS Blog 
Supporting security assessors in the Canadian public sector with AWS and Deloitte- AWS Blog
Establishing hybrid connectivity within a Canadian Centre for Cyber Security Medium Cloud reference architecture- AWS Blog  
Evolving cyber threats demand new security approaches – The benefits of a unified and global IT/OT SOC- AWS Blog
Audience Survey
We want to hear from you! Please complete our short survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.
Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><a href="https://www.linkedin.com/in/buffy-wajvoda/">Buffy Wajvoda</a> is the Global Leader for Space Solutions Architecture at<a href="https://aws.amazon.com/aerospace-and-satellite/?trk=93f4ad4b-7c45-4116-9ee5-131ebf634f40&amp;sc_channel=el"> AWS Aerospace and Satellite</a>. In this extended conversation, we dive into how AWS is supporting cybersecurity in the space domain. You can learn more at <a href="https://reinvent.awsevents.com/">AWS re:Invent</a>.</p><p>AWS in Orbit is a podcast collaboration between N2K and AWS to offer listeners an in-depth look at the transformative intersection of cloud computing, space technologies, and generative AI. You can learn more about AWS in Orbit at <a href="https://space.n2k.com/aws">space.n2k.com/aws</a>.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our weekly intelligence roundup, <a href="https://space.n2k.com/newsletters/signals-and-space"><em>Signals and Space</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow T-Minus on <a href="https://www.linkedin.com/company/n2k-space/">LinkedIn</a> and <a href="https://www.instagram.com/n2kspace/">Instagram</a>.</p><h2>Selected Reading</h2><p><a href="https://reinvent.awsevents.com/">AWS re:Invent</a></p><p><a href="https://aws.amazon.com/blogs/security/the-security-attendees-guide-to-aws-reinvent-2023/">The security attendee’s guide to AWS re:Invent 2023- AWS Blog</a></p><p><a href="https://www.youtube.com/watch?v=oUHbLYaqBJg">Viasat Deploys Resilient Tactical Edge Capability with AWS- YouTube</a></p><p><a href="https://aws.amazon.com/blogs/aws/how-we-sent-an-aws-snowcone-into-orbit/">How We Sent an AWS Snowcone into Orbit- AWS Blog</a></p><p><a href="https://aws.amazon.com/blogs/security/how-to-improve-your-security-incident-response-processes-with-jupyter-notebooks/">How to improve your security incident response processes with Jupyter notebooks- AWS Blog</a> </p><p><a href="https://aws.amazon.com/blogs/publicsector/supporting-security-assessors-in-the-canadian-public-sector-with-aws-and-deloitte/">Supporting security assessors in the Canadian public sector with AWS and Deloitte- AWS Blog</a></p><p><a href="https://aws.amazon.com/blogs/publicsector/establishing-hybrid-connectivity-within-a-canadian-centre-for-cyber-security-medium-cloud-reference-architecture/">Establishing hybrid connectivity within a Canadian Centre for Cyber Security Medium Cloud reference architecture- AWS Blog</a>  </p><p><a href="https://aws.amazon.com/blogs/security/evolving-cyber-threats-demand-new-security-approaches-the-benefits-of-a-unified-and-global-it-ot-soc/">Evolving cyber threats demand new security approaches – The benefits of a unified and global IT/OT SOC- AWS Blog</a></p><h2>Audience Survey</h2><p>We want to hear from you! Please complete our <a href="https://www.surveymonkey.com/r/BL5NFPW">short survey</a>. It’ll help us get better and deliver you the most mission-critical space intel every day.</p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/ung56qbvknfbj9z2">media kit</a>. Contact us at <a href="mailto:space@n2k.com">space@n2k.com</a> to request more info.</p><h2>Want to join us for an interview?</h2><p>Please send your pitch to <a href="mailto:space-editor@n2k.com">space-editor@n2k.com</a> and include your name, affiliation, and topic proposal.</p><p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1996</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bbc88b9e-83e2-11ee-b347-1f11a29a2876]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9461458106.mp3?updated=1712266845" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber escalation in a hybrid war, and some notes on the markets, both gray and C2C. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1950/notes</link>
      <description>Scattered Spider prompts warnings from CISA and the FBI. Phobos ransomware is an affiliate crimeware-as-a-service program. A "hack-for-hire" contractor. “Scama” in the C2C market. Our guest is Lee Clark from the RH-ISAC with a look at Holiday Season Cyber Threat Trends. Tim Eades from Cyber Mentor Fund shares recent trends in cyber venture capital, with tips on finding a good match. And the tempo of cyber operations in Russia's hybrid war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/220

Selected reading.
FBI and CISA Release Advisory on Scattered Spider Group (Cybersecurity and Infrastructure Security Agency | CISA) 
FBI warns on Scattered Spider hackers, urges victims to come forward (Reuters) 
U.S. officials urge more information sharing on prolific cybercrime group (CyberScoop) 
A deep dive into Phobos ransomware, recently deployed by 8Base group (Cisco Talos Blog) 
Understanding the Phobos affiliate structure and activity (Cisco Talos Blog)
Elephant Hunting | Inside an Indian Hack-For-Hire Group (SentinelOne) 
How an Indian startup hacked the world (Reuters) 
Scama: Uncovering the Dark Marketplace for Phishing Kits (Vade Secure)
Ukraine Tracks a Record Number of Cyber Incidents During War (Bank Info Security) 
Russia will target other countries for web attacks, Ukraine cyber defence chief warns (The Irish Times) 
Sandworm Linked to Attack on Danish Critical Infrastructure (Infosecurity Magazine) 
Why cyber war readiness is critical for democracies (Help Net Security) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 17 Nov 2023 21:10:00 -0000</pubDate>
      <itunes:title>Cyber escalation in a hybrid war, and some notes on the markets, both gray and C2C. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1950</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Scattered Spider prompts warnings from CISA and the FBI. Phobos ransomware is an affiliate crimeware-as-a-service program. A "hack-for-hire" contractor. “Scama” in the C2C market. Our guest is Lee Clark from the RH-ISAC with a look at Holiday Season Cyber Threat Trends. Tim Eades from Cyber Mentor Fund shares recent trends in cyber venture capital, with tips on finding a good match. And the tempo of cyber operations in Russia's hybrid war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/220

Selected reading.
FBI and CISA Release Advisory on Scattered Spider Group (Cybersecurity and Infrastructure Security Agency | CISA) 
FBI warns on Scattered Spider hackers, urges victims to come forward (Reuters) 
U.S. officials urge more information sharing on prolific cybercrime group (CyberScoop) 
A deep dive into Phobos ransomware, recently deployed by 8Base group (Cisco Talos Blog) 
Understanding the Phobos affiliate structure and activity (Cisco Talos Blog)
Elephant Hunting | Inside an Indian Hack-For-Hire Group (SentinelOne) 
How an Indian startup hacked the world (Reuters) 
Scama: Uncovering the Dark Marketplace for Phishing Kits (Vade Secure)
Ukraine Tracks a Record Number of Cyber Incidents During War (Bank Info Security) 
Russia will target other countries for web attacks, Ukraine cyber defence chief warns (The Irish Times) 
Sandworm Linked to Attack on Danish Critical Infrastructure (Infosecurity Magazine) 
Why cyber war readiness is critical for democracies (Help Net Security) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Scattered Spider prompts warnings from CISA and the FBI. Phobos ransomware is an affiliate crimeware-as-a-service program. A "hack-for-hire" contractor. “Scama” in the C2C market. Our guest is Lee Clark from the RH-ISAC with a look at Holiday Season Cyber Threat Trends. Tim Eades from Cyber Mentor Fund shares recent trends in cyber venture capital, with tips on finding a good match. And the tempo of cyber operations in Russia's hybrid war.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/220</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/news-events/alerts/2023/11/16/fbi-and-cisa-release-advisory-scattered-spider-group">FBI and CISA Release Advisory on Scattered Spider Group</a> (Cybersecurity and Infrastructure Security Agency | CISA) </p><p><a href="https://www.reuters.com/technology/cybersecurity/fbi-warns-scattered-spider-hackers-urges-victims-come-forward-2023-11-16/">FBI warns on Scattered Spider hackers, urges victims to come forward</a> (Reuters) </p><p><a href="https://cyberscoop.com/fbi-scattered-spider-investigation/?tpl=cy">U.S. officials urge more information sharing on prolific cybercrime group</a> (CyberScoop) </p><p><a href="https://blog.talosintelligence.com/deep-dive-into-phobos-ransomware/">A deep dive into Phobos ransomware, recently deployed by 8Base group</a> (Cisco Talos Blog) </p><p><a href="https://blog.talosintelligence.com/understanding-the-phobos-affiliate-structure/">Understanding the Phobos affiliate structure and activity</a> (Cisco Talos Blog)</p><p><a href="https://www.sentinelone.com/labs/elephant-hunting-inside-an-indian-hack-for-hire-group/">Elephant Hunting | Inside an Indian Hack-For-Hire Group</a> (SentinelOne) </p><p><a href="https://www.reuters.com/investigates/special-report/usa-hackers-appin/">How an Indian startup hacked the world</a> (Reuters) </p><p><a href="https://www.vadesecure.com/en/blog/scama">Scama: Uncovering the Dark Marketplace for Phishing Kits</a> (Vade Secure)</p><p><a href="https://www.bankinfosecurity.com/ukraine-tracks-record-number-cyber-incidents-during-war-a-23606">Ukraine Tracks a Record Number of Cyber Incidents During War</a> (Bank Info Security) </p><p><a href="https://www.irishtimes.com/business/2023/11/17/russia-will-target-other-countries-for-web-attacks-ukraine-cyber-defence-chief-warns/">Russia will target other countries for web attacks, Ukraine cyber defence chief warns </a>(The Irish Times) </p><p><a href="https://www.infosecurity-magazine.com/news/russian-sandworm-attack-danish/">Sandworm Linked to Attack on Danish Critical Infrastructure</a> (Infosecurity Magazine) </p><p><a href="https://www.helpnetsecurity.com/2023/11/17/global-cyber-war-readiness/">Why cyber war readiness is critical for democracies</a> (Help Net Security) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1874</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[15035100-2b53-11ee-9c79-eb9d4791f09f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1915791656.mp3?updated=1700254263" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shopping during wartime? Focus, people.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1949/notes</link>
      <description>Cyber safety for the holidays. Using regulatory risk to pressure a ransomware victim. A call for regulatory action against a supply chain threat. Rhysida malware: a warning and a description. Extending local breaches in Google Workspace. Protestware in open-source products. GRU's Sandworm implicated in campaign against Danish electrical power providers. Jason Meller, Founder &amp; CEO of Kolide joins us as part of our sponsored Industry Voices segment to discuss the findings from The Shadow IT Report. In this Threat Vector segment, David Moulton sits down with Sama Manchanda, a consultant at Unit 42 to discuss the fascinating world of social engineering attacks. And donation scams: exploiting sympathy.
In this Threat Vector segment, David Moulton engages in an enlightening conversation with Sama Manchanda, a consultant at Unit 42. The duo embarks on an exploration of the fascinating world of social engineering attacks, delving into the distinct characteristics of phishing, smishing, and vishing.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/219

Threat Vector
Please share your thoughts with us for future Threat Vector segments by taking our brief survey.
To learn what is top of mind each month from the experts at Unit 42 sign up for their Threat Intel Bulletin. 

Selected reading.
New Visa Report Tells Consumers to Stay Alert this Holiday Shopping Season (Business Wire)
Ransomware gang files SEC complaint over victim’s undisclosed breach (BleepingComputer)
11-14-2023 EFF Letter to FTC re: Malware on Android TV Set-Top Boxes (EFF)
#StopRansomware: Rhysida Ransomware (Cybersecurity and Infrastructure Security Agency | CISA)
Investigating the New Rhysida Ransomware (Fortinet Blog)
Analyzing Rhysida Ransomware Intrusion (Fortinet Blog)
The Chain Reaction: New Methods for Extending Local Breaches in Google Workspace (Bitdefender)
Protestware taps npm to call out wars in Ukraine, Gaza (ReversingLabs)
Russia's Sandworm Linked to Unprecedented Danish Energy Hack (Bloomberg).
Russian Hackers Linked to 'Largest Ever Cyber Attack' on Danish Critical Infrastructure (The Hacker News)
Denmark hit with largest cyberattack on record (Cybernews)
Attackers Exploit Crisis for Fraudulent Crypto Donations (Abnormal)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 16 Nov 2023 21:10:00 -0000</pubDate>
      <itunes:title>Shopping during wartime? Focus, people.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1949</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Cyber safety for the holidays. Using regulatory risk to pressure a ransomware victim. A call for regulatory action against a supply chain threat. Rhysida malware: a warning and a description. Extending local breaches in Google Workspace. Protestware in open-source products. GRU's Sandworm implicated in campaign against Danish electrical power providers. Jason Meller, Founder &amp; CEO of Kolide joins us as part of our sponsored Industry Voices segment to discuss the findings from The Shadow IT Report. In this Threat Vector segment, David Moulton sits down with Sama Manchanda, a consultant at Unit 42 to discuss the fascinating world of social engineering attacks. And donation scams: exploiting sympathy.
In this Threat Vector segment, David Moulton engages in an enlightening conversation with Sama Manchanda, a consultant at Unit 42. The duo embarks on an exploration of the fascinating world of social engineering attacks, delving into the distinct characteristics of phishing, smishing, and vishing.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/219

Threat Vector
Please share your thoughts with us for future Threat Vector segments by taking our brief survey.
To learn what is top of mind each month from the experts at Unit 42 sign up for their Threat Intel Bulletin. 

Selected reading.
New Visa Report Tells Consumers to Stay Alert this Holiday Shopping Season (Business Wire)
Ransomware gang files SEC complaint over victim’s undisclosed breach (BleepingComputer)
11-14-2023 EFF Letter to FTC re: Malware on Android TV Set-Top Boxes (EFF)
#StopRansomware: Rhysida Ransomware (Cybersecurity and Infrastructure Security Agency | CISA)
Investigating the New Rhysida Ransomware (Fortinet Blog)
Analyzing Rhysida Ransomware Intrusion (Fortinet Blog)
The Chain Reaction: New Methods for Extending Local Breaches in Google Workspace (Bitdefender)
Protestware taps npm to call out wars in Ukraine, Gaza (ReversingLabs)
Russia's Sandworm Linked to Unprecedented Danish Energy Hack (Bloomberg).
Russian Hackers Linked to 'Largest Ever Cyber Attack' on Danish Critical Infrastructure (The Hacker News)
Denmark hit with largest cyberattack on record (Cybernews)
Attackers Exploit Crisis for Fraudulent Crypto Donations (Abnormal)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber safety for the holidays. Using regulatory risk to pressure a ransomware victim. A call for regulatory action against a supply chain threat. Rhysida malware: a warning and a description. Extending local breaches in Google Workspace. Protestware in open-source products. GRU's Sandworm implicated in campaign against Danish electrical power providers. Jason Meller, Founder &amp; CEO of Kolide joins us as part of our sponsored Industry Voices segment to discuss the findings from The Shadow IT Report. In this Threat Vector segment, David Moulton sits down with Sama Manchanda, a consultant at Unit 42 to discuss the fascinating world of social engineering attacks. And donation scams: exploiting sympathy.</p><p>In this Threat Vector segment, David Moulton engages in an enlightening conversation with Sama Manchanda, a consultant at Unit 42. The duo embarks on an exploration of the fascinating world of social engineering attacks, delving into the distinct characteristics of phishing, smishing, and vishing.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/219</p><p><br></p><h2>Threat Vector</h2><p>Please share your thoughts with us for future Threat Vector segments by taking our <a href="https://www.surveymonkey.com/r/N2K_TV_p">brief survey</a>.</p><p>To learn what is top of mind each month from the experts at Unit 42 sign up for their <a href="https://start.paloaltonetworks.com/unit42-threat-intel-bulletin.html">Threat Intel Bulletin</a>. </p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.businesswire.com/news/home/20231116325184/en/New-Visa-Report-Tells-Consumers-to-Stay-Alert-this-Holiday-Shopping-Season">New Visa Report Tells Consumers to Stay Alert this Holiday Shopping Season</a> (Business Wire)</p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-gang-files-sec-complaint-over-victims-undisclosed-breach/#google_vignette">Ransomware gang files SEC complaint over victim’s undisclosed breach</a> (BleepingComputer)</p><p><a href="https://www.eff.org/document/11-14-2023-eff-letter-ftc-re-malware-android-tv-set-top-boxes">11-14-2023 EFF Letter to FTC re: Malware on Android TV Set-Top Boxes</a> (EFF)</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-319a">#StopRansomware: Rhysida Ransomware</a> (Cybersecurity and Infrastructure Security Agency | CISA)</p><p><a href="https://www.fortinet.com/blog/threat-research/investigating-the-new-rhysida-ransomware">Investigating the New Rhysida Ransomware</a> (Fortinet Blog)</p><p><a href="https://www.fortinet.com/content/dam/fortinet/assets/threat-reports/rhysida-ransomware-intrusion.pdf">Analyzing Rhysida Ransomware Intrusion</a> (Fortinet Blog)</p><p><a href="https://www.bitdefender.com/blog/businessinsights/the-chain-reaction-new-methods-for-extending-local-breaches-in-google-workspace/">The Chain Reaction: New Methods for Extending Local Breaches in Google Workspace</a> (Bitdefender)</p><p><a href="https://www.reversinglabs.com/blog/protestware-taps-npm-to-call-out-wars-in-ukraine-gaza">Protestware taps npm to call out wars in Ukraine, Gaza</a> (ReversingLabs)</p><p><a href="https://www.bloomberg.com/news/newsletters/2023-11-15/russia-s-sandworm-linked-to-unprecedented-danish-energy-hack?srnd=premium">Russia's Sandworm Linked to Unprecedented Danish Energy Hack</a> (Bloomberg).</p><p><a href="https://thehackernews.com/2023/11/russian-hackers-launch-largest-ever.html">Russian Hackers Linked to 'Largest Ever Cyber Attack' on Danish Critical Infrastructure</a> (The Hacker News)</p><p><a href="https://cybernews.com/news/denmark-cyberattack-energy-infrastructure-sandworm/">Denmark hit with largest cyberattack on record</a> (Cybernews)</p><p><a href="https://abnormalsecurity.com/blog/attackers-exploit-middle-east-crisis-solicit-cryptocurrency-donations">Attackers Exploit Crisis for Fraudulent Crypto Donations</a> (Abnormal)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1778</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[15436ede-2b53-11ee-9c79-df97370bdf63]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4339373640.mp3?updated=1700166813" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Examining the current state of security orchestration. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/48/notes</link>
      <description>In this episode of CyberWire-X, N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by guest Rohit Dhamankar, Fortra's Vice President of Product Strategy, and Hash Table member Steve Winterfeld, Akamai's Advisory CISO to discuss CISO initiatives such as vendor consolidation, automation, and attack surface management as a way to determine if it’s possible to achieve both increased security maturity and decreased operational load. This session covers common mistakes when adopting security technologies, including the pros and cons of AI, and how to better collaborate together.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 16 Nov 2023 18:10:00 -0000</pubDate>
      <itunes:title>Examining the current state of security orchestration. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>48</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode of CyberWire-X, N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by guest Rohit Dhamankar, Fortra's Vice President of Product Strategy, and Hash Table member Steve Winterfeld, Akamai's Advisory CISO to discuss CISO initiatives such as vendor consolidation, automation, and attack surface management as a way to determine if it’s possible to achieve both increased security maturity and decreased operational load. This session covers common mistakes when adopting security technologies, including the pros and cons of AI, and how to better collaborate together.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of CyberWire-X, N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by guest Rohit Dhamankar, Fortra's Vice President of Product Strategy, and Hash Table member Steve Winterfeld, Akamai's Advisory CISO to discuss CISO initiatives such as vendor consolidation, automation, and attack surface management as a way to determine if it’s possible to achieve both increased security maturity and decreased operational load. This session covers common mistakes when adopting security technologies, including the pros and cons of AI, and how to better collaborate together.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1873</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[72198f92-84ab-11ee-b894-5fd10ed5e48f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8147755117.mp3?updated=1700072969" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A quick Patch Tuesday retrospective, and then a look at what the threat groups are up to.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1948/notes</link>
      <description>A look back at Patch Tuesday. BlackCat uses malicious Google ads. Social engineering in the third quarter of 2023. Are small businesses in denial about ransomware? Molerats have some new tools. Israel turns to NSO Group's Pegasus to search for hostages taken by Hamas. Tim Starks from the Washington Post examines the potential aftermath of a Russian group hitting a Chinese bank. In our Learning Layer, Sam Meisenberg helps a student understand and create a strategy for the CISSP CAT. And a cyberespionage campaign is attributed to Russia's SVR.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/218

Selected reading.
Adobe Releases Security Updates for Multiple Products | CISA (Cybersecurity and Infrastructure Security Agency CISA) 
Fortinet Releases Security Updates for FortiClient and FortiGate (Cybersecurity and Infrastructure Security Agency | CISA) 
VMware Releases Security Update for Cloud Director Appliance (Cybersecurity and Infrastructure Security Agency | CISA) 
CISA Releases Two Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency | CISA) 
Microsoft Releases October 2023 Security Updates (Cybersecurity and Infrastructure Security Agency | CISA) 
Microsoft November 2023 Patch Tuesday fixes 5 zero-days, 58 flaws (BleepingComputer)
SAP Security Patch Day for November 2023 (Onapsis)
The ALPHV/BlackCat Ransomware Gang is Using Google Ads to Conduct… (eSentire)
Q3 2023 Threat Landscape Report: Social Engineering Takes Center Stage (Kroll) 
OpenText Cybersecurity 2023 Global Ransomware Survey: The risk perception gap (OpenText Blogs)
TA402 Uses Complex IronWind Infection Chains to Target Middle East-Based Government Entities (Proofpoint) 
Israel's NSO unleashes controversial spyware in Gaza conflict (Axios) 
APT29 Attacks Embassies Using CVE-2023-38831 (NCSCC)
Cyber-espionage operation on embassies linked to Russia’s Cozy Bear hackers (Record)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 15 Nov 2023 21:10:00 -0000</pubDate>
      <itunes:title>A quick Patch Tuesday retrospective, and then a look at what the threat groups are up to.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1948</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>A look back at Patch Tuesday. BlackCat uses malicious Google ads. Social engineering in the third quarter of 2023. Are small businesses in denial about ransomware? Molerats have some new tools. Israel turns to NSO Group's Pegasus to search for hostages taken by Hamas. Tim Starks from the Washington Post examines the potential aftermath of a Russian group hitting a Chinese bank. In our Learning Layer, Sam Meisenberg helps a student understand and create a strategy for the CISSP CAT. And a cyberespionage campaign is attributed to Russia's SVR.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/218

Selected reading.
Adobe Releases Security Updates for Multiple Products | CISA (Cybersecurity and Infrastructure Security Agency CISA) 
Fortinet Releases Security Updates for FortiClient and FortiGate (Cybersecurity and Infrastructure Security Agency | CISA) 
VMware Releases Security Update for Cloud Director Appliance (Cybersecurity and Infrastructure Security Agency | CISA) 
CISA Releases Two Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency | CISA) 
Microsoft Releases October 2023 Security Updates (Cybersecurity and Infrastructure Security Agency | CISA) 
Microsoft November 2023 Patch Tuesday fixes 5 zero-days, 58 flaws (BleepingComputer)
SAP Security Patch Day for November 2023 (Onapsis)
The ALPHV/BlackCat Ransomware Gang is Using Google Ads to Conduct… (eSentire)
Q3 2023 Threat Landscape Report: Social Engineering Takes Center Stage (Kroll) 
OpenText Cybersecurity 2023 Global Ransomware Survey: The risk perception gap (OpenText Blogs)
TA402 Uses Complex IronWind Infection Chains to Target Middle East-Based Government Entities (Proofpoint) 
Israel's NSO unleashes controversial spyware in Gaza conflict (Axios) 
APT29 Attacks Embassies Using CVE-2023-38831 (NCSCC)
Cyber-espionage operation on embassies linked to Russia’s Cozy Bear hackers (Record)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A look back at Patch Tuesday. BlackCat uses malicious Google ads. Social engineering in the third quarter of 2023. Are small businesses in denial about ransomware? Molerats have some new tools. Israel turns to NSO Group's Pegasus to search for hostages taken by Hamas. Tim Starks from the Washington Post examines the potential aftermath of a Russian group hitting a Chinese bank. In our Learning Layer, Sam Meisenberg helps a student understand and create a strategy for the CISSP CAT. And a cyberespionage campaign is attributed to Russia's SVR.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/218</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/news-events/alerts/2023/11/14/adobe-releases-security-updates-multiple-products">Adobe Releases Security Updates for Multiple Products | CISA</a> (Cybersecurity and Infrastructure Security Agency CISA) </p><p><a href="https://www.cisa.gov/news-events/alerts/2023/11/14/fortinet-releases-security-updates-forticlient-and-fortigate">Fortinet Releases Security Updates for FortiClient and FortiGate</a> (Cybersecurity and Infrastructure Security Agency | CISA) </p><p><a href="https://www.cisa.gov/news-events/alerts/2023/11/14/vmware-releases-security-update-cloud-director-appliance">VMware Releases Security Update for Cloud Director Appliance</a> (Cybersecurity and Infrastructure Security Agency | CISA) </p><p><a href="https://www.cisa.gov/news-events/alerts/2023/11/14/cisa-releases-two-industrial-control-systems-advisories">CISA Releases Two Industrial Control Systems Advisories</a> (Cybersecurity and Infrastructure Security Agency | CISA) </p><p><a href="https://www.cisa.gov/news-events/alerts/2023/11/14/microsoft-releases-october-2023-security-updates">Microsoft Releases October 2023 Security Updates</a> (Cybersecurity and Infrastructure Security Agency | CISA) </p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-november-2023-patch-tuesday-fixes-5-zero-days-58-flaws/">Microsoft November 2023 Patch Tuesday fixes 5 zero-days, 58 flaws</a> (BleepingComputer)</p><p><a href="https://onapsis.com/blog/sap-security-patch-day-november-2023">SAP Security Patch Day for November 2023</a> (Onapsis)</p><p><a href="https://www.esentire.com/blog/the-notorious-alphv-blackcat-ransomware-gang-is-attacking-corporations-and-public-entities-using-google-ads-laced-with-malware-warns-esentire">The ALPHV/BlackCat Ransomware Gang is Using Google Ads to Conduct…</a> (eSentire)</p><p><a href="https://www.kroll.com/en/insights/publications/cyber/threat-intelligence-reports/q3-2023-threat-landscape-report-social-engineering">Q3 2023 Threat Landscape Report: Social Engineering Takes Center Stage</a> (Kroll) </p><p><a href="https://blogs.opentext.com/opentext-cybersecurity-2023-global-ransomware-survey-the-risk-perception-gap/">OpenText Cybersecurity 2023 Global Ransomware Survey: The risk perception gap</a> (OpenText Blogs)</p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/ta402-uses-complex-ironwind-infection-chains-target-middle-east-based-government">TA402 Uses Complex IronWind Infection Chains to Target Middle East-Based Government Entities</a> (Proofpoint) </p><p><a href="https://www.axios.com/2023/11/14/pegasus-nso-hamas-israel-spyware">Israel's NSO unleashes controversial spyware in Gaza conflict</a> (Axios) </p><p><a href="https://www.rnbo.gov.ua/files/2023_YEAR/CYBERCENTER/november/APT29%20attacks%20Embassies%20using%20CVE-2023-38831%20-%20report%20en.pdf">APT29 Attacks Embassies Using CVE-2023-38831</a> (NCSCC)</p><p><a href="https://therecord.media/cyber-espionage-campaign-embassies-apt29-cozy-bear">Cyber-espionage operation on embassies linked to Russia’s Cozy Bear hackers</a> (Record)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1821</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[15635bd6-2b53-11ee-9c79-e367a9a83bda]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3291040237.mp3?updated=1700079478" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The cyber underworld is getting a bit faster and a lot looser, and the gangs may be drawing some unwelcome attention. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1947/notes</link>
      <description>CISA and the FBI issue an update on Royal Ransomware. A look at Smash-and-grab ransomware attacks as well as Cloud vulnerabilities. A pre-Black Friday look at card skimmers. Fences, and their place in organized cybercrime. DP World Australia restores port operations. Joe Carrigan on scammers taking advantage of the Bitrex crypto market being shut down. In our Industry Voices segment, Usama Houlila from CrossRealms International shares his insights on the pivotal role of AI in cybersecurity. And LockBit may be drawing unwelcome attention to itself. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/217

Selected reading.
#StopRansomware: Royal Ransomware (Cybersecurity and Infrastructure Security Agency | CISA) 
FBI: Royal ransomware asked 350 victims to pay $275 million (BleepingComputer) 
The Song Remains the Same: The 2023 Active Adversary Report for Security Practitioners (Sophos)
Why 93% of Security Leaders Say Cloud Security Requires Zero Trust Segmentation (Illumio Cybersecurity Blog)
Malwarebytes Labs Reveals 50% Uptick in Credit Card Skimming in Advance of the Holiday Shopping Season (PR Newswire) 
Credit card skimming on the rise for the holiday shopping season (Malwarebytes)
The Fencers: The Lynchpin of Organized Retail Crime Enterprise (Nisos)
DP World cyberattack blocks thousands of containers in ports (BleepingComputer)
Operations at Major Australian Ports Significantly Disrupted by Cyberattack (SecurityWeek) 
Australian Ports Recover From Cyber Incident (Bank Info Security)
DP World: Australia sites back online after cyber-attack (BBC News)
Australian ports resume some operations after major cyberattack (CNN)
Australia Cyberattack Leaves 30,000 Containers Stuck at Ports (Bloomberg) 
Hacking Gang Behind Attack on Largest Global Lender Says It Got Ransom Payment (Bloomberg)
Gang says ICBC paid ransom over hack that disrupted US Treasury market (Reuters) 
After a surprise cyberattack, the world's largest bank had to shuffle a USB stick around Manhattan to do business (PC Gamer)
WSJ News Exclusive | ICBC Hackers Used Methods Previously Flagged by U.S. Authorities (Wall Street Journal) 
Inside Wall Street's scramble after ICBC hack (Reuters) 
Did a ransomware gang mess up by attacking a U.S. arm of China’s biggest bank? (Washington Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Nov 2023 21:10:00 -0000</pubDate>
      <itunes:title>The cyber underworld is getting a bit faster and a lot looser, and the gangs may be drawing some unwelcome attention. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1947</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA and the FBI issue an update on Royal Ransomware. A look at Smash-and-grab ransomware attacks as well as Cloud vulnerabilities. A pre-Black Friday look at card skimmers. Fences, and their place in organized cybercrime. DP World Australia restores port operations. Joe Carrigan on scammers taking advantage of the Bitrex crypto market being shut down. In our Industry Voices segment, Usama Houlila from CrossRealms International shares his insights on the pivotal role of AI in cybersecurity. And LockBit may be drawing unwelcome attention to itself. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/217

Selected reading.
#StopRansomware: Royal Ransomware (Cybersecurity and Infrastructure Security Agency | CISA) 
FBI: Royal ransomware asked 350 victims to pay $275 million (BleepingComputer) 
The Song Remains the Same: The 2023 Active Adversary Report for Security Practitioners (Sophos)
Why 93% of Security Leaders Say Cloud Security Requires Zero Trust Segmentation (Illumio Cybersecurity Blog)
Malwarebytes Labs Reveals 50% Uptick in Credit Card Skimming in Advance of the Holiday Shopping Season (PR Newswire) 
Credit card skimming on the rise for the holiday shopping season (Malwarebytes)
The Fencers: The Lynchpin of Organized Retail Crime Enterprise (Nisos)
DP World cyberattack blocks thousands of containers in ports (BleepingComputer)
Operations at Major Australian Ports Significantly Disrupted by Cyberattack (SecurityWeek) 
Australian Ports Recover From Cyber Incident (Bank Info Security)
DP World: Australia sites back online after cyber-attack (BBC News)
Australian ports resume some operations after major cyberattack (CNN)
Australia Cyberattack Leaves 30,000 Containers Stuck at Ports (Bloomberg) 
Hacking Gang Behind Attack on Largest Global Lender Says It Got Ransom Payment (Bloomberg)
Gang says ICBC paid ransom over hack that disrupted US Treasury market (Reuters) 
After a surprise cyberattack, the world's largest bank had to shuffle a USB stick around Manhattan to do business (PC Gamer)
WSJ News Exclusive | ICBC Hackers Used Methods Previously Flagged by U.S. Authorities (Wall Street Journal) 
Inside Wall Street's scramble after ICBC hack (Reuters) 
Did a ransomware gang mess up by attacking a U.S. arm of China’s biggest bank? (Washington Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA and the FBI issue an update on Royal Ransomware. A look at Smash-and-grab ransomware attacks as well as Cloud vulnerabilities. A pre-Black Friday look at card skimmers. Fences, and their place in organized cybercrime. DP World Australia restores port operations. Joe Carrigan on scammers taking advantage of the Bitrex crypto market being shut down. In our Industry Voices segment, Usama Houlila from CrossRealms International shares his insights on the pivotal role of AI in cybersecurity. And LockBit may be drawing unwelcome attention to itself. </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/217</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-061a">#StopRansomware: Royal Ransomware</a> (Cybersecurity and Infrastructure Security Agency | CISA) </p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-royal-ransomware-asked-350-victims-to-pay-275-million/">FBI: Royal ransomware asked 350 victims to pay $275 million</a> (BleepingComputer) </p><p><a href="https://news.sophos.com/en-us/2023/11/14/active-adversary-for-security-practitioners/">The Song Remains the Same: The 2023 Active Adversary Report for Security Practitioners</a> (Sophos)</p><p><a href="https://www.illumio.com/blog/cloud-security-requires-zero-trust-segmentation">Why 93% of Security Leaders Say Cloud Security Requires Zero Trust Segmentation</a> (Illumio Cybersecurity Blog)</p><p><a href="https://www.prnewswire.com/news-releases/malwarebytes-labs-reveals-50-uptick-in-credit-card-skimming-in-advance-of-the-holiday-shopping-season-301986543.html">Malwarebytes Labs Reveals 50% Uptick in Credit Card Skimming in Advance of the Holiday Shopping Season</a> (PR Newswire) </p><p><a href="https://www.malwarebytes.com/blog/threat-intelligence/2023/11/credit-card-skimming-on-the-rise-for-the-holiday-shopping-season">Credit card skimming on the rise for the holiday shopping season</a> (Malwarebytes)</p><p><a href="https://6068438.fs1.hubspotusercontent-na1.net/hubfs/6068438/fencers-organized-retail-crime-research.pdf">The Fencers: The Lynchpin of Organized Retail Crime Enterprise</a> (Nisos)</p><p><a href="https://www.bleepingcomputer.com/news/security/dp-world-cyberattack-blocks-thousands-of-containers-in-ports/">DP World cyberattack blocks thousands of containers in ports</a> (BleepingComputer)</p><p><a href="https://www.securityweek.com/operations-at-major-australian-ports-significantly-disrupted-by-cyberattack/">Operations at Major Australian Ports Significantly Disrupted by Cyberattack</a> (SecurityWeek) </p><p><a href="https://www.bankinfosecurity.com/australian-ports-recover-from-cyber-incident-a-23582">Australian Ports Recover From Cyber Incident</a> (Bank Info Security)</p><p><a href="https://www.bbc.com/news/business-67400164">DP World: Australia sites back online after cyber-attack</a> (BBC News)</p><p><a href="https://www.cnn.com/2023/11/13/tech/australia-dp-world-cyberattack-ports-intl-hnk/index.html">Australian ports resume some operations after major cyberattack</a> (CNN)</p><p><a href="https://www.bloomberg.com/news/articles/2023-11-12/australian-port-operations-slowly-resume-after-cyberattack-on-dp">Australia Cyberattack Leaves 30,000 Containers Stuck at Ports</a> (Bloomberg) </p><p><a href="https://www.bloomberg.com/news/articles/2023-11-13/hacking-gang-says-it-was-paid-in-icbc-ransomware-attack?utm_source=google&amp;utm_medium=bd&amp;cmpId=google">Hacking Gang Behind Attack on Largest Global Lender Says It Got Ransom Payment</a> (Bloomberg)</p><p><a href="https://www.reuters.com/technology/cybersecurity/icbc-paid-ransom-after-hack-that-disrupted-markets-cybercriminals-say-2023-11-13/">Gang says ICBC paid ransom over hack that disrupted US Treasury market</a> (Reuters) </p><p><a href="https://www.pcgamer.com/after-a-surprise-cyberattack-the-worlds-largest-bank-had-to-shuffle-a-usb-stick-around-manhattan-to-do-business/">After a surprise cyberattack, the world's largest bank had to shuffle a USB stick around Manhattan to do business</a> (PC Gamer)</p><p><a href="https://www.wsj.com/finance/banking/icbc-hackers-used-methods-previously-flagged-by-u-s-authorities-7e131a82">WSJ News Exclusive | ICBC Hackers Used Methods Previously Flagged by U.S. Authorities</a> (Wall Street Journal) </p><p><a href="https://www.reuters.com/technology/cybersecurity/market-inside-wall-streets-scramble-after-icbc-hack-2023-11-13/">Inside Wall Street's scramble after ICBC hack</a> (Reuters) </p><p><a href="https://www.washingtonpost.com/politics/2023/11/14/did-ransomware-gang-mess-up-by-attacking-us-arm-chinas-biggest-bank/">Did a ransomware gang mess up by attacking a U.S. arm of China’s biggest bank?</a> (Washington Post)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1717</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[15d346d0-2b53-11ee-9c79-d34714a6a5e3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9489460182.mp3?updated=1699993768" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware and DDoS hit diverse sectors. The DDoS is a nuisance, the ransomware more serious.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1946/notes</link>
      <description>Australian ports are recovering from a cyberattack. SysAid is hit by Cl0p user Lace Tempest. Ransomware targets China's largest bank. LockBit doxes Boeing as Boeing hangs tough on paying ransom. Docker Engine for DDoS. Rick Howard looks at the SEC’s targeting of SolarWinds’ CISO. And Anonymous Sudan claims attacks on ChatGPT and Cloudflare.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/216

Selected reading.
Freight giant DP World recovers from cyber attack, but warns investigation and remediation is 'ongoing' (ABC)
DP World port operations in Australia recovering after cyber-attack (The Loadstar) 
Ransomware attack against China's largest bank. (CyberWire)
China's biggest lender ICBC hit by ransomware attack (Reuters)
Ransomware attack on ICBC disrupts trades in US Treasury market (Financial Times) 
Hackers Hit Wall Street Arm of Chinese Banking Giant ICBC (Wall Street Journal)
LockBit finally publishes its proof-of-hack as Boeing hangs tough. (CyberWire)
SysAid On-Prem Software CVE-2023-47246 Vulnerability (SysAid) 
Critical Vulnerability: SysAid CVE-2023-47246 (Huntress)
SysAid Zero-Day Vulnerability Exploited By Lace Tempest (Rapid7)
SysAid vulnerability exploited. (CyberWire)
OracleIV - A Dockerised DDoS Botnet (Cado Security)
Anonymous Sudan and OpenAI. (CyberWire)
Russia-Linked Hackers Claim Credit for OpenAI Outage This Week (Bloomberg) 
Major ChatGPT Outage Caused by DDoS Attack (SecurityWeek) 
Anonymous Sudan and Skynet claim Cloudflare DDoS takedown (Cyber Daily)
Cloudflare website downed by DDoS attack claimed by Anonymous Sudan (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 13 Nov 2023 21:10:00 -0000</pubDate>
      <itunes:title>Ransomware and DDoS hit diverse sectors. The DDoS is a nuisance, the ransomware more serious.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1946</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>Australian ports are recovering from a cyberattack. SysAid is hit by Cl0p user Lace Tempest. Ransomware targets China's largest bank. LockBit doxes Boeing as Boeing hangs tough on paying ransom. Docker Engine for DDoS. Rick Howard looks at the SEC’s targeting of SolarWinds’ CISO. And Anonymous Sudan claims attacks on ChatGPT and Cloudflare.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/216

Selected reading.
Freight giant DP World recovers from cyber attack, but warns investigation and remediation is 'ongoing' (ABC)
DP World port operations in Australia recovering after cyber-attack (The Loadstar) 
Ransomware attack against China's largest bank. (CyberWire)
China's biggest lender ICBC hit by ransomware attack (Reuters)
Ransomware attack on ICBC disrupts trades in US Treasury market (Financial Times) 
Hackers Hit Wall Street Arm of Chinese Banking Giant ICBC (Wall Street Journal)
LockBit finally publishes its proof-of-hack as Boeing hangs tough. (CyberWire)
SysAid On-Prem Software CVE-2023-47246 Vulnerability (SysAid) 
Critical Vulnerability: SysAid CVE-2023-47246 (Huntress)
SysAid Zero-Day Vulnerability Exploited By Lace Tempest (Rapid7)
SysAid vulnerability exploited. (CyberWire)
OracleIV - A Dockerised DDoS Botnet (Cado Security)
Anonymous Sudan and OpenAI. (CyberWire)
Russia-Linked Hackers Claim Credit for OpenAI Outage This Week (Bloomberg) 
Major ChatGPT Outage Caused by DDoS Attack (SecurityWeek) 
Anonymous Sudan and Skynet claim Cloudflare DDoS takedown (Cyber Daily)
Cloudflare website downed by DDoS attack claimed by Anonymous Sudan (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Australian ports are recovering from a cyberattack. SysAid is hit by Cl0p user Lace Tempest. Ransomware targets China's largest bank. LockBit doxes Boeing as Boeing hangs tough on paying ransom. Docker Engine for DDoS. Rick Howard looks at the SEC’s targeting of SolarWinds’ CISO. And Anonymous Sudan claims attacks on ChatGPT and Cloudflare.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/216</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.abc.net.au/news/2023-11-13/dp-world-deals-with-impact-of-cyber-attack/103097658">Freight giant DP World recovers from cyber attack, but warns investigation and remediation is 'ongoing'</a> (ABC)</p><p><a href="https://theloadstar.com/dp-world-port-operations-in-australia-recovering-after-cyber-attack/">DP World port operations in Australia recovering after cyber-attack</a> (The Loadstar) </p><p><a href="https://thecyberwire.com/stories/9b3431159f744ae291d2536a5a040675/ransomware-attack-against-chinas-largest-bank">Ransomware attack against China's largest bank.</a> (CyberWire)</p><p><a href="https://www.reuters.com/world/china/chinas-largest-bank-icbc-hit-by-ransomware-software-ft-2023-11-09/">China's biggest lender ICBC hit by ransomware attack</a> (Reuters)</p><p><a href="https://www.ft.com/content/8dd2446b-c8da-4854-9edc-bf841069ccb8">Ransomware attack on ICBC disrupts trades in US Treasury market</a> (Financial Times) </p><p><a href="https://www.wsj.com/finance/hackers-hit-u-s-arm-of-chinese-bank-e37768e6">Hackers Hit Wall Street Arm of Chinese Banking Giant ICBC</a> (Wall Street Journal)</p><p><a href="https://thecyberwire.com/stories/89655909b5654bc78a43391a0101ac34/boeing-versus-lockbit-handling-a-ransomware-attack">LockBit finally publishes its proof-of-hack as Boeing hangs tough.</a> (CyberWire)</p><p><a href="https://www.sysaid.com/blog/service-desk/on-premise-software-security-vulnerability-notification">SysAid On-Prem Software CVE-2023-47246 Vulnerability</a> (SysAid) </p><p><a href="https://www.huntress.com/blog/critical-vulnerability-sysaid-cve-2023-47246">Critical Vulnerability: SysAid CVE-2023-47246</a> (Huntress)</p><p><a href="https://www.rapid7.com/blog/post/2023/11/09/etr-cve-2023-47246-sysaid-zero-day-vulnerability-exploited-by-lace-tempest/">SysAid Zero-Day Vulnerability Exploited By Lace Tempest</a> (Rapid7)</p><p><a href="https://thecyberwire.com/stories/9f0390dc0ed6430fa61fac2c1851419c/sysaid-vulnerability-exploited">SysAid vulnerability exploited.</a> (CyberWire)</p><p><a href="https://www.cadosecurity.com/oracleiv-a-dockerised-ddos-botnet/">OracleIV - A Dockerised DDoS Botnet</a> (Cado Security)</p><p><a href="https://thecyberwire.com/stories/35d376880cd04fa28a6880168f2cd96f/anonymous-sudan-claims-attacks-on-chatgpt-and-cloudflare">Anonymous Sudan and OpenAI.</a> (CyberWire)</p><p><a href="https://www.bloomberg.com/news/articles/2023-11-09/russia-linked-hackers-claim-credit-for-openai-outage-this-week?">Russia-Linked Hackers Claim Credit for OpenAI Outage This Week</a> (Bloomberg) </p><p><a href="https://www.securityweek.com/major-chatgpt-outage-caused-by-ddos-attack/">Major ChatGPT Outage Caused by DDoS Attack</a> (SecurityWeek) </p><p><a href="https://www.cyberdaily.au/security/9803-anonymous-sudan-and-killnet-claim-cloudflare-ddos-takedown">Anonymous Sudan and Skynet claim Cloudflare DDoS takedown</a> (Cyber Daily)</p><p><a href="https://www.bleepingcomputer.com/news/technology/cloudflare-website-downed-by-ddos-attack-claimed-by-anonymous-sudan/">Cloudflare website downed by DDoS attack claimed by Anonymous Sudan</a> (BleepingComputer)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1657</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[15e3d8ce-2b53-11ee-9c79-d363f8b599b1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1611847764.mp3?updated=1699903418" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Grace Cassy: Actions speak louder than words. [Associate Fellow] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/175/notes</link>
      <description>Grace Cassy, and Associate Fellow from Ten Eleven Ventures sits down to share her career path, getting her to where she is now. Grace spent 10 years in the UK Diplomatic Service, working on global security policy in Asia, Europe, and the Americas. Earlier in her career she was an advisor to Prime Minister Tony Blair, specializing in Asia and national security. She also co-founded Epsilon Advisory Partners, a strategy and growth firm working with world-leading global technology companies and investors. Now she is a Co-founder at CyLon and is an Early Stage Investor in cybersecurity companies. She says "I think we probably don't need too many more words, but we definitely need a bit more action." We thank Grace for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 12 Nov 2023 08:10:00 -0000</pubDate>
      <itunes:title>Grace Cassy: Actions speak louder than words. [Associate Fellow] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>175</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Grace Cassy, and Associate Fellow from Ten Eleven Ventures sits down to share her career path, getting her to where she is now. Grace spent 10 years in the UK Diplomatic Service, working on global security policy in Asia, Europe, and the Americas. Earlier in her career she was an advisor to Prime Minister Tony Blair, specializing in Asia and national security. She also co-founded Epsilon Advisory Partners, a strategy and growth firm working with world-leading global technology companies and investors. Now she is a Co-founder at CyLon and is an Early Stage Investor in cybersecurity companies. She says "I think we probably don't need too many more words, but we definitely need a bit more action." We thank Grace for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Grace Cassy, and Associate Fellow from Ten Eleven Ventures sits down to share her career path, getting her to where she is now. Grace spent 10 years in the UK Diplomatic Service, working on global security policy in Asia, Europe, and the Americas. Earlier in her career she was an advisor to Prime Minister Tony Blair, specializing in Asia and national security. She also co-founded Epsilon Advisory Partners, a strategy and growth firm working with world-leading global technology companies and investors. Now she is a Co-founder at CyLon and is an Early Stage Investor in cybersecurity companies. She says "I think we probably don't need too many more words, but we definitely need a bit more action." We thank Grace for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>531</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[571151b4-7f59-11ee-b4bd-c7b19e969c94]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5974159305.mp3?updated=1699573356" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shields Ready for attacks against critical infrastructure. These may be indiscriminate, and they may be opportunistic.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1945/notes</link>
      <description>CISA, FEMA, and Shields Ready. Ransomware operators exploit 3rd-party tools. A Bittrex bankruptcy phishing campaign. Spammers abuse Google Forms quizzes. Imperial Kitten in action against Israeli targets. Iranian cyberattacks against Israel are called "reactive and opportunistic." In our sponsored Industry Voices segment, Adam Bateman from Push Security outlines how attackers are targeting cloud identities. Luke Vander Linden from RH-ISAC speaks with Target's Ryan Miller and Leah Schwartzman about the evolving fraud landscape retailers are facing with the holidays approaching. And Sandworm and Ukraine's power grid: 2022 attacks may foreshadow the winter of 2023 and 2024.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/215

Selected reading.
Shields Ready | CISA (Cybersecurity and Infrastructure Security Agency CISA) 
DHS Unveils New Shields Ready Campaign to Promote Critical Infrastructure Security and Resilience (FEMA) 
US Urges Critical Infrastructure Firms to Get “Shields Ready” (Infosecurity Magazine) 
US launches “Shields Ready” campaign to secure critical infrastructure (CSO Online) 
DHS Launches New Critical Infrastructure Security and Resilience Campaign (SecurityWeek) 
Ransomware Actors Continue to Gain Access through Third Parties and Legitimate System Tools (FBI) 
Phishing Attack Driven by Bittrex Bankruptcy (Abnormal) 
Spammers abuse Google Forms’ quiz to deliver scams (Cisco Talos Blog)
IMPERIAL KITTEN Deploys Novel Malware Families in Middle East-Focused Operations (CrowdStrike)
Microsoft shares threat intelligence at CYBERWARCON 2023 (Microsoft Security)
Iran and Hamas showed no signs of cyber coordination in run-up to war, researchers say (Washington Post) 
Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology (Mandiant)
Russian spies behind cyber attack on Ukraine power grid in 2022 - researchers (Reuters) 
Hackers Linked To Russian Intelligence Blamed For 2022 Ukraine Grid Disruption (RadioFreeEurope/RadioLiberty) 
Ukraine updates: Russia hacked Kyiv's power grid — report – DW – 11/09/2023 (Deutsche Welle) 
Russian Hackers Used OT Attack to Disrupt Power in Ukraine Amid Mass Missile Strikes (SecurityWeek) 
Energy security at forefront of NATO-Ukraine Council meeting (NATO)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 09 Nov 2023 21:10:00 -0000</pubDate>
      <itunes:title>Shields Ready for attacks against critical infrastructure. These may be indiscriminate, and they may be opportunistic.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1945</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA, FEMA, and Shields Ready. Ransomware operators exploit 3rd-party tools. A Bittrex bankruptcy phishing campaign. Spammers abuse Google Forms quizzes. Imperial Kitten in action against Israeli targets. Iranian cyberattacks against Israel are called "reactive and opportunistic." In our sponsored Industry Voices segment, Adam Bateman from Push Security outlines how attackers are targeting cloud identities. Luke Vander Linden from RH-ISAC speaks with Target's Ryan Miller and Leah Schwartzman about the evolving fraud landscape retailers are facing with the holidays approaching. And Sandworm and Ukraine's power grid: 2022 attacks may foreshadow the winter of 2023 and 2024.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/215

Selected reading.
Shields Ready | CISA (Cybersecurity and Infrastructure Security Agency CISA) 
DHS Unveils New Shields Ready Campaign to Promote Critical Infrastructure Security and Resilience (FEMA) 
US Urges Critical Infrastructure Firms to Get “Shields Ready” (Infosecurity Magazine) 
US launches “Shields Ready” campaign to secure critical infrastructure (CSO Online) 
DHS Launches New Critical Infrastructure Security and Resilience Campaign (SecurityWeek) 
Ransomware Actors Continue to Gain Access through Third Parties and Legitimate System Tools (FBI) 
Phishing Attack Driven by Bittrex Bankruptcy (Abnormal) 
Spammers abuse Google Forms’ quiz to deliver scams (Cisco Talos Blog)
IMPERIAL KITTEN Deploys Novel Malware Families in Middle East-Focused Operations (CrowdStrike)
Microsoft shares threat intelligence at CYBERWARCON 2023 (Microsoft Security)
Iran and Hamas showed no signs of cyber coordination in run-up to war, researchers say (Washington Post) 
Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology (Mandiant)
Russian spies behind cyber attack on Ukraine power grid in 2022 - researchers (Reuters) 
Hackers Linked To Russian Intelligence Blamed For 2022 Ukraine Grid Disruption (RadioFreeEurope/RadioLiberty) 
Ukraine updates: Russia hacked Kyiv's power grid — report – DW – 11/09/2023 (Deutsche Welle) 
Russian Hackers Used OT Attack to Disrupt Power in Ukraine Amid Mass Missile Strikes (SecurityWeek) 
Energy security at forefront of NATO-Ukraine Council meeting (NATO)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA, FEMA, and Shields Ready. Ransomware operators exploit 3rd-party tools. A Bittrex bankruptcy phishing campaign. Spammers abuse Google Forms quizzes. Imperial Kitten in action against Israeli targets. Iranian cyberattacks against Israel are called "reactive and opportunistic." In our sponsored Industry Voices segment, Adam Bateman from Push Security outlines how attackers are targeting cloud identities. Luke Vander Linden from RH-ISAC speaks with Target's Ryan Miller and Leah Schwartzman about the evolving fraud landscape retailers are facing with the holidays approaching. And Sandworm and Ukraine's power grid: 2022 attacks may foreshadow the winter of 2023 and 2024.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/215</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/shields-ready">Shields Ready | CISA</a> (Cybersecurity and Infrastructure Security Agency CISA) </p><p><a href="https://www.fema.gov/press-release/20231107/dhs-unveils-new-shields-ready-campaign-promote-critical-infrastructure">DHS Unveils New Shields Ready Campaign to Promote Critical Infrastructure Security and Resilience</a> (FEMA) </p><p><a href="https://www.infosecurity-magazine.com/news/us-critical-infrastructure-firms/">US Urges Critical Infrastructure Firms to Get “Shields Ready”</a> (Infosecurity Magazine) </p><p><a href="https://www.csoonline.com/article/1229409/us-launches-shields-ready-campaign-to-secure-critical-infrastructure.html">US launches “Shields Ready” campaign to secure critical infrastructure</a> (CSO Online) </p><p><a href="https://www.securityweek.com/dhs-launches-new-critical-infrastructure-security-and-resilience-campaign/">DHS Launches New Critical Infrastructure Security and Resilience Campaign</a> (SecurityWeek) </p><p><a href="https://www.aha.org/system/files/media/file/2023/11/bi-tlp-clear-pin-ransomware-actors-continue-to-gain-access-through-third-parties-and-legitimate-system-tools-11-7-23.pdf">Ransomware Actors Continue to Gain Access through Third Parties and Legitimate System Tools</a> (FBI) </p><p><a href="https://abnormalsecurity.com/blog/bittrex-phishing-attack">Phishing Attack Driven by Bittrex Bankruptcy</a> (Abnormal) </p><p><a href="https://blog.talosintelligence.com/google-forms-quiz-spam/">Spammers abuse Google Forms’ quiz to deliver scams</a> (Cisco Talos Blog)</p><p><a href="http://www.crowdstrike.com/blog/imperial-kitten-deploys-novel-malware-families/">IMPERIAL KITTEN Deploys Novel Malware Families in Middle East-Focused Operations</a> (CrowdStrike)</p><p><a href="https://www.microsoft.com/en-us/security/blog/2023/11/09/microsoft-shares-threat-intelligence-at-cyberwarcon-2023/">Microsoft shares threat intelligence at CYBERWARCON 2023</a> (Microsoft Security)</p><p><a href="https://www.washingtonpost.com/politics/2023/11/09/iran-hamas-showed-no-signs-cyber-coordination-run-up-war-researchers-say/">Iran and Hamas showed no signs of cyber coordination in run-up to war, researchers say</a> (Washington Post) </p><p><a href="https://www.mandiant.com/resources/blog/sandworm-disrupts-power-ukraine-operational-technology">Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology</a> (Mandiant)</p><p><a href="https://www.reuters.com/technology/cybersecurity/russian-spies-behind-cyberattack-ukrainian-power-grid-2022-researchers-2023-11-09/">Russian spies behind cyber attack on Ukraine power grid in 2022 - researchers</a> (Reuters) </p><p><a href="https://www.rferl.org/a/32677652.html">Hackers Linked To Russian Intelligence Blamed For 2022 Ukraine Grid Disruption</a> (RadioFreeEurope/RadioLiberty) </p><p><a href="https://www.dw.com/en/ukraine-updates-russia-hacked-kyivs-power-grid-report/live-67350458">Ukraine updates: Russia hacked Kyiv's power grid — report – DW – 11/09/2023</a> (Deutsche Welle) </p><p><a href="https://www.securityweek.com/russian-hackers-ot-attack-disrupted-power-in-ukraine-amid-mass-missile-strikes/">Russian Hackers Used OT Attack to Disrupt Power in Ukraine Amid Mass Missile Strikes</a> (SecurityWeek) </p><p><a href="https://www.nato.int/cps/en/natohq/news_219874.htm">Energy security at forefront of NATO-Ukraine Council meeting</a> (NATO)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2015</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[153220f2-2b53-11ee-9c79-b7c747a4bb3c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9515051931.mp3?updated=1699561596" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No major threats showed up in yesterday’s US elections, so now we can start thinking about the risk during the holidays. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1944/notes</link>
      <description>CISA claims "No credible threats" to yesterday's US elections. Criminals seek to profit from the .ai top level domain. A Singapore resort sustains a cyberattack. A look ahead at holiday cyber threats. A major Chinese cyberespionage effort against Cambodia. The four cyber phases of a hybrid war. Robert M. Lee from Dragos explains how outside forces affect OT and critical infrastructure security.  Our guest is Dan Neault of Imperva sharing how organizations are behind the eight-ball when relying upon real-time analytics. Cyber and electronic threats to space systems.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/214

Selected reading.
CISA Sees Smooth Election Day Operations, No ‘Credible’ Threats (Meritalk) 
The rise of .ai: cyber criminals (and Anguilla) look to profit (Netcraft) 
Singapore’s Marina Bay Sands Says It Was Hit in Data Breach (Bloomberg)
Marina Bay Sands discloses data breach impacting 665,000 customers (BleepingComputer)
Personal data of 665,000 Marina Bay Sands lifestyle rewards members accessed in data security breach (CNA)
Report Examines Cyber Threat Trends Facing Retail and Hospitality This Holiday Season (RH-ISAC)
Chinese APT Targeting Cambodian Government (Unit 42) 
Chinese cyberspies have widely penetrated networks of ally Cambodia (Washington Post) 
Cyber Escalation in Modern Conflict: Exploring Four Possible Phases of the Digital Battlefield (Flashpoint)
Cyber Security of Space Systems ‘Crucial,’ As US Space Force Official Notes Recent Attacks (Via Satellite)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 08 Nov 2023 21:10:00 -0000</pubDate>
      <itunes:title>No major threats showed up in yesterday’s US elections, so now we can start thinking about the risk during the holidays. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1944</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle/>
      <itunes:summary>CISA claims "No credible threats" to yesterday's US elections. Criminals seek to profit from the .ai top level domain. A Singapore resort sustains a cyberattack. A look ahead at holiday cyber threats. A major Chinese cyberespionage effort against Cambodia. The four cyber phases of a hybrid war. Robert M. Lee from Dragos explains how outside forces affect OT and critical infrastructure security.  Our guest is Dan Neault of Imperva sharing how organizations are behind the eight-ball when relying upon real-time analytics. Cyber and electronic threats to space systems.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/214

Selected reading.
CISA Sees Smooth Election Day Operations, No ‘Credible’ Threats (Meritalk) 
The rise of .ai: cyber criminals (and Anguilla) look to profit (Netcraft) 
Singapore’s Marina Bay Sands Says It Was Hit in Data Breach (Bloomberg)
Marina Bay Sands discloses data breach impacting 665,000 customers (BleepingComputer)
Personal data of 665,000 Marina Bay Sands lifestyle rewards members accessed in data security breach (CNA)
Report Examines Cyber Threat Trends Facing Retail and Hospitality This Holiday Season (RH-ISAC)
Chinese APT Targeting Cambodian Government (Unit 42) 
Chinese cyberspies have widely penetrated networks of ally Cambodia (Washington Post) 
Cyber Escalation in Modern Conflict: Exploring Four Possible Phases of the Digital Battlefield (Flashpoint)
Cyber Security of Space Systems ‘Crucial,’ As US Space Force Official Notes Recent Attacks (Via Satellite)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA claims "No credible threats" to yesterday's US elections. Criminals seek to profit from the .ai top level domain. A Singapore resort sustains a cyberattack. A look ahead at holiday cyber threats. A major Chinese cyberespionage effort against Cambodia. The four cyber phases of a hybrid war. Robert M. Lee from Dragos explains how outside forces affect OT and critical infrastructure security.  Our guest is Dan Neault of Imperva sharing how organizations are behind the eight-ball when relying upon real-time analytics. Cyber and electronic threats to space systems.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/214</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.meritalk.com/articles/cisa-sees-smooth-election-day-operations-no-credible-threats/">CISA Sees Smooth Election Day Operations, No ‘Credible’ Threats</a> (Meritalk) </p><p><a href="https://www.netcraft.com/blog/the-rise-of-ai-cyber-criminals-and-anguilla-look-to-profit/">The rise of .ai: cyber criminals (and Anguilla) look to profit</a> (Netcraft) </p><p><a href="https://www.bloomberg.com/news/articles/2023-11-07/singapore-s-marina-bay-sands-says-it-was-hit-in-data-breach#xj4y7vzkg">Singapore’s Marina Bay Sands Says It Was Hit in Data Breach</a> (Bloomberg)</p><p><a href="https://www.bleepingcomputer.com/news/security/marina-bay-sands-discloses-data-breach-impacting-665-000-customers/">Marina Bay Sands discloses data breach impacting 665,000 customers</a> (BleepingComputer)</p><p><a href="https://www.channelnewsasia.com/singapore/marina-bay-sands-mbs-customers-personal-data-security-breach-3902491">Personal data of 665,000 Marina Bay Sands lifestyle rewards members accessed in data security breach</a> (CNA)</p><p><a href="https://rhisac.org/press-release/2023-holiday-threats-report/">Report Examines Cyber Threat Trends Facing Retail and Hospitality This Holiday Season</a> (RH-ISAC)</p><p><a href="https://unit42.paloaltonetworks.com/chinese-apt-linked-to-cambodia-government-attacks/">Chinese APT Targeting Cambodian Government</a> (Unit 42) </p><p><a href="https://www.washingtonpost.com/politics/2023/11/08/cambodia-has-chinese-hacker-problem/">Chinese cyberspies have widely penetrated networks of ally Cambodia</a> (Washington Post) </p><p><a href="https://flashpoint.io/blog/four-phases-cyber-warfare/">Cyber Escalation in Modern Conflict: Exploring Four Possible Phases of the Digital Battlefield</a> (Flashpoint)</p><p><a href="https://www.satellitetoday.com/cybersecurity/2023/11/07/cyber-security-of-space-systems-crucial-as-us-space-force-official-notes-recent-attacks/">Cyber Security of Space Systems ‘Crucial,’ As US Space Force Official Notes Recent Attacks</a> (Via Satellite)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1629</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1573bb7a-2b53-11ee-9c79-cbe5fd889c3e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9325251692.mp3?updated=1699471212" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybercriminals at the service of the state, and an array of new underworld tools. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1943/notes</link>
      <description>Data brokers offer information on active US military personnel. Current BlueNoroff activity. A new Gootloader variant is active in the wild. Atlassian vulnerabilities actively exploited. The prevalence of breaches. Update on a Barracuda vulnerability. Hacktivism and the cyber course of the Hamas-Israel war. Bot-hunting in Ukraine. Microsoft’s Ann Johnson from Afternoon Cyber Tea speaks with Sharon Barber, Chief Information Officer at Lloyds Banking Group, about cyber trends in financial services. Ben Yelin looks at the ease of purchasing US military personnel data from data brokers And election security is in the news–an off-year election is an election nonetheless.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/213

Selected reading.
Researchers find sensitive personal data of US military personnel is for sale online (CNN)
How foreigners can buy data on US military members, for the right price (POLITICO)
GootBot - Gootloader's new approach to post-exploitation (Security Intelligence)
BlueNoroff strikes again with new macOS malware (Jamf)
GootBot - Gootloader's new approach to post-exploitation (Security Intelligence)
Rapid7-Observed Exploitation of Atlassian Confluence CVE-2023-22518 (Rapid7) 
Armis Research Finds One-Third of Global Organizations Experienced Multiple Security Breaches in Last 12 Months (Armis)
Technical analysis: Barracuda Email Security Gateway by Quentin Olagne (Vectra) 
Maccabi Tel Aviv basketball team website comes under cyber attack (The Jerusalem Post) 
The Digital Frontline of the Israel-Hamas Conflict Could Extend Long After the War (Inkstick) 
Five attack vectors that businesses should focus on in the wake of the Israel-Hamas war (SC Media) 
Israel’s cyber defense chief tells CNN he is concerned Iran could increase severity of its cyberattacks (CNN)
SBU blocks 76 bot farms with 3 mln fake accounts since start of full-scale war (Interfax-Ukraine) 
On Election Day, CISA and Partners Coordinate on Security Operations (Cybersecurity and Infrastructure Security Agency)
Cerby Releases “Threat Briefing: Social Media Security and Elections Volume II,” Providing a Detailed Analysis of Security Gaps in Social Media Platforms (Cerby)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Nov 2023 21:15:00 -0000</pubDate>
      <itunes:title>Cybercriminals at the service of the state, and an array of new underworld tools. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1943</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Data brokers offer information on active US military personnel. Current BlueNoroff activity. A new Gootloader variant is active in the wild. Atlassian vulnerabilities actively exploited. The prevalence of breaches. Update on a Barracuda vulnerability. Hacktivism and the cyber course of the Hamas-Israel war. Bot-hunting in Ukraine. Microsoft’s Ann Johnson from Afternoon Cyber Tea speaks with Sharon Barber, Chief Information Officer at Lloyds Banking Group, about cyber trends in financial services. Ben Yelin looks at the ease of purchasing US military personnel data from data brokers And election security is in the news–an off-year election is an election nonetheless.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/213

Selected reading.
Researchers find sensitive personal data of US military personnel is for sale online (CNN)
How foreigners can buy data on US military members, for the right price (POLITICO)
GootBot - Gootloader's new approach to post-exploitation (Security Intelligence)
BlueNoroff strikes again with new macOS malware (Jamf)
GootBot - Gootloader's new approach to post-exploitation (Security Intelligence)
Rapid7-Observed Exploitation of Atlassian Confluence CVE-2023-22518 (Rapid7) 
Armis Research Finds One-Third of Global Organizations Experienced Multiple Security Breaches in Last 12 Months (Armis)
Technical analysis: Barracuda Email Security Gateway by Quentin Olagne (Vectra) 
Maccabi Tel Aviv basketball team website comes under cyber attack (The Jerusalem Post) 
The Digital Frontline of the Israel-Hamas Conflict Could Extend Long After the War (Inkstick) 
Five attack vectors that businesses should focus on in the wake of the Israel-Hamas war (SC Media) 
Israel’s cyber defense chief tells CNN he is concerned Iran could increase severity of its cyberattacks (CNN)
SBU blocks 76 bot farms with 3 mln fake accounts since start of full-scale war (Interfax-Ukraine) 
On Election Day, CISA and Partners Coordinate on Security Operations (Cybersecurity and Infrastructure Security Agency)
Cerby Releases “Threat Briefing: Social Media Security and Elections Volume II,” Providing a Detailed Analysis of Security Gaps in Social Media Platforms (Cerby)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Data brokers offer information on active US military personnel. Current BlueNoroff activity. A new Gootloader variant is active in the wild. Atlassian vulnerabilities actively exploited. The prevalence of breaches. Update on a Barracuda vulnerability. Hacktivism and the cyber course of the Hamas-Israel war. Bot-hunting in Ukraine. Microsoft’s Ann Johnson from Afternoon Cyber Tea speaks with Sharon Barber, Chief Information Officer at Lloyds Banking Group, about cyber trends in financial services. Ben Yelin looks at the ease of purchasing US military personnel data from data brokers And election security is in the news–an off-year election is an election nonetheless.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/213</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cnn.com/2023/11/06/politics/data-of-military-personnel-for-sale-online/index.html">Researchers find sensitive personal data of US military personnel is for sale online</a> (CNN)</p><p><a href="https://www.politico.com/news/2023/11/06/us-military-member-data-for-sale-00125345">How foreigners can buy data on US military members, for the right price</a> (POLITICO)</p><p><a href="https://securityintelligence.com/x-force/gootbot-gootloaders-new-approach-to-post-exploitation/">GootBot - Gootloader's new approach to post-exploitation</a> (Security Intelligence)</p><p><a href="https://www.jamf.com/blog/bluenoroff-strikes-again-with-new-macos-malware/">BlueNoroff strikes again with new macOS malware</a> (Jamf)</p><p><a href="https://securityintelligence.com/x-force/gootbot-gootloaders-new-approach-to-post-exploitation/">GootBot - Gootloader's new approach to post-exploitation</a> (Security Intelligence)</p><p><a href="https://www.rapid7.com/blog/post/2023/11/06/etr-rapid7-observed-exploitation-of-atlassian-confluence-cve-2023-22518/">Rapid7-Observed Exploitation of Atlassian Confluence CVE-2023-22518</a> (Rapid7) </p><p><a href="https://www.armis.com/newsroom/press/armis-research-finds-one-third-of-global-organizations-experienced-multiple-security-breaches-in-last-12-months/">Armis Research Finds One-Third of Global Organizations Experienced Multiple Security Breaches in Last 12 Months</a> (Armis)</p><p><a href="https://www.vectra.ai/blog/technical-analysis-barracuda-email-security-gateway">Technical analysis: Barracuda Email Security Gateway by Quentin Olagne</a> (Vectra) </p><p><a href="https://www.jpost.com/breaking-news/article-772021">Maccabi Tel Aviv basketball team website comes under cyber attack</a> (The Jerusalem Post) </p><p><a href="https://inkstickmedia.com/the-digital-frontline-of-the-israel-hamas-conflict-could-extend-long-after-the-war/">The Digital Frontline of the Israel-Hamas Conflict Could Extend Long After the War</a> (Inkstick) </p><p><a href="https://www.scmagazine.com/perspective/five-attack-vectors-that-businesses-should-focus-on-in-the-wake-of-the-israel-hamas-war">Five attack vectors that businesses should focus on in the wake of the Israel-Hamas war</a> (SC Media) </p><p><a href="https://www.cnn.com/2023/11/06/politics/israel-cyber-defense-iran-concerns/index.html">Israel’s cyber defense chief tells CNN he is concerned Iran could increase severity of its cyberattacks</a> (CNN)</p><p><a href="https://en.interfax.com.ua/news/general/945735.html">SBU blocks 76 bot farms with 3 mln fake accounts since start of full-scale war</a> (Interfax-Ukraine) </p><p><a href="https://content.govdelivery.com/accounts/USDHSCISA/bulletins/379c9a2">On Election Day, CISA and Partners Coordinate on Security Operations</a> (Cybersecurity and Infrastructure Security Agency)</p><p><a href="https://www.cerby.com/resources/blog/cerby-releases-threat-briefing-social-media-security-and-elections-report">Cerby Releases “Threat Briefing: Social Media Security and Elections Volume II,” Providing a Detailed Analysis of Security Gaps in Social Media Platforms</a> (Cerby)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1696</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16031540-2b53-11ee-9c79-7bf67a8453d7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6307757656.mp3?updated=1699390536" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Precautions, preparations, and resilience against cybercrime and hacktivism.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1942/notes</link>
      <description>A precautionary shutdown at a major US mortgage lender. Call centers as targets. A push to decouple data and identity. The cyber front in the Hamas-Israeli war. Hacktivism and state-sponsored cyberattacks against Israel. The instructive case of TASS and managing influence operations. Deepen Desai from Zscaler talking about the TOITOIN Trojan. Our guest is Joe Nocera, of PwC sharing their latest Global Digital Trust Insights survey and the impact of the SEC's new cybersecurity disclosure rules. And cybercrime on the side of Ukraine (or at least, cybercrime against Russia).

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/212

Selected reading.
Mortgage Giant Mr. Cooper Shuts Down Systems Following Cyberattack (SecurityWeek)
TransUnion Report Shows Fraud Attacks on Financial Industry Call Centers Rising (Transunion)
A Bold New Plan to Make Cloud Computing More Secure (IEEE Spectrum) 
The Cyberwarfare Front of the Israel-Gaza War (The National Interest)
Agonizing Serpens (Aka Agrius) Targeting the Israeli Higher Education and Tech Sectors (Unit 42)
GhostSec offers Ransomware-as-a-Service Possibly Used to Target Israel (Uptycs) 
Kremlin Sacks TASS Chief for Wagner Mutiny Coverage (The Moscow Times) 
Russia's 2nd-Largest Insurer Rosgosstrakh Hacked; 400GB of Data Sold Online (Hackread - Latest Cybersecurity News, Press Releases &amp; Technology Today)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 06 Nov 2023 21:15:00 -0000</pubDate>
      <itunes:title>Precautions, preparations, and resilience against cybercrime and hacktivism.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1942</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A precautionary shutdown at a major US mortgage lender. Call centers as targets. A push to decouple data and identity. The cyber front in the Hamas-Israeli war. Hacktivism and state-sponsored cyberattacks against Israel. The instructive case of TASS and managing influence operations. Deepen Desai from Zscaler talking about the TOITOIN Trojan. Our guest is Joe Nocera, of PwC sharing their latest Global Digital Trust Insights survey and the impact of the SEC's new cybersecurity disclosure rules. And cybercrime on the side of Ukraine (or at least, cybercrime against Russia).

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/212

Selected reading.
Mortgage Giant Mr. Cooper Shuts Down Systems Following Cyberattack (SecurityWeek)
TransUnion Report Shows Fraud Attacks on Financial Industry Call Centers Rising (Transunion)
A Bold New Plan to Make Cloud Computing More Secure (IEEE Spectrum) 
The Cyberwarfare Front of the Israel-Gaza War (The National Interest)
Agonizing Serpens (Aka Agrius) Targeting the Israeli Higher Education and Tech Sectors (Unit 42)
GhostSec offers Ransomware-as-a-Service Possibly Used to Target Israel (Uptycs) 
Kremlin Sacks TASS Chief for Wagner Mutiny Coverage (The Moscow Times) 
Russia's 2nd-Largest Insurer Rosgosstrakh Hacked; 400GB of Data Sold Online (Hackread - Latest Cybersecurity News, Press Releases &amp; Technology Today)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A precautionary shutdown at a major US mortgage lender. Call centers as targets. A push to decouple data and identity. The cyber front in the Hamas-Israeli war. Hacktivism and state-sponsored cyberattacks against Israel. The instructive case of TASS and managing influence operations. Deepen Desai from Zscaler talking about the TOITOIN Trojan. Our guest is Joe Nocera, of PwC sharing their latest Global Digital Trust Insights survey and the impact of the SEC's new cybersecurity disclosure rules. And cybercrime on the side of Ukraine (or at least, cybercrime against Russia).</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/212</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.securityweek.com/mortgage-giant-mr-cooper-shuts-down-systems-following-cyberattack/">Mortgage Giant Mr. Cooper Shuts Down Systems Following Cyberattack</a> (SecurityWeek)</p><p><a href="https://www.globenewswire.com/news-release/2023/11/06/2774050/0/en/TransUnion-Report-Shows-Fraud-Attacks-on-Financial-Industry-Call-Centers-Rising.html">TransUnion Report Shows Fraud Attacks on Financial Industry Call Centers Rising</a> (Transunion)</p><p><a href="https://spectrum.ieee.org/data-privacy">A Bold New Plan to Make Cloud Computing More Secure</a> (IEEE Spectrum) </p><p><a href="https://nationalinterest.org/feature/cyberwarfare-front-israel-gaza-war-207163">The Cyberwarfare Front of the Israel-Gaza War</a> (The National Interest)</p><p><a href="https://unit42.paloaltonetworks.com/agonizing-serpens-targets-israeli-tech-higher-ed-sectors/">Agonizing Serpens (Aka Agrius) Targeting the Israeli Higher Education and Tech Sectors</a> (Unit 42)</p><p><a href="https://www.uptycs.com/blog/ghostlocker-ransomware-ghostsec">GhostSec offers Ransomware-as-a-Service Possibly Used to Target Israel</a> (Uptycs) </p><p><a href="https://www.themoscowtimes.com/2023/11/03/kremlin-sacks-tass-chief-for-wagner-mutiny-coverage-a82899">Kremlin Sacks TASS Chief for Wagner Mutiny Coverage</a> (The Moscow Times) </p><p><a href="https://www.hackread.com/russia-insurer-rosgosstrakh-hacked-data-sold/">Russia's 2nd-Largest Insurer Rosgosstrakh Hacked; 400GB of Data Sold Online</a> (Hackread - Latest Cybersecurity News, Press Releases &amp; Technology Today)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1856</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[15f3abfa-2b53-11ee-9c79-cbda2ff8cc0b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4532052061.mp3?updated=1699297946" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CyberCon 2023: A unique mix of critical infrastructure and cybersecurity. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/55/notes</link>
      <description>As we progress in this technological age, both cybersecurity and critical infrastructure continue to be at the forefront of prevention, protection, mitigation, and recovery conversation topics. From a frontline worker to the top of the C-Suite, security is something we all should be aware of and concerned about. The CyberCon event began in 2018 and provides an opportunity to learn more about cybersecurity and critical infrastructure as well as collaborate with fellow security professionals. 
Dave Bittner recently spoke at CyberCon 2023 at Bismarck State College in North Dakota. While there, he had the opportunity to interview 4 members of the conference planning committee (all past or current chairs of the event) for a better understanding of the event, its focus on a mix of critical infrastructure and cybersecurity, and how the event has evolved over the years.
Dave speaks with:


Troy Walker, Director of Sales and Marketing at Dakota Carrier Network &amp; 2023 conference chair, sharing the history of CyberCon its unique focus on critical infrastructure and cybersecurity.


Tony Aukland, Technology Outreach Manager for the State of North Dakota IT &amp; previous conference chair, giving us the truth about CyberCon and its origin story.


Bill Heinzen, Information Security Team Lead at National Information Solutions Cooperative and previous event chair, talking about developing the cybersecurity candidate pool in North Dakota.


John Nagel, CEO and Founder of CYBERNET SECURITY and past event chair, discussing sustainability of the CyberCon and its critical infrastructure focus.


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 05 Nov 2023 05:01:00 -0000</pubDate>
      <itunes:title>CyberCon 2023: A unique mix of critical infrastructure and cybersecurity. [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>55</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>As we progress in this technological age, both cybersecurity and critical infrastructure continue to be at the forefront of prevention, protection, mitigation, and recovery conversation topics. From a frontline worker to the top of the C-Suite, security is something we all should be aware of and concerned about. The CyberCon event began in 2018 and provides an opportunity to learn more about cybersecurity and critical infrastructure as well as collaborate with fellow security professionals. 
Dave Bittner recently spoke at CyberCon 2023 at Bismarck State College in North Dakota. While there, he had the opportunity to interview 4 members of the conference planning committee (all past or current chairs of the event) for a better understanding of the event, its focus on a mix of critical infrastructure and cybersecurity, and how the event has evolved over the years.
Dave speaks with:


Troy Walker, Director of Sales and Marketing at Dakota Carrier Network &amp; 2023 conference chair, sharing the history of CyberCon its unique focus on critical infrastructure and cybersecurity.


Tony Aukland, Technology Outreach Manager for the State of North Dakota IT &amp; previous conference chair, giving us the truth about CyberCon and its origin story.


Bill Heinzen, Information Security Team Lead at National Information Solutions Cooperative and previous event chair, talking about developing the cybersecurity candidate pool in North Dakota.


John Nagel, CEO and Founder of CYBERNET SECURITY and past event chair, discussing sustainability of the CyberCon and its critical infrastructure focus.


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As we progress in this technological age, both cybersecurity and critical infrastructure continue to be at the forefront of prevention, protection, mitigation, and recovery conversation topics. From a frontline worker to the top of the C-Suite, security is something we all should be aware of and concerned about. The CyberCon event began in 2018 and provides an opportunity to learn more about cybersecurity and critical infrastructure as well as collaborate with fellow security professionals. </p><p>Dave Bittner recently spoke at <a href="https://cyberconbsc.com/">CyberCon 2023</a> at Bismarck State College in North Dakota. While there, he had the opportunity to interview 4 members of the conference planning committee (all past or current chairs of the event) for a better understanding of the event, its focus on a mix of critical infrastructure and cybersecurity, and how the event has evolved over the years.</p><p>Dave speaks with:</p><ul>
<li>
<a href="https://www.linkedin.com/in/troy-walker-0237401a8/">Troy Walker</a>, Director of Sales and Marketing at Dakota Carrier Network &amp; 2023 conference chair, sharing the history of CyberCon its unique focus on critical infrastructure and cybersecurity.</li>
<li>
<a href="https://www.linkedin.com/in/tony-aukland-mba-89203994/">Tony Aukland</a>, Technology Outreach Manager for the State of North Dakota IT &amp; previous conference chair, giving us the truth about CyberCon and its origin story.</li>
<li>
<a href="https://www.linkedin.com/in/bill-heinzen-8b16b492/">Bill Heinzen</a>, Information Security Team Lead at National Information Solutions Cooperative and previous event chair, talking about developing the cybersecurity candidate pool in North Dakota.</li>
<li>
<a href="https://www.linkedin.com/in/johngnagel/">John Nagel</a>, CEO and Founder of CYBERNET SECURITY and past event chair, discussing sustainability of the CyberCon and its critical infrastructure focus.</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2645</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a8d233f0-79c4-11ee-915f-4f88aa7bfc0b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3490375683.mp3?updated=1698784133" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jeffrey Wheatman: Sometimes you just need to open the raincoat. [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/174/notes</link>
      <description>Jeffrey Wheatman, Cyber Risk Evangelist, from Black Kite joins to share his amazing story. As a strategic thought leader with extensive expertise in cybersecurity, Jeffrey Wheatman is regarded foremost as an expert in guiding public sector clients and Fortune 500 companies in connection with their cyber risk management programs. In his current role as Cyber Risk Evangelist at Black Kite, Jeffrey works to get the message out about the business impact of third-party risk and solutions to treat those risks. Jeffrey shared his career, along with is passion for cyber by explaining some of the roles he did moving up into his role today. He says as a leader we all need to be aware of the fact that "We make mistakes and I I'm a, I'm a big believer in sharing those mistakes and I think it's important to open the raincoat as it were, and let people understand that we're not perfect, we all need help and then that way they feel comfortable coming to you and asking for help" We thank Jeffrey for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 05 Nov 2023 05:00:00 -0000</pubDate>
      <itunes:title>Jeffrey Wheatman: Sometimes you just need to open the raincoat. [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>174</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Jeffrey Wheatman, Cyber Risk Evangelist, from Black Kite joins to share his amazing story. As a strategic thought leader with extensive expertise in cybersecurity, Jeffrey Wheatman is regarded foremost as an expert in guiding public sector clients and Fortune 500 companies in connection with their cyber risk management programs. In his current role as Cyber Risk Evangelist at Black Kite, Jeffrey works to get the message out about the business impact of third-party risk and solutions to treat those risks. Jeffrey shared his career, along with is passion for cyber by explaining some of the roles he did moving up into his role today. He says as a leader we all need to be aware of the fact that "We make mistakes and I I'm a, I'm a big believer in sharing those mistakes and I think it's important to open the raincoat as it were, and let people understand that we're not perfect, we all need help and then that way they feel comfortable coming to you and asking for help" We thank Jeffrey for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jeffrey Wheatman, Cyber Risk Evangelist, from Black Kite joins to share his amazing story. As a strategic thought leader with extensive expertise in cybersecurity, Jeffrey Wheatman is regarded foremost as an expert in guiding public sector clients and Fortune 500 companies in connection with their cyber risk management programs. In his current role as Cyber Risk Evangelist at Black Kite, Jeffrey works to get the message out about the business impact of third-party risk and solutions to treat those risks. Jeffrey shared his career, along with is passion for cyber by explaining some of the roles he did moving up into his role today. He says as a leader we all need to be aware of the fact that "We make mistakes and I I'm a, I'm a big believer in sharing those mistakes and I think it's important to open the raincoat as it were, and let people understand that we're not perfect, we all need help and then that way they feel comfortable coming to you and asking for help" We thank Jeffrey for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>539</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[73462d54-7a6e-11ee-aa09-3fe4a53bf143]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6680309061.mp3?updated=1699040441" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sandman doesn't slow malware down. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/306/notes</link>
      <description>Aleksandar Milenkoski and JAGS from SentinelOne sits down to share their work on "Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit." After observing a new threat activity cluster by an unknown threat actor in August of this year, SentinelLabs dubbed it Sandman.
The research states "Sandman has been primarily targeting telecommunication providers in the Middle East, Western Europe, and the South Asian subcontinent." Sandman has deployed a novel modular backdoor utilizing the LuaJIT platform, they call this malware "LuaDream," which exfiltrates system and user information, paving the way for further precision attacks.
The research can be found here:
Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Nov 2023 07:00:00 -0000</pubDate>
      <itunes:title>Sandman doesn't slow malware down. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>306</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Aleksandar Milenkoski and JAGS from SentinelOne sits down to share their work on "Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit." After observing a new threat activity cluster by an unknown threat actor in August of this year, SentinelLabs dubbed it Sandman.
The research states "Sandman has been primarily targeting telecommunication providers in the Middle East, Western Europe, and the South Asian subcontinent." Sandman has deployed a novel modular backdoor utilizing the LuaJIT platform, they call this malware "LuaDream," which exfiltrates system and user information, paving the way for further precision attacks.
The research can be found here:
Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Aleksandar Milenkoski and JAGS from SentinelOne sits down to share their work on "Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit." After observing a new threat activity cluster by an unknown threat actor in August of this year, SentinelLabs dubbed it Sandman.</p><p>The research states "Sandman has been primarily targeting telecommunication providers in the Middle East, Western Europe, and the South Asian subcontinent." Sandman has deployed a novel modular backdoor utilizing the LuaJIT platform, they call this malware "LuaDream," which exfiltrates system and user information, paving the way for further precision attacks.</p><p>The research can be found here:</p><ul><li><a href="https://www.sentinelone.com/labs/sandman-apt-a-mystery-group-targeting-telcos-with-a-luajit-toolkit/">Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1378</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1cbd599c-7a4d-11ee-8f28-07828e06615c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7741792149.mp3?updated=1699112999" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>In the offense-defense see-saw, the defense seems to be rising.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1941/notes</link>
      <description>An Apache vulnerability is being used to install ransomware. Exploitation of Citrix vulnerability in the wild. AP sustains DDoS attack. HHS reaches settlement in HIPAA data breach incident. More evidence of OSINT's reach. On the Solution Spotlight: Simone Petrella and Rick Howard speak with Ben Rothke about his article and thoughts on "Is there really an information security jobs crisis?" Andrea Little Limbago from Interos joins us to discuss SEC and the disclosure rules. And, Microsoft draws a lesson from Russia's war: cyber defense now has the advantage over cyber offense.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/211

Selected reading.
Critical Apache ActiveMQ Vulnerability Exploited to Deliver Ransomware (SecurityWeek) 
HelloKitty ransomware now exploiting Apache ActiveMQ flaw in attacks (BleepingComputer) 
Critical Vulnerability: Exploitation of Apache ActiveMQ CVE-2023-46604 (Huntress) 
Suspected Exploitation of Apache ActiveMQ CVE-2023-46604 (Rapid7) 
HHS’ Office for Civil Rights Settles Ransomware Cyber-Attack Investigation (U.S. Department of Health and Human Services)
AP news site hit by apparent denial-of-service attack (AP News) 
Associated Press hit by Anonymous Sudan DDoS attack? (Tech Monitor)
Satellites and social media offer hints about Israel's ground war strategy in Gaza (NPR) 
Revisiting the Gaza Hospital Explosion (New York Times)
Microsoft Vows to Revamp Security Products After Repeated Hacks (Bloomberg) 
A new world of security: Microsoft’s Secure Future Initiative (Microsoft On the Issues) 
Announcing Microsoft Secure Future Initiative to advance security engineering (Microsoft Security) 
Ukraine at D+617: Advantage defense. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 03 Nov 2023 20:15:00 -0000</pubDate>
      <itunes:title>In the offense-defense see-saw, the defense seems to be rising.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1941</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An Apache vulnerability is being used to install ransomware. Exploitation of Citrix vulnerability in the wild. AP sustains DDoS attack. HHS reaches settlement in HIPAA data breach incident. More evidence of OSINT's reach. On the Solution Spotlight: Simone Petrella and Rick Howard speak with Ben Rothke about his article and thoughts on "Is there really an information security jobs crisis?" Andrea Little Limbago from Interos joins us to discuss SEC and the disclosure rules. And, Microsoft draws a lesson from Russia's war: cyber defense now has the advantage over cyber offense.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/211

Selected reading.
Critical Apache ActiveMQ Vulnerability Exploited to Deliver Ransomware (SecurityWeek) 
HelloKitty ransomware now exploiting Apache ActiveMQ flaw in attacks (BleepingComputer) 
Critical Vulnerability: Exploitation of Apache ActiveMQ CVE-2023-46604 (Huntress) 
Suspected Exploitation of Apache ActiveMQ CVE-2023-46604 (Rapid7) 
HHS’ Office for Civil Rights Settles Ransomware Cyber-Attack Investigation (U.S. Department of Health and Human Services)
AP news site hit by apparent denial-of-service attack (AP News) 
Associated Press hit by Anonymous Sudan DDoS attack? (Tech Monitor)
Satellites and social media offer hints about Israel's ground war strategy in Gaza (NPR) 
Revisiting the Gaza Hospital Explosion (New York Times)
Microsoft Vows to Revamp Security Products After Repeated Hacks (Bloomberg) 
A new world of security: Microsoft’s Secure Future Initiative (Microsoft On the Issues) 
Announcing Microsoft Secure Future Initiative to advance security engineering (Microsoft Security) 
Ukraine at D+617: Advantage defense. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An Apache vulnerability is being used to install ransomware. Exploitation of Citrix vulnerability in the wild. AP sustains DDoS attack. HHS reaches settlement in HIPAA data breach incident. More evidence of OSINT's reach. On the Solution Spotlight: Simone Petrella and Rick Howard speak with Ben Rothke about his article and thoughts on "Is there really an information security jobs crisis?" Andrea Little Limbago from Interos joins us to discuss SEC and the disclosure rules. And, Microsoft draws a lesson from Russia's war: cyber defense now has the advantage over cyber offense.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/211</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.securityweek.com/critical-apache-activemq-vulnerability-exploited-to-deliver-ransomware/">Critical Apache ActiveMQ Vulnerability Exploited to Deliver Ransomware</a> (SecurityWeek) </p><p><a href="https://www.bleepingcomputer.com/news/security/hellokitty-ransomware-now-exploiting-apache-activemq-flaw-in-attacks/">HelloKitty ransomware now exploiting Apache ActiveMQ flaw in attacks</a> (BleepingComputer) </p><p><a href="https://www.huntress.com/blog/critical-vulnerability-exploitation-of-apache-activemq-cve-2023-46604">Critical Vulnerability: Exploitation of Apache ActiveMQ CVE-2023-46604</a> (Huntress) </p><p><a href="https://www.rapid7.com/blog/post/2023/11/01/etr-suspected-exploitation-of-apache-activemq-cve-2023-46604/">Suspected Exploitation of Apache ActiveMQ CVE-2023-46604</a> (Rapid7) </p><p><a href="https://www.hhs.gov/about/news/2023/10/31/hhs-office-civil-rights-settles-ransomware-cyber-attack-investigation.html">HHS’ Office for Civil Rights Settles Ransomware Cyber-Attack Investigation</a> (U.S. Department of Health and Human Services)</p><p><a href="https://apnews.com/article/ap-news-site-disrupted-1da6a411ce5022555929e204bf5dc3c0">AP news site hit by apparent denial-of-service attack</a> (AP News) </p><p><a href="https://techmonitor.ai/technology/cybersecurity/ap-cyberattack-associated-press-anonymous-sudan-ddos">Associated Press hit by Anonymous Sudan DDoS attack?</a> (Tech Monitor)</p><p><a href="https://www.npr.org/2023/11/03/1210326996/one-week-into-israels-ground-war-in-gaza-satellites-and-socialf-media-give-hints">Satellites and social media offer hints about Israel's ground war strategy in Gaza </a>(NPR) </p><p><a href="https://www.nytimes.com/2023/11/03/briefing/gaza-hospital-explosion.html">Revisiting the Gaza Hospital Explosion</a> (New York Times)</p><p><a href="https://www.bloomberg.com/news/articles/2023-11-02/microsoft-vows-to-revamp-cyber-products-after-coming-under-fire">Microsoft Vows to Revamp Security Products After Repeated Hacks</a> (Bloomberg) </p><p><a href="https://blogs.microsoft.com/on-the-issues/2023/11/02/secure-future-initiative-sfi-cybersecurity-cyberattacks/">A new world of security: Microsoft’s Secure Future Initiative</a> (Microsoft On the Issues) </p><p><a href="https://www.microsoft.com/en-us/security/blog/2023/11/02/announcing-microsoft-secure-future-initiative-to-advance-security-engineering/">Announcing Microsoft Secure Future Initiative to advance security engineering</a> (Microsoft Security) </p><p><a href="https://thecyberwire.com/stories/ccd81d810af049d4aa42ad3d05478d60/ukraine-at-d617-advantage-defense">Ukraine at D+617: Advantage defense.</a> (CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2007</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[14e3ab20-2b53-11ee-9c79-c7d0260878f0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1694142000.mp3?updated=1699041447" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The beginning of an international consensus on AI governance may be emerging from Bletchley Park.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1940/notes</link>
      <description>Bletchley Declaration represents a consensus starting point for AI governance. Lazarus Group prospects blockchain engineers with KANDYKORN. Boeing investigates ‘cyber incident’ affecting parts business. NodeStealer’s use in attacks against Facebook accounts. Citrix Bleed vulnerability exploited in the wild. MuddyWater spearphishes Israeli targets in the interest of Hamas. India to investigate alleged attacks on iPhones. Tim Starks from the Washington Post on the SEC’s case against Solar Winds. In today’s Threat Vector segment David Moulton from Unit 42 is joined by Matt Kraning of the Cortex Expanse Team for a look at Attack Surface Management. And Venomous Bear rolls out some new tools.
On the Threat Vector segment, David Moulton, Director of Thought Leadership for Unit 42, is joined by Matt Kraning, CTO of the Cortex Expanse Team. They dive into the latest Attack Surface Management Report.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/210

Threat Vector
Read the Attack Surface Management Report.
Please share your thoughts with us for future Threat Vector segments by taking our brief survey.
To learn what is top of mind each month from the experts at Unit 42 sign up for their Threat Intel Bulletin. 

Selected reading.
The Bletchley Declaration by Countries Attending the AI Safety Summit, 1-2 November 2023 (GOV.UK)
US Vice President Harris calls for action on "full spectrum" of AI risks (Reuters) 
Elastic catches DPRK passing out KANDYKORN (Elastic Security Labs)
North Korean Hackers Targeting Crypto Experts with KANDYKORN macOS Malware (The Hacker News)
Lazarus used ‘Kandykorn’ malware in attempt to compromise exchange — Elastic (Cointelegraph) 
An info-stealer campaign is now targeting Facebook users with revealing photos (Record)
Mass Exploitation of 'Citrix Bleed' Vulnerability Underway (SecurityWeek)
MuddyWater eN-Able spear-phishing with new TTPs | Deep Instinct Blog (Deep Instinct) 
Centre's Cyber Watchdog CERT-In To Probe iPhone "Hacking" Attempt Charges (NDTV.com)
Over the Kazuar’s Nest: Cracking Down on a Freshly Hatched Backdoor Used by Pensive Ursa (Aka Turla) (Unit 42)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 02 Nov 2023 20:15:00 -0000</pubDate>
      <itunes:title>The beginning of an international consensus on AI governance may be emerging from Bletchley Park.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1940</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Bletchley Declaration represents a consensus starting point for AI governance. Lazarus Group prospects blockchain engineers with KANDYKORN. Boeing investigates ‘cyber incident’ affecting parts business. NodeStealer’s use in attacks against Facebook accounts. Citrix Bleed vulnerability exploited in the wild. MuddyWater spearphishes Israeli targets in the interest of Hamas. India to investigate alleged attacks on iPhones. Tim Starks from the Washington Post on the SEC’s case against Solar Winds. In today’s Threat Vector segment David Moulton from Unit 42 is joined by Matt Kraning of the Cortex Expanse Team for a look at Attack Surface Management. And Venomous Bear rolls out some new tools.
On the Threat Vector segment, David Moulton, Director of Thought Leadership for Unit 42, is joined by Matt Kraning, CTO of the Cortex Expanse Team. They dive into the latest Attack Surface Management Report.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/210

Threat Vector
Read the Attack Surface Management Report.
Please share your thoughts with us for future Threat Vector segments by taking our brief survey.
To learn what is top of mind each month from the experts at Unit 42 sign up for their Threat Intel Bulletin. 

Selected reading.
The Bletchley Declaration by Countries Attending the AI Safety Summit, 1-2 November 2023 (GOV.UK)
US Vice President Harris calls for action on "full spectrum" of AI risks (Reuters) 
Elastic catches DPRK passing out KANDYKORN (Elastic Security Labs)
North Korean Hackers Targeting Crypto Experts with KANDYKORN macOS Malware (The Hacker News)
Lazarus used ‘Kandykorn’ malware in attempt to compromise exchange — Elastic (Cointelegraph) 
An info-stealer campaign is now targeting Facebook users with revealing photos (Record)
Mass Exploitation of 'Citrix Bleed' Vulnerability Underway (SecurityWeek)
MuddyWater eN-Able spear-phishing with new TTPs | Deep Instinct Blog (Deep Instinct) 
Centre's Cyber Watchdog CERT-In To Probe iPhone "Hacking" Attempt Charges (NDTV.com)
Over the Kazuar’s Nest: Cracking Down on a Freshly Hatched Backdoor Used by Pensive Ursa (Aka Turla) (Unit 42)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Bletchley Declaration represents a consensus starting point for AI governance. Lazarus Group prospects blockchain engineers with KANDYKORN. Boeing investigates ‘cyber incident’ affecting parts business. NodeStealer’s use in attacks against Facebook accounts. Citrix Bleed vulnerability exploited in the wild. MuddyWater spearphishes Israeli targets in the interest of Hamas. India to investigate alleged attacks on iPhones. Tim Starks from the Washington Post on the SEC’s case against Solar Winds. In today’s Threat Vector segment David Moulton from Unit 42 is joined by Matt Kraning of the Cortex Expanse Team for a look at Attack Surface Management. And Venomous Bear rolls out some new tools.</p><p>On the Threat Vector segment, David Moulton, Director of Thought Leadership for Unit 42, is joined by Matt Kraning, CTO of the Cortex Expanse Team. They dive into the latest Attack Surface Management Report.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/210</p><p><br></p><h2>Threat Vector</h2><p>Read the <a href="https://www.paloaltonetworks.com/resources/research/2023-unit-42-attack-surface-threat-report?utm_source=cyberwire-globalunit42&amp;utm_medium=podcast">Attack Surface Management Report</a>.</p><p>Please share your thoughts with us for future Threat Vector segments by taking our <a href="https://www.surveymonkey.com/r/N2K_TV_p">brief survey</a>.</p><p>To learn what is top of mind each month from the experts at Unit 42 sign up for their <a href="https://start.paloaltonetworks.com/unit42-threat-intel-bulletin.html">Threat Intel Bulletin</a>. </p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.gov.uk/government/publications/ai-safety-summit-2023-the-bletchley-declaration/the-bletchley-declaration-by-countries-attending-the-ai-safety-summit-1-2-november-2023">The Bletchley Declaration by Countries Attending the AI Safety Summit, 1-2 November 2023</a> (GOV.UK)</p><p><a href="https://www.reuters.com/technology/us-vice-president-harris-call-action-threats-ai-2023-11-01/">US Vice President Harris calls for action on "full spectrum" of AI risks</a> (Reuters) </p><p><a href="https://www.elastic.co/security-labs/elastic-catches-dprk-passing-out-kandykorn">Elastic catches DPRK passing out KANDYKORN</a> (Elastic Security Labs)</p><p><a href="https://thehackernews.com/2023/11/north-korean-hackers-tageting-crypto.html">North Korean Hackers Targeting Crypto Experts with KANDYKORN macOS Malware</a> (The Hacker News)</p><p><a href="https://cointelegraph.com/news/lazarus-kandykorn-malware-attempt-compromise-exchange-elastic">Lazarus used ‘Kandykorn’ malware in attempt to compromise exchange — Elastic</a> (Cointelegraph) </p><p><a href="https://therecord.media/nodestealer-malware-campaign-facebook-advertising?">An info-stealer campaign is now targeting Facebook users with revealing photos</a> (Record)</p><p><a href="https://www.securityweek.com/mass-exploitation-of-citrix-bleed-vulnerability-underway/">Mass Exploitation of 'Citrix Bleed' Vulnerability Underway</a> (SecurityWeek)</p><p><a href="https://www.deepinstinct.com/blog/muddywater-en-able-spear-phishing-with-new-ttps">MuddyWater eN-Able spear-phishing with new TTPs | Deep Instinct Blog</a> (Deep Instinct) </p><p><a href="https://www.ndtv.com/india-news/centres-cyber-watchdog-cert-in-to-probe-iphone-hacking-attempt-charges-4537127">Centre's Cyber Watchdog CERT-In To Probe iPhone "Hacking" Attempt Charges</a> (NDTV.com)</p><p><a href="https://unit42.paloaltonetworks.com/pensive-ursa-uses-upgraded-kazuar-backdoor/">Over the Kazuar’s Nest: Cracking Down on a Freshly Hatched Backdoor Used by Pensive Ursa (Aka Turla)</a> (Unit 42)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1872</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[14d0cd2a-2b53-11ee-9c79-3f34cc943084]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2294424593.mp3?updated=1698952747" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacktivism in two hybrid wars (with an excursus on gastropods). </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1939/notes</link>
      <description>The Hamas-Israel war continues to be marked by hacktivism. Arid Viper's exploitation of Arabic speaker's Android devices. Iran shows improved cyberespionage capabilities. A URL shortener in the C2C market. Taking down the Mozi botnet. Ransomware in healthcare. Two are Russians arrested on treason charges, accused of hacking for Ukraine. In our sponsored Industry Voices segment, Anna Belak from Sysdig shares a new threat framework for the cloud. Rick Howard previews his new online course on cyber security first principles. And no, Russia hasn’t really replaced its currency with Arctic Ocean gastropods.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/209

Selected reading.
‘Hacktivists’ join the front lines in Israel-Hamas war (C4ISRNet) 
The global cyber divide between Gaza and Israel - IT-Online (IT-Online)
Arid Viper disguising mobile spyware as updates for non-malicious Android applications (Cisco Talos Blog)
In Cyberattacks, Iran Shows Signs of Improved Hacking Capabilities (New York Times)
FBI ‘keeping a close eye’ on Iranian hackers as Israel-Hamas war intensifies (Record)
Why Iran Is Gambling on Hamas (Foreign Affairs)
To Aid and Abet: Prolific Puma Helps Cybercriminals Evade Detection (Infoblox Blog)
Who killed Mozi? Finally putting the IoT zombie botnet in its grave (ESET)
The State of Ransomware in Healthcare 2023 (Sophos)
Russian security service detains two hackers allegedly working for Ukraine (Record) 
Pro-Ukraine group says it breached Russian card payment system (Record) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 01 Nov 2023 20:45:00 -0000</pubDate>
      <itunes:title>Hacktivism in two hybrid wars (with an excursus on gastropods). </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1939</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Hamas-Israel war continues to be marked by hacktivism. Arid Viper's exploitation of Arabic speaker's Android devices. Iran shows improved cyberespionage capabilities. A URL shortener in the C2C market. Taking down the Mozi botnet. Ransomware in healthcare. Two are Russians arrested on treason charges, accused of hacking for Ukraine. In our sponsored Industry Voices segment, Anna Belak from Sysdig shares a new threat framework for the cloud. Rick Howard previews his new online course on cyber security first principles. And no, Russia hasn’t really replaced its currency with Arctic Ocean gastropods.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/209

Selected reading.
‘Hacktivists’ join the front lines in Israel-Hamas war (C4ISRNet) 
The global cyber divide between Gaza and Israel - IT-Online (IT-Online)
Arid Viper disguising mobile spyware as updates for non-malicious Android applications (Cisco Talos Blog)
In Cyberattacks, Iran Shows Signs of Improved Hacking Capabilities (New York Times)
FBI ‘keeping a close eye’ on Iranian hackers as Israel-Hamas war intensifies (Record)
Why Iran Is Gambling on Hamas (Foreign Affairs)
To Aid and Abet: Prolific Puma Helps Cybercriminals Evade Detection (Infoblox Blog)
Who killed Mozi? Finally putting the IoT zombie botnet in its grave (ESET)
The State of Ransomware in Healthcare 2023 (Sophos)
Russian security service detains two hackers allegedly working for Ukraine (Record) 
Pro-Ukraine group says it breached Russian card payment system (Record) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Hamas-Israel war continues to be marked by hacktivism. Arid Viper's exploitation of Arabic speaker's Android devices. Iran shows improved cyberespionage capabilities. A URL shortener in the C2C market. Taking down the Mozi botnet. Ransomware in healthcare. Two are Russians arrested on treason charges, accused of hacking for Ukraine. In our sponsored Industry Voices segment, Anna Belak from Sysdig shares a new threat framework for the cloud. Rick Howard previews his new online course on cyber security first principles. And no, Russia hasn’t really replaced its currency with Arctic Ocean gastropods.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/209</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.c4isrnet.com/cyber/2023/10/31/hacktivists-join-the-front-lines-in-israel-hamas-war/">‘Hacktivists’ join the front lines in Israel-Hamas war</a> (C4ISRNet) </p><p><a href="https://it-online.co.za/2023/11/01/the-global-cyber-divide-between-gaza-and-israel/">The global cyber divide between Gaza and Israel - IT-Online</a> (IT-Online)</p><p><a href="https://blog.talosintelligence.com/arid-viper-mobile-spyware/">Arid Viper disguising mobile spyware as updates for non-malicious Android applications</a> (Cisco Talos Blog)</p><p><a href="https://www.nytimes.com/2023/10/31/world/middleeast/iran-israel-cyberattacks.html">In Cyberattacks, Iran Shows Signs of Improved Hacking Capabilities</a> (New York Times)</p><p><a href="https://therecord.media/fbi-wray-iran-hackers-israel-palestine-war">FBI ‘keeping a close eye’ on Iranian hackers as Israel-Hamas war intensifies</a> (Record)</p><p><a href="https://www.foreignaffairs.com/israel/why-iran-gambling-hamas">Why Iran Is Gambling on Hamas</a> (Foreign Affairs)</p><p><a href="https://blogs.infoblox.com/cyber-threat-intelligence/prolific-puma-shadowy-link-shortening-service-enables-cybercrime/">To Aid and Abet: Prolific Puma Helps Cybercriminals Evade Detection</a> (Infoblox Blog)</p><p><a href="https://www.welivesecurity.com/en/eset-research/who-killed-mozi-finally-putting-the-iot-zombie-botnet-in-its-grave/">Who killed Mozi? Finally putting the IoT zombie botnet in its grave</a> (ESET)</p><p><a href="https://www.sophos.com/en-us/whitepaper/state-of-ransomware-in-healthcare">The State of Ransomware in Healthcare 2023</a> (Sophos)</p><p><a href="https://therecord.media/russia-arrests-two-hackers-ukraine">Russian security service detains two hackers allegedly working for Ukraine</a> (Record) </p><p><a href="https://therecord.media/russia-mir-payment-system-attack-pro-ukraine-group">Pro-Ukraine group says it breached Russian card payment system</a> (Record) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1705</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[14c0649e-2b53-11ee-9c79-63be18b5ae00]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9071447387.mp3?updated=1698870391" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What would it take to get you kids into a nice, late-model malware mealkit?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1938/notes</link>
      <description>Malicious packages are found attached to NuGet. Russia will establish its own substitute for VirusTotal. Commodity tools empower low-grade Russian cybercriminals. Malware mealkits, and other notes from the cyber underground. Insights from a Cybersecurity workforce study. Mr Security Answer Person John Pescatore looks at MFA. Drew Rose from Living Security on the very scary human side of cyber attacks. And more details from President Biden’s Executive Order on artificial intelligence.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/208

Selected reading.
IAmReboot: Malicious NuGet packages exploit loophole in MSBuild integrations (ReversingLabs) 
Russia to launch its own version of VirusTotal due to US snooping fears (Record).
Russian hacking tool floods social networks with bots, researchers say (Record) 
How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime (Trend Micro)
HP Wolf Security Threat Insights Report Q3 2023 (HP Wolf Security)
How the Economy, Skills Gap and Artificial Intelligence are Challenging the Global Cybersecurity Workforce (ISC2)
Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (The White House)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 31 Oct 2023 20:15:00 -0000</pubDate>
      <itunes:title>What would it take to get you kids into a nice, late-model malware mealkit?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1938</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Malicious packages are found attached to NuGet. Russia will establish its own substitute for VirusTotal. Commodity tools empower low-grade Russian cybercriminals. Malware mealkits, and other notes from the cyber underground. Insights from a Cybersecurity workforce study. Mr Security Answer Person John Pescatore looks at MFA. Drew Rose from Living Security on the very scary human side of cyber attacks. And more details from President Biden’s Executive Order on artificial intelligence.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/208

Selected reading.
IAmReboot: Malicious NuGet packages exploit loophole in MSBuild integrations (ReversingLabs) 
Russia to launch its own version of VirusTotal due to US snooping fears (Record).
Russian hacking tool floods social networks with bots, researchers say (Record) 
How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime (Trend Micro)
HP Wolf Security Threat Insights Report Q3 2023 (HP Wolf Security)
How the Economy, Skills Gap and Artificial Intelligence are Challenging the Global Cybersecurity Workforce (ISC2)
Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence (The White House)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Malicious packages are found attached to NuGet. Russia will establish its own substitute for VirusTotal. Commodity tools empower low-grade Russian cybercriminals. Malware mealkits, and other notes from the cyber underground. Insights from a Cybersecurity workforce study. Mr Security Answer Person John Pescatore looks at MFA. Drew Rose from Living Security on the very scary human side of cyber attacks. And more details from President Biden’s Executive Order on artificial intelligence.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/208</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.reversinglabs.com/blog/iamreboot-malicious-nuget-packages-exploit-msbuild-loophole">IAmReboot: Malicious NuGet packages exploit loophole in MSBuild integrations</a> (ReversingLabs) </p><p><a href="https://therecord.media/russia-launching-own-malware-repository-virustotal">Russia to launch its own version of VirusTotal due to US snooping fears</a> (Record).</p><p><a href="https://therecord.media/russian-hacking-tool-creates-bots">Russian hacking tool floods social networks with bots, researchers say</a> (Record) </p><p><a href="https://www.trendmicro.com/en_us/research/23/j/how-kopeechka--an-automated-social-media-accounts-creation-servi.html">How Kopeechka, an Automated Social Media Accounts Creation Service, Can Facilitate Cybercrime</a> (Trend Micro)</p><p><a href="https://threatresearch.ext.hp.com/hp-wolf-security-threat-insights-report-q3-2023/">HP Wolf Security Threat Insights Report Q3 2023</a> (HP Wolf Security)</p><p><a href="https://media.isc2.org/-/media/Project/ISC2/Main/Media/documents/research/ISC2_Cybersecurity_Workforce_Study_2023.pdf?rev=52055d08ca644293bd7497725bb7fcb4">How the Economy, Skills Gap and Artificial Intelligence are Challenging the Global Cybersecurity Workforce</a> (ISC2)</p><p><a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2023/10/30/executive-order-on-the-safe-secure-and-trustworthy-development-and-use-of-artificial-intelligence/">Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence</a> (The White House)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1568</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[145345e4-2b53-11ee-9c79-3b2a37dc1666]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8411855839.mp3?updated=1698780243" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bringing AI up right–realizing its potential without its becoming a threat. (And how deepfakes might be an informational fleet-in-being.)</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1937/notes</link>
      <description>The Hive ransomware gang may be back, and rebranded. Coinminers exploit AWS IAM credentials. LockBit claims to have obtained sensitive information from Boeing. Ukrainian auxiliaries disrupt Internet service in Russian-occupied territory, while internet and telecoms are down in Gaza. Deepfakes have an effect even when they're not used. Joe Carrigan explains executive impersonations on social media. Our guest is David Brumley, cybersecurity professor at Carnegie Mellon and CEO of software security firm, ForAllSecure, discussing spooky zero days and vulnerabilities. And President Biden releases a US Executive Order on artificial intelligence.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/207

Selected reading.
New Hunters International ransomware possible rebrand of Hive (BleepingComputer) 
CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys (Palo Alto Networks Unit 42)
Boeing assessing Lockbit hacking gang threat of sensitive data leak (Reuters)
Ukrainian hackers disrupt internet providers in Russia-occupied territories (Record) 
Israel steps up air and ground attacks in Gaza and cuts off the territory's communications (AP News) 
The Destruction of Gaza’s Internet Is Complete (WIRED)
Rocket Alert Apps Warn Israelis of Incoming Attacks While Gaza Is Left in the Dark (WIRED).
Elon Musk’s Starlink to help Gaza amid internet blackout (Record)
Families of Hostages Kidnapped by Hamas Turn to Phone Pings for Proof of Life (WIRED)
Israel Taps Blacklisted Pegasus Maker to Track Hostages in Gaza (Bloomberg)
A.I. Muddies Israel-Hamas War in Unexpected Way (New York Times) 
FACT SHEET: President Biden Issues Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence (The White House)
Administration Actions on AI (AI.gov) 
The US Executive Order on artificial intelligence is out. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 30 Oct 2023 20:15:00 -0000</pubDate>
      <itunes:title>Bringing AI up right–realizing its potential without its becoming a threat. (And how deepfakes might be an informational fleet-in-being.)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1937</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Hive ransomware gang may be back, and rebranded. Coinminers exploit AWS IAM credentials. LockBit claims to have obtained sensitive information from Boeing. Ukrainian auxiliaries disrupt Internet service in Russian-occupied territory, while internet and telecoms are down in Gaza. Deepfakes have an effect even when they're not used. Joe Carrigan explains executive impersonations on social media. Our guest is David Brumley, cybersecurity professor at Carnegie Mellon and CEO of software security firm, ForAllSecure, discussing spooky zero days and vulnerabilities. And President Biden releases a US Executive Order on artificial intelligence.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/207

Selected reading.
New Hunters International ransomware possible rebrand of Hive (BleepingComputer) 
CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys (Palo Alto Networks Unit 42)
Boeing assessing Lockbit hacking gang threat of sensitive data leak (Reuters)
Ukrainian hackers disrupt internet providers in Russia-occupied territories (Record) 
Israel steps up air and ground attacks in Gaza and cuts off the territory's communications (AP News) 
The Destruction of Gaza’s Internet Is Complete (WIRED)
Rocket Alert Apps Warn Israelis of Incoming Attacks While Gaza Is Left in the Dark (WIRED).
Elon Musk’s Starlink to help Gaza amid internet blackout (Record)
Families of Hostages Kidnapped by Hamas Turn to Phone Pings for Proof of Life (WIRED)
Israel Taps Blacklisted Pegasus Maker to Track Hostages in Gaza (Bloomberg)
A.I. Muddies Israel-Hamas War in Unexpected Way (New York Times) 
FACT SHEET: President Biden Issues Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence (The White House)
Administration Actions on AI (AI.gov) 
The US Executive Order on artificial intelligence is out. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Hive ransomware gang may be back, and rebranded. Coinminers exploit AWS IAM credentials. LockBit claims to have obtained sensitive information from Boeing. Ukrainian auxiliaries disrupt Internet service in Russian-occupied territory, while internet and telecoms are down in Gaza. Deepfakes have an effect even when they're not used. Joe Carrigan explains executive impersonations on social media. Our guest is David Brumley, cybersecurity professor at Carnegie Mellon and CEO of software security firm, ForAllSecure, discussing spooky zero days and vulnerabilities. And President Biden releases a US Executive Order on artificial intelligence.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/207</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/security/new-hunters-international-ransomware-possible-rebrand-of-hive/">New Hunters International ransomware possible rebrand of Hive</a> (BleepingComputer) </p><p><a href="https://unit42.paloaltonetworks.com/malicious-operations-of-exposed-iam-keys-cryptojacking/">CloudKeys in the Air: Tracking Malicious Operations of Exposed IAM Keys</a> (Palo Alto Networks Unit 42)</p><p><a href="https://www.reuters.com/business/aerospace-defense/boeing-assessing-lockbit-hacking-gang-threat-sensitive-data-leak-2023-10-27/">Boeing assessing Lockbit hacking gang threat of sensitive data leak</a> (Reuters)</p><p><a href="https://therecord.media/ukranian-hackers-disrupt-internet-providers-crimea">Ukrainian hackers disrupt internet providers in Russia-occupied territories</a> (Record) </p><p><a href="https://apnews.com/article/israel-palestinians-gaza-airstrikes-region-e41b5b12e8cdf9db62395314d9a782b6">Israel steps up air and ground attacks in Gaza and cuts off the territory's communications</a> (AP News) </p><p><a href="https://www.wired.com/story/gaza-internet-blackout-israel/">The Destruction of Gaza’s Internet Is Complete</a> (WIRED)</p><p><a href="https://www.wired.com/story/rocket-alert-apps-warn-israelis-attacks-gaza-left-in-the-dark/">Rocket Alert Apps Warn Israelis of Incoming Attacks While Gaza Is Left in the Dark</a> (WIRED).</p><p><a href="https://interestingengineering.com/innovation/elon-musks-starlink-to-help-gaza-amid-internet-blackout">Elon Musk’s Starlink to help Gaza amid internet blackout</a> (Record)</p><p><a href="https://www.wired.com/story/israel-hamas-hostages-phone-location/">Families of Hostages Kidnapped by Hamas Turn to Phone Pings for Proof of Life</a> (WIRED)</p><p><a href="https://www.bloomberg.com/news/articles/2023-10-26/israel-taps-blacklisted-pegasus-maker-nso-to-track-gaza-hostages-and-hamas">Israel Taps Blacklisted Pegasus Maker to Track Hostages in Gaza</a> (Bloomberg)</p><p><a href="https://www.nytimes.com/2023/10/28/business/media/ai-muddies-israel-hamas-war-in-unexpected-way.html">A.I. Muddies Israel-Hamas War in Unexpected Way</a> (New York Times) </p><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/10/30/fact-sheet-president-biden-issues-executive-order-on-safe-secure-and-trustworthy-artificial-intelligence/">FACT SHEET: President Biden Issues Executive Order on Safe, Secure, and Trustworthy Artificial Intelligence</a> (The White House)</p><p><a href="https://ai.gov/actions/">Administration Actions on AI</a> (AI.gov) </p><p><a href="https://thecyberwire.com/stories/94e9617a396b4bf1a8bb6c4ace46d052/the-us-executive-order-on-artificial-intelligence-is-out">The US Executive Order on artificial intelligence is out.</a> (CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1696</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1423aa14-2b53-11ee-9c79-af86a8061505]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4823429089.mp3?updated=1698692618" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Malware Mash! [Bonus]</title>
      <link>https://thecyberwire.com/stories/123bc0f691444be6af3145a6dab6cee4/malware-mash</link>
      <description>Enjoy this CyberWire classic.
They did the Mash...they did the Malware Mash...
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 30 Oct 2023 07:01:00 -0000</pubDate>
      <itunes:title>The Malware Mash! [Bonus]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this CyberWire classic.
They did the Mash...they did the Malware Mash...
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this CyberWire classic.</p><p>They did the Mash...they did the Malware Mash...</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>185</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[177468ba-74f6-11ee-90a1-5bf87b89b2dc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9159011501.mp3?updated=1666877087" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Nicole Sundin: Women helping women. [Chief Product Officer] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/173/notes</link>
      <description>Nicole Sundin, a Chief Product Officer from Axio sits down to discuss her career path and what it is like to be a woman in the cybersecurity field. As a UX leader, Nicole has devoted her entire career to building awareness around the benefits of usable security and human-centered security to the broader cybersecurity community. She also shares some of her background as she moved her way up the later to get to where she is today. As a female in a male-dominated industry, Nicole shares her unique insights on embracing the responsibility of serving as a role model to women aspiring to contribute to the cybersecurity field, and the importance of building a diverse team. She says "Really, it's about building community in your organization and outside your organization of strong women or strong friends that you have that you can lean on when you know you're the only person in the room." We thank Nicole for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 29 Oct 2023 07:01:00 -0000</pubDate>
      <itunes:title>Nicole Sundin: Women helping women. [Chief Product Officer] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>173</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Nicole Sundin, a Chief Product Officer from Axio sits down to discuss her career path and what it is like to be a woman in the cybersecurity field. As a UX leader, Nicole has devoted her entire career to building awareness around the benefits of usable security and human-centered security to the broader cybersecurity community. She also shares some of her background as she moved her way up the later to get to where she is today. As a female in a male-dominated industry, Nicole shares her unique insights on embracing the responsibility of serving as a role model to women aspiring to contribute to the cybersecurity field, and the importance of building a diverse team. She says "Really, it's about building community in your organization and outside your organization of strong women or strong friends that you have that you can lean on when you know you're the only person in the room." We thank Nicole for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Nicole Sundin, a Chief Product Officer from Axio sits down to discuss her career path and what it is like to be a woman in the cybersecurity field. As a UX leader, Nicole has devoted her entire career to building awareness around the benefits of usable security and human-centered security to the broader cybersecurity community. She also shares some of her background as she moved her way up the later to get to where she is today. As a female in a male-dominated industry, Nicole shares her unique insights on embracing the responsibility of serving as a role model to women aspiring to contribute to the cybersecurity field, and the importance of building a diverse team. She says "Really, it's about building community in your organization and outside your organization of strong women or strong friends that you have that you can lean on when you know you're the only person in the room." We thank Nicole for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>519</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[778b0692-74f5-11ee-b530-1fb5479651b6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4946027704.mp3?updated=1698428860" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No rest for the wicked HiatusRAT. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/305/notes</link>
      <description>Danny Adamitis from Lumen's Black Lotus Labs sits down to discuss their work on "No Rest For The Wicked: HiatusRAT Takes Little Time Off In A Return To Action." Last March Lumen's Black Lotus Lab researchers discovered a novel malware called HiatusRAT that targeted business-grade routers.
The research states "In the latest campaign, we observed a shift in reconnaissance and targeting activity; in June we observed reconnaissance against a U.S. military procurement system, and targeting of Taiwan-based organizations." This shift in information gathering and targeting preference exhibited in the latest campaign is synonymous with the strategic interest of the People’s Republic of China according to the 2023 ODNI threat assessment.
The research can be found here:
No Rest For The Wicked: HiatusRAT Takes Little Time Off In A Return To Action

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Oct 2023 07:01:00 -0000</pubDate>
      <itunes:title>No rest for the wicked HiatusRAT. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>305</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Danny Adamitis from Lumen's Black Lotus Labs sits down to discuss their work on "No Rest For The Wicked: HiatusRAT Takes Little Time Off In A Return To Action." Last March Lumen's Black Lotus Lab researchers discovered a novel malware called HiatusRAT that targeted business-grade routers.
The research states "In the latest campaign, we observed a shift in reconnaissance and targeting activity; in June we observed reconnaissance against a U.S. military procurement system, and targeting of Taiwan-based organizations." This shift in information gathering and targeting preference exhibited in the latest campaign is synonymous with the strategic interest of the People’s Republic of China according to the 2023 ODNI threat assessment.
The research can be found here:
No Rest For The Wicked: HiatusRAT Takes Little Time Off In A Return To Action

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Danny Adamitis from Lumen's Black Lotus Labs sits down to discuss their work on "No Rest For The Wicked: HiatusRAT Takes Little Time Off In A Return To Action." Last March Lumen's Black Lotus Lab researchers discovered a novel malware called HiatusRAT that targeted business-grade routers.</p><p>The research states "In the latest campaign, we observed a shift in reconnaissance and targeting activity; in June we observed reconnaissance against a U.S. military procurement system, and targeting of Taiwan-based organizations." This shift in information gathering and targeting preference exhibited in the latest campaign is synonymous with the strategic interest of the People’s Republic of China according to the 2023 ODNI threat assessment.</p><p>The research can be found here:</p><ul><li><a href="https://blog.lumen.com/hiatusrat-takes-little-time-off-in-a-return-to-action/">No Rest For The Wicked: HiatusRAT Takes Little Time Off In A Return To Action</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1381</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8be65006-74f5-11ee-9bda-5be306910216]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1738625320.mp3?updated=1698423077" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Social engineering as a blunt instrument–almost like swatting without the middleman. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1936/notes</link>
      <description>Eastern European gangs overcome their reservations about working with anglophone criminals. Mirth Connect is vulnerable to a critical flaw. A look at a mercenary spyware strain. “PepsiCo” as phishbait. Ben Yelin explains the FCC’s renewed interest in Net Neutrality. Our guest is Wade Baker from the Cyentia Institute with insights on measuring risk. And Europol thinks police should take a good look at quantum computing and law enforcement.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/206

Selected reading.
Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction (Microsoft Security)
MGM Resorts hackers 'one of the most dangerous financial criminal groups’ (Record)
Critical Mirth Connect Vulnerability Could Expose Sensitive Healthcare Data (SecurityWeek) 
Examining Predator Mercenary Spyware (HYAS)
Fresh Phish: The Case of the PepsiCo Procurement Ploy (INKY) 
U.S. Tries New Tack on Russian Disinformation: Pre-Empting It (New York Times) 
ESET APT Activity Report Q2–Q3 2023 (We Live Security) 
Russian hackers claim takedown of WA’s Transperth transport agency with DDoS attack (Cyber Daily) 
The Second Quantum Revolution: The impact of quantum computing and quantum technologies on law enforcement (Europol Innovation Lab) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 27 Oct 2023 20:15:00 -0000</pubDate>
      <itunes:title>Social engineering as a blunt instrument–almost like swatting without the middleman. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1936</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Eastern European gangs overcome their reservations about working with anglophone criminals. Mirth Connect is vulnerable to a critical flaw. A look at a mercenary spyware strain. “PepsiCo” as phishbait. Ben Yelin explains the FCC’s renewed interest in Net Neutrality. Our guest is Wade Baker from the Cyentia Institute with insights on measuring risk. And Europol thinks police should take a good look at quantum computing and law enforcement.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/206

Selected reading.
Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction (Microsoft Security)
MGM Resorts hackers 'one of the most dangerous financial criminal groups’ (Record)
Critical Mirth Connect Vulnerability Could Expose Sensitive Healthcare Data (SecurityWeek) 
Examining Predator Mercenary Spyware (HYAS)
Fresh Phish: The Case of the PepsiCo Procurement Ploy (INKY) 
U.S. Tries New Tack on Russian Disinformation: Pre-Empting It (New York Times) 
ESET APT Activity Report Q2–Q3 2023 (We Live Security) 
Russian hackers claim takedown of WA’s Transperth transport agency with DDoS attack (Cyber Daily) 
The Second Quantum Revolution: The impact of quantum computing and quantum technologies on law enforcement (Europol Innovation Lab) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Eastern European gangs overcome their reservations about working with anglophone criminals. Mirth Connect is vulnerable to a critical flaw. A look at a mercenary spyware strain. “PepsiCo” as phishbait. Ben Yelin explains the FCC’s renewed interest in Net Neutrality. Our guest is Wade Baker from the Cyentia Institute with insights on measuring risk. And Europol thinks police should take a good look at quantum computing and law enforcement.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/206</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.microsoft.com/en-us/security/blog/2023/10/25/octo-tempest-crosses-boundaries-to-facilitate-extortion-encryption-and-destruction/">Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction</a> (Microsoft Security)</p><p><a href="https://therecord.media/mgm-resorts-hackers-most-dangerous-microsoft">MGM Resorts hackers 'one of the most dangerous financial criminal groups’</a> (Record)</p><p><a href="https://www.securityweek.com/critical-mirth-connect-vulnerability-could-expose-sensitive-healthcare-data/">Critical Mirth Connect Vulnerability Could Expose Sensitive Healthcare Data</a> (SecurityWeek) </p><p><a href="https://www.hyas.com/blog/examining-predator-mercenary-spyware">Examining Predator Mercenary Spyware</a> (HYAS)</p><p><a href="https://www.inky.com/en/blog/fresh-phish-streaming-platforms-are-targeted-by-bad-actors-amid-the-real-actors-strike">Fresh Phish: The Case of the PepsiCo Procurement Ploy</a> (INKY) </p><p><a href="https://www.nytimes.com/2023/10/26/technology/russian-disinformation-us-state-department-campaign.html">U.S. Tries New Tack on Russian Disinformation: Pre-Empting It</a> (New York Times) </p><p><a href="https://www.welivesecurity.com/en/eset-research/eset-apt-activity-report-q2-q3-2023/">ESET APT Activity Report Q2–Q3 2023</a> (We Live Security) </p><p><a href="https://www.cyberdaily.au/security/9748-russian-hackers-claim-takedown-of-wa-s-transperth-transport-agency-with-ddos-attack">Russian hackers claim takedown of WA’s Transperth transport agency with DDoS attack</a> (Cyber Daily) </p><p><a href="https://www.europol.europa.eu/cms/sites/default/files/documents/Europol_Innovation_Lab_Observatory_Report%20-%20The%20Second%20Quantum%20Revolution.pdf">The Second Quantum Revolution: The impact of quantum computing and quantum technologies on law enforcement</a> (Europol Innovation Lab) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1698</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[14b10846-2b53-11ee-9c79-9f08af978f25]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1735804534.mp3?updated=1698433039" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Some intelligence services understand the value of being underestimated. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1935/notes</link>
      <description>StripedFly gets reclassified. YoroTrooper is interested in the Commonwealth of Independent States. The current state of DDoS attacks. Ukrainian hacktivists deface Russian artists' Spotify pages. Trolls amplify a Musky meme. In our Industry Voices segment, Matt Howard from Virtru explains securing data at the employee edge. Our guest is Seth Blank from Valimail, to discuss email security and DMARC. And while trolls might like Mr.Musk, the crooks heart Mr. Gosling.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/205

Selected reading.
Sophisticated StripedFly Spy Platform Masqueraded for Years as Crypto Miner (Zeroday)
Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan (Cisco Talos Blog)
DDoS threat report for 2023 Q3 (The Cloudflare Blog) 
Russian artists’ Spotify accounts defaced by pro-Ukraine hackers (Record) 
Elon Musk Mocked Ukraine, and Russian Trolls Went Wild (WIRED)
Ryan Gosling Tops McAfee’s 2023 Hacker Celebrity Hot List (Business Wire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 26 Oct 2023 20:15:00 -0000</pubDate>
      <itunes:title>Some intelligence services understand the value of being underestimated. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1935</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>StripedFly gets reclassified. YoroTrooper is interested in the Commonwealth of Independent States. The current state of DDoS attacks. Ukrainian hacktivists deface Russian artists' Spotify pages. Trolls amplify a Musky meme. In our Industry Voices segment, Matt Howard from Virtru explains securing data at the employee edge. Our guest is Seth Blank from Valimail, to discuss email security and DMARC. And while trolls might like Mr.Musk, the crooks heart Mr. Gosling.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/205

Selected reading.
Sophisticated StripedFly Spy Platform Masqueraded for Years as Crypto Miner (Zeroday)
Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan (Cisco Talos Blog)
DDoS threat report for 2023 Q3 (The Cloudflare Blog) 
Russian artists’ Spotify accounts defaced by pro-Ukraine hackers (Record) 
Elon Musk Mocked Ukraine, and Russian Trolls Went Wild (WIRED)
Ryan Gosling Tops McAfee’s 2023 Hacker Celebrity Hot List (Business Wire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>StripedFly gets reclassified. YoroTrooper is interested in the Commonwealth of Independent States. The current state of DDoS attacks. Ukrainian hacktivists deface Russian artists' Spotify pages. Trolls amplify a Musky meme. In our Industry Voices segment, Matt Howard from Virtru explains securing data at the employee edge. Our guest is Seth Blank from Valimail, to discuss email security and DMARC. And while trolls might like Mr.Musk, the crooks heart Mr. Gosling.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/205</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.zetter-zeroday.com/p/sophisticated-stripedfly-spy-platform">Sophisticated StripedFly Spy Platform Masqueraded for Years as Crypto Miner</a> (Zeroday)</p><p><a href="https://blog.talosintelligence.com/attributing-yorotrooper/">Kazakhstan-associated YoroTrooper disguises origin of attacks as Azerbaijan</a> (Cisco Talos Blog)</p><p><a href="https://blog.cloudflare.com/ddos-threat-report-2023-q3/">DDoS threat report for 2023 Q3</a> (The Cloudflare Blog) </p><p><a href="https://therecord.media/ukraine-hackers-deface-russian-artists-spotify-pages">Russian artists’ Spotify accounts defaced by pro-Ukraine hackers</a> (Record) </p><p><a href="https://www.wired.com/story/elon-musk-mocked-ukraine-russian-trolls-went-wild/">Elon Musk Mocked Ukraine, and Russian Trolls Went Wild</a> (WIRED)</p><p><a href="https://www.businesswire.com/news/home/20231025932929/en/Ryan-Gosling-Tops-McAfee%E2%80%99s-2023-Hacker-Celebrity-Hot-List">Ryan Gosling Tops McAfee’s 2023 Hacker Celebrity Hot List</a> (Business Wire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1822</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[14921256-2b53-11ee-9c79-cb35685ba6d2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9942626921.mp3?updated=1698349746" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AI ain’t misbehavin’, except when it does. Also, privateers and hacktivist auxiliaries get busy. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1934/notes</link>
      <description>Teaching AI to misbehave. Ransomware's effect on healthcare downtime. Two reports on the state of cybersecurity in the financial services sector. Possible connections between Hamas and Quds Force. Ukrainian cyber authorities report a rise in privateering Smokeloader attacks. Russian hacktivist auxiliaries strike Czech targets. My conversation with Sherrod DeGrippo, host of The Microsoft Threat Intelligence Podcast. Jay Bhalodia from Microsoft Federal shares insights on multi-cloud security. And Winter Vivern exploits a mail service 0-day.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/204

Selected reading.
AI vs. human deceit: Unravelling the new age of phishing tactics (Security Intelligence)
Ransomware attacks on US healthcare organizations cost $20.8bn in 2020 (Comparitech) 
Cyberattack at 5 southwestern Ontario hospitals leaves patients awaiting care (CBC News) 
State of Security for Financial Services (Swimlane)
Veracode Reveals Automation and Training Are Key Drivers of Software Security for Financial Services (Business Wire)
Hamas’ online infrastructure reveals ties to Iran APT, researchers say (CSO Online) 
Hamas Application Infrastructure Reveals Possible Overlap With TAG-63 and Iranian Threat Activity | Recorded Future (Recorded Future)
Ukraine cyber officials warn of a ‘surge’ in Smokeloader attacks on financial, government entities (Record) 
Bloomberg: Russia steps up cyberattacks to disrupt Ukraine’s key services (Euromaidan) 
Pro-Russia group behind today’s mass cyberattack against Czech institutions (Expats.cz)
Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers (We Live Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 25 Oct 2023 20:15:00 -0000</pubDate>
      <itunes:title>AI ain’t misbehavin’, except when it does. Also, privateers and hacktivist auxiliaries get busy. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1934</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Teaching AI to misbehave. Ransomware's effect on healthcare downtime. Two reports on the state of cybersecurity in the financial services sector. Possible connections between Hamas and Quds Force. Ukrainian cyber authorities report a rise in privateering Smokeloader attacks. Russian hacktivist auxiliaries strike Czech targets. My conversation with Sherrod DeGrippo, host of The Microsoft Threat Intelligence Podcast. Jay Bhalodia from Microsoft Federal shares insights on multi-cloud security. And Winter Vivern exploits a mail service 0-day.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/204

Selected reading.
AI vs. human deceit: Unravelling the new age of phishing tactics (Security Intelligence)
Ransomware attacks on US healthcare organizations cost $20.8bn in 2020 (Comparitech) 
Cyberattack at 5 southwestern Ontario hospitals leaves patients awaiting care (CBC News) 
State of Security for Financial Services (Swimlane)
Veracode Reveals Automation and Training Are Key Drivers of Software Security for Financial Services (Business Wire)
Hamas’ online infrastructure reveals ties to Iran APT, researchers say (CSO Online) 
Hamas Application Infrastructure Reveals Possible Overlap With TAG-63 and Iranian Threat Activity | Recorded Future (Recorded Future)
Ukraine cyber officials warn of a ‘surge’ in Smokeloader attacks on financial, government entities (Record) 
Bloomberg: Russia steps up cyberattacks to disrupt Ukraine’s key services (Euromaidan) 
Pro-Russia group behind today’s mass cyberattack against Czech institutions (Expats.cz)
Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers (We Live Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Teaching AI to misbehave. Ransomware's effect on healthcare downtime. Two reports on the state of cybersecurity in the financial services sector. Possible connections between Hamas and Quds Force. Ukrainian cyber authorities report a rise in privateering Smokeloader attacks. Russian hacktivist auxiliaries strike Czech targets. My conversation with Sherrod DeGrippo, host of The Microsoft Threat Intelligence Podcast. Jay Bhalodia from Microsoft Federal shares insights on multi-cloud security. And Winter Vivern exploits a mail service 0-day.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/204</p><p><br></p><h2>Selected reading.</h2><p><a href="https://securityintelligence.com/posts/ai-vs-human-deceit-unravelling-new-age-phishing-tactics/">AI vs. human deceit: Unravelling the new age of phishing tactics</a> (Security Intelligence)</p><p><a href="https://www.comparitech.com/blog/information-security/ransomware-attacks-hospitals-data/">Ransomware attacks on US healthcare organizations cost $20.8bn in 2020</a> (Comparitech) </p><p><a href="https://www.cbc.ca/news/canada/windsor/hospital-cyber-attack-tuesday-1.7006509">Cyberattack at 5 southwestern Ontario hospitals leaves patients awaiting care</a> (CBC News) </p><p><a href="https://swimlane.com/resources/reports/state-of-cyber-security-for-financial-services/">State of Security for Financial Services</a> (Swimlane)</p><p><a href="https://www.businesswire.com/news/home/20231025298360/en/Veracode-Reveals-Automation-and-Training-Are-Key-Drivers-of-Software-Security-for-Financial-Services">Veracode Reveals Automation and Training Are Key Drivers of Software Security for Financial Services </a>(Business Wire)</p><p><a href="https://www.csoonline.com/article/656699/hamas-online-infrastructure-reveals-ties-to-iran-researchers-say.html">Hamas’ online infrastructure reveals ties to Iran APT, researchers say</a> (CSO Online) </p><p><a href="https://www.recordedfuture.com/hamas-application-infrastructure-reveals-possible-overlap-tag-63-iranian-threat-activity">Hamas Application Infrastructure Reveals Possible Overlap With TAG-63 and Iranian Threat Activity | Recorded Future</a> (Recorded Future)</p><p><a href="https://therecord.media/surge-in-smokeloader-malware-attacks-targeting-ukrainian-financial-gov-orgs">Ukraine cyber officials warn of a ‘surge’ in Smokeloader attacks on financial, government entities</a> (Record) </p><p><a href="https://euromaidanpress.com/2023/10/24/bloomberg-russia-steps-up-cyberattacks-to-disrupt-ukraines-key-services/">Bloomberg: Russia steps up cyberattacks to disrupt Ukraine’s key services</a> (Euromaidan) </p><p><a href="https://www.expats.cz/czech-news/article/pro-russia-group-behind-today-s-mass-cyberattack-against-czech-institutions">Pro-Russia group behind today’s mass cyberattack against Czech institutions</a> (Expats.cz)</p><p><a href="https://www.welivesecurity.com/en/eset-research/winter-vivern-exploits-zero-day-vulnerability-roundcube-webmail-servers/">Winter Vivern exploits zero-day vulnerability in Roundcube Webmail servers</a> (We Live Security)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1819</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1472822e-2b53-11ee-9c79-1b3047203859]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7154945470.mp3?updated=1698260980" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Two new things to worry about: how long it takes to read the fine print, and bed bug disinformation. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1933/notes</link>
      <description>DDoS activity during the Hamas-Israeli war. Insurance firm reports cyber incident. Recent arrests in cybercrime sweeps. Ukrainian hacktivist auxiliaries compromise customer data at Russia's Alfa Bank. How long does it take to read the fine print? Ann Johnson from Afternoon Cyber Tea talks with Noopur Davis from Comcast about building secure tech from the start. Antonio Sanchez of Fortra shares cybersecurity challenges for enterprises including why having too many tools creates too much complexity. And hey, Marianne–don’t let the bedbugs bite. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/203

Selected reading.
Cyber attacks in the Israel-Hamas war (The Cloudflare Blog)
China's crackdown on cyber scams in Southeast Asia ensnares thousands but leaves the networks intact (AP News) 
12 people arrested for bank malware scam, youngest being just 17 (The Independent Singapore News) 
Spain arrests 34 cybercriminals who stole data of 4 million people (BleepingComputer) 
Police Disrupt Ragnar Locker Ransomware Group (Infosecurity Magazine) 
Ragnar Locker Ransomware Boss Arrested in Paris (Dark Reading) 
E-Root marketplace credential-selling admin extradited to US (Register)
Ukraine security services involved in hack of Russia’s largest private bank (Record)
NordVPN study: Privacy policy awareness (NordVPN)
Russia spread bedbug panic in France, intelligence services suspect (The Telegraph) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Oct 2023 20:15:00 -0000</pubDate>
      <itunes:title>Two new things to worry about: how long it takes to read the fine print, and bed bug disinformation. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1933</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>DDoS activity during the Hamas-Israeli war. Insurance firm reports cyber incident. Recent arrests in cybercrime sweeps. Ukrainian hacktivist auxiliaries compromise customer data at Russia's Alfa Bank. How long does it take to read the fine print? Ann Johnson from Afternoon Cyber Tea talks with Noopur Davis from Comcast about building secure tech from the start. Antonio Sanchez of Fortra shares cybersecurity challenges for enterprises including why having too many tools creates too much complexity. And hey, Marianne–don’t let the bedbugs bite. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/203

Selected reading.
Cyber attacks in the Israel-Hamas war (The Cloudflare Blog)
China's crackdown on cyber scams in Southeast Asia ensnares thousands but leaves the networks intact (AP News) 
12 people arrested for bank malware scam, youngest being just 17 (The Independent Singapore News) 
Spain arrests 34 cybercriminals who stole data of 4 million people (BleepingComputer) 
Police Disrupt Ragnar Locker Ransomware Group (Infosecurity Magazine) 
Ragnar Locker Ransomware Boss Arrested in Paris (Dark Reading) 
E-Root marketplace credential-selling admin extradited to US (Register)
Ukraine security services involved in hack of Russia’s largest private bank (Record)
NordVPN study: Privacy policy awareness (NordVPN)
Russia spread bedbug panic in France, intelligence services suspect (The Telegraph) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>DDoS activity during the Hamas-Israeli war. Insurance firm reports cyber incident. Recent arrests in cybercrime sweeps. Ukrainian hacktivist auxiliaries compromise customer data at Russia's Alfa Bank. How long does it take to read the fine print? Ann Johnson from Afternoon Cyber Tea talks with Noopur Davis from Comcast about building secure tech from the start. Antonio Sanchez of Fortra shares cybersecurity challenges for enterprises including why having too many tools creates too much complexity. And hey, Marianne–don’t let the bedbugs bite. </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/203</p><h2><br></h2><h2>Selected reading.</h2><p><a href="https://blog.cloudflare.com/cyber-attacks-in-the-israel-hamas-war/">Cyber attacks in the Israel-Hamas war</a> (The Cloudflare Blog)</p><p><a href="https://apnews.com/article/china-southeast-asia-cyberscam-criminal-myanmar-4d749243cd4c95d697060d8cef59cabb">China's crackdown on cyber scams in Southeast Asia ensnares thousands but leaves the networks intact</a> (AP News) </p><p><a href="https://theindependent.sg/12-people-arrested-for-bank-malware-scam-youngest-being-just-17/">12 people arrested for bank malware scam, youngest being just 17</a> (The Independent Singapore News) </p><p><a href="https://www.bleepingcomputer.com/news/security/spain-arrests-34-cybercriminals-who-stole-data-of-4-million-people/">Spain arrests 34 cybercriminals who stole data of 4 million people</a> (BleepingComputer) </p><p><a href="https://www.infosecurity-magazine.com/news/police-dismantle-ragnar-locker/">Police Disrupt Ragnar Locker Ransomware Group</a> (Infosecurity Magazine) </p><p><a href="https://www.darkreading.com/threat-intelligence/ragnar-locker-ransomware-boss-arrested-paris">Ragnar Locker Ransomware Boss Arrested in Paris</a> (Dark Reading) </p><p><a href="https://www.theregister.com/2023/10/20/eroot_admin_extradited/">E-Root marketplace credential-selling admin extradited to US</a> (Register)</p><p><a href="https://therecord.media/sbu-involved-in-alfa-bank-hack">Ukraine security services involved in hack of Russia’s largest private bank</a> (Record)</p><p><a href="https://nordvpn.com/blog/privacy-policy-study-us/">NordVPN study: Privacy policy awareness</a> (NordVPN)</p><p><a href="https://www.telegraph.co.uk/world-news/2023/10/23/russia-may-have-fanned-bed-bug-panic-in-france-intelligence/">Russia spread bedbug panic in France, intelligence services suspect</a> (The Telegraph) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1686</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1443844c-2b53-11ee-9c79-8fa381f892e7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3133777247.mp3?updated=1698177482" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How people get over on the content moderators.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1932/notes</link>
      <description>Okta discloses a data exposure incident. Cisco works to fix a zero-day. DPRK threat actors pose as IT workers. The Five Eyes warn of AI-enabled Chinese espionage. Job posting as phishbait. The risk of first-party fraud. Hacktivists trouble humanitarian organizations with nuisance attacks. Content moderation during wartime. Malek Ben Salem of Accenture describes code models. Our guest is Joe Oregon from CISA, discussing the tabletop exercise that CISA, the NFL, and local partners conducted in preparation for the next Super BowI. And the International Criminal Court confirms that it’s sustained a cyberespionage incident.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/202

Selected reading.
Okta says hackers used stolen credentials to view customer files (Record)
Cisco discloses new IOS XE zero-day exploited to deploy malware implant (BleepingComputer)
Additional Guidance on the Democratic People's Republic of Korea Information Technology Workers (IC3)
A stern glance from all Five Eyes. (CyberWire) 
DarkGate malware campaign (WithSecure) 
The Fraud Next Door: First-Party Fraud Runs Rampant in America (PR Newswire)
Cyberattacks Intensify on Israeli and Palestinian Human Rights Groups (Wall Street Journal) 
Israel's burial society website comes under cyberattack (Jerusalem Post) 
Sheba Medical Center Hit by Cyber Attack (Jewish Press) 
Health Ministry disconnects the remote connection of several hospitals following cyber attack (Jerusalem Post)
EU asks Meta, TikTok to account for their response to Israel-Hamas disinformation (Record) 
Pro-Palestinian creators use secret spellings, code words to evade social media algorithms (Washington Post) 
Web Summit CEO resigns after comments on Israel-Hamas conflict (Reuters) 
YouTube is Autogenerating Videos for Songs Advocating the Expulsion of Muslims from India (bellingcat) 
Palestinians Claim Social Media 'Censorship' Is Endangering Lives (WIRED) 
International Criminal Court says cyberattack was attempted espionage (TechCrunch) 
War crimes tribunal says September cyberattack was act of espionage (Record) 
International Criminal Court investigating “unprecedented” cyberattack (Cybernews) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 23 Oct 2023 20:15:00 -0000</pubDate>
      <itunes:title>How people get over on the content moderators.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1932</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Okta discloses a data exposure incident. Cisco works to fix a zero-day. DPRK threat actors pose as IT workers. The Five Eyes warn of AI-enabled Chinese espionage. Job posting as phishbait. The risk of first-party fraud. Hacktivists trouble humanitarian organizations with nuisance attacks. Content moderation during wartime. Malek Ben Salem of Accenture describes code models. Our guest is Joe Oregon from CISA, discussing the tabletop exercise that CISA, the NFL, and local partners conducted in preparation for the next Super BowI. And the International Criminal Court confirms that it’s sustained a cyberespionage incident.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/202

Selected reading.
Okta says hackers used stolen credentials to view customer files (Record)
Cisco discloses new IOS XE zero-day exploited to deploy malware implant (BleepingComputer)
Additional Guidance on the Democratic People's Republic of Korea Information Technology Workers (IC3)
A stern glance from all Five Eyes. (CyberWire) 
DarkGate malware campaign (WithSecure) 
The Fraud Next Door: First-Party Fraud Runs Rampant in America (PR Newswire)
Cyberattacks Intensify on Israeli and Palestinian Human Rights Groups (Wall Street Journal) 
Israel's burial society website comes under cyberattack (Jerusalem Post) 
Sheba Medical Center Hit by Cyber Attack (Jewish Press) 
Health Ministry disconnects the remote connection of several hospitals following cyber attack (Jerusalem Post)
EU asks Meta, TikTok to account for their response to Israel-Hamas disinformation (Record) 
Pro-Palestinian creators use secret spellings, code words to evade social media algorithms (Washington Post) 
Web Summit CEO resigns after comments on Israel-Hamas conflict (Reuters) 
YouTube is Autogenerating Videos for Songs Advocating the Expulsion of Muslims from India (bellingcat) 
Palestinians Claim Social Media 'Censorship' Is Endangering Lives (WIRED) 
International Criminal Court says cyberattack was attempted espionage (TechCrunch) 
War crimes tribunal says September cyberattack was act of espionage (Record) 
International Criminal Court investigating “unprecedented” cyberattack (Cybernews) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Okta discloses a data exposure incident. Cisco works to fix a zero-day. DPRK threat actors pose as IT workers. The Five Eyes warn of AI-enabled Chinese espionage. Job posting as phishbait. The risk of first-party fraud. Hacktivists trouble humanitarian organizations with nuisance attacks. Content moderation during wartime. Malek Ben Salem of Accenture describes code models. Our guest is Joe Oregon from CISA, discussing the tabletop exercise that CISA, the NFL, and local partners conducted in preparation for the next Super BowI. And the International Criminal Court confirms that it’s sustained a cyberespionage incident.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/202</p><p><br></p><h2>Selected reading.</h2><p><a href="https://therecord.media/hackers-used-stolen-credentials-okta">Okta says hackers used stolen credentials to view customer files</a> (Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-discloses-new-ios-xe-zero-day-exploited-to-deploy-malware-implant/">Cisco discloses new IOS XE zero-day exploited to deploy malware implant</a> (BleepingComputer)</p><p><a href="https://www.ic3.gov/Media/Y2023/PSA231018">Additional Guidance on the Democratic People's Republic of Korea Information Technology Workers</a> (IC3)</p><p><a href="https://thecyberwire.com/stories/b9135676d48340ed84cde1416281e0ff/a-stern-glance-from-all-five-eyes">A stern glance from all Five Eyes.</a> (CyberWire) </p><p><a href="https://usw2.nyl.as/t1/305/lb4swi71rdbwxf1vcwz8gz1l/0/f0c2ee80c5c48bce0e27a109860e6766e82b2f22bf316519cf36cfbde64ad16d">DarkGate malware campaign</a> (WithSecure) </p><p><a href="https://www.prnewswire.com/news-releases/the-fraud-next-door-first-party-fraud-runs-rampant-in-america-301963729.html">The Fraud Next Door: First-Party Fraud Runs Rampant in America</a> (PR Newswire)</p><p><a href="https://www.wsj.com/articles/cyberattacks-intensify-on-israeli-and-palestinian-human-rights-groups-118bcfd5">Cyberattacks Intensify on Israeli and Palestinian Human Rights Groups</a> (Wall Street Journal) </p><p><a href="https://www.jpost.com/breaking-news/article-769501">Israel's burial society website comes under cyberattack</a> (Jerusalem Post) </p><p><a href="https://www.jewishpress.com/news/breaking-news/sheba-medical-center-hit-by-cyber-attack/2023/10/21/">Sheba Medical Center Hit by Cyber Attack</a> (Jewish Press) </p><p><a href="https://www.jpost.com/breaking-news/article-769508">Health Ministry disconnects the remote connection of several hospitals following cyber attack</a> (Jerusalem Post)</p><p><a href="https://therecord.media/eu-meta-tiktok-israel-palestine-disinformation">EU asks Meta, TikTok to account for their response to Israel-Hamas disinformation</a> (Record) </p><p><a href="https://www.washingtonpost.com/technology/2023/10/20/palestinian-tiktok-instagram-algospeak-israel-hamas/">Pro-Palestinian creators use secret spellings, code words to evade social media algorithms</a> (Washington Post) </p><p><a href="https://www.reuters.com/technology/web-summit-ceo-resigns-after-recent-comments-israeli-conflict-2023-10-21/">Web Summit CEO resigns after comments on Israel-Hamas conflict</a> (Reuters) </p><p><a href="https://www.bellingcat.com/news/2023/10/16/youtube-is-autogenerating-videos-for-songs-advocating-the-expulsion-of-muslims-from-india/">YouTube is Autogenerating Videos for Songs Advocating the Expulsion of Muslims from India</a> (bellingcat) </p><p><a href="https://www.wired.com/story/palestinians-claim-social-media-censorship-is-endangering-lives/">Palestinians Claim Social Media 'Censorship' Is Endangering Lives</a> (WIRED) </p><p><a href="https://techcrunch.com/2023/10/20/war-crimes-tribunal-cyberattack-espionage-russia/">International Criminal Court says cyberattack was attempted espionage</a> (TechCrunch) </p><p><a href="https://therecord.media/war-crimes-tribunal-cyberattack-espionage">War crimes tribunal says September cyberattack was act of espionage</a> (Record) </p><p><a href="https://cybernews.com/security/international-criminal-court-investigating-unprecedented-cyberattack/">International Criminal Court investigating “unprecedented” cyberattack</a> (Cybernews) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1824</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1402e27a-2b53-11ee-9c79-83fd83249192]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6627249108.mp3?updated=1698179054" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jennifer Reed: Balance the gender scales. [Principal] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/172/notes</link>
      <description>This week, we welcome Jennifer Reed, a Principal Solutions Architect at Amazon Web Services (AWS) to sit down and share her amazing story. After Jennifer graduated high school, she immediately went into Marine Corps training, which she shared was a shock to her because she was the only woman when she got out into the fleet and every single place that she went. She eventually moved on from the military after learning some programming tools, and went into the financial services industry doing systems engineering. She got called back to active duty, and then afterwards landed at AWS. She shares that being a woman in this industry can be challenging at time, but she says "I do feel, um, good about the things I've overcome, but I also don't want it to be so hard for the next person, if that makes sense. I don't want them to have to have those same struggles to kind of overcome any perceptions that someone might have due to their their gender or their background." We thank Jennifer for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 22 Oct 2023 07:00:00 -0000</pubDate>
      <itunes:title>Jennifer Reed: Balance the gender scales. [Principal] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>172</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, we welcome Jennifer Reed, a Principal Solutions Architect at Amazon Web Services (AWS) to sit down and share her amazing story. After Jennifer graduated high school, she immediately went into Marine Corps training, which she shared was a shock to her because she was the only woman when she got out into the fleet and every single place that she went. She eventually moved on from the military after learning some programming tools, and went into the financial services industry doing systems engineering. She got called back to active duty, and then afterwards landed at AWS. She shares that being a woman in this industry can be challenging at time, but she says "I do feel, um, good about the things I've overcome, but I also don't want it to be so hard for the next person, if that makes sense. I don't want them to have to have those same struggles to kind of overcome any perceptions that someone might have due to their their gender or their background." We thank Jennifer for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we welcome Jennifer Reed, a Principal Solutions Architect at Amazon Web Services (AWS) to sit down and share her amazing story. After Jennifer graduated high school, she immediately went into Marine Corps training, which she shared was a shock to her because she was the only woman when she got out into the fleet and every single place that she went. She eventually moved on from the military after learning some programming tools, and went into the financial services industry doing systems engineering. She got called back to active duty, and then afterwards landed at AWS. She shares that being a woman in this industry can be challenging at time, but she says "I do feel, um, good about the things I've overcome, but I also don't want it to be so hard for the next person, if that makes sense. I don't want them to have to have those same struggles to kind of overcome any perceptions that someone might have due to their their gender or their background." We thank Jennifer for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>506</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0e8e6a20-6f6f-11ee-a3db-7369ca2b4702]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5956143100.mp3?updated=1697821414" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AMBERSQUID hides in the depths. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/304/notes</link>
      <description>Sysdig's Alessandro Brucato and Michael Clark join Dave to discuss their work on "AWS's Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation." Attackers are targeting what are typically considered secure AWS services, like AWS Fargate and Amazon SageMaker. This means that defenders generally aren’t as concerned with their security from end-to-end.
The research states "The AMBERSQUID operation was able to exploit cloud services without triggering the AWS requirement for approval of more resources, as would be the case if they only spammed EC2 instances." This poses additional challenges targeting multiple services since it requires finding and killing all miners in each exploited service.
The research can be found here:
AWS’s Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Oct 2023 07:00:00 -0000</pubDate>
      <itunes:title>AMBERSQUID hides in the depths. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>304</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Sysdig's Alessandro Brucato and Michael Clark join Dave to discuss their work on "AWS's Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation." Attackers are targeting what are typically considered secure AWS services, like AWS Fargate and Amazon SageMaker. This means that defenders generally aren’t as concerned with their security from end-to-end.
The research states "The AMBERSQUID operation was able to exploit cloud services without triggering the AWS requirement for approval of more resources, as would be the case if they only spammed EC2 instances." This poses additional challenges targeting multiple services since it requires finding and killing all miners in each exploited service.
The research can be found here:
AWS’s Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sysdig's Alessandro Brucato and Michael Clark join Dave to discuss their work on "AWS's Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation." Attackers are targeting what are typically considered secure AWS services, like AWS Fargate and Amazon SageMaker. This means that defenders generally aren’t as concerned with their security from end-to-end.</p><p>The research states "The AMBERSQUID operation was able to exploit cloud services without triggering the AWS requirement for approval of more resources, as would be the case if they only spammed EC2 instances." This poses additional challenges targeting multiple services since it requires finding and killing all miners in each exploited service.</p><p>The research can be found here:</p><ul><li><a href="https://sysdig.com/blog/ambersquid/#:~:text=The%20Sysdig%20Threat%20Research%20Team,AWS%20Fargate%2C%20and%20Amazon%20SageMaker">AWS’s Hidden Threat: AMBERSQUID Cloud-Native Cryptojacking Operation</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1057</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[245604bc-6f6f-11ee-b5bb-6bd1239ce8ce]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7087490485.mp3?updated=1697813369" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Disinformation and its often overlooked potential for denial-of-services.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1931/notes</link>
      <description>Hacktivism and influence operations in the Hamas-Israel war. An OilRig cyberespionage campaign prospects a Middle Eastern government. Emailed bomb threats in the Baltic. Darkweb advertising yields insight into ExelaStealer malware. Casio discloses breach of customer data. The FCC proposes a return to net neutrality, while Consumer Financial Protection Bureau proposes data-handling rules under Dodd-Frank. Deepen Desai from ZScaler shares insights on MOVEit transfer vulnerabilities. Our own Simone Petrella speaks with Google’s Tatyana Bolton about the challenges of bridging the cyber talent gap. And RagnarLocker has been taken down by international law enforcement. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/201

Selected reading.
Intel, defense officials tell senators that Israel did not strike hospital  (The Hill)
Early U.S. and Israeli Intelligence Says Palestinian Group Caused Hospital Blast.
Cyberattacks linked to Israel-Hamas war are soaring (Fast Company) 
NSO, Israeli cyber firms help track missing Israelis and hostages (Haaretz) 
Lithuanian interior minister says emailed bomb threats are coordinated regional cyber-attack (Baltic Times)
Another InfoStealer Enters the Field, ExelaStealer (Fortinet Blog)
Q3 Report: Email Threat Trends Latest edition: PDF Popularity, Callback Phishing and Redline Malware (VIPRE)
Casio Issues Apology and Notice Concerning Personal Information Leak Due to Unauthorized Access to Server | CASIO (CASIO Official Website) 
Human Error: Casio ClassPad Data Breach Impacting 148 Countries (Hackread) 
Casio data breach 2023 caused worldwide panic (Dataconomy)
Casio discloses data breach impacting customers in 149 countries (BleepingComputer) 
FCC Revives ‘Net Neutrality,’ Proposes New Regulations for Internet Service (Wall Street Journal) 
FCC begins second quest for net neutrality (TechCrunch)
CFPB Proposes Rule to Jumpstart Competition and Accelerate Shift to Open Banking (Consumer Financial Protection Bureau)
RagnarLocker ransomware dark web site seized in international sting (TechCrunch) 
Ragnar Locker ransomware site taken down by FBI, Europol (Record) 
One of the most destructive ransomware gangs is being taken down by law enforcement (Axios)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 20 Oct 2023 20:15:00 -0000</pubDate>
      <itunes:title>Disinformation and its often overlooked potential for denial-of-services.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1931</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Hacktivism and influence operations in the Hamas-Israel war. An OilRig cyberespionage campaign prospects a Middle Eastern government. Emailed bomb threats in the Baltic. Darkweb advertising yields insight into ExelaStealer malware. Casio discloses breach of customer data. The FCC proposes a return to net neutrality, while Consumer Financial Protection Bureau proposes data-handling rules under Dodd-Frank. Deepen Desai from ZScaler shares insights on MOVEit transfer vulnerabilities. Our own Simone Petrella speaks with Google’s Tatyana Bolton about the challenges of bridging the cyber talent gap. And RagnarLocker has been taken down by international law enforcement. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/201

Selected reading.
Intel, defense officials tell senators that Israel did not strike hospital  (The Hill)
Early U.S. and Israeli Intelligence Says Palestinian Group Caused Hospital Blast.
Cyberattacks linked to Israel-Hamas war are soaring (Fast Company) 
NSO, Israeli cyber firms help track missing Israelis and hostages (Haaretz) 
Lithuanian interior minister says emailed bomb threats are coordinated regional cyber-attack (Baltic Times)
Another InfoStealer Enters the Field, ExelaStealer (Fortinet Blog)
Q3 Report: Email Threat Trends Latest edition: PDF Popularity, Callback Phishing and Redline Malware (VIPRE)
Casio Issues Apology and Notice Concerning Personal Information Leak Due to Unauthorized Access to Server | CASIO (CASIO Official Website) 
Human Error: Casio ClassPad Data Breach Impacting 148 Countries (Hackread) 
Casio data breach 2023 caused worldwide panic (Dataconomy)
Casio discloses data breach impacting customers in 149 countries (BleepingComputer) 
FCC Revives ‘Net Neutrality,’ Proposes New Regulations for Internet Service (Wall Street Journal) 
FCC begins second quest for net neutrality (TechCrunch)
CFPB Proposes Rule to Jumpstart Competition and Accelerate Shift to Open Banking (Consumer Financial Protection Bureau)
RagnarLocker ransomware dark web site seized in international sting (TechCrunch) 
Ragnar Locker ransomware site taken down by FBI, Europol (Record) 
One of the most destructive ransomware gangs is being taken down by law enforcement (Axios)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hacktivism and influence operations in the Hamas-Israel war. An OilRig cyberespionage campaign prospects a Middle Eastern government. Emailed bomb threats in the Baltic. Darkweb advertising yields insight into ExelaStealer malware. Casio discloses breach of customer data. The FCC proposes a return to net neutrality, while Consumer Financial Protection Bureau proposes data-handling rules under Dodd-Frank. Deepen Desai from ZScaler shares insights on MOVEit transfer vulnerabilities. Our own Simone Petrella speaks with Google’s Tatyana Bolton about the challenges of bridging the cyber talent gap. And RagnarLocker has been taken down by international law enforcement. </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/201</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thehill.com/homenews/senate/4263749-intel-senators-israel-did-not-strike-hospital/">Intel, defense officials tell senators that Israel did not strike hospital </a> (The Hill)</p><p><a href="https://www.nytimes.com/2023/10/18/us/politics/hospital-gaza-us-intelligence.html">Early U.S. and Israeli Intelligence Says Palestinian Group Caused Hospital Blast</a>.</p><p><a href="https://www.fastcompany.com/90969946/cyberattacks-against-israeli-and-palestinian-websites-are-soaring-during-the-israel-hamas-war">Cyberattacks linked to Israel-Hamas war are soaring</a> (Fast Company) </p><p><a href="https://www.haaretz.com/israel-news/security-aviation/2023-10-19/ty-article/.premium/israeli-cyber-arms-and-intelligence-firms-like-nso-aiding-israeli-efforts/0000018b-4813-de3d-a58f-c87b7d950000">NSO, Israeli cyber firms help track missing Israelis and hostages</a> (Haaretz) </p><p><a href="https://www.baltictimes.com/lithuanian_interior_minister_says_emailed_bomb_threats_are_coordinated_regional_cyber-attack/">Lithuanian interior minister says emailed bomb threats are coordinated regional cyber-attack</a> (Baltic Times)</p><p><a href="https://www.fortinet.com/blog/threat-research/exelastealer-infostealer-enters-the-field">Another InfoStealer Enters the Field, ExelaStealer</a> (Fortinet Blog)</p><p><a href="https://www.vipre.com/email-threats-latest-trends-q3-2023">Q3 Report: Email Threat Trends Latest edition: PDF Popularity, Callback Phishing and Redline Malware</a> (VIPRE)</p><p><a href="https://world.casio.com/information/1018-incident/">Casio Issues Apology and Notice Concerning Personal Information Leak Due to Unauthorized Access to Server | CASIO</a> (CASIO Official Website) </p><p><a href="https://www.hackread.com/human-error-casio-classpad-data-breach/">Human Error: Casio ClassPad Data Breach Impacting 148 Countries</a> (Hackread) </p><p><a href="https://dataconomy.com/2023/10/19/casio-data-breach-2023/">Casio data breach 2023 caused worldwide panic</a> (Dataconomy)</p><p><a href="https://www.bleepingcomputer.com/news/security/casio-discloses-data-breach-impacting-customers-in-149-countries/">Casio discloses data breach impacting customers in 149 countries</a> (BleepingComputer) </p><p><a href="https://www.wsj.com/business/telecom/fcc-revives-net-neutrality-proposes-new-regulations-for-internet-service-91ab68d6">FCC Revives ‘Net Neutrality,’ Proposes New Regulations for Internet Service</a> (Wall Street Journal) </p><p><a href="https://techcrunch.com/2023/10/19/fcc-begins-second-quest-for-net-neutrality/">FCC begins second quest for net neutrality</a> (TechCrunch)</p><p><a href="https://www.consumerfinance.gov/about-us/newsroom/cfpb-proposes-rule-to-jumpstart-competition-and-accelerate-shift-to-open-banking/">CFPB Proposes Rule to Jumpstart Competition and Accelerate Shift to Open Banking</a> (Consumer Financial Protection Bureau)</p><p><a href="https://techcrunch.com/2023/10/19/ragnarlocker-ransomware-dark-web-portal-seized-in-international-sting/">RagnarLocker ransomware dark web site seized in international sting</a> (TechCrunch) </p><p><a href="https://therecord.media/ragnar-locker-ransomware-site-taken-down-fbi-europol">Ragnar Locker ransomware site taken down by FBI, Europol</a> (Record) </p><p><a href="https://www.axios.com/2023/10/19/ragnarlocker-ransomware-takedown-operation">One of the most destructive ransomware gangs is being taken down by law enforcement</a> (Axios)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1921</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[14a21ff2-2b53-11ee-9c79-871b95b42672]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8230163769.mp3?updated=1697829475" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Vigilance isn’t purely receptive. Without criticism, it will become blind with detail. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1930/notes</link>
      <description>Nation-states exploit the WinRAR vulnerability. Criminals leak more stolen 23andMe data. QR codes as a risk. NSA and partners offer anti-phishing guidance. A Ukrainian hacktivist auxiliary takes down Trigona privateers. Hacktivism and influence operations remain the major cyber features of the Hamas-Israeli war. On today’s Threat Vector, David Moulton speaks with Kate Naunheim, Cyber Risk Management Director at Unit 42, about the new cybersecurity regulations introduced by the SEC. Our own Rick Howard talks with Jen Miller Osborn about the 10th anniversary of ATT&amp;CKcon. And the epistemology of open source intelligence: tweets, TikToks, Instagrams–they’re not necessarily ground truth.
Threat Vector
To delve further into this topic, check out this upcoming webinar by Palo Alto's Unit 42 team on November 9, 2023, "The Ransomware Landscape: Threats Driving the SEC Rule and Other Regulations."

Please share your thoughts with us for future Threat Vector segments by taking our brief survey.

To learn what is top of mind each month from the experts at Unit 42 sign up for their Threat Intel Bulletin. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/200

Selected reading.
Government-backed actors exploiting WinRAR vulnerability (Google) 
The forgotten malvertising campaign (Malwarebytes)
Hacker leaks millions of new 23andMe genetic data profiles (BleepingComputer) 
Exploring The Malicious Usage of QR Codes (SlashNext |) 
How to Protect Against Evolving Phishing Attacks (National Security Agency/Central Security Service)
GuidePoint Research and Intelligence Team’s (GRIT) 2023 Q3 Ransomware Report Examines the Continued Surge of Ransomware Activity (GuidePoint)
Ukrainian activists hack Trigona ransomware gang, wipe servers (BleepingComputer) 
Navigating the Mis- and Disinformation Minefield in the Current Israel-Hamas War (ZeroFox)
War Tests Israeli Cyber Defenses as Hack Attempts Soar (Bloomberg)
U.S. says Israel ‘not responsible’ for Gaza hospital blast; Biden announces ‘unprecedented’ aid package in speech (Washington Post)
Three clues the Ahli Arab Hospital strike came from Gaza (The Telegraph) 
Who’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to Know What’s Real (WIRED) 
‘Verified’ OSINT Accounts Are Destroying the Israel-Palestine Information Ecosystem (404 Media)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 19 Oct 2023 20:15:00 -0000</pubDate>
      <itunes:title>Vigilance isn’t purely receptive. Without criticism, it will become blind with detail. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1930</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Nation-states exploit the WinRAR vulnerability. Criminals leak more stolen 23andMe data. QR codes as a risk. NSA and partners offer anti-phishing guidance. A Ukrainian hacktivist auxiliary takes down Trigona privateers. Hacktivism and influence operations remain the major cyber features of the Hamas-Israeli war. On today’s Threat Vector, David Moulton speaks with Kate Naunheim, Cyber Risk Management Director at Unit 42, about the new cybersecurity regulations introduced by the SEC. Our own Rick Howard talks with Jen Miller Osborn about the 10th anniversary of ATT&amp;CKcon. And the epistemology of open source intelligence: tweets, TikToks, Instagrams–they’re not necessarily ground truth.
Threat Vector
To delve further into this topic, check out this upcoming webinar by Palo Alto's Unit 42 team on November 9, 2023, "The Ransomware Landscape: Threats Driving the SEC Rule and Other Regulations."

Please share your thoughts with us for future Threat Vector segments by taking our brief survey.

To learn what is top of mind each month from the experts at Unit 42 sign up for their Threat Intel Bulletin. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/200

Selected reading.
Government-backed actors exploiting WinRAR vulnerability (Google) 
The forgotten malvertising campaign (Malwarebytes)
Hacker leaks millions of new 23andMe genetic data profiles (BleepingComputer) 
Exploring The Malicious Usage of QR Codes (SlashNext |) 
How to Protect Against Evolving Phishing Attacks (National Security Agency/Central Security Service)
GuidePoint Research and Intelligence Team’s (GRIT) 2023 Q3 Ransomware Report Examines the Continued Surge of Ransomware Activity (GuidePoint)
Ukrainian activists hack Trigona ransomware gang, wipe servers (BleepingComputer) 
Navigating the Mis- and Disinformation Minefield in the Current Israel-Hamas War (ZeroFox)
War Tests Israeli Cyber Defenses as Hack Attempts Soar (Bloomberg)
U.S. says Israel ‘not responsible’ for Gaza hospital blast; Biden announces ‘unprecedented’ aid package in speech (Washington Post)
Three clues the Ahli Arab Hospital strike came from Gaza (The Telegraph) 
Who’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to Know What’s Real (WIRED) 
‘Verified’ OSINT Accounts Are Destroying the Israel-Palestine Information Ecosystem (404 Media)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Nation-states exploit the WinRAR vulnerability. Criminals leak more stolen 23andMe data. QR codes as a risk. NSA and partners offer anti-phishing guidance. A Ukrainian hacktivist auxiliary takes down Trigona privateers. Hacktivism and influence operations remain the major cyber features of the Hamas-Israeli war. On today’s Threat Vector, David Moulton speaks with Kate Naunheim, Cyber Risk Management Director at Unit 42, about the new cybersecurity regulations introduced by the SEC. Our own Rick Howard talks with Jen Miller Osborn about the 10th anniversary of ATT&amp;CKcon. And the epistemology of open source intelligence: tweets, TikToks, Instagrams–they’re not necessarily ground truth.</p><h2>Threat Vector</h2><p>To delve further into this topic, check out this upcoming webinar by Palo Alto's Unit 42 team on November 9, 2023, "<a href="https://events.actualtechmedia.com/register-now/1685/the-ransomware-landscape-threats-driving-the-sec-rule-and-other-regulations/">The Ransomware Landscape: Threats Driving the SEC Rule and Other Regulations</a>."</p><p><br></p><p>Please share your thoughts with us for future Threat Vector segments by taking our <a href="https://www.surveymonkey.com/r/N2K_TV_p">brief survey</a>.</p><p><br></p><p>To learn what is top of mind each month from the experts at Unit 42 sign up for their <a href="https://start.paloaltonetworks.com/unit42-threat-intel-bulletin.html">Threat Intel Bulletin</a>. </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/200</p><p><br></p><h2>Selected reading.</h2><p><a href="https://blog.google/threat-analysis-group/government-backed-actors-exploiting-winrar-vulnerability/">Government-backed actors exploiting WinRAR vulnerability</a> (Google) </p><p><a href="https://www.malwarebytes.com/blog/threat-intelligence/2023/10/the-forgotten-malvertising-campaign">The forgotten malvertising campaign</a> (Malwarebytes)</p><p><a href="https://www.bleepingcomputer.com/news/security/hacker-leaks-millions-of-new-23andme-genetic-data-profiles/">Hacker leaks millions of new 23andMe genetic data profiles</a> (BleepingComputer) </p><p><a href="https://slashnext.com/blog/exploring-the-malicious-usage-of-qr-codes/">Exploring The Malicious Usage of QR Codes</a> (SlashNext |) </p><p><a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3560788/how-to-protect-against-evolving-phishing-attacks/">How to Protect Against Evolving Phishing Attacks</a> (National Security Agency/Central Security Service)</p><p><a href="https://www.guidepointsecurity.com/newsroom/guidepoint-research-and-intelligence-teams-grit-2023-q3-ransomware-report-examines-the-continued-surge-of-ransomware-activity/">GuidePoint Research and Intelligence Team’s (GRIT) 2023 Q3 Ransomware Report Examines the Continued Surge of Ransomware Activity</a> (GuidePoint)</p><p><a href="https://www.bleepingcomputer.com/news/security/ukrainian-activists-hack-trigona-ransomware-gang-wipe-servers/">Ukrainian activists hack Trigona ransomware gang, wipe servers</a> (BleepingComputer) </p><p><a href="https://www.zerofox.com/blog/navigating-the-mis-and-disinformation-minefield-in-the-current-israel-hamas-war/">Navigating the Mis- and Disinformation Minefield in the Current Israel-Hamas War</a> (ZeroFox)</p><p><a href="https://www.bloomberg.com/news/newsletters/2023-10-18/war-tests-israeli-cyber-defenses-as-hack-attempts-soar">War Tests Israeli Cyber Defenses as Hack Attempts Soar</a> (Bloomberg)</p><p><a href="https://www.washingtonpost.com/world/2023/10/18/israel-hamas-war-news-gaza-update/?utm_campaign=wp_post_most&amp;utm_medium=email&amp;utm_source=newsletter&amp;wpisrc=nl_most">U.S. says Israel ‘not responsible’ for Gaza hospital blast; Biden announces ‘unprecedented’ aid package in speech</a> (Washington Post)</p><p><a href="https://www.telegraph.co.uk/world-news/2023/10/18/ahli-arab-hospital-bombing-came-from-gaza-clue-israel-hamas/">Three clues the Ahli Arab Hospital strike came from Gaza</a> (The Telegraph) </p><p><a href="https://www.wired.com/story/al-ahli-baptist-hospital-explosion-disinformation-osint/">Who’s Responsible for the Gaza Hospital Explosion? Here’s Why It’s Hard to Know What’s Real</a> (WIRED) </p><p><a href="https://www.404media.co/twitter-verified-osint-accounts-are-destroying-the-israel-palestine-information-ecosystem/">‘Verified’ OSINT Accounts Are Destroying the Israel-Palestine Information Ecosystem</a> (404 Media)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1912</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[14820b86-2b53-11ee-9c79-1f7fd4017215]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6098679967.mp3?updated=1697745925" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacktivist discipline is inversely correlated with sincerity of commitment. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1929/notes</link>
      <description>Hamas and Israel exchange accusations in a hospital strike. Using Gazan cell data to develop intelligence, and using hostages' devices to spread fear. Black Basta ransomware is out and about, again. Qubitstrike is a newly discovered cryptojacking campaign. Preparing for post-quantum security. Tim Starks from the Washington Post looks at one US Senator’s ability to gum up cyber legislation. In the Learning Layer, N2K's Sam Meisenberg explores the challenges and best practices of rolling out a large-scale corporate re-skilling program. And attention people of Pompei: that volcano alert is bogus. Probably.
Learning Layer.
On this segment of Learning Layer, N2K's Sam Meisenberg is joined by Phil, an N2K client who leads Talent Development at a large telecommunication company. They discuss the challenges and best practices of rolling out a large-scale corporate re-skilling program, including increasing learner engagement, accountability, and the importance of internal talent development and recognition.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/199

Selected reading.
Blast kills hundreds at Gaza hospital; Hamas and Israel trade blame, as Biden heads to Mideast (AP News)
In deadly day for Gaza, hospital strike kills hundreds (Reuters) 
Hacktivist attacks against Israeli websites mirror attacks following Russian invasion of Ukraine (ComputerWeekly.com) 
Growing Concern Over Role of Hacktivism in Israel-Hamas Conflict (Infosecurity Magazine) 
Israel-Hamas war illuminates trouble with political hacking groups (Axios) 
ISRAEL GAZA CONFLICT : THE CYBER PERSPECTIVE (CYFIRMA) 
Tracking Cellphone Data by Neighborhood, Israel Gauges Gaza Evacuation (New York Times) 
Hamas Hijacked Victims’ Social Media Accounts to Spread Terror (New York Times)
TV advertising sales giant affected by ransomware attack (Record)
Chilean government warns of Black Basta ransomware attacks after customs incident (Record)
Qubitstrike - An Emerging Malware Campaign Targeting Jupyter Notebooks (Cado Security)
DigiCert Global Study: Preparing for a Safe Post-Quantum Computing Future (DigiCert) 
SpyNote Android malware spreads via fake volcano eruption alerts (BleepingComputer) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 18 Oct 2023 20:40:00 -0000</pubDate>
      <itunes:title>Hacktivist discipline is inversely correlated with sincerity of commitment. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1929</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Hamas and Israel exchange accusations in a hospital strike. Using Gazan cell data to develop intelligence, and using hostages' devices to spread fear. Black Basta ransomware is out and about, again. Qubitstrike is a newly discovered cryptojacking campaign. Preparing for post-quantum security. Tim Starks from the Washington Post looks at one US Senator’s ability to gum up cyber legislation. In the Learning Layer, N2K's Sam Meisenberg explores the challenges and best practices of rolling out a large-scale corporate re-skilling program. And attention people of Pompei: that volcano alert is bogus. Probably.
Learning Layer.
On this segment of Learning Layer, N2K's Sam Meisenberg is joined by Phil, an N2K client who leads Talent Development at a large telecommunication company. They discuss the challenges and best practices of rolling out a large-scale corporate re-skilling program, including increasing learner engagement, accountability, and the importance of internal talent development and recognition.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/199

Selected reading.
Blast kills hundreds at Gaza hospital; Hamas and Israel trade blame, as Biden heads to Mideast (AP News)
In deadly day for Gaza, hospital strike kills hundreds (Reuters) 
Hacktivist attacks against Israeli websites mirror attacks following Russian invasion of Ukraine (ComputerWeekly.com) 
Growing Concern Over Role of Hacktivism in Israel-Hamas Conflict (Infosecurity Magazine) 
Israel-Hamas war illuminates trouble with political hacking groups (Axios) 
ISRAEL GAZA CONFLICT : THE CYBER PERSPECTIVE (CYFIRMA) 
Tracking Cellphone Data by Neighborhood, Israel Gauges Gaza Evacuation (New York Times) 
Hamas Hijacked Victims’ Social Media Accounts to Spread Terror (New York Times)
TV advertising sales giant affected by ransomware attack (Record)
Chilean government warns of Black Basta ransomware attacks after customs incident (Record)
Qubitstrike - An Emerging Malware Campaign Targeting Jupyter Notebooks (Cado Security)
DigiCert Global Study: Preparing for a Safe Post-Quantum Computing Future (DigiCert) 
SpyNote Android malware spreads via fake volcano eruption alerts (BleepingComputer) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hamas and Israel exchange accusations in a hospital strike. Using Gazan cell data to develop intelligence, and using hostages' devices to spread fear. Black Basta ransomware is out and about, again. Qubitstrike is a newly discovered cryptojacking campaign. Preparing for post-quantum security. Tim Starks from the Washington Post looks at one US Senator’s ability to gum up cyber legislation. In the Learning Layer, N2K's Sam Meisenberg explores the challenges and best practices of rolling out a large-scale corporate re-skilling program. And attention people of Pompei: that volcano alert is bogus. Probably.</p><h2>Learning Layer.</h2><p>On this segment of Learning Layer, N2K's Sam Meisenberg is joined by Phil, an N2K client who leads Talent Development at a large telecommunication company. They discuss the challenges and best practices of rolling out a large-scale corporate re-skilling program, including increasing learner engagement, accountability, and the importance of internal talent development and recognition.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/199</p><p><br></p><h2>Selected reading.</h2><p><a href="https://apnews.com/article/israel-palestinians-gaza-hamas-war-biden-rafah-e062825a375d9eb62e95509cab95b80c">Blast kills hundreds at Gaza hospital; Hamas and Israel trade blame, as Biden heads to Mideast</a> (AP News)</p><p><a href="https://www.reuters.com/world/middle-east/least-500-victims-israeli-air-strike-hospital-gaza-health-ministry-2023-10-17/">In deadly day for Gaza, hospital strike kills hundreds</a> (Reuters) </p><p><a href="https://www.computerweekly.com/news/366555772/Hacktivist-attacks-against-Israeli-websites-mirror-attacks-following-Russian-invasion-of-Ukraine">Hacktivist attacks against Israeli websites mirror attacks following Russian invasion of Ukraine</a> (ComputerWeekly.com) </p><p><a href="https://www.infosecurity-magazine.com/news/concern-hacktivism-israel-hamas/">Growing Concern Over Role of Hacktivism in Israel-Hamas Conflict</a> (Infosecurity Magazine) </p><p><a href="https://www.axios.com/2023/10/17/israel-hamas-war-political-hackers-hacktivists-cybersecurity">Israel-Hamas war illuminates trouble with political hacking groups</a> (Axios) </p><p><a href="https://www.cyfirma.com/outofband/israel-gaza-conflict-the-cyber-perspective/">ISRAEL GAZA CONFLICT : THE CYBER PERSPECTIVE</a> (CYFIRMA) </p><p><a href="https://www.nytimes.com/2023/10/16/world/middleeast/gaza-invasion-israel-cellphone-data.html">Tracking Cellphone Data by Neighborhood, Israel Gauges Gaza Evacuation</a> (New York Times) </p><p><a href="https://www.nytimes.com/2023/10/17/technology/hamas-hostages-social-media.html">Hamas Hijacked Victims’ Social Media Accounts to Spread Terror</a> (New York Times)</p><p><a href="https://therecord.media/ampersand-television-advertising-sales-company-ransomware">TV advertising sales giant affected by ransomware attack</a> (Record)</p><p><a href="https://therecord.media/chile-black-basta-ransomware-attack-customs-department">Chilean government warns of Black Basta ransomware attacks after customs incident</a> (Record)</p><p><a href="https://www.cadosecurity.com/qubitstrike-an-emerging-malware-campaign-targeting-jupyter-notebooks/">Qubitstrike - An Emerging Malware Campaign Targeting Jupyter Notebooks</a> (Cado Security)</p><p><a href="https://www.digicert.com/news/digicert-global-study-preparing-for-a-safe-post-quantum-computing-future">DigiCert Global Study: Preparing for a Safe Post-Quantum Computing Future</a> (DigiCert) </p><p><a href="https://www.bleepingcomputer.com/news/security/spynote-android-malware-spreads-via-fake-volcano-eruption-alerts/">SpyNote Android malware spreads via fake volcano eruption alerts</a> (BleepingComputer) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2107</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1463315c-2b53-11ee-9c79-8ba341c86a2d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8345134214.mp3?updated=1697655074" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Notes from the cyber phases of two hybrid wars. Alerts on Cisco, Atlassian vulnerability exploitation. Updated guidance on security by design. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1928/notes</link>
      <description>A bogus RedAlert app delivered spyware as well as panic. BloodAlchemy backdoors ASEAN southeast asian targets. A serious Cisco zero-day is being exploited. Valve implements additional security measures for Steam. A warning on Atlassian vulnerability exploitation. Allies update their security-by-design guide. Ukrainian telecommunications providers hit by cyberattack. Ben Yelin explains attempts to tamp down pornographic deepfakes. Our guest is Ashley Rose from Living Security with a look at measuring human risk. And, as always, criminals see misery as opportunity.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/198

Selected reading.
Malicious “RedAlert - Rocket Alerts” Application Targets Israeli Phone Calls, SMS, and User Information (The Cloudflare Blog)
Disclosing the BLOODALCHEMY backdoor (Elastic Security Labs) 
BLOODALCHEMY provides backdoor to ASEAN secrets (Register) 
Active exploitation of Cisco IOS XE Software Web Management User Interface vulnerability (Cisco Talos Blog)
Actively exploited Cisco 0-day with maximum 10 severity gives full network control (Ars Technica)
Cisco warns of actively exploited zero-day in IOS XE software (Computing) 
Widespread Cisco IOS XE Implants in the Wild (VulnCheck)
Steam enforces SMS verification to curb malware-ridden updates (BleepingComputer)
Threat Actors Exploit Atlassian Confluence CVE-2023-22515 for Initial Access to Networks | CISA (Cybersecurity and Infrastructure Security Agency CISA) 
CISA, U.S. and International Partners Announce Updated Secure by Design Principles Joint Guide (Cybersecurity and Infrastructure Security Agency) 
CERT-UA Reports: 11 Ukrainian Telecom Providers Hit by Cyberattacks (The Hacker News) 
CVE-2023-38831 Exploited by Pro-Russia Hacking Groups in RU-UA Conflict Zone for Credential Harvesting Operations (Cluster25) 
Pro-Russian Hackers Exploiting Recent WinRAR Vulnerability in New Campaign (The Hacker News) 
Cyberattack targets Belgian public service websites for second time in a week (Brussels Times) 
Spam trends of the week: Spammers piggyback on the Israel-Gaza war to plunder donations (Hot for Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Oct 2023 20:15:00 -0000</pubDate>
      <itunes:title>Notes from the cyber phases of two hybrid wars. Alerts on Cisco, Atlassian vulnerability exploitation. Updated guidance on security by design. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1928</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A bogus RedAlert app delivered spyware as well as panic. BloodAlchemy backdoors ASEAN southeast asian targets. A serious Cisco zero-day is being exploited. Valve implements additional security measures for Steam. A warning on Atlassian vulnerability exploitation. Allies update their security-by-design guide. Ukrainian telecommunications providers hit by cyberattack. Ben Yelin explains attempts to tamp down pornographic deepfakes. Our guest is Ashley Rose from Living Security with a look at measuring human risk. And, as always, criminals see misery as opportunity.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/198

Selected reading.
Malicious “RedAlert - Rocket Alerts” Application Targets Israeli Phone Calls, SMS, and User Information (The Cloudflare Blog)
Disclosing the BLOODALCHEMY backdoor (Elastic Security Labs) 
BLOODALCHEMY provides backdoor to ASEAN secrets (Register) 
Active exploitation of Cisco IOS XE Software Web Management User Interface vulnerability (Cisco Talos Blog)
Actively exploited Cisco 0-day with maximum 10 severity gives full network control (Ars Technica)
Cisco warns of actively exploited zero-day in IOS XE software (Computing) 
Widespread Cisco IOS XE Implants in the Wild (VulnCheck)
Steam enforces SMS verification to curb malware-ridden updates (BleepingComputer)
Threat Actors Exploit Atlassian Confluence CVE-2023-22515 for Initial Access to Networks | CISA (Cybersecurity and Infrastructure Security Agency CISA) 
CISA, U.S. and International Partners Announce Updated Secure by Design Principles Joint Guide (Cybersecurity and Infrastructure Security Agency) 
CERT-UA Reports: 11 Ukrainian Telecom Providers Hit by Cyberattacks (The Hacker News) 
CVE-2023-38831 Exploited by Pro-Russia Hacking Groups in RU-UA Conflict Zone for Credential Harvesting Operations (Cluster25) 
Pro-Russian Hackers Exploiting Recent WinRAR Vulnerability in New Campaign (The Hacker News) 
Cyberattack targets Belgian public service websites for second time in a week (Brussels Times) 
Spam trends of the week: Spammers piggyback on the Israel-Gaza war to plunder donations (Hot for Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A bogus RedAlert app delivered spyware as well as panic. BloodAlchemy backdoors ASEAN southeast asian targets. A serious Cisco zero-day is being exploited. Valve implements additional security measures for Steam. A warning on Atlassian vulnerability exploitation. Allies update their security-by-design guide. Ukrainian telecommunications providers hit by cyberattack. Ben Yelin explains attempts to tamp down pornographic deepfakes. Our guest is Ashley Rose from Living Security with a look at measuring human risk. And, as always, criminals see misery as opportunity.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/198</p><p><br></p><h2>Selected reading.</h2><p><a href="https://blog.cloudflare.com/malicious-redalert-rocket-alerts-application-targets-israeli-phone-calls-sms-and-user-information/">Malicious “RedAlert - Rocket Alerts” Application Targets Israeli Phone Calls, SMS, and User Information</a> (The Cloudflare Blog)</p><p><a href="https://www.elastic.co/security-labs/disclosing-the-bloodalchemy-backdoor">Disclosing the BLOODALCHEMY backdoor</a> (Elastic Security Labs) </p><p><a href="https://www.theregister.com/2023/10/16/bloodalchemy_backdoor/">BLOODALCHEMY provides backdoor to ASEAN secrets</a> (Register) </p><p><a href="https://blog.talosintelligence.com/active-exploitation-of-cisco-ios-xe-software/">Active exploitation of Cisco IOS XE Software Web Management User Interface vulnerability</a> (Cisco Talos Blog)</p><p><a href="https://arstechnica.com/security/2023/10/actively-exploited-cisco-0-day-with-maximum-10-severity-gives-full-network-control/">Actively exploited Cisco 0-day with maximum 10 severity gives full network control</a> (Ars Technica)</p><p><a href="https://www.computing.co.uk/news/4135100/cisco-warns-actively-exploited-zero-day-ios-xe-software">Cisco warns of actively exploited zero-day in IOS XE software </a>(Computing) </p><p><a href="https://vulncheck.com/blog/cisco-implants">Widespread Cisco IOS XE Implants in the Wild</a> (VulnCheck)</p><p><a href="https://www.bleepingcomputer.com/news/security/steam-enforces-sms-verification-to-curb-malware-ridden-updates/">Steam enforces SMS verification to curb malware-ridden updates</a> (BleepingComputer)</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-289a">Threat Actors Exploit Atlassian Confluence CVE-2023-22515 for Initial Access to Networks | CISA</a> (Cybersecurity and Infrastructure Security Agency CISA) </p><p><a href="https://content.govdelivery.com/accounts/USDHSCISA/bulletins/3761d70">CISA, U.S. and International Partners Announce Updated Secure by Design Principles Joint Guide</a> (Cybersecurity and Infrastructure Security Agency) </p><p><a href="https://thehackernews.com/2023/10/cert-ua-reports-11-ukrainian-telecom.html">CERT-UA Reports: 11 Ukrainian Telecom Providers Hit by Cyberattacks</a> (The Hacker News) </p><p><a href="https://blog.cluster25.duskrise.com/2023/10/12/cve-2023-38831-russian-attack">CVE-2023-38831 Exploited by Pro-Russia Hacking Groups in RU-UA Conflict Zone for Credential Harvesting Operations</a> (Cluster25) </p><p><a href="https://thehackernews.com/2023/10/pro-russian-hackers-exploiting-recent.html">Pro-Russian Hackers Exploiting Recent WinRAR Vulnerability in New Campaign</a> (The Hacker News) </p><p><a href="https://www.brusselstimes.com/belgium/743890/cyberattack-targets-belgian-public-service-websites-for-second-time-in-a-week">Cyberattack targets Belgian public service websites for second time in a week</a> (Brussels Times) </p><p><a href="https://www.bitdefender.com/blog/hotforsecurity/spam-trends-of-the-week-spammers-piggyback-on-the-israel-gaza-war-to-plunder-donations/">Spam trends of the week: Spammers piggyback on the Israel-Gaza war to plunder donations</a> (Hot for Security)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1827</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1433730e-2b53-11ee-9c79-3bda804ead67]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1700105059.mp3?updated=1697571871" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber phases in two hybrid wars. A ransomware gang claims an attack against a major firm. Social engineering implicated in Shadow PC breach. Privateering, coin mining, and other worries. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1927/notes</link>
      <description>Hacktivism and disinformation in the war between Hamas and Israel. LockBit claims an attack on CDW. Shadow PC's breach. Void Rabisu deploys a lightweight RomCom backdoor against the Brussels conference. Rick Howard describes Radical Asymmetric Distribution. Our guest is Jason Birmingham from Broadridge Financial Solutions with a look at asset management. And coin mining as a potential front for espionage or a staging area for sabotage.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/197

Selected reading.
How hackers piled onto the Israeli-Hamas conflict (POLITICO) 
Israel-Gaza War Now Includes Accompanying Cyber Warfare (Channel Futures) 
How Cyberattacks Could Affect the Israel-Hamas War (Bank Info Security) 
Medical aid for Palestinians website under cyber attack affecting relief efforts (mint) 
Rumors of a ‘Global Day of Jihad’ Have Unleashed a Dangerous Wave of Disinformation (WIRED) 
Hamas in rare English ‘press conference’ as it tries to counter global condemnation (The Telegraph) 
In Israel-Hamas conflict, social media become tools of propaganda and disinformation (DFRLab)  
A flood of misinformation is shaping how panicked citizens, global public view the war (Washington Post) 
How Israel-Hamas War Misinformation Is Spreading Online (TIME)
Misinformation Is Warfare (TIME) 
Meta responds to EU misinformation concerns regarding Israel-Hamas conflict (Engadget) 
Briefing: Meta Details Efforts to Remove War-Related Disinformation (The Information)
Cloud gaming firm Shadow says hackers stole customers' personal data (TechCrunch) 
PC streaming service Shadow discloses security breach (The Verge) 
Shadow silent on data breach as hacked data appears genuine (TechCrunch) 
530K people's info stolen from cloud PC gaming's Shadow (Register) 
CDW investigating ransomware gang claims of data theft (Record) 
Lockbit ransomware gang demanded an 80 million ransom to CDW (Security Affairs) 
Void Rabisu Targets Female Political Leaders with New Slimmed-Down ROMCOM Variant (Trend Micro)
Women Political Leaders Summit targeted in RomCom malware phishing (BleepingComputer) 
Across U.S., Chinese Bitcoin Mines Draw National Security Scrutiny (New York Times)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 16 Oct 2023 20:15:00 -0000</pubDate>
      <itunes:title>Cyber phases in two hybrid wars. A ransomware gang claims an attack against a major firm. Social engineering implicated in Shadow PC breach. Privateering, coin mining, and other worries. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1927</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Hacktivism and disinformation in the war between Hamas and Israel. LockBit claims an attack on CDW. Shadow PC's breach. Void Rabisu deploys a lightweight RomCom backdoor against the Brussels conference. Rick Howard describes Radical Asymmetric Distribution. Our guest is Jason Birmingham from Broadridge Financial Solutions with a look at asset management. And coin mining as a potential front for espionage or a staging area for sabotage.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/197

Selected reading.
How hackers piled onto the Israeli-Hamas conflict (POLITICO) 
Israel-Gaza War Now Includes Accompanying Cyber Warfare (Channel Futures) 
How Cyberattacks Could Affect the Israel-Hamas War (Bank Info Security) 
Medical aid for Palestinians website under cyber attack affecting relief efforts (mint) 
Rumors of a ‘Global Day of Jihad’ Have Unleashed a Dangerous Wave of Disinformation (WIRED) 
Hamas in rare English ‘press conference’ as it tries to counter global condemnation (The Telegraph) 
In Israel-Hamas conflict, social media become tools of propaganda and disinformation (DFRLab)  
A flood of misinformation is shaping how panicked citizens, global public view the war (Washington Post) 
How Israel-Hamas War Misinformation Is Spreading Online (TIME)
Misinformation Is Warfare (TIME) 
Meta responds to EU misinformation concerns regarding Israel-Hamas conflict (Engadget) 
Briefing: Meta Details Efforts to Remove War-Related Disinformation (The Information)
Cloud gaming firm Shadow says hackers stole customers' personal data (TechCrunch) 
PC streaming service Shadow discloses security breach (The Verge) 
Shadow silent on data breach as hacked data appears genuine (TechCrunch) 
530K people's info stolen from cloud PC gaming's Shadow (Register) 
CDW investigating ransomware gang claims of data theft (Record) 
Lockbit ransomware gang demanded an 80 million ransom to CDW (Security Affairs) 
Void Rabisu Targets Female Political Leaders with New Slimmed-Down ROMCOM Variant (Trend Micro)
Women Political Leaders Summit targeted in RomCom malware phishing (BleepingComputer) 
Across U.S., Chinese Bitcoin Mines Draw National Security Scrutiny (New York Times)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hacktivism and disinformation in the war between Hamas and Israel. LockBit claims an attack on CDW. Shadow PC's breach. Void Rabisu deploys a lightweight RomCom backdoor against the Brussels conference. Rick Howard describes Radical Asymmetric Distribution. Our guest is Jason Birmingham from Broadridge Financial Solutions with a look at asset management. And coin mining as a potential front for espionage or a staging area for sabotage.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/197</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.politico.eu/article/israel-hamas-war-hackers-cyberattacks/">How hackers piled onto the Israeli-Hamas conflict</a> (POLITICO) </p><p><a href="https://www.channelfutures.com/security/israel-gaza-war-cyber-warfare">Israel-Gaza War Now Includes Accompanying Cyber Warfare</a> (Channel Futures) </p><p><a href="https://www.bankinfosecurity.com/how-cyberattacks-could-affect-israel-hamas-war-a-23310">How Cyberattacks Could Affect the Israel-Hamas War</a> (Bank Info Security) </p><p><a href="https://www.livemint.com/news/world/israelhamas-war-medical-aid-for-palestinians-website-under-cyber-attack-hindering-donations-for-gaza-relief-efforts-11697157474678.html">Medical aid for Palestinians website under cyber attack affecting relief efforts</a> (mint) </p><p><a href="https://www.wired.com/story/day-of-jihad-disinformation-israel-palestine/">Rumors of a ‘Global Day of Jihad’ Have Unleashed a Dangerous Wave of Disinformation</a> (WIRED) </p><p><a href="https://www.telegraph.co.uk/world-news/2023/10/13/hamas-english-press-conference-global-condemnation-israel/?">Hamas in rare English ‘press conference’ as it tries to counter global condemnation</a> (The Telegraph) </p><p><a href="https://dfrlab.org/2023/10/12/in-israel-hamas-conflict-social-media-become-tools-of-propaganda-and-disinformation/">In Israel-Hamas conflict, social media become tools of propaganda and disinformation</a> (DFRLab)  </p><p><a href="https://www.washingtonpost.com/technology/2023/10/14/propaganda-misinformation-israel-hamas-war-social-media/">A flood of misinformation is shaping how panicked citizens, global public view the war</a> (Washington Post) </p><p><a href="https://time.com/6323421/misinformation-about-the-israel-hamas-war-is-rife-on-social-media-especially-x/">How Israel-Hamas War Misinformation Is Spreading Online</a> (TIME)</p><p><a href="https://time.com/6323387/misinformation-israel-hamas-war-essay/">Misinformation Is Warfare</a> (TIME) </p><p><a href="https://www.engadget.com/meta-responds-to-eu-misinformation-concerns-regarding-israel-hamas-conflict-102640126.html">Meta responds to EU misinformation concerns regarding Israel-Hamas conflict</a> (Engadget) </p><p><a href="https://www.theinformation.com/briefings/meta-details-efforts-to-remove-war-related-disinformation">Briefing: Meta Details Efforts to Remove War-Related Disinformation</a> (The Information)</p><p><a href="https://techcrunch.com/2023/10/12/shadow-hacked-customers-personal-data-stolen/">Cloud gaming firm Shadow says hackers stole customers' personal data</a> (TechCrunch) </p><p><a href="https://www.theverge.com/2023/10/12/23915206/shadow-pc-streaming-service-security-breach">PC streaming service Shadow discloses security breach</a> (The Verge) </p><p><a href="https://techcrunch.com/2023/10/13/shadow-data-breach-hacked/">Shadow silent on data breach as hacked data appears genuine</a> (TechCrunch) </p><p><a href="https://www.theregister.com/2023/10/13/shadow_data_theft/">530K people's info stolen from cloud PC gaming's Shadow</a> (Register) </p><p><a href="https://therecord.media/cdw-investigates-ransomware-gang-claim">CDW investigating ransomware gang claims of data theft</a> (Record) </p><p><a href="https://securityaffairs.com/152470/cyber-crime/lockbit-ransomware-gang-hacked-cdw.html">Lockbit ransomware gang demanded an 80 million ransom to CDW</a> (Security Affairs) </p><p><a href="https://www.trendmicro.com/en_us/research/23/j/void-rabisu-targets-female-leaders-with-new-romcom-variant.html">Void Rabisu Targets Female Political Leaders with New Slimmed-Down ROMCOM Variant</a> (Trend Micro)</p><p><a href="https://www.bleepingcomputer.com/news/security/women-political-leaders-summit-targeted-in-romcom-malware-phishing/">Women Political Leaders Summit targeted in RomCom malware phishing</a> (BleepingComputer) </p><p><a href="https://www.nytimes.com/2023/10/13/us/bitcoin-mines-china-united-states.html">Across U.S., Chinese Bitcoin Mines Draw National Security Scrutiny</a> (New York Times)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1856</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1412b20e-2b53-11ee-9c79-23d7cc97e927]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7320899668.mp3?updated=1697480874" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Susan Hinrichs: The cross between computer science and security. [chief scientist] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/171/notes</link>
      <description>Susan Hinrichs, Chief Scientist at Aviatrix sits down to share her story, with over 30 years in experience spanning a variety of networking and security disciplines and has held leadership and academic roles, she sits down to discuss her amazing career. Earlier in her career, Susan served as System Architect at Cisco where she spent nine years designing and developing Centri Firewall and a variety of network security management tools. She worked as a Lecturer, Computer and Network Security for eight years at the University of Illinois at Urbana-Champaign (UIUC) where she developed a hands-on Security Lab introduction course for students in her first year, and later in her tenure, along with two colleagues, created a malware analysis course designed for senior students. With all of the amazing things she's done in her career, she shares the advice to new comers into the field, saying "I think also as you're trying to get that next job either as a student or as a professional trying to change direction a little bit, if you're coming into interviews being able to talk about a project that you worked on, even if it's not a project that really anyone uses, but if it's something that's interesting that you have in depth understanding of, uh, I think is super valuable to get you noticed." We thank Susan for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 15 Oct 2023 07:00:00 -0000</pubDate>
      <itunes:title>Susan Hinrichs: The cross between computer science and security. [chief scientist] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>171</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Susan Hinrichs, Chief Scientist at Aviatrix sits down to share her story, with over 30 years in experience spanning a variety of networking and security disciplines and has held leadership and academic roles, she sits down to discuss her amazing career. Earlier in her career, Susan served as System Architect at Cisco where she spent nine years designing and developing Centri Firewall and a variety of network security management tools. She worked as a Lecturer, Computer and Network Security for eight years at the University of Illinois at Urbana-Champaign (UIUC) where she developed a hands-on Security Lab introduction course for students in her first year, and later in her tenure, along with two colleagues, created a malware analysis course designed for senior students. With all of the amazing things she's done in her career, she shares the advice to new comers into the field, saying "I think also as you're trying to get that next job either as a student or as a professional trying to change direction a little bit, if you're coming into interviews being able to talk about a project that you worked on, even if it's not a project that really anyone uses, but if it's something that's interesting that you have in depth understanding of, uh, I think is super valuable to get you noticed." We thank Susan for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Susan Hinrichs, Chief Scientist at Aviatrix sits down to share her story, with over 30 years in experience spanning a variety of networking and security disciplines and has held leadership and academic roles, she sits down to discuss her amazing career. Earlier in her career, Susan served as System Architect at Cisco where she spent nine years designing and developing Centri Firewall and a variety of network security management tools. She worked as a Lecturer, Computer and Network Security for eight years at the University of Illinois at Urbana-Champaign (UIUC) where she developed a hands-on Security Lab introduction course for students in her first year, and later in her tenure, along with two colleagues, created a malware analysis course designed for senior students. With all of the amazing things she's done in her career, she shares the advice to new comers into the field, saying "I think also as you're trying to get that next job either as a student or as a professional trying to change direction a little bit, if you're coming into interviews being able to talk about a project that you worked on, even if it's not a project that really anyone uses, but if it's something that's interesting that you have in depth understanding of, uh, I think is super valuable to get you noticed." We thank Susan for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4fc10890-69f7-11ee-b825-3341b66f82d5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9507595327.mp3?updated=1697221978" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unwanted guests harvest your information. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/303/notes</link>
      <description>Amit Malik from Uptycs joins us to discuss their research titled "Unwanted Guests: Mitigating Remote Access Trojan Infection Risk." Uptycs threat research team identified a new threat referred to as QwixxRAT. The Uptycs team discovered this tool being widely distributed by the threat actor through Telegram and Discord platforms.
The research states "QwixxRAT is meticulously designed to harvest an expansive range of information from browser histories and credit card details, to keylogging insights." This newly found tool poses a risk to both businesses and individual users
Unwanted Guests: Mitigating Remote Access Trojan Infection Risk

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Oct 2023 07:00:00 -0000</pubDate>
      <itunes:title>Unwanted guests harvest your information. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>303</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Amit Malik from Uptycs joins us to discuss their research titled "Unwanted Guests: Mitigating Remote Access Trojan Infection Risk." Uptycs threat research team identified a new threat referred to as QwixxRAT. The Uptycs team discovered this tool being widely distributed by the threat actor through Telegram and Discord platforms.
The research states "QwixxRAT is meticulously designed to harvest an expansive range of information from browser histories and credit card details, to keylogging insights." This newly found tool poses a risk to both businesses and individual users
Unwanted Guests: Mitigating Remote Access Trojan Infection Risk

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Amit Malik from Uptycs joins us to discuss their research titled "Unwanted Guests: Mitigating Remote Access Trojan Infection Risk." Uptycs threat research team identified a new threat referred to as QwixxRAT. The Uptycs team discovered this tool being widely distributed by the threat actor through Telegram and Discord platforms.</p><p>The research states "QwixxRAT is meticulously designed to harvest an expansive range of information from browser histories and credit card details, to keylogging insights." This newly found tool poses a risk to both businesses and individual users</p><ul><li><a href="https://www.uptycs.com/blog/remote-access-trojan-qwixx-telegram">Unwanted Guests: Mitigating Remote Access Trojan Infection Risk</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1041</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a3bc1f9a-69f0-11ee-a7d4-3737ea0f1325]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7257626572.mp3?updated=1697736439" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacktivism in the war between Hamas and Israel, with a possibility of escalation. Healthcare cybersecurity. Looting FTX. CISA releases resources to counter ransomware. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1926/notes</link>
      <description>Hacktivism and nation-state involvement in the cyber phases of war in the Middle East, and the use of Telegram. Russian groups squabble online. Healthcare cybersecurity and its implications for patient care. The Looting of FTX on the day of its bankruptcy. Joe Carrigan shares research from the Johns Hopkins University Information Security Institute. Our guest is Mike Walters from Action1, marking the 20th anniversary of Patch Tuesday. And CISA releases two new resources against ransomware.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/196

Selected reading.
Israeli Cyber Companies Rally as Digital, Physical Assaults Continue (Wall Street Journal)
Israel Sees Cyber Incursions Across Digital Systems (Wall Street Journal) 
Hackers infiltrated Israeli smart billboards to post pro-Hamas messages, reports say (Business Insider) 
THE HAMAS ISRAEL : CONFLICT EXPLAINER - CYFIRMA (CYFIRMA)
The First 72 Hours of the Israel-Hamas War: Hamas and PIJ Activity on Telegram (Flashpoint) 
Cyber Aggression Rises Following the October 2023 Israel-Hamas Conflict (Radware) 
EU opens probe into X over Israel-Hamas war misinformation (Financial Times) 
EU opens formal investigation into illegal content on X (Computing) 
X removes hundreds of Hamas-affiliated accounts since attack, CEO says (Reuters) 
US cyber agencies in 'very close contact' with Israel after unprecedented Hamas attacks (Nextgov.com) 
Five threats security pros everywhere need to focus on as the Middle East war escalates (SC Media) 
Cyber Insecurity in Healthcare: The Cost and Impact on Patient Safety and Care 2023 (Proofpoint) 
New Clues Suggest Stolen FTX Funds Went to Russia-Linked Money Launderers (WIRED) 
CISA Releases New Resources Identifying Known Exploited Vulnerabilities and Misconfigurations Linked to Ransomware | CISA (Cybersecurity and Infrastructure Security Agency CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 13 Oct 2023 20:15:00 -0000</pubDate>
      <itunes:title>Hacktivism in the war between Hamas and Israel, with a possibility of escalation. Healthcare cybersecurity. Looting FTX. CISA releases resources to counter ransomware. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1926</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Hacktivism and nation-state involvement in the cyber phases of war in the Middle East, and the use of Telegram. Russian groups squabble online. Healthcare cybersecurity and its implications for patient care. The Looting of FTX on the day of its bankruptcy. Joe Carrigan shares research from the Johns Hopkins University Information Security Institute. Our guest is Mike Walters from Action1, marking the 20th anniversary of Patch Tuesday. And CISA releases two new resources against ransomware.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/196

Selected reading.
Israeli Cyber Companies Rally as Digital, Physical Assaults Continue (Wall Street Journal)
Israel Sees Cyber Incursions Across Digital Systems (Wall Street Journal) 
Hackers infiltrated Israeli smart billboards to post pro-Hamas messages, reports say (Business Insider) 
THE HAMAS ISRAEL : CONFLICT EXPLAINER - CYFIRMA (CYFIRMA)
The First 72 Hours of the Israel-Hamas War: Hamas and PIJ Activity on Telegram (Flashpoint) 
Cyber Aggression Rises Following the October 2023 Israel-Hamas Conflict (Radware) 
EU opens probe into X over Israel-Hamas war misinformation (Financial Times) 
EU opens formal investigation into illegal content on X (Computing) 
X removes hundreds of Hamas-affiliated accounts since attack, CEO says (Reuters) 
US cyber agencies in 'very close contact' with Israel after unprecedented Hamas attacks (Nextgov.com) 
Five threats security pros everywhere need to focus on as the Middle East war escalates (SC Media) 
Cyber Insecurity in Healthcare: The Cost and Impact on Patient Safety and Care 2023 (Proofpoint) 
New Clues Suggest Stolen FTX Funds Went to Russia-Linked Money Launderers (WIRED) 
CISA Releases New Resources Identifying Known Exploited Vulnerabilities and Misconfigurations Linked to Ransomware | CISA (Cybersecurity and Infrastructure Security Agency CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hacktivism and nation-state involvement in the cyber phases of war in the Middle East, and the use of Telegram. Russian groups squabble online. Healthcare cybersecurity and its implications for patient care. The Looting of FTX on the day of its bankruptcy. Joe Carrigan shares research from the Johns Hopkins University Information Security Institute. Our guest is Mike Walters from Action1, marking the 20th anniversary of Patch Tuesday. And CISA releases two new resources against ransomware.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/196</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.wsj.com/articles/israeli-cyber-companies-rally-as-digital-physical-assaults-continue-90b457f2">Israeli Cyber Companies Rally as Digital, Physical Assaults Continue</a> (Wall Street Journal)</p><p><a href="https://www.wsj.com/articles/israeli-cyber-companies-rally-as-digital-physical-assaults-continue-90b457f2?mod=djemCybersecruityPro&amp;tpl=cy">Israel Sees Cyber Incursions Across Digital Systems</a> (Wall Street Journal) </p><p><a href="https://www.businessinsider.com/hackers-infiltrate-israeli-smart-billboards-pro-hamas-messages-2023-10">Hackers infiltrated Israeli smart billboards to post pro-Hamas messages, reports say</a> (Business Insider) </p><p><a href="https://www.cyfirma.com/outofband/the-hamas-israel-conflict-explainer/">THE HAMAS ISRAEL : CONFLICT EXPLAINER - CYFIRMA</a> (CYFIRMA)</p><p><a href="https://flashpoint.io/blog/israel-hamas-war-first-72-hours-telegram/">The First 72 Hours of the Israel-Hamas War: Hamas and PIJ Activity on Telegram</a> (Flashpoint) </p><p><a href="https://www.radware.com/security/threat-advisories-and-attack-reports/cyber-aggression-rises-following-the-october-2023-israel-hamas-conflict/">Cyber Aggression Rises Following the October 2023 Israel-Hamas Conflict</a> (Radware) </p><p><a href="https://www.ft.com/content/a4ab23c7-977a-46b1-8d00-33923ceaee89">EU opens probe into X over Israel-Hamas war misinformation</a> (Financial Times) </p><p><a href="https://www.computing.co.uk/news/4134271/eu-formal-investigation-illegal-content">EU opens formal investigation into illegal content on X </a>(Computing) </p><p><a href="https://www.reuters.com/technology/x-ceo-says-removed-hundreds-hamas-affiliated-accounts-messaging-platform-2023-10-12/">X removes hundreds of Hamas-affiliated accounts since attack, CEO says</a> (Reuters) </p><p><a href="https://www.nextgov.com/cybersecurity/2023/10/us-cyber-agencies-very-close-contact-israel-after-unprecedented-hamas-attacks/391156/">US cyber agencies in 'very close contact' with Israel after unprecedented Hamas attacks</a> (Nextgov.com) </p><p><a href="https://www.scmagazine.com/perspective/five-threats-security-pros-everywhere-need-to-focus-on-as-the-middle-east-war-escalates">Five threats security pros everywhere need to focus on as the Middle East war escalates</a> (SC Media) </p><p><a href="https://www.proofpoint.com/sites/default/files/threat-reports/pfpt-us-tr-cyber-insecurity-healthcare-ponemon-report.pdf">Cyber Insecurity in Healthcare: The Cost and Impact on Patient Safety and Care 2023</a> (Proofpoint) </p><p><a href="https://www.wired.com/story/ftx-hack-400-million-crypto-laundering/">New Clues Suggest Stolen FTX Funds Went to Russia-Linked Money Launderers</a> (WIRED) </p><p><a href="https://www.cisa.gov/news-events/alerts/2023/10/12/cisa-releases-new-resources-identifying-known-exploited-vulnerabilities-and-misconfigurations-linked">CISA Releases New Resources Identifying Known Exploited Vulnerabilities and Misconfigurations Linked to Ransomware | CISA</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1716</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[13aecece-2b53-11ee-9c79-df1dc4b134d7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9605245762.mp3?updated=1697224922" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacktivism, auxiliaries, and the cyber phases of two hybrid wars. Challenges of content moderation. Cyberespionage in the supply chain. Don’t buy all the hype, but do fix your Linux libraries.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1925/notes</link>
      <description>Hacktivists join both sides of Hamas's renewed war. Disinformation and content control in social media. Storm-0062 exploits an Atlassian 0-day. Curl and Libcurl vulnerabilities. Betsy Carmelite from Booz Allen on how to expand and diversify the Cyber Talent Pool. Our guest is Kuldip Mohanty, CIO of North Dakota. And some further reflections on hacktivism and the laws of war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/195

Selected reading.
False Alarm of Hezbollah Aircraft Infiltration Underlines Israeli Concern of Multi-Front War (FDD)
Israel-Hamas conflict extends to cyberspace (CSO Online)
Hamas-Israel Cyber War Escalates: What We Know So Far (Technopedia) 
Israeli Cyber Companies Rally as Digital, Physical Assaults Continue (Wall Street Journal) 
X promises 'highest level' response on posts about Israel-Hamas war. Misinformation still flourishes (AP News) 
Europe gives Mark Zuckerberg 24 hours to respond about Israel-Hamas conflict and election misinformation (CNBC)
Elon Musk Is Shitposting His Way Through the Israel-Hamas War (WIRED)
Facebook video of Biden prompts probe into Meta content policy (Financial Times) 
MIDDLE EAST : A CYBER ARMS RACE (CYFIRMA) 
Storm0062 exploits Atlassian 0-day. (CyberWire)
Curl and Libcurl vulnerabilities. (CyberWire)
Ukraine at D+595: Sabotage in the Baltic Sea. (CyberWire)
A Hacktivist Code of Conduct May Be Too Little Too Late (OODA Loop)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 12 Oct 2023 20:15:00 -0000</pubDate>
      <itunes:title>Hacktivism, auxiliaries, and the cyber phases of two hybrid wars. Challenges of content moderation. Cyberespionage in the supply chain. Don’t buy all the hype, but do fix your Linux libraries.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1925</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Hacktivists join both sides of Hamas's renewed war. Disinformation and content control in social media. Storm-0062 exploits an Atlassian 0-day. Curl and Libcurl vulnerabilities. Betsy Carmelite from Booz Allen on how to expand and diversify the Cyber Talent Pool. Our guest is Kuldip Mohanty, CIO of North Dakota. And some further reflections on hacktivism and the laws of war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/195

Selected reading.
False Alarm of Hezbollah Aircraft Infiltration Underlines Israeli Concern of Multi-Front War (FDD)
Israel-Hamas conflict extends to cyberspace (CSO Online)
Hamas-Israel Cyber War Escalates: What We Know So Far (Technopedia) 
Israeli Cyber Companies Rally as Digital, Physical Assaults Continue (Wall Street Journal) 
X promises 'highest level' response on posts about Israel-Hamas war. Misinformation still flourishes (AP News) 
Europe gives Mark Zuckerberg 24 hours to respond about Israel-Hamas conflict and election misinformation (CNBC)
Elon Musk Is Shitposting His Way Through the Israel-Hamas War (WIRED)
Facebook video of Biden prompts probe into Meta content policy (Financial Times) 
MIDDLE EAST : A CYBER ARMS RACE (CYFIRMA) 
Storm0062 exploits Atlassian 0-day. (CyberWire)
Curl and Libcurl vulnerabilities. (CyberWire)
Ukraine at D+595: Sabotage in the Baltic Sea. (CyberWire)
A Hacktivist Code of Conduct May Be Too Little Too Late (OODA Loop)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hacktivists join both sides of Hamas's renewed war. Disinformation and content control in social media. Storm-0062 exploits an Atlassian 0-day. Curl and Libcurl vulnerabilities. Betsy Carmelite from Booz Allen on how to expand and diversify the Cyber Talent Pool. Our guest is Kuldip Mohanty, CIO of North Dakota. And some further reflections on hacktivism and the laws of war.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/195</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.fdd.org/analysis/2023/10/11/false-alarm-of-hezbollah-aircraft-infiltration-underlines-israeli-concern-of-multi-front-war/">False Alarm of Hezbollah Aircraft Infiltration Underlines Israeli Concern of Multi-Front War</a> (FDD)</p><p><a href="https://www.csoonline.com/article/655223/israel-palestine-conflict-extends-to-cyberspace.html">Israel-Hamas conflict extends to cyberspace</a> (CSO Online)</p><p><a href="https://www.techopedia.com/israel-hamas-cyber-war">Hamas-Israel Cyber War Escalates: What We Know So Far</a> (Technopedia) </p><p><a href="https://www.wsj.com/articles/israeli-cyber-companies-rally-as-digital-physical-assaults-continue-90b457f2">Israeli Cyber Companies Rally as Digital, Physical Assaults Continue</a> (Wall Street Journal) </p><p><a href="https://apnews.com/article/twitter-x-hamas-israel-war-elon-musk-misinformation-5e344fc9134741d4f5dc17ed04262940">X promises 'highest level' response on posts about Israel-Hamas war. Misinformation still flourishes</a> (AP News) </p><p><a href="https://www.cnbc.com/2023/10/11/europe-gives-zuckerberg-24-hours-to-respond-about-israel-hamas-misinfo.html">Europe gives Mark Zuckerberg 24 hours to respond about Israel-Hamas conflict and election misinformation</a> (CNBC)</p><p><a href="https://www.wired.com/story/elon-musk-israel-hamas-war-disinformation-x/">Elon Musk Is Shitposting His Way Through the Israel-Hamas War</a> (WIRED)</p><p><a href="https://www.ft.com/content/42a8d5db-434a-49ac-9fbd-964d07db285d">Facebook video of Biden prompts probe into Meta content policy</a> (Financial Times) </p><p><a href="https://www.cyfirma.com/outofband/middle-east-a-cyber-arms-race/">MIDDLE EAST : A CYBER ARMS RACE</a> (CYFIRMA) </p><p><a href="https://thecyberwire.com/stories/ec0980403cd94c3081301b110565375d/storm0062-exploits-atlassian-0-day">Storm0062 exploits Atlassian 0-day.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/7b7626eb72114dc2a918560e21d44f88/curl-and-libcurl-vulnerabilities">Curl and Libcurl vulnerabilities.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/5b62d6434ea64ce28c81a042ec560de9/ukraine-at-d595-sabotage-in-the-baltic-sea">Ukraine at D+595: Sabotage in the Baltic Sea.</a> (CyberWire)</p><p><a href="https://www.oodaloop.com/archive/2023/10/11/a-hacktivist-code-of-conduct-may-be-too-little-too-late/">A Hacktivist Code of Conduct May Be Too Little Too Late</a> (OODA Loop)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1985</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[13bec9c8-2b53-11ee-9c79-4fa240dd5beb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7604067851.mp3?updated=1697137024" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber phases of two hybrid wars prominently feature influence operations. Rapid Reset is a novel and powerful DDoS vulnerability. Credential phishing resurgent. And a look back at Patch Tuesday. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1924/notes</link>
      <description>Cyber operations in Hamas's war, Cryptocurrency as a source of funding, and Russian hacktivist auxiliaries shifting their focus. Not all influence operations involve disinformation. Rapid Reset is a Novel DDoS attack. A resurgent credential phishing campaign. Ann Johnson from Afternoon Cyber Tea speaks with Ram Shankar Siva Kumar and Dr. Hyrum Anderson about the promise, peril, and impact of AI. Our own Rick Howard talks cyber intelligence in the medical vertical with Taylor Lehmann of Google. And a quick look back at Patch Tuesday.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/194

Selected reading.
Hackers make their mark in Israel-Hamas conflict (Axios) 
Hacktivists take sides in Israel-Palestinian war (Record) 
Cyberattacks Targeting Israel Are Rising After Hamas Assault (Time) 
Hacktivists stoke Israel-Gaza conflict online (Reuters) 
Hackers, some tied to Russia, target Israeli media and government websites (MSN) 
Hamas Militants Behind Israel Attack Raised Millions in Crypto (Wall Street Journal) 
Cryptocurrency fueled Hamas' war machine (Quartz) 
The Israeli police cyber unit, Lahav 433, has frozen the cryptocurrency accounts of Hamas (Odessa Journal) 
U.S. surging cyber support to Israel (POLITICO Pro) 
Savvy Israel-linked hacking group reemerges amid Gaza fighting (CyberScoop) 
Israeli Cyber Companies Rally as Digital, Physical Assaults Continue (Wall Street Journal) 
Hamas Seeds Violent Videos on Sites With Little Moderation (New York Times) 
Social media platforms foment disinformation about war in Israel (Record) 
Hamas terrorists post murder of Israeli grandmother on her Facebook page (The Telegraph) 
How to limit graphic social media images from the Israel-Hamas war (Washington Post) 
Briefing: EU Commissioner Asks Musk for Information on “Illegal Content and Disinformation” Spreading on X (The Information)
EU warns Elon Musk of 'penalties' for disinformation circulating on X amid Israel-Hamas war (CNN) 
Hamas Got Around Israel’s Surveillance Prowess by Going Dark (Bloomberg) 
‘HTTP/2 Rapid Reset’ Zero-Day Exploited to Launch Largest DDoS Attacks in History (SecurityWeek)
New 'HTTP/2 Rapid Reset' zero-day attack breaks DDoS records (BleepingComputer) 
The largest cyberattack of its kind recently happened. Here’s how. (Washington Post) 
New technique leads to largest DDoS attacks ever, Google and Amazon say (Record) 
HTTP/2 Rapid Reset Vulnerability, CVE-2023-44487 (Cybersecurity and Infrastructure Security Agency CISA)
LinkedIn Smart Links Fuel Credential Phishing Campaign (Cofense)
Microsoft Fixes Exploited Zero-Days in WordPad, Skype for Business (SecurityWeek) 
Microsoft's October Patch Tuesday update resolves three zero-days (Computing) 
Microsoft Releases October 2023 Security Updates (Cybersecurity and Infrastructure Security Agency CISA) 
Patch Tuesday: Code Execution Flaws in Adobe Commerce, Photoshop (SecurityWeek) 
Citrix Releases Security Updates for Multiple Products (Cybersecurity and Infrastructure Security Agency CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 11 Oct 2023 20:15:00 -0000</pubDate>
      <itunes:title>Cyber phases of two hybrid wars prominently feature influence operations. Rapid Reset is a novel and powerful DDoS vulnerability. Credential phishing resurgent. And a look back at Patch Tuesday. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1924</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cyber operations in Hamas's war, Cryptocurrency as a source of funding, and Russian hacktivist auxiliaries shifting their focus. Not all influence operations involve disinformation. Rapid Reset is a Novel DDoS attack. A resurgent credential phishing campaign. Ann Johnson from Afternoon Cyber Tea speaks with Ram Shankar Siva Kumar and Dr. Hyrum Anderson about the promise, peril, and impact of AI. Our own Rick Howard talks cyber intelligence in the medical vertical with Taylor Lehmann of Google. And a quick look back at Patch Tuesday.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/194

Selected reading.
Hackers make their mark in Israel-Hamas conflict (Axios) 
Hacktivists take sides in Israel-Palestinian war (Record) 
Cyberattacks Targeting Israel Are Rising After Hamas Assault (Time) 
Hacktivists stoke Israel-Gaza conflict online (Reuters) 
Hackers, some tied to Russia, target Israeli media and government websites (MSN) 
Hamas Militants Behind Israel Attack Raised Millions in Crypto (Wall Street Journal) 
Cryptocurrency fueled Hamas' war machine (Quartz) 
The Israeli police cyber unit, Lahav 433, has frozen the cryptocurrency accounts of Hamas (Odessa Journal) 
U.S. surging cyber support to Israel (POLITICO Pro) 
Savvy Israel-linked hacking group reemerges amid Gaza fighting (CyberScoop) 
Israeli Cyber Companies Rally as Digital, Physical Assaults Continue (Wall Street Journal) 
Hamas Seeds Violent Videos on Sites With Little Moderation (New York Times) 
Social media platforms foment disinformation about war in Israel (Record) 
Hamas terrorists post murder of Israeli grandmother on her Facebook page (The Telegraph) 
How to limit graphic social media images from the Israel-Hamas war (Washington Post) 
Briefing: EU Commissioner Asks Musk for Information on “Illegal Content and Disinformation” Spreading on X (The Information)
EU warns Elon Musk of 'penalties' for disinformation circulating on X amid Israel-Hamas war (CNN) 
Hamas Got Around Israel’s Surveillance Prowess by Going Dark (Bloomberg) 
‘HTTP/2 Rapid Reset’ Zero-Day Exploited to Launch Largest DDoS Attacks in History (SecurityWeek)
New 'HTTP/2 Rapid Reset' zero-day attack breaks DDoS records (BleepingComputer) 
The largest cyberattack of its kind recently happened. Here’s how. (Washington Post) 
New technique leads to largest DDoS attacks ever, Google and Amazon say (Record) 
HTTP/2 Rapid Reset Vulnerability, CVE-2023-44487 (Cybersecurity and Infrastructure Security Agency CISA)
LinkedIn Smart Links Fuel Credential Phishing Campaign (Cofense)
Microsoft Fixes Exploited Zero-Days in WordPad, Skype for Business (SecurityWeek) 
Microsoft's October Patch Tuesday update resolves three zero-days (Computing) 
Microsoft Releases October 2023 Security Updates (Cybersecurity and Infrastructure Security Agency CISA) 
Patch Tuesday: Code Execution Flaws in Adobe Commerce, Photoshop (SecurityWeek) 
Citrix Releases Security Updates for Multiple Products (Cybersecurity and Infrastructure Security Agency CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber operations in Hamas's war, Cryptocurrency as a source of funding, and Russian hacktivist auxiliaries shifting their focus. Not all influence operations involve disinformation. Rapid Reset is a Novel DDoS attack. A resurgent credential phishing campaign. Ann Johnson from Afternoon Cyber Tea speaks with Ram Shankar Siva Kumar and Dr. Hyrum Anderson about the promise, peril, and impact of AI. Our own Rick Howard talks cyber intelligence in the medical vertical with Taylor Lehmann of Google. And a quick look back at Patch Tuesday.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/194</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.axios.com/2023/10/10/hackers-ddos-israel-hamas-conflict">Hackers make their mark in Israel-Hamas conflict</a> (Axios) </p><p><a href="https://therecord.media/hacktivists-take-sides-israel-palestinian">Hacktivists take sides in Israel-Palestinian war</a> (Record) </p><p><a href="https://time.com/6322175/israel-hamas-cyberattacks-hackers/">Cyberattacks Targeting Israel Are Rising After Hamas Assault</a> (Time) </p><p><a href="https://www.reuters.com/world/middle-east/hacktivists-stoke-israel-gaza-conflict-online-2023-10-11/">Hacktivists stoke Israel-Gaza conflict online</a> (Reuters) </p><p><a href="https://www.msn.com/en-ie/news/world/hackers-some-tied-to-russia-target-israeli-media-and-government-websites/ar-AA1i0OSb">Hackers, some tied to Russia, target Israeli media and government websites</a> (MSN) </p><p><a href="https://www.wsj.com/world/middle-east/militants-behind-israel-attack-raised-millions-in-crypto-b9134b7a">Hamas Militants Behind Israel Attack Raised Millions in Crypto</a> (Wall Street Journal) </p><p><a href="https://qz.com/cryptocurrency-fueled-hamas-war-machine-1850915014">Cryptocurrency fueled Hamas' war machine</a> (Quartz) </p><p><a href="https://odessa-journal.com/the-israeli-police-cyber-unit-lahav-433-has-frozen-the-cryptocurrency-accounts-of-hamas">The Israeli police cyber unit, Lahav 433, has frozen the cryptocurrency accounts of Hamas</a> (Odessa Journal) </p><p><a href="https://subscriber.politicopro.com/article/2023/10/iran-china-linked-to-information-operations-targeting-israeli-conflict-00120759">U.S. surging cyber support to Israel</a> (POLITICO Pro) </p><p><a href="https://cyberscoop.com/predatory-sparrow-israel-gaza-cyber/">Savvy Israel-linked hacking group reemerges amid Gaza fighting</a> (CyberScoop) </p><p><a href="https://www.wsj.com/articles/israeli-cyber-companies-rally-as-digital-physical-assaults-continue-90b457f2">Israeli Cyber Companies Rally as Digital, Physical Assaults Continue</a> (Wall Street Journal) </p><p><a href="https://www.nytimes.com/2023/10/10/technology/hamas-violent-videos-online.html">Hamas Seeds Violent Videos on Sites With Little Moderation</a> (New York Times) </p><p><a href="https://therecord.media/social-media-platforms-foment-disinfo-israel">Social media platforms foment disinformation about war in Israel</a> (Record) </p><p><a href="https://www.telegraph.co.uk/world-news/2023/10/10/israel-hamas-terrorists-grandmothers-murder-posted-facebook/">Hamas terrorists post murder of Israeli grandmother on her Facebook page</a> (The Telegraph) </p><p><a href="https://www.washingtonpost.com/technology/2023/10/10/violence-social-media-israel-war">How to limit graphic social media images from the Israel-Hamas war</a> (Washington Post) </p><p><a href="https://www.theinformation.com/briefings/eu-commissioner-asks-musk-for-information-on-illegal-content-and-disinformation-spreading-on-x">Briefing: EU Commissioner Asks Musk for Information on “Illegal Content and Disinformation” Spreading on X</a> (The Information)</p><p><a href="https://www.cnn.com/2023/10/10/tech/x-europe-israel-misinformation/">EU warns Elon Musk of 'penalties' for disinformation circulating on X amid Israel-Hamas war</a> (CNN) </p><p><a href="https://www.bloomberg.com/news/articles/2023-10-10/hamas-outmaneuvered-israel-s-surveillance-prowess-by-going-dark">Hamas Got Around Israel’s Surveillance Prowess by Going Dark</a> (Bloomberg) </p><p><a href="https://www.securityweek.com/rapid-reset-zero-day-exploited-to-launch-largest-ddos-attacks-in-history/">‘HTTP/2 Rapid Reset’ Zero-Day Exploited to Launch Largest DDoS Attacks in History</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-http-2-rapid-reset-zero-day-attack-breaks-ddos-records/">New 'HTTP/2 Rapid Reset' zero-day attack breaks DDoS records</a> (BleepingComputer) </p><p><a href="https://www.washingtonpost.com/politics/2023/10/11/largest-cyberattack-its-kind-recently-happened-heres-how/">The largest cyberattack of its kind recently happened. Here’s how.</a> (Washington Post) </p><p><a href="https://therecord.media/largest-ddos-incidents-amazon-cloudflare-google">New technique leads to largest DDoS attacks ever, Google and Amazon say</a> (Record) </p><p><a href="https://www.cisa.gov/news-events/alerts/2023/10/10/http2-rapid-reset-vulnerability-cve-2023-44487">HTTP/2 Rapid Reset Vulnerability, CVE-2023-44487</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://cofense.com/knowledge-center/linkedin-smart-links-credential-phishing-campaign/">LinkedIn Smart Links Fuel Credential Phishing Campaign</a> (Cofense)</p><p><a href="https://www.securityweek.com/microsoft-fixes-exploited-zero-days-in-wordpad-skype-for-business/">Microsoft Fixes Exploited Zero-Days in WordPad, Skype for Business</a> (SecurityWeek) </p><p><a href="https://www.computing.co.uk/news/4133197/microsofts-october-patch-tuesday-update-resolves-zero-days">Microsoft's October Patch Tuesday update resolves three zero-days </a>(Computing) </p><p><a href="https://www.cisa.gov/news-events/alerts/2023/10/10/microsoft-releases-october-2023-security-updates">Microsoft Releases October 2023 Security Updates</a> (Cybersecurity and Infrastructure Security Agency CISA) </p><p><a href="https://www.securityweek.com/patch-tuesday-code-execution-flaws-in-adobe-commerce-photoshop/">Patch Tuesday: Code Execution Flaws in Adobe Commerce, Photoshop</a> (SecurityWeek) </p><p><a href="https://www.cisa.gov/news-events/alerts/2023/10/10/citrix-releases-security-updates-multiple-products">Citrix Releases Security Updates for Multiple Products</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1651</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[13cffd6a-2b53-11ee-9c79-436bfcf98ce6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3553021068.mp3?updated=1697050970" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The cyber phases of two wars show signs of intersecting. Developments in cyberespionage and cybercrime. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1923/notes</link>
      <description>Disinformation and Hacktivism in the war between Hamas and Israel. KillNet and the IT Army of Ukraine say they'll follow ICRC guidelines. The current state of DPRK cyber operations. The Grayling cyberespionage group is active against Taiwan. A Magecart campaign abuses 404 pages. 23andMe suffers abreach. Voter records in Washington, DC, have been compromised. In our Solution Spotlight, Simone Petrella speaks with Raytheon’s Jon Check about supporting and shaping the next generation of the cyber workforce. Grady Summers from SailPoint outlines the importance of organizations managing and protecting access to critical data. And a look at CISOs willingness to pay ransom. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/193

Selected reading.
The Israel-Hamas War Is Drowning X in Disinformation (WIRED) 
As false war information spreads on X, Musk promotes unvetted accounts (Washington Post) 
Elon Musk’s X Cut Disinformation-Fighting Tool Ahead of Israel-Hamas Conflict (The Information) 
US opinion divided amid battle for narrative over Hamas attack on Israel (the Guardian) Zelensky Compares Assault by Hamas on Israel to Moscow’s Invasion of Ukraine (New York Times) 
Russia cites ‘concern’ but does not condemn Hamas attack on Israel (Washington Post) 
The Israel–Hamas Conflict: Implications for the Cyber Threat Landscape (ReliaQuest) 
Hackers Send Fake Rocket Alerts to Israelis via Hacked Red Alert App 
Hacktivism erupts in Middle East as Israel declares war (Register) 
The Israel-Hamas War Erupts in Digital Chaos (WIRED) 
Hacktivists in Palestine and Israel after SCADA and other industrial control systems (Cybernews) 
Hackers Join In on Israel-Hamas War With Disruptive Cyberattacks  (SecurityWeek)
Israel’s government, media websites hit with cyberattacks (Cybernews) 
Website of Jerusalem Post crashes after multiple cyberattacks (OpIndia) 
Ukraine cyber-conflict: Hacking gangs vow to de-escalate (BBC News) 
North Korea Suspected in Massive Hack of DeFi Project Mixin (OODA Loop) 
Assessed Cyber Structure and Alignments of North Korea in 2023 (Mandiant) 
Grayling: Previously Unseen Threat Actor Targets Multiple Organizations in Taiwan (Symantec)
The Art of Concealment: A New Magecart Campaign That’s Abusing 404 Pages (Akamai) 
Hacker Claims to Have Data of 7 Million 23andMe Users from DNA Service (Hack Read) 
23andMe user data breached in credential-stuffing attack (Engadget) 
‘Your DNA is for sale on the black market’: 23andMe data breach exposes customers (The Daily Dot) 
23andMe User Data Stolen in Targeted Attack on Ashkenazi Jews (WIRED) 
23andMe data breach affects a million users with Jewish heritage (Dataconomy)
D.C. voter records for sale in cybercrime forum (CyberScoop) 
Hackers access voter information in DC Board of Elections data breach (WTOP News) 
DC Board of Elections investigates voter data breach (NBC4 Washington) 
The CISO Report (Splunk)
October 2023 Patch Tuesday forecast: Operating system updates and zero-days aplenty (Help Net Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Oct 2023 20:15:00 -0000</pubDate>
      <itunes:title>The cyber phases of two wars show signs of intersecting. Developments in cyberespionage and cybercrime. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1923</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Disinformation and Hacktivism in the war between Hamas and Israel. KillNet and the IT Army of Ukraine say they'll follow ICRC guidelines. The current state of DPRK cyber operations. The Grayling cyberespionage group is active against Taiwan. A Magecart campaign abuses 404 pages. 23andMe suffers abreach. Voter records in Washington, DC, have been compromised. In our Solution Spotlight, Simone Petrella speaks with Raytheon’s Jon Check about supporting and shaping the next generation of the cyber workforce. Grady Summers from SailPoint outlines the importance of organizations managing and protecting access to critical data. And a look at CISOs willingness to pay ransom. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/193

Selected reading.
The Israel-Hamas War Is Drowning X in Disinformation (WIRED) 
As false war information spreads on X, Musk promotes unvetted accounts (Washington Post) 
Elon Musk’s X Cut Disinformation-Fighting Tool Ahead of Israel-Hamas Conflict (The Information) 
US opinion divided amid battle for narrative over Hamas attack on Israel (the Guardian) Zelensky Compares Assault by Hamas on Israel to Moscow’s Invasion of Ukraine (New York Times) 
Russia cites ‘concern’ but does not condemn Hamas attack on Israel (Washington Post) 
The Israel–Hamas Conflict: Implications for the Cyber Threat Landscape (ReliaQuest) 
Hackers Send Fake Rocket Alerts to Israelis via Hacked Red Alert App 
Hacktivism erupts in Middle East as Israel declares war (Register) 
The Israel-Hamas War Erupts in Digital Chaos (WIRED) 
Hacktivists in Palestine and Israel after SCADA and other industrial control systems (Cybernews) 
Hackers Join In on Israel-Hamas War With Disruptive Cyberattacks  (SecurityWeek)
Israel’s government, media websites hit with cyberattacks (Cybernews) 
Website of Jerusalem Post crashes after multiple cyberattacks (OpIndia) 
Ukraine cyber-conflict: Hacking gangs vow to de-escalate (BBC News) 
North Korea Suspected in Massive Hack of DeFi Project Mixin (OODA Loop) 
Assessed Cyber Structure and Alignments of North Korea in 2023 (Mandiant) 
Grayling: Previously Unseen Threat Actor Targets Multiple Organizations in Taiwan (Symantec)
The Art of Concealment: A New Magecart Campaign That’s Abusing 404 Pages (Akamai) 
Hacker Claims to Have Data of 7 Million 23andMe Users from DNA Service (Hack Read) 
23andMe user data breached in credential-stuffing attack (Engadget) 
‘Your DNA is for sale on the black market’: 23andMe data breach exposes customers (The Daily Dot) 
23andMe User Data Stolen in Targeted Attack on Ashkenazi Jews (WIRED) 
23andMe data breach affects a million users with Jewish heritage (Dataconomy)
D.C. voter records for sale in cybercrime forum (CyberScoop) 
Hackers access voter information in DC Board of Elections data breach (WTOP News) 
DC Board of Elections investigates voter data breach (NBC4 Washington) 
The CISO Report (Splunk)
October 2023 Patch Tuesday forecast: Operating system updates and zero-days aplenty (Help Net Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Disinformation and Hacktivism in the war between Hamas and Israel. KillNet and the IT Army of Ukraine say they'll follow ICRC guidelines. The current state of DPRK cyber operations. The Grayling cyberespionage group is active against Taiwan. A Magecart campaign abuses 404 pages. 23andMe suffers abreach. Voter records in Washington, DC, have been compromised. In our Solution Spotlight, Simone Petrella speaks with Raytheon’s Jon Check about supporting and shaping the next generation of the cyber workforce. Grady Summers from SailPoint outlines the importance of organizations managing and protecting access to critical data. And a look at CISOs willingness to pay ransom. </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/193</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.wired.com/story/x-israel-hamas-war-disinformation/">The Israel-Hamas War Is Drowning X in Disinformation</a> (WIRED) </p><p><a href="https://www.washingtonpost.com/technology/2023/10/08/israel-hamas-disinfo-musk-twitter-x/">As false war information spreads on X, Musk promotes unvetted accounts</a> (Washington Post) </p><p><a href="https://www.theinformation.com/articles/elon-musks-x-cut-disinformation-fighting-tool-ahead-of-israel-hamas-conflict">Elon Musk’s X Cut Disinformation-Fighting Tool Ahead of Israel-Hamas Conflict</a> (The Information) </p><p><a href="https://www.theguardian.com/world/2023/oct/10/hamas-attack-israel-us-opinion-divided">US opinion divided amid battle for narrative over Hamas attack on Israel</a> (the Guardian) <a href="https://www.nytimes.com/2023/10/09/world/europe/zelensky-ukraine-russia-israel.html">Zelensky Compares Assault by Hamas on Israel to Moscow’s Invasion of Ukraine</a> (New York Times) </p><p><a href="https://www.washingtonpost.com/world/2023/10/09/russia-hamas-israel-iran-ukraine/">Russia cites ‘concern’ but does not condemn Hamas attack on Israel</a> (Washington Post) </p><p><a href="https://www.reliaquest.com/blog/israel-hamas-implications-for-cyber-threats/">The Israel–Hamas Conflict: Implications for the Cyber Threat Landscape</a> (ReliaQuest) </p><p><a href="https://www.hackread.com/hackers-fake-rocket-alerts-red-alert-app-israel/">Hackers Send Fake Rocket Alerts to Israelis via Hacked Red Alert App</a> </p><p><a href="https://www.theregister.com/2023/10/09/hacktivism_middle_east/">Hacktivism erupts in Middle East as Israel declares war</a> (Register) </p><p><a href="https://www.wired.com/story/israel-hamas-war-hacktivism/">The Israel-Hamas War Erupts in Digital Chaos</a> (WIRED) </p><p><a href="https://cybernews.com/cyber-war/palestine-israel-scada-under-attack/">Hacktivists in Palestine and Israel after SCADA and other industrial control systems</a> (Cybernews) </p><p><a href="https://www.securityweek.com/hackers-join-in-on-israel-hamas-war-with-disruptive-cyberattacks/">Hackers Join In on Israel-Hamas War With Disruptive Cyberattacks </a> (SecurityWeek)</p><p><a href="https://cybernews.com/cyber-war/israel-palestine-hamas-cyber-attack-hacking-killnet/">Israel’s government, media websites hit with cyberattacks</a> (Cybernews) </p><p><a href="https://www.opindia.com/2023/10/website-of-jerusalem-post-crashes-after-multiple-cyberattacks/">Website of Jerusalem Post crashes after multiple cyberattacks</a> (OpIndia) </p><p><a href="https://www.bbc.com/news/technology-67029296">Ukraine cyber-conflict: Hacking gangs vow to de-escalate</a> (BBC News) </p><p><a href="https://www.oodaloop.com/briefs/2023/10/06/north-korea-suspected-in-massive-hack-of-defi-project-mixin/">North Korea Suspected in Massive Hack of DeFi Project Mixin</a> (OODA Loop) </p><p><a href="https://www.mandiant.com/resources/blog/north-korea-cyber-structure-alignment-2023">Assessed Cyber Structure and Alignments of North Korea in 2023</a> (Mandiant) </p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/grayling-taiwan-cyber-attacks">Grayling: Previously Unseen Threat Actor Targets Multiple Organizations in Taiwan</a> (Symantec)</p><p><a href="https://www.akamai.com/blog/security-research/magecart-new-technique-404-pages-skimmer">The Art of Concealment: A New Magecart Campaign That’s Abusing 404 Pages</a> (Akamai) </p><p><a href="https://www.hackread.com/hacker-claims-dna-service-23andme-users-data/">Hacker Claims to Have Data of 7 Million 23andMe Users from DNA Service</a> (Hack Read) </p><p><a href="https://www.engadget.com/23andme-user-data-breached-in-credential-stuffing-attack-231757254.html">23andMe user data breached in credential-stuffing attack</a> (Engadget) </p><p><a href="https://www.dailydot.com/news/23-and-me-dna-data-breach/">‘Your DNA is for sale on the black market’: 23andMe data breach exposes customers</a> (The Daily Dot) </p><p><a href="https://www.wired.com/story/23andme-credential-stuffing-data-stolen/">23andMe User Data Stolen in Targeted Attack on Ashkenazi Jews</a> (WIRED) </p><p><a href="https://dataconomy.com/2023/10/09/23andme-data-breach-exposes-jewish/">23andMe data breach affects a million users with Jewish heritage</a> (Dataconomy)</p><p><a href="https://cyberscoop.com/washington-dc-board-elections-breach/">D.C. voter records for sale in cybercrime forum</a> (CyberScoop) </p><p><a href="https://wtop.com/dc/2023/10/hackers-access-voter-information-in-dc-board-of-elections-data-breach/">Hackers access voter information in DC Board of Elections data breach</a> (WTOP News) </p><p><a href="https://www.nbcwashington.com/news/politics/elections/dc-board-of-elections-investigates-voter-data-breach/3439178/">DC Board of Elections investigates voter data breach</a> (NBC4 Washington) </p><p><a href="https://www.splunk.com/en_us/campaigns/ciso-report.html">The CISO Report</a> (Splunk)</p><p><a href="https://www.helpnetsecurity.com/2023/10/06/october-2023-patch-tuesday-forecast/">October 2023 Patch Tuesday forecast: Operating system updates and zero-days aplenty</a> (Help Net Security)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1947</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[13e0bed4-2b53-11ee-9c79-df52802345ff]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9802683590.mp3?updated=1696964186" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Solution spotlight: Paths to cybersecurity. [Interview Select]</title>
      <link>https://thecyberwire.com/podcasts/interview-selects/180/notes</link>
      <description>Solution Spotlight: Simone Petrella is talking with Diane Janosek, Executive Director of Capitol Technology University's Center for Women in Cyber, about paths to cybersecurity and ways to address cybersecurity workforce intelligence through education.
You can view the video of this interview here.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 09 Oct 2023 05:00:00 -0000</pubDate>
      <itunes:title>Solution spotlight: Paths to cybersecurity. [Interview Select]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>180</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Solution Spotlight: Simone Petrella is talking with Diane Janosek, Executive Director of Capitol Technology University's Center for Women in Cyber, about paths to cybersecurity and ways to address cybersecurity workforce intelligence through education.
You can view the video of this interview here.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Solution Spotlight: Simone Petrella is talking with Diane Janosek, Executive Director of Capitol Technology University's Center for Women in Cyber, about paths to cybersecurity and ways to address cybersecurity workforce intelligence through education.</p><p>You can view the video of this interview <a href="https://thecyberwire.com/stories/31917d61f2b34e49ac06d2f2d8c8b9f0/solution-spotlight-paths-to-cybersecurity">here</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1260</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[92502c2c-647f-11ee-a1e9-3f2ec6267d15]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7025869144.mp3?updated=1696621446" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Susie Squier: You're never alone. [President] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/170/notes</link>
      <description>Susie Squier, President of the Retail and Hospitality ISAC, or Information Sharing and Analysis Center, sits down to share her incredible story starting to get her into the cyber community. She first started getting into PR through an internship she did in college, then moved around a few times gaining experience everywhere she went. Susie shares some wise advice, discussing not only her managing style, but also how she handles situations, along with how she deals with adversity. She says "I also have realized over time that I'm never in this alone, whether that's your personal life or your work life and even here, uh, in addition to a great team, all great team." She hopes people will jump in to the world of cyber with an open mind, and though it may be frightening at first, she says you just need to dive in anyway and not be afraid to try new things. We thank Susie for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 08 Oct 2023 07:00:00 -0000</pubDate>
      <itunes:title>Susie Squier: You're never alone. [President] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>170</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Susie Squier, President of the Retail and Hospitality ISAC, or Information Sharing and Analysis Center, sits down to share her incredible story starting to get her into the cyber community. She first started getting into PR through an internship she did in college, then moved around a few times gaining experience everywhere she went. Susie shares some wise advice, discussing not only her managing style, but also how she handles situations, along with how she deals with adversity. She says "I also have realized over time that I'm never in this alone, whether that's your personal life or your work life and even here, uh, in addition to a great team, all great team." She hopes people will jump in to the world of cyber with an open mind, and though it may be frightening at first, she says you just need to dive in anyway and not be afraid to try new things. We thank Susie for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Susie Squier, President of the Retail and Hospitality ISAC, or Information Sharing and Analysis Center, sits down to share her incredible story starting to get her into the cyber community. She first started getting into PR through an internship she did in college, then moved around a few times gaining experience everywhere she went. Susie shares some wise advice, discussing not only her managing style, but also how she handles situations, along with how she deals with adversity. She says "I also have realized over time that I'm never in this alone, whether that's your personal life or your work life and even here, uh, in addition to a great team, all great team." She hopes people will jump in to the world of cyber with an open mind, and though it may be frightening at first, she says you just need to dive in anyway and not be afraid to try new things. We thank Susie for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>481</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[945efc24-6474-11ee-add8-3f9b54bb9648]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6947168628.mp3?updated=1696965955" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Targets from DuckTail. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/302/notes</link>
      <description>Deepen Desai from Zscaler joins to take a look into their research about "DuckTail." In May of 2023, Zscaler ThreatLabz began an intelligence collection operation to decode DuckTail’s maneuvers. Through an intensive three-month period of monitoring, Zscaler was able obtain unprecedented visibility into DuckTail’s end-to-end operations, spanning the entire kill chain from reconnaissance to post-compromise.
The research states "DuckTail threat actors primarily target users working in the digital marketing and advertising space. Unfortunately, the tech layoffs occurring in 2022 and 2023 introduced more eager candidates into the digital market - meaning more prime targets for DuckTail."
The research can be found here:
A Look Into DuckTail

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Oct 2023 07:00:00 -0000</pubDate>
      <itunes:title>Targets from DuckTail. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>302</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Deepen Desai from Zscaler joins to take a look into their research about "DuckTail." In May of 2023, Zscaler ThreatLabz began an intelligence collection operation to decode DuckTail’s maneuvers. Through an intensive three-month period of monitoring, Zscaler was able obtain unprecedented visibility into DuckTail’s end-to-end operations, spanning the entire kill chain from reconnaissance to post-compromise.
The research states "DuckTail threat actors primarily target users working in the digital marketing and advertising space. Unfortunately, the tech layoffs occurring in 2022 and 2023 introduced more eager candidates into the digital market - meaning more prime targets for DuckTail."
The research can be found here:
A Look Into DuckTail

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Deepen Desai from Zscaler joins to take a look into their research about "DuckTail." In May of 2023, Zscaler ThreatLabz began an intelligence collection operation to decode DuckTail’s maneuvers. Through an intensive three-month period of monitoring, Zscaler was able obtain unprecedented visibility into DuckTail’s end-to-end operations, spanning the entire kill chain from reconnaissance to post-compromise.</p><p>The research states "DuckTail threat actors primarily target users working in the digital marketing and advertising space. Unfortunately, the tech layoffs occurring in 2022 and 2023 introduced more eager candidates into the digital market - meaning more prime targets for DuckTail."</p><p>The research can be found here:</p><ul><li><a href="https://www.zscaler.com/blogs/security-research/look-ducktail">A Look Into DuckTail</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>928</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[074160c0-6460-11ee-a134-93deaaeb62e6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6465084308.mp3?updated=1696605408" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Advice on security, from Washington, DC and Washington State. The Predator Files have bad news on privacy. Notes on the hybrid war. And LoveGPT is not your soulmate.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1922/notes</link>
      <description>NSA and CISA release a list of the ten most common misconfigurations along with Identity and access management guidelines. The Predator Files. Cyber cooperation between Russia and North Korea. Hacktivist auxiliaries hit Australia. Hacktivists and hacktivist auxiliaries scorn the application of international humanitarian law. The direction of Russian cyber operations. Dave Bittner speaks with Andrea Little Limbago from Interos to talk about geopolitics, cyber and the C-suite. Rick Howard talks with John Hultquist, Chief Analyst at Mandiant, at the mWISE 2023 Cybersecurity Conference about cyber threat intelligence. And, finally, adventures in catphishing: “LoveGPT.”

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/192

Selected reading.
NSA and CISA Release Advisory on Top Ten Cybersecurity Misconfigurations (Cybersecurity and Infrastructure Security Agency CISA)
CISA and NSA Release New Guidance on Identity and Access Management (Cybersecurity and Infrastructure Security Agency CISA)
Microsoft Digital Defense Report 2023 (Microsoft)
Predator Files | EIC (European Investigative Collaborations)
Meet the ‘Predator Files,’ the latest investigative project looking into spyware (Washington Post)
NORTH KOREA–RUSSIA SUMMIT : A NEW ALLIANCE IN CYBERSPACE? - CYFIRMA (CYFIRMA) 
Australia’s home affairs department hit by DDoS attack claimed by pro-Russia hackers (the Guardian) 
Pro-Russia hacktivist group targets Australian government agencies over support for Ukraine (Cyberdaily.au) 
Home Affairs, Administrative Appeals Tribunal websites hit by cyber attacks (SBS News) 
‘War has no rules’: Hacktivists scorn Red Cross’ new guidelines (Record) 
Espionage fuels global cyberattacks (Microsoft On the Issues) 
LoveGPT: How “single ladies” looking for your data upped their game with ChatGPT (Avast Threat Labs)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 06 Oct 2023 20:15:00 -0000</pubDate>
      <itunes:title>Advice on security, from Washington, DC and Washington State. The Predator Files have bad news on privacy. Notes on the hybrid war. And LoveGPT is not your soulmate.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1922</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>NSA and CISA release a list of the ten most common misconfigurations along with Identity and access management guidelines. The Predator Files. Cyber cooperation between Russia and North Korea. Hacktivist auxiliaries hit Australia. Hacktivists and hacktivist auxiliaries scorn the application of international humanitarian law. The direction of Russian cyber operations. Dave Bittner speaks with Andrea Little Limbago from Interos to talk about geopolitics, cyber and the C-suite. Rick Howard talks with John Hultquist, Chief Analyst at Mandiant, at the mWISE 2023 Cybersecurity Conference about cyber threat intelligence. And, finally, adventures in catphishing: “LoveGPT.”

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/192

Selected reading.
NSA and CISA Release Advisory on Top Ten Cybersecurity Misconfigurations (Cybersecurity and Infrastructure Security Agency CISA)
CISA and NSA Release New Guidance on Identity and Access Management (Cybersecurity and Infrastructure Security Agency CISA)
Microsoft Digital Defense Report 2023 (Microsoft)
Predator Files | EIC (European Investigative Collaborations)
Meet the ‘Predator Files,’ the latest investigative project looking into spyware (Washington Post)
NORTH KOREA–RUSSIA SUMMIT : A NEW ALLIANCE IN CYBERSPACE? - CYFIRMA (CYFIRMA) 
Australia’s home affairs department hit by DDoS attack claimed by pro-Russia hackers (the Guardian) 
Pro-Russia hacktivist group targets Australian government agencies over support for Ukraine (Cyberdaily.au) 
Home Affairs, Administrative Appeals Tribunal websites hit by cyber attacks (SBS News) 
‘War has no rules’: Hacktivists scorn Red Cross’ new guidelines (Record) 
Espionage fuels global cyberattacks (Microsoft On the Issues) 
LoveGPT: How “single ladies” looking for your data upped their game with ChatGPT (Avast Threat Labs)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>NSA and CISA release a list of the ten most common misconfigurations along with Identity and access management guidelines. The Predator Files. Cyber cooperation between Russia and North Korea. Hacktivist auxiliaries hit Australia. Hacktivists and hacktivist auxiliaries scorn the application of international humanitarian law. The direction of Russian cyber operations. Dave Bittner speaks with Andrea Little Limbago from Interos to talk about geopolitics, cyber and the C-suite. Rick Howard talks with John Hultquist, Chief Analyst at Mandiant, at the mWISE 2023 Cybersecurity Conference about cyber threat intelligence. And, finally, adventures in catphishing: “LoveGPT.”</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/192</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/news-events/alerts/2023/10/05/nsa-and-cisa-release-advisory-top-ten-cybersecurity-misconfigurations">NSA and CISA Release Advisory on Top Ten Cybersecurity Misconfigurations</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/10/04/cisa-and-nsa-release-new-guidance-identity-and-access-management">CISA and NSA Release New Guidance on Identity and Access Management</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.microsoft.com/en-us/security/security-insider/microsoft-digital-defense-report-2023">Microsoft Digital Defense Report 2023</a> (Microsoft)</p><p><a href="https://eic.network/projects/predator-files.html">Predator Files | EIC</a> (European Investigative Collaborations)</p><p><a href="https://www.washingtonpost.com/politics/2023/10/06/meet-predator-files-latest-investigative-project-looking-into-spyware/">Meet the ‘Predator Files,’ the latest investigative project looking into spyware</a> (Washington Post)</p><p><a href="https://www.cyfirma.com/outofband/north-korea-russia-summit-a-new-alliance-in-cyberspace/">NORTH KOREA–RUSSIA SUMMIT : A NEW ALLIANCE IN CYBERSPACE? - CYFIRMA</a> (CYFIRMA) </p><p><a href="https://www.theguardian.com/australia-news/2023/oct/06/australia-department-of-home-affairs-ddos-hack-russia">Australia’s home affairs department hit by DDoS attack claimed by pro-Russia hackers</a> (the Guardian) </p><p><a href="https://www.cyberdaily.au/government/9643-pro-russia-hacktivist-group-targets-australian-government-agencies-over-support-for-ukraine">Pro-Russia hacktivist group targets Australian government agencies over support for Ukraine</a> (Cyberdaily.au) </p><p><a href="https://www.sbs.com.au/news/article/home-affairs-administrative-appeals-tribunal-websites-hit-by-cyber-attacks/fskx1tba0">Home Affairs, Administrative Appeals Tribunal websites hit by cyber attacks</a> (SBS News) </p><p><a href="https://therecord.media/hacktivists-respond-to-red-cross-rules-with-ridicule">‘War has no rules’: Hacktivists scorn Red Cross’ new guidelines</a> (Record) </p><p><a href="https://blogs.microsoft.com/on-the-issues/2023/10/05/microsoft-digital-defense-report-2023-global-cyberattacks/">Espionage fuels global cyberattacks</a> (Microsoft On the Issues) </p><p><a href="https://decoded.avast.io/threatintel/lovegpt-how-single-ladies-looking-for-your-data-upped-their-game-with-chatgpt/">LoveGPT: How “single ladies” looking for your data upped their game with ChatGPT</a> (Avast Threat Labs)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1807</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[139ea8b4-2b53-11ee-9c79-2741ba9886d3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9342296331.mp3?updated=1696620324" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Security risks in the hardware and software supply chains. Patches and proofs-of-concept. A look at recent incidents hitting major corporations. Online surveillance and social credit in Russia.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1921/notes</link>
      <description>Apple patches actively exploited iOS 17 vulnerability. Qakbot's survival of a major takedown. BADBOX puts malware into the device supply chain. LoonyTunables and a privilege-escalation risk. Scattered Spider believed responsible for cyberattack against Clorox. Sony discloses information on its data breach. In today’s Threat Vector segment, Chris Tillett, Senior Research Engineer at Palo Alto Networks and member of the Advisory Board at Titaniam Labs, joins host David Moulton to delve inside the mind of an insider threat. Dave Bittner sits down with Eric Goldstein, Executive Assistant Director at CISA, to discuss shared progress against the ransomware threat. And the Kremlin tightens control over the Russian information space.

On this segment of Threat Vector, Chris Tillett, Senior Research Engineer at Palo Alto Networks and member of the Advisory Board at Titaniam Labs, joins host David Moulton to delve inside the mind of an insider threat.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/191

Selected reading.
Apple emergency update fixes new zero-day used to hack iPhones (BleepingComputer)
Apple releases iOS 17.0.3 to address iPhone 15 overheating issues (Computing) 
Apple Warns of Newly Exploited iOS 17 Kernel Zero-Day (SecurityWeek) 
Qakbot-affiliated actors distribute Ransom Knight malware despite infrastructure takedown (Cisco Talos Blog)
HUMAN Disrupts Digital Supply Chain Threat Actor Scheme Originating from China (HUMAN)
Trojans All the Way Down: BADBOX and PEACHPIT (Human)
'Looney Tunables' Bug Opens Millions of Linux Systems to Root Takeover (Dark Reading)
Looney Tunables: New Linux Flaw Enables Privilege Escalation on Major Distributions (The Hacker News) 
Clorox Security Breach Linked to Group Behind Casino Hacks (Bloomberg) 
Clorox Warns of a Sales Mess After Cyberattack (Wall Street Journal)
Sony confirms data breach impacting thousands in the U.S. (BleepingComputer)
Sony sent data breach notifications to about 6,800 individuals (Security Affairs) 
Russian Offensive Campaign Assessment, October 4, 2023 (Institute for the Study of War)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 05 Oct 2023 20:15:00 -0000</pubDate>
      <itunes:title>Security risks in the hardware and software supply chains. Patches and proofs-of-concept. A look at recent incidents hitting major corporations. Online surveillance and social credit in Russia.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1921</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Apple patches actively exploited iOS 17 vulnerability. Qakbot's survival of a major takedown. BADBOX puts malware into the device supply chain. LoonyTunables and a privilege-escalation risk. Scattered Spider believed responsible for cyberattack against Clorox. Sony discloses information on its data breach. In today’s Threat Vector segment, Chris Tillett, Senior Research Engineer at Palo Alto Networks and member of the Advisory Board at Titaniam Labs, joins host David Moulton to delve inside the mind of an insider threat. Dave Bittner sits down with Eric Goldstein, Executive Assistant Director at CISA, to discuss shared progress against the ransomware threat. And the Kremlin tightens control over the Russian information space.

On this segment of Threat Vector, Chris Tillett, Senior Research Engineer at Palo Alto Networks and member of the Advisory Board at Titaniam Labs, joins host David Moulton to delve inside the mind of an insider threat.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/191

Selected reading.
Apple emergency update fixes new zero-day used to hack iPhones (BleepingComputer)
Apple releases iOS 17.0.3 to address iPhone 15 overheating issues (Computing) 
Apple Warns of Newly Exploited iOS 17 Kernel Zero-Day (SecurityWeek) 
Qakbot-affiliated actors distribute Ransom Knight malware despite infrastructure takedown (Cisco Talos Blog)
HUMAN Disrupts Digital Supply Chain Threat Actor Scheme Originating from China (HUMAN)
Trojans All the Way Down: BADBOX and PEACHPIT (Human)
'Looney Tunables' Bug Opens Millions of Linux Systems to Root Takeover (Dark Reading)
Looney Tunables: New Linux Flaw Enables Privilege Escalation on Major Distributions (The Hacker News) 
Clorox Security Breach Linked to Group Behind Casino Hacks (Bloomberg) 
Clorox Warns of a Sales Mess After Cyberattack (Wall Street Journal)
Sony confirms data breach impacting thousands in the U.S. (BleepingComputer)
Sony sent data breach notifications to about 6,800 individuals (Security Affairs) 
Russian Offensive Campaign Assessment, October 4, 2023 (Institute for the Study of War)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Apple patches actively exploited iOS 17 vulnerability. Qakbot's survival of a major takedown. BADBOX puts malware into the device supply chain. LoonyTunables and a privilege-escalation risk. Scattered Spider believed responsible for cyberattack against Clorox. Sony discloses information on its data breach. In today’s Threat Vector segment, Chris Tillett, Senior Research Engineer at Palo Alto Networks and member of the Advisory Board at Titaniam Labs, joins host David Moulton to delve inside the mind of an insider threat. Dave Bittner sits down with Eric Goldstein, Executive Assistant Director at CISA, to discuss shared progress against the ransomware threat. And the Kremlin tightens control over the Russian information space.</p><p><br></p><p>On this segment of Threat Vector, <a href="https://www.linkedin.com/in/cebrewer/https://www.linkedin.com/in/christillett/">Chris Tillett</a>, Senior Research Engineer at Palo Alto Networks and member of the Advisory Board at Titaniam Labs, joins host <a href="https://www.linkedin.com/in/davidrmoulton/">D</a>a<a href="https://www.linkedin.com/in/davidrmoulton/">vi</a>d<a href="https://www.linkedin.com/in/davidrmoulton/"> Moulton</a> to delve inside the mind of an insider threat.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/191</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/apple/apple-emergency-update-fixes-new-zero-day-used-to-hack-iphones/">Apple emergency update fixes new zero-day used to hack iPhones</a> (BleepingComputer)</p><p><a href="https://www.computing.co.uk/news/4132007/apple-releases-ios-address-iphone-overheating-issues">Apple releases iOS 17.0.3 to address iPhone 15 overheating issues </a>(Computing) </p><p><a href="https://www.securityweek.com/apple-warns-of-newly-exploited-ios-17-kernel-zero-day/">Apple Warns of Newly Exploited iOS 17 Kernel Zero-Day</a> (SecurityWeek) </p><p><a href="https://blog.talosintelligence.com/qakbot-affiliated-actors-distribute-ransom/">Qakbot-affiliated actors distribute Ransom Knight malware despite infrastructure takedown</a> (Cisco Talos Blog)</p><p><a href="https://www.humansecurity.com/newsroom/human-disrupts-digital-supply-chain-threat-actor-scheme-originating-from-china">HUMAN Disrupts Digital Supply Chain Threat Actor Scheme Originating from China</a> (HUMAN)</p><p><a href="https://www.humansecurity.com/hubfs/HUMAN_Report_BADBOX-and-PEACHPIT.pdf">Trojans All the Way Down: BADBOX and PEACHPIT</a> (Human)</p><p><a href="https://www.darkreading.com/vulnerabilities-threats/millions-linux-systems-looney-tunables-bug-root-takeover">'Looney Tunables' Bug Opens Millions of Linux Systems to Root Takeover</a> (Dark Reading)</p><p><a href="https://thehackernews.com/2023/10/looney-tunables-new-linux-flaw-enables.html">Looney Tunables: New Linux Flaw Enables Privilege Escalation on Major Distributions</a> (The Hacker News) </p><p><a href="https://www.bloomberg.com/news/articles/2023-10-04/clorox-suspected-of-being-hacked-by-same-scattered-spider-group-that-hit-mgm">Clorox Security Breach Linked to Group Behind Casino Hacks</a> (Bloomberg) </p><p><a href="https://www.wsj.com/business/retail/clorox-warns-of-a-sales-mess-after-cyberattack-2f8dd98c">Clorox Warns of a Sales Mess After Cyberattack</a> (Wall Street Journal)</p><p><a href="https://www.bleepingcomputer.com/news/security/sony-confirms-data-breach-impacting-thousands-in-the-us/">Sony confirms data breach impacting thousands in the U.S.</a> (BleepingComputer)</p><p><a href="https://securityaffairs.com/151982/data-breach/sony-sent-data-breach-notifications-to-about-6800-individuals.html">Sony sent data breach notifications to about 6,800 individuals</a> (Security Affairs) </p><p><a href="https://www.understandingwar.org/backgrounder/russian-offensive-campaign-assessment-october-4-2023">Russian Offensive Campaign Assessment, October 4, 2023</a> (Institute for the Study of War)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1527</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[138cf3f8-2b53-11ee-9c79-87f8c520fcee]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1770562940.mp3?updated=1696533306" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A phishnet for the C-suite. Rootkit delivered by typosquatting. Stream-jacking in YouTube. Risk management. Hybrid war, and the laws thereof. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1920/notes</link>
      <description>EvilProxy phishes for executives. Typosquatting to deliver a rootkit. Stream-jacking on YouTube. A global look at risk management. Assistance from a diverse set of international partners. In our Solution Spotlight segment, Simone Petrella speaks with Diane Janosek, Executive Director of Capitol Technology University's Center for Women in Cyber, about paths to cybersecurity and ways to address cybersecurity workforce intelligence through education. Dave Bittner previews the 3rd annual SOC Analyst Appreciation Day with Kayla Williams of Devo. And some guidelines for hacktivists engaged in hybrid war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/190

Selected reading.
EvilProxy Phishing Attack Strikes Indeed (Menlo Security)
Typosquatting campaign delivers r77 rootkit via npm (ReversingLabs)
A Deep Dive into Stream-Jacking Attacks on YouTube and Why They're So Popular (Bitdefender Labs) 
The C-suite playbook: Putting security at the epicenter of innovation (PwC)
European Peace Foundation (EPF) opens cyber classroom for Ukrainian Armed Forces - EU NEIGHBOURS east (EU NEIGHBOURS east) 
Rethinking Security When So Many Threats Are Invisible (New York Times)
8 rules for “civilian hackers” during war, and 4 obligations for states to restrain them (EJIL: Talk!)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 04 Oct 2023 20:15:00 -0000</pubDate>
      <itunes:title>A phishnet for the C-suite. Rootkit delivered by typosquatting. Stream-jacking in YouTube. Risk management. Hybrid war, and the laws thereof. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1920</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>EvilProxy phishes for executives. Typosquatting to deliver a rootkit. Stream-jacking on YouTube. A global look at risk management. Assistance from a diverse set of international partners. In our Solution Spotlight segment, Simone Petrella speaks with Diane Janosek, Executive Director of Capitol Technology University's Center for Women in Cyber, about paths to cybersecurity and ways to address cybersecurity workforce intelligence through education. Dave Bittner previews the 3rd annual SOC Analyst Appreciation Day with Kayla Williams of Devo. And some guidelines for hacktivists engaged in hybrid war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/190

Selected reading.
EvilProxy Phishing Attack Strikes Indeed (Menlo Security)
Typosquatting campaign delivers r77 rootkit via npm (ReversingLabs)
A Deep Dive into Stream-Jacking Attacks on YouTube and Why They're So Popular (Bitdefender Labs) 
The C-suite playbook: Putting security at the epicenter of innovation (PwC)
European Peace Foundation (EPF) opens cyber classroom for Ukrainian Armed Forces - EU NEIGHBOURS east (EU NEIGHBOURS east) 
Rethinking Security When So Many Threats Are Invisible (New York Times)
8 rules for “civilian hackers” during war, and 4 obligations for states to restrain them (EJIL: Talk!)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>EvilProxy phishes for executives. Typosquatting to deliver a rootkit. Stream-jacking on YouTube. A global look at risk management. Assistance from a diverse set of international partners. In our Solution Spotlight segment, Simone Petrella speaks with Diane Janosek, Executive Director of Capitol Technology University's Center for Women in Cyber, about paths to cybersecurity and ways to address cybersecurity workforce intelligence through education. Dave Bittner previews the 3rd annual SOC Analyst Appreciation Day with Kayla Williams of Devo. And some guidelines for hacktivists engaged in hybrid war.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/190</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.menlosecurity.com/blog/evilproxy-phishing-attack-strikes-indeed/">EvilProxy Phishing Attack Strikes Indeed</a> (Menlo Security)</p><p><a href="https://www.reversinglabs.com/blog/r77-rootkit-typosquatting-npm-threat-research">Typosquatting campaign delivers r77 rootkit via npm</a> (ReversingLabs)</p><p><a href="https://www.bitdefender.com/blog/labs/a-deep-dive-into-stream-jacking-attacks-on-youtube-and-why-theyre-so-popular/">A Deep Dive into Stream-Jacking Attacks on YouTube and Why They're So Popular</a> (Bitdefender Labs) </p><p><a href="https://www.pwc.com/us/en/services/consulting/cybersecurity-risk-regulatory/library/global-digital-trust-insights.html">The C-suite playbook: Putting security at the epicenter of innovation</a> (PwC)</p><p><a href="https://euneighbourseast.eu/news/latest-news/european-peace-foundation-epf-opens-cyber-classroom-for-ukrainian-armed-forces/">European Peace Foundation (EPF) opens cyber classroom for Ukrainian Armed Forces - EU NEIGHBOURS east</a> (EU NEIGHBOURS east) </p><p><a href="https://www.nytimes.com/2023/10/03/world/europe/cyber-security-athens-democracy-forum.html">Rethinking Security When So Many Threats Are Invisible</a> (New York Times)</p><p><a href="https://www.ejiltalk.org/8-rules-for-civilian-hackers-during-war-and-4-obligations-for-states-to-restrain-them/">8 rules for “civilian hackers” during war, and 4 obligations for states to restrain them</a> (EJIL: Talk!)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1550</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[13790532-2b53-11ee-9c79-d76b2f85dfdf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5759033470.mp3?updated=1696448827" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Where ICS touches the Internet. BunnyLoader traded in C2C markets. Phantom Hacker scams. API risks. Cybersecurity attitudes and behavior. DHS IG reports on two cyber issues. Updates on the hybrid war. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1919/notes</link>
      <description>Nearly 100,000 ICS services exposed to the Internet. BunnyLoader in the C2C market. Phantom Hacker scams. API risks. Cybersecurity attitudes and behaviors. Homeland Security IG finds flaws in TSA pipeline security programs, and privacy issues with CBP, ICE, and USSS use of commercial telemetry. Kyiv prepares for Russian attacks on Ukraine's power grid. Ben Yelin on the Department of Commerce placing guardrails on semi-conductor companies. As part of our sponsored Industry Voices segment, Dave Bittner sits down with Nick Ascoli, Founder and CTO at Foretrace, to discuss the last year in data leaks. And Russian disinformation is expected to aim at undermining US support for Ukraine.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/189

Selected reading.
Bitsight identifies nearly 100,000 exposed industrial control systems (Bitsight) 
New BunnyLoader threat emerges as a feature-rich malware-as-a-service (BleepingComputer) 
"Phantom Hacker" Scams Target Senior Citizens and Result in Victims Losing their Life Savings (FBI)
FBI warns of surge in 'phantom hacker' scams impacting elderly (BleepingComputer)
APIs: Unveiling the Silent Killer of Cyber Security Risk Across Industries (Hacker News)
Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2023 (National Cybersecurity Alliance)
Watchdog says pipeline security regulations, data collection safeguards not up to snuff at DHS (Washington Post) 
Better TSA Tracking and Follow-up for the 2021 Security Directives Implementation Should Strengthen Pipeline Cybersecurity (REDACTED) (Office of Inspector General, Department of Homeland Security) 
CBP, ICE, and Secret Service Did Not Adhere to Privacy Policies or Develop Sufficient Policies Before Procuring and Using Commercial Telemetry Data (REDACTED) (Office of Inspector General, Department of Homeland Security) 
﻿Ukraine prepares for winter again as Russia targets its power grid (The Economist) 
Putin’s Next Target: U.S. Support for Ukraine, Officials Say (New York Times
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Oct 2023 20:15:00 -0000</pubDate>
      <itunes:title>Where ICS touches the Internet. BunnyLoader traded in C2C markets. Phantom Hacker scams. API risks. Cybersecurity attitudes and behavior. DHS IG reports on two cyber issues. Updates on the hybrid war. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1919</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Nearly 100,000 ICS services exposed to the Internet. BunnyLoader in the C2C market. Phantom Hacker scams. API risks. Cybersecurity attitudes and behaviors. Homeland Security IG finds flaws in TSA pipeline security programs, and privacy issues with CBP, ICE, and USSS use of commercial telemetry. Kyiv prepares for Russian attacks on Ukraine's power grid. Ben Yelin on the Department of Commerce placing guardrails on semi-conductor companies. As part of our sponsored Industry Voices segment, Dave Bittner sits down with Nick Ascoli, Founder and CTO at Foretrace, to discuss the last year in data leaks. And Russian disinformation is expected to aim at undermining US support for Ukraine.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/189

Selected reading.
Bitsight identifies nearly 100,000 exposed industrial control systems (Bitsight) 
New BunnyLoader threat emerges as a feature-rich malware-as-a-service (BleepingComputer) 
"Phantom Hacker" Scams Target Senior Citizens and Result in Victims Losing their Life Savings (FBI)
FBI warns of surge in 'phantom hacker' scams impacting elderly (BleepingComputer)
APIs: Unveiling the Silent Killer of Cyber Security Risk Across Industries (Hacker News)
Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2023 (National Cybersecurity Alliance)
Watchdog says pipeline security regulations, data collection safeguards not up to snuff at DHS (Washington Post) 
Better TSA Tracking and Follow-up for the 2021 Security Directives Implementation Should Strengthen Pipeline Cybersecurity (REDACTED) (Office of Inspector General, Department of Homeland Security) 
CBP, ICE, and Secret Service Did Not Adhere to Privacy Policies or Develop Sufficient Policies Before Procuring and Using Commercial Telemetry Data (REDACTED) (Office of Inspector General, Department of Homeland Security) 
﻿Ukraine prepares for winter again as Russia targets its power grid (The Economist) 
Putin’s Next Target: U.S. Support for Ukraine, Officials Say (New York Times
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Nearly 100,000 ICS services exposed to the Internet. BunnyLoader in the C2C market. Phantom Hacker scams. API risks. Cybersecurity attitudes and behaviors. Homeland Security IG finds flaws in TSA pipeline security programs, and privacy issues with CBP, ICE, and USSS use of commercial telemetry. Kyiv prepares for Russian attacks on Ukraine's power grid. Ben Yelin on the Department of Commerce placing guardrails on semi-conductor companies. As part of our sponsored Industry Voices segment, Dave Bittner sits down with Nick Ascoli, Founder and CTO at Foretrace, to discuss the last year in data leaks. And Russian disinformation is expected to aim at undermining US support for Ukraine.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/189</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bitsight.com/blog/bitsight-identifies-nearly-100000-exposed-industrial-control-systems">Bitsight identifies nearly 100,000 exposed industrial control systems</a> (Bitsight) </p><p><a href="https://www.bleepingcomputer.com/news/security/new-bunnyloader-threat-emerges-as-a-feature-rich-malware-as-a-service/">New BunnyLoader threat emerges as a feature-rich malware-as-a-service</a> (BleepingComputer) </p><p><a href="https://www.ic3.gov/Media/Y2023/PSA230929">"Phantom Hacker" Scams Target Senior Citizens and Result in Victims Losing their Life Savings</a> (FBI)</p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-warns-of-surge-in-phantom-hacker-scams-impacting-elderly/">FBI warns of surge in 'phantom hacker' scams impacting elderly</a> (BleepingComputer)</p><p><a href="https://thehackernews.com/2023/10/apis-unveiling-silent-killer-of-cyber.html">APIs: Unveiling the Silent Killer of Cyber Security Risk Across Industries</a> (Hacker News)</p><p><a href="https://staysafeonline.org/online-safety-privacy-basics/oh-behave/">Oh Behave! The Annual Cybersecurity Attitudes and Behaviors Report 2023</a> (National Cybersecurity Alliance)</p><p><a href="https://www.washingtonpost.com/politics/2023/10/03/watchdog-says-pipeline-security-regulations-data-collection-safeguards-not-up-snuff-dhs/">Watchdog says pipeline security regulations, data collection safeguards not up to snuff at DHS</a> (Washington Post) </p><p><a href="https://www.oig.dhs.gov/sites/default/files/assets/2023-09/OIG-23-57-Sep23-Redacted.pdf">Better TSA Tracking and Follow-up for the 2021 Security Directives Implementation Should Strengthen Pipeline Cybersecurity (REDACTED)</a> (Office of Inspector General, Department of Homeland Security) </p><p><a href="https://www.oig.dhs.gov/sites/default/files/assets/2023-09/OIG-23-61-Sep23-Redacted.pdf">CBP, ICE, and Secret Service Did Not Adhere to Privacy Policies or Develop Sufficient Policies Before Procuring and Using Commercial Telemetry Data (REDACTED)</a> (Office of Inspector General, Department of Homeland Security) </p><p><a href="https://www.economist.com/europe/2023/10/02/ukraine-prepares-for-winter-again-as-russia-targets-its-power-grid">﻿Ukraine prepares for winter again as Russia targets its power grid</a> (The Economist) </p><p><a href="https://www.nytimes.com/2023/10/02/us/politics/putin-ukraine-spy-united-states.html">Putin’s Next Target: U.S. Support for Ukraine, Officials Say</a> (New York Times</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1542</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[136660e4-2b53-11ee-9c79-eb889aa3b897]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5900887061.mp3?updated=1696369745" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Adventures of ransomware, and other developments in cybercrime. Cyberespionage and hybrid warfare. A government shutdown averted. Cybersecurity Awareness Month is underway.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1918/notes</link>
      <description>Double-tapping ransomware hits the same victim twice. Exim mail servers are found exposed to attack. Iran's OilRig deploys Menorah malware against Saudi targets. North Korea's Lazarus Group targets a Spanish aerospace firm. Update your ransomware scorecards: LostTrust is a rebrand of MetaEncryptor. Increased domestic surveillance in Russia, done partly so propaganda can be more effectively targeted. Killnet claims to have hit the British Royal family with a DDoS attack. Michael Denning, CEO at SecureG for Blu Ventures, shares developments in zero trust as a part of our Industry Voices segment. Rob Boyce from Accenture Security talks about Dark Web threat actors targeting macOS. And Cybersecurity Awareness Month begins this week.

Learn more about the Blu Ventures Conference here: https://www.bluventureinvestors.com/cyber-venture-forum

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/188

Selected reading.
Two or More Ransomware Variants Impacting the Same Victims and Data Destruction Trends (FBI) 
FBI: Ransomware Actors Launching 'Dual' Attacks (Decipher) 
A still unpatched 0-day RCE impacts more than 3.5M Exim servers (Security Affairs) 
New Critical Security Flaws Expose Exim Mail Servers to Remote Attacks (The Hacker News)
APT34 deploys new Menorah malware in targeted phishing attack (Candid.Technology) 
APT34 Deploys Phishing Attack With New Malware (Trend Micro) 
Iranian APT Group OilRig Using New Menorah Malware for Covert Operations (The Hacker News) 
Alleged Iranian hackers target victims in Saudi Arabia with new spying malware (Record) 
North Korean hackers posed as Meta recruiter on LinkedIn (CyberScoop)
Lazarus APT Exploiting LinkedIn to Target Spanish Aerospace Firm (Hackread)
North Korean Lazarus targeted a Spanish aerospace company (Security Affairs)
Meet LostTrust ransomware — A likely rebrand of the MetaEncryptor gang (BleepingComputer)
Ukraine at D+585: Trench fighting in the south. (CyberWire)
Royal Family's official website targeted in cyber attack (Sky News)
Royal family website hit by cyber attack (The Independent)
The country ‘dodged a bullet’ after shutdown avoided, but the cyber threat still hovers (Washington Post)
US Federal shutdown averted (or postponed): effects on cybersecurity. (CyberWire)
Cybersecurity Awareness Month: perspectives from the cyber sector. (CyberWire)
Kicking off NIST's Cybersecurity Awareness Month Celebration &amp; Our Cybersecurity Awareness Month 2023 Blog Series (NIST) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 02 Oct 2023 20:35:00 -0000</pubDate>
      <itunes:title>Adventures of ransomware, and other developments in cybercrime. Cyberespionage and hybrid warfare. A government shutdown averted. Cybersecurity Awareness Month is underway.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1918</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Double-tapping ransomware hits the same victim twice. Exim mail servers are found exposed to attack. Iran's OilRig deploys Menorah malware against Saudi targets. North Korea's Lazarus Group targets a Spanish aerospace firm. Update your ransomware scorecards: LostTrust is a rebrand of MetaEncryptor. Increased domestic surveillance in Russia, done partly so propaganda can be more effectively targeted. Killnet claims to have hit the British Royal family with a DDoS attack. Michael Denning, CEO at SecureG for Blu Ventures, shares developments in zero trust as a part of our Industry Voices segment. Rob Boyce from Accenture Security talks about Dark Web threat actors targeting macOS. And Cybersecurity Awareness Month begins this week.

Learn more about the Blu Ventures Conference here: https://www.bluventureinvestors.com/cyber-venture-forum

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/188

Selected reading.
Two or More Ransomware Variants Impacting the Same Victims and Data Destruction Trends (FBI) 
FBI: Ransomware Actors Launching 'Dual' Attacks (Decipher) 
A still unpatched 0-day RCE impacts more than 3.5M Exim servers (Security Affairs) 
New Critical Security Flaws Expose Exim Mail Servers to Remote Attacks (The Hacker News)
APT34 deploys new Menorah malware in targeted phishing attack (Candid.Technology) 
APT34 Deploys Phishing Attack With New Malware (Trend Micro) 
Iranian APT Group OilRig Using New Menorah Malware for Covert Operations (The Hacker News) 
Alleged Iranian hackers target victims in Saudi Arabia with new spying malware (Record) 
North Korean hackers posed as Meta recruiter on LinkedIn (CyberScoop)
Lazarus APT Exploiting LinkedIn to Target Spanish Aerospace Firm (Hackread)
North Korean Lazarus targeted a Spanish aerospace company (Security Affairs)
Meet LostTrust ransomware — A likely rebrand of the MetaEncryptor gang (BleepingComputer)
Ukraine at D+585: Trench fighting in the south. (CyberWire)
Royal Family's official website targeted in cyber attack (Sky News)
Royal family website hit by cyber attack (The Independent)
The country ‘dodged a bullet’ after shutdown avoided, but the cyber threat still hovers (Washington Post)
US Federal shutdown averted (or postponed): effects on cybersecurity. (CyberWire)
Cybersecurity Awareness Month: perspectives from the cyber sector. (CyberWire)
Kicking off NIST's Cybersecurity Awareness Month Celebration &amp; Our Cybersecurity Awareness Month 2023 Blog Series (NIST) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Double-tapping ransomware hits the same victim twice. Exim mail servers are found exposed to attack. Iran's OilRig deploys Menorah malware against Saudi targets. North Korea's Lazarus Group targets a Spanish aerospace firm. Update your ransomware scorecards: LostTrust is a rebrand of MetaEncryptor. Increased domestic surveillance in Russia, done partly so propaganda can be more effectively targeted. Killnet claims to have hit the British Royal family with a DDoS attack. Michael Denning, CEO at SecureG for Blu Ventures, shares developments in zero trust as a part of our Industry Voices segment. Rob Boyce from Accenture Security talks about Dark Web threat actors targeting macOS. And Cybersecurity Awareness Month begins this week.</p><p><br></p><p>Learn more about the Blu Ventures Conference here: <a href="https://www.bluventureinvestors.com/cyber-venture-forum">https://www.bluventureinvestors.com/cyber-venture-forum</a></p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/188</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.ic3.gov/Media/News/2023/230928.pdf">Two or More Ransomware Variants Impacting the Same Victims and Data Destruction Trends</a> (FBI) </p><p><a href="https://duo.com/decipher/fbi-dual-attacks-adding-significant-harm-to-ransomware-victims">FBI: Ransomware Actors Launching 'Dual' Attacks</a> (Decipher) </p><p><a href="https://securityaffairs.com/151693/hacking/cve-2023-42115-exim-mail-transfer.html">A still unpatched 0-day RCE impacts more than 3.5M Exim servers</a> (Security Affairs) </p><p><a href="https://thehackernews.com/2023/09/new-critical-security-flaws-expose-exim.html">New Critical Security Flaws Expose Exim Mail Servers to Remote Attacks</a> (The Hacker News)</p><p><a href="https://candid.technology/apt34-menorah-malware-phishing-attack/">APT34 deploys new Menorah malware in targeted phishing attack</a> (Candid.Technology) </p><p><a href="https://www.trendmicro.com/en_no/research/23/i/apt34-deploys-phishing-attack-with-new-malware.html">APT34 Deploys Phishing Attack With New Malware</a> (Trend Micro) </p><p><a href="https://thehackernews.com/2023/09/iranian-apt-group-oilrig-using-new.html">Iranian APT Group OilRig Using New Menorah Malware for Covert Operations</a> (The Hacker News) </p><p><a href="https://therecord.media/alleged-iran-hackers-target-saudi-arabia-with-new-spy-malware">Alleged Iranian hackers target victims in Saudi Arabia with new spying malware</a> (Record) </p><p><a href="https://cyberscoop.com/north-korea-meta-linkedin/">North Korean hackers posed as Meta recruiter on LinkedIn</a> (CyberScoop)</p><p><a href="https://www.hackread.com/lazarus-exploit-linkedin-spanish-aerospace-firm/">Lazarus APT Exploiting LinkedIn to Target Spanish Aerospace Firm</a> (Hackread)</p><p><a href="https://securityaffairs.com/151771/apt/lazarus-targets-spanish-aerospace-firm.html">North Korean Lazarus targeted a Spanish aerospace company</a> (Security Affairs)</p><p><a href="https://www.bleepingcomputer.com/news/security/meet-losttrust-ransomware-a-likely-rebrand-of-the-metaencryptor-gang/">Meet LostTrust ransomware — A likely rebrand of the MetaEncryptor gang</a> (BleepingComputer)</p><p><a href="https://thecyberwire.com/stories/5929dcd93fd74cbd84e5526b84adcf9a/ukraine-at-d585-trench-fighting-in-the-south">Ukraine at D+585: Trench fighting in the south.</a> (CyberWire)</p><p><a href="https://news.sky.com/story/royal-familys-official-website-targeted-in-cyber-attack-12974093">Royal Family's official website targeted in cyber attack</a> (Sky News)</p><p><a href="https://www.independent.co.uk/life-style/royal-family/royal-website-cyber-attack-b2421941.html">Royal family website hit by cyber attack</a> (The Independent)</p><p><a href="https://www.washingtonpost.com/politics/2023/10/02/cyber-officials-dodged-bullet-after-shutdown-avoided-threat-looms/">The country ‘dodged a bullet’ after shutdown avoided, but the cyber threat still hovers</a> (Washington Post)</p><p><a href="https://thecyberwire.com/stories/8a7a02340ab34a13b672a6c41c3b8b45/us-federal-shutdown-averted-or-postponed-effects-on-cybersecurity">US Federal shutdown averted (or postponed): effects on cybersecurity</a>. (CyberWire)</p><p><a href="https://thecyberwire.com/stories/9ff501e22f0747f1b296f4fafe1776a9/cybersecurity-awareness-month-perspectives-from-the-cyber-sector">Cybersecurity Awareness Month: perspectives from the cyber sector.</a> (CyberWire)</p><p><a href="https://www.nist.gov/blogs/cybersecurity-insights/kicking-nists-cybersecurity-awareness-month-celebration-our">Kicking off NIST's Cybersecurity Awareness Month Celebration &amp; Our Cybersecurity Awareness Month 2023 Blog Series</a> (NIST) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1692</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1353c3b2-2b53-11ee-9c79-1bc95ef1aa2f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9814642698.mp3?updated=1696277445" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ted Wagner: Get that hands on experience. [CISO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/169/notes</link>
      <description>This week, we are joined by Ted Wagner, Chief Information Security Officer at SAP National Security Services, or SAP NS2. Ted sits down to share his story on how he got introduced into the industry and why he chose this as a career path. He went straight into the Armyas a second lieutenant in the artillery field after high school, which after his time was up he decided to move on and started working for a company that allowed him to do a management training program. After that he found himself working on IT projects which got him interested in the field. Ted shares that one thing that has helped him throughout his career is teaching about very technical terms and turning it into more operational or business like terms for his students at MIT. He shares that people getting into this field should get as much hands on experience as they can, saying "I think those are all things that can really help someone who may not have all the experience, but this is a pathway to, to learn." We thank Ted for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 01 Oct 2023 07:00:00 -0000</pubDate>
      <itunes:title>Ted Wagner: Get that hands on experience. [CISO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>169</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, we are joined by Ted Wagner, Chief Information Security Officer at SAP National Security Services, or SAP NS2. Ted sits down to share his story on how he got introduced into the industry and why he chose this as a career path. He went straight into the Armyas a second lieutenant in the artillery field after high school, which after his time was up he decided to move on and started working for a company that allowed him to do a management training program. After that he found himself working on IT projects which got him interested in the field. Ted shares that one thing that has helped him throughout his career is teaching about very technical terms and turning it into more operational or business like terms for his students at MIT. He shares that people getting into this field should get as much hands on experience as they can, saying "I think those are all things that can really help someone who may not have all the experience, but this is a pathway to, to learn." We thank Ted for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we are joined by Ted Wagner, Chief Information Security Officer at SAP National Security Services, or SAP NS2. Ted sits down to share his story on how he got introduced into the industry and why he chose this as a career path. He went straight into the Armyas a second lieutenant in the artillery field after high school, which after his time was up he decided to move on and started working for a company that allowed him to do a management training program. After that he found himself working on IT projects which got him interested in the field. Ted shares that one thing that has helped him throughout his career is teaching about very technical terms and turning it into more operational or business like terms for his students at MIT. He shares that people getting into this field should get as much hands on experience as they can, saying "I think those are all things that can really help someone who may not have all the experience, but this is a pathway to, to learn." We thank Ted for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>531</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[80ad09d2-5eed-11ee-917a-9f4cf9188fab]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6398241428.mp3?updated=1696008136" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Downloading cracked software. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/301/notes</link>
      <description>David Liebenberg from Cisco Talos joins to discussing Talos' discovery of cracked Microsoft Windows software being downloaded by enterprise users across the globe. Downloading and running this compromised software not only serves as an entry point for threat actors, but can serve as a gateway to access control systems and establish backdoors.
Talos identified additional malware, including RATs, on endpoints running this cracked software, which allows an attacker to gain unauthorized remote access to the compromised system, providing the attacker with various capabilities, such as controlling the system, capturing screenshots, recording keystrokes and exfiltrating sensitive information.
This research article was not published by Cisco Talos' team.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Sep 2023 07:00:00 -0000</pubDate>
      <itunes:title>Downloading cracked software. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>301</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>David Liebenberg from Cisco Talos joins to discussing Talos' discovery of cracked Microsoft Windows software being downloaded by enterprise users across the globe. Downloading and running this compromised software not only serves as an entry point for threat actors, but can serve as a gateway to access control systems and establish backdoors.
Talos identified additional malware, including RATs, on endpoints running this cracked software, which allows an attacker to gain unauthorized remote access to the compromised system, providing the attacker with various capabilities, such as controlling the system, capturing screenshots, recording keystrokes and exfiltrating sensitive information.
This research article was not published by Cisco Talos' team.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>David Liebenberg from Cisco Talos joins to discussing Talos' discovery of cracked Microsoft Windows software being downloaded by enterprise users across the globe. Downloading and running this compromised software not only serves as an entry point for threat actors, but can serve as a gateway to access control systems and establish backdoors.</p><p>Talos identified additional malware, including RATs, on endpoints running this cracked software, which allows an attacker to gain unauthorized remote access to the compromised system, providing the attacker with various capabilities, such as controlling the system, capturing screenshots, recording keystrokes and exfiltrating sensitive information.</p><p>This research article was not published by Cisco Talos' team.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1049</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b9c26276-5eed-11ee-b22b-3b98618f1faa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6408327467.mp3?updated=1696000741" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Malicious ads in a chatbot. A vulnerability gets some clarification. Cl0p switches from Tor to torrents. Influence operations as an adjunct to WMD. And NSA’s new AI Security Center.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1917/notes</link>
      <description>Malicious ads in a chatbot. Google provides clarification on a recent vulnerability. Cl0p switches from Tor to torrents. Influence operations as an adjunct to weapons of mass destruction. Our guest Jeffrey Wells, former Maryland cyber czar and partner at Sigma7 shares his thoughts on what the looming US government shutdown will mean for the nation’s cybersecurity. Tim Eades from Cyber Mentor Fund discussing the 3 who’s a cybersecurity entrepreneur needs to consider. And NSA has a new AI Security Center.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/187

Selected reading.
Malicious ad served inside Bing's AI chatbot (Malwarebytes)
Critical Vulnerability: WebP Heap Buffer Overflow (CVE-2023-4863) (Huntress) 
Google gives WebP library heap buffer overflow a critical score, but NIST rates it as high-severity (SC Media) 
A new Chrome 0-day is sending the Internet into a new chapter of Groundhog Day (Ars Technica) 
Google "confirms" that exploited Chrome zero-day is actually in libwebp (CVE-2023-5129) (Help Net Security) 
Google quietly corrects previously submitted disclosure for critical webp 0-day (Ars Technica)
CL0P Seeds ^_- Gotta Catch Em All! (Unit 42) 
A ransomware gang innovates, putting pressure on victims but also exposing itself (Washington Post) 
2023 Department of Defense Strategy for Countering Weapons of Mass Destruction (US Department of Defense)
NSA chief announces new AI Security Center, 'focal point' for AI use by government, defense industry (Breaking Defense)
NSA starts AI security center with eye on China and Russia (Fortune) 
NSA is creating a hub for AI security, Nakasone says (Record)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 29 Sep 2023 20:15:00 -0000</pubDate>
      <itunes:title>Malicious ads in a chatbot. A vulnerability gets some clarification. Cl0p switches from Tor to torrents. Influence operations as an adjunct to WMD. And NSA’s new AI Security Center.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1917</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Malicious ads in a chatbot. Google provides clarification on a recent vulnerability. Cl0p switches from Tor to torrents. Influence operations as an adjunct to weapons of mass destruction. Our guest Jeffrey Wells, former Maryland cyber czar and partner at Sigma7 shares his thoughts on what the looming US government shutdown will mean for the nation’s cybersecurity. Tim Eades from Cyber Mentor Fund discussing the 3 who’s a cybersecurity entrepreneur needs to consider. And NSA has a new AI Security Center.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/187

Selected reading.
Malicious ad served inside Bing's AI chatbot (Malwarebytes)
Critical Vulnerability: WebP Heap Buffer Overflow (CVE-2023-4863) (Huntress) 
Google gives WebP library heap buffer overflow a critical score, but NIST rates it as high-severity (SC Media) 
A new Chrome 0-day is sending the Internet into a new chapter of Groundhog Day (Ars Technica) 
Google "confirms" that exploited Chrome zero-day is actually in libwebp (CVE-2023-5129) (Help Net Security) 
Google quietly corrects previously submitted disclosure for critical webp 0-day (Ars Technica)
CL0P Seeds ^_- Gotta Catch Em All! (Unit 42) 
A ransomware gang innovates, putting pressure on victims but also exposing itself (Washington Post) 
2023 Department of Defense Strategy for Countering Weapons of Mass Destruction (US Department of Defense)
NSA chief announces new AI Security Center, 'focal point' for AI use by government, defense industry (Breaking Defense)
NSA starts AI security center with eye on China and Russia (Fortune) 
NSA is creating a hub for AI security, Nakasone says (Record)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Malicious ads in a chatbot. Google provides clarification on a recent vulnerability. Cl0p switches from Tor to torrents. Influence operations as an adjunct to weapons of mass destruction. Our guest Jeffrey Wells, former Maryland cyber czar and partner at Sigma7 shares his thoughts on what the looming US government shutdown will mean for the nation’s cybersecurity. Tim Eades from Cyber Mentor Fund discussing the 3 who’s a cybersecurity entrepreneur needs to consider. And NSA has a new AI Security Center.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/187</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.malwarebytes.com/blog/threat-intelligence/2023/09/malicious-ad-served-inside-bing-ai-chatbot">Malicious ad served inside Bing's AI chatbot</a> (Malwarebytes)</p><p><a href="https://www.huntress.com/blog/critical-vulnerability-webp-heap-buffer-overflow-cve-2023-4863">Critical Vulnerability: WebP Heap Buffer Overflow (CVE-2023-4863)</a> (Huntress) </p><p><a href="https://www.scmagazine.com/news/google-identifies-heap-buffer-overflow-in-webp-library">Google gives WebP library heap buffer overflow a critical score, but NIST rates it as high-severity</a> (SC Media) </p><p><a href="https://arstechnica.com/security/2023/09/new-0-day-in-chrome-and-firefox-is-likely-to-plague-other-software/">A new Chrome 0-day is sending the Internet into a new chapter of Groundhog Day</a> (Ars Technica) </p><p><a href="https://www.helpnetsecurity.com/2023/09/27/cve-2023-5129/">Google "confirms" that exploited Chrome zero-day is actually in libwebp (CVE-2023-5129)</a> (Help Net Security) </p><p><a href="https://arstechnica.com/security/2023/09/google-quietly-corrects-previously-submitted-disclosure-for-critical-webp-0-day/">Google quietly corrects previously submitted disclosure for critical webp 0-day</a> (Ars Technica)</p><p><a href="https://unit42.paloaltonetworks.com/cl0p-group-distributes-ransomware-data-with-torrents/">CL0P Seeds ^_- Gotta Catch Em All!</a> (Unit 42) </p><p><a href="https://www.washingtonpost.com/politics/2023/09/29/ransomware-gang-innovates-putting-pressure-victims-also-exposing-itself/">A ransomware gang innovates, putting pressure on victims but also exposing itself</a> (Washington Post) </p><p><a href="https://media.defense.gov/2023/Sep/28/2003310413/-1/-1/1/2023_STRATEGY_FOR_COUNTERING_WEAPONS_OF_MASS_DESTRUCTION.PDF">2023 Department of Defense Strategy for Countering Weapons of Mass Destruction</a> (US Department of Defense)</p><p><a href="https://breakingdefense.com/2023/09/nsa-stands-up-ai-security-center-as-focal-point-for-guiding-ai-use-by-government-defense-industry/">NSA chief announces new AI Security Center, 'focal point' for AI use by government, defense industry</a> (Breaking Defense)</p><p><a href="https://fortune.com/2023/09/28/nsa-starts-ai-security-center-with-eye-on-china-and-russia/">NSA starts AI security center with eye on China and Russia</a> (Fortune) </p><p><a href="https://therecord.media/national-security-agency-ai-hub">NSA is creating a hub for AI security, Nakasone says </a>(Record)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1606</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[13400d5e-2b53-11ee-9c79-3bce2bb48abd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6746400713.mp3?updated=1696014708" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Buckworm APT’s specialized tools. Cyberattack against Johnson Controls. Oversight panel reports on Section 702. Cyber in election security, and in the US industrial base. Hacktivism versus Russia.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1916/notes</link>
      <description>The Budworm APT's bespoke tools. Johnson Controls sustains a cyberattack. The US Privacy and Civil Liberties Oversight Board reports on Section 702. The looming government shutdown and cyber risk. Cybersecurity in the US industrial base. X cuts back content moderation capabilities. In our Industry Voices segment, Nicholas Kathmann from LogicGate describes the struggle when facing low cost attacks. Sam Crowther from Kasada shares his team's findings on Stolen Auto Accounts. And Ukrainian hacktivists target Russian airline check-in systems.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/186

Selected reading.
Budworm: APT Group Uses Updated Custom Tool in Attacks on Government and Telecoms Org (Symantec Enterprise Blogs)
Johnson Controls reports data breach after severe ransomware attack (BeyondMachines) 
Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act (U.S. Privacy and Civil Liberties Oversight Board) 
Split privacy board urges big changes to Section 702 surveillance law (Washington Post)
Democrats fear cyberattacks as government shutdown looms (Nextgov.com) 
Aprio Releases U.S. National Manufacturing Survey, Highlighting the Need for Improved Operational Excellence, Digitization and Cybersecurity Practices (Aprio) 
Musk's X disabled feature for reporting electoral misinformation - researcher (Reuters) 
Musk’s X Cuts Half of Election Integrity Team After Promising to Expand It (The Information)
Aeroflot, other airlines’ flights delayed over DDoS attack (Cybernews)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 28 Sep 2023 20:15:00 -0000</pubDate>
      <itunes:title>Buckworm APT’s specialized tools. Cyberattack against Johnson Controls. Oversight panel reports on Section 702. Cyber in election security, and in the US industrial base. Hacktivism versus Russia.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1916</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Budworm APT's bespoke tools. Johnson Controls sustains a cyberattack. The US Privacy and Civil Liberties Oversight Board reports on Section 702. The looming government shutdown and cyber risk. Cybersecurity in the US industrial base. X cuts back content moderation capabilities. In our Industry Voices segment, Nicholas Kathmann from LogicGate describes the struggle when facing low cost attacks. Sam Crowther from Kasada shares his team's findings on Stolen Auto Accounts. And Ukrainian hacktivists target Russian airline check-in systems.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/186

Selected reading.
Budworm: APT Group Uses Updated Custom Tool in Attacks on Government and Telecoms Org (Symantec Enterprise Blogs)
Johnson Controls reports data breach after severe ransomware attack (BeyondMachines) 
Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act (U.S. Privacy and Civil Liberties Oversight Board) 
Split privacy board urges big changes to Section 702 surveillance law (Washington Post)
Democrats fear cyberattacks as government shutdown looms (Nextgov.com) 
Aprio Releases U.S. National Manufacturing Survey, Highlighting the Need for Improved Operational Excellence, Digitization and Cybersecurity Practices (Aprio) 
Musk's X disabled feature for reporting electoral misinformation - researcher (Reuters) 
Musk’s X Cuts Half of Election Integrity Team After Promising to Expand It (The Information)
Aeroflot, other airlines’ flights delayed over DDoS attack (Cybernews)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Budworm APT's bespoke tools. Johnson Controls sustains a cyberattack. The US Privacy and Civil Liberties Oversight Board reports on Section 702. The looming government shutdown and cyber risk. Cybersecurity in the US industrial base. X cuts back content moderation capabilities. In our Industry Voices segment, Nicholas Kathmann from LogicGate describes the struggle when facing low cost attacks. Sam Crowther from Kasada shares his team's findings on Stolen Auto Accounts. And Ukrainian hacktivists target Russian airline check-in systems.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/186</p><p><br></p><h2>Selected reading.</h2><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/budworm-tool-update-telecoms-govt">Budworm: APT Group Uses Updated Custom Tool in Attacks on Government and Telecoms Org</a> (Symantec Enterprise Blogs)</p><p><a href="https://beyondmachines.net/event_details/johnson-controls-reports-data-breach-after-severe-ransomware-attack-g-n-u-t-5/gD2P6Ple2L">Johnson Controls reports data breach after severe ransomware attack</a> (BeyondMachines) </p><p><a href="https://documents.pclob.gov/prod/Documents/OversightReport/e9e72454-4156-49b9-961a-855706216063/2023%20PCLOB%20702%20Report%20%28002%29.pdf">Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act</a> (U.S. Privacy and Civil Liberties Oversight Board) </p><p><a href="https://www.washingtonpost.com/national-security/2023/09/28/surveillance-702-law-privacy/">Split privacy board urges big changes to Section 702 surveillance law</a> (Washington Post)</p><p><a href="https://www.nextgov.com/cybersecurity/2023/09/democrats-fear-cyberattacks-government-shutdown-looms/390696/">Democrats fear cyberattacks as government shutdown looms</a> (Nextgov.com) </p><p><a href="https://www.aprio.com/aprio-releases-u-s-national-manufacturing-survey-highlighting-the-need-for-improved-operational-excellence-digitization-and-cybersecurity-practices/">Aprio Releases U.S. National Manufacturing Survey, Highlighting the Need for Improved Operational Excellence, Digitization and Cybersecurity Practices</a> (Aprio) </p><p><a href="https://www.reuters.com/technology/musks-x-disabled-feature-reporting-electoral-misinformation-researcher-2023-09-27/">Musk's X disabled feature for reporting electoral misinformation - researcher</a> (Reuters) </p><p><a href="https://www.theinformation.com/articles/musks-x-cuts-half-of-election-integrity-team-after-promising-to-expand-it">Musk’s X Cuts Half of Election Integrity Team After Promising to Expand It</a> (The Information)</p><p><a href="https://cybernews.com/cyber-war/aeroflot-delayed-ddos-attack/">Aeroflot, other airlines’ flights delayed over DDoS attack</a> (Cybernews)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1734</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[132afb94-2b53-11ee-9c79-dbdb8c2faa86]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1247586868.mp3?updated=1695929891" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What up in the underworld’s C2C markets. An update on the Sony hack claims. Notes on cyberespionage, from Russia, China, and parts unknown. And there’s a market for bugs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1915/notes</link>
      <description>A Joint Advisory warns of Beijing's "BlackTech" threat activity. ShadowSyndicate is a new ransomware as a service operation. A Smishing Triad in the UAE. Openfire flaw actively exploited against servers. AtlasCross is technically capable and, above all, "cautious." Xenomorph malware in the wild. DDoS and API attacks hit the financial sector. In our Industry Voices segment, Joe DePlato from Bluestone Analytics demystified dark net drug markets. Our guest is Richard Hummel from Netscout with the latest trending DDoS vectors. And the FCC chair announces plans to restore net neutrality.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/185

Selected reading.
CISA, NSA, FBI and Japan Release Advisory Warning of BlackTech, PRC-Linked Cyber Activity (Cybersecurity and Infrastructure Security Agency) 
Dusting for fingerprints: ShadowSyndicate, a new RaaS player? (Group-IB)
Smishing Triad Stretches Its Tentacles into the United Arab Emirates (Security Affairs)
Hackers actively exploiting Openfire flaw to encrypt servers (BleepingComputer) 
Vulnerability in Openfire messaging software allows unauthorized access to compromised servers (Dr.Web) 
Suspicious New Ransomware Group Claims Sony Hack (Dark Reading) 
Sony investigates cyberattack as hackers fight over who's responsible (BleepingComputer) 
Sony Investigating After Hackers Offer to Sell Stolen Data (SecurityWeek) 
Xenomorph Malware Strikes Again: Over 30+ US Banks Now Targeted (Threat Fabric)
The High Stakes of Innovation: Attack Trends in Financial Services (Akamai)
FACT SHEET: FCC Chairwoman Rosenworcel Proposes to Restore Net Neutrality Rules (Federal Communications Commission) 
Ukraine: Russian hackers infiltrating software supply chains (Computing)
Russian hacking operations target Ukrainian law enforcement (CyberScoop) 
Ukraine accuses Russian spies of hacking law enforcement (Register) 
Russian hackers target Ukrainian government systems involved in war crimes investigations (Record) 
Ukraine Cyber Defenders Prepare for Winter (Bank Info Security) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 27 Sep 2023 20:15:00 -0000</pubDate>
      <itunes:title>What up in the underworld’s C2C markets. An update on the Sony hack claims. Notes on cyberespionage, from Russia, China, and parts unknown. And there’s a market for bugs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1915</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A Joint Advisory warns of Beijing's "BlackTech" threat activity. ShadowSyndicate is a new ransomware as a service operation. A Smishing Triad in the UAE. Openfire flaw actively exploited against servers. AtlasCross is technically capable and, above all, "cautious." Xenomorph malware in the wild. DDoS and API attacks hit the financial sector. In our Industry Voices segment, Joe DePlato from Bluestone Analytics demystified dark net drug markets. Our guest is Richard Hummel from Netscout with the latest trending DDoS vectors. And the FCC chair announces plans to restore net neutrality.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/185

Selected reading.
CISA, NSA, FBI and Japan Release Advisory Warning of BlackTech, PRC-Linked Cyber Activity (Cybersecurity and Infrastructure Security Agency) 
Dusting for fingerprints: ShadowSyndicate, a new RaaS player? (Group-IB)
Smishing Triad Stretches Its Tentacles into the United Arab Emirates (Security Affairs)
Hackers actively exploiting Openfire flaw to encrypt servers (BleepingComputer) 
Vulnerability in Openfire messaging software allows unauthorized access to compromised servers (Dr.Web) 
Suspicious New Ransomware Group Claims Sony Hack (Dark Reading) 
Sony investigates cyberattack as hackers fight over who's responsible (BleepingComputer) 
Sony Investigating After Hackers Offer to Sell Stolen Data (SecurityWeek) 
Xenomorph Malware Strikes Again: Over 30+ US Banks Now Targeted (Threat Fabric)
The High Stakes of Innovation: Attack Trends in Financial Services (Akamai)
FACT SHEET: FCC Chairwoman Rosenworcel Proposes to Restore Net Neutrality Rules (Federal Communications Commission) 
Ukraine: Russian hackers infiltrating software supply chains (Computing)
Russian hacking operations target Ukrainian law enforcement (CyberScoop) 
Ukraine accuses Russian spies of hacking law enforcement (Register) 
Russian hackers target Ukrainian government systems involved in war crimes investigations (Record) 
Ukraine Cyber Defenders Prepare for Winter (Bank Info Security) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Joint Advisory warns of Beijing's "BlackTech" threat activity. ShadowSyndicate is a new ransomware as a service operation. A Smishing Triad in the UAE. Openfire flaw actively exploited against servers. AtlasCross is technically capable and, above all, "cautious." Xenomorph malware in the wild. DDoS and API attacks hit the financial sector. In our Industry Voices segment, Joe DePlato from Bluestone Analytics demystified dark net drug markets. Our guest is Richard Hummel from Netscout with the latest trending DDoS vectors. And the FCC chair announces plans to restore net neutrality.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/185</p><p><br></p><h2>Selected reading.</h2><p><a href="https://content.govdelivery.com/accounts/USDHSCISA/bulletins/372c1e7">CISA, NSA, FBI and Japan Release Advisory Warning of BlackTech, PRC-Linked Cyber Activity</a> (Cybersecurity and Infrastructure Security Agency) </p><p><a href="https://www.group-ib.com/blog/shadowsyndicate-raas/">Dusting for fingerprints: ShadowSyndicate, a new RaaS player?</a> (Group-IB)</p><p><a href="https://securityaffairs.com/151465/cyber-crime/smishing-triad-united-arab-emirates.html">Smishing Triad Stretches Its Tentacles into the United Arab Emirates</a> (Security Affairs)</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-actively-exploiting-openfire-flaw-to-encrypt-servers/">Hackers actively exploiting Openfire flaw to encrypt servers</a> (BleepingComputer) </p><p><a href="https://news.drweb.com/show/?i=14756&amp;lng=enu">Vulnerability in Openfire messaging software allows unauthorized access to compromised servers</a> (Dr.Web) </p><p><a href="https://www.darkreading.com/attacks-breaches/suspicious-new-ransomware-group-claims-sony-hack">Suspicious New Ransomware Group Claims Sony Hack</a> (Dark Reading) </p><p><a href="https://www.bleepingcomputer.com/news/security/sony-investigates-cyberattack-as-hackers-fight-over-whos-responsible/">Sony investigates cyberattack as hackers fight over who's responsible</a> (BleepingComputer) </p><p><a href="https://www.securityweek.com/sony-investigating-after-hackers-offer-to-sell-stolen-data/">Sony Investigating After Hackers Offer to Sell Stolen Data</a> (SecurityWeek) </p><p><a href="https://www.threatfabric.com/blogs/xenomorph">Xenomorph Malware Strikes Again: Over 30+ US Banks Now Targeted</a> (Threat Fabric)</p><p><a href="https://www.akamai.com/blog/security/attack-trends-in-financial-services">The High Stakes of Innovation: Attack Trends in Financial Services</a> (Akamai)</p><p><a href="https://www.documentcloud.org/documents/23991797-fcc-proposal-to-restore-net-neutrality">FACT SHEET: FCC Chairwoman Rosenworcel Proposes to Restore Net Neutrality Rules</a> (Federal Communications Commission) </p><p><a href="https://www.computing.co.uk/news/4129536/ukraine-russian-hackers-infiltrating-software-supply-chains">Ukraine: Russian hackers infiltrating software supply chains </a>(Computing)</p><p><a href="https://cyberscoop.com/russia-hacking-law-enforcement/">Russian hacking operations target Ukrainian law enforcement</a> (CyberScoop) </p><p><a href="https://www.theregister.com/2023/09/26/ukraine_russian_war_crimes_report/">Ukraine accuses Russian spies of hacking law enforcement</a> (Register) </p><p><a href="https://therecord.media/russian-hackers-target-ukraine-gov-systems-war-crime-espionage">Russian hackers target Ukrainian government systems involved in war crimes investigations</a> (Record) </p><p><a href="https://www.bankinfosecurity.com/ukraine-cyber-defenders-prepare-for-winter-a-23173">Ukraine Cyber Defenders Prepare for Winter</a> (Bank Info Security) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2008</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[131867c2-2b53-11ee-9c79-67f4db23e69a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5730609219.mp3?updated=1695841150" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Crooks phish for guests; spies phish for drone operators. ZenRAT is used in an info-stealing campaign. More MOVEit-related incidents (some involving Cl0p). DeFi platforms hit. The UK hunts forward.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1914/notes</link>
      <description>An advanced phishing campaign hits hospitality industry. An information-stealing campaign deploys ZenRAT. More MOVEit-related data breaches are disclosed. Mixin Network suspends deposits and withdrawals. The OpenSea NFT market warns of third-party risk to its API. Phishing for Ukrainian military drone operators. Mr. Security Answer Person John Pescatore shares thoughts in Cisco acquiring Splunk. Ann Johnson from the Afternoon Cyber Tea podcast interviews Deb Cupp sharing a lesson in leadership. And the UK adopts a hunt-forward approach to cyber war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/184

Selected reading.
Luxury Hotels Major Target of Ongoing Social Engineering Attack (Cofense) 
ZenRAT: Malware Brings More Chaos Than Calm (Proofpoint) 
More MOVEit-related data breaches are disclosed. (CyberWire)
Mixin Network suspends deposits and withdrawals. (CyberWire)
OpenSea NFT market warns of third-party risk to its API. (CyberWire)
Threat Labs Security Advisory: New STARK#VORTEX Attack Campaign: Threat Actors Use Drone Manual Lures to Deliver MerlinAgent Payloads (Securonix) 
Ukrainian Military Targeted in Phishing Campaign Leveraging Drone Manuals (The Hacker News) 
British Army general says UK now conducting ‘hunt forward’ operations (Record)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Sep 2023 20:15:00 -0000</pubDate>
      <itunes:title>Crooks phish for guests; spies phish for drone operators. ZenRAT is used in an info-stealing campaign. More MOVEit-related incidents (some involving Cl0p). DeFi platforms hit. The UK hunts forward.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1914</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An advanced phishing campaign hits hospitality industry. An information-stealing campaign deploys ZenRAT. More MOVEit-related data breaches are disclosed. Mixin Network suspends deposits and withdrawals. The OpenSea NFT market warns of third-party risk to its API. Phishing for Ukrainian military drone operators. Mr. Security Answer Person John Pescatore shares thoughts in Cisco acquiring Splunk. Ann Johnson from the Afternoon Cyber Tea podcast interviews Deb Cupp sharing a lesson in leadership. And the UK adopts a hunt-forward approach to cyber war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/184

Selected reading.
Luxury Hotels Major Target of Ongoing Social Engineering Attack (Cofense) 
ZenRAT: Malware Brings More Chaos Than Calm (Proofpoint) 
More MOVEit-related data breaches are disclosed. (CyberWire)
Mixin Network suspends deposits and withdrawals. (CyberWire)
OpenSea NFT market warns of third-party risk to its API. (CyberWire)
Threat Labs Security Advisory: New STARK#VORTEX Attack Campaign: Threat Actors Use Drone Manual Lures to Deliver MerlinAgent Payloads (Securonix) 
Ukrainian Military Targeted in Phishing Campaign Leveraging Drone Manuals (The Hacker News) 
British Army general says UK now conducting ‘hunt forward’ operations (Record)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An advanced phishing campaign hits hospitality industry. An information-stealing campaign deploys ZenRAT. More MOVEit-related data breaches are disclosed. Mixin Network suspends deposits and withdrawals. The OpenSea NFT market warns of third-party risk to its API. Phishing for Ukrainian military drone operators. Mr. Security Answer Person John Pescatore shares thoughts in Cisco acquiring Splunk. Ann Johnson from the Afternoon Cyber Tea podcast interviews Deb Cupp sharing a lesson in leadership. And the UK adopts a hunt-forward approach to cyber war.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/184</p><p><br></p><h2>Selected reading.</h2><p><a href="https://cofense.com/blog/luxury-hotels-remain-target-of-social-engineering-attack/">Luxury Hotels Major Target of Ongoing Social Engineering Attack</a> (Cofense) </p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/zenrat-malware-brings-more-chaos-calm">ZenRAT: Malware Brings More Chaos Than Calm</a> (Proofpoint) </p><p><a href="https://thecyberwire.com/stories/52b33527c76a41779e96047c561ce6a1/more-moveit-related-data-breaches-are-disclosed">More MOVEit-related data breaches are disclosed.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/550ccfc3f256450390afbf25f4e4ca19/mixin-network-suspends-deposits-and-withdrawals">Mixin Network suspends deposits and withdrawals.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/44ba0fa510ca47de95e6699999c07856/opensea-nft-market-warns-of-third-party-risk-to-its-api">OpenSea NFT market warns of third-party risk to its API.</a> (CyberWire)</p><p><a href="https://www.securonix.com/blog/threat-labs-security-advisory-new-starkvortex-attack-campaign-threat-actors-use-drone-manual-lures-to-deliver-merlinagent-payloads/">Threat Labs Security Advisory: New STARK#VORTEX Attack Campaign: Threat Actors Use Drone Manual Lures to Deliver MerlinAgent Payloads</a> (Securonix) </p><p><a href="https://thehackernews.com/2023/09/ukrainian-military-targeted-in-phishing.html">Ukrainian Military Targeted in Phishing Campaign Leveraging Drone Manuals</a> (The Hacker News) </p><p><a href="https://therecord.media/uk-hunt-forward-operations-lt-gen-tom-copinger-symes">British Army general says UK now conducting ‘hunt forward’ operations</a> (Record)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1390</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1305c086-2b53-11ee-9c79-031731754b98]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2739121981.mp3?updated=1695756354" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage in East and Southeast Asia, for both intelligence collection and domestic security, Spyware tools tracked. Shifting cyber targets in Russia’s hybrid war. Securing the Super Bowl. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1913/notes</link>
      <description>The Gelsemium APT is active against a Southeast Asian government. A multi-year campaign against Tibetan, Uighur, and Taiwanese targets. Stealth Falcon's new backdoor. Predator spyware is deployed against Apple zero-days. An update on Pegasus spyware found in Meduza devices. There’s a shift in Russian cyberespionage targeting. A rumor of cyberwar in occupied Crimea. In our Industry Voices segment, Amit Sinha, CEO of Digicert, describes digital trust for the software supply chain. Our guest is Arctic Wolf’s Ian McShane with insights on the MGM and Caesars ransomware incident. And if you’re looking for a Super Bowl pick, go with an egg-laying animal…and, oh, the NFL and CISA are noodling cyber defense for the big game.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/183

Selected reading.
Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government (Unit 42)
Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government (IBM X-Force Exchange)
Evasive Gelsemium hackers spotted in attack against Asian govt (BleepingComputer)
Unit 42 Researchers Discover Multiple Espionage Operations Targeting Southeast Asian Government (Unit 42)
EvilBamboo Targets Mobile Devices in Multi-year Campaign (Volexity) 
From Watering Hole to Spyware: EvilBamboo Targets Tibetans, Uyghurs, and Taiwanese (The Hacker News)
Stealth Falcon preying over Middle Eastern skies with Deadglyph (We Live Security) t
Deadglyph: Covertly preying over Middle Eastern skies (LABScon) 
New stealthy and modular Deadglyph malware used in govt attacks (BleepingComputer) 
Deadglyph: New Advanced Backdoor with Distinctive Malware Tactics (The Hacker News) 
0-days exploited by commercial surveillance vendor in Egypt (Google).
PREDATOR IN THE WIRES: Ahmed Eltantawy Targeted with Predator Spyware After Announcing Presidential Ambitions (The Citizen Lab) 
New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware (The Hacker News) 
Egyptian presidential hopeful targeted by Predator spyware (Washington Post)
Russian news outlet in Latvia believes European state behind phone hack (the Guardian) 
Exclusive: Russian hackers seek war crimes evidence, Ukraine cyber chief says (Reuters).
Russian hackers trying to steal evidence of Moscow’s war crimes in Ukraine - cyber chief (Ukrinform).
Large-scale cyberattack reported in occupied Crimea (The Kyiv Independent) 
NFL, CISA Look to Intercept Cyber Threats to Super Bowl LVIII (Dark Reading) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 25 Sep 2023 20:15:00 -0000</pubDate>
      <itunes:title>Cyberespionage in East and Southeast Asia, for both intelligence collection and domestic security, Spyware tools tracked. Shifting cyber targets in Russia’s hybrid war. Securing the Super Bowl. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1913</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Gelsemium APT is active against a Southeast Asian government. A multi-year campaign against Tibetan, Uighur, and Taiwanese targets. Stealth Falcon's new backdoor. Predator spyware is deployed against Apple zero-days. An update on Pegasus spyware found in Meduza devices. There’s a shift in Russian cyberespionage targeting. A rumor of cyberwar in occupied Crimea. In our Industry Voices segment, Amit Sinha, CEO of Digicert, describes digital trust for the software supply chain. Our guest is Arctic Wolf’s Ian McShane with insights on the MGM and Caesars ransomware incident. And if you’re looking for a Super Bowl pick, go with an egg-laying animal…and, oh, the NFL and CISA are noodling cyber defense for the big game.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/183

Selected reading.
Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government (Unit 42)
Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government (IBM X-Force Exchange)
Evasive Gelsemium hackers spotted in attack against Asian govt (BleepingComputer)
Unit 42 Researchers Discover Multiple Espionage Operations Targeting Southeast Asian Government (Unit 42)
EvilBamboo Targets Mobile Devices in Multi-year Campaign (Volexity) 
From Watering Hole to Spyware: EvilBamboo Targets Tibetans, Uyghurs, and Taiwanese (The Hacker News)
Stealth Falcon preying over Middle Eastern skies with Deadglyph (We Live Security) t
Deadglyph: Covertly preying over Middle Eastern skies (LABScon) 
New stealthy and modular Deadglyph malware used in govt attacks (BleepingComputer) 
Deadglyph: New Advanced Backdoor with Distinctive Malware Tactics (The Hacker News) 
0-days exploited by commercial surveillance vendor in Egypt (Google).
PREDATOR IN THE WIRES: Ahmed Eltantawy Targeted with Predator Spyware After Announcing Presidential Ambitions (The Citizen Lab) 
New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware (The Hacker News) 
Egyptian presidential hopeful targeted by Predator spyware (Washington Post)
Russian news outlet in Latvia believes European state behind phone hack (the Guardian) 
Exclusive: Russian hackers seek war crimes evidence, Ukraine cyber chief says (Reuters).
Russian hackers trying to steal evidence of Moscow’s war crimes in Ukraine - cyber chief (Ukrinform).
Large-scale cyberattack reported in occupied Crimea (The Kyiv Independent) 
NFL, CISA Look to Intercept Cyber Threats to Super Bowl LVIII (Dark Reading) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Gelsemium APT is active against a Southeast Asian government. A multi-year campaign against Tibetan, Uighur, and Taiwanese targets. Stealth Falcon's new backdoor. Predator spyware is deployed against Apple zero-days. An update on Pegasus spyware found in Meduza devices. There’s a shift in Russian cyberespionage targeting. A rumor of cyberwar in occupied Crimea. In our Industry Voices segment, Amit Sinha, CEO of Digicert, describes digital trust for the software supply chain. Our guest is Arctic Wolf’s Ian McShane with insights on the MGM and Caesars ransomware incident. And if you’re looking for a Super Bowl pick, go with an egg-laying animal…and, oh, the NFL and CISA are noodling cyber defense for the big game.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/183</p><p><br></p><h2>Selected reading.</h2><p><a href="https://unit42.paloaltonetworks.com/rare-possible-gelsemium-attack-targets-se-asia/">Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government</a> (Unit 42)</p><p><a href="https://exchange.xforce.ibmcloud.com/osint/guid:e6db434642f691b3c755ecc12a0e39e6">Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government</a> (IBM X-Force Exchange)</p><p><a href="https://www.bleepingcomputer.com/news/security/evasive-gelsemium-hackers-spotted-in-attack-against-asian-govt/">Evasive Gelsemium hackers spotted in attack against Asian govt</a> (BleepingComputer)</p><p><a href="https://unit42.paloaltonetworks.com/analysis-of-three-attack-clusters-in-se-asia/">Unit 42 Researchers Discover Multiple Espionage Operations Targeting Southeast Asian Government</a> (Unit 42)</p><p><a href="https://www.volexity.com/blog/2023/09/22/evilbamboo-targets-mobile-devices-in-multi-year-campaign/">EvilBamboo Targets Mobile Devices in Multi-year Campaign</a> (Volexity) </p><p><a href="https://thehackernews.com/2023/09/from-watering-hole-to-spyware.html">From Watering Hole to Spyware: EvilBamboo Targets Tibetans, Uyghurs, and Taiwanese</a> (The Hacker News)</p><p><a href="https://www.welivesecurity.com/en/eset-research/stealth-falcon-preying-middle-eastern-skies-deadglyph/">Stealth Falcon preying over Middle Eastern skies with Deadglyph</a> (We Live Security) t</p><p><a href="https://www.labscon.io/speakers/filip-jurcacko/">Deadglyph: Covertly preying over Middle Eastern skies</a> (LABScon) </p><p><a href="https://www.bleepingcomputer.com/news/security/new-stealthy-and-modular-deadglyph-malware-used-in-govt-attacks/">New stealthy and modular Deadglyph malware used in govt attacks</a> (BleepingComputer) </p><p><a href="https://thehackernews.com/2023/09/deadglyph-new-advanced-backdoor-with.html">Deadglyph: New Advanced Backdoor with Distinctive Malware Tactics</a> (The Hacker News) </p><p><a href="https://blog.google/threat-analysis-group/0-days-exploited-by-commercial-surveillance-vendor-in-egypt/">0-days exploited by commercial surveillance vendor in Egypt</a> (Google).</p><p><a href="https://citizenlab.ca/2023/09/predator-in-the-wires-ahmed-eltantawy-targeted-with-predator-spyware-after-announcing-presidential-ambitions/">PREDATOR IN THE WIRES: Ahmed Eltantawy Targeted with Predator Spyware After Announcing Presidential Ambitions</a> (The Citizen Lab) </p><p><a href="https://thehackernews.com/2023/09/latest-apple-zero-days-used-to-hack.html">New Apple Zero-Days Exploited to Target Egyptian ex-MP with Predator Spyware</a> (The Hacker News) </p><p><a href="https://www.washingtonpost.com/investigations/2023/09/23/predator-egypt-hack-spyware-iphone/">Egyptian presidential hopeful targeted by Predator spyware</a> (Washington Post)</p><p><a href="https://www.theguardian.com/world/2023/sep/25/latvia-russia-meduza-phone-hack-galina-timchenko">Russian news outlet in Latvia believes European state behind phone hack</a> (the Guardian) </p><p><a href="https://www.reuters.com/world/europe/russian-hackers-seek-war-crimes-evidence-ukraine-cyber-chief-says-2023-09-22/">Exclusive: Russian hackers seek war crimes evidence, Ukraine cyber chief says</a> (Reuters).</p><p><a href="https://www.ukrinform.net/rubric-society/3764960-russian-hackers-trying-to-steal-evidence-of-moscows-war-crimes-in-ukraine-cyber-chief.html#google_vignette">Russian hackers trying to steal evidence of Moscow’s war crimes in Ukraine - cyber chief</a> (Ukrinform).</p><p><a href="https://kyivindependent.com/large-scale-cyber-attack-reported-in-occupied-crimea/">Large-scale cyberattack reported in occupied Crimea</a> (The Kyiv Independent) </p><p><a href="https://www.darkreading.com/ics-ot/nfl-cisa-intercept-cyber-threats-super-bowl-lviii">NFL, CISA Look to Intercept Cyber Threats to Super Bowl LVIII</a> (Dark Reading) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1850</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[12f1e002-2b53-11ee-9c79-db4bc77e10a6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8059194853.mp3?updated=1695672621" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Threat intelligence discussion with Chris Krebs. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/54/notes</link>
      <description>In this extended interview, Simone Petrella sits down with Chris Krebs of the Krebs Stamos Group at the mWise 2023 Cybersecurity Conference to discuss threat intelligence .
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 25 Sep 2023 05:00:00 -0000</pubDate>
      <itunes:title>Threat intelligence discussion with Chris Krebs. [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>54</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this extended interview, Simone Petrella sits down with Chris Krebs of the Krebs Stamos Group at the mWise 2023 Cybersecurity Conference to discuss threat intelligence .
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this extended interview, Simone Petrella sits down with Chris Krebs of the Krebs Stamos Group at the mWise 2023 Cybersecurity Conference to discuss threat intelligence .</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>946</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9403152a-5980-11ee-acca-370b183bd83b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4577177030.mp3?updated=1695411939" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Merritt Baer: No one has to go down for you to go up. [CISO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/168/notes</link>
      <description>This week our guest is Merritt Baer, a Field CISO from Lacework, and a cloud security unicorn, sits down to share her incredible story working through the ranks to get to where she is today. Before working at Lacework Merritt served in the Office of the CISO at Amazon Web Services, as part of a small elite team that formed a Deputy CISO. She provided technical cloud security guidance to AWS’ largest customers, like the Fortune 100, on security as a bottom line proposition. She also has experience in all three branches of government and the private sector and served as Lead Cyber Advisor to the Federal Communications Commission. Merritt shares some amazing advice for up and comers into the field, saying "my personal philosophy is that no one has to go down for you to go up. I'm always encouraging my colleagues, um, and other executives to be thinking about how we can, you know, steal, sharpen, steal, how we can be good for each other, how we can collaborate, how we can, um, create more strengths in one another." We thank Merritt for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 24 Sep 2023 07:00:00 -0000</pubDate>
      <itunes:title>Merritt Baer: No one has to go down for you to go up. [CISO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>168</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week our guest is Merritt Baer, a Field CISO from Lacework, and a cloud security unicorn, sits down to share her incredible story working through the ranks to get to where she is today. Before working at Lacework Merritt served in the Office of the CISO at Amazon Web Services, as part of a small elite team that formed a Deputy CISO. She provided technical cloud security guidance to AWS’ largest customers, like the Fortune 100, on security as a bottom line proposition. She also has experience in all three branches of government and the private sector and served as Lead Cyber Advisor to the Federal Communications Commission. Merritt shares some amazing advice for up and comers into the field, saying "my personal philosophy is that no one has to go down for you to go up. I'm always encouraging my colleagues, um, and other executives to be thinking about how we can, you know, steal, sharpen, steal, how we can be good for each other, how we can collaborate, how we can, um, create more strengths in one another." We thank Merritt for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week our guest is Merritt Baer, a Field CISO from Lacework, and a cloud security unicorn, sits down to share her incredible story working through the ranks to get to where she is today. Before working at Lacework Merritt served in the Office of the CISO at Amazon Web Services, as part of a small elite team that formed a Deputy CISO. She provided technical cloud security guidance to AWS’ largest customers, like the Fortune 100, on security as a bottom line proposition. She also has experience in all three branches of government and the private sector and served as Lead Cyber Advisor to the Federal Communications Commission. Merritt shares some amazing advice for up and comers into the field, saying "my personal philosophy is that no one has to go down for you to go up. I'm always encouraging my colleagues, um, and other executives to be thinking about how we can, you know, steal, sharpen, steal, how we can be good for each other, how we can collaborate, how we can, um, create more strengths in one another." We thank Merritt for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>442</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[071c7e56-5973-11ee-a121-3f6db0663047]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3275153516.mp3?updated=1695404682" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Behind the Google shopping ad masks. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/300/notes</link>
      <description>Maxim Zavodchik from Akamai joins Dave to discuss their research on "Xurum: New Magento Campaign Discovered." Akamai researchers have discovered an ongoing server-side template injection campaign that is exploiting digital commerce websites. This campaign targets Magento 2 shops, and was dubbed Xurum in reference to the domain name of the attacker’s command and control (C2) server. 
The research states "The attacker uses an advanced web shell named “wso-ng” that is activated only when the attacker sends the cookie “magemojo000” to the backdoor “GoogleShoppingAds” component."
The research can be found here:
Xurum: New Magento Campaign Discovered

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Sep 2023 07:00:00 -0000</pubDate>
      <itunes:title>Behind the Google shopping ad masks. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>300</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Maxim Zavodchik from Akamai joins Dave to discuss their research on "Xurum: New Magento Campaign Discovered." Akamai researchers have discovered an ongoing server-side template injection campaign that is exploiting digital commerce websites. This campaign targets Magento 2 shops, and was dubbed Xurum in reference to the domain name of the attacker’s command and control (C2) server. 
The research states "The attacker uses an advanced web shell named “wso-ng” that is activated only when the attacker sends the cookie “magemojo000” to the backdoor “GoogleShoppingAds” component."
The research can be found here:
Xurum: New Magento Campaign Discovered

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Maxim Zavodchik from Akamai joins Dave to discuss their research on "Xurum: New Magento Campaign Discovered." Akamai researchers have discovered an ongoing server-side template injection campaign that is exploiting digital commerce websites. This campaign targets Magento 2 shops, and was dubbed Xurum in reference to the domain name of the attacker’s command and control (C2) server. </p><p>The research states "The attacker uses an advanced web shell named “wso-ng” that is activated only when the attacker sends the cookie “magemojo000” to the backdoor “GoogleShoppingAds” component."</p><p>The research can be found here:</p><ul><li><a href="https://www.akamai.com/blog/security-research/new-sophisticated-magento-campaign-xurum-webshell">Xurum: New Magento Campaign Discovered</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>872</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3251df9a-595e-11ee-955f-cf805299d74a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2125615808.mp3?updated=1695320383" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Enter Sandman. A look at an initial access broker. Iran’s OilRig hits Israeli targets. Cyber ops and soft power. Update on casino ransomware attacks. Bermuda’s government sustains cyberattacks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1912/notes</link>
      <description>A new APT is found: enter Sandman. Tracking an initial access broker called Gold Melody. Iran’s OilRig group is active against Israeli targets. Cyber ops as an instrument of soft power. Recovery and investigation in the casino ransomware attacks. In our Solutions Spotlight, Simone Petrella speaks with MK Palmore from Google Cloud about talent retention and the cybersecurity skills gap. Our guest is Kristen Marquardt of Hakluyt with advice for cyber startups. And Bermuda points to Russian threat actors.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/182

Selected reading.
Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit (SentinelOne)
GOLD MELODY: Profile of an Initial Access Broker (Secureworks)
OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes (We Live Security)
Cyber Soft Power | China's Continental Takeover (SentinelOne)
MGM Resorts computers back up after 10 days as analysts eye effects of casino cyberattacks (AP News)
MGM Restores Casino Operations 10 Days After Cyberattack (Dark Reading)
MGM Resorts computers back up after being down 10 days due to casino cyberattacks (CBS News)
MGM says its recovered from cyberattack, employees tell different story (Cybernews)
'Power, influence, notoriety': The Gen-Z hackers who struck MGM, Caesars (Reuters)
Apple emergency updates fix 3 new zero-days exploited in attacks (BleepingComputer) 
Russia linked to cyberattack on government services (Royal Gazette)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 22 Sep 2023 20:20:00 -0000</pubDate>
      <itunes:title>Enter Sandman. A look at an initial access broker. Iran’s OilRig hits Israeli targets. Cyber ops and soft power. Update on casino ransomware attacks. Bermuda’s government sustains cyberattacks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1912</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A new APT is found: enter Sandman. Tracking an initial access broker called Gold Melody. Iran’s OilRig group is active against Israeli targets. Cyber ops as an instrument of soft power. Recovery and investigation in the casino ransomware attacks. In our Solutions Spotlight, Simone Petrella speaks with MK Palmore from Google Cloud about talent retention and the cybersecurity skills gap. Our guest is Kristen Marquardt of Hakluyt with advice for cyber startups. And Bermuda points to Russian threat actors.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/182

Selected reading.
Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit (SentinelOne)
GOLD MELODY: Profile of an Initial Access Broker (Secureworks)
OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes (We Live Security)
Cyber Soft Power | China's Continental Takeover (SentinelOne)
MGM Resorts computers back up after 10 days as analysts eye effects of casino cyberattacks (AP News)
MGM Restores Casino Operations 10 Days After Cyberattack (Dark Reading)
MGM Resorts computers back up after being down 10 days due to casino cyberattacks (CBS News)
MGM says its recovered from cyberattack, employees tell different story (Cybernews)
'Power, influence, notoriety': The Gen-Z hackers who struck MGM, Caesars (Reuters)
Apple emergency updates fix 3 new zero-days exploited in attacks (BleepingComputer) 
Russia linked to cyberattack on government services (Royal Gazette)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A new APT is found: enter Sandman. Tracking an initial access broker called Gold Melody. Iran’s OilRig group is active against Israeli targets. Cyber ops as an instrument of soft power. Recovery and investigation in the casino ransomware attacks. In our Solutions Spotlight, Simone Petrella speaks with MK Palmore from Google Cloud about talent retention and the cybersecurity skills gap. Our guest is Kristen Marquardt of Hakluyt with advice for cyber startups. And Bermuda points to Russian threat actors.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/182</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.sentinelone.com/labs/sandman-apt-a-mystery-group-targeting-telcos-with-a-luajit-toolkit/">Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit</a> (SentinelOne)</p><p><a href="https://www.secureworks.com/research/gold-melody-profile-of-an-initial-access-broker?&amp;web_view=true">GOLD MELODY: Profile of an Initial Access Broker</a> (Secureworks)</p><p><a href="https://www.welivesecurity.com/en/eset-research/oilrigs-outer-space-juicy-mix-same-ol-rig-new-drill-pipes/">OilRig’s Outer Space and Juicy Mix: Same ol’ rig, new drill pipes</a> (We Live Security)</p><p><a href="https://www.sentinelone.com/labs/cyber-soft-power-chinas-continental-takeover/">Cyber Soft Power | China's Continental Takeover</a> (SentinelOne)</p><p><a href="https://apnews.com/article/vegas-mgm-resorts-caesars-cyberattack-shutdown-a01b9a2606e58e702b8e872e979040cc">MGM Resorts computers back up after 10 days as analysts eye effects of casino cyberattacks</a> (AP News)</p><p><a href="https://www.darkreading.com/endpoint/mgm-restores-casino-operations-10-days-after-cyberattack">MGM Restores Casino Operations 10 Days After Cyberattack</a> (Dark Reading)</p><p><a href="https://www.cbsnews.com/philadelphia/news/mgm-resorts-cyber-attack-vegas-borgata-atlantic-city-nj/">MGM Resorts computers back up after being down 10 days due to casino cyberattacks</a> (CBS News)</p><p><a href="https://cybernews.com/news/mgm-touts-cyber-attack-recovery-on-track-employees-tell-different-story/">MGM says its recovered from cyberattack, employees tell different story</a> (Cybernews)</p><p><a href="https://www.reuters.com/technology/power-influence-notoriety-gen-z-hackers-who-struck-mgm-caesars-2023-09-22/">'Power, influence, notoriety': The Gen-Z hackers who struck MGM, Caesars</a> (Reuters)</p><p><a href="https://www.bleepingcomputer.com/news/apple/apple-emergency-updates-fix-3-new-zero-days-exploited-in-attacks/">Apple emergency updates fix 3 new zero-days exploited in attacks</a> (BleepingComputer) </p><p><a href="https://www.royalgazette.com/general/news/article/20230921/government-communications-down/">Russia linked to cyberattack on government services</a> (Royal Gazette)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1936</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[12dddb84-2b53-11ee-9c79-ffe61392e880]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1407328781.mp3?updated=1696369827" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Don’t get snatched. Trends in phishing, cyber insurance claims, and threats to academic institutions. Hacktivism in the hybrid war. Updates on the ICC attack. MGM says its casinos are back. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1911/notes</link>
      <description>CISA and the FBI warn of Snatch ransomware. A look at phishing trends. Ransomware is increasingly cited in cyber insurance claims. Trends in cyber threats to academic institutions. A Russian hacktivist auxiliary disrupts Canadian border control and airport sites. The ICC remains tight-lipped concerning cyberattack. N2K’s Simone Petrella sits down with Chris Krebs at the mWise conference. In today’s Threat Vector segment, David Moulton from Unit 42 takes a peek into the modern threat landscape with Wendi Whitmore, SVP of Unit 42. And MGM Resorts says it’s well on the way to recovery.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/181

Threat Vector links.
To learn what is top of mind each month from the experts at Unit 42 sign up for their Threat Intel Bulletin. 

Selected reading.
#StopRansomware: Snatch Ransomware (Cybersecurity and Infrastructure Security Agency CISA)
2023 .Phishing Trends (ZeroFox)
Cyber Insurance Claims Frequency and Severity Both Increased For Businesses in 1H 2023, Coalition Report Finds (Business Wire) 
2023 Cyber Claims Report: Mid-year Update (Coalition) 
Since 2018, ransomware attacks on the education sector have cost the world economy over $53 billion in downtime alone (Comparitech)
Canada blames border checkpoint outages on cyberattack (Record)
Cyberattack hits International Criminal Court (SC Media)
International Criminal Court hacked amid Russia probe (Register)
International Criminal Court under siege in cyberattack that could constitute world’s first cyber war crime (Yahoo News)
Our hotels and casinos are operating normally. (FAQ - MGM Resorts)
MGM Resorts computers back up after 10 days as analysts eye effects of casino cyberattacks (AP News - 09-20-2023)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 21 Sep 2023 20:15:00 -0000</pubDate>
      <itunes:title>Don’t get snatched. Trends in phishing, cyber insurance claims, and threats to academic institutions. Hacktivism in the hybrid war. Updates on the ICC attack. MGM says its casinos are back. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1911</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA and the FBI warn of Snatch ransomware. A look at phishing trends. Ransomware is increasingly cited in cyber insurance claims. Trends in cyber threats to academic institutions. A Russian hacktivist auxiliary disrupts Canadian border control and airport sites. The ICC remains tight-lipped concerning cyberattack. N2K’s Simone Petrella sits down with Chris Krebs at the mWise conference. In today’s Threat Vector segment, David Moulton from Unit 42 takes a peek into the modern threat landscape with Wendi Whitmore, SVP of Unit 42. And MGM Resorts says it’s well on the way to recovery.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/181

Threat Vector links.
To learn what is top of mind each month from the experts at Unit 42 sign up for their Threat Intel Bulletin. 

Selected reading.
#StopRansomware: Snatch Ransomware (Cybersecurity and Infrastructure Security Agency CISA)
2023 .Phishing Trends (ZeroFox)
Cyber Insurance Claims Frequency and Severity Both Increased For Businesses in 1H 2023, Coalition Report Finds (Business Wire) 
2023 Cyber Claims Report: Mid-year Update (Coalition) 
Since 2018, ransomware attacks on the education sector have cost the world economy over $53 billion in downtime alone (Comparitech)
Canada blames border checkpoint outages on cyberattack (Record)
Cyberattack hits International Criminal Court (SC Media)
International Criminal Court hacked amid Russia probe (Register)
International Criminal Court under siege in cyberattack that could constitute world’s first cyber war crime (Yahoo News)
Our hotels and casinos are operating normally. (FAQ - MGM Resorts)
MGM Resorts computers back up after 10 days as analysts eye effects of casino cyberattacks (AP News - 09-20-2023)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA and the FBI warn of Snatch ransomware. A look at phishing trends. Ransomware is increasingly cited in cyber insurance claims. Trends in cyber threats to academic institutions. A Russian hacktivist auxiliary disrupts Canadian border control and airport sites. The ICC remains tight-lipped concerning cyberattack. N2K’s Simone Petrella sits down with Chris Krebs at the mWise conference. In today’s Threat Vector segment, David Moulton from Unit 42 takes a peek into the modern threat landscape with Wendi Whitmore, SVP of Unit 42. And MGM Resorts says it’s well on the way to recovery.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/181</p><p><br></p><h2>Threat Vector links.</h2><p>To learn what is top of mind each month from the experts at Unit 42 sign up for their <a href="https://start.paloaltonetworks.com/unit42-threat-intel-bulletin.html">Threat Intel Bulletin</a>. </p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-263a">#StopRansomware: Snatch Ransomware</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://get.zerofox.com/rs/143-DHV-007/images/ZeroFox-Intelligence-Assessment-2023-Phishing-Trends-Report.pdf">2023 .Phishing Trends</a> (ZeroFox)</p><p><a href="https://www.businesswire.com/news/home/20230920444160/en/Cyber-Insurance-Claims-Frequency-and-Severity-Both-Increased-For-Businesses-in-1H-2023-Coalition-Report-Finds">Cyber Insurance Claims Frequency and Severity Both Increased For Businesses in 1H 2023, Coalition Report Finds</a> (Business Wire) </p><p><a href="https://info.coalitioninc.com/download-2023-cyber-claims-report-mid-year-update.html">2023 Cyber Claims Report: Mid-year Update</a> (Coalition) </p><p><a href="https://www.comparitech.com/blog/vpn-privacy/school-ransomware-attacks-worldwide/">Since 2018, ransomware attacks on the education sector have cost the world economy over $53 billion in downtime alone</a> (Comparitech)</p><p><a href="https://therecord.media/canada-border-checkpoint-outages-ddos-attack-russia">Canada blames border checkpoint outages on cyberattack</a> (Record)</p><p><a href="https://www.scmagazine.com/brief/cyberattack-hits-international-criminal-court">Cyberattack hits International Criminal Court</a> (SC Media)</p><p><a href="https://www.theregister.com/2023/09/20/icc_hack/">International Criminal Court hacked amid Russia probe</a> (Register)</p><p><a href="https://news.yahoo.com/international-criminal-court-under-siege-162100087.html">International Criminal Court under siege in cyberattack that could constitute world’s first cyber war crime</a> (Yahoo News)</p><p><a href="https://www.mgmresorts.com/en/maintenance/faq.html">Our hotels and casinos are operating normally.</a> (FAQ - MGM Resorts)</p><p><a href="https://apnews.com/article/vegas-mgm-resorts-caesars-cyberattack-shutdown-a01b9a2606e58e702b8e872e979040cc">MGM Resorts computers back up after 10 days as analysts eye effects of casino cyberattacks</a> (AP News - 09-20-2023)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1832</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[12c9fce0-2b53-11ee-9c79-0ff34c9583a2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9829931570.mp3?updated=1695831504" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacking the ICC. ShroudedSnooper active, simple, and novel. New criminal malware used against Chinese-speakers. More on the materiality of cyberattacks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1910/notes</link>
      <description>The International Criminal Court reports a "cybersecurity incident." ShroudedSnooper intrusion activity is both novel and simple. Criminal malware targets Chinese-speaking victims. The costs of insider risk. More on the casino attacks (and related social engineering capers). In our Learning Layer segment, Sam Meisenberg drops into a CISSP tutoring session and offers some test-taking tips. Our guest is Aaron Brazelton, Dean of Admissions and Advancement at the Alabama School of Cyber Technology and Engineering. And the Clorox incident shows how one company navigates unfamiliar new SEC rules.
Join Sam Meisenberg as he drops into a CISSP tutoring session talking about the difference between due diligence and due care along with some test-taking tips.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/180

Learning Layer.
Learning about the CISSP certification from (ISC)²

Selected reading.
War crimes tribunal ICC says it has been hacked (Reuters)
International Criminal Court says cybersecurity incident affected its information systems last week (AP News) 
Hackers breached International Criminal Court’s systems last week (BleepingComputer)
New ShroudedSnooper actor targets telecommunications firms in the Middle East with novel Implants (Cisco Talos)
ShroudedSnooper's HTTPSnoop Backdoor Targets Middle East Telecom Companies (The Hacker News)
Chinese Malware Appears in Earnest Across Cybercrime Threat Landscape (Proofpoint) 
Hackers who breached casino giants MGM, Caesars also hit 3 other firms, Okta says (Reuters)
Las Vegas casino ransomware attacks: Okta in the spotlight (The Stack) 
MGM losing up to $8.4M per day as cyberattack paralyzes slot machines, hotels for 8th straight day: analyst (New York Post) 
Caesars reports cyberattack but did not go offline (Top Class Actions) 
What Las Vegas tourists need to know about casino hacks (Washington Post) 
MGM, Caesars Face Regulatory, Legal Maze After Cyber Incidents (Dark Reading)
Clorox Cyberattack Brings Early Test of New SEC Cyber Rules (Wall Street Journal)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 20 Sep 2023 20:15:00 -0000</pubDate>
      <itunes:title>Hacking the ICC. ShroudedSnooper active, simple, and novel. New criminal malware used against Chinese-speakers. More on the materiality of cyberattacks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1910</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The International Criminal Court reports a "cybersecurity incident." ShroudedSnooper intrusion activity is both novel and simple. Criminal malware targets Chinese-speaking victims. The costs of insider risk. More on the casino attacks (and related social engineering capers). In our Learning Layer segment, Sam Meisenberg drops into a CISSP tutoring session and offers some test-taking tips. Our guest is Aaron Brazelton, Dean of Admissions and Advancement at the Alabama School of Cyber Technology and Engineering. And the Clorox incident shows how one company navigates unfamiliar new SEC rules.
Join Sam Meisenberg as he drops into a CISSP tutoring session talking about the difference between due diligence and due care along with some test-taking tips.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/180

Learning Layer.
Learning about the CISSP certification from (ISC)²

Selected reading.
War crimes tribunal ICC says it has been hacked (Reuters)
International Criminal Court says cybersecurity incident affected its information systems last week (AP News) 
Hackers breached International Criminal Court’s systems last week (BleepingComputer)
New ShroudedSnooper actor targets telecommunications firms in the Middle East with novel Implants (Cisco Talos)
ShroudedSnooper's HTTPSnoop Backdoor Targets Middle East Telecom Companies (The Hacker News)
Chinese Malware Appears in Earnest Across Cybercrime Threat Landscape (Proofpoint) 
Hackers who breached casino giants MGM, Caesars also hit 3 other firms, Okta says (Reuters)
Las Vegas casino ransomware attacks: Okta in the spotlight (The Stack) 
MGM losing up to $8.4M per day as cyberattack paralyzes slot machines, hotels for 8th straight day: analyst (New York Post) 
Caesars reports cyberattack but did not go offline (Top Class Actions) 
What Las Vegas tourists need to know about casino hacks (Washington Post) 
MGM, Caesars Face Regulatory, Legal Maze After Cyber Incidents (Dark Reading)
Clorox Cyberattack Brings Early Test of New SEC Cyber Rules (Wall Street Journal)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The International Criminal Court reports a "cybersecurity incident." ShroudedSnooper intrusion activity is both novel and simple. Criminal malware targets Chinese-speaking victims. The costs of insider risk. More on the casino attacks (and related social engineering capers). In our Learning Layer segment, Sam Meisenberg drops into a CISSP tutoring session and offers some test-taking tips. Our guest is Aaron Brazelton, Dean of Admissions and Advancement at the Alabama School of Cyber Technology and Engineering. And the Clorox incident shows how one company navigates unfamiliar new SEC rules.</p><p>Join Sam Meisenberg as he drops into a CISSP tutoring session talking about the difference between due diligence and due care along with some test-taking tips.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/180</p><p><br></p><h2>Learning Layer.</h2><p><a href="https://www.cybervista.net/certify/cissp/">Learning about the CISSP certification from (ISC)²</a></p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.reuters.com/world/international-criminal-court-reports-cybersecurity-incident-2023-09-19/">War crimes tribunal ICC says it has been hacked</a> (Reuters)</p><p><a href="https://apnews.com/article/international-court-cybersecurity-fa1df5afa3f7844e9a76988bb6906f6e">International Criminal Court says cybersecurity incident affected its information systems last week</a> (AP News) </p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-breached-international-criminal-courts-systems-last-week/">Hackers breached International Criminal Court’s systems last week</a> (BleepingComputer)</p><p><a href="https://blog.talosintelligence.com/introducing-shrouded-snooper/">New ShroudedSnooper actor targets telecommunications firms in the Middle East with novel Implants</a> (Cisco Talos)</p><p><a href="https://thehackernews.com/2023/09/shroudedsnoopers-httpsnoop-backdoor.html">ShroudedSnooper's HTTPSnoop Backdoor Targets Middle East Telecom Companies</a> (The Hacker News)</p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/chinese-malware-appears-earnest-across-cybercrime-threat-landscape">Chinese Malware Appears in Earnest Across Cybercrime Threat Landscape</a> (Proofpoint) </p><p><a href="https://www.reuters.com/technology/hackers-who-breached-casino-giants-mgm-caesars-also-hit-3-other-firms-okta-says-2023-09-19/">Hackers who breached casino giants MGM, Caesars also hit 3 other firms, Okta says</a> (Reuters)</p><p><a href="https://www.thestack.technology/mgm-okta-ransomware/">Las Vegas casino ransomware attacks: Okta in the spotlight</a> (The Stack) </p><p><a href="https://nypost.com/2023/09/18/mgm-losing-up-to-8-4m-per-day-over-cybersecurity-issue/">MGM losing up to $8.4M per day as cyberattack paralyzes slot machines, hotels for 8th straight day: analyst</a> (New York Post) </p><p><a href="https://topclassactions.com/lawsuit-settlements/privacy/data-breach/caesars-reports-cyberattack-but-did-not-go-offline/">Caesars reports cyberattack but did not go offline</a> (Top Class Actions) </p><p><a href="https://www.washingtonpost.com/travel/2023/09/19/vegas-casino-hacks-slot-machines-hotel-keys/">What Las Vegas tourists need to know about casino hacks</a> (Washington Post) </p><p><a href="https://www.darkreading.com/attacks-breaches/mgm-caesars-regulatory-legal-maze-cyber-incidents">MGM, Caesars Face Regulatory, Legal Maze After Cyber Incidents</a> (Dark Reading)</p><p><a href="https://www.wsj.com/articles/clorox-cyberattack-brings-early-test-of-new-sec-cyber-rules-b320475">Clorox Cyberattack Brings Early Test of New SEC Cyber Rules</a> (Wall Street Journal)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1898</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[12b610ae-2b53-11ee-9c79-275dba11989e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9069889755.mp3?updated=1695236329" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware in Colombia. An accidental data exposure. Cyberespionage hits unpatched systems. An attack on IT systems disrupts industrial production. Bots and bad actors.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1909/notes</link>
      <description>Colombia continues its recovery from last week's cyberattacks. AI training data is accidentally published to GitHub. The cyberespionage techniques of Earth Lusca. Clorox blames product shortages on a cyber attack. Cybersecurity incidents in industrial environments. Where the wild bots are. Joe Carrigan looks at top level domain name exploitation. Our guest is Kristen Bell from GuidePoint Security with a look at vulnerability vs. exploitability. And there’s talk of potential Russia-DPRK cooperation in cyberspace.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/179

Selected reading.
More than 50 Colombian state, private entities hit by cyberattack -Petro (Reuters) 
Colombia Mulls Legal Action Against US Firm Targeted In Cyber Attack (Barron's)
Microsoft mitigated exposure of internal information in a storage account due to overly-permissive SAS token (Microsoft Security Response Center)
Microsoft AI Researchers Expose 38TB of Data, Including Keys, Passwords and Internal Messages (SecurityWeek)
Earth Lusca Employs New Linux Backdoor, Uses Cobalt Strike for Lateral Movement (Trend Micro) 
Chinese hackers have unleashed a never-before-seen Linux backdoor (Ars Technica)
The Clorox Company FORM 8-K (US Securities and Exchange Commission) 
Clorox Warns of Product Shortages Following Cyberattack (Wall Street Journal)
Clorox warns of product shortages, profit hit from August cyberattack (The Street) 
Can't find the right Clorox product? A recent cyberattack is causing some shortages (USA Today) 
Clorox warns of product shortages after cyberattack (Fox Business) 
As flu season looms, hackers force a shortage of Clorox products (Fortune)
New Research Finds Cyberattacks Against Critical Infrastructure on the Rise, State-affiliated Groups Responsible for Nearly 60% (Business Wire)
Death By a Billion Bots (Netacea)
Russian and North Korea artillery deal paves the way for dangerous cyberwar alliance (EconoTimes) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Sep 2023 20:30:00 -0000</pubDate>
      <itunes:title>Ransomware in Colombia. An accidental data exposure. Cyberespionage hits unpatched systems. An attack on IT systems disrupts industrial production. Bots and bad actors.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1909</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Colombia continues its recovery from last week's cyberattacks. AI training data is accidentally published to GitHub. The cyberespionage techniques of Earth Lusca. Clorox blames product shortages on a cyber attack. Cybersecurity incidents in industrial environments. Where the wild bots are. Joe Carrigan looks at top level domain name exploitation. Our guest is Kristen Bell from GuidePoint Security with a look at vulnerability vs. exploitability. And there’s talk of potential Russia-DPRK cooperation in cyberspace.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/179

Selected reading.
More than 50 Colombian state, private entities hit by cyberattack -Petro (Reuters) 
Colombia Mulls Legal Action Against US Firm Targeted In Cyber Attack (Barron's)
Microsoft mitigated exposure of internal information in a storage account due to overly-permissive SAS token (Microsoft Security Response Center)
Microsoft AI Researchers Expose 38TB of Data, Including Keys, Passwords and Internal Messages (SecurityWeek)
Earth Lusca Employs New Linux Backdoor, Uses Cobalt Strike for Lateral Movement (Trend Micro) 
Chinese hackers have unleashed a never-before-seen Linux backdoor (Ars Technica)
The Clorox Company FORM 8-K (US Securities and Exchange Commission) 
Clorox Warns of Product Shortages Following Cyberattack (Wall Street Journal)
Clorox warns of product shortages, profit hit from August cyberattack (The Street) 
Can't find the right Clorox product? A recent cyberattack is causing some shortages (USA Today) 
Clorox warns of product shortages after cyberattack (Fox Business) 
As flu season looms, hackers force a shortage of Clorox products (Fortune)
New Research Finds Cyberattacks Against Critical Infrastructure on the Rise, State-affiliated Groups Responsible for Nearly 60% (Business Wire)
Death By a Billion Bots (Netacea)
Russian and North Korea artillery deal paves the way for dangerous cyberwar alliance (EconoTimes) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Colombia continues its recovery from last week's cyberattacks. AI training data is accidentally published to GitHub. The cyberespionage techniques of Earth Lusca. Clorox blames product shortages on a cyber attack. Cybersecurity incidents in industrial environments. Where the wild bots are. Joe Carrigan looks at top level domain name exploitation. Our guest is Kristen Bell from GuidePoint Security with a look at vulnerability vs. exploitability. And there’s talk of potential Russia-DPRK cooperation in cyberspace.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/179</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.reuters.com/world/americas/more-than-50-colombian-state-private-entities-hit-by-cyberattack-petro-2023-09-18/">More than 50 Colombian state, private entities hit by cyberattack -Petro</a> (Reuters) </p><p><a href="https://www.barrons.com/news/colombia-mulls-legal-action-against-us-firm-targeted-in-cyber-attack-41dc3e4c?refsec=topics_afp-news">Colombia Mulls Legal Action Against US Firm Targeted In Cyber Attack</a> (Barron's)</p><p><a href="https://msrc.microsoft.com/blog/2023/09/microsoft-mitigated-exposure-of-internal-information-in-a-storage-account-due-to-overly-permissive-sas-token/">Microsoft mitigated exposure of internal information in a storage account due to overly-permissive SAS token</a> (Microsoft Security Response Center)</p><p><a href="https://www.securityweek.com/microsoft-ai-researchers-expose-38tb-of-data-including-keys-passwords-and-internal-messages/">Microsoft AI Researchers Expose 38TB of Data, Including Keys, Passwords and Internal Messages</a> (SecurityWeek)</p><p><a href="https://www.trendmicro.com/en_us/research/23/i/earth-lusca-employs-new-linux-backdoor.html">Earth Lusca Employs New Linux Backdoor, Uses Cobalt Strike for Lateral Movement</a> (Trend Micro) </p><p><a href="https://arstechnica.com/security/2023/09/never-before-seen-linux-backdoor-is-a-windows-malware-knockoff/">Chinese hackers have unleashed a never-before-seen Linux backdoor</a> (Ars Technica)</p><p><a href="https://www.sec.gov/ix?doc=/Archives/edgar/data/0000021076/000120677423001133/clx4242401-8k.htm">The Clorox Company FORM 8-K</a> (US Securities and Exchange Commission) </p><p><a href="https://www.wsj.com/business/clorox-says-cyberattack-is-hurting-product-availability-will-weigh-on-quarter-5d146760">Clorox Warns of Product Shortages Following Cyberattack</a> (Wall Street Journal)</p><p><a href="https://www.thestreet.com/investing/stocks/clorox-warns-of-product-shortages-profit-hit-from-august-cyberattack-">Clorox warns of product shortages, profit hit from August cyberattack</a> (The Street) </p><p><a href="https://www.usatoday.com/story/money/retail/2023/09/18/clorox-shortage-cyber-attack-2023/70892434007/">Can't find the right Clorox product? A recent cyberattack is causing some shortages</a> (USA Today) </p><p><a href="https://www.foxbusiness.com/lifestyle/clorox-warns-product-shortages-after-cyberattack">Clorox warns of product shortages after cyberattack</a> (Fox Business) </p><p><a href="https://fortune.com/2023/09/18/clorox-cyberattack-shortages-material-impact/">As flu season looms, hackers force a shortage of Clorox products</a> (Fortune)</p><p><a href="https://www.businesswire.com/news/home/20230919470756/en/New-Research-Finds-Cyberattacks-Against-Critical-Infrastructure-on-the-Rise-State-affiliated-Groups-Responsible-for-Nearly-60">New Research Finds Cyberattacks Against Critical Infrastructure on the Rise, State-affiliated Groups Responsible for Nearly 60%</a> (Business Wire)</p><p><a href="https://netacea.com/research-and-reports/death-by-a-billion-bots/">Death By a Billion Bots</a> (Netacea)</p><p><a href="https://www.econotimes.com/Russian-and-North-Korea-artillery-deal-paves-the-way-for-dangerous-cyberwar-alliance-1662798">Russian and North Korea artillery deal paves the way for dangerous cyberwar alliance</a> (EconoTimes) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1636</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[12a289bc-2b53-11ee-9c79-8fb897a8bd02]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5305369284.mp3?updated=1695152924" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A quick look at some threats from China and North Korea, some engaged in collection, some in theft. BlackCat and other ransomware operators. And a view of cyberwar from Ukraine’s SSU. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1908/notes</link>
      <description>Cyber threats trending from East Asia. The Lazarus Group is suspected in the CoinEx crypto theft. Pig butchering, enabled by cryptocurrency. BlackCat is active against Azure storage. a Ukrainian view of cyber warfare. A US-Canadian water commission deals with a ransomware attack. Eric Goldstein from CISA shares insights on cyber threats from China. Neil Serebryany of Calypso explains the policies, tools and safeguards in place to enable the safe use of generative AI. And more details emerge in the Las Vegas casinos’ ransomware incidents. Danny Ocean, call your office.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/178

Selected reading.
Sophistication, scope, and scale: Digital threats from East Asia increase in breadth and effectiveness (Microsoft Security Compliance and Identity)
Evidence points to North Korea in CoinEx cryptocurrency hack, analysts say (Record) 
CoinEx invites hackers to negotiate after suffering data breach (The Times of India
BlackCat ransomware hits Azure Storage with Sphynx encryptor (BleepingComputer)
MGM websites up, but reservation systems still affected by hack (Las Vegas Review-Journal)
The chaotic and cinematic MGM casino hack, explained (Vox)
Massive MGM and Caesars Hacks Epitomize a Vicious Ransomware Cycle (WIRED)
US-Canada water commission confirms 'cybersecurity incident' (Register) 
Ukraine's Fusion of Cyber and Kinetic Warfare: Illia Vitiuk's Stand Against Russian Cyber Operations (AFCEA International)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 18 Sep 2023 20:15:00 -0000</pubDate>
      <itunes:title>A quick look at some threats from China and North Korea, some engaged in collection, some in theft. BlackCat and other ransomware operators. And a view of cyberwar from Ukraine’s SSU. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1908</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cyber threats trending from East Asia. The Lazarus Group is suspected in the CoinEx crypto theft. Pig butchering, enabled by cryptocurrency. BlackCat is active against Azure storage. a Ukrainian view of cyber warfare. A US-Canadian water commission deals with a ransomware attack. Eric Goldstein from CISA shares insights on cyber threats from China. Neil Serebryany of Calypso explains the policies, tools and safeguards in place to enable the safe use of generative AI. And more details emerge in the Las Vegas casinos’ ransomware incidents. Danny Ocean, call your office.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/178

Selected reading.
Sophistication, scope, and scale: Digital threats from East Asia increase in breadth and effectiveness (Microsoft Security Compliance and Identity)
Evidence points to North Korea in CoinEx cryptocurrency hack, analysts say (Record) 
CoinEx invites hackers to negotiate after suffering data breach (The Times of India
BlackCat ransomware hits Azure Storage with Sphynx encryptor (BleepingComputer)
MGM websites up, but reservation systems still affected by hack (Las Vegas Review-Journal)
The chaotic and cinematic MGM casino hack, explained (Vox)
Massive MGM and Caesars Hacks Epitomize a Vicious Ransomware Cycle (WIRED)
US-Canada water commission confirms 'cybersecurity incident' (Register) 
Ukraine's Fusion of Cyber and Kinetic Warfare: Illia Vitiuk's Stand Against Russian Cyber Operations (AFCEA International)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber threats trending from East Asia. The Lazarus Group is suspected in the CoinEx crypto theft. Pig butchering, enabled by cryptocurrency. BlackCat is active against Azure storage. a Ukrainian view of cyber warfare. A US-Canadian water commission deals with a ransomware attack. Eric Goldstein from CISA shares insights on cyber threats from China. Neil Serebryany of Calypso explains the policies, tools and safeguards in place to enable the safe use of generative AI. And more details emerge in the Las Vegas casinos’ ransomware incidents. Danny Ocean, call your office.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/178</p><p><br></p><h2>Selected reading.</h2><p><a href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RW1aFyW">Sophistication, scope, and scale: Digital threats from East Asia increase in breadth and effectiveness</a> (Microsoft Security Compliance and Identity)</p><p><a href="https://therecord.media/coinex-cryptocurrency-heist-north-korea">Evidence points to North Korea in CoinEx cryptocurrency hack, analysts say</a> (Record) </p><p><a href="https://timesofindia.indiatimes.com/business/international-business/coinex-invites-hackers-to-negotiate-after-suffering-data-breach/articleshow/103748858.cms?from=mdr">CoinEx invites hackers to negotiate after suffering data breach</a> (The Times of India</p><p><a href="https://www.bleepingcomputer.com/news/security/blackcat-ransomware-hits-azure-storage-with-sphynx-encryptor/">BlackCat ransomware hits Azure Storage with Sphynx encryptor</a> (BleepingComputer)</p><p><a href="https://www.reviewjournal.com/business/casinos-gaming/mgm-websites-up-but-reservation-systems-still-affected-by-hack-2905270/">MGM websites up, but reservation systems still affected by hack</a> (Las Vegas Review-Journal)</p><p><a href="https://www.vox.com/technology/2023/9/15/23875113/mgm-hack-casino-vishing-cybersecurity-ransomware">The chaotic and cinematic MGM casino hack, explained</a> (Vox)</p><p><a href="https://www.wired.com/story/mgm-ceasars-hack-ransomware/">Massive MGM and Caesars Hacks Epitomize a Vicious Ransomware Cycle</a> (WIRED)</p><p><a href="https://www.theregister.com/2023/09/15/ijc_noescape_ransomware/">US-Canada water commission confirms 'cybersecurity incident'</a> (Register) </p><p><a href="https://www.afcea.org/signal-media/test-signal-landing-page-format/ukraines-fusion-cyber-and-kinetic-warfare-illia">Ukraine's Fusion of Cyber and Kinetic Warfare: Illia Vitiuk's Stand Against Russian Cyber Operations</a> (AFCEA International)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1636</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[128fc444-2b53-11ee-9c79-bbc0b22e318d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2343318112.mp3?updated=1695063625" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Karl Mattson: Defer gratification. (CISO) [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/167/notes</link>
      <description>Karl Mattson, CISO at Noname Security, joins us to share his story. Having started out as a "military brat," traveling the world as the child of a Marine, Karl later joined the Army not long after high school. In the Army, Karl was assigned the career field of intelligence analyst and started working with the NSA. He says that was a real career break. Following the Army, Karl worked in the financial services world as a CISO. At Noname, Karl began by building out internal risk and IT functions into a strong, what he calls spectacular team. Karl recommends "deferring gratification as long as possible" when building your career. He says, "People early in their career, looking at government service, those positions don't, you know, make anybody rich overnight, but they are amazing career cornerstones to build on." He closes sharing the importance of relationships. We thank Karl for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 17 Sep 2023 05:00:00 -0000</pubDate>
      <itunes:title>Karl Mattson: Defer gratification. (CISO) [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>167</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Karl Mattson, CISO at Noname Security, joins us to share his story. Having started out as a "military brat," traveling the world as the child of a Marine, Karl later joined the Army not long after high school. In the Army, Karl was assigned the career field of intelligence analyst and started working with the NSA. He says that was a real career break. Following the Army, Karl worked in the financial services world as a CISO. At Noname, Karl began by building out internal risk and IT functions into a strong, what he calls spectacular team. Karl recommends "deferring gratification as long as possible" when building your career. He says, "People early in their career, looking at government service, those positions don't, you know, make anybody rich overnight, but they are amazing career cornerstones to build on." He closes sharing the importance of relationships. We thank Karl for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Karl Mattson, CISO at Noname Security, joins us to share his story. Having started out as a "military brat," traveling the world as the child of a Marine, Karl later joined the Army not long after high school. In the Army, Karl was assigned the career field of intelligence analyst and started working with the NSA. He says that was a real career break. Following the Army, Karl worked in the financial services world as a CISO. At Noname, Karl began by building out internal risk and IT functions into a strong, what he calls spectacular team. Karl recommends "deferring gratification as long as possible" when building your career. He says, "People early in their career, looking at government service, those positions don't, you know, make anybody rich overnight, but they are amazing career cornerstones to build on." He closes sharing the importance of relationships. We thank Karl for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>478</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[306813ac-53eb-11ee-bb83-dff8ceb41936]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3427315557.mp3?updated=1695228062" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A look into the emotions and anxieties of the highest levels of decision-making. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/299/notes</link>
      <description>Guest Manuel Hepfer from ISTARI shares his research on cyber resilience which includes discussions with 37 CEOs to gain insight into how they manage cybersecurity risk. ISTARI and Oxford University's Saïd Business School dive into the minds and experiences of CEOs on how they manage cybersecurity risk.
Ask any CEO to name the issues that keep them awake at night and cybersecurity risk is likely near the top of the list – with good reason. With the accelerating digitalisation of business models comes vulnerability to cyberattack. And while spending on cybersecurity increases every year, so does the number of serious incidents. Even the largest and most technologically advanced companies are not immune.
CEOs must formally answer to regulators, shareholders and board members for their organisation’s cybersecurity. Yet the majority (72%) of CEOs we interviewed as part of our research said they were not comfortable making cybersecurity-related decisions.
The research and associated article can be found here:

Research: The CEO Report on Cyber Resilience


Article: Make Cybersecurity a Strategic Asset



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Sep 2023 05:00:00 -0000</pubDate>
      <itunes:title>A look into the emotions and anxieties of the highest levels of decision-making. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>299</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Manuel Hepfer from ISTARI shares his research on cyber resilience which includes discussions with 37 CEOs to gain insight into how they manage cybersecurity risk. ISTARI and Oxford University's Saïd Business School dive into the minds and experiences of CEOs on how they manage cybersecurity risk.
Ask any CEO to name the issues that keep them awake at night and cybersecurity risk is likely near the top of the list – with good reason. With the accelerating digitalisation of business models comes vulnerability to cyberattack. And while spending on cybersecurity increases every year, so does the number of serious incidents. Even the largest and most technologically advanced companies are not immune.
CEOs must formally answer to regulators, shareholders and board members for their organisation’s cybersecurity. Yet the majority (72%) of CEOs we interviewed as part of our research said they were not comfortable making cybersecurity-related decisions.
The research and associated article can be found here:

Research: The CEO Report on Cyber Resilience


Article: Make Cybersecurity a Strategic Asset



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Manuel Hepfer from ISTARI shares his research on cyber resilience which includes discussions with 37 CEOs to gain insight into how they manage cybersecurity risk. ISTARI and Oxford University's Saïd Business School dive into the minds and experiences of CEOs on how they manage cybersecurity risk.</p><p>Ask any CEO to name the issues that keep them awake at night and cybersecurity risk is likely near the top of the list – with good reason. With the accelerating digitalisation of business models comes vulnerability to cyberattack. And while spending on cybersecurity increases every year, so does the number of serious incidents. Even the largest and most technologically advanced companies are not immune.</p><p>CEOs must formally answer to regulators, shareholders and board members for their organisation’s cybersecurity. Yet the majority (72%) of CEOs we interviewed as part of our research said they were not comfortable making cybersecurity-related decisions.</p><p>The research and associated article can be found here:</p><ul>
<li>Research: <a href="https://istari-global.com/insights/articles/ceo-report/">The CEO Report on Cyber Resilience</a>
</li>
<li>Article: <a href="https://sloanreview.mit.edu/article/make-cybersecurity-a-strategic-asset/">Make Cybersecurity a Strategic Asset</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2415</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1754978e-5335-11ee-903e-bb241b6dc515]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7236553534.mp3?updated=1694719614" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Peach Sandstorm cyberespionage. Criminal attacks against a Colombian telco and two major US casino firms. A thief in the browser. And the Greater Manchester Police are on a virtual manhunt. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1907/notes</link>
      <description>"Peach Sandstorm" is an Iranian cyberespionage campaign. A Cyberattack against a telecom provider affects government and corporate online operations in Colombia. Python NodeStealer takes browser credentials. Caesars Entertainment files its 8-K. Some MGM Entertainment systems remain down. Betsy Carmelite from Booz Allen talking about how to leverage cyber psychology. Ron Reiter of Sentra outlines the threats for connected cars. And a third-party incident exposes personal data of the Manchester police.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/177

Selected reading.
Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets (Microsoft)
Hackers Backed by Iran Caught in Apparent Global Spy Campaign (The Messenger)
BNamericas - Colombia cyberattack hits government, corpor... (BNamericas.com)
Colombia's judicial branch thrown offline in major cyber attack (Colombia Reports) 
Casino giant Caesars Entertainment reports cyberattack; MGM Resorts says some systems still down (AP News)
Casino Operators Caesars and MGM Still Reeling From Cyber Attacks (Kiplinger.com) 
Groups linked to Las Vegas cyber attacks are prolific criminal hacking gangs (CyberScoop) 
MGM still responding to wide-ranging cyberattack as rumors run rampant (Record)
Ransomware in the casinos. (CyberWire)
MGM Resorts shuts down some systems. (CyberWire)
Manchester police officers’ data stolen following ransomware attack on supplier (Record)
Contractor Data Breach Impacts 8k Greater Manchester Police Officers (Hackread) 
A Second Major British Police Force Suffers a Cyberattack in Less Than a Month (SecurityWeek) 
Who is behind the latest wave of UK ransomware attacks? (the Guardian) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 15 Sep 2023 20:30:00 -0000</pubDate>
      <itunes:title>Peach Sandstorm cyberespionage. Criminal attacks against a Colombian telco and two major US casino firms. A thief in the browser. And the Greater Manchester Police are on a virtual manhunt. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1907</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>"Peach Sandstorm" is an Iranian cyberespionage campaign. A Cyberattack against a telecom provider affects government and corporate online operations in Colombia. Python NodeStealer takes browser credentials. Caesars Entertainment files its 8-K. Some MGM Entertainment systems remain down. Betsy Carmelite from Booz Allen talking about how to leverage cyber psychology. Ron Reiter of Sentra outlines the threats for connected cars. And a third-party incident exposes personal data of the Manchester police.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/177

Selected reading.
Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets (Microsoft)
Hackers Backed by Iran Caught in Apparent Global Spy Campaign (The Messenger)
BNamericas - Colombia cyberattack hits government, corpor... (BNamericas.com)
Colombia's judicial branch thrown offline in major cyber attack (Colombia Reports) 
Casino giant Caesars Entertainment reports cyberattack; MGM Resorts says some systems still down (AP News)
Casino Operators Caesars and MGM Still Reeling From Cyber Attacks (Kiplinger.com) 
Groups linked to Las Vegas cyber attacks are prolific criminal hacking gangs (CyberScoop) 
MGM still responding to wide-ranging cyberattack as rumors run rampant (Record)
Ransomware in the casinos. (CyberWire)
MGM Resorts shuts down some systems. (CyberWire)
Manchester police officers’ data stolen following ransomware attack on supplier (Record)
Contractor Data Breach Impacts 8k Greater Manchester Police Officers (Hackread) 
A Second Major British Police Force Suffers a Cyberattack in Less Than a Month (SecurityWeek) 
Who is behind the latest wave of UK ransomware attacks? (the Guardian) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>"Peach Sandstorm" is an Iranian cyberespionage campaign. A Cyberattack against a telecom provider affects government and corporate online operations in Colombia. Python NodeStealer takes browser credentials. Caesars Entertainment files its 8-K. Some MGM Entertainment systems remain down. Betsy Carmelite from Booz Allen talking about how to leverage cyber psychology. Ron Reiter of Sentra outlines the threats for connected cars. And a third-party incident exposes personal data of the Manchester police.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/177</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.microsoft.com/en-us/security/blog/2023/09/14/peach-sandstorm-password-spray-campaigns-enable-intelligence-collection-at-high-value-targets/">Peach Sandstorm password spray campaigns enable intelligence collection at high-value targets</a> (Microsoft)</p><p><a href="https://themessenger.com/tech/hackers-backed-by-iran-caught-in-apparent-global-spy-campaign">Hackers Backed by Iran Caught in Apparent Global Spy Campaign</a> (The Messenger)</p><p><a href="https://www.bnamericas.com/en/news/colombia-cyberattack-hits-government-corporates-at-home-and-abroad">BNamericas - Colombia cyberattack hits government, corpor...</a> (BNamericas.com)</p><p><a href="https://colombiareports.com/colombias-judicial-branch-thrown-offline-in-major-cyber-attack/">Colombia's judicial branch thrown offline in major cyber attack</a> (Colombia Reports) </p><p><a href="https://apnews.com/article/vegas-casinos-mgm-resorts-caesars-cyberattack-shutdown-3f7f80d0d200e9f26a2efa88bc5a6862">Casino giant Caesars Entertainment reports cyberattack; MGM Resorts says some systems still down</a> (AP News)</p><p><a href="https://www.kiplinger.com/personal-finance/leisure/casino-operators-caesars-and-mgm-still-reeling-from-cyber-attacks">Casino Operators Caesars and MGM Still Reeling From Cyber Attacks</a> (Kiplinger.com) </p><p><a href="https://cyberscoop.com/las-vegas-mgm-caesars-cyber-attack/">Groups linked to Las Vegas cyber attacks are prolific criminal hacking gangs</a> (CyberScoop) </p><p><a href="https://therecord.media/mgm-cyberattack-response">MGM still responding to wide-ranging cyberattack as rumors run rampant</a> (Record)</p><p><a href="https://thecyberwire.com/stories/d9d50346c345472c943ffedd9e203bd6/ransomware-in-the-casinos">Ransomware in the casinos.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/f0f7ca87c53248b0b0df54dd7576287f/mgm-resorts-shuts-down-some-systems-because-of-a-cybersecurity-issue-updated">MGM Resorts shuts down some systems. </a>(CyberWire)</p><p><a href="https://therecord.media/greater-manchester-police-ransomware-attack-britain">Manchester police officers’ data stolen following ransomware attack on supplier</a> (Record)</p><p><a href="https://www.hackread.com/contractor-data-breach-greater-manchester-police/">Contractor Data Breach Impacts 8k Greater Manchester Police Officers</a> (Hackread) </p><p><a href="https://www.securityweek.com/a-second-major-british-police-force-suffers-a-cyberattack-in-less-than-a-month/">A Second Major British Police Force Suffers a Cyberattack in Less Than a Month</a> (SecurityWeek) </p><p><a href="https://www.theguardian.com/technology/2023/sep/14/who-is-behind-latest-wave-of-ransomware-attacks">Who is behind the latest wave of UK ransomware attacks?</a> (the Guardian) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1876</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[127d904e-2b53-11ee-9c79-37d38fe6ac8b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9602861375.mp3?updated=1694805684" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware and materiality. MetaStealer hits businesses. Two looks at cloud risks. His Highness, the Large Language Model. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1906/notes</link>
      <description>The MGM Resorts incident is now believed to be ransomware, and how does that inform our view of Materiality of a cyber incident? MetaStealer targets businesses. Cloud access with stolen credentials. The cloud as an expansive attack surface. Johannes Ullrich from SANS describes malware in dot-inf files. In our Industry Voices segment Dave speaks with Oliver Tavakoli, CTO at Vectra, on the complexity and challenges of cloud service security. And welcome back, or not, Your Highness the Large Language Model, Prince of Nigeria.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/176

Selected reading.
Caesars Entertainment Paid Millions to Hackers in Attack (Bloomberg) 
Caesars Paid Ransom After Suffering Cyberattack (Wall Street Journal) 
The Cyberattack That Sent Las Vegas Back in Time (Wall Street Journal) 
Pro Take: MGM Casino Hack Shows Challenge in Defending Connected Tech (Wall Street Journal) 
ALPHV Ransomware Used Vishing to Scam MGM Resorts Employee, Researchers (Hackread)
FBI probing MGM Resorts cyber incident as some casino systems still down (Reuters) 
MGM Resorts says cyberattack could have material effect on company (NBC News) 
MGM Resorts cybersecurity breach could cost millions, expert says (KLAS) 
MGM Resorts shuts down some systems because of a “cybersecurity issue.” (Updated.) (CyberWire)
macOS Info-Stealer Malware 'MetaStealer' Targeting Businesses (SecurityWeek) 
“Authorized” to break in: Adversaries use valid credentials to compromise cloud environments (Security Intelligence) 
Unit 42 Attack Surface Threat Report (Palo Alto Networks)
The Nigerian Prince is Alive and Well: Cybercriminals Use Generative… (Abnormal) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 14 Sep 2023 20:30:00 -0000</pubDate>
      <itunes:title>Ransomware and materiality. MetaStealer hits businesses. Two looks at cloud risks. His Highness, the Large Language Model. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1906</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The MGM Resorts incident is now believed to be ransomware, and how does that inform our view of Materiality of a cyber incident? MetaStealer targets businesses. Cloud access with stolen credentials. The cloud as an expansive attack surface. Johannes Ullrich from SANS describes malware in dot-inf files. In our Industry Voices segment Dave speaks with Oliver Tavakoli, CTO at Vectra, on the complexity and challenges of cloud service security. And welcome back, or not, Your Highness the Large Language Model, Prince of Nigeria.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/176

Selected reading.
Caesars Entertainment Paid Millions to Hackers in Attack (Bloomberg) 
Caesars Paid Ransom After Suffering Cyberattack (Wall Street Journal) 
The Cyberattack That Sent Las Vegas Back in Time (Wall Street Journal) 
Pro Take: MGM Casino Hack Shows Challenge in Defending Connected Tech (Wall Street Journal) 
ALPHV Ransomware Used Vishing to Scam MGM Resorts Employee, Researchers (Hackread)
FBI probing MGM Resorts cyber incident as some casino systems still down (Reuters) 
MGM Resorts says cyberattack could have material effect on company (NBC News) 
MGM Resorts cybersecurity breach could cost millions, expert says (KLAS) 
MGM Resorts shuts down some systems because of a “cybersecurity issue.” (Updated.) (CyberWire)
macOS Info-Stealer Malware 'MetaStealer' Targeting Businesses (SecurityWeek) 
“Authorized” to break in: Adversaries use valid credentials to compromise cloud environments (Security Intelligence) 
Unit 42 Attack Surface Threat Report (Palo Alto Networks)
The Nigerian Prince is Alive and Well: Cybercriminals Use Generative… (Abnormal) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The MGM Resorts incident is now believed to be ransomware, and how does that inform our view of Materiality of a cyber incident? MetaStealer targets businesses. Cloud access with stolen credentials. The cloud as an expansive attack surface. Johannes Ullrich from SANS describes malware in dot-inf files. In our Industry Voices segment Dave speaks with Oliver Tavakoli, CTO at Vectra, on the complexity and challenges of cloud service security. And welcome back, or not, Your Highness the Large Language Model, Prince of Nigeria.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/176</p><h2><br></h2><h2>Selected reading.</h2><p><a href="https://www.bloomberg.com/news/articles/2023-09-13/caesars-entertainment-paid-millions-in-ransom-in-recent-attack">Caesars Entertainment Paid Millions to Hackers in Attack</a> (Bloomberg) </p><p><a href="https://www.wsj.com/business/hospitality/caesars-paid-ransom-after-suffering-cyberattack-7792c7f0">Caesars Paid Ransom After Suffering Cyberattack</a> (Wall Street Journal) </p><p><a href="https://www.wsj.com/lifestyle/travel/las-vegas-mgm-cyberattack-casinos-6ca43dcf">The Cyberattack That Sent Las Vegas Back in Time</a> (Wall Street Journal) </p><p><a href="https://www.wsj.com/articles/pro-take-mgm-casino-hack-shows-challenge-in-defending-connected-tech-5a360a4e">Pro Take: MGM Casino Hack Shows Challenge in Defending Connected Tech</a> (Wall Street Journal) </p><p><a href="https://www.hackread.com/alphv-ransomware-vishing-mgm-resort-employee/">ALPHV Ransomware Used Vishing to Scam MGM Resorts Employee, Researchers</a> (Hackread)</p><p><a href="https://www.reuters.com/technology/moodys-says-breach-mgm-is-credit-negative-disruption-lingers-2023-09-13/">FBI probing MGM Resorts cyber incident as some casino systems still down</a> (Reuters) </p><p><a href="https://www.nbcnews.com/tech/security/mgm-resorts-says-cyberattack-material-effect-company-rcna104903">MGM Resorts says cyberattack could have material effect on company </a>(NBC News) </p><p><a href="https://www.8newsnow.com/news/local-news/mgm-cyber-attack-could-cost-millions-according-to-cybersecurity-experts/">MGM Resorts cybersecurity breach could cost millions, expert says</a> (KLAS) </p><p><a href="https://thecyberwire.com/stories/f0f7ca87c53248b0b0df54dd7576287f/mgm-resorts-shuts-down-some-systems-because-of-a-cybersecurity-issue-updated">MGM Resorts shuts down some systems because of a “cybersecurity issue.” (Updated.)</a> (CyberWire)</p><p><a href="https://www.securityweek.com/macos-info-stealer-malware-metastealer-targeting-businesses/">macOS Info-Stealer Malware 'MetaStealer' Targeting Businesses</a> (SecurityWeek) </p><p><a href="https://securityintelligence.com/posts/adversaries-use-valid-credentials-compromise-cloud-environments/">“Authorized” to break in: Adversaries use valid credentials to compromise cloud environments</a> (Security Intelligence) </p><p><a href="https://www.paloaltonetworks.com/resources/research/2023-unit-42-attack-surface-threat-report">Unit 42 Attack Surface Threat Report</a> (Palo Alto Networks)</p><p><a href="https://abnormalsecurity.com/blog/generative-ai-nigerian-prince-scams">The Nigerian Prince is Alive and Well: Cybercriminals Use Generative…</a> (Abnormal) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1539</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[126b7f8a-2b53-11ee-9c79-5b441f3468da]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5432844187.mp3?updated=1694805705" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How one access broker gets its initial access (it’s through novel phishing). Be alert for deepfakes, US authorities say. The Pentagon’s new cyber strategy. And a reminder: yesterday was Patch Tuesday. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1905/notes</link>
      <description>An access broker's phishing facilitates ransomware. 3AM is fallback malware. Cross-site-scripting vulnerabilities are reported in Apache services. US agencies warn organizations to be alert for deepfakes. The US Department of Defense publishes its 2023 Cyber Strategy. Ann Johnson from the Afternoon Cyber Tea podcast speaks with with Jenny Radcliffe about the rise in social engineering. Deepen Desai from Zscaler shares a technical analysis of Bandit Stealer. And a quick reminder: yesterday was Patch Tuesday.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/175

Selected reading.
Malware distributor Storm-0324 facilitates ransomware access (Microsoft Security) 
3AM: New Ransomware Family Used As Fallback in Failed LockBit Attack (Symantec)
Azure HDInsight Riddled With XSS Vulnerabilities via Apache Services (Orca Security)
Contextualizing Deepfake Threats to Organizations (US Department of Defense) 
Bipartisan push to ban deceptive AI-generated ads in US elections (Reuters)
DOD Releases 2023 Cyber Strategy Summary (U.S. Department of Defense)
New Pentagon cyber strategy: Building new capabilities, expanding allied info-sharing (Breaking Defense)
New DOD cyber strategy notes limits of digital deterrence (DefenseScoop)
New Pentagon cyber strategy: Building new capabilities, expanding allied info-sharing (Breaking Defense)
CISA Releases Three Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency CISA) 
September 2023 Security Updates (Microsoft Security Response Center) 
Microsoft Releases September 2023 Updates (Cybersecurity and Infrastructure Security Agency CISA) 
Zero Day Summer: Microsoft Warns of Fresh New Software Exploits (SecurityWeek)
Microsoft Patch Tuesday: Two zero-days addressed in September update (Computing) 
Adobe Releases Security Updates for Multiple Products (Cybersecurity and Infrastructure Security Agency CISA)
Microsoft, Adobe fix zero-days exploited by attackers (CVE-2023-26369, CVE-2023-36761, CVE-2023-36802) (Help Net Security) 
Adobe fixed actively exploited zero-day in Acrobat and Reader (Security Affairs) 
Adobe warns of critical Acrobat and Reader zero-day exploited in attacks (BleepingComputer) 
Apple Releases Security Updates for iOS and macOS (Cybersecurity and Infrastructure Security Agency CISA) 
SAP Security Patch Day for September 2023 (Onapsis) 
Google Rushes to Patch Critical Chrome Vulnerability Exploited in the Wild - Update Now (The Hacker News) 
Critical Google Chrome Zero-Day Bug Exploited in the Wild (Dark Reading)
Zero-day affecting Chrome, Firefox and Thunderbird patched (Computer) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 13 Sep 2023 20:40:00 -0000</pubDate>
      <itunes:title>How one access broker gets its initial access (it’s through novel phishing). Be alert for deepfakes, US authorities say. The Pentagon’s new cyber strategy. And a reminder: yesterday was Patch Tuesday. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1905</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An access broker's phishing facilitates ransomware. 3AM is fallback malware. Cross-site-scripting vulnerabilities are reported in Apache services. US agencies warn organizations to be alert for deepfakes. The US Department of Defense publishes its 2023 Cyber Strategy. Ann Johnson from the Afternoon Cyber Tea podcast speaks with with Jenny Radcliffe about the rise in social engineering. Deepen Desai from Zscaler shares a technical analysis of Bandit Stealer. And a quick reminder: yesterday was Patch Tuesday.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/175

Selected reading.
Malware distributor Storm-0324 facilitates ransomware access (Microsoft Security) 
3AM: New Ransomware Family Used As Fallback in Failed LockBit Attack (Symantec)
Azure HDInsight Riddled With XSS Vulnerabilities via Apache Services (Orca Security)
Contextualizing Deepfake Threats to Organizations (US Department of Defense) 
Bipartisan push to ban deceptive AI-generated ads in US elections (Reuters)
DOD Releases 2023 Cyber Strategy Summary (U.S. Department of Defense)
New Pentagon cyber strategy: Building new capabilities, expanding allied info-sharing (Breaking Defense)
New DOD cyber strategy notes limits of digital deterrence (DefenseScoop)
New Pentagon cyber strategy: Building new capabilities, expanding allied info-sharing (Breaking Defense)
CISA Releases Three Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency CISA) 
September 2023 Security Updates (Microsoft Security Response Center) 
Microsoft Releases September 2023 Updates (Cybersecurity and Infrastructure Security Agency CISA) 
Zero Day Summer: Microsoft Warns of Fresh New Software Exploits (SecurityWeek)
Microsoft Patch Tuesday: Two zero-days addressed in September update (Computing) 
Adobe Releases Security Updates for Multiple Products (Cybersecurity and Infrastructure Security Agency CISA)
Microsoft, Adobe fix zero-days exploited by attackers (CVE-2023-26369, CVE-2023-36761, CVE-2023-36802) (Help Net Security) 
Adobe fixed actively exploited zero-day in Acrobat and Reader (Security Affairs) 
Adobe warns of critical Acrobat and Reader zero-day exploited in attacks (BleepingComputer) 
Apple Releases Security Updates for iOS and macOS (Cybersecurity and Infrastructure Security Agency CISA) 
SAP Security Patch Day for September 2023 (Onapsis) 
Google Rushes to Patch Critical Chrome Vulnerability Exploited in the Wild - Update Now (The Hacker News) 
Critical Google Chrome Zero-Day Bug Exploited in the Wild (Dark Reading)
Zero-day affecting Chrome, Firefox and Thunderbird patched (Computer) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An access broker's phishing facilitates ransomware. 3AM is fallback malware. Cross-site-scripting vulnerabilities are reported in Apache services. US agencies warn organizations to be alert for deepfakes. The US Department of Defense publishes its 2023 Cyber Strategy. Ann Johnson from the Afternoon Cyber Tea podcast speaks with with Jenny Radcliffe about the rise in social engineering. Deepen Desai from Zscaler shares a technical analysis of Bandit Stealer. And a quick reminder: yesterday was Patch Tuesday.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/175</p><h2><br></h2><h2>Selected reading.</h2><p><a href="https://www.microsoft.com/en-us/security/blog/2023/09/12/malware-distributor-storm-0324-facilitates-ransomware-access/">Malware distributor Storm-0324 facilitates ransomware access</a> (Microsoft Security) </p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/3am-ransomware-lockbit">3AM: New Ransomware Family Used As Fallback in Failed LockBit Attack</a> (Symantec)</p><p><a href="https://orca.security/resources/blog/cross-site-scripting-vulnerabilities-in-apache-services-azure-hd-insight/">Azure HDInsight Riddled With XSS Vulnerabilities via Apache Services</a> (Orca Security)</p><p><a href="https://media.defense.gov/2023/Sep/12/2003298925/-1/-1/0/CSI-DEEPFAKE-THREATS.PDF">Contextualizing Deepfake Threats to Organizations</a> (US Department of Defense) </p><p><a href="https://www.reuters.com/world/us/bipartisan-push-ban-deceptive-ai-generated-ads-us-elections-2023-09-12/">Bipartisan push to ban deceptive AI-generated ads in US elections</a> (Reuters)</p><p><a href="https://www.defense.gov/News/Releases/Release/Article/3523199/dod-releases-2023-cyber-strategy-summary/">DOD Releases 2023 Cyber Strategy Summary</a> (U.S. Department of Defense)</p><p><a href="https://breakingdefense.com/2023/09/new-pentagon-cyber-strategy-racing-to-new-cyber-capabilities-expanding-allied-info-sharing/">New Pentagon cyber strategy: Building new capabilities, expanding allied info-sharing</a> (Breaking Defense)</p><p><a href="https://defensescoop.com/2023/09/12/new-dod-cyber-strategy-notes-limits-of-digital-deterrence/">New DOD cyber strategy notes limits of digital deterrence</a> (DefenseScoop)</p><p><a href="https://breakingdefense.com/2023/09/new-pentagon-cyber-strategy-racing-to-new-cyber-capabilities-expanding-allied-info-sharing/">New Pentagon cyber strategy: Building new capabilities, expanding allied info-sharing</a> (Breaking Defense)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/09/12/cisa-releases-three-industrial-control-systems-advisories">CISA Releases Three Industrial Control Systems Advisories</a> (Cybersecurity and Infrastructure Security Agency CISA) </p><p><a href="https://msrc.microsoft.com/update-guide/releaseNote/2023-Sep">September 2023 Security Updates</a> (Microsoft Security Response Center) </p><p><a href="https://www.cisa.gov/news-events/alerts/2023/09/12/microsoft-releases-september-2023-updates">Microsoft Releases September 2023 Updates</a> (Cybersecurity and Infrastructure Security Agency CISA) </p><p><a href="https://www.securityweek.com/zero-day-summer-microsoft-warns-of-fresh-new-software-exploits/">Zero Day Summer: Microsoft Warns of Fresh New Software Exploits</a> (SecurityWeek)</p><p><a href="https://www.computing.co.uk/news/4124941/microsoft-patch-tuesday-zero-days-addressed-september-update">Microsoft Patch Tuesday: Two zero-days addressed in September update </a>(Computing) </p><p><a href="https://www.cisa.gov/news-events/alerts/2023/09/12/adobe-releases-security-updates-multiple-products">Adobe Releases Security Updates for Multiple Products</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.helpnetsecurity.com/2023/09/12/microsoft-adobe-fix-zero-days-exploited-by-attackers-cve-2023-26369-cve-2023-36761-cve-2023-36802/">Microsoft, Adobe fix zero-days exploited by attackers (CVE-2023-26369, CVE-2023-36761, CVE-2023-36802)</a> (Help Net Security) </p><p><a href="https://securityaffairs.com/150733/security/adobe-zero-day-acrobat-reader.html">Adobe fixed actively exploited zero-day in Acrobat and Reader</a> (Security Affairs) </p><p><a href="https://www.bleepingcomputer.com/news/security/adobe-warns-of-critical-acrobat-and-reader-zero-day-exploited-in-attacks/">Adobe warns of critical Acrobat and Reader zero-day exploited in attacks</a> (BleepingComputer) </p><p><a href="https://www.cisa.gov/news-events/alerts/2023/09/12/apple-releases-security-updates-ios-and-macos">Apple Releases Security Updates for iOS and macOS</a> (Cybersecurity and Infrastructure Security Agency CISA) </p><p><a href="https://onapsis.com/blog/sap-security-patch-day-september-2023">SAP Security Patch Day for September 2023</a> (Onapsis) </p><p><a href="https://thehackernews.com/2023/09/google-rushes-to-patch-critical-chrome.html">Google Rushes to Patch Critical Chrome Vulnerability Exploited in the Wild - Update Now</a> (The Hacker News) </p><p><a href="https://www.darkreading.com/vulnerabilities-threats/critical-google-chrome-zero-day-bug-exploited">Critical Google Chrome Zero-Day Bug Exploited in the Wild</a> (Dark Reading)</p><p><a href="https://www.computing.co.uk/news/4125007/zero-day-affecting-chrome-firefox-thunderbird-patched">Zero-day affecting Chrome, Firefox and Thunderbird patched </a>(Computer) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1567</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[12598a5a-2b53-11ee-9c79-0f663b6a342a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1142723537.mp3?updated=1694720956" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing with Facebook Messenger bots. Redfly hits a national power grid. Nice platform you got there…shame if something happened to it. MGM Resorts grapples with a “cybersecurity issue.” </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1904/notes</link>
      <description>Phishing with Facebook Messenger accounts. Redfly cyberespionage targets a national grid. The exploit trade in the C2C underground market. Phishing attack exploits Baidu link. A repojacking vulnerability. A hacktivist auxiliary looks to its own interests. Ben Yelin marks the start of the Google antitrust trial. In our Industry Voices segment, Adam Bateman from Push Security explains how identities are the new perimeter. And MGM Resorts are dealing with a “cybersecurity issue.”

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/174

Selected reading.
Sponsor with batch-filed whiskers: Ballistic Bobcat’s scan and strike backdoor (ESET) 
Charming Kitten's New Backdoor 'Sponsor' Targets Brazil, Israel, and U.A.E. (The Hacker News) 
Iran's Charming Kitten Pounces on Israeli Exchange Servers (Dark Reading) 
Iranian hackers break into networks of more than 30 companies in Israel (ynetnews) 
“MrTonyScam” — Botnet of Facebook Users Launch High-Intent Messenger Phishing Attack on Business Accounts (Guardio Labs, via Medium)
Facebook Messenger phishing wave targets 100K business accounts per week (BleepingComputer) 
Vietnamese Hackers Deploy Python-Based Stealer via Facebook Messenger (The Hacker News) 
Redfly: Espionage Actors Continue to Target Critical Infrastructure (Symantec)
Sales and Purchases of Vulnerability Exploits (Flashpoint)
Phishing Attack Abuses Baidu Link Redirect, Cloudflare, and Microsoft (Vade)
New Exploit Puts Thousands of GitHub Repositories and Millions of Users at Risk (Checkmarx.com)
After Microsoft and X, Hackers Launch DDoS Attack on Telegram (SecurityWeek)
MGM Resorts shuts down some computer systems after cyber attack (Reuters) 
Cybersecurity issue prompts computer shutdowns at MGM Resorts properties across US (AP News) 
MGM Resorts shuts down IT systems after cyberattack (BleepingComputer)
MGM Resorts experiences 'cybersecurity issue' impacting operations and prompting investigation (Fox Business) 
MGM resorts says 'cybersecurity issue' may have widespread impact (NBC News) 
MGM Resorts blames 'cybersecurity issue' for ongoing outage (TechCrunch) 
FBI assisting in MGM cybersecurity investigation as slot machines, website, and emails rem (KSNV) 
MGM Resorts Says It Shut Down Some Systems Following Hack (Bloomberg) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Sep 2023 20:30:00 -0000</pubDate>
      <itunes:title>Phishing with Facebook Messenger bots. Redfly hits a national power grid. Nice platform you got there…shame if something happened to it. MGM Resorts grapples with a “cybersecurity issue.” </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1904</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Phishing with Facebook Messenger accounts. Redfly cyberespionage targets a national grid. The exploit trade in the C2C underground market. Phishing attack exploits Baidu link. A repojacking vulnerability. A hacktivist auxiliary looks to its own interests. Ben Yelin marks the start of the Google antitrust trial. In our Industry Voices segment, Adam Bateman from Push Security explains how identities are the new perimeter. And MGM Resorts are dealing with a “cybersecurity issue.”

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/174

Selected reading.
Sponsor with batch-filed whiskers: Ballistic Bobcat’s scan and strike backdoor (ESET) 
Charming Kitten's New Backdoor 'Sponsor' Targets Brazil, Israel, and U.A.E. (The Hacker News) 
Iran's Charming Kitten Pounces on Israeli Exchange Servers (Dark Reading) 
Iranian hackers break into networks of more than 30 companies in Israel (ynetnews) 
“MrTonyScam” — Botnet of Facebook Users Launch High-Intent Messenger Phishing Attack on Business Accounts (Guardio Labs, via Medium)
Facebook Messenger phishing wave targets 100K business accounts per week (BleepingComputer) 
Vietnamese Hackers Deploy Python-Based Stealer via Facebook Messenger (The Hacker News) 
Redfly: Espionage Actors Continue to Target Critical Infrastructure (Symantec)
Sales and Purchases of Vulnerability Exploits (Flashpoint)
Phishing Attack Abuses Baidu Link Redirect, Cloudflare, and Microsoft (Vade)
New Exploit Puts Thousands of GitHub Repositories and Millions of Users at Risk (Checkmarx.com)
After Microsoft and X, Hackers Launch DDoS Attack on Telegram (SecurityWeek)
MGM Resorts shuts down some computer systems after cyber attack (Reuters) 
Cybersecurity issue prompts computer shutdowns at MGM Resorts properties across US (AP News) 
MGM Resorts shuts down IT systems after cyberattack (BleepingComputer)
MGM Resorts experiences 'cybersecurity issue' impacting operations and prompting investigation (Fox Business) 
MGM resorts says 'cybersecurity issue' may have widespread impact (NBC News) 
MGM Resorts blames 'cybersecurity issue' for ongoing outage (TechCrunch) 
FBI assisting in MGM cybersecurity investigation as slot machines, website, and emails rem (KSNV) 
MGM Resorts Says It Shut Down Some Systems Following Hack (Bloomberg) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Phishing with Facebook Messenger accounts. Redfly cyberespionage targets a national grid. The exploit trade in the C2C underground market. Phishing attack exploits Baidu link. A repojacking vulnerability. A hacktivist auxiliary looks to its own interests. Ben Yelin marks the start of the Google antitrust trial. In our Industry Voices segment, Adam Bateman from Push Security explains how identities are the new perimeter. And MGM Resorts are dealing with a “cybersecurity issue.”</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/174</p><h2><br></h2><h2>Selected reading.</h2><p><a href="https://www.welivesecurity.com/en/eset-research/sponsor-batch-filed-whiskers-ballistic-bobcats-scan-strike-backdoor/">Sponsor with batch-filed whiskers: Ballistic Bobcat’s scan and strike backdoor</a> (ESET) </p><p><a href="https://thehackernews.com/2023/09/charming-kitens-new-backdoor-sponsor.html">Charming Kitten's New Backdoor 'Sponsor' Targets Brazil, Israel, and U.A.E.</a> (The Hacker News) </p><p><a href="https://www.darkreading.com/dr-global/irans-charming-kitten-israeli-exchange-servers">Iran's Charming Kitten Pounces on Israeli Exchange Servers</a> (Dark Reading) </p><p><a href="https://www.ynetnews.com/business/article/rjrs5pn02">Iranian hackers break into networks of more than 30 companies in Israel</a> (ynetnews) </p><p><a href="https://labs.guard.io/mrtonyscam-botnet-of-facebook-users-launch-high-intent-messenger-phishing-attack-on-business-3182cfb12f4d">“MrTonyScam” — Botnet of Facebook Users Launch High-Intent Messenger Phishing Attack on Business Accounts</a> (Guardio Labs, via Medium)</p><p><a href="https://www.bleepingcomputer.com/news/security/facebook-messenger-phishing-wave-targets-100k-business-accounts-per-week/">Facebook Messenger phishing wave targets 100K business accounts per week</a> (BleepingComputer) </p><p><a href="https://thehackernews.com/2023/09/vietnamese-hackers-deploy-python-based.html">Vietnamese Hackers Deploy Python-Based Stealer via Facebook Messenger</a> (The Hacker News) </p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/critical-infrastructure-attacks">Redfly: Espionage Actors Continue to Target Critical Infrastructure</a> (Symantec)</p><p><a href="https://flashpoint.io/resources/report/sales-purchases-vulnerability-exploits-2023-midyear/">Sales and Purchases of Vulnerability Exploits</a> (Flashpoint)</p><p><a href="https://www.vadesecure.com/en/blog/new-phishing-attack-baidu">Phishing Attack Abuses Baidu Link Redirect, Cloudflare, and Microsoft</a> (Vade)</p><p><a href="https://checkmarx.com/blog/persistent-threat-new-exploit-puts-thousands-of-github-repositories-and-millions-of-users-at-risk/">New Exploit Puts Thousands of GitHub Repositories and Millions of Users at Risk</a> (Checkmarx.com)</p><p><a href="https://www.securityweek.com/after-microsoft-and-x-hackers-launch-ddos-attack-on-telegram/">After Microsoft and X, Hackers Launch DDoS Attack on Telegram</a> (SecurityWeek)</p><p><a href="https://www.reuters.com/business/mgm-resorts-shuts-down-some-computer-systems-after-cyber-attack-2023-09-11/">MGM Resorts shuts down some computer systems after cyber attack</a> (Reuters) </p><p><a href="https://apnews.com/article/mgm-resorts-casino-vegas-cybersecurity-outage-06de044bdf1880af2a8bce1a38c986ee">Cybersecurity issue prompts computer shutdowns at MGM Resorts properties across US</a> (AP News) </p><p><a href="https://www.bleepingcomputer.com/news/security/mgm-resorts-shuts-down-it-systems-after-cyberattack/">MGM Resorts shuts down IT systems after cyberattack</a> (BleepingComputer)</p><p><a href="https://www.foxbusiness.com/fox-news-tech/mgm-resorts-experiences-cybersecurity-issue-impacting-operations-prompting-investigation">MGM Resorts experiences 'cybersecurity issue' impacting operations and prompting investigation</a> (Fox Business) </p><p><a href="https://www.nbcnews.com/news/us-news/mgm-resorts-says-cybersecurity-issue-may-widespread-impact-rcna104551">MGM resorts says 'cybersecurity issue' may have widespread impact</a> (NBC News) </p><p><a href="https://techcrunch.com/2023/09/11/mgm-resorts-cybersecurity-issue-outage/">MGM Resorts blames 'cybersecurity issue' for ongoing outage</a> (TechCrunch) </p><p><a href="https://news3lv.com/news/local/fbi-assisting-in-mgm-cybersecurity-investigation-as-slot-machines-website-and-emails-remain-down">FBI assisting in MGM cybersecurity investigation as slot machines, website, and emails rem</a> (KSNV) </p><p><a href="https://www.bloomberg.com/news/articles/2023-09-11/mgm-resorts-says-it-shut-down-some-systems-following-cyberattack">MGM Resorts Says It Shut Down Some Systems Following Hack</a> (Bloomberg) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1926</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[12474552-2b53-11ee-9c79-e3909cff4062]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7193624450.mp3?updated=1694636498" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>UK's NCA and NCSC release a study of the cybercriminal underworld. HijackLoader's growing share of the C2C market. Russia's hacker diaspora in Turkey. Cyber diplomacy, free and frank..</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1903/notes</link>
      <description>UK's NCA and NCSC release a study of the cybercriminal underworld. HijackLoader's growing share of the C2C market. Russia's hacker diaspora in Turkey. Author David Hunt discusses his new book, “Irreducibly Complex Systems: An Introduction to Continuous Security Testing.” In our Industry Voices segment, Mike Anderson from Netskope outlines the challenges of managing Generative AI tools. And a senior Russian cyber diplomat warns against US escalation in cyberspace.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/173

Selected reading.
Ransomware, extortion and the cyber crime ecosystem (NCSC)
HijackLoader (Zscaler)
New HijackLoader malware is rapidly growing in popularity (Security Affairs)
New HijackLoader Modular Malware Loader Making Waves in the Cybercrime World (Hacker News)
Spyware Telegram mod distributed via Google Play (Secure List)
Millions Infected by Spyware Hidden in Fake Telegram Apps on Google Play (The Hacker News)
'Evil Telegram' Android apps on Google Play infected 60K with spyware (BleepingComputer)
Influx of Russian fraudsters gives Turkish cyber crime hub new lease of life (Financial Times)
Russia warns "all-out war" with US could erupt over worsening cyber clashes (Newsweek)
New strategy for global cybersecurity cooperation coming soon: State cyber ambassador (Breaking Defense) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 11 Sep 2023 20:30:00 -0000</pubDate>
      <itunes:title>UK's NCA and NCSC release a study of the cybercriminal underworld. HijackLoader's growing share of the C2C market. Russia's hacker diaspora in Turkey. Cyber diplomacy, free and frank..</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1903</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>UK's NCA and NCSC release a study of the cybercriminal underworld. HijackLoader's growing share of the C2C market. Russia's hacker diaspora in Turkey. Author David Hunt discusses his new book, “Irreducibly Complex Systems: An Introduction to Continuous Security Testing.” In our Industry Voices segment, Mike Anderson from Netskope outlines the challenges of managing Generative AI tools. And a senior Russian cyber diplomat warns against US escalation in cyberspace.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/173

Selected reading.
Ransomware, extortion and the cyber crime ecosystem (NCSC)
HijackLoader (Zscaler)
New HijackLoader malware is rapidly growing in popularity (Security Affairs)
New HijackLoader Modular Malware Loader Making Waves in the Cybercrime World (Hacker News)
Spyware Telegram mod distributed via Google Play (Secure List)
Millions Infected by Spyware Hidden in Fake Telegram Apps on Google Play (The Hacker News)
'Evil Telegram' Android apps on Google Play infected 60K with spyware (BleepingComputer)
Influx of Russian fraudsters gives Turkish cyber crime hub new lease of life (Financial Times)
Russia warns "all-out war" with US could erupt over worsening cyber clashes (Newsweek)
New strategy for global cybersecurity cooperation coming soon: State cyber ambassador (Breaking Defense) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>UK's NCA and NCSC release a study of the cybercriminal underworld. HijackLoader's growing share of the C2C market. Russia's hacker diaspora in Turkey. Author David Hunt discusses his new book, “Irreducibly Complex Systems: An Introduction to Continuous Security Testing.” In our Industry Voices segment, Mike Anderson from Netskope outlines the challenges of managing Generative AI tools. And a senior Russian cyber diplomat warns against US escalation in cyberspace.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/173</p><h2><br></h2><h2>Selected reading.</h2><p><a href="https://www.ncsc.gov.uk/whitepaper/ransomware-extortion-and-the-cyber-crime-ecosystem">Ransomware, extortion and the cyber crime ecosystem</a> (NCSC)</p><p><a href="https://www.zscaler.com/blogs/security-research/technical-analysis-hijackloader">HijackLoader</a> (Zscaler)</p><p><a href="https://securityaffairs.com/150617/cyber-crime/hijackloader-loader.html">New HijackLoader malware is rapidly growing in popularity</a> (Security Affairs)</p><p><a href="https://thehackernews.com/2023/09/new-hijackloader-modular-malware-loader.html">New HijackLoader Modular Malware Loader Making Waves in the Cybercrime World</a> (Hacker News)</p><p><a href="https://securelist.com/trojanized-telegram-mod-attacking-chinese-users/110482/">Spyware Telegram mod distributed via Google Play</a> (Secure List)</p><p><a href="https://thehackernews.com/2023/09/millions-infected-by-spyware-hidden-in.html">Millions Infected by Spyware Hidden in Fake Telegram Apps on Google Play</a> (The Hacker News)</p><p><a href="https://www.bleepingcomputer.com/news/security/evil-telegram-android-apps-on-google-play-infected-60k-with-spyware/">'Evil Telegram' Android apps on Google Play infected 60K with spyware</a> (BleepingComputer)</p><p><a href="https://www.ft.com/content/d5ba3c90-c2f2-4d4e-9cf0-b929930ad8f7">Influx of Russian fraudsters gives Turkish cyber crime hub new lease of life</a> (Financial Times)</p><p><a href="https://www.newsweek.com/russia-warns-all-out-war-us-could-erupt-over-worsening-cyber-clashes-1825102">Russia warns "all-out war" with US could erupt over worsening cyber clashes</a> (Newsweek)</p><p><a href="https://breakingdefense.com/2023/09/new-strategy-for-global-cybersecurity-cooperation-coming-soon-state-cyber-ambassador/">New strategy for global cybersecurity cooperation coming soon: State cyber ambassador</a> (Breaking Defense) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1871</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[12344006-2b53-11ee-9c79-c334e3ec7a49]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2887073141.mp3?updated=1694461842" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Caroline Wong: A passion for teaching. [CSO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/166/notes</link>
      <description>Caroline Wong, Chief Strategy Officer from Cobalt sits down to share her story of her 15+ years in cybersecurity leadership, including practitioner, product, and consulting roles. As well as being a member of our very own Hash Table, Caroline also authored the popular textbook, Security Metrics: A Beginner's Guide and teachers cybersecurity courses on LinkedIn Learning as well as hosts the Humans of InfoSec podcast. Caroline's father pushed her to start her career in engineering, she went to UC Berkeley and got accepted into their Electrical Engineering and Computer Sciences program. As a college student, she was looking for an internship and found eBay, where she says she worked an entry level position available on the information security team, and says the rest is history. She shares that she loves to teach her peers, and how she would like to be remembered for being a good teacher, saying "I think that my favorite part of the work that I get to do is teaching. Um, and in particular, um, being able to communicate about cybersecurity concepts to a wide audience. I have such tremendous gratitude." We thank Caroline for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 10 Sep 2023 07:00:00 -0000</pubDate>
      <itunes:title>Caroline Wong: A passion for teaching. [CSO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>166</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Caroline Wong, Chief Strategy Officer from Cobalt sits down to share her story of her 15+ years in cybersecurity leadership, including practitioner, product, and consulting roles. As well as being a member of our very own Hash Table, Caroline also authored the popular textbook, Security Metrics: A Beginner's Guide and teachers cybersecurity courses on LinkedIn Learning as well as hosts the Humans of InfoSec podcast. Caroline's father pushed her to start her career in engineering, she went to UC Berkeley and got accepted into their Electrical Engineering and Computer Sciences program. As a college student, she was looking for an internship and found eBay, where she says she worked an entry level position available on the information security team, and says the rest is history. She shares that she loves to teach her peers, and how she would like to be remembered for being a good teacher, saying "I think that my favorite part of the work that I get to do is teaching. Um, and in particular, um, being able to communicate about cybersecurity concepts to a wide audience. I have such tremendous gratitude." We thank Caroline for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Caroline Wong, Chief Strategy Officer from Cobalt sits down to share her story of her 15+ years in cybersecurity leadership, including practitioner, product, and consulting roles. As well as being a member of our very own Hash Table, Caroline also authored the popular textbook, Security Metrics: A Beginner's Guide and teachers cybersecurity courses on LinkedIn Learning as well as hosts the Humans of InfoSec podcast. Caroline's father pushed her to start her career in engineering, she went to UC Berkeley and got accepted into their Electrical Engineering and Computer Sciences program. As a college student, she was looking for an internship and found eBay, where she says she worked an entry level position available on the information security team, and says the rest is history. She shares that she loves to teach her peers, and how she would like to be remembered for being a good teacher, saying "I think that my favorite part of the work that I get to do is teaching. Um, and in particular, um, being able to communicate about cybersecurity concepts to a wide audience. I have such tremendous gratitude." We thank Caroline for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>509</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e632b39c-4e8a-11ee-ac3e-d38d33902803]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2994714922.mp3?updated=1694195951" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No honor in being a criminal. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/298/notes</link>
      <description>This week, our guest is Reece Baldwin from Kasada discussing their work on "No Honour Amongst Thieves: Unpacking a New OpenBullet Malware Campaign." The Kasada Threat Intelligence team has recently identified a malware campaign targeting users of OpenBullet, a tool popular within criminal communities to conduct credential stuffing attacks.
This malware campaign was first uncovered when the team was digging around in a Telegram channel setup to share OpenBullet configurations. Reading through a few of the configurations they identified a function, ostensibly designed to bypass Google’s reCAPTCHA anti-bot solution. Th research states "While the versatility of OpenBullet’s configuration files enable complex attacks, they can also make it difficult for inexperienced attackers to fully understand what requests are being created and what data is being retrieved."
The research can be found here:
No Honour Amongst Thieves: Unpacking a New OpenBullet Malware Campaign

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Sep 2023 07:00:00 -0000</pubDate>
      <itunes:title>No honor in being a criminal. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>298</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, our guest is Reece Baldwin from Kasada discussing their work on "No Honour Amongst Thieves: Unpacking a New OpenBullet Malware Campaign." The Kasada Threat Intelligence team has recently identified a malware campaign targeting users of OpenBullet, a tool popular within criminal communities to conduct credential stuffing attacks.
This malware campaign was first uncovered when the team was digging around in a Telegram channel setup to share OpenBullet configurations. Reading through a few of the configurations they identified a function, ostensibly designed to bypass Google’s reCAPTCHA anti-bot solution. Th research states "While the versatility of OpenBullet’s configuration files enable complex attacks, they can also make it difficult for inexperienced attackers to fully understand what requests are being created and what data is being retrieved."
The research can be found here:
No Honour Amongst Thieves: Unpacking a New OpenBullet Malware Campaign

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our guest is Reece Baldwin from Kasada discussing their work on "No Honour Amongst Thieves: Unpacking a New OpenBullet Malware Campaign." The Kasada Threat Intelligence team has recently identified a malware campaign targeting users of OpenBullet, a tool popular within criminal communities to conduct credential stuffing attacks.</p><p>This malware campaign was first uncovered when the team was digging around in a Telegram channel setup to share OpenBullet configurations. Reading through a few of the configurations they identified a function, ostensibly designed to bypass Google’s reCAPTCHA anti-bot solution. Th research states "While the versatility of OpenBullet’s configuration files enable complex attacks, they can also make it difficult for inexperienced attackers to fully understand what requests are being created and what data is being retrieved."</p><p>The research can be found here:</p><ul><li><a href="https://www.kasada.io/threat-intel-openbullet-malware/">No Honour Amongst Thieves: Unpacking a New OpenBullet Malware Campaign</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1038</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d0b2dd00-4e5b-11ee-b0af-8f352024e89b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5134676044.mp3?updated=1694185620" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Apple issues an emergency patch. Aerospace sector under attack. DPRK spearsphishes security researchers. Notes from the hybrid war, including Starlink’s judgments on jus in bello. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1902/notes</link>
      <description>Apple issues emergency patches. "Multiple nation-state actors" target the aerospace sector. The DPRK targets security researchers. SpaceX interrupted service to block a Ukrainian attack against Russian naval units last year. The International Criminal Court will prosecute cyber war crimes. Operation KleptoCapture extends to professional service providers. Malek Ben Salem of Accenture ponders the long-term reliability of LLM-powered applications. Our guest is Elliott Champion from CSC on how cybercriminals are taking advantage of the Threads platform. And congratulations to the SINET 16.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/172

Selected reading.
BLASTPASS: NSO Group iPhone Zero-Click, Zero-Day Exploit Captured in the Wild (The Citizen Lab) 
Apple issues software updates after spyware discoveries (Washington Post)
Apple patches two zero-days under attack (CVE-2023-41064, CVE-2023-41061) (Help Net Security)
CISA, FBI, and CNMF Release Advisory on Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475 | CISA (Cybersecurity and Infrastructure Security Agency CISA)
Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475 (Cybersecurity and Infrastructure Security Agency CISA) 
AA23-250A: Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475 (Tenable®) 
CISA Warning: Nation-State Hackers Exploit Fortinet and Zoho Vulnerabilities (The Hacker News)
Active North Korean campaign targeting security researchers (Google)
Rigged Software and Zero-Days: North Korean APT Caught Hacking Security Researchers (SecurityWeek)
Musk 'switched off Starlink in Ukraine over nuclear fears' (Computing)
CNN Exclusive: 'How am I in this war?': New Musk biography offers fresh details about the billionaire's Ukraine dilemma | CNN Politics (CNN) 
Ukraine, US Intelligence Suggest Russia Cyber Efforts Evolving, Growing (Voice of America)
The International Criminal Court Will Now Prosecute Cyberwar Crimes (WIRED)
Technology Will Not Exceed Our Humanity (Digital Front Lines) 
Justice Department’s Oligarch Hunters Widen Scope to Include Facilitators (Wall Street Journal) 
Apple issues emergency patches. APTs target aerospace sector. DPRK targets security researchers. New BEC phishing kit. Notes from the hybrid war. ICC will prosecute cyber war crimes. SINET 16 announced. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 08 Sep 2023 20:15:00 -0000</pubDate>
      <itunes:title>Apple issues an emergency patch. Aerospace sector under attack. DPRK spearsphishes security researchers. Notes from the hybrid war, including Starlink’s judgments on jus in bello. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1902</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Apple issues emergency patches. "Multiple nation-state actors" target the aerospace sector. The DPRK targets security researchers. SpaceX interrupted service to block a Ukrainian attack against Russian naval units last year. The International Criminal Court will prosecute cyber war crimes. Operation KleptoCapture extends to professional service providers. Malek Ben Salem of Accenture ponders the long-term reliability of LLM-powered applications. Our guest is Elliott Champion from CSC on how cybercriminals are taking advantage of the Threads platform. And congratulations to the SINET 16.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/172

Selected reading.
BLASTPASS: NSO Group iPhone Zero-Click, Zero-Day Exploit Captured in the Wild (The Citizen Lab) 
Apple issues software updates after spyware discoveries (Washington Post)
Apple patches two zero-days under attack (CVE-2023-41064, CVE-2023-41061) (Help Net Security)
CISA, FBI, and CNMF Release Advisory on Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475 | CISA (Cybersecurity and Infrastructure Security Agency CISA)
Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475 (Cybersecurity and Infrastructure Security Agency CISA) 
AA23-250A: Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475 (Tenable®) 
CISA Warning: Nation-State Hackers Exploit Fortinet and Zoho Vulnerabilities (The Hacker News)
Active North Korean campaign targeting security researchers (Google)
Rigged Software and Zero-Days: North Korean APT Caught Hacking Security Researchers (SecurityWeek)
Musk 'switched off Starlink in Ukraine over nuclear fears' (Computing)
CNN Exclusive: 'How am I in this war?': New Musk biography offers fresh details about the billionaire's Ukraine dilemma | CNN Politics (CNN) 
Ukraine, US Intelligence Suggest Russia Cyber Efforts Evolving, Growing (Voice of America)
The International Criminal Court Will Now Prosecute Cyberwar Crimes (WIRED)
Technology Will Not Exceed Our Humanity (Digital Front Lines) 
Justice Department’s Oligarch Hunters Widen Scope to Include Facilitators (Wall Street Journal) 
Apple issues emergency patches. APTs target aerospace sector. DPRK targets security researchers. New BEC phishing kit. Notes from the hybrid war. ICC will prosecute cyber war crimes. SINET 16 announced. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Apple issues emergency patches. "Multiple nation-state actors" target the aerospace sector. The DPRK targets security researchers. SpaceX interrupted service to block a Ukrainian attack against Russian naval units last year. The International Criminal Court will prosecute cyber war crimes. Operation KleptoCapture extends to professional service providers. Malek Ben Salem of Accenture ponders the long-term reliability of LLM-powered applications. Our guest is Elliott Champion from CSC on how cybercriminals are taking advantage of the Threads platform. And congratulations to the SINET 16.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/172</p><p><br></p><h2>Selected reading.</h2><p><a href="https://citizenlab.ca/2023/09/blastpass-nso-group-iphone-zero-click-zero-day-exploit-captured-in-the-wild/">BLASTPASS: NSO Group iPhone Zero-Click, Zero-Day Exploit Captured in the Wild</a> (The Citizen Lab) </p><p><a href="https://www.washingtonpost.com/politics/2023/09/08/apple-issues-software-updates-after-spyware-discoveries/">Apple issues software updates after spyware discoveries</a> (Washington Post)</p><p><a href="https://www.helpnetsecurity.com/2023/09/08/cve-2023-41064-cve-2023-41061/">Apple patches two zero-days under attack (CVE-2023-41064, CVE-2023-41061)</a> (Help Net Security)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/09/07/cisa-fbi-and-cnmf-release-advisory-multiple-nation-state-threat-actors-exploit-cve-2022-47966-and">CISA, FBI, and CNMF Release Advisory on Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475 | CISA</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-250a">Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475</a> (Cybersecurity and Infrastructure Security Agency CISA) </p><p><a href="https://www.tenable.com/blog/aa23-250a-multiple-nation-state-threat-actors-exploit-cve-2022-47966-and-cve-2022-42475">AA23-250A: Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475</a> (Tenable®) </p><p><a href="https://thehackernews.com/2023/09/cisa-warning-nation-state-hackers.html">CISA Warning: Nation-State Hackers Exploit Fortinet and Zoho Vulnerabilities</a> (The Hacker News)</p><p><a href="https://blog.google/threat-analysis-group/active-north-korean-campaign-targeting-security-researchers/">Active North Korean campaign targeting security researchers</a> (Google)</p><p><a href="https://www.securityweek.com/rigged-software-and-zero-days-north-korean-apt-caught-hacking-security-researchers/">Rigged Software and Zero-Days: North Korean APT Caught Hacking Security Researchers</a> (SecurityWeek)</p><p><a href="https://www.computing.co.uk/news/4124318/musk-switched-starlink-ukraine-nuclear-fears">Musk 'switched off Starlink in Ukraine over nuclear fears' </a>(Computing)</p><p><a href="https://www.cnn.com/2023/09/07/politics/elon-musk-biography-walter-isaacson-ukraine-starlink/index.html">CNN Exclusive: 'How am I in this war?': New Musk biography offers fresh details about the billionaire's Ukraine dilemma | CNN Politics</a> (CNN) </p><p><a href="https://www.voanews.com/a/ukraine-us-intelligence-suggest-russia-cyber-efforts-evolving-growing-/7259396.html">Ukraine, US Intelligence Suggest Russia Cyber Efforts Evolving, Growing</a> (Voice of America)</p><p><a href="https://www.wired.com/story/icc-cyberwar-crimes/">The International Criminal Court Will Now Prosecute Cyberwar Crimes</a> (WIRED)</p><p><a href="https://digitalfrontlines.io/2023/08/20/technology-will-not-exceed-our-humanity/">Technology Will Not Exceed Our Humanity</a> (Digital Front Lines) </p><p><a href="https://www.wsj.com/articles/justice-departments-oligarch-hunters-widen-scope-to-include-facilitators-621145c5">Justice Department’s Oligarch Hunters Widen Scope to Include Facilitators</a> (Wall Street Journal) </p><p><a href="https://thecyberwire.com/newsletters/daily-briefing/12/172">Apple issues emergency patches. APTs target aerospace sector. DPRK targets security researchers. New BEC phishing kit. Notes from the hybrid war. ICC will prosecute cyber war crimes. SINET 16 announced.</a> (CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1835</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1222544a-2b53-11ee-9c79-fb92a173c37d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9300825128.mp3?updated=1694463570" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Microsoft releases results of investigation into cloud email compromise. A buggy booking service. Adversary emulation for OT networks. Identity protection trends. Notes from the hybrid war.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1901/notes</link>
      <description>Microsoft releases results of their investigation into cloud email compromise. A vulnerability affects a resort booking service. Adversary emulation for OT networks. Identity protection and identity attack surfaces. Sanctioning privateers (with a bonus on vacation ideas). Rob Boyce from Accenture Security tracks new trends in ransomware. Our Threat Vector segment features Mastering IR Sniping A Deliberate Approach to Cybersecurity Investigations with Chris Brewer. And Estonia warns of ongoing cyber threats.
On this segment of Threat Vector, Chris Brewer, a Director at Unit 42 and expert in digital forensics and incident response, joins host David Moulton discussing Mastering IR Sniping: A Deliberate Approach to Cybersecurity Investigations.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/171

Threat Vector links.
Sniper Incident Response from Cactus Con on GitHub
Sniper Incident Response presentation by Chris Brewer on YouTube

Selected reading.
Results of Major Technical Investigations for Storm-0558 Key Acquisition (Microsoft Security Response Center)
Check-Out With Extra Charges - Vulnerabilities in Hotel Booking Engine Explained (Bitdefender)
Deep Dive into Supply Chain Compromise: Hospitality's Hidden Risks (Bitdefender) 
MITRE and CISA release Caldera for OT attack emulation (Security Affairs) 
MITRE Caldera for OT now available as extension to open-source platform (Help Net Security)
Silverfort and Osterman Research Report Exposes Critical Gaps in Identity Threat Protection (Silverfort) 
United States and United Kingdom Sanction Additional Members of the Russia-Based Trickbot Cybercrime Gang (US Department of the Treasury)
Estonian PM: cyberspace is Ukraine war frontline (Euromaidan Press)
Cyberwar and Conventional Warfare in Ukraine (19FortyFive)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 07 Sep 2023 20:15:00 -0000</pubDate>
      <itunes:title>Microsoft releases results of investigation into cloud email compromise. A buggy booking service. Adversary emulation for OT networks. Identity protection trends. Notes from the hybrid war.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1901</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Microsoft releases results of their investigation into cloud email compromise. A vulnerability affects a resort booking service. Adversary emulation for OT networks. Identity protection and identity attack surfaces. Sanctioning privateers (with a bonus on vacation ideas). Rob Boyce from Accenture Security tracks new trends in ransomware. Our Threat Vector segment features Mastering IR Sniping A Deliberate Approach to Cybersecurity Investigations with Chris Brewer. And Estonia warns of ongoing cyber threats.
On this segment of Threat Vector, Chris Brewer, a Director at Unit 42 and expert in digital forensics and incident response, joins host David Moulton discussing Mastering IR Sniping: A Deliberate Approach to Cybersecurity Investigations.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/171

Threat Vector links.
Sniper Incident Response from Cactus Con on GitHub
Sniper Incident Response presentation by Chris Brewer on YouTube

Selected reading.
Results of Major Technical Investigations for Storm-0558 Key Acquisition (Microsoft Security Response Center)
Check-Out With Extra Charges - Vulnerabilities in Hotel Booking Engine Explained (Bitdefender)
Deep Dive into Supply Chain Compromise: Hospitality's Hidden Risks (Bitdefender) 
MITRE and CISA release Caldera for OT attack emulation (Security Affairs) 
MITRE Caldera for OT now available as extension to open-source platform (Help Net Security)
Silverfort and Osterman Research Report Exposes Critical Gaps in Identity Threat Protection (Silverfort) 
United States and United Kingdom Sanction Additional Members of the Russia-Based Trickbot Cybercrime Gang (US Department of the Treasury)
Estonian PM: cyberspace is Ukraine war frontline (Euromaidan Press)
Cyberwar and Conventional Warfare in Ukraine (19FortyFive)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft releases results of their investigation into cloud email compromise. A vulnerability affects a resort booking service. Adversary emulation for OT networks. Identity protection and identity attack surfaces. Sanctioning privateers (with a bonus on vacation ideas). Rob Boyce from Accenture Security tracks new trends in ransomware. Our Threat Vector segment features Mastering IR Sniping A Deliberate Approach to Cybersecurity Investigations with Chris Brewer. And Estonia warns of ongoing cyber threats.</p><p>On this segment of Threat Vector, <a href="https://www.linkedin.com/in/cebrewer/">Chris Brewer</a>, a Director at Unit 42 and expert in digital forensics and incident response, joins host <a href="https://www.linkedin.com/in/davidrmoulton/">D</a>a<a href="https://www.linkedin.com/in/davidrmoulton/">vi</a>d<a href="https://www.linkedin.com/in/davidrmoulton/"> Moulton</a> discussing Mastering IR Sniping: A Deliberate Approach to Cybersecurity Investigations.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/171</p><p><br></p><h2>Threat Vector links.</h2><p><a href="https://github.com/br0kenbit/brokenbit.io/blob/main/Sniper%20Incident%20Response%20-%20CactusCon%2011.pdf">Sniper Incident Response</a> from Cactus Con on GitHub</p><p><a href="https://www.youtube.com/live/bPMAusbODK0?feature=share&amp;t=20947">Sniper Incident Response</a> presentation by Chris Brewer on YouTube</p><p><br></p><h2>Selected reading.</h2><p><a href="https://msrc.microsoft.com/blog/2023/09/results-of-major-technical-investigations-for-storm-0558-key-acquisition/">Results of Major Technical Investigations for Storm-0558 Key Acquisition</a> (Microsoft Security Response Center)</p><p><a href="https://www.bitdefender.com/blog/labs/check-out-with-extra-charges-vulnerabilities-in-hotel-booking-engine-explained/">Check-Out With Extra Charges - Vulnerabilities in Hotel Booking Engine Explained</a> (Bitdefender)</p><p><a href="https://www.bitdefender.com/blog/businessinsights/deep-dive-into-supply-chain-compromise-hospitalitys-hidden-risks/">Deep Dive into Supply Chain Compromise: Hospitality's Hidden Risks</a> (Bitdefender) </p><p><a href="https://securityaffairs.com/150420/hacking/cisa-mitre-caldera-for-ot.html">MITRE and CISA release Caldera for OT attack emulation</a> (Security Affairs) </p><p><a href="https://www.helpnetsecurity.com/2023/09/06/mitre-caldera-for-ot/">MITRE Caldera for OT now available as extension to open-source platform</a> (Help Net Security)</p><p><a href="https://www.silverfort.com/press-news/news/silverfort-and-osterman-research-report-exposes-critical-gaps-in-identity-threat-protection/">Silverfort and Osterman Research Report Exposes Critical Gaps in Identity Threat Protection</a> (Silverfort) </p><p><a href="https://home.treasury.gov/news/press-releases/jy1714">United States and United Kingdom Sanction Additional Members of the Russia-Based Trickbot Cybercrime Gang</a> (US Department of the Treasury)</p><p><a href="https://euromaidanpress.com/2023/09/06/estonian-pm-cyberspace-is-ukraine-war-frontline/">Estonian PM: cyberspace is Ukraine war frontline</a> (Euromaidan Press)</p><p><a href="https://www.19fortyfive.com/2023/09/cyberwar-and-conventional-warfare-in-ukraine/">Cyberwar and Conventional Warfare in Ukraine</a> (19FortyFive)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1628</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1210b6b8-2b53-11ee-9c79-b3a4c866fc8a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9848954576.mp3?updated=1694111996" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Agent Tesla still hits unpatched systems. Hot wallet hacks. AI and DevSecOps. Notes on Fancy Bear and NoName057(16). And some curious trends in the cyber labor market. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1900/notes</link>
      <description>There’s a new Agent Tesla variant. Lost credentials and crypto wallet hacks. Tension between DevSecOps and AI. Fancy Bear makes an attempt on Ukrainian energy infrastructure. A look at NoName057(16). Tim Starks from the Washington Post's Cybersecurity 202. Simone Petrella and Helen Patton discuss People as a security first principle. And cybersecurity jobs seem to be getting tougher (say the people who are doing them).

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/170

Selected reading.
New Agent Tesla Variant Being Spread by Crafted Excel Document (Fortinet Blog) 
World's Largest Cryptocurrency Casino Stake Hacked for $41 Million (Hackread) 
Crypto casino Stake.com loses $41 million to hot wallet hackers (BleepingComputer) 
Experts Fear Crooks are Cracking Keys Stolen in LastPass Breach (KrebsOnSecurity) 
Global DevSecOps Report on AI Shows Cybersecurity and Privacy Concerns Create an Adoption Dilemma (GitLab)
APT28 cyberattack: msedge as a bootloader, TOR and mockbin.org/website.hook services as a control center (CERT-UA#7469) (CERT-UA)
Ukraine's CERT Thwarts APT28's Cyberattack on Critical Energy Infrastructure (The Hacker News)
Ukraine says an energy facility disrupted a Fancy Bear intrusion (Record)
What's in a NoName? Researchers see a lone-wolf DDoS group (Record) 
New Research from TechTarget’s Enterprise Strategy Group and the ISSA Reveals Continuous Struggles within Cybersecurity Professional Workforce - ISSA International (ISSA International) 
Life and Times 2023 Download Landing Page (ISSA International) 
E-book: The Life and Times of Cybersecurity Professionals Volume VI (ESG Global) 
Layoffs list extended by Malwarebytes, Fortinet, Veriff, SecureWorks (Cybernews) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 06 Sep 2023 20:15:00 -0000</pubDate>
      <itunes:title>Agent Tesla still hits unpatched systems. Hot wallet hacks. AI and DevSecOps. Notes on Fancy Bear and NoName057(16). And some curious trends in the cyber labor market. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1900</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>There’s a new Agent Tesla variant. Lost credentials and crypto wallet hacks. Tension between DevSecOps and AI. Fancy Bear makes an attempt on Ukrainian energy infrastructure. A look at NoName057(16). Tim Starks from the Washington Post's Cybersecurity 202. Simone Petrella and Helen Patton discuss People as a security first principle. And cybersecurity jobs seem to be getting tougher (say the people who are doing them).

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/170

Selected reading.
New Agent Tesla Variant Being Spread by Crafted Excel Document (Fortinet Blog) 
World's Largest Cryptocurrency Casino Stake Hacked for $41 Million (Hackread) 
Crypto casino Stake.com loses $41 million to hot wallet hackers (BleepingComputer) 
Experts Fear Crooks are Cracking Keys Stolen in LastPass Breach (KrebsOnSecurity) 
Global DevSecOps Report on AI Shows Cybersecurity and Privacy Concerns Create an Adoption Dilemma (GitLab)
APT28 cyberattack: msedge as a bootloader, TOR and mockbin.org/website.hook services as a control center (CERT-UA#7469) (CERT-UA)
Ukraine's CERT Thwarts APT28's Cyberattack on Critical Energy Infrastructure (The Hacker News)
Ukraine says an energy facility disrupted a Fancy Bear intrusion (Record)
What's in a NoName? Researchers see a lone-wolf DDoS group (Record) 
New Research from TechTarget’s Enterprise Strategy Group and the ISSA Reveals Continuous Struggles within Cybersecurity Professional Workforce - ISSA International (ISSA International) 
Life and Times 2023 Download Landing Page (ISSA International) 
E-book: The Life and Times of Cybersecurity Professionals Volume VI (ESG Global) 
Layoffs list extended by Malwarebytes, Fortinet, Veriff, SecureWorks (Cybernews) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>There’s a new Agent Tesla variant. Lost credentials and crypto wallet hacks. Tension between DevSecOps and AI. Fancy Bear makes an attempt on Ukrainian energy infrastructure. A look at NoName057(16). Tim Starks from the Washington Post's Cybersecurity 202. Simone Petrella and Helen Patton discuss People as a security first principle. And cybersecurity jobs seem to be getting tougher (say the people who are doing them).</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/170</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.fortinet.com/blog/threat-research/agent-tesla-variant-spread-by-crafted-excel-document">New Agent Tesla Variant Being Spread by Crafted Excel Document</a> (Fortinet Blog) </p><p><a href="https://www.hackread.com/cryptocurrency-casino-stake-hacked-41-million/">World's Largest Cryptocurrency Casino Stake Hacked for $41 Million</a> (Hackread) </p><p><a href="https://www.bleepingcomputer.com/news/security/crypto-casino-stakecom-loses-41-million-to-hot-wallet-hackers/">Crypto casino Stake.com loses $41 million to hot wallet hackers</a> (BleepingComputer) </p><p><a href="https://krebsonsecurity.com/2023/09/experts-fear-crooks-are-cracking-keys-stolen-in-lastpass-breach/">Experts Fear Crooks are Cracking Keys Stolen in LastPass Breach</a> (KrebsOnSecurity) </p><p><a href="https://about.gitlab.com/press/releases/2023-09-05-devsecops-report-state-of-ai-in-software-development.html">Global DevSecOps Report on AI Shows Cybersecurity and Privacy Concerns Create an Adoption Dilemma </a>(GitLab)</p><p><a href="https://cert.gov.ua/article/5702579?fbclid=IwAR3XlwoRXJ793jQf96FKqvcTE6rgQtQri--9_QnzH70ceeJtE2w6OcPxL-g">APT28 cyberattack: msedge as a bootloader, TOR and mockbin.org/website.hook services as a control center (CERT-UA#7469)</a> (CERT-UA)</p><p><a href="https://thehackernews.com/2023/09/ukraines-cert-thwarts-apt28s.html">Ukraine's CERT Thwarts APT28's Cyberattack on Critical Energy Infrastructure</a> (The Hacker News)</p><p><a href="https://therecord.media/ukraine-energy-facility-cyberattack-fancy-bear-email">Ukraine says an energy facility disrupted a Fancy Bear intrusion</a> (Record)</p><p><a href="https://therecord.media/noname-hacking-group-targets-ukraine-and-allies">What's in a NoName? Researchers see a lone-wolf DDoS group</a> (Record) </p><p><a href="https://www.issa.org/new-research-from-techtargets-enterprise-strategy-group-and-the-issa-reveals-continuous-struggles-within-cybersecurity-professional-workforce/">New Research from TechTarget’s Enterprise Strategy Group and the ISSA Reveals Continuous Struggles within Cybersecurity Professional Workforce - ISSA International</a> (ISSA International) </p><p><a href="https://issai.informz.net/issai/pages/life_and_times_2023">Life and Times 2023 Download Landing Page</a> (ISSA International) </p><p><a href="https://www.esg-global.com/research/the-life-and-times-of-cybersecurity-professionals-volume-vi">E-book: The Life and Times of Cybersecurity Professionals Volume VI</a> (ESG Global) </p><p><a href="https://cybernews.com/security/layoffs-list-extended-malwarebytes-fortinet-veriff-secureworks/">Layoffs list extended by Malwarebytes, Fortinet, Veriff, SecureWorks</a> (Cybernews) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1883</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11fe86aa-2b53-11ee-9c79-1368a97ee4b6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1991134484.mp3?updated=1694026205" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>In today’s symposium, we talk about a new strand of Chae$ malware, some developments in social engineering, privateers in a hybrid war, cyber ops as combat support, and some default passwords. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1899/notes</link>
      <description>A New variant of Chae$ malware is described. A "Smishing Triad" impersonates postal services. A MinIO storage exploit reported. Okta warns of attackers seeking senior admin privileges. LockBit compromises a UK security contractor. DDoS takes down a German financial regulator's site. Infamous Chisel as GRU combat support. Joe Carrigan on Meta uncovering a Chinese influence effort. Our guest is Connie Stack, CEO of Next DLP, discussing data breach notification procedure. And please -PLEASE- remember to change your default passwords.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/169

Selected reading.
Threat Profile: Chae$ 4 Malware (Morphisec)
"Smishing Triad" Targeted USPS and US Citizens for Data Theft (Resecurity) 
'Smishing Triad' Targeted USPS and US Citizens for Data Theft (Security Affairs) 
New Attack Vector In The Cloud: Attackers caught exploiting Object Storage Services (Security Joes)
Hackers exploit MinIO storage system to breach corporate networks (BleepingComputer) 
Okta Warns of Social Engineering Attacks Targeting Super Administrator Privileges (The Hacker News) 
More Okta customers trapped in Scattered Spider's web (Register) 
Cross-Tenant Impersonation: Prevention and Detection (Okta Security)
Breaking: UK MoD attacked by LockBit (Computing)
German financial agency site disrupted by DDoS attack since Friday (BleepingComputer) 
LogicMonitor customers hacked in reported ransomware attacks (BleepingComputer)
LogicMonitor customers hit by hackers, because of default passwords (TechCrunch)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Sep 2023 20:15:00 -0000</pubDate>
      <itunes:title>In today’s symposium, we talk about a new strand of Chae$ malware, some developments in social engineering, privateers in a hybrid war, cyber ops as combat support, and some default passwords. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1899</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A New variant of Chae$ malware is described. A "Smishing Triad" impersonates postal services. A MinIO storage exploit reported. Okta warns of attackers seeking senior admin privileges. LockBit compromises a UK security contractor. DDoS takes down a German financial regulator's site. Infamous Chisel as GRU combat support. Joe Carrigan on Meta uncovering a Chinese influence effort. Our guest is Connie Stack, CEO of Next DLP, discussing data breach notification procedure. And please -PLEASE- remember to change your default passwords.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/169

Selected reading.
Threat Profile: Chae$ 4 Malware (Morphisec)
"Smishing Triad" Targeted USPS and US Citizens for Data Theft (Resecurity) 
'Smishing Triad' Targeted USPS and US Citizens for Data Theft (Security Affairs) 
New Attack Vector In The Cloud: Attackers caught exploiting Object Storage Services (Security Joes)
Hackers exploit MinIO storage system to breach corporate networks (BleepingComputer) 
Okta Warns of Social Engineering Attacks Targeting Super Administrator Privileges (The Hacker News) 
More Okta customers trapped in Scattered Spider's web (Register) 
Cross-Tenant Impersonation: Prevention and Detection (Okta Security)
Breaking: UK MoD attacked by LockBit (Computing)
German financial agency site disrupted by DDoS attack since Friday (BleepingComputer) 
LogicMonitor customers hacked in reported ransomware attacks (BleepingComputer)
LogicMonitor customers hit by hackers, because of default passwords (TechCrunch)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A New variant of Chae$ malware is described. A "Smishing Triad" impersonates postal services. A MinIO storage exploit reported. Okta warns of attackers seeking senior admin privileges. LockBit compromises a UK security contractor. DDoS takes down a German financial regulator's site. Infamous Chisel as GRU combat support. Joe Carrigan on Meta uncovering a Chinese influence effort. Our guest is Connie Stack, CEO of Next DLP, discussing data breach notification procedure. And please -PLEASE- remember to change your default passwords.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/169</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.morphisec.com/hubfs/Morphisec_Chae%244_Threat_Profile.pdf">Threat Profile: Chae$ 4 Malware</a> (Morphisec)</p><p><a href="https://www.resecurity.com/blog/article/smishing-triad-targeted-usps-and-us-citizens-for-data-theft">"Smishing Triad" Targeted USPS and US Citizens for Data Theft</a> (Resecurity) </p><p><a href="https://securityaffairs.com/150335/cyber-crime/smishing-triad-targeted-us-citizens.html">'Smishing Triad' Targeted USPS and US Citizens for Data Theft</a> (Security Affairs) </p><p><a href="https://www.securityjoes.com/post/new-attack-vector-in-the-cloud-attackers-caught-exploiting-object-storage-services">New Attack Vector In The Cloud: Attackers caught exploiting Object Storage Services</a> (Security Joes)</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-minio-storage-system-to-breach-corporate-networks/">Hackers exploit MinIO storage system to breach corporate networks</a> (BleepingComputer) </p><p><a href="https://thehackernews.com/2023/09/okta-warns-of-social-engineering.html">Okta Warns of Social Engineering Attacks Targeting Super Administrator Privileges</a> (The Hacker News) </p><p><a href="https://www.theregister.com/2023/09/01/okta_scattered_spider/">More Okta customers trapped in Scattered Spider's web</a> (Register) </p><p><a href="https://sec.okta.com/articles/2023/08/cross-tenant-impersonation-prevention-and-detection">Cross-Tenant Impersonation: Prevention and Detection</a> (Okta Security)</p><p><a href="https://www.computing.co.uk/news/4123967/breaking-uk-mod-attacked-lockbit">Breaking: UK MoD attacked by LockBit </a>(Computing)</p><p><a href="https://www.bleepingcomputer.com/news/security/german-financial-agency-site-disrupted-by-ddos-attack-since-friday/">German financial agency site disrupted by DDoS attack since Friday</a> (BleepingComputer) </p><p><a href="https://www.bleepingcomputer.com/news/security/logicmonitor-customers-hacked-in-reported-ransomware-attacks/#google_vignette">LogicMonitor customers hacked in reported ransomware attacks</a> (BleepingComputer)</p><p><a href="https://techcrunch.com/2023/08/31/logicmonitor-customers-hit-by-hackers-because-of-default-passwords/">LogicMonitor customers hit by hackers, because of default passwords</a> (TechCrunch)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1714</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11ec6f56-2b53-11ee-9c79-4ff15ed614bc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8179392517.mp3?updated=1693940815" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Interview Select: Jeff Welgan, Chief Learning Officer at N2K Networks is expanding on the NICE framework in strategic workforce intelligence. [Interview selects]</title>
      <link>https://thecyberwire.com/podcasts/interview-selects/164/notes</link>
      <description>This interview from August 25th, 2023 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner sits down with Jeff Welgan, Chief Learning Officer at N2K Networks, to expand on the NICE framework in strategic workforce intelligence.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 04 Sep 2023 07:00:00 -0000</pubDate>
      <itunes:title>Interview Select: Jeff Welgan, Chief Learning Officer at N2K Networks is expanding on the NICE framework in strategic workforce intelligence. [Interview selects]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>164</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This interview from August 25th, 2023 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner sits down with Jeff Welgan, Chief Learning Officer at N2K Networks, to expand on the NICE framework in strategic workforce intelligence.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This interview from August 25th, 2023 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner sits down with Jeff Welgan, Chief Learning Officer at N2K Networks, to expand on the NICE framework in strategic workforce intelligence.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>720</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[14541584-48ed-11ee-8243-fbe00c588589]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5027973221.mp3?updated=1693586429" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rick Doten: There is a rainbow of different roles in cybersecurity. [VP] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/165/notes</link>
      <description>This week's guest is Rick Doten, the VP of Information Security at Centene Corporation, he sits down to share his story and provide wise words of wisdom after conquering this industry for 30 years. Rick, like many others in the field started off not knowing what he wanted to do, so he tried out a few things, including doing in-user training and desktop support, eventually evolving to do systems analysis work and designing software. Rick shares that his main day to day roles are spending time helping out the corporate global CISO, CTO, and head of platform within the organization, he shares that his nickname is the neighborhood cat because he's everywhere. Rick shares advice for people getting into the industry for the first time, saying "There is a rainbow of different roles in cyber security, and I feel like I've done all of them in the last 30 years. So there are different things that, that you, the thing that like appeal to you the most because you're going to excel and want to hyper focus on the thing that you really, really are interested in and not the thing that you're not" We thank Rick for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 03 Sep 2023 07:00:00 -0000</pubDate>
      <itunes:title>Rick Doten: There is a rainbow of different roles in cybersecurity. [VP] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>165</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week's guest is Rick Doten, the VP of Information Security at Centene Corporation, he sits down to share his story and provide wise words of wisdom after conquering this industry for 30 years. Rick, like many others in the field started off not knowing what he wanted to do, so he tried out a few things, including doing in-user training and desktop support, eventually evolving to do systems analysis work and designing software. Rick shares that his main day to day roles are spending time helping out the corporate global CISO, CTO, and head of platform within the organization, he shares that his nickname is the neighborhood cat because he's everywhere. Rick shares advice for people getting into the industry for the first time, saying "There is a rainbow of different roles in cyber security, and I feel like I've done all of them in the last 30 years. So there are different things that, that you, the thing that like appeal to you the most because you're going to excel and want to hyper focus on the thing that you really, really are interested in and not the thing that you're not" We thank Rick for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week's guest is Rick Doten, the VP of Information Security at Centene Corporation, he sits down to share his story and provide wise words of wisdom after conquering this industry for 30 years. Rick, like many others in the field started off not knowing what he wanted to do, so he tried out a few things, including doing in-user training and desktop support, eventually evolving to do systems analysis work and designing software. Rick shares that his main day to day roles are spending time helping out the corporate global CISO, CTO, and head of platform within the organization, he shares that his nickname is the neighborhood cat because he's everywhere. Rick shares advice for people getting into the industry for the first time, saying "There is a rainbow of different roles in cyber security, and I feel like I've done all of them in the last 30 years. So there are different things that, that you, the thing that like appeal to you the most because you're going to excel and want to hyper focus on the thing that you really, really are interested in and not the thing that you're not" We thank Rick for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>494</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[114df60c-4c12-11ee-9fd7-83c16724a4e4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6593599743.mp3?updated=1693494555" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Thwarting Muddled Libra. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/297/notes</link>
      <description>Kristopher Russo and Stephanie Regan from Palo Alto Networks Unit 42 join Dave to talk about Threat Group Assessment: Muddled Libra. With an intimate knowledge of enterprise information technology, this threat group presents a significant risk even to organizations with well-developed legacy cyber defenses.
Posing threats to organizations in the software automation, BPO, telecommunications and technology industries, Muddled Libra is a threat group that favors targeting large outsourcing firms serving high-value cryptocurrency institutions and individuals.
The research can be found here:
Threat Group Assessment: Muddled Libra

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Sep 2023 07:00:00 -0000</pubDate>
      <itunes:title>Thwarting Muddled Libra. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>297</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Kristopher Russo and Stephanie Regan from Palo Alto Networks Unit 42 join Dave to talk about Threat Group Assessment: Muddled Libra. With an intimate knowledge of enterprise information technology, this threat group presents a significant risk even to organizations with well-developed legacy cyber defenses.
Posing threats to organizations in the software automation, BPO, telecommunications and technology industries, Muddled Libra is a threat group that favors targeting large outsourcing firms serving high-value cryptocurrency institutions and individuals.
The research can be found here:
Threat Group Assessment: Muddled Libra

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kristopher Russo and Stephanie Regan from Palo Alto Networks Unit 42 join Dave to talk about Threat Group Assessment: Muddled Libra. With an intimate knowledge of enterprise information technology, this threat group presents a significant risk even to organizations with well-developed legacy cyber defenses.</p><p>Posing threats to organizations in the software automation, BPO, telecommunications and technology industries, Muddled Libra is a threat group that favors targeting large outsourcing firms serving high-value cryptocurrency institutions and individuals.</p><p>The research can be found here:</p><ul><li><a href="https://unit42.paloaltonetworks.com/muddled-libra/?utm_source=cyberwire-podcast-&amp;utm_medium=episode2">Threat Group Assessment: Muddled Libra</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1805</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5f000298-480f-11ee-8e6b-ef98f81d33e9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9894976036.mp3?updated=1693494262" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DPRK cyberespionage update. New cybercriminal TTPs. The state of DevSecOps. Hacktivism and the nation-state. Cyberwar lessons learned. A free decryptor for Key Group ransomware. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1898/notes</link>
      <description>A VMConnect supply chain attack is connected to the DPRK. Reports of an aledgedly "fully undetectable information stealer." DB#JAMMER brute forces exposed MSSQL databases. A Cyberattack on a Canadian utility. The state of DevSecOps. A look at hacktivism, today and beyond. Betsy Carmelite from Booz Allen on threat intelligence as part of a third-party risk management program. Our guest is Adam Marré from Arctic Wolf Networks, with an analysis of Chinese cyber tactics. And a free decryptor is released for Key Group ransomware.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/168

Selected reading.
VMConnect supply chain attack continues, evidence points to North Korea (ReversingLabs) 
Securonix Threat Labs Security Advisory: Threat Actors Target MSSQL Servers in DB#JAMMER to Deliver FreeWorld Ransomware (Securonix)
Montreal electricity organization latest victim in LockBit ransomware spree (Record)
LockBit ransomware gang targets electrical infrastructure organization in Montreal (teiss)
[Analyst Report] SANS 2023 DevSecOps Survey (Synopsys)
SANS 2023 DevSecOps Survey (Application Security Blog)
Government Agencies Report New Russian Malware Targets Ukrainian Military (National Security Agency/Central Security Service)
Russian military hackers take aim at Ukrainian soldiers' battle plans, US and allies say (CNN)
Ukraine: The First Cyber Lessons (AFCEA International)
The Return of Hacktivism: A Temporary Reprise or Here for Good? (ReliaQuest)
Decrypting Key Group Ransomware: Emerging Financially Motivated Cyber Crime Gang (EclecticIQ)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 01 Sep 2023 20:15:00 -0000</pubDate>
      <itunes:title>DPRK cyberespionage update. New cybercriminal TTPs. The state of DevSecOps. Hacktivism and the nation-state. Cyberwar lessons learned. A free decryptor for Key Group ransomware. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1898</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A VMConnect supply chain attack is connected to the DPRK. Reports of an aledgedly "fully undetectable information stealer." DB#JAMMER brute forces exposed MSSQL databases. A Cyberattack on a Canadian utility. The state of DevSecOps. A look at hacktivism, today and beyond. Betsy Carmelite from Booz Allen on threat intelligence as part of a third-party risk management program. Our guest is Adam Marré from Arctic Wolf Networks, with an analysis of Chinese cyber tactics. And a free decryptor is released for Key Group ransomware.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/168

Selected reading.
VMConnect supply chain attack continues, evidence points to North Korea (ReversingLabs) 
Securonix Threat Labs Security Advisory: Threat Actors Target MSSQL Servers in DB#JAMMER to Deliver FreeWorld Ransomware (Securonix)
Montreal electricity organization latest victim in LockBit ransomware spree (Record)
LockBit ransomware gang targets electrical infrastructure organization in Montreal (teiss)
[Analyst Report] SANS 2023 DevSecOps Survey (Synopsys)
SANS 2023 DevSecOps Survey (Application Security Blog)
Government Agencies Report New Russian Malware Targets Ukrainian Military (National Security Agency/Central Security Service)
Russian military hackers take aim at Ukrainian soldiers' battle plans, US and allies say (CNN)
Ukraine: The First Cyber Lessons (AFCEA International)
The Return of Hacktivism: A Temporary Reprise or Here for Good? (ReliaQuest)
Decrypting Key Group Ransomware: Emerging Financially Motivated Cyber Crime Gang (EclecticIQ)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A VMConnect supply chain attack is connected to the DPRK. Reports of an aledgedly "fully undetectable information stealer." DB#JAMMER brute forces exposed MSSQL databases. A Cyberattack on a Canadian utility. The state of DevSecOps. A look at hacktivism, today and beyond. Betsy Carmelite from Booz Allen on threat intelligence as part of a third-party risk management program. Our guest is Adam Marré from Arctic Wolf Networks, with an analysis of Chinese cyber tactics. And a free decryptor is released for Key Group ransomware.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/168</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.reversinglabs.com/blog/vmconnect-supply-chain-campaign-continues">VMConnect supply chain attack continues, evidence points to North Korea</a> (ReversingLabs) </p><p><a href="https://www.securonix.com/blog/securonix-threat-labs-security-advisory-threat-actors-target-mssql-servers-in-dbjammer-to-deliver-freeworld-ransomware/">Securonix Threat Labs Security Advisory: Threat Actors Target MSSQL Servers in DB#JAMMER to Deliver FreeWorld Ransomware</a> (Securonix)</p><p><a href="https://therecord.media/montreal-electricity-organization-lockbit-victim">Montreal electricity organization latest victim in LockBit ransomware spree</a> (Record)</p><p><a href="https://www.teiss.co.uk/news/news-scroller/lockbit-ransomware-gang-targets-electrical-infrastructure-organization-in-montreal-12786">LockBit ransomware gang targets electrical infrastructure organization in Montreal</a> (teiss)</p><p><a href="https://www.synopsys.com/software-integrity/resources/analyst-reports/sans-devsecops-survey.html?intcmp=sig-blog-SANS2023">[Analyst Report] SANS 2023 DevSecOps Survey</a> (Synopsys)</p><p><a href="https://www.synopsys.com/blogs/software-security/sans-devsecops-survey/">SANS 2023 DevSecOps Survey</a> (Application Security Blog)</p><p><a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3511738/government-agencies-report-new-russian-malware-targets-ukrainian-military/">Government Agencies Report New Russian Malware Targets Ukrainian Military</a> (National Security Agency/Central Security Service)</p><p><a href="https://www.cnn.com/2023/08/31/politics/military-hackers-russia-ukraine/index.html">Russian military hackers take aim at Ukrainian soldiers' battle plans, US and allies say</a> (CNN)</p><p><a href="https://www.afcea.org/signal-media/cyber-edge/ukraine-first-cyber-lessons">Ukraine: The First Cyber Lessons</a> (AFCEA International)</p><p><a href="https://www.reliaquest.com/blog/return-of-hacktivism-temporary-reprise-or-here-for-good/">The Return of Hacktivism: A Temporary Reprise or Here for Good?</a> (ReliaQuest)</p><p><a href="https://blog.eclecticiq.com/decrypting-key-group-ransomware-emerging-financially-motivated-cyber-crime-gang">Decrypting Key Group Ransomware: Emerging Financially Motivated Cyber Crime Gang</a> (EclecticIQ)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1893</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11c5fe70-2b53-11ee-9c79-ffc5afd15873]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4510769972.mp3?updated=1693597532" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>GREF and Earth Estries from China. GRU’s Sandworm surfaces again, wielding “Infamous Chisel.” Hacktivist nuisances in the hybrid war. A zero-day is discovered. And the Wolverines are back online.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1897/notes</link>
      <description>China deploys tools used against Uyghurs in broader espionage. The Five Eyes call out a GRU cyberespionage campaign. Russian hacktivist auxiliaries hit Czech banks and the platform formerly known as Twitter. A Spring-Kafka zero-day is discovered. Deepen Desai from Zscaler explains RedEnergy Stealer-as-a-Ransomware attacks. Luke Nelson of UHY Consulting on ransomware’s impact on schools. And, hey, go Wolverines: the University of Michigan overcomes a cyberattack that delayed the academic year.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/167

Selected reading.
BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps (We Live Security) 
Earth Estries Targets Government, Tech for Cyberespionage (Trend Micro) 
Infamous Chisel Malware Analysis Report (Cybersecurity and Infrastructure Security Agency CISA)
UK and allies support Ukraine calling out Russia's GRU for new malware campaign (NCSC) 
Hackers Attack Czech Banks, Demanding End of Support For Ukraine (Brno Daily) 
More Russian attacks on Czech banks: Hackers call for end of support to Ukraine (Expats.cz)
Anonymous Sudan hacks X to put pressure on Elon Musk over Starlink (BBC News) 
Contrast Assess uncovers Spring-Kafka deserialization zero day (Contrast Security)
U. Michigan restores campus internet after cyberattack disrupts first week of classes (EdScoop)
Internet restored on University of Michigan campus, ongoing issues still expected (mlive)
University of Michigan isn't disclosing details of internet outage cyberattack (Detroit Free Press)
Expert weighs in on school cyberattacks as University of Michigan makes progress on internet outages (CBS News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 31 Aug 2023 20:15:00 -0000</pubDate>
      <itunes:title>GREF and Earth Estries from China. GRU’s Sandworm surfaces again, wielding “Infamous Chisel.” Hacktivist nuisances in the hybrid war. A zero-day is discovered. And the Wolverines are back online.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1897</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>China deploys tools used against Uyghurs in broader espionage. The Five Eyes call out a GRU cyberespionage campaign. Russian hacktivist auxiliaries hit Czech banks and the platform formerly known as Twitter. A Spring-Kafka zero-day is discovered. Deepen Desai from Zscaler explains RedEnergy Stealer-as-a-Ransomware attacks. Luke Nelson of UHY Consulting on ransomware’s impact on schools. And, hey, go Wolverines: the University of Michigan overcomes a cyberattack that delayed the academic year.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/167

Selected reading.
BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps (We Live Security) 
Earth Estries Targets Government, Tech for Cyberespionage (Trend Micro) 
Infamous Chisel Malware Analysis Report (Cybersecurity and Infrastructure Security Agency CISA)
UK and allies support Ukraine calling out Russia's GRU for new malware campaign (NCSC) 
Hackers Attack Czech Banks, Demanding End of Support For Ukraine (Brno Daily) 
More Russian attacks on Czech banks: Hackers call for end of support to Ukraine (Expats.cz)
Anonymous Sudan hacks X to put pressure on Elon Musk over Starlink (BBC News) 
Contrast Assess uncovers Spring-Kafka deserialization zero day (Contrast Security)
U. Michigan restores campus internet after cyberattack disrupts first week of classes (EdScoop)
Internet restored on University of Michigan campus, ongoing issues still expected (mlive)
University of Michigan isn't disclosing details of internet outage cyberattack (Detroit Free Press)
Expert weighs in on school cyberattacks as University of Michigan makes progress on internet outages (CBS News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>China deploys tools used against Uyghurs in broader espionage. The Five Eyes call out a GRU cyberespionage campaign. Russian hacktivist auxiliaries hit Czech banks and the platform formerly known as Twitter. A Spring-Kafka zero-day is discovered. Deepen Desai from Zscaler explains RedEnergy Stealer-as-a-Ransomware attacks. Luke Nelson of UHY Consulting on ransomware’s impact on schools. And, hey, go Wolverines: the University of Michigan overcomes a cyberattack that delayed the academic year.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/167</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.welivesecurity.com/en/eset-research/badbazaar-espionage-tool-targets-android-users-trojanized-signal-telegram-apps/">BadBazaar espionage tool targets Android users via trojanized Signal and Telegram apps</a> (We Live Security) </p><p><a href="https://www.trendmicro.com/en_us/research/23/h/earth-estries-targets-government-tech-for-cyberespionage.html">Earth Estries Targets Government, Tech for Cyberespionage</a> (Trend Micro) </p><p><a href="https://www.cisa.gov/news-events/analysis-reports/ar23-243a">Infamous Chisel Malware Analysis Report</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.ncsc.gov.uk/news/uk-allies-support-ukraine-calling-out-russia-gru-malware-campaign">UK and allies support Ukraine calling out Russia's GRU for new malware campaign</a> (NCSC) </p><p><a href="https://brnodaily.com/2023/08/31/news/hackers-attack-czech-banks-demanding-end-of-support-for-ukraine/">Hackers Attack Czech Banks, Demanding End of Support For Ukraine</a> (Brno Daily) </p><p><a href="https://www.expats.cz/czech-news/article/russian-hackers-attack-czech-banks-call-for-ending-ukraine-support">More Russian attacks on Czech banks: Hackers call for end of support to Ukraine</a> (Expats.cz)</p><p><a href="https://www.bbc.com/news/technology-66668053">Anonymous Sudan hacks X to put pressure on Elon Musk over Starlink</a> (BBC News) </p><p><a href="https://www.contrastsecurity.com/security-influencers/contrast-assess-uncovers-spring-kafka-deserialization-zero-day">Contrast Assess uncovers Spring-Kafka deserialization zero day</a> (Contrast Security)</p><p><a href="https://edscoop.com/university-michigan-campus-internet-cyberattack/">U. Michigan restores campus internet after cyberattack disrupts first week of classes</a> (EdScoop)</p><p><a href="https://www.mlive.com/news/ann-arbor/2023/08/internet-restored-on-university-of-michigan-campus-ongoing-issues-still-expected.html">Internet restored on University of Michigan campus, ongoing issues still expected</a> (mlive)</p><p><a href="https://www.freep.com/story/news/local/michigan/2023/08/30/university-michigan-internet-outage-cyber-attack-malware/70715772007/">University of Michigan isn't disclosing details of internet outage cyberattack</a> (Detroit Free Press)</p><p><a href="https://www.cbsnews.com/detroit/news/expert-weighs-in-on-school-cyberattacks-as-u-of-m-makes-progress-on-internet-outages/">Expert weighs in on school cyberattacks as University of Michigan makes progress on internet outages</a> (CBS News)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1641</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11b2cd0a-2b53-11ee-9c79-eff728055158]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2492969792.mp3?updated=1693592427" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An international hunt bags Qakbot’s infrastructure. Anticipating remediation. Adversaries in the middle. More effective phishbait. Air travel disruption was a glitch, not an attack. Hybrid war update.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1896/notes</link>
      <description>An international operation takes down Qakbot. Chinese threat actors anticipated Barracuda remediations. A look at adversary-in-the-middle attacks, making phishbait more effective and the emergence of a new ransomware threat. Narrative themes in Russian influence operations. My conversation with Natasha Eastman from (CISA), Bill Newhouse from (NIST), and Troy Lange from (NSA) to discuss their recent joint advisory on post-quantum readiness. Microsoft’s Ann Johnson from Afternoon Cyber Tea speaks with Cyber Threat Alliance President and CEO Michael Daniel about the current state of cybercrime. And when toilet bowls are outlawed, only outlaws will have toilet bowls.

Listen to the full conversation with Natasha Eastman, Bill Newhouse, and Troy Lange here: A joint advisory on post-quantum readiness.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/165

Selected reading.
Operation Duck Hunt bags Qakbot. (CyberWire)
FBI, Partners Dismantle Qakbot Infrastructure in Multinational Cyber Takedown (Federal Bureau of Investigation)
Qakbot Malware Disrupted in International Cyber Takedown (US Department of Justice)
Law Enforcement Takes Down Qakbot (Secureworks)
Qakbot: Takedown Operation Dismantles Botnet Infrastructure (Symantec) 
Chinese APT Was Prepared for Remediation Efforts in Barracuda ESG Zero-Day Attack (SecurityWeek) 
Phishing-as-a-Service Gets Smarter: Microsoft Sounds Alarm on AiTM Attacks (The Hacker News)
The Lure of Subject Lines in Phishing Emails - How Threat Actors Utilize Dates to Trick Victims (Cofense)
The Emergence of Ransomed: An Uncertain Cyber Threat in the Making (Flashpoint)
Cancelled flights: Air traffic disruption caused by flight data issue (BBC News)
Russian Offensive Campaign Assessment, August 29, 2023 (Institute for the Study of War)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 30 Aug 2023 20:15:00 -0000</pubDate>
      <itunes:title>An international hunt bags Qakbot’s infrastructure. Anticipating remediation. Adversaries in the middle. More effective phishbait. Air travel disruption was a glitch, not an attack. Hybrid war update.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1896</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An international operation takes down Qakbot. Chinese threat actors anticipated Barracuda remediations. A look at adversary-in-the-middle attacks, making phishbait more effective and the emergence of a new ransomware threat. Narrative themes in Russian influence operations. My conversation with Natasha Eastman from (CISA), Bill Newhouse from (NIST), and Troy Lange from (NSA) to discuss their recent joint advisory on post-quantum readiness. Microsoft’s Ann Johnson from Afternoon Cyber Tea speaks with Cyber Threat Alliance President and CEO Michael Daniel about the current state of cybercrime. And when toilet bowls are outlawed, only outlaws will have toilet bowls.

Listen to the full conversation with Natasha Eastman, Bill Newhouse, and Troy Lange here: A joint advisory on post-quantum readiness.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/165

Selected reading.
Operation Duck Hunt bags Qakbot. (CyberWire)
FBI, Partners Dismantle Qakbot Infrastructure in Multinational Cyber Takedown (Federal Bureau of Investigation)
Qakbot Malware Disrupted in International Cyber Takedown (US Department of Justice)
Law Enforcement Takes Down Qakbot (Secureworks)
Qakbot: Takedown Operation Dismantles Botnet Infrastructure (Symantec) 
Chinese APT Was Prepared for Remediation Efforts in Barracuda ESG Zero-Day Attack (SecurityWeek) 
Phishing-as-a-Service Gets Smarter: Microsoft Sounds Alarm on AiTM Attacks (The Hacker News)
The Lure of Subject Lines in Phishing Emails - How Threat Actors Utilize Dates to Trick Victims (Cofense)
The Emergence of Ransomed: An Uncertain Cyber Threat in the Making (Flashpoint)
Cancelled flights: Air traffic disruption caused by flight data issue (BBC News)
Russian Offensive Campaign Assessment, August 29, 2023 (Institute for the Study of War)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An international operation takes down Qakbot. Chinese threat actors anticipated Barracuda remediations. A look at adversary-in-the-middle attacks, making phishbait more effective and the emergence of a new ransomware threat. Narrative themes in Russian influence operations. My conversation with Natasha Eastman from (CISA), Bill Newhouse from (NIST), and Troy Lange from (NSA) to discuss their recent joint advisory on post-quantum readiness. Microsoft’s Ann Johnson from Afternoon Cyber Tea speaks with Cyber Threat Alliance President and CEO Michael Daniel about the current state of cybercrime. And when toilet bowls are outlawed, only outlaws will have toilet bowls.</p><p><br></p><p>Listen to the full conversation with Natasha Eastman, Bill Newhouse, and Troy Lange here: <a href="https://thecyberwire.com/podcasts/special-edition/53/notes">A joint advisory on post-quantum readiness.</a></p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/165</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/stories/26fc073b51cc47e385764e6363d10a81/operation-duck-hunt-bags-qakbot">Operation Duck Hunt bags Qakbot.</a> (CyberWire)</p><p><a href="https://www.fbi.gov/news/stories/fbi-partners-dismantle-qakbot-infrastructure-in-multinational-cyber-takedown">FBI, Partners Dismantle Qakbot Infrastructure in Multinational Cyber Takedown</a> (Federal Bureau of Investigation)</p><p><a href="https://www.justice.gov/usao-cdca/pr/qakbot-malware-disrupted-international-cyber-takedown">Qakbot Malware Disrupted in International Cyber Takedown</a> (US Department of Justice)</p><p><a href="https://www.secureworks.com/blog/law-enforcement-takes-down-qakbot">Law Enforcement Takes Down Qakbot</a> (Secureworks)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/qakbot-takedown-disruption">Qakbot: Takedown Operation Dismantles Botnet Infrastructure </a>(Symantec) </p><p><a href="https://www.securityweek.com/chinese-apt-was-prepared-for-remediation-efforts-in-barracuda-esg-zero-day-attack/">Chinese APT Was Prepared for Remediation Efforts in Barracuda ESG Zero-Day Attack</a> (SecurityWeek) </p><p><a href="https://thehackernews.com/2023/08/phishing-as-service-gets-smarter.html">Phishing-as-a-Service Gets Smarter: Microsoft Sounds Alarm on AiTM Attacks</a> (The Hacker News)</p><p><a href="https://cofense.com/blog/phishing-email-subject-lines/">The Lure of Subject Lines in Phishing Emails - How Threat Actors Utilize Dates to Trick Victims</a> (Cofense)</p><p><a href="https://flashpoint.io/blog/ransomed-uncertain-cyber-threat/">The Emergence of Ransomed: An Uncertain Cyber Threat in the Making</a> (Flashpoint)</p><p><a href="https://www.bbc.com/news/uk-66644369">Cancelled flights: Air traffic disruption caused by flight data issue</a> (BBC News)</p><p><a href="https://www.understandingwar.org/backgrounder/russian-offensive-campaign-assessment-august-29-2023">Russian Offensive Campaign Assessment, August 29, 2023</a> (Institute for the Study of War)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1787</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11a062b4-2b53-11ee-9c79-cb6657e4ce80]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9868195178.mp3?updated=1693426799" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A joint advisory on post-quantum readiness. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/53/notes</link>
      <description>In this extended interview, Dave Bittner sits down with Natasha Eastman from the Cybersecurity and Infrastructure Security Agency (CISA), Bill Newhouse from the National Institute of Standards and Technology (NIST), and Troy Lange from the National Security Agency (NSA) to discuss their their recent joint advisory on post-quantum readiness and how to prepare for post-quantum cryptography.
You can find the joint advisory here:

Quantum-Readiness: Migration to Post-Quantum Cryptography

Quantum computing: A threat to asymmetric encryption.


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 30 Aug 2023 07:00:00 -0000</pubDate>
      <itunes:title>A joint advisory on post-quantum readiness. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>53</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this extended interview, Dave Bittner sits down with Natasha Eastman from the Cybersecurity and Infrastructure Security Agency (CISA), Bill Newhouse from the National Institute of Standards and Technology (NIST), and Troy Lange from the National Security Agency (NSA) to discuss their their recent joint advisory on post-quantum readiness and how to prepare for post-quantum cryptography.
You can find the joint advisory here:

Quantum-Readiness: Migration to Post-Quantum Cryptography

Quantum computing: A threat to asymmetric encryption.


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this extended interview, Dave Bittner sits down with Natasha Eastman from the Cybersecurity and Infrastructure Security Agency (CISA), Bill Newhouse from the National Institute of Standards and Technology (NIST), and Troy Lange from the National Security Agency (NSA) to discuss their their recent joint advisory on post-quantum readiness and how to prepare for post-quantum cryptography.</p><p>You can find the joint advisory here:</p><ul>
<li><a href="https://www.cisa.gov/resources-tools/resources/quantum-readiness-migration-post-quantum-cryptography">Quantum-Readiness: Migration to Post-Quantum Cryptography</a></li>
<li><a href="https://thecyberwire.com/podcasts/cso-perspectives/107/notes">Quantum computing: A threat to asymmetric encryption.</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1362</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3c4b0858-4740-11ee-9ac6-572cf2c260ad]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4337606077.mp3?updated=1695409640" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Name collision. Spawn of LockBit. Quishing the unwary and the hasty. Trends in healthcare cybersecurity. Inquiries surrounding Russia’s hybrid war against Ukraine.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1895/notes</link>
      <description>Name collision as a DNS risk. A LockBit derivative is active against targets in Spain. QR codes as phishbait. Cybersecurity trends in Healthcare. A Russian hacktivist auxiliary hits Polish organizations, while investigation of railroad incidents in Poland continues. Ben Yelin looks at the SEC cracking down on NFTs. Mr. Security Answer Person John Pescatore opens up the listener mail bag. And a look at a probably accidental glitch affecting air travel in the UK.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/164

Selected reading.
What's in a name? Strange behaviors at top-level domains creates uncertainty in DNS (Cisco Talos) 
Spain warns of LockBit Locker ransomware phishing attacks (BleepingComputer) 
Think Before You Scan: The Rise of QR Codes in Phishing (Trustwave SpiderLabs)
78% of Healthcare Organizations Experienced Cyber Incidents in Past Year, 60% of Which Impacted Patient Care (Claroty) 
Polish stock exchange, banks knocked offline by pro-Russian hackers (Cybernews) 
Two Men Arrested Following Poland Railway Hacking (SecurityWeek) 
Century-old technology hack brought 20 trains to a halt in Poland (Cybernews) 
Poland investigates train mishaps for possible Russian connection (Washington Post) 
Flight chaos ‘to last for days’ after air traffic control failure (The Telegraph) 
UK flight chaos could last for days, airline passengers warned (the Guardian) 
Government can’t rule out cyber attack caused air traffic chaos (MSN)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Aug 2023 20:15:00 -0000</pubDate>
      <itunes:title>Name collision. Spawn of LockBit. Quishing the unwary and the hasty. Trends in healthcare cybersecurity. Inquiries surrounding Russia’s hybrid war against Ukraine.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1895</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Name collision as a DNS risk. A LockBit derivative is active against targets in Spain. QR codes as phishbait. Cybersecurity trends in Healthcare. A Russian hacktivist auxiliary hits Polish organizations, while investigation of railroad incidents in Poland continues. Ben Yelin looks at the SEC cracking down on NFTs. Mr. Security Answer Person John Pescatore opens up the listener mail bag. And a look at a probably accidental glitch affecting air travel in the UK.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/164

Selected reading.
What's in a name? Strange behaviors at top-level domains creates uncertainty in DNS (Cisco Talos) 
Spain warns of LockBit Locker ransomware phishing attacks (BleepingComputer) 
Think Before You Scan: The Rise of QR Codes in Phishing (Trustwave SpiderLabs)
78% of Healthcare Organizations Experienced Cyber Incidents in Past Year, 60% of Which Impacted Patient Care (Claroty) 
Polish stock exchange, banks knocked offline by pro-Russian hackers (Cybernews) 
Two Men Arrested Following Poland Railway Hacking (SecurityWeek) 
Century-old technology hack brought 20 trains to a halt in Poland (Cybernews) 
Poland investigates train mishaps for possible Russian connection (Washington Post) 
Flight chaos ‘to last for days’ after air traffic control failure (The Telegraph) 
UK flight chaos could last for days, airline passengers warned (the Guardian) 
Government can’t rule out cyber attack caused air traffic chaos (MSN)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Name collision as a DNS risk. A LockBit derivative is active against targets in Spain. QR codes as phishbait. Cybersecurity trends in Healthcare. A Russian hacktivist auxiliary hits Polish organizations, while investigation of railroad incidents in Poland continues. Ben Yelin looks at the SEC cracking down on NFTs. Mr. Security Answer Person John Pescatore opens up the listener mail bag. And a look at a probably accidental glitch affecting air travel in the UK.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/164</p><p><br></p><h2>Selected reading.</h2><p><a href="https://blog.talosintelligence.com/whats-in-a-name/">What's in a name? Strange behaviors at top-level domains creates uncertainty in DNS</a> (Cisco Talos) </p><p><a href="https://www.bleepingcomputer.com/news/security/spain-warns-of-lockbit-locker-ransomware-phishing-attacks/">Spain warns of LockBit Locker ransomware phishing attacks</a> (BleepingComputer) </p><p><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/think-before-you-scan-the-rise-of-qr-codes-in-phishing/">Think Before You Scan: The Rise of QR Codes in Phishing</a> (Trustwave SpiderLabs)</p><p><a href="https://claroty.com/press-releases/78-of-healthcare-organizations-experienced-cyber-incidents-in-past-year-60-of-which-impacted-patient-care">78% of Healthcare Organizations Experienced Cyber Incidents in Past Year, 60% of Which Impacted Patient Care</a> (Claroty) </p><p><a href="https://cybernews.com/cyber-war/polish-stock-exchange-banks-knocked-offline-by-pro-russian-hackers/">Polish stock exchange, banks knocked offline by pro-Russian hackers</a> (Cybernews) </p><p><a href="https://www.securityweek.com/two-men-arrested-following-poland-railway-hacking/">Two Men Arrested Following Poland Railway Hacking</a> (SecurityWeek) </p><p><a href="https://cybernews.com/news/century-old-technology-hack-brought-20-trains-to-a-halt-in-poland/">Century-old technology hack brought 20 trains to a halt in Poland</a> (Cybernews) </p><p><a href="https://www.washingtonpost.com/world/2023/08/28/poland-hacking-trains-russia/">Poland investigates train mishaps for possible Russian connection</a> (Washington Post) </p><p><a href="https://www.telegraph.co.uk/news/2023/08/28/air-traffic-control-grounds-uk-flights-live-latest-updates/">Flight chaos ‘to last for days’ after air traffic control failure</a> (The Telegraph) </p><p><a href="https://www.theguardian.com/world/2023/aug/28/uk-air-traffic-control-hit-network-wide-failure-airline">UK flight chaos could last for days, airline passengers warned</a> (the Guardian) </p><p><a href="https://www.msn.com/en-gb/news/world/government-can-t-rule-out-cyber-attack-caused-air-traffic-chaos/ar-AA1fTpa8">Government can’t rule out cyber attack caused air traffic chaos</a> (MSN)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1554</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a52b6842-469e-11ee-88b5-73477d5f2913]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2263578481.mp3?updated=1693338028" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DPRK's Lazarus Group exploits ManageEngine issues. SIM swapping as a threat to organizations. Ransomware hits a cloud provider. Spawn of LockBit. Train whistling. Influence laundering.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1894/notes</link>
      <description>The DPRK's Lazarus Group exploits ManageEngine issues. A Data breach at Kroll is traced to SIM swapping. Unusually destructive ransomware hits CloudNordic. Spawn of LockBit. Polish trains are disrupted by hacktivists. Rick Howard looks at the MITRE attack framework. Our guests are Andrew Hammond and Erin Dietrick from the International Spy Museum. And Influence laundering as a long-term disinformation tactic.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/163

Selected reading.
North Korean APT Hacks Internet Infrastructure Provider via ManageEngine Flaw (SecurityWeek)
Lazarus Group exploited ManageEngine vulnerability to target critical infrastructure (Help Net Security)
Cyber scams keep North Korean missiles flying (Radio Free Asia)
Claimant Data Breached in Genesis, FTX and BlockFi Bankruptcy Cases (Wall Street Journal)
Kroll data breach exposes info of FTX, BlockFi, Genesis creditors (BleepingComputer)
Crypto investor data exposed by a SIM swapping attack against a Kroll employee (Security Affairs)
Kroll Employee SIM-Swapped for Crypto Investor Data (KrebsOnSecurity)
Kroll Suffers Data Breach: Employee Falls Victim to SIM Swapping Attack (The Hacker News)
FTX bankruptcy handler Kroll discloses data breach (The Stack)
CloudNordic Faces Severe Data Loss After Ransomware Attack (Hackread) 
CloudNordic loses most customer data after ransomware attack | TechTarget (Security) 
Lockbit leak, research opportunities on tools leaked from TAs (SecureList)
LockBit 3.0 Ransomware Builder Leak Gives Rise to Hundreds of New Variants (The Hacker News)
Poland investigates cyber-attack on rail network (BBC News)
Poland investigates hacking attack on state railway network (Reuters)
Hackers bring down Poland’s train network in massive cyber attack (Ticker News) 
The Cheap Radio Hack That Disrupted Poland's Railway System (WIRED)
Russia Pushes Long-Term Influence Operations Aimed at the U.S. and Europe (New York Times)
Newly declassified US intel claims Russia is laundering propaganda through unwitting Westerners (CNN Politics)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 28 Aug 2023 20:15:00 -0000</pubDate>
      <itunes:title>DPRK's Lazarus Group exploits ManageEngine issues. SIM swapping as a threat to organizations. Ransomware hits a cloud provider. Spawn of LockBit. Train whistling. Influence laundering.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1894</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The DPRK's Lazarus Group exploits ManageEngine issues. A Data breach at Kroll is traced to SIM swapping. Unusually destructive ransomware hits CloudNordic. Spawn of LockBit. Polish trains are disrupted by hacktivists. Rick Howard looks at the MITRE attack framework. Our guests are Andrew Hammond and Erin Dietrick from the International Spy Museum. And Influence laundering as a long-term disinformation tactic.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/163

Selected reading.
North Korean APT Hacks Internet Infrastructure Provider via ManageEngine Flaw (SecurityWeek)
Lazarus Group exploited ManageEngine vulnerability to target critical infrastructure (Help Net Security)
Cyber scams keep North Korean missiles flying (Radio Free Asia)
Claimant Data Breached in Genesis, FTX and BlockFi Bankruptcy Cases (Wall Street Journal)
Kroll data breach exposes info of FTX, BlockFi, Genesis creditors (BleepingComputer)
Crypto investor data exposed by a SIM swapping attack against a Kroll employee (Security Affairs)
Kroll Employee SIM-Swapped for Crypto Investor Data (KrebsOnSecurity)
Kroll Suffers Data Breach: Employee Falls Victim to SIM Swapping Attack (The Hacker News)
FTX bankruptcy handler Kroll discloses data breach (The Stack)
CloudNordic Faces Severe Data Loss After Ransomware Attack (Hackread) 
CloudNordic loses most customer data after ransomware attack | TechTarget (Security) 
Lockbit leak, research opportunities on tools leaked from TAs (SecureList)
LockBit 3.0 Ransomware Builder Leak Gives Rise to Hundreds of New Variants (The Hacker News)
Poland investigates cyber-attack on rail network (BBC News)
Poland investigates hacking attack on state railway network (Reuters)
Hackers bring down Poland’s train network in massive cyber attack (Ticker News) 
The Cheap Radio Hack That Disrupted Poland's Railway System (WIRED)
Russia Pushes Long-Term Influence Operations Aimed at the U.S. and Europe (New York Times)
Newly declassified US intel claims Russia is laundering propaganda through unwitting Westerners (CNN Politics)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The DPRK's Lazarus Group exploits ManageEngine issues. A Data breach at Kroll is traced to SIM swapping. Unusually destructive ransomware hits CloudNordic. Spawn of LockBit. Polish trains are disrupted by hacktivists. Rick Howard looks at the MITRE attack framework. Our guests are Andrew Hammond and Erin Dietrick from the International Spy Museum. And Influence laundering as a long-term disinformation tactic.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/163</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.securityweek.com/north-korean-apt-hacks-internet-infrastructure-provider-via-manageengine-flaw/">North Korean APT Hacks Internet Infrastructure Provider via ManageEngine Flaw</a> (SecurityWeek)</p><p><a href="https://www.helpnetsecurity.com/2023/08/25/lazarus-group-manageengine/">Lazarus Group exploited ManageEngine vulnerability to target critical infrastructure</a> (Help Net Security)</p><p><a href="https://www.rfa.org/english/news/korea/hacking-08252023094736.html">Cyber scams keep North Korean missiles flying</a> (Radio Free Asia)</p><p><a href="https://www.wsj.com/articles/claimant-data-breached-in-genesis-ftx-and-blockfi-bankruptcy-cases-6d506e2d">Claimant Data Breached in Genesis, FTX and BlockFi Bankruptcy Cases</a> (Wall Street Journal)</p><p><a href="https://www.bleepingcomputer.com/news/security/kroll-data-breach-exposes-info-of-ftx-blockfi-genesis-creditors/">Kroll data breach exposes info of FTX, BlockFi, Genesis creditors</a> (BleepingComputer)</p><p><a href="https://securityaffairs.com/149878/cyber-crime/kroll-sim-swapping-attack.html">Crypto investor data exposed by a SIM swapping attack against a Kroll employee</a> (Security Affairs)</p><p><a href="https://krebsonsecurity.com/2023/08/kroll-employee-sim-swapped-for-crypto-investor-data/">Kroll Employee SIM-Swapped for Crypto Investor Data</a> (KrebsOnSecurity)</p><p><a href="https://thehackernews.com/2023/08/kroll-suffers-data-breach-employee.html">Kroll Suffers Data Breach: Employee Falls Victim to SIM Swapping Attack</a> (The Hacker News)</p><p><a href="https://www.thestack.technology/ftx-claims-broker-data-breach/">FTX bankruptcy handler Kroll discloses data breach</a> (The Stack)</p><p><a href="https://www.hackread.com/cloudnordic-data-loss-ransomware-attack/">CloudNordic Faces Severe Data Loss After Ransomware Attack</a> (Hackread) </p><p><a href="https://www.techtarget.com/searchsecurity/news/366549773/CloudNordic-loses-most-customer-data-after-ransomware-attack">CloudNordic loses most customer data after ransomware attack | TechTarget</a> (Security) </p><p><a href="https://securelist.com/lockbit-ransomware-builder-analysis/110370/">Lockbit leak, research opportunities on tools leaked from TAs</a> (SecureList)</p><p><a href="https://thehackernews.com/2023/08/lockbit-30-ransomware-builder-leak.html">LockBit 3.0 Ransomware Builder Leak Gives Rise to Hundreds of New Variants</a> (The Hacker News)</p><p><a href="https://www.bbc.com/news/world-europe-66630260">Poland investigates cyber-attack on rail network</a> (BBC News)</p><p><a href="https://www.reuters.com/world/europe/poland-investigates-hacking-attack-state-railway-network-2023-08-26/">Poland investigates hacking attack on state railway network</a> (Reuters)</p><p><a href="https://tickernews.co/hackers-bring-down-polands-train-network-in-massive-cyber-attack/">Hackers bring down Poland’s train network in massive cyber attack</a> (Ticker News) </p><p><a href="https://www.wired.com/story/poland-train-radio-stop-attack/">The Cheap Radio Hack That Disrupted Poland's Railway System</a> (WIRED)</p><p><a href="https://www.nytimes.com/2023/08/25/us/politics/russia-intelligence-propaganda.html">Russia Pushes Long-Term Influence Operations Aimed at the U.S. and Europe</a> (New York Times)</p><p><a href="https://www.cnn.com/2023/08/25/politics/us-intel-russia-propaganda/index.html">Newly declassified US intel claims Russia is laundering propaganda through unwitting Westerners</a> (CNN Politics)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1670</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d112fa9a-45d3-11ee-9f50-3bd5d339b536]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7699839160.mp3?updated=1693249368" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dina Haines: Keep the boat afloat. [Partnership manager] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/164/notes</link>
      <description>This week, we welcome Dina Haines, an Industry Partnership Manager with the National Security Agency's Cybersecurity Collaboration Center. Dina found from a young age, she was always interested in the field, taking after her father who worked in the space industry, paving the way for her to fall in love with the field. She worked in the private sector for a bit, moving around every now and again, eventually landing the position she works now. Dina says her day to day job is helping the NSA to bend and protect cyberspace by bringing in private industry. She says "I try to spend a lot of time listening and seeing where people, where they're coming from, where they're at, you know, potentially in their career, where they're at in their job that day, and then try to, um, support them and bring them up and, and float the entire boat." We thank Dina for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 27 Aug 2023 07:00:00 -0000</pubDate>
      <itunes:title>Dina Haines: Keep the boat afloat. [Partnership manager] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>164</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, we welcome Dina Haines, an Industry Partnership Manager with the National Security Agency's Cybersecurity Collaboration Center. Dina found from a young age, she was always interested in the field, taking after her father who worked in the space industry, paving the way for her to fall in love with the field. She worked in the private sector for a bit, moving around every now and again, eventually landing the position she works now. Dina says her day to day job is helping the NSA to bend and protect cyberspace by bringing in private industry. She says "I try to spend a lot of time listening and seeing where people, where they're coming from, where they're at, you know, potentially in their career, where they're at in their job that day, and then try to, um, support them and bring them up and, and float the entire boat." We thank Dina for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, we welcome Dina Haines, an Industry Partnership Manager with the National Security Agency's Cybersecurity Collaboration Center. Dina found from a young age, she was always interested in the field, taking after her father who worked in the space industry, paving the way for her to fall in love with the field. She worked in the private sector for a bit, moving around every now and again, eventually landing the position she works now. Dina says her day to day job is helping the NSA to bend and protect cyberspace by bringing in private industry. She says "I try to spend a lot of time listening and seeing where people, where they're coming from, where they're at, you know, potentially in their career, where they're at in their job that day, and then try to, um, support them and bring them up and, and float the entire boat." We thank Dina for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>453</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c8b53f88-436d-11ee-8532-ab7d35b7b532]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4213309943.mp3?updated=1692984346" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Google's not being ghosted from vulnerabilities. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/296/notes</link>
      <description>Tal Skverer from Astrix Security joins to discuss their work on "GhostToken – Exploiting GCP application infrastructure to create invisible, unremovable trojan app on Google accounts." Astrix’s Security Research Group revealed a 0-day flaw in Google’s Cloud Platform (GCP) on June 19, 2022, which was found to affect all Google users.
The research states "The vulnerability, dubbed “GhostToken”, could allow threat actors to change a malicious application to be invisible and unremovable, effectively leaving the victim’s Google account infected with a trojan app forever." Google issued a patch to this vulnerability in April of this year, but researchers explain why this can be severe.
The research can be found here:
GhostToken – Exploiting GCP application infrastructure to create invisible, unremovable trojan app on Google accounts

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Aug 2023 07:00:00 -0000</pubDate>
      <itunes:title>Google's not being ghosted from vulnerabilities. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>296</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Tal Skverer from Astrix Security joins to discuss their work on "GhostToken – Exploiting GCP application infrastructure to create invisible, unremovable trojan app on Google accounts." Astrix’s Security Research Group revealed a 0-day flaw in Google’s Cloud Platform (GCP) on June 19, 2022, which was found to affect all Google users.
The research states "The vulnerability, dubbed “GhostToken”, could allow threat actors to change a malicious application to be invisible and unremovable, effectively leaving the victim’s Google account infected with a trojan app forever." Google issued a patch to this vulnerability in April of this year, but researchers explain why this can be severe.
The research can be found here:
GhostToken – Exploiting GCP application infrastructure to create invisible, unremovable trojan app on Google accounts

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tal Skverer from Astrix Security joins to discuss their work on "GhostToken – Exploiting GCP application infrastructure to create invisible, unremovable trojan app on Google accounts." Astrix’s Security Research Group revealed a 0-day flaw in Google’s Cloud Platform (GCP) on June 19, 2022, which was found to affect all Google users.</p><p>The research states "The vulnerability, dubbed “GhostToken”, could allow threat actors to change a malicious application to be invisible and unremovable, effectively leaving the victim’s Google account infected with a trojan app forever." Google issued a patch to this vulnerability in April of this year, but researchers explain why this can be severe.</p><p>The research can be found here:</p><ul><li><a href="https://astrix.security/ghosttoken-exploiting-gcp-application-infrastructure-to-create-invisible-unremovable-trojan-app-on-google-accounts/">GhostToken – Exploiting GCP application infrastructure to create invisible, unremovable trojan app on Google accounts</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1027</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f63ca158-436d-11ee-97ec-2b7001b03502]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7190927823.mp3?updated=1692898644" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing kits in the C2C market. Cyberespionage, Pyongyang and Beijing editions. Ransomware under the radar. A new hacktivist group says it doesn’t much care for NATO corruption. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1893/notes</link>
      <description>Telekopye and the rise of commodified phishing kits. Lazarus Group fields new malware. Implications of China's campaign against vulnerable Barracuda appliances. Abhubllka ransomware's targeting and low extortion demands. Malek Ben Salem of Accenture outlines generative AI Implications to spam detection. Jeff Welgan, Chief Learning Officer at N2K Networks, unpacks the NICE framework and strategic workforce intelligence. And a new hacktivist group emerges, and takes a particular interest in NATO members.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/162

Selected reading.
eBay Users Beware Russian 'Telekopye' Telegram Phishing Bot (Dark Reading)
Telekopye: Hunting Mammoths using Telegram bot (ESET)
Lazarus Group's infrastructure reuse leads to discovery of new malware (Cisco Talos Blog) 
FBI fingers China for attacks on Barracuda email appliances (Register)
Suspected PRC Cyber ActorsContinue to Globally Exploit Barracuda ESG Zero-Day Vulnerability (CVE-2023-2868) (FBI)
Identifying ADHUBLLKA Ransomware: LOLKEK, BIT, OBZ, U2K, TZW Variants (Netenrich)
Ransomware ecosystem targeting individuals, small firms remains robust (Record) 
Ransomware With an Identity Crisis Targets Small Businesses, Individuals (Dark Reading) 
Hacking group KittenSec claims to 'pwn anything we see' to expose corruption (CyberScoop)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 25 Aug 2023 20:15:00 -0000</pubDate>
      <itunes:title>Phishing kits in the C2C market. Cyberespionage, Pyongyang and Beijing editions. Ransomware under the radar. A new hacktivist group says it doesn’t much care for NATO corruption. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1893</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Telekopye and the rise of commodified phishing kits. Lazarus Group fields new malware. Implications of China's campaign against vulnerable Barracuda appliances. Abhubllka ransomware's targeting and low extortion demands. Malek Ben Salem of Accenture outlines generative AI Implications to spam detection. Jeff Welgan, Chief Learning Officer at N2K Networks, unpacks the NICE framework and strategic workforce intelligence. And a new hacktivist group emerges, and takes a particular interest in NATO members.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/162

Selected reading.
eBay Users Beware Russian 'Telekopye' Telegram Phishing Bot (Dark Reading)
Telekopye: Hunting Mammoths using Telegram bot (ESET)
Lazarus Group's infrastructure reuse leads to discovery of new malware (Cisco Talos Blog) 
FBI fingers China for attacks on Barracuda email appliances (Register)
Suspected PRC Cyber ActorsContinue to Globally Exploit Barracuda ESG Zero-Day Vulnerability (CVE-2023-2868) (FBI)
Identifying ADHUBLLKA Ransomware: LOLKEK, BIT, OBZ, U2K, TZW Variants (Netenrich)
Ransomware ecosystem targeting individuals, small firms remains robust (Record) 
Ransomware With an Identity Crisis Targets Small Businesses, Individuals (Dark Reading) 
Hacking group KittenSec claims to 'pwn anything we see' to expose corruption (CyberScoop)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Telekopye and the rise of commodified phishing kits. Lazarus Group fields new malware. Implications of China's campaign against vulnerable Barracuda appliances. Abhubllka ransomware's targeting and low extortion demands. Malek Ben Salem of Accenture outlines generative AI Implications to spam detection. Jeff Welgan, Chief Learning Officer at N2K Networks, unpacks the NICE framework and strategic workforce intelligence. And a new hacktivist group emerges, and takes a particular interest in NATO members.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/162</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.darkreading.com/threat-intelligence/ebay-users-russian-telekopye-telegram-phishing-bot">eBay Users Beware Russian 'Telekopye' Telegram Phishing Bot</a> (Dark Reading)</p><p><a href="https://www.welivesecurity.com/en/eset-research/telekopye-hunting-mammoths-using-telegram-bot/">Telekopye: Hunting Mammoths using Telegram bot</a> (ESET)</p><p><a href="https://blog.talosintelligence.com/lazarus-collectionrat/">Lazarus Group's infrastructure reuse leads to discovery of new malware</a> (Cisco Talos Blog) </p><p><a href="https://www.theregister.com/2023/08/25/fbi_china_barracuda/">FBI fingers China for attacks on Barracuda email appliances</a> (Register)</p><p><a href="https://www.ic3.gov/Media/News/2023/230823.pdf">Suspected PRC Cyber ActorsContinue to Globally Exploit Barracuda ESG Zero-Day Vulnerability (CVE-2023-2868)</a> (FBI)</p><p><a href="https://netenrich.com/blog/discovering-the-adhubllka-ransomware-family">Identifying ADHUBLLKA Ransomware: LOLKEK, BIT, OBZ, U2K, TZW Variants</a> (Netenrich)</p><p><a href="https://therecord.media/ransomware-targeting-small-business-individuals-remains-robust">Ransomware ecosystem targeting individuals, small firms remains robust</a> (Record) </p><p><a href="https://www.darkreading.com/threat-intelligence/ransomware-with-an-identity-crisis-targets-small-businesses-individuals">Ransomware With an Identity Crisis Targets Small Businesses, Individuals</a> (Dark Reading) </p><p><a href="https://cyberscoop.com/kittensec-hacktivism-corruption/">Hacking group KittenSec claims to 'pwn anything we see' to expose corruption</a> (CyberScoop)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1608</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[117b812e-2b53-11ee-9c79-532afc971470]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4635982972.mp3?updated=1692988731" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trends in the cybercriminal underworld. The prosecution of Lapsus$ and Tornado Cash. More developments in Russia’s hybrid war. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1892/notes</link>
      <description>There’s a new sophistication in BEC campaigns. Trends in brand impersonation–crooks still like to pretend they’re from Redmond. The future of Russian influence operations in the post-Prigozhin era. Andrea Little Limbago from Interos shares insights on the new cyber workforce strategy. In our latest Threat Vector segment David Moulton of Palo Alto Networks is joined by Stephanie Ragan, Senior Consultant at Unit 42 to discuss Muddled Libra. And more on the doxing of a deputy Duma chair, who seems to have been selling hot iPhones as a side hustle (maybe). And the growing problem of Synthetic identity fraud.

On this segment of Threat Vector, Stephanie Ragan, Senior Consultant at Unit 42, joins host David Moulton to discuss Muddled Libra.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/162

Selected reading.
BEC Trends: Payroll Diversion Dominates and Sneaky Multi-Persona Attacks Emerge (Trustwave)
Q2 2023 Threat Landscape Report: All Roads Lead to Supply Chain Infiltrations (Kroll)
Microsoft Impersonated Most in Phishing Attacks Among Nearly 350 Brands (Abnormal Security)
TransUnion Analysis Finds Synthetic Identity Fraud Growing to Record Levels (TransUnion)
Ukraine at D+546: Yevgeny Prigozhin dies in a plane crash. (CyberWire)
Without Prigozhin, expect some changes around the edges on Russian influence operations (Washington Post)
2023 H1 Global Threat Analysis Report (Radware)
Lapsus$: Court finds teenagers carried out hacking spree (BBC News)
British court convicts two teen Lapsus$ members of hacking tech firms (Record) 
Treasury Designates Roman Semenov, Co-Founder of Sanctioned Virtual Currency Mixer Tornado Cash (U.S. Department of the Treasury) 
Tornado Cash Founders Charged With Money Laundering And Sanctions Violations (U.S. Attorney for the Southern District of New York) 
Russian Duma leader’s emails hacked and leaked (Cybernews)
Ukrainian hackers expose money laundering and sanction evasion by senior Russian politician (teiss) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 24 Aug 2023 20:15:00 -0000</pubDate>
      <itunes:title>Trends in the cybercriminal underworld. The prosecution of Lapsus$ and Tornado Cash. More developments in Russia’s hybrid war. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1892</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>There’s a new sophistication in BEC campaigns. Trends in brand impersonation–crooks still like to pretend they’re from Redmond. The future of Russian influence operations in the post-Prigozhin era. Andrea Little Limbago from Interos shares insights on the new cyber workforce strategy. In our latest Threat Vector segment David Moulton of Palo Alto Networks is joined by Stephanie Ragan, Senior Consultant at Unit 42 to discuss Muddled Libra. And more on the doxing of a deputy Duma chair, who seems to have been selling hot iPhones as a side hustle (maybe). And the growing problem of Synthetic identity fraud.

On this segment of Threat Vector, Stephanie Ragan, Senior Consultant at Unit 42, joins host David Moulton to discuss Muddled Libra.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/162

Selected reading.
BEC Trends: Payroll Diversion Dominates and Sneaky Multi-Persona Attacks Emerge (Trustwave)
Q2 2023 Threat Landscape Report: All Roads Lead to Supply Chain Infiltrations (Kroll)
Microsoft Impersonated Most in Phishing Attacks Among Nearly 350 Brands (Abnormal Security)
TransUnion Analysis Finds Synthetic Identity Fraud Growing to Record Levels (TransUnion)
Ukraine at D+546: Yevgeny Prigozhin dies in a plane crash. (CyberWire)
Without Prigozhin, expect some changes around the edges on Russian influence operations (Washington Post)
2023 H1 Global Threat Analysis Report (Radware)
Lapsus$: Court finds teenagers carried out hacking spree (BBC News)
British court convicts two teen Lapsus$ members of hacking tech firms (Record) 
Treasury Designates Roman Semenov, Co-Founder of Sanctioned Virtual Currency Mixer Tornado Cash (U.S. Department of the Treasury) 
Tornado Cash Founders Charged With Money Laundering And Sanctions Violations (U.S. Attorney for the Southern District of New York) 
Russian Duma leader’s emails hacked and leaked (Cybernews)
Ukrainian hackers expose money laundering and sanction evasion by senior Russian politician (teiss) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>There’s a new sophistication in BEC campaigns. Trends in brand impersonation–crooks still like to pretend they’re from Redmond. The future of Russian influence operations in the post-Prigozhin era. Andrea Little Limbago from Interos shares insights on the new cyber workforce strategy. In our latest Threat Vector segment David Moulton of Palo Alto Networks is joined by Stephanie Ragan, Senior Consultant at Unit 42 to discuss Muddled Libra. And more on the doxing of a deputy Duma chair, who seems to have been selling hot iPhones as a side hustle (maybe). And the growing problem of Synthetic identity fraud.</p><p><br></p><p>On this segment of Threat Vector, Stephanie Ragan, Senior Consultant at Unit 42, joins host David Moulton to discuss Muddled Libra.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/162</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/bec-trends-payroll-diversion-dominates-and-sneaky-multi-persona-attacks-emerge/">BEC Trends: Payroll Diversion Dominates and Sneaky Multi-Persona Attacks Emerge</a> (Trustwave)</p><p><a href="https://www.kroll.com/en/insights/publications/cyber/threat-intelligence-reports/q2-2023-threat-landscape-report-supply-chain-infiltrations">Q2 2023 Threat Landscape Report: All Roads Lead to Supply Chain Infiltrations</a> (Kroll)</p><p><a href="https://abnormalsecurity.com/blog/credential-phishing-trends-2023">Microsoft Impersonated Most in Phishing Attacks Among Nearly 350 Brands</a> (Abnormal Security)</p><p><a href="https://www.globenewswire.com/news-release/2023/08/24/2731114/0/en/TransUnion-Analysis-Finds-Synthetic-Identity-Fraud-Growing-to-Record-Levels.html">TransUnion Analysis Finds Synthetic Identity Fraud Growing to Record Levels</a> (TransUnion)</p><p><a href="https://thecyberwire.com/stories/9848bb28be984519916bcc472f77adfa/ukraine-at-d546-yevgeny-prigozhin-dies-in-a-plane-crash">Ukraine at D+546: Yevgeny Prigozhin dies in a plane crash.</a> (CyberWire)</p><p><a href="https://www.washingtonpost.com/politics/2023/08/24/without-prigozhin-expect-some-changes-around-edges-russian-influence-operations/">Without Prigozhin, expect some changes around the edges on Russian influence operations</a> (Washington Post)</p><p><a href="https://www.radware.com/2023-h1-global-threat-analysis-report/">2023 H1 Global Threat Analysis Report</a> (Radware)</p><p><a href="https://www.bbc.com/news/technology-66549159">Lapsus$: Court finds teenagers carried out hacking spree</a> (BBC News)</p><p><a href="https://therecord.media/lapsus%24-hackers-convinctions-teens-uk-court">British court convicts two teen Lapsus$ members of hacking tech firms</a> (Record) </p><p><a href="https://home.treasury.gov/news/press-releases/jy1702">Treasury Designates Roman Semenov, Co-Founder of Sanctioned Virtual Currency Mixer Tornado Cash</a> (U.S. Department of the Treasury) </p><p><a href="https://www.justice.gov/usao-sdny/pr/tornado-cash-founders-charged-money-laundering-and-sanctions-violations">Tornado Cash Founders Charged With Money Laundering And Sanctions Violations</a> (U.S. Attorney for the Southern District of New York) </p><p><a href="https://cybernews.com/cyber-war/russian-duma-deputy-chairman-emails-leaked/">Russian Duma leader’s emails hacked and leaked</a> (Cybernews)</p><p><a href="https://www.teiss.co.uk/news/ukrainian-hackers-expose-money-laundering-and-sanction-evasion-by-senior-russian-politician-12750">Ukrainian hackers expose money laundering and sanction evasion by senior Russian politician</a> (teiss) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1646</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[116890d2-2b53-11ee-9c79-37a7476ea6f2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2420634274.mp3?updated=1692905211" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A creepy new geolocation payload for Smoke Loader. Speed of criminal attack, malware delivery, and the evolution of malicious AI. Ransomware at a Belgian social services agency. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1891/notes</link>
      <description>The Smoke Loader botnet has a creepy new payload. Ransomware gets faster. How AI has evolved in malicious directions. The Snatch ransomware gang threatens to snitch. The FSB continues to use both USBs and phishing emails as attack vectors. A ransomware attack shutters Belgian social service offices. Tim Starks from the Washington Post explains a Biden administration win in a DC court. Our guest Ben Sebree of CivicPlus describes how the public sector could combat cybercrime during cloud adoption. And the deadline for comment on US cybersecurity regulations? It’s been extended.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/161

Selected reading.
Smoke Loader Drops Whiffy Recon Wi-Fi Scanning and Geolocation Malware (SecureWorks) 
Time keeps on slippin’ slippin’ slippin’: The 2023 Active Adversary Report for Tech Leaders (Sophos News) 
HP Wolf Security Threat Insights Report Q2 2023 | HP Wolf Security (HP Wolf Security) 
Barracuda XDR Insights: How AI learns your patterns to protect you (Barracuda)
Deep Instinct Study Finds Significant Increase in Cybersecurity Attacks Fueled by Generative AI (Deep Instinct) 
Cyberattack on Belgian social service centers forces them to close (Record)
Ukraine’s Military Hacked by Russian Backed USB Malware (Ophtek)
Request for Information on Cyber Regulatory Harmonization; Request for Information: Opportunities for and Obstacles To Harmonizing Cybersecurity Regulations (Federal Register)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 23 Aug 2023 20:15:00 -0000</pubDate>
      <itunes:title>A creepy new geolocation payload for Smoke Loader. Speed of criminal attack, malware delivery, and the evolution of malicious AI. Ransomware at a Belgian social services agency. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1891</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Smoke Loader botnet has a creepy new payload. Ransomware gets faster. How AI has evolved in malicious directions. The Snatch ransomware gang threatens to snitch. The FSB continues to use both USBs and phishing emails as attack vectors. A ransomware attack shutters Belgian social service offices. Tim Starks from the Washington Post explains a Biden administration win in a DC court. Our guest Ben Sebree of CivicPlus describes how the public sector could combat cybercrime during cloud adoption. And the deadline for comment on US cybersecurity regulations? It’s been extended.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/161

Selected reading.
Smoke Loader Drops Whiffy Recon Wi-Fi Scanning and Geolocation Malware (SecureWorks) 
Time keeps on slippin’ slippin’ slippin’: The 2023 Active Adversary Report for Tech Leaders (Sophos News) 
HP Wolf Security Threat Insights Report Q2 2023 | HP Wolf Security (HP Wolf Security) 
Barracuda XDR Insights: How AI learns your patterns to protect you (Barracuda)
Deep Instinct Study Finds Significant Increase in Cybersecurity Attacks Fueled by Generative AI (Deep Instinct) 
Cyberattack on Belgian social service centers forces them to close (Record)
Ukraine’s Military Hacked by Russian Backed USB Malware (Ophtek)
Request for Information on Cyber Regulatory Harmonization; Request for Information: Opportunities for and Obstacles To Harmonizing Cybersecurity Regulations (Federal Register)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Smoke Loader botnet has a creepy new payload. Ransomware gets faster. How AI has evolved in malicious directions. The Snatch ransomware gang threatens to snitch. The FSB continues to use both USBs and phishing emails as attack vectors. A ransomware attack shutters Belgian social service offices. Tim Starks from the Washington Post explains a Biden administration win in a DC court. Our guest Ben Sebree of CivicPlus describes how the public sector could combat cybercrime during cloud adoption. And the deadline for comment on US cybersecurity regulations? It’s been extended.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/161</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.secureworks.com/blog/smoke-loader-drops-whiffy-recon-wi-fi-scanning-and-geolocation-malware">Smoke Loader Drops Whiffy Recon Wi-Fi Scanning and Geolocation Malware</a> (SecureWorks) </p><p><a href="https://news.sophos.com/en-us/2023/08/23/active-adversary-for-tech-leaders/">Time keeps on slippin’ slippin’ slippin’: The 2023 Active Adversary Report for Tech Leaders</a> (Sophos News) </p><p><a href="https://threatresearch.ext.hp.com/hp-wolf-security-threat-insights-report-q2-2023/">HP Wolf Security Threat Insights Report Q2 2023 | HP Wolf Security</a> (HP Wolf Security) </p><p><a href="https://blog.barracuda.com/2023/08/23/barracuda-xdr-insights-ai-patterns-protect">Barracuda XDR Insights: How AI learns your patterns to protect you</a> (Barracuda)</p><p><a href="https://www.deepinstinct.com/news/deep-instinct-study-finds-significant-increase-in-cybersecurity-attacks-fueled-by-generative-ai">Deep Instinct Study Finds Significant Increase in Cybersecurity Attacks Fueled by Generative AI</a> (Deep Instinct) </p><p><a href="https://therecord.media/charleroi-belgium-cpas-cyberattack">Cyberattack on Belgian social service centers forces them to close</a> (Record)</p><p><a href="https://ophtek.com/ukraines-military-hacked-by-russian-backed-usb-malware/">Ukraine’s Military Hacked by Russian Backed USB Malware</a> (Ophtek)</p><p><a href="https://www.federalregister.gov/documents/2023/08/16/2023-17424/request-for-information-on-cyber-regulatory-harmonization-request-for-information-opportunities-for">Request for Information on Cyber Regulatory Harmonization; Request for Information: Opportunities for and Obstacles To Harmonizing Cybersecurity Regulations</a> (Federal Register)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1767</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11568a54-2b53-11ee-9c79-67ce67d6e0e7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5922989235.mp3?updated=1692817417" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title> A cyberespionage operation of unclear provenance shifts its targets. Cyberattacks on voting in Ecuador. Other notes from the cyber underworld. And doxing the Duma.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1890/notes</link>
      <description>HiatusRAT shifts its targets. Ecuador's difficulties with voting is attributed to cyberattacks. Carderbee is an APT targeting Hong Kong. auDA (OOO-duh) turns out not to have been breached. Ukrainian hacktivists claim to dox a senior member of Russia's Duma. Russian influence operations take aim at NATO's July summit. Joe Carrigan describes attacks on LinkedIn accounts. Our guest is John Hernandez from Quest to discuss why he believes the MOVEit flaw is a wakeup call for CISOs. Security, not by obscurity, but by typo.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/160

Selected reading.
HiatusRAT Malware Resurfaces: Taiwan Firms and U.S. Military Under Attack (The Hacker News) 
New HiatusRAT campaign targets Taiwan and U.S. military procurement system (Security Affairs)
HiatusRAT Returns after a Hiatus in a Fresh Wave of Attacks (Cyware Labs)
No rest for the wicked: HiatusRAT takes little time off in a return to action (Lumen)
Ecuador’s national election agency says cyberattacks caused absentee voting issues (Record)
Carderbee: APT Group use Legit Software in Supply Chain Attack Targeting Orgs in Hong Kong
Resolution of cyber incident (auDA) 
Ukrainian hackers claim to leak emails of Russian parliament deputy chief (Record) 
Summit Old, Summit New (Graphika)
Summit Old, Summit New: Russia-Linked Actors Leverage New and Old Tactics in Influence Operations Targeting Online Conversations About NATO Summit (Graphika)
The simple typo that stopped bank robbers from stealing $1 billion (LAD Bible)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Aug 2023 20:15:00 -0000</pubDate>
      <itunes:title>A cyberespionage operation of unclear provenance shifts its targets. Cyberattacks on voting in Ecuador. Other notes from the cyber underworld. And doxing the Duma.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1890</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>HiatusRAT shifts its targets. Ecuador's difficulties with voting is attributed to cyberattacks. Carderbee is an APT targeting Hong Kong. auDA (OOO-duh) turns out not to have been breached. Ukrainian hacktivists claim to dox a senior member of Russia's Duma. Russian influence operations take aim at NATO's July summit. Joe Carrigan describes attacks on LinkedIn accounts. Our guest is John Hernandez from Quest to discuss why he believes the MOVEit flaw is a wakeup call for CISOs. Security, not by obscurity, but by typo.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/160

Selected reading.
HiatusRAT Malware Resurfaces: Taiwan Firms and U.S. Military Under Attack (The Hacker News) 
New HiatusRAT campaign targets Taiwan and U.S. military procurement system (Security Affairs)
HiatusRAT Returns after a Hiatus in a Fresh Wave of Attacks (Cyware Labs)
No rest for the wicked: HiatusRAT takes little time off in a return to action (Lumen)
Ecuador’s national election agency says cyberattacks caused absentee voting issues (Record)
Carderbee: APT Group use Legit Software in Supply Chain Attack Targeting Orgs in Hong Kong
Resolution of cyber incident (auDA) 
Ukrainian hackers claim to leak emails of Russian parliament deputy chief (Record) 
Summit Old, Summit New (Graphika)
Summit Old, Summit New: Russia-Linked Actors Leverage New and Old Tactics in Influence Operations Targeting Online Conversations About NATO Summit (Graphika)
The simple typo that stopped bank robbers from stealing $1 billion (LAD Bible)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>HiatusRAT shifts its targets. Ecuador's difficulties with voting is attributed to cyberattacks. Carderbee is an APT targeting Hong Kong. auDA (OOO-duh) turns out not to have been breached. Ukrainian hacktivists claim to dox a senior member of Russia's Duma. Russian influence operations take aim at NATO's July summit. Joe Carrigan describes attacks on LinkedIn accounts. Our guest is John Hernandez from Quest to discuss why he believes the MOVEit flaw is a wakeup call for CISOs. Security, not by obscurity, but by typo.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/160</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thehackernews.com/2023/08/hiatusrat-malware-resurfaces-taiwan.html">HiatusRAT Malware Resurfaces: Taiwan Firms and U.S. Military Under Attack</a> (The Hacker News) </p><p><a href="https://securityaffairs.com/149723/intelligence/hiatusrat-campaign-taiwan-us.html">New HiatusRAT campaign targets Taiwan and U.S. military procurement system</a> (Security Affairs)</p><p><a href="https://cyware.com/news/hiatusrat-returns-after-a-hiatus-in-a-fresh-wave-of-attacks-dd524dce">HiatusRAT Returns after a Hiatus in a Fresh Wave of Attacks</a> (Cyware Labs)</p><p><a href="https://blog.lumen.com/hiatusrat-takes-little-time-off-in-a-return-to-action/">No rest for the wicked: HiatusRAT takes little time off in a return to action</a> (Lumen)</p><p><a href="https://therecord.media/ecuador-election-cyberattacks-absentee-voting">Ecuador’s national election agency says cyberattacks caused absentee voting issues</a> (Record)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/carderbee-software-supply-chain-certificate-abuse">Carderbee: APT Group use Legit Software in Supply Chain Attack Targeting Orgs in Hong Kong</a></p><p><a href="https://www.auda.org.au/statement/resolution-cyber-incident">Resolution of cyber incident </a>(auDA) </p><p><a href="https://therecord.media/ukrainian-hackers-claim-to-leak-emails-of-russia-duma-deputy">Ukrainian hackers claim to leak emails of Russian parliament deputy chief</a> (Record) </p><p><a href="https://graphika.com/reports/summit-old-summit-new">Summit Old, Summit New</a> (Graphika)</p><p><a href="https://public-assets.graphika.com/reports/graphika_report_summit_old_summit_new.pdf">Summit Old, Summit New: Russia-Linked Actors Leverage New and Old Tactics in Influence Operations Targeting Online Conversations About NATO Summit</a> (Graphika)</p><p><a href="https://www.ladbible.com/entertainment/tv/billion-dollar-heist-bangladesh-bank-cyber-heist-2016-typo-392658-20230816">The simple typo that stopped bank robbers from stealing $1 billion</a> (LAD Bible)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1774</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1146ed24-2b53-11ee-9c79-9ffe9f725be8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9616469869.mp3?updated=1692732755" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DPRK tried to hit RoK-US military exercises. Australian domain administrator auDA may have been breached. WoofLocker's tech support scam. US warns of cyber threats to space systems.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1889/notes</link>
      <description>The DPRK's Kimsuky attempts to hit joint military exercises. Australian domain administrator auDA (OW-duh) may have been breached. WoofLocker's version of a tech support scam. The US Intelligence Community warns of cyber threats to space systems. Rick Howard looks at forecasting cyber risk. Deepen Desai from Zscaler shares ransomware trends. And more wartime disinformation out of Russia.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/159

Selected reading.
Suspected N. Korean Hackers Target S. Korea-US Drills (SecurityWeek)
N. Korean Kimsuky APT targets S. Korea-US military exercises (Security Affairs) 
North Korean hackers target US-South Korea military drills, police say (The Economic Times
Cyber incident update (auDA) 
Australia’s .au domain administrator denies data breach after ransomware posting (Record) 
Hackers claim to have breached auDA (iTnews)
Catching up with WoofLocker, the most elaborate traffic redirection scheme to tech support scams (Malwarebytes) 
WoofLocker Toolkit Hides Malicious Codes in Images to Run Tech Support Scams (The Hacker News)
US warns space companies about foreign spying (Reuters) 
Intelligence Agencies Warn Foreign Spies Are Targeting U.S. Space Companies (New York Times) 
US Warns Space Industry of Growing Risks of Spying and Satellite Attacks (Bloomberg) 
Foreign countries targeting tech from US space companies, intel agencies warn (The HIll) 
Pentagon urges US space companies to stay vigilant against foreign intelligence (TechCrunch) 
Safeguarding the US Space Industry: Keeping Your Intellectual Property in Orbit (DNI) 
What To Do About The U.S. Intelligence Community Warning on Safeguarding The Space Industry (OODA Loop) 
Countering disinformation with facts - Russian invasion of Ukraine (Government of Canada)
Sergey Lavrov: Throwing Russia off balance is ultimate aim (TASS)
Moscow says US unwillingness to end Ukraine conflict (Merh News Agency)
Russian invaders sending threats to Kherson region’s residents via social media - watchdog (Ukrinform)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 21 Aug 2023 20:15:00 -0000</pubDate>
      <itunes:title>DPRK tried to hit RoK-US military exercises. Australian domain administrator auDA may have been breached. WoofLocker's tech support scam. US warns of cyber threats to space systems.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1889</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The DPRK's Kimsuky attempts to hit joint military exercises. Australian domain administrator auDA (OW-duh) may have been breached. WoofLocker's version of a tech support scam. The US Intelligence Community warns of cyber threats to space systems. Rick Howard looks at forecasting cyber risk. Deepen Desai from Zscaler shares ransomware trends. And more wartime disinformation out of Russia.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/159

Selected reading.
Suspected N. Korean Hackers Target S. Korea-US Drills (SecurityWeek)
N. Korean Kimsuky APT targets S. Korea-US military exercises (Security Affairs) 
North Korean hackers target US-South Korea military drills, police say (The Economic Times
Cyber incident update (auDA) 
Australia’s .au domain administrator denies data breach after ransomware posting (Record) 
Hackers claim to have breached auDA (iTnews)
Catching up with WoofLocker, the most elaborate traffic redirection scheme to tech support scams (Malwarebytes) 
WoofLocker Toolkit Hides Malicious Codes in Images to Run Tech Support Scams (The Hacker News)
US warns space companies about foreign spying (Reuters) 
Intelligence Agencies Warn Foreign Spies Are Targeting U.S. Space Companies (New York Times) 
US Warns Space Industry of Growing Risks of Spying and Satellite Attacks (Bloomberg) 
Foreign countries targeting tech from US space companies, intel agencies warn (The HIll) 
Pentagon urges US space companies to stay vigilant against foreign intelligence (TechCrunch) 
Safeguarding the US Space Industry: Keeping Your Intellectual Property in Orbit (DNI) 
What To Do About The U.S. Intelligence Community Warning on Safeguarding The Space Industry (OODA Loop) 
Countering disinformation with facts - Russian invasion of Ukraine (Government of Canada)
Sergey Lavrov: Throwing Russia off balance is ultimate aim (TASS)
Moscow says US unwillingness to end Ukraine conflict (Merh News Agency)
Russian invaders sending threats to Kherson region’s residents via social media - watchdog (Ukrinform)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The DPRK's Kimsuky attempts to hit joint military exercises. Australian domain administrator auDA (OW-duh) may have been breached. WoofLocker's version of a tech support scam. The US Intelligence Community warns of cyber threats to space systems. Rick Howard looks at forecasting cyber risk. Deepen Desai from Zscaler shares ransomware trends. And more wartime disinformation out of Russia.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/159</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.securityweek.com/suspected-n-korean-hackers-target-s-korea-us-drills/">Suspected N. Korean Hackers Target S. Korea-US Drills</a> (SecurityWeek)</p><p><a href="https://securityaffairs.com/149698/apt/kimsuky-war-simulation-centre.html">N. Korean Kimsuky APT targets S. Korea-US military exercises</a> (Security Affairs) </p><p><a href="https://economictimes.indiatimes.com/tech/technology/north-korean-hackers-target-us-south-korea-military-drills-police-say/articleshow/102869404.cms">North Korean hackers target US-South Korea military drills, police say</a> (The Economic Times</p><p><a href="https://www.auda.org.au/statement/cyber-incident-update">Cyber incident update </a>(auDA) </p><p><a href="https://therecord.media/australia-domain-name-admin-denies-data-breach">Australia’s .au domain administrator denies data breach after ransomware posting</a> (Record) </p><p><a href="https://www.itnews.com.au/news/hackers-claim-to-have-breached-auda-599411">Hackers claim to have breached auDA</a> (iTnews)</p><p><a href="https://www.malwarebytes.com/blog/threat-intelligence/2023/08/wooflocker2">Catching up with WoofLocker, the most elaborate traffic redirection scheme to tech support scams</a> (Malwarebytes) </p><p><a href="https://thehackernews.com/2023/08/wooflocker-toolkit-hides-malicious.html">WoofLocker Toolkit Hides Malicious Codes in Images to Run Tech Support Scams</a> (The Hacker News)</p><p><a href="https://www.reuters.com/world/us/us-warns-space-companies-about-foreign-spying-2023-08-18/">US warns space companies about foreign spying</a> (Reuters) </p><p><a href="https://www.nytimes.com/2023/08/18/us/politics/cyberattacks-russia-china-space-companies.html">Intelligence Agencies Warn Foreign Spies Are Targeting U.S. Space Companies</a> (New York Times) </p><p><a href="https://www.bloomberg.com/news/articles/2023-08-18/us-warns-space-industry-of-growing-risks-of-spying-attacks">US Warns Space Industry of Growing Risks of Spying and Satellite Attacks</a> (Bloomberg) </p><p><a href="https://thehill.com/policy/technology/4159457-foreign-countries-targeting-tech-from-us-space-companies-intel-agencies-warn/">Foreign countries targeting tech from US space companies, intel agencies warn</a> (The HIll) </p><p><a href="https://techcrunch.com/2023/08/18/pentagon-urges-vigilant-against-foreign-intelligence/">Pentagon urges US space companies to stay vigilant against foreign intelligence</a> (TechCrunch) </p><p><a href="https://www.dni.gov/files/NCSC/documents/SafeguardingOurFuture/FINAL%20FINAL%20Safeguarding%20the%20US%20Space%20Industry%20-%20Digital.pdf">Safeguarding the US Space Industry: Keeping Your Intellectual Property in Orbit</a> (DNI) </p><p><a href="https://www.oodaloop.com/ooda-original/2023/08/20/what-to-do-about-the-u-s-intelligence-community-warning-on-safeguarding-the-space-industry/">What To Do About The U.S. Intelligence Community Warning on Safeguarding The Space Industry</a> (OODA Loop) </p><p><a href="https://www.international.gc.ca/world-monde/issues_development-enjeux_developpement/response_conflict-reponse_conflits/crisis-crises/ukraine-fact-fait.aspx?lang=eng">Countering disinformation with facts - Russian invasion of Ukraine</a> (Government of Canada)</p><p><a href="https://tass.com/top-officials/748935">Sergey Lavrov: Throwing Russia off balance is ultimate aim</a> (TASS)</p><p><a href="https://en.mehrnews.com/news/204827/Moscow-says-US-unwillingness-to-end-Ukraine-conflict">Moscow says US unwillingness to end Ukraine conflict</a> (Merh News Agency)</p><p><a href="https://www.ukrinform.net/rubric-society/3750784-russian-invaders-sending-threats-to-kherson-regions-residents-via-social-media-watchdog.html#google_vignette">Russian invaders sending threats to Kherson region’s residents via social media - watchdog</a> (Ukrinform)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1386</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1135c968-2b53-11ee-9c79-33c50b4c49c3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5995953921.mp3?updated=1692647052" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title> Luke Vander Linden: With age comes knowledge. [VP] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/163/notes</link>
      <description>This week, our guest is Luke Vander Linden, Vice President of Membership &amp; Marketing from RH-ISAC and host of the RH-ISAC podcast here at the CyberWire. Luke sits down to share his story all the way back to when he was a very young age where he was a child model and actor to where he is now working in the cyber industry. Luke fell into the marketing field after his time as a child actor, where he really started to find his passion. After finding his passion, he decided to branch out to different areas in the field, working in public libraries and advocacy groups, this is where he started to really enjoy the prospect of working with individuals who support organizations, which got him started in the RH-ISAC world. Luke shares that he wears many hats these days, working in the podcast business while also working on the leadership team at RH-ISAC. His advice for people getting into this industry is "I think with age comes this knowledge, but also with experiences. So, I mean, to that point, don't be afraid to go out there and fail, give it a shot." We thank Luke for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 20 Aug 2023 07:00:00 -0000</pubDate>
      <itunes:title> Luke Vander Linden: With age comes knowledge. [VP] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>163</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, our guest is Luke Vander Linden, Vice President of Membership &amp; Marketing from RH-ISAC and host of the RH-ISAC podcast here at the CyberWire. Luke sits down to share his story all the way back to when he was a very young age where he was a child model and actor to where he is now working in the cyber industry. Luke fell into the marketing field after his time as a child actor, where he really started to find his passion. After finding his passion, he decided to branch out to different areas in the field, working in public libraries and advocacy groups, this is where he started to really enjoy the prospect of working with individuals who support organizations, which got him started in the RH-ISAC world. Luke shares that he wears many hats these days, working in the podcast business while also working on the leadership team at RH-ISAC. His advice for people getting into this industry is "I think with age comes this knowledge, but also with experiences. So, I mean, to that point, don't be afraid to go out there and fail, give it a shot." We thank Luke for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our guest is Luke Vander Linden, Vice President of Membership &amp; Marketing from RH-ISAC and host of the RH-ISAC podcast here at the CyberWire. Luke sits down to share his story all the way back to when he was a very young age where he was a child model and actor to where he is now working in the cyber industry. Luke fell into the marketing field after his time as a child actor, where he really started to find his passion. After finding his passion, he decided to branch out to different areas in the field, working in public libraries and advocacy groups, this is where he started to really enjoy the prospect of working with individuals who support organizations, which got him started in the RH-ISAC world. Luke shares that he wears many hats these days, working in the podcast business while also working on the leadership team at RH-ISAC. His advice for people getting into this industry is "I think with age comes this knowledge, but also with experiences. So, I mean, to that point, don't be afraid to go out there and fail, give it a shot." We thank Luke for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>431</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3d727eb0-3df8-11ee-a2cd-6bd8f02bd92e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7691163536.mp3?updated=1692381487" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Politicians targeted by RomCom. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/295/notes</link>
      <description>Dmitry Bestuzhev from Blackberry joins to discuss their work on "RomCom Resurfaces: Targeting Politicians in Ukraine and U.S.-Based Healthcare Providing Aid to Refugees from Ukraine." Research suggests that the RomCom threat team has been tracked carefully following the geopolitical events surrounding the war in Ukraine, and are now targeting politicians in Ukraine who are working closely with Western countries.
This group is different from others in that their focus is more on secrets or information which can be useful in geopolitics and specifically the war in Ukraine, instead of financial gain. The research says "Although it is unclear at this point what initial infection vector was used to kick off the execution chain, previous RomCom attacks used targeted phishing emails to point a victim to a cloned website hosting Trojanized versions of popular software."
The research can be found here:
RomCom Resurfaces: Targeting Politicians in Ukraine and U.S.-Based Healthcare Providing Aid to Refugees from Ukraine

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Aug 2023 07:00:00 -0000</pubDate>
      <itunes:title>Politicians targeted by RomCom. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>295</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dmitry Bestuzhev from Blackberry joins to discuss their work on "RomCom Resurfaces: Targeting Politicians in Ukraine and U.S.-Based Healthcare Providing Aid to Refugees from Ukraine." Research suggests that the RomCom threat team has been tracked carefully following the geopolitical events surrounding the war in Ukraine, and are now targeting politicians in Ukraine who are working closely with Western countries.
This group is different from others in that their focus is more on secrets or information which can be useful in geopolitics and specifically the war in Ukraine, instead of financial gain. The research says "Although it is unclear at this point what initial infection vector was used to kick off the execution chain, previous RomCom attacks used targeted phishing emails to point a victim to a cloned website hosting Trojanized versions of popular software."
The research can be found here:
RomCom Resurfaces: Targeting Politicians in Ukraine and U.S.-Based Healthcare Providing Aid to Refugees from Ukraine

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dmitry Bestuzhev from Blackberry joins to discuss their work on "RomCom Resurfaces: Targeting Politicians in Ukraine and U.S.-Based Healthcare Providing Aid to Refugees from Ukraine." Research suggests that the RomCom threat team has been tracked carefully following the geopolitical events surrounding the war in Ukraine, and are now targeting politicians in Ukraine who are working closely with Western countries.</p><p>This group is different from others in that their focus is more on secrets or information which can be useful in geopolitics and specifically the war in Ukraine, instead of financial gain. The research says "Although it is unclear at this point what initial infection vector was used to kick off the execution chain, previous RomCom attacks used targeted phishing emails to point a victim to a cloned website hosting Trojanized versions of popular software."</p><p>The research can be found here:</p><ul><li><a href="https://blogs.blackberry.com/en/2023/06/romcom-resurfaces-targeting-ukraine">RomCom Resurfaces: Targeting Politicians in Ukraine and U.S.-Based Healthcare Providing Aid to Refugees from Ukraine</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1368</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[121b2c52-3de0-11ee-9fe9-9f66a445dc93]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9411899991.mp3?updated=1692293641" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing for Zimbra credentials. Developments in PlayCrypt and Cuba ransomware. #NoFilter exploitation. Cyber gangs (and some services) threaten security researchers. Anglo-Saxonia update.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1888/notes</link>
      <description>Phishing for Zimbra credentials. PlayCrypt ransomware described. The Cuba ransomware group adopts new tools. #NoFilter. Cyber criminals threaten security researchers. Our guest is Kevin Paige from Uptycs with thoughts on the Blackhat conference. Eric Goldstein, Executive Assistant Director at CISA joins us discussing next steps on the Secure by Design journey. And Russian disinformation takes on "Anglo-Saxonia."

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/158

Selected reading.
Mass-spreading campaign targeting Zimbra users (We Live Security)
PlayCrypt Ransomware Group Wreaks Havoc in Campaign Against Managed Service Providers (Adlumin SaaS Security)
Cuba Ransomware Deploys New Tools: Targets Critical Infrastructure Sector in the U.S. and IT Integrator in Latin America (BlackBerry)
NoFilter Attack: Sneaky Privilege Escalation Method Bypasses Windows Security (The Hacker News)
Cyber security researchers become target of criminal hackers (Financial Times)
Britain plotting to assassinate pro-Russian leaders in Africa, says Moscow (The Telegraph) 
Ukraine at D+540: Russification and disinformation. (CyberWire) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 18 Aug 2023 20:15:00 -0000</pubDate>
      <itunes:title>Phishing for Zimbra credentials. Developments in PlayCrypt and Cuba ransomware. #NoFilter exploitation. Cyber gangs (and some services) threaten security researchers. Anglo-Saxonia update.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1888</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Phishing for Zimbra credentials. PlayCrypt ransomware described. The Cuba ransomware group adopts new tools. #NoFilter. Cyber criminals threaten security researchers. Our guest is Kevin Paige from Uptycs with thoughts on the Blackhat conference. Eric Goldstein, Executive Assistant Director at CISA joins us discussing next steps on the Secure by Design journey. And Russian disinformation takes on "Anglo-Saxonia."

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/158

Selected reading.
Mass-spreading campaign targeting Zimbra users (We Live Security)
PlayCrypt Ransomware Group Wreaks Havoc in Campaign Against Managed Service Providers (Adlumin SaaS Security)
Cuba Ransomware Deploys New Tools: Targets Critical Infrastructure Sector in the U.S. and IT Integrator in Latin America (BlackBerry)
NoFilter Attack: Sneaky Privilege Escalation Method Bypasses Windows Security (The Hacker News)
Cyber security researchers become target of criminal hackers (Financial Times)
Britain plotting to assassinate pro-Russian leaders in Africa, says Moscow (The Telegraph) 
Ukraine at D+540: Russification and disinformation. (CyberWire) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Phishing for Zimbra credentials. PlayCrypt ransomware described. The Cuba ransomware group adopts new tools. #NoFilter. Cyber criminals threaten security researchers. Our guest is Kevin Paige from Uptycs with thoughts on the Blackhat conference. Eric Goldstein, Executive Assistant Director at CISA joins us discussing next steps on the Secure by Design journey. And Russian disinformation takes on "Anglo-Saxonia."</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/158</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.welivesecurity.com/en/eset-research/mass-spreading-campaign-targeting-zimbra-users/">Mass-spreading campaign targeting Zimbra users</a> (We Live Security)</p><p><a href="https://adlumin.com/post/playcrypt-ransomware/">PlayCrypt Ransomware Group Wreaks Havoc in Campaign Against Managed Service Providers</a> (Adlumin SaaS Security)</p><p><a href="https://blogs.blackberry.com/en/2023/08/cuba-ransomware-deploys-new-tools-targets-critical-infrastructure-sector-in-the-usa-and-it-integrator-in-latin-america">Cuba Ransomware Deploys New Tools: Targets Critical Infrastructure Sector in the U.S. and IT Integrator in Latin America</a> (BlackBerry)</p><p><a href="https://thehackernews.com/2023/08/nofilter-attack-sneaky-privilege.html">NoFilter Attack: Sneaky Privilege Escalation Method Bypasses Windows Security</a> (The Hacker News)</p><p><a href="https://www.ft.com/content/88560ffa-bb5f-428a-894e-d791a0ee342c">Cyber security researchers become target of criminal hackers</a> (Financial Times)</p><p><a href="https://www.telegraph.co.uk/world-news/2023/08/16/russia-claims-uk-plot-assassinate-pro-moscow-leaders-africa/">Britain plotting to assassinate pro-Russian leaders in Africa, says Moscow</a> (The Telegraph) </p><p><a href="https://thecyberwire.com/stories/8184b921eda54c34961e0a3e070a1fa2/ukraine-at-d540-russification-and-disinformation">Ukraine at D+540: Russification and disinformation.</a> (CyberWire) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1775</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1125982c-2b53-11ee-9c79-5fc5451e9e59]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4133268091.mp3?updated=1692386279" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A seemingly legitimate but actually bogus host for a proxy botnet. PowerShell Gallery vulnerabilities. Cyber incident at Clorox. Scamming would be beta-testers. Cyber updates from Russia’s hybrid war.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1887/notes</link>
      <description>Building a proxy botnet. Active flaws in PowerShell Gallery. A cyber incident disrupts Clorox. Scams lure would-be mobile beta-testers. Lessons learned from the Russian cyberattack on Viasat. An update on cyber threats to Starlink. Robert M. Lee from Dragos shares his thoughts on the waves of layoffs that have gone through the industry. Steve Leeper of Datadobi explains mitigating risks associated with illegal data on your network. And hey, world leader: it’s never too late to stop manifesting a chronic cranio-urological condition, as they more-or-less say in the Quantum Realm.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/157

Selected reading.
ProxyNation: The dark nexus between proxy apps and malware (AT&amp;T Alien Labs) 
Massive 400,000 proxy botnet built with stealthy malware infections (BleepingComputer) 
PowerHell: Active Flaws in PowerShell Gallery Expose Users to Attacks (Aqua Security) 
Clorox Operations Disrupted By Cyber-Attack (Infosecurity Magazine) 
Cyber Criminals Targeting Victims through Mobile Beta-Testing Applications (IC3) 
FBI warns about scams that lure you in as a mobile beta-tester (Naked Security)
Incident response lessons learned from the Russian attack on Viasat (CSO Online)
Recent Intel Report Reveals New Starlink Vulnerabilities, Increasing Concerns About the Future of Global Satellite Internet (Debrief)
Hacked electronic sign declares “Putin is a dickhead” as Russian ruble slumps (Graham Cluley) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 17 Aug 2023 20:35:00 -0000</pubDate>
      <itunes:title>A seemingly legitimate but actually bogus host for a proxy botnet. PowerShell Gallery vulnerabilities. Cyber incident at Clorox. Scamming would be beta-testers. Cyber updates from Russia’s hybrid war.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1887</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Building a proxy botnet. Active flaws in PowerShell Gallery. A cyber incident disrupts Clorox. Scams lure would-be mobile beta-testers. Lessons learned from the Russian cyberattack on Viasat. An update on cyber threats to Starlink. Robert M. Lee from Dragos shares his thoughts on the waves of layoffs that have gone through the industry. Steve Leeper of Datadobi explains mitigating risks associated with illegal data on your network. And hey, world leader: it’s never too late to stop manifesting a chronic cranio-urological condition, as they more-or-less say in the Quantum Realm.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/157

Selected reading.
ProxyNation: The dark nexus between proxy apps and malware (AT&amp;T Alien Labs) 
Massive 400,000 proxy botnet built with stealthy malware infections (BleepingComputer) 
PowerHell: Active Flaws in PowerShell Gallery Expose Users to Attacks (Aqua Security) 
Clorox Operations Disrupted By Cyber-Attack (Infosecurity Magazine) 
Cyber Criminals Targeting Victims through Mobile Beta-Testing Applications (IC3) 
FBI warns about scams that lure you in as a mobile beta-tester (Naked Security)
Incident response lessons learned from the Russian attack on Viasat (CSO Online)
Recent Intel Report Reveals New Starlink Vulnerabilities, Increasing Concerns About the Future of Global Satellite Internet (Debrief)
Hacked electronic sign declares “Putin is a dickhead” as Russian ruble slumps (Graham Cluley) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Building a proxy botnet. Active flaws in PowerShell Gallery. A cyber incident disrupts Clorox. Scams lure would-be mobile beta-testers. Lessons learned from the Russian cyberattack on Viasat. An update on cyber threats to Starlink. Robert M. Lee from Dragos shares his thoughts on the waves of layoffs that have gone through the industry. Steve Leeper of Datadobi explains mitigating risks associated with illegal data on your network. And hey, world leader: it’s never too late to stop manifesting a chronic cranio-urological condition, as they more-or-less say in the Quantum Realm.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/157</p><p><br></p><h2>Selected reading.</h2><p><a href="https://cybersecurity.att.com/blogs/labs-research/proxynation-the-dark-nexus-between-proxy-apps-and-malware">ProxyNation: The dark nexus between proxy apps and malware</a> (AT&amp;T Alien Labs) </p><p><a href="https://www.bleepingcomputer.com/news/security/massive-400-000-proxy-botnet-built-with-stealthy-malware-infections/">Massive 400,000 proxy botnet built with stealthy malware infections</a> (BleepingComputer) </p><p><a href="https://blog.aquasec.com/powerhell-active-flaws-in-powershell-gallery-expose-users-to-attacks">PowerHell: Active Flaws in PowerShell Gallery Expose Users to Attacks</a> (Aqua Security) </p><p><a href="https://www.infosecurity-magazine.com/news/clorox-disrupted-cyber-attack/">Clorox Operations Disrupted By Cyber-Attack</a> (Infosecurity Magazine) </p><p><a href="https://www.ic3.gov/Media/Y2023/PSA230814">Cyber Criminals Targeting Victims through Mobile Beta-Testing Applications</a> (IC3) </p><p><a href="https://nakedsecurity.sophos.com/2023/08/16/fbi-warns-about-scams-that-lure-you-in-as-a-mobile-beta-tester/">FBI warns about scams that lure you in as a mobile beta-tester</a> (Naked Security)</p><p><a href="https://www.csoonline.com/article/649714/incident-response-lessons-learned-from-the-russian-attack-on-viasat.html">Incident response lessons learned from the Russian attack on Viasat</a> (CSO Online)</p><p><a href="https://thedebrief.org/recent-intel-report-reveals-new-starlink-vulnerabilities-increasing-concerns-about-the-future-of-global-satellite-internet/">Recent Intel Report Reveals New Starlink Vulnerabilities, Increasing Concerns About the Future of Global Satellite Internet</a> (Debrief)</p><p><a href="https://grahamcluley.com/hacked-electronic-sign-putin/">Hacked electronic sign declares “Putin is a dickhead” as Russian ruble slumps</a> (Graham Cluley) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1870</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1115f32c-2b53-11ee-9c79-437a60f6a5b1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7047659311.mp3?updated=1694116942" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>China accuses the US of cyberespionage. Backdoors found in NetScaler. Account hijacking campaigns. Raccoon Stealer gets an update. Cryptocurrency recovery scams. Narrative control in the hybrid war. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1886/notes</link>
      <description>China accuses the US of installing backdoors in a Wuhan lab. NetScaler backdoors are found. A Phishing scam targets executives. LinkedIn sees a surge in account hijacking. Raccoon Stealer gets an update. Cryptocurrency recovery scams. We kick off our new Learning Layer segment with N2K’s Sam Meisenberg. And a Moscow court fines Reddit and Wikipedia, for unwelcome content about Russia's war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/156

Selected reading.
Ministry warns of data security risks after US agencies identified behind cyberattack on Wuhan Earthquake Monitoring Center (Global Times)
China accuses U.S. intelligence agencies as source behind Wuhan cybersecurity attack (ZDNET) 
China teases imminent exposé of seismic US spying scheme (Register) 
2,000 Citrix NetScaler Instances Backdoored via Recent Vulnerability (SecurityWeek) 
Cloud Account Takeover Campaign Leveraging EvilProxy Targets Top-Level Executives at over 100 Global Organizations (Proofpoint)
LinkedIn Accounts Under Attack (Cyberint)
LinkedIn faces surge of account hijacking (Computing)
LinkedIn accounts hacked in widespread hijacking campaign (BleepingComputer)
Raccoon Stealer malware returns with new stealthier version (BleepingComputer)
FBI warns of increasing cryptocurrency recovery scams (BleepingComputer) 
Russia slaps Reddit, Wikipedia with fines (Cybernews)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 16 Aug 2023 20:20:00 -0000</pubDate>
      <itunes:title>China accuses the US of cyberespionage. Backdoors found in NetScaler. Account hijacking campaigns. Raccoon Stealer gets an update. Cryptocurrency recovery scams. Narrative control in the hybrid war. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1886</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>China accuses the US of installing backdoors in a Wuhan lab. NetScaler backdoors are found. A Phishing scam targets executives. LinkedIn sees a surge in account hijacking. Raccoon Stealer gets an update. Cryptocurrency recovery scams. We kick off our new Learning Layer segment with N2K’s Sam Meisenberg. And a Moscow court fines Reddit and Wikipedia, for unwelcome content about Russia's war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/156

Selected reading.
Ministry warns of data security risks after US agencies identified behind cyberattack on Wuhan Earthquake Monitoring Center (Global Times)
China accuses U.S. intelligence agencies as source behind Wuhan cybersecurity attack (ZDNET) 
China teases imminent exposé of seismic US spying scheme (Register) 
2,000 Citrix NetScaler Instances Backdoored via Recent Vulnerability (SecurityWeek) 
Cloud Account Takeover Campaign Leveraging EvilProxy Targets Top-Level Executives at over 100 Global Organizations (Proofpoint)
LinkedIn Accounts Under Attack (Cyberint)
LinkedIn faces surge of account hijacking (Computing)
LinkedIn accounts hacked in widespread hijacking campaign (BleepingComputer)
Raccoon Stealer malware returns with new stealthier version (BleepingComputer)
FBI warns of increasing cryptocurrency recovery scams (BleepingComputer) 
Russia slaps Reddit, Wikipedia with fines (Cybernews)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>China accuses the US of installing backdoors in a Wuhan lab. NetScaler backdoors are found. A Phishing scam targets executives. LinkedIn sees a surge in account hijacking. Raccoon Stealer gets an update. Cryptocurrency recovery scams. We kick off our new Learning Layer segment with N2K’s Sam Meisenberg. And a Moscow court fines Reddit and Wikipedia, for unwelcome content about Russia's war.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/156</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.globaltimes.cn/page/202308/1296372.shtml">Ministry warns of data security risks after US agencies identified behind cyberattack on Wuhan Earthquake Monitoring Center</a> (Global Times)</p><p><a href="https://www.zdnet.com/article/china-accuses-us-intelligence-agencies-as-source-behind-wuhan-cybersecurity-attack/">China accuses U.S. intelligence agencies as source behind Wuhan cybersecurity attack</a> (ZDNET) </p><p><a href="https://www.theregister.com/2023/08/15/china_seismic_us_spying_expose/">China teases imminent exposé of seismic US spying scheme</a> (Register) </p><p><a href="https://www.securityweek.com/2000-citrix-netscaler-instances-backdoored-via-recent-vulnerability/">2,000 Citrix NetScaler Instances Backdoored via Recent Vulnerability</a> (SecurityWeek) </p><p><a href="https://www.proofpoint.com/us/blog/email-and-cloud-threats/cloud-account-takeover-campaign-leveraging-evilproxy-targets-top-level">Cloud Account Takeover Campaign Leveraging EvilProxy Targets Top-Level Executives at over 100 Global Organizations</a> (Proofpoint)</p><p><a href="https://cyberint.com/blog/research/linkedin-accounts-under-attack-how-to-protect-yourself/">LinkedIn Accounts Under Attack</a> (Cyberint)</p><p><a href="https://www.computing.co.uk/news/4122320/linkedin-surge-account-hijacking">LinkedIn faces surge of account hijacking </a>(Computing)</p><p><a href="https://www.bleepingcomputer.com/news/security/linkedin-accounts-hacked-in-widespread-hijacking-campaign/">LinkedIn accounts hacked in widespread hijacking campaign</a> (BleepingComputer)</p><p><a href="https://www.bleepingcomputer.com/news/security/raccoon-stealer-malware-returns-with-new-stealthier-version/">Raccoon Stealer malware returns with new stealthier version</a> (BleepingComputer)</p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-warns-of-increasing-cryptocurrency-recovery-scams/">FBI warns of increasing cryptocurrency recovery scams</a> (BleepingComputer) </p><p><a href="https://cybernews.com/news/russia-fines-reddit-wikipedia/">Russia slaps Reddit, Wikipedia with fines</a> (Cybernews)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1858</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11073382-2b53-11ee-9c79-cfe3ae6d994f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8420418162.mp3?updated=1694116572" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Investigating China’s Storm-0558. Monti ransomware is back. Evasive phishing. Realtors’ MLS taken down in ransomware incident. News from Russia’s hybrid war. And in-game scams. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1885/notes</link>
      <description>New targets of Chinese cyberespionage are uncovered. Monti ransomware is back. An evasive phishing campaign exposed. A Realtors' network taken down by cyberattack. A closer look at NoName057(16). Perspective on cyberwar - remember Pearl Harbor, but don’t see it everywhere. Ben Yelin on the Consumer Financial Protection Bureau’s plans to regulate surveillance tech. Microsoft’s Ann Johnson and Charlie Bell ponder the future of security. And scammers are targeting kids playing Fortnite and Roblox.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/155

Selected reading.
Chinese spies who read State Dept. email also hacked GOP congressman (Washington Post) 
Binary Ballet: China’s Espionage Tango with Microsoft (SecurityHQ)
Microsoft Exchange hack to be investigated by US Cyber Safety Board (Computing)
Monti ransomware targets VMware ESXi servers with new Linux locker (BleepingComputer) 
Evasive Phishing Campaign Steals Cloud Credentials Using Cloudflare R2 and Turnstile (Netskope)
Cyberattack on Bay area vendor cripples real estate industry (The Real Deal)
Intel insiders go undercover revealing fresh details into NoName hacktivist operations (Cybernews) 
Why the US Military Wants You To Rethink the Idea of 'Cyber War' (The Messenger) 
A Huge Scam Targeting Kids With Roblox and Fortnite 'Offers' Has Been Hiding in Plain Sight (WIRED)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Aug 2023 20:15:00 -0000</pubDate>
      <itunes:title>Investigating China’s Storm-0558. Monti ransomware is back. Evasive phishing. Realtors’ MLS taken down in ransomware incident. News from Russia’s hybrid war. And in-game scams. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1885</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>New targets of Chinese cyberespionage are uncovered. Monti ransomware is back. An evasive phishing campaign exposed. A Realtors' network taken down by cyberattack. A closer look at NoName057(16). Perspective on cyberwar - remember Pearl Harbor, but don’t see it everywhere. Ben Yelin on the Consumer Financial Protection Bureau’s plans to regulate surveillance tech. Microsoft’s Ann Johnson and Charlie Bell ponder the future of security. And scammers are targeting kids playing Fortnite and Roblox.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/155

Selected reading.
Chinese spies who read State Dept. email also hacked GOP congressman (Washington Post) 
Binary Ballet: China’s Espionage Tango with Microsoft (SecurityHQ)
Microsoft Exchange hack to be investigated by US Cyber Safety Board (Computing)
Monti ransomware targets VMware ESXi servers with new Linux locker (BleepingComputer) 
Evasive Phishing Campaign Steals Cloud Credentials Using Cloudflare R2 and Turnstile (Netskope)
Cyberattack on Bay area vendor cripples real estate industry (The Real Deal)
Intel insiders go undercover revealing fresh details into NoName hacktivist operations (Cybernews) 
Why the US Military Wants You To Rethink the Idea of 'Cyber War' (The Messenger) 
A Huge Scam Targeting Kids With Roblox and Fortnite 'Offers' Has Been Hiding in Plain Sight (WIRED)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>New targets of Chinese cyberespionage are uncovered. Monti ransomware is back. An evasive phishing campaign exposed. A Realtors' network taken down by cyberattack. A closer look at NoName057(16). Perspective on cyberwar - remember Pearl Harbor, but don’t see it everywhere. Ben Yelin on the Consumer Financial Protection Bureau’s plans to regulate surveillance tech. Microsoft’s Ann Johnson and Charlie Bell ponder the future of security. And scammers are targeting kids playing Fortnite and Roblox.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/155</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.washingtonpost.com/technology/2023/08/14/microsoft-china-hack-congress/">Chinese spies who read State Dept. email also hacked GOP congressman</a> (Washington Post) </p><p><a href="https://www.securityhq.com/blog/binary-ballet-chinas-espionage-tango-with-microsoft/">Binary Ballet: China’s Espionage Tango with Microsoft</a> (SecurityHQ)</p><p><a href="https://www.computing.co.uk/news/4122121/microsoft-exchange-hack-investigated-us-cyber-safety-board">Microsoft Exchange hack to be investigated by US Cyber Safety Board </a>(Computing)</p><p><a href="https://www.bleepingcomputer.com/news/security/monti-ransomware-targets-vmware-esxi-servers-with-new-linux-locker/">Monti ransomware targets VMware ESXi servers with new Linux locker</a> (BleepingComputer) </p><p><a href="https://www.netskope.com/blog/evasive-phishing-campaign-steals-cloud-credentials-using-cloudflare-r2-and-turnstile">Evasive Phishing Campaign Steals Cloud Credentials Using Cloudflare R2 and Turnstile</a> (Netskope)</p><p><a href="https://therealdeal.com/sanfrancisco/2023/08/13/real-estate-industry-grapples-with-cyberattack-on-rapattoni/">Cyberattack on Bay area vendor cripples real estate industry</a> (The Real Deal)</p><p><a href="https://cybernews.com/cyber-war/new-undercover-intel-noname-russian-hacktivist-operations/">Intel insiders go undercover revealing fresh details into NoName hacktivist operations</a> (Cybernews) </p><p><a href="https://themessenger.com/tech/why-the-us-military-wants-you-to-rethink-the-idea-of-cyber-war">Why the US Military Wants You To Rethink the Idea of 'Cyber War'</a> (The Messenger) </p><p><a href="https://www.wired.com/story/poison-pdf-scam-fortnite-roblox/">A Huge Scam Targeting Kids With Roblox and Fortnite 'Offers' Has Been Hiding in Plain Sight</a> (WIRED)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1653</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10f73f90-2b53-11ee-9c79-77587e2e7849]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1361745660.mp3?updated=1694115414" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Attacks on industrial systems in Europe and Africa. LolekHosted arrests. Notes from the hybrid war. The CSRB will investigate the cyberespionage campaign that exploited Microsoft Exchange. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1884/notes</link>
      <description>An African power generator has been targeted by ransomware. The APT31 group is believed to be responsible for attacks on industrial systems in Eastern Europe. There have been arrests related to the takedown of LolekHosted. Ukraine's SBU has alleged that Russia's GRU is using specialized malware to attack Starlink. Microsoft has decided not to extend licenses for its products in Russia. Rick Howard opens his toolbox on DDOS. In our Solution Spotlight: Simone Petrella and Camille Stewart Gloster discuss the White House release of its cybersecurity workforce and education strategy. And the Cyber Safety Review Board will be investigating cases of cyberespionage against Exchange.

Watch the full video of Simone and Camille here: Solution Spotlight: Simone Petrella and Camille Stewart Gloster

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/154

Selected reading.
DroxiDat-Cobalt Strike Duo Targets Power Generator Network (Infosecurity Magazine)
New SystemBC Malware Variant Targets Southern African Power Company (The Hacker News)
Power Generator in South Africa hit with DroxiDat and Cobalt Strike (Security Affairs) 
Southern African power generator targeted with DroxiDat malware (Record) 
Common TTPs of attacks against industrial organizations. Implants for uploading data (Kaspersky ICS CERT)
APT31 Linked to Recent Industrial Attacks in Eastern Europe (Infosecurity Magazine) 
Researchers Shed Light on APT31's Advanced Backdoors and Data Exfiltration Tactics (The Hacker News) 
LOLEKHosted admin arrested for aiding Netwalker ransomware gang (BleepingComputer)
Russian spy agencies targeting Starlink with custom malware, Ukraine warns (The Telegraph)
Russia Bans iPhones And iPads For Official Use: Report (BW Businessworld)
Microsoft Suspends Extending Licenses For Companies in Russia (RadioFreeEurope/RadioLiberty) 
Department of Homeland Security’s Cyber Safety Review Board to Conduct Review on Cloud Security (US Department of Homeland Security)
Microsoft Exchange hack is focus of cyber board’s next review (Record) 
Microsoft is under scrutiny after a recent attack by suspected Chinese hackers (Windows Central) 
The DHS’s CSRB to review cloud security practices following the hack of Microsoft Exchange govt email accounts (Security Affairs)
Microsoft's role in data breach by Chinese hackers to be part of US cyber inquiry (Firstpost)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 14 Aug 2023 20:15:00 -0000</pubDate>
      <itunes:title>Attacks on industrial systems in Europe and Africa. LolekHosted arrests. Notes from the hybrid war. The CSRB will investigate the cyberespionage campaign that exploited Microsoft Exchange. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1884</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An African power generator has been targeted by ransomware. The APT31 group is believed to be responsible for attacks on industrial systems in Eastern Europe. There have been arrests related to the takedown of LolekHosted. Ukraine's SBU has alleged that Russia's GRU is using specialized malware to attack Starlink. Microsoft has decided not to extend licenses for its products in Russia. Rick Howard opens his toolbox on DDOS. In our Solution Spotlight: Simone Petrella and Camille Stewart Gloster discuss the White House release of its cybersecurity workforce and education strategy. And the Cyber Safety Review Board will be investigating cases of cyberespionage against Exchange.

Watch the full video of Simone and Camille here: Solution Spotlight: Simone Petrella and Camille Stewart Gloster

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/154

Selected reading.
DroxiDat-Cobalt Strike Duo Targets Power Generator Network (Infosecurity Magazine)
New SystemBC Malware Variant Targets Southern African Power Company (The Hacker News)
Power Generator in South Africa hit with DroxiDat and Cobalt Strike (Security Affairs) 
Southern African power generator targeted with DroxiDat malware (Record) 
Common TTPs of attacks against industrial organizations. Implants for uploading data (Kaspersky ICS CERT)
APT31 Linked to Recent Industrial Attacks in Eastern Europe (Infosecurity Magazine) 
Researchers Shed Light on APT31's Advanced Backdoors and Data Exfiltration Tactics (The Hacker News) 
LOLEKHosted admin arrested for aiding Netwalker ransomware gang (BleepingComputer)
Russian spy agencies targeting Starlink with custom malware, Ukraine warns (The Telegraph)
Russia Bans iPhones And iPads For Official Use: Report (BW Businessworld)
Microsoft Suspends Extending Licenses For Companies in Russia (RadioFreeEurope/RadioLiberty) 
Department of Homeland Security’s Cyber Safety Review Board to Conduct Review on Cloud Security (US Department of Homeland Security)
Microsoft Exchange hack is focus of cyber board’s next review (Record) 
Microsoft is under scrutiny after a recent attack by suspected Chinese hackers (Windows Central) 
The DHS’s CSRB to review cloud security practices following the hack of Microsoft Exchange govt email accounts (Security Affairs)
Microsoft's role in data breach by Chinese hackers to be part of US cyber inquiry (Firstpost)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An African power generator has been targeted by ransomware. The APT31 group is believed to be responsible for attacks on industrial systems in Eastern Europe. There have been arrests related to the takedown of LolekHosted. Ukraine's SBU has alleged that Russia's GRU is using specialized malware to attack Starlink. Microsoft has decided not to extend licenses for its products in Russia. Rick Howard opens his toolbox on DDOS. In our Solution Spotlight: Simone Petrella and Camille Stewart Gloster discuss the White House release of its cybersecurity workforce and education strategy. And the Cyber Safety Review Board will be investigating cases of cyberespionage against Exchange.</p><p><br></p><p>Watch the full video of Simone and Camille here: <a href="https://youtu.be/cy6gq_s5ioY">Solution Spotlight: Simone Petrella and Camille Stewart Gloster</a></p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/154</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.infosecurity-magazine.com/news/droxidat-cobalt-strike-targets/">DroxiDat-Cobalt Strike Duo Targets Power Generator Network</a> (Infosecurity Magazine)</p><p><a href="https://thehackernews.com/2023/08/new-systembc-malware-variant-targets.html">New SystemBC Malware Variant Targets Southern African Power Company</a> (The Hacker News)</p><p><a href="https://securityaffairs.com/149432/malware/power-generator-droxidat.html">Power Generator in South Africa hit with DroxiDat and Cobalt Strike</a> (Security Affairs) </p><p><a href="https://therecord.media/southern-africa-utility-targeted-cyberattack">Southern African power generator targeted with DroxiDat malware</a> (Record) </p><p><a href="https://ics-cert.kaspersky.com/publications/reports/2023/08/10/common-ttps-of-attacks-against-industrial-organizations-implants-for-uploading-data/">Common TTPs of attacks against industrial organizations. Implants for uploading data</a> (Kaspersky ICS CERT)</p><p><a href="https://www.infosecurity-magazine.com/news/apt31-linked-attacks-eastern-europe/">APT31 Linked to Recent Industrial Attacks in Eastern Europe</a> (Infosecurity Magazine) </p><p><a href="https://thehackernews.com/2023/08/researchers-shed-light-on-apt31s.html">Researchers Shed Light on APT31's Advanced Backdoors and Data Exfiltration Tactics</a> (The Hacker News) </p><p><a href="https://www.bleepingcomputer.com/news/security/lolekhosted-admin-arrested-for-aiding-netwalker-ransomware-gang/">LOLEKHosted admin arrested for aiding Netwalker ransomware gang</a> (BleepingComputer)</p><p><a href="https://www.telegraph.co.uk/business/2023/08/12/russian-spy-agencies-targeting-elon-musk-starlink-malware/">Russian spy agencies targeting Starlink with custom malware, Ukraine warns</a> (The Telegraph)</p><p><a href="https://www.businessworld.in/article/Russia-Bans-Apple-iPhones-And-iPads-For-Official-Use-Report/12-08-2023-487575/">Russia Bans iPhones And iPads For Official Use: Report</a> (BW Businessworld)</p><p><a href="https://www.rferl.org/a/russia-microsoft-suspends-licenses/32543751.html">Microsoft Suspends Extending Licenses For Companies in Russia</a> (RadioFreeEurope/RadioLiberty) </p><p><a href="https://www.dhs.gov/news/2023/08/11/department-homeland-securitys-cyber-safety-review-board-conduct-review-cloud">Department of Homeland Security’s Cyber Safety Review Board to Conduct Review on Cloud Security </a>(US Department of Homeland Security)</p><p><a href="https://therecord.media/microsoft-exchange-hack-cyber-review-board">Microsoft Exchange hack is focus of cyber board’s next review</a> (Record) </p><p><a href="https://www.windowscentral.com/microsoft/microsoft-is-under-scrutiny-after-a-recent-attack-by-chinese-hackers">Microsoft is under scrutiny after a recent attack by suspected Chinese hackers</a> (Windows Central) </p><p><a href="https://securityaffairs.com/149467/security/csrb-cloud-security-practices-microsoft-exchange.html">The DHS’s CSRB to review cloud security practices following the hack of Microsoft Exchange govt email accounts</a> (Security Affairs)</p><p><a href="https://www.firstpost.com/tech/news-analysis/microsofts-role-in-data-breach-by-chinese-hackers-to-be-part-of-us-cyber-inquiry-12987732.html">Microsoft's role in data breach by Chinese hackers to be part of US cyber inquiry</a> (Firstpost)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1635</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10e809bc-2b53-11ee-9c79-d39f77faa4e8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2236628480.mp3?updated=1694114887" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dr. Georgianna Shea: Don't wait to take the initiative. [Technologist] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/162/notes</link>
      <description>Dr. Georgianna Shea, the Chief Technologist at the Transformative Cyber Innovation Lab at the Foundations for Defensive Democracies (FDD) sits down to share her incredible story, moving around to different roles and how that has lead her to where she is today. Her careers have taken her to many different states throughout the years, as she has learned and grew into the roles she took on, from Hawaii to D.C., Dr. Shea has done it all. Sharing some advice, Dr. Shea says "My words of wisdom are take advantage of every opportunity and don't wait for anybody. I try to mentor people and I talk to young people a lot, you know, trying to get into the field and, and I see a lot of waiting on other people." She explains that you are able to work on your own to become an expert, and taking that initiative will be the thing to get you to where you want to be. We thank Dr. Georgianna Shea for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 13 Aug 2023 07:00:00 -0000</pubDate>
      <itunes:title>Dr. Georgianna Shea: Don't wait to take the initiative. [Technologist] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>162</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dr. Georgianna Shea, the Chief Technologist at the Transformative Cyber Innovation Lab at the Foundations for Defensive Democracies (FDD) sits down to share her incredible story, moving around to different roles and how that has lead her to where she is today. Her careers have taken her to many different states throughout the years, as she has learned and grew into the roles she took on, from Hawaii to D.C., Dr. Shea has done it all. Sharing some advice, Dr. Shea says "My words of wisdom are take advantage of every opportunity and don't wait for anybody. I try to mentor people and I talk to young people a lot, you know, trying to get into the field and, and I see a lot of waiting on other people." She explains that you are able to work on your own to become an expert, and taking that initiative will be the thing to get you to where you want to be. We thank Dr. Georgianna Shea for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dr. Georgianna Shea, the Chief Technologist at the Transformative Cyber Innovation Lab at the Foundations for Defensive Democracies (FDD) sits down to share her incredible story, moving around to different roles and how that has lead her to where she is today. Her careers have taken her to many different states throughout the years, as she has learned and grew into the roles she took on, from Hawaii to D.C., Dr. Shea has done it all. Sharing some advice, Dr. Shea says "My words of wisdom are take advantage of every opportunity and don't wait for anybody. I try to mentor people and I talk to young people a lot, you know, trying to get into the field and, and I see a lot of waiting on other people." She explains that you are able to work on your own to become an expert, and taking that initiative will be the thing to get you to where you want to be. We thank Dr. Georgianna Shea for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>627</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7dd110e0-387e-11ee-b088-7fa69354e57e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6438337374.mp3?updated=1691780296" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>It's raining credentials. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/294/notes</link>
      <description>Alex Delamotte from SentinelLabs joins Dave to discuss their work on "Cloudy With a Chance of Credentials | AWS-Targeting Cred Stealer Expands to Azure, GCP." As actors find more ways to profit from compromising services, SentinelLabs finds that cloud service credentials are becoming increasingly targeted.
The lack of threats explicitly targeting Azure and GCP credentials up to this point means there are likely many fresh targets. The research states "These campaigns share similarity with tools attributed to the notorious TeamTNT cryptojacking crew. However, attribution remains challenging with script-based tools, as anyone can adapt the code for their own use."
The research can be found here:
Cloudy With a Chance of Credentials | AWS-Targeting Cred Stealer Expands to Azure, GCP

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Aug 2023 07:00:00 -0000</pubDate>
      <itunes:title>It's raining credentials. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>294</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Alex Delamotte from SentinelLabs joins Dave to discuss their work on "Cloudy With a Chance of Credentials | AWS-Targeting Cred Stealer Expands to Azure, GCP." As actors find more ways to profit from compromising services, SentinelLabs finds that cloud service credentials are becoming increasingly targeted.
The lack of threats explicitly targeting Azure and GCP credentials up to this point means there are likely many fresh targets. The research states "These campaigns share similarity with tools attributed to the notorious TeamTNT cryptojacking crew. However, attribution remains challenging with script-based tools, as anyone can adapt the code for their own use."
The research can be found here:
Cloudy With a Chance of Credentials | AWS-Targeting Cred Stealer Expands to Azure, GCP

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Alex Delamotte from SentinelLabs joins Dave to discuss their work on "Cloudy With a Chance of Credentials | AWS-Targeting Cred Stealer Expands to Azure, GCP." As actors find more ways to profit from compromising services, SentinelLabs finds that cloud service credentials are becoming increasingly targeted.</p><p>The lack of threats explicitly targeting Azure and GCP credentials up to this point means there are likely many fresh targets. The research states "These campaigns share similarity with tools attributed to the notorious TeamTNT cryptojacking crew. However, attribution remains challenging with script-based tools, as anyone can adapt the code for their own use."</p><p>The research can be found here:</p><ul><li><a href="https://www.sentinelone.com/labs/cloudy-with-a-chance-of-credentials-aws-targeting-cred-stealer-expands-to-azure-gcp/">Cloudy With a Chance of Credentials | AWS-Targeting Cred Stealer Expands to Azure, GCP</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1090</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1340a804-385f-11ee-8b85-a7f428d0e34e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4893421444.mp3?updated=1691767635" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tehran’s social engineering. CSRB reports on Lapsus$. Call for comment on open-source standards. Coping with a tight labor market. Two private sector incidents in Russia’s hybrid war.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1883/notes</link>
      <description>Charming Kitten collects against Iranian expatriate dissidents. The Cyber Safety Review Board reports on Lapsus$. A Call for comment on open-source, memory-safe standards. How NSA is coping with the cyber labor market. Yandex is restructuring. The Washington Post’s Tim Starks joins us with the latest cyber security efforts from the DOD. Our guest is Dan L. Dodson, CEO of Fortified Health Security with insights on protecting patient data. And How Viasat was hacked.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/153

Selected reading.
Germany says Charming Kitten hackers target Iran dissidents (Deutsche Welle)
Cyber Safety Review Board Releases Report on Activities of Global Extortion-Focused Hacker Group Lapsus$ (US Department of Homeland Security) 
Review Of The Attacks Associated with Lapsus$ And Related Threat Groups Report (Cybersecurity and Infrastructure Security Agency CISA)
Fact Sheet: Office of the National Cyber Director Requests Public Comment on Open-Source Software Security and Memory Safe Programming Languages (ONCD | The White House) 
Amid historic hiring surge, NSA considers hybrid, unclassified work options (Federal News Network)
Exclusive: Fear of tech 'brain drain' prevents Russia from seizing Yandex for now, sources say (Reuters)
Yandex co-founder Volozh slams Russia's 'barbaric' invasion of Ukraine (Reuters) 
Satellite hack on eve of Ukraine war was a coordinated, multi-pronged assault (CyberScoop)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 11 Aug 2023 20:15:00 -0000</pubDate>
      <itunes:title>Tehran’s social engineering. CSRB reports on Lapsus$. Call for comment on open-source standards. Coping with a tight labor market. Two private sector incidents in Russia’s hybrid war.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1883</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Charming Kitten collects against Iranian expatriate dissidents. The Cyber Safety Review Board reports on Lapsus$. A Call for comment on open-source, memory-safe standards. How NSA is coping with the cyber labor market. Yandex is restructuring. The Washington Post’s Tim Starks joins us with the latest cyber security efforts from the DOD. Our guest is Dan L. Dodson, CEO of Fortified Health Security with insights on protecting patient data. And How Viasat was hacked.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/153

Selected reading.
Germany says Charming Kitten hackers target Iran dissidents (Deutsche Welle)
Cyber Safety Review Board Releases Report on Activities of Global Extortion-Focused Hacker Group Lapsus$ (US Department of Homeland Security) 
Review Of The Attacks Associated with Lapsus$ And Related Threat Groups Report (Cybersecurity and Infrastructure Security Agency CISA)
Fact Sheet: Office of the National Cyber Director Requests Public Comment on Open-Source Software Security and Memory Safe Programming Languages (ONCD | The White House) 
Amid historic hiring surge, NSA considers hybrid, unclassified work options (Federal News Network)
Exclusive: Fear of tech 'brain drain' prevents Russia from seizing Yandex for now, sources say (Reuters)
Yandex co-founder Volozh slams Russia's 'barbaric' invasion of Ukraine (Reuters) 
Satellite hack on eve of Ukraine war was a coordinated, multi-pronged assault (CyberScoop)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Charming Kitten collects against Iranian expatriate dissidents. The Cyber Safety Review Board reports on Lapsus$. A Call for comment on open-source, memory-safe standards. How NSA is coping with the cyber labor market. Yandex is restructuring. The Washington Post’s Tim Starks joins us with the latest cyber security efforts from the DOD. Our guest is Dan L. Dodson, CEO of Fortified Health Security with insights on protecting patient data. And How Viasat was hacked.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/153</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.dw.com/en/germany-says-charming-kitten-hackers-target-iran-dissidents/a-66493687">Germany says Charming Kitten hackers target Iran dissidents</a> (Deutsche Welle)</p><p><a href="https://www.dhs.gov/news/2023/08/10/cyber-safety-review-board-releases-report-activities-global-extortion-focused">Cyber Safety Review Board Releases Report on Activities of Global Extortion-Focused Hacker Group Lapsus$</a> (US Department of Homeland Security) </p><p><a href="https://www.cisa.gov/resources-tools/resources/review-attacks-associated-lapsus-and-related-threat-groups-report">Review Of The Attacks Associated with Lapsus$ And Related Threat Groups Report</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.whitehouse.gov/oncd/briefing-room/2023/08/10/fact-sheet-office-of-the-national-cyber-director-requests-public-comment-on-open-source-software-security-and-memory-safe-programming-languages/?utm_campaign=wp_the_cybersecurity_202&amp;utm_medium=email&amp;utm_source=newsletter&amp;wpisrc=nl_cybersecurity202">Fact Sheet: Office of the National Cyber Director Requests Public Comment on Open-Source Software Security and Memory Safe Programming Languages</a> (ONCD | The White House) </p><p><a href="https://federalnewsnetwork.com/hiring-retention/2023/08/amid-historic-hiring-surge-nsa-considers-hybrid-unclassified-work-options/">Amid historic hiring surge, NSA considers hybrid, unclassified work options</a> (Federal News Network)</p><p><a href="https://www.reuters.com/technology/fear-tech-brain-drain-prevents-russia-seizing-yandex-now-sources-2023-08-10/">Exclusive: Fear of tech 'brain drain' prevents Russia from seizing Yandex for now, sources say</a> (Reuters)</p><p><a href="https://www.reuters.com/world/europe/yandex-co-founder-volozh-slams-russias-barbaric-invasion-ukraine-2023-08-10/">Yandex co-founder Volozh slams Russia's 'barbaric' invasion of Ukraine</a> (Reuters) </p><p><a href="https://cyberscoop.com/viasat-ka-sat-hack-black-hat/">Satellite hack on eve of Ukraine war was a coordinated, multi-pronged assault</a> (CyberScoop)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1867</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10d89608-2b53-11ee-9c79-9fbc781b76c1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1860838074.mp3?updated=1694014367" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A new Magecart campaign. Gootloader’s legal bait. Cryptowallet vulnerabilities. News from the hybrid war. And DARPA’s AI Cybersecurity Challenge.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1882/notes</link>
      <description>A New Magento campaign is discovered. Gootloader malware-as-a-service afflicts law firms. Researchers find security flaws affecting cryptowallets. Panasonic warns of increasing attacks against IoT. A Belarusian cyberespionage campaign outlined. The five cyber phases of Russia's hybrid war, and lessons in resilience from Ukraine's experience. In our Threat Vector segment, Kristopher Russo, Senior Threat Researcher for Unit 42 joins David Moulton to discuss Muddled Libra. Kayla Williams from Devo describes their work benefiting the community at BlackHat. And a new DARPA challenge seeks to bring artificial intelligence to cybersecurity.
On this segment of Threat Vector, Kristopher Russo, Senior Threat Researcher for Unit 42, joins host David Moulton to discuss part one of two Muddled Libra.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/152

Threat Vector links.
Threat Group Assessment: Muddled Libra
Guest: Kristopher Russo: From practitioner to researcher Kristopher Russo has spent years entrenched in various specializations of cybersecurity. As a researcher focused on ransomware and cybercrime he brings a from the trenches perspective to cyber threat intelligence.

Selected reading.
Xurum: New Magento Campaign Discovered (Akamai)
Gootloader: Why your Legal Document Search May End in Misery (Trustwave)
Fireblocks Researchers Uncover Vulnerabilities Impacting Dozens of Major Wallet Providers (Fireblocks)
New BitForge cryptocurrency wallet flaws lets hackers steal crypto (BleepingCompute
Panasonic Warns That IoT Malware Attack Cycles Are Accelerating (WIRED) 
MoustachedBouncer: Espionage against foreign diplomats in Belarus (We Live Security) 
Belarus hackers target foreign diplomats with help of local ISPs, researchers say (TechCrunch) 
Pro-Russian hackers claim attacks on French, Dutch websites (Record) 
Zhora: Russia's cyber 'war crimes' will outlast invasion (Register)
The Power of Resilience (Cybersecurity and Infrastructure Security Agency CISA)
Biden-Harris Administration Launches Artificial Intelligence Cyber Challenge to Protect America’s Critical Software (The White House)
AIxCC (AIxCC)
The Biden administration wants to put AI to the test for cybersecurity (Washington Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 10 Aug 2023 20:15:00 -0000</pubDate>
      <itunes:title>A new Magecart campaign. Gootloader’s legal bait. Cryptowallet vulnerabilities. News from the hybrid war. And DARPA’s AI Cybersecurity Challenge.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1882</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A New Magento campaign is discovered. Gootloader malware-as-a-service afflicts law firms. Researchers find security flaws affecting cryptowallets. Panasonic warns of increasing attacks against IoT. A Belarusian cyberespionage campaign outlined. The five cyber phases of Russia's hybrid war, and lessons in resilience from Ukraine's experience. In our Threat Vector segment, Kristopher Russo, Senior Threat Researcher for Unit 42 joins David Moulton to discuss Muddled Libra. Kayla Williams from Devo describes their work benefiting the community at BlackHat. And a new DARPA challenge seeks to bring artificial intelligence to cybersecurity.
On this segment of Threat Vector, Kristopher Russo, Senior Threat Researcher for Unit 42, joins host David Moulton to discuss part one of two Muddled Libra.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/152

Threat Vector links.
Threat Group Assessment: Muddled Libra
Guest: Kristopher Russo: From practitioner to researcher Kristopher Russo has spent years entrenched in various specializations of cybersecurity. As a researcher focused on ransomware and cybercrime he brings a from the trenches perspective to cyber threat intelligence.

Selected reading.
Xurum: New Magento Campaign Discovered (Akamai)
Gootloader: Why your Legal Document Search May End in Misery (Trustwave)
Fireblocks Researchers Uncover Vulnerabilities Impacting Dozens of Major Wallet Providers (Fireblocks)
New BitForge cryptocurrency wallet flaws lets hackers steal crypto (BleepingCompute
Panasonic Warns That IoT Malware Attack Cycles Are Accelerating (WIRED) 
MoustachedBouncer: Espionage against foreign diplomats in Belarus (We Live Security) 
Belarus hackers target foreign diplomats with help of local ISPs, researchers say (TechCrunch) 
Pro-Russian hackers claim attacks on French, Dutch websites (Record) 
Zhora: Russia's cyber 'war crimes' will outlast invasion (Register)
The Power of Resilience (Cybersecurity and Infrastructure Security Agency CISA)
Biden-Harris Administration Launches Artificial Intelligence Cyber Challenge to Protect America’s Critical Software (The White House)
AIxCC (AIxCC)
The Biden administration wants to put AI to the test for cybersecurity (Washington Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A New Magento campaign is discovered. Gootloader malware-as-a-service afflicts law firms. Researchers find security flaws affecting cryptowallets. Panasonic warns of increasing attacks against IoT. A Belarusian cyberespionage campaign outlined. The five cyber phases of Russia's hybrid war, and lessons in resilience from Ukraine's experience. In our Threat Vector segment, Kristopher Russo, Senior Threat Researcher for Unit 42 joins David Moulton to discuss Muddled Libra. Kayla Williams from Devo describes their work benefiting the community at BlackHat. And a new DARPA challenge seeks to bring artificial intelligence to cybersecurity.</p><p>On this segment of Threat Vector, <a href="https://www.linkedin.com/in/krisrusso/">Kristopher Russo</a>, Senior Threat Researcher for Unit 42, joins host <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a> to discuss part one of two Muddled Libra.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/152</p><p><br></p><h2>Threat Vector links.</h2><p><a href="https://unit42.paloaltonetworks.com/muddled-libra/?utm_source=cyberwire-podcast-&amp;utm_medium=episode2">Threat Group Assessment: Muddled Libra</a></p><p>Guest: Kristopher Russo: From practitioner to researcher Kristopher Russo has spent years entrenched in various specializations of cybersecurity. As a researcher focused on ransomware and cybercrime he brings a from the trenches perspective to cyber threat intelligence.</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.akamai.com/blog/security-research/new-sophisticated-magento-campaign-xurum-webshell">Xurum: New Magento Campaign Discovered</a> (Akamai)</p><p><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/gootloader-why-your-legal-document-search-may-end-in-misery/">Gootloader: Why your Legal Document Search May End in Misery</a> (Trustwave)</p><p><a href="https://www.fireblocks.com/press/fireblocks-researchers-uncover-vulnerabilities-impacting-dozens-of-major-wallet-providers/">Fireblocks Researchers Uncover Vulnerabilities Impacting Dozens of Major Wallet Providers</a> (Fireblocks)</p><p><a href="https://www.bleepingcomputer.com/news/cryptocurrency/new-bitforge-cryptocurrency-wallet-flaws-lets-hackers-steal-crypto/">New BitForge cryptocurrency wallet flaws lets hackers steal crypto</a> (BleepingCompute</p><p><a href="https://www.wired.com/story/panasonic-iot-malware-honeypots/">Panasonic Warns That IoT Malware Attack Cycles Are Accelerating</a> (WIRED) </p><p><a href="https://www.welivesecurity.com/en/eset-research/moustachedbouncer-espionage-against-foreign-diplomats-in-belarus/">MoustachedBouncer: Espionage against foreign diplomats in Belarus</a> (We Live Security) </p><p><a href="https://techcrunch.com/2023/08/10/belarus-hackers-target-foreign-diplomats/">Belarus hackers target foreign diplomats with help of local ISPs, researchers say</a> (TechCrunch) </p><p><a href="https://therecord.media/prorussian-hackers-claim-attacks">Pro-Russian hackers claim attacks on French, Dutch websites</a> (Record) </p><p><a href="https://www.theregister.com/2023/08/09/ukraines_victor_zhora_russias_cyber/">Zhora: Russia's cyber 'war crimes' will outlast invasion</a> (Register)</p><p><a href="https://www.cisa.gov/news-events/news/power-resilience">The Power of Resilience</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/08/09/biden-harris-administration-launches-artificial-intelligence-cyber-challenge-to-protect-americas-critical-software/">Biden-Harris Administration Launches Artificial Intelligence Cyber Challenge to Protect America’s Critical Software</a> (The White House)</p><p><a href="https://aicyberchallenge.com/">AIxCC</a> (AIxCC)</p><p><a href="https://www.washingtonpost.com/politics/2023/08/10/biden-administration-wants-put-ai-test-cybersecurity/">The Biden administration wants to put AI to the test for cybersecurity</a> (Washington Post)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1883</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10c91d54-2b53-11ee-9c79-0f518bfdf54a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7085337701.mp3?updated=1694114336" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage by several intelligence services, some of contracted out. Developments in the cyber underworld. Vulnerabilities reported in CPUs. Some notes on Patch Tuesday.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1881/notes</link>
      <description>Reports of a Wide-ranging cyberespionage campaign by China's Ministry of State Security. EvilProxy phishing tool targets executives, and defeats multifactor authentication. Vulnerabilities in CPUs. Yashma ransomware targets a wide range of countries. MacOS threat trends. Is there a Russian attempt to disrupt British elections? Rob Boyce from Accenture checks in from the Blackhat conference. Maria Varmazis talking with Black Hat Aerospace Village's Kaylin Trychon and Steve Luczynski. Ukraine claims to have stopped a Russian spyware campaign. And Patch Tuesday has come and gone, but the vulnerabilities remain–unless, of course, you’ve applied the patches.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/151

Selected reading.
Chinese hackers targeted at least 17 countries across Asia, Europe and North America (Record)
RedHotel: A Prolific, Chinese State-Sponsored Group Operating at a Global Scale (Recorded Future)
Cloud Account Takeover Campaign Leveraging EvilProxy Targets Top-Level Executives at over 100 Global Organizations (Proofpoint) 
‘Downfall’ vulnerability leaves billions of Intel CPUs at risk  (CyberScoop) 
New Inception attack leaks sensitive data from all AMD Zen CPUs (BleepingComputer)
New Yashma Ransomware Variant Targets Multiple English-Speaking Countries (The Hacker News) 
Suspected Vietnamese hacker targets Chinese, Bulgarian organizations with new ransomware (Record)
Black Hat USA 2023 – Bitdefender macOS Threat Report Reveals Key Dangers for Mac Users (Bitdefender) 
Russia ‘tops list of suspects’ in cyber attack which exposed data of 40m UK voters (The Telegraph)
Electoral Commission hack: Five things you need to know (Computing)
‘Hostile actors’ hacked British voter registry, electoral agency says (Washington Post)
Electoral Commission apologises for security breach involving UK voters’ data (the Guardian) 
Ukraine says it prevented Russian hacking of armed forces combat system (Reuters) 
Ukraine says it thwarted attempt to breach military tablets (Record)
Russian secret services try to penetrate operation planning electronic system of Ukraine's army (Ukrainska Pravda)
Patch Tuesday: Adobe Patches 30 Acrobat, Reader Vulns (SecurityWeek) 
Patch Tuesday: Microsoft (Finally) Patches Exploited Office Zero-Days (SecurityWeek)
Microsoft Releases August 2023 Security Updates (Cybersecurity and Infrastructure Security Agency CISA)
Fortinet Releases Security Update for FortiOS (Cybersecurity and Infrastructure Security Agency CISA)
Adobe Releases Security Updates for Multiple Products (Cybersecurity and Infrastructure Security Agency CISA) 
Patch Tuesday review: August 2023. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 09 Aug 2023 20:15:00 -0000</pubDate>
      <itunes:title>Cyberespionage by several intelligence services, some of contracted out. Developments in the cyber underworld. Vulnerabilities reported in CPUs. Some notes on Patch Tuesday.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1881</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Reports of a Wide-ranging cyberespionage campaign by China's Ministry of State Security. EvilProxy phishing tool targets executives, and defeats multifactor authentication. Vulnerabilities in CPUs. Yashma ransomware targets a wide range of countries. MacOS threat trends. Is there a Russian attempt to disrupt British elections? Rob Boyce from Accenture checks in from the Blackhat conference. Maria Varmazis talking with Black Hat Aerospace Village's Kaylin Trychon and Steve Luczynski. Ukraine claims to have stopped a Russian spyware campaign. And Patch Tuesday has come and gone, but the vulnerabilities remain–unless, of course, you’ve applied the patches.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/151

Selected reading.
Chinese hackers targeted at least 17 countries across Asia, Europe and North America (Record)
RedHotel: A Prolific, Chinese State-Sponsored Group Operating at a Global Scale (Recorded Future)
Cloud Account Takeover Campaign Leveraging EvilProxy Targets Top-Level Executives at over 100 Global Organizations (Proofpoint) 
‘Downfall’ vulnerability leaves billions of Intel CPUs at risk  (CyberScoop) 
New Inception attack leaks sensitive data from all AMD Zen CPUs (BleepingComputer)
New Yashma Ransomware Variant Targets Multiple English-Speaking Countries (The Hacker News) 
Suspected Vietnamese hacker targets Chinese, Bulgarian organizations with new ransomware (Record)
Black Hat USA 2023 – Bitdefender macOS Threat Report Reveals Key Dangers for Mac Users (Bitdefender) 
Russia ‘tops list of suspects’ in cyber attack which exposed data of 40m UK voters (The Telegraph)
Electoral Commission hack: Five things you need to know (Computing)
‘Hostile actors’ hacked British voter registry, electoral agency says (Washington Post)
Electoral Commission apologises for security breach involving UK voters’ data (the Guardian) 
Ukraine says it prevented Russian hacking of armed forces combat system (Reuters) 
Ukraine says it thwarted attempt to breach military tablets (Record)
Russian secret services try to penetrate operation planning electronic system of Ukraine's army (Ukrainska Pravda)
Patch Tuesday: Adobe Patches 30 Acrobat, Reader Vulns (SecurityWeek) 
Patch Tuesday: Microsoft (Finally) Patches Exploited Office Zero-Days (SecurityWeek)
Microsoft Releases August 2023 Security Updates (Cybersecurity and Infrastructure Security Agency CISA)
Fortinet Releases Security Update for FortiOS (Cybersecurity and Infrastructure Security Agency CISA)
Adobe Releases Security Updates for Multiple Products (Cybersecurity and Infrastructure Security Agency CISA) 
Patch Tuesday review: August 2023. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Reports of a Wide-ranging cyberespionage campaign by China's Ministry of State Security. EvilProxy phishing tool targets executives, and defeats multifactor authentication. Vulnerabilities in CPUs. Yashma ransomware targets a wide range of countries. MacOS threat trends. Is there a Russian attempt to disrupt British elections? Rob Boyce from Accenture checks in from the Blackhat conference. Maria Varmazis talking with Black Hat Aerospace Village's Kaylin Trychon and Steve Luczynski. Ukraine claims to have stopped a Russian spyware campaign. And Patch Tuesday has come and gone, but the vulnerabilities remain–unless, of course, you’ve applied the patches.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/151</p><p><br></p><h2>Selected reading.</h2><p><a href="https://therecord.media/chinese-military-hackers-redhotel-target-countries-across-asia-north-america-europe">Chinese hackers targeted at least 17 countries across Asia, Europe and North America</a> (Record)</p><p><a href="https://www.recordedfuture.com/redhotel-a-prolific-chinese-state-sponsored-group-operating-at-a-global-scale">RedHotel: A Prolific, Chinese State-Sponsored Group Operating at a Global Scale</a> (Recorded Future)</p><p><a href="https://www.proofpoint.com/us/blog/email-and-cloud-threats/cloud-account-takeover-campaign-leveraging-evilproxy-targets-top-level">Cloud Account Takeover Campaign Leveraging EvilProxy Targets Top-Level Executives at over 100 Global Organizations</a> (Proofpoint) </p><p><a href="https://cyberscoop.com/downfall-intel-cpu-vulnerability/">‘Downfall’ vulnerability leaves billions of Intel CPUs at risk </a> (CyberScoop) </p><p><a href="https://www.bleepingcomputer.com/news/security/new-inception-attack-leaks-sensitive-data-from-all-amd-zen-cpus/">New Inception attack leaks sensitive data from all AMD Zen CPUs</a> (BleepingComputer)</p><p><a href="https://thehackernews.com/2023/08/new-yashma-ransomware-variant-targets.html">New Yashma Ransomware Variant Targets Multiple English-Speaking Countries</a> (The Hacker News) </p><p><a href="https://therecord.media/vietnamese-hacker-targets-chinese-bulgarian-organizations-with-new-ransomware">Suspected Vietnamese hacker targets Chinese, Bulgarian organizations with new ransomware</a> (Record)</p><p><a href="https://www.bitdefender.com/blog/hotforsecurity/black-hat-usa-2023-bitdefender-macos-threat-report-reveals-key-dangers-for-mac-users/">Black Hat USA 2023 – Bitdefender macOS Threat Report Reveals Key Dangers for Mac Users</a> (Bitdefender) </p><p><a href="https://www.telegraph.co.uk/news/2023/08/08/election-watchdog-cyber-attack-hostile-actors/">Russia ‘tops list of suspects’ in cyber attack which exposed data of 40m UK voters</a> (The Telegraph)</p><p><a href="https://www.computing.co.uk/special/4121845/electoral-commission-hack">Electoral Commission hack: Five things you need to know </a>(Computing)</p><p><a href="https://www.washingtonpost.com/world/2023/08/08/uk-britain-voter-registry-breach-hack/">‘Hostile actors’ hacked British voter registry, electoral agency says</a> (Washington Post)</p><p><a href="https://www.theguardian.com/technology/2023/aug/08/uk-electoral-commission-registers-targeted-by-hostile-hackers">Electoral Commission apologises for security breach involving UK voters’ data</a> (the Guardian) </p><p><a href="https://www.reuters.com/world/europe/ukraine-says-it-prevented-russian-hacking-armed-forces-combat-system-2023-08-08/">Ukraine says it prevented Russian hacking of armed forces combat system</a> (Reuters) </p><p><a href="https://therecord.media/ukraine-military-tablets-sandworm-hacking-attempt">Ukraine says it thwarted attempt to breach military tablets</a> (Record)</p><p><a href="https://www.pravda.com.ua/eng/news/2023/08/8/7414713/">Russian secret services try to penetrate operation planning electronic system of Ukraine's army</a> (Ukrainska Pravda)</p><p><a href="https://www.securityweek.com/patch-tuesday-adobe-patches-30-acrobat-reader-vulns/">Patch Tuesday: Adobe Patches 30 Acrobat, Reader Vulns</a> (SecurityWeek) </p><p><a href="https://www.securityweek.com/patch-tuesday-microsoft-finally-patches-exploited-office-zero-days/">Patch Tuesday: Microsoft (Finally) Patches Exploited Office Zero-Days</a> (SecurityWeek)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/08/08/microsoft-releases-august-2023-security-updates">Microsoft Releases August 2023 Security Updates</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/08/08/fortinet-releases-security-update-fortios">Fortinet Releases Security Update for FortiOS</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/08/08/adobe-releases-security-updates-multiple-products">Adobe Releases Security Updates for Multiple Products</a> (Cybersecurity and Infrastructure Security Agency CISA) </p><p><a href="https://thecyberwire.com/stories/e8be9fd761334d5dba9981144b52782b/patch-tuesday-review-august-2023">Patch Tuesday review: August 2023.</a> (CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1785</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10b9e032-2b53-11ee-9c79-3b77b1b05e4a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7131061820.mp3?updated=1691693416" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Challenges to intelligence-sharing. The complexity of supply-chain security. Ransomware developments. Notes on Russia’s hybrid war, including possible sensor data manipulation. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1880/notes</link>
      <description>Reports on a 2020 Chinese penetration of Japan's defense networks. MOVEit-connected supply chain issues aren't over. Akamai looks at the current state of ransomware. Mallox ransomware continues its evolution. Machine identities and shadow access. Ukrainian hacktivist auxiliaries hit Russian websites. Joe Carrigan unpacks statistics recently released by CISA. Our guest is Jeffrey Wheatman from Black Kite discussing the market shift from SRS to cyber risk intelligence. And radiation sensor reports from Chernobyl may have been manipulated.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/150

Selected reading.
China hacked Japan’s sensitive defense networks, officials say (Washington Post) 
Japan says cannot confirm leakage after report says China hacked defence networks (Reuters)
MOVEit hack spawned around 600 breaches but isn't done yet - cyber analysts (Reuters)
Mallox Ransomware Group Revamps Malware Variants, Evasion Tactics (Dark Reading)
TargetCompany Ransomware Abuses FUD Obfuscator Packers (Trend Micro)
New IAM Research by Stack Identity Finds Machine Identities Dominate Shadow Access in the Cloud, Revealing Easy Attack Vector for Hackers (Business Wire)
Ukraine-Linked Group Claims It Hacked Website Of Moscow Property Registration Bureau (RadioFreeEurope/RadioLiberty)
Ukraine-linked group claims it hacked Moscow property registration bureau website – RFE/RL (Euromaidan Press)
Pro-Ukrainian hackers breach Moscow engineering service website (New Voice of Ukraine)
Ukrainian state agencies targeted with open-source malware MerlinAgent (Record)
The Mystery of Chernobyl’s Post-Invasion Radiation Spikes (WIRED) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Aug 2023 20:30:00 -0000</pubDate>
      <itunes:title>Challenges to intelligence-sharing. The complexity of supply-chain security. Ransomware developments. Notes on Russia’s hybrid war, including possible sensor data manipulation. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1880</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Reports on a 2020 Chinese penetration of Japan's defense networks. MOVEit-connected supply chain issues aren't over. Akamai looks at the current state of ransomware. Mallox ransomware continues its evolution. Machine identities and shadow access. Ukrainian hacktivist auxiliaries hit Russian websites. Joe Carrigan unpacks statistics recently released by CISA. Our guest is Jeffrey Wheatman from Black Kite discussing the market shift from SRS to cyber risk intelligence. And radiation sensor reports from Chernobyl may have been manipulated.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/150

Selected reading.
China hacked Japan’s sensitive defense networks, officials say (Washington Post) 
Japan says cannot confirm leakage after report says China hacked defence networks (Reuters)
MOVEit hack spawned around 600 breaches but isn't done yet - cyber analysts (Reuters)
Mallox Ransomware Group Revamps Malware Variants, Evasion Tactics (Dark Reading)
TargetCompany Ransomware Abuses FUD Obfuscator Packers (Trend Micro)
New IAM Research by Stack Identity Finds Machine Identities Dominate Shadow Access in the Cloud, Revealing Easy Attack Vector for Hackers (Business Wire)
Ukraine-Linked Group Claims It Hacked Website Of Moscow Property Registration Bureau (RadioFreeEurope/RadioLiberty)
Ukraine-linked group claims it hacked Moscow property registration bureau website – RFE/RL (Euromaidan Press)
Pro-Ukrainian hackers breach Moscow engineering service website (New Voice of Ukraine)
Ukrainian state agencies targeted with open-source malware MerlinAgent (Record)
The Mystery of Chernobyl’s Post-Invasion Radiation Spikes (WIRED) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Reports on a 2020 Chinese penetration of Japan's defense networks. MOVEit-connected supply chain issues aren't over. Akamai looks at the current state of ransomware. Mallox ransomware continues its evolution. Machine identities and shadow access. Ukrainian hacktivist auxiliaries hit Russian websites. Joe Carrigan unpacks statistics recently released by CISA. Our guest is Jeffrey Wheatman from Black Kite discussing the market shift from SRS to cyber risk intelligence. And radiation sensor reports from Chernobyl may have been manipulated.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/150</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.washingtonpost.com/national-security/2023/08/07/china-japan-hack-pentagon/">China hacked Japan’s sensitive defense networks, officials say</a> (Washington Post) </p><p><a href="https://www.reuters.com/technology/japan-says-cannot-confirm-leakage-after-report-says-china-hacked-defence-2023-08-08/">Japan says cannot confirm leakage after report says China hacked defence networks</a> (Reuters)</p><p><a href="https://www.reuters.com/technology/moveit-hack-spawned-around-600-breaches-isnt-done-yet-cyber-analysts-2023-08-08/">MOVEit hack spawned around 600 breaches but isn't done yet - cyber analysts</a> (Reuters)</p><p><a href="https://www.darkreading.com/ics-ot/mallox-ransomware-group-steams-ahead-with-new-variant-evasion-tactics">Mallox Ransomware Group Revamps Malware Variants, Evasion Tactics</a> (Dark Reading)</p><p><a href="https://www.trendmicro.com/en_us/research/23/h/targetcompany-ransomware-abuses-fud-obfuscator-packers.html">TargetCompany Ransomware Abuses FUD Obfuscator Packers</a> (Trend Micro)</p><p><a href="https://www.businesswire.com/news/home/20230808675738/en/New-IAM-Research-by-Stack-Identity-Finds-Machine-Identities-Dominate-Shadow-Access-in-the-Cloud-Revealing-Easy-Attack-Vector-for-Hackers">New IAM Research by Stack Identity Finds Machine Identities Dominate Shadow Access in the Cloud, Revealing Easy Attack Vector for Hackers</a> (Business Wire)</p><p><a href="https://www.rferl.org/a/russia-ukrainian-hackers/32537426.html">Ukraine-Linked Group Claims It Hacked Website Of Moscow Property Registration Bureau</a> (RadioFreeEurope/RadioLiberty)</p><p><a href="https://euromaidanpress.com/2023/08/07/ukraine-linked-group-claims-it-hacked-moscow-property-registration-bureau-website-rfe-rl/">Ukraine-linked group claims it hacked Moscow property registration bureau website – RFE/RL</a> (Euromaidan Press)</p><p><a href="https://english.nv.ua/nation/pro-ukrainian-hackers-breach-moscow-engineering-service-website-news-50344511.html">Pro-Ukrainian hackers breach Moscow engineering service website</a> (New Voice of Ukraine)</p><p><a href="https://therecord.media/ukrainian-agencies-targeted-with-merlin">Ukrainian state agencies targeted with open-source malware MerlinAgent</a> (Record)</p><p><a href="https://www.wired.com/story/chernobyl-radiation-spike-mystery/">The Mystery of Chernobyl’s Post-Invasion Radiation Spikes</a> (WIRED) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1735</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10aadfec-2b53-11ee-9c79-db3f90965b99]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7000924465.mp3?updated=1691524608" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pyongyang’s new friendship with Moscow apparently only goes so far. Reptile rootkit in the wild. Cloudzy updates. Cl0p’s torrents. And notes on cyber phases of Russia’s hybrid war. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1879/notes</link>
      <description>North Korean cyberespionage against a Russian aerospace firm. The Reptile rootkit is used against South Korean systems. An update on Cloudzy. Cl0p is using torrents to move data stolen in MOVEit exploitation. Andrea Little Limbago from Interos wonders about the dangers of jumping head first into new technologies? Rick Howard ponders quantum computing. And Meduza is back on Apple Podcasts.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/149

Selected reading.
Exclusive: North Korean hackers breached top Russian missile maker (Reuters)
North Korean hackers stole secrets of Russian hypersonic missile maker (Euractiv) 
Comrades in Arms? | North Korea Compromises Sanctioned Russian Missile Engineering Company (SentinelOne)
Reptile Rootkit: Advanced Linux Malware Targeting South Korean Systems (The Hacker News) 
UPDATE: Cloudzy Command and Control Provider Report (Halcyon)
Reptile Rootkit: Advanced Linux Malware Targeting South Korean Systems (The Hacker News)
Clop ransomware now uses torrents to leak data and evade takedowns (BleepingComputer)
Ukraine may be winning ‘world’s first cyberwar’ (The Kyiv Independent)
Apple has removed Meduza’s flagship news podcast ‘What Happened’ from Apple Podcasts, without explaining the reason (Meduza)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 07 Aug 2023 20:15:00 -0000</pubDate>
      <itunes:title>Pyongyang’s new friendship with Moscow apparently only goes so far. Reptile rootkit in the wild. Cloudzy updates. Cl0p’s torrents. And notes on cyber phases of Russia’s hybrid war. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1879</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>North Korean cyberespionage against a Russian aerospace firm. The Reptile rootkit is used against South Korean systems. An update on Cloudzy. Cl0p is using torrents to move data stolen in MOVEit exploitation. Andrea Little Limbago from Interos wonders about the dangers of jumping head first into new technologies? Rick Howard ponders quantum computing. And Meduza is back on Apple Podcasts.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/149

Selected reading.
Exclusive: North Korean hackers breached top Russian missile maker (Reuters)
North Korean hackers stole secrets of Russian hypersonic missile maker (Euractiv) 
Comrades in Arms? | North Korea Compromises Sanctioned Russian Missile Engineering Company (SentinelOne)
Reptile Rootkit: Advanced Linux Malware Targeting South Korean Systems (The Hacker News) 
UPDATE: Cloudzy Command and Control Provider Report (Halcyon)
Reptile Rootkit: Advanced Linux Malware Targeting South Korean Systems (The Hacker News)
Clop ransomware now uses torrents to leak data and evade takedowns (BleepingComputer)
Ukraine may be winning ‘world’s first cyberwar’ (The Kyiv Independent)
Apple has removed Meduza’s flagship news podcast ‘What Happened’ from Apple Podcasts, without explaining the reason (Meduza)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>North Korean cyberespionage against a Russian aerospace firm. The Reptile rootkit is used against South Korean systems. An update on Cloudzy. Cl0p is using torrents to move data stolen in MOVEit exploitation. Andrea Little Limbago from Interos wonders about the dangers of jumping head first into new technologies? Rick Howard ponders quantum computing. And Meduza is back on Apple Podcasts.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/149</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.reuters.com/technology/north-korean-hackers-breached-top-russian-missile-maker-2023-08-07/">Exclusive: North Korean hackers breached top Russian missile maker</a> (Reuters)</p><p><a href="https://www.euractiv.com/section/global-europe/news/north-korean-hackers-stole-secrets-of-russian-hypersonic-missile-maker/">North Korean hackers stole secrets of Russian hypersonic missile maker</a> (Euractiv) </p><p><a href="https://www.sentinelone.com/labs/comrades-in-arms-north-korea-compromises-sanctioned-russian-missile-engineering-company/">Comrades in Arms? | North Korea Compromises Sanctioned Russian Missile Engineering Company</a> (SentinelOne)</p><p><a href="https://thehackernews.com/2023/08/reptile-rootkit-advanced-linux-malware.html">Reptile Rootkit: Advanced Linux Malware Targeting South Korean Systems</a> (The Hacker News) </p><p><a href="https://www.halcyon.ai/blog/update-cloudzy-command-and-control-provider-report">UPDATE: Cloudzy Command and Control Provider Report</a> (Halcyon)</p><p><a href="https://thehackernews.com/2023/08/reptile-rootkit-advanced-linux-malware.html">Reptile Rootkit: Advanced Linux Malware Targeting South Korean Systems</a> (The Hacker News)</p><p><a href="https://www.bleepingcomputer.com/news/security/clop-ransomware-now-uses-torrents-to-leak-data-and-evade-takedowns/">Clop ransomware now uses torrents to leak data and evade takedowns</a> (BleepingComputer)</p><p><a href="https://kyivindependent.com/ukraines-cyber-chief-says-kyiv-is-winning-worlds-first-cyberwar/">Ukraine may be winning ‘world’s first cyberwar’</a> (The Kyiv Independent)</p><p><a href="https://meduza.io/en/feature/2023/08/05/apple-has-removed-meduza-s-flagship-news-podcast-what-happened-from-apple-podcasts-without-explaining-the-reason">Apple has removed Meduza’s flagship news podcast ‘What Happened’ from Apple Podcasts, without explaining the reason</a> (Meduza)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1704</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[109b9de8-2b53-11ee-9c79-c7981f12db90]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1285474395.mp3?updated=1691437253" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Manuel Hepfer: Discipline, self motivation, and steam. [Research] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/161/notes</link>
      <description>Manuel Hepfer a cybersecurity researcher from ISTARI sits down to share his story with us. Manuel shares as a kid he was very interested in STEM, and in school he remembered a programming class that he fell in love which made him want to pursue a career in cyber. Studying at the University of Oxford he began working towards acquiring a degree in Cybersecurity and Strategic Management. He found research to be a passion and wanted to share his passion, he decided he wanted to publish, so Manuel published an article in MIT Sloan management review that's titled "Make Cybersecurity a Strategic Asset." He shares that finding a passion, like he did, is the key to working in cyber, saying "I think what I learned at the time is the value of discipline and self motivation. And now you can always come up with a lot of discipline and self motivation, but you'll run out of steam at some point if you're not very passionate about some of the things that you're doing." We thank Manuel for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 06 Aug 2023 07:00:00 -0000</pubDate>
      <itunes:title>Manuel Hepfer: Discipline, self motivation, and steam. [Research] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>161</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Manuel Hepfer a cybersecurity researcher from ISTARI sits down to share his story with us. Manuel shares as a kid he was very interested in STEM, and in school he remembered a programming class that he fell in love which made him want to pursue a career in cyber. Studying at the University of Oxford he began working towards acquiring a degree in Cybersecurity and Strategic Management. He found research to be a passion and wanted to share his passion, he decided he wanted to publish, so Manuel published an article in MIT Sloan management review that's titled "Make Cybersecurity a Strategic Asset." He shares that finding a passion, like he did, is the key to working in cyber, saying "I think what I learned at the time is the value of discipline and self motivation. And now you can always come up with a lot of discipline and self motivation, but you'll run out of steam at some point if you're not very passionate about some of the things that you're doing." We thank Manuel for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Manuel Hepfer a cybersecurity researcher from ISTARI sits down to share his story with us. Manuel shares as a kid he was very interested in STEM, and in school he remembered a programming class that he fell in love which made him want to pursue a career in cyber. Studying at the University of Oxford he began working towards acquiring a degree in Cybersecurity and Strategic Management. He found research to be a passion and wanted to share his passion, he decided he wanted to publish, so Manuel published an article in MIT Sloan management review that's titled "Make Cybersecurity a Strategic Asset." He shares that finding a passion, like he did, is the key to working in cyber, saying "I think what I learned at the time is the value of discipline and self motivation. And now you can always come up with a lot of discipline and self motivation, but you'll run out of steam at some point if you're not very passionate about some of the things that you're doing." We thank Manuel for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>428</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9268c6cc-32ea-11ee-8569-77a5587f7e01]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9393060151.mp3?updated=1691169398" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Who is that stealing my credentials? [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/293/notes</link>
      <description>Aleksandar Milenkoski from SentinelOne joins to discuss their work on "Kimsuky Strikes Again | New Social Engineering Campaign Aims to Steal Credentials and Gather Strategic Intelligence." Researchers have been tracking the North Korean APT group Kimsuky and their attempt at a social engineering campaign targeting experts in North Korean affairs.
The research states "The campaign has the objective of stealing Google and subscription credentials of a reputable news and analysis service focusing on North Korea, as well as delivering reconnaissance malware." Kimsuky has been tracked engaging in extensive email correspondence using spoofed URLs and extensive email correspondence, along with Office documents weaponized with the ReconShark malware.
The research can be found here:
Kimsuky Strikes Again | New Social Engineering Campaign Aims to Steal Credentials and Gather Strategic Intelligence

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Aug 2023 07:00:00 -0000</pubDate>
      <itunes:title>Who is that stealing my credentials? [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>293</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Aleksandar Milenkoski from SentinelOne joins to discuss their work on "Kimsuky Strikes Again | New Social Engineering Campaign Aims to Steal Credentials and Gather Strategic Intelligence." Researchers have been tracking the North Korean APT group Kimsuky and their attempt at a social engineering campaign targeting experts in North Korean affairs.
The research states "The campaign has the objective of stealing Google and subscription credentials of a reputable news and analysis service focusing on North Korea, as well as delivering reconnaissance malware." Kimsuky has been tracked engaging in extensive email correspondence using spoofed URLs and extensive email correspondence, along with Office documents weaponized with the ReconShark malware.
The research can be found here:
Kimsuky Strikes Again | New Social Engineering Campaign Aims to Steal Credentials and Gather Strategic Intelligence

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Aleksandar Milenkoski from SentinelOne joins to discuss their work on "Kimsuky Strikes Again | New Social Engineering Campaign Aims to Steal Credentials and Gather Strategic Intelligence." Researchers have been tracking the North Korean APT group Kimsuky and their attempt at a social engineering campaign targeting experts in North Korean affairs.</p><p>The research states "The campaign has the objective of stealing Google and subscription credentials of a reputable news and analysis service focusing on North Korea, as well as delivering reconnaissance malware." Kimsuky has been tracked engaging in extensive email correspondence using spoofed URLs and extensive email correspondence, along with Office documents weaponized with the ReconShark malware.</p><p>The research can be found here:</p><ul><li><a href="https://www.sentinelone.com/labs/kimsuky-new-social-engineering-campaign-aims-to-steal-credentials-and-gather-strategic-intelligence/">Kimsuky Strikes Again | New Social Engineering Campaign Aims to Steal Credentials and Gather Strategic Intelligence</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>986</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a7176e5c-32ea-11ee-8b23-7b319e156cb3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1193370064.mp3?updated=1691089395" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>2022’s top exploited vulnerabilities are still a risk. Rilide in the wild. Abusing a legitimate tool. Malicious PyPi packages. A brief update on the cyber aspects of Russia’s hybrid war.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1878/notes</link>
      <description>The Five Eyes warn against top exploited vulnerabilities. The Rilide info stealer in the wild. Malicious PyPI packages. Valerie Abend, Global Cyber Strategy Lead from Accenture, unpacks the Securities and Exchange Commission’s recently announced cyber regulations. In our Solution spotlight: Our own Simone Patrella speaks with Microsoft’s Ann Johnson on how Microsoft is attracting and retaining top cyber talent. And cyber attacks continue to gutter on both sides of Russia's war against Ukraine.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/148

Selected reading.
CISA, NSA, FBI, and International Partners Release Joint CSA on Top Routinely Exploited Vulnerabilities of 2022 | CISA (Cybersecurity and Infrastructure Security Agency CISA)
CISA, NSA, FBI and International Partners Issue Advisory on the Top Routinely Exploited Vu (National Security Agency/Central Security Service)
New Rilide Stealer Version Targets Banking Data and Works Around Google Chrome Manifest V3 (Trustwave)
Tunnel Vision: CloudflareD AbuseD in the WilD (GuidePoint Security) 
VMConnect: Malicious PyPI packages imitate popular open source modules (ReversingLabs) 
Bilyana Lilly on how cybersecurity assistance to Ukraine has helped thwart Russian cyberattacks (CyberScoop)
Microsoft says Russia-linked hackers behind dozens of Teams phishing attacks (Reuters)
Ukraine's invisible battle to jam Russian weapons (BBC News)
How Ukraine’s cyberwarriors are upending everyday life in Russia (Times)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 04 Aug 2023 20:15:00 -0000</pubDate>
      <itunes:title>2022’s top exploited vulnerabilities are still a risk. Rilide in the wild. Abusing a legitimate tool. Malicious PyPi packages. A brief update on the cyber aspects of Russia’s hybrid war.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1878</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Five Eyes warn against top exploited vulnerabilities. The Rilide info stealer in the wild. Malicious PyPI packages. Valerie Abend, Global Cyber Strategy Lead from Accenture, unpacks the Securities and Exchange Commission’s recently announced cyber regulations. In our Solution spotlight: Our own Simone Patrella speaks with Microsoft’s Ann Johnson on how Microsoft is attracting and retaining top cyber talent. And cyber attacks continue to gutter on both sides of Russia's war against Ukraine.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/148

Selected reading.
CISA, NSA, FBI, and International Partners Release Joint CSA on Top Routinely Exploited Vulnerabilities of 2022 | CISA (Cybersecurity and Infrastructure Security Agency CISA)
CISA, NSA, FBI and International Partners Issue Advisory on the Top Routinely Exploited Vu (National Security Agency/Central Security Service)
New Rilide Stealer Version Targets Banking Data and Works Around Google Chrome Manifest V3 (Trustwave)
Tunnel Vision: CloudflareD AbuseD in the WilD (GuidePoint Security) 
VMConnect: Malicious PyPI packages imitate popular open source modules (ReversingLabs) 
Bilyana Lilly on how cybersecurity assistance to Ukraine has helped thwart Russian cyberattacks (CyberScoop)
Microsoft says Russia-linked hackers behind dozens of Teams phishing attacks (Reuters)
Ukraine's invisible battle to jam Russian weapons (BBC News)
How Ukraine’s cyberwarriors are upending everyday life in Russia (Times)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Five Eyes warn against top exploited vulnerabilities. The Rilide info stealer in the wild. Malicious PyPI packages. Valerie Abend, Global Cyber Strategy Lead from Accenture, unpacks the Securities and Exchange Commission’s recently announced cyber regulations. In our Solution spotlight: Our own Simone Patrella speaks with Microsoft’s Ann Johnson on how Microsoft is attracting and retaining top cyber talent. And cyber attacks continue to gutter on both sides of Russia's war against Ukraine.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/148</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/news-events/alerts/2023/08/03/cisa-nsa-fbi-and-international-partners-release-joint-csa-top-routinely-exploited-vulnerabilities">CISA, NSA, FBI, and International Partners Release Joint CSA on Top Routinely Exploited Vulnerabilities of 2022 | CISA</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3481350/cisa-nsa-fbi-and-international-partners-issue-advisory-on-the-top-routinely-exp/">CISA, NSA, FBI and International Partners Issue Advisory on the Top Routinely Exploited Vu</a> (National Security Agency/Central Security Service)</p><p><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/new-rilide-stealer-version-targets-banking-data-and-works-around-google-chrome-manifest-v3/">New Rilide Stealer Version Targets Banking Data and Works Around Google Chrome Manifest V3 </a>(Trustwave)</p><p><a href="https://www.guidepointsecurity.com/blog/tunnel-vision-cloudflared-abused-in-the-wild/">Tunnel Vision: CloudflareD AbuseD in the WilD</a> (GuidePoint Security) </p><p><a href="https://www.reversinglabs.com/blog/vmconnect-malicious-pypi-packages-imitate-popular-open-source-modules">VMConnect: Malicious PyPI packages imitate popular open source modules</a> (ReversingLabs) </p><p><a href="https://cyberscoop.com/radio/writer-and-researcher-bilyana-lilly/">Bilyana Lilly on how cybersecurity assistance to Ukraine has helped thwart Russian cyberattacks</a> (CyberScoop)</p><p><a href="https://www.reuters.com/technology/microsoft-says-russia-linked-hackers-behind-dozens-teams-phishing-attacks-2023-08-03/">Microsoft says Russia-linked hackers behind dozens of Teams phishing attacks</a> (Reuters)</p><p><a href="https://www.bbc.com/news/world-europe-66279650">Ukraine's invisible battle to jam Russian weapons</a> (BBC News)</p><p><a href="https://www.thetimes.co.uk/article/ukrainian-hackers-disrupt-daily-life-bring-war-home-russians-tn3mrwlhz">How Ukraine’s cyberwarriors are upending everyday life in Russia</a> (Times)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1624</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10891ba0-2b53-11ee-9c79-0fba86529096]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1492747600.mp3?updated=1691176464" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Action in the cybercriminal underworld. Russia’s FSB and SVR are both active, and so are their hacktivist auxiliaries. NSA offers advice on configuring next-generation firewalls.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1877/notes</link>
      <description>Open Bullet malware is seen in the wild. Threat actors exploit a Salesforce vulnerability for phishing. BlueCharlie (that’s Russia’s FSB) shakes up its infrastructure. Midnight Blizzard (and that’s Russia’s SVR) uses targeted social engineering. How NoName057(16) moved on to Spanish targets. Robert M. Lee from Dragos shares his reaction to the White House’s national cybersecurity strategy. Our guest Raj Ananthanpillai of Trua warns against oversharing with ChatGPT. And NSA releases guidance on hardening Cisco next-generation firewalls.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/147

Selected reading.
No Honour Amongst Thieves: A New OpenBullet Malware Campaign (Kasada)
“PhishForce” — Vulnerability Uncovered in Salesforce’s Email Services Exploited for Phishing… (Medium)
Hackers exploited Salesforce zero-day in Facebook phishing attack (BleepingComputer)
Hackers exploit Salesforce email zero-day for Facebook phishing campaign (Computing) 
Russia-based hackers building new attack infrastructure to stay ahead of public reporting (Record) 
Midnight Blizzard conducts targeted social engineering over Microsoft Teams (Microsoft Security) 
Unraveling Russian Multi-Sector DDoS Attacks Across Spain (Radware)
Pro-Russian Hackers Claim Cyberattacks on Italian Banks (MarketWatch) 
NSA Releases Guide to Harden Cisco Next Generation Firewalls (National Security Agency/Central Security Service)
Cisco Firepower Hardening Guide (US National Security Agency)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 03 Aug 2023 20:15:00 -0000</pubDate>
      <itunes:title>Action in the cybercriminal underworld. Russia’s FSB and SVR are both active, and so are their hacktivist auxiliaries. NSA offers advice on configuring next-generation firewalls.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1877</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Open Bullet malware is seen in the wild. Threat actors exploit a Salesforce vulnerability for phishing. BlueCharlie (that’s Russia’s FSB) shakes up its infrastructure. Midnight Blizzard (and that’s Russia’s SVR) uses targeted social engineering. How NoName057(16) moved on to Spanish targets. Robert M. Lee from Dragos shares his reaction to the White House’s national cybersecurity strategy. Our guest Raj Ananthanpillai of Trua warns against oversharing with ChatGPT. And NSA releases guidance on hardening Cisco next-generation firewalls.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/147

Selected reading.
No Honour Amongst Thieves: A New OpenBullet Malware Campaign (Kasada)
“PhishForce” — Vulnerability Uncovered in Salesforce’s Email Services Exploited for Phishing… (Medium)
Hackers exploited Salesforce zero-day in Facebook phishing attack (BleepingComputer)
Hackers exploit Salesforce email zero-day for Facebook phishing campaign (Computing) 
Russia-based hackers building new attack infrastructure to stay ahead of public reporting (Record) 
Midnight Blizzard conducts targeted social engineering over Microsoft Teams (Microsoft Security) 
Unraveling Russian Multi-Sector DDoS Attacks Across Spain (Radware)
Pro-Russian Hackers Claim Cyberattacks on Italian Banks (MarketWatch) 
NSA Releases Guide to Harden Cisco Next Generation Firewalls (National Security Agency/Central Security Service)
Cisco Firepower Hardening Guide (US National Security Agency)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Open Bullet malware is seen in the wild. Threat actors exploit a Salesforce vulnerability for phishing. BlueCharlie (that’s Russia’s FSB) shakes up its infrastructure. Midnight Blizzard (and that’s Russia’s SVR) uses targeted social engineering. How NoName057(16) moved on to Spanish targets. Robert M. Lee from Dragos shares his reaction to the White House’s national cybersecurity strategy. Our guest Raj Ananthanpillai of Trua warns against oversharing with ChatGPT. And NSA releases guidance on hardening Cisco next-generation firewalls.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/147</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.kasada.io/threat-intel-openbullet-malware/">No Honour Amongst Thieves: A New OpenBullet Malware Campaign</a> (Kasada)</p><p><a href="https://labs.guard.io/phishforce-vulnerability-uncovered-in-salesforces-email-services-exploited-for-phishing-32024ad4b5fa">“PhishForce” — Vulnerability Uncovered in Salesforce’s Email Services Exploited for Phishing…</a> (Medium)</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploited-salesforce-zero-day-in-facebook-phishing-attack/">Hackers exploited Salesforce zero-day in Facebook phishing attack</a> (BleepingComputer)</p><p><a href="https://www.computing.co.uk/news/4121489/hackers-exploit-salesforce-email-zero-day-facebook-phishing-campaign">Hackers exploit Salesforce email zero-day for Facebook phishing campaign </a>(Computing) </p><p><a href="https://therecord.media/russian-hackers-building-new-infrastructure">Russia-based hackers building new attack infrastructure to stay ahead of public reporting</a> (Record) </p><p><a href="https://www.microsoft.com/en-us/security/blog/2023/08/02/midnight-blizzard-conducts-targeted-social-engineering-over-microsoft-teams/">Midnight Blizzard conducts targeted social engineering over Microsoft Teams</a> (Microsoft Security) </p><p><a href="https://www.radware.com/security/threat-advisories-and-attack-reports/unraveling-russian-multi-sector-ddos-attacks-across-spain/">Unraveling Russian Multi-Sector DDoS Attacks Across Spain</a> (Radware)</p><p><a href="https://www.marketwatch.com/story/pro-russian-hackers-claim-cyberattacks-on-italian-banks-12582299">Pro-Russian Hackers Claim Cyberattacks on Italian Banks</a> (MarketWatch) </p><p><a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3479958/nsa-releases-guide-to-harden-cisco-next-generation-firewalls/">NSA Releases Guide to Harden Cisco Next Generation Firewalls</a> (National Security Agency/Central Security Service)</p><p><a href="https://media.defense.gov/2023/Aug/02/2003272858/-1/-1/0/CTR_CISCO_FIREPOWER_HARDENING_GUIDE.PDF">Cisco Firepower Hardening Guide</a> (US National Security Agency)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1742</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10756ef2-2b53-11ee-9c79-af6f8344e091]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6773535109.mp3?updated=1691088632" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An illicit market in account restoration. Resilience and the cyber workforce: a snapshot. New post-exploitation technique in Amazon Web Services.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1876/notes</link>
      <description>An illicit market in account restoration. Resilience and the cyber workforce. New post-exploitation techniques in Amazon Web Services. Incursions into Norwegian government networks went on for four months. Rob Boyce from Accenture Security describes a “Perfect Storm” in the Dark Web threat landscape. Carole Theriault shares mental health social media warnings for teens. And the Russian legislation seeks to reduce or eliminate online privacy.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/146

Selected reading.
Amazon employees leak secret info that marketplace sellers can buy on Telegram (CNBC)
Cyber Workforce Benchmark Report (Immersive Labs)
Mitiga Security Advisory: Abusing the SSM Agent as a Remote Access Trojan (Mitiga)
Cado Security Labs 2023 Threat Findings Report (Cado Security)
Cyberattack on Norway Ministries Lasted at Least Four Months (Bloomberg)
CISA and International Partner NCSC-NO Release Joint Cybersecurity Advisory on Threat Actors Exploiting Ivanti EPMM Vulnerabilities (Cybersecurity and Infrastructure Security Agency)
Putin Outlaws Anonymity: Identity Verification For Online Services, VPN Bypass Advice a Crime (TorrentFreak)
Russia Is Returning to Its Totalitarian Past (Foreign Policy)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 02 Aug 2023 20:15:00 -0000</pubDate>
      <itunes:title>An illicit market in account restoration. Resilience and the cyber workforce: a snapshot. New post-exploitation technique in Amazon Web Services.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1876</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An illicit market in account restoration. Resilience and the cyber workforce. New post-exploitation techniques in Amazon Web Services. Incursions into Norwegian government networks went on for four months. Rob Boyce from Accenture Security describes a “Perfect Storm” in the Dark Web threat landscape. Carole Theriault shares mental health social media warnings for teens. And the Russian legislation seeks to reduce or eliminate online privacy.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/146

Selected reading.
Amazon employees leak secret info that marketplace sellers can buy on Telegram (CNBC)
Cyber Workforce Benchmark Report (Immersive Labs)
Mitiga Security Advisory: Abusing the SSM Agent as a Remote Access Trojan (Mitiga)
Cado Security Labs 2023 Threat Findings Report (Cado Security)
Cyberattack on Norway Ministries Lasted at Least Four Months (Bloomberg)
CISA and International Partner NCSC-NO Release Joint Cybersecurity Advisory on Threat Actors Exploiting Ivanti EPMM Vulnerabilities (Cybersecurity and Infrastructure Security Agency)
Putin Outlaws Anonymity: Identity Verification For Online Services, VPN Bypass Advice a Crime (TorrentFreak)
Russia Is Returning to Its Totalitarian Past (Foreign Policy)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An illicit market in account restoration. Resilience and the cyber workforce. New post-exploitation techniques in Amazon Web Services. Incursions into Norwegian government networks went on for four months. Rob Boyce from Accenture Security describes a “Perfect Storm” in the Dark Web threat landscape. Carole Theriault shares mental health social media warnings for teens. And the Russian legislation seeks to reduce or eliminate online privacy.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/146</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cnbc.com/2023/08/01/amazon-employees-leak-info-that-marketplace-sellers-buy-on-telegram.html">Amazon employees leak secret info that marketplace sellers can buy on Telegram</a> (CNBC)</p><p><a href="https://www.immersivelabs.com/page/cyber-workforce-benchmark-report-thank-you/">Cyber Workforce Benchmark Report</a> (Immersive Labs)</p><p><a href="https://www.mitiga.io/blog/mitiga-security-advisory-abusing-the-ssm-agent-as-a-remote-access-trojan">Mitiga Security Advisory: Abusing the SSM Agent as a Remote Access Trojan</a> (Mitiga)</p><p><a href="https://offers.cadosecurity.com/cado-security-labs-2023-threat-findings-report">Cado Security Labs 2023 Threat Findings Report</a> (Cado Security)</p><p><a href="https://www.bloomberg.com/news/articles/2023-08-02/cyberattack-on-norway-ministries-lasted-at-least-four-months">Cyberattack on Norway Ministries Lasted at Least Four Months</a> (Bloomberg)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/08/01/cisa-and-international-partner-ncsc-no-release-joint-cybersecurity-advisory-threat-actors-exploiting">CISA and International Partner NCSC-NO Release Joint Cybersecurity Advisory on Threat Actors Exploiting Ivanti EPMM Vulnerabilities</a> (Cybersecurity and Infrastructure Security Agency)</p><p><a href="https://torrentfreak.com/putin-outlaws-anonymity-user-id-verification-for-online-services-vpn-bypass-advice-a-crime-230801/">Putin Outlaws Anonymity: Identity Verification For Online Services, VPN Bypass Advice a Crime</a> (TorrentFreak)</p><p><a href="https://foreignpolicy.com/2023/08/01/russia-putin-wagner-repression-authoritarian-totalitarian-arrests-ukraine-war/">Russia Is Returning to Its Totalitarian Past</a> (Foreign Policy)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1474</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10611498-2b53-11ee-9c79-a3c0e18abdd9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7176260278.mp3?updated=1691005020" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage tradecraft, including shopping in the C2C market. Seeking satcom resilience. Sanctions against disinformation. A quick look at current OT threats. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1875/notes</link>
      <description>C2-as-a-service with APTs as the customers. Cyberespionage activity by Indian APTs. Gamers under attack. StarLink limits Ukrainian access to its systems. The EU levies new sanctions against “digital information manipulation.” Ukraine's Security Service takes down money-laundering exchanges. Ben Yelin unpacks fediverse security risks. Our guests are Mike Marty, CEO of The Retired Investigators Guild, &amp; Tom Brennan, executive director of CREST, discussing their efforts on cybercrime investigation and cold case resolution. And Nozomi's OT IoT security report, sees a lot of opportunistic, low-grade whacking at industrial organizations.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/145

Selected reading.
Cloudzy with a Chance of Ransomware: Unmasking Command-and-Control Providers (C2Ps) (Halcyon) 
APT Bahamut Targets Individuals with Android Malware Using Spear Messaging - CYFIRMA (CYFIRMA) 
Hackers steal Signal, WhatsApp user data with fake Android chat app (BleepingComputer)
Patchwork Hackers Target Chinese Research Organizations Using EyeShell Backdoor (The Hacker News)
Hackers exploit BleedingPipe RCE to target Minecraft servers, players (BleepingComputer) 
Call of Duty Self-Spreading Worm Takes Aim at Player Lobbies (Dark Reading) 
Call of Duty worm malware used to hack players exploits years-old bug  (TechCrunch) 
Elon Musk 'refuses to turn on Starlink' for Crimea drone attack (The Telegraph)
How Elon Musk Was Able to Exert Control in Ukraine War (The Street)
EU strikes Russia again as digital infowar rages on (Cybernews) 
Ukraine Cracks Down on Illicit Financing Network (Gov Info Security) 
Unpacking the OT &amp; IoT Threat Landscape with Unique Telemetry Data (Nozomi Networks) 
China's Volt Typhoon APT Burrows Deeper Into US Critical Infrastructure (Dark Reading)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Aug 2023 20:15:00 -0000</pubDate>
      <itunes:title>Cyberespionage tradecraft, including shopping in the C2C market. Seeking satcom resilience. Sanctions against disinformation. A quick look at current OT threats. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1875</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>C2-as-a-service with APTs as the customers. Cyberespionage activity by Indian APTs. Gamers under attack. StarLink limits Ukrainian access to its systems. The EU levies new sanctions against “digital information manipulation.” Ukraine's Security Service takes down money-laundering exchanges. Ben Yelin unpacks fediverse security risks. Our guests are Mike Marty, CEO of The Retired Investigators Guild, &amp; Tom Brennan, executive director of CREST, discussing their efforts on cybercrime investigation and cold case resolution. And Nozomi's OT IoT security report, sees a lot of opportunistic, low-grade whacking at industrial organizations.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/145

Selected reading.
Cloudzy with a Chance of Ransomware: Unmasking Command-and-Control Providers (C2Ps) (Halcyon) 
APT Bahamut Targets Individuals with Android Malware Using Spear Messaging - CYFIRMA (CYFIRMA) 
Hackers steal Signal, WhatsApp user data with fake Android chat app (BleepingComputer)
Patchwork Hackers Target Chinese Research Organizations Using EyeShell Backdoor (The Hacker News)
Hackers exploit BleedingPipe RCE to target Minecraft servers, players (BleepingComputer) 
Call of Duty Self-Spreading Worm Takes Aim at Player Lobbies (Dark Reading) 
Call of Duty worm malware used to hack players exploits years-old bug  (TechCrunch) 
Elon Musk 'refuses to turn on Starlink' for Crimea drone attack (The Telegraph)
How Elon Musk Was Able to Exert Control in Ukraine War (The Street)
EU strikes Russia again as digital infowar rages on (Cybernews) 
Ukraine Cracks Down on Illicit Financing Network (Gov Info Security) 
Unpacking the OT &amp; IoT Threat Landscape with Unique Telemetry Data (Nozomi Networks) 
China's Volt Typhoon APT Burrows Deeper Into US Critical Infrastructure (Dark Reading)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>C2-as-a-service with APTs as the customers. Cyberespionage activity by Indian APTs. Gamers under attack. StarLink limits Ukrainian access to its systems. The EU levies new sanctions against “digital information manipulation.” Ukraine's Security Service takes down money-laundering exchanges. Ben Yelin unpacks fediverse security risks. Our guests are Mike Marty, CEO of The Retired Investigators Guild, &amp; Tom Brennan, executive director of CREST, discussing their efforts on cybercrime investigation and cold case resolution. And Nozomi's OT IoT security report, sees a lot of opportunistic, low-grade whacking at industrial organizations.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/145</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.halcyon.ai/blog/report-ransomware-command-and-control-providers-unmasked-by-halcyon-researchers">Cloudzy with a Chance of Ransomware: Unmasking Command-and-Control Providers (C2Ps)</a> (Halcyon) </p><p><a href="https://www.cyfirma.com/outofband/apt-bahamut-targets-individuals-with-android-malware-using-spear-messaging/">APT Bahamut Targets Individuals with Android Malware Using Spear Messaging - CYFIRMA</a> (CYFIRMA) </p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-steal-signal-whatsapp-user-data-with-fake-android-chat-app/">Hackers steal Signal, WhatsApp user data with fake Android chat app</a> (BleepingComputer)</p><p><a href="https://thehackernews.com/2023/07/patchwork-hackers-target-chinese.html">Patchwork Hackers Target Chinese Research Organizations Using EyeShell Backdoor</a> (The Hacker News)</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-exploit-bleedingpipe-rce-to-target-minecraft-servers-players/">Hackers exploit BleedingPipe RCE to target Minecraft servers, players</a> (BleepingComputer) </p><p><a href="https://www.darkreading.com/application-security/call-of-duty-self-spreading-worm-player-lobbies">Call of Duty Self-Spreading Worm Takes Aim at Player Lobbies</a> (Dark Reading) </p><p><a href="https://techcrunch.com/2023/07/31/call-of-duty-worm-malware-used-to-hack-players-exploits-years-old-bug/">Call of Duty worm malware used to hack players exploits years-old bug </a> (TechCrunch) </p><p><a href="https://www.telegraph.co.uk/news/2023/07/31/elon-musk-starlink-ukraine-drone-attack-crimea/">Elon Musk 'refuses to turn on Starlink' for Crimea drone attack</a> (The Telegraph)</p><p><a href="https://www.thestreet.com/technology/why-elon-musk-was-able-to-exert-control-in-ukraine-war">How Elon Musk Was Able to Exert Control in Ukraine War</a> (The Street)</p><p><a href="https://cybernews.com/cyber-war/eu-russia-sanctions-digital-infowar/">EU strikes Russia again as digital infowar rages on</a> (Cybernews) </p><p><a href="https://www.govinfosecurity.com/ukraine-cracks-down-on-illicit-financing-network-a-22700">Ukraine Cracks Down on Illicit Financing Network</a> (Gov Info Security) </p><p><a href="https://www.nozominetworks.com/iot-ot-cybersecurity-research-report-august-2023/">Unpacking the OT &amp; IoT Threat Landscape with Unique Telemetry Data</a> (Nozomi Networks) </p><p><a href="https://www.darkreading.com/vulnerabilities-threats/china-s-volt-typhoon-apt-burrows-us-critical-infrastructure">China's Volt Typhoon APT Burrows Deeper Into US Critical Infrastructure</a> (Dark Reading)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1751</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[104e793c-2b53-11ee-9c79-b38662c5adb9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4886364927.mp3?updated=1690918083" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The US has a new cyber workforce and education strategy. US hunts disruptive Chinese malware staged in US networks. Malware warnings, and an update on Russia’s hybrid war. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1874/notes</link>
      <description>The US issues a National Cyber Workforce and Education strategy. Hunting Chinese malware staged in US networks. CISA warns of Barracuda backdoor. WikiLoader malware is discovered. P2Pinfect is a malware botnet targeting publicly-accessible Redis servers. Johannes Ullrich from SANS describes attacks against YouTube content creators. Rick Howard previews his conversation with AWS Ciso CJ Moses. And Russia’s SVR continues cyberespionage against Ukrainian and European diplomatic services.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/144

Selected reading.
FACT SHEET: Biden-Harris Administration Announces National Cyber Workforce and Education Strategy, Unleashing America’s Cyber Talent (The White House) 
National Cyber Workforce and Education Strategy: Unleashing America’s Cyber Talent (The White House)
The White House releases the US National Cyber Workforce and Education Strategy. (CyberWire)
US hunts Chinese malware staged to interfere with US military operations. (CyberWire)
U.S. Hunts Chinese Malware That Could Disrupt American Military Operations (New York Times)
CISA Releases Malware Analysis Reports on Barracuda Backdoors (Cybersecurity and Infrastructure Security Agency CISA)CISA: New Submarine malware found on hacked Barracuda ESG appliances (BleepingComputer) 
Out of the Sandbox: WikiLoader Digs Sophisticated Evasion (Proofpoint) 
Cado Security Labs Encounter Novel Malware, Redis P2Pinfect (Cado Security) 
P2PInfect: The Rusty Peer-to-Peer Self-Replicating Worm (Unit 42)
BlueBravo Adapts to Target Diplomatic Entities with GraphicalProton Malware (Recorded Future)
BlueBravo Adapts to Target Diplomatic Entities with GraphicalProton Malware (Recorded Future Insikt Group) 
BlueBravo Deploys GraphicalProton Backdoor Against European Diplomatic Entities (The Hacker News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 31 Jul 2023 20:15:00 -0000</pubDate>
      <itunes:title>The US has a new cyber workforce and education strategy. US hunts disruptive Chinese malware staged in US networks. Malware warnings, and an update on Russia’s hybrid war. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1874</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The US issues a National Cyber Workforce and Education strategy. Hunting Chinese malware staged in US networks. CISA warns of Barracuda backdoor. WikiLoader malware is discovered. P2Pinfect is a malware botnet targeting publicly-accessible Redis servers. Johannes Ullrich from SANS describes attacks against YouTube content creators. Rick Howard previews his conversation with AWS Ciso CJ Moses. And Russia’s SVR continues cyberespionage against Ukrainian and European diplomatic services.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/144

Selected reading.
FACT SHEET: Biden-Harris Administration Announces National Cyber Workforce and Education Strategy, Unleashing America’s Cyber Talent (The White House) 
National Cyber Workforce and Education Strategy: Unleashing America’s Cyber Talent (The White House)
The White House releases the US National Cyber Workforce and Education Strategy. (CyberWire)
US hunts Chinese malware staged to interfere with US military operations. (CyberWire)
U.S. Hunts Chinese Malware That Could Disrupt American Military Operations (New York Times)
CISA Releases Malware Analysis Reports on Barracuda Backdoors (Cybersecurity and Infrastructure Security Agency CISA)CISA: New Submarine malware found on hacked Barracuda ESG appliances (BleepingComputer) 
Out of the Sandbox: WikiLoader Digs Sophisticated Evasion (Proofpoint) 
Cado Security Labs Encounter Novel Malware, Redis P2Pinfect (Cado Security) 
P2PInfect: The Rusty Peer-to-Peer Self-Replicating Worm (Unit 42)
BlueBravo Adapts to Target Diplomatic Entities with GraphicalProton Malware (Recorded Future)
BlueBravo Adapts to Target Diplomatic Entities with GraphicalProton Malware (Recorded Future Insikt Group) 
BlueBravo Deploys GraphicalProton Backdoor Against European Diplomatic Entities (The Hacker News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US issues a National Cyber Workforce and Education strategy. Hunting Chinese malware staged in US networks. CISA warns of Barracuda backdoor. WikiLoader malware is discovered. P2Pinfect is a malware botnet targeting publicly-accessible Redis servers. Johannes Ullrich from SANS describes attacks against YouTube content creators. Rick Howard previews his conversation with AWS Ciso CJ Moses. And Russia’s SVR continues cyberespionage against Ukrainian and European diplomatic services.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/144</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/07/31/fact-sheet-biden-%e2%81%a0harris-administration-announces-national-cyber-workforce-and-education-strategy-unleashing-americas-cyber-talent/">FACT SHEET: Biden-Harris Administration Announces National Cyber Workforce and Education Strategy, Unleashing America’s Cyber Talent</a> (The White House) </p><p><a href="https://www.whitehouse.gov/wp-content/uploads/2023/07/NCWES-2023.07.31.pdf?utm_source=miragenews&amp;utm_medium=miragenews&amp;utm_campaign=news">National Cyber Workforce and Education Strategy: Unleashing America’s Cyber Talent</a> (The White House)</p><p><a href="https://thecyberwire.com/stories/dd95d406a7e34687912bd5c12abdbf90/the-white-house-releases-the-us-national-cyber-workforce-and-education-strategy">The White House releases the US National Cyber Workforce and Education Strategy.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/f6e34b4362104d2aadbb814b9ae7557c/us-hunts-chinese-malware-staged-to-interfere-with-us-military-operations">US hunts Chinese malware staged to interfere with US military operations.</a> (CyberWire)</p><p><a href="https://www.nytimes.com/2023/07/29/us/politics/china-malware-us-military-bases-taiwan.html">U.S. Hunts Chinese Malware That Could Disrupt American Military Operations</a> (New York Times)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/07/28/cisa-releases-malware-analysis-reports-barracuda-backdoors">CISA Releases Malware Analysis Reports on Barracuda Backdoors</a> (Cybersecurity and Infrastructure Security Agency CISA)<a href="https://www.bleepingcomputer.com/news/security/cisa-new-submarine-malware-found-on-hacked-barracuda-esg-appliances/">CISA: New Submarine malware found on hacked Barracuda ESG appliances</a> (BleepingComputer) </p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/out-sandbox-wikiloader-digs-sophisticated-evasion">Out of the Sandbox: WikiLoader Digs Sophisticated Evasion</a> (Proofpoint) </p><p><a href="https://www.cadosecurity.com/redis-p2pinfect/">Cado Security Labs Encounter Novel Malware, Redis P2Pinfect</a> (Cado Security) </p><p><a href="https://unit42.paloaltonetworks.com/peer-to-peer-worm-p2pinfect/">P2PInfect: The Rusty Peer-to-Peer Self-Replicating Worm</a> (Unit 42)</p><p><a href="https://www.recordedfuture.com/bluebravo-adapts-to-target-diplomatic-entities-with-graphicalproton-malware">BlueBravo Adapts to Target Diplomatic Entities with GraphicalProton Malware</a> (Recorded Future)</p><p><a href="https://go.recordedfuture.com/hubfs/reports/cta-2023-0727-1.pdf">BlueBravo Adapts to Target Diplomatic Entities with GraphicalProton Malware</a> (Recorded Future Insikt Group) </p><p><a href="https://thehackernews.com/2023/07/bluebravo-deploys-graphicalproton.html">BlueBravo Deploys GraphicalProton Backdoor Against European Diplomatic Entities</a> (The Hacker News)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1604</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[103af092-2b53-11ee-9c79-db0af85e5ef4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8369128568.mp3?updated=1690830692" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Morgan Adamski: Seeing around corners. [Collaboration] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/160/notes</link>
      <description>Morgan Adamski from the National Security Agency (NSA) sits down to talk about her path to getting into cybersecurity. Remembering back to when she was a kid, she recalls using old technology to chat with friends online, that's where it all began for Morgan. She shares how in high school she fell in love with the concept of debating and being on a team. During her high school career, 9/11 occurred, and she became fascinated with who was behind the biggest attack America had seen in the 21st century, driving her to pursue a degree in National Security. Coming out of college, she was able to get a job in the DIA, after working there for two years, she found herself at the NSA, where she is now. Morgan shares how her leadership style helps her to not only connect dots on problems, but also see around corners, saying "it's not just about connecting the dots, it's about seeing around the corners and so that helps me better predict, um, how do I build an organization that's successful three to five years down the road." We thank Morgan for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 30 Jul 2023 07:00:00 -0000</pubDate>
      <itunes:title>Morgan Adamski: Seeing around corners. [Collaboration] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>160</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Morgan Adamski from the National Security Agency (NSA) sits down to talk about her path to getting into cybersecurity. Remembering back to when she was a kid, she recalls using old technology to chat with friends online, that's where it all began for Morgan. She shares how in high school she fell in love with the concept of debating and being on a team. During her high school career, 9/11 occurred, and she became fascinated with who was behind the biggest attack America had seen in the 21st century, driving her to pursue a degree in National Security. Coming out of college, she was able to get a job in the DIA, after working there for two years, she found herself at the NSA, where she is now. Morgan shares how her leadership style helps her to not only connect dots on problems, but also see around corners, saying "it's not just about connecting the dots, it's about seeing around the corners and so that helps me better predict, um, how do I build an organization that's successful three to five years down the road." We thank Morgan for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Morgan Adamski from the National Security Agency (NSA) sits down to talk about her path to getting into cybersecurity. Remembering back to when she was a kid, she recalls using old technology to chat with friends online, that's where it all began for Morgan. She shares how in high school she fell in love with the concept of debating and being on a team. During her high school career, 9/11 occurred, and she became fascinated with who was behind the biggest attack America had seen in the 21st century, driving her to pursue a degree in National Security. Coming out of college, she was able to get a job in the DIA, after working there for two years, she found herself at the NSA, where she is now. Morgan shares how her leadership style helps her to not only connect dots on problems, but also see around corners, saying "it's not just about connecting the dots, it's about seeing around the corners and so that helps me better predict, um, how do I build an organization that's successful three to five years down the road." We thank Morgan for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>393</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b90c71de-2d77-11ee-a206-8b376f3f0f85]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1640922962.mp3?updated=1690564527" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing for leeches. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/292/notes</link>
      <description>Ashlee Benge from ReversingLabs discussing their research titled "Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks." Researchers recently discovered over a dozen malicious packages published to the npm open source repository. These packages are targeting Microsoft 365 users and appear to target application end users while also supporting email phishing campaigns.
Research supports that the malicious campaign encompassed more than a dozen files designed to steal sensitive user credentials. The research states "This most recent campaign caught our attention because of a number of features and characteristics in related npm packages that correlate with malicious intent."
The research can be found here:
Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 Jul 2023 07:00:00 -0000</pubDate>
      <itunes:title>Phishing for leeches. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>291</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ashlee Benge from ReversingLabs discussing their research titled "Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks." Researchers recently discovered over a dozen malicious packages published to the npm open source repository. These packages are targeting Microsoft 365 users and appear to target application end users while also supporting email phishing campaigns.
Research supports that the malicious campaign encompassed more than a dozen files designed to steal sensitive user credentials. The research states "This most recent campaign caught our attention because of a number of features and characteristics in related npm packages that correlate with malicious intent."
The research can be found here:
Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ashlee Benge from ReversingLabs discussing their research titled "Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks." Researchers recently discovered over a dozen malicious packages published to the npm open source repository. These packages are targeting Microsoft 365 users and appear to target application end users while also supporting email phishing campaigns.</p><p>Research supports that the malicious campaign encompassed more than a dozen files designed to steal sensitive user credentials. The research states "This most recent campaign caught our attention because of a number of features and characteristics in related npm packages that correlate with malicious intent."</p><p>The research can be found here:</p><ul><li><a href="https://www.reversinglabs.com/blog/operation-brainleeches-malicious-npm-packages-fuel-supply-chain-and-phishing-attacks">Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1170</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cb9cc682-2d77-11ee-b3b5-b715c5dabe2b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1780806048.mp3?updated=1690482235" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A new joint advisory from the US and Australia. BackConnect evolution. Cl0p counts coup. Ransomware trends. DDoS for influence. It’s “dot-mil,” Nigel.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1873/notes</link>
      <description>A joint warning on IDOR vulnerabilities. IcedID’s BackConnect protocol evolves over one year. Cl0p claims to have accessed data from another Big Four accounting firm. Ransomware victims increased significantly in 2023. Cyberattacks support influence operations. Deputy National Security Advisor for Cyber and Emerging Technology Anne Neuberger joins us to discuss the Biden Administration's recent cyber initiatives. Eric Goldstein, Executive Assistant Director at CISA, looks at cybersecurity performance goals. And spelling counts.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/143

Selected reading.
Preventing Web Application Access Control Abuse (Joint Cybersecurity Advisory: ACSC, NSA, CISA) 
Inside the IcedID BackConnect Protocol (Part 2) (Team Cymru) 
Deloitte denies Cl0p data breach impacted client data in wake of MOVEit attack (ITPro) 
Ransomware Report: Q2 2023 (ReliaQuest)
Kenya ICT minister admits cyber-attack on eCitizen portal, insists data secure (The East African)
Anonymous Sudan: the group behind recent anti-Kenya cyberattacks (TechCabal) 
Kenya President Ruto to skip Russia-Africa Summit (The East African)
UK accidentally sent military emails meant for US to Russian ally (POLITICO)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 28 Jul 2023 20:15:00 -0000</pubDate>
      <itunes:title>A new joint advisory from the US and Australia. BackConnect evolution. Cl0p counts coup. Ransomware trends. DDoS for influence. It’s “dot-mil,” Nigel.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1873</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A joint warning on IDOR vulnerabilities. IcedID’s BackConnect protocol evolves over one year. Cl0p claims to have accessed data from another Big Four accounting firm. Ransomware victims increased significantly in 2023. Cyberattacks support influence operations. Deputy National Security Advisor for Cyber and Emerging Technology Anne Neuberger joins us to discuss the Biden Administration's recent cyber initiatives. Eric Goldstein, Executive Assistant Director at CISA, looks at cybersecurity performance goals. And spelling counts.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/143

Selected reading.
Preventing Web Application Access Control Abuse (Joint Cybersecurity Advisory: ACSC, NSA, CISA) 
Inside the IcedID BackConnect Protocol (Part 2) (Team Cymru) 
Deloitte denies Cl0p data breach impacted client data in wake of MOVEit attack (ITPro) 
Ransomware Report: Q2 2023 (ReliaQuest)
Kenya ICT minister admits cyber-attack on eCitizen portal, insists data secure (The East African)
Anonymous Sudan: the group behind recent anti-Kenya cyberattacks (TechCabal) 
Kenya President Ruto to skip Russia-Africa Summit (The East African)
UK accidentally sent military emails meant for US to Russian ally (POLITICO)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A joint warning on IDOR vulnerabilities. IcedID’s BackConnect protocol evolves over one year. Cl0p claims to have accessed data from another Big Four accounting firm. Ransomware victims increased significantly in 2023. Cyberattacks support influence operations. Deputy National Security Advisor for Cyber and Emerging Technology Anne Neuberger joins us to discuss the Biden Administration's recent cyber initiatives. Eric Goldstein, Executive Assistant Director at CISA, looks at cybersecurity performance goals. And spelling counts.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/143</p><p><br></p><h2>Selected reading.</h2><p><a href="https://media.defense.gov/2023/Jul/27/2003269443/-1/-1/0/JOINT-CSA-PREVENTING-WEB-APPLICATION-ACCESS-CONTROL-ABUSE.PDF">Preventing Web Application Access Control Abuse</a> (Joint Cybersecurity Advisory: ACSC, NSA, CISA) </p><p><a href="https://www.team-cymru.com/post/inside-the-icedid-backconnect-protocol-part-2">Inside the IcedID BackConnect Protocol (Part 2)</a> (Team Cymru) </p><p><a href="https://www.itpro.com/security/cyber-attacks/deloitte-denies-cl0p-data-breach-claims-in-wake-of-moveit-attack">Deloitte denies Cl0p data breach impacted client data in wake of MOVEit attack</a> (ITPro) </p><p><a href="https://www.reliaquest.com/resources/research-reports/ransomware-report-q2-2023/">Ransomware Report: Q2 2023</a> (ReliaQuest)</p><p><a href="https://www.theeastafrican.co.ke/tea/news/east-africa/cs-owalo-admits-cyber-attack-on-ecitizen-portal--4317894">Kenya ICT minister admits cyber-attack on eCitizen portal, insists data secure</a> (The East African)</p><p><a href="https://techcabal.com/2023/07/27/pro-sudan-hackers-attack-digital-services-in-kenya/">Anonymous Sudan: the group behind recent anti-Kenya cyberattacks</a> (TechCabal) </p><p><a href="https://www.theeastafrican.co.ke/tea/news/east-africa/kenya-president-ruto-to-skip-russia-africa-summit-4316582">Kenya President Ruto to skip Russia-Africa Summit</a> (The East African)</p><p><a href="https://www.politico.eu/article/uk-us-investigation-emails-russian-ally/">UK accidentally sent military emails meant for US to Russian ally</a> (POLITICO)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1884</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10274420-2b53-11ee-9c79-f33868a8f346]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1816764420.mp3?updated=1690571863" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mirai hits the honeypots. Medical device telemetry attacked. More on infostealers in the C2C market. Third-party risk management practices. Cyber skills gaps in the UK. SiegedSec hits NATO sites</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1872/notes</link>
      <description>The Mirai botnet afflicts Tomcat. CardioComm services are downed by cyberattack. Uptycs calls infostealers “organization killers" as related security incidents double in a year. Legacy third-party risk management practices meet with dissatisfaction. Cyber skill gaps reported in the UK's workforce. Our guest is George Prichici of OPSWAT with a look at a Microsoft Teams vulnerability. Our new Threat Vector segment features a conversation with David Moulton and Michael Sikorski on the potential threats from LLMs and AI. And SiegedSec hits NATO sites.
On this first segment of Threat Vector, Michael "Siko" Sikorski, CTO &amp; VP of Engineering for Unit 42, joins host David Moulton to discuss LLMs &amp; AI and the impacts to expect on social engineering, phishing, and more.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/142

Threat Vector links.
Palo Alto Networks Unit 42

Selected reading.
Tomcat Under Attack: Exploring Mirai Malware and Beyond (Aquasec)
CardioComm, a provider of ECG monitoring devices, confirms cyberattack downed its services (TechCrunch) 
Detecting the Silent Threat: 'Stealers are Organization Killers' (Uptycs)
Cyber security skills in the UK labour market 2023 (DSIT)
NATO investigates alleged data theft by SiegedSec hackers (BleepingComputer)
NATO investigating apparent breach of unclassified information sharing platform (CyberScoop) 
SiegedSec Compromise NATO (Cyberint)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 27 Jul 2023 20:15:00 -0000</pubDate>
      <itunes:title>Mirai hits the honeypots. Medical device telemetry attacked. More on infostealers in the C2C market. Third-party risk management practices. Cyber skills gaps in the UK. SiegedSec hits NATO sites</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1872</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Mirai botnet afflicts Tomcat. CardioComm services are downed by cyberattack. Uptycs calls infostealers “organization killers" as related security incidents double in a year. Legacy third-party risk management practices meet with dissatisfaction. Cyber skill gaps reported in the UK's workforce. Our guest is George Prichici of OPSWAT with a look at a Microsoft Teams vulnerability. Our new Threat Vector segment features a conversation with David Moulton and Michael Sikorski on the potential threats from LLMs and AI. And SiegedSec hits NATO sites.
On this first segment of Threat Vector, Michael "Siko" Sikorski, CTO &amp; VP of Engineering for Unit 42, joins host David Moulton to discuss LLMs &amp; AI and the impacts to expect on social engineering, phishing, and more.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/142

Threat Vector links.
Palo Alto Networks Unit 42

Selected reading.
Tomcat Under Attack: Exploring Mirai Malware and Beyond (Aquasec)
CardioComm, a provider of ECG monitoring devices, confirms cyberattack downed its services (TechCrunch) 
Detecting the Silent Threat: 'Stealers are Organization Killers' (Uptycs)
Cyber security skills in the UK labour market 2023 (DSIT)
NATO investigates alleged data theft by SiegedSec hackers (BleepingComputer)
NATO investigating apparent breach of unclassified information sharing platform (CyberScoop) 
SiegedSec Compromise NATO (Cyberint)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Mirai botnet afflicts Tomcat. CardioComm services are downed by cyberattack. Uptycs calls infostealers “organization killers" as related security incidents double in a year. Legacy third-party risk management practices meet with dissatisfaction. Cyber skill gaps reported in the UK's workforce. Our guest is George Prichici of OPSWAT with a look at a Microsoft Teams vulnerability. Our new Threat Vector segment features a conversation with David Moulton and Michael Sikorski on the potential threats from LLMs and AI. And SiegedSec hits NATO sites.</p><p>On this first segment of Threat Vector, <a href="https://www.linkedin.com/in/michael-sikorski-408a42190/">Michael "Siko" Sikorski</a>, CTO &amp; VP of Engineering for Unit 42, joins host <a href="https://www.linkedin.com/in/davidrmoulton/">David Moulton</a> to discuss LLMs &amp; AI and the impacts to expect on social engineering, phishing, and more.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/142</p><p><br></p><h2>Threat Vector links.</h2><p><a href="https://unit42.paloaltonetworks.com/?utm_source=podcast-cyberwire-&amp;utm_medium=website">Palo Alto Networks Unit 42</a></p><p><br></p><h2>Selected reading.</h2><p><a href="https://blog.aquasec.com/tomcat-under-attack-investigating-the-mirai-malware">Tomcat Under Attack: Exploring Mirai Malware and Beyond</a> (Aquasec)</p><p><a href="https://techcrunch.com/2023/07/26/cardiocomm-ecg-monitoring-cyberattack/">CardioComm, a provider of ECG monitoring devices, confirms cyberattack downed its services</a> (TechCrunch) </p><p><a href="https://www.uptycs.com/resources/infostealer">Detecting the Silent Threat: 'Stealers are Organization Killers' </a>(Uptycs)</p><p><a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1173325/Cyber_security_skills_in_the_UK_labour_market_2023.pdf">Cyber security skills in the UK labour market 2023</a> (DSIT)</p><p><a href="https://www.bleepingcomputer.com/news/security/nato-investigates-alleged-data-theft-by-siegedsec-hackers/">NATO investigates alleged data theft by SiegedSec hackers</a> (BleepingComputer)</p><p><a href="https://cyberscoop.com/nato-breach-of-unclassified-information-siegedsec/">NATO investigating apparent breach of unclassified information sharing platform</a> (CyberScoop) </p><p><a href="https://cyberint.com/blog/research/siegedsec-compromise-nato/">SiegedSec Compromise NATO</a> (Cyberint)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1715</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10109c34-2b53-11ee-9c79-2743852559b2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6544642750.mp3?updated=1690486965" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A malign AI tool: FraudGPT. Stealer logs in the C2C market. Signs in the blockchain that some Conti alumni are working with the Akira gang. And a kinetic strike against a cyber target.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1871/notes</link>
      <description>FraudGPT is a chatbot with malign intent. Stealer logs in the C2C market. Signs in the blockchain that some Conti alumni are working with the Akira gang. Tim Starks from Washington Post's Cybersecurity 202 on the White House’s new National Cyber Director nominee. Maria Varmazis speaks with David Luber, Deputy Director of NSA's Cybersecurity Directorate, on space systems as critical infrastructure. And a kinetic strike against a cyber target: Ukrainian drones may have hit Fancy Bear’s Moscow digs.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/141

Selected reading.
FraudGPT: The Villain Avatar of ChatGPT (Netenrich) 
Stealer Logs &amp; Corporate Access (Flare)
Over 400,000 corporate credentials stolen by info-stealing malware (BleepingComputer)
The Alarming Rise of Infostealers: How to Detect this Silent Threat (The Hacker News)
Conti and Akira: Chained Together (Arctic Wolf)
Ukraine-Russia war: Ukraine vows further drone strikes on Moscow and Crimea (The Telegraph) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 26 Jul 2023 20:15:00 -0000</pubDate>
      <itunes:title>A malign AI tool: FraudGPT. Stealer logs in the C2C market. Signs in the blockchain that some Conti alumni are working with the Akira gang. And a kinetic strike against a cyber target.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1871</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>FraudGPT is a chatbot with malign intent. Stealer logs in the C2C market. Signs in the blockchain that some Conti alumni are working with the Akira gang. Tim Starks from Washington Post's Cybersecurity 202 on the White House’s new National Cyber Director nominee. Maria Varmazis speaks with David Luber, Deputy Director of NSA's Cybersecurity Directorate, on space systems as critical infrastructure. And a kinetic strike against a cyber target: Ukrainian drones may have hit Fancy Bear’s Moscow digs.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/141

Selected reading.
FraudGPT: The Villain Avatar of ChatGPT (Netenrich) 
Stealer Logs &amp; Corporate Access (Flare)
Over 400,000 corporate credentials stolen by info-stealing malware (BleepingComputer)
The Alarming Rise of Infostealers: How to Detect this Silent Threat (The Hacker News)
Conti and Akira: Chained Together (Arctic Wolf)
Ukraine-Russia war: Ukraine vows further drone strikes on Moscow and Crimea (The Telegraph) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>FraudGPT is a chatbot with malign intent. Stealer logs in the C2C market. Signs in the blockchain that some Conti alumni are working with the Akira gang. Tim Starks from Washington Post's Cybersecurity 202 on the White House’s new National Cyber Director nominee. Maria Varmazis speaks with David Luber, Deputy Director of NSA's Cybersecurity Directorate, on space systems as critical infrastructure. And a kinetic strike against a cyber target: Ukrainian drones may have hit Fancy Bear’s Moscow digs.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/141</p><p><br></p><h2>Selected reading.</h2><p><a href="https://netenrich.com/blog/fraudgpt-the-villain-avatar-of-chatgpt">FraudGPT: The Villain Avatar of ChatGPT</a> (Netenrich) </p><p><a href="https://flare.io/learn/resources/stealer-logs-and-corporate-access">Stealer Logs &amp; Corporate Access</a> (Flare)</p><p><a href="https://www.bleepingcomputer.com/news/security/over-400-000-corporate-credentials-stolen-by-info-stealing-malware/">Over 400,000 corporate credentials stolen by info-stealing malware</a> (BleepingComputer)</p><p><a href="https://thehackernews.com/2023/07/the-alarming-rise-of-infostealers-how.html">The Alarming Rise of Infostealers: How to Detect this Silent Threat</a> (The Hacker News)</p><p><a href="https://arcticwolf.com/resources/blog/conti-and-akira-chained-together/">Conti and Akira: Chained Together</a> (Arctic Wolf)</p><p><a href="https://www.telegraph.co.uk/world-news/2023/07/24/russia-ukraine-war-latest-drone-attack-moscow-odesa/">Ukraine-Russia war: Ukraine vows further drone strikes on Moscow and Crimea</a> (The Telegraph) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1615</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0ffe194c-2b53-11ee-9c79-b79319d43349]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2803342774.mp3?updated=1690397075" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Norway continues to investigate a cyberattack. The view from Russia. Trends in data breaches, ransom payments, and security self-perception. Apple patches iOS.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1870/notes</link>
      <description>A zero-day attack of undetermined origin targets government offices in Norway. Russia accuses the US of cyber aggression. Data breaches exact a rising cost. 74% of survey respondents say their company would pay ransom to recover stolen or encrypted data. Executives and security teams differ in their perception of cyber threat readiness. Mr. Security Answer Person John Pescatore looks at risk metrics. Joe Carrigan on a new dark market AI tool called Worm GPT. And Apple issues urgent patches.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/140

Selected reading.
Norway says Ivanti zero-day was used to hack govt IT systems (BleepingComputer)
Norway investigates cyberattack affecting 12 government ministries (Record)
Norwegian government IT systems hacked using zero-day flaw (BleepingComputer)
Putin ally accuses US of planning cyberattacks on Russian critical infrastructure (Al Arabiya English) 
Cost of a Data Breach Report 2023 (IBM Security)
Ransom Monetization Rates Fall to Record Low Despite Jump In Average Ransom Payments (Coveware) 
2023 Cyber Threat Readiness Report (Swimlane) 
Apple Releases Security Updates for Multiple Products (Cybersecurity and Infrastructure Security Agency CISA)
Apple fixes 16 security flaws with iOS 16.6, two actively exploited (9to5Mac)
Apple Rolls Out Urgent Patches for Zero-Day Flaws Impacting iPhones, iPads and Macs (The Hacker News)
Apple fixes new zero-day used in attacks against iPhones, Macs (BleepingComputer) 
iOS 16.6: Apple Suddenly Releases Key iPhone Update With Urgent Fixes (Forbes) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Jul 2023 20:45:00 -0000</pubDate>
      <itunes:title>Norway continues to investigate a cyberattack. The view from Russia. Trends in data breaches, ransom payments, and security self-perception. Apple patches iOS.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1870</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A zero-day attack of undetermined origin targets government offices in Norway. Russia accuses the US of cyber aggression. Data breaches exact a rising cost. 74% of survey respondents say their company would pay ransom to recover stolen or encrypted data. Executives and security teams differ in their perception of cyber threat readiness. Mr. Security Answer Person John Pescatore looks at risk metrics. Joe Carrigan on a new dark market AI tool called Worm GPT. And Apple issues urgent patches.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/140

Selected reading.
Norway says Ivanti zero-day was used to hack govt IT systems (BleepingComputer)
Norway investigates cyberattack affecting 12 government ministries (Record)
Norwegian government IT systems hacked using zero-day flaw (BleepingComputer)
Putin ally accuses US of planning cyberattacks on Russian critical infrastructure (Al Arabiya English) 
Cost of a Data Breach Report 2023 (IBM Security)
Ransom Monetization Rates Fall to Record Low Despite Jump In Average Ransom Payments (Coveware) 
2023 Cyber Threat Readiness Report (Swimlane) 
Apple Releases Security Updates for Multiple Products (Cybersecurity and Infrastructure Security Agency CISA)
Apple fixes 16 security flaws with iOS 16.6, two actively exploited (9to5Mac)
Apple Rolls Out Urgent Patches for Zero-Day Flaws Impacting iPhones, iPads and Macs (The Hacker News)
Apple fixes new zero-day used in attacks against iPhones, Macs (BleepingComputer) 
iOS 16.6: Apple Suddenly Releases Key iPhone Update With Urgent Fixes (Forbes) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A zero-day attack of undetermined origin targets government offices in Norway. Russia accuses the US of cyber aggression. Data breaches exact a rising cost. 74% of survey respondents say their company would pay ransom to recover stolen or encrypted data. Executives and security teams differ in their perception of cyber threat readiness. Mr. Security Answer Person John Pescatore looks at risk metrics. Joe Carrigan on a new dark market AI tool called Worm GPT. And Apple issues urgent patches.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/140</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/security/norway-says-ivanti-zero-day-was-used-to-hack-govt-it-systems/">Norway says Ivanti zero-day was used to hack govt IT systems</a> (BleepingComputer)</p><p><a href="https://therecord.media/norway-investigates-cyberattack-affecting-government-ministries">Norway investigates cyberattack affecting 12 government ministries </a>(Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/norwegian-government-it-systems-hacked-using-zero-day-flaw/">Norwegian government IT systems hacked using zero-day flaw</a> (BleepingComputer)</p><p><a href="https://english.alarabiya.net/News/world/2023/07/24/Putin-ally-accuses-US-of-planning-cyberattacks-on-Russian-critical-infrastructure">Putin ally accuses US of planning cyberattacks on Russian critical infrastructure</a> (Al Arabiya English) </p><p><a href="https://www.ibm.com/downloads/cas/E3G5JMBP">Cost of a Data Breach Report 2023</a> (IBM Security)</p><p><a href="https://www.coveware.com/blog/2023/7/21/ransom-monetization-rates-fall-to-record-low-despite-jump-in-average-ransom-payments">Ransom Monetization Rates Fall to Record Low Despite Jump In Average Ransom Payments</a> (Coveware) </p><p><a href="https://swimlane.com/resources/reports/cyber-threat-readiness-report/">2023 Cyber Threat Readiness Report</a> (Swimlane) </p><p><a href="https://www.cisa.gov/news-events/alerts/2023/07/25/apple-releases-security-updates-multiple-products">Apple Releases Security Updates for Multiple Products</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://9to5mac.com/2023/07/24/apple-fixes-16-security-flaws-with-ios-16-6/">Apple fixes 16 security flaws with iOS 16.6, two actively exploited</a> (9to5Mac)</p><p><a href="https://thehackernews.com/2023/07/apple-rolls-out-urgent-patches-for-zero.html">Apple Rolls Out Urgent Patches for Zero-Day Flaws Impacting iPhones, iPads and Macs</a> (The Hacker News)</p><p><a href="https://www.bleepingcomputer.com/news/apple/apple-fixes-new-zero-day-used-in-attacks-against-iphones-macs/">Apple fixes new zero-day used in attacks against iPhones, Macs</a> (BleepingComputer) </p><p><a href="https://www.forbes.com/sites/davidphelan/2023/07/24/ios-166-apple-suddenly-releases-key-iphone-update-with-urgent-fixes/">iOS 16.6: Apple Suddenly Releases Key iPhone Update With Urgent Fixes</a> (Forbes) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1557</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e1cd18fe-1f5c-11ee-b1fc-afb0f2c826b6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6100867312.mp3?updated=1690334317" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DPRK’s RGB shows improved targeting and tool-sharing. Cl0p updates. Two new RATs. Weak radio encryption standard. Razzlekhan will cop a plea.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1869/notes</link>
      <description>North Korea's increasingly supple cyber offensives. A look at Cl0p. The NetSupport RAT's fake update vectors. HotRat is a Trojan that accompanies illegally pirated software and games. Crackable radio encryption standard: a bug or a feature? Chris Novak from Verizon discusses ransomware through the lens of the DBIR. Carole Theriault describes a ransomware attack that hit close to home. And an alleged money-laundering crypto-rapper is back in the news.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/139

Selected reading.
North Korea Leverages SaaS Provider in a Targeted Supply Chain Attack | Mandiant (Mandiant)
Ransomware Roundup - Cl0p (Fortinet Blog)
FakeSG enters the 'FakeUpdates' arena to deliver NetSupport RAT (Malwarebytes)
Researchers Find ‘Backdoor’ in Encrypted Police and Military Radios (Vice) 
Unmasking HotRat: The hidden dangers in your software downloads (Avast)
Researchers Find ‘Backdoor’ in Encrypted Police and Military Radios (Vice) 
Crypto rapper 'Razzlekhan,' husband reach plea deal over Bitfinex hack laundering (Reuters)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 24 Jul 2023 20:45:00 -0000</pubDate>
      <itunes:title>DPRK’s RGB shows improved targeting and tool-sharing. Cl0p updates. Two new RATs. Weak radio encryption standard. Razzlekhan will cop a plea.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1869</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>North Korea's increasingly supple cyber offensives. A look at Cl0p. The NetSupport RAT's fake update vectors. HotRat is a Trojan that accompanies illegally pirated software and games. Crackable radio encryption standard: a bug or a feature? Chris Novak from Verizon discusses ransomware through the lens of the DBIR. Carole Theriault describes a ransomware attack that hit close to home. And an alleged money-laundering crypto-rapper is back in the news.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/139

Selected reading.
North Korea Leverages SaaS Provider in a Targeted Supply Chain Attack | Mandiant (Mandiant)
Ransomware Roundup - Cl0p (Fortinet Blog)
FakeSG enters the 'FakeUpdates' arena to deliver NetSupport RAT (Malwarebytes)
Researchers Find ‘Backdoor’ in Encrypted Police and Military Radios (Vice) 
Unmasking HotRat: The hidden dangers in your software downloads (Avast)
Researchers Find ‘Backdoor’ in Encrypted Police and Military Radios (Vice) 
Crypto rapper 'Razzlekhan,' husband reach plea deal over Bitfinex hack laundering (Reuters)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>North Korea's increasingly supple cyber offensives. A look at Cl0p. The NetSupport RAT's fake update vectors. HotRat is a Trojan that accompanies illegally pirated software and games. Crackable radio encryption standard: a bug or a feature? Chris Novak from Verizon discusses ransomware through the lens of the DBIR. Carole Theriault describes a ransomware attack that hit close to home. And an alleged money-laundering crypto-rapper is back in the news.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/139</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.mandiant.com/resources/blog/north-korea-supply-chain">North Korea Leverages SaaS Provider in a Targeted Supply Chain Attack | Mandiant</a> (Mandiant)</p><p><a href="https://www.fortinet.com/blog/threat-research/ransomware-roundup-cl0p">Ransomware Roundup - Cl0p</a> (Fortinet Blog)</p><p><a href="https://www.malwarebytes.com/blog/threat-intelligence/2023/07/socgholish-copycat-delivers-netsupport-rat">FakeSG enters the 'FakeUpdates' arena to deliver NetSupport RAT</a> (Malwarebytes)</p><p><a href="https://www.vice.com/en/article/4a3n3j/backdoor-in-police-radios-tetra-burst">Researchers Find ‘Backdoor’ in Encrypted Police and Military Radios</a> (Vice) </p><p><a href="https://blog.avast.com/hotrat-malware-in-cracked-software">Unmasking HotRat: The hidden dangers in your software downloads</a> (Avast)</p><p><a href="https://www.vice.com/en/article/4a3n3j/backdoor-in-police-radios-tetra-burst">Researchers Find ‘Backdoor’ in Encrypted Police and Military Radios</a> (Vice) </p><p><a href="https://www.reuters.com/world/us/us-couple-accused-laundering-crypto-bitfinex-hack-reach-plea-deal-2023-07-21/">Crypto rapper 'Razzlekhan,' husband reach plea deal over Bitfinex hack laundering</a> (Reuters)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1474</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e1a248c2-1f5c-11ee-b1fc-1fe65669330d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3959908408.mp3?updated=1690333860" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Don Welch: Being a good leader. [CIO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/159/notes</link>
      <description>Don Welch, Chief Information Officer from New York University sits down to share his exciting start into his cyber career. Much like many other people who started in this industry, Don went into the military, which is where it all started for him. He was told he needed to take two specialties, and so along with mechanical engineering, he decided to go into computer science as well. After taking his two crafts, he decided to leave the Army and go into the civilian world where he took a couple jobs in cyber. He landed a few jobs at different prestigious universities, including Penn State University, University of Michigan, and now New York University. He shares that being a good leader will take you far in life, saying "I will say that if you are a great leader, ultimately, you sit in your office and do nothing because you have developed your team and empowered them, and they're making all the decisions, everything runs like clockwork and you have nothing to do." We thank Don for sharing is story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 23 Jul 2023 07:00:00 -0000</pubDate>
      <itunes:title>Don Welch: Being a good leader. [CIO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>159</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Don Welch, Chief Information Officer from New York University sits down to share his exciting start into his cyber career. Much like many other people who started in this industry, Don went into the military, which is where it all started for him. He was told he needed to take two specialties, and so along with mechanical engineering, he decided to go into computer science as well. After taking his two crafts, he decided to leave the Army and go into the civilian world where he took a couple jobs in cyber. He landed a few jobs at different prestigious universities, including Penn State University, University of Michigan, and now New York University. He shares that being a good leader will take you far in life, saying "I will say that if you are a great leader, ultimately, you sit in your office and do nothing because you have developed your team and empowered them, and they're making all the decisions, everything runs like clockwork and you have nothing to do." We thank Don for sharing is story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Don Welch, Chief Information Officer from New York University sits down to share his exciting start into his cyber career. Much like many other people who started in this industry, Don went into the military, which is where it all started for him. He was told he needed to take two specialties, and so along with mechanical engineering, he decided to go into computer science as well. After taking his two crafts, he decided to leave the Army and go into the civilian world where he took a couple jobs in cyber. He landed a few jobs at different prestigious universities, including Penn State University, University of Michigan, and now New York University. He shares that being a good leader will take you far in life, saying "I will say that if you are a great leader, ultimately, you sit in your office and do nothing because you have developed your team and empowered them, and they're making all the decisions, everything runs like clockwork and you have nothing to do." We thank Don for sharing is story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>519</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[509c9a40-27d0-11ee-a2de-577a24e659d9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1559233932.mp3?updated=1689948136" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Infostealer Malware 101: mitigating risks and strengthening defenses against this insidious threat. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/47/notes</link>
      <description>With the relentless advancements in technology and a workforce more digitally-enabled than ever before, businesses today face an unprecedented challenge of protecting their sensitive information from cybercriminals. Infostealer malware, often disguised as innocuous files or hidden within legitimate-looking emails, stealthily infiltrate employee and contractor devices – managed and unmanaged – exfiltrating all manner of data for the purposes of executing follow-on attacks including ransomware. The data at risk includes customer details, financial information, intellectual property, and R&amp;D plans stolen from compromised applications that were accessed from infostealer-exfiltrated authentication data like credentials and active session cookies/tokens. This episode digs into the proliferation of infostealers and provides actionable steps for businesses of any size or industry to mitigate the threat.
In this episode of CyberWire-X, N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined in the first half by Hash Table member Rick Doten to discuss the early days of incident response and the current thinking of post-infection remediation (PIR) actions. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor SpyCloud’s Director of Security Research, Trevor Hilligoss. They chat about the challenges for enterprises and security leaders to identify what was stolen from malware-infected devices and how proper post-infection remediation implemented into existing incident response workflows can help prevent this data from causing ransomware. Trevor shares highlights from an industry report of over 300+ security leaders from North America and the UK on where they stand on malware identification and remediation, and what additional work can be done to minimize cybercriminals' access and impact.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 23 Jul 2023 05:00:00 -0000</pubDate>
      <itunes:title>Infostealer Malware 101: mitigating risks and strengthening defenses against this insidious threat. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>47</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>With the relentless advancements in technology and a workforce more digitally-enabled than ever before, businesses today face an unprecedented challenge of protecting their sensitive information from cybercriminals. Infostealer malware, often disguised as innocuous files or hidden within legitimate-looking emails, stealthily infiltrate employee and contractor devices – managed and unmanaged – exfiltrating all manner of data for the purposes of executing follow-on attacks including ransomware. The data at risk includes customer details, financial information, intellectual property, and R&amp;D plans stolen from compromised applications that were accessed from infostealer-exfiltrated authentication data like credentials and active session cookies/tokens. This episode digs into the proliferation of infostealers and provides actionable steps for businesses of any size or industry to mitigate the threat.
In this episode of CyberWire-X, N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined in the first half by Hash Table member Rick Doten to discuss the early days of incident response and the current thinking of post-infection remediation (PIR) actions. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor SpyCloud’s Director of Security Research, Trevor Hilligoss. They chat about the challenges for enterprises and security leaders to identify what was stolen from malware-infected devices and how proper post-infection remediation implemented into existing incident response workflows can help prevent this data from causing ransomware. Trevor shares highlights from an industry report of over 300+ security leaders from North America and the UK on where they stand on malware identification and remediation, and what additional work can be done to minimize cybercriminals' access and impact.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>With the relentless advancements in technology and a workforce more digitally-enabled than ever before, businesses today face an unprecedented challenge of protecting their sensitive information from cybercriminals. Infostealer malware, often disguised as innocuous files or hidden within legitimate-looking emails, stealthily infiltrate employee and contractor devices – managed and unmanaged – exfiltrating all manner of data for the purposes of executing follow-on attacks including ransomware. The data at risk includes customer details, financial information, intellectual property, and R&amp;D plans stolen from compromised applications that were accessed from infostealer-exfiltrated authentication data like credentials and active session cookies/tokens. This episode digs into the proliferation of infostealers and provides actionable steps for businesses of any size or industry to mitigate the threat.</p><p>In this episode of CyberWire-X, N2K’s CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined in the first half by Hash Table member Rick Doten to discuss the early days of incident response and the current thinking of post-infection remediation (PIR) actions. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor SpyCloud’s Director of Security Research, Trevor Hilligoss. They chat about the challenges for enterprises and security leaders to identify what was stolen from malware-infected devices and how proper post-infection remediation implemented into existing incident response workflows can help prevent this data from causing ransomware. Trevor shares highlights from an industry report of over 300+ security leaders from North America and the UK on where they stand on malware identification and remediation, and what additional work can be done to minimize cybercriminals' access and impact.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1849</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9d248478-267b-11ee-bd46-cf8b3f2214bc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1976110984.mp3?updated=1689691887" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Welcome to New York, it's been waitin' for you. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/291/notes</link>
      <description>Joshua Miller from Proofpoint joins Dave to discuss findings on "Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware." In mid May, TA453, also known as Charming Kitten, APT42, Mint Sandstorm, and Yellow Garuda, was found sending a benign conversation lure masquerading as a senior fellow with the Royal United Services Institute (RUSI) to the public media contact for a nuclear security expert at a US-based think tank focused on foreign affairs.
The research states that "the email solicited feedback on a project called “Iran in the Global Security Context” and requested permission to send a draft for review." Proofpoint shares it's findings and what you can expect from the threat group.
The research can be found here:
Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Jul 2023 07:00:00 -0000</pubDate>
      <itunes:title>Welcome to New York, it's been waitin' for you. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>291</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joshua Miller from Proofpoint joins Dave to discuss findings on "Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware." In mid May, TA453, also known as Charming Kitten, APT42, Mint Sandstorm, and Yellow Garuda, was found sending a benign conversation lure masquerading as a senior fellow with the Royal United Services Institute (RUSI) to the public media contact for a nuclear security expert at a US-based think tank focused on foreign affairs.
The research states that "the email solicited feedback on a project called “Iran in the Global Security Context” and requested permission to send a draft for review." Proofpoint shares it's findings and what you can expect from the threat group.
The research can be found here:
Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joshua Miller from Proofpoint joins Dave to discuss findings on "Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware." In mid May, TA453, also known as Charming Kitten, APT42, Mint Sandstorm, and Yellow Garuda, was found sending a benign conversation lure masquerading as a senior fellow with the Royal United Services Institute (RUSI) to the public media contact for a nuclear security expert at a US-based think tank focused on foreign affairs.</p><p>The research states that "the email solicited feedback on a project called “Iran in the Global Security Context” and requested permission to send a draft for review." Proofpoint shares it's findings and what you can expect from the threat group.</p><p>The research can be found here:</p><ul><li><a href="https://www.proofpoint.com/us/blog/threat-insight/welcome-new-york-exploring-ta453s-foray-lnks-and-mac-malware">Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1112</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5895a176-27ec-11ee-b4ce-0f7393640c85]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4736221114.mp3?updated=1689959545" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage and developments in the cyber underworld, including an offering in the C2C market. Russian hacktivist auxiliaries stay busy (and so do their masters in the organs).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1868/notes</link>
      <description>The Lazarus Group targets developers. Threat actors target the banking sector with fake LinkedIn profiles and open source supply chain attacks. Vulnerabilities reported in OpenMeetings. HTML smuggling is sold in the C2C market. Johannes Ullrich from SANS describes attacks against niche web apps. Our guest is Damir Brecic of Inversion6 discussing the privacy and security concerns of Meta's new Threads app. And Romania's SVR reports a pattern of Russian cyberattacks.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/138

Selected reading.
GitHub warns of Lazarus hackers targeting devs with malicious projects (BleepingComputer)
Cyberattack on GitHub customers linked to North Korean hackers, Microsoft says (Record)
Security alert: social engineering campaign targets technology industry employees (The GitHub Blog)
First Known Targeted OSS Supply Chain Attacks Against the Banking Sector (Checkmarx)
A Twist in the Code: OpenMeetings Vulnerabilities through Unexpected Application State (Sonar) 
Fresh Phish: HTML Smuggling Made Easy, Thanks to a New Dark Web Phish Kit (INKY) 
KillNet Showcases New Capabilities While Repeating Older Tactics (Mandiant).
Pro-Russian hacktivists increase focus on Western targets. The latest is OnlyFans. (CyberScoop).
Anonymous Sudan DDoS strikes dominate attacks by KillNet collective (SC Media)
Romanian Intelligence General: All Russian secret services attempted cyber attacks against Romania (ACTMedia)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 21 Jul 2023 20:15:00 -0000</pubDate>
      <itunes:title>Cyberespionage and developments in the cyber underworld, including an offering in the C2C market. Russian hacktivist auxiliaries stay busy (and so do their masters in the organs).</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1868</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Lazarus Group targets developers. Threat actors target the banking sector with fake LinkedIn profiles and open source supply chain attacks. Vulnerabilities reported in OpenMeetings. HTML smuggling is sold in the C2C market. Johannes Ullrich from SANS describes attacks against niche web apps. Our guest is Damir Brecic of Inversion6 discussing the privacy and security concerns of Meta's new Threads app. And Romania's SVR reports a pattern of Russian cyberattacks.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/138

Selected reading.
GitHub warns of Lazarus hackers targeting devs with malicious projects (BleepingComputer)
Cyberattack on GitHub customers linked to North Korean hackers, Microsoft says (Record)
Security alert: social engineering campaign targets technology industry employees (The GitHub Blog)
First Known Targeted OSS Supply Chain Attacks Against the Banking Sector (Checkmarx)
A Twist in the Code: OpenMeetings Vulnerabilities through Unexpected Application State (Sonar) 
Fresh Phish: HTML Smuggling Made Easy, Thanks to a New Dark Web Phish Kit (INKY) 
KillNet Showcases New Capabilities While Repeating Older Tactics (Mandiant).
Pro-Russian hacktivists increase focus on Western targets. The latest is OnlyFans. (CyberScoop).
Anonymous Sudan DDoS strikes dominate attacks by KillNet collective (SC Media)
Romanian Intelligence General: All Russian secret services attempted cyber attacks against Romania (ACTMedia)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Lazarus Group targets developers. Threat actors target the banking sector with fake LinkedIn profiles and open source supply chain attacks. Vulnerabilities reported in OpenMeetings. HTML smuggling is sold in the C2C market. Johannes Ullrich from SANS describes attacks against niche web apps. Our guest is Damir Brecic of Inversion6 discussing the privacy and security concerns of Meta's new Threads app. And Romania's SVR reports a pattern of Russian cyberattacks.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/138</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/security/github-warns-of-lazarus-hackers-targeting-devs-with-malicious-projects/">GitHub warns of Lazarus hackers targeting devs with malicious projects</a> (BleepingComputer)</p><p><a href="https://therecord.media/github-cyberattack-attributed-to-new-north-korean-jade-sleet-group-microsoft">Cyberattack on GitHub customers linked to North Korean hackers, Microsoft says</a> (Record)</p><p><a href="https://github.blog/2023-07-18-security-alert-social-engineering-campaign-targets-technology-industry-employees/">Security alert: social engineering campaign targets technology industry employees</a> (The GitHub Blog)</p><p><a href="https://checkmarx.com/blog/first-known-targeted-oss-supply-chain-attacks-against-the-banking-sector/">First Known Targeted OSS Supply Chain Attacks Against the Banking Sector</a> (Checkmarx)</p><p><a href="https://www.sonarsource.com/blog/a-twist-in-the-code-openmeetings-vulnerabilities-through-unexpected-application-state/">A Twist in the Code: OpenMeetings Vulnerabilities through Unexpected Application State</a> (Sonar) </p><p><a href="https://www.inky.com/en/blog/fresh-phish-html-smuggling-made-easy-thanks-to-a-new-dark-web-phish-kit">Fresh Phish: HTML Smuggling Made Easy, Thanks to a New Dark Web Phish Kit</a> (INKY) </p><p><a href="https://www.mandiant.com/resources/blog/killnet-new-capabilities-older-tactics">KillNet Showcases New Capabilities While Repeating Older Tactics</a> (Mandiant).</p><p><a href="https://cyberscoop.com/anonymous-sudan-killnet-russia-onlyfans/">Pro-Russian hacktivists increase focus on Western targets. The latest is OnlyFans.</a> (CyberScoop).</p><p><a href="https://www.scmagazine.com/news/critical-infrastructure/anonymous-sudan-ddos-strikes-dominate-attacks-by-killnet-collective">Anonymous Sudan DDoS strikes dominate attacks by KillNet collective</a> (SC Media)</p><p><a href="https://actmedia.eu/daily/romanian-intelligence-general-all-russian-secret-services-attempted-cyber-attacks-against-romania/104036">Romanian Intelligence General: All Russian secret services attempted cyber attacks against Romania</a> (ACTMedia)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1380</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e13b0432-1f5c-11ee-b1fc-0b7735020ebe]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3625360740.mp3?updated=1690333845" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Malvertising meets SEO poisoning. Fast moving on MOVEit exploit remediation. Ransomware trends. Cyberespionage, sanctions, and influence ops. Ave atque vale Kevin Mitnick. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1867/notes</link>
      <description>Sophos analyzes malvertising through purchased Google Ads. The MOVEit vulnerability is remediated faster than most. The DeliveryCheck backdoor is used against Ukrainian targets. SORM is under stress. Ukrainian police roll up another bot farm working in support of Russian influence operations. AJ Nash from ZeroFox provides insights on the White House cybersecurity labeling program. David Moulton from Palo Alto Networks Unit 42 introduces his new segment "Threat Vector." And we bid farewell to Kevin Mitnick.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/137

Selected reading.
Bad ad fad leads to IcedID, Gozi infections (Sophos News)
New research reveals rapid remediation of MOVEit Transfer vulnerabilities (Bitsight) 
GRIT Ransomware Report-2023-Q2 (Guidepoint Security) 
Russia’s Turla hackers target Ukraine’s defense with spyware (Record) 
Russian Hackers Probe Ukrainian Defense Sector With Backdoor (Bank Info Security) 
Russia’s vast telecom surveillance system crippled by withdrawal of Western tech, report says (Record) 
Ukraine’s cyber police dismantled a massive bot farm spreading propaganda (Security Affairs)
Kevin David Mitnick, August 6, 1963 - July 16, 2023. (Dignity Memorial)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 20 Jul 2023 20:15:00 -0000</pubDate>
      <itunes:title>Malvertising meets SEO poisoning. Fast moving on MOVEit exploit remediation. Ransomware trends. Cyberespionage, sanctions, and influence ops. Ave atque vale Kevin Mitnick. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1867</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Sophos analyzes malvertising through purchased Google Ads. The MOVEit vulnerability is remediated faster than most. The DeliveryCheck backdoor is used against Ukrainian targets. SORM is under stress. Ukrainian police roll up another bot farm working in support of Russian influence operations. AJ Nash from ZeroFox provides insights on the White House cybersecurity labeling program. David Moulton from Palo Alto Networks Unit 42 introduces his new segment "Threat Vector." And we bid farewell to Kevin Mitnick.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/137

Selected reading.
Bad ad fad leads to IcedID, Gozi infections (Sophos News)
New research reveals rapid remediation of MOVEit Transfer vulnerabilities (Bitsight) 
GRIT Ransomware Report-2023-Q2 (Guidepoint Security) 
Russia’s Turla hackers target Ukraine’s defense with spyware (Record) 
Russian Hackers Probe Ukrainian Defense Sector With Backdoor (Bank Info Security) 
Russia’s vast telecom surveillance system crippled by withdrawal of Western tech, report says (Record) 
Ukraine’s cyber police dismantled a massive bot farm spreading propaganda (Security Affairs)
Kevin David Mitnick, August 6, 1963 - July 16, 2023. (Dignity Memorial)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sophos analyzes malvertising through purchased Google Ads. The MOVEit vulnerability is remediated faster than most. The DeliveryCheck backdoor is used against Ukrainian targets. SORM is under stress. Ukrainian police roll up another bot farm working in support of Russian influence operations. AJ Nash from ZeroFox provides insights on the White House cybersecurity labeling program. David Moulton from Palo Alto Networks Unit 42 introduces his new segment "Threat Vector." And we bid farewell to Kevin Mitnick.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/137</p><p><br></p><h2>Selected reading.</h2><p><a href="https://news.sophos.com/en-us/2023/07/20/bad-ad-fad-leads-to-icedid-gozi-infections/">Bad ad fad leads to IcedID, Gozi infections</a> (Sophos News)</p><p><a href="https://www.bitsight.com/blog/new-research-reveals-rapid-remediation-moveit-transfer-vulnerabilities">New research reveals rapid remediation of MOVEit Transfer vulnerabilities</a> (Bitsight) </p><p><a href="https://www.guidepointsecurity.com/resources/grit-ransomware-report-2023-q2/">GRIT Ransomware Report-2023-Q2</a> (Guidepoint Security) </p><p><a href="https://therecord.media/turla-hackers-targeting-ukraine-defense">Russia’s Turla hackers target Ukraine’s defense with spyware</a> (Record) </p><p><a href="https://www.bankinfosecurity.com/russian-hackers-probe-ukrainian-defense-sector-backdoor-a-22591">Russian Hackers Probe Ukrainian Defense Sector With Backdoor</a> (Bank Info Security) </p><p><a href="https://therecord.media/russia-telecommunications-sorm-surveillance-western-technology">Russia’s vast telecom surveillance system crippled by withdrawal of Western tech, report says</a> (Record) </p><p><a href="https://securityaffairs.com/148616/intelligence/massive-bot-farm-russia-propaganda.html">Ukraine’s cyber police dismantled a massive bot farm spreading propaganda</a> (Security Affairs)</p><p><a href="https://www.dignitymemorial.com/obituaries/las-vegas-nv/kevin-mitnick-11371668">Kevin David Mitnick, August 6, 1963 - July 16, 2023</a>. (Dignity Memorial)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1715</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e150a03a-1f5c-11ee-b1fc-93a7e3177de8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9950336219.mp3?updated=1690333831" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patches and exploits. Watching threats develop in the dark web. Spyware vendors added to the US Entity List. WhatsApp risk. And notes from the hybrid war. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1866/notes</link>
      <description>Vulnerabilities are identified and patched in Citrix Netscaler products and Adobe Coldfusion. The banking sector should be monitoring the dark web for leaked credentials and insider threats. Spyware vendors are added to the US Entity List. WhatsApp accounts may be at risk. Verizon’s Chris Novak shares insights on Log4j from this year’s DBIR. Our guest is Candid Wüest of Acronis discussing the findings of their Year-end Cyberthreats Report. Skirmishes in the cyber phases of Russia's war. And how do you demobilize cyber forces (especially the auxiliaries) once the war is over?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/136

Selected reading.
Exploited 0-days, an incomplete fix, and a botched disclosure: Infosec snafu reigns 
New critical Citrix ADC and Gateway flaw exploited as zero-day (BleepingComputer) 
Citrix alerts users to critical vulnerability in Citrix ADC and Gateway (Computing)
Adobe, Microsoft and Citrix vulnerabilities draw warnings from CISA (Record)
Active Exploitation of Multiple Adobe ColdFusion Vulnerabilities (Rapid7)
Dark Web Threats Against The Banking Sector › Searchlight Cyber (Searchlight Cyber)
WhatsApp Remote Deactivation Warning For 2 Billion Users (Forbes)
The United States Adds Foreign Companies to Entity List for Malicious Cyber Activities - United States Department of State (United States Department of State) 
Commerce Adds Four Entities to Entity List for Trafficking in Cyber Exploits (Bureau of Industry and Security) 
Russian hackers may be behind 'DDoS' attack on NZ Parliament website (Stuff) 
Russian medical lab suspends some services after ransomware attack (Record) 
If you want peace, prepare for… cyberwar - Friends of Europe (Friends of Europe) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 19 Jul 2023 20:15:00 -0000</pubDate>
      <itunes:title>Patches and exploits. Watching threats develop in the dark web. Spyware vendors added to the US Entity List. WhatsApp risk. And notes from the hybrid war. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1866</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Vulnerabilities are identified and patched in Citrix Netscaler products and Adobe Coldfusion. The banking sector should be monitoring the dark web for leaked credentials and insider threats. Spyware vendors are added to the US Entity List. WhatsApp accounts may be at risk. Verizon’s Chris Novak shares insights on Log4j from this year’s DBIR. Our guest is Candid Wüest of Acronis discussing the findings of their Year-end Cyberthreats Report. Skirmishes in the cyber phases of Russia's war. And how do you demobilize cyber forces (especially the auxiliaries) once the war is over?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/136

Selected reading.
Exploited 0-days, an incomplete fix, and a botched disclosure: Infosec snafu reigns 
New critical Citrix ADC and Gateway flaw exploited as zero-day (BleepingComputer) 
Citrix alerts users to critical vulnerability in Citrix ADC and Gateway (Computing)
Adobe, Microsoft and Citrix vulnerabilities draw warnings from CISA (Record)
Active Exploitation of Multiple Adobe ColdFusion Vulnerabilities (Rapid7)
Dark Web Threats Against The Banking Sector › Searchlight Cyber (Searchlight Cyber)
WhatsApp Remote Deactivation Warning For 2 Billion Users (Forbes)
The United States Adds Foreign Companies to Entity List for Malicious Cyber Activities - United States Department of State (United States Department of State) 
Commerce Adds Four Entities to Entity List for Trafficking in Cyber Exploits (Bureau of Industry and Security) 
Russian hackers may be behind 'DDoS' attack on NZ Parliament website (Stuff) 
Russian medical lab suspends some services after ransomware attack (Record) 
If you want peace, prepare for… cyberwar - Friends of Europe (Friends of Europe) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Vulnerabilities are identified and patched in Citrix Netscaler products and Adobe Coldfusion. The banking sector should be monitoring the dark web for leaked credentials and insider threats. Spyware vendors are added to the US Entity List. WhatsApp accounts may be at risk. Verizon’s Chris Novak shares insights on Log4j from this year’s DBIR. Our guest is Candid Wüest of Acronis discussing the findings of their Year-end Cyberthreats Report. Skirmishes in the cyber phases of Russia's war. And how do you demobilize cyber forces (especially the auxiliaries) once the war is over?</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/136</p><p><br></p><h2>Selected reading.</h2><p><a href="https://arstechnica.com/security/2023/07/vulnerabilities-in-adobe-coldfusion-and-citrix-netscaler-are-under-active-exploitation/">Exploited 0-days, an incomplete fix, and a botched disclosure: Infosec snafu reigns</a> </p><p><a href="https://www.bleepingcomputer.com/news/security/new-critical-citrix-adc-and-gateway-flaw-exploited-as-zero-day/">New critical Citrix ADC and Gateway flaw exploited as zero-day</a> (BleepingComputer) </p><p><a href="https://www.computing.co.uk/news/4120444/citrix-alerts-users-critical-vulnerability-citrix-adc-gateway">Citrix alerts users to critical vulnerability in Citrix ADC and Gateway </a>(Computing)</p><p><a href="https://therecord.media/cisa-warnings-adobe-microsoft-citrix-vulnerabilities">Adobe, Microsoft and Citrix vulnerabilities draw warnings from CISA</a> (Record)</p><p><a href="https://www.rapid7.com/blog/post/2023/07/17/etr-active-exploitation-of-multiple-adobe-coldfusion-vulnerabilities/">Active Exploitation of Multiple Adobe ColdFusion Vulnerabilities</a> (Rapid7)</p><p><a href="https://www.slcyber.io/whitepapers-reports/dark-web-threats-against-the-banking-sector/">Dark Web Threats Against The Banking Sector › Searchlight Cyber</a> (Searchlight Cyber)</p><p><a href="https://www.forbes.com/sites/daveywinder/2023/07/18/all-whatsapp-users-warned-accounts-can-be-deactivated-by-anyone-with-1-email/?sh=169b4a0820ae">WhatsApp Remote Deactivation Warning For 2 Billion Users</a> (Forbes)</p><p><a href="https://www.state.gov/the-united-states-adds-foreign-companies-to-entity-list-for-malicious-cyber-activities-2/">The United States Adds Foreign Companies to Entity List for Malicious Cyber Activities - United States Department of State</a> (United States Department of State) </p><p><a href="https://www.bis.doc.gov/index.php/documents/about-bis/newsroom/press-releases/3297-2023-07-18-bis-press-package-spyware-document/file">Commerce Adds Four Entities to Entity List for Trafficking in Cyber Exploits</a> (Bureau of Industry and Security) </p><p><a href="https://www.stuff.co.nz/business/132571137/russian-hackers-may-be-behind-ddos-attack-on-nz-parliament-website">Russian hackers may be behind 'DDoS' attack on NZ Parliament website</a> (Stuff) </p><p><a href="https://therecord.media/russian-medical-lab-suspends-some-services-after-ransomware-attack">Russian medical lab suspends some services after ransomware attack</a> (Record) </p><p><a href="https://www.friendsofeurope.org/insights/critical-thinking-if-you-want-peace-prepare-for-cyberwar/">If you want peace, prepare for… cyberwar - Friends of Europe</a> (Friends of Europe) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1763</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e1653cca-1f5c-11ee-b1fc-c75ee7b36064]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9928853903.mp3?updated=1690333815" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Some guidance from the US government (including device security labels). Supply chain security. Developments in the cyber underworld (including a gang with some perverse integrity).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1865/notes</link>
      <description>The US Federal government issues voluntary security guidelines. Possible privilege escalation within Google Cloud. An APT compromises JumpCloud. FIN8 reworks its Sardonic backdoor and continues its shift to ransomware. Ben Yelin looks at privacy legislation coming out of Massachusetts. Our guest is Alastair Parr of Prevalent discussing GDPR and third party risk. And some noteworthy Russian cyber crime–they don’t seem to be serving any political masters; they just want to get paid.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/135

Selected reading.
Biden-Harris Administration Announces Cybersecurity Labeling Program for Smart Devices to Protect American Consumers (The White House)
The Biden administration announces a cybersecurity labeling program for smart devices (AP News)CISA Develops Factsheet for Free Tools for Cloud Environments (Cybersecurity and Infrastructure Security Agency CISA)
Free Tools for Cloud Environments (CISA)
NSA, CISA Release Guidance on Security Considerations for 5G Network Slicing (Cybersecurity and Infrastructure Security Agency CISA)
ESF Members NSA and CISA Publish Second Industry Paper on 5G Network Slicing (National Security Agency/Central Security Service)
Bad.Build: A Critical Privilege Escalation Design Flaw in Google Cloud Build Enables a Supply Chain Attack (Orca Security)
Orca: Google Cloud design flaw enables supply chain attacks (Security | TechTarget) 
Google fixes ‘Bad.Build’ vulnerability affecting Cloud Build service (Record)
JumpCloud discloses breach by state-backed APT hacking group (BleepingComputer)
JumpCloud: A 'state-sponsored threat actor' compromised our systems (Computing) 
JumpCloud says nation-state hackers breached its systems | TechCrunch (TechCrunch)
JumpCloud, an IT firm serving 200,000 orgs, says it was hacked by nation-state (Ars Technica)
[Security Update] Incident Details - JumpCloud (JumpCloud)
July 2023 Incident Indicators of Compromise (IoCs) (JumpCloud)
FIN8 Uses Revamped Sardonic Backdoor to Deliver Noberus Ransomware (Symantec by Broadcom)
RedCurl hackers return to spy on 'major Russian bank,' Australian company (Record) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Jul 2023 20:15:00 -0000</pubDate>
      <itunes:title>Some guidance from the US government (including device security labels). Supply chain security. Developments in the cyber underworld (including a gang with some perverse integrity).</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1865</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The US Federal government issues voluntary security guidelines. Possible privilege escalation within Google Cloud. An APT compromises JumpCloud. FIN8 reworks its Sardonic backdoor and continues its shift to ransomware. Ben Yelin looks at privacy legislation coming out of Massachusetts. Our guest is Alastair Parr of Prevalent discussing GDPR and third party risk. And some noteworthy Russian cyber crime–they don’t seem to be serving any political masters; they just want to get paid.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/135

Selected reading.
Biden-Harris Administration Announces Cybersecurity Labeling Program for Smart Devices to Protect American Consumers (The White House)
The Biden administration announces a cybersecurity labeling program for smart devices (AP News)CISA Develops Factsheet for Free Tools for Cloud Environments (Cybersecurity and Infrastructure Security Agency CISA)
Free Tools for Cloud Environments (CISA)
NSA, CISA Release Guidance on Security Considerations for 5G Network Slicing (Cybersecurity and Infrastructure Security Agency CISA)
ESF Members NSA and CISA Publish Second Industry Paper on 5G Network Slicing (National Security Agency/Central Security Service)
Bad.Build: A Critical Privilege Escalation Design Flaw in Google Cloud Build Enables a Supply Chain Attack (Orca Security)
Orca: Google Cloud design flaw enables supply chain attacks (Security | TechTarget) 
Google fixes ‘Bad.Build’ vulnerability affecting Cloud Build service (Record)
JumpCloud discloses breach by state-backed APT hacking group (BleepingComputer)
JumpCloud: A 'state-sponsored threat actor' compromised our systems (Computing) 
JumpCloud says nation-state hackers breached its systems | TechCrunch (TechCrunch)
JumpCloud, an IT firm serving 200,000 orgs, says it was hacked by nation-state (Ars Technica)
[Security Update] Incident Details - JumpCloud (JumpCloud)
July 2023 Incident Indicators of Compromise (IoCs) (JumpCloud)
FIN8 Uses Revamped Sardonic Backdoor to Deliver Noberus Ransomware (Symantec by Broadcom)
RedCurl hackers return to spy on 'major Russian bank,' Australian company (Record) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US Federal government issues voluntary security guidelines. Possible privilege escalation within Google Cloud. An APT compromises JumpCloud. FIN8 reworks its Sardonic backdoor and continues its shift to ransomware. Ben Yelin looks at privacy legislation coming out of Massachusetts. Our guest is Alastair Parr of Prevalent discussing GDPR and third party risk. And some noteworthy Russian cyber crime–they don’t seem to be serving any political masters; they just want to get paid.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/135</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/07/18/biden-harris-administration-announces-cybersecurity-labeling-program-for-smart-devices-to-protect-american-consumers/">Biden-Harris Administration Announces Cybersecurity Labeling Program for Smart Devices to Protect American Consumers</a> (The White House)</p><p><a href="https://apnews.com/article/cybersecurity-smart-devices-fcc-cyber-trust-mark-74af5829296ba65cddd2b2287b47422a">The Biden administration announces a cybersecurity labeling program for smart devices</a> (AP News)<a href="https://www.cisa.gov/news-events/alerts/2023/07/17/cisa-develops-factsheet-free-tools-cloud-environments">CISA Develops Factsheet for Free Tools for Cloud Environments</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.cisa.gov/sites/default/files/2023-07/Free%20Tools%20for%20Cloud%20Environments_508c.pdf">Free Tools for Cloud Environments</a> (CISA)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/07/17/nsa-cisa-release-guidance-security-considerations-5g-network-slicing">NSA, CISA Release Guidance on Security Considerations for 5G Network Slicing</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3459888/esf-members-nsa-and-cisa-publish-second-industry-paper-on-5g-network-slicing/">ESF Members NSA and CISA Publish Second Industry Paper on 5G Network Slicing</a> (National Security Agency/Central Security Service)</p><p><a href="https://orca.security/resources/blog/bad-build-google-cloud-build-potential-supply-chain-attack-vulnerability/">Bad.Build: A Critical Privilege Escalation Design Flaw in Google Cloud Build Enables a Supply Chain Attack</a> (Orca Security)</p><p><a href="https://www.techtarget.com/searchsecurity/news/366544710/Orca-Google-Cloud-design-flaw-enables-supply-chain-attacks">Orca: Google Cloud design flaw enables supply chain attacks</a> (Security | TechTarget) </p><p><a href="https://therecord.media/google-fixes-bad-build-vulnerability-cloud-build-service">Google fixes ‘Bad.Build’ vulnerability affecting Cloud Build service</a> (Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/jumpcloud-discloses-breach-by-state-backed-apt-hacking-group/">JumpCloud discloses breach by state-backed APT hacking group</a> (BleepingComputer)</p><p><a href="https://www.computing.co.uk/news/4120325/jumpcloud-sponsored-threat-actor-compromised-systems">JumpCloud: A 'state-sponsored threat actor' compromised our systems </a>(Computing) </p><p><a href="https://techcrunch.com/2023/07/17/jumpcloud-nation-state-breach/">JumpCloud says nation-state hackers breached its systems | TechCrunch</a> (TechCrunch)</p><p><a href="https://arstechnica.com/security/2023/07/jumpcloud-says-nation-state-hacker-breach-targeted-some-of-its-customers/">JumpCloud, an IT firm serving 200,000 orgs, says it was hacked by nation-state</a> (Ars Technica)</p><p><a href="https://jumpcloud.com/blog/security-update-incident-details">[Security Update] Incident Details - JumpCloud</a> (JumpCloud)</p><p><a href="https://jumpcloud.com/support/july-2023-iocs">July 2023 Incident Indicators of Compromise (IoCs)</a> (JumpCloud)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/syssphinx-fin8-backdoor">FIN8 Uses Revamped Sardonic Backdoor to Deliver Noberus Ransomware</a> (Symantec by Broadcom)</p><p><a href="https://therecord.media/redcurl-hackers-russian-bank-australian-company">RedCurl hackers return to spy on 'major Russian bank,' Australian company</a> (Record) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1828</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e17a3152-1f5c-11ee-b1fc-133ddc6c1cc1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5258386125.mp3?updated=1690333800" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Developments in the C2C market. Cyberespionage against Westminster. Notes from Russia’s hybrid war. And don’t take that typo to Timbuktu. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1864/notes</link>
      <description>WormGPT is a new AI threat. TeamTNT seems to be back. Chinese intelligence services actively pursue British MPs. Gamaredon's quick info theft. Russia’s FSB bans Apple devices. The troll farmers of the Internet Research Agency may not yet be down for the count. Anonymous Sudan claims a "demonstration" attack against PayPal, with more to come. Carole Theriault looks at popular email lures. My conversation with N2K president Simone Petrella on the White House’s National Cybersecurity Strategy Implementation Plan. And, friends, don’t take this typo to Timbuktu.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/134

Selected reading.
WormGPT, an "ethics-free" text generator. (CyberWire)
TeamTNT (or someone a lot like them) may be preparing a major campaign. (CyberWire)
Chinese government hackers ‘frequently’ targeting MPs, warns new report (Record) 
Gamaredon hackers start stealing data 30 minutes after a breach (BleepingComputer) 
Russia-linked APT Gamaredon starts stealing data from victims between 30 and 50 minutes after the initial compromise (Security Affairs)
Armageddon in Ukraine – how one Russia-backed hacking group operates (CyberSecurity Connect)
Russian hacking group Armageddon increasingly targets Ukrainian state services (Record)
Russia bans officials from using iPhones in U.S. spying row (Apple Insider)
Prigozhin's Media Companies May Resume Work As Mutiny Fallout Dissipates, FT Reports (Radio Free Europe | Radio Liberty)
Anonymous Sudan claims it hit PayPal with 'warning' DDoS cyberattack (Tech Monitor) 
Typo leaks millions of US military emails to Mali web operator (Financial Times)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 17 Jul 2023 20:15:00 -0000</pubDate>
      <itunes:title>Developments in the C2C market. Cyberespionage against Westminster. Notes from Russia’s hybrid war. And don’t take that typo to Timbuktu. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1864</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>WormGPT is a new AI threat. TeamTNT seems to be back. Chinese intelligence services actively pursue British MPs. Gamaredon's quick info theft. Russia’s FSB bans Apple devices. The troll farmers of the Internet Research Agency may not yet be down for the count. Anonymous Sudan claims a "demonstration" attack against PayPal, with more to come. Carole Theriault looks at popular email lures. My conversation with N2K president Simone Petrella on the White House’s National Cybersecurity Strategy Implementation Plan. And, friends, don’t take this typo to Timbuktu.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/134

Selected reading.
WormGPT, an "ethics-free" text generator. (CyberWire)
TeamTNT (or someone a lot like them) may be preparing a major campaign. (CyberWire)
Chinese government hackers ‘frequently’ targeting MPs, warns new report (Record) 
Gamaredon hackers start stealing data 30 minutes after a breach (BleepingComputer) 
Russia-linked APT Gamaredon starts stealing data from victims between 30 and 50 minutes after the initial compromise (Security Affairs)
Armageddon in Ukraine – how one Russia-backed hacking group operates (CyberSecurity Connect)
Russian hacking group Armageddon increasingly targets Ukrainian state services (Record)
Russia bans officials from using iPhones in U.S. spying row (Apple Insider)
Prigozhin's Media Companies May Resume Work As Mutiny Fallout Dissipates, FT Reports (Radio Free Europe | Radio Liberty)
Anonymous Sudan claims it hit PayPal with 'warning' DDoS cyberattack (Tech Monitor) 
Typo leaks millions of US military emails to Mali web operator (Financial Times)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>WormGPT is a new AI threat. TeamTNT seems to be back. Chinese intelligence services actively pursue British MPs. Gamaredon's quick info theft. Russia’s FSB bans Apple devices. The troll farmers of the Internet Research Agency may not yet be down for the count. Anonymous Sudan claims a "demonstration" attack against PayPal, with more to come. Carole Theriault looks at popular email lures. My conversation with N2K president Simone Petrella on the White House’s National Cybersecurity Strategy Implementation Plan. And, friends, don’t take this typo to Timbuktu.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/134</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/stories/3f8f27f688794b2bbab3fdda2fb5a560/wormgpt-an-ethics-free-text-generator">WormGPT, an "ethics-free" text generator.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/565262964deb42cda32f84f226291db8/teamtnt-or-someone-a-lot-like-them-may-be-preparing-a-major-campaign">TeamTNT (or someone a lot like them) may be preparing a major campaign</a>. (CyberWire)</p><p><a href="https://therecord.media/china-hacking-uk-members-parliament">Chinese government hackers ‘frequently’ targeting MPs, warns new report</a> (Record) </p><p><a href="https://www.bleepingcomputer.com/news/security/gamaredon-hackers-start-stealing-data-30-minutes-after-a-breach/">Gamaredon hackers start stealing data 30 minutes after a breach</a> (BleepingComputer) </p><p><a href="https://securityaffairs.com/148488/apt/gamaredon-ttps.html">Russia-linked APT Gamaredon starts stealing data from victims between 30 and 50 minutes after the initial compromise</a> (Security Affairs)</p><p><a href="https://www.cybersecurityconnect.com.au/industry/9322-armageddon-in-ukraine-how-one-russia-backed-hacking-group-operates">Armageddon in Ukraine – how one Russia-backed hacking group operates</a> (CyberSecurity Connect)</p><p><a href="https://therecord.media/armageddon-gamaredon-russian-hacking-group-increasingly-targeting-ukraine-government">Russian hacking group Armageddon increasingly targets Ukrainian state services</a> (Record)</p><p><a href="https://appleinsider.com/articles/23/07/16/russia-bans-officials-from-using-iphones-in-us-spying-row">Russia bans officials from using iPhones in U.S. spying row</a> (Apple Insider)</p><p><a href="https://www.rferl.org/a/prigozhin-media-companies-resume-work-russia/32505024.html">Prigozhin's Media Companies May Resume Work As Mutiny Fallout Dissipates, FT Reports</a> (Radio Free Europe | Radio Liberty)</p><p><a href="https://techmonitor.ai/technology/cybersecurity/anonymous-sudan-paypal-ddos-cyberattack">Anonymous Sudan claims it hit PayPal with 'warning' DDoS cyberattack</a> (Tech Monitor) </p><p><a href="https://www.ft.com/content/ab62af67-ed2a-42d0-87eb-c762ac163cf0">Typo leaks millions of US military emails to Mali web operator</a> (Financial Times)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1505</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e18eb686-1f5c-11ee-b1fc-9b93f4c8ba77]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5664351771.mp3?updated=1690333783" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jennifer Addie: Finding creative solutions. [COO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/158/notes</link>
      <description>Jennifer Addie, COO and CWO from VentureScope and MACH37 Cyber Accelerator sits down to share her incredible story, bringing creativity into the cyber community. Growing up Jennifer always loved the human side of things, and learning that she had a knack for computers helped her to realize what type of field she wanted to pursue as an adult. She started working jobs dealing in programming, database administration, product development, and it was there in the design of those products where she felt the deep need for security, emerging as critical in her consciousness. She shares how she likes to be on a personal level with the people she works with, always wondering where people came from and why they are passionate, being a very interactive leader. Jennifer also says that she believes bringing creativity into the field is what helps her solve any form of problem the best stating "I absolutely agree with the idea that, that creativity is far more than artistic capability. It is very much centered on problem solving and in fact, the master's degree that I received in creativity focuses on creative problem solving as a process." We thank Jennifer for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 16 Jul 2023 07:00:00 -0000</pubDate>
      <itunes:title>Jennifer Addie: Finding creative solutions. [COO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>158</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Jennifer Addie, COO and CWO from VentureScope and MACH37 Cyber Accelerator sits down to share her incredible story, bringing creativity into the cyber community. Growing up Jennifer always loved the human side of things, and learning that she had a knack for computers helped her to realize what type of field she wanted to pursue as an adult. She started working jobs dealing in programming, database administration, product development, and it was there in the design of those products where she felt the deep need for security, emerging as critical in her consciousness. She shares how she likes to be on a personal level with the people she works with, always wondering where people came from and why they are passionate, being a very interactive leader. Jennifer also says that she believes bringing creativity into the field is what helps her solve any form of problem the best stating "I absolutely agree with the idea that, that creativity is far more than artistic capability. It is very much centered on problem solving and in fact, the master's degree that I received in creativity focuses on creative problem solving as a process." We thank Jennifer for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jennifer Addie, COO and CWO from VentureScope and MACH37 Cyber Accelerator sits down to share her incredible story, bringing creativity into the cyber community. Growing up Jennifer always loved the human side of things, and learning that she had a knack for computers helped her to realize what type of field she wanted to pursue as an adult. She started working jobs dealing in programming, database administration, product development, and it was there in the design of those products where she felt the deep need for security, emerging as critical in her consciousness. She shares how she likes to be on a personal level with the people she works with, always wondering where people came from and why they are passionate, being a very interactive leader. Jennifer also says that she believes bringing creativity into the field is what helps her solve any form of problem the best stating "I absolutely agree with the idea that, that creativity is far more than artistic capability. It is very much centered on problem solving and in fact, the master's degree that I received in creativity focuses on creative problem solving as a process." We thank Jennifer for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>481</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ad1477a2-2285-11ee-b763-73cb5068c408]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9976068546.mp3?updated=1689357609" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SCARLETEEL zaps back again. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/290/notes</link>
      <description>Michael Clark from Sysdig joins with Dave to discuss their research on SCARLETEEL 2.0: Fargate, Kubernetes, and Crypto. New research from Sysdig threat researchers found that the group continues to thrive with improved tactics. Most recently, they gained access to AWS Fargate, a more sophisticated environment to breach, thanks to their upgraded attack tools.
The research states "In their most recent activities, we saw a similar strategy to what was reported in the previous blog: compromise AWS accounts through exploiting vulnerable compute services, gain persistence, and attempt to make money using cryptominers." Had Sysdig not thwarted SCARLETEEL's attack, they estimated that they would have mined $4,000 per day until they were stopped.
The research can be found here:
SCARLETEEL 2.0: Fargate,Kubernetes, and Crypto

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Jul 2023 07:00:00 -0000</pubDate>
      <itunes:title>SCARLETEEL zaps back again. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>290</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Michael Clark from Sysdig joins with Dave to discuss their research on SCARLETEEL 2.0: Fargate, Kubernetes, and Crypto. New research from Sysdig threat researchers found that the group continues to thrive with improved tactics. Most recently, they gained access to AWS Fargate, a more sophisticated environment to breach, thanks to their upgraded attack tools.
The research states "In their most recent activities, we saw a similar strategy to what was reported in the previous blog: compromise AWS accounts through exploiting vulnerable compute services, gain persistence, and attempt to make money using cryptominers." Had Sysdig not thwarted SCARLETEEL's attack, they estimated that they would have mined $4,000 per day until they were stopped.
The research can be found here:
SCARLETEEL 2.0: Fargate,Kubernetes, and Crypto

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Michael Clark from Sysdig joins with Dave to discuss their research on SCARLETEEL 2.0: Fargate, Kubernetes, and Crypto. New research from Sysdig threat researchers found that the group continues to thrive with improved tactics. Most recently, they gained access to AWS Fargate, a more sophisticated environment to breach, thanks to their upgraded attack tools.</p><p>The research states "In their most recent activities, we saw a similar strategy to what was reported in the previous blog: compromise AWS accounts through exploiting vulnerable compute services, gain persistence, and attempt to make money using cryptominers." Had Sysdig not thwarted SCARLETEEL's attack, they estimated that they would have mined $4,000 per day until they were stopped.</p><p>The research can be found here:</p><ul><li><a href="https://sysdig.com/blog/cloud-breach-terraform-data-theft/">SCARLETEEL 2.0: Fargate,Kubernetes, and Crypto</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1042</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bf569a12-2285-11ee-8f06-0f7391819de4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4981747661.mp3?updated=1689270090" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Update on Chinese cyberespionage incident. ICS vulnerabilities. USB attacks. New KEVs. Updates from Russia's hybrid war, as hacktivists swap DDoS attacks and observers draw lessons learned. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1863/notes</link>
      <description>Developments in the case of China's cyberespionage against government Exchange users. Industrial controller vulnerabilities pose a risk to critical infrastructure. USB attacks have risen three-fold in the first half of 2023. CISA adds two vulnerabilities to its Known Exploited Vulnerabilities Catalog. Ghostwriter's continued activity focuses on Poland and Ukraine. Hacktivist auxiliaries swap DDoS attacks. Awais Rashid from University of Bristol shares insights on threat modeling. Our guest is Chris Cochran from Huntress on the challenges small and medium sized businesses face with cyber security. And lessons learned from cyber warfare in Russia's war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/133

Selected reading.
UK says it's working with Microsoft to understand impact of Chinese email hack (Reuters) 
What we know (and don’t know) about the government email breach (Washington Post)
Yet Another MS CVE: Don’t Get Caught In The Storm! (Cynet)
China Hacking Was Undetectable for Some Who Had Less Expensive Microsoft Services (Wall Street Journal)
Security flaws in Honeywell devices could be used to disrupt critical industries (TechCrunch)
APT Exploit Targeting Rockwell Automation Flaws Threatens Critical Infrastructure (SecurityWeek)
Rockwell Automation ControlLogix Bugs Expose Industrial Systems to Remote Attacks (The Hacker News) 
USB drive malware attacks spiking again in first half of 2023 (BleepingComputer)
CISA Adds Two Known Vulnerabilities to Catalog (Cybersecurity and Infrastructure Security Agency CISA)
Malicious campaigns target government, military and civilian entities in Ukraine, Poland (Cisco Talos Blog)
Belarus-linked hacks on Ukraine, Poland began at least a year ago, report says (Record)
Crowdsourced Cyber Warfare: Russia and Ukraine Launch Fresh DDoS Offensives (CEPA).
Cyber Operations during the Russo-Ukrainian War (CSIS)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 14 Jul 2023 20:15:00 -0000</pubDate>
      <itunes:title>Update on Chinese cyberespionage incident. ICS vulnerabilities. USB attacks. New KEVs. Updates from Russia's hybrid war, as hacktivists swap DDoS attacks and observers draw lessons learned. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1863</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Developments in the case of China's cyberespionage against government Exchange users. Industrial controller vulnerabilities pose a risk to critical infrastructure. USB attacks have risen three-fold in the first half of 2023. CISA adds two vulnerabilities to its Known Exploited Vulnerabilities Catalog. Ghostwriter's continued activity focuses on Poland and Ukraine. Hacktivist auxiliaries swap DDoS attacks. Awais Rashid from University of Bristol shares insights on threat modeling. Our guest is Chris Cochran from Huntress on the challenges small and medium sized businesses face with cyber security. And lessons learned from cyber warfare in Russia's war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/133

Selected reading.
UK says it's working with Microsoft to understand impact of Chinese email hack (Reuters) 
What we know (and don’t know) about the government email breach (Washington Post)
Yet Another MS CVE: Don’t Get Caught In The Storm! (Cynet)
China Hacking Was Undetectable for Some Who Had Less Expensive Microsoft Services (Wall Street Journal)
Security flaws in Honeywell devices could be used to disrupt critical industries (TechCrunch)
APT Exploit Targeting Rockwell Automation Flaws Threatens Critical Infrastructure (SecurityWeek)
Rockwell Automation ControlLogix Bugs Expose Industrial Systems to Remote Attacks (The Hacker News) 
USB drive malware attacks spiking again in first half of 2023 (BleepingComputer)
CISA Adds Two Known Vulnerabilities to Catalog (Cybersecurity and Infrastructure Security Agency CISA)
Malicious campaigns target government, military and civilian entities in Ukraine, Poland (Cisco Talos Blog)
Belarus-linked hacks on Ukraine, Poland began at least a year ago, report says (Record)
Crowdsourced Cyber Warfare: Russia and Ukraine Launch Fresh DDoS Offensives (CEPA).
Cyber Operations during the Russo-Ukrainian War (CSIS)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Developments in the case of China's cyberespionage against government Exchange users. Industrial controller vulnerabilities pose a risk to critical infrastructure. USB attacks have risen three-fold in the first half of 2023. CISA adds two vulnerabilities to its Known Exploited Vulnerabilities Catalog. Ghostwriter's continued activity focuses on Poland and Ukraine. Hacktivist auxiliaries swap DDoS attacks. Awais Rashid from University of Bristol shares insights on threat modeling. Our guest is Chris Cochran from Huntress on the challenges small and medium sized businesses face with cyber security. And lessons learned from cyber warfare in Russia's war.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/133</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.reuters.com/technology/uk-says-its-working-with-microsoft-understand-impact-chinese-email-hack-2023-07-13/">UK says it's working with Microsoft to understand impact of Chinese email hack</a> (Reuters) </p><p><a href="https://www.washingtonpost.com/politics/2023/07/14/what-we-know-dont-know-about-government-email-breach/">What we know (and don’t know) about the government email breach</a> (Washington Post)</p><p><a href="https://www.cynet.com/blog/yet-another-ms-cve-dont-get-caught-in-the-storm/">Yet Another MS CVE: Don’t Get Caught In The Storm!</a> (Cynet)</p><p><a href="https://www.wsj.com/articles/china-hacking-was-undetectable-for-some-who-had-less-expensive-microsoft-services-58730629">China Hacking Was Undetectable for Some Who Had Less Expensive Microsoft Services</a> (Wall Street Journal)</p><p><a href="https://techcrunch.com/2023/07/13/security-flaws-in-honeywell-devices-could-be-used-to-disrupt-critical-industries/">Security flaws in Honeywell devices could be used to disrupt critical industries</a> (TechCrunch)</p><p><a href="https://www.securityweek.com/apt-exploit-targeting-rockwell-automation-flaws-could-threaten-critical-infrastructure/">APT Exploit Targeting Rockwell Automation Flaws Threatens Critical Infrastructure</a> (SecurityWeek)</p><p><a href="https://thehackernews.com/2023/07/rockwell-automation-controllogix-bugs.html">Rockwell Automation ControlLogix Bugs Expose Industrial Systems to Remote Attacks</a> (The Hacker News) </p><p><a href="https://www.bleepingcomputer.com/news/security/usb-drive-malware-attacks-spiking-again-in-first-half-of-2023/">USB drive malware attacks spiking again in first half of 2023</a> (BleepingComputer)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/07/13/cisa-adds-two-known-vulnerabilities-catalog">CISA Adds Two Known Vulnerabilities to Catalog</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://blog.talosintelligence.com/malicious-campaigns-target-entities-in-ukraine-poland/">Malicious campaigns target government, military and civilian entities in Ukraine, Poland</a> (Cisco Talos Blog)</p><p><a href="https://therecord.media/poland-ukraine-ghostwriter-attacks-belarus">Belarus-linked hacks on Ukraine, Poland began at least a year ago, report says</a> (Record)</p><p><a href="https://cepa.org/article/russia-ukraine-launch-cyber-offensives/">Crowdsourced Cyber Warfare: Russia and Ukraine Launch Fresh DDoS Offensives</a> (CEPA).</p><p><a href="https://www.csis.org/analysis/cyber-operations-during-russo-ukrainian-war">Cyber Operations during the Russo-Ukrainian War</a> (CSIS)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1852</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e123d442-1f5c-11ee-b1fc-b727e46df73d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2850231510.mp3?updated=1690333323" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Taking steps to stop a Chinese APT. Implementing the US National Cybersecurity Strategy. LokiBot is back. Malware masquerading as a proof-of-concept. Swapping cyber ops in a hybrid war.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1862/notes</link>
      <description>CISA and the FBI issue a joint Cybersecurity Advisory on exploitation of Microsoft Exchange Online. Implementing the US National Cybersecurity Strategy. FortiGuard discovers a new LokiBot campaign. Training code turns out to be malicious in a new proof-of-concept attack discovered on GitHub. Russia resumes its pursuit of a "sovereign Internet." The GRU's offensive cyber tactics. Chris Novak from Verizon discusses business email compromise and the 2023 DBIR. Our guest is Joy Beland of Summit 7 on the role of Managed Service Providers in the supply chain to the Defense Industrial Base. And a probable Ukrainian false-flag operation.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/132

Selected reading.
CISA and FBI Release Cybersecurity Advisory on Enhanced Monitoring to Detect APT Activity Targeting Outlook Online (Cybersecurity and Infrastructure Security Agency CISA)
Enhanced Monitoring to Detect APT Activity Targeting Outlook Online (Cybersecurity and Infrastructure Security Agency CISA)
How a Cloud Flaw Gave Chinese Spies a Key to Microsoft’s Kingdom (WIRED)
Chinese hackers breached U.S. and European government email through Microsoft bug (Record)
FACT SHEET: Biden-Harris Administration Publishes the National Cybersecurity Strategy Implementation Plan | The White House (The White House)
National Cybersecurity Strategy Implementation Plan (White House)
LokiBot Campaign Targets Microsoft Office Document Using Vulnerabilities and Macros (Fortinet Blog)
New PoC Exploit Found: Fake Proof of Concept with Backdoor Malware (Uptycs)
Russia Is Trying to Leave the Internet and Build Its Own (Scientific American)
The GRU's Disruptive Playbook (Mandiant) 
Hack Blamed on Wagner Group Had Another Culprit, Experts Say (Bloomberg) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 13 Jul 2023 20:15:00 -0000</pubDate>
      <itunes:title>Taking steps to stop a Chinese APT. Implementing the US National Cybersecurity Strategy. LokiBot is back. Malware masquerading as a proof-of-concept. Swapping cyber ops in a hybrid war.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1862</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA and the FBI issue a joint Cybersecurity Advisory on exploitation of Microsoft Exchange Online. Implementing the US National Cybersecurity Strategy. FortiGuard discovers a new LokiBot campaign. Training code turns out to be malicious in a new proof-of-concept attack discovered on GitHub. Russia resumes its pursuit of a "sovereign Internet." The GRU's offensive cyber tactics. Chris Novak from Verizon discusses business email compromise and the 2023 DBIR. Our guest is Joy Beland of Summit 7 on the role of Managed Service Providers in the supply chain to the Defense Industrial Base. And a probable Ukrainian false-flag operation.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/132

Selected reading.
CISA and FBI Release Cybersecurity Advisory on Enhanced Monitoring to Detect APT Activity Targeting Outlook Online (Cybersecurity and Infrastructure Security Agency CISA)
Enhanced Monitoring to Detect APT Activity Targeting Outlook Online (Cybersecurity and Infrastructure Security Agency CISA)
How a Cloud Flaw Gave Chinese Spies a Key to Microsoft’s Kingdom (WIRED)
Chinese hackers breached U.S. and European government email through Microsoft bug (Record)
FACT SHEET: Biden-Harris Administration Publishes the National Cybersecurity Strategy Implementation Plan | The White House (The White House)
National Cybersecurity Strategy Implementation Plan (White House)
LokiBot Campaign Targets Microsoft Office Document Using Vulnerabilities and Macros (Fortinet Blog)
New PoC Exploit Found: Fake Proof of Concept with Backdoor Malware (Uptycs)
Russia Is Trying to Leave the Internet and Build Its Own (Scientific American)
The GRU's Disruptive Playbook (Mandiant) 
Hack Blamed on Wagner Group Had Another Culprit, Experts Say (Bloomberg) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA and the FBI issue a joint Cybersecurity Advisory on exploitation of Microsoft Exchange Online. Implementing the US National Cybersecurity Strategy. FortiGuard discovers a new LokiBot campaign. Training code turns out to be malicious in a new proof-of-concept attack discovered on GitHub. Russia resumes its pursuit of a "sovereign Internet." The GRU's offensive cyber tactics. Chris Novak from Verizon discusses business email compromise and the 2023 DBIR. Our guest is Joy Beland of Summit 7 on the role of Managed Service Providers in the supply chain to the Defense Industrial Base. And a probable Ukrainian false-flag operation.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/132</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/news-events/alerts/2023/07/12/cisa-and-fbi-release-cybersecurity-advisory-enhanced-monitoring-detect-apt-activity-targeting">CISA and FBI Release Cybersecurity Advisory on Enhanced Monitoring to Detect APT Activity Targeting Outlook Online</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-193a">Enhanced Monitoring to Detect APT Activity Targeting Outlook Online</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.wired.com/story/microsoft-cloud-attack-china-hackers/">How a Cloud Flaw Gave Chinese Spies a Key to Microsoft’s Kingdom</a> (WIRED)</p><p><a href="https://therecord.media/chinese-hackers-breached-us-and-european-governments">Chinese hackers breached U.S. and European government email through Microsoft bug</a> (Record)</p><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/07/13/fact-sheet-biden-harrisadministration-publishes-thenational-cybersecurity-strategyimplementation-plan/">FACT SHEET: Biden-Harris Administration Publishes the National Cybersecurity Strategy Implementation Plan | The White House</a> (The White House)</p><p><a href="https://www.whitehouse.gov/wp-content/uploads/2023/07/National-Cybersecurity-Strategy-Implementation-Plan-WH.gov_.pdf">National Cybersecurity Strategy Implementation Plan</a> (White House)</p><p><a href="https://www.fortinet.com/blog/threat-research/lokibot-targets-microsoft-office-document-using-vulnerabilities-and-macros">LokiBot Campaign Targets Microsoft Office Document Using Vulnerabilities and Macros</a> (Fortinet Blog)</p><p><a href="https://www.uptycs.com/blog/new-poc-exploit-backdoor-malware">New PoC Exploit Found: Fake Proof of Concept with Backdoor Malware</a> (Uptycs)</p><p><a href="https://www.scientificamerican.com/article/russia-is-trying-to-leave-the-internet-and-build-its-own/">Russia Is Trying to Leave the Internet and Build Its Own</a> (Scientific American)</p><p><a href="https://www.mandiant.com/resources/blog/gru-disruptive-playbook">The GRU's Disruptive Playbook</a> (Mandiant) </p><p><a href="https://www.bloomberg.com/news/newsletters/2023-07-12/hack-blamed-on-wagner-group-had-another-culprit-experts-say">Hack Blamed on Wagner Group Had Another Culprit, Experts Say</a> (Bloomberg) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1938</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e10ebb70-1f5c-11ee-b1fc-db1002d46d44]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1291551949.mp3?updated=1690333726" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage and used car salesmen. Email extortion through embarrassment, not encryption. The personal is the professional. And a look back at Patch Tuesday.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1861/notes</link>
      <description>A Chinese threat actor hits US organizations with a Microsoft cloud exploit. Open source tools allow threat actors to exploit a loophole in Microsoft's kernel driver authentication procedures. A RomCom update. Beamer phishbait, email extortion attacks and digital blackmail. A new report concludes companies allowing personal employee devices onto their network are opening themselves to attack. Tim Starks from the Washington Post looks at Microsoft’s recent woes. Our guest is Eyal Benishti from IRONSCALES with insights on business email compromise. And a July Patch Tuesday retrospective.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/131

Selected reading.
Mitigation for China-Based Threat Actor Activity (Microsoft On the Issues)
Microsoft mitigates China-based threat actor Storm-0558 targeting of customer email (Microsoft Security Response Center)
Chinese hackers breach U.S. government email through Microsoft cloud (Washington Post) 
U.S. Government Emails Hacked in Suspected Chinese Espionage Campaign (Wall Street Journal)
Old certificate, new signature: Open-source tools forge signature timestamps on Windows drivers (Cisco Talos Blog)
Storm-0978 attacks reveal financial and espionage motives (Microsoft Security) 
Microsoft: Unpatched Office zero-day exploited in NATO summit attacks (BleepingComputer) 
Diplomats Beware: Cloaked Ursa Phishing With a Twist (Unit 42)
Russian hackers lured embassy workers in Ukraine with ad for a cheap BMW (Reuters)
Threat spotlight: Extortion attacks (Barracuda)
The SpyCloud Malware Readiness And Defense Report (SpyCloud)
July 2023 Security Updates (Security Update Guide - Microsoft Security Response Center)
Microsoft Releases July 2023 Security Updates (Cybersecurity and Infrastructure Security Agency CISA) 
Microsoft July 2023 Patch Tuesday warns of 6 zero-days, 132 flaws (BleepingComputer) 
Fortinet Releases Security Update for FortiOS and FortiProxy (Cybersecurity and Infrastructure Security Agency CISA)
Adobe Releases Security Updates for ColdFusion and InDesign (Cybersecurity and Infrastructure Security Agency CISA) 
Apple's Rapid Security Response Patches Causing Website Access Issues (SecurityWeek) 
SAP Security Patch Day – July 2023 (SAP)
Return of the ICMAD Critical Vulnerabilities in 2023 (Onapsis)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 12 Jul 2023 20:15:00 -0000</pubDate>
      <itunes:title>Cyberespionage and used car salesmen. Email extortion through embarrassment, not encryption. The personal is the professional. And a look back at Patch Tuesday.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1861</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A Chinese threat actor hits US organizations with a Microsoft cloud exploit. Open source tools allow threat actors to exploit a loophole in Microsoft's kernel driver authentication procedures. A RomCom update. Beamer phishbait, email extortion attacks and digital blackmail. A new report concludes companies allowing personal employee devices onto their network are opening themselves to attack. Tim Starks from the Washington Post looks at Microsoft’s recent woes. Our guest is Eyal Benishti from IRONSCALES with insights on business email compromise. And a July Patch Tuesday retrospective.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/131

Selected reading.
Mitigation for China-Based Threat Actor Activity (Microsoft On the Issues)
Microsoft mitigates China-based threat actor Storm-0558 targeting of customer email (Microsoft Security Response Center)
Chinese hackers breach U.S. government email through Microsoft cloud (Washington Post) 
U.S. Government Emails Hacked in Suspected Chinese Espionage Campaign (Wall Street Journal)
Old certificate, new signature: Open-source tools forge signature timestamps on Windows drivers (Cisco Talos Blog)
Storm-0978 attacks reveal financial and espionage motives (Microsoft Security) 
Microsoft: Unpatched Office zero-day exploited in NATO summit attacks (BleepingComputer) 
Diplomats Beware: Cloaked Ursa Phishing With a Twist (Unit 42)
Russian hackers lured embassy workers in Ukraine with ad for a cheap BMW (Reuters)
Threat spotlight: Extortion attacks (Barracuda)
The SpyCloud Malware Readiness And Defense Report (SpyCloud)
July 2023 Security Updates (Security Update Guide - Microsoft Security Response Center)
Microsoft Releases July 2023 Security Updates (Cybersecurity and Infrastructure Security Agency CISA) 
Microsoft July 2023 Patch Tuesday warns of 6 zero-days, 132 flaws (BleepingComputer) 
Fortinet Releases Security Update for FortiOS and FortiProxy (Cybersecurity and Infrastructure Security Agency CISA)
Adobe Releases Security Updates for ColdFusion and InDesign (Cybersecurity and Infrastructure Security Agency CISA) 
Apple's Rapid Security Response Patches Causing Website Access Issues (SecurityWeek) 
SAP Security Patch Day – July 2023 (SAP)
Return of the ICMAD Critical Vulnerabilities in 2023 (Onapsis)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Chinese threat actor hits US organizations with a Microsoft cloud exploit. Open source tools allow threat actors to exploit a loophole in Microsoft's kernel driver authentication procedures. A RomCom update. Beamer phishbait, email extortion attacks and digital blackmail. A new report concludes companies allowing personal employee devices onto their network are opening themselves to attack. Tim Starks from the Washington Post looks at Microsoft’s recent woes. Our guest is Eyal Benishti from IRONSCALES with insights on business email compromise. And a July Patch Tuesday retrospective.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/131</p><p><br></p><h2>Selected reading.</h2><p><a href="https://blogs.microsoft.com/on-the-issues/2023/07/11/mitigation-china-based-threat-actor/">Mitigation for China-Based Threat Actor Activity</a> (Microsoft On the Issues)</p><p><a href="https://msrc.microsoft.com/blog/2023/07/microsoft-mitigates-china-based-threat-actor-storm-0558-targeting-of-customer-email/">Microsoft mitigates China-based threat actor Storm-0558 targeting of customer email</a> (Microsoft Security Response Center)</p><p><a href="https://www.washingtonpost.com/national-security/2023/07/12/microsoft-hack-china/">Chinese hackers breach U.S. government email through Microsoft cloud</a> (Washington Post) </p><p><a href="https://www.wsj.com/articles/u-s-government-emails-hacked-in-suspected-chinese-espionage-campaign-f4fa8de6">U.S. Government Emails Hacked in Suspected Chinese Espionage Campaign</a> (Wall Street Journal)</p><p><a href="https://blog.talosintelligence.com/old-certificate-new-signature/">Old certificate, new signature: Open-source tools forge signature timestamps on Windows drivers</a> (Cisco Talos Blog)</p><p><a href="https://www.microsoft.com/en-us/security/blog/2023/07/11/storm-0978-attacks-reveal-financial-and-espionage-motives/">Storm-0978 attacks reveal financial and espionage motives</a> (Microsoft Security) </p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-unpatched-office-zero-day-exploited-in-nato-summit-attacks/">Microsoft: Unpatched Office zero-day exploited in NATO summit attacks</a> (BleepingComputer) </p><p><a href="https://unit42.paloaltonetworks.com/cloaked-ursa-phishing/">Diplomats Beware: Cloaked Ursa Phishing With a Twist</a> (Unit 42)</p><p><a href="https://www.reuters.com/world/europe/russian-hackers-lured-embassy-workers-ukraine-with-an-ad-cheap-bmw-2023-07-12/">Russian hackers lured embassy workers in Ukraine with ad for a cheap BMW</a> (Reuters)</p><p><a href="https://blog.barracuda.com/2023/07/12/threat-spotlight-extortion-attacks/">Threat spotlight: Extortion attacks</a> (Barracuda)</p><p><a href="https://spycloud.com/resource/2023-malware-readiness-and-defense-report/">The SpyCloud Malware Readiness And Defense Report</a> (SpyCloud)</p><p><a href="https://msrc.microsoft.com/update-guide/releaseNote/2023-Jul">July 2023 Security Updates</a> (Security Update Guide - Microsoft Security Response Center)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/07/11/microsoft-releases-july-2023-security-updates">Microsoft Releases July 2023 Security Updates</a> (Cybersecurity and Infrastructure Security Agency CISA) </p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-july-2023-patch-tuesday-warns-of-6-zero-days-132-flaws/">Microsoft July 2023 Patch Tuesday warns of 6 zero-days, 132 flaws</a> (BleepingComputer) </p><p><a href="https://www.cisa.gov/news-events/alerts/2023/07/11/fortinet-releases-security-update-fortios-and-fortiproxy">Fortinet Releases Security Update for FortiOS and FortiProxy</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/07/11/adobe-releases-security-updates-coldfusion-and-indesign">Adobe Releases Security Updates for ColdFusion and InDesign</a> (Cybersecurity and Infrastructure Security Agency CISA) </p><p><a href="https://www.securityweek.com/apples-rapid-security-response-patches-are-breaking-websites/">Apple's Rapid Security Response Patches Causing Website Access Issues</a> (SecurityWeek) </p><p><a href="https://blogs.sap.com/2023/07/11/sap-security-patch-day-july-2023/">SAP Security Patch Day – July 2023</a> (SAP)</p><p><a href="https://onapsis.com/blog/return-of-icmad-vulnerablities">Return of the ICMAD Critical Vulnerabilities in 2023</a> (Onapsis)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1953</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e0f872b6-1f5c-11ee-b1fc-2321e24b0f71]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7807653145.mp3?updated=1690333688" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Collective defense in cyberspace.  Notes on gangs, privateers, and hacktivist auxiliaries. Amazon Prime Day is now a commercial holiday (like Black Friday): crooks have noticed–stay safe. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1860/notes</link>
      <description>NATO considers Article 5 in cyberspace, while Cyberattacks conducted in the Russian interest target the NATO summit. Anonymous Sudan remains a nuisance-level irritant. Cl0p's surprising use of MOVEit exploits. Asylum Ambuscade is a case study in privateering. There are reports of a breach at Razer. An indictment in a cyber incident at a California water treatment facility. Genesis Market's fire sale. Carole Theriault on the data Amazon customers provide with some suggestions on curbing it. Our guest is Dmitry Bestuzhev, senior director in Cyber Threat Intelligence for Blackberry. And Amazon Prime Day is upon us–the crooks have noticed.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/130

Selected reading.
A Cybersecurity Wish List Ahead of NATO Summit (SecurityWeek)
NATO’s Christian-Marc Lifländer on how the alliance can take a ‘proactive’ cyber stance (Record)
Ukraine has set the standard on software power (POLITICO)
RomCom Threat Actor Suspected of Targeting Ukraine's NATO Membership Talks at the NATO Summit (BlackBerry)
Threat group testing more sophisticated DDoS hacks, authorities warn (Cybersecurity Dive)
Move It on Over: Reflecting on the MOVEit Exploitation (Huntress)
Cl0p has yet to deploy ransomware while exploiting MOVEit zero-day (SC Media) 
Asylum Ambuscade: crimeware or cyberespionage? (WeLiveSecurity)
Crimeware Group Asylum Ambuscade Ventures Into Cyber-Espionage (Infosecurity Magazine)
Razer investigates data breach claims, resets user sessions (BleepingComputer) 
Razer Data Breach: Alleged Database and Backend Access Sold for $100k (HackRead)
Alleged Razer data breach: Hacker demands US$100K in crypto in exchange for stolen data (Vulcan Post)
Razer gets pwned as hackers steal source code (Cyber Security Connect) 
Razer Cyber Attack: Gaming Hardware Giant Faces Data Breach (The Cyber Express) 
Amazon Prime Day: Buyers Beware of Phishing Campaigns Targeting Online Shoppers (Veriti)
Tracy Resident Charged With Computer Attack On Discovery Bay Water Treatment Facility (US Attorney for the Northern District of California)
Tracy man indicted for illegally accessing water treatment network (CBS News)
Technician Indicted for Hacking California Water Treatment Facility (HackRead)
Tracy Man Charged With Computer Attack On Discovery Bay Water Treatment Facility (Contra Costa News) 
Genesis Market gang tries to sell platform after FBI disruption (Record) 
Amazon Prime Day: Buyers Beware of Phishing Campaigns Targeting Online Shoppers (Veriti) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Jul 2023 20:15:00 -0000</pubDate>
      <itunes:title>Collective defense in cyberspace.  Notes on gangs, privateers, and hacktivist auxiliaries. Amazon Prime Day is now a commercial holiday (like Black Friday): crooks have noticed–stay safe. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1860</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>NATO considers Article 5 in cyberspace, while Cyberattacks conducted in the Russian interest target the NATO summit. Anonymous Sudan remains a nuisance-level irritant. Cl0p's surprising use of MOVEit exploits. Asylum Ambuscade is a case study in privateering. There are reports of a breach at Razer. An indictment in a cyber incident at a California water treatment facility. Genesis Market's fire sale. Carole Theriault on the data Amazon customers provide with some suggestions on curbing it. Our guest is Dmitry Bestuzhev, senior director in Cyber Threat Intelligence for Blackberry. And Amazon Prime Day is upon us–the crooks have noticed.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/130

Selected reading.
A Cybersecurity Wish List Ahead of NATO Summit (SecurityWeek)
NATO’s Christian-Marc Lifländer on how the alliance can take a ‘proactive’ cyber stance (Record)
Ukraine has set the standard on software power (POLITICO)
RomCom Threat Actor Suspected of Targeting Ukraine's NATO Membership Talks at the NATO Summit (BlackBerry)
Threat group testing more sophisticated DDoS hacks, authorities warn (Cybersecurity Dive)
Move It on Over: Reflecting on the MOVEit Exploitation (Huntress)
Cl0p has yet to deploy ransomware while exploiting MOVEit zero-day (SC Media) 
Asylum Ambuscade: crimeware or cyberespionage? (WeLiveSecurity)
Crimeware Group Asylum Ambuscade Ventures Into Cyber-Espionage (Infosecurity Magazine)
Razer investigates data breach claims, resets user sessions (BleepingComputer) 
Razer Data Breach: Alleged Database and Backend Access Sold for $100k (HackRead)
Alleged Razer data breach: Hacker demands US$100K in crypto in exchange for stolen data (Vulcan Post)
Razer gets pwned as hackers steal source code (Cyber Security Connect) 
Razer Cyber Attack: Gaming Hardware Giant Faces Data Breach (The Cyber Express) 
Amazon Prime Day: Buyers Beware of Phishing Campaigns Targeting Online Shoppers (Veriti)
Tracy Resident Charged With Computer Attack On Discovery Bay Water Treatment Facility (US Attorney for the Northern District of California)
Tracy man indicted for illegally accessing water treatment network (CBS News)
Technician Indicted for Hacking California Water Treatment Facility (HackRead)
Tracy Man Charged With Computer Attack On Discovery Bay Water Treatment Facility (Contra Costa News) 
Genesis Market gang tries to sell platform after FBI disruption (Record) 
Amazon Prime Day: Buyers Beware of Phishing Campaigns Targeting Online Shoppers (Veriti) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>NATO considers Article 5 in cyberspace, while Cyberattacks conducted in the Russian interest target the NATO summit. Anonymous Sudan remains a nuisance-level irritant. Cl0p's surprising use of MOVEit exploits. Asylum Ambuscade is a case study in privateering. There are reports of a breach at Razer. An indictment in a cyber incident at a California water treatment facility. Genesis Market's fire sale. Carole Theriault on the data Amazon customers provide with some suggestions on curbing it. Our guest is Dmitry Bestuzhev, senior director in Cyber Threat Intelligence for Blackberry. And Amazon Prime Day is upon us–the crooks have noticed.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/130</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.securityweek.com/a-cybersecurity-wish-list-ahead-of-nato-summit/">A Cybersecurity Wish List Ahead of NATO Summit</a> (SecurityWeek)</p><p><a href="https://therecord.media/christian-marc-liflander-on-nato-cyber-defense">NATO’s Christian-Marc Lifländer on how the alliance can take a ‘proactive’ cyber stance</a> (Record)</p><p><a href="https://www.politico.eu/article/ukraine-has-set-the-standard-on-software-power-russia-war/amp/">Ukraine has set the standard on software power</a> (POLITICO)</p><p><a href="https://blogs.blackberry.com/en/2023/07/romcom-targets-ukraine-nato-membership-talks-at-nato-summit">RomCom Threat Actor Suspected of Targeting Ukraine's NATO Membership Talks at the NATO Summit</a> (BlackBerry)</p><p><a href="https://www.cybersecuritydive.com/news/cisa-researchers-warn-ddos-attacks/685990/">Threat group testing more sophisticated DDoS hacks, authorities warn</a> (Cybersecurity Dive)</p><p><a href="https://www.huntress.com/blog/move-it-on-over-reflecting-on-the-moveit-exploitation">Move It on Over: Reflecting on the MOVEit Exploitation</a> (Huntress)</p><p><a href="https://www.scmagazine.com/news/ransomware/cl0p-has-yet-to-deploy-ransomware-while-exploiting-moveit-zero-day">Cl0p has yet to deploy ransomware while exploiting MOVEit zero-day</a> (SC Media) </p><p><a href="https://www.welivesecurity.com/2023/06/08/asylum-ambuscade-crimeware-or-cyberespionage/">Asylum Ambuscade: crimeware or cyberespionage?</a> (WeLiveSecurity)</p><p><a href="https://www.infosecurity-magazine.com/news/crimeware-asylum-ambuscade-cyber/">Crimeware Group Asylum Ambuscade Ventures Into Cyber-Espionage</a> (Infosecurity Magazine)</p><p><a href="https://www.bleepingcomputer.com/news/security/razer-investigates-data-breach-claims-resets-user-sessions/">Razer investigates data breach claims, resets user sessions</a> (BleepingComputer) </p><p><a href="https://www.hackread.com/razer-data-breach-database-backend-access-sold/">Razer Data Breach: Alleged Database and Backend Access Sold for $100k</a> (HackRead)</p><p><a href="https://vulcanpost.com/832994/razer-potential-breach-hacker-demands-us100k-in-crypto/">Alleged Razer data breach: Hacker demands US$100K in crypto in exchange for stolen data</a> (Vulcan Post)</p><p><a href="https://www.cybersecurityconnect.com.au/commercial/9296-razer-gets-pwned-as-hackers-steal-source-code">Razer gets pwned as hackers steal source code</a> (Cyber Security Connect) </p><p><a href="https://thecyberexpress.com/razer-cyber-attack-potential-data-breach/">Razer Cyber Attack: Gaming Hardware Giant Faces Data Breach</a> (The Cyber Express) </p><p><a href="https://veriti.ai/blog/amazon-prime-day-a-buyers-guide-to-avoiding-phishing-campaigns/">Amazon Prime Day: Buyers Beware of Phishing Campaigns Targeting Online Shoppers</a> (Veriti)</p><p><a href="https://www.justice.gov/usao-ndca/pr/tracy-resident-charged-computer-attack-discovery-bay-water-treatment-facility">Tracy Resident Charged With Computer Attack On Discovery Bay Water Treatment Facility</a> (US Attorney for the Northern District of California)</p><p><a href="https://www.cbsnews.com/sanfrancisco/news/tracy-man-indicted-for-illegally-accessing-water-treatment-network/">Tracy man indicted for illegally accessing water treatment network</a> (CBS News)</p><p><a href="https://www.hackread.com/hacking-california-water-treatment-facility/">Technician Indicted for Hacking California Water Treatment Facility</a> (HackRead)</p><p><a href="https://contracosta.news/2023/07/09/tracy-man-charged-with-computer-attack-on-discovery-bay-water-treatment-facility/">Tracy Man Charged With Computer Attack On Discovery Bay Water Treatment Facility</a> (Contra Costa News) </p><p><a href="https://therecord.media/genesis-market-fraud-platform-for-sale-dark-web">Genesis Market gang tries to sell platform after FBI disruption</a> (Record) </p><p><a href="https://veriti.ai/blog/amazon-prime-day-a-buyers-guide-to-avoiding-phishing-campaigns/">Amazon Prime Day: Buyers Beware of Phishing Campaigns Targeting Online Shoppers</a> (Veriti) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1639</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e0e09dbc-1f5c-11ee-b1fc-bb8bb6f6caa9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8388451036.mp3?updated=1690333670" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New phishing campaigns hit Microsoft 365 and Adobe users. Big Head ransomware. Multichain bridge compromised. CISA adds a KEV. Progress patches MOVEit. Telegram's role in Russia's war. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1859/notes</link>
      <description>New phishing campaigns afflict users of Microsoft 365 and Adobe. An analysis of Big Head ransomware. Multichain reports a crypto heist with over $100 million stolen. CISA makes an addition to the Known Exploited Vulnerability Catalog. Progress Software issues additional MOVEit patches. The FBI’s Deputy Assistant Director for Cyber Cynthia Kaiser joins us with examples of the agency’s technical disruption operations. Our guest is Scott Piper Principal Cloud Security Researcher at Wiz sharing findings of their State of the Cloud 2023 report. And Telegram's role in news about Russia's war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/129

Selected reading.
M365 Phishing Email Analysis – eevilcorp (Vade Secure)
New Phishing Attack Spoofs Microsoft 365 Authentication System (HackRead)
Tailing Big Head Ransomware’s Variants, Tactics, and Impact (Trend Micro)
New ‘Big Head’ ransomware displays fake Windows update alert (BleepingComputer)
Unfolding Cybersecurity Crisis: Aptos Network and Multichain Face Cyber-Attacks (CryptoMode)
More than $125 million taken from crypto platform Multichain (Record)
Exploit of Fantom, Moonriver and Dogechain Crypto Bridges Confirmed by Multichain Team (CoinDesk)
CISA Adds One Known Vulnerability to Catalog (CISA)
Google patches 43 Android Vulnerabilities Including 3 actively exploited zero-days (Cyber Security News) 
Progress Software Releases Service Pack for MOVEit Transfer Vulnerabilities (CISA)
After Zero-Day Attacks, MOVEit Turns to Security Service Packs (SecurityWeek)
Killnet as a private military hacking company? For now, it's probably just a dream (Record)
Telegram has become a window into war (The Verge)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 10 Jul 2023 20:15:00 -0000</pubDate>
      <itunes:title>New phishing campaigns hit Microsoft 365 and Adobe users. Big Head ransomware. Multichain bridge compromised. CISA adds a KEV. Progress patches MOVEit. Telegram's role in Russia's war. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1859</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>New phishing campaigns afflict users of Microsoft 365 and Adobe. An analysis of Big Head ransomware. Multichain reports a crypto heist with over $100 million stolen. CISA makes an addition to the Known Exploited Vulnerability Catalog. Progress Software issues additional MOVEit patches. The FBI’s Deputy Assistant Director for Cyber Cynthia Kaiser joins us with examples of the agency’s technical disruption operations. Our guest is Scott Piper Principal Cloud Security Researcher at Wiz sharing findings of their State of the Cloud 2023 report. And Telegram's role in news about Russia's war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/129

Selected reading.
M365 Phishing Email Analysis – eevilcorp (Vade Secure)
New Phishing Attack Spoofs Microsoft 365 Authentication System (HackRead)
Tailing Big Head Ransomware’s Variants, Tactics, and Impact (Trend Micro)
New ‘Big Head’ ransomware displays fake Windows update alert (BleepingComputer)
Unfolding Cybersecurity Crisis: Aptos Network and Multichain Face Cyber-Attacks (CryptoMode)
More than $125 million taken from crypto platform Multichain (Record)
Exploit of Fantom, Moonriver and Dogechain Crypto Bridges Confirmed by Multichain Team (CoinDesk)
CISA Adds One Known Vulnerability to Catalog (CISA)
Google patches 43 Android Vulnerabilities Including 3 actively exploited zero-days (Cyber Security News) 
Progress Software Releases Service Pack for MOVEit Transfer Vulnerabilities (CISA)
After Zero-Day Attacks, MOVEit Turns to Security Service Packs (SecurityWeek)
Killnet as a private military hacking company? For now, it's probably just a dream (Record)
Telegram has become a window into war (The Verge)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>New phishing campaigns afflict users of Microsoft 365 and Adobe. An analysis of Big Head ransomware. Multichain reports a crypto heist with over $100 million stolen. CISA makes an addition to the Known Exploited Vulnerability Catalog. Progress Software issues additional MOVEit patches. The FBI’s Deputy Assistant Director for Cyber Cynthia Kaiser joins us with examples of the agency’s technical disruption operations. Our guest is Scott Piper Principal Cloud Security Researcher at Wiz sharing findings of their State of the Cloud 2023 report. And Telegram's role in news about Russia's war.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/129</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.vadesecure.com/en/blog/m365-phishing-email-analysis-eevilcorp">M365 Phishing Email Analysis – eevilcorp</a> (Vade Secure)</p><p><a href="https://www.hackread.com/phishing-attack-microsoft-365-authentication/">New Phishing Attack Spoofs Microsoft 365 Authentication System</a> (HackRead)</p><p><a href="https://www.trendmicro.com/en_us/research/23/g/tailing-big-head-ransomware-variants-tactics-and-impact.html">Tailing Big Head Ransomware’s Variants, Tactics, and Impact</a> (Trend Micro)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-big-head-ransomware-displays-fake-windows-update-alert/">New ‘Big Head’ ransomware displays fake Windows update alert</a> (BleepingComputer)</p><p><a href="https://cryptomode.com/unfolding-cybersecurity-crisis-aptos-network-and-multichain-face-cyber-attacks/">Unfolding Cybersecurity Crisis: Aptos Network and Multichain Face Cyber-Attacks</a> (CryptoMode)</p><p><a href="https://therecord.media/millions-stolen-from-multichain-crypto">More than $125 million taken from crypto platform Multichain</a> (Record)</p><p><a href="https://www.coindesk.com/tech/2023/07/07/multichain-team-confirms-exploit-across-fantom-moonriver-and-dogechain-bridges/">Exploit of Fantom, Moonriver and Dogechain Crypto Bridges Confirmed by Multichain Team</a> (CoinDesk)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/07/07/cisa-adds-one-known-vulnerability-catalog">CISA Adds One Known Vulnerability to Catalog</a> (CISA)</p><p><a href="https://cybersecuritynews.com/43-android-vulnerabilities/">Google patches 43 Android Vulnerabilities Including 3 actively exploited zero-days</a> (Cyber Security News) </p><p><a href="https://www.cisa.gov/news-events/alerts/2023/07/07/progress-software-releases-service-pack-moveit-transfer-vulnerabilities">Progress Software Releases Service Pack for MOVEit Transfer Vulnerabilities</a> (CISA)</p><p><a href="https://www.securityweek.com/after-zero-day-attacks-moveit-turns-to-security-service-packs/">After Zero-Day Attacks, MOVEit Turns to Security Service Packs</a> (SecurityWeek)</p><p><a href="https://therecord.media/killnet-cybercrime-group-russia-kremlin-hacking-company">Killnet as a private military hacking company? For now, it's probably just a dream</a> (Record)</p><p><a href="https://www.theverge.com/">Telegram has become a window into war</a> (The Verge)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1875</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[22462e84-1f58-11ee-9555-db8bc4ab27b5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3802978936.mp3?updated=1690333658" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Eric Tillman: A creative way into cyber. [Intelligence] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/157/notes</link>
      <description>Eric Tillman, Chief Intelligence Officer at N2K Networks sits down and shares his incredibly creative journey. Eric loved being creative from a young age. When he started to think about a career he wanted to incorporate his love of creativity into his love for tech and turn it into an intelligence career. Eric started by joining the Navy, which set him on this path to work in cyber where he shared his talents with several big companies, including, Booz Allen Hamilton, Lockheed Martin, and Okta, eventually ending up at our very own N2K Networks. Eric shares the advice that there is something for everyone in this field, and even though he wanted to start his journey in a creative way, he found that combining his love for tech and art helped him to pave the way to where he is now. He says " A lot of people get here from a very technical background and um, it really almost doesn't matter um, where you came from, there is something in cybersecurity that takes advantage of the skills that you bring to the table and, um, either way, there's plenty of room here for everyone." We thank Eric for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 09 Jul 2023 07:00:00 -0000</pubDate>
      <itunes:title>Eric Tillman: A creative way into cyber. [Intelligence] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>157</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Eric Tillman, Chief Intelligence Officer at N2K Networks sits down and shares his incredibly creative journey. Eric loved being creative from a young age. When he started to think about a career he wanted to incorporate his love of creativity into his love for tech and turn it into an intelligence career. Eric started by joining the Navy, which set him on this path to work in cyber where he shared his talents with several big companies, including, Booz Allen Hamilton, Lockheed Martin, and Okta, eventually ending up at our very own N2K Networks. Eric shares the advice that there is something for everyone in this field, and even though he wanted to start his journey in a creative way, he found that combining his love for tech and art helped him to pave the way to where he is now. He says " A lot of people get here from a very technical background and um, it really almost doesn't matter um, where you came from, there is something in cybersecurity that takes advantage of the skills that you bring to the table and, um, either way, there's plenty of room here for everyone." We thank Eric for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Eric Tillman, Chief Intelligence Officer at N2K Networks sits down and shares his incredibly creative journey. Eric loved being creative from a young age. When he started to think about a career he wanted to incorporate his love of creativity into his love for tech and turn it into an intelligence career. Eric started by joining the Navy, which set him on this path to work in cyber where he shared his talents with several big companies, including, Booz Allen Hamilton, Lockheed Martin, and Okta, eventually ending up at our very own N2K Networks. Eric shares the advice that there is something for everyone in this field, and even though he wanted to start his journey in a creative way, he found that combining his love for tech and art helped him to pave the way to where he is now. He says " A lot of people get here from a very technical background and um, it really almost doesn't matter um, where you came from, there is something in cybersecurity that takes advantage of the skills that you bring to the table and, um, either way, there's plenty of room here for everyone." We thank Eric for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>579</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9d4fb932-1cde-11ee-acde-5732cb87b094]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2312787280.mp3?updated=1688745172" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Moez Kamel and the cybersecurity ecosystem for New Space. [T-Minus Deep Space]</title>
      <link>https://space.n2k.com/podcasts/t-minus/ds12</link>
      <description>Moez Kamel, Threat Management Specialist at IBM Security, joins us on T-Minus Deep Space for a special edition all about the cybersecurity ecosystem in the New Space industry.
You can follow Moez on LinkedIn and his work at IBM’s Security Intelligence blog.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on Twitter and LinkedIn.
Selected Reading
Cybersecurity in the Next-Generation Space Age, Pt. 1: Introduction to New Space
Cybersecurity in the Next-Generation Space Age, Pt. 2: Cybersecurity Threats in the New Space
Cybersecurity in the Next-Generation Space Age, Pt. 3: Securing the New Space 
Cybersecurity in the Next-Generation Space Age, Pt. 4: New Space Future Development and Challenges    
Audience Survey
We want to hear from you! Please complete our 4 question survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.
Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 09 Jul 2023 06:00:00 -0000</pubDate>
      <itunes:title>Moez Kamel and the cybersecurity ecosystem for New Space. [T-Minus Deep Space]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>12</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Moez Kamel, Threat Management Specialist at IBM Security, discusses the cybersecurity ecosystem and unique challenges in the New Space industry.</itunes:subtitle>
      <itunes:summary>Moez Kamel, Threat Management Specialist at IBM Security, joins us on T-Minus Deep Space for a special edition all about the cybersecurity ecosystem in the New Space industry.
You can follow Moez on LinkedIn and his work at IBM’s Security Intelligence blog.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence roundup, Signals and Space, and you’ll never miss a beat. And be sure to follow T-Minus on Twitter and LinkedIn.
Selected Reading
Cybersecurity in the Next-Generation Space Age, Pt. 1: Introduction to New Space
Cybersecurity in the Next-Generation Space Age, Pt. 2: Cybersecurity Threats in the New Space
Cybersecurity in the Next-Generation Space Age, Pt. 3: Securing the New Space 
Cybersecurity in the Next-Generation Space Age, Pt. 4: New Space Future Development and Challenges    
Audience Survey
We want to hear from you! Please complete our 4 question survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
Want to hear your company in the show?
You too can reach the most influential leaders and operators in the industry. Here’s our media kit. Contact us at space@n2k.com to request more info.
Want to join us for an interview?
Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Moez Kamel, Threat Management Specialist at IBM Security, joins us on T-Minus Deep Space for a special edition all about the cybersecurity ecosystem in the New Space industry.</p><p>You can follow Moez on <a href="https://www.linkedin.com/in/moez-kamel-536aa071/">LinkedIn</a> and his work at <a href="https://securityintelligence.com/author/moez-kamel/">IBM’s Security Intelligence blog</a>.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our weekly intelligence roundup, <a href="https://space.n2k.com/newsletters/signals-and-space"><em>Signals and Space</em></a><em>, </em>and you’ll never miss a beat<em>. </em>And be sure to follow T-Minus on <a href="https://twitter.com/TMinusDaily">Twitter</a> and <a href="https://www.linkedin.com/company/n2k-space/">LinkedIn</a>.</p><h2>Selected Reading</h2><p><a href="https://securityintelligence.com/cybersecurity-in-the-next-generation-space-age-pt-1-introduction-to-new-space/">Cybersecurity in the Next-Generation Space Age, Pt. 1: Introduction to New Space</a></p><p><a href="https://securityintelligence.com/cybersecurity-in-the-next-generation-space-age-pt-2-threats/">Cybersecurity in the Next-Generation Space Age, Pt. 2: Cybersecurity Threats in the New Space</a></p><p><a href="https://securityintelligence.com/cybersecurity-in-the-next-generation-space-age-pt-3-securing-new-space/">Cybersecurity in the Next-Generation Space Age, Pt. 3: Securing the New Space</a> </p><p><a href="https://securityintelligence.com/cybersecurity-next-generation-space-age-pt-4-future-development-challenges/">Cybersecurity in the Next-Generation Space Age, Pt. 4: New Space Future Development and Challenges</a>    </p><h2>Audience Survey</h2><p>We want to hear from you! Please complete our <a href="https://www.surveymonkey.com/r/BL5NFPW">4 question survey</a>. It’ll help us get better and deliver you the most mission-critical space intel every day.</p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders and operators in the industry. Here’s our <a href="https://docsend.com/view/ung56qbvknfbj9z2">media kit</a>. Contact us at <a href="mailto:space@n2k.com">space@n2k.com</a> to request more info.</p><h2>Want to join us for an interview?</h2><p>Please send your pitch to <a href="mailto:space-editor@n2k.com">space-editor@n2k.com</a> and include your name, affiliation, and topic proposal.</p><p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1956</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0c9a7248-1d05-11ee-ba86-6729280e1572]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8277726517.mp3?updated=1688752542" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Creating PANDA-monium. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/289/notes</link>
      <description>Thomas Etheridge from CrowdStrike sits down to discuss their work on "Business as Usual: Falcon Complete MDR Thwarts Novel VANGUARD PANDA (Volt Typhoon) Tradecraft" In May of 2023, industry and government sources detailed China-nexus activity where they found the threat actor dubbed Volt Typhoon targeted U.S. based critical infrastructure entities. CrowdStrike's Intelligence team tracked this actor as VANGUARD PANDA. 
With CISA’s advisory on VANGUARD PANDA and its link to Chinese adversaries who are increasingly targeting US businesses and critical infrastructure, CrowdStrike’s blog dives deeper into the risks of VANGUARD PANDA. The research says "One specific VANGUARD PANDA incident stands out to review in detail. Falcon Complete responded to a detection that was triggered by suspicious reconnaissance commands executed under an Apache Tomcat web server running ManageEngine ADSelfService Plus."
The research can be found here:
Business as Usual: Falcon Complete MDR Thwarts Novel VANGUARD PANDA (Volt Typhoon) Tradecraft

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Jul 2023 07:00:00 -0000</pubDate>
      <itunes:title>Creating PANDA-monium. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>289</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thomas Etheridge from CrowdStrike sits down to discuss their work on "Business as Usual: Falcon Complete MDR Thwarts Novel VANGUARD PANDA (Volt Typhoon) Tradecraft" In May of 2023, industry and government sources detailed China-nexus activity where they found the threat actor dubbed Volt Typhoon targeted U.S. based critical infrastructure entities. CrowdStrike's Intelligence team tracked this actor as VANGUARD PANDA. 
With CISA’s advisory on VANGUARD PANDA and its link to Chinese adversaries who are increasingly targeting US businesses and critical infrastructure, CrowdStrike’s blog dives deeper into the risks of VANGUARD PANDA. The research says "One specific VANGUARD PANDA incident stands out to review in detail. Falcon Complete responded to a detection that was triggered by suspicious reconnaissance commands executed under an Apache Tomcat web server running ManageEngine ADSelfService Plus."
The research can be found here:
Business as Usual: Falcon Complete MDR Thwarts Novel VANGUARD PANDA (Volt Typhoon) Tradecraft

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thomas Etheridge from CrowdStrike sits down to discuss their work on "Business as Usual: Falcon Complete MDR Thwarts Novel VANGUARD PANDA (Volt Typhoon) Tradecraft" In May of 2023, industry and government sources detailed China-nexus activity where they found the threat actor dubbed Volt Typhoon targeted U.S. based critical infrastructure entities. CrowdStrike's Intelligence team tracked this actor as VANGUARD PANDA. </p><p>With CISA’s advisory on VANGUARD PANDA and its link to Chinese adversaries who are increasingly targeting US businesses and critical infrastructure, CrowdStrike’s blog dives deeper into the risks of VANGUARD PANDA. The research says "One specific VANGUARD PANDA incident stands out to review in detail. Falcon Complete responded to a detection that was triggered by suspicious reconnaissance commands executed under an Apache Tomcat web server running ManageEngine ADSelfService Plus."</p><p>The research can be found here:</p><ul><li><a href="https://www.crowdstrike.com/blog/falcon-complete-thwarts-vanguard-panda-tradecraft/">Business as Usual: Falcon Complete MDR Thwarts Novel VANGUARD PANDA (Volt Typhoon) Tradecraft</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1023</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[203791c2-1cfc-11ee-881d-af032c473481]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6302428446.mp3?updated=1688758041" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Joint advisory warns of Truebot. Operation Brainleaches in the supply chain. API key reset at Jumpcloud. More MOVEit vulnerability exploitation.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1858/notes</link>
      <description>US and Canadian agencies warn of Truebot. A look at "Operation Brainleaches." Jumpcloud resets API keys. An update on the MOVEit vulnerability exploitation. Andrea Little Limbago from Interos shares insights on rising geopolitical instability. Our guest is Mike Hamilton from Critical Insight discussing what you need to know about NIST 2.0. OSCE trains Ukrainian students in cybersecurity.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/128

Selected reading.
CISA and Partners Release Joint Cybersecurity Advisory on Newly Identified Truebot Malware Variants (Cybersecurity and Infrastructure Security Agency CISA)
Increased Truebot Activity Infects U.S. and Canada Based Networks | CISA (Cybersecurity and Infrastructure Security Agency CISA) 
Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks (ReversingLabs)
Mandatory JumpCloud API Key Rotation (JumpCloud)
JumpCloud resets admin API keys amid ‘ongoing incident’ (BleepingComputer)
JumpCloud Says All API Keys Invalidated to Protect Customers (SecurityWeek)
More organizations confirm MOVEit-related breaches as hackers claim to publish stolen data (TechCrunch)
Important information about MOVEit Transfer cyber security incident | Shell Global (Shell Global)
Shell Confirms MOVEit-Related Breach After Ransomware Group Leaks Data (SecurityWeek)
OSCE helps future generation of Ukraine’s law enforcers and emergency personnel build skills for safe work in cyberspace (OSCE)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 07 Jul 2023 20:15:00 -0000</pubDate>
      <itunes:title>Joint advisory warns of Truebot. Operation Brainleaches in the supply chain. API key reset at Jumpcloud. More MOVEit vulnerability exploitation.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1858</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>US and Canadian agencies warn of Truebot. A look at "Operation Brainleaches." Jumpcloud resets API keys. An update on the MOVEit vulnerability exploitation. Andrea Little Limbago from Interos shares insights on rising geopolitical instability. Our guest is Mike Hamilton from Critical Insight discussing what you need to know about NIST 2.0. OSCE trains Ukrainian students in cybersecurity.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/128

Selected reading.
CISA and Partners Release Joint Cybersecurity Advisory on Newly Identified Truebot Malware Variants (Cybersecurity and Infrastructure Security Agency CISA)
Increased Truebot Activity Infects U.S. and Canada Based Networks | CISA (Cybersecurity and Infrastructure Security Agency CISA) 
Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks (ReversingLabs)
Mandatory JumpCloud API Key Rotation (JumpCloud)
JumpCloud resets admin API keys amid ‘ongoing incident’ (BleepingComputer)
JumpCloud Says All API Keys Invalidated to Protect Customers (SecurityWeek)
More organizations confirm MOVEit-related breaches as hackers claim to publish stolen data (TechCrunch)
Important information about MOVEit Transfer cyber security incident | Shell Global (Shell Global)
Shell Confirms MOVEit-Related Breach After Ransomware Group Leaks Data (SecurityWeek)
OSCE helps future generation of Ukraine’s law enforcers and emergency personnel build skills for safe work in cyberspace (OSCE)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>US and Canadian agencies warn of Truebot. A look at "Operation Brainleaches." Jumpcloud resets API keys. An update on the MOVEit vulnerability exploitation. Andrea Little Limbago from Interos shares insights on rising geopolitical instability. Our guest is Mike Hamilton from Critical Insight discussing what you need to know about NIST 2.0. OSCE trains Ukrainian students in cybersecurity.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/128</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/news-events/alerts/2023/07/06/cisa-and-partners-release-joint-cybersecurity-advisory-newly-identified-truebot-malware-variants">CISA and Partners Release Joint Cybersecurity Advisory on Newly Identified Truebot Malware Variants</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-187a">Increased Truebot Activity Infects U.S. and Canada Based Networks | CISA</a> (Cybersecurity and Infrastructure Security Agency CISA) </p><p><a href="https://www.reversinglabs.com/blog/operation-brainleeches-malicious-npm-packages-fuel-supply-chain-and-phishing-attacks">Operation Brainleeches: Malicious npm packages fuel supply chain and phishing attacks</a> (ReversingLabs)</p><p><a href="https://jumpcloud.com/support/mandatory-jumpcloud-api-key-rotation">Mandatory JumpCloud API Key Rotation</a> (JumpCloud)</p><p><a href="https://www.bleepingcomputer.com/news/security/jumpcloud-resets-admin-api-keys-amid-ongoing-incident/">JumpCloud resets admin API keys amid ‘ongoing incident’</a> (BleepingComputer)</p><p><a href="https://www.securityweek.com/jumpcloud-says-all-api-keys-invalidated-to-protect-customers/">JumpCloud Says All API Keys Invalidated to Protect Customers</a> (SecurityWeek)</p><p><a href="https://techcrunch.com/2023/07/06/more-organizations-confirm-moveit-related-breaches-as-hackers-claim-to-publish-stolen-data/">More organizations confirm MOVEit-related breaches as hackers claim to publish stolen data</a> (TechCrunch)</p><p><a href="https://www.shell.com/energy-and-innovation/digitalisation/important-information-about-moveit-transfer-cyber-security-incident.html">Important information about MOVEit Transfer cyber security incident | Shell Global</a> (Shell Global)</p><p><a href="https://www.securityweek.com/shell-confirms-moveit-related-breach-after-ransomware-group-leaks-data/">Shell Confirms MOVEit-Related Breach After Ransomware Group Leaks Data</a> (SecurityWeek)</p><p><a href="https://www.osce.org/support-programme-for-ukraine/548065">OSCE helps future generation of Ukraine’s law enforcers and emergency personnel build skills for safe work in cyberspace</a> (OSCE)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1822</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[38298fb2-1cf5-11ee-9159-7bb1614215f0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1686595697.mp3?updated=1690333645" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Port of Nagoya continues its recovery from ransomware. Charming Kitten ups its game. Spyware in the Play store. Risks to electrical infrastructure. And a quick update on hacktivist auxiliaries.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1857/notes</link>
      <description>LockBit 3.0 claims responsibility for Nagoya ransomware attack. Charming Kitten sighting. Spyware infested apps found in Google Play. Threats and risks to electric vehicle charging stations. Solar panels and cyberattacks. Dave Bittner speaks with Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA, to talk about CISA’s effort for companies to build safety into tech products.Rick Howard sits down with Clarke Rodgers of AWS to discuss the mechanics of CISO roundtables. And Hacktivist auxiliaries remain active in Russia's hybrid war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/127

Selected reading.
Pro-Russian hackers target Port of Nagoya, disrupting loading of Toyota parts (The Japan Times) 
Port of Nagoya resumes operations later than planned after Russian hack (The Japan Times) 
Ransomware Halts Operations at Japan's Port of Nagoya (Dark Reading) 
Nagoya Port Faces Disruption After Ransomware Attack (Infosecurity Magazine) 
Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware | Proofpoint US (Proofpoint)
Two spyware tied with China found hiding on the Google Play Store (Pradeo)
EV Charger Hacking Poses a ‘Catastrophic’ Risk (WIRED) 
Exploited Solar Power Product Vulnerability Could Expose Energy Organizations to Attacks (SecurityWeek)
The Continued Expansion of Cyber Incidents by Non-State Actors in the War in Europe (OODA Loop).  
Russian railway site allegedly taken down by Ukrainian hackers (Record)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 06 Jul 2023 20:15:00 -0000</pubDate>
      <itunes:title>The Port of Nagoya continues its recovery from ransomware. Charming Kitten ups its game. Spyware in the Play store. Risks to electrical infrastructure. And a quick update on hacktivist auxiliaries.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1857</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>LockBit 3.0 claims responsibility for Nagoya ransomware attack. Charming Kitten sighting. Spyware infested apps found in Google Play. Threats and risks to electric vehicle charging stations. Solar panels and cyberattacks. Dave Bittner speaks with Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA, to talk about CISA’s effort for companies to build safety into tech products.Rick Howard sits down with Clarke Rodgers of AWS to discuss the mechanics of CISO roundtables. And Hacktivist auxiliaries remain active in Russia's hybrid war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/127

Selected reading.
Pro-Russian hackers target Port of Nagoya, disrupting loading of Toyota parts (The Japan Times) 
Port of Nagoya resumes operations later than planned after Russian hack (The Japan Times) 
Ransomware Halts Operations at Japan's Port of Nagoya (Dark Reading) 
Nagoya Port Faces Disruption After Ransomware Attack (Infosecurity Magazine) 
Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware | Proofpoint US (Proofpoint)
Two spyware tied with China found hiding on the Google Play Store (Pradeo)
EV Charger Hacking Poses a ‘Catastrophic’ Risk (WIRED) 
Exploited Solar Power Product Vulnerability Could Expose Energy Organizations to Attacks (SecurityWeek)
The Continued Expansion of Cyber Incidents by Non-State Actors in the War in Europe (OODA Loop).  
Russian railway site allegedly taken down by Ukrainian hackers (Record)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>LockBit 3.0 claims responsibility for Nagoya ransomware attack. Charming Kitten sighting. Spyware infested apps found in Google Play. Threats and risks to electric vehicle charging stations. Solar panels and cyberattacks. Dave Bittner speaks with Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA, to talk about CISA’s effort for companies to build safety into tech products.Rick Howard sits down with Clarke Rodgers of AWS to discuss the mechanics of CISO roundtables. And Hacktivist auxiliaries remain active in Russia's hybrid war.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/127</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.japantimes.co.jp/news/2023/07/05/national/nagoya-port-cyberattack/">Pro-Russian hackers target Port of Nagoya, disrupting loading of Toyota parts</a> (The Japan Times) </p><p><a href="https://www.japantimes.co.jp/news/2023/07/06/national/nagoya-port-hack-resume-operations/">Port of Nagoya resumes operations later than planned after Russian hack</a> (The Japan Times) </p><p><a href="https://www.darkreading.com/attacks-breaches/ransomware-halts-operations-at-japan-port-of-nagoya">Ransomware Halts Operations at Japan's Port of Nagoya</a> (Dark Reading) </p><p><a href="https://www.infosecurity-magazine.com/news/nagoya-port-disruption-ransomware/">Nagoya Port Faces Disruption After Ransomware Attack</a> (Infosecurity Magazine) </p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/welcome-new-york-exploring-ta453s-foray-lnks-and-mac-malware">Welcome to New York: Exploring TA453's Foray into LNKs and Mac Malware | Proofpoint US</a> (Proofpoint)</p><p><a href="https://blog.pradeo.com/spyware-tied-china-found-google-play-store">Two spyware tied with China found hiding on the Google Play Store</a> (Pradeo)</p><p><a href="https://www.wired.com/story/electric-vehicle-charging-station-hacks/">EV Charger Hacking Poses a ‘Catastrophic’ Risk</a> (WIRED) </p><p><a href="https://www.securityweek.com/exploited-solar-power-product-vulnerability-could-expose-energy-organizations-to-attacks/">Exploited Solar Power Product Vulnerability Could Expose Energy Organizations to Attacks</a> (SecurityWeek)</p><p><a href="https://www.oodaloop.com/archive/2023/07/06/the-continued-expansion-of-cyber-incidents-by-non-state-actors-in-the-war-in-europe/">The Continued Expansion of Cyber Incidents by Non-State Actors in the War in Europe</a> (OODA Loop).  </p><p><a href="https://therecord.media/russian-railway-site-taken-down-by-ukrainian-hackers">Russian railway site allegedly taken down by Ukrainian hackers</a> (Record)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1613</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[21d51224-1c35-11ee-9669-ef449163219a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9585651168.mp3?updated=1690333626" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage, extortion, and DDoS as instruments of state policy. Ransomware continues to trouble a wide range of targets across many sectors.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1856/notes</link>
      <description>Chinese cyberespionage campaign against European governments. The Port of Nagoya closes over ransomware attack. BlackCat and SEO poisoning. LockBit seeks to extort a semiconductor manufacturer. Professionals in the cyber underworld. CISA issued a DDoS alert for US companies and government agencies. Microsoft debunks claims of data theft by Anonymous Sudan. Matt O'Neill from the US Secret Service speaks with Dave Bittner about sextortion. Rick Howard sits down with Michael Fuller of AWS to talk about the kill chain. And Avast releases a free decryptor for Akira.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/126

Selected reading.
Chinese Threat Actors Targeting Europe in SmugX Campaign - Check Point Research (Check Point Research)
Hackers target European government entities in SmugX campaign (BleepingComputer)
Chinese hackers target European embassies with HTML smuggling technique (Record)
Japan’s largest port stops operations after ransomware attack (BleepingComputer) 
BlackCat ransomware pushes Cobalt Strike via WinSCP search ads (BleepingComputer)
BlackCat Operators Distributing Ransomware Disguised as WinSCP via Malvertising (The Hacker News)
TSMC Says Supplier Hacked After Ransomware Group Claims Attack on Chip Giant (SecurityWeek)
TSMC confirms data breach after LockBit cyberattack on third-party supplier (TechCrunch)
Taiwan Semiconductor Denies LockBit's $70M Hack Claim (Bank Info Security)
Semiconductor giant says IT supplier was attacked; LockBit makes related claims (Record)
DoS and DDoS Attacks against Multiple Sectors (Cybersecurity and Infrastructure Security Agency CISA)
CISA issues DDoS warning after attacks hit multiple US orgs (BleepingComputer)
Microsoft denies data breach, theft of 30 million customer accounts (BleepingComputer)
Microsoft Denies Major 30 Million Customer-Breach (Infosecurity Magazine)
Decrypted: Akira Ransomware (Avast Threat Labs)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 05 Jul 2023 20:15:00 -0000</pubDate>
      <itunes:title>Cyberespionage, extortion, and DDoS as instruments of state policy. Ransomware continues to trouble a wide range of targets across many sectors.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1856</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Chinese cyberespionage campaign against European governments. The Port of Nagoya closes over ransomware attack. BlackCat and SEO poisoning. LockBit seeks to extort a semiconductor manufacturer. Professionals in the cyber underworld. CISA issued a DDoS alert for US companies and government agencies. Microsoft debunks claims of data theft by Anonymous Sudan. Matt O'Neill from the US Secret Service speaks with Dave Bittner about sextortion. Rick Howard sits down with Michael Fuller of AWS to talk about the kill chain. And Avast releases a free decryptor for Akira.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/126

Selected reading.
Chinese Threat Actors Targeting Europe in SmugX Campaign - Check Point Research (Check Point Research)
Hackers target European government entities in SmugX campaign (BleepingComputer)
Chinese hackers target European embassies with HTML smuggling technique (Record)
Japan’s largest port stops operations after ransomware attack (BleepingComputer) 
BlackCat ransomware pushes Cobalt Strike via WinSCP search ads (BleepingComputer)
BlackCat Operators Distributing Ransomware Disguised as WinSCP via Malvertising (The Hacker News)
TSMC Says Supplier Hacked After Ransomware Group Claims Attack on Chip Giant (SecurityWeek)
TSMC confirms data breach after LockBit cyberattack on third-party supplier (TechCrunch)
Taiwan Semiconductor Denies LockBit's $70M Hack Claim (Bank Info Security)
Semiconductor giant says IT supplier was attacked; LockBit makes related claims (Record)
DoS and DDoS Attacks against Multiple Sectors (Cybersecurity and Infrastructure Security Agency CISA)
CISA issues DDoS warning after attacks hit multiple US orgs (BleepingComputer)
Microsoft denies data breach, theft of 30 million customer accounts (BleepingComputer)
Microsoft Denies Major 30 Million Customer-Breach (Infosecurity Magazine)
Decrypted: Akira Ransomware (Avast Threat Labs)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chinese cyberespionage campaign against European governments. The Port of Nagoya closes over ransomware attack. BlackCat and SEO poisoning. LockBit seeks to extort a semiconductor manufacturer. Professionals in the cyber underworld. CISA issued a DDoS alert for US companies and government agencies. Microsoft debunks claims of data theft by Anonymous Sudan. Matt O'Neill from the US Secret Service speaks with Dave Bittner about sextortion. Rick Howard sits down with Michael Fuller of AWS to talk about the kill chain. And Avast releases a free decryptor for Akira.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/126</p><p><br></p><h2>Selected reading.</h2><p><a href="https://research.checkpoint.com/2023/chinese-threat-actors-targeting-europe-in-smugx-campaign/">Chinese Threat Actors Targeting Europe in SmugX Campaign - Check Point Research</a> (Check Point Research)</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-target-european-government-entities-in-smugx-campaign/">Hackers target European government entities in SmugX campaign</a> (BleepingComputer)</p><p><a href="https://therecord.media/html-smuggling-china-espionage-europe">Chinese hackers target European embassies with HTML smuggling technique</a> (Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/japans-largest-port-stops-operations-after-ransomware-attack/">Japan’s largest port stops operations after ransomware attack</a> (BleepingComputer) </p><p><a href="https://www.bleepingcomputer.com/news/security/blackcat-ransomware-pushes-cobalt-strike-via-winscp-search-ads/">BlackCat ransomware pushes Cobalt Strike via WinSCP search ads</a> (BleepingComputer)</p><p><a href="https://thehackernews.com/2023/07/blackcat-operators-distributing.html">BlackCat Operators Distributing Ransomware Disguised as WinSCP via Malvertising</a> (The Hacker News)</p><p><a href="https://www.securityweek.com/tsmc-says-supplier-hacked-after-ransomware-group-claims-attack-on-chip-giant/">TSMC Says Supplier Hacked After Ransomware Group Claims Attack on Chip Giant</a> (SecurityWeek)</p><p><a href="https://techcrunch.com/2023/06/30/tsmc-confirms-data-breach-after-lockbit-cyberattack-on-third-party-supplier/">TSMC confirms data breach after LockBit cyberattack on third-party supplier</a> (TechCrunch)</p><p><a href="https://www.bankinfosecurity.com/taiwan-semiconductor-denies-lockbits-70m-hack-claim-a-22421">Taiwan Semiconductor Denies LockBit's $70M Hack Claim</a> (Bank Info Security)</p><p><a href="https://therecord.media/tsmc-information-leaked-kinmax-lockbit-claims">Semiconductor giant says IT supplier was attacked; LockBit makes related claims </a>(Record)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/06/30/dos-and-ddos-attacks-against-multiple-sectors">DoS and DDoS Attacks against Multiple Sectors</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-issues-ddos-warning-after-attacks-hit-multiple-us-orgs/">CISA issues DDoS warning after attacks hit multiple US orgs</a> (BleepingComputer)</p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-denies-data-breach-theft-of-30-million-customer-accounts/">Microsoft denies data breach, theft of 30 million customer accounts</a> (BleepingComputer)</p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-denies-major-30-million/?mod=djemCybersecruityPro&amp;tpl=cy">Microsoft Denies Major 30 Million Customer-Breach</a> (Infosecurity Magazine)</p><p><a href="https://decoded.avast.io/threatresearch/decrypted-akira-ransomware/">Decrypted: Akira Ransomware</a> (Avast Threat Labs)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1511</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0d4dfad0-1b65-11ee-a34d-dfddebf9346f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9735460216.mp3?updated=1690333524" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Two viewpoints on the National Cybersecurity Strategy. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/51/notes</link>
      <description>Earlier this month, the White House released the National Cybersecurity Strategy, the first issued since 2018. The strategy refocuses roles, responsibilities, and resource allocations in the digital ecosystem, with a five pillar approach. Those pillars are: defending critical infrastructure, disrupting threat actors, shaping market forces to drive security and resilience, investing in a resilient future, and forging international partnerships.
We wanted to delve into the strategy and its intended effects further, so Dave Bittner spoke with representatives from industry and inside government. Dave first speaks with Adam Isles, Principal and Head of Cybersecurity Practice at The Chertoff Group, sharing industry's take on the strategy. Following that conversation, Dave had a discussion with Steve Kelly, Special Assistant to the President and Senior Director for Cybersecurity and Emerging Technology at the National Security Council, for a look at the strategy from inside the White House.
Links to resources:


Point of View: 2023 National Cybersecurity Strategy The Chertoff Group's blog

National Cybersecurity Strategy 2023

US GAO Snapshot: Cybersecurity: Launching and Implementing the National Cybersecurity Strategy


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Jul 2023 20:00:00 -0000</pubDate>
      <itunes:title>Two viewpoints on the National Cybersecurity Strategy. [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>51</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Earlier this month, the White House released the National Cybersecurity Strategy, the first issued since 2018. The strategy refocuses roles, responsibilities, and resource allocations in the digital ecosystem, with a five pillar approach. Those pillars are: defending critical infrastructure, disrupting threat actors, shaping market forces to drive security and resilience, investing in a resilient future, and forging international partnerships.
We wanted to delve into the strategy and its intended effects further, so Dave Bittner spoke with representatives from industry and inside government. Dave first speaks with Adam Isles, Principal and Head of Cybersecurity Practice at The Chertoff Group, sharing industry's take on the strategy. Following that conversation, Dave had a discussion with Steve Kelly, Special Assistant to the President and Senior Director for Cybersecurity and Emerging Technology at the National Security Council, for a look at the strategy from inside the White House.
Links to resources:


Point of View: 2023 National Cybersecurity Strategy The Chertoff Group's blog

National Cybersecurity Strategy 2023

US GAO Snapshot: Cybersecurity: Launching and Implementing the National Cybersecurity Strategy


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Earlier this month, the White House released the National Cybersecurity Strategy, the first issued since 2018. The strategy refocuses roles, responsibilities, and resource allocations in the digital ecosystem, with a five pillar approach. Those pillars are: defending critical infrastructure, disrupting threat actors, shaping market forces to drive security and resilience, investing in a resilient future, and forging international partnerships.</p><p>We wanted to delve into the strategy and its intended effects further, so Dave Bittner spoke with representatives from industry and inside government. Dave first speaks with <a href="https://www.linkedin.com/in/adam-isles-038614b/">Adam Isles</a>, Principal and Head of Cybersecurity Practice at The Chertoff Group, sharing industry's take on the strategy. Following that conversation, Dave had a discussion with <a href="https://www.linkedin.com/in/steven-m-kelly-cissp-b9a295187/">Steve Kelly</a>, Special Assistant to the President and Senior Director for Cybersecurity and Emerging Technology at the National Security Council, for a look at the strategy from inside the White House.</p><p>Links to resources:</p><ul>
<li>
<a href="https://www.chertoffgroup.com/blog/2023-national-cybersecurity-strategy">Point of View: 2023 National Cybersecurity Strategy</a> The Chertoff Group's blog</li>
<li><a href="https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf">National Cybersecurity Strategy 2023</a></li>
<li><a href="https://www.gao.gov/products/gao-23-106826">US GAO Snapshot: Cybersecurity: Launching and Implementing the National Cybersecurity Strategy</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1923</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eb5e98f6-178d-11ee-a9e2-6ff97b678262]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4716062631.mp3?updated=1679681717" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Interview Select: Will Markow, VP of Applied Research from Lightcast, is talking with Simone Petrella about how to use data to make strategic workforce decisions. </title>
      <link>https://thecyberwire.com/podcasts/interview-selects/163/notes</link>
      <description>This interview from June 16th, 2023 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Simone Petrella sits down with Will Markow, VP of Applied Research from Lightcast, to discuss how to use data to make strategic workforce decisions.
You can also view the video of the full interview here: Simone Petrella and Will Markow discuss workforce management.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 03 Jul 2023 15:40:00 -0000</pubDate>
      <itunes:title>Interview Select: Will Markow, VP of Applied Research from Lightcast, is talking with Simone Petrella about how to use data to make strategic workforce decisions. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>163</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This interview from June 16th, 2023 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Simone Petrella sits down with Will Markow, VP of Applied Research from Lightcast, to discuss how to use data to make strategic workforce decisions.
You can also view the video of the full interview here: Simone Petrella and Will Markow discuss workforce management.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This interview from June 16th, 2023 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Simone Petrella sits down with Will Markow, VP of Applied Research from Lightcast, to discuss how to use data to make strategic workforce decisions.</p><p>You can also view the video of the full interview here: <a href="https://youtu.be/P1ywjlLX8Jo">Simone Petrella and Will Markow discuss workforce management.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1616</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3f930aa0-178f-11ee-a91b-3fd7998a06f5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8047178221.mp3?updated=1753131944" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Liji Samuel: Leaping beyond the barrier. [Certification] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/156/notes</link>
      <description>Liji Samuel from NSA sits down to share her exciting career path through the years until she found a job working for as Chief of Standards and Certification at NSA's Cyber Collaboration Center. She starts by sharing that she had always wanted to work in the STEM field, explaining that growing up she was surrounded with older cousins who were choosing STEM careers and it became an interesting topic for her. She accounts working for a number of companies that helped her grow into the role she is in now. Cybersecurity became a big buzzword for her, causing her to step out of the agency into US cyber command to help take up a management position for the architecture and engineering division. From there, she continued her cybersecurity journey first as the exploration director before moving into where she is now. Liji shares that there were barriers along the way that she had to endure and hop over to get to the right path. She says "So there are challenges and barriers that come across constantly with our work. Um, one just has to pause and reflect on how we can work with it, around it, or influence like our stakeholders and jointly create a vision around it." We thank Liji for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 02 Jul 2023 07:00:00 -0000</pubDate>
      <itunes:title>Liji Samuel: Leaping beyond the barrier. [Certification] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>156</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Liji Samuel from NSA sits down to share her exciting career path through the years until she found a job working for as Chief of Standards and Certification at NSA's Cyber Collaboration Center. She starts by sharing that she had always wanted to work in the STEM field, explaining that growing up she was surrounded with older cousins who were choosing STEM careers and it became an interesting topic for her. She accounts working for a number of companies that helped her grow into the role she is in now. Cybersecurity became a big buzzword for her, causing her to step out of the agency into US cyber command to help take up a management position for the architecture and engineering division. From there, she continued her cybersecurity journey first as the exploration director before moving into where she is now. Liji shares that there were barriers along the way that she had to endure and hop over to get to the right path. She says "So there are challenges and barriers that come across constantly with our work. Um, one just has to pause and reflect on how we can work with it, around it, or influence like our stakeholders and jointly create a vision around it." We thank Liji for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Liji Samuel from NSA sits down to share her exciting career path through the years until she found a job working for as Chief of Standards and Certification at NSA's Cyber Collaboration Center. She starts by sharing that she had always wanted to work in the STEM field, explaining that growing up she was surrounded with older cousins who were choosing STEM careers and it became an interesting topic for her. She accounts working for a number of companies that helped her grow into the role she is in now. Cybersecurity became a big buzzword for her, causing her to step out of the agency into US cyber command to help take up a management position for the architecture and engineering division. From there, she continued her cybersecurity journey first as the exploration director before moving into where she is now. Liji shares that there were barriers along the way that she had to endure and hop over to get to the right path. She says "So there are challenges and barriers that come across constantly with our work. Um, one just has to pause and reflect on how we can work with it, around it, or influence like our stakeholders and jointly create a vision around it." We thank Liji for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>487</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[87eb6ad0-15dd-11ee-9398-7b662a8e07d5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2745004068.mp3?updated=1687975391" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The power behind artificial intelligence. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/288/notes</link>
      <description>Daniel dos Santos, Forescout's Head of Security Research is sharing insights from a recent exercise his team conducted on AI-assisted attacks for OT and unmanaged devices. Using ChatGPT, Forescout’s research team converted an existing OT exploit developed in Python to run on Windows to demonstrate how easy it is to create an AI-assisted attack that converts the original exploit into alternative programming languages.
The research states "our goal was to convert an existing OT exploit developed in Python to run on Windows to the Go language using ChatGPT." This would then allow it to run faster on Windows and run easily on a variety of embedded devices.
The research can be found here:
AI-Assisted Attacks Are Coming to OT and Unmanaged Devices – the Time to Prepare Is Now

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Jul 2023 07:00:00 -0000</pubDate>
      <itunes:title>The power behind artificial intelligence. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>288</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Daniel dos Santos, Forescout's Head of Security Research is sharing insights from a recent exercise his team conducted on AI-assisted attacks for OT and unmanaged devices. Using ChatGPT, Forescout’s research team converted an existing OT exploit developed in Python to run on Windows to demonstrate how easy it is to create an AI-assisted attack that converts the original exploit into alternative programming languages.
The research states "our goal was to convert an existing OT exploit developed in Python to run on Windows to the Go language using ChatGPT." This would then allow it to run faster on Windows and run easily on a variety of embedded devices.
The research can be found here:
AI-Assisted Attacks Are Coming to OT and Unmanaged Devices – the Time to Prepare Is Now

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Daniel dos Santos, Forescout's Head of Security Research is sharing insights from a recent exercise his team conducted on AI-assisted attacks for OT and unmanaged devices. Using ChatGPT, Forescout’s research team converted an existing OT exploit developed in Python to run on Windows to demonstrate how easy it is to create an AI-assisted attack that converts the original exploit into alternative programming languages.</p><p>The research states "our goal was to convert an existing OT exploit developed in Python to run on Windows to the Go language using ChatGPT." This would then allow it to run faster on Windows and run easily on a variety of embedded devices.</p><p>The research can be found here:</p><ul><li><a href="https://www.forescout.com/blog/ai-assisted-attacks-are-coming-to-ot-and-unmanaged-devices/">AI-Assisted Attacks Are Coming to OT and Unmanaged Devices – the Time to Prepare Is Now</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1134</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a0ce02b0-15e2-11ee-8e7c-2761ded27322]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9227647085.mp3?updated=1687974075" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA would like agencies to look to their management interfaces. Hacktivist auxiliaries and a role for OSINT in Russia’s hybrid war against Ukraine. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1855/notes</link>
      <description>US Federal Government working to secure management interfaces. NoName057(16)’s DDoSia campaign grows, and targets Wagner, post-insurrection. Update: Unidentified hackers attack Russian satellite communications company, claiming to be Wagner. The role of OSINT in tracking Russia's war. Manoj Sharma of Symantec discusses trends he's hearing about generative AI. Becky Weiss from AWS talks with Rick Howard about the math behind their security. Cyber awareness over a holiday.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/125

Selected reading.
CISA Wants Exposed Government Devices Remediated In 14 Days (Dark Reading)
50 US Agencies Using Unsecured Devices, Violating Policy (Bank Info Security)
CISA working with agencies to pull exposed network tools from public internet (Record)
Following NoName057(16) DDoSia Project’s Targets (Sekoia.io Blog)
Pro-Russia DDoSia hacktivist project sees 2,400% membership increase (BleepingComputer)
Hackers attack Russian satellite telecom provider, claim affiliation with Wagner Group (CyberScoop)
Hackers claim to take down Russian satellite communications provider (Record)
Days of Chaos: How OSINT Helps Us Understand the Putin-Prigozhin Schism (Flashpoint) 
Preparing for cyber threats over the Fourth of July. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 30 Jun 2023 20:45:00 -0000</pubDate>
      <itunes:title>CISA would like agencies to look to their management interfaces. Hacktivist auxiliaries and a role for OSINT in Russia’s hybrid war against Ukraine. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1855</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>US Federal Government working to secure management interfaces. NoName057(16)’s DDoSia campaign grows, and targets Wagner, post-insurrection. Update: Unidentified hackers attack Russian satellite communications company, claiming to be Wagner. The role of OSINT in tracking Russia's war. Manoj Sharma of Symantec discusses trends he's hearing about generative AI. Becky Weiss from AWS talks with Rick Howard about the math behind their security. Cyber awareness over a holiday.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/125

Selected reading.
CISA Wants Exposed Government Devices Remediated In 14 Days (Dark Reading)
50 US Agencies Using Unsecured Devices, Violating Policy (Bank Info Security)
CISA working with agencies to pull exposed network tools from public internet (Record)
Following NoName057(16) DDoSia Project’s Targets (Sekoia.io Blog)
Pro-Russia DDoSia hacktivist project sees 2,400% membership increase (BleepingComputer)
Hackers attack Russian satellite telecom provider, claim affiliation with Wagner Group (CyberScoop)
Hackers claim to take down Russian satellite communications provider (Record)
Days of Chaos: How OSINT Helps Us Understand the Putin-Prigozhin Schism (Flashpoint) 
Preparing for cyber threats over the Fourth of July. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>US Federal Government working to secure management interfaces. NoName057(16)’s DDoSia campaign grows, and targets Wagner, post-insurrection. Update: Unidentified hackers attack Russian satellite communications company, claiming to be Wagner. The role of OSINT in tracking Russia's war. Manoj Sharma of Symantec discusses trends he's hearing about generative AI. Becky Weiss from AWS talks with Rick Howard about the math behind their security. Cyber awareness over a holiday.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/125</p><h2><br></h2><h2>Selected reading.</h2><p><a href="https://www.darkreading.com/attacks-breaches/cisa-wants-exposed-government-devices-remediated-14-days">CISA Wants Exposed Government Devices Remediated In 14 Days</a> (Dark Reading)</p><p><a href="https://www.bankinfosecurity.com/50-us-agencies-using-unsecured-devices-violating-policy-a-22391">50 US Agencies Using Unsecured Devices, Violating Policy</a> (Bank Info Security)</p><p><a href="https://therecord.media/cisa-network-management-tools-bod-censys-report">CISA working with agencies to pull exposed network tools from public internet</a> (Record)</p><p><a href="https://blog.sekoia.io/following-noname05716-ddosia-projects-targets/">Following NoName057(16) DDoSia Project’s Targets</a> (Sekoia.io Blog)</p><p><a href="https://www.bleepingcomputer.com/news/security/pro-russia-ddosia-hacktivist-project-sees-2-400-percent-membership-increase/">Pro-Russia DDoSia hacktivist project sees 2,400% membership increase</a> (BleepingComputer)</p><p><a href="https://cyberscoop.com/russian-satellite-hack-wagner-group/">Hackers attack Russian satellite telecom provider, claim affiliation with Wagner Group</a> (CyberScoop)</p><p><a href="https://therecord.media/hackers-take-down-russian-satellite-provider">Hackers claim to take down Russian satellite communications provider</a> (Record)</p><p><a href="https://flashpoint.io/blog/putin-prigozhin-osint/">Days of Chaos: How OSINT Helps Us Understand the Putin-Prigozhin Schism</a> (Flashpoint) </p><p><a href="https://thecyberwire.com/stories/31ee161b1cf34e23bb8211e44c5e7117/preparing-for-cyber-threats-over-the-fourth-of-july">Preparing for cyber threats over the Fourth of July.</a> (CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1911</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[329a1690-8167-11ed-9779-ab7c836cc1d5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8905707706.mp3?updated=1690333443" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Something new, in ransomware. Notes on cyberespionage by the Lazarus Group and Charming Kitten. Security CI/CD operations. FINRA says hold the emojis. Dispatches from the hybrid war’s cyber front.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1854/notes</link>
      <description>8base ransomware is overlooked and spiking. GuLoader targets law firms. Akira ransomware for Linux systems targets VMs. Kaspersky tracks the Lazarus group: typos and mistakes indicating an active human operator. Charming Kitten goes spearphishing. Securing continuous integration/continuous delivery operations. No emojis for the SEC, please.Unconfirmed reports say the Wagner Group hacked a Russian satellite communications provider. Our guest is Hanan Hibshi from Carnegie Mellon's picoCTF team. Chris Novak from Verizon discusses their 2023 Data Breach Investigations Report (DBIR). And Anonymous Sudan wants you to know that they’re not just a bunch of deniable Russian crooks–where’s the love, man?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/124

Selected reading.
8Base Ransomware: A Heavy Hitting Player (VMware Security Blog) 
GuLoader Campaign Targets Law Firms in the US (Morphisec) 
Akira Ransomware Extends Reach to Linux Platform (Cyble) 
Andariel’s Mistakes Uncover New Malware in Lazarus Group Campaign (Infosecurity Magazine)
Charming Kitten Updates POWERSTAR with an InterPlanetary Twist (Volexity)
CISA and NSA Release Joint Guidance on Defending Continuous Integration/Continuous Delivery (CI/CD) Environments | CISA (Cybersecurity and Infrastructure Security Agency CISA)
NSA and CISA Best Practices to Secure Cloud Continuous Integration/Continuous Delivery Environments (National Security Agency/Central Security Service)
Wall Street Regulators’ New Target: Emojis (Wall Street Journal) 
Russian satellite telecom Dozor allegedly hit by hackers (Cybernews)
Hacking Group Says It Attacked Microsoft for Sudan. Experts Say Russia’s Behind It (Bloomberg) 
‘Hactivists’ who targeted Microsoft claim they’re working for Sudan (Fortune)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 29 Jun 2023 20:15:00 -0000</pubDate>
      <itunes:title>Something new, in ransomware. Notes on cyberespionage by the Lazarus Group and Charming Kitten. Security CI/CD operations. FINRA says hold the emojis. Dispatches from the hybrid war’s cyber front.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1854</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>8base ransomware is overlooked and spiking. GuLoader targets law firms. Akira ransomware for Linux systems targets VMs. Kaspersky tracks the Lazarus group: typos and mistakes indicating an active human operator. Charming Kitten goes spearphishing. Securing continuous integration/continuous delivery operations. No emojis for the SEC, please.Unconfirmed reports say the Wagner Group hacked a Russian satellite communications provider. Our guest is Hanan Hibshi from Carnegie Mellon's picoCTF team. Chris Novak from Verizon discusses their 2023 Data Breach Investigations Report (DBIR). And Anonymous Sudan wants you to know that they’re not just a bunch of deniable Russian crooks–where’s the love, man?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/124

Selected reading.
8Base Ransomware: A Heavy Hitting Player (VMware Security Blog) 
GuLoader Campaign Targets Law Firms in the US (Morphisec) 
Akira Ransomware Extends Reach to Linux Platform (Cyble) 
Andariel’s Mistakes Uncover New Malware in Lazarus Group Campaign (Infosecurity Magazine)
Charming Kitten Updates POWERSTAR with an InterPlanetary Twist (Volexity)
CISA and NSA Release Joint Guidance on Defending Continuous Integration/Continuous Delivery (CI/CD) Environments | CISA (Cybersecurity and Infrastructure Security Agency CISA)
NSA and CISA Best Practices to Secure Cloud Continuous Integration/Continuous Delivery Environments (National Security Agency/Central Security Service)
Wall Street Regulators’ New Target: Emojis (Wall Street Journal) 
Russian satellite telecom Dozor allegedly hit by hackers (Cybernews)
Hacking Group Says It Attacked Microsoft for Sudan. Experts Say Russia’s Behind It (Bloomberg) 
‘Hactivists’ who targeted Microsoft claim they’re working for Sudan (Fortune)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>8base ransomware is overlooked and spiking. GuLoader targets law firms. Akira ransomware for Linux systems targets VMs. Kaspersky tracks the Lazarus group: typos and mistakes indicating an active human operator. Charming Kitten goes spearphishing. Securing continuous integration/continuous delivery operations. No emojis for the SEC, please.Unconfirmed reports say the Wagner Group hacked a Russian satellite communications provider. Our guest is Hanan Hibshi from Carnegie Mellon's picoCTF team. Chris Novak from Verizon discusses their 2023 Data Breach Investigations Report (DBIR). And Anonymous Sudan wants you to know that they’re not just a bunch of deniable Russian crooks–where’s the love, man?</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/124</p><p><br></p><h2>Selected reading.</h2><p><a href="https://blogs.vmware.com/security/2023/06/8base-ransomware-a-heavy-hitting-player.html">8Base Ransomware: A Heavy Hitting Player</a> (VMware Security Blog) </p><p><a href="https://blog.morphisec.com/guloader-campaign-targets-law-firms-in-the-us">GuLoader Campaign Targets Law Firms in the US</a> (Morphisec) </p><p><a href="https://blog.cyble.com/2023/06/28/akira-ransomware-extends-reach-to-linux-platform/">Akira Ransomware Extends Reach to Linux Platform</a> (Cyble) </p><p><a href="https://www.infosecurity-magazine.com/news/andariels-mistakes-uncover-new/">Andariel’s Mistakes Uncover New Malware in Lazarus Group Campaign</a> (Infosecurity Magazine)</p><p><a href="https://www.volexity.com/blog/2023/06/28/charming-kitten-updates-powerstar-with-an-interplanetary-twist/">Charming Kitten Updates POWERSTAR with an InterPlanetary Twist</a> (Volexity)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/06/28/cisa-and-nsa-release-joint-guidance-defending-continuous-integrationcontinuous-delivery-cicd">CISA and NSA Release Joint Guidance on Defending Continuous Integration/Continuous Delivery (CI/CD) Environments | CISA</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3441780/nsa-and-cisa-best-practices-to-secure-cloud-continuous-integrationcontinuous-de/">NSA and CISA Best Practices to Secure Cloud Continuous Integration/Continuous Delivery Environments</a> (National Security Agency/Central Security Service)</p><p><a href="https://www.wsj.com/articles/emojis-wall-street-regulators-finance-finra-5bbf5688">Wall Street Regulators’ New Target: Emojis</a> (Wall Street Journal) </p><p><a href="https://cybernews.com/cyber-war/dozor-russian-satellite-telecom-hacked/">Russian satellite telecom Dozor allegedly hit by hackers</a> (Cybernews)</p><p><a href="https://www.bloomberg.com/news/articles/2023-06-28/anonymous-sudan-does-group-behind-microsoft-cyberattack-have-ties-to-russia">Hacking Group Says It Attacked Microsoft for Sudan. Experts Say Russia’s Behind It</a> (Bloomberg) </p><p><a href="https://fortune.com/2023/06/28/hactivists-targeted-microsoft-anonymous-sudan-security-experts-convinced-russia-behind-it/">‘Hactivists’ who targeted Microsoft claim they’re working for Sudan</a> (Fortune)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1753</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[32b461c6-8167-11ed-9779-5383d9eb67fb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6770564424.mp3?updated=1688156493" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Two threats in the wild, and a third in proof-of-concept. Swiss intelligence expects an uptick in Russian cyberespionage. Privateers and auxiliaries in a hybrid war. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1853/notes</link>
      <description>JokerSpy afflicts Macs. ThirdEye (not so blind). Mockingjay process injection as proof-of-concept. Switzerland expects Russia to increase cyberespionage as agent networks are disrupted. The fracturing of Conti, and the rise of its successors. The Washington Post’s Tim Starks explains the security of undersea cables. Our guest is ​​Brian Johnson of Armorblox to discuss Social Security Administration impersonation scams. And the "UserSec Collective" says it's recruiting hacktivists for the Russian cause. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/123

Selected reading.
JokerSpy macOS malware used to attack Japanese crypto exchange (AppleInsider) 
Prominent cryptocurrency exchange infected with previously unseen Mac malware (Ars Technica)
New Fast-Developing ThirdEye Infostealer Pries Open System Information (Fortinet Blog)
Process Mockingjay: Echoing RWX In Userland To Achieve Code Execution (Security Joes)
New Mockingjay Process Injection Technique Could Let Malware Evade Detection (The Hacker News)
New Mockingjay process injection technique evades EDR detection (BleepingComputer)
Ukraine war made Switzerland hub for Chinese, Russian spies: Swiss intelligence (South China Morning Post) 
Swiss intelligence warns of fallout in cyberspace as West clamps down on spies (Record) 
The rise and fall of the Conti ransomware group (Global Initiative) 
The Trickbot/Conti Crypters: Where Are They Now? (Security Intelligence)                                                                                                                       
Ukraine at D+489: An influence contest, post-mutiny. (CyberWire) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 28 Jun 2023 20:15:00 -0000</pubDate>
      <itunes:title>Two threats in the wild, and a third in proof-of-concept. Swiss intelligence expects an uptick in Russian cyberespionage. Privateers and auxiliaries in a hybrid war. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1853</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>JokerSpy afflicts Macs. ThirdEye (not so blind). Mockingjay process injection as proof-of-concept. Switzerland expects Russia to increase cyberespionage as agent networks are disrupted. The fracturing of Conti, and the rise of its successors. The Washington Post’s Tim Starks explains the security of undersea cables. Our guest is ​​Brian Johnson of Armorblox to discuss Social Security Administration impersonation scams. And the "UserSec Collective" says it's recruiting hacktivists for the Russian cause. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/123

Selected reading.
JokerSpy macOS malware used to attack Japanese crypto exchange (AppleInsider) 
Prominent cryptocurrency exchange infected with previously unseen Mac malware (Ars Technica)
New Fast-Developing ThirdEye Infostealer Pries Open System Information (Fortinet Blog)
Process Mockingjay: Echoing RWX In Userland To Achieve Code Execution (Security Joes)
New Mockingjay Process Injection Technique Could Let Malware Evade Detection (The Hacker News)
New Mockingjay process injection technique evades EDR detection (BleepingComputer)
Ukraine war made Switzerland hub for Chinese, Russian spies: Swiss intelligence (South China Morning Post) 
Swiss intelligence warns of fallout in cyberspace as West clamps down on spies (Record) 
The rise and fall of the Conti ransomware group (Global Initiative) 
The Trickbot/Conti Crypters: Where Are They Now? (Security Intelligence)                                                                                                                       
Ukraine at D+489: An influence contest, post-mutiny. (CyberWire) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>JokerSpy afflicts Macs. ThirdEye (not so blind). Mockingjay process injection as proof-of-concept. Switzerland expects Russia to increase cyberespionage as agent networks are disrupted. The fracturing of Conti, and the rise of its successors. The Washington Post’s Tim Starks explains the security of undersea cables. Our guest is ​​Brian Johnson of Armorblox to discuss Social Security Administration impersonation scams. And the "UserSec Collective" says it's recruiting hacktivists for the Russian cause. </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/123</p><p><br></p><h2>Selected reading.</h2><p><a href="https://appleinsider.com/articles/23/06/27/new-mysterious-macos-malware-infiltrates-crypto-exchange">JokerSpy macOS malware used to attack Japanese crypto exchange</a> (AppleInsider) </p><p><a href="https://arstechnica.com/security/2023/06/prominent-cryptocurrency-exchange-infected-with-previously-unseen-mac-malware/">Prominent cryptocurrency exchange infected with previously unseen Mac malware</a> (Ars Technica)</p><p><a href="https://www.fortinet.com/blog/threat-research/new-fast-developing-thirdeye-infostealer-pries-open-system-information">New Fast-Developing ThirdEye Infostealer Pries Open System Information</a> (Fortinet Blog)</p><p><a href="https://www.securityjoes.com/post/process-mockingjay-echoing-rwx-in-userland-to-achieve-code-execution">Process Mockingjay: Echoing RWX In Userland To Achieve Code Execution</a> (Security Joes)</p><p><a href="https://thehackernews.com/2023/06/new-mockingjay-process-injection.html">New Mockingjay Process Injection Technique Could Let Malware Evade Detection</a> (The Hacker News)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-mockingjay-process-injection-technique-evades-edr-detection/">New Mockingjay process injection technique evades EDR detection</a> (BleepingComputer)</p><p><a href="https://www.scmp.com/news/world/europe/article/3225458/ukraine-war-has-made-switzerland-hub-chinese-russian-spies-swiss-intelligence">Ukraine war made Switzerland hub for Chinese, Russian spies: Swiss intelligence</a> (South China Morning Post) </p><p><a href="https://therecord.media/switzerland-cyber-espionage-russian-diplomatic-expulsions">Swiss intelligence warns of fallout in cyberspace as West clamps down on spies </a>(Record) </p><p><a href="https://globalinitiative.net/analysis/conti-ransomware-group-cybercrime/">The rise and fall of the Conti ransomware group</a> (Global Initiative) </p><p><a href="https://securityintelligence.com/posts/trickbot-conti-crypters-where-are-they-now/">The Trickbot/Conti Crypters: Where Are They Now?</a> (Security Intelligence)                                                                                                                       </p><p><a href="https://thecyberwire.com/stories/aa7bc4a94c25497a96cbb6cae12749f1/ukraine-at-d489-an-influence-contest-post-mutiny">Ukraine at D+489: An influence contest, post-mutiny.</a> (CyberWire) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1702</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[338602a8-8167-11ed-9779-cbd896a330c9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5292896929.mp3?updated=1690333400" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Anatsa Trojan's new capabilities. Third-party breach hits airlines. Gas station blues. What’s up with the Internet Research Agency? Infrastructure threats. And DDoS grows more sophisticated.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1852/notes</link>
      <description>Anatsa Trojan reveals new capabilities. Airlines report employee data stolen in a third-party breach. Canadian energy company SUNCOR reports a cyberattack. What of the Internet Research Agency? Microsoft warns of a rising threat to infrastructure. Joe Carrigan describes an ill-advised phishing simulation. Mr. Security Answer Person John Pescatore takes on zero days. And DDoS grows more sophisticated.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/122

Selected reading.
Anatsa banking Trojan hits UK, US and DACH with new campaign (TreatFabric) 
Anatsa Android trojan now steals banking info from users in US, UK (BleepingComputer) 
Thousands of American Airlines and Southwest pilots impacted by third-party data breach (Bitdefender)
American Airlines, Southwest Airlines disclose data breaches affecting pilots (BleepingComputer) 
American Airlines, Southwest Airlines Impacted by Data Breach at Third-Party Provider (SecurityWeek)
Recruitment portal exposes data of US pilot candidates (Register) 
Suncor Energy says it experienced a cybersecurity incident (Reuters)
Suncor Energy cyberattack impacts Petro-Canada gas stations (BleepingComputer) 
Canadian oil giant Suncor confirms cyberattack after countrywide outages (Record) 
Wagner and the troll factories (POLITICO)
Cyber risks to critical infrastructure are on the rise (CEE Multi-Country News Center)
The lowly DDoS attack is showing signs of being anything but (Washington Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Jun 2023 20:15:00 -0000</pubDate>
      <itunes:title>Anatsa Trojan's new capabilities. Third-party breach hits airlines. Gas station blues. What’s up with the Internet Research Agency? Infrastructure threats. And DDoS grows more sophisticated.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1852</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Anatsa Trojan reveals new capabilities. Airlines report employee data stolen in a third-party breach. Canadian energy company SUNCOR reports a cyberattack. What of the Internet Research Agency? Microsoft warns of a rising threat to infrastructure. Joe Carrigan describes an ill-advised phishing simulation. Mr. Security Answer Person John Pescatore takes on zero days. And DDoS grows more sophisticated.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/122

Selected reading.
Anatsa banking Trojan hits UK, US and DACH with new campaign (TreatFabric) 
Anatsa Android trojan now steals banking info from users in US, UK (BleepingComputer) 
Thousands of American Airlines and Southwest pilots impacted by third-party data breach (Bitdefender)
American Airlines, Southwest Airlines disclose data breaches affecting pilots (BleepingComputer) 
American Airlines, Southwest Airlines Impacted by Data Breach at Third-Party Provider (SecurityWeek)
Recruitment portal exposes data of US pilot candidates (Register) 
Suncor Energy says it experienced a cybersecurity incident (Reuters)
Suncor Energy cyberattack impacts Petro-Canada gas stations (BleepingComputer) 
Canadian oil giant Suncor confirms cyberattack after countrywide outages (Record) 
Wagner and the troll factories (POLITICO)
Cyber risks to critical infrastructure are on the rise (CEE Multi-Country News Center)
The lowly DDoS attack is showing signs of being anything but (Washington Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Anatsa Trojan reveals new capabilities. Airlines report employee data stolen in a third-party breach. Canadian energy company SUNCOR reports a cyberattack. What of the Internet Research Agency? Microsoft warns of a rising threat to infrastructure. Joe Carrigan describes an ill-advised phishing simulation. Mr. Security Answer Person John Pescatore takes on zero days. And DDoS grows more sophisticated.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/122</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.threatfabric.com/blogs/anatsa-hits-uk-and-dach-with-new-campaign">Anatsa banking Trojan hits UK, US and DACH with new campaign</a> (TreatFabric) </p><p><a href="https://www.bleepingcomputer.com/news/security/anatsa-android-trojan-now-steals-banking-info-from-users-in-us-uk/">Anatsa Android trojan now steals banking info from users in US, UK</a> (BleepingComputer) </p><p><a href="https://www.bitdefender.com/blog/hotforsecurity/thousands-of-american-airlines-and-southwest-pilots-impacted-by-third-party-data-breach/">Thousands of American Airlines and Southwest pilots impacted by third-party data breach</a> (Bitdefender)</p><p><a href="https://www.bleepingcomputer.com/news/security/american-airlines-southwest-airlines-disclose-data-breaches-affecting-pilots/">American Airlines, Southwest Airlines disclose data breaches affecting pilots</a> (BleepingComputer) </p><p><a href="https://www.securityweek.com/american-airlines-southwest-airlines-impacted-by-data-breach-at-third-party-provider/">American Airlines, Southwest Airlines Impacted by Data Breach at Third-Party Provider</a> (SecurityWeek)</p><p><a href="https://www.theregister.com/2023/06/26/american_southwest_airline_breach/">Recruitment portal exposes data of US pilot candidates</a> (Register) </p><p><a href="https://www.reuters.com/business/energy/suncor-energy-says-it-experienced-cybersecurity-incident-2023-06-26/">Suncor Energy says it experienced a cybersecurity incident</a> (Reuters)</p><p><a href="https://www.bleepingcomputer.com/news/security/suncor-energy-cyberattack-impacts-petro-canada-gas-stations/">Suncor Energy cyberattack impacts Petro-Canada gas stations</a> (BleepingComputer) </p><p><a href="https://therecord.media/canadian-oil-giant-suncor-cyberattack">Canadian oil giant Suncor confirms cyberattack after countrywide outages</a> (Record) </p><p><a href="https://www.politico.com/newsletters/weekly-cybersecurity/2023/06/26/wagner-the-troll-factories-00103598">Wagner and the troll factories</a> (POLITICO)</p><p><a href="https://news.microsoft.com/en-cee/2023/06/26/cyber-risks-to-critical-infrastructure-are-on-the-rise/">Cyber risks to critical infrastructure are on the rise</a> (CEE Multi-Country News Center)</p><p><a href="https://www.washingtonpost.com/politics/2023/06/27/lowly-ddos-attack-is-showing-signs-being-anything/">The lowly DDoS attack is showing signs of being anything but</a> (Washington Post)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1666</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[336c7e3c-8167-11ed-9779-1718f68a90c8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3171803351.mp3?updated=1690333381" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Updates on Russia’s hybrid war. Transparent Tribe is back, with cyberespionage. A Trojanized version of Super Mario is out, and law enforcement seizes BreachForum’s domain. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1851/notes</link>
      <description>Russian ISPs blocked Google News as tension with the Wagner Group mounted Friday. Ukrainian hacktivist auxiliaries break into Russian radio broadcasts. New EU sanctions are directed against Russian IT firms. Transparent Tribe resurfaces against Indian military and academic targets. Unauthorized access is the leading cause of data breaches for the fifth year in a row. Trojanized Super Mario Brothers game spreads SupremeBot malware. Today, guests discuss the cybersecurity skills gap. Paul Rebasti of Lockheed Martin shares what they are doing to fill cybersecurity skills gap. Jenny Brinkley joins us from AWS Re:Inforce discusses opportunities from the cybersecurity skills gap. And law enforcement agencies seize BreachForums' web domain. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/121

Selected reading.
Ukraine at D+487: After the march on Moscow. (CyberWire)
Ukraine at D+486: The march on Moscow is over. (CyberWire)
Ukraine at D+485: “We are dying for the Russian people.” (CyberWire)
U.S. spies learned in mid-June Prigozhin was planning armed action in Russia (Washington Post) 
Google News Blocked in Russia as Feud With Mercenary Leader Intensifies (New York Times)
Air War: Pro-Ukraine Hackers Increasingly Breaking Into Russian Broadcasts With Anti-Kremlin Messages (RadioFreeEurope/RadioLiberty)
Fresh EU sanctions hit Russian IT firms (Computing)
Pakistan based hackers target Indian Army, education sector in new cyber attack (Telangana Today)
Pakistan-based hackers target Indian Army, education sector in new cyber attack (PGURUS)
‘Transparent Tribe’ comes out of hiding (Pune Times Mirror) 
2023 ForgeRock Identity Breach Report (ForgeRock)
Trojanized Super Mario Game Installer Spreads SupremeBot Malware (Cyble)
Trojanized Super Mario game used to install Windows malware (BleepingComputer)
FBI seizes BreachForums after arresting its owner Pompompurin in March (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 26 Jun 2023 20:15:00 -0000</pubDate>
      <itunes:title>Updates on Russia’s hybrid war. Transparent Tribe is back, with cyberespionage. A Trojanized version of Super Mario is out, and law enforcement seizes BreachForum’s domain. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1851</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Russian ISPs blocked Google News as tension with the Wagner Group mounted Friday. Ukrainian hacktivist auxiliaries break into Russian radio broadcasts. New EU sanctions are directed against Russian IT firms. Transparent Tribe resurfaces against Indian military and academic targets. Unauthorized access is the leading cause of data breaches for the fifth year in a row. Trojanized Super Mario Brothers game spreads SupremeBot malware. Today, guests discuss the cybersecurity skills gap. Paul Rebasti of Lockheed Martin shares what they are doing to fill cybersecurity skills gap. Jenny Brinkley joins us from AWS Re:Inforce discusses opportunities from the cybersecurity skills gap. And law enforcement agencies seize BreachForums' web domain. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/121

Selected reading.
Ukraine at D+487: After the march on Moscow. (CyberWire)
Ukraine at D+486: The march on Moscow is over. (CyberWire)
Ukraine at D+485: “We are dying for the Russian people.” (CyberWire)
U.S. spies learned in mid-June Prigozhin was planning armed action in Russia (Washington Post) 
Google News Blocked in Russia as Feud With Mercenary Leader Intensifies (New York Times)
Air War: Pro-Ukraine Hackers Increasingly Breaking Into Russian Broadcasts With Anti-Kremlin Messages (RadioFreeEurope/RadioLiberty)
Fresh EU sanctions hit Russian IT firms (Computing)
Pakistan based hackers target Indian Army, education sector in new cyber attack (Telangana Today)
Pakistan-based hackers target Indian Army, education sector in new cyber attack (PGURUS)
‘Transparent Tribe’ comes out of hiding (Pune Times Mirror) 
2023 ForgeRock Identity Breach Report (ForgeRock)
Trojanized Super Mario Game Installer Spreads SupremeBot Malware (Cyble)
Trojanized Super Mario game used to install Windows malware (BleepingComputer)
FBI seizes BreachForums after arresting its owner Pompompurin in March (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russian ISPs blocked Google News as tension with the Wagner Group mounted Friday. Ukrainian hacktivist auxiliaries break into Russian radio broadcasts. New EU sanctions are directed against Russian IT firms. Transparent Tribe resurfaces against Indian military and academic targets. Unauthorized access is the leading cause of data breaches for the fifth year in a row. Trojanized Super Mario Brothers game spreads SupremeBot malware. Today, guests discuss the cybersecurity skills gap. Paul Rebasti of Lockheed Martin shares what they are doing to fill cybersecurity skills gap. Jenny Brinkley joins us from AWS Re:Inforce discusses opportunities from the cybersecurity skills gap. And law enforcement agencies seize BreachForums' web domain. </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/121</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/stories/49d366871ebb4fcc8775c15ecd7b5597/ukraine-at-d487-after-the-march-on-moscow">Ukraine at D+487: After the march on Moscow.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/8de9e9d7525146818e428fcc90c3f1fe/ukraine-at-d486-the-march-on-moscow-is-over">Ukraine at D+486: The march on Moscow is over.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/bf07fd1eec87497a88e1a7704c42bce6/ukraine-at-d485-we-are-dying-for-the-russian-people">Ukraine at D+485: “We are dying for the Russian people.”</a> (CyberWire)</p><p><a href="https://www.washingtonpost.com/national-security/2023/06/24/us-intelligence-prigozhin-putin/">U.S. spies learned in mid-June Prigozhin was planning armed action in Russia</a> (Washington Post) </p><p><a href="https://www.nytimes.com/2023/06/23/world/europe/google-news-russia-prigozhin.html">Google News Blocked in Russia as Feud With Mercenary Leader Intensifies</a> (New York Times)</p><p><a href="https://www.rferl.org/a/pro-ukraine-hackers-russian-broadcasts-/32474061.html">Air War: Pro-Ukraine Hackers Increasingly Breaking Into Russian Broadcasts With Anti-Kremlin Messages</a> (RadioFreeEurope/RadioLiberty)</p><p><a href="https://www.computing.co.uk/news/4118781/fresh-eu-sanctions-hit-russian-firms">Fresh EU sanctions hit Russian IT firms </a>(Computing)</p><p><a href="https://telanganatoday.com/pakistan-based-hackers-target-indian-army-education-sector-in-new-cyber-attack">Pakistan based hackers target Indian Army, education sector in new cyber attack</a> (Telangana Today)</p><p><a href="https://www.pgurus.com/pakistan-based-hackers-target-indian-army-education-sector-in-new-cyber-attack/">Pakistan-based hackers target Indian Army, education sector in new cyber attack</a> (PGURUS)</p><p><a href="https://punemirror.com/others/scitech/transparent-tribe-comes-out-of-hiding/cid1687653731.htm">‘Transparent Tribe’ comes out of hiding</a> (Pune Times Mirror) </p><p><a href="https://www.forgerock.com/resources/analyst-report/2023-forgerock-identity-breach-report">2023 ForgeRock Identity Breach Report</a> (ForgeRock)</p><p><a href="https://blog.cyble.com/2023/06/23/trojanized-super-mario-game-installer-spreads-supremebot-malware/">Trojanized Super Mario Game Installer Spreads SupremeBot Malware</a> (Cyble)</p><p><a href="https://www.bleepingcomputer.com/news/security/trojanized-super-mario-game-used-to-install-windows-malware/">Trojanized Super Mario game used to install Windows malware</a> (BleepingComputer)</p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-seizes-breachforums-after-arresting-its-owner-pompompurin-in-march/">FBI seizes BreachForums after arresting its owner Pompompurin in March</a> (BleepingComputer)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1853</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[34415dbe-8167-11ed-9779-c77731d962c9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3466317476.mp3?updated=1690333368" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Slavik Markovich: Time is of the essence. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/155/notes</link>
      <description>Slavik Markovich, CEO of Descope joins Dave to discuss his career as a serial entrepreneur. Before Descope, he co-founded and was the CEO of Demisto, a leader in the SOAR industry, which was acquired by Palo Alto Networks in 2019 for $560M, where he then served as SVP of Products. Before co-founding Demisto, Slavik was VP &amp; CTO of database technologies at McAfee. He joined McAfee via the acquisition of Sentrigo, a database security startup he co-founded and served as CTO for. He goes into depth of his career changes throughout the years and how that has helped lead him to where he is now in his career. He shares that as a CEO and found of multiple companies he values time and hard workers. He says " I think we really stress the importance of, uh, of responsibility. So if, if you kinda take something, you, you make sure to finish it and on time, if you promise to do something, you do that. And so that's really important for us." We thank Slavik for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 25 Jun 2023 07:00:00 -0000</pubDate>
      <itunes:title>Slavik Markovich: Time is of the essence. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>155</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Slavik Markovich, CEO of Descope joins Dave to discuss his career as a serial entrepreneur. Before Descope, he co-founded and was the CEO of Demisto, a leader in the SOAR industry, which was acquired by Palo Alto Networks in 2019 for $560M, where he then served as SVP of Products. Before co-founding Demisto, Slavik was VP &amp; CTO of database technologies at McAfee. He joined McAfee via the acquisition of Sentrigo, a database security startup he co-founded and served as CTO for. He goes into depth of his career changes throughout the years and how that has helped lead him to where he is now in his career. He shares that as a CEO and found of multiple companies he values time and hard workers. He says " I think we really stress the importance of, uh, of responsibility. So if, if you kinda take something, you, you make sure to finish it and on time, if you promise to do something, you do that. And so that's really important for us." We thank Slavik for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Slavik Markovich, CEO of Descope joins Dave to discuss his career as a serial entrepreneur. Before Descope, he co-founded and was the CEO of Demisto, a leader in the SOAR industry, which was acquired by Palo Alto Networks in 2019 for $560M, where he then served as SVP of Products. Before co-founding Demisto, Slavik was VP &amp; CTO of database technologies at McAfee. He joined McAfee via the acquisition of Sentrigo, a database security startup he co-founded and served as CTO for. He goes into depth of his career changes throughout the years and how that has helped lead him to where he is now in his career. He shares that as a CEO and found of multiple companies he values time and hard workers. He says " I think we really stress the importance of, uh, of responsibility. So if, if you kinda take something, you, you make sure to finish it and on time, if you promise to do something, you do that. And so that's really important for us." We thank Slavik for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>371</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[efd9b720-11f3-11ee-b4c4-37ce5caf8a77]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3008646548.mp3?updated=1687533289" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unleashing the crypto gold rush. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/287/notes</link>
      <description>Ian Ahl from Permiso's PØ Labs joins Dave to discuss their research on "Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor." First observing the group in 2021, they discovered GUI-vil is a financially motivated threat group primarily focused on unauthorized cryptocurrency mining activities.
The research states "the group has been observed exploiting Amazon Web Services (AWS) EC2 instances to facilitate their illicit crypto mining operations." This group is dangerous because unlike many groups focused on crypto mining, GUI-Vil apply a personal touch when establishing a foothold in an environment.
The research can be found here:
Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Jun 2023 07:00:00 -0000</pubDate>
      <itunes:title>Unleashing the crypto gold rush. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>287</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ian Ahl from Permiso's PØ Labs joins Dave to discuss their research on "Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor." First observing the group in 2021, they discovered GUI-vil is a financially motivated threat group primarily focused on unauthorized cryptocurrency mining activities.
The research states "the group has been observed exploiting Amazon Web Services (AWS) EC2 instances to facilitate their illicit crypto mining operations." This group is dangerous because unlike many groups focused on crypto mining, GUI-Vil apply a personal touch when establishing a foothold in an environment.
The research can be found here:
Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ian Ahl from Permiso's PØ Labs joins Dave to discuss their research on "Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor." First observing the group in 2021, they discovered GUI-vil is a financially motivated threat group primarily focused on unauthorized cryptocurrency mining activities.</p><p>The research states "the group has been observed exploiting Amazon Web Services (AWS) EC2 instances to facilitate their illicit crypto mining operations." This group is dangerous because unlike many groups focused on crypto mining, GUI-Vil apply a personal touch when establishing a foothold in an environment.</p><p>The research can be found here:</p><ul><li><a href="https://permiso.io/blog/s/unmasking-guivil-new-cloud-threat-actor/">Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[001f0ef0-11f4-11ee-8371-0faaa2848832]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7231864433.mp3?updated=1687490795" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Two sets of China-linked cyberespionage activities. Mirai’s new vectors. A Cozy Bear sighting. Anonymous Sudan gets less anonymous.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1850/notes</link>
      <description>An update on Barracuda ESG exploitation. Camaro Dragon’s current cyberespionage tools spread through infected USB drives. The Mirai botnet is spreading through new vectors. Midnight Blizzard is out and about . Ukraine is experiencing a "wave" of cyberattacks during its counteroffensive. Karen Worstell from VMware shares her experience with technical debt. Rick Howard speaks with CJ Moses, CISO of Amazon Web Services. And Anonymous Sudan turns out to be no more anonymous or Sudanese than your Uncle Louie.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/120

Selected reading.
Barracuda ESG exploitation (Proofpoint)
Beyond the Horizon: Traveling the World on Camaro Dragon’s USB Flash Drives (Check Point Research)
Chinese malware accidentally infects networked storage (Register)
Akamai SIRT Security Advisory: CVE-2023-26801 Exploited to Spread Mirai Botnet Malware (Akamai).
Mirai botnet targets 22 flaws in D-Link, Zyxel, Netgear devices (BleepingComputer) 
Neuberger: Ukraine experiencing a ‘surge’ in cyberattacks as it executes counteroffensive (Record) 
Microsoft warns of rising NOBELIUM credential attacks on defense sector (HackRead).
Anonymous Sudan: neither anonymous nor Sudanese (Cybernews)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 23 Jun 2023 20:15:00 -0000</pubDate>
      <itunes:title>Two sets of China-linked cyberespionage activities. Mirai’s new vectors. A Cozy Bear sighting. Anonymous Sudan gets less anonymous.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1850</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An update on Barracuda ESG exploitation. Camaro Dragon’s current cyberespionage tools spread through infected USB drives. The Mirai botnet is spreading through new vectors. Midnight Blizzard is out and about . Ukraine is experiencing a "wave" of cyberattacks during its counteroffensive. Karen Worstell from VMware shares her experience with technical debt. Rick Howard speaks with CJ Moses, CISO of Amazon Web Services. And Anonymous Sudan turns out to be no more anonymous or Sudanese than your Uncle Louie.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/120

Selected reading.
Barracuda ESG exploitation (Proofpoint)
Beyond the Horizon: Traveling the World on Camaro Dragon’s USB Flash Drives (Check Point Research)
Chinese malware accidentally infects networked storage (Register)
Akamai SIRT Security Advisory: CVE-2023-26801 Exploited to Spread Mirai Botnet Malware (Akamai).
Mirai botnet targets 22 flaws in D-Link, Zyxel, Netgear devices (BleepingComputer) 
Neuberger: Ukraine experiencing a ‘surge’ in cyberattacks as it executes counteroffensive (Record) 
Microsoft warns of rising NOBELIUM credential attacks on defense sector (HackRead).
Anonymous Sudan: neither anonymous nor Sudanese (Cybernews)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An update on Barracuda ESG exploitation. Camaro Dragon’s current cyberespionage tools spread through infected USB drives. The Mirai botnet is spreading through new vectors. Midnight Blizzard is out and about . Ukraine is experiencing a "wave" of cyberattacks during its counteroffensive. Karen Worstell from VMware shares her experience with technical debt. Rick Howard speaks with CJ Moses, CISO of Amazon Web Services. And Anonymous Sudan turns out to be no more anonymous or Sudanese than your Uncle Louie.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/120</p><p><br></p><h2>Selected reading.</h2><p><a href="https://twitter.com/threatinsight/status/1671987722183909378">Barracuda ESG exploitation</a> (Proofpoint)</p><p><a href="https://research.checkpoint.com/2023/beyond-the-horizon-traveling-the-world-on-camaro-dragons-usb-flash-drives/">Beyond the Horizon: Traveling the World on Camaro Dragon’s USB Flash Drives</a> (Check Point Research)</p><p><a href="https://www.theregister.com/2023/06/23/camaro_dragon_usb_malware_spreads/">Chinese malware accidentally infects networked storage</a> (Register)</p><p><a href="https://www.akamai.com/blog/security-research/cve-2023-26801-exploited-spreading-mirai-botnet">Akamai SIRT Security Advisory: CVE-2023-26801 Exploited to Spread Mirai Botnet Malware</a> (Akamai).</p><p><a href="https://www.bleepingcomputer.com/news/security/mirai-botnet-targets-22-flaws-in-d-link-zyxel-netgear-devices/">Mirai botnet targets 22 flaws in D-Link, Zyxel, Netgear devices</a> (BleepingComputer) </p><p><a href="https://therecord.media/neuberger-white-house-ukraine-seeing-surge-in-cyberattacks-russia">Neuberger: Ukraine experiencing a ‘surge’ in cyberattacks as it executes counteroffensive</a> (Record) </p><p><a href="https://www.hackread.com/microsoft-nobelium-credential-attacks-defense/">Microsoft warns of rising NOBELIUM credential attacks on defense sector</a> (HackRead).</p><p><a href="https://cybernews.com/editorial/anonymous-sudan-explained/">Anonymous Sudan: neither anonymous nor Sudanese</a> (Cybernews)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2041</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3281f8ee-8167-11ed-9779-8f3809a24cc3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5881593497.mp3?updated=1687810118" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber spies and vulnerability goodbyes. RedLine Stealer and Vidar: the cryptkeepers. Social engineering TTPs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1849/notes</link>
      <description>North Korea's APT37 deploys FadeStealer to steal information from its targets. Apple patches vulnerabilities under active exploitation. Access to a US satellite is being hawked in a Russophone cybercrime forum. Russian hacktivist auxiliaries say they’ve disrupted IFC.org. Unmasking pig-butchering scams. Social engineering as a method of account takeover. Fraudsters seen abusing generative AI. Sergey Medved from Quest Software describes the “Great Cloud Repatriation”. Mark Ryland of AWS speaks with Rick Howard about software defined perimeters. And embedded URLs in malware.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/119

Selected reading.
RedEyes Group Wiretapping Individuals (APT37) (Ahn Lab)
Apple fixes iPhone software flaws used in widespread hacks of Russians (The Washington Post)
Apple issues emergency patch to address alleged spyware vulnerability (Cyberscoop)
Apple patch fixes zero-day kernel hole reported by Kaspersky – update now! (Sophos)
Military Satellite Access Sold on Russian Hacker Forum for $15,000 (HackRead)
Well done. Russian hackers shut down the IMF (Dzen.ru)
Why Malware Crypting Services Deserve More Scrutiny (KrebsOnSecurity)
Unmasking Pig-Butchering Scams And Protecting Your Financial Future (Trend Micro)
Classic Account Takeover via the Direct Deposit Change (Avanan)
Q2 2023 Digital Trust &amp; Safety Index (Sift)
Compromised Domains account for over 50% of Embedded URLs in Malware Phishing Campaigns (Cofense)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 22 Jun 2023 21:10:00 -0000</pubDate>
      <itunes:title>Cyber spies and vulnerability goodbyes. RedLine Stealer and Vidar: the cryptkeepers. Social engineering TTPs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1849</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>North Korea's APT37 deploys FadeStealer to steal information from its targets. Apple patches vulnerabilities under active exploitation. Access to a US satellite is being hawked in a Russophone cybercrime forum. Russian hacktivist auxiliaries say they’ve disrupted IFC.org. Unmasking pig-butchering scams. Social engineering as a method of account takeover. Fraudsters seen abusing generative AI. Sergey Medved from Quest Software describes the “Great Cloud Repatriation”. Mark Ryland of AWS speaks with Rick Howard about software defined perimeters. And embedded URLs in malware.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/119

Selected reading.
RedEyes Group Wiretapping Individuals (APT37) (Ahn Lab)
Apple fixes iPhone software flaws used in widespread hacks of Russians (The Washington Post)
Apple issues emergency patch to address alleged spyware vulnerability (Cyberscoop)
Apple patch fixes zero-day kernel hole reported by Kaspersky – update now! (Sophos)
Military Satellite Access Sold on Russian Hacker Forum for $15,000 (HackRead)
Well done. Russian hackers shut down the IMF (Dzen.ru)
Why Malware Crypting Services Deserve More Scrutiny (KrebsOnSecurity)
Unmasking Pig-Butchering Scams And Protecting Your Financial Future (Trend Micro)
Classic Account Takeover via the Direct Deposit Change (Avanan)
Q2 2023 Digital Trust &amp; Safety Index (Sift)
Compromised Domains account for over 50% of Embedded URLs in Malware Phishing Campaigns (Cofense)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>North Korea's APT37 deploys FadeStealer to steal information from its targets. Apple patches vulnerabilities under active exploitation. Access to a US satellite is being hawked in a Russophone cybercrime forum. Russian hacktivist auxiliaries say they’ve disrupted IFC.org. Unmasking pig-butchering scams. Social engineering as a method of account takeover. Fraudsters seen abusing generative AI. Sergey Medved from Quest Software describes the “Great Cloud Repatriation”. Mark Ryland of AWS speaks with Rick Howard about software defined perimeters. And embedded URLs in malware.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/119</p><p><br></p><h2>Selected reading.</h2><p><a href="https://asec.ahnlab.com/en/54349/">RedEyes Group Wiretapping Individuals (APT37)</a> (Ahn Lab)</p><p><a href="https://www.washingtonpost.com/technology/2023/06/21/apple-hacks-russia-kaspersky-nsa/">Apple fixes iPhone software flaws used in widespread hacks of Russians</a> (The Washington Post)</p><p><a href="https://cyberscoop.com/apple-security-patch-kaspersky-russia-spyware/">Apple issues emergency patch to address alleged spyware vulnerability</a> (Cyberscoop)</p><p><a href="https://nakedsecurity.sophos.com/2023/06/22/apple-patch-fixes-zero-day-kernel-hole-reported-by-kaspersky-update-now/">Apple patch fixes zero-day kernel hole reported by Kaspersky – update now!</a> (Sophos)</p><p><a href="https://www.hackread.com/military-satellite-access-russian-hacker-forum/">Military Satellite Access Sold on Russian Hacker Forum for $15,000</a> (HackRead)</p><p><a href="https://dzen.ru/a/ZJLwGBvC4DEVvdRG">Well done. Russian hackers shut down the IMF</a> (Dzen.ru)</p><p><a href="https://krebsonsecurity.com/2023/06/why-malware-crypting-services-deserve-more-scrutiny/%5C">Why Malware Crypting Services Deserve More Scrutiny</a> (KrebsOnSecurity)</p><p><a href="https://www.trendmicro.com/vinfo/es/security/news/cybercrime-and-digital-threats/unmasking-pig-butchering-scams-and-protecting-your-financial-future">Unmasking Pig-Butchering Scams And Protecting Your Financial Future</a> (Trend Micro)</p><p><a href="https://www.avanan.com/blog/classic-account-takeover-via-the-direct-deposit-change">Classic Account Takeover via the Direct Deposit Change</a> (Avanan)</p><p><a href="https://resources.sift.com/ebook/q2-2023-digital-trust-safety-index-ai-and-automation/">Q2 2023 Digital Trust &amp; Safety Index</a> (Sift)</p><p><a href="https://cofense.com/blog/compromised-abused-domains-in-malware-phishing-campaigns/">Compromised Domains account for over 50% of Embedded URLs in Malware Phishing Campaigns</a> (Cofense)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1909</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[32ce85e2-8167-11ed-9779-8ba22e1289bf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2742616006.mp3?updated=1690333212" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A “flea” on the wall conducts cyberespionage. Cl0p update. Astrology finds its way into your computer systems. Fancy Bear sighted, again.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1848/notes</link>
      <description>The Flea APT sets its sights on diplomatic targets. An update on the Cl0p gang’s exploitation of a MOVEit vulnerability. Unpatched TP-Link Archer routers are meeting their match in the Condi botnet. The Muddled Libra threat group compromises companies in a variety of industries. A look into passwordless authentication. Derek Manky of Fortinet describes the Global Threat Landscape. Rick Howard speaks with Rod Wallace from AWS about data lakes. And Fancy Bear noses its way into Ukrainian servers.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/118

Selected reading.
Graphican: Flea Uses New Backdoor in Attacks Targeting Foreign Ministries (Symantec)
Ke3chang (MITRE)
Third MOVEit vulnerability raises alarms as US Agriculture Department says it may be impacted (The Record)
PwC and EY impacted by MOVEit cyber attack (Cybersecurity Hub)
Norton Parent Says Employee Data Stolen in MOVEit Ransomware Attack (SecurityWeek)
MOVEit hack: Gang claims not to have BBC, BA and Boots data (BBC)
US govt offers $10 million bounty for info on Clop ransomware (BleepingComputer)
Condi DDoS Botnet Spreads via TP-Link's CVE-2023-1389 (Fortinet)
CVE-2023-1389 Detail (NIST)
Download for Archer AX21 V3 (TP-Link)
Threat Group Assessment: Muddled Libra (Unit 42)
Axiad and ESG Survey: 82% of Respondents Indicate Passwordless Authentication is a Top Five Priority (PR Newswire)
APT28 group used three Roundcube exploits (CVE-2020-35730, CVE-2021-44026, CVE-2020-12641) during another espionage campaign (CERT-UA#6805) (CERT-UA)
BlueDelta Exploits Ukrainian Government Roundcube Mail Servers to Support Espionage Activities (The Record)
CVE-2020-35730 Detail (NIST)
CVE-2023-23397 Detail (NIST)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 21 Jun 2023 20:15:00 -0000</pubDate>
      <itunes:title>A “flea” on the wall conducts cyberespionage. Cl0p update. Astrology finds its way into your computer systems. Fancy Bear sighted, again.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1848</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Flea APT sets its sights on diplomatic targets. An update on the Cl0p gang’s exploitation of a MOVEit vulnerability. Unpatched TP-Link Archer routers are meeting their match in the Condi botnet. The Muddled Libra threat group compromises companies in a variety of industries. A look into passwordless authentication. Derek Manky of Fortinet describes the Global Threat Landscape. Rick Howard speaks with Rod Wallace from AWS about data lakes. And Fancy Bear noses its way into Ukrainian servers.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/118

Selected reading.
Graphican: Flea Uses New Backdoor in Attacks Targeting Foreign Ministries (Symantec)
Ke3chang (MITRE)
Third MOVEit vulnerability raises alarms as US Agriculture Department says it may be impacted (The Record)
PwC and EY impacted by MOVEit cyber attack (Cybersecurity Hub)
Norton Parent Says Employee Data Stolen in MOVEit Ransomware Attack (SecurityWeek)
MOVEit hack: Gang claims not to have BBC, BA and Boots data (BBC)
US govt offers $10 million bounty for info on Clop ransomware (BleepingComputer)
Condi DDoS Botnet Spreads via TP-Link's CVE-2023-1389 (Fortinet)
CVE-2023-1389 Detail (NIST)
Download for Archer AX21 V3 (TP-Link)
Threat Group Assessment: Muddled Libra (Unit 42)
Axiad and ESG Survey: 82% of Respondents Indicate Passwordless Authentication is a Top Five Priority (PR Newswire)
APT28 group used three Roundcube exploits (CVE-2020-35730, CVE-2021-44026, CVE-2020-12641) during another espionage campaign (CERT-UA#6805) (CERT-UA)
BlueDelta Exploits Ukrainian Government Roundcube Mail Servers to Support Espionage Activities (The Record)
CVE-2020-35730 Detail (NIST)
CVE-2023-23397 Detail (NIST)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Flea APT sets its sights on diplomatic targets. An update on the Cl0p gang’s exploitation of a MOVEit vulnerability. Unpatched TP-Link Archer routers are meeting their match in the Condi botnet. The Muddled Libra threat group compromises companies in a variety of industries. A look into passwordless authentication. Derek Manky of Fortinet describes the Global Threat Landscape. Rick Howard speaks with Rod Wallace from AWS about data lakes. And Fancy Bear noses its way into Ukrainian servers.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/118</p><p><br></p><h2>Selected reading.</h2><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/flea-backdoor-microsoft-graph-apt15">Graphican: Flea Uses New Backdoor in Attacks Targeting Foreign Ministries</a> (Symantec)</p><p><a href="https://attack.mitre.org/groups/G0004/">Ke3chang</a> (MITRE)</p><p><a href="https://therecord.media/third-moveit-vulnerability-raises-alarms">Third MOVEit vulnerability raises alarms as US Agriculture Department says it may be impacted</a> (The Record)</p><p><a href="https://www.cshub.com/attacks/news/pwc-and-ey-impacted-by-moveit-cyber-attack">PwC and EY impacted by MOVEit cyber attack</a> (Cybersecurity Hub)</p><p><a href="https://www.securityweek.com/norton-parent-says-employee-data-stolen-in-moveit-ransomware-attack/">Norton Parent Says Employee Data Stolen in MOVEit Ransomware Attack</a> (SecurityWeek)</p><p><a href="https://www.bbc.com/news/technology-65965453">MOVEit hack: Gang claims not to have BBC, BA and Boots data</a> (BBC)</p><p><a href="https://www.bleepingcomputer.com/news/security/us-govt-offers-10-million-bounty-for-info-on-clop-ransomware/">US govt offers $10 million bounty for info on Clop ransomware</a> (BleepingComputer)</p><p><a href="https://www.fortinet.com/blog/threat-research/condi-ddos-botnet-spreads-via-tp-links-cve-2023-1389">Condi DDoS Botnet Spreads via TP-Link's CVE-2023-1389</a> (Fortinet)</p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-1389">CVE-2023-1389 Detail</a> (NIST)</p><p><a href="https://www.tp-link.com/us/support/download/archer-ax21/v3/#Firmware">Download for Archer AX21 V3</a> (TP-Link)</p><p><a href="https://unit42.paloaltonetworks.com/muddled-libra/">Threat Group Assessment: Muddled Libra</a> (Unit 42)</p><p><a href="https://www.prnewswire.com/news-releases/axiad-and-esg-survey-82-of-respondents-indicate-passwordless-authentication-is-a-top-five-priority-301856468.html">Axiad and ESG Survey: 82% of Respondents Indicate Passwordless Authentication is a Top Five Priority</a> (PR Newswire)</p><p><a href="https://cert.gov.ua/article/4905829">APT28 group used three Roundcube exploits (CVE-2020-35730, CVE-2021-44026, CVE-2020-12641) during another espionage campaign (CERT-UA#6805)</a> (CERT-UA)</p><p><a href="https://www.recordedfuture.com/bluedelta-exploits-ukrainian-government-roundcube-mail-servers">BlueDelta Exploits Ukrainian Government Roundcube Mail Servers to Support Espionage Activities</a> (The Record)</p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2020-35730">CVE-2020-35730 Detail</a> (NIST)</p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-23397">CVE-2023-23397 Detail</a> (NIST)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1702</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[335383a0-8167-11ed-9779-0f25ac1c53b7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5146356806.mp3?updated=1690333180" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Reddit sees bad luck as a BlackCat attack crosses their path. The C2C market is more mystical nowadays. Hacktivist auxiliaries and false flags in the hybrid war.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1847/notes</link>
      <description>The BlackCat gang crosses Reddit’s path, threatening to leak stolen data. Mystic Stealer malware evades and creates a feedback loop in the C2C market. RDStealer is a new cyberespionage tool, seen in the wild. The United States offers a reward for information on the Cl0p ransomware gang. KillNet, REvil, and Anonymous Sudan form a "DARKNET Parliament" and “sanction” the European banking system. The British Government commits £25 million in cybersecurity aid to Ukraine. Ben Yelin explains cyber disclosure rules proposed by the SEC. Rick Howard speaks with Nancy Wang of AWS about the importance of backups and restores. And what researchers are turning up in cloud honeypots.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/117

Selected reading.
Reddit: Hackers demand $4.5 million and API policy changes (Computing)
Mystic Stealer – Evolving “stealth” Malware (Cyfirma)
Mystic Stealer: The New Kid on the Block (Zscaler)
Unpacking RDStealer: An Exfiltration Malware Targeting RDP Workloads (Bitdefender)
MOVEit Transfer and MOVEit Cloud Vulnerability (Progress Software)
CVE-2023-35708 Detail (NIST)
U.S. Energy Dept gets two ransom notices as MOVEit hack claims more victims (Reuters)
US govt offers $10 million bounty for info on Clop ransomware (BleepingComputer)
Ransomware Group Starts Naming Victims of MOVEit Zero-Day Attacks (SecurityWeek)
A bear in wolf’s clothing: Insights into the infrastructure used by Anonymous Sudan to attack Australian organisations (CyberCX)
Anonymous Sudan: Religious Hacktivists or Russian Front Group? (Trustwave)
UK to give Ukraine major boost to mount counteroffensive (UK Government)
2023 Honeypotting in the Cloud Report: Attackers Discover and Weaponize Exposed Cloud Assets and Secrets in Minutes (Orca Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Jun 2023 20:45:00 -0000</pubDate>
      <itunes:title>Reddit sees bad luck as a BlackCat attack crosses their path. The C2C market is more mystical nowadays. Hacktivist auxiliaries and false flags in the hybrid war.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1847</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The BlackCat gang crosses Reddit’s path, threatening to leak stolen data. Mystic Stealer malware evades and creates a feedback loop in the C2C market. RDStealer is a new cyberespionage tool, seen in the wild. The United States offers a reward for information on the Cl0p ransomware gang. KillNet, REvil, and Anonymous Sudan form a "DARKNET Parliament" and “sanction” the European banking system. The British Government commits £25 million in cybersecurity aid to Ukraine. Ben Yelin explains cyber disclosure rules proposed by the SEC. Rick Howard speaks with Nancy Wang of AWS about the importance of backups and restores. And what researchers are turning up in cloud honeypots.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/117

Selected reading.
Reddit: Hackers demand $4.5 million and API policy changes (Computing)
Mystic Stealer – Evolving “stealth” Malware (Cyfirma)
Mystic Stealer: The New Kid on the Block (Zscaler)
Unpacking RDStealer: An Exfiltration Malware Targeting RDP Workloads (Bitdefender)
MOVEit Transfer and MOVEit Cloud Vulnerability (Progress Software)
CVE-2023-35708 Detail (NIST)
U.S. Energy Dept gets two ransom notices as MOVEit hack claims more victims (Reuters)
US govt offers $10 million bounty for info on Clop ransomware (BleepingComputer)
Ransomware Group Starts Naming Victims of MOVEit Zero-Day Attacks (SecurityWeek)
A bear in wolf’s clothing: Insights into the infrastructure used by Anonymous Sudan to attack Australian organisations (CyberCX)
Anonymous Sudan: Religious Hacktivists or Russian Front Group? (Trustwave)
UK to give Ukraine major boost to mount counteroffensive (UK Government)
2023 Honeypotting in the Cloud Report: Attackers Discover and Weaponize Exposed Cloud Assets and Secrets in Minutes (Orca Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The BlackCat gang crosses Reddit’s path, threatening to leak stolen data. Mystic Stealer malware evades and creates a feedback loop in the C2C market. RDStealer is a new cyberespionage tool, seen in the wild. The United States offers a reward for information on the Cl0p ransomware gang. KillNet, REvil, and Anonymous Sudan form a "DARKNET Parliament" and “sanction” the European banking system. The British Government commits £25 million in cybersecurity aid to Ukraine. Ben Yelin explains cyber disclosure rules proposed by the SEC. Rick Howard speaks with Nancy Wang of AWS about the importance of backups and restores. And what researchers are turning up in cloud honeypots.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/117</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.computing.co.uk/news/4118342/reddit-hackers-demand-usd-million-api-policy-changes">Reddit: Hackers demand $4.5 million and API policy changes</a> (Computing)</p><p><a href="https://www.cyfirma.com/outofband/mystic-stealer-evolving-stealth-malware/">Mystic Stealer – Evolving “stealth” Malware</a> (Cyfirma)</p><p><a href="https://www.zscaler.com/blogs/security-research/mystic-stealer">Mystic Stealer: The New Kid on the Block</a> (Zscaler)</p><p><a href="https://www.bitdefender.com/blog/businessinsights/unpacking-rdstealer-an-exfiltration-malware-targeting-rdp-workloads/">Unpacking RDStealer: An Exfiltration Malware Targeting RDP Workloads</a> (Bitdefender)</p><p><a href="https://www.progress.com/security/moveit-transfer-and-moveit-cloud-vulnerability">MOVEit Transfer and MOVEit Cloud Vulnerability</a> (Progress Software)</p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-35708">CVE-2023-35708 Detail</a> (NIST)</p><p><a href="https://www.reuters.com/technology/us-energy-dept-got-two-ransom-requests-cl0p-data-breach-2023-06-16/">U.S. Energy Dept gets two ransom notices as MOVEit hack claims more victims</a> (Reuters)</p><p><a href="https://www.bleepingcomputer.com/news/security/us-govt-offers-10-million-bounty-for-info-on-clop-ransomware/">US govt offers $10 million bounty for info on Clop ransomware</a> (BleepingComputer)</p><p><a href="https://www.securityweek.com/ransomware-group-starts-naming-victims-of-moveit-zero-day-attacks/">Ransomware Group Starts Naming Victims of MOVEit Zero-Day Attacks</a> (SecurityWeek)</p><p><a href="https://cybercx.com.au/a-bear-in-wolfs-clothing/">A bear in wolf’s clothing: Insights into the infrastructure used by Anonymous Sudan to attack Australian organisations</a> (CyberCX)</p><p><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/anonymous-sudan-religious-hacktivists-or-russian-front-group/">Anonymous Sudan: Religious Hacktivists or Russian Front Group?</a> (Trustwave)</p><p><a href="https://www.gov.uk/government/news/uk-to-give-ukraine-major-boost-to-mount-counteroffensive">UK to give Ukraine major boost to mount counteroffensive</a> (UK Government)</p><p><a href="https://orca.security/resources/blog/2023-honeypotting-in-the-cloud-report/">2023 Honeypotting in the Cloud Report: Attackers Discover and Weaponize Exposed Cloud Assets and Secrets in Minutes</a> (Orca Security)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1737</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[339fe4c0-8167-11ed-9779-cf4eacb22063]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1893588853.mp3?updated=1690333165" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lorna Mahlock: Build bridges. [Combat support] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/154/notes</link>
      <description>Major General Lorna Mahlock, Deputy Director for Combat Support from the National Security Agency (NSA) sits down with Dave to discuss her long and impressive career leading up to he working for one of the most prestigious security agencies. Originally born in Kingston, Jamaica, Lorna immigrated to Brooklyn, New York and enlisted in the United States Marine Corps as a field radio operator. She shares how eye opening the military was for her, moving through ranks, and eventually landing into working at the Pentagon for the Chairman of the Joint Chiefs of staff. She moved around widening her array of paths, landing in her current role. Lorna shares some wisdom, mentioning how she likes to talk about ladders and how useful creating ladders in life can be, she says "I think about ladders in terms of horizontal component, in that you can create bridges, right? And, um, ways over obstacles, uh, for, for not only, uh, for yourself, but for others and an entire organization." We thank Lorna for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 18 Jun 2023 07:00:00 -0000</pubDate>
      <itunes:title>Lorna Mahlock: Build bridges. [Combat support] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>154</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Major General Lorna Mahlock, Deputy Director for Combat Support from the National Security Agency (NSA) sits down with Dave to discuss her long and impressive career leading up to he working for one of the most prestigious security agencies. Originally born in Kingston, Jamaica, Lorna immigrated to Brooklyn, New York and enlisted in the United States Marine Corps as a field radio operator. She shares how eye opening the military was for her, moving through ranks, and eventually landing into working at the Pentagon for the Chairman of the Joint Chiefs of staff. She moved around widening her array of paths, landing in her current role. Lorna shares some wisdom, mentioning how she likes to talk about ladders and how useful creating ladders in life can be, she says "I think about ladders in terms of horizontal component, in that you can create bridges, right? And, um, ways over obstacles, uh, for, for not only, uh, for yourself, but for others and an entire organization." We thank Lorna for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Major General Lorna Mahlock, Deputy Director for Combat Support from the National Security Agency (NSA) sits down with Dave to discuss her long and impressive career leading up to he working for one of the most prestigious security agencies. Originally born in Kingston, Jamaica, Lorna immigrated to Brooklyn, New York and enlisted in the United States Marine Corps as a field radio operator. She shares how eye opening the military was for her, moving through ranks, and eventually landing into working at the Pentagon for the Chairman of the Joint Chiefs of staff. She moved around widening her array of paths, landing in her current role. Lorna shares some wisdom, mentioning how she likes to talk about ladders and how useful creating ladders in life can be, she says "I think about ladders in terms of horizontal component, in that you can create bridges, right? And, um, ways over obstacles, uh, for, for not only, uh, for yourself, but for others and an entire organization." We thank Lorna for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>465</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f1c0e8d8-0c85-11ee-8cc4-9b7f38accc3c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7377900042.mp3?updated=1687293507" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Managing machine learning risks. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/286/notes</link>
      <description>Our guest, Johannes Ullrich from SANS Institute, joins Dave to discuss their research on "Machine Learning Risks: Attacks Against Apache NiFi." Using their honeypot network, researchers were able to collect some interesting data about a threat actor who is currently going after exposed Apache NiFi servers.
Researchers state “On May 19th, our distributed sensor network detected a notable spike in requests for ‘/nifi.’” Investigating further, they instructed a subset of their sensors to forward requests to an actual Apache NiFi instance and within a couple of hours the honeypot was completely compromised.
The research can be found here:
Machine Learning Risks: Attacks Against Apache NiFi

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Jun 2023 07:00:00 -0000</pubDate>
      <itunes:title>Managing machine learning risks. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>286</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Our guest, Johannes Ullrich from SANS Institute, joins Dave to discuss their research on "Machine Learning Risks: Attacks Against Apache NiFi." Using their honeypot network, researchers were able to collect some interesting data about a threat actor who is currently going after exposed Apache NiFi servers.
Researchers state “On May 19th, our distributed sensor network detected a notable spike in requests for ‘/nifi.’” Investigating further, they instructed a subset of their sensors to forward requests to an actual Apache NiFi instance and within a couple of hours the honeypot was completely compromised.
The research can be found here:
Machine Learning Risks: Attacks Against Apache NiFi

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our guest, Johannes Ullrich from SANS Institute, joins Dave to discuss their research on "Machine Learning Risks: Attacks Against Apache NiFi." Using their honeypot network, researchers were able to collect some interesting data about a threat actor who is currently going after exposed Apache NiFi servers.</p><p>Researchers state “On May 19th, our distributed sensor network detected a notable spike in requests for ‘/nifi.’” Investigating further, they instructed a subset of their sensors to forward requests to an actual Apache NiFi instance and within a couple of hours the honeypot was completely compromised.</p><p>The research can be found here:</p><ul><li><a href="https://jbu.me/nifireport.pdf">Machine Learning Risks: Attacks Against Apache NiFi</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1114</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[040614a0-0c86-11ee-a65f-170ab0a2fed6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5080384299.mp3?updated=1686928324" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Cl0p gang moves its way into US government systems. It’ll take multiple showers to rinse out Shampoo malware. Hybrid war update. Arrests and indictments.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1846/notes</link>
      <description>The US Government discloses exploitations of MOVEit vulnerabilities, and the Department of Energy is targeted by the Cl0p gang. CISA releases an updated advisory for Telerik vulnerabilities affecting Government servers. Shampoo malware emerges with multiple persistence mechanisms. How the IT Army of Ukraine can exemplify a cyber auxiliary. Russophone gamers are being targeted with ransomware. An alleged LockBit operator has been arrested. The FBI’s Deputy Assistant Director for cyber Cynthia Kaiser joins us with cybercriminal trends and recent successes. Our guest is Will Markow from Lightcast, speaking with Simone Petrella about data-driven strategic workforce decisions. And a federal grand jury indicts the alleged Discord Papers leaker.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/116

Selected reading.
US government hit by Russia's Clop in MOVEit mass attack (The Register)
Energy Department among ‘several’ federal agencies hit by MOVEit breach (Federal News Network)
Threat Actors Exploit Progress Telerik Vulnerabilities in Multiple U.S. Government IIS Servers (CISA)
CVE-2019-18935 Detail (NIST)
CVE-2017-9248 Detail (NIST)
Cryptographic Weakness (Telerik)
Shampoo: A New ChromeLoader Campaign (HP)
Cyber attacks on Rotterdam and Groningen websites (World Cargo News)
The Dynamics of the Ukrainian IT Army’s Campaign in Russia (Lawfare)
Watch: Why early failures in Ukraine's counter-offensive aren't Russian victories (The Telegraph)
Russian War Report: Anti-Ukrainian counteroffensive narratives fail to go viral (Atlantic Council)
Threat Actor Targets Russian Gaming Community With WannaCry-Imitator (Cyble)
Hackers infect Russian-speaking gamers with fake WannaCry ransomware (The Record)
Russian national arrested in Arizona, charged for alleged role in LockBit ransomware attacks (CyberScoop)
Suspected LockBit ransomware affiliate arrested, charged in US (BleepingComputer)
Russian national arrested in US for deploying LockBit ransomware (The Record)
Guardsman indicted on charges of disclosing classified national defense information (AP News)
Charges Against Alleged Pentagon Leaker Jack Teixeira Explained (Newsweek)
Jack Teixeira, Pentagon leaks suspect, indicted by federal grand jury (The Guardian)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 16 Jun 2023 20:15:00 -0000</pubDate>
      <itunes:title>The Cl0p gang moves its way into US government systems. It’ll take multiple showers to rinse out Shampoo malware. Hybrid war update. Arrests and indictments.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1846</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The US Government discloses exploitations of MOVEit vulnerabilities, and the Department of Energy is targeted by the Cl0p gang. CISA releases an updated advisory for Telerik vulnerabilities affecting Government servers. Shampoo malware emerges with multiple persistence mechanisms. How the IT Army of Ukraine can exemplify a cyber auxiliary. Russophone gamers are being targeted with ransomware. An alleged LockBit operator has been arrested. The FBI’s Deputy Assistant Director for cyber Cynthia Kaiser joins us with cybercriminal trends and recent successes. Our guest is Will Markow from Lightcast, speaking with Simone Petrella about data-driven strategic workforce decisions. And a federal grand jury indicts the alleged Discord Papers leaker.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/116

Selected reading.
US government hit by Russia's Clop in MOVEit mass attack (The Register)
Energy Department among ‘several’ federal agencies hit by MOVEit breach (Federal News Network)
Threat Actors Exploit Progress Telerik Vulnerabilities in Multiple U.S. Government IIS Servers (CISA)
CVE-2019-18935 Detail (NIST)
CVE-2017-9248 Detail (NIST)
Cryptographic Weakness (Telerik)
Shampoo: A New ChromeLoader Campaign (HP)
Cyber attacks on Rotterdam and Groningen websites (World Cargo News)
The Dynamics of the Ukrainian IT Army’s Campaign in Russia (Lawfare)
Watch: Why early failures in Ukraine's counter-offensive aren't Russian victories (The Telegraph)
Russian War Report: Anti-Ukrainian counteroffensive narratives fail to go viral (Atlantic Council)
Threat Actor Targets Russian Gaming Community With WannaCry-Imitator (Cyble)
Hackers infect Russian-speaking gamers with fake WannaCry ransomware (The Record)
Russian national arrested in Arizona, charged for alleged role in LockBit ransomware attacks (CyberScoop)
Suspected LockBit ransomware affiliate arrested, charged in US (BleepingComputer)
Russian national arrested in US for deploying LockBit ransomware (The Record)
Guardsman indicted on charges of disclosing classified national defense information (AP News)
Charges Against Alleged Pentagon Leaker Jack Teixeira Explained (Newsweek)
Jack Teixeira, Pentagon leaks suspect, indicted by federal grand jury (The Guardian)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US Government discloses exploitations of MOVEit vulnerabilities, and the Department of Energy is targeted by the Cl0p gang. CISA releases an updated advisory for Telerik vulnerabilities affecting Government servers. Shampoo malware emerges with multiple persistence mechanisms. How the IT Army of Ukraine can exemplify a cyber auxiliary. Russophone gamers are being targeted with ransomware. An alleged LockBit operator has been arrested. The FBI’s Deputy Assistant Director for cyber Cynthia Kaiser joins us with cybercriminal trends and recent successes. Our guest is Will Markow from Lightcast, speaking with Simone Petrella about data-driven strategic workforce decisions. And a federal grand jury indicts the alleged Discord Papers leaker.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/116</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.theregister.com/2023/06/15/clop_broke_into_the_doe/">US government hit by Russia's Clop in MOVEit mass attack</a> (The Register)</p><p><a href="https://federalnewsnetwork.com/cybersecurity/2023/06/energy-department-among-several-federal-agencies-hit-by-moveit-breach/">Energy Department among ‘several’ federal agencies hit by MOVEit breach</a> (Federal News Network)</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-074a">Threat Actors Exploit Progress Telerik Vulnerabilities in Multiple U.S. Government IIS Servers</a> (CISA)</p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2019-18935">CVE-2019-18935 Detail</a> (NIST)</p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2017-9248">CVE-2017-9248 Detail</a> (NIST)</p><p><a href="https://docs.telerik.com/devtools/aspnet-ajax/knowledge-base/common-cryptographic-weakness">Cryptographic Weakness</a> (Telerik)</p><p><a href="https://threatresearch.ext.hp.com/shampoo-a-new-chromeloader-campaign/">Shampoo: A New ChromeLoader Campaign</a> (HP)</p><p><a href="https://www.worldcargonews.com/news/cyber-attacks-on-rotterdam-and-groningen-websites-71733">Cyber attacks on Rotterdam and Groningen websites</a> (World Cargo News)</p><p><a href="https://www.lawfareblog.com/dynamics-ukrainian-it-armys-campaign-russia">The Dynamics of the Ukrainian IT Army’s Campaign in Russia</a> (Lawfare)</p><p><a href="https://www.telegraph.co.uk/world-news/2023/06/16/ukraine-counteroffensive-russia-leopard-bradley-tank-losses/">Watch: Why early failures in Ukraine's counter-offensive aren't Russian victories</a> (The Telegraph)</p><p><a href="https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-counteroffensive-narratives/#counteroffensive">Russian War Report: Anti-Ukrainian counteroffensive narratives fail to go viral</a> (Atlantic Council)</p><p><a href="https://blog.cyble.com/2023/06/13/threat-actor-targets-russian-gaming-community-with-wannacry-imitator/">Threat Actor Targets Russian Gaming Community With WannaCry-Imitator</a> (Cyble)</p><p><a href="https://therecord.media/hackers-infect-russian-gamers-with-wannacry">Hackers infect Russian-speaking gamers with fake WannaCry ransomware</a> (The Record)</p><p><a href="https://cyberscoop.com/lockbit-russian-national-arrested/">Russian national arrested in Arizona, charged for alleged role in LockBit ransomware attacks</a> (CyberScoop)</p><p><a href="https://www.bleepingcomputer.com/news/security/suspected-lockbit-ransomware-affiliate-arrested-charged-in-us">Suspected LockBit ransomware affiliate arrested, charged in US</a> (BleepingComputer)</p><p><a href="https://therecord.media/russian-arrested-in-us-for-lockbit">Russian national arrested in US for deploying LockBit ransomware</a> (The Record)</p><p><a href="https://apnews.com/article/justice-department-classified-documents-air-national-guard-8ff290f461ce396e25b2979a8b92bef1">Guardsman indicted on charges of disclosing classified national defense information</a> (AP News)</p><p><a href="https://www.newsweek.com/charges-against-alleged-pentagon-leaker-jack-teixeira-explained-1807101">Charges Against Alleged Pentagon Leaker Jack Teixeira Explained</a> (Newsweek)</p><p><a href="https://www.theguardian.com/us-news/2023/jun/15/jack-teixeira-pentagon-leaks-indicted-federal-grand-jury">Jack Teixeira, Pentagon leaks suspect, indicted by federal grand jury</a> (The Guardian)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1885</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[32695a78-8167-11ed-9779-0f8304d3c03d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8020306455.mp3?updated=1690333151" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chinese threat actors reel in Barracuda appliances. Diicot: the gang formerly known as Mexals, with Romanian ties. Recent Russian cyberespionage against Ukraine and its sympathizers.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1845/notes</link>
      <description>A Chinese threat actor exploits a Barracuda vulnerability. The upgraded version of the Android GravityRAT can exfiltrate WhatsApp messages. Cybercriminals pose as security researchers to propagate malware. Updates on the Vidar threat operation. A new Romanian hacking group has emerged. Shuckworm collects intelligence, and may support targeting. The Washington Post’s Tim Starks explains the section 702 debate. Our guest is Rotem Iram from At-Bay with insights on email security. And Russia's Cadet Blizzard.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/115

Selected reading.
Android GravityRAT goes after WhatsApp backups (ESET)
Quarterly Adversarial Threat Report (Facebook)
Barracuda ESG Zero-Day Vulnerability (CVE-2023-2868) Exploited Globally by Aggressive and Skilled Actor, Suspected Links to China (Mandiant)
GravityRAT - The Two-Year Evolution Of An APT Targeting India (Cisco Talos)
Fake Security Researcher GitHub Repositories Deliver Malicious Implant (VulnCheck)
Darth Vidar: The Aesir Strike Back (Team Cymru)
Tracking Diicot: an emerging Romanian threat actor (Cado Security)
Shuckworm: Inside Russia’s Relentless Cyber Campaign Against Ukraine (Symantec)
Cadet Blizzard emerges as a novel and distinct Russian threat actor (Microsoft)
Destructive malware targeting Ukrainian organizations (Microsoft)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 15 Jun 2023 20:15:00 -0000</pubDate>
      <itunes:title>Chinese threat actors reel in Barracuda appliances. Diicot: the gang formerly known as Mexals, with Romanian ties. Recent Russian cyberespionage against Ukraine and its sympathizers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A Chinese threat actor exploits a Barracuda vulnerability. The upgraded version of the Android GravityRAT can exfiltrate WhatsApp messages. Cybercriminals pose as security researchers to propagate malware. Updates on the Vidar threat operation. A new Romanian hacking group has emerged. Shuckworm collects intelligence, and may support targeting. The Washington Post’s Tim Starks explains the section 702 debate. Our guest is Rotem Iram from At-Bay with insights on email security. And Russia's Cadet Blizzard.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/115

Selected reading.
Android GravityRAT goes after WhatsApp backups (ESET)
Quarterly Adversarial Threat Report (Facebook)
Barracuda ESG Zero-Day Vulnerability (CVE-2023-2868) Exploited Globally by Aggressive and Skilled Actor, Suspected Links to China (Mandiant)
GravityRAT - The Two-Year Evolution Of An APT Targeting India (Cisco Talos)
Fake Security Researcher GitHub Repositories Deliver Malicious Implant (VulnCheck)
Darth Vidar: The Aesir Strike Back (Team Cymru)
Tracking Diicot: an emerging Romanian threat actor (Cado Security)
Shuckworm: Inside Russia’s Relentless Cyber Campaign Against Ukraine (Symantec)
Cadet Blizzard emerges as a novel and distinct Russian threat actor (Microsoft)
Destructive malware targeting Ukrainian organizations (Microsoft)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Chinese threat actor exploits a Barracuda vulnerability. The upgraded version of the Android GravityRAT can exfiltrate WhatsApp messages. Cybercriminals pose as security researchers to propagate malware. Updates on the Vidar threat operation. A new Romanian hacking group has emerged. Shuckworm collects intelligence, and may support targeting. The Washington Post’s Tim Starks explains the section 702 debate. Our guest is Rotem Iram from At-Bay with insights on email security. And Russia's Cadet Blizzard.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/115</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.welivesecurity.com/2023/06/15/android-gravityrat-goes-after-whatsapp-backups/">Android GravityRAT goes after WhatsApp backups</a> (ESET)</p><p><a href="https://about.fb.com/wp-content/uploads/2023/05/Meta-Quarterly-Adversarial-Threat-Report-Q1-2023.pdf">Quarterly Adversarial Threat Report</a> (Facebook)</p><p><a href="https://www.mandiant.com/resources/blog/barracuda-esg-exploited-globally">Barracuda ESG Zero-Day Vulnerability (CVE-2023-2868) Exploited Globally by Aggressive and Skilled Actor, Suspected Links to China</a> (Mandiant)</p><p><a href="https://blog.talosintelligence.com/gravityrat-two-year-evolution-of-apt/">GravityRAT - The Two-Year Evolution Of An APT Targeting India</a> (Cisco Talos)</p><p><a href="https://vulncheck.com/blog/fake-repos-deliver-malicious-implant">Fake Security Researcher GitHub Repositories Deliver Malicious Implant</a> (VulnCheck)</p><p><a href="https://www.team-cymru.com/post/darth-vidar-the-aesir-strike-back">Darth Vidar: The Aesir Strike Back</a> (Team Cymru)</p><p><a href="https://www.cadosecurity.com/tracking-diicot-an-emerging-romanian-threat-actor/">Tracking Diicot: an emerging Romanian threat actor</a> (Cado Security)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/shuckworm-russia-ukraine-military">Shuckworm: Inside Russia’s Relentless Cyber Campaign Against Ukraine</a> (Symantec)</p><p><a href="https://www.microsoft.com/en-us/security/blog/2023/06/14/cadet-blizzard-emerges-as-a-novel-and-distinct-russian-threat-actor/">Cadet Blizzard emerges as a novel and distinct Russian threat actor</a> (Microsoft)</p><p><a href="https://www.microsoft.com/en-us/security/blog/2022/01/15/destructive-malware-targeting-ukrainian-organizations/">Destructive malware targeting Ukrainian organizations</a> (Microsoft)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1738</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[32e8c8e4-8167-11ed-9779-7f1b450b223a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4278465179.mp3?updated=1690333137" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA23-165A – Understanding Ransomware Threat Actors: LockBit.</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/52/notes</link>
      <description>CISA, FBI, the MS-ISAC, and international partners are releasing this Cybersecurity Advisory to detail LockBit ransomware incidents and provide recommended mitigations to enable network defenders to proactively improve their organization’s defenses against this ransomware operation.
AA23-165A Alert, Technical Details, and Mitigations
Stopransomware.gov is a whole-of-government approach that gives one central location for ransomware resources and alerts.
See the Center for Internet Security (CIS) Critical Security Controls (CIS Controls) https://www.cisecurity.org/insights/white-papers/cis-community-defense-model-2-0 for information on strengthening an organization’s cybersecurity posture through implementing a prescriptive, prioritized, and simplified set of best.
See the CIS Community Defense Model 2.0 (CDM 2.0) for the effectiveness of the CIS Controls against the most prevalent types of attacks and how CDM 2.0 can be used to design, prioritize, implement, and improve an organization’s cybersecurity program.
See Blueprint for Ransomware Defense for a clear, actionable framework for ransomware mitigation, response, and recovery built around the CIS Controls.
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 15 Jun 2023 16:10:00 -0000</pubDate>
      <itunes:title>CISA Alert AA23-165A – Understanding Ransomware Threat Actors: LockBit.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>52</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA, FBI, the MS-ISAC, and international partners are releasing this Cybersecurity Advisory to detail LockBit ransomware incidents and provide recommended mitigations to enable network defenders to proactively improve their organization’s defenses against this ransomware operation.
AA23-165A Alert, Technical Details, and Mitigations
Stopransomware.gov is a whole-of-government approach that gives one central location for ransomware resources and alerts.
See the Center for Internet Security (CIS) Critical Security Controls (CIS Controls) https://www.cisecurity.org/insights/white-papers/cis-community-defense-model-2-0 for information on strengthening an organization’s cybersecurity posture through implementing a prescriptive, prioritized, and simplified set of best.
See the CIS Community Defense Model 2.0 (CDM 2.0) for the effectiveness of the CIS Controls against the most prevalent types of attacks and how CDM 2.0 can be used to design, prioritize, implement, and improve an organization’s cybersecurity program.
See Blueprint for Ransomware Defense for a clear, actionable framework for ransomware mitigation, response, and recovery built around the CIS Controls.
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA, FBI, the MS-ISAC, and international partners are releasing this Cybersecurity Advisory to detail LockBit ransomware incidents and provide recommended mitigations to enable network defenders to proactively improve their organization’s defenses against this ransomware operation.</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-165a">AA23-165A Alert, Technical Details, and Mitigations</a></p><p><a href="https://www.cisa.gov/stopransomware">Stopransomware.gov</a> is a whole-of-government approach that gives one central location for ransomware resources and alerts.</p><p>See the <a href="https://www.cisecurity.org/controls">Center for Internet Security (CIS) Critical Security Controls (CIS Controls)</a> <a href="https://www.cisecurity.org/insights/white-papers/cis-community-defense-model-2-0">https://www.cisecurity.org/insights/white-papers/cis-community-defense-model-2-0</a> for information on strengthening an organization’s cybersecurity posture through implementing a prescriptive, prioritized, and simplified set of best.</p><p>See the <a href="https://www.cisecurity.org/insights/white-papers/cis-community-defense-model-2-0">CIS Community Defense Model 2.0 (CDM 2.0)</a> for the effectiveness of the <a href="https://www.cisecurity.org/controls">CIS Controls</a> against the most prevalent types of attacks and how <a href="https://www.cisecurity.org/insights/white-papers/cis-community-defense-model-2-0">CDM 2.0</a> can be used to design, prioritize, implement, and improve an organization’s cybersecurity program.</p><p>See <a href="https://securityandtechnology.org/wp-content/uploads/2022/08/IST-Blueprint-for-Ransomware-Defense.pdf">Blueprint for Ransomware Defense</a> for a clear, actionable framework for ransomware mitigation, response, and recovery built around the CIS Controls.</p><p>No-cost cyber hygiene services: <a href="https://www.cisa.gov/cyber-hygiene-services">Cyber Hygiene Services</a> and <a href="https://github.com/cisagov/cset/">Ransomware Readiness Assessment</a>.</p><p>U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email <a href="mailto:dib_defense@cyber.nsa.gov">dib_defense@cyber.nsa.gov</a> </p><p>To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="mailto:report@cisa.gov">report@cisa.gov</a>, or call (888) 282-0870, or report incidents to your local FBI field office.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>163</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3164ec22-0b97-11ee-9f58-6b4ab5e241a5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3216654213.mp3?updated=1686839821" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A Joint Advisory on LockBit. AI chatbots: the grammarians of tomorrow. KillNet makes a deal with the Devil (Sec). The private-sector’s piece in the hybrid war puzzle.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1844/notes</link>
      <description>The Five Eyes, alongside a couple of allies, issue a LockBit advisory. AI aids in proofreading phishing attacks. Anonymous Sudan mounts nuisance-level DDoS attacks against US companies. France alleges a disinformation campaign conducted by Russian actors. KillNet says it's partnered with the less-well-known Devil Sec. The private cybersecurity industry's effect on the war in Ukraine. Carole Theriault ponders oversharing on social media. Our guest is Duncan Jones from Quantinuum on the threats of Harvest Now, Decrypt Later tactics. And a note on this month’s Patch Tuesday.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/114

Selected reading.
Understanding Ransomware Threat Actors: LockBit (Joint Cybersecurity Advisory)
U.S. Measures in Response to the Crisis in Sudan (US Department of State)
Generative AI Enables Threat Actors to Create More (and More Sophisticated) Email Attacks (Abnormal Security)
France Accuses Russia of Online Disinformation Campaign (Bloomberg)
The Private Sector’s Evolving Role in Conflict—From Cyber Assistance to Intelligence (R Street)
Microsoft Patches Critical Windows Vulns, Warns of Code Execution Risks (SecurityWeek)
Patch Tuesday: Critical Flaws in Adobe Commerce Software (SecurityWeek)
Patch Tuesday fixes 4 critical RCE bugs, and a bunch of Office holes (Naked Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 14 Jun 2023 20:15:00 -0000</pubDate>
      <itunes:title>A Joint Advisory on LockBit. AI chatbots: the grammarians of tomorrow. KillNet makes a deal with the Devil (Sec). The private-sector’s piece in the hybrid war puzzle.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1844</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Five Eyes, alongside a couple of allies, issue a LockBit advisory. AI aids in proofreading phishing attacks. Anonymous Sudan mounts nuisance-level DDoS attacks against US companies. France alleges a disinformation campaign conducted by Russian actors. KillNet says it's partnered with the less-well-known Devil Sec. The private cybersecurity industry's effect on the war in Ukraine. Carole Theriault ponders oversharing on social media. Our guest is Duncan Jones from Quantinuum on the threats of Harvest Now, Decrypt Later tactics. And a note on this month’s Patch Tuesday.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/114

Selected reading.
Understanding Ransomware Threat Actors: LockBit (Joint Cybersecurity Advisory)
U.S. Measures in Response to the Crisis in Sudan (US Department of State)
Generative AI Enables Threat Actors to Create More (and More Sophisticated) Email Attacks (Abnormal Security)
France Accuses Russia of Online Disinformation Campaign (Bloomberg)
The Private Sector’s Evolving Role in Conflict—From Cyber Assistance to Intelligence (R Street)
Microsoft Patches Critical Windows Vulns, Warns of Code Execution Risks (SecurityWeek)
Patch Tuesday: Critical Flaws in Adobe Commerce Software (SecurityWeek)
Patch Tuesday fixes 4 critical RCE bugs, and a bunch of Office holes (Naked Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Five Eyes, alongside a couple of allies, issue a LockBit advisory. AI aids in proofreading phishing attacks. Anonymous Sudan mounts nuisance-level DDoS attacks against US companies. France alleges a disinformation campaign conducted by Russian actors. KillNet says it's partnered with the less-well-known Devil Sec. The private cybersecurity industry's effect on the war in Ukraine. Carole Theriault ponders oversharing on social media. Our guest is Duncan Jones from Quantinuum on the threats of Harvest Now, Decrypt Later tactics. And a note on this month’s Patch Tuesday.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/114</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/sites/default/files/2023-06/aa23-165a_understanding_TA_LockBit.pdf">Understanding Ransomware Threat Actors: LockBit</a> (Joint Cybersecurity Advisory)</p><p><a href="https://www.state.gov/u-s-measures-in-response-to-the-crisis-in-sudan/">U.S. Measures in Response to the Crisis in Sudan</a> (US Department of State)</p><p><a href="https://abnormalsecurity.com/blog/generative-ai-chatgpt-enables-threat-actors-more-attacks">Generative AI Enables Threat Actors to Create More (and More Sophisticated) Email Attacks</a> (Abnormal Security)</p><p><a href="https://www.bloomberg.com/news/articles/2023-06-13/france-accuses-russia-of-online-disinformation-campaign#xj4y7vzkg">France Accuses Russia of Online Disinformation Campaign</a> (Bloomberg)</p><p><a href="http://rstreet.org/events/the-private-sectors-evolving-role-in-conflict/">The Private Sector’s Evolving Role in Conflict—From Cyber Assistance to Intelligence</a> (R Street)</p><p><a href="https://www.securityweek.com/microsoft-patches-critical-windows-vulns-warn-of-code-execution-risks/">Microsoft Patches Critical Windows Vulns, Warns of Code Execution Risks</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/patch-tuesday-critical-flaws-in-adobe-commerce-software/">Patch Tuesday: Critical Flaws in Adobe Commerce Software</a> (SecurityWeek)</p><p><a href="https://nakedsecurity.sophos.com/2023/06/14/patch-tuesday-fixes-4-critical-rce-bugs-and-a-bunch-of-office-holes/">Patch Tuesday fixes 4 critical RCE bugs, and a bunch of Office holes</a> (Naked Security)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1366</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3339ba56-8167-11ed-9779-8fb894595650]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3098965589.mp3?updated=1690333119" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA's new Binding Operational Directive. “CosmicEnergy” tool doesn’t pose a cosmic threat. Hackers’ homage to fromage in attacks against the Swiss government. Industry advice for the White House.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1843/notes</link>
      <description>CISA issues a new Binding Operational Directive. An update on CosmicEnergy. Hackers’ homage to fromage in attacks against the Swiss government. Ukraine's Cyber Police shut down a pro-Russian bot farm. Clothing and footwear retailers see impersonation and online fraud. A 2021 ransomware attack contributed to a hospital closing. A proof-of-concept exploit of a patched MOVEit vulnerability. An industry letter calls for a new framework on the White House cybersecurity strategy. Joe Carrigan examines a ChatGPT fueled phishing scam. Our guest is Neha Rungta, Applied Science Director at AWS Identity discussing Amazon Verified Permissions. And trends in cyber risks for small and medium businesses.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/113

Selected reading.
Binding Operational Directive 23-02 (US Cybersecurity and Infrastructure Security Agency)
COSMICENERGY: New OT Malware Possibly Related To Russian Emergency Response Exercises (Mandiant)
Dragos Analysis Determines COSMICENERGY Is Not an Immediate Threat (Dragos)
More than 4,000 bots to discredit the Defense Forces of Ukraine and spread propaganda in favor of Russia: the police of Vinnytsia eliminated a large-scale bot farm (Ukraine Cyber Police)
Ukraine police raid social media bot farm accused of pro-Russia propaganda (The Record)
Widespread Brand Impersonation Scam Campaign Targeting Hundreds of the Most Popular Apparel Brands (Bolster)
An Illinois hospital is the first health care facility to link its closing to a ransomware attack (NBC News)
Ransomware attack causes Illinois hospital to close (Becker’s Hospital Review)
New BlackFog research: 61% of SMBs were victims of a cyberattack in the last year (BlackFog)
Switzerland warns that a ransomware gang may have accessed government data (The Record)
Swiss government warns of ongoing DDoS attacks, data leak (BleepingComputer)
Swiss Government Targeted by Series of Cyber-Attacks (Infosecurity Magazine)
DDoS attack on Federal Administration: various Federal Administration websites and applications unavailable (The Federal Council of the Swiss Government)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Jun 2023 21:30:00 -0000</pubDate>
      <itunes:title>CISA's new Binding Operational Directive. “CosmicEnergy” tool doesn’t pose a cosmic threat. Hackers’ homage to fromage in attacks against the Swiss government. Industry advice for the White House.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1843</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA issues a new Binding Operational Directive. An update on CosmicEnergy. Hackers’ homage to fromage in attacks against the Swiss government. Ukraine's Cyber Police shut down a pro-Russian bot farm. Clothing and footwear retailers see impersonation and online fraud. A 2021 ransomware attack contributed to a hospital closing. A proof-of-concept exploit of a patched MOVEit vulnerability. An industry letter calls for a new framework on the White House cybersecurity strategy. Joe Carrigan examines a ChatGPT fueled phishing scam. Our guest is Neha Rungta, Applied Science Director at AWS Identity discussing Amazon Verified Permissions. And trends in cyber risks for small and medium businesses.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/113

Selected reading.
Binding Operational Directive 23-02 (US Cybersecurity and Infrastructure Security Agency)
COSMICENERGY: New OT Malware Possibly Related To Russian Emergency Response Exercises (Mandiant)
Dragos Analysis Determines COSMICENERGY Is Not an Immediate Threat (Dragos)
More than 4,000 bots to discredit the Defense Forces of Ukraine and spread propaganda in favor of Russia: the police of Vinnytsia eliminated a large-scale bot farm (Ukraine Cyber Police)
Ukraine police raid social media bot farm accused of pro-Russia propaganda (The Record)
Widespread Brand Impersonation Scam Campaign Targeting Hundreds of the Most Popular Apparel Brands (Bolster)
An Illinois hospital is the first health care facility to link its closing to a ransomware attack (NBC News)
Ransomware attack causes Illinois hospital to close (Becker’s Hospital Review)
New BlackFog research: 61% of SMBs were victims of a cyberattack in the last year (BlackFog)
Switzerland warns that a ransomware gang may have accessed government data (The Record)
Swiss government warns of ongoing DDoS attacks, data leak (BleepingComputer)
Swiss Government Targeted by Series of Cyber-Attacks (Infosecurity Magazine)
DDoS attack on Federal Administration: various Federal Administration websites and applications unavailable (The Federal Council of the Swiss Government)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA issues a new Binding Operational Directive. An update on CosmicEnergy. Hackers’ homage to fromage in attacks against the Swiss government. Ukraine's Cyber Police shut down a pro-Russian bot farm. Clothing and footwear retailers see impersonation and online fraud. A 2021 ransomware attack contributed to a hospital closing. A proof-of-concept exploit of a patched MOVEit vulnerability. An industry letter calls for a new framework on the White House cybersecurity strategy. Joe Carrigan examines a ChatGPT fueled phishing scam. Our guest is Neha Rungta, Applied Science Director at AWS Identity discussing Amazon Verified Permissions. And trends in cyber risks for small and medium businesses.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/113</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/news-events/directives/binding-operational-directive-23-02">Binding Operational Directive 23-02</a> (US Cybersecurity and Infrastructure Security Agency)</p><p><a href="https://www.mandiant.com/resources/blog/cosmicenergy-ot-malware-russian-response">COSMICENERGY: New OT Malware Possibly Related To Russian Emergency Response Exercises</a> (Mandiant)</p><p><a href="https://hub.dragos.com/intel-brief-dragos-analysis-determines-cosmicenergy-is-not-an-immediate-threat">Dragos Analysis Determines COSMICENERGY Is Not an Immediate Threat</a> (Dragos)</p><p><a href="https://cyberpolice.gov.ua/news/ponad--botiv-dlya-dyskredytacziyi-syl-oborony-ukrayiny-ta-poshyrennya-propagandy-na-koryst-rosiyi-policzejski-vinnychchyny-likviduvaly-masshtabnu-botofermu-7868/">More than 4,000 bots to discredit the Defense Forces of Ukraine and spread propaganda in favor of Russia: the police of Vinnytsia eliminated a large-scale bot farm</a> (Ukraine Cyber Police)</p><p><a href="https://therecord.media/ukraine-police-raid-social-media-bot-farm">Ukraine police raid social media bot farm accused of pro-Russia propaganda</a> (The Record)</p><p><a href="https://bolster.ai/blog/brand-impersonation-scam">Widespread Brand Impersonation Scam Campaign Targeting Hundreds of the Most Popular Apparel Brands</a> (Bolster)</p><p><a href="https://www.nbcnews.com/tech/security/illinois-hospital-links-closure-ransomware-attack-rcna85983">An Illinois hospital is the first health care facility to link its closing to a ransomware attack</a> (NBC News)</p><p><a href="https://www.beckershospitalreview.com/cybersecurity/ransomware-attack-causes-illinois-hospital-to-close.html">Ransomware attack causes Illinois hospital to close</a> (Becker’s Hospital Review)</p><p><a href="https://www.blackfog.com/smbs-were-victims-cyberattack/">New BlackFog research: 61% of SMBs were victims of a cyberattack in the last year</a> (BlackFog)</p><p><a href="https://therecord.media/swiss-ransomware-attack-xplain-government-data">Switzerland warns that a ransomware gang may have accessed government data</a> (The Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/swiss-government-warns-of-ongoing-ddos-attacks-data-leak/">Swiss government warns of ongoing DDoS attacks, data leak</a> (BleepingComputer)</p><p><a href="https://www.infosecurity-magazine.com/news/swiss-government-targeted-series/">Swiss Government Targeted by Series of Cyber-Attacks</a> (Infosecurity Magazine)</p><p><a href="https://www.admin.ch/gov/en/start/documentation/media-releases.msg-id-95641.html">DDoS attack on Federal Administration: various Federal Administration websites and applications unavailable</a> (The Federal Council of the Swiss Government)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1771</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[33baadf0-8167-11ed-9779-1b37a7cc4754]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1675439822.mp3?updated=1690333075" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unpatched instances and vulnerabilities rear their ugly heads. Russian telecom provider targeted in an act of “cyber anarchy.” Alleged crypto heist conspirators face charges. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1842/notes</link>
      <description>Attacks against unpatched versions of Visual Studio and win32k continue. Progress Software patches two MOVEit vulnerabilities. The Cyber Anarchy Squad claims to have taken down a Russian telecommunications provider's infrastructure. RomCom resumes its activity in the Russian interest. Deepen Desai of Zscaler describes Nevada ransomware. Our guest is Clarke Rodgers from Amazon Web services with insights on what CISOs say to each other when no one else is listening?. And the Mt. Gox hacking indictment has been unsealed.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/112

Selected reading.
Online muggers make serious moves on unpatched Microsoft bugs (The Register)
Analysis of CVE-2023-29336 Win32k Privilege Escalation Vulnerability (with POC) (Numen)
MOVEit Transfer and MOVEit Cloud Vulnerability (Progress Software)
MDE Affected by Global Data Breach (Minnesota Department of Education)
Hackers Use Stolen Student Data Against Minneapolis Schools in Brazen New Threat (The 74)
Ofcom statement on MOVEit cyber attack (Ofcom)
Ukrainian hackers take down service provider for Russian banks (BleepingComputer)
Pro-Ukraine hackers claim to take down Russian internet provider (The Record)
Pro-Ukraine Cyber Anarchy Squad claims the hack of the Russian telecom provider Infotel JSC (Security Affairs)
RomCom Resurfaces: Targeting Politicians in Ukraine and U.S.-Based Healthcare Providing Aid to Refugees from Ukraine (BlackBerry)
Mt. Gox's Hackers Are 2 Russian Nationals, U.S. DOJ Alleges in Indictment (CoinDesk)
Russian nationals accused of Mt. Gox bitcoin heist, shifting stolen funds to BTC-e (The Record)
Russian Nationals Charged With Hacking One Cryptocurrency Exchange and Illicitly Operating Another (US Department of Justice)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 12 Jun 2023 20:15:00 -0000</pubDate>
      <itunes:title>Unpatched instances and vulnerabilities rear their ugly heads. Russian telecom provider targeted in an act of “cyber anarchy.” Alleged crypto heist conspirators face charges. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1842</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Attacks against unpatched versions of Visual Studio and win32k continue. Progress Software patches two MOVEit vulnerabilities. The Cyber Anarchy Squad claims to have taken down a Russian telecommunications provider's infrastructure. RomCom resumes its activity in the Russian interest. Deepen Desai of Zscaler describes Nevada ransomware. Our guest is Clarke Rodgers from Amazon Web services with insights on what CISOs say to each other when no one else is listening?. And the Mt. Gox hacking indictment has been unsealed.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/112

Selected reading.
Online muggers make serious moves on unpatched Microsoft bugs (The Register)
Analysis of CVE-2023-29336 Win32k Privilege Escalation Vulnerability (with POC) (Numen)
MOVEit Transfer and MOVEit Cloud Vulnerability (Progress Software)
MDE Affected by Global Data Breach (Minnesota Department of Education)
Hackers Use Stolen Student Data Against Minneapolis Schools in Brazen New Threat (The 74)
Ofcom statement on MOVEit cyber attack (Ofcom)
Ukrainian hackers take down service provider for Russian banks (BleepingComputer)
Pro-Ukraine hackers claim to take down Russian internet provider (The Record)
Pro-Ukraine Cyber Anarchy Squad claims the hack of the Russian telecom provider Infotel JSC (Security Affairs)
RomCom Resurfaces: Targeting Politicians in Ukraine and U.S.-Based Healthcare Providing Aid to Refugees from Ukraine (BlackBerry)
Mt. Gox's Hackers Are 2 Russian Nationals, U.S. DOJ Alleges in Indictment (CoinDesk)
Russian nationals accused of Mt. Gox bitcoin heist, shifting stolen funds to BTC-e (The Record)
Russian Nationals Charged With Hacking One Cryptocurrency Exchange and Illicitly Operating Another (US Department of Justice)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Attacks against unpatched versions of Visual Studio and win32k continue. Progress Software patches two MOVEit vulnerabilities. The Cyber Anarchy Squad claims to have taken down a Russian telecommunications provider's infrastructure. RomCom resumes its activity in the Russian interest. Deepen Desai of Zscaler describes Nevada ransomware. Our guest is Clarke Rodgers from Amazon Web services with insights on what CISOs say to each other when no one else is listening?. And the Mt. Gox hacking indictment has been unsealed.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/112</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.theregister.com/2023/06/09/microsoft_systems_flaws_patch/">Online muggers make serious moves on unpatched Microsoft bugs</a> (The Register)</p><p><a href="https://www.numencyber.com/cve-2023-29336-win32k-analysis/">Analysis of CVE-2023-29336 Win32k Privilege Escalation Vulnerability (with POC)</a> (Numen)</p><p><a href="https://www.progress.com/security/moveit-transfer-and-moveit-cloud-vulnerability">MOVEit Transfer and MOVEit Cloud Vulnerability</a> (Progress Software)</p><p><a href="https://content.govdelivery.com/accounts/MNMDE/bulletins/35f2559">MDE Affected by Global Data Breach</a> (Minnesota Department of Education)</p><p><a href="https://www.the74million.org/article/hackers-use-stolen-student-data-against-minneapolis-schools-in-brazen-new-threat/">Hackers Use Stolen Student Data Against Minneapolis Schools in Brazen New Threat</a> (The 74)</p><p><a href="https://www.ofcom.org.uk/news-centre/2023/ofcom-statement-on-moveit-cyber-attack">Ofcom statement on MOVEit cyber attack</a> (Ofcom)</p><p><a href="https://www.bleepingcomputer.com/news/security/ukrainian-hackers-take-down-service-provider-for-russian-banks/">Ukrainian hackers take down service provider for Russian banks</a> (BleepingComputer)</p><p><a href="https://therecord.media/proukraine-hackers-claim-to-take-down-russian-isp">Pro-Ukraine hackers claim to take down Russian internet provider</a> (The Record)</p><p><a href="https://securityaffairs.com/147307/hacktivism/cyber-anarchy-squad-hacks-infotel-jsc.html">Pro-Ukraine Cyber Anarchy Squad claims the hack of the Russian telecom provider Infotel JSC</a> (Security Affairs)</p><p><a href="https://blogs.blackberry.com/en/2023/06/romcom-resurfaces-targeting-ukraine">RomCom Resurfaces: Targeting Politicians in Ukraine and U.S.-Based Healthcare Providing Aid to Refugees from Ukraine</a> (BlackBerry)</p><p><a href="https://www.coindesk.com/policy/2023/06/09/mt-goxs-hackers-are-2-russian-nationals-us-doj-alleges-in-indictment/">Mt. Gox's Hackers Are 2 Russian Nationals, U.S. DOJ Alleges in Indictment</a> (CoinDesk)</p><p><a href="https://therecord.media/mt-gox-stolen-bitcoin-indictment-russian-nationals">Russian nationals accused of Mt. Gox bitcoin heist, shifting stolen funds to BTC-e</a> (The Record)</p><p><a href="https://www.justice.gov/opa/pr/russian-nationals-charged-hacking-one-cryptocurrency-exchange-and-illicitly-operating-another">Russian Nationals Charged With Hacking One Cryptocurrency Exchange and Illicitly Operating Another</a> (US Department of Justice)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1687</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[340a6fca-8167-11ed-9779-a37327cacacd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6289787650.mp3?updated=1690333058" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Nadir Izrael: Play to your strengths. [CTO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/153/notes</link>
      <description>Nadir Izrael, co-founder and CTO from Armis, sits down to share his story. Nadir started his love of cyber when he became a software developer at the age of 12. He always had a passion for making things work better and asking questions. Once he joined the 8200 unit in Israel, he was able to focus his interests on physics, which led him to making the discovery of wanting to start his own business. After he started building his company is when he learned to take smart and innovative risks at work and making it a way of life. Nadir shares advice, saying "Playing to your strengths, maximizes the odds of success and every other consideration lowers them inevitably, or at least, uh, um, kind of shrinks, I guess the, the probability space for success." He thinks playing to ones strengths is the best a leader can do to create the most success for their team. We thank Nadir for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 11 Jun 2023 07:00:00 -0000</pubDate>
      <itunes:title>Nadir Izrael: Play to your strengths. [CTO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>153</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Nadir Izrael, co-founder and CTO from Armis, sits down to share his story. Nadir started his love of cyber when he became a software developer at the age of 12. He always had a passion for making things work better and asking questions. Once he joined the 8200 unit in Israel, he was able to focus his interests on physics, which led him to making the discovery of wanting to start his own business. After he started building his company is when he learned to take smart and innovative risks at work and making it a way of life. Nadir shares advice, saying "Playing to your strengths, maximizes the odds of success and every other consideration lowers them inevitably, or at least, uh, um, kind of shrinks, I guess the, the probability space for success." He thinks playing to ones strengths is the best a leader can do to create the most success for their team. We thank Nadir for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Nadir Izrael, co-founder and CTO from Armis, sits down to share his story. Nadir started his love of cyber when he became a software developer at the age of 12. He always had a passion for making things work better and asking questions. Once he joined the 8200 unit in Israel, he was able to focus his interests on physics, which led him to making the discovery of wanting to start his own business. After he started building his company is when he learned to take smart and innovative risks at work and making it a way of life. Nadir shares advice, saying "Playing to your strengths, maximizes the odds of success and every other consideration lowers them inevitably, or at least, uh, um, kind of shrinks, I guess the, the probability space for success." He thinks playing to ones strengths is the best a leader can do to create the most success for their team. We thank Nadir for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>477</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dc2f39ec-06f5-11ee-a211-f3b9271cc85a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9580474242.mp3?updated=1686330294" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A new botnet takes a frosty bite out of the gaming industry. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/285/notes</link>
      <description>Our guest, Allen West from Akamai's SIRT team, joins Dave to discuss their research on "The Dark Frost Enigma: An Unexpectedly Prevalent Botnet Author Profile." Akamai found this new botnet was targeting the gaming industry, modeled after Qbot, Mirai, and other malware strains. The botnet has expanded to encompass hundreds of compromised devices.
The research states "through reverse engineering and patching the malware binary, our analysis determined the botnet's attack potential at approximately 629.28 Gbps with its UDP flood attacks." Akamai researchers do a deep dive into the motives behind the attacks, the effectiveness of the attack, and how the law has been handling similar cases.
The research can be found here:
The Dark Frost Enigma: An Unexpectedly Prevalent Botnet Author Profile

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Jun 2023 07:00:00 -0000</pubDate>
      <itunes:title>A new botnet takes a frosty bite out of the gaming industry. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>285</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Our guest, Allen West from Akamai's SIRT team, joins Dave to discuss their research on "The Dark Frost Enigma: An Unexpectedly Prevalent Botnet Author Profile." Akamai found this new botnet was targeting the gaming industry, modeled after Qbot, Mirai, and other malware strains. The botnet has expanded to encompass hundreds of compromised devices.
The research states "through reverse engineering and patching the malware binary, our analysis determined the botnet's attack potential at approximately 629.28 Gbps with its UDP flood attacks." Akamai researchers do a deep dive into the motives behind the attacks, the effectiveness of the attack, and how the law has been handling similar cases.
The research can be found here:
The Dark Frost Enigma: An Unexpectedly Prevalent Botnet Author Profile

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our guest, Allen West from Akamai's SIRT team, joins Dave to discuss their research on "The Dark Frost Enigma: An Unexpectedly Prevalent Botnet Author Profile." Akamai found this new botnet was targeting the gaming industry, modeled after Qbot, Mirai, and other malware strains. The botnet has expanded to encompass hundreds of compromised devices.</p><p>The research states "through reverse engineering and patching the malware binary, our analysis determined the botnet's attack potential at approximately 629.28 Gbps with its UDP flood attacks." Akamai researchers do a deep dive into the motives behind the attacks, the effectiveness of the attack, and how the law has been handling similar cases.</p><p>The research can be found here:</p><ul><li><a href="https://www.akamai.com/blog/security-research/dark-frost-botnet-unexpected-author-profile">The Dark Frost Enigma: An Unexpectedly Prevalent Botnet Author Profile</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1168</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f0d65ca4-06f5-11ee-a5ef-2309c6327f5c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2474744511.mp3?updated=1686324396" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>“Better Minecraft” improves gameplay, while also lifting your data. Hallucinations, defamation, and legal malpractice, oh my! Asylum Ambuscade and other wartime notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1841/notes</link>
      <description>Barracuda Networks urges replacement of their gear. Fractureiser infects Minecraft mods. ChatGPT sees a court date over hallucinations and defamation. Asylum Ambuscade engages in both crime and espionage. The US delivers Ukraine Starlink connectivity. DDoS attacks hit the Swiss parliament's website. My conversation with Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA. Our guest is Delilah Schwartz from Cybersixgill discussing how the Dark Web is evolving with new technologies like ChatGPT. And BEC crooks see their day in court.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/111

Selected reading.
Barracuda Email Security Gateway Appliance (ESG) Vulnerability (Barracuda)
CVE-2023-2868 (MITRE)
ACT government falls victim to Barracuda’s ESG vulnerability (CSO Online)
CVE-2023-2868: Total Compromise of Physical Barracuda ESG Appliances (Rapid7)
CVE-2023-2868 Detail (National Institute of Standards and Technology)
Infected Minecraft Mods Lead to Multi-Stage, Multi-Platform Infostealer Malware (Bitdefender)
New Fractureiser malware used CurseForge Minecraft mods to infect Windows, Linux (BleepingComputer)
IN THE SUPERIOR COURT OF FULTON COUNTY (Superior Court of Fulton County)
OpenAI Hit With First Defamation Suit Over ChatGPT Hallucination (Bloomberg Law)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 09 Jun 2023 20:15:00 -0000</pubDate>
      <itunes:title>“Better Minecraft” improves gameplay, while also lifting your data. Hallucinations, defamation, and legal malpractice, oh my! Asylum Ambuscade and other wartime notes.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1841</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Barracuda Networks urges replacement of their gear. Fractureiser infects Minecraft mods. ChatGPT sees a court date over hallucinations and defamation. Asylum Ambuscade engages in both crime and espionage. The US delivers Ukraine Starlink connectivity. DDoS attacks hit the Swiss parliament's website. My conversation with Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA. Our guest is Delilah Schwartz from Cybersixgill discussing how the Dark Web is evolving with new technologies like ChatGPT. And BEC crooks see their day in court.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/111

Selected reading.
Barracuda Email Security Gateway Appliance (ESG) Vulnerability (Barracuda)
CVE-2023-2868 (MITRE)
ACT government falls victim to Barracuda’s ESG vulnerability (CSO Online)
CVE-2023-2868: Total Compromise of Physical Barracuda ESG Appliances (Rapid7)
CVE-2023-2868 Detail (National Institute of Standards and Technology)
Infected Minecraft Mods Lead to Multi-Stage, Multi-Platform Infostealer Malware (Bitdefender)
New Fractureiser malware used CurseForge Minecraft mods to infect Windows, Linux (BleepingComputer)
IN THE SUPERIOR COURT OF FULTON COUNTY (Superior Court of Fulton County)
OpenAI Hit With First Defamation Suit Over ChatGPT Hallucination (Bloomberg Law)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Barracuda Networks urges replacement of their gear. Fractureiser infects Minecraft mods. ChatGPT sees a court date over hallucinations and defamation. Asylum Ambuscade engages in both crime and espionage. The US delivers Ukraine Starlink connectivity. DDoS attacks hit the Swiss parliament's website. My conversation with Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA. Our guest is Delilah Schwartz from Cybersixgill discussing how the Dark Web is evolving with new technologies like ChatGPT. And BEC crooks see their day in court.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/111</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.barracuda.com/company/legal/esg-vulnerability">Barracuda Email Security Gateway Appliance (ESG) Vulnerability</a> (Barracuda)</p><p><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2868">CVE-2023-2868</a> (MITRE)</p><p><a href="https://www.csoonline.com/article/3699255/act-government-falls-victim-to-barracuda-s-esg-vulnerability.html">ACT government falls victim to Barracuda’s ESG vulnerability</a> (CSO Online)</p><p><a href="https://www.rapid7.com/blog/post/2023/06/08/etr-cve-2023-2868-total-compromise-of-physical-barracuda-esg-appliances/">CVE-2023-2868: Total Compromise of Physical Barracuda ESG Appliances</a> (Rapid7)</p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2868">CVE-2023-2868 Detail</a> (National Institute of Standards and Technology)</p><p><a href="https://www.bitdefender.com/blog/labs/infected-minecraft-mods-lead-to-multi-stage-multi-platform-infostealer-malware/">Infected Minecraft Mods Lead to Multi-Stage, Multi-Platform Infostealer Malware</a> (Bitdefender)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-fractureiser-malware-used-curseforge-minecraft-mods-to-infect-windows-linux/">New Fractureiser malware used CurseForge Minecraft mods to infect Windows, Linux</a> (BleepingComputer)</p><p><a href="https://aboutblaw.com/8ts">IN THE SUPERIOR COURT OF FULTON COUNTY</a> (Superior Court of Fulton County)</p><p><a href="https://news.bloomberglaw.com/artificial-intelligence/openai-hit-with-first-defamation-suit-over-chatgpt-hallucination">OpenAI Hit With First Defamation Suit Over ChatGPT Hallucination</a> (Bloomberg Law)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1810</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3252a3b4-8167-11ed-9779-27e6d28b07d1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7220694090.mp3?updated=1690333038" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA23-158A – #StopRansomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability.</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/51/notes</link>
      <description>FBI and CISA are releasing this joint CSA to disseminate known CL0P ransomware IOCs and TTPs identified through FBI investigations as recently as June 2023.
AA23-158A Alert, Technical Details, and Mitigations
Stopransomware.gov is a whole-of-government approach that gives one central location for ransomware resources and alerts.
Resource to mitigate a ransomware attack: CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide.
Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft | Mandiant
MOVEit Transfer Critical Vulnerability (May 2023) - Progress Community
MOVEit Transfer Critical Vulnerability CVE-2023-34362 Rapid Response (huntress.com)
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 09 Jun 2023 18:12:00 -0000</pubDate>
      <itunes:title>CISA Alert AA23-158A – #StopRansomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability.</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>52</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>FBI and CISA are releasing this joint CSA to disseminate known CL0P ransomware IOCs and TTPs identified through FBI investigations as recently as June 2023.
AA23-158A Alert, Technical Details, and Mitigations
Stopransomware.gov is a whole-of-government approach that gives one central location for ransomware resources and alerts.
Resource to mitigate a ransomware attack: CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide.
Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft | Mandiant
MOVEit Transfer Critical Vulnerability (May 2023) - Progress Community
MOVEit Transfer Critical Vulnerability CVE-2023-34362 Rapid Response (huntress.com)
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>FBI and CISA are releasing this joint CSA to disseminate known CL0P ransomware IOCs and TTPs identified through FBI investigations as recently as June 2023.</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a">AA23-158A Alert, Technical Details, and Mitigations</a></p><p><a href="https://www.cisa.gov/stopransomware">Stopransomware.gov</a> is a whole-of-government approach that gives one central location for ransomware resources and alerts.</p><p>Resource to mitigate a ransomware attack: <a href="https://www.cisa.gov/stopransomware/ransomware-guide">CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide</a>.</p><p><a href="https://www.mandiant.com/resources/blog/zero-day-moveit-data-theft">Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft | Mandiant</a></p><p><a href="https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023">MOVEit Transfer Critical Vulnerability (May 2023) - Progress Community</a></p><p><a href="https://www.mandiant.com/resources/blog/zero-day-moveit-data-theft">MOVEit Transfer Critical Vulnerability CVE-2023-34362 Rapid Response (huntress.com)</a></p><p>No-cost cyber hygiene services: <a href="https://www.cisa.gov/cyber-hygiene-services">Cyber Hygiene Services</a> and <a href="https://github.com/cisagov/cset/">Ransomware Readiness Assessment</a>.</p><p>U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email <a href="mailto:dib_defense@cyber.nsa.gov">dib_defense@cyber.nsa.gov</a> </p><p>To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="mailto:report@cisa.gov">report@cisa.gov</a>, or call (888) 282-0870, or report incidents to your local FBI field office.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>161</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[27cee5b4-06f1-11ee-969f-8b2a0f60350a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3532026444.mp3?updated=1686329034" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ChatGPT continues to become more human, this time through hallucinations. Following Cl0p. Instagram works against CSAM. And data protection advice from an expert in attacking it.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1840/notes</link>
      <description>ChatGPT takes an unexpectedly human turn in having its own version of hallucinations. Updates on Cl0p’s ransom note, background, and recent promises. Researchers look at Instagram’s role in promoting CSAM. A look at KillNet's reboot. Andrea Little Limbago from Interos shares insight on cyber’s human element. Our guest is Aleksandr Yampolskiy from SecurityScorecard on how CISOs can effectively communicate cyber risk to their board. And a hacktivist auxiliary’s stellar advice for protecting your data.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/110

Selected reading.
Can you trust ChatGPT’s package recommendations? (Vulcan)
Ransomware group Clop issues extortion notice to ‘hundreds’ of victims (The Record)
MOVEit cyber attack: Cl0p sparks speculation that it’s lost control of hack (ITpro)
Responding to the Critical MOVEit Transfer Vulnerability (CVE-2023-34362) (Kroll)
MOVEit Transfer Critical Vulnerability (May 2023) (Progress)
Cybergang behind N.S. breach says it erased stolen data, but experts urge caution (CBC Canada)
Most SMBs admit to paying ransomware demands - here's why (TechRadar)
Instagram Connects Vast Pedophile Network (Wall Street Journal)
Addressing the distribution of illicit sexual content by minors online (Stanford University)
Rebooting Killnet, a New World Order and the End of the Tesla Botnet (Radware)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 08 Jun 2023 20:15:00 -0000</pubDate>
      <itunes:title>ChatGPT continues to become more human, this time through hallucinations. Following Cl0p. Instagram works against CSAM. And data protection advice from an expert in attacking it.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1840</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>ChatGPT takes an unexpectedly human turn in having its own version of hallucinations. Updates on Cl0p’s ransom note, background, and recent promises. Researchers look at Instagram’s role in promoting CSAM. A look at KillNet's reboot. Andrea Little Limbago from Interos shares insight on cyber’s human element. Our guest is Aleksandr Yampolskiy from SecurityScorecard on how CISOs can effectively communicate cyber risk to their board. And a hacktivist auxiliary’s stellar advice for protecting your data.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/110

Selected reading.
Can you trust ChatGPT’s package recommendations? (Vulcan)
Ransomware group Clop issues extortion notice to ‘hundreds’ of victims (The Record)
MOVEit cyber attack: Cl0p sparks speculation that it’s lost control of hack (ITpro)
Responding to the Critical MOVEit Transfer Vulnerability (CVE-2023-34362) (Kroll)
MOVEit Transfer Critical Vulnerability (May 2023) (Progress)
Cybergang behind N.S. breach says it erased stolen data, but experts urge caution (CBC Canada)
Most SMBs admit to paying ransomware demands - here's why (TechRadar)
Instagram Connects Vast Pedophile Network (Wall Street Journal)
Addressing the distribution of illicit sexual content by minors online (Stanford University)
Rebooting Killnet, a New World Order and the End of the Tesla Botnet (Radware)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>ChatGPT takes an unexpectedly human turn in having its own version of hallucinations. Updates on Cl0p’s ransom note, background, and recent promises. Researchers look at Instagram’s role in promoting CSAM. A look at KillNet's reboot. Andrea Little Limbago from Interos shares insight on cyber’s human element. Our guest is Aleksandr Yampolskiy from SecurityScorecard on how CISOs can effectively communicate cyber risk to their board. And a hacktivist auxiliary’s stellar advice for protecting your data.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/110</p><p><br></p><h2>Selected reading.</h2><p><a href="https://vulcan.io/blog/ai-hallucinations-package-risk">Can you trust ChatGPT’s package recommendations?</a> (Vulcan)</p><p><a href="https://therecord.media/clop-extortion-hundreds-organizations-moveit-vulnerability">Ransomware group Clop issues extortion notice to ‘hundreds’ of victims</a> (The Record)</p><p><a href="https://www.itpro.com/security/cyber-attacks/moveit-cyber-attack-cl0p-sparks-speculation-that-its-lost-control-of-hack">MOVEit cyber attack: Cl0p sparks speculation that it’s lost control of hack</a> (ITpro)</p><p><a href="https://www.kroll.com/en/insights/publications/cyber/responding-critical-moveit-transfer-vulnerability-cve-2023-34362">Responding to the Critical MOVEit Transfer Vulnerability (CVE-2023-34362)</a> (Kroll)</p><p><a href="https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023">MOVEit Transfer Critical Vulnerability (May 2023)</a> (Progress)</p><p><a href="https://www.cbc.ca/news/canada/nova-scotia/cybergang-clop-data-breach-erased-stolen-data-claim-1.6869097">Cybergang behind N.S. breach says it erased stolen data, but experts urge caution</a> (CBC Canada)</p><p><a href="https://www.techradar.com/news/most-smbs-admit-to-paying-ransomware-demands-heres-why">Most SMBs admit to paying ransomware demands - here's why</a> (TechRadar)</p><p><a href="https://www.wsj.com/articles/instagram-vast-pedophile-network-4ab7189">Instagram Connects Vast Pedophile Network</a> (Wall Street Journal)</p><p><a href="https://cyber.fsi.stanford.edu/io/news/addressing-distribution-illicit-sexual-content-minors-online">Addressing the distribution of illicit sexual content by minors online</a> (Stanford University)</p><p><a href="https://www.radware.com/blog/security/threat-intelligence/2023/06/rebooting-killnet-a-new-world-order-and-the-end-of-the-tesla-botnet/">Rebooting Killnet, a New World Order and the End of the Tesla Botnet</a> (Radware)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1691</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3303a5d8-8167-11ed-9779-332528ea2bb8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4494466364.mp3?updated=1690333019" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>PowerDrop’s capabilities are up in the air. A Russian cyberespionage campaign channels their inner 007. A disconnect between law firms and cybersecurity protections.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1839/notes</link>
      <description>A new PowerShell remote access tool targets a US defense contractor. Current Russian cyber operations against Ukraine are honing in on espionage. CISA and its partners have released a Joint Guide to Securing Remote Access Software. A bug has been reported in Visual Studio’s UI. Awais Rashid from University of Bristol discussing Privacy in health apps. Our guest is Jim Lippie of SaaS Alerts with insights on software as a service Application Security. And are there disconnects between cybersecurity and the legal profession?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/109

Selected reading.
PowerDrop: A New Insidious PowerShell Script for Command and Control Attacks Targets U.S. Aerospace Defense Industry (Adlumin)
UAC-0099: cyberespionage against state organizations and media representatives of Ukraine (CERT-UA#6710) (CERT-UA)
Guide to Securing Remote Access Software (Joint Guide)
Imposter Syndrome: UI Bug in Visual Studio Lets Attackers Impersonate Publishers (Varonis)
Press Release | ILTA and Conversant Group Release First Cybersecurity Benchmarking Survey of the Legal Industry (International Legal Technology Association)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 07 Jun 2023 20:15:00 -0000</pubDate>
      <itunes:title>PowerDrop’s capabilities are up in the air. A Russian cyberespionage campaign channels their inner 007. A disconnect between law firms and cybersecurity protections.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1839</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A new PowerShell remote access tool targets a US defense contractor. Current Russian cyber operations against Ukraine are honing in on espionage. CISA and its partners have released a Joint Guide to Securing Remote Access Software. A bug has been reported in Visual Studio’s UI. Awais Rashid from University of Bristol discussing Privacy in health apps. Our guest is Jim Lippie of SaaS Alerts with insights on software as a service Application Security. And are there disconnects between cybersecurity and the legal profession?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/109

Selected reading.
PowerDrop: A New Insidious PowerShell Script for Command and Control Attacks Targets U.S. Aerospace Defense Industry (Adlumin)
UAC-0099: cyberespionage against state organizations and media representatives of Ukraine (CERT-UA#6710) (CERT-UA)
Guide to Securing Remote Access Software (Joint Guide)
Imposter Syndrome: UI Bug in Visual Studio Lets Attackers Impersonate Publishers (Varonis)
Press Release | ILTA and Conversant Group Release First Cybersecurity Benchmarking Survey of the Legal Industry (International Legal Technology Association)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A new PowerShell remote access tool targets a US defense contractor. Current Russian cyber operations against Ukraine are honing in on espionage. CISA and its partners have released a Joint Guide to Securing Remote Access Software. A bug has been reported in Visual Studio’s UI. Awais Rashid from University of Bristol discussing Privacy in health apps. Our guest is Jim Lippie of SaaS Alerts with insights on software as a service Application Security. And are there disconnects between cybersecurity and the legal profession?</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/109</p><p><br></p><h2>Selected reading.</h2><p><a href="https://adlumin.com/post/powerdrop-a-new-insidious-powershell-script-for-command-and-control-attacks-targets-u-s-aerospace-defense-industry/">PowerDrop: A New Insidious PowerShell Script for Command and Control Attacks Targets U.S. Aerospace Defense Industry</a> (Adlumin)</p><p><a href="https://cert.gov.ua/article/4818341">UAC-0099: cyberespionage against state organizations and media representatives of Ukraine (CERT-UA#6710)</a> (CERT-UA)</p><p><a href="https://www.cisa.gov/sites/default/files/2023-06/Guide%20to%20Securing%20Remote%20Access%20Software_508c.pdf">Guide to Securing Remote Access Software</a> (Joint Guide)</p><p><a href="https://www.varonis.com/blog/visual-studio-bug">Imposter Syndrome: UI Bug in Visual Studio Lets Attackers Impersonate Publishers</a> (Varonis)</p><p><a href="https://www.iltanet.org/blogs/ilta-news1/2023/06/06/press-release-ilta-and-conversant-group-release23">Press Release | ILTA and Conversant Group Release First Cybersecurity Benchmarking Survey of the Legal Industry</a> (International Legal Technology Association)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1574</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[331f283a-8167-11ed-9779-17e844a23a7f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9544046353.mp3?updated=1690333002" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cl0p moves their way into the systems of major European companies. Notes from a highly active cyber underworld. And hybrid war updates.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1838/notes</link>
      <description>The Cl0p gang claims responsibility for the MOVEit file transfer vulnerability. Verizon’s DBIR is out. Palo Alto Networks takes a snapshot of last year’s threat trends. A new criminal campaign targets Android users wishing to install modified apps. A smishing campaign is expanding into the Middle East. Cisco observes compromised vendor and contractor accounts as an access point for network penetration. Cyclops ransomware acts as a dual threat. Anonymous Sudan demands $1 million to stop attacks on Microsoft platforms. Ben Yelin explains a groundbreaking decision on border searches. Our guest is Matt Caulfield of Oort with insights on identity security. And a deepfaked martial law announcement airs on Russian provincial radio stations.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/108

Selected reading.
Clop ransomware claims responsibility for MOVEit extortion attacks (BleepingComputer)
CVE-2023-34362 Detail (National Institute of Standards and Technology)
Microsoft links Clop ransomware gang to MOVEit data-theft attacks (BleepingComputer)
BA, BBC and Boots hit by cyber security breach with contact and bank details exposed (Sky News)
2023 Data Breach Investigations Report (Verizon)
2023 Unit 42 Network Threat Trends Research Report (Unit 42)
Tens of Thousands of Compromised Android Apps Found by Bitdefender Anomaly Detection Technology (Bitdefender)
Chinese-speaking phishing ring behind latest fake fee scam targeting Middle East; another campaign exposed (Group-IB)
Adversaries increasingly using vendor and contractor accounts to infiltrate networks (Cisco Talos)
Cyclops Ransomware and Stealer Combo: Exploring a Dual Threat (Uptycs)
U.S. Measures in Response to the Crisis in Sudan (US Department of State)
Microsoft's Outlook.com is down again on mobile, web (BleepingComputer)
Kremlin: fake Putin address broadcast on Russian radio stations after 'hack' (Reuters)
Deep fake video of Putin declaring martial law is broadcast in parts of Russia (Semafor)
Peskov called "Putin's emergency appeal" shown on some TV networks as a hack (TASS)
Proceedings of the 2023 U.S.-Ukraine Cyber Dialogue (US Department of State)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Jun 2023 20:15:00 -0000</pubDate>
      <itunes:title>Cl0p moves their way into the systems of major European companies. Notes from a highly active cyber underworld. And hybrid war updates.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1838</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Cl0p gang claims responsibility for the MOVEit file transfer vulnerability. Verizon’s DBIR is out. Palo Alto Networks takes a snapshot of last year’s threat trends. A new criminal campaign targets Android users wishing to install modified apps. A smishing campaign is expanding into the Middle East. Cisco observes compromised vendor and contractor accounts as an access point for network penetration. Cyclops ransomware acts as a dual threat. Anonymous Sudan demands $1 million to stop attacks on Microsoft platforms. Ben Yelin explains a groundbreaking decision on border searches. Our guest is Matt Caulfield of Oort with insights on identity security. And a deepfaked martial law announcement airs on Russian provincial radio stations.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/108

Selected reading.
Clop ransomware claims responsibility for MOVEit extortion attacks (BleepingComputer)
CVE-2023-34362 Detail (National Institute of Standards and Technology)
Microsoft links Clop ransomware gang to MOVEit data-theft attacks (BleepingComputer)
BA, BBC and Boots hit by cyber security breach with contact and bank details exposed (Sky News)
2023 Data Breach Investigations Report (Verizon)
2023 Unit 42 Network Threat Trends Research Report (Unit 42)
Tens of Thousands of Compromised Android Apps Found by Bitdefender Anomaly Detection Technology (Bitdefender)
Chinese-speaking phishing ring behind latest fake fee scam targeting Middle East; another campaign exposed (Group-IB)
Adversaries increasingly using vendor and contractor accounts to infiltrate networks (Cisco Talos)
Cyclops Ransomware and Stealer Combo: Exploring a Dual Threat (Uptycs)
U.S. Measures in Response to the Crisis in Sudan (US Department of State)
Microsoft's Outlook.com is down again on mobile, web (BleepingComputer)
Kremlin: fake Putin address broadcast on Russian radio stations after 'hack' (Reuters)
Deep fake video of Putin declaring martial law is broadcast in parts of Russia (Semafor)
Peskov called "Putin's emergency appeal" shown on some TV networks as a hack (TASS)
Proceedings of the 2023 U.S.-Ukraine Cyber Dialogue (US Department of State)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Cl0p gang claims responsibility for the MOVEit file transfer vulnerability. Verizon’s DBIR is out. Palo Alto Networks takes a snapshot of last year’s threat trends. A new criminal campaign targets Android users wishing to install modified apps. A smishing campaign is expanding into the Middle East. Cisco observes compromised vendor and contractor accounts as an access point for network penetration. Cyclops ransomware acts as a dual threat. Anonymous Sudan demands $1 million to stop attacks on Microsoft platforms. Ben Yelin explains a groundbreaking decision on border searches. Our guest is Matt Caulfield of Oort with insights on identity security. And a deepfaked martial law announcement airs on Russian provincial radio stations.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/108</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-responsibility-for-moveit-extortion-attacks/">Clop ransomware claims responsibility for MOVEit extortion attacks</a> (BleepingComputer)</p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34362">CVE-2023-34362 Detail</a> (National Institute of Standards and Technology)</p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-links-clop-ransomware-gang-to-moveit-data-theft-attacks/">Microsoft links Clop ransomware gang to MOVEit data-theft attacks</a> (BleepingComputer)</p><p><a href="https://news.sky.com/story/bas-uk-staff-exposed-to-global-data-theft-spree-12896900">BA, BBC and Boots hit by cyber security breach with contact and bank details exposed</a> (Sky News)</p><p><a href="https://www.verizon.com/business/resources/reports/dbir/">2023 Data Breach Investigations Report</a> (Verizon)</p><p><a href="https://start.paloaltonetworks.com/unit-42-network-threat-trends-report-malware-2023.html">2023 Unit 42 Network Threat Trends Research Report</a> (Unit 42)</p><p><a href="https://www.bitdefender.com/blog/labs/tens-of-thousands-of-compromised-android-apps-found-by-bitdefender-anomaly-detection-technology/">Tens of Thousands of Compromised Android Apps Found by Bitdefender Anomaly Detection Technology</a> (Bitdefender)</p><p><a href="https://www.group-ib.com/media-center/press-releases/postalfurious/">Chinese-speaking phishing ring behind latest fake fee scam targeting Middle East; another campaign exposed</a> (Group-IB)</p><p><a href="https://blog.talosintelligence.com/vendor-contractor-account-abuse/">Adversaries increasingly using vendor and contractor accounts to infiltrate networks</a> (Cisco Talos)</p><p><a href="https://www.uptycs.com/blog/cyclops-ransomware-stealer-combo">Cyclops Ransomware and Stealer Combo: Exploring a Dual Threat</a> (Uptycs)</p><p><a href="https://www.state.gov/u-s-measures-in-response-to-the-crisis-in-sudan/">U.S. Measures in Response to the Crisis in Sudan</a> (US Department of State)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsofts-outlookcom-is-down-again-on-mobile-web/">Microsoft's Outlook.com is down again on mobile, web</a> (BleepingComputer)</p><p><a href="https://www.reuters.com/world/europe/kremlin-fake-putin-address-broadcast-russian-radio-stations-after-hack-2023-06-05/">Kremlin: fake Putin address broadcast on Russian radio stations after 'hack'</a> (Reuters)</p><p><a href="https://www.semafor.com/article/06/05/2023/putin-deep-fake-broadcast-in-parts-of-russia-declares-martial-law">Deep fake video of Putin declaring martial law is broadcast in parts of Russia</a> (Semafor)</p><p><a href="https://tass.ru/obschestvo/17930071">Peskov called "Putin's emergency appeal" shown on some TV networks as a hack</a> (TASS)</p><p><a href="https://www.state.gov/proceedings-of-the-2023-u-s-ukraine-cyber-dialogue/">Proceedings of the 2023 U.S.-Ukraine Cyber Dialogue</a> (US Department of State)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1827</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[33d5674e-8167-11ed-9779-1f3e5089ea4d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9713529692.mp3?updated=1690332986" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Need a Lyft? Not if Anonymous Sudan has anything to say about it. Closing time, open all the doors and let KillNet into the world.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1837/notes</link>
      <description>Anonymous Sudan responds to remarks from the US Secretary of State by targeting Lyft and American hospitals. NSA releases an advisory on North Korean spearphishing campaigns. The US government’s Moonlighter satellite will test cybersecurity in orbit. "Operation Triangulation" offers an occasion for Russia to move closer to IT independence. The SEC drops cases over improper access to Adjudication Memoranda. Executives and board members are easy targets for threat actors trolling for sensitive information. Rick Howard targets Zero Trust. The FBI’s Deputy Assistant Director for Cyber Cynthia Kaiser shares trends from the IC3 Annual Report. And KillNet seems to say it's disbanding…or is it?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/107

Selected reading.
U.S. Measures in Response to the Crisis in Sudan (US Department of State)
U.S., ROK Agencies Alert: DPRK Cyber Actors Impersonating Targets to Collect Intelligence (US National Security Agency)
North Korea Using Social Engineering to Enable Hacking of Think Tanks, Academia, and Media (Joint Cybersecurity Advisory)
CISA Adds One Known Exploited Vulnerability to Catalog (Cybersecurity and Infrastructure Security Agency)
CVE-2023-34362 Detail (National Institute of Standards and Technology)
Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft (Mandiant)
SpaceX launch sends upgraded solar arrays to International Space Station (Spaceflight Now)
Moonlighter Fact Sheet (The Aerospace Corporation)
Uncle Sam wants DEF CON hackers to pwn this Moonlighter satellite in space (The Register)
Russia wants 2 million phones with home-grown Aurora OS for use by officials (The Record)
Russia accuses U.S. of hacking thousands of iPhones (Axios)
Operation Triangulation: iOS devices targeted with previously unknown malware (Kaspersky)
Operation Triangulation: Mysterious attack on iPhones (ComputerBild)
Killnet hacktivists say they’re disbanding (Cybernews)
Second Commission Statement Relating to Certain Administrative Adjudications (US Securities and Exchange Commission)
Ponemon: Understanding the Serious Risks to Executives’ Personal Cybersecurity &amp; Digital Lives (BlackCloak)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 05 Jun 2023 20:15:00 -0000</pubDate>
      <itunes:title>Need a Lyft? Not if Anonymous Sudan has anything to say about it. Closing time, open all the doors and let KillNet into the world.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1837</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Anonymous Sudan responds to remarks from the US Secretary of State by targeting Lyft and American hospitals. NSA releases an advisory on North Korean spearphishing campaigns. The US government’s Moonlighter satellite will test cybersecurity in orbit. "Operation Triangulation" offers an occasion for Russia to move closer to IT independence. The SEC drops cases over improper access to Adjudication Memoranda. Executives and board members are easy targets for threat actors trolling for sensitive information. Rick Howard targets Zero Trust. The FBI’s Deputy Assistant Director for Cyber Cynthia Kaiser shares trends from the IC3 Annual Report. And KillNet seems to say it's disbanding…or is it?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/107

Selected reading.
U.S. Measures in Response to the Crisis in Sudan (US Department of State)
U.S., ROK Agencies Alert: DPRK Cyber Actors Impersonating Targets to Collect Intelligence (US National Security Agency)
North Korea Using Social Engineering to Enable Hacking of Think Tanks, Academia, and Media (Joint Cybersecurity Advisory)
CISA Adds One Known Exploited Vulnerability to Catalog (Cybersecurity and Infrastructure Security Agency)
CVE-2023-34362 Detail (National Institute of Standards and Technology)
Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft (Mandiant)
SpaceX launch sends upgraded solar arrays to International Space Station (Spaceflight Now)
Moonlighter Fact Sheet (The Aerospace Corporation)
Uncle Sam wants DEF CON hackers to pwn this Moonlighter satellite in space (The Register)
Russia wants 2 million phones with home-grown Aurora OS for use by officials (The Record)
Russia accuses U.S. of hacking thousands of iPhones (Axios)
Operation Triangulation: iOS devices targeted with previously unknown malware (Kaspersky)
Operation Triangulation: Mysterious attack on iPhones (ComputerBild)
Killnet hacktivists say they’re disbanding (Cybernews)
Second Commission Statement Relating to Certain Administrative Adjudications (US Securities and Exchange Commission)
Ponemon: Understanding the Serious Risks to Executives’ Personal Cybersecurity &amp; Digital Lives (BlackCloak)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Anonymous Sudan responds to remarks from the US Secretary of State by targeting Lyft and American hospitals. NSA releases an advisory on North Korean spearphishing campaigns. The US government’s Moonlighter satellite will test cybersecurity in orbit. "Operation Triangulation" offers an occasion for Russia to move closer to IT independence. The SEC drops cases over improper access to Adjudication Memoranda. Executives and board members are easy targets for threat actors trolling for sensitive information. Rick Howard targets Zero Trust. The FBI’s Deputy Assistant Director for Cyber Cynthia Kaiser shares trends from the IC3 Annual Report. And KillNet seems to say it's disbanding…or is it?</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/107</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.state.gov/u-s-measures-in-response-to-the-crisis-in-sudan/">U.S. Measures in Response to the Crisis in Sudan</a> (US Department of State)</p><p><a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3413621/us-rok-agencies-alert-dprk-cyber-actors-impersonating-targets-to-collect-intell/">U.S., ROK Agencies Alert: DPRK Cyber Actors Impersonating Targets to Collect Intelligence</a> (US National Security Agency)</p><p><a href="https://media.defense.gov/2023/Jun/01/2003234055/-1/-1/0/JOINT_CSA_DPRK_SOCIAL_ENGINEERING.PDF">North Korea Using Social Engineering to Enable Hacking of Think Tanks, Academia, and Media</a> (Joint Cybersecurity Advisory)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/06/02/cisa-adds-one-known-exploited-vulnerability-catalog">CISA Adds One Known Exploited Vulnerability to Catalog</a> (Cybersecurity and Infrastructure Security Agency)</p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-34362">CVE-2023-34362 Detail</a> (National Institute of Standards and Technology)</p><p><a href="https://www.mandiant.com/resources/blog/zero-day-moveit-data-theft">Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft</a> (Mandiant)</p><p><a href="https://spaceflightnow.com/2023/06/05/falcon-9-crs-28-coverage/">SpaceX launch sends upgraded solar arrays to International Space Station</a> (Spaceflight Now)</p><p><a href="https://aerospace.org/fact-sheet/moonlighter-fact-sheet">Moonlighter Fact Sheet</a> (The Aerospace Corporation)</p><p><a href="https://www.theregister.com/2023/06/03/moonlighter_satellite_hacking/">Uncle Sam wants DEF CON hackers to pwn this Moonlighter satellite in space</a> (The Register)</p><p><a href="https://therecord.media/russia-wants-phones-with-aurora-os">Russia wants 2 million phones with home-grown Aurora OS for use by officials</a> (The Record)</p><p><a href="https://www.axios.com/2023/06/02/russia-us-hacking-iphones">Russia accuses U.S. of hacking thousands of iPhones</a> (Axios)</p><p><a href="https://securelist.com/operation-triangulation/109842/">Operation Triangulation: iOS devices targeted with previously unknown malware</a> (Kaspersky)</p><p><a href="https://www.computerbild.de/artikel/cb-News-Sicherheit-Operation-Triangulation-Mysterioeser-Angriff-auf-iPhones-35911679.html">Operation Triangulation: Mysterious attack on iPhones</a> (ComputerBild)</p><p><a href="https://cybernews.com/cyber-war/killnet-hacktivists-disband/">Killnet hacktivists say they’re disbanding</a> (Cybernews)</p><p><a href="https://www.sec.gov/news/statement/second-commission-statement-relating-certain-administrative-adjudications">Second Commission Statement Relating to Certain Administrative Adjudications</a> (US Securities and Exchange Commission)</p><p><a href="https://blackcloak.io/white-papers-reports/ponemon-understanding-the-serious-risk-executives-personal-digital-lives/">Ponemon: Understanding the Serious Risks to Executives’ Personal Cybersecurity &amp; Digital Lives</a> (BlackCloak)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1527</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[33f0e80c-8167-11ed-9779-f7537882ad91]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1914921136.mp3?updated=1690332966" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Galit Lubetzky Sharon: Doing your chores brings the best out in you. [CTO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/152/notes</link>
      <description>Galit Lubetzky Sharon, Co-Founder and CTO of Wing Security sits down to share her story and how years in the business lead her to be where she is now. Galit shares her insights from her experiences co-founding her company and bringing it out of stealth mode in early 2022, including why she saw the need for Wing Security and what lessons she learned in the process of founding and launching the company. She started her career as a Colonel in the 8200 Unit gives her a unique perspective on the cyber industry. Galit also shares what she does when things get stressful to help calm her down in the moment and help her clear her head. She says "I think it's very important to do things that you love. It should be something that you come and you bring yourself and your passion and, uh, finding yourself the occupation, the chores, the, the tasks that you love to do brings the, the best out of you." We thank Galit for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 04 Jun 2023 07:00:00 -0000</pubDate>
      <itunes:title>Galit Lubetzky Sharon: Doing your chores brings the best out in you. [CTO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>152</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Galit Lubetzky Sharon, Co-Founder and CTO of Wing Security sits down to share her story and how years in the business lead her to be where she is now. Galit shares her insights from her experiences co-founding her company and bringing it out of stealth mode in early 2022, including why she saw the need for Wing Security and what lessons she learned in the process of founding and launching the company. She started her career as a Colonel in the 8200 Unit gives her a unique perspective on the cyber industry. Galit also shares what she does when things get stressful to help calm her down in the moment and help her clear her head. She says "I think it's very important to do things that you love. It should be something that you come and you bring yourself and your passion and, uh, finding yourself the occupation, the chores, the, the tasks that you love to do brings the, the best out of you." We thank Galit for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Galit Lubetzky Sharon, Co-Founder and CTO of Wing Security sits down to share her story and how years in the business lead her to be where she is now. Galit shares her insights from her experiences co-founding her company and bringing it out of stealth mode in early 2022, including why she saw the need for Wing Security and what lessons she learned in the process of founding and launching the company. She started her career as a Colonel in the 8200 Unit gives her a unique perspective on the cyber industry. Galit also shares what she does when things get stressful to help calm her down in the moment and help her clear her head. She says "I think it's very important to do things that you love. It should be something that you come and you bring yourself and your passion and, uh, finding yourself the occupation, the chores, the, the tasks that you love to do brings the, the best out of you." We thank Galit for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>452</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2e811c36-00b3-11ee-9cc2-2f09a21d699d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9414318708.mp3?updated=1685717269" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lancefly screams bloody Merdoor.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/284/notes</link>
      <description>Brigid O Gorman from Symantec joins Dave to discuss their research, “Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors." Researchers discovered in 2020 that Lancefly, an APT group, is using a custom-written backdoor in attacks targeting government, aviation, educations, and telecoms organizations in South and Southeast Asia.
The research states "The backdoor is used very selectively, appearing on just a handful of networks and a small number of machines over the years, with its use appearing to be highly targeted." These targets, though observed in some activity in 2020 and 2021, started in 2022 and have continued into 2023.
The research can be found here:
Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Jun 2023 05:00:00 -0000</pubDate>
      <itunes:title>Lancefly screams bloody Merdoor.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>284</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Brigid O Gorman from Symantec joins Dave to discuss their research, “Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors." Researchers discovered in 2020 that Lancefly, an APT group, is using a custom-written backdoor in attacks targeting government, aviation, educations, and telecoms organizations in South and Southeast Asia.
The research states "The backdoor is used very selectively, appearing on just a handful of networks and a small number of machines over the years, with its use appearing to be highly targeted." These targets, though observed in some activity in 2020 and 2021, started in 2022 and have continued into 2023.
The research can be found here:
Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Brigid O Gorman from Symantec joins Dave to discuss their research, “Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors." Researchers discovered in 2020 that Lancefly, an APT group, is using a custom-written backdoor in attacks targeting government, aviation, educations, and telecoms organizations in South and Southeast Asia.</p><p>The research states "The backdoor is used very selectively, appearing on just a handful of networks and a small number of machines over the years, with its use appearing to be highly targeted." These targets, though observed in some activity in 2020 and 2021, started in 2022 and have continued into 2023.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lancefly-merdoor-zxshell-custom-backdoor">Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>996</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bb19d784-00c0-11ee-b991-637a29873906]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8595086972.mp3?updated=1685725551" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hackers like to move it, move it. Skimmers observed targeting Americas and Europe. Hybrid war activity.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1836/notes</link>
      <description>MOVEit Transfer software sees exploitation. A website skimmer has been employed against targets in the Americas and Europe. A look into XeGroup's recent criminal activity. Apple denies the FSB’s allegations of collusion with NSA. Kaspersky investigates compromised devices. Johannes Ullrich from SANS describes phony YouTube "live streams". Our guest is Sherry Huang from William and Flora Hewlett Foundation to discuss their grants funding cyber policy studies. And the US Department of Defense provides Starlink services to Ukraine.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/106

Selected reading.
MOVEit Transfer Critical Vulnerability (May 2023) (Progress Software)
Rapid7 Observed Exploitation of Critical MOVEit Transfer Vulnerability (Rapid7)
New MOVEit Transfer zero-day mass-exploited in data theft attacks (BleepingComputer)
Hackers use flaw in popular file transfer tool to steal data, researchers say (Reuters)
New Magecart-Style Campaign Abusing Legitimate Websites to Attack Others (Akamai)
Not your average Joe: An analysis of the XeGroup’s attack techniques (Menlo Security)
Unmasking XE Group: Experts Reveal Identity of Suspected Cybercrime Kingpin (The Hacker News)
Apple denies surveillance claims made by Russia's FSB (Reuters)
FSB uncovers US intelligence operation via malware on Apple mobile phones (TASS)
Kaspersky Says New Zero-Day Malware Hit iPhones—Including Its Own (WIRED)
Operation Triangulation: iOS devices targeted with previously unknown malware (Kaspersky)
Lithuania becomes first to designate Russia as terrorist state (CSCE)
Pentagon confirms SpaceX deal for Ukraine Starlink services (C4ISRNET)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 02 Jun 2023 20:15:00 -0000</pubDate>
      <itunes:title>Hackers like to move it, move it. Skimmers observed targeting Americas and Europe. Hybrid war activity.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1836</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>MOVEit Transfer software sees exploitation. A website skimmer has been employed against targets in the Americas and Europe. A look into XeGroup's recent criminal activity. Apple denies the FSB’s allegations of collusion with NSA. Kaspersky investigates compromised devices. Johannes Ullrich from SANS describes phony YouTube "live streams". Our guest is Sherry Huang from William and Flora Hewlett Foundation to discuss their grants funding cyber policy studies. And the US Department of Defense provides Starlink services to Ukraine.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/106

Selected reading.
MOVEit Transfer Critical Vulnerability (May 2023) (Progress Software)
Rapid7 Observed Exploitation of Critical MOVEit Transfer Vulnerability (Rapid7)
New MOVEit Transfer zero-day mass-exploited in data theft attacks (BleepingComputer)
Hackers use flaw in popular file transfer tool to steal data, researchers say (Reuters)
New Magecart-Style Campaign Abusing Legitimate Websites to Attack Others (Akamai)
Not your average Joe: An analysis of the XeGroup’s attack techniques (Menlo Security)
Unmasking XE Group: Experts Reveal Identity of Suspected Cybercrime Kingpin (The Hacker News)
Apple denies surveillance claims made by Russia's FSB (Reuters)
FSB uncovers US intelligence operation via malware on Apple mobile phones (TASS)
Kaspersky Says New Zero-Day Malware Hit iPhones—Including Its Own (WIRED)
Operation Triangulation: iOS devices targeted with previously unknown malware (Kaspersky)
Lithuania becomes first to designate Russia as terrorist state (CSCE)
Pentagon confirms SpaceX deal for Ukraine Starlink services (C4ISRNET)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>MOVEit Transfer software sees exploitation. A website skimmer has been employed against targets in the Americas and Europe. A look into XeGroup's recent criminal activity. Apple denies the FSB’s allegations of collusion with NSA. Kaspersky investigates compromised devices. Johannes Ullrich from SANS describes phony YouTube "live streams". Our guest is Sherry Huang from William and Flora Hewlett Foundation to discuss their grants funding cyber policy studies. And the US Department of Defense provides Starlink services to Ukraine.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/106</p><p><br></p><h2>Selected reading.</h2><p><a href="https://community.progress.com/s/article/MOVEit-Transfer-Critical-Vulnerability-31May2023">MOVEit Transfer Critical Vulnerability (May 2023)</a> (Progress Software)</p><p><a href="https://www.rapid7.com/blog/post/2023/06/01/rapid7-observed-exploitation-of-critical-moveit-transfer-vulnerability/">Rapid7 Observed Exploitation of Critical MOVEit Transfer Vulnerability</a> (Rapid7)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-moveit-transfer-zero-day-mass-exploited-in-data-theft-attacks/">New MOVEit Transfer zero-day mass-exploited in data theft attacks</a> (BleepingComputer)</p><p><a href="https://www.reuters.com/technology/hackers-use-flaw-popular-file-transfer-tool-steal-data-researchers-say-2023-06-02/">Hackers use flaw in popular file transfer tool to steal data, researchers say</a> (Reuters)</p><p><a href="https://www.akamai.com/blog/security-research/new-magecart-hides-behind-legit-domains">New Magecart-Style Campaign Abusing Legitimate Websites to Attack Others</a> (Akamai)</p><p><a href="https://www.menlosecurity.com/blog/not-your-average-joe-an-analysis-of-the-xegroups-attack-techniques/">Not your average Joe: An analysis of the XeGroup’s attack techniques</a> (Menlo Security)</p><p><a href="https://thehackernews.com/2023/06/unmasking-xe-group-experts-reveal.html">Unmasking XE Group: Experts Reveal Identity of Suspected Cybercrime Kingpin</a> (The Hacker News)</p><p><a href="https://www.reuters.com/technology/apple-denies-surveillance-claims-made-by-russias-fsb-2023-06-01/">Apple denies surveillance claims made by Russia's FSB</a> (Reuters)</p><p><a href="https://tass.com/defense/1626279">FSB uncovers US intelligence operation via malware on Apple mobile phones</a> (TASS)</p><p><a href="https://www.wired.com/story/kaspersky-apple-ios-zero-day-intrusion/">Kaspersky Says New Zero-Day Malware Hit iPhones—Including Its Own</a> (WIRED)</p><p><a href="https://securelist.com/operation-triangulation/109842/">Operation Triangulation: iOS devices targeted with previously unknown malware</a> (Kaspersky)</p><p><a href="https://www.csce.gov/international-impact/press-and-media/news/lithuania-becomes-first-designate-russia-terrorist-state">Lithuania becomes first to designate Russia as terrorist state</a> (CSCE)</p><p><a href="https://www.c4isrnet.com/battlefield-tech/space/2023/06/01/pentagon-confirms-spacex-deal-for-ukraine-starlink-services/">Pentagon confirms SpaceX deal for Ukraine Starlink services</a> (C4ISRNET)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1816</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[323c0fe6-8167-11ed-9779-57d0f0f9896c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1740792987.mp3?updated=1690332949" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Firmware comes in through the back door. Leveraging Adobe for credential harvesting. C2C market notes. Hybrid war updates.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1835/notes</link>
      <description>A backdoor-like issue has been found in Gigabyte firmware. A credential harvesting campaign impersonates Adobe. The Dark Pink gang is active in southeastern Asia. Mitiga discovers a “significant forensic discrepancy” in Google Drive. "Spyboy" is for sale in the C2C market. A look at Cuba ransomware. Ukrainian hacktivists target the Skolkovo Foundation. The FSB says NSA breached iPhones in Russia. Carole Theriault examines Utah's social media bills aimed at kids online. Our guest is Tucker Callaway of Mezmo to discuss the rise of telemetry pipelines. And spoofing positions and evading sanctions.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/105

Selected reading.
Supply Chain Risk from Gigabyte App Center backdoor (Eclypsium)
Ado-be-gone: Armorblox Stops Adobe Impersonation Attack (Armorblox)
Dark Pink back with a bang: 5 new organizations in 3 countries added to victim list (Group-IB)
Southeast Asian hacking crew racks up victims, rapidly expands criminal campaign (CyberScoop)
Suspected State-Backed Hackers Hit Series of New Targets in Europe, SE Asia (Insurance Journal)
Mitiga Security Advisory: Lack of Forensic Visibility with the Basic License in Google Drive (Mitiga)
2023-05-31 // SITUATIONAL AWARENESS // Spyboy Defense Evasion Tool Advertised Online (Reddit)
An In-Depth Look at Cuba Ransomware (Avertium)
Russia’s ‘Silicon Valley’ hit by cyberattack; Ukrainian group claims deep access (The Record)
Russia says U.S. accessed thousands of Apple phones in spy plot (Reuters)
Fake Signals and American Insurance: How a Dark Fleet Moves Russian Oil (The New York Times
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 01 Jun 2023 20:15:00 -0000</pubDate>
      <itunes:title>Firmware comes in through the back door. Leveraging Adobe for credential harvesting. C2C market notes. Hybrid war updates.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1835</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A backdoor-like issue has been found in Gigabyte firmware. A credential harvesting campaign impersonates Adobe. The Dark Pink gang is active in southeastern Asia. Mitiga discovers a “significant forensic discrepancy” in Google Drive. "Spyboy" is for sale in the C2C market. A look at Cuba ransomware. Ukrainian hacktivists target the Skolkovo Foundation. The FSB says NSA breached iPhones in Russia. Carole Theriault examines Utah's social media bills aimed at kids online. Our guest is Tucker Callaway of Mezmo to discuss the rise of telemetry pipelines. And spoofing positions and evading sanctions.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/105

Selected reading.
Supply Chain Risk from Gigabyte App Center backdoor (Eclypsium)
Ado-be-gone: Armorblox Stops Adobe Impersonation Attack (Armorblox)
Dark Pink back with a bang: 5 new organizations in 3 countries added to victim list (Group-IB)
Southeast Asian hacking crew racks up victims, rapidly expands criminal campaign (CyberScoop)
Suspected State-Backed Hackers Hit Series of New Targets in Europe, SE Asia (Insurance Journal)
Mitiga Security Advisory: Lack of Forensic Visibility with the Basic License in Google Drive (Mitiga)
2023-05-31 // SITUATIONAL AWARENESS // Spyboy Defense Evasion Tool Advertised Online (Reddit)
An In-Depth Look at Cuba Ransomware (Avertium)
Russia’s ‘Silicon Valley’ hit by cyberattack; Ukrainian group claims deep access (The Record)
Russia says U.S. accessed thousands of Apple phones in spy plot (Reuters)
Fake Signals and American Insurance: How a Dark Fleet Moves Russian Oil (The New York Times
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A backdoor-like issue has been found in Gigabyte firmware. A credential harvesting campaign impersonates Adobe. The Dark Pink gang is active in southeastern Asia. Mitiga discovers a “significant forensic discrepancy” in Google Drive. "Spyboy" is for sale in the C2C market. A look at Cuba ransomware. Ukrainian hacktivists target the Skolkovo Foundation. The FSB says NSA breached iPhones in Russia. Carole Theriault examines Utah's social media bills aimed at kids online. Our guest is Tucker Callaway of Mezmo to discuss the rise of telemetry pipelines. And spoofing positions and evading sanctions.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/105</p><p><br></p><h2>Selected reading.</h2><p><a href="https://eclypsium.com/blog/supply-chain-risk-from-gigabyte-app-center-backdoor/">Supply Chain Risk from Gigabyte App Center backdoor</a> (Eclypsium)</p><p><a href="https://www.armorblox.com/blog/armorblox-stops-adobe-impersonation-attack/">Ado-be-gone: Armorblox Stops Adobe Impersonation Attack</a> (Armorblox)</p><p><a href="https://www.group-ib.com/media-center/press-releases/dark-pink-episode-2/">Dark Pink back with a bang: 5 new organizations in 3 countries added to victim list</a> (Group-IB)</p><p><a href="https://cyberscoop.com/hacking-southeast-asia-dark-pink/">Southeast Asian hacking crew racks up victims, rapidly expands criminal campaign</a> (CyberScoop)</p><p><a href="https://www.insurancejournal.com/news/international/2023/05/31/722942.htm">Suspected State-Backed Hackers Hit Series of New Targets in Europe, SE Asia</a> (Insurance Journal)</p><p><a href="https://www.mitiga.io/blog/mitiga-security-advisory-lack-of-forensic-visibility-with-the-basic-license-in-google-drive">Mitiga Security Advisory: Lack of Forensic Visibility with the Basic License in Google Drive</a> (Mitiga)</p><p><a href="https://www.reddit.com/r/crowdstrike/comments/13wjrgn/20230531_situational_awareness_spyboy_defense/">2023-05-31 // SITUATIONAL AWARENESS // Spyboy Defense Evasion Tool Advertised Online</a> (Reddit)</p><p><a href="https://explore.avertium.com/resource/an-in-depth-look-at-cuba-ransomware">An In-Depth Look at Cuba Ransomware</a> (Avertium)</p><p><a href="https://therecord.media/skolkovo-foundation-cyberattack-russia-ukraine">Russia’s ‘Silicon Valley’ hit by cyberattack; Ukrainian group claims deep access</a> (The Record)</p><p><a href="https://www.reuters.com/technology/russias-fsb-says-us-nsa-penetrated-thousands-apple-phones-spy-plot-2023-06-01/">Russia says U.S. accessed thousands of Apple phones in spy plot</a> (Reuters)</p><p><a href="https://www.nytimes.com/interactive/2023/05/30/world/asia/russia-oil-ships-sanctions.html">Fake Signals and American Insurance: How a Dark Fleet Moves Russian Oil</a> (The New York Times</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1575</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3226bc40-8167-11ed-9779-47e4645568fe]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4794404188.mp3?updated=1690332933" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Two RAT infestations. Ghosts of sites past. Trends in identity security. Detecting deepfakes may prove more difficult than you think.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1834/notes</link>
      <description>SeroXen is a new elusive evolution of the Quasar RAT that seems to live up to its hype, and DogeRAT is a cheap Trojan targeting Indian Android users. Salesforce ghost sites see abuse by malicious actors. A look into identity security trends. People may be overconfident in their ability to detect deepfakes. Deepen Desai from Zscaler describes a campaign targeting Facebook users. CW Walker from Spycloud outlines identity exposure in the Fortune 1000. And a blurring of the lines between criminal, hacktivist, and strategic motivations.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/104

Selected reading.
SeroXen RAT for sale (AT&amp;T Cybersecurity)
Sneaky DogeRAT Trojan Poses as Popular Apps, Targets Indian Android Users (The Hacker News)
DogeRAT: The Android Malware Campaign Targeting Users Across Multiple Industries (CloudSek)
Ghost Sites: Stealing Data From Deactivated Salesforce Communities (Varonis)
2023 Trends in Securing Digital Identities (Identity Defined Security Alliance)
Jumio 2023 Online Identity Consumer Study (Jumio)
Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals (Trend Micro)
Ukraine's DELTA Military System Users Under Attack from Info Stealing Malware (The Hacker News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 31 May 2023 20:15:00 -0000</pubDate>
      <itunes:title>Two RAT infestations. Ghosts of sites past. Trends in identity security. Detecting deepfakes may prove more difficult than you think.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1834</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>SeroXen is a new elusive evolution of the Quasar RAT that seems to live up to its hype, and DogeRAT is a cheap Trojan targeting Indian Android users. Salesforce ghost sites see abuse by malicious actors. A look into identity security trends. People may be overconfident in their ability to detect deepfakes. Deepen Desai from Zscaler describes a campaign targeting Facebook users. CW Walker from Spycloud outlines identity exposure in the Fortune 1000. And a blurring of the lines between criminal, hacktivist, and strategic motivations.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/104

Selected reading.
SeroXen RAT for sale (AT&amp;T Cybersecurity)
Sneaky DogeRAT Trojan Poses as Popular Apps, Targets Indian Android Users (The Hacker News)
DogeRAT: The Android Malware Campaign Targeting Users Across Multiple Industries (CloudSek)
Ghost Sites: Stealing Data From Deactivated Salesforce Communities (Varonis)
2023 Trends in Securing Digital Identities (Identity Defined Security Alliance)
Jumio 2023 Online Identity Consumer Study (Jumio)
Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals (Trend Micro)
Ukraine's DELTA Military System Users Under Attack from Info Stealing Malware (The Hacker News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>SeroXen is a new elusive evolution of the Quasar RAT that seems to live up to its hype, and DogeRAT is a cheap Trojan targeting Indian Android users. Salesforce ghost sites see abuse by malicious actors. A look into identity security trends. People may be overconfident in their ability to detect deepfakes. Deepen Desai from Zscaler describes a campaign targeting Facebook users. CW Walker from Spycloud outlines identity exposure in the Fortune 1000. And a blurring of the lines between criminal, hacktivist, and strategic motivations.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/104</p><p><br></p><h2>Selected reading.</h2><p><a href="https://cybersecurity.att.com/blogs/labs-research/seroxen-rat-for-sale">SeroXen RAT for sale</a> (AT&amp;T Cybersecurity)</p><p><a href="https://thehackernews.com/2023/05/sneaky-dogerat-trojan-poses-as-popular.html">Sneaky DogeRAT Trojan Poses as Popular Apps, Targets Indian Android Users</a> (The Hacker News)</p><p><a href="https://cloudsek.com/blog/dogerat-the-android-malware-campaign-targeting-users-across-multiple-industries">DogeRAT: The Android Malware Campaign Targeting Users Across Multiple Industries</a> (CloudSek)</p><p><a href="https://www.varonis.com/blog/salesforce-ghost-sites">Ghost Sites: Stealing Data From Deactivated Salesforce Communities</a> (Varonis)</p><p><a href="https://www.idsalliance.org/white-paper/2023-trends-in-securing-digital-identities/">2023 Trends in Securing Digital Identities</a> (Identity Defined Security Alliance)</p><p><a href="https://www.jumio.com/2023-identity-study/">Jumio 2023 Online Identity Consumer Study</a> (Jumio)</p><p><a href="https://www.trendmicro.com/en_us/research/23/e/void-rabisu-s-use-of-romcom-backdoor-shows-a-growing-shift-in-th.html">Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals</a> (Trend Micro)</p><p><a href="https://thehackernews.com/2022/12/ukraines-delta-military-system-users.html">Ukraine's DELTA Military System Users Under Attack from Info Stealing Malware</a> (The Hacker News)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1576</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[30738afe-8167-11ed-9779-0354de60b837]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9650092350.mp3?updated=1690332914" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mirai’s new variant targets IoT devices. Volt Typhoon investigation continues. Hacktivism in Senegal. Lessons learned from Ukraine.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1833/notes</link>
      <description>New Mirai malware uses low-complexity exploits to expand its botnet in IoT devices. The latest on Volt Typhoon. DDoS hits government sites in Senegal. The Pentagon's cyber strategy incorporates lessons from Russia's war, while the EU draws lessons from Ukraine's performance against Russia. Joe Carrigan explains Mandiant research on URL obfuscation. Mr. Security Answer Person John Pescatore plays security whack-a-mole. And NoName disrupts a British airport.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/103

Selected reading.
Old Wine in the New Bottle: Mirai Variant Targets Multiple IoT Devices (Unit 42)
US officials believe Chinese hackers may still have access to key US computer networks (CNN)
Chinese state-sponsored hackers infiltrated U.S. naval infrastructure, secretary of the Navy says (CNBC)
US military intelligence also targeted by Chinese hackers behind critical infrastructure compromise (SC Magazine)
Senegalese government websites hit with cyber attack (Reuters)
DOD Transmits 2023 Cyber Strategy (US Department of Defense)
Fact Sheet: 2023 DOD Cyber Strategy (US Department of Defense)
Lessons from the war in Ukraine for the future of EU defence (European Union External Action)
Investigation Launched After London City Airport Website Hacked (Simple Flying)
Maryland high school listed on Zillow for $42K in ‘creative’ senior prank (New York Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 May 2023 20:15:00 -0000</pubDate>
      <itunes:title>Mirai’s new variant targets IoT devices. Volt Typhoon investigation continues. Hacktivism in Senegal. Lessons learned from Ukraine.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1833</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>New Mirai malware uses low-complexity exploits to expand its botnet in IoT devices. The latest on Volt Typhoon. DDoS hits government sites in Senegal. The Pentagon's cyber strategy incorporates lessons from Russia's war, while the EU draws lessons from Ukraine's performance against Russia. Joe Carrigan explains Mandiant research on URL obfuscation. Mr. Security Answer Person John Pescatore plays security whack-a-mole. And NoName disrupts a British airport.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/103

Selected reading.
Old Wine in the New Bottle: Mirai Variant Targets Multiple IoT Devices (Unit 42)
US officials believe Chinese hackers may still have access to key US computer networks (CNN)
Chinese state-sponsored hackers infiltrated U.S. naval infrastructure, secretary of the Navy says (CNBC)
US military intelligence also targeted by Chinese hackers behind critical infrastructure compromise (SC Magazine)
Senegalese government websites hit with cyber attack (Reuters)
DOD Transmits 2023 Cyber Strategy (US Department of Defense)
Fact Sheet: 2023 DOD Cyber Strategy (US Department of Defense)
Lessons from the war in Ukraine for the future of EU defence (European Union External Action)
Investigation Launched After London City Airport Website Hacked (Simple Flying)
Maryland high school listed on Zillow for $42K in ‘creative’ senior prank (New York Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>New Mirai malware uses low-complexity exploits to expand its botnet in IoT devices. The latest on Volt Typhoon. DDoS hits government sites in Senegal. The Pentagon's cyber strategy incorporates lessons from Russia's war, while the EU draws lessons from Ukraine's performance against Russia. Joe Carrigan explains Mandiant research on URL obfuscation. Mr. Security Answer Person John Pescatore plays security whack-a-mole. And NoName disrupts a British airport.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/103</p><p><br></p><h2>Selected reading.</h2><p><a href="https://unit42.paloaltonetworks.com/mirai-variant-iz1h9/">Old Wine in the New Bottle: Mirai Variant Targets Multiple IoT Devices</a> (Unit 42)</p><p><a href="https://www.cnn.com/2023/05/26/politics/us-chinese-hackers-rob-joyce/index.html">US officials believe Chinese hackers may still have access to key US computer networks</a> (CNN)</p><p><a href="https://www.cnbc.com/2023/05/25/us-navy-impacted-by-china-backed-hackers-secretary-of-the-navy.html">Chinese state-sponsored hackers infiltrated U.S. naval infrastructure, secretary of the Navy says</a> (CNBC)</p><p><a href="https://www.scmagazine.com/brief/threat-intelligence/us-military-intelligence-also-targeted-by-chinese-hackers-behind-critical-infrastructure-compromise">US military intelligence also targeted by Chinese hackers behind critical infrastructure compromise</a> (SC Magazine)</p><p><a href="https://www.reuters.com/world/africa/senegalese-government-websites-hit-with-cyberattack-2023-05-27/">Senegalese government websites hit with cyber attack</a> (Reuters)</p><p><a href="https://www.defense.gov/News/Releases/Release/Article/3408707/dod-transmits-2023-cyber-strategy/">DOD Transmits 2023 Cyber Strategy</a> (US Department of Defense)</p><p><a href="https://media.defense.gov/2023/May/26/2003231006/-1/-1/1/2023-DOD-CYBER-STRATEGY-FACT-SHEET.PDF">Fact Sheet: 2023 DOD Cyber Strategy</a> (US Department of Defense)</p><p><a href="https://www.eeas.europa.eu/eeas/lessons-war-ukraine-future-eu-defence_en">Lessons from the war in Ukraine for the future of EU defence</a> (European Union External Action)</p><p><a href="https://simpleflying.com/investigation-launched-london-city-airport-website-hacked/">Investigation Launched After London City Airport Website Hacked</a> (Simple Flying)</p><p><a href="https://nypost.com/2023/05/27/meade-senior-high-school-listed-on-zillow-for-in-senior-prank/">Maryland high school listed on Zillow for $42K in ‘creative’ senior prank</a> (New York Post)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1473</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[30c4cfea-8167-11ed-9779-0f33bbab03b2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3009196034.mp3?updated=1690332895" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stacy Dunn: My superpower and my kryptonite. [Engineer] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/151/notes</link>
      <description>Stacy Dunn, a Senior Solutions Engineer from the SANS Institute sits down and shares what it is like to work through her own adversity to get to be where she is today. Stacy shares some of her experiences as a woman with ADHD working in an IT career and explains her tips for other neurodiverse people in the field. After working in a wide array of positions in different fields, she wanted to go back to school to get her degree in management information systems and information assurance. Eventually she started working her way up the ladder, and became a very successful woman in the IT world. She shares her struggles with ADHD as she was making the climb and says "It's both a superpower and kryptonite because I think something that is a fundamental misunderstanding of most people, and maybe even some people that do have ADHD, is that it's not just the aspect of not being able to focus, it's also an aspect of focusing too much." We thank Stacy for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 28 May 2023 07:00:00 -0000</pubDate>
      <itunes:title>Stacy Dunn: My superpower and my kryptonite. [Engineer] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>151</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Stacy Dunn, a Senior Solutions Engineer from the SANS Institute sits down and shares what it is like to work through her own adversity to get to be where she is today. Stacy shares some of her experiences as a woman with ADHD working in an IT career and explains her tips for other neurodiverse people in the field. After working in a wide array of positions in different fields, she wanted to go back to school to get her degree in management information systems and information assurance. Eventually she started working her way up the ladder, and became a very successful woman in the IT world. She shares her struggles with ADHD as she was making the climb and says "It's both a superpower and kryptonite because I think something that is a fundamental misunderstanding of most people, and maybe even some people that do have ADHD, is that it's not just the aspect of not being able to focus, it's also an aspect of focusing too much." We thank Stacy for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Stacy Dunn, a Senior Solutions Engineer from the SANS Institute sits down and shares what it is like to work through her own adversity to get to be where she is today. Stacy shares some of her experiences as a woman with ADHD working in an IT career and explains her tips for other neurodiverse people in the field. After working in a wide array of positions in different fields, she wanted to go back to school to get her degree in management information systems and information assurance. Eventually she started working her way up the ladder, and became a very successful woman in the IT world. She shares her struggles with ADHD as she was making the climb and says "It's both a superpower and kryptonite because I think something that is a fundamental misunderstanding of most people, and maybe even some people that do have ADHD, is that it's not just the aspect of not being able to focus, it's also an aspect of focusing too much." We thank Stacy for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>482</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5e370f2a-009b-11ee-8be3-f7ef28a32c5d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9622556752.mp3?updated=1685049576" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>8 GoAnywhere MFT breaches and counting. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/283/notes</link>
      <description>This week, our guests are Emily Austin and Himaja Motheram from Censys and their sharing their research - "Months after first GoAnywhere MFT zero-day attacks, Censys still sees about 180 public admin panels." In early February 2023, Censys researchers discovered a zero-day RCE vulnerability in Fortra’s “GoAnywhere MFT” (Managed File Transfer) software.
After finding this the Clop ransomware gang claimed that they exploited this vulnerability to breach the data of 130 organizations and Censys found other ransomware groups were jumping on the bandwagon. They said " A single vulnerable instance has the potential to serve as a gateway to a data breach that could potentially impact millions of individuals."
The research can be found here:
Months after first GoAnywhere MFT zero-day attacks, Censys still sees ~180 public admin panels

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 May 2023 07:00:00 -0000</pubDate>
      <itunes:title>8 GoAnywhere MFT breaches and counting. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>283</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week, our guests are Emily Austin and Himaja Motheram from Censys and their sharing their research - "Months after first GoAnywhere MFT zero-day attacks, Censys still sees about 180 public admin panels." In early February 2023, Censys researchers discovered a zero-day RCE vulnerability in Fortra’s “GoAnywhere MFT” (Managed File Transfer) software.
After finding this the Clop ransomware gang claimed that they exploited this vulnerability to breach the data of 130 organizations and Censys found other ransomware groups were jumping on the bandwagon. They said " A single vulnerable instance has the potential to serve as a gateway to a data breach that could potentially impact millions of individuals."
The research can be found here:
Months after first GoAnywhere MFT zero-day attacks, Censys still sees ~180 public admin panels

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week, our guests are Emily Austin and Himaja Motheram from Censys and their sharing their research - "Months after first GoAnywhere MFT zero-day attacks, Censys still sees about 180 public admin panels." In early February 2023, Censys researchers discovered a zero-day RCE vulnerability in Fortra’s “GoAnywhere MFT” (Managed File Transfer) software.</p><p>After finding this the Clop ransomware gang claimed that they exploited this vulnerability to breach the data of 130 organizations and Censys found other ransomware groups were jumping on the bandwagon. They said " A single vulnerable instance has the potential to serve as a gateway to a data breach that could potentially impact millions of individuals."</p><p>The research can be found here:</p><ul><li><a href="https://censys.wpengine.com/months-after-first-goanywhere-mft-zero-day-attacks-censys-still-sees-180-public-admin-panels/">Months after first GoAnywhere MFT zero-day attacks, Censys still sees ~180 public admin panels</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1063</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4c9805bc-009b-11ee-b19b-6f31d7550d87]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9770035577.mp3?updated=1685050040" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CosmicEnergy: OT and ICS malware from Russia, maybe for red teaming. Updates on Volt Typhoon. Legion malware upgraded for the cloud. Natural-disaster-themed online fraud. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1832/notes</link>
      <description>CosmicEnergy is OT and ICS malware from Russia, maybe for red teaming, maybe for attack. Updates on Volt Typhoon, China’s battlespace preparation in Guam and elsewhere. In the criminal underworld, Legion malware has been upgraded for the cloud. Johannes Ullrich from SANS examines time gaps in logging. Our guest is Kevin Kirkwood from LogRhythm with a look at extortion attempts and ransomware. And Atlantic hurricane season officially opens next week: time to batten down those digital hatches. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/102

Selected reading.
COSMICENERGY: New OT Malware Possibly Related To Russian Emergency Response Exercises (Mandiant)
People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection (Joint Advisory)
Volt Typhoon targets US critical infrastructure with living-off-the-land techniques (Microsoft) 
China hits back at 'the empire of hacking' over Five Eyes US cyber attack claims (ABC)
Updates to Legion: A Cloud Credential Harvester and SMTP Hijacker (Cado)
Legion Malware Upgraded to Target SSH Servers and AWS Credentials (Hacker News)
CISA Warns of Hurricane/Typhoon-Related Scams (Cybersecurity and Infrastructure Security Agency CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 26 May 2023 20:15:00 -0000</pubDate>
      <itunes:title>CosmicEnergy: OT and ICS malware from Russia, maybe for red teaming. Updates on Volt Typhoon. Legion malware upgraded for the cloud. Natural-disaster-themed online fraud. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1832</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CosmicEnergy is OT and ICS malware from Russia, maybe for red teaming, maybe for attack. Updates on Volt Typhoon, China’s battlespace preparation in Guam and elsewhere. In the criminal underworld, Legion malware has been upgraded for the cloud. Johannes Ullrich from SANS examines time gaps in logging. Our guest is Kevin Kirkwood from LogRhythm with a look at extortion attempts and ransomware. And Atlantic hurricane season officially opens next week: time to batten down those digital hatches. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/102

Selected reading.
COSMICENERGY: New OT Malware Possibly Related To Russian Emergency Response Exercises (Mandiant)
People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection (Joint Advisory)
Volt Typhoon targets US critical infrastructure with living-off-the-land techniques (Microsoft) 
China hits back at 'the empire of hacking' over Five Eyes US cyber attack claims (ABC)
Updates to Legion: A Cloud Credential Harvester and SMTP Hijacker (Cado)
Legion Malware Upgraded to Target SSH Servers and AWS Credentials (Hacker News)
CISA Warns of Hurricane/Typhoon-Related Scams (Cybersecurity and Infrastructure Security Agency CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CosmicEnergy is OT and ICS malware from Russia, maybe for red teaming, maybe for attack. Updates on Volt Typhoon, China’s battlespace preparation in Guam and elsewhere. In the criminal underworld, Legion malware has been upgraded for the cloud. Johannes Ullrich from SANS examines time gaps in logging. Our guest is Kevin Kirkwood from LogRhythm with a look at extortion attempts and ransomware. And Atlantic hurricane season officially opens next week: time to batten down those digital hatches. </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/102</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.mandiant.com/resources/blog/cosmicenergy-ot-malware-russian-response">COSMICENERGY: New OT Malware Possibly Related To Russian Emergency Response Exercises</a> (Mandiant)</p><p><a href="https://media.defense.gov/2023/May/24/2003229517/-1/-1/0/CSA_Living_off_the_Land.PDF">People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection</a> (Joint Advisory)</p><p><a href="https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/">Volt Typhoon targets US critical infrastructure with living-off-the-land techniques</a> (Microsoft) </p><p><a href="https://www.abc.net.au/news/2023-05-25/china-hits-back-over-us-infrastructure-cyber-attack-five-eyes/102394724">China hits back at 'the empire of hacking' over Five Eyes US cyber attack claims</a> (ABC)</p><p><a href="https://www.cadosecurity.com/updates-to-legion-a-cloud-credential-harvester-and-smtp-hijacker/">Updates to Legion: A Cloud Credential Harvester and SMTP Hijacker</a> (Cado)</p><p><a href="https://thehackernews.com/2023/05/legion-malware-upgraded-to-target-ssh.html">Legion Malware Upgraded to Target SSH Servers and AWS Credentials</a> (Hacker News)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/05/25/cisa-warns-hurricanetyphoon-related-scams">CISA Warns of Hurricane/Typhoon-Related Scams</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1617</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[30591fa2-8167-11ed-9779-4b52e5066317]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1488023889.mp3?updated=1690332878" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Volt Typhoon goes undetected by living off the land. New gang, old ransomware. KillNet says no to slacker hackers.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1831/notes</link>
      <description>China's Volt Typhoon snoops into US infrastructure, with special attention paid to Guam. Iranian cybercriminals are seen conducting ops against Israeli targets. A new ransomware gang uses recycled ransomware. A persistent Brazilian campaign targets Portuguese financial institutions. A new botnet targets the gaming industry. Phishing attempts impersonate OpenAI. Pro-Russian geolocation graffiti. Andrea Little Limbago from Interos addresses the policy implications of ChatGPT. Our guest is Jon Check from Raytheon Intelligence &amp; Space, on cybersecurity and workforce strategy for the space community. And KillNet says no to slacker hackers.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/101

Selected reading.
People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection (Joint Advisory)
Volt Typhoon targets US critical infrastructure with living-off-the-land techniques (Microsoft)
Chinese hackers spying on US critical infrastructure, Western intelligence says (Reuters)
Agrius Deploys Moneybird in Targeted Attacks Against Israeli Organizations (Check Point)
Iran-linked hackers Agrius deploying new ransomware against Israeli orgs (The Record)
Iranian Hackers Set Sights On Israeli Shipping &amp; Logistics Firms (Information Security Buzz)
Fata Morgana: Watering hole attack on shipping and logistics websites (ClearSky Security)
Iran suspect in cyberattack targeting Israeli shipping, financial firms (Al-Monitor)
Buhti: New Ransomware Operation Relies on Repurposed Payloads (Symantec)
Operation Magalenha | Long-Running Campaign Pursues Portuguese Credentials and PII (SentinelOne)
The Dark Frost Enigma: An Unexpectedly Prevalent Botnet Author Profile (Akamai)
Fresh Phish: ChatGPT Impersonation Fuels a Clever Phishing Scam (INKY)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 25 May 2023 20:15:00 -0000</pubDate>
      <itunes:title>Volt Typhoon goes undetected by living off the land. New gang, old ransomware. KillNet says no to slacker hackers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1831</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>China's Volt Typhoon snoops into US infrastructure, with special attention paid to Guam. Iranian cybercriminals are seen conducting ops against Israeli targets. A new ransomware gang uses recycled ransomware. A persistent Brazilian campaign targets Portuguese financial institutions. A new botnet targets the gaming industry. Phishing attempts impersonate OpenAI. Pro-Russian geolocation graffiti. Andrea Little Limbago from Interos addresses the policy implications of ChatGPT. Our guest is Jon Check from Raytheon Intelligence &amp; Space, on cybersecurity and workforce strategy for the space community. And KillNet says no to slacker hackers.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/101

Selected reading.
People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection (Joint Advisory)
Volt Typhoon targets US critical infrastructure with living-off-the-land techniques (Microsoft)
Chinese hackers spying on US critical infrastructure, Western intelligence says (Reuters)
Agrius Deploys Moneybird in Targeted Attacks Against Israeli Organizations (Check Point)
Iran-linked hackers Agrius deploying new ransomware against Israeli orgs (The Record)
Iranian Hackers Set Sights On Israeli Shipping &amp; Logistics Firms (Information Security Buzz)
Fata Morgana: Watering hole attack on shipping and logistics websites (ClearSky Security)
Iran suspect in cyberattack targeting Israeli shipping, financial firms (Al-Monitor)
Buhti: New Ransomware Operation Relies on Repurposed Payloads (Symantec)
Operation Magalenha | Long-Running Campaign Pursues Portuguese Credentials and PII (SentinelOne)
The Dark Frost Enigma: An Unexpectedly Prevalent Botnet Author Profile (Akamai)
Fresh Phish: ChatGPT Impersonation Fuels a Clever Phishing Scam (INKY)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>China's Volt Typhoon snoops into US infrastructure, with special attention paid to Guam. Iranian cybercriminals are seen conducting ops against Israeli targets. A new ransomware gang uses recycled ransomware. A persistent Brazilian campaign targets Portuguese financial institutions. A new botnet targets the gaming industry. Phishing attempts impersonate OpenAI. Pro-Russian geolocation graffiti. Andrea Little Limbago from Interos addresses the policy implications of ChatGPT. Our guest is Jon Check from Raytheon Intelligence &amp; Space, on cybersecurity and workforce strategy for the space community. And KillNet says no to slacker hackers.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/101</p><p><br></p><h2>Selected reading.</h2><p><a href="https://media.defense.gov/2023/May/24/2003229517/-1/-1/0/CSA_Living_off_the_Land.PDF">People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection</a> (Joint Advisory)</p><p><a href="https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/">Volt Typhoon targets US critical infrastructure with living-off-the-land techniques</a> (Microsoft)</p><p><a href="https://www.reuters.com/technology/microsoft-says-china-backed-hacker-targeted-critical-us-infrastructure-2023-05-24/">Chinese hackers spying on US critical infrastructure, Western intelligence says</a> (Reuters)</p><p><a href="https://research.checkpoint.com/2023/agrius-deploys-moneybird-in-targeted-attacks-against-israeli-organizations/">Agrius Deploys Moneybird in Targeted Attacks Against Israeli Organizations</a> (Check Point)</p><p><a href="https://therecord.media/iran-hackers-agrius-deploying-new-ransomware">Iran-linked hackers Agrius deploying new ransomware against Israeli orgs</a> (The Record)</p><p><a href="https://informationsecuritybuzz.com/iranian-hackers-set-sights-israeli-shipping-logistics-firms/">Iranian Hackers Set Sights On Israeli Shipping &amp; Logistics Firms</a> (Information Security Buzz)</p><p><a href="https://www.clearskysec.com/wp-content/uploads/2023/05/Fata-Morgana-Israeli-Websites-Infected-by-Iranian-Group-1.8.pdf">Fata Morgana: Watering hole attack on shipping and logistics websites</a> (ClearSky Security)</p><p><a href="https://www.al-monitor.com/originals/2023/05/iran-suspect-cyberattack-targeting-israeli-shipping-financial-firms">Iran suspect in cyberattack targeting Israeli shipping, financial firms</a> (Al-Monitor)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/buhti-ransomware">Buhti: New Ransomware Operation Relies on Repurposed Payloads</a> (Symantec)</p><p><a href="https://www.sentinelone.com/labs/operation-magalenha-long-running-campaign-pursues-portuguese-credentials-and-pii/">Operation Magalenha | Long-Running Campaign Pursues Portuguese Credentials and PII</a> (SentinelOne)</p><p><a href="https://www.akamai.com/blog/security-research/dark-frost-botnet-unexpected-author-profile">The Dark Frost Enigma: An Unexpectedly Prevalent Botnet Author Profile</a> (Akamai)</p><p><a href="https://www.inky.com/en/blog/fresh-phish-chatgpt-impersonation-fuels-a-clever-phishing-scam">Fresh Phish: ChatGPT Impersonation Fuels a Clever Phishing Scam</a> (INKY)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1963</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[308e89d0-8167-11ed-9779-8f09071b13b4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7097259365.mp3?updated=1690332864" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA23-144A – People's Republic of China state-sponsored cyber actor living off the land to evade detection. [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/50/notes</link>
      <description>Cybersecurity authorities are issuing this joint Cybersecurity Advisory to highlight a recent cluster of activity associated with a People’s Republic of China state-sponsored cyber actor, also known as Volt Typhoon. 
AA23-144A Alert, Technical Details, and Mitigations
Active Directory and domain controller hardening: Best Practices for Securing Active Directory | Microsoft Learn
CISA regional cyber threats: China Cyber Threat Overview and Advisories
Microsoft Threat Intelligence blog: Volt Typhoon targets US critical infrastructure with living-off-the-land techniques | Microsoft Security Blog
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 25 May 2023 14:37:00 -0000</pubDate>
      <itunes:title>CISA Alert AA23-144A – People's Republic of China state-sponsored cyber actor living off the land to evade detection. [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>50</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cybersecurity authorities are issuing this joint Cybersecurity Advisory to highlight a recent cluster of activity associated with a People’s Republic of China state-sponsored cyber actor, also known as Volt Typhoon. 
AA23-144A Alert, Technical Details, and Mitigations
Active Directory and domain controller hardening: Best Practices for Securing Active Directory | Microsoft Learn
CISA regional cyber threats: China Cyber Threat Overview and Advisories
Microsoft Threat Intelligence blog: Volt Typhoon targets US critical infrastructure with living-off-the-land techniques | Microsoft Security Blog
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cybersecurity authorities are issuing this joint Cybersecurity Advisory to highlight a recent cluster of activity associated with a People’s Republic of China state-sponsored cyber actor, also known as Volt Typhoon. </p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a">AA23-144A Alert, Technical Details, and Mitigations</a></p><p>Active Directory and domain controller hardening: <a href="https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/best-practices-for-securing-active-directory">Best Practices for Securing Active Directory | Microsoft Learn</a></p><p>CISA regional cyber threats: <a href="https://www.cisa.gov/china">China Cyber Threat Overview and Advisories</a></p><p>Microsoft Threat Intelligence blog: <a href="https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/">Volt Typhoon targets US critical infrastructure with living-off-the-land techniques | Microsoft Security Blog</a></p><p>No-cost cyber hygiene services: <a href="https://www.cisa.gov/cyber-hygiene-services">Cyber Hygiene Services</a> and <a href="https://github.com/cisagov/cset/">Ransomware Readiness Assessment</a>.</p><p>U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email <a href="mailto:dib_defense@cyber.nsa.gov">dib_defense@cyber.nsa.gov</a> </p><p>To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="mailto:report@cisa.gov">report@cisa.gov</a>, or call (888) 282-0870, or report incidents to your local FBI field office.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>163</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ce6a0abe-fb09-11ed-8ca0-bb07b59767ea]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6571772275.mp3?updated=1685025635" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybercriminals favor cyberespionage in North Korea, Russia, and parts unknown. Movements and activity in the cyber underworld.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1830/notes</link>
      <description>Kimsuky's tailored reconnaissance tools. GoldenJackal is an APT quietly active since 2019. Criminals target Youtube viewers with free cracked software. Rheinmetall’s data was posted to BlackBasta's extortion site. The "Cuba" gang claims credit for the attack on the Philadelphia Inquirer. CERT-UA identifies a probable Russian cyberespionage campaign. Ireland views cyber assistance to Ukraine as a contribution to collective security. Ann Johnson from Afternoon Cyber Tea speaks with Tyrance Billingsley about Black Tech. Our guest is Oz Alashe from CybSafe on raising VC money amidst a down economy. And KillNet's underperforming hacktivists.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/100

Selected reading.
Kimsuky | Ongoing Campaign Using Tailored Reconnaissance Toolkit (SentinelOne)
North Korean Kimsuky Hackers Strike Again with Advanced Reconnaissance Malware (The Hacker News)
Meet the GoldenJackal APT group. Don’t expect any howls (Kaspersky)
Follina — a Microsoft Office code execution vulnerability (DoublePulsar)
YouTube Pirated Software Videos Deliver Triple Threat: Vidar Stealer, Laplas Clipper, XMRig Miner (FortiGuard Labs)
Arms maker Rheinmetall confirms BlackBasta ransomware attack (Bleeping Computer)
Inquirer and forensics team investigating computer disruptions to publishing (Philadelphia Inquirer)
Cuba ransomware claims cyberattack on Philadelphia Inquirer (Bleeping Computer)
Espionage activity UAC-0063 in relation to Ukraine, Kazakhstan, Kyrgyzstan, Mongolia, Israel, India (CERT-UA#6549) (CERT-UA)
Ukraine Identifies Central Asian Cyberespionage Campaign (BankInfoSecurity)
Ireland’s cyber security agency has been providing ‘non-lethal aid’ to Ukraine (Irish Times)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 24 May 2023 20:15:00 -0000</pubDate>
      <itunes:title>Cybercriminals favor cyberespionage in North Korea, Russia, and parts unknown. Movements and activity in the cyber underworld.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1830</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Kimsuky's tailored reconnaissance tools. GoldenJackal is an APT quietly active since 2019. Criminals target Youtube viewers with free cracked software. Rheinmetall’s data was posted to BlackBasta's extortion site. The "Cuba" gang claims credit for the attack on the Philadelphia Inquirer. CERT-UA identifies a probable Russian cyberespionage campaign. Ireland views cyber assistance to Ukraine as a contribution to collective security. Ann Johnson from Afternoon Cyber Tea speaks with Tyrance Billingsley about Black Tech. Our guest is Oz Alashe from CybSafe on raising VC money amidst a down economy. And KillNet's underperforming hacktivists.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/100

Selected reading.
Kimsuky | Ongoing Campaign Using Tailored Reconnaissance Toolkit (SentinelOne)
North Korean Kimsuky Hackers Strike Again with Advanced Reconnaissance Malware (The Hacker News)
Meet the GoldenJackal APT group. Don’t expect any howls (Kaspersky)
Follina — a Microsoft Office code execution vulnerability (DoublePulsar)
YouTube Pirated Software Videos Deliver Triple Threat: Vidar Stealer, Laplas Clipper, XMRig Miner (FortiGuard Labs)
Arms maker Rheinmetall confirms BlackBasta ransomware attack (Bleeping Computer)
Inquirer and forensics team investigating computer disruptions to publishing (Philadelphia Inquirer)
Cuba ransomware claims cyberattack on Philadelphia Inquirer (Bleeping Computer)
Espionage activity UAC-0063 in relation to Ukraine, Kazakhstan, Kyrgyzstan, Mongolia, Israel, India (CERT-UA#6549) (CERT-UA)
Ukraine Identifies Central Asian Cyberespionage Campaign (BankInfoSecurity)
Ireland’s cyber security agency has been providing ‘non-lethal aid’ to Ukraine (Irish Times)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kimsuky's tailored reconnaissance tools. GoldenJackal is an APT quietly active since 2019. Criminals target Youtube viewers with free cracked software. Rheinmetall’s data was posted to BlackBasta's extortion site. The "Cuba" gang claims credit for the attack on the Philadelphia Inquirer. CERT-UA identifies a probable Russian cyberespionage campaign. Ireland views cyber assistance to Ukraine as a contribution to collective security. Ann Johnson from Afternoon Cyber Tea speaks with Tyrance Billingsley about Black Tech. Our guest is Oz Alashe from CybSafe on raising VC money amidst a down economy. And KillNet's underperforming hacktivists.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/100</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.sentinelone.com/labs/kimsuky-ongoing-campaign-using-tailored-reconnaissance-toolkit/">Kimsuky | Ongoing Campaign Using Tailored Reconnaissance Toolkit</a> (SentinelOne)</p><p><a href="https://thehackernews.com/2023/05/north-korean-kimsuky-hackers-strike.html">North Korean Kimsuky Hackers Strike Again with Advanced Reconnaissance Malware</a> (The Hacker News)</p><p><a href="https://securelist.com/goldenjackal-apt-group/109677/">Meet the GoldenJackal APT group. Don’t expect any howls</a> (Kaspersky)</p><p><a href="https://doublepulsar.com/follina-a-microsoft-office-code-execution-vulnerability-1a47fce5629e">Follina — a Microsoft Office code execution vulnerability</a> (DoublePulsar)</p><p><a href="https://www.fortinet.com/blog/threat-research/youtube-pirated-software-videos-deliver-triple-threat-vidar-stealer-laplas-clipper-xmrig-miner">YouTube Pirated Software Videos Deliver Triple Threat: Vidar Stealer, Laplas Clipper, XMRig Miner</a> (FortiGuard Labs)</p><p><a href="https://www.bleepingcomputer.com/news/security/arms-maker-rheinmetall-confirms-blackbasta-ransomware-attack/">Arms maker Rheinmetall confirms BlackBasta ransomware attack</a> (Bleeping Computer)</p><p><a href="https://www.inquirer.com/news/inquirer-computer-systems-kroll-forensics-20230513.html">Inquirer and forensics team investigating computer disruptions to publishing</a> (Philadelphia Inquirer)</p><p><a href="https://www.bleepingcomputer.com/news/security/cuba-ransomware-claims-cyberattack-on-philadelphia-inquirer/">Cuba ransomware claims cyberattack on Philadelphia Inquirer</a> (Bleeping Computer)</p><p><a href="https://cert.gov.ua/article/4697016">Espionage activity UAC-0063 in relation to Ukraine, Kazakhstan, Kyrgyzstan, Mongolia, Israel, India (CERT-UA#6549)</a> (CERT-UA)</p><p><a href="https://www.bankinfosecurity.com/ukraine-identifies-central-asian-cyberespionage-campaign-a-22143">Ukraine Identifies Central Asian Cyberespionage Campaign</a> (BankInfoSecurity)</p><p><a href="https://www.irishtimes.com/politics/oireachtas/2023/05/23/ransomware-attacks-still-most-pressing-cyber-security-risk-in-ai-era-tds-to-hear/">Ireland’s cyber security agency has been providing ‘non-lethal aid’ to Ukraine</a> (Irish Times)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1568</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[30a9308c-8167-11ed-9779-5b1551e40979]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7584530334.mp3?updated=1690332843" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BlackCat gang crosses your path and evades detection. You’re just too good to be true, can’t money launder for you. Commercial spyware cases.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1829/notes</link>
      <description>AhRat exfiltrates files and records audio on Android devices. The BlackCat ransomware group uses a signed kernel driver to evade detection. GUI-Vil in the cloud. Unwitting money mules. Ben Yelin unpacks the Supreme Court’s section 230 rulings. Our guest is Mike DeNapoli from Cymulate with insights on cybersecurity effectiveness. And a trio of commercial spyware cases.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/99

Selected reading.
Android app breaking bad: From legitimate screen recording to file exfiltration within a year (ESET)
Love scam or espionage? Transparent Tribe lures Indian and Pakistani officials (ESET)
BlackCat Ransomware Deploys New Signed Kernel Driver (Trend Micro)
Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor (Permiso)
Uncle Sam strangles criminals' cashflow by reining in money mules (The Register)
German prosecutors charge four over violating trade act to sell spyware to Turkey (Washington Post)
Israel Torpedoed Morocco Spyware Deal - and NSO Competitor QuaDream Shut Down (Haaretz)
He Was Investigating Mexico’s Military. Then the Spying Began. (New York Times)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 May 2023 20:25:00 -0000</pubDate>
      <itunes:title>BlackCat gang crosses your path and evades detection. You’re just too good to be true, can’t money launder for you. Commercial spyware cases.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1829</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>AhRat exfiltrates files and records audio on Android devices. The BlackCat ransomware group uses a signed kernel driver to evade detection. GUI-Vil in the cloud. Unwitting money mules. Ben Yelin unpacks the Supreme Court’s section 230 rulings. Our guest is Mike DeNapoli from Cymulate with insights on cybersecurity effectiveness. And a trio of commercial spyware cases.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/99

Selected reading.
Android app breaking bad: From legitimate screen recording to file exfiltration within a year (ESET)
Love scam or espionage? Transparent Tribe lures Indian and Pakistani officials (ESET)
BlackCat Ransomware Deploys New Signed Kernel Driver (Trend Micro)
Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor (Permiso)
Uncle Sam strangles criminals' cashflow by reining in money mules (The Register)
German prosecutors charge four over violating trade act to sell spyware to Turkey (Washington Post)
Israel Torpedoed Morocco Spyware Deal - and NSO Competitor QuaDream Shut Down (Haaretz)
He Was Investigating Mexico’s Military. Then the Spying Began. (New York Times)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>AhRat exfiltrates files and records audio on Android devices. The BlackCat ransomware group uses a signed kernel driver to evade detection. GUI-Vil in the cloud. Unwitting money mules. Ben Yelin unpacks the Supreme Court’s section 230 rulings. Our guest is Mike DeNapoli from Cymulate with insights on cybersecurity effectiveness. And a trio of commercial spyware cases.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/99</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.welivesecurity.com/2023/05/23/android-app-breaking-bad-legitimate-screen-recording-file-exfiltration/">Android app breaking bad: From legitimate screen recording to file exfiltration within a year</a> (ESET)</p><p><a href="https://www.welivesecurity.com/2023/03/07/love-scam-espionage-transparent-tribe-lures-indian-pakistani-officials/">Love scam or espionage? Transparent Tribe lures Indian and Pakistani officials</a> (ESET)</p><p><a href="https://www.trendmicro.com/en_gb/research/23/e/blackcat-ransomware-deploys-new-signed-kernel-driver.html">BlackCat Ransomware Deploys New Signed Kernel Driver</a> (Trend Micro)</p><p><a href="https://permiso.io/blog/s/unmasking-guivil-new-cloud-threat-actor/">Unmasking GUI-Vil: Financially Motivated Cloud Threat Actor</a> (Permiso)</p><p><a href="https://www.theregister.com/2023/05/23/us_law_enforcement_money_mules/">Uncle Sam strangles criminals' cashflow by reining in money mules</a> (The Register)</p><p><a href="https://www.washingtonpost.com/business/2023/05/22/germany-spyware-charges-finspy-turkey/afd162ea-f88f-11ed-bafc-bf50205661da_story.html">German prosecutors charge four over violating trade act to sell spyware to Turkey</a> (Washington Post)</p><p><a href="https://www.haaretz.com/israel-news/security-aviation/2023-05-23/ty-article/israel-torpedoed-morocco-spyware-deal-and-nso-competitor-quadream-shut-down/00000188-425a-d805-a7c9-dbdbd7f50000">Israel Torpedoed Morocco Spyware Deal - and NSO Competitor QuaDream Shut Down</a> (Haaretz)</p><p><a href="https://www.nytimes.com/2023/05/22/world/americas/mexico-spying-pegasus-israel.html">He Was Investigating Mexico’s Military. Then the Spying Began.</a> (New York Times)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1772</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[30dda1dc-8167-11ed-9779-df0338d0835b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5777415201.mp3?updated=1690332820" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Record GDPR fine. Movements in the cyber underworld. FBI found to have overstepped surveillance authorities.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1828/notes</link>
      <description>The EU fines Meta for transatlantic data transfers. FIN7 returns, bearing Cl0p ransomware. Python Package Index temporarily suspends new registrations due to a spike in malicious activity. Typosquatting and TurkoRAT. UNC3944 uses SIM swapping to gain access to Azure admin accounts. A Turla retrospective. Rick Howard tackles workforce development. Our guest is Andrew Peterson of Fastly to discuss the intricate challenges of secure software development. And the FBI was found overstepping its surveillance authorities.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/98

Selected reading.
Meta Fined $1.3 Billion Over Data Transfers to U.S. (Wall Street Journal)
Meta fined record $1.3 billion and ordered to stop sending European user data to US (AP News)
Notorious Cyber Gang FIN7 Returns With Cl0p Ransomware in New Wave of Attacks (The Hacker News)
Researchers tie FIN7 cybercrime family to Clop ransomware (The Record)
Cybercrime gang FIN7 returned and was spotted delivering Clop ransomware (Security Affairs)
PyPI new user and new project registrations temporarily suspended. (Python)
PyPI repository restored after temporarily suspending new activity (Computing)
RATs found hiding in the NPM attic (ReversingLabs)
Legitimate looking npm packages found hosting TurkoRat infostealer (CSO Online)
SIM Swapping and Abuse of the Microsoft Azure Serial Console: Serial Is Part of a Well Balanced Attack (Mandiant)
Mozilla Explains: SIM swapping (Mozilla)
The Underground History of Russia’s Most Ingenious Hacker Group (WIRED)
Justice Department Announces Court-Authorized Disruption of Snake Malware Network Controlled by Russia’s Federal Security Service (US Department of Justice)
Hunting Russian Intelligence “Snake” Malware (CISA)
FBI misused intelligence database in 278,000 searches, court says (Reuters)
FBI misused controversial surveillance tool to investigate Jan. 6 protesters (The Record)
FBI broke rules in scouring foreign intelligence on Jan. 6 riot, racial justice protests, court says (AP News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 22 May 2023 20:15:00 -0000</pubDate>
      <itunes:title>Record GDPR fine. Movements in the cyber underworld. FBI found to have overstepped surveillance authorities.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1828</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The EU fines Meta for transatlantic data transfers. FIN7 returns, bearing Cl0p ransomware. Python Package Index temporarily suspends new registrations due to a spike in malicious activity. Typosquatting and TurkoRAT. UNC3944 uses SIM swapping to gain access to Azure admin accounts. A Turla retrospective. Rick Howard tackles workforce development. Our guest is Andrew Peterson of Fastly to discuss the intricate challenges of secure software development. And the FBI was found overstepping its surveillance authorities.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/98

Selected reading.
Meta Fined $1.3 Billion Over Data Transfers to U.S. (Wall Street Journal)
Meta fined record $1.3 billion and ordered to stop sending European user data to US (AP News)
Notorious Cyber Gang FIN7 Returns With Cl0p Ransomware in New Wave of Attacks (The Hacker News)
Researchers tie FIN7 cybercrime family to Clop ransomware (The Record)
Cybercrime gang FIN7 returned and was spotted delivering Clop ransomware (Security Affairs)
PyPI new user and new project registrations temporarily suspended. (Python)
PyPI repository restored after temporarily suspending new activity (Computing)
RATs found hiding in the NPM attic (ReversingLabs)
Legitimate looking npm packages found hosting TurkoRat infostealer (CSO Online)
SIM Swapping and Abuse of the Microsoft Azure Serial Console: Serial Is Part of a Well Balanced Attack (Mandiant)
Mozilla Explains: SIM swapping (Mozilla)
The Underground History of Russia’s Most Ingenious Hacker Group (WIRED)
Justice Department Announces Court-Authorized Disruption of Snake Malware Network Controlled by Russia’s Federal Security Service (US Department of Justice)
Hunting Russian Intelligence “Snake” Malware (CISA)
FBI misused intelligence database in 278,000 searches, court says (Reuters)
FBI misused controversial surveillance tool to investigate Jan. 6 protesters (The Record)
FBI broke rules in scouring foreign intelligence on Jan. 6 riot, racial justice protests, court says (AP News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The EU fines Meta for transatlantic data transfers. FIN7 returns, bearing Cl0p ransomware. Python Package Index temporarily suspends new registrations due to a spike in malicious activity. Typosquatting and TurkoRAT. UNC3944 uses SIM swapping to gain access to Azure admin accounts. A Turla retrospective. Rick Howard tackles workforce development. Our guest is Andrew Peterson of Fastly to discuss the intricate challenges of secure software development. And the FBI was found overstepping its surveillance authorities.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/98</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.wsj.com/articles/meta-fined-1-3-billion-over-data-transfers-to-u-s-b53dbb04">Meta Fined $1.3 Billion Over Data Transfers to U.S.</a> (Wall Street Journal)</p><p><a href="https://apnews.com/article/meta-facebook-data-privacy-fine-europe-9aa912200226c3d53aa293dca8968f84">Meta fined record $1.3 billion and ordered to stop sending European user data to US</a> (AP News)</p><p><a href="https://thehackernews.com/2023/05/notorious-cyber-gang-fin7-returns-cl0p.html">Notorious Cyber Gang FIN7 Returns With Cl0p Ransomware in New Wave of Attacks</a> (The Hacker News)</p><p><a href="https://therecord.media/researchers-tie-fin7-cybercrime-family-to-clop-ransomware-microsoft">Researchers tie FIN7 cybercrime family to Clop ransomware</a> (The Record)</p><p><a href="https://securityaffairs.com/146465/cyber-crime/fin7-delivering-clop-ransomware.html">Cybercrime gang FIN7 returned and was spotted delivering Clop ransomware </a>(Security Affairs)</p><p><a href="https://status.python.org/incidents/qy2t9mjjcc7g">PyPI new user and new project registrations temporarily suspended.</a> (Python)</p><p><a href="https://www.computing.co.uk/news/4116081/pypi-repository-restored-temporarily-suspending-activity">PyPI repository restored after temporarily suspending new activity </a>(Computing)</p><p><a href="https://www.reversinglabs.com/blog/rats-found-hiding-in-the-npm-attic">RATs found hiding in the NPM attic</a> (ReversingLabs)</p><p><a href="https://www.csoonline.com/article/3697001/legitimate-looking-npm-packages-found-hosting-turkorat-infostealer.html">Legitimate looking npm packages found hosting TurkoRat infostealer</a> (CSO Online)</p><p><a href="https://www.mandiant.com/resources/blog/sim-swapping-abuse-azure-serial">SIM Swapping and Abuse of the Microsoft Azure Serial Console: Serial Is Part of a Well Balanced Attack</a> (Mandiant)</p><p><a href="https://blog.mozilla.org/en/privacy-security/mozilla-explains-sim-swapping/">Mozilla Explains: SIM swapping</a> (Mozilla)</p><p><a href="https://www.wired.com/story/turla-history-russia-fsb-hackers/">The Underground History of Russia’s Most Ingenious Hacker Group</a> (WIRED)</p><p><a href="https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-disruption-snake-malware-network-controlled">Justice Department Announces Court-Authorized Disruption of Snake Malware Network Controlled by Russia’s Federal Security Service</a> (US Department of Justice)</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-129a">Hunting Russian Intelligence “Snake” Malware</a> (CISA)</p><p><a href="https://www.reuters.com/world/us/fbi-misused-intelligence-database-278000-searches-court-says-2023-05-19/">FBI misused intelligence database in 278,000 searches, court says</a> (Reuters)</p><p><a href="https://therecord.media/fbi-fisa-database-improper-queries-odni-justice">FBI misused controversial surveillance tool to investigate Jan. 6 protesters</a> (The Record)</p><p><a href="https://apnews.com/article/justice-department-fbi-surveillance-75c466a64e838ab12eaef96f6335f3cd">FBI broke rules in scouring foreign intelligence on Jan. 6 riot, racial justice protests, court says</a> (AP News)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1625</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[30f38c54-8167-11ed-9779-2329e58074a2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6537354898.mp3?updated=1690332798" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dawn Cappelli: Becoming the cyber fairy godmother. [OT] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/150/notes</link>
      <description>Dawn Cappelli, OT CERT Director at Dragos, sits down to share what she has learned after her 25+ year career in the industry. She recalls wanting to have been a rockstar when she grew up, now she refers to herself as the fairy godmother of security. She shares some of the amazing things she got to work on throughout her career, including working with the Secret Service when the Olympics came to Salt Lake City, Utah in 2002. She shares how she was able to rise through the ranks to get to where she is now. Dawn talks about how she wasn't ready to retire quite yet because she loved the industry so much, saying "I retired, but I knew I still loved security. I have this passion for protection and so Dragos came along and they offered me this role of Director of OT CERT. I feel like I'm the security fairy godmother." She shares words of wisdom for all trying to get into the industry, saying that you need to always take the risk like she did when she first started her career. We thank Dawn for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 21 May 2023 07:00:00 -0000</pubDate>
      <itunes:title>Dawn Cappelli: Becoming the cyber fairy godmother. [OT] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>150</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dawn Cappelli, OT CERT Director at Dragos, sits down to share what she has learned after her 25+ year career in the industry. She recalls wanting to have been a rockstar when she grew up, now she refers to herself as the fairy godmother of security. She shares some of the amazing things she got to work on throughout her career, including working with the Secret Service when the Olympics came to Salt Lake City, Utah in 2002. She shares how she was able to rise through the ranks to get to where she is now. Dawn talks about how she wasn't ready to retire quite yet because she loved the industry so much, saying "I retired, but I knew I still loved security. I have this passion for protection and so Dragos came along and they offered me this role of Director of OT CERT. I feel like I'm the security fairy godmother." She shares words of wisdom for all trying to get into the industry, saying that you need to always take the risk like she did when she first started her career. We thank Dawn for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dawn Cappelli, OT CERT Director at Dragos, sits down to share what she has learned after her 25+ year career in the industry. She recalls wanting to have been a rockstar when she grew up, now she refers to herself as the fairy godmother of security. She shares some of the amazing things she got to work on throughout her career, including working with the Secret Service when the Olympics came to Salt Lake City, Utah in 2002. She shares how she was able to rise through the ranks to get to where she is now. Dawn talks about how she wasn't ready to retire quite yet because she loved the industry so much, saying "I retired, but I knew I still loved security. I have this passion for protection and so Dragos came along and they offered me this role of Director of OT CERT. I feel like I'm the security fairy godmother." She shares words of wisdom for all trying to get into the industry, saying that you need to always take the risk like she did when she first started her career. We thank Dawn for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>497</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fd645678-f65c-11ed-a2e7-9f7be2029189]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8871967473.mp3?updated=1684353909" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dangerous vulnerabilities in H.264 decoders. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/282/notes</link>
      <description>Willy R. Vasquez from The University of Texas at Austin discussing research on "The Most Dangerous Codec in the World - Finding and Exploiting Vulnerabilities in H.264 Decoders." Researchers are looking at the marvel that is modern video encoding standards such as H.264 for vulnerabilities and ultimately hidden security risks.
The research states "We introduce and evaluate H26FORGE, domain-specific infrastructure for analyzing, generating, and manipulating syntactically correct but semantically spec-non-compliant video files." Using H26FORCE, they were able to uncover insecurities in depth across the video decoder ecosystem, including kernel memory corruption bugs in iOS and video accelerator and application processor kernel memory bugs in Android devices.
The research can be found here:
The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 May 2023 07:00:00 -0000</pubDate>
      <itunes:title>Dangerous vulnerabilities in H.264 decoders. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>282</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Willy R. Vasquez from The University of Texas at Austin discussing research on "The Most Dangerous Codec in the World - Finding and Exploiting Vulnerabilities in H.264 Decoders." Researchers are looking at the marvel that is modern video encoding standards such as H.264 for vulnerabilities and ultimately hidden security risks.
The research states "We introduce and evaluate H26FORGE, domain-specific infrastructure for analyzing, generating, and manipulating syntactically correct but semantically spec-non-compliant video files." Using H26FORCE, they were able to uncover insecurities in depth across the video decoder ecosystem, including kernel memory corruption bugs in iOS and video accelerator and application processor kernel memory bugs in Android devices.
The research can be found here:
The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Willy R. Vasquez from The University of Texas at Austin discussing research on "The Most Dangerous Codec in the World - Finding and Exploiting Vulnerabilities in H.264 Decoders." Researchers are looking at the marvel that is modern video encoding standards such as H.264 for vulnerabilities and ultimately hidden security risks.</p><p>The research states "We introduce and evaluate H26FORGE, domain-specific infrastructure for analyzing, generating, and manipulating syntactically correct but semantically spec-non-compliant video files." Using H26FORCE, they were able to uncover insecurities in depth across the video decoder ecosystem, including kernel memory corruption bugs in iOS and video accelerator and application processor kernel memory bugs in Android devices.</p><p>The research can be found here:</p><ul><li><a href="https://wrv.github.io/h26forge.pdf">The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1459</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0edde57c-f65d-11ed-880c-e335cc399c99]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3646440970.mp3?updated=1684588517" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Section 230 survives court tests. Pre-infected devices. IRS cyber attachés. DraftKings hack indictment. Notes on the hybrid war.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1827/notes</link>
      <description>Section 230 survives SCOTUS. Lemon Group's pre-infected devices. The IRS is sending cyber attachés to four countries in a new pilot program. A Wisconsin man is charged with stealing DraftKings credentials. Russian hacktivists conduct DDoS attacks against Polish news outlets. An update on RedStinger. Grayson Milbourne from OpenText Cybersecurity discusses IoT and the price we pay for convenience. Our guest is Matthew Keeley with info on an open source domain spoofing tool, Spoofy. And war principles and hacktivist auxiliaries.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/97

Selected reading.
“Honey, I’m Hacked”: Ethical Questions Raised by Ukrainian Cyber Deception of Russian Military Wives (Just Security)
A Mysterious Group Has Ties to 15 Years of Ukraine-Russia Hacks (Wired)
CloudWizard APT: the bad magic story goes on (SecureList)
Ukraine at D+441: Skirmishing along the line of contact, and in cyberspace. (The CyberWire)
Russian dissident gets three years in prison colony for DDoS attacks on military website (Cybernews)
Europe: The DDoS battlefield (Help Net Security)
Russian hackers hit Polish news sites in DDoS attack (Cybernews)
18-year-old charged with hacking 60,000 DraftKings betting accounts (Bleeping Computer)
Garrison Complaint (Department of Justice)
IRS-CI deploys 4 cyber attachés to locations abroad to combat cybercrime (IRS)
IRS deploys cyber attachés to fight cybercrime abroad (The Hill)
Cybercrime gang pre-infects millions of Android devices with malware (Bleeping Computer)
This Cybercrime Syndicate Pre-Infected Over 8.9 Million Android Phones Worldwide (The Hacker News)
Lemon Group’s Cybercriminal Businesses Built on Preinfected Devices (Trend Micro)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 19 May 2023 20:15:00 -0000</pubDate>
      <itunes:title>Section 230 survives court tests. Pre-infected devices. IRS cyber attachés. DraftKings hack indictment. Notes on the hybrid war.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1827</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Section 230 survives SCOTUS. Lemon Group's pre-infected devices. The IRS is sending cyber attachés to four countries in a new pilot program. A Wisconsin man is charged with stealing DraftKings credentials. Russian hacktivists conduct DDoS attacks against Polish news outlets. An update on RedStinger. Grayson Milbourne from OpenText Cybersecurity discusses IoT and the price we pay for convenience. Our guest is Matthew Keeley with info on an open source domain spoofing tool, Spoofy. And war principles and hacktivist auxiliaries.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/97

Selected reading.
“Honey, I’m Hacked”: Ethical Questions Raised by Ukrainian Cyber Deception of Russian Military Wives (Just Security)
A Mysterious Group Has Ties to 15 Years of Ukraine-Russia Hacks (Wired)
CloudWizard APT: the bad magic story goes on (SecureList)
Ukraine at D+441: Skirmishing along the line of contact, and in cyberspace. (The CyberWire)
Russian dissident gets three years in prison colony for DDoS attacks on military website (Cybernews)
Europe: The DDoS battlefield (Help Net Security)
Russian hackers hit Polish news sites in DDoS attack (Cybernews)
18-year-old charged with hacking 60,000 DraftKings betting accounts (Bleeping Computer)
Garrison Complaint (Department of Justice)
IRS-CI deploys 4 cyber attachés to locations abroad to combat cybercrime (IRS)
IRS deploys cyber attachés to fight cybercrime abroad (The Hill)
Cybercrime gang pre-infects millions of Android devices with malware (Bleeping Computer)
This Cybercrime Syndicate Pre-Infected Over 8.9 Million Android Phones Worldwide (The Hacker News)
Lemon Group’s Cybercriminal Businesses Built on Preinfected Devices (Trend Micro)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Section 230 survives SCOTUS. Lemon Group's pre-infected devices. The IRS is sending cyber attachés to four countries in a new pilot program. A Wisconsin man is charged with stealing DraftKings credentials. Russian hacktivists conduct DDoS attacks against Polish news outlets. An update on RedStinger. Grayson Milbourne from OpenText Cybersecurity discusses IoT and the price we pay for convenience. Our guest is Matthew Keeley with info on an open source domain spoofing tool, Spoofy. And war principles and hacktivist auxiliaries.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/97</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.justsecurity.org/86548/honey-im-hacked-ethical-questions-raised-by-ukrainian-cyber-deception-of-russian-military-wives/">“Honey, I’m Hacked”: Ethical Questions Raised by Ukrainian Cyber Deception of Russian Military Wives</a> (Just Security)</p><p><a href="https://www.wired.com/story/red-stinger-ukraine-russia-espionage-hackers/">A Mysterious Group Has Ties to 15 Years of Ukraine-Russia Hacks</a> (Wired)</p><p><a href="https://securelist.com/cloudwizard-apt/109722/">CloudWizard APT: the bad magic story goes on</a> (SecureList)</p><p><a href="https://thecyberwire.com/stories/25cb8e5f5e234d269f0b6c6bbcb2b74e/ukraine-at-d441">Ukraine at D+441: Skirmishing along the line of contact, and in cyberspace.</a> (The CyberWire)</p><p><a href="https://cybernews.com/cyber-war/military-ddos-attack-russian-dissident-prison/">Russian dissident gets three years in prison colony for DDoS attacks on military website</a> (Cybernews)</p><p><a href="https://www.helpnetsecurity.com/2023/05/19/global-ddos-trends-2022/">Europe: The DDoS battlefield</a> (Help Net Security)</p><p><a href="https://cybernews.com/cyber-war/russian-hackers-hit-polish-news-sites-ddos-attack/">Russian hackers hit Polish news sites in DDoS attack</a> (Cybernews)</p><p><a href="https://www.bleepingcomputer.com/news/security/18-year-old-charged-with-hacking-60-000-draftkings-betting-accounts/">18-year-old charged with hacking 60,000 DraftKings betting accounts</a> (Bleeping Computer)</p><p><a href="https://www.justice.gov/d9/2023-05/u.s._v._garrison_complaint.pdf">Garrison Complaint</a> (Department of Justice)</p><p><a href="https://www.irs.gov/compliance/criminal-investigation/irs-ci-deploys-4-cyber-attaches-to-locations-abroad-to-combat-cybercrime">IRS-CI deploys 4 cyber attachés to locations abroad to combat cybercrime</a> (IRS)</p><p><a href="https://thehill.com/policy/4010614-irs-deploys-cyber-attaches-to-fight-cybercrime-abroad/">IRS deploys cyber attachés to fight cybercrime abroad</a> (The Hill)</p><p><a href="https://www.bleepingcomputer.com/news/security/cybercrime-gang-pre-infects-millions-of-android-devices-with-malware/">Cybercrime gang pre-infects millions of Android devices with malware</a> (Bleeping Computer)</p><p><a href="https://thehackernews.com/2023/05/this-cybercrime-syndicate-pre-infected.html">This Cybercrime Syndicate Pre-Infected Over 8.9 Million Android Phones Worldwide</a> (The Hacker News)</p><p><a href="https://www.trendmicro.com/en_us/research/23/e/lemon-group-cybercriminal-businesses-built-on-preinfected-devices.html">Lemon Group’s Cybercriminal Businesses Built on Preinfected Devices</a> (Trend Micro)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1670</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[303d1d16-8167-11ed-9779-9bde27e196d3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6523027820.mp3?updated=1690332786" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BEC attack exploits Dropbox services. Ransomware in the name of charity. API protection trends. Hybrid war hacktivism. Executive digital protection.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1826/notes</link>
      <description>Business email compromise (BEC) exploits legitimate services. A hacktivist ransomware group demands charity donations for encrypted files. Trends and threats in API protection. The effects of hacktivism on Russia's war against Ukraine. Executive digital protection. Deepen Desai of Zscaler explains security risks in OneNote. Our guest is Ajay Bhatia of Veritas Technologies with advice for onboarding new employees. And news organizations as attractive targets.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/96

Selected reading.
Leveraging Dropbox to Soar Into Inbox (Avanan)
MalasLocker ransomware targets Zimbra servers, demands charity donation (Bleeping Computer)
Shadow API Usage Surges 900%, Revealing Alarming Lack of API Visibility Among Enterprises (Business Wire)
APIs are Top Cybersecurity Priority for Most Organizations, Yet 40% Do Not Have an API Security Solution (PR Newswire)
Evolving Cyber Operations and Capabilities (CSIS)
Following the long-running Russian aggression against Ukraine. (The CyberWire)
Executive Digital Protection whitepaper (Agency)
The Philadelphia Inquirer’s operations continue to be disrupted by a cyber incident (The Philadelphia Inquirer)
Cyberattack at the Philadelphia Inquirer. (The CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 18 May 2023 20:15:00 -0000</pubDate>
      <itunes:title>BEC attack exploits Dropbox services. Ransomware in the name of charity. API protection trends. Hybrid war hacktivism. Executive digital protection.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1826</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Business email compromise (BEC) exploits legitimate services. A hacktivist ransomware group demands charity donations for encrypted files. Trends and threats in API protection. The effects of hacktivism on Russia's war against Ukraine. Executive digital protection. Deepen Desai of Zscaler explains security risks in OneNote. Our guest is Ajay Bhatia of Veritas Technologies with advice for onboarding new employees. And news organizations as attractive targets.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/96

Selected reading.
Leveraging Dropbox to Soar Into Inbox (Avanan)
MalasLocker ransomware targets Zimbra servers, demands charity donation (Bleeping Computer)
Shadow API Usage Surges 900%, Revealing Alarming Lack of API Visibility Among Enterprises (Business Wire)
APIs are Top Cybersecurity Priority for Most Organizations, Yet 40% Do Not Have an API Security Solution (PR Newswire)
Evolving Cyber Operations and Capabilities (CSIS)
Following the long-running Russian aggression against Ukraine. (The CyberWire)
Executive Digital Protection whitepaper (Agency)
The Philadelphia Inquirer’s operations continue to be disrupted by a cyber incident (The Philadelphia Inquirer)
Cyberattack at the Philadelphia Inquirer. (The CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Business email compromise (BEC) exploits legitimate services. A hacktivist ransomware group demands charity donations for encrypted files. Trends and threats in API protection. The effects of hacktivism on Russia's war against Ukraine. Executive digital protection. Deepen Desai of Zscaler explains security risks in OneNote. Our guest is Ajay Bhatia of Veritas Technologies with advice for onboarding new employees. And news organizations as attractive targets.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/96</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.avanan.com/blog/leveraging-dropbox-to-soar-into-inbox">Leveraging Dropbox to Soar Into Inbox</a> (Avanan)</p><p><a href="https://www.bleepingcomputer.com/news/security/malaslocker-ransomware-targets-zimbra-servers-demands-charity-donation/">MalasLocker ransomware targets Zimbra servers, demands charity donation</a> (Bleeping Computer)</p><p><a href="https://www.businesswire.com/news/home/20230516005175/en/Shadow-API-Usage-Surges-900-Revealing-Alarming-Lack-of-API-Visibility-Among-Enterprises">Shadow API Usage Surges 900%, Revealing Alarming Lack of API Visibility Among Enterprises </a>(Business Wire)</p><p><a href="https://www.prnewswire.com/news-releases/apis-are-top-cybersecurity-priority-for-most-organizations-yet-40-do-not-have-an-api-security-solution-301828349.html">APIs are Top Cybersecurity Priority for Most Organizations, Yet 40% Do Not Have an API Security Solution</a> (PR Newswire)</p><p><a href="https://www.csis.org/analysis/evolving-cyber-operations-and-capabilities">Evolving Cyber Operations and Capabilities</a> (CSIS)</p><p><a href="https://thecyberwire.com/stories/65842cd6643a44879999d0bda95a2345/following-the-unfolding-hybrid-conflict-between-russia-and-ukraine">Following the long-running Russian aggression against Ukraine.</a> (The CyberWire)</p><p><a href="https://getagency.com/L/ExecutiveDigitalProtection/">Executive Digital Protection whitepaper</a> (Agency)</p><p><a href="https://www.inquirer.com/news/philadelphia/philadelphia-inquirer-hack-cyber-disruption-20230514.html">The Philadelphia Inquirer’s operations continue to be disrupted by a cyber incident</a> (The Philadelphia Inquirer)</p><p><a href="https://thecyberwire.com/stories/3d7b06dc809a4cb4b853168080fbfd8d/cyberattack-at-the-philadelphia-inquirer">Cyberattack at the Philadelphia Inquirer.</a> (The CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1557</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3210df38-8167-11ed-9779-f786383a441f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4288194221.mp3?updated=1690332762" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA23-136A – #StopRansomware: BianLian Ransomware Group. [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/49/notes</link>
      <description>FBI, CISA, and the Australian Cyber Security Centre are releasing this joint Cybersecurity Advisory to disseminate known BianLian ransomware and data extortion group IOCs and TTPs identified through FBI and ACSC investigations as of March 2023.
AA23-136A Alert, Technical Details, and Mitigations
AA23-136A.STIX_.xml
Stopransomware.gov, a whole-of-government approach with one central location for U.S. ransomware resources and alerts.
cyber.gov.au for the Australian Government’s central location to report cyber incidents, including ransomware, and to see advice and alerts. The site also provides ransomware advisories for businesses and organizations to help mitigate cyber threats.
CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide for guidance on mitigating and responding to a ransomware attack
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 18 May 2023 19:58:00 -0000</pubDate>
      <itunes:title>CISA Alert AA23-136A – #StopRansomware: BianLian Ransomware Group. [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>49</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>FBI, CISA, and the Australian Cyber Security Centre are releasing this joint Cybersecurity Advisory to disseminate known BianLian ransomware and data extortion group IOCs and TTPs identified through FBI and ACSC investigations as of March 2023.
AA23-136A Alert, Technical Details, and Mitigations
AA23-136A.STIX_.xml
Stopransomware.gov, a whole-of-government approach with one central location for U.S. ransomware resources and alerts.
cyber.gov.au for the Australian Government’s central location to report cyber incidents, including ransomware, and to see advice and alerts. The site also provides ransomware advisories for businesses and organizations to help mitigate cyber threats.
CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide for guidance on mitigating and responding to a ransomware attack
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>FBI, CISA, and the Australian Cyber Security Centre are releasing this joint Cybersecurity Advisory to disseminate known BianLian ransomware and data extortion group IOCs and TTPs identified through FBI and ACSC investigations as of March 2023.</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-136a">AA23-136A Alert, Technical Details, and Mitigations</a></p><p><a href="https://www.cisa.gov/sites/default/files/2023-05/aa23-136a.stix_.xml">AA23-136A.STIX_.xml</a></p><p><a href="https://www.stopransomware.gov/">Stopransomware.gov</a>, a whole-of-government approach with one central location for U.S. ransomware resources and alerts.</p><p><a href="https://www.cyber.gov.au/">cyber.gov.au</a> for the Australian Government’s central location to report cyber incidents, including ransomware, and to see advice and alerts. The site also provides ransomware advisories for businesses and organizations to help mitigate cyber threats.</p><p><a href="https://www.cisa.gov/sites/default/files/2023-01/CISA_MS-ISAC_Ransomware%20Guide_S508C.pdf">CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide</a> for guidance on mitigating and responding to a ransomware attack</p><p>No-cost cyber hygiene services: <a href="https://www.cisa.gov/cyber-hygiene-services">Cyber Hygiene Services</a> and <a href="https://github.com/cisagov/cset/">Ransomware Readiness Assessment</a>.</p><p>See CISA Insights <a href="https://www.cisa.gov/sites/default/files/publications/CISA%20Insights_Guidance-for-MSPs-and-Small-and-Mid-sized-Businesses_S508C.pdf">Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses</a> for guidance on hardening MSP and customer infrastructure.</p><p>U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email <a href="mailto:dib_defense@cyber.nsa.gov">dib_defense@cyber.nsa.gov</a> </p><p>To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="mailto:report@cisa.gov">report@cisa.gov</a>, or call (888) 282-0870, or report incidents to your local FBI field office.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>172</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5f64edc-f5b6-11ed-a8e2-5f59cfbcbac0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7426831151.mp3?updated=1684440223" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A joint warning on BianLian ransomware. Fleeceware offers AI as bait for the gullible. Cyberespionage updates. And Ukraine formally joins NATO’s CCDCOE.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1825/notes</link>
      <description>Cyber agencies warn of BianLian ransomware. There’s a new gang using leaked Baduk-based ransomware. Chinese government-linked threat actors target TP-link routers with custom malware. ChatGPT-themed fleeceware is showing up in online stores. Ukraine is now a member of NATO's Cyber Centre. Tim Starks from the Washington Post shares insights on section 702 renewal. Our guest is Ismael Valenzuela from BlackBerry sharing the findings from their Global Threat Intelligence Report. And the CIA's offer to Russian officials may have had some takers.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/95

Selected reading.
#StopRansomware: BianLian Ransomware Group (Cybersecurity and Infrastructure Security Agency CISA) 
Newly identified RA Group compromises companies in U.S. and South Korea with leaked Babuk source code (Cisco Talos Blog) 
The Dragon Who Sold His Camaro: Analyzing Custom Router Implant (Check Point Research)
Fake ChatGPT Apps Scam Users Out of Thousands of Dollars, Sophos Reports (GlobeNewswire News Room) 
Ukraine joins NATO Cyber Centre (Computing) 
Russian Officials Unnerved by Ukraine Bloodshed Are Contacting CIA, Agency Says (Wall Street Journal)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 17 May 2023 20:15:00 -0000</pubDate>
      <itunes:title>A joint warning on BianLian ransomware. Fleeceware offers AI as bait for the gullible. Cyberespionage updates. And Ukraine formally joins NATO’s CCDCOE.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1825</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cyber agencies warn of BianLian ransomware. There’s a new gang using leaked Baduk-based ransomware. Chinese government-linked threat actors target TP-link routers with custom malware. ChatGPT-themed fleeceware is showing up in online stores. Ukraine is now a member of NATO's Cyber Centre. Tim Starks from the Washington Post shares insights on section 702 renewal. Our guest is Ismael Valenzuela from BlackBerry sharing the findings from their Global Threat Intelligence Report. And the CIA's offer to Russian officials may have had some takers.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/95

Selected reading.
#StopRansomware: BianLian Ransomware Group (Cybersecurity and Infrastructure Security Agency CISA) 
Newly identified RA Group compromises companies in U.S. and South Korea with leaked Babuk source code (Cisco Talos Blog) 
The Dragon Who Sold His Camaro: Analyzing Custom Router Implant (Check Point Research)
Fake ChatGPT Apps Scam Users Out of Thousands of Dollars, Sophos Reports (GlobeNewswire News Room) 
Ukraine joins NATO Cyber Centre (Computing) 
Russian Officials Unnerved by Ukraine Bloodshed Are Contacting CIA, Agency Says (Wall Street Journal)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber agencies warn of BianLian ransomware. There’s a new gang using leaked Baduk-based ransomware. Chinese government-linked threat actors target TP-link routers with custom malware. ChatGPT-themed fleeceware is showing up in online stores. Ukraine is now a member of NATO's Cyber Centre. Tim Starks from the Washington Post shares insights on section 702 renewal. Our guest is Ismael Valenzuela from BlackBerry sharing the findings from their Global Threat Intelligence Report. And the CIA's offer to Russian officials may have had some takers.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/95</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-136a">#StopRansomware: BianLian Ransomware Group</a> (Cybersecurity and Infrastructure Security Agency CISA) </p><p><a href="https://blog.talosintelligence.com/ra-group-ransomware/">Newly identified RA Group compromises companies in U.S. and South Korea with leaked Babuk source code</a> (Cisco Talos Blog) </p><p><a href="https://research.checkpoint.com/2023/the-dragon-who-sold-his-camaro-analyzing-custom-router-implant/">The Dragon Who Sold His Camaro: Analyzing Custom Router Implant</a> (Check Point Research)</p><p><a href="https://www.globenewswire.com/news-release/2023/05/17/2670827/0/en/Fake-ChatGPT-Apps-Scam-Users-Out-of-Thousands-of-Dollars-Sophos-Reports.html">Fake ChatGPT Apps Scam Users Out of Thousands of Dollars, Sophos Reports</a> (GlobeNewswire News Room) </p><p><a href="https://www.computing.co.uk/news/4115773/ukraine-joins-nato-cyber-centre">Ukraine joins NATO Cyber Centre </a>(Computing) </p><p><a href="https://www.wsj.com/articles/russian-officials-unnerved-by-ukraine-bloodshed-are-contacting-cia-agency-says-c1061d18">Russian Officials Unnerved by Ukraine Bloodshed Are Contacting CIA, Agency Says</a> (Wall Street Journal)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1702</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[31a43aae-8167-11ed-9779-8b7aad42dad6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6492804183.mp3?updated=1690332613" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What is data centric security and why should anyone care? [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/46/notes</link>
      <description>In today’s world, conventional cyber thinking remains largely focused on perimeter-centric security controls designed to govern how identities and endpoints utilize networks to access applications and data that organizations possess internally. Against this backdrop, a group of innovators and security thought leaders are exploring a new frontier and asking the question: shouldn’t there be a standard way to protect sensitive data regardless of where it resides or who it’s been shared with? It’s called “data-centric” security and it’s fundamentally different from “perimeter-centric” security models. Practicing it at scale requires a standard way to extend the value of “upstream” data governance (discovery, classification, tagging) into “downstream” collaborative workflows like email, file sharing, and SaaS apps.
In this episode of CyberWire-X, the CyberWire’s Rick Howard and Dave Bittner explore modern approaches for applying and enforcing policy and access controls to sensitive data which inevitably leaves your possession but still deserves just as much security as the data that you possess internally. Rick and Dave are joined by guests Bill Newhouse, Cybersecurity Engineer at National Institute of Standards and Technology (NIST) National Cybersecurity Center of Excellence (NCCoE), and Dana Morris, Senior Vice President for Product and Engineering of our episode sponsor Virtru. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 17 May 2023 15:00:00 -0000</pubDate>
      <itunes:title>What is data centric security and why should anyone care? [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>46</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In today’s world, conventional cyber thinking remains largely focused on perimeter-centric security controls designed to govern how identities and endpoints utilize networks to access applications and data that organizations possess internally. Against this backdrop, a group of innovators and security thought leaders are exploring a new frontier and asking the question: shouldn’t there be a standard way to protect sensitive data regardless of where it resides or who it’s been shared with? It’s called “data-centric” security and it’s fundamentally different from “perimeter-centric” security models. Practicing it at scale requires a standard way to extend the value of “upstream” data governance (discovery, classification, tagging) into “downstream” collaborative workflows like email, file sharing, and SaaS apps.
In this episode of CyberWire-X, the CyberWire’s Rick Howard and Dave Bittner explore modern approaches for applying and enforcing policy and access controls to sensitive data which inevitably leaves your possession but still deserves just as much security as the data that you possess internally. Rick and Dave are joined by guests Bill Newhouse, Cybersecurity Engineer at National Institute of Standards and Technology (NIST) National Cybersecurity Center of Excellence (NCCoE), and Dana Morris, Senior Vice President for Product and Engineering of our episode sponsor Virtru. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s world, conventional cyber thinking remains largely focused on perimeter-centric security controls designed to govern how identities and endpoints utilize networks to access applications and data that organizations possess internally. Against this backdrop, a group of innovators and security thought leaders are exploring a new frontier and asking the question: shouldn’t there be a standard way to protect sensitive data regardless of where it resides or who it’s been shared with? It’s called “data-centric” security and it’s fundamentally different from “perimeter-centric” security models. Practicing it at scale requires a standard way to extend the value of “upstream” data governance (discovery, classification, tagging) into “downstream” collaborative workflows like email, file sharing, and SaaS apps.</p><p>In this episode of CyberWire-X, the CyberWire’s Rick Howard and Dave Bittner explore modern approaches for applying and enforcing policy and access controls to sensitive data which inevitably leaves your possession but still deserves just as much security as the data that you possess internally. Rick and Dave are joined by guests Bill Newhouse, Cybersecurity Engineer at National Institute of Standards and Technology (NIST) National Cybersecurity Center of Excellence (NCCoE), and Dana Morris, Senior Vice President for Product and Engineering of our episode sponsor Virtru. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1946</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[29c32e8a-f4b7-11ed-893a-3b15325c097e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7485155821.mp3?updated=1684260378" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DDoS trends. Asia sees a Lancefly infestation. Lessons from cyber actuaries. Infostealers in the C2C market. False flags.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1824/notes</link>
      <description>DDoS "carpet bombing." Lancefly infests Asian targets. Cyber insurance trends. Infostealers in the C2C market. A Russian espionage service is masquerading as a criminal gang. KillNet’s running a psyop radio station of questionable quality. Joe Carrigan describes baiting fraudsters with fake crypto. Our guest is Gemma Moore of Cyberis talking about how red teaming can upskill detection and response teams. And geopolitical DDoS.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/94

Selected reading.
2023 DDoS Threat Intelligence Report (Corero)
Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors (Symantec)
2023 Cyber Claims Report (Coalition)
The Growing Threat from Infostealers (Secureworks)
Cybercriminals who targeted Ukraine are actually Russian government hackers, researchers say (TechCrunch)
DDoS Attacks Targeting NATO Members Increasing (Netscout)
Following the long-running Russian aggression against Ukraine. (The CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 May 2023 20:15:00 -0000</pubDate>
      <itunes:title>DDoS trends. Asia sees a Lancefly infestation. Lessons from cyber actuaries. Infostealers in the C2C market. False flags.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1824</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>DDoS "carpet bombing." Lancefly infests Asian targets. Cyber insurance trends. Infostealers in the C2C market. A Russian espionage service is masquerading as a criminal gang. KillNet’s running a psyop radio station of questionable quality. Joe Carrigan describes baiting fraudsters with fake crypto. Our guest is Gemma Moore of Cyberis talking about how red teaming can upskill detection and response teams. And geopolitical DDoS.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/94

Selected reading.
2023 DDoS Threat Intelligence Report (Corero)
Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors (Symantec)
2023 Cyber Claims Report (Coalition)
The Growing Threat from Infostealers (Secureworks)
Cybercriminals who targeted Ukraine are actually Russian government hackers, researchers say (TechCrunch)
DDoS Attacks Targeting NATO Members Increasing (Netscout)
Following the long-running Russian aggression against Ukraine. (The CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>DDoS "carpet bombing." Lancefly infests Asian targets. Cyber insurance trends. Infostealers in the C2C market. A Russian espionage service is masquerading as a criminal gang. KillNet’s running a psyop radio station of questionable quality. Joe Carrigan describes baiting fraudsters with fake crypto. Our guest is Gemma Moore of Cyberis talking about how red teaming can upskill detection and response teams. And geopolitical DDoS.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/94</p><p><br></p><h2>Selected reading.</h2><p><a href="https://go.corero.com/threat">2023 DDoS Threat Intelligence Report</a> (Corero)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lancefly-merdoor-zxshell-custom-backdoor">Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors</a> (Symantec)</p><p><a href="https://info.coalitioninc.com/download-2023-cyber-claims-report.html">2023 Cyber Claims Report</a> (Coalition)</p><p><a href="https://www.secureworks.com/research/the-growing-threat-from-infostealers">The Growing Threat from Infostealers</a> (Secureworks)</p><p><a href="https://techcrunch.com/2023/05/15/cybercriminals-who-targeted-ukraine-are-actually-russian-government-hackers-researchers-say/">Cybercriminals who targeted Ukraine are actually Russian government hackers, researchers say</a> (TechCrunch)</p><p><a href="https://www.netscout.com/blog/asert/ddos-attacks-targeting-nato-members-increasing">DDoS Attacks Targeting NATO Members Increasing</a> (Netscout)</p><p><a href="https://thecyberwire.com/stories/65842cd6643a44879999d0bda95a2345/following-the-unfolding-hybrid-conflict-between-russia-and-ukraine">Following the long-running Russian aggression against Ukraine.</a> (The CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1565</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[318ebdf0-8167-11ed-9779-7bffde6ab4fa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1847730959.mp3?updated=1690332594" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware, doxxing, and data breaches, oh my! State fronts and cyber offensives.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1823/notes</link>
      <description>Discord sees a third-party data breach. Black Basta conducts a ransomware attack against technology company ABB. Intrusion Truth returns to dox APT41. Anonymous Sudan looks like a Russian front operation. Attribution and motivation of "RedStinger" remain murky. CISA summarizes Russian cyber offensives. Remote code execution exploits Ruckus in the wild. Our guest is Dave Russell from Veeam with insights on data protection. Matt O'Neill from the US Secret Service on their efforts to thwart email compromise and romance scams. And espionage by way of YouTube comments.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/93

Selected reading.
Discord discloses data breach after support agent got hacked (Bleeping Computer)
Discord suffered a data after third-party support agent was hacked (Security Affairs)
Multinational tech firm ABB hit by Black Basta ransomware attack (Bleeping Computer)
Breaking: ABB confirms cyberattack; work underway to restore operations (ET CISO)
Black Basta conducts ransomware attack against Swiss technology company ABB (The CyberWire)
They dox Chinese hackers. Now, they’re back. (Washington Post)
What’s Cracking at the Kerui Cracking Academy? (Intrusion Truth)
Posing as Islamists, Russian Hackers Take Aim at Sweden (Bloomberg)
Anonymous Sudan: Threat Intelligence Report (TrueSec)
Uncovering RedStinger - Undetected APT cyber operations in Eastern Europe since 2020 (Malwarebytes)
Russian ‘Red Stealer’ cyberattacks target breakaway territories in Ukraine (Cybernews)
Russia Cyber Threat Overview and Advisories (CISA)
Known Exploited Vulnerabilities Catalog (CISA)
CISA Adds Seven Known Exploited Vulnerabilities to Catalog (CISA)
﻿CISA warns of critical Ruckus bug used to infect Wi-Fi access points (Bleeping Computer)
Security Bulletins (Ruckus)
ROK union leaders charged with spying for North Korea in ‘movie-like’ scheme (NK News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 15 May 2023 20:15:00 -0000</pubDate>
      <itunes:title>Ransomware, doxxing, and data breaches, oh my! State fronts and cyber offensives.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1823</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Discord sees a third-party data breach. Black Basta conducts a ransomware attack against technology company ABB. Intrusion Truth returns to dox APT41. Anonymous Sudan looks like a Russian front operation. Attribution and motivation of "RedStinger" remain murky. CISA summarizes Russian cyber offensives. Remote code execution exploits Ruckus in the wild. Our guest is Dave Russell from Veeam with insights on data protection. Matt O'Neill from the US Secret Service on their efforts to thwart email compromise and romance scams. And espionage by way of YouTube comments.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/93

Selected reading.
Discord discloses data breach after support agent got hacked (Bleeping Computer)
Discord suffered a data after third-party support agent was hacked (Security Affairs)
Multinational tech firm ABB hit by Black Basta ransomware attack (Bleeping Computer)
Breaking: ABB confirms cyberattack; work underway to restore operations (ET CISO)
Black Basta conducts ransomware attack against Swiss technology company ABB (The CyberWire)
They dox Chinese hackers. Now, they’re back. (Washington Post)
What’s Cracking at the Kerui Cracking Academy? (Intrusion Truth)
Posing as Islamists, Russian Hackers Take Aim at Sweden (Bloomberg)
Anonymous Sudan: Threat Intelligence Report (TrueSec)
Uncovering RedStinger - Undetected APT cyber operations in Eastern Europe since 2020 (Malwarebytes)
Russian ‘Red Stealer’ cyberattacks target breakaway territories in Ukraine (Cybernews)
Russia Cyber Threat Overview and Advisories (CISA)
Known Exploited Vulnerabilities Catalog (CISA)
CISA Adds Seven Known Exploited Vulnerabilities to Catalog (CISA)
﻿CISA warns of critical Ruckus bug used to infect Wi-Fi access points (Bleeping Computer)
Security Bulletins (Ruckus)
ROK union leaders charged with spying for North Korea in ‘movie-like’ scheme (NK News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Discord sees a third-party data breach. Black Basta conducts a ransomware attack against technology company ABB. Intrusion Truth returns to dox APT41. Anonymous Sudan looks like a Russian front operation. Attribution and motivation of "RedStinger" remain murky. CISA summarizes Russian cyber offensives. Remote code execution exploits Ruckus in the wild. Our guest is Dave Russell from Veeam with insights on data protection. Matt O'Neill from the US Secret Service on their efforts to thwart email compromise and romance scams. And espionage by way of YouTube comments.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/93</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/security/discord-discloses-data-breach-after-support-agent-got-hacked/">Discord discloses data breach after support agent got hacked</a> (Bleeping Computer)</p><p><a href="https://securityaffairs.com/146171/data-breach/discord-suffered-data-breach.html">Discord suffered a data after third-party support agent was hacked</a> (Security Affairs)</p><p><a href="https://www.bleepingcomputer.com/news/security/multinational-tech-firm-abb-hit-by-black-basta-ransomware-attack/">Multinational tech firm ABB hit by Black Basta ransomware attack</a> (Bleeping Computer)</p><p><a href="https://ciso.economictimes.indiatimes.com/news/cybercrime-fraud/breaking-abb-confirms-cyber-incident-work-underway-to-restore-operations/100190045">Breaking: ABB confirms cyberattack; work underway to restore operations</a> (ET CISO)</p><p><a href="https://thecyberwire.com/stories/ff66b7be5a3c460cbc9dedff7b40f178/black-basta-conducts-ransomware-attack-against-swiss-technology-company-abb">Black Basta conducts ransomware attack against Swiss technology company ABB</a> (The CyberWire)</p><p><a href="https://www.washingtonpost.com/politics/2023/05/15/they-dox-chinese-hackers-now-theyre-back/">They dox Chinese hackers. Now, they’re back.</a> (Washington Post)</p><p><a href="https://intrusiontruth.wordpress.com/2023/05/11/article-1-whats-cracking-at-the-kerui-cracking-academy/">What’s Cracking at the Kerui Cracking Academy?</a> (Intrusion Truth)</p><p><a href="https://www.bloomberg.com/news/features/2023-05-14/posing-as-islamists-russian-hackers-take-aim-at-sweden">Posing as Islamists, Russian Hackers Take Aim at Sweden</a> (Bloomberg)</p><p><a href="https://www.truesec.com/hub/report/anonymous-sudan-threat-intelligence-report">Anonymous Sudan: Threat Intelligence Report</a> (TrueSec)</p><p><a href="https://www.malwarebytes.com/blog/threat-intelligence/2023/05/redstinger">Uncovering RedStinger - Undetected APT cyber operations in Eastern Europe since 2020 </a>(Malwarebytes)</p><p><a href="https://cybernews.com/news/russian-cyberattacks-ukraine-donbas/">Russian ‘Red Stealer’ cyberattacks target breakaway territories in Ukraine</a> (Cybernews)</p><p><a href="https://www.cisa.gov/topics/cyber-threats-and-advisories/advanced-persistent-threats/russia">Russia Cyber Threat Overview and Advisories</a> (CISA)</p><p><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">Known Exploited Vulnerabilities Catalog</a> (CISA)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/05/12/cisa-adds-seven-known-exploited-vulnerabilities-catalog">CISA Adds Seven Known Exploited Vulnerabilities to Catalog</a> (CISA)</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-ruckus-bug-used-to-infect-wi-fi-access-points/">﻿CISA warns of critical Ruckus bug used to infect Wi-Fi access points</a> (Bleeping Computer)</p><p><a href="https://support.ruckuswireless.com/security_bulletins/315">Security Bulletins</a> (Ruckus)</p><p><a href="https://www.nknews.org/2023/05/rok-union-leaders-charged-with-spying-for-north-korea-in-movie-like-scheme/">ROK union leaders charged with spying for North Korea in ‘movie-like’ scheme</a> (NK News)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1934</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[31098ec8-8167-11ed-9779-ffb9102eb98a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4009762457.mp3?updated=1690332581" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Steve Benton: Mixing like a DJ. [VP] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/149/notes</link>
      <description>Steve Benton, Vice President at Anomali Threat Research &amp; GM Belfast, sits down to share his story as a cybersecurity expert with a surplus of strategic leadership experience across cyber and physical security rooted in substantial operational directorship and accountability. Steve shares his beginnings, where he wanted to grow up to be a rockstar, slowly moving into the world of tech with his first ever computer and falling in love with it. After graduating from Queens University with a degree in information technology, he joined British Telecommunications or BT, where he got to put his new found skills to use. Steve mentions how his job is kind of like being a DJ almost and says " a typical day for me is looking at the intelligence that we're bringing in, mixing it as it were to think of a slight, like DJs with a set of headphones on creating the right kind of mixes of intelligence for our clients." We thank Steve for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 14 May 2023 07:00:00 -0000</pubDate>
      <itunes:title>Steve Benton: Mixing like a DJ. [VP] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>149</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Steve Benton, Vice President at Anomali Threat Research &amp; GM Belfast, sits down to share his story as a cybersecurity expert with a surplus of strategic leadership experience across cyber and physical security rooted in substantial operational directorship and accountability. Steve shares his beginnings, where he wanted to grow up to be a rockstar, slowly moving into the world of tech with his first ever computer and falling in love with it. After graduating from Queens University with a degree in information technology, he joined British Telecommunications or BT, where he got to put his new found skills to use. Steve mentions how his job is kind of like being a DJ almost and says " a typical day for me is looking at the intelligence that we're bringing in, mixing it as it were to think of a slight, like DJs with a set of headphones on creating the right kind of mixes of intelligence for our clients." We thank Steve for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Steve Benton, Vice President at Anomali Threat Research &amp; GM Belfast, sits down to share his story as a cybersecurity expert with a surplus of strategic leadership experience across cyber and physical security rooted in substantial operational directorship and accountability. Steve shares his beginnings, where he wanted to grow up to be a rockstar, slowly moving into the world of tech with his first ever computer and falling in love with it. After graduating from Queens University with a degree in information technology, he joined British Telecommunications or BT, where he got to put his new found skills to use. Steve mentions how his job is kind of like being a DJ almost and says " a typical day for me is looking at the intelligence that we're bringing in, mixing it as it were to think of a slight, like DJs with a set of headphones on creating the right kind of mixes of intelligence for our clients." We thank Steve for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>461</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f9e60054-f0f4-11ed-8169-9f894de020ee]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2320310574.mp3?updated=1683841549" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Running away from operation Tainted Love. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/281/notes</link>
      <description>Aleksandar Milenkoski and Juan Andres Guerrero-Saade from SentinelOne's SentinelLabs join Dave to discuss their research "Operation Tainted Love | Chinese APTs Target Telcos in New Attacks." Researchers found initial phases of attacks against telecommunication providers in the Middle East in Q1 in 2023.
The research states "We assess that this activity represents an evolution of tooling associated with Operation Soft Cell." While the exact grouping is unclear, researchers think it is highly likely that the threat actor is a Chinese cyberespionage group in the nexus of Gallium and APT41.
The research can be found here:
Operation Tainted Love | Chinese APTs Target Telcos in New Attacks

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 May 2023 07:00:00 -0000</pubDate>
      <itunes:title>Running away from operation Tainted Love. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>281</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Aleksandar Milenkoski and Juan Andres Guerrero-Saade from SentinelOne's SentinelLabs join Dave to discuss their research "Operation Tainted Love | Chinese APTs Target Telcos in New Attacks." Researchers found initial phases of attacks against telecommunication providers in the Middle East in Q1 in 2023.
The research states "We assess that this activity represents an evolution of tooling associated with Operation Soft Cell." While the exact grouping is unclear, researchers think it is highly likely that the threat actor is a Chinese cyberespionage group in the nexus of Gallium and APT41.
The research can be found here:
Operation Tainted Love | Chinese APTs Target Telcos in New Attacks

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Aleksandar Milenkoski and Juan Andres Guerrero-Saade from SentinelOne's SentinelLabs join Dave to discuss their research "Operation Tainted Love | Chinese APTs Target Telcos in New Attacks." Researchers found initial phases of attacks against telecommunication providers in the Middle East in Q1 in 2023.</p><p>The research states "We assess that this activity represents an evolution of tooling associated with Operation Soft Cell." While the exact grouping is unclear, researchers think it is highly likely that the threat actor is a Chinese cyberespionage group in the nexus of Gallium and APT41.</p><p>The research can be found here:</p><ul><li><a href="https://www.sentinelone.com/labs/operation-tainted-love-chinese-apts-target-telcos-in-new-attacks/">Operation Tainted Love | Chinese APTs Target Telcos in New Attacks</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1368</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[54dcf850-f032-11ed-9a2d-536dc011917a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8463668322.mp3?updated=1684765611" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA23-131A – Malicious Actors Exploit CVE-2023-27350 in PaperCut MF and NG.</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/48/notes</link>
      <description>FBI and CISA are releasing this joint Cybersecurity Advisory in response to the active exploitation of CVE-2023-27350. This vulnerability occurs in certain versions of PaperCut NG and PaperCut MF, software applications that help organizations manage printing services, and enables an unauthenticated actor to execute malicious code remotely without credentials. 
AA23-131A Alert, Technical Details, and Mitigations
PaperCut: URGENT | PaperCut MF/NG vulnerability bulletin (March 2023)
Huntress: Critical Vulnerabilities in PaperCut Print Management Software
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 12 May 2023 20:34:00 -0000</pubDate>
      <itunes:title>CISA Alert AA23-131A – Malicious Actors Exploit CVE-2023-27350 in PaperCut MF and NG.</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>48</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>FBI and CISA are releasing this joint Cybersecurity Advisory in response to the active exploitation of CVE-2023-27350. This vulnerability occurs in certain versions of PaperCut NG and PaperCut MF, software applications that help organizations manage printing services, and enables an unauthenticated actor to execute malicious code remotely without credentials. 
AA23-131A Alert, Technical Details, and Mitigations
PaperCut: URGENT | PaperCut MF/NG vulnerability bulletin (March 2023)
Huntress: Critical Vulnerabilities in PaperCut Print Management Software
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>FBI and CISA are releasing this joint Cybersecurity Advisory in response to the active exploitation of CVE-2023-27350. This vulnerability occurs in certain versions of PaperCut NG and PaperCut MF, software applications that help organizations manage printing services, and enables an unauthenticated actor to execute malicious code remotely without credentials. </p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-131a">AA23-131A Alert, Technical Details, and Mitigations</a></p><p>PaperCut: <a href="https://www.papercut.com/kb/Main/PO-1216-and-PO-1219#product-status-and-next-steps">URGENT | PaperCut MF/NG vulnerability bulletin (March 2023)</a></p><p>Huntress: <a href="https://www.huntress.com/blog/critical-vulnerabilities-in-papercut-print-management-software">Critical Vulnerabilities in PaperCut Print Management Software</a></p><p>No-cost cyber hygiene services: <a href="https://www.cisa.gov/cyber-hygiene-services">Cyber Hygiene Services</a> and <a href="https://github.com/cisagov/cset/">Ransomware Readiness Assessment</a>.</p><p>See CISA Insights <a href="https://www.cisa.gov/sites/default/files/publications/CISA%20Insights_Guidance-for-MSPs-and-Small-and-Mid-sized-Businesses_S508C.pdf">Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses</a> for guidance on hardening MSP and customer infrastructure.</p><p>U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email <a href="mailto:dib_defense@cyber.nsa.gov">dib_defense@cyber.nsa.gov</a> </p><p>To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="mailto:report@cisa.gov">report@cisa.gov</a>, or call (888) 282-0870, or report incidents to your local FBI field office.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>156</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4e06d3e8-f104-11ed-bb0b-dbf7df0c2156]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4441944968.mp3?updated=1683922055" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Babuk resurfaces for criminal inspiration. Alert on PaperCut vulnerability exploitation. Too many bad bots. Phishing-as-a-service in the C2C market. KillNet's PMHC regrets.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1822/notes</link>
      <description>Babuk source code provides criminal inspiration. CISA and FBI release a joint report on PaperCut. There are more bad bots out there than anyone would like. Phishing-as-a-service tools in the C2C market. CISA’s Eric Goldstein advocates the adoption of strong controls, defensible networks and coordination of strategic cyber risks. Our cyberwire producer Liz Irvin speaks with Crystle-Day Villanueva, Learning and Development Specialist for Lumu Technologies. And KillNet’s short-lived venture, with a dash of regret.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/92

Selected reading.
Babuk code used by 9 ransomware gangs to encrypt VMWare ESXi servers (Bleeping Computer)
Ransomware actors adopt leaked Babuk code to hit Linux systems (Decipher)
Hypervisor Ransomware | Multiple Threat Actor Groups Hop on Leaked Babuk Code to Build ESXi Lockers (SentinelOne)
Malicious Actors Exploit CVE-2023-27350 in PaperCut MF and NG (CISA)
CVE-2023-27350 Detail (NIST)
Proofpoint Emerging Threats Rules (Proofpoint)
2023 Imperva Bad Bot Report (Imperva)
New phishing-as-a-service tool “Greatness” already seen in the wild (Cisco Talos)
Ukraine at D+442: Russians say the Ukrainian counteroffensive has begun. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 12 May 2023 20:15:00 -0000</pubDate>
      <itunes:title>Babuk resurfaces for criminal inspiration. Alert on PaperCut vulnerability exploitation. Too many bad bots. Phishing-as-a-service in the C2C market. KillNet's PMHC regrets.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1822</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Babuk source code provides criminal inspiration. CISA and FBI release a joint report on PaperCut. There are more bad bots out there than anyone would like. Phishing-as-a-service tools in the C2C market. CISA’s Eric Goldstein advocates the adoption of strong controls, defensible networks and coordination of strategic cyber risks. Our cyberwire producer Liz Irvin speaks with Crystle-Day Villanueva, Learning and Development Specialist for Lumu Technologies. And KillNet’s short-lived venture, with a dash of regret.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/92

Selected reading.
Babuk code used by 9 ransomware gangs to encrypt VMWare ESXi servers (Bleeping Computer)
Ransomware actors adopt leaked Babuk code to hit Linux systems (Decipher)
Hypervisor Ransomware | Multiple Threat Actor Groups Hop on Leaked Babuk Code to Build ESXi Lockers (SentinelOne)
Malicious Actors Exploit CVE-2023-27350 in PaperCut MF and NG (CISA)
CVE-2023-27350 Detail (NIST)
Proofpoint Emerging Threats Rules (Proofpoint)
2023 Imperva Bad Bot Report (Imperva)
New phishing-as-a-service tool “Greatness” already seen in the wild (Cisco Talos)
Ukraine at D+442: Russians say the Ukrainian counteroffensive has begun. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Babuk source code provides criminal inspiration. CISA and FBI release a joint report on PaperCut. There are more bad bots out there than anyone would like. Phishing-as-a-service tools in the C2C market. CISA’s Eric Goldstein advocates the adoption of strong controls, defensible networks and coordination of strategic cyber risks. Our cyberwire producer Liz Irvin speaks with Crystle-Day Villanueva, Learning and Development Specialist for Lumu Technologies. And KillNet’s short-lived venture, with a dash of regret.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/92</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/security/babuk-code-used-by-9-ransomware-gangs-to-encrypt-vmware-esxi-servers/">Babuk code used by 9 ransomware gangs to encrypt VMWare ESXi servers</a> (Bleeping Computer)</p><p><a href="https://duo.com/decipher/ransomware-actors-adopt-leaked-babuk-code-to-hit-linux-systems">Ransomware actors adopt leaked Babuk code to hit Linux systems</a> (Decipher)</p><p><a href="https://www.sentinelone.com/labs/hypervisor-ransomware-multiple-threat-actor-groups-hop-on-leaked-babuk-code-to-build-esxi-lockers/">Hypervisor Ransomware | Multiple Threat Actor Groups Hop on Leaked Babuk Code to Build ESXi Lockers</a> (SentinelOne)</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-131a">Malicious Actors Exploit CVE-2023-27350 in PaperCut MF and NG</a> (CISA)</p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-27350">CVE-2023-27350 Detail</a> (NIST)</p><p><a href="https://rules.emergingthreats.net/open/">Proofpoint Emerging Threats Rules</a> (Proofpoint)</p><p><a href="https://www.imperva.com/resources/resource-library/reports/2023-imperva-bad-bot-report/">2023 Imperva Bad Bot Report</a> (Imperva)</p><p><a href="https://blog.talosintelligence.com/new-phishing-as-a-service-tool-greatness-already-seen-in-the-wild/">New phishing-as-a-service tool “Greatness” already seen in the wild</a> (Cisco Talos)</p><p><a href="https://thecyberwire.com/stories/ece8345c22784709af02d4e23f746661/ukraine-at-d442-russians-say-the-ukrainian-counteroffensive-has-begun-ukraine-differs">Ukraine at D+442: Russians say the Ukrainian counteroffensive has begun.</a> (CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1650</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[301fad62-8167-11ed-9779-43218a8d3acb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3620988298.mp3?updated=1690332564" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware and social engineering trends. Expired certificate addressed. Ransomware groups target schools. Cyber updates in the hybrid war.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1821/notes</link>
      <description>A Ransomware report highlights targeting and classification. Phishing remains a major threat. Cisco addresses an expired certificate issue. LockBit and Medusa hit school districts with ransomware. US and Canadian cyber units wrap up a hunt-forward mission in Latvia. Ben Yelin on NYPD surveillance. Our CyberWire producer Liz Irvin interviews Damien Lewke, a graduate student at MIT. And an unknown threat actor is collecting against both Russia and Ukraine.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/91

Selected reading.
GRIT Ransomware Report: April 2023 (GuidePoint Security)
DNSFilter State of Internet Security - Q1 2023 (DNSFilter)
Identify vEdge Certificate Expired on May 9th 2023 (Cisco)
The State of Ransomware Attacks in Education 2023: Trends and Solutions (Veriti)
US Cyber Command 'Hunts Forward' in Latvia (Voice of America)
US cyber team unearths malware during ‘hunt-forward’ mission in Latvia (C4ISRNET)
Uncovering RedStinger - Undetected APT cyber operations in Eastern Europe since 2020 (Malwarebytes)
Bad magic: new APT found in the area of Russo-Ukrainian conflict (Kaspersky)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 11 May 2023 20:15:00 -0000</pubDate>
      <itunes:title>Ransomware and social engineering trends. Expired certificate addressed. Ransomware groups target schools. Cyber updates in the hybrid war.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1821</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A Ransomware report highlights targeting and classification. Phishing remains a major threat. Cisco addresses an expired certificate issue. LockBit and Medusa hit school districts with ransomware. US and Canadian cyber units wrap up a hunt-forward mission in Latvia. Ben Yelin on NYPD surveillance. Our CyberWire producer Liz Irvin interviews Damien Lewke, a graduate student at MIT. And an unknown threat actor is collecting against both Russia and Ukraine.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/91

Selected reading.
GRIT Ransomware Report: April 2023 (GuidePoint Security)
DNSFilter State of Internet Security - Q1 2023 (DNSFilter)
Identify vEdge Certificate Expired on May 9th 2023 (Cisco)
The State of Ransomware Attacks in Education 2023: Trends and Solutions (Veriti)
US Cyber Command 'Hunts Forward' in Latvia (Voice of America)
US cyber team unearths malware during ‘hunt-forward’ mission in Latvia (C4ISRNET)
Uncovering RedStinger - Undetected APT cyber operations in Eastern Europe since 2020 (Malwarebytes)
Bad magic: new APT found in the area of Russo-Ukrainian conflict (Kaspersky)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Ransomware report highlights targeting and classification. Phishing remains a major threat. Cisco addresses an expired certificate issue. LockBit and Medusa hit school districts with ransomware. US and Canadian cyber units wrap up a hunt-forward mission in Latvia. Ben Yelin on NYPD surveillance. Our CyberWire producer Liz Irvin interviews Damien Lewke, a graduate student at MIT. And an unknown threat actor is collecting against both Russia and Ukraine.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/91</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.guidepointsecurity.com/blog/grit-ransomware-report-april-2023/">GRIT Ransomware Report: April 2023</a> (GuidePoint Security)</p><p><a href="https://www.dnsfilter.com/blog/state-of-internet-security-2023">DNSFilter State of Internet Security - Q1 2023</a> (DNSFilter)</p><p><a href="https://www.cisco.com/c/en/us/support/docs/routers/sd-wan/220448-identify-vedge-certificate-expired-on-ma.html">Identify vEdge Certificate Expired on May 9th 2023</a> (Cisco)</p><p><a href="https://veriti.ai/blog/research/the-state-of-ransomware-in-2023/">The State of Ransomware Attacks in Education 2023: Trends and Solutions</a> (Veriti)</p><p><a href="https://www.voanews.com/a/us-cyber-command-hunts-forward-in-latvia/7087151.html">US Cyber Command 'Hunts Forward' in Latvia</a> (Voice of America)</p><p><a href="https://www.c4isrnet.com/cyber/2023/05/10/us-cyber-team-unearths-malware-during-hunt-forward-mission-in-latvia/">US cyber team unearths malware during ‘hunt-forward’ mission in Latvia</a> (C4ISRNET)</p><p><a href="https://www.malwarebytes.com/blog/threat-intelligence/2023/05/redstinger">Uncovering RedStinger - Undetected APT cyber operations in Eastern Europe since 2020</a> (Malwarebytes)</p><p><a href="https://securelist.com/bad-magic-apt/109087/">Bad magic: new APT found in the area of Russo-Ukrainian conflict</a> (Kaspersky)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1484</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[31fb2b70-8167-11ed-9779-3f877b249831]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1146244666.mp3?updated=1690332532" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA23-129A – Hunting Russian intelligence “Snake” malware.</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/47/notes</link>
      <description>The Snake implant is considered the most sophisticated cyber espionage tool designed and used by Center 16 of Russia’s Federal Security Service, or FSB, for long-term intelligence collection on sensitive targets.
AA23-129A Alert, Technical Details, and Mitigations
For more information on FSB and Russian state-sponsored cyber activity, please see the joint advisory Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure and CISA’s Russia Cyber Threat Overview and Advisories webpage.
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 11 May 2023 16:08:00 -0000</pubDate>
      <itunes:title>CISA Alert AA23-129A – Hunting Russian intelligence “Snake” malware.</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>47</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Snake implant is considered the most sophisticated cyber espionage tool designed and used by Center 16 of Russia’s Federal Security Service, or FSB, for long-term intelligence collection on sensitive targets.
AA23-129A Alert, Technical Details, and Mitigations
For more information on FSB and Russian state-sponsored cyber activity, please see the joint advisory Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure and CISA’s Russia Cyber Threat Overview and Advisories webpage.
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Snake implant is considered the most sophisticated cyber espionage tool designed and used by Center 16 of Russia’s Federal Security Service, or FSB, for long-term intelligence collection on sensitive targets.</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-129">AA23-129A Alert, Technical Details, and Mitigations</a></p><p>For more information on FSB and Russian state-sponsored cyber activity, please see the joint advisory <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-110a">Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure</a> and <a href="https://www.cisa.gov/russia">CISA’s Russia Cyber Threat Overview and Advisories webpage</a>.</p><p>No-cost cyber hygiene services: <a href="https://www.cisa.gov/cyber-hygiene-services">Cyber Hygiene Services</a> and <a href="https://github.com/cisagov/cset/">Ransomware Readiness Assessment</a>.</p><p>See CISA Insights <a href="https://www.cisa.gov/sites/default/files/publications/CISA%20Insights_Guidance-for-MSPs-and-Small-and-Mid-sized-Businesses_S508C.pdf">Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses</a> for guidance on hardening MSP and customer infrastructure.</p><p>U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email <a href="mailto:dib_defense@cyber.nsa.gov">dib_defense@cyber.nsa.gov</a> </p><p>To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="mailto:report@cisa.gov">report@cisa.gov</a>, or call (888) 282-0870, or report incidents to your local FBI field office.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>199</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f38a4d9e-f015-11ed-8744-2f17d2d2cdae]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5466498001.mp3?updated=1683821496" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Five Eyes disrupt FSB’s Snake malware. From DDoS to cryptojacking. Ransomware trends. Yesterday’s Patch Tuesday is in the books.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1820/notes</link>
      <description>The Five Eyes disrupt Russia’s FSB Snake cyberespionage infrastructure. Shifting gears: from DDoS to cryptojacking. Trends in ransomware. Our guest is Steve Benton from Anomali with insights on potential industry headwinds. Ann Johnson from Afternoon Cyber Tea speaks with Roland Cloutier about risk and resilience in the modern era. And yesterday’s Patch Tuesday is now in the books, including a work-around for a patch from this past March.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/90

Selected reading.
Patch Tuesday notes. (The CyberWire)
U.S. Agencies and Allies Partner to Identify Russian Snake Malware Infrastructure Worldwide (US National Security Agency)
Hunting Russian Intelligence “Snake” Malware (Joint Cybersecurity Advisory)
RapperBot DDoS Botnet Expands into Cryptojacking (Fortinet)
The State of Ransomware 2023 (Sophos)
From One Vulnerability to Another: Outlook Patch Analysis Reveals Important Flaw in Windows API (Akamai)
Windows MSHTML Platform Security Feature Bypass Vulnerability (Microsoft)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 10 May 2023 20:15:00 -0000</pubDate>
      <itunes:title>Five Eyes disrupt FSB’s Snake malware. From DDoS to cryptojacking. Ransomware trends. Yesterday’s Patch Tuesday is in the books.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1820</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Five Eyes disrupt Russia’s FSB Snake cyberespionage infrastructure. Shifting gears: from DDoS to cryptojacking. Trends in ransomware. Our guest is Steve Benton from Anomali with insights on potential industry headwinds. Ann Johnson from Afternoon Cyber Tea speaks with Roland Cloutier about risk and resilience in the modern era. And yesterday’s Patch Tuesday is now in the books, including a work-around for a patch from this past March.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/90

Selected reading.
Patch Tuesday notes. (The CyberWire)
U.S. Agencies and Allies Partner to Identify Russian Snake Malware Infrastructure Worldwide (US National Security Agency)
Hunting Russian Intelligence “Snake” Malware (Joint Cybersecurity Advisory)
RapperBot DDoS Botnet Expands into Cryptojacking (Fortinet)
The State of Ransomware 2023 (Sophos)
From One Vulnerability to Another: Outlook Patch Analysis Reveals Important Flaw in Windows API (Akamai)
Windows MSHTML Platform Security Feature Bypass Vulnerability (Microsoft)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Five Eyes disrupt Russia’s FSB Snake cyberespionage infrastructure. Shifting gears: from DDoS to cryptojacking. Trends in ransomware. Our guest is Steve Benton from Anomali with insights on potential industry headwinds. Ann Johnson from Afternoon Cyber Tea speaks with Roland Cloutier about risk and resilience in the modern era. And yesterday’s Patch Tuesday is now in the books, including a work-around for a patch from this past March.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/90</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/stories/21d30fa223e440f28a32c336d7627e7d/patch-tuesday-notes">Patch Tuesday notes.</a> (The CyberWire)</p><p><a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3389044/us-agencies-and-allies-partner-to-identify-russian-snake-malware-infrastructure/">U.S. Agencies and Allies Partner to Identify Russian Snake Malware Infrastructure Worldwide</a> (US National Security Agency)</p><p><a href="https://media.defense.gov/2023/May/09/2003218554/-1/-1/1/JOINT_CSA_HUNTING_RU_INTEL_SNAKE_MALWARE_20230509.PDF">Hunting Russian Intelligence “Snake” Malware</a> (Joint Cybersecurity Advisory)</p><p><a href="https://www.fortinet.com/blog/threat-research/rapperbot-ddos-botnet-expands-into-cryptojacking">RapperBot DDoS Botnet Expands into Cryptojacking</a> (Fortinet)</p><p><a href="https://www.sophos.com/en-us/content/state-of-ransomware">The State of Ransomware 2023</a> (Sophos)</p><p><a href="https://www.akamai.com/blog/security-research/important-outlook-vulnerability-bypass-windows-api">From One Vulnerability to Another: Outlook Patch Analysis Reveals Important Flaw in Windows API</a> (Akamai)</p><p><a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2023-29324">Windows MSHTML Platform Security Feature Bypass Vulnerability</a> (Microsoft)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1674</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[31b9c7fc-8167-11ed-9779-831ab47f5ba4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8966386831.mp3?updated=1690332517" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>State-sponsored and state-promoted cyber campaigns. A look at Royal ransomware. A new wave of BEC. Man-in-the-middle attacks rising. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1819/notes</link>
      <description>An analysis of Royal ransomware. PaperCut vulnerability detection methods can be bypassed. Man-in-the-middle phishing attacks are on the rise. A new wave of BEC attacks from an unexpected source. Thomas Etheridge from CrowdStrike, has the latest threat landscape trends. Our guest is Dan Amiga of Island with insights on the enterprise browser category. And a look into recent Russian cyberattacks against Ukraine.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/89

Selected reading.
Threat Assessment: Royal Ransomware (Unit 42)
PaperCut Exploitation - A Different Path to Code Execution (VulnCheck)
New PaperCut RCE exploit created that bypasses existing detections (Bleeping Computer)
Man-in-the-Middle (MitM) attacks reaching inboxes increase 35% since 2022 (Cofense)
Exploring the Rise of Israel-Based BEC Attacks (Abnormal Security)
Russians launch mass cyber attack on online service for queueing to cross border by trucks (Ukrainska Pravda)
Reverting UAC-0006: Mass distribution of SmokeLoader using the "accounts" theme (CERT-UA#6613) (CERT-UA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 May 2023 20:15:00 -0000</pubDate>
      <itunes:title>State-sponsored and state-promoted cyber campaigns. A look at Royal ransomware. A new wave of BEC. Man-in-the-middle attacks rising. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1819</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An analysis of Royal ransomware. PaperCut vulnerability detection methods can be bypassed. Man-in-the-middle phishing attacks are on the rise. A new wave of BEC attacks from an unexpected source. Thomas Etheridge from CrowdStrike, has the latest threat landscape trends. Our guest is Dan Amiga of Island with insights on the enterprise browser category. And a look into recent Russian cyberattacks against Ukraine.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/89

Selected reading.
Threat Assessment: Royal Ransomware (Unit 42)
PaperCut Exploitation - A Different Path to Code Execution (VulnCheck)
New PaperCut RCE exploit created that bypasses existing detections (Bleeping Computer)
Man-in-the-Middle (MitM) attacks reaching inboxes increase 35% since 2022 (Cofense)
Exploring the Rise of Israel-Based BEC Attacks (Abnormal Security)
Russians launch mass cyber attack on online service for queueing to cross border by trucks (Ukrainska Pravda)
Reverting UAC-0006: Mass distribution of SmokeLoader using the "accounts" theme (CERT-UA#6613) (CERT-UA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An analysis of Royal ransomware. PaperCut vulnerability detection methods can be bypassed. Man-in-the-middle phishing attacks are on the rise. A new wave of BEC attacks from an unexpected source. Thomas Etheridge from CrowdStrike, has the latest threat landscape trends. Our guest is Dan Amiga of Island with insights on the enterprise browser category. And a look into recent Russian cyberattacks against Ukraine.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/89</p><p><br></p><h2>Selected reading.</h2><p><a href="https://unit42.paloaltonetworks.com/royal-ransomware/">Threat Assessment: Royal Ransomware</a> (Unit 42)</p><p><a href="https://vulncheck.com/blog/papercut-rce">PaperCut Exploitation - A Different Path to Code Execution</a> (VulnCheck)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-papercut-rce-exploit-created-that-bypasses-existing-detections/">New PaperCut RCE exploit created that bypasses existing detections</a> (Bleeping Computer)</p><p><a href="https://cofense.com/blog/cofense-intelligence-strategic-analysis-2/">Man-in-the-Middle (MitM) attacks reaching inboxes increase 35% since 2022</a> (Cofense)</p><p><a href="https://abnormalsecurity.com/resources/exploring-rise-of-israel-based-bec-attacks">Exploring the Rise of Israel-Based BEC Attacks</a> (Abnormal Security)</p><p><a href="https://www.pravda.com.ua/eng/news/2023/05/8/7401140/">Russians launch mass cyber attack on online service for queueing to cross border by trucks</a> (Ukrainska Pravda)</p><p><a href="https://cert.gov.ua/article/4555802">Reverting UAC-0006: Mass distribution of SmokeLoader using the "accounts" theme (CERT-UA#6613)</a> (CERT-UA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1554</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3178d346-8167-11ed-9779-5fb3aa3677bb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9547524938.mp3?updated=1690332503" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Developments in the ransomware underworld: ALPHV, Akira, Cactus, and Royal. Some organizations remain vulnerable to problems with unpatched Go-Anywhere instances. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1818/notes</link>
      <description>ALPHV claims responsibility for a cyberattack on Constellation Software. A new Akira ransomware campaign spreads. CACTUS is a new ransomware leveraging VPNs to infiltrate its target. Many organizations are still vulnerable to the Go-Anywhere MFT vulnerability. Russian hacktivists interfere with the French Senate's website. Keith Mularski from EY, details their "State of the Hack" report. Emily Austin from Censys discusses the State of the Internet. And ransomware gangs target local governments in Texas and California. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/88

Selected reading.
ALPHV gang claims ransomware attack on Constellation Software (BleepingComputer) 
Constellation Software hit by cyber attack, some personal information stolen (IT World Canada) 
Press Release of Constellation Software Inc. (GlobeNewswire News Room)
Meet Akira — A new ransomware operation targeting the enterprise (BleepingComputer)
New Cactus ransomware encrypts itself to evade antivirus (BleepingComputer) 
Pro-Russian Hackers Claim Downing of French Senate Website (SecurityWeek)
Dallas cyberattack highlights ransomware’s risks to public safety, health (Washington Post) 
Hacked: Dallas Ransomware Attack Disrupts City Services (Dallas Observer) 
City of Dallas Continues Battling Ransomware Attack for Third Day (NBC 5 Dallas-Fort Worth) 
San Bernardino County pays hackers $1.1 million ransom after cyber attack (Victorville Daily Press) 
San Bernardino County pays $1.1M ransom after cyberattack disrupts Sheriff's Department systems (ABC7 Los Angeles)
Atomic Data devastated by the unexpected death of CEO and co-owner Jim Wolford (Atomic Data)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 08 May 2023 20:15:00 -0000</pubDate>
      <itunes:title>Developments in the ransomware underworld: ALPHV, Akira, Cactus, and Royal. Some organizations remain vulnerable to problems with unpatched Go-Anywhere instances. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1818</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>ALPHV claims responsibility for a cyberattack on Constellation Software. A new Akira ransomware campaign spreads. CACTUS is a new ransomware leveraging VPNs to infiltrate its target. Many organizations are still vulnerable to the Go-Anywhere MFT vulnerability. Russian hacktivists interfere with the French Senate's website. Keith Mularski from EY, details their "State of the Hack" report. Emily Austin from Censys discusses the State of the Internet. And ransomware gangs target local governments in Texas and California. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/88

Selected reading.
ALPHV gang claims ransomware attack on Constellation Software (BleepingComputer) 
Constellation Software hit by cyber attack, some personal information stolen (IT World Canada) 
Press Release of Constellation Software Inc. (GlobeNewswire News Room)
Meet Akira — A new ransomware operation targeting the enterprise (BleepingComputer)
New Cactus ransomware encrypts itself to evade antivirus (BleepingComputer) 
Pro-Russian Hackers Claim Downing of French Senate Website (SecurityWeek)
Dallas cyberattack highlights ransomware’s risks to public safety, health (Washington Post) 
Hacked: Dallas Ransomware Attack Disrupts City Services (Dallas Observer) 
City of Dallas Continues Battling Ransomware Attack for Third Day (NBC 5 Dallas-Fort Worth) 
San Bernardino County pays hackers $1.1 million ransom after cyber attack (Victorville Daily Press) 
San Bernardino County pays $1.1M ransom after cyberattack disrupts Sheriff's Department systems (ABC7 Los Angeles)
Atomic Data devastated by the unexpected death of CEO and co-owner Jim Wolford (Atomic Data)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>ALPHV claims responsibility for a cyberattack on Constellation Software. A new Akira ransomware campaign spreads. CACTUS is a new ransomware leveraging VPNs to infiltrate its target. Many organizations are still vulnerable to the Go-Anywhere MFT vulnerability. Russian hacktivists interfere with the French Senate's website. Keith Mularski from EY, details their "State of the Hack" report. Emily Austin from Censys discusses the State of the Internet. And ransomware gangs target local governments in Texas and California. </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/88</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/security/alphv-gang-claims-ransomware-attack-on-constellation-software/">ALPHV gang claims ransomware attack on Constellation Software</a> (BleepingComputer) </p><p><a href="https://www.itworldcanada.com/article/constellation-software-hit-by-cyber-attack-some-personal-information-stolen/538279">Constellation Software hit by cyber attack, some personal information stolen</a> (IT World Canada) </p><p><a href="https://www.globenewswire.com/news-release/2023/05/04/2662158/0/en/Press-Release-of-Constellation-Software-Inc.html">Press Release of Constellation Software Inc.</a> (GlobeNewswire News Room)</p><p><a href="https://www.bleepingcomputer.com/news/security/meet-akira-a-new-ransomware-operation-targeting-the-enterprise/">Meet Akira — A new ransomware operation targeting the enterprise</a> (BleepingComputer)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-cactus-ransomware-encrypts-itself-to-evade-antivirus/">New Cactus ransomware encrypts itself to evade antivirus</a> (BleepingComputer) </p><p><a href="https://www.securityweek.com/pro-russian-hackers-claim-downing-of-french-senate-website/">Pro-Russian Hackers Claim Downing of French Senate Website</a> (SecurityWeek)</p><p><a href="https://www.washingtonpost.com/politics/2023/05/08/dallas-cyberattack-highlights-ransomwares-risks-public-safety-health/">Dallas cyberattack highlights ransomware’s risks to public safety, health</a> (Washington Post) </p><p><a href="https://www.dallasobserver.com/news/hacked-dallas-ransomware-attack-disrupts-city-services-16516621">Hacked: Dallas Ransomware Attack Disrupts City Services</a> (Dallas Observer) </p><p><a href="https://www.nbcdfw.com/news/local/city-of-dallas-continues-battling-ransomware-attack-for-third-day/3251877/">City of Dallas Continues Battling Ransomware Attack for Third Day</a> (NBC 5 Dallas-Fort Worth) </p><p><a href="https://www.vvdailypress.com/story/news/crime/2023/05/05/county-pays-hacker-1-1-million-ransom-after-cyber-attack/70190226007/">San Bernardino County pays hackers $1.1 million ransom after cyber attack</a> (Victorville Daily Press) </p><p><a href="https://abc7.com/san-bernardino-cyberattack-ransom-paid-hackers/13215833/">San Bernardino County pays $1.1M ransom after cyberattack disrupts Sheriff's Department systems</a> (ABC7 Los Angeles)</p><p><a href="https://www.atomicdata.com/atomic-data-devastated-by-the-unexpected-death-of-ceo-jim-wolford/">Atomic Data devastated by the unexpected death of CEO and co-owner Jim Wolford</a> (Atomic Data)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1613</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[31372e6e-8167-11ed-9779-d76fd6ebbea0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5011939769.mp3?updated=1690332486" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shelley Ma: The mystery behind cybersecurity. [Response Lead] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/148/notes</link>
      <description>Shelley Ma, Incident Response Lead at Coalition sits down to share her story, starting all the way back when she was a kid and fell in love with playing the game "NeoPets" that ended up paving the way for her future in cybersecurity. After starting this journey, she shares how she became intrigued with crime and mystery shows, which ultimately spawned an interest in forensic science. She ended up signing up for an internship program that she was able to get into, which she says was a pivotal change for her that provided her the chance to begin her career. She shares the advice that if anyone is looking to get into this career, she highly recommends looking into the career before beginning. Following some advise given to her by a professor and mentor, she says that telling the truth helps her deal with adversity in the workplace. Shelley says "In our industry, there are so many opportunities for our opinions and testimonies to be coerced and swayed. I refuse to do that and every time I come back to what my professor said, if you don't want to spend the rest of your life looking over your shoulders, just simply tell the truth." We thank Shelley for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 07 May 2023 07:00:00 -0000</pubDate>
      <itunes:title>Shelley Ma: The mystery behind cybersecurity. [Response Lead] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>148</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Shelley Ma, Incident Response Lead at Coalition sits down to share her story, starting all the way back when she was a kid and fell in love with playing the game "NeoPets" that ended up paving the way for her future in cybersecurity. After starting this journey, she shares how she became intrigued with crime and mystery shows, which ultimately spawned an interest in forensic science. She ended up signing up for an internship program that she was able to get into, which she says was a pivotal change for her that provided her the chance to begin her career. She shares the advice that if anyone is looking to get into this career, she highly recommends looking into the career before beginning. Following some advise given to her by a professor and mentor, she says that telling the truth helps her deal with adversity in the workplace. Shelley says "In our industry, there are so many opportunities for our opinions and testimonies to be coerced and swayed. I refuse to do that and every time I come back to what my professor said, if you don't want to spend the rest of your life looking over your shoulders, just simply tell the truth." We thank Shelley for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Shelley Ma, Incident Response Lead at Coalition sits down to share her story, starting all the way back when she was a kid and fell in love with playing the game "NeoPets" that ended up paving the way for her future in cybersecurity. After starting this journey, she shares how she became intrigued with crime and mystery shows, which ultimately spawned an interest in forensic science. She ended up signing up for an internship program that she was able to get into, which she says was a pivotal change for her that provided her the chance to begin her career. She shares the advice that if anyone is looking to get into this career, she highly recommends looking into the career before beginning. Following some advise given to her by a professor and mentor, she says that telling the truth helps her deal with adversity in the workplace. Shelley says "In our industry, there are so many opportunities for our opinions and testimonies to be coerced and swayed. I refuse to do that and every time I come back to what my professor said, if you don't want to spend the rest of your life looking over your shoulders, just simply tell the truth." We thank Shelley for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>493</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[853fe654-e9f9-11ed-ab10-336fc64e7241]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5309498435.mp3?updated=1683213352" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing campaign takes the energy out of Chinese nuclear industry. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/280/notes</link>
      <description>Ryan Robinson from Intezer to discuss his team's work on "Phishing Campaign Targets Chinese Nuclear Energy Industry." The research team discovered activity targeting the nuclear energy industry in China. Researchers attributed the activity to Bitter APT, a South Asian APT that is known to target the energy, manufacturing and government sectors, mainly in Pakistan, China, Bangladesh, and Saudi Arabia.
The article states "We identified seven emails pretending to be from the Embassy of Kyrgyzstan, being sent to recipients in the nuclear energy industry in China. In some emails, people and entities in academia are also targeted, also related to nuclear energy." By luring recipients in, invites them to join conferences on subjects that are relevant to them, they are then able to social engineer the victims.
The research can be found here:
Phishing Campaign Targets Chinese Nuclear Energy Industry

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 May 2023 07:00:00 -0000</pubDate>
      <itunes:title>Phishing campaign takes the energy out of Chinese nuclear industry. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>280</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ryan Robinson from Intezer to discuss his team's work on "Phishing Campaign Targets Chinese Nuclear Energy Industry." The research team discovered activity targeting the nuclear energy industry in China. Researchers attributed the activity to Bitter APT, a South Asian APT that is known to target the energy, manufacturing and government sectors, mainly in Pakistan, China, Bangladesh, and Saudi Arabia.
The article states "We identified seven emails pretending to be from the Embassy of Kyrgyzstan, being sent to recipients in the nuclear energy industry in China. In some emails, people and entities in academia are also targeted, also related to nuclear energy." By luring recipients in, invites them to join conferences on subjects that are relevant to them, they are then able to social engineer the victims.
The research can be found here:
Phishing Campaign Targets Chinese Nuclear Energy Industry

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ryan Robinson from Intezer to discuss his team's work on "Phishing Campaign Targets Chinese Nuclear Energy Industry." The research team discovered activity targeting the nuclear energy industry in China. Researchers attributed the activity to Bitter APT, a South Asian APT that is known to target the energy, manufacturing and government sectors, mainly in Pakistan, China, Bangladesh, and Saudi Arabia.</p><p>The article states "We identified seven emails pretending to be from the Embassy of Kyrgyzstan, being sent to recipients in the nuclear energy industry in China. In some emails, people and entities in academia are also targeted, also related to nuclear energy." By luring recipients in, invites them to join conferences on subjects that are relevant to them, they are then able to social engineer the victims.</p><p>The research can be found here:</p><ul><li><a href="https://www.intezer.com/blog/research/phishing-campaign-targets-nuclear-energy-industry/">Phishing Campaign Targets Chinese Nuclear Energy Industry</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1255</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4d1ade88-e9f3-11ed-8516-53c692673a72]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4374504836.mp3?updated=1685127572" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DPRK's Kimsuki spearphishes. A standards strategy for AI. Ransomware Task Force retrospective. KillNet's new menu. Ex Uber CSO sentenced for data breach cover-up.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1817/notes</link>
      <description>Kimsuki has a new reconnaissance tool. The Biden administration shares plans for AI. Reports on the ransomware taskforce report. KillNet recommits to turning a profit. Deepen Desai from Zscaler has the latest stats on Phishing. Our guest is Karen Worstell from VMware with a conversation about inclusivity. And the former CSO at Uber is sentenced.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/87

Selected reading.
Kimsuky Evolves Reconnaissance Capabilities in New Global Campaign (SentinelOne)
Ransomware Task Force Gaining Ground - May 2023 Progress Report (Ransomware Task Force)
Influential task force takes stock of progress against ransomware (Washington Post)
For Money and Attention: Killnet Apparently Reorganizes Again (Flashpoint)
Killnet Ostracizes Leader of Anonymous Russia, Adding New Chapter to Pro-Kremlin Hacktivist Drama (Flashpoint)
Former Uber CSO Joe Sullivan Avoids Prison Time Over Data Breach Cover-Up (Security Week)
Former Uber security chief Sullivan avoids prison in data breach case (Washington Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 05 May 2023 20:45:00 -0000</pubDate>
      <itunes:title>DPRK's Kimsuki spearphishes. A standards strategy for AI. Ransomware Task Force retrospective. KillNet's new menu. Ex Uber CSO sentenced for data breach cover-up.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1817</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Kimsuki has a new reconnaissance tool. The Biden administration shares plans for AI. Reports on the ransomware taskforce report. KillNet recommits to turning a profit. Deepen Desai from Zscaler has the latest stats on Phishing. Our guest is Karen Worstell from VMware with a conversation about inclusivity. And the former CSO at Uber is sentenced.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/87

Selected reading.
Kimsuky Evolves Reconnaissance Capabilities in New Global Campaign (SentinelOne)
Ransomware Task Force Gaining Ground - May 2023 Progress Report (Ransomware Task Force)
Influential task force takes stock of progress against ransomware (Washington Post)
For Money and Attention: Killnet Apparently Reorganizes Again (Flashpoint)
Killnet Ostracizes Leader of Anonymous Russia, Adding New Chapter to Pro-Kremlin Hacktivist Drama (Flashpoint)
Former Uber CSO Joe Sullivan Avoids Prison Time Over Data Breach Cover-Up (Security Week)
Former Uber security chief Sullivan avoids prison in data breach case (Washington Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kimsuki has a new reconnaissance tool. The Biden administration shares plans for AI. Reports on the ransomware taskforce report. KillNet recommits to turning a profit. Deepen Desai from Zscaler has the latest stats on Phishing. Our guest is Karen Worstell from VMware with a conversation about inclusivity. And the former CSO at Uber is sentenced.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/87</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.sentinelone.com/labs/kimsuky-evolves-reconnaissance-capabilities-in-new-global-campaign/">Kimsuky Evolves Reconnaissance Capabilities in New Global Campaign</a> (SentinelOne)</p><p><a href="https://securityandtechnology.org/wp-content/uploads/2023/05/Ransomware-Task-Force-Gaining-Ground-May-2023-Progress-Report.pdf">Ransomware Task Force Gaining Ground - May 2023 Progress Report</a> (Ransomware Task Force)</p><p><a href="https://www.washingtonpost.com/politics/2023/05/05/influential-task-force-takes-stock-progress-against-ransomware/">Influential task force takes stock of progress against ransomware</a> (Washington Post)</p><p><a href="https://flashpoint.io/blog/killnet-reorganizes-again-for-money-and-attention/">For Money and Attention: Killnet Apparently Reorganizes Again</a> (Flashpoint)</p><p><a href="https://flashpoint.io/blog/killnet-anonymous-russia-pro-kremlin-hacktivism/">Killnet Ostracizes Leader of Anonymous Russia, Adding New Chapter to Pro-Kremlin Hacktivist Drama</a> (Flashpoint)</p><p><a href="https://www.securityweek.com/former-uber-cso-joe-sullivan-avoids-prison-time-over-data-breach-cover-up/">Former Uber CSO Joe Sullivan Avoids Prison Time Over Data Breach Cover-Up</a> (Security Week)</p><p><a href="https://www.washingtonpost.com/technology/2023/05/04/sullivan-sentencing-uber-executive/">Former Uber security chief Sullivan avoids prison in data breach case</a> (Washington Post)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2244</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3005f0b6-8167-11ed-9779-af28fd71cd8c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4161928862.mp3?updated=1690332459" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage, straight out of Beijing, Teheran, and Moscow. Developments in the criminal underworld. Indictment in a dark web carder case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1816/notes</link>
      <description>An APT41 subgroup uses new techniques to bypass security products. Iranian cyberespionage group MuddyWater is using Managed Service Provider tools. Wipers reappear in Ukrainian networks. Meta observes and disrupts the new NodeStealer malware campaign. The City of Dallas is moderately affected by a ransomware attack. My conversation with Karin Voodla, part of the US State Department’s Cyber fellowship program. Lesley Carhart from Dragos shares Real World Stories of Incident Response and Threat Intelligence. And there’s been an indictment and a takedown in a major dark web carder case.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/86

Selected reading.
Attack on Security Titans: Earth Longzhi Returns With New Tricks (Trend Micro)
APT groups muddying the waters for MSPs (ESET)
Russian hackers use WinRAR to wipe Ukraine state agency’s data (BleepingComputer)
WinRAR as a "cyberweapon". Destructive cyberattack UAC-0165 (probably Sandworm) on the public sector of Ukraine using RoarBat (CERT-UA#6550) (CERT-UA) 
The malware threat landscape: NodeStealer, DuckTail, and more (Engineering at Meta) 
Facebook disrupts new NodeStealer information-stealing malware (BleepingComputer)
NodeStealer Malware Targets Gmail, Outlook, Facebook Credentials (Decipher)
City of Dallas likely targeted in ransomware attack, city official says (Dallas News) 
Cybercriminal Network Fueling the Global Stolen Credit Card Trade is Dismantled (US Department of Justice)
Secret Service, State Department Offer Up To $10 Million Dollar Reward For Information On Wanted International Fugitive (US Secret Service)
Police dismantles Try2Check credit card verifier used by dark web markets (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 04 May 2023 20:15:00 -0000</pubDate>
      <itunes:title>Cyberespionage, straight out of Beijing, Teheran, and Moscow. Developments in the criminal underworld. Indictment in a dark web carder case.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1816</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An APT41 subgroup uses new techniques to bypass security products. Iranian cyberespionage group MuddyWater is using Managed Service Provider tools. Wipers reappear in Ukrainian networks. Meta observes and disrupts the new NodeStealer malware campaign. The City of Dallas is moderately affected by a ransomware attack. My conversation with Karin Voodla, part of the US State Department’s Cyber fellowship program. Lesley Carhart from Dragos shares Real World Stories of Incident Response and Threat Intelligence. And there’s been an indictment and a takedown in a major dark web carder case.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/86

Selected reading.
Attack on Security Titans: Earth Longzhi Returns With New Tricks (Trend Micro)
APT groups muddying the waters for MSPs (ESET)
Russian hackers use WinRAR to wipe Ukraine state agency’s data (BleepingComputer)
WinRAR as a "cyberweapon". Destructive cyberattack UAC-0165 (probably Sandworm) on the public sector of Ukraine using RoarBat (CERT-UA#6550) (CERT-UA) 
The malware threat landscape: NodeStealer, DuckTail, and more (Engineering at Meta) 
Facebook disrupts new NodeStealer information-stealing malware (BleepingComputer)
NodeStealer Malware Targets Gmail, Outlook, Facebook Credentials (Decipher)
City of Dallas likely targeted in ransomware attack, city official says (Dallas News) 
Cybercriminal Network Fueling the Global Stolen Credit Card Trade is Dismantled (US Department of Justice)
Secret Service, State Department Offer Up To $10 Million Dollar Reward For Information On Wanted International Fugitive (US Secret Service)
Police dismantles Try2Check credit card verifier used by dark web markets (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An APT41 subgroup uses new techniques to bypass security products. Iranian cyberespionage group MuddyWater is using Managed Service Provider tools. Wipers reappear in Ukrainian networks. Meta observes and disrupts the new NodeStealer malware campaign. The City of Dallas is moderately affected by a ransomware attack. My conversation with Karin Voodla, part of the US State Department’s Cyber fellowship program. Lesley Carhart from Dragos shares Real World Stories of Incident Response and Threat Intelligence. And there’s been an indictment and a takedown in a major dark web carder case.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/86</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.trendmicro.com/en_us/research/23/e/attack-on-security-titans-earth-longzhi-returns-with-new-tricks.html">Attack on Security Titans: Earth Longzhi Returns With New Tricks</a> (Trend Micro)</p><p><a href="https://www.welivesecurity.com/2023/05/02/apt-groups-muddying-waters-msps/">APT groups muddying the waters for MSPs</a> (ESET)</p><p><a href="https://www.bleepingcomputer.com/news/security/russian-hackers-use-winrar-to-wipe-ukraine-state-agencys-data/">Russian hackers use WinRAR to wipe Ukraine state agency’s data</a> (BleepingComputer)</p><p><a href="https://cert.gov.ua/article/4501891">WinRAR as a "cyberweapon". Destructive cyberattack UAC-0165 (probably Sandworm) on the public sector of Ukraine using RoarBat (CERT-UA#6550)</a> (CERT-UA) </p><p><a href="https://engineering.fb.com/2023/05/03/security/malware-nodestealer-ducktail/">The malware threat landscape: NodeStealer, DuckTail, and more</a> (Engineering at Meta) </p><p><a href="https://www.bleepingcomputer.com/news/security/facebook-disrupts-new-nodestealer-information-stealing-malware/">Facebook disrupts new NodeStealer information-stealing malware</a> (BleepingComputer)</p><p><a href="https://duo.com/decipher/nodestealer-malware-targets-gmail-outlook-facebook-credentials">NodeStealer Malware Targets Gmail, Outlook, Facebook Credentials</a> (Decipher)</p><p><a href="https://www.dallasnews.com/news/2023/05/03/dallas-websites-affected-by-outages-possible-ransomware-attack/">City of Dallas likely targeted in ransomware attack, city official says</a> (Dallas News) </p><p><a href="https://www.justice.gov/usao-edny/pr/cybercriminal-network-fueling-global-stolen-credit-card-trade-dismantled">Cybercriminal Network Fueling the Global Stolen Credit Card Trade is Dismantled</a> (US Department of Justice)</p><p><a href="https://www.secretservice.gov/newsroom/releases/2023/05/secret-service-state-department-offer-10-million-dollar-reward">Secret Service, State Department Offer Up To $10 Million Dollar Reward For Information On Wanted International Fugitive </a>(US Secret Service)</p><p><a href="https://www.bleepingcomputer.com/news/security/police-dismantles-try2check-credit-card-verifier-used-by-dark-web-markets/">Police dismantles Try2Check credit card verifier used by dark web markets</a> (BleepingComputer)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1848</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[31e4fae4-8167-11ed-9779-9b3b96491f30]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3216971982.mp3?updated=1690332439" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Iran integrates influence and cyber operations. ChatGPT use and misuse. Trends in the cyber underworld. Hybrid warfare and cyber insurance war clauses.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1815/notes</link>
      <description>Iran integrates influence and cyber operations. ChatGPT use and misuse. Phishing reports increased significantly so far in 2023, while HTML attacks double. An update on the Discord Papers. Cyberstrikes against civilian targets. My conversation with our own Simone Petrella on emerging cyber workforce strategies. Tim Starks from the Washington Post joins me with reflections on the RSA conference. And, turns out, a war clause cannot be invoked in denying damage claims in the NotPetya attacks (at least not in the Garden State).

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/85

Selected reading.
Rinse and repeat: Iran accelerates its cyber influence operations worldwide (Microsoft On the Issues)
ChatGPT Confirms Data Breach, Raising Security Concerns (Security Intelligence) 
Samsung Bans Generative AI Use by Staff After ChatGPT Data Leak (Bloomberg) 
Malicious email campaigns abusing Telegram bots rise tremendously in Q1 2023, surpassing all of 2022 by 310% (Cofense)
Threat Spotlight: Proportion of malicious HTML attachments doubles within a year (Barracuda)
Zelensky says White House told him nothing about Discord intelligence leaks (Washington Post)
Russia attacks civilian infrastructure in cyberspace just as it does on ground - watchdog (Ukrinform)
Merck’s Insurers On the Hook in $1.4 Billion NotPetya Attack, Court Says (Wall Street Journal)
Merck entitled to $1.4B in cyberattack case after court rejects insurers' 'warlike action' claim (Fierce Pharma)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 03 May 2023 20:15:00 -0000</pubDate>
      <itunes:title>Iran integrates influence and cyber operations. ChatGPT use and misuse. Trends in the cyber underworld. Hybrid warfare and cyber insurance war clauses.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1815</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Iran integrates influence and cyber operations. ChatGPT use and misuse. Phishing reports increased significantly so far in 2023, while HTML attacks double. An update on the Discord Papers. Cyberstrikes against civilian targets. My conversation with our own Simone Petrella on emerging cyber workforce strategies. Tim Starks from the Washington Post joins me with reflections on the RSA conference. And, turns out, a war clause cannot be invoked in denying damage claims in the NotPetya attacks (at least not in the Garden State).

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/85

Selected reading.
Rinse and repeat: Iran accelerates its cyber influence operations worldwide (Microsoft On the Issues)
ChatGPT Confirms Data Breach, Raising Security Concerns (Security Intelligence) 
Samsung Bans Generative AI Use by Staff After ChatGPT Data Leak (Bloomberg) 
Malicious email campaigns abusing Telegram bots rise tremendously in Q1 2023, surpassing all of 2022 by 310% (Cofense)
Threat Spotlight: Proportion of malicious HTML attachments doubles within a year (Barracuda)
Zelensky says White House told him nothing about Discord intelligence leaks (Washington Post)
Russia attacks civilian infrastructure in cyberspace just as it does on ground - watchdog (Ukrinform)
Merck’s Insurers On the Hook in $1.4 Billion NotPetya Attack, Court Says (Wall Street Journal)
Merck entitled to $1.4B in cyberattack case after court rejects insurers' 'warlike action' claim (Fierce Pharma)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iran integrates influence and cyber operations. ChatGPT use and misuse. Phishing reports increased significantly so far in 2023, while HTML attacks double. An update on the Discord Papers. Cyberstrikes against civilian targets. My conversation with our own Simone Petrella on emerging cyber workforce strategies. Tim Starks from the Washington Post joins me with reflections on the RSA conference. And, turns out, a war clause cannot be invoked in denying damage claims in the NotPetya attacks (at least not in the Garden State).</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/85</p><p><br></p><h2>Selected reading.</h2><p><a href="https://blogs.microsoft.com/on-the-issues/2023/05/02/dtac-iran-cyber-influence-operations-digital-threat/">Rinse and repeat: Iran accelerates its cyber influence operations worldwide</a> (Microsoft On the Issues)</p><p><a href="https://securityintelligence.com/articles/chatgpt-confirms-data-breach/">ChatGPT Confirms Data Breach, Raising Security Concerns</a> (Security Intelligence) </p><p><a href="https://www.bloomberg.com/news/articles/2023-05-02/samsung-bans-chatgpt-and-other-generative-ai-use-by-staff-after-leak">Samsung Bans Generative AI Use by Staff After ChatGPT Data Leak</a> (Bloomberg) </p><p><a href="https://cofense.com/blog/malicious-email-campaigns-abusing-telegram-bots-rise-tremendously-in-q1-2023-surpassing-all-of-2022-by-310/">Malicious email campaigns abusing Telegram bots rise tremendously in Q1 2023, surpassing all of 2022 by 310%</a> (Cofense)</p><p><a href="https://blog.barracuda.com/2023/05/03/threat-spotlight-malicious-html-attachments-doubles/">Threat Spotlight: Proportion of malicious HTML attachments doubles within a year</a> (Barracuda)</p><p><a href="https://www.washingtonpost.com/world/2023/05/02/zelensky-ukraine-discord-document-leaks-damage/">Zelensky says White House told him nothing about Discord intelligence leaks</a> (Washington Post)</p><p><a href="https://www.ukrinform.net/rubric-ato/3703874-russia-attacks-civilian-infrastructure-in-cyberspace-just-as-it-does-on-ground-watchdog.html">Russia attacks civilian infrastructure in cyberspace just as it does on ground - watchdog</a> (Ukrinform)</p><p><a href="https://www.wsj.com/articles/mercks-insurers-on-the-hook-in-1-4-billion-notpetya-attack-court-says-528aeb01">Merck’s Insurers On the Hook in $1.4 Billion NotPetya Attack, Court Says</a> (Wall Street Journal)</p><p><a href="https://www.fiercepharma.com/pharma/merck-entitled-14b-payout-cyberattack-case-after-judge-refutes-insurers-warlike-action-claim">Merck entitled to $1.4B in cyberattack case after court rejects insurers' 'warlike action' claim</a> (Fierce Pharma)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1995</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[31cf7674-8167-11ed-9779-4794ad94517f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8564841440.mp3?updated=1690332427" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From cryptostealers to CCTV exploits, from Magecart enhancements to coronation phishbait, cybercriminals have been active. (But so have law enforcement agencies.) </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1814/notes</link>
      <description>LOBSHOT is a cryptowallet stealer abusing Google Ads. Coronation phishbait. A known CCTV vulnerability is currently being exploited. T-Mobile discloses another, smaller data breach. New Magecart exploits. Preliminary lessons from cyber operations during Russia's war. Rob Boyce from Accenture shares insights from RSA Conference. Our special guest is NSA Director of Cybersecurity Rob Joyce. And Europol announces a major dark web market takedown.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/84

Selected reading.
New LOBSHOT malware gives hackers hidden VNC access to Windows devices (BleepingComputer)
New 'Lobshot' hVNC Malware Used by Russian Cybercriminals (SecurityWeek)
Elastic Security Labs discovers the LOBSHOT malware (Elastic Blog)
Researchers see surge in scam websites linked to coronation (Computer Weekly) 
TBK DVR Authentication Bypass Attack (FortiGuard) 
T-Mobile discloses second data breach since the start of 2023 (BleepingComputer) 
T-Mobile discloses 2nd data breach of 2023, this one leaking account PINs and more (Ars Technica) 
T-Mobile Announces Another Data Breach (CNET)
Magecart threat actor rolls out convincing modal forms (Malwarebytes)
Cyber lessons from Ukraine: Prepare for prolonged conflict, not a knockout blow (Breaking Defense)
288 dark web vendors arrested in major marketplace seizure (Europol)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 May 2023 20:15:00 -0000</pubDate>
      <itunes:title>From cryptostealers to CCTV exploits, from Magecart enhancements to coronation phishbait, cybercriminals have been active. (But so have law enforcement agencies.) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1814</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>LOBSHOT is a cryptowallet stealer abusing Google Ads. Coronation phishbait. A known CCTV vulnerability is currently being exploited. T-Mobile discloses another, smaller data breach. New Magecart exploits. Preliminary lessons from cyber operations during Russia's war. Rob Boyce from Accenture shares insights from RSA Conference. Our special guest is NSA Director of Cybersecurity Rob Joyce. And Europol announces a major dark web market takedown.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/84

Selected reading.
New LOBSHOT malware gives hackers hidden VNC access to Windows devices (BleepingComputer)
New 'Lobshot' hVNC Malware Used by Russian Cybercriminals (SecurityWeek)
Elastic Security Labs discovers the LOBSHOT malware (Elastic Blog)
Researchers see surge in scam websites linked to coronation (Computer Weekly) 
TBK DVR Authentication Bypass Attack (FortiGuard) 
T-Mobile discloses second data breach since the start of 2023 (BleepingComputer) 
T-Mobile discloses 2nd data breach of 2023, this one leaking account PINs and more (Ars Technica) 
T-Mobile Announces Another Data Breach (CNET)
Magecart threat actor rolls out convincing modal forms (Malwarebytes)
Cyber lessons from Ukraine: Prepare for prolonged conflict, not a knockout blow (Breaking Defense)
288 dark web vendors arrested in major marketplace seizure (Europol)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>LOBSHOT is a cryptowallet stealer abusing Google Ads. Coronation phishbait. A known CCTV vulnerability is currently being exploited. T-Mobile discloses another, smaller data breach. New Magecart exploits. Preliminary lessons from cyber operations during Russia's war. Rob Boyce from Accenture shares insights from RSA Conference. Our special guest is NSA Director of Cybersecurity Rob Joyce. And Europol announces a major dark web market takedown.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/84</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/security/new-lobshot-malware-gives-hackers-hidden-vnc-access-to-windows-devices/">New LOBSHOT malware gives hackers hidden VNC access to Windows devices</a> (BleepingComputer)</p><p><a href="https://www.securityweek.com/new-lobshot-hvnc-malware-used-by-russian-cybercriminals/">New 'Lobshot' hVNC Malware Used by Russian Cybercriminals</a> (SecurityWeek)</p><p><a href="https://www.elastic.co/security-labs/elastic-security-labs-discovers-lobshot-malware">Elastic Security Labs discovers the LOBSHOT malware</a> (Elastic Blog)</p><p><a href="https://www.computerweekly.com/news/366535992/Researchers-see-surge-in-scam-websites-linked-to-Coronation">Researchers see surge in scam websites linked to coronation</a> (Computer Weekly) </p><p><a href="https://fortiguard.fortinet.com/outbreak-alert/tbk-dvr-attack">TBK DVR Authentication Bypass Attack</a> (FortiGuard) </p><p><a href="https://www.bleepingcomputer.com/news/security/t-mobile-discloses-second-data-breach-since-the-start-of-2023/">T-Mobile discloses second data breach since the start of 2023</a> (BleepingComputer) </p><p><a href="https://arstechnica.com/information-technology/2023/05/t-mobile-discloses-2nd-data-breach-of-2023-this-one-leaking-account-pins-and-more/">T-Mobile discloses 2nd data breach of 2023, this one leaking account PINs and more</a> (Ars Technica) </p><p><a href="https://www.cnet.com/tech/mobile/t-mobile-announces-another-data-breach/">T-Mobile Announces Another Data Breach</a> (CNET)</p><p><a href="https://www.malwarebytes.com/blog/threat-intelligence/2023/04/kritec-art">Magecart threat actor rolls out convincing modal forms</a> (Malwarebytes)</p><p><a href="https://breakingdefense.com/2023/05/cyber-lessons-from-ukraine-prepare-for-prolonged-conflict-not-a-knockout-blow/">Cyber lessons from Ukraine: Prepare for prolonged conflict, not a knockout blow</a> (Breaking Defense)</p><p><a href="https://www.europol.europa.eu/media-press/newsroom/news/288-dark-web-vendors-arrested-in-major-marketplace-seizure">288 dark web vendors arrested in major marketplace seizure</a> (Europol)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1875</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[31626d4a-8167-11ed-9779-c3022179038a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8425323370.mp3?updated=1690332393" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FDA warns of biomed device vulnerability. Ransomware's effects continue at US Marshals Service fugitive tracking. US DoJ shifts to disruption of cybercrime. GRU phishing. KillNet’s ask-me-anything.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1813/notes</link>
      <description>The FDA warns of a vulnerability affecting biomedical devices. Ransomware's effects continue to trouble the US Marshals Service. The US Justice Department shifts how it deals with large scale cybercrime. Fresh phish from the GRU. Caleb Barlow looks at unicorns and zombiecorns. Our guest Manoj Sharma from Symantec explains the differences between Zero Trust and SASE. And KillNet runs an ask-me-anything session.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/83

Selected reading.
Illumina cyber vulnerability may present risks for patient results (U.S. Food and Drug Administration)
CISA, FDA warn of new Illumina DNA device vulnerability (Record
Key law enforcement computers still down 10 weeks after breach (Washington Post)
Feds Prioritizing Disruptions Over Arrests in Cyberattack Cases (PCMAG) 
"Ashamed" LockBit ransomware gang apologises to hacked school, offers free decryption tool (Hot for Security) 
APT28 cyberattack: distribution of emails with "instructions" on "updating the operating system" (CERT-UA#6562) (CERT-UA)
Hackers use fake ‘Windows Update’ guides to target Ukrainian govt (BleepingComputer) 
Ukraine at D+431: Drone strikes and phishing expeditions. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 01 May 2023 20:15:00 -0000</pubDate>
      <itunes:title>FDA warns of biomed device vulnerability. Ransomware's effects continue at US Marshals Service fugitive tracking. US DoJ shifts to disruption of cybercrime. GRU phishing. KillNet’s ask-me-anything.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1813</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The FDA warns of a vulnerability affecting biomedical devices. Ransomware's effects continue to trouble the US Marshals Service. The US Justice Department shifts how it deals with large scale cybercrime. Fresh phish from the GRU. Caleb Barlow looks at unicorns and zombiecorns. Our guest Manoj Sharma from Symantec explains the differences between Zero Trust and SASE. And KillNet runs an ask-me-anything session.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/83

Selected reading.
Illumina cyber vulnerability may present risks for patient results (U.S. Food and Drug Administration)
CISA, FDA warn of new Illumina DNA device vulnerability (Record
Key law enforcement computers still down 10 weeks after breach (Washington Post)
Feds Prioritizing Disruptions Over Arrests in Cyberattack Cases (PCMAG) 
"Ashamed" LockBit ransomware gang apologises to hacked school, offers free decryption tool (Hot for Security) 
APT28 cyberattack: distribution of emails with "instructions" on "updating the operating system" (CERT-UA#6562) (CERT-UA)
Hackers use fake ‘Windows Update’ guides to target Ukrainian govt (BleepingComputer) 
Ukraine at D+431: Drone strikes and phishing expeditions. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FDA warns of a vulnerability affecting biomedical devices. Ransomware's effects continue to trouble the US Marshals Service. The US Justice Department shifts how it deals with large scale cybercrime. Fresh phish from the GRU. Caleb Barlow looks at unicorns and zombiecorns. Our guest Manoj Sharma from Symantec explains the differences between Zero Trust and SASE. And KillNet runs an ask-me-anything session.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/83</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.fda.gov/medical-devices/letters-health-care-providers/illumina-cybersecurity-vulnerability-affecting-universal-copy-service-software-may-present-risks">Illumina cyber vulnerability may present risks for patient results</a> (U.S. Food and Drug Administration)</p><p><a href="https://therecord.media/illumina-dna-sequencing-devices-vulnerability-fda-cisa">CISA, FDA warn of new Illumina DNA device vulnerability</a> (Record</p><p><a href="https://www.washingtonpost.com/national-security/2023/05/01/marshals-hack-fugitives-surveillance-shutdown/">Key law enforcement computers still down 10 weeks after breach</a> (Washington Post)</p><p><a href="https://www.pcmag.com/news/feds-prioritizing-disruptions-over-arrests-in-cyberattack-cases">Feds Prioritizing Disruptions Over Arrests in Cyberattack Cases</a> (PCMAG) </p><p><a href="https://www.bitdefender.com/blog/hotforsecurity/ashamed-lockbit-ransomware-gang-apologises-to-hacked-school-offers-free-decryption-tool/">"Ashamed" LockBit ransomware gang apologises to hacked school, offers free decryption tool</a> (Hot for Security) </p><p><a href="https://cert.gov.ua/article/4492467">APT28 cyberattack: distribution of emails with "instructions" on "updating the operating system" (CERT-UA#6562)</a> (CERT-UA)</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-use-fake-windows-update-guides-to-target-ukrainian-govt/">Hackers use fake ‘Windows Update’ guides to target Ukrainian govt</a> (BleepingComputer) </p><p><a href="https://thecyberwire.com/stories/fd8e38765bac4009b679331cc1767236/ukraine-at-d431-drone-strikes-and-phishing-expeditions">Ukraine at D+431: Drone strikes and phishing expeditions.</a> (CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2071</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[314bdfb2-8167-11ed-9779-a3af86071a33]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2358809808.mp3?updated=1690332378" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Perry Carpenter: Turning composition into computing. [Strategy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/147/notes</link>
      <description>Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4 and host of the 8th Layer Insights podcast, sits down to share his story trying different paths, before ultimately switching over to the cyber industry. After trying to go down the paths of music and law and finding neither were what he wanted to do, he decided to take an internship to get more into computer programming. That led him to getting his first job. After his first job, he moved onto other big name companies like Walmart, Alltel, and Gartner, and landing finally with KnowBe4. He compares his work to working with music, when he initially wanted to begin making music early in his career. He says "I think for me, when it was the kind of the connection between music and computing is that whenever you're kind of joining things together or at a, a musical scale to make chords, or whenever you're adding different, um, instruments and octaves together or timbers together to get some kind of bigger result." We thank Perry for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 30 Apr 2023 07:00:00 -0000</pubDate>
      <itunes:title>Perry Carpenter: Turning composition into computing. [Strategy] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>147</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4 and host of the 8th Layer Insights podcast, sits down to share his story trying different paths, before ultimately switching over to the cyber industry. After trying to go down the paths of music and law and finding neither were what he wanted to do, he decided to take an internship to get more into computer programming. That led him to getting his first job. After his first job, he moved onto other big name companies like Walmart, Alltel, and Gartner, and landing finally with KnowBe4. He compares his work to working with music, when he initially wanted to begin making music early in his career. He says "I think for me, when it was the kind of the connection between music and computing is that whenever you're kind of joining things together or at a, a musical scale to make chords, or whenever you're adding different, um, instruments and octaves together or timbers together to get some kind of bigger result." We thank Perry for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Perry Carpenter, Chief Evangelist and Strategy Officer at KnowBe4 and host of the 8th Layer Insights podcast, sits down to share his story trying different paths, before ultimately switching over to the cyber industry. After trying to go down the paths of music and law and finding neither were what he wanted to do, he decided to take an internship to get more into computer programming. That led him to getting his first job. After his first job, he moved onto other big name companies like Walmart, Alltel, and Gartner, and landing finally with KnowBe4. He compares his work to working with music, when he initially wanted to begin making music early in his career. He says "I think for me, when it was the kind of the connection between music and computing is that whenever you're kind of joining things together or at a, a musical scale to make chords, or whenever you're adding different, um, instruments and octaves together or timbers together to get some kind of bigger result." We thank Perry for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>532</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[74295aa2-e527-11ed-8a90-cb365cdcf944]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6643156105.mp3?updated=1682528909" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>HinataBot focuses on DDoS attack. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/279/notes</link>
      <description>This week our guests are, Larry Cashdollar, Chad Seaman and Allen West from Akamai Technologies, and they are discussing their research on "Uncovering HinataBot: A Deep Dive into a Go-Based Threat." The team discovered a new Go-based, DDoS-focused botnet. They found it was named after the popular anime show "Naruto," they are calling it "HinataBot"
In the research it says "HinataBot was seen being distributed during the first three months of 2023 and is actively being updated by the authors/operators." Akamai was able to get a deep look into the malware works by using a combination of reverse engineering the malware and imitating the command and control (C2) server.
The research can be found here:
Uncovering HinataBot: A Deep Dive into a Go-Based Threat

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 Apr 2023 07:00:00 -0000</pubDate>
      <itunes:title>HinataBot focuses on DDoS attack. [Research Saturday] </itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>279</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This week our guests are, Larry Cashdollar, Chad Seaman and Allen West from Akamai Technologies, and they are discussing their research on "Uncovering HinataBot: A Deep Dive into a Go-Based Threat." The team discovered a new Go-based, DDoS-focused botnet. They found it was named after the popular anime show "Naruto," they are calling it "HinataBot"
In the research it says "HinataBot was seen being distributed during the first three months of 2023 and is actively being updated by the authors/operators." Akamai was able to get a deep look into the malware works by using a combination of reverse engineering the malware and imitating the command and control (C2) server.
The research can be found here:
Uncovering HinataBot: A Deep Dive into a Go-Based Threat

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week our guests are, Larry Cashdollar, Chad Seaman and Allen West from Akamai Technologies, and they are discussing their research on "Uncovering HinataBot: A Deep Dive into a Go-Based Threat." The team discovered a new Go-based, DDoS-focused botnet. They found it was named after the popular anime show "Naruto," they are calling it "HinataBot"</p><p>In the research it says "HinataBot was seen being distributed during the first three months of 2023 and is actively being updated by the authors/operators." Akamai was able to get a deep look into the malware works by using a combination of reverse engineering the malware and imitating the command and control (C2) server.</p><p>The research can be found here:</p><ul><li><a href="https://www.akamai.com/blog/security-research/hinatabot-uncovering-new-golang-ddos-botnet">Uncovering HinataBot: A Deep Dive into a Go-Based Threat</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1646</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[96cb0290-e527-11ed-ad23-c3da93bce164]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4413884011.mp3?updated=1685127564" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What’s now being traded in the C2C markets. CISA would like comments on its software self-attestation form. And in Russia’s hybrid war, are there cyber war crimes, or real hacktivists? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1812/notes</link>
      <description>Cl0p and LockBit exploit PaperCut vulnerability in ransomware campaigns. Infostealer traded in the C2C market. All ads are trying to get your money, but some just take it. CISA requests comment on software self-attestation form. Our guest is Marcin Kleczynski, CEO of Malwarebytes, sharing thoughts on the current threat landscape, attacks on students and academic institutions. Betsy Carmelite from Booz Allen, discussing themes from the RSAC tied into critical infrastructure resilience. Ukraine argues that cyberattacks against civilian infrastructure should be classified as war crimes. And are there any genuine disinterested hacktivists on Russia's side, or are they all fronts?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/82

Selected reading.
Microsoft Confirms PaperCut Servers Used to Deliver LockBit and Cl0p Ransomware (The Hacker News)
Microsoft: Clop and LockBit ransomware behind PaperCut server hacks (BleepingComputer) ​
New 'Atomic macOS Stealer' Malware Offered for $1,000 Per Month (SecurityWeek) 
“Malverposting” — With Over 500K Estimated Infections, Facebook Ads Fuel This Evolving Stealer… (Guardio)
Request for Comment on Secure Software Self-Attestation Common Form (CISA)
OMB, CISA set to release common form for software self-attestation (FCW)
Pro-Russian hacktivism isn’t real, top Ukrainian cyber official says (CyberScoop)
Pro-Russian hacktivism isn't real, top Ukrainian cyber official says (CyberScoop) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 28 Apr 2023 20:15:00 -0000</pubDate>
      <itunes:title>What’s now being traded in the C2C markets. CISA would like comments on its software self-attestation form. And in Russia’s hybrid war, are there cyber war crimes, or real hacktivists? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1812</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cl0p and LockBit exploit PaperCut vulnerability in ransomware campaigns. Infostealer traded in the C2C market. All ads are trying to get your money, but some just take it. CISA requests comment on software self-attestation form. Our guest is Marcin Kleczynski, CEO of Malwarebytes, sharing thoughts on the current threat landscape, attacks on students and academic institutions. Betsy Carmelite from Booz Allen, discussing themes from the RSAC tied into critical infrastructure resilience. Ukraine argues that cyberattacks against civilian infrastructure should be classified as war crimes. And are there any genuine disinterested hacktivists on Russia's side, or are they all fronts?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/82

Selected reading.
Microsoft Confirms PaperCut Servers Used to Deliver LockBit and Cl0p Ransomware (The Hacker News)
Microsoft: Clop and LockBit ransomware behind PaperCut server hacks (BleepingComputer) ​
New 'Atomic macOS Stealer' Malware Offered for $1,000 Per Month (SecurityWeek) 
“Malverposting” — With Over 500K Estimated Infections, Facebook Ads Fuel This Evolving Stealer… (Guardio)
Request for Comment on Secure Software Self-Attestation Common Form (CISA)
OMB, CISA set to release common form for software self-attestation (FCW)
Pro-Russian hacktivism isn’t real, top Ukrainian cyber official says (CyberScoop)
Pro-Russian hacktivism isn't real, top Ukrainian cyber official says (CyberScoop) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cl0p and LockBit exploit PaperCut vulnerability in ransomware campaigns. Infostealer traded in the C2C market. All ads are trying to get your money, but some just take it. CISA requests comment on software self-attestation form. Our guest is Marcin Kleczynski, CEO of Malwarebytes, sharing thoughts on the current threat landscape, attacks on students and academic institutions. Betsy Carmelite from Booz Allen, discussing themes from the RSAC tied into critical infrastructure resilience. Ukraine argues that cyberattacks against civilian infrastructure should be classified as war crimes. And are there any genuine disinterested hacktivists on Russia's side, or are they all fronts?</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/82</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thehackernews.com/2023/04/microsoft-confirms-papercut-servers.html">Microsoft Confirms PaperCut Servers Used to Deliver LockBit and Cl0p Ransomware</a> (The Hacker News)</p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-clop-and-lockbit-ransomware-behind-papercut-server-hacks/">Microsoft: Clop and LockBit ransomware behind PaperCut server hacks</a> (BleepingComputer) ​</p><p><a href="https://www.securityweek.com/new-atomic-macos-stealer-malware-offered-for-1000-per-month/">New 'Atomic macOS Stealer' Malware Offered for $1,000 Per Month</a> (SecurityWeek) </p><p><a href="https://labs.guard.io/malverposting-with-over-500k-estimated-infections-facebook-ads-fuel-this-evolving-stealer-54b03d24b349">“Malverposting” — With Over 500K Estimated Infections, Facebook Ads Fuel This Evolving Stealer…</a> (Guardio)</p><p><a href="https://www.cisa.gov/secure-software-attestation-form">Request for Comment on Secure Software Self-Attestation Common Form</a> (CISA)</p><p><a href="https://fcw.com/security/2023/04/omb-cisa-set-release-common-form-software-self-attestation/385613/">OMB, CISA set to release common form for software self-attestation</a> (FCW)</p><p><a href="https://cyberscoop.com/pro-russia-hacktivism-ukraine/">Pro-Russian hacktivism isn’t real, top Ukrainian cyber official says</a> (CyberScoop)</p><p><a href="https://cyberscoop.com/pro-russia-hacktivism-ukraine/">Pro-Russian hacktivism isn't real, top Ukrainian cyber official says</a> (CyberScoop) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1733</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2fe9dde0-8167-11ed-9779-834ce3203d6b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2714802690.mp3?updated=1690332332" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Waging lawfare against criminal infrastructure. Notes from the cyber underworld. Hybrid war, and cyber ops across the spectrum of conflict. And what do the bots want? (Hint: kicks.) </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1811/notes</link>
      <description>Google targets CryptBot malware infrastructure. FIN7 attacked Veeam servers to steal credentials. Ransomware-as-a-service offering threatens Linux systems. Evasive Panda targets NGOs in China. Anonymous Sudan is active against targets in Israel. Russian ransomware operations aim at disrupting supply chains into Ukraine. Our guest is Stuart McClure, CEO of Qwiet AI. Microsoft’s Ann Johnson stops by with her take on the RSA conference. And bots want new kicks.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/81

Selected reading.
Continuing our work to hold cybercriminal ecosystems accountable (Google)
Google Disrupts Massive CryptBot Malware Operation (Decipher)
Google disrupts malware that steals sensitive data from Chrome users (TechCrunch) 
FIN7 Hackers Caught Exploiting Recent Veeam Vulnerability (SecurityWeek)
RTM Locker Ransomware as a Service (RaaS) Now on Linux (Uptycs) 
Evasive Panda APT group delivers malware via updates for popular Chinese software (WeLiveSecurity) 
NSA sees 'significant' Russian intel gathering on European, U.S. supply chain entities (CyberScoop) 
Ukraine at D+427: Russian cyberattacks and disinformation before Ukraine's spring offensive. (CyberWire)
Releasing leak suspect a national security risk, feds say (AP NEWS)
Pentagon leak suspect may still have access to classified info, court filings allege (the Guardian) 
Netacea Quarterly Index: Top 5 Scalper Bot Targets of Q1 2023 (Netacea)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 27 Apr 2023 20:30:00 -0000</pubDate>
      <itunes:title>Waging lawfare against criminal infrastructure. Notes from the cyber underworld. Hybrid war, and cyber ops across the spectrum of conflict. And what do the bots want? (Hint: kicks.) </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1811</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Google targets CryptBot malware infrastructure. FIN7 attacked Veeam servers to steal credentials. Ransomware-as-a-service offering threatens Linux systems. Evasive Panda targets NGOs in China. Anonymous Sudan is active against targets in Israel. Russian ransomware operations aim at disrupting supply chains into Ukraine. Our guest is Stuart McClure, CEO of Qwiet AI. Microsoft’s Ann Johnson stops by with her take on the RSA conference. And bots want new kicks.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/81

Selected reading.
Continuing our work to hold cybercriminal ecosystems accountable (Google)
Google Disrupts Massive CryptBot Malware Operation (Decipher)
Google disrupts malware that steals sensitive data from Chrome users (TechCrunch) 
FIN7 Hackers Caught Exploiting Recent Veeam Vulnerability (SecurityWeek)
RTM Locker Ransomware as a Service (RaaS) Now on Linux (Uptycs) 
Evasive Panda APT group delivers malware via updates for popular Chinese software (WeLiveSecurity) 
NSA sees 'significant' Russian intel gathering on European, U.S. supply chain entities (CyberScoop) 
Ukraine at D+427: Russian cyberattacks and disinformation before Ukraine's spring offensive. (CyberWire)
Releasing leak suspect a national security risk, feds say (AP NEWS)
Pentagon leak suspect may still have access to classified info, court filings allege (the Guardian) 
Netacea Quarterly Index: Top 5 Scalper Bot Targets of Q1 2023 (Netacea)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Google targets CryptBot malware infrastructure. FIN7 attacked Veeam servers to steal credentials. Ransomware-as-a-service offering threatens Linux systems. Evasive Panda targets NGOs in China. Anonymous Sudan is active against targets in Israel. Russian ransomware operations aim at disrupting supply chains into Ukraine. Our guest is Stuart McClure, CEO of Qwiet AI. Microsoft’s Ann Johnson stops by with her take on the RSA conference. And bots want new kicks.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/81</p><p><br></p><h2>Selected reading.</h2><p><a href="https://blog.google/technology/safety-security/continuing-our-work-to-hold-cybercriminal-ecosystems-accountable/">Continuing our work to hold cybercriminal ecosystems accountable</a> (Google)</p><p><a href="https://duo.com/decipher/google-disrupts-massive-cryptbot-malware-operation">Google Disrupts Massive CryptBot Malware Operation</a> (Decipher)</p><p><a href="https://techcrunch.com/2023/04/26/google-disrupts-malware-that-steals-sensitive-data-from-chrome-users/">Google disrupts malware that steals sensitive data from Chrome users</a> (TechCrunch) </p><p><a href="https://www.securityweek.com/fin7-hackers-caught-exploiting-recent-veeam-vulnerability/">FIN7 Hackers Caught Exploiting Recent Veeam Vulnerability</a> (SecurityWeek)</p><p><a href="https://www.uptycs.com/blog/rtm-locker-ransomware-as-a-service-raas-linux">RTM Locker Ransomware as a Service (RaaS) Now on Linux</a> (Uptycs) </p><p><a href="https://www.welivesecurity.com/2023/04/26/evasive-panda-apt-group-malware-updates-popular-chinese-software/">Evasive Panda APT group delivers malware via updates for popular Chinese software</a> (WeLiveSecurity) </p><p><a href="https://cyberscoop.com/nsa-russian-ukraine-supply-chain-ransomware/">NSA sees 'significant' Russian intel gathering on European, U.S. supply chain entities</a> (CyberScoop) </p><p><a href="https://thecyberwire.com/stories/5928f4b47ca643929516331e6638596b/ukraine-at-d427--russian-cyberattacks-and-disinformation-before-ukraines-spring-offensive">Ukraine at D+427: Russian cyberattacks and disinformation before Ukraine's spring offensive.</a> (CyberWire)</p><p><a href="https://apnews.com/article/leaked-documents-air-national-guardsman-jack-teixeira-d7c8dbaeb3b7a5ae69faeab04ede2ab0">Releasing leak suspect a national security risk, feds say</a> (AP NEWS)</p><p><a href="https://www.theguardian.com/us-news/2023/apr/27/pentagon-leak-suspect-may-still-have-access-to-classified-info-court-filings-allege">Pentagon leak suspect may still have access to classified info, court filings allege</a> (the Guardian) </p><p><a href="https://netacea.com/research-and-reports/top-5-scalper-bot-targets-q1-2023/">Netacea Quarterly Index: Top 5 Scalper Bot Targets of Q1 2023</a> (Netacea)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1716</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2f104f9e-8167-11ed-9779-ef5688a79f97]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8737254856.mp3?updated=1690332316" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BellaCiao from Tehran; PingPull from Beijing: two cyberespionage tools. SLP exploitation. Ransomware as an international threat. The state of hacktivism. Digital evidence or war crimes. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1810/notes</link>
      <description>BellaCiao is malware from Iran's IRGC, while PingPull is malware used by the Chinese government affiliated Tarus Group. Ransomware continues to be a pervasive international threat. An overview of hacktivism. Our guest is CyberMindz founder Peter Coroneos, discussing the importance of mental health in cybersecurity. Johannes Ullrich shares insights from his RSAC panel discussions. And Ukraine continues to collect evidence of Russian war crimes.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/80

Selected reading.
Unpacking BellaCiao: A Closer Look at Iran’s Latest Malware (Bitdefender Blog)
Chinese Alloy Taurus Updates PingPull Malware (Unit 42)
Abuse of the Service Location Protocol May Lead to DoS Attacks (Cybersecurity and Infrastructure Security Agency CISA)
#RSAC: Ransomware Poses Growing Threat to Five Eyes Nations (Infosecurity Magazine)
Hacktivism Unveiled, April 2023 Insights into the footprints of hacktivists (Radware)
FBI aiding Ukraine in collection of digital and physical war crime evidence (CyberScoop)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 26 Apr 2023 20:55:00 -0000</pubDate>
      <itunes:title>BellaCiao from Tehran; PingPull from Beijing: two cyberespionage tools. SLP exploitation. Ransomware as an international threat. The state of hacktivism. Digital evidence or war crimes. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1810</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>BellaCiao is malware from Iran's IRGC, while PingPull is malware used by the Chinese government affiliated Tarus Group. Ransomware continues to be a pervasive international threat. An overview of hacktivism. Our guest is CyberMindz founder Peter Coroneos, discussing the importance of mental health in cybersecurity. Johannes Ullrich shares insights from his RSAC panel discussions. And Ukraine continues to collect evidence of Russian war crimes.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/80

Selected reading.
Unpacking BellaCiao: A Closer Look at Iran’s Latest Malware (Bitdefender Blog)
Chinese Alloy Taurus Updates PingPull Malware (Unit 42)
Abuse of the Service Location Protocol May Lead to DoS Attacks (Cybersecurity and Infrastructure Security Agency CISA)
#RSAC: Ransomware Poses Growing Threat to Five Eyes Nations (Infosecurity Magazine)
Hacktivism Unveiled, April 2023 Insights into the footprints of hacktivists (Radware)
FBI aiding Ukraine in collection of digital and physical war crime evidence (CyberScoop)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>BellaCiao is malware from Iran's IRGC, while PingPull is malware used by the Chinese government affiliated Tarus Group. Ransomware continues to be a pervasive international threat. An overview of hacktivism. Our guest is CyberMindz founder Peter Coroneos, discussing the importance of mental health in cybersecurity. Johannes Ullrich shares insights from his RSAC panel discussions. And Ukraine continues to collect evidence of Russian war crimes.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/80</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bitdefender.com/blog/businessinsights/unpacking-bellaciao-a-closer-look-at-irans-latest-malware/">Unpacking BellaCiao: A Closer Look at Iran’s Latest Malware</a> (Bitdefender Blog)</p><p><a href="https://unit42.paloaltonetworks.com/alloy-taurus/">Chinese Alloy Taurus Updates PingPull Malware</a> (Unit 42)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/04/25/abuse-service-location-protocol-may-lead-dos-attacks">Abuse of the Service Location Protocol May Lead to DoS Attacks</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.infosecurity-magazine.com/news/ransomware-threat-five-eyes/">#RSAC: Ransomware Poses Growing Threat to Five Eyes Nations</a> (Infosecurity Magazine)</p><p><a href="https://www.radware.com/security/threat-advisories-and-attack-reports/hacktivism-unveiled-april-2023/">Hacktivism Unveiled, April 2023 Insights into the footprints of hacktivists</a> (Radware)</p><p><a href="https://cyberscoop.com/fbi-ukraine-cyber-war-crime/">FBI aiding Ukraine in collection of digital and physical war crime evidence</a> (CyberScoop)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1753</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2ef39f02-8167-11ed-9779-d748f8773ebf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3381700131.mp3?updated=1690332303" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BlackCat follows Cl0p to GoAnywhere. Mirai gets an upgrade. Deterring cyber war. Homeland Secrity’s cyber priorities. Action against DPRK cryptocrooks. What KillNet’s up to. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1809/notes</link>
      <description>BlackCat (ALPHV) follows Cl0p, exploiting the GoAnywhere MFA vulnerability. The Mirai botnet exploits a vulnerability disclosed at Pwn2Own. An RSAC presentation describes US response to Russian prewar and wartime cyber operations. The US Department of Homeland Security outlines cyber priorities. Andrea Little Limbago from Interos shares insights from her RSAC 2023 panels. US indicts, sanctions DPRK operators in crypto-laundering campaign. Our guest is Marc van Zadelhoff, CEO of Devo, with insights from the conference. And the latest on KillNet.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/79

Selected reading.
BlackCat Ransomware Group Exploits GoAnywhere Vulnerability (At-Bay) 
Zero Day Initiative — TP-Link WAN-side Vulnerability CVE-2023-1389 Added to the Mirai Botnet Arsenal (Zero Day Initiative)
Years after discovery of SolarWinds breach, Russian hackers could be struggling (Washington Post) 
U.S. deploys more cyber forces abroad to help fight hackers (Reuters)
DHS Outlines Cyber Priorities in Release of Delayed Review (Nextgov.com) 
US sanctions supporters of North Korean hackers, Iranian cyberspace head (Record) 
North Korean Foreign Trade Bank Rep Charged for Role in Two Crypto Laundering Conspiracies (Department of Justice. U.S. Attorney's Office District of Columbia) 
Treasury Targets Actors Facilitating Illicit DPRK Financial Activity in Support of Weapons Programs (U.S. Department of the Treasury)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Apr 2023 20:50:00 -0000</pubDate>
      <itunes:title>BlackCat follows Cl0p to GoAnywhere. Mirai gets an upgrade. Deterring cyber war. Homeland Secrity’s cyber priorities. Action against DPRK cryptocrooks. What KillNet’s up to. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1809</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>BlackCat (ALPHV) follows Cl0p, exploiting the GoAnywhere MFA vulnerability. The Mirai botnet exploits a vulnerability disclosed at Pwn2Own. An RSAC presentation describes US response to Russian prewar and wartime cyber operations. The US Department of Homeland Security outlines cyber priorities. Andrea Little Limbago from Interos shares insights from her RSAC 2023 panels. US indicts, sanctions DPRK operators in crypto-laundering campaign. Our guest is Marc van Zadelhoff, CEO of Devo, with insights from the conference. And the latest on KillNet.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/79

Selected reading.
BlackCat Ransomware Group Exploits GoAnywhere Vulnerability (At-Bay) 
Zero Day Initiative — TP-Link WAN-side Vulnerability CVE-2023-1389 Added to the Mirai Botnet Arsenal (Zero Day Initiative)
Years after discovery of SolarWinds breach, Russian hackers could be struggling (Washington Post) 
U.S. deploys more cyber forces abroad to help fight hackers (Reuters)
DHS Outlines Cyber Priorities in Release of Delayed Review (Nextgov.com) 
US sanctions supporters of North Korean hackers, Iranian cyberspace head (Record) 
North Korean Foreign Trade Bank Rep Charged for Role in Two Crypto Laundering Conspiracies (Department of Justice. U.S. Attorney's Office District of Columbia) 
Treasury Targets Actors Facilitating Illicit DPRK Financial Activity in Support of Weapons Programs (U.S. Department of the Treasury)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>BlackCat (ALPHV) follows Cl0p, exploiting the GoAnywhere MFA vulnerability. The Mirai botnet exploits a vulnerability disclosed at Pwn2Own. An RSAC presentation describes US response to Russian prewar and wartime cyber operations. The US Department of Homeland Security outlines cyber priorities. Andrea Little Limbago from Interos shares insights from her RSAC 2023 panels. US indicts, sanctions DPRK operators in crypto-laundering campaign. Our guest is Marc van Zadelhoff, CEO of Devo, with insights from the conference. And the latest on KillNet.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/79</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.at-bay.com/articles/blackcat-ransomware-group-exploits-goanywhere-vulnerability/">BlackCat Ransomware Group Exploits GoAnywhere Vulnerability</a> (At-Bay) </p><p><a href="https://www.zerodayinitiative.com/blog/2023/4/21/tp-link-wan-side-vulnerability-cve-2023-1389-added-to-the-mirai-botnet-arsenal">Zero Day Initiative — TP-Link WAN-side Vulnerability CVE-2023-1389 Added to the Mirai Botnet Arsenal</a> (Zero Day Initiative)</p><p><a href="https://www.washingtonpost.com/politics/2023/04/25/years-after-discovery-solarwinds-breach-russian-hackers-could-be-struggling/">Years after discovery of SolarWinds breach, Russian hackers could be struggling</a> (Washington Post) </p><p><a href="https://www.reuters.com/technology/us-deploys-more-cyber-forces-abroad-help-fight-hackers-2023-04-25/">U.S. deploys more cyber forces abroad to help fight hackers</a> (Reuters)</p><p><a href="https://www.nextgov.com/emerging-tech/2023/04/dhs-outlines-cyber-priorities-release-delayed-review/385557/">DHS Outlines Cyber Priorities in Release of Delayed Review </a>(Nextgov.com) </p><p><a href="https://therecord.media/money-laundering-indictments-sanctions-north-korea-iran">US sanctions supporters of North Korean hackers, Iranian cyberspace head</a> (Record) </p><p><a href="https://www.justice.gov/usao-dc/pr/north-korean-foreign-trade-bank-rep-charged-role-two-crypto-laundering-conspiracies">North Korean Foreign Trade Bank Rep Charged for Role in Two Crypto Laundering Conspiracies</a> (Department of Justice. U.S. Attorney's Office District of Columbia) </p><p><a href="https://home.treasury.gov/news/press-releases/jy1435">Treasury Targets Actors Facilitating Illicit DPRK Financial Activity in Support of Weapons Programs</a> (U.S. Department of the Treasury)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1884</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2e3e311c-8167-11ed-9779-17d3a5e4d381]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9720749683.mp3?updated=1690332286" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Supply-chain attack's effects spread. CISA makes new KEV entries. Bumblebee malware loader describes. Decoy Dog toolset discovered. Discord Papers were shared earlier and more widely.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1808/notes</link>
      <description>3CX is not the only victim in the recent supply chain attack. The PaperCut critical vulnerability is under active exploitation. The Bumblebee malware loader is buzzing around in the wild. A new unique malware toolkit called Decoy Dog. Rick Howard, CSO from N2K Networks, shares RSA Conference predictions and talks about his new book, "Cybersecurity First Principles." Our guest Theresa Lanowitz from AT&amp;T Cybersecurity shares insights on Securing the Edge. And the alleged Discord Papers leaker shared earlier and more widely than previously known.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/78

Selected reading.
3CX Hackers Also Compromised Critical Infrastructure Firms (Infosecurity Magazine)
That 3CX supply chain attack keeps getting worse (Register)
Energy sector orgs in US, Europe hit by same supply chain attack as 3CX (Record) 
Even more victims found in complex 3CX supply chain attack (CybersecurityConnect) 
X_Trader Supply Chain Attack Affects Critical Infrastructure Organizations in U.S. and Europe (Symantec Enterprise Blogs) 
URGENT | PaperCut MF/NG vulnerability bulletin (March 2023) (PaperCut)
PaperCut CVE-2023-27350 Deep Dive and Indicators of Compromise (Horizon3.ai) 
Russian Hackers Suspected in Ongoing Exploitation of Unpatched PaperCut Servers (The Hacker News) 
CISA KEV Breakdown | April 21, 2023 (Nucleus Security)
CISA Adds Three Known Exploited Vulnerabilities to Catalog (Cybersecurity and Infrastructure Security Agency CISA)
CISA Adds 3 Actively Exploited Flaws to KEV Catalog, including Critical PaperCut Bug (The Hacker News) 
CISA adds printer bug, Chrome zero-day and ChatGPT issue to exploited vulnerabilities catalog (Record)
Bumblebee Malware Distributed Via Trojanized Installer Downloads (Secureworks).
Google ads push BumbleBee malware used by ransomware gangs (BleepingComputer) 
Bumblebee malware infects victims via fake Zoom, Cisco and ChatGPT software installers (Record) 
Decoy Dog malware toolkit found after analyzing 70 billion DNS queries (BleepingComputer) 
Analyzing DNS Traffic for Anomalous Domains and Threat Detection (Infoblox Blog) 
Airman Shared Sensitive Intelligence More Widely and for Longer Than Previously Known (New York Times) 
FBI leak investigators home in on members of private Discord server (Washington Post)
From Discord to 4chan: The Improbable Journey of a US Intelligence Leak (bellingcat) 
Europe’s Planes Keep Flying Despite Cyberattack (Wall Street Journal)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 24 Apr 2023 20:45:00 -0000</pubDate>
      <itunes:title>Supply-chain attack's effects spread. CISA makes new KEV entries. Bumblebee malware loader describes. Decoy Dog toolset discovered. Discord Papers were shared earlier and more widely.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1808</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>3CX is not the only victim in the recent supply chain attack. The PaperCut critical vulnerability is under active exploitation. The Bumblebee malware loader is buzzing around in the wild. A new unique malware toolkit called Decoy Dog. Rick Howard, CSO from N2K Networks, shares RSA Conference predictions and talks about his new book, "Cybersecurity First Principles." Our guest Theresa Lanowitz from AT&amp;T Cybersecurity shares insights on Securing the Edge. And the alleged Discord Papers leaker shared earlier and more widely than previously known.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/78

Selected reading.
3CX Hackers Also Compromised Critical Infrastructure Firms (Infosecurity Magazine)
That 3CX supply chain attack keeps getting worse (Register)
Energy sector orgs in US, Europe hit by same supply chain attack as 3CX (Record) 
Even more victims found in complex 3CX supply chain attack (CybersecurityConnect) 
X_Trader Supply Chain Attack Affects Critical Infrastructure Organizations in U.S. and Europe (Symantec Enterprise Blogs) 
URGENT | PaperCut MF/NG vulnerability bulletin (March 2023) (PaperCut)
PaperCut CVE-2023-27350 Deep Dive and Indicators of Compromise (Horizon3.ai) 
Russian Hackers Suspected in Ongoing Exploitation of Unpatched PaperCut Servers (The Hacker News) 
CISA KEV Breakdown | April 21, 2023 (Nucleus Security)
CISA Adds Three Known Exploited Vulnerabilities to Catalog (Cybersecurity and Infrastructure Security Agency CISA)
CISA Adds 3 Actively Exploited Flaws to KEV Catalog, including Critical PaperCut Bug (The Hacker News) 
CISA adds printer bug, Chrome zero-day and ChatGPT issue to exploited vulnerabilities catalog (Record)
Bumblebee Malware Distributed Via Trojanized Installer Downloads (Secureworks).
Google ads push BumbleBee malware used by ransomware gangs (BleepingComputer) 
Bumblebee malware infects victims via fake Zoom, Cisco and ChatGPT software installers (Record) 
Decoy Dog malware toolkit found after analyzing 70 billion DNS queries (BleepingComputer) 
Analyzing DNS Traffic for Anomalous Domains and Threat Detection (Infoblox Blog) 
Airman Shared Sensitive Intelligence More Widely and for Longer Than Previously Known (New York Times) 
FBI leak investigators home in on members of private Discord server (Washington Post)
From Discord to 4chan: The Improbable Journey of a US Intelligence Leak (bellingcat) 
Europe’s Planes Keep Flying Despite Cyberattack (Wall Street Journal)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>3CX is not the only victim in the recent supply chain attack. The PaperCut critical vulnerability is under active exploitation. The Bumblebee malware loader is buzzing around in the wild. A new unique malware toolkit called Decoy Dog. Rick Howard, CSO from N2K Networks, shares RSA Conference predictions and talks about his new book, "Cybersecurity First Principles." Our guest Theresa Lanowitz from AT&amp;T Cybersecurity shares insights on Securing the Edge. And the alleged Discord Papers leaker shared earlier and more widely than previously known.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/78</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.infosecurity-magazine.com/news/3cx-hackers-compromised-critical/">3CX Hackers Also Compromised Critical Infrastructure Firms</a> (Infosecurity Magazine)</p><p><a href="https://www.theregister.com/2023/04/24/in_brief_security/">That 3CX supply chain attack keeps getting worse</a> (Register)</p><p><a href="https://therecord.media/energy-sector-orgs-in-us-europe-3cx">Energy sector orgs in US, Europe hit by same supply chain attack as 3CX</a> (Record) </p><p><a href="https://www.cybersecurityconnect.com.au/commercial/8964-even-more-victims-found-in-complex-3cx-supply-chain-attack">Even more victims found in complex 3CX supply chain attack</a> (CybersecurityConnect) </p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/">X_Trader Supply Chain Attack Affects Critical Infrastructure Organizations in U.S. and Europe</a> (Symantec Enterprise Blogs) </p><p><a href="https://www.papercut.com/kb/Main/PO-1216-and-PO-1219">URGENT | PaperCut MF/NG vulnerability bulletin (March 2023)</a> (PaperCut)</p><p><a href="https://www.horizon3.ai/papercut-cve-2023-27350-deep-dive-and-indicators-of-compromise/">PaperCut CVE-2023-27350 Deep Dive and Indicators of Compromise</a> (Horizon3.ai) </p><p><a href="https://thehackernews.com/2023/04/russian-hackers-suspected-in-ongoing.html">Russian Hackers Suspected in Ongoing Exploitation of Unpatched PaperCut Servers</a> (The Hacker News) </p><p><a href="https://nucleussec.com/blog/april-21-2023-cisa-kev-breakdown-papercut-google-minio/">CISA KEV Breakdown | April 21, 2023</a> (Nucleus Security)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/04/21/cisa-adds-three-known-exploited-vulnerabilities-catalog">CISA Adds Three Known Exploited Vulnerabilities to Catalog</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://thehackernews.com/2023/04/cisa-adds-3-actively-exploited-flaws-to.html">CISA Adds 3 Actively Exploited Flaws to KEV Catalog, including Critical PaperCut Bug</a> (The Hacker News) </p><p><a href="https://therecord.media/cisa-adds-printer-bug-and-chrome-zero-day-to-catalogue">CISA adds printer bug, Chrome zero-day and ChatGPT issue to exploited vulnerabilities catalog</a> (Record)</p><p><a href="https://www.secureworks.com/blog/bumblebee-malware-distributed-via-trojanized-installer-downloads">Bumblebee Malware Distributed Via Trojanized Installer Downloads</a> (Secureworks).</p><p><a href="https://www.bleepingcomputer.com/news/security/google-ads-push-bumblebee-malware-used-by-ransomware-gangs/">Google ads push BumbleBee malware used by ransomware gangs</a> (BleepingComputer) </p><p><a href="https://therecord.media/bumblebee-malware-uses-fake-chatgpt-zoom-installers">Bumblebee malware infects victims via fake Zoom, Cisco and ChatGPT software installers</a> (Record) </p><p><a href="https://www.bleepingcomputer.com/news/security/decoy-dog-malware-toolkit-found-after-analyzing-70-billion-dns-queries/">Decoy Dog malware toolkit found after analyzing 70 billion DNS queries</a> (BleepingComputer) </p><p><a href="https://blogs.infoblox.com/cyber-threat-intelligence/cyber-threat-advisory/dog-hunt-finding-decoy-dog-toolkit-via-anomalous-dns-traffic/">Analyzing DNS Traffic for Anomalous Domains and Threat Detection</a> (Infoblox Blog) </p><p><a href="https://www.nytimes.com/2023/04/21/us/politics/jack-teixeira-leaks-russia-ukraine.html">Airman Shared Sensitive Intelligence More Widely and for Longer Than Previously Known</a> (New York Times) </p><p><a href="https://www.washingtonpost.com/national-security/2023/04/21/discord-leak-fbi-investigation/">FBI leak investigators home in on members of private Discord server</a> (Washington Post)</p><p><a href="https://www.bellingcat.com/news/2023/04/09/from-discord-to-4chan-the-improbable-journey-of-a-us-defence-leak/">From Discord to 4chan: The Improbable Journey of a US Intelligence Leak</a> (bellingcat) </p><p><a href="https://www.wsj.com/articles/russian-cyberattack-continues-to-affect-europes-air-traffic-control-7fa30296?">Europe’s Planes Keep Flying Despite Cyberattack</a> (Wall Street Journal)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1628</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2e252d70-8167-11ed-9779-0b592a14872e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7207066054.mp3?updated=1690332264" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Master Gunnery Sergeant Scott Stalker from US Space Command: goals and risks in the digital space operating environment.</title>
      <link>https://space.n2k.com/podcasts/t-minus/16</link>
      <description>T-Minus Deep Space Guest
Scott Stalker, Command Senior Enlisted Leader at US Space Command, shares how the combatant command is adapting to new challenges in the digital era of space operations, new operational concepts, and building the force to deter aggression.
You can follow US Space Command on LinkedIn and Twitter, and you can follow MGySgt Scott Stalker on LinkedIn.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence briefing, Signals and Space, and you’ll never miss a beat.
Audience Survey
We want to hear from you! Please complete our wicked fast 4 question survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
Want to hear your company in the show?
You too can reach the most influential leaders in the industry. Here’s a link to our media kit. Contact us at space@n2k.com to request more info about sponsoring T-Minus.
Want to join us for an interview?
Please send your interview pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal, and our editor will get back to you for scheduling.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 23 Apr 2023 07:00:00 -0000</pubDate>
      <itunes:title>Master Gunnery Sergeant Scott Stalker from US Space Command: goals and risks in the digital space operating environment.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>16</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Scott Stalker, Command Senior Enlisted Leader at Space Command, shares how the combatant command is adapting to new challenges in the digital era of space operations, new operational concepts, and building the force to deter aggression.</itunes:subtitle>
      <itunes:summary>T-Minus Deep Space Guest
Scott Stalker, Command Senior Enlisted Leader at US Space Command, shares how the combatant command is adapting to new challenges in the digital era of space operations, new operational concepts, and building the force to deter aggression.
You can follow US Space Command on LinkedIn and Twitter, and you can follow MGySgt Scott Stalker on LinkedIn.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence briefing, Signals and Space, and you’ll never miss a beat.
Audience Survey
We want to hear from you! Please complete our wicked fast 4 question survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
Want to hear your company in the show?
You too can reach the most influential leaders in the industry. Here’s a link to our media kit. Contact us at space@n2k.com to request more info about sponsoring T-Minus.
Want to join us for an interview?
Please send your interview pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal, and our editor will get back to you for scheduling.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<h2>T-Minus Deep Space Guest</h2><p>Scott Stalker, Command Senior Enlisted Leader at <a href="https://www.spacecom.mil">US Space Command</a>, shares how the combatant command is adapting to new challenges in the digital era of space operations, new operational concepts, and building the force to deter aggression.</p><p>You can follow US Space Command on <a href="https://www.linkedin.com/company/usspacecom">LinkedIn</a> and <a href="https://twitter.com/US_SpaceCom">Twitter</a>, and you can follow MGySgt Scott Stalker on <a href="https://www.linkedin.com/in/scottstalker/">LinkedIn</a>.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our weekly intelligence briefing, <a href="https://space.n2k.com/newsletters/signals-and-space"><em>Signals and Space</em></a>, and you’ll never miss a beat<em>.</em></p><h2>Audience Survey</h2><p>We want to hear from you! Please complete our <a href="https://www.surveymonkey.com/r/BL5NFPW">wicked fast 4 question survey</a>. It’ll help us get better and deliver you the most mission-critical space intel every day.</p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders in the industry. Here’s a <a href="https://docsend.com/view/ung56qbvknfbj9z2">link to our media kit</a>. Contact us at <a href="mailto:space@n2k.com?subject=%22Sponsor%20inquiry%20for%20T-Minus%20podcast%22">space@n2k.com</a> to request more info about sponsoring T-Minus.</p><h2>Want to join us for an interview?</h2><p>Please send your interview pitch to <a href="mailto:space-editor@n2k.com">space-editor@n2k.com</a> and include your name, affiliation, and topic proposal, and our editor will get back to you for scheduling.</p><p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1358</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a801eb92-e076-11ed-969a-f75aaba78633]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3592837394.mp3?updated=1682110907" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Maria Varmazis: Combining cyber and space. [Space] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/146/notes</link>
      <description>Maria Varmazis, N2K's Space Correspondent and host of N2K's newest podcast T-Minus, sits down to share her journey on combining her two passions of space and cyber. Maria grew up wanting to be an astronomer, in school she focused on joining anything with technology and enjoyed the classes that made her think. After transferring to a new college, she went into journalism, absolutely falling in love with the new career path she had made for herself. She got herself a job at Sophos and that's where she learned about cybersecurity. Now she discusses cyber and space in her new podcast, combining her two passions into one for all to understand. Maria discusses some of the setbacks she overcame in this industry and shares the wise advice of "I would never pretend that failure isn't painful, but it is an incredible teaching tool. So if you feel like you've had a huge career fail or a really big misstep, you can still pivot from that and you can make that into something." We thank Maria for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 23 Apr 2023 07:00:00 -0000</pubDate>
      <itunes:title>Maria Varmazis: Combining cyber and space. [Space] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>146</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Maria Varmazis, N2K's Space Correspondent and host of N2K's newest podcast T-Minus, sits down to share her journey on combining her two passions of space and cyber. Maria grew up wanting to be an astronomer, in school she focused on joining anything with technology and enjoyed the classes that made her think. After transferring to a new college, she went into journalism, absolutely falling in love with the new career path she had made for herself. She got herself a job at Sophos and that's where she learned about cybersecurity. Now she discusses cyber and space in her new podcast, combining her two passions into one for all to understand. Maria discusses some of the setbacks she overcame in this industry and shares the wise advice of "I would never pretend that failure isn't painful, but it is an incredible teaching tool. So if you feel like you've had a huge career fail or a really big misstep, you can still pivot from that and you can make that into something." We thank Maria for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Maria Varmazis, N2K's Space Correspondent and host of N2K's newest podcast T-Minus, sits down to share her journey on combining her two passions of space and cyber. Maria grew up wanting to be an astronomer, in school she focused on joining anything with technology and enjoyed the classes that made her think. After transferring to a new college, she went into journalism, absolutely falling in love with the new career path she had made for herself. She got herself a job at Sophos and that's where she learned about cybersecurity. Now she discusses cyber and space in her new podcast, combining her two passions into one for all to understand. Maria discusses some of the setbacks she overcame in this industry and shares the wise advice of "I would never pretend that failure isn't painful, but it is an incredible teaching tool. So if you feel like you've had a huge career fail or a really big misstep, you can still pivot from that and you can make that into something." We thank Maria for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>436</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5327f3ee-e06e-11ed-8664-8b20031a1f06]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4260004253.mp3?updated=1682099956" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Don't let the Elon Musk crypto giveaway scam swindle you. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/278/notes</link>
      <description>Shiran Guez from Akamai sits down with Dave to discuss their research on "Chatbots, Celebrities, and Victim Retargeting and Why Crypto Giveaway Scams Are Still So Successful." Researchers at Akamai have been on the lookout for crypto giveaway scams. These scams have been impersonating celebrities and brands, most notably Elon Musk and his associated companies.
The research states "the scams are delivered through various social media platforms as well as direct messaging apps such as WhatsApp or Telegram." These scams have helped add to the existing damages that exceed $1 billion caused by crypto fraud.
The research can be found here:
Chatbots, Celebrities, and Victim Retargeting: Why Crypto Giveaway Scams Are Still So Successful

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Apr 2023 07:00:00 -0000</pubDate>
      <itunes:title>Don't let the Elon Musk crypto giveaway scam swindle you. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>278</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Shiran Guez from Akamai sits down with Dave to discuss their research on "Chatbots, Celebrities, and Victim Retargeting and Why Crypto Giveaway Scams Are Still So Successful." Researchers at Akamai have been on the lookout for crypto giveaway scams. These scams have been impersonating celebrities and brands, most notably Elon Musk and his associated companies.
The research states "the scams are delivered through various social media platforms as well as direct messaging apps such as WhatsApp or Telegram." These scams have helped add to the existing damages that exceed $1 billion caused by crypto fraud.
The research can be found here:
Chatbots, Celebrities, and Victim Retargeting: Why Crypto Giveaway Scams Are Still So Successful

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Shiran Guez from Akamai sits down with Dave to discuss their research on "Chatbots, Celebrities, and Victim Retargeting and Why Crypto Giveaway Scams Are Still So Successful." Researchers at Akamai have been on the lookout for crypto giveaway scams. These scams have been impersonating celebrities and brands, most notably Elon Musk and his associated companies.</p><p>The research states "the scams are delivered through various social media platforms as well as direct messaging apps such as WhatsApp or Telegram." These scams have helped add to the existing damages that exceed $1 billion caused by crypto fraud.</p><p>The research can be found here:</p><ul><li><a href="https://www.akamai.com/blog/security-research/crypto-giveaway-scams-are-still-successful">Chatbots, Celebrities, and Victim Retargeting: Why Crypto Giveaway Scams Are Still So Successful</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1162</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[66545bc4-e06e-11ed-bf9e-1b465e572eef]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2563600501.mp3?updated=1685127414" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daggerfly swarms African telco. EvilExtractor described. Patriotic hacktivism in East Asia. Updates on Russia's hybrid war suggest that cyber warfare has some distinctive challenges.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1807/notes</link>
      <description>Daggerfly APT targets an African telecommunications provider. EvilExtractor is an alleged teaching tool apparently gone bad. A Chinese speaking threat group is active against Taiwan and South Korea. Europe’s air traffic control is under attack. Cecilia Marinier from RSAC and Barmak Meftah, a judge of ISB, discuss the RSA innovation sandbox. Awais Rashid from University of Bristol on the cybersecurity of smart farming. Forget about those evil maids. What about these evil sys admins? 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/77

Selected reading.
Daggerfly: APT Actor Targets Telecoms Company in Africa (Symantec)
EvilExtractor – All-in-One Stealer (Fortinet Blog)
Chinese-language threat group targeted a dozen South Korean institutions (Record) 
Xiaoqiying/Genesis Day Threat Actor Group Targets South Korea, Taiwan (Recorded Future) 
WSJ News Exclusive | Europe’s Air-Traffic Agency Under Attack From Pro-Russian Hackers (Wall Street Journal) 
Intelligence Leaks Cast Spotlight on a Recurring Insider Threat: Tech Support (Wall Street Journal)
Russia’s invasion of Ukraine is also being fought in cyberspace (Atlantic Council) 
CFP European Cybersecurity Seminar 2023-2024 (European Cyber Conflict Research Initiative)
#CYBERUK23: Russian Cyber Offensive Exhibits ‘Unprecedented’ Speed and Agility (Infosecurity Magazine)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 21 Apr 2023 20:15:00 -0000</pubDate>
      <itunes:title>Daggerfly swarms African telco. EvilExtractor described. Patriotic hacktivism in East Asia. Updates on Russia's hybrid war suggest that cyber warfare has some distinctive challenges.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1807</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Daggerfly APT targets an African telecommunications provider. EvilExtractor is an alleged teaching tool apparently gone bad. A Chinese speaking threat group is active against Taiwan and South Korea. Europe’s air traffic control is under attack. Cecilia Marinier from RSAC and Barmak Meftah, a judge of ISB, discuss the RSA innovation sandbox. Awais Rashid from University of Bristol on the cybersecurity of smart farming. Forget about those evil maids. What about these evil sys admins? 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/77

Selected reading.
Daggerfly: APT Actor Targets Telecoms Company in Africa (Symantec)
EvilExtractor – All-in-One Stealer (Fortinet Blog)
Chinese-language threat group targeted a dozen South Korean institutions (Record) 
Xiaoqiying/Genesis Day Threat Actor Group Targets South Korea, Taiwan (Recorded Future) 
WSJ News Exclusive | Europe’s Air-Traffic Agency Under Attack From Pro-Russian Hackers (Wall Street Journal) 
Intelligence Leaks Cast Spotlight on a Recurring Insider Threat: Tech Support (Wall Street Journal)
Russia’s invasion of Ukraine is also being fought in cyberspace (Atlantic Council) 
CFP European Cybersecurity Seminar 2023-2024 (European Cyber Conflict Research Initiative)
#CYBERUK23: Russian Cyber Offensive Exhibits ‘Unprecedented’ Speed and Agility (Infosecurity Magazine)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Daggerfly APT targets an African telecommunications provider. EvilExtractor is an alleged teaching tool apparently gone bad. A Chinese speaking threat group is active against Taiwan and South Korea. Europe’s air traffic control is under attack. Cecilia Marinier from RSAC and Barmak Meftah, a judge of ISB, discuss the RSA innovation sandbox. Awais Rashid from University of Bristol on the cybersecurity of smart farming. Forget about those evil maids. What about these evil sys admins? </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/77</p><p><br></p><h2>Selected reading.</h2><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/apt-attacks-telecoms-africa-mgbot">Daggerfly: APT Actor Targets Telecoms Company in Africa</a> (Symantec)</p><p><a href="https://www.fortinet.com/blog/threat-research/evil-extractor-all-in-one-stealer">EvilExtractor – All-in-One Stealer</a> (Fortinet Blog)</p><p><a href="https://therecord.media/chinese-language-threat-group-targeted-south-korea">Chinese-language threat group targeted a dozen South Korean institutions</a> (Record) </p><p><a href="https://www.recordedfuture.com/xiaoqiying-genesis-day-threat-actor-group-targets-south-korea-taiwan">Xiaoqiying/Genesis Day Threat Actor Group Targets South Korea, Taiwan</a> (Recorded Future) </p><p><a href="https://www.wsj.com/articles/europes-air-traffic-agency-under-attack-from-pro-russian-hackers-54b4514d">WSJ News Exclusive | Europe’s Air-Traffic Agency Under Attack From Pro-Russian Hackers</a> (Wall Street Journal) </p><p><a href="https://www.wsj.com/articles/intelligence-leaks-cast-spotlight-on-a-recurring-insider-threat-tech-support-26fe17d0">Intelligence Leaks Cast Spotlight on a Recurring Insider Threat: Tech Support</a> (Wall Street Journal)</p><p><a href="https://www.atlanticcouncil.org/blogs/ukrainealert/russias-invasion-of-ukraine-is-also-being-fought-in-cyberspace/">Russia’s invasion of Ukraine is also being fought in cyberspace</a> (Atlantic Council) </p><p><a href="https://eccri.eu/events/the-cyber-dimensions-of-the-russia-ukraine-war/">CFP European Cybersecurity Seminar 2023-2024</a> (European Cyber Conflict Research Initiative)</p><p><a href="https://www.infosecurity-magazine.com/news/russian-cyber-offensive-speed/">#CYBERUK23: Russian Cyber Offensive Exhibits ‘Unprecedented’ Speed and Agility</a> (Infosecurity Magazine)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1817</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2fcfb67c-8167-11ed-9779-5f28fbde94eb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3571053709.mp3?updated=1690332250" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Two-step supply-chain attack. Plugging leaks, in both Mother Russia and the Land of the Free and the Home of the Brave. Belarus remains a player in the cyber war.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1806/notes</link>
      <description>The 3CX compromise involved a two-stage supply-chain attack. Impersonating ChatGPT. Russia's security organs say they're cracking down on leaks. Updates on the Discord Papers case. Belarus arrests a pro-Russian hacktivist. Rob Boyce from Accenture Security on Dark Web cyber criminals targeting CRM systems. Our guest is Mike Loewy from the Tide Foundation, with an innovative approach to distributed key security. And, is Minsk going wobbly on Moscow?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/76

Selected reading.
3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible (Mandiant)
ChatGPT-Themed Scam Attacks Are on the Rise (Palo Alto Networks Unit 42)
Russian Offensive Campaign Assessment, April 19, 2023 (Institute for the Study of War)
Belarus-linked hacking group targets Poland with new disinformation campaign (Record)
Killnet Ostracizes Leader of Anonymous Russia, Adding New Chapter to Pro-Kremlin Hacktivist Drama (Flashpoint)
Belarus-linked hacking group targets Poland with new disinformation campaign (Record)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 20 Apr 2023 20:15:00 -0000</pubDate>
      <itunes:title>Two-step supply-chain attack. Plugging leaks, in both Mother Russia and the Land of the Free and the Home of the Brave. Belarus remains a player in the cyber war.  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1806</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The 3CX compromise involved a two-stage supply-chain attack. Impersonating ChatGPT. Russia's security organs say they're cracking down on leaks. Updates on the Discord Papers case. Belarus arrests a pro-Russian hacktivist. Rob Boyce from Accenture Security on Dark Web cyber criminals targeting CRM systems. Our guest is Mike Loewy from the Tide Foundation, with an innovative approach to distributed key security. And, is Minsk going wobbly on Moscow?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/76

Selected reading.
3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible (Mandiant)
ChatGPT-Themed Scam Attacks Are on the Rise (Palo Alto Networks Unit 42)
Russian Offensive Campaign Assessment, April 19, 2023 (Institute for the Study of War)
Belarus-linked hacking group targets Poland with new disinformation campaign (Record)
Killnet Ostracizes Leader of Anonymous Russia, Adding New Chapter to Pro-Kremlin Hacktivist Drama (Flashpoint)
Belarus-linked hacking group targets Poland with new disinformation campaign (Record)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The 3CX compromise involved a two-stage supply-chain attack. Impersonating ChatGPT. Russia's security organs say they're cracking down on leaks. Updates on the Discord Papers case. Belarus arrests a pro-Russian hacktivist. Rob Boyce from Accenture Security on Dark Web cyber criminals targeting CRM systems. Our guest is Mike Loewy from the Tide Foundation, with an innovative approach to distributed key security. And, is Minsk going wobbly on Moscow?</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/76</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.mandiant.com/resources/blog/3cx-software-supply-chain-compromise">3CX Software Supply Chain Compromise Initiated by a Prior Software Supply Chain Compromise; Suspected North Korean Actor Responsible</a> (Mandiant)</p><p><a href="https://unit42.paloaltonetworks.com/chatgpt-scam-attacks-increasing">ChatGPT-Themed Scam Attacks Are on the Rise</a> (Palo Alto Networks Unit 42)</p><p><a href="https://isw.pub/UkrWar041923">Russian Offensive Campaign Assessment, April 19, 2023</a> (Institute for the Study of War)</p><p><a href="https://therecord.media/ghostwriter-belarus-hacking-group-targets-poland-disinformation">Belarus-linked hacking group targets Poland with new disinformation campaign</a> (Record)</p><p><a href="https://flashpoint.io/blog/killnet-anonymous-russia-pro-kremlin-hacktivism/">Killnet Ostracizes Leader of Anonymous Russia, Adding New Chapter to Pro-Kremlin Hacktivist Drama</a> (Flashpoint)</p><p><a href="https://therecord.media/ghostwriter-belarus-hacking-group-targets-poland-disinformation">Belarus-linked hacking group targets Poland with new disinformation campaign</a> (Record)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1686</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2f4bb5a2-8167-11ed-9779-0f3f5ba32546]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9363176795.mp3?updated=1690332157" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA23-108A – APT28 exploits known vulnerability to carry out reconnaissance and deploy malware on Cisco routers.</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/46/notes</link>
      <description>The UK National Cyber Security Centre (NCSC), NSA, CISA, and FBI are releasing this joint advisory to provide TTPs associated with APT28’s exploitation of Cisco routers in 2021.
AA23-108A Alert, Technical Details, and Mitigations
Malware Analysis Report
Resource to mitigate a ransomware attack: CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide.
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 20 Apr 2023 13:33:00 -0000</pubDate>
      <itunes:title>CISA Alert AA23-108A – APT28 exploits known vulnerability to carry out reconnaissance and deploy malware on Cisco routers.</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>46</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The UK National Cyber Security Centre (NCSC), NSA, CISA, and FBI are releasing this joint advisory to provide TTPs associated with APT28’s exploitation of Cisco routers in 2021.
AA23-108A Alert, Technical Details, and Mitigations
Malware Analysis Report
Resource to mitigate a ransomware attack: CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide.
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The UK National Cyber Security Centre (NCSC), NSA, CISA, and FBI are releasing this joint advisory to provide TTPs associated with APT28’s exploitation of Cisco routers in 2021.</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-108">AA23-108A Alert, Technical Details, and Mitigations</a></p><p><a href="https://www.ncsc.gov.uk/static-assets/documents/malware-analysis-reports/jaguar-tooth/NCSC-MAR-Jaguar-Tooth.pdf">Malware Analysis Report</a></p><p>Resource to mitigate a ransomware attack: <a href="https://www.cisa.gov/sites/default/files/publications/CISA_MS-ISAC_Ransomware%20Guide_S508C.pdf">CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide</a>.</p><p>No-cost cyber hygiene services: <a href="https://www.cisa.gov/cyber-hygiene-services">Cyber Hygiene Services</a> and <a href="https://github.com/cisagov/cset/">Ransomware Readiness Assessment</a>.</p><p>See CISA Insights <a href="https://www.cisa.gov/sites/default/files/publications/CISA%20Insights_Guidance-for-MSPs-and-Small-and-Mid-sized-Businesses_S508C.pdf">Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses</a> for guidance on hardening MSP and customer infrastructure.</p><p>U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email <a href="mailto:dib_defense@cyber.nsa.gov">dib_defense@cyber.nsa.gov</a> </p><p>To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="mailto:report@cisa.gov">report@cisa.gov</a>, or call (888) 282-0870, or report incidents to your local FBI field office.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>165</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c35eaeea-df7f-11ed-bfdc-ff96d5cf93b5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1520555434.mp3?updated=1681930666" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Play ransomware's new tools. A look at what the GRU’s been up to. US Air Force opens investigation into alleged leaker's Air National Guard wing. KillNet’s new hacker course: “Dark School.” </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1805/notes</link>
      <description>Play ransomware's new tools. Fancy Bear is out and about. Updates on Sandworm. Ransomware in Russia's war against Ukraine. The US Air Force opens an investigation into the alleged leaker's Air National Guard wing. The Washington Post’s Tim Starks joins us with insights on the Biden administration's attempts to better secure the water supply. Carole Theriault chats with Cisco Talos' Vanja Svacjer about the threat landscape, now and tomorrow. And KillNet’s in the education business with a new hacker course: “Dark School.” 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/75

Selected reading.
Play Ransomware Group Using New Custom Data-Gathering Tools (Symantec)
NCSC-UK, NSA, and Partners Advise about APT28 Exploitation of Cisco Routers (National Security Agency/Central Security Service)
APT28 exploits known vulnerability to carry out reconnaissance and deploy malware on Cisco routers (NCSC)
State-sponsored campaigns target global network infrastructure (Cisco Talos Blog) 
Ukraine remains Russia’s biggest cyber focus in 2023 (Google)
Fog of War: How the Ukraine Conflict Transformed the Cyber Threat Landscape (Google Threat Analysis Group)
M-Trends 2023: Cybersecurity Insights From the Frontlines (Mandiant)
Faltering against Ukraine, Russian hackers resort to ransomware: Researchers (Breaking Defense) 
Air Force unit in document leaks case loses intel mission (AP NEWS)
Pentagon Details Review of Policies for Handling Classified Information (New York Times) 
Ukraine at D+419: GRU cyber ops scrutinized. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 19 Apr 2023 20:15:00 -0000</pubDate>
      <itunes:title>Play ransomware's new tools. A look at what the GRU’s been up to. US Air Force opens investigation into alleged leaker's Air National Guard wing. KillNet’s new hacker course: “Dark School.” </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1805</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Play ransomware's new tools. Fancy Bear is out and about. Updates on Sandworm. Ransomware in Russia's war against Ukraine. The US Air Force opens an investigation into the alleged leaker's Air National Guard wing. The Washington Post’s Tim Starks joins us with insights on the Biden administration's attempts to better secure the water supply. Carole Theriault chats with Cisco Talos' Vanja Svacjer about the threat landscape, now and tomorrow. And KillNet’s in the education business with a new hacker course: “Dark School.” 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/75

Selected reading.
Play Ransomware Group Using New Custom Data-Gathering Tools (Symantec)
NCSC-UK, NSA, and Partners Advise about APT28 Exploitation of Cisco Routers (National Security Agency/Central Security Service)
APT28 exploits known vulnerability to carry out reconnaissance and deploy malware on Cisco routers (NCSC)
State-sponsored campaigns target global network infrastructure (Cisco Talos Blog) 
Ukraine remains Russia’s biggest cyber focus in 2023 (Google)
Fog of War: How the Ukraine Conflict Transformed the Cyber Threat Landscape (Google Threat Analysis Group)
M-Trends 2023: Cybersecurity Insights From the Frontlines (Mandiant)
Faltering against Ukraine, Russian hackers resort to ransomware: Researchers (Breaking Defense) 
Air Force unit in document leaks case loses intel mission (AP NEWS)
Pentagon Details Review of Policies for Handling Classified Information (New York Times) 
Ukraine at D+419: GRU cyber ops scrutinized. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Play ransomware's new tools. Fancy Bear is out and about. Updates on Sandworm. Ransomware in Russia's war against Ukraine. The US Air Force opens an investigation into the alleged leaker's Air National Guard wing. The Washington Post’s Tim Starks joins us with insights on the Biden administration's attempts to better secure the water supply. Carole Theriault chats with Cisco Talos' Vanja Svacjer about the threat landscape, now and tomorrow. And KillNet’s in the education business with a new hacker course: “Dark School.” </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/75</p><p><br></p><h2>Selected reading.</h2><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/play-ransomware-volume-shadow-copy">Play Ransomware Group Using New Custom Data-Gathering Tools</a> (Symantec)</p><p><a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3366125/ncsc-uk-nsa-and-partners-advise-about-apt28-exploitation-of-cisco-routers/">NCSC-UK, NSA, and Partners Advise about APT28 Exploitation of Cisco Routers</a> (National Security Agency/Central Security Service)</p><p><a href="https://www.ncsc.gov.uk/news/apt28-exploits-known-vulnerability-to-carry-out-reconnaissance-and-deploy-malware-on-cisco-routers">APT28 exploits known vulnerability to carry out reconnaissance and deploy malware on Cisco routers</a> (NCSC)</p><p><a href="https://blog.talosintelligence.com/state-sponsored-campaigns-target-global-network-infrastructure/">State-sponsored campaigns target global network infrastructure</a> (Cisco Talos Blog) </p><p><a href="https://blog.google/threat-analysis-group/ukraine-remains-russias-biggest-cyber-focus-in-2023/">Ukraine remains Russia’s biggest cyber focus in 2023</a> (Google)</p><p><a href="https://blog.google/threat-analysis-group/fog-of-war-how-the-ukraine-conflict-transformed-the-cyber-threat-landscape/">Fog of War: How the Ukraine Conflict Transformed the Cyber Threat Landscape</a> (Google Threat Analysis Group)</p><p><a href="https://www.mandiant.com/resources/blog/m-trends-2023">M-Trends 2023: Cybersecurity Insights From the Frontlines</a> (Mandiant)</p><p><a href="https://breakingdefense.com/2023/04/faltering-against-ukraine-russian-hackers-resort-to-ransomware-researchers/">Faltering against Ukraine, Russian hackers resort to ransomware: Researchers</a> (Breaking Defense) </p><p><a href="https://apnews.com/article/leaked-documents-review-air-force-293094d3189534013762d80f83cc7719">Air Force unit in document leaks case loses intel mission</a> (AP NEWS)</p><p><a href="https://www.nytimes.com/2023/04/18/us/politics/pentagon-leak-classified-documents.html">Pentagon Details Review of Policies for Handling Classified Information</a> (New York Times) </p><p><a href="https://thecyberwire.com/stories/0caea72c5f864ce2bd8e3455bf0cde74/ukraine-at-d419-gru-cyber-ops-scrutinized">Ukraine at D+419: GRU cyber ops scrutinized.</a> (CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1758</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2ed8d122-8167-11ed-9779-af892b36b192]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9900377655.mp3?updated=1690332140" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A Symposium, a wet dress, a new fund, and it’s only Monday. [T-Minus Space Daily]</title>
      <link>https://space.n2k.com/podcasts/t-minus/11</link>
      <description>Brace yourselves, it’s Space Symposium week! Wet dress rehearsal for Starship. UK launches the International Bilateral Fund. Orbit Fab gets a series A round. Boeing announces their anti-jam payload for WGS. The FAA wants to balance air travel and space travel. Our interview with Steve Luczynski, Board Chair of the Aerospace Village, on their mission, programs, and upcoming activities at the RSA Conference next week. All this and more.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence briefing, Signals and Space, and you’ll never miss a beat.
T-Minus Guest
Our featured guest is Steve Luczynski, Board Chair of the Aerospace Village, on the Aerospace Village nonprofit, their mission, their programs, and their upcoming activities at the RSA Conference next week.
You can follow Steve on LinkedIn and Twitter.
Selected Reading
SpaceX's launch of Starship could remake space exploration | Washington Post 
UK Space Agency funding for international space partnerships | GOV.UK. 
SpaceX launches seventh Transporter rideshare mission | SpaceNews	
Exolaunch’s 21 rideshare smallsats deployed during the SpaceX Transporter-7 mission | SatNews
HawkEye 360’s nexgen Cluster 7 smallsats are successfully launched | SatNews   
TrustPoint Announces Launch of First Commercially-Funded, Purpose-Built PNT Microsatellite | Business Wire 
China claims its Space Station has achieved 100% oxygen regeneration in orbit | Interesting Engineering 
Boeing Unveils Anti-Jam Payload For Next Space Force Wideband Global SATCOM Satellite | Via Satellite
As counterspace weapons ‘proliferate,’ the new cold war for space races forward: studies | Breaking Defense
The Moon is the Best Place to Transport Rocket Fuel | Universe Today 
US aviation authorities may delay some space launches to avoid air traffic disruption | Reuters 
NASA launches stadium-sized balloon from New Zealand | SpaceConnect  
Audience Survey
We want to hear from you! Please complete our wicked fast 4 question survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
Want to hear your company in the show?
You too can reach the most influential leaders in the industry. Here’s a link to our media kit. Contact us at space@n2k.com to request more info about sponsoring T-Minus.
Want to join us for an interview?
Please send your interview pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal, and our editor will get back to you for scheduling.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 19 Apr 2023 07:00:00 -0000</pubDate>
      <itunes:title>A Symposium, a wet dress, a new fund, and it’s only Monday. [T-Minus Space Daily]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>11</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Brace for Symposium week! Starship’s wet dress. UK's space fund. More capital for Orbit Fab. Boeing’s anti-jam. FAA balances air and space travel. And more.</itunes:subtitle>
      <itunes:summary>Brace yourselves, it’s Space Symposium week! Wet dress rehearsal for Starship. UK launches the International Bilateral Fund. Orbit Fab gets a series A round. Boeing announces their anti-jam payload for WGS. The FAA wants to balance air travel and space travel. Our interview with Steve Luczynski, Board Chair of the Aerospace Village, on their mission, programs, and upcoming activities at the RSA Conference next week. All this and more.
Remember to leave us a 5-star rating and review in your favorite podcast app.
Miss an episode? Sign-up for our weekly intelligence briefing, Signals and Space, and you’ll never miss a beat.
T-Minus Guest
Our featured guest is Steve Luczynski, Board Chair of the Aerospace Village, on the Aerospace Village nonprofit, their mission, their programs, and their upcoming activities at the RSA Conference next week.
You can follow Steve on LinkedIn and Twitter.
Selected Reading
SpaceX's launch of Starship could remake space exploration | Washington Post 
UK Space Agency funding for international space partnerships | GOV.UK. 
SpaceX launches seventh Transporter rideshare mission | SpaceNews	
Exolaunch’s 21 rideshare smallsats deployed during the SpaceX Transporter-7 mission | SatNews
HawkEye 360’s nexgen Cluster 7 smallsats are successfully launched | SatNews   
TrustPoint Announces Launch of First Commercially-Funded, Purpose-Built PNT Microsatellite | Business Wire 
China claims its Space Station has achieved 100% oxygen regeneration in orbit | Interesting Engineering 
Boeing Unveils Anti-Jam Payload For Next Space Force Wideband Global SATCOM Satellite | Via Satellite
As counterspace weapons ‘proliferate,’ the new cold war for space races forward: studies | Breaking Defense
The Moon is the Best Place to Transport Rocket Fuel | Universe Today 
US aviation authorities may delay some space launches to avoid air traffic disruption | Reuters 
NASA launches stadium-sized balloon from New Zealand | SpaceConnect  
Audience Survey
We want to hear from you! Please complete our wicked fast 4 question survey. It’ll help us get better and deliver you the most mission-critical space intel every day.
Want to hear your company in the show?
You too can reach the most influential leaders in the industry. Here’s a link to our media kit. Contact us at space@n2k.com to request more info about sponsoring T-Minus.
Want to join us for an interview?
Please send your interview pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal, and our editor will get back to you for scheduling.
T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Brace yourselves, it’s Space Symposium week! Wet dress rehearsal for Starship. UK launches the International Bilateral Fund. Orbit Fab gets a series A round. Boeing announces their anti-jam payload for WGS. The FAA wants to balance air travel and space travel. Our interview with Steve Luczynski, Board Chair of the Aerospace Village, on their mission, programs, and upcoming activities at the <a href="https://aerospacevillage.org/events/upcoming-events/rsa-conference-2023/">RSA Conference</a> next week. All this and more.</p><p>Remember to leave us a 5-star rating and review in your favorite podcast app.</p><p>Miss an episode? Sign-up for our weekly intelligence briefing, <a href="https://space.n2k.com/newsletters/signals-and-space"><em>Signals and Space</em></a>, and you’ll never miss a beat<em>.</em></p><h2>T-Minus Guest</h2><p>Our featured guest is Steve Luczynski, Board Chair of the Aerospace Village, on the <a href="https://aerospacevillage.org/">Aerospace Village</a> nonprofit, their mission, their programs, and their upcoming activities at the <a href="https://aerospacevillage.org/events/upcoming-events/rsa-conference-2023/">RSA Conference</a> next week.</p><p>You can follow Steve on <a href="https://www.linkedin.com/in/steveluczynski/">LinkedIn</a> and <a href="https://twitter.com/cyberpilot22">Twitter</a>.</p><h2>Selected Reading</h2><p><a href="https://www.washingtonpost.com/technology/2023/04/16/spacex-starship-moon-rocket-launch/">SpaceX's launch of Starship could remake space exploration | Washington Post</a> </p><p><a href="https://www.gov.uk/government/news/uk-space-agency-funding-for-international-space-partnerships#:~:text=The%20UK%20Space%20Agency%20is,20%20million%20International%20Bilateral%20Fund.&amp;text=The%20UK%20Space%20Agency%20is%20launching%20a%20%C2%A320%20million,space%20capabilities%20and%20catalyse%20investment">UK Space Agency funding for international space partnerships | GOV.UK</a>. </p><p><a href="https://spacenews.com/spacex-launches-seventh-transporter-rideshare-mission/">SpaceX launches seventh Transporter rideshare mission | SpaceNews	</a></p><p><a href="https://news.satnews.com/2023/04/15/exolaunchs-21-smallsats-deployed-during-the-spacex-transporter-7-mission/">Exolaunch’s 21 rideshare smallsats deployed during the SpaceX Transporter-7 mission | SatNews</a></p><p><a href="https://news.satnews.com/2023/04/15/hawkeye-360s-nexgen-cluster-7-smallsats-are-successfully-launched/">HawkEye 360’s nexgen Cluster 7 smallsats are successfully launched | SatNews</a>   </p><p><a href="https://www.businesswire.com/news/home/20230411005984/en/TrustPoint-Announces-Launch-of-First-Commercially-Funded-Purpose-Built-PNT-Microsatellite">TrustPoint Announces Launch of First Commercially-Funded, Purpose-Built PNT Microsatellite | Business Wire</a> </p><p><a href="https://interestingengineering.com/innovation/china-space-station-achieved-100-oxygen-regeneration">China claims its Space Station has achieved 100% oxygen regeneration in orbit | Interesting Engineering</a> </p><p><a href="https://www.satellitetoday.com/government-military/2023/04/14/boeing-unveils-anti-jam-payload-for-next-space-force-wideband-global-satcom-satellite/">Boeing Unveils Anti-Jam Payload For Next Space Force Wideband Global SATCOM Satellite | Via Satellite</a></p><p><a href="https://breakingdefense.com/2023/04/as-counterspace-weapons-proliferate-countries-race-toward-non-destructive-capabilities-study/">As counterspace weapons ‘proliferate,’ the new cold war for space races forward: studies | Breaking Defense</a></p><p><a href="https://www.universetoday.com/160952/the-moon-is-the-best-place-to-transport-rocket-fuel/">The Moon is the Best Place to Transport Rocket Fuel | Universe Today</a> </p><p><a href="https://www.reuters.com/business/aerospace-defense/us-aviation-authorities-may-delay-some-space-launches-avoid-air-traffic-2023-04-13/">US aviation authorities may delay some space launches to avoid air traffic disruption | Reuters</a> </p><p><a href="https://www.spaceconnectonline.com.au/launch/5854-nasa-launches-stadium-sized-balloon-from-new-zealand">NASA launches stadium-sized balloon from New Zealand | SpaceConnect</a>  </p><h2>Audience Survey</h2><p>We want to hear from you! Please complete our <a href="https://www.surveymonkey.com/r/BL5NFPW">wicked fast 4 question survey</a>. It’ll help us get better and deliver you the most mission-critical space intel every day.</p><h2>Want to hear your company in the show?</h2><p>You too can reach the most influential leaders in the industry. Here’s a <a href="https://docsend.com/view/ung56qbvknfbj9z2">link to our media kit</a>. Contact us at <a href="mailto:space@n2k.com?subject=%22Sponsor%20inquiry%20for%20T-Minus%20podcast%22">space@n2k.com</a> to request more info about sponsoring T-Minus.</p><h2>Want to join us for an interview?</h2><p>Please send your interview pitch to <a href="mailto:space-editor@n2k.com">space-editor@n2k.com</a> and include your name, affiliation, and topic proposal, and our editor will get back to you for scheduling.</p><p>T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1541</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b7c9f28-dd6c-11ed-a45c-f71c9dadface]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6983863125.mp3?updated=1681766836" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Iranian threat actor exploits N-day vulnerabilities. Subdomain hijacking vulnerabilities. The Discord Papers. An update on Russia’s NTC Vulkan. And weather reports, not a Periodic Table.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1804/notes</link>
      <description>An Iranian threat actor exploits N-day vulnerabilities. CSC exposes subdomain hijacking vulnerabilities. More on the Discord Papers. An update on Russia’s NTC Vulkan. Joe Carrigan on the aftermath of a $98M online investment fraud. Our guest is Blake Sobczak from Synack , host of the podcast WE'RE IN! And threat actor nomenclature: a scorecard, and a Periodic Table no more.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/74

Selected reading.
Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets (Microsoft Security)
An Iranian hacking group went on the offensive against U.S. targets, Microsoft says (Washington Post) 
New CSC Research Finds One in Five DNS Records are Susceptible to Subdomain Hijacking Due to Insufficient Cyber Hygiene | CSC (CSC)
DOD Assessing Document Disclosures and Implementing Mitigation Measures (U.S. Department of Defense)
After leak, Pentagon purges some users' access to classified programs, launches security review (Breaking Defense)
Why Did a 21-Year-Old Guardsman Have Access to State Secrets? (Vice)
U.S. officials have examined whether alleged doc leaker had foreign links (POLITICO) 
The Air Force Loves War Gamers Like Alleged Leaker Teixeira (Military.com) 
FBI Investigating Ex-Navy Noncommissioned Officer Linked to Pro-Russia Social-Media Account (Wall Street Journal)
Pentagon leak suggests Russia honing disinformation drive – report (the Guardian)
Dragos Analyzes Russian Programs Threatening Critical Civilian Infrastructure (Dragos) 
Microsoft shifts to a new threat actor naming taxonomy (Microsoft)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Apr 2023 20:15:00 -0000</pubDate>
      <itunes:title>Iranian threat actor exploits N-day vulnerabilities. Subdomain hijacking vulnerabilities. The Discord Papers. An update on Russia’s NTC Vulkan. And weather reports, not a Periodic Table.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1804</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An Iranian threat actor exploits N-day vulnerabilities. CSC exposes subdomain hijacking vulnerabilities. More on the Discord Papers. An update on Russia’s NTC Vulkan. Joe Carrigan on the aftermath of a $98M online investment fraud. Our guest is Blake Sobczak from Synack , host of the podcast WE'RE IN! And threat actor nomenclature: a scorecard, and a Periodic Table no more.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/74

Selected reading.
Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets (Microsoft Security)
An Iranian hacking group went on the offensive against U.S. targets, Microsoft says (Washington Post) 
New CSC Research Finds One in Five DNS Records are Susceptible to Subdomain Hijacking Due to Insufficient Cyber Hygiene | CSC (CSC)
DOD Assessing Document Disclosures and Implementing Mitigation Measures (U.S. Department of Defense)
After leak, Pentagon purges some users' access to classified programs, launches security review (Breaking Defense)
Why Did a 21-Year-Old Guardsman Have Access to State Secrets? (Vice)
U.S. officials have examined whether alleged doc leaker had foreign links (POLITICO) 
The Air Force Loves War Gamers Like Alleged Leaker Teixeira (Military.com) 
FBI Investigating Ex-Navy Noncommissioned Officer Linked to Pro-Russia Social-Media Account (Wall Street Journal)
Pentagon leak suggests Russia honing disinformation drive – report (the Guardian)
Dragos Analyzes Russian Programs Threatening Critical Civilian Infrastructure (Dragos) 
Microsoft shifts to a new threat actor naming taxonomy (Microsoft)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An Iranian threat actor exploits N-day vulnerabilities. CSC exposes subdomain hijacking vulnerabilities. More on the Discord Papers. An update on Russia’s NTC Vulkan. Joe Carrigan on the aftermath of a $98M online investment fraud. Our guest is Blake Sobczak from Synack , host of the podcast WE'RE IN! And threat actor nomenclature: a scorecard, and a Periodic Table no more.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/74</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.microsoft.com/en-us/security/blog/2023/04/18/nation-state-threat-actor-mint-sandstorm-refines-tradecraft-to-attack-high-value-targets/">Nation-state threat actor Mint Sandstorm refines tradecraft to attack high-value targets</a> (Microsoft Security)</p><p><a href="https://www.washingtonpost.com/politics/2023/04/18/an-iranian-hacking-group-went-offensive-against-us-targets-microsoft-says/">An Iranian hacking group went on the offensive against U.S. targets, Microsoft says</a> (Washington Post) </p><p><a href="https://www.cscglobal.com/service/press/csc-research-finds-one-in-five-dns-records-susceptible-to-subdomain-hijacking/">New CSC Research Finds One in Five DNS Records are Susceptible to Subdomain Hijacking Due to Insufficient Cyber Hygiene | CSC</a> (CSC)</p><p><a href="https://www.defense.gov/News/News-Stories/Article/Article/3365473/dod-assessing-document-disclosures-and-implementing-mitigation-measures/">DOD Assessing Document Disclosures and Implementing Mitigation Measures</a> (U.S. Department of Defense)</p><p><a href="https://breakingdefense.com/2023/04/after-leak-pentagon-purges-some-users-access-to-classified-systems-launches-security-review/">After leak, Pentagon purges some users' access to classified programs, launches security review</a> (Breaking Defense)</p><p><a href="https://www.vice.com/en/article/3akqpb/why-did-a-21-year-old-guardsman-have-access-to-state-secrets">Why Did a 21-Year-Old Guardsman Have Access to State Secrets?</a> (Vice)</p><p><a href="https://www.politico.com/news/2023/04/17/u-s-officials-have-examined-whether-alleged-doc-leaker-had-foreign-links-00092419">U.S. officials have examined whether alleged doc leaker had foreign links</a> (POLITICO) </p><p><a href="https://www.military.com/daily-news/opinions/2023/04/17/air-force-loves-war-gamers-alleged-leaker-teixeira.html">The Air Force Loves War Gamers Like Alleged Leaker Teixeira</a> (Military.com) </p><p><a href="https://www.wsj.com/articles/fbi-investigating-ex-navy-noncommissioned-officer-linked-to-pro-russia-social-media-account-e0cf9a10">FBI Investigating Ex-Navy Noncommissioned Officer Linked to Pro-Russia Social-Media Account</a> (Wall Street Journal)</p><p><a href="https://www.theguardian.com/us-news/2023/apr/17/pentagon-leak-suggests-russia-honing-disinformation-drive-report">Pentagon leak suggests Russia honing disinformation drive – report</a> (the Guardian)</p><p><a href="https://hub.dragos.com/hubfs/Dragos_IntelBrief_Russian-Programs-Threatening-Critical_Infrastructure.pdf">Dragos Analyzes Russian Programs Threatening Critical Civilian Infrastructure</a> (Dragos) </p><p><a href="https://www.microsoft.com/en-us/security/blog/2023/04/18/microsoft-shifts-to-a-new-threat-actor-naming-taxonomy/">Microsoft shifts to a new threat actor naming taxonomy</a> (Microsoft)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1707</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2e57fa84-8167-11ed-9779-17f8d56df1c6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3117112030.mp3?updated=1690332071" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Developments in the Discord Papers, including notes on influencers and why they seek influence. Tax season scams. KillNet’s selling, but is anyone buying? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1803/notes</link>
      <description>The alleged Discord Papers leaker has been charged. We look at how the Papers spread online. A life lived online as a security risk. US tax season scams, at the 11th filing hour. Caleb Barlow from Cylete on the layoffs in security that many thought would never happen. Maria Varmazis and Brandon Karpf share the launch of the new space podcast, T-Minus. And KillNet says it’s open for business.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/73

Selected reading.
Inside the furious week-long scramble to hunt down a massive Pentagon leak (CNN Politics) 
Massachusetts Air National Guard’s Intelligence Mission in the Spotlight (New York Times) 
Leaker of U.S. secret documents worked on military base, friend says (Washington Post) 
WSJ News Exclusive | Social-Media Account Overseen by Former Navy Noncommissioned Officer Helped Spread Secrets (Wall Street Journal).
A Russian Disinformation Empire in Oak Harbor, Washington (Malcontent News) 
Pro-Russia propagandist unmasked as New Jersey tropical fish seller (The Telegraph) 
Suspect charged in case involving leaked classified military documents (Washington Post) 
Jack Teixeira, suspect in Pentagon leaks, charged under Espionage Act (the Guardian)
Leak suspect appears in court as US spells out its case (AP NEWS) 
Airman in Pentagon intel leak charged (Military Times) 
Airman charged in Pentagon intel leak regretted joining the military (Military Times) 
He’s from a military family — and allegedly leaked U.S. secrets (Washington Post)
Jack Teixeira's alleged Discord leaks show why the US should stop showering Top Secret clearances on 21-year-old keyboard warriors (Business Insider).
The military loved Discord for Gen Z recruiting. Then the leaks began. (Washington Post) 
A new kind of leaker: Spilling state secrets to impress online buddies (Washington Post) 
Was the Gen-Z Pentagon leaker motivated by social media clout? (the Guardian) 
Microsoft president claims Russian intelligence is trying to "penetrate gaming communities" (GamesIndustry.biz)
How Gamers Eclipsed Spies as an Intelligence Threat (Foreign Policy)
Crafty PDF link is part of another tax-season malware campaign (Record)
Tax season scams. (CyberWire)
Ukraine at D+414: Discord Papers arrest, cyberespionage, and hacktivist DDoS. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 17 Apr 2023 20:45:00 -0000</pubDate>
      <itunes:title>Developments in the Discord Papers, including notes on influencers and why they seek influence. Tax season scams. KillNet’s selling, but is anyone buying? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1803</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The alleged Discord Papers leaker has been charged. We look at how the Papers spread online. A life lived online as a security risk. US tax season scams, at the 11th filing hour. Caleb Barlow from Cylete on the layoffs in security that many thought would never happen. Maria Varmazis and Brandon Karpf share the launch of the new space podcast, T-Minus. And KillNet says it’s open for business.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/73

Selected reading.
Inside the furious week-long scramble to hunt down a massive Pentagon leak (CNN Politics) 
Massachusetts Air National Guard’s Intelligence Mission in the Spotlight (New York Times) 
Leaker of U.S. secret documents worked on military base, friend says (Washington Post) 
WSJ News Exclusive | Social-Media Account Overseen by Former Navy Noncommissioned Officer Helped Spread Secrets (Wall Street Journal).
A Russian Disinformation Empire in Oak Harbor, Washington (Malcontent News) 
Pro-Russia propagandist unmasked as New Jersey tropical fish seller (The Telegraph) 
Suspect charged in case involving leaked classified military documents (Washington Post) 
Jack Teixeira, suspect in Pentagon leaks, charged under Espionage Act (the Guardian)
Leak suspect appears in court as US spells out its case (AP NEWS) 
Airman in Pentagon intel leak charged (Military Times) 
Airman charged in Pentagon intel leak regretted joining the military (Military Times) 
He’s from a military family — and allegedly leaked U.S. secrets (Washington Post)
Jack Teixeira's alleged Discord leaks show why the US should stop showering Top Secret clearances on 21-year-old keyboard warriors (Business Insider).
The military loved Discord for Gen Z recruiting. Then the leaks began. (Washington Post) 
A new kind of leaker: Spilling state secrets to impress online buddies (Washington Post) 
Was the Gen-Z Pentagon leaker motivated by social media clout? (the Guardian) 
Microsoft president claims Russian intelligence is trying to "penetrate gaming communities" (GamesIndustry.biz)
How Gamers Eclipsed Spies as an Intelligence Threat (Foreign Policy)
Crafty PDF link is part of another tax-season malware campaign (Record)
Tax season scams. (CyberWire)
Ukraine at D+414: Discord Papers arrest, cyberespionage, and hacktivist DDoS. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The alleged Discord Papers leaker has been charged. We look at how the Papers spread online. A life lived online as a security risk. US tax season scams, at the 11th filing hour. Caleb Barlow from Cylete on the layoffs in security that many thought would never happen. Maria Varmazis and Brandon Karpf share the launch of the new space podcast, T-Minus. And KillNet says it’s open for business.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/73</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cnn.com/2023/04/15/politics/pentagon-leak-week-long-scamble/index.html">Inside the furious week-long scramble to hunt down a massive Pentagon leak</a> (CNN Politics) </p><p><a href="https://www.nytimes.com/2023/04/13/us/leaked-documents-massachusetts-air-national-guard.html">Massachusetts Air National Guard’s Intelligence Mission in the Spotlight</a> (New York Times) </p><p><a href="https://www.washingtonpost.com/national-security/2023/04/12/discord-leaked-documents/">Leaker of U.S. secret documents worked on military base, friend says</a> (Washington Post) </p><p><a href="https://www.wsj.com/articles/social-media-account-overseen-by-former-navy-noncommissioned-officer-helped-spread-secrets-a4b5643b">WSJ News Exclusive | Social-Media Account Overseen by Former Navy Noncommissioned Officer Helped Spread Secrets</a> (Wall Street Journal).</p><p><a href="https://malcontentment.com/a-russian-disinformation-empire-in-oak-harbor-washington/">A Russian Disinformation Empire in Oak Harbor, Washington</a> (Malcontent News) </p><p><a href="https://www.telegraph.co.uk/world-news/2023/04/17/propagandist-donbas-devushka-sarah-bils-unmasked/">Pro-Russia propagandist unmasked as New Jersey tropical fish seller</a> (The Telegraph) </p><p><a href="https://www.washingtonpost.com/national-security/2023/04/14/jack-teixeira-military-leaks-court-appearance/">Suspect charged in case involving leaked classified military documents</a> (Washington Post) </p><p><a href="https://www.theguardian.com/us-news/2023/apr/14/jack-teixeira-charged-pentagon-leaks-espionage-act">Jack Teixeira, suspect in Pentagon leaks, charged under Espionage Act</a> (the Guardian)</p><p><a href="https://apnews.com/article/leaked-documents-pentagon-justice-department-russia-war-5c2aca4dd971d8bc83d1260f1574f99f">Leak suspect appears in court as US spells out its case</a> (AP NEWS) </p><p><a href="https://www.militarytimes.com/news/your-military/2023/04/14/airman-in-pentagon-intel-leak-charged/">Airman in Pentagon intel leak charged </a>(Military Times) </p><p><a href="https://www.militarytimes.com/news/your-military/2023/04/16/airman-charged-in-pentagon-intel-leak-regretted-joining-the-military/">Airman charged in Pentagon intel leak regretted joining the military</a> (Military Times) </p><p><a href="https://www.washingtonpost.com/national-security/2023/04/13/jack-teixeira-discord-document-leak/">He’s from a military family — and allegedly leaked U.S. secrets</a> (Washington Post)</p><p><a href="https://www.businessinsider.com/discord-leaks-top-secret-classified-jack-teixeira-ukraine-russia-pentagon-2023-4">Jack Teixeira's alleged Discord leaks show why the US should stop showering Top Secret clearances on 21-year-old keyboard warriors</a> (Business Insider).</p><p><a href="https://www.washingtonpost.com/technology/2023/04/15/discord-military-recruitment-pentagon-document-leaks/">The military loved Discord for Gen Z recruiting. Then the leaks began.</a> (Washington Post) </p><p><a href="https://www.washingtonpost.com/nation/2023/04/15/classified-documents-leak-discord/">A new kind of leaker: Spilling state secrets to impress online buddies</a> (Washington Post) </p><p><a href="https://www.theguardian.com/commentisfree/2023/apr/17/was-the-gen-z-pentagon-leaker-motivated-by-social-media-clout">Was the Gen-Z Pentagon leaker motivated by social media clout?</a> (the Guardian) </p><p><a href="https://www.gamesindustry.biz/microsoft-president-claims-russian-intelligence-is-trying-to-penetrate-gaming-communities">Microsoft president claims Russian intelligence is trying to "penetrate gaming communities"</a> (GamesIndustry.biz)</p><p><a href="https://foreignpolicy.com/2023/04/15/ukraine-leak-intelligence-discord-espionage-gamers-internet-online/">How Gamers Eclipsed Spies as an Intelligence Threat</a> (Foreign Policy)</p><p><a href="https://therecord.media/tax-season-malware-campaign-sophos-pdf">Crafty PDF link is part of another tax-season malware campaign</a> (Record)</p><p><a href="https://thecyberwire.com/stories/bf1ce90bd7744457bc462a56a6e900e2/tax-season-scams">Tax season scams.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/4b6091969f5145e380cd5033ffdb9017/ukraine-at-d414-discord-papers-arrest-cyberespionage-and-hacktivist-ddos">Ukraine at D+414: Discord Papers arrest, cyberespionage, and hacktivist DDoS.</a> (CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1825</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2e0b6c50-8167-11ed-9779-7fc7a90f971e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2031448970.mp3?updated=1690332045" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jack Chapman: Shielding against the bad guys. [Threat Intelligence] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/145/notes</link>
      <description>Jack Chapman, VP of Threat Intelligence at Egress sits down to share his story on how he found his way into the cybersecurity field as well as his journey creating a cybersecurity company that was successfully acquired. Jack previously co-founded anti-phishing company Aquilai and served as its Chief Technology Officer, working closely with the UK’s intelligence and cyber agency GCHQ to develop cutting-edge product capabilities. Aquilai was acquired by Egress in 2021. Now he is working with Egress as what he calls their "chief bad guy," helping to shield his team from threats. He says "I'm probably what you call a servant leader, my mission is to enable and shield my teams from things that will prevent them from succeeding in their missions, whatever that might look like." Jack hopes to be remembered for making a meaningful impact to help drive the field forward. We thank Jack for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 16 Apr 2023 07:00:00 -0000</pubDate>
      <itunes:title>Jack Chapman: Shielding against the bad guys. [Threat Intelligence] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>145</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Jack Chapman, VP of Threat Intelligence at Egress sits down to share his story on how he found his way into the cybersecurity field as well as his journey creating a cybersecurity company that was successfully acquired. Jack previously co-founded anti-phishing company Aquilai and served as its Chief Technology Officer, working closely with the UK’s intelligence and cyber agency GCHQ to develop cutting-edge product capabilities. Aquilai was acquired by Egress in 2021. Now he is working with Egress as what he calls their "chief bad guy," helping to shield his team from threats. He says "I'm probably what you call a servant leader, my mission is to enable and shield my teams from things that will prevent them from succeeding in their missions, whatever that might look like." Jack hopes to be remembered for making a meaningful impact to help drive the field forward. We thank Jack for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jack Chapman, VP of Threat Intelligence at Egress sits down to share his story on how he found his way into the cybersecurity field as well as his journey creating a cybersecurity company that was successfully acquired. Jack previously co-founded anti-phishing company Aquilai and served as its Chief Technology Officer, working closely with the UK’s intelligence and cyber agency GCHQ to develop cutting-edge product capabilities. Aquilai was acquired by Egress in 2021. Now he is working with Egress as what he calls their "chief bad guy," helping to shield his team from threats. He says "I'm probably what you call a servant leader, my mission is to enable and shield my teams from things that will prevent them from succeeding in their missions, whatever that might look like." Jack hopes to be remembered for making a meaningful impact to help drive the field forward. We thank Jack for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>520</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6abd084e-dcc4-11ed-8cfd-db3bd0b1e54e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9037528750.mp3?updated=1681494341" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New Dero cryptojacking operation concentrates on locating Kubernetes. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/277/notes</link>
      <description>Scott Fanning, Senior Director of Product Management, Cloud Security at CrowdStrike, sits down to talk about the first-ever Dero cryptojacking operation targeting Kubernetes infrastructure. The research defines Dero as "a cryptocurrency that claims to offer improved privacy, anonymity and higher and faster monetary rewards compared to Monero, which is a commonly used cryptocurrency in cryptojacking operations."
CrowdStrike was the first organization to discover Dero, and has been observing the cryptojacking operation since the beginning of February 2023. The operation focuses mainly on locating Kubernetes clusters with anonymous access enabled on a Kubernetes API and listening on non-standard ports accessible from the internet.
The research can be found here:
CrowdStrike Discovers First-Ever Dero Cryptojacking Campaign Targeting Kubernetes

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Apr 2023 07:00:00 -0000</pubDate>
      <itunes:title>New Dero cryptojacking operation concentrates on locating Kubernetes. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>277</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Scott Fanning, Senior Director of Product Management, Cloud Security at CrowdStrike, sits down to talk about the first-ever Dero cryptojacking operation targeting Kubernetes infrastructure. The research defines Dero as "a cryptocurrency that claims to offer improved privacy, anonymity and higher and faster monetary rewards compared to Monero, which is a commonly used cryptocurrency in cryptojacking operations."
CrowdStrike was the first organization to discover Dero, and has been observing the cryptojacking operation since the beginning of February 2023. The operation focuses mainly on locating Kubernetes clusters with anonymous access enabled on a Kubernetes API and listening on non-standard ports accessible from the internet.
The research can be found here:
CrowdStrike Discovers First-Ever Dero Cryptojacking Campaign Targeting Kubernetes

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Scott Fanning, Senior Director of Product Management, Cloud Security at CrowdStrike, sits down to talk about the first-ever Dero cryptojacking operation targeting Kubernetes infrastructure. The research defines Dero as "a cryptocurrency that claims to offer improved privacy, anonymity and higher and faster monetary rewards compared to Monero, which is a commonly used cryptocurrency in cryptojacking operations."</p><p>CrowdStrike was the first organization to discover Dero, and has been observing the cryptojacking operation since the beginning of February 2023. The operation focuses mainly on locating Kubernetes clusters with anonymous access enabled on a Kubernetes API and listening on non-standard ports accessible from the internet.</p><p>The research can be found here:</p><ul><li><a href="https://www.crowdstrike.com/blog/crowdstrike-discovers-first-ever-dero-cryptojacking-campaign-targeting-kubernetes/">CrowdStrike Discovers First-Ever Dero Cryptojacking Campaign Targeting Kubernetes</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>868</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7c9d0082-dcc4-11ed-904e-0b36dd4ec79d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4678111327.mp3?updated=1685127550" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>"Read the Manual" and the ransomware-as-a-service market. Bitter APT against energy companies. Cozy Bear sighting. Hacktivist auxiliaries hit Canadian targets. Aan arrest in the Discord Papers case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1802/notes</link>
      <description>"Read the Manual" and the ransomware-as-a-service market. Bitter APT may be targeting Asia-Pacific energy companies. A Cozy Bear sighting. Hacktivist auxiliaries hit Canadian targets. Deepen Desai of Zscaler describes job scams following tech layoffs. Our guest is Kelly Shortridge from Fastly with insights on the risks from bots. And there’s been an arrest in the Discord Papers case.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/72

Selected reading.
Read The Manual Locker: A Private RaaS Provider (Trellix)
Phishing Campaign Targets Chinese Nuclear Energy Industry (Intezer)
Espionage campaign linked to Russian intelligence services (Baza wiedzy)
Russian cyberspies hit NATO and EU organizations with new malware toolset (CSO Online)
Pro-Russia hackers say they were behind Hydro-Quebec cyberattack (Montreal CTV News - 04-13-2023)
Cyberattack knocks out website and mobile app for Quebec’s hydro utility (Toronto Star)
F.B.I. Arrests National Guardsman in Leak of Classified Document (New York Times)
DOD Calls Document Leak 'a Criminal Act' (U.S. Department of Defense)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 14 Apr 2023 20:15:00 -0000</pubDate>
      <itunes:title>"Read the Manual" and the ransomware-as-a-service market. Bitter APT against energy companies. Cozy Bear sighting. Hacktivist auxiliaries hit Canadian targets. Aan arrest in the Discord Papers case.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1802</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>"Read the Manual" and the ransomware-as-a-service market. Bitter APT may be targeting Asia-Pacific energy companies. A Cozy Bear sighting. Hacktivist auxiliaries hit Canadian targets. Deepen Desai of Zscaler describes job scams following tech layoffs. Our guest is Kelly Shortridge from Fastly with insights on the risks from bots. And there’s been an arrest in the Discord Papers case.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/72

Selected reading.
Read The Manual Locker: A Private RaaS Provider (Trellix)
Phishing Campaign Targets Chinese Nuclear Energy Industry (Intezer)
Espionage campaign linked to Russian intelligence services (Baza wiedzy)
Russian cyberspies hit NATO and EU organizations with new malware toolset (CSO Online)
Pro-Russia hackers say they were behind Hydro-Quebec cyberattack (Montreal CTV News - 04-13-2023)
Cyberattack knocks out website and mobile app for Quebec’s hydro utility (Toronto Star)
F.B.I. Arrests National Guardsman in Leak of Classified Document (New York Times)
DOD Calls Document Leak 'a Criminal Act' (U.S. Department of Defense)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>"Read the Manual" and the ransomware-as-a-service market. Bitter APT may be targeting Asia-Pacific energy companies. A Cozy Bear sighting. Hacktivist auxiliaries hit Canadian targets. Deepen Desai of Zscaler describes job scams following tech layoffs. Our guest is Kelly Shortridge from Fastly with insights on the risks from bots. And there’s been an arrest in the Discord Papers case.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/72</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.trellix.com/en-us/about/newsroom/stories/research/read-the-manual-locker-a-private-raas-provider.html">Read The Manual Locker: A Private RaaS Provider</a> (Trellix)</p><p><a href="https://www.intezer.com/blog/research/phishing-campaign-targets-nuclear-energy-industry/">Phishing Campaign Targets Chinese Nuclear Energy Industry</a> (Intezer)</p><p><a href="https://www.gov.pl/web/baza-wiedzy/espionage-campaign-linked-to-russian-intelligence-services?mod=djemCybersecruityPro&amp;tpl=cy">Espionage campaign linked to Russian intelligence services </a>(Baza wiedzy)</p><p><a href="https://www.csoonline.com/article/3693252/russian-cyberspies-hit-nato-and-eu-organizations-with-new-malware-toolset.html">Russian cyberspies hit NATO and EU organizations with new malware toolset</a> (CSO Online)</p><p><a href="https://montreal.ctvnews.ca/cyber-attack-at-hydro-quebec-pro-russia-hackers-claim-responsibility-1.6353627">Pro-Russia hackers say they were behind Hydro-Quebec cyberattack</a> (Montreal CTV News - 04-13-2023)</p><p><a href="https://www.thestar.com/politics/2023/04/13/cyberattack-knocks-out-website-and-mobile-app-for-quebecs-hydro-utility.html">Cyberattack knocks out website and mobile app for Quebec’s hydro utility</a> (Toronto Star)</p><p><a href="https://www.nytimes.com/2023/04/13/world/documents-leak-leaker-identity.html">F.B.I. Arrests National Guardsman in Leak of Classified Document</a> (New York Times)</p><p><a href="https://www.defense.gov/News/News-Stories/Article/Article/3362394/dod-calls-document-leak-a-criminal-act/">DOD Calls Document Leak 'a Criminal Act'</a> (U.S. Department of Defense)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1753</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2fb35090-8167-11ed-9779-17973b8a86f7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8759889143.mp3?updated=1690331944" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Transparent Tribe seems to want people’s lab notes, and other stories of cyberespionage. The FBI warns of juicejacking. And the Discord leaker seems to have been a 20-something influencer. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1801/notes</link>
      <description>Transparent Tribe expands its activity against India's education sector. A Lazarus sub-group is after defense sector targets. The FBI's Denver office warns of potential juicejacking. Legion: a Python-based credential harvester. The source of leaked US intelligence may be closer to identification. Johannes Ullrich from SANS explains upwork scams. Our guest is Charlie "Tuna" Moore of Vanderbilt University on the cyber lessons from Russia’s war on Ukraine. Canada responds to claims of Russian cyberattacks.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/71

Selected reading.
Transparent Tribe (APT36) | Pakistan-Aligned Threat Actor Expands Interest in Indian Education Sector (SentinelOne)
Following the Lazarus group by tracking DeathNote campaign (Securelist)
DPRK threat actors target C3X and defense sector at large. (CyberWire)
FBI office warns against using public phone charging stations at airports or malls, citing malware risk (CBS News)
The FBI warns of juicejacking and other risks of public tech. (CyberWire)
Legion: an AWS Credential Harvester and SMTP Hijacker (Cado Security) 
The Legion credential harvester. (CyberWire)
Leaker of U.S. secret documents worked on military base, friend says (Washington Post)
U.S. may change how it monitors the web after missing leaked documents for weeks (NBC News)
Cyberattacks on Canada’s gas infrastructure left ‘no physical damage,’ Trudeau says (Global News)
Russian attacks on Ukrainian infrastructure cause internet outages, cutting off a valuable wartime tool (CyberScoop)
US Warns Russia Getting Creative in Cyberspace (VOA)
APT Winter Vivern Resurfaces (Avertium)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 13 Apr 2023 20:15:00 -0000</pubDate>
      <itunes:title>Transparent Tribe seems to want people’s lab notes, and other stories of cyberespionage. The FBI warns of juicejacking. And the Discord leaker seems to have been a 20-something influencer. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1801</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Transparent Tribe expands its activity against India's education sector. A Lazarus sub-group is after defense sector targets. The FBI's Denver office warns of potential juicejacking. Legion: a Python-based credential harvester. The source of leaked US intelligence may be closer to identification. Johannes Ullrich from SANS explains upwork scams. Our guest is Charlie "Tuna" Moore of Vanderbilt University on the cyber lessons from Russia’s war on Ukraine. Canada responds to claims of Russian cyberattacks.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/71

Selected reading.
Transparent Tribe (APT36) | Pakistan-Aligned Threat Actor Expands Interest in Indian Education Sector (SentinelOne)
Following the Lazarus group by tracking DeathNote campaign (Securelist)
DPRK threat actors target C3X and defense sector at large. (CyberWire)
FBI office warns against using public phone charging stations at airports or malls, citing malware risk (CBS News)
The FBI warns of juicejacking and other risks of public tech. (CyberWire)
Legion: an AWS Credential Harvester and SMTP Hijacker (Cado Security) 
The Legion credential harvester. (CyberWire)
Leaker of U.S. secret documents worked on military base, friend says (Washington Post)
U.S. may change how it monitors the web after missing leaked documents for weeks (NBC News)
Cyberattacks on Canada’s gas infrastructure left ‘no physical damage,’ Trudeau says (Global News)
Russian attacks on Ukrainian infrastructure cause internet outages, cutting off a valuable wartime tool (CyberScoop)
US Warns Russia Getting Creative in Cyberspace (VOA)
APT Winter Vivern Resurfaces (Avertium)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Transparent Tribe expands its activity against India's education sector. A Lazarus sub-group is after defense sector targets. The FBI's Denver office warns of potential juicejacking. Legion: a Python-based credential harvester. The source of leaked US intelligence may be closer to identification. Johannes Ullrich from SANS explains upwork scams. Our guest is Charlie "Tuna" Moore of Vanderbilt University on the cyber lessons from Russia’s war on Ukraine. Canada responds to claims of Russian cyberattacks.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/71</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.sentinelone.com/labs/transparent-tribe-apt36-pakistan-aligned-threat-actor-expands-interest-in-indian-education-sector/">Transparent Tribe (APT36) | Pakistan-Aligned Threat Actor Expands Interest in Indian Education Sector</a> (SentinelOne)</p><p><a href="https://securelist.com/the-lazarus-group-deathnote-campaign/109490/">Following the Lazarus group by tracking DeathNote campaign</a> (Securelist)</p><p><a href="https://thecyberwire.com/stories/0135a5431c8c41ebb0e008e3001a94b5/dprk-threat-actors-target-c3x-and-defense-sector-at-large">DPRK threat actors target C3X and defense sector at large.</a> (CyberWire)</p><p><a href="https://www.cbsnews.com/news/fbi-warns-against-juice-jacking-what-is-it/">FBI office warns against using public phone charging stations at airports or malls, citing malware risk</a> (CBS News)</p><p><a href="https://thecyberwire.com/stories/5cce3eded6df4a059dd9b383c4341b98/the-fbi-warns-of-juicejacking-and-other-risks-of-public-tech">The FBI warns of juicejacking and other risks of public tech.</a> (CyberWire)</p><p><a href="https://www.cadosecurity.com/legion-an-aws-credential-harvester-and-smtp-hijacker/">Legion: an AWS Credential Harvester and SMTP Hijacker</a> (Cado Security) </p><p><a href="https://thecyberwire.com/stories/080dc7143b434cafb888e108c045a238/the-legion-credential-harvester">The Legion credential harvester.</a> (CyberWire)</p><p><a href="https://www.washingtonpost.com/national-security/2023/04/12/discord-leaked-documents/">Leaker of U.S. secret documents worked on military base, friend says</a> (Washington Post)</p><p><a href="https://www.nbcnews.com/politics/national-security/us-intel-agencies-missed-classified-documents-leaked-on-discord-rcna79404">U.S. may change how it monitors the web after missing leaked documents for weeks</a> (NBC News)</p><p><a href="https://globalnews.ca/news/9614872/cyberattack-gas-infrastructure-justin-trudeau/">Cyberattacks on Canada’s gas infrastructure left ‘no physical damage,’ Trudeau says</a> (Global News)</p><p><a href="https://cyberscoop.com/ukraine-internet-outages-infrastructure-attacks/">Russian attacks on Ukrainian infrastructure cause internet outages, cutting off a valuable wartime tool</a> (CyberScoop)</p><p><a href="https://www.voanews.com/a/us-warns-russia-getting-creative-in-cyberspace-/7046275.html">US Warns Russia Getting Creative in Cyberspace</a> (VOA)</p><p><a href="https://explore.avertium.com/resource/apt-winter-vivern-resurfaces">APT Winter Vivern Resurfaces</a> (Avertium)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1836</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2f6646c4-8167-11ed-9779-47790b66e8cb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4193766702.mp3?updated=1690331913" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patch Tuesday notes. Cyber mercenaries described. Voice security and fraud. CISA’s update to its Zero Trust Maturity Model. Updates on Russia’s hybrid war against Ukraine. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1800/notes</link>
      <description>Patch Tuesday update. Another commercial surveillance company is outed. Voice security and the challenge of fraud. CISA updates its Zero Trust Maturity Model. Effects of the US intelligence leaks. Our guest Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA, outlines CISA's role in the cybersecurity community. André Keartland of Netsurit makes the case for DevSecOps. Russian cyber auxiliaries believed responsible for disrupting the Canadian PM's website.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/70

Selected reading.
Patch Tuesday overview. (CyberWire)
DEV-0196: QuaDream’s “KingsPawn” malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia (Microsoft Threat Intelligence) 
Threat Report on the Surveillance-for-Hire Industry (Meta)
Sweet QuaDreams: A First Look at Spyware Vendor QuaDream’s Exploits, Victims, and Customers (The Citizen Lab)
Voice Intelligence and Security Report (Pindrop)
CISA Releases updated Zero Trust Maturity Model (Cybersecurity and Infrastructure Security Agency)
CISA Releases Zero Trust Maturity Model Version 2 (Cybersecurity and Infrastructure Security Agency CISA)
A leak of files could be America’s worst intelligence breach in a decade (The Economist)
Interagency Effort Assessing Impact of Leaked Documents, Strategizing Way Forward (U.S. Department of Defense)
What we know about the Pentagon document leak (Axios)
The ongoing scandal over leaked US intel documents, explained (Vox)
Pentagon leak threatens Biden's foreign policy doctrine ahead of overseas trip (Axios)
Schumer calls for all-senator briefing on leaked Ukraine documents (The Hill)
The key countries and revelations from the Pentagon document leak (Washington Post) 
Exclusive: Leaked U.S. intel document claims Serbia agreed to arm Ukraine (Reuters) 
Up to 50 UK special forces present in Ukraine this year, US leak suggests (the Guardian)
Egypt denies leak about supplying Russia with 40,000 rockets (Al Jazeera)
DDoS attacks block PM Trudeau’s web site (IT World Canada)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 12 Apr 2023 20:15:00 -0000</pubDate>
      <itunes:title>Patch Tuesday notes. Cyber mercenaries described. Voice security and fraud. CISA’s update to its Zero Trust Maturity Model. Updates on Russia’s hybrid war against Ukraine. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1800</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Patch Tuesday update. Another commercial surveillance company is outed. Voice security and the challenge of fraud. CISA updates its Zero Trust Maturity Model. Effects of the US intelligence leaks. Our guest Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA, outlines CISA's role in the cybersecurity community. André Keartland of Netsurit makes the case for DevSecOps. Russian cyber auxiliaries believed responsible for disrupting the Canadian PM's website.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/70

Selected reading.
Patch Tuesday overview. (CyberWire)
DEV-0196: QuaDream’s “KingsPawn” malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia (Microsoft Threat Intelligence) 
Threat Report on the Surveillance-for-Hire Industry (Meta)
Sweet QuaDreams: A First Look at Spyware Vendor QuaDream’s Exploits, Victims, and Customers (The Citizen Lab)
Voice Intelligence and Security Report (Pindrop)
CISA Releases updated Zero Trust Maturity Model (Cybersecurity and Infrastructure Security Agency)
CISA Releases Zero Trust Maturity Model Version 2 (Cybersecurity and Infrastructure Security Agency CISA)
A leak of files could be America’s worst intelligence breach in a decade (The Economist)
Interagency Effort Assessing Impact of Leaked Documents, Strategizing Way Forward (U.S. Department of Defense)
What we know about the Pentagon document leak (Axios)
The ongoing scandal over leaked US intel documents, explained (Vox)
Pentagon leak threatens Biden's foreign policy doctrine ahead of overseas trip (Axios)
Schumer calls for all-senator briefing on leaked Ukraine documents (The Hill)
The key countries and revelations from the Pentagon document leak (Washington Post) 
Exclusive: Leaked U.S. intel document claims Serbia agreed to arm Ukraine (Reuters) 
Up to 50 UK special forces present in Ukraine this year, US leak suggests (the Guardian)
Egypt denies leak about supplying Russia with 40,000 rockets (Al Jazeera)
DDoS attacks block PM Trudeau’s web site (IT World Canada)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Patch Tuesday update. Another commercial surveillance company is outed. Voice security and the challenge of fraud. CISA updates its Zero Trust Maturity Model. Effects of the US intelligence leaks. Our guest Eric Goldstein, Executive Assistant Director for Cybersecurity at CISA, outlines CISA's role in the cybersecurity community. André Keartland of Netsurit makes the case for DevSecOps. Russian cyber auxiliaries believed responsible for disrupting the Canadian PM's website.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/70</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/stories/033d7baa8bfc46838f4aca60861b7458/patch-tuesday-overview">Patch Tuesday overview.</a> (CyberWire)</p><p><a href="https://www.microsoft.com/en-us/security/blog/2023/04/11/dev-0196-quadreams-kingspawn-malware-used-to-target-civil-society-in-europe-north-america-the-middle-east-and-southeast-asia/">DEV-0196: QuaDream’s “KingsPawn” malware used to target civil society in Europe, North America, the Middle East, and Southeast Asia</a> (Microsoft Threat Intelligence) </p><p><a href="https://about.fb.com/wp-content/uploads/2022/12/Threat-Report-on-the-Surveillance-for-Hire-Industry.pdf">Threat Report on the Surveillance-for-Hire Industry</a> (Meta)</p><p><a href="https://citizenlab.ca/2023/04/spyware-vendor-quadream-exploits-victims-customers/">Sweet QuaDreams: A First Look at Spyware Vendor QuaDream’s Exploits, Victims, and Customers</a> (The Citizen Lab)</p><p><a href="https://go.pindrop.com/resources/report/2023-voice-intelligence-and-security-report/">Voice Intelligence and Security Report</a> (Pindrop)</p><p><a href="https://content.govdelivery.com/accounts/USDHSCISA/bulletins/3543f28">CISA Releases updated Zero Trust Maturity Model</a> (Cybersecurity and Infrastructure Security Agency)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/04/11/cisa-releases-zero-trust-maturity-model-version-2">CISA Releases Zero Trust Maturity Model Version 2</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.economist.com/united-states/2023/04/10/a-leak-of-files-could-be-americas-worst-intelligence-breach-in-a-decade">A leak of files could be America’s worst intelligence breach in a decade</a> (The Economist)</p><p><a href="https://www.defense.gov/News/News-Stories/Article/Article/3358906/interagency-effort-assessing-impact-of-leaked-documents-strategizing-way-forward/">Interagency Effort Assessing Impact of Leaked Documents, Strategizing Way Forward</a> (U.S. Department of Defense)</p><p><a href="https://www.axios.com/2023/04/10/what-we-know-pentagon-document-leak">What we know about the Pentagon document leak</a> (Axios)</p><p><a href="https://www.vox.com/world-politics/2023/4/10/23677820/leaked-intelligence-documents-ukraine-war-discord-4chan">The ongoing scandal over leaked US intel documents, explained</a> (Vox)</p><p><a href="https://www.axios.com/2023/04/11/pentagon-intelligence-leak-biden-allies">Pentagon leak threatens Biden's foreign policy doctrine ahead of overseas trip</a> (Axios)</p><p><a href="https://thehill.com/policy/defense/3943967-schumer-all-senators-leaked-ukraine-documents-briefing/">Schumer calls for all-senator briefing on leaked Ukraine documents</a> (The Hill)</p><p><a href="https://www.washingtonpost.com/world/2023/04/10/pentagon-document-leak-russia-china-israel/">The key countries and revelations from the Pentagon document leak</a> (Washington Post) </p><p><a href="https://www.reuters.com/world/leaked-us-intel-document-claims-serbia-agreed-arm-ukraine-2023-04-12/">Exclusive: Leaked U.S. intel document claims Serbia agreed to arm Ukraine</a> (Reuters) </p><p><a href="https://www.theguardian.com/uk-news/2023/apr/11/up-to-50-uk-special-forces-present-in-ukraine-this-year-us-leak-suggests">Up to 50 UK special forces present in Ukraine this year, US leak suggests</a> (the Guardian)</p><p><a href="https://www.aljazeera.com/news/2023/4/12/egypt-denies-leak-about-supplying-russia-with-40000-rockets">Egypt denies leak about supplying Russia with 40,000 rockets</a> (Al Jazeera)</p><p><a href="https://www.itworldcanada.com/article/breaking-news-ddos-attacks-block-pm-trudeaus-web-site/536110">DDoS attacks block PM Trudeau’s web site</a> (IT World Canada)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1760</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2ebeb256-8167-11ed-9779-4be0ebe527c5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7206053914.mp3?updated=1690331896" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>IAM trends. RagnarLocker as a critical infrastructure threat. AI hype as phishbait. Updates on the hybrid war: leaks and hacks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1799/notes</link>
      <description>Key trends in Identity Access Management. RagnarLocker and critical infrastructure. Cyber criminals capitalize on the AI hype. Updates on the leaked US classified documents, and speculation of whether Russian hackers compromised a Canadian gas pipeline. Ben Yelin describes a multimillion dollar settlement over biometric data. Microsoft’s Ann Johnson from Afternoon Cyber Tea talking about cyber paradigm shifts with Samir Kapuria. And a welcome to GCHQ's new boss.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/69

Selected reading.
4 key trends from the Gartner IAM Summit 2023 (Venture Beat)
Threat Actor Spotlight: Ragnarlocker Ransomware (Sygnia)
From Chatgpt To Redline Stealer: The Dark Side Of Openai And Google Bard (Veriti)
Biden administration doesn't know extent of classified Pentagon document leak (CBS News) 
Ukraine ‘alters counter-offensive plans’ after Pentagon leak (The Telegraph) 
Ukraine had to change military plans because of US Pentagon leak, source says (CNN) 
Leaked Pentagon documents claim that hackers breached a Canadian gas network. Here’s what to know. (Washington Post)
Pro-Russia Hackers Say They Breached Canadian Pipeline, but Experts Are Skeptical (Wall Street Journal)
Leaked US intel: Russia operatives claimed new ties with UAE (AP NEWS)
Egypt secretly planned to supply rockets to Russia, leaked U.S. document says (Washington Post)
How the Latest Leaked Documents Are Different From Past Breaches (New York Times)
How U.S. friends and foes have responded to leaked Pentagon documents (Washington Post) 
Pentagon leaks: US seeks to mend ties after claims Washington spied on key allies (the Guardian)
Pentagon Probe Under Way in Leaks Case (Wall Street Journal)
Pentagon assessing damage after 'highly classified' US secrets leaked online (Breaking Defense) 
The Pentagon’s Purported Classified-Document Leak: The Biggest Takeaways and Questions So Far (Wall Street Journal)
The ongoing scandal over leaked US intel documents, explained (Vox)
Leaked documents a 'very serious' risk to security: Pentagon (AP NEWS)
The Discord servers at the center of a massive US intelligence leak (CyberScoop) 
Social-Media Platform Discord Emerges at Center of Classified U.S. Documents Leak (Wall Street Journal)
Why Leaked Pentagon Documents Are Still Circulating on Social Media (New York Times)
Clues Left Online Might Aid Leak Investigation, Officials Say (New York Times
Ukraine at D+411: US leaks remain under investigation. (CyberWire)
New Director GCHQ announced (GCHQ)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Apr 2023 20:15:00 -0000</pubDate>
      <itunes:title>IAM trends. RagnarLocker as a critical infrastructure threat. AI hype as phishbait. Updates on the hybrid war: leaks and hacks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1799</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Key trends in Identity Access Management. RagnarLocker and critical infrastructure. Cyber criminals capitalize on the AI hype. Updates on the leaked US classified documents, and speculation of whether Russian hackers compromised a Canadian gas pipeline. Ben Yelin describes a multimillion dollar settlement over biometric data. Microsoft’s Ann Johnson from Afternoon Cyber Tea talking about cyber paradigm shifts with Samir Kapuria. And a welcome to GCHQ's new boss.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/69

Selected reading.
4 key trends from the Gartner IAM Summit 2023 (Venture Beat)
Threat Actor Spotlight: Ragnarlocker Ransomware (Sygnia)
From Chatgpt To Redline Stealer: The Dark Side Of Openai And Google Bard (Veriti)
Biden administration doesn't know extent of classified Pentagon document leak (CBS News) 
Ukraine ‘alters counter-offensive plans’ after Pentagon leak (The Telegraph) 
Ukraine had to change military plans because of US Pentagon leak, source says (CNN) 
Leaked Pentagon documents claim that hackers breached a Canadian gas network. Here’s what to know. (Washington Post)
Pro-Russia Hackers Say They Breached Canadian Pipeline, but Experts Are Skeptical (Wall Street Journal)
Leaked US intel: Russia operatives claimed new ties with UAE (AP NEWS)
Egypt secretly planned to supply rockets to Russia, leaked U.S. document says (Washington Post)
How the Latest Leaked Documents Are Different From Past Breaches (New York Times)
How U.S. friends and foes have responded to leaked Pentagon documents (Washington Post) 
Pentagon leaks: US seeks to mend ties after claims Washington spied on key allies (the Guardian)
Pentagon Probe Under Way in Leaks Case (Wall Street Journal)
Pentagon assessing damage after 'highly classified' US secrets leaked online (Breaking Defense) 
The Pentagon’s Purported Classified-Document Leak: The Biggest Takeaways and Questions So Far (Wall Street Journal)
The ongoing scandal over leaked US intel documents, explained (Vox)
Leaked documents a 'very serious' risk to security: Pentagon (AP NEWS)
The Discord servers at the center of a massive US intelligence leak (CyberScoop) 
Social-Media Platform Discord Emerges at Center of Classified U.S. Documents Leak (Wall Street Journal)
Why Leaked Pentagon Documents Are Still Circulating on Social Media (New York Times)
Clues Left Online Might Aid Leak Investigation, Officials Say (New York Times
Ukraine at D+411: US leaks remain under investigation. (CyberWire)
New Director GCHQ announced (GCHQ)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Key trends in Identity Access Management. RagnarLocker and critical infrastructure. Cyber criminals capitalize on the AI hype. Updates on the leaked US classified documents, and speculation of whether Russian hackers compromised a Canadian gas pipeline. Ben Yelin describes a multimillion dollar settlement over biometric data. Microsoft’s Ann Johnson from Afternoon Cyber Tea talking about cyber paradigm shifts with Samir Kapuria. And a welcome to GCHQ's new boss.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/69</p><p><br></p><h2>Selected reading.</h2><p><a href="https://venturebeat.com/security/4-key-trends-from-the-gartner-iam-summit-2023/">4 key trends from the Gartner IAM Summit 2023</a> (Venture Beat)</p><p><a href="https://blog.sygnia.co/threat-actor-spotlight-ragnarlocker-ransomware">Threat Actor Spotlight: Ragnarlocker Ransomware</a> (Sygnia)</p><p><a href="https://veriti.ai/blog/research/from-chatgpt-to-redline-stealer-the-dark-side-of-openai-and-google-bard/">From Chatgpt To Redline Stealer: The Dark Side Of Openai And Google Bard</a> (Veriti)</p><p><a href="https://www.cbsnews.com/news/biden-administration-doesnt-know-extent-of-classified-pentagon-document-leak/">Biden administration doesn't know extent of classified Pentagon document leak</a> (CBS News) </p><p><a href="https://www.telegraph.co.uk/world-news/2023/04/10/ukraine-russia-pentagon-intelligence-leak-zelensky/">Ukraine ‘alters counter-offensive plans’ after Pentagon leak</a> (The Telegraph) </p><p><a href="https://www.cnn.com/europe/live-news/russia-ukraine-war-news-04-10-23/h_914af64ebda68d865ddb77865d753c7a">Ukraine had to change military plans because of US Pentagon leak, source says</a> (CNN) </p><p><a href="https://www.washingtonpost.com/politics/2023/04/11/leaked-pentagon-documents-claim-that-hackers-breached-canadian-gas-network-heres-what-know/">Leaked Pentagon documents claim that hackers breached a Canadian gas network. Here’s what to know.</a> (Washington Post)</p><p><a href="https://www.wsj.com/articles/pro-russia-hackers-say-they-breached-canadian-pipeline-but-experts-are-skeptical-5898f288">Pro-Russia Hackers Say They Breached Canadian Pipeline, but Experts Are Skeptical</a> (Wall Street Journal)</p><p><a href="https://apnews.com/article/intelligence-leak-russia-uae-pentagon-9941a3bb88b48d4dbb5218649ea67325">Leaked US intel: Russia operatives claimed new ties with UAE</a> (AP NEWS)</p><p><a href="https://www.washingtonpost.com/national-security/2023/04/10/egypt-weapons-russia/">Egypt secretly planned to supply rockets to Russia, leaked U.S. document says</a> (Washington Post)</p><p><a href="https://www.nytimes.com/2023/04/09/us/politics/leaked-pentagon-documents-ukraine.html">How the Latest Leaked Documents Are Different From Past Breaches</a> (New York Times)</p><p><a href="https://www.washingtonpost.com/world/2023/04/10/reactions-pentagon-documents-israel-russia-ukraine-south-korea/">How U.S. friends and foes have responded to leaked Pentagon documents</a> (Washington Post) </p><p><a href="https://www.theguardian.com/us-news/2023/apr/11/pentagon-leaks-us-seeks-to-mend-ties-after-claims-washington-spied-on-key-allies">Pentagon leaks: US seeks to mend ties after claims Washington spied on key allies</a> (the Guardian)</p><p><a href="https://www.wsj.com/articles/pentagon-probe-under-way-in-leaks-case-303d7fda">Pentagon Probe Under Way in Leaks Case</a> (Wall Street Journal)</p><p><a href="https://breakingdefense.com/2023/04/pentagon-assessing-damage-after-highly-classified-us-secrets-leaked-online/">Pentagon assessing damage after 'highly classified' US secrets leaked online</a> (Breaking Defense) </p><p><a href="https://www.wsj.com/articles/pentagon-leak-classified-intelligence-documents-takeaways-6dd576b8">The Pentagon’s Purported Classified-Document Leak: The Biggest Takeaways and Questions So Far</a> (Wall Street Journal)</p><p><a href="https://www.vox.com/world-politics/2023/4/10/23677820/leaked-intelligence-documents-ukraine-war-discord-4chan">The ongoing scandal over leaked US intel documents, explained</a> (Vox)</p><p><a href="https://apnews.com/article/leaked-documents-classified-russia-ukraine-e351c6613e69bf8d714b03e367543da8">Leaked documents a 'very serious' risk to security: Pentagon</a> (AP NEWS)</p><p><a href="https://cyberscoop.com/discord-intelligence-leak-ukraine/">The Discord servers at the center of a massive US intelligence leak</a> (CyberScoop) </p><p><a href="https://www.wsj.com/articles/social-media-platform-discord-emerges-at-center-of-classified-u-s-documents-leak-2fa87de">Social-Media Platform Discord Emerges at Center of Classified U.S. Documents Leak</a> (Wall Street Journal)</p><p><a href="https://www.nytimes.com/2023/04/08/technology/leaked-pentagon-documents-twitter-discord.html">Why Leaked Pentagon Documents Are Still Circulating on Social Media</a> (New York Times)</p><p><a href="https://www.nytimes.com/2023/04/10/us/politics/classified-documents-leak.html">Clues Left Online Might Aid Leak Investigation, Officials Say</a> (New York Times</p><p><a href="https://thecyberwire.com/stories/2887a4a6e2054337aa4b555546a835fb/ukraine-at-d411-us-leaks-remain-under-investigation">Ukraine at D+411: US leaks remain under investigation.</a> (CyberWire)</p><p><a href="https://www.gchq.gov.uk/news/new-director">New Director GCHQ announced</a> (GCHQ)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1687</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2e7160a0-8167-11ed-9779-2be890f57567]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6993536459.mp3?updated=1690331874" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A look at Iran’s MERCURY APT. Updates on Russia's hybrid war, including some apparent leaks and some apparent doxing. And notes on cloud security trends. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1798/notes</link>
      <description>An Iranian APT MERCURY exploits known vulnerabilities. The US investigates apparent leaks of classified information about Russia's war against Ukraine. KillNet claims it has paralyzed NATO websites. More apparent doxing of the GRU. Britta Glade and Monica Koshgarian of RSA Conference talking about content curation. Grayson Milbourne from OpenText Cybersecurity hopes to remove shame from cyber attacks. And, finally, some notes on cloud security trends.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/68

Selected reading.
MERCURY and DEV-1084: Destructive attack on hybrid environment (Microsoft Threat Intelligence)
Leaked US battlefield intelligence on Ukraine is fake, says Kyiv (The Telegraph) 
Russia Claims Leaked Pentagon Intelligence on Ukraine is U.S. Disinformation (US News and World Report) 
Leaked US secret NATO-Ukraine war docs likely altered, say experts (SC Media) 
Ukraine’s air defences could soon run out of missiles, apparent Pentagon leak suggests (the Guardian) 
Russia nearly shot down British spy plane near Ukraine, leaked document says (Washington Post) 
Justice Dept. will investigate leak of classified Pentagon documents (Washington Post) 
US investigating whether Ukraine war documents were leaked (Military Times)
U.S. Reviewing Online Appearance Of Sensitive Documents Related To Ukraine, Pentagon Says (RadioFreeEurope/RadioLiberty) 
WSJ News Exclusive | Pentagon Investigates More Social-Media Posts Purporting to Include Secret U.S. Documents (Wall Street Journal) 
New Details on Intelligence Leak Show It Circulated for Weeks Before Raising Alarm (Wall Street Journal) 
Intelligence leak exposes U.S. spying on adversaries and allies (Washington Post) 
Secret US Documents on Ukraine War Plan Spill Onto Internet: Report (SecurityWeek) 
US hit by ‘worst leak of secret documents since Edward Snowden’ (The Telegraph)
Ukraine at D+410: Static, sanguinary lines. (CyberWire)
Report Finds 90% of IT Professionals Have Experienced a Cybersecurity Breach (Skyhigh Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 10 Apr 2023 20:20:00 -0000</pubDate>
      <itunes:title>A look at Iran’s MERCURY APT. Updates on Russia's hybrid war, including some apparent leaks and some apparent doxing. And notes on cloud security trends. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1798</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An Iranian APT MERCURY exploits known vulnerabilities. The US investigates apparent leaks of classified information about Russia's war against Ukraine. KillNet claims it has paralyzed NATO websites. More apparent doxing of the GRU. Britta Glade and Monica Koshgarian of RSA Conference talking about content curation. Grayson Milbourne from OpenText Cybersecurity hopes to remove shame from cyber attacks. And, finally, some notes on cloud security trends.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/68

Selected reading.
MERCURY and DEV-1084: Destructive attack on hybrid environment (Microsoft Threat Intelligence)
Leaked US battlefield intelligence on Ukraine is fake, says Kyiv (The Telegraph) 
Russia Claims Leaked Pentagon Intelligence on Ukraine is U.S. Disinformation (US News and World Report) 
Leaked US secret NATO-Ukraine war docs likely altered, say experts (SC Media) 
Ukraine’s air defences could soon run out of missiles, apparent Pentagon leak suggests (the Guardian) 
Russia nearly shot down British spy plane near Ukraine, leaked document says (Washington Post) 
Justice Dept. will investigate leak of classified Pentagon documents (Washington Post) 
US investigating whether Ukraine war documents were leaked (Military Times)
U.S. Reviewing Online Appearance Of Sensitive Documents Related To Ukraine, Pentagon Says (RadioFreeEurope/RadioLiberty) 
WSJ News Exclusive | Pentagon Investigates More Social-Media Posts Purporting to Include Secret U.S. Documents (Wall Street Journal) 
New Details on Intelligence Leak Show It Circulated for Weeks Before Raising Alarm (Wall Street Journal) 
Intelligence leak exposes U.S. spying on adversaries and allies (Washington Post) 
Secret US Documents on Ukraine War Plan Spill Onto Internet: Report (SecurityWeek) 
US hit by ‘worst leak of secret documents since Edward Snowden’ (The Telegraph)
Ukraine at D+410: Static, sanguinary lines. (CyberWire)
Report Finds 90% of IT Professionals Have Experienced a Cybersecurity Breach (Skyhigh Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An Iranian APT MERCURY exploits known vulnerabilities. The US investigates apparent leaks of classified information about Russia's war against Ukraine. KillNet claims it has paralyzed NATO websites. More apparent doxing of the GRU. Britta Glade and Monica Koshgarian of RSA Conference talking about content curation. Grayson Milbourne from OpenText Cybersecurity hopes to remove shame from cyber attacks. And, finally, some notes on cloud security trends.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/68</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.microsoft.com/en-us/security/blog/2023/04/07/mercury-and-dev-1084-destructive-attack-on-hybrid-environment/">MERCURY and DEV-1084: Destructive attack on hybrid environment</a> (Microsoft Threat Intelligence)</p><p><a href="https://www.telegraph.co.uk/world-news/2023/04/07/ukraines-forces-for-counter-offensive-is-photoshopped-us/">Leaked US battlefield intelligence on Ukraine is fake, says Kyiv</a> (The Telegraph) </p><p><a href="https://www.usnews.com/news/world-report/articles/2023-04-07/russia-claims-leaked-pentagon-intelligence-on-ukraine-is-u-s-disinformation">Russia Claims Leaked Pentagon Intelligence on Ukraine is U.S. Disinformation</a> (US News and World Report) </p><p><a href="https://www.scmagazine.com/news/policy/us-nato-ukraine-docs-altered">Leaked US secret NATO-Ukraine war docs likely altered, say experts</a> (SC Media) </p><p><a href="https://www.theguardian.com/us-news/2023/apr/10/ukraines-air-defences-could-soon-run-out-of-missiles-apparent-pentagon-leak-suggests">Ukraine’s air defences could soon run out of missiles, apparent Pentagon leak suggests</a> (the Guardian) </p><p><a href="https://www.washingtonpost.com/national-security/2023/04/09/leaked-documents-surveillance-plane-rivet-joint/">Russia nearly shot down British spy plane near Ukraine, leaked document says</a> (Washington Post) </p><p><a href="https://www.washingtonpost.com/national-security/2023/04/07/pentagon-leak-ukraine-documents/">Justice Dept. will investigate leak of classified Pentagon documents</a> (Washington Post) </p><p><a href="https://www.militarytimes.com/flashpoints/ukraine/2023/04/09/us-investigating-whether-ukraine-war-documents-were-leaked/">US investigating whether Ukraine war documents were leaked</a> (Military Times)</p><p><a href="https://www.rferl.org/a/document-leak-ukraine-russia-casualties-war/32354417.html#0_8_10089_8765_2710_247380728">U.S. Reviewing Online Appearance Of Sensitive Documents Related To Ukraine, Pentagon Says</a> (RadioFreeEurope/RadioLiberty) </p><p><a href="https://www.wsj.com/articles/pentagon-says-it-is-reviewing-social-media-posts-that-purport-to-reveal-classified-documents-on-ukraine-4d7524f">WSJ News Exclusive | Pentagon Investigates More Social-Media Posts Purporting to Include Secret U.S. Documents</a> (Wall Street Journal) </p><p><a href="https://www.wsj.com/articles/new-details-on-intelligence-leak-show-it-circulated-for-weeks-before-raising-alarm-7730a395">New Details on Intelligence Leak Show It Circulated for Weeks Before Raising Alarm</a> (Wall Street Journal) </p><p><a href="https://www.washingtonpost.com/national-security/2023/04/08/intelligence-leak-documents-ukraine-pentagon/">Intelligence leak exposes U.S. spying on adversaries and allies</a> (Washington Post) </p><p><a href="https://www.securityweek.com/secret-us-documents-on-ukraine-war-plan-spill-onto-internet-report/">Secret US Documents on Ukraine War Plan Spill Onto Internet: Report</a> (SecurityWeek) </p><p><a href="https://www.telegraph.co.uk/world-news/2023/04/08/us-secret-intelligence-leak-worst-since-edward-snowden/">US hit by ‘worst leak of secret documents since Edward Snowden’</a> (The Telegraph)</p><p><a href="https://thecyberwire.com/stories/0f5fbff2ed65489c95cc4c972570127f/ukraine-at-d410-static-sanguinary-lines">Ukraine at D+410: Static, sanguinary lines.</a> (CyberWire)</p><p><a href="https://www.skyhighsecurity.com/en-us/about/newsroom/news/item.html?workflowId=ff6592e2-3246-4ed1-9e01-1874e9ccd50a">Report Finds 90% of IT Professionals Have Experienced a Cybersecurity Breach</a> (Skyhigh Security)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1681</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2df09e8e-8167-11ed-9779-2f38fa1ac2a9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6610785322.mp3?updated=1690331847" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Karen Worstell: Keep your feet planted. [Strategy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/144/notes</link>
      <description>Karen Worstell, Senior Cybersecurity Strategist from VMware sits down to share her journey and discusses her experience as a woman in cyber. Starting her career off as a chemist, after graduating with a bachelor's degree in chemistry and a bachelor's degree in molecular biology, she took some time off to be with her family, she came back to a science field that was far more advanced than before she had left. She decided to go in another direction which led her to cyber. She started teaching herself programming and found she was very good at it. Now that she works in cyber, she says "You, you have to know yourself, know what you want, and know where you're, know where you plant your feet. I used to use a phrase a lot that said, uh, don't be afraid to take a stand but know where your feet are planted." We thank Karen for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 09 Apr 2023 07:00:00 -0000</pubDate>
      <itunes:title>Karen Worstell: Keep your feet planted. [Strategy] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>144</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Karen Worstell, Senior Cybersecurity Strategist from VMware sits down to share her journey and discusses her experience as a woman in cyber. Starting her career off as a chemist, after graduating with a bachelor's degree in chemistry and a bachelor's degree in molecular biology, she took some time off to be with her family, she came back to a science field that was far more advanced than before she had left. She decided to go in another direction which led her to cyber. She started teaching herself programming and found she was very good at it. Now that she works in cyber, she says "You, you have to know yourself, know what you want, and know where you're, know where you plant your feet. I used to use a phrase a lot that said, uh, don't be afraid to take a stand but know where your feet are planted." We thank Karen for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Karen Worstell, Senior Cybersecurity Strategist from VMware sits down to share her journey and discusses her experience as a woman in cyber. Starting her career off as a chemist, after graduating with a bachelor's degree in chemistry and a bachelor's degree in molecular biology, she took some time off to be with her family, she came back to a science field that was far more advanced than before she had left. She decided to go in another direction which led her to cyber. She started teaching herself programming and found she was very good at it. Now that she works in cyber, she says "You, you have to know yourself, know what you want, and know where you're, know where you plant your feet. I used to use a phrase a lot that said, uh, don't be afraid to take a stand but know where your feet are planted." We thank Karen for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>556</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1887286a-d572-11ed-8339-53d5fc464d7d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7805397472.mp3?updated=1680896297" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A dark side to LLMs. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/276/notes</link>
      <description>Sahar Abdelnabi from CISPA Helmholtz Center for Information Security sits down with Dave to discuss their work on "A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models." There is currently a large advance in the capabilities of Large Language Models or LLMs, as well as being integrated into many systems, including integrated development environments (IDEs) and search engines.
The research states, "The functionalities of current LLMs can be modulated via natural language prompts, while their exact internal functionality remains implicit and unassessable." This could lead them to be susceptible to targeted adversarial prompting, as well as making them adaptable to even unseen tasks. Researchers demonstrated these said attacks to see if the LLMs needed new techniques for more defense.
The research can be found here:
More than you've asked for: A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Apr 2023 07:00:00 -0000</pubDate>
      <itunes:title>A dark side to LLMs. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>276</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Sahar Abdelnabi from CISPA Helmholtz Center for Information Security sits down with Dave to discuss their work on "A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models." There is currently a large advance in the capabilities of Large Language Models or LLMs, as well as being integrated into many systems, including integrated development environments (IDEs) and search engines.
The research states, "The functionalities of current LLMs can be modulated via natural language prompts, while their exact internal functionality remains implicit and unassessable." This could lead them to be susceptible to targeted adversarial prompting, as well as making them adaptable to even unseen tasks. Researchers demonstrated these said attacks to see if the LLMs needed new techniques for more defense.
The research can be found here:
More than you've asked for: A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sahar Abdelnabi from CISPA Helmholtz Center for Information Security sits down with Dave to discuss their work on "A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models." There is currently a large advance in the capabilities of Large Language Models or LLMs, as well as being integrated into many systems, including integrated development environments (IDEs) and search engines.</p><p>The research states, "The functionalities of current LLMs can be modulated via natural language prompts, while their exact internal functionality remains implicit and unassessable." This could lead them to be susceptible to targeted adversarial prompting, as well as making them adaptable to even unseen tasks. Researchers demonstrated these said attacks to see if the LLMs needed new techniques for more defense.</p><p>The research can be found here:</p><ul><li><a href="https://arxiv.org/abs/2302.12173">More than you've asked for: A Comprehensive Analysis of Novel Prompt Injection Threats to Application-Integrated Large Language Models</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1066</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[21d38598-d4b0-11ed-b508-8b7d805d932e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9343710606.mp3?updated=1685127543" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stopping Cobalt Strike abuse. Leaks are mingled with disinformation. Google offers advice for board members. Securing cars and their garages. CISA releases ICS advisories.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1797/notes</link>
      <description>Preventing abuse of the Cobalt Strike pentesting tool. US investigates a leak of sensitive documents related to the war in Ukraine. Hacktivist activity continues. Google's advice for boards. Electronic lockpicks for electronic locks. Nexx security devices may have security flaws. Tesla employees reportedly shared images and videos from Teslas in the wild. Matt O'Neill from US Secret Service discussing investment crypto scams. Our guest is James Campbell of Cado Security on the challenges of a cloud transition. And CISA releases seven ICS advisories.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/67

Selected reading.
Stopping cybercriminals from abusing security tools (Microsoft On the Issues) 
Microsoft leads effort to disrupt illicit use of Cobalt Strike, a dangerous hacking tool in the wrong hands (CyberScoop)
Ukraine War Plans Leak Prompts Pentagon Investigation (New York Times)
DDoS attacks rise as pro-Russia groups attack Finland, Israel (TechRepublic)
Perspectives on Security for the Board (Google Cloud)
Thieves Use CAN Injection Hack to Steal Cars (SecurityWeek)
How thieves steal cars using vehicle CAN bus (Register) 
Own a Nexx “smart” alarm or garage door opener? Get rid of it, or regret it (Graham Cluley).
Hack and enter! The “secure” garage doors that anyone can open from anywhere – what you need to know (Naked Security)
Special Report: Tesla workers shared sensitive images recorded by customer cars (Reuters)
CISA Releases Seven Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 07 Apr 2023 20:15:00 -0000</pubDate>
      <itunes:title>Stopping Cobalt Strike abuse. Leaks are mingled with disinformation. Google offers advice for board members. Securing cars and their garages. CISA releases ICS advisories.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1797</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Preventing abuse of the Cobalt Strike pentesting tool. US investigates a leak of sensitive documents related to the war in Ukraine. Hacktivist activity continues. Google's advice for boards. Electronic lockpicks for electronic locks. Nexx security devices may have security flaws. Tesla employees reportedly shared images and videos from Teslas in the wild. Matt O'Neill from US Secret Service discussing investment crypto scams. Our guest is James Campbell of Cado Security on the challenges of a cloud transition. And CISA releases seven ICS advisories.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/67

Selected reading.
Stopping cybercriminals from abusing security tools (Microsoft On the Issues) 
Microsoft leads effort to disrupt illicit use of Cobalt Strike, a dangerous hacking tool in the wrong hands (CyberScoop)
Ukraine War Plans Leak Prompts Pentagon Investigation (New York Times)
DDoS attacks rise as pro-Russia groups attack Finland, Israel (TechRepublic)
Perspectives on Security for the Board (Google Cloud)
Thieves Use CAN Injection Hack to Steal Cars (SecurityWeek)
How thieves steal cars using vehicle CAN bus (Register) 
Own a Nexx “smart” alarm or garage door opener? Get rid of it, or regret it (Graham Cluley).
Hack and enter! The “secure” garage doors that anyone can open from anywhere – what you need to know (Naked Security)
Special Report: Tesla workers shared sensitive images recorded by customer cars (Reuters)
CISA Releases Seven Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Preventing abuse of the Cobalt Strike pentesting tool. US investigates a leak of sensitive documents related to the war in Ukraine. Hacktivist activity continues. Google's advice for boards. Electronic lockpicks for electronic locks. Nexx security devices may have security flaws. Tesla employees reportedly shared images and videos from Teslas in the wild. Matt O'Neill from US Secret Service discussing investment crypto scams. Our guest is James Campbell of Cado Security on the challenges of a cloud transition. And CISA releases seven ICS advisories.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/67</p><p><br></p><h2>Selected reading.</h2><p><a href="https://blogs.microsoft.com/on-the-issues/2023/04/06/stopping-cybercriminals-from-abusing-security-tools/">Stopping cybercriminals from abusing security tools</a> (Microsoft On the Issues) </p><p><a href="https://cyberscoop.com/microsoft-cobalt-strike-hacking-tool/">Microsoft leads effort to disrupt illicit use of Cobalt Strike, a dangerous hacking tool in the wrong hands</a> (CyberScoop)</p><p><a href="https://www.nytimes.com/2023/04/06/us/politics/ukraine-war-plan-russia.html">Ukraine War Plans Leak Prompts Pentagon Investigation</a> (New York Times)</p><p><a href="https://www.techrepublic.com/article/ddos-attacks-finland-israel/">DDoS attacks rise as pro-Russia groups attack Finland, Israel</a> (TechRepublic)</p><p><a href="https://services.google.com/fh/files/misc/perspectives_on_security_for_the_board.pdf">Perspectives on Security for the Board</a> (Google Cloud)</p><p><a href="https://www.securityweek.com/thieves-use-can-injection-hack-to-steal-cars/">Thieves Use CAN Injection Hack to Steal Cars</a> (SecurityWeek)</p><p><a href="https://www.theregister.com/2023/04/06/can_injection_attack_car_theft/">How thieves steal cars using vehicle CAN bus</a> (Register) </p><p><a href="https://grahamcluley.com/nexx-smart-alarm-garage-door-vulnerability/">Own a Nexx “smart” alarm or garage door opener? Get rid of it, or regret it</a> (Graham Cluley).</p><p><a href="https://nakedsecurity.sophos.com/2023/04/05/us-government-warning-what-if-anyone-could-open-your-garage-door/">Hack and enter! The “secure” garage doors that anyone can open from anywhere – what you need to know</a> (Naked Security)</p><p><a href="https://www.reuters.com/technology/tesla-workers-shared-sensitive-images-recorded-by-customer-cars-2023-04-06/">Special Report: Tesla workers shared sensitive images recorded by customer cars</a> (Reuters)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/04/06/cisa-releases-seven-industrial-control-systems-advisories">CISA Releases Seven Industrial Control Systems Advisories</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1820</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2f984df4-8167-11ed-9779-93316624d399]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8251257434.mp3?updated=1690331835" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New phishing techniques. Arrests in the Genesis Market case. APT43’s Archipelago. Disinformation at the UN, and drop-shipping for Mother Russia.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1796/notes</link>
      <description>New phishing techniques. Arrests in the Genesis Market case. APT43’s Archipelago. Russia's turn in the Security Council chair immediately becomes an occasion for disinformation. Our guest is Nick Tausek from Swimlane to discuss supply chain attack trends. Tim Starks from the Washington Post has the latest on the DOJ’s attempts to disrupt cyber crime. And, make robo-love, not robo-war: nuisance-level hacktivism in the interest of Ukraine.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/66

Selected reading.
New Phishing Campaign Exploits YouTube Attribution Links, Cloudflare Captcha (Vade Security)
Criminal Marketplace Disrupted in International Cyber Operation (U.S. Department of Justice)
Takedown of notorious hacker marketplace selling your identity to criminals | Europol (Europol)
Notorious criminal marketplace selling victim identities taken down in international operation (National Crime Agency)
Check your hack (Politie)
Carr Announces Investigation into Suspected Users of Genesis Dark Web Marketplace Following FBI Takedown of Illicit Site (Office of Attorney General of Georgia Chris Carr)
U.S., European Police Shut Down Hacker Marketplace, Make 119 Arrests (Wall Street Journal)
120 Arrested as Cybercrime Website Genesis Market Seized by FBI (SecurityWeek)
 International cops put the squeeze on Genesis Market users (Register) 
FBI obtained detailed database exposing 60,000 users of the cybercrime bazaar Genesis Market (CyberScoop)
Genesis Black Market Dismantled, But Experts Warn of Potential Vacuum (Nextgov.com)
How we’re protecting users from government-backed attacks from North Korea (Google) 
Google TAG Warns of North Korean-linked ARCHIPELAGO Cyberattacks (The Hacker News)
‘Outrageous’: Russia Accused of Spreading Disinformation at U.N. Event (New York Times)
Des hackers ont acheté 23.000 euros de sex-toys avec de l’argent russe (20 minutes)
Thanks to Ukrainian hackers, war freak orders £20,000 worth drones for Russian soldiers, gets sex toys instead (First Post)
Ukrainian hackers exchange Russian fighter’s drone order for dildos (New York Post)
‘It’s bullshit’: Inside the weird, get-rich-quick world of dropshipping (WIRED)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 06 Apr 2023 20:15:00 -0000</pubDate>
      <itunes:title>New phishing techniques. Arrests in the Genesis Market case. APT43’s Archipelago. Disinformation at the UN, and drop-shipping for Mother Russia.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1796</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>New phishing techniques. Arrests in the Genesis Market case. APT43’s Archipelago. Russia's turn in the Security Council chair immediately becomes an occasion for disinformation. Our guest is Nick Tausek from Swimlane to discuss supply chain attack trends. Tim Starks from the Washington Post has the latest on the DOJ’s attempts to disrupt cyber crime. And, make robo-love, not robo-war: nuisance-level hacktivism in the interest of Ukraine.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/66

Selected reading.
New Phishing Campaign Exploits YouTube Attribution Links, Cloudflare Captcha (Vade Security)
Criminal Marketplace Disrupted in International Cyber Operation (U.S. Department of Justice)
Takedown of notorious hacker marketplace selling your identity to criminals | Europol (Europol)
Notorious criminal marketplace selling victim identities taken down in international operation (National Crime Agency)
Check your hack (Politie)
Carr Announces Investigation into Suspected Users of Genesis Dark Web Marketplace Following FBI Takedown of Illicit Site (Office of Attorney General of Georgia Chris Carr)
U.S., European Police Shut Down Hacker Marketplace, Make 119 Arrests (Wall Street Journal)
120 Arrested as Cybercrime Website Genesis Market Seized by FBI (SecurityWeek)
 International cops put the squeeze on Genesis Market users (Register) 
FBI obtained detailed database exposing 60,000 users of the cybercrime bazaar Genesis Market (CyberScoop)
Genesis Black Market Dismantled, But Experts Warn of Potential Vacuum (Nextgov.com)
How we’re protecting users from government-backed attacks from North Korea (Google) 
Google TAG Warns of North Korean-linked ARCHIPELAGO Cyberattacks (The Hacker News)
‘Outrageous’: Russia Accused of Spreading Disinformation at U.N. Event (New York Times)
Des hackers ont acheté 23.000 euros de sex-toys avec de l’argent russe (20 minutes)
Thanks to Ukrainian hackers, war freak orders £20,000 worth drones for Russian soldiers, gets sex toys instead (First Post)
Ukrainian hackers exchange Russian fighter’s drone order for dildos (New York Post)
‘It’s bullshit’: Inside the weird, get-rich-quick world of dropshipping (WIRED)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>New phishing techniques. Arrests in the Genesis Market case. APT43’s Archipelago. Russia's turn in the Security Council chair immediately becomes an occasion for disinformation. Our guest is Nick Tausek from Swimlane to discuss supply chain attack trends. Tim Starks from the Washington Post has the latest on the DOJ’s attempts to disrupt cyber crime. And, make robo-love, not robo-war: nuisance-level hacktivism in the interest of Ukraine.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/66</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.vadesecure.com/en/blog/new-phishing-campaign-exploits-youtube-attribution-links-cloudflare-captcha">New Phishing Campaign Exploits YouTube Attribution Links, Cloudflare Captcha</a> (Vade Security)</p><p><a href="https://www.justice.gov/opa/pr/criminal-marketplace-disrupted-international-cyber-operation">Criminal Marketplace Disrupted in International Cyber Operation</a> (U.S. Department of Justice)</p><p><a href="https://www.europol.europa.eu/media-press/newsroom/news/takedown-of-notorious-hacker-marketplace-selling-your-identity-to-criminals">Takedown of notorious hacker marketplace selling your identity to criminals | Europol</a> (Europol)</p><p><a href="https://www.nationalcrimeagency.gov.uk/news/notorious-criminal-marketplace-selling-victim-identities-taken-down-in-international-operation">Notorious criminal marketplace selling victim identities taken down in international operation</a> (National Crime Agency)</p><p><a href="https://www.politie.nl/en/information/checkyourhack.html">Check your hack</a> (Politie)</p><p><a href="https://law.georgia.gov/press-releases/2023-04-05/carr-announces-investigation-suspected-users-genesis-dark-web-marketplace">Carr Announces Investigation into Suspected Users of Genesis Dark Web Marketplace Following FBI Takedown of Illicit Site</a> (Office of Attorney General of Georgia Chris Carr)</p><p><a href="https://www.wsj.com/articles/u-s-european-police-shut-down-hacker-marketplace-make-119-arrests-ad30245f">U.S., European Police Shut Down Hacker Marketplace, Make 119 Arrests</a> (Wall Street Journal)</p><p><a href="https://www.securityweek.com/cybercrime-website-genesis-market-seized-by-fbi/">120 Arrested as Cybercrime Website Genesis Market Seized by FBI</a> (SecurityWeek)</p><p> <a href="https://www.theregister.com/2023/04/05/genesis_market_takedown/">International cops put the squeeze on Genesis Market users</a> (Register) </p><p><a href="https://cyberscoop.com/genesis-market-fbi-users-identified-arrests/">FBI obtained detailed database exposing 60,000 users of the cybercrime bazaar Genesis Market</a> (CyberScoop)</p><p><a href="https://www.nextgov.com/cybersecurity/2023/04/genesis-black-market-dismantled-experts-warn-potential-vacuum/384849/">Genesis Black Market Dismantled, But Experts Warn of Potential Vacuum</a> (Nextgov.com)</p><p><a href="https://blog.google/threat-analysis-group/how-were-protecting-users-from-government-backed-attacks-from-north-korea/">How we’re protecting users from government-backed attacks from North Korea</a> (Google) </p><p><a href="https://thehackernews.com/2023/04/google-tag-warns-of-north-korean-linked.html">Google TAG Warns of North Korean-linked ARCHIPELAGO Cyberattacks</a> (The Hacker News)</p><p><a href="https://www.nytimes.com/2023/04/05/world/europe/russia-un-security-council.html">‘Outrageous’: Russia Accused of Spreading Disinformation at U.N. Event</a> (New York Times)</p><p><a href="https://www.20minutes.fr/monde/4031308-20230405-guerre-ukraine-hackers-achetent-23-000-euros-sex-toys-argent-blogueur-armee-russe">Des hackers ont acheté 23.000 euros de sex-toys avec de l’argent russe</a> (20 minutes)</p><p><a href="https://www.firstpost.com/world/thanks-to-ukrainian-hackers-war-freak-orders-20000-worth-drones-for-russian-soldiers-gets-sex-toys-instead-12412682.html">Thanks to Ukrainian hackers, war freak orders £20,000 worth drones for Russian soldiers, gets sex toys instead</a> (First Post)</p><p><a href="https://nypost.com/2023/04/05/ukrainians-exchange-russian-fighters-drone-order-with-dildos/">Ukrainian hackers exchange Russian fighter’s drone order for dildos</a> (New York Post)</p><p><a href="https://www.wired.co.uk/article/dropshipping-instagram-ads">‘It’s bullshit’: Inside the weird, get-rich-quick world of dropshipping</a> (WIRED)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1683</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2f7c8f42-8167-11ed-9779-af0892cea8fa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5236828965.mp3?updated=1690331819" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Genesis Market taken down. Proxyjackers exploit Log4j. Fast-encrypting Rorschach ransomware. More Killnet DDoS. Patch Zimbra now. Soft power and Russia’s hybrid war. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1795/notes</link>
      <description>Genesis Market gets taken down. Proxyjackers exploit Log4j vulnerabilities. Fast-encrypting Rorschach ransomware uses DLL sideloading. Killnet attempts DDoS attacks against the German ministry. Carole Theriault ponders AI assisted cheating. Johannes Ullrich tracks malware injected in a popular tax filing website. Soft power and Russia’s hybrid war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/65

Selected reading.
'Operation Cookie Monster': International police action seizes dark web market (Reuters) 
Stolen credential warehouse Genesis Market seized by FBI (Register)
FBI Seizes Bot Shop ‘Genesis Market’ Amid Arrests Targeting Operators, Suppliers (KrebsOnSecurity)
Genesis Market, one of world’s largest platforms for cyber fraud, seized by police (Record)
'Operation Cookie Monster': FBI seizes popular cybercrime forum used for large-scale identity theft (CNN)
Cybercrime marketplace Genesis Market shut by FBI, international law enforcement (CNBC)
FBI seizes stolen credentials market Genesis in Operation Cookie Monster (BleepingComputer)
Notorious Genesis Market cybercrime forum seized in international law enforcement operation (CyberScoop)
Proxyjacking has Entered the Chat (Sysdig)
Rorschach – A New Sophisticated and Fast Ransomware (Check Point Research)
Russian hackers attack German ministry’s website (TVP World)
Zimbra Flaw Exploited by Russia Against NATO Countries Added to CISA 'Must Patch' List (SecurityWeek)
Zimbra vulnerability exploited by Russian hackers targeting Nato countries - CISA (Tech Monitor) 
CISA Adds One Known Exploited Vulnerability to Catalog (Cybersecurity and Infrastructure Security Agency CISA)
NVD - CVE-2022-27926 (National Vulnerability Database)
The Interview - Russian cyber weapons 'could do a lot of damage' in the US: Former counterterrorism czar (France 24)
Biden cybersecurity chief 'surprised' Russia has not hit US targets amid Ukraine war (Washington Examiner)
Ukrainian Cyber War Confirms the Lesson: Cyber Power Requires Soft Power (Council on Foreign Relations)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 05 Apr 2023 20:15:00 -0000</pubDate>
      <itunes:title>Genesis Market taken down. Proxyjackers exploit Log4j. Fast-encrypting Rorschach ransomware. More Killnet DDoS. Patch Zimbra now. Soft power and Russia’s hybrid war. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1795</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Genesis Market gets taken down. Proxyjackers exploit Log4j vulnerabilities. Fast-encrypting Rorschach ransomware uses DLL sideloading. Killnet attempts DDoS attacks against the German ministry. Carole Theriault ponders AI assisted cheating. Johannes Ullrich tracks malware injected in a popular tax filing website. Soft power and Russia’s hybrid war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/65

Selected reading.
'Operation Cookie Monster': International police action seizes dark web market (Reuters) 
Stolen credential warehouse Genesis Market seized by FBI (Register)
FBI Seizes Bot Shop ‘Genesis Market’ Amid Arrests Targeting Operators, Suppliers (KrebsOnSecurity)
Genesis Market, one of world’s largest platforms for cyber fraud, seized by police (Record)
'Operation Cookie Monster': FBI seizes popular cybercrime forum used for large-scale identity theft (CNN)
Cybercrime marketplace Genesis Market shut by FBI, international law enforcement (CNBC)
FBI seizes stolen credentials market Genesis in Operation Cookie Monster (BleepingComputer)
Notorious Genesis Market cybercrime forum seized in international law enforcement operation (CyberScoop)
Proxyjacking has Entered the Chat (Sysdig)
Rorschach – A New Sophisticated and Fast Ransomware (Check Point Research)
Russian hackers attack German ministry’s website (TVP World)
Zimbra Flaw Exploited by Russia Against NATO Countries Added to CISA 'Must Patch' List (SecurityWeek)
Zimbra vulnerability exploited by Russian hackers targeting Nato countries - CISA (Tech Monitor) 
CISA Adds One Known Exploited Vulnerability to Catalog (Cybersecurity and Infrastructure Security Agency CISA)
NVD - CVE-2022-27926 (National Vulnerability Database)
The Interview - Russian cyber weapons 'could do a lot of damage' in the US: Former counterterrorism czar (France 24)
Biden cybersecurity chief 'surprised' Russia has not hit US targets amid Ukraine war (Washington Examiner)
Ukrainian Cyber War Confirms the Lesson: Cyber Power Requires Soft Power (Council on Foreign Relations)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Genesis Market gets taken down. Proxyjackers exploit Log4j vulnerabilities. Fast-encrypting Rorschach ransomware uses DLL sideloading. Killnet attempts DDoS attacks against the German ministry. Carole Theriault ponders AI assisted cheating. Johannes Ullrich tracks malware injected in a popular tax filing website. Soft power and Russia’s hybrid war.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/65</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.reuters.com/world/uk/operation-cookie-monster-international-police-action-seizes-dark-web-market-2023-04-05/">'Operation Cookie Monster': International police action seizes dark web market</a> (Reuters) </p><p><a href="https://www.theregister.com/2023/04/05/fbi_seizes_stolen_data_mart/">Stolen credential warehouse Genesis Market seized by FBI</a> (Register)</p><p><a href="https://krebsonsecurity.com/2023/04/fbi-seizes-bot-shop-genesis-market-amid-arrests-targeting-operators-suppliers/">FBI Seizes Bot Shop ‘Genesis Market’ Amid Arrests Targeting Operators, Suppliers</a> (KrebsOnSecurity)</p><p><a href="https://therecord.media/genesis-market-takedown-cybercrime">Genesis Market, one of world’s largest platforms for cyber fraud, seized by police</a> (Record)</p><p><a href="https://www.cnn.com/2023/04/04/politics/genesis-market-fbi-seizure/index.html">'Operation Cookie Monster': FBI seizes popular cybercrime forum used for large-scale identity theft</a> (CNN)</p><p><a href="https://www.cnbc.com/2023/04/04/genesis-market-shut-by-law-enforcement-in-cybercrime-operation.html">Cybercrime marketplace Genesis Market shut by FBI, international law enforcement</a> (CNBC)</p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-seizes-stolen-credentials-market-genesis-in-operation-cookie-monster/">FBI seizes stolen credentials market Genesis in Operation Cookie Monster</a> (BleepingComputer)</p><p><a href="https://cyberscoop.com/fbi-seizure-genesis-market-cybercrime/">Notorious Genesis Market cybercrime forum seized in international law enforcement operation</a> (CyberScoop)</p><p><a href="https://sysdig.com/blog/proxyjacking-attackers-log4j-exploited/">Proxyjacking has Entered the Chat</a> (Sysdig)</p><p><a href="https://research.checkpoint.com/2023/rorschach-a-new-sophisticated-and-fast-ransomware/">Rorschach – A New Sophisticated and Fast Ransomware</a> (Check Point Research)</p><p><a href="https://tvpworld.com/68980449/russian-hackers-attack-german-ministrys-website">Russian hackers attack German ministry’s website</a> (TVP World)</p><p><a href="https://www.securityweek.com/zimbra-flaw-exploited-by-russian-hackers-against-nato-added-to-cisa-must-patch-list/">Zimbra Flaw Exploited by Russia Against NATO Countries Added to CISA 'Must Patch' List</a> (SecurityWeek)</p><p><a href="https://techmonitor.ai/technology/cybersecurity/zimbra-vulnerability-russian-hackers-nato-cisa">Zimbra vulnerability exploited by Russian hackers targeting Nato countries - CISA</a> (Tech Monitor) </p><p><a href="https://www.cisa.gov/news-events/alerts/2023/04/03/cisa-adds-one-known-exploited-vulnerability-catalog">CISA Adds One Known Exploited Vulnerability to Catalog</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27926">NVD - CVE-2022-27926</a> (National Vulnerability Database)</p><p><a href="https://www.france24.com/en/tv-shows/the-interview/20230405-russian-cyber-weapons-could-do-a-lot-of-damage-in-the-us-former-counterterrorism-czar">The Interview - Russian cyber weapons 'could do a lot of damage' in the US: Former counterterrorism czar</a> (France 24)</p><p><a href="https://www.washingtonexaminer.com/news/white-house/biden-cybersecurity-russia">Biden cybersecurity chief 'surprised' Russia has not hit US targets amid Ukraine war</a> (Washington Examiner)</p><p><a href="https://www.cfr.org/blog/ukrainian-cyber-war-confirms-lesson-cyber-power-requires-soft-power">Ukrainian Cyber War Confirms the Lesson: Cyber Power Requires Soft Power</a> (Council on Foreign Relations)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1524</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2ea4e2d6-8167-11ed-9779-efa1edef433b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2915223267.mp3?updated=1690331791" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber appeasement? Western Digital discloses cyberattack. Rilide malware is in active use. Mantis has new mandibles. Challenges of threat hunting. Small, medium, and large criminal enterprises.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1794/notes</link>
      <description>Did "appeasement" embolden Russia's cyber operators? Western Digital discloses a cyberattack. Rilide is a new strain of malware in active use. The Mantis cyberespionage group uses new, robust tools and tactics. The challenges of threat hunting. Joe Carrigan has thoughts on public school systems making cyber security part of the curriculum. Our guest May Mitchell of Open Systems addresses closing the talent gap. And when it comes to criminal enterprise, size matters.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/64

Selected reading.
Russia's shadow war: Vulkan files leak show how Putin's regime weaponises cyberspace (The Conversation)
Russia's Invasion of Ukraine Heralds New Era of Warfare (VOA)
West’s Cyber Appeasement Gave Putin Green Light: James Stavridis (Bloomberg Law)
Western Digital Provides Information on Network Security Incident (Business Wire) 
Western Digital confirms breach, shuts down systems (Computing)
Western Digital discloses network breach, My Cloud service down (BleepingComputer)
WD says law enforcement probing breach of internal systems (Register)
Western Digital investigating MyCloud data breach affecting Mac desktop drives (Macworld)
Users fume after My Cloud network breach locks them out of their data (Ars Technica)
Typhon Reborn V2: Updated stealer features enhanced anti-analysis and evasion capabilities (Cisco Talos Blog)
Mantis: New Tooling Used in Attacks Against Palestinian Targets (Symantec) 
Inside the Mind of a Threat Hunter: Team Cymru's Latest Report Sheds Light on Challenges Faced by Cybersecurity Analysts (Accesswire)
Wages Dominate Cybercrime Groups' Operating Expenses (PR Newswire)
Inside the Halls of a Cybercrime Business (Trend Micro)
Size Matters: Unraveling the Structure of Modern Cybercrime Organizations (Trend Micro)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Apr 2023 20:15:00 -0000</pubDate>
      <itunes:title>Cyber appeasement? Western Digital discloses cyberattack. Rilide malware is in active use. Mantis has new mandibles. Challenges of threat hunting. Small, medium, and large criminal enterprises.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1794</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Did "appeasement" embolden Russia's cyber operators? Western Digital discloses a cyberattack. Rilide is a new strain of malware in active use. The Mantis cyberespionage group uses new, robust tools and tactics. The challenges of threat hunting. Joe Carrigan has thoughts on public school systems making cyber security part of the curriculum. Our guest May Mitchell of Open Systems addresses closing the talent gap. And when it comes to criminal enterprise, size matters.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/64

Selected reading.
Russia's shadow war: Vulkan files leak show how Putin's regime weaponises cyberspace (The Conversation)
Russia's Invasion of Ukraine Heralds New Era of Warfare (VOA)
West’s Cyber Appeasement Gave Putin Green Light: James Stavridis (Bloomberg Law)
Western Digital Provides Information on Network Security Incident (Business Wire) 
Western Digital confirms breach, shuts down systems (Computing)
Western Digital discloses network breach, My Cloud service down (BleepingComputer)
WD says law enforcement probing breach of internal systems (Register)
Western Digital investigating MyCloud data breach affecting Mac desktop drives (Macworld)
Users fume after My Cloud network breach locks them out of their data (Ars Technica)
Typhon Reborn V2: Updated stealer features enhanced anti-analysis and evasion capabilities (Cisco Talos Blog)
Mantis: New Tooling Used in Attacks Against Palestinian Targets (Symantec) 
Inside the Mind of a Threat Hunter: Team Cymru's Latest Report Sheds Light on Challenges Faced by Cybersecurity Analysts (Accesswire)
Wages Dominate Cybercrime Groups' Operating Expenses (PR Newswire)
Inside the Halls of a Cybercrime Business (Trend Micro)
Size Matters: Unraveling the Structure of Modern Cybercrime Organizations (Trend Micro)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Did "appeasement" embolden Russia's cyber operators? Western Digital discloses a cyberattack. Rilide is a new strain of malware in active use. The Mantis cyberespionage group uses new, robust tools and tactics. The challenges of threat hunting. Joe Carrigan has thoughts on public school systems making cyber security part of the curriculum. Our guest May Mitchell of Open Systems addresses closing the talent gap. And when it comes to criminal enterprise, size matters.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/64</p><p><br></p><h2>Selected reading.</h2><p><a href="https://theconversation.com/russias-shadow-war-vulkan-files-leak-show-how-putins-regime-weaponises-cyberspace-203146">Russia's shadow war: Vulkan files leak show how Putin's regime weaponises cyberspace</a> (The Conversation)</p><p><a href="https://www.voanews.com/a/russia-s-invasion-of-ukraine-heralds-new-era-of-warfare-/7034698.html">Russia's Invasion of Ukraine Heralds New Era of Warfare </a>(VOA)</p><p><a href="https://news.bloomberglaw.com/privacy-and-data-security/wests-cyber-appeasement-gave-putin-green-light-james-stavridis-1">West’s Cyber Appeasement Gave Putin Green Light: James Stavridis</a> (Bloomberg Law)</p><p><a href="https://www.businesswire.com/news/home/20230402005076/en/Western-Digital-Provides-Information-on-Network-Security-Incident">Western Digital Provides Information on Network Security Incident</a> (Business Wire) </p><p><a href="https://www.computing.co.uk/news/4111523/western-digital-confirms-breach">Western Digital confirms breach, shuts down systems </a>(Computing)</p><p><a href="https://www.bleepingcomputer.com/news/security/western-digital-discloses-network-breach-my-cloud-service-down/">Western Digital discloses network breach, My Cloud service down</a> (BleepingComputer)</p><p><a href="https://www.theregister.com/2023/04/03/western_digital_confirms_security_incident/">WD says law enforcement probing breach of internal systems</a> (Register)</p><p><a href="https://www.macworld.com/article/1681315/western-digital-mycloud-server-breach-network-security-incident.html">Western Digital investigating MyCloud data breach affecting Mac desktop drives</a> (Macworld)</p><p><a href="https://arstechnica.com/information-technology/2023/04/users-fume-after-my-cloud-network-breach-locks-them-out-of-their-data/">Users fume after My Cloud network breach locks them out of their data</a> (Ars Technica)</p><p><a href="https://blog.talosintelligence.com/typhon-reborn-v2-features-enhanced-anti-analysis/">Typhon Reborn V2: Updated stealer features enhanced anti-analysis and evasion capabilities</a> (Cisco Talos Blog)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/mantis-palestinian-attacks">Mantis: New Tooling Used in Attacks Against Palestinian Targets</a> (Symantec) </p><p><a href="https://www.accesswire.com/747402/Inside-the-Mind-of-a-Threat-Hunter-Team-Cymrus-Latest-Report-Sheds-Light-on-Challenges-Faced-by-Cybersecurity-Analysts">Inside the Mind of a Threat Hunter: Team Cymru's Latest Report Sheds Light on Challenges Faced by Cybersecurity Analysts</a> (Accesswire)</p><p><a href="https://www.prnewswire.com/news-releases/wages-dominate-cybercrime-groups-operating-expenses-301787819.html">Wages Dominate Cybercrime Groups' Operating Expenses</a> (PR Newswire)</p><p><a href="https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/inside-the-halls-of-a-cybercrime-business">Inside the Halls of a Cybercrime Business</a> (Trend Micro)</p><p><a href="https://documents.trendmicro.com/assets/white_papers/wp-inside-the-halls-of-a-cybercrime-business.pdf">Size Matters: Unraveling the Structure of Modern Cybercrime Organizations</a> (Trend Micro)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1732</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2e8b09e2-8167-11ed-9779-9ba508745118]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5825407730.mp3?updated=1690331765" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>"Cylance" ransomware (no relation to Cylance). Update on the 3CX incident. The FSB's arrest of Evan Gershkovich. Ukrainian hacktivist social engineering in the hybrid war.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1793/notes</link>
      <description>"Cylance" the ransomware (with no relation to Cylance, the security company). An update on the 3CX incident. The FSB's arrest of a Wall Street Journal reporter. Simone Petrella from N2K Networks unpacks 2023 cybersecurity training trends. Deepen Desai from Zscaler has the latest on cloud security. And Hacktivists claim to have tricked wives of Russian combat pilots into revealing personal information.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/63

Selected reading.
"Cylance" ransomware (no relation to Cylance). (CyberWire Pro)
New Cylance Ransomware Targets Linux and Windows, Warn Researchers (HackRead)
New Cylance Ransomware strain emerges, experts speculate about its notorious members (IT PRO) 
More evidence links 3CX supply-chain attack to North Korean hacking group (Record)
3CX supply chain attack: the unanswered questions (Computing)
3CX Desktop App Compromised (CVE-2023-29059) (Fortinet Blog) 
Evan Gershkovich Loved Russia, the Country That Turned on Him (Wall Street Journal)
The Ukrainian hoax that revealed the Russian pilots who bombed Mariupol theatre (The Telegraph)
Ukrainian Hacktivists Trick Russian Military Wives for Personal Info (HackRead)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 03 Apr 2023 20:15:00 -0000</pubDate>
      <itunes:title>"Cylance" ransomware (no relation to Cylance). Update on the 3CX incident. The FSB's arrest of Evan Gershkovich. Ukrainian hacktivist social engineering in the hybrid war.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1793</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>"Cylance" the ransomware (with no relation to Cylance, the security company). An update on the 3CX incident. The FSB's arrest of a Wall Street Journal reporter. Simone Petrella from N2K Networks unpacks 2023 cybersecurity training trends. Deepen Desai from Zscaler has the latest on cloud security. And Hacktivists claim to have tricked wives of Russian combat pilots into revealing personal information.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/63

Selected reading.
"Cylance" ransomware (no relation to Cylance). (CyberWire Pro)
New Cylance Ransomware Targets Linux and Windows, Warn Researchers (HackRead)
New Cylance Ransomware strain emerges, experts speculate about its notorious members (IT PRO) 
More evidence links 3CX supply-chain attack to North Korean hacking group (Record)
3CX supply chain attack: the unanswered questions (Computing)
3CX Desktop App Compromised (CVE-2023-29059) (Fortinet Blog) 
Evan Gershkovich Loved Russia, the Country That Turned on Him (Wall Street Journal)
The Ukrainian hoax that revealed the Russian pilots who bombed Mariupol theatre (The Telegraph)
Ukrainian Hacktivists Trick Russian Military Wives for Personal Info (HackRead)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>"Cylance" the ransomware (with no relation to Cylance, the security company). An update on the 3CX incident. The FSB's arrest of a Wall Street Journal reporter. Simone Petrella from N2K Networks unpacks 2023 cybersecurity training trends. Deepen Desai from Zscaler has the latest on cloud security. And Hacktivists claim to have tricked wives of Russian combat pilots into revealing personal information.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/63</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/stories/bdc94659906a429a8a2524169a2dc2d1/cylance-ransomware-no-relation-to-cylance">"Cylance" ransomware (no relation to Cylance).</a> (CyberWire Pro)</p><p><a href="https://www.hackread.com/cylance-ransomware-linux-windows/">New Cylance Ransomware Targets Linux and Windows, Warn Researchers</a> (HackRead)</p><p><a href="https://www.itpro.co.uk/security/ransomware/370362/new-cylance-ransomware-strain-experts-speculate-notorious-members">New Cylance Ransomware strain emerges, experts speculate about its notorious members</a> (IT PRO) </p><p><a href="https://therecord.media/3cx-attack-north-korea-lazarus-group">More evidence links 3CX supply-chain attack to North Korean hacking group</a> (Record)</p><p><a href="https://www.computing.co.uk/news/4111401/3cx-supply-chain-attack-unanswered-questions">3CX supply chain attack: the unanswered questions </a>(Computing)</p><p><a href="https://www.fortinet.com/blog/threat-research/3cx-desktop-app-compromised">3CX Desktop App Compromised (CVE-2023-29059)</a> (Fortinet Blog) </p><p><a href="https://www.wsj.com/articles/wsj-reporter-evan-gershkovich-detained-russia-cd03b0f3">Evan Gershkovich Loved Russia, the Country That Turned on Him</a> (Wall Street Journal)</p><p><a href="https://www.telegraph.co.uk/world-news/2023/03/30/ukrainian-group-reveal-russian-pilots-bombed-mariupol/">The Ukrainian hoax that revealed the Russian pilots who bombed Mariupol theatre</a> (The Telegraph)</p><p><a href="https://www.hackread.com/ukrainian-hacktivists-russian-military-wives/">Ukrainian Hacktivists Trick Russian Military Wives for Personal Info</a> (HackRead)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1830</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2dd72bd4-8167-11ed-9779-53a476cb013f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4105259522.mp3?updated=1690331744" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Alon Jackson: Sometimes you feel like an octopus. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/143/notes</link>
      <description>Alon Jackson, chief executive and Co-founder of Astrix Security, sits down to share his story to rising success. Before being on the vendor side of things, Jackson served in various strategic roles in the Cyber Security Division of the Israeli Military Intel Unit 8200 for more than 8 years, including leading the Cloud Security division and serving as the Head of the Cyber Security R&amp;D Department. His experience in the military inspired him to learn more about the industry and jump to the private sector. Fast forward years later, he co-founded his company to help address security gaps seen in the industry. He mentions how being a start up CEO can be difficult sometimes, and how it may feel as though you're an octopus with all the multitasking that comes with the job. Alon says that one of his main goals as a contributor in this industry is making sure people remember him and his company for years to come, saying he wants to help by " building a company that people kind of know about, remember, and is important in the world." We thank Alon for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 02 Apr 2023 07:00:00 -0000</pubDate>
      <itunes:title>Alon Jackson: Sometimes you feel like an octopus. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>143</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Alon Jackson, chief executive and Co-founder of Astrix Security, sits down to share his story to rising success. Before being on the vendor side of things, Jackson served in various strategic roles in the Cyber Security Division of the Israeli Military Intel Unit 8200 for more than 8 years, including leading the Cloud Security division and serving as the Head of the Cyber Security R&amp;D Department. His experience in the military inspired him to learn more about the industry and jump to the private sector. Fast forward years later, he co-founded his company to help address security gaps seen in the industry. He mentions how being a start up CEO can be difficult sometimes, and how it may feel as though you're an octopus with all the multitasking that comes with the job. Alon says that one of his main goals as a contributor in this industry is making sure people remember him and his company for years to come, saying he wants to help by " building a company that people kind of know about, remember, and is important in the world." We thank Alon for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Alon Jackson, chief executive and Co-founder of Astrix Security, sits down to share his story to rising success. Before being on the vendor side of things, Jackson served in various strategic roles in the Cyber Security Division of the Israeli Military Intel Unit 8200 for more than 8 years, including leading the Cloud Security division and serving as the Head of the Cyber Security R&amp;D Department. His experience in the military inspired him to learn more about the industry and jump to the private sector. Fast forward years later, he co-founded his company to help address security gaps seen in the industry. He mentions how being a start up CEO can be difficult sometimes, and how it may feel as though you're an octopus with all the multitasking that comes with the job. Alon says that one of his main goals as a contributor in this industry is making sure people remember him and his company for years to come, saying he wants to help by " building a company that people kind of know about, remember, and is important in the world." We thank Alon for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>406</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bf2da106-cff2-11ed-8bd4-1f41c5905b8a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1726693132.mp3?updated=1680281852" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Blackfly flies back again. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/275/notes</link>
      <description>Dick O'Brien from Symantec’s Threat Hunter team discusses their research on "Blackfly - Espionage Group Targets Materials Technology." Researchers say the Blackfly espionage group (aka APT41), has been mounting attacks against Asian materials and composite organizations in attempts to steal intellectual property.
This group has been known as one of the longest known Chinese advanced persistent threat (APT) groups since at least 2010. The research shares that "early attacks were distinguished by the use of the PlugX/Fast (Backdoor.Korplug), Winnti/Pasteboy (Backdoor.Winnti), and Shadowpad (Backdoor.Shadowpad) malware families."
The research can be found here: 
Blackfly: Espionage Group Targets Materials Technology

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Apr 2023 07:00:00 -0000</pubDate>
      <itunes:title>Blackfly flies back again. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>275</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dick O'Brien from Symantec’s Threat Hunter team discusses their research on "Blackfly - Espionage Group Targets Materials Technology." Researchers say the Blackfly espionage group (aka APT41), has been mounting attacks against Asian materials and composite organizations in attempts to steal intellectual property.
This group has been known as one of the longest known Chinese advanced persistent threat (APT) groups since at least 2010. The research shares that "early attacks were distinguished by the use of the PlugX/Fast (Backdoor.Korplug), Winnti/Pasteboy (Backdoor.Winnti), and Shadowpad (Backdoor.Shadowpad) malware families."
The research can be found here: 
Blackfly: Espionage Group Targets Materials Technology

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dick O'Brien from Symantec’s Threat Hunter team discusses their research on "Blackfly - Espionage Group Targets Materials Technology." Researchers say the Blackfly espionage group (aka APT41), has been mounting attacks against Asian materials and composite organizations in attempts to steal intellectual property.</p><p>This group has been known as one of the longest known Chinese advanced persistent threat (APT) groups since at least 2010. The research shares that "early attacks were distinguished by the use of the PlugX/Fast (Backdoor.Korplug), Winnti/Pasteboy (Backdoor.Winnti), and Shadowpad (Backdoor.Shadowpad) malware families."</p><p>The research can be found here: </p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/blackfly-espionage-materials">Blackfly: Espionage Group Targets Materials Technology</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>814</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[621446be-cf2a-11ed-92fa-63424b767873]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6163753344.mp3?updated=1685127532" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A  glimpse into Mr. Putin’s cyber war room. 3CXDesktopAppsupply chain risk. XSS flaw in Azure SFX can lead to remote code execution. AlienFox targets misconfigured servers.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1792/notes</link>
      <description>The Vulkan papers offer a glimpse into Mr. Putin’s cyber war room. The 3CXDesktopApp vulnerability and supply chain risk. A cross site scripting flaw in Azure Service Fabric Explorer can lead to remote code execution. Rob Boyce from Accenture Security on threats toEV charging stations. Our guest is Steve Benton from Anomali Threat Research, sharing a ‘less is more’ approach to cybersecurity. And AlienFox targets misconfigured servers.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/62

Selected reading.
A Look Inside Putin's Secret Plans for Cyber-Warfare (Spiegel)
Secret trove offers rare look into Russian cyberwar ambitions (Washington Post) 
7 takeaways from the Vulkan Files investigation (Washington Post)
‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics (the Guardian)
Contracts Identify Cyber Operations Projects from Russian Company NTC Vulkan (Mandiant)
3CX DesktopApp Security Alert - Mandiant Appointed to Investigate (3CX)
Information on Attacks Involving 3CX Desktop App (Trend Micro)
3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component  (SecurityWeek)
There’s a new supply chain attack targeting customers of a phone system with 12 million users (TechCrunch)
Super FabriXss: From XSS to an RCE in Azure Service Fabric Explorer by Abusing an Event Tab Cluster Toggle (CVE-2023-23383) (Orca Security)
Dissecting AlienFox | The Cloud Spammer’s Swiss Army Knife (SentinelOne)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 31 Mar 2023 20:15:00 -0000</pubDate>
      <itunes:title>A  glimpse into Mr. Putin’s cyber war room. 3CXDesktopAppsupply chain risk. XSS flaw in Azure SFX can lead to remote code execution. AlienFox targets misconfigured servers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1792</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Vulkan papers offer a glimpse into Mr. Putin’s cyber war room. The 3CXDesktopApp vulnerability and supply chain risk. A cross site scripting flaw in Azure Service Fabric Explorer can lead to remote code execution. Rob Boyce from Accenture Security on threats toEV charging stations. Our guest is Steve Benton from Anomali Threat Research, sharing a ‘less is more’ approach to cybersecurity. And AlienFox targets misconfigured servers.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/62

Selected reading.
A Look Inside Putin's Secret Plans for Cyber-Warfare (Spiegel)
Secret trove offers rare look into Russian cyberwar ambitions (Washington Post) 
7 takeaways from the Vulkan Files investigation (Washington Post)
‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics (the Guardian)
Contracts Identify Cyber Operations Projects from Russian Company NTC Vulkan (Mandiant)
3CX DesktopApp Security Alert - Mandiant Appointed to Investigate (3CX)
Information on Attacks Involving 3CX Desktop App (Trend Micro)
3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component  (SecurityWeek)
There’s a new supply chain attack targeting customers of a phone system with 12 million users (TechCrunch)
Super FabriXss: From XSS to an RCE in Azure Service Fabric Explorer by Abusing an Event Tab Cluster Toggle (CVE-2023-23383) (Orca Security)
Dissecting AlienFox | The Cloud Spammer’s Swiss Army Knife (SentinelOne)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Vulkan papers offer a glimpse into Mr. Putin’s cyber war room. The 3CXDesktopApp vulnerability and supply chain risk. A cross site scripting flaw in Azure Service Fabric Explorer can lead to remote code execution. Rob Boyce from Accenture Security on threats toEV charging stations. Our guest is Steve Benton from Anomali Threat Research, sharing a ‘less is more’ approach to cybersecurity. And AlienFox targets misconfigured servers.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/62</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.spiegel.de/international/world/the-vulkan-files-a-look-inside-putin-s-secret-plans-for-cyber-warfare-a-4324e76f-cb20-4312-96c8-1101c5655236">A Look Inside Putin's Secret Plans for Cyber-Warfare</a> (Spiegel)</p><p><a href="https://www.washingtonpost.com/national-security/2023/03/30/russian-cyberwarfare-documents-vulkan-files/">Secret trove offers rare look into Russian cyberwar ambitions</a> (Washington Post) </p><p><a href="https://www.washingtonpost.com/national-security/2023/03/30/takeaways-vulkan-files-investigation/">7 takeaways from the Vulkan Files investigation</a> (Washington Post)</p><p><a href="https://www.theguardian.com/technology/2023/mar/30/vulkan-files-leak-reveals-putins-global-and-domestic-cyberwarfare-tactics">‘Vulkan files’ leak reveals Putin’s global and domestic cyberwarfare tactics</a> (the Guardian)</p><p><a href="https://www.mandiant.com/resources/blog/cyber-operations-russian-vulkan">Contracts Identify Cyber Operations Projects from Russian Company NTC Vulkan</a> (Mandiant)</p><p><a href="https://www.3cx.com/blog/news/desktopapp-security-alert-updates/">3CX DesktopApp Security Alert - Mandiant Appointed to Investigate</a> (3CX)</p><p><a href="https://www.trendmicro.com/en_us/research/23/c/information-on-attacks-involving-3cx-desktop-app.html">Information on Attacks Involving 3CX Desktop App</a> (Trend Micro)</p><p><a href="https://www.securityweek.com/3cx-confirms-supply-chain-attack-as-researchers-uncover-mac-component/">3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component </a> (SecurityWeek)</p><p><a href="https://techcrunch.com/2023/03/30/theres-a-new-supply-chain-attack-targeting-customers-of-a-phone-system-with-12-million-users/">There’s a new supply chain attack targeting customers of a phone system with 12 million users</a> (TechCrunch)</p><p><a href="https://orca.security/resources/blog/super-fabrixss-azure-vulnerability/">Super FabriXss: From XSS to an RCE in Azure Service Fabric Explorer by Abusing an Event Tab Cluster Toggle (CVE-2023-23383)</a> (Orca Security)</p><p><a href="https://www.sentinelone.com/labs/dissecting-alienfox-the-cloud-spammers-swiss-army-knife/">Dissecting AlienFox | The Cloud Spammer’s Swiss Army Knife</a> (SentinelOne)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1701</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2d87e826-8167-11ed-9779-a750b398aec7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7574597486.mp3?updated=1690331719" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A major supply chain attack is underway. Ms Connor, call your office. Combosquatting. False positives fixed. Tanks don’t work, so Russia tries more cyber. And, sadly. some official hostage-taking. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1791/notes</link>
      <description>The 3CXDesktopApp is under exploitation in a supply chain campaign. An open letter asks for a pause in advanced AI development. All your grammar and usage are belong us. Combosquatting might fool even the wary. Defender had flagged Zoom and other safe sites as dangerous. Recognizing the importance of OSINT. Matt O'Neill from US Secret Service discussing his agency’s cybersecurity mission. Our guest is Ping Li from Signifydwith a look at online fraud. And the FSB arrests a US journalist.
For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/61

Selected reading.
3CX DesktopApp Security Alert (3CX)
Supply Chain Attack Against 3CXDesktopApp (CISA)
Pause Giant AI Experiments: An Open Letter (Future of Life Institute)
In Sudden Alarm, Tech Doyens Call for a Pause on ChatGPT (WIRED
AI chatbots making it harder to spot phishing emails, say experts (the Guardian)
The Most Common Combosquatting Keyword Is “Support” (Akamai)
False positives in Microsoft Defender. (CyberWire)
Exploitation is a Dish Best Served Cold: Winter Vivern Uses Known Zimbra Vulnerability to Target Webmail Portals of NATO-Aligned Governments in Europe (Proofpoint) 
ESET Research Podcast: A year of fighting rockets, soldiers, and wipers in Ukraine (WeLiveSecurity) 
Russia Ramping Up Cyberattacks Against Ukraine (VOA) 
A new age of spying gives Kyiv the upper hand (The Telegraph) 
Russia arrests Wall Street Journal reporter on spying charge (AP NEWS)
Russia detains a Wall Street Journal reporter, accusing him of espionage. (New York Times)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 30 Mar 2023 20:15:00 -0000</pubDate>
      <itunes:title>A major supply chain attack is underway. Ms Connor, call your office. Combosquatting. False positives fixed. Tanks don’t work, so Russia tries more cyber. And, sadly. some official hostage-taking. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1791</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The 3CXDesktopApp is under exploitation in a supply chain campaign. An open letter asks for a pause in advanced AI development. All your grammar and usage are belong us. Combosquatting might fool even the wary. Defender had flagged Zoom and other safe sites as dangerous. Recognizing the importance of OSINT. Matt O'Neill from US Secret Service discussing his agency’s cybersecurity mission. Our guest is Ping Li from Signifydwith a look at online fraud. And the FSB arrests a US journalist.
For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/61

Selected reading.
3CX DesktopApp Security Alert (3CX)
Supply Chain Attack Against 3CXDesktopApp (CISA)
Pause Giant AI Experiments: An Open Letter (Future of Life Institute)
In Sudden Alarm, Tech Doyens Call for a Pause on ChatGPT (WIRED
AI chatbots making it harder to spot phishing emails, say experts (the Guardian)
The Most Common Combosquatting Keyword Is “Support” (Akamai)
False positives in Microsoft Defender. (CyberWire)
Exploitation is a Dish Best Served Cold: Winter Vivern Uses Known Zimbra Vulnerability to Target Webmail Portals of NATO-Aligned Governments in Europe (Proofpoint) 
ESET Research Podcast: A year of fighting rockets, soldiers, and wipers in Ukraine (WeLiveSecurity) 
Russia Ramping Up Cyberattacks Against Ukraine (VOA) 
A new age of spying gives Kyiv the upper hand (The Telegraph) 
Russia arrests Wall Street Journal reporter on spying charge (AP NEWS)
Russia detains a Wall Street Journal reporter, accusing him of espionage. (New York Times)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The 3CXDesktopApp is under exploitation in a supply chain campaign. An open letter asks for a pause in advanced AI development. All your grammar and usage are belong us. Combosquatting might fool even the wary. Defender had flagged Zoom and other safe sites as dangerous. Recognizing the importance of OSINT. Matt O'Neill from US Secret Service discussing his agency’s cybersecurity mission. Our guest is Ping Li from Signifydwith a look at online fraud. And the FSB arrests a US journalist.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/61</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.3cx.com/blog/news/desktopapp-security-alert/">3CX DesktopApp Security Alert</a> (3CX)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/03/30/supply-chain-attack-against-3cxdesktopapp">Supply Chain Attack Against 3CXDesktopApp</a> (CISA)</p><p><a href="https://futureoflife.org/open-letter/pause-giant-ai-experiments/">Pause Giant AI Experiments: An Open Letter</a> (Future of Life Institute)</p><p><a href="https://www.wired.com/story/chatgpt-pause-ai-experiments-open-letter/">In Sudden Alarm, Tech Doyens Call for a Pause on ChatGPT</a> (WIRED</p><p><a href="https://www.theguardian.com/technology/2023/mar/29/ai-chatbots-making-it-harder-to-spot-phishing-emails-say-experts">AI chatbots making it harder to spot phishing emails, say experts</a> (the Guardian)</p><p><a href="https://www.akamai.com/blog/security-research/combosquatting-keyword-analysis-support">The Most Common Combosquatting Keyword Is “Support”</a> (Akamai)</p><p><a href="https://thecyberwire.com/stories/aa751dac96c541a2a5eb868cbcb8a65e/false-positives-in-microsoft-defender">False positives in Microsoft Defender.</a> (CyberWire)</p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/exploitation-dish-best-served-cold-winter-vivern-uses-known-zimbra-vulnerability">Exploitation is a Dish Best Served Cold: Winter Vivern Uses Known Zimbra Vulnerability to Target Webmail Portals of NATO-Aligned Governments in Europe</a> (Proofpoint) </p><p><a href="https://www.welivesecurity.com/2023/03/30/eset-research-podcast-year-fighting-rockets-soldiers-wipers-ukraine/">ESET Research Podcast: A year of fighting rockets, soldiers, and wipers in Ukraine</a> (WeLiveSecurity) </p><p><a href="https://www.voanews.com/a/russia-ramping-up-cyberattacks-against-ukraine-/7027916.html">Russia Ramping Up Cyberattacks Against Ukraine </a>(VOA) </p><p><a href="https://www.telegraph.co.uk/news/2023/03/29/a-new-age-of-spying-gives-kyiv-the-upper-hand/">A new age of spying gives Kyiv the upper hand</a> (The Telegraph) </p><p><a href="https://apnews.com/article/wall-street-journal-reported-russia-arrested-cd511a94a3fe0ce604df6648ef5adec5">Russia arrests Wall Street Journal reporter on spying charge</a> (AP NEWS)</p><p><a href="https://www.nytimes.com/2023/03/30/world/europe/russia-wsj-reporter-detained-gershkovich.html">Russia detains a Wall Street Journal reporter, accusing him of espionage.</a> (New York Times)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1696</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2d6cb43e-8167-11ed-9779-878c1175d237]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4817602738.mp3?updated=1690331702" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Traffers and the threat to credentials. WiFi protocol flaw. Cross-chain bridge attacks. A shift in Russian cyber operations. Piracy is patriotic. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1790/notes</link>
      <description>Traffers and the threat to credentials. A newly discovered WiFi protocol flaw. Cross-chain bridge attacks. A shift in Russian cyber operations. Ann Johnson from Afternoon Cyber Tea chats with EY principal Adam Malone. Our guest is Toni Buhrke from Mimecast with a look at the State of Email Security. And is piracy patriotic?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/60

Selected reading.
Traffers and the growing threat against credentials (Outpost24 blog) 
WiFi protocol flaw allows attackers to hijack network traffic (BleepingComputer) 
Cross-chain bridge attacks. (CyberWire)
 2023 Annual State of Email Security Report (Cofense)
From Ukraine to the whole of Europe:cyber conflict reaches a turning point (Thales Group) 
Russia Ramps Up Cyberattacks On Ukraine Allies: Analysts (Barron's) 
Pro-Russian hackers shift focus from Ukraine to EU countries (Radio Sweden) 
Russian hackers attack Slovak governmental websites after country supplies Mig-29s to Ukraine (Ukrainska Pravda)
Ukraine's Defense Ministry says Russia is encouraging online piracy (The Jerusalem Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 29 Mar 2023 20:15:00 -0000</pubDate>
      <itunes:title>Traffers and the threat to credentials. WiFi protocol flaw. Cross-chain bridge attacks. A shift in Russian cyber operations. Piracy is patriotic. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1790</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Traffers and the threat to credentials. A newly discovered WiFi protocol flaw. Cross-chain bridge attacks. A shift in Russian cyber operations. Ann Johnson from Afternoon Cyber Tea chats with EY principal Adam Malone. Our guest is Toni Buhrke from Mimecast with a look at the State of Email Security. And is piracy patriotic?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/60

Selected reading.
Traffers and the growing threat against credentials (Outpost24 blog) 
WiFi protocol flaw allows attackers to hijack network traffic (BleepingComputer) 
Cross-chain bridge attacks. (CyberWire)
 2023 Annual State of Email Security Report (Cofense)
From Ukraine to the whole of Europe:cyber conflict reaches a turning point (Thales Group) 
Russia Ramps Up Cyberattacks On Ukraine Allies: Analysts (Barron's) 
Pro-Russian hackers shift focus from Ukraine to EU countries (Radio Sweden) 
Russian hackers attack Slovak governmental websites after country supplies Mig-29s to Ukraine (Ukrainska Pravda)
Ukraine's Defense Ministry says Russia is encouraging online piracy (The Jerusalem Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Traffers and the threat to credentials. A newly discovered WiFi protocol flaw. Cross-chain bridge attacks. A shift in Russian cyber operations. Ann Johnson from Afternoon Cyber Tea chats with EY principal Adam Malone. Our guest is Toni Buhrke from Mimecast with a look at the State of Email Security. And is piracy patriotic?</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/60</p><p><br></p><h2>Selected reading.</h2><p><a href="https://outpost24.com/blog/traffers-and-the-growing-threat-against-credentials">Traffers and the growing threat against credentials</a> (Outpost24 blog) </p><p><a href="https://www.bleepingcomputer.com/news/security/wifi-protocol-flaw-allows-attackers-to-hijack-network-traffic/">WiFi protocol flaw allows attackers to hijack network traffic</a> (BleepingComputer) </p><p><a href="https://thecyberwire.com/stories/8e2f5902c26e48e4804422f2f5878bf3/cross-chain-bridge-attacks">Cross-chain bridge attacks.</a> (CyberWire)</p><p><a href="https://cofense.com/annualreport"> 2023 Annual State of Email Security Report</a> (Cofense)</p><p><a href="https://www.thalesgroup.com/en/worldwide/security/press_release/ukraine-whole-europecyber-conflict-reaches-turning-point">From Ukraine to the whole of Europe:cyber conflict reaches a turning point</a> (Thales Group) </p><p><a href="https://www.barrons.com/news/russia-ramps-up-cyberattacks-on-ukraine-allies-analysts-6d9f3e4d">Russia Ramps Up Cyberattacks On Ukraine Allies: Analysts</a> (Barron's) </p><p><a href="https://sverigesradio.se/artikel/pro-russian-hackers-shift-focus-from-ukraine-to-eu-countries">Pro-Russian hackers shift focus from Ukraine to EU countries</a> (Radio Sweden) </p><p><a href="https://www.pravda.com.ua/eng/news/2023/03/28/7395422/">Russian hackers attack Slovak governmental websites after country supplies Mig-29s to Ukraine</a> (Ukrainska Pravda)</p><p><a href="https://www.jpost.com/international/article-735505">Ukraine's Defense Ministry says Russia is encouraging online piracy</a> (The Jerusalem Post)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2ceaaf66-8167-11ed-9779-0b51b13b81d3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7595629057.mp3?updated=1690331686" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Twitter looks for a leaker. Insider risks. The state of resilience. Russian auxiliaries briefly disrupt a French National Assembly website. Cyber trends in the hybrid war. DPRK hacking, as it is. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1789/notes</link>
      <description>Twitter gets a subpoena for a source-code leaker’s information. The insider risk to data. Russian hacktivist auxiliaries target the French National Assembly. Recent trends in cyberattacks sustained by Ukraine. Ben Yelin unpacks the White House executive order on spyware. Mr. Security Answer Person John Pescatore ponders the permanence of ransomware. And Cyberespionage and cybercrime in the interest of Pyongyang’s weapons programs.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/59

Selected reading.
GitHub Suspends Repository Containing Leaked Twitter Source Code (SecurityWeek)
Twitter takes down source code leaked online, hunts for downloaders (BleepingComputer)
Annual Data Exposure Report 2023 (Code 42)
Russian Hackers Target French National Assembly Website (Privacy Affairs)
Pro-Russian Hacktivists: A Reaction to a Western Response to a Russian Aggression (Radware Blog)
Ukraine at D+397: Cyberespionage and battlespace preparation. (CyberWire)
APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations (Mandiant)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Mar 2023 20:15:00 -0000</pubDate>
      <itunes:title>Twitter looks for a leaker. Insider risks. The state of resilience. Russian auxiliaries briefly disrupt a French National Assembly website. Cyber trends in the hybrid war. DPRK hacking, as it is. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1789</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Twitter gets a subpoena for a source-code leaker’s information. The insider risk to data. Russian hacktivist auxiliaries target the French National Assembly. Recent trends in cyberattacks sustained by Ukraine. Ben Yelin unpacks the White House executive order on spyware. Mr. Security Answer Person John Pescatore ponders the permanence of ransomware. And Cyberespionage and cybercrime in the interest of Pyongyang’s weapons programs.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/59

Selected reading.
GitHub Suspends Repository Containing Leaked Twitter Source Code (SecurityWeek)
Twitter takes down source code leaked online, hunts for downloaders (BleepingComputer)
Annual Data Exposure Report 2023 (Code 42)
Russian Hackers Target French National Assembly Website (Privacy Affairs)
Pro-Russian Hacktivists: A Reaction to a Western Response to a Russian Aggression (Radware Blog)
Ukraine at D+397: Cyberespionage and battlespace preparation. (CyberWire)
APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations (Mandiant)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Twitter gets a subpoena for a source-code leaker’s information. The insider risk to data. Russian hacktivist auxiliaries target the French National Assembly. Recent trends in cyberattacks sustained by Ukraine. Ben Yelin unpacks the White House executive order on spyware. Mr. Security Answer Person John Pescatore ponders the permanence of ransomware. And Cyberespionage and cybercrime in the interest of Pyongyang’s weapons programs.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/59</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.securityweek.com/github-suspends-repository-containing-leaked-twitter-source-code/">GitHub Suspends Repository Containing Leaked Twitter Source Code</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/twitter-takes-down-source-code-leaked-online-hunts-for-downloaders/">Twitter takes down source code leaked online, hunts for downloaders</a> (BleepingComputer)</p><p><a href="https://www.code42.com/resources/reports/2023-data-exposure">Annual Data Exposure Report 2023</a> (Code 42)</p><p><a href="https://www.privacyaffairs.com/french-national-assembly-ddos/">Russian Hackers Target French National Assembly Website</a> (Privacy Affairs)</p><p><a href="https://blog.radware.com/security/2023/03/pro-russian-hacktivists-western-response-to-russian-aggression/">Pro-Russian Hacktivists: A Reaction to a Western Response to a Russian Aggression </a>(Radware Blog)</p><p><a href="https://thecyberwire.com/stories/44845a9968264ac7b9b08e6e70c07f94/ukraine-at-d397-cyberespionage-and-battlespace-preparation">Ukraine at D+397: Cyberespionage and battlespace preparation.</a> (CyberWire)</p><p><a href="https://www.mandiant.com/resources/reports/apt43-north-korea-cybercrime-espionage">APT43: North Korean Group Uses Cybercrime to Fund Espionage Operations</a> (Mandiant)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1425</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2c9bddfa-8167-11ed-9779-134058b30abf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5889721737.mp3?updated=1690331668" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Evolution of criminal scams (especially BEC). Law enforcement honeypots. ChatGPT data leak. Hybrid war updates.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1788/notes</link>
      <description>IcedID is evolving away from its banking malware roots. An Emotet phishing campaign spoofs IRS W9s. The FBI warns of BEC scams. A Fake booter service as a law enforcement honeypot. Phishing in China's nuclear energy sector. Reports of an OpenAI and a ChatGPT data leak. Does Iran receive Russian support in cyberattacks against Albania? My conversation with Linda Gray Martin and Britta Glade from RSAC with a preview of this year's conference. Our own Rick Howard takes a field trip to the National Cryptologic Museum. And De-anonymizing Telegram.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/58

Selected reading.
Fork in the Ice: The New Era of IcedID (Proofpoint)
Emotet malware distributed as fake W-9 tax forms from the IRS (BleepingComputer)
Internet Crime Complaint Center (IC3) | Business Email Compromise Tactics Used to Facilitate the Acquisition of Commodities and Defrauding Vendors (IC3)
Phishing Campaign Targets Chinese Nuclear Energy Industry (Intezer) 
'Bitter' espionage hackers target Chinese nuclear energy orgs (BleepingComputer)
UK Sets Up Fake DDoS-for-Hire Sites to Trap Hackers (PCMag Middle East)
UK National Crime Agency reveals it ran fake DDoS-for-hire sites to collect users’ data (Record)
OpenAI: ChatGPT payment data leak caused by open-source bug (BleepingComputer)
OpenAI says a bug leaked sensitive ChatGPT user data (Engadget)
March 20 ChatGPT outage: Here’s what happened (OpenAI)
How Albania Became a Target for Cyberattacks (Foreign Policy) 
Russia’s Rostec allegedly can de-anonymize Telegram users (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 27 Mar 2023 20:15:00 -0000</pubDate>
      <itunes:title>Evolution of criminal scams (especially BEC). Law enforcement honeypots. ChatGPT data leak. Hybrid war updates.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1788</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>IcedID is evolving away from its banking malware roots. An Emotet phishing campaign spoofs IRS W9s. The FBI warns of BEC scams. A Fake booter service as a law enforcement honeypot. Phishing in China's nuclear energy sector. Reports of an OpenAI and a ChatGPT data leak. Does Iran receive Russian support in cyberattacks against Albania? My conversation with Linda Gray Martin and Britta Glade from RSAC with a preview of this year's conference. Our own Rick Howard takes a field trip to the National Cryptologic Museum. And De-anonymizing Telegram.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/58

Selected reading.
Fork in the Ice: The New Era of IcedID (Proofpoint)
Emotet malware distributed as fake W-9 tax forms from the IRS (BleepingComputer)
Internet Crime Complaint Center (IC3) | Business Email Compromise Tactics Used to Facilitate the Acquisition of Commodities and Defrauding Vendors (IC3)
Phishing Campaign Targets Chinese Nuclear Energy Industry (Intezer) 
'Bitter' espionage hackers target Chinese nuclear energy orgs (BleepingComputer)
UK Sets Up Fake DDoS-for-Hire Sites to Trap Hackers (PCMag Middle East)
UK National Crime Agency reveals it ran fake DDoS-for-hire sites to collect users’ data (Record)
OpenAI: ChatGPT payment data leak caused by open-source bug (BleepingComputer)
OpenAI says a bug leaked sensitive ChatGPT user data (Engadget)
March 20 ChatGPT outage: Here’s what happened (OpenAI)
How Albania Became a Target for Cyberattacks (Foreign Policy) 
Russia’s Rostec allegedly can de-anonymize Telegram users (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>IcedID is evolving away from its banking malware roots. An Emotet phishing campaign spoofs IRS W9s. The FBI warns of BEC scams. A Fake booter service as a law enforcement honeypot. Phishing in China's nuclear energy sector. Reports of an OpenAI and a ChatGPT data leak. Does Iran receive Russian support in cyberattacks against Albania? My conversation with Linda Gray Martin and Britta Glade from RSAC with a preview of this year's conference. Our own Rick Howard takes a field trip to the National Cryptologic Museum. And De-anonymizing Telegram.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/58</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.proofpoint.com/us/blog/threat-insight/fork-ice-new-era-icedid">Fork in the Ice: The New Era of IcedID</a> (Proofpoint)</p><p><a href="https://www.bleepingcomputer.com/news/security/emotet-malware-distributed-as-fake-w-9-tax-forms-from-the-irs/">Emotet malware distributed as fake W-9 tax forms from the IRS </a>(BleepingComputer)</p><p><a href="https://www.ic3.gov/Media/Y2023/PSA230324">Internet Crime Complaint Center (IC3) | Business Email Compromise Tactics Used to Facilitate the Acquisition of Commodities and Defrauding Vendors</a> (IC3)</p><p><a href="https://www.intezer.com/blog/research/phishing-campaign-targets-nuclear-energy-industry/">Phishing Campaign Targets Chinese Nuclear Energy Industry</a> (Intezer) </p><p><a href="https://www.bleepingcomputer.com/news/security/bitter-espionage-hackers-target-chinese-nuclear-energy-orgs/">'Bitter' espionage hackers target Chinese nuclear energy orgs</a> (BleepingComputer)</p><p><a href="https://me.pcmag.com/en/security/15722/uk-sets-up-fake-ddos-for-hire-sites-to-trap-hackers">UK Sets Up Fake DDoS-for-Hire Sites to Trap Hackers</a> (PCMag Middle East)</p><p><a href="https://therecord.media/ddos-for-hire-fake-sites-uk-national-crime-agency">UK National Crime Agency reveals it ran fake DDoS-for-hire sites to collect users’ data</a> (Record)</p><p><a href="https://www.bleepingcomputer.com/news/security/openai-chatgpt-payment-data-leak-caused-by-open-source-bug/">OpenAI: ChatGPT payment data leak caused by open-source bug</a> (BleepingComputer)</p><p><a href="https://www.engadget.com/openai-says-a-bug-leaked-sensitive-chatgpt-user-data-165439848.html">OpenAI says a bug leaked sensitive ChatGPT user data</a> (Engadget)</p><p><a href="https://openai.com/blog/march-20-chatgpt-outage">March 20 ChatGPT outage: Here’s what happened</a> (OpenAI)</p><p><a href="https://foreignpolicy.com/2023/03/25/albania-target-cyberattacks-russia-iran/">How Albania Became a Target for Cyberattacks</a> (Foreign Policy) </p><p><a href="https://www.bleepingcomputer.com/news/security/russia-s-rostec-allegedly-can-de-anonymize-telegram-users/">Russia’s Rostec allegedly can de-anonymize Telegram users</a> (BleepingComputer)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1813</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2cd03fa0-8167-11ed-9779-a77c250b86a9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6778638952.mp3?updated=1690331643" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An introduction to the National Cryptologic Museum. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/51/notes</link>
      <description>Rick Howard, N2K’s CSO and The CyberWire’s Chief Analyst and Senior Fellow, sits down with Director of the National Cryptologic Museum, Dr. Vince Houghton. The National Cryptologic Museum is the NSA's affiliated museum sharing the nation's best cryptologic secrets with the public. In this special episode, Rick interviews Dr. Houghton from within the walls of the National Cryptologic Museum, discussing the new and improved museum along with the new exhibits they uncovered during the pandemic.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 27 Mar 2023 07:00:00 -0000</pubDate>
      <itunes:title>An introduction to the National Cryptologic Museum. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>52</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Rick Howard, N2K’s CSO and The CyberWire’s Chief Analyst and Senior Fellow, sits down with Director of the National Cryptologic Museum, Dr. Vince Houghton. The National Cryptologic Museum is the NSA's affiliated museum sharing the nation's best cryptologic secrets with the public. In this special episode, Rick interviews Dr. Houghton from within the walls of the National Cryptologic Museum, discussing the new and improved museum along with the new exhibits they uncovered during the pandemic.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rick Howard, N2K’s CSO and The CyberWire’s Chief Analyst and Senior Fellow, sits down with Director of the National Cryptologic Museum, Dr. Vince Houghton. The National Cryptologic Museum is the NSA's affiliated museum sharing the nation's best cryptologic secrets with the public. In this special episode, Rick interviews Dr. Houghton from within the walls of the National Cryptologic Museum, discussing the new and improved museum along with the new exhibits they uncovered during the pandemic.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[200c4db6-ca89-11ed-88b1-23c5dc54d81d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3104394502.mp3?updated=1679597979" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Two viewpoints on the National Cybersecurity Strategy. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/51/notes</link>
      <description>Earlier this month, the White House released the National Cybersecurity Strategy, the first issued since 2018. The strategy refocuses roles, responsibilities, and resource allocations in the digital ecosystem, with a five pillar approach. Those pillars are: defending critical infrastructure, disrupting threat actors, shaping market forces to drive security and resilience, investing in a resilient future, and forging international partnerships.
We wanted to delve into the strategy and its intended effects further, so Dave Bittner spoke with representatives from industry and inside government. Dave first speaks with Adam Isles, Principal and Head of Cybersecurity Practice at The Chertoff Group, sharing industry's take on the strategy. Following that conversation, Dave had a discussion with Steve Kelly, Special Assistant to the President and Senior Director for Cybersecurity and Emerging Technology at the National Security Council, for a look at the strategy from inside the White House.
Links to resources:


Point of View: 2023 National Cybersecurity Strategy The Chertoff Group's blog

National Cybersecurity Strategy 2023


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 26 Mar 2023 07:00:00 -0000</pubDate>
      <itunes:title>Two viewpoints on the National Cybersecurity Strategy. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>51</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Earlier this month, the White House released the National Cybersecurity Strategy, the first issued since 2018. The strategy refocuses roles, responsibilities, and resource allocations in the digital ecosystem, with a five pillar approach. Those pillars are: defending critical infrastructure, disrupting threat actors, shaping market forces to drive security and resilience, investing in a resilient future, and forging international partnerships.
We wanted to delve into the strategy and its intended effects further, so Dave Bittner spoke with representatives from industry and inside government. Dave first speaks with Adam Isles, Principal and Head of Cybersecurity Practice at The Chertoff Group, sharing industry's take on the strategy. Following that conversation, Dave had a discussion with Steve Kelly, Special Assistant to the President and Senior Director for Cybersecurity and Emerging Technology at the National Security Council, for a look at the strategy from inside the White House.
Links to resources:


Point of View: 2023 National Cybersecurity Strategy The Chertoff Group's blog

National Cybersecurity Strategy 2023


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Earlier this month, the White House released the National Cybersecurity Strategy, the first issued since 2018. The strategy refocuses roles, responsibilities, and resource allocations in the digital ecosystem, with a five pillar approach. Those pillars are: defending critical infrastructure, disrupting threat actors, shaping market forces to drive security and resilience, investing in a resilient future, and forging international partnerships.</p><p>We wanted to delve into the strategy and its intended effects further, so Dave Bittner spoke with representatives from industry and inside government. Dave first speaks with <a href="https://www.linkedin.com/in/adam-isles-038614b/">Adam Isles</a>, Principal and Head of Cybersecurity Practice at The Chertoff Group, sharing industry's take on the strategy. Following that conversation, Dave had a discussion with <a href="https://www.linkedin.com/in/steven-m-kelly-cissp-b9a295187/">Steve Kelly</a>, Special Assistant to the President and Senior Director for Cybersecurity and Emerging Technology at the National Security Council, for a look at the strategy from inside the White House.</p><p>Links to resources:</p><ul>
<li>
<a href="https://www.chertoffgroup.com/blog/2023-national-cybersecurity-strategy">Point of View: 2023 National Cybersecurity Strategy</a> The Chertoff Group's blog</li>
<li><a href="https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf">National Cybersecurity Strategy 2023</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1923</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[14fe8d26-ca89-11ed-88b1-274c668c6bcc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5920022392.mp3?updated=1679681717" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tanya Janca: Find a community who supports you. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/142/notes</link>
      <description>Tanya Janca, CEO and Founder of We Hack Purple, sits down to talk about her exciting path into the field of cybersecurity. Trying several different paths in high school, she soon found she was good at computer science. When it came to picking a college, she knew that was the field she wanted to get into. After college, she was able to use her skills to work at a couple of different organizations, eventually getting into the Canadian government. While there, she held the position of CISO for the Canadian election in 2015 when Justin Trudeau was elected, but she knew she wanted to try something new. She switched from programming to security and after working at Microsoft as a presenter, she eventually found that she wanted to start her own company, saying "at first it was just me presenting, but now we have community members present to each other and it's just been really beautiful to see that grow." She hopes that with her and her community's help, nobody is left feeling unsafe when it comes to being online.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 26 Mar 2023 07:00:00 -0000</pubDate>
      <itunes:title>Tanya Janca: Find a community who supports you. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>142</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Tanya Janca, CEO and Founder of We Hack Purple, sits down to talk about her exciting path into the field of cybersecurity. Trying several different paths in high school, she soon found she was good at computer science. When it came to picking a college, she knew that was the field she wanted to get into. After college, she was able to use her skills to work at a couple of different organizations, eventually getting into the Canadian government. While there, she held the position of CISO for the Canadian election in 2015 when Justin Trudeau was elected, but she knew she wanted to try something new. She switched from programming to security and after working at Microsoft as a presenter, she eventually found that she wanted to start her own company, saying "at first it was just me presenting, but now we have community members present to each other and it's just been really beautiful to see that grow." She hopes that with her and her community's help, nobody is left feeling unsafe when it comes to being online.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tanya Janca, CEO and Founder of We Hack Purple, sits down to talk about her exciting path into the field of cybersecurity. Trying several different paths in high school, she soon found she was good at computer science. When it came to picking a college, she knew that was the field she wanted to get into. After college, she was able to use her skills to work at a couple of different organizations, eventually getting into the Canadian government. While there, she held the position of CISO for the Canadian election in 2015 when Justin Trudeau was elected, but she knew she wanted to try something new. She switched from programming to security and after working at Microsoft as a presenter, she eventually found that she wanted to start her own company, saying "at first it was just me presenting, but now we have community members present to each other and it's just been really beautiful to see that grow." She hopes that with her and her community's help, nobody is left feeling unsafe when it comes to being online.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>491</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2fb61480-c9ae-11ed-ad84-536d50cd9c8b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8270797154.mp3?updated=1679589706" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Popunders are not the good kind of ads. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/274/notes</link>
      <description>On this episode, Jérôme Segura, senior threat researcher at Malwarebytes, shares his team's work, "WordPress sites backdoored with ad fraud plugin." WordPress is an immensely popular content management system (CMS) powering over 43% of all websites. Many webmasters will monetize their sites by running ads and need to draw particular attention to search engine optimization (SEO) techniques to maximize their revenues.
The Malwarebytes team discovered a few dozen WordPress blogs using the same plugin that mimics human activity by automatically scrolling a page and following links within it, all the while a number of ads were being loaded and refreshed. The blogs would only exhibit this invalid traffic behavior when launched from a specific URL created by this plugin, otherwise they appeared completely legitimate.
The research can be found here:
WordPress sites backdoored with ad fraud plugin

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Mar 2023 07:00:00 -0000</pubDate>
      <itunes:title>Popunders are not the good kind of ads. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>274</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this episode, Jérôme Segura, senior threat researcher at Malwarebytes, shares his team's work, "WordPress sites backdoored with ad fraud plugin." WordPress is an immensely popular content management system (CMS) powering over 43% of all websites. Many webmasters will monetize their sites by running ads and need to draw particular attention to search engine optimization (SEO) techniques to maximize their revenues.
The Malwarebytes team discovered a few dozen WordPress blogs using the same plugin that mimics human activity by automatically scrolling a page and following links within it, all the while a number of ads were being loaded and refreshed. The blogs would only exhibit this invalid traffic behavior when launched from a specific URL created by this plugin, otherwise they appeared completely legitimate.
The research can be found here:
WordPress sites backdoored with ad fraud plugin

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this episode, Jérôme Segura, senior threat researcher at Malwarebytes, shares his team's work, "WordPress sites backdoored with ad fraud plugin." WordPress is an immensely popular content management system (CMS) powering over 43% of all websites. Many webmasters will monetize their sites by running ads and need to draw particular attention to search engine optimization (SEO) techniques to maximize their revenues.</p><p>The Malwarebytes team discovered a few dozen WordPress blogs using the same plugin that mimics human activity by automatically scrolling a page and following links within it, all the while a number of ads were being loaded and refreshed. The blogs would only exhibit this invalid traffic behavior when launched from a specific URL created by this plugin, otherwise they appeared completely legitimate.</p><p>The research can be found here:</p><ul><li><a href="https://www.malwarebytes.com/blog/threat-intelligence/2023/02/wordpress-sites-backdoored-with-ad-fraud-plugin">WordPress sites backdoored with ad fraud plugin</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1477</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[48ca7bec-c809-11ed-8e9b-ffa0f62fd88f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2318109185.mp3?updated=1685127527" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tools, alerts, and advisories from CISA. Reply phishing scams. Cl0p goes everywhere with GoAnywhere. EW in the hybrid war, and shields stay up.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1787/notes</link>
      <description>A CISA tool helps secure Microsoft clouds.JCDC and pre-ransomware notification. CISA releases six ICS advisories. Reply phishing. Cl0p goes everywhere exploiting GoAnywhere. Russian electronic warfare units show the ability to locate Starlink terminals. Betsy Carmelite from Booz Allen Hamilton on the DoD's zero trust journey. Analysis of the National Cybersecurity strategy from our special guests, Adam Isles, Principal at the Chertoff Group and Steve Kelly, Special Assistant to the President and Senior Director for Cybersecurity and Emerging Technology with the National Security Council.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/57

Selected reading.
JCDC Cultivates Pre-Ransomware Notification Capability (Cybersecurity and Infrastructure Security Agency CISA)
US cyber officials make urgent push to warn businesses about vulnerabilities to hackers (CNN)
Untitled Goose Tool Aids Hunt and Incident Response in Azure, Azure Active Directory, and Microsoft 365 Environments | CISA (Cybersecurity and Infrastructure Security Agency CISA)
New CISA tool detects hacking activity in Microsoft cloud services (BleepingComputer)
CISA Releases Six Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency CISA)
The Microsoft Reply Attack (Avanan)
More victims emerge from Fortra GoAnywhere zero-day attacks (Security | 
More Clop GoAnywhere attack victims emerge (SC Media) 
Mass-Ransomware Attack on GoAnywhere File Transfer Tool Exposes Companies Worldwide (Medium) 
City of Toronto confirms data theft, Clop claims responsibility (BleepingComputer) 
Canadian movie chain Cineplex among the victims of GoAnywhere MFT hack (Financial Post) 
Personal data of Rio Tinto's Aussie staff may have been hacked - memo (Reuters) 
Another GoAnywhere Attack Affects Japanese Giant Hitachi Energy (Heimdal Security Blog) 
Using Starlink Paints a Target on Ukrainian Troops (Defense One)
As CISA chief notes lack of Russian cyberattacks against US, experts focus on enhancing nuclear reactor security (Utility Dive)
Using Deception to Learn About Russian Threat Actors (Security Boulevard)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 24 Mar 2023 20:15:00 -0000</pubDate>
      <itunes:title>Tools, alerts, and advisories from CISA. Reply phishing scams. Cl0p goes everywhere with GoAnywhere. EW in the hybrid war, and shields stay up.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1787</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A CISA tool helps secure Microsoft clouds.JCDC and pre-ransomware notification. CISA releases six ICS advisories. Reply phishing. Cl0p goes everywhere exploiting GoAnywhere. Russian electronic warfare units show the ability to locate Starlink terminals. Betsy Carmelite from Booz Allen Hamilton on the DoD's zero trust journey. Analysis of the National Cybersecurity strategy from our special guests, Adam Isles, Principal at the Chertoff Group and Steve Kelly, Special Assistant to the President and Senior Director for Cybersecurity and Emerging Technology with the National Security Council.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/57

Selected reading.
JCDC Cultivates Pre-Ransomware Notification Capability (Cybersecurity and Infrastructure Security Agency CISA)
US cyber officials make urgent push to warn businesses about vulnerabilities to hackers (CNN)
Untitled Goose Tool Aids Hunt and Incident Response in Azure, Azure Active Directory, and Microsoft 365 Environments | CISA (Cybersecurity and Infrastructure Security Agency CISA)
New CISA tool detects hacking activity in Microsoft cloud services (BleepingComputer)
CISA Releases Six Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency CISA)
The Microsoft Reply Attack (Avanan)
More victims emerge from Fortra GoAnywhere zero-day attacks (Security | 
More Clop GoAnywhere attack victims emerge (SC Media) 
Mass-Ransomware Attack on GoAnywhere File Transfer Tool Exposes Companies Worldwide (Medium) 
City of Toronto confirms data theft, Clop claims responsibility (BleepingComputer) 
Canadian movie chain Cineplex among the victims of GoAnywhere MFT hack (Financial Post) 
Personal data of Rio Tinto's Aussie staff may have been hacked - memo (Reuters) 
Another GoAnywhere Attack Affects Japanese Giant Hitachi Energy (Heimdal Security Blog) 
Using Starlink Paints a Target on Ukrainian Troops (Defense One)
As CISA chief notes lack of Russian cyberattacks against US, experts focus on enhancing nuclear reactor security (Utility Dive)
Using Deception to Learn About Russian Threat Actors (Security Boulevard)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A CISA tool helps secure Microsoft clouds.JCDC and pre-ransomware notification. CISA releases six ICS advisories. Reply phishing. Cl0p goes everywhere exploiting GoAnywhere. Russian electronic warfare units show the ability to locate Starlink terminals. Betsy Carmelite from Booz Allen Hamilton on the DoD's zero trust journey. Analysis of the National Cybersecurity strategy from our special guests, Adam Isles, Principal at the Chertoff Group and Steve Kelly, Special Assistant to the President and Senior Director for Cybersecurity and Emerging Technology with the National Security Council.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/57</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/news-events/alerts/2023/03/23/jcdc-cultivates-pre-ransomware-notification-capability">JCDC Cultivates Pre-Ransomware Notification Capability</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.cnn.com/2023/03/23/politics/cyber-officials-business-hacking-warning/index.html">US cyber officials make urgent push to warn businesses about vulnerabilities to hackers</a> (CNN)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/03/23/untitled-goose-tool-aids-hunt-and-incident-response-azure-azure-active-directory-and-microsoft-365">Untitled Goose Tool Aids Hunt and Incident Response in Azure, Azure Active Directory, and Microsoft 365 Environments | CISA</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-cisa-tool-detects-hacking-activity-in-microsoft-cloud-services/">New CISA tool detects hacking activity in Microsoft cloud services</a> (BleepingComputer)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/03/23/cisa-releases-six-industrial-control-systems-advisories">CISA Releases Six Industrial Control Systems Advisories</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.avanan.com/blog/the-microsoft-reply-attack">The Microsoft Reply Attack</a> (Avanan)</p><p><a href="https://www.techtarget.com/searchsecurity/news/365533992/More-victims-emerge-from-Fortra-GoAnywhere-zero-day-attacks">More victims emerge from Fortra GoAnywhere zero-day attacks</a> (Security | </p><p><a href="https://www.scmagazine.com/brief/ransomware/more-clop-goanywhere-attack-victims-emerge">More Clop GoAnywhere attack victims emerge</a> (SC Media) </p><p><a href="https://medium.com/@bartmcdonough/mass-ransomware-attack-on-goanywhere-file-transfer-tool-exposes-companies-worldwide-9b183151ab2b">Mass-Ransomware Attack on GoAnywhere File Transfer Tool Exposes Companies Worldwide</a> (Medium) </p><p><a href="https://www.bleepingcomputer.com/news/security/city-of-toronto-confirms-data-theft-clop-claims-responsibility/">City of Toronto confirms data theft, Clop claims responsibility</a> (BleepingComputer) </p><p><a href="https://financialpost.com/technology/canadian-movie-chain-cineplex-among-the-victims-of-goanywhere-mft-hack">Canadian movie chain Cineplex among the victims of GoAnywhere MFT hack</a> (Financial Post) </p><p><a href="https://www.reuters.com/technology/rio-tinto-staffs-personal-data-may-have-been-hacked-afr-2023-03-23/">Personal data of Rio Tinto's Aussie staff may have been hacked - memo</a> (Reuters) </p><p><a href="https://heimdalsecurity.com/blog/another-goanywhere-attack-affects-japanese-giant-hitachi-energy/">Another GoAnywhere Attack Affects Japanese Giant Hitachi Energy</a> (Heimdal Security Blog) </p><p><a href="https://www.defenseone.com/threats/2023/03/using-starlink-paints-target-ukrainian-troops/384361/">Using Starlink Paints a Target on Ukrainian Troops</a> (Defense One)</p><p><a href="https://www.utilitydive.com/news/as-cisa-chief-notes-lack-of-russian-cyberattacks-against-us-experts-focus/645798/">As CISA chief notes lack of Russian cyberattacks against US, experts focus on enhancing nuclear reactor security</a> (Utility Dive)</p><p><a href="https://securityboulevard.com/2023/03/using-deception-to-learn-about-russian-threat-actors/">Using Deception to Learn About Russian Threat Actors</a> (Security Boulevard)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1693</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2da1f126-8167-11ed-9779-5f27290a43ad]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9964485992.mp3?updated=1690331626" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pyongyang’s intelligence services have been busy in cyberspace. Hacktivists exaggerate the effects of their attacks on OT. Ghostwriter is back. A twice-told tale: ineffective cyberwar campaigns. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1786/notes</link>
      <description>DPRK threat actor Kimsuky uses a Chrome extension to exfiltrate emails, while ScarCruft prospects South Korean organizations. Hacktivists' claims of attacks on OT networks may be overstated. Ghostwriter remains active in social engineering attempts to target Ukrainian refugees. Joe Carrigan has cyber crime by the numbers. Our guest is Christian Sorensen from SightGain with analysis of the cyber effects of Russia’s war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/56

Selected reading.
North Korean hackers using Chrome extensions to steal Gmail emails (BleepingComputer)
Joint Cyber Security Advisory (Korean) (BundesamtfuerVerfassungsschutz)
North Korean APT group ‘Kimsuky’ targeting experts with new spearphishing campaign (Record)
ScarCruft's Evolving Arsenal: Researchers Reveal New Malware Distribution Techniques (The Hacker News)
The Unintentional Leak: A glimpse into the attack vectors of APT37 (Zscaler)
CHM Malware Disguised as Security Email from a Korean Financial Company: Redeyes (Scarcruft) (ASEC BLOG) 
A Propaganda Group is Using Fake Emails to Target Ukrainian Refugees (Bloomberg) 
We (Did!) Start the Fire: Hacktivists Increasingly Claim Targeting of OT Systems | Mandiant (Mandiant)
Fact or fiction, hacktivists' claims of industrial sabotage in Russia or Ukraine get attention online (CyberScoop)
The 5×5—Conflict in Ukraine's information environment (Atlantic Council)
How the Russia-Ukraine conflict has impacted cyber-warfare (teiss)
CommonMagic APT gang attacking organisations in Ukraine (Tech Monitor)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 23 Mar 2023 20:15:00 -0000</pubDate>
      <itunes:title>Pyongyang’s intelligence services have been busy in cyberspace. Hacktivists exaggerate the effects of their attacks on OT. Ghostwriter is back. A twice-told tale: ineffective cyberwar campaigns. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1786</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>DPRK threat actor Kimsuky uses a Chrome extension to exfiltrate emails, while ScarCruft prospects South Korean organizations. Hacktivists' claims of attacks on OT networks may be overstated. Ghostwriter remains active in social engineering attempts to target Ukrainian refugees. Joe Carrigan has cyber crime by the numbers. Our guest is Christian Sorensen from SightGain with analysis of the cyber effects of Russia’s war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/56

Selected reading.
North Korean hackers using Chrome extensions to steal Gmail emails (BleepingComputer)
Joint Cyber Security Advisory (Korean) (BundesamtfuerVerfassungsschutz)
North Korean APT group ‘Kimsuky’ targeting experts with new spearphishing campaign (Record)
ScarCruft's Evolving Arsenal: Researchers Reveal New Malware Distribution Techniques (The Hacker News)
The Unintentional Leak: A glimpse into the attack vectors of APT37 (Zscaler)
CHM Malware Disguised as Security Email from a Korean Financial Company: Redeyes (Scarcruft) (ASEC BLOG) 
A Propaganda Group is Using Fake Emails to Target Ukrainian Refugees (Bloomberg) 
We (Did!) Start the Fire: Hacktivists Increasingly Claim Targeting of OT Systems | Mandiant (Mandiant)
Fact or fiction, hacktivists' claims of industrial sabotage in Russia or Ukraine get attention online (CyberScoop)
The 5×5—Conflict in Ukraine's information environment (Atlantic Council)
How the Russia-Ukraine conflict has impacted cyber-warfare (teiss)
CommonMagic APT gang attacking organisations in Ukraine (Tech Monitor)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>DPRK threat actor Kimsuky uses a Chrome extension to exfiltrate emails, while ScarCruft prospects South Korean organizations. Hacktivists' claims of attacks on OT networks may be overstated. Ghostwriter remains active in social engineering attempts to target Ukrainian refugees. Joe Carrigan has cyber crime by the numbers. Our guest is Christian Sorensen from SightGain with analysis of the cyber effects of Russia’s war.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/56</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/security/north-korean-hackers-using-chrome-extensions-to-steal-gmail-emails/">North Korean hackers using Chrome extensions to steal Gmail emails</a> (BleepingComputer)</p><p><a href="https://www.verfassungsschutz.de/SharedDocs/publikationen/EN/prevention/2023-03-20-joint-cyber-security-advisory-korean.html;jsessionid=5F54A73439C826897C132E375AB684F2.intranet252">Joint Cyber Security Advisory (Korean)</a> (BundesamtfuerVerfassungsschutz)</p><p><a href="https://therecord.media/north-korea-apt-kimsuky-attacks">North Korean APT group ‘Kimsuky’ targeting experts with new spearphishing campaign</a> (Record)</p><p><a href="https://thehackernews.com/2023/03/scarcrufts-evolving-arsenal-researchers.html">ScarCruft's Evolving Arsenal: Researchers Reveal New Malware Distribution Techniques</a> (The Hacker News)</p><p><a href="https://www.zscaler.com/blogs/security-research/unintentional-leak-glimpse-attack-vectors-apt37">The Unintentional Leak: A glimpse into the attack vectors of APT37</a> (Zscaler)</p><p><a href="https://asec.ahnlab.com/en/49089/">CHM Malware Disguised as Security Email from a Korean Financial Company: Redeyes (Scarcruft)</a> (ASEC BLOG) </p><p><a href="https://www.bloomberg.com/news/newsletters/2023-03-22/a-propaganda-group-is-using-fake-emails-to-target-ukrainian-refugees">A Propaganda Group is Using Fake Emails to Target Ukrainian Refugees</a> (Bloomberg) </p><p><a href="https://www.mandiant.com/resources/blog/hacktivists-targeting-ot-systems">We (Did!) Start the Fire: Hacktivists Increasingly Claim Targeting of OT Systems | Mandiant</a> (Mandiant)</p><p><a href="https://cyberscoop.com/hacktivist-target-operational-technology/">Fact or fiction, hacktivists' claims of industrial sabotage in Russia or Ukraine get attention online</a> (CyberScoop)</p><p><a href="https://www.atlanticcouncil.org/content-series/the-5x5/the-5x5-conflict-in-ukraines-information-environment/">The 5×5—Conflict in Ukraine's information environment</a> (Atlantic Council)</p><p><a href="https://www.teiss.co.uk/cyber-risk-management/how-the-russia-ukraine-conflict-has-impacted-cyber-warfare">How the Russia-Ukraine conflict has impacted cyber-warfare</a> (teiss)</p><p><a href="https://techmonitor.ai/technology/cybersecurity/commonmagic-apt-ukraine-hacking-cyberattack">CommonMagic APT gang attacking organisations in Ukraine</a> (Tech Monitor)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1584</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2d5143ac-8167-11ed-9779-cf3ecc6f051e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7478876859.mp3?updated=1690331608" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Detecting sandbox emulations. VEC supply chain attacks. Updates from the hybrid war. CISA and NSA offer IAM guidance. Other CISA advisories. Baphomet gets cold feet after all.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1785/notes</link>
      <description>Malware could detect sandbox emulations. A VEC supply chain attack. A new APT is active in Russian-occupied sections of Ukraine. An alleged Russian patriot claims responsibility for the D.C. Health Link attack. CISA and NSA offer guidance on identity and access management (IAM). Tim Starks from the Washington Post has analysis on the BreachForums takedown. Our guest is Ryan Heidorn from C3 Integrated Solutions with a look at the CMMC compliance timeline. And Baphomet backs out.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/55

Selected reading.
ZenGo uncovers security vulnerabilities in popular Web3 Transaction Simulation solutions: The red pill attack (ZenGo)
Stopping a $36 Million Vendor Fraud Attack (Abnormal Intelligence) 
Bad magic: new APT found in the area of Russo-Ukrainian conflict (Securelist)
Unknown actors target orgs in Russia-occupied Ukraine (Register)
New 'Bad Magic' Cyber Threat Disrupt Ukraine's Key Sectors Amid War (The Hacker News)
Partisan suspects turn on the cyber-magic in Ukraine (Cybernews)
Hacker tied to D.C. Health Link breach says attack 'born out of Russian patriotism' (CyberScoop) 
CISA and NSA Release Enduring Security Framework Guidance on Identity and Access Management | CISA (Cybersecurity and Infrastructure Security Agency CISA) 
ESF Partners, NSA, and CISA Release Identity and Access Management Recommended Best Practi (National Security Agency/Central Security Service)
Identity and Access Management: Recommended Best Practices for Administrators (NSA and CISA) 
CISA Releases Updated Cybersecurity Performance Goals (Cybersecurity and Infrastructure Security Agency CISA) 
CISA Releases Eight Industrial Control Systems Advisories | CISA (Cybersecurity and Infrastructure Security Agency CISA)
End of BreachForums could take a bite out of cybercrime (Washington Post)
BreachForums says it is closing after suspected law enforcement access to backend (Record)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 22 Mar 2023 20:15:00 -0000</pubDate>
      <itunes:title>Detecting sandbox emulations. VEC supply chain attacks. Updates from the hybrid war. CISA and NSA offer IAM guidance. Other CISA advisories. Baphomet gets cold feet after all.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1785</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Malware could detect sandbox emulations. A VEC supply chain attack. A new APT is active in Russian-occupied sections of Ukraine. An alleged Russian patriot claims responsibility for the D.C. Health Link attack. CISA and NSA offer guidance on identity and access management (IAM). Tim Starks from the Washington Post has analysis on the BreachForums takedown. Our guest is Ryan Heidorn from C3 Integrated Solutions with a look at the CMMC compliance timeline. And Baphomet backs out.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/55

Selected reading.
ZenGo uncovers security vulnerabilities in popular Web3 Transaction Simulation solutions: The red pill attack (ZenGo)
Stopping a $36 Million Vendor Fraud Attack (Abnormal Intelligence) 
Bad magic: new APT found in the area of Russo-Ukrainian conflict (Securelist)
Unknown actors target orgs in Russia-occupied Ukraine (Register)
New 'Bad Magic' Cyber Threat Disrupt Ukraine's Key Sectors Amid War (The Hacker News)
Partisan suspects turn on the cyber-magic in Ukraine (Cybernews)
Hacker tied to D.C. Health Link breach says attack 'born out of Russian patriotism' (CyberScoop) 
CISA and NSA Release Enduring Security Framework Guidance on Identity and Access Management | CISA (Cybersecurity and Infrastructure Security Agency CISA) 
ESF Partners, NSA, and CISA Release Identity and Access Management Recommended Best Practi (National Security Agency/Central Security Service)
Identity and Access Management: Recommended Best Practices for Administrators (NSA and CISA) 
CISA Releases Updated Cybersecurity Performance Goals (Cybersecurity and Infrastructure Security Agency CISA) 
CISA Releases Eight Industrial Control Systems Advisories | CISA (Cybersecurity and Infrastructure Security Agency CISA)
End of BreachForums could take a bite out of cybercrime (Washington Post)
BreachForums says it is closing after suspected law enforcement access to backend (Record)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Malware could detect sandbox emulations. A VEC supply chain attack. A new APT is active in Russian-occupied sections of Ukraine. An alleged Russian patriot claims responsibility for the D.C. Health Link attack. CISA and NSA offer guidance on identity and access management (IAM). Tim Starks from the Washington Post has analysis on the BreachForums takedown. Our guest is Ryan Heidorn from C3 Integrated Solutions with a look at the CMMC compliance timeline. And Baphomet backs out.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/55</p><p><br></p><h2>Selected reading.</h2><p><a href="https://zengo.com/zengo-uncovers-security-vulnerabilities-in-popular-web3-transaction-simulation-solutions-the-red-pill-attack/">ZenGo uncovers security vulnerabilities in popular Web3 Transaction Simulation solutions: The red pill attack</a> (ZenGo)</p><p><a href="https://intelligence.abnormalsecurity.com/blog/36-million-vendor-fraud">Stopping a $36 Million Vendor Fraud Attack</a> (Abnormal Intelligence) </p><p><a href="https://securelist.com/bad-magic-apt/109087/">Bad magic: new APT found in the area of Russo-Ukrainian conflict</a> (Securelist)</p><p><a href="https://www.theregister.com/2023/03/22/commonmagic_kaspersky_espionage_ukraine/">Unknown actors target orgs in Russia-occupied Ukraine</a> (Register)</p><p><a href="https://thehackernews.com/2023/03/new-bad-magic-cyber-threat-disrupt.html">New 'Bad Magic' Cyber Threat Disrupt Ukraine's Key Sectors Amid War</a> (The Hacker News)</p><p><a href="https://cybernews.com/cyber-war/partisan-threat-actor-cyberwar-ukraine/">Partisan suspects turn on the cyber-magic in Ukraine</a> (Cybernews)</p><p><a href="https://cyberscoop.com/dc-health-link-breach-russia-hacker-congress/">Hacker tied to D.C. Health Link breach says attack 'born out of Russian patriotism'</a> (CyberScoop) </p><p><a href="https://www.cisa.gov/news-events/alerts/2023/03/21/cisa-and-nsa-release-enduring-security-framework-guidance-identity-and-access-management">CISA and NSA Release Enduring Security Framework Guidance on Identity and Access Management | CISA</a> (Cybersecurity and Infrastructure Security Agency CISA) </p><p><a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3336001/esf-partners-nsa-and-cisa-release-identity-and-access-management-recommended-be/">ESF Partners, NSA, and CISA Release Identity and Access Management Recommended Best Practi</a> (National Security Agency/Central Security Service)</p><p><a href="https://media.defense.gov/2023/Mar/21/2003183448/-1/-1/0/ESF%20IDENTITY%20AND%20ACCESS%20MANAGEMENT%20RECOMMENDED%20BEST%20PRACTICES%20FOR%20ADMINISTRATORS%20PP-23-0248_508C.PDF">Identity and Access Management: Recommended Best Practices for Administrators</a> (NSA and CISA) </p><p><a href="https://www.cisa.gov/news-events/alerts/2023/03/21/cisa-releases-updated-cybersecurity-performance-goals">CISA Releases Updated Cybersecurity Performance Goals</a> (Cybersecurity and Infrastructure Security Agency CISA) </p><p><a href="https://www.cisa.gov/news-events/alerts/2023/03/21/cisa-releases-eight-industrial-control-systems-advisories">CISA Releases Eight Industrial Control Systems Advisories | CISA</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.washingtonpost.com/politics/2023/03/22/end-breachforums-could-take-bite-out-cybercrime/">End of BreachForums could take a bite out of cybercrime</a> (Washington Post)</p><p><a href="https://therecord.media/breachforums-shuts-down-after-arrest">BreachForums says it is closing after suspected law enforcement access to backend</a> (Record)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1640</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2d04eef8-8167-11ed-9779-eba8c6237978]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8706413804.mp3?updated=1690331582" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Threat group with novel malware operates in SE Asia. Data theft extortion rises. Key findings of Cisco's Cybersecurity Readiness Index. iPhones no longer welcome in Kremlin. Russian cyber auxiliaries &amp; privateers devote increased attention to healthcare. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1784/notes</link>
      <description>Threat group with novel malware operates in Southeast Asia. Data theft extortion on the rise. Key findings of Cisco's Cybersecurity Readiness Index. iPhones are no longer welcome in the Kremlin. Russian cyber auxiliaries and privateers devote increased attention to the healthcare sector. Chris Eng from Veracode shares findings of their Annual Report on the State of Application Security. Johannes Ullrich from SANS Institute discusses scams after the failure of Silicon Valley Bank. And BreachForums seems to be under new management. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/54

Selected reading.
NAPLISTENER: more bad dreams from developers of SIESTAGRAPH (Elastic Blog) 
Unit 42 Ransomware and Extortion Report Highlights: Multi-Extortion Tactics Continue to Rise (Palo Alto Network)
Ransomware and extortion trends. (CyberWire)
Cisco Cybersecurity Readiness Index (Cisco)
A look at resilience: companies' ability to fight off cyberattacks. (CyberWire)
Putin to staffers: throw out your iPhones over security (Register)
Black Basta, Killnet, LockBit groups targeting healthcare in force (SC Media)
After BreachForums arrest, new site administrator says the platform will live on (Record) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Mar 2023 20:00:00 -0000</pubDate>
      <itunes:title>Threat group with novel malware operates in SE Asia. Data theft extortion rises. Key findings of Cisco's Cybersecurity Readiness Index. iPhones no longer welcome in Kremlin. Russian cyber auxiliaries &amp; privateers devote increased attention to healthcare. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1784</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Threat group with novel malware operates in Southeast Asia. Data theft extortion on the rise. Key findings of Cisco's Cybersecurity Readiness Index. iPhones are no longer welcome in the Kremlin. Russian cyber auxiliaries and privateers devote increased attention to the healthcare sector. Chris Eng from Veracode shares findings of their Annual Report on the State of Application Security. Johannes Ullrich from SANS Institute discusses scams after the failure of Silicon Valley Bank. And BreachForums seems to be under new management. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/54

Selected reading.
NAPLISTENER: more bad dreams from developers of SIESTAGRAPH (Elastic Blog) 
Unit 42 Ransomware and Extortion Report Highlights: Multi-Extortion Tactics Continue to Rise (Palo Alto Network)
Ransomware and extortion trends. (CyberWire)
Cisco Cybersecurity Readiness Index (Cisco)
A look at resilience: companies' ability to fight off cyberattacks. (CyberWire)
Putin to staffers: throw out your iPhones over security (Register)
Black Basta, Killnet, LockBit groups targeting healthcare in force (SC Media)
After BreachForums arrest, new site administrator says the platform will live on (Record) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Threat group with novel malware operates in Southeast Asia. Data theft extortion on the rise. Key findings of Cisco's Cybersecurity Readiness Index. iPhones are no longer welcome in the Kremlin. Russian cyber auxiliaries and privateers devote increased attention to the healthcare sector. Chris Eng from Veracode shares findings of their Annual Report on the State of Application Security. Johannes Ullrich from SANS Institute discusses scams after the failure of Silicon Valley Bank. And BreachForums seems to be under new management. </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/54</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.elastic.co/security-labs/naplistener-more-bad-dreams-from-the-developers-of-siestagraph">NAPLISTENER: more bad dreams from developers of SIESTAGRAPH</a> (Elastic Blog) </p><p><a href="https://unit42.paloaltonetworks.com/multi-extortion-rise-ransomware-report/">Unit 42 Ransomware and Extortion Report Highlights: Multi-Extortion Tactics Continue to Rise</a> (Palo Alto Network)</p><p><a href="https://thecyberwire.com/stories/83460dbe77b74f86907592094ca51b13/ransomware-and-extortion-trends">Ransomware and extortion trends.</a> (CyberWire)</p><p><a href="https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2023/m03/new-cisco-study-finds-only-15-of-companies-surveyed-are-ready-to-defend-against-cybersecurity-threats.html">Cisco Cybersecurity Readiness Index</a> (Cisco)</p><p><a href="https://thecyberwire.com/stories/7efb10a9e7a0498cb409e1addc0f0722/a-look-at-resilience-companies-ability-to-fight-off-cyberattacks">A look at resilience: companies' ability to fight off cyberattacks.</a> (CyberWire)</p><p><a href="https://www.theregister.com/2023/03/21/kremlin_iphone_ban/">Putin to staffers: throw out your iPhones over security</a> (Register)</p><p><a href="https://www.scmagazine.com/news/ransomware/black-basta-killnet-lockbit-groups-targeting-healthcare">Black Basta, Killnet, LockBit groups targeting healthcare in force</a> (SC Media)</p><p><a href="https://therecord.media/breachforums-arrest-new-administrator">After BreachForums arrest, new site administrator says the platform will live on</a> (Record) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1630</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2c81f336-8167-11ed-9779-17d8a2f218da]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7406306487.mp3?updated=1690331567" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cl0p ransomware at Hitachi Energy. Alleged TikTok surveillance of journalists. Hacktivist auxiliary hits Indian healthcare records. Cyberattack on Latitude: update. BreachForums arrest.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1783/notes</link>
      <description>Cl0p ransomware hits Hitachi Energy. The US Department of Justice investigates ByteDance in alleged surveillance of journalists. A Hacktivist auxiliary hits Indian healthcare records. Pirated software is used to carry malware. The Effects of cyberattack on Latitude persist. Adam Meyers from CrowdStrike shares findings from the 2023 CrowdStrike Global Threat Report. Rick Howard has the latest preview of CSO Perspectives. And Pompompurin is arrested for an alleged role in BreachForums.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/53

Selected reading.
Hitachi Energy confirms data breach after Clop GoAnywhere attacks (BleepingComputer)
Hitachi Energy Group hit by cyber-attack, says network operations not compromised (cnbctv18.com) 
Justice Department Probes TikTok’s Tracking of U.S. Journalists (Wall Street Journal) 
The FBI And DOJ Are Investigating ByteDance’s Use Of TikTok To Spy On Journalists (Forbes)
KillNet and affiliate hacktivist groups targeting healthcare with DDoS attacks (Azure Network Security Team)
Pro-Russia hackers are increasingly targeting hospitals, researchers warns (Record) 
Russian hacktivist group targets India’s health ministry (CSO Online)
Russian Hacktivist group Phoenix targets India’s Health Ministry Website (Threat Intelligence | CloudSEK) 
Ukraine warns that hacked software can be infected with Russian viruses (Kyiv Independent)
Russian hackers spread infected software through torrents (SSSCIP)
Australia's Latitude takes systems offline, Federal Police investigate cyberattack (Reuters)
FBI targets notorious cybercrime market with teen’s arrest (Washington Post) 
Dark Web ‘BreachForums’ Operator Charged With Computer Crime (Bloomberg) 
Feds arrest alleged BreachForums owner linked to FBI hacks (The Verge) 
NY Man Charged as 'Pompompurin,' the Boss of BreachForums (KrebsOnSecurity) 
Breach Forums Admin 'Pompompurin' Arrested in New York (Cyber Kendra) 
Pompompurin Unmasked: Infamous BreachForums Mastermind Arrested in New York (The Hacker News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 20 Mar 2023 20:15:00 -0000</pubDate>
      <itunes:title>Cl0p ransomware at Hitachi Energy. Alleged TikTok surveillance of journalists. Hacktivist auxiliary hits Indian healthcare records. Cyberattack on Latitude: update. BreachForums arrest.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1783</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cl0p ransomware hits Hitachi Energy. The US Department of Justice investigates ByteDance in alleged surveillance of journalists. A Hacktivist auxiliary hits Indian healthcare records. Pirated software is used to carry malware. The Effects of cyberattack on Latitude persist. Adam Meyers from CrowdStrike shares findings from the 2023 CrowdStrike Global Threat Report. Rick Howard has the latest preview of CSO Perspectives. And Pompompurin is arrested for an alleged role in BreachForums.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/53

Selected reading.
Hitachi Energy confirms data breach after Clop GoAnywhere attacks (BleepingComputer)
Hitachi Energy Group hit by cyber-attack, says network operations not compromised (cnbctv18.com) 
Justice Department Probes TikTok’s Tracking of U.S. Journalists (Wall Street Journal) 
The FBI And DOJ Are Investigating ByteDance’s Use Of TikTok To Spy On Journalists (Forbes)
KillNet and affiliate hacktivist groups targeting healthcare with DDoS attacks (Azure Network Security Team)
Pro-Russia hackers are increasingly targeting hospitals, researchers warns (Record) 
Russian hacktivist group targets India’s health ministry (CSO Online)
Russian Hacktivist group Phoenix targets India’s Health Ministry Website (Threat Intelligence | CloudSEK) 
Ukraine warns that hacked software can be infected with Russian viruses (Kyiv Independent)
Russian hackers spread infected software through torrents (SSSCIP)
Australia's Latitude takes systems offline, Federal Police investigate cyberattack (Reuters)
FBI targets notorious cybercrime market with teen’s arrest (Washington Post) 
Dark Web ‘BreachForums’ Operator Charged With Computer Crime (Bloomberg) 
Feds arrest alleged BreachForums owner linked to FBI hacks (The Verge) 
NY Man Charged as 'Pompompurin,' the Boss of BreachForums (KrebsOnSecurity) 
Breach Forums Admin 'Pompompurin' Arrested in New York (Cyber Kendra) 
Pompompurin Unmasked: Infamous BreachForums Mastermind Arrested in New York (The Hacker News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cl0p ransomware hits Hitachi Energy. The US Department of Justice investigates ByteDance in alleged surveillance of journalists. A Hacktivist auxiliary hits Indian healthcare records. Pirated software is used to carry malware. The Effects of cyberattack on Latitude persist. Adam Meyers from CrowdStrike shares findings from the 2023 CrowdStrike Global Threat Report. Rick Howard has the latest preview of CSO Perspectives. And Pompompurin is arrested for an alleged role in BreachForums.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/53</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/security/hitachi-energy-confirms-data-breach-after-clop-goanywhere-attacks/">Hitachi Energy confirms data breach after Clop GoAnywhere attacks</a> (BleepingComputer)</p><p><a href="https://www.cnbctv18.com/technology/hitachi-energy-group-hit-by-cyber-attack-says-network-operations-not-compromised-16203131.htm">Hitachi Energy Group hit by cyber-attack, says network operations not compromised</a> (cnbctv18.com) </p><p><a href="https://www.wsj.com/articles/justice-department-probes-tiktoks-tracking-of-u-s-journalists-d7e47665">Justice Department Probes TikTok’s Tracking of U.S. Journalists</a> (Wall Street Journal) </p><p><a href="https://www.forbes.com/sites/emilybaker-white/2023/03/16/fbi-doj-investigating-bytedance-tiktok-surveillance-journalists/">The FBI And DOJ Are Investigating ByteDance’s Use Of TikTok To Spy On Journalists</a> (Forbes)</p><p><a href="https://www.microsoft.com/en-us/security/blog/2023/03/17/killnet-and-affiliate-hacktivist-groups-targeting-healthcare-with-ddos-attacks/">KillNet and affiliate hacktivist groups targeting healthcare with DDoS attacks</a> (Azure Network Security Team)</p><p><a href="https://therecord.media/killnet-ddos-hospitals-healthcare-russia">Pro-Russia hackers are increasingly targeting hospitals, researchers warns</a> (Record) </p><p><a href="https://www.csoonline.com/article/3691050/russian-hacktivist-group-targets-indias-health-ministry.html">Russian hacktivist group targets India’s health ministry</a> (CSO Online)</p><p><a href="https://cloudsek.com/threatintelligence/russian-hacktivist-group-phoenix-targets-indias-health-ministry-website">Russian Hacktivist group Phoenix targets India’s Health Ministry Website</a> (Threat Intelligence | CloudSEK) </p><p><a href="https://kyivindependent.com/news-feed/ukraine-warns-that-hacked-software-can-be-infected-with-russian-viruses">Ukraine warns that hacked software can be infected with Russian viruses</a> (Kyiv Independent)</p><p><a href="https://cip.gov.ua/en/news/russian-hackers-spread-infected-software-through-torrents">Russian hackers spread infected software through torrents</a> (SSSCIP)</p><p><a href="https://www.reuters.com/technology/australias-latitude-takes-systems-offline-federal-police-investigate-cyberattack-2023-03-20/">Australia's Latitude takes systems offline, Federal Police investigate cyberattack</a> (Reuters)</p><p><a href="https://www.washingtonpost.com/politics/2023/03/20/fbi-targets-notorious-cybercrime-market-with-teens-arrest/">FBI targets notorious cybercrime market with teen’s arrest</a> (Washington Post) </p><p><a href="https://www.bloomberg.com/news/articles/2023-03-17/dark-web-breachforums-operator-charged-with-computer-crime">Dark Web ‘BreachForums’ Operator Charged With Computer Crime</a> (Bloomberg) </p><p><a href="https://www.theverge.com/2023/3/18/23646476/feds-arrest-alleged-hacking-forum-owner-breachforums-pompompurin">Feds arrest alleged BreachForums owner linked to FBI hacks</a> (The Verge) </p><p><a href="https://krebsonsecurity.com/2023/03/feds-charge-ny-man-as-breachforums-boss-pompompurin/">NY Man Charged as 'Pompompurin,' the Boss of BreachForums</a> (KrebsOnSecurity) </p><p><a href="https://www.cyberkendra.com/2023/03/breach-forums-admin-pompompurin.html">Breach Forums Admin 'Pompompurin' Arrested in New York</a> (Cyber Kendra) </p><p><a href="https://thehackernews.com/2023/03/pompompurin-unmasked-infamous.html">Pompompurin Unmasked: Infamous BreachForums Mastermind Arrested in New York</a> (The Hacker News)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1629</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2cb6494c-8167-11ed-9779-2394d9235242]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3515519686.mp3?updated=1690331553" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kathleen Smith: Translating the cyber world. [CMO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/141/notes</link>
      <description>Kathleen Smith, CMO from ClearedJobs.Net, sits down to share her story as she remembers having big shoes to fill in her childhood. She strived for greatness at an early age, as her parents told her she would be going to college and would follow strong guidelines to become successful. Kathleen can remember being into the hard sciences when she was in school, which sparked an interest in becoming a biochemist and law student. Eventually she found her passion as a translator, saying that "doing the translator role, I wanted to get into international marketing and I was going on to get my degree on that." She found her way to ClearedJobs.Net and fell in love with it. She had sought to find a workplace that wouldn't burn her out, where she can also be a part of the team. Kathleen found what she was passionate about and made it a reality for herself, and now she just wants young women starting in the field to know the importance of finding something they are passionate about. We thank Kathleen for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 19 Mar 2023 07:00:00 -0000</pubDate>
      <itunes:title>Kathleen Smith: Translating the cyber world. [CMO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>141</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Kathleen Smith, CMO from ClearedJobs.Net, sits down to share her story as she remembers having big shoes to fill in her childhood. She strived for greatness at an early age, as her parents told her she would be going to college and would follow strong guidelines to become successful. Kathleen can remember being into the hard sciences when she was in school, which sparked an interest in becoming a biochemist and law student. Eventually she found her passion as a translator, saying that "doing the translator role, I wanted to get into international marketing and I was going on to get my degree on that." She found her way to ClearedJobs.Net and fell in love with it. She had sought to find a workplace that wouldn't burn her out, where she can also be a part of the team. Kathleen found what she was passionate about and made it a reality for herself, and now she just wants young women starting in the field to know the importance of finding something they are passionate about. We thank Kathleen for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kathleen Smith, CMO from ClearedJobs.Net, sits down to share her story as she remembers having big shoes to fill in her childhood. She strived for greatness at an early age, as her parents told her she would be going to college and would follow strong guidelines to become successful. Kathleen can remember being into the hard sciences when she was in school, which sparked an interest in becoming a biochemist and law student. Eventually she found her passion as a translator, saying that "doing the translator role, I wanted to get into international marketing and I was going on to get my degree on that." She found her way to ClearedJobs.Net and fell in love with it. She had sought to find a workplace that wouldn't burn her out, where she can also be a part of the team. Kathleen found what she was passionate about and made it a reality for herself, and now she just wants young women starting in the field to know the importance of finding something they are passionate about. We thank Kathleen for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>475</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2e181b04-c428-11ed-ab6e-e3512ab1941d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1805334242.mp3?updated=1678986104" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA23-075A – #StopRansomware: LockBit 3.0.</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/45/notes</link>
      <description>CISA, FBI, and the Multi-State Information Sharing and Analysis Center are releasing this joint advisory to share known LockBit 3.0 ransomware IOCs and TTPs identified through FBI investigations as recently as March 2023.
AA23-075A Alert, Technical Details, and Mitigations
Stopransomware.gov is a whole-of-government approach that gives one central location for ransomware resources and alerts.
Resource to mitigate a ransomware attack: CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide.
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Mar 2023 15:35:00 -0000</pubDate>
      <itunes:title>CISA Alert AA23-075A – #StopRansomware: LockBit 3.0.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>45</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA, FBI, and the Multi-State Information Sharing and Analysis Center are releasing this joint advisory to share known LockBit 3.0 ransomware IOCs and TTPs identified through FBI investigations as recently as March 2023.
AA23-075A Alert, Technical Details, and Mitigations
Stopransomware.gov is a whole-of-government approach that gives one central location for ransomware resources and alerts.
Resource to mitigate a ransomware attack: CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide.
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA, FBI, and the Multi-State Information Sharing and Analysis Center are releasing this joint advisory to share known LockBit 3.0 ransomware IOCs and TTPs identified through FBI investigations as recently as March 2023.</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-075a">AA23-075A Alert, Technical Details, and Mitigations</a></p><p><a href="https://www.stopransomware.gov/">Stopransomware.gov</a> is a whole-of-government approach that gives one central location for ransomware resources and alerts.</p><p>Resource to mitigate a ransomware attack: <a href="https://www.cisa.gov/sites/default/files/publications/CISA_MS-ISAC_Ransomware%20Guide_S508C.pdf">CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide</a>.</p><p>No-cost cyber hygiene services: <a href="https://www.cisa.gov/cyber-hygiene-services">Cyber Hygiene Services</a> and <a href="https://github.com/cisagov/cset/">Ransomware Readiness Assessment</a>.</p><p>See CISA Insights <a href="https://www.cisa.gov/sites/default/files/publications/CISA%20Insights_Guidance-for-MSPs-and-Small-and-Mid-sized-Businesses_S508C.pdf">Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses</a> for guidance on hardening MSP and customer infrastructure.</p><p>U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email <a href="mailto:dib_defense@cyber.nsa.gov">dib_defense@cyber.nsa.gov</a> </p><p>To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="mailto:report@cisa.gov">report@cisa.gov</a>, or call (888) 282-0870, or report incidents to your local FBI field office.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>159</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7c8fe0e8-c5a2-11ed-bf80-37898870438c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6759138342.mp3?updated=1679064944" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ChatGPT grants malicious wishes? [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/273/notes</link>
      <description>Bar Block, Threat Intelligence Researcher at Deep Instinct, joins Dave to discuss their work on "ChatGPT and Malware - Making Your Malicious Wishes Come True." Deep Instinct goes into depth on just how dangerous ChatGPT can be in the wrong hands as well as how artificial intelligence is better at creating malware than providing ways to detect it.
Researchers go on to explain how the AI app can be used in the wrong hands saying "Examples of malicious content created by the AI tool, such as phishing messages, information stealers, and encryption software, have all been shared online."
The research can be found here:
ChatGPT and Malware: Making Your Malicious Wishes Come True

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Mar 2023 07:00:00 -0000</pubDate>
      <itunes:title>ChatGPT grants malicious wishes? [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>273</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Bar Block, Threat Intelligence Researcher at Deep Instinct, joins Dave to discuss their work on "ChatGPT and Malware - Making Your Malicious Wishes Come True." Deep Instinct goes into depth on just how dangerous ChatGPT can be in the wrong hands as well as how artificial intelligence is better at creating malware than providing ways to detect it.
Researchers go on to explain how the AI app can be used in the wrong hands saying "Examples of malicious content created by the AI tool, such as phishing messages, information stealers, and encryption software, have all been shared online."
The research can be found here:
ChatGPT and Malware: Making Your Malicious Wishes Come True

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Bar Block, Threat Intelligence Researcher at Deep Instinct, joins Dave to discuss their work on "ChatGPT and Malware - Making Your Malicious Wishes Come True." Deep Instinct goes into depth on just how dangerous ChatGPT can be in the wrong hands as well as how artificial intelligence is better at creating malware than providing ways to detect it.</p><p>Researchers go on to explain how the AI app can be used in the wrong hands saying "Examples of malicious content created by the AI tool, such as phishing messages, information stealers, and encryption software, have all been shared online."</p><p>The research can be found here:</p><ul><li><a href="https://www.deepinstinct.com/blog/chatgpt-and-malware-making-your-malicious-wishes-come-true">ChatGPT and Malware: Making Your Malicious Wishes Come True</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>973</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4341f90c-c4f3-11ed-bdab-5b4b1a48886f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6343649547.mp3?updated=1685127508" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Some movement in the cyber underworld. Vishing impersonates the US Social Security Administration. More SVB-themed phishing. And compromise without user interaction.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1782/notes</link>
      <description>BianLian gang’s pivot. HinataBot is a Go-based threat. The US Social Security Administration is impersonated in attempted vishing attacks. BlackSnake in the RaaS criminal market. More Silicon Valley Bank-themed phishing. Caleb Barlow from Cylete on security implications you need to consider now about Chat GPT. Our guest is Isaac Roth from LeakSignal with advice on securing the microservices application layer. And Russian operators exploit an Outlook vulnerability.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/52

Selected reading.
BianLian Ransomware Gang Continues to Evolve ([redacted])
Uncovering HinataBot: A Deep Dive into a Go-Based Threat (Akamai)
Social InSecurity: Armorblox Stops Attack Impersonating Social Security Administration (Armorblox)
Netskope Threat Coverage: BlackSnake Ransomware (Netskope) 
Fresh Phish: Silicon Valley Bank Phishing Scams in High Gear (INKY)
Outlook zero day linked to critical infrastructure attacks (Cybersecurity Dive)
CVE-2023-23397: Exploitations in the Wild – What You Need to Know (Deep Instinct) 
Everything We Know About CVE-2023-23397 (Huntress)
Microsoft Mitigates Outlook Elevation of Privilege Vulnerability (Microsoft Security Response Center)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 17 Mar 2023 20:15:00 -0000</pubDate>
      <itunes:title>Some movement in the cyber underworld. Vishing impersonates the US Social Security Administration. More SVB-themed phishing. And compromise without user interaction.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1782</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>BianLian gang’s pivot. HinataBot is a Go-based threat. The US Social Security Administration is impersonated in attempted vishing attacks. BlackSnake in the RaaS criminal market. More Silicon Valley Bank-themed phishing. Caleb Barlow from Cylete on security implications you need to consider now about Chat GPT. Our guest is Isaac Roth from LeakSignal with advice on securing the microservices application layer. And Russian operators exploit an Outlook vulnerability.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/52

Selected reading.
BianLian Ransomware Gang Continues to Evolve ([redacted])
Uncovering HinataBot: A Deep Dive into a Go-Based Threat (Akamai)
Social InSecurity: Armorblox Stops Attack Impersonating Social Security Administration (Armorblox)
Netskope Threat Coverage: BlackSnake Ransomware (Netskope) 
Fresh Phish: Silicon Valley Bank Phishing Scams in High Gear (INKY)
Outlook zero day linked to critical infrastructure attacks (Cybersecurity Dive)
CVE-2023-23397: Exploitations in the Wild – What You Need to Know (Deep Instinct) 
Everything We Know About CVE-2023-23397 (Huntress)
Microsoft Mitigates Outlook Elevation of Privilege Vulnerability (Microsoft Security Response Center)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>BianLian gang’s pivot. HinataBot is a Go-based threat. The US Social Security Administration is impersonated in attempted vishing attacks. BlackSnake in the RaaS criminal market. More Silicon Valley Bank-themed phishing. Caleb Barlow from Cylete on security implications you need to consider now about Chat GPT. Our guest is Isaac Roth from LeakSignal with advice on securing the microservices application layer. And Russian operators exploit an Outlook vulnerability.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/52</p><p><br></p><h2>Selected reading.</h2><p><a href="https://redacted.com/blog/bianlian-ransomware-gang-continues-to-evolve/">BianLian Ransomware Gang Continues to Evolve</a> ([redacted])</p><p><a href="https://www.akamai.com/blog/security-research/hinatabot-uncovering-new-golang-ddos-botnet">Uncovering HinataBot: A Deep Dive into a Go-Based Threat</a> (Akamai)</p><p><a href="https://www.armorblox.com/blog/armorblox-stops-attack-impersonating-social-security-administration/">Social InSecurity: Armorblox Stops Attack Impersonating Social Security Administration</a> (Armorblox)</p><p><a href="https://www.netskope.com/blog/netskope-threat-coverage-blacksnake-ransomware">Netskope Threat Coverage: BlackSnake Ransomware</a> (Netskope) </p><p><a href="https://www.inky.com/en/blog/silicon-valley-bank-phishing-scams-in-high-gear">Fresh Phish: Silicon Valley Bank Phishing Scams in High Gear</a> (INKY)</p><p><a href="https://www.cybersecuritydive.com/news/zero-day-vulnerability-outlook-critical-infrastructure/645196/">Outlook zero day linked to critical infrastructure attacks</a> (Cybersecurity Dive)</p><p><a href="https://www.deepinstinct.com/blog/cve-2023-23397-exploitations-in-the-wild-what-you-need-to-know">CVE-2023-23397: Exploitations in the Wild – What You Need to Know</a> (Deep Instinct) </p><p><a href="https://www.huntress.com/blog/everything-we-know-about-cve-2023-23397">Everything We Know About CVE-2023-23397</a> (Huntress)</p><p><a href="https://msrc.microsoft.com/blog/2023/03/microsoft-mitigates-outlook-elevation-of-privilege-vulnerability/">Microsoft Mitigates Outlook Elevation of Privilege Vulnerability</a> (Microsoft Security Response Center)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1800</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2dbd93c2-8167-11ed-9779-47db18937a3d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5491696530.mp3?updated=1690331537" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA warns of Telerik vulnerability exploitation. Cloud storage re-up attacks. Phishing tackle so convincing it will deceive the many. Cyber developments in Russia's hybrid war.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1781/notes</link>
      <description>Telerik exploited, for carding (probably) and other purposes. Cloud storage re-up attacks. Cybercriminals use new measures to avoid detection of phishing campaigns. "Winter Vivern" seems aligned with Russian objectives. Microsoft warns of a possible surge in Russian cyber operations. Boss Sandworm. Johannes Ullrich from SANS talking about malware spread through Google Ads. Our guest is David Anteliz from Skybox Security with thoughts on federal government cybersecurity directives. And don't fear the Reaper.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/51

Selected reading.
Threat Actors Exploited Progress Telerik Vulnerability in U.S. Government IIS Server (Cybersecurity and Infrastructure Security Agency CISA)
Threat Actors Exploit Progress Telerik Vulnerability in U.S. Government IIS Server | CISA (Cybersecurity and Infrastructure Security Agency CISA)
CISA: Federal civilian agency hacked by nation-state and criminal hacking groups (CyberScoop) 
US govt web server attacked by 'multiple' criminal gangs (Register)
The Cloud Storage Re-Up Attack (Avanan)
Threat Spotlight: 3 novel phishing tactics (Barracuda)
Winter Vivern | Uncovering a Wave of Global Espionage (SentinelOne)
Is Russia regrouping for renewed cyberwar? (Microsoft On the Issues) 
A year of Russian hybrid warfare in Ukraine (Microsoft Threat Intelligence)
Russian hackers preparing new cyber assault against Ukraine - Microsoft report (Reuters)
Microsoft Warns Russia May Plan More Ransomware Attacks Beyond Ukraine (Bloomberg)
This Is the New Leader of Russia's Infamous Sandworm Hacking Unit (WIRED) 
What's known and not about US drone-Russian jet encounter (AP NEWS)
Russia tries to retrieve downed US drone in Black Sea (The Telegraph)
Downed U.S. drone points to cyber vulnerabilities (Washington Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 16 Mar 2023 20:15:00 -0000</pubDate>
      <itunes:title>CISA warns of Telerik vulnerability exploitation. Cloud storage re-up attacks. Phishing tackle so convincing it will deceive the many. Cyber developments in Russia's hybrid war.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1781</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Telerik exploited, for carding (probably) and other purposes. Cloud storage re-up attacks. Cybercriminals use new measures to avoid detection of phishing campaigns. "Winter Vivern" seems aligned with Russian objectives. Microsoft warns of a possible surge in Russian cyber operations. Boss Sandworm. Johannes Ullrich from SANS talking about malware spread through Google Ads. Our guest is David Anteliz from Skybox Security with thoughts on federal government cybersecurity directives. And don't fear the Reaper.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/51

Selected reading.
Threat Actors Exploited Progress Telerik Vulnerability in U.S. Government IIS Server (Cybersecurity and Infrastructure Security Agency CISA)
Threat Actors Exploit Progress Telerik Vulnerability in U.S. Government IIS Server | CISA (Cybersecurity and Infrastructure Security Agency CISA)
CISA: Federal civilian agency hacked by nation-state and criminal hacking groups (CyberScoop) 
US govt web server attacked by 'multiple' criminal gangs (Register)
The Cloud Storage Re-Up Attack (Avanan)
Threat Spotlight: 3 novel phishing tactics (Barracuda)
Winter Vivern | Uncovering a Wave of Global Espionage (SentinelOne)
Is Russia regrouping for renewed cyberwar? (Microsoft On the Issues) 
A year of Russian hybrid warfare in Ukraine (Microsoft Threat Intelligence)
Russian hackers preparing new cyber assault against Ukraine - Microsoft report (Reuters)
Microsoft Warns Russia May Plan More Ransomware Attacks Beyond Ukraine (Bloomberg)
This Is the New Leader of Russia's Infamous Sandworm Hacking Unit (WIRED) 
What's known and not about US drone-Russian jet encounter (AP NEWS)
Russia tries to retrieve downed US drone in Black Sea (The Telegraph)
Downed U.S. drone points to cyber vulnerabilities (Washington Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Telerik exploited, for carding (probably) and other purposes. Cloud storage re-up attacks. Cybercriminals use new measures to avoid detection of phishing campaigns. "Winter Vivern" seems aligned with Russian objectives. Microsoft warns of a possible surge in Russian cyber operations. Boss Sandworm. Johannes Ullrich from SANS talking about malware spread through Google Ads. Our guest is David Anteliz from Skybox Security with thoughts on federal government cybersecurity directives. And don't fear the Reaper.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/51</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/news-events/alerts/2023/03/15/threat-actors-exploited-progress-telerik-vulnerability-us-government-iis-server">Threat Actors Exploited Progress Telerik Vulnerability in U.S. Government IIS Server</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-074a">Threat Actors Exploit Progress Telerik Vulnerability in U.S. Government IIS Server | CISA</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://cyberscoop.com/cisa-federal-civilian-agency-hacked/">CISA: Federal civilian agency hacked by nation-state and criminal hacking groups</a> (CyberScoop) </p><p><a href="https://www.theregister.com/2023/03/15/cisa_us_microsoft_hacked/">US govt web server attacked by 'multiple' criminal gangs</a> (Register)</p><p><a href="https://www.avanan.com/blog/the-cloud-storage-re-up-attack">The Cloud Storage Re-Up Attack</a> (Avanan)</p><p><a href="https://blog.barracuda.com/2023/03/16/threat-spotlight-novel-phishing-tactics/">Threat Spotlight: 3 novel phishing tactics</a> (Barracuda)</p><p><a href="https://www.sentinelone.com/labs/winter-vivern-uncovering-a-wave-of-global-espionage/">Winter Vivern | Uncovering a Wave of Global Espionage</a> (SentinelOne)</p><p><a href="https://blogs.microsoft.com/on-the-issues/2023/03/15/russia-ukraine-cyberwarfare-threat-intelligence-center/">Is Russia regrouping for renewed cyberwar?</a> (Microsoft On the Issues) </p><p><a href="https://www.microsoft.com/en-us/security/business/security-insider/wp-content/uploads/2023/03/A-year-of-Russian-hybrid-warfare-in-Ukraine_MS-Threat-Intelligence-1.pdf">A year of Russian hybrid warfare in Ukraine</a> (Microsoft Threat Intelligence)</p><p><a href="https://www.reuters.com/technology/russian-hackers-preparing-new-cyber-assault-against-ukraine-microsoft-report-2023-03-15/">Russian hackers preparing new cyber assault against Ukraine - Microsoft report</a> (Reuters)</p><p><a href="https://www.bloomberg.com/news/articles/2023-03-15/microsoft-warns-russia-may-plan-sandworm-attacks-beyond-ukraine">Microsoft Warns Russia May Plan More Ransomware Attacks Beyond Ukraine</a> (Bloomberg)</p><p><a href="https://www.wired.com/story/russia-gru-sandworm-serebriakov/">This Is the New Leader of Russia's Infamous Sandworm Hacking Unit</a> (WIRED) </p><p><a href="https://apnews.com/article/russia-us-reaper-drone-collision-501614b07b504fa5c609e64146e6ab4f">What's known and not about US drone-Russian jet encounter</a> (AP NEWS)</p><p><a href="https://www.telegraph.co.uk/world-news/2023/03/15/russia-ukraine-war-news-live-putin-drone-crash-latest/">Russia tries to retrieve downed US drone in Black Sea</a> (The Telegraph)</p><p><a href="https://www.washingtonpost.com/politics/2023/03/16/downed-us-drone-points-cyber-vulnerabilities/">Downed U.S. drone points to cyber vulnerabilities</a> (Washington Post)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1746</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2d37bb4e-8167-11ed-9779-a7069a9001df]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4997787902.mp3?updated=1690331522" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA23-074A – Threat actors exploit progress telerik vulnerability in U.S. government IIS server. [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/44/notes</link>
      <description>CISA, FBI, and the Multi-State Information Sharing and Analysis Center are releasing this joint Cybersecurity Advisory to provide IT infrastructure defenders with TTPs, IOCs, and methods to detect and protect against recent exploitation against Microsoft Internet Information Services web servers.
AA23-074A Alert, Technical Details, and Mitigations
AA23-074A STIX XML
MAR-10413062-1.v1 Telerik Vulnerability in U.S. Government IIS Server
Telerik: Exploiting .NET JavaScriptSerializer Deserialization (CVE-2019-18935)
ACSC Advisory 2020-004
Bishop Fox CVE-2019-18935: Remote Code Execution via Insecure Deserialization in Telerik UI
Volexity Threat Research: XE Group
GitHub: Proof-of-Concept Exploit for CVE-2019-18935
Microsoft: Configure Logging in IIS
GitHub: CVE-2019-18935
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 16 Mar 2023 19:59:00 -0000</pubDate>
      <itunes:title>CISA Alert AA23-074A – Threat actors exploit progress telerik vulnerability in U.S. government IIS server. [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>44</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA, FBI, and the Multi-State Information Sharing and Analysis Center are releasing this joint Cybersecurity Advisory to provide IT infrastructure defenders with TTPs, IOCs, and methods to detect and protect against recent exploitation against Microsoft Internet Information Services web servers.
AA23-074A Alert, Technical Details, and Mitigations
AA23-074A STIX XML
MAR-10413062-1.v1 Telerik Vulnerability in U.S. Government IIS Server
Telerik: Exploiting .NET JavaScriptSerializer Deserialization (CVE-2019-18935)
ACSC Advisory 2020-004
Bishop Fox CVE-2019-18935: Remote Code Execution via Insecure Deserialization in Telerik UI
Volexity Threat Research: XE Group
GitHub: Proof-of-Concept Exploit for CVE-2019-18935
Microsoft: Configure Logging in IIS
GitHub: CVE-2019-18935
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA, FBI, and the Multi-State Information Sharing and Analysis Center are releasing this joint Cybersecurity Advisory to provide IT infrastructure defenders with TTPs, IOCs, and methods to detect and protect against recent exploitation against Microsoft Internet Information Services web servers.</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-074a">AA23-074A Alert, Technical Details, and Mitigations</a></p><p><a href="https://www.cisa.gov/sites/default/files/2023-03/aa23-074a.stix__0.xml">AA23-074A STIX XML</a></p><p><a href="https://www.cisa.gov/news-events/analysis-reports/ar23-074a">MAR-10413062-1.v1 Telerik Vulnerability in U.S. Government IIS Server</a></p><p><a href="https://docs.telerik.com/devtools/aspnet-ajax/knowledge-base/common-allows-javascriptserializer-deserialization">Telerik: Exploiting .NET JavaScriptSerializer Deserialization (CVE-2019-18935)</a></p><p><a href="https://www.cyber.gov.au/acsc/view-all-content/advisories/advisory-2020-004-remote-code-execution-vulnerability-being-actively-exploited-vulnerable-versions-telerik-ui-sophisticated-actors">ACSC Advisory 2020-004</a></p><p><a href="https://bishopfox.com/blog/cve-2019-18935-remote-code-execution-in-telerik-ui">Bishop Fox CVE-2019-18935: Remote Code Execution via Insecure Deserialization in Telerik UI</a></p><p><a href="https://www.volexity.com/blog/2021/12/07/xe-group-exposed-8-years-of-hacking-card-skimming-for-profit/">Volexity Threat Research: XE Group</a></p><p><a href="https://github.com/noperator/CVE-2019-18935/blob/master/CVE-2019-18935.py">GitHub: Proof-of-Concept Exploit for CVE-2019-18935</a></p><p><a href="https://learn.microsoft.com/en-us/iis/manage/provisioning-and-managing-iis/configure-logging-in-iis">Microsoft: Configure Logging in IIS</a></p><p><a href="https://github.com/noperator/CVE-2019-18935">GitHub: CVE-2019-18935</a></p><p>No-cost cyber hygiene services: <a href="https://www.cisa.gov/cyber-hygiene-services">Cyber Hygiene Services</a> and <a href="https://github.com/cisagov/cset/">Ransomware Readiness Assessment</a>.</p><p>See CISA Insights <a href="https://www.cisa.gov/sites/default/files/publications/CISA%20Insights_Guidance-for-MSPs-and-Small-and-Mid-sized-Businesses_S508C.pdf">Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses</a> for guidance on hardening MSP and customer infrastructure.</p><p>U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email <a href="mailto:dib_defense@cyber.nsa.gov">dib_defense@cyber.nsa.gov</a> </p><p>To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="mailto:report@cisa.gov">report@cisa.gov</a>, or call (888) 282-0870, or report incidents to your local FBI field office.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>168</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1aecc658-c435-11ed-b1f7-8f1a13d210f2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7640303159.mp3?updated=1678994606" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patch Tuesday notes. SVB's and the cybersecurity sector. SVR's APT29 is phishing for access to information. Trends in the Russo-Ukraine cyberwar. LockBit counts coup (says LockBit).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1780/notes</link>
      <description>Patch Tuesday notes. Silicon Valley Bank's collapse and its effects on the cybersecurity sector. SVR's APT29 used a Polish state visit to the US as phishbait. Regularizing hacktivist auxiliaries. Our guest is Crane Hassold from Abnormal Security with a look at threats to email. Grayson Milbourne from OpenText Cybersecurity addresses chaos within the supply chain. And LockBit claims to have compromised an aerospace supply chain.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/50

Selected reading.
March 2023 Patch Tuesday: Updates and Analysis (CrowdStrike)
Microsoft Releases March 2023 Security Updates (Cybersecurity and Infrastructure Security Agency CISA)
Adobe Releases Security Updates for Multiple Products (Cybersecurity and Infrastructure Security Agency CISA)
Mozilla Releases Security Updates for Firefox 111 and Firefox ESR 102.9 (Cybersecurity and Infrastructure Security Agency CISA)
SAP Security Patch Day for March 2023 (Onapsis)
March Patch Tuesday review. (CyberWire)
What the collapse of Silicon Valley Bank means for cyber and the tech startup ecosystem. (CyberWire)
NOBELIUM Uses Poland's Ambassador’s Visit to the U.S. to Target EU Governments Assisting Ukraine (BlackBerry)
Ukraine Tracks Increased Russian Focus on Cyberespionage (Bank Info Security)
Ukraine scrambles to draft cyber law, legalizing its volunteer hacker army (Newsweek) 
Ransomware Group Claims Theft of Valuable SpaceX Data From Contractor (SecurityWeek)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 15 Mar 2023 20:15:00 -0000</pubDate>
      <itunes:title>Patch Tuesday notes. SVB's and the cybersecurity sector. SVR's APT29 is phishing for access to information. Trends in the Russo-Ukraine cyberwar. LockBit counts coup (says LockBit).</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1780</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Patch Tuesday notes. Silicon Valley Bank's collapse and its effects on the cybersecurity sector. SVR's APT29 used a Polish state visit to the US as phishbait. Regularizing hacktivist auxiliaries. Our guest is Crane Hassold from Abnormal Security with a look at threats to email. Grayson Milbourne from OpenText Cybersecurity addresses chaos within the supply chain. And LockBit claims to have compromised an aerospace supply chain.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/50

Selected reading.
March 2023 Patch Tuesday: Updates and Analysis (CrowdStrike)
Microsoft Releases March 2023 Security Updates (Cybersecurity and Infrastructure Security Agency CISA)
Adobe Releases Security Updates for Multiple Products (Cybersecurity and Infrastructure Security Agency CISA)
Mozilla Releases Security Updates for Firefox 111 and Firefox ESR 102.9 (Cybersecurity and Infrastructure Security Agency CISA)
SAP Security Patch Day for March 2023 (Onapsis)
March Patch Tuesday review. (CyberWire)
What the collapse of Silicon Valley Bank means for cyber and the tech startup ecosystem. (CyberWire)
NOBELIUM Uses Poland's Ambassador’s Visit to the U.S. to Target EU Governments Assisting Ukraine (BlackBerry)
Ukraine Tracks Increased Russian Focus on Cyberespionage (Bank Info Security)
Ukraine scrambles to draft cyber law, legalizing its volunteer hacker army (Newsweek) 
Ransomware Group Claims Theft of Valuable SpaceX Data From Contractor (SecurityWeek)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Patch Tuesday notes. Silicon Valley Bank's collapse and its effects on the cybersecurity sector. SVR's APT29 used a Polish state visit to the US as phishbait. Regularizing hacktivist auxiliaries. Our guest is Crane Hassold from Abnormal Security with a look at threats to email. Grayson Milbourne from OpenText Cybersecurity addresses chaos within the supply chain. And LockBit claims to have compromised an aerospace supply chain.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/50</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.crowdstrike.com/blog/patch-tuesday-analysis-march-2023/">March 2023 Patch Tuesday: Updates and Analysis</a> (CrowdStrike)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/03/14/microsoft-releases-march-2023-security-updates">Microsoft Releases March 2023 Security Updates</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/03/14/adobe-releases-security-updates-multiple-products">Adobe Releases Security Updates for Multiple Products</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/03/14/mozilla-releases-security-updates-firefox-111-and-firefox-esr-1029">Mozilla Releases Security Updates for Firefox 111 and Firefox ESR 102.9</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://onapsis.com/blog/sap-patch-day-march-2023">SAP Security Patch Day for March 2023</a> (Onapsis)</p><p><a href="https://thecyberwire.com/stories/6ae068eafe4e4534a53859ab909a013c/march-patch-tuesday-review">March Patch Tuesday review.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/318ae8b4f64e4a92b9dd99bd39c81896/what-the-collapse-of-silicon-valley-bank-means-for-cyber-and-the--tech-startup-ecosystem">What the collapse of Silicon Valley Bank means for cyber and the tech startup ecosystem.</a> (CyberWire)</p><p><a href="https://blogs.blackberry.com/en/2023/03/nobelium-targets-eu-governments-assisting-ukraine">NOBELIUM Uses Poland's Ambassador’s Visit to the U.S. to Target EU Governments Assisting Ukraine</a> (BlackBerry)</p><p><a href="https://www.bankinfosecurity.com/ukraine-tracks-increased-russian-focus-on-cyber-espionage-a-21423">Ukraine Tracks Increased Russian Focus on Cyberespionage</a> (Bank Info Security)</p><p><a href="https://www.newsweek.com/ukraine-drafting-new-law-legalizing-volunteer-hacker-cyber-army-red-cross-1786814">Ukraine scrambles to draft cyber law, legalizing its volunteer hacker army</a> (Newsweek) </p><p><a href="https://www.securityweek.com/ransomware-group-claims-theft-of-valuable-spacex-data-from-contractor/">Ransomware Group Claims Theft of Valuable SpaceX Data From Contractor</a> (SecurityWeek)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1594</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2d1e5172-8167-11ed-9779-eb0b7dd318f0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1039876301.mp3?updated=1690331501" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Silicon Valley Bank as phishbait. An “attack superhighway.” Unauthorized software in the workplace. YoroTrooper, a new cyberespionage threat actor. Hacktivists game, too. How crime pays. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1779/notes</link>
      <description>Expect phishing, BEC scams, and other social engineering to use Silicon Valley Bank lures. An "attack superhighway." Unauthorized software in the workplace. A new cyberespionage group emerges. Squad up (but not IRL). Ben Yelin unpacks the FBI director’s recent admission of purchasing location data. Ann Johnson from Afternoon Cyber Tea speaks with Jason Barnett from HCA Healthcare about cyber resilience. And, not that you’d consider a life of crime, but what are the gangs paying cyber criminals, nowadays?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/49

Selected reading.
SVB's collapse and the potential for fraud. (CyberWire)
State-of-the-Internet: malicious DNS traffic. (CyberWire)
Unauthorized software in the workplace. (CyberWire)
Talos uncovers espionage campaigns targeting CIS countries, including embassies and EU health care agency (Cisco Talos Blog)
STALKER 2 game developer hacked by Russian hacktivists, data stolen (BleepingComputer)
GSC Game World suffers Stalker 2 leak after latest cyber attack (GamesIndustry.biz)
Threat Groups Offer $240k Salary to Tech Jobseekers (Security Intelligence)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Mar 2023 20:15:00 -0000</pubDate>
      <itunes:title>Silicon Valley Bank as phishbait. An “attack superhighway.” Unauthorized software in the workplace. YoroTrooper, a new cyberespionage threat actor. Hacktivists game, too. How crime pays. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1779</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Expect phishing, BEC scams, and other social engineering to use Silicon Valley Bank lures. An "attack superhighway." Unauthorized software in the workplace. A new cyberespionage group emerges. Squad up (but not IRL). Ben Yelin unpacks the FBI director’s recent admission of purchasing location data. Ann Johnson from Afternoon Cyber Tea speaks with Jason Barnett from HCA Healthcare about cyber resilience. And, not that you’d consider a life of crime, but what are the gangs paying cyber criminals, nowadays?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/49

Selected reading.
SVB's collapse and the potential for fraud. (CyberWire)
State-of-the-Internet: malicious DNS traffic. (CyberWire)
Unauthorized software in the workplace. (CyberWire)
Talos uncovers espionage campaigns targeting CIS countries, including embassies and EU health care agency (Cisco Talos Blog)
STALKER 2 game developer hacked by Russian hacktivists, data stolen (BleepingComputer)
GSC Game World suffers Stalker 2 leak after latest cyber attack (GamesIndustry.biz)
Threat Groups Offer $240k Salary to Tech Jobseekers (Security Intelligence)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Expect phishing, BEC scams, and other social engineering to use Silicon Valley Bank lures. An "attack superhighway." Unauthorized software in the workplace. A new cyberespionage group emerges. Squad up (but not IRL). Ben Yelin unpacks the FBI director’s recent admission of purchasing location data. Ann Johnson from Afternoon Cyber Tea speaks with Jason Barnett from HCA Healthcare about cyber resilience. And, not that you’d consider a life of crime, but what are the gangs paying cyber criminals, nowadays?</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/49</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/stories/4880d3b8100c464f83fcf8d8ec8d3f23/svbs-collapse-and-the-potential-for-fraud">SVB's collapse and the potential for fraud.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/b9871408c5af4f88854f787aad5fb49a/state-of-the-internet-malicious-dns-traffic">State-of-the-Internet: malicious DNS traffic.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/ff018a61400b45aa8cbbe322032652c2/unauthorized-software-in-the-workplace">Unauthorized software in the workplace.</a> (CyberWire)</p><p><a href="https://blog.talosintelligence.com/yorotrooper-espionage-campaign-cis-turkey-europe/">Talos uncovers espionage campaigns targeting CIS countries, including embassies and EU health care agency</a> (Cisco Talos Blog)</p><p><a href="https://www.bleepingcomputer.com/news/security/stalker-2-game-developer-hacked-by-russian-hacktivists-data-stolen/">STALKER 2 game developer hacked by Russian hacktivists, data stolen</a> (BleepingComputer)</p><p><a href="https://www.gamesindustry.biz/stalker-2-images-leak-following-cyber-attack-against-gsc-game-world">GSC Game World suffers Stalker 2 leak after latest cyber attack</a> (GamesIndustry.biz)</p><p><a href="https://securityintelligence.com/news/threat-groups-offer-240k-to-tech-jobseekers/">Threat Groups Offer $240k Salary to Tech Jobseekers</a> (Security Intelligence)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1547</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2c680e94-8167-11ed-9779-cfceecdcbc41]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1370968242.mp3?updated=1690331474" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Coping with Silicon Valley Bank's collapse. BatLoader's abuse of Google Search Ads. More on Emotet’s re-emergence. Medusa rising. NetWire collared. More-or-less quiet on the cyber front.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1778/notes</link>
      <description>Coping with Silicon Valley Bank's collapse. BatLoader's abusing Google Search Ads. More on Emotet’s re-emergence. Reflections on Medusa rising. An international law enforcement action against NetWire. Rob Shapland from Falanx Cyber on ethical hacking and red teaming. Bryan Ware from LookingGlass looks at exploited vulnerabilities in the US financial sector. And in Ukraine, it’s more-or-less quiet on the cyber front (but in Estonia and Georgia, not so much).

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/48

Selected reading.
One of Silicon Valley's top banks fails; assets are seized (AP NEWS)
US, UK try to stem fallout from Silicon Valley Bank collapse (AP NEWS)
In abrupt reversal, regulators to cover Silicon Valley Bank, Signature uninsured deposits (American Banker)
Silicon Valley Bank collapse will not trigger new financial crisis, insists Sunak (The Telegraph)
‘Banking system is safe’: Joe Biden reassures markets in address on Silicon Valley Bank collapse – live updates (the Guardian) 
BatLoader Continues to Abuse Google Search Ads to Deliver Vidar Stealer and Ursnif (eSentire) 
BATLOADER Malware Uses Google Ads to Deliver Vidar Stealer and Ursnif Payloads (The Hacker News) 
Emotet Again! The First Malspam Wave of 2023 (Deep Instinct) 
Emotet attempts to sell access after infiltrating high-value networks (SC Media) 
Medusa ransomware gang picks up steam as it targets companies worldwide (BleepingComputer)
Alleged seller of NetWire RAT arrested in Croatia (Help Net Security)
FBI and international cops catch a NetWire RAT (Register)
How the FBI proved a remote admin tool was actually malware (TechCrunch)
Estonia’s Election Was More Than Just a Win for Kallas (World Politics Review) 
Estonian official says parliamentary elections were targeted by cyberattacks (Record)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 13 Mar 2023 20:15:00 -0000</pubDate>
      <itunes:title>Coping with Silicon Valley Bank's collapse. BatLoader's abuse of Google Search Ads. More on Emotet’s re-emergence. Medusa rising. NetWire collared. More-or-less quiet on the cyber front.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1778</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Coping with Silicon Valley Bank's collapse. BatLoader's abusing Google Search Ads. More on Emotet’s re-emergence. Reflections on Medusa rising. An international law enforcement action against NetWire. Rob Shapland from Falanx Cyber on ethical hacking and red teaming. Bryan Ware from LookingGlass looks at exploited vulnerabilities in the US financial sector. And in Ukraine, it’s more-or-less quiet on the cyber front (but in Estonia and Georgia, not so much).

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/48

Selected reading.
One of Silicon Valley's top banks fails; assets are seized (AP NEWS)
US, UK try to stem fallout from Silicon Valley Bank collapse (AP NEWS)
In abrupt reversal, regulators to cover Silicon Valley Bank, Signature uninsured deposits (American Banker)
Silicon Valley Bank collapse will not trigger new financial crisis, insists Sunak (The Telegraph)
‘Banking system is safe’: Joe Biden reassures markets in address on Silicon Valley Bank collapse – live updates (the Guardian) 
BatLoader Continues to Abuse Google Search Ads to Deliver Vidar Stealer and Ursnif (eSentire) 
BATLOADER Malware Uses Google Ads to Deliver Vidar Stealer and Ursnif Payloads (The Hacker News) 
Emotet Again! The First Malspam Wave of 2023 (Deep Instinct) 
Emotet attempts to sell access after infiltrating high-value networks (SC Media) 
Medusa ransomware gang picks up steam as it targets companies worldwide (BleepingComputer)
Alleged seller of NetWire RAT arrested in Croatia (Help Net Security)
FBI and international cops catch a NetWire RAT (Register)
How the FBI proved a remote admin tool was actually malware (TechCrunch)
Estonia’s Election Was More Than Just a Win for Kallas (World Politics Review) 
Estonian official says parliamentary elections were targeted by cyberattacks (Record)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Coping with Silicon Valley Bank's collapse. BatLoader's abusing Google Search Ads. More on Emotet’s re-emergence. Reflections on Medusa rising. An international law enforcement action against NetWire. Rob Shapland from Falanx Cyber on ethical hacking and red teaming. Bryan Ware from LookingGlass looks at exploited vulnerabilities in the US financial sector. And in Ukraine, it’s more-or-less quiet on the cyber front (but in Estonia and Georgia, not so much).</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/48</p><p><br></p><h2>Selected reading.</h2><p><a href="https://apnews.com/article/svb-fed-bonds-rates-banks-inflation-a24b28b3caeede91c76cd120aa9b7966">One of Silicon Valley's top banks fails; assets are seized</a> (AP NEWS)</p><p><a href="https://apnews.com/article/silicon-valley-bank-uk-bailout-hsbc-sale-4d2da0e9c6f39c0fd8faf321a2b295cf">US, UK try to stem fallout from Silicon Valley Bank collapse</a> (AP NEWS)</p><p><a href="https://www.americanbanker.com/news/regulators-to-cover-svb-sbny-uninsured-deposits">In abrupt reversal, regulators to cover Silicon Valley Bank, Signature uninsured deposits</a> (American Banker)</p><p><a href="https://www.telegraph.co.uk/business/2023/03/12/treasury-planning-cash-lifeline-companies-hit-silicon-valley/">Silicon Valley Bank collapse will not trigger new financial crisis, insists Sunak</a> (The Telegraph)</p><p><a href="https://www.theguardian.com/us-news/live/2023/mar/13/silicon-valley-bank-collapse-biden-address">‘Banking system is safe’: Joe Biden reassures markets in address on Silicon Valley Bank collapse – live updates</a> (the Guardian) </p><p><a href="https://www.esentire.com/blog/batloader-continues-to-abuse-google-search-ads-to-deliver-vidar-stealer-and-ursnif">BatLoader Continues to Abuse Google Search Ads to Deliver Vidar Stealer and Ursnif</a> (eSentire) </p><p><a href="https://thehackernews.com/2023/03/batloader-malware-uses-google-ads-to.html">BATLOADER Malware Uses Google Ads to Deliver Vidar Stealer and Ursnif Payloads</a> (The Hacker News) </p><p><a href="https://www.deepinstinct.com/blog/emotet-again-the-first-malspam-wave-of-2023">Emotet Again! The First Malspam Wave of 2023</a> (Deep Instinct) </p><p><a href="https://www.scmagazine.com/news/malware/emotet-sell-access-high-value-networks">Emotet attempts to sell access after infiltrating high-value networks</a> (SC Media) </p><p><a href="https://www.bleepingcomputer.com/news/security/medusa-ransomware-gang-picks-up-steam-as-it-targets-companies-worldwide/">Medusa ransomware gang picks up steam as it targets companies worldwide</a> (BleepingComputer)</p><p><a href="https://www.helpnetsecurity.com/2023/03/10/alleged-seller-netwire-rat-arrested/">Alleged seller of NetWire RAT arrested in Croatia</a> (Help Net Security)</p><p><a href="https://www.theregister.com/2023/03/10/fbi_netwire_seizure/">FBI and international cops catch a NetWire RAT</a> (Register)</p><p><a href="https://techcrunch.com/2023/03/09/how-the-fbi-proved-a-remote-admin-tool-was-actually-malware/">How the FBI proved a remote admin tool was actually malware</a> (TechCrunch)</p><p><a href="https://www.worldpoliticsreview.com/estonias-election-was-more-than-just-a-win-for-kallas/">Estonia’s Election Was More Than Just a Win for Kallas</a> (World Politics Review) </p><p><a href="https://therecord.media/estonia-cyberattack-parliamentary-elections">Estonian official says parliamentary elections were targeted by cyberattacks</a> (Record)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1723</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2c31271c-8167-11ed-9779-4300bb1273e9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5389222942.mp3?updated=1690331448" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bat El Azerad: Find your niche to bring to the table. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/140/notes</link>
      <description>Bat El Azerad, CEO and Co-founder of mobile phishing protection company novoShield, shares her personal account of her experience as a female leader in the cybersecurity field as well as some insights into how far the industry has come and where it is headed in terms of the gender gap. Bat El speaks about how she grew into her role of becoming a CEO, by sharing where she started and how she got involved with novoShield. She share's that being a woman in this industry can be tough and so she shares some advice, saying "so you have to be very focused and to find the right niche to bring something to the table because the competition in this industry and the level of innovation, um, is, is great." Bat El hopes that throughout her time in the industry she hopes people remember her for her vision, and the mission she is helping to create and maintain at her company. We thank Bat El for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 12 Mar 2023 07:00:00 -0000</pubDate>
      <itunes:title>Bat El Azerad: Find your niche to bring to the table. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>140</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Bat El Azerad, CEO and Co-founder of mobile phishing protection company novoShield, shares her personal account of her experience as a female leader in the cybersecurity field as well as some insights into how far the industry has come and where it is headed in terms of the gender gap. Bat El speaks about how she grew into her role of becoming a CEO, by sharing where she started and how she got involved with novoShield. She share's that being a woman in this industry can be tough and so she shares some advice, saying "so you have to be very focused and to find the right niche to bring something to the table because the competition in this industry and the level of innovation, um, is, is great." Bat El hopes that throughout her time in the industry she hopes people remember her for her vision, and the mission she is helping to create and maintain at her company. We thank Bat El for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Bat El Azerad, CEO and Co-founder of mobile phishing protection company novoShield, shares her personal account of her experience as a female leader in the cybersecurity field as well as some insights into how far the industry has come and where it is headed in terms of the gender gap. Bat El speaks about how she grew into her role of becoming a CEO, by sharing where she started and how she got involved with novoShield. She share's that being a woman in this industry can be tough and so she shares some advice, saying "so you have to be very focused and to find the right niche to bring something to the table because the competition in this industry and the level of innovation, um, is, is great." Bat El hopes that throughout her time in the industry she hopes people remember her for her vision, and the mission she is helping to create and maintain at her company. We thank Bat El for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>461</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[27350ef8-bf7a-11ed-a5dd-031bc5f9f51c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3605243974.mp3?updated=1678476410" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Files stolen from a sneaky SymStealer. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/272/notes</link>
      <description>Ron Masas of Imperva discusses their work, the "Google Chrome “SymStealer” Vulnerability. How to Protect Your Files from Being Stolen." By reviewing the ways the browser handles file systems, specifically searching for common vulnerabilities relating to how browsers process symlinks, the Imperva Red Team discovered that when files are dropped onto a file input, it’s handled differently.
Dubbing it as CVE-2022-40764, researchers found a vulnerability that "allowed for the theft of sensitive files, such as crypto wallets and cloud provider credentials." In result, over 2.5 billion users of Google Chrome and Chromium-based browsers were affected.
The research can be found here:
Google Chrome “SymStealer” Vulnerability: How to Protect Your Files from Being Stolen

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Mar 2023 08:00:00 -0000</pubDate>
      <itunes:title>Files stolen from a sneaky SymStealer. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>271</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ron Masas of Imperva discusses their work, the "Google Chrome “SymStealer” Vulnerability. How to Protect Your Files from Being Stolen." By reviewing the ways the browser handles file systems, specifically searching for common vulnerabilities relating to how browsers process symlinks, the Imperva Red Team discovered that when files are dropped onto a file input, it’s handled differently.
Dubbing it as CVE-2022-40764, researchers found a vulnerability that "allowed for the theft of sensitive files, such as crypto wallets and cloud provider credentials." In result, over 2.5 billion users of Google Chrome and Chromium-based browsers were affected.
The research can be found here:
Google Chrome “SymStealer” Vulnerability: How to Protect Your Files from Being Stolen

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ron Masas of Imperva discusses their work, the "Google Chrome “SymStealer” Vulnerability. How to Protect Your Files from Being Stolen." By reviewing the ways the browser handles file systems, specifically searching for common vulnerabilities relating to how browsers process symlinks, the Imperva Red Team discovered that when files are dropped onto a file input, it’s handled differently.</p><p>Dubbing it as CVE-2022-40764, researchers found a vulnerability that "allowed for the theft of sensitive files, such as crypto wallets and cloud provider credentials." In result, over 2.5 billion users of Google Chrome and Chromium-based browsers were affected.</p><p>The research can be found here:</p><ul><li><a href="https://www.imperva.com/blog/google-chrome-symstealer-vulnerability/">Google Chrome “SymStealer” Vulnerability: How to Protect Your Files from Being Stolen</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>815</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3cb87076-bf7a-11ed-9216-3fd010b9e1cf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3030272312.mp3?updated=1685127497" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybercrime and cyberespionage: IceFire, DUCKTAIL, LIGHTSHOW, Remcsos, and a tarot card reader. US cyber budgets, strategy, and a DoD cyber workforce approach. Five new ICS advisories.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1777/notes</link>
      <description>New IceFire version is out. A DUCKTAIL tale. Social engineering by Tehran. DPRK's LIGHTSHOW cyberespionage. The President's Budget and cybersecurity. The US Department of Defense issues its cyber workforce strategy. Remcos surfaces in attacks against Ukrainian government agencies. DDoS at a Ukrainian radio station. Dave Bittner sits down with Beth Robinson of Bishop Fox to share their 2023 Offensive Security Resolutions. Caleb Barlow from Cylete on the security implications of gigapixel images. And CISA releases five ICS advisories.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/47

Selected reading.
IceFire Ransomware Returns | Now Targeting Linux Enterprise Networks (SentinelOne) 
DUCKTAIL: Threat Operation Re-emerges with New LNK, PowerShell, and Other Custom Tactics to Avoid Detection (Deep Instinct) 
Iran-linked hackers used fake Atlantic Council-affiliated persona to target human rights researchers (CyberScoop)
Iranian APT Targets Female Activists With Mahsa Amini Protest Lures (Dark Reading).
Iran threat group going after female activists, analyst warns (Cybernews) 
Stealing the LIGHTSHOW (Part One) — North Korea's UNC2970 (Mandiant) 
Stealing the LIGHTSHOW (Part Two) — LIGHTSHIFT and LIGHTSHOW (Mandiant)
Cybersecurity in the US President's Budget for Fiscal Year 2024. (CyberWire)
Biden’s budget proposal underscores cybersecurity priorities (Washington Post) 
Biden Budget Proposal: $200M for TMF, CISA With 4.9% Budget Boost (Meritalk)
Cybersecurity Poised for Spending Boost in Biden Budget (Gov Info Security)
Deputy Secretary of Defense Signs 2023-2027 DoD Cyber Workforce Strategy (U.S. Department of Defense)
In new cyber workforce strategy, DoD hopes 'bold' retention initiatives keep talent coming back (Breaking Defense)
Remcos Trojan Returns to Most Wanted Malware List After Ukraine Attacks (Infosecurity Magazine)
February 2023’s Most Wanted Malware: Remcos Trojan Linked to Cyberespionage Operations Against Ukrainian Government (Check Point Software)
Radio Halychyna cyber-attacked following appeal by Russian hacker group (International Press Institute)
CISA Releases Five Industrial Control Systems Advisories | CISA (Cybersecurity and Infrastructure Security Agency CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 10 Mar 2023 21:15:00 -0000</pubDate>
      <itunes:title>Cybercrime and cyberespionage: IceFire, DUCKTAIL, LIGHTSHOW, Remcsos, and a tarot card reader. US cyber budgets, strategy, and a DoD cyber workforce approach. Five new ICS advisories.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1777</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>New IceFire version is out. A DUCKTAIL tale. Social engineering by Tehran. DPRK's LIGHTSHOW cyberespionage. The President's Budget and cybersecurity. The US Department of Defense issues its cyber workforce strategy. Remcos surfaces in attacks against Ukrainian government agencies. DDoS at a Ukrainian radio station. Dave Bittner sits down with Beth Robinson of Bishop Fox to share their 2023 Offensive Security Resolutions. Caleb Barlow from Cylete on the security implications of gigapixel images. And CISA releases five ICS advisories.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/47

Selected reading.
IceFire Ransomware Returns | Now Targeting Linux Enterprise Networks (SentinelOne) 
DUCKTAIL: Threat Operation Re-emerges with New LNK, PowerShell, and Other Custom Tactics to Avoid Detection (Deep Instinct) 
Iran-linked hackers used fake Atlantic Council-affiliated persona to target human rights researchers (CyberScoop)
Iranian APT Targets Female Activists With Mahsa Amini Protest Lures (Dark Reading).
Iran threat group going after female activists, analyst warns (Cybernews) 
Stealing the LIGHTSHOW (Part One) — North Korea's UNC2970 (Mandiant) 
Stealing the LIGHTSHOW (Part Two) — LIGHTSHIFT and LIGHTSHOW (Mandiant)
Cybersecurity in the US President's Budget for Fiscal Year 2024. (CyberWire)
Biden’s budget proposal underscores cybersecurity priorities (Washington Post) 
Biden Budget Proposal: $200M for TMF, CISA With 4.9% Budget Boost (Meritalk)
Cybersecurity Poised for Spending Boost in Biden Budget (Gov Info Security)
Deputy Secretary of Defense Signs 2023-2027 DoD Cyber Workforce Strategy (U.S. Department of Defense)
In new cyber workforce strategy, DoD hopes 'bold' retention initiatives keep talent coming back (Breaking Defense)
Remcos Trojan Returns to Most Wanted Malware List After Ukraine Attacks (Infosecurity Magazine)
February 2023’s Most Wanted Malware: Remcos Trojan Linked to Cyberespionage Operations Against Ukrainian Government (Check Point Software)
Radio Halychyna cyber-attacked following appeal by Russian hacker group (International Press Institute)
CISA Releases Five Industrial Control Systems Advisories | CISA (Cybersecurity and Infrastructure Security Agency CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>New IceFire version is out. A DUCKTAIL tale. Social engineering by Tehran. DPRK's LIGHTSHOW cyberespionage. The President's Budget and cybersecurity. The US Department of Defense issues its cyber workforce strategy. Remcos surfaces in attacks against Ukrainian government agencies. DDoS at a Ukrainian radio station. Dave Bittner sits down with Beth Robinson of Bishop Fox to share their 2023 Offensive Security Resolutions. Caleb Barlow from Cylete on the security implications of gigapixel images. And CISA releases five ICS advisories.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/47</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.sentinelone.com/labs/icefire-ransomware-returns-now-targeting-linux-enterprise-networks/">IceFire Ransomware Returns | Now Targeting Linux Enterprise Networks</a> (SentinelOne) </p><p><a href="https://www.deepinstinct.com/blog/ducktail-threat-operation-re-emerges-with-new-lnk-powershell-and-other-custom-tactics-to-avoid-detection">DUCKTAIL: Threat Operation Re-emerges with New LNK, PowerShell, and Other Custom Tactics to Avoid Detection</a> (Deep Instinct) </p><p><a href="https://cyberscoop.com/iran-linked-hackers-used-fake-atlantic-council-persona-to-target-human-rights-researchers/">Iran-linked hackers used fake Atlantic Council-affiliated persona to target human rights researchers</a> (CyberScoop)</p><p><a href="https://www.darkreading.com/threat-intelligence/iranian-apt-uses-mahsa-amini-protests-to-target-female-activists">Iranian APT Targets Female Activists With Mahsa Amini Protest Lures</a> (Dark Reading).</p><p><a href="https://cybernews.com/news/iran-threat-group-female-activists/">Iran threat group going after female activists, analyst warns</a> (Cybernews) </p><p><a href="https://www.mandiant.com/resources/blog/lightshow-north-korea-unc2970">Stealing the LIGHTSHOW (Part One) — North Korea's UNC2970</a> (Mandiant) </p><p><a href="https://www.mandiant.com/resources/blog/lightshift-and-lightshow">Stealing the LIGHTSHOW (Part Two) — LIGHTSHIFT and LIGHTSHOW</a> (Mandiant)</p><p><a href="https://thecyberwire.com/stories/1b8df6360d7f48f9b8a3ed075670b57f/cybersecurity-in-the-us-presidents-budget-for-fiscal-year-2024">Cybersecurity in the US President's Budget for Fiscal Year 2024.</a> (CyberWire)</p><p><a href="https://www.washingtonpost.com/politics/2023/03/10/bidens-budget-proposal-underscores-cybersecurity-priorities/">Biden’s budget proposal underscores cybersecurity priorities</a> (Washington Post) </p><p><a href="https://www.meritalk.com/articles/biden-budget-proposal-200m-for-tmf-cisa-with-4-9-budget-boost/">Biden Budget Proposal: $200M for TMF, CISA With 4.9% Budget Boost</a> (Meritalk)</p><p><a href="https://www.govinfosecurity.com/cybersecurity-poised-for-spending-boost-in-biden-budget-a-21407">Cybersecurity Poised for Spending Boost in Biden Budget</a> (Gov Info Security)</p><p><a href="https://www.defense.gov/News/Releases/Release/Article/3323868/deputy-secretary-of-defense-signs-2023-2027-dod-cyber-workforce-strategy/">Deputy Secretary of Defense Signs 2023-2027 DoD Cyber Workforce Strategy</a> (U.S. Department of Defense)</p><p><a href="https://breakingdefense.com/2023/03/in-new-cyber-workforce-strategy-dod-hopes-bold-retention-initiatives-keep-talent-coming-back/">In new cyber workforce strategy, DoD hopes 'bold' retention initiatives keep talent coming back</a> (Breaking Defense)</p><p><a href="https://www.infosecurity-magazine.com/news/remcos-returns-wanted-malware-list/">Remcos Trojan Returns to Most Wanted Malware List After Ukraine Attacks</a> (Infosecurity Magazine)</p><p><a href="https://blog.checkpoint.com/2023/03/09/february-2023s-most-wanted-malware-remcos-trojan-linked-to-cyberespionage-operations-against-ukrainian-government/">February 2023’s Most Wanted Malware: Remcos Trojan Linked to Cyberespionage Operations Against Ukrainian Government</a> (Check Point Software)</p><p><a href="https://ipi.media/alerts/radio-halychyna-cyber-attacked-following-appeal-by-russian-hacker-group/">Radio Halychyna cyber-attacked following appeal by Russian hacker group</a> (International Press Institute)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/03/09/cisa-releases-five-industrial-control-systems-advisories">CISA Releases Five Industrial Control Systems Advisories | CISA</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1529</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2bca772e-8167-11ed-9779-6721c745c19b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6092994350.mp3?updated=1690331323" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>PlugX is now wormable. Compromised webcams found. Emotet is back. AI builds a keylogger. Cyber in the hybrid war. BEC comes to productivity suites. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1776/notes</link>
      <description>A wormable version of the PlugX USB malware is found. Compromised webcams as a security threat. Emotet botnet out of hibernation. Proof-of-concept: AI used to generate polymorphic keylogger. Turning to alternatives as conventional tactics fail. Dave Bittner speaks with Eve Maler of ForgeRock to discuss how digital identity can help create a more secure connected car experience. Johannes Ullrich from SANS on configuring a proper time server infrastructure. And Phishing messages via legitimate Google notifications.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/46

Selected reading.
A border-hopping PlugX USB worm takes its act on the road (Sophos News)
BitSight identifies thousands of global organizations using insecure webcams and other IoT devices, finding many susceptible to eavesdropping (BitSight) 
Emotet malware attacks return after three-month break (BleepingComputer)
BlackMamba: Using AI to Generate Polymorphic Malware (HYAS) 
Russian Cyberwar in Ukraine Stumbles Just Like Conventional One (Bloomberg)
Australian official demands Russia bring criminal hackers ‘to heel’ (The Record by Recorded Future)
Russia will have to rely on nukes, cyberattacks, and China since its military is being thrashed in Ukraine, US intel director says (Business Insider) 
BEC 3.0 - Legitimate Sites for Illegitimate Purposes  (Avanan)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 09 Mar 2023 21:15:00 -0000</pubDate>
      <itunes:title>PlugX is now wormable. Compromised webcams found. Emotet is back. AI builds a keylogger. Cyber in the hybrid war. BEC comes to productivity suites. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1776</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A wormable version of the PlugX USB malware is found. Compromised webcams as a security threat. Emotet botnet out of hibernation. Proof-of-concept: AI used to generate polymorphic keylogger. Turning to alternatives as conventional tactics fail. Dave Bittner speaks with Eve Maler of ForgeRock to discuss how digital identity can help create a more secure connected car experience. Johannes Ullrich from SANS on configuring a proper time server infrastructure. And Phishing messages via legitimate Google notifications.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/46

Selected reading.
A border-hopping PlugX USB worm takes its act on the road (Sophos News)
BitSight identifies thousands of global organizations using insecure webcams and other IoT devices, finding many susceptible to eavesdropping (BitSight) 
Emotet malware attacks return after three-month break (BleepingComputer)
BlackMamba: Using AI to Generate Polymorphic Malware (HYAS) 
Russian Cyberwar in Ukraine Stumbles Just Like Conventional One (Bloomberg)
Australian official demands Russia bring criminal hackers ‘to heel’ (The Record by Recorded Future)
Russia will have to rely on nukes, cyberattacks, and China since its military is being thrashed in Ukraine, US intel director says (Business Insider) 
BEC 3.0 - Legitimate Sites for Illegitimate Purposes  (Avanan)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A wormable version of the PlugX USB malware is found. Compromised webcams as a security threat. Emotet botnet out of hibernation. Proof-of-concept: AI used to generate polymorphic keylogger. Turning to alternatives as conventional tactics fail. Dave Bittner speaks with Eve Maler of ForgeRock to discuss how digital identity can help create a more secure connected car experience. Johannes Ullrich from SANS on configuring a proper time server infrastructure. And Phishing messages via legitimate Google notifications.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/46</p><p><br></p><h2>Selected reading.</h2><p><a href="https://news.sophos.com/en-us/2023/03/09/border-hopping-plugx-usb-worm/">A border-hopping PlugX USB worm takes its act on the road</a> (Sophos News)</p><p><a href="https://www.bitsight.com/press-releases/bitsight-identifies-thousands-global-organizations-using-insecure-webcams-and-other">BitSight identifies thousands of global organizations using insecure webcams and other IoT devices, finding many susceptible to eavesdropping</a> (BitSight) </p><p><a href="https://www.bleepingcomputer.com/news/security/emotet-malware-attacks-return-after-three-month-break/">Emotet malware attacks return after three-month break</a> (BleepingComputer)</p><p><a href="https://www.hyas.com/blog/blackmamba-using-ai-to-generate-polymorphic-malware">BlackMamba: Using AI to Generate Polymorphic Malware</a> (HYAS) </p><p><a href="https://www.bloomberg.com/news/articles/2023-03-09/russian-cyberwar-in-ukraine-stumbles-just-like-conventional-one">Russian Cyberwar in Ukraine Stumbles Just Like Conventional One</a> (Bloomberg)</p><p><a href="https://therecord.media/australia-russia-cybercrime-home-affairs-michael-pezzullo">Australian official demands Russia bring criminal hackers ‘to heel’</a> (The Record by Recorded Future)</p><p><a href="https://www.businessinsider.com/russia-rely-on-nukes-cyberattacks-china-us-intel-director-says-2023-3">Russia will have to rely on nukes, cyberattacks, and China since its military is being thrashed in Ukraine, US intel director says</a> (Business Insider) </p><p><a href="https://www.avanan.com/blog/bec-3.0-legitimate-sites-for-illegitimate-purposes">BEC 3.0 - Legitimate Sites for Illegitimate Purposes </a> (Avanan)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1622</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2be443e8-8167-11ed-9779-2f5b462c714d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6062280093.mp3?updated=1690331307" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Data breaches and IP. Current cyberespionage campaigns. A warning that the cyber phases of the hybrid war can’t be expected to be over, yet. Exfiltration via machine learning inference.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1775/notes</link>
      <description>CISA adds three known exploited vulnerabilities to its Catalog. A data breach at Acer exposes intellectual property. Sharp Panda deploys SoulSearcher malware in cyberespionage campaigns. US Cyber Command’s head warns against underestimating Russia in cyberspace. Dave Bittner sits down with Simone Petrella of N2K Networks to discuss the recently-released Defense Cyber Workforce Framework. Betsy Carmelite from Booz Allen Hamilton speaks about CISA's year ahead. And are large language models what the lawyers call an attractive nuisance.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/45

Selected reading.
CISA Adds Three Known Exploited Vulnerabilities to Catalog (Cybersecurity and Infrastructure Security Agency CISA)
March 7 CISA KEV Breakdown | Zoho, Teclib, Apache (Nucleus Security)
Acer Confirms Breach After Hacker Offers to Sell Stolen Data (SecurityWeek)
Acer confirms breach after 160GB of data for sale on hacking forum (BleepingComputer)
“Sharp Panda”: Check Point Research puts a spotlight on Chinese origined espionage attacks against southeast asian government entities (Check Point Software)
Pandas with a Soul: Chinese Espionage Attacks Against Southeast Asian Government Entities (Check Point Research)
What can security teams learn from a year of cyber warfare? (Computer Weekly)
Russian cyberattacks could intensify during spring offensives in Ukraine, US Cyber Command general says (Stars and Stripes)
US Bracing for Bolder, More Brazen Russian Cyberattacks (VOA)
Russia remains a ‘very capable’ cyber adversary, Nakasone says (C4ISRNet)
Employees Are Feeding Sensitive Business Data to ChatGPT (Dark Reading)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 08 Mar 2023 21:15:00 -0000</pubDate>
      <itunes:title>Data breaches and IP. Current cyberespionage campaigns. A warning that the cyber phases of the hybrid war can’t be expected to be over, yet. Exfiltration via machine learning inference.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1775</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA adds three known exploited vulnerabilities to its Catalog. A data breach at Acer exposes intellectual property. Sharp Panda deploys SoulSearcher malware in cyberespionage campaigns. US Cyber Command’s head warns against underestimating Russia in cyberspace. Dave Bittner sits down with Simone Petrella of N2K Networks to discuss the recently-released Defense Cyber Workforce Framework. Betsy Carmelite from Booz Allen Hamilton speaks about CISA's year ahead. And are large language models what the lawyers call an attractive nuisance.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/45

Selected reading.
CISA Adds Three Known Exploited Vulnerabilities to Catalog (Cybersecurity and Infrastructure Security Agency CISA)
March 7 CISA KEV Breakdown | Zoho, Teclib, Apache (Nucleus Security)
Acer Confirms Breach After Hacker Offers to Sell Stolen Data (SecurityWeek)
Acer confirms breach after 160GB of data for sale on hacking forum (BleepingComputer)
“Sharp Panda”: Check Point Research puts a spotlight on Chinese origined espionage attacks against southeast asian government entities (Check Point Software)
Pandas with a Soul: Chinese Espionage Attacks Against Southeast Asian Government Entities (Check Point Research)
What can security teams learn from a year of cyber warfare? (Computer Weekly)
Russian cyberattacks could intensify during spring offensives in Ukraine, US Cyber Command general says (Stars and Stripes)
US Bracing for Bolder, More Brazen Russian Cyberattacks (VOA)
Russia remains a ‘very capable’ cyber adversary, Nakasone says (C4ISRNet)
Employees Are Feeding Sensitive Business Data to ChatGPT (Dark Reading)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA adds three known exploited vulnerabilities to its Catalog. A data breach at Acer exposes intellectual property. Sharp Panda deploys SoulSearcher malware in cyberespionage campaigns. US Cyber Command’s head warns against underestimating Russia in cyberspace. Dave Bittner sits down with Simone Petrella of N2K Networks to discuss the recently-released Defense Cyber Workforce Framework. Betsy Carmelite from Booz Allen Hamilton speaks about CISA's year ahead. And are large language models what the lawyers call an attractive nuisance.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/45</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/news-events/alerts/2023/03/07/cisa-adds-three-known-exploited-vulnerabilities-catalog">CISA Adds Three Known Exploited Vulnerabilities to Catalog</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://nucleussec.com/blog/march-7-2023-cisa-kev-breakdown-zoho-teclib-apache/">March 7 CISA KEV Breakdown | Zoho, Teclib, Apache</a> (Nucleus Security)</p><p><a href="https://www.securityweek.com/acer-confirms-breach-after-hacker-offers-to-sell-stolen-data/">Acer Confirms Breach After Hacker Offers to Sell Stolen Data</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/acer-confirms-breach-after-160gb-of-data-for-sale-on-hacking-forum/">Acer confirms breach after 160GB of data for sale on hacking forum</a> (BleepingComputer)</p><p><a href="https://blog.checkpoint.com/2023/03/07/sharp-panda-check-point-research-puts-a-spotlight-on-chinese-origined-espionage-attacks-against-southeast-asian-government-entities/">“Sharp Panda”: Check Point Research puts a spotlight on Chinese origined espionage attacks against southeast asian government entities</a> (Check Point Software)</p><p><a href="https://research.checkpoint.com/2023/pandas-with-a-soul-chinese-espionage-attacks-against-southeast-asian-government-entities/">Pandas with a Soul: Chinese Espionage Attacks Against Southeast Asian Government Entities</a> (Check Point Research)</p><p><a href="https://www.computerweekly.com/feature/What-can-security-teams-learn-from-a-year-of-cyber-warfare">What can security teams learn from a year of cyber warfare?</a> (Computer Weekly)</p><p><a href="https://www.stripes.com/theaters/us/2023-03-07/russia-ukraine-cyberattacks-offensives-9417567.html">Russian cyberattacks could intensify during spring offensives in Ukraine, US Cyber Command general says</a> (Stars and Stripes)</p><p><a href="https://www.voanews.com/a/us-bracing-for-bolder-more-brazen-russian-cyberattacks/6992938.html">US Bracing for Bolder, More Brazen Russian Cyberattacks</a> (VOA)</p><p><a href="https://www.c4isrnet.com/cyber/2023/03/07/russia-remains-a-very-capable-cyber-adversary-nakasone-says/">Russia remains a ‘very capable’ cyber adversary, Nakasone says</a> (C4ISRNet)</p><p><a href="https://www.darkreading.com/risk/employees-feeding-sensitive-business-data-chatgpt-raising-security-fears">Employees Are Feeding Sensitive Business Data to ChatGPT</a> (Dark Reading)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1608</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2bfe57d8-8167-11ed-9779-3b877ef3749a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4787615808.mp3?updated=1690331293" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A new threat to routers. DoppelPaymer hoods collared. Ransomware hits a Barcelona hospital. Phishing in productivity suites. Espionage, hacktiism, and prank phone calls. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1774/notes</link>
      <description>HiatusRAT exploits business-grade routers. International law enforcement action against the DoppelPaymer gang. Ransomware hits a major Barcelona hospital. Productivity suites are increasingly attractive as phishing grounds. Transparent Tribe’s romance scams. Cyberattacks briefly disrupt Russian websites and media outlets. Ashley Leonard, CEO of Syxsense, sits down with Dave to discuss their "Advancing Zero Trust Priorities'' report. Joe Carrigan on a warning from Microsoft about a surge in token theft. And trolling for disinfo raw material.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/44

Selected reading.
Black Lotus Labs uncovers another new malware that targets compromised routers (Lumen Newsroom)
Germany and Ukraine hit two high-value ransomware targets | Europol (Europol)
European Police, FBI Bust International Cybercrime Gang (VOA)
German police lift lid on worldwide cyber blackmail gang (Deutsche Welle)
Europol Hits Alleged Members of DoppelPaymer Ransomware Group (Decipher) 
An international sting brings another win against ransomware gangs (Washington Post)
European police move in on DoppelPaymer (Computing)
Police Looking for Russian Suspects Following DoppelPaymer Ransomware Crackdown (SecurityWeek)
Cyberattack hits major hospital in Spanish city of Barcelona (AP NEWS).
Cyberattack Hits Major Hospital in Spanish City of Barcelona (SecurityWeek)
Barcelona's Hospital Clinic hit by ransomware cyberattack 'from outside Spain' (Euro Weekly News)
Phishers’ Favorites 2022 Year-in-Review (Vade)
Kremlin Website Down Amid Reports of Cyber Attacks on Russia (The Daily Beast) 
Russian diplomat blames West for recruiting hackers for operations against Moscow (TASS)
Don’t Answer That! Russia-Aligned TA499 Beleaguers Targets with Video Call Requests (Proofpoint)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Mar 2023 21:15:00 -0000</pubDate>
      <itunes:title>A new threat to routers. DoppelPaymer hoods collared. Ransomware hits a Barcelona hospital. Phishing in productivity suites. Espionage, hacktiism, and prank phone calls. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1774</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>HiatusRAT exploits business-grade routers. International law enforcement action against the DoppelPaymer gang. Ransomware hits a major Barcelona hospital. Productivity suites are increasingly attractive as phishing grounds. Transparent Tribe’s romance scams. Cyberattacks briefly disrupt Russian websites and media outlets. Ashley Leonard, CEO of Syxsense, sits down with Dave to discuss their "Advancing Zero Trust Priorities'' report. Joe Carrigan on a warning from Microsoft about a surge in token theft. And trolling for disinfo raw material.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/44

Selected reading.
Black Lotus Labs uncovers another new malware that targets compromised routers (Lumen Newsroom)
Germany and Ukraine hit two high-value ransomware targets | Europol (Europol)
European Police, FBI Bust International Cybercrime Gang (VOA)
German police lift lid on worldwide cyber blackmail gang (Deutsche Welle)
Europol Hits Alleged Members of DoppelPaymer Ransomware Group (Decipher) 
An international sting brings another win against ransomware gangs (Washington Post)
European police move in on DoppelPaymer (Computing)
Police Looking for Russian Suspects Following DoppelPaymer Ransomware Crackdown (SecurityWeek)
Cyberattack hits major hospital in Spanish city of Barcelona (AP NEWS).
Cyberattack Hits Major Hospital in Spanish City of Barcelona (SecurityWeek)
Barcelona's Hospital Clinic hit by ransomware cyberattack 'from outside Spain' (Euro Weekly News)
Phishers’ Favorites 2022 Year-in-Review (Vade)
Kremlin Website Down Amid Reports of Cyber Attacks on Russia (The Daily Beast) 
Russian diplomat blames West for recruiting hackers for operations against Moscow (TASS)
Don’t Answer That! Russia-Aligned TA499 Beleaguers Targets with Video Call Requests (Proofpoint)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>HiatusRAT exploits business-grade routers. International law enforcement action against the DoppelPaymer gang. Ransomware hits a major Barcelona hospital. Productivity suites are increasingly attractive as phishing grounds. Transparent Tribe’s romance scams. Cyberattacks briefly disrupt Russian websites and media outlets. Ashley Leonard, CEO of Syxsense, sits down with Dave to discuss their "Advancing Zero Trust Priorities'' report. Joe Carrigan on a warning from Microsoft about a surge in token theft. And trolling for disinfo raw material.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/44</p><p><br></p><h2>Selected reading.</h2><p><a href="https://news.lumen.com/2023-03-06-Black-Lotus-Labs-uncovers-another-new-malware-that-targets-compromised-routers">Black Lotus Labs uncovers another new malware that targets compromised routers</a> (Lumen Newsroom)</p><p><a href="https://www.europol.europa.eu/media-press/newsroom/news/germany-and-ukraine-hit-two-high-value-ransomware-targets">Germany and Ukraine hit two high-value ransomware targets | Europol</a> (Europol)</p><p><a href="https://www.voanews.com/a/european-police-fbi-bust-international-cybercrime-gang/6992832.html">European Police, FBI Bust International Cybercrime Gang</a> (VOA)</p><p><a href="https://www.dw.com/en/german-police-lift-lid-on-worldwide-cyber-blackmail-gang/a-64898379">German police lift lid on worldwide cyber blackmail gang</a> (Deutsche Welle)</p><p><a href="https://duo.com/decipher/europol-hits-alleged-members-of-doppelpaymer-ransomware-group">Europol Hits Alleged Members of DoppelPaymer Ransomware Group</a> (Decipher) </p><p><a href="https://www.washingtonpost.com/politics/2023/03/07/an-international-sting-brings-another-win-against-ransomware-gangs/">An international sting brings another win against ransomware gangs</a> (Washington Post)</p><p><a href="https://www.computing.co.uk/news/4077074/european-police-doppelpaymer">European police move in on DoppelPaymer </a>(Computing)</p><p><a href="https://www.securityweek.com/police-looking-for-russian-suspects-following-doppelpaymer-ransomware-crackdown/">Police Looking for Russian Suspects Following DoppelPaymer Ransomware Crackdown</a> (SecurityWeek)</p><p><a href="https://apnews.com/article/barcelona-hospital-cyberattack-ransomware-37e0fee33798c56459e63866ca8b449f">Cyberattack hits major hospital in Spanish city of Barcelona</a> (AP NEWS).</p><p><a href="https://www.securityweek.com/cyberattack-hits-major-hospital-in-spanish-city-of-barcelona/">Cyberattack Hits Major Hospital in Spanish City of Barcelona</a> (SecurityWeek)</p><p><a href="https://euroweeklynews.com/2023/03/06/barcelonas-hospital-clinic-hit-by-ransomware-cyberattack-from-outside-spain/">Barcelona's Hospital Clinic hit by ransomware cyberattack 'from outside Spain'</a> (Euro Weekly News)</p><p><a href="https://www.vadesecure.com/en/ebook-phishers-favorites-2022-year-in-review">Phishers’ Favorites 2022 Year-in-Review</a> (Vade)</p><p><a href="https://www.thedailybeast.com/kremlin-website-down-amid-reports-of-cyber-attacks-on-russia">Kremlin Website Down Amid Reports of Cyber Attacks on Russia</a> (The Daily Beast) </p><p><a href="https://tass.com/russia/1585505">Russian diplomat blames West for recruiting hackers for operations against Moscow</a> (TASS)</p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/dont-answer-russia-aligned-ta499-beleaguers-targets-video-call-requests">Don’t Answer That! Russia-Aligned TA499 Beleaguers Targets with Video Call Requests</a> (Proofpoint)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1677</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2c4c456a-8167-11ed-9779-23078aa50c5a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7566652477.mp3?updated=1690331267" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>That crane might know what you’re shipping. Addressing the cybersecurity of water systems. Oakland’s ransomware incident is now a breach. Hybrid war. Investment scams.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1773/notes</link>
      <description>Cranes as a security threat. EPA memo addresses cybersecurity risks to water systems. Oakland's ransomware incident becomes a data breach. Carding rises in the Russian underworld. Sandworm's record in Russia's war. Rick Howard sits down with Andy Greenberg from Wired to discuss how Ukraine suffered more data-wiping malware last year than anywhere, ever. Dave Bittner speaks with Kathleen Smith of ClearedJobs.Net to talk about hiring veterans and setting them (and yourself) up for success. And AI’s latest misuse: bogus investment schemes.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/43

Selected reading.
WSJ News Exclusive | Pentagon Sees Giant Cargo Cranes as Possible Chinese Spying Tools (Wall Street Journal)
EPA Takes Action to Improve Cybersecurity Resilience for Public Water Systems (US EPA)
EPA presses states to include cybersecurity in water safety reviews (SC Media) 
EPA Calls on States to Improve Public Water Systems’ Cybersecurity (Meritalk)
EPA issues water cybersecurity mandates, concerning industry and experts (CyberScoop)
City of Oakland Targeted by Ransomware Attack, Work Continues to… (City of Oakland).
Ransomware gang leaks data stolen from City of Oakland (BleepingComputer)
Ransomware hackers release some stolen Oakland data (CBS News)
Oakland officials say ransomware group may release personal data on Saturday (The Record from Recorded Future News) 
Cybercrime site shows off with a free leak of 2 million stolen card numbers (The Record from Recorded Future News)
A year of wipers: How the Kremlin-backed Sandworm has attacked Ukraine during the war (The Record from Recorded Future News)
Bitdefender Labs warns of fresh phishing campaign that uses copycat ChatGPT platform to swindle eager investors (Hot for Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 06 Mar 2023 21:15:00 -0000</pubDate>
      <itunes:title>That crane might know what you’re shipping. Addressing the cybersecurity of water systems. Oakland’s ransomware incident is now a breach. Hybrid war. Investment scams.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1773</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cranes as a security threat. EPA memo addresses cybersecurity risks to water systems. Oakland's ransomware incident becomes a data breach. Carding rises in the Russian underworld. Sandworm's record in Russia's war. Rick Howard sits down with Andy Greenberg from Wired to discuss how Ukraine suffered more data-wiping malware last year than anywhere, ever. Dave Bittner speaks with Kathleen Smith of ClearedJobs.Net to talk about hiring veterans and setting them (and yourself) up for success. And AI’s latest misuse: bogus investment schemes.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/43

Selected reading.
WSJ News Exclusive | Pentagon Sees Giant Cargo Cranes as Possible Chinese Spying Tools (Wall Street Journal)
EPA Takes Action to Improve Cybersecurity Resilience for Public Water Systems (US EPA)
EPA presses states to include cybersecurity in water safety reviews (SC Media) 
EPA Calls on States to Improve Public Water Systems’ Cybersecurity (Meritalk)
EPA issues water cybersecurity mandates, concerning industry and experts (CyberScoop)
City of Oakland Targeted by Ransomware Attack, Work Continues to… (City of Oakland).
Ransomware gang leaks data stolen from City of Oakland (BleepingComputer)
Ransomware hackers release some stolen Oakland data (CBS News)
Oakland officials say ransomware group may release personal data on Saturday (The Record from Recorded Future News) 
Cybercrime site shows off with a free leak of 2 million stolen card numbers (The Record from Recorded Future News)
A year of wipers: How the Kremlin-backed Sandworm has attacked Ukraine during the war (The Record from Recorded Future News)
Bitdefender Labs warns of fresh phishing campaign that uses copycat ChatGPT platform to swindle eager investors (Hot for Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cranes as a security threat. EPA memo addresses cybersecurity risks to water systems. Oakland's ransomware incident becomes a data breach. Carding rises in the Russian underworld. Sandworm's record in Russia's war. Rick Howard sits down with Andy Greenberg from Wired to discuss how Ukraine suffered more data-wiping malware last year than anywhere, ever. Dave Bittner speaks with Kathleen Smith of ClearedJobs.Net to talk about hiring veterans and setting them (and yourself) up for success. And AI’s latest misuse: bogus investment schemes.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/43</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.wsj.com/articles/pentagon-sees-giant-cargo-cranes-as-possible-chinese-spying-tools-887c4ade">WSJ News Exclusive | Pentagon Sees Giant Cargo Cranes as Possible Chinese Spying Tools</a> (Wall Street Journal)</p><p><a href="https://www.epa.gov/newsreleases/epa-takes-action-improve-cybersecurity-resilience-public-water-systems">EPA Takes Action to Improve Cybersecurity Resilience for Public Water Systems</a> (US EPA)</p><p><a href="https://www.scmagazine.com/news/critical-infrastructure/epa-memo-pushes-states-to-include-cybersecurity-in-water-safety-reviews">EPA presses states to include cybersecurity in water safety reviews</a> (SC Media) </p><p><a href="https://www.meritalk.com/articles/epa-calls-on-states-to-improve-public-water-systems-cybersecurity/">EPA Calls on States to Improve Public Water Systems’ Cybersecurity</a> (Meritalk)</p><p><a href="https://cyberscoop.com/epa-water-cyber-regulations/">EPA issues water cybersecurity mandates, concerning industry and experts</a> (CyberScoop)</p><p><a href="https://www.oaklandca.gov/news/2023/city-of-oakland-targeted-by-ransomware-attack-core-services-not-affected">City of Oakland Targeted by Ransomware Attack, Work Continues to…</a> (City of Oakland).</p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-gang-leaks-data-stolen-from-city-of-oakland/">Ransomware gang leaks data stolen from City of Oakland</a> (BleepingComputer)</p><p><a href="https://www.cbsnews.com/sanfrancisco/news/ransomware-hackers-release-some-stolen-oakland-data/">Ransomware hackers release some stolen Oakland data</a> (CBS News)</p><p><a href="https://therecord.media/oakland-officials-say-ransomware-group-may-release-personal-data-on-saturday/">Oakland officials say ransomware group may release personal data on Saturday</a> (The Record from Recorded Future News) </p><p><a href="https://therecord.media/bidencash-2million-credit-cards-cybercrime-market/">Cybercrime site shows off with a free leak of 2 million stolen card numbers</a> (The Record from Recorded Future News)</p><p><a href="https://therecord.media/a-year-of-wipers-how-the-kremlin-backed-sandworm-has-attacked-ukraine-during-the-war/">A year of wipers: How the Kremlin-backed Sandworm has attacked Ukraine during the war</a> (The Record from Recorded Future News)</p><p><a href="https://www.bitdefender.com/blog/hotforsecurity/bitdefender-labs-warns-of-fresh-phishing-campaign-that-uses-copycat-chatgpt-platform-to-swindle-eager-investors/">Bitdefender Labs warns of fresh phishing campaign that uses copycat ChatGPT platform to swindle eager investors</a> (Hot for Security)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1713</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2c17c63c-8167-11ed-9779-6772feb1dfd1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8423574262.mp3?updated=1690331241" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Gabriela Smith-Sherman: Thriving in the chaos. [Cyber governance] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/139/notes</link>
      <description>Gabriela Smith-Sherman, a former Federal agency CISO with over 15 years of experience in leading and implementing comprehensive enterprise cybersecurity programs and initiatives, sits down to share her journey. She is a U.S. combat disabled veteran who understands the importance of mission and is dedicated to delivering high-quality results and value to customers through innovative solutions. Gabriela shares about her time in the military and how her being apart of the service was one of the best decisions she made and dedicates all her hard work to her time in the military. She also shares how it was tough getting out of the routine of the military and being a civilian now was a hard transition, but she says that she thrives in the chaos of the IT world and that the military helped her to prepare for the cyber industry. She said "I think my military experience has prepared me, uh, to be in those kind of chaotic positions and be very calm about the approach." We thank Gabriela for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 05 Mar 2023 08:00:00 -0000</pubDate>
      <itunes:title>Gabriela Smith-Sherman: Thriving in the chaos. [Cyber governance] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>139</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Gabriela Smith-Sherman, a former Federal agency CISO with over 15 years of experience in leading and implementing comprehensive enterprise cybersecurity programs and initiatives, sits down to share her journey. She is a U.S. combat disabled veteran who understands the importance of mission and is dedicated to delivering high-quality results and value to customers through innovative solutions. Gabriela shares about her time in the military and how her being apart of the service was one of the best decisions she made and dedicates all her hard work to her time in the military. She also shares how it was tough getting out of the routine of the military and being a civilian now was a hard transition, but she says that she thrives in the chaos of the IT world and that the military helped her to prepare for the cyber industry. She said "I think my military experience has prepared me, uh, to be in those kind of chaotic positions and be very calm about the approach." We thank Gabriela for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Gabriela Smith-Sherman, a former Federal agency CISO with over 15 years of experience in leading and implementing comprehensive enterprise cybersecurity programs and initiatives, sits down to share her journey. She is a U.S. combat disabled veteran who understands the importance of mission and is dedicated to delivering high-quality results and value to customers through innovative solutions. Gabriela shares about her time in the military and how her being apart of the service was one of the best decisions she made and dedicates all her hard work to her time in the military. She also shares how it was tough getting out of the routine of the military and being a civilian now was a hard transition, but she says that she thrives in the chaos of the IT world and that the military helped her to prepare for the cyber industry. She said "I think my military experience has prepared me, uh, to be in those kind of chaotic positions and be very calm about the approach." We thank Gabriela for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>500</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f13a744a-b9da-11ed-a31f-bf094bc380c1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3730069562.mp3?updated=1677861379" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New exploits are tricking Chrome. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/271/notes</link>
      <description>Dor Zvi, Co-Founder and CEO from Red Access to discuss their work on "New Chrome Exploit Lets Attackers Completely Disable Browser Extensions." A recently patched exploit is tricking Chrome browsers on all popular OSs to not only give attackers visibility of their targets’ browser extensions, but also the ability to disable all of those extensions.
The research states the exploit consists of a bookmarklet exploit that allows threat actors to selectively force-disable Chrome extensions using a handy graphical user interface making Chrome mistakenly identify it as a legitimate request from the Chrome Web Store.
The research can be found here:
New Chrome Exploit Lets Attackers Completely Disable Browser Extensions

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Mar 2023 08:00:00 -0000</pubDate>
      <itunes:title>New exploits are tricking Chrome. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>271</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dor Zvi, Co-Founder and CEO from Red Access to discuss their work on "New Chrome Exploit Lets Attackers Completely Disable Browser Extensions." A recently patched exploit is tricking Chrome browsers on all popular OSs to not only give attackers visibility of their targets’ browser extensions, but also the ability to disable all of those extensions.
The research states the exploit consists of a bookmarklet exploit that allows threat actors to selectively force-disable Chrome extensions using a handy graphical user interface making Chrome mistakenly identify it as a legitimate request from the Chrome Web Store.
The research can be found here:
New Chrome Exploit Lets Attackers Completely Disable Browser Extensions

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dor Zvi, Co-Founder and CEO from Red Access to discuss their work on "New Chrome Exploit Lets Attackers Completely Disable Browser Extensions." A recently patched exploit is tricking Chrome browsers on all popular OSs to not only give attackers visibility of their targets’ browser extensions, but also the ability to disable all of those extensions.</p><p>The research states the exploit consists of a bookmarklet exploit that allows threat actors to selectively force-disable Chrome extensions using a handy graphical user interface making Chrome mistakenly identify it as a legitimate request from the Chrome Web Store.</p><p>The research can be found here:</p><ul><li><a href="https://redaccess.io/new-chrome-exploit-lets-attackers-completely-disable-browser-extensions/">New Chrome Exploit Lets Attackers Completely Disable Browser Extensions</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>933</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dff761b6-b9da-11ed-9c36-bfecc02d05dd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1815798142.mp3?updated=1685127487" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More on how the US will implement its new National Cybersecurity Strategy. Emissary Panda and Mustang Panda are back. Responding to phishing. Royal ransomware. Water utility security.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1772/notes</link>
      <description>Implementing the US National Cybersecurity Strategy. The US National Cybersecurity Strategy was informed by lessons from Russia's war. Two threat actors from China up their game. Responding to a phishing campaign. #StopRansomware: Royal Ransomware. CISA releases five ICS advisories. Sameer Jaleel, Kent State University Associate CIO on closing functionality gaps and creating a safer digital environment for students.Johannes Ullrich from SANS on establishing an "End of Support" inventory.EPA issues a memo on water system cybersecurity.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/42

Selected reading.
National Cybersecurity Strategy (The White House)
US cyber leaders discuss the new National Cyber Strategy. (CyberWire)
Biden vows to wield ‘all instruments’ in fighting cyberthreats (Defense News)
Chinese state-backed hackers Iron Tiger target Linux devices with new malware (Tech Monitor)
Chinese hackers use new custom backdoor to evade detection (BleepingComputer) 
Scam alert: Trezor warns users of new phishing attack (Cointelegraph)
FBI and CISA Release #StopRansomware: Royal Ransomware | CISA (Cybersecurity and Infrastructure Security Agency CISA)
CISA Releases Five Industrial Control Systems Advisories | CISA (Cybersecurity and Infrastructure Security Agency CISA)
EPA Takes Action to Improve Cybersecurity Resilience for Public Water Systems (US EPA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 03 Mar 2023 21:15:00 -0000</pubDate>
      <itunes:title>More on how the US will implement its new National Cybersecurity Strategy. Emissary Panda and Mustang Panda are back. Responding to phishing. Royal ransomware. Water utility security.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1772</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Implementing the US National Cybersecurity Strategy. The US National Cybersecurity Strategy was informed by lessons from Russia's war. Two threat actors from China up their game. Responding to a phishing campaign. #StopRansomware: Royal Ransomware. CISA releases five ICS advisories. Sameer Jaleel, Kent State University Associate CIO on closing functionality gaps and creating a safer digital environment for students.Johannes Ullrich from SANS on establishing an "End of Support" inventory.EPA issues a memo on water system cybersecurity.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/42

Selected reading.
National Cybersecurity Strategy (The White House)
US cyber leaders discuss the new National Cyber Strategy. (CyberWire)
Biden vows to wield ‘all instruments’ in fighting cyberthreats (Defense News)
Chinese state-backed hackers Iron Tiger target Linux devices with new malware (Tech Monitor)
Chinese hackers use new custom backdoor to evade detection (BleepingComputer) 
Scam alert: Trezor warns users of new phishing attack (Cointelegraph)
FBI and CISA Release #StopRansomware: Royal Ransomware | CISA (Cybersecurity and Infrastructure Security Agency CISA)
CISA Releases Five Industrial Control Systems Advisories | CISA (Cybersecurity and Infrastructure Security Agency CISA)
EPA Takes Action to Improve Cybersecurity Resilience for Public Water Systems (US EPA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Implementing the US National Cybersecurity Strategy. The US National Cybersecurity Strategy was informed by lessons from Russia's war. Two threat actors from China up their game. Responding to a phishing campaign. #StopRansomware: Royal Ransomware. CISA releases five ICS advisories. Sameer Jaleel, Kent State University Associate CIO on closing functionality gaps and creating a safer digital environment for students.Johannes Ullrich from SANS on establishing an "End of Support" inventory.EPA issues a memo on water system cybersecurity.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/42</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf">National Cybersecurity Strategy</a> (The White House)</p><p><a href="https://thecyberwire.com/stories/32da5dc6fced4df5a5fb342af6bec155/us-cyber-leaders-discuss-the-new-national-cyber-strategy">US cyber leaders discuss the new National Cyber Strategy.</a> (CyberWire)</p><p><a href="https://www.defensenews.com/cyber/2023/03/02/biden-vows-to-wield-all-instruments-in-fighting-cyber-threats/">Biden vows to wield ‘all instruments’ in fighting cyberthreats</a> (Defense News)</p><p><a href="https://techmonitor.ai/technology/cybersecurity/apt27-iron-tiger-chinese-hackers-linux">Chinese state-backed hackers Iron Tiger target Linux devices with new malware</a> (Tech Monitor)</p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-hackers-use-new-custom-backdoor-to-evade-detection/">Chinese hackers use new custom backdoor to evade detection</a> (BleepingComputer) </p><p><a href="https://cointelegraph.com/news/trezor-warns-users-of-new-phishing-attack">Scam alert: Trezor warns users of new phishing attack</a> (Cointelegraph)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/03/02/fbi-and-cisa-release-stopransomware-royal-ransomware">FBI and CISA Release #StopRansomware: Royal Ransomware | CISA</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/03/02/cisa-releases-five-industrial-control-systems-advisories">CISA Releases Five Industrial Control Systems Advisories | CISA</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://www.epa.gov/newsreleases/epa-takes-action-improve-cybersecurity-resilience-public-water-systems">EPA Takes Action to Improve Cybersecurity Resilience for Public Water Systems</a> (US EPA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1476</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2bafc802-8167-11ed-9779-9325b0794595]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8145538811.mp3?updated=1690331223" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA23-061A – #StopRansomware: Royal ransomware.</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/43/notes</link>
      <description>CISA and FBI are releasing this joint advisory to disseminate known Royal ransomware IOCs and TTPs identified through recent FBI threat response activities.
AA23-061A Alert, Technical Details, and Mitigations
AA23-061A STIX XML
Royal Rumble: Analysis of Royal Ransomware (cybereason.com)
DEV-0569 finds new ways to deliver Royal ransomware, various payloads - Microsoft Security Blog
2023-01: ACSC Ransomware Profile - Royal | Cyber.gov.au
See Stopransomware.gov, a whole-of-government approach, for ransomware resources and alerts.
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 03 Mar 2023 19:37:00 -0000</pubDate>
      <itunes:title>CISA Alert AA23-061A – #StopRansomware: Royal ransomware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>43</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA and FBI are releasing this joint advisory to disseminate known Royal ransomware IOCs and TTPs identified through recent FBI threat response activities.
AA23-061A Alert, Technical Details, and Mitigations
AA23-061A STIX XML
Royal Rumble: Analysis of Royal Ransomware (cybereason.com)
DEV-0569 finds new ways to deliver Royal ransomware, various payloads - Microsoft Security Blog
2023-01: ACSC Ransomware Profile - Royal | Cyber.gov.au
See Stopransomware.gov, a whole-of-government approach, for ransomware resources and alerts.
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA and FBI are releasing this joint advisory to disseminate known Royal ransomware IOCs and TTPs identified through recent FBI threat response activities.</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-061a">AA23-061A Alert, Technical Details, and Mitigations</a></p><p><a href="https://www.cisa.gov/sites/default/files/2023-03/aa23-061a.stix_.xml">AA23-061A STIX XML</a></p><p><a href="https://www.cybereason.com/blog/royal-ransomware-analysis">Royal Rumble: Analysis of Royal Ransomware (cybereason.com)</a></p><p><a href="https://www.microsoft.com/en-us/security/blog/2022/11/17/dev-0569-finds-new-ways-to-deliver-royal-ransomware-various-payloads/">DEV-0569 finds new ways to deliver Royal ransomware, various payloads - Microsoft Security Blog</a></p><p><a href="https://www.cyber.gov.au/acsc/view-all-content/advisories/2023-01-acsc-ransomware-profile-royal">2023-01: ACSC Ransomware Profile - Royal | Cyber.gov.au</a></p><p>See <a href="https://www.cisa.gov/stopransomware">Stopransomware.gov</a>, a whole-of-government approach, for ransomware resources and alerts.</p><p>No-cost cyber hygiene services: <a href="https://www.cisa.gov/cyber-hygiene-services">Cyber Hygiene Services</a> and <a href="https://github.com/cisagov/cset/">Ransomware Readiness Assessment</a>.</p><p>See CISA Insights <a href="https://www.cisa.gov/sites/default/files/publications/CISA%20Insights_Guidance-for-MSPs-and-Small-and-Mid-sized-Businesses_S508C.pdf">Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses</a> for guidance on hardening MSP and customer infrastructure.</p><p>U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email <a href="mailto:dib_defense@cyber.nsa.gov">dib_defense@cyber.nsa.gov</a> </p><p>To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="mailto:report@cisa.gov">report@cisa.gov</a>, or call (888) 282-0870, or report incidents to your local FBI field office.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>172</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[707c478a-b9fc-11ed-9540-1bd415141c5a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3176799472.mp3?updated=1677855642" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA23-059A – CISA red team shares key findings to improve monitoring and hardening of networks. [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/42/notes</link>
      <description>The Cybersecurity and Infrastructure Security Agency is releasing this Cybersecurity Advisory detailing activity and key findings from a recent CISA red team assessment—in coordination with the assessed organization—to provide network defenders recommendations for improving their organization's cyber posture.
AA23-059A Alert, Technical Details, and Mitigations
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 03 Mar 2023 17:53:00 -0000</pubDate>
      <itunes:title>CISA Alert AA23-059A – CISA red team shares key findings to improve monitoring and hardening of networks. [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>42</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Cybersecurity and Infrastructure Security Agency is releasing this Cybersecurity Advisory detailing activity and key findings from a recent CISA red team assessment—in coordination with the assessed organization—to provide network defenders recommendations for improving their organization's cyber posture.
AA23-059A Alert, Technical Details, and Mitigations
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Cybersecurity and Infrastructure Security Agency is releasing this Cybersecurity Advisory detailing activity and key findings from a recent CISA red team assessment—in coordination with the assessed organization—to provide network defenders recommendations for improving their organization's cyber posture.</p><p><a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-059a">AA23-059A Alert, Technical Details, and Mitigations</a></p><p>No-cost cyber hygiene services: <a href="https://www.cisa.gov/cyber-hygiene-services">Cyber Hygiene Services</a> and <a href="https://github.com/cisagov/cset/">Ransomware Readiness Assessment</a>.</p><p>See CISA Insights <a href="https://www.cisa.gov/sites/default/files/publications/CISA%20Insights_Guidance-for-MSPs-and-Small-and-Mid-sized-Businesses_S508C.pdf">Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses</a> for guidance on hardening MSP and customer infrastructure.</p><p>U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email <a href="mailto:dib_defense@cyber.nsa.gov">dib_defense@cyber.nsa.gov</a> </p><p>To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="mailto:report@cisa.gov">report@cisa.gov</a>, or call (888) 282-0870, or report incidents to your local FBI field office.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>166</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7d7e4d44-b9ec-11ed-b5ec-cf5296a4c637]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2308652199.mp3?updated=1677855372" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CyberWire commentary: Ukraine one year on. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/49/notes</link>
      <description>CyberWire Daily podcast host Dave Bittner is joined by CyberWire editor John Petrik for an extended discussion about the Russian invasion of Ukraine and its effect on cybersecurity at the one year anniversary. John and his team have covered the Ukrainian conflict with daily news stories since the invasion began, and in fact, had quite a lot of coverage prior to the invasion. They take stock of where things stand, what has happened, and what we expected versus reality.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 03 Mar 2023 08:00:00 -0000</pubDate>
      <itunes:title>CyberWire commentary: Ukraine one year on. [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>50</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CyberWire Daily podcast host Dave Bittner is joined by CyberWire editor John Petrik for an extended discussion about the Russian invasion of Ukraine and its effect on cybersecurity at the one year anniversary. John and his team have covered the Ukrainian conflict with daily news stories since the invasion began, and in fact, had quite a lot of coverage prior to the invasion. They take stock of where things stand, what has happened, and what we expected versus reality.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CyberWire Daily podcast host Dave Bittner is joined by CyberWire editor John Petrik for an extended discussion about the Russian invasion of Ukraine and its effect on cybersecurity at the one year anniversary. John and his team have covered the Ukrainian conflict with daily news stories since the invasion began, and in fact, had quite a lot of coverage prior to the invasion. They take stock of where things stand, what has happened, and what we expected versus reality.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1334</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eab0ef50-b930-11ed-8054-07e6a3e59740]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2527310669.mp3?updated=1677714391" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The US National Cybersecurity Strategy is out, and we have a preliminary look. CISA red-teams critical infrastructure. A new cryptojacker is out. Russia bans messaging apps. Hacktivist auxiliaries.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1771/notes</link>
      <description>The White House releases its US National Cybersecurity Strategy. Red-teaming critical infrastructure. Redis cryptojacker discovered. Russia bans several messaging apps. Our guest is Kapil Raina from CrowdStrike with the latest on Threat Hunting. Dinah Davis from Arctic Wolf on the top healthcare industry cyber attacks. And hacktivist auxiliaries continue their nuisance-level activities.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/41

Selected reading.
National Cybersecurity Strategy (The White House)
FACT SHEET: Biden-Harris Administration Announces National Cybersecurity Strategy (The White House)
Biden administration releases new cybersecurity strategy (AP NEWS)
White House pushes for mandatory regulations, more offensive cyber action under National Cyber Strategy (The Record from Recorded Future News)
Here's why Biden's new cyber strategy is notable (Washington Post)
How the U.S. National Cyber Strategy Reaches Beyond Government Agencies (Wall Street Journal)
Biden National Cyber Strategy Seeks to Hold Software Firms Liable for Insecurity (Wall Street Journal)
CISA Red Team Shares Key Findings to Improve Monitoring and Hardening of Networks (Cybersecurity and Infrastructure Security Agency CISA)
CISA red-teamed a 'large critical infrastructure organization' and didn't get caught (The Record from Recorded Future News) 
Redis Miner Leverages Command Line File Hosting Service (Cado Security | Cloud Investigation)
Russia bans foreign messaging apps (Computing)
U.S. Consulate hacked by "Putin supporters" (Newsweek)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 02 Mar 2023 21:15:00 -0000</pubDate>
      <itunes:title>The US National Cybersecurity Strategy is out, and we have a preliminary look. CISA red-teams critical infrastructure. A new cryptojacker is out. Russia bans messaging apps. Hacktivist auxiliaries.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1771</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The White House releases its US National Cybersecurity Strategy. Red-teaming critical infrastructure. Redis cryptojacker discovered. Russia bans several messaging apps. Our guest is Kapil Raina from CrowdStrike with the latest on Threat Hunting. Dinah Davis from Arctic Wolf on the top healthcare industry cyber attacks. And hacktivist auxiliaries continue their nuisance-level activities.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/41

Selected reading.
National Cybersecurity Strategy (The White House)
FACT SHEET: Biden-Harris Administration Announces National Cybersecurity Strategy (The White House)
Biden administration releases new cybersecurity strategy (AP NEWS)
White House pushes for mandatory regulations, more offensive cyber action under National Cyber Strategy (The Record from Recorded Future News)
Here's why Biden's new cyber strategy is notable (Washington Post)
How the U.S. National Cyber Strategy Reaches Beyond Government Agencies (Wall Street Journal)
Biden National Cyber Strategy Seeks to Hold Software Firms Liable for Insecurity (Wall Street Journal)
CISA Red Team Shares Key Findings to Improve Monitoring and Hardening of Networks (Cybersecurity and Infrastructure Security Agency CISA)
CISA red-teamed a 'large critical infrastructure organization' and didn't get caught (The Record from Recorded Future News) 
Redis Miner Leverages Command Line File Hosting Service (Cado Security | Cloud Investigation)
Russia bans foreign messaging apps (Computing)
U.S. Consulate hacked by "Putin supporters" (Newsweek)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The White House releases its US National Cybersecurity Strategy. Red-teaming critical infrastructure. Redis cryptojacker discovered. Russia bans several messaging apps. Our guest is Kapil Raina from CrowdStrike with the latest on Threat Hunting. Dinah Davis from Arctic Wolf on the top healthcare industry cyber attacks. And hacktivist auxiliaries continue their nuisance-level activities.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/41</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.whitehouse.gov/wp-content/uploads/2023/03/National-Cybersecurity-Strategy-2023.pdf">National Cybersecurity Strategy</a> (The White House)</p><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2023/03/02/fact-sheet-biden-harris-administration-announces-national-cybersecurity-strategy/">FACT SHEET: Biden-Harris Administration Announces National Cybersecurity Strategy</a> (The White House)</p><p><a href="https://apnews.com/article/biden-cybersecurity-ransomware-hacking-216e18a6cb01a0f2e7b63a6031b876f1">Biden administration releases new cybersecurity strategy</a> (AP NEWS)</p><p><a href="https://therecord.media/national-cyber-strategy-to-push-mandatory-regulations-more-offensive-cyber-action/?">White House pushes for mandatory regulations, more offensive cyber action under National Cyber Strategy</a> (The Record from Recorded Future News)</p><p><a href="https://www.washingtonpost.com/politics/2023/03/02/here-why-biden-new-cyber-strategy-is-notable/">Here's why Biden's new cyber strategy is notable</a> (Washington Post)</p><p><a href="https://www.wsj.com/articles/how-the-u-s-national-cyber-strategy-reaches-beyond-government-agencies-ef83ac74">How the U.S. National Cyber Strategy Reaches Beyond Government Agencies</a> (Wall Street Journal)</p><p><a href="https://www.wsj.com/articles/biden-national-cyber-strategy-seeks-to-hold-software-firms-liable-for-insecurity-67c592d6">Biden National Cyber Strategy Seeks to Hold Software Firms Liable for Insecurity</a> (Wall Street Journal)</p><p><a href="https://www.cisa.gov/news-events/alerts/2023/02/28/cisa-red-team-shares-key-findings-improve-monitoring-and-hardening-networks">CISA Red Team Shares Key Findings to Improve Monitoring and Hardening of Networks</a> (Cybersecurity and Infrastructure Security Agency CISA)</p><p><a href="https://therecord.media/cisa-red-team-large-critical-infrastructure-organization/">CISA red-teamed a 'large critical infrastructure organization' and didn't get caught</a> (The Record from Recorded Future News) </p><p><a href="https://www.cadosecurity.com/redis-miner-leverages-command-line-file-hosting-service/">Redis Miner Leverages Command Line File Hosting Service</a> (Cado Security | Cloud Investigation)</p><p><a href="https://www.computing.co.uk/news/4076852/russia-bans-foreign-messaging-apps">Russia bans foreign messaging apps </a>(Computing)</p><p><a href="https://www.newsweek.com/us-consulate-hacked-putin-supporters-1784304">U.S. Consulate hacked by "Putin supporters"</a> (Newsweek)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1500</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2b9652f0-8167-11ed-9779-07c0cb102f75]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9230733638.mp3?updated=1690331205" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How an attack led to a breach that enabled further social engineering. Forensic visibility in the Google Cloud Platform. Hacktivist auxiliaries. Two 8Ks and a free decryptor.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1770/notes</link>
      <description>The LastPass data breach built on an earlier attack. Forensic visibility and the Google Cloud Platform. An overview of hacktivist auxiliaries in Russia's war against Ukraine. Dish acknowledges sustaining a cyberattack. MKS Instruments discloses a ransomware incident. Carole Theriault has a lesson about ChatGPT and school systems. Ann Johnson from Afternoon Cyber Tea speaks with Stacy Hughes from Voya Financial about her journey to being CISO. And Bitdefender releases a decryptor for MortalKombat ransomware.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/40

Selected reading.
LastPass sustains a second data breach. (CyberWire)
Incident 2 – Additional details of the attack (LastPass Support) 
LastPass Says DevOps Engineer Home Computer Hacked (SecurityWeek) 
LastPass: Keylogger on home PC led to cracked corporate password vault (Naked Security) 
LastPass data was stolen by hacking an employee’s home computer (The Verge) 
LastPass says employee’s home computer was hacked and corporate vault taken (Ars Technica) 
LastPass is in Big Trouble (Gizmodo) 
LastPass: DevOps engineer hacked to steal password vault data in 2022 breach (BleepingComputer) 
The LastPass security breach is still going from bad to worse (Cybersecurity Connect) 
Mitiga on forensic visibility and the Google Cloud Platform. (CyberWire)
Mitiga Security Advisory: Insufficient Forensic Visibility in GCP Storage (Mitiga) 
Google Cloud Platform Exfiltration: A Threat Hunting Guide (Mitiga)
The Cyber Warfare Report (GroupSense) 
Dish Network confirms ransomware attack behind multi-day outage (BleepingComputer)
DISH tells SEC that ransomware attack caused outages; personal info may have been stolen (The Record from Recorded Future News)
Ransomware attack on chip supplier causes delays for semiconductor groups (Financial Times)
Bitdefender Releases Decryptor for MortalKombat Ransomware (Bitdefender Labs) 
Victims of MortalKombat ransomware can now decrypt their locked files for free (The Record from Recorded Future News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 01 Mar 2023 21:15:00 -0000</pubDate>
      <itunes:title>How an attack led to a breach that enabled further social engineering. Forensic visibility in the Google Cloud Platform. Hacktivist auxiliaries. Two 8Ks and a free decryptor.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1770</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The LastPass data breach built on an earlier attack. Forensic visibility and the Google Cloud Platform. An overview of hacktivist auxiliaries in Russia's war against Ukraine. Dish acknowledges sustaining a cyberattack. MKS Instruments discloses a ransomware incident. Carole Theriault has a lesson about ChatGPT and school systems. Ann Johnson from Afternoon Cyber Tea speaks with Stacy Hughes from Voya Financial about her journey to being CISO. And Bitdefender releases a decryptor for MortalKombat ransomware.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/40

Selected reading.
LastPass sustains a second data breach. (CyberWire)
Incident 2 – Additional details of the attack (LastPass Support) 
LastPass Says DevOps Engineer Home Computer Hacked (SecurityWeek) 
LastPass: Keylogger on home PC led to cracked corporate password vault (Naked Security) 
LastPass data was stolen by hacking an employee’s home computer (The Verge) 
LastPass says employee’s home computer was hacked and corporate vault taken (Ars Technica) 
LastPass is in Big Trouble (Gizmodo) 
LastPass: DevOps engineer hacked to steal password vault data in 2022 breach (BleepingComputer) 
The LastPass security breach is still going from bad to worse (Cybersecurity Connect) 
Mitiga on forensic visibility and the Google Cloud Platform. (CyberWire)
Mitiga Security Advisory: Insufficient Forensic Visibility in GCP Storage (Mitiga) 
Google Cloud Platform Exfiltration: A Threat Hunting Guide (Mitiga)
The Cyber Warfare Report (GroupSense) 
Dish Network confirms ransomware attack behind multi-day outage (BleepingComputer)
DISH tells SEC that ransomware attack caused outages; personal info may have been stolen (The Record from Recorded Future News)
Ransomware attack on chip supplier causes delays for semiconductor groups (Financial Times)
Bitdefender Releases Decryptor for MortalKombat Ransomware (Bitdefender Labs) 
Victims of MortalKombat ransomware can now decrypt their locked files for free (The Record from Recorded Future News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The LastPass data breach built on an earlier attack. Forensic visibility and the Google Cloud Platform. An overview of hacktivist auxiliaries in Russia's war against Ukraine. Dish acknowledges sustaining a cyberattack. MKS Instruments discloses a ransomware incident. Carole Theriault has a lesson about ChatGPT and school systems. Ann Johnson from Afternoon Cyber Tea speaks with Stacy Hughes from Voya Financial about her journey to being CISO. And Bitdefender releases a decryptor for MortalKombat ransomware.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/40</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/stories/41aa9eb9f8cd449ea9f644b2db9f99b9/lastpass-sustains-a-second-data-breach">LastPass sustains a second data breach.</a> (CyberWire)</p><p><a href="https://support.lastpass.com/help/incident-2-additional-details-of-the-attack">Incident 2 – Additional details of the attack</a> (LastPass Support) </p><p><a href="https://www.securityweek.com/lastpass-says-devops-engineer-home-computer-hacked/">LastPass Says DevOps Engineer Home Computer Hacked</a> (SecurityWeek) </p><p><a href="https://nakedsecurity.sophos.com/2023/02/28/lastpass-the-crooks-used-a-keylogger-to-crack-a-corporatre-password-vault/">LastPass: Keylogger on home PC led to cracked corporate password vault</a> (Naked Security) </p><p><a href="https://www.theverge.com/2023/2/28/23618353/lastpass-security-breach-disclosure-password-vault-encryption-update">LastPass data was stolen by hacking an employee’s home computer</a> (The Verge) </p><p><a href="https://arstechnica.com/information-technology/2023/02/lastpass-hackers-infected-employees-home-computer-and-stole-corporate-vault/">LastPass says employee’s home computer was hacked and corporate vault taken</a> (Ars Technica) </p><p><a href="https://gizmodo.com/lastpass-data-breach-cybercriminal-cybersecurity-hacker-1850169784">LastPass is in Big Trouble</a> (Gizmodo) </p><p><a href="https://www.bleepingcomputer.com/news/security/lastpass-devops-engineer-hacked-to-steal-password-vault-data-in-2022-breach/">LastPass: DevOps engineer hacked to steal password vault data in 2022 breach</a> (BleepingComputer) </p><p><a href="https://www.cybersecurityconnect.com.au/commercial/8748-the-lastpass-security-breach-is-still-going-from-bad-to-worse">The LastPass security breach is still going from bad to worse</a> (Cybersecurity Connect) </p><p><a href="https://thecyberwire.com/stories/aabcfcdd4c4c45aa8dd5e9ab0e48cbbe/mitiga-on-forensic-visibility-and-the-google-cloud-platform">Mitiga on forensic visibility and the Google Cloud Platform.</a> (CyberWire)</p><p><a href="https://www.mitiga.io/blog/mitiga-security-advisory-insufficient-forensic-visibility-in-gcp-storage">Mitiga Security Advisory: Insufficient Forensic Visibility in GCP Storage</a> (Mitiga) </p><p><a href="https://www.mitiga.io/blog/google-cloud-platform-exfiltration-a-threat-hunting-guide">Google Cloud Platform Exfiltration: A Threat Hunting Guide</a> (Mitiga)</p><p><a href="https://www.groupsense.io/hubfs/Content/The%20Cyber%20Warfare%20Report.pdf">The Cyber Warfare Report</a> (GroupSense) </p><p><a href="https://www.bleepingcomputer.com/news/security/dish-network-confirms-ransomware-attack-behind-multi-day-outage/">Dish Network confirms ransomware attack behind multi-day outage</a> (BleepingComputer)</p><p><a href="https://therecord.media/dish-tells-sec-that-ransomware-attack-caused-outages-personal-info-may-have-been-stolen/">DISH tells SEC that ransomware attack caused outages; personal info may have been stolen</a> (The Record from Recorded Future News)</p><p><a href="https://www.ft.com/content/b8669140-8dde-493e-bb30-f5f1e9830804">Ransomware attack on chip supplier causes delays for semiconductor groups</a> (Financial Times)</p><p><a href="https://www.bitdefender.com/blog/labs/bitdefender-releases-decryptor-for-mortalkombat-ransomware/">Bitdefender Releases Decryptor for MortalKombat Ransomware</a> (Bitdefender Labs) </p><p><a href="https://therecord.media/victims-of-mortalkombat-ransomware-can-now-decrypt-their-locked-files-for-free/">Victims of MortalKombat ransomware can now decrypt their locked files for free</a> (The Record from Recorded Future News)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2b7c0ae4-8167-11ed-9779-47a2ab22be45]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1382256127.mp3?updated=1690331189" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Data breach at the US Marshals Service. Blind Eagle phishes in the service of espionage. Dish investigates its outages. Qakbot delivered via OneNote files. Memory-safe coding. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1769/notes</link>
      <description>The US Marshals Service sustains a data breach. Blind Eagle is a phish hawk. Dish continues to work toward recovery. OneNote attachments are used to distribute Qakbot. Ben Yelin has analysis on the Supreme Court’s hearing on a section 230 case. Mr Security Answer Person John Pescatore has thoughts on Chat GPT. And CISA Director Easterly urges vendors to make software secure-by-design.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/39

Selected reading.
U.S. Marshals Service investigating ransomware attack, data theft (BleepingComputer)
US Marshals says prisoners’ personal information taken in data breach (TechCrunch)
Blind Eagle Deploys Fake UUE Files and Fsociety to Target Colombia's Judiciary, Financial, Public, and Law Enforcement Entities (BlackBerry)
Dish hit by multiday outage after reported cyberattack (TechCrunch)
DISH says ‘system issue’ affecting internal servers, phone systems (The Record from Recorded Future News) 
Take Note: Armorblox Stops OneNote Malware Campaign (Armorblox) 
Ukraine &amp; Intelligence: One Year on – with Shane Harris (SpyCast)
U.S. cyber official praises Apple security and suggests Microsoft, Twitter need to step it up (CNBC)
U.S. cyber chief warns tech companies to curb unsafe practices (CBS News)
Tech manufacturers are leaving the door open for Chinese hacking, Easterly warns (The Record from Recorded Future News)
CISA Director Calls Out Industry Using Consumers as Cyber 'Crash Test Dummies' (Nextgov.com)
The Designed-in Dangers of Technology and What We Can Do About It (Cybersecurity and Infrastructure Security Agency)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Feb 2023 21:15:00 -0000</pubDate>
      <itunes:title>Data breach at the US Marshals Service. Blind Eagle phishes in the service of espionage. Dish investigates its outages. Qakbot delivered via OneNote files. Memory-safe coding. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1769</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The US Marshals Service sustains a data breach. Blind Eagle is a phish hawk. Dish continues to work toward recovery. OneNote attachments are used to distribute Qakbot. Ben Yelin has analysis on the Supreme Court’s hearing on a section 230 case. Mr Security Answer Person John Pescatore has thoughts on Chat GPT. And CISA Director Easterly urges vendors to make software secure-by-design.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/39

Selected reading.
U.S. Marshals Service investigating ransomware attack, data theft (BleepingComputer)
US Marshals says prisoners’ personal information taken in data breach (TechCrunch)
Blind Eagle Deploys Fake UUE Files and Fsociety to Target Colombia's Judiciary, Financial, Public, and Law Enforcement Entities (BlackBerry)
Dish hit by multiday outage after reported cyberattack (TechCrunch)
DISH says ‘system issue’ affecting internal servers, phone systems (The Record from Recorded Future News) 
Take Note: Armorblox Stops OneNote Malware Campaign (Armorblox) 
Ukraine &amp; Intelligence: One Year on – with Shane Harris (SpyCast)
U.S. cyber official praises Apple security and suggests Microsoft, Twitter need to step it up (CNBC)
U.S. cyber chief warns tech companies to curb unsafe practices (CBS News)
Tech manufacturers are leaving the door open for Chinese hacking, Easterly warns (The Record from Recorded Future News)
CISA Director Calls Out Industry Using Consumers as Cyber 'Crash Test Dummies' (Nextgov.com)
The Designed-in Dangers of Technology and What We Can Do About It (Cybersecurity and Infrastructure Security Agency)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US Marshals Service sustains a data breach. Blind Eagle is a phish hawk. Dish continues to work toward recovery. OneNote attachments are used to distribute Qakbot. Ben Yelin has analysis on the Supreme Court’s hearing on a section 230 case. Mr Security Answer Person John Pescatore has thoughts on Chat GPT. And CISA Director Easterly urges vendors to make software secure-by-design.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/39</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/security/us-marshals-service-investigating-ransomware-attack-data-theft/">U.S. Marshals Service investigating ransomware attack, data theft</a> (BleepingComputer)</p><p><a href="https://techcrunch.com/2020/05/08/us-marshals-prisoner-data-breach/">US Marshals says prisoners’ personal information taken in data breach</a> (TechCrunch)</p><p><a href="https://blogs.blackberry.com/en/2023/02/blind-eagle-apt-c-36-targets-colombia">Blind Eagle Deploys Fake UUE Files and Fsociety to Target Colombia's Judiciary, Financial, Public, and Law Enforcement Entities</a> (BlackBerry)</p><p><a href="https://techcrunch.com/2023/02/27/dish-outage-reported-cyberattack/">Dish hit by multiday outage after reported cyberattack</a> (TechCrunch)</p><p><a href="https://therecord.media/dish-says-system-issue-affecting-internal-servers-phone-systems/">DISH says ‘system issue’ affecting internal servers, phone systems</a> (The Record from Recorded Future News) </p><p><a href="https://www.armorblox.com/blog/armorblox-stops-onenote-malware-campaign/">Take Note: Armorblox Stops OneNote Malware Campaign</a> (Armorblox) </p><p><a href="https://thecyberwire.com/podcasts/spycast/576/notes">Ukraine &amp; Intelligence: One Year on – with Shane Harris</a> (SpyCast)</p><p><a href="https://www.cnbc.com/2023/02/27/cisa-director-praises-apple-security-suggests-microsoft-twitter-need-to-improve.html">U.S. cyber official praises Apple security and suggests Microsoft, Twitter need to step it up</a> (CNBC)</p><p><a href="https://www.cbsnews.com/news/u-s-cyber-chief-warns-tech-companies-curb-unsafe-practices/">U.S. cyber chief warns tech companies to curb unsafe practices</a> (CBS News)</p><p><a href="https://therecord.media/tech-manufacturers-are-leaving-the-door-open-for-chinese-hacking-easterly-warns/">Tech manufacturers are leaving the door open for Chinese hacking, Easterly warns</a> (The Record from Recorded Future News)</p><p><a href="https://www.nextgov.com/cybersecurity/2023/02/cisa-director-calls-out-industry-using-consumers-cyber-crash-test-dummies/383384/">CISA Director Calls Out Industry Using Consumers as Cyber 'Crash Test Dummies'</a> (Nextgov.com)</p><p><a href="https://content.govdelivery.com/accounts/USDHSCISA/bulletins/34b657c">The Designed-in Dangers of Technology and What We Can Do About It</a> (Cybersecurity and Infrastructure Security Agency)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1596</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2a7e8c16-8167-11ed-9779-c379e407e379]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8528274412.mp3?updated=1690331172" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Artificial intelligence behaving badly? Or just tastelessly? Third-party risks. Signs that the advantage may be tilting toward the defender. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1768/notes</link>
      <description>Social engineering with generative AI. Mylobot and BHProxies. PureCrypter is deployed against government organizations and staged through Discord. Dish Network reports disruption. Third-party app and software as a service risk. Further assessments of the cyber phase of Russia's war so far, with warnings to stay alert. Are tough times coming in gangland? Comments on NIST's revisions to its Cybersecurity Framework are due this Friday. AJ Nash from ZeroFox on Mis/Dis/and Malinformation. Rick Howard digs into Zero Trust. And get this—AI is writing science fiction!

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/38

Selected reading.
Social engineering with generative AI. (CyberWire)
Who’s Behind the Botnet-Based Service BHProxies? (KrebsOnSecurity)
Mylobot: Investigating a proxy botnet (Bitsight)
PureCrypter targets government entities through Discord (Menlo Security)
PureCrypter malware hits govt orgs with ransomware, info-stealers (BleepingComputer)
Uncovering the Risks &amp; Realities of Third-Party Connected Apps: ‍2023 SaaS-to-SaaS Access Report (Adaptive Shield)
Ukraine war anniversary likely to bring ‘disruptive’ cyberattacks on West, agencies warn (Global News)
How the Ukraine War Has Changed Russia’s Cyberstrategy  (Foreign Policy) 
A year of wiper attacks in Ukraine (WeLiveSecurity)
Russia's yearlong cyber focus on Ukraine (Axios)
A year after Russia's invasion, cyberdefenses have improved around the world (Washington Post)
One year on, how is the war playing out in cyberspace? (WeLiveSecurity) 
The Russia-Ukraine cyber war: one year later (IT World Canada) 
Russia launched large-scale operations in cyberspace alongside war (euronews)
WSJ News Exclusive | Hackers Extort Less Money, Are Laid Off as New Tactics Thwart More Ransomware Attacks (Wall Street Journal)
AI-generated fiction is flooding literary magazines — but not fooling anyone (The Verge)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 27 Feb 2023 21:15:00 -0000</pubDate>
      <itunes:title>Artificial intelligence behaving badly? Or just tastelessly? Third-party risks. Signs that the advantage may be tilting toward the defender. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1768</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Social engineering with generative AI. Mylobot and BHProxies. PureCrypter is deployed against government organizations and staged through Discord. Dish Network reports disruption. Third-party app and software as a service risk. Further assessments of the cyber phase of Russia's war so far, with warnings to stay alert. Are tough times coming in gangland? Comments on NIST's revisions to its Cybersecurity Framework are due this Friday. AJ Nash from ZeroFox on Mis/Dis/and Malinformation. Rick Howard digs into Zero Trust. And get this—AI is writing science fiction!

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/38

Selected reading.
Social engineering with generative AI. (CyberWire)
Who’s Behind the Botnet-Based Service BHProxies? (KrebsOnSecurity)
Mylobot: Investigating a proxy botnet (Bitsight)
PureCrypter targets government entities through Discord (Menlo Security)
PureCrypter malware hits govt orgs with ransomware, info-stealers (BleepingComputer)
Uncovering the Risks &amp; Realities of Third-Party Connected Apps: ‍2023 SaaS-to-SaaS Access Report (Adaptive Shield)
Ukraine war anniversary likely to bring ‘disruptive’ cyberattacks on West, agencies warn (Global News)
How the Ukraine War Has Changed Russia’s Cyberstrategy  (Foreign Policy) 
A year of wiper attacks in Ukraine (WeLiveSecurity)
Russia's yearlong cyber focus on Ukraine (Axios)
A year after Russia's invasion, cyberdefenses have improved around the world (Washington Post)
One year on, how is the war playing out in cyberspace? (WeLiveSecurity) 
The Russia-Ukraine cyber war: one year later (IT World Canada) 
Russia launched large-scale operations in cyberspace alongside war (euronews)
WSJ News Exclusive | Hackers Extort Less Money, Are Laid Off as New Tactics Thwart More Ransomware Attacks (Wall Street Journal)
AI-generated fiction is flooding literary magazines — but not fooling anyone (The Verge)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Social engineering with generative AI. Mylobot and BHProxies. PureCrypter is deployed against government organizations and staged through Discord. Dish Network reports disruption. Third-party app and software as a service risk. Further assessments of the cyber phase of Russia's war so far, with warnings to stay alert. Are tough times coming in gangland? Comments on NIST's revisions to its Cybersecurity Framework are due this Friday. AJ Nash from ZeroFox on Mis/Dis/and Malinformation. Rick Howard digs into Zero Trust. And get this—AI is writing science fiction!</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/38</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/stories/60f440b7ba46439eb0fa917f56b8bc05/social-engineering-with-generative-ai">Social engineering with generative AI.</a> (CyberWire)</p><p><a href="https://krebsonsecurity.com/2023/02/whos-behind-the-botnet-based-service-bhproxies/">Who’s Behind the Botnet-Based Service BHProxies?</a> (KrebsOnSecurity)</p><p><a href="https://www.bitsight.com/blog/mylobot-investigating-proxy-botnet">Mylobot: Investigating a proxy botnet</a> (Bitsight)</p><p><a href="https://www.menlosecurity.com/blog/purecrypter-targets-government-entities-through-discord/">PureCrypter targets government entities through Discord</a> (Menlo Security)</p><p><a href="https://www.bleepingcomputer.com/news/security/purecrypter-malware-hits-govt-orgs-with-ransomware-info-stealers/">PureCrypter malware hits govt orgs with ransomware, info-stealers</a> (BleepingComputer)</p><p><a href="https://www.adaptive-shield.com/saas-to-saas-3rd-party-app-risk-report-2023">Uncovering the Risks &amp; Realities of Third-Party Connected Apps: ‍2023 SaaS-to-SaaS Access Report</a> (Adaptive Shield)</p><p><a href="https://globalnews.ca/news/9509434/ukraine-war-anniversary-cyber-warning/">Ukraine war anniversary likely to bring ‘disruptive’ cyberattacks on West, agencies warn</a> (Global News)</p><p><a href="https://foreignpolicy.com/2023/02/24/russia-ukraine-war-cybercrime-strategy/">How the Ukraine War Has Changed Russia’s Cyberstrategy </a> (Foreign Policy) </p><p><a href="https://www.welivesecurity.com/2023/02/24/year-wiper-attacks-ukraine/">A year of wiper attacks in Ukraine</a> (WeLiveSecurity)</p><p><a href="https://www.axios.com/2023/02/24/russia-cybersecurity-ukraine-war">Russia's yearlong cyber focus on Ukraine</a> (Axios)</p><p><a href="https://www.washingtonpost.com/politics/2023/02/27/year-after-russia-invasion-cyberdefenses-have-improved-around-world/">A year after Russia's invasion, cyberdefenses have improved around the world</a> (Washington Post)</p><p><a href="https://www.welivesecurity.com/videos/twelve-months-war-ukraine-cyberspace-week-security-tony-anscombe/">One year on, how is the war playing out in cyberspace?</a> (WeLiveSecurity) </p><p><a href="https://www.itworldcanada.com/article/the-russia-ukraine-cyber-war-one-year-later/529359">The Russia-Ukraine cyber war: one year later</a> (IT World Canada) </p><p><a href="https://www.euronews.com/2023/02/26/russias-invasion-of-ukraine-was-also-accompanied-by-large-scale-operations-in-cyberspace">Russia launched large-scale operations in cyberspace alongside war</a> (euronews)</p><p><a href="https://www.wsj.com/articles/ransomware-attacks-decline-as-new-defenses-countermeasures-thwart-hackers-23b918a3">WSJ News Exclusive | Hackers Extort Less Money, Are Laid Off as New Tactics Thwart More Ransomware Attacks</a> (Wall Street Journal)</p><p><a href="https://www.theverge.com/2023/2/25/23613752/ai-generated-short-stories-literary-magazines-clarkesworld-science-fiction">AI-generated fiction is flooding literary magazines — but not fooling anyone</a> (The Verge)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1537</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2a69691c-8167-11ed-9779-3bdc6a797dbd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6794192995.mp3?updated=1690331155" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mike Fey: Highs are high and lows are low. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/138/notes</link>
      <description>Mike Fey, CEO and co-founder of Island.io, joins to share his story, falling in love with technology and being fascinated by it at a young age. Mike quickly started working for companies where he grew in his role, becoming CTO of McAfee and then GM of the Enterprise business, stepping out to then become president and COO of Blue Coat, which was eventually acquired by Symantec, eventually wanting to get into his own business. He shares that being a small business owner is a lot of hard work and very tiring at times, he says "especially in a startup, the highs are very high and the lows are very low." Mike also mentions how easy it is to get knocked down when being in charge of your own business, but that teamwork is what helps to bring him back up. Mike says he wants to eventually help change the world and hopefully his legacy will help him to do that some day. We thank Mike for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 26 Feb 2023 08:00:00 -0000</pubDate>
      <itunes:title>Mike Fey: Highs are high and lows are low. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>138</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Mike Fey, CEO and co-founder of Island.io, joins to share his story, falling in love with technology and being fascinated by it at a young age. Mike quickly started working for companies where he grew in his role, becoming CTO of McAfee and then GM of the Enterprise business, stepping out to then become president and COO of Blue Coat, which was eventually acquired by Symantec, eventually wanting to get into his own business. He shares that being a small business owner is a lot of hard work and very tiring at times, he says "especially in a startup, the highs are very high and the lows are very low." Mike also mentions how easy it is to get knocked down when being in charge of your own business, but that teamwork is what helps to bring him back up. Mike says he wants to eventually help change the world and hopefully his legacy will help him to do that some day. We thank Mike for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Mike Fey, CEO and co-founder of Island.io, joins to share his story, falling in love with technology and being fascinated by it at a young age. Mike quickly started working for companies where he grew in his role, becoming CTO of McAfee and then GM of the Enterprise business, stepping out to then become president and COO of Blue Coat, which was eventually acquired by Symantec, eventually wanting to get into his own business. He shares that being a small business owner is a lot of hard work and very tiring at times, he says "especially in a startup, the highs are very high and the lows are very low." Mike also mentions how easy it is to get knocked down when being in charge of your own business, but that teamwork is what helps to bring him back up. Mike says he wants to eventually help change the world and hopefully his legacy will help him to do that some day. We thank Mike for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>470</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[530f06fc-b479-11ed-aaf1-ab3afc8e600d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7753864677.mp3?updated=1677258869" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The next hot AI scam. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/270/notes</link>
      <description>Andy Patel from WithSecure Labs joins with Dave to discuss their study that demonstrates how GPT-3 can be misused through malicious and creative prompt engineering. The research looks at how this technology, GPT-3 and GPT-3.5, can be used to trick users into scams.
GPT-3 is a user-friendly tool that employs autoregressive language to generate versatile natural language text using a small amount of input that could inevitably interest cybercriminals. The research is looking for possible malpractice from this tool, such as phishing content, social opposition, social validation, style transfer, opinion transfer, prompt creation, and fake news.
The research can be found here:
Creatively malicious prompt engineering

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Feb 2023 08:00:00 -0000</pubDate>
      <itunes:title>The next hot AI scam. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>270</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Andy Patel from WithSecure Labs joins with Dave to discuss their study that demonstrates how GPT-3 can be misused through malicious and creative prompt engineering. The research looks at how this technology, GPT-3 and GPT-3.5, can be used to trick users into scams.
GPT-3 is a user-friendly tool that employs autoregressive language to generate versatile natural language text using a small amount of input that could inevitably interest cybercriminals. The research is looking for possible malpractice from this tool, such as phishing content, social opposition, social validation, style transfer, opinion transfer, prompt creation, and fake news.
The research can be found here:
Creatively malicious prompt engineering

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Andy Patel from WithSecure Labs joins with Dave to discuss their study that demonstrates how GPT-3 can be misused through malicious and creative prompt engineering. The research looks at how this technology, GPT-3 and GPT-3.5, can be used to trick users into scams.</p><p>GPT-3 is a user-friendly tool that employs autoregressive language to generate versatile natural language text using a small amount of input that could inevitably interest cybercriminals. The research is looking for possible malpractice from this tool, such as phishing content, social opposition, social validation, style transfer, opinion transfer, prompt creation, and fake news.</p><p>The research can be found here:</p><ul><li><a href="https://labs.withsecure.com/publications/creatively-malicious-prompt-engineering">Creatively malicious prompt engineering</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1509</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[caf253ce-b3a5-11ed-92e2-0f85b11130c1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6536883337.mp3?updated=1685127483" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A look at the cyber aspects of Russia’s war, on the first anniversary of the invasion of Ukraine. And a few notes from elsewhere in cyberspace.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1767/notes</link>
      <description>CISA advises increased vigilance on the first anniversary of Russia's war. CERT-UA reports current Russian cyberattacks were prepared in December 2021. How the war has changed the cyber underworld. Air raid alerts sound in nine Russian cities; Russia blames hacking. Our space correspondent Maria Varmazis speaks with Zhanna Malekos Smith at the Center for Strategic &amp; International Studies about a new security agreement between Japan and the US. Kathleen Smith of ClearedJobs.Net clears misperceptions about the cleared space. And Dole continues recovery from ransomware. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/37

Selected reading.
CISA Urges Increased Vigilance One Year After Russia's Invasion of Ukraine (Cybersecurity and Infrastructure Security Agency | CISA)
Ukraine says Russian hackers backdoored govt websites in 2021 (BleepingComputer)
Ukraine suffered more data-wiping malware than anywhere, ever (Ars Technica) 
The First Crypto War? Assessing the Illicit Blockchain Ecosystem One Year Into Russia's Invasion of Ukraine (TRM Insights)
Ransomware Gang Conti Has Re-Surfaced and Now Operates as Three Groups: TRM Labs (CoinDesk).
Ukraine suffered more data-wiping malware than anywhere, ever (Ars Technica) 
Russia-Ukraine War: 3 Cyber Threat Effects, 1 Year In (ReliaQuest) 
Russian cybercrime alliances upended by Ukraine invasion (Register) Study: Old pacts ditched the moment Moscow moved in
How the Russia-Ukraine war has changed cyberspace (The Hill) 
Authorities blame hackers after air raid sirens sound over radio in multiple Russian cities (Meduza)
Russia blames 'hackers' for fake missile strike alerts (Register)
Fruit giant Dole suffers ransomware attack impacting operations (BleepingComputer)
Food giant Dole hit by ransomware (Computing) 
CISA Releases Three Industrial Control Systems Advisories (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 24 Feb 2023 21:15:00 -0000</pubDate>
      <itunes:title>A look at the cyber aspects of Russia’s war, on the first anniversary of the invasion of Ukraine. And a few notes from elsewhere in cyberspace.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1767</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA advises increased vigilance on the first anniversary of Russia's war. CERT-UA reports current Russian cyberattacks were prepared in December 2021. How the war has changed the cyber underworld. Air raid alerts sound in nine Russian cities; Russia blames hacking. Our space correspondent Maria Varmazis speaks with Zhanna Malekos Smith at the Center for Strategic &amp; International Studies about a new security agreement between Japan and the US. Kathleen Smith of ClearedJobs.Net clears misperceptions about the cleared space. And Dole continues recovery from ransomware. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/37

Selected reading.
CISA Urges Increased Vigilance One Year After Russia's Invasion of Ukraine (Cybersecurity and Infrastructure Security Agency | CISA)
Ukraine says Russian hackers backdoored govt websites in 2021 (BleepingComputer)
Ukraine suffered more data-wiping malware than anywhere, ever (Ars Technica) 
The First Crypto War? Assessing the Illicit Blockchain Ecosystem One Year Into Russia's Invasion of Ukraine (TRM Insights)
Ransomware Gang Conti Has Re-Surfaced and Now Operates as Three Groups: TRM Labs (CoinDesk).
Ukraine suffered more data-wiping malware than anywhere, ever (Ars Technica) 
Russia-Ukraine War: 3 Cyber Threat Effects, 1 Year In (ReliaQuest) 
Russian cybercrime alliances upended by Ukraine invasion (Register) Study: Old pacts ditched the moment Moscow moved in
How the Russia-Ukraine war has changed cyberspace (The Hill) 
Authorities blame hackers after air raid sirens sound over radio in multiple Russian cities (Meduza)
Russia blames 'hackers' for fake missile strike alerts (Register)
Fruit giant Dole suffers ransomware attack impacting operations (BleepingComputer)
Food giant Dole hit by ransomware (Computing) 
CISA Releases Three Industrial Control Systems Advisories (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA advises increased vigilance on the first anniversary of Russia's war. CERT-UA reports current Russian cyberattacks were prepared in December 2021. How the war has changed the cyber underworld. Air raid alerts sound in nine Russian cities; Russia blames hacking. Our space correspondent Maria Varmazis speaks with Zhanna Malekos Smith at the Center for Strategic &amp; International Studies about a new security agreement between Japan and the US. Kathleen Smith of ClearedJobs.Net clears misperceptions about the cleared space. And Dole continues recovery from ransomware. </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/37</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/news-events/alerts/2023/02/23/cisa-urges-increased-vigilance-one-year-after-russias-invasion-ukraine">CISA Urges Increased Vigilance One Year After Russia's Invasion of Ukraine</a> (Cybersecurity and Infrastructure Security Agency | CISA)</p><p><a href="https://www.bleepingcomputer.com/news/security/ukraine-says-russian-hackers-backdoored-govt-websites-in-2021/">Ukraine says Russian hackers backdoored govt websites in 2021</a> (BleepingComputer)</p><p><a href="https://arstechnica.com/information-technology/2023/02/ukraine-suffered-more-data-wiping-malware-than-anywhere-ever/">Ukraine suffered more data-wiping malware than anywhere, ever</a> (Ars Technica) </p><p><a href="https://www.trmlabs.com/post/the-first-crypto-war-assessing-the-illicit-blockchain-ecosystem-one-year-into-russia-ukraine-war">The First Crypto War? Assessing the Illicit Blockchain Ecosystem One Year Into Russia's Invasion of Ukraine</a> (TRM Insights)</p><p><a href="https://www.coindesk.com/tech/2023/02/23/ransomware-group-conti-has-re-surfaced-under-a-new-name-trm-labs/">Ransomware Gang Conti Has Re-Surfaced and Now Operates as Three Groups: TRM Labs</a> (CoinDesk).</p><p><a href="https://arstechnica.com/information-technology/2023/02/ukraine-suffered-more-data-wiping-malware-than-anywhere-ever/">Ukraine suffered more data-wiping malware than anywhere, ever</a> (Ars Technica) </p><p><a href="https://www.reliaquest.com/blog/russia-ukraine-war-3-cyber-threat-effects-1-year-in/">Russia-Ukraine War: 3 Cyber Threat Effects, 1 Year In</a> (ReliaQuest) </p><p><a href="https://www.theregister.com/2023/02/24/russian_cybercrime_economy/">Russian cybercrime alliances upended by Ukraine invasion</a> (Register) Study: Old pacts ditched the moment Moscow moved in</p><p><a href="https://thehill.com/policy/cybersecurity/3870138-how-the-russia-ukraine-war-has-changed-cyberspace/">How the Russia-Ukraine war has changed cyberspace</a> (The Hill) </p><p><a href="https://meduza.io/en/news/2023/02/22/authorities-blame-hackers-after-air-raid-sirens-sound-over-radio-in-multiple-russian-cities">Authorities blame hackers after air raid sirens sound over radio in multiple Russian cities</a> (Meduza)</p><p><a href="https://www.theregister.com/2023/02/23/russia_fake_missile_alerts/">Russia blames 'hackers' for fake missile strike alerts</a> (Register)</p><p><a href="https://www.bleepingcomputer.com/news/security/fruit-giant-dole-suffers-ransomware-attack-impacting-operations/">Fruit giant Dole suffers ransomware attack impacting operations</a> (BleepingComputer)</p><p><a href="https://www.computing.co.uk/news/4076586/food-giant-dole-hit-ransomware">Food giant Dole hit by ransomware </a>(Computing) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2023/02/23/cisa-releases-three-industrial-control-systems-advisories">CISA Releases Three Industrial Control Systems Advisories</a> (CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1836</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2b4881b0-8167-11ed-9779-3f580b3cc54c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7274489719.mp3?updated=1690331139" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hybrid war and cyber espionage. Ransomware in the produce aisle. Bypassing security filters in a BEC campaign. Identity-based attacks. Avoid pirated software. And what the bots have been scalping. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1766/notes</link>
      <description>Cyberattacks in Russia's war so far, and their future prospects. The Lazarus Group may be employing a new backdoor. Clasiopa targets materials research organizations. Ransomware interferes with food production. Evernote is used in a BEC campaign to bypass security filters. Identity-based cyberattacks. Pirated versions of Final Cut Pro deliver cryptominers. Caleb Barlow has thoughts on Twitter, Mudge, and lessons learned. Marc Van Zadelhoff from Cyber CEOs Decoded podcast speaks with Amanda Renteria, CEO of Code for America, about attracting diverse talent. And what have the scalperbots been up to, lately.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/36

Selected reading.
A year into Ukraine, looking back at 5 prewar predictions (Breaking Defense)
Dutch intelligence: Many cyberattacks by Russia are not yet public knowledge (The Record from Recorded Future News)
WinorDLL64: A backdoor from the vast Lazarus arsenal? (WeLiveSecurity)
Clasiopa: New Group Targets Materials Research (Symantec)
Cyberattack on food giant Dole temporarily shuts down North America production, company memo says (CNN Business)
Business Email Compromise Scam Leads to Credential Harvesting Evernote Page (Avanan)
The 2023 State of Identity Security Report (Oort)
Beware of macOS cryptojacking malware. (Jamf Threat Labs) 
Quarterly Index: Top 5 Scalper Bot Targets of Q4 2022 (Netacea)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 23 Feb 2023 21:15:00 -0000</pubDate>
      <itunes:title>Hybrid war and cyber espionage. Ransomware in the produce aisle. Bypassing security filters in a BEC campaign. Identity-based attacks. Avoid pirated software. And what the bots have been scalping. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1766</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cyberattacks in Russia's war so far, and their future prospects. The Lazarus Group may be employing a new backdoor. Clasiopa targets materials research organizations. Ransomware interferes with food production. Evernote is used in a BEC campaign to bypass security filters. Identity-based cyberattacks. Pirated versions of Final Cut Pro deliver cryptominers. Caleb Barlow has thoughts on Twitter, Mudge, and lessons learned. Marc Van Zadelhoff from Cyber CEOs Decoded podcast speaks with Amanda Renteria, CEO of Code for America, about attracting diverse talent. And what have the scalperbots been up to, lately.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/36

Selected reading.
A year into Ukraine, looking back at 5 prewar predictions (Breaking Defense)
Dutch intelligence: Many cyberattacks by Russia are not yet public knowledge (The Record from Recorded Future News)
WinorDLL64: A backdoor from the vast Lazarus arsenal? (WeLiveSecurity)
Clasiopa: New Group Targets Materials Research (Symantec)
Cyberattack on food giant Dole temporarily shuts down North America production, company memo says (CNN Business)
Business Email Compromise Scam Leads to Credential Harvesting Evernote Page (Avanan)
The 2023 State of Identity Security Report (Oort)
Beware of macOS cryptojacking malware. (Jamf Threat Labs) 
Quarterly Index: Top 5 Scalper Bot Targets of Q4 2022 (Netacea)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyberattacks in Russia's war so far, and their future prospects. The Lazarus Group may be employing a new backdoor. Clasiopa targets materials research organizations. Ransomware interferes with food production. Evernote is used in a BEC campaign to bypass security filters. Identity-based cyberattacks. Pirated versions of Final Cut Pro deliver cryptominers. Caleb Barlow has thoughts on Twitter, Mudge, and lessons learned. Marc Van Zadelhoff from Cyber CEOs Decoded podcast speaks with Amanda Renteria, CEO of Code for America, about attracting diverse talent. And what have the scalperbots been up to, lately.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/36</p><p><br></p><h2>Selected reading.</h2><p><a href="https://breakingdefense.com/2023/02/a-year-into-ukraine-looking-back-at-5-prewar-predictions/">A year into Ukraine, looking back at 5 prewar predictions</a> (Breaking Defense)</p><p><a href="https://therecord.media/dutch-intelligence-russia-cyberattacks-many-not-yet-public-knowledge/">Dutch intelligence: Many cyberattacks by Russia are not yet public knowledge</a> (The Record from Recorded Future News)</p><p><a href="https://www.welivesecurity.com/2023/02/23/winordll64-backdoor-vast-lazarus-arsenal/">WinorDLL64: A backdoor from the vast Lazarus arsenal?</a> (WeLiveSecurity)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/clasiopa-materials-research">Clasiopa: New Group Targets Materials Research</a> (Symantec)</p><p><a href="https://www.cnn.com/2023/02/22/business/dole-cyberattack/index.html">Cyberattack on food giant Dole temporarily shuts down North America production, company memo says</a> (CNN Business)</p><p><a href="https://www.avanan.com/blog/business-email-compromise-scam-leads-to-credential-harvesting-evernote-page">Business Email Compromise Scam Leads to Credential Harvesting Evernote Page</a> (Avanan)</p><p><a href="https://oort.io/blog/introducing-the-2023-state-of-identity-security-report">The 2023 State of Identity Security Report</a> (Oort)</p><p><a href="https://www.jamf.com/blog/cryptojacking-macos-malware-discovered-by-jamf-threat-labs/">Beware of macOS cryptojacking malware.</a> (Jamf Threat Labs) </p><p><a href="https://netacea.com/research-and-reports/top-5-scalper-bot-targets-q4-2022/">Quarterly Index: Top 5 Scalper Bot Targets of Q4 2022</a> (Netacea)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1750</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2b2dbfec-8167-11ed-9779-db79003ea07e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9203981352.mp3?updated=1690331121" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Vulnerabilities newly exploited in the wild. A new cyberespionage campaign. Trends in the C2C marketplace. Hacktivists, other auxiliaries, and the laws of armed conflict. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1765/notes</link>
      <description>CISA adds three entries to its Known Exploited Vulnerabilities Catalog. "Hydrochasma" is a new cyberespionage threat actor. IBM claims the biggest effect of cyberattacks in 2022 was extortion. Social network hijacking in the C2C market. A credential theft campaign against data centers. LockBit claims an attack on a water utility in Portugal. Tim Starks from the Washington Post describes calls to focus on harmonizing cyber regulations. Our guest is Luke Vander Linden, host of the RH-ISAC Podcast. Disrupting Mr. Putin's speech, online, and what the hybrid war suggests about the future of cyber auxiliaries.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/35

Selected reading.
CISA Adds Three Known Exploited Vulnerabilities to Catalog (CISA)
Hydrochasma: Previously Unknown Group Targets Medical and Shipping Organizations in Asia (Symantec)
IBM Security X-Force Threat Intelligence Index 2023 (IBM)
S1deload Stealer – Exploring the Economics of Social Network Account Hijacking (Bitdefender Labs) 
Cyber Attacks on Data Center Organizations (Resecurity)
Hackers Scored Data Center Logins for Some of the World's Biggest Companies (Bloomberg)
LockBit gang takes credit for attack on water utility in Portugal (The Record from Recorded Future News) 
Ukraine Suffered More Data-Wiping Malware Last Year Than Anywhere, Ever (WIRED) 
Ukrainian hackers claim disruption of Russian TV websites during Putin speech (The Record from Recorded Future News) 
Ukraine's volunteer cyber army could be model for other nations: experts (Newsweek) 
Ukraine's largest charity wants to raise $1.3 million for ‘cyber offensive’ (The Record from Recorded Future News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 22 Feb 2023 21:15:00 -0000</pubDate>
      <itunes:title>Vulnerabilities newly exploited in the wild. A new cyberespionage campaign. Trends in the C2C marketplace. Hacktivists, other auxiliaries, and the laws of armed conflict. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1765</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA adds three entries to its Known Exploited Vulnerabilities Catalog. "Hydrochasma" is a new cyberespionage threat actor. IBM claims the biggest effect of cyberattacks in 2022 was extortion. Social network hijacking in the C2C market. A credential theft campaign against data centers. LockBit claims an attack on a water utility in Portugal. Tim Starks from the Washington Post describes calls to focus on harmonizing cyber regulations. Our guest is Luke Vander Linden, host of the RH-ISAC Podcast. Disrupting Mr. Putin's speech, online, and what the hybrid war suggests about the future of cyber auxiliaries.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/35

Selected reading.
CISA Adds Three Known Exploited Vulnerabilities to Catalog (CISA)
Hydrochasma: Previously Unknown Group Targets Medical and Shipping Organizations in Asia (Symantec)
IBM Security X-Force Threat Intelligence Index 2023 (IBM)
S1deload Stealer – Exploring the Economics of Social Network Account Hijacking (Bitdefender Labs) 
Cyber Attacks on Data Center Organizations (Resecurity)
Hackers Scored Data Center Logins for Some of the World's Biggest Companies (Bloomberg)
LockBit gang takes credit for attack on water utility in Portugal (The Record from Recorded Future News) 
Ukraine Suffered More Data-Wiping Malware Last Year Than Anywhere, Ever (WIRED) 
Ukrainian hackers claim disruption of Russian TV websites during Putin speech (The Record from Recorded Future News) 
Ukraine's volunteer cyber army could be model for other nations: experts (Newsweek) 
Ukraine's largest charity wants to raise $1.3 million for ‘cyber offensive’ (The Record from Recorded Future News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA adds three entries to its Known Exploited Vulnerabilities Catalog. "Hydrochasma" is a new cyberespionage threat actor. IBM claims the biggest effect of cyberattacks in 2022 was extortion. Social network hijacking in the C2C market. A credential theft campaign against data centers. LockBit claims an attack on a water utility in Portugal. Tim Starks from the Washington Post describes calls to focus on harmonizing cyber regulations. Our guest is Luke Vander Linden, host of the RH-ISAC Podcast. Disrupting Mr. Putin's speech, online, and what the hybrid war suggests about the future of cyber auxiliaries.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/35</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2023/02/21/cisa-adds-three-known-exploited-vulnerabilities-catalog">CISA Adds Three Known Exploited Vulnerabilities to Catalog</a> (CISA)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/hydrochasma-asia-medical-shipping-intelligence-gathering">Hydrochasma: Previously Unknown Group Targets Medical and Shipping Organizations in Asia</a> (Symantec)</p><p><a href="https://www.ibm.com/reports/threat-intelligence">IBM Security X-Force Threat Intelligence Index 2023</a> (IBM)</p><p><a href="https://www.bitdefender.com/blog/labs/s1deload-stealer-exploring-theeconomics-of-social-networkaccount-hijacking/">S1deload Stealer – Exploring the Economics of Social Network Account Hijacking</a> (Bitdefender Labs) </p><p><a href="https://www.resecurity.com/blog/article/cyber-attacks-on-data-center-organizations">Cyber Attacks on Data Center Organizations</a> (Resecurity)</p><p><a href="https://www.bloomberg.com/news/features/2023-02-21/hackers-scored-corporate-giants-logins-for-asian-data-centers">Hackers Scored Data Center Logins for Some of the World's Biggest Companies</a> (Bloomberg)</p><p><a href="https://therecord.media/porto-portugal-water-utility-cyberattack-lockbit/">LockBit gang takes credit for attack on water utility in Portugal</a> (The Record from Recorded Future News) </p><p><a href="https://www-wired-com.cdn.ampproject.org/c/s/www.wired.com/story/ukraine-russia-wiper-malware/amp">Ukraine Suffered More Data-Wiping Malware Last Year Than Anywhere, Ever</a> (WIRED) </p><p><a href="https://therecord.media/putin-speech-television-ddos-ukraine-it-army/">Ukrainian hackers claim disruption of Russian TV websites during Putin speech</a> (The Record from Recorded Future News) </p><p><a href="https://www.newsweek.com/ukraine-war-cyber-army-attack-strategy-warfare-1780970">Ukraine's volunteer cyber army could be model for other nations: experts</a> (Newsweek) </p><p><a href="https://therecord.media/ukraines-largest-charity-wants-to-raise-1-3-million-for-cyber-offensive/">Ukraine's largest charity wants to raise $1.3 million for ‘cyber offensive’</a> (The Record from Recorded Future News)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1725</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2aadb176-8167-11ed-9779-83a6d8cf777c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1399373982.mp3?updated=1690331105" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>GoDaddy's compromise. Twitter disables SMS authentication for all but blue-checked users. Deutsche DDoS. Is Bing channeling Tay?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1764/notes</link>
      <description>GoDaddy has discovered a compromise of its systems. Twitter disables SMS authentication for those not subscribed to Twitter Blue. Last week’s cyber incident impacting German airports was confirmed to be DDoS. The consequences of cyber irregular participation in cyber wars. Semiconductor tech giant Applied Materials sees significant financial losses from a cyberattack. Joe Carrigan on scammers dangling fake job offers to students. Our guests are Max Shuftan &amp; Monisha Bush from the SANS Institute, on the reopening of their HBCU Cyber Academy application window. And is Bing channeling Tay?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/34

Selected reading.
GoDaddy Inc. - Statement on recent website redirect issues (GoDaddy)
GoDaddy: Hackers stole source code, installed malware in multi-year breach (Bleeping Computer)
GoDaddy SEC Filing (SEC)
An update on two-factor authentication using SMS on Twitter(Twitter)
Twitter Limits SMS-Based 2-Factor Authentication to Blue Subscribers Only (The Hacker News)
SMS-Based 2FA Will Be Limited to Twitter Blue Users (HackRead)
Twitter will limit uses of SMS 2-factor authentication. What does this mean for users? (NPR)
Twitter's Two-Factor Authentication Change 'Doesn't Make Sense' (WIRED)
Twitter Shuts Off Text-Based 2FA for Non-Subscribers (SecurityWeek)
Official: Twitter will now charge for SMS two-factor authentication (The Verge)
German airport websites downed by DDoS attacks (Register)
German airports hit by DDoS attack, ‘Anonymous Russia’ claims responsibility (The Record from Recorded Future)
Russian phishing attacks flooded Ukraine, tripled against NATO nations in 2022: Report (Breaking Defense)
Civilian hackers could become military targets, Red Cross warns (The Record from Recorded Future News)
I helped create a 'cyber army' to help Ukraine defeat Russia. We can't fight with guns, but we can fight with our laptops. (Business Insider)
How Uncle Sam enlisted Big Tech to thwart Russia from launching catastrophic cyberwar (The Washington Times)
Big Tech Descends on Munich Conference in Support of Ukraine (Bloomberg)
Applied Materials will take a $250M hit to sales this quarter, thanks to a cyberattack at one of its suppliers (Silicon Valley Business Journal)
Semiconductor industry giant says ransomware attack on supplier will cost it $250 million (The Record by Recorded Future)
How should AI systems behave, and who should decide? (OpenAI)
Why Bing Is Being Creepy (Intelligencer)
Microsoft's new chatbot is a liar. And it says it's ready to call the cops. (Mother Jones)
After AI chatbot goes a bit loopy, Microsoft tightens its leash (Washington Post).
My Week of Being Gaslit and Lied to by the New Bin (Information)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Feb 2023 21:15:00 -0000</pubDate>
      <itunes:title>GoDaddy's compromise. Twitter disables SMS authentication for all but blue-checked users. Deutsche DDoS. Is Bing channeling Tay?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1764</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>GoDaddy has discovered a compromise of its systems. Twitter disables SMS authentication for those not subscribed to Twitter Blue. Last week’s cyber incident impacting German airports was confirmed to be DDoS. The consequences of cyber irregular participation in cyber wars. Semiconductor tech giant Applied Materials sees significant financial losses from a cyberattack. Joe Carrigan on scammers dangling fake job offers to students. Our guests are Max Shuftan &amp; Monisha Bush from the SANS Institute, on the reopening of their HBCU Cyber Academy application window. And is Bing channeling Tay?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/34

Selected reading.
GoDaddy Inc. - Statement on recent website redirect issues (GoDaddy)
GoDaddy: Hackers stole source code, installed malware in multi-year breach (Bleeping Computer)
GoDaddy SEC Filing (SEC)
An update on two-factor authentication using SMS on Twitter(Twitter)
Twitter Limits SMS-Based 2-Factor Authentication to Blue Subscribers Only (The Hacker News)
SMS-Based 2FA Will Be Limited to Twitter Blue Users (HackRead)
Twitter will limit uses of SMS 2-factor authentication. What does this mean for users? (NPR)
Twitter's Two-Factor Authentication Change 'Doesn't Make Sense' (WIRED)
Twitter Shuts Off Text-Based 2FA for Non-Subscribers (SecurityWeek)
Official: Twitter will now charge for SMS two-factor authentication (The Verge)
German airport websites downed by DDoS attacks (Register)
German airports hit by DDoS attack, ‘Anonymous Russia’ claims responsibility (The Record from Recorded Future)
Russian phishing attacks flooded Ukraine, tripled against NATO nations in 2022: Report (Breaking Defense)
Civilian hackers could become military targets, Red Cross warns (The Record from Recorded Future News)
I helped create a 'cyber army' to help Ukraine defeat Russia. We can't fight with guns, but we can fight with our laptops. (Business Insider)
How Uncle Sam enlisted Big Tech to thwart Russia from launching catastrophic cyberwar (The Washington Times)
Big Tech Descends on Munich Conference in Support of Ukraine (Bloomberg)
Applied Materials will take a $250M hit to sales this quarter, thanks to a cyberattack at one of its suppliers (Silicon Valley Business Journal)
Semiconductor industry giant says ransomware attack on supplier will cost it $250 million (The Record by Recorded Future)
How should AI systems behave, and who should decide? (OpenAI)
Why Bing Is Being Creepy (Intelligencer)
Microsoft's new chatbot is a liar. And it says it's ready to call the cops. (Mother Jones)
After AI chatbot goes a bit loopy, Microsoft tightens its leash (Washington Post).
My Week of Being Gaslit and Lied to by the New Bin (Information)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>GoDaddy has discovered a compromise of its systems. Twitter disables SMS authentication for those not subscribed to Twitter Blue. Last week’s cyber incident impacting German airports was confirmed to be DDoS. The consequences of cyber irregular participation in cyber wars. Semiconductor tech giant Applied Materials sees significant financial losses from a cyberattack. Joe Carrigan on scammers dangling fake job offers to students. Our guests are Max Shuftan &amp; Monisha Bush from the SANS Institute, on the reopening of their HBCU Cyber Academy application window. And is Bing channeling Tay?</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/34</p><p><br></p><h2>Selected reading.</h2><p><a href="https://aboutus.godaddy.net/newsroom/company-news/news-details/2023/Statement-on-recent-website-redirect-issues/default.aspx">GoDaddy Inc. - Statement on recent website redirect issues</a> (GoDaddy)</p><p><a href="https://www.bleepingcomputer.com/news/security/godaddy-hackers-stole-source-code-installed-malware-in-multi-year-breach/">GoDaddy: Hackers stole source code, installed malware in multi-year breach</a> (Bleeping Computer)</p><p><a href="https://d18rn0p25nwr6d.cloudfront.net/CIK-0001609711/e4736ddb-b4c7-485b-a8fc-1827691692c9.pdf">GoDaddy SEC Filing</a> (SEC)</p><p><a href="https://blog.twitter.com/en_us/topics/product/2023/an-update-on-two-factor-authentication-using-sms-on-twitter">An update on two-factor authentication using SMS on Twitter</a>(Twitter)</p><p><a href="https://thehackernews.com/2023/02/twitter-limits-sms-based-2-factor.html">Twitter Limits SMS-Based 2-Factor Authentication to Blue Subscribers Only</a> (The Hacker News)</p><p><a href="https://www.hackread.com/sms-based-2fa-twitter-blue/">SMS-Based 2FA Will Be Limited to Twitter Blue Users</a> (HackRead)</p><p><a href="https://www.npr.org/2023/02/18/1158134620/twitter-blue-two-factor-authentication-2fa">Twitter will limit uses of SMS 2-factor authentication. What does this mean for users?</a> (NPR)</p><p><a href="https://www.wired.com/story/twitter-sms-2fa-twitter-blue/">Twitter's Two-Factor Authentication Change 'Doesn't Make Sense'</a> (WIRED)</p><p><a href="https://www.securityweek.com/twitter-shuts-off-text-based-2fa-for-non-subscribers/">Twitter Shuts Off Text-Based 2FA for Non-Subscribers</a> (SecurityWeek)</p><p><a href="https://www.theverge.com/2023/2/17/23605073/twitter-blue-charge-sms-2fa">Official: Twitter will now charge for SMS two-factor authentication</a> (The Verge)</p><p><a href="https://www.theregister.com/2023/02/17/german_airport_websites_ddos/">German airport websites downed by DDoS attacks</a> (Register)</p><p><a href="https://therecord.media/german-airports-hit-by-ddos-attack-anonymous-russia-claims-responsibility/">German airports hit by DDoS attack, ‘Anonymous Russia’ claims responsibility</a> (The Record from Recorded Future)</p><p><a href="https://breakingdefense.com/2023/02/russian-phishing-attacks-flooded-ukraine-tripled-against-nato-nations-in-2022-report/">Russian phishing attacks flooded Ukraine, tripled against NATO nations in 2022: Report</a> (Breaking Defense)</p><p><a href="https://therecord.media/civilian-hackers-could-become-military-targets-red-cross-warns/">Civilian hackers could become military targets, Red Cross warns</a> (The Record from Recorded Future News)</p><p><a href="https://www.businessinsider.com/i-created-ukraine-cyber-army-to-fight-off-russian-attacks-2023-2">I helped create a 'cyber army' to help Ukraine defeat Russia. We can't fight with guns, but we can fight with our laptops.</a> (Business Insider)</p><p><a href="https://m.washingtontimes.com/news/2023/feb/19/how-uncle-sam-enlisted-big-tech-thwart-russia-laun/">How Uncle Sam enlisted Big Tech to thwart Russia from launching catastrophic cyberwar</a> (The Washington Times)</p><p><a href="https://www.bloomberg.com/news/articles/2023-02-19/big-tech-descends-on-munich-conference-in-support-of-ukraine">Big Tech Descends on Munich Conference in Support of Ukraine</a> (Bloomberg)</p><p><a href="https://www.bizjournals.com/sanjose/news/2023/02/17/applied-materials-to-see-250m-revenue-hit.html">Applied Materials will take a $250M hit to sales this quarter, thanks to a cyberattack at one of its suppliers</a> (Silicon Valley Business Journal)</p><p><a href="https://therecord.media/applied-materials-supply-chain-mks-ransomware-attack/">Semiconductor industry giant says ransomware attack on supplier will cost it $250 million</a> (The Record by Recorded Future)</p><p><a href="https://openai.com/blog/how-should-ai-systems-behave/">How should AI systems behave, and who should decide?</a> (OpenAI)</p><p><a href="https://nymag.com/intelligencer/2023/02/why-bing-is-being-creepy.html">Why Bing Is Being Creepy</a> (Intelligencer)</p><p><a href="https://www.motherjones.com/politics/2023/02/bing-ai-chatbot-falsehoods-fact-checking-microsoft/">Microsoft's new chatbot is a liar. And it says it's ready to call the cops</a>. (Mother Jones)</p><p><a href="https://www.washingtonpost.com/technology/2023/02/18/microsoft-bing-chatbot/">After AI chatbot goes a bit loopy, Microsoft tightens its leash</a> (Washington Post).</p><p><a href="https://www.theinformation.com/articles/my-week-of-being-gaslit-and-lied-to-by-the-new-bing">My Week of Being Gaslit and Lied to by the New Bin</a> (Information)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1682</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2a9426b6-8167-11ed-9779-37c42927afbf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7526176119.mp3?updated=1690331093" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Modernizing the U.S. Navy's cybersecurity posture. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/49/notes</link>
      <description>Dave Bittner had a conversation with Commander Brandon Campbell of US Navy Cyber Defense Operations Command and Captain Steve Correia, Commanding Officer of Naval Network Warfare Command. They discussed the Navy’s cybersecurity advances and how they have implemented them.
Commander Brandon Campbell is the former Operations Director at Navy Cyber Defense Operations Command and Task Force 1020 where they protect, detect, and respond to global cyber threats against Navy networks.
Captain J. Steve Correia is the Commanding Officer of Naval Network Warfare Command and the Commander of Task Force 1010 under the U.S. Navy’s Fleet Cyber Command where they execute tactical-level command and control to direct, operate, maintain and secure Navy communication and network systems.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 20 Feb 2023 08:00:00 -0000</pubDate>
      <itunes:title>Modernizing the U.S. Navy's cybersecurity posture. [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>48</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dave Bittner had a conversation with Commander Brandon Campbell of US Navy Cyber Defense Operations Command and Captain Steve Correia, Commanding Officer of Naval Network Warfare Command. They discussed the Navy’s cybersecurity advances and how they have implemented them.
Commander Brandon Campbell is the former Operations Director at Navy Cyber Defense Operations Command and Task Force 1020 where they protect, detect, and respond to global cyber threats against Navy networks.
Captain J. Steve Correia is the Commanding Officer of Naval Network Warfare Command and the Commander of Task Force 1010 under the U.S. Navy’s Fleet Cyber Command where they execute tactical-level command and control to direct, operate, maintain and secure Navy communication and network systems.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave Bittner had a conversation with <a href="https://www.linkedin.com/in/brandoncampbell2005/">Commander Brandon Campbell</a> of US Navy Cyber Defense Operations Command and <a href="https://www.linkedin.com/in/j-steve-correia-a207b870/">Captain Steve Correia</a>, Commanding Officer of Naval Network Warfare Command. They discussed the Navy’s cybersecurity advances and how they have implemented them.</p><p>Commander Brandon Campbell is the former Operations Director at <a href="https://www.navifor.usff.navy.mil/ncdoc/">Navy Cyber Defense Operations Command</a> and Task Force 1020 where they protect, detect, and respond to global cyber threats against Navy networks.</p><p>Captain J. Steve Correia is the Commanding Officer of <a href="https://www.navifor.usff.navy.mil/navnetwarcom/">Naval Network Warfare Command</a> and the Commander of Task Force 1010 under the U.S. Navy’s Fleet Cyber Command where they execute tactical-level command and control to direct, operate, maintain and secure Navy communication and network systems.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1270</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[863a55b6-aefe-11ed-a5cf-3b71b969fc5c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6736290229.mp3?updated=1676659631" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rachel Tobac: Find a way to laugh. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/137/notes</link>
      <description>Rachel Tobac, CEO from SocialProof Security sits down to share her amazing story on becoming what's known in the industry as an ethical hacker and CEO of a company. Rachel shares how she was always fascinated with spy movies and as she grew older that fascination turned into a real desire. Finding out she liked learning how the human brain works, she decided to start off in neuroscience. Wanting a change and with the help of her husband she was able to start getting more into hacking, finding she loved the fact that she was pretending to be someone to hack into a company and finding the weak spots. She shares how as a leader now she likes to be authentic with her team. She says "I think in the security world sometimes we take ourselves pretty seriously and a lot of times it's because we're dealing with really serious topics, and so in the moment we have to be extremely serious, but when you get a five minute break in between your crisis meetings, find a way to laugh if you can." We thank Rachel for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 19 Feb 2023 08:00:00 -0000</pubDate>
      <itunes:title>Rachel Tobac: Find a way to laugh. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>137</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Rachel Tobac, CEO from SocialProof Security sits down to share her amazing story on becoming what's known in the industry as an ethical hacker and CEO of a company. Rachel shares how she was always fascinated with spy movies and as she grew older that fascination turned into a real desire. Finding out she liked learning how the human brain works, she decided to start off in neuroscience. Wanting a change and with the help of her husband she was able to start getting more into hacking, finding she loved the fact that she was pretending to be someone to hack into a company and finding the weak spots. She shares how as a leader now she likes to be authentic with her team. She says "I think in the security world sometimes we take ourselves pretty seriously and a lot of times it's because we're dealing with really serious topics, and so in the moment we have to be extremely serious, but when you get a five minute break in between your crisis meetings, find a way to laugh if you can." We thank Rachel for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rachel Tobac, CEO from SocialProof Security sits down to share her amazing story on becoming what's known in the industry as an ethical hacker and CEO of a company. Rachel shares how she was always fascinated with spy movies and as she grew older that fascination turned into a real desire. Finding out she liked learning how the human brain works, she decided to start off in neuroscience. Wanting a change and with the help of her husband she was able to start getting more into hacking, finding she loved the fact that she was pretending to be someone to hack into a company and finding the weak spots. She shares how as a leader now she likes to be authentic with her team. She says "I think in the security world sometimes we take ourselves pretty seriously and a lot of times it's because we're dealing with really serious topics, and so in the moment we have to be extremely serious, but when you get a five minute break in between your crisis meetings, find a way to laugh if you can." We thank Rachel for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>452</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d9a9f23a-aef7-11ed-80c1-fb4cb7e693de]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5544992298.mp3?updated=1676661461" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Implementing and achieving security resilience. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/269/notes</link>
      <description>Wendy Nather from Cisco sits down with Dave to discuss their work on "Cracking the Code to Security Resilience: Lessons from the Latest Cisco Security Outcomes Report." The report describes what security resilience is, while also going over how companies can achieve this resilience.
Wendy talks through some of the key findings based off of the report, and after surveying 4,751 active information security and privacy professionals from 26 countries, we find out some of the top priorities to achieving security resilience. From there the research goes on to explain from the findings which data-backed practices lead to the outcomes that can be implemented in cybersecurity strategies.
The research can be found here:

Cracking the Code to Security Resilience: Lessons from the Latest Cisco Security Outcomes Report

Achieving Security Resilience


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Feb 2023 08:00:00 -0000</pubDate>
      <itunes:title>Implementing and achieving security resilience. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>269</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Wendy Nather from Cisco sits down with Dave to discuss their work on "Cracking the Code to Security Resilience: Lessons from the Latest Cisco Security Outcomes Report." The report describes what security resilience is, while also going over how companies can achieve this resilience.
Wendy talks through some of the key findings based off of the report, and after surveying 4,751 active information security and privacy professionals from 26 countries, we find out some of the top priorities to achieving security resilience. From there the research goes on to explain from the findings which data-backed practices lead to the outcomes that can be implemented in cybersecurity strategies.
The research can be found here:

Cracking the Code to Security Resilience: Lessons from the Latest Cisco Security Outcomes Report

Achieving Security Resilience


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Wendy Nather from Cisco sits down with Dave to discuss their work on "Cracking the Code to Security Resilience: Lessons from the Latest Cisco Security Outcomes Report." The report describes what security resilience is, while also going over how companies can achieve this resilience.</p><p>Wendy talks through some of the key findings based off of the report, and after surveying 4,751 active information security and privacy professionals from 26 countries, we find out some of the top priorities to achieving security resilience. From there the research goes on to explain from the findings which data-backed practices lead to the outcomes that can be implemented in cybersecurity strategies.</p><p>The research can be found here:</p><ul>
<li><a href="https://blogs.cisco.com/security/cracking-the-code-to-security-resilience-lessons-from-the-latest-cisco-security-outcomes-report">Cracking the Code to Security Resilience: Lessons from the Latest Cisco Security Outcomes Report</a></li>
<li><a href="https://www.cisco.com/c/dam/en/us/products/collateral/security/security-outcomes-vol-3-report.pdf">Achieving Security Resilience</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1214</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1a77d7ec-aede-11ed-9b0c-0f113ef7e36f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8490715357.mp3?updated=1685127473" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FBI Investigates a network incident. Developments in cybercrime. DDoS against German airports. US forms a Disruptive Technology Strike Force. CISA releases 15 ICS advisories. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1763/notes</link>
      <description>The FBI is investigating incidents on its networks. Frebniis backdoors Microsoft servers. ProxyShell vulnerabilities are used to install a cryptominer. Havoc's post-exploitation framework. Atlassian discloses a data breach. German airports sustain a cyber incident. An Aspen Institute report concludes that cyber assistance benefits Ukraine. US announces "Disruptive Technology Strike Force." Robert M. Lee from Dragos on the value of capture the flag events. Our guests are Commander Brandon Campbell of US Navy Cyber Defense Operations Command and Captain Steve Correia, Commanding Officer of Naval Network Warfare Command. And CISA releases fifteen ICS advisories.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/33

Selected reading.
Exclusive: FBI says it has 'contained' cyber incident on bureau's computer network (CNN)
Frebniis: New Malware Abuses Microsoft IIS Feature to Establish Backdoor (Symantec, by Broadcom Software)
ProxyShellMiner Campaign Creating Dangerous Backdoors (Morphisec) 
Attacks with novel Havoc post-exploitation framework identified (SC Media)
Atlassian says recent data leak stems from third-party vendor hack (BleepingComputer) 
German airport websites down in possible hacker attack (Deutsche Welle) 
The Cyber Defense Assistance Imperative – Lessons from Ukraine (Aspen Institute)
U.S. launches 'disruptive technology' strike force to target national security threats (Reuters)
Justice Department to Increase Scrutiny of Technology Exports, Investments (Wall Street Journal)
ICS-CERT Advisories (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 17 Feb 2023 21:15:00 -0000</pubDate>
      <itunes:title>FBI Investigates a network incident. Developments in cybercrime. DDoS against German airports. US forms a Disruptive Technology Strike Force. CISA releases 15 ICS advisories. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1763</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The FBI is investigating incidents on its networks. Frebniis backdoors Microsoft servers. ProxyShell vulnerabilities are used to install a cryptominer. Havoc's post-exploitation framework. Atlassian discloses a data breach. German airports sustain a cyber incident. An Aspen Institute report concludes that cyber assistance benefits Ukraine. US announces "Disruptive Technology Strike Force." Robert M. Lee from Dragos on the value of capture the flag events. Our guests are Commander Brandon Campbell of US Navy Cyber Defense Operations Command and Captain Steve Correia, Commanding Officer of Naval Network Warfare Command. And CISA releases fifteen ICS advisories.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/33

Selected reading.
Exclusive: FBI says it has 'contained' cyber incident on bureau's computer network (CNN)
Frebniis: New Malware Abuses Microsoft IIS Feature to Establish Backdoor (Symantec, by Broadcom Software)
ProxyShellMiner Campaign Creating Dangerous Backdoors (Morphisec) 
Attacks with novel Havoc post-exploitation framework identified (SC Media)
Atlassian says recent data leak stems from third-party vendor hack (BleepingComputer) 
German airport websites down in possible hacker attack (Deutsche Welle) 
The Cyber Defense Assistance Imperative – Lessons from Ukraine (Aspen Institute)
U.S. launches 'disruptive technology' strike force to target national security threats (Reuters)
Justice Department to Increase Scrutiny of Technology Exports, Investments (Wall Street Journal)
ICS-CERT Advisories (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FBI is investigating incidents on its networks. Frebniis backdoors Microsoft servers. ProxyShell vulnerabilities are used to install a cryptominer. Havoc's post-exploitation framework. Atlassian discloses a data breach. German airports sustain a cyber incident. An Aspen Institute report concludes that cyber assistance benefits Ukraine. US announces "Disruptive Technology Strike Force." Robert M. Lee from Dragos on the value of capture the flag events. Our guests are Commander Brandon Campbell of US Navy Cyber Defense Operations Command and Captain Steve Correia, Commanding Officer of Naval Network Warfare Command. And CISA releases fifteen ICS advisories.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/33</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cnn.com/2023/02/17/politics/fbi-cyber-incident-computer-network/index.html">Exclusive: FBI says it has 'contained' cyber incident on bureau's computer network</a> (CNN)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/frebniis-malware-iis">Frebniis: New Malware Abuses Microsoft IIS Feature to Establish Backdoor</a> (Symantec, by Broadcom Software)</p><p><a href="https://blog.morphisec.com/proxyshellminer-campaign">ProxyShellMiner Campaign Creating Dangerous Backdoors</a> (Morphisec) </p><p><a href="https://www.scmagazine.com/brief/malware/attacks-with-novel-havoc-post-exploitation-framework-identified">Attacks with novel Havoc post-exploitation framework identified</a> (SC Media)</p><p><a href="https://www.bleepingcomputer.com/news/security/atlassian-says-recent-data-leak-stems-from-third-party-vendor-hack/">Atlassian says recent data leak stems from third-party vendor hack</a> (BleepingComputer) </p><p><a href="https://www.dw.com/en/german-airport-websites-down-in-possible-hacker-attack/a-64724769">German airport websites down in possible hacker attack</a> (Deutsche Welle) </p><p><a href="https://www.aspeninstitute.org/publications/the-cyber-defense-assistance-imperative-lessons-from-ukraine/">The Cyber Defense Assistance Imperative – Lessons from Ukraine</a> (Aspen Institute)</p><p><a href="https://www.reuters.com/world/us/us-launches-disruptive-technology-strike-force-target-national-security-threats-2023-02-16/">U.S. launches 'disruptive technology' strike force to target national security threats</a> (Reuters)</p><p><a href="https://www.wsj.com/articles/justice-department-to-increase-scrutiny-of-technology-exports-investments-219f6cba">Justice Department to Increase Scrutiny of Technology Exports, Investments</a> (Wall Street Journal)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories">ICS-CERT Advisories</a> (CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1907</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2b626008-8167-11ed-9779-87cdc0b0f2d4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5425092824.mp3?updated=1690331074" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>APT37 has some new tricks. Multilingual BEC attacks. A look at the cyber phases of Russia’s war, and how being a crime victim may now be another way of serving the state. Influencers behaving badly.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1762/notes</link>
      <description>North Korea's APT37 is distributing M2RAT. Multilingual BEC attacks, and how they happen. Assessing the cyber phase of Russia's war as the first anniversary of the invasion approaches. Killnet's attempt to rally hacktivists and criminals to the cause of Russia. Dinah Davis from Arctic Wolf describes continuous network scanning. Our guest is Dr. Inka Karppinen of CybSafe with a look at cyber security through the lens of a behavioral psychologist. And Grand Theft Auto is now also a TikTok challenge. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/32

Selected reading.
RedEyes hackers use new malware to steal data from Windows, phones (BleepingComputer) 
Multilingual Executive Impersonation Attacks (Abnormal Intelligence) 
Fog of War: How the Ukraine Conflict Transformed the Cyber Threat Landscape (Google Threat Analysis Group)
Following the Money: Killnet’s ‘Infinity Forum’ Wooing Likeminded Cybercriminals (Flashpoint) 
Hyundai, Kia patch bug allowing car thefts with a USB cable (BleepingComputer) 
Hyundai and Kia Launch Service Campaign to Prevent Theft of Millions of Vehicles Targeted by Social Media Challenge (NHTSA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 16 Feb 2023 21:15:00 -0000</pubDate>
      <itunes:title>APT37 has some new tricks. Multilingual BEC attacks. A look at the cyber phases of Russia’s war, and how being a crime victim may now be another way of serving the state. Influencers behaving badly.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1762</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>North Korea's APT37 is distributing M2RAT. Multilingual BEC attacks, and how they happen. Assessing the cyber phase of Russia's war as the first anniversary of the invasion approaches. Killnet's attempt to rally hacktivists and criminals to the cause of Russia. Dinah Davis from Arctic Wolf describes continuous network scanning. Our guest is Dr. Inka Karppinen of CybSafe with a look at cyber security through the lens of a behavioral psychologist. And Grand Theft Auto is now also a TikTok challenge. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/32

Selected reading.
RedEyes hackers use new malware to steal data from Windows, phones (BleepingComputer) 
Multilingual Executive Impersonation Attacks (Abnormal Intelligence) 
Fog of War: How the Ukraine Conflict Transformed the Cyber Threat Landscape (Google Threat Analysis Group)
Following the Money: Killnet’s ‘Infinity Forum’ Wooing Likeminded Cybercriminals (Flashpoint) 
Hyundai, Kia patch bug allowing car thefts with a USB cable (BleepingComputer) 
Hyundai and Kia Launch Service Campaign to Prevent Theft of Millions of Vehicles Targeted by Social Media Challenge (NHTSA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>North Korea's APT37 is distributing M2RAT. Multilingual BEC attacks, and how they happen. Assessing the cyber phase of Russia's war as the first anniversary of the invasion approaches. Killnet's attempt to rally hacktivists and criminals to the cause of Russia. Dinah Davis from Arctic Wolf describes continuous network scanning. Our guest is Dr. Inka Karppinen of CybSafe with a look at cyber security through the lens of a behavioral psychologist. And Grand Theft Auto is now also a TikTok challenge. </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/32</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/security/redeyes-hackers-use-new-malware-to-steal-data-from-windows-phones/">RedEyes hackers use new malware to steal data from Windows, phones</a> (BleepingComputer) </p><p><a href="https://intelligence.abnormalsecurity.com/blog/midnight-hedgehog-mandarin-capybara-multilingual-executive-impersonation">Multilingual Executive Impersonation Attacks</a> (Abnormal Intelligence) </p><p><a href="https://blog.google/threat-analysis-group/fog-of-war-how-the-ukraine-conflict-transformed-the-cyber-threat-landscape/">Fog of War: How the Ukraine Conflict Transformed the Cyber Threat Landscape</a> (Google Threat Analysis Group)</p><p><a href="https://flashpoint.io/blog/killnets-infinity-forum-cybercriminals/">Following the Money: Killnet’s ‘Infinity Forum’ Wooing Likeminded Cybercriminals</a> (Flashpoint) </p><p><a href="https://www.bleepingcomputer.com/news/security/hyundai-kia-patch-bug-allowing-car-thefts-with-a-usb-cable/">Hyundai, Kia patch bug allowing car thefts with a USB cable</a> (BleepingComputer) </p><p><a href="https://www.nhtsa.gov/press-releases/hyundai-kia-campaign-prevent-vehicle-theft">Hyundai and Kia Launch Service Campaign to Prevent Theft of Millions of Vehicles Targeted by Social Media Challenge</a> (NHTSA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1524</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2b13308c-8167-11ed-9779-fbb7c77cb369]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4631286707.mp3?updated=1690331039" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A look at the SideWinder APT. GoAnywhere vulnerability exploited in the wild. Ransomware rampant. Hacktivism in Russia’s hybrid war. Patch Tuesday notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1761/notes</link>
      <description>SideWinder is an APT with possible origins in India. MortalKombat ransomware debuts. The GoAnywhere zero day was exploited in a data breach. Belarusian Cyber-Partisans release Russian data. Betsy Carmelite from Booz Allen Hamilton shares an overview of cyber deception. Our guest is Ashley Allocca from Flashpoint with a look at the Breaches and Malware Threat Landscape. And notes on Patch Tuesday.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/31

Selected reading.
Molted skin: APT SideWinder 2021 campaign that targeted over 60 companies in the Asia-Pacific (Group-IB)
New MortalKombat ransomware and Laplas Clipper malware threats deployed in financially motivated campaign (Cisco Talos Blog)
Tonga is the latest Pacific Island nation hit with ransomware (The Record from Recorded Future News) 
LockBit demanded £66mn from Royal Mail (Computing) 
City of Oakland declares state of emergency after ransomware attack (BleepingComputer) 
City of Oakland Targeted by Ransomware Attack, Work Continues to Secure and Restore Services Safely (City of Oakland)
Huge data dump from Russia’s censorship agency posted online (Cybersecurity Connect)
Russian system to scan internet for undesired content and dissent (Reuters)
Patch Tuesday: Three zero-days and nine 'Critical' RCE flaws fixed (Computing) 
Microsoft February 2023 Patch Tuesday fixes 3 exploited zero-days, 77 flaws (BleepingComputer)
Apple Releases Security Updates for Multiple Products (CISA) 
SAP Security Patch Day for February 2023 (Onapsis) 
Citrix Releases Security Updates for Workspace Apps, Virtual Apps and Desktops (CISA)
Adobe Releases Security Updates for Multiple Products (CISA)
The first national cyber director's last day is today (Washington Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 15 Feb 2023 21:30:00 -0000</pubDate>
      <itunes:title>A look at the SideWinder APT. GoAnywhere vulnerability exploited in the wild. Ransomware rampant. Hacktivism in Russia’s hybrid war. Patch Tuesday notes.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1761</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>SideWinder is an APT with possible origins in India. MortalKombat ransomware debuts. The GoAnywhere zero day was exploited in a data breach. Belarusian Cyber-Partisans release Russian data. Betsy Carmelite from Booz Allen Hamilton shares an overview of cyber deception. Our guest is Ashley Allocca from Flashpoint with a look at the Breaches and Malware Threat Landscape. And notes on Patch Tuesday.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/31

Selected reading.
Molted skin: APT SideWinder 2021 campaign that targeted over 60 companies in the Asia-Pacific (Group-IB)
New MortalKombat ransomware and Laplas Clipper malware threats deployed in financially motivated campaign (Cisco Talos Blog)
Tonga is the latest Pacific Island nation hit with ransomware (The Record from Recorded Future News) 
LockBit demanded £66mn from Royal Mail (Computing) 
City of Oakland declares state of emergency after ransomware attack (BleepingComputer) 
City of Oakland Targeted by Ransomware Attack, Work Continues to Secure and Restore Services Safely (City of Oakland)
Huge data dump from Russia’s censorship agency posted online (Cybersecurity Connect)
Russian system to scan internet for undesired content and dissent (Reuters)
Patch Tuesday: Three zero-days and nine 'Critical' RCE flaws fixed (Computing) 
Microsoft February 2023 Patch Tuesday fixes 3 exploited zero-days, 77 flaws (BleepingComputer)
Apple Releases Security Updates for Multiple Products (CISA) 
SAP Security Patch Day for February 2023 (Onapsis) 
Citrix Releases Security Updates for Workspace Apps, Virtual Apps and Desktops (CISA)
Adobe Releases Security Updates for Multiple Products (CISA)
The first national cyber director's last day is today (Washington Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>SideWinder is an APT with possible origins in India. MortalKombat ransomware debuts. The GoAnywhere zero day was exploited in a data breach. Belarusian Cyber-Partisans release Russian data. Betsy Carmelite from Booz Allen Hamilton shares an overview of cyber deception. Our guest is Ashley Allocca from Flashpoint with a look at the Breaches and Malware Threat Landscape. And notes on Patch Tuesday.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/31</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.group-ib.com/media-center/press-releases/sidewinder-apt-report/">Molted skin: APT SideWinder 2021 campaign that targeted over 60 companies in the Asia-Pacific</a> (Group-IB)</p><p><a href="https://blog.talosintelligence.com/new-mortalkombat-ransomware-and-laplas-clipper-malware-threats/">New MortalKombat ransomware and Laplas Clipper malware threats deployed in financially motivated campaign</a> (Cisco Talos Blog)</p><p><a href="https://therecord.media/tonga-is-the-latest-pacific-island-nation-hit-with-ransomware/">Tonga is the latest Pacific Island nation hit with ransomware</a> (The Record from Recorded Future News) </p><p><a href="https://www.computing.co.uk/news/4074495/lockbit-demanded-gbp66mn-royal-mail">LockBit demanded £66mn from Royal Mail </a>(Computing) </p><p><a href="https://www.bleepingcomputer.com/news/security/city-of-oakland-declares-state-of-emergency-after-ransomware-attack/">City of Oakland declares state of emergency after ransomware attack</a> (BleepingComputer) </p><p><a href="https://www.oaklandca.gov/news/2023/city-of-oakland-targeted-by-ransomware-attack-core-services-not-affected">City of Oakland Targeted by Ransomware Attack, Work Continues to Secure and Restore Services Safely</a> (City of Oakland)</p><p><a href="https://www.cybersecurityconnect.com.au/policy/8703-huge-data-dump-from-russia-s-censorship-agency-posted-online">Huge data dump from Russia’s censorship agency posted online</a> (Cybersecurity Connect)</p><p><a href="https://www.reuters.com/world/europe/russian-system-scan-internet-undesired-content-dissent-2023-02-13/">Russian system to scan internet for undesired content and dissent</a> (Reuters)</p><p><a href="https://www.computing.co.uk/news/4074504/patch-tuesday-zero-days-critical-rce-flaws-fixed">Patch Tuesday: Three zero-days and nine 'Critical' RCE flaws fixed </a>(Computing) </p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-february-2023-patch-tuesday-fixes-3-exploited-zero-days-77-flaws/">Microsoft February 2023 Patch Tuesday fixes 3 exploited zero-days, 77 flaws</a> (BleepingComputer)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2023/02/14/apple-releases-security-updates-multiple-products">Apple Releases Security Updates for Multiple Products</a> (CISA) </p><p><a href="https://onapsis.com/blog/sap-patch-day-february-2023">SAP Security Patch Day for February 2023</a> (Onapsis) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2023/02/14/citrix-releases-security-updates-workspace-apps-virtual-apps-and">Citrix Releases Security Updates for Workspace Apps, Virtual Apps and Desktops</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2023/02/14/adobe-releases-security-updates-multiple-products">Adobe Releases Security Updates for Multiple Products</a> (CISA)</p><p><a href="https://www.washingtonpost.com/politics/2023/02/15/first-national-cyber-director-last-day-is-today/">The first national cyber director's last day is today</a> (Washington Post)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1729</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2ac72d18-8167-11ed-9779-d7cf6e226bca]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5792663975.mp3?updated=1690331014" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Blender is back, but now DBA Sinbad (still working for the Lazarus Group). Cyberespionage notes. Hacktivism. ICS threats. Valentine’s Day scams.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1760/notes</link>
      <description>"Blender" reappears as "Sinbad." A Tonto Team cyberespionage attempt against Group-IB is thwarted. DarkBit claims responsibility for a ransomware attack on Technion University. An overview of ICS and OT security. Ben Yelin looks at surveillance oversight at the state level. Ann Johnson from Afternoon Cyber Tea speaks with Marene Allison about the CISO transformation. And it’s Valentine's Day, that annual holiday of love, chocolate, flowers, and online scams.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/30

Selected reading.
Has a Sanctioned Bitcoin Mixer Been Resurrected to Aid North Korea’s Lazarus Group? (Elliptic Connect)
Nice Try Tonto Team (Group-IB)
Hackers attack Israel’s Technion University, demand over $1.7 million in ransom (ARN)
Israel's top tech university postpones exams after ransomware attack (The Record from Recorded Future News)
Russian hackers ‘disrupt Turkey-Syria earthquake aid’ in cyber attack on Nato (The Independent) 
Killnet DDoS attacks disrupt Nato websites (ComputerWeekly.com)
Russian Hackers Disrupt NATO Earthquake Relief Operations (Dark Reading)
What Happened to #OpRussia? (Dark Reading)
Russian-linked malware was close to putting U.S. electric, gas facilities ‘offline’ last year (POLITICO)
2022 ICS/OT Cybersecurity Year in Review Executive Summary (Dragos)
What’s love got to do with it? 4 in 5 Valentine’s Day-themed spam emails are scams, Bitdefender Antispam Lab warns (Hot for Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Feb 2023 21:15:00 -0000</pubDate>
      <itunes:title>Blender is back, but now DBA Sinbad (still working for the Lazarus Group). Cyberespionage notes. Hacktivism. ICS threats. Valentine’s Day scams.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1760</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>"Blender" reappears as "Sinbad." A Tonto Team cyberespionage attempt against Group-IB is thwarted. DarkBit claims responsibility for a ransomware attack on Technion University. An overview of ICS and OT security. Ben Yelin looks at surveillance oversight at the state level. Ann Johnson from Afternoon Cyber Tea speaks with Marene Allison about the CISO transformation. And it’s Valentine's Day, that annual holiday of love, chocolate, flowers, and online scams.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/30

Selected reading.
Has a Sanctioned Bitcoin Mixer Been Resurrected to Aid North Korea’s Lazarus Group? (Elliptic Connect)
Nice Try Tonto Team (Group-IB)
Hackers attack Israel’s Technion University, demand over $1.7 million in ransom (ARN)
Israel's top tech university postpones exams after ransomware attack (The Record from Recorded Future News)
Russian hackers ‘disrupt Turkey-Syria earthquake aid’ in cyber attack on Nato (The Independent) 
Killnet DDoS attacks disrupt Nato websites (ComputerWeekly.com)
Russian Hackers Disrupt NATO Earthquake Relief Operations (Dark Reading)
What Happened to #OpRussia? (Dark Reading)
Russian-linked malware was close to putting U.S. electric, gas facilities ‘offline’ last year (POLITICO)
2022 ICS/OT Cybersecurity Year in Review Executive Summary (Dragos)
What’s love got to do with it? 4 in 5 Valentine’s Day-themed spam emails are scams, Bitdefender Antispam Lab warns (Hot for Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>"Blender" reappears as "Sinbad." A Tonto Team cyberespionage attempt against Group-IB is thwarted. DarkBit claims responsibility for a ransomware attack on Technion University. An overview of ICS and OT security. Ben Yelin looks at surveillance oversight at the state level. Ann Johnson from Afternoon Cyber Tea speaks with Marene Allison about the CISO transformation. And it’s Valentine's Day, that annual holiday of love, chocolate, flowers, and online scams.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/30</p><p><br></p><h2>Selected reading.</h2><p><a href="https://hub.elliptic.co/8613">Has a Sanctioned Bitcoin Mixer Been Resurrected to Aid North Korea’s Lazarus Group?</a> (Elliptic Connect)</p><p><a href="https://www.group-ib.com/blog/tonto-team/">Nice Try Tonto Team</a> (Group-IB)</p><p><a href="https://www.arnnet.com.au/article/705544/hackers-attack-israel-technion-university-demand-over-1-7-million-ransom/">Hackers attack Israel’s Technion University, demand over $1.7 million in ransom</a> (ARN)</p><p><a href="https://therecord.media/technion-israel-ransomware-darkbit-exams-canceled/">Israel's top tech university postpones exams after ransomware attack</a> (The Record from Recorded Future News)</p><p><a href="https://www.independent.co.uk/news/world/europe/turkey-syria-earthquake-russian-hackers-b2281278.html">Russian hackers ‘disrupt Turkey-Syria earthquake aid’ in cyber attack on Nato</a> (The Independent) </p><p><a href="https://www.computerweekly.com/news/365530999/Killnet-DDoS-attacks-disrupt-Nato-websites">Killnet DDoS attacks disrupt Nato websites</a> (ComputerWeekly.com)</p><p><a href="https://www.darkreading.com/attacks-breaches/russian-hackers-disrupt-nato-earthquake-relief-operations-">Russian Hackers Disrupt NATO Earthquake Relief Operations</a> (Dark Reading)</p><p><a href="https://www.darkreading.com/attacks-breaches/what-happened-to-oprussia">What Happened to #OpRussia?</a> (Dark Reading)</p><p><a href="https://www.politico.com/news/2023/02/14/russia-malware-electric-gas-facilities-00082675">Russian-linked malware was close to putting U.S. electric, gas facilities ‘offline’ last year</a> (POLITICO)</p><p><a href="https://hub.dragos.com/ics-cybersecurity-year-in-review-executive-summary-2022">2022 ICS/OT Cybersecurity Year in Review Executive Summary</a> (Dragos)</p><p><a href="https://www.bitdefender.com/blog/hotforsecurity/whats-love-got-to-do-with-it-4-in-5-valentines-day-themed-spam-emails-are-scams-bitdefender-antispam-lab-warns/">What’s love got to do with it? 4 in 5 Valentine’s Day-themed spam emails are scams, Bitdefender Antispam Lab warns</a> (Hot for Security)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1620</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2adbaebe-8167-11ed-9779-af2c642e0cf3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9796243769.mp3?updated=1690330998" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Known Exploited Vulnerabilities. Fool’s gold. Hacktivists come in both dissident and loyal varieties. Naming and shaming the shameless.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1759/notes</link>
      <description>CISA adds to its Known Exploited Vulnerabilities Catalog. Cl0p claims responsibility for GoAnywhere exploitation. Victims mine for gold; attackers use pig butchering tactics. Hacktivists disrupt Iranian television during Revolution Day observances. Killnet claims a DDoS attack against NATO earthquake relief efforts. CyberWire UK Correspondent Carole Theriault asks what can we learn from the recent Roomba privacy snafu? Rick Howard looks at first principles we considered along the way. And can you name and shame the shameless?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/29

Selected reading.
CISA Adds Three Known Exploited Vulnerabilities to Catalog (CISA) 
GoAnywhere MFT Zero-Day Exploitation Linked to Ransomware Attacks (SecurityWeek) 
Clop ransomware claims it breached 130 orgs using GoAnywhere zero-day (BleepingComputer) 
Fool’s Gold: dissecting a fake gold market pig-butchering scam (Sophos)
Iranian State TV Hacked During President's Speech on Revolution Day (HackRead) 
Russian hackers disrupt Turkey-Syria earthquake relief (The Telegraph)
Hacking marketplace emerges from Killnet partnership, seeks pro-Russia donations (SC Media)
Russian Government evaluates the immunity to hackers acting in the interests of Russia (Security Affairs)
Russia’s Ransomware Gangs Are Being Named and Shamed (WIRED)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 13 Feb 2023 21:15:00 -0000</pubDate>
      <itunes:title>Known Exploited Vulnerabilities. Fool’s gold. Hacktivists come in both dissident and loyal varieties. Naming and shaming the shameless.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1759</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA adds to its Known Exploited Vulnerabilities Catalog. Cl0p claims responsibility for GoAnywhere exploitation. Victims mine for gold; attackers use pig butchering tactics. Hacktivists disrupt Iranian television during Revolution Day observances. Killnet claims a DDoS attack against NATO earthquake relief efforts. CyberWire UK Correspondent Carole Theriault asks what can we learn from the recent Roomba privacy snafu? Rick Howard looks at first principles we considered along the way. And can you name and shame the shameless?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/29

Selected reading.
CISA Adds Three Known Exploited Vulnerabilities to Catalog (CISA) 
GoAnywhere MFT Zero-Day Exploitation Linked to Ransomware Attacks (SecurityWeek) 
Clop ransomware claims it breached 130 orgs using GoAnywhere zero-day (BleepingComputer) 
Fool’s Gold: dissecting a fake gold market pig-butchering scam (Sophos)
Iranian State TV Hacked During President's Speech on Revolution Day (HackRead) 
Russian hackers disrupt Turkey-Syria earthquake relief (The Telegraph)
Hacking marketplace emerges from Killnet partnership, seeks pro-Russia donations (SC Media)
Russian Government evaluates the immunity to hackers acting in the interests of Russia (Security Affairs)
Russia’s Ransomware Gangs Are Being Named and Shamed (WIRED)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA adds to its Known Exploited Vulnerabilities Catalog. Cl0p claims responsibility for GoAnywhere exploitation. Victims mine for gold; attackers use pig butchering tactics. Hacktivists disrupt Iranian television during Revolution Day observances. Killnet claims a DDoS attack against NATO earthquake relief efforts. CyberWire UK Correspondent Carole Theriault asks what can we learn from the recent Roomba privacy snafu? Rick Howard looks at first principles we considered along the way. And can you name and shame the shameless?</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/29</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2023/02/10/cisa-adds-three-known-exploited-vulnerabilities-catalog">CISA Adds Three Known Exploited Vulnerabilities to Catalog</a> (CISA) </p><p><a href="https://www.securityweek.com/goanywhere-mft-zero-day-exploitation-linked-to-ransomware-attacks/">GoAnywhere MFT Zero-Day Exploitation Linked to Ransomware Attacks</a> (SecurityWeek) </p><p><a href="https://www.bleepingcomputer.com/news/security/clop-ransomware-claims-it-breached-130-orgs-using-goanywhere-zero-day/">Clop ransomware claims it breached 130 orgs using GoAnywhere zero-day</a> (BleepingComputer) </p><p><a href="https://news.sophos.com/en-us/2023/02/13/fools-gold-dissecting-a-fake-gold-market-pig-butchering-scam/">Fool’s Gold: dissecting a fake gold market pig-butchering scam</a> (Sophos)</p><p><a href="https://www.hackread.com/iran-tv-hacked-revolution-day/">Iranian State TV Hacked During President's Speech on Revolution Day</a> (HackRead) </p><p><a href="https://www.telegraph.co.uk/world-news/2023/02/12/russian-killnet-hackers-disrupt-natos-turkey-syria-earthquake/">Russian hackers disrupt Turkey-Syria earthquake relief </a>(The Telegraph)</p><p><a href="https://www.scmagazine.com/analysis/cybercrime/hacking-marketplace-emerges-from-killnet-partnership-seeks-pro-russia-donations">Hacking marketplace emerges from Killnet partnership, seeks pro-Russia donations</a> (SC Media)</p><p><a href="https://securityaffairs.com/142139/cyber-warfare-2/russian-government-crooks-immunity.html">Russian Government evaluates the immunity to hackers acting in the interests of Russia</a> (Security Affairs)</p><p><a href="https://www.wired.com/story/conti-trickbot-ransomware-sanctions-uk-us/">Russia’s Ransomware Gangs Are Being Named and Shamed</a> (WIRED)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1495</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2af18ea0-8167-11ed-9779-2b2a65d2daa0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9626466277.mp3?updated=1690330980" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jaden Dicks: It is never too early to start. [CyberVista intern] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/136/notes</link>
      <description>Jaden Dicks, a new intern at CyberVista, a company that merged with CyberWire to become N2K Networks, shares his story as a young man growing up trying to get into the cyber community. From a very young age, Jaden hoped to become part of the cybersecurity field, He recalls growing up constantly being surrounded by technology, and now with the help of Urban Alliance, Jaden was able to secure this internship with CyberVista. Urban Alliance is a nonprofit that connects young adults with paid work experiences, such as internships to help them bridge the gaps between education and the workforce. Jaden hopes that this internship will help him further advance his career and help him to pursue his goals of working in cyber. He also shares advice to younger people like him who are looking to branch out and start working toward your goals, even as a teenager, and what has helped him to find his rhythm. We thank Jaden for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 12 Feb 2023 08:00:00 -0000</pubDate>
      <itunes:title>Jaden Dicks: It is never too early to start. [CyberVista intern] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>136</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Jaden Dicks, a new intern at CyberVista, a company that merged with CyberWire to become N2K Networks, shares his story as a young man growing up trying to get into the cyber community. From a very young age, Jaden hoped to become part of the cybersecurity field, He recalls growing up constantly being surrounded by technology, and now with the help of Urban Alliance, Jaden was able to secure this internship with CyberVista. Urban Alliance is a nonprofit that connects young adults with paid work experiences, such as internships to help them bridge the gaps between education and the workforce. Jaden hopes that this internship will help him further advance his career and help him to pursue his goals of working in cyber. He also shares advice to younger people like him who are looking to branch out and start working toward your goals, even as a teenager, and what has helped him to find his rhythm. We thank Jaden for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jaden Dicks, a new intern at CyberVista, a company that merged with CyberWire to become N2K Networks, shares his story as a young man growing up trying to get into the cyber community. From a very young age, Jaden hoped to become part of the cybersecurity field, He recalls growing up constantly being surrounded by technology, and now with the help of Urban Alliance, Jaden was able to secure this internship with CyberVista. Urban Alliance is a nonprofit that connects young adults with paid work experiences, such as internships to help them bridge the gaps between education and the workforce. Jaden hopes that this internship will help him further advance his career and help him to pursue his goals of working in cyber. He also shares advice to younger people like him who are looking to branch out and start working toward your goals, even as a teenager, and what has helped him to find his rhythm. We thank Jaden for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>454</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1c78f9c8-a8b6-11ed-b92e-3b6c9d7b732d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3551551655.mp3?updated=1675965129" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Knocking down the legs of the industrial security triad. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/268/notes</link>
      <description>Pascal Ackerman, OT Security Strategist from Guidepoint Security, joins Dave to discuss his work on discovering a vulnerability in the integrity of common HMI client-server protocol. This research is a Proof of Concept (PoC) attack on the integrity of data flowing across the industrial network with the intention of intercepting, viewing, and even manipulating values sent to (and from) the HMI, ultimately trying to trick the user into making a wrong decision, ultimately affecting the proper operation of the process.
In this research, they are targeting Rockwell Automation’s FactoryTalk View SE products, trying to highlight the lack of integrity and confidentiality on the production network and the effect that has on the overall security of the production environment.
The research can be found here:
GuidePoint Security researcher discovers vulnerability in the integrity of common HMI client-server protocol

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Feb 2023 08:00:00 -0000</pubDate>
      <itunes:title>Knocking down the legs of the industrial security triad. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>268</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Pascal Ackerman, OT Security Strategist from Guidepoint Security, joins Dave to discuss his work on discovering a vulnerability in the integrity of common HMI client-server protocol. This research is a Proof of Concept (PoC) attack on the integrity of data flowing across the industrial network with the intention of intercepting, viewing, and even manipulating values sent to (and from) the HMI, ultimately trying to trick the user into making a wrong decision, ultimately affecting the proper operation of the process.
In this research, they are targeting Rockwell Automation’s FactoryTalk View SE products, trying to highlight the lack of integrity and confidentiality on the production network and the effect that has on the overall security of the production environment.
The research can be found here:
GuidePoint Security researcher discovers vulnerability in the integrity of common HMI client-server protocol

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Pascal Ackerman, OT Security Strategist from Guidepoint Security, joins Dave to discuss his work on discovering a vulnerability in the integrity of common HMI client-server protocol. This research is a Proof of Concept (PoC) attack on the integrity of data flowing across the industrial network with the intention of intercepting, viewing, and even manipulating values sent to (and from) the HMI, ultimately trying to trick the user into making a wrong decision, ultimately affecting the proper operation of the process.</p><p>In this research, they are targeting Rockwell Automation’s FactoryTalk View SE products, trying to highlight the lack of integrity and confidentiality on the production network and the effect that has on the overall security of the production environment.</p><p>The research can be found here:</p><ul><li><a href="https://www.guidepointsecurity.com/blog/guidepoint-security-researcher-discovers-vulnerability-in-the-integrity-of-common-hmi-client-server-protocol/">GuidePoint Security researcher discovers vulnerability in the integrity of common HMI client-server protocol</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1185</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ead7d092-a8b5-11ed-9a8a-ffc3f66d18a8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7651427947.mp3?updated=1685127462" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US, RoK agencies outline DPRK ransomware. Reddit breached. ICS and IIoT issues. It’s almost Valentine’s Day. Have you noticed? (The hoods have.)  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1758/notes</link>
      <description>US and Republic of Korea agencies outline the DPRK ransomware threat. Reddit is breached. CISA releases six ICS advisories. Flaws are found in IIoT devices. Dinah Davis from Arctic Wolf shares cybersecurity stats every IT professional should know. Our guest is Kayla Williams from Devo autonomous SOCs. And, it’s almost Valentine’s Day. Have you noticed? (The hoods have.)

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/28

Selected reading.
#StopRansomware - Ransomware Attacks on Critical Infrastructure Fund DPRK Espionage Activities (CISA)
#StopRansomware: Ransomware Attacks on Critical Infrastructure Fund DPRK Malicious Cyber Activities (CISA) 
U.S., South Korean Agencies Partner to #StopRansomware Threat from DPRK (National Security Agency/Central Security Service)
US and South Korea accuse North Korea of using hospital ransoms to fund more hacking (The Record from Recorded Future News)
North Korea using healthcare ransomware attacks to fund further cybercrime, feds say (SC Media) 
U.S., South Korea Warn of North Korean Ransomware Threats (Bank Info Security) 
r/reddit - We had a security incident. Here’s what we know. (reddit) 
Hackers breach Reddit to steal source code and internal data (BleepingComputer) 
Reddit Breached With Stolen Employee Credentials (Dark Reading) 
Reddit Says It Was Hacked But That You Don't Need to Worry. Probably. (Gizmodo)
Control By Web X-400, X-600M (CISA) 
LS ELECTRIC XBC-DN32U (CISA) 
Johnson Controls System Configuration Tool (SCT) (CISA)
Horner Automation Cscape Envision RV (CISA) 
Omron SYSMAC CS/CJ/CP Series and NJ/NX Series (CISA)
ARC Informatique PcVue (CISA)
Industrial Wireless IoT - The direct path to your Level 0 (Otorio)
Critical Infrastructure at Risk from New Vulnerabilities Found in Wireless IIoT Devices (The Hacker News)
Romance scammers’ favorite lies exposed (Federal Trade Commission)
New FTC Data Reveals Top Lies Told by Romance Scammers (Federal Trade Commission)
Romance scammers could cause unhappy Valentine’s Day (Washington Post)
Love Bytes (Georgia State News Hub)
As V-Day nears: Romance scams cost victims $1.3B last year (Register)
Michigan AG warns of cybersecurity risks after data breach of gaming sites (mlive)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 10 Feb 2023 21:15:00 -0000</pubDate>
      <itunes:title>US, RoK agencies outline DPRK ransomware. Reddit breached. ICS and IIoT issues. It’s almost Valentine’s Day. Have you noticed? (The hoods have.)  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1758</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>US and Republic of Korea agencies outline the DPRK ransomware threat. Reddit is breached. CISA releases six ICS advisories. Flaws are found in IIoT devices. Dinah Davis from Arctic Wolf shares cybersecurity stats every IT professional should know. Our guest is Kayla Williams from Devo autonomous SOCs. And, it’s almost Valentine’s Day. Have you noticed? (The hoods have.)

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/28

Selected reading.
#StopRansomware - Ransomware Attacks on Critical Infrastructure Fund DPRK Espionage Activities (CISA)
#StopRansomware: Ransomware Attacks on Critical Infrastructure Fund DPRK Malicious Cyber Activities (CISA) 
U.S., South Korean Agencies Partner to #StopRansomware Threat from DPRK (National Security Agency/Central Security Service)
US and South Korea accuse North Korea of using hospital ransoms to fund more hacking (The Record from Recorded Future News)
North Korea using healthcare ransomware attacks to fund further cybercrime, feds say (SC Media) 
U.S., South Korea Warn of North Korean Ransomware Threats (Bank Info Security) 
r/reddit - We had a security incident. Here’s what we know. (reddit) 
Hackers breach Reddit to steal source code and internal data (BleepingComputer) 
Reddit Breached With Stolen Employee Credentials (Dark Reading) 
Reddit Says It Was Hacked But That You Don't Need to Worry. Probably. (Gizmodo)
Control By Web X-400, X-600M (CISA) 
LS ELECTRIC XBC-DN32U (CISA) 
Johnson Controls System Configuration Tool (SCT) (CISA)
Horner Automation Cscape Envision RV (CISA) 
Omron SYSMAC CS/CJ/CP Series and NJ/NX Series (CISA)
ARC Informatique PcVue (CISA)
Industrial Wireless IoT - The direct path to your Level 0 (Otorio)
Critical Infrastructure at Risk from New Vulnerabilities Found in Wireless IIoT Devices (The Hacker News)
Romance scammers’ favorite lies exposed (Federal Trade Commission)
New FTC Data Reveals Top Lies Told by Romance Scammers (Federal Trade Commission)
Romance scammers could cause unhappy Valentine’s Day (Washington Post)
Love Bytes (Georgia State News Hub)
As V-Day nears: Romance scams cost victims $1.3B last year (Register)
Michigan AG warns of cybersecurity risks after data breach of gaming sites (mlive)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>US and Republic of Korea agencies outline the DPRK ransomware threat. Reddit is breached. CISA releases six ICS advisories. Flaws are found in IIoT devices. Dinah Davis from Arctic Wolf shares cybersecurity stats every IT professional should know. Our guest is Kayla Williams from Devo autonomous SOCs. And, it’s almost Valentine’s Day. Have you noticed? (The hoods have.)</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/28</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2023/02/09/stopransomware-ransomware-attacks-critical-infrastructure-fund">#StopRansomware - Ransomware Attacks on Critical Infrastructure Fund DPRK Espionage Activities</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa23-040a">#StopRansomware: Ransomware Attacks on Critical Infrastructure Fund DPRK Malicious Cyber Activities</a> (CISA) </p><p><a href="https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/3293960/us-south-korean-agencies-partner-to-stopransomware-threat-from-dprk/">U.S., South Korean Agencies Partner to #StopRansomware Threat from DPRK</a> (National Security Agency/Central Security Service)</p><p><a href="https://therecord.media/north-korea-hackers-funding-us-south-korea-advisory/">US and South Korea accuse North Korea of using hospital ransoms to fund more hacking</a> (The Record from Recorded Future News)</p><p><a href="https://www.scmagazine.com/analysis/ransomware/north-korea-using-healthcare-ransomware-attacks-to-fund-further-cybercrime-feds-say">North Korea using healthcare ransomware attacks to fund further cybercrime, feds say</a> (SC Media) </p><p><a href="https://www.bankinfosecurity.com/us-south-korea-warn-north-korean-ransomware-threats-a-21167">U.S., South Korea Warn of North Korean Ransomware Threats</a> (Bank Info Security) </p><p><a href="https://www.reddit.com/r/reddit/comments/10y427y/we_had_a_security_incident_heres_what_we_know/">r/reddit - We had a security incident. Here’s what we know.</a> (reddit) </p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-breach-reddit-to-steal-source-code-and-internal-data/">Hackers breach Reddit to steal source code and internal data</a> (BleepingComputer) </p><p><a href="https://www.darkreading.com/attacks-breaches/reddit-breached-with-stolen-employee-credentials">Reddit Breached With Stolen Employee Credentials</a> (Dark Reading) </p><p><a href="https://gizmodo.com/reddit-cyberattack-phishing-data-breach-cybersecurity-1850096804">Reddit Says It Was Hacked But That You Don't Need to Worry. Probably.</a> (Gizmodo)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-040-01">Control By Web X-400, X-600M</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-040-02">LS ELECTRIC XBC-DN32U</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-040-03">Johnson Controls System Configuration Tool (SCT)</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-040-04">Horner Automation Cscape Envision RV</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-179-02">Omron SYSMAC CS/CJ/CP Series and NJ/NX Series</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-354-03">ARC Informatique PcVue</a> (CISA)</p><p><a href="https://go.otorio.com/hubfs/Whitepapers%20and%20Reports/whitepaper%20-%20Industrial%20wireless%20IoT%20research.pdf">Industrial Wireless IoT - The direct path to your Level 0</a> (Otorio)</p><p><a href="https://thehackernews.com/2023/02/critical-infrastructure-at-risk-from.html">Critical Infrastructure at Risk from New Vulnerabilities Found in Wireless IIoT Devices</a> (The Hacker News)</p><p><a href="https://www.ftc.gov/news-events/data-visualizations/data-spotlight/2023/02/romance-scammers-favorite-lies-exposed">Romance scammers’ favorite lies exposed</a> (Federal Trade Commission)</p><p><a href="https://www.ftc.gov/news-events/news/press-releases/2023/02/new-ftc-data-reveals-top-lies-told-romance-scammers">New FTC Data Reveals Top Lies Told by Romance Scammers</a> (Federal Trade Commission)</p><p><a href="https://www.washingtonpost.com/politics/2023/02/10/romance-scammers-could-cause-unhappy-valentines-day/">Romance scammers could cause unhappy Valentine’s Day</a> (Washington Post)</p><p><a href="https://news.gsu.edu/research-magazine/love-bytes">Love Bytes</a> (Georgia State News Hub)</p><p><a href="https://www.theregister.com/2023/02/10/romance_scammers_cost_victims_13b/">As V-Day nears: Romance scams cost victims $1.3B last year</a> (Register)</p><p><a href="https://www.mlive.com/public-interest/2023/02/michigan-ag-warns-of-cybersecurity-risks-after-data-breach-of-gaming-sites.html">Michigan AG warns of cybersecurity risks after data breach of gaming sites</a> (mlive)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1767</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2a3cdc62-8167-11ed-9779-93323a37a4d8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1814314031.mp3?updated=1690330968" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA23-040A – #StopRansomware: ransomware attacks on critical infrastructure fund DPRK malicious cyber activities. [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/41/notes</link>
      <description>CISA, NSA, FBI, the US Department of Health and Human Services, the Republic of Korea National Intelligence Service, and the Republic of Korea Defense Security Agency are issuing this alert to highlight ongoing ransomware activity against Healthcare and Public Health Sector organizations and other critical infrastructure sector entities.
AA23-040A Alert, Technical Details, and Mitigations
CISA’s North Korea Cyber Threat Overview and Advisories webpage.
Stairwell provided a YARA rule to identify Maui ransomware, and a Proof of Concept public RSA key extractor at the following link: https://www.stairwell.com/news/threat-research-report-maui-ransomware/
See Stopransomware.gov, a whole-of-government approach, for ransomware resources and alerts.
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 10 Feb 2023 20:59:00 -0000</pubDate>
      <itunes:title>CISA Alert AA23-040A – #StopRansomware: ransomware attacks on critical infrastructure fund DPRK malicious cyber activities. [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>41</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA, NSA, FBI, the US Department of Health and Human Services, the Republic of Korea National Intelligence Service, and the Republic of Korea Defense Security Agency are issuing this alert to highlight ongoing ransomware activity against Healthcare and Public Health Sector organizations and other critical infrastructure sector entities.
AA23-040A Alert, Technical Details, and Mitigations
CISA’s North Korea Cyber Threat Overview and Advisories webpage.
Stairwell provided a YARA rule to identify Maui ransomware, and a Proof of Concept public RSA key extractor at the following link: https://www.stairwell.com/news/threat-research-report-maui-ransomware/
See Stopransomware.gov, a whole-of-government approach, for ransomware resources and alerts.
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA, NSA, FBI, the US Department of Health and Human Services, the Republic of Korea National Intelligence Service, and the Republic of Korea Defense Security Agency are issuing this alert to highlight ongoing ransomware activity against Healthcare and Public Health Sector organizations and other critical infrastructure sector entities.</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa23-040a">AA23-040A Alert, Technical Details, and Mitigations</a></p><p>CISA’s <a href="https://www.cisa.gov/uscert/northkorea">North Korea Cyber Threat Overview and Advisories</a> webpage.</p><p>Stairwell provided a YARA rule to identify Maui ransomware, and a Proof of Concept public RSA key extractor at the following link: <a href="https://www.stairwell.com/news/threat-research-report-maui-ransomware/">https://www.stairwell.com/news/threat-research-report-maui-ransomware/</a></p><p>See <a href="https://www.cisa.gov/stopransomware">Stopransomware.gov</a>, a whole-of-government approach, for ransomware resources and alerts.</p><p>No-cost cyber hygiene services: <a href="https://www.cisa.gov/cyber-hygiene-services">Cyber Hygiene Services</a> and <a href="https://github.com/cisagov/cset/">Ransomware Readiness Assessment</a>.</p><p>See CISA Insights <a href="https://www.cisa.gov/sites/default/files/publications/CISA%20Insights_Guidance-for-MSPs-and-Small-and-Mid-sized-Businesses_S508C.pdf">Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses</a> for guidance on hardening MSP and customer infrastructure.</p><p>U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email <a href="mailto:dib_defense@cyber.nsa.gov">dib_defense@cyber.nsa.gov</a> </p><p>To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="mailto:report@cisa.gov">report@cisa.gov</a>, or call (888) 282-0870, or report incidents to your local FBI field office.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>181</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1c5da526-a986-11ed-b353-d33b803e6b6d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8731911940.mp3?updated=1676061336" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage, from war floating to phishing. An update on ESXiArgs. Fresh sanctions against ransomware operators, and more takedowns may be in the offing. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1757/notes</link>
      <description>War-floating. A phishing campaign pursues Ukrainian and Polish targets. Pakistan's navy is under cyberattack. A new criminal threat-actor uses screenshots for recon. ESXiArgs is widespread, but its effects are still being assessed. The UK and US issue joint sanctions against Russian ransomware operators. Robert M. Lee from Dragos addresses attacks to electrical substations. Our guest is Denny LeCompte from Portnox discussing IoT security segmentation strategies. And is LockBit next on law enforcement’s wanted list?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/27

Selected reading.
Chinese Balloon Had Tools to Collect Communications Signals, U.S. Says (New York Times) 
UAC-0114 Campaign Targeting Ukrainian and Polish Gov Entitities (The State Cyber Protection Centre of the State Service of Special Communication and Information Protection of Ukraine)
NewsPenguin, a Previously Unknown Threat Actor, Targets Pakistan with Advanced Espionage Tool (BlackBerry)
Screentime: Sometimes It Feels Like Somebody's Watching Me (Proofpoint)
Florida state court system, US, EU universities hit by ransomware outbreak (Reuters).
No evidence global ransomware hack was by state entity, Italy says (Reuters)
Ransomware campaign stirs worry despite uncertain impact (Washington Post)
VMware Security Response Center (vSRC) Response to 'ESXiArgs' Ransomware Attacks (VMware Security Blog)
CISA and FBI Release ESXiArgs Ransomware Recovery Guidance (CISA)
United States and United Kingdom Sanction Members of Russia-Based Trickbot Cybercrime Gang (U.S. Department of the Treasury)
Ransomware criminals sanctioned in joint UK/US crackdown on international cyber crime (National Crime Agency)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 09 Feb 2023 21:15:00 -0000</pubDate>
      <itunes:title>Cyberespionage, from war floating to phishing. An update on ESXiArgs. Fresh sanctions against ransomware operators, and more takedowns may be in the offing. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1757</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>War-floating. A phishing campaign pursues Ukrainian and Polish targets. Pakistan's navy is under cyberattack. A new criminal threat-actor uses screenshots for recon. ESXiArgs is widespread, but its effects are still being assessed. The UK and US issue joint sanctions against Russian ransomware operators. Robert M. Lee from Dragos addresses attacks to electrical substations. Our guest is Denny LeCompte from Portnox discussing IoT security segmentation strategies. And is LockBit next on law enforcement’s wanted list?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/27

Selected reading.
Chinese Balloon Had Tools to Collect Communications Signals, U.S. Says (New York Times) 
UAC-0114 Campaign Targeting Ukrainian and Polish Gov Entitities (The State Cyber Protection Centre of the State Service of Special Communication and Information Protection of Ukraine)
NewsPenguin, a Previously Unknown Threat Actor, Targets Pakistan with Advanced Espionage Tool (BlackBerry)
Screentime: Sometimes It Feels Like Somebody's Watching Me (Proofpoint)
Florida state court system, US, EU universities hit by ransomware outbreak (Reuters).
No evidence global ransomware hack was by state entity, Italy says (Reuters)
Ransomware campaign stirs worry despite uncertain impact (Washington Post)
VMware Security Response Center (vSRC) Response to 'ESXiArgs' Ransomware Attacks (VMware Security Blog)
CISA and FBI Release ESXiArgs Ransomware Recovery Guidance (CISA)
United States and United Kingdom Sanction Members of Russia-Based Trickbot Cybercrime Gang (U.S. Department of the Treasury)
Ransomware criminals sanctioned in joint UK/US crackdown on international cyber crime (National Crime Agency)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>War-floating. A phishing campaign pursues Ukrainian and Polish targets. Pakistan's navy is under cyberattack. A new criminal threat-actor uses screenshots for recon. ESXiArgs is widespread, but its effects are still being assessed. The UK and US issue joint sanctions against Russian ransomware operators. Robert M. Lee from Dragos addresses attacks to electrical substations. Our guest is Denny LeCompte from Portnox discussing IoT security segmentation strategies. And is LockBit next on law enforcement’s wanted list?</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/27</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.nytimes.com/2023/02/09/us/politics/china-spy-balloon-program.html">Chinese Balloon Had Tools to Collect Communications Signals, U.S. Says</a> (New York Times) </p><p><a href="https://scpc.gov.ua/api/docs/4eeb6a10-b7aa-4396-8b04-e0e4b7fca1lj/4eeb6a10-b7aa-4396-8b04-e0e4b7fca1lj.pdf">UAC-0114 Campaign Targeting Ukrainian and Polish Gov Entitities</a> (The State Cyber Protection Centre of the State Service of Special Communication and Information Protection of Ukraine)</p><p><a href="https://blogs.blackberry.com/en/2023/02/newspenguin-a-previously-unknown-threat-actor-targets-pakistan-with-advanced-espionage-tool">NewsPenguin, a Previously Unknown Threat Actor, Targets Pakistan with Advanced Espionage Tool</a> (BlackBerry)</p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/screentime-sometimes-it-feels-like-somebodys-watching-me">Screentime: Sometimes It Feels Like Somebody's Watching Me</a> (Proofpoint)</p><p><a href="https://www.reuters.com/world/us/ransomware-outbreak-hits-florida-supreme-court-us-european-universities-2023-02-07/">Florida state court system, US, EU universities hit by ransomware outbreak</a> (Reuters).</p><p><a href="https://www.reuters.com/technology/italys-govt-global-cyber-attack-did-not-come-state-entity-2023-02-06/">No evidence global ransomware hack was by state entity, Italy says</a> (Reuters)</p><p><a href="https://www.washingtonpost.com/politics/2023/02/09/ransomware-campaign-stirs-worry-despite-uncertain-impact/">Ransomware campaign stirs worry despite uncertain impact</a> (Washington Post)</p><p><a href="https://blogs.vmware.com/security/2023/02/83330.html?">VMware Security Response Center (vSRC) Response to 'ESXiArgs' Ransomware Attacks</a> (VMware Security Blog)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2023/02/08/cisa-and-fbi-release-esxiargs-ransomware-recovery-guidance">CISA and FBI Release ESXiArgs Ransomware Recovery Guidance</a> (CISA)</p><p><a href="https://home.treasury.gov/news/press-releases/jy1256">United States and United Kingdom Sanction Members of Russia-Based Trickbot Cybercrime Gang</a> (U.S. Department of the Treasury)</p><p><a href="https://www.nationalcrimeagency.gov.uk/news/ransomware-criminals-sanctioned-in-joint-uk-us-crackdown-on-international-cyber-crime">Ransomware criminals sanctioned in joint UK/US crackdown on international cyber crime</a> (National Crime Agency)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1749</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2a26a5d2-8167-11ed-9779-8bd6cff0cfd8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2646632305.mp3?updated=1690330941" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA23-039A – ESXiArgs ransomware virtual machine recovery guidance. [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/40/notes</link>
      <description>CISA and the FBI are releasing this alert in response to the ongoing ransomware campaign, known as “ESXiArgs.” Malicious actors are exploiting known vulnerabilities in VMware ESXi servers that are likely running unpatched and out-of-service or out-of-date versions of VMware ESXi software to gain access and deploy ransomware.
AA23-039A Alert, Technical Details, and Mitigations
CISA has released an ESXiArgs recovery script at github.com/cisagov/ESXiArgs-Recover
VMware Security Response Center (vSRC) Response to 'ESXiArgs' Ransomware Attack…
Enes Sonmez and Ahmet Aykac, YoreGroup Tech Team: decrypt your crypted files in…
See Stopransomware.gov, a whole-of-government approach, for ransomware resources and alerts.
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 09 Feb 2023 20:50:00 -0000</pubDate>
      <itunes:title>CISA Alert AA23-039A – ESXiArgs ransomware virtual machine recovery guidance. [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>40</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA and the FBI are releasing this alert in response to the ongoing ransomware campaign, known as “ESXiArgs.” Malicious actors are exploiting known vulnerabilities in VMware ESXi servers that are likely running unpatched and out-of-service or out-of-date versions of VMware ESXi software to gain access and deploy ransomware.
AA23-039A Alert, Technical Details, and Mitigations
CISA has released an ESXiArgs recovery script at github.com/cisagov/ESXiArgs-Recover
VMware Security Response Center (vSRC) Response to 'ESXiArgs' Ransomware Attack…
Enes Sonmez and Ahmet Aykac, YoreGroup Tech Team: decrypt your crypted files in…
See Stopransomware.gov, a whole-of-government approach, for ransomware resources and alerts.
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA and the FBI are releasing this alert in response to the ongoing ransomware campaign, known as “ESXiArgs.” Malicious actors are exploiting known vulnerabilities in VMware ESXi servers that are likely running unpatched and out-of-service or out-of-date versions of VMware ESXi software to gain access and deploy ransomware.</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa23-039a">AA23-039A Alert, Technical Details, and Mitigations</a></p><p>CISA has released an ESXiArgs recovery script at <a href="https://github.com/cisagov/ESXiArgs-Recover">github.com/cisagov/ESXiArgs-Recover</a></p><p><a href="https://blogs.vmware.com/security/2023/02/83330.html">VMware Security Response Center (vSRC) Response to 'ESXiArgs' Ransomware Attack…</a></p><p><a href="https://enes.dev/">Enes Sonmez and Ahmet Aykac, YoreGroup Tech Team: decrypt your crypted files in…</a></p><p>See <a href="https://www.cisa.gov/stopransomware">Stopransomware.gov</a>, a whole-of-government approach, for ransomware resources and alerts.</p><p>No-cost cyber hygiene services: <a href="https://www.cisa.gov/cyber-hygiene-services">Cyber Hygiene Services</a> and <a href="https://github.com/cisagov/cset/">Ransomware Readiness Assessment</a>.</p><p>See CISA Insights <a href="https://www.cisa.gov/sites/default/files/publications/CISA%20Insights_Guidance-for-MSPs-and-Small-and-Mid-sized-Businesses_S508C.pdf">Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses</a> for guidance on hardening MSP and customer infrastructure.</p><p>U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email <a href="mailto:dib_defense@cyber.nsa.gov">dib_defense@cyber.nsa.gov</a> </p><p>To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="mailto:report@cisa.gov">report@cisa.gov</a>, or call (888) 282-0870, or report incidents to your local FBI field office.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>170</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1a7009e6-a8bb-11ed-a5bf-a70d9055c1a6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8659381655.mp3?updated=1675959563" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An ICS update from CISA. Ransomware notes: LockBit, Clop, and ESXiArgs. Vulnerability in Toyota’s GSPIMS. Two new Russian cyberespionage efforts hit Ukraine. And a direction for US privacy policy. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1756/notes</link>
      <description>CISA releases an ICS security advisory affecting a smart facility system. LockBit threatens to release Royal Mail data tomorrow. Cl0p ransomware expands to Linux-based systems. A vulnerability is identified in Toyota's GSPIMS. There’s an ESXiArgs update: new trackers and mitigation tools are available. Russia is running two new cyberespionage campaigns against Ukraine. Our guest is Roya Gordon from Nozomi Networks discusses the ICS Threat Landscape. And The Washington Post’s Tim Starks provides analysis on last night’s State of the Union.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/26

Selected reading.
CISA Releases One Industrial Control Systems Advisory (CISA) 
LockBit group threatens to publish stolen Royal Mail data tomorrow (Computing) 
Cl0p Ransomware Targets Linux Systems with Flawed Encryption | Decryptor Available (SentinelOne)
Hacking into Toyota’s global supplier management network (Eaton Works)
Researcher breaches Toyota supplier portal with info on 14,000 partners (BleepingComputer)
Vulnerability Provided Access to Toyota Supplier Management Network (SecurityWeek)
CISA Releases ESXiArgs Ransomware Recovery Script (CISA)
ESXiArgs Ransomware Campaign Targets VMWare ESXi Vulnerability (SecurityScorecard)
Graphiron: New Russian Information Stealing Malware Deployed Against Ukraine (Symantec)
Remcos software deployed in spying attempt on Ukraine’s government, CERT says (The Record from Recorded Future News)
The State of the Union was light on cybersecurity (Washington Post)
Biden calls for action on privacy rights in State of the Union (CyberScoop)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 08 Feb 2023 21:15:00 -0000</pubDate>
      <itunes:title>An ICS update from CISA. Ransomware notes: LockBit, Clop, and ESXiArgs. Vulnerability in Toyota’s GSPIMS. Two new Russian cyberespionage efforts hit Ukraine. And a direction for US privacy policy. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1756</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA releases an ICS security advisory affecting a smart facility system. LockBit threatens to release Royal Mail data tomorrow. Cl0p ransomware expands to Linux-based systems. A vulnerability is identified in Toyota's GSPIMS. There’s an ESXiArgs update: new trackers and mitigation tools are available. Russia is running two new cyberespionage campaigns against Ukraine. Our guest is Roya Gordon from Nozomi Networks discusses the ICS Threat Landscape. And The Washington Post’s Tim Starks provides analysis on last night’s State of the Union.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/26

Selected reading.
CISA Releases One Industrial Control Systems Advisory (CISA) 
LockBit group threatens to publish stolen Royal Mail data tomorrow (Computing) 
Cl0p Ransomware Targets Linux Systems with Flawed Encryption | Decryptor Available (SentinelOne)
Hacking into Toyota’s global supplier management network (Eaton Works)
Researcher breaches Toyota supplier portal with info on 14,000 partners (BleepingComputer)
Vulnerability Provided Access to Toyota Supplier Management Network (SecurityWeek)
CISA Releases ESXiArgs Ransomware Recovery Script (CISA)
ESXiArgs Ransomware Campaign Targets VMWare ESXi Vulnerability (SecurityScorecard)
Graphiron: New Russian Information Stealing Malware Deployed Against Ukraine (Symantec)
Remcos software deployed in spying attempt on Ukraine’s government, CERT says (The Record from Recorded Future News)
The State of the Union was light on cybersecurity (Washington Post)
Biden calls for action on privacy rights in State of the Union (CyberScoop)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA releases an ICS security advisory affecting a smart facility system. LockBit threatens to release Royal Mail data tomorrow. Cl0p ransomware expands to Linux-based systems. A vulnerability is identified in Toyota's GSPIMS. There’s an ESXiArgs update: new trackers and mitigation tools are available. Russia is running two new cyberespionage campaigns against Ukraine. Our guest is Roya Gordon from Nozomi Networks discusses the ICS Threat Landscape. And The Washington Post’s Tim Starks provides analysis on last night’s State of the Union.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/26</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2023/02/07/cisa-releases-one-industrial-control-systems-advisory">CISA Releases One Industrial Control Systems Advisory</a> (CISA) </p><p><a href="https://www.computing.co.uk/news/4074149/lockbit-group-threatens-publish-stolen-royal-mail-tomorrow">LockBit group threatens to publish stolen Royal Mail data tomorrow </a>(Computing) </p><p><a href="https://www.sentinelone.com/labs/cl0p-ransomware-targets-linux-systems-with-flawed-encryption-decryptor-available/">Cl0p Ransomware Targets Linux Systems with Flawed Encryption | Decryptor Available</a> (SentinelOne)</p><p><a href="https://eaton-works.com/2023/02/06/toyota-gspims-hack/">Hacking into Toyota’s global supplier management network</a> (Eaton Works)</p><p><a href="https://www.bleepingcomputer.com/news/security/researcher-breaches-toyota-supplier-portal-with-info-on-14-000-partners/">Researcher breaches Toyota supplier portal with info on 14,000 partners</a> (BleepingComputer)</p><p><a href="https://www.securityweek.com/vulnerability-provided-access-to-toyota-supplier-management-network/">Vulnerability Provided Access to Toyota Supplier Management Network</a> (SecurityWeek)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2023/02/07/cisa-releases-esxiargs-ransomware-recovery-script">CISA Releases ESXiArgs Ransomware Recovery Script</a> (CISA)</p><p><a href="https://securityscorecard.com/research/esxiargs-ransomware-campaign-targets-vmware-esxi-vulnerability">ESXiArgs Ransomware Campaign Targets VMWare ESXi Vulnerability</a> (SecurityScorecard)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/nodaria-ukraine-infostealer">Graphiron: New Russian Information Stealing Malware Deployed Against Ukraine</a> (Symantec)</p><p><a href="https://therecord.media/remcos-spyware-ukraine-government-agencies-uac0050/">Remcos software deployed in spying attempt on Ukraine’s government, CERT says</a> (The Record from Recorded Future News)</p><p><a href="https://www.washingtonpost.com/politics/2023/02/08/state-union-was-light-cybersecurity/">The State of the Union was light on cybersecurity</a> (Washington Post)</p><p><a href="https://cyberscoop.com/state-of-the-union-biden-privacy/">Biden calls for action on privacy rights in State of the Union</a> (CyberScoop)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1795</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2a11516e-8167-11ed-9779-cfbb5c19be0b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6553425714.mp3?updated=1690330887" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Update: VMware ESXi exploitations. Super Bowl cyber risks. Scalping bots. The curious case of the Moscow billboards.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1755/notes</link>
      <description>VMware ESXi exploitations. Super Bowl cyber risks. Scalping bots. The curious case of the Moscow billboards. Joe Carrigan tracks pig butchering apps in online app stores. Our guest is David Liebenberg from Cisco Talos, to discuss incident response trends. And, in sportsball, it’s gonna be the Chiefs by a couple of hat tricks, or something.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/25

Selected reading.
Ransomware Hits Unpatched VMware Systems: 'Send Money Within 3 Days' (Virtualization Review) 
Massive ransomware attack targets VMware ESXi servers worldwide (CSO Online) 
CISA steps up to help VMware ESXi ransomware victims (SC Media)
‘Massive’ new ESXiArgs ransomware campaign has compromised thousands of victims (The Record from Recorded Future News) 
Have you clicked “Report Junk” lately on your #mobile device? (Proofpoint) 
CyRC special report: Secure apps? Don’t bet on it (Synopsys)
DataDome’s Inaugural E-Commerce Holiday Bot &amp; Online Fraud Report Reveals the US as the Top Source of Bot Attacks (DataDome)
Darknet drug market BlackSprut openly advertises on billboards in Moscow (The Record from Recorded Future News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Feb 2023 21:15:00 -0000</pubDate>
      <itunes:title>Update: VMware ESXi exploitations. Super Bowl cyber risks. Scalping bots. The curious case of the Moscow billboards.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1755</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>VMware ESXi exploitations. Super Bowl cyber risks. Scalping bots. The curious case of the Moscow billboards. Joe Carrigan tracks pig butchering apps in online app stores. Our guest is David Liebenberg from Cisco Talos, to discuss incident response trends. And, in sportsball, it’s gonna be the Chiefs by a couple of hat tricks, or something.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/25

Selected reading.
Ransomware Hits Unpatched VMware Systems: 'Send Money Within 3 Days' (Virtualization Review) 
Massive ransomware attack targets VMware ESXi servers worldwide (CSO Online) 
CISA steps up to help VMware ESXi ransomware victims (SC Media)
‘Massive’ new ESXiArgs ransomware campaign has compromised thousands of victims (The Record from Recorded Future News) 
Have you clicked “Report Junk” lately on your #mobile device? (Proofpoint) 
CyRC special report: Secure apps? Don’t bet on it (Synopsys)
DataDome’s Inaugural E-Commerce Holiday Bot &amp; Online Fraud Report Reveals the US as the Top Source of Bot Attacks (DataDome)
Darknet drug market BlackSprut openly advertises on billboards in Moscow (The Record from Recorded Future News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>VMware ESXi exploitations. Super Bowl cyber risks. Scalping bots. The curious case of the Moscow billboards. Joe Carrigan tracks pig butchering apps in online app stores. Our guest is David Liebenberg from Cisco Talos, to discuss incident response trends. And, in sportsball, it’s gonna be the Chiefs by a couple of hat tricks, or something.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/25</p><p><br></p><h2>Selected reading.</h2><p><a href="https://virtualizationreview.com/articles/2023/02/06/vmware-ransomware.aspx">Ransomware Hits Unpatched VMware Systems: 'Send Money Within 3 Days'</a> (Virtualization Review) </p><p><a href="https://www.csoonline.com/article/3687095/massive-ransomware-attack-targets-vmware-esxi-servers-worldwide.html">Massive ransomware attack targets VMware ESXi servers worldwide</a> (CSO Online) </p><p><a href="https://www.scmagazine.com/news/cloud-security/cisa-steps-up-to-help-vmware-esxi-ransomware-victims">CISA steps up to help VMware ESXi ransomware victims </a>(SC Media)</p><p><a href="https://therecord.media/esxiargs-ransomware-vmware-servers/">‘Massive’ new ESXiArgs ransomware campaign has compromised thousands of victims</a> (The Record from Recorded Future News) </p><p><a href="https://twitter.com/proofpoint/status/1622567081307697155">Have you clicked “Report Junk” lately on your #mobile device?</a> (Proofpoint) </p><p><a href="https://www.synopsys.com/blogs/software-security/cyrc-special-report-gaming-apps-security-analysis/">CyRC special report: Secure apps? Don’t bet on it</a> (Synopsys)</p><p><a href="https://datadome.co/press/datadome-e-commerce-holiday-bot-online-fraud-report-reveals-us-top-source-bot-attacks/">DataDome’s Inaugural E-Commerce Holiday Bot &amp; Online Fraud Report Reveals the US as the Top Source of Bot Attacks</a> (DataDome)</p><p><a href="https://therecord.media/blacksprut-darknet-drug-market-billboards-moscow/">Darknet drug market BlackSprut openly advertises on billboards in Moscow</a> (The Record from Recorded Future News)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1645</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[29fc3af4-8167-11ed-9779-bf98c27c8e0f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2752838995.mp3?updated=1690330866" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unpatched VMware ESXi instances attacked. Okatpus is back. Update on LockBit’s ransomware attack on ION. Charlie Hebdo hack attributed to Iran.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1754/notes</link>
      <description>New ransomware exploits a VMware ESXi vulnerability. Roasted 0ktapus squads up. LockBit says ION paid the ransom. Russian cyber auxiliaries continue attacks against healthcare organizations. Attribution on the Charlie Hebdo attack. Deepen Desai from Zscaler describes recent activity by Ducktail malware. Rick Howard looks at cyber threat intelligence. And the top US cyber diplomat says his Twitter account was hacked.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/24

Selected reading.
Ransomware Gang in Trading Hack Says Ransom Was Paid (Bloomberg)
Regulators weigh in on ION attack as LockBit takes credit (Register)
Russian hackers launch attack on City of London infrastructure (The Armchair Trader)
Ransomware attack on data firm ION could take days to fix -sources (Reuters)
Linux version of Royal Ransomware targets VMware ESXi servers (BleepingComputer)
Ransomware scum attack old VMWare ESXi vulnerability (Register)
Italy sounds alarm on large-scale computer hacking attack (Reuters)
Italy's TIM suffers internet connection problems (Reuters)
Italy sounds alarm on large-scale computer hacking attack (Jerusalem Post)
Italian National Cybersecurity Agency (ACN) warns of massive ransomware campaign targeting VMware ESXi servers (Security Affairs)
Campagne d’exploitation d’une vulnérabilité affectant VMware ESXi (CERT-FR)
VMSA-2021-0002 (VMware)
CERT-FR warns of a new wave of ransomware attacks targeting VMware ESXi servers (Security Affairs)
‘0ktapus’ hackers are back and targeting tech and gaming companies, says leaked report (TechCrunch)
Customizable new DDoS service already appears to have fans among pro-Russia hacking groups (The Record from Recorded Future News)
Russian Hackers Take Down At Least 17 U.S. Health System Websites (MedCity News)
Tallahassee Memorial HealthCare, Florida, has taken IT systems offline after cyberattack (Security Affairs)
Iran responsible for Charlie Hebdo attacks - Microsoft On the Issues (Microsoft On the Issues)
Piratage de « Charlie Hebdo » : un groupe iranien à la manœuvre, selon Microsoft (Le Monde)
Iran behind hack of French magazine Charlie Hebdo, Microsoft says (Reuters)
Microsoft attributes Charlie Hebdo data leak to Iran-linked NEPTUNIUM APT (Security Affairs
America's top cyber diplomat says his Twitter account was hacked (CNN)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 06 Feb 2023 21:15:00 -0000</pubDate>
      <itunes:title>Unpatched VMware ESXi instances attacked. Okatpus is back. Update on LockBit’s ransomware attack on ION. Charlie Hebdo hack attributed to Iran.  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1754</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>New ransomware exploits a VMware ESXi vulnerability. Roasted 0ktapus squads up. LockBit says ION paid the ransom. Russian cyber auxiliaries continue attacks against healthcare organizations. Attribution on the Charlie Hebdo attack. Deepen Desai from Zscaler describes recent activity by Ducktail malware. Rick Howard looks at cyber threat intelligence. And the top US cyber diplomat says his Twitter account was hacked.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/24

Selected reading.
Ransomware Gang in Trading Hack Says Ransom Was Paid (Bloomberg)
Regulators weigh in on ION attack as LockBit takes credit (Register)
Russian hackers launch attack on City of London infrastructure (The Armchair Trader)
Ransomware attack on data firm ION could take days to fix -sources (Reuters)
Linux version of Royal Ransomware targets VMware ESXi servers (BleepingComputer)
Ransomware scum attack old VMWare ESXi vulnerability (Register)
Italy sounds alarm on large-scale computer hacking attack (Reuters)
Italy's TIM suffers internet connection problems (Reuters)
Italy sounds alarm on large-scale computer hacking attack (Jerusalem Post)
Italian National Cybersecurity Agency (ACN) warns of massive ransomware campaign targeting VMware ESXi servers (Security Affairs)
Campagne d’exploitation d’une vulnérabilité affectant VMware ESXi (CERT-FR)
VMSA-2021-0002 (VMware)
CERT-FR warns of a new wave of ransomware attacks targeting VMware ESXi servers (Security Affairs)
‘0ktapus’ hackers are back and targeting tech and gaming companies, says leaked report (TechCrunch)
Customizable new DDoS service already appears to have fans among pro-Russia hacking groups (The Record from Recorded Future News)
Russian Hackers Take Down At Least 17 U.S. Health System Websites (MedCity News)
Tallahassee Memorial HealthCare, Florida, has taken IT systems offline after cyberattack (Security Affairs)
Iran responsible for Charlie Hebdo attacks - Microsoft On the Issues (Microsoft On the Issues)
Piratage de « Charlie Hebdo » : un groupe iranien à la manœuvre, selon Microsoft (Le Monde)
Iran behind hack of French magazine Charlie Hebdo, Microsoft says (Reuters)
Microsoft attributes Charlie Hebdo data leak to Iran-linked NEPTUNIUM APT (Security Affairs
America's top cyber diplomat says his Twitter account was hacked (CNN)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>New ransomware exploits a VMware ESXi vulnerability. Roasted 0ktapus squads up. LockBit says ION paid the ransom. Russian cyber auxiliaries continue attacks against healthcare organizations. Attribution on the Charlie Hebdo attack. Deepen Desai from Zscaler describes recent activity by Ducktail malware. Rick Howard looks at cyber threat intelligence. And the top US cyber diplomat says his Twitter account was hacked.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/24</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bloomberg.com/news/articles/2023-02-03/ion-removed-from-hacker-s-target-list-deadline-for-ransom-suspended">Ransomware Gang in Trading Hack Says Ransom Was Paid</a> (Bloomberg)</p><p><a href="https://www.theregister.com/2023/02/03/ion_ransomware_attack/">Regulators weigh in on ION attack as LockBit takes credit</a> (Register)</p><p><a href="https://www.thearmchairtrader.com/ion-markets-ransomware-attack/">Russian hackers launch attack on City of London infrastructure</a> (The Armchair Trader)</p><p><a href="https://www.reuters.com/technology/ransomware-attack-data-firm-ion-could-take-days-fix-sources-2023-02-02/">Ransomware attack on data firm ION could take days to fix -sources</a> (Reuters)</p><p><a href="https://www.bleepingcomputer.com/news/security/linux-version-of-royal-ransomware-targets-vmware-esxi-servers/">Linux version of Royal Ransomware targets VMware ESXi servers</a> (BleepingComputer)</p><p><a href="https://www.theregister.com/2023/02/06/esxi_ransomware_campaign/">Ransomware scum attack old VMWare ESXi vulnerability</a> (Register)</p><p><a href="https://www.reuters.com/world/europe/italy-sounds-alarm-large-scale-computer-hacking-attack-2023-02-05/">Italy sounds alarm on large-scale computer hacking attack</a> (Reuters)</p><p><a href="https://www.reuters.com/business/media-telecom/italys-tim-suffers-internet-connection-problems-2023-02-05/">Italy's TIM suffers internet connection problems</a> (Reuters)</p><p><a href="https://www.jpost.com/breaking-news/article-730673">Italy sounds alarm on large-scale computer hacking attack</a> (Jerusalem Post)</p><p><a href="https://securityaffairs.com/141865/cyber-crime/acn-ransomware-campaign-targets-vmware-esxi.html">Italian National Cybersecurity Agency (ACN) warns of massive ransomware campaign targeting VMware ESXi servers</a> (Security Affairs)</p><p><a href="https://www.cert.ssi.gouv.fr/alerte/CERTFR-2023-ALE-015/">Campagne d’exploitation d’une vulnérabilité affectant VMware ESXi</a> (CERT-FR)</p><p><a href="https://www.vmware.com/security/advisories/VMSA-2021-0002.html">VMSA-2021-0002</a> (VMware)</p><p><a href="https://securityaffairs.com/141804/cyber-crime/vmware-esxi-ransomware.html">CERT-FR warns of a new wave of ransomware attacks targeting VMware ESXi servers</a> (Security Affairs)</p><p><a href="https://techcrunch.com/2023/02/02/0ktapus-hackers-are-back-and-targeting-tech-and-gaming-companies-says-leaked-report/">‘0ktapus’ hackers are back and targeting tech and gaming companies, says leaked report</a> (TechCrunch)</p><p><a href="https://therecord.media/passion-botnet-customizable-pro-russia-hackers/">Customizable new DDoS service already appears to have fans among pro-Russia hacking groups</a> (The Record from Recorded Future News)</p><p><a href="https://medcitynews.com/2023/02/russian-hackers-take-down-at-least-17-u-s-health-system-websites/">Russian Hackers Take Down At Least 17 U.S. Health System Websites</a> (MedCity News)</p><p><a href="https://securityaffairs.com/141792/hacking/tallahassee-memorial-healthcare-cyberattack.html">Tallahassee Memorial HealthCare, Florida, has taken IT systems offline after cyberattack</a> (Security Affairs)</p><p><a href="https://blogs.microsoft.com/on-the-issues/2023/02/03/dtac-charlie-hebdo-hack-iran-neptunium/">Iran responsible for Charlie Hebdo attacks - Microsoft On the Issues</a> (Microsoft On the Issues)</p><p><a href="https://www.lemonde.fr/pixels/article/2023/02/03/piratage-de-charlie-hebdo-un-groupe-iranien-a-la-man-uvre-selon-microsoft_6160451_4408996.html">Piratage de « Charlie Hebdo » : un groupe iranien à la manœuvre, selon Microsoft</a> (Le Monde)</p><p><a href="https://www.reuters.com/business/media-telecom/iran-behind-hack-french-magazine-charlie-hebdo-microsoft-says-2023-02-03/">Iran behind hack of French magazine Charlie Hebdo, Microsoft says</a> (Reuters)</p><p><a href="https://securityaffairs.com/141855/apt/charlie-hebdo-data-leak-iran.html">Microsoft attributes Charlie Hebdo data leak to Iran-linked NEPTUNIUM APT</a> (Security Affairs</p><p><a href="https://www.cnn.com/2023/02/05/politics/nate-fick-twitter-hack-cybersecurity/index.html">America's top cyber diplomat says his Twitter account was hacked</a> (CNN)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1451</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[29e6949c-8167-11ed-9779-037c33e93e67]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7820043061.mp3?updated=1690330821" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>“Shift Left”: A case for threat-informed pentesting. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/45/notes</link>
      <description>Penetration testing is a vital part of a robust security program, but the traditional pentesting model is in a rut. Assessments happen infrequently, the scope is often very broad, and the report is usually overwhelming. What if you could increase the overall ROI of your pentesting program and avoid these limitations? Every penetration test should have specific goals. Coverage of the MITRE ATT&amp;CK framework or the OWASP Top Ten is a great start, but a pentest could provide exponential value by applying a more strategic approach.
In this episode of CyberWire-X, the CyberWire’s Rick Howard and Dave Bittner discuss what it means to "shift left" with your penetration testing by working on a threat-informed test plan with guests and Hash Table members Bob Turner, the Field CSO of Fortinet, Etay Maor, the Senior Director for Security Strategy at Cato Networks, and Dan DeCloss, the Founder and CEO of our episode sponsor PlexTrac. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 05 Feb 2023 08:00:00 -0000</pubDate>
      <itunes:title>“Shift Left”: A case for threat-informed pentesting. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>45</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Penetration testing is a vital part of a robust security program, but the traditional pentesting model is in a rut. Assessments happen infrequently, the scope is often very broad, and the report is usually overwhelming. What if you could increase the overall ROI of your pentesting program and avoid these limitations? Every penetration test should have specific goals. Coverage of the MITRE ATT&amp;CK framework or the OWASP Top Ten is a great start, but a pentest could provide exponential value by applying a more strategic approach.
In this episode of CyberWire-X, the CyberWire’s Rick Howard and Dave Bittner discuss what it means to "shift left" with your penetration testing by working on a threat-informed test plan with guests and Hash Table members Bob Turner, the Field CSO of Fortinet, Etay Maor, the Senior Director for Security Strategy at Cato Networks, and Dan DeCloss, the Founder and CEO of our episode sponsor PlexTrac. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Penetration testing is a vital part of a robust security program, but the traditional pentesting model is in a rut. Assessments happen infrequently, the scope is often very broad, and the report is usually overwhelming. What if you could increase the overall ROI of your pentesting program and avoid these limitations? Every penetration test should have specific goals. Coverage of the MITRE ATT&amp;CK framework or the OWASP Top Ten is a great start, but a pentest could provide exponential value by applying a more strategic approach.</p><p>In this episode of CyberWire-X, the CyberWire’s Rick Howard and Dave Bittner discuss what it means to "shift left" with your penetration testing by working on a threat-informed test plan with guests and Hash Table members Bob Turner, the Field CSO of Fortinet, Etay Maor, the Senior Director for Security Strategy at Cato Networks, and Dan DeCloss, the Founder and CEO of our episode sponsor PlexTrac. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1559</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1e1796f0-a0b8-11ed-ae2d-376cbd80b8f6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4422416689.mp3?updated=1674846646" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Yasmin Abdi: Find your community. [Security Engineer] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/135/notes</link>
      <description>Yasmin Abdi, a Security Engineering Manager at Snapchat and the CEO and Founder of NoHack, sits down to share her story on how she got to be in her amazing current roles. From a young age, Yasmin was fascinated by the overlap of cybersecurity and crime and law. In her time in college, she was able to intern at big tech companies like Snapchat, Google, and Facebook. She decided to stick with Snapchat, which had the security aspect and security composure that she wanted. In her role at Snapchat, she gets to work with her team to help take down all kinds of bad content and keep up the platform’s integrity, and found she fell in love with the work along the way. Yasmin shares the sage advice to grow your community as much as you can, saying to"form a community of like-minded people. People that you can bounce ideas off of, people that can help support you when times are low. Find mentors, find people that you aspire to be like, and really find that community of people." We thank Yasmin for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 05 Feb 2023 08:00:00 -0000</pubDate>
      <itunes:title>Yasmin Abdi: Find your community. [Security Engineer] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>135</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Yasmin Abdi, a Security Engineering Manager at Snapchat and the CEO and Founder of NoHack, sits down to share her story on how she got to be in her amazing current roles. From a young age, Yasmin was fascinated by the overlap of cybersecurity and crime and law. In her time in college, she was able to intern at big tech companies like Snapchat, Google, and Facebook. She decided to stick with Snapchat, which had the security aspect and security composure that she wanted. In her role at Snapchat, she gets to work with her team to help take down all kinds of bad content and keep up the platform’s integrity, and found she fell in love with the work along the way. Yasmin shares the sage advice to grow your community as much as you can, saying to"form a community of like-minded people. People that you can bounce ideas off of, people that can help support you when times are low. Find mentors, find people that you aspire to be like, and really find that community of people." We thank Yasmin for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Yasmin Abdi, a Security Engineering Manager at Snapchat and the CEO and Founder of NoHack, sits down to share her story on how she got to be in her amazing current roles. From a young age, Yasmin was fascinated by the overlap of cybersecurity and crime and law. In her time in college, she was able to intern at big tech companies like Snapchat, Google, and Facebook. She decided to stick with Snapchat, which had the security aspect and security composure that she wanted. In her role at Snapchat, she gets to work with her team to help take down all kinds of bad content and keep up the platform’s integrity, and found she fell in love with the work along the way. Yasmin shares the sage advice to grow your community as much as you can, saying to"form a community of like-minded people. People that you can bounce ideas off of, people that can help support you when times are low. Find mentors, find people that you aspire to be like, and really find that community of people." We thank Yasmin for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>538</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9dbad2ee-a3f3-11ed-86b4-a7159fbafa84]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5162629614.mp3?updated=1717764535" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Can ransomware turn machines against us? [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/267/notes</link>
      <description>Tom Bonner and Eoin Wickens from HiddenLayer's SAI Team to discuss their research on weaponizing machine learning models with ransomware. Researchers at HiddenLayer’s SAI Team have developed a proof-of-concept attack for surreptitiously deploying malware, such as ransomware or Cobalt Strike Beacon, via machine learning models.
The attack uses a technique currently undetected by many cybersecurity vendors and can serve as a launchpad for lateral movement, deployment of additional malware, or the theft of highly sensitive data. In this research the team raising awareness by demonstrate how easily an adversary can deploy malware through a pre-trained ML model.
The research can be found here:
WEAPONIZING MACHINE LEARNING MODELS WITH RANSOMWARE

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Feb 2023 08:00:00 -0000</pubDate>
      <itunes:title>Can ransomware turn machines against us? [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>267</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Tom Bonner and Eoin Wickens from HiddenLayer's SAI Team to discuss their research on weaponizing machine learning models with ransomware. Researchers at HiddenLayer’s SAI Team have developed a proof-of-concept attack for surreptitiously deploying malware, such as ransomware or Cobalt Strike Beacon, via machine learning models.
The attack uses a technique currently undetected by many cybersecurity vendors and can serve as a launchpad for lateral movement, deployment of additional malware, or the theft of highly sensitive data. In this research the team raising awareness by demonstrate how easily an adversary can deploy malware through a pre-trained ML model.
The research can be found here:
WEAPONIZING MACHINE LEARNING MODELS WITH RANSOMWARE

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tom Bonner and Eoin Wickens from HiddenLayer's SAI Team to discuss their research on weaponizing machine learning models with ransomware. Researchers at HiddenLayer’s SAI Team have developed a proof-of-concept attack for surreptitiously deploying malware, such as ransomware or Cobalt Strike Beacon, via machine learning models.</p><p>The attack uses a technique currently undetected by many cybersecurity vendors and can serve as a launchpad for lateral movement, deployment of additional malware, or the theft of highly sensitive data. In this research the team raising awareness by demonstrate how easily an adversary can deploy malware through a pre-trained ML model.</p><p>The research can be found here:</p><ul><li><a href="https://hiddenlayer.com/research/weaponizing-machine-learning-models-with-ransomware/">WEAPONIZING MACHINE LEARNING MODELS WITH RANSOMWARE</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1118</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cf3ac1a8-a321-11ed-a8d0-cf4830c5b6f7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1946473137.mp3?updated=1685127456" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage, and ransomware as misdirection. A new Python-based supply chain attack. Traffic on the Static Expressway. KillNet continues to plague hospitals. And Telegram may be compromised.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1753/notes</link>
      <description>CISA has released six ICS Advisories. A look at a North Korean cyberespionage campaign. ChatGPT and its attack potential. A new Python-based supply chain attack. There’s traffic on the Static Expressway: ClickFunnels seen in use for redirection. KillNet continues its campaign against hospitals. Ransomware as misdirection for cyberespionage. Part two of my conversation with Kathleen Smith of ClearedJobs.Net discussing trends in the cleared space. Our guest is Eric Bassier of Quantum talking about the multi-layered approach to ransomware protection. And Russian surveillance extends to Telegram chats.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/23

Selected reading.
Delta Electronics DIAScreen (CISA)
Mitsubishi Electric GOT2000 Series and GT SoftGOT2000 (CISA)
Baicells Nova (CISA) 
Delta Electronics DVW-W02W2-E2 (CISA)
Delta Electronics DX-2100-L1-CN (CISA)
Mitsubishi Electric GT SoftGOT2000 (CISA)
No Pineapple! –DPRK Targeting of Medical Research and Technology Sector (WithSecure)
Hackers linked to North Korea targeted Indian medical org, energy sector (The Record from Recorded Future News)
North Korean hackers stole research data in two-month-long breach (BleepingComputer)
ChatGPT May Already Be Used in Nation State Cyberattacks, Say IT Decision Makers in BlackBerry Global Research (BlackBerry)
Supply Chain Attack by New Malicious Python Package, “web3-essential” ((Frotinet)
Leveraging ClickFunnels to Bypass Security Services (Avanan)
Report: 'KillNet' targeting hospitals in countries helping Ukraine in war efforts (Becker’s Hospital Review)
Intelligence agency says ransomware group with Russian ties poses 'an enduring threat' to Canada (CBC)  
Les ransomwares, couverture des groupes APT pour du cyber-espionnage (Le Monde Informatique)
The Kremlin Has Entered the Chat (WIRED)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 03 Feb 2023 21:15:00 -0000</pubDate>
      <itunes:title>Cyberespionage, and ransomware as misdirection. A new Python-based supply chain attack. Traffic on the Static Expressway. KillNet continues to plague hospitals. And Telegram may be compromised.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1753</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA has released six ICS Advisories. A look at a North Korean cyberespionage campaign. ChatGPT and its attack potential. A new Python-based supply chain attack. There’s traffic on the Static Expressway: ClickFunnels seen in use for redirection. KillNet continues its campaign against hospitals. Ransomware as misdirection for cyberespionage. Part two of my conversation with Kathleen Smith of ClearedJobs.Net discussing trends in the cleared space. Our guest is Eric Bassier of Quantum talking about the multi-layered approach to ransomware protection. And Russian surveillance extends to Telegram chats.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/23

Selected reading.
Delta Electronics DIAScreen (CISA)
Mitsubishi Electric GOT2000 Series and GT SoftGOT2000 (CISA)
Baicells Nova (CISA) 
Delta Electronics DVW-W02W2-E2 (CISA)
Delta Electronics DX-2100-L1-CN (CISA)
Mitsubishi Electric GT SoftGOT2000 (CISA)
No Pineapple! –DPRK Targeting of Medical Research and Technology Sector (WithSecure)
Hackers linked to North Korea targeted Indian medical org, energy sector (The Record from Recorded Future News)
North Korean hackers stole research data in two-month-long breach (BleepingComputer)
ChatGPT May Already Be Used in Nation State Cyberattacks, Say IT Decision Makers in BlackBerry Global Research (BlackBerry)
Supply Chain Attack by New Malicious Python Package, “web3-essential” ((Frotinet)
Leveraging ClickFunnels to Bypass Security Services (Avanan)
Report: 'KillNet' targeting hospitals in countries helping Ukraine in war efforts (Becker’s Hospital Review)
Intelligence agency says ransomware group with Russian ties poses 'an enduring threat' to Canada (CBC)  
Les ransomwares, couverture des groupes APT pour du cyber-espionnage (Le Monde Informatique)
The Kremlin Has Entered the Chat (WIRED)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA has released six ICS Advisories. A look at a North Korean cyberespionage campaign. ChatGPT and its attack potential. A new Python-based supply chain attack. There’s traffic on the Static Expressway: ClickFunnels seen in use for redirection. KillNet continues its campaign against hospitals. Ransomware as misdirection for cyberespionage. Part two of my conversation with Kathleen Smith of ClearedJobs.Net discussing trends in the cleared space. Our guest is Eric Bassier of Quantum talking about the multi-layered approach to ransomware protection. And Russian surveillance extends to Telegram chats.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/23</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-033-01">Delta Electronics DIAScreen</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-033-02">Mitsubishi Electric GOT2000 Series and GT SoftGOT2000</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-033-03">Baicells Nova</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-033-04">Delta Electronics DVW-W02W2-E2</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-033-05">Delta Electronics DX-2100-L1-CN</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-221-01">Mitsubishi Electric GT SoftGOT2000</a> (CISA)</p><p><a href="https://labs.withsecure.com/publications/no-pineapple-dprk-targeting-of-medical-research-and-technology-sector">No Pineapple! –DPRK Targeting of Medical Research and Technology Sector</a> (WithSecure)</p><p><a href="https://therecord.media/hackers-linked-to-north-korea-targeted-indian-medical-org-energy-sector/">Hackers linked to North Korea targeted Indian medical org, energy sector</a> (The Record from Recorded Future News)</p><p><a href="https://www.bleepingcomputer.com/news/security/north-korean-hackers-stole-research-data-in-two-month-long-breach/">North Korean hackers stole research data in two-month-long breach</a> (BleepingComputer)</p><p><a href="https://www.blackberry.com/us/en/company/newsroom/press-releases/2023/chatgpt-may-already-be-used-in-nation-state-cyberattacks-say-it-decision-makers-in-blackberry-global-research">ChatGPT May Already Be Used in Nation State Cyberattacks, Say IT Decision Makers in BlackBerry Global Research</a> (BlackBerry)</p><p><a href="https://www.fortinet.com/blog/threat-research/supply-chain-attack-by-new-malicious-python-package-web3-essential">Supply Chain Attack by New Malicious Python Package, “web3-essential”</a> ((Frotinet)</p><p><a href="https://www.avanan.com/blog/leveraging-clickfunnels-to-bypass-security-services">Leveraging ClickFunnels to Bypass Security Services</a> (Avanan)</p><p><a href="https://www.beckershospitalreview.com/cybersecurity/report-killnet-targeting-hospitals-in-countries-helping-ukraine-in-war-efforts.html">Report: 'KillNet' targeting hospitals in countries helping Ukraine in war efforts</a> (Becker’s Hospital Review)</p><p><a href="https://www.cbc.ca/news/politics/cse-lockbit-threat-1.6734996">Intelligence agency says ransomware group with Russian ties poses 'an enduring threat' to Canada</a> (CBC)  </p><p><a href="https://www.lemondeinformatique.fr/actualites/lire-les-ransomwares-couverture-des-groupes-apt-pour-du-cyber-espionnage-89428.html">Les ransomwares, couverture des groupes APT pour du cyber-espionnage</a> (Le Monde Informatique)</p><p><a href="https://www.wired.com/story/the-kremlin-has-entered-the-chat/">The Kremlin Has Entered the Chat</a> (WIRED)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1721</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[29cfad72-8167-11ed-9779-bb0d83e4782d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5830535596.mp3?updated=1690320772" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cisco fixes vulnerabilities in ICS appliances. NIST’s anti-phishing guidelines. OneNote exploitation. HeadCrab malware. Recent actions by Russian threat actors. Trends in state-directed cyber ops.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1752/notes</link>
      <description>Cisco patches a command injection vulnerability. NIST issues antiphishing guidance. HeadCrab malware's worldwide distribution campaign. The Gamaredon APT is more interested in collection than destruction. Kathleen Smith of ClearedJobs.Net looks at hiring trends in the cleared community. Bennett from Signifyd describes the fraud ring that’s launched a war on commerce against U.S. merchants. And trends in cyberattacks by state-sponsored actors.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/22

Selected reading.
Command-Injection Bug in Cisco Industrial Gear Opens Devices to Complete Takeover (Dark Reading)
Phishing Resistance – Protecting the Keys to Your Kingdom (NIST) 
OneNote Documents Increasingly Used to Deliver Malware | Proofpoint UK (Proofpoint)
HeadCrab: A Novel State-of-the-Art Redis Malware in a Global Campaign (Aquasec) 
Another UAC-0010 Story (The State Cyber Protection Centre of the State Service of Special Communication and Information Protection of Ukraine)
Russia-backed hacker group Gamaredon attacking Ukraine with info-stealing malware (The Record from Recorded Future News)
City of London traders hit by Russia-linked cyber attack (The Telegraph)
ChristianaCare recovers from cyberattack, restores website service (6abc Philadelphia) 
Nation-State Threats and the Rise of Cyber Mercenaries: Exploring the Microsoft Digital Defense Report (CSO Online)
Microsoft Digital Defense Report 2022 (Microsoft Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 02 Feb 2023 21:15:00 -0000</pubDate>
      <itunes:title>Cisco fixes vulnerabilities in ICS appliances. NIST’s anti-phishing guidelines. OneNote exploitation. HeadCrab malware. Recent actions by Russian threat actors. Trends in state-directed cyber ops.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1752</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cisco patches a command injection vulnerability. NIST issues antiphishing guidance. HeadCrab malware's worldwide distribution campaign. The Gamaredon APT is more interested in collection than destruction. Kathleen Smith of ClearedJobs.Net looks at hiring trends in the cleared community. Bennett from Signifyd describes the fraud ring that’s launched a war on commerce against U.S. merchants. And trends in cyberattacks by state-sponsored actors.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/22

Selected reading.
Command-Injection Bug in Cisco Industrial Gear Opens Devices to Complete Takeover (Dark Reading)
Phishing Resistance – Protecting the Keys to Your Kingdom (NIST) 
OneNote Documents Increasingly Used to Deliver Malware | Proofpoint UK (Proofpoint)
HeadCrab: A Novel State-of-the-Art Redis Malware in a Global Campaign (Aquasec) 
Another UAC-0010 Story (The State Cyber Protection Centre of the State Service of Special Communication and Information Protection of Ukraine)
Russia-backed hacker group Gamaredon attacking Ukraine with info-stealing malware (The Record from Recorded Future News)
City of London traders hit by Russia-linked cyber attack (The Telegraph)
ChristianaCare recovers from cyberattack, restores website service (6abc Philadelphia) 
Nation-State Threats and the Rise of Cyber Mercenaries: Exploring the Microsoft Digital Defense Report (CSO Online)
Microsoft Digital Defense Report 2022 (Microsoft Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cisco patches a command injection vulnerability. NIST issues antiphishing guidance. HeadCrab malware's worldwide distribution campaign. The Gamaredon APT is more interested in collection than destruction. Kathleen Smith of ClearedJobs.Net looks at hiring trends in the cleared community. Bennett from Signifyd describes the fraud ring that’s launched a war on commerce against U.S. merchants. And trends in cyberattacks by state-sponsored actors.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/22</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.darkreading.com/ics-ot/command-injection-bug-cisco-industrial-gear-devices-complete-takeover">Command-Injection Bug in Cisco Industrial Gear Opens Devices to Complete Takeover</a> (Dark Reading)</p><p><a href="https://www.nist.gov/blogs/cybersecurity-insights/phishing-resistance-protecting-keys-your-kingdom">Phishing Resistance – Protecting the Keys to Your Kingdom</a> (NIST) </p><p><a href="https://www.proofpoint.com/uk/blog/threat-insight/onenote-documents-increasingly-used-to-deliver-malware">OneNote Documents Increasingly Used to Deliver Malware | Proofpoint UK</a> (Proofpoint)</p><p><a href="https://blog.aquasec.com/headcrab-attacks-servers-worldwide-with-novel-state-of-art-redis-malware">HeadCrab: A Novel State-of-the-Art Redis Malware in a Global Campaign</a> (Aquasec) </p><p><a href="https://scpc.gov.ua/api/docs/19b0a96e-8c31-44bf-863e-cd3e0b651f22/19b0a96e-8c31-44bf-863e-cd3e0b651f22.pdf">Another UAC-0010 Story</a> (The State Cyber Protection Centre of the State Service of Special Communication and Information Protection of Ukraine)</p><p><a href="https://therecord.media/russia-backed-hacker-group-gamaredon-attacking-ukraine-with-info-stealing-malware/">Russia-backed hacker group Gamaredon attacking Ukraine with info-stealing malware</a> (The Record from Recorded Future News)</p><p><a href="https://www.telegraph.co.uk/business/2023/02/01/city-london-traders-hit-russia-linked-cyber-attack/">City of London traders hit by Russia-linked cyber attack</a> (The Telegraph)</p><p><a href="https://6abc.com/ddos-cyberattack-christianacare-hospitals-christiana-hospital-hacked/12757591/">ChristianaCare recovers from cyberattack, restores website service</a> (6abc Philadelphia) </p><p><a href="https://www.csoonline.com/article/3687028/nation-state-threats-and-the-rise-of-cyber-mercenaries-exploring-the-microsoft-digital-defense-repo.html">Nation-State Threats and the Rise of Cyber Mercenaries: Exploring the Microsoft Digital Defense Report</a> (CSO Online)</p><p><a href="https://www.microsoft.com/en-us/security/business/microsoft-digital-defense-report-2022">Microsoft Digital Defense Report 2022</a> (Microsoft Security)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1821</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[29b9f194-8167-11ed-9779-5bf39e4fd1c7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8903122440.mp3?updated=1690320734" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How the C2C market sustains ransomware gangs. In Russia’s war, intelligence services deploy wipers, and hacktivist auxiliaries handle the DDoS. And a look into other corners of the cyber underworld.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1751/notes</link>
      <description>Microsoft tallies more than a hundred ransomware gangs. Sandworm's NikoWiper hits Ukraine's energy sector. Mobilizing cybercriminals in a hybrid war. Firebrick Ostrich and business email compromise. Telegram is used for sharing stolen data and selling malware. Crypto scams find their way into app stores. Bryan Vorndran of the FBI Cyber Division outlines the services the FBI provides during an incident response. Ann Johnson from Afternoon Cyber Tea speaks with actor producer Tim Murck about the intersection of cyber awareness and storytelling. And we are shocked - shocked! - that there are fraudulent cyber professional credentials circulating online.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/21

Selected reading.
Microsoft: Over 100 threat actors deploy ransomware in attacks (BleepingComputer) 
SocGholish: A Tale of FakeUpdates (Reliaquest)
ESET APT Activity Report T3 2022 (WeLiveSecurity) 
Pro-Russian DDoS attacks raise alarm in Denmark, U.S. (The Record from Recorded Future News)
ChristianaCare's website restored after attack; pro-Russia 'hacktivist' group takes credit (Delaware News Journal)
Univ. of Iowa Hospitals website possibly hit by cyberattack (KCRG)
Cyber attack causes problems with UM Health websites (The Detroit News)
How the war in Ukraine has strengthened the Kremlin's ties with cybercriminals (The Record from Recorded Future News)
Dark Covenant 2.0: Cybercrime, the Russian State, and War in Ukraine (Recored Future)
Russia’s cyberwar against Ukraine offers vital lessons for the West (Atlantic Council) 
BEC Group Uses Secondary Personas &amp; Lookalike Domains in Third-Party… (Abnormal Intelligence)
Telegram's place in the cyber underworld. (CyberWire)
Crypto scams found in the App Store. (CyberWire)
Exposure to third-party risk. (CyberWire)
Cyber certification deceit. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 01 Feb 2023 21:15:00 -0000</pubDate>
      <itunes:title>How the C2C market sustains ransomware gangs. In Russia’s war, intelligence services deploy wipers, and hacktivist auxiliaries handle the DDoS. And a look into other corners of the cyber underworld.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1751</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Microsoft tallies more than a hundred ransomware gangs. Sandworm's NikoWiper hits Ukraine's energy sector. Mobilizing cybercriminals in a hybrid war. Firebrick Ostrich and business email compromise. Telegram is used for sharing stolen data and selling malware. Crypto scams find their way into app stores. Bryan Vorndran of the FBI Cyber Division outlines the services the FBI provides during an incident response. Ann Johnson from Afternoon Cyber Tea speaks with actor producer Tim Murck about the intersection of cyber awareness and storytelling. And we are shocked - shocked! - that there are fraudulent cyber professional credentials circulating online.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/21

Selected reading.
Microsoft: Over 100 threat actors deploy ransomware in attacks (BleepingComputer) 
SocGholish: A Tale of FakeUpdates (Reliaquest)
ESET APT Activity Report T3 2022 (WeLiveSecurity) 
Pro-Russian DDoS attacks raise alarm in Denmark, U.S. (The Record from Recorded Future News)
ChristianaCare's website restored after attack; pro-Russia 'hacktivist' group takes credit (Delaware News Journal)
Univ. of Iowa Hospitals website possibly hit by cyberattack (KCRG)
Cyber attack causes problems with UM Health websites (The Detroit News)
How the war in Ukraine has strengthened the Kremlin's ties with cybercriminals (The Record from Recorded Future News)
Dark Covenant 2.0: Cybercrime, the Russian State, and War in Ukraine (Recored Future)
Russia’s cyberwar against Ukraine offers vital lessons for the West (Atlantic Council) 
BEC Group Uses Secondary Personas &amp; Lookalike Domains in Third-Party… (Abnormal Intelligence)
Telegram's place in the cyber underworld. (CyberWire)
Crypto scams found in the App Store. (CyberWire)
Exposure to third-party risk. (CyberWire)
Cyber certification deceit. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft tallies more than a hundred ransomware gangs. Sandworm's NikoWiper hits Ukraine's energy sector. Mobilizing cybercriminals in a hybrid war. Firebrick Ostrich and business email compromise. Telegram is used for sharing stolen data and selling malware. Crypto scams find their way into app stores. Bryan Vorndran of the FBI Cyber Division outlines the services the FBI provides during an incident response. Ann Johnson from Afternoon Cyber Tea speaks with actor producer Tim Murck about the intersection of cyber awareness and storytelling. And we are shocked - shocked! - that there are fraudulent cyber professional credentials circulating online.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/21</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-over-100-threat-actors-deploy-ransomware-in-attacks/">Microsoft: Over 100 threat actors deploy ransomware in attacks</a> (BleepingComputer) </p><p><a href="https://www.reliaquest.com/i/blog/socgholish-fakeupdates/">SocGholish: A Tale of FakeUpdates</a> (Reliaquest)</p><p><a href="https://www.welivesecurity.com/2023/01/31/eset-apt-activity-report-t3-2022/">ESET APT Activity Report T3 2022</a> (WeLiveSecurity) </p><p><a href="https://therecord.media/ddos-denmark-us-russia-killnet/">Pro-Russian DDoS attacks raise alarm in Denmark, U.S.</a> (The Record from Recorded Future News)</p><p><a href="https://www.delawareonline.com/story/news/2023/01/31/christianacare-website-down-pro-russian-cyber-attack-killnet-virus-hack/69860474007/">ChristianaCare's website restored after attack; pro-Russia 'hacktivist' group takes credit</a> (Delaware News Journal)</p><p><a href="https://www.kcrg.com/2023/01/31/uihc-website-possibly-hit-by-cyber-attack/">Univ. of Iowa Hospitals website possibly hit by cyberattack</a> (KCRG)</p><p><a href="https://www.detroitnews.com/story/news/local/michigan/2023/01/31/university-of-michigan-health-websites-experience-cyber-attack-killnet-ukraine/69857500007/">Cyber attack causes problems with UM Health websites</a> (The Detroit News)</p><p><a href="https://therecord.media/how-the-war-in-ukraine-has-strengthened-the-kremlins-ties-with-cybercriminals/">How the war in Ukraine has strengthened the Kremlin's ties with cybercriminals</a> (The Record from Recorded Future News)</p><p><a href="https://www.recordedfuture.com/dark-covenant-2-cybercrime-russian-state-war-ukraine">Dark Covenant 2.0: Cybercrime, the Russian State, and War in Ukraine</a> (Recored Future)</p><p><a href="https://www.atlanticcouncil.org/blogs/ukrainealert/russias-cyberwar-against-ukraine-offers-vital-lessons-for-the-west/">Russia’s cyberwar against Ukraine offers vital lessons for the West</a> (Atlantic Council) </p><p><a href="https://intelligence.abnormalsecurity.com/blog/firebrick-ostrich-third-party-reconnaissance-attacks">BEC Group Uses Secondary Personas &amp; Lookalike Domains in Third-Party…</a> (Abnormal Intelligence)</p><p><a href="https://thecyberwire.com/stories/7aff6406e6b24adc8a68a7d1b3dbf2a2/telegrams-place-in-the-cyber-underworld">Telegram's place in the cyber underworld.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/0d451db83aed4431819359bf2acecbf1/crypto-scams-found-in-the-app-store">Crypto scams found in the App Store.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/f1b3816ddeed4518b7d97715786aae4f/exposure-to-third-party-risk">Exposure to third-party risk.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/fe3e6a60bc204248b1144f67ea7ec64c/cyber-certification-deceit">Cyber certification deceit.</a> (CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1894</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[29a4e45c-8167-11ed-9779-ef018f01a670]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8796611980.mp3?updated=1690320700" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The cybercriminal labor market and the campaigns it’s supporting. Russia’s Killnet is running DDoS attacks against US hospitals, but Russia says, hey, it’s the real victim here.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1750/notes</link>
      <description>Some perspective on the cybercriminal labor market. DocuSign is impersonated in a credential-harvesting campaign. Social engineering pursues financial advisors. Killnet is active against the US healthcare sector. Mr. Security Answer Person John Pescatore has thoughts on cryptocurrency. Ben Yelin and I debate the limits of section 230. And, hey, who’s the real victim in cyberspace? A hint: probably not you, Mr. Putin.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/20

Selected reading.
Perspectives on the cybercriminal labor market. (CyberWire).
IT specialists search and recruitment on the dark web (Securelist)
Cybercrime job ads on the dark web pay up to $20k per month (BleepingComputer) 
Report on hackers' salaries shows poor wages for developers (Register)
Cybercrime groups offer six-figure salaries, bonuses, paid time off to attract talent on dark web (CyberScoop)
Application security risks. (CyberWire)
Survey gives insight into new app security challenges (Cisco App Dynamics)
DocuSign impersonated in credential phishing attack. (CyberWIre)
Breaking the Impersonation: Armorblox Stops DocuSign Attack (Armorblox)
"Pig butchering" and financial advisor impersonation scams. (CyberWire)
No Blocking, No Issue: The Curious Ecosystem of Financial Advisor Impersonation Scams (Domain Tools)
Ukraine at D+341: Killnet hits US hospitals.(CyberWire)
HC3 TLP Clear Analyst Note: Pro-Russian Hacktivist Group Threat to HPH Sector (American Hospital Association)
HHS, AHA Warn of Surge in Russian DDoS Attacks on Hospitals (Gov Info Security) 
Russian hackers allegedly take down Duke University Hospital’s website (Carolina Journal)
The Evolution of DDoS: Return of the Hacktivist (FSISAC)
Russia becomes target of West’s coordinated aggression in cyberspace — MFA (TASS)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 31 Jan 2023 21:15:00 -0000</pubDate>
      <itunes:title>The cybercriminal labor market and the campaigns it’s supporting. Russia’s Killnet is running DDoS attacks against US hospitals, but Russia says, hey, it’s the real victim here.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1750</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Some perspective on the cybercriminal labor market. DocuSign is impersonated in a credential-harvesting campaign. Social engineering pursues financial advisors. Killnet is active against the US healthcare sector. Mr. Security Answer Person John Pescatore has thoughts on cryptocurrency. Ben Yelin and I debate the limits of section 230. And, hey, who’s the real victim in cyberspace? A hint: probably not you, Mr. Putin.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/20

Selected reading.
Perspectives on the cybercriminal labor market. (CyberWire).
IT specialists search and recruitment on the dark web (Securelist)
Cybercrime job ads on the dark web pay up to $20k per month (BleepingComputer) 
Report on hackers' salaries shows poor wages for developers (Register)
Cybercrime groups offer six-figure salaries, bonuses, paid time off to attract talent on dark web (CyberScoop)
Application security risks. (CyberWire)
Survey gives insight into new app security challenges (Cisco App Dynamics)
DocuSign impersonated in credential phishing attack. (CyberWIre)
Breaking the Impersonation: Armorblox Stops DocuSign Attack (Armorblox)
"Pig butchering" and financial advisor impersonation scams. (CyberWire)
No Blocking, No Issue: The Curious Ecosystem of Financial Advisor Impersonation Scams (Domain Tools)
Ukraine at D+341: Killnet hits US hospitals.(CyberWire)
HC3 TLP Clear Analyst Note: Pro-Russian Hacktivist Group Threat to HPH Sector (American Hospital Association)
HHS, AHA Warn of Surge in Russian DDoS Attacks on Hospitals (Gov Info Security) 
Russian hackers allegedly take down Duke University Hospital’s website (Carolina Journal)
The Evolution of DDoS: Return of the Hacktivist (FSISAC)
Russia becomes target of West’s coordinated aggression in cyberspace — MFA (TASS)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Some perspective on the cybercriminal labor market. DocuSign is impersonated in a credential-harvesting campaign. Social engineering pursues financial advisors. Killnet is active against the US healthcare sector. Mr. Security Answer Person John Pescatore has thoughts on cryptocurrency. Ben Yelin and I debate the limits of section 230. And, hey, who’s the real victim in cyberspace? A hint: probably not you, Mr. Putin.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/20</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/stories/6abf397f17f24878b7d78dabc963f5d9/perspectives-on-the-cybercriminal-labor-market">Perspectives on the cybercriminal labor market.</a> (CyberWire).</p><p><a href="https://securelist.com/darknet-it-headhunting/108526/">IT specialists search and recruitment on the dark web</a> (Securelist)</p><p><a href="https://www.bleepingcomputer.com/news/security/cybercrime-job-ads-on-the-dark-web-pay-up-to-20k-per-month/">Cybercrime job ads on the dark web pay up to $20k per month</a> (BleepingComputer) </p><p><a href="https://www.theregister.com/2023/01/30/dark_web_it_employment_kaspersky/">Report on hackers' salaries shows poor wages for developers</a> (Register)</p><p><a href="https://cyberscoop.com/cybercrime-groups-jobs-talent-dark-web/">Cybercrime groups offer six-figure salaries, bonuses, paid time off to attract talent on dark web</a> (CyberScoop)</p><p><a href="https://thecyberwire.com/stories/5cc4c8d6946246c3b66a3d1acec566a4/application-security-risks">Application security risks.</a> (CyberWire)</p><p><a href="https://www.appdynamics.com/blog/security/shift-to-a-security-approach-for-the-full-application/">Survey gives insight into new app security challenges</a> (Cisco App Dynamics)</p><p><a href="https://thecyberwire.com/stories/e039700c45564800adf4f1cb27550858/docusign-impersonated-in-credential-phishing-attack">DocuSign impersonated in credential phishing attack.</a> (CyberWIre)</p><p><a href="https://www.armorblox.com/blog/breaking-the-impersonation-armorblox-stops-docusign-attack/">Breaking the Impersonation: Armorblox Stops DocuSign Attack</a> (Armorblox)</p><p><a href="https://thecyberwire.com/stories/7e0f5b10c1074ff2a051afab92bbf1b5/pig-butchering-and-financial-advisor-impersonation-scams">"Pig butchering" and financial advisor impersonation scams.</a> (CyberWire)</p><p><a href="https://www.domaintools.com/resources/blog/no-blocking-no-issue-the-curious-ecosystem-of-financial-advisor-impersonation-scams/">No Blocking, No Issue: The Curious Ecosystem of Financial Advisor Impersonation Scams</a> (Domain Tools)</p><p><a href="https://thecyberwire.com/stories/3ff2888baae84cfeacd05f11dd8f9589/ukraine-at-d341-killnet-hits-us-hospitals">Ukraine at D+341: Killnet hits US hospitals.</a>(CyberWire)</p><p><a href="https://www.aha.org/cybersecurity-government-intelligence-reports/2023-01-30-hc3-tlp-clear-analyst-note-pro-russian-hacktivist-group-threat-hph">HC3 TLP Clear Analyst Note: Pro-Russian Hacktivist Group Threat to HPH Sector</a> (American Hospital Association)</p><p><a href="https://www.govinfosecurity.com/hhs-aha-warn-surge-in-russian-ddos-attacks-on-hospitals-a-21050">HHS, AHA Warn of Surge in Russian DDoS Attacks on Hospitals</a> (Gov Info Security) </p><p><a href="https://www.carolinajournal.com/russian-hackers-allegedly-take-down-duke-university-hospitals-website/">Russian hackers allegedly take down Duke University Hospital’s website</a> (Carolina Journal)</p><p><a href="https://www.fsisac.com/akamai-ddos-report?utm_campaign=AkamaiDDoSReport2023&amp;utm_source=Bloomberg">The Evolution of DDoS: Return of the Hacktivist</a> (FSISAC)</p><p><a href="https://tass.com/russia/1568405">Russia becomes target of West’s coordinated aggression in cyberspace — MFA</a> (TASS)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1770</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[463e004a-787a-11ec-abf0-eb0e7b5b394b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2463621124.mp3?updated=1690320682" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Criminal evolutions, disgruntled insiders, and gangsta wannabes. New wiper attacks hit Ukrainian targets, with less effect than the first rounds early last year. And support your local hacktivist? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1749/notes</link>
      <description>Gootloader's evolution. Yandex source code leaked (and Yandex blames a rogue insider). New GRU wiper malware is active against Ukraine. Latvia reports cyberattacks by Gamaredon. Russia and the US trade accusations of malign cyber activity. A hacktivist auxiliary's social support system. Deepen Desai from Zscaler describes the Lilithbot malware. Rick Howard looks at chaotic simians. And wannabes can be a nuisance, too: LockBit impersonators are seen operating in northern Europe.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/19

Selected reading.
Welcome to Goot Camp: Tracking the Evolution of GOOTLOADER Operations (Mandiant) 
Yandex denies hack, blames source code leak on former employee (BleepingComputer) 
Hackers use new SwiftSlicer wiper to destroy Windows domains (BleepingComputer) 
Sandworm APT targets Ukraine with new SwiftSlicer wiper (Security Affairs) 
Ukraine: Sandworm hackers hit news agency with 5 data wipers (BleepingComputer)
Ukraine Links Media Center Attack to Russian Intelligence (BankInfoSecurity) 
Latvia confirms phishing attack on Ministry of Defense, linking it to Russian hacking group (The Record from Recorded Future News) 
Russia knows US recruits hackers, trains Ukrainian IT-army — Deputy Foreign Minister (TASS)
Taking down the Hive ransomware gang. (CyberWire)
US puts a $10m bounty on Hive while Russia shuts down access (Register) 
Exploring Killnet’s Social Circles (Radware)
Copycat Criminals mimicking Lockbit gang in northern Europe (Security Affairs)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 30 Jan 2023 22:00:00 -0000</pubDate>
      <itunes:title>Criminal evolutions, disgruntled insiders, and gangsta wannabes. New wiper attacks hit Ukrainian targets, with less effect than the first rounds early last year. And support your local hacktivist? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1749</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Gootloader's evolution. Yandex source code leaked (and Yandex blames a rogue insider). New GRU wiper malware is active against Ukraine. Latvia reports cyberattacks by Gamaredon. Russia and the US trade accusations of malign cyber activity. A hacktivist auxiliary's social support system. Deepen Desai from Zscaler describes the Lilithbot malware. Rick Howard looks at chaotic simians. And wannabes can be a nuisance, too: LockBit impersonators are seen operating in northern Europe.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/19

Selected reading.
Welcome to Goot Camp: Tracking the Evolution of GOOTLOADER Operations (Mandiant) 
Yandex denies hack, blames source code leak on former employee (BleepingComputer) 
Hackers use new SwiftSlicer wiper to destroy Windows domains (BleepingComputer) 
Sandworm APT targets Ukraine with new SwiftSlicer wiper (Security Affairs) 
Ukraine: Sandworm hackers hit news agency with 5 data wipers (BleepingComputer)
Ukraine Links Media Center Attack to Russian Intelligence (BankInfoSecurity) 
Latvia confirms phishing attack on Ministry of Defense, linking it to Russian hacking group (The Record from Recorded Future News) 
Russia knows US recruits hackers, trains Ukrainian IT-army — Deputy Foreign Minister (TASS)
Taking down the Hive ransomware gang. (CyberWire)
US puts a $10m bounty on Hive while Russia shuts down access (Register) 
Exploring Killnet’s Social Circles (Radware)
Copycat Criminals mimicking Lockbit gang in northern Europe (Security Affairs)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Gootloader's evolution. Yandex source code leaked (and Yandex blames a rogue insider). New GRU wiper malware is active against Ukraine. Latvia reports cyberattacks by Gamaredon. Russia and the US trade accusations of malign cyber activity. A hacktivist auxiliary's social support system. Deepen Desai from Zscaler describes the Lilithbot malware. Rick Howard looks at chaotic simians. And wannabes can be a nuisance, too: LockBit impersonators are seen operating in northern Europe.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/19</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.mandiant.com/resources/blog/tracking-evolution-gootloader-operations">Welcome to Goot Camp: Tracking the Evolution of GOOTLOADER Operations</a> (Mandiant) </p><p><a href="https://www.bleepingcomputer.com/news/security/yandex-denies-hack-blames-source-code-leak-on-former-employee/">Yandex denies hack, blames source code leak on former employee</a> (BleepingComputer) </p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-use-new-swiftslicer-wiper-to-destroy-windows-domains/">Hackers use new SwiftSlicer wiper to destroy Windows domains</a> (BleepingComputer) </p><p><a href="https://securityaffairs.com/141473/apt/sandworm-targets-ukraine-swiftslicer.html">Sandworm APT targets Ukraine with new SwiftSlicer wiper</a> (Security Affairs) </p><p><a href="https://www.bleepingcomputer.com/news/security/ukraine-sandworm-hackers-hit-news-agency-with-5-data-wipers/">Ukraine: Sandworm hackers hit news agency with 5 data wipers</a> (BleepingComputer)</p><p><a href="https://www.bankinfosecurity.com/ukraine-links-media-center-attack-to-russian-intelligence-a-21043">Ukraine Links Media Center Attack to Russian Intelligence</a> (BankInfoSecurity) </p><p><a href="https://therecord.media/latvia-confirms-phishing-attack-on-ministry-of-defense-linking-it-to-russian-hacking-group/">Latvia confirms phishing attack on Ministry of Defense, linking it to Russian hacking group</a> (The Record from Recorded Future News) </p><p><a href="https://tass.com/politics/1568343">Russia knows US recruits hackers, trains Ukrainian IT-army — Deputy Foreign Minister</a> (TASS)</p><p><a href="https://thecyberwire.com/stories/539fd8ef58e34493b6efc210dba21074/taking-down-the-hive-ransomware-gang">Taking down the Hive ransomware gang</a>. (CyberWire)</p><p><a href="https://www.theregister.com/2023/01/27/10m_hive_reward_russia/">US puts a $10m bounty on Hive while Russia shuts down access</a> (Register) </p><p><a href="https://blog.radware.com/security/threat-intelligence/2023/01/exploring-killnets-social-circles/">Exploring Killnet’s Social Circles</a> (Radware)</p><p><a href="https://securityaffairs.com/141491/cyber-crime/crooks-mimicking-lockbit-gang.html">Copycat Criminals mimicking Lockbit gang in northern Europe</a> (Security Affairs)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1515</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[475dff5c-787a-11ec-abf0-dbcfc8b3c4ee]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1108024863.mp3?updated=1690320613" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Charlie Moore: Pilot to head honcho in cyber. [Cyber Command] [Career Notes[</title>
      <link>https://thecyberwire.com/podcasts/career-notes/134/notes</link>
      <description>Our guest, Charlie Moore, is a recently retired USAF Lieutenant General who sits down to share his story from flying high in the air to becoming a bigwig in the cyber community. He was most recently the Deputy Commander of the United States Cyber Command, and also spent part of his career as a human factors engineer working on human interfaces for fighter aircraft. When he first began his Air Force career, he was a member of the last class entering into the Academy that was not issued desktop computers. Charlie discusses how this changed as the year went on and how that impacted his career both in and out of the military. Charlie worked for different companies over the years to further his career and his goals, and discusses how his flying career has helped him and says, "I was extremely passionate about the flying aspect of my career for 25 years and I became even more passionate about operating in this space." We thank Charlie for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 29 Jan 2023 08:00:00 -0000</pubDate>
      <itunes:title>Charlie Moore: Pilot to head honcho in cyber. [Cyber Command] [Career Notes[</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>134</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Our guest, Charlie Moore, is a recently retired USAF Lieutenant General who sits down to share his story from flying high in the air to becoming a bigwig in the cyber community. He was most recently the Deputy Commander of the United States Cyber Command, and also spent part of his career as a human factors engineer working on human interfaces for fighter aircraft. When he first began his Air Force career, he was a member of the last class entering into the Academy that was not issued desktop computers. Charlie discusses how this changed as the year went on and how that impacted his career both in and out of the military. Charlie worked for different companies over the years to further his career and his goals, and discusses how his flying career has helped him and says, "I was extremely passionate about the flying aspect of my career for 25 years and I became even more passionate about operating in this space." We thank Charlie for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our guest, Charlie Moore, is a recently retired USAF Lieutenant General who sits down to share his story from flying high in the air to becoming a bigwig in the cyber community. He was most recently the Deputy Commander of the United States Cyber Command, and also spent part of his career as a human factors engineer working on human interfaces for fighter aircraft. When he first began his Air Force career, he was a member of the last class entering into the Academy that was not issued desktop computers. Charlie discusses how this changed as the year went on and how that impacted his career both in and out of the military. Charlie worked for different companies over the years to further his career and his goals, and discusses how his flying career has helped him and says, "I was extremely passionate about the flying aspect of my career for 25 years and I became even more passionate about operating in this space." We thank Charlie for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>484</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b2511404-9e6f-11ed-aff3-13201b242cf6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7473020340.mp3?updated=1674846533" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Interview with the AI, part one. [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/48/notes</link>
      <description>Cybersecurity interview with ChatGPT.
In part one of CyberWire’s Interview with the AI, Brandon Karpf interviews ChatGPT about topics related to cybersecurity. Rick Howard joins Brandon to analyze the conversation and discuss potential use cases for the cybersecurity community.
ChatGPT is a chatbot launched by OpenAI and built on top of OpenAI’s GPT-3 family of large language models.
Cyber questions answered by ChatGPT in part one of the interview.

What were the most significant cybersecurity incidents up through 2021?

What leads you to characterize these specific events as significant?

What were the specific technical vulnerabilities associated with these incidents?

Who were the cyber actors involved in each of these attacks?

Do you think it's valuable to attribute cyber attacks to specific actors?


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 29 Jan 2023 06:00:00 -0000</pubDate>
      <itunes:title>Interview with the AI, part one. [Special Editions]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>48</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cybersecurity interview with ChatGPT.
In part one of CyberWire’s Interview with the AI, Brandon Karpf interviews ChatGPT about topics related to cybersecurity. Rick Howard joins Brandon to analyze the conversation and discuss potential use cases for the cybersecurity community.
ChatGPT is a chatbot launched by OpenAI and built on top of OpenAI’s GPT-3 family of large language models.
Cyber questions answered by ChatGPT in part one of the interview.

What were the most significant cybersecurity incidents up through 2021?

What leads you to characterize these specific events as significant?

What were the specific technical vulnerabilities associated with these incidents?

Who were the cyber actors involved in each of these attacks?

Do you think it's valuable to attribute cyber attacks to specific actors?


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<h3>Cybersecurity interview with ChatGPT.</h3><p>In part one of CyberWire’s Interview with the AI, Brandon Karpf interviews ChatGPT about topics related to cybersecurity. Rick Howard joins Brandon to analyze the conversation and discuss potential use cases for the cybersecurity community.</p><p>ChatGPT is a chatbot launched by OpenAI and built on top of OpenAI’s GPT-3 family of large language models.</p><h3>Cyber questions answered by ChatGPT in part one of the interview.</h3><ol>
<li>What were the most significant cybersecurity incidents up through 2021?</li>
<li>What leads you to characterize these specific events as significant?</li>
<li>What were the specific technical vulnerabilities associated with these incidents?</li>
<li>Who were the cyber actors involved in each of these attacks?</li>
<li>Do you think it's valuable to attribute cyber attacks to specific actors?</li>
</ol><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1647</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2f830c68-9e91-11ed-bc0c-eb5768bffe79]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3586764346.mp3?updated=1674850117" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Flagging firmware vulnerabilities. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/266/notes</link>
      <description>Roya Gordon from Nozomi Networks sits down with Dave to discuss their research on "Vulnerabilities in BMC Firmware Affect OT/IoT Device Security." Researchers at Nozomi Networks has revealed that there are thirteen vulnerabilities that affect BMCs of Lanner devices based on the American Megatrends (AMI) MegaRAC SP-X.
The research states "By abusing these vulnerabilities, an unauthenticated attacker may achieve Remote Code Execution (RCE) with root privileges on the BMC, completely compromising it and gaining control of the managed host." As well as mentioning what patches could be in the future to help fix these vulnerabilities.
The research can be found here:
Vulnerabilities in BMC Firmware Affect OT/IoT Device Security – Part 1

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Jan 2023 08:00:00 -0000</pubDate>
      <itunes:title>Flagging firmware vulnerabilities. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>266</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Roya Gordon from Nozomi Networks sits down with Dave to discuss their research on "Vulnerabilities in BMC Firmware Affect OT/IoT Device Security." Researchers at Nozomi Networks has revealed that there are thirteen vulnerabilities that affect BMCs of Lanner devices based on the American Megatrends (AMI) MegaRAC SP-X.
The research states "By abusing these vulnerabilities, an unauthenticated attacker may achieve Remote Code Execution (RCE) with root privileges on the BMC, completely compromising it and gaining control of the managed host." As well as mentioning what patches could be in the future to help fix these vulnerabilities.
The research can be found here:
Vulnerabilities in BMC Firmware Affect OT/IoT Device Security – Part 1

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Roya Gordon from Nozomi Networks sits down with Dave to discuss their research on "Vulnerabilities in BMC Firmware Affect OT/IoT Device Security." Researchers at Nozomi Networks has revealed that there are thirteen vulnerabilities that affect BMCs of Lanner devices based on the American Megatrends (AMI) MegaRAC SP-X.</p><p>The research states "By abusing these vulnerabilities, an unauthenticated attacker may achieve Remote Code Execution (RCE) with root privileges on the BMC, completely compromising it and gaining control of the managed host." As well as mentioning what patches could be in the future to help fix these vulnerabilities.</p><p>The research can be found here:</p><ul><li><a href="https://www.nozominetworks.com/blog/vulnerabilities-in-bmc-firmware-affect-ot-iot-device-security-part-1/">Vulnerabilities in BMC Firmware Affect OT/IoT Device Security – Part 1</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>954</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5ac64dca-9dad-11ed-a70e-3ff6dcbe7071]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7138807482.mp3?updated=1685127447" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An update on the Hive ransomware takedown. More DDoS from Killnet. Advisories from CISA, and an addition to the Known Exploited Vulnerabilties Catalog.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1748/notes</link>
      <description>An update on the takedown of the Hive ransomware gang, plus insights from CrowdStrike’s Adam Meyers. If you say you’re going to unleash the Leopards, expect a noisy call from Killnet. Our guest is ExtraHop CISO Jeff Costlow talking about nation-state attackers in light of ongoing Russian military operations. CISA has released eight ICS advisories, and the agency has also added an entry to its Known Exploited Vulnerabilities Catalog.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/18

Selected reading.
Cybercriminals stung as HIVE infrastructure shut down (Europol)
U.S. Department of Justice Disrupts Hive Ransomware Variant (U.S. Department of Justice)
Director Christopher Wray’s Remarks at Press Conference Announcing the Disruption of the Hive Ransomware Group (Federal Bureau of Investigation)
Taking down the Hive ransomware gang. (CyberWire)
US hacks back against Hive ransomware crew (BBC News)
Cyberattacks Target Websites of German Airports, Admin (SecurityWeek) 
Delta Electronics CNCSoft ScreenEditor (CISA) 
Econolite EOS (CISA) 
Snap One Wattbox WB-300-IP-3 (CISA) 
Sierra Wireless AirLink Router with ALEOS Software (CISA).
Mitsubishi Electric MELFA SD/SQ series and F-series Robot Controllers (CISA) 
Rockwell Automation products using GoAhead Web Server (CISA)
Landis+Gyr E850 (CISA) 
Mitsubishi Electric MELSEC iQ-F, iQ-R Series (CISA) 
CISA Has Added One Known Exploited Vulnerability to Catalog (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 27 Jan 2023 21:15:00 -0000</pubDate>
      <itunes:title>An update on the Hive ransomware takedown. More DDoS from Killnet. Advisories from CISA, and an addition to the Known Exploited Vulnerabilties Catalog.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1748</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An update on the takedown of the Hive ransomware gang, plus insights from CrowdStrike’s Adam Meyers. If you say you’re going to unleash the Leopards, expect a noisy call from Killnet. Our guest is ExtraHop CISO Jeff Costlow talking about nation-state attackers in light of ongoing Russian military operations. CISA has released eight ICS advisories, and the agency has also added an entry to its Known Exploited Vulnerabilities Catalog.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/18

Selected reading.
Cybercriminals stung as HIVE infrastructure shut down (Europol)
U.S. Department of Justice Disrupts Hive Ransomware Variant (U.S. Department of Justice)
Director Christopher Wray’s Remarks at Press Conference Announcing the Disruption of the Hive Ransomware Group (Federal Bureau of Investigation)
Taking down the Hive ransomware gang. (CyberWire)
US hacks back against Hive ransomware crew (BBC News)
Cyberattacks Target Websites of German Airports, Admin (SecurityWeek) 
Delta Electronics CNCSoft ScreenEditor (CISA) 
Econolite EOS (CISA) 
Snap One Wattbox WB-300-IP-3 (CISA) 
Sierra Wireless AirLink Router with ALEOS Software (CISA).
Mitsubishi Electric MELFA SD/SQ series and F-series Robot Controllers (CISA) 
Rockwell Automation products using GoAhead Web Server (CISA)
Landis+Gyr E850 (CISA) 
Mitsubishi Electric MELSEC iQ-F, iQ-R Series (CISA) 
CISA Has Added One Known Exploited Vulnerability to Catalog (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An update on the takedown of the Hive ransomware gang, plus insights from CrowdStrike’s Adam Meyers. If you say you’re going to unleash the Leopards, expect a noisy call from Killnet. Our guest is ExtraHop CISO Jeff Costlow talking about nation-state attackers in light of ongoing Russian military operations. CISA has released eight ICS advisories, and the agency has also added an entry to its Known Exploited Vulnerabilities Catalog.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/18</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.europol.europa.eu/media-press/newsroom/news/cybercriminals-stung-hive-infrastructure-shut-down">Cybercriminals stung as HIVE infrastructure shut down</a> (Europol)</p><p><a href="https://www.justice.gov/opa/pr/us-department-justice-disrupts-hive-ransomware-variant">U.S. Department of Justice Disrupts Hive Ransomware Variant</a> (U.S. Department of Justice)</p><p><a href="https://www.fbi.gov/news/speeches/director-christopher-wrays-remarks-at-press-conference-announcing-the-disruption-of-the-hive-ransomware-group">Director Christopher Wray’s Remarks at Press Conference Announcing the Disruption of the Hive Ransomware Group</a> (Federal Bureau of Investigation)</p><p><a href="https://thecyberwire.com/stories/539fd8ef58e34493b6efc210dba21074/taking-down-the-hive-ransomware-gang">Taking down the Hive ransomware gang.</a> (CyberWire)</p><p><a href="https://www.bbc.com/news/technology-64418723">US hacks back against Hive ransomware crew</a> (BBC News)</p><p><a href="https://www.securityweek.com/cyberattacks-target-websites-of-german-airports-admin/">Cyberattacks Target Websites of German Airports, Admin</a> (SecurityWeek) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-01">Delta Electronics CNCSoft ScreenEditor</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-02">Econolite EOS</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-03">Snap One Wattbox WB-300-IP-3</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-04">Sierra Wireless AirLink Router with ALEOS Software</a> (CISA).</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-05">Mitsubishi Electric MELFA SD/SQ series and F-series Robot Controllers</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-06">Rockwell Automation products using GoAhead Web Server</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-026-07">Landis+Gyr E850</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-017-02">Mitsubishi Electric MELSEC iQ-F, iQ-R Series</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2023/01/26/cisa-has-added-one-known-exploited-vulnerability-catalog">CISA Has Added One Known Exploited Vulnerability to Catalog</a> (CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1550</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[451e2d7a-787a-11ec-abf0-b739dd29deb1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8582983385.mp3?updated=1690320590" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Remote monitoring and management tools abused. Russian and Iranian cyberespionage reported. The world according to the CIO. And if volume is your secret, maybe look for a better secret.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1747/notes</link>
      <description>Joint advisory warns of remote monitoring and management software abuse. Iranian threat actors reported active against a range of targets. UK's NCSC warns of increased risk of Russian and Iranian social engineering attacks. A look at trends, as seen by CIOs. Carole Theriault ponders health versus privacy with former BBC guru Rory Cellan Jones. Kyle McNulty, host of the Secure Ventures podcast shares lessons from the cybersecurity startup community. And the DRAGONBRIDGE spam network is disrupted.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/17

Selected reading.
CISA, NSA, and MS-ISAC Release Advisory on the Malicious Use of RMM Software (CISA)
Protecting Against Malicious Use of Remote Monitoring and Management Software (CISA)
CISA: Federal agencies hacked using legitimate remote desktop tools (BleepingComputer)
'Malicious' cyber attacks launched by groups connected to Iran's regime (ABC) 
Abraham's Ax Likely Linked to Moses Staff (Secureworks)
SEABORGIUM and TA453 continue their respective spear-phishing campaigns against targets of interest (NCSC)
NCSC: Russian and Iranian hackers targeting UK politicians, journalists (Computing)
State of the CIO Study 2023: CIOs cement leadership role (Foundry)
U.S. says it 'hacked the hackers' to bring down ransomware gang, helping 300 victims (Reuters)
Over 50,000 instances of DRAGONBRIDGE activity disrupted in 2022 (Google TAG)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 26 Jan 2023 21:15:00 -0000</pubDate>
      <itunes:title>Remote monitoring and management tools abused. Russian and Iranian cyberespionage reported. The world according to the CIO. And if volume is your secret, maybe look for a better secret.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1747</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Joint advisory warns of remote monitoring and management software abuse. Iranian threat actors reported active against a range of targets. UK's NCSC warns of increased risk of Russian and Iranian social engineering attacks. A look at trends, as seen by CIOs. Carole Theriault ponders health versus privacy with former BBC guru Rory Cellan Jones. Kyle McNulty, host of the Secure Ventures podcast shares lessons from the cybersecurity startup community. And the DRAGONBRIDGE spam network is disrupted.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/17

Selected reading.
CISA, NSA, and MS-ISAC Release Advisory on the Malicious Use of RMM Software (CISA)
Protecting Against Malicious Use of Remote Monitoring and Management Software (CISA)
CISA: Federal agencies hacked using legitimate remote desktop tools (BleepingComputer)
'Malicious' cyber attacks launched by groups connected to Iran's regime (ABC) 
Abraham's Ax Likely Linked to Moses Staff (Secureworks)
SEABORGIUM and TA453 continue their respective spear-phishing campaigns against targets of interest (NCSC)
NCSC: Russian and Iranian hackers targeting UK politicians, journalists (Computing)
State of the CIO Study 2023: CIOs cement leadership role (Foundry)
U.S. says it 'hacked the hackers' to bring down ransomware gang, helping 300 victims (Reuters)
Over 50,000 instances of DRAGONBRIDGE activity disrupted in 2022 (Google TAG)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joint advisory warns of remote monitoring and management software abuse. Iranian threat actors reported active against a range of targets. UK's NCSC warns of increased risk of Russian and Iranian social engineering attacks. A look at trends, as seen by CIOs. Carole Theriault ponders health versus privacy with former BBC guru Rory Cellan Jones. Kyle McNulty, host of the Secure Ventures podcast shares lessons from the cybersecurity startup community. And the DRAGONBRIDGE spam network is disrupted.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/17</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2023/01/25/cisa-nsa-and-ms-isac-release-advisory-malicious-use-rmm-software">CISA, NSA, and MS-ISAC Release Advisory on the Malicious Use of RMM Software</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa23-025a">Protecting Against Malicious Use of Remote Monitoring and Management Software</a> (CISA)</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-federal-agencies-hacked-using-legitimate-remote-desktop-tools/">CISA: Federal agencies hacked using legitimate remote desktop tools</a> (BleepingComputer)</p><p><a href="https://www.abc.net.au/news/2023-01-25/australia-iran-irgc-cyber-attacks-senate-inquiry-human-rights/101886648">'Malicious' cyber attacks launched by groups connected to Iran's regime</a> (ABC) </p><p><a href="https://www.secureworks.com/blog/abrahams-ax-likely-linked-to-moses-staff">Abraham's Ax Likely Linked to Moses Staff</a> (Secureworks)</p><p><a href="https://www.ncsc.gov.uk/news/spear-phishing-campaigns-targets-of-interest">SEABORGIUM and TA453 continue their respective spear-phishing campaigns against targets of interest</a> (NCSC)</p><p><a href="https://www.computing.co.uk/news/4066158/ncsc-russian-iranian-hackers-targeting-uk-politicians-journalists">NCSC: Russian and Iranian hackers targeting UK politicians, journalists </a>(Computing)</p><p><a href="https://resources.foundryco.com/download/state-of-the-cio-summary">State of the CIO Study 2023: CIOs cement leadership role</a> (Foundry)</p><p><a href="https://www.reuters.com/world/us/announcement-posted-hive-ransomware-groups-site-says-it-has-been-seized-by-fbi-2023-01-26/">U.S. says it 'hacked the hackers' to bring down ransomware gang, helping 300 victims</a> (Reuters)</p><p><a href="https://blog.google/threat-analysis-group/over-50000-instances-of-dragonbridge-activity-disrupted-in-2022/">Over 50,000 instances of DRAGONBRIDGE activity disrupted in 2022</a> (Google TAG)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1662</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[453e4df8-787a-11ec-abf0-73ec1ec49964]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2913855197.mp3?updated=1690320572" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA23-025A – Protecting against malicious use of remote monitoring and management software. [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/39/notes</link>
      <description>CISA, NSA, and the MS-ISAC are releasing this alert to warn network defenders about malicious use of legitimate remote monitoring and management software. 
AA23-025A Alert, Technical Details, and Mitigations
For a downloadable copy of IOCs, see AA23-025.stix
Silent Push uncovers a large trojan operation featuring Amazon, Microsoft, Geek Squad, McAfee, Norton, and Paypal domains
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 26 Jan 2023 14:40:00 -0000</pubDate>
      <itunes:title>CISA Alert AA23-025A – Protecting against malicious use of remote monitoring and management software. [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>39</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA, NSA, and the MS-ISAC are releasing this alert to warn network defenders about malicious use of legitimate remote monitoring and management software. 
AA23-025A Alert, Technical Details, and Mitigations
For a downloadable copy of IOCs, see AA23-025.stix
Silent Push uncovers a large trojan operation featuring Amazon, Microsoft, Geek Squad, McAfee, Norton, and Paypal domains
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
See CISA Insights Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses for guidance on hardening MSP and customer infrastructure.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA, NSA, and the MS-ISAC are releasing this alert to warn network defenders about malicious use of legitimate remote monitoring and management software. </p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa23-025a">AA23-025A Alert, Technical Details, and Mitigations</a></p><p>For a downloadable copy of IOCs, see <a href="https://www.cisa.gov/uscert/sites/default/files/publications/AA23-025A.stix.xml">AA23-025.stix</a></p><p><a href="https://www.silentpush.com/blog/silent-push-uncovers-a-large-phishing-operation-featuring-amazon-geek-squad-mcafee-microsoft-norton-and-paypal-domains">Silent Push uncovers a large trojan operation featuring Amazon, Microsoft, Geek Squad, McAfee, Norton, and Paypal domains</a></p><p>No-cost cyber hygiene services: <a href="https://www.cisa.gov/cyber-hygiene-services">Cyber Hygiene Services</a> and <a href="https://github.com/cisagov/cset/">Ransomware Readiness Assessment</a>.</p><p>See CISA Insights <a href="https://www.cisa.gov/sites/default/files/publications/CISA%20Insights_Guidance-for-MSPs-and-Small-and-Mid-sized-Businesses_S508C.pdf">Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses</a> for guidance on hardening MSP and customer infrastructure.</p><p>U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email <a href="mailto:dib_defense@cyber.nsa.gov">dib_defense@cyber.nsa.gov</a> </p><p>To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="mailto:report@cisa.gov">report@cisa.gov</a>, or call (888) 282-0870, or report incidents to your local FBI field office.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>161</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[500d9dfa-9d87-11ed-b690-cb8ddee3eda7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3319645933.mp3?updated=1674744006" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>TA444 and crypto theft on behalf of the Dear Successor. CryptoAPI spoofing vulnerability described. New Python-based malware campaign. User headspace. Tanks vs. hacktivists. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1746/notes</link>
      <description>How do the North Koreans get away with it? They do run their cyber ops like a creepy start-up business. A spoofing vulnerability is discovered in Windows CryptoAPI. Python-based malware is distributed via phishing. MacOS may have a reputation for threat-resistance, but users shouldn't get cocky. DevSecOps survey results show tension between innovation and security. Russian hacktivist auxiliaries hit German targets. Tim Starks from the Washington Post Cyber 202 shares insights from his interview with Senator Warner. Our guest is Keith McCammon of Red Canary to discuss cyber accessibility. And Private sector support for Ukraine's cyber defense.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/16

Selected reading.
TA444: The APT Startup Aimed at Acquisition (of Your Funds) (Proofpoint)
Exploiting a Critical Spoofing Vulnerability in Windows CryptoAPI (Akamai) 
Securonix Security Advisory: Python-Based PY#RATION Attack Campaign Leverages Fernet Encryption and Websockets to Avoid Detection (Securonix)
BlackBerry's Inaugural Quarterly Threat Intelligence Report Reveals Threat Actors Launch One Malicious Threat Every Minute (BlackBerry)
Global CIO Report Reveals Growing Urgency for Observability and Security to Converge (Dynatrace)
Russian 'hacktivists' briefly knock German websites offline (Reuters)
How Microsoft is helping Ukraine’s cyberwar against Russia (Computerworld)
CISA Releases Two Industrial Control Systems Advisories (CISA) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 25 Jan 2023 21:15:00 -0000</pubDate>
      <itunes:title>TA444 and crypto theft on behalf of the Dear Successor. CryptoAPI spoofing vulnerability described. New Python-based malware campaign. User headspace. Tanks vs. hacktivists. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1746</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>How do the North Koreans get away with it? They do run their cyber ops like a creepy start-up business. A spoofing vulnerability is discovered in Windows CryptoAPI. Python-based malware is distributed via phishing. MacOS may have a reputation for threat-resistance, but users shouldn't get cocky. DevSecOps survey results show tension between innovation and security. Russian hacktivist auxiliaries hit German targets. Tim Starks from the Washington Post Cyber 202 shares insights from his interview with Senator Warner. Our guest is Keith McCammon of Red Canary to discuss cyber accessibility. And Private sector support for Ukraine's cyber defense.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/16

Selected reading.
TA444: The APT Startup Aimed at Acquisition (of Your Funds) (Proofpoint)
Exploiting a Critical Spoofing Vulnerability in Windows CryptoAPI (Akamai) 
Securonix Security Advisory: Python-Based PY#RATION Attack Campaign Leverages Fernet Encryption and Websockets to Avoid Detection (Securonix)
BlackBerry's Inaugural Quarterly Threat Intelligence Report Reveals Threat Actors Launch One Malicious Threat Every Minute (BlackBerry)
Global CIO Report Reveals Growing Urgency for Observability and Security to Converge (Dynatrace)
Russian 'hacktivists' briefly knock German websites offline (Reuters)
How Microsoft is helping Ukraine’s cyberwar against Russia (Computerworld)
CISA Releases Two Industrial Control Systems Advisories (CISA) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>How do the North Koreans get away with it? They do run their cyber ops like a creepy start-up business. A spoofing vulnerability is discovered in Windows CryptoAPI. Python-based malware is distributed via phishing. MacOS may have a reputation for threat-resistance, but users shouldn't get cocky. DevSecOps survey results show tension between innovation and security. Russian hacktivist auxiliaries hit German targets. Tim Starks from the Washington Post Cyber 202 shares insights from his interview with Senator Warner. Our guest is Keith McCammon of Red Canary to discuss cyber accessibility. And Private sector support for Ukraine's cyber defense.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/16</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.proofpoint.com/us/blog/threat-insight/ta444-apt-startup-aimed-at-your-funds">TA444: The APT Startup Aimed at Acquisition (of Your Funds)</a> (Proofpoint)</p><p><a href="https://www.akamai.com/blog/security-research/exploiting-critical-spoofing-vulnerability-microsoft-cryptoapi">Exploiting a Critical Spoofing Vulnerability in Windows CryptoAPI</a> (Akamai) </p><p><a href="https://www.securonix.com/blog/security-advisory-python-based-pyration-attack-campaign/">Securonix Security Advisory: Python-Based PY#RATION Attack Campaign Leverages Fernet Encryption and Websockets to Avoid Detection</a> (Securonix)</p><p><a href="https://www.prnewswire.com/news-releases/blackberrys-inaugural-quarterly-threat-intelligence-report-reveals-threat-actors-launch-one-malicious-threat-every-minute-301730111.html">BlackBerry's Inaugural Quarterly Threat Intelligence Report Reveals Threat Actors Launch One Malicious Threat Every Minute</a> (BlackBerry)</p><p><a href="https://www.businesswire.com/news/home/20230124005365/en/Global-CIO-Report-Reveals-Growing-Urgency-for-Observability-and-Security-to-Converge.">Global CIO Report Reveals Growing Urgency for Observability and Security to Converge</a> (Dynatrace)</p><p><a href="https://www.reuters.com/world/europe/russian-hacktivists-briefly-knock-german-websites-offline-2023-01-25/">Russian 'hacktivists' briefly knock German websites offline</a> (Reuters)</p><p><a href="https://www.computerworld.com/article/3685939/how-microsoft-is-helping-ukraine-s-cyberwar-against-russia.html">How Microsoft is helping Ukraine’s cyberwar against Russia</a> (Computerworld)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2023/01/24/cisa-releases-two-industrial-control-systems-advisories">CISA Releases Two Industrial Control Systems Advisories</a> (CISA) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1780</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[461e2c3e-787a-11ec-abf0-bbede4cf80c8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7651378971.mp3?updated=1690320551" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber Marketing Con 2022: From the horse’s mouth: CISO Q&amp;A on solving the cyber marketer’s dilemma. [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/47/notes</link>
      <description>At the 2022 Cyber Marketing Con, the CyberWire presented a CISO Q&amp;A panel session on how to help cyber marketers reach CISOs and other security executives in the industry. The panel included Rick Howard, CSO of N2K Networks, Jaclyn Miller, Head of InfoSec and IT at DispatchHealth, Ted Wagner, CISO of SAP NS2, and was moderated by board director &amp; and operating partner, Michelle Perry.
Listen in as the panel discusses:

What works and doesn’t work in getting a security executive’s attention.

Message trust, message fatigue, and what you can do about it.

Trusted information sources and how security executives use them.

Positioning and messaging that is actually meaningful to decision makers.

The security executive’s purchasing behavior and why skepticism is the driving force.


Stay tuned until the end to hear us answer some additional bonus questions submitted by attendees.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 25 Jan 2023 06:00:00 -0000</pubDate>
      <itunes:title>Cyber Marketing Con 2022: From the horse’s mouth: CISO Q&amp;A on solving the cyber marketer’s dilemma. [Special Editions]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>8</itunes:season>
      <itunes:episode>47</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>At the 2022 Cyber Marketing Con, the CyberWire presented a CISO Q&amp;A panel session on how to help cyber marketers reach CISOs and other security executives in the industry. The panel included Rick Howard, CSO of N2K Networks, Jaclyn Miller, Head of InfoSec and IT at DispatchHealth, Ted Wagner, CISO of SAP NS2, and was moderated by board director &amp; and operating partner, Michelle Perry.
Listen in as the panel discusses:

What works and doesn’t work in getting a security executive’s attention.

Message trust, message fatigue, and what you can do about it.

Trusted information sources and how security executives use them.

Positioning and messaging that is actually meaningful to decision makers.

The security executive’s purchasing behavior and why skepticism is the driving force.


Stay tuned until the end to hear us answer some additional bonus questions submitted by attendees.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>At the 2022 Cyber Marketing Con, the CyberWire presented a CISO Q&amp;A panel session on how to help cyber marketers reach CISOs and other security executives in the industry. The panel included Rick Howard, CSO of N2K Networks, Jaclyn Miller, Head of InfoSec and IT at DispatchHealth, Ted Wagner, CISO of SAP NS2, and was moderated by board director &amp; and operating partner, Michelle Perry.</p><p>Listen in as the panel discusses:</p><ul>
<li>What works and doesn’t work in getting a security executive’s attention.</li>
<li>Message trust, message fatigue, and what you can do about it.</li>
<li>Trusted information sources and how security executives use them.</li>
<li>Positioning and messaging that is actually meaningful to decision makers.</li>
<li>The security executive’s purchasing behavior and why skepticism is the driving force.</li>
</ul><p><br></p><p>Stay tuned until the end to hear us answer some additional bonus questions submitted by attendees.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3644</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b158c806-9c28-11ed-a2c5-631f56af055f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5565663745.mp3?updated=1674572239" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Disentangling cybercrime from cyberespionage. A threat to the IoT supply chain. What do you do with the hacktivists when they stop being hacktivists? A retired FBI Special Agent is indicted. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1745/notes</link>
      <description>DragonSpark conducts "opportunistic" cyberattacks in East Asia. ProxyNotShell and OWASSRF exploit chains target Microsoft Exchange servers. The IoT supply chain is threatened by exploitation of Realtek Jungle SDK vulnerability. CISA adds an entry to its Known Exploited Vulnerabilities Catalog. A Cisco study finds organizations see positive returns from investment in privacy. What's the hacktivist's postwar future? Joe Carrigan tracks a romance scam targeting seniors. Our guest is Pete Lund of OPSWAT to discuss the security of removable media devices. And a retired G-Man is indicted on multiple charges.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/15

Selected reading.
DragonSpark | Attacks Evade Detection with SparkRAT and Golang Source Code Interpretation (SentinelOne)
Technical Advisory: Proxy*Hell Exploit Chains in the Wild  (Bitdefender)
Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats (Unit 42)
CISA Adds One Known Exploited Vulnerability to Catalog (CISA) 
 2023 Data Privacy Benchmark Study (Cicso)
Hacktivism Is a Risky Career Path (WIRED)
Retired FBI Executive Charged With Concealing $225,000 In Cash Received From An Outside Source (Department of Justice, U.S. Attorney’s Office, District of Columbia) 
Former Special Agent In Charge Of The New York FBI Counterintelligence Division Charged With Violating U.S. Sanctions On Russia (Department of Justice, U.S. Attorney’s Office, Southern District of New York)
Former Senior F.B.I. Official in New York Charged With Aiding Oligarch (New York Times)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Jan 2023 21:15:00 -0000</pubDate>
      <itunes:title>Disentangling cybercrime from cyberespionage. A threat to the IoT supply chain. What do you do with the hacktivists when they stop being hacktivists? A retired FBI Special Agent is indicted. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1745</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>DragonSpark conducts "opportunistic" cyberattacks in East Asia. ProxyNotShell and OWASSRF exploit chains target Microsoft Exchange servers. The IoT supply chain is threatened by exploitation of Realtek Jungle SDK vulnerability. CISA adds an entry to its Known Exploited Vulnerabilities Catalog. A Cisco study finds organizations see positive returns from investment in privacy. What's the hacktivist's postwar future? Joe Carrigan tracks a romance scam targeting seniors. Our guest is Pete Lund of OPSWAT to discuss the security of removable media devices. And a retired G-Man is indicted on multiple charges.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/15

Selected reading.
DragonSpark | Attacks Evade Detection with SparkRAT and Golang Source Code Interpretation (SentinelOne)
Technical Advisory: Proxy*Hell Exploit Chains in the Wild  (Bitdefender)
Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats (Unit 42)
CISA Adds One Known Exploited Vulnerability to Catalog (CISA) 
 2023 Data Privacy Benchmark Study (Cicso)
Hacktivism Is a Risky Career Path (WIRED)
Retired FBI Executive Charged With Concealing $225,000 In Cash Received From An Outside Source (Department of Justice, U.S. Attorney’s Office, District of Columbia) 
Former Special Agent In Charge Of The New York FBI Counterintelligence Division Charged With Violating U.S. Sanctions On Russia (Department of Justice, U.S. Attorney’s Office, Southern District of New York)
Former Senior F.B.I. Official in New York Charged With Aiding Oligarch (New York Times)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>DragonSpark conducts "opportunistic" cyberattacks in East Asia. ProxyNotShell and OWASSRF exploit chains target Microsoft Exchange servers. The IoT supply chain is threatened by exploitation of Realtek Jungle SDK vulnerability. CISA adds an entry to its Known Exploited Vulnerabilities Catalog. A Cisco study finds organizations see positive returns from investment in privacy. What's the hacktivist's postwar future? Joe Carrigan tracks a romance scam targeting seniors. Our guest is Pete Lund of OPSWAT to discuss the security of removable media devices. And a retired G-Man is indicted on multiple charges.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/15</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.sentinelone.com/labs/dragonspark-attacks-evade-detection-with-sparkrat-and-golang-source-code-interpretation/">DragonSpark | Attacks Evade Detection with SparkRAT and Golang Source Code Interpretation</a> (SentinelOne)</p><p><a href="https://businessinsights.bitdefender.com/technical-advisory-proxyhell-exploit-chains-in-the-wild">Technical Advisory: Proxy*Hell Exploit Chains in the Wild </a> (Bitdefender)</p><p><a href="https://unit42.paloaltonetworks.com/realtek-sdk-vulnerability/">Realtek SDK Vulnerability Attacks Highlight IoT Supply Chain Threats</a> (Unit 42)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2023/01/23/cisa-adds-one-known-exploited-vulnerability-catalog">CISA Adds One Known Exploited Vulnerability to Catalog</a> (CISA) </p><p><a href="https://newsroom.cisco.com/c/r/newsroom/en/us/a/y2023/m01/organizations-think-they-need-to-do-more-to-reassure-customers-about-how-their-data-is-used-in-ai-new-cisco-research.html"> 2023 Data Privacy Benchmark Study</a> (Cicso)</p><p><a href="https://www.wired.com/story/cybersecurity-hacktivism/">Hacktivism Is a Risky Career Path</a> (WIRED)</p><p><a href="https://www.justice.gov/usao-dc/pr/retired-fbi-executive-charged-concealing-225000-cash-received-outside-source">Retired FBI Executive Charged With Concealing $225,000 In Cash Received From An Outside Source</a> (Department of Justice, U.S. Attorney’s Office, District of Columbia) </p><p><a href="https://www.justice.gov/usao-sdny/pr/former-special-agent-charge-new-york-fbi-counterintelligence-division-charged-violating">Former Special Agent In Charge Of The New York FBI Counterintelligence Division Charged With Violating U.S. Sanctions On Russia</a> (Department of Justice, U.S. Attorney’s Office, Southern District of New York)</p><p><a href="https://www.nytimes.com/2023/01/23/nyregion/fbi-money-laundering-charles-mcgonigal.html">Former Senior F.B.I. Official in New York Charged With Aiding Oligarch</a> (New York Times)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1727</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[465e08fe-787a-11ec-abf0-8338213225e9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6911870188.mp3?updated=1690320539" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Contractor error behind FAA outage. OneNote malspam. Vastflux ad campaign disrupted. Ukraine moves closer to CCDCOE membership. Alerts for gamblers and gamers.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1744/notes</link>
      <description>The FAA attributes its January NOTAM outage. Malicious OneNote attachments are appearing in phishing campaigns. The Vastflux ad campaign has been disrupted. Ukraine moves toward closer cybersecurity collaboration with NATO. Rick Howard considers the best of 2022. Deepen Desai from Zscaler looks at VPN Risk. And, finally, we’re betting you want alerts for sports book customers and online gamers.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/14

Selected reading.
FAA Says Contractor Unintentionally Caused Outage That Disrupted Flights (Wall Street Journal)
Not a cyberattack, but an IT failure: the FAA's NOTAM outage. (CyberWire)
Hackers now use Microsoft OneNote attachments to spread malware (BleepingComputer)
Traffic signals: The VASTFLUX Takedown (HUMAN Security)
Ukraine signs agreement to join NATO cyber defense center (The Record from Recorded Future News) 
FanDuels warns of data breach after customer info stolen in vendor hack (BleepingComputer)
Industry looks at the MailChimp data incident. (CyberWire)
PSA: Don’t play GTA Online on PC right now (Video Games)
You might not want to play GTA Online right now due to security vulnerabilities (RockPaperShotgun)
Riot Games hacked, delays game patches after security breach (BleepingComputer)
Riot hit by ‘social engineering attack’ that will affect patch cadence for multiple titles (Dot Esports)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 23 Jan 2023 21:15:00 -0000</pubDate>
      <itunes:title>Contractor error behind FAA outage. OneNote malspam. Vastflux ad campaign disrupted. Ukraine moves closer to CCDCOE membership. Alerts for gamblers and gamers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1744</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The FAA attributes its January NOTAM outage. Malicious OneNote attachments are appearing in phishing campaigns. The Vastflux ad campaign has been disrupted. Ukraine moves toward closer cybersecurity collaboration with NATO. Rick Howard considers the best of 2022. Deepen Desai from Zscaler looks at VPN Risk. And, finally, we’re betting you want alerts for sports book customers and online gamers.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/14

Selected reading.
FAA Says Contractor Unintentionally Caused Outage That Disrupted Flights (Wall Street Journal)
Not a cyberattack, but an IT failure: the FAA's NOTAM outage. (CyberWire)
Hackers now use Microsoft OneNote attachments to spread malware (BleepingComputer)
Traffic signals: The VASTFLUX Takedown (HUMAN Security)
Ukraine signs agreement to join NATO cyber defense center (The Record from Recorded Future News) 
FanDuels warns of data breach after customer info stolen in vendor hack (BleepingComputer)
Industry looks at the MailChimp data incident. (CyberWire)
PSA: Don’t play GTA Online on PC right now (Video Games)
You might not want to play GTA Online right now due to security vulnerabilities (RockPaperShotgun)
Riot Games hacked, delays game patches after security breach (BleepingComputer)
Riot hit by ‘social engineering attack’ that will affect patch cadence for multiple titles (Dot Esports)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FAA attributes its January NOTAM outage. Malicious OneNote attachments are appearing in phishing campaigns. The Vastflux ad campaign has been disrupted. Ukraine moves toward closer cybersecurity collaboration with NATO. Rick Howard considers the best of 2022. Deepen Desai from Zscaler looks at VPN Risk. And, finally, we’re betting you want alerts for sports book customers and online gamers.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/14</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.wsj.com/articles/contractor-unintentionally-caused-pilot-alert-system-outage-that-disrupted-flights-faa-says-11674175850">FAA Says Contractor Unintentionally Caused Outage That Disrupted Flights</a> (Wall Street Journal)</p><p><a href="https://thecyberwire.com/stories/e53ab6197dc34d66824e284751d102e8/not-a-cyberattack-but-an-it-failure-the-faas-notam-outage">Not a cyberattack, but an IT failure: the FAA's NOTAM outage.</a> (CyberWire)</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-now-use-microsoft-onenote-attachments-to-spread-malware/">Hackers now use Microsoft OneNote attachments to spread malware</a> (BleepingComputer)</p><p><a href="https://www.bleepingcomputer.com/news/security/massive-ad-fraud-op-dismantled-after-hitting-millions-of-ios-devices/">Traffic signals: The VASTFLUX Takedown</a> (HUMAN Security)</p><p><a href="https://therecord.media/ukraine-signs-agreement-to-join-nato-cyber-defense-center/">Ukraine signs agreement to join NATO cyber defense center</a> (The Record from Recorded Future News) </p><p><a href="https://www.bleepingcomputer.com/news/security/fanduels-warns-of-data-breach-after-customer-info-stolen-in-vendor-hack/">FanDuels warns of data breach after customer info stolen in vendor hack</a> (BleepingComputer)</p><p><a href="https://thecyberwire.com/stories/9b061de0e4d94e08bfb9f71f8d824665/industry-looks-at-the-mailchimp-data-incident">Industry looks at the MailChimp data incident.</a> (CyberWire)</p><p><a href="https://videogames.si.com/news/gta-online-pc-ban-exploit">PSA: Don’t play GTA Online on PC right now</a> (Video Games)</p><p><a href="https://www.rockpapershotgun.com/you-might-not-want-to-play-gta-online-right-now-due-to-security-vulnerabilities">You might not want to play GTA Online right now due to security vulnerabilities</a> (RockPaperShotgun)</p><p><a href="https://www.bleepingcomputer.com/news/security/riot-games-hacked-delays-game-patches-after-security-breach/?traffic_source=Connatix">Riot Games hacked, delays game patches after security breach</a> (BleepingComputer)</p><p><a href="https://dotesports.com/league-of-legends/news/riot-hit-by-social-engineering-attack-that-will-affect-patch-cadence-for-multiple-titles">Riot hit by ‘social engineering attack’ that will affect patch cadence for multiple titles</a> (Dot Esports)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1531</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[473deed8-787a-11ec-abf0-6f364997862c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6026969863.mp3?updated=1690320518" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Miriam Wugmeister: Technology's not as complicated as you think. [Data Security] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/133/notes</link>
      <description>Miriam Wugmeister, co-chair of Morrison &amp; Foerster’s Privacy and Data Security practice, sits down to share her in-depth experience and understanding of privacy and data security laws, obligations, and practices across a wide range of industries. She talks about how she grew up not knowing exactly what she wanted to get into as a profession, starting off as a chemical engineering major in college before switching to philosophy. She then got asked to work on a project relating to a company’s privacy and fell in love with the subject matter, deciding then to pursue it as a career. Miriam mentions how technology is not as complicated as tech people might have you think. She hopes she can advertise a tech degree for young women and men looking to get into the field, as well as making sure she "encourages women and diverse lawyers to, uh, come into this area to thrive." We thank Miriam for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 22 Jan 2023 08:00:00 -0000</pubDate>
      <itunes:title>Miriam Wugmeister: Technology's not as complicated as you think. [Data Security] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>133</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Miriam Wugmeister, co-chair of Morrison &amp; Foerster’s Privacy and Data Security practice, sits down to share her in-depth experience and understanding of privacy and data security laws, obligations, and practices across a wide range of industries. She talks about how she grew up not knowing exactly what she wanted to get into as a profession, starting off as a chemical engineering major in college before switching to philosophy. She then got asked to work on a project relating to a company’s privacy and fell in love with the subject matter, deciding then to pursue it as a career. Miriam mentions how technology is not as complicated as tech people might have you think. She hopes she can advertise a tech degree for young women and men looking to get into the field, as well as making sure she "encourages women and diverse lawyers to, uh, come into this area to thrive." We thank Miriam for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Miriam Wugmeister, co-chair of Morrison &amp; Foerster’s Privacy and Data Security practice, sits down to share her in-depth experience and understanding of privacy and data security laws, obligations, and practices across a wide range of industries. She talks about how she grew up not knowing exactly what she wanted to get into as a profession, starting off as a chemical engineering major in college before switching to philosophy. She then got asked to work on a project relating to a company’s privacy and fell in love with the subject matter, deciding then to pursue it as a career. Miriam mentions how technology is not as complicated as tech people might have you think. She hopes she can advertise a tech degree for young women and men looking to get into the field, as well as making sure she "encourages women and diverse lawyers to, uh, come into this area to thrive." We thank Miriam for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>488</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3bc8b0b4-98e6-11ed-b209-7bd069a6f58b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2380450633.mp3?updated=1674230408" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The power of web data in cybersecurity. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/43/notes</link>
      <description>The public web data domain is a fancy way to say that there is a lot of information sitting on websites around the world that is freely available to anybody who has the initiative to collect it and use it for some purpose. When you do that collection, intelligence groups typically refer to it as open source intelligence, or OSINT. Intelligence groups have been conducting OSINT operations for over a century if you consider books and newspapers to be one source of this kind of information. In the modern day, hackers conduct OSINT operations in order to recon their potential victims by collecting email addresses, personal information, IP addresses, software versions, network configurations, and, if they are lucky, login credentials for websites and social media platforms. The question is, how can the good guys use these techniques to improve their security posture or maybe help the business in some kind of material way?
On this episode of CyberWire-X, the CyberWire’s Rick Howard and Dave Bittner discuss OSINT operations to improve your security posture with guests Steve Winterfeld, Hash Table member and Advisory CISO for Akamai, and Or Lenchner, CEO at our episode sponsor Bright Data. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 22 Jan 2023 06:00:00 -0000</pubDate>
      <itunes:title>The power of web data in cybersecurity. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>44</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The public web data domain is a fancy way to say that there is a lot of information sitting on websites around the world that is freely available to anybody who has the initiative to collect it and use it for some purpose. When you do that collection, intelligence groups typically refer to it as open source intelligence, or OSINT. Intelligence groups have been conducting OSINT operations for over a century if you consider books and newspapers to be one source of this kind of information. In the modern day, hackers conduct OSINT operations in order to recon their potential victims by collecting email addresses, personal information, IP addresses, software versions, network configurations, and, if they are lucky, login credentials for websites and social media platforms. The question is, how can the good guys use these techniques to improve their security posture or maybe help the business in some kind of material way?
On this episode of CyberWire-X, the CyberWire’s Rick Howard and Dave Bittner discuss OSINT operations to improve your security posture with guests Steve Winterfeld, Hash Table member and Advisory CISO for Akamai, and Or Lenchner, CEO at our episode sponsor Bright Data. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The public web data domain is a fancy way to say that there is a lot of information sitting on websites around the world that is freely available to anybody who has the initiative to collect it and use it for some purpose. When you do that collection, intelligence groups typically refer to it as open source intelligence, or OSINT. Intelligence groups have been conducting OSINT operations for over a century if you consider books and newspapers to be one source of this kind of information. In the modern day, hackers conduct OSINT operations in order to recon their potential victims by collecting email addresses, personal information, IP addresses, software versions, network configurations, and, if they are lucky, login credentials for websites and social media platforms. The question is, how can the good guys use these techniques to improve their security posture or maybe help the business in some kind of material way?</p><p>On this episode of CyberWire-X, the CyberWire’s Rick Howard and Dave Bittner discuss OSINT operations to improve your security posture with guests Steve Winterfeld, Hash Table member and Advisory CISO for Akamai, and Or Lenchner, CEO at our episode sponsor Bright Data. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1677</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a2e883cc-99fa-11ed-8bae-47eb7890b141]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3493725592.mp3?updated=1674244069" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Billbug infests government agencies. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/265/notes</link>
      <description>Brigid O. Gorman from Symantec's Threat Hunter Team joins Dave to discuss their report "Billbug - State-sponsored Actor Targets Cert Authority and Government Agencies in Multiple Asian Countries." The team has discovered that state-sponsored actors compromised a digital certificate authority in an Asian country during a campaign in which multiple government agencies were also targeted.
The research states they believe Billbug, which is a long-established advanced persistent threat (APT) group has been active since about 2009. They say "In activity documented by Symantec in 2019, we detailed how the group was using a backdoor known as Hannotog (Backdoor.Hannotog) and another backdoor known as Sagerunex (Backdoor.Sagerunex). Both these tools were also seen in this more recent activity."
The research can be found here:
Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Jan 2023 08:00:00 -0000</pubDate>
      <itunes:title>Billbug infests government agencies. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>265</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Brigid O. Gorman from Symantec's Threat Hunter Team joins Dave to discuss their report "Billbug - State-sponsored Actor Targets Cert Authority and Government Agencies in Multiple Asian Countries." The team has discovered that state-sponsored actors compromised a digital certificate authority in an Asian country during a campaign in which multiple government agencies were also targeted.
The research states they believe Billbug, which is a long-established advanced persistent threat (APT) group has been active since about 2009. They say "In activity documented by Symantec in 2019, we detailed how the group was using a backdoor known as Hannotog (Backdoor.Hannotog) and another backdoor known as Sagerunex (Backdoor.Sagerunex). Both these tools were also seen in this more recent activity."
The research can be found here:
Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Brigid O. Gorman from Symantec's Threat Hunter Team joins Dave to discuss their report "Billbug - State-sponsored Actor Targets Cert Authority and Government Agencies in Multiple Asian Countries." The team has discovered that state-sponsored actors compromised a digital certificate authority in an Asian country during a campaign in which multiple government agencies were also targeted.</p><p>The research states they believe Billbug, which is a long-established advanced persistent threat (APT) group has been active since about 2009. They say "In activity documented by Symantec in 2019, we detailed how the group was using a backdoor known as Hannotog (Backdoor.Hannotog) and another backdoor known as Sagerunex (Backdoor.Sagerunex). Both these tools were also seen in this more recent activity."</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/espionage-asia-governments-cert-authority">Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>843</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2c944b00-981c-11ed-b4f5-57ebeff82bfa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2484538574.mp3?updated=1685127438" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware in Costa Rica. Cyberespionage against unpatched FortiOS instances. Credential stuffing PayPal, breaching T-Mobile. Utility business systems hit. Hackathons and phishing in Russia. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1743/notes</link>
      <description>Ransomware hits Costa Rican government systems, again. A Chinese threat actor deploys the BOLDMOVE backdoor against unpatched FortiOS. Credential stuffing afflicts PayPal users. T-Mobile discloses a data breach. A cyberattack hits a remote Canadian utility. The Wagner Group sponsors a hackathon. Malek Ben Salem from Accenture describes prompt injection for chatbots. Our guest is Paul Martini of iboss with insights on Zero Trust. And the FSB’s Gamaredon APT runs a hands-on Telegraph phishing campaign against Ukrainian targets.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/13

Selected reading.
Bolster Your Company Defenses With Zero Trust Edge (Forrester)
MICITT detecta incidente informático en el MOPT, el cual ya se encuentra contenido (MICITT)
MOPT mantiene habilitados todos los servicios de manera presencial (MICITT)
Costa Rica’s Ministry of Public Works and Transport crippled by ransomware attack (Record)
Suspected Chinese Threat Actors Exploiting FortiOS Vulnerability (CVE-2022-42475) (Mandiant) 
Attackers Crafted Custom Malware for Fortinet Zero-Day (Dark Reading)
Chinese hackers used recently patched FortiOS SSL-VPN flaw as a zero-day in October (Security Affairs) 
PayPal accounts breached in large-scale credential stuffing attack (BleepingComputer)
PayPal Confirms Over 34,000 Customer Accounts Were Breached (EcommerceBytes)
35,000 PayPal accounts hacked, and users could've prevented it (PCWorld)
Thousands Of PayPal Accounts Hacked—Is Yours One Of Them? (Forbes)
Nearly 35,000 PayPal users had SSNs, tax info leaked during December cyberattack (The Record from Recorded Future News)
T-Mobile Says Hacker Stole Data for 37 Million Customers (Bloomberg)
T-Mobile Says Hackers Stole Data on About 37 Million Customers (Wall Street Journal)
T-Mobile Says Hackers Used API to Steal Data on 37 Million Accounts (SecurityWeek)
Cyberattack hits Nunavut's Qulliq Energy Corp. (CBC News) 
Nunavut power utility’s servers hit by cyber attack | IT World Canada News (IT World Canada)
Russian War Report: Russian hacker wanted by the FBI reportedly wins Wagner hackathon prize  (Atlantic Council)
Gamaredon (Ab)uses Telegram to Target Ukrainian Organizations (Blackberry)
Gamaredon Group Launches Cyberattacks Against Ukraine Using Telegram (The Hacker News) 
Hitachi Energy PCU400 (CISA) 
Bolster Your Company Defenses With Zero Trust Edge (iBoss)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 20 Jan 2023 21:30:00 -0000</pubDate>
      <itunes:title>Ransomware in Costa Rica. Cyberespionage against unpatched FortiOS instances. Credential stuffing PayPal, breaching T-Mobile. Utility business systems hit. Hackathons and phishing in Russia. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1743</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ransomware hits Costa Rican government systems, again. A Chinese threat actor deploys the BOLDMOVE backdoor against unpatched FortiOS. Credential stuffing afflicts PayPal users. T-Mobile discloses a data breach. A cyberattack hits a remote Canadian utility. The Wagner Group sponsors a hackathon. Malek Ben Salem from Accenture describes prompt injection for chatbots. Our guest is Paul Martini of iboss with insights on Zero Trust. And the FSB’s Gamaredon APT runs a hands-on Telegraph phishing campaign against Ukrainian targets.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/13

Selected reading.
Bolster Your Company Defenses With Zero Trust Edge (Forrester)
MICITT detecta incidente informático en el MOPT, el cual ya se encuentra contenido (MICITT)
MOPT mantiene habilitados todos los servicios de manera presencial (MICITT)
Costa Rica’s Ministry of Public Works and Transport crippled by ransomware attack (Record)
Suspected Chinese Threat Actors Exploiting FortiOS Vulnerability (CVE-2022-42475) (Mandiant) 
Attackers Crafted Custom Malware for Fortinet Zero-Day (Dark Reading)
Chinese hackers used recently patched FortiOS SSL-VPN flaw as a zero-day in October (Security Affairs) 
PayPal accounts breached in large-scale credential stuffing attack (BleepingComputer)
PayPal Confirms Over 34,000 Customer Accounts Were Breached (EcommerceBytes)
35,000 PayPal accounts hacked, and users could've prevented it (PCWorld)
Thousands Of PayPal Accounts Hacked—Is Yours One Of Them? (Forbes)
Nearly 35,000 PayPal users had SSNs, tax info leaked during December cyberattack (The Record from Recorded Future News)
T-Mobile Says Hacker Stole Data for 37 Million Customers (Bloomberg)
T-Mobile Says Hackers Stole Data on About 37 Million Customers (Wall Street Journal)
T-Mobile Says Hackers Used API to Steal Data on 37 Million Accounts (SecurityWeek)
Cyberattack hits Nunavut's Qulliq Energy Corp. (CBC News) 
Nunavut power utility’s servers hit by cyber attack | IT World Canada News (IT World Canada)
Russian War Report: Russian hacker wanted by the FBI reportedly wins Wagner hackathon prize  (Atlantic Council)
Gamaredon (Ab)uses Telegram to Target Ukrainian Organizations (Blackberry)
Gamaredon Group Launches Cyberattacks Against Ukraine Using Telegram (The Hacker News) 
Hitachi Energy PCU400 (CISA) 
Bolster Your Company Defenses With Zero Trust Edge (iBoss)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ransomware hits Costa Rican government systems, again. A Chinese threat actor deploys the BOLDMOVE backdoor against unpatched FortiOS. Credential stuffing afflicts PayPal users. T-Mobile discloses a data breach. A cyberattack hits a remote Canadian utility. The Wagner Group sponsors a hackathon. Malek Ben Salem from Accenture describes prompt injection for chatbots. Our guest is Paul Martini of iboss with insights on Zero Trust. And the FSB’s Gamaredon APT runs a hands-on Telegraph phishing campaign against Ukrainian targets.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/13</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.iboss.com/storage/2022/10/iboss-Bolster-Your-Company-Defenses-With-Zero-Trust-Edge.pdf">Bolster Your Company Defenses With Zero Trust Edge</a> (Forrester)</p><p><a href="https://www.micitt.go.cr/2023/01/18/micitt-detecta-incidente-informatico-en-el-mopt-el-cual-ya-se-encuentra-contenido/">MICITT detecta incidente informático en el MOPT, el cual ya se encuentra contenido</a> (MICITT)</p><p><a href="https://www.micitt.go.cr/2023/01/18/mopt-mantiene-habilitados-todos-los-servicios-de-manera-presencial/">MOPT mantiene habilitados todos los servicios de manera presencial</a> (MICITT)</p><p><a href="https://therecord.media/costa-ricas-ministry-of-public-works-and-transport-crippled-by-ransomware-attack/">Costa Rica’s Ministry of Public Works and Transport crippled by ransomware attack</a> (Record)</p><p><a href="https://www.mandiant.com/resources/blog/chinese-actors-exploit-fortios-flaw">Suspected Chinese Threat Actors Exploiting FortiOS Vulnerability (CVE-2022-42475)</a> (Mandiant) </p><p><a href="https://www.darkreading.com/threat-intelligence/china-based-attacker-crafted-custom-malware-for-fortinet-zero-day">Attackers Crafted Custom Malware for Fortinet Zero-Day</a> (Dark Reading)</p><p><a href="https://securityaffairs.com/141052/hacking/fortios-ssl-vpn-zero-day.html">Chinese hackers used recently patched FortiOS SSL-VPN flaw as a zero-day in October</a> (Security Affairs) </p><p><a href="https://www.bleepingcomputer.com/news/security/paypal-accounts-breached-in-large-scale-credential-stuffing-attack/">PayPal accounts breached in large-scale credential stuffing attack</a> (BleepingComputer)</p><p><a href="https://www.ecommercebytes.com/2023/01/19/paypal-confirms-over-34000-customer-accounts-were-breached/">PayPal Confirms Over 34,000 Customer Accounts Were Breached</a> (EcommerceBytes)</p><p><a href="https://www.pcworld.com/article/1478487/35000-paypal-accounts.html">35,000 PayPal accounts hacked, and users could've prevented it</a> (PCWorld)</p><p><a href="https://www.forbes.com/sites/daveywinder/2023/01/19/thousands-of-paypal-accounts-hacked-is-yours-one-of-them/">Thousands Of PayPal Accounts Hacked—Is Yours One Of Them?</a> (Forbes)</p><p><a href="https://therecord.media/nearly-35000-paypal-users-had-ssns-tax-info-leaked-during-december-cyberattack/">Nearly 35,000 PayPal users had SSNs, tax info leaked during December cyberattack</a> (The Record from Recorded Future News)</p><p><a href="https://www.bloomberg.com/news/articles/2023-01-19/t-mobile-tmus-says-hacker-stole-data-for-37-million-customers">T-Mobile Says Hacker Stole Data for 37 Million Customers</a> (Bloomberg)</p><p><a href="https://www.wsj.com/articles/t-mobile-says-hackers-stole-data-on-about-37-million-customers-11674166048">T-Mobile Says Hackers Stole Data on About 37 Million Customers</a> (Wall Street Journal)</p><p><a href="https://www.securityweek.com/t-mobile-says-hackers-used-api-steal-data-37-million-accounts">T-Mobile Says Hackers Used API to Steal Data on 37 Million Accounts</a> (SecurityWeek)</p><p><a href="https://www.cbc.ca/news/canada/north/qulliq-energy-corporation-cyberattack-1.6720056">Cyberattack hits Nunavut's Qulliq Energy Corp.</a> (CBC News) </p><p><a href="https://www.itworldcanada.com/article/nunavut-power-utilitys-servers-hit-by-cyber-attack/522899">Nunavut power utility’s servers hit by cyber attack | IT World Canada News</a> (IT World Canada)</p><p><a href="https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-russian-hacker-wanted-by-the-fbi-reportedly-wins-wagner-hackathon-prize/">Russian War Report: Russian hacker wanted by the FBI reportedly wins Wagner hackathon prize </a> (Atlantic Council)</p><p><a href="https://blogs.blackberry.com/en/2023/01/gamaredon-abuses-telegram-to-target-ukrainian-organizations">Gamaredon (Ab)uses Telegram to Target Ukrainian Organizations</a> (Blackberry)</p><p><a href="https://thehackernews.com/2023/01/gamaredon-group-launches-cyberattacks.html">Gamaredon Group Launches Cyberattacks Against Ukraine Using Telegram</a> (The Hacker News) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-019-01">Hitachi Energy PCU400</a> (CISA) </p><p><a href="https://www.iboss.com/storage/2022/10/iboss-Bolster-Your-Company-Defenses-With-Zero-Trust-Edge.pdf">Bolster Your Company Defenses With Zero Trust Edge</a> (iBoss)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1684</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[44fe5a86-787a-11ec-abf0-3b76b282a725]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4949828314.mp3?updated=1690320505" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Criminal-on-criminal action in the dark web. The cyber phases of the hybrid war heat up. ICS vulnerabilities. Codespaces and malware servers. Blank-image attacks. Social engineering.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1742/notes</link>
      <description>A hostile takeover of the Solaris contraband market. Ukraine warns that Russian cyberattacks continue. An overview of 2H 2022 ICS vulnerabilities. Codespaces accounts can act as malware servers. Blank-image attacks. Campaigns leveraging HR policy themes. Dinah Davis from Arctic Wolf has tips for pros for security at home. Our guest is Gerry Gebel from Strata Identity describes a new open source standard that aims to unify cloud identity platforms. And travel-themed phishing increases.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/12

Selected reading.
Friday the 13th on the Dark Web: $150 Million Russian Drug Market Solaris Hacked by Rival Market Kraken (Elliptic Connect) 
Russia-linked drug marketplace Solaris hacked by its rival (The Record from Recorded Future News) 
Cyber-attacks have tripled in past year, says Ukraine’s cybersecurity agency (the Guardian)
Ukraine: Russians Aim to Destroy Information Infrastructure (Gov Info Security) 
Ukraine says Russia is coordinating missile strikes, cyberattacks and information operations (The Record by Recorded Future)
ICS Vulnerabilities and CVEs: Second Half of 2022 (SynSaber)
Abusing a GitHub Codespaces Feature For Malware Delivery (Trend Micro)
The Blank Image Attack (Avanan)
Phishing Attacks Pose as Updated 2023 HR Policy Announcements (Abnormal Security)
Spammers phish eager vacationers with travel-themed lures, Bitdefender Antispam Lab warns (Bitdefender)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 19 Jan 2023 21:15:00 -0000</pubDate>
      <itunes:title>Criminal-on-criminal action in the dark web. The cyber phases of the hybrid war heat up. ICS vulnerabilities. Codespaces and malware servers. Blank-image attacks. Social engineering.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1742</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A hostile takeover of the Solaris contraband market. Ukraine warns that Russian cyberattacks continue. An overview of 2H 2022 ICS vulnerabilities. Codespaces accounts can act as malware servers. Blank-image attacks. Campaigns leveraging HR policy themes. Dinah Davis from Arctic Wolf has tips for pros for security at home. Our guest is Gerry Gebel from Strata Identity describes a new open source standard that aims to unify cloud identity platforms. And travel-themed phishing increases.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/12

Selected reading.
Friday the 13th on the Dark Web: $150 Million Russian Drug Market Solaris Hacked by Rival Market Kraken (Elliptic Connect) 
Russia-linked drug marketplace Solaris hacked by its rival (The Record from Recorded Future News) 
Cyber-attacks have tripled in past year, says Ukraine’s cybersecurity agency (the Guardian)
Ukraine: Russians Aim to Destroy Information Infrastructure (Gov Info Security) 
Ukraine says Russia is coordinating missile strikes, cyberattacks and information operations (The Record by Recorded Future)
ICS Vulnerabilities and CVEs: Second Half of 2022 (SynSaber)
Abusing a GitHub Codespaces Feature For Malware Delivery (Trend Micro)
The Blank Image Attack (Avanan)
Phishing Attacks Pose as Updated 2023 HR Policy Announcements (Abnormal Security)
Spammers phish eager vacationers with travel-themed lures, Bitdefender Antispam Lab warns (Bitdefender)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A hostile takeover of the Solaris contraband market. Ukraine warns that Russian cyberattacks continue. An overview of 2H 2022 ICS vulnerabilities. Codespaces accounts can act as malware servers. Blank-image attacks. Campaigns leveraging HR policy themes. Dinah Davis from Arctic Wolf has tips for pros for security at home. Our guest is Gerry Gebel from Strata Identity describes a new open source standard that aims to unify cloud identity platforms. And travel-themed phishing increases.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/12</p><p><br></p><h2>Selected reading.</h2><p><a href="https://hub.elliptic.co/analysis/friday-the-13th-on-the-dark-web-150-million-russian-drug-market-solaris-hacked-by-rival-market-kraken/">Friday the 13th on the Dark Web: $150 Million Russian Drug Market Solaris Hacked by Rival Market Kraken</a> (Elliptic Connect) </p><p><a href="https://therecord.media/russia-linked-drug-marketplace-solaris-hacked-by-its-rival/">Russia-linked drug marketplace Solaris hacked by its rival</a> (The Record from Recorded Future News) </p><p><a href="https://www.theguardian.com/world/2023/jan/19/cyber-attacks-have-tripled-in-past-year-says-ukraine-cybersecurity-agency">Cyber-attacks have tripled in past year, says Ukraine’s cybersecurity agency</a> (the Guardian)</p><p><a href="https://www.govinfosecurity.com/ukraine-russians-aim-to-destroy-information-infrastructure-a-20964">Ukraine: Russians Aim to Destroy Information Infrastructure</a> (Gov Info Security) </p><p><a href="https://therecord.media/ukraine-says-russia-is-coordinating-missile-strikes-cyberattacks-and-information-operations/">Ukraine says Russia is coordinating missile strikes, cyberattacks and information operations</a> (The Record by Recorded Future)</p><p><a href="https://synsaber.com/resources/ics-vulnerabilities-and-cves-second-half-2022/">ICS Vulnerabilities and CVEs: Second Half of 2022</a> (SynSaber)</p><p><a href="https://www.trendmicro.com/en_us/research/23/a/abusing-github-codespaces-for-malware-delivery.html">Abusing a GitHub Codespaces Feature For Malware Delivery</a> (Trend Micro)</p><p><a href="https://www.avanan.com/blog/the-blank-image-attack">The Blank Image Attack</a> (Avanan)</p><p><a href="https://intelligence.abnormalsecurity.com/blog/hr-policy-announcement-attacks">Phishing Attacks Pose as Updated 2023 HR Policy Announcements</a> (Abnormal Security)</p><p><a href="https://www.bitdefender.com/blog/hotforsecurity/spammers-phish-eager-vacationers-with-travel-themed-lures-bitdefender-antispam-lab-warns/">Spammers phish eager vacationers with travel-themed lures, Bitdefender Antispam Lab warns</a> (Bitdefender)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1692</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[455e3e74-787a-11ec-abf0-0fce1c4e7426]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2263814035.mp3?updated=1690320488" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ICS security–vulnerabilities, mitigations, and threats. A Chinese APT prospects Iranian targets. The persistence of nuisance-level hacktivism. And war takes a toll on the criminal economy.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1741/notes</link>
      <description>CISA adds to its Known Exploited Vulnerability Catalog. Attacks against industrial systems. DNV is recovering from ransomware. Chinese cyberespionage is reported against Iran. The persistence of nuisance-level hacktivism. Robert M. Lee from Dragos outlines pipeline security. Our guest is Yasmin Abdi from Snap on bringing her team up to speed with zero trust. And a side-effect of Russia's war: a drop in paycard fraud.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/11

Selected reading.
Bolster Your Company Defenses With Zero Trust Edge (iBoss)
CISA Adds One Known Exploited Vulnerability to Catalog (CISA)
GE Digital Proficy Historian (CISA)
Mitsubishi Electric MELSEC iQ-F, iQ-R Series (CISA) 
Siemens SINEC INS (CISA)
Contec CONPROSYS HMI System (CHS) Update A (CISA)
Nozomi Networks Researchers Take a Deep Look into the ICS Threat Landscape (Nozomi Networks)
A look at IoT/ICS threats. (CyberWire)
DNV's fleet management software recovering from ransomware attack. (CyberWire)
DNV says up to 1,000 ships affected by ransomware attack (Computing)
Ransomware attack on maritime software impacts 1,000 ships (The Record from Recorded Future News)
Chinese Playful Taurus Activity in Iran (Unit 42)
Playful Taurus: a Chinese APT active against Iran. (CyberWire)
Russian hackers allegedly tried to disrupt a Ukrainian press briefing about cyberattacks (Axios)
Russia's Ukraine War Drives 62% Slump in Stolen Cards (Infosecurity Magazine)
Annual Payment Fraud Intelligence Report: 2022 (Recorded Future)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 18 Jan 2023 21:15:00 -0000</pubDate>
      <itunes:title>ICS security–vulnerabilities, mitigations, and threats. A Chinese APT prospects Iranian targets. The persistence of nuisance-level hacktivism. And war takes a toll on the criminal economy.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1741</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA adds to its Known Exploited Vulnerability Catalog. Attacks against industrial systems. DNV is recovering from ransomware. Chinese cyberespionage is reported against Iran. The persistence of nuisance-level hacktivism. Robert M. Lee from Dragos outlines pipeline security. Our guest is Yasmin Abdi from Snap on bringing her team up to speed with zero trust. And a side-effect of Russia's war: a drop in paycard fraud.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/11

Selected reading.
Bolster Your Company Defenses With Zero Trust Edge (iBoss)
CISA Adds One Known Exploited Vulnerability to Catalog (CISA)
GE Digital Proficy Historian (CISA)
Mitsubishi Electric MELSEC iQ-F, iQ-R Series (CISA) 
Siemens SINEC INS (CISA)
Contec CONPROSYS HMI System (CHS) Update A (CISA)
Nozomi Networks Researchers Take a Deep Look into the ICS Threat Landscape (Nozomi Networks)
A look at IoT/ICS threats. (CyberWire)
DNV's fleet management software recovering from ransomware attack. (CyberWire)
DNV says up to 1,000 ships affected by ransomware attack (Computing)
Ransomware attack on maritime software impacts 1,000 ships (The Record from Recorded Future News)
Chinese Playful Taurus Activity in Iran (Unit 42)
Playful Taurus: a Chinese APT active against Iran. (CyberWire)
Russian hackers allegedly tried to disrupt a Ukrainian press briefing about cyberattacks (Axios)
Russia's Ukraine War Drives 62% Slump in Stolen Cards (Infosecurity Magazine)
Annual Payment Fraud Intelligence Report: 2022 (Recorded Future)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA adds to its Known Exploited Vulnerability Catalog. Attacks against industrial systems. DNV is recovering from ransomware. Chinese cyberespionage is reported against Iran. The persistence of nuisance-level hacktivism. Robert M. Lee from Dragos outlines pipeline security. Our guest is Yasmin Abdi from Snap on bringing her team up to speed with zero trust. And a side-effect of Russia's war: a drop in paycard fraud.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/11</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.iboss.com/storage/2022/10/iboss-Bolster-Your-Company-Defenses-With-Zero-Trust-Edge.pdf">Bolster Your Company Defenses With Zero Trust Edge</a> (iBoss)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2023/01/17/cisa-adds-one-known-exploited-vulnerability-catalog">CISA Adds One Known Exploited Vulnerability to Catalog</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-017-01">GE Digital Proficy Historian</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-017-02">Mitsubishi Electric MELSEC iQ-F, iQ-R Series</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-017-03">Siemens SINEC INS</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-347-03">Contec CONPROSYS HMI System (CHS) Update A</a> (CISA)</p><p><a href="https://www.nozominetworks.com/blog/nozomi-networks-researchers-take-a-deep-look-into-the-ics-threat-landscape/">Nozomi Networks Researchers Take a Deep Look into the ICS Threat Landscape</a> (Nozomi Networks)</p><p><a href="https://thecyberwire.com/stories/cdd9179ad6704989bd34cc4ee9503b85/a-look-at-iotics-threats">A look at IoT/ICS threats.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/dbe7d4e2bd2e4a198ce91dc20e2edd32/dnvs-fleet-management-software-recovering-from-ransomware-attack">DNV's fleet management software recovering from ransomware attack.</a> (CyberWire)</p><p><a href="https://www.computing.co.uk/news/4062842/dnv-ships-affected-ransomware-attack?">DNV says up to 1,000 ships affected by ransomware attack </a>(Computing)</p><p><a href="https://therecord.media/ransomware-attack-on-maritime-software-impacts-1000-ships/">Ransomware attack on maritime software impacts 1,000 ships</a> (The Record from Recorded Future News)</p><p><a href="https://unit42.paloaltonetworks.com/playful-taurus/">Chinese Playful Taurus Activity in Iran</a> (Unit 42)</p><p><a href="https://thecyberwire.com/stories/48ef6b20cdba47868c3a809113c50f73/playful-taurus-a-chinese-apt--active-against-iran">Playful Taurus: a Chinese APT active against Iran.</a> (CyberWire)</p><p><a href="https://www.axios.com/2023/01/17/ukraine-cyber-warfare-russia-hackers">Russian hackers allegedly tried to disrupt a Ukrainian press briefing about cyberattacks</a> (Axios)</p><p><a href="https://www.infosecurity-magazine.com/news/russias-ukraine-62-slump-stolen/">Russia's Ukraine War Drives 62% Slump in Stolen Cards</a> (Infosecurity Magazine)</p><p><a href="https://www.recordedfuture.com/annual-payment-fraud-intelligence-report-2022">Annual Payment Fraud Intelligence Report: 2022</a> (Recorded Future)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1867</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[45fe2ca4-787a-11ec-abf0-fbb5f7eb1c26]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5721876759.mp3?updated=1690320469" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing campaigns (one uses mobilization as phishbait). Credential-stuffing attack affects Norton LifeLock users. Trends in security. Azure SSRF issues fixed. Calls for a “digital UN.”</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1740/notes</link>
      <description>A Phishing campaign impersonates DHL. Conscription and mobilization provide criminals with phishbait for Russian victims. Norton LifeLock advises customers that their accounts may have been compromised. Trends in data protection. Veracode's report on the state of software application security. Ben Yelin looks at NSO group’s attempt at state sovereignty. Ann Johnson from Afternoon Cyber Tea speaks with Microsoft’s Chris Young about the importance of the security ecosystem. And Ukraine calls for a "digital United Nations."

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/10

Selected reading.
Cloud 9: Top Cloud Penetration Testing Tools (Bishop Fox)
Our Top Favorite Fuzzer crowdsourcing pen testing tools (Bishop Fox)
DHL Phishing Attack. Simply Delivered. (ArmorBlox) 
Credential phishing campaign impersonates DHL. (CyberWire)
Phishing scam invites Russian Telegram users to check ‘conscription lists’ to see if they’ll be drafted in February (Meduza)
NortonLifeLock warns that hackers breached Password Manager accounts (BleepingComputer)
Norton LifeLock says thousands of customer accounts breached (TechCrunch).
NortonLifeLock notifies thousands of users about compromised Password Manager accounts (Computing) 
Data Protection Trends Report 2023 (Veeam)
Trends in data protection. (CyberWire)
How Orca Found Server-Side Request Forgery (SSRF) Vulnerabilities in Four Different Azure Services (Orca Security)
Orca describes four Azure vulnerabilities. (CyberWire)
State Of Software Security (Veracode) 
A look at the state of software security. (CyberWire)
Ukraine calls for ‘Cyber United Nations’ amid Russian attacks (POLITICO) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Jan 2023 21:45:00 -0000</pubDate>
      <itunes:title>Phishing campaigns (one uses mobilization as phishbait). Credential-stuffing attack affects Norton LifeLock users. Trends in security. Azure SSRF issues fixed. Calls for a “digital UN.”</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1740</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A Phishing campaign impersonates DHL. Conscription and mobilization provide criminals with phishbait for Russian victims. Norton LifeLock advises customers that their accounts may have been compromised. Trends in data protection. Veracode's report on the state of software application security. Ben Yelin looks at NSO group’s attempt at state sovereignty. Ann Johnson from Afternoon Cyber Tea speaks with Microsoft’s Chris Young about the importance of the security ecosystem. And Ukraine calls for a "digital United Nations."

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/10

Selected reading.
Cloud 9: Top Cloud Penetration Testing Tools (Bishop Fox)
Our Top Favorite Fuzzer crowdsourcing pen testing tools (Bishop Fox)
DHL Phishing Attack. Simply Delivered. (ArmorBlox) 
Credential phishing campaign impersonates DHL. (CyberWire)
Phishing scam invites Russian Telegram users to check ‘conscription lists’ to see if they’ll be drafted in February (Meduza)
NortonLifeLock warns that hackers breached Password Manager accounts (BleepingComputer)
Norton LifeLock says thousands of customer accounts breached (TechCrunch).
NortonLifeLock notifies thousands of users about compromised Password Manager accounts (Computing) 
Data Protection Trends Report 2023 (Veeam)
Trends in data protection. (CyberWire)
How Orca Found Server-Side Request Forgery (SSRF) Vulnerabilities in Four Different Azure Services (Orca Security)
Orca describes four Azure vulnerabilities. (CyberWire)
State Of Software Security (Veracode) 
A look at the state of software security. (CyberWire)
Ukraine calls for ‘Cyber United Nations’ amid Russian attacks (POLITICO) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Phishing campaign impersonates DHL. Conscription and mobilization provide criminals with phishbait for Russian victims. Norton LifeLock advises customers that their accounts may have been compromised. Trends in data protection. Veracode's report on the state of software application security. Ben Yelin looks at NSO group’s attempt at state sovereignty. Ann Johnson from Afternoon Cyber Tea speaks with Microsoft’s Chris Young about the importance of the security ecosystem. And Ukraine calls for a "digital United Nations."</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/10</p><p><br></p><p><strong>Selected reading.</strong></p><p><a href="https://bishopfox.com/blog/cloud-pen-testing-tools">Cloud 9: Top Cloud Penetration Testing Tools</a> (Bishop Fox)</p><p><a href="https://bishopfox.com/blog/top-9-fuzzers">Our Top Favorite Fuzzer crowdsourcing pen testing tool</a>s (Bishop Fox)</p><p><a href="https://www.armorblox.com/blog/dhl-phishing-attack-simply-delivered/">DHL Phishing Attack. Simply Delivered.</a> (ArmorBlox) </p><p><a href="https://thecyberwire.com/stories/b55cd0750e2f4833a994ba1afcd7be79/credential-phishing-campaign-impersonates-dhl">Credential phishing campaign impersonates DH</a>L. (CyberWire)</p><p><a href="https://meduza.io/en/news/2023/01/13/phishing-scam-invites-russian-telegram-users-to-check-conscription-lists-to-see-if-they-ll-be-drafted-in-february">Phishing scam invites Russian Telegram users to check ‘conscription lists’ to see if they’ll be drafted in February</a> (Meduza)</p><p><a href="https://www.bleepingcomputer.com/news/security/nortonlifelock-warns-that-hackers-breached-password-manager-accounts/">NortonLifeLock warns that hackers breached Password Manager accounts</a> (BleepingComputer)</p><p><a href="https://techcrunch.com/2023/01/15/norton-lifelock-password-manager-data/">Norton LifeLock says thousands of customer accounts breached</a> (TechCrunch).</p><p><a href="https://www.computing.co.uk/news/4062700/nortonlifelock-notifies-thousands-users-about-compromised-password-manager-accounts">NortonLifeLock notifies thousands of users about compromised Password Manager accounts </a>(Computing) </p><p><a href="https://www.veeam.com/wp-data-protection-trends-report-2023.html">Data Protection Trends Report 2023</a> (Veeam)</p><p><a href="https://thecyberwire.com/stories/f5e9b15afdd0457496f63eccf68703b3/trends-in-data-protection">Trends in data protection</a>. (CyberWire)</p><p><a href="https://orca.security/resources/blog/ssrf-vulnerabilities-in-four-azure-services/">How Orca Found Server-Side Request Forgery (SSRF) Vulnerabilities in Four Different Azure Services</a> (Orca Security)</p><p><a href="https://thecyberwire.com/stories/d2155322d99e44e38f03ea2a24f96acd/orca-describes-four-azure-vulnerabilities">Orca describes four Azure vulnerabilities</a>. (CyberWire)</p><p><a href="https://www.veracode.com/state-of-software-security-report">State Of Software Security</a> (Veracode) </p><p><a href="https://thecyberwire.com/stories/0ecab39fd63b4c16ac8f4faa4b520807/state-of-software-security">A look at the state of software security</a>. (CyberWire)</p><p><a href="https://www.politico.com/news/2023/01/15/ukraine-cyber-united-nations-russia-00077955">Ukraine calls for ‘Cyber United Nations’ amid Russian attacks</a> (POLITICO) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1439</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[467de138-787a-11ec-abf0-e3ade37570b2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3290185638.mp3?updated=1690320448" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Gene Fay: Lead from the front. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/132/notes</link>
      <description>Gene Fay, CEO of ThreatX sits down to share his experience rising through the ranks to get to where he is today. He shares how even at a young age he wanted to work in an office and become a businessman, though at the time he did not understand what that entailed. After college he acquired a job that was revolutionizing video editing for post-production studios as well as TV stations, where he started to really learn about technology. Gene talks about leading from the front and how a good leader will always do so, even if he has to lead from two different fronts. He said "it's kind of the two fronts, sometimes you've gotta put on the leadership face, and believe it, that, that you can get, and we can get through any situation, cuz sometimes you're, your gut feelings are, might be wrong and, or it's a moment in time and if you can help the team grind through that situation, it does get better." We thank Gene for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 15 Jan 2023 08:00:00 -0000</pubDate>
      <itunes:title>Gene Fay: Lead from the front. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>132</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Gene Fay, CEO of ThreatX sits down to share his experience rising through the ranks to get to where he is today. He shares how even at a young age he wanted to work in an office and become a businessman, though at the time he did not understand what that entailed. After college he acquired a job that was revolutionizing video editing for post-production studios as well as TV stations, where he started to really learn about technology. Gene talks about leading from the front and how a good leader will always do so, even if he has to lead from two different fronts. He said "it's kind of the two fronts, sometimes you've gotta put on the leadership face, and believe it, that, that you can get, and we can get through any situation, cuz sometimes you're, your gut feelings are, might be wrong and, or it's a moment in time and if you can help the team grind through that situation, it does get better." We thank Gene for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Gene Fay, CEO of ThreatX sits down to share his experience rising through the ranks to get to where he is today. He shares how even at a young age he wanted to work in an office and become a businessman, though at the time he did not understand what that entailed. After college he acquired a job that was revolutionizing video editing for post-production studios as well as TV stations, where he started to really learn about technology. Gene talks about leading from the front and how a good leader will always do so, even if he has to lead from two different fronts. He said "it's kind of the two fronts, sometimes you've gotta put on the leadership face, and believe it, that, that you can get, and we can get through any situation, cuz sometimes you're, your gut feelings are, might be wrong and, or it's a moment in time and if you can help the team grind through that situation, it does get better." We thank Gene for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>470</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[29589166-9377-11ed-9362-3bd41235d142]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3986195022.mp3?updated=1673637114" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DUCKTAIL waddles back again. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/264/notes</link>
      <description>Mohammad Kazem Hassan Nejad from WithSecure joins Dave to discuss the team’s research, “DUCKTAIL returns - Underneath the ruffled feathers.” DUCKTAIL is a financially motivated malware operation that targets individuals and businesses operating on the Facebook Ads and Business platform.
The research states “The malware is designed to steal browser cookies and take advantage of authenticated Facebook sessions to steal information from the victim's Facebook account.” WithSecure has found that after a short hiatus, DUCKTAIL has returned with slight changes in their mode of operation.
The research can be found here:
DUCKTAIL returns: Underneath the ruffled feathers

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Jan 2023 08:00:00 -0000</pubDate>
      <itunes:title>DUCKTAIL waddles back again. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>264</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Mohammad Kazem Hassan Nejad from WithSecure joins Dave to discuss the team’s research, “DUCKTAIL returns - Underneath the ruffled feathers.” DUCKTAIL is a financially motivated malware operation that targets individuals and businesses operating on the Facebook Ads and Business platform.
The research states “The malware is designed to steal browser cookies and take advantage of authenticated Facebook sessions to steal information from the victim's Facebook account.” WithSecure has found that after a short hiatus, DUCKTAIL has returned with slight changes in their mode of operation.
The research can be found here:
DUCKTAIL returns: Underneath the ruffled feathers

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Mohammad Kazem Hassan Nejad from WithSecure joins Dave to discuss the team’s research, “DUCKTAIL returns - Underneath the ruffled feathers.” DUCKTAIL is a financially motivated malware operation that targets individuals and businesses operating on the Facebook Ads and Business platform.</p><p>The research states “The malware is designed to steal browser cookies and take advantage of authenticated Facebook sessions to steal information from the victim's Facebook account.” WithSecure has found that after a short hiatus, DUCKTAIL has returned with slight changes in their mode of operation.</p><p>The research can be found here:</p><ul><li><a href="https://labs.withsecure.com/publications/ducktail-returns">DUCKTAIL returns: Underneath the ruffled feathers</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1293</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bfa4d1e4-929a-11ed-b668-375f05c50ee3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6799928701.mp3?updated=1685127316" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Updates on the hybrid war, and on the incidents at the Royal Mail, the FAA, and the Guardian. Royal ransomware exploits Citrix vulnerability. CISA’s annual report is out.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1739/notes</link>
      <description>GitHub disables NoName accounts. Russia dismisses reports of cyberespionage attempts against US National Laboratories. The Royal Mail cyber incident is now identified as ransomware attack. An update on the NOTAM issues that interfered with civil aviation. A Citrix vulnerability is exploited by ransomware group. CISA publishes its annual report. Bryan Vorndran of the FBI Cyber Division calibrates expectations with regard to the IC3. Our guest is Kayne McGladrey with insights on 2023 from the IEEE. And Positive Hack Days and the growing isolation of Russia's cyber sector.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/9

Selected reading.
 Impact of Technology in 2023 and Beyond (IEEE)
Ukraine at D+323: Fighting in Soledar, and industrial mobilization. (CyberWire)
GitHub disables pro-Russian hacktivist DDoS pages (CyberScoop)
Russia criticises Reuters story on Russian hackers targeting U.S. nuclear scientists (Reuters)
Royal Mail cyber incident now identified as ransomware attack. (CyberWire)
Not a cyberattack, but an IT failure. (CyberWire)
The Guardian breach and news media as targets. (CyberWire)
Citrix vulnerability exploited by ransomware group. (CyberWire)
2022 Year In Review (CISA)
Russia’s largest hacking conference reflects isolated cyber ecosystem (Brookings)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 13 Jan 2023 21:15:00 -0000</pubDate>
      <itunes:title>Updates on the hybrid war, and on the incidents at the Royal Mail, the FAA, and the Guardian. Royal ransomware exploits Citrix vulnerability. CISA’s annual report is out.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1739</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>GitHub disables NoName accounts. Russia dismisses reports of cyberespionage attempts against US National Laboratories. The Royal Mail cyber incident is now identified as ransomware attack. An update on the NOTAM issues that interfered with civil aviation. A Citrix vulnerability is exploited by ransomware group. CISA publishes its annual report. Bryan Vorndran of the FBI Cyber Division calibrates expectations with regard to the IC3. Our guest is Kayne McGladrey with insights on 2023 from the IEEE. And Positive Hack Days and the growing isolation of Russia's cyber sector.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/9

Selected reading.
 Impact of Technology in 2023 and Beyond (IEEE)
Ukraine at D+323: Fighting in Soledar, and industrial mobilization. (CyberWire)
GitHub disables pro-Russian hacktivist DDoS pages (CyberScoop)
Russia criticises Reuters story on Russian hackers targeting U.S. nuclear scientists (Reuters)
Royal Mail cyber incident now identified as ransomware attack. (CyberWire)
Not a cyberattack, but an IT failure. (CyberWire)
The Guardian breach and news media as targets. (CyberWire)
Citrix vulnerability exploited by ransomware group. (CyberWire)
2022 Year In Review (CISA)
Russia’s largest hacking conference reflects isolated cyber ecosystem (Brookings)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>GitHub disables NoName accounts. Russia dismisses reports of cyberespionage attempts against US National Laboratories. The Royal Mail cyber incident is now identified as ransomware attack. An update on the NOTAM issues that interfered with civil aviation. A Citrix vulnerability is exploited by ransomware group. CISA publishes its annual report. Bryan Vorndran of the FBI Cyber Division calibrates expectations with regard to the IC3. Our guest is Kayne McGladrey with insights on 2023 from the IEEE. And Positive Hack Days and the growing isolation of Russia's cyber sector.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/9</p><p><br></p><h2>Selected reading.</h2><p> <a href="https://transmitter.ieee.org/impact-of-technology-2023/">Impact of Technology in 2023 and Beyond</a> (IEEE)</p><p><a href="https://thecyberwire.com/stories/c904623d538b4c49a66d719eea4c25fb/ukraine-at-d323-fighting-in-soledar-and-industrial-mobilization">Ukraine at D+323: Fighting in Soledar, and industrial mobilization.</a> (CyberWire)</p><p><a href="https://www.cyberscoop.com/russia-hacktivist-noname-github-ddos">GitHub disables pro-Russian hacktivist DDoS pages</a> (CyberScoop)</p><p><a href="https://www.reuters.com/world/europe/russia-criticises-reuters-story-russian-hackers-targeting-us-nuclear-scientists-2023-01-12/">Russia criticises Reuters story on Russian hackers targeting U.S. nuclear scientists</a> (Reuters)</p><p><a href="https://thecyberwire.com/stories/f7d704946e0245b682b0d88039506d04/royal-mail-cyber-incident-now-identified-as-ransomware-attack">Royal Mail cyber incident now identified as ransomware attack.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/e53ab6197dc34d66824e284751d102e8/not-a-cyberattack-but-an-it-failure">Not a cyberattack, but an IT failure.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/f7d073ead7b84f15b2251ce88c81fcdd/the-guardian-breach-and-news-media-as-targets">The Guardian breach and news media as targets.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/a60d67cd8fcf48c9bb26afcd97706f4b/citrix-vulnerability-exploited-by-ransomware-group">Citrix vulnerability exploited by ransomware group.</a> (CyberWire)</p><p><a href="https://www.cisa.gov/2022-year-review">2022 Year In Review</a> (CISA)</p><p><a href="https://www.brookings.edu/techstream/russias-largest-hacking-conference-reflects-isolated-cyber-ecosystem/">Russia’s largest hacking conference reflects isolated cyber ecosystem</a> (Brookings)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1655</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[44dbdad8-787a-11ec-abf0-a7b2f127402d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8745481354.mp3?updated=1690320399" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trojanized VPN installers circulate in Iran. A trip down the static expressway. Hacktivism-for-profit. IT incidents disrupt NOTAMs and Royal Mail. HR phishbait.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1738/notes</link>
      <description>Iranian VPN users are afflicted by Trojanized installation apps. Phishing on the static expressway. NoName057(16) hacktivist auxiliaries target NATO. Yesterday’s flight outage appears not to have been caused by a cyberattack. Royal Mail is disrupted by a "cyber incident." Carole Theriault thinks Meta needs to step up their game when blocking financial scams. Our guest is Mark Sasson from Pinpoint Search Group to discuss why cybersecurity may no longer be a candidate-driven market. And HR phishbait dangles raises, and some employees bite.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/8

Selected reading.
EyeSpy - Iranian Spyware Delivered in VPN Installers (Bitdefender Labs)
Phishing on the Static Expressway. (CyberWire)
NoName057(16) - The Pro-Russian Hacktivist Group Targeting NATO (SentinelOne) 
Not a cyberattack, but an IT failure. (CyberWire)
FAA NOTAM Statement (FAA)
Canadian Pilot-Alert System Reports Outage Hours After U.S. Grounding Order (Wall Street Journal)
US air travel resumes but thousands of flights delayed after planes grounded - live updates (The Telegraph) 
US Flights Latest: Departures Resume After FAA Lifts Ground Stop (Bloomberg)
Royal Mail suffers ‘severe service disruption’ after cyber incident (Glasgow Times)
Royal Mail issues major disruption warning after 'cyber incident' (Computing) 
Parcels and letters stuck in limbo as Royal Mail is hit by a suspected hack (The Telegraph) 
Cyber Incident Hits UK Postal Service, Halts Overseas Mail (SecurityWeek)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 12 Jan 2023 21:15:00 -0000</pubDate>
      <itunes:title>Trojanized VPN installers circulate in Iran. A trip down the static expressway. Hacktivism-for-profit. IT incidents disrupt NOTAMs and Royal Mail. HR phishbait.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1738</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Iranian VPN users are afflicted by Trojanized installation apps. Phishing on the static expressway. NoName057(16) hacktivist auxiliaries target NATO. Yesterday’s flight outage appears not to have been caused by a cyberattack. Royal Mail is disrupted by a "cyber incident." Carole Theriault thinks Meta needs to step up their game when blocking financial scams. Our guest is Mark Sasson from Pinpoint Search Group to discuss why cybersecurity may no longer be a candidate-driven market. And HR phishbait dangles raises, and some employees bite.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/8

Selected reading.
EyeSpy - Iranian Spyware Delivered in VPN Installers (Bitdefender Labs)
Phishing on the Static Expressway. (CyberWire)
NoName057(16) - The Pro-Russian Hacktivist Group Targeting NATO (SentinelOne) 
Not a cyberattack, but an IT failure. (CyberWire)
FAA NOTAM Statement (FAA)
Canadian Pilot-Alert System Reports Outage Hours After U.S. Grounding Order (Wall Street Journal)
US air travel resumes but thousands of flights delayed after planes grounded - live updates (The Telegraph) 
US Flights Latest: Departures Resume After FAA Lifts Ground Stop (Bloomberg)
Royal Mail suffers ‘severe service disruption’ after cyber incident (Glasgow Times)
Royal Mail issues major disruption warning after 'cyber incident' (Computing) 
Parcels and letters stuck in limbo as Royal Mail is hit by a suspected hack (The Telegraph) 
Cyber Incident Hits UK Postal Service, Halts Overseas Mail (SecurityWeek)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iranian VPN users are afflicted by Trojanized installation apps. Phishing on the static expressway. NoName057(16) hacktivist auxiliaries target NATO. Yesterday’s flight outage appears not to have been caused by a cyberattack. Royal Mail is disrupted by a "cyber incident." Carole Theriault thinks Meta needs to step up their game when blocking financial scams. Our guest is Mark Sasson from Pinpoint Search Group to discuss why cybersecurity may no longer be a candidate-driven market. And HR phishbait dangles raises, and some employees bite.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/8</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bitdefender.com/blog/labs/eyespy-iranian-spyware-delivered-in-vpn-installers/">EyeSpy - Iranian Spyware Delivered in VPN Installers</a> (Bitdefender Labs)</p><p><a href="https://thecyberwire.com/stories/82f4c6cd46334f98ba6be3f5eb368216/phishing-on-the-static-expressway">Phishing on the Static Expressway.</a> (CyberWire)</p><p><a href="https://www.sentinelone.com/labs/noname05716-the-pro-russian-hacktivist-group-targeting-nato/">NoName057(16) - The Pro-Russian Hacktivist Group Targeting NATO</a> (SentinelOne) </p><p><a href="https://thecyberwire.com/stories/e53ab6197dc34d66824e284751d102e8/not-a-cyberattack-but-an-it-failure">Not a cyberattack, but an IT failure.</a> (CyberWire)</p><p><a href="https://www.faa.gov/newsroom/faa-notam-statement">FAA NOTAM Statement</a> (FAA)</p><p><a href="https://www.wsj.com/livecoverage/faa-flights-united-planes/card/canadian-airports-see-some-delays-as-u-s-air-traffic-resumes-ZS4DqoettE6DcOampCBX">Canadian Pilot-Alert System Reports Outage Hours After U.S. Grounding Order</a> (Wall Street Journal)</p><p><a href="https://www.telegraph.co.uk/business/2023/01/11/ftse-100-markets-live-banks-recession-strikes-ftx-microsoft/">US air travel resumes but thousands of flights delayed after planes grounded - live updates</a> (The Telegraph) </p><p><a href="https://www.bloomberg.com/news/articles/2023-01-11/us-flights-disrupted-after-outage-of-faa-pilot-advisory-system">US Flights Latest: Departures Resume After FAA Lifts Ground Stop</a> (Bloomberg)</p><p><a href="https://www.glasgowtimes.co.uk/news/national/23244074.royal-mail-suffers-severe-service-disruption-cyber-incident/">Royal Mail suffers ‘severe service disruption’ after cyber incident</a> (Glasgow Times)</p><p><a href="https://www.computing.co.uk/news/4062574/royal-mail-issues-major-disruption-warning-cyber-incident">Royal Mail issues major disruption warning after 'cyber incident' </a>(Computing) </p><p><a href="https://www.telegraph.co.uk/business/2023/01/11/parcels-letters-stuck-limbo-royal-mail-hit-suspected-hack/">Parcels and letters stuck in limbo as Royal Mail is hit by a suspected hack</a> (The Telegraph) </p><p><a href="https://www.securityweek.com/cyber-incident-hits-uk-postal-service-halts-overseas-mail">Cyber Incident Hits UK Postal Service, Halts Overseas Mail</a> (SecurityWeek)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1456</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[457e2a04-787a-11ec-abf0-27afe9478a78]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7944258179.mp3?updated=1690320323" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Notes on patches. Dark Pink industrial cyberespionage campaign in Asia. Kinsing cryptojacking. Hacktivist DDoS against Iran. Healthcare cyber risk management. Pokémon NFTs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1737/notes</link>
      <description>Patch Tuesday. CISA releases two ICS Advisories and makes some additions to its Known Exploited Vulnerabilities Catalog. Dark Pink APT is active against Asian targets. Kinsing cryptojacking targets Kubernetes instances. Ukrainian hacktivists conduct DDoS against Iranian sites. Risk exposure and a hospital's experience with ransomware. The Health3PT initiative seeks to manage 3rd-party risk. Tim Starks from the Washington Post’s Cyber 202 on cyber rising to the level of war crime. Our guest is Connie Stack, CEO of Next DLP, on the path to leadership within cyber for women. And phishing with Pokémon NFTs.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/7

Selected reading.
The Daily 202 (Latest Cybersecurity 202)
Microsoft Releases January 2023 Security Updates (CISA) &gt;
Adobe Releases Security Updates for Multiple Products (CISA) 
Black Box KVM (CISA)
Delta Electronics InfraSuite Device Master (CISA)
Known Exploited Vulnerabilities Catalog (CISA)
Dark Pink (Group-IB)
New Dark Pink APT group targets govt and military with custom malware (BleepingComputer)
Kinsing cryptojacking. (CyberWire)
Ukraine at D+321: "Difficult in places." (CyberWire)
Iranian websites impacted by pro-Ukraine DDoS attacks (SC Media) 
Ransomware attack against SickKids said to be unusual. (CyberWire)
Health3PT seeks a uniform approach to healthcare supply chain issues. (CyberWire)
Breaking the glass ceiling: My journey to close the leadership gap. (CyberWire, Creating Connections)
Pokémon NFTs used as malware vectors. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 11 Jan 2023 21:15:00 -0000</pubDate>
      <itunes:title>Notes on patches. Dark Pink industrial cyberespionage campaign in Asia. Kinsing cryptojacking. Hacktivist DDoS against Iran. Healthcare cyber risk management. Pokémon NFTs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1737</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Patch Tuesday. CISA releases two ICS Advisories and makes some additions to its Known Exploited Vulnerabilities Catalog. Dark Pink APT is active against Asian targets. Kinsing cryptojacking targets Kubernetes instances. Ukrainian hacktivists conduct DDoS against Iranian sites. Risk exposure and a hospital's experience with ransomware. The Health3PT initiative seeks to manage 3rd-party risk. Tim Starks from the Washington Post’s Cyber 202 on cyber rising to the level of war crime. Our guest is Connie Stack, CEO of Next DLP, on the path to leadership within cyber for women. And phishing with Pokémon NFTs.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/7

Selected reading.
The Daily 202 (Latest Cybersecurity 202)
Microsoft Releases January 2023 Security Updates (CISA) &gt;
Adobe Releases Security Updates for Multiple Products (CISA) 
Black Box KVM (CISA)
Delta Electronics InfraSuite Device Master (CISA)
Known Exploited Vulnerabilities Catalog (CISA)
Dark Pink (Group-IB)
New Dark Pink APT group targets govt and military with custom malware (BleepingComputer)
Kinsing cryptojacking. (CyberWire)
Ukraine at D+321: "Difficult in places." (CyberWire)
Iranian websites impacted by pro-Ukraine DDoS attacks (SC Media) 
Ransomware attack against SickKids said to be unusual. (CyberWire)
Health3PT seeks a uniform approach to healthcare supply chain issues. (CyberWire)
Breaking the glass ceiling: My journey to close the leadership gap. (CyberWire, Creating Connections)
Pokémon NFTs used as malware vectors. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Patch Tuesday. CISA releases two ICS Advisories and makes some additions to its Known Exploited Vulnerabilities Catalog. Dark Pink APT is active against Asian targets. Kinsing cryptojacking targets Kubernetes instances. Ukrainian hacktivists conduct DDoS against Iranian sites. Risk exposure and a hospital's experience with ransomware. The Health3PT initiative seeks to manage 3rd-party risk. Tim Starks from the Washington Post’s Cyber 202 on cyber rising to the level of war crime. Our guest is Connie Stack, CEO of Next DLP, on the path to leadership within cyber for women. And phishing with Pokémon NFTs.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/7</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.washingtonpost.com/newsletters/the-daily-202/">The Daily 202</a> (Latest Cybersecurity 202)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2023/01/10/microsoft-releases-january-2023-security-updates">Microsoft Releases January 2023 Security Updates</a> (CISA) &gt;</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2023/01/10/adobe-releases-security-updates-multiple-products">Adobe Releases Security Updates for Multiple Products</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-010-01">Black Box KVM</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-298-07">Delta Electronics InfraSuite Device Master</a> (CISA)</p><p><a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">Known Exploited Vulnerabilities Catalog</a> (CISA)</p><p><a href="https://blog.group-ib.com/dark-pink-apt?utm_source=press_release&amp;utm_campaign=dark-pink-blog&amp;utm_medium=organic">Dark Pink</a> (Group-IB)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-dark-pink-apt-group-targets-govt-and-military-with-custom-malware/">New Dark Pink APT group targets govt and military with custom malware</a> (BleepingComputer)</p><p><a href="https://thecyberwire.com/stories/f1ef7a51ed904c4586bf13aa836ffca6/kinsing-cryptojacking">Kinsing cryptojacking.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/9a1c12dace0f43cdb135e3479950389c/ukraine-at-d321-difficult-in-places">Ukraine at D+321: "Difficult in places."</a> (CyberWire)</p><p><a href="https://www.scmagazine.com/brief/threat-intelligence/iranian-websites-impacted-by-pro-ukraine-ddos-attacks">Iranian websites impacted by pro-Ukraine DDoS attacks</a> (SC Media) </p><p><a href="https://thecyberwire.com/stories/7f56a4a1c7934585a18b4be48b938069/ransomware-attack-against-sickkids-said-to-be-unusual">Ransomware attack against SickKids said to be unusual.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/7b84bf9129d64c73b6acfcb06519e53e/health3pt-seeks-a-uniform-approach-to-healthcare-supply-chain-issues">Health3PT seeks a uniform approach to healthcare supply chain issues.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/0ffedecdd5734e348650498c9429fda3/breaking-the-glass-ceiling-my-journey-to-close-the-leadership-gap">Breaking the glass ceiling: My journey to close the leadership gap</a>. (CyberWire, <a href="https://thecyberwire.com/newsletters/creating-connections/3/12">Creating Connections</a>)</p><p><a href="https://thecyberwire.com/stories/2bf8e79883b140edbcbe744147626288/pokmon-nfts-used-as-malware-vectors">Pokémon NFTs used as malware vectors.</a> (CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1844</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[45ddd1f2-787a-11ec-abf0-779007c50a11]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2116712846.mp3?updated=1690320256" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Some trends in threats and defense. The possibility of cyber war crimes. RSAC innovation showcases are open for application. And common KEVs in the financial sector.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1736/notes</link>
      <description>A look back at ransomware in 2022. Lessons from Russia's war: crooks, hacktivists, and auxiliaries. Cyberattacks as war crimes. The state of SSE adoption. RSA Conference 2023 opens applications for the Launch Pad and the Innovation Sandbox. Joe Carrigan looks at online scams targeting military members. Our guest is Richard Caralli from Axio on the State of Ransomware Preparedness. And the most common known exploited vulnerabilities affecting the financial sector.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/6

Selected reading.
Ransomware trends: 2022. (CyberWire)
State of Ransomware Preparedness Research Study: 2022 (Axio)
Kyiv argues Russian cyberattacks could be war crimes (POLITICO)
Ukraine official says Russian cyberattacks on its energy network could equate to war crimes (Yahoo)
Ukraine war and geopolitics fuelling cybersecurity attacks - EU agency (EU Reporter)
Industry-first research from Axis Security finds 65% percent of organizations plan to adopt a Security Service Edge platform within next two years (Axis Security)
RSAC Launch Pad is Back! (RSA Conference 2023)
The Best in Innovation Programs Starts Here (RSA Conference 2023)
Top KEVs in the U.S. Financial Services Sector (LookingGlass)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Jan 2023 21:15:00 -0000</pubDate>
      <itunes:title>Some trends in threats and defense. The possibility of cyber war crimes. RSAC innovation showcases are open for application. And common KEVs in the financial sector.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1736</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A look back at ransomware in 2022. Lessons from Russia's war: crooks, hacktivists, and auxiliaries. Cyberattacks as war crimes. The state of SSE adoption. RSA Conference 2023 opens applications for the Launch Pad and the Innovation Sandbox. Joe Carrigan looks at online scams targeting military members. Our guest is Richard Caralli from Axio on the State of Ransomware Preparedness. And the most common known exploited vulnerabilities affecting the financial sector.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/6

Selected reading.
Ransomware trends: 2022. (CyberWire)
State of Ransomware Preparedness Research Study: 2022 (Axio)
Kyiv argues Russian cyberattacks could be war crimes (POLITICO)
Ukraine official says Russian cyberattacks on its energy network could equate to war crimes (Yahoo)
Ukraine war and geopolitics fuelling cybersecurity attacks - EU agency (EU Reporter)
Industry-first research from Axis Security finds 65% percent of organizations plan to adopt a Security Service Edge platform within next two years (Axis Security)
RSAC Launch Pad is Back! (RSA Conference 2023)
The Best in Innovation Programs Starts Here (RSA Conference 2023)
Top KEVs in the U.S. Financial Services Sector (LookingGlass)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A look back at ransomware in 2022. Lessons from Russia's war: crooks, hacktivists, and auxiliaries. Cyberattacks as war crimes. The state of SSE adoption. RSA Conference 2023 opens applications for the Launch Pad and the Innovation Sandbox. Joe Carrigan looks at online scams targeting military members. Our guest is Richard Caralli from Axio on the State of Ransomware Preparedness. And the most common known exploited vulnerabilities affecting the financial sector.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/6</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/stories/518a46a74c6e49e08f8b1f11eea7b30c/ransomware-trends-2022">Ransomware trends: 2022.</a> (CyberWire)</p><p><a href="https://info.axio.com/hubfs/Axio%20State%20of%20Ransomware%20Preparedness%20Research%20Study%202022.pdf">State of Ransomware Preparedness Research Study: 2022</a> (Axio)</p><p><a href="https://www.politico.eu/article/victor-zhora-ukraine-russia-cyberattack-infrastructure-war-crime/?mod=djemCybersecruityPro&amp;tpl=cy">Kyiv argues Russian cyberattacks could be war crimes</a> (POLITICO)</p><p><a href="https://news.yahoo.com/ukraine-official-says-russian-cyberattacks-114307786.html">Ukraine official says Russian cyberattacks on its energy network could equate to war crimes</a> (Yahoo)</p><p><a href="https://www.eureporter.co/defence/cyber-security/2023/01/09/ukraine-war-and-geopolitics-fuelling-cybersecurity-attacks-eu-agency/">Ukraine war and geopolitics fuelling cybersecurity attacks - EU agency</a> (EU Reporter)</p><p><a href="https://www.axissecurity.com/news/industry-first-research-from-axis-security-finds-65-percent-of-organizations-plan-to-adopt-a-security-service-edge-platform-within-next-two-years/">Industry-first research from Axis Security finds 65% percent of organizations plan to adopt a Security Service Edge platform within next two years</a> (Axis Security)</p><p><a href="https://www.rsaconference.com/usa/programs/launch-pad">RSAC Launch Pad is Back!</a> (RSA Conference 2023)</p><p><a href="https://www.rsaconference.com/usa/programs/innovation-programs">The Best in Innovation Programs Starts Here</a> (RSA Conference 2023)</p><p><a href="https://lookingglasscyber.com/blog/threat-intelligence-insights/top-kevs-in-financial-services/">Top KEVs in the U.S. Financial Services Sector</a> (LookingGlass)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1591</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[469dc35e-787a-11ec-abf0-1bf363ad976c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9573543521.mp3?updated=1690320106" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Social engineering shenanigans, by both crooks and spies. Suing social media over alleged mental health damages. And how to earn an “F.”</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1735/notes</link>
      <description>Telegram impersonation affects a cryptocurrency firm. Phishing with Facebook termination notices. Russian phishing continues to target Moldova. The IEEE on the impact of technology in 2023. Glass ceilings in tech leadership. Seattle Schools sue social media platforms. Malek Ben Salem from Accenture explains coding models. Our guest is Julie Smith, identity security leader and executive director at IDSA, with insights on identity and security strategies. And dealing with the implications of ChatGPT. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/5

Selected reading.
Impact of Technology in 2023 and Beyond (IEEE)
Telegram insider server access offered to Dark Web customers (SafetyDetectives)
Moldovaʼs government hit by flood of phishing attacks (The Record from Recorded Future News) 
OPWNAI : Cybercriminals Starting to Use ChatGPT (Check Point Research)
Hackers exploiting ChatGPT to write malicious codes to steal your data (Business Standard)
Armed With ChatGPT, Cybercriminals Build Malware And Plot Fake Girl Bots (Forbes) 
Hackers Exploiting OpenAI’s ChatGPT to Deploy Malware (HackRead)
Cybercriminals are already using ChatGPT to own you (SC Media)
Threat Report: Impersonation Detected in Telegram Chats to Deliver Malware (Safeguard Cyber) 
Seattle schools sue tech giants over social media harm (ABC News) 
Seattle Public Schools sues TikTok, YouTube, Instagram and others, seeking compensation for youth mental health crisis (GeekWire)
Ghost Writer: Microsoft Looks to Add OpenAI’s Chatbot Technology to Word, Email (The Information)
Microsoft plans to use ChatGPT in Bing. Here's why it could be a threat to Google. (Freethink) 
ChatGPT Hits Ethical Roadblock; Blocked (Analytics India Magazine)
A College Kid Built an App That Sniffs Out Text Penned by AI (The Daily Beast) 
A Princeton student built an app which can detect if ChatGPT wrote an essay to combat AI-based plagiarism (Business Insider)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 09 Jan 2023 21:15:00 -0000</pubDate>
      <itunes:title>Social engineering shenanigans, by both crooks and spies. Suing social media over alleged mental health damages. And how to earn an “F.”</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1735</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Telegram impersonation affects a cryptocurrency firm. Phishing with Facebook termination notices. Russian phishing continues to target Moldova. The IEEE on the impact of technology in 2023. Glass ceilings in tech leadership. Seattle Schools sue social media platforms. Malek Ben Salem from Accenture explains coding models. Our guest is Julie Smith, identity security leader and executive director at IDSA, with insights on identity and security strategies. And dealing with the implications of ChatGPT. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/5

Selected reading.
Impact of Technology in 2023 and Beyond (IEEE)
Telegram insider server access offered to Dark Web customers (SafetyDetectives)
Moldovaʼs government hit by flood of phishing attacks (The Record from Recorded Future News) 
OPWNAI : Cybercriminals Starting to Use ChatGPT (Check Point Research)
Hackers exploiting ChatGPT to write malicious codes to steal your data (Business Standard)
Armed With ChatGPT, Cybercriminals Build Malware And Plot Fake Girl Bots (Forbes) 
Hackers Exploiting OpenAI’s ChatGPT to Deploy Malware (HackRead)
Cybercriminals are already using ChatGPT to own you (SC Media)
Threat Report: Impersonation Detected in Telegram Chats to Deliver Malware (Safeguard Cyber) 
Seattle schools sue tech giants over social media harm (ABC News) 
Seattle Public Schools sues TikTok, YouTube, Instagram and others, seeking compensation for youth mental health crisis (GeekWire)
Ghost Writer: Microsoft Looks to Add OpenAI’s Chatbot Technology to Word, Email (The Information)
Microsoft plans to use ChatGPT in Bing. Here's why it could be a threat to Google. (Freethink) 
ChatGPT Hits Ethical Roadblock; Blocked (Analytics India Magazine)
A College Kid Built an App That Sniffs Out Text Penned by AI (The Daily Beast) 
A Princeton student built an app which can detect if ChatGPT wrote an essay to combat AI-based plagiarism (Business Insider)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Telegram impersonation affects a cryptocurrency firm. Phishing with Facebook termination notices. Russian phishing continues to target Moldova. The IEEE on the impact of technology in 2023. Glass ceilings in tech leadership. Seattle Schools sue social media platforms. Malek Ben Salem from Accenture explains coding models. Our guest is Julie Smith, identity security leader and executive director at IDSA, with insights on identity and security strategies. And dealing with the implications of ChatGPT. </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/5</p><p><br></p><h2>Selected reading.</h2><p><a href="https://transmitter.ieee.org/impact-of-technology-2023/">Impact of Technology in 2023 and Beyond</a> (IEEE)</p><p><a href="https://www.safetydetectives.com/news/telegram-servers-report/">Telegram insider server access offered to Dark Web customers</a> (SafetyDetectives)</p><p><a href="https://therecord.media/moldova%CA%BCs-government-hit-by-flood-of-phishing-attacks/">Moldovaʼs government hit by flood of phishing attacks</a> (The Record from Recorded Future News) </p><p><a href="https://research.checkpoint.com/2023/opwnai-cybercriminals-starting-to-use-chatgpt/">OPWNAI : Cybercriminals Starting to Use ChatGPT</a> (Check Point Research)</p><p><a href="https://www.business-standard.com/article/technology/hackers-exploiting-chatgpt-to-write-malicious-codes-to-steal-your-data-123010800216_1.html">Hackers exploiting ChatGPT to write malicious codes to steal your data</a> (Business Standard)</p><p><a href="https://www.forbes.com/sites/thomasbrewster/2023/01/06/chatgpt-cybercriminal-malware-female-chatbots/?sh=7bede9135534">Armed With ChatGPT, Cybercriminals Build Malware And Plot Fake Girl Bots</a> (Forbes) </p><p><a href="https://www.hackread.com/hackers-openai-chatgpt-malware/">Hackers Exploiting OpenAI’s ChatGPT to Deploy Malware</a> (HackRead)</p><p><a href="https://www.scmagazine.com/analysis/emerging-technology/cybercriminals-are-already-using-chatgpt-to-own-you">Cybercriminals are already using ChatGPT to own you</a> (SC Media)</p><p><a href="https://www.safeguardcyber.com/blog/security/impersonation-detected-in-telegram-chats-to-deliver-malware">Threat Report: Impersonation Detected in Telegram Chats to Deliver Malware</a> (Safeguard Cyber) </p><p><a href="https://abcnews.go.com/US/wireStory/seattle-schools-sue-tech-giants-social-media-harm-96290958">Seattle schools sue tech giants over social media harm</a> (ABC News) </p><p><a href="https://www.geekwire.com/2023/seattle-public-schools-sues-tiktok-youtube-instagram-and-others-seeking-compensation-for-youth-mental-health-crisis/">Seattle Public Schools sues TikTok, YouTube, Instagram and others, seeking compensation for youth mental health crisis</a> (GeekWire)</p><p><a href="https://www.theinformation.com/articles/ghost-writer-microsoft-looks-to-add-openais-chatbot-technology-to-word-email">Ghost Writer: Microsoft Looks to Add OpenAI’s Chatbot Technology to Word, Email</a> (The Information)</p><p><a href="https://www.freethink.com/robots-ai/chat-gpt-microsoft-google">Microsoft plans to use ChatGPT in Bing. Here's why it could be a threat to Google.</a> (Freethink) </p><p><a href="https://analyticsindiamag.com/chatgpt-hits-ethical-roadblock-blocked/">ChatGPT Hits Ethical Roadblock; Blocked</a> (Analytics India Magazine)</p><p><a href="https://www.thedailybeast.com/princeton-student-edward-tian-built-gptzero-to-detect-ai-written-essays">A College Kid Built an App That Sniffs Out Text Penned by AI</a> (The Daily Beast) </p><p><a href="https://www.businessinsider.com/app-detects-if-chatgpt-wrote-essay-ai-plagiarism-2023-1">A Princeton student built an app which can detect if ChatGPT wrote an essay to combat AI-based plagiarism</a> (Business Insider)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1749</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[46fdbed0-787a-11ec-abf0-934db550414e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9976368357.mp3?updated=1690320094" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Teresa Rothaar: Outwork the competition. [Analyst] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/131/notes</link>
      <description>Teresa Rothaar, a governance, risk, and compliance (GRC) analyst at Keeper Security sits down to share her story, from performer to cyber. She fell in love with writing as a young girl, she experimented with writing fanfiction which made her want to grow up to be in the arts. After attending college she found that she was good at math, lighting the way for her to start her cyber career. Teresa moved to being a writer at Keeper, finding she wanted to spread out and try more, so she ended up becoming an analyst while still doing writing on the side. She quotes David Duchovny in an interview once, explaining how sometimes you need to keep your head down and outwork others. Teresa said this resonated with her, saying, "that's how I went from a foreclosure box on the porch to where I am now. I have a good job and, and I have a career and I have a really good career and I absolutely love it." We thank Teresa for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 08 Jan 2023 08:00:00 -0000</pubDate>
      <itunes:title>Teresa Rothaar: Outwork the competition. [Analyst] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>131</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Teresa Rothaar, a governance, risk, and compliance (GRC) analyst at Keeper Security sits down to share her story, from performer to cyber. She fell in love with writing as a young girl, she experimented with writing fanfiction which made her want to grow up to be in the arts. After attending college she found that she was good at math, lighting the way for her to start her cyber career. Teresa moved to being a writer at Keeper, finding she wanted to spread out and try more, so she ended up becoming an analyst while still doing writing on the side. She quotes David Duchovny in an interview once, explaining how sometimes you need to keep your head down and outwork others. Teresa said this resonated with her, saying, "that's how I went from a foreclosure box on the porch to where I am now. I have a good job and, and I have a career and I have a really good career and I absolutely love it." We thank Teresa for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Teresa Rothaar, a governance, risk, and compliance (GRC) analyst at Keeper Security sits down to share her story, from performer to cyber. She fell in love with writing as a young girl, she experimented with writing fanfiction which made her want to grow up to be in the arts. After attending college she found that she was good at math, lighting the way for her to start her cyber career. Teresa moved to being a writer at Keeper, finding she wanted to spread out and try more, so she ended up becoming an analyst while still doing writing on the side. She quotes David Duchovny in an interview once, explaining how sometimes you need to keep your head down and outwork others. Teresa said this resonated with her, saying, "that's how I went from a foreclosure box on the porch to where I am now. I have a good job and, and I have a career and I have a really good career and I absolutely love it." We thank Teresa for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>438</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e74f0f36-8df7-11ed-95d5-3711c96a1ddb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5003325416.mp3?updated=1673039060" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stealer malware from Russia. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/263/notes</link>
      <description>Marisa Atkinson, an analyst from Flashpoint, joins Dave to discuss a new blog post from Flashpoint’s research team about “RisePro” Stealer, malware from Russia, and Pay-Per-Install Malware “PrivateLoader.” “RisePro” is written in C++ and appears to possess similar functionality to the stealer malware “Vidar.” It's also a newly identified stealer, that began appearing as a stealer source for log credentials on the illicit log shop Russian Market on December 13, 2022.
The research states, "Samples that Flashpoint analysts identified indicate that RisePro may have been dropped or downloaded by the pay-per-install malware downloader service “PrivateLoader” in the past year." Analysts identified several sets of logs uploaded to the illicit underground Russian Market, which listed their source as “RisePro.”
The research can be found here:
“RisePro” Stealer and Pay-Per-Install Malware “PrivateLoader”

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Jan 2023 08:00:00 -0000</pubDate>
      <itunes:title>Stealer malware from Russia. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>263</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Marisa Atkinson, an analyst from Flashpoint, joins Dave to discuss a new blog post from Flashpoint’s research team about “RisePro” Stealer, malware from Russia, and Pay-Per-Install Malware “PrivateLoader.” “RisePro” is written in C++ and appears to possess similar functionality to the stealer malware “Vidar.” It's also a newly identified stealer, that began appearing as a stealer source for log credentials on the illicit log shop Russian Market on December 13, 2022.
The research states, "Samples that Flashpoint analysts identified indicate that RisePro may have been dropped or downloaded by the pay-per-install malware downloader service “PrivateLoader” in the past year." Analysts identified several sets of logs uploaded to the illicit underground Russian Market, which listed their source as “RisePro.”
The research can be found here:
“RisePro” Stealer and Pay-Per-Install Malware “PrivateLoader”

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Marisa Atkinson, an analyst from Flashpoint, joins Dave to discuss a new blog post from Flashpoint’s research team about “RisePro” Stealer, malware from Russia, and Pay-Per-Install Malware “PrivateLoader.” “RisePro” is written in C++ and appears to possess similar functionality to the stealer malware “Vidar.” It's also a newly identified stealer, that began appearing as a stealer source for log credentials on the illicit log shop Russian Market on December 13, 2022.</p><p>The research states, "Samples that Flashpoint analysts identified indicate that RisePro may have been dropped or downloaded by the pay-per-install malware downloader service “PrivateLoader” in the past year." Analysts identified several sets of logs uploaded to the illicit underground Russian Market, which listed their source as “RisePro.”</p><p>The research can be found here:</p><ul><li><a href="https://flashpoint.io/blog/risepro-stealer-and-pay-per-install-malware-privateloader/">“RisePro” Stealer and Pay-Per-Install Malware “PrivateLoader”</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1076</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8afc1178-8d2c-11ed-8c54-3f29284d097b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6877451854.mp3?updated=1685127304" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA releases three ICS Advisories. Squealing cars. Rotate your secrets. Russian cyberespionage updates.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1734/notes</link>
      <description>Security vulnerabilities in automobiles. CircleCI customers should "rotate their secrets." CISA Director Easterly notes Russian failures, but warns that shields should stay up. Attempted cyberespionage against US National Laboratories. Turla effectively recycles some commodity malware infrastructure. Robert M. Lee from Dragos shares his outlook on ICS for the new year. Our CyberWire Space correspondent Maria Varmazis interviews Diane Janosek from NSA about her research on space-cyber. And the Guardian continues to recover from last month's ransomware attack.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/4

Selected reading.
Hitachi Energy UNEM (CISA)
Hitachi Energy FOXMAN-UN (CISA)
Hitachi Energy Lumada Asset Performance Management (CISA) 
Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More (Sam Curry)
Toyota, Mercedes, BMW API flaws exposed owners’ personal info (BleepingComputer)
16 Car Makers and Their Vehicles Hacked via Telematics, APIs, Infrastructure (SecurityWeek)
Ferrari, BMW, Rolls Royce, Porsche and more fix vulnerabilities giving car takeover capabilities (The Record by Recorded Future)
CircleCI security alert: Rotate any secrets stored in CircleCI (CircleCI).
CircleCI warns of security breach — rotate your secrets! (BleepingComputer)
CircleCI Urges Customers to Rotate Secrets Following Security Incident (The Hacker News)
CISA director: US needs to be vigilant, ‘keep our shields up’ against Russia (The Hill)
Exclusive-Russian Hackers Targeted U.S. Nuclear Scientists (Reuters via US News) 
Notorious Russian Spies Piggybacked on Other Hackers' USB Infections (WIRED) 
Turla: A Galaxy of Opportunity | Mandiant (Mandiant) 
Fallout from Guardian cyber attack to last at least a month (ComputerWeekly)
State of Ransomware Preparedness (Axio)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 06 Jan 2023 21:15:00 -0000</pubDate>
      <itunes:title>CISA releases three ICS Advisories. Squealing cars. Rotate your secrets. Russian cyberespionage updates.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1734</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Security vulnerabilities in automobiles. CircleCI customers should "rotate their secrets." CISA Director Easterly notes Russian failures, but warns that shields should stay up. Attempted cyberespionage against US National Laboratories. Turla effectively recycles some commodity malware infrastructure. Robert M. Lee from Dragos shares his outlook on ICS for the new year. Our CyberWire Space correspondent Maria Varmazis interviews Diane Janosek from NSA about her research on space-cyber. And the Guardian continues to recover from last month's ransomware attack.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/4

Selected reading.
Hitachi Energy UNEM (CISA)
Hitachi Energy FOXMAN-UN (CISA)
Hitachi Energy Lumada Asset Performance Management (CISA) 
Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More (Sam Curry)
Toyota, Mercedes, BMW API flaws exposed owners’ personal info (BleepingComputer)
16 Car Makers and Their Vehicles Hacked via Telematics, APIs, Infrastructure (SecurityWeek)
Ferrari, BMW, Rolls Royce, Porsche and more fix vulnerabilities giving car takeover capabilities (The Record by Recorded Future)
CircleCI security alert: Rotate any secrets stored in CircleCI (CircleCI).
CircleCI warns of security breach — rotate your secrets! (BleepingComputer)
CircleCI Urges Customers to Rotate Secrets Following Security Incident (The Hacker News)
CISA director: US needs to be vigilant, ‘keep our shields up’ against Russia (The Hill)
Exclusive-Russian Hackers Targeted U.S. Nuclear Scientists (Reuters via US News) 
Notorious Russian Spies Piggybacked on Other Hackers' USB Infections (WIRED) 
Turla: A Galaxy of Opportunity | Mandiant (Mandiant) 
Fallout from Guardian cyber attack to last at least a month (ComputerWeekly)
State of Ransomware Preparedness (Axio)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Security vulnerabilities in automobiles. CircleCI customers should "rotate their secrets." CISA Director Easterly notes Russian failures, but warns that shields should stay up. Attempted cyberespionage against US National Laboratories. Turla effectively recycles some commodity malware infrastructure. Robert M. Lee from Dragos shares his outlook on ICS for the new year. Our CyberWire Space correspondent Maria Varmazis interviews Diane Janosek from NSA about her research on space-cyber. And the Guardian continues to recover from last month's ransomware attack.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/4</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-005-01">Hitachi Energy UNEM</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-005-02">Hitachi Energy FOXMAN-UN</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-23-005-03">Hitachi Energy Lumada Asset Performance Management</a> (CISA) </p><p><a href="https://samcurry.net/web-hackers-vs-the-auto-industry/">Web Hackers vs. The Auto Industry: Critical Vulnerabilities in Ferrari, BMW, Rolls Royce, Porsche, and More</a> (Sam Curry)</p><p><a href="https://www.bleepingcomputer.com/news/security/toyota-mercedes-bmw-api-flaws-exposed-owners-personal-info/">Toyota, Mercedes, BMW API flaws exposed owners’ personal info</a> (BleepingComputer)</p><p><a href="https://www.securityweek.com/16-car-makers-and-their-vehicles-hacked-telematics-apis-infrastructure">16 Car Makers and Their Vehicles Hacked via Telematics, APIs, Infrastructure</a> (SecurityWeek)</p><p><a href="https://therecord.media/ferrari-bmw-rolls-royce-porsche-and-more-fix-vulnerabilities-giving-car-takeover-capabilities/">Ferrari, BMW, Rolls Royce, Porsche and more fix vulnerabilities giving car takeover capabilities</a> (The Record by Recorded Future)</p><p><a href="https://circleci.com/blog/january-4-2023-security-alert/">CircleCI security alert: Rotate any secrets stored in CircleCI</a> (CircleCI).</p><p><a href="https://www.bleepingcomputer.com/news/security/circleci-warns-of-security-breach-rotate-your-secrets/">CircleCI warns of security breach — rotate your secrets!</a> (BleepingComputer)</p><p><a href="https://thehackernews.com/2023/01/circleci-urges-customers-to-rotate.html">CircleCI Urges Customers to Rotate Secrets Following Security Incident</a> (The Hacker News)</p><p><a href="https://thehill.com/policy/technology/3801077-cisa-director-us-needs-to-be-vigilant-keep-our-shields-up-against-russia/">CISA director: US needs to be vigilant, ‘keep our shields up’ against Russia</a> (The Hill)</p><p><a href="https://www.usnews.com/news/world/articles/2023-01-06/exclusive-russian-hackers-targeted-u-s-nuclear-scientists">Exclusive-Russian Hackers Targeted U.S. Nuclear Scientists</a> (Reuters via US News) </p><p><a href="https://www.wired.com/story/russia-turla-fsb-usb-infection/">Notorious Russian Spies Piggybacked on Other Hackers' USB Infections</a> (WIRED) </p><p><a href="https://www.mandiant.com/resources/blog/turla-galaxy-opportunity">Turla: A Galaxy of Opportunity | Mandiant</a> (Mandiant) </p><p><a href="https://www.computerweekly.com/news/252528896/Fallout-from-Guardian-cyber-attack-to-last-at-least-a-month">Fallout from Guardian cyber attack to last at least a month</a> (ComputerWeekly)</p><p><a href="https://info.axio.com/hubfs/Axio%20State%20of%20Ransomware%20Preparedness%20Research%20Study%202022.pdf">State of Ransomware Preparedness</a> (Axio)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1774</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[44bc1d74-787a-11ec-abf0-fb86d5171fa0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8071235003.mp3?updated=1690319999" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>PurpleUrchin’s freejacking. Bluebottle versus the banks. A supply-chain attack on a machine-learning framework. The ransomware leaderboard. And cyber ops in a hybrid war. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1733/notes</link>
      <description>The PurpleUrchin freejacking campaign. Bluebottle activity against banks in Francophone Africa. The PyTorch framework sustains a supply-chain attack. 2022's ransomware leaderboard. Cellphone traffic as a source of combat information. FBI Cyber Division AD Bryan Vorndran on the interaction and collaboration of federal agencies in the cyber realm. Our guest Jerry Caponera from ThreatConnect wonders if we need more "Carrots" Than "Sticks" In Cybersecurity Regulation. And two incommensurable views of information security.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/3

Selected reading.
An analysis of the PurpleUrchin campaign. (CyberWire)
PurpleUrchin Bypasses CAPTCHA and Steals Cloud Platform Resources (Unit 42)
Bluebottle observed in the wild. (CyberWire)
Bluebottle: Campaign Hits Banks in French-speaking Countries in Africa (Symantec)
PyTorch incident disclosed, assessed. (CyberWire)
PyTorch dependency poisoned with malicious code (Register)
Compromised PyTorch-nightly dependency chain between December 25th and December 30th, 2022. (PyTorch)
Most active, impactful ransomware groups of 2022. (CyberWire)
2022 Year in Review: Ransomware (Trustwave)
Russia says phone use allowed Ukraine to target its troops (AP NEWS)
For Russian Troops, Cellphone Use Is a Persistent, Lethal Danger (New York Times)
Kremlin blames own soldiers for Himars barracks strike as official death toll rises (The Telegraph) 
No Water’s Edge: Russia’s Information War and Regime Security (Carnegie Endowment for International Peace)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 05 Jan 2023 21:15:00 -0000</pubDate>
      <itunes:title>PurpleUrchin’s freejacking. Bluebottle versus the banks. A supply-chain attack on a machine-learning framework. The ransomware leaderboard. And cyber ops in a hybrid war. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1733</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The PurpleUrchin freejacking campaign. Bluebottle activity against banks in Francophone Africa. The PyTorch framework sustains a supply-chain attack. 2022's ransomware leaderboard. Cellphone traffic as a source of combat information. FBI Cyber Division AD Bryan Vorndran on the interaction and collaboration of federal agencies in the cyber realm. Our guest Jerry Caponera from ThreatConnect wonders if we need more "Carrots" Than "Sticks" In Cybersecurity Regulation. And two incommensurable views of information security.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/3

Selected reading.
An analysis of the PurpleUrchin campaign. (CyberWire)
PurpleUrchin Bypasses CAPTCHA and Steals Cloud Platform Resources (Unit 42)
Bluebottle observed in the wild. (CyberWire)
Bluebottle: Campaign Hits Banks in French-speaking Countries in Africa (Symantec)
PyTorch incident disclosed, assessed. (CyberWire)
PyTorch dependency poisoned with malicious code (Register)
Compromised PyTorch-nightly dependency chain between December 25th and December 30th, 2022. (PyTorch)
Most active, impactful ransomware groups of 2022. (CyberWire)
2022 Year in Review: Ransomware (Trustwave)
Russia says phone use allowed Ukraine to target its troops (AP NEWS)
For Russian Troops, Cellphone Use Is a Persistent, Lethal Danger (New York Times)
Kremlin blames own soldiers for Himars barracks strike as official death toll rises (The Telegraph) 
No Water’s Edge: Russia’s Information War and Regime Security (Carnegie Endowment for International Peace)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The PurpleUrchin freejacking campaign. Bluebottle activity against banks in Francophone Africa. The PyTorch framework sustains a supply-chain attack. 2022's ransomware leaderboard. Cellphone traffic as a source of combat information. FBI Cyber Division AD Bryan Vorndran on the interaction and collaboration of federal agencies in the cyber realm. Our guest Jerry Caponera from ThreatConnect wonders if we need more "Carrots" Than "Sticks" In Cybersecurity Regulation. And two incommensurable views of information security.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/3</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/stories/157f90df2aa84d11aad6d172d207c9e8/an-analysis-of-the-purpleurchin-campaign">An analysis of the PurpleUrchin campaign.</a> (CyberWire)</p><p><a href="https://unit42.paloaltonetworks.com/purpleurchin-steals-cloud-resources/">PurpleUrchin Bypasses CAPTCHA and Steals Cloud Platform Resources</a> (Unit 42)</p><p><a href="https://thecyberwire.com/stories/e70130d4770f45c59eff090458669acd/bluebottle-observed-in-the-wild">Bluebottle observed in the wild.</a> (CyberWire)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/bluebottle-banks-targeted-africa">Bluebottle: Campaign Hits Banks in French-speaking Countries in Africa</a> (Symantec)</p><p><a href="https://thecyberwire.com/stories/df542ae8b2654e58be9acacfaf257210/pytorch-incident-disclosed-assessed">PyTorch incident disclosed, assessed.</a> (CyberWire)</p><p><a href="https://www.theregister.com/2023/01/04/pypi_pytorch_dependency_attack/">PyTorch dependency poisoned with malicious code</a> (Register)</p><p><a href="https://pytorch.org/blog/compromised-nightly-dependency/#how-to-check-if-your-python-environment-is-affected">Compromised PyTorch-nightly dependency chain between December 25th and December 30th, 2022.</a> (PyTorch)</p><p><a href="https://thecyberwire.com/stories/43cb3d5e395843b88d838afbf882682f/most-active-impactful-ransomware-groups-of-2022">Most active, impactful ransomware groups of 2022.</a> (CyberWire)</p><p><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/2022-year-in-review-ransomware/">2022 Year in Review: Ransomware</a> (Trustwave)</p><p><a href="https://apnews.com/article/russia-ukraine-war-government-d809e26412b12fa590f3f81e6b1faeff">Russia says phone use allowed Ukraine to target its troops</a> (AP NEWS)</p><p><a href="https://www.nytimes.com/2023/01/04/world/europe/ukraine-russia-cellphones.html">For Russian Troops, Cellphone Use Is a Persistent, Lethal Danger</a> (New York Times)</p><p><a href="https://www.telegraph.co.uk/world-news/2023/01/04/kremlin-blames-soldiers-himars-barracks-strike-official-death/">Kremlin blames own soldiers for Himars barracks strike as official death toll rises</a> (The Telegraph) </p><p><a href="https://carnegieendowment.org/2023/01/04/no-water-s-edge-russia-s-information-war-and-regime-security-pub-88644">No Water’s Edge: Russia’s Information War and Regime Security</a> (Carnegie Endowment for International Peace)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1693</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[459e0342-787a-11ec-abf0-c315cc60335f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8249098319.mp3?updated=1690319986" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Terms of service and GDPR. LastPass breach update. GhostWriter resurfaces in action against Poland and its neighbors. Cellphones, opsec, and rocket strikes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1732/notes</link>
      <description>Ad practices draw a large EU fine (and may set precedents for online advertising). Updates on the LastPass breach, and on Russian cyber activity against Poland. Malek Ben Salem from Accenture explains smart deepfakes. Our guest is Leslie Wiggins, Program Director for Data Security at IBM Security on the role of the security specialist. And cellphones, opsec, and the Makiivka strike.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/2

Selected reading.
Meta’s Ad Practices Ruled Illegal Under E.U. Law (New York Times)
Meta Fined More Than $400 Million in EU for Serving Ads Based on Online Activity (Wall Street Journal)
Meta's New Year kicks off with $410M+ in fresh EU privacy fines (TechCrunch)
LastPass data breach: notes and actions to take. (CyberWire)
Poland warns of attacks by Russia-linked Ghostwriter hacking group (BleepingComputer) 
Russia says phone use allowed Ukraine to target its troops (AP NEWS)
Russian soldier gave away his position with geotagged social media posts (Task &amp; Purpose)
Russian commanders blamed for heavy losses in New Year’s Day strike (Washington Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 04 Jan 2023 21:15:00 -0000</pubDate>
      <itunes:title>Terms of service and GDPR. LastPass breach update. GhostWriter resurfaces in action against Poland and its neighbors. Cellphones, opsec, and rocket strikes.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1732</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ad practices draw a large EU fine (and may set precedents for online advertising). Updates on the LastPass breach, and on Russian cyber activity against Poland. Malek Ben Salem from Accenture explains smart deepfakes. Our guest is Leslie Wiggins, Program Director for Data Security at IBM Security on the role of the security specialist. And cellphones, opsec, and the Makiivka strike.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/2

Selected reading.
Meta’s Ad Practices Ruled Illegal Under E.U. Law (New York Times)
Meta Fined More Than $400 Million in EU for Serving Ads Based on Online Activity (Wall Street Journal)
Meta's New Year kicks off with $410M+ in fresh EU privacy fines (TechCrunch)
LastPass data breach: notes and actions to take. (CyberWire)
Poland warns of attacks by Russia-linked Ghostwriter hacking group (BleepingComputer) 
Russia says phone use allowed Ukraine to target its troops (AP NEWS)
Russian soldier gave away his position with geotagged social media posts (Task &amp; Purpose)
Russian commanders blamed for heavy losses in New Year’s Day strike (Washington Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ad practices draw a large EU fine (and may set precedents for online advertising). Updates on the LastPass breach, and on Russian cyber activity against Poland. Malek Ben Salem from Accenture explains smart deepfakes. Our guest is Leslie Wiggins, Program Director for Data Security at IBM Security on the role of the security specialist. And cellphones, opsec, and the Makiivka strike.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/2</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.nytimes.com/2023/01/04/business/meta-facebook-eu-gdpr.html">Meta’s Ad Practices Ruled Illegal Under E.U. Law</a> (New York Times)</p><p><a href="https://www.wsj.com/articles/meta-fined-414-million-for-sending-ads-based-on-online-activity-11672844441">Meta Fined More Than $400 Million in EU for Serving Ads Based on Online Activity</a> (Wall Street Journal)</p><p><a href="https://techcrunch.com/2023/01/04/facebook-instagram-gdpr-forced-consent-final-decisions/">Meta's New Year kicks off with $410M+ in fresh EU privacy fines</a> (TechCrunch)</p><p><a href="https://thecyberwire.com/stories/8473e02aba784ea0bb424e023c235e7e/lastpass-data-breach-notes-and-actions-to-take">LastPass data breach: notes and actions to take.</a> (CyberWire)</p><p><a href="https://www.bleepingcomputer.com/news/security/poland-warns-of-attacks-by-russia-linked-ghostwriter-hacking-group/">Poland warns of attacks by Russia-linked Ghostwriter hacking group</a> (BleepingComputer) </p><p><a href="https://apnews.com/article/russia-ukraine-war-government-d809e26412b12fa590f3f81e6b1faeff">Russia says phone use allowed Ukraine to target its troops</a> (AP NEWS)</p><p><a href="https://taskandpurpose.com/news/russian-military-opsec-failure-ukraine/">Russian soldier gave away his position with geotagged social media posts</a> (Task &amp; Purpose)</p><p><a href="https://www.washingtonpost.com/world/2023/01/03/russia-makiivka-soldiers-killed-blame/">Russian commanders blamed for heavy losses in New Year’s Day strike</a> (Washington Post)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1554</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[45bddfdc-787a-11ec-abf0-3b798444a3a3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3791416101.mp3?updated=1690319966" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DPRK cyber ops. Poland warns of Russian cyber activity. Twitter’s data incident. A crypto trading exchange is rifled. Ransomware shuts down the Port of Lisbon. Small business opportunities. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1731/notes</link>
      <description>Recent DPRK cyber operations: spying and theft. Twitter’s data incident. 3Commas breached. Poland warns of increased Russian offensive cyber activity. Port of Lisbon hit by ransomware. DHS announces SBIR topics. New additions to the Known Exploited Vulnerabilities Catalog. Ben Yelin on the legal conundrum of AI generated code. Our guest is Tanya Janca from She Hacks Purple with insights on API security. And, news flash! LockBit says they have a conscience. (Yeah, right.)

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/1

Selected reading.
Recent DPRK cyber operations: spying and theft. (CyberWire)
Twitter targeted in extortion hack. (CyberWire)
3Commas' API compromised. (CyberWire)
Russian cyberattacks (Special Services) 
LockBit activity over the holidays. (CyberWire)
CISA Adds Two Known Exploited Vulnerabilities to Catalog (CISA) 
DHS Small Business Innovation Research (SBIR) Program FY23 Solicitation (SAM.gov)
The SBIR and STTR Programs. (SBIR/STTR)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Jan 2023 21:25:00 -0000</pubDate>
      <itunes:title>DPRK cyber ops. Poland warns of Russian cyber activity. Twitter’s data incident. A crypto trading exchange is rifled. Ransomware shuts down the Port of Lisbon. Small business opportunities. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>1731</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Recent DPRK cyber operations: spying and theft. Twitter’s data incident. 3Commas breached. Poland warns of increased Russian offensive cyber activity. Port of Lisbon hit by ransomware. DHS announces SBIR topics. New additions to the Known Exploited Vulnerabilities Catalog. Ben Yelin on the legal conundrum of AI generated code. Our guest is Tanya Janca from She Hacks Purple with insights on API security. And, news flash! LockBit says they have a conscience. (Yeah, right.)

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/12/1

Selected reading.
Recent DPRK cyber operations: spying and theft. (CyberWire)
Twitter targeted in extortion hack. (CyberWire)
3Commas' API compromised. (CyberWire)
Russian cyberattacks (Special Services) 
LockBit activity over the holidays. (CyberWire)
CISA Adds Two Known Exploited Vulnerabilities to Catalog (CISA) 
DHS Small Business Innovation Research (SBIR) Program FY23 Solicitation (SAM.gov)
The SBIR and STTR Programs. (SBIR/STTR)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Recent DPRK cyber operations: spying and theft. Twitter’s data incident. 3Commas breached. Poland warns of increased Russian offensive cyber activity. Port of Lisbon hit by ransomware. DHS announces SBIR topics. New additions to the Known Exploited Vulnerabilities Catalog. Ben Yelin on the legal conundrum of AI generated code. Our guest is Tanya Janca from She Hacks Purple with insights on API security. And, news flash! LockBit says they have a conscience. (Yeah, right.)</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/12/1</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/stories/e065287e06034df880010ea2fe6878bd/recent-dprk-cyber-operations-spying-and-theft">Recent DPRK cyber operations: spying and theft.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/234065ab265e434392121c0e7c077c65/twitter-targeted-in-extortion-hack">Twitter targeted in extortion hack.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/a666c87c98da44d6ae7bba10afba84d1/3commas-api-compromised">3Commas' API compromised.</a> (CyberWire)</p><p><a href="https://www.gov.pl/web/special-services/russian-cyberattacks">Russian cyberattacks</a> (Special Services) </p><p><a href="https://thecyberwire.com/stories/3379f0a8433b4ebfaf6d40991bae338e/lockbit-activity-over-the-holidays">LockBit activity over the holidays</a>. (CyberWire)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/12/29/cisa-adds-two-known-exploited-vulnerabilities-catalog">CISA Adds Two Known Exploited Vulnerabilities to Catalog</a> (CISA) </p><p><a href="https://sam.gov/opp/efc54d6e4db84ee8a1b3acc31ecad173/view">DHS Small Business Innovation Research (SBIR) Program FY23 Solicitation</a> (SAM.gov)</p><p><a href="https://www.sbir.gov/about">The SBIR and STTR Programs</a>. (SBIR/STTR)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1652</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[46bdc0c8-787a-11ec-abf0-7b8955f728b9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2747001421.mp3?updated=1690319876" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Software supply chain management: Lessons learned from SolarWinds. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/41/notes</link>
      <description>Between the emergence of sophisticated nation-state actors, the rise of ransomware-as-a-service, the increasing attack surface remote work presents, and much more, organizations today contend with more complex risk than ever. A “Secure-by-Design” approach can secure software environments, development processes and products. That approach includes increasing training for employees, adopting zero trust, leveraging Red Teams, and creating a unique triple-build software development process. SolarWinds calls its version of this process the "Next-Generation Build System," and offers it as a model for secure software development that will make supply chain attacks more difficult.
On this episode of CyberWire-X, host Rick Howard, N2K’s CSO, and CyberWire’s Chief Analyst and Senior Fellow, discusses software supply chain lessons learned from the SolarWinds attack of 2020 with Hash Table members Rick Doten, the CISO for Healthcare Enterprises and Centene, Steve Winterfeld, Akamai's Advisory CISO, and Dawn Cappelli, Director of OT-CERT at Dragos, and in the second half of the show, Rick speaks with our episode sponsor, SolarWinds, CISO Tim Brown.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Jan 2023 06:00:00 -0000</pubDate>
      <itunes:title>Software supply chain management: Lessons learned from SolarWinds. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>41</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Between the emergence of sophisticated nation-state actors, the rise of ransomware-as-a-service, the increasing attack surface remote work presents, and much more, organizations today contend with more complex risk than ever. A “Secure-by-Design” approach can secure software environments, development processes and products. That approach includes increasing training for employees, adopting zero trust, leveraging Red Teams, and creating a unique triple-build software development process. SolarWinds calls its version of this process the "Next-Generation Build System," and offers it as a model for secure software development that will make supply chain attacks more difficult.
On this episode of CyberWire-X, host Rick Howard, N2K’s CSO, and CyberWire’s Chief Analyst and Senior Fellow, discusses software supply chain lessons learned from the SolarWinds attack of 2020 with Hash Table members Rick Doten, the CISO for Healthcare Enterprises and Centene, Steve Winterfeld, Akamai's Advisory CISO, and Dawn Cappelli, Director of OT-CERT at Dragos, and in the second half of the show, Rick speaks with our episode sponsor, SolarWinds, CISO Tim Brown.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Between the emergence of sophisticated nation-state actors, the rise of ransomware-as-a-service, the increasing attack surface remote work presents, and much more, organizations today contend with more complex risk than ever. A “Secure-by-Design” approach can secure software environments, development processes and products. That approach includes increasing training for employees, adopting zero trust, leveraging Red Teams, and creating a unique triple-build software development process. SolarWinds calls its version of this process the "Next-Generation Build System," and offers it as a model for secure software development that will make supply chain attacks more difficult.</p><p>On this episode of CyberWire-X, host Rick Howard, N2K’s CSO, and CyberWire’s Chief Analyst and Senior Fellow, discusses software supply chain lessons learned from the SolarWinds attack of 2020 with Hash Table members Rick Doten, the CISO for Healthcare Enterprises and Centene, Steve Winterfeld, Akamai's Advisory CISO, and Dawn Cappelli, Director of OT-CERT at Dragos, and in the second half of the show, Rick speaks with our episode sponsor, SolarWinds, CISO Tim Brown.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2549</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1909f422-8886-11ed-9516-bf806ab1512d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7478311305.mp3?updated=1669074817" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Women in Cybersecurity panel: A discussion on hidden figures of cyber skills gap. [Special Edition]</title>
      <link>https://thecyberwire.com/stories/c9f038a16be141059c02806c27095768/panel-the-hidden-impact-of-cybersecuritys-talent-gap-on-the-cyber-enabled-community</link>
      <description>On Thursday October 20, 2022, the CyberWire was pleased to host the annual Women in Cybersecurity Reception at the International Spy Museum in Washington, DC. This annual event brought together almost 300 people to highlight and celebrate the value and successes of women in the cybersecurity industry. The reception included an industry-led panel discussion called “The Hidden Impact of Cybersecurity’s Talent Gap on the Cyber-Enabled Community,” discussing cyber-enabled professionals who aren’t usually included in conversations around the cybersecurity skills gap. The panel, moderated by Simone Petrella of CyberVista, included perspectives from experts including Davida Gray of MindPoint Group, Jennifer Walsmith of Northrop Grumman, Kyla Guru of Bits N’ Bytes, and Amy Mushahwar from Alston &amp; Bird.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 02 Jan 2023 08:00:00 -0000</pubDate>
      <itunes:title>Women in Cybersecurity panel: A discussion on hidden figures of cyber skills gap. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>46</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On Thursday October 20, 2022, the CyberWire was pleased to host the annual Women in Cybersecurity Reception at the International Spy Museum in Washington, DC. This annual event brought together almost 300 people to highlight and celebrate the value and successes of women in the cybersecurity industry. The reception included an industry-led panel discussion called “The Hidden Impact of Cybersecurity’s Talent Gap on the Cyber-Enabled Community,” discussing cyber-enabled professionals who aren’t usually included in conversations around the cybersecurity skills gap. The panel, moderated by Simone Petrella of CyberVista, included perspectives from experts including Davida Gray of MindPoint Group, Jennifer Walsmith of Northrop Grumman, Kyla Guru of Bits N’ Bytes, and Amy Mushahwar from Alston &amp; Bird.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On Thursday October 20, 2022, the CyberWire was pleased to host the annual Women in Cybersecurity Reception at the International Spy Museum in Washington, DC. This annual event brought together almost 300 people to highlight and celebrate the value and successes of women in the cybersecurity industry. The reception included an industry-led panel discussion called “The Hidden Impact of Cybersecurity’s Talent Gap on the Cyber-Enabled Community,” discussing cyber-enabled professionals who aren’t usually included in conversations around the cybersecurity skills gap. The panel, moderated by Simone Petrella of CyberVista, included perspectives from experts including Davida Gray of MindPoint Group, Jennifer Walsmith of Northrop Grumman, Kyla Guru of Bits N’ Bytes, and Amy Mushahwar from Alston &amp; Bird.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2802</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5b072ae2-7fef-11ed-a6f2-ff0acc8b3e4c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4643611940.mp3?updated=1671488413" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: LemonDucks evading detection.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/235/notes</link>
      <description>Scott Fanning from CrowdStrike's research team, joins Dave to discuss their work on "LemonDuck Targets Docker for Cryptomining Operations." LemonDuck is a well-known cryptomining botnet, and the research suggests attackers are attracted to the monetary gain from the recent boom in cryptocurrency.
LemonDuck was caught trying to disguise its attack against Docker by running an anonymous mining operation by the use of proxy pools. Scott shares how its unknown which organizations have been targeted and just how much cryptocurrency has been stolen.
The research can be found here:
LemonDuck Targets Docker for Cryptomining Operations

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 31 Dec 2022 08:00:00 -0000</pubDate>
      <itunes:title>Encore: LemonDucks evading detection.</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>235</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Scott Fanning from CrowdStrike's research team, joins Dave to discuss their work on "LemonDuck Targets Docker for Cryptomining Operations." LemonDuck is a well-known cryptomining botnet, and the research suggests attackers are attracted to the monetary gain from the recent boom in cryptocurrency.
LemonDuck was caught trying to disguise its attack against Docker by running an anonymous mining operation by the use of proxy pools. Scott shares how its unknown which organizations have been targeted and just how much cryptocurrency has been stolen.
The research can be found here:
LemonDuck Targets Docker for Cryptomining Operations

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Scott Fanning from CrowdStrike's research team, joins Dave to discuss their work on "LemonDuck Targets Docker for Cryptomining Operations." LemonDuck is a well-known cryptomining botnet, and the research suggests attackers are attracted to the monetary gain from the recent boom in cryptocurrency.</p><p>LemonDuck was caught trying to disguise its attack against Docker by running an anonymous mining operation by the use of proxy pools. Scott shares how its unknown which organizations have been targeted and just how much cryptocurrency has been stolen.</p><p>The research can be found here:</p><ul><li><a href="https://www.crowdstrike.com/blog/lemonduck-botnet-targets-docker-for-cryptomining-operations/">LemonDuck Targets Docker for Cryptomining Operations</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>922</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e5569fb0-7a50-11ed-bb92-7b77b1ca7365]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9838006744.mp3?updated=1685127292" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Interview Select: Nick Schneider of Arctic Wolf discusses why he believes 2023 will see a resurgence of ransomware and why the decline of crypto will not deter future ransomware actors.</title>
      <link>https://thecyberwire.com/podcasts/interview-selects/134/notes</link>
      <description>SHOW NOTES
This interview from October 28th, 2022 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner sits down with Nick Schneider of Arctic Wolf to discuss why he believes 2023 will see a resurgence of ransomware and why the decline of crypto will not deter future ransomware actors.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 30 Dec 2022 21:00:00 -0000</pubDate>
      <itunes:title>Interview Select: Nick Schneider of Arctic Wolf discusses why he believes 2023 will see a resurgence of ransomware and why the decline of crypto will not deter future ransomware actors.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>134</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>SHOW NOTES
This interview from October 28th, 2022 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner sits down with Nick Schneider of Arctic Wolf to discuss why he believes 2023 will see a resurgence of ransomware and why the decline of crypto will not deter future ransomware actors.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>SHOW NOTES</strong></p><p>This interview from October 28th, 2022 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner sits down with Nick Schneider of Arctic Wolf to discuss why he believes 2023 will see a resurgence of ransomware and why the decline of crypto will not deter future ransomware actors.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>654</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c52898e6-7803-11ed-9e9d-574ac9736a8e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3651550912.mp3?updated=1670618996" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sisters, grifters, and shifters. [Hacking Humans Goes to the Movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/15/notes</link>
      <description>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
On this episode, Dave and Rick are joined by guest contributor Amanda Fennell. You can find Amanda on Twitter at @Chi_from_afar.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie Zombieland


Rick's clip from the movie Traveller


Amanda's clip from the movie The Girl with the Dragon Tattoo



Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 29 Dec 2022 08:00:00 -0000</pubDate>
      <itunes:title>Sisters, grifters, and shifters. [Hacking Humans Goes to the Movies]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>15</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.
On this episode, Dave and Rick are joined by guest contributor Amanda Fennell. You can find Amanda on Twitter at @Chi_from_afar.
Links to this episode's clips if you'd like to watch along:

Dave's clip from the movie Zombieland


Rick's clip from the movie Traveller


Amanda's clip from the movie The Girl with the Dragon Tattoo



Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us again for another episode of fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Hacking Humans co-host Dave Bittner is joined by Rick Howard in this series where they view clips from their favorite movies and television shows with examples of the social engineering scams and schemes you hear Dave and co-host Joe Carrigan talk about on Hacking Humans. In this episode, Dave and Rick watch each of the selected scenes, describe the on-screen action for you, and then they deconstruct what they saw. Grab your bowl of popcorn and join us for some fantastic scams and frauds.</p><p>On this episode, Dave and Rick are joined by guest contributor Amanda Fennell. You can find Amanda on Twitter at <a href="https://twitter.com/Chi_from_afar">@Chi_from_afar</a>.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Dave's clip from the movie <a href="https://www.youtube.com/watch?v=TAZGIJev8nU">Zombieland</a>
</li>
<li>Rick's clip from the movie <a href="https://www.youtube.com/watch?v=9dOZyrzR7R0">Traveller</a>
</li>
<li>Amanda's clip from the movie <a href="https://www.youtube.com/watch?v=IOpipTU6EkU">The Girl with the Dragon Tattoo</a>
</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2068</itunes:duration>
      <guid isPermaLink="false"><![CDATA[a5fce1cc-815c-11ed-b707-4bb83f467510]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7732088120.mp3?updated=1675377515" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Interview Select: Diana Kelley, CSO &amp; Co-founder of Cybrize to discuss the need for innovation and entrepreneurship in cybersecurity.</title>
      <link>https://thecyberwire.com/podcasts/interview-selects/128/notes</link>
      <description>This interview from September 16th, 2022 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner sits down with Diana Kelley, CSO &amp; Co-founder of Cybrize to discuss the need for innovation and entrepreneurship in cybersecurity.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 28 Dec 2022 21:00:00 -0000</pubDate>
      <itunes:title>Interview Select: Diana Kelley, CSO &amp; Co-founder of Cybrize to discuss the need for innovation and entrepreneurship in cybersecurity.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>128</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This interview from September 16th, 2022 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner sits down with Diana Kelley, CSO &amp; Co-founder of Cybrize to discuss the need for innovation and entrepreneurship in cybersecurity.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This interview from September 16th, 2022 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner sits down with Diana Kelley, CSO &amp; Co-founder of Cybrize to discuss the need for innovation and entrepreneurship in cybersecurity.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>505</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e936e5c6-77fe-11ed-be1e-0f905e959ea1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3972511343.mp3?updated=1670617224" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Interview Select: MK Palmore from Google Cloud talks about why collective cybersecurity ultimately depends on having a diverse, skilled workforce.</title>
      <link>https://thecyberwire.com/podcasts/interview-selects/130/notes</link>
      <description>This interview from September 30th, 2022 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner sits down with MK Palmore from Google Cloud to talk about why collective cybersecurity ultimately depends on having a diverse, skilled workforce.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Dec 2022 21:00:00 -0000</pubDate>
      <itunes:title>Interview Select: MK Palmore from Google Cloud talks about why collective cybersecurity ultimately depends on having a diverse, skilled workforce.</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:episode>130</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This interview from September 30th, 2022 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner sits down with MK Palmore from Google Cloud to talk about why collective cybersecurity ultimately depends on having a diverse, skilled workforce.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This interview from September 30th, 2022 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner sits down with MK Palmore from Google Cloud to talk about why collective cybersecurity ultimately depends on having a diverse, skilled workforce.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>870</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[43913ece-77fd-11ed-879f-0bf19e111263]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3801358964.mp3?updated=1670616603" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Research Briefing: Spearphishing against Japanese political entities. Trojanized Windows 10 installers target Ukraine. XLL files abused to deliver malware.</title>
      <link>https://thecyberwire.com/podcasts/research-briefing/148/notes</link>
      <description>Spearphishing against Japanese political entities. Trojanized Windows 10 installers target Ukraine. XLL files abused to deliver malware.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 26 Dec 2022 21:00:00 -0000</pubDate>
      <itunes:title>Research Briefing: Spearphishing against Japanese political entities. Trojanized Windows 10 installers target Ukraine. XLL files abused to deliver malware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>148</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Spearphishing against Japanese political entities. Trojanized Windows 10 installers target Ukraine. XLL files abused to deliver malware.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Spearphishing against Japanese political entities. Trojanized Windows 10 installers target Ukraine. XLL files abused to deliver malware.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>442</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e183cfe6-80ab-11ed-8479-1faece6e4f5e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7058322058.mp3?updated=1671571393" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire: The 12 Days of Malware.[Special Editions]</title>
      <link>https://thecyberwire.com/stories/f765b7d394aa4c16840fd96d405c2ee7/the-cyberwire-the-12-days-of-malware</link>
      <description>Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings &amp; Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out our video for the full effect!

The 12 Days of Malware lyrics
On the first day of Christmas, my malware gave to me:
A keylogger logging my keys.

On the second day of Christmas, my malware gave to me:
2 Trojan Apps...
And a keylogger logging my keys.

On the third day of Christmas, my malware gave to me:
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fourth day of Christmas, my malware gave to me:
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fifth day of Christmas, my malware gave to me:
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the sixth day of Christmas, my malware gave to me:
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the seventh day of Christmas, my malware gave to me:
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eighth day of Christmas, my malware gave to me:
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the ninth day of Christmas, my malware gave to me:
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the tenth day of Christmas, my malware gave to me:
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eleventh day of Christmas, my malware gave to me:
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the twelfth day of Christmas, my malware gave to me:
12 Hackers hacking...
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 25 Dec 2022 08:00:00 -0000</pubDate>
      <itunes:title>The CyberWire: The 12 Days of Malware.[Special Editions]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings &amp; Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out our video for the full effect!

The 12 Days of Malware lyrics
On the first day of Christmas, my malware gave to me:
A keylogger logging my keys.

On the second day of Christmas, my malware gave to me:
2 Trojan Apps...
And a keylogger logging my keys.

On the third day of Christmas, my malware gave to me:
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fourth day of Christmas, my malware gave to me:
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fifth day of Christmas, my malware gave to me:
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the sixth day of Christmas, my malware gave to me:
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the seventh day of Christmas, my malware gave to me:
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eighth day of Christmas, my malware gave to me:
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the ninth day of Christmas, my malware gave to me:
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the tenth day of Christmas, my malware gave to me:
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eleventh day of Christmas, my malware gave to me:
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the twelfth day of Christmas, my malware gave to me:
12 Hackers hacking...
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings &amp; Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out <a href="https://thecyberwire.com/stories/f765b7d394aa4c16840fd96d405c2ee7/the-cyberwire-the-12-days-of-malware">our video</a> for the full effect!</p><p><br></p><p><strong>The 12 Days of Malware lyrics</strong></p><p><em>On the first day of Christmas, my malware gave to me:</em></p><p><em>A keylogger logging my keys.</em></p><p><br></p><p><em>On the second day of Christmas, my malware gave to me:</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the third day of Christmas, my malware gave to me:</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the fourth day of Christmas, my malware gave to me:</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the fifth day of Christmas, my malware gave to me:</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the sixth day of Christmas, my malware gave to me:</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the seventh day of Christmas, my malware gave to me:</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the eighth day of Christmas, my malware gave to me:</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the ninth day of Christmas, my malware gave to me:</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the tenth day of Christmas, my malware gave to me:</em></p><p><em>10 Darknet markets...</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days! (Bah-dum-dum-dum!)</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the eleventh day of Christmas, my malware gave to me:</em></p><p><em>11 Phishers phishing...</em></p><p><em>10 Darknet markets...</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days! (Bah-dum-dum-dum!)</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the twelfth day of Christmas, my malware gave to me:</em></p><p><em>12 Hackers hacking...</em></p><p><em>11 Phishers phishing...</em></p><p><em>10 Darknet markets...</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>448</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[016ddb1a-77e9-11ed-8229-b38e2f36522b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9673952852.mp3?updated=1640203827" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Vulnerabilities in IoT devices. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/232/notes</link>
      <description>Dr. May Wang, CTO of IoT Security at Palo Alto Networks, joins Dave Bittner to discuss their findings detailed in Unit 42's "Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization" research. Unit 42 recently set out to better understand how well hospitals and other healthcare providers are doing in securing smart infusion pumps, which are network-connected devices that deliver medications and fluids to patients. This topic is of critical concern because security lapses in these devices have the potential to put lives at risk or expose sensitive patient data.
Unit 42's discovery of security gaps in three out of four infusion pumps that they reviewed highlights the need for the healthcare industry to redouble efforts to protect against known vulnerabilities, while diligently following best practices for infusion pumps and hospital networks. May walks us through Unit 42's work.
The research can be found here:
Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Dec 2022 08:00:00 -0000</pubDate>
      <itunes:title>Encore: Vulnerabilities in IoT devices. </itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>232</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dr. May Wang, CTO of IoT Security at Palo Alto Networks, joins Dave Bittner to discuss their findings detailed in Unit 42's "Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization" research. Unit 42 recently set out to better understand how well hospitals and other healthcare providers are doing in securing smart infusion pumps, which are network-connected devices that deliver medications and fluids to patients. This topic is of critical concern because security lapses in these devices have the potential to put lives at risk or expose sensitive patient data.
Unit 42's discovery of security gaps in three out of four infusion pumps that they reviewed highlights the need for the healthcare industry to redouble efforts to protect against known vulnerabilities, while diligently following best practices for infusion pumps and hospital networks. May walks us through Unit 42's work.
The research can be found here:
Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dr. May Wang, CTO of IoT Security at Palo Alto Networks, joins Dave Bittner to discuss their findings detailed in Unit 42's "Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization" research. Unit 42 recently set out to better understand how well hospitals and other healthcare providers are doing in securing smart infusion pumps, which are network-connected devices that deliver medications and fluids to patients. This topic is of critical concern because security lapses in these devices have the potential to put lives at risk or expose sensitive patient data.</p><p>Unit 42's discovery of security gaps in three out of four infusion pumps that they reviewed highlights the need for the healthcare industry to redouble efforts to protect against known vulnerabilities, while diligently following best practices for infusion pumps and hospital networks. May walks us through Unit 42's work.</p><p>The research can be found here:</p><ul><li><a href="https://unit42.paloaltonetworks.com/infusion-pump-vulnerabilities/">Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1337</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[145d0a40-77f6-11ed-853f-33ea16d31d92]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4917419912.mp3?updated=1685127285" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>PolyVice and Royal ransomware make nuisances of themselves. US warns that KillNet can be expected to go after the healthcare sector. CISA’s plans for stakeholder engagement. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1730/notes</link>
      <description>The Vice Society may be upping its marketing game. Royal ransomware may have a connection to Conti. Royal delivers ransom note by hacked printer. KillNet goes after healthcare. CISA's Stakeholder Engagement Strategic Plan. Adam Meyers from CrowdStrike looks at cyber espionage. Giulia Porter from RoboKiller does not want to talk to you about your car’s extended warranty. And holiday wishes to all.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/245

Selected reading.
Custom-Branded Ransomware: The Vice Society Group and the Threat of Outsourced Development (SentinelOne)
Vice Society ransomware gang switches to new custom encryptor (BleepingComputer) 
Conti Team One Splinter Group Resurfaces as Royal Ransomware with Callback Phishing Attacks (Trend Micro)
Researchers Link Royal Ransomware to Conti Group (SecurityWeek)
Major Australian university dealing with suspected cybersecurity attack (7NEWS) 
Printers at Queensland's second-largest university spit out ransomware messages after cyber attack (ABC) 
Pro-Russian Hacktivist Group ‘KillNet’ Threat to HPH Sector (HC3)
HHS alert warns KillNet hacktivist group targeted US healthcare entity (SC Media) 
HC3 Analyst Note TLP Clear Pro-Russian Hacktivist Group Killnet Threat to HPH Sector December 22, 2022 | AHA (American Hospital Association)
 Strategic Plan for Stakeholder Engagement (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 23 Dec 2022 21:15:00 -0000</pubDate>
      <itunes:title>PolyVice and Royal ransomware make nuisances of themselves. US warns that KillNet can be expected to go after the healthcare sector. CISA’s plans for stakeholder engagement. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1730</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Vice Society may be upping its marketing game. Royal ransomware may have a connection to Conti. Royal delivers ransom note by hacked printer. KillNet goes after healthcare. CISA's Stakeholder Engagement Strategic Plan. Adam Meyers from CrowdStrike looks at cyber espionage. Giulia Porter from RoboKiller does not want to talk to you about your car’s extended warranty. And holiday wishes to all.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/245

Selected reading.
Custom-Branded Ransomware: The Vice Society Group and the Threat of Outsourced Development (SentinelOne)
Vice Society ransomware gang switches to new custom encryptor (BleepingComputer) 
Conti Team One Splinter Group Resurfaces as Royal Ransomware with Callback Phishing Attacks (Trend Micro)
Researchers Link Royal Ransomware to Conti Group (SecurityWeek)
Major Australian university dealing with suspected cybersecurity attack (7NEWS) 
Printers at Queensland's second-largest university spit out ransomware messages after cyber attack (ABC) 
Pro-Russian Hacktivist Group ‘KillNet’ Threat to HPH Sector (HC3)
HHS alert warns KillNet hacktivist group targeted US healthcare entity (SC Media) 
HC3 Analyst Note TLP Clear Pro-Russian Hacktivist Group Killnet Threat to HPH Sector December 22, 2022 | AHA (American Hospital Association)
 Strategic Plan for Stakeholder Engagement (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Vice Society may be upping its marketing game. Royal ransomware may have a connection to Conti. Royal delivers ransom note by hacked printer. KillNet goes after healthcare. CISA's Stakeholder Engagement Strategic Plan. Adam Meyers from CrowdStrike looks at cyber espionage. Giulia Porter from RoboKiller does not want to talk to you about your car’s extended warranty. And holiday wishes to all.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/245</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.sentinelone.com/labs/custom-branded-ransomware-the-vice-society-group-and-the-threat-of-outsourced-development/">Custom-Branded Ransomware: The Vice Society Group and the Threat of Outsourced Development</a> (SentinelOne)</p><p><a href="https://www.bleepingcomputer.com/news/security/vice-society-ransomware-gang-switches-to-new-custom-encryptor/">Vice Society ransomware gang switches to new custom encryptor</a> (BleepingComputer) </p><p><a href="https://www.trendmicro.com/en_us/research/22/l/conti-team-one-splinter-group-resurfaces-as-royal-ransomware-wit.html">Conti Team One Splinter Group Resurfaces as Royal Ransomware with Callback Phishing Attacks </a>(Trend Micro)</p><p><a href="https://www.securityweek.com/researchers-link-royal-ransomware-conti-group">Researchers Link Royal Ransomware to Conti Group</a> (SecurityWeek)</p><p><a href="https://7news.com.au/news/cyber-security/queensland-university-of-technology-dealing-with-cybersecurity-attack-leaving-students-data-exposed-c-9247260">Major Australian university dealing with suspected cybersecurity attack</a> (7NEWS) </p><p><a href="https://www.abc.net.au/news/2022-12-22/qld-qut-cyber-attack-printers-royal/101802692">Printers at Queensland's second-largest university spit out ransomware messages after cyber attack</a> (ABC) </p><p><a href="https://www.hhs.gov/sites/default/files/killnet-analyst-note-tlpclear.pdf">Pro-Russian Hacktivist Group ‘KillNet’ Threat to HPH Sector</a> (HC3)</p><p><a href="https://www.scmagazine.com/analysis/threat-intelligence/hhs-alert-warns-killnet-hacktivist-group-targeted-us-healthcare-entity">HHS alert warns KillNet hacktivist group targeted US healthcare entity</a> (SC Media) </p><p><a href="https://www.aha.org/cybersecurity-government-intelligence-reports/2022-12-22-hc3-analyst-note-tlp-clear-pro-russian-hacktivist-group-killnet-threat">HC3 Analyst Note TLP Clear Pro-Russian Hacktivist Group Killnet Threat to HPH Sector December 22, 2022 | AHA</a> (American Hospital Association)</p><p><a href="https://www.cisa.gov/sites/default/files/publications/CISA%20Stakeholder%20Engagement%20Strategic%20Plan%202023%E2%80%932025_V2_508c.pdf"> Strategic Plan for Stakeholder Engagement</a> (CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1772</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[447ce258-787a-11ec-abf0-570fd91ae36f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6945937591.mp3?updated=1690319725" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Online fraud, some targeting shoppers and investors, others going after e-commerce retailers. Updates on the cyber phases of Russia’s hybrid war.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1729/notes</link>
      <description>The FBI warns of malicious advertising. A new gang makes an unwelcome appearance in the holiday season. Ukraine will receive more Starlink terminals after all. Cyber phases of the hybrid war: a view from Kyiv–the bears and their adjuncts are opportunistic agents of chaos. Caleb Barlow thinks boards of directors need to up their cyber security game. Our guest is AJ Nash from ZeroFox with a look at legislative restrictions on TikTok. And reports say that US National Cyber Director Chris Inglis is preparing to retire. We wish him the best of luck.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/244

Selected reading.
Cyber Criminals Impersonating Brands Using Search Engine Advertisement Services to Defraud Users (FBI)
A sophisticated fraud ring is waging war on commerce, using rapidly changing tactics (Signifyd)
Ukraine to Get Thousands More Starlink Antennas, Minister Says (Bloomberg)
Ukraine’s Cyber Units Aim to Retain Staff, Keep Services Stable as War Enters Year Two (Wall Street Journal)
Top Biden cybersecurity adviser to step down (CNN)
Chris Inglis to resign as national cyber director (CyberScoop).
First-ever national cyber director Chris Inglis set to retire in coming months: sources (Axios).
White House cyber adviser to resign  (The Hill)
Chris Inglis, Biden's top cyber adviser, plans to leave government in coming months (POLITICO).
White House Cyber Director Chris Inglis to Step Down (Bank Info Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 22 Dec 2022 21:15:00 -0000</pubDate>
      <itunes:title>Online fraud, some targeting shoppers and investors, others going after e-commerce retailers. Updates on the cyber phases of Russia’s hybrid war.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1729</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The FBI warns of malicious advertising. A new gang makes an unwelcome appearance in the holiday season. Ukraine will receive more Starlink terminals after all. Cyber phases of the hybrid war: a view from Kyiv–the bears and their adjuncts are opportunistic agents of chaos. Caleb Barlow thinks boards of directors need to up their cyber security game. Our guest is AJ Nash from ZeroFox with a look at legislative restrictions on TikTok. And reports say that US National Cyber Director Chris Inglis is preparing to retire. We wish him the best of luck.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/244

Selected reading.
Cyber Criminals Impersonating Brands Using Search Engine Advertisement Services to Defraud Users (FBI)
A sophisticated fraud ring is waging war on commerce, using rapidly changing tactics (Signifyd)
Ukraine to Get Thousands More Starlink Antennas, Minister Says (Bloomberg)
Ukraine’s Cyber Units Aim to Retain Staff, Keep Services Stable as War Enters Year Two (Wall Street Journal)
Top Biden cybersecurity adviser to step down (CNN)
Chris Inglis to resign as national cyber director (CyberScoop).
First-ever national cyber director Chris Inglis set to retire in coming months: sources (Axios).
White House cyber adviser to resign  (The Hill)
Chris Inglis, Biden's top cyber adviser, plans to leave government in coming months (POLITICO).
White House Cyber Director Chris Inglis to Step Down (Bank Info Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FBI warns of malicious advertising. A new gang makes an unwelcome appearance in the holiday season. Ukraine will receive more Starlink terminals after all. Cyber phases of the hybrid war: a view from Kyiv–the bears and their adjuncts are opportunistic agents of chaos. Caleb Barlow thinks boards of directors need to up their cyber security game. Our guest is AJ Nash from ZeroFox with a look at legislative restrictions on TikTok. And reports say that US National Cyber Director Chris Inglis is preparing to retire. We wish him the best of luck.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/244</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.ic3.gov/Media/Y2022/PSA221221">Cyber Criminals Impersonating Brands Using Search Engine Advertisement Services to Defraud Users</a> (FBI)</p><p><a href="https://www.signifyd.com/blog/fraud-ring-waging-war-on-commerce-as-launched-a-war-on-commerce-deploying-rapidly-changing-tactics-against-u-s-merchant/">A sophisticated fraud ring is waging war on commerce, using rapidly changing tacti</a>cs (Signifyd)</p><p><a href="https://www.bloomberg.com/news/articles/2022-12-20/ukraine-to-get-thousands-more-starlink-antennas-minister-says">Ukraine to Get Thousands More Starlink Antennas, Minister Says</a> (Bloomberg)</p><p><a href="https://www.wsj.com/articles/ukraines-cyber-units-aim-to-retain-staff-keep-services-stable-as-war-enters-year-two-11671643260">Ukraine’s Cyber Units Aim to Retain Staff, Keep Services Stable as War Enters Year Two</a> (Wall Street Journal)</p><p><a href="https://www.cnn.com/2022/12/21/politics/white-house-cyber-official-chris-inglis-to-step-down/index.html">Top Biden cybersecurity adviser to step down</a> (CNN)</p><p><a href="https://www.cyberscoop.com/inglis-resign-national-cyber-director/">Chris Inglis to resign as national cyber director</a> (CyberScoop).</p><p><a href="https://www.axios.com/2022/12/21/chris-inglis-biden-administration-office-of-the-national-cyber-director">First-ever national cyber director Chris Inglis set to retire in coming months: sources</a> (Axios).</p><p><a href="https://thehill.com/policy/cybersecurity/3783867-white-house-cyber-adviser-to-resign/">White House cyber adviser to resign </a> (The Hill)</p><p><a href="https://www.politico.com/news/2022/12/21/chris-inglis-bidens-top-cyber-adviser-plans-to-leave-the-government-00075073">Chris Inglis, Biden's top cyber adviser, plans to leave government in coming months</a> (POLITICO).</p><p><a href="https://www.bankinfosecurity.com/white-house-cyber-director-chris-inglis-to-step-down-a-20764">White House Cyber Director Chris Inglis to Step Down</a> (Bank Info Security)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1703</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[439e867a-787a-11ec-abf0-77a0c94f8544]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9205422739.mp3?updated=1690319685" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Developing a banking Trojan into a newer, more effective form. Cyberattacks on media outlets. Abuse of AWS Elastic IP transfer. Notes on the hybrid war. And cybercrooks are inspired by Breaking Bad.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1728/notes</link>
      <description>The Godfather banking Trojan has deep roots in older code. FuboTV was disrupted around its World Cup coverage. The Guardian has been hit with an apparent ransomware attack. A threat actor abuses AWS Elastic IP transfer. Moldova may be receiving more Russian attention in cyberspace. CISA releases six industrial control system advisories. Ben Yelin looks at legislation addressing health care security. Our guest is Hugh Njemanze of Anomali with advice on preparing for the holiday break. And criminals are impersonating other criminals' underworld souks.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/243

Selected reading.
Godfather: A banking Trojan that is impossible to refuse (Group-IB)
FuboTV outage during World Cup semifinal was caused by cyberattack (Record)
Guardian hit by serious IT incident believed to be ransomware attack (the Guardian) 
Elastic IP Hijacking — A New Attack Vector in AWS (Mitiga)
Telegram Hack Exposes Growing Russian Cyber Threat in Moldova (Balkan Insight)
Fuji Electric Tellus Lite V-Simulator (CISA)
Rockwell Automation GuardLogix and ControlLogix controllers (CISA)
ARC Informatique PcVue (CISA)
Rockwell Automation MicroLogix 1100 and 1400 (CISA)
Delta 4G Router DX-3021 (CISA)
Prosys OPC UA Simulation Server (CISA)
The scammers who scam scammers on cybercrime forums: Part 3 (Sophos News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 21 Dec 2022 21:15:00 -0000</pubDate>
      <itunes:title>Developing a banking Trojan into a newer, more effective form. Cyberattacks on media outlets. Abuse of AWS Elastic IP transfer. Notes on the hybrid war. And cybercrooks are inspired by Breaking Bad.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1728</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Godfather banking Trojan has deep roots in older code. FuboTV was disrupted around its World Cup coverage. The Guardian has been hit with an apparent ransomware attack. A threat actor abuses AWS Elastic IP transfer. Moldova may be receiving more Russian attention in cyberspace. CISA releases six industrial control system advisories. Ben Yelin looks at legislation addressing health care security. Our guest is Hugh Njemanze of Anomali with advice on preparing for the holiday break. And criminals are impersonating other criminals' underworld souks.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/243

Selected reading.
Godfather: A banking Trojan that is impossible to refuse (Group-IB)
FuboTV outage during World Cup semifinal was caused by cyberattack (Record)
Guardian hit by serious IT incident believed to be ransomware attack (the Guardian) 
Elastic IP Hijacking — A New Attack Vector in AWS (Mitiga)
Telegram Hack Exposes Growing Russian Cyber Threat in Moldova (Balkan Insight)
Fuji Electric Tellus Lite V-Simulator (CISA)
Rockwell Automation GuardLogix and ControlLogix controllers (CISA)
ARC Informatique PcVue (CISA)
Rockwell Automation MicroLogix 1100 and 1400 (CISA)
Delta 4G Router DX-3021 (CISA)
Prosys OPC UA Simulation Server (CISA)
The scammers who scam scammers on cybercrime forums: Part 3 (Sophos News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Godfather banking Trojan has deep roots in older code. FuboTV was disrupted around its World Cup coverage. The Guardian has been hit with an apparent ransomware attack. A threat actor abuses AWS Elastic IP transfer. Moldova may be receiving more Russian attention in cyberspace. CISA releases six industrial control system advisories. Ben Yelin looks at legislation addressing health care security. Our guest is Hugh Njemanze of Anomali with advice on preparing for the holiday break. And criminals are impersonating other criminals' underworld souks.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/243</p><p><br></p><h2>Selected reading.</h2><p><a href="https://blog.group-ib.com/godfather-trojan?utm_source=press_release&amp;utm_campaign=godfather-blog-en&amp;utm_medium=organic">Godfather: A banking Trojan that is impossible to refuse</a> (Group-IB)</p><p><a href="https://therecord.media/fubotv-outage-during-world-cup-semifinal-was-caused-by-cyberattack/">FuboTV outage during World Cup semifinal was caused by cyberattack</a> (Record)</p><p><a href="https://www.theguardian.com/media/2022/dec/21/guardian-hit-by-serious-it-incident-believed-to-be-ransomware-attack">Guardian hit by serious IT incident believed to be ransomware attack</a> (the Guardian) </p><p><a href="https://www.mitiga.io/blog/elastic-ip-hijacking-a-new-attack-vector-in-aws">Elastic IP Hijacking — A New Attack Vector in AWS</a> (Mitiga)</p><p><a href="https://balkaninsight.com/2022/12/20/telegram-hack-exposes-growing-russian-cyber-threat-in-moldova/">Telegram Hack Exposes Growing Russian Cyber Threat in Moldova</a> (Balkan Insight)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-354-01">Fuji Electric Tellus Lite V-Simulator</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-354-02">Rockwell Automation GuardLogix and ControlLogix controllers</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-354-03">ARC Informatique PcVue</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-354-04">Rockwell Automation MicroLogix 1100 and 1400</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-354-05">Delta 4G Router DX-3021</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-349-01">Prosys OPC UA Simulation Server</a> (CISA)</p><p><a href="https://news.sophos.com/en-us/2022/12/21/the-scammers-who-scam-scammers-on-cybercrime-forums-part-3/">The scammers who scam scammers on cybercrime forums: Part 3</a> (Sophos News)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1645</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[433e6204-787a-11ec-abf0-576562c1c836]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9174097172.mp3?updated=1690319658" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Warnings on SentinelSneak. The rise of malicious XLLs. Updates from Russia’s hybrid war. An unusually loathsome campaign targets children.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1727/notes</link>
      <description>SentinelSneak is out in the wild. XLLs for malware delivery. CERT-UA warns of attacks against the DELTA situational awareness system. FSB cyber operations against Ukraine. Trends in the cyber phases of Russia's hybrid war. Mr. Security Answer Person John Pescatore offers his sage wisdom. Microsoft’s Ann Johnson from Afternoon Cyber Tea speaks with Dr. Chenxi Wang from Rain Capital. And an unusually unpleasant sextortion campaign.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/242

Selected reading.
SentinelSneak is not a legitimate SDK. (CyberWire)
SentinelSneak: Malicious PyPI module poses as security software development kit (ReversingLabs)
Malicious Python Trojan Impersonates SentinelOne Security Client (Dark Reading)
Malicious ‘SentinelOne’ PyPI package steals data from developers (BleepingComputer)
Cisco research on XLL Abuse. (CyberWire)
Threat Spotlight: XLLing in Excel - threat actors using malicious add-ins (Cisco Talos Blog) 
Ukraine at D+299: Cyber operations 300 days into the war. (CyberWire)
Cyber Dimensions of the Armed Conflict in Ukraine (CyberPeace Institute)
Ukraine's DELTA military system users targeted by info-stealing malware (BleepingComputer)
Ukraine's Delta Military Intel System Hit by Attacks (Infosecurity Magazine)
Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine (Unit 42)
FBI and Partners Issue National Public Safety Alert on Financial Sextortion Schemes | Federal Bureau of Investigation (Federal Bureau of Investigation)
HSI, federal partners issue national public safety alert on sextortion schemes (US Immigration and Customs Enforcement)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Dec 2022 21:30:00 -0000</pubDate>
      <itunes:title>Warnings on SentinelSneak. The rise of malicious XLLs. Updates from Russia’s hybrid war. An unusually loathsome campaign targets children.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1727</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>SentinelSneak is out in the wild. XLLs for malware delivery. CERT-UA warns of attacks against the DELTA situational awareness system. FSB cyber operations against Ukraine. Trends in the cyber phases of Russia's hybrid war. Mr. Security Answer Person John Pescatore offers his sage wisdom. Microsoft’s Ann Johnson from Afternoon Cyber Tea speaks with Dr. Chenxi Wang from Rain Capital. And an unusually unpleasant sextortion campaign.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/242

Selected reading.
SentinelSneak is not a legitimate SDK. (CyberWire)
SentinelSneak: Malicious PyPI module poses as security software development kit (ReversingLabs)
Malicious Python Trojan Impersonates SentinelOne Security Client (Dark Reading)
Malicious ‘SentinelOne’ PyPI package steals data from developers (BleepingComputer)
Cisco research on XLL Abuse. (CyberWire)
Threat Spotlight: XLLing in Excel - threat actors using malicious add-ins (Cisco Talos Blog) 
Ukraine at D+299: Cyber operations 300 days into the war. (CyberWire)
Cyber Dimensions of the Armed Conflict in Ukraine (CyberPeace Institute)
Ukraine's DELTA military system users targeted by info-stealing malware (BleepingComputer)
Ukraine's Delta Military Intel System Hit by Attacks (Infosecurity Magazine)
Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine (Unit 42)
FBI and Partners Issue National Public Safety Alert on Financial Sextortion Schemes | Federal Bureau of Investigation (Federal Bureau of Investigation)
HSI, federal partners issue national public safety alert on sextortion schemes (US Immigration and Customs Enforcement)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>SentinelSneak is out in the wild. XLLs for malware delivery. CERT-UA warns of attacks against the DELTA situational awareness system. FSB cyber operations against Ukraine. Trends in the cyber phases of Russia's hybrid war. Mr. Security Answer Person John Pescatore offers his sage wisdom. Microsoft’s Ann Johnson from Afternoon Cyber Tea speaks with Dr. Chenxi Wang from Rain Capital. And an unusually unpleasant sextortion campaign.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/242</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/stories/cb5cba2cf27e43728bb882ee6f050998/sentinelsneak-is-not-a-legitimate-sdk">SentinelSneak is not a legitimate SDK.</a> (CyberWire)</p><p><a href="https://blog.reversinglabs.com/blog/sentinelsneak-malicious-pypi-module-poses-as-security-sdk">SentinelSneak: Malicious PyPI module poses as security software development kit</a> (ReversingLabs)</p><p><a href="https://www.darkreading.com/vulnerabilities-threats/malicious-python-trojan-impersonates-sentinelone-security-client">Malicious Python Trojan Impersonates SentinelOne Security Client</a> (Dark Reading)</p><p><a href="https://www.bleepingcomputer.com/news/security/malicious-sentinelone-pypi-package-steals-data-from-developers/">Malicious ‘SentinelOne’ PyPI package steals data from developers</a> (BleepingComputer)</p><p><a href="https://thecyberwire.com/stories/40fb3c124abc4b0dbd118210f22cfcf8/cisco-research-on-xll-abuse">Cisco research on XLL Abuse.</a> (CyberWire)</p><p><a href="https://blog.talosintelligence.com/xlling-in-excel-malicious-add-ins/">Threat Spotlight: XLLing in Excel - threat actors using malicious add-ins</a> (Cisco Talos Blog) </p><p><a href="https://thecyberwire.com/stories/549772f3116643568315ed386e90ce3f/ukraine-at-d299-cyber-operations-300-days-into-the-war">Ukraine at D+299: Cyber operations 300 days into the war.</a> (CyberWire)</p><p><a href="https://cyberpeaceinstitute.org/publications/cyber-dimensions-of-the-armed-conflict-in-ukraine/">Cyber Dimensions of the Armed Conflict in Ukraine</a> (CyberPeace Institute)</p><p><a href="https://www.bleepingcomputer.com/news/security/ukraines-delta-military-system-users-targeted-by-info-stealing-malware/">Ukraine's DELTA military system users targeted by info-stealing malware</a> (BleepingComputer)</p><p><a href="https://www.infosecurity-magazine.com/news/ukraines-delta-military-intel/">Ukraine's Delta Military Intel System Hit by Attacks</a> (Infosecurity Magazine)</p><p><a href="https://unit42.paloaltonetworks.com/trident-ursa/">Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine</a> (Unit 42)</p><p><a href="https://www.fbi.gov/news/press-releases/press-releases/fbi-and-partners-issue-national-public-safety-alert-on-financial-sextortion-schemes">FBI and Partners Issue National Public Safety Alert on Financial Sextortion Schemes | Federal Bureau of Investigation</a> (Federal Bureau of Investigation)</p><p><a href="https://www.ice.gov/news/releases/hsi-federal-partners-issue-national-public-safety-alert-sextortion-schemes">HSI, federal partners issue national public safety alert on sextortion schemes</a> (US Immigration and Customs Enforcement)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1494</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[429a2540-787a-11ec-abf0-4b34f25b987c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2398272420.mp3?updated=1690319492" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BEC gets into bulk food theft. BlackCat ransomware update. Epic Games’ settlement with FTC. InfraGard data taken down. More on the hybrid war. And Twitter asks for the voice of the people.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1726/notes</link>
      <description>BEC takes aim at physical goods (including food). BlackCat ransomware activity increases. Epic Games settles an FTC regulatory case. The InfraGard database was pulled from a dark web auction site. CISA releases forty-one ICS advisories. Rick Howard interviews author Andy Greenberg. Rob Boyce from Accenture examines holiday cyber threats. The growing value of open source intelligence. Twitter says vox populi, vox dei.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/241

Selected reading.
FBI, FDA OCI, and USDA Release Joint Cybersecurity Advisory Regarding Business Email Compromise Schemes Used to Steal Food (CISA)
Colombian energy supplier EPM hit by BlackCat ransomware attack (BleepingComputer)
Events D.C. data published online in apparent ransomware attack (Washington Post) 
Fortnite Video Game Maker Epic Games to Pay More Than Half a Billion Dollars over FTC Allegations of Privacy Violations and Unwanted Charges (Federal Trade Commission) 
Hacker Halts Sale of FBI's High-Profile InfraGard Database (HackRead) 
CISA Releases Forty-One Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency) 
Russia’s Wartime Cyber Operations in Ukraine: Military Impacts, Influences, and Implications (Carnegie Endowment for International Peace) 
How open-source intelligence has shaped the Russia-Ukraine war (GOV.UK)
Front-line video makes Ukrainian combat some of history’s most watched (Washington Post) 
Elon Musk Polls Twitter Users, Asking Whether He Should Step Down (Wall Street Journal)
Musk asks: Should I stay as CEO? (Computing)
Elon Musk’s Twitter Poll Shows Users Want Him to Step Down (Wall Street Journal) 
Elon Musk’s Twitter poll: 10 million say he should step down (the Guardian)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 19 Dec 2022 21:15:00 -0000</pubDate>
      <itunes:title>BEC gets into bulk food theft. BlackCat ransomware update. Epic Games’ settlement with FTC. InfraGard data taken down. More on the hybrid war. And Twitter asks for the voice of the people.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1726</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>BEC takes aim at physical goods (including food). BlackCat ransomware activity increases. Epic Games settles an FTC regulatory case. The InfraGard database was pulled from a dark web auction site. CISA releases forty-one ICS advisories. Rick Howard interviews author Andy Greenberg. Rob Boyce from Accenture examines holiday cyber threats. The growing value of open source intelligence. Twitter says vox populi, vox dei.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/241

Selected reading.
FBI, FDA OCI, and USDA Release Joint Cybersecurity Advisory Regarding Business Email Compromise Schemes Used to Steal Food (CISA)
Colombian energy supplier EPM hit by BlackCat ransomware attack (BleepingComputer)
Events D.C. data published online in apparent ransomware attack (Washington Post) 
Fortnite Video Game Maker Epic Games to Pay More Than Half a Billion Dollars over FTC Allegations of Privacy Violations and Unwanted Charges (Federal Trade Commission) 
Hacker Halts Sale of FBI's High-Profile InfraGard Database (HackRead) 
CISA Releases Forty-One Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency) 
Russia’s Wartime Cyber Operations in Ukraine: Military Impacts, Influences, and Implications (Carnegie Endowment for International Peace) 
How open-source intelligence has shaped the Russia-Ukraine war (GOV.UK)
Front-line video makes Ukrainian combat some of history’s most watched (Washington Post) 
Elon Musk Polls Twitter Users, Asking Whether He Should Step Down (Wall Street Journal)
Musk asks: Should I stay as CEO? (Computing)
Elon Musk’s Twitter Poll Shows Users Want Him to Step Down (Wall Street Journal) 
Elon Musk’s Twitter poll: 10 million say he should step down (the Guardian)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>BEC takes aim at physical goods (including food). BlackCat ransomware activity increases. Epic Games settles an FTC regulatory case. The InfraGard database was pulled from a dark web auction site. CISA releases forty-one ICS advisories. Rick Howard interviews author Andy Greenberg. Rob Boyce from Accenture examines holiday cyber threats. The growing value of open source intelligence. Twitter says vox populi, vox dei.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/241</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/12/16/fbi-fda-oci-and-usda-release-joint-cybersecurity-advisory">FBI, FDA OCI, and USDA Release Joint Cybersecurity Advisory Regarding Business Email Compromise Schemes Used to Steal Food</a> (CISA)</p><p><a href="https://www.bleepingcomputer.com/news/security/colombian-energy-supplier-epm-hit-by-blackcat-ransomware-attack/">Colombian energy supplier EPM hit by BlackCat ransomware attack</a> (BleepingComputer)</p><p><a href="https://www.washingtonpost.com/dc-md-va/2022/12/16/events-dc-ransomware-cyberattack-data/">Events D.C. data published online in apparent ransomware attack</a> (Washington Post) </p><p><a href="https://www.ftc.gov/news-events/news/press-releases/2022/12/fortnite-video-game-maker-epic-games-pay-more-half-billion-dollars-over-ftc-allegations">Fortnite Video Game Maker Epic Games to Pay More Than Half a Billion Dollars over FTC Allegations of Privacy Violations and Unwanted Charges</a> (Federal Trade Commission) </p><p><a href="https://www.hackread.com/hacker-halt-sale-fbi-infragard-database/">Hacker Halts Sale of FBI's High-Profile InfraGard Database</a> (HackRead) </p><p><a href="https://content.govdelivery.com/accounts/USDHSCISA/bulletins/33da29d">CISA Releases Forty-One Industrial Control Systems Advisories</a> (Cybersecurity and Infrastructure Security Agency) </p><p><a href="https://carnegieendowment.org/2022/12/19/russia-s-wartime-cyber-operations-in-ukraine-military-impacts-influences-and-implications-pub-88657">Russia’s Wartime Cyber Operations in Ukraine: Military Impacts, Influences, and Implications</a> (Carnegie Endowment for International Peace) </p><p><a href="https://www.gov.uk/government/speeches/how-open-source-intelligence-has-shaped-the-russia-ukraine-war">How open-source intelligence has shaped the Russia-Ukraine war</a> (GOV.UK)</p><p><a href="https://www.washingtonpost.com/world/2022/12/18/ukraine-russia-war-footage-researchers-journalists/">Front-line video makes Ukrainian combat some of history’s most watched</a> (Washington Post) </p><p><a href="https://www.wsj.com/articles/elon-musk-polls-twitter-users-asking-whether-he-should-step-down-11671409266?mod=djemalertNEWS">Elon Musk Polls Twitter Users, Asking Whether He Should Step Down</a> (Wall Street Journal)</p><p><a href="https://www.computing.co.uk/news/4061836/musk-stay-ceo">Musk asks: Should I stay as CEO? </a>(Computing)</p><p><a href="https://www.wsj.com/articles/elon-musks-twitter-poll-shows-users-want-him-to-step-down-11671449123">Elon Musk’s Twitter Poll Shows Users Want Him to Step Down</a> (Wall Street Journal) </p><p><a href="https://www.theguardian.com/technology/2022/dec/19/elon-musk-says-step-down-twitter-ceo-poll-tesla">Elon Musk’s Twitter poll: 10 million say he should step down</a> (the Guardian)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1615</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[423acc94-787a-11ec-abf0-875fd68ae6f3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9191637873.mp3?updated=1690319458" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Strategies to get the most out of your toolsets. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/43/notes</link>
      <description>With a recession looming, many business leaders are looking for ways to cut spending wherever possible. And while tool bloat affects many security teams, it can be a challenging problem to tackle for a couple of reasons. First, there’s the fear that security will be lost if a tool is removed. Second, there’s the daunting task of unraveling complex systems. And finally, there’s the perennial talent shortage. Like all challenges in security, they’re made even worse by the fact that there’s not enough people able to tackle them. 
During this CyberWire-X episode, host Rick Howard, the CyberWire’s CISO, Chief Analyst and Senior Fellow, speaks with Hash Table member Ted Wagner, the CSO of SAP National Security Services, and host Dave Bittner speaks with sponsor ExtraHop Senior Technical Marketing Manager Jamie Moles. They discuss solutions to help business and security leaders to not just address these challenges, but to get more out of their tooling as they do. They discuss strategies for how to determine which tools you actually need and which you can get rid of, as well as the step-change benefits that can be realized when you consolidate, automate, and integrate your security solutions.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 18 Dec 2022 08:00:00 -0000</pubDate>
      <itunes:title>Strategies to get the most out of your toolsets. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>43</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>With a recession looming, many business leaders are looking for ways to cut spending wherever possible. And while tool bloat affects many security teams, it can be a challenging problem to tackle for a couple of reasons. First, there’s the fear that security will be lost if a tool is removed. Second, there’s the daunting task of unraveling complex systems. And finally, there’s the perennial talent shortage. Like all challenges in security, they’re made even worse by the fact that there’s not enough people able to tackle them. 
During this CyberWire-X episode, host Rick Howard, the CyberWire’s CISO, Chief Analyst and Senior Fellow, speaks with Hash Table member Ted Wagner, the CSO of SAP National Security Services, and host Dave Bittner speaks with sponsor ExtraHop Senior Technical Marketing Manager Jamie Moles. They discuss solutions to help business and security leaders to not just address these challenges, but to get more out of their tooling as they do. They discuss strategies for how to determine which tools you actually need and which you can get rid of, as well as the step-change benefits that can be realized when you consolidate, automate, and integrate your security solutions.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>With a recession looming, many business leaders are looking for ways to cut spending wherever possible. And while tool bloat affects many security teams, it can be a challenging problem to tackle for a couple of reasons. First, there’s the fear that security will be lost if a tool is removed. Second, there’s the daunting task of unraveling complex systems. And finally, there’s the perennial talent shortage. Like all challenges in security, they’re made even worse by the fact that there’s not enough people able to tackle them. </p><p>During this CyberWire-X episode, host Rick Howard, the CyberWire’s CISO, Chief Analyst and Senior Fellow, speaks with Hash Table member Ted Wagner, the CSO of SAP National Security Services, and host Dave Bittner speaks with sponsor ExtraHop Senior Technical Marketing Manager Jamie Moles. They discuss solutions to help business and security leaders to not just address these challenges, but to get more out of their tooling as they do. They discuss strategies for how to determine which tools you actually need and which you can get rid of, as well as the step-change benefits that can be realized when you consolidate, automate, and integrate your security solutions.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2298</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8de56cf4-7ca6-11ed-8713-93657eb253db]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7216651084.mp3?updated=1671127948" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Don Pezet: Stepping stones are the start of your career. [CTO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/130/notes</link>
      <description>Don Pezet, CTO of ACI Learning, sits down to share his over 25 years of experience in the industry. Don previously spent time as a field engineer in the financial and insurance industries supporting networks around the world. He co-founded ITProTV in 2012 to help create the IT training that he wished he had when he got started in his IT career. He also shares insights for anyone else wishing to pursue IT, no matter their age or past experience. Don explains how important stepping stones are as you get into this field, stating "know that that first job you get is probably not going to be the job you want to have your whole life, but it's a stepping stone that leads to where you want to get." Don started teaching on the side as well as working in the IT field and explains how much his teaching skills come in handy to help him with his leadership skills, which in turn helps him to be a better CTO, helping his customers. We thank Don for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 18 Dec 2022 08:00:00 -0000</pubDate>
      <itunes:title>Don Pezet: Stepping stones are the start of your career. [CTO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>130</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Don Pezet, CTO of ACI Learning, sits down to share his over 25 years of experience in the industry. Don previously spent time as a field engineer in the financial and insurance industries supporting networks around the world. He co-founded ITProTV in 2012 to help create the IT training that he wished he had when he got started in his IT career. He also shares insights for anyone else wishing to pursue IT, no matter their age or past experience. Don explains how important stepping stones are as you get into this field, stating "know that that first job you get is probably not going to be the job you want to have your whole life, but it's a stepping stone that leads to where you want to get." Don started teaching on the side as well as working in the IT field and explains how much his teaching skills come in handy to help him with his leadership skills, which in turn helps him to be a better CTO, helping his customers. We thank Don for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Don Pezet, CTO of ACI Learning, sits down to share his over 25 years of experience in the industry. Don previously spent time as a field engineer in the financial and insurance industries supporting networks around the world. He co-founded ITProTV in 2012 to help create the IT training that he wished he had when he got started in his IT career. He also shares insights for anyone else wishing to pursue IT, no matter their age or past experience. Don explains how important stepping stones are as you get into this field, stating "know that that first job you get is probably not going to be the job you want to have your whole life, but it's a stepping stone that leads to where you want to get." Don started teaching on the side as well as working in the IT field and explains how much his teaching skills come in handy to help him with his leadership skills, which in turn helps him to be a better CTO, helping his customers. We thank Don for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>454</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7d7f6e6-7cb8-11ed-87a0-6358ce19a21b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4180481896.mp3?updated=1671463632" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hijacking holiday spirit with phishing scams. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/262/notes</link>
      <description>Or Katz from Akamai sits down with Dave to discuss research on highly sophisticated phishing scams and how they are abusing holiday sentiment. This particular threat, most recently has focused on Halloween deals, enticing victims with the chance to win a free prize, including from Dick’s Sporting Goods or Tumi Backpacks. It then requests credit card details to cover the cost of shipment.
From mid-September to the end of October 2022, Akamai's research were able uncover and track this threat. This kit mimics well known retail stores in hopes to hijack credit card information, feeding off of people's holiday spirit.
The research can be found here:
Highly Sophisticated Phishing Scams Are Abusing Holiday Sentiment

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Dec 2022 08:00:00 -0000</pubDate>
      <itunes:title>Hijacking holiday spirit with phishing scams. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>262</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Or Katz from Akamai sits down with Dave to discuss research on highly sophisticated phishing scams and how they are abusing holiday sentiment. This particular threat, most recently has focused on Halloween deals, enticing victims with the chance to win a free prize, including from Dick’s Sporting Goods or Tumi Backpacks. It then requests credit card details to cover the cost of shipment.
From mid-September to the end of October 2022, Akamai's research were able uncover and track this threat. This kit mimics well known retail stores in hopes to hijack credit card information, feeding off of people's holiday spirit.
The research can be found here:
Highly Sophisticated Phishing Scams Are Abusing Holiday Sentiment

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Or Katz from Akamai sits down with Dave to discuss research on highly sophisticated phishing scams and how they are abusing holiday sentiment. This particular threat, most recently has focused on Halloween deals, enticing victims with the chance to win a free prize, including from Dick’s Sporting Goods or Tumi Backpacks. It then requests credit card details to cover the cost of shipment.</p><p>From mid-September to the end of October 2022, Akamai's research were able uncover and track this threat. This kit mimics well known retail stores in hopes to hijack credit card information, feeding off of people's holiday spirit.</p><p>The research can be found here:</p><ul><li><a href="https://www.akamai.com/blog/security-research/sophisticated-phishing-scam-abusing-holiday-sentiment">Highly Sophisticated Phishing Scams Are Abusing Holiday Sentiment</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1170</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d6bac69a-7cab-11ed-afb3-77195249b3e0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2985964292.mp3?updated=1685127275" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Malicious apps do more than extort predatory loans. A Facebook account recovery scam. Notes from the hybrid war. Goodbye SHA-1, hello Leviathans.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1725/notes</link>
      <description>A predatory loan app is discovered embedded in mobile apps. Facebook phishing. GPS disruptions are reported in Russian cities. NSA warns against dismissing Russian offensive cyber capabilities. Farewell, SHA-1. Kevin Magee from Microsoft looks at cyber signals. Our guest is Jason Witty of USAA to discuss the growing risk from quantum computing. And welcome to the world, Leviathans.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/240

Selected reading.
Zimperium teams discover new malware in Flutter developed apps (SecurityBrief Asia) 
Meta-Phish: Facebook Infrastructure Used in Phishing Attack Chain (Trustwave)
GPS Signals Are Being Disrupted in Russian Cities (WIRED) 
NSA cyber director warns of Russian digital assaults on global energy sector (CyberScoop)
Russia's cyber war machine in Ukraine hasn't lived up to Western hype. Report analyses why (ThePrint)
NIST Retires SHA-1 Cryptographic Algorithm (NIST)
Historic activation of the U.S. Army’s 11th Cyber Battalion (DVIDS) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 16 Dec 2022 21:30:00 -0000</pubDate>
      <itunes:title>Malicious apps do more than extort predatory loans. A Facebook account recovery scam. Notes from the hybrid war. Goodbye SHA-1, hello Leviathans.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1725</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A predatory loan app is discovered embedded in mobile apps. Facebook phishing. GPS disruptions are reported in Russian cities. NSA warns against dismissing Russian offensive cyber capabilities. Farewell, SHA-1. Kevin Magee from Microsoft looks at cyber signals. Our guest is Jason Witty of USAA to discuss the growing risk from quantum computing. And welcome to the world, Leviathans.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/240

Selected reading.
Zimperium teams discover new malware in Flutter developed apps (SecurityBrief Asia) 
Meta-Phish: Facebook Infrastructure Used in Phishing Attack Chain (Trustwave)
GPS Signals Are Being Disrupted in Russian Cities (WIRED) 
NSA cyber director warns of Russian digital assaults on global energy sector (CyberScoop)
Russia's cyber war machine in Ukraine hasn't lived up to Western hype. Report analyses why (ThePrint)
NIST Retires SHA-1 Cryptographic Algorithm (NIST)
Historic activation of the U.S. Army’s 11th Cyber Battalion (DVIDS) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A predatory loan app is discovered embedded in mobile apps. Facebook phishing. GPS disruptions are reported in Russian cities. NSA warns against dismissing Russian offensive cyber capabilities. Farewell, SHA-1. Kevin Magee from Microsoft looks at cyber signals. Our guest is Jason Witty of USAA to discuss the growing risk from quantum computing. And welcome to the world, Leviathans.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/240</p><p><br></p><h2>Selected reading.</h2><p><a href="https://securitybrief.asia/story/zimperium-teams-discover-new-malware-in-flutter-developed-apps">Zimperium teams discover new malware in Flutter developed apps</a> (SecurityBrief Asia) </p><p><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/meta-phish-facebook-infrastructure-used-in-phishing-attack-chain/">Meta-Phish: Facebook Infrastructure Used in Phishing Attack Chain</a> (Trustwave)</p><p><a href="https://www.wired.com/story/gps-jamming-interference-russia-ukraine/">GPS Signals Are Being Disrupted in Russian Cities</a> (WIRED) </p><p><a href="https://www.cyberscoop.com/nsa-energy-sector-cyberattacks/">NSA cyber director warns of Russian digital assaults on global energy sector</a> (CyberScoop)</p><p><a href="https://theprint.in/defence/russias-cyber-war-machine-in-ukraine-hasnt-lived-up-to-western-hype-report-analyses-why/1266896/">Russia's cyber war machine in Ukraine hasn't lived up to Western hype. Report analyses why</a> (ThePrint)</p><p><a href="https://www.nist.gov/news-events/news/2022/12/nist-retires-sha-1-cryptographic-algorithm">NIST Retires SHA-1 Cryptographic Algorithm</a> (NIST)</p><p><a href="https://www.dvidshub.net/news/435252/historic-activation-us-armys-11th-cyber-battalion">Historic activation of the U.S. Army’s 11th Cyber Battalion</a> (DVIDS) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1768</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[445d579e-787a-11ec-abf0-ffc225a43fd3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3494096844.mp3?updated=1690319368" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Updates on the cyber phases of a hybrid war. Alleged booters busted. Progress report from the US anti-ransomware task force. Suspicion in AIIMS hack turns toward China.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1724/notes</link>
      <description>Trojanized Windows 10 installers are deployed against Ukraine. Alleged booters have been collared, and their sites disabled. A progress report on US anti-ransomware efforts. Suspicion in a cyberattack against India turns toward China. Bryan Vorndran from the FBI’s Cyber Division talks about deep fakes. Our guest is Lisa Plaggemier from the National Cybersecurity Alliance (NCA) on the launch of their Historically Black Colleges and Universities Career Program. And hybrid war and fissures in the underworld.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/239

Selected reading.
Trojanized Windows 10 Operating System Installers Targeted Ukrainian Government (Mandiant)
Federal Prosecutors in Los Angeles and Alaska Charge 6 Defendants with Operating Websites that Offered Computer Attack Services (US Department of Justice)
Global crackdown against DDoS services shuts down most popular platforms | Europol (Europol) 
Readout of Second Joint Ransomware Task Force Meeting (Cybersecurity and Infrastructure Security Agency)
US finds its ‘center of gravity’ in the fight against ransomware (The Record by Recorded Future) 
AIIMS cyber attack may have originated in China, Hong Kong (The Times of India) 
AIIMS Delhi Servers Were Hacked By Chinese, Damage Contained: Sources (NDTV.com)
Russia-Ukraine war reaches dark side of the internet (Al Jazeera)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 15 Dec 2022 21:15:00 -0000</pubDate>
      <itunes:title>Updates on the cyber phases of a hybrid war. Alleged booters busted. Progress report from the US anti-ransomware task force. Suspicion in AIIMS hack turns toward China.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1724</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Trojanized Windows 10 installers are deployed against Ukraine. Alleged booters have been collared, and their sites disabled. A progress report on US anti-ransomware efforts. Suspicion in a cyberattack against India turns toward China. Bryan Vorndran from the FBI’s Cyber Division talks about deep fakes. Our guest is Lisa Plaggemier from the National Cybersecurity Alliance (NCA) on the launch of their Historically Black Colleges and Universities Career Program. And hybrid war and fissures in the underworld.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/239

Selected reading.
Trojanized Windows 10 Operating System Installers Targeted Ukrainian Government (Mandiant)
Federal Prosecutors in Los Angeles and Alaska Charge 6 Defendants with Operating Websites that Offered Computer Attack Services (US Department of Justice)
Global crackdown against DDoS services shuts down most popular platforms | Europol (Europol) 
Readout of Second Joint Ransomware Task Force Meeting (Cybersecurity and Infrastructure Security Agency)
US finds its ‘center of gravity’ in the fight against ransomware (The Record by Recorded Future) 
AIIMS cyber attack may have originated in China, Hong Kong (The Times of India) 
AIIMS Delhi Servers Were Hacked By Chinese, Damage Contained: Sources (NDTV.com)
Russia-Ukraine war reaches dark side of the internet (Al Jazeera)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Trojanized Windows 10 installers are deployed against Ukraine. Alleged booters have been collared, and their sites disabled. A progress report on US anti-ransomware efforts. Suspicion in a cyberattack against India turns toward China. Bryan Vorndran from the FBI’s Cyber Division talks about deep fakes. Our guest is Lisa Plaggemier from the National Cybersecurity Alliance (NCA) on the launch of their Historically Black Colleges and Universities Career Program. And hybrid war and fissures in the underworld.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/239</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.mandiant.com/resources/blog/trojanized-windows-installers-ukrainian-government">Trojanized Windows 10 Operating System Installers Targeted Ukrainian Government</a> (Mandiant)</p><p><a href="https://www.justice.gov/usao-cdca/pr/federal-prosecutors-los-angeles-and-alaska-charge-6-defendants-operating-websites">Federal Prosecutors in Los Angeles and Alaska Charge 6 Defendants with Operating Websites that Offered Computer Attack Services</a> (US Department of Justice)</p><p><a href="https://www.europol.europa.eu/media-press/newsroom/news/global-crackdown-against-ddos-services-shuts-down-most-popular-platforms">Global crackdown against DDoS services shuts down most popular platforms | Europol</a> (Europol) </p><p><a href="https://content.govdelivery.com/accounts/USDHSCISA/bulletins/33d6bd7">Readout of Second Joint Ransomware Task Force Meeting</a> (Cybersecurity and Infrastructure Security Agency)</p><p><a href="https://therecord.media/us-finds-its-center-of-gravity-in-the-fight-against-ransomware/">US finds its ‘center of gravity’ in the fight against ransomware</a> (The Record by Recorded Future) </p><p><a href="https://timesofindia.indiatimes.com/india/aiims-cyber-attack-may-have-originated-in-china-hong-kong/articleshow/96236841.cms">AIIMS cyber attack may have originated in China, Hong Kong</a> (The Times of India) </p><p><a href="https://www.ndtv.com/india-news/aiims-delhi-server-attack-was-by-chinese-5-physical-servers-infiltrated-by-hackers-data-retrieved-now-government-sources-3605639">AIIMS Delhi Servers Were Hacked By Chinese, Damage Contained: Sources</a> (NDTV.com)</p><p><a href="https://www.aljazeera.com/news/2022/12/14/russia-ukraine-war-reaches-dark-side-of-the-internet">Russia-Ukraine war reaches dark side of the internet</a> (Al Jazeera)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1762</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[43be8c68-787a-11ec-abf0-c7eef08a4142]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7268041847.mp3?updated=1690319320" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>InfraGard data for sale. Cyberespionage warnings. Data sharing practices. Malicious drivers with legitimate signatures. Patch Tuesday. Task Force KleptoCapture indicts five Russian nationals.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1723/notes</link>
      <description>The FBI’s InfraGard user data shows up for sale. An update on Iranian cyber operations. NSA warns of Chinese cyber threats. Challenges in sharing data for threat detection and prevention. Legitimately signed drivers are used in targeted attacks. Patch Tuesday addressed a lot of actively exploited issues. Tim Starks from the Washington Post Cybersecurity 202 shares his reporting on ICS vulnerabilities. Our guest is Mike Fey from Island with an introduction to the enterprise browser space. And the US indicts five Russian nationals on sanctions-evasion charges.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/238

Selected reading.
FBI’s Vetted Info Sharing Network ‘InfraGard’ Hacked (KrebsOnSecurity)
Would’ve, Could’ve, Should’ve…Did: TA453 Refuses to be Bound by Expectations (Proofpoint) 
APT5: Citrix ADC Threat Hunting Guidance (NSA)
U.S. agency warns that hackers are going after Citrix networking gear (Reuters)
NSA Outs Chinese Hackers Exploiting Citrix Zero-Day (SecurityWeek) 
Effect of data on Federal agencies' policies. (CyberWire)
I Solemnly Swear My Driver Is Up to No Good: Hunting for Attestation Signed Malware (Mandiant)
Driving Through Defenses | Targeted Attacks Leverage Signed Malicious Microsoft Drivers (SentinelOne)
SAP Security Patch Day December 2022 (Onapsis)
December 2022 Security Updates (Microsoft Security Response Center)
December Patch Tuesday Updates | 2022 - Syxsense Inc (Syxsense Inc)
Microsoft December 2022 Patch Tuesday fixes 2 zero-days, 49 flaws (BleepingComputer)
Microsoft Squashes Zero-Day, Actively Exploited Bugs in Dec. Update (Dark Reading) 
Microsoft fixes exploited zero-day, revokes certificate used to sign malicious drivers (CVE-2022-44698) (Help Net Security)
Microsoft Releases December 2022 Security Updates (CISA)
Apple security updates (Apple Support)
We finally know why Apple pushed out that emergency 16.1.2 update (Macworld) 
Why You Should Enable Apple’s New Security Feature in iOS 16.2 Right Now (Wirecutter)
Apple Releases Security Updates for Multiple Products (CISA)
Citrix ADC and Citrix Gateway Security Bulletin for CVE-2022-27518 (Citrix)
State-sponsored attackers actively exploiting RCE in Citrix devices, patch ASAP! (CVE-2022-27518) (Help Net Security) 
Citrix Releases Security Updates for Citrix ADC, Citrix Gateway (CISA)
VMware Patches VM Escape Flaw Exploited at Geekpwn Event (SecurityWeek) 
Experts detailed a previously undetected VMware ESXi backdoor (Security Affairs)
VMware Releases Security Updates for Multiple products (CISA)
Mozilla Releases Security Updates for Thunderbird and Firefox (CISA)
Adobe Patches 38 Flaws in Enterprise Software Products (SecurityWeek)
CISA Releases Three Industrial Control Systems Advisories (CISA)
Five Russian Nationals, Including Suspected FSB Officer, and Two U.S. Nationals Charged with Helping the Russian Military and Intelligence Agencies Evade Sanctions (US Department of Justice)
Russian Military and Intelligence Agencies Procurement Network Indicted in Brooklyn Federal Court (US Department of Justice)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 14 Dec 2022 21:30:00 -0000</pubDate>
      <itunes:title>InfraGard data for sale. Cyberespionage warnings. Data sharing practices. Malicious drivers with legitimate signatures. Patch Tuesday. Task Force KleptoCapture indicts five Russian nationals.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1723</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The FBI’s InfraGard user data shows up for sale. An update on Iranian cyber operations. NSA warns of Chinese cyber threats. Challenges in sharing data for threat detection and prevention. Legitimately signed drivers are used in targeted attacks. Patch Tuesday addressed a lot of actively exploited issues. Tim Starks from the Washington Post Cybersecurity 202 shares his reporting on ICS vulnerabilities. Our guest is Mike Fey from Island with an introduction to the enterprise browser space. And the US indicts five Russian nationals on sanctions-evasion charges.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/238

Selected reading.
FBI’s Vetted Info Sharing Network ‘InfraGard’ Hacked (KrebsOnSecurity)
Would’ve, Could’ve, Should’ve…Did: TA453 Refuses to be Bound by Expectations (Proofpoint) 
APT5: Citrix ADC Threat Hunting Guidance (NSA)
U.S. agency warns that hackers are going after Citrix networking gear (Reuters)
NSA Outs Chinese Hackers Exploiting Citrix Zero-Day (SecurityWeek) 
Effect of data on Federal agencies' policies. (CyberWire)
I Solemnly Swear My Driver Is Up to No Good: Hunting for Attestation Signed Malware (Mandiant)
Driving Through Defenses | Targeted Attacks Leverage Signed Malicious Microsoft Drivers (SentinelOne)
SAP Security Patch Day December 2022 (Onapsis)
December 2022 Security Updates (Microsoft Security Response Center)
December Patch Tuesday Updates | 2022 - Syxsense Inc (Syxsense Inc)
Microsoft December 2022 Patch Tuesday fixes 2 zero-days, 49 flaws (BleepingComputer)
Microsoft Squashes Zero-Day, Actively Exploited Bugs in Dec. Update (Dark Reading) 
Microsoft fixes exploited zero-day, revokes certificate used to sign malicious drivers (CVE-2022-44698) (Help Net Security)
Microsoft Releases December 2022 Security Updates (CISA)
Apple security updates (Apple Support)
We finally know why Apple pushed out that emergency 16.1.2 update (Macworld) 
Why You Should Enable Apple’s New Security Feature in iOS 16.2 Right Now (Wirecutter)
Apple Releases Security Updates for Multiple Products (CISA)
Citrix ADC and Citrix Gateway Security Bulletin for CVE-2022-27518 (Citrix)
State-sponsored attackers actively exploiting RCE in Citrix devices, patch ASAP! (CVE-2022-27518) (Help Net Security) 
Citrix Releases Security Updates for Citrix ADC, Citrix Gateway (CISA)
VMware Patches VM Escape Flaw Exploited at Geekpwn Event (SecurityWeek) 
Experts detailed a previously undetected VMware ESXi backdoor (Security Affairs)
VMware Releases Security Updates for Multiple products (CISA)
Mozilla Releases Security Updates for Thunderbird and Firefox (CISA)
Adobe Patches 38 Flaws in Enterprise Software Products (SecurityWeek)
CISA Releases Three Industrial Control Systems Advisories (CISA)
Five Russian Nationals, Including Suspected FSB Officer, and Two U.S. Nationals Charged with Helping the Russian Military and Intelligence Agencies Evade Sanctions (US Department of Justice)
Russian Military and Intelligence Agencies Procurement Network Indicted in Brooklyn Federal Court (US Department of Justice)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FBI’s InfraGard user data shows up for sale. An update on Iranian cyber operations. NSA warns of Chinese cyber threats. Challenges in sharing data for threat detection and prevention. Legitimately signed drivers are used in targeted attacks. Patch Tuesday addressed a lot of actively exploited issues. Tim Starks from the Washington Post Cybersecurity 202 shares his reporting on ICS vulnerabilities. Our guest is Mike Fey from Island with an introduction to the enterprise browser space. And the US indicts five Russian nationals on sanctions-evasion charges.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/238</p><p><br></p><h2>Selected reading.</h2><p><a href="https://krebsonsecurity.com/2022/12/fbis-vetted-info-sharing-network-infragard-hacked/">FBI’s Vetted Info Sharing Network ‘InfraGard’ Hacked</a> (KrebsOnSecurity)</p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/ta453-refuses-be-bound-expectations">Would’ve, Could’ve, Should’ve…Did: TA453 Refuses to be Bound by Expectations</a> (Proofpoint) </p><p><a href="https://media.defense.gov/2022/Dec/13/2003131586/-1/-1/0/CSA-APT5-CITRIXADC-V1.PDF">APT5: Citrix ADC Threat Hunting Guidance</a> (NSA)</p><p><a href="https://www.reuters.com/technology/nsa-warns-that-hackers-are-going-after-us-networking-gear-2022-12-13/">U.S. agency warns that hackers are going after Citrix networking gear</a> (Reuters)</p><p><a href="https://www.securityweek.com/nsa-outs-chinese-hackers-exploiting-citrix-zero-day">NSA Outs Chinese Hackers Exploiting Citrix Zero-Day</a> (SecurityWeek) </p><p><a href="https://thecyberwire.com/stories/f09a8eeaa1fa49dbb8c5118d76f824c5/effect-of-data-on-federal-agencies-policies">Effect of data on Federal agencies' policies.</a> (CyberWire)</p><p><a href="https://www.mandiant.com/resources/blog/hunting-attestation-signed-malware">I Solemnly Swear My Driver Is Up to No Good: Hunting for Attestation Signed Malware</a> (Mandiant)</p><p><a href="https://www.sentinelone.com/labs/driving-through-defenses-targeted-attacks-leverage-signed-malicious-microsoft-drivers/">Driving Through Defenses | Targeted Attacks Leverage Signed Malicious Microsoft Drivers</a> (SentinelOne)</p><p><a href="https://onapsis.com/blog/sap-security-patch-day-december-2022">SAP Security Patch Day December 2022</a> (Onapsis)</p><p><a href="https://msrc.microsoft.com/update-guide/releaseNote/2022-Dec">December 2022 Security Updates</a> (Microsoft Security Response Center)</p><p><a href="https://www.syxsense.com/december-patch-tuesday-updates-2022">December Patch Tuesday Updates | 2022 - Syxsense Inc</a> (Syxsense Inc)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-december-2022-patch-tuesday-fixes-2-zero-days-49-flaws/">Microsoft December 2022 Patch Tuesday fixes 2 zero-days, 49 flaws</a> (BleepingComputer)</p><p><a href="https://www.darkreading.com/application-security/microsoft-squashes-zero-day-actively-exploited-bugs-dec-update">Microsoft Squashes Zero-Day, Actively Exploited Bugs in Dec. Update</a> (Dark Reading) </p><p><a href="https://www.helpnetsecurity.com/2022/12/13/cve-2022-44698/">Microsoft fixes exploited zero-day, revokes certificate used to sign malicious drivers (CVE-2022-44698)</a> (Help Net Security)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/12/13/microsoft-releases-december-2022-security-updates">Microsoft Releases December 2022 Security Updates</a> (CISA)</p><p><a href="https://support.apple.com/en-us/HT201222?mod=djemCybersecruityPro&amp;tpl=cy">Apple security updates</a> (Apple Support)</p><p><a href="https://www.macworld.com/article/1435224/16-1-2-update-zero-day-vulnerability-webkit.html">We finally know why Apple pushed out that emergency 16.1.2 update</a> (Macworld) </p><p><a href="https://www.nytimes.com/wirecutter/reviews/how-to-set-up-apples-new-icloud-encryption-security-feature/">Why You Should Enable Apple’s New Security Feature in iOS 16.2 Right Now</a> (Wirecutter)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/12/13/apple-releases-security-updates-multiple-products">Apple Releases Security Updates for Multiple Products</a> (CISA)</p><p><a href="https://support.citrix.com/article/CTX474995/citrix-adc-and-citrix-gateway-security-bulletin-for-cve202227518">Citrix ADC and Citrix Gateway Security Bulletin for CVE-2022-27518</a> (Citrix)</p><p><a href="https://www.helpnetsecurity.com/2022/12/13/cve-2022-27518-exploited/">State-sponsored attackers actively exploiting RCE in Citrix devices, patch ASAP! (CVE-2022-27518)</a> (Help Net Security) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/12/13/citrix-releases-security-updates-citrix-adc-citrix-gateway">Citrix Releases Security Updates for Citrix ADC, Citrix Gateway</a> (CISA)</p><p><a href="https://www.securityweek.com/vmware-patches-vm-escape-flaw-exploited-geekpwn-event">VMware Patches VM Escape Flaw Exploited at Geekpwn Event</a> (SecurityWeek) </p><p><a href="https://securityaffairs.co/wordpress/139586/hacking/vmware-esxi-backdoor.html">Experts detailed a previously undetected VMware ESXi backdoor</a> (Security Affairs)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/12/13/vmware-releases-security-updates-multiple-products">VMware Releases Security Updates for Multiple products</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/12/13/mozilla-releases-security-updates-thunderbird-and-firefox">Mozilla Releases Security Updates for Thunderbird and Firefox</a> (CISA)</p><p><a href="https://www.securityweek.com/adobe-patches-38-flaws-enterprise-software-products">Adobe Patches 38 Flaws in Enterprise Software Products</a> (SecurityWeek)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/12/13/cisa-releases-three-industrial-control-systems-advisories">CISA Releases Three Industrial Control Systems Advisories</a> (CISA)</p><p><a href="https://www.justice.gov/usao-edny/pr/five-russian-nationals-including-suspected-fsb-officer-and-two-us-nationals-charged">Five Russian Nationals, Including Suspected FSB Officer, and Two U.S. Nationals Charged with Helping the Russian Military and Intelligence Agencies Evade Sanctions</a> (US Department of Justice)</p><p><a href="https://www.justice.gov/opa/pr/russian-military-and-intelligence-agencies-procurement-network-indicted-brooklyn-federal">Russian Military and Intelligence Agencies Procurement Network Indicted in Brooklyn Federal Court</a> (US Department of Justice)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1717</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[43198fce-787a-11ec-abf0-7f5aea9bf724]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8840631730.mp3?updated=1690319231" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Uber’s breach. Phishing in Ukraine’s in-boxes. What’s Russia been up to anyway? (Not the same thing, probably, NATO would be up to.) And the ransomware leader board. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1722/notes</link>
      <description>Uber sustains a third-party breach. A phishing campaign hits Ukrainian in-boxes. The enduring riddle of why Russian offensive cyber operations have failed in Ukraine. Joe Carrigan on credit card skimming. Carole Theriault describes a UK food store chain that uses facial recognition technology to track those with criminal or antisocial behavior. And 2023’s ransomware-as-a-service leader board.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/237

Selected reading.
Uber suffers new data breach after attack on vendor, info leaked online (BleepingComputer)
Uber has been hacked yet again with code and employee data released online (SiliconANGLE)
Uber hit by new data breach — what you need to know (Tom's Guide)
Uber’s data breach. (CyberWire)
Ukrainian railway, state agencies allegedly targeted by DolphinCape malware (The Record by Recorded Future)
Cyber Operations in Ukraine: Russia’s Unmet Expectations (Carnegie Endowment for International Peace) 
The most prolific ransomware groups of 2022 (Searchlight Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Dec 2022 21:15:00 -0000</pubDate>
      <itunes:title>Uber’s breach. Phishing in Ukraine’s in-boxes. What’s Russia been up to anyway? (Not the same thing, probably, NATO would be up to.) And the ransomware leader board. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1722</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Uber sustains a third-party breach. A phishing campaign hits Ukrainian in-boxes. The enduring riddle of why Russian offensive cyber operations have failed in Ukraine. Joe Carrigan on credit card skimming. Carole Theriault describes a UK food store chain that uses facial recognition technology to track those with criminal or antisocial behavior. And 2023’s ransomware-as-a-service leader board.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/237

Selected reading.
Uber suffers new data breach after attack on vendor, info leaked online (BleepingComputer)
Uber has been hacked yet again with code and employee data released online (SiliconANGLE)
Uber hit by new data breach — what you need to know (Tom's Guide)
Uber’s data breach. (CyberWire)
Ukrainian railway, state agencies allegedly targeted by DolphinCape malware (The Record by Recorded Future)
Cyber Operations in Ukraine: Russia’s Unmet Expectations (Carnegie Endowment for International Peace) 
The most prolific ransomware groups of 2022 (Searchlight Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Uber sustains a third-party breach. A phishing campaign hits Ukrainian in-boxes. The enduring riddle of why Russian offensive cyber operations have failed in Ukraine. Joe Carrigan on credit card skimming. Carole Theriault describes a UK food store chain that uses facial recognition technology to track those with criminal or antisocial behavior. And 2023’s ransomware-as-a-service leader board.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/237</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/security/uber-suffers-new-data-breach-after-attack-on-vendor-info-leaked-online/">Uber suffers new data breach after attack on vendor, info leaked online</a> (BleepingComputer)</p><p><a href="https://siliconangle.com/2022/12/12/uber-hacked-yet-code-employee-data-released-online/">Uber has been hacked yet again with code and employee data released online</a> (SiliconANGLE)</p><p><a href="https://www.tomsguide.com/news/uber-hit-by-new-data-breach-what-you-need-to-know">Uber hit by new data breach — what you need to know</a> (Tom's Guide)</p><p><a href="https://thecyberwire.com/stories/fe430d0074414ea3b516a05e60ec1fe5/ubers-data-breach">Uber’s data breach.</a> (CyberWire)</p><p><a href="https://therecord.media/ukrainian-railway-state-agencies-allegedly-targeted-by-dolphincape-malware/">Ukrainian railway, state agencies allegedly targeted by DolphinCape malware</a> (The Record by Recorded Future)</p><p><a href="https://carnegieendowment.org/2022/12/12/cyber-operations-in-ukraine-russia-s-unmet-expectations-pub-88607">Cyber Operations in Ukraine: Russia’s Unmet Expectations</a> (Carnegie Endowment for International Peace) </p><p><a href="https://resources.slcyber.io/ransomware-threat-report">The most prolific ransomware groups of 2022</a> (Searchlight Security)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1504</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[42b9dbce-787a-11ec-abf0-47d23b0db821]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5469189131.mp3?updated=1690319218" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware updates: TrueBot, Cl0p, and Royal. Iranian cyberattacks. An update on the cyberattack against the Met. Notes on the hybrid war, with a focus on allies and outside actors.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1721/notes</link>
      <description>TrueBot found in Cl0p ransomware attacks. Royal ransomware targets the healthcare sector. Recent Iranian cyber activity. A night at the opera: an update on the cyberattack against the Metropolitan Opera. New Cloud Atlas activity reported. Europe looks to the cybersecurity of its power grid. Rob Boyce from Accenture describes Dark web actors diversifying their toolsets. Rick Howard explains fractional CISOs. And international support for Ukrainian cyber defense continues, more extensively and increasingly overt.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/236

Selected reading.
Breaking the silence - Recent Truebot activity (Cisco Talos Blog)
New TrueBot Malware Variant Leveraging Netwrix Auditor Bug and Raspberry Robin Worm (The Hacker News) 
TrueBot infections were observed in Clop ransomware attacks (Security Affairs) 
Clop ransomware uses TrueBot malware for access to networks (BleepingComputer) 
Royal Ransomware (US Department of Health and Human Services)
US Dept of Health warns of ‘increased’ Royal ransomware attacks on hospitals (The Record by Recorded Future) 
Iran-Backed MuddyWater's Latest Campaign Abuses Syncro Admin Tool (Dark Reading)
MuddyWater Hackers Target Asian and Middle East Countries with Updated Tactics (The Hacker News)
New MuddyWater Campaign Uses Legitimate Remote Administration Tools to Deploy Malware (Cyber Security News)
Shows will go on at Met Opera despite cyber-attack that crashed network (ABC7 New York)
Cyberattack disrupts Metropolitan Opera (SC Media)
Cloud Atlas targets entities in Russia and Belarus amid the ongoing war in Ukraine (Check Point Research)
APT Cloud Atlas: Unbroken Threat (Positive Technologies)
European Electricity Sector Lacks Cyber Experts as Ukraine War Raises Hacking Risks (Wall Street Journal)
How the US has helped counter destructive Russian cyberattacks amid Ukraine war (The Hill) 
The Australian company training Ukrainian veterans in cybersecurity (Australian Financial Review)
How Proton intends to thwart Russian cybercensorship with its VPN (HiTech Wiki) 
Cyber Lessons Learned from the War in Ukraine (YouTube) 
War in Ukraine Dominated Cybersecurity in 2022 (CNET)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 12 Dec 2022 21:15:00 -0000</pubDate>
      <itunes:title>Ransomware updates: TrueBot, Cl0p, and Royal. Iranian cyberattacks. An update on the cyberattack against the Met. Notes on the hybrid war, with a focus on allies and outside actors.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1721</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>TrueBot found in Cl0p ransomware attacks. Royal ransomware targets the healthcare sector. Recent Iranian cyber activity. A night at the opera: an update on the cyberattack against the Metropolitan Opera. New Cloud Atlas activity reported. Europe looks to the cybersecurity of its power grid. Rob Boyce from Accenture describes Dark web actors diversifying their toolsets. Rick Howard explains fractional CISOs. And international support for Ukrainian cyber defense continues, more extensively and increasingly overt.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/236

Selected reading.
Breaking the silence - Recent Truebot activity (Cisco Talos Blog)
New TrueBot Malware Variant Leveraging Netwrix Auditor Bug and Raspberry Robin Worm (The Hacker News) 
TrueBot infections were observed in Clop ransomware attacks (Security Affairs) 
Clop ransomware uses TrueBot malware for access to networks (BleepingComputer) 
Royal Ransomware (US Department of Health and Human Services)
US Dept of Health warns of ‘increased’ Royal ransomware attacks on hospitals (The Record by Recorded Future) 
Iran-Backed MuddyWater's Latest Campaign Abuses Syncro Admin Tool (Dark Reading)
MuddyWater Hackers Target Asian and Middle East Countries with Updated Tactics (The Hacker News)
New MuddyWater Campaign Uses Legitimate Remote Administration Tools to Deploy Malware (Cyber Security News)
Shows will go on at Met Opera despite cyber-attack that crashed network (ABC7 New York)
Cyberattack disrupts Metropolitan Opera (SC Media)
Cloud Atlas targets entities in Russia and Belarus amid the ongoing war in Ukraine (Check Point Research)
APT Cloud Atlas: Unbroken Threat (Positive Technologies)
European Electricity Sector Lacks Cyber Experts as Ukraine War Raises Hacking Risks (Wall Street Journal)
How the US has helped counter destructive Russian cyberattacks amid Ukraine war (The Hill) 
The Australian company training Ukrainian veterans in cybersecurity (Australian Financial Review)
How Proton intends to thwart Russian cybercensorship with its VPN (HiTech Wiki) 
Cyber Lessons Learned from the War in Ukraine (YouTube) 
War in Ukraine Dominated Cybersecurity in 2022 (CNET)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>TrueBot found in Cl0p ransomware attacks. Royal ransomware targets the healthcare sector. Recent Iranian cyber activity. A night at the opera: an update on the cyberattack against the Metropolitan Opera. New Cloud Atlas activity reported. Europe looks to the cybersecurity of its power grid. Rob Boyce from Accenture describes Dark web actors diversifying their toolsets. Rick Howard explains fractional CISOs. And international support for Ukrainian cyber defense continues, more extensively and increasingly overt.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/236</p><p><br></p><h2>Selected reading.</h2><p><a href="https://blog.talosintelligence.com/breaking-the-silence-recent-truebot-activity/">Breaking the silence - Recent Truebot activity</a> (Cisco Talos Blog)</p><p><a href="https://thehackernews.com/2022/12/new-truebot-malware-variant-leveraging.html">New TrueBot Malware Variant Leveraging Netwrix Auditor Bug and Raspberry Robin Worm</a> (The Hacker News) </p><p><a href="https://securityaffairs.co/wordpress/139527/malware/truebot-infections-clop-ransomware-attacks.html">TrueBot infections were observed in Clop ransomware attacks</a> (Security Affairs) </p><p><a href="https://www.bleepingcomputer.com/news/security/clop-ransomware-uses-truebot-malware-for-access-to-networks/">Clop ransomware uses TrueBot malware for access to networks</a> (BleepingComputer) </p><p><a href="https://www.hhs.gov/sites/default/files/royal-ransomware-analyst-note.pdf">Royal Ransomware</a> (US Department of Health and Human Services)</p><p><a href="https://therecord.media/us-dept-of-health-warns-of-increased-royal-ransomware-attacks-on-hospitals/">US Dept of Health warns of ‘increased’ Royal ransomware attacks on hospitals</a> (The Record by Recorded Future) </p><p><a href="https://www.darkreading.com/attacks-breaches/iran-backed-muddywater-campaign-uses-syncros-admin-tool">Iran-Backed MuddyWater's Latest Campaign Abuses Syncro Admin Tool</a> (Dark Reading)</p><p><a href="https://thehackernews.com/2022/12/muddywater-hackers-target-asian-and.html">MuddyWater Hackers Target Asian and Middle East Countries with Updated Tactics</a> (The Hacker News)</p><p><a href="https://cybersecuritynews.com/muddywater-campaign-legit-remote-admin/">New MuddyWater Campaign Uses Legitimate Remote Administration Tools to Deploy Malware</a> (Cyber Security News)</p><p><a href="https://abc7ny.com/nyc-met-opera-cyber-attack-metropolitan/12551326/">Shows will go on at Met Opera despite cyber-attack that crashed network</a> (ABC7 New York)</p><p><a href="https://www.scmagazine.com/brief/breach/cyberattack-disrupts-metropolitan-opera">Cyberattack disrupts Metropolitan Opera</a> (SC Media)</p><p><a href="https://research.checkpoint.com/2022/cloud-atlas-targets-entities-in-russia-and-belarus-amid-the-ongoing-war-in-ukraine/">Cloud Atlas targets entities in Russia and Belarus amid the ongoing war in Ukraine</a> (Check Point Research)</p><p><a href="https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/apt-cloud-atlas-unbroken-threat/">APT Cloud Atlas: Unbroken Threat</a> (Positive Technologies)</p><p><a href="https://www.wsj.com/articles/european-electricity-sector-lacks-cyber-experts-as-ukraine-war-raises-hacking-risks-11670605079">European Electricity Sector Lacks Cyber Experts as Ukraine War Raises Hacking Risks</a> (Wall Street Journal)</p><p><a href="https://thehill.com/policy/cybersecurity/3769534-how-the-us-has-helped-counter-destructive-russian-cyberattacks-amid-ukraine-war/">How the US has helped counter destructive Russian cyberattacks amid Ukraine war</a> (The Hill) </p><p><a href="https://www.afr.com/technology/the-australian-company-training-ukrainian-veterans-in-cybersecurity-20221206-p5c42j">The Australian company training Ukrainian veterans in cybersecurity</a> (Australian Financial Review)</p><p><a href="https://hitechwiki.com/how-proton-intends-to-thwart-russian-cybercensorship-with-its-vpn/">How Proton intends to thwart Russian cybercensorship with its VPN</a> (HiTech Wiki) </p><p><a href="https://www.youtube.com/watch?v=ZMIkA85a5PY">Cyber Lessons Learned from the War in Ukraine</a> (YouTube) </p><p><a href="https://www.cnet.com/tech/services-and-software/war-in-ukraine-dominated-cybersecurity-in-2022/">War in Ukraine Dominated Cybersecurity in 2022</a> (CNET)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1606</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[421af838-787a-11ec-abf0-a709152a6036]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8721932910.mp3?updated=1690319205" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jameeka Aaron: Sometimes you just have to follow two paths. [CISO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/129/notes</link>
      <description>Jameeka Aaron, Chief Information Security Officer at Auth0, a product unit of Okta, sits down to share her story following two different paths that led her to where she is today. Jameeka has 20 years of IT and cybersecurity experience and has mitigated security risks at Nike, the U.S. Navy, and now Auth0. She joined the Navy not knowing what she wanted to do after high school and ended up becoming a Radioman, which is now titled IT. She shares her experiences of challenges she faced being the youngest, and the only woman, and the only woman of color in her group. She followed two different paths, getting an education as well as being in the Navy, and started her career at Lockheed Martin Mission Systems in San Diego. She eventually found her way to Auth0 in 2018. She says "I realized cybersecurity folks can do anything, everywhere. We're everywhere, we're in every industry and so I started to kind of say, I wanna work on programs that are fun for me." We thank Jameeka for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 11 Dec 2022 08:00:00 -0000</pubDate>
      <itunes:title>Jameeka Aaron: Sometimes you just have to follow two paths. [CISO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>129</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Jameeka Aaron, Chief Information Security Officer at Auth0, a product unit of Okta, sits down to share her story following two different paths that led her to where she is today. Jameeka has 20 years of IT and cybersecurity experience and has mitigated security risks at Nike, the U.S. Navy, and now Auth0. She joined the Navy not knowing what she wanted to do after high school and ended up becoming a Radioman, which is now titled IT. She shares her experiences of challenges she faced being the youngest, and the only woman, and the only woman of color in her group. She followed two different paths, getting an education as well as being in the Navy, and started her career at Lockheed Martin Mission Systems in San Diego. She eventually found her way to Auth0 in 2018. She says "I realized cybersecurity folks can do anything, everywhere. We're everywhere, we're in every industry and so I started to kind of say, I wanna work on programs that are fun for me." We thank Jameeka for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jameeka Aaron, Chief Information Security Officer at Auth0, a product unit of Okta, sits down to share her story following two different paths that led her to where she is today. Jameeka has 20 years of IT and cybersecurity experience and has mitigated security risks at Nike, the U.S. Navy, and now Auth0. She joined the Navy not knowing what she wanted to do after high school and ended up becoming a Radioman, which is now titled IT. She shares her experiences of challenges she faced being the youngest, and the only woman, and the only woman of color in her group. She followed two different paths, getting an education as well as being in the Navy, and started her career at Lockheed Martin Mission Systems in San Diego. She eventually found her way to Auth0 in 2018. She says "I realized cybersecurity folks can do anything, everywhere. We're everywhere, we're in every industry and so I started to kind of say, I wanna work on programs that are fun for me." We thank Jameeka for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>582</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[52a9d370-773b-11ed-a30b-03318e54b661]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3576263262.mp3?updated=1670604953" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Commercial threat intelligence proves invaluable for the public sector. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/42/notes</link>
      <description>Historically, the U.S. government has relied almost solely on its own intelligence analysis to inform strategic decisions. This has been especially true surrounding geopolitical events and nation-level cybersecurity situations.
However, the explosion of assets being connected to the internet, along with the fact that most critical infrastructure is owned by private sector organizations, means that commercially developed cyber threat intelligence is being generated at a faster pace than ever before.
In the Russia/Ukraine conflict, we saw how commercially generated satellite intelligence played a critical role in alerting the public and ensuring our allies were ready for an invasion. At LookingGlass, we believe commercial threat intelligence can provide similar anticipatory insight – and that it can be shared more easily and quickly than intelligence generated solely by the U.S. government.
Ultimately, the public and private sectors need to work together to protect the interests of the American people. Currently, both private industry and academia are targeted by foreign adversaries, just as are government agencies. This means that commercial entities also have access to adversary tactics, techniques, and procedures (TTPs) and indicators of compromise, and they have that access from a different perspective, which is valuable intelligence for the government.
On this episode of CyberWire-X, host Rick Howard, the CyberWire’s CISO, Chief Analyst and Senior Fellow, speaks with Hash Table member Wayne Moore, CISO at Simply Business, and host Dave Bittner speaks with Bryan Ware, CEO at episode sponsor LookingGlass Cyber Solutions. They’ll discuss why the U.S. government needs commercial cyber threat intelligence now more than ever before and how both the public and private sectors will benefit from closer, trusted cyber partnerships. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 11 Dec 2022 08:00:00 -0000</pubDate>
      <itunes:title> Commercial threat intelligence proves invaluable for the public sector. [CyberWire-X]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>42</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Historically, the U.S. government has relied almost solely on its own intelligence analysis to inform strategic decisions. This has been especially true surrounding geopolitical events and nation-level cybersecurity situations.
However, the explosion of assets being connected to the internet, along with the fact that most critical infrastructure is owned by private sector organizations, means that commercially developed cyber threat intelligence is being generated at a faster pace than ever before.
In the Russia/Ukraine conflict, we saw how commercially generated satellite intelligence played a critical role in alerting the public and ensuring our allies were ready for an invasion. At LookingGlass, we believe commercial threat intelligence can provide similar anticipatory insight – and that it can be shared more easily and quickly than intelligence generated solely by the U.S. government.
Ultimately, the public and private sectors need to work together to protect the interests of the American people. Currently, both private industry and academia are targeted by foreign adversaries, just as are government agencies. This means that commercial entities also have access to adversary tactics, techniques, and procedures (TTPs) and indicators of compromise, and they have that access from a different perspective, which is valuable intelligence for the government.
On this episode of CyberWire-X, host Rick Howard, the CyberWire’s CISO, Chief Analyst and Senior Fellow, speaks with Hash Table member Wayne Moore, CISO at Simply Business, and host Dave Bittner speaks with Bryan Ware, CEO at episode sponsor LookingGlass Cyber Solutions. They’ll discuss why the U.S. government needs commercial cyber threat intelligence now more than ever before and how both the public and private sectors will benefit from closer, trusted cyber partnerships. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Historically, the U.S. government has relied almost solely on its own intelligence analysis to inform strategic decisions. This has been especially true surrounding geopolitical events and nation-level cybersecurity situations.</p><p>However, the explosion of assets being connected to the internet, along with the fact that most critical infrastructure is owned by private sector organizations, means that commercially developed cyber threat intelligence is being generated at a faster pace than ever before.</p><p>In the Russia/Ukraine conflict, we saw how commercially generated satellite intelligence played a critical role in alerting the public and ensuring our allies were ready for an invasion. At LookingGlass, we believe commercial threat intelligence can provide similar anticipatory insight – and that it can be shared more easily and quickly than intelligence generated solely by the U.S. government.</p><p>Ultimately, the public and private sectors need to work together to protect the interests of the American people. Currently, both private industry and academia are targeted by foreign adversaries, just as are government agencies. This means that commercial entities also have access to adversary tactics, techniques, and procedures (TTPs) and indicators of compromise, and they have that access from a different perspective, which is valuable intelligence for the government.</p><p>On this episode of CyberWire-X, host Rick Howard, the CyberWire’s CISO, Chief Analyst and Senior Fellow, speaks with Hash Table member Wayne Moore, CISO at Simply Business, and host Dave Bittner speaks with Bryan Ware, CEO at episode sponsor LookingGlass Cyber Solutions. They’ll discuss why the U.S. government needs commercial cyber threat intelligence now more than ever before and how both the public and private sectors will benefit from closer, trusted cyber partnerships. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1898</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c283e41a-765f-11ed-ad1c-4b471b4968fd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6735952766.mp3?updated=1670367194" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybersecurity during the World Cup. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/261/notes</link>
      <description>AJ Nash from ZeroFox sits down with Dave to discuss Cybersecurity threats including social engineering attacks planned surrounding the Qatar 2022 World Cup. The research shares some of the key threats we might see while the World Cup is happening this year.
Researchers say "During the World Cup, there will likely be threat actors aiming to acquire personal information or monetary value through phishing and scams." In the research we can find how the venue host is preparing for these claims of attacks.
The research can be found here:
Qatar 2022 World Cup Event Assessment

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Dec 2022 08:00:00 -0000</pubDate>
      <itunes:title>Cybersecurity during the World Cup. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>261</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>AJ Nash from ZeroFox sits down with Dave to discuss Cybersecurity threats including social engineering attacks planned surrounding the Qatar 2022 World Cup. The research shares some of the key threats we might see while the World Cup is happening this year.
Researchers say "During the World Cup, there will likely be threat actors aiming to acquire personal information or monetary value through phishing and scams." In the research we can find how the venue host is preparing for these claims of attacks.
The research can be found here:
Qatar 2022 World Cup Event Assessment

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>AJ Nash from ZeroFox sits down with Dave to discuss Cybersecurity threats including social engineering attacks planned surrounding the Qatar 2022 World Cup. The research shares some of the key threats we might see while the World Cup is happening this year.</p><p>Researchers say "During the World Cup, there will likely be threat actors aiming to acquire personal information or monetary value through phishing and scams." In the research we can find how the venue host is preparing for these claims of attacks.</p><p>The research can be found here:</p><ul><li><a href="https://get.zerofox.com/rs/143-DHV-007/images/ZeroFox-Threat-Intelligence-Qatar-2022-World-Cup-Event-Assessment-Report.pdf">Qatar 2022 World Cup Event Assessment</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1521</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a9c3dbde-7668-11ed-ad1c-5f5b9c8686e4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5403366648.mp3?updated=1685127269" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cobalt Mirage deploys Drokbk malware. Zombinder in the C2C market. Impersonation scams. CISA releases three new ICS advisories. And criminals prey on other criminals.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1720/notes</link>
      <description>Cobalt Mirage deploys Drokbk malware. Zombinder in the C2C market. Impersonation scams: that's not Ukraine’s Ministry of Digital Transformation. On the cyber front, nothing new. CISA releases three new ICS advisories. Caleb Barlow on attack surface management. Mike Hamilton from Critical Insight explains how state and local governments apply for the $1 billion allocated by the feds for cybersecurity funding. And criminals prey on other criminals.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/235

Selected reading.
Drokbk Malware Uses GitHub as Dead Drop Resolver (Secureworks)
Zombinder: new obfuscation service used by Ermac, now distributed next to desktop stealers (ThreatFabric)
Crypto Winter: Fraudsters Impersonate Ukraine’s Government to Steal NFTs and Cryptocurrency (DomainTools)
Danish defence ministry says its websites hit by cyberattack (Reuters)
Kela website hit by DoS attack (Yle)
Advantech iView (CISA) 
AVEVA InTouch Access Anywhere (CISA)
Rockwell Automation Logix controllers (CISA) 
The scammers who scam scammers on cybercrime forums: Part 1 (Sophos News) 
Cyber-criminals Scammed Each Other Out of Millions in 2022 (Infosecurity Magazine)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 09 Dec 2022 21:15:00 -0000</pubDate>
      <itunes:title>Cobalt Mirage deploys Drokbk malware. Zombinder in the C2C market. Impersonation scams. CISA releases three new ICS advisories. And criminals prey on other criminals.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1720</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cobalt Mirage deploys Drokbk malware. Zombinder in the C2C market. Impersonation scams: that's not Ukraine’s Ministry of Digital Transformation. On the cyber front, nothing new. CISA releases three new ICS advisories. Caleb Barlow on attack surface management. Mike Hamilton from Critical Insight explains how state and local governments apply for the $1 billion allocated by the feds for cybersecurity funding. And criminals prey on other criminals.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/235

Selected reading.
Drokbk Malware Uses GitHub as Dead Drop Resolver (Secureworks)
Zombinder: new obfuscation service used by Ermac, now distributed next to desktop stealers (ThreatFabric)
Crypto Winter: Fraudsters Impersonate Ukraine’s Government to Steal NFTs and Cryptocurrency (DomainTools)
Danish defence ministry says its websites hit by cyberattack (Reuters)
Kela website hit by DoS attack (Yle)
Advantech iView (CISA) 
AVEVA InTouch Access Anywhere (CISA)
Rockwell Automation Logix controllers (CISA) 
The scammers who scam scammers on cybercrime forums: Part 1 (Sophos News) 
Cyber-criminals Scammed Each Other Out of Millions in 2022 (Infosecurity Magazine)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cobalt Mirage deploys Drokbk malware. Zombinder in the C2C market. Impersonation scams: that's not Ukraine’s Ministry of Digital Transformation. On the cyber front, nothing new. CISA releases three new ICS advisories. Caleb Barlow on attack surface management. Mike Hamilton from Critical Insight explains how state and local governments apply for the $1 billion allocated by the feds for cybersecurity funding. And criminals prey on other criminals.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/235</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.secureworks.com/blog/drokbk-malware-uses-github-as-dead-drop-resolver">Drokbk Malware Uses GitHub as Dead Drop Resolver</a> (Secureworks)</p><p><a href="https://www.threatfabric.com/blogs/zombinder-ermac-and-desktop-stealers.html">Zombinder: new obfuscation service used by Ermac, now distributed next to desktop stealers</a> (ThreatFabric)</p><p><a href="https://www.domaintools.com/resources/blog/fraudsters-impersonate-ukraines-government-stealing-nfts-crypto/">Crypto Winter: Fraudsters Impersonate Ukraine’s Government to Steal NFTs and Cryptocurrency</a> (DomainTools)</p><p><a href="https://www.reuters.com/world/europe/danish-defence-ministry-says-its-websites-hit-by-cyberattack-2022-12-08/">Danish defence ministry says its websites hit by cyberattack</a> (Reuters)</p><p><a href="https://yle.fi/a/74-20008040">Kela website hit by DoS attack</a> (Yle)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-342-01">Advantech iView</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-342-02">AVEVA InTouch Access Anywhere</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-342-03">Rockwell Automation Logix controllers</a> (CISA) </p><p><a href="https://news.sophos.com/en-us/2022/12/07/the-scammers-who-scam-scammers-on-cybercrime-forums-part-1/">The scammers who scam scammers on cybercrime forums: Part 1</a> (Sophos News) </p><p><a href="https://www.infosecurity-magazine.com/news/cybercriminals-scammed-each-other/">Cyber-criminals Scammed Each Other Out of Millions in 2022</a> (Infosecurity Magazine)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1805</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[443dbbbe-787a-11ec-abf0-ff7c9301af60]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2279066288.mp3?updated=1690319193" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The IT Army of Ukraine claims VTB DDoS. DPRK exploits Internet Explorer vulnerability. New variant of Babuk ransomware reported. Blind spots in air-gapped networks. And, dog and cat hacking.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1719/notes</link>
      <description>The IT Army of Ukraine claims responsibility for DDoS against a Russian bank. North Korea exploits an Internet Explorer vulnerability. A new variant of Babuk ransomware has been reported. Blind spots in air-gapped networks. Rob Boyce from Accenture has insights on the most recent ransomware trends. Our guest is Nathan Howe from Zscaler with the latest on Zero Trust. And the hacking of cats and dogs.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/234

Selected reading.
IT Army of Ukraine Hit Russian Banking Giant with Crippling DDoS Attack (HackRead) 
Internet Explorer 0-day exploited by North Korean actor APT37 (Google)
Morphisec Discovers Brand New Babuk Ransomware Variant in Major Attack (PRWeb)
Bypassing air-gapped networks via DNS (Pentera) 
What to Know About an Unlikely Vector for Cyber Threats: Household Pets (Insurance Journal)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 08 Dec 2022 21:15:00 -0000</pubDate>
      <itunes:title>The IT Army of Ukraine claims VTB DDoS. DPRK exploits Internet Explorer vulnerability. New variant of Babuk ransomware reported. Blind spots in air-gapped networks. And, dog and cat hacking.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1719</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The IT Army of Ukraine claims responsibility for DDoS against a Russian bank. North Korea exploits an Internet Explorer vulnerability. A new variant of Babuk ransomware has been reported. Blind spots in air-gapped networks. Rob Boyce from Accenture has insights on the most recent ransomware trends. Our guest is Nathan Howe from Zscaler with the latest on Zero Trust. And the hacking of cats and dogs.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/234

Selected reading.
IT Army of Ukraine Hit Russian Banking Giant with Crippling DDoS Attack (HackRead) 
Internet Explorer 0-day exploited by North Korean actor APT37 (Google)
Morphisec Discovers Brand New Babuk Ransomware Variant in Major Attack (PRWeb)
Bypassing air-gapped networks via DNS (Pentera) 
What to Know About an Unlikely Vector for Cyber Threats: Household Pets (Insurance Journal)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The IT Army of Ukraine claims responsibility for DDoS against a Russian bank. North Korea exploits an Internet Explorer vulnerability. A new variant of Babuk ransomware has been reported. Blind spots in air-gapped networks. Rob Boyce from Accenture has insights on the most recent ransomware trends. Our guest is Nathan Howe from Zscaler with the latest on Zero Trust. And the hacking of cats and dogs.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/234</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.hackread.com/it-army-of-ukraine-russia-bank-ddos-attack/">IT Army of Ukraine Hit Russian Banking Giant with Crippling DDoS Attack</a> (HackRead) </p><p><a href="https://blog.google/threat-analysis-group/internet-explorer-0-day-exploited-by-north-korean-actor-apt37/">Internet Explorer 0-day exploited by North Korean actor APT37</a> (Google)</p><p><a href="https://www.prweb.com/releases/2022/12/prweb19059710.htm">Morphisec Discovers Brand New Babuk Ransomware Variant in Major Attack</a> (PRWeb)</p><p><a href="https://pentera.io/blog/bypassing-air-gapped-networks-via-dns/">Bypassing air-gapped networks via DNS</a> (Pentera) </p><p><a href="https://www.insurancejournal.com/news/2022/12/07/697968.htm">What to Know About an Unlikely Vector for Cyber Threats: Household Pets</a> (Insurance Journal)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1637</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[43de737a-787a-11ec-abf0-ff78ccfe95af]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3479251663.mp3?updated=1690319177" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware, third-party risk, cyberespionage, social engineering, and a software supply-chain threat.. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1718/notes</link>
      <description>Rackspace reacts to ransomware. Third-party incidents in New Zealand and the Netherlands. Russian intelligence goes phishing. Mustang Panda uses Russia's war as phishbait. A Malicious package is found in PyPi. Kevin Magee from Microsoft Canada shares thoughts on cybersecurity startups in an economic downturn. Our guest is IDology's Christina Luttrell to discuss how consumers feel about digital identity, fraud, security and data privacy. And a French-speaking investment scam.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/233

Selected reading.
Rackspace Technology Hosted Exchange Environment Update (Rackspace Technology) 
Multiple government departments in New Zealand affected by ransomware attack on IT provider (The Record by Recorded Future) 
Antwerp's city services down after hackers attack digital partner (BleepingComputer) 
Russian hacking group spoofed Microsoft login page of US military supplier: report (The Record by Recorded Future)
Mustang Panda Uses the Russian-Ukrainian War to Attack Europe and Asia Pacific Targets (BlackBerry) 
Inside the Face-Off Between Russia and a Small Internet Access Firm (New York Times) 
Apiiro’s AI engine detected a software supply chain attack in PyPI (Apiiro | Cloud-Native Application Security) 
Anatomizing CryptosLabs: a scam syndicate targeting French-speaking Europe for years (Group-IB)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 07 Dec 2022 21:30:00 -0000</pubDate>
      <itunes:title>Ransomware, third-party risk, cyberespionage, social engineering, and a software supply-chain threat.. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1718</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Rackspace reacts to ransomware. Third-party incidents in New Zealand and the Netherlands. Russian intelligence goes phishing. Mustang Panda uses Russia's war as phishbait. A Malicious package is found in PyPi. Kevin Magee from Microsoft Canada shares thoughts on cybersecurity startups in an economic downturn. Our guest is IDology's Christina Luttrell to discuss how consumers feel about digital identity, fraud, security and data privacy. And a French-speaking investment scam.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/233

Selected reading.
Rackspace Technology Hosted Exchange Environment Update (Rackspace Technology) 
Multiple government departments in New Zealand affected by ransomware attack on IT provider (The Record by Recorded Future) 
Antwerp's city services down after hackers attack digital partner (BleepingComputer) 
Russian hacking group spoofed Microsoft login page of US military supplier: report (The Record by Recorded Future)
Mustang Panda Uses the Russian-Ukrainian War to Attack Europe and Asia Pacific Targets (BlackBerry) 
Inside the Face-Off Between Russia and a Small Internet Access Firm (New York Times) 
Apiiro’s AI engine detected a software supply chain attack in PyPI (Apiiro | Cloud-Native Application Security) 
Anatomizing CryptosLabs: a scam syndicate targeting French-speaking Europe for years (Group-IB)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rackspace reacts to ransomware. Third-party incidents in New Zealand and the Netherlands. Russian intelligence goes phishing. Mustang Panda uses Russia's war as phishbait. A Malicious package is found in PyPi. Kevin Magee from Microsoft Canada shares thoughts on cybersecurity startups in an economic downturn. Our guest is IDology's Christina Luttrell to discuss how consumers feel about digital identity, fraud, security and data privacy. And a French-speaking investment scam.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/233</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.rackspace.com/newsroom/rackspace-technology-hosted-exchange-environment-update">Rackspace Technology Hosted Exchange Environment Update</a> (Rackspace Technology) </p><p><a href="https://therecord.media/multiple-government-departments-in-new-zealand-affected-by-ransomware-attack-on-it-provider/">Multiple government departments in New Zealand affected by ransomware attack on IT provider</a> (The Record by Recorded Future) </p><p><a href="https://www.bleepingcomputer.com/news/security/antwerps-city-services-down-after-hackers-attack-digital-partner/">Antwerp's city services down after hackers attack digital partner</a> (BleepingComputer) </p><p><a href="https://therecord.media/russian-hacking-group-spoofed-microsoft-login-page-of-us-military-supplier-report/">Russian hacking group spoofed Microsoft login page of US military supplier: report</a> (The Record by Recorded Future)</p><p><a href="https://blogs.blackberry.com/en/2022/12/mustang-panda-uses-the-russian-ukrainian-war-to-attack-europe-and-asia-pacific-targets">Mustang Panda Uses the Russian-Ukrainian War to Attack Europe and Asia Pacific Targets</a> (BlackBerry) </p><p><a href="https://www.nytimes.com/2022/12/06/technology/russia-internet-proton-vpn.html">Inside the Face-Off Between Russia and a Small Internet Access Firm</a> (New York Times) </p><p><a href="https://apiiro.com/blog/apiiros-ai-engine-detected-a-software-supply-chain-attack-in-pypi/">Apiiro’s AI engine detected a software supply chain attack in PyPI</a> (Apiiro | Cloud-Native Application Security) </p><p><a href="https://www.group-ib.com/media-center/press-releases/cryptoslabs-invest-scam/">Anatomizing CryptosLabs: a scam syndicate targeting French-speaking Europe for years</a> (Group-IB)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1627</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[42f9718a-787a-11ec-abf0-e795840c17a5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2142109429.mp3?updated=1690319164" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA22-335A – #StopRansomware: Cuba Ransomware [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/38/notes</link>
      <description>The FBI and CISA are releasing this alert to disseminate known Cuba Ransomware Group indicators of compromise and TTPs identified through FBI investigations.
FBI and CISA would like to thank BlackBerry, ESET, The National Cyber-Forensics and Training Alliance (NCFTA), and Palo Alto Networks for their contributions to this CSA.
AA22-335A Alert, Technical Details, and Mitigations
For a downloadable copy of IOCs, see AA22-335A.stix
Stopransomware.gov is a whole-of-government approach that gives one central location for ransomware resources and alerts.
Resource to mitigate a ransomware attack: CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide.
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 07 Dec 2022 21:08:00 -0000</pubDate>
      <itunes:title>CISA Alert AA22-335A – #StopRansomware: Cuba Ransomware [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>38</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The FBI and CISA are releasing this alert to disseminate known Cuba Ransomware Group indicators of compromise and TTPs identified through FBI investigations.
FBI and CISA would like to thank BlackBerry, ESET, The National Cyber-Forensics and Training Alliance (NCFTA), and Palo Alto Networks for their contributions to this CSA.
AA22-335A Alert, Technical Details, and Mitigations
For a downloadable copy of IOCs, see AA22-335A.stix
Stopransomware.gov is a whole-of-government approach that gives one central location for ransomware resources and alerts.
Resource to mitigate a ransomware attack: CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide.
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FBI and CISA are releasing this alert to disseminate known Cuba Ransomware Group indicators of compromise and TTPs identified through FBI investigations.</p><p>FBI and CISA would like to thank BlackBerry, ESET, The National Cyber-Forensics and Training Alliance (NCFTA), and Palo Alto Networks for their contributions to this CSA.</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-335a">AA22-335A Alert, Technical Details, and Mitigations</a></p><p>For a downloadable copy of IOCs, see <a href="https://www.cisa.gov/uscert/sites/default/files/publications/AA22-335A%20StopRansomware%20Cuba%20Ransomware.stix.xml">AA22-335A.stix</a></p><p><a href="http://www.stopransomware.gov/">Stopransomware.gov</a> is a whole-of-government approach that gives one central location for ransomware resources and alerts.</p><p>Resource to mitigate a ransomware attack: <a href="https://www.cisa.gov/sites/default/files/publications/CISA_MS-ISAC_Ransomware%20Guide_S508C.pdf">CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide</a>.</p><p>No-cost cyber hygiene services: <a href="https://www.cisa.gov/cyber-hygiene-services">Cyber Hygiene Services</a> and <a href="https://github.com/cisagov/cset/">Ransomware Readiness Assessment</a>.</p><p>U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email <a href="mailto:dib_defense@cyber.nsa.gov">dib_defense@cyber.nsa.gov</a> </p><p>To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="mailto:report@cisa.gov">report@cisa.gov</a>, or call (888) 282-0870, or report incidents to your local FBI field office.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>160</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b9f91446-7673-11ed-8c5f-2fc1f988c36d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2822541349.mp3?updated=1670447607" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage, privateering, hacktivism and influence operations, in Ukraine, Russia, the Middle East, and elsewhere. Criminals need quality control, too. A new entry in CISA’s KEV Catalog. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1717/notes</link>
      <description>A Chinese cyberespionage campaign is believed to be active in the Middle East. Poor quality control turns ransomware into a wiper, and a typo crashes a cryptojacker. A large DDoS attack is reported to have hit a Russian state-owned bank. Privateers compromise Western infrastructure to stage cyberattacks. Cyber operations against national morale. A look at the Vice Society. Ben Yelin on the growing concerns over TicTok. Ann Johnson from Afternoon Cyber Tea speaks with Charles Blauner about the evolution of the CISO role. And CISA has added an entry to its Known Exploited Vulnerabilities Catalog.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/232

Selected reading.
BackdoorDiplomacy Wields New Tools in Fresh Middle East Campaign (Bitdefender Labs) 
The Story of a Ransomware Turning into an Accidental Wiper | FortiGuard Labs (Fortinet Blog) 
Syntax errors are the doom of us all, including botnet authors (Ars Technica) 
Russia's No. 2 bank VTB suffers largest DDoS in history (Computing) 
Russia compromises major UK and US organisations to attack Ukraine (Lupovis) 
Russia’s online attacks target Ukrainians’ feelings (POLITICO) 
Vice Society: Profiling a Persistent Threat to the Education Sector (Unit 42)
CISA Adds One Known Exploited Vulnerability to Catalog (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Dec 2022 21:15:00 -0000</pubDate>
      <itunes:title>Cyberespionage, privateering, hacktivism and influence operations, in Ukraine, Russia, the Middle East, and elsewhere. Criminals need quality control, too. A new entry in CISA’s KEV Catalog. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1717</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A Chinese cyberespionage campaign is believed to be active in the Middle East. Poor quality control turns ransomware into a wiper, and a typo crashes a cryptojacker. A large DDoS attack is reported to have hit a Russian state-owned bank. Privateers compromise Western infrastructure to stage cyberattacks. Cyber operations against national morale. A look at the Vice Society. Ben Yelin on the growing concerns over TicTok. Ann Johnson from Afternoon Cyber Tea speaks with Charles Blauner about the evolution of the CISO role. And CISA has added an entry to its Known Exploited Vulnerabilities Catalog.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/232

Selected reading.
BackdoorDiplomacy Wields New Tools in Fresh Middle East Campaign (Bitdefender Labs) 
The Story of a Ransomware Turning into an Accidental Wiper | FortiGuard Labs (Fortinet Blog) 
Syntax errors are the doom of us all, including botnet authors (Ars Technica) 
Russia's No. 2 bank VTB suffers largest DDoS in history (Computing) 
Russia compromises major UK and US organisations to attack Ukraine (Lupovis) 
Russia’s online attacks target Ukrainians’ feelings (POLITICO) 
Vice Society: Profiling a Persistent Threat to the Education Sector (Unit 42)
CISA Adds One Known Exploited Vulnerability to Catalog (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Chinese cyberespionage campaign is believed to be active in the Middle East. Poor quality control turns ransomware into a wiper, and a typo crashes a cryptojacker. A large DDoS attack is reported to have hit a Russian state-owned bank. Privateers compromise Western infrastructure to stage cyberattacks. Cyber operations against national morale. A look at the Vice Society. Ben Yelin on the growing concerns over TicTok. Ann Johnson from Afternoon Cyber Tea speaks with Charles Blauner about the evolution of the CISO role. And CISA has added an entry to its Known Exploited Vulnerabilities Catalog.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/232</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bitdefender.com/blog/labs/backdoor-diplomacy-wields-new-tools-in-fresh-middle-east-campaign">BackdoorDiplomacy Wields New Tools in Fresh Middle East Campaign</a> (Bitdefender Labs) </p><p><a href="https://www.fortinet.com/blog/threat-research/The-story-of-a-ransomware-turning-into-an-accidental-wiper">The Story of a Ransomware Turning into an Accidental Wiper | FortiGuard Labs </a>(Fortinet Blog) </p><p><a href="https://arstechnica.com/information-technology/2022/12/advanced-botnet-taken-down-by-an-all-too-human-flaw-syntax-error/">Syntax errors are the doom of us all, including botnet authors</a> (Ars Technica) </p><p><a href="https://www.computing.co.uk/news/4061255/russias-bank-vtb-suffers-largest-ddos-history">Russia's No. 2 bank VTB suffers largest DDoS in history </a>(Computing) </p><p><a href="https://www.lupovis.io/russia-compromises-major-uk-and-us-organisations-to-attack-ukraine/">Russia compromises major UK and US organisations to attack Ukraine</a> (Lupovis) </p><p><a href="https://www.politico.eu/article/ukraine-russia-war-cyber-attack-threat-feeling/">Russia’s online attacks target Ukrainians’ feelings</a> (POLITICO) </p><p><a href="https://unit42.paloaltonetworks.com/vice-society-targets-education-sector/">Vice Society: Profiling a Persistent Threat to the Education Sector</a> (Unit 42)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/12/05/cisa-adds-one-known-exploited-vulnerability-catalog">CISA Adds One Known Exploited Vulnerability to Catalog</a> (CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1710</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[42d9aa3a-787a-11ec-abf0-87462d6fd252]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7672178902.mp3?updated=1690319151" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Swapping cyberattacks in a hybrid war. Privateers or just a side-hustle? US CSRB will investigate Lapsu$ Group. Notes on the cyber underworld. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1716/notes</link>
      <description>Wiper malware hits Russian targets. Microsoft sees an intensification of Russian cyber operations against Ukraine. State policy, privateering, or an APT side-hustle? The US Cyber Safety Review Board will investigate the Lapsu$ Group. Rackspace works to remediate a security incident. The Schoolyard Bully Trojan harvests credentials. Grayson Milbourne of OpenText Security Solutions on attacks on common open source dev libraries. Rick Howard looks at CISO career paths. And trends in ransomware: cybercrime succeeds when the gang runs like a business.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/231

Selected reading.
CryWiper: fake ransomware (Kaspersky).
CryWiper data wiper targets Russian courts and mayors' offices (Computing)
Never-before-seen malware is nuking data in Russia’s courts and mayors’ offices (Ars Technica)
Russian regions attacked by new wiper posing as ransomware (Cybernews)
Preparing for a Russian cyber offensive against Ukraine this winter (Microsoft On the Issues)
Russia coordinating Ukraine hacks with missiles, could increasingly target European allies, Microsoft warns (POLITICO)
Russia Is Boosting Its Cyber Attacks on Ukraine, Allies, Microsoft Says (Bloomberg.com) 
Hackers linked to Chinese government stole millions in Covid benefits (NBC News)
Cyber Safety Review Board to Conduct Second Review on Lapsus$ (US Department of Homeland Security)
Rackspace: Ongoing Exchange outage caused by security incident (BleepingComputer) 
Schoolyard Bully Trojan Facebook Credential Stealer (Zimperium)
The Professionalization of Ransomware: How Gangs Are Becoming Like Businesses (LookingGlass Cyber Solutions Inc.)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 05 Dec 2022 21:15:00 -0000</pubDate>
      <itunes:title>Swapping cyberattacks in a hybrid war. Privateers or just a side-hustle? US CSRB will investigate Lapsu$ Group. Notes on the cyber underworld. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1716</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Wiper malware hits Russian targets. Microsoft sees an intensification of Russian cyber operations against Ukraine. State policy, privateering, or an APT side-hustle? The US Cyber Safety Review Board will investigate the Lapsu$ Group. Rackspace works to remediate a security incident. The Schoolyard Bully Trojan harvests credentials. Grayson Milbourne of OpenText Security Solutions on attacks on common open source dev libraries. Rick Howard looks at CISO career paths. And trends in ransomware: cybercrime succeeds when the gang runs like a business.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/231

Selected reading.
CryWiper: fake ransomware (Kaspersky).
CryWiper data wiper targets Russian courts and mayors' offices (Computing)
Never-before-seen malware is nuking data in Russia’s courts and mayors’ offices (Ars Technica)
Russian regions attacked by new wiper posing as ransomware (Cybernews)
Preparing for a Russian cyber offensive against Ukraine this winter (Microsoft On the Issues)
Russia coordinating Ukraine hacks with missiles, could increasingly target European allies, Microsoft warns (POLITICO)
Russia Is Boosting Its Cyber Attacks on Ukraine, Allies, Microsoft Says (Bloomberg.com) 
Hackers linked to Chinese government stole millions in Covid benefits (NBC News)
Cyber Safety Review Board to Conduct Second Review on Lapsus$ (US Department of Homeland Security)
Rackspace: Ongoing Exchange outage caused by security incident (BleepingComputer) 
Schoolyard Bully Trojan Facebook Credential Stealer (Zimperium)
The Professionalization of Ransomware: How Gangs Are Becoming Like Businesses (LookingGlass Cyber Solutions Inc.)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Wiper malware hits Russian targets. Microsoft sees an intensification of Russian cyber operations against Ukraine. State policy, privateering, or an APT side-hustle? The US Cyber Safety Review Board will investigate the Lapsu$ Group. Rackspace works to remediate a security incident. The Schoolyard Bully Trojan harvests credentials. Grayson Milbourne of OpenText Security Solutions on attacks on common open source dev libraries. Rick Howard looks at CISO career paths. And trends in ransomware: cybercrime succeeds when the gang runs like a business.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/231</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.kaspersky.com/blog/crywiper-pseudo-ransomware/46480/">CryWiper: fake ransomware</a> (Kaspersky).</p><p><a href="https://www.computing.co.uk/news/4061144/crywiper-wiper-targets-russian-courts-mayors-offices">CryWiper data wiper targets Russian courts and mayors' offices </a>(Computing)</p><p><a href="https://arstechnica.com/information-technology/2022/12/never-before-seen-malware-is-nuking-data-in-russias-courts-and-mayors-offices/">Never-before-seen malware is nuking data in Russia’s courts and mayors’ offices</a> (Ars Technica)</p><p><a href="https://cybernews.com/news/russia-regions-attacked-wiper-posing-ransomware/">Russian regions attacked by new wiper posing as ransomware</a> (Cybernews)</p><p><a href="https://blogs.microsoft.com/on-the-issues/2022/12/03/preparing-russian-cyber-offensive-ukraine/">Preparing for a Russian cyber offensive against Ukraine this winter</a> (Microsoft On the Issues)</p><p><a href="https://www.politico.com/news/2022/12/03/microsoft-warning-russian-ukraine-cyberattack-00071908">Russia coordinating Ukraine hacks with missiles, could increasingly target European allies, Microsoft warns</a> (POLITICO)</p><p><a href="https://www.bloomberg.com/news/articles/2022-12-03/russian-cyber-attacks-against-ukraine-likely-microsoft-says">Russia Is Boosting Its Cyber Attacks on Ukraine, Allies, Microsoft Says</a> (Bloomberg.com) </p><p><a href="https://www.nbcnews.com/tech/security/chinese-hackers-covid-fraud-millions-rcna59636">Hackers linked to Chinese government stole millions in Covid benefits</a> (NBC News)</p><p><a href="https://www.dhs.gov/news/2022/12/02/cyber-safety-review-board-conduct-second-review-lapsus">Cyber Safety Review Board to Conduct Second Review on Lapsus$</a> (US Department of Homeland Security)</p><p><a href="https://www.bleepingcomputer.com/news/technology/rackspace-ongoing-exchange-outage-caused-by-security-incident/">Rackspace: Ongoing Exchange outage caused by security incident</a> (BleepingComputer) </p><p><a href="https://www.zimperium.com/blog/schoolyard-bully-trojan-facebook-credential-stealer/">Schoolyard Bully Trojan Facebook Credential Stealer</a> (Zimperium)</p><p><a href="https://lookingglasscyber.com/resources/the-professionalization-of-ransomware/">The Professionalization of Ransomware: How Gangs Are Becoming Like Businesses</a> (LookingGlass Cyber Solutions Inc.)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1468</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[41fb254e-787a-11ec-abf0-9358b8069fd1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7868889716.mp3?updated=1690319303" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rohit Dhamankar: Never close doors prematurely. [Vice President] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/128/notes</link>
      <description>Rohit Dhamankar from Fortra’s Alert Logic sits down with Dave Bittner to share his experiences as he navigates the industry. Rohit has over 15 years of security industry experience across product strategy, threat research, product management and development, and customer solutions. Before Alert Logic he served in Product roles for Live Oak Venture Capital at Infocyte and Razberi Technologies. He has previously worked in senior roles in several start-up companies in security analytics, intrusion detection/prevention, end-point protection, and security risk and compliance, including VP, Click Labs Solutions at Click Security, acquired by AlertLogic, and he was a Co-Founder of Jumpshot, acquired by Avast. Rohit shares the advise of never closing a door too prematurely, because you never know what could be behind the door waiting for you. We thank Rohit for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 04 Dec 2022 08:00:00 -0000</pubDate>
      <itunes:title>Rohit Dhamankar: Never close doors prematurely. [Vice President] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>128</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Rohit Dhamankar from Fortra’s Alert Logic sits down with Dave Bittner to share his experiences as he navigates the industry. Rohit has over 15 years of security industry experience across product strategy, threat research, product management and development, and customer solutions. Before Alert Logic he served in Product roles for Live Oak Venture Capital at Infocyte and Razberi Technologies. He has previously worked in senior roles in several start-up companies in security analytics, intrusion detection/prevention, end-point protection, and security risk and compliance, including VP, Click Labs Solutions at Click Security, acquired by AlertLogic, and he was a Co-Founder of Jumpshot, acquired by Avast. Rohit shares the advise of never closing a door too prematurely, because you never know what could be behind the door waiting for you. We thank Rohit for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rohit Dhamankar from Fortra’s Alert Logic sits down with Dave Bittner to share his experiences as he navigates the industry. Rohit has over 15 years of security industry experience across product strategy, threat research, product management and development, and customer solutions. Before Alert Logic he served in Product roles for Live Oak Venture Capital at Infocyte and Razberi Technologies. He has previously worked in senior roles in several start-up companies in security analytics, intrusion detection/prevention, end-point protection, and security risk and compliance, including VP, Click Labs Solutions at Click Security, acquired by AlertLogic, and he was a Co-Founder of Jumpshot, acquired by Avast. Rohit shares the advise of never closing a door too prematurely, because you never know what could be behind the door waiting for you. We thank Rohit for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>502</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[77fd7f68-7106-11ed-b436-abde46e1c437]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7872975066.mp3?updated=1670277192" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Old malware returns in a new way. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/260/notes</link>
      <description>Jeremy Kennelly and Sulian Lebegue from Mandiant sit down with Dave to discuss their research "From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind? One of the oldest and most successful banking fraud malwares, URSNIF, which caused an estimated “tens of millions of dollars in losses”, has been discovered by researchers to have been re-tooled into a generic backdoor, dubbed “LDR4”.
This new varient was first observed in June 2022. Mandiant researchers believe that the same threat actors who operated the RM3 variant of URSNIF are likely behind LDR4. They say "given the success and sophistication RM3 previously had, LDR4 could be a significantly dangerous variant—capable of distributing ransomware—that should be watched closely."
The research can be found here:
From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Dec 2022 08:00:00 -0000</pubDate>
      <itunes:title>Old malware returns in a new way. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>260</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Jeremy Kennelly and Sulian Lebegue from Mandiant sit down with Dave to discuss their research "From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind? One of the oldest and most successful banking fraud malwares, URSNIF, which caused an estimated “tens of millions of dollars in losses”, has been discovered by researchers to have been re-tooled into a generic backdoor, dubbed “LDR4”.
This new varient was first observed in June 2022. Mandiant researchers believe that the same threat actors who operated the RM3 variant of URSNIF are likely behind LDR4. They say "given the success and sophistication RM3 previously had, LDR4 could be a significantly dangerous variant—capable of distributing ransomware—that should be watched closely."
The research can be found here:
From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jeremy Kennelly and Sulian Lebegue from Mandiant sit down with Dave to discuss their research "From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind? One of the oldest and most successful banking fraud malwares, URSNIF, which caused an estimated “tens of millions of dollars in losses”, has been discovered by researchers to have been re-tooled into a generic backdoor, dubbed “LDR4”.</p><p>This new varient was first observed in June 2022. Mandiant researchers believe that the same threat actors who operated the RM3 variant of URSNIF are likely behind LDR4. They say "given the success and sophistication RM3 previously had, LDR4 could be a significantly dangerous variant—capable of distributing ransomware—that should be watched closely."</p><p>The research can be found here:</p><ul><li><a href="https://www.mandiant.com/resources/blog/rm3-ldr4-ursnif-banking-fraud">From RM3 to LDR4: URSNIF Leaves Banking Fraud Behind</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1459</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5d612c9a-70fc-11ed-b3ba-2f01d8582daa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3067617735.mp3?updated=1685127259" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cuba ransomware pulls in $60 million. CISA releases three ICS advisories. Google announces new support for Ukraine. DDoSing the Vatican. Google supports Ukrainian startups in wartime.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1715/notes</link>
      <description>Cuba ransomware pulls in $60 million. CISA releases three ICS advisories. DDoSing the Vatican. Andrea Little Limbago from Interos on the implications of Albania cutting off diplomatic ties with Iran. Our space correspondent Maria Varmazis speaks with Brandon Bailey about Space Attack Research and Tactic Analysis matrix. And how Google supports Ukrainian startups in wartime.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/230

Selected reading.
Alert (AA22-335A) #StopRansomware: Cuba Ransomware (CISA)
Novel News on Cuba Ransomware: Greetings From Tropical Scorpius (Palo Alto Networks Unit 42)
New ways we're supporting Ukraine (Google)
25 new startup recipients of the Ukraine Support Fund (Google)
Vatican shuts down its website amid hacking attempts (Cybernews)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 02 Dec 2022 21:15:00 -0000</pubDate>
      <itunes:title>Cuba ransomware pulls in $60 million. CISA releases three ICS advisories. Google announces new support for Ukraine. DDoSing the Vatican. Google supports Ukrainian startups in wartime.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1715</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cuba ransomware pulls in $60 million. CISA releases three ICS advisories. DDoSing the Vatican. Andrea Little Limbago from Interos on the implications of Albania cutting off diplomatic ties with Iran. Our space correspondent Maria Varmazis speaks with Brandon Bailey about Space Attack Research and Tactic Analysis matrix. And how Google supports Ukrainian startups in wartime.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/230

Selected reading.
Alert (AA22-335A) #StopRansomware: Cuba Ransomware (CISA)
Novel News on Cuba Ransomware: Greetings From Tropical Scorpius (Palo Alto Networks Unit 42)
New ways we're supporting Ukraine (Google)
25 new startup recipients of the Ukraine Support Fund (Google)
Vatican shuts down its website amid hacking attempts (Cybernews)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cuba ransomware pulls in $60 million. CISA releases three ICS advisories. DDoSing the Vatican. Andrea Little Limbago from Interos on the implications of Albania cutting off diplomatic ties with Iran. Our space correspondent Maria Varmazis speaks with Brandon Bailey about Space Attack Research and Tactic Analysis matrix. And how Google supports Ukrainian startups in wartime.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/230</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-335a">Alert (AA22-335A) #StopRansomware: Cuba Ransomware</a> (CISA)</p><p><a href="https://unit42.paloaltonetworks.com/cuba-ransomware-tropical-scorpius/">Novel News on Cuba Ransomware: Greetings From Tropical Scorpius</a> (Palo Alto Networks Unit 42)</p><p><a href="https://blog.google/outreach-initiatives/public-policy/new-ways-were-supporting-ukraine/">New ways we're supporting Ukraine</a> (Google)</p><p><a href="https://blog.google/around-the-globe/google-europe/25-new-startup-recipients-of-the-ukraine-support-fund/">25 new startup recipients of the Ukraine Support Fund</a> (Google)</p><p><a href="https://cybernews.com/news/vatican-shuts-down-its-website-amid-hacking-attempts/">Vatican shuts down its website amid hacking attempts</a> (Cybernews)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1539</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[441e11ba-787a-11ec-abf0-2783d5c4e94b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6533980896.mp3?updated=1690319123" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage, cybercrime, and patriotic hacktivism. The Heliconia framework described. Cyber risk for the telecom and healthcare sectors. Notes on the hybrid war. Predictions for 2023.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1714/notes</link>
      <description>A new backdoor, courtesy of the DPRK. The Medibank breach is all over but the shouting (or, all over but the suing and the arresting). Risks and opportunities in telecom’s shift to cloud. Cyber risk in healthcare. An assessment of Russian cyber warfare. Robert M. Lee from Dragos assesses the growing value of the ICS security market. Our guest is Cecilia Seiden of TransUnion to discuss their 2022 Consumer Holiday Shopping Report. And it’s December, which means…predictions.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/229

Selected reading.
Who’s swimming in South Korean waters? Meet ScarCruft’s Dolphin (ESET)
Medibank hackers announce ‘case closed’ and dump huge data file on dark web (the Guardian) 
New details on commercial spyware vendor Variston (Google)
Risks and opportunities in telecom’s shift to cloud. (CyberWire)
Moody’s discusses cyber risk in healthcare. (CyberWire)
'Do something:' Ukraine works to heal soldiers' mental scars (AP NEWS)
Reformed Russian Cybercriminal Warns That Hatred Spreads Hacktivism (Wall Street Journal)
Cybersecurity predictions for 2023. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 01 Dec 2022 21:15:00 -0000</pubDate>
      <itunes:title>Cyberespionage, cybercrime, and patriotic hacktivism. The Heliconia framework described. Cyber risk for the telecom and healthcare sectors. Notes on the hybrid war. Predictions for 2023.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1714</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A new backdoor, courtesy of the DPRK. The Medibank breach is all over but the shouting (or, all over but the suing and the arresting). Risks and opportunities in telecom’s shift to cloud. Cyber risk in healthcare. An assessment of Russian cyber warfare. Robert M. Lee from Dragos assesses the growing value of the ICS security market. Our guest is Cecilia Seiden of TransUnion to discuss their 2022 Consumer Holiday Shopping Report. And it’s December, which means…predictions.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/229

Selected reading.
Who’s swimming in South Korean waters? Meet ScarCruft’s Dolphin (ESET)
Medibank hackers announce ‘case closed’ and dump huge data file on dark web (the Guardian) 
New details on commercial spyware vendor Variston (Google)
Risks and opportunities in telecom’s shift to cloud. (CyberWire)
Moody’s discusses cyber risk in healthcare. (CyberWire)
'Do something:' Ukraine works to heal soldiers' mental scars (AP NEWS)
Reformed Russian Cybercriminal Warns That Hatred Spreads Hacktivism (Wall Street Journal)
Cybersecurity predictions for 2023. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A new backdoor, courtesy of the DPRK. The Medibank breach is all over but the shouting (or, all over but the suing and the arresting). Risks and opportunities in telecom’s shift to cloud. Cyber risk in healthcare. An assessment of Russian cyber warfare. Robert M. Lee from Dragos assesses the growing value of the ICS security market. Our guest is Cecilia Seiden of TransUnion to discuss their 2022 Consumer Holiday Shopping Report. And it’s December, which means…predictions.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/229</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.welivesecurity.com/2022/11/30/whos-swimming-south-korean-waters-meet-scarcrufts-dolphin/">Who’s swimming in South Korean waters? Meet ScarCruft’s Dolphin</a> (ESET)</p><p><a href="https://www.theguardian.com/australia-news/2022/dec/01/medibank-hackers-announce-case-closed-and-dump-huge-data-file-on-dark-web">Medibank hackers announce ‘case closed’ and dump huge data file on dark web</a> (the Guardian) </p><p><a href="https://blog.google/threat-analysis-group/new-details-on-commercial-spyware-vendor-variston/">New details on commercial spyware vendor Variston</a> (Google)</p><p><a href="https://thecyberwire.com/stories/4ff714f0f5f14ca5aa438c50ec1533ec/risks-and-opportunities-in-telecoms-shift-to-cloud">Risks and opportunities in telecom’s shift to cloud.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/84c09ae6fbe241709368725ccc63a023/moodys-discusses-cyber-risk-in-healthcare">Moody’s discusses cyber risk in healthcare.</a> (CyberWire)</p><p><a href="https://apnews.com/article/russia-ukraine-kyiv-health-europe-veterans-affairs-811a986e0e9a202d8eb32b16f6730e4c">'Do something:' Ukraine works to heal soldiers' mental scars</a> (AP NEWS)</p><p><a href="https://www.wsj.com/articles/reformed-russian-cybercriminal-warns-that-hatred-spreads-hacktivism-11669842840">Reformed Russian Cybercriminal Warns That Hatred Spreads Hacktivism</a> (Wall Street Journal)</p><p><a href="https://thecyberwire.com/stories/9b4819b28766496c8a731382456b48ee/cybersecurity-predictions-for-2023">Cybersecurity predictions for 2023.</a> (CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1782</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[43fe546a-787a-11ec-abf0-1b6fe12b47da]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2449426189.mp3?updated=1690319107" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>LockBit 3.0 and Punisher ransomware described. Leave that USB right in the parking lot where you found it. Killnet’s woofing. Lilac Wolverine’s big new BEC. And World Cup scams. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1713/notes</link>
      <description>Has LockBit 3.0 been reverse engineered? A COVID lure contains a Punisher hook. A Chinese cyberespionage campaign uses compromised USB drives. Lilac Wolverine exploits personal connections for BEC. Killnet claims to have counted coup against the White House. Tim Starks from the Washington Post has the FCC’s Huawei restrictions and ponders what congress might get done before the year end. Our guest is Tom Eston from Bishop Fox with a look Inside the Minds &amp; Methods of Modern Adversaries. And, of course, scams, hacks, and other badness surrounding the World Cup.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/228

Selected reading.
LockBit 3.0 ‘Black’ attacks and leaks reveal wormable capabilities and tooling (Sophos News)
Punisher Ransomware Spreading Through Fake COVID Site (Cyble)
Always Another Secret: Lifting the Haze on China-nexus Espionage in Southeast Asia (Mandiant)
BEC Group Compromises Personal Accounts and Pulls Heartstrings to Launch Mass Gift Card Attacks (Abnormal Security)
Killnet Claims Attacks Against Starlink, Whitehouse.gov, and United Kingdom Websites (Trustwave)
Scammers on the pitch: Group-IB identifies online threats to fans at FIFA World Cup 2022 in Qatar (Group-IB)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 30 Nov 2022 21:15:00 -0000</pubDate>
      <itunes:title>LockBit 3.0 and Punisher ransomware described. Leave that USB right in the parking lot where you found it. Killnet’s woofing. Lilac Wolverine’s big new BEC. And World Cup scams. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1713</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Has LockBit 3.0 been reverse engineered? A COVID lure contains a Punisher hook. A Chinese cyberespionage campaign uses compromised USB drives. Lilac Wolverine exploits personal connections for BEC. Killnet claims to have counted coup against the White House. Tim Starks from the Washington Post has the FCC’s Huawei restrictions and ponders what congress might get done before the year end. Our guest is Tom Eston from Bishop Fox with a look Inside the Minds &amp; Methods of Modern Adversaries. And, of course, scams, hacks, and other badness surrounding the World Cup.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/228

Selected reading.
LockBit 3.0 ‘Black’ attacks and leaks reveal wormable capabilities and tooling (Sophos News)
Punisher Ransomware Spreading Through Fake COVID Site (Cyble)
Always Another Secret: Lifting the Haze on China-nexus Espionage in Southeast Asia (Mandiant)
BEC Group Compromises Personal Accounts and Pulls Heartstrings to Launch Mass Gift Card Attacks (Abnormal Security)
Killnet Claims Attacks Against Starlink, Whitehouse.gov, and United Kingdom Websites (Trustwave)
Scammers on the pitch: Group-IB identifies online threats to fans at FIFA World Cup 2022 in Qatar (Group-IB)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Has LockBit 3.0 been reverse engineered? A COVID lure contains a Punisher hook. A Chinese cyberespionage campaign uses compromised USB drives. Lilac Wolverine exploits personal connections for BEC. Killnet claims to have counted coup against the White House. Tim Starks from the Washington Post has the FCC’s Huawei restrictions and ponders what congress might get done before the year end. Our guest is Tom Eston from Bishop Fox with a look Inside the Minds &amp; Methods of Modern Adversaries. And, of course, scams, hacks, and other badness surrounding the World Cup.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/228</p><p><br></p><h2>Selected reading.</h2><p><a href="https://news.sophos.com/en-us/2022/11/30/lockbit-3-0-black-attacks-and-leaks-reveal-wormable-capabilities-and-tooling/">LockBit 3.0 ‘Black’ attacks and leaks reveal wormable capabilities and tooling</a> (Sophos News)</p><p><a href="https://blog.cyble.com/2022/11/25/punisher-ransomware-spreading-through-fake-covid-site/">Punisher Ransomware Spreading Through Fake COVID Site</a> (Cyble)</p><p><a href="https://www.mandiant.com/resources/blog/china-nexus-espionage-southeast-asia">Always Another Secret: Lifting the Haze on China-nexus Espionage in Southeast Asia</a> (Mandiant)</p><p><a href="https://abnormalsecurity.com/blog/lilac-wolverine-gift-card-attacks">BEC Group Compromises Personal Accounts and Pulls Heartstrings to Launch Mass Gift Card Attacks</a> (Abnormal Security)</p><p><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/killnet-claims-attacks-against-starlink-whitehousegov-and-united-kingdom-websites/">Killnet Claims Attacks Against Starlink, Whitehouse.gov, and United Kingdom Websites</a> (Trustwave)</p><p><a href="https://www.group-ib.com/media-center/press-releases/scammers-on-the-pitch/">Scammers on the pitch: Group-IB identifies online threats to fans at FIFA World Cup 2022 in Qatar</a> (Group-IB)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1516</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[40bcb3a0-787a-11ec-abf0-8352a9b1eeb6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8957663913.mp3?updated=1690319111" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DDoS as a holiday-season threat to e-commerce. TikTok challenge spreads malware. Meta's GDPR fine. US Cyber Command describes support for Ukraine's cyber defense. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1712/notes</link>
      <description>DDoS as a holiday-season threat to e-commerce. A TikTok challenge spreads malware. Meta's GDPR fine. Mr. Security Answer Person John Pescatore has thoughts on phishing resistant MFA. Joe Carrigan describes Intel’s latest efforts to thwart deepfakes. And US Cyber Command describes support for Ukraine's cyber defense.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/227

Selected reading.
Holiday DDoS Cyberattacks Can Hurt E-Commerce, Lack Legal Remedy (Bloomberg Law)
TikTok ‘Invisible Body’ challenge exploited to push malware (BleepingComputer) 
$275M Fine for Meta After Facebook Data Scrape (Dark Reading) 
Before the Invasion: Hunt Forward Operations in Ukraine (U.S. Cyber Command)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Nov 2022 21:15:00 -0000</pubDate>
      <itunes:title>DDoS as a holiday-season threat to e-commerce. TikTok challenge spreads malware. Meta's GDPR fine. US Cyber Command describes support for Ukraine's cyber defense. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1712</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>DDoS as a holiday-season threat to e-commerce. A TikTok challenge spreads malware. Meta's GDPR fine. Mr. Security Answer Person John Pescatore has thoughts on phishing resistant MFA. Joe Carrigan describes Intel’s latest efforts to thwart deepfakes. And US Cyber Command describes support for Ukraine's cyber defense.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/227

Selected reading.
Holiday DDoS Cyberattacks Can Hurt E-Commerce, Lack Legal Remedy (Bloomberg Law)
TikTok ‘Invisible Body’ challenge exploited to push malware (BleepingComputer) 
$275M Fine for Meta After Facebook Data Scrape (Dark Reading) 
Before the Invasion: Hunt Forward Operations in Ukraine (U.S. Cyber Command)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>DDoS as a holiday-season threat to e-commerce. A TikTok challenge spreads malware. Meta's GDPR fine. Mr. Security Answer Person John Pescatore has thoughts on phishing resistant MFA. Joe Carrigan describes Intel’s latest efforts to thwart deepfakes. And US Cyber Command describes support for Ukraine's cyber defense.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/227</p><p><br></p><h2>Selected reading.</h2><p><a href="https://news.bloomberglaw.com/privacy-and-data-security/holiday-ddos-cyberattacks-can-hurt-e-commerce-lack-legal-remedy">Holiday DDoS Cyberattacks Can Hurt E-Commerce, Lack Legal Remedy</a> (Bloomberg Law)</p><p><a href="https://www.bleepingcomputer.com/news/security/tiktok-invisible-body-challenge-exploited-to-push-malware/">TikTok ‘Invisible Body’ challenge exploited to push malware</a> (BleepingComputer) </p><p><a href="https://www.darkreading.com/threat-intelligence/facebook-data-scrape-meta-265m-fine">$275M Fine for Meta After Facebook Data Scrape</a> (Dark Reading) </p><p><a href="https://www.cybercom.mil/Media/News/Article/3229136/before-the-invasion-hunt-forward-operations-in-ukraine/">Before the Invasion: Hunt Forward Operations in Ukraine</a> (U.S. Cyber Command)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[40dc8298-787a-11ec-abf0-1776d75cad3c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3894929794.mp3?updated=1690319079" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Keeping pentesting tools out of criminal hands. Updates from an intensified cyber phase in Russia’s hybrid war. Fars reports sustaining a cyber attack. The most common password remains “password.”</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1711/notes</link>
      <description>Nighthawk’s at the diner (but maybe not on the crooks’ menu). Internet service in Ukraine and Moldova is interrupted by strikes against Ukraine's power grid. Sandworm renews ransomware activity against Ukrainian targets. Russian cyber-reconnaissance seen at a Netherlands LNG terminal. European Parliament votes to declare Russia a terrorist state (and Russia responds with cyberattacks and terroristic threats). Carole Theriault reports on where these kids today are getting their news. Malek Ben Salem from Accenture on digital identity in Web 3.0. And, hey, the new list of most commonly used passwords looks...depressingly familiar.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/226

Selected reading.
Sec firm MDSec slams Proofpoint for post on pen-testing framework (iTWire) 
Nighthawk: With Great Power Comes Great Responsibility - MDSec 
Cyberattack Hits Iran's Fars News Agency (RadioFreeEurope/RadioLiberty)
Iran’s Fars news agency is hit by cyberattacks, blames Israel (Times of Israel) 
Ukraine and Moldova suffer internet disruptions after Russian missile strikes (The Record by Recorded Future)
New ransomware attacks in Ukraine linked to Russian Sandworm hackers (BleepingComputer)
Russian hackers targeting Dutch gas terminal: report (NL Times) 
Russia labelled state sponsor of terrorism as missile strikes leave Ukraine without power (The Telegraph)
Killnet Group Claims Responsibility for European Parliament Cyber Attack (Digit)
European Parliament hit by 'sophisticated' cyberattack (Deutsche Welle)
European Parliament website suffers 'sophisticated' cyber attack after Russia terrorism vote (Computing)
Hackers Temporarily Take Down European Parliament Website (Wall Street Journal)
Guess the most common password. Hint: We just told you (Register)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 28 Nov 2022 21:15:00 -0000</pubDate>
      <itunes:title>Keeping pentesting tools out of criminal hands. Updates from an intensified cyber phase in Russia’s hybrid war. Fars reports sustaining a cyber attack. The most common password remains “password.”</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1711</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Nighthawk’s at the diner (but maybe not on the crooks’ menu). Internet service in Ukraine and Moldova is interrupted by strikes against Ukraine's power grid. Sandworm renews ransomware activity against Ukrainian targets. Russian cyber-reconnaissance seen at a Netherlands LNG terminal. European Parliament votes to declare Russia a terrorist state (and Russia responds with cyberattacks and terroristic threats). Carole Theriault reports on where these kids today are getting their news. Malek Ben Salem from Accenture on digital identity in Web 3.0. And, hey, the new list of most commonly used passwords looks...depressingly familiar.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/226

Selected reading.
Sec firm MDSec slams Proofpoint for post on pen-testing framework (iTWire) 
Nighthawk: With Great Power Comes Great Responsibility - MDSec 
Cyberattack Hits Iran's Fars News Agency (RadioFreeEurope/RadioLiberty)
Iran’s Fars news agency is hit by cyberattacks, blames Israel (Times of Israel) 
Ukraine and Moldova suffer internet disruptions after Russian missile strikes (The Record by Recorded Future)
New ransomware attacks in Ukraine linked to Russian Sandworm hackers (BleepingComputer)
Russian hackers targeting Dutch gas terminal: report (NL Times) 
Russia labelled state sponsor of terrorism as missile strikes leave Ukraine without power (The Telegraph)
Killnet Group Claims Responsibility for European Parliament Cyber Attack (Digit)
European Parliament hit by 'sophisticated' cyberattack (Deutsche Welle)
European Parliament website suffers 'sophisticated' cyber attack after Russia terrorism vote (Computing)
Hackers Temporarily Take Down European Parliament Website (Wall Street Journal)
Guess the most common password. Hint: We just told you (Register)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Nighthawk’s at the diner (but maybe not on the crooks’ menu). Internet service in Ukraine and Moldova is interrupted by strikes against Ukraine's power grid. Sandworm renews ransomware activity against Ukrainian targets. Russian cyber-reconnaissance seen at a Netherlands LNG terminal. European Parliament votes to declare Russia a terrorist state (and Russia responds with cyberattacks and terroristic threats). Carole Theriault reports on where these kids today are getting their news. Malek Ben Salem from Accenture on digital identity in Web 3.0. And, hey, the new list of most commonly used passwords looks...depressingly familiar.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/226</p><p><br></p><h2>Selected reading.</h2><p><a href="https://itwire.com/business-it-news/security/sec-firm-mdsec-slams-proofpoint-for-post-on-pen-testing-framework.html">Sec firm MDSec slams Proofpoint for post on pen-testing framework</a> (iTWire) </p><p><a href="https://www.mdsec.co.uk/2022/11/nighthawk-with-great-power-comes-great-responsibility/">Nighthawk: With Great Power Comes Great Responsibility - MDSec</a> </p><p><a href="https://www.rferl.org/a/iran-fars-news-agency-cyberattack-protests/32149968.html">Cyberattack Hits Iran's Fars News Agency</a> (RadioFreeEurope/RadioLiberty)</p><p><a href="https://www.timesofisrael.com/irans-fars-news-agency-hit-by-cyberattacks-blames-israel/">Iran’s Fars news agency is hit by cyberattacks, blames Israel</a> (Times of Israel) </p><p><a href="https://therecord.media/ukraine-and-moldova-suffer-internet-disruptions-after-russian-missile-strikes/">Ukraine and Moldova suffer internet disruptions after Russian missile strikes</a> (The Record by Recorded Future)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-ransomware-attacks-in-ukraine-linked-to-russian-sandworm-hackers/">New ransomware attacks in Ukraine linked to Russian Sandworm hackers</a> (BleepingComputer)</p><p><a href="https://nltimes.nl/2022/11/25/russian-hackers-targeting-dutch-gas-terminal-report">Russian hackers targeting Dutch gas terminal: report</a> (NL Times) </p><p><a href="https://www.telegraph.co.uk/world-news/2022/11/23/russia-labelled-state-sponsor-terrorism-missile-strikes-leave">Russia labelled state sponsor of terrorism as missile strikes leave Ukraine without power</a> (The Telegraph)</p><p><a href="https://www.digit.fyi/european-parliament-cyber-attack-killnet-group/">Killnet Group Claims Responsibility for European Parliament Cyber Attack</a> (Digit)</p><p><a href="https://www.dw.com/en/european-parliament-hit-by-sophisticated-cyberattack/a-63864029">European Parliament hit by 'sophisticated' cyberattack</a> (Deutsche Welle)</p><p><a href="https://www.computing.co.uk/news/4060707/european-parliament-website-suffers-sophisticated-cyber-attack-russia-terrorism-vote">European Parliament website suffers 'sophisticated' cyber attack after Russia terrorism vote </a>(Computing)</p><p><a href="https://www.wsj.com/articles/hackers-take-down-european-parliament-website-11669230991?mod=djemCybersecruityPro&amp;tpl=cy">Hackers Temporarily Take Down European Parliament Website</a> (Wall Street Journal)</p><p><a href="https://www.theregister.com/2022/11/25/infosec_roundup/">Guess the most common password. Hint: We just told you</a> (Register)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1735</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[41db3b8a-787a-11ec-abf0-6fd85892f0dc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7319879181.mp3?updated=1690319064" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Laura Whitt-Winyard: Securing the world. [CISO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/127/notes</link>
      <description>Laura Whitt-Winyard, CISO from Malwarebytes, sits down to share her story, beginning with a desire to be a pediatric oncologist that she later discovered was not the path for her. Laura was bouncing around from job to job until she bought her first computer, and a light bulb went off in her head. She set out to make it her goal to learn about this new, interesting field and grow within it. Now as a successful CISO, she wants to make the world more secure and goes from company to company to complete her goal. She considers herself a servant leader whose goal is the greater good. She compares her role to football, explaining that she is not the quarterback, but the center for the team. She believes she is the center that paves the path for the quarterbacks on her team to reduce the noise, to give the quarterback all the tools that they need to do their jobs and do their jobs well. We thank Laura for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 27 Nov 2022 06:00:00 -0000</pubDate>
      <itunes:title>Laura Whitt-Winyard: Securing the world. [CISO] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>127</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Laura Whitt-Winyard, CISO from Malwarebytes, sits down to share her story, beginning with a desire to be a pediatric oncologist that she later discovered was not the path for her. Laura was bouncing around from job to job until she bought her first computer, and a light bulb went off in her head. She set out to make it her goal to learn about this new, interesting field and grow within it. Now as a successful CISO, she wants to make the world more secure and goes from company to company to complete her goal. She considers herself a servant leader whose goal is the greater good. She compares her role to football, explaining that she is not the quarterback, but the center for the team. She believes she is the center that paves the path for the quarterbacks on her team to reduce the noise, to give the quarterback all the tools that they need to do their jobs and do their jobs well. We thank Laura for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Laura Whitt-Winyard, CISO from Malwarebytes, sits down to share her story, beginning with a desire to be a pediatric oncologist that she later discovered was not the path for her. Laura was bouncing around from job to job until she bought her first computer, and a light bulb went off in her head. She set out to make it her goal to learn about this new, interesting field and grow within it. Now as a successful CISO, she wants to make the world more secure and goes from company to company to complete her goal. She considers herself a servant leader whose goal is the greater good. She compares her role to football, explaining that she is not the quarterback, but the center for the team. She believes she is the center that paves the path for the quarterbacks on her team to reduce the noise, to give the quarterback all the tools that they need to do their jobs and do their jobs well. We thank Laura for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>435</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[43447a8e-6e8f-11ed-8e5f-7fe0135a008d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5478745726.mp3?updated=1669222701" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: The secrets behind Docker. </title>
      <link>https://thecyberwire.com/podcasts/research-saturday/227/notes</link>
      <description>Alon Zahavi from CyberArk, joins Dave Bittner on this episode to discuss CyberArk's work in conjunction with Patch Tuesday. CyberArk published about how Docker inadvertently created a new vulnerability and what happens when it's exploited.
CyberArk's research concluded that an attacker may execute files with capabilities or setuid files in order to escalate its privileges up to root level. CyberArk found the new vuln in some of Microsoft’s Docker images, caused by misuse of Linux capabilities, a powerful additional layer of security that gives admins the ability to assign capabilities and privileges to processes and files in the Linux system
The research can be found here:
How Docker Made Me More Capable and the Host Less Secure

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Nov 2022 08:00:00 -0000</pubDate>
      <itunes:title>Encore: The secrets behind Docker. </itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>227</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Alon Zahavi from CyberArk, joins Dave Bittner on this episode to discuss CyberArk's work in conjunction with Patch Tuesday. CyberArk published about how Docker inadvertently created a new vulnerability and what happens when it's exploited.
CyberArk's research concluded that an attacker may execute files with capabilities or setuid files in order to escalate its privileges up to root level. CyberArk found the new vuln in some of Microsoft’s Docker images, caused by misuse of Linux capabilities, a powerful additional layer of security that gives admins the ability to assign capabilities and privileges to processes and files in the Linux system
The research can be found here:
How Docker Made Me More Capable and the Host Less Secure

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Alon Zahavi from CyberArk, joins Dave Bittner on this episode to discuss CyberArk's work in conjunction with Patch Tuesday. CyberArk published about how Docker inadvertently created a new vulnerability and what happens when it's exploited.</p><p>CyberArk's research concluded that an attacker may execute files with capabilities or setuid files in order to escalate its privileges up to root level. CyberArk found the new vuln in some of Microsoft’s Docker images, caused by misuse of Linux capabilities, a powerful additional layer of security that gives admins the ability to assign capabilities and privileges to processes and files in the Linux system</p><p>The research can be found here:</p><ul><li><a href="https://www.cyberark.com/resources/threat-research-blog/how-docker-made-me-more-capable-and-the-host-less-secure">How Docker Made Me More Capable and the Host Less Secure</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1239</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0e83b172-6a87-11ed-a5e0-13c935d6dd7f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5138483320.mp3?updated=1685127249" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Interview Select: Perry Carpenter on his new book "The Security Culture Playbook." [CW Pro]</title>
      <link>https://thecyberwire.com/podcasts/interview-selects/113/notes</link>
      <description>This interview is from June 3rd, 2022 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner sits down Perry Carpenter, host of 8th Layer Insights to discuss his new book "The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer."
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 25 Nov 2022 21:00:00 -0000</pubDate>
      <itunes:title>Interview Select: Perry Carpenter on his new book "The Security Culture Playbook." [CW Pro]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>113</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This interview is from June 3rd, 2022 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner sits down Perry Carpenter, host of 8th Layer Insights to discuss his new book "The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer."
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This interview is from June 3rd, 2022 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner sits down Perry Carpenter, host of 8th Layer Insights to discuss his new book "The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer."</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>986</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ac8b2f0c-6a83-11ed-bd10-537fe0c6ae8f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2606084655.mp3?updated=1669135064" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Research Briefing: Emotet's return. LodaRAT improvements. Callback phishing leads to data theft extortion. [CW Pro]</title>
      <description>Emotet's return. LodaRAT improvements. Callback phishing leads to data theft extortion.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 24 Nov 2022 21:00:00 -0000</pubDate>
      <itunes:title>Research Briefing: Emotet's return. LodaRAT improvements. Callback phishing leads to data theft extortion. [CW Pro]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>144</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Emotet's return. LodaRAT improvements. Callback phishing leads to data theft extortion.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Emotet's return. LodaRAT improvements. Callback phishing leads to data theft extortion.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>331</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[43f0deae-6ad0-11ed-9762-f308cee1dd8a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7315760521.mp3?updated=1669168169" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Watch out for abuse of pentesting tools. Cyber attack on Guadeloupe. Ducktail’s evolution. Cybersecurity for ports. ICS security advisories. And stay safe shopping during the holidays.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1710/notes</link>
      <description>Another pentesting tool may soon be abused by threat actors. Cyberattack disrupts Guadeloupe. Ducktail evolves and expands. Warning of the potential disruption cyberattacks might work against European ports. CISA releases eight industrial control system advisories. Patrick Tiquet, VP of Security and Architecture at Keeper Security, talks about the FedRAMP authorization process. Bryan Vorndran of the FBI Cyber Division with reflections on ransomware. And stay safe on Black Friday (and Cyber Monday, and Panic Saturday, and…you get the picture.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/225

Selected reading.
Nighthawk: An Up-and-Coming Pentest Tool Likely to Gain Threat Actor Notice (Proofpoint)
Making Cobalt Strike harder for threat actors to abuse (Google Cloud Blog)
Guadeloupe government fights 'large-scale' cyberattack (AP NEWS)
Vietnam-Based Ducktail Cybercrime Operation Evolving, Expanding (SecurityWeek)
Cyber as important as missile defences - ex-NATO general (Reuters)
CISA Releases Eight Industrial Control Systems Advisories (CISA) 
Black Friday and Cyber Monday risks. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 23 Nov 2022 21:30:00 -0000</pubDate>
      <itunes:title>Watch out for abuse of pentesting tools. Cyber attack on Guadeloupe. Ducktail’s evolution. Cybersecurity for ports. ICS security advisories. And stay safe shopping during the holidays.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1710</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Another pentesting tool may soon be abused by threat actors. Cyberattack disrupts Guadeloupe. Ducktail evolves and expands. Warning of the potential disruption cyberattacks might work against European ports. CISA releases eight industrial control system advisories. Patrick Tiquet, VP of Security and Architecture at Keeper Security, talks about the FedRAMP authorization process. Bryan Vorndran of the FBI Cyber Division with reflections on ransomware. And stay safe on Black Friday (and Cyber Monday, and Panic Saturday, and…you get the picture.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/225

Selected reading.
Nighthawk: An Up-and-Coming Pentest Tool Likely to Gain Threat Actor Notice (Proofpoint)
Making Cobalt Strike harder for threat actors to abuse (Google Cloud Blog)
Guadeloupe government fights 'large-scale' cyberattack (AP NEWS)
Vietnam-Based Ducktail Cybercrime Operation Evolving, Expanding (SecurityWeek)
Cyber as important as missile defences - ex-NATO general (Reuters)
CISA Releases Eight Industrial Control Systems Advisories (CISA) 
Black Friday and Cyber Monday risks. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Another pentesting tool may soon be abused by threat actors. Cyberattack disrupts Guadeloupe. Ducktail evolves and expands. Warning of the potential disruption cyberattacks might work against European ports. CISA releases eight industrial control system advisories. Patrick Tiquet, VP of Security and Architecture at Keeper Security, talks about the FedRAMP authorization process. Bryan Vorndran of the FBI Cyber Division with reflections on ransomware. And stay safe on Black Friday (and Cyber Monday, and Panic Saturday, and…you get the picture.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/225</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.proofpoint.com/us/blog/threat-insight/nighthawk-and-coming-pentest-tool-likely-gain-threat-actor-notice">Nighthawk: An Up-and-Coming Pentest Tool Likely to Gain Threat Actor Notice</a> (Proofpoint)</p><p><a href="https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse">Making Cobalt Strike harder for threat actors to abuse</a> (Google Cloud Blog)</p><p><a href="https://apnews.com/article/caribbean-puerto-rico-guadeloupe-government-and-politics-0e299e596db2ba25971c947a8f831a61">Guadeloupe government fights 'large-scale' cyberattack</a> (AP NEWS)</p><p><a href="https://www.securityweek.com/vietnam-based-ducktail-cybercrime-operation-evolving-expanding">Vietnam-Based Ducktail Cybercrime Operation Evolving, Expanding</a> (SecurityWeek)</p><p><a href="https://www.reuters.com/world/cyber-important-missile-defences-ex-nato-general-2022-11-21/">Cyber as important as missile defences - ex-NATO general</a> (Reuters)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/11/22/cisa-releases-eight-industrial-control-systems-advisories">CISA Releases Eight Industrial Control Systems Advisories</a> (CISA) </p><p><a href="https://thecyberwire.com/stories/56875c15c33c4712bca01078aee3beab/black-friday-and-cyber-monday-risks">Black Friday and Cyber Monday risks</a>. (CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1420</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[409cf92a-787a-11ec-abf0-3fcf7515165f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8674168383.mp3?updated=1690319046" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Recent criminal activity–it’s as opportunistic as ever. Cyber risk to the pharma sector. Updates on the hybrid war. Returning Cobalt Strike to the legitimate red teams.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1709/notes</link>
      <description>Daixin Team claims ransomware attack against AirAsia. DraftKings users suffer credential harvesting and paycard theft. Assessing cyber risk in the US pharmaceutical industry. Killnet claims successes few others can discern. In Ukraine, kinetic attacks on IT infrastructure eclipse cyberattacks. Carole Theriault on digital echo chambers and what's in it for us. Nancy Wang from Forta's Alert Logic discusses how she is helping more young women get into the STEM field and leadership positions. Google seeks to render Cobalt Strike less useful to threat actors.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/224

Selected reading.
Daixin Team claims AirAsia ransomware attack with five million customer records leaked (Tech Monitor)
Daixin Ransomware Gang Steals 5 Million AirAsia Passengers' and Employees' Data (The Hacker News)
DraftKings Users Hacked, Money In Account "Cashed Out" (Action Network)
DraftKings says no evidence systems were breached following report of a hack (CNBC)
Assessing cyber risk in the US pharmaceutical industry. (CyberWire)
Killnet DDoS hacktivists target Royal Family and others (ComputerWeekly.com) 
Ukraine Data Centers Became Physical Targets When Cyber Attacks Failed (Meritalk)
Making Cobalt Strike harder for threat actors to abuse (Google Cloud Blog)
Google seeks to make Cobalt Strike useless to attackers (Help Net Security) 
Google Releases YARA Rules to Disrupt Cobalt Strike Abuse (Dark Reading)
Google releases 165 YARA rules to detect Cobalt Strike attacks (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Nov 2022 21:30:00 -0000</pubDate>
      <itunes:title>Recent criminal activity–it’s as opportunistic as ever. Cyber risk to the pharma sector. Updates on the hybrid war. Returning Cobalt Strike to the legitimate red teams.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1709</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Daixin Team claims ransomware attack against AirAsia. DraftKings users suffer credential harvesting and paycard theft. Assessing cyber risk in the US pharmaceutical industry. Killnet claims successes few others can discern. In Ukraine, kinetic attacks on IT infrastructure eclipse cyberattacks. Carole Theriault on digital echo chambers and what's in it for us. Nancy Wang from Forta's Alert Logic discusses how she is helping more young women get into the STEM field and leadership positions. Google seeks to render Cobalt Strike less useful to threat actors.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/224

Selected reading.
Daixin Team claims AirAsia ransomware attack with five million customer records leaked (Tech Monitor)
Daixin Ransomware Gang Steals 5 Million AirAsia Passengers' and Employees' Data (The Hacker News)
DraftKings Users Hacked, Money In Account "Cashed Out" (Action Network)
DraftKings says no evidence systems were breached following report of a hack (CNBC)
Assessing cyber risk in the US pharmaceutical industry. (CyberWire)
Killnet DDoS hacktivists target Royal Family and others (ComputerWeekly.com) 
Ukraine Data Centers Became Physical Targets When Cyber Attacks Failed (Meritalk)
Making Cobalt Strike harder for threat actors to abuse (Google Cloud Blog)
Google seeks to make Cobalt Strike useless to attackers (Help Net Security) 
Google Releases YARA Rules to Disrupt Cobalt Strike Abuse (Dark Reading)
Google releases 165 YARA rules to detect Cobalt Strike attacks (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Daixin Team claims ransomware attack against AirAsia. DraftKings users suffer credential harvesting and paycard theft. Assessing cyber risk in the US pharmaceutical industry. Killnet claims successes few others can discern. In Ukraine, kinetic attacks on IT infrastructure eclipse cyberattacks. Carole Theriault on digital echo chambers and what's in it for us. Nancy Wang from Forta's Alert Logic discusses how she is helping more young women get into the STEM field and leadership positions. Google seeks to render Cobalt Strike less useful to threat actors.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/224</p><p><br></p><h2>Selected reading.</h2><p><a href="https://techmonitor.ai/technology/cybersecurity/airasia-ransomware-daixin-team">Daixin Team claims AirAsia ransomware attack with five million customer records leaked</a> (Tech Monitor)</p><p><a href="https://thehackernews.com/2022/11/daixin-ransomware-gang-steals-5-million.html">Daixin Ransomware Gang Steals 5 Million AirAsia Passengers' and Employees' Data</a> (The Hacker News)</p><p><a href="https://www.actionnetwork.com/legal-online-sports-betting/draftkings-users-hacked-money-in-account-cashed-out">DraftKings Users Hacked, Money In Account "Cashed Out"</a> (Action Network)</p><p><a href="https://www.cnbc.com/2022/11/21/draftkings-says-no-evidence-systems-were-breached-following-report-of-a-hack.html">DraftKings says no evidence systems were breached following report of a hack</a> (CNBC)</p><p><a href="https://thecyberwire.com/stories/0e9d0f278bb24116bb28b192b860b897/assessing-cyber-risk-in-the-us-pharmaceutical-industry">Assessing cyber risk in the US pharmaceutical industry.</a> (CyberWire)</p><p><a href="https://www.computerweekly.com/news/252527560/Killnet-DDoS-hacktivists-target-Royal-Family-and-others">Killnet DDoS hacktivists target Royal Family and others</a> (ComputerWeekly.com) </p><p><a href="https://www.meritalk.com/articles/ukraine-data-centers-became-physical-targets-when-cyber-attacks-failed/">Ukraine Data Centers Became Physical Targets When Cyber Attacks Failed</a> (Meritalk)</p><p><a href="https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse">Making Cobalt Strike harder for threat actors to abuse</a> (Google Cloud Blog)</p><p><a href="https://www.helpnetsecurity.com/2022/11/21/cobalt-strike-attackers-detection-rules/">Google seeks to make Cobalt Strike useless to attackers</a> (Help Net Security) </p><p><a href="https://www.darkreading.com/dr-tech/google-releases-yara-rules-to-disrupt-cobalt-strike-abuse">Google Releases YARA Rules to Disrupt Cobalt Strike Abuse</a> (Dark Reading)</p><p><a href="https://www.bleepingcomputer.com/news/security/google-releases-165-yara-rules-to-detect-cobalt-strike-attacks/">Google releases 165 YARA rules to detect Cobalt Strike attacks</a> (BleepingComputer)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1271</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[40fc858e-787a-11ec-abf0-2bb707fc6db2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5644441571.mp3?updated=1690319030" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Callback phishing offers to solve your problem (it won’t). Mustang Panda’s recent activities. DEV0569’s malvertising campaign. 10 indicted in BEC case. Developing a cyber auxiliary force.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1708/notes</link>
      <description>Luna Moth's callback phishing offers an unpleasant and less familiar form of social engineering. New activity by China's Mustang Panda is reported. DEV0569 is using malvertising to distribute Royal ransomware. US indicts 10 in a business email compromise case. Developing a cyber auxiliary. Dave Bittner sits down with AJ Nash from ZeroFox to discuss holiday scams. Our own Rick Howard speaks with us about cloud security. And beware of Black Friday scams.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/223

Selected reading.
Threat Assessment: Luna Moth Callback Phishing Campaign (Unit 42) 
DEV-0569 finds new ways to deliver Royal ransomware, various payloads (Microsoft Security) 
Earth Preta Spear-Phishing Governments Worldwide (Trend Micro) 
EXCLUSIVE: Rounding up a cyber posse for Ukraine (The Record by Recorded Future) 
Tech for good: How the IT industry is helping Ukraine (Computing) 
10 Charged in Business Email Compromise and Money Laundering Schemes Targeting Medicare, Medicaid, and Other Victims (US Department of Justice) 
Black Friday and Cyber Monday risks. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 21 Nov 2022 21:30:00 -0000</pubDate>
      <itunes:title>Callback phishing offers to solve your problem (it won’t). Mustang Panda’s recent activities. DEV0569’s malvertising campaign. 10 indicted in BEC case. Developing a cyber auxiliary force.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1708</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Luna Moth's callback phishing offers an unpleasant and less familiar form of social engineering. New activity by China's Mustang Panda is reported. DEV0569 is using malvertising to distribute Royal ransomware. US indicts 10 in a business email compromise case. Developing a cyber auxiliary. Dave Bittner sits down with AJ Nash from ZeroFox to discuss holiday scams. Our own Rick Howard speaks with us about cloud security. And beware of Black Friday scams.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/223

Selected reading.
Threat Assessment: Luna Moth Callback Phishing Campaign (Unit 42) 
DEV-0569 finds new ways to deliver Royal ransomware, various payloads (Microsoft Security) 
Earth Preta Spear-Phishing Governments Worldwide (Trend Micro) 
EXCLUSIVE: Rounding up a cyber posse for Ukraine (The Record by Recorded Future) 
Tech for good: How the IT industry is helping Ukraine (Computing) 
10 Charged in Business Email Compromise and Money Laundering Schemes Targeting Medicare, Medicaid, and Other Victims (US Department of Justice) 
Black Friday and Cyber Monday risks. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Luna Moth's callback phishing offers an unpleasant and less familiar form of social engineering. New activity by China's Mustang Panda is reported. DEV0569 is using malvertising to distribute Royal ransomware. US indicts 10 in a business email compromise case. Developing a cyber auxiliary. Dave Bittner sits down with AJ Nash from ZeroFox to discuss holiday scams. Our own Rick Howard speaks with us about cloud security. And beware of Black Friday scams.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/223</p><p><br></p><h2>Selected reading.</h2><p><a href="https://unit42.paloaltonetworks.com/luna-moth-callback-phishing/">Threat Assessment: Luna Moth Callback Phishing Campaign</a> (Unit 42) </p><p><a href="https://www.microsoft.com/en-us/security/blog/2022/11/17/dev-0569-finds-new-ways-to-deliver-royal-ransomware-various-payloads/">DEV-0569 finds new ways to deliver Royal ransomware, various payloads</a> (Microsoft Security) </p><p><a href="https://www.trendmicro.com/en_us/research/22/k/earth-preta-spear-phishing-governments-worldwide.html">Earth Preta Spear-Phishing Governments Worldwide</a> (Trend Micro) </p><p><a href="https://therecord.media/exclusive-rounding-up-a-cyber-posse-for-ukraine/">EXCLUSIVE: Rounding up a cyber posse for Ukraine</a> (The Record by Recorded Future) </p><p><a href="https://www.computing.co.uk/opinion/4060463/tech-industry-helping-ukraine">Tech for good: How the IT industry is helping Ukraine </a>(Computing) </p><p><a href="https://www.justice.gov/opa/pr/10-charged-business-email-compromise-and-money-laundering-schemes-targeting-medicare-medicaid">10 Charged in Business Email Compromise and Money Laundering Schemes Targeting Medicare, Medicaid, and Other Victims</a> (US Department of Justice) </p><p><a href="https://thecyberwire.com/stories/56875c15c33c4712bca01078aee3beab/black-friday-and-cyber-monday-risks">Black Friday and Cyber Monday risks.</a> (CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1483</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[41bb7d86-787a-11ec-abf0-73122ee2f252]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1193512238.mp3?updated=1690319019" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Omer Singer: The offense and the defense of cybersecurity. [Strategy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/126/notes</link>
      <description>Omer Singer, Lead Cybersecurity Strategist from Snowflake, sits down to share his experience getting into the cybersecurity field. Growing up, he knew he wanted to work with computers, but he just didn't know what he wanted to do within the field. His college gave him great hands-on experience to then transition into the workforce. He's played both on the offense and defense of cybersecurity, and he says that experience showed him and he "kind of saw firsthand, uh, what a well funded and motivated, uh, team of cybersecurity experts can do and it's pretty scary." In addition, Omer is a big advocate for encouraging other security professionals to learn data skills, and strongly stands by the belief that the future of cybersecurity is in borrowing from modern data analytics tools and techniques that enable consistent risk reduction. He also makes it a priority to invest in his people, believing that this unlocks intrinsic motivation that enables a ton of personal growth and accomplishment, and is a big believer in the OKR system for enabling security operations and avoiding burnout. We thank Omer for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 20 Nov 2022 08:00:00 -0000</pubDate>
      <itunes:title>Omer Singer: The offense and the defense of cybersecurity. [Strategy] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>126</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Omer Singer, Lead Cybersecurity Strategist from Snowflake, sits down to share his experience getting into the cybersecurity field. Growing up, he knew he wanted to work with computers, but he just didn't know what he wanted to do within the field. His college gave him great hands-on experience to then transition into the workforce. He's played both on the offense and defense of cybersecurity, and he says that experience showed him and he "kind of saw firsthand, uh, what a well funded and motivated, uh, team of cybersecurity experts can do and it's pretty scary." In addition, Omer is a big advocate for encouraging other security professionals to learn data skills, and strongly stands by the belief that the future of cybersecurity is in borrowing from modern data analytics tools and techniques that enable consistent risk reduction. He also makes it a priority to invest in his people, believing that this unlocks intrinsic motivation that enables a ton of personal growth and accomplishment, and is a big believer in the OKR system for enabling security operations and avoiding burnout. We thank Omer for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Omer Singer, Lead Cybersecurity Strategist from Snowflake, sits down to share his experience getting into the cybersecurity field. Growing up, he knew he wanted to work with computers, but he just didn't know what he wanted to do within the field. His college gave him great hands-on experience to then transition into the workforce. He's played both on the offense and defense of cybersecurity, and he says that experience showed him and he "kind of saw firsthand, uh, what a well funded and motivated, uh, team of cybersecurity experts can do and it's pretty scary." In addition, Omer is a big advocate for encouraging other security professionals to learn data skills, and strongly stands by the belief that the future of cybersecurity is in borrowing from modern data analytics tools and techniques that enable consistent risk reduction. He also makes it a priority to invest in his people, believing that this unlocks intrinsic motivation that enables a ton of personal growth and accomplishment, and is a big believer in the OKR system for enabling security operations and avoiding burnout. We thank Omer for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>508</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2d88296c-6759-11ed-a08e-4fa310d66267]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5281920194.mp3?updated=1668718623" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Another infection with new malware. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/259/notes</link>
      <description>Larry Cashdollar, Principal Security Intelligence Response Engineer from Akamai Technologies, joins Dave to talk about their research on "KmsdBot: The Attack and Mine Malware." Akamai's Security Research team has found a new malware that infected their honeypot, which they have dubbed KmsdBot. 
The research states "The malware attacks using UDP, TCP, HTTP POST, and GET, along with a command and control infrastructure (C2), which communicates over TCP." The botnet targets weak login credentials and then infects systems via an SSH connection.
The research can be found here:
KmsdBot: The Attack and Mine Malware

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Nov 2022 08:00:00 -0000</pubDate>
      <itunes:title>Another infection with new malware. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>259</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Larry Cashdollar, Principal Security Intelligence Response Engineer from Akamai Technologies, joins Dave to talk about their research on "KmsdBot: The Attack and Mine Malware." Akamai's Security Research team has found a new malware that infected their honeypot, which they have dubbed KmsdBot. 
The research states "The malware attacks using UDP, TCP, HTTP POST, and GET, along with a command and control infrastructure (C2), which communicates over TCP." The botnet targets weak login credentials and then infects systems via an SSH connection.
The research can be found here:
KmsdBot: The Attack and Mine Malware

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Larry Cashdollar, Principal Security Intelligence Response Engineer from Akamai Technologies, joins Dave to talk about their research on "KmsdBot: The Attack and Mine Malware." Akamai's Security Research team has found a new malware that infected their honeypot, which they have dubbed KmsdBot. </p><p>The research states "The malware attacks using UDP, TCP, HTTP POST, and GET, along with a command and control infrastructure (C2), which communicates over TCP." The botnet targets weak login credentials and then infects systems via an SSH connection.</p><p>The research can be found here:</p><ul><li><a href="https://www.akamai.com/blog/security-research/kmdsbot-the-attack-and-mine-malware">KmsdBot: The Attack and Mine Malware</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1165</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d14631b6-66b9-11ed-bb41-73984385ee77]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5978799993.mp3?updated=1685127238" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Government security advisories, and the difficulty of recovering from ransomware attacks. Authority for offensive cyber under deliberation. Google wins Glupteba suit. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1707/notes</link>
      <description>CISA and its partners issue a Joint Advisory on the Hive ransomware-as-a-service operation. Ransomware continues to trouble governments, internationally and at all levels. The US Defense Department may see enhanced authority to conduct offensive cyber operations. Russian attacks on Ukrainian infrastructure remain kinetic, as missiles show up, but cyberattacks don’t. Kevin Magee from Microsoft about leveraging cybersecurity apprentices. Our guest is Paul Giorgi from XM Cyber describing creative attack path in enterprise networks.And, hey, glupost’ [GLUE-post]–don’t mess with Google’s lawyers.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/222

Selected reading.
CISA Alert AA22-321A – #StopRansomware: Hive Ransomware. (CyberWire)
#StopRansomware: Hive Ransomware (CISA)
Vanuatu: Hackers strand Pacific island government for over a week (BBC News)
Ransom attack cripples Vanuatu government systems, forces staff to use pen and paper (The Sydney Morning Herald)
Ransomware incidents now make up majority of British government’s crisis management COBRA meetings (The Record by Recorded Future)
Suffolk County, N.Y., Hack Shows Ransomware Threat to Municipalities (Wall Street Journal) 
Biden set to approve expansive authorities for Pentagon to carry out cyber operations (CyberScoop)
Red Lion Crimson (CISA)
Cradlepoint IBR600 (CISA)
A ruling in our legal case against the Glupteba botnet (Google)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 18 Nov 2022 21:30:00 -0000</pubDate>
      <itunes:title>Government security advisories, and the difficulty of recovering from ransomware attacks. Authority for offensive cyber under deliberation. Google wins Glupteba suit. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1707</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA and its partners issue a Joint Advisory on the Hive ransomware-as-a-service operation. Ransomware continues to trouble governments, internationally and at all levels. The US Defense Department may see enhanced authority to conduct offensive cyber operations. Russian attacks on Ukrainian infrastructure remain kinetic, as missiles show up, but cyberattacks don’t. Kevin Magee from Microsoft about leveraging cybersecurity apprentices. Our guest is Paul Giorgi from XM Cyber describing creative attack path in enterprise networks.And, hey, glupost’ [GLUE-post]–don’t mess with Google’s lawyers.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/222

Selected reading.
CISA Alert AA22-321A – #StopRansomware: Hive Ransomware. (CyberWire)
#StopRansomware: Hive Ransomware (CISA)
Vanuatu: Hackers strand Pacific island government for over a week (BBC News)
Ransom attack cripples Vanuatu government systems, forces staff to use pen and paper (The Sydney Morning Herald)
Ransomware incidents now make up majority of British government’s crisis management COBRA meetings (The Record by Recorded Future)
Suffolk County, N.Y., Hack Shows Ransomware Threat to Municipalities (Wall Street Journal) 
Biden set to approve expansive authorities for Pentagon to carry out cyber operations (CyberScoop)
Red Lion Crimson (CISA)
Cradlepoint IBR600 (CISA)
A ruling in our legal case against the Glupteba botnet (Google)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA and its partners issue a Joint Advisory on the Hive ransomware-as-a-service operation. Ransomware continues to trouble governments, internationally and at all levels. The US Defense Department may see enhanced authority to conduct offensive cyber operations. Russian attacks on Ukrainian infrastructure remain kinetic, as missiles show up, but cyberattacks don’t. Kevin Magee from Microsoft about leveraging cybersecurity apprentices. Our guest is Paul Giorgi from XM Cyber describing creative attack path in enterprise networks.And, hey, glupost’ [GLUE-post]–don’t mess with Google’s lawyers.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/222</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/37/notes">CISA Alert AA22-321A – #StopRansomware: Hive Ransomware.</a> (CyberWire)</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-321a">#StopRansomware: Hive Ransomware</a> (CISA)</p><p><a href="https://www.bbc.com/news/world-asia-63632129">Vanuatu: Hackers strand Pacific island government for over a week</a> (BBC News)</p><p><a href="https://www.smh.com.au/world/oceania/australia-called-in-to-help-after-hackers-shut-down-vanuatu-government-systems-20221114-p5by7a.html">Ransom attack cripples Vanuatu government systems, forces staff to use pen and paper</a> (The Sydney Morning Herald)</p><p><a href="https://therecord.media/ransomware-incidents-now-make-up-majority-of-british-governments-crisis-management-cobra-meetings/">Ransomware incidents now make up majority of British government’s crisis management COBRA meetings</a> (The Record by Recorded Future)</p><p><a href="https://www.wsj.com/articles/suffolk-county-n-y-hack-shows-ransomware-threat-to-municipalities-11668556715">Suffolk County, N.Y., Hack Shows Ransomware Threat to Municipalities</a> (Wall Street Journal) </p><p><a href="https://www.cyberscoop.com/biden-nspm-13-pentagon-cyber-operations/">Biden set to approve expansive authorities for Pentagon to carry out cyber operations</a> (CyberScoop)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-321-01">Red Lion Crimson</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-321-02">Cradlepoint IBR600</a> (CISA)</p><p><a href="https://blog.google/outreach-initiatives/public-policy/a-ruling-in-our-legal-case-against-the-glupteba-botnet/">A ruling in our legal case against the Glupteba botnet</a> (Google)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1600</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3f7f0bbe-787a-11ec-abf0-83bedaa9ccd1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6861855808.mp3?updated=1690319005" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA22-321A – #StopRansomware: Hive Ransomware. [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/37/notes</link>
      <description>The FBI, CISA, and the Department of Health and Human Services are releasing this alert to disseminate known Hive Ransomware Group indicators of compromise and TTPs identified through FBI investigations.
AA22-321A Alert, Technical Details, and Mitigations
Stopransomware.gov is a whole-of-government approach that gives one central location for ransomware resources and alerts.
Resource to mitigate a ransomware attack: CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide.
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 18 Nov 2022 01:23:00 -0000</pubDate>
      <itunes:title>CISA Alert AA22-321A – #StopRansomware: Hive Ransomware. [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>37</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The FBI, CISA, and the Department of Health and Human Services are releasing this alert to disseminate known Hive Ransomware Group indicators of compromise and TTPs identified through FBI investigations.
AA22-321A Alert, Technical Details, and Mitigations
Stopransomware.gov is a whole-of-government approach that gives one central location for ransomware resources and alerts.
Resource to mitigate a ransomware attack: CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide.
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FBI, CISA, and the Department of Health and Human Services are releasing this alert to disseminate known Hive Ransomware Group indicators of compromise and TTPs identified through FBI investigations.</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-321a">AA22-321A Alert, Technical Details, and Mitigations</a></p><p><a href="http://www.stopransomware.gov/">Stopransomware.gov</a> is a whole-of-government approach that gives one central location for ransomware resources and alerts.</p><p>Resource to mitigate a ransomware attack: <a href="https://www.cisa.gov/sites/default/files/publications/CISA_MS-ISAC_Ransomware%20Guide_S508C.pdf">CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide</a>.</p><p>No-cost cyber hygiene services: <a href="https://www.cisa.gov/cyber-hygiene-services">Cyber Hygiene Services</a> and <a href="https://github.com/cisagov/cset/">Ransomware Readiness Assessment</a>.</p><p>U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email <a href="mailto:dib_defense@cyber.nsa.gov">dib_defense@cyber.nsa.gov</a> </p><p>To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="mailto:report@cisa.gov">report@cisa.gov</a>, or call (888) 282-0870, or report incidents to your local FBI field office.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>180</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1aeb52d0-66e0-11ed-94cd-17c9eb1db3d9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1918535373.mp3?updated=1668722359" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Privileged insiders and the abuse of “Oops.” Nemesis Kitten exploits Log4Shell. TrojanOrders in the holiday season. Emotet’s back. RapperBot notes. And an arrest in the Zeus cybercrime case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1706/notes</link>
      <description>Meta employees, contractors compromised customer accounts. Nemesis Kitten found in US Government network. Unpatched Magento instances hit with "TrojanOrders." Emotet has returned after three quiet months. DDoS attacks in game servers by RapperBot. Carole Theriault looks at long term lessons learned from the 2019 Capital One breach. FBI Cyber Division AD Bryan Vorndran updates us on cyber threats. And an alleged "Zeus" cybercrime boss has been arrested in Switzerland.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/221

Selected reading.
Meta Employees, Security Guards Fired for Hijacking User Accounts (Wall Street Journal)
CISA Alert AA22-320A – Iranian government-sponsored APT actors compromise federal network, deploy crypto miner, credential harvester. (CyberWire)
Iranian Government-Sponsored APT Actors Compromise Federal Network, Deploy Crypto Miner, Credential Harvester (CISA)
Iranian government-linked hackers got into Merit Systems Protection Board’s network (Washington Post)
Iranian hackers compromise US government network in cryptocurrency generating scheme, officials say (CNN)
Magento stores targeted in massive surge of TrojanOrders attacks (BleepingComputer) 
A Comprehensive Look at Emotet’s Fall 2022 Return (Proofpoint) 
Notorious Emotet botnet returns after a few months off (Register) 
Updated RapperBot malware targets game servers in DDoS attacks (BleepingComputer) 
Russia’s cyber forces ‘underperformed expectations’ in Ukraine: senior US official (The Hill)
Suspected Zeus cybercrime ring leader ‘Tank’ arrested by Swiss police (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 17 Nov 2022 21:15:00 -0000</pubDate>
      <itunes:title>Privileged insiders and the abuse of “Oops.” Nemesis Kitten exploits Log4Shell. TrojanOrders in the holiday season. Emotet’s back. RapperBot notes. And an arrest in the Zeus cybercrime case.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1706</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Meta employees, contractors compromised customer accounts. Nemesis Kitten found in US Government network. Unpatched Magento instances hit with "TrojanOrders." Emotet has returned after three quiet months. DDoS attacks in game servers by RapperBot. Carole Theriault looks at long term lessons learned from the 2019 Capital One breach. FBI Cyber Division AD Bryan Vorndran updates us on cyber threats. And an alleged "Zeus" cybercrime boss has been arrested in Switzerland.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/221

Selected reading.
Meta Employees, Security Guards Fired for Hijacking User Accounts (Wall Street Journal)
CISA Alert AA22-320A – Iranian government-sponsored APT actors compromise federal network, deploy crypto miner, credential harvester. (CyberWire)
Iranian Government-Sponsored APT Actors Compromise Federal Network, Deploy Crypto Miner, Credential Harvester (CISA)
Iranian government-linked hackers got into Merit Systems Protection Board’s network (Washington Post)
Iranian hackers compromise US government network in cryptocurrency generating scheme, officials say (CNN)
Magento stores targeted in massive surge of TrojanOrders attacks (BleepingComputer) 
A Comprehensive Look at Emotet’s Fall 2022 Return (Proofpoint) 
Notorious Emotet botnet returns after a few months off (Register) 
Updated RapperBot malware targets game servers in DDoS attacks (BleepingComputer) 
Russia’s cyber forces ‘underperformed expectations’ in Ukraine: senior US official (The Hill)
Suspected Zeus cybercrime ring leader ‘Tank’ arrested by Swiss police (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Meta employees, contractors compromised customer accounts. Nemesis Kitten found in US Government network. Unpatched Magento instances hit with "TrojanOrders." Emotet has returned after three quiet months. DDoS attacks in game servers by RapperBot. Carole Theriault looks at long term lessons learned from the 2019 Capital One breach. FBI Cyber Division AD Bryan Vorndran updates us on cyber threats. And an alleged "Zeus" cybercrime boss has been arrested in Switzerland.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/221</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.wsj.com/articles/meta-employees-security-guards-fired-for-hijacking-user-accounts-11668697213">Meta Employees, Security Guards Fired for Hijacking User Accounts</a> (Wall Street Journal)</p><p><a href="https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/36/notes">CISA Alert AA22-320A – Iranian government-sponsored APT actors compromise federal network, deploy crypto miner, credential harvester.</a> (CyberWire)</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-320a">Iranian Government-Sponsored APT Actors Compromise Federal Network, Deploy Crypto Miner, Credential Harvester</a> (CISA)</p><p><a href="https://www.washingtonpost.com/politics/2022/11/17/iranian-hackers-breached-agency-that-hears-federal-worker-grievances/">Iranian government-linked hackers got into Merit Systems Protection Board’s network</a> (Washington Post)</p><p><a href="https://www.cnn.com/2022/11/16/politics/iran-hackers-us-government-network/index.html">Iranian hackers compromise US government network in cryptocurrency generating scheme, officials say</a> (CNN)</p><p><a href="https://www.bleepingcomputer.com/news/security/magento-stores-targeted-in-massive-surge-of-trojanorders-attacks/">Magento stores targeted in massive surge of TrojanOrders attacks</a> (BleepingComputer) </p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/comprehensive-look-emotets-fall-2022-return">A Comprehensive Look at Emotet’s Fall 2022 Return</a> (Proofpoint) </p><p><a href="https://www.theregister.com/2022/11/17/emotet_botnet_returns/">Notorious Emotet botnet returns after a few months off</a> (Register) </p><p><a href="https://www.bleepingcomputer.com/news/security/updated-rapperbot-malware-targets-game-servers-in-ddos-attacks/">Updated RapperBot malware targets game servers in DDoS attacks</a> (BleepingComputer) </p><p><a href="https://thehill.com/policy/cybersecurity/3738506-russias-cyber-forces-underperformed-expectations-in-ukraine-senior-us-official/">Russia’s cyber forces ‘underperformed expectations’ in Ukraine: senior US official</a> (The Hill)</p><p><a href="https://www.bleepingcomputer.com/news/security/suspected-zeus-cybercrime-ring-leader-tank-arrested-by-swiss-police/">Suspected Zeus cybercrime ring leader ‘Tank’ arrested by Swiss police</a> (BleepingComputer)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1548</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3fdeab00-787a-11ec-abf0-4fb11b0ba263]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8670952655.mp3?updated=1690318996" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Getting tangled up in the blockchain. RDS vulnerabilities. The language of fraud. An offer of help to the G19.Draft Episode for Nov 16, 2022</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1705/notes</link>
      <description>Blockchains and cryptocurrency exchanges, and the risks they present. Vulnerabilities in Amazon RDS may expose PII. A study of the language of fraud. Tim Starks from Washington Post's Cybersecurity 202 on a lagging DHS cyber doomsday report. Our guest is Ashif Samnani of Cenovus Energy with insights from the world of OT cyber. And President Zelenskyy offers the benefit of Ukraine's experience with cyber warfare to the "G19”.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/220

Selected reading.
Cryptocurrency sector vulnerabilities. (CyberWire)
Oops, I Leaked It Again — How Mitiga Found PII in Exposed Amazon RDS Snapshots (Mitiga)
Amazon RDS may expose PII. (CyberWire)
The specious language of fraud. (CyberWire)
Zelensky offers G20 leaders to use Ukrainian experience in cyber defense (Ukrinform) 
Ukraine at D+265: A missile campaign punctuates diplomacy. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 16 Nov 2022 21:15:00 -0000</pubDate>
      <itunes:title>Getting tangled up in the blockchain. RDS vulnerabilities. The language of fraud. An offer of help to the G19.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1705</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Blockchains and cryptocurrency exchanges, and the risks they present. Vulnerabilities in Amazon RDS may expose PII. A study of the language of fraud. Tim Starks from Washington Post's Cybersecurity 202 on a lagging DHS cyber doomsday report. Our guest is Ashif Samnani of Cenovus Energy with insights from the world of OT cyber. And President Zelenskyy offers the benefit of Ukraine's experience with cyber warfare to the "G19”.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/220

Selected reading.
Cryptocurrency sector vulnerabilities. (CyberWire)
Oops, I Leaked It Again — How Mitiga Found PII in Exposed Amazon RDS Snapshots (Mitiga)
Amazon RDS may expose PII. (CyberWire)
The specious language of fraud. (CyberWire)
Zelensky offers G20 leaders to use Ukrainian experience in cyber defense (Ukrinform) 
Ukraine at D+265: A missile campaign punctuates diplomacy. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Blockchains and cryptocurrency exchanges, and the risks they present. Vulnerabilities in Amazon RDS may expose PII. A study of the language of fraud. Tim Starks from Washington Post's Cybersecurity 202 on a lagging DHS cyber doomsday report. Our guest is Ashif Samnani of Cenovus Energy with insights from the world of OT cyber. And President Zelenskyy offers the benefit of Ukraine's experience with cyber warfare to the "G19”.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/220</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/stories/7e860a6efb6c49b5a1e984d1d76d2d31/cryptocurrency-sector-vulnerabilities">Cryptocurrency sector vulnerabilities.</a> (CyberWire)</p><p><a href="https://www.mitiga.io/blog/how-mitiga-found-pii-in-exposed-amazon-rds-snapshots">Oops, I Leaked It Again — How Mitiga Found PII in Exposed Amazon RDS Snapshots</a> (Mitiga)</p><p><a href="https://thecyberwire.com/stories/17bf34390bf8498ea06d8e8c55a624ff/amazon-rds-may-expose-pii">Amazon RDS may expose PII.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/c98535afe159435baf2fe6d8e9413844/the-specious-language-of-fraud">The specious language of fraud.</a> (CyberWire)</p><p><a href="https://www.ukrinform.net/rubric-society/3615558-zelensky-offers-g20-leaders-use-ukrainian-experience-in-cyber-defense.html">Zelensky offers G20 leaders to use Ukrainian experience in cyber defense</a> (Ukrinform) </p><p><a href="https://thecyberwire.com/stories/21b837ad09a64d498c3fddcedada0a11/ukraine-at-d265-a-missile-campaign-punctuates-diplomacy">Ukraine at D+265: A missile campaign punctuates diplomacy.</a> (CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1529</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[407cff4e-787a-11ec-abf0-43a83fbc9218]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9764536666.mp3?updated=1690318977" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA22-320A – Iranian government-sponsored APT actors compromise federal network, deploy crypto miner, credential harvester. [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/36/notes</link>
      <description>From mid-June through mid-July 2022, CISA conducted an incident response engagement at a Federal Civilian Executive Branch organization where CISA observed suspected advanced persistent threat activity. In the course of incident response activities, CISA determined that cyber threat actors exploited the Log4Shell vulnerability in an unpatched VMware Horizon server, installed XMRig crypto mining software, moved laterally to the domain controller, compromised credentials, and then implanted Ngrok reverse proxies on several hosts to maintain persistence.
AA22-320A Alert, Technical Details, and Mitigations
Malware Analysis Report MAR 10387061-1.v1
For more information on Iranian government-sponsored Iranian malicious cyber activity, see CISA’s Iran Cyber Threat Overview and Advisories webpage and FBI’s Iran Threats webpage.
CISA offers several no-cost scanning and testing services to help organizations reduce their exposure to threats by taking a proactive approach to mitigating attack vectors. See www.cisa.gov/cyber-hygiene-services
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 16 Nov 2022 21:10:00 -0000</pubDate>
      <itunes:title>CISA Alert AA22-320A – Iranian government-sponsored APT actors compromise federal network, deploy crypto miner, credential harvester. [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>36</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From mid-June through mid-July 2022, CISA conducted an incident response engagement at a Federal Civilian Executive Branch organization where CISA observed suspected advanced persistent threat activity. In the course of incident response activities, CISA determined that cyber threat actors exploited the Log4Shell vulnerability in an unpatched VMware Horizon server, installed XMRig crypto mining software, moved laterally to the domain controller, compromised credentials, and then implanted Ngrok reverse proxies on several hosts to maintain persistence.
AA22-320A Alert, Technical Details, and Mitigations
Malware Analysis Report MAR 10387061-1.v1
For more information on Iranian government-sponsored Iranian malicious cyber activity, see CISA’s Iran Cyber Threat Overview and Advisories webpage and FBI’s Iran Threats webpage.
CISA offers several no-cost scanning and testing services to help organizations reduce their exposure to threats by taking a proactive approach to mitigating attack vectors. See www.cisa.gov/cyber-hygiene-services
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From mid-June through mid-July 2022, CISA conducted an incident response engagement at a Federal Civilian Executive Branch organization where CISA observed suspected advanced persistent threat activity. In the course of incident response activities, CISA determined that cyber threat actors exploited the Log4Shell vulnerability in an unpatched VMware Horizon server, installed XMRig crypto mining software, moved laterally to the domain controller, compromised credentials, and then implanted Ngrok reverse proxies on several hosts to maintain persistence.</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-320a">AA22-320A Alert, Technical Details, and Mitigations</a></p><p>Malware Analysis Report <a href="https://www.cisa.gov/uscert/ncas/analysis-reports/ar22-320a">MAR 10387061-1.v1</a></p><p>For more information on Iranian government-sponsored Iranian malicious cyber activity, see CISA’s <a href="https://www.cisa.gov/uscert/iran">Iran Cyber Threat Overview and Advisories</a> webpage and FBI’s <a href="https://www.fbi.gov/investigate/counterintelligence/the-iran-threat">Iran Threats</a> webpage.</p><p>CISA offers several no-cost scanning and testing services to help organizations reduce their exposure to threats by taking a proactive approach to mitigating attack vectors. See <a href="http://www.cisa.gov/cyber-hygiene-services">www.cisa.gov/cyber-hygiene-services</a></p><p>U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email <a href="mailto:dib_defense@cyber.nsa.gov">dib_defense@cyber.nsa.gov</a> </p><p>To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="mailto:report@cisa.gov">report@cisa.gov</a>, or call (888) 282-0870, or report incidents to your local FBI field office.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>169</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[07bdf3c6-65f4-11ed-8200-1736375aae87]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5517796143.mp3?updated=1668633221" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An update on three threat actors: Fangxiao, Killnet, and Billbug, one of them in it for money, another for the glory, and a third for the intell. Twitter and SMS 2FA. Zendesk patches. CISA adds a KEV. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1704/notes</link>
      <description>Fangxiao works ad scams enroute to other compromises. Killnet claims to have defaced a US FBI site. CISA registers another Known Exploited Vulnerability. Difficulties with Twitter's SMS 2FA system. Zendesk vulnerability discovered. Joe Carrigan explains registration bombing for email addresses. Our guest is Miles Hutchinson from Jumio with insights on defense against sophisticated ransomware attackers. And Billbug romps through Asian government agencies.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/219

Selected reading.
Fangxiao: a Chinese threat actor (Cyjax)
Fangxiao: A Phishing Threat Actor (Tripwire) 
Russian hackers claim cyber attack on FBI website (Newsweek) 
CISA Has Added One Known Exploited Vulnerability to Catalog (CISA)
Twitter’s SMS Two-Factor Authentication Is Melting Down (WIRED)
Varonis Threat Labs Discovers SQLi and Access Flaws in Zendesk (Varonis)
Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries (Symantec)
Chinese hackers target government agencies and defense orgs (BleepingComputer) 
Researchers Say China State-backed Hackers Breached a Digital Certificate Authority (The Hacker News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Nov 2022 21:15:00 -0000</pubDate>
      <itunes:title>An update on three threat actors: Fangxiao, Killnet, and Billbug, one of them in it for money, another for the glory, and a third for the intell. Twitter and SMS 2FA. Zendesk patches. CISA adds a KEV. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1704</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Fangxiao works ad scams enroute to other compromises. Killnet claims to have defaced a US FBI site. CISA registers another Known Exploited Vulnerability. Difficulties with Twitter's SMS 2FA system. Zendesk vulnerability discovered. Joe Carrigan explains registration bombing for email addresses. Our guest is Miles Hutchinson from Jumio with insights on defense against sophisticated ransomware attackers. And Billbug romps through Asian government agencies.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/219

Selected reading.
Fangxiao: a Chinese threat actor (Cyjax)
Fangxiao: A Phishing Threat Actor (Tripwire) 
Russian hackers claim cyber attack on FBI website (Newsweek) 
CISA Has Added One Known Exploited Vulnerability to Catalog (CISA)
Twitter’s SMS Two-Factor Authentication Is Melting Down (WIRED)
Varonis Threat Labs Discovers SQLi and Access Flaws in Zendesk (Varonis)
Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries (Symantec)
Chinese hackers target government agencies and defense orgs (BleepingComputer) 
Researchers Say China State-backed Hackers Breached a Digital Certificate Authority (The Hacker News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Fangxiao works ad scams enroute to other compromises. Killnet claims to have defaced a US FBI site. CISA registers another Known Exploited Vulnerability. Difficulties with Twitter's SMS 2FA system. Zendesk vulnerability discovered. Joe Carrigan explains registration bombing for email addresses. Our guest is Miles Hutchinson from Jumio with insights on defense against sophisticated ransomware attackers. And Billbug romps through Asian government agencies.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/219</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cyjax.com/app/uploads/2022/11/Fangxiao-a-Chinese-threat-actor.pdf">Fangxiao: a Chinese threat actor</a> (Cyjax)</p><p><a href="https://www.tripwire.com/state-of-security/fangxiao-phishing-threat-actor">Fangxiao: A Phishing Threat Actor</a> (Tripwire) </p><p><a href="https://www.newsweek.com/russian-hackers-claim-cyberattack-fbi-website-1759373">Russian hackers claim cyber attack on FBI website</a> (Newsweek) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/11/14/cisa-has-added-one-known-exploited-vulnerability-catalog">CISA Has Added One Known Exploited Vulnerability to Catalog</a> (CISA)</p><p><a href="https://www.wired.com/story/twitter-two-factor-sms-problems/">Twitter’s SMS Two-Factor Authentication Is Melting Down</a> (WIRED)</p><p><a href="https://www.varonis.com/blog/zendesk-sql-injection-and-access-flaws">Varonis Threat Labs Discovers SQLi and Access Flaws in Zendesk</a> (Varonis)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/espionage-asia-governments-cert-authority">Billbug: State-sponsored Actor Targets Cert Authority, Government Agencies in Multiple Asian Countries</a> (Symantec)</p><p><a href="https://www.bleepingcomputer.com/news/security/chinese-hackers-target-government-agencies-and-defense-orgs/">Chinese hackers target government agencies and defense orgs</a> (BleepingComputer) </p><p><a href="https://thehackernews.com/2022/11/researchers-say-china-state-backed.html">Researchers Say China State-backed Hackers Breached a Digital Certificate Authority</a> (The Hacker News)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1524</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[411c74de-787a-11ec-abf0-57b5736ff223]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8970611904.mp3?updated=1690318962" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Software supply chains, C2C markets, criminals, and cyber auxiliaries in a hybrid war. CISA releases its Stakeholder Specific Vulnerability Categorization (SSVC).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1703/notes</link>
      <description>Software supply chain risk. Cyber risk across sectors. CISA releases Stakeholder Specific Vulnerability Categorization (SSVC). Sandworm is back in Russia's hybrid war. Another wiper campaign from a Russian cyber auxiliary. Malek Ben Salem from Accenture shares thoughts on future-proofing cloud security. Rick Howard previews the latest CSO Perspectives show. And the Australian Federal Police say they know who hacked Medibank. (and the AFP says they have a good track record getting international criminals).

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/218

Selected reading.
Exclusive: Russian software disguised as American finds its way into U.S. Army, CDC apps (Reuters) 
Industries boost cyber defenses against growing number of attacks (Moodys) 
CISA Releases SSVC Methodology to Prioritize Vulnerabilities (CISA)
Transforming the Vulnerability Management Landscape (CISA)
Russian Sandworm hackers deployed malware in Ukraine and Poland (Washington Post)
New “Prestige” ransomware impacts organizations in Ukraine and Poland (Microsoft)
Microsoft links Russia’s military to cyberattacks in Poland and Ukraine (Ars Technica)
Microsoft attributes ‘Prestige’ ransomware attacks on Ukraine and Poland to Russian group (The Record by Recorded Future)
Wipe it or exfiltrate? How Russia exploits edge infrastructure to disrupt and spy during wartime (SC Media)
Russia’s New Cyberwarfare in Ukraine Is Fast, Dirty, and Relentless (WIRED)
Russian military hackers linked to ransomware attacks in Ukraine (BleepingComputer) 
Information on cyberattacks of the group UAC-0118 (FRwL) using the Somnia malware (CERT-UA#5185) (CERT-UA)
Ukraine says Russian hacktivists use new Somnia ransomware (BleepingComputer) 
Russian hacktivists hit Ukrainian orgs with ransomware - but no ransom demands (Help Net Security)
Development of the Ukrainian Cyber Counter-Offensive (Trustwave) 
Australian Federal Police say cybercriminals in Russia behind Medibank hack (The Record by Recorded Future)
Australia tells Medibank hackers: 'We know who you are' (TechCrunch)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 14 Nov 2022 21:15:00 -0000</pubDate>
      <itunes:title>Software supply chains, C2C markets, criminals, and cyber auxiliaries in a hybrid war. CISA releases its Stakeholder Specific Vulnerability Categorization (SSVC).</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1703</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Software supply chain risk. Cyber risk across sectors. CISA releases Stakeholder Specific Vulnerability Categorization (SSVC). Sandworm is back in Russia's hybrid war. Another wiper campaign from a Russian cyber auxiliary. Malek Ben Salem from Accenture shares thoughts on future-proofing cloud security. Rick Howard previews the latest CSO Perspectives show. And the Australian Federal Police say they know who hacked Medibank. (and the AFP says they have a good track record getting international criminals).

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/218

Selected reading.
Exclusive: Russian software disguised as American finds its way into U.S. Army, CDC apps (Reuters) 
Industries boost cyber defenses against growing number of attacks (Moodys) 
CISA Releases SSVC Methodology to Prioritize Vulnerabilities (CISA)
Transforming the Vulnerability Management Landscape (CISA)
Russian Sandworm hackers deployed malware in Ukraine and Poland (Washington Post)
New “Prestige” ransomware impacts organizations in Ukraine and Poland (Microsoft)
Microsoft links Russia’s military to cyberattacks in Poland and Ukraine (Ars Technica)
Microsoft attributes ‘Prestige’ ransomware attacks on Ukraine and Poland to Russian group (The Record by Recorded Future)
Wipe it or exfiltrate? How Russia exploits edge infrastructure to disrupt and spy during wartime (SC Media)
Russia’s New Cyberwarfare in Ukraine Is Fast, Dirty, and Relentless (WIRED)
Russian military hackers linked to ransomware attacks in Ukraine (BleepingComputer) 
Information on cyberattacks of the group UAC-0118 (FRwL) using the Somnia malware (CERT-UA#5185) (CERT-UA)
Ukraine says Russian hacktivists use new Somnia ransomware (BleepingComputer) 
Russian hacktivists hit Ukrainian orgs with ransomware - but no ransom demands (Help Net Security)
Development of the Ukrainian Cyber Counter-Offensive (Trustwave) 
Australian Federal Police say cybercriminals in Russia behind Medibank hack (The Record by Recorded Future)
Australia tells Medibank hackers: 'We know who you are' (TechCrunch)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Software supply chain risk. Cyber risk across sectors. CISA releases Stakeholder Specific Vulnerability Categorization (SSVC). Sandworm is back in Russia's hybrid war. Another wiper campaign from a Russian cyber auxiliary. Malek Ben Salem from Accenture shares thoughts on future-proofing cloud security. Rick Howard previews the latest CSO Perspectives show. And the Australian Federal Police say they know who hacked Medibank. (and the AFP says they have a good track record getting international criminals).</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/218</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.reuters.com/technology/exclusive-russian-software-disguised-american-finds-its-way-into-us-army-cdc-2022-11-14/">Exclusive: Russian software disguised as American finds its way into U.S. Army, CDC apps</a> (Reuters) </p><p><a href="https://www.moodys.com/web/en/us/about/insights/data-stories/cyber-risks-are-rising.html">Industries boost cyber defenses against growing number of attacks</a> (Moodys) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/11/10/cisa-releases-ssvc-methodology-prioritize-vulnerabilities">CISA Releases SSVC Methodology to Prioritize Vulnerabilities</a> (CISA)</p><p><a href="https://www.cisa.gov/blog/2022/11/10/transforming-vulnerability-management-landscape">Transforming the Vulnerability Management Landscape</a> (CISA)</p><p><a href="https://www.washingtonpost.com/politics/2022/11/11/russian-sandworm-hackers-deployed-malware-ukraine-poland/">Russian Sandworm hackers deployed malware in Ukraine and Poland</a> (Washington Post)</p><p><a href="https://www.microsoft.com/en-us/security/blog/2022/10/14/new-prestige-ransomware-impacts-organizations-in-ukraine-and-poland/">New “Prestige” ransomware impacts organizations in Ukraine and Poland</a> (Microsoft)</p><p><a href="https://arstechnica.com/information-technology/2022/11/microsoft-links-russias-military-to-cyberattacks-in-poland-and-ukraine/">Microsoft links Russia’s military to cyberattacks in Poland and Ukraine</a> (Ars Technica)</p><p><a href="https://therecord.media/microsoft-attributes-prestige-ransomware-attacks-on-ukraine-and-poland-to-russian-group/">Microsoft attributes ‘Prestige’ ransomware attacks on Ukraine and Poland to Russian group</a> (The Record by Recorded Future)</p><p><a href="https://www.scmagazine.com/analysis/asset-management/wipe-it-or-exfiltrate-how-russia-exploits-edge-infrastructure-to-disrupt-and-spy-during-wartime">Wipe it or exfiltrate? How Russia exploits edge infrastructure to disrupt and spy during wartime</a> (SC Media)</p><p><a href="https://www.wired.com/story/russia-ukraine-cyberattacks-mandiant/">Russia’s New Cyberwarfare in Ukraine Is Fast, Dirty, and Relentless</a> (WIRED)</p><p><a href="https://www.bleepingcomputer.com/news/security/russian-military-hackers-linked-to-ransomware-attacks-in-ukraine/">Russian military hackers linked to ransomware attacks in Ukraine</a> (BleepingComputer) </p><p><a href="https://cert.gov.ua/article/2724253">Information on cyberattacks of the group UAC-0118 (FRwL) using the Somnia malware (CERT-UA#5185)</a> (CERT-UA)</p><p><a href="https://www.bleepingcomputer.com/news/security/ukraine-says-russian-hacktivists-use-new-somnia-ransomware/">Ukraine says Russian hacktivists use new Somnia ransomware</a> (BleepingComputer) </p><p><a href="https://www.helpnetsecurity.com/2022/11/14/somnia-ransomware-ukrainian/">Russian hacktivists hit Ukrainian orgs with ransomware - but no ransom demands</a> (Help Net Security)</p><p><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/development-of-the-ukrainian-cyber-counter-offensive/">Development of the Ukrainian Cyber Counter-Offensive</a> (Trustwave) </p><p><a href="https://therecord.media/australian-federal-police-say-cybercriminals-in-russia-behind-medibank-hack/">Australian Federal Police say cybercriminals in Russia behind Medibank hack</a> (The Record by Recorded Future)</p><p><a href="https://techcrunch.com/2022/11/11/australia-tells-medibank-hackers-we-know-who-you-are/">Australia tells Medibank hackers: 'We know who you are'</a> (TechCrunch)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1702</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[419b9c0a-787a-11ec-abf0-4fef1abb8f55]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1585212101.mp3?updated=1690318946" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lauren Campanara: Learn to forgive yourself. [SOC Analyst] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/125/notes</link>
      <description>Lauren Campanara, a SOC Analyst from ThreatX shares her story as she made the decision to break into cybersecurity after spending twelve years in the cosmetology field. She worked her way through college in a job she did not enjoy and felt trapped in while competing her online degree. She found ThreatX and fell in love with the work she is doing now. Lauren hopes to inspire others, especially women, to consider a challenging and rewarding career in cybersecurity. She shares what it's like to be in a field she was not happy in and how she was the only one standing in her way to achieve her goals. She says "Another huge obstacle worth mentioning is learning to get out of my own way. You are your own worst critic. I learned to be more forgiving of myself." She hopes her story will inspire others to follow their dreams and stop holding themselves back.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 13 Nov 2022 08:00:00 -0000</pubDate>
      <itunes:title>Lauren Campanara: Learn to forgive yourself. [SOC Analyst] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>125</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Lauren Campanara, a SOC Analyst from ThreatX shares her story as she made the decision to break into cybersecurity after spending twelve years in the cosmetology field. She worked her way through college in a job she did not enjoy and felt trapped in while competing her online degree. She found ThreatX and fell in love with the work she is doing now. Lauren hopes to inspire others, especially women, to consider a challenging and rewarding career in cybersecurity. She shares what it's like to be in a field she was not happy in and how she was the only one standing in her way to achieve her goals. She says "Another huge obstacle worth mentioning is learning to get out of my own way. You are your own worst critic. I learned to be more forgiving of myself." She hopes her story will inspire others to follow their dreams and stop holding themselves back.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Lauren Campanara, a SOC Analyst from ThreatX shares her story as she made the decision to break into cybersecurity after spending twelve years in the cosmetology field. She worked her way through college in a job she did not enjoy and felt trapped in while competing her online degree. She found ThreatX and fell in love with the work she is doing now. Lauren hopes to inspire others, especially women, to consider a challenging and rewarding career in cybersecurity. She shares what it's like to be in a field she was not happy in and how she was the only one standing in her way to achieve her goals. She says "Another huge obstacle worth mentioning is learning to get out of my own way. You are your own worst critic. I learned to be more forgiving of myself." She hopes her story will inspire others to follow their dreams and stop holding themselves back.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>507</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4077d4f2-6130-11ed-bcdf-1f44ebeec187]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8014774233.mp3?updated=1668717755" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An in-depth look on the Crytox ransomware family. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/258/notes</link>
      <description>Deepen Desai from Zscaler sits down with Dave to talk about the Crytox ransomware family. First observed in 2020, Crytox is a ransomware family consisting of several stages of encrypted code that has fallen under the radar compared to other ransomware families. While other groups normally use double extortion attacks where data is both encrypted and held for ransom, Crytox does not perform this way.
The research says "The modus operandi of the group is to encrypt files on connected drives along with network drives, drop the uTox messenger application and then display a ransom note to the victim." It also shares how you may be compromised with this ransomware and goes through each stage in depth.
The research can be found here:
Technical Analysis of Crytox Ransomware

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Nov 2022 08:00:00 -0000</pubDate>
      <itunes:title>An in-depth look on the Crytox ransomware family. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>258</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Deepen Desai from Zscaler sits down with Dave to talk about the Crytox ransomware family. First observed in 2020, Crytox is a ransomware family consisting of several stages of encrypted code that has fallen under the radar compared to other ransomware families. While other groups normally use double extortion attacks where data is both encrypted and held for ransom, Crytox does not perform this way.
The research says "The modus operandi of the group is to encrypt files on connected drives along with network drives, drop the uTox messenger application and then display a ransom note to the victim." It also shares how you may be compromised with this ransomware and goes through each stage in depth.
The research can be found here:
Technical Analysis of Crytox Ransomware

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Deepen Desai from Zscaler sits down with Dave to talk about the Crytox ransomware family. First observed in 2020, Crytox is a ransomware family consisting of several stages of encrypted code that has fallen under the radar compared to other ransomware families. While other groups normally use double extortion attacks where data is both encrypted and held for ransom, Crytox does not perform this way.</p><p>The research says "The modus operandi of the group is to encrypt files on connected drives along with network drives, drop the uTox messenger application and then display a ransom note to the victim." It also shares how you may be compromised with this ransomware and goes through each stage in depth.</p><p>The research can be found here:</p><ul><li><a href="https://www.zscaler.com/blogs/security-research/technical-analysis-crytox-ransomware">Technical Analysis of Crytox Ransomware</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>840</itunes:duration>
      <guid isPermaLink="false"><![CDATA[4f88192e-6140-11ed-9e0d-0be9006d4461]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2693339623.mp3?updated=1685127223" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US midterms conclude without cyber interference. NATO on cyber defense. New APT41 activity identified. Russia’s FSB and SVR continue cyberespionage. Trends in phishing and API risks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1702/notes</link>
      <description>There’s no sign that cyberattacks affected US vote counts. NATO meets to discuss the Atlantic Alliance’s Cyber Defense Pledge. A new APT41 subgroup has been identified. FSB phishing impersonates Ukraine's SSCIP. A look at Cozy Bear's use of credential roaming. Caleb Barlow shares tips on removing implicit bias from your hiring process. Our guests are Valerie Abend and Lisa O'Connor from Accenture with a look at the difference in how women and men pursue the top cyber leadership roles. And an update on Phishing trends and API threats.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/217

Selected reading.
Statement from CISA Director Easterly on the Security of the 2022 Elections (Cybersecurity and Infrastructure Security Agency):
No ‘Specific or Credible’ Cyber Threats Affected Integrity of Midterms, CISA Says (Nextgov.com)
U.S. vote counting unaffected by cyberattacks, officials say (PBS NewsHour) 
What's 'Putin's chef' cooking up with talk on US meddling? (AP NEWS)
NATO’s 2022 Cyber Defense Pledge Conference - United States Department of State (United States Department of State)
Japan joins NATO cyber defense centre (Telecoms Tech News)
China casts wary eye as Japan signs up for Nato cybersecurity platform (South China Morning Post) 
Hack the Real Box: APT41’s New Subgroup Earth Longzhi (Trend Micro)
New hacking group uses custom 'Symatic' Cobalt Strike loaders (BleepingComputer)
They See Me Roaming: Following APT29 by Taking a Deeper Look at Windows Credential Roaming (Mandiant)
APT29 Exploited a Windows Feature to Compromise European Diplomatic Entity Network (The Hacker News)
CAUTION‼️ russian hackers are sending emails with malicious links from the SSSCIP (State Service of Special Communications and Information Protection of Ukraine) 
Russian hackers send out emails under the name of Ukraine's State Service of Special Communications and Information Protection (Yahoo)
Research Report | The State of Email Security 2022 (Tessian) 
DevOps Tools &amp; Infrastructure Under Attack (Wallarm)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 10 Nov 2022 21:15:00 -0000</pubDate>
      <itunes:title>US midterms conclude without cyber interference. NATO on cyber defense. New APT41 activity identified. Russia’s FSB and SVR continue cyberespionage. Trends in phishing and API risks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1702</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>There’s no sign that cyberattacks affected US vote counts. NATO meets to discuss the Atlantic Alliance’s Cyber Defense Pledge. A new APT41 subgroup has been identified. FSB phishing impersonates Ukraine's SSCIP. A look at Cozy Bear's use of credential roaming. Caleb Barlow shares tips on removing implicit bias from your hiring process. Our guests are Valerie Abend and Lisa O'Connor from Accenture with a look at the difference in how women and men pursue the top cyber leadership roles. And an update on Phishing trends and API threats.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/217

Selected reading.
Statement from CISA Director Easterly on the Security of the 2022 Elections (Cybersecurity and Infrastructure Security Agency):
No ‘Specific or Credible’ Cyber Threats Affected Integrity of Midterms, CISA Says (Nextgov.com)
U.S. vote counting unaffected by cyberattacks, officials say (PBS NewsHour) 
What's 'Putin's chef' cooking up with talk on US meddling? (AP NEWS)
NATO’s 2022 Cyber Defense Pledge Conference - United States Department of State (United States Department of State)
Japan joins NATO cyber defense centre (Telecoms Tech News)
China casts wary eye as Japan signs up for Nato cybersecurity platform (South China Morning Post) 
Hack the Real Box: APT41’s New Subgroup Earth Longzhi (Trend Micro)
New hacking group uses custom 'Symatic' Cobalt Strike loaders (BleepingComputer)
They See Me Roaming: Following APT29 by Taking a Deeper Look at Windows Credential Roaming (Mandiant)
APT29 Exploited a Windows Feature to Compromise European Diplomatic Entity Network (The Hacker News)
CAUTION‼️ russian hackers are sending emails with malicious links from the SSSCIP (State Service of Special Communications and Information Protection of Ukraine) 
Russian hackers send out emails under the name of Ukraine's State Service of Special Communications and Information Protection (Yahoo)
Research Report | The State of Email Security 2022 (Tessian) 
DevOps Tools &amp; Infrastructure Under Attack (Wallarm)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>There’s no sign that cyberattacks affected US vote counts. NATO meets to discuss the Atlantic Alliance’s Cyber Defense Pledge. A new APT41 subgroup has been identified. FSB phishing impersonates Ukraine's SSCIP. A look at Cozy Bear's use of credential roaming. Caleb Barlow shares tips on removing implicit bias from your hiring process. Our guests are Valerie Abend and Lisa O'Connor from Accenture with a look at the difference in how women and men pursue the top cyber leadership roles. And an update on Phishing trends and API threats.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/217</p><p><br></p><h2>Selected reading.</h2><p><a href="https://content.govdelivery.com/accounts/USDHSCISA/bulletins/3370b0e">Statement from CISA Director Easterly on the Security of the 2022 Elections</a> (Cybersecurity and Infrastructure Security Agency):</p><p><a href="https://www.nextgov.com/cybersecurity/2022/11/no-specific-or-credible-cyber-threats-affected-integrity-midterms-cisa-says/379546/">No ‘Specific or Credible’ Cyber Threats Affected Integrity of Midterms, CISA Says</a> (Nextgov.com)</p><p><a href="https://www.pbs.org/newshour/politics/u-s-vote-counting-unaffected-by-cyberattacks-officials-say">U.S. vote counting unaffected by cyberattacks, officials say</a> (PBS NewsHour) </p><p><a href="https://apnews.com/article/russia-ukraine-putin-2cd23245b4bd5251db9c3677fcb49dad">What's 'Putin's chef' cooking up with talk on US meddling?</a> (AP NEWS)</p><p><a href="https://www.state.gov/natos-2022-cyber-defense-pledge-conference/">NATO’s 2022 Cyber Defense Pledge Conference - United States Department of State</a> (United States Department of State)</p><p><a href="https://www.telecomstechnews.com/news/2022/nov/09/japan-joins-nato-cyber-defense-centre/">Japan joins NATO cyber defense centre</a> (Telecoms Tech News)</p><p><a href="https://www.scmp.com/news/china/diplomacy/article/3198898/china-casts-wary-eye-japan-signs-nato-cybersecurity-platform">China casts wary eye as Japan signs up for Nato cybersecurity platform</a> (South China Morning Post) </p><p><a href="https://www.trendmicro.com/en_us/research/22/k/hack-the-real-box-apt41-new-subgroup-earth-longzhi.html">Hack the Real Box: APT41’s New Subgroup Earth Longzhi</a> (Trend Micro)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-hacking-group-uses-custom-symatic-cobalt-strike-loaders/">New hacking group uses custom 'Symatic' Cobalt Strike loaders</a> (BleepingComputer)</p><p><a href="https://www.mandiant.com/resources/blog/apt29-windows-credential-roaming">They See Me Roaming: Following APT29 by Taking a Deeper Look at Windows Credential Roaming</a> (Mandiant)</p><p><a href="https://thehackernews.com/2022/11/apt29-exploited-windows-feature-to.html">APT29 Exploited a Windows Feature to Compromise European Diplomatic Entity Network</a> (The Hacker News)</p><p><a href="https://cip.gov.ua/en/news/uvaga-rosiiski-khakeri-rozsilayut-listi-zi-shkidlivimi-linkami-vid-imeni-derzhspeczv-yazku">CAUTION‼️ russian hackers are sending emails with malicious links from the SSSCIP</a> (State Service of Special Communications and Information Protection of Ukraine) </p><p><a href="https://news.yahoo.com/russian-hackers-send-emails-under-114628404.html">Russian hackers send out emails under the name of Ukraine's State Service of Special Communications and Information Protection</a> (Yahoo)</p><p><a href="https://www.tessian.com/research/state-of-email-security-2022/">Research Report | The State of Email Security 2022</a> (Tessian) </p><p><a href="https://hubspot.wallarm.com/hubfs/Wallarm%20Q3-2022%20API%20ThreatStats%20Report%20Infographic.pdf">DevOps Tools &amp; Infrastructure Under Attack</a> (Wallarm)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1945</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3ffe50fe-787a-11ec-abf0-3317e9937f18]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7153437212.mp3?updated=1690318543" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A look back at midterm cybersecurity. Communications security lessons learned in Ukraine. Known Exploited Vulnerabilities and Patch Tuesday. Off-boarding deserves some attention. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1701/notes</link>
      <description>US midterm elections proceed without cyber disruption. Communications security lessons learned. CISA publishes new entries to its Known Exploited Vulnerabilities Catalog. Patch Tuesday notes. Carole Theriault examines cross border money laundering. The FBI’s Bryan Vorndran offers guidance on how companies should think about their exposure in china. And a recent study finds reasons to be concerned about off-boarding.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/216

Selected reading.
Taking a look at election security on US midterm Election Day. (CyberWire)
Communications Security: Lessons Learned From Ukraine (BlackBerry)
CISA Adds Seven Known Exploited Vulnerabilities to Catalog (CISA)
Microsoft November 2022 Patch Tuesday (SANS Institute) 
November Patch Tuesday Updates | 2022 (Syxsense Inc) 
Microsoft Fixes Six Actively Exploited Flaws (Decipher) 
Microsoft fixes ProxyNotShell Exchange zero-days exploited in attacks (BleepingComputer)
Microsoft Scrambles to Thwart New Zero-Day Attacks (SecurityWeek) 
Infrastructure access and security. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 09 Nov 2022 21:15:00 -0000</pubDate>
      <itunes:title>A look back at midterm cybersecurity. Communications security lessons learned in Ukraine. Known Exploited Vulnerabilities and Patch Tuesday. Off-boarding deserves some attention. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1701</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>US midterm elections proceed without cyber disruption. Communications security lessons learned. CISA publishes new entries to its Known Exploited Vulnerabilities Catalog. Patch Tuesday notes. Carole Theriault examines cross border money laundering. The FBI’s Bryan Vorndran offers guidance on how companies should think about their exposure in china. And a recent study finds reasons to be concerned about off-boarding.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/216

Selected reading.
Taking a look at election security on US midterm Election Day. (CyberWire)
Communications Security: Lessons Learned From Ukraine (BlackBerry)
CISA Adds Seven Known Exploited Vulnerabilities to Catalog (CISA)
Microsoft November 2022 Patch Tuesday (SANS Institute) 
November Patch Tuesday Updates | 2022 (Syxsense Inc) 
Microsoft Fixes Six Actively Exploited Flaws (Decipher) 
Microsoft fixes ProxyNotShell Exchange zero-days exploited in attacks (BleepingComputer)
Microsoft Scrambles to Thwart New Zero-Day Attacks (SecurityWeek) 
Infrastructure access and security. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>US midterm elections proceed without cyber disruption. Communications security lessons learned. CISA publishes new entries to its Known Exploited Vulnerabilities Catalog. Patch Tuesday notes. Carole Theriault examines cross border money laundering. The FBI’s Bryan Vorndran offers guidance on how companies should think about their exposure in china. And a recent study finds reasons to be concerned about off-boarding.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/216</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/stories/2452d45fa5234379bba9a07f02d39821/taking-a-look-at-election-security-on-us-midterm-election-day">Taking a look at election security on US midterm Election Day.</a> (CyberWire)</p><p><a href="https://blogs.blackberry.com/en/2022/11/communications-security-lessons-learned-from-ukraine">Communications Security: Lessons Learned From Ukraine</a> (BlackBerry)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/11/08/cisa-adds-seven-known-exploited-vulnerabilities-catalog">CISA Adds Seven Known Exploited Vulnerabilities to Catalog</a> (CISA)</p><p><a href="https://isc.sans.edu/diary/Microsoft+November+2022+Patch+Tuesday/29230/">Microsoft November 2022 Patch Tuesday</a> (SANS Institute) </p><p><a href="https://www.syxsense.com/november-patch-tuesday-updates-2022">November Patch Tuesday Updates | 2022</a> (Syxsense Inc) </p><p><a href="https://duo.com/decipher/microsoft-fixes-six-actively-exploited-flaws">Microsoft Fixes Six Actively Exploited Flaws</a> (Decipher) </p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-proxynotshell-exchange-zero-days-exploited-in-attacks/">Microsoft fixes ProxyNotShell Exchange zero-days exploited in attacks</a> (BleepingComputer)</p><p><a href="https://www.securityweek.com/patch-tuesday-microsoft-scrambles-thwart-new-zero-day-attacks">Microsoft Scrambles to Thwart New Zero-Day Attacks</a> (SecurityWeek) </p><p><a href="https://thecyberwire.com/stories/8da340e6a0254b6d81886fd5e01618e6/infrastructure-access-and-security">Infrastructure access and security.</a> (CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1315</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[405d3c9a-787a-11ec-abf0-73692e966827]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3599990643.mp3?updated=1690318524" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybersecurity on US Election Day. OPERA1ER threat activity. Insider threats. Hacktivist auxiliaries: influence operators in the hybrid war. And Mr. Hushpuppi is back in the news.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1700/notes</link>
      <description>Cybersecurity on US Election Day. Details on the OPERA1ER threat activity. Seasonal and secular trends in Insider threats. Hacktivist auxiliaries: influence operators in the hybrid war. Ben Yelin reviews election security and misinformation. Ann Johnson from Afternoon Cyber Tea speaks with Dr. Ryan Louie about the growing issue of mental illness among cybersecurity professionals. And, hey everybody, Mr. Hushpuppi is back in the news (and back in the slammer, the hoosgow, the big house…you get the picture…a sabbatical at Club Fed.)
Disclaimer: The content and views expressed do not constitute medical advice and are not a substitute for professional medical advice, diagnosis, or treatment. If you need help, please contact your medical provider. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/215

Selected reading.
Your Election Day cyber guide (Washington Post) 
Putin-linked businessman admits to US election meddling (AP NEWS)
OPERA1OR: Playing god without permission (Group-IB) 
DTEX i3 Team Insider Risk Stats for 2022 (DTEX Systems Inc) 
Killnet targets Eastern Bloc government sites, but fails to keep them offline (The Record by Recorded Future)
Ukrainian hacktivists claim to leak trove of documents from Russia’s central bank (The Record by Recorded Future)
Notorious Nigerian influencer ‘Billionaire Gucci Master’ sentenced to 11 years in jail in the U.S. for fraud (Forbes)
Hushpuppi: Notorious Nigerian fraudster jailed for 11 years in US (BBC)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Nov 2022 21:30:00 -0000</pubDate>
      <itunes:title>Cybersecurity on US Election Day. OPERA1ER threat activity. Insider threats. Hacktivist auxiliaries: influence operators in the hybrid war. And Mr. Hushpuppi is back in the news.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1700</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cybersecurity on US Election Day. Details on the OPERA1ER threat activity. Seasonal and secular trends in Insider threats. Hacktivist auxiliaries: influence operators in the hybrid war. Ben Yelin reviews election security and misinformation. Ann Johnson from Afternoon Cyber Tea speaks with Dr. Ryan Louie about the growing issue of mental illness among cybersecurity professionals. And, hey everybody, Mr. Hushpuppi is back in the news (and back in the slammer, the hoosgow, the big house…you get the picture…a sabbatical at Club Fed.)
Disclaimer: The content and views expressed do not constitute medical advice and are not a substitute for professional medical advice, diagnosis, or treatment. If you need help, please contact your medical provider. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/215

Selected reading.
Your Election Day cyber guide (Washington Post) 
Putin-linked businessman admits to US election meddling (AP NEWS)
OPERA1OR: Playing god without permission (Group-IB) 
DTEX i3 Team Insider Risk Stats for 2022 (DTEX Systems Inc) 
Killnet targets Eastern Bloc government sites, but fails to keep them offline (The Record by Recorded Future)
Ukrainian hacktivists claim to leak trove of documents from Russia’s central bank (The Record by Recorded Future)
Notorious Nigerian influencer ‘Billionaire Gucci Master’ sentenced to 11 years in jail in the U.S. for fraud (Forbes)
Hushpuppi: Notorious Nigerian fraudster jailed for 11 years in US (BBC)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cybersecurity on US Election Day. Details on the OPERA1ER threat activity. Seasonal and secular trends in Insider threats. Hacktivist auxiliaries: influence operators in the hybrid war. Ben Yelin reviews election security and misinformation. Ann Johnson from Afternoon Cyber Tea speaks with Dr. Ryan Louie about the growing issue of mental illness among cybersecurity professionals. And, hey everybody, Mr. Hushpuppi is back in the news (and back in the slammer, the hoosgow, the big house…you get the picture…a sabbatical at Club Fed.)</p><p><em>Disclaimer: The content and views expressed do not constitute medical advice and are not a substitute for professional medical advice, diagnosis, or treatment. If you need help, please contact your medical provider. </em></p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/215</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.washingtonpost.com/politics/2022/11/08/your-election-day-cyber-guide/">Your Election Day cyber guide</a> (Washington Post) </p><p><a href="https://apnews.com/article/2022-midterm-elections-business-social-media-7fefa7ab0491b653f6094a4d090155fe">Putin-linked businessman admits to US election meddling</a> (AP NEWS)</p><p><a href="https://explore.group-ib.com/opera1er-eng/report-opera1er-eng?utm_source=press_release&amp;utm_source=press_release">OPERA1OR: Playing god without permission</a> (Group-IB) </p><p><a href="https://www.dtexsystems.com/resource/dtex-i3-team-insider-risk-stats-for-2022/">DTEX i3 Team Insider Risk Stats for 2022</a> (DTEX Systems Inc) </p><p><a href="https://therecord.media/killnet-targets-eastern-bloc-government-sites-but-fails-to-keep-them-offline/">Killnet targets Eastern Bloc government sites, but fails to keep them offline</a> (The Record by Recorded Future)</p><p><a href="https://therecord.media/ukrainian-hacktivists-claim-to-leak-trove-of-documents-from-russias-central-bank/">Ukrainian hacktivists claim to leak trove of documents from Russia’s central bank</a> (The Record by Recorded Future)</p><p><a href="https://fortune.com/2022/11/08/notorious-nigerian-influencer-billionaire-gucci-master-sentenced-11-years-jail-us-for-fraud/">Notorious Nigerian influencer ‘Billionaire Gucci Master’ sentenced to 11 years in jail in the U.S. for fraud</a> (Forbes)</p><p><a href="https://www.bbc.com/news/world-africa-63542573">Hushpuppi: Notorious Nigerian fraudster jailed for 11 years in US</a> (BBC)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1635</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[413c51f0-787a-11ec-abf0-0f7c450cb85e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6634559577.mp3?updated=1690318509" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Election security on the eve of the US midterms. US FBI rates the hacktivist threat. Microsoft says China uses disclosure laws to develop zero-days. Remember SIlk Road? The Feds do.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1699/notes</link>
      <description>Election security on the eve of the US midterms. US FBI rates hacktivist contributions to Russia's war as unimportant. Microsoft accuses China of using vulnerability disclosure to develop zero-days. Andrea Little Limbago from Interos addresses accountability for breaches. Our guest is Michelle Amante from the Partnership for Public Service on their Cybersecurity Talent Initiative. And, finally, remember SIlk Road? The Feds do.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/214

Selected reading.
Hacktivists Use of DDoS Activity Causes Minor Impacts (FBI)
The government says it won’t flag election disinformation on Twitter and other social platforms (Washington Post)
What to Expect When You are Expecting an Election (CISA)
Hacktivists Use of DDoS Activity Causes Minor Impacts (FBI) 
Nation-state cyberattacks become more brazen as authoritarian leaders ramp up aggression (Microsoft On the Issues) 
U.S. Attorney Announces Historic $3.36 Billion Cryptocurrency Seizure And Conviction In Connection With Silk Road Dark Web Fraud (U.S. Attorney’s Office for the Southern District of New York)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 07 Nov 2022 21:15:00 -0000</pubDate>
      <itunes:title>Election security on the eve of the US midterms. US FBI rates the hacktivist threat. Microsoft says China uses disclosure laws to develop zero-days. Remember SIlk Road? The Feds do.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1699</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Election security on the eve of the US midterms. US FBI rates hacktivist contributions to Russia's war as unimportant. Microsoft accuses China of using vulnerability disclosure to develop zero-days. Andrea Little Limbago from Interos addresses accountability for breaches. Our guest is Michelle Amante from the Partnership for Public Service on their Cybersecurity Talent Initiative. And, finally, remember SIlk Road? The Feds do.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/214

Selected reading.
Hacktivists Use of DDoS Activity Causes Minor Impacts (FBI)
The government says it won’t flag election disinformation on Twitter and other social platforms (Washington Post)
What to Expect When You are Expecting an Election (CISA)
Hacktivists Use of DDoS Activity Causes Minor Impacts (FBI) 
Nation-state cyberattacks become more brazen as authoritarian leaders ramp up aggression (Microsoft On the Issues) 
U.S. Attorney Announces Historic $3.36 Billion Cryptocurrency Seizure And Conviction In Connection With Silk Road Dark Web Fraud (U.S. Attorney’s Office for the Southern District of New York)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Election security on the eve of the US midterms. US FBI rates hacktivist contributions to Russia's war as unimportant. Microsoft accuses China of using vulnerability disclosure to develop zero-days. Andrea Little Limbago from Interos addresses accountability for breaches. Our guest is Michelle Amante from the Partnership for Public Service on their Cybersecurity Talent Initiative. And, finally, remember SIlk Road? The Feds do.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/214</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.ic3.gov/Media/News/2022/221104.pdf">Hacktivists Use of DDoS Activity Causes Minor Impacts</a> (FBI)</p><p><a href="https://www.washingtonpost.com/politics/2022/11/07/cisa-is-taking-hands-off-approach-election-lies-twitter/">The government says it won’t flag election disinformation on Twitter and other social platforms</a> (Washington Post)</p><p><a href="https://www.cisa.gov/blog/2022/11/04/what-expect-when-you-are-expecting-election">What to Expect When You are Expecting an Election</a> (CISA)</p><p><a href="https://www.ic3.gov/Media/News/2022/221104.pdf">Hacktivists Use of DDoS Activity Causes Minor Impacts</a> (FBI) </p><p><a href="https://blogs.microsoft.com/on-the-issues/2022/11/04/microsoft-digital-defense-report-2022-ukraine/">Nation-state cyberattacks become more brazen as authoritarian leaders ramp up aggression</a> (Microsoft On the Issues) </p><p><a href="https://www.justice.gov/usao-sdny/pr/us-attorney-announces-historic-336-billion-cryptocurrency-seizure-and-conviction">U.S. Attorney Announces Historic $3.36 Billion Cryptocurrency Seizure And Conviction In Connection With Silk Road Dark Web Fraud</a> (U.S. Attorney’s Office for the Southern District of New York)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1564</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[417bcfd8-787a-11ec-abf0-3f52fa244944]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1730243487.mp3?updated=1690318491" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Gary Brickhouse: Riding the wave of growth. [CISO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/124/notes</link>
      <description>Gary Brickhouse, CISO from GuidePoint Security, sits down to share his story, looking back over the last 25 years of his career working for Fortune 100 companies, including Disney. He shares that every role he has had, he’s had to grow into and how each one was a pivotal point in his technical career. Gary ended up transitioning to a different organization and says how it was really compliance that was the transitional sort of moment for him as he grew into different roles. He says, “What I found was sort of just, riding the wave of growth and opportunity and trying to take advantage of it along the way." He shares some advice for new people entering the industry, saying that he wants to help shatter the myth that you have to be technical to get into this field. We thank Gary for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 06 Nov 2022 08:00:00 -0000</pubDate>
      <itunes:title>Gary Brickhouse: Riding the wave of growth. [CISO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>124</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Gary Brickhouse, CISO from GuidePoint Security, sits down to share his story, looking back over the last 25 years of his career working for Fortune 100 companies, including Disney. He shares that every role he has had, he’s had to grow into and how each one was a pivotal point in his technical career. Gary ended up transitioning to a different organization and says how it was really compliance that was the transitional sort of moment for him as he grew into different roles. He says, “What I found was sort of just, riding the wave of growth and opportunity and trying to take advantage of it along the way." He shares some advice for new people entering the industry, saying that he wants to help shatter the myth that you have to be technical to get into this field. We thank Gary for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Gary Brickhouse, CISO from GuidePoint Security, sits down to share his story, looking back over the last 25 years of his career working for Fortune 100 companies, including Disney. He shares that every role he has had, he’s had to grow into and how each one was a pivotal point in his technical career. Gary ended up transitioning to a different organization and says how it was really compliance that was the transitional sort of moment for him as he grew into different roles. He says, “What I found was sort of just, riding the wave of growth and opportunity and trying to take advantage of it along the way." He shares some advice for new people entering the industry, saying that he wants to help shatter the myth that you have to be technical to get into this field. We thank Gary for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>549</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2e86305e-5c62-11ed-a8a8-1f6760503a1e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2445348953.mp3?updated=1667579297" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Over-the-air 0-day vulnerabilities. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/257/notes</link>
      <description>Roya Gordon from Nozomi Networks sits down with Dave to discuss their work "UWB Real Time Locating Systems: How Secure Radio Communications May Fail in Practice." Ultra-wideband (UWB) is a rapidly-growing radio technology that, according to the UWB Alliance, is forecasted to drive sales volumes exceeding one billion devices annually by 2025.
In an effort to strengthen the security of devices utilizing UWB, Nozomi Networks Labs conducted a security assessment of two popular UWB RTLS solutions available on the market. Their research reveals 0-day vulnerabilities and other weaknesses that, if exploited, could allow an attacker to gain full access to all sensitive location data exchanged over-the-air.
The research can be found here:
UWB Real Time Locating Systems: How Secure Radio Communications May Fail in Practice

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Nov 2022 07:00:00 -0000</pubDate>
      <itunes:title>Over-the-air 0-day vulnerabilities. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>257</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Roya Gordon from Nozomi Networks sits down with Dave to discuss their work "UWB Real Time Locating Systems: How Secure Radio Communications May Fail in Practice." Ultra-wideband (UWB) is a rapidly-growing radio technology that, according to the UWB Alliance, is forecasted to drive sales volumes exceeding one billion devices annually by 2025.
In an effort to strengthen the security of devices utilizing UWB, Nozomi Networks Labs conducted a security assessment of two popular UWB RTLS solutions available on the market. Their research reveals 0-day vulnerabilities and other weaknesses that, if exploited, could allow an attacker to gain full access to all sensitive location data exchanged over-the-air.
The research can be found here:
UWB Real Time Locating Systems: How Secure Radio Communications May Fail in Practice

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Roya Gordon from Nozomi Networks sits down with Dave to discuss their work "UWB Real Time Locating Systems: How Secure Radio Communications May Fail in Practice." Ultra-wideband (UWB) is a rapidly-growing radio technology that, according to the UWB Alliance, is forecasted to drive sales volumes exceeding one billion devices annually by 2025.</p><p>In an effort to strengthen the security of devices utilizing UWB, Nozomi Networks Labs conducted a security assessment of two popular UWB RTLS solutions available on the market. Their research reveals 0-day vulnerabilities and other weaknesses that, if exploited, could allow an attacker to gain full access to all sensitive location data exchanged over-the-air.</p><p>The research can be found here:</p><ul><li><a href="https://www.nozominetworks.com/downloads/US/Nozomi-Networks-WP-UWB-Real-Time-Locating-Systems.pdf">UWB Real Time Locating Systems: How Secure Radio Communications May Fail in Practice</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1287</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e0c9a310-5bb1-11ed-9a21-bff735188d03]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9506350978.mp3?updated=1685127219" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Flight-planning and rail services disrupted in separate incidents. BEC gang impersonates law firms. Effects of the hybrid war on action in cyberspace. And a farewell to Vitali Kremez, gone far too soon. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1698/notes</link>
      <description>Flight-planning services are affected by cyberattack, as are Danish rail service. A BEC gang impersonates international law firms. Effects of the hybrid war on action in cyberspace. Deepen Desai from Zscaler examines the evolution of the X-FILES Stealer. CyberWire Space Correspondent Maria Varmazis has an analysis of the Starlink situation in Ukraine. And a sad, final farewell to Vitali Kremez, gone far too soon.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/213

Selected reading.
Boeing subsidiary Jeppesen's services impacted by cyber incident (Reuters)
BREAKING: Boeing's Jeppesen Subsidiary Hit With Potential Ransomware Attack (Live and Let's Fly)
Danish train standstill on Saturday caused by cyber attack (Reuters)
Cyber incident at Boeing subsidiary causes flight planning disruptions (The Record by Recorded Future)
Crimson Kingsnake: BEC Group Impersonates International Law Firms in… (Abnormal Security)
New Crimson Kingsnake gang impersonates law firms in BEC attacks (BleepingComputer) 
Ukraine war, geopolitics fuelling cybersecurity attacks -EU agency (Reuters) 
Microsoft Extends Aid for Ukraine's Wartime Tech Innovation (SecurityWeek) 
Evaluating the International Support to Ukrainian Cyber Defense (Carnegie Endowment for International Peace)
Cyber community mourns renowned researcher Vitali Kremez (The Record by Recorded Future)
Remembering Vitali Kremez, Threat Intelligence Researcher (Bank Info Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 04 Nov 2022 21:15:00 -0000</pubDate>
      <itunes:title>Flight-planning and rail services disrupted in separate incidents. BEC gang impersonates law firms. Effects of the hybrid war on action in cyberspace. And a farewell to Vitali Kremez, gone far too soon. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1698</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Flight-planning services are affected by cyberattack, as are Danish rail service. A BEC gang impersonates international law firms. Effects of the hybrid war on action in cyberspace. Deepen Desai from Zscaler examines the evolution of the X-FILES Stealer. CyberWire Space Correspondent Maria Varmazis has an analysis of the Starlink situation in Ukraine. And a sad, final farewell to Vitali Kremez, gone far too soon.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/213

Selected reading.
Boeing subsidiary Jeppesen's services impacted by cyber incident (Reuters)
BREAKING: Boeing's Jeppesen Subsidiary Hit With Potential Ransomware Attack (Live and Let's Fly)
Danish train standstill on Saturday caused by cyber attack (Reuters)
Cyber incident at Boeing subsidiary causes flight planning disruptions (The Record by Recorded Future)
Crimson Kingsnake: BEC Group Impersonates International Law Firms in… (Abnormal Security)
New Crimson Kingsnake gang impersonates law firms in BEC attacks (BleepingComputer) 
Ukraine war, geopolitics fuelling cybersecurity attacks -EU agency (Reuters) 
Microsoft Extends Aid for Ukraine's Wartime Tech Innovation (SecurityWeek) 
Evaluating the International Support to Ukrainian Cyber Defense (Carnegie Endowment for International Peace)
Cyber community mourns renowned researcher Vitali Kremez (The Record by Recorded Future)
Remembering Vitali Kremez, Threat Intelligence Researcher (Bank Info Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Flight-planning services are affected by cyberattack, as are Danish rail service. A BEC gang impersonates international law firms. Effects of the hybrid war on action in cyberspace. Deepen Desai from Zscaler examines the evolution of the X-FILES Stealer. CyberWire Space Correspondent Maria Varmazis has an analysis of the Starlink situation in Ukraine. And a sad, final farewell to Vitali Kremez, gone far too soon.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/213</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.reuters.com/business/aerospace-defense/boeing-subsidiary-jeppesens-services-impacted-by-cyber-incident-2022-11-04/">Boeing subsidiary Jeppesen's services impacted by cyber incident</a> (Reuters)</p><p><a href="https://liveandletsfly.com/boeing-jeppesen-ransomware-attack/">BREAKING: Boeing's Jeppesen Subsidiary Hit With Potential Ransomware Attack</a> (Live and Let's Fly)</p><p><a href="https://www.reuters.com/technology/danish-train-standstill-saturday-caused-by-cyber-attack-2022-11-03/">Danish train standstill on Saturday caused by cyber attack</a> (Reuters)</p><p><a href="https://therecord.media/cyber-incident-at-boeing-subsidiary-causes-flight-planning-disruptions/">Cyber incident at Boeing subsidiary causes flight planning disruptions</a> (The Record by Recorded Future)</p><p><a href="https://abnormalsecurity.com/blog/crimson-kingsnake-bec-group-attacks">Crimson Kingsnake: BEC Group Impersonates International Law Firms in…</a> (Abnormal Security)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-crimson-kingsnake-gang-impersonates-law-firms-in-bec-attacks/">New Crimson Kingsnake gang impersonates law firms in BEC attacks</a> (BleepingComputer) </p><p><a href="https://www.reuters.com/world/europe/ukraine-war-geopolitics-fuelling-cybersecurity-attacks-eu-agency-2022-11-03/">Ukraine war, geopolitics fuelling cybersecurity attacks -EU agency</a> (Reuters) </p><p><a href="https://www.securityweek.com/microsoft-extends-aid-ukraines-wartime-tech-innovation">Microsoft Extends Aid for Ukraine's Wartime Tech Innovation</a> (SecurityWeek) </p><p><a href="https://carnegieendowment.org/2022/11/03/evaluating-international-support-to-ukrainian-cyber-defense-pub-88322">Evaluating the International Support to Ukrainian Cyber Defense</a> (Carnegie Endowment for International Peace)</p><p><a href="https://therecord.media/cyber-community-mourns-renowned-researcher-vitali-kremez/">Cyber community mourns renowned researcher Vitali Kremez</a> (The Record by Recorded Future)</p><p><a href="https://www.bankinfosecurity.com/blogs/remembering-vitali-kremez-threat-intelligence-researcher-p-3309">Remembering Vitali Kremez, Threat Intelligence Researcher</a> (Bank Info Security)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1509</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3f3fb4c8-787a-11ec-abf0-672253c2bc37]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8051191856.mp3?updated=1690318477" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>“Static expressway” tactics in credential harvesting. Emotet is back. Black Basta linked to Fin7. RomCom hits Ukrainian targets and warms up against the Anglo-Saxons. Cyber cooperation?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1697/notes</link>
      <description>Leveraging Microsoft Dynamics 365 Customer Voice for credential harvesting. Emotet is back. Black Basta ransomware linked to Fin7. A Russophone gang increases activity against Ukrainian targets. Betsy Carmelite from Booz Allen Hamilton on adversary-informed defense. Our guest is Tom Gorup of Alert Logic with a view on cybersecurity from a combat veteran. And Russia regrets that old US lack of cooperation in cyberspace–things would be so much better if the Anglo-Saxons didn’t think cyberspace was the property of the East India Company. Or something like that.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/212

Selected reading.
Abusing Microsoft Customer Voice to Send Phishing Links (Avanan) 
Emotet botnet starts blasting malware again after 5 month break (BleepingComputer) 
Black Basta Ransomware | Attacks Deploy Custom EDR Evasion Tools Tied to FIN7 Threat Actor (SentinelOne) 
RomCom Threat Actor Abuses KeePass and SolarWinds to Target Ukraine and Potentially the United Kingdom (BlackBerry) 
Russia cyber director warns no U.S. cooperation risks "mutual destruction" (Newsweek)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 03 Nov 2022 20:15:00 -0000</pubDate>
      <itunes:title>“Static expressway” tactics in credential harvesting. Emotet is back. Black Basta linked to Fin7. RomCom hits Ukrainian targets and warms up against the Anglo-Saxons. Cyber cooperation?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1697</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Leveraging Microsoft Dynamics 365 Customer Voice for credential harvesting. Emotet is back. Black Basta ransomware linked to Fin7. A Russophone gang increases activity against Ukrainian targets. Betsy Carmelite from Booz Allen Hamilton on adversary-informed defense. Our guest is Tom Gorup of Alert Logic with a view on cybersecurity from a combat veteran. And Russia regrets that old US lack of cooperation in cyberspace–things would be so much better if the Anglo-Saxons didn’t think cyberspace was the property of the East India Company. Or something like that.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/212

Selected reading.
Abusing Microsoft Customer Voice to Send Phishing Links (Avanan) 
Emotet botnet starts blasting malware again after 5 month break (BleepingComputer) 
Black Basta Ransomware | Attacks Deploy Custom EDR Evasion Tools Tied to FIN7 Threat Actor (SentinelOne) 
RomCom Threat Actor Abuses KeePass and SolarWinds to Target Ukraine and Potentially the United Kingdom (BlackBerry) 
Russia cyber director warns no U.S. cooperation risks "mutual destruction" (Newsweek)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Leveraging Microsoft Dynamics 365 Customer Voice for credential harvesting. Emotet is back. Black Basta ransomware linked to Fin7. A Russophone gang increases activity against Ukrainian targets. Betsy Carmelite from Booz Allen Hamilton on adversary-informed defense. Our guest is Tom Gorup of Alert Logic with a view on cybersecurity from a combat veteran. And Russia regrets that old US lack of cooperation in cyberspace–things would be so much better if the Anglo-Saxons didn’t think cyberspace was the property of the East India Company. Or something like that.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/212</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.avanan.com/blog/abusing-microsoft-customer-voice-to-send-phishing-links">Abusing Microsoft Customer Voice to Send Phishing Links</a> (Avanan) </p><p><a href="https://www.bleepingcomputer.com/news/security/emotet-botnet-starts-blasting-malware-again-after-5-month-break/">Emotet botnet starts blasting malware again after 5 month break</a> (BleepingComputer) </p><p><a href="https://www.sentinelone.com/labs/black-basta-ransomware-attacks-deploy-custom-edr-evasion-tools-tied-to-fin7-threat-actor/">Black Basta Ransomware | Attacks Deploy Custom EDR Evasion Tools Tied to FIN7 Threat Actor</a> (SentinelOne) </p><p><a href="https://blogs.blackberry.com/en/2022/11/romcom-spoofing-solarwinds-keepass">RomCom Threat Actor Abuses KeePass and SolarWinds to Target Ukraine and Potentially the United Kingdom </a>(BlackBerry) </p><p><a href="https://www.newsweek.com/russia-cyber-director-warns-no-us-cooperation-risks-mutual-destruction-1756492">Russia cyber director warns no U.S. cooperation risks "mutual destruction"</a> (Newsweek)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1644</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[401e2668-787a-11ec-abf0-9b7e640ef3d7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7668186813.mp3?updated=1690318462" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OpenSSL indeed patched. CISA is confident of election security. Killnet attempted DDoS against the US Treasury. XDR data reveals threat trends. BEC and gift cards. And that’s one sweet ride.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1696/notes</link>
      <description>OpenSSL patches two vulnerabilities. CISA and election security. Killnet attempted DDoS against the US Treasury. XDR data reveals threat trends. Business email compromise and gift cards. Tim Starks from the Washington Posts’ Cybersecurity 202 has the latest on election security. A visit to the CyberWire’s Women in Cyber Security event. And consequences for Raccoon Stealer from the war in Ukraine.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/211

Selected reading.
OpenSSL patched today. (CyberWire)
OpenSSL Releases Security Update (CISA) 
OpenSSL releases fixes for two ‘high’ severity vulnerabilities (The Record by Recorded Future)
OpenSSL patches are out – CRITICAL bug downgraded to HIGH, but patch anyway! (Naked Security)
Threat Advisory: High Severity OpenSSL Vulnerabilities (Cisco Talos Blog)
OpenSSL Vulnerability Patch Released (Sectigo® Official)
Clearing the Fog Over the New OpenSSL Vulnerabilities (Rezilion)
OpenSSL vulnerability CVE-2022-3602 (Remote Code Execution) and CVE-2022-3786 (Denial of Service) Check Point Research Update (Check Point Software)
Undisclosed OpenSSL vulnerability: Free scripts for target scoping (Lightspin)
Discussions of CISA’s part in elections and the JCDC. (CyberWire)
U.S. Treasury thwarted attack by Russian hacker group last month-official (Reuters) 
XDR data reveals threat trends. (CyberWire)
What happens to a gift card given to a scammer? (CyberWire)
How Russia’s war in Ukraine helped the FBI crack one of the biggest cybercrime cases in years (MarketWatch)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 02 Nov 2022 20:15:00 -0000</pubDate>
      <itunes:title>OpenSSL indeed patched. CISA is confident of election security. Killnet attempted DDoS against the US Treasury. XDR data reveals threat trends. BEC and gift cards. And that’s one sweet ride.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1696</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>OpenSSL patches two vulnerabilities. CISA and election security. Killnet attempted DDoS against the US Treasury. XDR data reveals threat trends. Business email compromise and gift cards. Tim Starks from the Washington Posts’ Cybersecurity 202 has the latest on election security. A visit to the CyberWire’s Women in Cyber Security event. And consequences for Raccoon Stealer from the war in Ukraine.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/211

Selected reading.
OpenSSL patched today. (CyberWire)
OpenSSL Releases Security Update (CISA) 
OpenSSL releases fixes for two ‘high’ severity vulnerabilities (The Record by Recorded Future)
OpenSSL patches are out – CRITICAL bug downgraded to HIGH, but patch anyway! (Naked Security)
Threat Advisory: High Severity OpenSSL Vulnerabilities (Cisco Talos Blog)
OpenSSL Vulnerability Patch Released (Sectigo® Official)
Clearing the Fog Over the New OpenSSL Vulnerabilities (Rezilion)
OpenSSL vulnerability CVE-2022-3602 (Remote Code Execution) and CVE-2022-3786 (Denial of Service) Check Point Research Update (Check Point Software)
Undisclosed OpenSSL vulnerability: Free scripts for target scoping (Lightspin)
Discussions of CISA’s part in elections and the JCDC. (CyberWire)
U.S. Treasury thwarted attack by Russian hacker group last month-official (Reuters) 
XDR data reveals threat trends. (CyberWire)
What happens to a gift card given to a scammer? (CyberWire)
How Russia’s war in Ukraine helped the FBI crack one of the biggest cybercrime cases in years (MarketWatch)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>OpenSSL patches two vulnerabilities. CISA and election security. Killnet attempted DDoS against the US Treasury. XDR data reveals threat trends. Business email compromise and gift cards. Tim Starks from the Washington Posts’ Cybersecurity 202 has the latest on election security. A visit to the CyberWire’s Women in Cyber Security event. And consequences for Raccoon Stealer from the war in Ukraine.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/211</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/stories/140d684c144d47fa9535374a769ab37b/openssl-patched-today">OpenSSL patched today</a>. (CyberWire)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/11/01/openssl-releases-security-update">OpenSSL Releases Security Update</a> (CISA) </p><p><a href="https://therecord.media/openssl-releases-fixes-for-two-high-severity-vulnerabilities/">OpenSSL releases fixes for two ‘high’ severity vulnerabilities</a> (The Record by Recorded Future)</p><p><a href="https://nakedsecurity.sophos.com/2022/11/01/openssl-patches-are-out-critical-bug-downgraded-to-high-but-patch-anyway/">OpenSSL patches are out – CRITICAL bug downgraded to HIGH, but patch anyway!</a> (Naked Security)</p><p><a href="https://blog.talosintelligence.com/openssl-vulnerability/">Threat Advisory: High Severity OpenSSL Vulnerabilities</a> (Cisco Talos Blog)</p><p><a href="https://sectigo.com/resource-library/openssl-vulnerability-patch-released">OpenSSL Vulnerability Patch Released</a> (Sectigo® Official)</p><p><a href="https://www.rezilion.com/blog/clearing-the-fog-over-the-new-openssl-vulnerabilities/">Clearing the Fog Over the New OpenSSL Vulnerabilities</a> (Rezilion)</p><p><a href="https://blog.checkpoint.com/2022/11/01/openssl-vulnerability-cve-2022-3602-remote-code-execution-and-cve-2022-3786-denial-of-service-check-point-research-update/">OpenSSL vulnerability CVE-2022-3602 (Remote Code Execution) and CVE-2022-3786 (Denial of Service) Check Point Research Update</a> (Check Point Software)</p><p><a href="https://blog.lightspin.io/undisclosed-openssl-vulnerability-free-scripts-for-target-scoping">Undisclosed OpenSSL vulnerability: Free scripts for target scoping</a> (Lightspin)</p><p><a href="https://thecyberwire.com/stories/938f029e9f5c4ae5b18a30e8fea42a9a/discussions-of-cisas-part-in-elections-and-the-jcdc">Discussions of CISA’s part in elections and the JCDC.</a> (CyberWire)</p><p><a href="https://www.reuters.com/world/us-treasury-targeted-by-russian-hacker-group-last-month-official-2022-11-01/">U.S. Treasury thwarted attack by Russian hacker group last month-official</a> (Reuters) </p><p><a href="https://thecyberwire.com/stories/fb1b07ff7536477cb7d6370288f76999/xdr-data-reveals-threat-trends">XDR data reveals threat trends.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/466910af952842a7a139ea6d12e0fc34/what-happens-to-a-gift-card-given-to-a-scammer">What happens to a gift card given to a scammer?</a> (CyberWire)</p><p><a href="https://www.marketwatch.com/story/how-russias-war-in-ukraine-helped-the-fbi-crack-one-of-the-biggest-cyber-crime-cases-in-years-11667329599">How Russia’s war in Ukraine helped the FBI crack one of the biggest cybercrime cases in years</a> (MarketWatch)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1713</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[403dc5e0-787a-11ec-abf0-8f5fddb4e21d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5588147701.mp3?updated=1690318449" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OpenSSL patched today. The risk of misconfiguration. Cyberespionage (and the risk of mixing the personal with the official). Assistance for Ukraine's cyber defense., And a quick look at DNS threats.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1695/notes</link>
      <description>OpenSSL is patched today. The misconfiguration risk to US government networks' security and compliance. Hacking Ms Truss's phone. Assistance for Ukraine's cyber defense. Joe Carrigan looks at the latest round of apps pulled from the Google Play Store. Our guest is Matias Madou of Secure Code Warrior on why cultivating a positive culture among security and developer teams continues to fall short. And a quick look at DNS threats.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/210

Selected reading.
Effectively Preparing for the OpenSSL 3.x Vulnerability (Akamai) O
How The OpenSSL 3 Vulnerability Will Really Affect Your Environment (Nucleus Security) 
New Critical Flaw in OpenSSL: How to Know if You're at Risk (Rezilion)
Experts warn of critical security vulnerability discovered in OpenSSL (Application Security Blog)
The impact of exploitable misconfigurations on network security within US Federal organizations (Titania)
Liz Truss's personal phone hacked by Putin's spies (Mail Online) O
Truss phone was hacked by suspected Putin agents when she was foreign minister, the Daily Mail reports (Reuters) 
Liz Truss phone hack claim prompts calls for investigation (BBC News) 
Russian spies hacked Truss's personal phone (Computing)
Government urged to investigate report Liz Truss’s phone was hacked (the Guardian)
Ministers creating ‘wild west’ conditions with use of personal phones (the Guardian)
Suella Braverman admits sending official documents to personal email six times (The Telegraph) 
Ukraine War: UK reveals £6m package for cyber defence (BBC News)
DNS Threat Report — Q3 2022 (Akamai)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Nov 2022 20:15:00 -0000</pubDate>
      <itunes:title>OpenSSL patched today. The risk of misconfiguration. Cyberespionage (and the risk of mixing the personal with the official). Assistance for Ukraine's cyber defense., And a quick look at DNS threats.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1695</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>OpenSSL is patched today. The misconfiguration risk to US government networks' security and compliance. Hacking Ms Truss's phone. Assistance for Ukraine's cyber defense. Joe Carrigan looks at the latest round of apps pulled from the Google Play Store. Our guest is Matias Madou of Secure Code Warrior on why cultivating a positive culture among security and developer teams continues to fall short. And a quick look at DNS threats.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/210

Selected reading.
Effectively Preparing for the OpenSSL 3.x Vulnerability (Akamai) O
How The OpenSSL 3 Vulnerability Will Really Affect Your Environment (Nucleus Security) 
New Critical Flaw in OpenSSL: How to Know if You're at Risk (Rezilion)
Experts warn of critical security vulnerability discovered in OpenSSL (Application Security Blog)
The impact of exploitable misconfigurations on network security within US Federal organizations (Titania)
Liz Truss's personal phone hacked by Putin's spies (Mail Online) O
Truss phone was hacked by suspected Putin agents when she was foreign minister, the Daily Mail reports (Reuters) 
Liz Truss phone hack claim prompts calls for investigation (BBC News) 
Russian spies hacked Truss's personal phone (Computing)
Government urged to investigate report Liz Truss’s phone was hacked (the Guardian)
Ministers creating ‘wild west’ conditions with use of personal phones (the Guardian)
Suella Braverman admits sending official documents to personal email six times (The Telegraph) 
Ukraine War: UK reveals £6m package for cyber defence (BBC News)
DNS Threat Report — Q3 2022 (Akamai)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>OpenSSL is patched today. The misconfiguration risk to US government networks' security and compliance. Hacking Ms Truss's phone. Assistance for Ukraine's cyber defense. Joe Carrigan looks at the latest round of apps pulled from the Google Play Store. Our guest is Matias Madou of Secure Code Warrior on why cultivating a positive culture among security and developer teams continues to fall short. And a quick look at DNS threats.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/210</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.akamai.com/blog/security-research/openssl-vulnerability-how-to-effectively-prepare">Effectively Preparing for the OpenSSL 3.x Vulnerability</a> (Akamai) O</p><p><a href="https://nucleussec.com/blog/how-the-openssl-3-vulnerability-will-really-affect-your-environment">How The OpenSSL 3 Vulnerability Will Really Affect Your Environment</a> (Nucleus Security) </p><p><a href="https://www.rezilion.com/blog/new-critical-flaw-in-openssl-how-to-know-if-youre-at-risk/">New Critical Flaw in OpenSSL: How to Know if You're at Risk</a> (Rezilion)</p><p><a href="https://www.synopsys.com/blogs/software-security/preparing-for-openssl-critical-security-vulnerability/">Experts warn of critical security vulnerability discovered in OpenSSL</a> (Application Security Blog)</p><p><a href="https://info.titania.com/impact-of-exploitable-misconfigurations-federal">The impact of exploitable misconfigurations on network security within US Federal organizations</a> (Titania)</p><p><a href="https://www.dailymail.co.uk/news/article-11368619/Liz-Trusss-personal-phone-hacked-Putins-spies-secret-details-negotiations.html">Liz Truss's personal phone hacked by Putin's spies</a> (Mail Online) O</p><p><a href="https://www.reuters.com/world/uk/truss-phone-was-hacked-by-suspected-putin-agents-when-she-was-foreign-minister-2022-10-29/">Truss phone was hacked by suspected Putin agents when she was foreign minister, the Daily Mail reports</a> (Reuters) </p><p><a href="https://www.bbc.com/news/uk-politics-63442813">Liz Truss phone hack claim prompts calls for investigation</a> (BBC News) </p><p><a href="https://www.computing.co.uk/news/4059053/russian-spies-hacked-trusss-personal-phone">Russian spies hacked Truss's personal phone </a>(Computing)</p><p><a href="https://www.theguardian.com/technology/2022/oct/29/government-urged-to-investigate-report-liz-truss-phone-was-hacked">Government urged to investigate report Liz Truss’s phone was hacked</a> (the Guardian)</p><p><a href="https://www.theguardian.com/uk-news/2022/oct/30/minister-creating-wild-west-conditions-personal-unsecured-mobile-phone-email-account-whatsapp-national-security-threat">Ministers creating ‘wild west’ conditions with use of personal phones</a> (the Guardian)</p><p><a href="https://www.telegraph.co.uk/politics/2022/10/31/suella-braverman-admits-sent-official-documents-six-times-personal/">Suella Braverman admits sending official documents to personal email six times</a> (The Telegraph) </p><p><a href="https://www.bbc.com/news/uk-63465237">Ukraine War: UK reveals £6m package for cyber defence</a> (BBC News)</p><p><a href="https://www.akamai.com/blog/security-research/dns-threat-report-q3-2022">DNS Threat Report — Q3 2022</a> (Akamai)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1566</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[415c054a-787a-11ec-abf0-bba762a0517b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5977328951.mp3?updated=1690318434" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Copper smelter hit with malware. Notes from the hybrid war. Disinformation, not direct manipulation of results, the principal threat to US elections. Ransomware in Australia’s ForceNet. Threat trends.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1694/notes</link>
      <description>Leading European metals producer is hit with malware. Cooperative defense in cyberspace. A Ukrainian ally describes its exposure to Russian cyberattacks. Former UK Prime Minister Truss's phone may have been compromised. CISA sees a complex threat environment, but no specific threat to US elections. The Australian Defence network sustains ransomware attack. The three finalists in the DataTribe Challenge share insights on the competition. Rick Howard previews the new season of CSO Perspectives. And a look at threat trends.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/209

Selected reading.
Aurubis says it was hit in wider cyberattack on metals industry (Reuters)
Copper Giant Aurubis Shuts Down Systems Due to Cyberattack (SecurityWeek)
Inside a US military cyber team’s defence of Ukraine (BBC News) 
Ukraine's cyber power shows value of public-private partnership (Nikkei Asia) 
Latvian President: Only the West’s Weakness Can Provoke Russia (Foreign Policy) 
Latvia’s cyberspace faces new challenges amid war in Ukraine (The Record by Recorded Future)
Worries build about winter cyber threats in Ukraine (POLITICO)
Liz Truss's personal phone hacked by Putin's spies (Mail Online)
Truss phone was hacked by suspected Putin agents when she was foreign minister, the Daily Mail reports (Reuters)
Liz Truss phone hack claim prompts calls for investigation (BBC News)
Russian spies hacked Truss's personal phone (Computing)
Government urged to investigate report Liz Truss’s phone was hacked (the Guardian)
Ministers creating ‘wild west’ conditions with use of personal phones (the Guardian)
'Complex threat environment' ahead of midterm elections, top cybersecurity official says (Reuters)
CISA chief sees no "specific or credible threats" to election infrastructure (CBS News)
For cyber experts, disinformation overshadows cyberthreats in midterms (Washington Post)
Australian Defence Department caught up in ransomware attack (ABC)
Cyber-attack on Australian defence contractor may have exposed private communications between ADF members (the Guardian)
Cyber Threat Reports (Deep Instinct)
Deep Instinct releases its 2022 Interim Cyber Threat Study. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 31 Oct 2022 20:15:00 -0000</pubDate>
      <itunes:title>Copper smelter hit with malware. Notes from the hybrid war. Disinformation, not direct manipulation of results, the principal threat to US elections. Ransomware in Australia’s ForceNet. Threat trends.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1694</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Leading European metals producer is hit with malware. Cooperative defense in cyberspace. A Ukrainian ally describes its exposure to Russian cyberattacks. Former UK Prime Minister Truss's phone may have been compromised. CISA sees a complex threat environment, but no specific threat to US elections. The Australian Defence network sustains ransomware attack. The three finalists in the DataTribe Challenge share insights on the competition. Rick Howard previews the new season of CSO Perspectives. And a look at threat trends.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/209

Selected reading.
Aurubis says it was hit in wider cyberattack on metals industry (Reuters)
Copper Giant Aurubis Shuts Down Systems Due to Cyberattack (SecurityWeek)
Inside a US military cyber team’s defence of Ukraine (BBC News) 
Ukraine's cyber power shows value of public-private partnership (Nikkei Asia) 
Latvian President: Only the West’s Weakness Can Provoke Russia (Foreign Policy) 
Latvia’s cyberspace faces new challenges amid war in Ukraine (The Record by Recorded Future)
Worries build about winter cyber threats in Ukraine (POLITICO)
Liz Truss's personal phone hacked by Putin's spies (Mail Online)
Truss phone was hacked by suspected Putin agents when she was foreign minister, the Daily Mail reports (Reuters)
Liz Truss phone hack claim prompts calls for investigation (BBC News)
Russian spies hacked Truss's personal phone (Computing)
Government urged to investigate report Liz Truss’s phone was hacked (the Guardian)
Ministers creating ‘wild west’ conditions with use of personal phones (the Guardian)
'Complex threat environment' ahead of midterm elections, top cybersecurity official says (Reuters)
CISA chief sees no "specific or credible threats" to election infrastructure (CBS News)
For cyber experts, disinformation overshadows cyberthreats in midterms (Washington Post)
Australian Defence Department caught up in ransomware attack (ABC)
Cyber-attack on Australian defence contractor may have exposed private communications between ADF members (the Guardian)
Cyber Threat Reports (Deep Instinct)
Deep Instinct releases its 2022 Interim Cyber Threat Study. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Leading European metals producer is hit with malware. Cooperative defense in cyberspace. A Ukrainian ally describes its exposure to Russian cyberattacks. Former UK Prime Minister Truss's phone may have been compromised. CISA sees a complex threat environment, but no specific threat to US elections. The Australian Defence network sustains ransomware attack. The three finalists in the DataTribe Challenge share insights on the competition. Rick Howard previews the new season of CSO Perspectives. And a look at threat trends.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/209</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.reuters.com/technology/aurubis-says-was-target-cyberattack-2022-10-28/">Aurubis says it was hit in wider cyberattack on metals industry</a> (Reuters)</p><p><a href="https://www.securityweek.com/copper-giant-aurubis-shuts-down-systems-due-cyberattack">Copper Giant Aurubis Shuts Down Systems Due to Cyberattack</a> (SecurityWeek)</p><p><a href="https://www.bbc.com/news/uk-63328398">Inside a US military cyber team’s defence of Ukraine</a> (BBC News) </p><p><a href="https://asia.nikkei.com/Politics/Ukraine-war/Ukraine-s-cyber-power-shows-value-of-public-private-partnership">Ukraine's cyber power shows value of public-private partnership</a> (Nikkei Asia) </p><p><a href="https://foreignpolicy.com/2022/10/27/latvia-president-russia-ukraine-west/">Latvian President: Only the West’s Weakness Can Provoke Russia</a> (Foreign Policy) </p><p><a href="https://therecord.media/latvias-cyberspace-faces-new-challenges-amid-war-in-ukraine/">Latvia’s cyberspace faces new challenges amid war in Ukraine</a> (The Record by Recorded Future)</p><p><a href="https://www.politico.com/newsletters/national-security-daily/2022/10/28/worries-build-about-winter-cyber-threats-in-ukraine-00063983">Worries build about winter cyber threats in Ukraine</a> (POLITICO)</p><p><a href="https://www.dailymail.co.uk/news/article-11368619/Liz-Trusss-personal-phone-hacked-Putins-spies-secret-details-negotiations.html">Liz Truss's personal phone hacked by Putin's spies</a> (Mail Online)</p><p><a href="https://www.reuters.com/world/uk/truss-phone-was-hacked-by-suspected-putin-agents-when-she-was-foreign-minister-2022-10-29/">Truss phone was hacked by suspected Putin agents when she was foreign minister, the Daily Mail reports</a> (Reuters)</p><p><a href="https://www.bbc.com/news/uk-politics-63442813">Liz Truss phone hack claim prompts calls for investigation</a> (BBC News)</p><p><a href="https://www.computing.co.uk/news/4059053/russian-spies-hacked-trusss-personal-phone">Russian spies hacked Truss's personal phone </a>(Computing)</p><p><a href="https://www.theguardian.com/technology/2022/oct/29/government-urged-to-investigate-report-liz-truss-phone-was-hacked">Government urged to investigate report Liz Truss’s phone was hacked</a> (the Guardian)</p><p><a href="https://www.theguardian.com/uk-news/2022/oct/30/minister-creating-wild-west-conditions-personal-unsecured-mobile-phone-email-account-whatsapp-national-security-threat">Ministers creating ‘wild west’ conditions with use of personal phones</a> (the Guardian)</p><p><a href="https://www.reuters.com/world/us/complex-threat-environment-ahead-midterm-elections-top-cybersecurity-official-2022-10-30/">'Complex threat environment' ahead of midterm elections, top cybersecurity official says</a> (Reuters)</p><p><a href="https://www.cbsnews.com/news/midterms-cisa-jen-easterly-election-infrastructure-face-the-nation/">CISA chief sees no "specific or credible threats" to election infrastructure</a> (CBS News)</p><p><a href="https://www.washingtonpost.com/politics/2022/10/31/cyber-experts-disinformation-overshadows-cyberthreats-midterms/">For cyber experts, disinformation overshadows cyberthreats in midterms</a> (Washington Post)</p><p><a href="https://www.abc.net.au/news/2022-10-31/defence-department-ransomware-attack-forecenet-australia/101596230">Australian Defence Department caught up in ransomware attack</a> (ABC)</p><p><a href="https://www.theguardian.com/technology/2022/oct/31/cyber-attack-on-australian-defence-contractor-may-have-exposed-private-communications-between-adf-members">Cyber-attack on Australian defence contractor may have exposed private communications between ADF members</a> (the Guardian)</p><p><a href="https://www.deepinstinct.com/cyber-threat-reports">Cyber Threat Reports</a> (Deep Instinct)</p><p><a href="https://thecyberwire.com/stories/b05bd0626bd544c58cc42776e33badde/deep-instinct-releases-its-2022-interim-cyber-threat-study">Deep Instinct releases its 2022 Interim Cyber Threat Study</a>. (CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1581</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3d262f96-787a-11ec-abf0-4f9d0d556c94]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3782174263.mp3?updated=1690318417" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jenny Brinkley: A cybersecurity rollercoaster. [Security] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/123/notes</link>
      <description>Jenny Brinkley, Director of AWS Security at Amazon Web Services (AWS), sits down to share her empowering story working through the ranks, and even co-founding her own company. While she did not have a typical upbringing in the industry, she credits her parents for ending up where she is now, as they told her that she could do anything and she decided as she was growing up that she could. She had the opportunity to co-found a small startup before selling it to AWS. She says that working in her position is like a rollercoaster, as no one thing is like the other, saying her highs are high and her lows are low. Being a woman in cybersecurity, she is working to empower more women in the field, Jenny says, "I think that we're living in such an interesting time where empathy, kindness, compassion, honesty, partnership in the security space, I mean, heck for any industry, but really for security and cyber security roles today, it's, it's the life blood and to be underestimated, especially as a female or because, you know, my background doesn't follow a cookie cutter pattern of what individuals think of when they think of individuals in security roles." We thank Jenny for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 30 Oct 2022 07:00:00 -0000</pubDate>
      <itunes:title>Jenny Brinkley: A cybersecurity rollercoaster. [Security] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>123</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Jenny Brinkley, Director of AWS Security at Amazon Web Services (AWS), sits down to share her empowering story working through the ranks, and even co-founding her own company. While she did not have a typical upbringing in the industry, she credits her parents for ending up where she is now, as they told her that she could do anything and she decided as she was growing up that she could. She had the opportunity to co-found a small startup before selling it to AWS. She says that working in her position is like a rollercoaster, as no one thing is like the other, saying her highs are high and her lows are low. Being a woman in cybersecurity, she is working to empower more women in the field, Jenny says, "I think that we're living in such an interesting time where empathy, kindness, compassion, honesty, partnership in the security space, I mean, heck for any industry, but really for security and cyber security roles today, it's, it's the life blood and to be underestimated, especially as a female or because, you know, my background doesn't follow a cookie cutter pattern of what individuals think of when they think of individuals in security roles." We thank Jenny for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jenny Brinkley, Director of AWS Security at Amazon Web Services (AWS), sits down to share her empowering story working through the ranks, and even co-founding her own company. While she did not have a typical upbringing in the industry, she credits her parents for ending up where she is now, as they told her that she could do anything and she decided as she was growing up that she could. She had the opportunity to co-found a small startup before selling it to AWS. She says that working in her position is like a rollercoaster, as no one thing is like the other, saying her highs are high and her lows are low. Being a woman in cybersecurity, she is working to empower more women in the field, Jenny says, "I think that we're living in such an interesting time where empathy, kindness, compassion, honesty, partnership in the security space, I mean, heck for any industry, but really for security and cyber security roles today, it's, it's the life blood and to be underestimated, especially as a female or because, you know, my background doesn't follow a cookie cutter pattern of what individuals think of when they think of individuals in security roles." We thank Jenny for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>545</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[965358f0-5632-11ed-8ff7-5b6942403d22]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6957628804.mp3?updated=1666888533" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bugs and working from home. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/256/notes</link>
      <description>Fede Kirschbaum from Faraday Security sits down with Dave to discuss their research on "A vulnerability in Realtek's SDK for eCos OS: pwning thousands of routers." The team at Faraday found a vulnerability that made it to DEFCON 30, labeling it high severity. With more and more people working from home for their companies, the research team went looking for where there may be vulnerabilities as employees are working from home.
The research states that the team was "seeking and reporting security vulnerabilities in IoT devices, which led to the finding of an exploitable bug in a consumer-grade router popular in Argentina." They also stated in the research that it was escalating quickly and shares about how protecting home networks is important while working remotely.
The research can be found here:
A vulnerability in Realtek´s SDK for eCos OS: pwning thousands of routers

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 Oct 2022 07:00:00 -0000</pubDate>
      <itunes:title>Bugs and working from home. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>256</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Fede Kirschbaum from Faraday Security sits down with Dave to discuss their research on "A vulnerability in Realtek's SDK for eCos OS: pwning thousands of routers." The team at Faraday found a vulnerability that made it to DEFCON 30, labeling it high severity. With more and more people working from home for their companies, the research team went looking for where there may be vulnerabilities as employees are working from home.
The research states that the team was "seeking and reporting security vulnerabilities in IoT devices, which led to the finding of an exploitable bug in a consumer-grade router popular in Argentina." They also stated in the research that it was escalating quickly and shares about how protecting home networks is important while working remotely.
The research can be found here:
A vulnerability in Realtek´s SDK for eCos OS: pwning thousands of routers

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Fede Kirschbaum from Faraday Security sits down with Dave to discuss their research on "A vulnerability in Realtek's SDK for eCos OS: pwning thousands of routers." The team at Faraday found a vulnerability that made it to DEFCON 30, labeling it high severity. With more and more people working from home for their companies, the research team went looking for where there may be vulnerabilities as employees are working from home.</p><p>The research states that the team was "seeking and reporting security vulnerabilities in IoT devices, which led to the finding of an exploitable bug in a consumer-grade router popular in Argentina." They also stated in the research that it was escalating quickly and shares about how protecting home networks is important while working remotely.</p><p>The research can be found here:</p><ul><li><a href="https://faradaysec.com/pwning-thousands-of-routers-with-a-vulnerability-in-realteks-sdk-for-ecos-os/">A vulnerability in Realtek´s SDK for eCos OS: pwning thousands of routers</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1643</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d3306c50-560e-11ed-9216-d3b2f5ee8b3e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5942826599.mp3?updated=1685127214" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Another DDoS attack against NATO governments. The US 2022 National Defense Strategy is out. Notes on ICS security.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1693/notes</link>
      <description>Cyberattacks against Poland’s and Slovakia’s parliaments. The US 2022 National Defense Strategy is out. Insights from SecurityWeek’s ICS Cyber Security Conference. The importance of zero-trust in industrial environments. Malek Ben Salem from Accenture on machine language security and safety. Our guest is Nick Schneider of Arctic Wolf to discuss why he believes 2023 will see a resurgence of ransomware. And CISA issues four more ICS Advisories.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/208

Selected reading.
Computer networks of parliaments in Poland and Slovakia paralyzed by cyberattacks (Euro Weekly News)
Slovak, Polish Parliaments Hit By Cyber Attacks (Barron's)
Slovak parliament suspends voting due to suspected cyberattack (Reuters)
"Also from Russia" - cyber attack on parliaments in Poland and Slovakia - Today Times Live (Today Times Live)
2022 National Defense Strategy (US Department of Defense)
2022 NDS Fact Sheet | Integrated Deterrence (US Department of Defense) 
Discussing cyberattacks vs system failures. (CyberWire) 
Zero-trust in ICS environments. (CyberWire)
SANS 2022 Survey: The State of OT/ICS Cybersecurity in 2022 and Beyond | Nozomi Networks (Nozomi Networks)
CISA Releases Four Industrial Control Systems Advisories (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 28 Oct 2022 20:15:00 -0000</pubDate>
      <itunes:title>Another DDoS attack against NATO governments. The US 2022 National Defense Strategy is out. Notes on ICS security.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1693</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cyberattacks against Poland’s and Slovakia’s parliaments. The US 2022 National Defense Strategy is out. Insights from SecurityWeek’s ICS Cyber Security Conference. The importance of zero-trust in industrial environments. Malek Ben Salem from Accenture on machine language security and safety. Our guest is Nick Schneider of Arctic Wolf to discuss why he believes 2023 will see a resurgence of ransomware. And CISA issues four more ICS Advisories.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/208

Selected reading.
Computer networks of parliaments in Poland and Slovakia paralyzed by cyberattacks (Euro Weekly News)
Slovak, Polish Parliaments Hit By Cyber Attacks (Barron's)
Slovak parliament suspends voting due to suspected cyberattack (Reuters)
"Also from Russia" - cyber attack on parliaments in Poland and Slovakia - Today Times Live (Today Times Live)
2022 National Defense Strategy (US Department of Defense)
2022 NDS Fact Sheet | Integrated Deterrence (US Department of Defense) 
Discussing cyberattacks vs system failures. (CyberWire) 
Zero-trust in ICS environments. (CyberWire)
SANS 2022 Survey: The State of OT/ICS Cybersecurity in 2022 and Beyond | Nozomi Networks (Nozomi Networks)
CISA Releases Four Industrial Control Systems Advisories (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyberattacks against Poland’s and Slovakia’s parliaments. The US 2022 National Defense Strategy is out. Insights from SecurityWeek’s ICS Cyber Security Conference. The importance of zero-trust in industrial environments. Malek Ben Salem from Accenture on machine language security and safety. Our guest is Nick Schneider of Arctic Wolf to discuss why he believes 2023 will see a resurgence of ransomware. And CISA issues four more ICS Advisories.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/208</p><p><br></p><h2>Selected reading.</h2><p><a href="https://euroweeklynews.com/2022/10/27/computer-networks-of-parliaments-in-poland-and-slovakia-paralyzed-by-cyberattacks/">Computer networks of parliaments in Poland and Slovakia paralyzed by cyberattacks</a> (Euro Weekly News)</p><p><a href="https://www.barrons.com/news/slovak-polish-parliaments-hit-by-cyber-attacks-01666885208">Slovak, Polish Parliaments Hit By Cyber Attacks</a> (Barron's)</p><p><a href="https://www.reuters.com/world/europe/slovak-parliament-suspends-voting-due-suspected-cyberattack-2022-10-27/">Slovak parliament suspends voting due to suspected cyberattack</a> (Reuters)</p><p><a href="https://todaytimeslive.com/world/149734.html">"Also from Russia" - cyber attack on parliaments in Poland and Slovakia - Today Times Live</a> (Today Times Live)</p><p><a href="https://media.defense.gov/2022/Oct/27/2003103845/-1/-1/1/2022-NATIONAL-DEFENSE-STRATEGY-NPR-MDR.PDF">2022 National Defense Strategy</a> (US Department of Defense)</p><p><a href="https://media.defense.gov/2022/Oct/27/2003103939/-1/-1/1/STRATEGIC-WAYS-COMPILATION-NDS-FACTSHEETS.PDF">2022 NDS Fact Sheet | Integrated Deterrence</a> (US Department of Defense) </p><p><a href="https://thecyberwire.com/stories/d4c954158a4c476ab511bca157bbe734/discussing-cyberattacks-vs-system-failures">Discussing cyberattacks vs system failures.</a> (CyberWire) </p><p><a href="https://thecyberwire.com/stories/57494e0b670c4aed9fd759d3730a8e46/zero-trust-in-ics-environments">Zero-trust in ICS environments</a>. (CyberWire)</p><p><a href="https://info.nozominetworks.com/en/sans-2022-survey-ot-ics-cybersecurity-lp">SANS 2022 Survey: The State of OT/ICS Cybersecurity in 2022 and Beyond | Nozomi Networks</a> (Nozomi Networks)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/10/27/cisa-releases-four-industrial-control-systems-advisories">CISA Releases Four Industrial Control Systems Advisories</a> (CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1776</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3f201ac8-787a-11ec-abf0-db157af5fe14]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9917221186.mp3?updated=1690318402" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Malware Mash! [Bonus]</title>
      <link>https://thecyberwire.com/stories/123bc0f691444be6af3145a6dab6cee4/malware-mash</link>
      <description>Enjoy this CyberWire classic.
They did the Mash...they did the Malware Mash...
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 28 Oct 2022 07:00:00 -0000</pubDate>
      <itunes:title>The Malware Mash! [Bonus]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy this CyberWire classic.
They did the Mash...they did the Malware Mash...
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy this CyberWire classic.</p><p>They did the Mash...they did the Malware Mash...</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>185</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2b8367d2-55fa-11ed-95b4-638373c273ad]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5950548139.mp3?updated=1666877087" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA releases voluntary CPGs. Trojans and scanners. Cyber venture investing, and some insights into corporate culture. "Opportunistic" cyberops in a hybrid war. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1692/notes</link>
      <description>CISA releases cross-sector cybersecurity performance goals. Trojans are spreading through scanners. Cyber seed rounds are an exception to a general downtrend in venture investment. Whistleblowing and corporate culture. Storing enterprise secrets. Robert M. Lee from Dragos explains the TSA Pipeline Security Directive. Our guests are Jenny Brinkley from Amazon AWS and Lisa Plaggemier from the National Cybersecurity Alliance with a collaborative educational project. Cyberattacks seen as opportunistic and disconnected from strategy.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/207

Selected reading.
Cross-Sector Cybersecurity Performance Goals (CISA)
CISA unveils voluntary cybersecurity performance goals (Federal News Network) 
Sending Trojans via Scanners (Avanan) 
DataTribe Insights - Q2 2022: Economic Storm Makes Landfall (DataTribe) 
Ukraine: Russian cyber attacks aimless and opportunistic (SearchSecurity)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 27 Oct 2022 20:15:00 -0000</pubDate>
      <itunes:title>CISA releases voluntary CPGs. Trojans and scanners. Cyber venture investing, and some insights into corporate culture. "Opportunistic" cyberops in a hybrid war. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1692</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA releases cross-sector cybersecurity performance goals. Trojans are spreading through scanners. Cyber seed rounds are an exception to a general downtrend in venture investment. Whistleblowing and corporate culture. Storing enterprise secrets. Robert M. Lee from Dragos explains the TSA Pipeline Security Directive. Our guests are Jenny Brinkley from Amazon AWS and Lisa Plaggemier from the National Cybersecurity Alliance with a collaborative educational project. Cyberattacks seen as opportunistic and disconnected from strategy.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/207

Selected reading.
Cross-Sector Cybersecurity Performance Goals (CISA)
CISA unveils voluntary cybersecurity performance goals (Federal News Network) 
Sending Trojans via Scanners (Avanan) 
DataTribe Insights - Q2 2022: Economic Storm Makes Landfall (DataTribe) 
Ukraine: Russian cyber attacks aimless and opportunistic (SearchSecurity)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA releases cross-sector cybersecurity performance goals. Trojans are spreading through scanners. Cyber seed rounds are an exception to a general downtrend in venture investment. Whistleblowing and corporate culture. Storing enterprise secrets. Robert M. Lee from Dragos explains the TSA Pipeline Security Directive. Our guests are Jenny Brinkley from Amazon AWS and Lisa Plaggemier from the National Cybersecurity Alliance with a collaborative educational project. Cyberattacks seen as opportunistic and disconnected from strategy.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/207</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/cpgs">Cross-Sector Cybersecurity Performance Goals</a> (CISA)</p><p><a href="https://federalnewsnetwork.com/cybersecurity/2022/10/cisa-unveils-voluntary-cybersecurity-performance-goals/">CISA unveils voluntary cybersecurity performance goals</a> (Federal News Network) </p><p><a href="https://www.avanan.com/blog/sending-trojans-via-scanners">Sending Trojans via Scanners</a> (Avanan) </p><p><a href="https://datatribe.com/dt-insights/">DataTribe Insights - Q2 2022: Economic Storm Makes Landfall</a> (DataTribe) </p><p><a href="https://www.techtarget.com/searchsecurity/news/252526575/Ukraine-Russian-cyber-attacks-aimless-and-opportunistic">Ukraine: Russian cyber attacks aimless and opportunistic</a> (SearchSecurity)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1714</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3e429a36-787a-11ec-abf0-0f3fd428d89f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8717335681.mp3?updated=1690318375" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Amid widespread unrest, Sudan shutters its Internet. A new PRC influence campaign targets US elections. Software supply chain security. And cybercrime in wartime.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1691/notes</link>
      <description>Sudan closes its Internet as the country sees protests on the first anniversary of a coup. A Chinese influence campaign targets US elections. A software supply chain security study, and a look at vulnerability scanning tools. Documenting cyber war crimes in Ukraine. CISA issues eight ICS Advisories. Andrea Little Limbago from Interos on the effects of water scarcity on data centers. And if you’ll indulge us, we’ve got some pretty exciting CyberWire news.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/206

Selected reading.
Internet is shut down in Sudan on anniversary of military coup (The Record by Recorded Future)
Pro-PRC DRAGONBRIDGE Influence Campaign Leverages New TTPs to Aggressively Target U.S. Interests, Including Midterm Elections (Mandiant)
Rezilion Vulnerability Scanner Benchmark Report Finds Top Scanners Only 73% Accurate (PR Newswire) 
Four in Five Software Supply Chains Exposed to Cyberattack in the Last 12 Months (BlackBerry)
Ukraine Documenting Russian Hacks, Eyeing International Charges (Bloomberg) 
CISA Releases Eight Industrial Control Systems Advisories (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 26 Oct 2022 20:40:00 -0000</pubDate>
      <itunes:title>Amid widespread unrest, Sudan shutters its Internet. A new PRC influence campaign targets US elections. Software supply chain security. And cybercrime in wartime.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1691</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Sudan closes its Internet as the country sees protests on the first anniversary of a coup. A Chinese influence campaign targets US elections. A software supply chain security study, and a look at vulnerability scanning tools. Documenting cyber war crimes in Ukraine. CISA issues eight ICS Advisories. Andrea Little Limbago from Interos on the effects of water scarcity on data centers. And if you’ll indulge us, we’ve got some pretty exciting CyberWire news.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/206

Selected reading.
Internet is shut down in Sudan on anniversary of military coup (The Record by Recorded Future)
Pro-PRC DRAGONBRIDGE Influence Campaign Leverages New TTPs to Aggressively Target U.S. Interests, Including Midterm Elections (Mandiant)
Rezilion Vulnerability Scanner Benchmark Report Finds Top Scanners Only 73% Accurate (PR Newswire) 
Four in Five Software Supply Chains Exposed to Cyberattack in the Last 12 Months (BlackBerry)
Ukraine Documenting Russian Hacks, Eyeing International Charges (Bloomberg) 
CISA Releases Eight Industrial Control Systems Advisories (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sudan closes its Internet as the country sees protests on the first anniversary of a coup. A Chinese influence campaign targets US elections. A software supply chain security study, and a look at vulnerability scanning tools. Documenting cyber war crimes in Ukraine. CISA issues eight ICS Advisories. Andrea Little Limbago from Interos on the effects of water scarcity on data centers. And if you’ll indulge us, we’ve got some pretty exciting CyberWire news.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/206</p><p><br></p><h2>Selected reading.</h2><p><a href="https://therecord.media/internet-is-shut-down-in-sudan-on-anniversary-of-military-coup/">Internet is shut down in Sudan on anniversary of military coup</a> (The Record by Recorded Future)</p><p><a href="https://www.mandiant.com/resources/blog/prc-dragonbridge-influence-elections">Pro-PRC DRAGONBRIDGE Influence Campaign Leverages New TTPs to Aggressively Target U.S. Interests, Including Midterm Elections</a> (Mandiant)</p><p><a href="https://www.prnewswire.com/news-releases/rezilion-vulnerability-scanner-benchmark-report-finds-top-scanners-only-73-accurate-301657588.html">Rezilion Vulnerability Scanner Benchmark Report Finds Top Scanners Only 73% Accurate</a> (PR Newswire) </p><p><a href="https://blogs.blackberry.com/en/2022/10/four-in-five-software-supply-chains-exposed-to-cyberattack-in-last-12-months">Four in Five Software Supply Chains Exposed to Cyberattack in the Last 12 Months</a> (BlackBerry)</p><p><a href="https://www.bloomberg.com/news/articles/2022-10-25/ukraine-documenting-russian-hacks-eyeing-international-charges">Ukraine Documenting Russian Hacks, Eyeing International Charges</a> (Bloomberg) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/10/25/cisa-releases-eight-industrial-control-systems-advisories">CISA Releases Eight Industrial Control Systems Advisories</a> (CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1575</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3e22d494-787a-11ec-abf0-2fcdaaca5a32]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2009005955.mp3?updated=1690318363" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US Department of Justice unseals three indictments in PRC spying cases. CERT-UA warns of Cuba ransomware phishing. Varonis discovers Windows vulnerabilities. CISA expands KEV Catalog.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1690/notes</link>
      <description>US Department of Justice unseals three indictments in PRC spying cases. CERT-UA warns of Cuba ransomware group phishing campaign. Varonis discovers two Windows vulnerabilities. Mr Security Answer Person John Pescatore on security through obscurity. Ben Yelin on the DOJ’s spying cases against China. CISA expands its Known Exploited Vulnerabilities Catalog with six new entries.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/205

Selected reading.
Two Arrested and 13 Charged in Three Separate Cases for Alleged Participation in Malign Schemes in the United States on Behalf of the Government of the People’s Republic of China (US Department of Justice)
U.S. Justice Department Fires Warning Shot at Chinese Spies (Foreign Policy)
Chinese spies charged with trying to thwart Huawei investigation (Quartz)
DOJ Charges 13 Over Chinese Interference In US Affairs (Law360) 
U.S. Says Chinese Tried to Obstruct Huawei Prosecution (Wall Street Journal)
U.S. charges Chinese nationals with schemes to steal info, punish critics and recruit spies (CBS News)
Cuba ransomware affiliate targets Ukrainian govt agencies (BleepingComputer)
Unattributed RomCom Threat Actor Spoofing Popular Apps Now Hits Ukrainian Militaries (BlackBerry)
The Logging Dead: Two Event Log Vulnerabilities Haunting Windows (Varonis) 
CISA Adds Six Known Exploited Vulnerabilities to Catalog (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Oct 2022 20:15:00 -0000</pubDate>
      <itunes:title>US Department of Justice unseals three indictments in PRC spying cases. CERT-UA warns of Cuba ransomware phishing. Varonis discovers Windows vulnerabilities. CISA expands KEV Catalog.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1690</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>US Department of Justice unseals three indictments in PRC spying cases. CERT-UA warns of Cuba ransomware group phishing campaign. Varonis discovers two Windows vulnerabilities. Mr Security Answer Person John Pescatore on security through obscurity. Ben Yelin on the DOJ’s spying cases against China. CISA expands its Known Exploited Vulnerabilities Catalog with six new entries.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/205

Selected reading.
Two Arrested and 13 Charged in Three Separate Cases for Alleged Participation in Malign Schemes in the United States on Behalf of the Government of the People’s Republic of China (US Department of Justice)
U.S. Justice Department Fires Warning Shot at Chinese Spies (Foreign Policy)
Chinese spies charged with trying to thwart Huawei investigation (Quartz)
DOJ Charges 13 Over Chinese Interference In US Affairs (Law360) 
U.S. Says Chinese Tried to Obstruct Huawei Prosecution (Wall Street Journal)
U.S. charges Chinese nationals with schemes to steal info, punish critics and recruit spies (CBS News)
Cuba ransomware affiliate targets Ukrainian govt agencies (BleepingComputer)
Unattributed RomCom Threat Actor Spoofing Popular Apps Now Hits Ukrainian Militaries (BlackBerry)
The Logging Dead: Two Event Log Vulnerabilities Haunting Windows (Varonis) 
CISA Adds Six Known Exploited Vulnerabilities to Catalog (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>US Department of Justice unseals three indictments in PRC spying cases. CERT-UA warns of Cuba ransomware group phishing campaign. Varonis discovers two Windows vulnerabilities. Mr Security Answer Person John Pescatore on security through obscurity. Ben Yelin on the DOJ’s spying cases against China. CISA expands its Known Exploited Vulnerabilities Catalog with six new entries.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/205</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.justice.gov/opa/pr/two-arrested-and-13-charged-three-separate-cases-alleged-participation-malign-schemes-united">Two Arrested and 13 Charged in Three Separate Cases for Alleged Participation in Malign Schemes in the United States on Behalf of the Government of the People’s Republic of China</a> (US Department of Justice)</p><p><a href="https://foreignpolicy.com/2022/10/24/justice-indictments-china-beijing-espionage-merrick-garland-huawei/">U.S. Justice Department Fires Warning Shot at Chinese Spies</a> (Foreign Policy)</p><p><a href="https://qz.com/chinese-spies-charged-with-trying-to-thwart-huawei-inve-1849695128">Chinese spies charged with trying to thwart Huawei investigation</a> (Quartz)</p><p><a href="https://www.law360.com/cybersecurity-privacy/articles/1542757">DOJ Charges 13 Over Chinese Interference In US Affairs</a> (Law360) </p><p><a href="https://www.wsj.com/articles/u-s-says-chinese-tried-to-obstruct-huawei-prosecution-11666633408">U.S. Says Chinese Tried to Obstruct Huawei Prosecution</a> (Wall Street Journal)</p><p><a href="https://www.cbsnews.com/live-updates/china-justice-department-merrick-garland-charges/">U.S. charges Chinese nationals with schemes to steal info, punish critics and recruit spies</a> (CBS News)</p><p><a href="https://www.bleepingcomputer.com/news/security/cuba-ransomware-affiliate-targets-ukrainian-govt-agencies/">Cuba ransomware affiliate targets Ukrainian govt agencies</a> (BleepingComputer)</p><p><a href="https://blogs.blackberry.com/en/2022/10/unattributed-romcom-threat-actor-spoofing-popular-apps-now-hits-ukrainian-militaries">Unattributed RomCom Threat Actor Spoofing Popular Apps Now Hits Ukrainian Militaries</a> (BlackBerry)</p><p><a href="https://www.varonis.com/blog/the-logging-dead-two-windows-event-log-vulnerabilities">The Logging Dead: Two Event Log Vulnerabilities Haunting Windows</a> (Varonis) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/10/24/cisa-adds-six-known-exploited-vulnerabilities-catalog">CISA Adds Six Known Exploited Vulnerabilities to Catalog</a> (CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1264</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3d45cf54-787a-11ec-abf0-dfe1084dd55b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6598401506.mp3?updated=1690318349" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US unseals cases against PRC intelligence officers. Daixin ransomware is an active threat. FBI warns of Iranian threat group. Iran’s nuclear agency discloses hack. Hybrid war and threats to infrastructure.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1689/notes</link>
      <description>Breaking: US unseals three cases against Chinese intelligence officers. CISA says Daixin Team ransomware is an active threat. The FBI warns of Iranian threat group's activity. Meanwhile the Iranian nuclear agency says its email was hacked. Norway is concerned about threats to oil and gas infrastructure. A drop in ransomware correlates with Russia's hybrid war. Ann Johnson from Afternoon Cyber Tea speaks with AJ Yawn from ByteChek about breaking into the cybersecurity industry. Josh Ray from Accenture describes threats to the satellite industry. And cyber offense may be proving harder than thought.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/204

Selected reading.
CISA Alert AA22-294A – #StopRansomware: Daixin Team. (CyberWire)
#StopRansomware: Daixin Team (CISA)
CISA Warns of Daixin Team Hackers Targeting Health Organizations With Ransomware (The Hacker News)
Iranian Cyber Group Emennet Pasargad Conducting Hack-and-Leak Operations Using False-Flag Personas (FBI)
FBI warns Iranian hackers active ahead of the U.S. midterms (NBC News)
FBI Warns of Attacks From Iranian Threat Group Emennet Pasargad (Decipher)
Iran Hackers Behind Attempt on US Election Are Still Active (Gov Info Security)
FBI warns of ‘hack-and-leak’ operations from group based in Iran (The Record by Recorded Future)
Iran's Atomic Energy Agency Says Its E-Mail Server Was Hacked (RadioFreeEurope/RadioLiberty)
Iran says ‘specific foreign country’ behind hacktivist leak of atomic energy emails (The Record by Recorded Future)
Iran’s Top Nuclear Agency Says Its Email Servers Were Hacked (Bloomberg) 
Ukraine Could Still Face Cyberattacks, Experts Say (CNET)
Fears over Russian threat to Norway's energy infrastructure (AP NEWS)
Norway PM: Russia poses ‘real and serious’ cyber threat to oil and gas industry (The Record by Recorded Future) 
Ukraine war cuts ransomware as Kremlin co-opts hackers (The Telegraph) 
Q&amp;A: Kenneth Geers on the cyber war between Ukraine and Russia (The Record by Recorded Future)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 24 Oct 2022 20:15:00 -0000</pubDate>
      <itunes:title>US unseals cases against PRC intelligence officers. Daixin ransomware is an active threat. FBI warns of Iranian threat group. Iran’s nuclear agency discloses hack. Hybrid war and threats to infrastructure.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1689</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Breaking: US unseals three cases against Chinese intelligence officers. CISA says Daixin Team ransomware is an active threat. The FBI warns of Iranian threat group's activity. Meanwhile the Iranian nuclear agency says its email was hacked. Norway is concerned about threats to oil and gas infrastructure. A drop in ransomware correlates with Russia's hybrid war. Ann Johnson from Afternoon Cyber Tea speaks with AJ Yawn from ByteChek about breaking into the cybersecurity industry. Josh Ray from Accenture describes threats to the satellite industry. And cyber offense may be proving harder than thought.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/204

Selected reading.
CISA Alert AA22-294A – #StopRansomware: Daixin Team. (CyberWire)
#StopRansomware: Daixin Team (CISA)
CISA Warns of Daixin Team Hackers Targeting Health Organizations With Ransomware (The Hacker News)
Iranian Cyber Group Emennet Pasargad Conducting Hack-and-Leak Operations Using False-Flag Personas (FBI)
FBI warns Iranian hackers active ahead of the U.S. midterms (NBC News)
FBI Warns of Attacks From Iranian Threat Group Emennet Pasargad (Decipher)
Iran Hackers Behind Attempt on US Election Are Still Active (Gov Info Security)
FBI warns of ‘hack-and-leak’ operations from group based in Iran (The Record by Recorded Future)
Iran's Atomic Energy Agency Says Its E-Mail Server Was Hacked (RadioFreeEurope/RadioLiberty)
Iran says ‘specific foreign country’ behind hacktivist leak of atomic energy emails (The Record by Recorded Future)
Iran’s Top Nuclear Agency Says Its Email Servers Were Hacked (Bloomberg) 
Ukraine Could Still Face Cyberattacks, Experts Say (CNET)
Fears over Russian threat to Norway's energy infrastructure (AP NEWS)
Norway PM: Russia poses ‘real and serious’ cyber threat to oil and gas industry (The Record by Recorded Future) 
Ukraine war cuts ransomware as Kremlin co-opts hackers (The Telegraph) 
Q&amp;A: Kenneth Geers on the cyber war between Ukraine and Russia (The Record by Recorded Future)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Breaking: US unseals three cases against Chinese intelligence officers. CISA says Daixin Team ransomware is an active threat. The FBI warns of Iranian threat group's activity. Meanwhile the Iranian nuclear agency says its email was hacked. Norway is concerned about threats to oil and gas infrastructure. A drop in ransomware correlates with Russia's hybrid war. Ann Johnson from Afternoon Cyber Tea speaks with AJ Yawn from ByteChek about breaking into the cybersecurity industry. Josh Ray from Accenture describes threats to the satellite industry. And cyber offense may be proving harder than thought.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/204</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/35/notes">CISA Alert AA22-294A – #StopRansomware: Daixin Team.</a> (CyberWire)</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-294a">#StopRansomware: Daixin Team</a> (CISA)</p><p><a href="https://thehackernews.com/2022/10/cisa-warns-of-daixin-team-hackers.html">CISA Warns of Daixin Team Hackers Targeting Health Organizations With Ransomware</a> (The Hacker News)</p><p><a href="https://www.ic3.gov/Media/News/2022/221020.pdf">Iranian Cyber Group Emennet Pasargad Conducting Hack-and-Leak Operations Using False-Flag Personas</a> (FBI)</p><p><a href="https://www.nbcnews.com/tech/security/fbi-warns-iranian-hackers-active-ahead-us-midterms-rcna53383">FBI warns Iranian hackers active ahead of the U.S. midterms</a> (NBC News)</p><p><a href="https://duo.com/decipher/fbi-warns-of-attacks-from-iranian-threat-group-emennet-pasargad">FBI Warns of Attacks From Iranian Threat Group Emennet Pasargad</a> (Decipher)</p><p><a href="https://www.govinfosecurity.com/iran-hackers-behind-attempt-on-us-election-are-still-active-a-20310">Iran Hackers Behind Attempt on US Election Are Still Active</a> (Gov Info Security)</p><p><a href="https://therecord.media/fbi-warns-of-hack-and-leak-operations-from-group-based-in-iran/">FBI warns of ‘hack-and-leak’ operations from group based in Iran</a> (The Record by Recorded Future)</p><p><a href="https://www.rferl.org/a/iran-nuclear-agency-hacked-e-mail/32096955.html">Iran's Atomic Energy Agency Says Its E-Mail Server Was Hacked</a> (RadioFreeEurope/RadioLiberty)</p><p><a href="https://therecord.media/iran-says-specific-foreign-country-behind-hacktivist-leak-of-atomic-energy-emails/">Iran says ‘specific foreign country’ behind hacktivist leak of atomic energy emails</a> (The Record by Recorded Future)</p><p><a href="https://www.bloomberg.com/news/articles/2022-10-23/iran-s-top-nuclear-agency-says-its-email-servers-were-hacked">Iran’s Top Nuclear Agency Says Its Email Servers Were Hacked</a> (Bloomberg) </p><p><a href="https://www.cnet.com/tech/services-and-software/ukraine-could-still-face-cyberattacks-experts-say/">Ukraine Could Still Face Cyberattacks, Experts Say</a> (CNET)</p><p><a href="https://apnews.com/article/russia-ukraine-nato-norway-north-sea-moscow-16b497174d619bbddd7b004ccd31a909">Fears over Russian threat to Norway's energy infrastructure</a> (AP NEWS)</p><p><a href="https://therecord.media/norway-pm-russia-poses-real-and-serious-cyber-threat-to-oil-and-gas-industry/">Norway PM: Russia poses ‘real and serious’ cyber threat to oil and gas industry</a> (The Record by Recorded Future) </p><p><a href="https://www.telegraph.co.uk/business/2022/10/23/ukraine-war-cuts-ransomware-kremlin-co-opts-hackers/">Ukraine war cuts ransomware as Kremlin co-opts hackers</a> (The Telegraph) </p><p><a href="https://therecord.media/qa-kenneth-geers-on-the-cyber-war-between-ukraine-and-russia/">Q&amp;A: Kenneth Geers on the cyber war between Ukraine and Russia</a> (The Record by Recorded Future)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1596</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3d06755c-787a-11ec-abf0-f3c42900662a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1447262738.mp3?updated=1690318334" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA22-294A – #StopRansomware: Daixin Team. [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/35/notes</link>
      <description>FBI, CISA, and Department of Health and Human Services are releasing this joint advisory to provide information on the Daixin Team, a cybercrime group that is actively targeting U.S. businesses, predominantly in the Healthcare and Public Health Sector.
AA22-294A Alert, Technical Details, and Mitigations
Stopransomware.gov is a whole-of-government approach that gives one central location for ransomware resources and alerts.
Resource to mitigate a ransomware attack: CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide.
Ongoing Threat Alerts and Sector alerts are produced by the Health Sector Cybersecurity Coordination Center (HC3) and can be found at hhs.gov/HC3
For additional best practices for Healthcare cybersecurity issues see the HHS 405(d) Aligning Health Care Industry Security Approaches at 405d.hhs.gov 
CISA offers several no-cost scanning and testing services to help organizations reduce their exposure to threats by taking a proactive approach to mitigating attack vectors. See www.cisa.gov/cyber-hygiene-services
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 24 Oct 2022 00:52:00 -0000</pubDate>
      <itunes:title>CISA Alert AA22-294A – #StopRansomware: Daixin Team. [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>35</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>FBI, CISA, and Department of Health and Human Services are releasing this joint advisory to provide information on the Daixin Team, a cybercrime group that is actively targeting U.S. businesses, predominantly in the Healthcare and Public Health Sector.
AA22-294A Alert, Technical Details, and Mitigations
Stopransomware.gov is a whole-of-government approach that gives one central location for ransomware resources and alerts.
Resource to mitigate a ransomware attack: CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide.
Ongoing Threat Alerts and Sector alerts are produced by the Health Sector Cybersecurity Coordination Center (HC3) and can be found at hhs.gov/HC3
For additional best practices for Healthcare cybersecurity issues see the HHS 405(d) Aligning Health Care Industry Security Approaches at 405d.hhs.gov 
CISA offers several no-cost scanning and testing services to help organizations reduce their exposure to threats by taking a proactive approach to mitigating attack vectors. See www.cisa.gov/cyber-hygiene-services
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>FBI, CISA, and Department of Health and Human Services are releasing this joint advisory to provide information on the Daixin Team, a cybercrime group that is actively targeting U.S. businesses, predominantly in the Healthcare and Public Health Sector.</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-294a">AA22-294A Alert, Technical Details, and Mitigations</a></p><p><a href="https://www.stopransomware.gov/">Stopransomware.gov</a> is a whole-of-government approach that gives one central location for ransomware resources and alerts.</p><p>Resource to mitigate a ransomware attack: CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) <a href="https://www.cisa.gov/sites/default/files/publications/CISA_MS-ISAC_Ransomware%20Guide_S508C_.pdf">Joint Ransomware Guide</a>.</p><p>Ongoing Threat Alerts and Sector alerts are produced by the Health Sector Cybersecurity Coordination Center (HC3) and can be found at <a href="http://hhs.gov/HC3">hhs.gov/HC3</a></p><p>For additional best practices for Healthcare cybersecurity issues see the HHS 405(d) Aligning Health Care Industry Security Approaches at <a href="http://405d.hhs.gov/">405d.hhs.gov</a> </p><p>CISA offers several no-cost scanning and testing services to help organizations reduce their exposure to threats by taking a proactive approach to mitigating attack vectors. See <a href="http://www.cisa.gov/cyber-hygiene-services">www.cisa.gov/cyber-hygiene-services</a></p><p>U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email <a href="mailto:dib_defense@cyber.nsa.gov">dib_defense@cyber.nsa.gov</a> </p><p>To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="mailto:report@cisa.gov">report@cisa.gov</a>, or call (888) 282-0870, or report incidents to your local FBI field office.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>151</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b1b99be-5336-11ed-905a-23d3d5f7091d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5731801952.mp3?updated=1666455879" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Megan Doherty: Conquer barriers in the workforce. [Technical Specialist] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/122/notes</link>
      <description>Megan Doherty, a Technical Specialist from Microsoft Canada sits down to share her story of overcoming barriers in the workforce to get to where she is today in her career. Megan started out being a mechanical engineer before making the switch to do something with more creativity and problem solving. She shares about her passion of working with a group Microsoft created called "DigiGirlz." As well as just being able to work with her team who she says helps her face the world of adversity in her career. Megan said "There's so many barriers, just even mentally that we put on ourselves when it comes to looking for a career change or even thinking of cybersecurity as your next career path." She hopes that she leaves a legacy of kindness and compassion behind especially in the industry she is works in. We thank Megan for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 23 Oct 2022 05:00:00 -0000</pubDate>
      <itunes:title>Megan Doherty: Conquer barriers in the workforce. [Technical Specialist] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>122</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Megan Doherty, a Technical Specialist from Microsoft Canada sits down to share her story of overcoming barriers in the workforce to get to where she is today in her career. Megan started out being a mechanical engineer before making the switch to do something with more creativity and problem solving. She shares about her passion of working with a group Microsoft created called "DigiGirlz." As well as just being able to work with her team who she says helps her face the world of adversity in her career. Megan said "There's so many barriers, just even mentally that we put on ourselves when it comes to looking for a career change or even thinking of cybersecurity as your next career path." She hopes that she leaves a legacy of kindness and compassion behind especially in the industry she is works in. We thank Megan for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Megan Doherty, a Technical Specialist from Microsoft Canada sits down to share her story of overcoming barriers in the workforce to get to where she is today in her career. Megan started out being a mechanical engineer before making the switch to do something with more creativity and problem solving. She shares about her passion of working with a group Microsoft created called "DigiGirlz." As well as just being able to work with her team who she says helps her face the world of adversity in her career. Megan said "There's so many barriers, just even mentally that we put on ourselves when it comes to looking for a career change or even thinking of cybersecurity as your next career path." She hopes that she leaves a legacy of kindness and compassion behind especially in the industry she is works in. We thank Megan for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>528</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e4f6625e-5204-11ed-a3be-8f33fbbf16f5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3828582784.mp3?updated=1666887711" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New tools target governments in Middle East? [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/255/notes</link>
      <description>Dick O'Brien from Symantec's Threat Hunter team sits down with Dave to discuss their work on "Witchetty - Group Uses Updated Toolset in Attacks on Governments in Middle East." Their research has found that the group known as Witchetty aka LookingFrog, has been progressively updating its toolset, including the new tool, backdoor Trojan (Backdoor.Stegmap) to launch malware attacks on targets in the Middle East and Africa.
The research states "The attackers exploited the ProxyShell and ProxyLogon vulnerabilities to install web shells on public-facing servers before stealing credentials, moving laterally across networks, and installing malware on other computers. The researchers describe more on the new tool being used and why this new group is a threat.
The research can be found here:
Witchetty: Group Uses Updated Toolset in Attacks on Governments in Middle East

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Oct 2022 05:00:00 -0000</pubDate>
      <itunes:title>New tools target governments in Middle East? [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>255</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dick O'Brien from Symantec's Threat Hunter team sits down with Dave to discuss their work on "Witchetty - Group Uses Updated Toolset in Attacks on Governments in Middle East." Their research has found that the group known as Witchetty aka LookingFrog, has been progressively updating its toolset, including the new tool, backdoor Trojan (Backdoor.Stegmap) to launch malware attacks on targets in the Middle East and Africa.
The research states "The attackers exploited the ProxyShell and ProxyLogon vulnerabilities to install web shells on public-facing servers before stealing credentials, moving laterally across networks, and installing malware on other computers. The researchers describe more on the new tool being used and why this new group is a threat.
The research can be found here:
Witchetty: Group Uses Updated Toolset in Attacks on Governments in Middle East

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dick O'Brien from Symantec's Threat Hunter team sits down with Dave to discuss their work on "Witchetty - Group Uses Updated Toolset in Attacks on Governments in Middle East." Their research has found that the group known as Witchetty aka LookingFrog, has been progressively updating its toolset, including the new tool, backdoor Trojan (Backdoor.Stegmap) to launch malware attacks on targets in the Middle East and Africa.</p><p>The research states "The attackers exploited the ProxyShell and ProxyLogon vulnerabilities to install web shells on public-facing servers before stealing credentials, moving laterally across networks, and installing malware on other computers. The researchers describe more on the new tool being used and why this new group is a threat.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/witchetty-steganography-espionage">Witchetty: Group Uses Updated Toolset in Attacks on Governments in Middle East</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1023</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cb676f0e-5204-11ed-9cce-c7992d10cea2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5683463382.mp3?updated=1685127198" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Blackbyte's new exfiltration tool. Hijacking student accounts for BEC. Zhora calls Russia's cyber campaigns a failure. OldGremlin ransomware is an outlier.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1688/notes</link>
      <description>Blackbyte's new exfiltration tool. Hijacking student accounts for BEC. Zhora calls Russia's cyber campaigns a failure. Caleb Barlow explores new thinking for incident response. Our guest is Jon Hencinski of Expel, tracking the latest threat trends. OldGremlin ransomware is an outlier.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/203

Selected reading.
Exbyte: BlackByte Ransomware Attackers Deploy New Exfiltration Tool (Symantec)
Hijacking Student Accounts to Launch BEC-Style Attacks (Avanan)
This sneaky kind of cybercrime rules them all (Washington Post)
Russia Failing to Reach Cyber War Goals, Ukrainian Official Says (Meritalk) 
EU supports cybersecurity in Ukraine with over €10 million - EU NEIGHBOURS east (EU NEIGHBOURS east) 
Gremlins’ prey, secrets, and dirty tricks: the ransomware gang OldGremlin set new records (Group-IB) 
OldGremlin hackers use Linux ransomware to attack Russian orgs (BleepingComputer)
OldGremlin, which targets Russia, debuts new Linux ransomware (Computing) It is one of the few ransomware groups in the world that prefer to target Russian organisations, but this may change experts advise
More Russian Organizations Feeling Ransomware Pain (Bank Info Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 21 Oct 2022 20:30:00 -0000</pubDate>
      <itunes:title>Blackbyte's new exfiltration tool. Hijacking student accounts for BEC. Zhora calls Russia's cyber campaigns a failure. OldGremlin ransomware is an outlier.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1688</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Blackbyte's new exfiltration tool. Hijacking student accounts for BEC. Zhora calls Russia's cyber campaigns a failure. Caleb Barlow explores new thinking for incident response. Our guest is Jon Hencinski of Expel, tracking the latest threat trends. OldGremlin ransomware is an outlier.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/203

Selected reading.
Exbyte: BlackByte Ransomware Attackers Deploy New Exfiltration Tool (Symantec)
Hijacking Student Accounts to Launch BEC-Style Attacks (Avanan)
This sneaky kind of cybercrime rules them all (Washington Post)
Russia Failing to Reach Cyber War Goals, Ukrainian Official Says (Meritalk) 
EU supports cybersecurity in Ukraine with over €10 million - EU NEIGHBOURS east (EU NEIGHBOURS east) 
Gremlins’ prey, secrets, and dirty tricks: the ransomware gang OldGremlin set new records (Group-IB) 
OldGremlin hackers use Linux ransomware to attack Russian orgs (BleepingComputer)
OldGremlin, which targets Russia, debuts new Linux ransomware (Computing) It is one of the few ransomware groups in the world that prefer to target Russian organisations, but this may change experts advise
More Russian Organizations Feeling Ransomware Pain (Bank Info Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Blackbyte's new exfiltration tool. Hijacking student accounts for BEC. Zhora calls Russia's cyber campaigns a failure. Caleb Barlow explores new thinking for incident response. Our guest is Jon Hencinski of Expel, tracking the latest threat trends. OldGremlin ransomware is an outlier.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/203</p><p><br></p><h2>Selected reading.</h2><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/blackbyte-exbyte-ransomware">Exbyte: BlackByte Ransomware Attackers Deploy New Exfiltration Tool</a> (Symantec)</p><p><a href="https://www.avanan.com/blog/hijacking-student-accounts-to-launch-bec-style-attacks">Hijacking Student Accounts to Launch BEC-Style Attacks</a> (Avanan)</p><p><a href="https://www.washingtonpost.com/politics/2022/10/21/this-sneaky-kind-cybercrime-rules-them-all/">This sneaky kind of cybercrime rules them all</a> (Washington Post)</p><p><a href="https://www.meritalk.com/articles/russia-failing-to-reach-cyber-war-goals-ukrainian-official-says/">Russia Failing to Reach Cyber War Goals, Ukrainian Official Says</a> (Meritalk) </p><p><a href="https://euneighbourseast.eu/news/latest-news/eu-supports-cybersecurity-in-ukraine-with-over-e10-million/">EU supports cybersecurity in Ukraine with over €10 million - EU NEIGHBOURS east</a> (EU NEIGHBOURS east) </p><p><a href="https://www.group-ib.com/media-center/press-releases/oldgremlin-2022/">Gremlins’ prey, secrets, and dirty tricks: the ransomware gang OldGremlin set new records</a> (Group-IB) </p><p><a href="https://www.bleepingcomputer.com/news/security/oldgremlin-hackers-use-linux-ransomware-to-attack-russian-orgs/">OldGremlin hackers use Linux ransomware to attack Russian orgs</a> (BleepingComputer)</p><p><a href="https://www.computing.co.uk/news/4058606/oldgremlin-targets-russia-debuts-linux-ransomware">OldGremlin, which targets Russia, debuts new Linux ransomware </a>(Computing) It is one of the few ransomware groups in the world that prefer to target Russian organisations, but this may change experts advise</p><p><a href="https://www.bankinfosecurity.com/blogs/more-russian-organizations-feeling-ransomware-pain-p-3298">More Russian Organizations Feeling Ransomware Pain</a> (Bank Info Security)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1748</itunes:duration>
      <guid isPermaLink="false"><![CDATA[3f008190-787a-11ec-abf0-87fca8a7d07c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3428830339.mp3?updated=1690318277" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Notes and lessons on the hybrid war. Update on Zimbra exploitation. Microsoft fixes misconfigured storage. The state of the cyber workforce. Trends in phishing and ransomware. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1687/notes</link>
      <description>DDoS as misdirection. NSA shares lessons learned from cyber operations observed in Russia's war against Ukraine. Advice from CISA on Zimbra.. A misconfigured Microsoft storage endpoint has been secured. Notes from a study on the Cybersecurity Workforce . The cost to businesses of phishing. Betsy Carmelite from Booz Allen Hamilton on managing mental health in the cyber workforce. Our guest is Ismael Valenzuela of Blackberry with insights on "The Cyber Insurance Gap". And updates to the ransomware leaderboard.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/202

Selected reading.
Bulgarian cyberattack: Sabotage as a cover for spying? (Deutsche Welle)
Bulgarian websites impacted by Killnet DDoS attack (SC Media) 
Lessons From Ukraine: NSA Cyber Chief Lauds Industry Intel (Meritalk)
NSA Cybersecurity Director's Six Takeaways From the War in Ukraine (Infosecurity Magazine) 
NSA cyber chief says Ukraine war is compelling more intelligence sharing with industry (CyberScoop) 
Investigation Regarding Misconfigured Microsoft Storage Location (Microsoft Security Response Center)
2019 Cybersecurity Workforce Study ((ISC)²) 
The Business Cost of Phishing (Ironscales)
Leading Ransomware Variants Q3 2022 (Intel471)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 20 Oct 2022 20:15:00 -0000</pubDate>
      <itunes:title>Notes and lessons on the hybrid war. Update on Zimbra exploitation. Microsoft fixes misconfigured storage. The state of the cyber workforce. Trends in phishing and ransomware. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1687</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>DDoS as misdirection. NSA shares lessons learned from cyber operations observed in Russia's war against Ukraine. Advice from CISA on Zimbra.. A misconfigured Microsoft storage endpoint has been secured. Notes from a study on the Cybersecurity Workforce . The cost to businesses of phishing. Betsy Carmelite from Booz Allen Hamilton on managing mental health in the cyber workforce. Our guest is Ismael Valenzuela of Blackberry with insights on "The Cyber Insurance Gap". And updates to the ransomware leaderboard.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/202

Selected reading.
Bulgarian cyberattack: Sabotage as a cover for spying? (Deutsche Welle)
Bulgarian websites impacted by Killnet DDoS attack (SC Media) 
Lessons From Ukraine: NSA Cyber Chief Lauds Industry Intel (Meritalk)
NSA Cybersecurity Director's Six Takeaways From the War in Ukraine (Infosecurity Magazine) 
NSA cyber chief says Ukraine war is compelling more intelligence sharing with industry (CyberScoop) 
Investigation Regarding Misconfigured Microsoft Storage Location (Microsoft Security Response Center)
2019 Cybersecurity Workforce Study ((ISC)²) 
The Business Cost of Phishing (Ironscales)
Leading Ransomware Variants Q3 2022 (Intel471)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>DDoS as misdirection. NSA shares lessons learned from cyber operations observed in Russia's war against Ukraine. Advice from CISA on Zimbra.. A misconfigured Microsoft storage endpoint has been secured. Notes from a study on the Cybersecurity Workforce . The cost to businesses of phishing. Betsy Carmelite from Booz Allen Hamilton on managing mental health in the cyber workforce. Our guest is Ismael Valenzuela of Blackberry with insights on "The Cyber Insurance Gap". And updates to the ransomware leaderboard.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/202</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.dw.com/en/bulgarian-cyberattack-sabotage-as-a-cover-for-spying-on-nato/a-63483887">Bulgarian cyberattack: Sabotage as a cover for spying?</a> (Deutsche Welle)</p><p><a href="https://www.scmagazine.com/brief/threat-intelligence/bulgarian-websites-impacted-by-killnet-ddos-attack">Bulgarian websites impacted by Killnet DDoS attack</a> (SC Media) </p><p><a href="https://www.meritalk.com/articles/lessons-from-ukraine-nsa-cyber-chief-lauds-industry-intel/">Lessons From Ukraine: NSA Cyber Chief Lauds Industry Intel</a> (Meritalk)</p><p><a href="https://www.infosecurity-magazine.com/news/nsa-6-takeaways-war-ukraine/">NSA Cybersecurity Director's Six Takeaways From the War in Ukraine</a> (Infosecurity Magazine) </p><p><a href="https://www.cyberscoop.com/rob-joyce-nsa-cyber-intel-sharing/">NSA cyber chief says Ukraine war is compelling more intelligence sharing with industry</a> (CyberScoop) </p><p><a href="https://msrc-blog.microsoft.com/2022/10/19/investigation-regarding-misconfigured-microsoft-storage-location-2/">Investigation Regarding Misconfigured Microsoft Storage Location</a> (Microsoft Security Response Center)</p><p><a href="https://www.isc2.org/Research/Workforce-Study">2019 Cybersecurity Workforce Study </a>((ISC)²) </p><p><a href="https://secure.ironscales.com/the-business-cost-of-phishing/report-download">The Business Cost of Phishing</a> (Ironscales)</p><p><a href="https://intel471.com/resources/whitepapers/leading-ransomware-variants-q3-2022">Leading Ransomware Variants Q3 2022</a> (Intel471)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1728</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3e621f00-787a-11ec-abf0-4ba4477cdf37]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6389404930.mp3?updated=1690318262" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dispatches from the hybrid war, as auxiliaries on both sides skirmish in cyberspace. An Azure vulnerability patched. Trends in ransomware. And Social Security phishbait.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1686/notes</link>
      <description>Killnet explains its actions against Bulgaria's government. The National Republican Army claims successful attacks on Russian companies. The Director of Germany's BSI is out. A vulnerability in Azure, disclosed and patched. Trends in ransomware. Carole Theriault has a fresh look at the ransomware question - to pay or not to pay? Tim Eades from Cyber Mentor Fund considers cyber insurance for the small and medium sized businesses. Social Security phishing.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/201

Selected reading.
Cyberattack disrupts Bulgarian government websites over ‘betrayal to Russia’ (The Record by Recorded Future) 
Russians Against Putin: NRA Claims Massive Hack of Russian Government Contractors’ Computers - Kyiv Post - Ukraine's Global Voice (Kyiv Post)
Germany fires cybersecurity chief after reports of possible Russia ties (Reuters) 
German Cybersecurity Chief Sacked Over Alleged Russia Ties (SecurityWeek)
German cyber chief suspended following allegation he associated with Russian intelligence (The Record by Recorded Future) 
FabriXss (CVE-2022-35829): How We Managed to Abuse a Custom Role User Using CSTI and Stored XSS in Azure Fabric Explorer (Orca Security) 
Ransomware In Q3 2022 (Digital Shadows)
Fresh Phish: A New Social Security Phishing Scam Preys Upon Our Biggest Worries (INKY) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 19 Oct 2022 20:15:00 -0000</pubDate>
      <itunes:title>Dispatches from the hybrid war, as auxiliaries on both sides skirmish in cyberspace. An Azure vulnerability patched. Trends in ransomware. And Social Security phishbait.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1686</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Killnet explains its actions against Bulgaria's government. The National Republican Army claims successful attacks on Russian companies. The Director of Germany's BSI is out. A vulnerability in Azure, disclosed and patched. Trends in ransomware. Carole Theriault has a fresh look at the ransomware question - to pay or not to pay? Tim Eades from Cyber Mentor Fund considers cyber insurance for the small and medium sized businesses. Social Security phishing.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/201

Selected reading.
Cyberattack disrupts Bulgarian government websites over ‘betrayal to Russia’ (The Record by Recorded Future) 
Russians Against Putin: NRA Claims Massive Hack of Russian Government Contractors’ Computers - Kyiv Post - Ukraine's Global Voice (Kyiv Post)
Germany fires cybersecurity chief after reports of possible Russia ties (Reuters) 
German Cybersecurity Chief Sacked Over Alleged Russia Ties (SecurityWeek)
German cyber chief suspended following allegation he associated with Russian intelligence (The Record by Recorded Future) 
FabriXss (CVE-2022-35829): How We Managed to Abuse a Custom Role User Using CSTI and Stored XSS in Azure Fabric Explorer (Orca Security) 
Ransomware In Q3 2022 (Digital Shadows)
Fresh Phish: A New Social Security Phishing Scam Preys Upon Our Biggest Worries (INKY) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Killnet explains its actions against Bulgaria's government. The National Republican Army claims successful attacks on Russian companies. The Director of Germany's BSI is out. A vulnerability in Azure, disclosed and patched. Trends in ransomware. Carole Theriault has a fresh look at the ransomware question - to pay or not to pay? Tim Eades from Cyber Mentor Fund considers cyber insurance for the small and medium sized businesses. Social Security phishing.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/201</p><p><br></p><h2>Selected reading.</h2><p><a href="https://therecord.media/cyberattack-disrupts-bulgarian-government-websites-over-betrayal-to-russia/">Cyberattack disrupts Bulgarian government websites over ‘betrayal to Russia’</a> (The Record by Recorded Future) </p><p><a href="https://www.kyivpost.com/russias-war/russians-against-putin-nra-claims-massive-hack-of-russian-government-contractors-computers.html">Russians Against Putin: NRA Claims Massive Hack of Russian Government Contractors’ Computers - Kyiv Post - Ukraine's Global Voice</a> (Kyiv Post)</p><p><a href="https://www.reuters.com/world/europe/german-government-relieves-cyber-security-chief-duty-spiegel-2022-10-18/">Germany fires cybersecurity chief after reports of possible Russia ties</a> (Reuters) </p><p><a href="https://www.securityweek.com/german-cybersecurity-chief-sacked-over-alleged-russia-ties">German Cybersecurity Chief Sacked Over Alleged Russia Ties</a> (SecurityWeek)</p><p><a href="https://therecord.media/german-cyber-chief-suspended-following-allegation-he-associated-with-russian-intelligence/">German cyber chief suspended following allegation he associated with Russian intelligence</a> (The Record by Recorded Future) </p><p><a href="https://orca.security/resources/blog/fabrixss-vulnerability-azure-fabric-explorer/">FabriXss (CVE-2022-35829): How We Managed to Abuse a Custom Role User Using CSTI and Stored XSS in Azure Fabric Explorer</a> (Orca Security) </p><p><a href="https://www.digitalshadows.com/blog-and-research/ransomware-in-q3-2022/">Ransomware In Q3 2022</a> (Digital Shadows)</p><p><a href="https://www.inky.com/en/blog/fresh-phish-a-new-social-security-phishing-scam-preys-upon-our-biggest-worries">Fresh Phish: A New Social Security Phishing Scam Preys Upon Our Biggest Worries</a> (INKY) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1498</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3e0349ee-787a-11ec-abf0-7334a748cbbb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2600546002.mp3?updated=1690318250" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mobilizing DDoS-as-a-service. Interpol takes down Black Axe gang members. Trends in phishing. Spyder Loader active in Hong Kong. Europol announces arrests in keyless car hacking case. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1685/notes</link>
      <description>Mobilizing DDoS-as-a-service. Interpol takes down the Black Axe gang members. A look at phishing trends. Spyder Loader is active in Hong Kong. Joe Carrigan looks at Google’s launch of passwordless authentication. Our guest is Dr. Eman El-Sheikh from University of West Florida's Center for Cybersecurity on NSA-funded National Cybersecurity Workforce Development Programs. And Europol announces arrests in a case of keyless car hacking.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/200

Selected reading.
Project DDOSIA Russia's answer to disBalancer (Radwaare)
Russian DDOSIA Project Pays Volunteers to Participate in DDOS Attacks on Western Companies (Gridinsoft Blogs)
International crackdown on West-African financial crime rings (Interpol)
Giant online scamming syndicate 'Black Axe' destroyed in Interpol-led operation (teiss)
INTERPOL-led Operation Takes Down 'Black Axe' Cyber Crime Organization (The Hacker News)
Operation Jackal: Interpol arrests Black Axe fraud suspects (Register)
When the Black Axe falls: cybercrime suspects detained in global bust (Cybernews)
International Police Action Blunts Black Axe Criminal Group - HS Today (Hstoday)
Q3 2022 Cofense Phishing Intelligence Trends Review (Cofense)
Spyder Loader: Malware Seen in Recent Campaign Targeting Organizations in Hong Kong (Symantec)
Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation (Cybereason)
31 arrested for stealing cars by hacking keyless tech | Europol (Europol)
European gang that sold car hacking tools to thieves arrested (The Record by Recorded Future)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Oct 2022 20:15:00 -0000</pubDate>
      <itunes:title>Mobilizing DDoS-as-a-service. Interpol takes down Black Axe gang members. Trends in phishing. Spyder Loader active in Hong Kong. Europol announces arrests in keyless car hacking case. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1685</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Mobilizing DDoS-as-a-service. Interpol takes down the Black Axe gang members. A look at phishing trends. Spyder Loader is active in Hong Kong. Joe Carrigan looks at Google’s launch of passwordless authentication. Our guest is Dr. Eman El-Sheikh from University of West Florida's Center for Cybersecurity on NSA-funded National Cybersecurity Workforce Development Programs. And Europol announces arrests in a case of keyless car hacking.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/200

Selected reading.
Project DDOSIA Russia's answer to disBalancer (Radwaare)
Russian DDOSIA Project Pays Volunteers to Participate in DDOS Attacks on Western Companies (Gridinsoft Blogs)
International crackdown on West-African financial crime rings (Interpol)
Giant online scamming syndicate 'Black Axe' destroyed in Interpol-led operation (teiss)
INTERPOL-led Operation Takes Down 'Black Axe' Cyber Crime Organization (The Hacker News)
Operation Jackal: Interpol arrests Black Axe fraud suspects (Register)
When the Black Axe falls: cybercrime suspects detained in global bust (Cybernews)
International Police Action Blunts Black Axe Criminal Group - HS Today (Hstoday)
Q3 2022 Cofense Phishing Intelligence Trends Review (Cofense)
Spyder Loader: Malware Seen in Recent Campaign Targeting Organizations in Hong Kong (Symantec)
Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation (Cybereason)
31 arrested for stealing cars by hacking keyless tech | Europol (Europol)
European gang that sold car hacking tools to thieves arrested (The Record by Recorded Future)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Mobilizing DDoS-as-a-service. Interpol takes down the Black Axe gang members. A look at phishing trends. Spyder Loader is active in Hong Kong. Joe Carrigan looks at Google’s launch of passwordless authentication. Our guest is Dr. Eman El-Sheikh from University of West Florida's Center for Cybersecurity on NSA-funded National Cybersecurity Workforce Development Programs. And Europol announces arrests in a case of keyless car hacking.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/200</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.radware.com/security/threat-advisories-and-attack-reports/project-ddosia-russias-answer-to-disbalancer/">Project DDOSIA Russia's answer to disBalancer</a> (Radwaare)</p><p><a href="https://gridinsoft.com/blogs/ddosia-pays-volunteers/">Russian DDOSIA Project Pays Volunteers to Participate in DDOS Attacks on Western Companies</a> (Gridinsoft Blogs)</p><p><a href="https://www.interpol.int/News-and-Events/News/2022/International-crackdown-on-West-African-financial-crime-rings">International crackdown on West-African financial crime rings</a> (Interpol)</p><p><a href="https://www.teiss.co.uk/news/giant-online-scamming-syndicate-black-axe-destroyed-in-interpol-led-operation-11021">Giant online scamming syndicate 'Black Axe' destroyed in Interpol-led operation</a> (teiss)</p><p><a href="https://thehackernews.com/2022/10/interpol-led-operation-takes-down-black.html">INTERPOL-led Operation Takes Down 'Black Axe' Cyber Crime Organization</a> (The Hacker News)</p><p><a href="https://www.theregister.com/2022/10/17/interpol_black_axe_fraud/">Operation Jackal: Interpol arrests Black Axe fraud suspects</a> (Register)</p><p><a href="https://cybernews.com/news/when-the-black-axe-falls-cybercrime-suspects-detained-in-global-bust/">When the Black Axe falls: cybercrime suspects detained in global bust</a> (Cybernews)</p><p><a href="https://www.hstoday.us/subject-matter-areas/cybersecurity/international-police-action-blunts-black-axe-criminal-group/">International Police Action Blunts Black Axe Criminal Group - HS Today</a> (Hstoday)</p><p><a href="https://cofense.com/wp-content/uploads/2022/10/Q3-2022-Cofense-Phishing-Intelligence-Trends-Review.pdf">Q3 2022 Cofense Phishing Intelligence Trends Review</a> (Cofense)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/spyder-loader-cuckoobees-hong-kong">Spyder Loader: Malware Seen in Recent Campaign Targeting Organizations in Hong Kong</a> (Symantec)</p><p><a href="https://www.cybereason.com/blog/operation-cuckoobees-cybereason-uncovers-massive-chinese-intellectual-property-theft-operation">Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation</a> (Cybereason)</p><p><a href="https://www.europol.europa.eu/media-press/newsroom/news/31-arrested-for-stealing-cars-hacking-keyless-tech">31 arrested for stealing cars by hacking keyless tech | Europol</a> (Europol)</p><p><a href="https://therecord.media/european-gang-that-sold-car-hacking-tools-to-thieves-arrested/">European gang that sold car hacking tools to thieves arrested</a> (The Record by Recorded Future)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1737</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3d656c74-787a-11ec-abf0-3b64acdf079f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3661559556.mp3?updated=1690318237" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tata Power sustains cyberattack. Influence operations and battlespace prep. Ransom Cartel looks a lot like REvil. Notes from Russia’s hybrid war.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1684/notes</link>
      <description>There’s been a Cyberattack against Tata Power. The FBI warns US state political parties of Chinese scanning. Russian influence ops play defense; China’s are on the offense. Ransom Cartel and a possible connection to REvil. "Prestige" ransomware is sighted in attacks on Polish and Ukrainian targets. Distributed denial-of-service attacks interfere with Bulgarian websites. Grayson Milbourne of OpenText Security Solutions on SBOMS. Our own Rick Howard checks in with Bryan Willett of Lexmark on implementation of Zero Trust. And Mr. Musk tweets his intention to continue to subsidize Starlink for Ukraine (probably).

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/199

Selected reading.
Hackers Attack Tata Power IT Systems: All You Need To Know (IndiaTimes)
Chinese hackers are scanning state political party headquarters, FBI says (Washington Post)
The Defender's Advantage Cyber Snapshot Issue 2 — More Insights From the Frontlines (Mandiant) 
Ransom Cartel Ransomware: A Possible Connection With REvil (Unit 42)
New “Prestige” ransomware impacts organizations in Ukraine and Poland (Microsoft Security Threat Intelligence)
Bulgarian Government Hit By Cyberattack Blamed On Russian Hacking Group (RadioFreeEurope/RadioLiberty)
'The hell with it': Elon Musk tweets SpaceX will 'keep funding Ukraine govt for free' amid Starlink controversy (CNBC)
Starlink isn't a charity, but the Ukraine war isn't a business opportunity (TechCrunch)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 17 Oct 2022 20:15:00 -0000</pubDate>
      <itunes:title>Tata Power sustains cyberattack. Influence operations and battlespace prep. Ransom Cartel looks a lot like REvil. Notes from Russia’s hybrid war.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1684</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>There’s been a Cyberattack against Tata Power. The FBI warns US state political parties of Chinese scanning. Russian influence ops play defense; China’s are on the offense. Ransom Cartel and a possible connection to REvil. "Prestige" ransomware is sighted in attacks on Polish and Ukrainian targets. Distributed denial-of-service attacks interfere with Bulgarian websites. Grayson Milbourne of OpenText Security Solutions on SBOMS. Our own Rick Howard checks in with Bryan Willett of Lexmark on implementation of Zero Trust. And Mr. Musk tweets his intention to continue to subsidize Starlink for Ukraine (probably).

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/199

Selected reading.
Hackers Attack Tata Power IT Systems: All You Need To Know (IndiaTimes)
Chinese hackers are scanning state political party headquarters, FBI says (Washington Post)
The Defender's Advantage Cyber Snapshot Issue 2 — More Insights From the Frontlines (Mandiant) 
Ransom Cartel Ransomware: A Possible Connection With REvil (Unit 42)
New “Prestige” ransomware impacts organizations in Ukraine and Poland (Microsoft Security Threat Intelligence)
Bulgarian Government Hit By Cyberattack Blamed On Russian Hacking Group (RadioFreeEurope/RadioLiberty)
'The hell with it': Elon Musk tweets SpaceX will 'keep funding Ukraine govt for free' amid Starlink controversy (CNBC)
Starlink isn't a charity, but the Ukraine war isn't a business opportunity (TechCrunch)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>There’s been a Cyberattack against Tata Power. The FBI warns US state political parties of Chinese scanning. Russian influence ops play defense; China’s are on the offense. Ransom Cartel and a possible connection to REvil. "Prestige" ransomware is sighted in attacks on Polish and Ukrainian targets. Distributed denial-of-service attacks interfere with Bulgarian websites. Grayson Milbourne of OpenText Security Solutions on SBOMS. Our own Rick Howard checks in with Bryan Willett of Lexmark on implementation of Zero Trust. And Mr. Musk tweets his intention to continue to subsidize Starlink for Ukraine (probably).</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/199</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.indiatimes.com/technology/news/hackers-attack-tata-power-it-systems-all-you-need-to-know-582231.html">Hackers Attack Tata Power IT Systems: All You Need To Know</a> (IndiaTimes)</p><p><a href="https://www.washingtonpost.com/politics/2022/10/17/chinese-hackers-are-scanning-state-political-party-headquarters-fbi-says/">Chinese hackers are scanning state political party headquarters, FBI says</a> (Washington Post)</p><p><a href="https://www.mandiant.com/resources/blog/cyber-snapshot-issue-two">The Defender's Advantage Cyber Snapshot Issue 2 — More Insights From the Frontlines</a> (Mandiant) </p><p><a href="https://unit42.paloaltonetworks.com/ransom-cartel-ransomware/">Ransom Cartel Ransomware: A Possible Connection With REvil</a> (Unit 42)</p><p><a href="https://www.microsoft.com/security/blog/2022/10/14/new-prestige-ransomware-impacts-organizations-in-ukraine-and-poland/">New “Prestige” ransomware impacts organizations in Ukraine and Poland</a> (Microsoft Security Threat Intelligence)</p><p><a href="https://www.rferl.org/a/bulgaria-cyberattack-russia/32084869.html">Bulgarian Government Hit By Cyberattack Blamed On Russian Hacking Group</a> (RadioFreeEurope/RadioLiberty)</p><p><a href="https://www.cnbc.com/2022/10/15/elon-musk-tweets-on-starlink-well-just-keep-funding-ukraine-govt-for-free.html">'The hell with it': Elon Musk tweets SpaceX will 'keep funding Ukraine govt for free' amid Starlink controversy</a> (CNBC)</p><p><a href="https://techcrunch.com/2022/10/15/starlink-isnt-a-charity-but-the-ukraine-war-isnt-a-business-opportunity/">Starlink isn't a charity, but the Ukraine war isn't a business opportunity</a> (TechCrunch)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1749</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3ce69598-787a-11ec-abf0-3fbd84ba8a74]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9530222877.mp3?updated=1690318222" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Amanda Adams: Pivoting into the tech world. [VP] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/121/notes</link>
      <description>Amanda Adams, VP of Americas Alliances at CrowdStrike sits down to share her story as she pivoted into the tech field. She started her career by wanted to be involved with sports, after getting her masters degree Amanda was faced with a difficult choice between working for The Golden State Warriors and Cisco. She ultimately chose Cisco as her path to move forward and has been working in technology ever since. Now she works for a team where she gets to prove her social skills and is focused on partnerships. She say's that working in technology doesn't just have to be working with technology, there are many other ways you can get involved with the field. Amanda says "you can always pivot into the technology industry and support the broader mission by doing that job function." We thank Amanda for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 16 Oct 2022 07:00:00 -0000</pubDate>
      <itunes:title>Amanda Adams: Pivoting into the tech world. [VP] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>121</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Amanda Adams, VP of Americas Alliances at CrowdStrike sits down to share her story as she pivoted into the tech field. She started her career by wanted to be involved with sports, after getting her masters degree Amanda was faced with a difficult choice between working for The Golden State Warriors and Cisco. She ultimately chose Cisco as her path to move forward and has been working in technology ever since. Now she works for a team where she gets to prove her social skills and is focused on partnerships. She say's that working in technology doesn't just have to be working with technology, there are many other ways you can get involved with the field. Amanda says "you can always pivot into the technology industry and support the broader mission by doing that job function." We thank Amanda for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Amanda Adams, VP of Americas Alliances at CrowdStrike sits down to share her story as she pivoted into the tech field. She started her career by wanted to be involved with sports, after getting her masters degree Amanda was faced with a difficult choice between working for The Golden State Warriors and Cisco. She ultimately chose Cisco as her path to move forward and has been working in technology ever since. Now she works for a team where she gets to prove her social skills and is focused on partnerships. She say's that working in technology doesn't just have to be working with technology, there are many other ways you can get involved with the field. Amanda says "you can always pivot into the technology industry and support the broader mission by doing that job function." We thank Amanda for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>527</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9aea97e2-4b2a-11ed-9347-9fc9d84500c5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1635443542.mp3?updated=1666887534" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber confidence: Knowing what you have and where it is. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/40/notes</link>
      <description>Between multi-cloud deployments, more employees working remotely, and increasing use of SaaS applications, the number of entry points for attackers to infiltrate your systems has exploded. But gaining visibility into all these possible attack vectors is time-consuming and often incomplete or just a snapshot in time.
If the first rule of cyber is to “know what you have,” how can cyber professionals get a comprehensive, current picture of their assets? How can they feel confident that they understand which assets may be more vulnerable and prioritize defenses accordingly?
In the first half of this episode of Cyberwire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by Hash Table member Jaclyn Miller, the Head of InfoSec &amp; IT at DispatchHealth. In the second half of the episode, Cody Pierce, Chief Product Officer at episode sponsor LookingGlass Cyber Solutions, talks with Dave Bittner. Listen to the discussions about answering the foundational cyber questions (What do I have? Is it protected?), why context is critical, and how an adversarial perspective helps you be a better defender.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 16 Oct 2022 07:00:00 -0000</pubDate>
      <itunes:title>Cyber confidence: Knowing what you have and where it is. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>40</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Between multi-cloud deployments, more employees working remotely, and increasing use of SaaS applications, the number of entry points for attackers to infiltrate your systems has exploded. But gaining visibility into all these possible attack vectors is time-consuming and often incomplete or just a snapshot in time.
If the first rule of cyber is to “know what you have,” how can cyber professionals get a comprehensive, current picture of their assets? How can they feel confident that they understand which assets may be more vulnerable and prioritize defenses accordingly?
In the first half of this episode of Cyberwire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by Hash Table member Jaclyn Miller, the Head of InfoSec &amp; IT at DispatchHealth. In the second half of the episode, Cody Pierce, Chief Product Officer at episode sponsor LookingGlass Cyber Solutions, talks with Dave Bittner. Listen to the discussions about answering the foundational cyber questions (What do I have? Is it protected?), why context is critical, and how an adversarial perspective helps you be a better defender.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Between multi-cloud deployments, more employees working remotely, and increasing use of SaaS applications, the number of entry points for attackers to infiltrate your systems has exploded. But gaining visibility into all these possible attack vectors is time-consuming and often incomplete or just a snapshot in time.</p><p>If the first rule of cyber is to “know what you have,” how can cyber professionals get a comprehensive, current picture of their assets? How can they feel confident that they understand which assets may be more vulnerable and prioritize defenses accordingly?</p><p>In the first half of this episode of Cyberwire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by Hash Table member Jaclyn Miller, the Head of InfoSec &amp; IT at DispatchHealth. In the second half of the episode, Cody Pierce, Chief Product Officer at episode sponsor LookingGlass Cyber Solutions, talks with Dave Bittner. Listen to the discussions about answering the foundational cyber questions (What do I have? Is it protected?), why context is critical, and how an adversarial perspective helps you be a better defender.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1714</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d8df805e-4bd3-11ed-aa4f-e3b031a230a7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6036198059.mp3?updated=1665775958" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Noberus ransomware: evolving tactics. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/254/notes</link>
      <description>Brigid O Gorman from Symantec's Threat Hunter team joins Dave to discuss their research on "Noberus Ransomware - Darkside and BlackMatter Successor Continues to Evolve its Tactics." The research states that Noberus ransomware (aka BlackCat, ALPHV) is more dangerous than ever because attackers have been using new tactics, tools, and procedures in recent months.
In the research, Symantec says, "Among some of the more notable developments has been the use of a new version of the Exmatter data exfiltration tool, and the use of Eamfo, information-stealing malware that is designed to steal credentials stored by Veeam backup software." They go over an in-depth look at how its affiliate program operates.
The research can be found here:
Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Oct 2022 07:00:00 -0000</pubDate>
      <itunes:title>Noberus ransomware: evolving tactics. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>254</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Brigid O Gorman from Symantec's Threat Hunter team joins Dave to discuss their research on "Noberus Ransomware - Darkside and BlackMatter Successor Continues to Evolve its Tactics." The research states that Noberus ransomware (aka BlackCat, ALPHV) is more dangerous than ever because attackers have been using new tactics, tools, and procedures in recent months.
In the research, Symantec says, "Among some of the more notable developments has been the use of a new version of the Exmatter data exfiltration tool, and the use of Eamfo, information-stealing malware that is designed to steal credentials stored by Veeam backup software." They go over an in-depth look at how its affiliate program operates.
The research can be found here:
Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Brigid O Gorman from Symantec's Threat Hunter team joins Dave to discuss their research on "Noberus Ransomware - Darkside and BlackMatter Successor Continues to Evolve its Tactics." The research states that Noberus ransomware (aka BlackCat, ALPHV) is more dangerous than ever because attackers have been using new tactics, tools, and procedures in recent months.</p><p>In the research, Symantec says, "Among some of the more notable developments has been the use of a new version of the Exmatter data exfiltration tool, and the use of Eamfo, information-stealing malware that is designed to steal credentials stored by Veeam backup software." They go over an in-depth look at how its affiliate program operates.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/noberus-blackcat-ransomware-ttps">Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1285</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10038262-4b19-11ed-b26c-1b555d4f5584]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7902651929.mp3?updated=1685127190" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing for poll watchers. Impersonating Intrusion Truth. Data breach at the LDS Church. SpaceX asks for help paying for Ukraine’s Starlink. Killnet’s potential. The gamer’s attack surface.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1683/notes</link>
      <description>County election workers find themselves targets of phishing. Impersonating Intrusion Truth. The LDS Church discloses data compromise. SpaceX asks for Starlink funding. Does Killnet have potential to do more damage than it so far has? Deepen Desai from Zscaler on Joker, Facestealer and Coper banking malwares on the Google Play store. Our guest is Maxime Lamothe-Brassard of LimaCharlie to discuss how the cybersecurity is following in the footsteps of software engineering. And the Gamers’ attack surface? It’s big, big, really big, Noobs.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/198

Selected reading.
2022 Election Phishing Attacks Target Election Workers (Trellix)
Suspicious Twitter accounts impersonating research group try to blame the NSA for Chinese hacks (The Daily Dot)
Statement and FAQ on Church Account Data Incident (Church of Jesus Christ of Latter Day Saints)
Exclusive: Musk's SpaceX says it can no longer pay for critical satellite services in Ukraine, asks Pentagon to pick up the tab (CNN)
Killnet: don't underestimate the “script kiddies,” experts say (Cybernews)
Gaming Is Booming. That’s Catnip for Cybercriminals. (New York Times) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 14 Oct 2022 20:15:00 -0000</pubDate>
      <itunes:title>Phishing for poll watchers. Impersonating Intrusion Truth. Data breach at the LDS Church. SpaceX asks for help paying for Ukraine’s Starlink. Killnet’s potential. The gamer’s attack surface.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1683</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>County election workers find themselves targets of phishing. Impersonating Intrusion Truth. The LDS Church discloses data compromise. SpaceX asks for Starlink funding. Does Killnet have potential to do more damage than it so far has? Deepen Desai from Zscaler on Joker, Facestealer and Coper banking malwares on the Google Play store. Our guest is Maxime Lamothe-Brassard of LimaCharlie to discuss how the cybersecurity is following in the footsteps of software engineering. And the Gamers’ attack surface? It’s big, big, really big, Noobs.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/198

Selected reading.
2022 Election Phishing Attacks Target Election Workers (Trellix)
Suspicious Twitter accounts impersonating research group try to blame the NSA for Chinese hacks (The Daily Dot)
Statement and FAQ on Church Account Data Incident (Church of Jesus Christ of Latter Day Saints)
Exclusive: Musk's SpaceX says it can no longer pay for critical satellite services in Ukraine, asks Pentagon to pick up the tab (CNN)
Killnet: don't underestimate the “script kiddies,” experts say (Cybernews)
Gaming Is Booming. That’s Catnip for Cybercriminals. (New York Times) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>County election workers find themselves targets of phishing. Impersonating Intrusion Truth. The LDS Church discloses data compromise. SpaceX asks for Starlink funding. Does Killnet have potential to do more damage than it so far has? Deepen Desai from Zscaler on Joker, Facestealer and Coper banking malwares on the Google Play store. Our guest is Maxime Lamothe-Brassard of LimaCharlie to discuss how the cybersecurity is following in the footsteps of software engineering. And the Gamers’ attack surface? It’s big, big, really big, Noobs.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/198</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.trellix.com/en-us/about/newsroom/stories/research/2022-election-phishing-attacks-target-election-workers.html">2022 Election Phishing Attacks Target Election Workers</a> (Trellix)</p><p><a href="https://www.dailydot.com/debug/intrusion-truth-impersonators-twitter-apt-41/">Suspicious Twitter accounts impersonating research group try to blame the NSA for Chinese hacks</a> (The Daily Dot)</p><p><a href="https://newsroom.churchofjesuschrist.org/article/data-incident">Statement and FAQ on Church Account Data Incident</a> (Church of Jesus Christ of Latter Day Saints)</p><p><a href="https://www.cnn.com/2022/10/13/politics/elon-musk-spacex-starlink-ukraine/">Exclusive: Musk's SpaceX says it can no longer pay for critical satellite services in Ukraine, asks Pentagon to pick up the tab</a> (CNN)</p><p><a href="https://cybernews.com/cyber-war/killnet-dont-underestimate-script-kiddies/">Killnet: don't underestimate the “script kiddies,” experts say</a> (Cybernews)</p><p><a href="https://www.nytimes.com/2022/10/13/technology/gamers-malware-minecraft-roblox.html">Gaming Is Booming. That’s Catnip for Cybercriminals.</a> (New York Times) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1678</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3ee0dad4-787a-11ec-abf0-6f0842743b95]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7082123641.mp3?updated=1690318210" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What the cybercriminals are up to: improving their tools and carrying out the same old dreary social engineering. Budworm APT sightings. And the state of Russia’s hybrid war.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1682/notes</link>
      <description>Emotet ups its game. COVID-19 small business grants as phishbait. Google Translate is spoofed for credential harvesting. Research on the Budworm espionage group. Kevin Magee from Microsoft shares why cybersecurity professionals should join company boards. Our guest is Chris Niggel from Okta with a look at identity shortfalls. And Internet outages during missile strikes, and the prospects of Russia’s hybrid war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/197

Selected reading.
Emotote’s evolution. (ESET)
Fresh Phish: Small Business COVID-19 Grants Designed for Disaster (INKY)
Spoofing Google Translate to Steal Credentials (Avanan) 
Budworm: Espionage Group Returns to Targeting U.S. Organizations (Symantec Blog) 
Internet outages hit Ukraine following Russian missile strikes (Bitdefender)
Starlink helped restore energy, communications infrastructure in parts of Ukraine - official (Reuters)
Ukraine’s Vice PM Thanks Starlink for Help to Restore Connections After Missile Attack from Russia (Tech Times)
We must tackle Europe’s winter cyber threats head-on (POLITICO)
The conflict in Ukraine makes us rethink cyberwar (The Japan Times)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 13 Oct 2022 20:15:00 -0000</pubDate>
      <itunes:title>What the cybercriminals are up to: improving their tools and carrying out the same old dreary social engineering. Budworm APT sightings. And the state of Russia’s hybrid war.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1682</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Emotet ups its game. COVID-19 small business grants as phishbait. Google Translate is spoofed for credential harvesting. Research on the Budworm espionage group. Kevin Magee from Microsoft shares why cybersecurity professionals should join company boards. Our guest is Chris Niggel from Okta with a look at identity shortfalls. And Internet outages during missile strikes, and the prospects of Russia’s hybrid war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/197

Selected reading.
Emotote’s evolution. (ESET)
Fresh Phish: Small Business COVID-19 Grants Designed for Disaster (INKY)
Spoofing Google Translate to Steal Credentials (Avanan) 
Budworm: Espionage Group Returns to Targeting U.S. Organizations (Symantec Blog) 
Internet outages hit Ukraine following Russian missile strikes (Bitdefender)
Starlink helped restore energy, communications infrastructure in parts of Ukraine - official (Reuters)
Ukraine’s Vice PM Thanks Starlink for Help to Restore Connections After Missile Attack from Russia (Tech Times)
We must tackle Europe’s winter cyber threats head-on (POLITICO)
The conflict in Ukraine makes us rethink cyberwar (The Japan Times)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Emotet ups its game. COVID-19 small business grants as phishbait. Google Translate is spoofed for credential harvesting. Research on the Budworm espionage group. Kevin Magee from Microsoft shares why cybersecurity professionals should join company boards. Our guest is Chris Niggel from Okta with a look at identity shortfalls. And Internet outages during missile strikes, and the prospects of Russia’s hybrid war.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/197</p><p><br></p><h2>Selected reading.</h2><p><a href="https://twitter.com/ESETresearch/status/1580242734647869446">Emotote’s evolution.</a> (ESET)</p><p><a href="https://www.inky.com/en/blog/fresh-phish-small-business-covid-19-grants-designed-for-disaster">Fresh Phish: Small Business COVID-19 Grants Designed for Disaster</a> (INKY)</p><p><a href="https://www.avanan.com/blog/spoofing-google-translate-to-steal-credentials">Spoofing Google Translate to Steal Credentials</a> (Avanan) </p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/budworm-espionage-us-state">Budworm: Espionage Group Returns to Targeting U.S. Organizations</a> (Symantec Blog) </p><p><a href="https://www.bitdefender.com/blog/hotforsecurity/internet-outages-hit-ukraine-following-russian-missile-strikes/">Internet outages hit Ukraine following Russian missile strikes</a> (Bitdefender)</p><p><a href="https://www.reuters.com/world/starlink-helped-restore-energy-communications-infrastructure-parts-ukraine-2022-10-12/">Starlink helped restore energy, communications infrastructure in parts of Ukraine - official</a> (Reuters)</p><p><a href="https://www.techtimes.com/articles/281884/20221012/ukraine-s-vice-pm-thanks-starlink-help-restore-connections-attack.htm">Ukraine’s Vice PM Thanks Starlink for Help to Restore Connections After Missile Attack from Russia</a> (Tech Times)</p><p><a href="https://www.politico.eu/article/we-must-tackle-europes-winter-cyber-threats-head-on/">We must tackle Europe’s winter cyber threats head-on</a> (POLITICO)</p><p><a href="https://www.japantimes.co.jp/opinion/2022/10/12/commentary/world-commentary/conflict-ukraine-makes-us-rethink-cyberwar/">The conflict in Ukraine makes us rethink cyberwar</a> (The Japan Times)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1375</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3e81d8e0-787a-11ec-abf0-4f485cffb82b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9031057350.mp3?updated=1690318193" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Caffeine in the C2C market. Refund-fraud-as-a-service. Costs of a nuisance. Staying alert during a hybrid war. Renewed Polonium activity. The Uber case's impact on security professionals.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1681/notes</link>
      <description>Refund fraud as a service. Costs of a nuisance. Remaining on alert during a hybrid war. Renewed activity by Polonium. Andrea Little Limbago from Interos discussing quantum computing policy. CyberWire Space Correspondent Maria Varmazis speaks with Dr. Gregory Falco on lessons learned from Russia’s attack on Viasat. Reflections on the Uber case's impact on security professionals. And when it comes to phishing-as-a-service, we’ll take decaf.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/196

Selected reading.
The Fresh Phish Market: Behind the Scenes of the Caffeine Phishing-as-a-Service Platform (Mandiant) 
Caffeine phishing. (CyberWire)
Refund Fraud as a Service (Netacea)
Amid reports of JP Morgan cyberattack, experts call Killnet unsophisticated, ‘media hungry’ (SC Media)
Hacktivists Force Companies to Respond to Low-Level Cyberattacks (Wall Street Journal) 
Nato warns Russian sabotage on Western targets 'could trigger Article 5' (The Telegraph)
US Not Ruling Out Russian Cyber Offensive (VOA)
Ukraine at D+230: Escalation, but unlikely to be sustainable. (CyberWire)
POLONIUM targets Israel with Creepy malware (WeLiveSecurity)
Hacking group POLONIUM uses ‘Creepy’ malware against Israel (BleepingComputer)
Security chiefs fear ‘CISO scapegoating’ following Uber-Sullivan verdict (The Record)
Sullivan verdict sends shockwaves through the security industry (Security Info Watch)
Reflections on the Uber case's impact on security. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 12 Oct 2022 20:15:00 -0000</pubDate>
      <itunes:title>Caffeine in the C2C market. Refund-fraud-as-a-service. Costs of a nuisance. Staying alert during a hybrid war. Renewed Polonium activity. The Uber case's impact on security professionals.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1681</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Refund fraud as a service. Costs of a nuisance. Remaining on alert during a hybrid war. Renewed activity by Polonium. Andrea Little Limbago from Interos discussing quantum computing policy. CyberWire Space Correspondent Maria Varmazis speaks with Dr. Gregory Falco on lessons learned from Russia’s attack on Viasat. Reflections on the Uber case's impact on security professionals. And when it comes to phishing-as-a-service, we’ll take decaf.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/196

Selected reading.
The Fresh Phish Market: Behind the Scenes of the Caffeine Phishing-as-a-Service Platform (Mandiant) 
Caffeine phishing. (CyberWire)
Refund Fraud as a Service (Netacea)
Amid reports of JP Morgan cyberattack, experts call Killnet unsophisticated, ‘media hungry’ (SC Media)
Hacktivists Force Companies to Respond to Low-Level Cyberattacks (Wall Street Journal) 
Nato warns Russian sabotage on Western targets 'could trigger Article 5' (The Telegraph)
US Not Ruling Out Russian Cyber Offensive (VOA)
Ukraine at D+230: Escalation, but unlikely to be sustainable. (CyberWire)
POLONIUM targets Israel with Creepy malware (WeLiveSecurity)
Hacking group POLONIUM uses ‘Creepy’ malware against Israel (BleepingComputer)
Security chiefs fear ‘CISO scapegoating’ following Uber-Sullivan verdict (The Record)
Sullivan verdict sends shockwaves through the security industry (Security Info Watch)
Reflections on the Uber case's impact on security. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Refund fraud as a service. Costs of a nuisance. Remaining on alert during a hybrid war. Renewed activity by Polonium. Andrea Little Limbago from Interos discussing quantum computing policy. CyberWire Space Correspondent Maria Varmazis speaks with Dr. Gregory Falco on lessons learned from Russia’s attack on Viasat. Reflections on the Uber case's impact on security professionals. And when it comes to phishing-as-a-service, we’ll take decaf.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/196</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.mandiant.com/resources/blog/caffeine-phishing-service-platform">The Fresh Phish Market: Behind the Scenes of the Caffeine Phishing-as-a-Service Platform</a> (Mandiant) </p><p><a href="https://thecyberwire.com/stories/6423c92d9a0f4ac9a4b458bed5cf9bfa/caffeine-phishing">Caffeine phishing.</a> (CyberWire)</p><p><a href="https://netacea.com/uploads/refund_fraud_as_a_service_for_digital_for_website.pdf">Refund Fraud as a Service</a> (Netacea)</p><p><a href="https://www.scmagazine.com/analysis/cybercrime/amid-reports-of-jp-morgan-cyberattack-experts-call-killnet-unsophisticated-media-hungry">Amid reports of JP Morgan cyberattack, experts call Killnet unsophisticated, ‘media hungry’</a> (SC Media)</p><p><a href="https://www.wsj.com/articles/hacktivists-force-companies-to-respond-to-low-level-cyberattacks-11665519781?mod=djemCybersecruityPro&amp;tpl=cy">Hacktivists Force Companies to Respond to Low-Level Cyberattacks </a>(Wall Street Journal) </p><p><a href="https://www.telegraph.co.uk/world-news/2022/10/11/nato-warns-russian-sabotage-western-targets-could-trigger-article/">Nato warns Russian sabotage on Western targets 'could trigger Article 5'</a> (The Telegraph)</p><p><a href="https://www.voanews.com/a/us-not-ruling-out-russian-cyber-offensive-/6786197.html">US Not Ruling Out Russian Cyber Offensive </a>(VOA)</p><p><a href="https://thecyberwire.com/stories/2ff2b55ebcb148919fe8960f121dd7e1/ukraine-at-d230-escalation-but-unlikely-to-be-sustainable">Ukraine at D+230: Escalation, but unlikely to be sustainable</a>. (CyberWire)</p><p><a href="https://www.welivesecurity.com/2022/10/11/polonium-targets-israel-creepy-malware/">POLONIUM targets Israel with Creepy malware</a> (WeLiveSecurity)</p><p><a href="https://www.bleepingcomputer.com/news/security/hacking-group-polonium-uses-creepy-malware-against-israel/">Hacking group POLONIUM uses ‘Creepy’ malware against Israel</a> (BleepingComputer)</p><p><a href="https://therecord.media/security-chiefs-fear-ciso-scapegoating-following-uber-sullivan-verdict/">Security chiefs fear ‘CISO scapegoating’ following Uber-Sullivan verdict</a> (The Record)</p><p><a href="https://www.securityinfowatch.com/security-executives/article/21283224/sullivan-verdict-sends-shockwaves-through-the-security-industry">Sullivan verdict sends shockwaves through the security industry</a> (Security Info Watch)</p><p><a href="https://thecyberwire.com/stories/0137dda4ebec46ae9d817924990b3947/reflections-on-the-uber-cases-impact-on-security-professionals">Reflections on the Uber case's impact on security</a>. (CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1483</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3de3c5ce-787a-11ec-abf0-47b3dd31c516]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8819070218.mp3?updated=1690318172" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An update on the hybrid war, where Russia turns to missile strikes, physical sabotage, and nuisance-level DDoS. Surveys look at the state of the SOC and the mind of the CISO.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1680/notes</link>
      <description>Russia's Killnet suspected in DDoS attack on major US airports. Starlink service interruptions reported. Bundesbahn communications network sabotaged in northern Germany. Germany's cybersecurity chief faces scrutiny over alleged ties to Russia. Ben Yelin on the FCC's crackdown on robocalls. Ann Johnson from Afternoon Cyber Tea talking with Sounil Yu from JupiterOne about the importance and evolution of cyber resilience. Overworked CISOs may be a security risk, but in an encouraging counterpoint, another study shows a record of CISO success during the pandemic.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/195

Selected reading.
US Airport Websites Hit by Suspected Pro-Russian Cyberattacks (SecurityWeek) 
Hackers knock some U.S. airport websites offline (Washington Post)
Hackers took down U.S. airport web sites, Department of Homeland Security confirms (USA TODAY)
Pro-Russian hackers claim responsibility for taking down US airport websites (Computing) 
US airports' sites taken down in DDoS attacks by pro-Russian hackers (BleepingComputer) 
Pro-Putin goons target US airport websites with DDoS flood (Register) 
Russian Sanctions Instigator Lloyd’s Possibly Hit by Cyber-Attack (Infosecurity Magazine)
Lloyd's of London reboots network after suspicious activity (Register)
Colorado.gov Back Online After Cyber Attack (GovTech)
Defending Ukraine: SecTor session probes a complex cyber war (IT World Canada)
Ukrainian officials reportedly say there have been 'catastrophic' Starlink outages in recent weeks (Business Insider)
Frontline Ukraine troops are reportedly enduring Starlink outages (Engadget).
Elon Musk’s foray into geopolitics has Ukraine worried (The Economist)
Elon Musk needs to clarify Ukraine's reported Starlink outages: Kinzinger (Newsweek) 
Attack on German Rail Network ‘Targeted, Professional,’ Police Say (Bloomberg)
An act of sabotage shut down parts of Germany's rail system for hours this weekend (NPR.org)
Germany rail chaos could have been caused by Russia, says MP (The Telegraph) 
Sabotage blamed for major disruption on Germany’s rail network (The Telegraph) 
No sign that foreign state was behind German rail sabotage, police say (Reuters)
Germany Won’t Rule Out Foreign Country Role in Rail Sabotage (Bloomberg)
Germany's cybersecurity chief faces dismissal, reports say (Reuters)
German cybersecurity chief investigated over Russia ties (ABC News)
German Cybersecurity Chief to be Sacked Over Alleged Russia Ties: Sources (SecurityWeek)
„Wir müssen wachsam bleiben“ (Tagesspiegel) 
1 in 5 Chief Information Security Officers (CISOs) Work More Than 25 Extra Hours Per Week (Tessian) 
2022 Devo SOC Performance Report (Devo)
2022 Deloitte-NASCIO Cybersecurity Study (Deloitte Insights)
Cybersecurity Survey of State CISOs Identifies Many Positive Trends (PR Newswire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Oct 2022 20:15:00 -0000</pubDate>
      <itunes:title>An update on the hybrid war, where Russia turns to missile strikes, physical sabotage, and nuisance-level DDoS. Surveys look at the state of the SOC and the mind of the CISO.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1680</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Russia's Killnet suspected in DDoS attack on major US airports. Starlink service interruptions reported. Bundesbahn communications network sabotaged in northern Germany. Germany's cybersecurity chief faces scrutiny over alleged ties to Russia. Ben Yelin on the FCC's crackdown on robocalls. Ann Johnson from Afternoon Cyber Tea talking with Sounil Yu from JupiterOne about the importance and evolution of cyber resilience. Overworked CISOs may be a security risk, but in an encouraging counterpoint, another study shows a record of CISO success during the pandemic.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/195

Selected reading.
US Airport Websites Hit by Suspected Pro-Russian Cyberattacks (SecurityWeek) 
Hackers knock some U.S. airport websites offline (Washington Post)
Hackers took down U.S. airport web sites, Department of Homeland Security confirms (USA TODAY)
Pro-Russian hackers claim responsibility for taking down US airport websites (Computing) 
US airports' sites taken down in DDoS attacks by pro-Russian hackers (BleepingComputer) 
Pro-Putin goons target US airport websites with DDoS flood (Register) 
Russian Sanctions Instigator Lloyd’s Possibly Hit by Cyber-Attack (Infosecurity Magazine)
Lloyd's of London reboots network after suspicious activity (Register)
Colorado.gov Back Online After Cyber Attack (GovTech)
Defending Ukraine: SecTor session probes a complex cyber war (IT World Canada)
Ukrainian officials reportedly say there have been 'catastrophic' Starlink outages in recent weeks (Business Insider)
Frontline Ukraine troops are reportedly enduring Starlink outages (Engadget).
Elon Musk’s foray into geopolitics has Ukraine worried (The Economist)
Elon Musk needs to clarify Ukraine's reported Starlink outages: Kinzinger (Newsweek) 
Attack on German Rail Network ‘Targeted, Professional,’ Police Say (Bloomberg)
An act of sabotage shut down parts of Germany's rail system for hours this weekend (NPR.org)
Germany rail chaos could have been caused by Russia, says MP (The Telegraph) 
Sabotage blamed for major disruption on Germany’s rail network (The Telegraph) 
No sign that foreign state was behind German rail sabotage, police say (Reuters)
Germany Won’t Rule Out Foreign Country Role in Rail Sabotage (Bloomberg)
Germany's cybersecurity chief faces dismissal, reports say (Reuters)
German cybersecurity chief investigated over Russia ties (ABC News)
German Cybersecurity Chief to be Sacked Over Alleged Russia Ties: Sources (SecurityWeek)
„Wir müssen wachsam bleiben“ (Tagesspiegel) 
1 in 5 Chief Information Security Officers (CISOs) Work More Than 25 Extra Hours Per Week (Tessian) 
2022 Devo SOC Performance Report (Devo)
2022 Deloitte-NASCIO Cybersecurity Study (Deloitte Insights)
Cybersecurity Survey of State CISOs Identifies Many Positive Trends (PR Newswire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russia's Killnet suspected in DDoS attack on major US airports. Starlink service interruptions reported. Bundesbahn communications network sabotaged in northern Germany. Germany's cybersecurity chief faces scrutiny over alleged ties to Russia. Ben Yelin on the FCC's crackdown on robocalls. Ann Johnson from Afternoon Cyber Tea talking with Sounil Yu from JupiterOne about the importance and evolution of cyber resilience. Overworked CISOs may be a security risk, but in an encouraging counterpoint, another study shows a record of CISO success during the pandemic.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/195</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.securityweek.com/us-airport-websites-hit-suspected-pro-russian-cyberattacks">US Airport Websites Hit by Suspected Pro-Russian Cyberattacks</a> (SecurityWeek) </p><p><a href="https://www.washingtonpost.com/transportation/2022/10/10/hackers-cyber-attack-airport-websites/">Hackers knock some U.S. airport websites offline</a> (Washington Post)</p><p><a href="https://www.usatoday.com/story/news/politics/2022/10/10/hackers-airport-websites-russia/8236879001/">Hackers took down U.S. airport web sites, Department of Homeland Security confirms</a> (USA TODAY)</p><p><a href="https://www.computing.co.uk/news/4057838/pro-russian-hackers-claim-responsibility-taking-us-airport-websites">Pro-Russian hackers claim responsibility for taking down US airport websites </a>(Computing) </p><p><a href="https://www.bleepingcomputer.com/news/security/us-airports-sites-taken-down-in-ddos-attacks-by-pro-russian-hackers/">US airports' sites taken down in DDoS attacks by pro-Russian hackers</a> (BleepingComputer) </p><p><a href="https://www.theregister.com/2022/10/10/ddos_us_airport_websites/">Pro-Putin goons target US airport websites with DDoS flood</a> (Register) </p><p><a href="https://www.infosecurity-magazine.com/news/lloyds-possibly-hit-by-cyberattack/">Russian Sanctions Instigator Lloyd’s Possibly Hit by Cyber-Attack</a> (Infosecurity Magazine)</p><p><a href="https://www.theregister.com/2022/10/07/lloyds_london_security_incident/">Lloyd's of London reboots network after suspicious activity</a> (Register)</p><p><a href="https://www.govtech.com/security/colorado-gov-back-online-after-cyber-attack">Colorado.gov Back Online After Cyber Attack</a> (GovTech)</p><p><a href="https://www.itworldcanada.com/article/defending-ukraine-sector-session-probes-a-complex-cyber-war/507289">Defending Ukraine: SecTor session probes a complex cyber war</a> (IT World Canada)</p><p><a href="https://www.businessinsider.com/ukraine-spacex-starlink-outages-report-2022-10">Ukrainian officials reportedly say there have been 'catastrophic' Starlink outages in recent weeks</a> (Business Insider)</p><p><a href="https://www.engadget.com/ukraine-starlink-outages-russia-elon-musk-173909699.html">Frontline Ukraine troops are reportedly enduring Starlink outages</a> (Engadget).</p><p><a href="https://www.economist.com/briefing/2022/10/06/elon-musks-foray-into-geopolitics-has-ukraine-worried">Elon Musk’s foray into geopolitics has Ukraine worried</a> (The Economist)</p><p><a href="https://www.newsweek.com/elon-musk-needs-clarify-ukraines-reported-starlink-outages-kinzinger-1750071">Elon Musk needs to clarify Ukraine's reported Starlink outages: Kinzinger</a> (Newsweek) </p><p><a href="https://www.bloomberg.com/news/articles/2022-10-09/attack-on-german-rail-network-targeted-professional-police">Attack on German Rail Network ‘Targeted, Professional,’ Police Say</a> (Bloomberg)</p><p><a href="https://www.npr.org/2022/10/09/1127739900/germany-trains-sabotage">An act of sabotage shut down parts of Germany's rail system for hours this weekend</a> (NPR.org)</p><p><a href="https://www.telegraph.co.uk/world-news/2022/10/09/germany-rail-chaos-could-have-caused-russia-says-mp/">Germany rail chaos could have been caused by Russia, says MP</a> (The Telegraph) </p><p><a href="https://www.telegraph.co.uk/world-news/2022/10/08/sabotage-blamed-major-disruption-germanys-rail-network/">Sabotage blamed for major disruption on Germany’s rail network</a> (The Telegraph) </p><p><a href="https://www.reuters.com/world/europe/no-sign-that-foreign-state-was-behind-german-rail-sabotage-police-2022-10-09/">No sign that foreign state was behind German rail sabotage, police say</a> (Reuters)</p><p><a href="https://www.bloomberg.com/news/articles/2022-10-10/germany-won-t-rule-out-foreign-country-role-in-rail-sabotage">Germany Won’t Rule Out Foreign Country Role in Rail Sabotage</a> (Bloomberg)</p><p><a href="https://www.reuters.com/world/europe/germanys-cybersecurity-chief-faces-dismissal-reports-2022-10-09/">Germany's cybersecurity chief faces dismissal, reports say</a> (Reuters)</p><p><a href="https://abcnews.go.com/Business/wireStory/german-cybersecurity-chief-investigated-russia-ties-91274203">German cybersecurity chief investigated over Russia ties</a> (ABC News)</p><p><a href="https://www.securityweek.com/german-cybersecurity-chief-be-sacked-over-alleged-russia-ties-sources">German Cybersecurity Chief to be Sacked Over Alleged Russia Ties: Sources</a> (SecurityWeek)</p><p><a href="https://background.tagesspiegel.de/cybersecurity/wir-muessen-wachsam-bleiben">„Wir müssen wachsam bleiben“</a> (Tagesspiegel) </p><p><a href="https://www.tessian.com/blog/1-in-5-chief-information-security-officers-cisos-work-more-than-25-extra-hours-per-week/">1 in 5 Chief Information Security Officers (CISOs) Work More Than 25 Extra Hours Per Week</a> (Tessian) </p><p><a href="https://www.devo.com/resources/2022-devo-soc-performance-report/">2022 Devo SOC Performance Report</a> (Devo)</p><p><a href="https://www2.deloitte.com/us/en/insights/industry/public-sector/2022-deloitte-nascio-study-cybersecurity-post-pandemic.html">2022 Deloitte-NASCIO Cybersecurity Study</a> (Deloitte Insights)</p><p><a href="https://www.prnewswire.com/news-releases/cybersecurity-survey-of-state-cisos-identifies-many-positive-trends-301643444.html">Cybersecurity Survey of State CISOs Identifies Many Positive Trends</a> (PR Newswire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1603</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3d84f9ae-787a-11ec-abf0-47b6d8970509]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4396170784.mp3?updated=1690318159" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CyberWire’s space correspondent, Maria Varmazis, interviews Anthony Colangelo. [Interview Selects]</title>
      <link>https://thecyberwire.com/podcasts/interview-selects/129/notes</link>
      <description>This interview from September 23rd, 2022 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, CyberWire’s space correspondent, Maria Varmazis, interviews host of spaceflight podcast “Main Engine Cutoff,” Anthony Colangelo about the upcoming Apple iPhone 14 “Emergency SOS via Satellite” feature &amp; what it means for satellite communications in the consumer sector.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 10 Oct 2022 07:00:00 -0000</pubDate>
      <itunes:title>CyberWire’s space correspondent, Maria Varmazis, interviews Anthony Colangelo. [Interview Selects]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>129</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This interview from September 23rd, 2022 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, CyberWire’s space correspondent, Maria Varmazis, interviews host of spaceflight podcast “Main Engine Cutoff,” Anthony Colangelo about the upcoming Apple iPhone 14 “Emergency SOS via Satellite” feature &amp; what it means for satellite communications in the consumer sector.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This interview from September 23rd, 2022 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, CyberWire’s space correspondent, Maria Varmazis, interviews host of spaceflight podcast “Main Engine Cutoff,” Anthony Colangelo about the upcoming Apple iPhone 14 “Emergency SOS via Satellite” feature &amp; what it means for satellite communications in the consumer sector.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1202</itunes:duration>
      <guid isPermaLink="false"><![CDATA[d9f00eb6-4672-11ed-9b5c-03a2d6747894]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7483467768.mp3?updated=1665169935" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Moving Faster - Securely. Why Your Org Should Add Security to your DevOps Program [Security Sandbox]</title>
      <link>https://thecyberwire.com/podcasts/security-sandbox/19/notes</link>
      <description>In today’s episode, our sandbox heads to the deployment pipeline for a conversation on the who/what/when/and why of a DevSecOps program and how it adds value to your business. And your main questions- – how you can encourage buy-in and adoption. Joining me today are Marcin Swiety, Relativity’s Senior Director of Global Security and IT, and Raphael Theberge - Director of Security Integrations. So, grab your DORA metrics, your source controls, and staging environments, and let’s dive in. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 10 Oct 2022 05:00:00 -0000</pubDate>
      <itunes:title>Moving Faster - Securely. Why Your Org Should Add Security to your DevOps Program [Security Sandbox]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>19</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Why You Should Add Security to your DevOps Program</itunes:subtitle>
      <itunes:summary>In today’s episode, our sandbox heads to the deployment pipeline for a conversation on the who/what/when/and why of a DevSecOps program and how it adds value to your business. And your main questions- – how you can encourage buy-in and adoption. Joining me today are Marcin Swiety, Relativity’s Senior Director of Global Security and IT, and Raphael Theberge - Director of Security Integrations. So, grab your DORA metrics, your source controls, and staging environments, and let’s dive in. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s episode, our sandbox heads to the deployment pipeline for a conversation on the who/what/when/and why of a DevSecOps program and how it adds value to your business. And your main questions- – how you can encourage buy-in and adoption. Joining me today are Marcin Swiety, Relativity’s Senior Director of Global Security and IT, and Raphael Theberge - Director of Security Integrations. So, grab your DORA metrics, your source controls, and staging environments, and let’s dive in. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1986</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[36166528-4673-11ed-a285-4bd955572bd5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1789862043.mp3?updated=1663785008" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Payal Chakravarty: Overcoming bias in the workplace. [Security and Risk] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/120/notes</link>
      <description>Payal Chakravarty, Head of Product for Security and Risk from Coalition, sits down to share her story of working at several different organizations, including interning for IBM and Microsoft. After obtaining her master's degree, she worked with IBM a bit more closely and fell in love with one of the projects she was working on. Payal had a very interesting career path going from physical to virtual, virtual to cloud now, cloud to containers. She says that there is still some bias she has dealt with as a woman in her field, she says, "I think the way you handle it is you negotiate or you kind of calmly handle the situation, there's no ego involved." Payal shares that in working in this field you need to be in love with it, giving the advice that don't just choose a job because of the money or because it's cool, but because you feel connected to it as a profession. We thank Payal for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 09 Oct 2022 07:00:00 -0000</pubDate>
      <itunes:title>Payal Chakravarty: Overcoming bias in the workplace. [Security and Risk] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>120</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Payal Chakravarty, Head of Product for Security and Risk from Coalition, sits down to share her story of working at several different organizations, including interning for IBM and Microsoft. After obtaining her master's degree, she worked with IBM a bit more closely and fell in love with one of the projects she was working on. Payal had a very interesting career path going from physical to virtual, virtual to cloud now, cloud to containers. She says that there is still some bias she has dealt with as a woman in her field, she says, "I think the way you handle it is you negotiate or you kind of calmly handle the situation, there's no ego involved." Payal shares that in working in this field you need to be in love with it, giving the advice that don't just choose a job because of the money or because it's cool, but because you feel connected to it as a profession. We thank Payal for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Payal Chakravarty, Head of Product for Security and Risk from Coalition, sits down to share her story of working at several different organizations, including interning for IBM and Microsoft. After obtaining her master's degree, she worked with IBM a bit more closely and fell in love with one of the projects she was working on. Payal had a very interesting career path going from physical to virtual, virtual to cloud now, cloud to containers. She says that there is still some bias she has dealt with as a woman in her field, she says, "I think the way you handle it is you negotiate or you kind of calmly handle the situation, there's no ego involved." Payal shares that in working in this field you need to be in love with it, giving the advice that don't just choose a job because of the money or because it's cool, but because you feel connected to it as a profession. We thank Payal for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>512</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[43c599b8-4584-11ed-81a3-df1916ba9098]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2698775881.mp3?updated=1665066484" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pentest reporting and the remediation cycle: Why aren’t we making progress? [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/39/notes</link>
      <description>The age-old battle between offensive and defensive security practitioners is most often played out in the penetration testing cycle. Pentesters ask, “Is it our fault if they don’t fix things?” While defenders drown in a sea of unprioritized findings and legacy issues wondering where to even start.
But the real battle shouldn’t be between the teams; it should be against the real adversaries. So why do pentesters routinely come back and find the same things they reported a year ago? Do the defenders just not care or does the onus fall on the report? Everyone really wants the same thing: better security. To get there, the primary communication tool between consultant and client, offensive and defensive teams — the pentest report — must be consumable and actionable and tailored to the audience who receives it.
In the first half of this episode of Cyberwire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by Hash Table members Amanda Fennell, the CIO and CSO of Relativity, and William MacMillan, the SVP of Security Product and Program Management at Salesforce. In the second half of the episode, Dan DeCloss, the Founder and CEO of episode sponsor PlexTrac, joins Dave Bittner discuss the politics around pentest reporting and how better reports can support real progress.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 09 Oct 2022 07:00:00 -0000</pubDate>
      <itunes:title>Pentest reporting and the remediation cycle: Why aren’t we making progress? [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>39</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The age-old battle between offensive and defensive security practitioners is most often played out in the penetration testing cycle. Pentesters ask, “Is it our fault if they don’t fix things?” While defenders drown in a sea of unprioritized findings and legacy issues wondering where to even start.
But the real battle shouldn’t be between the teams; it should be against the real adversaries. So why do pentesters routinely come back and find the same things they reported a year ago? Do the defenders just not care or does the onus fall on the report? Everyone really wants the same thing: better security. To get there, the primary communication tool between consultant and client, offensive and defensive teams — the pentest report — must be consumable and actionable and tailored to the audience who receives it.
In the first half of this episode of Cyberwire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by Hash Table members Amanda Fennell, the CIO and CSO of Relativity, and William MacMillan, the SVP of Security Product and Program Management at Salesforce. In the second half of the episode, Dan DeCloss, the Founder and CEO of episode sponsor PlexTrac, joins Dave Bittner discuss the politics around pentest reporting and how better reports can support real progress.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The age-old battle between offensive and defensive security practitioners is most often played out in the penetration testing cycle. Pentesters ask, “Is it our fault if they don’t fix things?” While defenders drown in a sea of unprioritized findings and legacy issues wondering where to even start.</p><p>But the real battle shouldn’t be between the teams; it should be against the real adversaries. So why do pentesters routinely come back and find the same things they reported a year ago? Do the defenders just not care or does the onus fall on the report? Everyone really wants the same thing: better security. To get there, the primary communication tool between consultant and client, offensive and defensive teams — the pentest report — must be consumable and actionable and tailored to the audience who receives it.</p><p>In the first half of this episode of Cyberwire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined by Hash Table members Amanda Fennell, the CIO and CSO of Relativity, and William MacMillan, the SVP of Security Product and Program Management at Salesforce. In the second half of the episode, Dan DeCloss, the Founder and CEO of episode sponsor PlexTrac, joins Dave Bittner discuss the politics around pentest reporting and how better reports can support real progress.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2124</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[55a86e3c-45af-11ed-9f02-c74159a6697e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7196164944.mp3?updated=1665524201" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Google Drive used for malware? [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/253/notes</link>
      <description>Jen Miller-Osborn from Palo Alto Networks' Unit 42 joins Dave to discuss their recent work on "Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive." The research shares the insight into an active campaign from Russia’s Foreign Intelligence Service, that is leveraging the use of trusted, legitimate cloud services including Google Drive as a staging platform to deliver malware.
The research states that when these tactics are used, it is extremely difficult for organizations to detect the malicious activity in connection with the campaign. These tactics are used to collect victim information, evade detection, and deliver Cobalt Strike.
The research can be found here:
Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Oct 2022 07:00:00 -0000</pubDate>
      <itunes:title>Google Drive used for malware? [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>253</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Jen Miller-Osborn from Palo Alto Networks' Unit 42 joins Dave to discuss their recent work on "Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive." The research shares the insight into an active campaign from Russia’s Foreign Intelligence Service, that is leveraging the use of trusted, legitimate cloud services including Google Drive as a staging platform to deliver malware.
The research states that when these tactics are used, it is extremely difficult for organizations to detect the malicious activity in connection with the campaign. These tactics are used to collect victim information, evade detection, and deliver Cobalt Strike.
The research can be found here:
Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jen Miller-Osborn from Palo Alto Networks' Unit 42 joins Dave to discuss their recent work on "Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive." The research shares the insight into an active campaign from Russia’s Foreign Intelligence Service, that is leveraging the use of trusted, legitimate cloud services including Google Drive as a staging platform to deliver malware.</p><p>The research states that when these tactics are used, it is extremely difficult for organizations to detect the malicious activity in connection with the campaign. These tactics are used to collect victim information, evade detection, and deliver Cobalt Strike.</p><p>The research can be found here:</p><ul><li><a href="https://unit42.paloaltonetworks.com/cloaked-ursa-online-storage-services-campaigns/">Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1361</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[143e72b6-459b-11ed-8d26-4b72c299571a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7996106272.mp3?updated=1685127181" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A US EO addresses EU data privacy concerns. China’s favorite CVEs. Election security and credit risk. COVID phishbait. Notes from the hybrid war, including some really motivated draft evaders.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1679/notes</link>
      <description>A US Executive Order outlines US-EU data-sharing privacy safeguards. CISA, NSA, and the FBI list the top vulnerabilities currently being exploited by China. A look at election security and credit risk to US states. COVID-19-themed social engineering continues. Robert M. Lee from Dragos on securing the food and beverage industry. Carole Theriault interviews Joel Hollenbeck from Check Point Software on threat actors phishing school board meetings. Notes from the hybrid war: Killnet and US state government sites, the prospects of deterrence in cyberspace, and, finally, maybe the most motivated draft evaders in military history.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/194

Selected reading.
FACT SHEET: President Biden Signs Executive Order to Implement the European Union-U.S. Data Privacy Framework (The White House)
Top CVEs Actively Exploited By People’s Republic of China State-Sponsored Cyber Actors (CISA) 
Government credit risk associated with election risk (CyberWire)
Exploiting COVID-19: how threat actors hijacked a pandemic (Proofpoint)
Ukraine at D+125: Abandoned tanks and discontented hawks. (CyberWire) 
Department Press Briefing – October 6, 2022 - United States Department of State (United States Department of State) 
2 Russians fleeing military service reach remote Alaska island (Military Times)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 07 Oct 2022 20:15:00 -0000</pubDate>
      <itunes:title>A US EO addresses EU data privacy concerns. China’s favorite CVEs. Election security and credit risk. COVID phishbait. Notes from the hybrid war, including some really motivated draft evaders.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1679</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A US Executive Order outlines US-EU data-sharing privacy safeguards. CISA, NSA, and the FBI list the top vulnerabilities currently being exploited by China. A look at election security and credit risk to US states. COVID-19-themed social engineering continues. Robert M. Lee from Dragos on securing the food and beverage industry. Carole Theriault interviews Joel Hollenbeck from Check Point Software on threat actors phishing school board meetings. Notes from the hybrid war: Killnet and US state government sites, the prospects of deterrence in cyberspace, and, finally, maybe the most motivated draft evaders in military history.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/194

Selected reading.
FACT SHEET: President Biden Signs Executive Order to Implement the European Union-U.S. Data Privacy Framework (The White House)
Top CVEs Actively Exploited By People’s Republic of China State-Sponsored Cyber Actors (CISA) 
Government credit risk associated with election risk (CyberWire)
Exploiting COVID-19: how threat actors hijacked a pandemic (Proofpoint)
Ukraine at D+125: Abandoned tanks and discontented hawks. (CyberWire) 
Department Press Briefing – October 6, 2022 - United States Department of State (United States Department of State) 
2 Russians fleeing military service reach remote Alaska island (Military Times)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A US Executive Order outlines US-EU data-sharing privacy safeguards. CISA, NSA, and the FBI list the top vulnerabilities currently being exploited by China. A look at election security and credit risk to US states. COVID-19-themed social engineering continues. Robert M. Lee from Dragos on securing the food and beverage industry. Carole Theriault interviews Joel Hollenbeck from Check Point Software on threat actors phishing school board meetings. Notes from the hybrid war: Killnet and US state government sites, the prospects of deterrence in cyberspace, and, finally, maybe the most motivated draft evaders in military history.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/194</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2022/10/07/fact-sheet-president-biden-signs-executive-order-to-implement-the-european-union-u-s-data-privacy-framework/">FACT SHEET: President Biden Signs Executive Order to Implement the European Union-U.S. Data Privacy Framework</a> (The White House)</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-279a">Top CVEs Actively Exploited By People’s Republic of China State-Sponsored Cyber Actors</a> (CISA) </p><p><a href="https://thecyberwire.com/stories/2e775531370f4b6cad87060726338c1e/government-credit-risk-associated-with-election-risk">Government credit risk associated with election risk</a> (CyberWire)</p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/exploiting-covid-19-how-threat-actors-hijacked-pandemic">Exploiting COVID-19: how threat actors hijacked a pandemic</a> (Proofpoint)</p><p><a href="https://thecyberwire.com/stories/4bba3d5ebe784f9b8540a3391220cb75/ukraine-at-d125-abandoned-tanks-and-discontented-hawks">Ukraine at D+125: Abandoned tanks and discontented hawks.</a> (CyberWire) </p><p><a href="https://www.state.gov/briefings/department-press-briefing-october-6-2022/">Department Press Briefing – October 6, 2022 - United States Department of State</a> (United States Department of State) </p><p><a href="https://www.militarytimes.com/flashpoints/ukraine/2022/10/06/2-russians-fleeing-military-service-reach-remote-alaska-island/">2 Russians fleeing military service reach remote Alaska island</a> (Military Times)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1686</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3ec126c6-787a-11ec-abf0-a70676004652]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6481520595.mp3?updated=1690318140" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA22-279A – Top CVEs actively exploited by People’s Republic of China state-sponsored cyber actors.</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/34/notes</link>
      <description>This joint Cybersecurity Advisory provides the top CVEs used by the People’s Republic of China state-sponsored cyber actors. PRC cyber actors continue to exploit these known vulnerabilities and use publicly available tools to target networks of interest. PRC state-sponsored cyber actors have actively targeted U.S. and allied networks as well as software and hardware companies to steal intellectual property and develop access into sensitive networks.
AA22-279A Alert, Technical Details, and Mitigations
For more information on PRC state-sponsored malicious cyber activity, see CISA’s China Cyber Threat Overview and Advisories webpage, FBI’s Industry Alerts, and NSA’s Cybersecurity Advisories &amp; Guidance. 
People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices
CISA offers several no-cost scanning and testing services to help organizations reduce their exposure to threats by taking a proactive approach to mitigating attack vectors. See www.cisa.gov/cyber-hygiene-services
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System (PDNS) services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 07 Oct 2022 13:15:00 -0000</pubDate>
      <itunes:title>CISA Alert AA22-279A – Top CVEs actively exploited by People’s Republic of China state-sponsored cyber actors.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>34</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This joint Cybersecurity Advisory provides the top CVEs used by the People’s Republic of China state-sponsored cyber actors. PRC cyber actors continue to exploit these known vulnerabilities and use publicly available tools to target networks of interest. PRC state-sponsored cyber actors have actively targeted U.S. and allied networks as well as software and hardware companies to steal intellectual property and develop access into sensitive networks.
AA22-279A Alert, Technical Details, and Mitigations
For more information on PRC state-sponsored malicious cyber activity, see CISA’s China Cyber Threat Overview and Advisories webpage, FBI’s Industry Alerts, and NSA’s Cybersecurity Advisories &amp; Guidance. 
People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices
CISA offers several no-cost scanning and testing services to help organizations reduce their exposure to threats by taking a proactive approach to mitigating attack vectors. See www.cisa.gov/cyber-hygiene-services
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System (PDNS) services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This joint Cybersecurity Advisory provides the top CVEs used by the People’s Republic of China state-sponsored cyber actors. PRC cyber actors continue to exploit these known vulnerabilities and use publicly available tools to target networks of interest. PRC state-sponsored cyber actors have actively targeted U.S. and allied networks as well as software and hardware companies to steal intellectual property and develop access into sensitive networks.</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-279a">AA22-279A Alert, Technical Details, and Mitigations</a></p><p>For more information on PRC state-sponsored malicious cyber activity, see CISA’s <a href="https://www.cisa.gov/uscert/china">China Cyber Threat Overview and Advisories webpage</a>, FBI’s <a href="https://www.ic3.gov/Home/IndustryAlerts">Industry Alerts</a>, and NSA’s <a href="https://www.nsa.gov/Press-Room/Cybersecurity-Advisories-Guidance/">Cybersecurity Advisories &amp; Guidance</a>. </p><p><a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3055748/nsa-cisa-and-fbi-expose-prc-state-sponsored-exploitation-of-network-providers-d/">People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices</a></p><p>CISA offers several no-cost scanning and testing services to help organizations reduce their exposure to threats by taking a proactive approach to mitigating attack vectors. See <a href="http://www.cisa.gov/cyber-hygiene-services">www.cisa.gov/cyber-hygiene-services</a></p><p>U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System (PDNS) services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email <a href="mailto:dib_defense@cyber.nsa.gov">dib_defense@cyber.nsa.gov</a> </p><p>To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="mailto:report@cisa.gov">report@cisa.gov</a>, or call (888) 282-0870, or report incidents to your local FBI field office.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>157</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[313c63da-4642-11ed-9106-73f75f2baafa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2742025836.mp3?updated=1665148735" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Updated mitigations for ProxyNotShell. Lloyd’s investigates cyber incident. Killnet hits US state government sites. Election security. Credential theft. Verdict in Uber breach case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1678/notes</link>
      <description>Microsoft updates mitigations for ProxyNotShell. Lloyd's of London investigates a suspected cyberattack. Killnet hits networks of US state governments. The FBI and CISA weigh in on election security. Credential theft in the name of Zoom. Tim Eades from Cyber Mentor Fund on the move to early-stage investing in times of war and recession. Our guest is Nick Lumsden of Tenacity Cloud on cloud infrastructure sprawl. The former security chief at Uber was found guilty in a case involving data breach cover-up.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/193

Selected reading.
Customer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server (Microsoft Security Response Center)
Microsoft updates guidance for ‘ProxyNotShell’ bugs after researchers get around mitigations (The Record by Recorded Future)
Microsoft Updates Mitigation for Exchange Server Zero-Days (Dark Reading) 
Microsoft updates mitigation for ProxyNotShell Exchange zero days (BleepingComputer) 
Lloyd's of London investigates possible cyber attack (Reuters)
Insurance giant Lloyd’s of London investigating cyberattack (The Record by Recorded Future)
Russian-speaking hackers knock US state government websites offline (CNN) 
Malicious Cyber Activity Against Election Infrastructure Unlikely to Disrupt or Prevent Voting (FBI and CISA)
FBI: Cyberattacks targeting election systems unlikely to affect results (BleepingComputer) 
Zoom: 1 Phish, 2 Phish Email Attack (Armorblox)
Former Uber Security Chief Found Guilty of Obstructing FTC Probe (Wall Street Journal)
Former Uber security chief convicted of covering up 2016 data breach (Washington Post)
Uber’s Former Security Chief Convicted of Data Hack Coverup (Bloomberg)
Former Uber Security Chief Found Guilty of Hiding Hack From Authorities (New York Times)
Former Uber CISO Joe Sullivan Found Guilty Over Breach Cover Up (SecurityWeek)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 06 Oct 2022 20:15:00 -0000</pubDate>
      <itunes:title>Updated mitigations for ProxyNotShell. Lloyd’s investigates cyber incident. Killnet hits US state government sites. Election security. Credential theft. Verdict in Uber breach case.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1678</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Microsoft updates mitigations for ProxyNotShell. Lloyd's of London investigates a suspected cyberattack. Killnet hits networks of US state governments. The FBI and CISA weigh in on election security. Credential theft in the name of Zoom. Tim Eades from Cyber Mentor Fund on the move to early-stage investing in times of war and recession. Our guest is Nick Lumsden of Tenacity Cloud on cloud infrastructure sprawl. The former security chief at Uber was found guilty in a case involving data breach cover-up.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/193

Selected reading.
Customer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server (Microsoft Security Response Center)
Microsoft updates guidance for ‘ProxyNotShell’ bugs after researchers get around mitigations (The Record by Recorded Future)
Microsoft Updates Mitigation for Exchange Server Zero-Days (Dark Reading) 
Microsoft updates mitigation for ProxyNotShell Exchange zero days (BleepingComputer) 
Lloyd's of London investigates possible cyber attack (Reuters)
Insurance giant Lloyd’s of London investigating cyberattack (The Record by Recorded Future)
Russian-speaking hackers knock US state government websites offline (CNN) 
Malicious Cyber Activity Against Election Infrastructure Unlikely to Disrupt or Prevent Voting (FBI and CISA)
FBI: Cyberattacks targeting election systems unlikely to affect results (BleepingComputer) 
Zoom: 1 Phish, 2 Phish Email Attack (Armorblox)
Former Uber Security Chief Found Guilty of Obstructing FTC Probe (Wall Street Journal)
Former Uber security chief convicted of covering up 2016 data breach (Washington Post)
Uber’s Former Security Chief Convicted of Data Hack Coverup (Bloomberg)
Former Uber Security Chief Found Guilty of Hiding Hack From Authorities (New York Times)
Former Uber CISO Joe Sullivan Found Guilty Over Breach Cover Up (SecurityWeek)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft updates mitigations for ProxyNotShell. Lloyd's of London investigates a suspected cyberattack. Killnet hits networks of US state governments. The FBI and CISA weigh in on election security. Credential theft in the name of Zoom. Tim Eades from Cyber Mentor Fund on the move to early-stage investing in times of war and recession. Our guest is Nick Lumsden of Tenacity Cloud on cloud infrastructure sprawl. The former security chief at Uber was found guilty in a case involving data breach cover-up.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/193</p><p><br></p><h2>Selected reading.</h2><p><a href="https://msrc-blog.microsoft.com/2022/09/29/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server/">Customer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server</a> (Microsoft Security Response Center)</p><p><a href="https://therecord.media/microsoft-updates-guidance-for-proxynotshell-bugs-after-researchers-get-around-mitigations/">Microsoft updates guidance for ‘ProxyNotShell’ bugs after researchers get around mitigations</a> (The Record by Recorded Future)</p><p><a href="https://www.darkreading.com/remote-workforce/microsoft-updates-mitigation-for-exchange-server-zero-days">Microsoft Updates Mitigation for Exchange Server Zero-Days</a> (Dark Reading) </p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-updates-mitigation-for-proxynotshell-exchange-zero-days/">Microsoft updates mitigation for ProxyNotShell Exchange zero days</a> (BleepingComputer) </p><p><a href="https://www.reuters.com/technology/lloyds-london-investigates-possible-cyber-attack-2022-10-05/">Lloyd's of London investigates possible cyber attack</a> (Reuters)</p><p><a href="https://therecord.media/insurance-giant-lloyds-of-london-investigating-cyberattack/">Insurance giant Lloyd’s of London investigating cyberattack</a> (The Record by Recorded Future)</p><p><a href="https://www.cnn.com/2022/10/05/politics/russian-hackers-state-government-websites/index.html">Russian-speaking hackers knock US state government websites offline</a> (CNN) </p><p><a href="https://www.cisa.gov/uscert/sites/default/files/publications/PSA_cyber-activity_508.pdf">Malicious Cyber Activity Against Election Infrastructure Unlikely to Disrupt or Prevent Voting</a> (FBI and CISA)</p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-cyberattacks-targeting-election-systems-unlikely-to-affect-results/">FBI: Cyberattacks targeting election systems unlikely to affect results</a> (BleepingComputer) </p><p><a href="https://www.armorblox.com/blog/zoom-credential-phishing-email-attack/">Zoom: 1 Phish, 2 Phish Email Attack</a> (Armorblox)</p><p><a href="https://www.wsj.com/articles/former-uber-security-chief-found-guilty-of-obstructing-ftc-probe-11665004454">Former Uber Security Chief Found Guilty of Obstructing FTC Probe</a> (Wall Street Journal)</p><p><a href="https://www.washingtonpost.com/technology/2022/10/05/uber-obstruction-sullivan-hacking/">Former Uber security chief convicted of covering up 2016 data breach</a> (Washington Post)</p><p><a href="https://www.bloomberg.com/news/articles/2022-10-05/uber-s-former-security-chief-is-convicted-of-data-hack-coverup">Uber’s Former Security Chief Convicted of Data Hack Coverup</a> (Bloomberg)</p><p><a href="https://www.nytimes.com/2022/10/05/technology/uber-security-chief-joe-sullivan-verdict.html">Former Uber Security Chief Found Guilty of Hiding Hack From Authorities</a> (New York Times)</p><p><a href="https://www.securityweek.com/former-uber-ciso-joe-sullivan-found-guilty">Former Uber CISO Joe Sullivan Found Guilty Over Breach Cover Up</a> (SecurityWeek)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1567</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3ea16502-787a-11ec-abf0-f7d2caf911cb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2777208174.mp3?updated=1690318125" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sniffing at the DIB. Sideloading cryptojacking campaign. Nord Stream and threats to critical infrastructure. US Cyber Command describes hunting forward in Ukraine. Fraud meets romance.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1677/notes</link>
      <description>Data’s stolen from a US "Defense Industrial Base organization." Major sideloading cryptojacking campaign is in progress. Nord Stream and threats to critical infrastructure. US Cyber Command describes "hunt forward" missions in Ukraine. Andrew Hammond from SpyCast speaks with hacker Eric Escobar about the overlap of traditional intelligence and cybersecurity. Our guest is AJ Nash from ZeroFox with an update on the current threat landscape. Fraud meets romance.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/192

Selected reading.
Impacket and Exfiltration Tool Used to Steal Sensitive Information from Defense Industrial Base Organization (CISA)
CISA: Multiple government hacking groups had ‘long-term’ access to defense company (The Record by Recorded Future)
US Govt: Hackers stole data from US defense org using new malware (BleepingComputer) 
Side-Loading OneDrive for profit – Cryptojacking campaign detected in the wild (Bitdefender Labs)
Drone-loaded seabed ship is latest weapon in Royal Navy's arsenal to counter Russian threat (The Telegraph)
Opinion Undersea pipeline sabotage demands the West prepare for more attacks (Washington Post)
Ukraine Hasn’t Won the Cyber War Against Russia Yet (World Politics Review) 
USCYBERCOM Executive Director David Frederick Outlines Cyber Threats &amp; Highlights Importance of Industry Partnerships (GovCon Wire) 
Romance scammer and BEC fraudster sent to prison for 25 years (Naked Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 05 Oct 2022 20:15:00 -0000</pubDate>
      <itunes:title>Sniffing at the DIB. Sideloading cryptojacking campaign. Nord Stream and threats to critical infrastructure. US Cyber Command describes hunting forward in Ukraine. Fraud meets romance.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1677</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Data’s stolen from a US "Defense Industrial Base organization." Major sideloading cryptojacking campaign is in progress. Nord Stream and threats to critical infrastructure. US Cyber Command describes "hunt forward" missions in Ukraine. Andrew Hammond from SpyCast speaks with hacker Eric Escobar about the overlap of traditional intelligence and cybersecurity. Our guest is AJ Nash from ZeroFox with an update on the current threat landscape. Fraud meets romance.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/192

Selected reading.
Impacket and Exfiltration Tool Used to Steal Sensitive Information from Defense Industrial Base Organization (CISA)
CISA: Multiple government hacking groups had ‘long-term’ access to defense company (The Record by Recorded Future)
US Govt: Hackers stole data from US defense org using new malware (BleepingComputer) 
Side-Loading OneDrive for profit – Cryptojacking campaign detected in the wild (Bitdefender Labs)
Drone-loaded seabed ship is latest weapon in Royal Navy's arsenal to counter Russian threat (The Telegraph)
Opinion Undersea pipeline sabotage demands the West prepare for more attacks (Washington Post)
Ukraine Hasn’t Won the Cyber War Against Russia Yet (World Politics Review) 
USCYBERCOM Executive Director David Frederick Outlines Cyber Threats &amp; Highlights Importance of Industry Partnerships (GovCon Wire) 
Romance scammer and BEC fraudster sent to prison for 25 years (Naked Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Data’s stolen from a US "Defense Industrial Base organization." Major sideloading cryptojacking campaign is in progress. Nord Stream and threats to critical infrastructure. US Cyber Command describes "hunt forward" missions in Ukraine. Andrew Hammond from SpyCast speaks with hacker Eric Escobar about the overlap of traditional intelligence and cybersecurity. Our guest is AJ Nash from ZeroFox with an update on the current threat landscape. Fraud meets romance.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/192</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-277a">Impacket and Exfiltration Tool Used to Steal Sensitive Information from Defense Industrial Base Organization</a> (CISA)</p><p><a href="https://therecord.media/cisa-multiple-government-hacking-groups-had-long-term-access-to-defense-company/">CISA: Multiple government hacking groups had ‘long-term’ access to defense company</a> (The Record by Recorded Future)</p><p><a href="https://www.bleepingcomputer.com/news/security/us-govt-hackers-stole-data-from-us-defense-org-using-new-malware/">US Govt: Hackers stole data from US defense org using new malware</a> (BleepingComputer) </p><p><a href="https://www.bitdefender.com/blog/labs/side-loading-onedrive-for-profit-cryptojacking-campaign-detected-in-the-wild/">Side-Loading OneDrive for profit – Cryptojacking campaign detected in the wild</a> (Bitdefender Labs)</p><p><a href="https://www.telegraph.co.uk/news/2022/10/04/ben-wallace-buy-seabed-warfare-ship-now-underwater-surveillance/">Drone-loaded seabed ship is latest weapon in Royal Navy's arsenal to counter Russian threat</a> (The Telegraph)</p><p><a href="https://www.washingtonpost.com/opinions/2022/10/04/gas-pipeline-sabotage-russia-ukraine-response/">Opinion Undersea pipeline sabotage demands the West prepare for more attacks</a> (Washington Post)</p><p><a href="https://www.worldpoliticsreview.com/russia-cyberattack-war-ukraine-it-army/">Ukraine Hasn’t Won the Cyber War Against Russia Yet</a> (World Politics Review) </p><p><a href="https://www.govconwire.com/2022/10/uscybercom-executive-director-david-frederick-outlines-cyber-threats/">USCYBERCOM Executive Director David Frederick Outlines Cyber Threats &amp; Highlights Importance of Industry Partnerships</a> (GovCon Wire) </p><p><a href="https://nakedsecurity.sophos.com/2022/10/04/romance-scammer-and-bec-fraudster-sent-to-prison-for-25-years/">Romance scammer and BEC fraudster sent to prison for 25 years</a> (Naked Security)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1669</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3dc432f4-787a-11ec-abf0-4f602fd0117a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2448395799.mp3?updated=1690318090" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA22-277A – Impacket and exfiltration tool used to steal sensitive information from defense industrial base organization.</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/33/notes</link>
      <description>From November 2021 through January 2022, the CISA responded to APT activity against a Defense Industrial Base organization’s enterprise network. During incident response activities, CISA discovered that multiple APT groups compromised the organization’s network, and some APT actors had long-term access to the environment. APT actors used an open-source toolkit called Impacket to gain their foothold within the environment and further compromise the network, and also used a custom data exfiltration tool, CovalentStealer, to steal the victim’s sensitive data.
AA22-277A Alert, Technical Details, and Mitigations
CISA Cyber Hygiene Services
Malware Analysis Report (MAR)-10365227-1.stix
MAR-10365227-2.stix
MAR-10365227-3.stix
CISA offers several no-cost scanning and testing services to help organizations reduce their exposure to threats by taking a proactive approach to mitigating attack vectors. See www.cisa.gov/cyber-hygiene-services
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System (PDNS) services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Oct 2022 20:35:00 -0000</pubDate>
      <itunes:title>CISA Alert AA22-277A – Impacket and exfiltration tool used to steal sensitive information from defense industrial base organization.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>33</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From November 2021 through January 2022, the CISA responded to APT activity against a Defense Industrial Base organization’s enterprise network. During incident response activities, CISA discovered that multiple APT groups compromised the organization’s network, and some APT actors had long-term access to the environment. APT actors used an open-source toolkit called Impacket to gain their foothold within the environment and further compromise the network, and also used a custom data exfiltration tool, CovalentStealer, to steal the victim’s sensitive data.
AA22-277A Alert, Technical Details, and Mitigations
CISA Cyber Hygiene Services
Malware Analysis Report (MAR)-10365227-1.stix
MAR-10365227-2.stix
MAR-10365227-3.stix
CISA offers several no-cost scanning and testing services to help organizations reduce their exposure to threats by taking a proactive approach to mitigating attack vectors. See www.cisa.gov/cyber-hygiene-services
U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System (PDNS) services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email dib_defense@cyber.nsa.gov 
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From November 2021 through January 2022, the CISA responded to APT activity against a Defense Industrial Base organization’s enterprise network. During incident response activities, CISA discovered that multiple APT groups compromised the organization’s network, and some APT actors had long-term access to the environment. APT actors used an open-source toolkit called Impacket to gain their foothold within the environment and further compromise the network, and also used a custom data exfiltration tool, CovalentStealer, to steal the victim’s sensitive data.</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-277a">AA22-277A Alert, Technical Details, and Mitigations</a></p><p><a href="http://www.cisa.gov/cyber-hygiene-services">CISA Cyber Hygiene Services</a></p><p><a href="https://www.cisa.gov/uscert/sites/default/files/publications/MAR-10365227.r1.v1.WHITE_stix_7.xml">Malware Analysis Report (MAR)-10365227-1.stix</a></p><p><a href="https://www.cisa.gov/uscert/sites/default/files/publications/MAR-10365227.r2.v1.WHITE_stix.xml">MAR-10365227-2.stix</a></p><p><a href="https://www.cisa.gov/uscert/sites/default/files/publications/MAR-10365227.r3.v1.WHITE_stix_0.xml">MAR-10365227-3.stix</a></p><p>CISA offers several no-cost scanning and testing services to help organizations reduce their exposure to threats by taking a proactive approach to mitigating attack vectors. See <a href="http://www.cisa.gov/cyber-hygiene-services">www.cisa.gov/cyber-hygiene-services</a></p><p>U.S. DIB sector organizations may consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System (PDNS) services, vulnerability scanning, and threat intelligence collaboration for eligible organizations. For more information on how to enroll in these services, email <a href="mailto:dib_defense@cyber.nsa.gov">dib_defense@cyber.nsa.gov</a> </p><p>To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="mailto:report@cisa.gov">report@cisa.gov</a>, or call (888) 282-0870, or report incidents to your local FBI field office.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>174</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c23d3a10-4423-11ed-9789-4bbcd2ae3b93]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4885267817.mp3?updated=1664910688" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA issues Binding Operational Directive 23-01. LAUSD says ransomware operators missed most sensitive PII. Trends in API protection SaaS security. Making a pest of oneself in a hybrid war. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1676/notes</link>
      <description>CISA issues a Binding Operational Directive. An LA school district says ransomware operators missed most sensitive PII. An API protection report describes malicious transactions. Analysis of cyber risk in relation to SaaS applications. Joe Carrigan describes underground groups using stolen identities and deepfakes. Our guest is Eve Maler from ForgeRock on consumer identity breaches. And someone is making a nuisance of themself in Russia.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/191

Selected reading.
Binding Operational Directive 23-01 (CISA)
CISA Directs Federal Agencies to Improve Cybersecurity Asset Visibility and Vulnerability Detection (Cybersecurity and Infrastructure Security Agency) 
CISA aims to expand cyber defense service across fed agencies, potentially further (Federal News Network)
CISA directs federal agencies to track software and vulnerabilities (The Record by Recorded Future) 
Student, Teacher Data Not Affected in Los Angeles School District Hack (Wall Street Journal)
‘No evidence of widespread impact,’ LAUSD says of data released by hackers (KTLA) 
New API Threat Research Shows that Shadow APIs Are the Top Threat Vecto (Cequence Security)
Secureworks State of the Threat Report 2022: 52% of ransomware incidents over the past year started with compromise of unpatched remote services (Secureworks)
Russian Citizens Wage Cyberwar From Within (Kyiv Post)
Russian Hackers Take Aim at Kremlin Targets: Report (Infosecurity Magazine) Russian retail chain 'DNS' confirms hack after data leaked online (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Oct 2022 20:15:00 -0000</pubDate>
      <itunes:title>CISA issues Binding Operational Directive 23-01. LAUSD says ransomware operators missed most sensitive PII. Trends in API protection SaaS security. Making a pest of oneself in a hybrid war. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1676</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA issues a Binding Operational Directive. An LA school district says ransomware operators missed most sensitive PII. An API protection report describes malicious transactions. Analysis of cyber risk in relation to SaaS applications. Joe Carrigan describes underground groups using stolen identities and deepfakes. Our guest is Eve Maler from ForgeRock on consumer identity breaches. And someone is making a nuisance of themself in Russia.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/191

Selected reading.
Binding Operational Directive 23-01 (CISA)
CISA Directs Federal Agencies to Improve Cybersecurity Asset Visibility and Vulnerability Detection (Cybersecurity and Infrastructure Security Agency) 
CISA aims to expand cyber defense service across fed agencies, potentially further (Federal News Network)
CISA directs federal agencies to track software and vulnerabilities (The Record by Recorded Future) 
Student, Teacher Data Not Affected in Los Angeles School District Hack (Wall Street Journal)
‘No evidence of widespread impact,’ LAUSD says of data released by hackers (KTLA) 
New API Threat Research Shows that Shadow APIs Are the Top Threat Vecto (Cequence Security)
Secureworks State of the Threat Report 2022: 52% of ransomware incidents over the past year started with compromise of unpatched remote services (Secureworks)
Russian Citizens Wage Cyberwar From Within (Kyiv Post)
Russian Hackers Take Aim at Kremlin Targets: Report (Infosecurity Magazine) Russian retail chain 'DNS' confirms hack after data leaked online (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA issues a Binding Operational Directive. An LA school district says ransomware operators missed most sensitive PII. An API protection report describes malicious transactions. Analysis of cyber risk in relation to SaaS applications. Joe Carrigan describes underground groups using stolen identities and deepfakes. Our guest is Eve Maler from ForgeRock on consumer identity breaches. And someone is making a nuisance of themself in Russia.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/191</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/binding-operational-directive-23-01">Binding Operational Directive 23-01</a> (CISA)</p><p><a href="https://content.govdelivery.com/accounts/USDHSCISA/bulletins/330373a">CISA Directs Federal Agencies to Improve Cybersecurity Asset Visibility and Vulnerability Detection</a> (Cybersecurity and Infrastructure Security Agency) </p><p><a href="https://federalnewsnetwork.com/cybersecurity/2022/10/cisa-aims-to-expand-cyber-defense-service-across-fed-agencies-potentially-further/">CISA aims to expand cyber defense service across fed agencies, potentially further</a> (Federal News Network)</p><p><a href="https://therecord.media/cisa-issues-directive-ordering-federal-agencies-to-track-software-used-and-vulnerabilities/">CISA directs federal agencies to track software and vulnerabilities</a> (The Record by Recorded Future) </p><p><a href="https://www.wsj.com/articles/student-teacher-data-not-affected-in-los-angeles-school-district-hack-11664846751">Student, Teacher Data Not Affected in Los Angeles School District Hack</a> (Wall Street Journal)</p><p><a href="https://ktla.com/news/local-news/lausd-provides-update-on-cyberattack-and-release-of-sensitive-district-data/">‘No evidence of widespread impact,’ LAUSD says of data released by hackers</a> (KTLA) </p><p><a href="https://www.cequence.ai/blog/cq-prime-threat-research/new-api-threat-research-shows-that-shadow-apis-are-the-top-threat-vector/">New API Threat Research Shows that Shadow APIs Are the Top Threat Vecto</a> (Cequence Security)</p><p><a href="https://www.secureworks.com/about/press/secureworks-state-of-the-threat-report-2022">Secureworks State of the Threat Report 2022: 52% of ransomware incidents over the past year started with compromise of unpatched remote services</a> (Secureworks)</p><p><a href="https://www.kyivpost.com/world/russian-citizens-wage-cyberwar-from-within.html">Russian Citizens Wage Cyberwar From Within</a> (Kyiv Post)</p><p><a href="https://www.infosecurity-magazine.com/news/russian-hackers-take-aim-at/">Russian Hackers Take Aim at Kremlin Targets: Report</a> (Infosecurity Magazine) <a href="https://www.bleepingcomputer.com/news/security/russian-retail-chain-dns-confirms-hack-after-data-leaked-online/">Russian retail chain 'DNS' confirms hack after data leaked online</a> (BleepingComputer)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1954</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3da46fa0-787a-11ec-abf0-6b7daa55709c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3094185481.mp3?updated=1690318078" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Microsoft Exchange zero-days exploited. Supply chain attack reported. New Lazarus activity. Mexican government falls victim to hacktivism. Hacking partial mobilization. Former insider threat.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1675/notes</link>
      <description>Two Microsoft Exchange zero-days exploited in the wild. A supply chain attack, possibly from Chinese intelligence services. There’s new Lazarus activity: bring-your-own-vulnerable-driver. The Mexican government falls victim to apparent hacktivism. Flying under partial mobilization’s radar. Betsy Carmelite from Booz Allen Hamilton talks about addressing the cyber workforce skills gap. Our guest Rachel Tobac from SocialProof Security brings a musical approach to security awareness training. How’s your off-boarding program working out?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/190

Selected reading.
Microsoft Releases Guidance on Zero-Day Vulnerabilities in Microsoft Exchange Server (CISA) 
Customer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server (Microsoft Security Response Center)
Warning: New attack campaign utilized a new 0-day RCE vulnerability on Microsoft Exchange Server (GTSC)
URGENT! Microsoft Exchange double zero-day – “like ProxyShell, only different” (Naked Security)
Microsoft confirms two Exchange Server zero days are being used in cyberattacks (The Record by Recorded Future)Microsoft confirms new Exchange zero-days are used in attacks (BleepingComputer) 
Two Microsoft Exchange zero-days exploited in the wild. (CyberWre) 
CISA Adds Three Known Exploited Vulnerabilities to Catalog (CISA)
Suspected Chinese hackers tampered with widely used customer chat program, researchers say (Reuters)
Report: Commercial chat provider hijacked to spread malware in supply chain attack (The Record by Recorded Future) 
CrowdStrike Falcon Platform Identifies Supply Chain Attack via a Trojanized Comm100 Chat Installer (crowdstrike.com)
Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium (WeLiveSecurity)
Lazarus &amp; BYOVD: evil to the Windows core (Virus Bulletin)
Lazarus hackers abuse Dell driver bug using new FudModule rootkit (BleepingComputer)
Mexican government suffers major data hack, president's health issues revealed (Reuters)
Mexican president confirms ‘Guacamaya’ hack targeting regional militaries (The Record by Recorded Future)
Analysis: Mexico data hack exposes government cybersecurity vulnerability (Reuters)
Russians dodging mobilization behind flourishing scam market (BleepingComputer) 
Honolulu Man Pleads Guilty to Sabotaging Former Employer’s Computer Network (US Department of Justice)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 03 Oct 2022 21:15:00 -0000</pubDate>
      <itunes:title>Microsoft Exchange zero-days exploited. Supply chain attack reported. New Lazarus activity. Mexican government falls victim to hacktivism. Hacking partial mobilization. Former insider threat.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1675</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Two Microsoft Exchange zero-days exploited in the wild. A supply chain attack, possibly from Chinese intelligence services. There’s new Lazarus activity: bring-your-own-vulnerable-driver. The Mexican government falls victim to apparent hacktivism. Flying under partial mobilization’s radar. Betsy Carmelite from Booz Allen Hamilton talks about addressing the cyber workforce skills gap. Our guest Rachel Tobac from SocialProof Security brings a musical approach to security awareness training. How’s your off-boarding program working out?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/190

Selected reading.
Microsoft Releases Guidance on Zero-Day Vulnerabilities in Microsoft Exchange Server (CISA) 
Customer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server (Microsoft Security Response Center)
Warning: New attack campaign utilized a new 0-day RCE vulnerability on Microsoft Exchange Server (GTSC)
URGENT! Microsoft Exchange double zero-day – “like ProxyShell, only different” (Naked Security)
Microsoft confirms two Exchange Server zero days are being used in cyberattacks (The Record by Recorded Future)Microsoft confirms new Exchange zero-days are used in attacks (BleepingComputer) 
Two Microsoft Exchange zero-days exploited in the wild. (CyberWre) 
CISA Adds Three Known Exploited Vulnerabilities to Catalog (CISA)
Suspected Chinese hackers tampered with widely used customer chat program, researchers say (Reuters)
Report: Commercial chat provider hijacked to spread malware in supply chain attack (The Record by Recorded Future) 
CrowdStrike Falcon Platform Identifies Supply Chain Attack via a Trojanized Comm100 Chat Installer (crowdstrike.com)
Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium (WeLiveSecurity)
Lazarus &amp; BYOVD: evil to the Windows core (Virus Bulletin)
Lazarus hackers abuse Dell driver bug using new FudModule rootkit (BleepingComputer)
Mexican government suffers major data hack, president's health issues revealed (Reuters)
Mexican president confirms ‘Guacamaya’ hack targeting regional militaries (The Record by Recorded Future)
Analysis: Mexico data hack exposes government cybersecurity vulnerability (Reuters)
Russians dodging mobilization behind flourishing scam market (BleepingComputer) 
Honolulu Man Pleads Guilty to Sabotaging Former Employer’s Computer Network (US Department of Justice)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Two Microsoft Exchange zero-days exploited in the wild. A supply chain attack, possibly from Chinese intelligence services. There’s new Lazarus activity: bring-your-own-vulnerable-driver. The Mexican government falls victim to apparent hacktivism. Flying under partial mobilization’s radar. Betsy Carmelite from Booz Allen Hamilton talks about addressing the cyber workforce skills gap. Our guest Rachel Tobac from SocialProof Security brings a musical approach to security awareness training. How’s your off-boarding program working out?</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/190</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/09/30/microsoft-releases-guidance-zero-day-vulnerabilities-microsoft">Microsoft Releases Guidance on Zero-Day Vulnerabilities in Microsoft Exchange Server</a> (CISA) </p><p><a href="https://msrc-blog.microsoft.com/2022/09/29/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server/">Customer Guidance for Reported Zero-day Vulnerabilities in Microsoft Exchange Server</a> (Microsoft Security Response Center)</p><p><a href="https://gteltsc.vn/blog/warning-new-attack-campaign-utilized-a-new-0day-rce-vulnerability-on-microsoft-exchange-server-12715.html">Warning: New attack campaign utilized a new 0-day RCE vulnerability on Microsoft Exchange Server</a> (GTSC)</p><p><a href="https://nakedsecurity.sophos.com/2022/09/30/urgent-microsoft-exchange-double-zero-day-like-proxyshell-only-different/">URGENT! Microsoft Exchange double zero-day – “like ProxyShell, only different”</a> (Naked Security)</p><p><a href="https://therecord.media/microsoft-confirms-two-exchange-server-zero-days-are-being-used-in-cyberattacks/">Microsoft confirms two Exchange Server zero days are being used in cyberattacks</a> (The Record by Recorded Future)<a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-confirms-new-exchange-zero-days-are-used-in-attacks/">Microsoft confirms new Exchange zero-days are used in attacks</a> (BleepingComputer) </p><p><a href="https://thecyberwire.com/stories/9f9dd3dda66244a9bc0723cf57d15d08/two-microsoft-exchange-zero-days-exploited-in-the-wild">Two Microsoft Exchange zero-days exploited in the wild.</a> (CyberWre) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/09/30/cisa-adds-three-known-exploited-vulnerabilities-catalog">CISA Adds Three Known Exploited Vulnerabilities to Catalog</a> (CISA)</p><p><a href="https://www.reuters.com/technology/exclusive-suspected-chinese-hackers-tampered-with-widely-used-canadian-chat-2022-09-30/">Suspected Chinese hackers tampered with widely used customer chat program, researchers say</a> (Reuters)</p><p><a href="https://therecord.media/report-commercial-chat-provider-hijacked-to-spread-malware-in-supply-chain-attack/">Report: Commercial chat provider hijacked to spread malware in supply chain attack</a> (The Record by Recorded Future) </p><p><a href="https://www.crowdstrike.com/blog/new-supply-chain-attack-leverages-comm100-chat-installer/">CrowdStrike Falcon Platform Identifies Supply Chain Attack via a Trojanized Comm100 Chat Installer</a> (crowdstrike.com)</p><p><a href="https://www.welivesecurity.com/2022/09/30/amazon-themed-campaigns-lazarus-netherlands-belgium/">Amazon‑themed campaigns of Lazarus in the Netherlands and Belgium</a> (WeLiveSecurity)</p><p><a href="https://www.virusbulletin.com/conference/vb2022/abstracts/lazarus-byovd-evil-windows-core/">Lazarus &amp; BYOVD: evil to the Windows core</a> (Virus Bulletin)</p><p><a href="https://www.bleepingcomputer.com/news/security/lazarus-hackers-abuse-dell-driver-bug-using-new-fudmodule-rootkit/">Lazarus hackers abuse Dell driver bug using new FudModule rootkit</a> (BleepingComputer)</p><p><a href="https://www.reuters.com/world/americas/mexican-president-confirms-hack-government-files-2022-09-30/">Mexican government suffers major data hack, president's health issues revealed</a> (Reuters)</p><p><a href="https://therecord.media/mexican-president-confirms-guacamaya-hack-targeting-regional-militaries/">Mexican president confirms ‘Guacamaya’ hack targeting regional militaries</a> (The Record by Recorded Future)</p><p><a href="https://www.reuters.com/world/americas/mexico-data-hack-exposes-government-cybersecurity-vulnerability-2022-10-01/">Analysis: Mexico data hack exposes government cybersecurity vulnerability</a> (Reuters)</p><p><a href="https://www.bleepingcomputer.com/news/security/russians-dodging-mobilization-behind-flourishing-scam-market/">Russians dodging mobilization behind flourishing scam market</a> (BleepingComputer) </p><p><a href="https://www.justice.gov/usao-hi/pr/honolulu-man-pleads-guilty-sabotaging-former-employer-s-computer-network">Honolulu Man Pleads Guilty to Sabotaging Former Employer’s Computer Network</a> (US Department of Justice)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1822</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3ca75680-787a-11ec-abf0-33c9ded91cfa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1397193354.mp3?updated=1690318060" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kayla Williams: Not everything related to cybersecurity is a fire drill. [CISO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/119/notes</link>
      <description>Kayla Williams, CISO of Devo, sits down to share her story, from graduating with a finance degree to rising to where she is now. She quickly learned that finance was not for her and changed paths, working towards gaining an information security certificate. From there she was able to excel and was offered the opportunity to move to England which changed her life. Working in her new role, she really enjoys thriving with her team. She says "We really try to be the department of no problem versus the department of no." She mentions how her and her team work on a day to day basis together solving issues and yet she says not everything related to cybersecurity needs to be a fire drill. She would rather her and her team build bridges in the face of adversity and in the face of people who may be naysayers. We thank Kayla for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 02 Oct 2022 07:00:00 -0000</pubDate>
      <itunes:title>Kayla Williams: Not everything related to cybersecurity is a fire drill. [CISO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>119</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Kayla Williams, CISO of Devo, sits down to share her story, from graduating with a finance degree to rising to where she is now. She quickly learned that finance was not for her and changed paths, working towards gaining an information security certificate. From there she was able to excel and was offered the opportunity to move to England which changed her life. Working in her new role, she really enjoys thriving with her team. She says "We really try to be the department of no problem versus the department of no." She mentions how her and her team work on a day to day basis together solving issues and yet she says not everything related to cybersecurity needs to be a fire drill. She would rather her and her team build bridges in the face of adversity and in the face of people who may be naysayers. We thank Kayla for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kayla Williams, CISO of Devo, sits down to share her story, from graduating with a finance degree to rising to where she is now. She quickly learned that finance was not for her and changed paths, working towards gaining an information security certificate. From there she was able to excel and was offered the opportunity to move to England which changed her life. Working in her new role, she really enjoys thriving with her team. She says "We really try to be the department of no problem versus the department of no." She mentions how her and her team work on a day to day basis together solving issues and yet she says not everything related to cybersecurity needs to be a fire drill. She would rather her and her team build bridges in the face of adversity and in the face of people who may be naysayers. We thank Kayla for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>530</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d42a8eac-40e6-11ed-b093-435e4a7c957e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9966001380.mp3?updated=1664559129" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The OSINT revolution: How cyber and physical security teams are leveraging open source intelligence. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/38/notes</link>
      <description>On this episode of CyberWire-X, we dive into the essential role of open-source intelligence in identifying cyber and physical threats and reducing risk across your organization. The CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined in the first half by Hash Table members Dr. Georgianna Shea, CCTI and TCIL Chief Technologist at the Foundation for Defense of Democracies, and Bob Turner, Field CISO – Education at Fortinet. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor risk intelligence firm Flashpoint's Chief Intelligence Officer Tom Hofmann. They explore the foundational importance of open source intelligence, which includes social media platforms and geospatial data and insights. Plus, they explore real-life examples of how organizations, from governments to commercial enterprises, are leveraging open source intelligence and technology every day to protect their people, places, assets, and critical infrastructure.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 02 Oct 2022 07:00:00 -0000</pubDate>
      <itunes:title>The OSINT revolution: How cyber and physical security teams are leveraging open source intelligence. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>38</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this episode of CyberWire-X, we dive into the essential role of open-source intelligence in identifying cyber and physical threats and reducing risk across your organization. The CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined in the first half by Hash Table members Dr. Georgianna Shea, CCTI and TCIL Chief Technologist at the Foundation for Defense of Democracies, and Bob Turner, Field CISO – Education at Fortinet. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor risk intelligence firm Flashpoint's Chief Intelligence Officer Tom Hofmann. They explore the foundational importance of open source intelligence, which includes social media platforms and geospatial data and insights. Plus, they explore real-life examples of how organizations, from governments to commercial enterprises, are leveraging open source intelligence and technology every day to protect their people, places, assets, and critical infrastructure.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this episode of CyberWire-X, we dive into the essential role of open-source intelligence in identifying cyber and physical threats and reducing risk across your organization. The CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined in the first half by Hash Table members Dr. Georgianna Shea, CCTI and TCIL Chief Technologist at the Foundation for Defense of Democracies, and Bob Turner, Field CISO – Education at Fortinet. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor risk intelligence firm Flashpoint's Chief Intelligence Officer Tom Hofmann. They explore the foundational importance of open source intelligence, which includes social media platforms and geospatial data and insights. Plus, they explore real-life examples of how organizations, from governments to commercial enterprises, are leveraging open source intelligence and technology every day to protect their people, places, assets, and critical infrastructure.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1641</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c571844a-40f7-11ed-a834-1f943de63064]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3077787330.mp3?updated=1664460916" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Targeting your browser bookmarks? [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/252/notes</link>
      <description>David Prefer from SANS sits down with Dave to discuss how a new covert channel exfiltrates data via a browser's built-in bookmark sync. David goes on to describe how this research will "describe how the ability to synchronize bookmarks across devices introduces a novel vector for data exfiltration and other misuses."
In the research, he shares how he tested his said hypothesis and goes on to describe how the interesting find was tested on multiple browsers including Chrome, Edge, Brave and Opera. In his research, he found that bookmarks are able to keep data and synchronize it, making it easier to infiltrate and extract data from. David shares the rest of his findings, as well as what organizations and browser developers can do to work on this new threat.
The research can be found here:
Bookmark Bruggling: Novel Data Exfiltration with Brugglemark

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Oct 2022 07:00:00 -0000</pubDate>
      <itunes:title>Targeting your browser bookmarks? [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>252</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>David Prefer from SANS sits down with Dave to discuss how a new covert channel exfiltrates data via a browser's built-in bookmark sync. David goes on to describe how this research will "describe how the ability to synchronize bookmarks across devices introduces a novel vector for data exfiltration and other misuses."
In the research, he shares how he tested his said hypothesis and goes on to describe how the interesting find was tested on multiple browsers including Chrome, Edge, Brave and Opera. In his research, he found that bookmarks are able to keep data and synchronize it, making it easier to infiltrate and extract data from. David shares the rest of his findings, as well as what organizations and browser developers can do to work on this new threat.
The research can be found here:
Bookmark Bruggling: Novel Data Exfiltration with Brugglemark

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>David Prefer from SANS sits down with Dave to discuss how a new covert channel exfiltrates data via a browser's built-in bookmark sync. David goes on to describe how this research will "describe how the ability to synchronize bookmarks across devices introduces a novel vector for data exfiltration and other misuses."</p><p>In the research, he shares how he tested his said hypothesis and goes on to describe how the interesting find was tested on multiple browsers including Chrome, Edge, Brave and Opera. In his research, he found that bookmarks are able to keep data and synchronize it, making it easier to infiltrate and extract data from. David shares the rest of his findings, as well as what organizations and browser developers can do to work on this new threat.</p><p>The research can be found here:</p><ul><li><a href="https://sansorg.egnyte.com/dl/QiM93tBLEr%20">Bookmark Bruggling: Novel Data Exfiltration with Brugglemark</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1100</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8cdcef8a-402e-11ed-9f76-43bdee9fb5d0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4643116628.mp3?updated=1685127166" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Espionage, both online and in-person. Sabotage, both kinetic and (maybe eventually) cyber. Waterin holes, deepfakes, and the pushing of naughty words.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1674/notes</link>
      <description>North Korean operators "weaponize" open-source software. The SolarMarker info-stealer returns. A quick review of Fast Company's WordPress hijacking incident. Deepfakes, and their evolution into an underworld and influence ops tool. Kinetic sabotage in the Baltic raises concerns about threats to infrastructure in cyberspace. Chris Novak from Verizon with a mid-year check in. Our guest is MK Palmore of Google Cloud on why collective cybersecurity ultimately depends on having a diverse, skilled workforce. And the US arrests three in two alleged spying cases.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/189

Selected reading.
ZINC weaponizing open-source software (Microsoft Security Threat Intelligence | LinkedIn Threat Prevention and Defense)
Lazarus Group Affiliate Uses Trojanized Open Source Apps in New Campaigns (Decipher)
North Korea weaponizes open-source software. (CyberWire)
Info-Stealing Malware, SolarMarker, is Using Watering Hole Attacks… (eSentire) 
Fast Company hack causes obscene Apple News notifications. (CyberWire) 
The Future of Deepfakes. (CyberWire)
Fourth Nord Stream Leak Spotted, NATO Sees 'Sabotage' - The Moscow Times (The Moscow Times)
Russian spy chief: West was behind sabotage of Nord Stream (Reuters)
NATO Formally Blames Sabotage for Nord Stream Pipeline Damage (Wall Street Journal) 
NATO: Nord Stream pipeline leaks result of "sabotage" (Axios)
Pentagon chief: Too soon to say who might be behind Nord Stream pipeline attack (www.euractiv.com)
First on CNN: European security officials observed Russian Navy ships in vicinity of Nord Stream pipeline leaks (CNN)
Mysterious Blasts and Gas Leaks: What We Know About the Pipeline Breaks in Europe (New York Times)
NATO issues 'sabotage' warning after gas pipeline explosions (NBC News) 
Russia’s Purported Sabotage Of The Nord Stream Pipeline Marks A Point Of No Return (Forbes)
Nach Angriff auf Nord Stream 1 und 2: Ist Deutschland vor russischen Hackern sicher? (WirtschaftsWoche)
'We all have to be worried': War in Ukraine boosts energy cyberattack risks, says Petrobras executive (Upstream Online)
Finnish intelligence warns Russia ‘highly likely’ to turn to cyber in winter (The Record by Recorded Future)
Ukraine War Goes Hybrid (Energy Intelligence) 
New Warnings from Ukraine About Looming Russian Cyberattacks (VOA)a
Russian Cyber Efforts in Ukraine See Muted Results, Says Panel (USNI News)
Ukraine-Russia Conflict: Ukraine Alerts Energy Enterprises to Possible Cyberattack Escalation (Security Boulevard)
Ukraine is Winning the Cyber War (CEPA)
Hitachi Energy MicroSCADA Pro X SYS600 (CISA)
Hitachi Energy MicroSCADA Pro X SYS600 (CISA)
Baxter Sigma Spectrum Infusion Pump (CISA)
ARC Informatique PcVue (Update A) (CISA)
Delta Electronics DOPSoft (CISA)
Delta Electronics DOPSoft (Update B) (CISA) 
Former NSA Employee Arrested on Espionage-Related Charges (US Department of Justice) 
Major in the United States Army and a Maryland Doctor Facing Federal Indictment for Allegedly Providing Confidential Health Information to a Purported Russian Representative to Assist Russia Related to the Conflict In Ukraine (US Department of Justice)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 30 Sep 2022 20:15:00 -0000</pubDate>
      <itunes:title>Espionage, both online and in-person. Sabotage, both kinetic and (maybe eventually) cyber. Waterin holes, deepfakes, and the pushing of naughty words.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1674</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>North Korean operators "weaponize" open-source software. The SolarMarker info-stealer returns. A quick review of Fast Company's WordPress hijacking incident. Deepfakes, and their evolution into an underworld and influence ops tool. Kinetic sabotage in the Baltic raises concerns about threats to infrastructure in cyberspace. Chris Novak from Verizon with a mid-year check in. Our guest is MK Palmore of Google Cloud on why collective cybersecurity ultimately depends on having a diverse, skilled workforce. And the US arrests three in two alleged spying cases.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/189

Selected reading.
ZINC weaponizing open-source software (Microsoft Security Threat Intelligence | LinkedIn Threat Prevention and Defense)
Lazarus Group Affiliate Uses Trojanized Open Source Apps in New Campaigns (Decipher)
North Korea weaponizes open-source software. (CyberWire)
Info-Stealing Malware, SolarMarker, is Using Watering Hole Attacks… (eSentire) 
Fast Company hack causes obscene Apple News notifications. (CyberWire) 
The Future of Deepfakes. (CyberWire)
Fourth Nord Stream Leak Spotted, NATO Sees 'Sabotage' - The Moscow Times (The Moscow Times)
Russian spy chief: West was behind sabotage of Nord Stream (Reuters)
NATO Formally Blames Sabotage for Nord Stream Pipeline Damage (Wall Street Journal) 
NATO: Nord Stream pipeline leaks result of "sabotage" (Axios)
Pentagon chief: Too soon to say who might be behind Nord Stream pipeline attack (www.euractiv.com)
First on CNN: European security officials observed Russian Navy ships in vicinity of Nord Stream pipeline leaks (CNN)
Mysterious Blasts and Gas Leaks: What We Know About the Pipeline Breaks in Europe (New York Times)
NATO issues 'sabotage' warning after gas pipeline explosions (NBC News) 
Russia’s Purported Sabotage Of The Nord Stream Pipeline Marks A Point Of No Return (Forbes)
Nach Angriff auf Nord Stream 1 und 2: Ist Deutschland vor russischen Hackern sicher? (WirtschaftsWoche)
'We all have to be worried': War in Ukraine boosts energy cyberattack risks, says Petrobras executive (Upstream Online)
Finnish intelligence warns Russia ‘highly likely’ to turn to cyber in winter (The Record by Recorded Future)
Ukraine War Goes Hybrid (Energy Intelligence) 
New Warnings from Ukraine About Looming Russian Cyberattacks (VOA)a
Russian Cyber Efforts in Ukraine See Muted Results, Says Panel (USNI News)
Ukraine-Russia Conflict: Ukraine Alerts Energy Enterprises to Possible Cyberattack Escalation (Security Boulevard)
Ukraine is Winning the Cyber War (CEPA)
Hitachi Energy MicroSCADA Pro X SYS600 (CISA)
Hitachi Energy MicroSCADA Pro X SYS600 (CISA)
Baxter Sigma Spectrum Infusion Pump (CISA)
ARC Informatique PcVue (Update A) (CISA)
Delta Electronics DOPSoft (CISA)
Delta Electronics DOPSoft (Update B) (CISA) 
Former NSA Employee Arrested on Espionage-Related Charges (US Department of Justice) 
Major in the United States Army and a Maryland Doctor Facing Federal Indictment for Allegedly Providing Confidential Health Information to a Purported Russian Representative to Assist Russia Related to the Conflict In Ukraine (US Department of Justice)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>North Korean operators "weaponize" open-source software. The SolarMarker info-stealer returns. A quick review of Fast Company's WordPress hijacking incident. Deepfakes, and their evolution into an underworld and influence ops tool. Kinetic sabotage in the Baltic raises concerns about threats to infrastructure in cyberspace. Chris Novak from Verizon with a mid-year check in. Our guest is MK Palmore of Google Cloud on why collective cybersecurity ultimately depends on having a diverse, skilled workforce. And the US arrests three in two alleged spying cases.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/189</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.microsoft.com/security/blog/2022/09/29/zinc-weaponizing-open-source-software/">ZINC weaponizing open-source software</a> (Microsoft Security Threat Intelligence | LinkedIn Threat Prevention and Defense)</p><p><a href="https://duo.com/decipher/lazarus-group-affiliate-uses-trojanized-open-source-apps-in-new-campaigns">Lazarus Group Affiliate Uses Trojanized Open Source Apps in New Campaigns</a> (Decipher)</p><p><a href="https://thecyberwire.com/newsletters/daily-briefing/11/North%20Korea%20weaponizes%20open-source%20software.%20Pyongyang%20is%20actively%20exploiting%20malicious%20open-source%20applications%20to%20prospect%20engineers%20and%20tech%20support%20personnel.">North Korea weaponizes open-source software.</a> (CyberWire)</p><p><a href="https://www.esentire.com/blog/popular-info-stealing-malware-solarmarker-is-using-watering-hole-attacks-and-fake-chrome-browser-updates-to-infect-business-professionals-warns-esentire">Info-Stealing Malware, SolarMarker, is Using Watering Hole Attacks…</a> (eSentire) </p><p><a href="https://thecyberwire.com/stories/d491bb208d6a418f8ae6f158b79d78ca/fast-company-hack-causes-obscene-apple-news-notifications">Fast Company hack causes obscene Apple News notifications.</a> (CyberWire) </p><p><a href="https://thecyberwire.com/stories/a56fea3fd9a34331ba208def3d3b060e/the-future-of-deepfakes">The Future of Deepfakes.</a> (CyberWire)</p><p><a href="https://www.themoscowtimes.com/2022/09/29/fourth-nord-stream-leak-spotted-nato-sees-sabotage-a78926">Fourth Nord Stream Leak Spotted, NATO Sees 'Sabotage' - The Moscow Times</a> (The Moscow Times)</p><p><a href="https://www.reuters.com/world/europe/russias-spy-chief-says-moscow-has-evidence-west-behind-sabotage-nord-stream-2022-09-30/">Russian spy chief: West was behind sabotage of Nord Stream</a> (Reuters)</p><p><a href="https://www.wsj.com/articles/nato-formally-blames-sabotage-for-nord-stream-pipeline-damage-11664449396">NATO Formally Blames Sabotage for Nord Stream Pipeline Damage </a>(Wall Street Journal) </p><p><a href="https://www.axios.com/2022/09/29/nato-nord-stream-sabotage">NATO: Nord Stream pipeline leaks result of "sabotage"</a> (Axios)</p><p><a href="https://www.euractiv.com/section/europe-s-east/news/pentagon-chief-too-soon-to-say-who-might-be-behind-nord-stream-pipeline-attack/">Pentagon chief: Too soon to say who might be behind Nord Stream pipeline attack</a> (www.euractiv.com)</p><p><a href="https://www.cnn.com/2022/09/28/politics/nord-stream-pipeline-leak-russian-navy-ships/index.html">First on CNN: European security officials observed Russian Navy ships in vicinity of Nord Stream pipeline leaks</a> (CNN)</p><p><a href="https://www.nytimes.com/2022/09/28/world/europe/nordstream-pipeline-gas-leak-explosions.html">Mysterious Blasts and Gas Leaks: What We Know About the Pipeline Breaks in Europe</a> (New York Times)</p><p><a href="https://www.nbcnews.com/news/world/nato-warns-nordstream-pipeline-sabotage-climate-baltics-experts-decry-rcna49930">NATO issues 'sabotage' warning after gas pipeline explosions</a> (NBC News) </p><p><a href="https://www.forbes.com/sites/arielcohen/2022/09/29/russian-sabotage-of-the-nord-stream-pipeline-mark-a-point-of-no-return/">Russia’s Purported Sabotage Of The Nord Stream Pipeline Marks A Point Of No Return</a> (Forbes)</p><p><a href="https://www.wiwo.de/technologie/digitale-welt/nach-angriff-auf-nord-stream-1-und-2-ist-deutschland-vor-russischen-hackern-sicher/28715822.html">Nach Angriff auf Nord Stream 1 und 2: Ist Deutschland vor russischen Hackern sicher?</a> (WirtschaftsWoche)</p><p><a href="https://www.upstreamonline.com/safety/we-all-have-to-be-worried-war-in-ukraine-boosts-energy-cyberattack-risks-says-petrobras-executive/2-1-1323535">'We all have to be worried': War in Ukraine boosts energy cyberattack risks, says Petrobras executive</a> (Upstream Online)</p><p><a href="https://therecord.media/finnish-intelligence-warns-russia-highly-likely-to-turn-to-cyber-in-winter/">Finnish intelligence warns Russia ‘highly likely’ to turn to cyber in winter</a> (The Record by Recorded Future)</p><p><a href="https://www.energyintel.com/00000183-8956-d090-adeb-8956c3c70000">Ukraine War Goes Hybrid</a> (Energy Intelligence) </p><p><a href="https://www.voanews.com/a/new-warnings-from-ukraine-about-looming-russian-cyberattacks-/6769264.html">New Warnings from Ukraine About Looming Russian Cyberattacks </a>(VOA)a</p><p><a href="https://news.usni.org/2022/09/29/russian-cyber-efforts-in-ukraine-see-muted-effects-says-panel">Russian Cyber Efforts in Ukraine See Muted Results, Says Panel</a> (USNI News)</p><p><a href="https://securityboulevard.com/2022/09/ukraine-russia-conflict-ukraine-alerts-energy-enterprises-to-possible-cyberattack-escalation/">Ukraine-Russia Conflict: Ukraine Alerts Energy Enterprises to Possible Cyberattack Escalation</a> (Security Boulevard)</p><p><a href="https://cepa.org/article/ukraine-is-winning-the-cyber-war/">Ukraine is Winning the Cyber War</a> (CEPA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-272-01">Hitachi Energy MicroSCADA Pro X SYS600</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-272-02">Hitachi Energy MicroSCADA Pro X SYS600</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsma-22-251-01">Baxter Sigma Spectrum Infusion Pump</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-235-01">ARC Informatique PcVue (Update A)</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-244-01">Delta Electronics DOPSoft</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-21-182-03">Delta Electronics DOPSoft (Update B)</a> (CISA) </p><p><a href="https://www.justice.gov/usao-co/pr/former-nsa-employee-arrested-espionage-related-charges">Former NSA Employee Arrested on Espionage-Related Charges</a> (US Department of Justice) </p><p><a href="https://www.justice.gov/usao-md/pr/major-united-states-army-and-maryland-doctor-facing-federal-indictment-allegedly">Major in the United States Army and a Maryland Doctor Facing Federal Indictment for Allegedly Providing Confidential Health Information to a Purported Russian Representative to Assist Russia Related to the Conflict In Ukraine</a> (US Department of Justice)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1835</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3a86360a-787a-11ec-abf0-438c88241191]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1353508090.mp3?updated=1690317963" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hackers support Iranian dissidents. Notes on C2C markets. Cyberespionage campaigns. Intercepted mobile calls from Russian troops expose morale problems.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1673/notes</link>
      <description>Gray-hat support for Iranian dissidents. Selling access wholesale in the C2C market. Novel malware’s discovered targeting VMware hypervisors. The Witchetty espionage group uses an updated toolkit. Deepen Desai from Zscaler has a Technical Analysis of Industrial Spy Ransomware. Ann Johnson of Afternoon Cyber Tea speaks with Michal Braverman-Blumenstyk, CTO for Microsoft Security, about Israel's cyber innovation. And Russian troops phone call revelations.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/188

Selected reading.
Hacker Groups take to Telegram, Signal and Darkweb to assist Protestors in Iran (Check Point Software)
Hackers Use Telegram and Signal to Assist Protestors in Iran (Infosecurity Magazine)
Hackers Aid Protests Against Iranian Government with Proxies, Leaks and Hacks (The Hacker News)
Hackers seek to help — and profit from — Iran protests (The Record by Recorded Future)
Ransomware and Wholesale Access Markets: A $10 investment can lead to millions in profit (Cybersixgill)
Selling access wholesale in the C2C market. (CyberWire) 
Bad VIB(E)s Part One: Investigating Novel Malware Persistence Within ESXi Hypervisors (Mandiant)
Bad VIB(E)s Part Two: Detection and Hardening within ESXi Hypervisors (Mandiant) 
Mandiant has identified new malware that targets VMware ESXi, Linux vCenter servers, and Windows virtual machines. (CyberWire)
Securonix Threat Labs Security Advisory: Detecting STEEP#MAVERICK: New Covert Attack Campaign Targeting Military Contractors (Securonix)
Steep#Maverick cyberespionage campaign. (CyberWire)
Witchetty: Group Uses Updated Toolset in Attacks on Governments in Middle East (Symantec)
Witchetty espionage group uses updated toolkit. (CyberWire)
‘Putin Is a Fool’: Intercepted Calls Reveal Russian Army in Disarray (New York Times) 
Cyber Warfare Rife in Ukraine, But Impact Stays in Shadows (SecurityWeek)
Russian hackers' lack of success against Ukraine shows that strong cyber defences work, says cybersecurity chief (ZDNET)
Failure of Russia’s cyber attacks on Ukraine is most important lesson for NCSC (ComputerWeekly)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 29 Sep 2022 20:15:00 -0000</pubDate>
      <itunes:title>Hackers support Iranian dissidents. Notes on C2C markets. Cyberespionage campaigns. Intercepted mobile calls from Russian troops expose morale problems.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1673</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Gray-hat support for Iranian dissidents. Selling access wholesale in the C2C market. Novel malware’s discovered targeting VMware hypervisors. The Witchetty espionage group uses an updated toolkit. Deepen Desai from Zscaler has a Technical Analysis of Industrial Spy Ransomware. Ann Johnson of Afternoon Cyber Tea speaks with Michal Braverman-Blumenstyk, CTO for Microsoft Security, about Israel's cyber innovation. And Russian troops phone call revelations.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/188

Selected reading.
Hacker Groups take to Telegram, Signal and Darkweb to assist Protestors in Iran (Check Point Software)
Hackers Use Telegram and Signal to Assist Protestors in Iran (Infosecurity Magazine)
Hackers Aid Protests Against Iranian Government with Proxies, Leaks and Hacks (The Hacker News)
Hackers seek to help — and profit from — Iran protests (The Record by Recorded Future)
Ransomware and Wholesale Access Markets: A $10 investment can lead to millions in profit (Cybersixgill)
Selling access wholesale in the C2C market. (CyberWire) 
Bad VIB(E)s Part One: Investigating Novel Malware Persistence Within ESXi Hypervisors (Mandiant)
Bad VIB(E)s Part Two: Detection and Hardening within ESXi Hypervisors (Mandiant) 
Mandiant has identified new malware that targets VMware ESXi, Linux vCenter servers, and Windows virtual machines. (CyberWire)
Securonix Threat Labs Security Advisory: Detecting STEEP#MAVERICK: New Covert Attack Campaign Targeting Military Contractors (Securonix)
Steep#Maverick cyberespionage campaign. (CyberWire)
Witchetty: Group Uses Updated Toolset in Attacks on Governments in Middle East (Symantec)
Witchetty espionage group uses updated toolkit. (CyberWire)
‘Putin Is a Fool’: Intercepted Calls Reveal Russian Army in Disarray (New York Times) 
Cyber Warfare Rife in Ukraine, But Impact Stays in Shadows (SecurityWeek)
Russian hackers' lack of success against Ukraine shows that strong cyber defences work, says cybersecurity chief (ZDNET)
Failure of Russia’s cyber attacks on Ukraine is most important lesson for NCSC (ComputerWeekly)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Gray-hat support for Iranian dissidents. Selling access wholesale in the C2C market. Novel malware’s discovered targeting VMware hypervisors. The Witchetty espionage group uses an updated toolkit. Deepen Desai from Zscaler has a Technical Analysis of Industrial Spy Ransomware. Ann Johnson of Afternoon Cyber Tea speaks with Michal Braverman-Blumenstyk, CTO for Microsoft Security, about Israel's cyber innovation. And Russian troops phone call revelations.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/188</p><p><br></p><h2>Selected reading.</h2><p><a href="https://blog.checkpoint.com/2022/09/28/hacker-groups-take-to-telegram-signal-and-darkweb-to-assist-protestors-in-iran/">Hacker Groups take to Telegram, Signal and Darkweb to assist Protestors in Iran</a> (Check Point Software)</p><p><a href="https://www.infosecurity-magazine.com/news/hackers-assist-protestors-in-iran/">Hackers Use Telegram and Signal to Assist Protestors in Iran</a> (Infosecurity Magazine)</p><p><a href="https://thehackernews.com/2022/09/hackers-aid-protests-against-iranian.html">Hackers Aid Protests Against Iranian Government with Proxies, Leaks and Hacks</a> (The Hacker News)</p><p><a href="https://therecord.media/hackers-seek-to-help-and-profit-from-iran-protests/">Hackers seek to help — and profit from — Iran protests</a> (The Record by Recorded Future)</p><p><a href="https://www.cybersixgill.com/blog/ransomware-and-wholesale-access-markets-a-10-investment-can-lead-to-millions-in-profit/">Ransomware and Wholesale Access Markets: A $10 investment can lead to millions in profit</a> (Cybersixgill)</p><p><a href="https://thecyberwire.com/stories/f8623c1ef599459d8b74484fa14d8c12/selling-access-wholesale-in-the-c2c-market">Selling access wholesale in the C2C market.</a> (CyberWire) </p><p><a href="https://www.mandiant.com/resources/blog/esxi-hypervisors-malware-persistence">Bad VIB(E)s Part One: Investigating Novel Malware Persistence Within ESXi Hypervisors</a> (Mandiant)</p><p><a href="https://www.mandiant.com/resources/blog/esxi-hypervisors-detection-hardening">Bad VIB(E)s Part Two: Detection and Hardening within ESXi Hypervisors</a> (Mandiant) </p><p><a href="https://thecyberwire.com/stories/a0618d79ea3249e4be6a49623bbd5c33/novel-malware-discovered-targeting-vmware-sxi-hypervisors">Mandiant has identified new malware that targets VMware ESXi, Linux vCenter servers, and Windows virtual machines.</a> (CyberWire)</p><p><a href="https://www.securonix.com/blog/detecting-steepmaverick-new-covert-attack-campaign-targeting-military-contractors/">Securonix Threat Labs Security Advisory: Detecting STEEP#MAVERICK: New Covert Attack Campaign Targeting Military Contractors</a> (Securonix)</p><p><a href="https://thecyberwire.com/stories/89475aec4b664634815064cc78648f33/steepmaverick-cyberespionage-campaign">Steep#Maverick cyberespionage campaign.</a> (CyberWire)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/witchetty-steganography-espionage">Witchetty: Group Uses Updated Toolset in Attacks on Governments in Middle East</a> (Symantec)</p><p><a href="https://thecyberwire.com/stories/c74b6d30ddac4d769bba3a6276145805/witchetty-espionage-group-uses-updated-toolkit">Witchetty espionage group uses updated toolkit.</a> (CyberWire)</p><p><a href="https://www.nytimes.com/interactive/2022/09/28/world/europe/russian-soldiers-phone-calls-ukraine.html">‘Putin Is a Fool’: Intercepted Calls Reveal Russian Army in Disarray</a> (New York Times) </p><p><a href="https://www.securityweek.com/cyber-warfare-rife-ukraine-impact-stays-shadows">Cyber Warfare Rife in Ukraine, But Impact Stays in Shadows</a> (SecurityWeek)</p><p><a href="https://www.zdnet.com/article/russian-hackers-lack-of-success-against-ukraine-shows-strong-cyber-defences-work-says-cybersecurity-chief/">Russian hackers' lack of success against Ukraine shows that strong cyber defences work, says cybersecurity chief</a> (ZDNET)</p><p><a href="https://www.computerweekly.com/news/252525514/Failure-of-Russias-cyber-attacks-on-Ukraine-is-most-important-lesson-for-NCSC">Failure of Russia’s cyber attacks on Ukraine is most important lesson for NCSC</a> (ComputerWeekly)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1415</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3aa5aa8a-787a-11ec-abf0-77bc021345ab]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4001413358.mp3?updated=1690317890" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DDoS remains commonplace in Russia's hybrid war. Leaked LockBit 3.0 builder used by new gang. Meta takes down Russian disinfo networks. Lazarus Group goes spearphishing. Cloudy complexity.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1672/notes</link>
      <description>DDoS remains the most characteristic mode of cyber ops in Russia's hybrid war against Ukraine. A leaked LockBit 3.0 builder is being used in ransomware attacks. Meta takes down Russian disinformation networks. Lazarus Group is spearphishing with bogus job offers. Joe Carrigan looks at SNAP benefit scams. Our guest is Crane Hassold of Abnormal Security with the latest in advanced email attack trends. And the cloud…is complicated.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/187

Selected reading.
Adversaries Continue Cyberattack Onslaught with Greater Precision and Innovative Attack Methods According to 1H2022 NETSCOUT DDoS Threat Intelligence Report (NETSCOUT) 
Leaked LockBit 3.0 builder used by ‘Bl00dy’ ransomware gang in attacks (BleepingComputer) 
Removing Coordinated Inauthentic Behavior From China and Russia (Meta)
Russia is spoofing mainstream media to smear Ukraine, Meta says (Protocol)
Operation In(ter)ception: social engineering by the Lazarus Group. (CyberWire)
How cloud complexity affects security. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 28 Sep 2022 20:15:00 -0000</pubDate>
      <itunes:title>DDoS remains commonplace in Russia's hybrid war. Leaked LockBit 3.0 builder used by new gang. Meta takes down Russian disinfo networks. Lazarus Group goes spearphishing. Cloudy complexity.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1672</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>DDoS remains the most characteristic mode of cyber ops in Russia's hybrid war against Ukraine. A leaked LockBit 3.0 builder is being used in ransomware attacks. Meta takes down Russian disinformation networks. Lazarus Group is spearphishing with bogus job offers. Joe Carrigan looks at SNAP benefit scams. Our guest is Crane Hassold of Abnormal Security with the latest in advanced email attack trends. And the cloud…is complicated.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/187

Selected reading.
Adversaries Continue Cyberattack Onslaught with Greater Precision and Innovative Attack Methods According to 1H2022 NETSCOUT DDoS Threat Intelligence Report (NETSCOUT) 
Leaked LockBit 3.0 builder used by ‘Bl00dy’ ransomware gang in attacks (BleepingComputer) 
Removing Coordinated Inauthentic Behavior From China and Russia (Meta)
Russia is spoofing mainstream media to smear Ukraine, Meta says (Protocol)
Operation In(ter)ception: social engineering by the Lazarus Group. (CyberWire)
How cloud complexity affects security. (CyberWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>DDoS remains the most characteristic mode of cyber ops in Russia's hybrid war against Ukraine. A leaked LockBit 3.0 builder is being used in ransomware attacks. Meta takes down Russian disinformation networks. Lazarus Group is spearphishing with bogus job offers. Joe Carrigan looks at SNAP benefit scams. Our guest is Crane Hassold of Abnormal Security with the latest in advanced email attack trends. And the cloud…is complicated.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/187</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.netscout.com/press-releases/adversaries-continue-cyberattack-onslaught-greater">Adversaries Continue Cyberattack Onslaught with Greater Precision and Innovative Attack Methods According to 1H2022 NETSCOUT DDoS Threat Intelligence Report</a> (NETSCOUT) </p><p><a href="https://www.bleepingcomputer.com/news/security/leaked-lockbit-30-builder-used-by-bl00dy-ransomware-gang-in-attacks/">Leaked LockBit 3.0 builder used by ‘Bl00dy’ ransomware gang in attacks</a> (BleepingComputer) </p><p><a href="https://about.fb.com/news/2022/09/removing-coordinated-inauthentic-behavior-from-china-and-russia/">Removing Coordinated Inauthentic Behavior From China and Russia</a> (Meta)</p><p><a href="https://www.protocol.com/bulletins/meta-russia-china-takedowns">Russia is spoofing mainstream media to smear Ukraine, Meta says</a> (Protocol)</p><p><a href="https://thecyberwire.com/stories/f81807079f9c49bd83c20881c0b51cd9/operation-interception-social-engineering-by-the-lazarus-group">Operation In(ter)ception: social engineering by the Lazarus Group</a>. (CyberWire)</p><p><a href="https://thecyberwire.com/stories/8bbeba0240fa40cda0cec8072937481e/how-cloud-complexity-affects-security">How cloud complexity affects security</a>. (CyberWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1778</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3b8669ee-787a-11ec-abf0-cfe800f89723]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1667408959.mp3?updated=1690317880" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ukraine's Defense Intelligence warns of coming Russian cyberattacks against infrastructure. Next moves for Lapsus$? Cashout scams and neglected wallets. Developments in the Optus breach.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1671/notes</link>
      <description>Ukraine's Defense Intelligence warns of coming Russian cyberattacks against infrastructure. Next moves for Lapsus$? We know it’s a bear market, but take a look at your wallet, crypto speculators, at least now and then. Mr Security Answer Person john Pescatore on next year's most over-hyped term. Ben Yelin explains a thirty five million dollar data privacy settlement. And, finally, developments in the Optus breach.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/186

Selected reading.
Invaders Preparing Mass Cyberattacks on Facilities of Critical Infrastructure of Ukraine and Its Allies (Defence Intelligence of the Ministry of Defence of Ukraine) 
Ukraine Says Russia Planning 'Massive Cyberattacks' on Critical Infrastructure (SecurityWeek)
Ukraine warns of Russian cyber attacks targeting critical infrastructure (Computing) 
Russia plans “massive cyberattacks” on critical infrastructure, Ukraine warns (Ars Technica)
Ukraine warns allies: Russia plans 'massive cyberattacks' (Register)
Hackers Working With Russia to Coordinate Cyberattacks, Google Says - Tech News Briefing - WSJ Podcasts (Wall Street Journal)
Viasat Hack "Did Not" Have Huge Impact on Ukrainian Military Communications, Official Says (Zero Day) 
Who’s next in Lapsus$’ crosshairs? (Digital Shadows)
Report: Sift Uncovers New Cashout Scam Targeting Forgotten Crypto Accounts (GlobeNewswire News Room)
Optus hacker releases 10,000 customers' details and issues new threat (Sky News)
‘Last thing I need’: Optus customer scrambles to protect himself (Australian Financial Review)
An alleged hacker has offered their 'deepest apologies' to Optus. Here's the latest on the data breach (ABC)
Singtel's Optus under further fire for cyber breach; purported hackers claim data deleted (The Straits Times)
‘Not feasible’ to crack properly encrypted data (Australian Financial Review)
Optus hack not 'sophisticated' as claims 10,000 customers have data publicly released (9News)
Everything Happening in This Optus Cyberattack Shitstorm, I Promise (Vice)
Australian cybersecurity minister lambasts Optus for ‘unprecedented' hack (The Record by Recorded Future)
FBI Working With Australian Authorities on Optus Cyberattack (MarketScreener) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Sep 2022 20:15:00 -0000</pubDate>
      <itunes:title>Ukraine's Defense Intelligence warns of coming Russian cyberattacks against infrastructure. Next moves for Lapsus$? Cashout scams and neglected wallets. Developments in the Optus breach.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1671</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ukraine's Defense Intelligence warns of coming Russian cyberattacks against infrastructure. Next moves for Lapsus$? We know it’s a bear market, but take a look at your wallet, crypto speculators, at least now and then. Mr Security Answer Person john Pescatore on next year's most over-hyped term. Ben Yelin explains a thirty five million dollar data privacy settlement. And, finally, developments in the Optus breach.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/186

Selected reading.
Invaders Preparing Mass Cyberattacks on Facilities of Critical Infrastructure of Ukraine and Its Allies (Defence Intelligence of the Ministry of Defence of Ukraine) 
Ukraine Says Russia Planning 'Massive Cyberattacks' on Critical Infrastructure (SecurityWeek)
Ukraine warns of Russian cyber attacks targeting critical infrastructure (Computing) 
Russia plans “massive cyberattacks” on critical infrastructure, Ukraine warns (Ars Technica)
Ukraine warns allies: Russia plans 'massive cyberattacks' (Register)
Hackers Working With Russia to Coordinate Cyberattacks, Google Says - Tech News Briefing - WSJ Podcasts (Wall Street Journal)
Viasat Hack "Did Not" Have Huge Impact on Ukrainian Military Communications, Official Says (Zero Day) 
Who’s next in Lapsus$’ crosshairs? (Digital Shadows)
Report: Sift Uncovers New Cashout Scam Targeting Forgotten Crypto Accounts (GlobeNewswire News Room)
Optus hacker releases 10,000 customers' details and issues new threat (Sky News)
‘Last thing I need’: Optus customer scrambles to protect himself (Australian Financial Review)
An alleged hacker has offered their 'deepest apologies' to Optus. Here's the latest on the data breach (ABC)
Singtel's Optus under further fire for cyber breach; purported hackers claim data deleted (The Straits Times)
‘Not feasible’ to crack properly encrypted data (Australian Financial Review)
Optus hack not 'sophisticated' as claims 10,000 customers have data publicly released (9News)
Everything Happening in This Optus Cyberattack Shitstorm, I Promise (Vice)
Australian cybersecurity minister lambasts Optus for ‘unprecedented' hack (The Record by Recorded Future)
FBI Working With Australian Authorities on Optus Cyberattack (MarketScreener) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ukraine's Defense Intelligence warns of coming Russian cyberattacks against infrastructure. Next moves for Lapsus$? We know it’s a bear market, but take a look at your wallet, crypto speculators, at least now and then. Mr Security Answer Person john Pescatore on next year's most over-hyped term. Ben Yelin explains a thirty five million dollar data privacy settlement. And, finally, developments in the Optus breach.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/186</p><p><br></p><h2>Selected reading.</h2><p><a href="https://gur.gov.ua/en/content/okupanty-hotuiut-masovani-kiberataky-na-ob-iekty-krytychnoi-infrastruktury-ukrainy-ta-ii-soiuznykiv.html">Invaders Preparing Mass Cyberattacks on Facilities of Critical Infrastructure of Ukraine and Its Allies</a> (Defence Intelligence of the Ministry of Defence of Ukraine) </p><p><a href="https://www.securityweek.com/ukraine-says-russia-planning-massive-cyberattacks-critical-infrastructure">Ukraine Says Russia Planning 'Massive Cyberattacks' on Critical Infrastructure</a> (SecurityWeek)</p><p><a href="https://www.computing.co.uk/news/4057008/ukraine-warns-russian-cyber-attacks-targeting-critical-infrastructure">Ukraine warns of Russian cyber attacks targeting critical infrastructure </a>(Computing) </p><p><a href="https://arstechnica.com/information-technology/2022/09/ukraine-warns-russia-plans-massive-cyberattacks-on-its-power-grids/">Russia plans “massive cyberattacks” on critical infrastructure, Ukraine warns</a> (Ars Technica)</p><p><a href="https://www.theregister.com/2022/09/27/russia_plans_massive_cyberattacks_ukraine/">Ukraine warns allies: Russia plans 'massive cyberattacks'</a> (Register)</p><p><a href="https://www.wsj.com/podcasts/tech-news-briefing/hackers-working-with-russia-to-coordinate-cyberattacks-google-says/5ff6d3f3-890e-4970-8ab9-3fbd4ec4d164">Hackers Working With Russia to Coordinate Cyberattacks, Google Says - Tech News Briefing - WSJ Podcasts</a> (Wall Street Journal)</p><p><a href="https://zetter.substack.com/p/viasat-hack-did-not-have-huge-impact">Viasat Hack "Did Not" Have Huge Impact on Ukrainian Military Communications, Official Says</a> (Zero Day) </p><p><a href="https://www.digitalshadows.com/blog-and-research/whos-next-in-lapsus-crosshairs/">Who’s next in Lapsus$’ crosshairs?</a> (Digital Shadows)</p><p><a href="https://www.globenewswire.com/news-release/2022/09/27/2523088/0/en/Report-Sift-Uncovers-New-Cashout-Scam-Targeting-Forgotten-Crypto-Accounts.html">Report: Sift Uncovers New Cashout Scam Targeting Forgotten Crypto Accounts</a> (GlobeNewswire News Room)</p><p><a href="https://www.skynews.com.au/australia-news/optus-hacker-reveals-the-private-data-of-10000-customers-has-been-released-and-threatens-daily-leaks-if-ransom-is-not-paid/news-story/68c144905746e55e0ceeb005141c5df0">Optus hacker releases 10,000 customers' details and issues new threat</a> (Sky News)</p><p><a href="https://www.afr.com/companies/telecommunications/last-thing-i-need-optus-customer-scrambles-to-protect-from-breach-20220926-p5bkza">‘Last thing I need’: Optus customer scrambles to protect himself</a> (Australian Financial Review)</p><p><a href="https://www.abc.net.au/news/2022-09-27/optus-data-breach-cyber-attack-hacker-ransom-sorry/101476316">An alleged hacker has offered their 'deepest apologies' to Optus. Here's the latest on the data breach</a> (ABC)</p><p><a href="https://www.straitstimes.com/business/companies-markets/singtels-optus-says-ransom-demand-probed-after-massive-data-hack">Singtel's Optus under further fire for cyber breach; purported hackers claim data deleted</a> (The Straits Times)</p><p><a href="https://www.afr.com/technology/not-feasible-to-crack-properly-encrypted-data-20220927-p5blda">‘Not feasible’ to crack properly encrypted data</a> (Australian Financial Review)</p><p><a href="https://www.9news.com.au/national/optus-cyber-hack-attack-not-sophisticated-high-school-student-couldve-pulled-it-off-expert-says/66bdd579-352e-47b7-86d5-469043fa5aca">Optus hack not 'sophisticated' as claims 10,000 customers have data publicly released</a> (9News)</p><p><a href="https://www.vice.com/en/article/g5vwqx/everything-happening-in-this-optus-cyberattack-shitstorm-i-promise">Everything Happening in This Optus Cyberattack Shitstorm, I Promise</a> (Vice)</p><p><a href="https://therecord.media/australian-cybersecurity-minister-lambasts-optus-for-unprecedented-hack/">Australian cybersecurity minister lambasts Optus for ‘unprecedented' hack</a> (The Record by Recorded Future)</p><p><a href="https://www.marketscreener.com/news/latest/FBI-Working-With-Australian-Authorities-on-Optus-Cyberattack--41865224/">FBI Working With Australian Authorities on Optus Cyberattack</a> (MarketScreener) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1389</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3ba67ef0-787a-11ec-abf0-3fcea0589a01]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3654530601.mp3?updated=1690317860" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unrest in Iran finds expression in cyberspace. Cyber conflict and diplomacy. Cybercrime in the hybrid war. And there seems to have been an arrest in the Uber and Rockstar breaches.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1670/notes</link>
      <description>Unrest in Iran finds expression in cyberspace. Albania explains its reasons for severing relations with Iran. Cybercrime in the hybrid war. Rick Howard on risk forecasting with data scientists. Dave Bittner sits down with Dr. Bilyana Lilly to discuss her new book: "Russian Information Warfare: Assault on Democracies in the Cyber Wild West."And there seems to have been an arrest in the Uber and Rockstar breaches.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/185

Selected reading.
Iran’s War Within (Foreign Affairs)
Iran’s Hijab Protests Have Lit a Fire the Regime Can’t Put Out (World Politics Review) 
‘Something big is happening’: the Iranians risking everything to protest (the Guardian)
Dissident: 'Iranian women are furious' over headscarf death (AP NEWS)
OpIran: Anonymous declares war on Teheran amid Mahsa Amini’s death (Security Affairs)
IDF official says military foiled ‘dozens’ of Iran cyberattacks on civilian sites (Times of Israel)
Analysis | 'Our Conflict With Iran Is Unparalleled', Say Israel's Elite Cyber Unit Commanders (Haaretz) 
US Issues License to Expand Internet Access for Iranians (VOA)
US Treasury carves out Iran sanctions exceptions for internet providers (The Record by Recorded Future) 
Iran and Albania: diplomacy and cyber operations (CyberWire)
Ukraine dismantles hacker gang that stole 30 million accounts (BleepingComputer) 
The SBU neutralized a hacker group that "hacked" almost 30 million accounts of Ukrainian and EU citizens (SSU)
Les détails personnels de stars, dont Sir David Attenborough et Sarah Ferguson, ont été divulgués après le piratage d'un magasin bio par des escrocs russes (News 24) 
London Police Arrested 17-Year-Old Hacker Suspected of Uber and GTA 6 Breaches (The Hacker News)
UK teen suspected of Uber and Rockstar hacks arrested (Computing) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 26 Sep 2022 20:15:00 -0000</pubDate>
      <itunes:title>Unrest in Iran finds expression in cyberspace. Cyber conflict and diplomacy. Cybercrime in the hybrid war. And there seems to have been an arrest in the Uber and Rockstar breaches.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1670</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Unrest in Iran finds expression in cyberspace. Albania explains its reasons for severing relations with Iran. Cybercrime in the hybrid war. Rick Howard on risk forecasting with data scientists. Dave Bittner sits down with Dr. Bilyana Lilly to discuss her new book: "Russian Information Warfare: Assault on Democracies in the Cyber Wild West."And there seems to have been an arrest in the Uber and Rockstar breaches.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/185

Selected reading.
Iran’s War Within (Foreign Affairs)
Iran’s Hijab Protests Have Lit a Fire the Regime Can’t Put Out (World Politics Review) 
‘Something big is happening’: the Iranians risking everything to protest (the Guardian)
Dissident: 'Iranian women are furious' over headscarf death (AP NEWS)
OpIran: Anonymous declares war on Teheran amid Mahsa Amini’s death (Security Affairs)
IDF official says military foiled ‘dozens’ of Iran cyberattacks on civilian sites (Times of Israel)
Analysis | 'Our Conflict With Iran Is Unparalleled', Say Israel's Elite Cyber Unit Commanders (Haaretz) 
US Issues License to Expand Internet Access for Iranians (VOA)
US Treasury carves out Iran sanctions exceptions for internet providers (The Record by Recorded Future) 
Iran and Albania: diplomacy and cyber operations (CyberWire)
Ukraine dismantles hacker gang that stole 30 million accounts (BleepingComputer) 
The SBU neutralized a hacker group that "hacked" almost 30 million accounts of Ukrainian and EU citizens (SSU)
Les détails personnels de stars, dont Sir David Attenborough et Sarah Ferguson, ont été divulgués après le piratage d'un magasin bio par des escrocs russes (News 24) 
London Police Arrested 17-Year-Old Hacker Suspected of Uber and GTA 6 Breaches (The Hacker News)
UK teen suspected of Uber and Rockstar hacks arrested (Computing) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Unrest in Iran finds expression in cyberspace. Albania explains its reasons for severing relations with Iran. Cybercrime in the hybrid war. Rick Howard on risk forecasting with data scientists. Dave Bittner sits down with Dr. Bilyana Lilly to discuss her new book: "Russian Information Warfare: Assault on Democracies in the Cyber Wild West."And there seems to have been an arrest in the Uber and Rockstar breaches.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/185</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.foreignaffairs.com/articles/iran/2021-08-05/irans-war-within-ebrahim-raisi">Iran’s War Within</a> (Foreign Affairs)</p><p><a href="https://www.worldpoliticsreview.com/iran-protests-womens-rights-human-rights-hijab/">Iran’s Hijab Protests Have Lit a Fire the Regime Can’t Put Out</a> (World Politics Review) </p><p><a href="https://www.theguardian.com/world/2022/sep/24/something-big-is-happening-the-iranians-risking-everything-to-protest">‘Something big is happening’: the Iranians risking everything to protest</a> (the Guardian)</p><p><a href="https://apnews.com/article/iran-middle-east-religion-new-york-city-80365eb6335893162012863a164954a8">Dissident: 'Iranian women are furious' over headscarf death</a> (AP NEWS)</p><p><a href="https://securityaffairs.co/wordpress/136179/hacktivism/anonymous-opiran-mahsa-amini-death.html">OpIran: Anonymous declares war on Teheran amid Mahsa Amini’s death</a> (Security Affairs)</p><p><a href="https://www.timesofisrael.com/idf-official-says-military-foiled-dozens-of-iran-cyberattacks-on-civilian-sites/">IDF official says military foiled ‘dozens’ of Iran cyberattacks on civilian sites</a> (Times of Israel)</p><p><a href="https://www.haaretz.com/israel-news/2022-09-25/ty-article/.premium/our-conflict-with-iran-is-unparalleled-say-israels-elite-cyber-unit-commanders/00000183-7486-dfc1-add3-ffb7ccdc0000">Analysis | 'Our Conflict With Iran Is Unparalleled', Say Israel's Elite Cyber Unit Commanders</a> (Haaretz) </p><p><a href="https://www.voanews.com/a/us-issues-license-to-expand-internet-access-for-iranians/6760646.html">US Issues License to Expand Internet Access for Iranians</a> (VOA)</p><p><a href="https://therecord.media/us-treasury-carves-out-iran-sanctions-exceptions-for-internet-providers/">US Treasury carves out Iran sanctions exceptions for internet providers</a> (The Record by Recorded Future) </p><p><a href="https://thecyberwire.com/stories/0eaee3d669684afab184a7a83e80cb1e/iran-and-albania-diplomacy-and-cyber-operations">Iran and Albania: diplomacy and cyber operations</a> (CyberWire)</p><p><a href="https://www.bleepingcomputer.com/news/security/ukraine-dismantles-hacker-gang-that-stole-30-million-accounts/?mod=djemCybersecruityPro&amp;tpl=cy">Ukraine dismantles hacker gang that stole 30 million accounts</a> (BleepingComputer) </p><p><a href="https://ssu.gov.ua/novyny/sbu-neitralizuvala-khakerske-uhrupovannia-yake-zlamalo-maizhe-30-mln-akauntiv-hromadian-ukrainy-ta-yes">The SBU neutralized a hacker group that "hacked" almost 30 million accounts of Ukrainian and EU citizens</a> (SSU)</p><p><a href="https://news-24.fr/les-details-personnels-de-stars-dont-sir-david-attenborough-et-sarah-ferguson-ont-ete-divulgues-apres-le-piratage-dun-magasin-bio-par-des-escrocs-russes/">Les détails personnels de stars, dont Sir David Attenborough et Sarah Ferguson, ont été divulgués après le piratage d'un magasin bio par des escrocs russes</a> (News 24) </p><p><a href="https://thehackernews.com/2022/09/london-police-arrested-17-year-old.html">London Police Arrested 17-Year-Old Hacker Suspected of Uber and GTA 6 Breaches</a> (The Hacker News)</p><p><a href="https://www.computing.co.uk/news/4056881/uk-teen-suspected-uber-rockstar-hacks-arrested">UK teen suspected of Uber and Rockstar hacks arrested </a>(Computing) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1512</itunes:duration>
      <guid isPermaLink="false"><![CDATA[3c87e534-787a-11ec-abf0-0b147f7366b0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2278684713.mp3?updated=1690317847" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Adam Marrè: Learning to be a leader. [CISO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/118/notes</link>
      <description>Adam Marrè, CISO from Arctic Wolf sits down to share his story of rising through the ranks. After 9/11 he decided he wanted to make a difference in the world and so he chose to go into the FBI, there he learned the skills that got him to where he is today. In his time at the FBI, he was able to do what he loved which was working with computers while gaining more knowledge on cybersecurity and became computer forensic certified. Ultimately he needed a change in the end and decided to leave the FBI, He was able to learn the leadership skills he needed to move past that career path and follow a new dream. He is now able to share his passion with the world and help people understand security to help protect themselves as well as helping people finding success in their careers and in their lives. We thank Adam for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 25 Sep 2022 07:00:00 -0000</pubDate>
      <itunes:title>Adam Marrè: Learning to be a leader. [CISO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>118</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Adam Marrè, CISO from Arctic Wolf sits down to share his story of rising through the ranks. After 9/11 he decided he wanted to make a difference in the world and so he chose to go into the FBI, there he learned the skills that got him to where he is today. In his time at the FBI, he was able to do what he loved which was working with computers while gaining more knowledge on cybersecurity and became computer forensic certified. Ultimately he needed a change in the end and decided to leave the FBI, He was able to learn the leadership skills he needed to move past that career path and follow a new dream. He is now able to share his passion with the world and help people understand security to help protect themselves as well as helping people finding success in their careers and in their lives. We thank Adam for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Adam Marrè, CISO from Arctic Wolf sits down to share his story of rising through the ranks. After 9/11 he decided he wanted to make a difference in the world and so he chose to go into the FBI, there he learned the skills that got him to where he is today. In his time at the FBI, he was able to do what he loved which was working with computers while gaining more knowledge on cybersecurity and became computer forensic certified. Ultimately he needed a change in the end and decided to leave the FBI, He was able to learn the leadership skills he needed to move past that career path and follow a new dream. He is now able to share his passion with the world and help people understand security to help protect themselves as well as helping people finding success in their careers and in their lives. We thank Adam for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>586</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[90ebd890-39d8-11ed-844d-57a793847aa8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1189166673.mp3?updated=1663790125" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Keeping an eye on RDS vulnerabilities. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/251/notes</link>
      <description>Gafnit Amiga, Director of Security Research from Lightspin joins Dave to discuss her team's research "AWS RDS Vulnerability Leads to AWS Internal Service Credentials." The research describes how the vulnerability was caught and right after it was reported the AWS Security team applied an initial patch limited only to the recent Amazon Relational Database Service (RDS) and Aurora PostgreSQL engines, excluding older versions.
They followed by personally reaching out to the customers affected by the vulnerability and helped them through the update process. The research states "Lightspin's Research Team obtained credentials to an internal AWS service by exploiting a local file read vulnerability on the RDS EC2 instance using the log_fdw extension."
The research can be found here:
AWS RDS Vulnerability Leads to AWS Internal Service Credentials

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Sep 2022 07:00:00 -0000</pubDate>
      <itunes:title>Keeping an eye on RDS vulnerabilities. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>251</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Gafnit Amiga, Director of Security Research from Lightspin joins Dave to discuss her team's research "AWS RDS Vulnerability Leads to AWS Internal Service Credentials." The research describes how the vulnerability was caught and right after it was reported the AWS Security team applied an initial patch limited only to the recent Amazon Relational Database Service (RDS) and Aurora PostgreSQL engines, excluding older versions.
They followed by personally reaching out to the customers affected by the vulnerability and helped them through the update process. The research states "Lightspin's Research Team obtained credentials to an internal AWS service by exploiting a local file read vulnerability on the RDS EC2 instance using the log_fdw extension."
The research can be found here:
AWS RDS Vulnerability Leads to AWS Internal Service Credentials

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Gafnit Amiga, Director of Security Research from Lightspin joins Dave to discuss her team's research "AWS RDS Vulnerability Leads to AWS Internal Service Credentials." The research describes how the vulnerability was caught and right after it was reported the AWS Security team applied an initial patch limited only to the recent Amazon Relational Database Service (RDS) and Aurora PostgreSQL engines, excluding older versions.</p><p>They followed by personally reaching out to the customers affected by the vulnerability and helped them through the update process. The research states "Lightspin's Research Team obtained credentials to an internal AWS service by exploiting a local file read vulnerability on the RDS EC2 instance using the log_fdw extension."</p><p>The research can be found here:</p><ul><li><a href="https://blog.lightspin.io/aws-rds-critical-security-vulnerability">AWS RDS Vulnerability Leads to AWS Internal Service Credentials</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>971</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2eccd328-38fa-11ed-9e09-bbb1a2863361]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8460736767.mp3?updated=1685127158" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Privateers seem to be evolving into front groups for the Russian organs. Unidentified threat actors engaging in cyberespionage. Catphishing from a South Carolina prison. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1669/notes</link>
      <description>The GRU's closely coordinating with cyber criminals. An unidentified threat actor deploys malicious NPM packets. Gootloader uses blogging and SEO poisoning to attract victims. Metador is a so-far unattributed threat actor. Johannes Ullrich from SANS on Resilient DNS Infrastructure. Maria Varmazis interviews Anthony Colangelo, host of spaceflight podcast Main Engine Cutoff, about the iPhone 14 “Emergency SOS via Satellite” feature. And having too much time on your hands while doing time is not a good thing.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/184

Selected reading.
GRU: Rise of the (Telegram) MinIOns (Mandiant)
Void Balaur | The Sprawling Infrastructure of a Careless Mercenary (SentinelOne)
An unidentified threat actor deploys malicious NPM packets (CyberWire)
Threat analysis: Malicious npm package mimics Material Tailwind CSS tool (ReversingLabs)
A Multimillion Dollar Global Online Credit Card Scam Uncovered (ReasonLabs)
Gootloader Poisoned Blogs Uncovered by Deepwatch’s ATI Team (Deepwatch) 
The Mystery of Metador | An Unattributed Threat Hiding in Telcos, ISPs, and Universities (SentinelOne) 
SC inmate sentenced for ‘sextortion’ scheme that targeted military (Stars and Stripes)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 23 Sep 2022 20:40:00 -0000</pubDate>
      <itunes:title>Privateers seem to be evolving into front groups for the Russian organs. Unidentified threat actors engaging in cyberespionage. Catphishing from a South Carolina prison. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1669</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The GRU's closely coordinating with cyber criminals. An unidentified threat actor deploys malicious NPM packets. Gootloader uses blogging and SEO poisoning to attract victims. Metador is a so-far unattributed threat actor. Johannes Ullrich from SANS on Resilient DNS Infrastructure. Maria Varmazis interviews Anthony Colangelo, host of spaceflight podcast Main Engine Cutoff, about the iPhone 14 “Emergency SOS via Satellite” feature. And having too much time on your hands while doing time is not a good thing.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/184

Selected reading.
GRU: Rise of the (Telegram) MinIOns (Mandiant)
Void Balaur | The Sprawling Infrastructure of a Careless Mercenary (SentinelOne)
An unidentified threat actor deploys malicious NPM packets (CyberWire)
Threat analysis: Malicious npm package mimics Material Tailwind CSS tool (ReversingLabs)
A Multimillion Dollar Global Online Credit Card Scam Uncovered (ReasonLabs)
Gootloader Poisoned Blogs Uncovered by Deepwatch’s ATI Team (Deepwatch) 
The Mystery of Metador | An Unattributed Threat Hiding in Telcos, ISPs, and Universities (SentinelOne) 
SC inmate sentenced for ‘sextortion’ scheme that targeted military (Stars and Stripes)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The GRU's closely coordinating with cyber criminals. An unidentified threat actor deploys malicious NPM packets. Gootloader uses blogging and SEO poisoning to attract victims. Metador is a so-far unattributed threat actor. Johannes Ullrich from SANS on Resilient DNS Infrastructure. Maria Varmazis interviews Anthony Colangelo, host of spaceflight podcast Main Engine Cutoff, about the iPhone 14 “Emergency SOS via Satellite” feature. And having too much time on your hands while doing time is not a good thing.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/184</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.mandiant.com/resources/blog/gru-rise-telegram-minions">GRU: Rise of the (Telegram) MinIOns</a> (Mandiant)</p><p><a href="https://www.sentinelone.com/labs/the-sprawling-infrastructure-of-a-careless-mercenary/">Void Balaur | The Sprawling Infrastructure of a Careless Mercenary</a> (SentinelOne)</p><p><a href="https://thecyberwire.com/stories/fa615d9850634969b2dbb4a66b96457e/an-unidentified-threat-actor-deploys-malicious-npm-packets">An unidentified threat actor deploys malicious NPM packets</a> (CyberWire)</p><p><a href="https://blog.reversinglabs.com/blog/threat-analysis-malicious-npm-package-mimicks-material-tailwind-css-tool">Threat analysis: Malicious npm package mimics Material Tailwind CSS tool</a> (ReversingLabs)</p><p><a href="https://reasonlabs.com/research/credit-card-scam-report">A Multimillion Dollar Global Online Credit Card Scam Uncovered</a> (ReasonLabs)</p><p><a href="https://www.deepwatch.com/labs/gootloader-poisoned-blogs-uncovered-by-deepwatchs-ati-team/">Gootloader Poisoned Blogs Uncovered by Deepwatch’s ATI Team</a> (Deepwatch) </p><p><a href="https://www.sentinelone.com/labs/the-mystery-of-metador-an-unattributed-threat-hiding-in-telcos-isps-and-universities/">The Mystery of Metador | An Unattributed Threat Hiding in Telcos, ISPs, and Universities</a> (SentinelOne) </p><p><a href="https://www.stripes.com/theaters/us/2022-09-21/inmate-sentenced-sextortion-scheme-targeted-military-7418967.html">SC inmate sentenced for ‘sextortion’ scheme that targeted military</a> (Stars and Stripes)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1738</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3a66b190-787a-11ec-abf0-5b382f960551]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9899204160.mp3?updated=1690317834" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>GRU operators masquerade as Ukrainian telecommunications providers. 2K Games Support compromised to spread malware. Developments in the cyber underworld. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1668/notes</link>
      <description>GRU operators masquerade as Ukrainian telecommunications providers. Another video game maker is compromised to spread malware. Noberus may be a successor to Darkside and BlackMatter ransomware. Robert M. Lee from Dragos explains Crown Jewel analysis. Our guest is Nathan Hunstad from Code42 with thoughts on insider risk events. Threat actors have their insider threats, too.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/183

Selected reading.
Russia-Nexus UAC-0113 Emulating Telecommunication Providers in Ukraine (Recorded Future)
Russian Cyberspies Targeting Ukraine Pose as Telecoms Providers (SecurityWeek)
Shadowy Russian Cell Phone Companies Are Cropping Up in Ukraine (WIRED)
CISA Alert AA22-264A – Iranian state actors conduct cyber operations against the government of Albania. (CyberWire)
Iranian State Actors Conduct Cyber Operations Against the Government of Albania (CISA)
2K Games says hacked help desk targeted players with malware (BleepingComputer)
2K Games helpdesk hacked to spread malware to players (TechRadar)
Rockstar parent company hacked again as 2K Support sends users malware (Dexerto)
‘Grand Theft Auto VI’ leak is Rockstar’s nightmare, YouTubers’ dream (Washington Post)
Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics (Symantec) 
LockBit ransomware builder leaked online by “angry developer” (BleepingComputer) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 22 Sep 2022 20:15:00 -0000</pubDate>
      <itunes:title>GRU operators masquerade as Ukrainian telecommunications providers. 2K Games Support compromised to spread malware. Developments in the cyber underworld. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1668</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>GRU operators masquerade as Ukrainian telecommunications providers. Another video game maker is compromised to spread malware. Noberus may be a successor to Darkside and BlackMatter ransomware. Robert M. Lee from Dragos explains Crown Jewel analysis. Our guest is Nathan Hunstad from Code42 with thoughts on insider risk events. Threat actors have their insider threats, too.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/183

Selected reading.
Russia-Nexus UAC-0113 Emulating Telecommunication Providers in Ukraine (Recorded Future)
Russian Cyberspies Targeting Ukraine Pose as Telecoms Providers (SecurityWeek)
Shadowy Russian Cell Phone Companies Are Cropping Up in Ukraine (WIRED)
CISA Alert AA22-264A – Iranian state actors conduct cyber operations against the government of Albania. (CyberWire)
Iranian State Actors Conduct Cyber Operations Against the Government of Albania (CISA)
2K Games says hacked help desk targeted players with malware (BleepingComputer)
2K Games helpdesk hacked to spread malware to players (TechRadar)
Rockstar parent company hacked again as 2K Support sends users malware (Dexerto)
‘Grand Theft Auto VI’ leak is Rockstar’s nightmare, YouTubers’ dream (Washington Post)
Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics (Symantec) 
LockBit ransomware builder leaked online by “angry developer” (BleepingComputer) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>GRU operators masquerade as Ukrainian telecommunications providers. Another video game maker is compromised to spread malware. Noberus may be a successor to Darkside and BlackMatter ransomware. Robert M. Lee from Dragos explains Crown Jewel analysis. Our guest is Nathan Hunstad from Code42 with thoughts on insider risk events. Threat actors have their insider threats, too.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/183</p><p><br></p><h2>Selected reading.</h2><p><a href="https://go.recordedfuture.com/hubfs/reports/cta-2022-0919.pdf">Russia-Nexus UAC-0113 Emulating Telecommunication Providers in Ukraine</a> (Recorded Future)</p><p><a href="https://www.securityweek.com/russian-cyberspies-targeting-ukraine-pose-telecoms-providers">Russian Cyberspies Targeting Ukraine Pose as Telecoms Providers</a> (SecurityWeek)</p><p><a href="https://www.wired.com/story/ukraine-war-mobile-networks-russia/">Shadowy Russian Cell Phone Companies Are Cropping Up in Ukraine</a> (WIRED)</p><p><a href="https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/31/notes">CISA Alert AA22-264A – Iranian state actors conduct cyber operations against the government of Albania.</a> (CyberWire)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/09/21/iranian-state-actors-conduct-cyber-operations-against-government">Iranian State Actors Conduct Cyber Operations Against the Government of Albania</a> (CISA)</p><p><a href="https://www.bleepingcomputer.com/news/security/2k-games-says-hacked-help-desk-targeted-players-with-malware/">2K Games says hacked help desk targeted players with malware</a> (BleepingComputer)</p><p><a href="https://www.techradar.com/news/2k-games-helpdesk-hacked-to-spread-malware-to-players">2K Games helpdesk hacked to spread malware to players</a> (TechRadar)</p><p><a href="https://www.dexerto.com/gaming/rockstar-parent-company-hacked-again-as-2k-support-sends-users-malware-1937176/">Rockstar parent company hacked again as 2K Support sends users malware</a> (Dexerto)</p><p><a href="https://www.washingtonpost.com/video-games/2022/09/21/grand-theft-auto-vi-leak-rockstar-rumors-youtubers/">‘Grand Theft Auto VI’ leak is Rockstar’s nightmare, YouTubers’ dream</a> (Washington Post)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/noberus-blackcat-ransomware-ttps">Noberus Ransomware: Darkside and BlackMatter Successor Continues to Evolve its Tactics</a> (Symantec) </p><p><a href="https://www.bleepingcomputer.com/news/security/lockbit-ransomware-builder-leaked-online-by-angry-developer-/">LockBit ransomware builder leaked online by “angry developer”</a> (BleepingComputer) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1788</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3ac54372-787a-11ec-abf0-938de26c2035]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6153725890.mp3?updated=1690317816" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA22-265A – Control system defense: know the opponent. [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/32/notes</link>
      <description>This alert builds on previous NSA and CISA guidance to stop malicious ICS activity and reduce OT exposure. The alert documentation linked in the show notes describes TTPs that malicious actors use to compromise OT/ICS assets. It also recommends mitigations that owners and operators can use to defend their systems from each of the listed TTPs. NSA and CISA encourage OT and ICS owners and operators to apply the recommendations in this documentation.
AA22-265A Alert, Technical Details, and Mitigations
NSA and CISA guidance to stop malicious ICS activity and reduce OT exposure
For NSA client requirements or general cybersecurity inquiries, contact Cybersecurity_Requests@nsa.gov. To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov.  
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 22 Sep 2022 19:53:00 -0000</pubDate>
      <itunes:title>CISA Alert AA22-265A – Control system defense: know the opponent. [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>32</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This alert builds on previous NSA and CISA guidance to stop malicious ICS activity and reduce OT exposure. The alert documentation linked in the show notes describes TTPs that malicious actors use to compromise OT/ICS assets. It also recommends mitigations that owners and operators can use to defend their systems from each of the listed TTPs. NSA and CISA encourage OT and ICS owners and operators to apply the recommendations in this documentation.
AA22-265A Alert, Technical Details, and Mitigations
NSA and CISA guidance to stop malicious ICS activity and reduce OT exposure
For NSA client requirements or general cybersecurity inquiries, contact Cybersecurity_Requests@nsa.gov. To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov.  
To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at report@cisa.gov, or call (888) 282-0870, or report incidents to your local FBI field office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This alert builds on previous NSA and CISA guidance to stop malicious ICS activity and reduce OT exposure. The alert documentation linked in the show notes describes TTPs that malicious actors use to compromise OT/ICS assets. It also recommends mitigations that owners and operators can use to defend their systems from each of the listed TTPs. NSA and CISA encourage OT and ICS owners and operators to apply the recommendations in this documentation.</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-265a">AA22-265A Alert, Technical Details, and Mitigations</a></p><p>NSA and CISA guidance to <a href="https://media.defense.gov/2021/Apr/29/2002630479/-1/-1/0/CSA_STOP-MCA-AGAINST-OT_UOO13672321.PDF">stop malicious ICS activity</a> and <a href="https://media.defense.gov/2020/Jul/23/2002462846/-1/-1/1/OT_ADVISORY-DUAL-OFFICIAL-20200722.PDF">reduce OT exposure</a></p><p>For NSA client requirements or general cybersecurity inquiries, contact <a href="mailto:Cybersecurity_Requests@nsa.gov">Cybersecurity_Requests@nsa.gov</a>. To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="mailto:report@cisa.gov">report@cisa.gov</a>.  </p><p>To report incidents and anomalous activity or to request incident response resources or technical assistance related to these threats, contact CISA at <a href="mailto:report@cisa.gov">report@cisa.gov</a>, or call (888) 282-0870, or report incidents to your local FBI field office.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>189</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8c8a6306-3ab0-11ed-b777-470e0f190046]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7647174034.mp3?updated=1663875876" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA22-264A – Iranian state actors conduct cyber operations against the government of Albania. [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/31/notes</link>
      <description>In July 2022, Iranian state cyber actors—identifying as “HomeLand Justice”—launched a destructive cyber attack against the Government of Albania which rendered websites and services unavailable. An FBI investigation indicates Iranian state cyber actors acquired initial access to the victim’s network approximately 14 months before launching the destructive cyber attack, which included a ransomware-style file encryptor and disk wiping malware.
AA22-264A Alert, Technical Details, and Mitigations
CISA’s free Cyber Hygiene Services (CyHy)
CISA’s zero–trust principles and architecture.
Iran Cyber Threat Overview and Advisories.
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 22 Sep 2022 12:57:00 -0000</pubDate>
      <itunes:title>CISA Alert AA22-264A – Iranian state actors conduct cyber operations against the government of Albania. [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>31</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In July 2022, Iranian state cyber actors—identifying as “HomeLand Justice”—launched a destructive cyber attack against the Government of Albania which rendered websites and services unavailable. An FBI investigation indicates Iranian state cyber actors acquired initial access to the victim’s network approximately 14 months before launching the destructive cyber attack, which included a ransomware-style file encryptor and disk wiping malware.
AA22-264A Alert, Technical Details, and Mitigations
CISA’s free Cyber Hygiene Services (CyHy)
CISA’s zero–trust principles and architecture.
Iran Cyber Threat Overview and Advisories.
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In July 2022, Iranian state cyber actors—identifying as “HomeLand Justice”—launched a destructive cyber attack against the Government of Albania which rendered websites and services unavailable. An FBI investigation indicates Iranian state cyber actors acquired initial access to the victim’s network approximately 14 months before launching the destructive cyber attack, which included a ransomware-style file encryptor and disk wiping malware.</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-264a">AA22-264A Alert, Technical Details, and Mitigations</a></p><p>CISA’s free <a href="https://www.cisa.gov/cyber-hygiene-services">Cyber Hygiene Services</a> (CyHy)</p><p>CISA’s <a href="https://www.cisa.gov/blog/2021/09/07/no-trust-no-problem-maturing-towards-zero-trust-architectures">zero–trust principles and architecture</a>.</p><p><a href="https://www.us-cert.cisa.gov/iran">Iran Cyber Threat Overview and Advisories</a>.</p><p>All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at <a href="mailto:central@cisa.dhs.gov">central@cisa.dhs.gov</a> or (888) 282-0870 and to the FBI via your <a href="https://www.fbi.gov/contact-us/field-offices">local FBI field office</a> or the FBI’s 24/7 CyWatch at (855) 292-3937 or <a href="mailto:CyWatch@fbi.gov">CyWatch@fbi.gov</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>189</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f01f7f62-3a76-11ed-bca8-f73488163958]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4818179343.mp3?updated=1663851923" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A call-up of Russian reserves, and more notes on the IT Army's claimed hack of the Wagner Group. Netflix phishbait. The Rockstar Games and LastPass incidents. CISA releases eight ICS Advisories.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1667/notes</link>
      <description>It’s partial mobilization in Russia, and airline flights departing Russia are said to be sold out. Further notes on the IT Army's claimed hack of the Wagner Group. Leveraging Netflix for credential harvesting. Rockstar Games suffers a leak of new Grand Theft Auto footage. Ben Yelin has the latest on regulations targeting crypto. Our guest is Amy Williams from BlueVoyant discussing the value of feminine energy in the male dominated field of cybersecurity. CISA releases eight ICS Advisories.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/182

Selected reading.
Russia moves toward annexing Ukraine regions in a major escalation (Washington Post)
Four occupied Ukraine regions plan imminent ‘votes’ on joining Russia (the Guardian) 
Putin sets partial military call-up, won’t ‘bluff’ on nukes (AP NEWS)
Putin announces partial military mobilization for Russian citizens (Axios)
Pro-Ukraine Hacktivists Claim to Have Hacked Notorious Russian Mercenary Group (Vice) 
Fresh Phish: Netflix Bad Actors Go Behind the Scenes to Stage a Credential Harvesting Heist (INKY)
Leveraging Netflix for credential harvesting. (CyberWire)
Social Engineering: How A Teen Hacker Allegedly Managed To Breach Both Uber And Rockstar Games (Forbes)
Rockstar Games suffers leak of new Grand Theft Auto footage. (CyberWire) 
LastPass source code breach – incident response report released (Naked Security)
Notice of Recent Security Incident (The LastPass Blog)
The LastPass incident. (CyberWire)
Medtronic NGP 600 Series Insulin Pumps (CISA)
Hitachi Energy PROMOD IV (CISA) 
Hitachi Energy AFF660/665 Series (CISA) 
Dataprobe iBoot-PDU (CISA)
Host Engineering Communications Module (CISA)
AutomationDirect DirectLOGIC with Ethernet (CISA)
AutomationDirect DirectLOGIC with Serial Communication (CISA)
MiCODUS MV720 GPS tracker (Update A) (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 21 Sep 2022 20:15:00 -0000</pubDate>
      <itunes:title>A call-up of Russian reserves, and more notes on the IT Army's claimed hack of the Wagner Group. Netflix phishbait. The Rockstar Games and LastPass incidents. CISA releases eight ICS Advisories.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1667</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>It’s partial mobilization in Russia, and airline flights departing Russia are said to be sold out. Further notes on the IT Army's claimed hack of the Wagner Group. Leveraging Netflix for credential harvesting. Rockstar Games suffers a leak of new Grand Theft Auto footage. Ben Yelin has the latest on regulations targeting crypto. Our guest is Amy Williams from BlueVoyant discussing the value of feminine energy in the male dominated field of cybersecurity. CISA releases eight ICS Advisories.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/182

Selected reading.
Russia moves toward annexing Ukraine regions in a major escalation (Washington Post)
Four occupied Ukraine regions plan imminent ‘votes’ on joining Russia (the Guardian) 
Putin sets partial military call-up, won’t ‘bluff’ on nukes (AP NEWS)
Putin announces partial military mobilization for Russian citizens (Axios)
Pro-Ukraine Hacktivists Claim to Have Hacked Notorious Russian Mercenary Group (Vice) 
Fresh Phish: Netflix Bad Actors Go Behind the Scenes to Stage a Credential Harvesting Heist (INKY)
Leveraging Netflix for credential harvesting. (CyberWire)
Social Engineering: How A Teen Hacker Allegedly Managed To Breach Both Uber And Rockstar Games (Forbes)
Rockstar Games suffers leak of new Grand Theft Auto footage. (CyberWire) 
LastPass source code breach – incident response report released (Naked Security)
Notice of Recent Security Incident (The LastPass Blog)
The LastPass incident. (CyberWire)
Medtronic NGP 600 Series Insulin Pumps (CISA)
Hitachi Energy PROMOD IV (CISA) 
Hitachi Energy AFF660/665 Series (CISA) 
Dataprobe iBoot-PDU (CISA)
Host Engineering Communications Module (CISA)
AutomationDirect DirectLOGIC with Ethernet (CISA)
AutomationDirect DirectLOGIC with Serial Communication (CISA)
MiCODUS MV720 GPS tracker (Update A) (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>It’s partial mobilization in Russia, and airline flights departing Russia are said to be sold out. Further notes on the IT Army's claimed hack of the Wagner Group. Leveraging Netflix for credential harvesting. Rockstar Games suffers a leak of new Grand Theft Auto footage. Ben Yelin has the latest on regulations targeting crypto. Our guest is Amy Williams from BlueVoyant discussing the value of feminine energy in the male dominated field of cybersecurity. CISA releases eight ICS Advisories.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/182</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.washingtonpost.com/world/2022/09/20/russia-referendum-annexation-luhansk-donetsk-kherson-ukraine/">Russia moves toward annexing Ukraine regions in a major escalation</a> (Washington Post)</p><p><a href="https://www.theguardian.com/world/2022/sep/20/four-occupied-ukraine-regions-plan-votes-on-joining-russian-federation">Four occupied Ukraine regions plan imminent ‘votes’ on joining Russia</a> (the Guardian) </p><p><a href="https://apnews.com/article/russia-ukraine-putin-donetsk-f64f9c91f24fc81bc8cc65e8bc7748f4">Putin sets partial military call-up, won’t ‘bluff’ on nukes</a> (AP NEWS)</p><p><a href="https://www.axios.com/2022/09/21/putin-announces-partial-military-mobilization-for-russian-citizens">Putin announces partial military mobilization for Russian citizens</a> (Axios)</p><p><a href="https://www.vice.com/en/article/4ax459/pro-ukraine-hacktivists-claim-to-have-hacked-notorious-russian-mercenary-group">Pro-Ukraine Hacktivists Claim to Have Hacked Notorious Russian Mercenary Group</a> (Vice) </p><p><a href="https://www.inky.com/en/blog/fresh-phish-netflix-bad-actors-go-behind-the-scenes-to-stage-a-credential-harvesting-heist">Fresh Phish: Netflix Bad Actors Go Behind the Scenes to Stage a Credential Harvesting Heist</a> (INKY)</p><p><a href="https://thecyberwire.com/stories/1e2023d0c74d47d3909e326625f72138/leveraging-netflix-for-credential-harvesting">Leveraging Netflix for credential harvesting.</a> (CyberWire)</p><p><a href="https://www.forbes.com/sites/siladityaray/2022/09/20/social-engineering-how-a-teen-hacker-allegedly-managed-to-breach-both-uber-and-rockstar-games/?sh=6fc54475451c">Social Engineering: How A Teen Hacker Allegedly Managed To Breach Both Uber And Rockstar Games</a> (Forbes)</p><p><a href="https://thecyberwire.com/stories/15596c4c1c694c0cacbb461b2c23c446/rockstar-games-suffers-leak-of-new-grand-theft-auto-footage">Rockstar Games suffers leak of new Grand Theft Auto footage.</a> (CyberWire) </p><p><a href="https://nakedsecurity.sophos.com/2022/09/19/lastpass-source-code-breach-incident-response-report-released/">LastPass source code breach – incident response report released</a> (Naked Security)</p><p><a href="https://blog.lastpass.com/2022/08/notice-of-recent-security-incident/">Notice of Recent Security Incident</a> (The LastPass Blog)</p><p><a href="https://thecyberwire.com/stories/bace0dc3c3bf412f9eb04f9bbfe367d5/the-lastpass-incident">The LastPass incident.</a> (CyberWire)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsma-22-263-01">Medtronic NGP 600 Series Insulin Pumps</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-263-01">Hitachi Energy PROMOD IV</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-263-02">Hitachi Energy AFF660/665 Series</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-263-03">Dataprobe iBoot-PDU</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-263-04">Host Engineering Communications Module</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-167-03">AutomationDirect DirectLOGIC with Ethernet</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-167-02">AutomationDirect DirectLOGIC with Serial Communication</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-200-01">MiCODUS MV720 GPS tracker (Update A)</a> (CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1658</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3b6682c8-787a-11ec-abf0-77f3ef1a5045]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2932766031.mp3?updated=1690317694" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An overview of Russian cyber operations. The IT Army of Ukraine says it’s doxed the Wagner Group. Lapsus$ blamed for Uber hack. A look at the risk of stolen single sign-on credentials.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1666/notes</link>
      <description>An overview of Russian cyber operations. The IT Army of Ukraine claims to have doxed the Wagner Group. Who dunnit? Lapsus$ dunnit. Emily Mossburg from Deloitte and Shelley Zalis of the Female Quotient on why gender equality is essential to the success of the cyber industry. We’ve got a special preview of the International Spy Museum's SpyCast's latest episode with host Andrew Hammond interviewing Robert Gates on the 75th anniversary of the CIA. And a look at the risk of stolen single sign-on credentials.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/181

Selected reading.
Ukraine's IT Army hacks Russia's Wagner Group (Computing)
Untangling the Russian web: Spies, proxies, and spectrums of Russian cyber behavior  (Atlantic Council)
Security update | Uber Newsroom (Uber Newsroom)
Tentative attribution in the Uber breach. (CyberWire)
Uber says Lapsus$-linked hacker responsible for breach (Reuters)
Uber blames security breach on Lapsus$, says it bought credentials on the dark web (ZDNET)
Uber's breach shows how hackers keep finding a way in (Protocol)
Uber attributes hack to Lapsus$, working with FBI and DOJ on investigation (The Record by Recorded Future)
Uber data breach spotlights need for enterprises to ‘get the basics right’, say experts (ITP.net)
"Keys to the Kingdom" at Risk: Analyzing Exposed SSO Credentials of Public Companies (Bitsight)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Sep 2022 21:15:00 -0000</pubDate>
      <itunes:title>An overview of Russian cyber operations. The IT Army of Ukraine says it’s doxed the Wagner Group. Lapsus$ blamed for Uber hack. A look at the risk of stolen single sign-on credentials.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1666</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An overview of Russian cyber operations. The IT Army of Ukraine claims to have doxed the Wagner Group. Who dunnit? Lapsus$ dunnit. Emily Mossburg from Deloitte and Shelley Zalis of the Female Quotient on why gender equality is essential to the success of the cyber industry. We’ve got a special preview of the International Spy Museum's SpyCast's latest episode with host Andrew Hammond interviewing Robert Gates on the 75th anniversary of the CIA. And a look at the risk of stolen single sign-on credentials.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/181

Selected reading.
Ukraine's IT Army hacks Russia's Wagner Group (Computing)
Untangling the Russian web: Spies, proxies, and spectrums of Russian cyber behavior  (Atlantic Council)
Security update | Uber Newsroom (Uber Newsroom)
Tentative attribution in the Uber breach. (CyberWire)
Uber says Lapsus$-linked hacker responsible for breach (Reuters)
Uber blames security breach on Lapsus$, says it bought credentials on the dark web (ZDNET)
Uber's breach shows how hackers keep finding a way in (Protocol)
Uber attributes hack to Lapsus$, working with FBI and DOJ on investigation (The Record by Recorded Future)
Uber data breach spotlights need for enterprises to ‘get the basics right’, say experts (ITP.net)
"Keys to the Kingdom" at Risk: Analyzing Exposed SSO Credentials of Public Companies (Bitsight)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An overview of Russian cyber operations. The IT Army of Ukraine claims to have doxed the Wagner Group. Who dunnit? Lapsus$ dunnit. Emily Mossburg from Deloitte and Shelley Zalis of the Female Quotient on why gender equality is essential to the success of the cyber industry. We’ve got a special preview of the International Spy Museum's SpyCast's latest episode with host Andrew Hammond interviewing Robert Gates on the 75th anniversary of the CIA. And a look at the risk of stolen single sign-on credentials.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/181</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.computing.co.uk/news/4056552/ukraines-army-hacks-russias-wagner-group">Ukraine's IT Army hacks Russia's Wagner Group </a>(Computing)</p><p><a href="https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/untangling-the-russian-web/">Untangling the Russian web: Spies, proxies, and spectrums of Russian cyber behavior </a> (Atlantic Council)</p><p><a href="https://www.uber.com/newsroom/security-update">Security update | Uber Newsroom</a> (Uber Newsroom)</p><p><a href="https://thecyberwire.com/stories/fc212676e8e34ca18d77680a7c46b043/tentative-attribution-in-the-uber-breach">Tentative attribution in the Uber breach.</a> (CyberWire)</p><p><a href="https://www.reuters.com/business/autos-transportation/uber-says-hacker-working-with-lapsus-responsible-cybersecurity-incident-2022-09-19/">Uber says Lapsus$-linked hacker responsible for breach</a> (Reuters)</p><p><a href="https://www.zdnet.com/article/uber-blames-security-breach-on-lapsus-says-they-bought-credentials-on-the-dark-web/">Uber blames security breach on Lapsus$, says it bought credentials on the dark web</a> (ZDNET)</p><p><a href="https://www.protocol.com/bulletins/uber-breach-hacker-twilio-mfa">Uber's breach shows how hackers keep finding a way in</a> (Protocol)</p><p><a href="https://therecord.media/uber-attributes-hack-to-lapsus-working-with-fbi-and-doj-on-investigation/">Uber attributes hack to Lapsus$, working with FBI and DOJ on investigation</a> (The Record by Recorded Future)</p><p><a href="https://www.itp.net/security/uber-data-breach-prompts-cybersecurity-experts-to-urge-enterprises-to-get-the-basics-right">Uber data breach spotlights need for enterprises to ‘get the basics right’, say experts</a> (ITP.net)</p><p><a href="https://www.bitsight.com/blog/analyzing-exposed-sso-credentials-of-public-companies">"Keys to the Kingdom" at Risk: Analyzing Exposed SSO Credentials of Public Companies</a> (Bitsight)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1621</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3bc6b346-787a-11ec-abf0-4f108c2280f7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5350468266.mp3?updated=1690317645" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An update on the Uber breach. Emotet and other malware delivery systems. Belarusian Cyber Partisans work against the regime in Minsk. And risky piracy sites.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1665/notes</link>
      <description>An update on the Uber breach. Emotet and other malware delivery systems. Belarusian Cyber Partisans work against the regime in Minsk. Grayson Milbourne of OpenText Security Solutions on the arms race for vulnerabilities. Rick Howard continues his exploration of cyber risk. And risky piracy sites–that’s on the Internet, kids, not the high seas.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/180

Selected reading.
Developments in the case of the Uber breach. (CyberWire)
Preliminary lessons from the Uber breach. (CyberWire)
Uber says “no evidence” user accounts were compromised in hack (The Verge)
Uber Claims No Sensitive Data Exposed in Latest Breach… But There's More to This (The Hacker News)
Uber apparently hacked by teen, employees thought it was a joke (The Verge)
Uber hacker claims to have full control of company's cloud-based servers (9to5Mac)
The Uber Hack’s Devastation Is Just Starting to Reveal Itself (WIRED) 
Uber was breached to its core, purportedly by an 18-year-old. Here’s what’s known (Ars Technica)
Uber hacked by teen who annoyed employee into logging them in - report (Jerusalem Post)
18-year-old allegedly hacks Uber and sends employees messages on Slack (Interesting Engineering)
Uber Investigating Massive Security Breach by Alleged Teen Hacker (Gizmodo)
Uber cyber attack: protecting against social engineering (Information Age)
Threat actor breaches many of Uber’s critical systems (Cybersecurity Dive)
Uber hacker claims to have full control of company's cloud-based servers (9to5Mac)
Uber confirms hack in the the latest access and identity nightmare for corporate America (SC Media)
Uber hacked, attacker tears through the company's systems (Help Net Security)
Uber confirms it is investigating cybersecurity incident (The Record by Recorded Future)
UBER HAS BEEN HACKED, boasts hacker – how to stop it happening to you (Naked Security)
Emotet and other malware delivery systems. (CyberWire)
Emotet botnet now pushes Quantum and BlackCat ransomware (BleepingComputer)
AdvIntel's State of Emotet aka "SpmTools" Displays Over Million Compromised Machines Through 2022 (AdvIntel)
August’s Top Malware: Emotet Knocked off Top Spot by FormBook while GuLoader and Joker Disrupt the Index (Check Point Software)
How Belarusian hacktivists are using digital tools to fight back (The Record by Recorded Future)
Malvertising on piracy sites. (CyberWire)
Unholy Triangle (Digital Citizens' Alliance)
Piracy Advertising Researchers Fall Victim to Ransomware Attacks (TorrentFreak)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 19 Sep 2022 20:15:00 -0000</pubDate>
      <itunes:title>An update on the Uber breach. Emotet and other malware delivery systems. Belarusian Cyber Partisans work against the regime in Minsk. And risky piracy sites.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1665</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An update on the Uber breach. Emotet and other malware delivery systems. Belarusian Cyber Partisans work against the regime in Minsk. Grayson Milbourne of OpenText Security Solutions on the arms race for vulnerabilities. Rick Howard continues his exploration of cyber risk. And risky piracy sites–that’s on the Internet, kids, not the high seas.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/180

Selected reading.
Developments in the case of the Uber breach. (CyberWire)
Preliminary lessons from the Uber breach. (CyberWire)
Uber says “no evidence” user accounts were compromised in hack (The Verge)
Uber Claims No Sensitive Data Exposed in Latest Breach… But There's More to This (The Hacker News)
Uber apparently hacked by teen, employees thought it was a joke (The Verge)
Uber hacker claims to have full control of company's cloud-based servers (9to5Mac)
The Uber Hack’s Devastation Is Just Starting to Reveal Itself (WIRED) 
Uber was breached to its core, purportedly by an 18-year-old. Here’s what’s known (Ars Technica)
Uber hacked by teen who annoyed employee into logging them in - report (Jerusalem Post)
18-year-old allegedly hacks Uber and sends employees messages on Slack (Interesting Engineering)
Uber Investigating Massive Security Breach by Alleged Teen Hacker (Gizmodo)
Uber cyber attack: protecting against social engineering (Information Age)
Threat actor breaches many of Uber’s critical systems (Cybersecurity Dive)
Uber hacker claims to have full control of company's cloud-based servers (9to5Mac)
Uber confirms hack in the the latest access and identity nightmare for corporate America (SC Media)
Uber hacked, attacker tears through the company's systems (Help Net Security)
Uber confirms it is investigating cybersecurity incident (The Record by Recorded Future)
UBER HAS BEEN HACKED, boasts hacker – how to stop it happening to you (Naked Security)
Emotet and other malware delivery systems. (CyberWire)
Emotet botnet now pushes Quantum and BlackCat ransomware (BleepingComputer)
AdvIntel's State of Emotet aka "SpmTools" Displays Over Million Compromised Machines Through 2022 (AdvIntel)
August’s Top Malware: Emotet Knocked off Top Spot by FormBook while GuLoader and Joker Disrupt the Index (Check Point Software)
How Belarusian hacktivists are using digital tools to fight back (The Record by Recorded Future)
Malvertising on piracy sites. (CyberWire)
Unholy Triangle (Digital Citizens' Alliance)
Piracy Advertising Researchers Fall Victim to Ransomware Attacks (TorrentFreak)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An update on the Uber breach. Emotet and other malware delivery systems. Belarusian Cyber Partisans work against the regime in Minsk. Grayson Milbourne of OpenText Security Solutions on the arms race for vulnerabilities. Rick Howard continues his exploration of cyber risk. And risky piracy sites–that’s on the Internet, kids, not the high seas.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/180</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/stories/ac8a9e6a20584c7bb8cfc7434d6d001e/developments-in-the-case-of-the-uber-breach">Developments in the case of the Uber breach.</a> (CyberWire)</p><p><a href="https://thecyberwire.com/stories/ff7ea32e10874b3dafd49209d1af26a8/preliminary-lessons-from-the-uber-breach">Preliminary lessons from the Uber breach</a>. (CyberWire)</p><p><a href="https://www.theverge.com/2022/9/16/23356880/uber-hack-no-evidence-personal-information-breach?scrolla=5eb6d68b7fedc32c19ef33b4">Uber says “no evidence” user accounts were compromised in hack</a> (The Verge)</p><p><a href="https://thehackernews.com/2022/09/uber-claims-no-sensitive-data-exposed.html">Uber Claims No Sensitive Data Exposed in Latest Breach… But There's More to This</a> (The Hacker News)</p><p><a href="https://www.theverge.com/2022/9/16/23356213/uber-hack-teen-slack-google-cloud-credentials-powershell">Uber apparently hacked by teen, employees thought it was a joke</a> (The Verge)</p><p><a href="https://9to5mac.com/2022/09/16/uber-hacker/">Uber hacker claims to have full control of company's cloud-based servers</a> (9to5Mac)</p><p><a href="https://www.wired.com/story/uber-hack-mfa-phishing/">The Uber Hack’s Devastation Is Just Starting to Reveal Itself</a> (WIRED) </p><p><a href="https://arstechnica.com/information-technology/2022/09/uber-was-hacked-to-its-core-purportedly-by-an-18-year-old-here-are-the-basics/">Uber was breached to its core, purportedly by an 18-year-old. Here’s what’s known</a> (Ars Technica)</p><p><a href="https://www.jpost.com/business-and-innovation/all-news/article-717421">Uber hacked by teen who annoyed employee into logging them in - report</a> (Jerusalem Post)</p><p><a href="https://interestingengineering.com/culture/18-year-old-allegedly-hacks-uber">18-year-old allegedly hacks Uber and sends employees messages on Slack</a> (Interesting Engineering)</p><p><a href="https://gizmodo.com/uber-google-aws-hackerone-security-breach-teen-hacker-1849543995">Uber Investigating Massive Security Breach by Alleged Teen Hacker</a> (Gizmodo)</p><p><a href="https://www.information-age.com/uber-cyber-attack-protecting-against-social-engineering-123500013/">Uber cyber attack: protecting against social engineering</a> (Information Age)</p><p><a href="https://www.cybersecuritydive.com/news/uber-critical-systems-hacked/632053/">Threat actor breaches many of Uber’s critical systems</a> (Cybersecurity Dive)</p><p><a href="https://9to5mac.com/2022/09/16/uber-hacker/">Uber hacker claims to have full control of company's cloud-based servers</a> (9to5Mac)</p><p><a href="https://www.scmagazine.com/analysis/identity-and-access/uber-confirms-hack-in-the-the-latest-access-and-identity-nightmare-for-corporate-america">Uber confirms hack in the the latest access and identity nightmare for corporate America</a> (SC Media)</p><p><a href="https://www.helpnetsecurity.com/2022/09/16/uber-hacked-attacker-tears-through-the-companys-systems/">Uber hacked, attacker tears through the company's systems</a> (Help Net Security)</p><p><a href="https://therecord.media/uber-confirms-it-is-investigating-cybersecurity-incident/">Uber confirms it is investigating cybersecurity incident</a> (The Record by Recorded Future)</p><p><a href="https://nakedsecurity.sophos.com/2022/09/16/uber-has-been-hacked-boasts-hacker-how-to-stop-it-happening-to-you/">UBER HAS BEEN HACKED, boasts hacker – how to stop it happening to you</a> (Naked Security)</p><p><a href="https://thecyberwire.com/stories/bbbd3b89a065435aa036ec9e9b7a8f9e/emotet-and-other-malware-delivery-systems">Emotet and other malware delivery systems.</a> (CyberWire)</p><p><a href="https://www.bleepingcomputer.com/news/security/emotet-botnet-now-pushes-quantum-and-blackcat-ransomware/">Emotet botnet now pushes Quantum and BlackCat ransomware</a> (BleepingComputer)</p><p><a href="https://www.advintel.io/post/advintel-s-state-of-emotet-aka-spmtools-displays-over-million-compromised-machines-through-2022">AdvIntel's State of Emotet aka "SpmTools" Displays Over Million Compromised Machines Through 2022</a> (AdvIntel)</p><p><a href="https://blog.checkpoint.com/2022/09/14/augusts-top-malware-emotet-knocked-off-top-spot-by-formbook-while-guloader-and-joker-disrupt-the-index/">August’s Top Malware: Emotet Knocked off Top Spot by FormBook while GuLoader and Joker Disrupt the Index</a> (Check Point Software)</p><p><a href="https://therecord.media/how-belarusian-hacktivists-are-using-digital-tools-to-fight-back/">How Belarusian hacktivists are using digital tools to fight back</a> (The Record by Recorded Future)</p><p><a href="https://thecyberwire.com/stories/7a09b21f332c4e1d83aa4222c436c776/malvertising-on-piracy-sites">Malvertising on piracy sites.</a> (CyberWire)</p><p><a href="https://www.digitalcitizensalliance.org/clientuploads/directory/Reports/Unholy-Triangle-Report.pdf">Unholy Triangle</a> (Digital Citizens' Alliance)</p><p><a href="https://torrentfreak.com/piracy-advertising-researchers-fall-victim-to-ransomware-attacks/">Piracy Advertising Researchers Fall Victim to Ransomware Attacks</a> (TorrentFreak)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1468</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3c684ca6-787a-11ec-abf0-bb6685817c40]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8028770029.mp3?updated=1690317621" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jaya Baloo: Don't be afraid to bounce ideas off your teammates. [CISO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/117/notes</link>
      <description>Jaya Baloo, a Chief Information Security Officer from Avast sits down to share her story, sharing how she got into the technology field at a younger age with being introduced to computers and games on her PS 24. She started off going to college for political science and after not knowing what to do after that, she got her first start in cybersecurity. After falling in love with cybersecurity she kept moving up the ranks in different organizations before finding herself at Avast. She shares that at Avast she leans on her team quite a bit and you should never be afraid to bounce ideas off of your teammates. She says "The best ideas come from like bouncing ideas off of each other, sharing within the group and then if I can't figure it out myself, that's why I hire these amazing individuals it's to help me figure it out." We thank Jaya for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 18 Sep 2022 07:00:00 -0000</pubDate>
      <itunes:title>Jaya Baloo: Don't be afraid to bounce ideas off your teammates. [CISO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>117</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Jaya Baloo, a Chief Information Security Officer from Avast sits down to share her story, sharing how she got into the technology field at a younger age with being introduced to computers and games on her PS 24. She started off going to college for political science and after not knowing what to do after that, she got her first start in cybersecurity. After falling in love with cybersecurity she kept moving up the ranks in different organizations before finding herself at Avast. She shares that at Avast she leans on her team quite a bit and you should never be afraid to bounce ideas off of your teammates. She says "The best ideas come from like bouncing ideas off of each other, sharing within the group and then if I can't figure it out myself, that's why I hire these amazing individuals it's to help me figure it out." We thank Jaya for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jaya Baloo, a Chief Information Security Officer from Avast sits down to share her story, sharing how she got into the technology field at a younger age with being introduced to computers and games on her PS 24. She started off going to college for political science and after not knowing what to do after that, she got her first start in cybersecurity. After falling in love with cybersecurity she kept moving up the ranks in different organizations before finding herself at Avast. She shares that at Avast she leans on her team quite a bit and you should never be afraid to bounce ideas off of your teammates. She says "The best ideas come from like bouncing ideas off of each other, sharing within the group and then if I can't figure it out myself, that's why I hire these amazing individuals it's to help me figure it out." We thank Jaya for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>529</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[07573640-3462-11ed-b39f-23ab609f13e5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4215489769.mp3?updated=1663180788" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An increase in bypassing bot management? [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/250/notes</link>
      <description>Sam Crowther, CEO of Kasada join's Dave to discuss their work on "The New Way Fraudsters Bypass Bot Management." Kasada researchers recently discovered a new type of bot called Solver Services, which is used and created by bad actors to bypass the majority of bot management systems.
The research states "Now it’s easier than ever for mainstream bot operators to scrape content, take over accounts, hoard inventory, and commit other forms of automated fraud against organizations using legacy bot management solutions." Attackers are able to by these “Solver” bots, APIs, and services for less than $500 per month to make a profit.
The research can be found here:
The Emergence of Solver Services: The New Way Fraudsters Bypass Bot Management Vendors

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Sep 2022 07:00:00 -0000</pubDate>
      <itunes:title>An increase in bypassing bot management? [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>250</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Sam Crowther, CEO of Kasada join's Dave to discuss their work on "The New Way Fraudsters Bypass Bot Management." Kasada researchers recently discovered a new type of bot called Solver Services, which is used and created by bad actors to bypass the majority of bot management systems.
The research states "Now it’s easier than ever for mainstream bot operators to scrape content, take over accounts, hoard inventory, and commit other forms of automated fraud against organizations using legacy bot management solutions." Attackers are able to by these “Solver” bots, APIs, and services for less than $500 per month to make a profit.
The research can be found here:
The Emergence of Solver Services: The New Way Fraudsters Bypass Bot Management Vendors

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sam Crowther, CEO of Kasada join's Dave to discuss their work on "The New Way Fraudsters Bypass Bot Management." Kasada researchers recently discovered a new type of bot called Solver Services, which is used and created by bad actors to bypass the majority of bot management systems.</p><p>The research states "Now it’s easier than ever for mainstream bot operators to scrape content, take over accounts, hoard inventory, and commit other forms of automated fraud against organizations using legacy bot management solutions." Attackers are able to by these “Solver” bots, APIs, and services for less than $500 per month to make a profit.</p><p>The research can be found here:</p><ul><li><a href="https://www.kasada.io/solver-services-fraudsters-bypass-bot-management/">The Emergence of Solver Services: The New Way Fraudsters Bypass Bot Management Vendors</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>894</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7e677546-3508-11ed-aa1f-5778e4f2bbd2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9956300461.mp3?updated=1685127147" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Uber sustains a major data breach. Notes on the underworld. A large DDoS attack is stopped in Eastern Europe. An FBI alert and a brace of CISA advisories. Congress deliberates cyber policy.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1664/notes</link>
      <description>Uber suffers a data breach. Social media executives testify before Congress. A Large DDoS attack is thwarted in Eastern Europe. The FBI warns of increased cyberattacks against healthcare payment processors. Policy makers consider new OT security incentives. Malek Ben Salem from Accenture on future-proof cloud security. Our guest Diana Kelley from Cybrize discusses the need for innovation and entrepreneurship in cybersecurity. And if you’ve been hoping for a LockerGoga decryptor, you’re in luck.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/179

Selected reading.
Uber hacked, internal systems breached and vulnerability reports stolen (BleepingComputer) 
Uber suffers computer system breach, alerts authorities (Washington Post)
Uber Investigating Data Breach After Hacker Claims Extensive Compromise (SecurityWeek) 
Uber Investigating Breach of Its Computer Systems (New York Times)
Uber investigating "total compromise" of its internal systems (Computing) 
There’s No Honor Among Thieves: Carding Forum Staff Defraud Users in an ESCROW Scam (Digital Shadows) 
Social media hearings highlight lack of trust, transparency in sector (The Record by Recorded Future) 
Breaking the Boycott (Cybersixgill)
Record-Breaking DDoS Attack in Europe (Akamai)
Cyber Criminals Targeting Healthcare Payment Processors, Costing Victims Millions in Losses (FBI)
Siemens Mobility CoreShield OWG Software (CISA)
Siemens Simcenter Femap and Parasolid (CISA)
Siemens RUGGEDCOM ROS (CISA) 
Siemens Mendix SAML Module (CISA)
Siemens SINEC INS (CISA)
Siemens RUGGEDCOM ROS (Update A) (CISA)
Simcenter Femap and Parasolid (CISA) 
Siemens Industrial Products Intel CPUs (Update A) (CISA)
Siemens OpenSSL Affected Industrial Products (CISA) 
Siemens OpenSSL Vulnerability in Industrial Products (Update E) (CISA)
Siemens SCALANCE (CISA) 
CISA Adds Six Known Exploited Vulnerabilities to Catalog (CISA)
Building on our Baseline: Securing Industrial Control Systems Against Cyberattacks (House Committee on Homeland Security) 
Bitdefender Releases Universal LockerGoga Decryptor in Cooperation with Law Enforcement (Bitdefender Labs)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 16 Sep 2022 20:15:00 -0000</pubDate>
      <itunes:title>Uber sustains a major data breach. Notes on the underworld. A large DDoS attack is stopped in Eastern Europe. An FBI alert and a brace of CISA advisories. Congress deliberates cyber policy.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1664</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Uber suffers a data breach. Social media executives testify before Congress. A Large DDoS attack is thwarted in Eastern Europe. The FBI warns of increased cyberattacks against healthcare payment processors. Policy makers consider new OT security incentives. Malek Ben Salem from Accenture on future-proof cloud security. Our guest Diana Kelley from Cybrize discusses the need for innovation and entrepreneurship in cybersecurity. And if you’ve been hoping for a LockerGoga decryptor, you’re in luck.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/179

Selected reading.
Uber hacked, internal systems breached and vulnerability reports stolen (BleepingComputer) 
Uber suffers computer system breach, alerts authorities (Washington Post)
Uber Investigating Data Breach After Hacker Claims Extensive Compromise (SecurityWeek) 
Uber Investigating Breach of Its Computer Systems (New York Times)
Uber investigating "total compromise" of its internal systems (Computing) 
There’s No Honor Among Thieves: Carding Forum Staff Defraud Users in an ESCROW Scam (Digital Shadows) 
Social media hearings highlight lack of trust, transparency in sector (The Record by Recorded Future) 
Breaking the Boycott (Cybersixgill)
Record-Breaking DDoS Attack in Europe (Akamai)
Cyber Criminals Targeting Healthcare Payment Processors, Costing Victims Millions in Losses (FBI)
Siemens Mobility CoreShield OWG Software (CISA)
Siemens Simcenter Femap and Parasolid (CISA)
Siemens RUGGEDCOM ROS (CISA) 
Siemens Mendix SAML Module (CISA)
Siemens SINEC INS (CISA)
Siemens RUGGEDCOM ROS (Update A) (CISA)
Simcenter Femap and Parasolid (CISA) 
Siemens Industrial Products Intel CPUs (Update A) (CISA)
Siemens OpenSSL Affected Industrial Products (CISA) 
Siemens OpenSSL Vulnerability in Industrial Products (Update E) (CISA)
Siemens SCALANCE (CISA) 
CISA Adds Six Known Exploited Vulnerabilities to Catalog (CISA)
Building on our Baseline: Securing Industrial Control Systems Against Cyberattacks (House Committee on Homeland Security) 
Bitdefender Releases Universal LockerGoga Decryptor in Cooperation with Law Enforcement (Bitdefender Labs)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Uber suffers a data breach. Social media executives testify before Congress. A Large DDoS attack is thwarted in Eastern Europe. The FBI warns of increased cyberattacks against healthcare payment processors. Policy makers consider new OT security incentives. Malek Ben Salem from Accenture on future-proof cloud security. Our guest Diana Kelley from Cybrize discusses the need for innovation and entrepreneurship in cybersecurity. And if you’ve been hoping for a LockerGoga decryptor, you’re in luck.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/179</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/security/uber-hacked-internal-systems-breached-and-vulnerability-reports-stolen/">Uber hacked, internal systems breached and vulnerability reports stolen</a> (BleepingComputer) </p><p><a href="https://www.washingtonpost.com/technology/2022/09/15/uber-hack/">Uber suffers computer system breach, alerts authorities</a> (Washington Post)</p><p><a href="https://www.securityweek.com/uber-investigating-data-breach-after-hacker-claims-extensive-compromise">Uber Investigating Data Breach After Hacker Claims Extensive Compromise</a> (SecurityWeek) </p><p><a href="https://www.nytimes.com/2022/09/15/technology/uber-hacking-breach.html">Uber Investigating Breach of Its Computer Systems</a> (New York Times)</p><p><a href="https://www.computing.co.uk/news/4056471/uber-investigating-total-compromise-internal-systems">Uber investigating "total compromise" of its internal systems </a>(Computing) </p><p><a href="https://www.digitalshadows.com/blog-and-research/theres-no-honor-among-thieves-carding-forum-staff-defraud-users-in-an-escrow-scam/">There’s No Honor Among Thieves: Carding Forum Staff Defraud Users in an ESCROW Scam</a> (Digital Shadows) </p><p><a href="https://therecord.media/social-media-hearings-highlight-lack-of-trust-transparency-in-sector/?">Social media hearings highlight lack of trust, transparency in sector</a> (The Record by Recorded Future) </p><p><a href="https://www.cybersixgill.com/blog/breaking-the-boycott/">Breaking the Boycott</a> (Cybersixgill)</p><p><a href="https://www.akamai.com/blog/security/record-breaking-ddos-attack-in-europe">Record-Breaking DDoS Attack in Europe</a> (Akamai)</p><p><a href="https://www.ic3.gov/Media/News/2022/220914-2.pdf">Cyber Criminals Targeting Healthcare Payment Processors, Costing Victims Millions in Losses</a> (FBI)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-258-01">Siemens Mobility CoreShield OWG Software</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-258-02">Siemens Simcenter Femap and Parasolid</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-258-03">Siemens RUGGEDCOM ROS</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-258-04">Siemens Mendix SAML Module</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-258-05">Siemens SINEC INS</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-19-344-03">Siemens RUGGEDCOM ROS (Update A)</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-195-09">Simcenter Femap and Parasolid</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-21-222-05">Siemens Industrial Products Intel CPUs (Update A)</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-167-14">Siemens OpenSSL Affected Industrial Products</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-18-226-02">Siemens OpenSSL Vulnerability in Industrial Products (Update E)</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-223-07">Siemens SCALANCE</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/09/15/cisa-adds-six-known-exploited-vulnerabilities-catalog">CISA Adds Six Known Exploited Vulnerabilities to Catalog</a> (CISA)</p><p><a href="https://homeland.house.gov/activities/hearings/building-on-our-baseline-securing-industrial-control-systems-against-cyberattacks">Building on our Baseline: Securing Industrial Control Systems Against Cyberattacks</a> (House Committee on Homeland Security) </p><p><a href="https://www.bitdefender.com/blog/labs/bitdefender-releases-universal-lockergoga-decryptor-in-cooperation-with-law-enforcement">Bitdefender Releases Universal LockerGoga Decryptor in Cooperation with Law Enforcement</a> (Bitdefender Labs)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1750</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3a46c0c4-787a-11ec-abf0-0f64ea49af53]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2026712691.mp3?updated=1690317589" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA22-257A – Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations. [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/30/notes</link>
      <description>This joint Cybersecurity Advisory highlights continued malicious cyber activity by advanced persistent threat actors affiliated with the Iranian Government’s Islamic Revolutionary Guard Corps. The IRGC-affiliated actors are actively targeting a broad range of entities, including entities across multiple U.S. critical infrastructure sectors as well as Australian, Canadian, and United Kingdom organizations. 
AA22-257A Alert, Technical Details, and Mitigations
AA22-257A.stix
CISA’s Iran Cyber Threat Overview and Advisories
FBI’s Iran Threat webpage.
Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activities
Technical Approaches to Uncovering and Remediating Malicious Activity
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 15 Sep 2022 21:06:00 -0000</pubDate>
      <itunes:title>CISA Alert AA22-257A – Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations. [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>30</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This joint Cybersecurity Advisory highlights continued malicious cyber activity by advanced persistent threat actors affiliated with the Iranian Government’s Islamic Revolutionary Guard Corps. The IRGC-affiliated actors are actively targeting a broad range of entities, including entities across multiple U.S. critical infrastructure sectors as well as Australian, Canadian, and United Kingdom organizations. 
AA22-257A Alert, Technical Details, and Mitigations
AA22-257A.stix
CISA’s Iran Cyber Threat Overview and Advisories
FBI’s Iran Threat webpage.
Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activities
Technical Approaches to Uncovering and Remediating Malicious Activity
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This joint Cybersecurity Advisory highlights continued malicious cyber activity by advanced persistent threat actors affiliated with the Iranian Government’s Islamic Revolutionary Guard Corps. The IRGC-affiliated actors are actively targeting a broad range of entities, including entities across multiple U.S. critical infrastructure sectors as well as Australian, Canadian, and United Kingdom organizations. </p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-257a">AA22-257A Alert, Technical Details, and Mitigations</a></p><p><a href="https://www.us-cert.gov/sites/default/files/AA22-257A.stix.xml">AA22-257A.stix</a></p><p>CISA’s <a href="https://www.us-cert.cisa.gov/iran">Iran Cyber Threat Overview and Advisories</a></p><p>FBI’s <a href="https://www.fbi.gov/investigate/counterintelligence/the-iran-threat">Iran Threat</a> webpage.</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa21-321a">Iranian Government-Sponsored APT Cyber Actors Exploiting Microsoft Exchange and Fortinet Vulnerabilities in Furtherance of Malicious Activities</a></p><p><a href="https://us-cert.cisa.gov/sites/default/files/publications/AA20-245A-Joint_CSA-Technical_Approaches_to_Uncovering_Malicious_Activity_508.pdf">Technical Approaches to Uncovering and Remediating Malicious Activity</a></p><p>All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at <a href="mailto:central@cisa.dhs.gov">central@cisa.dhs.gov</a> or (888) 282-0870 and to the FBI via your <a href="https://www.fbi.gov/contact-us/field-offices">local FBI field office</a> or the FBI’s 24/7 CyWatch at (855) 292-3937 or <a href="mailto:CyWatch@fbi.gov">CyWatch@fbi.gov</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>151</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[36765d6a-353a-11ed-b371-03904db54d0d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4859039573.mp3?updated=1663276638" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Notes from the hybrid war: nuisance-level DDoS, cyberespionage, and the possibility of financially motivated hacking. US policy on the software supply chain, and notes from the underworld.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1663/notes</link>
      <description>Nuisance-level DDoS and cyberespionage continue to mark Russia's cyber campaign in the hybrid war. There’s a US Presidential memorandum on software supply chain security. Webworm repurposes older RATs. Trends in cyber insurance claims. OriginLogger may be the new Agent Tesla. The SparklingGoblin APT described. Mathieu Gorge of VigiTrust describes cyber vulnerabilities in the hospitality industry. Dinah Davis from Arctic Wolf explains a PayPal phishing attack. And Royal funeral phishbait.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/178

Selected reading.
Pro-Russia hackers claim to have temporarily brought down Japanese govt websites (Asia News Network)
Gamaredon APT targets Ukrainian government agencies in new campaign (Cisco Talos)
Russia-linked Gamaredon APT target Ukraine with a new info-stealer (Security Affairs)
Fears grow of Russian spies turning to industrial espionage (The Record by Recorded Future)
Enhancing the Security of the Software Supply Chain through Secure Software Development Practices (The White House)
Enhancing the Security of the Software Supply Chain to Deliver a Secure Government Experience (The White House)
White House releases post-SolarWinds federal software security requirements (Federal News Network)
Webworm: Espionage Attackers Testing and Using Older Modified RATs (Threat Hunter Team Symantec)
Coalition Releases 2022 Cyber Claims Report: Mid-year Update (GlobeNewswire News Room)
OriginLogger: A Look at Agent Tesla’s Successor (Unit 42) 
You never walk alone: The SideWalk backdoor gets a Linux variant (WeLiveSecurity)
[Scam site harvests credentials] (Proofpoint)
Current, former social media execs address national security issues at Senate hearing (Fox Business)
Senators Have Stopped Embarrassing Themselves at Tech Hearings (Slate Magazine)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 15 Sep 2022 20:15:00 -0000</pubDate>
      <itunes:title>Notes from the hybrid war: nuisance-level DDoS, cyberespionage, and the possibility of financially motivated hacking. US policy on the software supply chain, and notes from the underworld.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1663</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Nuisance-level DDoS and cyberespionage continue to mark Russia's cyber campaign in the hybrid war. There’s a US Presidential memorandum on software supply chain security. Webworm repurposes older RATs. Trends in cyber insurance claims. OriginLogger may be the new Agent Tesla. The SparklingGoblin APT described. Mathieu Gorge of VigiTrust describes cyber vulnerabilities in the hospitality industry. Dinah Davis from Arctic Wolf explains a PayPal phishing attack. And Royal funeral phishbait.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/178

Selected reading.
Pro-Russia hackers claim to have temporarily brought down Japanese govt websites (Asia News Network)
Gamaredon APT targets Ukrainian government agencies in new campaign (Cisco Talos)
Russia-linked Gamaredon APT target Ukraine with a new info-stealer (Security Affairs)
Fears grow of Russian spies turning to industrial espionage (The Record by Recorded Future)
Enhancing the Security of the Software Supply Chain through Secure Software Development Practices (The White House)
Enhancing the Security of the Software Supply Chain to Deliver a Secure Government Experience (The White House)
White House releases post-SolarWinds federal software security requirements (Federal News Network)
Webworm: Espionage Attackers Testing and Using Older Modified RATs (Threat Hunter Team Symantec)
Coalition Releases 2022 Cyber Claims Report: Mid-year Update (GlobeNewswire News Room)
OriginLogger: A Look at Agent Tesla’s Successor (Unit 42) 
You never walk alone: The SideWalk backdoor gets a Linux variant (WeLiveSecurity)
[Scam site harvests credentials] (Proofpoint)
Current, former social media execs address national security issues at Senate hearing (Fox Business)
Senators Have Stopped Embarrassing Themselves at Tech Hearings (Slate Magazine)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Nuisance-level DDoS and cyberespionage continue to mark Russia's cyber campaign in the hybrid war. There’s a US Presidential memorandum on software supply chain security. Webworm repurposes older RATs. Trends in cyber insurance claims. OriginLogger may be the new Agent Tesla. The SparklingGoblin APT described. Mathieu Gorge of VigiTrust describes cyber vulnerabilities in the hospitality industry. Dinah Davis from Arctic Wolf explains a PayPal phishing attack. And Royal funeral phishbait.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/178</p><p><br></p><h2>Selected reading.</h2><p><a href="https://asianews.network/pro-russia-hackers-claim-to-have-temporarily-brought-down-japanese-govt-websites/">Pro-Russia hackers claim to have temporarily brought down Japanese govt websites</a> (Asia News Network)</p><p><a href="https://blog.talosintelligence.com/2022/09/gamaredon-apt-targets-ukrainian-agencies.html">Gamaredon APT targets Ukrainian government agencies in new campaign</a> (Cisco Talos)</p><p><a href="https://securityaffairs.co/wordpress/135780/apt/gamaredon-new-stealing-malware.html">Russia-linked Gamaredon APT target Ukraine with a new info-stealer</a> (Security Affairs)</p><p><a href="https://therecord.media/fears-grow-of-russian-spies-turning-to-industrial-espionage/">Fears grow of Russian spies turning to industrial espionage</a> (The Record by Recorded Future)</p><p><a href="https://www.whitehouse.gov/wp-content/uploads/2022/09/M-22-18.pdf">Enhancing the Security of the Software Supply Chain through Secure Software Development Practices</a> (The White House)</p><p><a href="https://www.whitehouse.gov/omb/briefing-room/2022/09/14/enhancing-the-security-of-the-software-supply-chain-to-deliver-a-secure-government-experience/">Enhancing the Security of the Software Supply Chain to Deliver a Secure Government Experience</a> (The White House)</p><p><a href="https://federalnewsnetwork.com/cybersecurity/2022/09/white-house-releases-post-solarwinds-federal-software-security-requirements/">White House releases post-SolarWinds federal software security requirements</a> (Federal News Network)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/webworm-espionage-rats">Webworm: Espionage Attackers Testing and Using Older Modified RATs</a> (Threat Hunter Team Symantec)</p><p><a href="https://www.globenewswire.com/news-release/2022/09/14/2515738/0/en/Coalition-Releases-2022-Cyber-Claims-Report-Mid-year-Update.html">Coalition Releases 2022 Cyber Claims Report: Mid-year Update</a> (GlobeNewswire News Room)</p><p><a href="https://unit42.paloaltonetworks.com/originlogger/">OriginLogger: A Look at Agent Tesla’s Successor</a> (Unit 42) </p><p><a href="https://www.welivesecurity.com/2022/09/14/you-never-walk-alone-sidewalk-backdoor-linux-variant/">You never walk alone: The SideWalk backdoor gets a Linux variant</a> (WeLiveSecurity)</p><p><a href="https://twitter.com/threatinsight/status/1570092339984584705">[Scam site harvests credentials]</a> (Proofpoint)</p><p><a href="https://www.foxbusiness.com/politics/current-former-social-media-execs-address-national-security-issues-senate-hearing">Current, former social media execs address national security issues at Senate hearing</a> (Fox Business)</p><p><a href="https://slate.com/technology/2022/09/meta-tiktok-youtube-senate-hearing-ron-johnson-josh-hawley-gary-peters.html">Senators Have Stopped Embarrassing Themselves at Tech Hearings</a> (Slate Magazine)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1805</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3ae4a244-787a-11ec-abf0-3b78b512efe5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9762304991.mp3?updated=1690317561" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patch Tuesday notes. Mr. Mudge goes to Washington. Joint warning of IRGC cyber activity. No major developments in the cyber phases of Russia’s hybrid war (but Ukraine is sounding confident).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1662/notes</link>
      <description>Patch Tuesday notes. The US Senate Judiciary Committee hears from the Twitter whistleblower. Joint warning of IRGC cyber activity. Rob Boyce from Accenture on cybercriminals weaponizing leaked ransomware data. Chris Novak from Verizon describes his participation in the CISA Advisory Board. And Ukraine reiterates confidence in its resiliency.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/177

Selected reading.
Adobe Patches 63 Security Flaws in Patch Tuesday Bundle (SecurityWeek)
Microsoft Releases September 2022 Security Updates (CISA)
Microsoft's September Patch Tuesday fixes five critical bugs (Computing)
Microsoft Raises Alert for Under-Attack Windows Flaw (SecurityWeek)
SAP Security Patch Day September 2022 (Onapsis) 
Apple Releases Security Updates for Multiple Products (CISA)
Apple fixes eighth zero-day used to hack iPhones and Macs this year (BleepingComputer) 
Apple Will Let You Remove Rapid Security Response Updates in iOS 16 (Mac Rumors)
Data Security at Risk: Testimony from a Twitter Whistleblower (United States Senate Committee on the Judiciary)
Twitter Employees Have Too Much Access to Data, Whistleblower Says (Wall Street Journal) 
Twitter whistleblower reveals employees concerned China agent could collect user data (Reuters)
Security failures cause ‘real harm to real people’ (Washington Post)
Twitter whistleblower testifies to Congress, calls for tech regulation reforms (The Record by Recorded Future)
The Search for Dirt on the Twitter Whistle-Blower (The New Yorker)
Whistle-Blower Says Twitter ‘Chose to Mislead’ on Security Flaws (New York Times) 
Twitter whistleblower says site put growth over security (Computing) 
Written Statement of Peiter (“Mudge”) Zatko United States Senate Judiciary Committee September 13, 2022 (Katz Banks Kumin) 
What we learned when Twitter whistleblower Mudge testified to Congress (TechCrunch) 
How China became big business for Twitter (Reuters)
Twitter whistleblower exposes limits of FTC’s power (Washington Post)
Twitter Whistle-Blower Testimony Spurs Calls for Tech Regulator (Bloomberg)
Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations (CISA)
Ukraine’s Cyberwar Chief Sounds Like He’s Winning (WIRED) 
DDoS attacks on financial sector surge during war in Ukraine, new FCA data reveals (PR Newswire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 14 Sep 2022 20:15:00 -0000</pubDate>
      <itunes:title>Patch Tuesday notes. Mr. Mudge goes to Washington. Joint warning of IRGC cyber activity. No major developments in the cyber phases of Russia’s hybrid war (but Ukraine is sounding confident).</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1662</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Patch Tuesday notes. The US Senate Judiciary Committee hears from the Twitter whistleblower. Joint warning of IRGC cyber activity. Rob Boyce from Accenture on cybercriminals weaponizing leaked ransomware data. Chris Novak from Verizon describes his participation in the CISA Advisory Board. And Ukraine reiterates confidence in its resiliency.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/177

Selected reading.
Adobe Patches 63 Security Flaws in Patch Tuesday Bundle (SecurityWeek)
Microsoft Releases September 2022 Security Updates (CISA)
Microsoft's September Patch Tuesday fixes five critical bugs (Computing)
Microsoft Raises Alert for Under-Attack Windows Flaw (SecurityWeek)
SAP Security Patch Day September 2022 (Onapsis) 
Apple Releases Security Updates for Multiple Products (CISA)
Apple fixes eighth zero-day used to hack iPhones and Macs this year (BleepingComputer) 
Apple Will Let You Remove Rapid Security Response Updates in iOS 16 (Mac Rumors)
Data Security at Risk: Testimony from a Twitter Whistleblower (United States Senate Committee on the Judiciary)
Twitter Employees Have Too Much Access to Data, Whistleblower Says (Wall Street Journal) 
Twitter whistleblower reveals employees concerned China agent could collect user data (Reuters)
Security failures cause ‘real harm to real people’ (Washington Post)
Twitter whistleblower testifies to Congress, calls for tech regulation reforms (The Record by Recorded Future)
The Search for Dirt on the Twitter Whistle-Blower (The New Yorker)
Whistle-Blower Says Twitter ‘Chose to Mislead’ on Security Flaws (New York Times) 
Twitter whistleblower says site put growth over security (Computing) 
Written Statement of Peiter (“Mudge”) Zatko United States Senate Judiciary Committee September 13, 2022 (Katz Banks Kumin) 
What we learned when Twitter whistleblower Mudge testified to Congress (TechCrunch) 
How China became big business for Twitter (Reuters)
Twitter whistleblower exposes limits of FTC’s power (Washington Post)
Twitter Whistle-Blower Testimony Spurs Calls for Tech Regulator (Bloomberg)
Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations (CISA)
Ukraine’s Cyberwar Chief Sounds Like He’s Winning (WIRED) 
DDoS attacks on financial sector surge during war in Ukraine, new FCA data reveals (PR Newswire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Patch Tuesday notes. The US Senate Judiciary Committee hears from the Twitter whistleblower. Joint warning of IRGC cyber activity. Rob Boyce from Accenture on cybercriminals weaponizing leaked ransomware data. Chris Novak from Verizon describes his participation in the CISA Advisory Board. And Ukraine reiterates confidence in its resiliency.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/177</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.securityweek.com/adobe-patches-63-security-flaws-patch-tuesday-bundle">Adobe Patches 63 Security Flaws in Patch Tuesday Bundle</a> (SecurityWeek)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/09/13/microsoft-releases-september-2022-security-updates">Microsoft Releases September 2022 Security Updates</a> (CISA)</p><p><a href="https://www.computing.co.uk/news/4056306/microsofts-september-patch-tuesday-fixes-critical-bugs">Microsoft's September Patch Tuesday fixes five critical bugs </a>(Computing)</p><p><a href="https://www.securityweek.com/microsoft-raises-alert-under-attack-windows-flaw">Microsoft Raises Alert for Under-Attack Windows Flaw</a> (SecurityWeek)</p><p><a href="https://onapsis.com/blog/sap-security-patch-day-september-2022">SAP Security Patch Day September 2022</a> (Onapsis) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/09/13/apple-releases-security-updates-multiple-products">Apple Releases Security Updates for Multiple Products</a> (CISA)</p><p><a href="https://www.bleepingcomputer.com/news/security/apple-fixes-eighth-zero-day-used-to-hack-iphones-and-macs-this-year/">Apple fixes eighth zero-day used to hack iPhones and Macs this year</a> (BleepingComputer) </p><p><a href="https://www.macrumors.com/2022/09/12/ios-16-remove-rapid-security-response-update/">Apple Will Let You Remove Rapid Security Response Updates in iOS 16</a> (Mac Rumors)</p><p><a href="https://www.judiciary.senate.gov/meetings/data-security-at-risk-testimony-from-a-twitter-whistleblower">Data Security at Risk: Testimony from a Twitter Whistleblower</a> (United States Senate Committee on the Judiciary)</p><p><a href="https://www.wsj.com/video/twitter-employees-have-too-much-access-to-data-whistleblower-says/3AC376A6-7147-4524-ABD0-A8EE15DCCEB6.html?mod=djemCIO">Twitter Employees Have Too Much Access to Data, Whistleblower Says</a> (Wall Street Journal) </p><p><a href="https://www.reuters.com/legal/twitter-whistleblower-detail-dire-security-threats-ahead-musk-deal-vote-2022-09-13/">Twitter whistleblower reveals employees concerned China agent could collect user data</a> (Reuters)</p><p><a href="https://www.washingtonpost.com/technology/2022/09/13/twitter-whistleblower-peiter-zatko-testifies/">Security failures cause ‘real harm to real people’</a> (Washington Post)</p><p><a href="https://therecord.media/twitter-whistleblower-testifies-to-congress-calls-for-tech-regulation-reforms/">Twitter whistleblower testifies to Congress, calls for tech regulation reforms</a> (The Record by Recorded Future)</p><p><a href="https://www.newyorker.com/news/news-desk/the-search-for-dirt-on-the-twitter-whistle-blower">The Search for Dirt on the Twitter Whistle-Blower</a> (The New Yorker)</p><p><a href="https://www.nytimes.com/2022/09/13/technology/twitter-whistle-blower-security-flaws.html">Whistle-Blower Says Twitter ‘Chose to Mislead’ on Security Flaws</a> (New York Times) </p><p><a href="https://www.computing.co.uk/news/4056277/twitter-whistleblower-site-growth-security">Twitter whistleblower says site put growth over security </a>(Computing) </p><p><a href="https://www.judiciary.senate.gov/imo/media/doc/Testimony%20-%20Zatko%20-%202022-09-13.pdf">Written Statement of Peiter (“Mudge”) Zatko United States Senate Judiciary Committee September 13, 2022</a> (Katz Banks Kumin) </p><p><a href="https://techcrunch.com/2022/09/13/twitter-whistleblower-mudge-congress/">What we learned when Twitter whistleblower Mudge testified to Congress</a> (TechCrunch) </p><p><a href="https://www.reuters.com/technology/block-blue-ticks-how-china-became-big-business-twitter-2022-09-13/">How China became big business for Twitter</a> (Reuters)</p><p><a href="https://www.washingtonpost.com/technology/2022/09/12/mudge-twitter-ftc-consent-decrees/">Twitter whistleblower exposes limits of FTC’s power</a> (Washington Post)</p><p><a href="https://www.bloomberg.com/news/articles/2022-09-13/twitter-whistle-blower-describes-ticking-bomb-of-security-gaps">Twitter Whistle-Blower Testimony Spurs Calls for Tech Regulator</a> (Bloomberg)</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-257a">Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations</a> (CISA)</p><p><a href="https://www.wired.com/story/yurii-shchyhol-urkaine-cyberwar-russia/">Ukraine’s Cyberwar Chief Sounds Like He’s Winning</a> (WIRED) </p><p><a href="https://www.prnewswire.com/news-releases/ddos-attacks-on-financial-sector-surge-during-war-in-ukraine-new-fca-data-reveals-301624074.html">DDoS attacks on financial sector surge during war in Ukraine, new FCA data reveals</a> (PR Newswire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1848</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3b469b20-787a-11ec-abf0-c33e4301ebc9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7509132893.mp3?updated=1690317487" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A conversation with members of Baltimore FBI: Special Agent in Charge, Tom Sobocinski, and Supervisory Special Agent for Cyber, Tom Breeden. [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/45/notes</link>
      <description>In this extended interview, CyberWire Daily Podcast host Dave Bittner sits down with members of the FBI's Baltimore field office: Special Agent in Charge, Tom Sobocinski, and Supervisory Special Agent for Cyber, Tom Breeden. As part of the FBI's cybersecurity awareness campaign, they discuss what the FBI can do to enhance and amplify cyber efforts in ways unlike any other public or private organization. This interview from August 30, 2022 originally aired as a shortened version on the CyberWire Daily Podcast.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Sep 2022 21:50:00 -0000</pubDate>
      <itunes:title>A conversation with members of Baltimore FBI: Special Agent in Charge, Tom Sobocinski, and Supervisory Special Agent for Cyber, Tom Breeden. [Special Editions]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>45</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this extended interview, CyberWire Daily Podcast host Dave Bittner sits down with members of the FBI's Baltimore field office: Special Agent in Charge, Tom Sobocinski, and Supervisory Special Agent for Cyber, Tom Breeden. As part of the FBI's cybersecurity awareness campaign, they discuss what the FBI can do to enhance and amplify cyber efforts in ways unlike any other public or private organization. This interview from August 30, 2022 originally aired as a shortened version on the CyberWire Daily Podcast.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this extended interview, CyberWire Daily Podcast host Dave Bittner sits down with members of the FBI's Baltimore field office: Special Agent in Charge, Tom Sobocinski, and Supervisory Special Agent for Cyber, Tom Breeden. As part of the FBI's cybersecurity awareness campaign, they discuss what the FBI can do to enhance and amplify cyber efforts in ways unlike any other public or private organization. This interview from August 30, 2022 originally aired as a shortened version on the CyberWire Daily Podcast.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1310</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[042583f0-33ae-11ed-8b80-678c4d8567f7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9225567584.mp3?updated=1666017028" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Apple patches. Reviewing the cyber phase of a hybrid war. ShadowPad’s return. Phishing from the Static Expressway. Medical device threats. Security trends. Charming Kitten’s social engineering.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1661/notes</link>
      <description>Apple patches its software. Reviewing the cyber phase of a hybrid war. The return of the (ShadowPad) alumni. Phishing from the Static Expressway. The state of cloud security. Overconfidence comes at a cost. Ann Johnson of Afternoon Cyber Tea speaks with Dr. Josephine Wolff from the Fletcher School about cyber insurance past. My conversation with FBI special agents Tom Sobocinski and Tom Breeden. And Charming Kitten and group-think in social engineering.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/176

Selected reading.
Apple security updates (Apple Support)
Ukraine Cyber War Update September 2022 (CyberCube)
New Wave of Espionage Activity Targets Asian Governments (Broadcom Software Blogs)
Chinese gov’t hackers using ‘diverse’ toolset to target Asian prime ministers, telecoms (The Record by Recorded Future)
Leveraging Facebook Ads to Send Credential Harvesting Links (Avanan)
Unpatched and Outdated Medical Devices Provide Cyber Attack Opportunities (FBI) 
CFO Cyber Security Survey: Over-Confidence is Costly (Kroll) 
Snyk’s State of Cloud Security Report Reveals 80% of Organizations Have Experienced a Severe Cloud Security Incident in Past Year (Snyk) 
Look What You Made Me Do: TA453 Uses Multi-Persona Impersonation to Capitalize on FOMO (Proofpoint)
Iranian military using spoofed personas to target nuclear security researchers (The Record by Recorded Future)
Alleged cyber commander of Iran’s Revolutionary Guard named by opposition outlet (Times of Israel)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Sep 2022 20:15:00 -0000</pubDate>
      <itunes:title>Apple patches. Reviewing the cyber phase of a hybrid war. ShadowPad’s return. Phishing from the Static Expressway. Medical device threats. Security trends. Charming Kitten’s social engineering.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1661</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Apple patches its software. Reviewing the cyber phase of a hybrid war. The return of the (ShadowPad) alumni. Phishing from the Static Expressway. The state of cloud security. Overconfidence comes at a cost. Ann Johnson of Afternoon Cyber Tea speaks with Dr. Josephine Wolff from the Fletcher School about cyber insurance past. My conversation with FBI special agents Tom Sobocinski and Tom Breeden. And Charming Kitten and group-think in social engineering.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/176

Selected reading.
Apple security updates (Apple Support)
Ukraine Cyber War Update September 2022 (CyberCube)
New Wave of Espionage Activity Targets Asian Governments (Broadcom Software Blogs)
Chinese gov’t hackers using ‘diverse’ toolset to target Asian prime ministers, telecoms (The Record by Recorded Future)
Leveraging Facebook Ads to Send Credential Harvesting Links (Avanan)
Unpatched and Outdated Medical Devices Provide Cyber Attack Opportunities (FBI) 
CFO Cyber Security Survey: Over-Confidence is Costly (Kroll) 
Snyk’s State of Cloud Security Report Reveals 80% of Organizations Have Experienced a Severe Cloud Security Incident in Past Year (Snyk) 
Look What You Made Me Do: TA453 Uses Multi-Persona Impersonation to Capitalize on FOMO (Proofpoint)
Iranian military using spoofed personas to target nuclear security researchers (The Record by Recorded Future)
Alleged cyber commander of Iran’s Revolutionary Guard named by opposition outlet (Times of Israel)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Apple patches its software. Reviewing the cyber phase of a hybrid war. The return of the (ShadowPad) alumni. Phishing from the Static Expressway. The state of cloud security. Overconfidence comes at a cost. Ann Johnson of Afternoon Cyber Tea speaks with Dr. Josephine Wolff from the Fletcher School about cyber insurance past. My conversation with FBI special agents Tom Sobocinski and Tom Breeden. And Charming Kitten and group-think in social engineering.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/176</p><p><br></p><h2>Selected reading.</h2><p><a href="https://support.apple.com/en-us/HT201222?mod=djemCybersecruityPro&amp;tpl=cy">Apple security updates</a> (Apple Support)</p><p><a href="https://www.cybcube.com/hubfs/REPORTS%20and%20RESOURCES/REPORTS%20-%20ARTICLES%20-%20PDFs/Ukraine%20Cyber%20War%20Update%20Spotlight%20on%20activity%20six%20months%20later%20_%20CyberCube_%20Report.pdf?utm_campaign=FY22_Q1_ABM_War%20in%20Ukraine%20Report%20-%20Tier%201s&amp;utm_medium=email&amp;_hsmi=225407856&amp;_hsenc=p2ANqtz--IOF0Dt2oqWMs2YD8ZiilO9f6MZ9zQ-7IOZbiRyrh2ujvxMNIpWwhzMnVH-ZsvaLJEenm9VAbiAUi-8KR4z2gr2Zpq70bjzrKDdG1YvgeO30oB0cA&amp;utm_content=225407856&amp;utm_source=hs_automation">Ukraine Cyber War Update September 2022</a> (CyberCube)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/espionage-asia-governments">New Wave of Espionage Activity Targets Asian Governments</a> (Broadcom Software Blogs)</p><p><a href="https://therecord.media/chinese-govt-hackers-using-diverse-toolset-to-target-asian-prime-ministers-telecoms/">Chinese gov’t hackers using ‘diverse’ toolset to target Asian prime ministers, telecoms</a> (The Record by Recorded Future)</p><p><a href="https://www.avanan.com/blog/leveraging-facebook-ads-to-send-credential-harvesting-links">Leveraging Facebook Ads to Send Credential Harvesting Links</a> (Avanan)</p><p><a href="https://www.ic3.gov/Media/News/2022/220912.pdf">Unpatched and Outdated Medical Devices Provide Cyber Attack Opportunities</a> (FBI) </p><p><a href="https://www.kroll.com/en/insights/publications/cyber/cyber-risk-and-cfos">CFO Cyber Security Survey: Over-Confidence is Costly</a> (Kroll) </p><p><a href="https://snyk.io/news/snyks-state-of-cloud-security-report-reveals-organizations-have-experienced-severe-cloud-security-incidents/">Snyk’s State of Cloud Security Report Reveals 80% of Organizations Have Experienced a Severe Cloud Security Incident in Past Year</a> (Snyk) </p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/ta453-uses-multi-persona-impersonation-capitalize-fomo">Look What You Made Me Do: TA453 Uses Multi-Persona Impersonation to Capitalize on FOMO</a> (Proofpoint)</p><p><a href="https://therecord.media/iranian-military-using-spoofed-personas-to-target-nuclear-security-researchers/">Iranian military using spoofed personas to target nuclear security researchers</a> (The Record by Recorded Future)</p><p><a href="https://www.timesofisrael.com/alleged-cyber-commander-of-irans-revolutionary-guard-named-by-opposition-outlet/">Alleged cyber commander of Iran’s Revolutionary Guard named by opposition outlet</a> (Times of Israel)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1812</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3be78454-787a-11ec-abf0-8b26269cdc3b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7235123173.mp3?updated=1690317466" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Albania reports more Iranian cyberattacks. RaidForums has a new successor. A look at threat actor reconnaissance in the contemporary Internet.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1660/notes</link>
      <description>Albania reports additional cyberattacks from Iran over the weekend. RaidForums has a new successor. A look at threat actor reconnaissance in the contemporary Internet. Kinetic strikes hit Ukraine’s infrastructure. Rick Howard calculates risk with classic mathematical theorems. Tim Eades from Cyber Mentor Fund on the dynamic nature of the attack surface. And a look into the cyber phase of the hybrid war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/175

Selected reading.
Albania blames Iran for second cyberattack since July (CNN)
Treasury Sanctions Iranian Ministry of Intelligence and Minister for Malign Cyber Activities (US Department of the Treasury)
Iran strongly condemns US sanctions over Albania hacking (Al Arabiya)
Six months into Breached: The legacy of RaidForums? (KELA)
2022 State of the Internet Report (Censys)
Ukraine hails snowballing offensive, blames Russia for blackouts (Reuters)
Ukraine says Russia is retaliating by hitting critical infrastructure, causing blackouts. (New York Times)
Last reactor at Ukraine’s Zaporizhzhia nuclear plant stopped (Associated Press)
Ukraine Warns Russian Cyber Onslaught Is Coming (Voice of America)
Montenegro wrestles with massive cyberattack, Russia blamed (ABC News)
CyberCube: Russia’s Sovereign Internet Creates Security Risks With Implications for Cyber (Re)Insurance While War in Ukraine Develops (Associated Press)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 12 Sep 2022 20:15:00 -0000</pubDate>
      <itunes:title>Albania reports more Iranian cyberattacks. RaidForums has a new successor. A look at threat actor reconnaissance in the contemporary Internet.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1660</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Albania reports additional cyberattacks from Iran over the weekend. RaidForums has a new successor. A look at threat actor reconnaissance in the contemporary Internet. Kinetic strikes hit Ukraine’s infrastructure. Rick Howard calculates risk with classic mathematical theorems. Tim Eades from Cyber Mentor Fund on the dynamic nature of the attack surface. And a look into the cyber phase of the hybrid war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/175

Selected reading.
Albania blames Iran for second cyberattack since July (CNN)
Treasury Sanctions Iranian Ministry of Intelligence and Minister for Malign Cyber Activities (US Department of the Treasury)
Iran strongly condemns US sanctions over Albania hacking (Al Arabiya)
Six months into Breached: The legacy of RaidForums? (KELA)
2022 State of the Internet Report (Censys)
Ukraine hails snowballing offensive, blames Russia for blackouts (Reuters)
Ukraine says Russia is retaliating by hitting critical infrastructure, causing blackouts. (New York Times)
Last reactor at Ukraine’s Zaporizhzhia nuclear plant stopped (Associated Press)
Ukraine Warns Russian Cyber Onslaught Is Coming (Voice of America)
Montenegro wrestles with massive cyberattack, Russia blamed (ABC News)
CyberCube: Russia’s Sovereign Internet Creates Security Risks With Implications for Cyber (Re)Insurance While War in Ukraine Develops (Associated Press)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Albania reports additional cyberattacks from Iran over the weekend. RaidForums has a new successor. A look at threat actor reconnaissance in the contemporary Internet. Kinetic strikes hit Ukraine’s infrastructure. Rick Howard calculates risk with classic mathematical theorems. Tim Eades from Cyber Mentor Fund on the dynamic nature of the attack surface. And a look into the cyber phase of the hybrid war.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/175</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cnn.com/2022/09/10/politics/albania-cyberattack-iran/index.html">Albania blames Iran for second cyberattack since July</a> (CNN)</p><p><a href="https://home.treasury.gov/news/press-releases/jy0941">Treasury Sanctions Iranian Ministry of Intelligence and Minister for Malign Cyber Activities</a> (US Department of the Treasury)</p><p><a href="https://english.alarabiya.net/News/middle-east/2022/09/10/Iran-strongly-condemns-US-sanctions-over-Albania-hacking-">Iran strongly condemns US sanctions over Albania hacking</a> (Al Arabiya)</p><p><a href="https://ke-la.com/six-months-into-breached-the-legacy-of-raidforums/">Six months into Breached: The legacy of RaidForums?</a> (KELA)</p><p><a href="https://censys.io/state-of-the-internet-report/">2022 State of the Internet Report</a> (Censys)</p><p><a href="https://www.reuters.com/world/europe/ukraine-forces-advance-north-after-fall-russian-stronghold-2022-09-11/">Ukraine hails snowballing offensive, blames Russia for blackouts</a> (Reuters)</p><p><a href="https://www.nytimes.com/2022/09/12/world/ukraine-power-blackout.html">Ukraine says Russia is retaliating by hitting critical infrastructure, causing blackouts.</a> (New York Times)</p><p><a href="https://apnews.com/article/russia-ukraine-8838067037a8521e3bc764435144d8b7">Last reactor at Ukraine’s Zaporizhzhia nuclear plant stopped</a> (Associated Press)</p><p><a href="https://www.voanews.com/a/ukraine-warns-russian-cyber-onslaught-is-coming-/6738800.html">Ukraine Warns Russian Cyber Onslaught Is Coming</a> (Voice of America)</p><p><a href="https://abcnews.go.com/International/wireStory/montenegro-wrestles-massive-cyberattack-russia-blamed-89735737">Montenegro wrestles with massive cyberattack, Russia blamed</a> (ABC News)</p><p><a href="https://apnews.com/article/russia-ukraine-technology-ce311336d2e24b9dac0dd449213a1013">CyberCube: Russia’s Sovereign Internet Creates Security Risks With Implications for Cyber (Re)Insurance While War in Ukraine Develops</a> (Associated Press)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1572</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3c484546-787a-11ec-abf0-63986c9d8b66]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6289871958.mp3?updated=1690317447" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mark Logan: March towards your goals. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/116/notes</link>
      <description>Mark Logan, CEO of One Identity, sits down to share his story, explaining how he fit into different roles growing up in different companies. Mark has nearly two decades of C-Suite experience at an array of different organizations, finally landing on his current position as the CEO at One Identity. Sharing his different roles, he also gives a quote from Steve Jobs, saying "it's not what I say yes to, it's what I say no to." He believes that's a key area for his workers because when he is able to make up his mind, his team and his customers have someone they can rely on. Mark says that as a CEO he wants to share the advice of always marching towards your goals, and identifying that different people have different goals because they work in different fields, but that's what makes a company work best. He says "I've found that the more you can delegate, provided you've got the right folks in place the better." We thank Mark for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 11 Sep 2022 07:00:00 -0000</pubDate>
      <itunes:title>Mark Logan: March towards your goals. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>116</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Mark Logan, CEO of One Identity, sits down to share his story, explaining how he fit into different roles growing up in different companies. Mark has nearly two decades of C-Suite experience at an array of different organizations, finally landing on his current position as the CEO at One Identity. Sharing his different roles, he also gives a quote from Steve Jobs, saying "it's not what I say yes to, it's what I say no to." He believes that's a key area for his workers because when he is able to make up his mind, his team and his customers have someone they can rely on. Mark says that as a CEO he wants to share the advice of always marching towards your goals, and identifying that different people have different goals because they work in different fields, but that's what makes a company work best. He says "I've found that the more you can delegate, provided you've got the right folks in place the better." We thank Mark for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Mark Logan, CEO of One Identity, sits down to share his story, explaining how he fit into different roles growing up in different companies. Mark has nearly two decades of C-Suite experience at an array of different organizations, finally landing on his current position as the CEO at One Identity. Sharing his different roles, he also gives a quote from Steve Jobs, saying "it's not what I say yes to, it's what I say no to." He believes that's a key area for his workers because when he is able to make up his mind, his team and his customers have someone they can rely on. Mark says that as a CEO he wants to share the advice of always marching towards your goals, and identifying that different people have different goals because they work in different fields, but that's what makes a company work best. He says "I've found that the more you can delegate, provided you've got the right folks in place the better." We thank Mark for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>561</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f43aa746-2f97-11ed-9307-23dcb930b24e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7369044043.mp3?updated=1662656691" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Evilnum APT returns with new targets. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/249/notes</link>
      <description>Deepen Desai from Zscaler ThreatLabz joins Dave to discuss their work on "Return of the Evilnum APT with updated TTPs and new targets." Zscaler’s ThreatLabz team recently caught a new Evilnum APT attack campaign that uses the document template on MS Office Word to inject malicious payload to the victim's machine. There are three new instances used of the campaign, including updated tactics, techniques, and procedures.
Researchers have been closely monitoring Evilnum APT’s activity. They ssay ThreatLabz identified several domains associated with the Evilnum APT group. Which has led them to discover that the "group has been successful at flying under the radar and has remained undetected for a long time."
The research can be found here:
Return of the Evilnum APT with updated TTPs and new targets

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Sep 2022 07:00:00 -0000</pubDate>
      <itunes:title>Evilnum APT returns with new targets. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>249</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Deepen Desai from Zscaler ThreatLabz joins Dave to discuss their work on "Return of the Evilnum APT with updated TTPs and new targets." Zscaler’s ThreatLabz team recently caught a new Evilnum APT attack campaign that uses the document template on MS Office Word to inject malicious payload to the victim's machine. There are three new instances used of the campaign, including updated tactics, techniques, and procedures.
Researchers have been closely monitoring Evilnum APT’s activity. They ssay ThreatLabz identified several domains associated with the Evilnum APT group. Which has led them to discover that the "group has been successful at flying under the radar and has remained undetected for a long time."
The research can be found here:
Return of the Evilnum APT with updated TTPs and new targets

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Deepen Desai from Zscaler ThreatLabz joins Dave to discuss their work on "Return of the Evilnum APT with updated TTPs and new targets." Zscaler’s ThreatLabz team recently caught a new Evilnum APT attack campaign that uses the document template on MS Office Word to inject malicious payload to the victim's machine. There are three new instances used of the campaign, including updated tactics, techniques, and procedures.</p><p>Researchers have been closely monitoring Evilnum APT’s activity. They ssay ThreatLabz identified several domains associated with the Evilnum APT group. Which has led them to discover that the "group has been successful at flying under the radar and has remained undetected for a long time."</p><p>The research can be found here:</p><ul><li><a href="https://www.zscaler.com/blogs/security-research/return-evilnum-apt-updated-ttps-and-new-targets">Return of the Evilnum APT with updated TTPs and new targets</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1312</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bd744920-2f87-11ed-ab04-03fd539b9a80]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9867522558.mp3?updated=1685127139" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Threats to US elections. Lazarus Group targeting energy companies. Gaming-related threats.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1659/notes</link>
      <description>Nation-states are expected to target the US midterm elections. North Korea’s Lazarus Group is targeting energy companies. The Ukraine’s Ministry of Digital Transformation on cyber lessons learned from Russia’s hybrid war against Ukraine. CISA flags twelve known exploited vulnerabilities for attention and remediation. Vulnerable anti-cheat engines used for malicious purposes. Steve Carter from Nucleus Security has thoughts on AI in cybersecurity. Roland Cloutier, former CSO of TikTok, discusses working around the changing career field, needs, and how enterprise executives are developing and finding talent. And a look at top gaming-related malware lures.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/174

Selected reading.
Mandiant ‘highly confident’ foreign cyberspies will target US midterm elections (The Register)
What to Expect When You’re Electing: Preparing for Cyber Threats to the 2022 U.S. Midterm Elections (Mandiant)
North Korea’s Lazarus hackers are exploiting Log4j flaw to hack US energy companies (TechCrunch)
Lazarus and the tale of three RATs (Cisco Talos)
How Gaming Cheats Are Cashing in Below the Operating System (Eclypsium)
Good game, well played: an overview of gaming-related cyberthreats in 2022 (Securelist)
Cybercriminals target games popular with kids to distribute malware (The Register)
CISA Adds Twelve Known Exploited Vulnerabilities to Catalog  (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 09 Sep 2022 20:40:00 -0000</pubDate>
      <itunes:title>Threats to US elections. Lazarus Group targeting energy companies. Gaming-related threats.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1659</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Nation-states are expected to target the US midterm elections. North Korea’s Lazarus Group is targeting energy companies. The Ukraine’s Ministry of Digital Transformation on cyber lessons learned from Russia’s hybrid war against Ukraine. CISA flags twelve known exploited vulnerabilities for attention and remediation. Vulnerable anti-cheat engines used for malicious purposes. Steve Carter from Nucleus Security has thoughts on AI in cybersecurity. Roland Cloutier, former CSO of TikTok, discusses working around the changing career field, needs, and how enterprise executives are developing and finding talent. And a look at top gaming-related malware lures.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/174

Selected reading.
Mandiant ‘highly confident’ foreign cyberspies will target US midterm elections (The Register)
What to Expect When You’re Electing: Preparing for Cyber Threats to the 2022 U.S. Midterm Elections (Mandiant)
North Korea’s Lazarus hackers are exploiting Log4j flaw to hack US energy companies (TechCrunch)
Lazarus and the tale of three RATs (Cisco Talos)
How Gaming Cheats Are Cashing in Below the Operating System (Eclypsium)
Good game, well played: an overview of gaming-related cyberthreats in 2022 (Securelist)
Cybercriminals target games popular with kids to distribute malware (The Register)
CISA Adds Twelve Known Exploited Vulnerabilities to Catalog  (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Nation-states are expected to target the US midterm elections. North Korea’s Lazarus Group is targeting energy companies. The Ukraine’s Ministry of Digital Transformation on cyber lessons learned from Russia’s hybrid war against Ukraine. CISA flags twelve known exploited vulnerabilities for attention and remediation. Vulnerable anti-cheat engines used for malicious purposes. Steve Carter from Nucleus Security has thoughts on AI in cybersecurity. Roland Cloutier, former CSO of TikTok, discusses working around the changing career field, needs, and how enterprise executives are developing and finding talent. And a look at top gaming-related malware lures.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/174</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.theregister.com/2022/09/08/mandiant_cyberspies_us_elections/">Mandiant ‘highly confident’ foreign cyberspies will target US midterm elections</a> (The Register)</p><p><a href="https://www.mandiant.com/resources/blog/2022-midterm-election-threats">What to Expect When You’re Electing: Preparing for Cyber Threats to the 2022 U.S. Midterm Elections</a> (Mandiant)</p><p><a href="https://techcrunch.com/2022/09/08/north-korea-lazarus-united-states-energy/">North Korea’s Lazarus hackers are exploiting Log4j flaw to hack US energy companies</a> (TechCrunch)</p><p><a href="https://blog.talosintelligence.com/2022/09/lazarus-three-rats.html">Lazarus and the tale of three RATs</a> (Cisco Talos)</p><p><a href="https://eclypsium.com/2022/09/08/how-gaming-cheats-are-cashing-in-below-the-operating-system/">How Gaming Cheats Are Cashing in Below the Operating System</a> (Eclypsium)</p><p><a href="https://securelist.com/gaming-related-cyberthreats-2021-2022/107346/">Good game, well played: an overview of gaming-related cyberthreats in 2022</a> (Securelist)</p><p><a href="https://www.theregister.com/2022/09/07/gaming_threats_kaspersky/">Cybercriminals target games popular with kids to distribute malware</a> (The Register)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/09/08/cisa-adds-twelve-known-exploited-vulnerabilities-catalog">CISA Adds Twelve Known Exploited Vulnerabilities to Catalog </a> (CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1914</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3a0775b8-787a-11ec-abf0-a73ecd718875]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4551388369.mp3?updated=1690317429" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bronze President shows both enduring interests and adaptability. Iranian threat actor activity reported. Cybersecurity and small-to-medium businesses.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1658/notes</link>
      <description>Bronze President shows both enduring interests and adaptability. Iranian threat actor activity is reported. Cybersecurity and small-to-medium businesses. An initial access broker repurposes Conti's old playbook for use against Ukraine. Johannes Ullrich from SANS on Scanning for VoIP Servers. Our guest is Ian Smith from Chronosphere on observability. And Kyivstar as a case study in telco resiliency.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/173

Selected reading.
BRONZE PRESIDENT Targets Government Officials (Secureworks)
APT42: Crooked Charms, Cons, and Compromises (Mandiant)
Profiling DEV-0270: PHOSPHORUS’ ransomware operations (Microsoft)
Albania cuts diplomatic ties with Iran over July cyberattack (The Washington Post)
Initial access broker repurposing techniques in targeted attacks against Ukraine (Google)
Unprecedented Shift: The Trickbot Group is Systematically Attacking Ukraine (IBM SecurityIntelligence)
Ransomware gang's Cobalt Strike servers DDoSed with anti-Russia messages (BleepingComputer)
Ukraine’s largest telecom stands against Russian cyberattacks (POLITICO)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 08 Sep 2022 21:00:00 -0000</pubDate>
      <itunes:title>Bronze President shows both enduring interests and adaptability. Iranian threat actor activity reported. Cybersecurity and small-to-medium businesses.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1658</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Bronze President shows both enduring interests and adaptability. Iranian threat actor activity is reported. Cybersecurity and small-to-medium businesses. An initial access broker repurposes Conti's old playbook for use against Ukraine. Johannes Ullrich from SANS on Scanning for VoIP Servers. Our guest is Ian Smith from Chronosphere on observability. And Kyivstar as a case study in telco resiliency.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/173

Selected reading.
BRONZE PRESIDENT Targets Government Officials (Secureworks)
APT42: Crooked Charms, Cons, and Compromises (Mandiant)
Profiling DEV-0270: PHOSPHORUS’ ransomware operations (Microsoft)
Albania cuts diplomatic ties with Iran over July cyberattack (The Washington Post)
Initial access broker repurposing techniques in targeted attacks against Ukraine (Google)
Unprecedented Shift: The Trickbot Group is Systematically Attacking Ukraine (IBM SecurityIntelligence)
Ransomware gang's Cobalt Strike servers DDoSed with anti-Russia messages (BleepingComputer)
Ukraine’s largest telecom stands against Russian cyberattacks (POLITICO)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Bronze President shows both enduring interests and adaptability. Iranian threat actor activity is reported. Cybersecurity and small-to-medium businesses. An initial access broker repurposes Conti's old playbook for use against Ukraine. Johannes Ullrich from SANS on Scanning for VoIP Servers. Our guest is Ian Smith from Chronosphere on observability. And Kyivstar as a case study in telco resiliency.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/173</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.secureworks.com/blog/bronze-president-targets-government-officials">BRONZE PRESIDENT Targets Government Officials</a> (Secureworks)</p><p><a href="https://www.mandiant.com/resources/blog/apt42-charms-cons-compromises">APT42: Crooked Charms, Cons, and Compromises</a> (Mandiant)</p><p><a href="https://www.microsoft.com/security/blog/2022/09/07/profiling-dev-0270-phosphorus-ransomware-operations/">Profiling DEV-0270: PHOSPHORUS’ ransomware operations</a> (Microsoft)</p><p><a href="https://www.washingtonpost.com/politics/albania-cuts-diplomatic-ties-with-iran-over-july-cyberattack/2022/09/07/f707abc0-2ea4-11ed-bcc6-0874b26ae296_story.html">Albania cuts diplomatic ties with Iran over July cyberattack</a> (The Washington Post)</p><p><a href="https://blog.google/threat-analysis-group/initial-access-broker-repurposing-techniques-in-targeted-attacks-against-ukraine/">Initial access broker repurposing techniques in targeted attacks against Ukraine</a> (Google)</p><p><a href="https://securityintelligence.com/posts/trickbot-group-systematically-attacking-ukraine/">Unprecedented Shift: The Trickbot Group is Systematically Attacking Ukraine</a> (IBM SecurityIntelligence)</p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-gangs-cobalt-strike-servers-ddosed-with-anti-russia-messages/">Ransomware gang's Cobalt Strike servers DDoSed with anti-Russia messages</a> (BleepingComputer)</p><p><a href="https://www.politico.com/news/2022/09/07/hackers-ukraine-telecom-00055060">Ukraine’s largest telecom stands against Russian cyberattacks</a> (POLITICO)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1620</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3b058770-787a-11ec-abf0-2b60e1a045d7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3993046044.mp3?updated=1690317413" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Albania attributes major cyberattack to Iran. TikTok denies breach. New Linux malware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1657/notes</link>
      <description>The Albanian government attributes a disruptive cyber attack to Iran. TikTok says it’s found no evidence of a data breach. Researchers have discovered a new strain of Linux malware. US agencies warn of ransomware targeting the education sector. Finland prepares to increase its cybersecurity capacity. Deepen Desai from Zscaler on the latest updates to Raccoon Stealer. Our guest is Lance Spitzner from the SANS Institute with results of their recent Security Awareness Report. And a fond farewell to the father of Let’s Encrypt.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/172

Selected reading.
Albania cuts Iran ties over cyberattack, U.S. vows further action (Reuters)
Statement by NSC Spokesperson Adrienne Watson on Iran’s Cyberattack against Albania (The White House)
TikTok Data Breach Exposing 2B Records And Source Code May Not Have Happened After All (Hot Hardware)
TikTok Denies Data Breach Reportedly Exposing Over 2 Billion Users' Information (The Hacker News)
Shikitega - New stealthy malware targeting Linux (AT&amp;T Alien Labs)
#StopRansomware: Vice Society (CISA)
Peter Eckersley, tech activist and founder of Let's Encrypt, dies at 43 (Techspot)
Honoring Peter Eckersley, Who Made the Internet a Safer Place for Everyone (Electronic Frontier Foundation)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 07 Sep 2022 20:15:00 -0000</pubDate>
      <itunes:title>Albania attributes major cyberattack to Iran. TikTok denies breach. New Linux malware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1657</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Albanian government attributes a disruptive cyber attack to Iran. TikTok says it’s found no evidence of a data breach. Researchers have discovered a new strain of Linux malware. US agencies warn of ransomware targeting the education sector. Finland prepares to increase its cybersecurity capacity. Deepen Desai from Zscaler on the latest updates to Raccoon Stealer. Our guest is Lance Spitzner from the SANS Institute with results of their recent Security Awareness Report. And a fond farewell to the father of Let’s Encrypt.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/172

Selected reading.
Albania cuts Iran ties over cyberattack, U.S. vows further action (Reuters)
Statement by NSC Spokesperson Adrienne Watson on Iran’s Cyberattack against Albania (The White House)
TikTok Data Breach Exposing 2B Records And Source Code May Not Have Happened After All (Hot Hardware)
TikTok Denies Data Breach Reportedly Exposing Over 2 Billion Users' Information (The Hacker News)
Shikitega - New stealthy malware targeting Linux (AT&amp;T Alien Labs)
#StopRansomware: Vice Society (CISA)
Peter Eckersley, tech activist and founder of Let's Encrypt, dies at 43 (Techspot)
Honoring Peter Eckersley, Who Made the Internet a Safer Place for Everyone (Electronic Frontier Foundation)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Albanian government attributes a disruptive cyber attack to Iran. TikTok says it’s found no evidence of a data breach. Researchers have discovered a new strain of Linux malware. US agencies warn of ransomware targeting the education sector. Finland prepares to increase its cybersecurity capacity. Deepen Desai from Zscaler on the latest updates to Raccoon Stealer. Our guest is Lance Spitzner from the SANS Institute with results of their recent Security Awareness Report. And a fond farewell to the father of Let’s Encrypt.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/172</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.reuters.com/world/albania-cuts-iran-ties-orders-diplomats-go-after-cyber-attack-pm-says-2022-09-07/">Albania cuts Iran ties over cyberattack, U.S. vows further action</a> (Reuters)</p><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2022/09/07/statement-by-nsc-spokesperson-adrienne-watson-on-irans-cyberattack-against-albania/">Statement by NSC Spokesperson Adrienne Watson on Iran’s Cyberattack against Albania</a> (The White House)</p><p><a href="https://amp.hothardware.com/news/tiktok-data-breach-2b-records-source-code-may-not-have-happened">TikTok Data Breach Exposing 2B Records And Source Code May Not Have Happened After All</a> (Hot Hardware)</p><p><a href="https://thehackernews.com/2022/09/tiktok-denies-data-breach-reportedly.html">TikTok Denies Data Breach Reportedly Exposing Over 2 Billion Users' Information</a> (The Hacker News)</p><p><a href="https://cybersecurity.att.com/blogs/labs-research/shikitega-new-stealthy-malware-targeting-linux">Shikitega - New stealthy malware targeting Linux</a> (AT&amp;T Alien Labs)</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-249a">#StopRansomware: Vice Society</a> (CISA)</p><p><a href="https://www.techspot.com/news/95870-peter-eckersley-tech-activist-founder-encrypt-dies-43.html">Peter Eckersley, tech activist and founder of Let's Encrypt, dies at 43</a> (Techspot)</p><p><a href="https://www.eff.org/deeplinks/2022/09/honoring-peter-eckersley-who-made-internet-safer-place-everyone">Honoring Peter Eckersley, Who Made the Internet a Safer Place for Everyone</a> (Electronic Frontier Foundation)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1482</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3b264de8-787a-11ec-abf0-8bba9b65f21c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5426689628.mp3?updated=1671811967" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA22-249A – #StopRansomware: Vice Society.” [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/29/notes</link>
      <description>CISA, the FBI, and the Multi-State Information Sharing and Analysis Center, or MS ISAC, are releasing this advisory to disseminate indicators of compromise and TTPs associated with Vice Society actors and their ransomware campaigns. The FBI, CISA, and the MS-ISAC have recently observed Vice Society actors disproportionately targeting the education sector with ransomware attacks.
AA22-249A Alert, Technical Details, and Mitigations
Stopransomware.gov is a whole-of-government approach that gives one central location for ransomware resources and alerts.
Resource to mitigate a ransomware attack: CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide.
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Sep 2022 22:54:00 -0000</pubDate>
      <itunes:title>CISA Alert AA22-249A – #StopRansomware: Vice Society.” [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>29</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA, the FBI, and the Multi-State Information Sharing and Analysis Center, or MS ISAC, are releasing this advisory to disseminate indicators of compromise and TTPs associated with Vice Society actors and their ransomware campaigns. The FBI, CISA, and the MS-ISAC have recently observed Vice Society actors disproportionately targeting the education sector with ransomware attacks.
AA22-249A Alert, Technical Details, and Mitigations
Stopransomware.gov is a whole-of-government approach that gives one central location for ransomware resources and alerts.
Resource to mitigate a ransomware attack: CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide.
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA, the FBI, and the Multi-State Information Sharing and Analysis Center, or MS ISAC, are releasing this advisory to disseminate indicators of compromise and TTPs associated with Vice Society actors and their ransomware campaigns. The FBI, CISA, and the MS-ISAC have recently observed Vice Society actors disproportionately targeting the education sector with ransomware attacks.</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-249a">AA22-249A Alert, Technical Details, and Mitigations</a></p><p><a href="https://www.cisa.gov/stopransomware">Stopransomware.gov</a> is a whole-of-government approach that gives one central location for ransomware resources and alerts.</p><p>Resource to mitigate a ransomware attack: <a href="https://www.cisa.gov/sites/default/files/publications/CISA_MS-ISAC_Ransomware%20Guide_S508C.pdf">CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide.</a></p><p>No-cost cyber hygiene services: <a href="https://www.cisa.gov/cyber-hygiene-services">Cyber Hygiene Services</a> and <a href="https://github.com/cisagov/cset/">Ransomware Readiness Assessment</a>.</p><p>All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at <a href="mailto:central@cisa.dhs.gov">central@cisa.dhs.gov</a> or (888) 282-0870 and to the FBI via your <a href="https://www.fbi.gov/contact-us/field-offices">local FBI field office</a> or the FBI’s 24/7 CyWatch at (855) 292-3937 or <a href="mailto:CyWatch@fbi.gov">CyWatch@fbi.gov</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>203</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4a0212e8-2e37-11ed-80d4-8b60557adc9d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2240147500.mp3?updated=1662491625" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Notes on the C2C market. A new cyberespionage threat actor has surfaced. Sharkbot made a brief return to Google Play. Privateering and catphishing in the hybrid war.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1656/notes</link>
      <description>A Phishing-as-a-service offering on the dark web bypasses MFA. The Worok cyberespionage group is active in Central Asia and the Middle East. Prynt Stealer and the evolution of commodity malware. Sharkbot malware reemerged in Google Play. BlackCat/ALPHV claims credit for attack on the Italian energy sector. Joe Carrigan shares stats on social engineering. Our guest is Angela Redmond from BARR Advisory with six cybersecurity KPIs. And the Los Angeles Unified School District was hit with ransomware.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/171

Selected reading.
EvilProxy Phishing-As-A-Service With MFA Bypass Emerged In Dark Web (Resecurity)
Worok: The big picture (WeLiveSecurity) 
Dev backdoors own malware to steal data from other hackers (BleepingComputer) 
The Prynt Stealer malware contains a secret backdoor. Crooks steal data from other cybercriminals (Security Affairs)
Fake Antivirus and Cleaner Apps Caught Installing SharkBot Android Banking Trojan (The Hacker News)
SharkBot malware sneaks back on Google Play to steal your logins (BleepingComputer) 
BlackCat ransomware claims attack on Italian energy agency (BleepingComputer)
11.84GB of United States Military Contractor and Military Reserve data has been leaked. (vx-underground)
Hackers honeytrap Russian troops into sharing location, base bombed: Report (Newsweek) 
LAUSD hit by hackers in apparent cyber attack (FOX 11 Los Angeles)
Los Angeles Unified Targeted by Ransomware Atta (Los Angeles Unified School District)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Sep 2022 20:30:00 -0000</pubDate>
      <itunes:title>Notes on the C2C market. A new cyberespionage threat actor has surfaced. Sharkbot made a brief return to Google Play. Privateering and catphishing in the hybrid war.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1656</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A Phishing-as-a-service offering on the dark web bypasses MFA. The Worok cyberespionage group is active in Central Asia and the Middle East. Prynt Stealer and the evolution of commodity malware. Sharkbot malware reemerged in Google Play. BlackCat/ALPHV claims credit for attack on the Italian energy sector. Joe Carrigan shares stats on social engineering. Our guest is Angela Redmond from BARR Advisory with six cybersecurity KPIs. And the Los Angeles Unified School District was hit with ransomware.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/171

Selected reading.
EvilProxy Phishing-As-A-Service With MFA Bypass Emerged In Dark Web (Resecurity)
Worok: The big picture (WeLiveSecurity) 
Dev backdoors own malware to steal data from other hackers (BleepingComputer) 
The Prynt Stealer malware contains a secret backdoor. Crooks steal data from other cybercriminals (Security Affairs)
Fake Antivirus and Cleaner Apps Caught Installing SharkBot Android Banking Trojan (The Hacker News)
SharkBot malware sneaks back on Google Play to steal your logins (BleepingComputer) 
BlackCat ransomware claims attack on Italian energy agency (BleepingComputer)
11.84GB of United States Military Contractor and Military Reserve data has been leaked. (vx-underground)
Hackers honeytrap Russian troops into sharing location, base bombed: Report (Newsweek) 
LAUSD hit by hackers in apparent cyber attack (FOX 11 Los Angeles)
Los Angeles Unified Targeted by Ransomware Atta (Los Angeles Unified School District)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Phishing-as-a-service offering on the dark web bypasses MFA. The Worok cyberespionage group is active in Central Asia and the Middle East. Prynt Stealer and the evolution of commodity malware. Sharkbot malware reemerged in Google Play. BlackCat/ALPHV claims credit for attack on the Italian energy sector. Joe Carrigan shares stats on social engineering. Our guest is Angela Redmond from BARR Advisory with six cybersecurity KPIs. And the Los Angeles Unified School District was hit with ransomware.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/171</p><p><br></p><h2>Selected reading.</h2><p><a href="https://resecurity.com/blog/article/evilproxy-phishing-as-a-service-with-mfa-bypass-emerged-in-dark-web">EvilProxy Phishing-As-A-Service With MFA Bypass Emerged In Dark Web</a> (Resecurity)</p><p><a href="https://www.welivesecurity.com/2022/09/06/worok-big-picture/">Worok: The big picture</a> (WeLiveSecurity) </p><p><a href="https://www.bleepingcomputer.com/news/security/dev-backdoors-own-malware-to-steal-data-from-other-hackers/">Dev backdoors own malware to steal data from other hackers</a> (BleepingComputer) </p><p><a href="https://securityaffairs.co/wordpress/135229/malware/prynt-stealer-backdoor.html">The Prynt Stealer malware contains a secret backdoor. Crooks steal data from other cybercriminals</a> (Security Affairs)</p><p><a href="https://thehackernews.com/2022/09/fake-antivirus-and-cleaner-apps-caught.html">Fake Antivirus and Cleaner Apps Caught Installing SharkBot Android Banking Trojan</a> (The Hacker News)</p><p><a href="https://www.bleepingcomputer.com/news/security/sharkbot-malware-sneaks-back-on-google-play-to-steal-your-logins/">SharkBot malware sneaks back on Google Play to steal your logins</a> (BleepingComputer) </p><p><a href="https://www.bleepingcomputer.com/news/security/blackcat-ransomware-claims-attack-on-italian-energy-agency/">BlackCat ransomware claims attack on Italian energy agency</a> (BleepingComputer)</p><p><a href="https://twitter.com/vxunderground/status/1566048747641085953">11.84GB of United States Military Contractor and Military Reserve data has been leaked.</a> (vx-underground)</p><p><a href="https://www.newsweek.com/hackers-honeytrap-russian-troops-sharing-location-base-bombed-report-1740070">Hackers honeytrap Russian troops into sharing location, base bombed: Report</a> (Newsweek) </p><p><a href="https://www.foxla.com/news/lausd-hit-by-hackers-in-apparent-cyber-attack">LAUSD hit by hackers in apparent cyber attack</a> (FOX 11 Los Angeles)</p><p><a href="https://achieve.lausd.net/site/default.aspx?PageType=3&amp;DomainID=4&amp;ModuleInstanceID=45662&amp;ViewID=5a34c2e3-8f9c-41db-86d5-75dba1e91cc2&amp;RenderLoc=0&amp;FlexDataID=122767&amp;PageID=1">Los Angeles Unified Targeted by Ransomware Atta</a> (Los Angeles Unified School District)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1823</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3c081552-787a-11ec-abf0-0fb2086ee395]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1838636228.mp3?updated=1671816614" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title> Anjali Hansen: Cross team collaboration works best. [Privacy Counsel] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/115/notes</link>
      <description>Anjali Hansen, a senior privacy counselor from Noname Security shares her story as she climbed through the ranks to get to where she is toady. When Anjali started she wanted to do international law. She started working for the International Trade Commission after law school which is where she was able to gain most of her experience and gain real world abilities. Working with online fraud and abuse, she shares, concerned her because it felt like governments could not protect organizations from threats occurring, which is how she got interested in cyber crime. From there, she moved to Noname Security and working there she found that she is working with every group in the organization, creating a cross team collaboration and how much she admires that type of model. She says "We have to help other departments protect the data because the data's throughout an organization, it's in HR, it's in sales and marketing, it's in IT, it's in finance. So you have to be able to work with all these teams." We thank Anjali for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 04 Sep 2022 07:00:00 -0000</pubDate>
      <itunes:title> Anjali Hansen: Cross team collaboration works best. [Privacy Counsel] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>115</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Anjali Hansen, a senior privacy counselor from Noname Security shares her story as she climbed through the ranks to get to where she is toady. When Anjali started she wanted to do international law. She started working for the International Trade Commission after law school which is where she was able to gain most of her experience and gain real world abilities. Working with online fraud and abuse, she shares, concerned her because it felt like governments could not protect organizations from threats occurring, which is how she got interested in cyber crime. From there, she moved to Noname Security and working there she found that she is working with every group in the organization, creating a cross team collaboration and how much she admires that type of model. She says "We have to help other departments protect the data because the data's throughout an organization, it's in HR, it's in sales and marketing, it's in IT, it's in finance. So you have to be able to work with all these teams." We thank Anjali for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Anjali Hansen, a senior privacy counselor from Noname Security shares her story as she climbed through the ranks to get to where she is toady. When Anjali started she wanted to do international law. She started working for the International Trade Commission after law school which is where she was able to gain most of her experience and gain real world abilities. Working with online fraud and abuse, she shares, concerned her because it felt like governments could not protect organizations from threats occurring, which is how she got interested in cyber crime. From there, she moved to Noname Security and working there she found that she is working with every group in the organization, creating a cross team collaboration and how much she admires that type of model. She says "We have to help other departments protect the data because the data's throughout an organization, it's in HR, it's in sales and marketing, it's in IT, it's in finance. So you have to be able to work with all these teams." We thank Anjali for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>521</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fb6e9e78-2a10-11ed-bf6b-e3cd44a6f634]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4786764846.mp3?updated=1662402003" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>LockBit's contradiction on encryption speed. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/248/notes</link>
      <description>Ryan Kovar from Splunk sits down with Dave to discuss their findings in "Truth in Malvertising?" that contradict the LockBit group's encryption speed claims. Splunk's SURGe team recently released a whitepaper, blog, and video that outlined the encryption speeds of 10 different ransomware families. During their research they cam across Lockbit doing the same thing. After completing the research, the researchers came back to test the veracity of LockBit’s findings.
The research showed three interesting finds. The first find showed that LockBit’s fastest and slowest samples were closely aligned between the tests, but the other results were very different. They also found that LockBit continues to be the fastest ransomware, but LockBit 2.0 was more efficient yet slower than its previous counterpart, LockBit 1.0. Lastly, once ransomware gets to the point of encrypting your systems, it’s too late.
The research can be found here:
Truth in Malvertising?

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Sep 2022 07:00:00 -0000</pubDate>
      <itunes:title>LockBit's contradiction on encryption speed. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>248</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ryan Kovar from Splunk sits down with Dave to discuss their findings in "Truth in Malvertising?" that contradict the LockBit group's encryption speed claims. Splunk's SURGe team recently released a whitepaper, blog, and video that outlined the encryption speeds of 10 different ransomware families. During their research they cam across Lockbit doing the same thing. After completing the research, the researchers came back to test the veracity of LockBit’s findings.
The research showed three interesting finds. The first find showed that LockBit’s fastest and slowest samples were closely aligned between the tests, but the other results were very different. They also found that LockBit continues to be the fastest ransomware, but LockBit 2.0 was more efficient yet slower than its previous counterpart, LockBit 1.0. Lastly, once ransomware gets to the point of encrypting your systems, it’s too late.
The research can be found here:
Truth in Malvertising?

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ryan Kovar from Splunk sits down with Dave to discuss their findings in "Truth in Malvertising?" that contradict the LockBit group's encryption speed claims. Splunk's SURGe team recently released a whitepaper, blog, and video that outlined the encryption speeds of 10 different ransomware families. During their research they cam across Lockbit doing the same thing. After completing the research, the researchers came back to test the veracity of LockBit’s findings.</p><p>The research showed three interesting finds. The first find showed that LockBit’s fastest and slowest samples were closely aligned between the tests, but the other results were very different. They also found that LockBit continues to be the fastest ransomware, but LockBit 2.0 was more efficient yet slower than its previous counterpart, LockBit 1.0. Lastly, once ransomware gets to the point of encrypting your systems, it’s too late.</p><p>The research can be found here:</p><ul><li><a href="https://www.splunk.com/en_us/blog/security/truth-in-malvertising.html">Truth in Malvertising?</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1189</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2ddaf204-2ace-11ed-bbb5-176c6fca6dbb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3701469743.mp3?updated=1685127128" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware groups continue to shift identities and targets. Assessments of the cyber phases of a hybrid war. Is wartime tough for criminals? Anonymous counts coup…against Moscow’s taxis.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1655/notes</link>
      <description>REvil (or an impostor, or successor) may be back. A Paris-area medical center continues to work to recover from cyber extortion. An assessment of Russian failure (or disinclination) to mount effective cyber campaigns. Cyber criminals find wartime to be a tough time. Josh Ray from Accenture looks at cyber threats to the rail industry. Our guest is Dan Murphy of Invicti making the case that not all vulnerabilities are created equal. And Yandex Taxi’s app was hacked in a nuisance attack.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/170

Selected reading.
REvil says they breached electronics giant Midea Group (Cybernews)
Paralysed French hospital fights cyber attack as hackers lower ransom demand (RFI)
French hospital hit by $10M ransomware attack, sends patients elsewhere (BleepingComputer)
Hacks tied to Russia and Ukraine war have had minor impact, researchers say (The Record by Recorded Future) 
Getting Bored of Cyberwar: Exploring the Role of the Cybercrime Underground in the Russia-Ukraine Conflict (arXiv:2208.10629v2) 
Why Russia's cyber war in Ukraine hasn't played out as predicted (New Atlas)
Cyber key in Ukraine war, says spy chief (The Canberra Times) 
Montenegro Sent Back to Analog by Unprecedented Cyber Attacks (Balkan Insight)
Montenegro blames criminal gang for cyber attacks on government (EU Reporter)
Ransomware Attack Sends Montenegro Reaching Out to NATO Partners (Bloomberg) 
“I’m tired of living in poverty” – Russian-Speaking Cyber Criminals Feeling the Economic Pinch (Digital Shadows)
Yandex Taxi hack creates huge traffic jam in Moscow (Cybernews)
Anonymous hacked Russia's largest taxi firm and caused a massive traffic jam (Daily Star)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 02 Sep 2022 20:15:00 -0000</pubDate>
      <itunes:title>Ransomware groups continue to shift identities and targets. Assessments of the cyber phases of a hybrid war. Is wartime tough for criminals? Anonymous counts coup…against Moscow’s taxis.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1655</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>REvil (or an impostor, or successor) may be back. A Paris-area medical center continues to work to recover from cyber extortion. An assessment of Russian failure (or disinclination) to mount effective cyber campaigns. Cyber criminals find wartime to be a tough time. Josh Ray from Accenture looks at cyber threats to the rail industry. Our guest is Dan Murphy of Invicti making the case that not all vulnerabilities are created equal. And Yandex Taxi’s app was hacked in a nuisance attack.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/170

Selected reading.
REvil says they breached electronics giant Midea Group (Cybernews)
Paralysed French hospital fights cyber attack as hackers lower ransom demand (RFI)
French hospital hit by $10M ransomware attack, sends patients elsewhere (BleepingComputer)
Hacks tied to Russia and Ukraine war have had minor impact, researchers say (The Record by Recorded Future) 
Getting Bored of Cyberwar: Exploring the Role of the Cybercrime Underground in the Russia-Ukraine Conflict (arXiv:2208.10629v2) 
Why Russia's cyber war in Ukraine hasn't played out as predicted (New Atlas)
Cyber key in Ukraine war, says spy chief (The Canberra Times) 
Montenegro Sent Back to Analog by Unprecedented Cyber Attacks (Balkan Insight)
Montenegro blames criminal gang for cyber attacks on government (EU Reporter)
Ransomware Attack Sends Montenegro Reaching Out to NATO Partners (Bloomberg) 
“I’m tired of living in poverty” – Russian-Speaking Cyber Criminals Feeling the Economic Pinch (Digital Shadows)
Yandex Taxi hack creates huge traffic jam in Moscow (Cybernews)
Anonymous hacked Russia's largest taxi firm and caused a massive traffic jam (Daily Star)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>REvil (or an impostor, or successor) may be back. A Paris-area medical center continues to work to recover from cyber extortion. An assessment of Russian failure (or disinclination) to mount effective cyber campaigns. Cyber criminals find wartime to be a tough time. Josh Ray from Accenture looks at cyber threats to the rail industry. Our guest is Dan Murphy of Invicti making the case that not all vulnerabilities are created equal. And Yandex Taxi’s app was hacked in a nuisance attack.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/170</p><p><br></p><h2>Selected reading.</h2><p><a href="https://cybernews.com/news/revil-claims-to-have-hit-a-fortune-500-company/">REvil says they breached electronics giant Midea Group</a> (Cybernews)</p><p><a href="https://www.rfi.fr/en/france/20220902-paralysed-french-hospital-fights-cyber-attack-as-hackers-lower-ransom-demand">Paralysed French hospital fights cyber attack as hackers lower ransom demand</a> (RFI)</p><p><a href="https://www.bleepingcomputer.com/news/security/french-hospital-hit-by-10m-ransomware-attack-sends-patients-elsewhere/">French hospital hit by $10M ransomware attack, sends patients elsewhere</a> (BleepingComputer)</p><p><a href="https://therecord.media/hacks-tied-to-russia-and-ukraine-war-have-had-minor-impact-researchers-say/">Hacks tied to Russia and Ukraine war have had minor impact, researchers say</a> (The Record by Recorded Future) </p><p><a href="https://arxiv.org/pdf/2208.10629.pdf">Getting Bored of Cyberwar: Exploring the Role of the Cybercrime Underground in the Russia-Ukraine Conflict</a> (arXiv:2208.10629v2) </p><p><a href="https://newatlas.com/military/russia-cyber-war-ukraine/">Why Russia's cyber war in Ukraine hasn't played out as predicted</a> (New Atlas)</p><p><a href="https://www.canberratimes.com.au/story/7887178/cyber-key-in-ukraine-war-says-spy-chief/">Cyber key in Ukraine war, says spy chief</a> (The Canberra Times) </p><p><a href="https://balkaninsight.com/2022/09/01/montenegro-sent-back-to-analog-by-unprecedented-cyber-attacks/">Montenegro Sent Back to Analog by Unprecedented Cyber Attacks</a> (Balkan Insight)</p><p><a href="https://www.eureporter.co/world/montenegro/2022/09/02/montenegro-blames-criminal-gang-for-cyber-attacks-on-government/">Montenegro blames criminal gang for cyber attacks on government</a> (EU Reporter)</p><p><a href="https://www.bloomberg.com/news/articles/2022-09-01/ransomware-attack-sends-montenegro-reaching-out-to-nato-partners">Ransomware Attack Sends Montenegro Reaching Out to NATO Partners</a> (Bloomberg) </p><p><a href="https://www.digitalshadows.com/blog-and-research/im-tired-of-living-in-poverty-russian-speaking-cyber-criminals-feeling-the-economic-pinch/">“I’m tired of living in poverty” – Russian-Speaking Cyber Criminals Feeling the Economic Pinch</a> (Digital Shadows)</p><p><a href="https://cybernews.com/cyber-war/hackers-created-an-enormous-traffic-jam-in-moscow/">Yandex Taxi hack creates huge traffic jam in Moscow</a> (Cybernews)</p><p><a href="https://www.dailystar.co.uk/tech/news/anonymous-hackers-take-over-russias-27891378">Anonymous hacked Russia's largest taxi firm and caused a massive traffic jam</a> (Daily Star)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1730</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[39e7ad5a-787a-11ec-abf0-6b88de257be4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9862267937.mp3?updated=1671816916" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>News on three ransomware operations: BianLian, Cuba, and Ragnar Locker. How the gangs are recruiting. Mobile app supply chain blues. Happy Insider Threat Month.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1654/notes</link>
      <description>The BianLian ransomware gang is better at coding than at the business of crime. The Attack on Montenegro seems to be ransomware. A look at Ragnar Locker's current interests. Recruiting for gangland gets allusive, but those who know, well, they know. Our guest is Dan Lanir of OPSWAT with insights on recent federal legislation supporting cyber jobs. Ben Yelin lexamines a lawsuit filed by the FTC against an online data broker. And it’s Insider Threat Month, so keep an eye on yourself.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/169

Selected reading.
BianLian Ransomware Gang Gives It a Go! ([redacted]) 
Montenegro blames criminal gang for cyber attacks on government (Reuters) 
FBI's team to investigate massive cyberattack in Montenegro (AP NEWS) 
US issues rare security alert as Montenegro battles ransomware (TechCrunch) 
Cuba ransomware group claims attack on Montenegro government (IT PRO) 
Cuba Ransomware Team claims credit for attack on Montenegro (Databreaches.net) 
Montenegro blames Cuba ransomware for cyberattack (Cybernews) 
Cybercriminals Apparently Involved in Russia-Linked Attack on Montenegro Government (SecurityWeek)
THREAT ANALYSIS REPORT: Ragnar Locker Ransomware Targeting the Energy Sector (Cybereason)
Behind the News: The Ragnar Locker Attack on Greek Natural Gas Supplier DESFA - Radiflow (Radiflow)
Mobile App Supply Chain Vulnerabilities Could Endanger Sensitive Business Information (Broadcom Software Blogs / Threat Intelligence) 
“Looking for pentesters”: How Forum Life Has Conformed to the Ransomware Ban (Digital Shadows) 
NCSC and Federal Partners Focus on Countering Risk in Digital Spaces during National Insider Threat Awareness Month 2022 (ODNI)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 01 Sep 2022 20:15:00 -0000</pubDate>
      <itunes:title>News on three ransomware operations: BianLian, Cuba, and Ragnar Locker. How the gangs are recruiting. Mobile app supply chain blues. Happy Insider Threat Month.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1654</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The BianLian ransomware gang is better at coding than at the business of crime. The Attack on Montenegro seems to be ransomware. A look at Ragnar Locker's current interests. Recruiting for gangland gets allusive, but those who know, well, they know. Our guest is Dan Lanir of OPSWAT with insights on recent federal legislation supporting cyber jobs. Ben Yelin lexamines a lawsuit filed by the FTC against an online data broker. And it’s Insider Threat Month, so keep an eye on yourself.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/169

Selected reading.
BianLian Ransomware Gang Gives It a Go! ([redacted]) 
Montenegro blames criminal gang for cyber attacks on government (Reuters) 
FBI's team to investigate massive cyberattack in Montenegro (AP NEWS) 
US issues rare security alert as Montenegro battles ransomware (TechCrunch) 
Cuba ransomware group claims attack on Montenegro government (IT PRO) 
Cuba Ransomware Team claims credit for attack on Montenegro (Databreaches.net) 
Montenegro blames Cuba ransomware for cyberattack (Cybernews) 
Cybercriminals Apparently Involved in Russia-Linked Attack on Montenegro Government (SecurityWeek)
THREAT ANALYSIS REPORT: Ragnar Locker Ransomware Targeting the Energy Sector (Cybereason)
Behind the News: The Ragnar Locker Attack on Greek Natural Gas Supplier DESFA - Radiflow (Radiflow)
Mobile App Supply Chain Vulnerabilities Could Endanger Sensitive Business Information (Broadcom Software Blogs / Threat Intelligence) 
“Looking for pentesters”: How Forum Life Has Conformed to the Ransomware Ban (Digital Shadows) 
NCSC and Federal Partners Focus on Countering Risk in Digital Spaces during National Insider Threat Awareness Month 2022 (ODNI)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The BianLian ransomware gang is better at coding than at the business of crime. The Attack on Montenegro seems to be ransomware. A look at Ragnar Locker's current interests. Recruiting for gangland gets allusive, but those who know, well, they know. Our guest is Dan Lanir of OPSWAT with insights on recent federal legislation supporting cyber jobs. Ben Yelin lexamines a lawsuit filed by the FTC against an online data broker. And it’s Insider Threat Month, so keep an eye on yourself.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/169</p><p><br></p><h2>Selected reading.</h2><p><a href="https://redacted.com/blog/bianlian-ransomware-gang-gives-it-a-go/">BianLian Ransomware Gang Gives It a Go!</a> ([redacted]) </p><p><a href="https://www.reuters.com/world/europe/montenegro-blames-criminal-gang-cyber-attacks-government-2022-08-31/">Montenegro blames criminal gang for cyber attacks on government</a> (Reuters) </p><p><a href="https://apnews.com/article/russia-ukraine-technology-hacking-montenegro-2a8eb2df87f657b6d7b9971b7419bff9">FBI's team to investigate massive cyberattack in Montenegro</a> (AP NEWS) </p><p><a href="https://techcrunch.com/2022/08/31/montenegro-ransomware-attack-embassy-warning/">US issues rare security alert as Montenegro battles ransomware</a> (TechCrunch) </p><p><a href="https://www.itpro.co.uk/security/ransomware/368918/cuba-ransomware-group-claims-attack-on-montenegro-government">Cuba ransomware group claims attack on Montenegro government</a> (IT PRO) </p><p><a href="https://www.databreaches.net/cuba-ransomware-team-claims-credit-for-attack-on-montenegro/">Cuba Ransomware Team claims credit for attack on Montenegro</a> (Databreaches.net) </p><p><a href="https://cybernews.com/cyber-war/montenegro-blames-cuba-ransomware-for-attacking-the-country/">Montenegro blames Cuba ransomware for cyberattack</a> (Cybernews) </p><p><a href="https://www.securityweek.com/cybercriminals-apparently-involved-russia-linked-attack-montenegro-government">Cybercriminals Apparently Involved in Russia-Linked Attack on Montenegro Government</a> (SecurityWeek)</p><p><a href="https://www.cybereason.com/blog/threat-analysis-report-ragnar-locker-ransomware-targeting-the-energy-sector">THREAT ANALYSIS REPORT: Ragnar Locker Ransomware Targeting the Energy Sector</a> (Cybereason)</p><p><a href="https://www.radiflow.com/blog/behind-the-news-the-ragnar-locker-attack-on-greek-natural-gas-supplier-desfa/">Behind the News: The Ragnar Locker Attack on Greek Natural Gas Supplier DESFA - Radiflow</a> (Radiflow)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/mobile-supply-chain-aws">Mobile App Supply Chain Vulnerabilities Could Endanger Sensitive Business Information</a> (Broadcom Software Blogs / Threat Intelligence) </p><p><a href="https://www.digitalshadows.com/blog-and-research/looking-for-pentesters-how-forum-life-has-conformed-to-the-ransomware-ban/">“Looking for pentesters”: How Forum Life Has Conformed to the Ransomware Ban</a> (Digital Shadows) </p><p><a href="https://www.dni.gov/index.php/ncsc-newsroom/item/2320-ncsc-and-federal-partners-focus-on-countering-risk-in-digital-spaces-during-national-insider-threat-awareness-month-2022">NCSC and Federal Partners Focus on Countering Risk in Digital Spaces during National Insider Threat Awareness Month 2022</a> (ODNI)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1839</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3a272354-787a-11ec-abf0-7b80c04f7e82]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5834361429.mp3?updated=1671816632" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Securing multi-cloud identity with orchestration. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/37/notes</link>
      <description>While multi-cloud brings significant benefits, it also poses serious security risks. And identity is the reason. Each cloud platform, such as Azure, Google, and AWS, uses proprietary identity systems, and the lack of interoperability makes it unruly to manage. These disparate systems can’t talk to each other resulting in a fragmented environment full of identity silos — the perfect way for an attacker to get in and cause destruction.
In this episode of CyberWire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined in the first half by Hash Table member Rick Doten, the CISO for Healthcare Enterprises and Centene. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor Strata Identity's CEO and Co-founder Eric Olden. Both sets of discussions center around the challenges to identity management caused by the rapid shift to multi-cloud. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 01 Sep 2022 07:00:00 -0000</pubDate>
      <itunes:title>Securing multi-cloud identity with orchestration. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>37</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>While multi-cloud brings significant benefits, it also poses serious security risks. And identity is the reason. Each cloud platform, such as Azure, Google, and AWS, uses proprietary identity systems, and the lack of interoperability makes it unruly to manage. These disparate systems can’t talk to each other resulting in a fragmented environment full of identity silos — the perfect way for an attacker to get in and cause destruction.
In this episode of CyberWire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined in the first half by Hash Table member Rick Doten, the CISO for Healthcare Enterprises and Centene. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor Strata Identity's CEO and Co-founder Eric Olden. Both sets of discussions center around the challenges to identity management caused by the rapid shift to multi-cloud. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>While multi-cloud brings significant benefits, it also poses serious security risks. And identity is the reason. Each cloud platform, such as Azure, Google, and AWS, uses proprietary identity systems, and the lack of interoperability makes it unruly to manage. These disparate systems can’t talk to each other resulting in a fragmented environment full of identity silos — the perfect way for an attacker to get in and cause destruction.</p><p>In this episode of CyberWire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined in the first half by Hash Table member Rick Doten, the CISO for Healthcare Enterprises and Centene. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor Strata Identity's CEO and Co-founder Eric Olden. Both sets of discussions center around the challenges to identity management caused by the rapid shift to multi-cloud. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1837</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[23443322-273c-11ed-88a6-4b792c961e69]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4395247508.mp3?updated=1661737390" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Malicious Chrome extensions. BEC in Kentucky. Dispatches from a hybrid war, including state-directed, partisan, and criminal action. ICS advisories. “Cosplaying” hardware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1653/notes</link>
      <description>Chrome extensions steal browser data. A business email compromise attack is under investigation in Kentucky. Belarusian Cyber Partisans claim to have a complete Belarusian passport database. Organizing a cyber militia. CISA releases twelve ICS security advisories. Our guest is Asaf Kochan of Sentra on overemphasizing “the big one.” Carole Theriault cautions against getting ahead of yourself in the cryptocurrency supply chain. Cosplaying" hardware. And Canada welcomes a new SIGINT boss.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/168

Selected reading.
Chrome extensions with 1.4 million installs steal browsing data (BleepingComputer) 
Malicious Cookie Stuffing Chrome Extensions with 1.4 Million Users (McAfee Blog) 
Police investigate electronic theft of federal funds (City of Lexington) 
FBI, Secret Service join Kentucky investigation into $4 million cybercrime theft (The Record by Recorded Future)
Russian hackers blamed for ongoing Montenegro cyberattack (Tech Monitor)
“For the 1st time in human history a #hacktivist collective obtained passport info of the ALL country's citizens.” (Cyber Partisans)
Inside the IT Army of Ukraine, ‘A Hub for Digital Resistance’ (The Record by Recorded Future) 
Ukraine takes down cybercrime group hitting crypto fraud victims (BleepingComputer) 
Hitachi Energy FACTS Control Platform (FCP) Product (CISA)
Hitachi Energy Gateway Station (GWS) Product (CISA)
Hitachi Energy MSM Product (CISA).
Hitachi Energy RTU500 series (CISA)
Fuji Electric D300win (CISA)
Honeywell ControlEdge (CISA)
Honeywell Experion LX (CISA)
Honeywell Trend Controls Inter-Controller Protocol (CISA)
Omron CX-Programmer (CISA)
PTC Kepware KEPServerEX (CISA)
Sensormatic Electronics iSTAR (CISA)
Mitsubishi Electric GT SoftGOT2000 (CISA)
Walmart Sells Fake 30TB Hard Drive That’s Actually Two Small SD Cards in a Trench Coat (Vice)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 31 Aug 2022 20:15:00 -0000</pubDate>
      <itunes:title>Malicious Chrome extensions. BEC in Kentucky. Dispatches from a hybrid war, including state-directed, partisan, and criminal action. ICS advisories. “Cosplaying” hardware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1653</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Chrome extensions steal browser data. A business email compromise attack is under investigation in Kentucky. Belarusian Cyber Partisans claim to have a complete Belarusian passport database. Organizing a cyber militia. CISA releases twelve ICS security advisories. Our guest is Asaf Kochan of Sentra on overemphasizing “the big one.” Carole Theriault cautions against getting ahead of yourself in the cryptocurrency supply chain. Cosplaying" hardware. And Canada welcomes a new SIGINT boss.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/168

Selected reading.
Chrome extensions with 1.4 million installs steal browsing data (BleepingComputer) 
Malicious Cookie Stuffing Chrome Extensions with 1.4 Million Users (McAfee Blog) 
Police investigate electronic theft of federal funds (City of Lexington) 
FBI, Secret Service join Kentucky investigation into $4 million cybercrime theft (The Record by Recorded Future)
Russian hackers blamed for ongoing Montenegro cyberattack (Tech Monitor)
“For the 1st time in human history a #hacktivist collective obtained passport info of the ALL country's citizens.” (Cyber Partisans)
Inside the IT Army of Ukraine, ‘A Hub for Digital Resistance’ (The Record by Recorded Future) 
Ukraine takes down cybercrime group hitting crypto fraud victims (BleepingComputer) 
Hitachi Energy FACTS Control Platform (FCP) Product (CISA)
Hitachi Energy Gateway Station (GWS) Product (CISA)
Hitachi Energy MSM Product (CISA).
Hitachi Energy RTU500 series (CISA)
Fuji Electric D300win (CISA)
Honeywell ControlEdge (CISA)
Honeywell Experion LX (CISA)
Honeywell Trend Controls Inter-Controller Protocol (CISA)
Omron CX-Programmer (CISA)
PTC Kepware KEPServerEX (CISA)
Sensormatic Electronics iSTAR (CISA)
Mitsubishi Electric GT SoftGOT2000 (CISA)
Walmart Sells Fake 30TB Hard Drive That’s Actually Two Small SD Cards in a Trench Coat (Vice)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chrome extensions steal browser data. A business email compromise attack is under investigation in Kentucky. Belarusian Cyber Partisans claim to have a complete Belarusian passport database. Organizing a cyber militia. CISA releases twelve ICS security advisories. Our guest is Asaf Kochan of Sentra on overemphasizing “the big one.” Carole Theriault cautions against getting ahead of yourself in the cryptocurrency supply chain. Cosplaying" hardware. And Canada welcomes a new SIGINT boss.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/168</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/security/chrome-extensions-with-14-million-installs-steal-browsing-data/">Chrome extensions with 1.4 million installs steal browsing data</a> (BleepingComputer) </p><p><a href="https://www.mcafee.com/blogs/other-blogs/mcafee-labs/malicious-cookie-stuffing-chrome-extensions-with-1-4-million-users/">Malicious Cookie Stuffing Chrome Extensions with 1.4 Million Users</a> (McAfee Blog) </p><p><a href="https://www.lexingtonky.gov/news/08-29-2022/police-investigate-electronic-theft-federal-funds">Police investigate electronic theft of federal funds</a> (City of Lexington) </p><p><a href="https://therecord.media/fbi-secret-service-join-kentucky-investigation-into-4-million-cybercrime-theft/">FBI, Secret Service join Kentucky investigation into $4 million cybercrime theft</a> (The Record by Recorded Future)</p><p><a href="https://techmonitor.ai/technology/cybersecurity/montenegro-cyberattack-russia">Russian hackers blamed for ongoing Montenegro cyberattack</a> (Tech Monitor)</p><p><a href="https://twitter.com/cpartisans/status/1564639766783692800?s=20&amp;t=NxZLeYms7j5MZO9nAYpvQQ">“For the 1st time in human history a #hacktivist collective obtained passport info of the ALL country's citizens.”</a> (Cyber Partisans)</p><p><a href="https://therecord.media/inside-the-it-army-of-ukraine-a-hub-for-digital-resistance/">Inside the IT Army of Ukraine, ‘A Hub for Digital Resistance’</a> (The Record by Recorded Future) </p><p><a href="https://www.bleepingcomputer.com/news/security/ukraine-takes-down-cybercrime-group-hitting-crypto-fraud-victims/">Ukraine takes down cybercrime group hitting crypto fraud victims</a> (BleepingComputer) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-242-01">Hitachi Energy FACTS Control Platform (FCP) Product</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-242-02">Hitachi Energy Gateway Station (GWS) Product</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-242-03">Hitachi Energy MSM Product</a> (CISA).</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-242-04">Hitachi Energy RTU500 series</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-242-05">Fuji Electric D300win</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-242-06">Honeywell ControlEdge</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-242-07">Honeywell Experion LX</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-242-08">Honeywell Trend Controls Inter-Controller Protocol</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-242-09">Omron CX-Programmer</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-242-10">PTC Kepware KEPServerEX</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-242-11">Sensormatic Electronics iSTAR</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-221-01">Mitsubishi Electric GT SoftGOT2000</a> (CISA)</p><p><a href="https://www.vice.com/en/article/akek8e/walmart-30tb-ssd-hard-drive-scam-sd-cards">Walmart Sells Fake 30TB Hard Drive That’s Actually Two Small SD Cards in a Trench Coat</a> (Vice)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1516</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[38caac24-787a-11ec-abf0-a739a3415aa7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8903843943.mp3?updated=1671816746" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage around the South China Sea. Oktapus and the Twilio compromise. Notes from Russia’s hybrid war. And the LockBit gang looks beyond double extortion.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1652/notes</link>
      <description>Cyberespionage around the South China Sea. Oktapus and the Twilio compromise. Montenegro works to recover from a Russian cyber offensive. A big Russian streaming platform sustains a data leak. Ann Johnson of the Afternoon Cyber Tea podcast speaks with Dave DeWalt of NightDragon and Jay Leek of both Syn Ventures and Clear Sky Security about cyber capital investment. Mr. Security Answer Person John Pescatore examines the allure of the healthcare industry for ransomware operators. And the LockBit gang looks beyond double extortion.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/167

Selected reading.
Rising Tide: Chasing the Currents of Espionage in the South China Sea (Proofpoint) 
Why the Twilio Breach Cuts So Deep (WIRED)
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms (Threatpost)
Hackers used Twilio breach to intercept Okta onetime passwords (SiliconANGLE)
Okta Impersonation Technique Could be Utilized by Attackers (SecurityWeek)
Ukraine launches counter-offensive to retake Kherson from Russia (The Telegraph)
Russia-Ukraine war: Kremlin insists invasion going to plan despite counterattacks; first grain ship docks in Africa – live (the Guardian)
Montenegro says Russian cyberattacks threaten key state functions (BleepingComputer)
Montenegro struggles to recover from cyberattack that officials blame on Russia (The Record by Recorded Future)
Leading Russian streaming platform suffers data leak allegedly impacting 44 million users (The Record by Recorded Future) 
LockBit ransomware mulls triple extortion following DDoS attack (SC Media)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Aug 2022 20:55:00 -0000</pubDate>
      <itunes:title>Cyberespionage around the South China Sea. Oktapus and the Twilio compromise. Notes from Russia’s hybrid war. And the LockBit gang looks beyond double extortion.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1652</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cyberespionage around the South China Sea. Oktapus and the Twilio compromise. Montenegro works to recover from a Russian cyber offensive. A big Russian streaming platform sustains a data leak. Ann Johnson of the Afternoon Cyber Tea podcast speaks with Dave DeWalt of NightDragon and Jay Leek of both Syn Ventures and Clear Sky Security about cyber capital investment. Mr. Security Answer Person John Pescatore examines the allure of the healthcare industry for ransomware operators. And the LockBit gang looks beyond double extortion.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/167

Selected reading.
Rising Tide: Chasing the Currents of Espionage in the South China Sea (Proofpoint) 
Why the Twilio Breach Cuts So Deep (WIRED)
Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms (Threatpost)
Hackers used Twilio breach to intercept Okta onetime passwords (SiliconANGLE)
Okta Impersonation Technique Could be Utilized by Attackers (SecurityWeek)
Ukraine launches counter-offensive to retake Kherson from Russia (The Telegraph)
Russia-Ukraine war: Kremlin insists invasion going to plan despite counterattacks; first grain ship docks in Africa – live (the Guardian)
Montenegro says Russian cyberattacks threaten key state functions (BleepingComputer)
Montenegro struggles to recover from cyberattack that officials blame on Russia (The Record by Recorded Future)
Leading Russian streaming platform suffers data leak allegedly impacting 44 million users (The Record by Recorded Future) 
LockBit ransomware mulls triple extortion following DDoS attack (SC Media)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyberespionage around the South China Sea. Oktapus and the Twilio compromise. Montenegro works to recover from a Russian cyber offensive. A big Russian streaming platform sustains a data leak. Ann Johnson of the Afternoon Cyber Tea podcast speaks with Dave DeWalt of NightDragon and Jay Leek of both Syn Ventures and Clear Sky Security about cyber capital investment. Mr. Security Answer Person John Pescatore examines the allure of the healthcare industry for ransomware operators. And the LockBit gang looks beyond double extortion.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/167</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.proofpoint.com/us/blog/threat-insight/chasing-currents-espionage-south-china-sea">Rising Tide: Chasing the Currents of Espionage in the South China Sea</a> (Proofpoint) </p><p><a href="https://www.wired.com/story/twilio-breach-phishing-supply-chain-attacks/">Why the Twilio Breach Cuts So Deep</a> (WIRED)</p><p><a href="https://threatpost.com/0ktapus-victimize-130-firms/180487/">Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms</a> (Threatpost)</p><p><a href="https://siliconangle.com/2022/08/29/hackers-used-twilio-breach-intercept-okta-one-time-passwords/">Hackers used Twilio breach to intercept Okta onetime passwords</a> (SiliconANGLE)</p><p><a href="https://www.securityweek.com/okta-impersonation-technique-could-be-utilized-attackers">Okta Impersonation Technique Could be Utilized by Attackers</a> (SecurityWeek)</p><p><a href="https://www.telegraph.co.uk/world-news/2022/08/29/ukraine-launches-counter-offensive-retake-kherson-russia/">Ukraine launches counter-offensive to retake Kherson from Russia</a> (The Telegraph)</p><p><a href="https://www.theguardian.com/world/live/2022/aug/30/russia-ukraine-war-ukraines-forces-launch-attacks-in-occupied-kherson-un-nuclear-team-arrives-in-kyiv-live-live">Russia-Ukraine war: Kremlin insists invasion going to plan despite counterattacks; first grain ship docks in Africa – live</a> (the Guardian)</p><p><a href="https://www.bleepingcomputer.com/news/security/montenegro-says-russian-cyberattacks-threaten-key-state-functions/">Montenegro says Russian cyberattacks threaten key state functions</a> (BleepingComputer)</p><p><a href="https://therecord.media/montenegro-struggles-to-recover-from-cyberattack-that-officials-blame-on-russia/">Montenegro struggles to recover from cyberattack that officials blame on Russia</a> (The Record by Recorded Future)</p><p><a href="https://therecord.media/leading-russian-streaming-platform-suffers-data-leak-allegedly-impacting-44-million-users/">Leading Russian streaming platform suffers data leak allegedly impacting 44 million users</a> (The Record by Recorded Future) </p><p><a href="https://www.scmagazine.com/brief/ransomware/lockbit-ransomware-mulls-triple-extortion-following-ddos-attack">LockBit ransomware mulls triple extortion following DDoS attack</a> (SC Media)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1486</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[37aedd38-787a-11ec-abf0-b72d2647674b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5152167835.mp3?updated=1671816758" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How a hybrid war spreads its cyber effects. Russian and Chinese cyber ops in Latin America. Greenwashing influence. Iranian threat actor exploits Log4j vulnerabilities against Israeli targets.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1651/notes</link>
      <description>Russian cyber operations in Southeastern Europe. The challenge of containing the cyber phases of a hybrid war. Russian and Chinese cyber activity in Latin America. Greenwashing influence operations. Rick Howard looks at risk probabilities. Dinah Davis from Arctic Wolf looks at ransomware payment myths. And an Iranian threat actor exploits Log4j vulnerabilities against Israeli targets.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/166

Selected reading.
Russia blamed for wave of hacker attacks in Southeast Europe (BNE)
Montenegro declares it is in 'hybrid war' with Russia after massive cyber attack (Metro)
Montenegro reports massive Russian cyberattack against govt (ABC News)
Montenegro Reports Massive Russian Cyberattack Against Govt (AP via SecurityWeek)
Montenegro's state infrastructure hit by cyber attack -officials (Reuters) 
Cyber Element in the Russia-Ukraine War &amp; its Global Implications (Modern Diplomacy)
Swiss secret service worried about Russian cyber operations (SWI swissinfo.ch)
China and Russia Step Up Cyber Presence in Latin America (Diálogo Américas)
Dominican Republic refuses to pay ransom after attack on agrarian institute (The Record by Recorded Future) 
China-Linked Bots Attacking Rare Earths Producer ‘Every Day’ (Bloomberg) 
Iranian Hackers Exploiting Unpatched Log4j 2 Bugs to Target Israeli Organizations (The Hacker News)
MERCURY leveraging Log4j 2 vulnerabilities in unpatched systems to target Israeli organizations (Microsoft Threat Intelligence Center)
Iran exploiting Log4j 2 weakness to attack Israel, says Microsoft (Israel Defense)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 29 Aug 2022 20:30:00 -0000</pubDate>
      <itunes:title>How a hybrid war spreads its cyber effects. Russian and Chinese cyber ops in Latin America. Greenwashing influence. Iranian threat actor exploits Log4j vulnerabilities against Israeli targets.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1651</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Russian cyber operations in Southeastern Europe. The challenge of containing the cyber phases of a hybrid war. Russian and Chinese cyber activity in Latin America. Greenwashing influence operations. Rick Howard looks at risk probabilities. Dinah Davis from Arctic Wolf looks at ransomware payment myths. And an Iranian threat actor exploits Log4j vulnerabilities against Israeli targets.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/166

Selected reading.
Russia blamed for wave of hacker attacks in Southeast Europe (BNE)
Montenegro declares it is in 'hybrid war' with Russia after massive cyber attack (Metro)
Montenegro reports massive Russian cyberattack against govt (ABC News)
Montenegro Reports Massive Russian Cyberattack Against Govt (AP via SecurityWeek)
Montenegro's state infrastructure hit by cyber attack -officials (Reuters) 
Cyber Element in the Russia-Ukraine War &amp; its Global Implications (Modern Diplomacy)
Swiss secret service worried about Russian cyber operations (SWI swissinfo.ch)
China and Russia Step Up Cyber Presence in Latin America (Diálogo Américas)
Dominican Republic refuses to pay ransom after attack on agrarian institute (The Record by Recorded Future) 
China-Linked Bots Attacking Rare Earths Producer ‘Every Day’ (Bloomberg) 
Iranian Hackers Exploiting Unpatched Log4j 2 Bugs to Target Israeli Organizations (The Hacker News)
MERCURY leveraging Log4j 2 vulnerabilities in unpatched systems to target Israeli organizations (Microsoft Threat Intelligence Center)
Iran exploiting Log4j 2 weakness to attack Israel, says Microsoft (Israel Defense)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russian cyber operations in Southeastern Europe. The challenge of containing the cyber phases of a hybrid war. Russian and Chinese cyber activity in Latin America. Greenwashing influence operations. Rick Howard looks at risk probabilities. Dinah Davis from Arctic Wolf looks at ransomware payment myths. And an Iranian threat actor exploits Log4j vulnerabilities against Israeli targets.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/166</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bne.eu/russia-blamed-for-wave-of-hacker-attacks-in-southeast-europe-254765/?source=albania">Russia blamed for wave of hacker attacks in Southeast Europe</a> (BNE)</p><p><a href="https://metro.co.uk/2022/08/27/montenegro-accuses-russia-of-massive-cyber-attack-17255128/">Montenegro declares it is in 'hybrid war' with Russia after massive cyber attack</a> (Metro)</p><p><a href="https://abcnews.go.com/Business/wireStory/montenegro-reports-massive-russian-cyberattack-govt-88902516">Montenegro reports massive Russian cyberattack against govt</a> (ABC News)</p><p><a href="https://www.securityweek.com/montenegro-reports-massive-russian-cyberattack-against-govt">Montenegro Reports Massive Russian Cyberattack Against Govt</a> (AP via SecurityWeek)</p><p><a href="https://www.reuters.com/world/europe/montenegros-state-infrastructure-hit-by-cyber-attack-officials-2022-08-26/">Montenegro's state infrastructure hit by cyber attack -officials</a> (Reuters) </p><p><a href="https://moderndiplomacy.eu/2022/08/28/cyber-element-in-the-russia-ukraine-war-its-global-implications/">Cyber Element in the Russia-Ukraine War &amp; its Global Implications</a> (Modern Diplomacy)</p><p><a href="https://www.swissinfo.ch/eng/swiss-secret-service-concerned-about-russian-cyber-operations/47858380">Swiss secret service worried about Russian cyber operations</a> (SWI swissinfo.ch)</p><p><a href="https://dialogo-americas.com/articles/china-and-russia-step-up-cyber-presence-in-latin-america/">China and Russia Step Up Cyber Presence in Latin America</a> (Diálogo Américas)</p><p><a href="https://therecord.media/dominican-republic-refuses-to-pay-ransom-after-attack-on-agrarian-institute/">Dominican Republic refuses to pay ransom after attack on agrarian institute</a> (The Record by Recorded Future) </p><p><a href="https://www.bloomberg.com/news/articles/2022-08-27/china-linked-bots-attacking-rare-earths-producer-every-day">China-Linked Bots Attacking Rare Earths Producer ‘Every Day’</a> (Bloomberg) </p><p><a href="https://thehackernews.com/2022/08/iranian-hackers-exploiting-unpatched.html">Iranian Hackers Exploiting Unpatched Log4j 2 Bugs to Target Israeli Organizations</a> (The Hacker News)</p><p><a href="https://www.microsoft.com/security/blog/2022/08/25/mercury-leveraging-log4j-2-vulnerabilities-in-unpatched-systems-to-target-israeli-organizations/">MERCURY leveraging Log4j 2 vulnerabilities in unpatched systems to target Israeli organizations</a> (Microsoft Threat Intelligence Center)</p><p><a href="https://www.israeldefense.co.il/en/node/55602">Iran exploiting Log4j 2 weakness to attack Israel, says Microsoft</a> (Israel Defense)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1395</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[378f526a-787a-11ec-abf0-d36195d3717d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3858081109.mp3?updated=1671816797" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>David Nosibor: Taking calculated risks. [Product Lead] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/114/notes</link>
      <description>David Nosibor, Product Lead for SafeCyber at UL Solutions, started his career in a unique way by not letting himself be pigeonholed. Within his company, David was able to grow to the position he is in now and says that his position feels like a lot of roles tied into one. He says that on any given day he is tackling all sorts of elements, such as marketing, operations, working with the engineering team, figuring out ways to acquire customers, retain them, and also working on sales and business development capabilities. He also says that constantly learning and getting new opportunities was how he ended up being where he is today. David states that staying focused and being on the lookout for ways to accomplish the mission is the best way for him in his company to democratize product security. He quotes the famous singer Sean Carter in saying that he firmly believes in taking calculated risks to get where you need to be going. We thank David for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 28 Aug 2022 07:00:00 -0000</pubDate>
      <itunes:title>David Nosibor: Taking calculated risks. [Product Lead] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>114</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>David Nosibor, Product Lead for SafeCyber at UL Solutions, started his career in a unique way by not letting himself be pigeonholed. Within his company, David was able to grow to the position he is in now and says that his position feels like a lot of roles tied into one. He says that on any given day he is tackling all sorts of elements, such as marketing, operations, working with the engineering team, figuring out ways to acquire customers, retain them, and also working on sales and business development capabilities. He also says that constantly learning and getting new opportunities was how he ended up being where he is today. David states that staying focused and being on the lookout for ways to accomplish the mission is the best way for him in his company to democratize product security. He quotes the famous singer Sean Carter in saying that he firmly believes in taking calculated risks to get where you need to be going. We thank David for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>David Nosibor, Product Lead for SafeCyber at UL Solutions, started his career in a unique way by not letting himself be pigeonholed. Within his company, David was able to grow to the position he is in now and says that his position feels like a lot of roles tied into one. He says that on any given day he is tackling all sorts of elements, such as marketing, operations, working with the engineering team, figuring out ways to acquire customers, retain them, and also working on sales and business development capabilities. He also says that constantly learning and getting new opportunities was how he ended up being where he is today. David states that staying focused and being on the lookout for ways to accomplish the mission is the best way for him in his company to democratize product security. He quotes the famous singer Sean Carter in saying that he firmly believes in taking calculated risks to get where you need to be going. We thank David for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>411</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[23e07af2-24a3-11ed-9f13-1b644003fd67]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9537637690.mp3?updated=1661450991" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How a wide scale Facebook campaign stole 1 million credentials. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/247/notes</link>
      <description>Nick Ascoli from ForeTrace in a partnership with PIXM sits down with Dave to provide insight on their team's work on "Phishing tactics: how a threat actor stole 1 million credentials in 4 months." During routine analysis, researchers discovered the connection between the pages using PIXM’s deep html analysis feature, which enabled them to view and analyze the underlying code on the pages after they were flagged as phishing. This led to the ensuing investigation, which was led by PIXM’s threat research team with assistance from Nick Ascoli.
The research states "we uncovered a campaign whose scale has potentially impacted hundreds of millions of facebook users, and whose complexity offer insight into the evolving nature of phishing operations, especially from a technical perspective."
The research can be found here:
Phishing tactics: how a threat actor stole 1M credentials in 4 months

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Aug 2022 07:00:00 -0000</pubDate>
      <itunes:title>How a wide scale Facebook campaign stole 1 million credentials. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>247</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Nick Ascoli from ForeTrace in a partnership with PIXM sits down with Dave to provide insight on their team's work on "Phishing tactics: how a threat actor stole 1 million credentials in 4 months." During routine analysis, researchers discovered the connection between the pages using PIXM’s deep html analysis feature, which enabled them to view and analyze the underlying code on the pages after they were flagged as phishing. This led to the ensuing investigation, which was led by PIXM’s threat research team with assistance from Nick Ascoli.
The research states "we uncovered a campaign whose scale has potentially impacted hundreds of millions of facebook users, and whose complexity offer insight into the evolving nature of phishing operations, especially from a technical perspective."
The research can be found here:
Phishing tactics: how a threat actor stole 1M credentials in 4 months

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Nick Ascoli from ForeTrace in a partnership with PIXM sits down with Dave to provide insight on their team's work on "Phishing tactics: how a threat actor stole 1 million credentials in 4 months." During routine analysis, researchers discovered the connection between the pages using PIXM’s deep html analysis feature, which enabled them to view and analyze the underlying code on the pages after they were flagged as phishing. This led to the ensuing investigation, which was led by PIXM’s threat research team with assistance from Nick Ascoli.</p><p>The research states "we uncovered a campaign whose scale has potentially impacted hundreds of millions of facebook users, and whose complexity offer insight into the evolving nature of phishing operations, especially from a technical perspective."</p><p>The research can be found here:</p><ul><li><a href="https://pixmsecurity.com/blog/blog/phishing-tactics-how-a-threat-actor-stole-1m-credentials-in-4-months/">Phishing tactics: how a threat actor stole 1M credentials in 4 months</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1462</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4c36adb6-254b-11ed-9d52-0b02ec9610a0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3825785550.mp3?updated=1685127120" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A Black Basta update. Okta talks Scatter Swine. Nobelium's MagicWeb. Wartime stress in the cyber underworld. LastPass security incident. CISA adds to its Known Exploited Vulnerabilities Catalog. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1650/notes</link>
      <description>Palo Alto describes the Black Basta ransomware-as-a-service operation. Okta on Scatter Swine, the threat actor that compromised Twilio. Microsoft describes Nobelium's new approach to establishing persistence. Russia's war against Ukraine has induced stresses in the cyber underworld. LastPass discloses a security incident. Josh Ray from Accenture on cyber crime and the cost-of-living crisis. Our own Dave Bittner sits down with Chris Handman from TerraTrue to discuss how he works to transform legal teams into advocates and collaborators that can ensure privacy is baked in every step of the way. And CISA adds ten entries to its Known Exploited Vulnerabilities Catalog.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/165

Selected reading.
Threat Assessment: Black Basta Ransomware (Palo Alto Networks Unit 42)
MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone (Microsoft Threat Intelligence Center)
Microsoft Uncovers New Post-Compromise Malware Used by Nobelium Hackers (The Hacker News)
Microsoft: Russian hackers gain powerful 'MagicWeb' authentication bypass (ZDNET)
Detecting Scatter Swine: Insights into a relentless phishing campaign (Okta Security)
Twilio hackers hit over 130 orgs in massive Okta phishing attack (BleepingComputer)
Twilio says breach also compromised Authy two-factor app users (TechCrunch)
How the war in Ukraine is reshaping the dark web (New Statesman)
Notice of Recent Security Incident (The LastPass Blog)
LastPass Says Source Code Stolen in Data Breach (SecurityWeek)
LastPass developer systems hacked to steal source code (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 26 Aug 2022 20:30:00 -0000</pubDate>
      <itunes:title>A Black Basta update. Okta talks Scatter Swine. Nobelium's MagicWeb. Wartime stress in the cyber underworld. LastPass security incident. CISA adds to its Known Exploited Vulnerabilities Catalog. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1650</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Palo Alto describes the Black Basta ransomware-as-a-service operation. Okta on Scatter Swine, the threat actor that compromised Twilio. Microsoft describes Nobelium's new approach to establishing persistence. Russia's war against Ukraine has induced stresses in the cyber underworld. LastPass discloses a security incident. Josh Ray from Accenture on cyber crime and the cost-of-living crisis. Our own Dave Bittner sits down with Chris Handman from TerraTrue to discuss how he works to transform legal teams into advocates and collaborators that can ensure privacy is baked in every step of the way. And CISA adds ten entries to its Known Exploited Vulnerabilities Catalog.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/165

Selected reading.
Threat Assessment: Black Basta Ransomware (Palo Alto Networks Unit 42)
MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone (Microsoft Threat Intelligence Center)
Microsoft Uncovers New Post-Compromise Malware Used by Nobelium Hackers (The Hacker News)
Microsoft: Russian hackers gain powerful 'MagicWeb' authentication bypass (ZDNET)
Detecting Scatter Swine: Insights into a relentless phishing campaign (Okta Security)
Twilio hackers hit over 130 orgs in massive Okta phishing attack (BleepingComputer)
Twilio says breach also compromised Authy two-factor app users (TechCrunch)
How the war in Ukraine is reshaping the dark web (New Statesman)
Notice of Recent Security Incident (The LastPass Blog)
LastPass Says Source Code Stolen in Data Breach (SecurityWeek)
LastPass developer systems hacked to steal source code (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Palo Alto describes the Black Basta ransomware-as-a-service operation. Okta on Scatter Swine, the threat actor that compromised Twilio. Microsoft describes Nobelium's new approach to establishing persistence. Russia's war against Ukraine has induced stresses in the cyber underworld. LastPass discloses a security incident. Josh Ray from Accenture on cyber crime and the cost-of-living crisis. Our own Dave Bittner sits down with Chris Handman from TerraTrue to discuss how he works to transform legal teams into advocates and collaborators that can ensure privacy is baked in every step of the way. And CISA adds ten entries to its Known Exploited Vulnerabilities Catalog.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/165</p><p><br></p><h2>Selected reading.</h2><p><a href="https://unit42.paloaltonetworks.com/threat-assessment-black-basta-ransomware/">Threat Assessment: Black Basta Ransomware</a> (Palo Alto Networks Unit 42)</p><p><a href="https://www.microsoft.com/security/blog/2022/08/24/magicweb-nobeliums-post-compromise-trick-to-authenticate-as-anyone/">MagicWeb: NOBELIUM’s post-compromise trick to authenticate as anyone</a> (Microsoft Threat Intelligence Center)</p><p><a href="https://thehackernews.com/2022/08/microsoft-uncovers-new-post-compromise.html">Microsoft Uncovers New Post-Compromise Malware Used by Nobelium Hackers</a> (The Hacker News)</p><p><a href="https://www.zdnet.com/article/microsoft-solarwinds-hackers-gain-powerful-magicweb-authentication-bypass/">Microsoft: Russian hackers gain powerful 'MagicWeb' authentication bypass</a> (ZDNET)</p><p><a href="https://sec.okta.com/scatterswine">Detecting Scatter Swine: Insights into a relentless phishing campaign</a> (Okta Security)</p><p><a href="https://www.bleepingcomputer.com/news/security/twilio-hackers-hit-over-130-orgs-in-massive-okta-phishing-attack/">Twilio hackers hit over 130 orgs in massive Okta phishing attack</a> (BleepingComputer)</p><p><a href="https://techcrunch.com/2022/08/26/twilio-breach-authy/">Twilio says breach also compromised Authy two-factor app users</a> (TechCrunch)</p><p><a href="https://www.newstatesman.com/spotlight/cyber/2022/08/ukraine-war-cyber-attacks-the-dark-web">How the war in Ukraine is reshaping the dark web</a> (New Statesman)</p><p><a href="https://blog.lastpass.com/2022/08/notice-of-recent-security-incident/">Notice of Recent Security Incident</a> (The LastPass Blog)</p><p><a href="https://www.securityweek.com/lastpass-says-source-code-stolen-data-breach">LastPass Says Source Code Stolen in Data Breach</a> (SecurityWeek)</p><p><a href="https://www.bleepingcomputer.com/news/security/lastpass-developer-systems-hacked-to-steal-source-code/">LastPass developer systems hacked to steal source code</a> (BleepingComputer)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1589</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[39c815da-787a-11ec-abf0-93e09b06c9a0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1247436577.mp3?updated=1671816941" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Notes from six months of hybrid war. Oktapus criminal campaign. Exotic Lily and Bumblebee Loader. Insights derived from DNS traffic. US DHS shutters its Disinformation Governance Board.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1649/notes</link>
      <description>Ukrainian and Russian cyber operations at six months. Oktapus criminal campaign compromises 9931 accounts in more than 130 organizations. Exotic Lily and Bumblebee Loader. Insights derived from DNS traffic. Chris Novak from Verizon on DHS Cyber Safety Review Board's report on the Log4j investigation that Verizon conducted. Dave Bittner sits down with our guest Dr. Scott Crowder, CTO and VP, Quantum Computing, Technical Strategy and Transformation for IBM Systems to discuss the increasingly urgent need for industries to prepare for security threats that quantum could unleash. And the US Department of Homeland Security shutters its Disinformation Governance Board.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/164

Selected reading.
How Ukraine used Russia’s digital playbook against the Kremlin (POLITICO)
Ukraine's volunteer 'IT army' responds to Russian hackers, minister says (ABC News) 
Overview of the Cyber Weapons Used in the Ukraine - Russia War (Trustwave) 
How Russia-Ukraine cyberwar is impacting orgs: Two-thirds say they have been targeted (VentureBeat)
Twilio hackers breached over 130 organizations during months-long hacking spree (TechCrunch)
Roasting 0ktapus: The phishing campaign going after Okta identity credentials (Group-IB)
Bumblebee Malware Loader: Deep Instinct Prevents Attack Pre-Execution (Deep Instinct)
Akamai’s Insights on DNS in Q2 2022 (Akamai)
Following HSAC Recommendation, DHS terminates Disinformation Governance Board (US Department of Homeland Security)
Homeland Security Scraps Disinformation Board Attacked by GOP (Bloomberg)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 25 Aug 2022 20:15:00 -0000</pubDate>
      <itunes:title>Notes from six months of hybrid war. Oktapus criminal campaign. Exotic Lily and Bumblebee Loader. Insights derived from DNS traffic. US DHS shutters its Disinformation Governance Board.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1649</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ukrainian and Russian cyber operations at six months. Oktapus criminal campaign compromises 9931 accounts in more than 130 organizations. Exotic Lily and Bumblebee Loader. Insights derived from DNS traffic. Chris Novak from Verizon on DHS Cyber Safety Review Board's report on the Log4j investigation that Verizon conducted. Dave Bittner sits down with our guest Dr. Scott Crowder, CTO and VP, Quantum Computing, Technical Strategy and Transformation for IBM Systems to discuss the increasingly urgent need for industries to prepare for security threats that quantum could unleash. And the US Department of Homeland Security shutters its Disinformation Governance Board.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/164

Selected reading.
How Ukraine used Russia’s digital playbook against the Kremlin (POLITICO)
Ukraine's volunteer 'IT army' responds to Russian hackers, minister says (ABC News) 
Overview of the Cyber Weapons Used in the Ukraine - Russia War (Trustwave) 
How Russia-Ukraine cyberwar is impacting orgs: Two-thirds say they have been targeted (VentureBeat)
Twilio hackers breached over 130 organizations during months-long hacking spree (TechCrunch)
Roasting 0ktapus: The phishing campaign going after Okta identity credentials (Group-IB)
Bumblebee Malware Loader: Deep Instinct Prevents Attack Pre-Execution (Deep Instinct)
Akamai’s Insights on DNS in Q2 2022 (Akamai)
Following HSAC Recommendation, DHS terminates Disinformation Governance Board (US Department of Homeland Security)
Homeland Security Scraps Disinformation Board Attacked by GOP (Bloomberg)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ukrainian and Russian cyber operations at six months. Oktapus criminal campaign compromises 9931 accounts in more than 130 organizations. Exotic Lily and Bumblebee Loader. Insights derived from DNS traffic. Chris Novak from Verizon on DHS Cyber Safety Review Board's report on the Log4j investigation that Verizon conducted. Dave Bittner sits down with our guest Dr. Scott Crowder, CTO and VP, Quantum Computing, Technical Strategy and Transformation for IBM Systems to discuss the increasingly urgent need for industries to prepare for security threats that quantum could unleash. And the US Department of Homeland Security shutters its Disinformation Governance Board.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/164</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.politico.eu/article/ukraine-russia-digital-playbook-war/">How Ukraine used Russia’s digital playbook against the Kremlin</a> (POLITICO)</p><p><a href="https://abcnews.go.com/International/ukraines-volunteer-army-responds-russian-hackers-minister/story?id=88651955">Ukraine's volunteer 'IT army' responds to Russian hackers, minister says</a> (ABC News) </p><p><a href="https://www.trustwave.com/en-us/resources/blogs/trustwave-blog/overview-of-the-cyber-weapons-used-in-the-ukraine-russia-war/">Overview of the Cyber Weapons Used in the Ukraine - Russia War</a> (Trustwave) </p><p><a href="https://venturebeat.com/security/impact-cyber-war/">How Russia-Ukraine cyberwar is impacting orgs: Two-thirds say they have been targeted</a> (VentureBeat)</p><p><a href="https://techcrunch.com/2022/08/25/twilio-hackers-group-ib/">Twilio hackers breached over 130 organizations during months-long hacking spree</a> (TechCrunch)</p><p><a href="https://blog.group-ib.com/0ktapus">Roasting 0ktapus: The phishing campaign going after Okta identity credentials</a> (Group-IB)</p><p><a href="https://www.deepinstinct.com/blog/the-dark-side-of-bumblebee-malware-loader">Bumblebee Malware Loader: Deep Instinct Prevents Attack Pre-Execution</a> (Deep Instinct)</p><p><a href="https://www.akamai.com/blog/security-research/q2-dns-akamai-insights">Akamai’s Insights on DNS in Q2 2022</a> (Akamai)</p><p><a href="https://www.dhs.gov/news/2022/08/24/following-hsac-recommendation-dhs-terminates-disinformation-governance-board">Following HSAC Recommendation, DHS terminates Disinformation Governance Board </a>(US Department of Homeland Security)</p><p><a href="https://www.bloomberg.com/news/articles/2022-08-25/homeland-security-scraps-disinformation-board-attacked-by-gop">Homeland Security Scraps Disinformation Board Attacked by GOP</a> (Bloomberg)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1608</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[38ea32ce-787a-11ec-abf0-a3e883ef903b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8209049847.mp3?updated=1671816958" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware attack hits a French hospital. Lessons for the fifth domain from six months of hybrid war. Deepfake scams have arrived. Threat actors prepare to exploit Hikvision camera vulnerability.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1648/notes</link>
      <description>A medical center near Paris comes under ransomware attack, and refuses to pay up. Lessons for the fifth domain from six months of hybrid war. Deepfake scams appear to have arrived. Deepen Desai from Zscaler with introduction to our audience. Dave Bittner sits down with Gil Hoffer, CTO and Co-founder of Salto to discuss “Who Hacked Slack?.” And Threat actors prepare to exploit Hikvision camera vulnerability.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/163

Selected reading.
Cyber attackers disrupt services at French hospital, demand $10 million ransom (France 24)
French hospital hit by $10M ransomware attack, sends patients elsewhere (BleepingComputer)
DECLENCHEMENT DU PLAN BLANC DIMANCHE 21 AOUT 2022 (CHSF - Centre Hospitalier Sud Francilien)
Ukraine at D+181: Independence Day and six months of war. (CyberWire) 
Six months, twenty-three lessons: What the world has learned from Russia’s war in Ukraine (Atlantic Council) 
Hackers Used Deepfake of Binance CCO to Perform Exchange Listing Scams (Bitcoin News)
Hackers Use Deepfakes of Binance Exec to Scam Multiple Crypto Projects (Gizmodo) 
Binance's CEO said thousands of people are falsely claiming to be his employees on LinkedIn. Experts warn it's an example of the platform's growing problem with fake accounts. (Business Insider)
Twitter’s Ex-Security Head Files Whistleblower Complaint (Wall Street Journal)
Twitter is vulnerable to Russian and Chinese influence, whistleblower says (CNN)
Over 80,000 exploitable Hikvision cameras exposed online (BleepingComputer)
Experts warn of widespread exploitation involving Hikvision cameras (The Record by Recorded Future) 
Hikvision Surveillance Cameras Vulnerabilities (CYFIRMA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 24 Aug 2022 20:20:00 -0000</pubDate>
      <itunes:title>Ransomware attack hits a French hospital. Lessons for the fifth domain from six months of hybrid war. Deepfake scams have arrived. Threat actors prepare to exploit Hikvision camera vulnerability.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1648</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A medical center near Paris comes under ransomware attack, and refuses to pay up. Lessons for the fifth domain from six months of hybrid war. Deepfake scams appear to have arrived. Deepen Desai from Zscaler with introduction to our audience. Dave Bittner sits down with Gil Hoffer, CTO and Co-founder of Salto to discuss “Who Hacked Slack?.” And Threat actors prepare to exploit Hikvision camera vulnerability.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/163

Selected reading.
Cyber attackers disrupt services at French hospital, demand $10 million ransom (France 24)
French hospital hit by $10M ransomware attack, sends patients elsewhere (BleepingComputer)
DECLENCHEMENT DU PLAN BLANC DIMANCHE 21 AOUT 2022 (CHSF - Centre Hospitalier Sud Francilien)
Ukraine at D+181: Independence Day and six months of war. (CyberWire) 
Six months, twenty-three lessons: What the world has learned from Russia’s war in Ukraine (Atlantic Council) 
Hackers Used Deepfake of Binance CCO to Perform Exchange Listing Scams (Bitcoin News)
Hackers Use Deepfakes of Binance Exec to Scam Multiple Crypto Projects (Gizmodo) 
Binance's CEO said thousands of people are falsely claiming to be his employees on LinkedIn. Experts warn it's an example of the platform's growing problem with fake accounts. (Business Insider)
Twitter’s Ex-Security Head Files Whistleblower Complaint (Wall Street Journal)
Twitter is vulnerable to Russian and Chinese influence, whistleblower says (CNN)
Over 80,000 exploitable Hikvision cameras exposed online (BleepingComputer)
Experts warn of widespread exploitation involving Hikvision cameras (The Record by Recorded Future) 
Hikvision Surveillance Cameras Vulnerabilities (CYFIRMA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A medical center near Paris comes under ransomware attack, and refuses to pay up. Lessons for the fifth domain from six months of hybrid war. Deepfake scams appear to have arrived. Deepen Desai from Zscaler with introduction to our audience. Dave Bittner sits down with Gil Hoffer, CTO and Co-founder of Salto to discuss “Who Hacked Slack?.” And Threat actors prepare to exploit Hikvision camera vulnerability.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/163</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.france24.com/en/europe/20220823-cyber-attackers-disrupt-services-at-french-hospital-demand-10-million-ransom">Cyber attackers disrupt services at French hospital, demand $10 million ransom</a> (France 24)</p><p><a href="https://www.bleepingcomputer.com/news/security/french-hospital-hit-by-10m-ransomware-attack-sends-patients-elsewhere/">French hospital hit by $10M ransomware attack, sends patients elsewhere</a> (BleepingComputer)</p><p><a href="https://www.chsf.fr/declenchement-du-plan-blanc-dimanche-21-aout-2022/">DECLENCHEMENT DU PLAN BLANC DIMANCHE 21 AOUT 2022</a> (CHSF - Centre Hospitalier Sud Francilien)</p><p><a href="https://thecyberwire.com/stories/88c9c2a9740241abb0c3ef7ce2556f8e/ukraine-at-d181-independence-day-and-six-months-of-war">Ukraine at D+181: Independence Day and six months of war.</a> (CyberWire) </p><p><a href="https://www.atlanticcouncil.org/blogs/new-atlanticist/six-months-twenty-three-lessons-what-the-world-has-learned-from-russias-war-in-ukraine/">Six months, twenty-three lessons: What the world has learned from Russia’s war in Ukraine</a> (Atlantic Council) </p><p><a href="https://news.bitcoin.com/hackers-used-deepfake-of-binance-cco-to-perform-exchange-listing-scams/">Hackers Used Deepfake of Binance CCO to Perform Exchange Listing Scams</a> (Bitcoin News)</p><p><a href="https://gizmodo.com/crypto-binance-deepfakes-1849447018">Hackers Use Deepfakes of Binance Exec to Scam Multiple Crypto Projects</a> (Gizmodo) </p><p><a href="https://www.businessinsider.com/linkedin-fake-account-binance-crypto-scam-work-report-2022-8">Binance's CEO said thousands of people are falsely claiming to be his employees on LinkedIn. Experts warn it's an example of the platform's growing problem with fake accounts.</a> (Business Insider)</p><p><a href="https://www.wsj.com/articles/twitters-ex-security-head-files-whistleblower-complaint-11661263009">Twitter’s Ex-Security Head Files Whistleblower Complaint </a>(Wall Street Journal)</p><p><a href="https://www.cnn.com/2022/08/23/tech/twitter-foreign-intel-problem/index.html">Twitter is vulnerable to Russian and Chinese influence, whistleblower says</a> (CNN)</p><p><a href="https://www.bleepingcomputer.com/news/security/over-80-000-exploitable-hikvision-cameras-exposed-online/">Over 80,000 exploitable Hikvision cameras exposed online</a> (BleepingComputer)</p><p><a href="https://therecord.media/experts-warn-of-widespread-exploitation-involving-hikvision-cameras/">Experts warn of widespread exploitation involving Hikvision cameras</a> (The Record by Recorded Future) </p><p><a href="https://www.cyfirma.com/hikvision-surveillance-cameras-vulnerabilities/">Hikvision Surveillance Cameras Vulnerabilities</a> (CYFIRMA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1636</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[38ab3100-787a-11ec-abf0-ff434179e1e4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9474554666.mp3?updated=1671817056" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Iranian APT data extraction tool described. LockBit gang comes under DDoS. Twitter whistleblower security claims made public. Greek natural gas supplier under cyberattack. Updates on a hybrid war.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1647/notes</link>
      <description>Iranian APT data extraction tool described. LockBit gang comes under DDoS. Twitter whistleblower security claims made public. Poland and Ukraine conclude cybersecurity agreement. Greek national natural gas supplier under criminal cyberattack. Update to the Joint Alert on Zimbra exploitation. Addition to CISA's Known Exploited Vulnerabilities Catalog. Johannes Ullrich from SANS on Control Plane vs. Data Plane vulnerabilities. Our guest is David Nosibor, Platform Solutions Lead for UL to discuss SafeCyber Phase II. And, finally, targeting and trolling, with an excursus on Speedos. Really.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/162

Selected reading.
New Iranian APT data extraction tool (Google)
LockBit gang hit by DDoS attack after Entrust leaks (Register) 
Former security chief claims Twitter buried ‘egregious deficiencies’ (Washington Post) 
Ex-Twitter exec blows the whistle, alleging reckless and negligent cybersecurity policies (CNN) 
Twitter’s Ex-Security Head Files Whistleblower Complaint (Wall Street Journal)
Deception, Bots, and Foreign Agents: The Twitter Whistleblower’s Biggest Allegations (Time)
The Ministry of Digital Transformation, State Service of Special Communication and Information Protection and the Council of Ministers of the Republic of Poland signed Memorandum of understanding in the cybersecurity field. (State Service of Special Communication and Information Protection) 
Greek natural gas operator suffers ransomware-related data breach (BleepingComputer) 
Greek gas operator refuses to negotiate with ransomware group after attack (The Record by Recorded Future)
Announcement | (DESF)
Threat Actors Exploiting Multiple CVEs Against Zimbra Collaboration Suite (CISA) 
US government really hopes you've patched your Zimbra server (Register)
CISA Adds One Known Exploited Vulnerabilities to Catalog (CISA) 
Speedo-wearing Russian tourists leak defence secrets on Twitter (The Telegraph)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Aug 2022 20:40:00 -0000</pubDate>
      <itunes:title>Iranian APT data extraction tool described. LockBit gang comes under DDoS. Twitter whistleblower security claims made public. Greek natural gas supplier under cyberattack. Updates on a hybrid war.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1647</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Iranian APT data extraction tool described. LockBit gang comes under DDoS. Twitter whistleblower security claims made public. Poland and Ukraine conclude cybersecurity agreement. Greek national natural gas supplier under criminal cyberattack. Update to the Joint Alert on Zimbra exploitation. Addition to CISA's Known Exploited Vulnerabilities Catalog. Johannes Ullrich from SANS on Control Plane vs. Data Plane vulnerabilities. Our guest is David Nosibor, Platform Solutions Lead for UL to discuss SafeCyber Phase II. And, finally, targeting and trolling, with an excursus on Speedos. Really.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/162

Selected reading.
New Iranian APT data extraction tool (Google)
LockBit gang hit by DDoS attack after Entrust leaks (Register) 
Former security chief claims Twitter buried ‘egregious deficiencies’ (Washington Post) 
Ex-Twitter exec blows the whistle, alleging reckless and negligent cybersecurity policies (CNN) 
Twitter’s Ex-Security Head Files Whistleblower Complaint (Wall Street Journal)
Deception, Bots, and Foreign Agents: The Twitter Whistleblower’s Biggest Allegations (Time)
The Ministry of Digital Transformation, State Service of Special Communication and Information Protection and the Council of Ministers of the Republic of Poland signed Memorandum of understanding in the cybersecurity field. (State Service of Special Communication and Information Protection) 
Greek natural gas operator suffers ransomware-related data breach (BleepingComputer) 
Greek gas operator refuses to negotiate with ransomware group after attack (The Record by Recorded Future)
Announcement | (DESF)
Threat Actors Exploiting Multiple CVEs Against Zimbra Collaboration Suite (CISA) 
US government really hopes you've patched your Zimbra server (Register)
CISA Adds One Known Exploited Vulnerabilities to Catalog (CISA) 
Speedo-wearing Russian tourists leak defence secrets on Twitter (The Telegraph)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iranian APT data extraction tool described. LockBit gang comes under DDoS. Twitter whistleblower security claims made public. Poland and Ukraine conclude cybersecurity agreement. Greek national natural gas supplier under criminal cyberattack. Update to the Joint Alert on Zimbra exploitation. Addition to CISA's Known Exploited Vulnerabilities Catalog. Johannes Ullrich from SANS on Control Plane vs. Data Plane vulnerabilities. Our guest is David Nosibor, Platform Solutions Lead for UL to discuss SafeCyber Phase II. And, finally, targeting and trolling, with an excursus on Speedos. Really.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/162</p><p><br></p><h2>Selected reading.</h2><p><a href="https://blog.google/threat-analysis-group/new-iranian-apt-data-extraction-tool/">New Iranian APT data extraction tool</a> (Google)</p><p><a href="https://www.theregister.com/2022/08/22/entrust_lockbit_ddos_ransomware/">LockBit gang hit by DDoS attack after Entrust leaks</a> (Register) </p><p><a href="https://www.washingtonpost.com/technology/interactive/2022/twitter-whistleblower-sec-spam/">Former security chief claims Twitter buried ‘egregious deficiencies’</a> (Washington Post) </p><p><a href="https://www.cnn.com/2022/08/23/tech/twitter-whistleblower-peiter-zatko-security/index.html">Ex-Twitter exec blows the whistle, alleging reckless and negligent cybersecurity policies</a> (CNN) </p><p><a href="https://www.wsj.com/articles/twitters-ex-security-head-files-whistleblower-complaint-11661263009">Twitter’s Ex-Security Head Files Whistleblower Complaint </a>(Wall Street Journal)</p><p><a href="https://time.com/6207996/twitter-whistleblower-allegations/">Deception, Bots, and Foreign Agents: The Twitter Whistleblower’s Biggest Allegations</a> (Time)</p><p><a href="https://cip.gov.ua/en/news/mincifri-derzhspeczv-yazku-ta-kancelyariya-prem-yer-ministra-respubliki-polsha-pidpisali-memorandum-pro-vzayemorozuminnya-u-sferi-kiberzakhistu">The Ministry of Digital Transformation, State Service of Special Communication and Information Protection and the Council of Ministers of the Republic of Poland signed Memorandum of understanding in the cybersecurity field.</a> (State Service of Special Communication and Information Protection) </p><p><a href="https://www.bleepingcomputer.com/news/security/greek-natural-gas-operator-suffers-ransomware-related-data-breach/">Greek natural gas operator suffers ransomware-related data breach</a> (BleepingComputer) </p><p><a href="https://therecord.media/greek-gas-operator-refuses-to-negotiate-with-ransomware-group-after-attack/">Greek gas operator refuses to negotiate with ransomware group after attack</a> (The Record by Recorded Future)</p><p><a href="https://www.desfa.gr/en/press-center/press-releases/anakoinwsh">Announcement | </a>(DESF)</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-228a">Threat Actors Exploiting Multiple CVEs Against Zimbra Collaboration Suite</a> (CISA) </p><p><a href="https://www.theregister.com/2022/08/23/cisa_zimbra_signatures/">US government really hopes you've patched your Zimbra server</a> (Register)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/08/22/cisa-adds-one-known-exploited-vulnerabilities-catalog">CISA Adds One Known Exploited Vulnerabilities to Catalog</a> (CISA) </p><p><a href="https://www.telegraph.co.uk/world-news/2022/08/22/speedo-wearing-russian-tourists-leak-defence-secrets-twitter/">Speedo-wearing Russian tourists leak defence secrets on Twitter</a> (The Telegraph)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1652</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[37ce825a-787a-11ec-abf0-7fbf92633ad6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8457946784.mp3?updated=1671817068" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bogus DDoS protection pages distribute malware. Estonia deals with DDoS attacks. Roskomnadzor's Internet panopticon.And data-tampering attacks are regarded as a growing risk.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1646/notes</link>
      <description>Bogus DDoS protection pages distribute malware. Estonia deals with DDoS attacks. Roskomnadzor's Internet panopticon. Rick Howard on the RSA Security Breach of 2011 and the Equifax breach of 2017. Caleb Barlow on what does a recession mean for cyber security venture capital and what is the impact of this on the industry? And data-tampering attacks are regarded as a growing risk.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/161

Selected reading.
WordPress sites hacked with fake Cloudflare DDoS alerts pushing malware (BleepingComputer)
Fake DDoS Pages On WordPress Sites Lead to Drive-By-Downloads (Sucuri Blog)
Car blast kills daughter of Russian known as 'Putin's brain' (AP NEWS)
Russia blames Kyiv for killing daughter of ‘Putin’s Rasputin’, but the truth may be closer to home (The Telegraph)
Alexander Dugin's daughter killed by anti-war Russians: Former state deputy (Newsweek)
Estonia Repels Biggest Cyber-Attack Since 2007 (Infosecurity Magazine) 
Estonia's Battle Against a Deluge of DDoS Attacks (Infosecurity Magazine)
Latvia Starts Removing Soviet Monument in Challenge to Russia (Bloomberg)
Data-tampering attacks are a 'nightmare' threat that's hard to detect (Protocol)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 22 Aug 2022 20:15:00 -0000</pubDate>
      <itunes:title>Bogus DDoS protection pages distribute malware. Estonia deals with DDoS attacks. Roskomnadzor's Internet panopticon.And data-tampering attacks are regarded as a growing risk.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1646</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Bogus DDoS protection pages distribute malware. Estonia deals with DDoS attacks. Roskomnadzor's Internet panopticon. Rick Howard on the RSA Security Breach of 2011 and the Equifax breach of 2017. Caleb Barlow on what does a recession mean for cyber security venture capital and what is the impact of this on the industry? And data-tampering attacks are regarded as a growing risk.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/161

Selected reading.
WordPress sites hacked with fake Cloudflare DDoS alerts pushing malware (BleepingComputer)
Fake DDoS Pages On WordPress Sites Lead to Drive-By-Downloads (Sucuri Blog)
Car blast kills daughter of Russian known as 'Putin's brain' (AP NEWS)
Russia blames Kyiv for killing daughter of ‘Putin’s Rasputin’, but the truth may be closer to home (The Telegraph)
Alexander Dugin's daughter killed by anti-war Russians: Former state deputy (Newsweek)
Estonia Repels Biggest Cyber-Attack Since 2007 (Infosecurity Magazine) 
Estonia's Battle Against a Deluge of DDoS Attacks (Infosecurity Magazine)
Latvia Starts Removing Soviet Monument in Challenge to Russia (Bloomberg)
Data-tampering attacks are a 'nightmare' threat that's hard to detect (Protocol)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Bogus DDoS protection pages distribute malware. Estonia deals with DDoS attacks. Roskomnadzor's Internet panopticon. Rick Howard on the RSA Security Breach of 2011 and the Equifax breach of 2017. Caleb Barlow on what does a recession mean for cyber security venture capital and what is the impact of this on the industry? And data-tampering attacks are regarded as a growing risk.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/161</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/security/wordpress-sites-hacked-with-fake-cloudflare-ddos-alerts-pushing-malware/">WordPress sites hacked with fake Cloudflare DDoS alerts pushing malware</a> (BleepingComputer)</p><p><a href="https://blog.sucuri.net/2022/08/fake-ddos-pages-on-wordpress-lead-to-drive-by-downloads.html">Fake DDoS Pages On WordPress Sites Lead to Drive-By-Downloads</a> (Sucuri Blog)</p><p><a href="https://apnews.com/article/russia-ukraine-moscow-government-and-politics-c710e37b5cad623ff6ea47cfca6138ac">Car blast kills daughter of Russian known as 'Putin's brain'</a> (AP NEWS)</p><p><a href="https://www.telegraph.co.uk/world-news/2022/08/21/russia-blames-kyiv-killing-daughter-putins-rasputin-truth-may/">Russia blames Kyiv for killing daughter of ‘Putin’s Rasputin’, but the truth may be closer to home</a> (The Telegraph)</p><p><a href="https://www.newsweek.com/alexander-dugins-daughter-killed-anti-war-russians-former-state-deputy-1735497">Alexander Dugin's daughter killed by anti-war Russians: Former state deputy</a> (Newsweek)</p><p><a href="https://www.infosecurity-magazine.com/news/estonia-repels-biggest-cyberattack/">Estonia Repels Biggest Cyber-Attack Since 2007</a> (Infosecurity Magazine) </p><p><a href="https://www.infosecurity-magazine.com/news-features/estonias-battle-against-a-deluge/">Estonia's Battle Against a Deluge of DDoS Attacks</a> (Infosecurity Magazine)</p><p><a href="https://www.bloomberg.com/news/articles/2022-08-22/latvia-starts-removing-soviet-monument-in-challenge-to-russia">Latvia Starts Removing Soviet Monument in Challenge to Russia</a> (Bloomberg)</p><p><a href="https://www.protocol.com/enterprise/data-integrity-security-cyberattacks-threat">Data-tampering attacks are a 'nightmare' threat that's hard to detect</a> (Protocol)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1276</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[376fc09e-787a-11ec-abf0-2feed02d865b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4087011464.mp3?updated=1671817106" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Roya Gordon: Becoming a trailblazer. [Research] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/113/notes</link>
      <description>Roya Gordon, a Security Research Evangelist at ICS cybersecurity firm Nozomi Networks, started her career as an intelligence specialist in the U.S. Navy. After her time serving, Roya spent time as a Control Systems Cybersecurity Analyst at the Idaho National Laboratory and then took the role of Cyber Threat Intelligence Manager at Accenture. She shares her story after the NSA accepted her and then quickly diverted, creating a new path for Roya to follow. She shares the jobs she went after along the way, leading up to Nozomi Networks and how she wishes to be a trailblazer for young black women everywhere. She hopes to shape young women's minds on what the cybersecurity industry is actually like, in hopes that she can be a figure people look up to. We thank Roya for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 21 Aug 2022 07:00:00 -0000</pubDate>
      <itunes:title>Roya Gordon: Becoming a trailblazer. [Research] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>113</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Roya Gordon, a Security Research Evangelist at ICS cybersecurity firm Nozomi Networks, started her career as an intelligence specialist in the U.S. Navy. After her time serving, Roya spent time as a Control Systems Cybersecurity Analyst at the Idaho National Laboratory and then took the role of Cyber Threat Intelligence Manager at Accenture. She shares her story after the NSA accepted her and then quickly diverted, creating a new path for Roya to follow. She shares the jobs she went after along the way, leading up to Nozomi Networks and how she wishes to be a trailblazer for young black women everywhere. She hopes to shape young women's minds on what the cybersecurity industry is actually like, in hopes that she can be a figure people look up to. We thank Roya for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Roya Gordon, a Security Research Evangelist at ICS cybersecurity firm Nozomi Networks, started her career as an intelligence specialist in the U.S. Navy. After her time serving, Roya spent time as a Control Systems Cybersecurity Analyst at the Idaho National Laboratory and then took the role of Cyber Threat Intelligence Manager at Accenture. She shares her story after the NSA accepted her and then quickly diverted, creating a new path for Roya to follow. She shares the jobs she went after along the way, leading up to Nozomi Networks and how she wishes to be a trailblazer for young black women everywhere. She hopes to shape young women's minds on what the cybersecurity industry is actually like, in hopes that she can be a figure people look up to. We thank Roya for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>588</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[73e9122e-1e64-11ed-950a-1bc8840479f0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8220177744.mp3?updated=1661444149" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Clipminer: Making millions off of malware. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/246/notes</link>
      <description>Dick O'Brien from Symantec, a part of Broadcom Software, joins Dave to discuss how the cyber-criminal operation, Clipminer Botnet, makes operators behind it at least $1.7 million. Symantec's research says "The malware being used, tracked as Trojan.Clipminer, has a number of similarities to another crypto-mining Trojan called KryptoCibule, suggesting it may be a copycat or evolution of that threat."
Symantec determined that the malware has the ability to mine for cryptocurrency using compromised computers’ resources. They also share a way to protect against the cyber-criminal operation, as well as sharing some indicators you could be compromised.
The research can be found here:
Clipminer Botnet Makes Operators at Least $1.7 Million

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Aug 2022 07:00:00 -0000</pubDate>
      <itunes:title>Clipminer: Making millions off of malware. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>246</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dick O'Brien from Symantec, a part of Broadcom Software, joins Dave to discuss how the cyber-criminal operation, Clipminer Botnet, makes operators behind it at least $1.7 million. Symantec's research says "The malware being used, tracked as Trojan.Clipminer, has a number of similarities to another crypto-mining Trojan called KryptoCibule, suggesting it may be a copycat or evolution of that threat."
Symantec determined that the malware has the ability to mine for cryptocurrency using compromised computers’ resources. They also share a way to protect against the cyber-criminal operation, as well as sharing some indicators you could be compromised.
The research can be found here:
Clipminer Botnet Makes Operators at Least $1.7 Million

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dick O'Brien from Symantec, a part of Broadcom Software, joins Dave to discuss how the cyber-criminal operation, Clipminer Botnet, makes operators behind it at least $1.7 million. Symantec's research says "The malware being used, tracked as Trojan.Clipminer, has a number of similarities to another crypto-mining Trojan called KryptoCibule, suggesting it may be a copycat or evolution of that threat."</p><p>Symantec determined that the malware has the ability to mine for cryptocurrency using compromised computers’ resources. They also share a way to protect against the cyber-criminal operation, as well as sharing some indicators you could be compromised.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/clipminer-bitcoin-mining-hijacking">Clipminer Botnet Makes Operators at Least $1.7 Million</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>981</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04fbff5c-1f27-11ed-9970-db70126d22d8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8095929217.mp3?updated=1685127110" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Notes on the hybrid war. Criminal gang hits travel and hospitality sectors. Additions to CISA's Known Exploited Vulnerabilities Catalog. CISA issues five ICS security advisories.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1645/notes</link>
      <description>Killnet claims a DDoS campaign against Estonia. The head of GCHQ calls Russian cyber operations a failure. US Cyber Command concludes its "hunt forward" mission in cooperation with Croatia. A criminal gang targets the travel and hospitality sectors. Thomas Pace of NetRise shares insights on firmware vulnerabilities. Daniel Floyd from BlackCloak on Quantifying the Business Need for Digital Executive Protection. CISA issues five ICS security advisories.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/160

Selected reading.
Estonia says it repelled major cyber attack after removing Soviet monuments (Reuters)
There’s a chance regular people didn’t even notice: expert on Russian cyber attack (TVP World) 
Estonia says it repelled a major cyberattack claimed by Russian hackers. (New York Times)
The head of GCHQ says Vladimir Putin is losing the information war in Ukraine (The Economist)
Cyber Command deployed 'hunt forward' defenders to Croatia to help secure systems (The Record by Recorded Future)
U.S. Cyber Command completes defensive cyber mission in Croatia (CyberScoop)
You Can’t Audit Me: APT29 Continues Targeting Microsoft 365 (Mandiant)
Reservations Requested: TA558 Targets Hospitality and Travel (Proofpoint)
Cybercrime Group TA558 Ramps Up Email Attacks Against Hotels (Decipher)
CISA Adds Seven Known Exploited Vulnerabilities to Catalog (CISA) 
Siemens Linux-based Products (Update G) (CISA)
Siemens Industrial Products LLDP (Update B) (CISA)
Siemens OpenSSL Affected Industrial Products (CISA)
Mitsubishi Electric MELSEC Q and L Series (CISA)
Mitsubishi Electric GT SoftGOT2000 (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 19 Aug 2022 20:30:00 -0000</pubDate>
      <itunes:title>Notes on the hybrid war. Criminal gang hits travel and hospitality sectors. Additions to CISA's Known Exploited Vulnerabilities Catalog. CISA issues five ICS security advisories.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1645</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Killnet claims a DDoS campaign against Estonia. The head of GCHQ calls Russian cyber operations a failure. US Cyber Command concludes its "hunt forward" mission in cooperation with Croatia. A criminal gang targets the travel and hospitality sectors. Thomas Pace of NetRise shares insights on firmware vulnerabilities. Daniel Floyd from BlackCloak on Quantifying the Business Need for Digital Executive Protection. CISA issues five ICS security advisories.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/160

Selected reading.
Estonia says it repelled major cyber attack after removing Soviet monuments (Reuters)
There’s a chance regular people didn’t even notice: expert on Russian cyber attack (TVP World) 
Estonia says it repelled a major cyberattack claimed by Russian hackers. (New York Times)
The head of GCHQ says Vladimir Putin is losing the information war in Ukraine (The Economist)
Cyber Command deployed 'hunt forward' defenders to Croatia to help secure systems (The Record by Recorded Future)
U.S. Cyber Command completes defensive cyber mission in Croatia (CyberScoop)
You Can’t Audit Me: APT29 Continues Targeting Microsoft 365 (Mandiant)
Reservations Requested: TA558 Targets Hospitality and Travel (Proofpoint)
Cybercrime Group TA558 Ramps Up Email Attacks Against Hotels (Decipher)
CISA Adds Seven Known Exploited Vulnerabilities to Catalog (CISA) 
Siemens Linux-based Products (Update G) (CISA)
Siemens Industrial Products LLDP (Update B) (CISA)
Siemens OpenSSL Affected Industrial Products (CISA)
Mitsubishi Electric MELSEC Q and L Series (CISA)
Mitsubishi Electric GT SoftGOT2000 (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Killnet claims a DDoS campaign against Estonia. The head of GCHQ calls Russian cyber operations a failure. US Cyber Command concludes its "hunt forward" mission in cooperation with Croatia. A criminal gang targets the travel and hospitality sectors. Thomas Pace of NetRise shares insights on firmware vulnerabilities. Daniel Floyd from BlackCloak on Quantifying the Business Need for Digital Executive Protection. CISA issues five ICS security advisories.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/160</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.reuters.com/world/europe/estonia-says-it-repelled-major-cyber-attack-after-removing-soviet-monuments-2022-08-18/">Estonia says it repelled major cyber attack after removing Soviet monuments</a> (Reuters)</p><p><a href="https://tvpworld.com/61908749/theres-a-chance-regular-people-didnt-even-notice-expert-on-russian-cyber-attack">There’s a chance regular people didn’t even notice: expert on Russian cyber attack</a> (TVP World) </p><p><a href="https://www.nytimes.com/2022/08/18/world/europe/estonia-cyber-attack-russia.html">Estonia says it repelled a major cyberattack claimed by Russian hackers.</a> (New York Times)</p><p><a href="https://www.economist.com/by-invitation/2022/08/18/the-head-of-gchq-says-vladimir-putin-is-losing-the-information-war-in-ukraine">The head of GCHQ says Vladimir Putin is losing the information war in Ukraine</a> (The Economist)</p><p><a href="https://therecord.media/cyber-command-deployed-hunt-forward-defenders-to-croatia-to-help-secure-systems/">Cyber Command deployed 'hunt forward' defenders to Croatia to help secure systems</a> (The Record by Recorded Future)</p><p><a href="https://www.cyberscoop.com/u-s-cyber-command-hunts-forward/">U.S. Cyber Command completes defensive cyber mission in Croatia</a> (CyberScoop)</p><p><a href="https://www.mandiant.com/resources/blog/apt29-continues-targeting-microsoft">You Can’t Audit Me: APT29 Continues Targeting Microsoft 365</a> (Mandiant)</p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/reservations-requested-ta558-targets-hospitality-and-travel">Reservations Requested: TA558 Targets Hospitality and Travel</a> (Proofpoint)</p><p><a href="https://duo.com/decipher/cybercrime-group-ta558-ramps-up-email-attacks-against-hotels">Cybercrime Group TA558 Ramps Up Email Attacks Against Hotels</a> (Decipher)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/08/18/cisa-adds-seven-known-exploited-vulnerabilities-catalog">CISA Adds Seven Known Exploited Vulnerabilities to Catalog</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-21-131-03">Siemens Linux-based Products (Update G)</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-21-194-07">Siemens Industrial Products LLDP (Update B)</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-167-14">Siemens OpenSSL Affected Industrial Products</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-172-01">Mitsubishi Electric MELSEC Q and L Series</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-221-01">Mitsubishi Electric GT SoftGOT2000</a> (CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1803</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[39a87018-787a-11ec-abf0-6b2841e99b1a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2039916581.mp3?updated=1671817252" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BlackByte’s back, as BlackByte 2.0. Iranian cyber ops against Israel. Wipers and cyberespionage as tools in Russia’s hybrid war. Cyber war clauses coming to cyber insurance policies.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1644/notes</link>
      <description>BlackByte is back. Iran suspected of cyber operations against four Israeli sectors. A look at wipers as a tool in hybrid war. A Russian cyber ops scorecard. Josh Ray from Accenture on how dark web actors are focusing on VPNs. Our guest is Corey Nachreiner from WatchGuard with findings of their latest Internet Security Report. Cyber war clauses coming to cyber insurance policies.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/159

Selected reading.
BlackByte ransomware gang is back with new extortion tactics (BleepingComputer) 
Suspected Iranian Actor Targeting Israeli Shipping, Healthcare, Government and Energy Sectors | Mandiant (Mandiant)
Russia-Ukraine cyberwar creates new malware threats  (VentureBeat)
Global Threat Landscape Report: A Semiannual Report by FortiGuard Labs (Fortinet) 
Overview of the Cyber Weapons Used in the Ukraine - Russia War (Trustwave SpiderLabs)
Lloyd’s sets requirements for state-backed cyber attack exclusions (Insurance Day)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 18 Aug 2022 20:15:00 -0000</pubDate>
      <itunes:title>BlackByte’s back, as BlackByte 2.0. Iranian cyber ops against Israel. Wipers and cyberespionage as tools in Russia’s hybrid war. Cyber war clauses coming to cyber insurance policies.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1644</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>BlackByte is back. Iran suspected of cyber operations against four Israeli sectors. A look at wipers as a tool in hybrid war. A Russian cyber ops scorecard. Josh Ray from Accenture on how dark web actors are focusing on VPNs. Our guest is Corey Nachreiner from WatchGuard with findings of their latest Internet Security Report. Cyber war clauses coming to cyber insurance policies.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/159

Selected reading.
BlackByte ransomware gang is back with new extortion tactics (BleepingComputer) 
Suspected Iranian Actor Targeting Israeli Shipping, Healthcare, Government and Energy Sectors | Mandiant (Mandiant)
Russia-Ukraine cyberwar creates new malware threats  (VentureBeat)
Global Threat Landscape Report: A Semiannual Report by FortiGuard Labs (Fortinet) 
Overview of the Cyber Weapons Used in the Ukraine - Russia War (Trustwave SpiderLabs)
Lloyd’s sets requirements for state-backed cyber attack exclusions (Insurance Day)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>BlackByte is back. Iran suspected of cyber operations against four Israeli sectors. A look at wipers as a tool in hybrid war. A Russian cyber ops scorecard. Josh Ray from Accenture on how dark web actors are focusing on VPNs. Our guest is Corey Nachreiner from WatchGuard with findings of their latest Internet Security Report. Cyber war clauses coming to cyber insurance policies.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/159</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/security/blackbyte-ransomware-gang-is-back-with-new-extortion-tactics/">BlackByte ransomware gang is back with new extortion tactics</a> (BleepingComputer) </p><p><a href="https://www.mandiant.com/resources/suspected-iranian-actor-targeting-israeli-shipping">Suspected Iranian Actor Targeting Israeli Shipping, Healthcare, Government and Energy Sectors | Mandiant</a> (Mandiant)</p><p><a href="https://venturebeat.com/security/cyber-war-malware/">Russia-Ukraine cyberwar creates new malware threats </a> (VentureBeat)</p><p><a href="https://www.fortinet.com/content/dam/fortinet/assets/threat-reports/threat-report-1h-2022.pdf">Global Threat Landscape Report: A Semiannual Report by FortiGuard Labs</a> (Fortinet) </p><p><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/overview-of-the-cyber-weapons-used-in-the-ukraine-russia-war/">Overview of the Cyber Weapons Used in the Ukraine - Russia War</a> (Trustwave SpiderLabs)</p><p><a href="https://insuranceday.maritimeintelligence.informa.com/ID1141942/Lloyds-sets-requirements-for-state-backed-cyber-attack-exclusions">Lloyd’s sets requirements for state-backed cyber attack exclusions</a> (Insurance Day)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1723</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3909f9b0-787a-11ec-abf0-bb5eb27bd534]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6700256750.mp3?updated=1671817260" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber incidents and lessons from Russia's hybrid war. Zimbra vulnerabilities exploited. New Lazarus Group activity reported. ICS security advisories .Insider trading charges from 2017 Equifax breach.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1643/notes</link>
      <description>A DDoS attack against a Ukrainian nuclear power provider. The US Army draws some lessons from the cyber phases of Russia's hybrid war. Vulnerabilities in Zimbra are undergoing widespread exploitation.Reports of new Lazarus Group activity. CISA releases eight ICS security advisories. Carole Theriault looks at scammers and cryptocurrencies. Our guest is Jennifer Reed from Aviatrix on the changing landscape of cloud security. And the SEC charges three with insider trading during the 2017 Equifax breach.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/158

Selected reading.
Ukrainian Nuclear Operator Accuses Russians Hackers Of Attacking Its Website (RadioFreeEurope/RadioLiberty)
Ukraine nuclear power company says Russia attacked website (Al Jazeera)
Ukraine Nuclear Operator Reports Cyberattack on Its Website (The Defense Post)
How electronic warfare is reshaping the war between Russia and Ukraine (The Record by Recorded Future)
Army lesson from Ukraine war: cyber, EW capabilities not decisive on their own (FedScoop)
Learning from Ukraine, Army cyber schoolhouse focuses on electromagnetic spectrum (Breaking Defense)
Cyber and full-spectrum operations push the Great Power conflict left of boom (Breaking Defense)
Microsoft Exchange alternative Zimbra is getting widely exploited, 1000s hit (The Stack)
CISA Alert AA22-228A – Threat actors exploiting multiple CVEs against Zimbra Collaboration suit (CyberWire)
Threat Actors Exploiting Multiple CVEs Against Zimbra Collaboration Suite (CISA)
A signed Mac executable… (ESET)
Yokogawa CENTUM Controller FCS (CISA)
LS ELECTRIC PLC and XG5000 (CISA)
Delta Industrial Automation DRAS (CISA)
Softing Secure Integration Server (CISA)
B&amp;R Industrial Automation Automation Studio 4 (CISA)
Emerson Proficy Machine Edition (CISA)
Sequi PortBloque S (CISA)
Siemens Industrial Products with OPC UA (CISA)
U.S. SEC charges 3 people with insider trading tied to Equifax hack (Reuters) 
SEC Charges Three Chicago-Area Residents with Insider Trading Around Equifax Data Breach Announcement (US Securities and Exchange Commission)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 17 Aug 2022 20:20:00 -0000</pubDate>
      <itunes:title>Cyber incidents and lessons from Russia's hybrid war. Zimbra vulnerabilities exploited. New Lazarus Group activity reported. ICS security advisories .Insider trading charges from 2017 Equifax breach.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1643</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A DDoS attack against a Ukrainian nuclear power provider. The US Army draws some lessons from the cyber phases of Russia's hybrid war. Vulnerabilities in Zimbra are undergoing widespread exploitation.Reports of new Lazarus Group activity. CISA releases eight ICS security advisories. Carole Theriault looks at scammers and cryptocurrencies. Our guest is Jennifer Reed from Aviatrix on the changing landscape of cloud security. And the SEC charges three with insider trading during the 2017 Equifax breach.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/158

Selected reading.
Ukrainian Nuclear Operator Accuses Russians Hackers Of Attacking Its Website (RadioFreeEurope/RadioLiberty)
Ukraine nuclear power company says Russia attacked website (Al Jazeera)
Ukraine Nuclear Operator Reports Cyberattack on Its Website (The Defense Post)
How electronic warfare is reshaping the war between Russia and Ukraine (The Record by Recorded Future)
Army lesson from Ukraine war: cyber, EW capabilities not decisive on their own (FedScoop)
Learning from Ukraine, Army cyber schoolhouse focuses on electromagnetic spectrum (Breaking Defense)
Cyber and full-spectrum operations push the Great Power conflict left of boom (Breaking Defense)
Microsoft Exchange alternative Zimbra is getting widely exploited, 1000s hit (The Stack)
CISA Alert AA22-228A – Threat actors exploiting multiple CVEs against Zimbra Collaboration suit (CyberWire)
Threat Actors Exploiting Multiple CVEs Against Zimbra Collaboration Suite (CISA)
A signed Mac executable… (ESET)
Yokogawa CENTUM Controller FCS (CISA)
LS ELECTRIC PLC and XG5000 (CISA)
Delta Industrial Automation DRAS (CISA)
Softing Secure Integration Server (CISA)
B&amp;R Industrial Automation Automation Studio 4 (CISA)
Emerson Proficy Machine Edition (CISA)
Sequi PortBloque S (CISA)
Siemens Industrial Products with OPC UA (CISA)
U.S. SEC charges 3 people with insider trading tied to Equifax hack (Reuters) 
SEC Charges Three Chicago-Area Residents with Insider Trading Around Equifax Data Breach Announcement (US Securities and Exchange Commission)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A DDoS attack against a Ukrainian nuclear power provider. The US Army draws some lessons from the cyber phases of Russia's hybrid war. Vulnerabilities in Zimbra are undergoing widespread exploitation.Reports of new Lazarus Group activity. CISA releases eight ICS security advisories. Carole Theriault looks at scammers and cryptocurrencies. Our guest is Jennifer Reed from Aviatrix on the changing landscape of cloud security. And the SEC charges three with insider trading during the 2017 Equifax breach.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/158</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.rferl.org/a/ukraine-energoatom-hacking-attack-zaporizhzhya/31992142.html">Ukrainian Nuclear Operator Accuses Russians Hackers Of Attacking Its Website</a> (RadioFreeEurope/RadioLiberty)</p><p><a href="https://www.aljazeera.com/news/2022/8/16/ukraine-nuclear-power-company-says-russia-attacked-website">Ukraine nuclear power company says Russia attacked website</a> (Al Jazeera)</p><p><a href="https://www.thedefensepost.com/2022/08/17/ukraine-nuclear-operator-cyberattack/">Ukraine Nuclear Operator Reports Cyberattack on Its Website</a> (The Defense Post)</p><p><a href="https://therecord.media/how-electronic-warfare-is-reshaping-the-war-between-russia-and-ukraine/">How electronic warfare is reshaping the war between Russia and Ukraine</a> (The Record by Recorded Future)</p><p><a href="https://www.fedscoop.com/us-army-lesson-from-ukraine-war-cyber-ew-capabilities-not-decisive-on-their-own/">Army lesson from Ukraine war: cyber, EW capabilities not decisive on their own</a> (FedScoop)</p><p><a href="https://breakingdefense.com/2022/08/learning-from-ukraine-army-cyber-schoolhouse-focuses-on-electromagnetic-spectrum/">Learning from Ukraine, Army cyber schoolhouse focuses on electromagnetic spectrum</a> (Breaking Defense)</p><p><a href="https://breakingdefense.com/2022/08/cyber-and-full-spectrum-operations-push-the-great-power-conflict-left-of-boom/">Cyber and full-spectrum operations push the Great Power conflict left of boom</a> (Breaking Defense)</p><p><a href="https://thestack.technology/microsoft-exchange-alternative-zimbra-hacked/">Microsoft Exchange alternative Zimbra is getting widely exploited, 1000s hit</a> (The Stack)</p><p><a href="https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/28/notes">CISA Alert AA22-228A – Threat actors exploiting multiple CVEs against Zimbra Collaboration suit</a> (CyberWire)</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-228a">Threat Actors Exploiting Multiple CVEs Against Zimbra Collaboration Suite</a> (CISA)</p><p><a href="https://twitter.com/ESETresearch/status/1559553324998955010">A signed Mac executable…</a> (ESET)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-01">Yokogawa CENTUM Controller FCS</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-02">LS ELECTRIC PLC and XG5000</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-03">Delta Industrial Automation DRAS</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-04">Softing Secure Integration Server</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-05">B&amp;R Industrial Automation Automation Studio 4</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-06">Emerson Proficy Machine Edition</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-228-07">Sequi PortBloque S</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-132-08">Siemens Industrial Products with OPC UA</a> (CISA)</p><p><a href="https://www.reuters.com/technology/us-sec-charges-3-people-with-insider-trading-related-equifax-hack-2022-08-16/">U.S. SEC charges 3 people with insider trading tied to Equifax hack</a> (Reuters) </p><p><a href="https://www.sec.gov/litigation/litreleases/2022/lr25470.htm?utm_medium=email&amp;utm_source=govdelivery">SEC Charges Three Chicago-Area Residents with Insider Trading Around Equifax Data Breach Announcement</a> (US Securities and Exchange Commission)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1535</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[388ba42a-787a-11ec-abf0-378c0baafe01]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3723106121.mp3?updated=1671817271" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA22-228A – Threat actors exploiting multiple CVEs against Zimbra Collaboration suite. [CISA Cybersecurity Alerts}</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/28/notes</link>
      <description>CISA and the Multi-State Information Sharing &amp; Analysis Center, or MS-ISAC are publishing this joint Cybersecurity Advisory in response to active exploitation of multiple Common Vulnerabilities and Exposures against Zimbra Collaboration Suite, an enterprise cloud-hosted collaboration software and email platform.
AA22-228A Alert, Technical Details, and Mitigations
Volexity’s Mass Exploitation of (Un)authenticated Zimbra RCE: CVE-2022-27925
Hackers are actively exploiting password-stealing flaw in Zimbra
CISA adds Zimbra email vulnerability to its exploited vulnerabilities catal…
CVE-2022-27925 detail
Mass exploitation of (un)authenticated Zimbra RCE: CVE-2022-27925
CVE-2022-37042 detail
Authentication bypass in MailboxImportServlet vulnerability
CVE-2022-30333 detail
UnRAR vulnerability exploited in the wild, likely against Zimbra servers
Zimbra Collaboration Kepler 9.0.0 patch 25 GA release
Zimbra UnRAR path traversal
Operation EmailThief: Active exploitation of zero-day XSS vulnerability in…
Hotfix available 5 Feb for zero-day exploit vulnerability in Zimbra 8.8.15
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 17 Aug 2022 12:38:00 -0000</pubDate>
      <itunes:title>CISA Alert AA22-228A – Threat actors exploiting multiple CVEs against Zimbra Collaboration suite. [CISA Cybersecurity Alerts}</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>28</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA and the Multi-State Information Sharing &amp; Analysis Center, or MS-ISAC are publishing this joint Cybersecurity Advisory in response to active exploitation of multiple Common Vulnerabilities and Exposures against Zimbra Collaboration Suite, an enterprise cloud-hosted collaboration software and email platform.
AA22-228A Alert, Technical Details, and Mitigations
Volexity’s Mass Exploitation of (Un)authenticated Zimbra RCE: CVE-2022-27925
Hackers are actively exploiting password-stealing flaw in Zimbra
CISA adds Zimbra email vulnerability to its exploited vulnerabilities catal…
CVE-2022-27925 detail
Mass exploitation of (un)authenticated Zimbra RCE: CVE-2022-27925
CVE-2022-37042 detail
Authentication bypass in MailboxImportServlet vulnerability
CVE-2022-30333 detail
UnRAR vulnerability exploited in the wild, likely against Zimbra servers
Zimbra Collaboration Kepler 9.0.0 patch 25 GA release
Zimbra UnRAR path traversal
Operation EmailThief: Active exploitation of zero-day XSS vulnerability in…
Hotfix available 5 Feb for zero-day exploit vulnerability in Zimbra 8.8.15
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA and the Multi-State Information Sharing &amp; Analysis Center, or MS-ISAC are publishing this joint Cybersecurity Advisory in response to active exploitation of multiple Common Vulnerabilities and Exposures against Zimbra Collaboration Suite, an enterprise cloud-hosted collaboration software and email platform.</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-228a">AA22-228A Alert, Technical Details, and Mitigations</a></p><p><a href="https://www.volexity.com/blog/2022/08/10/mass-exploitation-of-unauthenticated-zimbra-rce-cve-2022-27925/">Volexity’s Mass Exploitation of (Un)authenticated Zimbra RCE: CVE-2022-27925</a></p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-are-actively-exploiting-password-stealing-flaw-in-zimbra/">Hackers are actively exploiting password-stealing flaw in Zimbra</a></p><p><a href="https://thehackernews.com/2022/08/cisa-adds-zimbra-email-vulnerability-to.html">CISA adds Zimbra email vulnerability to its exploited vulnerabilities catal…</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-27925">CVE-2022-27925 detail</a></p><p><a href="https://www.volexity.com/blog/2022/08/10/mass-exploitation-of-unauthenticated-zimbra-rce-cve-2022-27925/">Mass exploitation of (un)authenticated Zimbra RCE: CVE-2022-27925</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-37042">CVE-2022-37042 detail</a></p><p><a href="https://blog.zimbra.com/2022/08/authentication-bypass-in-mailboximportservlet-vulnerability/">Authentication bypass in MailboxImportServlet vulnerability</a></p><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2022-30333">CVE-2022-30333 detail</a></p><p><a href="https://www.securityweek.com/unrar-vulnerability-exploited-wild-likely-against-zimbra-servers">UnRAR vulnerability exploited in the wild, likely against Zimbra servers</a></p><p><a href="https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P25">Zimbra Collaboration Kepler 9.0.0 patch 25 GA release</a></p><p><a href="https://packetstormsecurity.com/files/167989/Zimbra-UnRAR-Path-Traversal.html">Zimbra UnRAR path traversal</a></p><p><a href="https://www.volexity.com/blog/2022/02/03/operation-emailthief-active-exploitation-of-zero-day-xss-vulnerability-in-zimbra/">Operation EmailThief: Active exploitation of zero-day XSS vulnerability in…</a></p><p><a href="https://blog.zimbra.com/2022/02/hotfix-available-5-feb-for-zero-day-exploit-vulnerability-in-zimbra-8-8-15/">Hotfix available 5 Feb for zero-day exploit vulnerability in Zimbra 8.8.15</a></p><p>All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at <a href="mailto:central@cisa.dhs.gov">central@cisa.dhs.gov</a> or (888) 282-0870 and to the FBI via your <a href="https://www.fbi.gov/contact-us/field-offices">local FBI field office</a> or the FBI’s 24/7 CyWatch at (855) 292-3937 or <a href="mailto:CyWatch@fbi.gov">CyWatch@fbi.gov</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>151</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[db7d2474-1e29-11ed-b9ce-47be3ce96f24]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3438256915.mp3?updated=1660697296" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russian cyberespionage and influence op disrupted. RedAlpha versus Chinese minorities and (of course) Taiwan. Evil PLC proof-of-concept. Cl0p takes a poke at a water utility.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1642/notes</link>
      <description>Microsoft identifies and disrupts Russian cyberespionage activity. An update on RedAlpha. An evil PLC proof-of-concept shows how programmable logic controllers could be "weaponized." Ben Yelin has an update on right to repair. Our guest is Arthur Lozinski of Oomnitza with a look at attack surface management maturity. And the Cl0p gang hits an English water utility (but tries to extort the wrong one–stuff happens, y’know?).

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/157

Selected reading.
Disrupting SEABORGIUM’s ongoing phishing operations (Microsoft Security
Microsoft disrupts Russian-linked hackers targeting NATO countries (Breaking Defense) 
Microsoft Announces Disruption of Russian Espionage APT (SecurityWeek) 
Microsoft disrupts Russia-linked hacking group targeting defense and intelligence orgs (The Record by Recorded Future) 
Microsoft shuts down accounts linked to Russian spies (Register)
RedAlpha Conducts Multi-Year Credential Theft Campaign Targeting Global Humanitarian, Think Tank, and Government Organizations (Recorded Future)
Hackers linked to China have been targeting human rights groups for years (MIT Technology Review) 
Evil PLC Attack: Using a Controller as Predator Rather than Prey (Claroty)
Hackers attack UK water supplier but extort wrong victim (BleepingComputer)
South Staffordshire Water victim of cyber attack, customers not at risk (Computing) 
South Staffordshire Water says it was target of cyber attack as criminals bungle extortion attempt (Sky News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Aug 2022 20:15:00 -0000</pubDate>
      <itunes:title>Russian cyberespionage and influence op disrupted. RedAlpha versus Chinese minorities and (of course) Taiwan. Evil PLC proof-of-concept. Cl0p takes a poke at a water utility.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1642</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Microsoft identifies and disrupts Russian cyberespionage activity. An update on RedAlpha. An evil PLC proof-of-concept shows how programmable logic controllers could be "weaponized." Ben Yelin has an update on right to repair. Our guest is Arthur Lozinski of Oomnitza with a look at attack surface management maturity. And the Cl0p gang hits an English water utility (but tries to extort the wrong one–stuff happens, y’know?).

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/157

Selected reading.
Disrupting SEABORGIUM’s ongoing phishing operations (Microsoft Security
Microsoft disrupts Russian-linked hackers targeting NATO countries (Breaking Defense) 
Microsoft Announces Disruption of Russian Espionage APT (SecurityWeek) 
Microsoft disrupts Russia-linked hacking group targeting defense and intelligence orgs (The Record by Recorded Future) 
Microsoft shuts down accounts linked to Russian spies (Register)
RedAlpha Conducts Multi-Year Credential Theft Campaign Targeting Global Humanitarian, Think Tank, and Government Organizations (Recorded Future)
Hackers linked to China have been targeting human rights groups for years (MIT Technology Review) 
Evil PLC Attack: Using a Controller as Predator Rather than Prey (Claroty)
Hackers attack UK water supplier but extort wrong victim (BleepingComputer)
South Staffordshire Water victim of cyber attack, customers not at risk (Computing) 
South Staffordshire Water says it was target of cyber attack as criminals bungle extortion attempt (Sky News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft identifies and disrupts Russian cyberespionage activity. An update on RedAlpha. An evil PLC proof-of-concept shows how programmable logic controllers could be "weaponized." Ben Yelin has an update on right to repair. Our guest is Arthur Lozinski of Oomnitza with a look at attack surface management maturity. And the Cl0p gang hits an English water utility (but tries to extort the wrong one–stuff happens, y’know?).</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/157</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.microsoft.com/security/blog/2022/08/15/disrupting-seaborgiums-ongoing-phishing-operations/">Disrupting SEABORGIUM’s ongoing phishing operations</a> (Microsoft Security</p><p><a href="https://breakingdefense.com/2022/08/microsoft-disrupts-russian-linked-hackers-targeting-nato-countries/">Microsoft disrupts Russian-linked hackers targeting NATO countries</a> (Breaking Defense) </p><p><a href="https://www.securityweek.com/microsoft-announces-disruption-russian-espionage-apt">Microsoft Announces Disruption of Russian Espionage APT</a> (SecurityWeek) </p><p><a href="https://therecord.media/microsoft-disrupts-russia-linked-hacking-group-targeting-defense-and-intelligence-orgs/">Microsoft disrupts Russia-linked hacking group targeting defense and intelligence orgs</a> (The Record by Recorded Future) </p><p><a href="https://www.theregister.com/2022/08/16/microsoft_russian_spies/">Microsoft shuts down accounts linked to Russian spies</a> (Register)</p><p><a href="https://www.recordedfuture.com/redalpha-credential-theft-campaign-targeting-humanitarian-thinktank">RedAlpha Conducts Multi-Year Credential Theft Campaign Targeting Global Humanitarian, Think Tank, and Government Organizations</a> (Recorded Future)</p><p><a href="https://www.technologyreview.com/?p=1057894&amp;preview=true&amp;truid=&amp;utm_source=the_download&amp;utm_medium=email&amp;utm_campaign=the_download.unpaid.engagement&amp;utm_term=Active%20Qualified&amp;utm_content=08-16-2022&amp;mc_cid=4c2a4b06e2&amp;mc_eid=4891dadf67">Hackers linked to China have been targeting human rights groups for years</a> (MIT Technology Review) </p><p><a href="https://claroty.com/team82/blog/evil-plc-attack-using-a-controller-as-predator-rather-than-prey">Evil PLC Attack: Using a Controller as Predator Rather than Prey</a> (Claroty)</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-attack-uk-water-supplier-with-16-million-customers/">Hackers attack UK water supplier but extort wrong victim</a> (BleepingComputer)</p><p><a href="https://www.computing.co.uk/news/4054824/south-staffordshire-water-victim-cyber-attack-customers-risk">South Staffordshire Water victim of cyber attack, customers not at risk </a>(Computing) </p><p><a href="https://news.sky.com/story/south-staffordshire-water-says-it-was-target-of-cyber-attack-as-criminals-bungle-extortion-attempt-12674039">South Staffordshire Water says it was target of cyber attack as criminals bungle extortion attempt</a> (Sky News)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1579</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[37ee0b0c-787a-11ec-abf0-3777094d6c9a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2946957143.mp3?updated=1671817279" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shuckworm and Killnet continue to hack in the interest of Russia. Iron Tiger's supply chain campaign. TikTok and national security. And an arrest in the case of the Tornado Cash crypto mixer.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1641/notes</link>
      <description>Shuckworm maintains its focus on Ukrainian targets. Killnet's DDoS and dubious proof-of-work. Iron Tiger's supply chain campaign. TikTok and national security. Dinah Davis from Arctic Wolf shares insights on Dark Utilities. Rick Howard digs into identity management. And an arrest in the case of the Tornado Cash crypto mixer.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/156

Selected reading.
Shuckworm: Russia-Linked Group Maintains Ukraine Focus (Symantec)
Killnet Releases 'Proof' of its Attack Against Lockheed Martin (SecurityWeek) 
Killnet greift lettisches Parlament an (Tagesspiegel)
Iron Tiger Compromises Chat Application Mimi, Targets Windows, Mac, and Linux Users (Trend Micro)
How Frustration Over TikTok Has Mounted in Washington (New York Times)
3 ways China's access to TikTok data is a security risk (CSO Online)
Arrest of suspected developer of Tornado Cash (FIOD)
Tornado Cash Developer Arrested After U.S. Sanctions the Cryptocurrency Mixer (The Hacker News)
Arrested Tornado Cash developer is Alexey Pertsev, his wife confirms (The Block)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 15 Aug 2022 20:15:00 -0000</pubDate>
      <itunes:title>Shuckworm and Killnet continue to hack in the interest of Russia. Iron Tiger's supply chain campaign. TikTok and national security. And an arrest in the case of the Tornado Cash crypto mixer.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1641</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Shuckworm maintains its focus on Ukrainian targets. Killnet's DDoS and dubious proof-of-work. Iron Tiger's supply chain campaign. TikTok and national security. Dinah Davis from Arctic Wolf shares insights on Dark Utilities. Rick Howard digs into identity management. And an arrest in the case of the Tornado Cash crypto mixer.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/156

Selected reading.
Shuckworm: Russia-Linked Group Maintains Ukraine Focus (Symantec)
Killnet Releases 'Proof' of its Attack Against Lockheed Martin (SecurityWeek) 
Killnet greift lettisches Parlament an (Tagesspiegel)
Iron Tiger Compromises Chat Application Mimi, Targets Windows, Mac, and Linux Users (Trend Micro)
How Frustration Over TikTok Has Mounted in Washington (New York Times)
3 ways China's access to TikTok data is a security risk (CSO Online)
Arrest of suspected developer of Tornado Cash (FIOD)
Tornado Cash Developer Arrested After U.S. Sanctions the Cryptocurrency Mixer (The Hacker News)
Arrested Tornado Cash developer is Alexey Pertsev, his wife confirms (The Block)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Shuckworm maintains its focus on Ukrainian targets. Killnet's DDoS and dubious proof-of-work. Iron Tiger's supply chain campaign. TikTok and national security. Dinah Davis from Arctic Wolf shares insights on Dark Utilities. Rick Howard digs into identity management. And an arrest in the case of the Tornado Cash crypto mixer.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/156</p><p><br></p><h2>Selected reading.</h2><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/russia-ukraine-shuckworm">Shuckworm: Russia-Linked Group Maintains Ukraine Focus</a> (Symantec)</p><p><a href="https://www.securityweek.com/killnet-releases-proof-its-attack-against-lockheed-martin">Killnet Releases 'Proof' of its Attack Against Lockheed Martin</a> (SecurityWeek) </p><p><a href="https://background.tagesspiegel.de/cybersecurity/killnet-greift-lettisches-parlament-an">Killnet greift lettisches Parlament an</a> (Tagesspiegel)</p><p><a href="https://www.trendmicro.com/en_us/research/22/h/irontiger-compromises-chat-app-Mimi-targets-windows-mac-linux-users.html">Iron Tiger Compromises Chat Application Mimi, Targets Windows, Mac, and Linux Users </a>(Trend Micro)</p><p><a href="https://www.nytimes.com/2022/08/14/technology/tiktok-china-washington.html">How Frustration Over TikTok Has Mounted in Washington</a> (New York Times)</p><p><a href="https://www.csoonline.com/article/3670110/3-ways-chinas-access-to-tiktok-data-is-a-security-risk.html">3 ways China's access to TikTok data is a security risk</a> (CSO Online)</p><p><a href="https://www.fiod.nl/arrest-of-suspected-developer-of-tornado-cash/">Arrest of suspected developer of Tornado Cash</a> (FIOD)</p><p><a href="https://thehackernews.com/2022/08/tornado-cash-developer-arrested-after.html">Tornado Cash Developer Arrested After U.S. Sanctions the Cryptocurrency Mixer</a> (The Hacker News)</p><p><a href="https://www.theblock.co/post/163297/arrested-tornado-cash-developer-is-alexey-pertsev-his-wife-confirms">Arrested Tornado Cash developer is Alexey Pertsev, his wife confirms</a> (The Block)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1511</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[374f3356-787a-11ec-abf0-7fb9b8681978]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2900890974.mp3?updated=1671817317" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Red teamer's perspective on demotivating attackers. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/36/notes</link>
      <description>Cybercriminals are motivated by one simple incentive - money. Their favorite tools are bots to leverage sophistication, scalability, and ease of use. The effect is the creation of the underground bot ecosystem. This community allows threat actors to work together and continually improve their tactics. They sell bypasses for rule-based anti-bot solutions to other less technical fraudsters.
In this episode of CyberWire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined in the first half by Hash Table member Etay Maor. Cato Networks’ Senior Director Security Strategy. They discuss this reality that has put defenders at a serious disadvantage and the mitigation steps to consider for future attacks.. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor Kasada's founder Sam Crowther talking about what he saw first-hand as a red teamer at a major Australian bank and what inspired him to reimagine bot mitigation with the founding principle of undermining the attacker’s ROI.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 14 Aug 2022 07:00:00 -0000</pubDate>
      <itunes:title>Red teamer's perspective on demotivating attackers. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>36</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cybercriminals are motivated by one simple incentive - money. Their favorite tools are bots to leverage sophistication, scalability, and ease of use. The effect is the creation of the underground bot ecosystem. This community allows threat actors to work together and continually improve their tactics. They sell bypasses for rule-based anti-bot solutions to other less technical fraudsters.
In this episode of CyberWire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined in the first half by Hash Table member Etay Maor. Cato Networks’ Senior Director Security Strategy. They discuss this reality that has put defenders at a serious disadvantage and the mitigation steps to consider for future attacks.. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor Kasada's founder Sam Crowther talking about what he saw first-hand as a red teamer at a major Australian bank and what inspired him to reimagine bot mitigation with the founding principle of undermining the attacker’s ROI.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cybercriminals are motivated by one simple incentive - money. Their favorite tools are bots to leverage sophistication, scalability, and ease of use. The effect is the creation of the underground bot ecosystem. This community allows threat actors to work together and continually improve their tactics. They sell bypasses for rule-based anti-bot solutions to other less technical fraudsters.</p><p>In this episode of CyberWire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined in the first half by Hash Table member Etay Maor. Cato Networks’ Senior Director Security Strategy. They discuss this reality that has put defenders at a serious disadvantage and the mitigation steps to consider for future attacks.. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor Kasada's founder Sam Crowther talking about what he saw first-hand as a red teamer at a major Australian bank and what inspired him to reimagine bot mitigation with the founding principle of undermining the attacker’s ROI.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1524</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[43dbb734-1a55-11ed-91f8-1bd64af7d556]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1224524102.mp3?updated=1660251315" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Christian Lees: it's not always textbook. [CTO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/112/notes</link>
      <description>Christian Lees, CTO at Resecurity, shares his story and insight on coming into the cybersecurity world. He considers himself a late bloomer because he did not go to college until he was 23. He wasn’t sure of what he wanted to do, and a family friend gave him a computer and the rest was history, he says. He fell in love with computers and started working at different companies trying to get ahead. He says it's not always textbook, and sometimes you just need to cut your teeth on something to get where you're going. Throughout his journey, he was constantly questioning whether he made the right decision, and in the end he says you have to be willing to "define friction points in it, you may join security field, not knowing what you're gonna do, but by being that curious person and breaking things and putting it back together, you'll find the right way and just never stop being curious." We thank Christian for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 14 Aug 2022 07:00:00 -0000</pubDate>
      <itunes:title>Christian Lees: it's not always textbook. [CTO]  [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>112</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Christian Lees, CTO at Resecurity, shares his story and insight on coming into the cybersecurity world. He considers himself a late bloomer because he did not go to college until he was 23. He wasn’t sure of what he wanted to do, and a family friend gave him a computer and the rest was history, he says. He fell in love with computers and started working at different companies trying to get ahead. He says it's not always textbook, and sometimes you just need to cut your teeth on something to get where you're going. Throughout his journey, he was constantly questioning whether he made the right decision, and in the end he says you have to be willing to "define friction points in it, you may join security field, not knowing what you're gonna do, but by being that curious person and breaking things and putting it back together, you'll find the right way and just never stop being curious." We thank Christian for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Christian Lees, CTO at Resecurity, shares his story and insight on coming into the cybersecurity world. He considers himself a late bloomer because he did not go to college until he was 23. He wasn’t sure of what he wanted to do, and a family friend gave him a computer and the rest was history, he says. He fell in love with computers and started working at different companies trying to get ahead. He says it's not always textbook, and sometimes you just need to cut your teeth on something to get where you're going. Throughout his journey, he was constantly questioning whether he made the right decision, and in the end he says you have to be willing to "define friction points in it, you may join security field, not knowing what you're gonna do, but by being that curious person and breaking things and putting it back together, you'll find the right way and just never stop being curious." We thank Christian for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>488</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[093030e2-198d-11ed-ba7e-17718575b071]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2618835265.mp3?updated=1661444197" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fake job ads and how to spot them. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/245/notes</link>
      <description>Ashley Taylor from SANS.edu, joins Dave to discuss fake job ads and methods to proactively detect these scams. The research shares how job seekers are under attack, with scammers posing as fake job recruiters to steal information from people who are interested in the job posting. The brands being impersonated as are at risk of losing credibility to their brand identity.
The research shares exactly how these doppelgängers are posing a threat to job seekers and the best practices to detect these scams. It also shares how one company that works in medical device manufacturing industry has been a target for these scams. It concludes with sharing some of the ways to proactively spot these scams before they happen.
The research can be found here:
Doppelgängers: Finding Job Scammers Who Steal Brand Identities

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Aug 2022 07:00:00 -0000</pubDate>
      <itunes:title>Fake job ads and how to spot them.  [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>245</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ashley Taylor from SANS.edu, joins Dave to discuss fake job ads and methods to proactively detect these scams. The research shares how job seekers are under attack, with scammers posing as fake job recruiters to steal information from people who are interested in the job posting. The brands being impersonated as are at risk of losing credibility to their brand identity.
The research shares exactly how these doppelgängers are posing a threat to job seekers and the best practices to detect these scams. It also shares how one company that works in medical device manufacturing industry has been a target for these scams. It concludes with sharing some of the ways to proactively spot these scams before they happen.
The research can be found here:
Doppelgängers: Finding Job Scammers Who Steal Brand Identities

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ashley Taylor from SANS.edu, joins Dave to discuss fake job ads and methods to proactively detect these scams. The research shares how job seekers are under attack, with scammers posing as fake job recruiters to steal information from people who are interested in the job posting. The brands being impersonated as are at risk of losing credibility to their brand identity.</p><p>The research shares exactly how these doppelgängers are posing a threat to job seekers and the best practices to detect these scams. It also shares how one company that works in medical device manufacturing industry has been a target for these scams. It concludes with sharing some of the ways to proactively spot these scams before they happen.</p><p>The research can be found here:</p><ul><li><a href="https://www.sans.org/white-papers/doppelgangers-finding-job-scammers-who-steal-brand-identities/">Doppelgängers: Finding Job Scammers Who Steal Brand Identities</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1088</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7fcb08d4-19a7-11ed-9745-9fa7eb31098f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9359095807.mp3?updated=1685127101" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The optempo of a hybrid war's cyber phase. Hacktivists as cyber partisans. Zeppelin ransomware alert. DoNot Team update. Rewards for Justice offers $10 million for info on Russian bad actors.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1640/notes</link>
      <description>The optempo of the war's cyber phase, and Ukraine’s response. Organizing and equipping hacktivists. Joint warning on Zeppelin ransomware. Update on the DoNot Team, APT-C-35. Rewards for Justice offers $10 million for information on Conti operators. Rob Boyce from Accenture shares insights from BlackHat. Caleb Barlow ponders closing the skills gap while shifting to remote work. And, hey, Mr. Target: pick one, OK?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/155

Selected reading.
Black Hat 2022‑ Cyberdefense in a global threats era (WeLiveSecurity)
How one Ukrainian ethical hacker is training 'cyber warriors' in the fight against Russia (The Record by Recorded Future)
#StopRansomware: Zeppelin Ransomware (CISA)
APT-C-35: New Windows Framework Revealed (Morphisec)
The US Offers a $10M Bounty for Intel on Conti Ransomware Gang (Wired)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 12 Aug 2022 20:15:00 -0000</pubDate>
      <itunes:title>The optempo of a hybrid war's cyber phase. Hacktivists as cyber partisans. Zeppelin ransomware alert. DoNot Team update. Rewards for Justice offers $10 million for info on Russian bad actors.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1640</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The optempo of the war's cyber phase, and Ukraine’s response. Organizing and equipping hacktivists. Joint warning on Zeppelin ransomware. Update on the DoNot Team, APT-C-35. Rewards for Justice offers $10 million for information on Conti operators. Rob Boyce from Accenture shares insights from BlackHat. Caleb Barlow ponders closing the skills gap while shifting to remote work. And, hey, Mr. Target: pick one, OK?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/155

Selected reading.
Black Hat 2022‑ Cyberdefense in a global threats era (WeLiveSecurity)
How one Ukrainian ethical hacker is training 'cyber warriors' in the fight against Russia (The Record by Recorded Future)
#StopRansomware: Zeppelin Ransomware (CISA)
APT-C-35: New Windows Framework Revealed (Morphisec)
The US Offers a $10M Bounty for Intel on Conti Ransomware Gang (Wired)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The optempo of the war's cyber phase, and Ukraine’s response. Organizing and equipping hacktivists. Joint warning on Zeppelin ransomware. Update on the DoNot Team, APT-C-35. Rewards for Justice offers $10 million for information on Conti operators. Rob Boyce from Accenture shares insights from BlackHat. Caleb Barlow ponders closing the skills gap while shifting to remote work. And, hey, Mr. Target: pick one, OK?</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/155</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.welivesecurity.com/2022/08/12/black-hat-2022-cyberdefense-ukraine/">Black Hat 2022‑ Cyberdefense in a global threats era</a> (WeLiveSecurity)</p><p><a href="https://therecord.media/how-one-ukrainian-ethical-hacker-is-training-cyber-warriors-in-the-fight-against-russia/">How one Ukrainian ethical hacker is training 'cyber warriors' in the fight against Russia</a> (The Record by Recorded Future)</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-223a">#StopRansomware: Zeppelin Ransomware</a> (CISA)</p><p><a href="https://blog.morphisec.com/apt-c-35-new-windows-framework-revealed">APT-C-35: New Windows Framework Revealed</a> (Morphisec)</p><p><a href="https://www.wired.com/story/conti-group-ransomware-members-reward-target/">The US Offers a $10M Bounty for Intel on Conti Ransomware Gang</a> (Wired)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1604</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3988ca24-787a-11ec-abf0-4b437cfc165c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5493343504.mp3?updated=1671817333" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA22-223A – #StopRansomware: Zeppelin Ransomware. [CISA Cybersecurity Alerts}</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/27/notes</link>
      <description>Zeppelin ransomware functions as a ransomware-as-a-service (RaaS), and since 2019, actors have used this malware to target a wide range of businesses and critical infrastructure organizations. Actors use remote desktop protocol (RDP), SonicWall firewall vulnerabilities, and phishing campaigns to gain initial access to victim networks and then deploy Zeppelin ransomware to encrypt victims’ files.
AA22-223A Alert, Technical Details, and Mitigations
Zeppelin malware YARA signature
What is Zeppelin Ransomware? Steps to Prepare, Respond, and Prevent Infection
Stopransomware.gov is a whole-of-government approach that gives one central location for ransomware resources and alerts.
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed TTPs and IOCs to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 11 Aug 2022 20:26:00 -0000</pubDate>
      <itunes:title>CISA Alert AA22-223A – #StopRansomware: Zeppelin Ransomware. [CISA Cybersecurity Alerts}</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>27</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Zeppelin ransomware functions as a ransomware-as-a-service (RaaS), and since 2019, actors have used this malware to target a wide range of businesses and critical infrastructure organizations. Actors use remote desktop protocol (RDP), SonicWall firewall vulnerabilities, and phishing campaigns to gain initial access to victim networks and then deploy Zeppelin ransomware to encrypt victims’ files.
AA22-223A Alert, Technical Details, and Mitigations
Zeppelin malware YARA signature
What is Zeppelin Ransomware? Steps to Prepare, Respond, and Prevent Infection
Stopransomware.gov is a whole-of-government approach that gives one central location for ransomware resources and alerts.
No-cost cyber hygiene services: Cyber Hygiene Services and Ransomware Readiness Assessment.
This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed TTPs and IOCs to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Zeppelin ransomware functions as a ransomware-as-a-service (RaaS), and since 2019, actors have used this malware to target a wide range of businesses and critical infrastructure organizations. Actors use remote desktop protocol (RDP), SonicWall firewall vulnerabilities, and phishing campaigns to gain initial access to victim networks and then deploy Zeppelin ransomware to encrypt victims’ files.</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-223a">AA22-223A Alert, Technical Details, and Mitigations</a></p><p><a href="https://www.cisa.gov/uscert/sites/default/files/publications/Zeppelin.yar">Zeppelin malware YARA signature</a></p><p><a href="https://www.coresecurity.com/core-labs/articles/what-zeppelin-ransomware-steps-prepare-respond-and-prevent-infection">What is Zeppelin Ransomware? Steps to Prepare, Respond, and Prevent Infection</a></p><p><a href="https://www.stopransomware.gov/">Stopransomware.gov</a> is a whole-of-government approach that gives one central location for ransomware resources and alerts.</p><p>No-cost cyber hygiene services: <a href="https://www.cisa.gov/cyber-hygiene-services">Cyber Hygiene Services</a> and <a href="https://github.com/cisagov/cset/releases/tag/v10.3.0.0">Ransomware Readiness Assessment</a>.</p><p>This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed TTPs and IOCs to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.</p><p>All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at <a href="mailto:central@cisa.dhs.gov">central@cisa.dhs.gov</a> or (888) 282-0870 and to the FBI via your <a href="https://www.fbi.gov/contact-us/field-offices">local FBI field office</a> or the FBI’s 24/7 CyWatch at (855) 292-3937 or <a href="mailto:CyWatch@fbi.gov">CyWatch@fbi.gov</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>196</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e2eb9604-19b1-11ed-b38e-1354cd6f9142]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1139844960.mp3?updated=1660248912" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dispatches from a hybrid war. CISA releases its election cybersecurity toolkit. Post-incident disruption at NHS is expected to last at least three weeks. Cisco discloses a security incident.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1639/notes</link>
      <description>KillMilk says his crew downed Lockheed Martin's website. Industroyer2, and what became of it. CISA releases its election cybersecurity toolkit. Post-incident disruption at Britain’s NHS. Carl Wright of AttackIQ shares strategies for CISOs to successfully prepare for the next attack. Dr. Christopher Pierson from Blackcloak joins us from Black Hat. And Cisco seems to have thwarted a security incident.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/154

Selected reading.
Russian hacking group claims attack on Lockheed Martin (SiliconANGLE
HIMARS-Maker Lockheed Martin "confident" against Russian hackers (Newsweek)
Industroyer2: How Ukraine avoided another blackout attack (SearchSecurity)
Researchers Look Inside Russian Malware Targeting Ukrainian Power Grid (PCMAG)
CISA Releases Toolkit of Free Cybersecurity Resources for Election Community (CISA)
Cybersecurity Toolkit to Protect Elections (CISA) 
NHS staff told to plan for three weeks of disruption following cyberattack (Computing)
Major NHS IT outage to last for three weeks (The Independent)
Exclusive: NHS chiefs fear cyber attackers have accessed patient data (Health Service Journal) 
Cisco Event Response: Corporate Network Security Incident (Cisco)
Cisco Talos shares insights related to recent cyber attack on Cisco (Cisco Talos)
Cisco confirms May attack by Yanluowang ransomware group (The Record by Recorded Future)
Cisco Hit by Cyberattack From Hacker Linked to Lapsus$ Gang (Bloomberg)
Cisco's own network compromised by gang with Lapsus$ links (Register) 
Cisco hacked by Yanluowang ransomware gang, 2.8GB allegedly stolen (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 11 Aug 2022 20:15:00 -0000</pubDate>
      <itunes:title>Dispatches from a hybrid war. CISA releases its election cybersecurity toolkit. Post-incident disruption at NHS is expected to last at least three weeks. Cisco discloses a security incident.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1639</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>KillMilk says his crew downed Lockheed Martin's website. Industroyer2, and what became of it. CISA releases its election cybersecurity toolkit. Post-incident disruption at Britain’s NHS. Carl Wright of AttackIQ shares strategies for CISOs to successfully prepare for the next attack. Dr. Christopher Pierson from Blackcloak joins us from Black Hat. And Cisco seems to have thwarted a security incident.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/154

Selected reading.
Russian hacking group claims attack on Lockheed Martin (SiliconANGLE
HIMARS-Maker Lockheed Martin "confident" against Russian hackers (Newsweek)
Industroyer2: How Ukraine avoided another blackout attack (SearchSecurity)
Researchers Look Inside Russian Malware Targeting Ukrainian Power Grid (PCMAG)
CISA Releases Toolkit of Free Cybersecurity Resources for Election Community (CISA)
Cybersecurity Toolkit to Protect Elections (CISA) 
NHS staff told to plan for three weeks of disruption following cyberattack (Computing)
Major NHS IT outage to last for three weeks (The Independent)
Exclusive: NHS chiefs fear cyber attackers have accessed patient data (Health Service Journal) 
Cisco Event Response: Corporate Network Security Incident (Cisco)
Cisco Talos shares insights related to recent cyber attack on Cisco (Cisco Talos)
Cisco confirms May attack by Yanluowang ransomware group (The Record by Recorded Future)
Cisco Hit by Cyberattack From Hacker Linked to Lapsus$ Gang (Bloomberg)
Cisco's own network compromised by gang with Lapsus$ links (Register) 
Cisco hacked by Yanluowang ransomware gang, 2.8GB allegedly stolen (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>KillMilk says his crew downed Lockheed Martin's website. Industroyer2, and what became of it. CISA releases its election cybersecurity toolkit. Post-incident disruption at Britain’s NHS. Carl Wright of AttackIQ shares strategies for CISOs to successfully prepare for the next attack. Dr. Christopher Pierson from Blackcloak joins us from Black Hat. And Cisco seems to have thwarted a security incident.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/154</p><p><br></p><h2>Selected reading.</h2><p><a href="https://siliconangle.com/2022/08/10/russian-hacking-group-claims-successfully-attacked-lockheed-martin/">Russian hacking group claims attack on Lockheed Martin</a> (SiliconANGLE</p><p><a href="https://www.newsweek.com/himars-maker-lockheed-martin-cyberattack-russian-hackers-1732504">HIMARS-Maker Lockheed Martin "confident" against Russian hackers</a> (Newsweek)</p><p><a href="https://www.techtarget.com/searchsecurity/news/252523694/Industroyer2-How-Ukraine-avoided-another-blackout-attack">Industroyer2: How Ukraine avoided another blackout attack</a> (SearchSecurity)</p><p><a href="https://www.pcmag.com/news/researchers-look-inside-russian-malware-targeting-ukrainian-power-grid">Researchers Look Inside Russian Malware Targeting Ukrainian Power Grid</a> (PCMAG)</p><p><a href="https://www.cisa.gov/news/2022/08/10/cisa-releases-toolkit-free-cybersecurity-resources-election-community">CISA Releases Toolkit of Free Cybersecurity Resources for Election Community</a> (CISA)</p><p><a href="https://www.cisa.gov/cybersecurity-toolkit-protect-elections">Cybersecurity Toolkit to Protect Elections</a> (CISA) </p><p><a href="https://www.computing.co.uk/news/4054597/nhs-staff-told-plan-weeks-disruption-following-cyberattack">NHS staff told to plan for three weeks of disruption following cyberattack </a>(Computing)</p><p><a href="https://www.independent.co.uk/news/health/nhs-cyber-attack-staff-it-b2142245.html">Major NHS IT outage to last for three weeks</a> (The Independent)</p><p><a href="https://www.hsj.co.uk/technology-and-innovation/exclusive-nhs-chiefs-fear-cyber-attackers-have-accessed-patient-data/7032975.article">Exclusive: NHS chiefs fear cyber attackers have accessed patient data</a> (Health Service Journal) </p><p><a href="https://tools.cisco.com/security/center/resources/corp_network_security_incident">Cisco Event Response: Corporate Network Security Incident</a> (Cisco)</p><p><a href="https://blog.talosintelligence.com/2022/08/recent-cyber-attack.html">Cisco Talos shares insights related to recent cyber attack on Cisco</a> (Cisco Talos)</p><p><a href="https://therecord.media/cisco-confirms-may-attack-by-yanluowang-ransomware-group/">Cisco confirms May attack by Yanluowang ransomware group</a> (The Record by Recorded Future)</p><p><a href="https://www.bloomberg.com/news/articles/2022-08-10/cisco-hit-by-cyberattack-from-hacker-linked-to-lapsus-gang">Cisco Hit by Cyberattack From Hacker Linked to Lapsus$ Gang</a> (Bloomberg)</p><p><a href="https://www.theregister.com/2022/08/11/cisco_corporate_network_compromised/">Cisco's own network compromised by gang with Lapsus$ links</a> (Register) </p><p><a href="https://www.bleepingcomputer.com/news/security/cisco-hacked-by-yanluowang-ransomware-gang-28gb-allegedly-stolen/">Cisco hacked by Yanluowang ransomware gang, 2.8GB allegedly stolen</a> (BleepingComputer)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1610</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3929a49a-787a-11ec-abf0-7f2d51b6621e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7461723490.mp3?updated=1671817344" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patches, and some incentive to apply them. Hacktivism, privateering, and patriotic banditry in Russia’s hybrid war. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1638/notes</link>
      <description>Patch notes, and the risks associated with failure to patch. Finland's parliament comes under cyberattack. Killnet says there will be blood, but they may just be grandstanding for the home crowd. Cyberattacks against a UK firm that's criticized Russia's war. We’re joined by FBI Cyber Division AD Bryan Vorndran and Adam Hickey, deputy assistant attorney general for the National Security Division with an introduction to Watchguard. Our guest is Matthew Warner from Blumira with tips on avoiding burnout. And not all criminal organizations are working for Russia.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/153

Selected reading.
Already Exploited Zero-Day Headlines Microsoft Patch Tuesday (SecurityWeek) 
Microsoft August 2022 Patch Tuesday fixes exploited zero-day, 121 flaws (BleepingComputer).
IBM Patches High-Severity Vulnerabilities in Cloud, Voice, Security Products (SecurityWeek)
Adobe Patch Tuesday: Code Execution Flaws in Acrobat, Reader (SecurityWeek) 
ICS Patch Tuesday: Siemens, Schneider Electric Fix Only 11 Vulnerabilities (SecurityWeek) 
VMSA-2022-0022 (VMware) 
Emerson OpenBSI (CISA) 
Emerson ControlWave (CISA)
Mitsubishi Electric GT SoftGOT2000 (CISA) 
Multiple attackers increase pressure on victims, complicate incident response (Sophos News)
Life After Death—SmokeLoader Continues to Haunt Using Old Vulnerabilities (Fortinet Blog) 
NBI launches probe into attack on Finnish Parliament site (Yle)
Russian hacker warns cyberwarfare will turn deadly (Newsweek) 
Russian hacker warns cyberwarfare will turn deadly (Newsweek)
Suspected Russian cyber attack on British soil as firm subjected to ‘daily’ hacks (The Telegraph)
Meet DUMPS Forum: A pro-Ukraine, anti-Russia cybercriminal forum | Digital Shadows (Digital Shadows)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 10 Aug 2022 21:15:00 -0000</pubDate>
      <itunes:title>Patches, and some incentive to apply them. Hacktivism, privateering, and patriotic banditry in Russia’s hybrid war. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1638</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Patch notes, and the risks associated with failure to patch. Finland's parliament comes under cyberattack. Killnet says there will be blood, but they may just be grandstanding for the home crowd. Cyberattacks against a UK firm that's criticized Russia's war. We’re joined by FBI Cyber Division AD Bryan Vorndran and Adam Hickey, deputy assistant attorney general for the National Security Division with an introduction to Watchguard. Our guest is Matthew Warner from Blumira with tips on avoiding burnout. And not all criminal organizations are working for Russia.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/153

Selected reading.
Already Exploited Zero-Day Headlines Microsoft Patch Tuesday (SecurityWeek) 
Microsoft August 2022 Patch Tuesday fixes exploited zero-day, 121 flaws (BleepingComputer).
IBM Patches High-Severity Vulnerabilities in Cloud, Voice, Security Products (SecurityWeek)
Adobe Patch Tuesday: Code Execution Flaws in Acrobat, Reader (SecurityWeek) 
ICS Patch Tuesday: Siemens, Schneider Electric Fix Only 11 Vulnerabilities (SecurityWeek) 
VMSA-2022-0022 (VMware) 
Emerson OpenBSI (CISA) 
Emerson ControlWave (CISA)
Mitsubishi Electric GT SoftGOT2000 (CISA) 
Multiple attackers increase pressure on victims, complicate incident response (Sophos News)
Life After Death—SmokeLoader Continues to Haunt Using Old Vulnerabilities (Fortinet Blog) 
NBI launches probe into attack on Finnish Parliament site (Yle)
Russian hacker warns cyberwarfare will turn deadly (Newsweek) 
Russian hacker warns cyberwarfare will turn deadly (Newsweek)
Suspected Russian cyber attack on British soil as firm subjected to ‘daily’ hacks (The Telegraph)
Meet DUMPS Forum: A pro-Ukraine, anti-Russia cybercriminal forum | Digital Shadows (Digital Shadows)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Patch notes, and the risks associated with failure to patch. Finland's parliament comes under cyberattack. Killnet says there will be blood, but they may just be grandstanding for the home crowd. Cyberattacks against a UK firm that's criticized Russia's war. We’re joined by FBI Cyber Division AD Bryan Vorndran and Adam Hickey, deputy assistant attorney general for the National Security Division with an introduction to Watchguard. Our guest is Matthew Warner from Blumira with tips on avoiding burnout. And not all criminal organizations are working for Russia.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/153</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.securityweek.com/already-exploited-zero-day-headlines-microsoft-patch-tuesday">Already Exploited Zero-Day Headlines Microsoft Patch Tuesday</a> (SecurityWeek) </p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-august-2022-patch-tuesday-fixes-exploited-zero-day-121-flaws/">Microsoft August 2022 Patch Tuesday fixes exploited zero-day, 121 flaws</a> (BleepingComputer).</p><p><a href="https://www.securityweek.com/ibm-patches-high-severity-vulnerabilities-cloud-voice-security-products">IBM Patches High-Severity Vulnerabilities in Cloud, Voice, Security Products</a> (SecurityWeek)</p><p><a href="https://www.securityweek.com/adobe-patch-tuesday-code-execution-flaws-acrobat-reader">Adobe Patch Tuesday: Code Execution Flaws in Acrobat, Reader</a> (SecurityWeek) </p><p><a href="https://www.securityweek.com/ics-patch-tuesday-siemens-schneider-electric-fix-only-11-vulnerabilities">ICS Patch Tuesday: Siemens, Schneider Electric Fix Only 11 Vulnerabilities</a> (SecurityWeek) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/08/09/vmware-releases-security-updates">VMSA-2022-0022</a> (VMware) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-221-03">Emerson OpenBSI</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-221-02">Emerson ControlWave</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-221-01">Mitsubishi Electric GT SoftGOT2000</a> (CISA) </p><p><a href="https://news.sophos.com/en-us/2022/08/09/multiple-attackers-increase-pressure-on-victims-complicate-incident-response/">Multiple attackers increase pressure on victims, complicate incident response</a> (Sophos News)</p><p><a href="https://www.fortinet.com/blog/threat-research/smokeloader-using-old-vulnerabilities">Life After Death—SmokeLoader Continues to Haunt Using Old Vulnerabilities</a> (Fortinet Blog) </p><p><a href="https://yle.fi/news/3-12569719">NBI launches probe into attack on Finnish Parliament site</a> (Yle)</p><p><a href="https://www.newsweek.com/deadly-cyberwarfare-warning-russian-hacker-killnet-1731949">Russian hacker warns cyberwarfare will turn deadly</a> (Newsweek) </p><p><a href="https://www.newsweek.com/deadly-cyberwarfare-warning-russian-hacker-killnet-1731949">Russian hacker warns cyberwarfare will turn deadly</a> (Newsweek)</p><p><a href="https://www.telegraph.co.uk/news/2022/08/09/suspected-russian-cyber-attack-british-soil-firm-subjected-daily/">Suspected Russian cyber attack on British soil as firm subjected to ‘daily’ hacks</a> (The Telegraph)</p><p><a href="https://www.digitalshadows.com/blog-and-research/meet-dumps-forum-a-pro-ukraine-anti-russia-cybercriminal-forum/">Meet DUMPS Forum: A pro-Ukraine, anti-Russia cybercriminal forum | Digital Shadows</a> (Digital Shadows)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1977</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[386bd668-787a-11ec-abf0-23150063306e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5902649723.mp3?updated=1671817364" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage against belligerents' industry. Tornado Cash sanctions. Data breaches at Twilio and Klayvio. Intercept tools and policies in Canada.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1637/notes</link>
      <description>Tracking apparent Chinese industrial cyberespionage. Tornado Cash sanctions. Twilio discloses a breach. Social engineering exposes data at Klaviyo. Microsoft’s Ann Johnson previews the latest season of Afternoon Cyber Tea. Joe Carrigan tracks the growth in cryptojacking. And what might the Mounties be monitoring?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/152

Selected reading.
Cyberspying Aimed at Industrial Enterprises in Russia and Ukraine Linked to China (SecurityWeek)
China-linked spies used six backdoors to steal defense info (Register)
U.S. Treasury Sanctions Notorious Virtual Currency Mixer Tornado Cash (U.S. Department of the Treasury)
Twilio hacked by phishing campaign (TechCrunch)
Twilio, a texting platform popular with political campaigns, reports breach (CyberScoop)
Incident Report: Employee and Customer Account Compromise - August 4, 2022 (Twilio Blog)
Email marketing firm hacked to steal crypto-focused mailing lists (BleepingComputer)
RCMP has used spyware to access targets’ communications as far back as 2002: Senior Mountie (Global News)
RCMP says it has not used Pegasus spyware (POLITICO)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Aug 2022 20:15:00 -0000</pubDate>
      <itunes:title>Cyberespionage against belligerents' industry. Tornado Cash sanctions. Data breaches at Twilio and Klayvio. Intercept tools and policies in Canada.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1637</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Tracking apparent Chinese industrial cyberespionage. Tornado Cash sanctions. Twilio discloses a breach. Social engineering exposes data at Klaviyo. Microsoft’s Ann Johnson previews the latest season of Afternoon Cyber Tea. Joe Carrigan tracks the growth in cryptojacking. And what might the Mounties be monitoring?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/152

Selected reading.
Cyberspying Aimed at Industrial Enterprises in Russia and Ukraine Linked to China (SecurityWeek)
China-linked spies used six backdoors to steal defense info (Register)
U.S. Treasury Sanctions Notorious Virtual Currency Mixer Tornado Cash (U.S. Department of the Treasury)
Twilio hacked by phishing campaign (TechCrunch)
Twilio, a texting platform popular with political campaigns, reports breach (CyberScoop)
Incident Report: Employee and Customer Account Compromise - August 4, 2022 (Twilio Blog)
Email marketing firm hacked to steal crypto-focused mailing lists (BleepingComputer)
RCMP has used spyware to access targets’ communications as far back as 2002: Senior Mountie (Global News)
RCMP says it has not used Pegasus spyware (POLITICO)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tracking apparent Chinese industrial cyberespionage. Tornado Cash sanctions. Twilio discloses a breach. Social engineering exposes data at Klaviyo. Microsoft’s Ann Johnson previews the latest season of Afternoon Cyber Tea. Joe Carrigan tracks the growth in cryptojacking. And what might the Mounties be monitoring?</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/152</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.securityweek.com/cyberspying-aimed-industrial-enterprises-russia-and-ukraine-linked-china">Cyberspying Aimed at Industrial Enterprises in Russia and Ukraine Linked to China</a> (SecurityWeek)</p><p><a href="https://www.theregister.com/2022/08/09/china_apt_kaspersky/">China-linked spies used six backdoors to steal defense info</a> (Register)</p><p><a href="https://home.treasury.gov/news/press-releases/jy0916">U.S. Treasury Sanctions Notorious Virtual Currency Mixer Tornado Cash</a> (U.S. Department of the Treasury)</p><p><a href="https://techcrunch.com/2022/08/08/twilio-breach-customer-data/">Twilio hacked by phishing campaign</a> (TechCrunch)</p><p><a href="https://www.cyberscoop.com/twilio-campaign-hack-text/">Twilio, a texting platform popular with political campaigns, reports breach</a> (CyberScoop)</p><p><a href="https://www.twilio.com/blog/august-2022-social-engineering-attack">Incident Report: Employee and Customer Account Compromise - August 4, 2022</a> (Twilio Blog)</p><p><a href="https://www.bleepingcomputer.com/news/security/email-marketing-firm-hacked-to-steal-crypto-focused-mailing-lists/">Email marketing firm hacked to steal crypto-focused mailing lists</a> (BleepingComputer)</p><p><a href="https://globalnews.ca/news/9044296/rcmp-cellphone-hacking-privacy/">RCMP has used spyware to access targets’ communications as far back as 2002: Senior Mountie</a> (Global News)</p><p><a href="https://www.politico.com/news/2022/08/08/privacy-watchdog-rcmp-spyware-00050356?utm_campaign=wp_the_cybersecurity_202&amp;utm_medium=email&amp;utm_source=newsletter&amp;wpisrc=nl_cybersecurity202">RCMP says it has not used Pegasus spyware</a> (POLITICO)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1678</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[380d822a-787a-11ec-abf0-1b110473075f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4761027021.mp3?updated=1671817365" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybersecurity is a team sport. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/35/notes</link>
      <description>In order to run a successful SOC, security leaders rely on tools with different strengths to create layers of defense. This has led to a highly siloed industry with over 2,000 vendors, each with their own specific function and who very seldom work together. To gain an advantage on attackers, we need to start seeing cybersecurity as a team sport–united for a shared mission.
In this episode of CyberWire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined in the first half by two Hash Table members, Ted Wagner, CISO at SAP National Security Services, and Jenn Reed, CISO at Aviatrix. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor ExtraHop's Senior Product Marketing Manager, Chase Snyder, and CrowdStrike's Head of Product Marketing, Janani Nagarajan .They discuss why and how vendors should work together to enable better integrated security for their customers. They’ll answer questions like “what is XDR?” and “how do I get my vendors to work together?”. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Aug 2022 07:00:00 -0000</pubDate>
      <itunes:title>Cybersecurity is a team sport. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>35</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In order to run a successful SOC, security leaders rely on tools with different strengths to create layers of defense. This has led to a highly siloed industry with over 2,000 vendors, each with their own specific function and who very seldom work together. To gain an advantage on attackers, we need to start seeing cybersecurity as a team sport–united for a shared mission.
In this episode of CyberWire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined in the first half by two Hash Table members, Ted Wagner, CISO at SAP National Security Services, and Jenn Reed, CISO at Aviatrix. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor ExtraHop's Senior Product Marketing Manager, Chase Snyder, and CrowdStrike's Head of Product Marketing, Janani Nagarajan .They discuss why and how vendors should work together to enable better integrated security for their customers. They’ll answer questions like “what is XDR?” and “how do I get my vendors to work together?”. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In order to run a successful SOC, security leaders rely on tools with different strengths to create layers of defense. This has led to a highly siloed industry with over 2,000 vendors, each with their own specific function and who very seldom work together. To gain an advantage on attackers, we need to start seeing cybersecurity as a team sport–united for a shared mission.</p><p>In this episode of CyberWire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, is joined in the first half by two Hash Table members, Ted Wagner, CISO at SAP National Security Services, and Jenn Reed, CISO at Aviatrix. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor ExtraHop's Senior Product Marketing Manager, Chase Snyder, and CrowdStrike's Head of Product Marketing, Janani Nagarajan .They discuss why and how vendors should work together to enable better integrated security for their customers. They’ll answer questions like “what is XDR?” and “how do I get my vendors to work together?”. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1934</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fa3156f0-1754-11ed-9192-4f9488b8c8a4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7382971935.mp3?updated=1659979098" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Wipers, tak; grid takedown, nyet. Twitter 0-day exploited before patching. NHS 111 recovering from cyberattack. Notes on the C2C underworld.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1636/notes</link>
      <description>Shifting cyber threats during Russia's war against Ukraine. A Twitter exploit may have compromised more than 5 million accounts. A Cyberattack disrupts NHS 111. Developments in the C2C market. An alleged Russian cryptocurrency exchange operator is extradited to the US. Rick Howard looks at FinTech. Andrea Little Limbago from Interos on Industrial policy and the tech divide. And a Crypto mixing service has been sanctioned by the US Treasury Department.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/151

Selected reading.
ESET Threat Report T 1 2022 (WeLiveSecurity) 
Twitter confirms zero-day used to expose data of 5.4 million accounts (BleepingComputer)
NHS 111 software outage confirmed as cyber-attack (BBC News) 
Ministers coordinate response after cyber-attack hits NHS 111 (the Guardian)
Thousands of hackers flock to 'Dark Utilities' C2-as-a-Service (BleepingComputer)
Attackers leveraging Dark Utilities "C2aaS" platform in malware campaigns (Cisco Talos)
Genesis Brings Polish to Stolen-Credential Marketplaces (Sophos)
Cyber-related Designation (U.S. Department of the Treasury)
U.S. imposes sanctions on virtual currency mixer Tornado Cash (Reuters)
Crypto Mixing Service Tornado Cash Blacklisted by US Treasury (CoinDesk)
Alleged Russian Cryptocurrency Money Launderer Extradited to United States (US Department of Justice)
Russian accused of money laundering and running $4B bitcoin exchange extradited to US | CNN Politics (CNN)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 08 Aug 2022 20:15:00 -0000</pubDate>
      <itunes:title>Wipers, tak; grid takedown, nyet. Twitter 0-day exploited before patching. NHS 111 recovering from cyberattack. Notes on the C2C underworld.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1636</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Shifting cyber threats during Russia's war against Ukraine. A Twitter exploit may have compromised more than 5 million accounts. A Cyberattack disrupts NHS 111. Developments in the C2C market. An alleged Russian cryptocurrency exchange operator is extradited to the US. Rick Howard looks at FinTech. Andrea Little Limbago from Interos on Industrial policy and the tech divide. And a Crypto mixing service has been sanctioned by the US Treasury Department.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/151

Selected reading.
ESET Threat Report T 1 2022 (WeLiveSecurity) 
Twitter confirms zero-day used to expose data of 5.4 million accounts (BleepingComputer)
NHS 111 software outage confirmed as cyber-attack (BBC News) 
Ministers coordinate response after cyber-attack hits NHS 111 (the Guardian)
Thousands of hackers flock to 'Dark Utilities' C2-as-a-Service (BleepingComputer)
Attackers leveraging Dark Utilities "C2aaS" platform in malware campaigns (Cisco Talos)
Genesis Brings Polish to Stolen-Credential Marketplaces (Sophos)
Cyber-related Designation (U.S. Department of the Treasury)
U.S. imposes sanctions on virtual currency mixer Tornado Cash (Reuters)
Crypto Mixing Service Tornado Cash Blacklisted by US Treasury (CoinDesk)
Alleged Russian Cryptocurrency Money Launderer Extradited to United States (US Department of Justice)
Russian accused of money laundering and running $4B bitcoin exchange extradited to US | CNN Politics (CNN)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Shifting cyber threats during Russia's war against Ukraine. A Twitter exploit may have compromised more than 5 million accounts. A Cyberattack disrupts NHS 111. Developments in the C2C market. An alleged Russian cryptocurrency exchange operator is extradited to the US. Rick Howard looks at FinTech. Andrea Little Limbago from Interos on Industrial policy and the tech divide. And a Crypto mixing service has been sanctioned by the US Treasury Department.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/151</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.welivesecurity.com/2022/06/02/eset-threat-report-t12022/">ESET Threat Report T 1 2022</a> (WeLiveSecurity) </p><p><a href="https://www.bleepingcomputer.com/news/security/twitter-confirms-zero-day-used-to-expose-data-of-54-million-accounts/">Twitter confirms zero-day used to expose data of 5.4 million accounts</a> (BleepingComputer)</p><p><a href="https://www.bbc.com/news/uk-wales-62442127">NHS 111 software outage confirmed as cyber-attack</a> (BBC News) </p><p><a href="https://www.theguardian.com/society/2022/aug/06/ministers-coordinate-response-cyberattack-nhs">Ministers coordinate response after cyber-attack hits NHS 111</a> (the Guardian)</p><p><a href="https://www.bleepingcomputer.com/news/security/thousands-of-hackers-flock-to-dark-utilities-c2-as-a-service/">Thousands of hackers flock to 'Dark Utilities' C2-as-a-Service</a> (BleepingComputer)</p><p><a href="https://blog.talosintelligence.com/2022/08/dark-utilities.html">Attackers leveraging Dark Utilities "C2aaS" platform in malware campaigns</a> (Cisco Talos)</p><p><a href="https://news.sophos.com/en-us/2022/08/04/genesis-brings-polish-to-stolen-credential-marketplaces/">Genesis Brings Polish to Stolen-Credential Marketplaces</a> (Sophos)</p><p><a href="https://home.treasury.gov/policy-issues/financial-sanctions/recent-actions/20220808">Cyber-related Designation</a> (U.S. Department of the Treasury)</p><p><a href="https://www.reuters.com/technology/us-imposes-sanctions-virtual-currency-mixer-tornado-cash-2022-08-08/">U.S. imposes sanctions on virtual currency mixer Tornado Cash</a> (Reuters)</p><p><a href="https://www.coindesk.com/policy/2022/08/08/crypto-mixing-service-tornado-cash-blacklisted-by-us-treasury/">Crypto Mixing Service Tornado Cash Blacklisted by US Treasury</a> (CoinDesk)</p><p><a href="https://www.justice.gov/opa/pr/alleged-russian-cryptocurrency-money-launderer-extradited-united-states">Alleged Russian Cryptocurrency Money Launderer Extradited to United States</a> (US Department of Justice)</p><p><a href="https://www.cnn.com/2022/08/04/politics/russian-bitcoin-extradited-us/">Russian accused of money laundering and running $4B bitcoin exchange extradited to US | CNN Politics</a> (CNN)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1530</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[372fac66-787a-11ec-abf0-7bb161d62eef]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5774354187.mp3?updated=1671817494" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Anna Belak: Acquiring skills to make you into a unicorn. [Thought Leadership] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/111/notes</link>
      <description>Anna Belak, Director of Thought Leadership at Sysdig, shares her story from physics to cyber. Anna explains how she went into college with the thinking of getting a physics degree and then for her PhD decided to switch to material science and engineering. Both were not something she enjoyed and ultimately decided to go into cyber. She shares some advice on how you should never limit yourself to your degree, as well as always learning new skills and honing in on skills you already have. She say's by doing these things it will make you into a unicorn, meaning if you are good at one thing and teach yourself to be good at something else, you will become that much more valuable. Anna hopes she makes an impact with the people she works with, she hopes they will want to work with her even long after she leaves a company. We thank Anna for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 07 Aug 2022 07:00:00 -0000</pubDate>
      <itunes:title>Anna Belak: Acquiring skills to make you into a unicorn. [Thought Leadership] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>111</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Anna Belak, Director of Thought Leadership at Sysdig, shares her story from physics to cyber. Anna explains how she went into college with the thinking of getting a physics degree and then for her PhD decided to switch to material science and engineering. Both were not something she enjoyed and ultimately decided to go into cyber. She shares some advice on how you should never limit yourself to your degree, as well as always learning new skills and honing in on skills you already have. She say's by doing these things it will make you into a unicorn, meaning if you are good at one thing and teach yourself to be good at something else, you will become that much more valuable. Anna hopes she makes an impact with the people she works with, she hopes they will want to work with her even long after she leaves a company. We thank Anna for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Anna Belak, Director of Thought Leadership at Sysdig, shares her story from physics to cyber. Anna explains how she went into college with the thinking of getting a physics degree and then for her PhD decided to switch to material science and engineering. Both were not something she enjoyed and ultimately decided to go into cyber. She shares some advice on how you should never limit yourself to your degree, as well as always learning new skills and honing in on skills you already have. She say's by doing these things it will make you into a unicorn, meaning if you are good at one thing and teach yourself to be good at something else, you will become that much more valuable. Anna hopes she makes an impact with the people she works with, she hopes they will want to work with her even long after she leaves a company. We thank Anna for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>518</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cbd3cd0e-14d1-11ed-82d9-c3b7be3c3374]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7954677433.mp3?updated=1659636237" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Iran-linked Lyceum Group adds a new weapon to its arsenal. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/244/notes</link>
      <description>Deepen Desai from Zscaler's ThreatLabz joins Dave to discuss how APTs, like Lyceum Group, create tactics and malware to carry out attacks against their targets. The Lyceum group has been active since 2017 and is a state-sponsored Iranian APT group. This group targets Middle Eastern organizations most notably in the energy and telecommunication sectors, and they rely heavily on .NET based malwares.
Zscaler said in their research they "recently observed a new campaign where the Lyceum Group was utilizing a newly developed and customized .NET based malware targeting the Middle East by copying the underlying code from an open source tool." They go on to give an analysis explaining why the .NET based DNS backdoor is causing problems.
The research can be found here:
Lyceum .NET DNS Backdoor

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Aug 2022 07:00:00 -0000</pubDate>
      <itunes:title>Iran-linked Lyceum Group adds a new weapon to its arsenal. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>244</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Deepen Desai from Zscaler's ThreatLabz joins Dave to discuss how APTs, like Lyceum Group, create tactics and malware to carry out attacks against their targets. The Lyceum group has been active since 2017 and is a state-sponsored Iranian APT group. This group targets Middle Eastern organizations most notably in the energy and telecommunication sectors, and they rely heavily on .NET based malwares.
Zscaler said in their research they "recently observed a new campaign where the Lyceum Group was utilizing a newly developed and customized .NET based malware targeting the Middle East by copying the underlying code from an open source tool." They go on to give an analysis explaining why the .NET based DNS backdoor is causing problems.
The research can be found here:
Lyceum .NET DNS Backdoor

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Deepen Desai from Zscaler's ThreatLabz joins Dave to discuss how APTs, like Lyceum Group, create tactics and malware to carry out attacks against their targets. The Lyceum group has been active since 2017 and is a state-sponsored Iranian APT group. This group targets Middle Eastern organizations most notably in the energy and telecommunication sectors, and they rely heavily on .NET based malwares.</p><p>Zscaler said in their research they "recently observed a new campaign where the Lyceum Group was utilizing a newly developed and customized .NET based malware targeting the Middle East by copying the underlying code from an open source tool." They go on to give an analysis explaining why the .NET based DNS backdoor is causing problems.</p><p>The research can be found here:</p><ul><li><a href="https://www.zscaler.com/blogs/security-research/lyceum-net-dns-backdoor">Lyceum .NET DNS Backdoor</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>943</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cace50f6-141c-11ed-94a4-c35d83b7733b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8538461729.mp3?updated=1685127091" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CyberFront Z's failed influence operation. Iranian operators target Albanian government networks. CISA issues two ICS security advisories. CISA and ACSC issue a joint advisory on top malware strains.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1635/notes</link>
      <description>CyberFront Z's failed influence operation. Iranian operators target Albanian government networks. CISA issues two ICS security advisories. Andy Robbins of SpecterOps to discuss Attack Paths in Azure. Denis O'Shea of Mobile Mentor talking on the intersection of endpoint security and employee experience. CISA and ACSC issue a joint advisory on top malware strains.

for links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/150

Selected reading.
Quarterly Adversarial Threat Report (Meta)
Meta took down Russian troll farm that supported country’s invasion of Ukraine (The Hill)
Russia's Infamous Troll Farm Is Back -- and Sh*tting the Bed (Rolling Stone) 
Meta’s threat report highlights clumsy attempt to manipulate Ukraine discourse (TechCrunch) 
Likely Iranian Threat Actor Conducts Politically Motivated Disruptive Activity Against Albanian Government Organizations (Mandiant) 
CISA Alert AA22-216A – 2021 top malware strains. (The CyberWire)
2021 Top Malware Strains (CISA)
Digi ConnectPort X2D (CISA)
Cisco Releases Security Updates for RV Series Routers (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 05 Aug 2022 20:30:00 -0000</pubDate>
      <itunes:title>CyberFront Z's failed influence operation. Iranian operators target Albanian government networks. CISA issues two ICS security advisories. CISA and ACSC issue a joint advisory on top malware strains.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1635</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CyberFront Z's failed influence operation. Iranian operators target Albanian government networks. CISA issues two ICS security advisories. Andy Robbins of SpecterOps to discuss Attack Paths in Azure. Denis O'Shea of Mobile Mentor talking on the intersection of endpoint security and employee experience. CISA and ACSC issue a joint advisory on top malware strains.

for links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/150

Selected reading.
Quarterly Adversarial Threat Report (Meta)
Meta took down Russian troll farm that supported country’s invasion of Ukraine (The Hill)
Russia's Infamous Troll Farm Is Back -- and Sh*tting the Bed (Rolling Stone) 
Meta’s threat report highlights clumsy attempt to manipulate Ukraine discourse (TechCrunch) 
Likely Iranian Threat Actor Conducts Politically Motivated Disruptive Activity Against Albanian Government Organizations (Mandiant) 
CISA Alert AA22-216A – 2021 top malware strains. (The CyberWire)
2021 Top Malware Strains (CISA)
Digi ConnectPort X2D (CISA)
Cisco Releases Security Updates for RV Series Routers (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CyberFront Z's failed influence operation. Iranian operators target Albanian government networks. CISA issues two ICS security advisories. Andy Robbins of SpecterOps to discuss Attack Paths in Azure. Denis O'Shea of Mobile Mentor talking on the intersection of endpoint security and employee experience. CISA and ACSC issue a joint advisory on top malware strains.</p><p><br></p><p>for links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/150</p><p><br></p><h2>Selected reading.</h2><p><a href="https://about.fb.com/wp-content/uploads/2022/08/Quarterly-Adversarial-Threat-Report-Q2-2022.pdf">Quarterly Adversarial Threat Report</a> (Meta)</p><p><a href="https://thehill.com/policy/cybersecurity/3588908-meta-took-down-russian-troll-farm-that-supported-countrys-invasion-of-ukraine/">Meta took down Russian troll farm that supported country’s invasion of Ukraine</a> (The Hill)</p><p><a href="https://www.rollingstone.com/politics/politics-features/pro-putin-trolls-supporting-the-ukraine-invasion-cant-stop-screwing-up-1392075/">Russia's Infamous Troll Farm Is Back -- and Sh*tting the Bed</a> (Rolling Stone) </p><p><a href="https://techcrunch.com/2022/08/04/metas-threat-report-highlights-clumsy-attempt-to-manipulate-ukraine-discourse/">Meta’s threat report highlights clumsy attempt to manipulate Ukraine discourse</a> (TechCrunch) </p><p><a href="https://www.mandiant.com/resources/likely-iranian-threat-actor-conducts-politically-motivated-disruptive-activity-against?1">Likely Iranian Threat Actor Conducts Politically Motivated Disruptive Activity Against Albanian Government Organizations</a> (Mandiant) </p><p><a href="https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/26/notes">CISA Alert AA22-216A – 2021 top malware strains.</a> (The CyberWire)</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-216a">2021 Top Malware Strains</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-216-01">Digi ConnectPort X2D</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/08/04/cisco-releases-security-updates-rv-series-routers">Cisco Releases Security Updates for RV Series Routers</a> (CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1705</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[396912b0-787a-11ec-abf0-17fdfc6ae1f3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7459589013.mp3?updated=1671817506" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ukraine claims to have taken down a massive Russian bot farm. Were Russian cyber operations premature? Report: Emergency Alert System vulnerable to hijacking. And more crypto looting.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1634/notes</link>
      <description>Ukraine claims to have taken down a massive Russian bot farm. Russian cyber operations may have been premature. A report says Emergency Alert Systems might be vulnerable to hijacking. The Mirai botnet may have a descendant. Adam Flatley from Redacted with a look back at NotPetya. Ryan Windham from Imperva takes on Bad Bots. Attacks on a cryptocurrency exchange attempt to bypass 2FA. Solana cryptocurrency wallets looted.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/149

Selected reading.
Ukraine takes down 1,000,000 bots used for disinformation (BleepingComputer)
Did Russia mess up its cyberwar with Ukraine before it even invaded? (Washington Post) 
So RapperBot, What Ya Bruting For? (Fortinet Blog)
Gaming Respawned (Akamai)
Coinbase Attacks Bypass 2FA (Pixm Anti-Phishing)
Thousands of Solana wallets drained in multimillion-dollar exploit (TechCrunch)
Thousands of Solana Wallets Hacked in Crypto Cyberattack (Wall Street Journal) 
Solana, USDC Drained From Wallets in Attack (Decrypt) 
Ongoing solana attack targets thousands of crypto wallets, costing users more than $5 million so far (CNBC) 
Solana and Slope Confirm Wallet Security Breach (Crypto Briefing)
How Hackers Target Bridges Between Blockchains for Crypto Heists (Wall Street Journal)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 04 Aug 2022 20:25:00 -0000</pubDate>
      <itunes:title>Ukraine claims to have taken down a massive Russian bot farm. Were Russian cyber operations premature? Report: Emergency Alert System vulnerable to hijacking. And more crypto looting.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1634</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ukraine claims to have taken down a massive Russian bot farm. Russian cyber operations may have been premature. A report says Emergency Alert Systems might be vulnerable to hijacking. The Mirai botnet may have a descendant. Adam Flatley from Redacted with a look back at NotPetya. Ryan Windham from Imperva takes on Bad Bots. Attacks on a cryptocurrency exchange attempt to bypass 2FA. Solana cryptocurrency wallets looted.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/149

Selected reading.
Ukraine takes down 1,000,000 bots used for disinformation (BleepingComputer)
Did Russia mess up its cyberwar with Ukraine before it even invaded? (Washington Post) 
So RapperBot, What Ya Bruting For? (Fortinet Blog)
Gaming Respawned (Akamai)
Coinbase Attacks Bypass 2FA (Pixm Anti-Phishing)
Thousands of Solana wallets drained in multimillion-dollar exploit (TechCrunch)
Thousands of Solana Wallets Hacked in Crypto Cyberattack (Wall Street Journal) 
Solana, USDC Drained From Wallets in Attack (Decrypt) 
Ongoing solana attack targets thousands of crypto wallets, costing users more than $5 million so far (CNBC) 
Solana and Slope Confirm Wallet Security Breach (Crypto Briefing)
How Hackers Target Bridges Between Blockchains for Crypto Heists (Wall Street Journal)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ukraine claims to have taken down a massive Russian bot farm. Russian cyber operations may have been premature. A report says Emergency Alert Systems might be vulnerable to hijacking. The Mirai botnet may have a descendant. Adam Flatley from Redacted with a look back at NotPetya. Ryan Windham from Imperva takes on Bad Bots. Attacks on a cryptocurrency exchange attempt to bypass 2FA. Solana cryptocurrency wallets looted.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/149</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/security/ukraine-takes-down-1-000-000-bots-used-for-disinformation/">Ukraine takes down 1,000,000 bots used for disinformation</a> (BleepingComputer)</p><p><a href="https://www.washingtonpost.com/politics/2022/08/04/did-russia-mess-up-its-cyberwar-with-ukraine-before-it-even-invaded/">Did Russia mess up its cyberwar with Ukraine before it even invaded?</a> (Washington Post) </p><p><a href="https://www.fortinet.com/blog/threat-research/rapperbot-malware-discovery">So RapperBot, What Ya Bruting For?</a> (Fortinet Blog)</p><p><a href="https://www.akamai.com/resources/state-of-the-internet/soti-security-gaming-respawned">Gaming Respawned</a> (Akamai)</p><p><a href="https://pixmsecurity.com/blog/phish/coinbase-attacks-bypass-2fa/">Coinbase Attacks Bypass 2FA</a> (Pixm Anti-Phishing)</p><p><a href="https://techcrunch.com/2022/08/03/solana-wallet-hack/">Thousands of Solana wallets drained in multimillion-dollar exploit</a> (TechCrunch)</p><p><a href="https://www.wsj.com/articles/crypto-holders-funds-are-drained-from-solana-wallets-in-cyberattack-11659524900">Thousands of Solana Wallets Hacked in Crypto Cyberattack</a> (Wall Street Journal) </p><p><a href="https://decrypt.co/106590/multiple-wallets-including-sol-and-usdc-drained-in-unfolding-attack">Solana, USDC Drained From Wallets in Attack</a> (Decrypt) </p><p><a href="https://www.cnbc.com/2022/08/03/hackers-attack-solana-crypto-stealing-millions.html">Ongoing solana attack targets thousands of crypto wallets, costing users more than $5 million so far</a> (CNBC) </p><p><a href="https://cryptobriefing.com/solana-and-slope-confirm-wallet-security-breach/">Solana and Slope Confirm Wallet Security Breach</a> (Crypto Briefing)</p><p><a href="https://www.wsj.com/articles/how-hackers-target-bridges-between-blockchains-for-crypto-heists-11649151001">How Hackers Target Bridges Between Blockchains for Crypto Heists </a>(Wall Street Journal)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1603</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[39497888-787a-11ec-abf0-9b6ef110492b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8252972891.mp3?updated=1671817517" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA22-216A – 2021 top malware strains. [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/26/notes</link>
      <description>This joint Cybersecurity Advisory was coauthored by CISA and the Australian Cyber Security Centre, or ACSC. This advisory provides details on the top malware strains observed in 2021.
AA22-216A Alert, Technical Details, and Mitigations
For alerts on malicious and criminal cyber activity, see the FBI Internet Crime Complaint Center webpage.
For more information and resources on protecting against and responding to ransomware, refer to StopRansomware.gov, a centralized, U.S. Government webpage providing ransomware resources and alerts.
The ACSC recommends organizations implement eight essential mitigation strategies from the ACSC’s Strategies to Mitigate Cyber Security Incidents as a cybersecurity baseline. These strategies, known as the “Essential Eight,” make it much harder for adversaries to compromise systems.
Refer to the ACSC’s practical guides on how to protect yourself against ransomware attacks and what to do if you are held at ransom at cyber.gov.au.
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 04 Aug 2022 04:00:00 -0000</pubDate>
      <itunes:title>CISA Alert AA22-216A – 2021 top malware strains. [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>26</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This joint Cybersecurity Advisory was coauthored by CISA and the Australian Cyber Security Centre, or ACSC. This advisory provides details on the top malware strains observed in 2021.
AA22-216A Alert, Technical Details, and Mitigations
For alerts on malicious and criminal cyber activity, see the FBI Internet Crime Complaint Center webpage.
For more information and resources on protecting against and responding to ransomware, refer to StopRansomware.gov, a centralized, U.S. Government webpage providing ransomware resources and alerts.
The ACSC recommends organizations implement eight essential mitigation strategies from the ACSC’s Strategies to Mitigate Cyber Security Incidents as a cybersecurity baseline. These strategies, known as the “Essential Eight,” make it much harder for adversaries to compromise systems.
Refer to the ACSC’s practical guides on how to protect yourself against ransomware attacks and what to do if you are held at ransom at cyber.gov.au.
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This joint Cybersecurity Advisory was coauthored by CISA and the Australian Cyber Security Centre, or ACSC. This advisory provides details on the top malware strains observed in 2021.</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-216a">AA22-216A Alert, Technical Details, and Mitigations</a></p><p>For alerts on malicious and criminal cyber activity, see the <a href="https://www.ic3.gov/">FBI Internet Crime Complaint Center</a> webpage.</p><p>For more information and resources on protecting against and responding to ransomware, refer to <a href="https://www.cisa.gov/stopransomware/">StopRansomware.gov</a>, a centralized, U.S. Government webpage providing ransomware resources and alerts.</p><p>The ACSC recommends organizations implement eight essential mitigation strategies from the ACSC’s <a href="https://www.cyber.gov.au/acsc/view-all-content/essential-eight">Strategies to Mitigate Cyber Security Incidents</a> as a cybersecurity baseline. These strategies, known as the “Essential Eight,” make it much harder for adversaries to compromise systems.</p><p>Refer to the ACSC’s practical guides on how to <a href="https://www.cyber.gov.au/ransomware/protect-yourself-against-ransomware-attacks">protect yourself against ransomware attacks</a> and <a href="https://www.cyber.gov.au/ransomware/what-to-do">what to do if you are held at ransom</a> at <a href="https://www.cyber.gov.au/ransomware/">cyber.gov.au</a>.</p><p>All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at <a href="mailto:central@cisa.dhs.gov">central@cisa.dhs.gov</a> or (888) 282-0870 and to the FBI via your <a href="https://www.fbi.gov/contact-us/field-offices">local FBI field office</a> or the FBI’s 24/7 CyWatch at (855) 292-3937 or <a href="mailto:CyWatch@fbi.gov">CyWatch@fbi.gov</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>198</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1f6208ce-14c2-11ed-a84e-dfbd853a50fe]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6816108229.mp3?updated=1659638778" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tories delay leadership vote over security concerns. Cyber phases of Russia’s hybrid war. CHinese patriotic hacktivism vs. Taiwan. Malware designed to abuse trust. Putting a price on your privacy.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1633/notes</link>
      <description>Tories delay a leadership vote over security concerns. A summary of the cyber phases of the hybrid war. Cyberattacks affect three official sites in Taiwan. Malware designed to abuse trust. Gunter Ollmann of Devo to discuss how Cybercriminals are Winning the AI Race. Renuka Nadkarni of Aryaka explains enterprises can recession proof security architecture. Plus, putting a price on your privacy.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/148

Selected reading.
Tory leadership vote delayed after GCHQ hacking alert (The Telegraph) 
Nozomi Networks Labs Report: Wipers and IoT Botnets Dominate the Threat Landscape – Manufacturing and Energy at Highest Risk (Nozomi Networks) 
Those Pelosi-inspired cyberattacks in Taiwan probably weren't all they were cracked up to be (Washington Post)
Increase in Chinese "Hacktivism" Attacks (SANS Internet Storm Center)
Cyberattacks crashed several Taiwanese government websites hours before Pelosi’s visit. (New York Times)
Taiwan presidential office website hit by cyberattack ahead of Pelosi visit (POLITICO) 
Taiwanese government sites disrupted by hackers ahead of Pelosi trip (The Record by Recorded Future)
Deception at a scale (VirusTotal)
The Price Cybercriminals Charge for Stolen Data (SpiderLabs Blog)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 03 Aug 2022 20:20:00 -0000</pubDate>
      <itunes:title>Tories delay leadership vote over security concerns. Cyber phases of Russia’s hybrid war. CHinese patriotic hacktivism vs. Taiwan. Malware designed to abuse trust. Putting a price on your privacy.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1633</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Tories delay a leadership vote over security concerns. A summary of the cyber phases of the hybrid war. Cyberattacks affect three official sites in Taiwan. Malware designed to abuse trust. Gunter Ollmann of Devo to discuss how Cybercriminals are Winning the AI Race. Renuka Nadkarni of Aryaka explains enterprises can recession proof security architecture. Plus, putting a price on your privacy.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/148

Selected reading.
Tory leadership vote delayed after GCHQ hacking alert (The Telegraph) 
Nozomi Networks Labs Report: Wipers and IoT Botnets Dominate the Threat Landscape – Manufacturing and Energy at Highest Risk (Nozomi Networks) 
Those Pelosi-inspired cyberattacks in Taiwan probably weren't all they were cracked up to be (Washington Post)
Increase in Chinese "Hacktivism" Attacks (SANS Internet Storm Center)
Cyberattacks crashed several Taiwanese government websites hours before Pelosi’s visit. (New York Times)
Taiwan presidential office website hit by cyberattack ahead of Pelosi visit (POLITICO) 
Taiwanese government sites disrupted by hackers ahead of Pelosi trip (The Record by Recorded Future)
Deception at a scale (VirusTotal)
The Price Cybercriminals Charge for Stolen Data (SpiderLabs Blog)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tories delay a leadership vote over security concerns. A summary of the cyber phases of the hybrid war. Cyberattacks affect three official sites in Taiwan. Malware designed to abuse trust. Gunter Ollmann of Devo to discuss how Cybercriminals are Winning the AI Race. Renuka Nadkarni of Aryaka explains enterprises can recession proof security architecture. Plus, putting a price on your privacy.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/148</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.telegraph.co.uk/politics/2022/08/02/tory-leadership-voting-delayed-gchq-hacking-warning/">Tory leadership vote delayed after GCHQ hacking alert</a> (The Telegraph) </p><p><a href="https://www.nozominetworks.com/press-release/nozomi-networks-labs-report-wipers-and-iot-botnets-dominate-the-threat-landscape-manufacturing-and-energy-at-highest-risk/">Nozomi Networks Labs Report: Wipers and IoT Botnets Dominate the Threat Landscape – Manufacturing and Energy at Highest Risk</a> (Nozomi Networks) </p><p><a href="https://www.washingtonpost.com/politics/2022/08/03/those-pelosi-inspired-cyberattacks-taiwan-probably-werent-all-they-were-cracked-up-be/">Those Pelosi-inspired cyberattacks in Taiwan probably weren't all they were cracked up to be</a> (Washington Post)</p><p><a href="https://isc.sans.edu/diary/Increase%20in%20Chinese%20%22Hacktivism%22%20Attacks/28906">Increase in Chinese "Hacktivism" Attacks</a> (SANS Internet Storm Center)</p><p><a href="https://www.nytimes.com/2022/08/02/world/asia/taiwan-cyberattack-pelosi-visit.html">Cyberattacks crashed several Taiwanese government websites hours before Pelosi’s visit.</a> (New York Times)</p><p><a href="https://www.politico.com/news/2022/08/02/taiwan-presidential-office-website-hit-by-cyberattack-ahead-of-pelosi-visit-00049255">Taiwan presidential office website hit by cyberattack ahead of Pelosi visit</a> (POLITICO) </p><p><a href="https://therecord.media/taiwanese-government-sites-disrupted-by-hackers-ahead-of-pelosi-trip/">Taiwanese government sites disrupted by hackers ahead of Pelosi trip</a> (The Record by Recorded Future)</p><p><a href="https://blog.virustotal.com/2022/08/deception-at-scale.html">Deception at a scale</a> (VirusTotal)</p><p><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/the-price-cybercriminals-charge-for-stolen-data/">The Price Cybercriminals Charge for Stolen Data</a> (SpiderLabs Blog)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1781</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[384c793a-787a-11ec-abf0-1b1f44a66144]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1569268138.mp3?updated=1671817541" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Nomad cryptocurrency bridge looted. BlackCat ransomware hits Europenan energy company. DSIRF disputes Microsoft's report on cyber mercenaries. Are there spies under Mr. Putin’s long table?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1632/notes</link>
      <description>Nomad cryptocurrency bridge is looted. The BlackCat ransomware gang hits a Luxembourgeois energy company. DSIRF disputes Microsoft's characterization of the Austrian firm as cyber mercenaries. Ben Yelin looks at privacy concerns in the education software market. Our guest is PJ Kirner from Illumio to discuss Zero Trust Segmentation. And, finally, are there spies under Mr. Putin’s very very long table?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/147

Selected reading.
Crypto Firm Nomad Loses Nearly $200 Million in Bridge Hack (Bloomberg) 
Crypto Bridge Nomad Drained of Nearly $200M in Exploit (CoinDesk)
Nomad token bridge drained of $190M in funds in security exploit (Cointelegraph) 
Nomad token bridge hacked in nearly $200 million exploit (mint) 
BlackCat ransomware gang hits Luxembourg energy supplier Creos (Computing)
Luxembourg energy provider Encevo Group battles ransomware attack by BlackCat (Tech Monitor)
BlackCat ransomware claims attack on European gas pipeline (BleepingComputer)
Luxembourg energy companies struggling with alleged ransomware attack, data breach (The Record by Recorded Future)
Austrian spy firm accused by Microsoft says hacking tool was for EU states (Reuters)
Dilyana Gaytandzhieva: Putin’s Elite Inner Circle Infiltrated By Nato Informants (SouthFront)
GEC Special Report: Pillars of Russia’s Disinformation and Propaganda Ecosystem (US Department of State)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Aug 2022 20:20:00 -0000</pubDate>
      <itunes:title>Nomad cryptocurrency bridge looted. BlackCat ransomware hits Europenan energy company. DSIRF disputes Microsoft's report on cyber mercenaries. Are there spies under Mr. Putin’s long table?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1632</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Nomad cryptocurrency bridge is looted. The BlackCat ransomware gang hits a Luxembourgeois energy company. DSIRF disputes Microsoft's characterization of the Austrian firm as cyber mercenaries. Ben Yelin looks at privacy concerns in the education software market. Our guest is PJ Kirner from Illumio to discuss Zero Trust Segmentation. And, finally, are there spies under Mr. Putin’s very very long table?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/147

Selected reading.
Crypto Firm Nomad Loses Nearly $200 Million in Bridge Hack (Bloomberg) 
Crypto Bridge Nomad Drained of Nearly $200M in Exploit (CoinDesk)
Nomad token bridge drained of $190M in funds in security exploit (Cointelegraph) 
Nomad token bridge hacked in nearly $200 million exploit (mint) 
BlackCat ransomware gang hits Luxembourg energy supplier Creos (Computing)
Luxembourg energy provider Encevo Group battles ransomware attack by BlackCat (Tech Monitor)
BlackCat ransomware claims attack on European gas pipeline (BleepingComputer)
Luxembourg energy companies struggling with alleged ransomware attack, data breach (The Record by Recorded Future)
Austrian spy firm accused by Microsoft says hacking tool was for EU states (Reuters)
Dilyana Gaytandzhieva: Putin’s Elite Inner Circle Infiltrated By Nato Informants (SouthFront)
GEC Special Report: Pillars of Russia’s Disinformation and Propaganda Ecosystem (US Department of State)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Nomad cryptocurrency bridge is looted. The BlackCat ransomware gang hits a Luxembourgeois energy company. DSIRF disputes Microsoft's characterization of the Austrian firm as cyber mercenaries. Ben Yelin looks at privacy concerns in the education software market. Our guest is PJ Kirner from Illumio to discuss Zero Trust Segmentation. And, finally, are there spies under Mr. Putin’s very very long table?</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/147</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bloomberg.com/news/articles/2022-08-02/crypto-bridge-nomad-drained-of-nearly-200-million-in-exploit">Crypto Firm Nomad Loses Nearly $200 Million in Bridge Hack</a> (Bloomberg) </p><p><a href="https://www.coindesk.com/tech/2022/08/02/nomad-bridge-drained-of-nearly-200-million-in-exploit/">Crypto Bridge Nomad Drained of Nearly $200M in Exploit</a> (CoinDesk)</p><p><a href="https://cointelegraph.com/news/nomad-token-bridge-drained-of-190m-in-funds-in-security-exploit">Nomad token bridge drained of $190M in funds in security exploit</a> (Cointelegraph) </p><p><a href="https://www.livemint.com/news/world/cryptocurrency-how-nomad-token-bridge-hack-took-place-that-drained-nearly-200-million-funds-in-exploit-11659418968336.html">Nomad token bridge hacked in nearly $200 million exploit</a> (mint) </p><p><a href="https://www.computing.co.uk/news/4054192/blackcat-ransomware-gang-hits-luxembourg-energy-supplier-creos">BlackCat ransomware gang hits Luxembourg energy supplier Creos </a>(Computing)</p><p><a href="https://techmonitor.ai/technology/cybersecurity/encevo-group-cyberattack-luxembourg-blackcat-ransomware">Luxembourg energy provider Encevo Group battles ransomware attack by BlackCat</a> (Tech Monitor)</p><p><a href="https://www.bleepingcomputer.com/news/security/blackcat-ransomware-claims-attack-on-european-gas-pipeline/">BlackCat ransomware claims attack on European gas pipeline</a> (BleepingComputer)</p><p><a href="https://therecord.media/luxembourg-energy-companies-struggling-with-alleged-ransomware-attack-data-breach/">Luxembourg energy companies struggling with alleged ransomware attack, data breach</a> (The Record by Recorded Future)</p><p><a href="https://www.reuters.com/technology/austrian-spy-firm-accused-by-microsoft-says-hacking-tool-was-eu-states-2022-07-29/">Austrian spy firm accused by Microsoft says hacking tool was for EU states</a> (Reuters)</p><p><a href="https://southfront.org/dilyana-gaytandzhieva-putins-elite-inner-circle-infiltrated-by-nato-informants/">Dilyana Gaytandzhieva: Putin’s Elite Inner Circle Infiltrated By Nato Informants</a> (SouthFront)</p><p><a href="https://www.state.gov/wp-content/uploads/2020/08/Pillars-of-Russia%E2%80%99s-Disinformation-and-Propaganda-Ecosystem_08-04-20.pdf">GEC Special Report: Pillars of Russia’s Disinformation and Propaganda Ecosystem</a> (US Department of State)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1659</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[382cfaf6-787a-11ec-abf0-d3601840d867]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7918513646.mp3?updated=1671817554" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>KillNet threatens hack-and-leak op against HIMARS maker. Online investment scams hit Europe. Microsoft associates Raspberry Robin with EvilCorp.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1631/notes</link>
      <description>KillNet threatens hack-and-leak op against HIMARS maker. Online investment scams hit Europe. Microsoft associates Raspberry Robin with EvilCorp. Rick Howard previews season ten of the CSO Perspectives podcast. Our guest is Nate Kharrl of SpecTrust on deploying fraud detection at the gateway. And a heartfelt farewell to a woman who’s inspiration lives on.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/146

Selected reading.
Cyberactivist Group Killnet Declares War on Lockheed Martin (Sputnik)
Russian Hackers Target U.S. HIMARS Maker in 'New Type of Attack': Report (Newsweek)
Founder of pro-Russian hacktivist Killnet quitting group (SC Magazine) 
Huge network of 11,000 fake investment sites targets Europe (BleepingComputer)
Microsoft links Raspberry Robin malware to Evil Corp attacks (BleepingComputer) 
Microsoft ties novel ‘Raspberry Robin’ malware to Evil Corp cybercrime syndicate (The Record by Recorded Future)
FakeUpdates malware delivered via Raspberry Robin has possible ties to EvilCorp (SC Magazine)
Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself (Microsoft Security)
Australia charges dev of Imminent Monitor RAT used by domestic abusers (BleepingComputer) 
Brisbane teenager built spyware used by domestic violence perpetrators across world, police allege (the Guardian)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 01 Aug 2022 20:20:00 -0000</pubDate>
      <itunes:title>KillNet threatens hack-and-leak op against HIMARS maker. Online investment scams hit Europe. Microsoft associates Raspberry Robin with EvilCorp.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1631</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>KillNet threatens hack-and-leak op against HIMARS maker. Online investment scams hit Europe. Microsoft associates Raspberry Robin with EvilCorp. Rick Howard previews season ten of the CSO Perspectives podcast. Our guest is Nate Kharrl of SpecTrust on deploying fraud detection at the gateway. And a heartfelt farewell to a woman who’s inspiration lives on.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/146

Selected reading.
Cyberactivist Group Killnet Declares War on Lockheed Martin (Sputnik)
Russian Hackers Target U.S. HIMARS Maker in 'New Type of Attack': Report (Newsweek)
Founder of pro-Russian hacktivist Killnet quitting group (SC Magazine) 
Huge network of 11,000 fake investment sites targets Europe (BleepingComputer)
Microsoft links Raspberry Robin malware to Evil Corp attacks (BleepingComputer) 
Microsoft ties novel ‘Raspberry Robin’ malware to Evil Corp cybercrime syndicate (The Record by Recorded Future)
FakeUpdates malware delivered via Raspberry Robin has possible ties to EvilCorp (SC Magazine)
Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself (Microsoft Security)
Australia charges dev of Imminent Monitor RAT used by domestic abusers (BleepingComputer) 
Brisbane teenager built spyware used by domestic violence perpetrators across world, police allege (the Guardian)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>KillNet threatens hack-and-leak op against HIMARS maker. Online investment scams hit Europe. Microsoft associates Raspberry Robin with EvilCorp. Rick Howard previews season ten of the CSO Perspectives podcast. Our guest is Nate Kharrl of SpecTrust on deploying fraud detection at the gateway. And a heartfelt farewell to a woman who’s inspiration lives on.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/146</p><p><br></p><h2>Selected reading.</h2><p><a href="https://sputniknews.com/20220801/cyberactivist-group-killnet-declares-war-on-lockheed-martin-1097998322.html">Cyberactivist Group Killnet Declares War on Lockheed Martin</a> (Sputnik)</p><p><a href="https://www.newsweek.com/russian-hackers-target-us-himars-maker-report-ukraine-russia-1729502">Russian Hackers Target U.S. HIMARS Maker in 'New Type of Attack': Report</a> (Newsweek)</p><p><a href="https://www.scmagazine.com/analysis/cybercrime/founder-of-pro-russian-hacktivist-killnet-quitting-group">Founder of pro-Russian hacktivist Killnet quitting group</a> (SC Magazine) </p><p><a href="https://www.bleepingcomputer.com/news/security/huge-network-of-11-000-fake-investment-sites-targets-europe/">Huge network of 11,000 fake investment sites targets Europe</a> (BleepingComputer)</p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-links-raspberry-robin-malware-to-evil-corp-attacks/">Microsoft links Raspberry Robin malware to Evil Corp attacks</a> (BleepingComputer) </p><p><a href="https://therecord.media/microsoft-ties-novel-raspberry-robin-malware-to-evil-corp-cybercrime-syndicate/">Microsoft ties novel ‘Raspberry Robin’ malware to Evil Corp cybercrime syndicate</a> (The Record by Recorded Future)</p><p><a href="https://www.scmagazine.com/news/cybercrime/fakeupdates-malware-delivered-via-raspberry-robin-has-possible-ties-to-evilcorp">FakeUpdates malware delivered via Raspberry Robin has possible ties to EvilCorp</a> (SC Magazine)</p><p><a href="https://www.microsoft.com/security/blog/2022/05/09/ransomware-as-a-service-understanding-the-cybercrime-gig-economy-and-how-to-protect-yourself/">Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself</a> (Microsoft Security)</p><p><a href="https://www.bleepingcomputer.com/news/security/australia-charges-dev-of-imminent-monitor-rat-used-by-domestic-abusers/">Australia charges dev of Imminent Monitor RAT used by domestic abusers</a> (BleepingComputer) </p><p><a href="https://www.theguardian.com/australia-news/2022/jul/30/brisbane-teenager-built-spyware-used-by-domestic-violence-perpetrators-across-world-police-allege">Brisbane teenager built spyware used by domestic violence perpetrators across world, police allege</a> (the Guardian)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1655</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[371009a6-787a-11ec-abf0-dfd076b13198]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9646219692.mp3?updated=1671817559" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Larry Cashdollar: Always learning new technology. [Intelligence response engineer] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/110/notes</link>
      <description>Larry Cashdollar, Principal Security Intelligence Response Engineer at Akamai Technologies, sits down with Dave Bittner to discuss his life leading up to working at Akamai. He shares his story from his beginnings to now, describing what college life was like as a young computer enthusiast. He says "If you look at my 1986 yearbook, I think it was my sixth grade class, it says computer scientist for my career path. So I had a love of computers when I was really young. I guess I knew what field I wanted to get into right off the bat." He describes different career paths that all led him to his current position. He also shares his love for computers and technology through the decades of his youth, and how he is learning, even now. We thank Larry for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 31 Jul 2022 07:00:00 -0000</pubDate>
      <itunes:title>Larry Cashdollar: Always learning new technology. [Intelligence response engineer] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>110</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Larry Cashdollar, Principal Security Intelligence Response Engineer at Akamai Technologies, sits down with Dave Bittner to discuss his life leading up to working at Akamai. He shares his story from his beginnings to now, describing what college life was like as a young computer enthusiast. He says "If you look at my 1986 yearbook, I think it was my sixth grade class, it says computer scientist for my career path. So I had a love of computers when I was really young. I guess I knew what field I wanted to get into right off the bat." He describes different career paths that all led him to his current position. He also shares his love for computers and technology through the decades of his youth, and how he is learning, even now. We thank Larry for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Larry Cashdollar, Principal Security Intelligence Response Engineer at Akamai Technologies, sits down with Dave Bittner to discuss his life leading up to working at Akamai. He shares his story from his beginnings to now, describing what college life was like as a young computer enthusiast. He says "If you look at my 1986 yearbook, I think it was my sixth grade class, it says computer scientist for my career path. So I had a love of computers when I was really young. I guess I knew what field I wanted to get into right off the bat." He describes different career paths that all led him to his current position. He also shares his love for computers and technology through the decades of his youth, and how he is learning, even now. We thank Larry for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>454</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c613575e-0f81-11ed-af60-cb2f1f630ebf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7805908278.mp3?updated=1659124588" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What malicious campaign is lurking under the surface? [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/243/notes</link>
      <description>Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign.
The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed analysis of the malware and exploits used.
The research can be found here:
Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Jul 2022 07:00:00 -0000</pubDate>
      <itunes:title>What malicious campaign is lurking under the surface? [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>243</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign.
The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed analysis of the malware and exploits used.
The research can be found here:
Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Israel Barak, CISO from Cybereason, sits down with Dave to discuss their research, "Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation." Cybereason researchers recently found an attack lurking beneath the surface which was assessed to be the work of Chinese APT Winnti. Cybereason briefed the FBI and the DOJ on the investigation into the malicious campaign.</p><p>The research states, "For years, the campaign had operated undetected, siphoning intellectual property and sensitive data." The team quickly made two reports on the campaign, one sharing an examination on the tactics and techniques. The second gives a detailed analysis of the malware and exploits used.</p><p>The research can be found here:</p><ul><li><a href="https://www.cybereason.com/blog/operation-cuckoobees-cybereason-uncovers-massive-chinese-intellectual-property-theft-operation">Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1293</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[26ae93d8-0e99-11ed-954c-678087a704d1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7081659178.mp3?updated=1685127081" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacktivism in a hybrid war. Pyongyang's [un]H0lyGh0st. Notes on the C2C market. Rewards for Justice seeks some righteous snitches.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1630/notes</link>
      <description>Anonymous's hacktivism in a hybrid war. Pyongyang's [un]H0lyGh0st. Phishing in the IPFS. Update on the initial access criminal-to-criminal market and its effect on MSPs. Cyber gangs move away from malicious macros. Thomas Etheridge from CrowdStrike on managed detection and response. Rick Howard sits down with Art Poghosyan from Britive to discuss DevSecOps and Identity Management. And Rewards for Justice seeks some righteous snitches.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/145

Selected reading.
Putin 'embarrassed' as hackers launch cyber war on Russian President over Ukraine invasion (Express.co.uk)
Is Anonymous Rewriting the Rules of Cyberwarfare? Timeline of Their Attacks Against the Russian Government (Website Planet) 
HolyGhost’s Bargain Basement Approach To Ransomware (Digital Shadows)
IPFS: The New Hotbed of Phishing (Trustwave)
Threat Advisory: Hackers Are Selling Access to MSPs (Huntress) We’re currently monitoring a situation that entails a hacker selling access to an MSP with access to 50+ customers, totaling 1,000+ servers.
Experts warn of hacker claiming access to 50 U.S. companies through breached MSP (The Record by Recorded Future)
How Threat Actors Are Adapting to a Post-Macro World (Proofpoint)
Rewards for Justice – Reward Offer for Information on Russian Interference in U.S. Elections (United States Department of State)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 29 Jul 2022 20:25:00 -0000</pubDate>
      <itunes:title>Hacktivism in a hybrid war. Pyongyang's [un]H0lyGh0st. Notes on the C2C market. Rewards for Justice seeks some righteous snitches.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1630</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Anonymous's hacktivism in a hybrid war. Pyongyang's [un]H0lyGh0st. Phishing in the IPFS. Update on the initial access criminal-to-criminal market and its effect on MSPs. Cyber gangs move away from malicious macros. Thomas Etheridge from CrowdStrike on managed detection and response. Rick Howard sits down with Art Poghosyan from Britive to discuss DevSecOps and Identity Management. And Rewards for Justice seeks some righteous snitches.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/145

Selected reading.
Putin 'embarrassed' as hackers launch cyber war on Russian President over Ukraine invasion (Express.co.uk)
Is Anonymous Rewriting the Rules of Cyberwarfare? Timeline of Their Attacks Against the Russian Government (Website Planet) 
HolyGhost’s Bargain Basement Approach To Ransomware (Digital Shadows)
IPFS: The New Hotbed of Phishing (Trustwave)
Threat Advisory: Hackers Are Selling Access to MSPs (Huntress) We’re currently monitoring a situation that entails a hacker selling access to an MSP with access to 50+ customers, totaling 1,000+ servers.
Experts warn of hacker claiming access to 50 U.S. companies through breached MSP (The Record by Recorded Future)
How Threat Actors Are Adapting to a Post-Macro World (Proofpoint)
Rewards for Justice – Reward Offer for Information on Russian Interference in U.S. Elections (United States Department of State)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Anonymous's hacktivism in a hybrid war. Pyongyang's [un]H0lyGh0st. Phishing in the IPFS. Update on the initial access criminal-to-criminal market and its effect on MSPs. Cyber gangs move away from malicious macros. Thomas Etheridge from CrowdStrike on managed detection and response. Rick Howard sits down with Art Poghosyan from Britive to discuss DevSecOps and Identity Management. And Rewards for Justice seeks some righteous snitches.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/145</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.express.co.uk/news/world/1647809/russia-hack-anonymous-hackers-target-putin-russia-news">Putin 'embarrassed' as hackers launch cyber war on Russian President over Ukraine invasion</a> (Express.co.uk)</p><p><a href="https://www.websiteplanet.com/blog/anonymous-cyberwarfare-report/">Is Anonymous Rewriting the Rules of Cyberwarfare? Timeline of Their Attacks Against the Russian Government</a> (Website Planet) </p><p><a href="https://www.digitalshadows.com/blog-and-research/holy-ghosts-bargain-basement-approach-to-ransomware/">HolyGhost’s Bargain Basement Approach To Ransomware</a> (Digital Shadows)</p><p><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/ipfs-the-new-hotbed-of-phishing/">IPFS: The New Hotbed of Phishing</a> (Trustwave)</p><p><a href="https://www.huntress.com/blog/threat-advisory-hackers-are-selling-access-to-msps">Threat Advisory: Hackers Are Selling Access to MSPs</a> (Huntress) We’re currently monitoring a situation that entails a hacker selling access to an MSP with access to 50+ customers, totaling 1,000+ servers.</p><p><a href="https://therecord.media/experts-warn-of-hacker-claiming-access-to-50-u-s-companies-through-breached-msp/">Experts warn of hacker claiming access to 50 U.S. companies through breached MSP</a> (The Record by Recorded Future)</p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/how-threat-actors-are-adapting-post-macro-world">How Threat Actors Are Adapting to a Post-Macro World</a> (Proofpoint)</p><p><a href="https://www.state.gov/rewards-for-justice-reward-offer-for-information-on-russian-interference-in-u-s-elections/">Rewards for Justice – Reward Offer for Information on Russian Interference in U.S. Elections</a> (United States Department of State)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1618</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[34f39cbe-787a-11ec-abf0-6b9cfaaa13d0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7831475295.mp3?updated=1671817573" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SSSCIP and CISA sign memorandum of cooperation. Tailored security services, or just hired guns? Bringing PSOAs to heel. More credential-harvesting.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1629/notes</link>
      <description>SSSCIP and CISA sign a memorandum of cooperation. Are private-sector offensive actors tailored security services, or are they just hired guns? Bringing cyber mercenaries to heel. Malek Ben Salem from Accenture on why crisis management is at the heart of ransomware resilience. Our guest is Derek Manky from Fortinet on the World Economic Forum Partnership Against Cybercrime. And more credential-harvesting scams are out in the wild.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/144

Selected reading.
United States and Ukraine Expand Cooperation on Cybersecurity (CISA)
US, Ukraine sign pact to expand cooperation in cyberspace (The Hill)
Untangling KNOTWEED: European private-sector offensive actor using 0-day exploits (Microsoft Security)
Continuing the fight against private sector cyberweapons (Microsoft On the Issues)
Experts Urge Congress to Pressure Commercial Spyware Vendors (Decipher)
Mirroring Actual Landing Pages for Convincing Credential Harvesting (Avanan)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 28 Jul 2022 20:45:00 -0000</pubDate>
      <itunes:title>SSSCIP and CISA sign memorandum of cooperation. Tailored security services, or just hired guns? Bringing PSOAs to heel. More credential-harvesting.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1629</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>SSSCIP and CISA sign a memorandum of cooperation. Are private-sector offensive actors tailored security services, or are they just hired guns? Bringing cyber mercenaries to heel. Malek Ben Salem from Accenture on why crisis management is at the heart of ransomware resilience. Our guest is Derek Manky from Fortinet on the World Economic Forum Partnership Against Cybercrime. And more credential-harvesting scams are out in the wild.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/144

Selected reading.
United States and Ukraine Expand Cooperation on Cybersecurity (CISA)
US, Ukraine sign pact to expand cooperation in cyberspace (The Hill)
Untangling KNOTWEED: European private-sector offensive actor using 0-day exploits (Microsoft Security)
Continuing the fight against private sector cyberweapons (Microsoft On the Issues)
Experts Urge Congress to Pressure Commercial Spyware Vendors (Decipher)
Mirroring Actual Landing Pages for Convincing Credential Harvesting (Avanan)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>SSSCIP and CISA sign a memorandum of cooperation. Are private-sector offensive actors tailored security services, or are they just hired guns? Bringing cyber mercenaries to heel. Malek Ben Salem from Accenture on why crisis management is at the heart of ransomware resilience. Our guest is Derek Manky from Fortinet on the World Economic Forum Partnership Against Cybercrime. And more credential-harvesting scams are out in the wild.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/144</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/news/2022/07/27/united-states-and-ukraine-expand-cooperation-cybersecurity">United States and Ukraine Expand Cooperation on Cybersecurity</a> (CISA)</p><p><a href="https://thehill.com/policy/cybersecurity/3577233-us-ukraine-sign-pact-to-expand-cooperation-in-cyberspace/">US, Ukraine sign pact to expand cooperation in cyberspace</a> (The Hill)</p><p><a href="https://www.microsoft.com/security/blog/2022/07/27/untangling-knotweed-european-private-sector-offensive-actor-using-0-day-exploits/">Untangling KNOTWEED: European private-sector offensive actor using 0-day exploits</a> (Microsoft Security)</p><p><a href="https://blogs.microsoft.com/on-the-issues/2022/07/27/private-sector-cyberweapons-psoas-knotweed/">Continuing the fight against private sector cyberweapons</a> (Microsoft On the Issues)</p><p><a href="https://duo.com/decipher/experts-urge-congress-to-pressure-commercial-spyware-vendors">Experts Urge Congress to Pressure Commercial Spyware Vendors</a> (Decipher)</p><p><a href="https://www.avanan.com/blog/mirroring-actual-landing-pages-for-convincing-credential-harvesting">Mirroring Actual Landing Pages for Convincing Credential Harvesting</a> (Avanan)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1426</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3513f0e0-787a-11ec-abf0-73bdd536e2a7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9842932768.mp3?updated=1671817584" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The cost of a data breach as an economic drag. Personal apps as a potential business risk. Why so little ransomware in Ukraine? Employee engagement study reaches predictably glum conclusions.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1628/notes</link>
      <description>IBM reports on the cost of a data breach. Personal apps as a potential business risk. Over on the dark side, there’s help wanted in the C2C labor market. An employee engagement study reaches predictably glum conclusions. Betsy Carmelite from Booz Allen Hamilton on reducing software supply chain risks with SBOMs. Our guest is Elaine Lee from Mimecast discussing the pros and cons of AI in cybersecurity. And Why so much attempted DDoS, but not so much ransomware?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/143

Selected reading.
IBM Report: Consumers Pay the Price as Data Breach Costs Reach All-Time High (IBM Newsroom)
Cost of a Data Breach Report 2022 (IBM Security)
Netskope Threat Research: Data Sprawl Creating Risk for Organizations Worldwide as Personal App Use in Business Continues to Rise (PR Newswire)
Financial Incentives May Explain the Perceived Lack of Ransomware in Russia’s Latest Assault on Ukraine (Council on Foreign Relations)
Tessian | 1 in 3 Employees Do Not Understand the Importance of Cybersecurity at Work, According to New Report (RealWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 27 Jul 2022 20:30:00 -0000</pubDate>
      <itunes:title>The cost of a data breach as an economic drag. Personal apps as a potential business risk. Why so little ransomware in Ukraine? Employee engagement study reaches predictably glum conclusions.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1628</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>IBM reports on the cost of a data breach. Personal apps as a potential business risk. Over on the dark side, there’s help wanted in the C2C labor market. An employee engagement study reaches predictably glum conclusions. Betsy Carmelite from Booz Allen Hamilton on reducing software supply chain risks with SBOMs. Our guest is Elaine Lee from Mimecast discussing the pros and cons of AI in cybersecurity. And Why so much attempted DDoS, but not so much ransomware?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/143

Selected reading.
IBM Report: Consumers Pay the Price as Data Breach Costs Reach All-Time High (IBM Newsroom)
Cost of a Data Breach Report 2022 (IBM Security)
Netskope Threat Research: Data Sprawl Creating Risk for Organizations Worldwide as Personal App Use in Business Continues to Rise (PR Newswire)
Financial Incentives May Explain the Perceived Lack of Ransomware in Russia’s Latest Assault on Ukraine (Council on Foreign Relations)
Tessian | 1 in 3 Employees Do Not Understand the Importance of Cybersecurity at Work, According to New Report (RealWire)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>IBM reports on the cost of a data breach. Personal apps as a potential business risk. Over on the dark side, there’s help wanted in the C2C labor market. An employee engagement study reaches predictably glum conclusions. Betsy Carmelite from Booz Allen Hamilton on reducing software supply chain risks with SBOMs. Our guest is Elaine Lee from Mimecast discussing the pros and cons of AI in cybersecurity. And Why so much attempted DDoS, but not so much ransomware?</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/143</p><p><br></p><h2>Selected reading.</h2><p><a href="https://newsroom.ibm.com/2022-07-27-IBM-Report-Consumers-Pay-the-Price-as-Data-Breach-Costs-Reach-All-Time-High">IBM Report: Consumers Pay the Price as Data Breach Costs Reach All-Time High</a> (IBM Newsroom)</p><p><a href="https://www.ibm.com/downloads/cas/XZNDGZKA">Cost of a Data Breach Report 2022</a> (IBM Security)</p><p><a href="https://www.prnewswire.com/news-releases/netskope-threat-research-data-sprawl-creating-risk-for-organizations-worldwide-as-personal-app-use-in-business-continues-to-rise-301592668.html">Netskope Threat Research: Data Sprawl Creating Risk for Organizations Worldwide as Personal App Use in Business Continues to Rise</a> (PR Newswire)</p><p><a href="https://www.cfr.org/blog/financial-incentives-may-explain-perceived-lack-ransomware-russias-latest-assault-ukraine">Financial Incentives May Explain the Perceived Lack of Ransomware in Russia’s Latest Assault on Ukraine</a> (Council on Foreign Relations)</p><p><a href="https://www.realwire.com/releases/1-in-3-Employees-Do-Not-Understand-the-Importance-of-Cybersecurity-at-Work">Tessian | 1 in 3 Employees Do Not Understand the Importance of Cybersecurity at Work, According to New Report </a>(RealWire)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1518</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[35f1a19c-787a-11ec-abf0-ff1d871df9bd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3335668804.mp3?updated=1671817594" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>LockBit gets an upgrade. CosmicStrand UEFI firmware rootkit. Treating thieves like white hats? Most-impersonated brands. AV-Test's Twitter account is hijacked. The cyber phase of a hybrid war.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1627/notes</link>
      <description>LockBit gets an upgrade. CosmicStrand firmware rootkit is out in a new and improved version. Are thieves being treated like white hats? AV-Test's Twitter account is hijacked. Joe Carrigan considers the mental health effects of the online scam economy. Mr. Security Answer Person John Pescatore ponders the cybersecurity talent gap. And ongoing speculation on the cyber phase of the hybrid war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/142

Selected reading.
LockBit Ransomware Group Augments Its Latest Variant, LockBit 3.0, With BlackMatter Capabilities (Trend Micro)
CosmicStrand: the discovery of a sophisticated UEFI firmware rootkit (Securelist)
Crypto Firms Make Thieving Hackers an Offer: Keep a Little, Give Back the Rest (Wall Street Journal)
Phishers’ Favorites Top 25, H1 2022: Microsoft Is the Most Impersonated Brand in Phishing Attacks (Vade Secure)
Testing times for AV-Test as Twitter account hijacked by NFT spammers (Graham Cluley)
Ukraine fall-out and new ransomware tactics elevate cyber risks (Strategic Risk Europe)
Ed’s note: The Ukrainian-Russian cyber war no one speaks about (Smart Energy)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Jul 2022 20:15:00 -0000</pubDate>
      <itunes:title>LockBit gets an upgrade. CosmicStrand UEFI firmware rootkit. Treating thieves like white hats? Most-impersonated brands. AV-Test's Twitter account is hijacked. The cyber phase of a hybrid war.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1627</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>LockBit gets an upgrade. CosmicStrand firmware rootkit is out in a new and improved version. Are thieves being treated like white hats? AV-Test's Twitter account is hijacked. Joe Carrigan considers the mental health effects of the online scam economy. Mr. Security Answer Person John Pescatore ponders the cybersecurity talent gap. And ongoing speculation on the cyber phase of the hybrid war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/142

Selected reading.
LockBit Ransomware Group Augments Its Latest Variant, LockBit 3.0, With BlackMatter Capabilities (Trend Micro)
CosmicStrand: the discovery of a sophisticated UEFI firmware rootkit (Securelist)
Crypto Firms Make Thieving Hackers an Offer: Keep a Little, Give Back the Rest (Wall Street Journal)
Phishers’ Favorites Top 25, H1 2022: Microsoft Is the Most Impersonated Brand in Phishing Attacks (Vade Secure)
Testing times for AV-Test as Twitter account hijacked by NFT spammers (Graham Cluley)
Ukraine fall-out and new ransomware tactics elevate cyber risks (Strategic Risk Europe)
Ed’s note: The Ukrainian-Russian cyber war no one speaks about (Smart Energy)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>LockBit gets an upgrade. CosmicStrand firmware rootkit is out in a new and improved version. Are thieves being treated like white hats? AV-Test's Twitter account is hijacked. Joe Carrigan considers the mental health effects of the online scam economy. Mr. Security Answer Person John Pescatore ponders the cybersecurity talent gap. And ongoing speculation on the cyber phase of the hybrid war.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/142</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.trendmicro.com/en_us/research/22/g/lockbit-ransomware-group-augments-its-latest-variant--lockbit-3-.html">LockBit Ransomware Group Augments Its Latest Variant, LockBit 3.0, With BlackMatter Capabilities</a> (Trend Micro)</p><p><a href="https://securelist.com/cosmicstrand-uefi-firmware-rootkit/106973/">CosmicStrand: the discovery of a sophisticated UEFI firmware rootkit</a> (Securelist)</p><p><a href="https://www.wsj.com/articles/crypto-firms-make-thieving-hackers-an-offer-keep-a-little-give-back-the-rest-11658741404">Crypto Firms Make Thieving Hackers an Offer: Keep a Little, Give Back the Rest </a>(Wall Street Journal)</p><p><a href="https://www.vadesecure.com/en/blog/phishers-favorites-top-25-h1-2022">Phishers’ Favorites Top 25, H1 2022: Microsoft Is the Most Impersonated Brand in Phishing Attacks</a> (Vade Secure)</p><p><a href="https://grahamcluley.com/testing-times-for-av-test-as-twitter-account-hijacked-by-nft-spammers/">Testing times for AV-Test as Twitter account hijacked by NFT spammers</a> (Graham Cluley)</p><p><a href="https://www.strategic-risk-europe.com/home/ukraine-fall-out-and-new-ransomware-tactics-elevate-cyber-risks/1441871.article">Ukraine fall-out and new ransomware tactics elevate cyber risks</a> (Strategic Risk Europe)</p><p><a href="https://www.smart-energy.com/features-analysis/the-ukrainian-russian-cyber-war-no-one-speaks-about/">Ed’s note: The Ukrainian-Russian cyber war no one speaks about</a> (Smart Energy)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1561</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3611e966-787a-11ec-abf0-67c42a2e5488]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8009235416.mp3?updated=1671817602" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The minor mystery of GPS-jamming. Twitter investigates apparent data breach. Ransomware C2 staging discovered. A C2C offering restricted to potential privateers. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1626/notes</link>
      <description>The minor mystery of GPS-jamming. Twitter investigates an apparent data breach. Ransomware command and control staging is discovered. Andrea Little Limbago from Interos looks at the intersection of social sciences and cyber. Our guest is Nelly Porter from Google Cloud on the emerging idea of confidential computing. A C2C offering restricted to potential privateers.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/141

Selected reading.
Why Isn’t Russia jamming GPS harder in Ukraine? (C4ISRNet)
Twitter data breach exposes contact details for 5.4M accounts; on sale for $30k (9to5Mac)
Twitter investigating authenticity of 5.4 million accounts for sale on hacking forum (The Record by Recorded Future)
Russian Ransomware C2 Network Discovered in Censys Data (Censys)
Researcher finds Russia-based ransomware network with foothold in U.S. (The Record by Recorded Future)
New Cross-Platform 'Luna' Ransomware Only Offered to Russian Affiliates (SecurityWeek) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 25 Jul 2022 20:15:00 -0000</pubDate>
      <itunes:title>The minor mystery of GPS-jamming. Twitter investigates apparent data breach. Ransomware C2 staging discovered. A C2C offering restricted to potential privateers. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1626</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The minor mystery of GPS-jamming. Twitter investigates an apparent data breach. Ransomware command and control staging is discovered. Andrea Little Limbago from Interos looks at the intersection of social sciences and cyber. Our guest is Nelly Porter from Google Cloud on the emerging idea of confidential computing. A C2C offering restricted to potential privateers.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/141

Selected reading.
Why Isn’t Russia jamming GPS harder in Ukraine? (C4ISRNet)
Twitter data breach exposes contact details for 5.4M accounts; on sale for $30k (9to5Mac)
Twitter investigating authenticity of 5.4 million accounts for sale on hacking forum (The Record by Recorded Future)
Russian Ransomware C2 Network Discovered in Censys Data (Censys)
Researcher finds Russia-based ransomware network with foothold in U.S. (The Record by Recorded Future)
New Cross-Platform 'Luna' Ransomware Only Offered to Russian Affiliates (SecurityWeek) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The minor mystery of GPS-jamming. Twitter investigates an apparent data breach. Ransomware command and control staging is discovered. Andrea Little Limbago from Interos looks at the intersection of social sciences and cyber. Our guest is Nelly Porter from Google Cloud on the emerging idea of confidential computing. A C2C offering restricted to potential privateers.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/141</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.c4isrnet.com/opinion/2022/07/22/why-isnt-russia-jamming-gps-harder-in-ukraine/">Why Isn’t Russia jamming GPS harder in Ukraine?</a> (C4ISRNet)</p><p><a href="https://9to5mac.com/2022/07/22/twitter-data-breach/">Twitter data breach exposes contact details for 5.4M accounts; on sale for $30k</a> (9to5Mac)</p><p><a href="https://therecord.media/twitter-investigating-authenticity-of-5-4-million-accounts-for-sale-on-hacking-forum/">Twitter investigating authenticity of 5.4 million accounts for sale on hacking forum</a> (The Record by Recorded Future)</p><p><a href="https://censys.io/russian-ransomware-c2-network-discovered-in-censys-data/">Russian Ransomware C2 Network Discovered in Censys Data</a> (Censys)</p><p><a href="https://therecord.media/researcher-finds-russia-based-ransomware-network-with-foothold-in-u-s/">Researcher finds Russia-based ransomware network with foothold in U.S.</a> (The Record by Recorded Future)</p><p><a href="https://www.securityweek.com/new-cross-platform-luna-ransomware-only-offered-russian-affiliates">New Cross-Platform 'Luna' Ransomware Only Offered to Russian Affiliates</a> (SecurityWeek) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1604</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[36f0840a-787a-11ec-abf0-6bef39f1833f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1693220345.mp3?updated=1671817640" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The great overcorrection: shifting left probably left you vulnerable. Here’s how you can make it right. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/34/notes</link>
      <description>Shifting left has been a buzzword in the application security space for several years now, and with good reason – making security an integral part of development is the only practical approach for modern agile workflows. But in their drive to build security testing into development as early as possible, many organizations are neglecting application security in later phases and losing sight of the big picture. In this episode of CyberWire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, talks with two Hash Table members, Centene’s VP and CISO for Healthcare Enterprises, Rick Doten, and Akamai’s Advisory CISO, Steve Winterfeld. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor Invicti’s Chief Product Officer, Sonali Shah. They discuss the challenges and misunderstandings around shifting left, and provide tips on how organizations can implement web application security program without tradeoffs throughout the whole application security lifecycle.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 24 Jul 2022 07:00:00 -0000</pubDate>
      <itunes:title>The great overcorrection: shifting left probably left you vulnerable. Here’s how you can make it right. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>34</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Shifting left has been a buzzword in the application security space for several years now, and with good reason – making security an integral part of development is the only practical approach for modern agile workflows. But in their drive to build security testing into development as early as possible, many organizations are neglecting application security in later phases and losing sight of the big picture. In this episode of CyberWire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, talks with two Hash Table members, Centene’s VP and CISO for Healthcare Enterprises, Rick Doten, and Akamai’s Advisory CISO, Steve Winterfeld. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor Invicti’s Chief Product Officer, Sonali Shah. They discuss the challenges and misunderstandings around shifting left, and provide tips on how organizations can implement web application security program without tradeoffs throughout the whole application security lifecycle.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Shifting left has been a buzzword in the application security space for several years now, and with good reason – making security an integral part of development is the only practical approach for modern agile workflows. But in their drive to build security testing into development as early as possible, many organizations are neglecting application security in later phases and losing sight of the big picture. In this episode of CyberWire-X, the CyberWire's CSO, Chief Analyst, and Senior Fellow, Rick Howard, talks with two Hash Table members, Centene’s VP and CISO for Healthcare Enterprises, Rick Doten, and Akamai’s Advisory CISO, Steve Winterfeld. In the second half of the show, CyberWire podcast host Dave Bittner talks with our episode sponsor Invicti’s Chief Product Officer, Sonali Shah. They discuss the challenges and misunderstandings around shifting left, and provide tips on how organizations can implement web application security program without tradeoffs throughout the whole application security lifecycle.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1558</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[27d15ce8-0a00-11ed-897c-2b4bf2df4744]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1691988464.mp3?updated=1658524333" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mary Writz: Take a negative and make it into a positive. [VP Product Strategy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/109/notes</link>
      <description>Mary Writz, Vice President of Product Strategy at ForgeRock, shares how each career path she has taken has led her to where she is now. Mary describes how she has been a woman working in a male dominated field for most of her career and how she had to take charge, and she had to get the men to take charge with her. She says "I was often leading people, mostly men older than me, potentially smarter than me, more well paid than me. So I had to learn how to think about galvanizing this group to charge forward with me, even though I was a bit of a minority in that way." She also states that she tells herself to always make a positive out of a negative by showing people how you can respond to what's happening with a lot of energy, focus, and care and that's what got her to where she is today.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 24 Jul 2022 07:00:00 -0000</pubDate>
      <itunes:title>Mary Writz: Take a negative and make it into a positive. [VP Product Strategy] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>109</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Mary Writz, Vice President of Product Strategy at ForgeRock, shares how each career path she has taken has led her to where she is now. Mary describes how she has been a woman working in a male dominated field for most of her career and how she had to take charge, and she had to get the men to take charge with her. She says "I was often leading people, mostly men older than me, potentially smarter than me, more well paid than me. So I had to learn how to think about galvanizing this group to charge forward with me, even though I was a bit of a minority in that way." She also states that she tells herself to always make a positive out of a negative by showing people how you can respond to what's happening with a lot of energy, focus, and care and that's what got her to where she is today.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Mary Writz, Vice President of Product Strategy at ForgeRock, shares how each career path she has taken has led her to where she is now. Mary describes how she has been a woman working in a male dominated field for most of her career and how she had to take charge, and she had to get the men to take charge with her. She says "I was often leading people, mostly men older than me, potentially smarter than me, more well paid than me. So I had to learn how to think about galvanizing this group to charge forward with me, even though I was a bit of a minority in that way." She also states that she tells herself to always make a positive out of a negative by showing people how you can respond to what's happening with a lot of energy, focus, and care and that's what got her to where she is today.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>406</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e1df1bce-09d4-11ed-948e-033e50f9693e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4699350971.mp3?updated=1658432394" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Has GOLD SOUTHFIELD resumed operations? [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/242/notes</link>
      <description>Rob Pantazopoulos from Secureworks, joins Dave to discuss their work on "REvil Development Adds Confidence About GOLD SOUTHFIELD Reemergence." Secureworks researchers published a new analysis on what can be considered the ‘first’ set of ransomware samples associated with the reemergence. These updated samples indicate that GOLD SOUTHFIELD has resumed operations.
The research states "The identification of multiple samples containing different modifications and the lack of an official new version indicate that REvil is under active development." Researchers identified two samples, one in October of 2021, and the other in March of 2022. The March sample has modifications that lead researchers to distinguish the two samples from one another.
The research can be found here:
REvil Development Adds Confidence About GOLD SOUTHFIELD Reemergence

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Jul 2022 07:00:00 -0000</pubDate>
      <itunes:title>Has GOLD SOUTHFIELD resumed operations? [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>242</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Rob Pantazopoulos from Secureworks, joins Dave to discuss their work on "REvil Development Adds Confidence About GOLD SOUTHFIELD Reemergence." Secureworks researchers published a new analysis on what can be considered the ‘first’ set of ransomware samples associated with the reemergence. These updated samples indicate that GOLD SOUTHFIELD has resumed operations.
The research states "The identification of multiple samples containing different modifications and the lack of an official new version indicate that REvil is under active development." Researchers identified two samples, one in October of 2021, and the other in March of 2022. The March sample has modifications that lead researchers to distinguish the two samples from one another.
The research can be found here:
REvil Development Adds Confidence About GOLD SOUTHFIELD Reemergence

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rob Pantazopoulos from Secureworks, joins Dave to discuss their work on "REvil Development Adds Confidence About GOLD SOUTHFIELD Reemergence." Secureworks researchers published a new analysis on what can be considered the ‘first’ set of ransomware samples associated with the reemergence. These updated samples indicate that GOLD SOUTHFIELD has resumed operations.</p><p>The research states "The identification of multiple samples containing different modifications and the lack of an official new version indicate that REvil is under active development." Researchers identified two samples, one in October of 2021, and the other in March of 2022. The March sample has modifications that lead researchers to distinguish the two samples from one another.</p><p>The research can be found here:</p><ul><li><a href="https://www.secureworks.com/blog/revil-development-adds-confidence-about-gold-southfield-reemergence">REvil Development Adds Confidence About GOLD SOUTHFIELD Reemergence</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1264</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3f0f5b3c-092c-11ed-90f4-eb635a49cc6f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1513178186.mp3?updated=1685127072" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Espionage and counterespionage during the hybrid war. Assessing Russian cyberops. Conti's fate. Investigating cut Internet cables in France. Trends in “pig-butchering.”</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1625/notes</link>
      <description>Traditional espionage and counterespionage during the hybrid war. Assessing Russian cyberattacks. Conti's fate and effects. Investigating cut Internet cables in France. My conversation with AD Bryan Vorndran of the FBI Cyber Division on reverse webshell operation and Hafnium. Our guest is Tom Kellermann of VMware to discuss the findings of their Modern Bank Heists report. And, finally the dark online world of “pig-butchering.”

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/140

Selected reading.
UK Spy Chief Sees Russia’s Military Running ‘Out of Steam’ Soon (Bloomberg)
Exhausted Russian army gives Ukraine chance to strike back, says British spy chief (The Telegraph) 
'Cut by half' Putin's masterplan backfires as 400 Russian spies thrown out of Europe (Express) 
Half of Russian spies in Europe expelled since Ukraine invasion, says MI6 chief (the Guardian) 
MI6 chief: Russia’s spies ‘not having a great war’ in Ukraine (The Record by Recorded Future) 
CIA chief says 15,000 Russians killed in war, dismisses Putin health rumors (Washington Post) 
CIA Chief Says Russia’s Iran Drone Deal Shows Military Weakness (Bloomberg) 
Ukraine confronts Kremlin infiltration threat at unreformed state bodies (Atlantic Council) 
US seeking to understand Russia’s failure to project cyber power in Ukraine (Defense News)
Battling Moscow's hackers prior to invasion gave Kyiv 'full dress rehearsal' for today's cyber warfare (CyberScoop)
How Conti ransomware hacked and encrypted the Costa Rican government (BleepingComputer) 
Anatomy of Attack: Truth Behind the Costa Rica Government Ransomware 5-Day Intrusion (AdvIntel) 
Conti Criminals Resurface as Splinter RaaS Groups  (Security Boulevard)
The Unsolved Mystery Attack on Internet Cables in Paris (Wired) 
Massive Losses Define Epidemic of ‘Pig Butchering’ (KrebsOnSecurity)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 22 Jul 2022 20:40:00 -0000</pubDate>
      <itunes:title>Espionage and counterespionage during the hybrid war. Assessing Russian cyberops. Conti's fate. Investigating cut Internet cables in France. Trends in “pig-butchering.”</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1625</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Traditional espionage and counterespionage during the hybrid war. Assessing Russian cyberattacks. Conti's fate and effects. Investigating cut Internet cables in France. My conversation with AD Bryan Vorndran of the FBI Cyber Division on reverse webshell operation and Hafnium. Our guest is Tom Kellermann of VMware to discuss the findings of their Modern Bank Heists report. And, finally the dark online world of “pig-butchering.”

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/140

Selected reading.
UK Spy Chief Sees Russia’s Military Running ‘Out of Steam’ Soon (Bloomberg)
Exhausted Russian army gives Ukraine chance to strike back, says British spy chief (The Telegraph) 
'Cut by half' Putin's masterplan backfires as 400 Russian spies thrown out of Europe (Express) 
Half of Russian spies in Europe expelled since Ukraine invasion, says MI6 chief (the Guardian) 
MI6 chief: Russia’s spies ‘not having a great war’ in Ukraine (The Record by Recorded Future) 
CIA chief says 15,000 Russians killed in war, dismisses Putin health rumors (Washington Post) 
CIA Chief Says Russia’s Iran Drone Deal Shows Military Weakness (Bloomberg) 
Ukraine confronts Kremlin infiltration threat at unreformed state bodies (Atlantic Council) 
US seeking to understand Russia’s failure to project cyber power in Ukraine (Defense News)
Battling Moscow's hackers prior to invasion gave Kyiv 'full dress rehearsal' for today's cyber warfare (CyberScoop)
How Conti ransomware hacked and encrypted the Costa Rican government (BleepingComputer) 
Anatomy of Attack: Truth Behind the Costa Rica Government Ransomware 5-Day Intrusion (AdvIntel) 
Conti Criminals Resurface as Splinter RaaS Groups  (Security Boulevard)
The Unsolved Mystery Attack on Internet Cables in Paris (Wired) 
Massive Losses Define Epidemic of ‘Pig Butchering’ (KrebsOnSecurity)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Traditional espionage and counterespionage during the hybrid war. Assessing Russian cyberattacks. Conti's fate and effects. Investigating cut Internet cables in France. My conversation with AD Bryan Vorndran of the FBI Cyber Division on reverse webshell operation and Hafnium. Our guest is Tom Kellermann of VMware to discuss the findings of their Modern Bank Heists report. And, finally the dark online world of “pig-butchering.”</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/140</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bloomberg.com/news/articles/2022-07-21/uk-spy-chief-sees-russia-s-military-running-out-of-steam-soon">UK Spy Chief Sees Russia’s Military Running ‘Out of Steam’ Soon</a> (Bloomberg)</p><p><a href="https://www.telegraph.co.uk/world-news/2022/07/21/exhausted-russian-army-gives-ukraine-chance-strike-back-says/">Exhausted Russian army gives Ukraine chance to strike back, says British spy chief</a> (The Telegraph) </p><p><a href="https://www.express.co.uk/news/world/1644113/Putin-news-russian-spies-uk-europe-ukraine-war-richard-moore-mi6">'Cut by half' Putin's masterplan backfires as 400 Russian spies thrown out of Europe</a> (Express) </p><p><a href="https://www.theguardian.com/uk-news/2022/jul/21/half-of-russian-spies-in-europe-expelled-since-ukraine-invasion-says-mi6-chief">Half of Russian spies in Europe expelled since Ukraine invasion, says MI6 chief</a> (the Guardian) </p><p><a href="https://therecord.media/mi6-chief-russias-spies-not-having-a-great-war-in-ukraine/">MI6 chief: Russia’s spies ‘not having a great war’ in Ukraine</a> (The Record by Recorded Future) </p><p><a href="https://www.washingtonpost.com/world/2022/07/21/ukraine-russia-war-putin-fighters/">CIA chief says 15,000 Russians killed in war, dismisses Putin health rumors</a> (Washington Post) </p><p><a href="https://www.bloomberg.com/news/articles/2022-07-21/cia-chief-says-russia-s-iran-drone-deal-shows-military-weakness">CIA Chief Says Russia’s Iran Drone Deal Shows Military Weakness</a> (Bloomberg) </p><p><a href="https://www.atlanticcouncil.org/blogs/ukrainealert/ukraine-confronts-kremlin-infiltration-threat-at-unreformed-state-bodies/">Ukraine confronts Kremlin infiltration threat at unreformed state bodies</a> (Atlantic Council) </p><p><a href="https://www.defensenews.com/cyber/2022/07/21/us-seeking-to-understand-russian-failures-to-project-cyber-power-in-ukraine/">US seeking to understand Russia’s failure to project cyber power in Ukraine</a> (Defense News)</p><p><a href="https://www.cyberscoop.com/ukraine-cyber-officials-prepare-for-attacks/">Battling Moscow's hackers prior to invasion gave Kyiv 'full dress rehearsal' for today's cyber warfare</a> (CyberScoop)</p><p><a href="https://www.bleepingcomputer.com/news/security/how-conti-ransomware-hacked-and-encrypted-the-costa-rican-government/">How Conti ransomware hacked and encrypted the Costa Rican government</a> (BleepingComputer) </p><p><a href="https://www.advintel.io/post/anatomy-of-attack-truth-behind-the-costa-rica-government-ransomware-5-day-intrusion">Anatomy of Attack: Truth Behind the Costa Rica Government Ransomware 5-Day Intrusion </a>(AdvIntel) </p><p><a href="https://securityboulevard.com/2022/07/conti-criminals-resurface-as-splinter-raas-groups/">Conti Criminals Resurface as Splinter RaaS Groups </a> (Security Boulevard)</p><p><a href="https://www.wired.com/story/france-paris-internet-cable-cuts-attack/">The Unsolved Mystery Attack on Internet Cables in Paris</a> (Wired) </p><p><a href="https://krebsonsecurity.com/2022/07/massive-losses-define-epidemic-of-pig-butchering/">Massive Losses Define Epidemic of ‘Pig Butchering’</a> (KrebsOnSecurity)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1696</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ba3d0d04-7881-11ec-90a9-834ae6f67ec8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3767542298.mp3?updated=1671817652" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Notes on the underworld: emerging, enduring, and vanishing gangs, and their C2C markets. More spearphishing of Ukrainian targets. US CYBERCOM releases IOCs obtained from Ukrainian networks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1624/notes</link>
      <description>A criminal talent broker emerges. Developing threats to financial institutions. Phishing through PayPal. Lessons to be learned from LAPSUS$, post-flameout. More spearphishing of Ukrainian targets. US Cyber Command releases IOCs obtained from Ukrainian networks. Johannes Ullrich from SANS on the value of keeping technology simple. Our guests are Carla Plummer and Akilah Tunsill from the organization Black Girls in Cyber. And not really honor, but honor’s self-interested first cousin.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/139

Selected reading.
Atlas Intelligence Group (A.I.G) – The Wrath of a Titan (Cyberint)
'AIG' Threat Group Launches With Unique Business Model (Dark Reading)
Buy, Sell, Steal, EvilNum Targets Cryptocurrency, Forex, Commodities (Proofpoint)
Sending Phishing Emails From PayPal (Avanan) 
Brazen, Unsophisticated and Illogical: Understanding the LAPSUS$ Extortion Group (Tenable®)
Evacuation and Humanitarian Documents used to Spear Phish Ukrainian Entities (Mandiant)
Cyber National Mission Force discloses IOCs from Ukrainian networks (U.S. Cyber Command) 
The Evolution of Cybercrime: Why the Dark Web is Supercharging the Threat Landscape and How to Fight Back (HP Wolf Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 21 Jul 2022 20:15:00 -0000</pubDate>
      <itunes:title>Notes on the underworld: emerging, enduring, and vanishing gangs, and their C2C markets. More spearphishing of Ukrainian targets. US CYBERCOM releases IOCs obtained from Ukrainian networks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1624</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A criminal talent broker emerges. Developing threats to financial institutions. Phishing through PayPal. Lessons to be learned from LAPSUS$, post-flameout. More spearphishing of Ukrainian targets. US Cyber Command releases IOCs obtained from Ukrainian networks. Johannes Ullrich from SANS on the value of keeping technology simple. Our guests are Carla Plummer and Akilah Tunsill from the organization Black Girls in Cyber. And not really honor, but honor’s self-interested first cousin.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/139

Selected reading.
Atlas Intelligence Group (A.I.G) – The Wrath of a Titan (Cyberint)
'AIG' Threat Group Launches With Unique Business Model (Dark Reading)
Buy, Sell, Steal, EvilNum Targets Cryptocurrency, Forex, Commodities (Proofpoint)
Sending Phishing Emails From PayPal (Avanan) 
Brazen, Unsophisticated and Illogical: Understanding the LAPSUS$ Extortion Group (Tenable®)
Evacuation and Humanitarian Documents used to Spear Phish Ukrainian Entities (Mandiant)
Cyber National Mission Force discloses IOCs from Ukrainian networks (U.S. Cyber Command) 
The Evolution of Cybercrime: Why the Dark Web is Supercharging the Threat Landscape and How to Fight Back (HP Wolf Security)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A criminal talent broker emerges. Developing threats to financial institutions. Phishing through PayPal. Lessons to be learned from LAPSUS$, post-flameout. More spearphishing of Ukrainian targets. US Cyber Command releases IOCs obtained from Ukrainian networks. Johannes Ullrich from SANS on the value of keeping technology simple. Our guests are Carla Plummer and Akilah Tunsill from the organization Black Girls in Cyber. And not really honor, but honor’s self-interested first cousin.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/139</p><p><br></p><h2>Selected reading.</h2><p><a href="https://cyberint.com/blog/research/atlas-intelligence-group/">Atlas Intelligence Group (A.I.G) – The Wrath of a Titan</a> (Cyberint)</p><p><a href="https://www.darkreading.com/threat-intelligence/aig-threat-group-launches-unique-business-model">'AIG' Threat Group Launches With Unique Business Model</a> (Dark Reading)</p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/buy-sell-steal-evilnum-targets-cryptocurrency-forex-commodities">Buy, Sell, Steal, EvilNum Targets Cryptocurrency, Forex, Commodities</a> (Proofpoint)</p><p><a href="https://www.avanan.com/blog/sending-phishing-emails-from-paypal">Sending Phishing Emails From PayPal</a> (Avanan) </p><p><a href="https://www.tenable.com/blog/brazen-unsophisticated-and-illogical-understanding-the-lapsus-extortion-group">Brazen, Unsophisticated and Illogical: Understanding the LAPSUS$ Extortion Group</a> (Tenable®)</p><p><a href="https://www.mandiant.com/resources/spear-phish-ukrainian-entities">Evacuation and Humanitarian Documents used to Spear Phish Ukrainian Entities</a> (Mandiant)</p><p><a href="https://www.cybercom.mil/Media/News/Article/3098856/cyber-national-mission-force-discloses-iocs-from-ukrainian-networks/">Cyber National Mission Force discloses IOCs from Ukrainian networks</a> (U.S. Cyber Command) </p><p><a href="https://threatresearch.ext.hp.com/evolution-of-cybercrime-report/">The Evolution of Cybercrime: Why the Dark Web is Supercharging the Threat Landscape and How to Fight Back</a> (HP Wolf Security)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1734</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b9814cd6-7881-11ec-90a9-67c681e55702]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1468722901.mp3?updated=1671817682" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber phases of Russia’s hybrid war seem mostly espionage. Belgium accuses China of spying. LockBit ransomware spreads. And Micodus GPS tracker vulnerabilities are real and unpatched.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1623/notes</link>
      <description>What’s Russia up to in cyberspace, nowadays? Belgium accuses China of cyberespionage. LockBit ransomware spreading through compromised servers. Malek Ben Salem from Accenture explains the Privacy Enhancing Technologies of Federated Learning with Differential Privacy guarantees. Rick Howard speaks with Rob Gurzeev from Cycognito on Data Exploitation. And Micodus GPS tracker vulnerabilities should motivate the user to turn the thing off.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/138

Selected reading.
Continued cyber activity in Eastern Europe observed by TAG (Google)
Declaration by the High Representative on behalf of the European Union on malicious cyber activities conducted by hackers and hacker groups in the context of Russia’s aggression against Ukraine (European Council)
China: Declaration by the Minister for Foreign Affairs on behalf of the Belgian Government urging Chinese authorities to take action against malicious cyber activities undertaken by Chinese actors (Federal Public Service Foreign Affairs) 
Déclaration du porte-parole de l'Ambassade de Chine en Belgique au sujet de la déclaration du gouvernement belge sur les cyberattaques (Embassy of the People's Republic of China in the Kingdom of Belgium)
LockBit: Ransomware Puts Servers in the Crosshairs (Broadcom Software Blogs | Threat Intelligence)
Critical Vulnerabilities Discovered in Popular Automotive GPS Tracking Device (MiCODUS MV720) (BitSight)
CISA released Security Advisory on MiCODUS MV720 Global Positioning System (GPS) Tracker (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 20 Jul 2022 20:35:00 -0000</pubDate>
      <itunes:title>Cyber phases of Russia’s hybrid war seem mostly espionage. Belgium accuses China of spying. LockBit ransomware spreads. And Micodus GPS tracker vulnerabilities are real and unpatched.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1623</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>What’s Russia up to in cyberspace, nowadays? Belgium accuses China of cyberespionage. LockBit ransomware spreading through compromised servers. Malek Ben Salem from Accenture explains the Privacy Enhancing Technologies of Federated Learning with Differential Privacy guarantees. Rick Howard speaks with Rob Gurzeev from Cycognito on Data Exploitation. And Micodus GPS tracker vulnerabilities should motivate the user to turn the thing off.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/138

Selected reading.
Continued cyber activity in Eastern Europe observed by TAG (Google)
Declaration by the High Representative on behalf of the European Union on malicious cyber activities conducted by hackers and hacker groups in the context of Russia’s aggression against Ukraine (European Council)
China: Declaration by the Minister for Foreign Affairs on behalf of the Belgian Government urging Chinese authorities to take action against malicious cyber activities undertaken by Chinese actors (Federal Public Service Foreign Affairs) 
Déclaration du porte-parole de l'Ambassade de Chine en Belgique au sujet de la déclaration du gouvernement belge sur les cyberattaques (Embassy of the People's Republic of China in the Kingdom of Belgium)
LockBit: Ransomware Puts Servers in the Crosshairs (Broadcom Software Blogs | Threat Intelligence)
Critical Vulnerabilities Discovered in Popular Automotive GPS Tracking Device (MiCODUS MV720) (BitSight)
CISA released Security Advisory on MiCODUS MV720 Global Positioning System (GPS) Tracker (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>What’s Russia up to in cyberspace, nowadays? Belgium accuses China of cyberespionage. LockBit ransomware spreading through compromised servers. Malek Ben Salem from Accenture explains the Privacy Enhancing Technologies of Federated Learning with Differential Privacy guarantees. Rick Howard speaks with Rob Gurzeev from Cycognito on Data Exploitation. And Micodus GPS tracker vulnerabilities should motivate the user to turn the thing off.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/138</p><p><br></p><h2>Selected reading.</h2><p><a href="https://blog.google/threat-analysis-group/continued-cyber-activity-in-eastern-europe-observed-by-tag/">Continued cyber activity in Eastern Europe observed by TAG</a> (Google)</p><p><a href="https://www.consilium.europa.eu/en/press/press-releases/2022/07/19/declaration-by-the-high-representative-on-behalf-of-the-european-union-on-malicious-cyber-activities-conducted-by-hackers-and-hacker-groups-in-the-context-of-russia-s-aggression-against-ukraine/">Declaration by the High Representative on behalf of the European Union on malicious cyber activities conducted by hackers and hacker groups in the context of Russia’s aggression against Ukraine</a> (European Council)</p><p><a href="https://diplomatie.belgium.be/en/news/declaration-minister-foreign-affairs-malicious-cyber-activities">China: Declaration by the Minister for Foreign Affairs on behalf of the Belgian Government urging Chinese authorities to take action against malicious cyber activities undertaken by Chinese actors</a> (Federal Public Service Foreign Affairs) </p><p><a href="http://be.china-embassy.gov.cn/fra/jh/202207/t20220719_10723120.htm">Déclaration du porte-parole de l'Ambassade de Chine en Belgique au sujet de la déclaration du gouvernement belge sur les cyberattaques</a> (Embassy of the People's Republic of China in the Kingdom of Belgium)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lockbit-targets-servers">LockBit: Ransomware Puts Servers in the Crosshairs</a> (Broadcom Software Blogs | Threat Intelligence)</p><p><a href="https://www.bitsight.com/sites/default/files/2022-07/MiCODUS-GPS-Report-Final.pdf">Critical Vulnerabilities Discovered in Popular Automotive GPS Tracking Device (MiCODUS MV720)</a> (BitSight)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/07/19/cisa-released-security-advisory-micodus-mv720-global-positioning">CISA released Security Advisory on MiCODUS MV720 Global Positioning System (GPS) Tracker</a> (CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1847</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b92411c4-7881-11ec-90a9-db7e3bd6e34d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3446542631.mp3?updated=1671817697" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Espionage and cyberespionage. Albania's national IT networks work toward recovery. Malicious apps ejected from Google Play. White House summit addresses the cyber workforce. Notes on cybercrime.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1622/notes</link>
      <description>A Cozy Bear sighting. Shaking up Ukraine's intelligence services. Albania's national IT networks continue to work toward recovery. US Justice Department seizes $500k from DPRK threat actors. The FBI warns of apps designed to defraud cryptocurrency speculators. A White House meeting today addresses the cyber workforce. Ben Yelin looks at our right to record police. Our guest is Tim Knudsen, Director of Product Management for Zero Trust at Google Cloud, speaking with Rick Howard. And another trend we’d like to be included out of.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/137

Selected reading.
Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive (Unit 42)
Russian hacking unit Cozy Bear adds Google Drive to its arsenal, researchers say (CyberScoop)
Russian SVR hackers use Google Drive, Dropbox to evade detection (BleepingComputer) 
Ukraine’s spy problem runs deeper than Volodymyr Zelensky’s childhood friend (The Telegraph) 
Albanian government websites go dark after cyberattack (Register) 
On Google Play, Joker, Facestealer, &amp; Coper Banking Malware (Zscaler) 
Justice Department seizes $500K from North Korean hackers who targeted US medical organizations (CNN) 
Cyber Criminals Create Fraudulent Cryptocurrency Investment Applications to Defraud US Investors (US Federal Bureau of Investigation)
Announcement of White House National Cyber Workforce and Education Summit | The White House (The White House)
Fortinet Announces Free Training Offering for Schools at White House Cyber Workforce and Education Summit (Fortinet)
Not your average side hustle: the women making thousands from 'pay pigs' who enjoy being financially dominated (Business Insider)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Jul 2022 20:15:00 -0000</pubDate>
      <itunes:title>Espionage and cyberespionage. Albania's national IT networks work toward recovery. Malicious apps ejected from Google Play. White House summit addresses the cyber workforce. Notes on cybercrime.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1622</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A Cozy Bear sighting. Shaking up Ukraine's intelligence services. Albania's national IT networks continue to work toward recovery. US Justice Department seizes $500k from DPRK threat actors. The FBI warns of apps designed to defraud cryptocurrency speculators. A White House meeting today addresses the cyber workforce. Ben Yelin looks at our right to record police. Our guest is Tim Knudsen, Director of Product Management for Zero Trust at Google Cloud, speaking with Rick Howard. And another trend we’d like to be included out of.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/137

Selected reading.
Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive (Unit 42)
Russian hacking unit Cozy Bear adds Google Drive to its arsenal, researchers say (CyberScoop)
Russian SVR hackers use Google Drive, Dropbox to evade detection (BleepingComputer) 
Ukraine’s spy problem runs deeper than Volodymyr Zelensky’s childhood friend (The Telegraph) 
Albanian government websites go dark after cyberattack (Register) 
On Google Play, Joker, Facestealer, &amp; Coper Banking Malware (Zscaler) 
Justice Department seizes $500K from North Korean hackers who targeted US medical organizations (CNN) 
Cyber Criminals Create Fraudulent Cryptocurrency Investment Applications to Defraud US Investors (US Federal Bureau of Investigation)
Announcement of White House National Cyber Workforce and Education Summit | The White House (The White House)
Fortinet Announces Free Training Offering for Schools at White House Cyber Workforce and Education Summit (Fortinet)
Not your average side hustle: the women making thousands from 'pay pigs' who enjoy being financially dominated (Business Insider)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Cozy Bear sighting. Shaking up Ukraine's intelligence services. Albania's national IT networks continue to work toward recovery. US Justice Department seizes $500k from DPRK threat actors. The FBI warns of apps designed to defraud cryptocurrency speculators. A White House meeting today addresses the cyber workforce. Ben Yelin looks at our right to record police. Our guest is Tim Knudsen, Director of Product Management for Zero Trust at Google Cloud, speaking with Rick Howard. And another trend we’d like to be included out of.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/137</p><p><br></p><h2>Selected reading.</h2><p><a href="https://unit42.paloaltonetworks.com/cloaked-ursa-online-storage-services-campaigns/#Campaign-2">Russian APT29 Hackers Use Online Storage Services, DropBox and Google Drive</a> (Unit 42)</p><p><a href="https://www.cyberscoop.com/apt29-google-drive-malware-spearphishing/">Russian hacking unit Cozy Bear adds Google Drive to its arsenal, researchers say</a> (CyberScoop)</p><p><a href="https://www.bleepingcomputer.com/news/security/russian-svr-hackers-use-google-drive-dropbox-to-evade-detection/">Russian SVR hackers use Google Drive, Dropbox to evade detection</a> (BleepingComputer) </p><p><a href="https://www.telegraph.co.uk/world-news/2022/07/18/ukraines-spy-problem-runs-deeper-volodymyr-zelenskys-childhood/">Ukraine’s spy problem runs deeper than Volodymyr Zelensky’s childhood friend</a> (The Telegraph) </p><p><a href="https://www.theregister.com/2022/07/18/albania_down/">Albanian government websites go dark after cyberattack</a> (Register) </p><p><a href="https://www.zscaler.com/blogs/security-research/joker-facestealer-and-coper-banking-malwares-google-play-store">On Google Play, Joker, Facestealer, &amp; Coper Banking Malware</a> (Zscaler) </p><p><a href="https://www.cnn.com/2022/07/19/politics/justice-department-north-korea-hackers-ransomware/index.html">Justice Department seizes $500K from North Korean hackers who targeted US medical organizations </a>(CNN) </p><p><a href="https://www.ic3.gov/Media/News/2022/220718.pdf">Cyber Criminals Create Fraudulent Cryptocurrency Investment Applications to Defraud US Investors</a> (US Federal Bureau of Investigation)</p><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2022/07/18/announcement-of-white-house-national-cyber-workforce-and-education-summit/">Announcement of White House National Cyber Workforce and Education Summit | The White House</a> (The White House)</p><p><a href="https://www.fortinet.com/corporate/about-us/newsroom/press-releases/2022/fortinet-announces-free-training-offering-schools-white-house-cyber-workforce-education-summit">Fortinet Announces Free Training Offering for Schools at White House Cyber Workforce and Education Summit</a> (Fortinet)</p><p><a href="https://www.businessinsider.com/side-hustle-with-a-difference-women-making-thousands-from-pay-pigs-2022-7">Not your average side hustle: the women making thousands from 'pay pigs' who enjoy being financially dominated</a> (Business Insider)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1746</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b886763a-7881-11ec-90a9-eb32a3cfa68e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1200171853.mp3?updated=1671817955" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ukraine’s security chief and head prosecutor are out. Cyberattacks hit Albania. APTs prospect journalists. The GRU trolls researchers. CISA to open an attaché office in London.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1621/notes</link>
      <description>Ukraine shakes up its security and prosecutorial services. Cyberattacks hit Albania. Advanced persistent threat actors prospect journalists. The GRU is said to be trolling researchers who look into Sandworm. Thomas Etheridge from CrowdStrike on identity management. Our guest is Robin Bell from Egress discussing their Human Activated Risk Report. And CISA opens a liaison office in London.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/136

Selected reading.
Ukraine's Zelenskyy fires top security chief and prosecutor (AP NEWS)
Zelenskiy Ousts Ukraine’s Security Chief and Top Prosecutor (Bloomberg)
Volodymyr Zelensky sacks top aides over 'Russian collaboration' (The Telegraph)
A massive cyberattack hit Albania (Security Affairs)
Information Systems Are Intact, Says Albanian Government after Cyber Attack (Exit - Explaining Albania) 
Albania closes down online gov't systems after cyber attack (ANI News).
Albania Shuts Down Digital Services and Government Websites after Cyber Attack (Exit - Explaining Albania)
Hackers pose as journalists to breach news media org’s networks (BleepingComputer)
Cybersecurity Firm: What US Journalists Need To Know About The Foreign Hackers Targeting Them Forbes)
Sandworm APT Trolls Researchers on Its Trail as It Targets Ukraine (Dark Reading)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 18 Jul 2022 20:15:00 -0000</pubDate>
      <itunes:title>Ukraine’s security chief and head prosecutor are out. Cyberattacks hit Albania. APTs prospect journalists. The GRU trolls researchers. CISA to open an attaché office in London.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1621</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ukraine shakes up its security and prosecutorial services. Cyberattacks hit Albania. Advanced persistent threat actors prospect journalists. The GRU is said to be trolling researchers who look into Sandworm. Thomas Etheridge from CrowdStrike on identity management. Our guest is Robin Bell from Egress discussing their Human Activated Risk Report. And CISA opens a liaison office in London.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/136

Selected reading.
Ukraine's Zelenskyy fires top security chief and prosecutor (AP NEWS)
Zelenskiy Ousts Ukraine’s Security Chief and Top Prosecutor (Bloomberg)
Volodymyr Zelensky sacks top aides over 'Russian collaboration' (The Telegraph)
A massive cyberattack hit Albania (Security Affairs)
Information Systems Are Intact, Says Albanian Government after Cyber Attack (Exit - Explaining Albania) 
Albania closes down online gov't systems after cyber attack (ANI News).
Albania Shuts Down Digital Services and Government Websites after Cyber Attack (Exit - Explaining Albania)
Hackers pose as journalists to breach news media org’s networks (BleepingComputer)
Cybersecurity Firm: What US Journalists Need To Know About The Foreign Hackers Targeting Them Forbes)
Sandworm APT Trolls Researchers on Its Trail as It Targets Ukraine (Dark Reading)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ukraine shakes up its security and prosecutorial services. Cyberattacks hit Albania. Advanced persistent threat actors prospect journalists. The GRU is said to be trolling researchers who look into Sandworm. Thomas Etheridge from CrowdStrike on identity management. Our guest is Robin Bell from Egress discussing their Human Activated Risk Report. And CISA opens a liaison office in London.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/136</p><p><br></p><h2>Selected reading.</h2><p><a href="https://apnews.com/article/russia-ukraine-moscow-black-sea-moldova-3c4521b4371c07c852534d03cf62ab88">Ukraine's Zelenskyy fires top security chief and prosecutor</a> (AP NEWS)</p><p><a href="https://www.bloomberg.com/news/articles/2022-07-18/zelenskiy-bids-to-oust-ukraine-s-security-chief-top-prosecutor">Zelenskiy Ousts Ukraine’s Security Chief and Top Prosecutor</a> (Bloomberg)</p><p><a href="https://www.telegraph.co.uk/world-news/2022/07/17/russia-accused-shelling-ukraine-occupied-nuclear-plant/">Volodymyr Zelensky sacks top aides over 'Russian collaboration'</a> (The Telegraph)</p><p><a href="https://securityaffairs.co/wordpress/133363/cyber-warfare-2/albania-cyber-attack.html">A massive cyberattack hit Albania</a> (Security Affairs)</p><p><a href="https://exit.al/en/2022/07/18/information-systems-are-intact-says-albanian-government-after-cyber-attack/">Information Systems Are Intact, Says Albanian Government after Cyber Attack</a> (Exit - Explaining Albania) </p><p><a href="https://www.aninews.in/news/world/others/albania-closes-down-online-govt-systems-after-cyber-attack20220718025205/">Albania closes down online gov't systems after cyber attack</a> (ANI News).</p><p><a href="https://exit.al/en/2022/07/17/albanian-shuts-down-digital-services-and-government-websites-after-cyber-attack/">Albania Shuts Down Digital Services and Government Websites after Cyber Attack</a> (Exit - Explaining Albania)</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-pose-as-journalists-to-breach-news-media-org-s-networks/">Hackers pose as journalists to breach news media org’s networks</a> (BleepingComputer)</p><p><a href="https://www.forbes.com/sites/andymeek/2022/07/17/cybersecurity-firm-what-us-journalists-need-to-know-about-the-the-foreign-hackers-targeting-them/">Cybersecurity Firm: What US Journalists Need To Know About The Foreign Hackers Targeting Them</a> Forbes)</p><p><a href="https://www.darkreading.com/threat-intelligence/sandworm-apt-trolls-researchers-on-its-trail-while-it-targets-ukraine">Sandworm APT Trolls Researchers on Its Trail as It Targets Ukraine</a> (Dark Reading)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1457</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b825fc06-7881-11ec-90a9-a39938e1b0bb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4406493635.mp3?updated=1671817966" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mike Arrowsmith: Facing adversity in the workplace. [CTrO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/108/notes</link>
      <description>Mike Arrowsmith, Chief Trust Officer at NinjaOne, leads the organization’s IT, security, and support infrastructure to ensure they meet customers’ security and data privacy demands as it scales. Mike discusses how his career path has led him to the position he currently holds and how exciting the world of cybersecurity can be. He mentioned how he mentored students in college thinking of going into the field, and he used a metaphor to help describe the industry, saying "We are working against adversaries that are always typically one step ahead. Figuratively, if you could imagine, you're trying to chase a ball, but you never can quite get your hands on it." He shares how he loves the evolving field and that he thrives in a situation where things are constantly changing. We thank Mike for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 17 Jul 2022 07:00:00 -0000</pubDate>
      <itunes:title>Mike Arrowsmith: Facing adversity in the workplace. [CTrO] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>108</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Mike Arrowsmith, Chief Trust Officer at NinjaOne, leads the organization’s IT, security, and support infrastructure to ensure they meet customers’ security and data privacy demands as it scales. Mike discusses how his career path has led him to the position he currently holds and how exciting the world of cybersecurity can be. He mentioned how he mentored students in college thinking of going into the field, and he used a metaphor to help describe the industry, saying "We are working against adversaries that are always typically one step ahead. Figuratively, if you could imagine, you're trying to chase a ball, but you never can quite get your hands on it." He shares how he loves the evolving field and that he thrives in a situation where things are constantly changing. We thank Mike for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Mike Arrowsmith, Chief Trust Officer at NinjaOne, leads the organization’s IT, security, and support infrastructure to ensure they meet customers’ security and data privacy demands as it scales. Mike discusses how his career path has led him to the position he currently holds and how exciting the world of cybersecurity can be. He mentioned how he mentored students in college thinking of going into the field, and he used a metaphor to help describe the industry, saying "We are working against adversaries that are always typically one step ahead. Figuratively, if you could imagine, you're trying to chase a ball, but you never can quite get your hands on it." He shares how he loves the evolving field and that he thrives in a situation where things are constantly changing. We thank Mike for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>366</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d0602e10-0461-11ed-83ac-07aa09f93525]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9875028163.mp3?updated=1657814945" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybercriminals shift tactics from disruption to data leaks. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/33/notes</link>
      <description>On this episode of CyberWire-X, we examine double extortion ransomware. The large-scale cyber events of yesterday – Stuxnet, the Ukraine Power Grid Attack – were primarily focused on disruption. Cybercriminals soon shifted to ransomware with disruption still the key focus – and then took things to the next level with Double Extortion Ransomware.
When ransomware first started to take off as the attack method of choice around 2015, the hacker playbook was focused on encrypting data, requesting payment and then handing over the encryption keys. Their methods escalated with Double Extortion, stealing data as well as encrypting it - and threatening to leak data if they don’t receive payment. We’ve seen with ransomware groups like Maze that they will follow through with publishing private information if not paid.
In the first part of the show, Rick Howard, the CyberWire’s CSO, Chief Analyst, and Senior Fellow, talks with Wayne Moore, Simply Business' CISO and CyberWire Hash Table member, and, in the second half of the show, the CyberWire's podcast host Dave Bittner talks with Nathan Hunstad, episode sponsor Code42’s Deputy CISO. They discuss how classic ransomware protection such as offsite backups are no longer enough. They explain that Double Extortion means that you need to understand what data has been stolen and weigh the cost of paying with the cost of your data going public.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 17 Jul 2022 07:00:00 -0000</pubDate>
      <itunes:title>Cybercriminals shift tactics from disruption to data leaks. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>33</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this episode of CyberWire-X, we examine double extortion ransomware. The large-scale cyber events of yesterday – Stuxnet, the Ukraine Power Grid Attack – were primarily focused on disruption. Cybercriminals soon shifted to ransomware with disruption still the key focus – and then took things to the next level with Double Extortion Ransomware.
When ransomware first started to take off as the attack method of choice around 2015, the hacker playbook was focused on encrypting data, requesting payment and then handing over the encryption keys. Their methods escalated with Double Extortion, stealing data as well as encrypting it - and threatening to leak data if they don’t receive payment. We’ve seen with ransomware groups like Maze that they will follow through with publishing private information if not paid.
In the first part of the show, Rick Howard, the CyberWire’s CSO, Chief Analyst, and Senior Fellow, talks with Wayne Moore, Simply Business' CISO and CyberWire Hash Table member, and, in the second half of the show, the CyberWire's podcast host Dave Bittner talks with Nathan Hunstad, episode sponsor Code42’s Deputy CISO. They discuss how classic ransomware protection such as offsite backups are no longer enough. They explain that Double Extortion means that you need to understand what data has been stolen and weigh the cost of paying with the cost of your data going public.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this episode of CyberWire-X, we examine double extortion ransomware. The large-scale cyber events of yesterday – Stuxnet, the Ukraine Power Grid Attack – were primarily focused on disruption. Cybercriminals soon shifted to ransomware with disruption still the key focus – and then took things to the next level with Double Extortion Ransomware.</p><p>When ransomware first started to take off as the attack method of choice around 2015, the hacker playbook was focused on encrypting data, requesting payment and then handing over the encryption keys. Their methods escalated with Double Extortion, stealing data as well as encrypting it - and threatening to leak data if they don’t receive payment. We’ve seen with ransomware groups like Maze that they will follow through with publishing private information if not paid.</p><p>In the first part of the show, Rick Howard, the CyberWire’s CSO, Chief Analyst, and Senior Fellow, talks with Wayne Moore, Simply Business' CISO and CyberWire Hash Table member, and, in the second half of the show, the CyberWire's podcast host Dave Bittner talks with Nathan Hunstad, episode sponsor Code42’s Deputy CISO. They discuss how classic ransomware protection such as offsite backups are no longer enough. They explain that Double Extortion means that you need to understand what data has been stolen and weigh the cost of paying with the cost of your data going public.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1661</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6182c510-0471-11ed-874d-337dc87ba46a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2952715568.mp3?updated=1657833954" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A record breaking DDoS attack. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/241/notes</link>
      <description>Chad Seaman, Team Lead at Akamai SIRT joins Dave to discuss their research about a record-breaking DDoS Attack. The research says "A new reflection/amplification distributed denial-of-service (DDoS) vector with a record-breaking potential amplification ratio of 4,294,967,296:1 has been abused by attackers in the wild to launch multiple high-impact DDoS attacks."
Starting in mid-February 2022, security researchers, network operators, and security vendors noticed a spike in DDoS attacks. Researchers started to investigate the spike and determined that the devices that were being abused to launch these attacks are MiCollab and MiVoice Business Express collaboration systems. The research goes into how you can help mitigate the attacks and how Mitel has now released patched software.
The research can be found here:
CVE-2022-26143: TP240PhoneHome Reflection/Amplification DDoS Attack Vector

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Jul 2022 07:00:00 -0000</pubDate>
      <itunes:title>A record breaking DDoS attack. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>241</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Chad Seaman, Team Lead at Akamai SIRT joins Dave to discuss their research about a record-breaking DDoS Attack. The research says "A new reflection/amplification distributed denial-of-service (DDoS) vector with a record-breaking potential amplification ratio of 4,294,967,296:1 has been abused by attackers in the wild to launch multiple high-impact DDoS attacks."
Starting in mid-February 2022, security researchers, network operators, and security vendors noticed a spike in DDoS attacks. Researchers started to investigate the spike and determined that the devices that were being abused to launch these attacks are MiCollab and MiVoice Business Express collaboration systems. The research goes into how you can help mitigate the attacks and how Mitel has now released patched software.
The research can be found here:
CVE-2022-26143: TP240PhoneHome Reflection/Amplification DDoS Attack Vector

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chad Seaman, Team Lead at Akamai SIRT joins Dave to discuss their research about a record-breaking DDoS Attack. The research says "A new reflection/amplification distributed denial-of-service (DDoS) vector with a record-breaking potential amplification ratio of 4,294,967,296:1 has been abused by attackers in the wild to launch multiple high-impact DDoS attacks."</p><p>Starting in mid-February 2022, security researchers, network operators, and security vendors noticed a spike in DDoS attacks. Researchers started to investigate the spike and determined that the devices that were being abused to launch these attacks are MiCollab and MiVoice Business Express collaboration systems. The research goes into how you can help mitigate the attacks and how Mitel has now released patched software.</p><p>The research can be found here:</p><ul><li><a href="https://www.akamai.com/blog/security/phone-home-ddos-attack-vector">CVE-2022-26143: TP240PhoneHome Reflection/Amplification DDoS Attack Vector</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1485</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ec6707d0-045e-11ed-9650-f359aa6ab84d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3765537433.mp3?updated=1685127066" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Criminal gangs at war. A "cyber world war?" A new DPRK ransomware operation. Media organizations targeted by state actors. NSA guidance on characterizing threats and risks to microelectronics.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1620/notes</link>
      <description>Gangland goes to war. Is there a "cyber world war" in progress? Ukraine thinks so. A new North Korean ransomware operation is described, but it’s not yet clear if it’s a state operation or some moonlighting by Pyongyang’s operators. Media organizations remain attractive targets for state actors. NSA releases guidance on characterizing threats and risks to microelectronics. Betsy Carmelite from Booz Allen talks about why now is the time to plan for post-quantum cryptography. Our guest is Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly discussing her time at CISA and the work of her team. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/135

Selected reading.
Inside The Russian Cybergang Thought To Be Attacking Ukraine—The Trickbot Leaks (Forbes)
Who is Trickbot? (Cyjax)
Who is Trickbot? (Cyjax)
NATO and the European Union work together to counter cyber threats (NATO) 
The Man at the Center of the New Cyber World War (POLITICO)
Russian cyber threat to Canada worse than previously reported: CSE (National Post) 
North Korean threat actor targets small and midsize businesses with H0lyGh0st ransomware (Microsoft Security) 
Above the Fold and in Your Inbox: Tracing State-Aligned Activity Targeting Journalists, Media (Proofpoint)
NSA Publishes Guidance on Characterizing Threats, Risks to DoD Microelectronics (National Security Agency/Central Security Service)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 15 Jul 2022 20:15:00 -0000</pubDate>
      <itunes:title>Criminal gangs at war. A "cyber world war?" A new DPRK ransomware operation. Media organizations targeted by state actors. NSA guidance on characterizing threats and risks to microelectronics.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1620</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Gangland goes to war. Is there a "cyber world war" in progress? Ukraine thinks so. A new North Korean ransomware operation is described, but it’s not yet clear if it’s a state operation or some moonlighting by Pyongyang’s operators. Media organizations remain attractive targets for state actors. NSA releases guidance on characterizing threats and risks to microelectronics. Betsy Carmelite from Booz Allen talks about why now is the time to plan for post-quantum cryptography. Our guest is Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly discussing her time at CISA and the work of her team. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/135

Selected reading.
Inside The Russian Cybergang Thought To Be Attacking Ukraine—The Trickbot Leaks (Forbes)
Who is Trickbot? (Cyjax)
Who is Trickbot? (Cyjax)
NATO and the European Union work together to counter cyber threats (NATO) 
The Man at the Center of the New Cyber World War (POLITICO)
Russian cyber threat to Canada worse than previously reported: CSE (National Post) 
North Korean threat actor targets small and midsize businesses with H0lyGh0st ransomware (Microsoft Security) 
Above the Fold and in Your Inbox: Tracing State-Aligned Activity Targeting Journalists, Media (Proofpoint)
NSA Publishes Guidance on Characterizing Threats, Risks to DoD Microelectronics (National Security Agency/Central Security Service)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Gangland goes to war. Is there a "cyber world war" in progress? Ukraine thinks so. A new North Korean ransomware operation is described, but it’s not yet clear if it’s a state operation or some moonlighting by Pyongyang’s operators. Media organizations remain attractive targets for state actors. NSA releases guidance on characterizing threats and risks to microelectronics. Betsy Carmelite from Booz Allen talks about why now is the time to plan for post-quantum cryptography. Our guest is Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly discussing her time at CISA and the work of her team. </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/135</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.forbes.com/sites/daveywinder/2022/07/15/inside-the-russian-cybergang-thought-to-be-attacking-ukraine-the-trickbot-leaks/">Inside The Russian Cybergang Thought To Be Attacking Ukraine—The Trickbot Leaks</a> (Forbes)</p><p><a href="https://www.cyjax.com/2022/07/15/who-is-trickbot/">Who is Trickbot?</a> (Cyjax)</p><p><a href="https://www.cyjax.com/app/uploads/2022/07/Who-is-Trickbot.pdf">Who is Trickbot?</a> (Cyjax)</p><p><a href="https://www.nato.int/cps/en/natohq/news_197959.htm">NATO and the European Union work together to counter cyber threats</a> (NATO) </p><p><a href="https://www.politico.com/news/magazine/2022/07/14/russia-cyberattacks-ukraine-cybersecurity-00045486">The Man at the Center of the New Cyber World War</a> (POLITICO)</p><p><a href="https://nationalpost.com/news/politics/russian-cyber-threat-worse-than-previously-reported-cse">Russian cyber threat to Canada worse than previously reported: CSE</a> (National Post) </p><p><a href="https://www.microsoft.com/security/blog/2022/07/14/north-korean-threat-actor-targets-small-and-midsize-businesses-with-h0lygh0st-ransomware/">North Korean threat actor targets small and midsize businesses with H0lyGh0st ransomware</a> (Microsoft Security) </p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/above-fold-and-your-inbox-tracing-state-aligned-activity-targeting-journalists">Above the Fold and in Your Inbox: Tracing State-Aligned Activity Targeting Journalists, Media</a> (Proofpoint)</p><p><a href="https://www.nsa.gov/Press-Room/News-Highlights/Article/Article/3092566/nsa-publishes-guidance-on-characterizing-threats-risks-to-dod-microelectronics/">NSA Publishes Guidance on Characterizing Threats, Risks to DoD Microelectronics</a> (National Security Agency/Central Security Service)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2090</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ba1e022e-7881-11ec-90a9-db418c4105c9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7067525453.mp3?updated=1671817982" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A conversation with Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/44/notes</link>
      <description>In this extended interview, CyberWire Daily Podcast host Dave Bittner sits down with Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly to discuss her time at CISA and the work of her team. This interview from July 15, 2022 originally aired as a shortened version on the CyberWire Daily Podcast.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 15 Jul 2022 20:15:00 -0000</pubDate>
      <itunes:title>A conversation with Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly. [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>44</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this extended interview, CyberWire Daily Podcast host Dave Bittner sits down with Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly to discuss her time at CISA and the work of her team. This interview from July 15, 2022 originally aired as a shortened version on the CyberWire Daily Podcast.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this extended interview, CyberWire Daily Podcast host Dave Bittner sits down with Cybersecurity and Infrastructure Security Agency (CISA) Director Jen Easterly to discuss her time at CISA and the work of her team. This interview from July 15, 2022 originally aired as a shortened version on the CyberWire Daily Podcast.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1891</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f35e6206-0461-11ed-97b0-0bd4dd1857ad]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4009676922.mp3?updated=1662644507" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ukraine evaluates Russia’s cyber ops. Smartphones go to war. Lilith ransomware. ChromeLoader evolves. Rolling-PWN looks real after all. Schulte guilty in Vault 7 case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1619/notes</link>
      <description>An overview of the cyber phase of Russia's hybrid war. Smartphones as sources of targeting information. Lilith enters the ransomware game. ChromeLoader makes a fresh appearance. Honda acknowledges that Rolling-PWN is real (but says it's not as serious as some think). Part two of Carole Theriault’s conversation with Jen Caltrider from Mozilla's Privacy Not Included initiative. Our guest is Josh Yavor of Tessian to discuss Accidental Data Loss Over Email. A guilty verdict in the Vault 7 case.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/134

Selected reading.
Ukraine's Cyber Agency Reports Q2 Cyber-Attack Surge (Infosecurity Magazine)
2022 Q2 (SSSCIP)
The weaponizing of smartphone location data on the battlefield (Help Net Security) 
New Lilith ransomware emerges with extortion site, lists first victim (BleepingComputer) A new ransomware operation has been launched under the name 'Lilith,' and it has already posted its first victim on a data leak site created to support double-extortion attacks.
New Ransomware Groups on the Rise (Cyble) Cyble analyzes new ransomware families spotted in the wild led by notable examples such as LILITH, RedAlert, and 0Mega.
New Lilith ransomware emerges with extortion site, lists first victim (BleepingComputer)
New Ransomware Groups on the Rise (Cyble)
Researchers Uncover New Variants of the ChromeLoader Browser Hijacking Malware (The Hacker News)
ChromeLoader: New Stubborn Malware Campaign (Unit 42) 
Honda Admits Hackers Could Unlock Car Doors, Start Engines (SecurityWeek) Honda redesigning latest vehicles to address key fob vulnerabilities (The Record by Recorded Future) 
Statement Of U.S. Attorney Damian Williams On The Espionage Conviction Of Ex-CIA Programmer Joshua Adam Schulte (US Department of Justice) 
Ex-C.I.A. Engineer Convicted in Biggest Theft Ever of Agency Secrets (New York Times)
Former CIA Staffer Convicted For Massive Data Breach To WikiLeaks (Forbes)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 14 Jul 2022 20:45:00 -0000</pubDate>
      <itunes:title>Ukraine evaluates Russia’s cyber ops. Smartphones go to war. Lilith ransomware. ChromeLoader evolves. Rolling-PWN looks real after all. Schulte guilty in Vault 7 case.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1619</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An overview of the cyber phase of Russia's hybrid war. Smartphones as sources of targeting information. Lilith enters the ransomware game. ChromeLoader makes a fresh appearance. Honda acknowledges that Rolling-PWN is real (but says it's not as serious as some think). Part two of Carole Theriault’s conversation with Jen Caltrider from Mozilla's Privacy Not Included initiative. Our guest is Josh Yavor of Tessian to discuss Accidental Data Loss Over Email. A guilty verdict in the Vault 7 case.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/134

Selected reading.
Ukraine's Cyber Agency Reports Q2 Cyber-Attack Surge (Infosecurity Magazine)
2022 Q2 (SSSCIP)
The weaponizing of smartphone location data on the battlefield (Help Net Security) 
New Lilith ransomware emerges with extortion site, lists first victim (BleepingComputer) A new ransomware operation has been launched under the name 'Lilith,' and it has already posted its first victim on a data leak site created to support double-extortion attacks.
New Ransomware Groups on the Rise (Cyble) Cyble analyzes new ransomware families spotted in the wild led by notable examples such as LILITH, RedAlert, and 0Mega.
New Lilith ransomware emerges with extortion site, lists first victim (BleepingComputer)
New Ransomware Groups on the Rise (Cyble)
Researchers Uncover New Variants of the ChromeLoader Browser Hijacking Malware (The Hacker News)
ChromeLoader: New Stubborn Malware Campaign (Unit 42) 
Honda Admits Hackers Could Unlock Car Doors, Start Engines (SecurityWeek) Honda redesigning latest vehicles to address key fob vulnerabilities (The Record by Recorded Future) 
Statement Of U.S. Attorney Damian Williams On The Espionage Conviction Of Ex-CIA Programmer Joshua Adam Schulte (US Department of Justice) 
Ex-C.I.A. Engineer Convicted in Biggest Theft Ever of Agency Secrets (New York Times)
Former CIA Staffer Convicted For Massive Data Breach To WikiLeaks (Forbes)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An overview of the cyber phase of Russia's hybrid war. Smartphones as sources of targeting information. Lilith enters the ransomware game. ChromeLoader makes a fresh appearance. Honda acknowledges that Rolling-PWN is real (but says it's not as serious as some think). Part two of Carole Theriault’s conversation with Jen Caltrider from Mozilla's Privacy Not Included initiative. Our guest is Josh Yavor of Tessian to discuss Accidental Data Loss Over Email. A guilty verdict in the Vault 7 case.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/134</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.infosecurity-magazine.com/news/ukraine-cyber-agency-cyber-attack/">Ukraine's Cyber Agency Reports Q2 Cyber-Attack Surge </a>(Infosecurity Magazine)</p><p><a href="https://scpc.gov.ua/api/docs/19b0a96e-8c31-44bf-863e-cd3e0b651f21/19b0a96e-8c31-44bf-863e-cd3e0b651f21.pdf">2022 Q2</a> (SSSCIP)</p><p><a href="https://www.helpnetsecurity.com/2022/07/13/weaponizing-smartphone-location-data-battlefield/">The weaponizing of smartphone location data on the battlefield</a> (Help Net Security) </p><p><a href="https://www.bleepingcomputer.com/news/security/new-lilith-ransomware-emerges-with-extortion-site-lists-first-victim/">New Lilith ransomware emerges with extortion site, lists first victim</a> (BleepingComputer) A new ransomware operation has been launched under the name 'Lilith,' and it has already posted its first victim on a data leak site created to support double-extortion attacks.</p><p><a href="https://blog.cyble.com/2022/07/12/new-ransomware-groups-on-the-rise/">New Ransomware Groups on the Rise</a> (Cyble) Cyble analyzes new ransomware families spotted in the wild led by notable examples such as LILITH, RedAlert, and 0Mega.</p><p><a href="https://www.bleepingcomputer.com/news/security/new-lilith-ransomware-emerges-with-extortion-site-lists-first-victim/">New Lilith ransomware emerges with extortion site, lists first victim</a> (BleepingComputer)</p><p><a href="https://blog.cyble.com/2022/07/12/new-ransomware-groups-on-the-rise/">New Ransomware Groups on the Rise</a> (Cyble)</p><p><a href="https://thehackernews.com/2022/07/researchers-uncover-new-variants-of.html">Researchers Uncover New Variants of the ChromeLoader Browser Hijacking Malware</a> (The Hacker News)</p><p><a href="https://unit42.paloaltonetworks.com/chromeloader-malware/">ChromeLoader: New Stubborn Malware Campaign</a> (Unit 42) </p><p><a href="https://www.securityweek.com/honda-admits-hackers-could-unlock-car-doors-start-engines">Honda Admits Hackers Could Unlock Car Doors, Start Engines</a> (SecurityWeek) <a href="https://therecord.media/honda-redesigning-latest-vehicles-to-address-key-fob-vulnerabilities/">Honda redesigning latest vehicles to address key fob vulnerabilities</a> (The Record by Recorded Future) </p><p><a href="https://www.justice.gov/usao-sdny/pr/statement-us-attorney-damian-williams-espionage-conviction-ex-cia-programmer-joshua">Statement Of U.S. Attorney Damian Williams On The Espionage Conviction Of Ex-CIA Programmer Joshua Adam Schulte</a> (US Department of Justice) </p><p><a href="https://www.nytimes.com/2022/07/13/nyregion/cia-engineer-joshua-schulte-theft-convicted.html?partner=slack&amp;smid=sl-share">Ex-C.I.A. Engineer Convicted in Biggest Theft Ever of Agency Secrets</a> (New York Times)</p><p><a href="https://www.forbes.com/sites/joewalsh/2022/07/13/former-cia-staffer-convicted-for-massive-data-breach-to-wikileaks/?sh=4a294c227bb3">Former CIA Staffer Convicted For Massive Data Breach To WikiLeaks</a> (Forbes)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1791</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b9a08420-7881-11ec-90a9-437b6e31538c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1126716230.mp3?updated=1671817995" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AiTM sets up BEC. Silent validation bots. Smishing attempt at the European Central Bank. Shields up in Berlin. Hacktivism in a hybrid war. Patch notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1618/notes</link>
      <description>Adversary-in-the-middle sites support business email compromise. Silent validation carding bot discovered. Attempted social engineering at the European Central Bank. Germany puts its shields up. Carole Theriault speaks with Jen Caltrider about Mozilla's *Privacy Not Included initiative. Our guest is Lucia Milica on Proofpoint’s Voice of the CISO report. And Hacktivism in a hybrid war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/133

Selected reading.
From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud (Microsoft Security Blog) 
PerimeterX Discovers New Silent Validation Carding Bot (PerimeterX)
Hackers posing as Merkel target ECB's Lagarde - German source (Reuters) 
European Central Bank head targeted in hacking attempt (AP NEWS)
Cyberangriff auf Spitzenpolitiker: Hacker nutzten Merkels Handynummer, um das Whatsapp-Konto von Lagarde zu knacken (Business Insider)
Germany bolsters defenses against Russian cyber threats (Deutsche Welle) 
Ukraine's cyber army hits Russian cinemas (CyberNews)
DDoS attacks surge in popularity in Ukraine — but are they more than a cheap thrill? (The Record by Recorded Future)
Microsoft Releases July 2022 Security Updates (CISA)
CISA orders agencies to patch new Windows zero-day used in attacks (BleepingComputer)
SAP Releases July 2022 Security Updates (CISA)
Schneider Electric Easergy P5 and P3 (CISA)
Dahua ASI7213X-T1 (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 13 Jul 2022 20:20:00 -0000</pubDate>
      <itunes:title>AiTM sets up BEC. Silent validation bots. Smishing attempt at the European Central Bank. Shields up in Berlin. Hacktivism in a hybrid war. Patch notes.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1618</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Adversary-in-the-middle sites support business email compromise. Silent validation carding bot discovered. Attempted social engineering at the European Central Bank. Germany puts its shields up. Carole Theriault speaks with Jen Caltrider about Mozilla's *Privacy Not Included initiative. Our guest is Lucia Milica on Proofpoint’s Voice of the CISO report. And Hacktivism in a hybrid war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/133

Selected reading.
From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud (Microsoft Security Blog) 
PerimeterX Discovers New Silent Validation Carding Bot (PerimeterX)
Hackers posing as Merkel target ECB's Lagarde - German source (Reuters) 
European Central Bank head targeted in hacking attempt (AP NEWS)
Cyberangriff auf Spitzenpolitiker: Hacker nutzten Merkels Handynummer, um das Whatsapp-Konto von Lagarde zu knacken (Business Insider)
Germany bolsters defenses against Russian cyber threats (Deutsche Welle) 
Ukraine's cyber army hits Russian cinemas (CyberNews)
DDoS attacks surge in popularity in Ukraine — but are they more than a cheap thrill? (The Record by Recorded Future)
Microsoft Releases July 2022 Security Updates (CISA)
CISA orders agencies to patch new Windows zero-day used in attacks (BleepingComputer)
SAP Releases July 2022 Security Updates (CISA)
Schneider Electric Easergy P5 and P3 (CISA)
Dahua ASI7213X-T1 (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Adversary-in-the-middle sites support business email compromise. Silent validation carding bot discovered. Attempted social engineering at the European Central Bank. Germany puts its shields up. Carole Theriault speaks with Jen Caltrider about Mozilla's *Privacy Not Included initiative. Our guest is Lucia Milica on Proofpoint’s Voice of the CISO report. And Hacktivism in a hybrid war.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/133</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.microsoft.com/security/blog/2022/07/12/from-cookie-theft-to-bec-attackers-use-aitm-phishing-sites-as-entry-point-to-further-financial-fraud/">From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud</a> (Microsoft Security Blog) </p><p><a href="https://www.perimeterx.com/resources/blog/2022/perimeterx-discovers-new-silent-validation-carding-bot/">PerimeterX Discovers New Silent Validation Carding Bot</a> (PerimeterX)</p><p><a href="https://www.reuters.com/technology/ecbs-lagarde-is-targeted-cyber-attack-2022-07-12/">Hackers posing as Merkel target ECB's Lagarde - German source</a> (Reuters) </p><p><a href="https://apnews.com/article/technology-angela-merkel-european-central-bank-4cd599a7502d9617a401155abf054502">European Central Bank head targeted in hacking attempt</a> (AP NEWS)</p><p><a href="https://www.businessinsider.de/politik/deutschland/cyberangriff-auf-lagarde-hacker-nutzten-merkels-handynummer-a/">Cyberangriff auf Spitzenpolitiker: Hacker nutzten Merkels Handynummer, um das Whatsapp-Konto von Lagarde zu knacken</a> (Business Insider)</p><p><a href="https://www.dw.com/en/germany-bolsters-defenses-against-russian-cyber-threats/a-62442479">Germany bolsters defenses against Russian cyber threats</a> (Deutsche Welle) </p><p><a href="https://cybernews.com/cyber-war/ukraines-cyber-army-hits-russian-cinemas/">Ukraine's cyber army hits Russian cinemas</a> (CyberNews)</p><p><a href="https://therecord.media/ddos-attacks-surge-in-popularity-in-ukraine-but-are-they-more-than-a-cheap-thrill/">DDoS attacks surge in popularity in Ukraine — but are they more than a cheap thrill?</a> (The Record by Recorded Future)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/07/12/microsoft-releases-july-2022-security-updates">Microsoft Releases July 2022 Security Updates</a> (CISA)</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-orders-agencies-to-patch-new-windows-zero-day-used-in-attacks/">CISA orders agencies to patch new Windows zero-day used in attacks</a> (BleepingComputer)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/07/12/sap-releases-july-2022-security-updates">SAP Releases July 2022 Security Updates</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-055-03">Schneider Electric Easergy P5 and P3</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-193-01">Dahua ASI7213X-T1</a> (CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1620</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b904b702-7881-11ec-90a9-b77c43cc4b5b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8389374598.mp3?updated=1671817470" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>High-end and low-end extortion. Push to start–wait, not you…  Social media and open-source intelligence. Russian cyberattacks spread internationally. Preparing for cyber combat.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1617/notes</link>
      <description>High-end and low-end extortion. Vehicles from Honda may soon be rolling off the lot. Social media and open-source intelligence. Russian cyberattacks spread internationally. Joe Carrigan surveys items for sale in dark web markets. Our guest is Jonathan Wilson of AU10TIX to discuss consumer sentiment around data privacy. Preparing for cyber combat.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/132

Selected reading.
BlackCat (Aka ALPHV) Ransomware Is Increasing Stakes Up To $2,5M In Demands (Resecurity)
Ransomware gang now lets you search their stolen data (BleepingComputer)
Luna Moth: The Actors Behind the Recent False Subscription Scams (Sygnia)
'Luna Moth' Group Ransoms Data Without the Ransomware (Dark Reading)
Hackers can unlock Honda cars remotely in Rolling-PWN attacks (BleepingComputer)
Hackers Say They Can Unlock and Start Honda Cars Remotely (Vice)
Rolling PWN (PWN) 
Russia launches attack on Poland as hackers declare war on 10 countries, including UK (Express)
Vice Minister: cyber attacks are aimed at seeking publicity and raising tensions (DELFI)
How one Ukrainian ethical hacker is training 'cyber warriors' in the fight against Russia (The Record by Recorded Future)
The Biggest Threat to the Military May Not Be What You Think (ClearanceJobs)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Jul 2022 20:30:00 -0000</pubDate>
      <itunes:title>High-end and low-end extortion. Push to start–wait, not you…  Social media and open-source intelligence. Russian cyberattacks spread internationally. Preparing for cyber combat.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1617</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>High-end and low-end extortion. Vehicles from Honda may soon be rolling off the lot. Social media and open-source intelligence. Russian cyberattacks spread internationally. Joe Carrigan surveys items for sale in dark web markets. Our guest is Jonathan Wilson of AU10TIX to discuss consumer sentiment around data privacy. Preparing for cyber combat.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/132

Selected reading.
BlackCat (Aka ALPHV) Ransomware Is Increasing Stakes Up To $2,5M In Demands (Resecurity)
Ransomware gang now lets you search their stolen data (BleepingComputer)
Luna Moth: The Actors Behind the Recent False Subscription Scams (Sygnia)
'Luna Moth' Group Ransoms Data Without the Ransomware (Dark Reading)
Hackers can unlock Honda cars remotely in Rolling-PWN attacks (BleepingComputer)
Hackers Say They Can Unlock and Start Honda Cars Remotely (Vice)
Rolling PWN (PWN) 
Russia launches attack on Poland as hackers declare war on 10 countries, including UK (Express)
Vice Minister: cyber attacks are aimed at seeking publicity and raising tensions (DELFI)
How one Ukrainian ethical hacker is training 'cyber warriors' in the fight against Russia (The Record by Recorded Future)
The Biggest Threat to the Military May Not Be What You Think (ClearanceJobs)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>High-end and low-end extortion. Vehicles from Honda may soon be rolling off the lot. Social media and open-source intelligence. Russian cyberattacks spread internationally. Joe Carrigan surveys items for sale in dark web markets. Our guest is Jonathan Wilson of AU10TIX to discuss consumer sentiment around data privacy. Preparing for cyber combat.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/132</p><p><br></p><h2>Selected reading.</h2><p><a href="https://resecurity.com/blog/article/blackcat-aka-alphv-ransomware-is-increasing-stakes-up-to-25m-in-demands">BlackCat (Aka ALPHV) Ransomware Is Increasing Stakes Up To $2,5M In Demands</a> (Resecurity)</p><p><a href="https://www.bleepingcomputer.com/news/security/ransomware-gang-now-lets-you-search-their-stolen-data/">Ransomware gang now lets you search their stolen data</a> (BleepingComputer)</p><p><a href="https://blog.sygnia.co/luna-moth-false-subscription-scams">Luna Moth: The Actors Behind the Recent False Subscription Scams</a> (Sygnia)</p><p><a href="https://www.darkreading.com/threat-intelligence/-luna-moth-group-ransoms-data-without-the-ransomware">'Luna Moth' Group Ransoms Data Without the Ransomware</a> (Dark Reading)</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-can-unlock-honda-cars-remotely-in-rolling-pwn-attacks/">Hackers can unlock Honda cars remotely in Rolling-PWN attacks</a> (BleepingComputer)</p><p><a href="https://www.vice.com/en/article/z34xnw/hackers-say-they-can-unlock-and-start-honda-cars-remotely">Hackers Say They Can Unlock and Start Honda Cars Remotely</a> (Vice)</p><p><a href="https://rollingpwn.github.io/rolling-pwn/">Rolling PWN</a> (PWN) </p><p><a href="https://www.express.co.uk/news/science/1638740/russia-launches-cyberattack-poland-government-sites-shut-down-killnet-ukraine-war">Russia launches attack on Poland as hackers declare war on 10 countries, including UK</a> (Express)</p><p><a href="https://www.delfi.lt/en/politics/vice-minister-cyber-attacks-are-aimed-at-seeking-publicity-and-raising-tensions.d?id=90707753">Vice Minister: cyber attacks are aimed at seeking publicity and raising tensions</a> (DELFI)</p><p><a href="https://therecord.media/how-one-ukrainian-ethical-hacker-is-training-cyber-warriors-in-the-fight-against-russia/">How one Ukrainian ethical hacker is training 'cyber warriors' in the fight against Russia</a> (The Record by Recorded Future)</p><p><a href="https://news.clearancejobs.com/2022/07/11/the-biggest-threat-to-the-military-may-not-be-what-you-think/">The Biggest Threat to the Military May Not Be What You Think</a> (ClearanceJobs)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1677</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b8a65022-7881-11ec-90a9-9b099a0b8c37]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7886534329.mp3?updated=1671818372" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DDoS attacks strike countries friendly to Ukraine. Predatory Sparrow's assault on Iran's steel industry. Callback phishing impersonates security companies. Anubis is back. BlackCat ups the ante.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1616/notes</link>
      <description>More deniable DDoS attacks strike countries friendly to Ukraine. Predatory Sparrow's assault on Iran's steel industry. A callback phishing campaign impersonates security companies. The Anubis Network is back. Thomas Etheridge from CrowdStrike on the importance of outside threat hunting. Rick Howard weighs in on sentient AI. And a ransomware gang ups the ante.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/131

Selected reading.
Pro-Russian cybercriminals briefly DDoS Congress.gov (CyberScoop)
Lithuania's state-owned energy group hit by 'biggest cyber attack in a decade' (lrt.lt)
Ignitis Group hit by DDoS attack as Killnet continues Lithuania campaign (Tech Monitor)
Russian ‘Hacktivists’ Are Causing Trouble Far Beyond Ukraine (Wired - 07-11-2022) 
Predatory Sparrow: Who are the hackers who say they started a fire in Iran? (BBC News)
Hacktivists claiming attack on Iranian steel facilities dump tranche of 'top secret documents' (CyberScoop)
Callback Phishing Campaigns Impersonate CrowdStrike, Other Cybersecurity Companies (CrowdStrike)
Anubis Networks is back with new C2 server (Security Affairs)
BlackCat (aka ALPHV) ransomware is increasing stakes up to $2.5 million in demands(Help Net Security)
Resecurity - BlackCat (aka ALPHV) Ransomware is Increasing Stakes up to $2,5M in Demands (Resecurity)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 11 Jul 2022 20:15:00 -0000</pubDate>
      <itunes:title>DDoS attacks strike countries friendly to Ukraine. Predatory Sparrow's assault on Iran's steel industry. Callback phishing impersonates security companies. Anubis is back. BlackCat ups the ante.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1616</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>More deniable DDoS attacks strike countries friendly to Ukraine. Predatory Sparrow's assault on Iran's steel industry. A callback phishing campaign impersonates security companies. The Anubis Network is back. Thomas Etheridge from CrowdStrike on the importance of outside threat hunting. Rick Howard weighs in on sentient AI. And a ransomware gang ups the ante.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/131

Selected reading.
Pro-Russian cybercriminals briefly DDoS Congress.gov (CyberScoop)
Lithuania's state-owned energy group hit by 'biggest cyber attack in a decade' (lrt.lt)
Ignitis Group hit by DDoS attack as Killnet continues Lithuania campaign (Tech Monitor)
Russian ‘Hacktivists’ Are Causing Trouble Far Beyond Ukraine (Wired - 07-11-2022) 
Predatory Sparrow: Who are the hackers who say they started a fire in Iran? (BBC News)
Hacktivists claiming attack on Iranian steel facilities dump tranche of 'top secret documents' (CyberScoop)
Callback Phishing Campaigns Impersonate CrowdStrike, Other Cybersecurity Companies (CrowdStrike)
Anubis Networks is back with new C2 server (Security Affairs)
BlackCat (aka ALPHV) ransomware is increasing stakes up to $2.5 million in demands(Help Net Security)
Resecurity - BlackCat (aka ALPHV) Ransomware is Increasing Stakes up to $2,5M in Demands (Resecurity)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>More deniable DDoS attacks strike countries friendly to Ukraine. Predatory Sparrow's assault on Iran's steel industry. A callback phishing campaign impersonates security companies. The Anubis Network is back. Thomas Etheridge from CrowdStrike on the importance of outside threat hunting. Rick Howard weighs in on sentient AI. And a ransomware gang ups the ante.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/131</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cyberscoop.com/killnet-congress-ddos-russia-hacktivist/">Pro-Russian cybercriminals briefly DDoS Congress.gov</a> (CyberScoop)</p><p><a href="https://www.lrt.lt/en/news-in-english/19/1736266/lithuania-s-state-owned-energy-group-hit-by-biggest-cyber-attack-in-a-decade">Lithuania's state-owned energy group hit by 'biggest cyber attack in a decade'</a> (lrt.lt)</p><p><a href="https://techmonitor.ai/technology/cybersecurity/ignitis-ddos-attack-lithuania-killnet-russia">Ignitis Group hit by DDoS attack as Killnet continues Lithuania campaign</a> (Tech Monitor)</p><p><a href="https://www.wired.com/story/russia-hacking-xaknet-killnet/">Russian ‘Hacktivists’ Are Causing Trouble Far Beyond Ukraine</a> (Wired - 07-11-2022) </p><p><a href="https://www.bbc.com/news/technology-62072480">Predatory Sparrow: Who are the hackers who say they started a fire in Iran?</a> (BBC News)</p><p><a href="https://www.cyberscoop.com/gonjeshke-darande-israel-hackers-iran-steel-hacktivist/">Hacktivists claiming attack on Iranian steel facilities dump tranche of 'top secret documents'</a> (CyberScoop)</p><p><a href="https://www.crowdstrike.com/blog/callback-malware-campaigns-impersonate-crowdstrike-and-other-cybersecurity-companies/">Callback Phishing Campaigns Impersonate CrowdStrike, Other Cybersecurity Companies</a> (CrowdStrike)</p><p><a href="https://securityaffairs.co/wordpress/133115/hacking/anubis-networks-new-c2.html">Anubis Networks is back with new C2 server</a> (Security Affairs)</p><p><a href="https://www.helpnetsecurity.com/2022/07/11/blackcat-alphv-ransomware/">BlackCat (aka ALPHV) ransomware is increasing stakes up to $2.5 million in demands</a>(Help Net Security)</p><p><a href="https://resecurity.com/blog/article/blackcat-aka-alphv-ransomware-is-increasing-stakes-up-to-25m-in-demands">Resecurity - BlackCat (aka ALPHV) Ransomware is Increasing Stakes up to $2,5M in Demands</a> (Resecurity)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1581</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b80697b2-7881-11ec-90a9-17301e9eabad]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1366432697.mp3?updated=1671818385" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Simone Petrella: Fake it, until you make it. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/107/notes</link>
      <description>Simone Petrella, CEO of cybersecurity training workforce firm CyberVista, spent her career in the Department of Defense as a threat intelligence analyst before founding CyberVista. She says that running a company has a new set of challenges each day thrown at you. She explains that the way she finds the most success is by letting her team contribute to each matter, and having a say in the decisions made as they pertain to each department. Simone says "I would say is I am a firm firm believer in the idea of empowering people to really own and kind of run with the things that they're passionate about." She notes that people will do amazing things when they are passionate and that faking it until you make it is true, because you will get where you're going by having that passion and that inspiration. We thank Simone for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 10 Jul 2022 07:00:00 -0000</pubDate>
      <itunes:title>Simone Petrella: Fake it, until you make it. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>107</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Simone Petrella, CEO of cybersecurity training workforce firm CyberVista, spent her career in the Department of Defense as a threat intelligence analyst before founding CyberVista. She says that running a company has a new set of challenges each day thrown at you. She explains that the way she finds the most success is by letting her team contribute to each matter, and having a say in the decisions made as they pertain to each department. Simone says "I would say is I am a firm firm believer in the idea of empowering people to really own and kind of run with the things that they're passionate about." She notes that people will do amazing things when they are passionate and that faking it until you make it is true, because you will get where you're going by having that passion and that inspiration. We thank Simone for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Simone Petrella, CEO of cybersecurity training workforce firm CyberVista, spent her career in the Department of Defense as a threat intelligence analyst before founding CyberVista. She says that running a company has a new set of challenges each day thrown at you. She explains that the way she finds the most success is by letting her team contribute to each matter, and having a say in the decisions made as they pertain to each department. Simone says "I would say is I am a firm firm believer in the idea of empowering people to really own and kind of run with the things that they're passionate about." She notes that people will do amazing things when they are passionate and that faking it until you make it is true, because you will get where you're going by having that passion and that inspiration. We thank Simone for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>442</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b97607e0-f8ab-11ec-b6ce-df21b73320e1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3724481445.mp3?updated=1656617945" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Information operations during a war. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/240/notes</link>
      <description>Alden Wahlstrom, senior analyst on Mandiant's Information Operations Team, shares a comprehensive overview and analysis of the various information operations activities they’ve seen while responding to the Russian invasion. While the full extent of the Russia-Ukraine war has yet to come to light, more than two months after the start of the invasion, Mandiant has identified activity that they believed to be information operations campaigns conducted by actors possibly in support of the political interests of nation-states such as Russia, Belarus, China, and Iran.
The research shares a chart with all of the known information operations events that have taken place so far dating back to January of 2022. It also states that following the beginning of the Russian attack they have seen concerning signs, including "incidents involving the deployment of wiper malware disguised as ransomware."
The research can be found here:
The IO Offensive: Information Operations Surrounding the Russian Invasion of Ukraine

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Jul 2022 07:00:00 -0000</pubDate>
      <itunes:title>Information operations during a war. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>240</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Alden Wahlstrom, senior analyst on Mandiant's Information Operations Team, shares a comprehensive overview and analysis of the various information operations activities they’ve seen while responding to the Russian invasion. While the full extent of the Russia-Ukraine war has yet to come to light, more than two months after the start of the invasion, Mandiant has identified activity that they believed to be information operations campaigns conducted by actors possibly in support of the political interests of nation-states such as Russia, Belarus, China, and Iran.
The research shares a chart with all of the known information operations events that have taken place so far dating back to January of 2022. It also states that following the beginning of the Russian attack they have seen concerning signs, including "incidents involving the deployment of wiper malware disguised as ransomware."
The research can be found here:
The IO Offensive: Information Operations Surrounding the Russian Invasion of Ukraine

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Alden Wahlstrom, senior analyst on Mandiant's Information Operations Team, shares a comprehensive overview and analysis of the various information operations activities they’ve seen while responding to the Russian invasion. While the full extent of the Russia-Ukraine war has yet to come to light, more than two months after the start of the invasion, Mandiant has identified activity that they believed to be information operations campaigns conducted by actors possibly in support of the political interests of nation-states such as Russia, Belarus, China, and Iran.</p><p>The research shares a chart with all of the known information operations events that have taken place so far dating back to January of 2022. It also states that following the beginning of the Russian attack they have seen concerning signs, including "incidents involving the deployment of wiper malware disguised as ransomware."</p><p>The research can be found here:</p><ul><li><a href="https://www.mandiant.com/resources/information-operations-surrounding-ukraine">The IO Offensive: Information Operations Surrounding the Russian Invasion of Ukraine</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1150</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[61e0ed36-fee3-11ec-9a04-0b7e74b60c7a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7575307146.mp3?updated=1685127053" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An update on cyber operations in Russia’s hybrid war. NPM compromise updates. CISA releases ICS security advisories. Free ransomware decryptors released. Disneyland's Instagram account hijacked.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1615/notes</link>
      <description>An update on cyber operations in the hybrid war. NPM compromise updates. Free decryptors for AstraLocker and Yashma ransomware. Johannes Ullrich from SANS on attacks against Perimeter Security Devices. Our guest is Sonali Shah from Invicti Security with a look at DevSecOps anxiety. And who’s the villain who hijacked the Instagram account of Disneyland?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/130

Selected reading.
Russia-Ukraine war: List of key events, day 135 (Al Jazeera)
Russia-Ukraine war: Putin warns Moscow has 'barely started' its campaign (The Telegraph) 
Russian Cybercrime Trickbot Group is systematically attacking Ukraine (Security Affairs) 
US finance sector encouraged to stay vigilant against retaliatory Russian cyberattacks (SC Magazine) 
Someone may be prepping an NPM crypto-mining spree (Register) 
ICS CERT Advisories (CISA)
Free decryptor released for AstraLocker, Yashma ransomware victims (BleepingComputer) 
Disneyland’s Instagram Account Hacked With a Series of Profane, Racist Posts (Wall Street Journal)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 08 Jul 2022 20:15:00 -0000</pubDate>
      <itunes:title>An update on cyber operations in Russia’s hybrid war. NPM compromise updates. CISA releases ICS security advisories. Free ransomware decryptors released. Disneyland's Instagram account hijacked.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1615</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An update on cyber operations in the hybrid war. NPM compromise updates. Free decryptors for AstraLocker and Yashma ransomware. Johannes Ullrich from SANS on attacks against Perimeter Security Devices. Our guest is Sonali Shah from Invicti Security with a look at DevSecOps anxiety. And who’s the villain who hijacked the Instagram account of Disneyland?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/130

Selected reading.
Russia-Ukraine war: List of key events, day 135 (Al Jazeera)
Russia-Ukraine war: Putin warns Moscow has 'barely started' its campaign (The Telegraph) 
Russian Cybercrime Trickbot Group is systematically attacking Ukraine (Security Affairs) 
US finance sector encouraged to stay vigilant against retaliatory Russian cyberattacks (SC Magazine) 
Someone may be prepping an NPM crypto-mining spree (Register) 
ICS CERT Advisories (CISA)
Free decryptor released for AstraLocker, Yashma ransomware victims (BleepingComputer) 
Disneyland’s Instagram Account Hacked With a Series of Profane, Racist Posts (Wall Street Journal)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An update on cyber operations in the hybrid war. NPM compromise updates. Free decryptors for AstraLocker and Yashma ransomware. Johannes Ullrich from SANS on attacks against Perimeter Security Devices. Our guest is Sonali Shah from Invicti Security with a look at DevSecOps anxiety. And who’s the villain who hijacked the Instagram account of Disneyland?</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/130</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.aljazeera.com/news/2022/7/8/russia-ukraine-war-list-of-key-events-day-135">Russia-Ukraine war: List of key events, day 135</a> (Al Jazeera)</p><p><a href="https://www.telegraph.co.uk/world-news/2022/07/08/russia-ukraine-latest-war-news-putin-live-updates-nato/">Russia-Ukraine war: Putin warns Moscow has 'barely started' its campaign</a> (The Telegraph) </p><p><a href="https://securityaffairs.co/wordpress/132999/cyber-crime/trickbot-systematically-attacking-ukraine.html">Russian Cybercrime Trickbot Group is systematically attacking Ukraine</a> (Security Affairs) </p><p><a href="https://www.scmagazine.com/analysis/strategy/us-finance-sector-encouraged-to-stay-vigilant-against-retaliatory-russian-cyberattacks">US finance sector encouraged to stay vigilant against retaliatory Russian cyberattacks</a> (SC Magazine) </p><p><a href="https://www.theregister.com/2022/07/07/npm-cryptomining-attack/">Someone may be prepping an NPM crypto-mining spree</a> (Register) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories">ICS CERT Advisories</a> (CISA)</p><p><a href="https://www.bleepingcomputer.com/news/security/free-decryptor-released-for-astralocker-yashma-ransomware-victims/">Free decryptor released for AstraLocker, Yashma ransomware victims</a> (BleepingComputer) </p><p><a href="https://www.wsj.com/articles/disneylands-instagram-account-hacked-with-a-series-of-profane-racist-posts-11657213488">Disneyland’s Instagram Account Hacked With a Series of Profane, Racist Posts</a> (Wall Street Journal)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1609</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b9fee920-7881-11ec-90a9-876cd92b8c45]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3173266085.mp3?updated=1671818394" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chinese industrial espionage warning. Trickbot's privateering. Russian influence ops target NATO resolve. Cozy Bear sighting. Chinese APTs target Russia. NFT scams are pestering Ukraine.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1614/notes</link>
      <description>The FBI and MI-5 warn of Chinese industrial espionage. Revelations of Trickbot's privateering role. Russian influence operations target France, Germany, Poland, and Turkey. Chinese APTs target Russian organizations in a cyberespionage effort. Robert M. Lee from Dragos on CISA expanding the Joint Cyber Defense Collaborative. Ben Yelin speaks with Matt Kent from Public Citizen about the American Innovation and Online Choice Act. And who would guess it, but NFT scams are pestering Ukraine.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/129

Selected reading.
Heads of FBI, MI5 Issue Joint Warning on Chinese Spying (Wall Street Journal) 
FBI and MI5 leaders give unprecedented joint warning on Chinese spying (the Guardian)
FBI and MI5 bosses: China cheats and steals at massive scale (Register)
FBI director suggests China bracing for sanctions if it invades Taiwan (Washington Post) 
Unprecedented Shift: The Trickbot Group is Systematically Attacking Ukraine (Security Intelligence)
Trickbot may be carrying water for Russia (Washington Post)
Russia Info Ops Home In on Perceived Weak Links (VOA)
Targets of Interest | Russian Organizations Increasingly Under Attack By Chinese APTs (SentinelOne)
Chinese hackers targeting Russian government, telecoms: report (The Record by Recorded Future)
Near-undetectable malware linked to Russia's Cozy Bear (Register)
Russia's Cozy Bear linked to nearly undetectable malware (Computing)
When Pentest Tools Go Brutal: Red-Teaming Tool Being Abused by Malicious Actors (Unit 42) 
NFT scammers see an opportunity in Ukraine donations (The Record by Recorded Future)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 07 Jul 2022 20:15:00 -0000</pubDate>
      <itunes:title>Chinese industrial espionage warning. Trickbot's privateering. Russian influence ops target NATO resolve. Cozy Bear sighting. Chinese APTs target Russia. NFT scams are pestering Ukraine.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1614</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The FBI and MI-5 warn of Chinese industrial espionage. Revelations of Trickbot's privateering role. Russian influence operations target France, Germany, Poland, and Turkey. Chinese APTs target Russian organizations in a cyberespionage effort. Robert M. Lee from Dragos on CISA expanding the Joint Cyber Defense Collaborative. Ben Yelin speaks with Matt Kent from Public Citizen about the American Innovation and Online Choice Act. And who would guess it, but NFT scams are pestering Ukraine.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/129

Selected reading.
Heads of FBI, MI5 Issue Joint Warning on Chinese Spying (Wall Street Journal) 
FBI and MI5 leaders give unprecedented joint warning on Chinese spying (the Guardian)
FBI and MI5 bosses: China cheats and steals at massive scale (Register)
FBI director suggests China bracing for sanctions if it invades Taiwan (Washington Post) 
Unprecedented Shift: The Trickbot Group is Systematically Attacking Ukraine (Security Intelligence)
Trickbot may be carrying water for Russia (Washington Post)
Russia Info Ops Home In on Perceived Weak Links (VOA)
Targets of Interest | Russian Organizations Increasingly Under Attack By Chinese APTs (SentinelOne)
Chinese hackers targeting Russian government, telecoms: report (The Record by Recorded Future)
Near-undetectable malware linked to Russia's Cozy Bear (Register)
Russia's Cozy Bear linked to nearly undetectable malware (Computing)
When Pentest Tools Go Brutal: Red-Teaming Tool Being Abused by Malicious Actors (Unit 42) 
NFT scammers see an opportunity in Ukraine donations (The Record by Recorded Future)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FBI and MI-5 warn of Chinese industrial espionage. Revelations of Trickbot's privateering role. Russian influence operations target France, Germany, Poland, and Turkey. Chinese APTs target Russian organizations in a cyberespionage effort. Robert M. Lee from Dragos on CISA expanding the Joint Cyber Defense Collaborative. Ben Yelin speaks with Matt Kent from Public Citizen about the American Innovation and Online Choice Act. And who would guess it, but NFT scams are pestering Ukraine.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/129</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.wsj.com/articles/heads-of-fbi-mi5-issue-joint-warning-on-chinese-spying-11657123280">Heads of FBI, MI5 Issue Joint Warning on Chinese Spying</a> (Wall Street Journal) </p><p><a href="https://www.theguardian.com/world/2022/jul/06/fbi-mi5-china-spying-cyberattacks-business-economy">FBI and MI5 leaders give unprecedented joint warning on Chinese spying</a> (the Guardian)</p><p><a href="https://www.theregister.com/2022/07/07/fbi_and_mi5_china_warning/">FBI and MI5 bosses: China cheats and steals at massive scale</a> (Register)</p><p><a href="https://www.washingtonpost.com/national-security/2022/07/06/china-taiwan-fbi-wray-sanctions/">FBI director suggests China bracing for sanctions if it invades Taiwan</a> (Washington Post) </p><p><a href="https://securityintelligence.com/posts/trickbot-group-systematically-attacking-ukraine/">Unprecedented Shift: The Trickbot Group is Systematically Attacking Ukraine</a> (Security Intelligence)</p><p><a href="https://www.washingtonpost.com/politics/2022/07/07/trickbot-may-be-carrying-water-russia/">Trickbot may be carrying water for Russia</a> (Washington Post)</p><p><a href="https://www.voanews.com/a/russia-info-ops-home-in-on-perceived-weak-links/6648581.html">Russia Info Ops Home In on Perceived Weak Links</a> (VOA)</p><p><a href="https://www.sentinelone.com/labs/targets-of-interest-russian-organizations-increasingly-under-attack-by-chinese-apts/">Targets of Interest | Russian Organizations Increasingly Under Attack By Chinese APTs</a> (SentinelOne)</p><p><a href="https://therecord.media/chinese-hackers-targeting-russian-government-telecoms-report/">Chinese hackers targeting Russian government, telecoms: report</a> (The Record by Recorded Future)</p><p><a href="https://www.theregister.com/2022/07/06/brc4_state_sponsored_apt29/">Near-undetectable malware linked to Russia's Cozy Bear</a> (Register)</p><p><a href="https://www.computing.co.uk/news/4052566/russias-cozy-bear-linked-nearly-undetectable-malware">Russia's Cozy Bear linked to nearly undetectable malware </a>(Computing)</p><p><a href="https://unit42.paloaltonetworks.com/brute-ratel-c4-tool/#Conclusion">When Pentest Tools Go Brutal: Red-Teaming Tool Being Abused by Malicious Actors</a> (Unit 42) </p><p><a href="https://therecord.media/nft-scammers-see-an-opportunity-in-ukraine-donations/">NFT scammers see an opportunity in Ukraine donations</a> (The Record by Recorded Future)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1896</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b9bfdc58-7881-11ec-90a9-73908042c6c3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2934563770.mp3?updated=1671818437" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA22-187A – North Korean state-sponsored cyber actors use Maui ransomware to target the healthcare and public health sector. [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/24/notes</link>
      <description>The FBI, CISA, and the Department of the Treasury are releasing this joint Cybersecurity Advisory to provide information on Maui ransomware, which has been used by North Korean state-sponsored cyber actors since at least May 2021 to target Healthcare and Public Health Sector organizations.
AA22-187A Alert, Technical Details, and Mitigations
Stairwell Threat Report: Maui Ransomware
North Korea Cyber Threat Overview and Advisories
Updated Advisory on Potential Sanctions Risks for Facilitating Ransomware Payments
National Conference of State Legislatures: Security Breach Notification Laws
Health Breach Notification Rule
Protecting Sensitive and Personal Information from Ransomware-Caused Data Breaches
StopRansomware.gov
CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide

All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 06 Jul 2022 21:35:00 -0000</pubDate>
      <itunes:title>CISA Alert AA22-187A – North Korean state-sponsored cyber actors use Maui ransomware to target the healthcare and public health sector. [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>24</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The FBI, CISA, and the Department of the Treasury are releasing this joint Cybersecurity Advisory to provide information on Maui ransomware, which has been used by North Korean state-sponsored cyber actors since at least May 2021 to target Healthcare and Public Health Sector organizations.
AA22-187A Alert, Technical Details, and Mitigations
Stairwell Threat Report: Maui Ransomware
North Korea Cyber Threat Overview and Advisories
Updated Advisory on Potential Sanctions Risks for Facilitating Ransomware Payments
National Conference of State Legislatures: Security Breach Notification Laws
Health Breach Notification Rule
Protecting Sensitive and Personal Information from Ransomware-Caused Data Breaches
StopRansomware.gov
CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide

All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FBI, CISA, and the Department of the Treasury are releasing this joint Cybersecurity Advisory to provide information on Maui ransomware, which has been used by North Korean state-sponsored cyber actors since at least May 2021 to target Healthcare and Public Health Sector organizations.</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-187a">AA22-187A Alert, Technical Details, and Mitigations</a></p><p><a href="https://stairwell.com/news/threat-research-report-maui-ransomware/">Stairwell Threat Report: Maui Ransomware</a></p><p><a href="https://www.cisa.gov/uscert/northkorea">North Korea Cyber Threat Overview and Advisories</a></p><p><a href="https://home.treasury.gov/system/files/126/ofac_ransomware_advisory.pdf">Updated Advisory on Potential Sanctions Risks for Facilitating Ransomware Payments</a></p><p><a href="https://www.ncsl.org/research/telecommunications-and-information-technology/security-breach-notification-laws.aspx">National Conference of State Legislatures: Security Breach Notification Laws</a></p><p><a href="https://www.ftc.gov/legal-library/browse/rules/health-breach-notification-rule">Health Breach Notification Rule</a></p><p><a href="https://www.cisa.gov/sites/default/files/publications/CISA_Fact_Sheet-Protecting_Sensitive_and_Personal_Information_from_Ransomware-Caused_Data_Breaches-508C.pdf">Protecting Sensitive and Personal Information from Ransomware-Caused Data Breaches</a></p><p><a href="https://www.cisa.gov/stopransomware/">StopRansomware.gov</a></p><p><a href="https://www.cisa.gov/sites/default/files/publications/CISA_MS-ISAC_Ransomware%20Guide_S508C.pdf">CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide</a></p><p><br></p><p>All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at <a href="mailto:central@cisa.dhs.gov">central@cisa.dhs.gov</a> or (888) 282-0870 and to the FBI via your <a href="https://www.fbi.gov/contact-us/field-offices">local FBI field office</a> or the FBI’s 24/7 CyWatch at (855) 292-3937 or <a href="mailto:CyWatch@fbi.gov">CyWatch@fbi.gov</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>178</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dd0b8a3c-fd73-11ec-9d0c-233157728ea7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7165288815.mp3?updated=1657134845" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Quantum computing and security standards. Cyber war, and the persistence of cybercrime. DPRK ransomware versus healthcare. Cyber incidents and credit, in Shanghai and elsewhere.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1613/notes</link>
      <description>Quantum computing and security standards. Notes on the cyber phases of a hybrid war, and how depressingly conventional cybercrime persists in wartime. Pyongyang operators are using Maui ransomware against healthcare targets. Malek Ben Salem from Accenture looks at the security risks of GPS. Our guest is Brian Kenyon of Island to discuss enterprise browser security. Shanghai's big data exposure.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/128

Selected reading.
NIST Announces First Four Quantum-Resistant Cryptographic Algorithms (NIST)
Winners of NIST's post-quantum cryptography competition announced (Computing) 
NIST unveils four algorithms that will underpin new 'quantum-proof' cryptography standards (SC magazine) 
NIST Identifies 4 Quantum-Resistant Encryption Algorithms (Nextgov.com)
Prepare for a New Cryptographic Standard to Protect Against Future Quantum-Based Threats (CISA)
Quantum-resistant encryption recommended for standardization (Register)
Keeping Phones Running in Wartime Pushes Kyivstar to the Limit (Bloomberg)
The Ukraine war could provide a cyberwarfare manual for Chinese generals eyeing Taiwan (CyberScoop)
Ukrainian police takes down phishing gang behind payments scam (ZDNet)
Cyber Police of Ukraine arrested 9 men behind phishing attacks on Ukrainians attempting to capitalize on the ongoing conflict (Security Affairs) 
North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public Health Sector (CISA) 
Reports (Moody’s)
Clarion Housing ‘cyber incident’ affects thousands of tenants (Cambs Times) 
In a big potential breach, a hacker offers to sell a Chinese police database. (New York Times)
Nearly one billion people in China had their personal data leaked, and it's been online for more than a year (CNN) 
China data breach likely to fuel identity fraud, smishing attacks (ZDNet) 
China Tries to Censor What Could Be Biggest Data Hack in History (Gizmodo) 
Here are four big questions about the massive Shanghai police leak (Washington Post)
Shanghai Data Breach Exposes Dangers of China’s Trove (Bloomberg)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 06 Jul 2022 20:15:00 -0000</pubDate>
      <itunes:title>Quantum computing and security standards. Cyber war, and the persistence of cybercrime. DPRK ransomware versus healthcare. Cyber incidents and credit, in Shanghai and elsewhere.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1613</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Quantum computing and security standards. Notes on the cyber phases of a hybrid war, and how depressingly conventional cybercrime persists in wartime. Pyongyang operators are using Maui ransomware against healthcare targets. Malek Ben Salem from Accenture looks at the security risks of GPS. Our guest is Brian Kenyon of Island to discuss enterprise browser security. Shanghai's big data exposure.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/128

Selected reading.
NIST Announces First Four Quantum-Resistant Cryptographic Algorithms (NIST)
Winners of NIST's post-quantum cryptography competition announced (Computing) 
NIST unveils four algorithms that will underpin new 'quantum-proof' cryptography standards (SC magazine) 
NIST Identifies 4 Quantum-Resistant Encryption Algorithms (Nextgov.com)
Prepare for a New Cryptographic Standard to Protect Against Future Quantum-Based Threats (CISA)
Quantum-resistant encryption recommended for standardization (Register)
Keeping Phones Running in Wartime Pushes Kyivstar to the Limit (Bloomberg)
The Ukraine war could provide a cyberwarfare manual for Chinese generals eyeing Taiwan (CyberScoop)
Ukrainian police takes down phishing gang behind payments scam (ZDNet)
Cyber Police of Ukraine arrested 9 men behind phishing attacks on Ukrainians attempting to capitalize on the ongoing conflict (Security Affairs) 
North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public Health Sector (CISA) 
Reports (Moody’s)
Clarion Housing ‘cyber incident’ affects thousands of tenants (Cambs Times) 
In a big potential breach, a hacker offers to sell a Chinese police database. (New York Times)
Nearly one billion people in China had their personal data leaked, and it's been online for more than a year (CNN) 
China data breach likely to fuel identity fraud, smishing attacks (ZDNet) 
China Tries to Censor What Could Be Biggest Data Hack in History (Gizmodo) 
Here are four big questions about the massive Shanghai police leak (Washington Post)
Shanghai Data Breach Exposes Dangers of China’s Trove (Bloomberg)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Quantum computing and security standards. Notes on the cyber phases of a hybrid war, and how depressingly conventional cybercrime persists in wartime. Pyongyang operators are using Maui ransomware against healthcare targets. Malek Ben Salem from Accenture looks at the security risks of GPS. Our guest is Brian Kenyon of Island to discuss enterprise browser security. Shanghai's big data exposure<strong>.</strong></p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/128</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-algorithms">NIST Announces First Four Quantum-Resistant Cryptographic Algorithms</a> (NIST)</p><p><a href="https://www.computing.co.uk/news/4052463/winners-nists-post-quantum-cryptography-competition-announced">Winners of NIST's post-quantum cryptography competition announced </a>(Computing) </p><p><a href="https://www.scmagazine.com/analysis/emerging-technology/nist-unveils-four-algorithms-that-will-underpin-new-quantum-proof-cryptography-standards">NIST unveils four algorithms that will underpin new 'quantum-proof' cryptography standards</a> (SC magazine) </p><p><a href="https://www.nextgov.com/cybersecurity/2022/07/nist-identifies-four-quantum-resistant-encryption-algorithms/368954/">NIST Identifies 4 Quantum-Resistant Encryption Algorithms</a> (Nextgov.com)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/07/05/prepare-new-cryptographic-standard-protect-against-future-quantum">Prepare for a New Cryptographic Standard to Protect Against Future Quantum-Based Threats</a> (CISA)</p><p><a href="https://www.theregister.com/2022/07/05/us_nist_quantum_algorithms/">Quantum-resistant encryption recommended for standardization</a> (Register)</p><p><a href="https://www.bloomberg.com/news/articles/2022-07-04/keeping-phones-running-in-wartime-pushes-kyivstar-to-the-limit">Keeping Phones Running in Wartime Pushes Kyivstar to the Limit</a> (Bloomberg)</p><p><a href="https://www.cyberscoop.com/china-taiwan-russia-ukraine-cyberspace/">The Ukraine war could provide a cyberwarfare manual for Chinese generals eyeing Taiwan</a> (CyberScoop)</p><p><a href="https://www.zdnet.com/article/ukrainian-police-takes-down-phishing-gang-behind-payments-scam/">Ukrainian police takes down phishing gang behind payments scam</a> (ZDNet)</p><p><a href="https://securityaffairs.co/wordpress/132891/cyber-crime/cyber-police-of-ukraine-phishing.html">Cyber Police of Ukraine arrested 9 men behind phishing attacks on Ukrainians attempting to capitalize on the ongoing conflict</a> (Security Affairs) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/07/06/north-korean-state-sponsored-cyber-actors-use-maui-ransomware">North Korean State-Sponsored Cyber Actors Use Maui Ransomware to Target the Healthcare and Public Health Sector</a> (CISA) </p><p><a href="https://www.moodys.com/">Reports</a> (Moody’s)</p><p><a href="https://www.cambstimes.co.uk/news/housing/cyber-incident-hits-clarion-housing-9106940">Clarion Housing ‘cyber incident’ affects thousands of tenants</a> (Cambs Times) </p><p><a href="https://www.nytimes.com/2022/07/05/business/china-police-data-breach.html">In a big potential breach, a hacker offers to sell a Chinese police database.</a> (New York Times)</p><p><a href="https://www.cnn.com/2022/07/05/china/china-billion-people-data-leak-intl-hnk/index.html">Nearly one billion people in China had their personal data leaked, and it's been online for more than a year </a>(CNN) </p><p><a href="https://www.zdnet.com/article/china-data-breach-likely-to-fuel-identity-fraud-smishing-attacks/#ftag=RSSbaffb68">China data breach likely to fuel identity fraud, smishing attacks</a> (ZDNet) </p><p><a href="https://gizmodo.com/chinadan-hacker-shanghai-police-database-china-1849142152">China Tries to Censor What Could Be Biggest Data Hack in History</a> (Gizmodo) </p><p><a href="https://www.washingtonpost.com/politics/2022/07/06/here-are-four-big-questions-about-massive-shanghai-police-leak/">Here are four big questions about the massive Shanghai police leak</a> (Washington Post)</p><p><a href="https://www.bloomberg.com/news/articles/2022-07-05/hacker-s-record-theft-claim-exposes-dangers-of-china-data-trove?utm_source=google&amp;utm_medium=bd&amp;cmpId=google">Shanghai Data Breach Exposes Dangers of China’s Trove</a> (Bloomberg)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1771</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b8e50876-7881-11ec-90a9-338bd837e55f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1888093620.mp3?updated=1671818446" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberattack hits Ukrainian energy provider. NCSC updates its guidance on preparing for a long-term Russian cyber campaign. Hacktivists, scammers, misconfigurations, and rogue insiders.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1612/notes</link>
      <description>Cyberattack hits a Ukrainian energy provider. NCSC updates its guidance on preparing for a long-term Russian cyber campaign. Royal Army accounts are hijacked. A hacktivist group claims to have hit Iranian sites. A very very large database of PII is for sale on the dark web. Chase Snyder from ExtraHop has a look back at WannaCry, 5 years on. Ben Yelin examines the constitutionality of keyword search warrants. And a rogue employee makes off with bug reports.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/127

Selected reading.
Russian hackers allegedly target Ukraine's biggest private energy firm (CNN)
Proruskí hackeri opäť útočili. Ďalšia významná spoločnosť hlási, že čelila kybernetickým útokom (Vosveteit.sk)
Preparing for the long haul: the cyber threat from Russia (NCSC)
Official British Army Twitter and YouTube accounts hijacked by NFT scammers (Hot for Security)
British army confirms breach of its Twitter and YouTube accounts (the Guardian) 
British Army hit by cyberattack as Twitter and YouTube accounts hacked (The Telegraph) 
Iranians' Remote Access to Banking Services Cut Off Over 'Cyber Attacks' (IranWire) 
(Video) Iranian regime’s Islamic Culture and Communications Organization targeted in massive cyber offensive (EIN News)
Hackers Claim Theft of Police Info in China’s Largest Data Leak (Bloomberg) 
Hacker Selling Shanghai Police Database with Billions of Chinese Citizens Data (HackRead)
Giant data breach? Leaked personal data of one billion people has been spotted for sale on the dark web (ZDNet) 
Hacker claims to have stolen 1 bln records of Chinese citizens from police (Reuters) 
HackerOne disclosed on HackerOne: June 2022 Incident Report (HackerOne) 
HackerOne Employee Caught Stealing Vulnerability Reports for Personal Gains (The Hacker News)
Rogue HackerOne employee steals bug reports to sell on the side (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Jul 2022 20:15:00 -0000</pubDate>
      <itunes:title>Cyberattack hits Ukrainian energy provider. NCSC updates its guidance on preparing for a long-term Russian cyber campaign. Hacktivists, scammers, misconfigurations, and rogue insiders.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1612</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cyberattack hits a Ukrainian energy provider. NCSC updates its guidance on preparing for a long-term Russian cyber campaign. Royal Army accounts are hijacked. A hacktivist group claims to have hit Iranian sites. A very very large database of PII is for sale on the dark web. Chase Snyder from ExtraHop has a look back at WannaCry, 5 years on. Ben Yelin examines the constitutionality of keyword search warrants. And a rogue employee makes off with bug reports.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/127

Selected reading.
Russian hackers allegedly target Ukraine's biggest private energy firm (CNN)
Proruskí hackeri opäť útočili. Ďalšia významná spoločnosť hlási, že čelila kybernetickým útokom (Vosveteit.sk)
Preparing for the long haul: the cyber threat from Russia (NCSC)
Official British Army Twitter and YouTube accounts hijacked by NFT scammers (Hot for Security)
British army confirms breach of its Twitter and YouTube accounts (the Guardian) 
British Army hit by cyberattack as Twitter and YouTube accounts hacked (The Telegraph) 
Iranians' Remote Access to Banking Services Cut Off Over 'Cyber Attacks' (IranWire) 
(Video) Iranian regime’s Islamic Culture and Communications Organization targeted in massive cyber offensive (EIN News)
Hackers Claim Theft of Police Info in China’s Largest Data Leak (Bloomberg) 
Hacker Selling Shanghai Police Database with Billions of Chinese Citizens Data (HackRead)
Giant data breach? Leaked personal data of one billion people has been spotted for sale on the dark web (ZDNet) 
Hacker claims to have stolen 1 bln records of Chinese citizens from police (Reuters) 
HackerOne disclosed on HackerOne: June 2022 Incident Report (HackerOne) 
HackerOne Employee Caught Stealing Vulnerability Reports for Personal Gains (The Hacker News)
Rogue HackerOne employee steals bug reports to sell on the side (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyberattack hits a Ukrainian energy provider. NCSC updates its guidance on preparing for a long-term Russian cyber campaign. Royal Army accounts are hijacked. A hacktivist group claims to have hit Iranian sites. A very very large database of PII is for sale on the dark web. Chase Snyder from ExtraHop has a look back at WannaCry, 5 years on. Ben Yelin examines the constitutionality of keyword search warrants. And a rogue employee makes off with bug reports.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/127</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cnn.com/2022/07/01/politics/russia-ukraine-dtek-hack/index.html">Russian hackers allegedly target Ukraine's biggest private energy firm</a> (CNN)</p><p><a href="https://vosveteit.zoznam.sk/proruski-hackeri-opat-utocili-dalsia-vyznamna-spolocnost-hlasi-ze-celila-kybernetickym-utokom/">Proruskí hackeri opäť útočili. Ďalšia významná spoločnosť hlási, že čelila kybernetickým útokom</a> (Vosveteit.sk)</p><p><a href="https://www.ncsc.gov.uk/blog-post/preparing-the-long-haul-the-cyber-threat-from-russia">Preparing for the long haul: the cyber threat from Russia</a> (NCSC)</p><p><a href="https://www.bitdefender.com/blog/hotforsecurity/official-british-army-twitter-and-youtube-accounts-hijacked-by-nft-scammers/">Official British Army Twitter and YouTube accounts hijacked by NFT scammers</a> (Hot for Security)</p><p><a href="https://www.theguardian.com/uk-news/2022/jul/03/british-army-confirms-breach-of-its-twitter-and-youtube-accounts">British army confirms breach of its Twitter and YouTube accounts</a> (the Guardian) </p><p><a href="https://www.telegraph.co.uk/news/2022/07/03/british-army-hit-cyberattack-twitter-youtube-accounts-hacked/">British Army hit by cyberattack as Twitter and YouTube accounts hacked</a> (The Telegraph) </p><p><a href="https://iranwire.com/en/technology/105415-iranians-remote-access-to-banking-services-cut-off-over-cyber-attacks">Iranians' Remote Access to Banking Services Cut Off Over 'Cyber Attacks'</a> (IranWire) </p><p><a href="https://www.einnews.com/pr_news/579593407/video-iranian-regime-s-islamic-culture-and-communications-organization-targeted-in-massive-cyber-offensive">(Video) Iranian regime’s Islamic Culture and Communications Organization targeted in massive cyber offensive</a> (EIN News)</p><p><a href="https://www.bloomberg.com/news/articles/2022-07-04/hackers-claim-theft-of-police-info-in-china-s-largest-data-leak">Hackers Claim Theft of Police Info in China’s Largest Data Leak</a> (Bloomberg) </p><p><a href="https://www.hackread.com/hacker-selling-stolen-shanghai-national-police-database/">Hacker Selling Shanghai Police Database with Billions of Chinese Citizens Data</a> (HackRead)</p><p><a href="https://www.zdnet.com/article/giant-data-breach-leaked-personal-data-of-one-billion-people-has-been-spotted-for-sale-on-the-dark-web/">Giant data breach? Leaked personal data of one billion people has been spotted for sale on the dark web</a> (ZDNet) </p><p><a href="https://www.reuters.com/world/china/hacker-claims-have-stolen-1-bln-records-chinese-citizens-police-2022-07-04/">Hacker claims to have stolen 1 bln records of Chinese citizens from police</a> (Reuters) </p><p><a href="https://hackerone.com/reports/1622449">HackerOne disclosed on HackerOne: June 2022 Incident Report</a> (HackerOne) </p><p><a href="https://thehackernews.com/2022/07/hackerone-employee-caught-stealing.html">HackerOne Employee Caught Stealing Vulnerability Reports for Personal Gains</a> (The Hacker News)</p><p><a href="https://www.bleepingcomputer.com/news/security/rogue-hackerone-employee-steals-bug-reports-to-sell-on-the-side/">Rogue HackerOne employee steals bug reports to sell on the side</a> (BleepingComputer)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1777</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b8c592e8-7881-11ec-90a9-af86828d04e9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3027427711.mp3?updated=1671818456" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patrick Morley: Former Carbon Black CEO [Cyber CEOs Decoded]</title>
      <link>https://thecyberwire.com/podcasts/cyber-ceos-decoded/2/notes</link>
      <description>In this episode, Marc and Patrick Morley, former CEO of Carbon Black, get nostalgic as they discuss Patrick's journey of coming up through the start up scene in the 90s—from working with VCs to taking companies public—and compare it to running cyber companies today. Along with the early career experience that helped form Patrick's leadership philosophy, he shares his experience of becoming CEO of Bit9, seeing the company through a breach, acquiring Carbon Black, bring the company public and later getting acquired by VMWare—this episode is filled to the brim.
You'll also learn about:

How build a criteria for joining a start up

Why cyber is the most mission-driven area of tech

What it's like to call 600 customers in 2 days after a breach and not lose a single one

Seven philosophies for running a cyber company


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 04 Jul 2022 20:00:00 -0000</pubDate>
      <itunes:title>Patrick Morley: Former Carbon Black CEO [Cyber CEOs Decoded]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this episode, Marc and Patrick Morley, former CEO of Carbon Black, get nostalgic as they discuss Patrick's journey of coming up through the start up scene in the 90s—from working with VCs to taking companies public—and compare it to running cyber companies today. Along with the early career experience that helped form Patrick's leadership philosophy, he shares his experience of becoming CEO of Bit9, seeing the company through a breach, acquiring Carbon Black, bring the company public and later getting acquired by VMWare—this episode is filled to the brim.
You'll also learn about:

How build a criteria for joining a start up

Why cyber is the most mission-driven area of tech

What it's like to call 600 customers in 2 days after a breach and not lose a single one

Seven philosophies for running a cyber company


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode, Marc and Patrick Morley, former CEO of Carbon Black, get nostalgic as they discuss Patrick's journey of coming up through the start up scene in the 90s—from working with VCs to taking companies public—and compare it to running cyber companies today. Along with the early career experience that helped form Patrick's leadership philosophy, he shares his experience of becoming CEO of Bit9, seeing the company through a breach, acquiring Carbon Black, bring the company public and later getting acquired by VMWare—this episode is filled to the brim.</p><p><strong>You'll also learn about:</strong></p><ul>
<li>How build a criteria for joining a start up</li>
<li>Why cyber is the most mission-driven area of tech</li>
<li>What it's like to call 600 customers in 2 days after a breach and not lose a single one</li>
<li>Seven philosophies for running a cyber company</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>3581</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f4ebc194-f17f-11ec-8529-d38c2bb52293]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4499331351.mp3?updated=1652822787" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Could REvil have a copycat? [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/239/notes</link>
      <description>Larry Cashdollar from Akamai, joins Dave to discuss their research on a DDoS campaign claiming to be REvil. The research shares that Akamai's team was notified last week of an attack on one of their hospitality customers that they called "Layer 7" by a group claiming to be associated with REvil. In the research, they dive into the attack, as well as comparing it to other similar attacks that have been made by the group.
The research states "The attacks so far target a site by sending a wave of HTTP/2 GET requests with some cache-busting techniques to overwhelm the website." It also stated that this is a smaller attack than they have seen by the group before, and notes that there seems to be more of a political agenda behind the attack, whereas in the past, REvil has been less political.
The research can be found here:
REvil Resurgence? Or a Copycat?

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Jul 2022 07:00:00 -0000</pubDate>
      <itunes:title>Could REvil have a Copycat? [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>239</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Larry Cashdollar from Akamai, joins Dave to discuss their research on a DDoS campaign claiming to be REvil. The research shares that Akamai's team was notified last week of an attack on one of their hospitality customers that they called "Layer 7" by a group claiming to be associated with REvil. In the research, they dive into the attack, as well as comparing it to other similar attacks that have been made by the group.
The research states "The attacks so far target a site by sending a wave of HTTP/2 GET requests with some cache-busting techniques to overwhelm the website." It also stated that this is a smaller attack than they have seen by the group before, and notes that there seems to be more of a political agenda behind the attack, whereas in the past, REvil has been less political.
The research can be found here:
REvil Resurgence? Or a Copycat?

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Larry Cashdollar from Akamai, joins Dave to discuss their research on a DDoS campaign claiming to be REvil. The research shares that Akamai's team was notified last week of an attack on one of their hospitality customers that they called "Layer 7" by a group claiming to be associated with REvil. In the research, they dive into the attack, as well as comparing it to other similar attacks that have been made by the group.</p><p>The research states "The attacks so far target a site by sending a wave of HTTP/2 GET requests with some cache-busting techniques to overwhelm the website." It also stated that this is a smaller attack than they have seen by the group before, and notes that there seems to be more of a political agenda behind the attack, whereas in the past, REvil has been less political.</p><p>The research can be found here:</p><ul><li><a href="https://www.akamai.com/blog/security/revil-resurgence-or-copycat">REvil Resurgence? Or a Copycat?</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>891</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8e549dea-f7e5-11ec-a22b-472cdadc43a0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1484493623.mp3?updated=1685126990" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Notes on cyber conflict. Lazarus Group blamed for the Harmony cryptocurrency heist. MedusaLocker warning. Observation of the C2C market. The Crypto Queen cracks the FBI’s Ten Most Wanted.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1611/notes</link>
      <description>An update on the DDoS attack against Norway. NATO's resolutions on cyber security. North Korea seems to be behind the Harmony cryptocurrency heist. MedusaLocker warninga. Microsoft sees improvements in a gang's technique. Google blocks underworld domains. The Israeli-Iranian conflict in cyberspace. Chris Novak from Verizon with his take on this year’s DBIR. Our guest is Jason Clark of Netskope on the dynamic challenges of a remote workforce.And Now among the FBI’s Ten Most Wanted: one Crypto Queen.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/126

Selected reading.
Pro-Russian hackers launched a massive DDoS attack against Norway (Security Affairs)
NATO establishes program to coordinate rapid response to cyberattacks (POLITICO) 
NATO to create cyber rapid response force, increase cyber defense aid to Ukraine (CyberScoop)
FACT SHEET: The 2022 NATO Summit in Madrid | The White House (The White House)
North Korean Lazarus hackers linked to Harmony bridge thef (TechCrunch) 
North Korea Suspected of Plundering Crypto to Fund Weapons Programs (Wall Street Journal)
Crypto crash threatens North Korea's stolen funds as it ramps up weapons tests (Reuters)
CISA Alert AA22-181A – #StopRansomware: MedusaLocker. (CISA Cybersecurity Alerts with the CyberWire)
#StopRansomware: MedusaLocker (CISA)
Microsoft warning: This malware that targets Linux just got a big update (ZDNet) 
Microsoft Warns of Cryptomining Malware Campaign Targeting Linux Servers (The Hacker News) 
Google blocked dozens of domains used by hack-for-hire groups (BleepingComputer)
Countering hack-for-hire groups (Google)
Gantz orders probe after TV reports hint IDF behind Iran steel plant cyberattack (Times of Israel)
Proofpoint: Zionist covert operation? (PressTV)
Zionist intelligence company cyberattacked by Iraqi hackers (Mehr)
FBI Offers $100,000 Reward for Capture of Ten Most Wanted Fugitive ‘Cryptoqueen’ (FBI)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 01 Jul 2022 20:30:00 -0000</pubDate>
      <itunes:title>Notes on cyber conflict. Lazarus Group blamed for the Harmony cryptocurrency heist. MedusaLocker warning. Observation of the C2C market. The Crypto Queen cracks the FBI’s Ten Most Wanted.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1611</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An update on the DDoS attack against Norway. NATO's resolutions on cyber security. North Korea seems to be behind the Harmony cryptocurrency heist. MedusaLocker warninga. Microsoft sees improvements in a gang's technique. Google blocks underworld domains. The Israeli-Iranian conflict in cyberspace. Chris Novak from Verizon with his take on this year’s DBIR. Our guest is Jason Clark of Netskope on the dynamic challenges of a remote workforce.And Now among the FBI’s Ten Most Wanted: one Crypto Queen.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/126

Selected reading.
Pro-Russian hackers launched a massive DDoS attack against Norway (Security Affairs)
NATO establishes program to coordinate rapid response to cyberattacks (POLITICO) 
NATO to create cyber rapid response force, increase cyber defense aid to Ukraine (CyberScoop)
FACT SHEET: The 2022 NATO Summit in Madrid | The White House (The White House)
North Korean Lazarus hackers linked to Harmony bridge thef (TechCrunch) 
North Korea Suspected of Plundering Crypto to Fund Weapons Programs (Wall Street Journal)
Crypto crash threatens North Korea's stolen funds as it ramps up weapons tests (Reuters)
CISA Alert AA22-181A – #StopRansomware: MedusaLocker. (CISA Cybersecurity Alerts with the CyberWire)
#StopRansomware: MedusaLocker (CISA)
Microsoft warning: This malware that targets Linux just got a big update (ZDNet) 
Microsoft Warns of Cryptomining Malware Campaign Targeting Linux Servers (The Hacker News) 
Google blocked dozens of domains used by hack-for-hire groups (BleepingComputer)
Countering hack-for-hire groups (Google)
Gantz orders probe after TV reports hint IDF behind Iran steel plant cyberattack (Times of Israel)
Proofpoint: Zionist covert operation? (PressTV)
Zionist intelligence company cyberattacked by Iraqi hackers (Mehr)
FBI Offers $100,000 Reward for Capture of Ten Most Wanted Fugitive ‘Cryptoqueen’ (FBI)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An update on the DDoS attack against Norway. NATO's resolutions on cyber security. North Korea seems to be behind the Harmony cryptocurrency heist. MedusaLocker warninga. Microsoft sees improvements in a gang's technique. Google blocks underworld domains. The Israeli-Iranian conflict in cyberspace. Chris Novak from Verizon with his take on this year’s DBIR. Our guest is Jason Clark of Netskope on the dynamic challenges of a remote workforce.And Now among the FBI’s Ten Most Wanted: one Crypto Queen.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/126</p><p><br></p><h2>Selected reading.</h2><p><a href="https://securityaffairs.co/wordpress/132765/hacking/legion-ddos-norway.html">Pro-Russian hackers launched a massive DDoS attack against Norway</a> (Security Affairs)</p><p><a href="https://www.politico.com/news/2022/06/29/nato-cyberattacks-russia-00043149">NATO establishes program to coordinate rapid response to cyberattacks</a> (POLITICO) </p><p><a href="https://www.cyberscoop.com/nato-madrid-summit-cyber-ukraine/">NATO to create cyber rapid response force, increase cyber defense aid to Ukraine</a> (CyberScoop)</p><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2022/06/29/fact-sheet-the-2022-nato-summit-in-madrid/">FACT SHEET: The 2022 NATO Summit in Madrid | The White House</a> (The White House)</p><p><a href="https://techcrunch.com/2022/06/30/north-korea-lazarus-harmony-theft/">North Korean Lazarus hackers linked to Harmony bridge thef</a> (TechCrunch) </p><p><a href="https://www.wsj.com/articles/north-korea-suspected-of-plundering-crypto-to-fund-weapons-programs-11656667802">North Korea Suspected of Plundering Crypto to Fund Weapons Programs </a>(Wall Street Journal)</p><p><a href="https://www.reuters.com/technology/crypto-crash-threatens-north-koreas-stolen-funds-it-ramps-up-weapons-tests-2022-06-28/">Crypto crash threatens North Korea's stolen funds as it ramps up weapons tests</a> (Reuters)</p><p><a href="https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/23/notes">CISA Alert AA22-181A – #StopRansomware: MedusaLocker.</a> (CISA Cybersecurity Alerts with the CyberWire)</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-181a">#StopRansomware: MedusaLocker</a> (CISA)</p><p><a href="https://www.zdnet.com/article/microsoft-warning-this-malware-that-targets-linux-just-got-a-big-update/#ftag=RSSbaffb68">Microsoft warning: This malware that targets Linux just got a big update</a> (ZDNet) </p><p><a href="https://thehackernews.com/2022/06/microsoft-warns-of-cryptomining-malware.html">Microsoft Warns of Cryptomining Malware Campaign Targeting Linux Servers</a> (The Hacker News) </p><p><a href="https://www.bleepingcomputer.com/news/security/google-blocked-dozens-of-domains-used-by-hack-for-hire-groups/">Google blocked dozens of domains used by hack-for-hire groups</a> (BleepingComputer)</p><p><a href="https://blog.google/threat-analysis-group/countering-hack-for-hire-groups/">Countering hack-for-hire groups</a> (Google)</p><p><a href="https://www.timesofisrael.com/gantz-orders-probe-after-tv-reports-hint-idf-behind-iran-steel-plant-cyberattack/">Gantz orders probe after TV reports hint IDF behind Iran steel plant cyberattack</a> (Times of Israel)</p><p><a href="https://www.presstv.ir/Detail/2022/06/25/684511/Proofpoint">Proofpoint: Zionist covert operation?</a> (PressTV)</p><p><a href="https://en.mehrnews.com/news/188576/Zionist-intelligence-company-cyberattacked-by-Iraqi-hackers">Zionist intelligence company cyberattacked by Iraqi hackers</a> (Mehr)</p><p><a href="https://www.fbi.gov/contact-us/field-offices/newyork/news/press-releases/fbi-offers-100000-reward-for-capture-of-ten-most-wanted-fugitive-cryptoqueen">FBI Offers $100,000 Reward for Capture of Ten Most Wanted Fugitive ‘Cryptoqueen’</a> (FBI)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1761</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b9df79d2-7881-11ec-90a9-035e54a578f8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3341448346.mp3?updated=1671818464" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA22-181A – #StopRansomware: MedusaLocker. [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/23/notes</link>
      <description>CISA, the FBI, the Department of the Treasury, and the Financial Crimes Enforcement Network are releasing this alert to provide information on MedusaLocker ransomware. Observed as recently as May 2022, MedusaLocker actors predominantly rely on vulnerabilities in Remote Desktop Protocol to access victims’ networks.
AA22-181A Alert, Technical Details, and Mitigations
Stop Ransomware
CISA Ransomware Guide
CISA No-cost Ransomware Services
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 30 Jun 2022 21:00:00 -0000</pubDate>
      <itunes:title>CISA Alert AA22-181A – #StopRansomware: MedusaLocker. [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>23</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA, the FBI, the Department of the Treasury, and the Financial Crimes Enforcement Network are releasing this alert to provide information on MedusaLocker ransomware. Observed as recently as May 2022, MedusaLocker actors predominantly rely on vulnerabilities in Remote Desktop Protocol to access victims’ networks.
AA22-181A Alert, Technical Details, and Mitigations
Stop Ransomware
CISA Ransomware Guide
CISA No-cost Ransomware Services
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA, the FBI, the Department of the Treasury, and the Financial Crimes Enforcement Network are releasing this alert to provide information on MedusaLocker ransomware. Observed as recently as May 2022, MedusaLocker actors predominantly rely on vulnerabilities in Remote Desktop Protocol to access victims’ networks.</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-181a">AA22-181A Alert, Technical Details, and Mitigations</a></p><p><a href="https://www.cisa.gov/stopransomware">Stop Ransomware</a></p><p><a href="https://www.cisa.gov/stopransomware/ransomware-guide">CISA Ransomware Guide</a></p><p><a href="https://www.cisa.gov/stopransomware/services">CISA No-cost Ransomware Services</a></p><p>All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at <a href="mailto:central@cisa.dhs.gov">central@cisa.dhs.gov</a> or (888) 282-0870 and to the FBI via your <a href="https://www.fbi.gov/contact-us/field-offices">local FBI field office</a> or the FBI’s 24/7 CyWatch at (855) 292-3937 or <a href="mailto:CyWatch@fbi.gov">CyWatch@fbi.gov</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>189</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3a158138-f946-11ec-a0f3-5b00fbd2f250]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3151873979.mp3?updated=1656622966" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Killnet hits Norwegian websites. Hacktivists tied to Russia's government. Looking ahead to new cyber phases of Russia's hybrid war. C2C market differentiation. Gennady Bukin, call your shoe store.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1610/notes</link>
      <description>Killnet hits Norwegian websites. Hacktivists are tied to Russia's government. Amunet as a case study in C2C market differentiation. C2C commodification extends to script kiddies. Andrea Little Limbago from Interos examines borderless data. Rick Howard speaks with Cody Chamberlain from NetSPI on Breach Communication. Roscosmos publishes locations of Western defense facilities…and subsequently says it sustained a DDoS attack.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/125

Selected reading.
Pro-Russian hacker group says it attacked Norway (The Independent Barents Observer)
Cyberattack hits Norway, pro-Russian hacker group fingered (AP NEWS)
Norway blames "pro-Russian group" for cyber attack (Reuters)
Mandiant Finds Possible Link Between Kremlin, Pro-Russian ‘Hacktivists’ (Bloomberg)
Market Differentiation: Cybercriminal Forums’ Unusual Features Designed To Attract Users (Digital Shadows)
Minors Use Discord Servers to Earn Extra Pocket Money Through Spreading Malware (PR Newswire)
Russia publishes Pentagon coordinates, says Western satellites 'work for our enemy' (Reuters)
Russian Space Agency Targeted in Cyberattack (Wall Street Journal)
Cyberattack hits Russian space agency site after sharing NATO photos (Jerusalem Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 30 Jun 2022 20:15:00 -0000</pubDate>
      <itunes:title>Killnet hits Norwegian websites. Hacktivists tied to Russia's government. Looking ahead to new cyber phases of Russia's hybrid war. C2C market differentiation. Gennady Bukin, call your shoe store.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1610</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Killnet hits Norwegian websites. Hacktivists are tied to Russia's government. Amunet as a case study in C2C market differentiation. C2C commodification extends to script kiddies. Andrea Little Limbago from Interos examines borderless data. Rick Howard speaks with Cody Chamberlain from NetSPI on Breach Communication. Roscosmos publishes locations of Western defense facilities…and subsequently says it sustained a DDoS attack.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/125

Selected reading.
Pro-Russian hacker group says it attacked Norway (The Independent Barents Observer)
Cyberattack hits Norway, pro-Russian hacker group fingered (AP NEWS)
Norway blames "pro-Russian group" for cyber attack (Reuters)
Mandiant Finds Possible Link Between Kremlin, Pro-Russian ‘Hacktivists’ (Bloomberg)
Market Differentiation: Cybercriminal Forums’ Unusual Features Designed To Attract Users (Digital Shadows)
Minors Use Discord Servers to Earn Extra Pocket Money Through Spreading Malware (PR Newswire)
Russia publishes Pentagon coordinates, says Western satellites 'work for our enemy' (Reuters)
Russian Space Agency Targeted in Cyberattack (Wall Street Journal)
Cyberattack hits Russian space agency site after sharing NATO photos (Jerusalem Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Killnet hits Norwegian websites. Hacktivists are tied to Russia's government. Amunet as a case study in C2C market differentiation. C2C commodification extends to script kiddies. Andrea Little Limbago from Interos examines borderless data. Rick Howard speaks with Cody Chamberlain from NetSPI on Breach Communication. Roscosmos publishes locations of Western defense facilities…and subsequently says it sustained a DDoS attack.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/125</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thebarentsobserver.com/en/security/2022/06/pro-russian-hacker-group-says-it-attacked-norway">Pro-Russian hacker group says it attacked Norway</a> (The Independent Barents Observer)</p><p><a href="https://apnews.com/article/russia-ukraine-technology-norway-government-and-politics-b837c155fde5d9cb4215b77dff9a94f0">Cyberattack hits Norway, pro-Russian hacker group fingered</a> (AP NEWS)</p><p><a href="https://www.reuters.com/world/europe/norway-targeted-by-cyber-attack-security-agency-2022-06-29/">Norway blames "pro-Russian group" for cyber attack</a> (Reuters)</p><p><a href="https://www.bloomberg.com/news/articles/2022-06-29/mandiant-finds-possible-link-between-kremlin-pro-russian-hacktivists">Mandiant Finds Possible Link Between Kremlin, Pro-Russian ‘Hacktivists’</a> (Bloomberg)</p><p><a href="https://www.digitalshadows.com/blog-and-research/market-differentiation-cybercriminal-forums-unusual-features-designed-to-attract-users/">Market Differentiation: Cybercriminal Forums’ Unusual Features Designed To Attract Users</a> (Digital Shadows)</p><p><a href="https://www.prnewswire.com/news-releases/minors-use-discord-servers-to-earn-extra-pocket-money-through-spreading-malware-301576652.html">Minors Use Discord Servers to Earn Extra Pocket Money Through Spreading Malware</a> (PR Newswire)</p><p><a href="https://www.reuters.com/world/russia-publishes-pentagon-coordinates-says-western-satellites-work-our-enemy-2022-06-28/">Russia publishes Pentagon coordinates, says Western satellites 'work for our enemy'</a> (Reuters)</p><p><a href="https://www.wsj.com/livecoverage/ukraine-russia-war-nato-summit-news/card/russian-space-agency-targeted-in-cyberattack-7VUoNMnG0nBbwcLSDvP5">Russian Space Agency Targeted in Cyberattack</a> (Wall Street Journal)</p><p><a href="https://www.jpost.com/international/article-710689">Cyberattack hits Russian space agency site after sharing NATO photos</a> (Jerusalem Post)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1775</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5f29a2a-7881-11ec-90a9-53e6c3123f22]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7735546190.mp3?updated=1671818473" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Article 5? It’s complicated. Influence ops for economic advantage. SOHO routers under attack. YTStealer described. RansomHouse hits AMD. A NetWalker affiliate cops a plea. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1609/notes</link>
      <description>NATO's response to Killnet's cyberattacks on Lithuania. Influence operations in the interest of national market share. SOHO routers are under attack. YTStealer is out and active in the wild. RansomHouse hits AMD. CISA releases six ICS security advisories. The most dangerous software weaknesses. Betsy Carmelite from Booz Allen Hamilton takes a look back at Biden’s executive order on cyber. Our guest is Philippe Humeau of CrowdSec on taking a collaborative approach to security. And a guilty plea in the case of the NetWalker affiliate.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/124

Selected reading.
Could the Russian cyber attack on Lithuania draw a military response from NATO? (Sky News) 
Pro-PRC DRAGONBRIDGE Influence Campaign Targets Rare Earths Mining Companies in Attempt to Thwart Rivalry to PRC Market Dominance (Mandiant)
ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks (Lumen) 
New YTStealer Malware Aims to Hijack Accounts of YouTube Content Creators (Hacker News)
RansomHouse Extortion Group Claims AMD as Latest Victim (RestorePrivacy) 
RansomHouse gang claims to have some stolen AMD data (Register)
CISA releases 6 Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency)
2022 CWE Top 25 Most Dangerous Software Weaknesses (CISA) 
Netwalker ransomware affiliate agrees to plead guilty to hacking charges (The Record by Recorded Future)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 29 Jun 2022 20:30:00 -0000</pubDate>
      <itunes:title>Article 5? It’s complicated. Influence ops for economic advantage. SOHO routers under attack. YTStealer described. RansomHouse hits AMD. A NetWalker affiliate cops a plea. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1609</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>NATO's response to Killnet's cyberattacks on Lithuania. Influence operations in the interest of national market share. SOHO routers are under attack. YTStealer is out and active in the wild. RansomHouse hits AMD. CISA releases six ICS security advisories. The most dangerous software weaknesses. Betsy Carmelite from Booz Allen Hamilton takes a look back at Biden’s executive order on cyber. Our guest is Philippe Humeau of CrowdSec on taking a collaborative approach to security. And a guilty plea in the case of the NetWalker affiliate.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/124

Selected reading.
Could the Russian cyber attack on Lithuania draw a military response from NATO? (Sky News) 
Pro-PRC DRAGONBRIDGE Influence Campaign Targets Rare Earths Mining Companies in Attempt to Thwart Rivalry to PRC Market Dominance (Mandiant)
ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks (Lumen) 
New YTStealer Malware Aims to Hijack Accounts of YouTube Content Creators (Hacker News)
RansomHouse Extortion Group Claims AMD as Latest Victim (RestorePrivacy) 
RansomHouse gang claims to have some stolen AMD data (Register)
CISA releases 6 Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency)
2022 CWE Top 25 Most Dangerous Software Weaknesses (CISA) 
Netwalker ransomware affiliate agrees to plead guilty to hacking charges (The Record by Recorded Future)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>NATO's response to Killnet's cyberattacks on Lithuania. Influence operations in the interest of national market share. SOHO routers are under attack. YTStealer is out and active in the wild. RansomHouse hits AMD. CISA releases six ICS security advisories. The most dangerous software weaknesses. Betsy Carmelite from Booz Allen Hamilton takes a look back at Biden’s executive order on cyber. Our guest is Philippe Humeau of CrowdSec on taking a collaborative approach to security. And a guilty plea in the case of the NetWalker affiliate.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/124</p><p><br></p><h2>Selected reading.</h2><p><a href="https://news.sky.com/story/could-the-russian-cyber-attack-on-lithuania-draw-a-military-response-from-nato-12641986">Could the Russian cyber attack on Lithuania draw a military response from NATO?</a> (Sky News) </p><p><a href="https://www.mandiant.com/resources/dragonbridge-targets-rare-earths-mining-companies">Pro-PRC DRAGONBRIDGE Influence Campaign Targets Rare Earths Mining Companies in Attempt to Thwart Rivalry to PRC Market Dominance</a> (Mandiant)</p><p><a href="https://blog.lumen.com/zuorat-hijacks-soho-routers-to-silently-stalk-networks/">ZuoRAT Hijacks SOHO Routers to Silently Stalk Networks</a> (Lumen) </p><p><a href="https://thehackernews.com/2022/06/new-ytstealer-malware-aims-to-hijack.html">New YTStealer Malware Aims to Hijack Accounts of YouTube Content Creators</a> (Hacker News)</p><p><a href="https://restoreprivacy.com/ransomhouse-group-amd-advanced-micro-devices/">RansomHouse Extortion Group Claims AMD as Latest Victim</a> (RestorePrivacy) </p><p><a href="https://www.theregister.com/2022/06/28/amd-ransomhouse-data-extortion/">RansomHouse gang claims to have some stolen AMD data</a> (Register)</p><p><a href="https://content.govdelivery.com/accounts/USDHSCISA/bulletins/31e1640">CISA releases 6 Industrial Control Systems Advisories</a> (Cybersecurity and Infrastructure Security Agency)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/06/28/2022-cwe-top-25-most-dangerous-software-weaknesses">2022 CWE Top 25 Most Dangerous Software Weaknesses</a> (CISA) </p><p><a href="https://therecord.media/netwalker-ransomware-affiliate-agrees-to-plead-guilty-to-hacking-charges/">Netwalker ransomware affiliate agrees to plead guilty to hacking charges</a> (The Record by Recorded Future)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1769</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b6ce36e8-7881-11ec-90a9-b733a4a1909a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3633698889.mp3?updated=1671818484" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DDoS threat to Lithuania continues. Hacktivists hit Iranian steel mill. Bumblebee loader takes C2C markteshare. CISA adds Known Exploited Vulnerabilities. Music piracy. Where do spies go?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1608/notes</link>
      <description>Distributed denial-of-service attacks against Lithuania. Dark Crystal RAT described. Iranian steel mill suspends production due to cyberattack. Bumblebee rising. CISA adds to its Known Exploited Vulnerabilities Catalog. Music pirate sites brought down by US and Brazilian authorities. Joe Carrigan looks at Apple’s private access tokens. Mister Security Answer Person John Pescatore drops some sboms. And where do Russian intelligence officers go after they’ve been PNGed?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/123

Selected reading.
Lithuania targeted by massive Russian cyberattack over transit blockade (Newsweek)
Russia's Killnet hacker group says it attacked Lithuania (Reuters)
Killnet, Kaliningrad, and Lithuania’s Transport Standoff With Russia (Flashpoint)
Ukraine Targeted by Dark Crystal RAT (DCRat) | FortiGuard Labs (Fortinet Blog)
Cyberattack Forces Iran Steel Company to Halt Production (SecurityWeek)
Iran’s steel industry halted by cyberattack (Jerusalem Post)
Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem (Broadcom Software Blogs)
CISA Adds Eight Known Exploited Vulnerabilities to Catalog (CISA) 
US, Brazil seize 272 websites used to illegally download music (BleepingComputer) 
Swiss intel service: Watch out for redeployed Russian spies (AP News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Jun 2022 20:35:00 -0000</pubDate>
      <itunes:title>DDoS threat to Lithuania continues. Hacktivists hit Iranian steel mill. Bumblebee loader takes C2C markteshare. CISA adds Known Exploited Vulnerabilities. Music piracy. Where do spies go?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1608</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Distributed denial-of-service attacks against Lithuania. Dark Crystal RAT described. Iranian steel mill suspends production due to cyberattack. Bumblebee rising. CISA adds to its Known Exploited Vulnerabilities Catalog. Music pirate sites brought down by US and Brazilian authorities. Joe Carrigan looks at Apple’s private access tokens. Mister Security Answer Person John Pescatore drops some sboms. And where do Russian intelligence officers go after they’ve been PNGed?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/123

Selected reading.
Lithuania targeted by massive Russian cyberattack over transit blockade (Newsweek)
Russia's Killnet hacker group says it attacked Lithuania (Reuters)
Killnet, Kaliningrad, and Lithuania’s Transport Standoff With Russia (Flashpoint)
Ukraine Targeted by Dark Crystal RAT (DCRat) | FortiGuard Labs (Fortinet Blog)
Cyberattack Forces Iran Steel Company to Halt Production (SecurityWeek)
Iran’s steel industry halted by cyberattack (Jerusalem Post)
Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem (Broadcom Software Blogs)
CISA Adds Eight Known Exploited Vulnerabilities to Catalog (CISA) 
US, Brazil seize 272 websites used to illegally download music (BleepingComputer) 
Swiss intel service: Watch out for redeployed Russian spies (AP News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Distributed denial-of-service attacks against Lithuania. Dark Crystal RAT described. Iranian steel mill suspends production due to cyberattack. Bumblebee rising. CISA adds to its Known Exploited Vulnerabilities Catalog. Music pirate sites brought down by US and Brazilian authorities. Joe Carrigan looks at Apple’s private access tokens. Mister Security Answer Person John Pescatore drops some sboms. And where do Russian intelligence officers go after they’ve been PNGed?</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/123</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.newsweek.com/lithuania-cyberattack-russia-killnet-ddos-distributed-denial-service-economic-transit-blockade-1719567">Lithuania targeted by massive Russian cyberattack over transit blockade</a> (Newsweek)</p><p><a href="https://www.reuters.com/technology/russias-killnet-hacker-group-says-it-attacked-lithuania-2022-06-27/">Russia's Killnet hacker group says it attacked Lithuania</a> (Reuters)</p><p><a href="https://flashpoint.io/blog/killnet-kaliningrad-and-lithuanias-transport-standoff-with-russia/">Killnet, Kaliningrad, and Lithuania’s Transport Standoff With Russia</a> (Flashpoint)</p><p><a href="https://www.fortinet.com/blog/threat-research/ukraine-targeted-by-dark-crystal-rat">Ukraine Targeted by Dark Crystal RAT (DCRat) | FortiGuard Labs</a> (Fortinet Blog)</p><p><a href="https://www.securityweek.com/cyberattack-forces-iran-steel-company-halt-production">Cyberattack Forces Iran Steel Company to Halt Production</a> (SecurityWeek)</p><p><a href="https://www.jpost.com/middle-east/iran-news/article-710522">Iran’s steel industry halted by cyberattack</a> (Jerusalem Post)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/bumblebee-loader-cybercrime">Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem</a> (Broadcom Software Blogs)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/06/27/cisa-adds-eight-known-exploited-vulnerabilities-catalog">CISA Adds Eight Known Exploited Vulnerabilities to Catalog</a> (CISA) </p><p><a href="https://www.bleepingcomputer.com/news/security/us-brazil-seize-272-websites-used-to-illegally-download-music/">US, Brazil seize 272 websites used to illegally download music</a> (BleepingComputer) </p><p><a href="https://apnews.com/article/russia-ukraine-putin-espionage-government-and-politics-97b9f6268efc5caefd311679d0567a03">Swiss intel service: Watch out for redeployed Russian spies</a> (AP News)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1692</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b6ed58ca-7881-11ec-90a9-d79c6f67e692]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7711825615.mp3?updated=1671818491" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Notes from the cyber phases of the hybrid war against Ukraine. Conti retires its brand, and LockBit 2.0 is now tops in ransomware. Extortion skips the encryption. Cyber exercise in the financial sector.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1607/notes</link>
      <description>Lithuania sustains a major DDoS attack. Lessons from NotPetya. Conti's brand appears to have gone into hiding. Online extortion now tends to skip the ransomware proper. Josh Ray from Accenture on how social engineering is evolving for underground threat actors. Rick Howard looks at Chaos Engineering. US financial institutions conduct a coordinated cybersecurity exercise.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/122

Selected reading.
Russia's Killnet hacker group says it attacked Lithuania (Reuters)
The hacker group KillNet has published an ultimatum to the Lithuanian authorities (TDPel Media) 
5 years after NotPetya: Lessons learned (CSO Online) 
The cyber security impact of Operation Russia by Anonymous (ComputerWeekly)
Conti ransomware finally shuts down data leak, negotiation sites (BleepingComputer)
The Conti Enterprise: ransomware gang that published data belonging to 850 companies (Group-IB)
Fake copyright infringement emails install LockBit ransomware (BleepingComputer)
NCC Group Monthly Threat Pulse – May 2022 (NCC Group)
We're now truly in the era of ransomware as pure extortion without the encryption (Register)
Wall Street Banks Quietly Test Cyber Defenses at Treasury’s Direction (Bloomberg)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 27 Jun 2022 20:15:00 -0000</pubDate>
      <itunes:title>Notes from the cyber phases of the hybrid war against Ukraine. Conti retires its brand, and LockBit 2.0 is now tops in ransomware. Extortion skips the encryption. Cyber exercise in the financial sector.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1607</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Lithuania sustains a major DDoS attack. Lessons from NotPetya. Conti's brand appears to have gone into hiding. Online extortion now tends to skip the ransomware proper. Josh Ray from Accenture on how social engineering is evolving for underground threat actors. Rick Howard looks at Chaos Engineering. US financial institutions conduct a coordinated cybersecurity exercise.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/122

Selected reading.
Russia's Killnet hacker group says it attacked Lithuania (Reuters)
The hacker group KillNet has published an ultimatum to the Lithuanian authorities (TDPel Media) 
5 years after NotPetya: Lessons learned (CSO Online) 
The cyber security impact of Operation Russia by Anonymous (ComputerWeekly)
Conti ransomware finally shuts down data leak, negotiation sites (BleepingComputer)
The Conti Enterprise: ransomware gang that published data belonging to 850 companies (Group-IB)
Fake copyright infringement emails install LockBit ransomware (BleepingComputer)
NCC Group Monthly Threat Pulse – May 2022 (NCC Group)
We're now truly in the era of ransomware as pure extortion without the encryption (Register)
Wall Street Banks Quietly Test Cyber Defenses at Treasury’s Direction (Bloomberg)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Lithuania sustains a major DDoS attack. Lessons from NotPetya. Conti's brand appears to have gone into hiding. Online extortion now tends to skip the ransomware proper. Josh Ray from Accenture on how social engineering is evolving for underground threat actors. Rick Howard looks at Chaos Engineering. US financial institutions conduct a coordinated cybersecurity exercise.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/122</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.reuters.com/technology/russias-killnet-hacker-group-says-it-attacked-lithuania-2022-06-27/">Russia's Killnet hacker group says it attacked Lithuania</a> (Reuters)</p><p><a href="https://tdpelmedia.com/the-hacker-group-killnet-has-published-an-ultimatum-to-the-lithuanian-authorities">The hacker group KillNet has published an ultimatum to the Lithuanian authorities</a> (TDPel Media) </p><p><a href="https://www.csoonline.com/article/3664930/5-years-after-notpetya-lessons-learned.html#tk.rss_all">5 years after NotPetya: Lessons learned</a> (CSO Online) </p><p><a href="https://www.computerweekly.com/feature/The-cyber-security-impact-of-Operation-Russia-by-Anonymous">The cyber security impact of Operation Russia by Anonymous</a> (ComputerWeekly)</p><p><a href="https://www.bleepingcomputer.com/news/security/conti-ransomware-finally-shuts-down-data-leak-negotiation-sites/">Conti ransomware finally shuts down data leak, negotiation sites</a> (BleepingComputer)</p><p><a href="https://www.group-ib.com/media/conti-armada-report/">The Conti Enterprise: ransomware gang that published data belonging to 850 companies</a> (Group-IB)</p><p><a href="https://www.bleepingcomputer.com/news/security/fake-copyright-infringement-emails-install-lockbit-ransomware/">Fake copyright infringement emails install LockBit ransomware</a> (BleepingComputer)</p><p><a href="https://www.mynewsdesk.com/nccgroup/news/ncc-group-monthly-threat-pulse-may-2022-450133">NCC Group Monthly Threat Pulse – May 2022</a> (NCC Group)</p><p><a href="https://www.theregister.com/2022/06/25/ransomware_gangs_extortion_feature/">We're now truly in the era of ransomware as pure extortion without the encryption</a> (Register)</p><p><a href="https://www.bloomberg.com/news/articles/2022-06-24/treasury-s-cyber-war-moves-financial-sector-beyond-shields-up">Wall Street Banks Quietly Test Cyber Defenses at Treasury’s Direction</a> (Bloomberg)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1455</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7c82626-7881-11ec-90a9-efbe7d647a96]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5230692768.mp3?updated=1671818499" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Richard Melick: Finding the right pattern to solve the problem. [Threat reporting] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/106/notes</link>
      <description>Richard Melick, Director of Threat Reporting for Zimperium, talks about his journey, from working in the military to moving up to the big screens. He shares that he's been in the business of solving unique cybersecurity problems for so long that he has found his own path that works very well for him. He says, "if I go to a unique problem and try to solve it, I find that I'm solving it the same way that I would've solved it five years ago, because I found my pattern." Richard reflects on his time working in the industry, from moving away from the military and into different roles over the years. He notes that giving credit where credit is due, to those who deserve it, is how you keep the audience engaged as a storyteller. We thank Richard for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 26 Jun 2022 07:00:00 -0000</pubDate>
      <itunes:title>Richard Melick: Finding the right pattern to solve the problem. [Threat reporting] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>106</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Richard Melick, Director of Threat Reporting for Zimperium, talks about his journey, from working in the military to moving up to the big screens. He shares that he's been in the business of solving unique cybersecurity problems for so long that he has found his own path that works very well for him. He says, "if I go to a unique problem and try to solve it, I find that I'm solving it the same way that I would've solved it five years ago, because I found my pattern." Richard reflects on his time working in the industry, from moving away from the military and into different roles over the years. He notes that giving credit where credit is due, to those who deserve it, is how you keep the audience engaged as a storyteller. We thank Richard for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Richard Melick, Director of Threat Reporting for Zimperium, talks about his journey, from working in the military to moving up to the big screens. He shares that he's been in the business of solving unique cybersecurity problems for so long that he has found his own path that works very well for him. He says, "if I go to a unique problem and try to solve it, I find that I'm solving it the same way that I would've solved it five years ago, because I found my pattern." Richard reflects on his time working in the industry, from moving away from the military and into different roles over the years. He notes that giving credit where credit is due, to those who deserve it, is how you keep the audience engaged as a storyteller. We thank Richard for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>476</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c242740c-f339-11ec-957c-13a18e6cb968]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1129015857.mp3?updated=1656018499" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lazarus Targets Chemical Sector With 'Dream Job.' [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/238/notes</link>
      <description>Alan Neville, a Threat Intelligence Analyst from Symantec Broadcom, joins Dave to discuss their research "Lazarus Targets Chemical Sector." Symantec has observed the North Korea-linked threat group known as Lazarus conducting an espionage campaign targeting organizations operating within the chemical sector.
The campaign appears to be a continuation of the group's activity called Operation Dream Job, which Symantec first came across in August of 2020. The research states "evidence includes file hashes, file names, and tools that were observed in previous Dream Job campaigns."
The research can be found here:
Lazarus Targets Chemical Sector

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Jun 2022 07:00:00 -0000</pubDate>
      <itunes:title>Lazarus Targets Chemical Sector With 'Dream Job.' [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>238</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Alan Neville, a Threat Intelligence Analyst from Symantec Broadcom, joins Dave to discuss their research "Lazarus Targets Chemical Sector." Symantec has observed the North Korea-linked threat group known as Lazarus conducting an espionage campaign targeting organizations operating within the chemical sector.
The campaign appears to be a continuation of the group's activity called Operation Dream Job, which Symantec first came across in August of 2020. The research states "evidence includes file hashes, file names, and tools that were observed in previous Dream Job campaigns."
The research can be found here:
Lazarus Targets Chemical Sector

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Alan Neville, a Threat Intelligence Analyst from Symantec Broadcom, joins Dave to discuss their research "Lazarus Targets Chemical Sector." Symantec has observed the North Korea-linked threat group known as Lazarus conducting an espionage campaign targeting organizations operating within the chemical sector.</p><p>The campaign appears to be a continuation of the group's activity called Operation Dream Job, which Symantec first came across in August of 2020. The research states "evidence includes file hashes, file names, and tools that were observed in previous Dream Job campaigns."</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lazarus-dream-job-chemical">Lazarus Targets Chemical Sector</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1262</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1e2012ca-f33a-11ec-85e1-332e44e249ec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1303660464.mp3?updated=1685126863" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lithuania warns of DDoS. Some limited Russian success in cyber phases of its hybrid war. Spyware infestations in Italy and Kazakstan. Tabletop exercises. Ransomware as misdirection</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1606/notes</link>
      <description>Lithuania's NKSC warns of increased DDoS threat. Limited Russian success in the cyber phases of its hybrid war. Another warning of spyware in use against targets in Italy and Kazakhstan. Hey, critical infrastructure operators: CISA’s got tabletop exercises for you. Kevin Magee from Microsoft has advice for recent grads. A look back the year since Colonial Pipeline with Padraic O'Reilly of CyberSaint. And sometimes ransomware is just a spy’s way of saying, “nothing up my sleeve…”

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/121

Selected reading.
Lithuania warns of rise in DDoS attacks against government sites (BleepingComputer) 
Defending Ukraine: Early Lessons from the Cyber War (Microsoft) 
Why think tanks are such juicy targets for cyberspies (The Record by Recorded Future)
The war in Ukraine is showing the limits of cyberattacks (Tech Monitor)
Spyware vendor targets users in Italy and Kazakhstan (Google Threat Analysis Group)
BRONZE STARLIGHT Ransomware Operations Use HUI Loader (SecureWorks)
CISA Tabletop Exercises Packages (CTEP) (CISA)
CISA Tabletop Exercise Package (CTEP) Workshop (Government Technology)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 24 Jun 2022 20:15:00 -0000</pubDate>
      <itunes:title>Lithuania warns of DDoS. Some limited Russian success in cyber phases of its hybrid war. Spyware infestations in Italy and Kazakstan. Tabletop exercises. Ransomware as misdirection</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1606</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Lithuania's NKSC warns of increased DDoS threat. Limited Russian success in the cyber phases of its hybrid war. Another warning of spyware in use against targets in Italy and Kazakhstan. Hey, critical infrastructure operators: CISA’s got tabletop exercises for you. Kevin Magee from Microsoft has advice for recent grads. A look back the year since Colonial Pipeline with Padraic O'Reilly of CyberSaint. And sometimes ransomware is just a spy’s way of saying, “nothing up my sleeve…”

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/121

Selected reading.
Lithuania warns of rise in DDoS attacks against government sites (BleepingComputer) 
Defending Ukraine: Early Lessons from the Cyber War (Microsoft) 
Why think tanks are such juicy targets for cyberspies (The Record by Recorded Future)
The war in Ukraine is showing the limits of cyberattacks (Tech Monitor)
Spyware vendor targets users in Italy and Kazakhstan (Google Threat Analysis Group)
BRONZE STARLIGHT Ransomware Operations Use HUI Loader (SecureWorks)
CISA Tabletop Exercises Packages (CTEP) (CISA)
CISA Tabletop Exercise Package (CTEP) Workshop (Government Technology)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Lithuania's NKSC warns of increased DDoS threat. Limited Russian success in the cyber phases of its hybrid war. Another warning of spyware in use against targets in Italy and Kazakhstan. Hey, critical infrastructure operators: CISA’s got tabletop exercises for you. Kevin Magee from Microsoft has advice for recent grads. A look back the year since Colonial Pipeline with Padraic O'Reilly of CyberSaint. And sometimes ransomware is just a spy’s way of saying, “nothing up my sleeve…”</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/121</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/security/lithuania-warns-of-rise-in-ddos-attacks-against-government-sites/">Lithuania warns of rise in DDoS attacks against government sites</a> (BleepingComputer) </p><p><a href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE50KOK">Defending Ukraine: Early Lessons from the Cyber War</a> (Microsoft) </p><p><a href="https://therecord.media/ukraine-russia-think-tanks-microsoft/">Why think tanks are such juicy targets for cyberspies</a> (The Record by Recorded Future)</p><p><a href="https://techmonitor.ai/technology/cybersecurity/cyberattacks-ukraine-russia-war">The war in Ukraine is showing the limits of cyberattacks</a> (Tech Monitor)</p><p><a href="https://blog.google/threat-analysis-group/italian-spyware-vendor-targets-users-in-italy-and-kazakhstan/">Spyware vendor targets users in Italy and Kazakhstan</a> (Google Threat Analysis Group)</p><p><a href="https://www.secureworks.com/research/bronze-starlight-ransomware-operations-use-hui-loader">BRONZE STARLIGHT Ransomware Operations Use HUI Loader</a> (SecureWorks)</p><p><a href="https://www.cisa.gov/cisa-tabletop-exercises-packages">CISA Tabletop Exercises Packages (CTEP)</a> (CISA)</p><p><a href="https://www.govtech.com/cisa-tabletop-exercise-package-ctep-workshop">CISA Tabletop Exercise Package (CTEP)</a> Workshop (Government Technology)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1686</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5d3549e-7881-11ec-90a9-033dd414fb9b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1827059547.mp3?updated=1671818510" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA22-174A – Malicious cyber actors continue to exploit Log4Shell in VMware Horizon systems.  [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/22/notes</link>
      <description>CISA and the US Coast Guard Cyber Command are releasing this joint Cybersecurity Advisory to warn network defenders that cyber threat actors, including state-sponsored APT actors, have continued to exploit CVE-2021-44228 (Log4Shell) in VMware Horizon and Unified Access Gateway servers to obtain initial access to organizations that did not apply available patches or workarounds.
AA22-174A Alert, Technical Details, and Mitigations
Malware Analysis Report 10382254-1 stix
Malware Analysis Report 10382580-1 stix
CISA’s Apache Log4j Vulnerability Guidance webpage
Joint CSA Mitigating Log4Shell and Other Log4j-Related Vulnerabilities
CISA’s database of known vulnerable services on the CISA GitHub page
See National Security Agency (NSA) and Australian Signals Directorate (ASD) guidance Block and Defend Web Shell Malware for additional guidance on hardening internet-facing systems.
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 24 Jun 2022 13:45:00 -0000</pubDate>
      <itunes:title>CISA Alert AA22-174A – Malicious cyber actors continue to exploit Log4Shell in VMware Horizon systems.  [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>22</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA and the US Coast Guard Cyber Command are releasing this joint Cybersecurity Advisory to warn network defenders that cyber threat actors, including state-sponsored APT actors, have continued to exploit CVE-2021-44228 (Log4Shell) in VMware Horizon and Unified Access Gateway servers to obtain initial access to organizations that did not apply available patches or workarounds.
AA22-174A Alert, Technical Details, and Mitigations
Malware Analysis Report 10382254-1 stix
Malware Analysis Report 10382580-1 stix
CISA’s Apache Log4j Vulnerability Guidance webpage
Joint CSA Mitigating Log4Shell and Other Log4j-Related Vulnerabilities
CISA’s database of known vulnerable services on the CISA GitHub page
See National Security Agency (NSA) and Australian Signals Directorate (ASD) guidance Block and Defend Web Shell Malware for additional guidance on hardening internet-facing systems.
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA and the US Coast Guard Cyber Command are releasing this joint Cybersecurity Advisory to warn network defenders that cyber threat actors, including state-sponsored APT actors, have continued to exploit CVE-2021-44228 (Log4Shell) in VMware Horizon and Unified Access Gateway servers to obtain initial access to organizations that did not apply available patches or workarounds.</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-174a">AA22-174A Alert, Technical Details, and Mitigations</a></p><p><a href="https://www.cisa.gov/uscert/sites/default/files/publications/MAR-10382254.r1.v1.WHITE_stix.xml">Malware Analysis Report 10382254-1 stix</a></p><p><a href="https://www.cisa.gov/uscert/sites/default/files/publications/MAR-10382580.r1.v1.WHITE_stix.xml">Malware Analysis Report 10382580-1 stix</a></p><p>CISA’s <a href="https://www.cisa.gov/uscert/apache-log4j-vulnerability-guidance">Apache Log4j Vulnerability Guidance</a> webpage</p><p>Joint CSA <a href="https://www.cisa.gov/uscert/ncas/alerts/aa21-356a">Mitigating Log4Shell and Other Log4j-Related Vulnerabilities</a></p><p>CISA’s <a href="https://github.com/cisagov/log4j-affected-db">database of known vulnerable services</a> on the CISA GitHub page</p><p>See National Security Agency (NSA) and Australian Signals Directorate (ASD) guidance <a href="https://media.defense.gov/2020/Jun/09/2002313081/-1/-1/0/CSI-DETECT-AND-PREVENT-WEB-SHELL-MALWARE-20200422.PDF">Block and Defend Web Shell Malware</a> for additional guidance on hardening internet-facing systems.</p><p>All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at <a href="mailto:central@cisa.dhs.gov">central@cisa.dhs.gov</a> or (888) 282-0870 and to the FBI via your <a href="https://www.fbi.gov/contact-us/field-offices">local FBI field office</a> or the FBI’s 24/7 CyWatch at (855) 292-3937 or <a href="mailto:CyWatch@fbi.gov">CyWatch@fbi.gov</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>194</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[caa7c876-f94d-11ec-b8aa-739e5898bdda]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4845660215.mp3?updated=1656078601" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Reviewing Russian cyber campaigns in the war against Ukraine. Ukraine's IT Army is a complex phenomenon. Take ICEFALL seriously. CISA has updated its cloud security guidance.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1605/notes</link>
      <description>Reviewing Russian cyber campaigns in the war against Ukraine, and the complexity of Ukraine's IT Army. ICEFALL advice and reactions. Carole Theriault looks at Hollywood’s relationship with VPNs. Podcast partner Robert M. Lee from Dragos provides a rundown on Pipedream. And CISA updates its Cloud Security Technical Reference Architecture.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/120

Selected reading.
[Blog] Defending Ukraine: Early Lessons from the Cyber War (Microsoft On the Issues)
[Report] Defending Ukraine: Early Lessons from the Cyber War (Microsoft)
Russian cyber spies attack Ukraine's allies, Microsoft says (Reuters) 
Research questions potentially dangerous implications of Ukraine's IT Army (CyberScoop)
The IT Army of Ukraine Structure, Tasking, and Ecosystem (Center for Security Studies) 
CISA Releases Security Advisories Related to OT:ICEFALL (Insecure by Design) Report (CISA)
Industry Reactions to 'OT:Icefall' Vulnerabilities Found in ICS Products (SecurityWeek) 
Cloud Security Technical Reference Architecture (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 23 Jun 2022 20:25:00 -0000</pubDate>
      <itunes:title>Reviewing Russian cyber campaigns in the war against Ukraine. Ukraine's IT Army is a complex phenomenon. Take ICEFALL seriously. CISA has updated its cloud security guidance.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1605</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Reviewing Russian cyber campaigns in the war against Ukraine, and the complexity of Ukraine's IT Army. ICEFALL advice and reactions. Carole Theriault looks at Hollywood’s relationship with VPNs. Podcast partner Robert M. Lee from Dragos provides a rundown on Pipedream. And CISA updates its Cloud Security Technical Reference Architecture.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/120

Selected reading.
[Blog] Defending Ukraine: Early Lessons from the Cyber War (Microsoft On the Issues)
[Report] Defending Ukraine: Early Lessons from the Cyber War (Microsoft)
Russian cyber spies attack Ukraine's allies, Microsoft says (Reuters) 
Research questions potentially dangerous implications of Ukraine's IT Army (CyberScoop)
The IT Army of Ukraine Structure, Tasking, and Ecosystem (Center for Security Studies) 
CISA Releases Security Advisories Related to OT:ICEFALL (Insecure by Design) Report (CISA)
Industry Reactions to 'OT:Icefall' Vulnerabilities Found in ICS Products (SecurityWeek) 
Cloud Security Technical Reference Architecture (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Reviewing Russian cyber campaigns in the war against Ukraine, and the complexity of Ukraine's IT Army. ICEFALL advice and reactions. Carole Theriault looks at Hollywood’s relationship with VPNs. Podcast partner Robert M. Lee from Dragos provides a rundown on Pipedream. And CISA updates its Cloud Security Technical Reference Architecture.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/120</p><p><br></p><h2>Selected reading.</h2><p><a href="https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/">[Blog] Defending Ukraine: Early Lessons from the Cyber War</a> (Microsoft On the Issues)</p><p><a href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE50KOK">[Report] Defending Ukraine: Early Lessons from the Cyber War</a> (Microsoft)</p><p><a href="https://www.reuters.com/world/russian-hacking-groups-step-up-cyber-espionage-ukraine-allies-microsoft-says-2022-06-22/">Russian cyber spies attack Ukraine's allies, Microsoft says</a> (Reuters) </p><p><a href="https://www.cyberscoop.com/ukraine-it-army-fedorov-russia-ddos/">Research questions potentially dangerous implications of Ukraine's IT Army</a> (CyberScoop)</p><p><a href="https://css.ethz.ch/content/dam/ethz/special-interest/gess/cis/center-for-securities-studies/pdfs/Cyber-Reports-2022-06-IT-Army-of-Ukraine.pdf">The IT Army of Ukraine Structure, Tasking, and Ecosystem</a> (Center for Security Studies) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/06/22/cisa-releases-security-advisories-related-oticefall-insecure">CISA Releases Security Advisories Related to OT:ICEFALL (Insecure by Design) Report</a> (CISA)</p><p><a href="https://www.securityweek.com/industry-reactions-oticefall-vulnerabilities-found-ics-products">Industry Reactions to 'OT:Icefall' Vulnerabilities Found in ICS Products</a> (SecurityWeek) </p><p><a href="https://www.cisa.gov/sites/default/files/publications/Cloud%20Security%20Technical%20Reference%20Architecture.pdf">Cloud Security Technical Reference Architecture</a> (CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1692</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b611cf58-7881-11ec-90a9-3fdaf274c95e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2346486377.mp3?updated=1671823834" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A Fancy Bear sighting. Why Russian cyberattacks against Ukraine have fallen short of expectations. ToddyCat APT discovered. ICEFALL ICS issues described. Europol collars 9. Say it ain’t so, Dmitry.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1604/notes</link>
      <description>Fancy Bear sighted in Ukrainian in-boxes. Why Russian cyberattacks against Ukraine have fallen short of expectations. ToddyCat APT is active in European and Asian networks. ICEFALL ICS vulnerabilities described. CISA issues ICS vulnerability advisories. Europol makes nine collars. Andrea Little Limbago from Interos on The global state of data protection and sharing. Rick Howard speaks with Michelangelo Sidagni from NopSec on the Future of Vulnerability Management. We are shocked, shocked, to hear of corruption in the FSB

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/119

Selected reading.
Ukrainian cybersecurity officials disclose two new hacking campaigns (CyberScoop) 
Ukraine Warns of New Malware Campaign Tied to Russian Hackers (Bloomberg Law) 
Russian govt hackers hit Ukraine with Cobalt Strike, CredoMap malware (BleepingComputer) 
Opinion How Russia’s vaunted cyber capabilities were frustrated in Ukraine (Washington Post) 
New Toddycat APT Targets MS Exchange Servers in Europe and Asia (Infosecurity Magazine) 
Microsoft Exchange servers hacked by new ToddyCat APT gang (BleepingComputer)
OT:ICEFALL: 56 Vulnerabilities Caused by Insecure-by-Design Practices in OT (Forescout)
From Basecamp to Icefall: Secure by Design OT Makes Little Headway (SecurityWeek)
Dozens of vulnerabilities threaten major OT device makers (Cybersecurity Dive) 
CISA releases 6 Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency) 
Phishing gang behind several million euros worth of losses busted in Belgium and the Netherlands (Europol)
Подполковника УФСБ по Самарской области арестовали за кражу криптовалюты у хакера (TASS)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 22 Jun 2022 20:15:00 -0000</pubDate>
      <itunes:title>A Fancy Bear sighting. Why Russian cyberattacks against Ukraine have fallen short of expectations. ToddyCat APT discovered. ICEFALL ICS issues described. Europol collars 9. Say it ain’t so, Dmitry.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1604</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Fancy Bear sighted in Ukrainian in-boxes. Why Russian cyberattacks against Ukraine have fallen short of expectations. ToddyCat APT is active in European and Asian networks. ICEFALL ICS vulnerabilities described. CISA issues ICS vulnerability advisories. Europol makes nine collars. Andrea Little Limbago from Interos on The global state of data protection and sharing. Rick Howard speaks with Michelangelo Sidagni from NopSec on the Future of Vulnerability Management. We are shocked, shocked, to hear of corruption in the FSB

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/119

Selected reading.
Ukrainian cybersecurity officials disclose two new hacking campaigns (CyberScoop) 
Ukraine Warns of New Malware Campaign Tied to Russian Hackers (Bloomberg Law) 
Russian govt hackers hit Ukraine with Cobalt Strike, CredoMap malware (BleepingComputer) 
Opinion How Russia’s vaunted cyber capabilities were frustrated in Ukraine (Washington Post) 
New Toddycat APT Targets MS Exchange Servers in Europe and Asia (Infosecurity Magazine) 
Microsoft Exchange servers hacked by new ToddyCat APT gang (BleepingComputer)
OT:ICEFALL: 56 Vulnerabilities Caused by Insecure-by-Design Practices in OT (Forescout)
From Basecamp to Icefall: Secure by Design OT Makes Little Headway (SecurityWeek)
Dozens of vulnerabilities threaten major OT device makers (Cybersecurity Dive) 
CISA releases 6 Industrial Control Systems Advisories (Cybersecurity and Infrastructure Security Agency) 
Phishing gang behind several million euros worth of losses busted in Belgium and the Netherlands (Europol)
Подполковника УФСБ по Самарской области арестовали за кражу криптовалюты у хакера (TASS)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Fancy Bear sighted in Ukrainian in-boxes. Why Russian cyberattacks against Ukraine have fallen short of expectations. ToddyCat APT is active in European and Asian networks. ICEFALL ICS vulnerabilities described. CISA issues ICS vulnerability advisories. Europol makes nine collars. Andrea Little Limbago from Interos on The global state of data protection and sharing. Rick Howard speaks with Michelangelo Sidagni from NopSec on the Future of Vulnerability Management. We are shocked, shocked, to hear of corruption in the FSB</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/119</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cyberscoop.com/ukraine-russia-hacking-apt28-trickbot-follina/">Ukrainian cybersecurity officials disclose two new hacking campaigns</a> (CyberScoop) </p><p><a href="https://news.bloomberglaw.com/white-collar-and-criminal-law/ukraine-warns-of-new-malware-campaign-tied-to-russian-hackers">Ukraine Warns of New Malware Campaign Tied to Russian Hackers</a> (Bloomberg Law) </p><p><a href="https://www.bleepingcomputer.com/news/security/russian-govt-hackers-hit-ukraine-with-cobalt-strike-credomap-malware/">Russian govt hackers hit Ukraine with Cobalt Strike, CredoMap malware</a> (BleepingComputer) </p><p><a href="https://www.washingtonpost.com/opinions/2022/06/21/russia-ukraine-cyberwar-intelligence-agencies-tech-companies/">Opinion How Russia’s vaunted cyber capabilities were frustrated in Ukraine</a> (Washington Post) </p><p><a href="https://www.infosecurity-magazine.com/news/new-toddycat-apt-targets-ms/">New Toddycat APT Targets MS Exchange Servers in Europe and Asia</a> (Infosecurity Magazine) </p><p><a href="https://www.bleepingcomputer.com/news/security/microsoft-exchange-servers-hacked-by-new-toddycat-apt-gang/">Microsoft Exchange servers hacked by new ToddyCat APT gang</a> (BleepingComputer)</p><p><a href="https://www.forescout.com/blog/ot-icefall-56-vulnerabilities-caused-by-insecure-by-design-practices-in-ot/">OT:ICEFALL: 56 Vulnerabilities Caused by Insecure-by-Design Practices in OT</a> (Forescout)</p><p><a href="https://www.securityweek.com/basecamp-icefall-secure-design-ot-makes-little-headway">From Basecamp to Icefall: Secure by Design OT Makes Little Headway</a> (SecurityWeek)</p><p><a href="https://www.cybersecuritydive.com/news/ot-vulnerabilities-device/625781/">Dozens of vulnerabilities threaten major OT device makers</a> (Cybersecurity Dive) </p><p><a href="https://content.govdelivery.com/accounts/USDHSCISA/bulletins/31d1cb8">CISA releases 6 Industrial Control Systems Advisories</a> (Cybersecurity and Infrastructure Security Agency) </p><p><a href="https://www.europol.europa.eu/media-press/newsroom/news/phishing-gang-behind-several-million-euros-worth-of-losses-busted-in-belgium-and-netherlands">Phishing gang behind several million euros worth of losses busted in Belgium and the Netherlands</a> (Europol)</p><p><a href="https://tass.ru/proisshestviya/14994979">Подполковника УФСБ по Самарской области арестовали за кражу криптовалюты у хакера</a> (TASS)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1735</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b6af110a-7881-11ec-90a9-c7269fbb55b8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3706509469.mp3?updated=1671823909" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberattack suspected in Israeli false alarms. Risk surface assessments. Fitness app geolocation as a security risk. Cyber phases of Russia’ hybrid war. A conviction in the Capital One hacking case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1603/notes</link>
      <description>A Cyberattack is suspected of causing false alarms in Israel. Risk surface assessments. Renewed warning of the potential security risks of fitness apps. Cyber options may grow more attractive to Russia as kinetic operations stall. DDoS in St. Petersburg. Ben Yeling details a Senate bill restricting the sale of location data. Our guest is Jon Check from Raytheon's Intelligence and Space Division discussing the National Collegiate Cyber Defense Competition. A conviction in the Capital One hacking case.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/118

Selected reading.
Suspected cyberattack triggers sirens in Jerusalem, Eilat (Israel Hayom)
Suspected Iranian Cyberattack on Israel Triggers Sirens (Haaretz)
Iranian cyberattack may be behind false rocket warning sirens in Jerusalem (Jerusalem Post) 
Israel suspects Iranian cyber-attack behind false siren alerts (Middle East Monitor) 
Strava fitness app used to spy on Israeli military officials (Computing) 
Treasury's Adeyemo sees elevated cyber threats in wake of Russia's war in Ukraine (Reuters)
More cyber warfare with Russia lies on the horizon (Interesting Engineering)
Prolonged war may make Russia more cyber aggressive, US official says (C4ISRNet) 
What the Russia-Ukraine war means for the future of cyber warfare (The Hill) 
Complex Russian cyber threat requires we go back to basics (ComputerWeekly.com) 
Vladimir Putin speech delayed 'because of cyber-attack' as he hits out at 'economic blitzkrieg' against Russia (Scotsman)
UPDATE 1-Putin's St Petersburg speech postponed by an hour after cyberattack (Yahoo)
Think of the Russia-Ukraine conflict as a microcosm of the cyber war  (SC Magazine)
The link between cyberattacks and war: Gartner (CRN Australia) 
Ex-Amazon Worker Convicted in Capital One Hacking (New York Times)
Jury Convicts Seattle Woman in Massive Capital One Hack (SecurityWeek)
Former Seattle tech worker convicted of wire fraud and computer intrusions (US Attorney’s Office, Western District of Washington)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Jun 2022 20:15:00 -0000</pubDate>
      <itunes:title>Cyberattack suspected in Israeli false alarms. Risk surface assessments. Fitness app geolocation as a security risk. Cyber phases of Russia’ hybrid war. A conviction in the Capital One hacking case.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1603</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A Cyberattack is suspected of causing false alarms in Israel. Risk surface assessments. Renewed warning of the potential security risks of fitness apps. Cyber options may grow more attractive to Russia as kinetic operations stall. DDoS in St. Petersburg. Ben Yeling details a Senate bill restricting the sale of location data. Our guest is Jon Check from Raytheon's Intelligence and Space Division discussing the National Collegiate Cyber Defense Competition. A conviction in the Capital One hacking case.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/118

Selected reading.
Suspected cyberattack triggers sirens in Jerusalem, Eilat (Israel Hayom)
Suspected Iranian Cyberattack on Israel Triggers Sirens (Haaretz)
Iranian cyberattack may be behind false rocket warning sirens in Jerusalem (Jerusalem Post) 
Israel suspects Iranian cyber-attack behind false siren alerts (Middle East Monitor) 
Strava fitness app used to spy on Israeli military officials (Computing) 
Treasury's Adeyemo sees elevated cyber threats in wake of Russia's war in Ukraine (Reuters)
More cyber warfare with Russia lies on the horizon (Interesting Engineering)
Prolonged war may make Russia more cyber aggressive, US official says (C4ISRNet) 
What the Russia-Ukraine war means for the future of cyber warfare (The Hill) 
Complex Russian cyber threat requires we go back to basics (ComputerWeekly.com) 
Vladimir Putin speech delayed 'because of cyber-attack' as he hits out at 'economic blitzkrieg' against Russia (Scotsman)
UPDATE 1-Putin's St Petersburg speech postponed by an hour after cyberattack (Yahoo)
Think of the Russia-Ukraine conflict as a microcosm of the cyber war  (SC Magazine)
The link between cyberattacks and war: Gartner (CRN Australia) 
Ex-Amazon Worker Convicted in Capital One Hacking (New York Times)
Jury Convicts Seattle Woman in Massive Capital One Hack (SecurityWeek)
Former Seattle tech worker convicted of wire fraud and computer intrusions (US Attorney’s Office, Western District of Washington)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Cyberattack is suspected of causing false alarms in Israel. Risk surface assessments. Renewed warning of the potential security risks of fitness apps. Cyber options may grow more attractive to Russia as kinetic operations stall. DDoS in St. Petersburg. Ben Yeling details a Senate bill restricting the sale of location data. Our guest is Jon Check from Raytheon's Intelligence and Space Division discussing the National Collegiate Cyber Defense Competition. A conviction in the Capital One hacking case.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/118</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.israelhayom.com/2022/06/20/suspected-cyberattack-triggers-sirens-in-jerusalem-eilat/">Suspected cyberattack triggers sirens in Jerusalem, Eilat</a> (Israel Hayom)</p><p><a href="https://www.haaretz.com/israel-news/2022-06-20/ty-article/.premium/suspected-iranian-cyberattack-on-israel-triggers-sirens/00000181-7f7b-d07c-a3f7-ff7b66260000">Suspected Iranian Cyberattack on Israel Triggers Sirens</a> (Haaretz)</p><p><a href="https://www.jpost.com/israel-news/article-709867">Iranian cyberattack may be behind false rocket warning sirens in Jerusalem</a> (Jerusalem Post) </p><p><a href="https://www.middleeastmonitor.com/20220620-israel-suspects-iranian-cyber-attack-behind-false-siren-alerts/">Israel suspects Iranian cyber-attack behind false siren alerts</a> (Middle East Monitor) </p><p><a href="https://www.computing.co.uk/news/4051592/strava-fitness-app-spy-israeli-military-officials">Strava fitness app used to spy on Israeli military officials </a>(Computing) </p><p><a href="https://www.reuters.com/world/treasurys-adeyemo-sees-elevated-cyber-threats-wake-russias-war-ukraine-2022-06-17/">Treasury's Adeyemo sees elevated cyber threats in wake of Russia's war in Ukraine</a> (Reuters)</p><p><a href="https://interestingengineering.com/cyber-warfare-war-russia">More cyber warfare with Russia lies on the horizon</a> (Interesting Engineering)</p><p><a href="https://www.c4isrnet.com/cyber/2022/06/17/prolonged-war-may-make-russia-more-cyber-aggressive-us-official-says/">Prolonged war may make Russia more cyber aggressive, US official says</a> (C4ISRNet) </p><p><a href="https://thehill.com/policy/cybersecurity/3526539-what-the-russia-ukraine-war-means-for-the-future-of-cyber-warfare/">What the Russia-Ukraine war means for the future of cyber warfare</a> (The Hill) </p><p><a href="https://www.computerweekly.com/news/252521722/Complex-Russian-cyber-threat-requires-we-go-back-to-basics">Complex Russian cyber threat requires we go back to basics</a> (ComputerWeekly.com) </p><p><a href="https://www.scotsman.com/news/world/vladimir-putin-speech-at-economic-forum-delayed-because-of-cyber-attack-as-he-hits-out-at-economic-blitzkrieg-against-russia-3736114">Vladimir Putin speech delayed 'because of cyber-attack' as he hits out at 'economic blitzkrieg' against Russia</a> (Scotsman)</p><p><a href="https://news.yahoo.com/1-putins-st-petersburg-speech-111913097.html">UPDATE 1-Putin's St Petersburg speech postponed by an hour after cyberattack</a> (Yahoo)</p><p><a href="https://www.scmagazine.com/perspective/critical-infrastructure/think-of-the-russia-ukraine-conflict-as-a-microcosm-of-the-cyber-war-%EF%BF%BC">Think of the Russia-Ukraine conflict as a microcosm of the cyber war </a> (SC Magazine)</p><p><a href="https://www.crn.com.au/news/the-link-between-cyberattacks-and-war-gartner-581583">The link between cyberattacks and war: Gartner</a> (CRN Australia) </p><p><a href="https://www.nytimes.com/2022/06/17/technology/paige-thompson-capital-one-hack.html">Ex-Amazon Worker Convicted in Capital One Hacking</a> (New York Times)</p><p><a href="https://www.securityweek.com/jury-convicts-seattle-woman-massive-capital-one-hack">Jury Convicts Seattle Woman in Massive Capital One Hack</a> (SecurityWeek)</p><p><a href="https://www.justice.gov/usao-wdwa/pr/former-seattle-tech-worker-convicted-wire-fraud-and-computer-intrusions">Former Seattle tech worker convicted of wire fraud and computer intrusions</a> (US Attorney’s Office, Western District of Washington)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1744</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b70c5fd6-7881-11ec-90a9-6f06da468f25]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8597504574.mp3?updated=1671823921" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Interview select: David Ring at RSAC discussing FBI cyber strategy/role in the cyber ecosystem and private sector engagement.</title>
      <description>As we break to observe the Juneteenth holiday, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. In this extended interview, Dave Bittner speaks with FBI Cyber Section Chief David Ring at RSAC discussing FBI cyber strategy/role in the cyber ecosystem and private sector engagement. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 20 Jun 2022 20:00:00 -0000</pubDate>
      <itunes:title>Interview select: David Ring at RSAC discussing FBI Cyber Strategy/role in the cyber ecosystem and private sector engagement.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>As we break to observe the Juneteenth holiday, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. In this extended interview, Dave Bittner speaks with FBI Cyber Section Chief David Ring at RSAC discussing FBI cyber strategy/role in the cyber ecosystem and private sector engagement. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As we break to observe the Juneteenth holiday, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. In this extended interview, Dave Bittner speaks with FBI Cyber Section Chief David Ring at RSAC discussing FBI cyber strategy/role in the cyber ecosystem and private sector engagement. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. <a href="https://thecyberwire.com/pro">Learn more.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>967</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c57f1610-edbd-11ec-bb2e-43538d4e04ec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6725647288.mp3?updated=1655416086" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lauren Van Wazer: You have to be your own North Star. [CISSP] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/105/notes</link>
      <description>Lauren Van Wazer, Vice President, Global Public Policy and Regulatory Affairs for Akamai Technologies, shares her story as she followed her own North Star and landed where she is today. She describes her career path, highlighting how she went from working at AT&amp;T to being able to work in the White House. She shares how she is a coach and a leader to the team she works with now, saying "my view is I've got their back, if they make a mistake, it's my mistake, and if they do well, they've done well." Lauren hopes she's made an impact in the world by making it a little bit better than before, and discusses how she doesn't let anyone stop her from her goals. Lauren shares her outlook on her experiences, calling attention to different roles in her life that made her journey all the better. We thank Lauren for sharing.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 19 Jun 2022 07:00:00 -0000</pubDate>
      <itunes:title>Lauren Van Wazer: You have to be your own North Star. [CISSP] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>105</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Lauren Van Wazer, Vice President, Global Public Policy and Regulatory Affairs for Akamai Technologies, shares her story as she followed her own North Star and landed where she is today. She describes her career path, highlighting how she went from working at AT&amp;T to being able to work in the White House. She shares how she is a coach and a leader to the team she works with now, saying "my view is I've got their back, if they make a mistake, it's my mistake, and if they do well, they've done well." Lauren hopes she's made an impact in the world by making it a little bit better than before, and discusses how she doesn't let anyone stop her from her goals. Lauren shares her outlook on her experiences, calling attention to different roles in her life that made her journey all the better. We thank Lauren for sharing.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Lauren Van Wazer, Vice President, Global Public Policy and Regulatory Affairs for Akamai Technologies, shares her story as she followed her own North Star and landed where she is today. She describes her career path, highlighting how she went from working at AT&amp;T to being able to work in the White House. She shares how she is a coach and a leader to the team she works with now, saying "my view is I've got their back, if they make a mistake, it's my mistake, and if they do well, they've done well." Lauren hopes she's made an impact in the world by making it a little bit better than before, and discusses how she doesn't let anyone stop her from her goals. Lauren shares her outlook on her experiences, calling attention to different roles in her life that made her journey all the better. We thank Lauren for sharing.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>422</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a8b1cf44-edab-11ec-9263-eff09fac5160]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5732206911.mp3?updated=1655393929" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dissecting the Spring4Shell vulnerability. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/237/notes</link>
      <description>Edward Wu, senior principal data scientist at ExtraHop, joins Dave to discuss the company's research, "A Technical Analysis of How Spring4Shell Works." ExtraHop first noticed chatter from social media in March of 2022 on a new remote code execution (RCE) vulnerability and immediately started tracking the issue.
In the research, it describes how the exploit works and breaks down how the ExtraHop team came to identify the Spring4Shell vulnerability. The research describes the severity of the vulnerability, saying, "The impact of an RCE in this framework could have a serious impact similar to Log4Shell."
The research can be found here:
How the Spring4Shell Zero-Day Vulnerability Works

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Jun 2022 07:00:00 -0000</pubDate>
      <itunes:title>Dissecting the Spring4Shell vulnerability. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>237</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Edward Wu, senior principal data scientist at ExtraHop, joins Dave to discuss the company's research, "A Technical Analysis of How Spring4Shell Works." ExtraHop first noticed chatter from social media in March of 2022 on a new remote code execution (RCE) vulnerability and immediately started tracking the issue.
In the research, it describes how the exploit works and breaks down how the ExtraHop team came to identify the Spring4Shell vulnerability. The research describes the severity of the vulnerability, saying, "The impact of an RCE in this framework could have a serious impact similar to Log4Shell."
The research can be found here:
How the Spring4Shell Zero-Day Vulnerability Works

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Edward Wu, senior principal data scientist at ExtraHop, joins Dave to discuss the company's research, "A Technical Analysis of How Spring4Shell Works." ExtraHop first noticed chatter from social media in March of 2022 on a new remote code execution (RCE) vulnerability and immediately started tracking the issue.</p><p>In the research, it describes how the exploit works and breaks down how the ExtraHop team came to identify the Spring4Shell vulnerability. The research describes the severity of the vulnerability, saying, "The impact of an RCE in this framework could have a serious impact similar to Log4Shell."</p><p>The research can be found here:</p><ul><li><a href="https://www.extrahop.com/company/blog/2022/a-technical-analysis-of-how-spring4shell-works/">How the Spring4Shell Zero-Day Vulnerability Works</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1333</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5ec79c42-ee73-11ec-8a90-1361dc2e26b1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6566029928.mp3?updated=1685126855" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Malibot info stealer is no coin miner. "Hermit" spyware. Fabricated evidence in Indian computers. FBI takes down botnet. Assange extradition update. Putting the Service into service learning.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1602/notes</link>
      <description>Malibot is an info stealer masquerading as a coin miner. "Hermit" spyware is being used by nation-state security services. Fabricated evidence is planted in Indian computers. The US takes down a criminal botnet. The British Home Secretary signs the Assange extradition order. We wind up our series of RSA Conference interviews with David London from the Chertoff group and Hugh Njemanze from Anomali. And putting the Service into service learning.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/117

Selected reading.
'MaliBot' Android Malware Steals Financial, Personal Information (SecurityWeek)
F5 Labs Investigates MaliBot (F5 Labs)
Sophisticated Android Spyware 'Hermit' Used by Governments (SecurityWeek)
Lookout Uncovers Android Spyware Deployed in Kazakhstan (Lookout)
Police Linked to Hacking Campaign to Frame Indian Activists (Wired)
U.S., partners dismantle Russian hacking 'botnet,' Justice Dept says (Reuters)
Russian Botnet Disrupted in International Cyber Operation (US Attorney's Office, Southern District of California)
Julian Assange: Priti Patel signs US extradition order (The Telegraph)
AIVD disrupts activities of Russian intelligence officer targeting the International Criminal Court (AIVD)
Alleged Russian spy studied at Johns Hopkins, won ICC internship (Washington Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 17 Jun 2022 20:25:00 -0000</pubDate>
      <itunes:title>Malibot info stealer is no coin miner. "Hermit" spyware. Fabricated evidence in Indian computers. FBI takes down botnet. Assange extradition update. Putting the Service into service learning.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1602</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Malibot is an info stealer masquerading as a coin miner. "Hermit" spyware is being used by nation-state security services. Fabricated evidence is planted in Indian computers. The US takes down a criminal botnet. The British Home Secretary signs the Assange extradition order. We wind up our series of RSA Conference interviews with David London from the Chertoff group and Hugh Njemanze from Anomali. And putting the Service into service learning.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/117

Selected reading.
'MaliBot' Android Malware Steals Financial, Personal Information (SecurityWeek)
F5 Labs Investigates MaliBot (F5 Labs)
Sophisticated Android Spyware 'Hermit' Used by Governments (SecurityWeek)
Lookout Uncovers Android Spyware Deployed in Kazakhstan (Lookout)
Police Linked to Hacking Campaign to Frame Indian Activists (Wired)
U.S., partners dismantle Russian hacking 'botnet,' Justice Dept says (Reuters)
Russian Botnet Disrupted in International Cyber Operation (US Attorney's Office, Southern District of California)
Julian Assange: Priti Patel signs US extradition order (The Telegraph)
AIVD disrupts activities of Russian intelligence officer targeting the International Criminal Court (AIVD)
Alleged Russian spy studied at Johns Hopkins, won ICC internship (Washington Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Malibot is an info stealer masquerading as a coin miner. "Hermit" spyware is being used by nation-state security services. Fabricated evidence is planted in Indian computers. The US takes down a criminal botnet. The British Home Secretary signs the Assange extradition order. We wind up our series of RSA Conference interviews with David London from the Chertoff group and Hugh Njemanze from Anomali. And putting the Service into service learning.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/117</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.securityweek.com/malibot-android-malware-steals-financial-personal-information">'MaliBot' Android Malware Steals Financial, Personal Information</a> (SecurityWeek)</p><p><a href="https://www.f5.com/labs/articles/threat-intelligence/f5-labs-investigates-malibot">F5 Labs Investigates MaliBot</a> (F5 Labs)</p><p><a href="https://www.securityweek.com/sophisticated-android-spyware-hermit-used-governments">Sophisticated Android Spyware 'Hermit' Used by Governments</a> (SecurityWeek)</p><p><a href="https://www.lookout.com/blog/hermit-spyware-discovery">Lookout Uncovers Android Spyware Deployed in Kazakhstan</a> (Lookout)</p><p><a href="https://www.wired.com/story/modified-elephant-planted-evidence-hacking-police/">Police Linked to Hacking Campaign to Frame Indian Activists</a> (Wired)</p><p><a href="https://www.reuters.com/world/us-partners-dismantle-russian-hacking-botnet-justice-dept-says-2022-06-16/">U.S., partners dismantle Russian hacking 'botnet,' Justice Dept says</a> (Reuters)</p><p><a href="https://www.justice.gov/usao-sdca/pr/russian-botnet-disrupted-international-cyber-operation">Russian Botnet Disrupted in International Cyber Operation</a> (US Attorney's Office, Southern District of California)</p><p><a href="https://www.telegraph.co.uk/politics/2022/06/17/julian-assange-priti-patel-signs-us-extradition-order/">Julian Assange: Priti Patel signs US extradition order</a> (The Telegraph)</p><p><a href="https://english.aivd.nl/latest/news/2022/06/16/aivd-disrupts-activities-of-russian-intelligence-officer-targeting-the-international-criminal-court">AIVD disrupts activities of Russian intelligence officer targeting the International Criminal Court</a> (AIVD)</p><p><a href="https://www.washingtonpost.com/world/2022/06/16/russian-spy-infiltrate-icc-netherlands/">Alleged Russian spy studied at Johns Hopkins, won ICC internship</a> (Washington Post)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1815</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5b448c4-7881-11ec-90a9-2f29b91058d9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8659257770.mp3?updated=1671823982" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Interpol scores against BEC, online fraud, and money laundering. Developments in C2C markets. Versioning vulnerability. Cyber war and cyber escalation.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1601/notes</link>
      <description>Interpol coordinates international enforcement action against scammers. A new version of IceXLoader is observed. Exploiting versioning limits to render files inaccessible. Reflections on the first large-scale hybrid war. Kelly Shortridge from Fastly on why behavioral science and economics matters for InfoSec. Patrick Orzechowski from DeepWatch on Russian IoCs and critical infrastructure. And the possibility of cyber escalation in Russia’s hybrid war against Ukraine.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/116

Selected reading.
Hundreds arrested and millions seized in global INTERPOL operation against social engineering scams (Interpol)
New IceXLoader 3.0 – Developers Warm Up to Nim (Fortinet Blog) 
Proofpoint Discovers Potentially Dangerous Microsoft Office 365 Functionality that can Ransom Files Stored on SharePoint and OneDrive (Proofpoint) 
Russia’s cyber fog in the Ukraine war (GIS Reports)
Russia Might Try Reckless Cyber Attacks as Ukraine War Drags On, US Warns (Defense One)
Cyber Attacks in Times of Conflict (CyberPeace Institute)
Vladimir Putin’s Ukraine invasion is the world’s first full-scale cyberwar (Atlantic Council)
Why Russia has refrained from a major cyber-attack against the West (Cyber Security Hub)
In modern war, we have as much to fear from cyber weapons as kinetics (Computing)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 16 Jun 2022 20:30:00 -0000</pubDate>
      <itunes:title>Interpol scores against BEC, online fraud, and money laundering. Developments in C2C markets. Versioning vulnerability. Cyber war and cyber escalation.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1601</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Interpol coordinates international enforcement action against scammers. A new version of IceXLoader is observed. Exploiting versioning limits to render files inaccessible. Reflections on the first large-scale hybrid war. Kelly Shortridge from Fastly on why behavioral science and economics matters for InfoSec. Patrick Orzechowski from DeepWatch on Russian IoCs and critical infrastructure. And the possibility of cyber escalation in Russia’s hybrid war against Ukraine.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/116

Selected reading.
Hundreds arrested and millions seized in global INTERPOL operation against social engineering scams (Interpol)
New IceXLoader 3.0 – Developers Warm Up to Nim (Fortinet Blog) 
Proofpoint Discovers Potentially Dangerous Microsoft Office 365 Functionality that can Ransom Files Stored on SharePoint and OneDrive (Proofpoint) 
Russia’s cyber fog in the Ukraine war (GIS Reports)
Russia Might Try Reckless Cyber Attacks as Ukraine War Drags On, US Warns (Defense One)
Cyber Attacks in Times of Conflict (CyberPeace Institute)
Vladimir Putin’s Ukraine invasion is the world’s first full-scale cyberwar (Atlantic Council)
Why Russia has refrained from a major cyber-attack against the West (Cyber Security Hub)
In modern war, we have as much to fear from cyber weapons as kinetics (Computing)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Interpol coordinates international enforcement action against scammers. A new version of IceXLoader is observed. Exploiting versioning limits to render files inaccessible. Reflections on the first large-scale hybrid war. Kelly Shortridge from Fastly on why behavioral science and economics matters for InfoSec. Patrick Orzechowski from DeepWatch on Russian IoCs and critical infrastructure. And the possibility of cyber escalation in Russia’s hybrid war against Ukraine.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/116</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.interpol.int/News-and-Events/News/2022/Hundreds-arrested-and-millions-seized-in-global-INTERPOL-operation-against-social-engineering-scams">Hundreds arrested and millions seized in global INTERPOL operation against social engineering scams</a> (Interpol)</p><p><a href="https://www.fortinet.com/blog/threat-research/new-icexloader-3-0-developers-warm-up-to-nim">New IceXLoader 3.0 – Developers Warm Up to Nim</a> (Fortinet Blog) </p><p><a href="https://www.proofpoint.com/us/blog/cloud-security/proofpoint-discovers-potentially-dangerous-microsoft-office-365-functionality">Proofpoint Discovers Potentially Dangerous Microsoft Office 365 Functionality that can Ransom Files Stored on SharePoint and OneDrive</a> (Proofpoint) </p><p><a href="https://www.gisreportsonline.com/r/russia-cyber/">Russia’s cyber fog in the Ukraine war</a> (GIS Reports)</p><p><a href="https://www.defenseone.com/threats/2022/06/russia-might-try-reckless-cyber-attacks-ukraine-war-drags-us-warns/368242/">Russia Might Try Reckless Cyber Attacks as Ukraine War Drags On, US Warns</a> (Defense One)</p><p><a href="https://cyberconflicts.cyberpeaceinstitute.org/">Cyber Attacks in Times of Conflict</a> (CyberPeace Institute)</p><p><a href="https://www.atlanticcouncil.org/blogs/ukrainealert/vladimir-putins-ukraine-invasion-is-the-worlds-first-full-scale-cyberwar/">Vladimir Putin’s Ukraine invasion is the world’s first full-scale cyberwar</a> (Atlantic Council)</p><p><a href="https://www.cshub.com/attacks/articles/why-russia-has-refrained-from-a-cyber-attack-against-the-west">Why Russia has refrained from a major cyber-attack against the West</a> (Cyber Security Hub)</p><p><a href="https://www.computing.co.uk/event/4051190/modern-war-fear-cyber-weapons-kinetics">In modern war, we have as much to fear from cyber weapons as kinetics </a>(Computing)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1657</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b63123da-7881-11ec-90a9-87e57d047ccb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1289819974.mp3?updated=1671823993" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hertzbleed, a troublesome feature of processors. Cyberespionage and hybrid war. Patch Tuesday notes. Software bills of materials. Wannabe cybercrooks and criminal publicity stunts.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1600/notes</link>
      <description>The Hertzbleed side-channel issue affects Intel and AMD processors. An Iranian spearphishing campaign prospected former Israeli officials. Patch Tuesday notes. A look at software bills of materials. Russia routes occupied Ukraine's Internet traffic through Russia. Intercepts in the hybrid war: the odd and the ugly. Deepen Desai from ZScaler joins us with the latest numbers on ransomware. Rob Boyce from Accenture Security looks at cyber invisibility. And, finally, criminal wannabes and criminal publicity stunts.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/115

Selected reading.
A new vulnerability in Intel and AMD CPUs lets hackers steal encryption keys (Ars Technica) 
Iranian Spear-Phishing Operation Targets Former Israeli and US High-Ranking Officials (Check Point Research)
Microsoft June 2022 Patch Tuesday fixes 1 zero-day, 55 flaws (BleepingComputer) 
Microsoft Releases June 2022 Security Updates (CISA) 
Windows Updates Patch Actively Exploited 'Follina' Vulnerability (SecurityWeek) 
Adobe Plugs 46 Security Flaws on Patch Tuesday (SecurityWeek)
Citrix Releases Security Updates for Application Delivery Management (CISA)
SAP Releases June 2022 Security Updates (CISA) 
So long, Internet Explorer. The browser retires today (AP NEWS)
SBOM in Action: finding vulnerabilities with a Software Bill of Materials (Google Online Security Blog)
Russia Is Taking Over Ukraine’s Internet (Wired)
Belarusian hacktivist group releases purported Belarusian wiretapped audio of Russian embassy (CyberScoop) 
Intercepted call: Russian plan to send PoWs out into minefields (The Telegraph) 
Hacker Advertises ‘Crappy’ Ransomware on Instagram (Vice) 
LockBit Ransomware Compromise of Mandiant Not Supported by Any Evidence, May Be a PR Move by Cybercrime Gang (CPO Magazine)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 15 Jun 2022 20:15:00 -0000</pubDate>
      <itunes:title>Hertzbleed, a troublesome feature of processors. Cyberespionage and hybrid war. Patch Tuesday notes. Software bills of materials. Wannabe cybercrooks and criminal publicity stunts.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1600</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Hertzbleed side-channel issue affects Intel and AMD processors. An Iranian spearphishing campaign prospected former Israeli officials. Patch Tuesday notes. A look at software bills of materials. Russia routes occupied Ukraine's Internet traffic through Russia. Intercepts in the hybrid war: the odd and the ugly. Deepen Desai from ZScaler joins us with the latest numbers on ransomware. Rob Boyce from Accenture Security looks at cyber invisibility. And, finally, criminal wannabes and criminal publicity stunts.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/115

Selected reading.
A new vulnerability in Intel and AMD CPUs lets hackers steal encryption keys (Ars Technica) 
Iranian Spear-Phishing Operation Targets Former Israeli and US High-Ranking Officials (Check Point Research)
Microsoft June 2022 Patch Tuesday fixes 1 zero-day, 55 flaws (BleepingComputer) 
Microsoft Releases June 2022 Security Updates (CISA) 
Windows Updates Patch Actively Exploited 'Follina' Vulnerability (SecurityWeek) 
Adobe Plugs 46 Security Flaws on Patch Tuesday (SecurityWeek)
Citrix Releases Security Updates for Application Delivery Management (CISA)
SAP Releases June 2022 Security Updates (CISA) 
So long, Internet Explorer. The browser retires today (AP NEWS)
SBOM in Action: finding vulnerabilities with a Software Bill of Materials (Google Online Security Blog)
Russia Is Taking Over Ukraine’s Internet (Wired)
Belarusian hacktivist group releases purported Belarusian wiretapped audio of Russian embassy (CyberScoop) 
Intercepted call: Russian plan to send PoWs out into minefields (The Telegraph) 
Hacker Advertises ‘Crappy’ Ransomware on Instagram (Vice) 
LockBit Ransomware Compromise of Mandiant Not Supported by Any Evidence, May Be a PR Move by Cybercrime Gang (CPO Magazine)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Hertzbleed side-channel issue affects Intel and AMD processors. An Iranian spearphishing campaign prospected former Israeli officials. Patch Tuesday notes. A look at software bills of materials. Russia routes occupied Ukraine's Internet traffic through Russia. Intercepts in the hybrid war: the odd and the ugly. Deepen Desai from ZScaler joins us with the latest numbers on ransomware. Rob Boyce from Accenture Security looks at cyber invisibility. And, finally, criminal wannabes and criminal publicity stunts.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/115</p><p><br></p><h2>Selected reading.</h2><p><a href="https://arstechnica.com/information-technology/2022/06/researchers-exploit-new-intel-and-amd-cpu-flaw-to-steal-encryption-keys/">A new vulnerability in Intel and AMD CPUs lets hackers steal encryption keys</a> (Ars Technica) </p><p><a href="https://research.checkpoint.com/2022/check-point-research-exposes-an-iranian-phishing-campaign-targeting-former-israeli-foreign-minister-former-us-ambassador-idf-general-and-defense-industry-executives/">Iranian Spear-Phishing Operation Targets Former Israeli and US High-Ranking Officials</a> (Check Point Research)</p><p><a href="https://www.bleepingcomputer.com/news/microsoft/microsoft-june-2022-patch-tuesday-fixes-1-zero-day-55-flaws/">Microsoft June 2022 Patch Tuesday fixes 1 zero-day, 55 flaws</a> (BleepingComputer) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/06/14/microsoft-releases-june-2022-security-updates">Microsoft Releases June 2022 Security Updates</a> (CISA) </p><p><a href="https://www.securityweek.com/windows-updates-patch-actively-exploited-follina-vulnerability">Windows Updates Patch Actively Exploited 'Follina' Vulnerability</a> (SecurityWeek) </p><p><a href="https://www.securityweek.com/adobe-plugs-46-security-flaws-patch-tuesday">Adobe Plugs 46 Security Flaws on Patch Tuesday</a> (SecurityWeek)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/06/14/citrix-releases-security-updates-application-delivery-management">Citrix Releases Security Updates for Application Delivery Management</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/06/14/sap-releases-june-2022-security-updates">SAP Releases June 2022 Security Updates</a> (CISA) </p><p><a href="https://apnews.com/article/internet-explorer-shutting-down-e45abf1df9d34c135e41a01cf7d96c25">So long, Internet Explorer. The browser retires today</a> (AP NEWS)</p><p><a href="https://security.googleblog.com/2022/06/sbom-in-action-finding-vulnerabilities.html">SBOM in Action: finding vulnerabilities with a Software Bill of Materials</a> (Google Online Security Blog)</p><p><a href="https://www.wired.com/story/ukraine-russia-internet-takeover/">Russia Is Taking Over Ukraine’s Internet</a> (Wired)</p><p><a href="https://www.cyberscoop.com/belarusian-hacktivist-group-releases-purported-belarusian-wiretapped-audio-of-russian-embassy/">Belarusian hacktivist group releases purported Belarusian wiretapped audio of Russian embassy</a> (CyberScoop) </p><p><a href="https://www.telegraph.co.uk/world-news/2022/06/14/russia-discusses-sending-ukrainian-pows-minefields-set-bombs/">Intercepted call: Russian plan to send PoWs out into minefields</a> (The Telegraph) </p><p><a href="https://www.vice.com/en/article/jgpe7g/hacker-advertises-crappy-ransomware-on-instagram">Hacker Advertises ‘Crappy’ Ransomware on Instagram</a> (Vice) </p><p><a href="https://www.cpomagazine.com/cyber-security/lockbit-ransomware-compromise-of-mandiant-not-supported-by-any-evidence-may-be-a-pr-move-by-cybercrime-gang/">LockBit Ransomware Compromise of Mandiant Not Supported by Any Evidence, May Be a PR Move by Cybercrime Gang</a> (CPO Magazine)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1730</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b68fa2fc-7881-11ec-90a9-6bc6d6385642]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1053334152.mp3?updated=1671824132" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dealing with Follina. SeaFlower steals cryptocurrencies. Cyber phases of a hybrid war, with some skeptical notes on Anonymous. And the war’s effect on the underworld.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1599/notes</link>
      <description>Dealing with the GRU's exploitation of the Follina vulnerabilities. SeaFlower uses stolen seed phrases to rifle cryptocurrency wallets. Ukraine moves sensitive data abroad. Anonymous claims to have hacked Russia's drone suppliers and to have hit sensitive targets in Belarus. Rick Howard reports on an NSA briefing at the RSA Conference. Our guest is Ricardo Amper from Incode with a look at biometrics in sports stadiums. And the effects of war on the cyber underworld.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/114

Selected reading.
Follina flaw being exploited by Russian hackers, info stealers (Computing) 
Chinese Hackers Adding Backdoor to iOS, Android Web3 Wallets in 'SeaFlower' Campaign (SecurityWeek)
How SeaFlower...installs backdoors in iOS/Android web3 wallets to steal your seed phrase (Medium) 
Ukraine Has Begun Moving Sensitive Data Outside Its Borders (Wall Street Journal) 
Anonymous claims hack on Russian drones (Computing) 
How the Cybercrime Landscape has been Changed following the Russia-Ukraine War (Kela)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Jun 2022 20:40:00 -0000</pubDate>
      <itunes:title>Dealing with Follina. SeaFlower steals cryptocurrencies. Cyber phases of a hybrid war, with some skeptical notes on Anonymous. And the war’s effect on the underworld.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1599</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dealing with the GRU's exploitation of the Follina vulnerabilities. SeaFlower uses stolen seed phrases to rifle cryptocurrency wallets. Ukraine moves sensitive data abroad. Anonymous claims to have hacked Russia's drone suppliers and to have hit sensitive targets in Belarus. Rick Howard reports on an NSA briefing at the RSA Conference. Our guest is Ricardo Amper from Incode with a look at biometrics in sports stadiums. And the effects of war on the cyber underworld.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/114

Selected reading.
Follina flaw being exploited by Russian hackers, info stealers (Computing) 
Chinese Hackers Adding Backdoor to iOS, Android Web3 Wallets in 'SeaFlower' Campaign (SecurityWeek)
How SeaFlower...installs backdoors in iOS/Android web3 wallets to steal your seed phrase (Medium) 
Ukraine Has Begun Moving Sensitive Data Outside Its Borders (Wall Street Journal) 
Anonymous claims hack on Russian drones (Computing) 
How the Cybercrime Landscape has been Changed following the Russia-Ukraine War (Kela)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dealing with the GRU's exploitation of the Follina vulnerabilities. SeaFlower uses stolen seed phrases to rifle cryptocurrency wallets. Ukraine moves sensitive data abroad. Anonymous claims to have hacked Russia's drone suppliers and to have hit sensitive targets in Belarus. Rick Howard reports on an NSA briefing at the RSA Conference. Our guest is Ricardo Amper from Incode with a look at biometrics in sports stadiums. And the effects of war on the cyber underworld.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/114</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.computing.co.uk/news/4051248/follina-flaw-exploited-russian-hackers-info-stealers">Follina flaw being exploited by Russian hackers, info stealers </a>(Computing) </p><p><a href="https://www.securityweek.com/chinese-hackers-adding-backdoor-ios-android-web3-wallets-seaflower-campaign">Chinese Hackers Adding Backdoor to iOS, Android Web3 Wallets in 'SeaFlower' Campaign</a> (SecurityWeek)</p><p><a href="https://blog.confiant.com/how-seaflower-%E8%97%8F%E6%B5%B7%E8%8A%B1-installs-backdoors-in-ios-android-web3-wallets-to-steal-your-seed-phrase-d25f0ccdffce">How SeaFlower...installs backdoors in iOS/Android web3 wallets to steal your seed phrase</a> (Medium) </p><p><a href="https://www.wsj.com/articles/ukraine-has-begun-moving-sensitive-data-outside-its-borders-11655199002?mod=djemCybersecruityPro&amp;tpl=cy">Ukraine Has Begun Moving Sensitive Data Outside Its Borders</a> (Wall Street Journal) </p><p><a href="https://www.computing.co.uk/news/4051258/anonymous-claims-hacks-russian-drones">Anonymous claims hack on Russian drones </a>(Computing) </p><p><a href="https://ke-la.com/how-the-cybercrime-landscape-has-been-changed-following-the-russia-ukraine-war/">How the Cybercrime Landscape has been Changed following the Russia-Ukraine War</a> (Kela)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1539</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b72b977a-7881-11ec-90a9-43b2dd8d51b3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3590446471.mp3?updated=1671824143" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A new RAT from Beijing. Muslim hacktivism in India. Ukraine reports a GRU spam campaign against media outlets. A Moscow court fines Wikimedia. And that UK cyber disaster was just a promo. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1598/notes</link>
      <description>A Chinese APT deploys a new cyberespionage tool. Hacktivism roils India after a politician's remarks about the Prophet. Ukraine reports a "massive" spam campaign against the country's media organizations. A Russian court fines Wikimedia for "disinformation." From the NSA’s Cybersecurity Collaboration Center our guests are Morgan Adamski and Josh Zaritsky. Rick Howard sets the cyber sand table on Colonial Pipeline. And the Martians haven’t landed, and the Right Honorable Mr. Johnson is still PM.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/113

Selected reading.
CERT-UA warns of cyberattack on Ukrainian media (Interfax-Ukraine)
Russian hackers start targeting Ukraine with Follina exploits (BleepingComputer)
Massive cyber attack on media organizations of Ukraine using the malicious program CrescentImp (CERT-UA # 4797) (CERT-UA)
Wikimedia Foundation appeals Russian fine over Ukraine war articles (The Verge)
GALLIUM Expands Targeting Across Telecommunications, Government and Finance Sectors With New PingPull Tool (Unit42)
Prophet remark: Slew of cyber attacks on Indian govt, private sites (The Times of India)
70 Indian government, private websites face international cyber attacks over Prophet row (The Times of India)
Channel 4 faces Ofcom probe over ’emergency news’ stunt to promote cyber attack drama The Undeclared War (INews)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 13 Jun 2022 20:30:00 -0000</pubDate>
      <itunes:title>A new RAT from Beijing. Muslim hacktivism in India. Ukraine reports a GRU spam campaign against media outlets. A Moscow court fines Wikimedia. And that UK cyber disaster was just a promo.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1598</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A Chinese APT deploys a new cyberespionage tool. Hacktivism roils India after a politician's remarks about the Prophet. Ukraine reports a "massive" spam campaign against the country's media organizations. A Russian court fines Wikimedia for "disinformation." From the NSA’s Cybersecurity Collaboration Center our guests are Morgan Adamski and Josh Zaritsky. Rick Howard sets the cyber sand table on Colonial Pipeline. And the Martians haven’t landed, and the Right Honorable Mr. Johnson is still PM.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/113

Selected reading.
CERT-UA warns of cyberattack on Ukrainian media (Interfax-Ukraine)
Russian hackers start targeting Ukraine with Follina exploits (BleepingComputer)
Massive cyber attack on media organizations of Ukraine using the malicious program CrescentImp (CERT-UA # 4797) (CERT-UA)
Wikimedia Foundation appeals Russian fine over Ukraine war articles (The Verge)
GALLIUM Expands Targeting Across Telecommunications, Government and Finance Sectors With New PingPull Tool (Unit42)
Prophet remark: Slew of cyber attacks on Indian govt, private sites (The Times of India)
70 Indian government, private websites face international cyber attacks over Prophet row (The Times of India)
Channel 4 faces Ofcom probe over ’emergency news’ stunt to promote cyber attack drama The Undeclared War (INews)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Chinese APT deploys a new cyberespionage tool. Hacktivism roils India after a politician's remarks about the Prophet. Ukraine reports a "massive" spam campaign against the country's media organizations. A Russian court fines Wikimedia for "disinformation." From the NSA’s Cybersecurity Collaboration Center our guests are Morgan Adamski and Josh Zaritsky. Rick Howard sets the cyber sand table on Colonial Pipeline. And the Martians haven’t landed, and the Right Honorable Mr. Johnson is still PM.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/113</p><p><br></p><h2>Selected reading.</h2><p><a href="https://en.interfax.com.ua/news/general/838492.html">CERT-UA warns of cyberattack on Ukrainian media</a> (Interfax-Ukraine)</p><p><a href="https://www.bleepingcomputer.com/news/security/russian-hackers-start-targeting-ukraine-with-follina-exploits/">Russian hackers start targeting Ukraine with Follina exploits</a> (BleepingComputer)</p><p><a href="https://cert.gov.ua/article/160530">Massive cyber attack on media organizations of Ukraine using the malicious program CrescentImp (CERT-UA # 4797)</a> (CERT-UA)</p><p><a href="https://www.theverge.com/2022/6/13/23164768/wikimedia-foundation-appeals-russian-court-disinformation-decision-ukraine-war-articles">Wikimedia Foundation appeals Russian fine over Ukraine war articles</a> (The Verge)</p><p><a href="https://unit42.paloaltonetworks.com/pingpull-gallium/#Protections-and-Mitigations">GALLIUM Expands Targeting Across Telecommunications, Government and Finance Sectors With New PingPull Tool</a> (Unit42)</p><p><a href="https://timesofindia.indiatimes.com/city/hyderabad/prophet-remark-slew-of-cyber-attacks-on-indian-govt-private-sites/articleshow/92168292.cms">Prophet remark: Slew of cyber attacks on Indian govt, private sites</a> (The Times of India)</p><p><a href="https://timesofindia.indiatimes.com/india/70-indian-government-private-websites-face-international-cyber-attacks-over-prophet-row/articleshow/92167143.cms">70 Indian government, private websites face international cyber attacks over Prophet row</a> (The Times of India)</p><p><a href="https://inews.co.uk/culture/television/channel-4-faces-ofcom-probe-over-emergency-news-stunt-to-promote-cyber-attack-drama-the-undeclared-war-1678066">Channel 4 faces Ofcom probe over ’emergency news’ stunt to promote cyber attack drama The Undeclared War</a> (INews)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1560</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7898420-7881-11ec-90a9-5b5a79d87a68]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1318450593.mp3?updated=1671824155" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Deepen Desai: A doctor in computer viruses. [CISO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/104/notes</link>
      <description>Deepen Desai, Global Chief Information Security Officer at Zscaler, shares his story as a doctor that treats computer viruses. He describes how he got into the security field and his work with Zscaler. He says what it's like learning and growing in this field and shares great advice for people who are up and coming in the field. Deepen describes working with an incredible team and how much joy it brings him to see his team learning and growing beyond their roles working with him. He says he want's to be remembered as a mentor among his colleagues. He says "I still remember my first team that I built, 15 years ago. Most of those guys are leading key technologies at many of the major security vendors, and some of them are still with me." We thank Deepen for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 12 Jun 2022 07:00:00 -0000</pubDate>
      <itunes:title>Deepen Desai: A doctor in computer viruses. [CISO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>104</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Deepen Desai, Global Chief Information Security Officer at Zscaler, shares his story as a doctor that treats computer viruses. He describes how he got into the security field and his work with Zscaler. He says what it's like learning and growing in this field and shares great advice for people who are up and coming in the field. Deepen describes working with an incredible team and how much joy it brings him to see his team learning and growing beyond their roles working with him. He says he want's to be remembered as a mentor among his colleagues. He says "I still remember my first team that I built, 15 years ago. Most of those guys are leading key technologies at many of the major security vendors, and some of them are still with me." We thank Deepen for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Deepen Desai, Global Chief Information Security Officer at Zscaler, shares his story as a doctor that treats computer viruses. He describes how he got into the security field and his work with Zscaler. He says what it's like learning and growing in this field and shares great advice for people who are up and coming in the field. Deepen describes working with an incredible team and how much joy it brings him to see his team learning and growing beyond their roles working with him. He says he want's to be remembered as a mentor among his colleagues. He says "I still remember my first team that I built, 15 years ago. Most of those guys are leading key technologies at many of the major security vendors, and some of them are still with me." We thank Deepen for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>483</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0f48b6f6-e824-11ec-8eca-0f67bf7af100]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3329178167.mp3?updated=1654796951" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New developments in the WSL attack. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/236/notes</link>
      <description>Danny Adamitis from Lumen's Black Lotus Labs, joins Dave to discuss new developments in the WSL attack surface. Since September 2021, Black Lotus Labs have been monitoring malware repositories as a part of their proactive threat hunting process. Danny shares how researchers discovered a series of suspicious ELF files compiled for Debian Linux .
The research states how the team identified a series of samples that target the WSL environment, were uploaded every two to three weeks and that they started as early as May 3, 2021 and go until August 22, 20221.
The research can be found here:

Windows Subsystem For Linux (WSL): Threats Still Lurk Below The (Sub)Surface

No Longer Just Theory: Black Lotus Labs Uncovers Linux Executables Deployed As Stealth Windows Loaders


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Jun 2022 07:00:00 -0000</pubDate>
      <itunes:title>New developments in the WSL attack. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>236</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Danny Adamitis from Lumen's Black Lotus Labs, joins Dave to discuss new developments in the WSL attack surface. Since September 2021, Black Lotus Labs have been monitoring malware repositories as a part of their proactive threat hunting process. Danny shares how researchers discovered a series of suspicious ELF files compiled for Debian Linux .
The research states how the team identified a series of samples that target the WSL environment, were uploaded every two to three weeks and that they started as early as May 3, 2021 and go until August 22, 20221.
The research can be found here:

Windows Subsystem For Linux (WSL): Threats Still Lurk Below The (Sub)Surface

No Longer Just Theory: Black Lotus Labs Uncovers Linux Executables Deployed As Stealth Windows Loaders


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Danny Adamitis from Lumen's Black Lotus Labs, joins Dave to discuss new developments in the WSL attack surface. Since September 2021, Black Lotus Labs have been monitoring malware repositories as a part of their proactive threat hunting process. Danny shares how researchers discovered a series of suspicious ELF files compiled for Debian Linux .</p><p>The research states how the team identified a series of samples that target the WSL environment, were uploaded every two to three weeks and that they started as early as May 3, 2021 and go until August 22, 20221.</p><p>The research can be found here:</p><ul>
<li><a href="https://blog.lumen.com/windows-subsystem-for-linux-wsl-threats/">Windows Subsystem For Linux (WSL): Threats Still Lurk Below The (Sub)Surface</a></li>
<li><a href="https://blog.lumen.com/no-longer-just-theory-black-lotus-labs-uncovers-linux-executables-deployed-as-stealth-windows-loaders/">No Longer Just Theory: Black Lotus Labs Uncovers Linux Executables Deployed As Stealth Windows Loaders</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1330</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5028c158-e765-11ec-9ff7-37d18fc6bba8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3696595059.mp3?updated=1685126838" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The cautionary example of a hybrid war. SentinelOne finds a Chinese APT operating quietly since 2012.  A hardware vulnerability in Apple M1 chips. And go, Tigers.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1597/notes</link>
      <description>Looking at Russia's hybrid war as a cautionary example. Russia warns, again, that it will meet cyberattacks with appropriate retaliation. (China says "us too.") NSA and FBI warn of nation-state cyber threats. SentinelOne finds a Chinese APT that's been operating, quietly, for a decade. "Unpatchable" vulnerability in Apple chips reported. We’ve got more interviews from RSA Conference, including the FBI’s Cyber Section Chief David Ring, ExtraHop’s CEO, Patrick Dennis. And the overhead projector said, “Go Tigers.”

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/112

Selected reading.
Top Senate Democrats sound the alarm about Russian interference in the 2022 midterms (Business Insider) 
Russia says West risks ‘direct military clash’ over cyberattacks (NBC News)
Russia, China, oppose US cyber support of Ukraine (Register) 
#RSAC: NSA Outlines Threats from Russia, China and Ransomware (Infosecurity Magazine) 
FBI official: Chinese hackers boost recon efforts (The Record by Recorded Future) 
Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years (SentinelOne) 
MIT researchers uncover ‘unpatchable’ flaw in Apple M1 chips (TechCrunch)
New Jersey school district forced to cancel final exams amid ransomware recovery effort (The Record by Recorded Future)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 10 Jun 2022 20:20:00 -0000</pubDate>
      <itunes:title>The cautionary example of a hybrid war. SentinelOne finds a Chinese APT operating quietly since 2012.  A hardware vulnerability in Apple M1 chips. And go, Tigers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1597</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Looking at Russia's hybrid war as a cautionary example. Russia warns, again, that it will meet cyberattacks with appropriate retaliation. (China says "us too.") NSA and FBI warn of nation-state cyber threats. SentinelOne finds a Chinese APT that's been operating, quietly, for a decade. "Unpatchable" vulnerability in Apple chips reported. We’ve got more interviews from RSA Conference, including the FBI’s Cyber Section Chief David Ring, ExtraHop’s CEO, Patrick Dennis. And the overhead projector said, “Go Tigers.”

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/112

Selected reading.
Top Senate Democrats sound the alarm about Russian interference in the 2022 midterms (Business Insider) 
Russia says West risks ‘direct military clash’ over cyberattacks (NBC News)
Russia, China, oppose US cyber support of Ukraine (Register) 
#RSAC: NSA Outlines Threats from Russia, China and Ransomware (Infosecurity Magazine) 
FBI official: Chinese hackers boost recon efforts (The Record by Recorded Future) 
Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years (SentinelOne) 
MIT researchers uncover ‘unpatchable’ flaw in Apple M1 chips (TechCrunch)
New Jersey school district forced to cancel final exams amid ransomware recovery effort (The Record by Recorded Future)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Looking at Russia's hybrid war as a cautionary example. Russia warns, again, that it will meet cyberattacks with appropriate retaliation. (China says "us too.") NSA and FBI warn of nation-state cyber threats. SentinelOne finds a Chinese APT that's been operating, quietly, for a decade. "Unpatchable" vulnerability in Apple chips reported. We’ve got more interviews from RSA Conference, including the FBI’s Cyber Section Chief David Ring, ExtraHop’s CEO, Patrick Dennis. And the overhead projector said, “Go Tigers.”</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/112</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.businessinsider.com/senate-dems-sound-the-alarm-about-russian-interference-in-2022-2022-6">Top Senate Democrats sound the alarm about Russian interference in the 2022 midterms</a> (Business Insider) </p><p><a href="https://www.nbcnews.com/tech/security/russia-says-west-risks-direct-military-clash-cyber-attacks-rcna32810">Russia says West risks ‘direct military clash’ over cyberattacks</a> (NBC News)</p><p><a href="https://www.theregister.com/2022/06/10/russia_china_usa_ukraine_cyberdefense/">Russia, China, oppose US cyber support of Ukraine</a> (Register) </p><p><a href="https://www.infosecurity-magazine.com/news/rsac-nsa-outlines-threats/">#RSAC: NSA Outlines Threats from Russia, China and Ransomware</a> (Infosecurity Magazine) </p><p><a href="https://therecord.media/fbi-official-chinese-hackers-boost-recon-efforts/">FBI official: Chinese hackers boost recon efforts</a> (The Record by Recorded Future) </p><p><a href="https://www.sentinelone.com/labs/aoqin-dragon-newly-discovered-chinese-linked-apt-has-been-quietly-spying-on-organizations-for-10-years/">Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years</a> (SentinelOne) </p><p><a href="https://techcrunch.com/2022/06/10/apple-m1-unpatchable-flaw/">MIT researchers uncover ‘unpatchable’ flaw in Apple M1 chips</a> (TechCrunch)</p><p><a href="https://therecord.media/new-jersey-school-district-forced-to-cancel-final-exams-amid-ransomware-recovery-effort/">New Jersey school district forced to cancel final exams amid ransomware recovery effort</a> (The Record by Recorded Future)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1880</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b595034c-7881-11ec-90a9-ebfe9b39098c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4400803808.mp3?updated=1671824172" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Updates on the hybrid war: hacktivism and hunting forward. Election security. Trends in phishing. The return of Emotet.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1596/notes</link>
      <description>Another hacked broadcast in a hybrid war. Hunting forward as an exercise in threat intelligence collection and sharing. Cyber threats to the US midterm elections. Phishing for cryptocurrency. FakeCrack delivers a malicious payload to the unwary. Vacations are back. So is travel-themed phishbait. Ann Johnson from Microsoft shares insights on the trends she’s tracking here at RSA. Johannes Ullrich brings highlights from his RSA conference panel discussion. And Emotet returns, in the company of some old familiar criminal collaborators.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/111

Selected reading.
Hacked Russian radio station broadcasts Ukrainian anthem (Washington Post) 
Ukraine Successfully Defends Its Cyberspace While Russia Leans Heavily on Guns, Bombs (CNET)
Ukraine war: US cyber chief on Kyiv's advantage over Russia (Sky News)
NSA Director Confirms Cyber Command 'Hunt Forward' Approach Applies to Russia (ClearanceJobs) 
Experts, NSA cyber director say ransomware could threaten campaigns in 2022 (CyberScoop)
Ransomware, botnets could plague 2022 midterms, NSA cyber director says (The Record by Recorded Future)
How Cyber Criminals Target Cryptocurrency (Proofpoint)
Crypto stealing campaign spread via fake cracked software (Avast)
Threat Actors Prepare Travel-Themed Phishing Lures for Summer Holidays (Hot for Security)
Emotet Malware Returns in 2022 (Deep Instinct)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 09 Jun 2022 20:15:00 -0000</pubDate>
      <itunes:title>Updates on the hybrid war: hacktivism and hunting forward. Election security. Trends in phishing. The return of Emotet.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1596</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Another hacked broadcast in a hybrid war. Hunting forward as an exercise in threat intelligence collection and sharing. Cyber threats to the US midterm elections. Phishing for cryptocurrency. FakeCrack delivers a malicious payload to the unwary. Vacations are back. So is travel-themed phishbait. Ann Johnson from Microsoft shares insights on the trends she’s tracking here at RSA. Johannes Ullrich brings highlights from his RSA conference panel discussion. And Emotet returns, in the company of some old familiar criminal collaborators.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/111

Selected reading.
Hacked Russian radio station broadcasts Ukrainian anthem (Washington Post) 
Ukraine Successfully Defends Its Cyberspace While Russia Leans Heavily on Guns, Bombs (CNET)
Ukraine war: US cyber chief on Kyiv's advantage over Russia (Sky News)
NSA Director Confirms Cyber Command 'Hunt Forward' Approach Applies to Russia (ClearanceJobs) 
Experts, NSA cyber director say ransomware could threaten campaigns in 2022 (CyberScoop)
Ransomware, botnets could plague 2022 midterms, NSA cyber director says (The Record by Recorded Future)
How Cyber Criminals Target Cryptocurrency (Proofpoint)
Crypto stealing campaign spread via fake cracked software (Avast)
Threat Actors Prepare Travel-Themed Phishing Lures for Summer Holidays (Hot for Security)
Emotet Malware Returns in 2022 (Deep Instinct)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Another hacked broadcast in a hybrid war. Hunting forward as an exercise in threat intelligence collection and sharing. Cyber threats to the US midterm elections. Phishing for cryptocurrency. FakeCrack delivers a malicious payload to the unwary. Vacations are back. So is travel-themed phishbait. Ann Johnson from Microsoft shares insights on the trends she’s tracking here at RSA. Johannes Ullrich brings highlights from his RSA conference panel discussion. And Emotet returns, in the company of some old familiar criminal collaborators.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/111</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.washingtonpost.com/world/2022/06/09/russia-radio-station-hacked-ukraine-anthem-kommersant/">Hacked Russian radio station broadcasts Ukrainian anthem</a> (Washington Post) </p><p><a href="https://www.cnet.com/tech/services-and-software/ukraine-successfully-defends-its-cyberspace-as-russia-relies-on-conventional-weapons/">Ukraine Successfully Defends Its Cyberspace While Russia Leans Heavily on Guns, Bombs</a> (CNET)</p><p><a href="https://news.sky.com/story/ukraine-war-us-cyber-chief-on-kyivs-advantage-over-russia-12628869">Ukraine war: US cyber chief on Kyiv's advantage over Russia</a> (Sky News)</p><p><a href="https://news.clearancejobs.com/2022/06/07/nakasone-confirms-lines-between-cyber-offense-and-defense-have-to-be-blurred/">NSA Director Confirms Cyber Command 'Hunt Forward' Approach Applies to Russia</a> (ClearanceJobs) </p><p><a href="https://www.cyberscoop.com/election-security-microsoft-phishing-google-ransomware/">Experts, NSA cyber director say ransomware could threaten campaigns in 2022</a> (CyberScoop)</p><p><a href="https://therecord.media/ransomware-botnets-could-plague-2022-midterms-nsa-cyber-director-says/">Ransomware, botnets could plague 2022 midterms, NSA cyber director says</a> (The Record by Recorded Future)</p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/how-cyber-criminals-target-cryptocurrency">How Cyber Criminals Target Cryptocurrency</a> (Proofpoint)</p><p><a href="https://blog.avast.com/fakecrack-campaign">Crypto stealing campaign spread via fake cracked software</a> (Avast)</p><p><a href="https://www.bitdefender.com/blog/hotforsecurity/threat-actors-prepare-travel-themed-phishing-lures-for-summer-holidays/">Threat Actors Prepare Travel-Themed Phishing Lures for Summer Holidays</a> (Hot for Security)</p><p><a href="https://www.deepinstinct.com/blog/emotet-malware-returns-in-2022">Emotet Malware Returns in 2022</a> (Deep Instinct)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1656</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b650c866-7881-11ec-90a9-3f93227edfd0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7921006817.mp3?updated=1671824181" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber war: a continuing threat, a blurry line between combatants and noncombatants. Chinese cyberespionage and its “plumbing.” CISA adds Known Exploited Vulnerabilities. News from Jersey.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1595/notes</link>
      <description>US officials continue to rate the threat of Russian cyberattack as high. Civilians in cyber war. Broadcast interference and propaganda. A Joint CISA/FBI warning of Chinese cyberespionage. What gets a vulnerability into the Known Exploited Vulnerabilities Catalog? Andrea Little Limbago from Interos and Mike Sentonas from Crowdstrike join us with previews of their RSA conference presentations. And, finally, some Jersey-based cyber campaigns (that’s the Bailiwick, not the Garden State).

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/110

Selected reading.
Russian Cyber Threat Remains High, U.S. Officials Say (Wall Street Journal)
Shields Up: The New Normal (CyberScoop)
Russian Government, Cybercriminal Cooperation a 'Force Multiplier' (Decipher) 
Opinion The U.S.-Russia conflict is heating up — in cyberspace (Washington Post) 
Smartphones Blur the Line Between Civilian and Combatant (Wired)
Russian Cyberattack Hits Wales-Ukraine Football Broadcast (Gov Info Security) 
People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices (CISA)
US agencies detail the digital ‘plumbing’ used by Chinese state-sponsored hackers (The Record by Recorded Future) 
CISA Provides Criteria and Process for Updates to the KEV Catalog (CISA)
Reducing the Significant Risk of Known Exploited Vulnerabilities (CISA)
Jersey computers used in international cyber-attacks (Jersey Evening Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 08 Jun 2022 20:15:00 -0000</pubDate>
      <itunes:title>Cyber war: a continuing threat, a blurry line between combatants and noncombatants. Chinese cyberespionage and its “plumbing.” CISA adds Known Exploited Vulnerabilities. News from Jersey.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1595</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>US officials continue to rate the threat of Russian cyberattack as high. Civilians in cyber war. Broadcast interference and propaganda. A Joint CISA/FBI warning of Chinese cyberespionage. What gets a vulnerability into the Known Exploited Vulnerabilities Catalog? Andrea Little Limbago from Interos and Mike Sentonas from Crowdstrike join us with previews of their RSA conference presentations. And, finally, some Jersey-based cyber campaigns (that’s the Bailiwick, not the Garden State).

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/110

Selected reading.
Russian Cyber Threat Remains High, U.S. Officials Say (Wall Street Journal)
Shields Up: The New Normal (CyberScoop)
Russian Government, Cybercriminal Cooperation a 'Force Multiplier' (Decipher) 
Opinion The U.S.-Russia conflict is heating up — in cyberspace (Washington Post) 
Smartphones Blur the Line Between Civilian and Combatant (Wired)
Russian Cyberattack Hits Wales-Ukraine Football Broadcast (Gov Info Security) 
People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices (CISA)
US agencies detail the digital ‘plumbing’ used by Chinese state-sponsored hackers (The Record by Recorded Future) 
CISA Provides Criteria and Process for Updates to the KEV Catalog (CISA)
Reducing the Significant Risk of Known Exploited Vulnerabilities (CISA)
Jersey computers used in international cyber-attacks (Jersey Evening Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>US officials continue to rate the threat of Russian cyberattack as high. Civilians in cyber war. Broadcast interference and propaganda. A Joint CISA/FBI warning of Chinese cyberespionage. What gets a vulnerability into the Known Exploited Vulnerabilities Catalog? Andrea Little Limbago from Interos and Mike Sentonas from Crowdstrike join us with previews of their RSA conference presentations. And, finally, some Jersey-based cyber campaigns (that’s the Bailiwick, not the Garden State).</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/110</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.wsj.com/articles/russian-cyber-threat-remains-high-u-s-officials-say-11654647242?mod=djemCybersecruityPro&amp;tpl=cy">Russian Cyber Threat Remains High, U.S. Officials Say</a> (Wall Street Journal)</p><p><a href="https://www.cyberscoop.com/shields-up-easterly-inglis-op-ed/">Shields Up: The New Normal</a> (CyberScoop)</p><p><a href="https://duo.com/decipher/russian-government-cybercriminal-cooperation-a-force-multiplier">Russian Government, Cybercriminal Cooperation a 'Force Multiplier'</a> (Decipher) </p><p><a href="https://www.washingtonpost.com/opinions/2022/06/07/us-russia-conflict-is-heating-up-cyberspace/">Opinion The U.S.-Russia conflict is heating up — in cyberspace</a> (Washington Post) </p><p><a href="https://www.wired.com/story/smartphones-ukraine-civilian-combatant/">Smartphones Blur the Line Between Civilian and Combatant</a> (Wired)</p><p><a href="https://www.govinfosecurity.com/russian-cyberattack-hits-wales-ukraine-football-broadcast-a-19228">Russian Cyberattack Hits Wales-Ukraine Football Broadcast</a> (Gov Info Security) </p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-158a">People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices</a> (CISA)</p><p><a href="https://therecord.media/us-agencies-detail-the-digital-plumbing-used-by-chinese-state-sponsored-hackers/">US agencies detail the digital ‘plumbing’ used by Chinese state-sponsored hackers</a> (The Record by Recorded Future) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/06/07/cisa-provides-criteria-and-process-updates-kev-catalog">CISA Provides Criteria and Process for Updates to the KEV Catalog</a> (CISA)</p><p><a href="https://www.cisa.gov/known-exploited-vulnerabilities">Reducing the Significant Risk of Known Exploited Vulnerabilities</a> (CISA)</p><p><a href="https://jerseyeveningpost.com/news/2022/06/06/jersey-computers-used-in-international-cyber-attacks/">Jersey computers used in international cyber-attacks</a> (Jersey Evening Post)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1765</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b67031ce-7881-11ec-90a9-73bf26314282]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7987605962.mp3?updated=1671824194" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA22-158A – People’s Republic of China state-sponsored cyber actors exploit network providers and devices. [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/21/notes</link>
      <description>This joint Cybersecurity Advisory describes the ways in which People’s Republic of China state-sponsored cyber actors continue to exploit publicly known vulnerabilities in order to establish a broad network of compromised global infrastructure. These actors use the network to exploit a wide variety of targets worldwide, including public and private sector organizations.
AA22-158A Alert, Technical Details, and Mitigations
Refer to China Cyber Threat and Advisories, Internet Crime Complaint Center, and NSA Cybersecurity Guidance for previous reporting on People’s Republic of China state-sponsored malicious cyber activity.
US government and critical infrastructure organizations should consider signing up for CISA’s cyber hygiene services, including vulnerability scanning, to help reduce exposure to threats.
US Defense Industrial Base organizations should consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System (PDNS) services, vulnerability scanning, and threat intelligence collaboration. For more information on eligibility criteria and how to enroll in these services, email dib_defense@cyber.nsa.gov.
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 08 Jun 2022 13:45:00 -0000</pubDate>
      <itunes:title>CISA Alert AA22-158A – People’s Republic of China state-sponsored cyber actors exploit network providers and devices. [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>21</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This joint Cybersecurity Advisory describes the ways in which People’s Republic of China state-sponsored cyber actors continue to exploit publicly known vulnerabilities in order to establish a broad network of compromised global infrastructure. These actors use the network to exploit a wide variety of targets worldwide, including public and private sector organizations.
AA22-158A Alert, Technical Details, and Mitigations
Refer to China Cyber Threat and Advisories, Internet Crime Complaint Center, and NSA Cybersecurity Guidance for previous reporting on People’s Republic of China state-sponsored malicious cyber activity.
US government and critical infrastructure organizations should consider signing up for CISA’s cyber hygiene services, including vulnerability scanning, to help reduce exposure to threats.
US Defense Industrial Base organizations should consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including Protective Domain Name System (PDNS) services, vulnerability scanning, and threat intelligence collaboration. For more information on eligibility criteria and how to enroll in these services, email dib_defense@cyber.nsa.gov.
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This joint Cybersecurity Advisory describes the ways in which People’s Republic of China state-sponsored cyber actors continue to exploit publicly known vulnerabilities in order to establish a broad network of compromised global infrastructure. These actors use the network to exploit a wide variety of targets worldwide, including public and private sector organizations.</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-158a">AA22-158A Alert, Technical Details, and Mitigations</a></p><p>Refer to <a href="https://us-cert.cisa.gov/china">China Cyber Threat and Advisories</a>, <a href="https://www.ic3.gov/Home/IndustryAlerts">Internet Crime Complaint Center</a>, and <a href="https://www.nsa.gov/cybersecurity-guidance">NSA Cybersecurity Guidance</a> for previous reporting on People’s Republic of China state-sponsored malicious cyber activity.</p><p>US government and critical infrastructure organizations should consider signing up for CISA’s <a href="https://www.cisa.gov/cyber-hygiene-services">cyber hygiene services</a>, including vulnerability scanning, to help reduce exposure to threats.</p><p>US Defense Industrial Base organizations should consider signing up for the NSA Cybersecurity Collaboration Center’s DIB Cybersecurity Service Offerings, including <a href="https://www.nsa.gov/About/Cybersecurity-Collaboration-Center/PDNS/">Protective Domain Name System</a> (PDNS) services, vulnerability scanning, and threat intelligence collaboration. For more information on eligibility criteria and how to enroll in these services, email <a href="http://www.fbi.gov/contact-us/field">dib_defense@cyber.nsa.gov</a>.</p><p>All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at <a href="mailto:central@cisa.dhs.gov">central@cisa.dhs.gov</a> or (888) 282-0870 and to the FBI via your <a href="https://www.fbi.gov/contact-us/field-offices">local FBI field office</a> or the FBI’s 24/7 CyWatch at (855) 292-3937 or <a href="mailto:CyWatch@fbi.gov">CyWatch@fbi.gov</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>232</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4597a184-e731-11ec-b69a-1bd616c89f9d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3424874782.mp3?updated=1654695904" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Updates on the cyber phases of Russia's hybrid war, including the role of DDoS and cyber offensive operations. Ransomware, bad and sometimes bogus</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1594/notes</link>
      <description>DDoS as a weapon in a hybrid war. Resilience in the defense of critical infrastructure. Offensive cyber operations against Russia. LockBit claims to have hit Mandiant, but their claim looks baseless. Rick Howard joins us with thoughts on trends he’s tracking at the RSA conference. Our guest is Dr. Diane Janosek from NSA with insights on personal resilience. Effects of ransomware on businesses.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/109

Selected reading.
Ukraine at D+102: Ukraine's SSSCIP on cyber war. (The CyberWire) 
Major DDoS attacks increasing after invasion of Ukraine (SearchSecurity) 
The Russia–Ukraine War: Ukraine’s resistance in the face of hybrid warfare (Observer Research Foundation)
Ukraine Symposium - U.S. Offensive Cyber Operations in Support of Ukraine (Lieber Institute: Articles of War) 
Russia ready to cooperate with all states in cyber domain (UNI India)
LockBit 2.0 gang claims Mandiant as latest victim; Mandiant sees no evidence of it (CyberScoop)
Mandiant: “No evidence” we were hacked by LockBit ransomware (BleepingComputer) 
Cybereason Ransomware True Cost to Business Study Reveals Organizations Pay Multiple Ransom Demands (Cybereason)
Average Ransom Payment Up 71% This Year, Approaches $1 Million (Palo Alto Networks Blog)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Jun 2022 20:30:00 -0000</pubDate>
      <itunes:title>Updates on the cyber phases of Russia's hybrid war, including the role of DDoS and cyber offensive operations. Ransomware, bad and sometimes bogus</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1594</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>DDoS as a weapon in a hybrid war. Resilience in the defense of critical infrastructure. Offensive cyber operations against Russia. LockBit claims to have hit Mandiant, but their claim looks baseless. Rick Howard joins us with thoughts on trends he’s tracking at the RSA conference. Our guest is Dr. Diane Janosek from NSA with insights on personal resilience. Effects of ransomware on businesses.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/109

Selected reading.
Ukraine at D+102: Ukraine's SSSCIP on cyber war. (The CyberWire) 
Major DDoS attacks increasing after invasion of Ukraine (SearchSecurity) 
The Russia–Ukraine War: Ukraine’s resistance in the face of hybrid warfare (Observer Research Foundation)
Ukraine Symposium - U.S. Offensive Cyber Operations in Support of Ukraine (Lieber Institute: Articles of War) 
Russia ready to cooperate with all states in cyber domain (UNI India)
LockBit 2.0 gang claims Mandiant as latest victim; Mandiant sees no evidence of it (CyberScoop)
Mandiant: “No evidence” we were hacked by LockBit ransomware (BleepingComputer) 
Cybereason Ransomware True Cost to Business Study Reveals Organizations Pay Multiple Ransom Demands (Cybereason)
Average Ransom Payment Up 71% This Year, Approaches $1 Million (Palo Alto Networks Blog)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>DDoS as a weapon in a hybrid war. Resilience in the defense of critical infrastructure. Offensive cyber operations against Russia. LockBit claims to have hit Mandiant, but their claim looks baseless. Rick Howard joins us with thoughts on trends he’s tracking at the RSA conference. Our guest is Dr. Diane Janosek from NSA with insights on personal resilience. Effects of ransomware on businesses.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/109</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/stories/6e0ba50fa3a44c639a8062423bde9207/ukraine-at-d102-ukraines-ssscip-on-cyber-war">Ukraine at D+102: Ukraine's SSSCIP on cyber war.</a> (The CyberWire) </p><p><a href="https://www.techtarget.com/searchsecurity/news/252521150/Major-DDoS-attacks-increasing-after-invasion-of-Ukraine">Major DDoS attacks increasing after invasion of Ukraine</a> (SearchSecurity) </p><p><a href="https://www.orfonline.org/expert-speak/ukraines-resistance-in-the-face-of-hybrid-warfare/">The Russia–Ukraine War: Ukraine’s resistance in the face of hybrid warfare</a> (Observer Research Foundation)</p><p><a href="https://lieber.westpoint.edu/us-offensive-cyber-operations-support-ukraine/">Ukraine Symposium - U.S. Offensive Cyber Operations in Support of Ukraine</a> (Lieber Institute: Articles of War) </p><p><a href="http://www.uniindia.com/~/russia-ready-to-cooperate-with-all-states-in-cyber-domain/World/news/2751161.html">Russia ready to cooperate with all states in cyber domain</a> (UNI India)</p><p><a href="https://www.cyberscoop.com/lockbit-2-0-claims-mandiant-ransomware-victim/">LockBit 2.0 gang claims Mandiant as latest victim; Mandiant sees no evidence of it</a> (CyberScoop)</p><p><a href="https://www.bleepingcomputer.com/news/security/mandiant-no-evidence-we-were-hacked-by-lockbit-ransomware/">Mandiant: “No evidence” we were hacked by LockBit ransomware</a> (BleepingComputer) </p><p><a href="https://www.cybereason.com/press/cybereason-ransomware-true-cost-to-business-study-reveals-organizations-pay-multiple-ransom-demands">Cybereason Ransomware True Cost to Business Study Reveals Organizations Pay Multiple Ransom Demands</a> (Cybereason)</p><p><a href="https://www.paloaltonetworks.com/blog/2022/06/average-ransomware-payment-update/">Average Ransom Payment Up 71% This Year, Approaches $1 Million</a> (Palo Alto Networks Blog)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1555</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b74ac2d0-7881-11ec-90a9-83c4c03093c4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4435377641.mp3?updated=1671824223" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ukraine offers an update on the cyber phases of Russia's hybrid war. Atlassian patches Confluence. CISA advisory on voting system. "State-aligned" campaign tried to exploit Follina. "Cyber Spetsnaz."</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1593/notes</link>
      <description>Ukraine offers an update on the cyber phases of Russia's hybrid war. Atlassian patches a Confluence critical vulnerability. CISA releases ICS advisory on voting systems. A "State-aligned" phishing campaign tried to exploit Follina. Is Electronic warfare a blunt instrument in the ether? Verizon’s Chris Novak stops by with thoughts on making the most of your trip to the RSA conference. Our guest is Tom Garrison from Intel with a look at hardware security. And a Russia-aligned group says they’re not just hacktivists; they’re "Cyber Spetsnaz."

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/108

Selected reading.
Remarks by Victor Zhorov, deputy head of SSSCIP. (SSSCIP)
US military hackers conducting offensive operations in support of Ukraine, says head of Cyber Command (Sky News)
Russian ministry website appears hacked; RIA reports users data protected (Reuters)
Confluence Security Advisory 2022-06-02 (Atlassian)
Atlassian Releases New Versions of Confluence Server and Data Center to Address CVE-2022-26134 (CISA) 
Patch released for exploited Atlassian zero-day vulnerability (The Record by Recorded Future) 
CISA Releases Security Advisory on Dominion Voting Systems Democracy Suite ImageCast X (CISA) 
State-Backed Hackers Exploit Microsoft 'Follina' Bug to Target Entities in Europe and U.S (The Hacker News)
Deadly secret: Electronic warfare shapes Russia-Ukraine war (AP NEWS) 
Exclusive: Pro-Russia group ‘Cyber Spetsnaz’ is attacking government agencies (Security Affairs)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 06 Jun 2022 20:30:00 -0000</pubDate>
      <itunes:title>Ukraine offers an update on the cyber phases of Russia's hybrid war. Atlassian patches Confluence. CISA advisory on voting system. "State-aligned" campaign tried to exploit Follina. "Cyber Spetsnaz."</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1593</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ukraine offers an update on the cyber phases of Russia's hybrid war. Atlassian patches a Confluence critical vulnerability. CISA releases ICS advisory on voting systems. A "State-aligned" phishing campaign tried to exploit Follina. Is Electronic warfare a blunt instrument in the ether? Verizon’s Chris Novak stops by with thoughts on making the most of your trip to the RSA conference. Our guest is Tom Garrison from Intel with a look at hardware security. And a Russia-aligned group says they’re not just hacktivists; they’re "Cyber Spetsnaz."

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/108

Selected reading.
Remarks by Victor Zhorov, deputy head of SSSCIP. (SSSCIP)
US military hackers conducting offensive operations in support of Ukraine, says head of Cyber Command (Sky News)
Russian ministry website appears hacked; RIA reports users data protected (Reuters)
Confluence Security Advisory 2022-06-02 (Atlassian)
Atlassian Releases New Versions of Confluence Server and Data Center to Address CVE-2022-26134 (CISA) 
Patch released for exploited Atlassian zero-day vulnerability (The Record by Recorded Future) 
CISA Releases Security Advisory on Dominion Voting Systems Democracy Suite ImageCast X (CISA) 
State-Backed Hackers Exploit Microsoft 'Follina' Bug to Target Entities in Europe and U.S (The Hacker News)
Deadly secret: Electronic warfare shapes Russia-Ukraine war (AP NEWS) 
Exclusive: Pro-Russia group ‘Cyber Spetsnaz’ is attacking government agencies (Security Affairs)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ukraine offers an update on the cyber phases of Russia's hybrid war. Atlassian patches a Confluence critical vulnerability. CISA releases ICS advisory on voting systems. A "State-aligned" phishing campaign tried to exploit Follina. Is Electronic warfare a blunt instrument in the ether? Verizon’s Chris Novak stops by with thoughts on making the most of your trip to the RSA conference. Our guest is Tom Garrison from Intel with a look at hardware security. And a Russia-aligned group says they’re not just hacktivists; they’re "Cyber Spetsnaz."</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/108</p><p><br></p><h2>Selected reading.</h2><p><a href="https://onedrive.live.com/?authkey=%21AIuy0%5FrgVXY%5F%5FIc&amp;cid=AE8C0324ED54C493&amp;id=AE8C0324ED54C493%2120556&amp;parId=AE8C0324ED54C493%2120552&amp;o=OneUp">Remarks by Victor Zhorov, deputy head of SSSCIP</a>. (SSSCIP)</p><p><a href="https://news.sky.com/story/us-military-hackers-conducting-offensive-operations-in-support-of-ukraine-says-head-of-cyber-command-12625139">US military hackers conducting offensive operations in support of Ukraine, says head of Cyber Command</a> (Sky News)</p><p><a href="https://www.reuters.com/world/europe/russian-ministry-website-appears-hacked-ria-reports-users-data-protected-2022-06-06/">Russian ministry website appears hacked; RIA reports users data protected</a> (Reuters)</p><p><a href="https://confluence.atlassian.com/doc/confluence-security-advisory-2022-06-02-1130377146.html">Confluence Security Advisory 2022-06-02</a> (Atlassian)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/06/03/atlassian-releases-new-versions-confluence-server-and-data-center">Atlassian Releases New Versions of Confluence Server and Data Center to Address CVE-2022-26134</a> (CISA) </p><p><a href="https://therecord.media/patch-released-for-exploited-atlassian-zero-day-vulnerability/">Patch released for exploited Atlassian zero-day vulnerability</a> (The Record by Recorded Future) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/06/03/cisa-releases-security-advisory-dominion-voting-systems-democracy">CISA Releases Security Advisory on Dominion Voting Systems Democracy Suite ImageCast X</a> (CISA) </p><p><a href="https://thehackernews.com/2022/06/state-backed-hackers-exploit-microsoft.html">State-Backed Hackers Exploit Microsoft 'Follina' Bug to Target Entities in Europe and U.S</a> (The Hacker News)</p><p><a href="https://apnews.com/article/russia-ukraine-kyiv-technology-90d760f01105b9aaf1886427dbfba917">Deadly secret: Electronic warfare shapes Russia-Ukraine war</a> (AP NEWS) </p><p><a href="https://securityaffairs.co/wordpress/131967/hacking/exclusive-pro-russia-cyber-spetsnaz-is-attacking-government-agencies.html">Exclusive: Pro-Russia group ‘Cyber Spetsnaz’ is attacking government agencies</a> (Security Affairs)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1649</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b76a1d06-7881-11ec-90a9-ff50a50671cb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6566872925.mp3?updated=1671824313" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Laura Hoffner: Setting your sights high. [Intelligence] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/103/notes</link>
      <description>Executive Vice President at Concentric, Laura Hoffner shares her story about working as a Naval Intelligence Officer and supporting special operations around the globe for 12 years, to now, where she transitioned to the Naval Reserves and joined the Concentric team. Laura knew since she was in the seventh grade she wanted to work with SEALs and work in intelligence. She set her goals high and achieved them shortly after graduating college. She credits being a Naval Intelligence Officer to helping her get to where she is today and says how much she is enjoying working with Concentric, saying she's "ultimately just incredibly benefiting from unbelievable mentors at the company itself." We thank Laura for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 05 Jun 2022 07:00:00 -0000</pubDate>
      <itunes:title>Laura Hoffner: Setting your sights high. [Intelligence] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>103</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Executive Vice President at Concentric, Laura Hoffner shares her story about working as a Naval Intelligence Officer and supporting special operations around the globe for 12 years, to now, where she transitioned to the Naval Reserves and joined the Concentric team. Laura knew since she was in the seventh grade she wanted to work with SEALs and work in intelligence. She set her goals high and achieved them shortly after graduating college. She credits being a Naval Intelligence Officer to helping her get to where she is today and says how much she is enjoying working with Concentric, saying she's "ultimately just incredibly benefiting from unbelievable mentors at the company itself." We thank Laura for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Executive Vice President at Concentric, Laura Hoffner shares her story about working as a Naval Intelligence Officer and supporting special operations around the globe for 12 years, to now, where she transitioned to the Naval Reserves and joined the Concentric team. Laura knew since she was in the seventh grade she wanted to work with SEALs and work in intelligence. She set her goals high and achieved them shortly after graduating college. She credits being a Naval Intelligence Officer to helping her get to where she is today and says how much she is enjoying working with Concentric, saying she's "ultimately just incredibly benefiting from unbelievable mentors at the company itself." We thank Laura for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>487</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5ea045fa-e1e1-11ec-bf96-c3588321a62b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7566834864.mp3?updated=1654115112" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Defining the intruder’s dilemma. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/32/notes</link>
      <description>For this Cyberwire-X episode, we are talking about the failure of perimeter defense as an architecture where, since the 1990s when it was invented, the plan was to keep everything out. That model never really worked that well since we had to poke holes in the perimeter to allow employees, contractors, and partners to do legitimate business with us. Those same holes could be exploited by the bad guys, too. The question is, what are we doing instead? What is the security architecture, the strategy, and the tactics that we are all using today that is more secure than perimeter defense? In the first part of the show, Rick Howard, the CyberWire’s CSO, Chief Analyst, and Senior Fellow, talks with Jerry Archer, the Sallie Mae CSO and CyberWire Hash Table member, and, in the second half of the show, the CyberWire's podcast host Dave Bittner talks with Mike Ernst, episode sponsor ExtraHop’s Vice President of Sales Engineering, to discuss Software Defined Perimeter and intrusion kill chain prevention strategy.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 05 Jun 2022 07:00:00 -0000</pubDate>
      <itunes:title>Defining the intruder’s dilemma. [CyberWire-X]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>32</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>For this Cyberwire-X episode, we are talking about the failure of perimeter defense as an architecture where, since the 1990s when it was invented, the plan was to keep everything out. That model never really worked that well since we had to poke holes in the perimeter to allow employees, contractors, and partners to do legitimate business with us. Those same holes could be exploited by the bad guys, too. The question is, what are we doing instead? What is the security architecture, the strategy, and the tactics that we are all using today that is more secure than perimeter defense? In the first part of the show, Rick Howard, the CyberWire’s CSO, Chief Analyst, and Senior Fellow, talks with Jerry Archer, the Sallie Mae CSO and CyberWire Hash Table member, and, in the second half of the show, the CyberWire's podcast host Dave Bittner talks with Mike Ernst, episode sponsor ExtraHop’s Vice President of Sales Engineering, to discuss Software Defined Perimeter and intrusion kill chain prevention strategy.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>For this Cyberwire-X episode, we are talking about the failure of perimeter defense as an architecture where, since the 1990s when it was invented, the plan was to keep everything out. That model never really worked that well since we had to poke holes in the perimeter to allow employees, contractors, and partners to do legitimate business with us. Those same holes could be exploited by the bad guys, too. The question is, what are we doing instead? What is the security architecture, the strategy, and the tactics that we are all using today that is more secure than perimeter defense? In the first part of the show, Rick Howard, the CyberWire’s CSO, Chief Analyst, and Senior Fellow, talks with Jerry Archer, the Sallie Mae CSO and CyberWire Hash Table member, and, in the second half of the show, the CyberWire's podcast host Dave Bittner talks with Mike Ernst, episode sponsor ExtraHop’s Vice President of Sales Engineering, to discuss Software Defined Perimeter and intrusion kill chain prevention strategy.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1975</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dec37dd0-dde3-11ec-97d9-cb878a6592b5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9048855325.mp3?updated=1653669937" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>LemonDucks evading detection. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/235/notes</link>
      <description>Scott Fanning from CrowdStrike's research team, joins Dave to discuss their work on "LemonDuck Targets Docker for Cryptomining Operations." LemonDuck is a well-known cryptomining botnet, and research suggests attackers are attracted to the monetary gain from the recent boom in cryptocurrency.
LemonDuck was caught trying to disguise it's attack against Docker by running an anonymous mining operation by the use of proxy pools. Scott shares how it’s unknown which organizations have been targeted and just how much cryptocurrency has been stolen.
The research can be found here:
LemonDuck Targets Docker for Cryptomining Operations

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Jun 2022 07:00:00 -0000</pubDate>
      <itunes:title>LemonDucks evading detection. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>235</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Scott Fanning from CrowdStrike's research team, joins Dave to discuss their work on "LemonDuck Targets Docker for Cryptomining Operations." LemonDuck is a well-known cryptomining botnet, and research suggests attackers are attracted to the monetary gain from the recent boom in cryptocurrency.
LemonDuck was caught trying to disguise it's attack against Docker by running an anonymous mining operation by the use of proxy pools. Scott shares how it’s unknown which organizations have been targeted and just how much cryptocurrency has been stolen.
The research can be found here:
LemonDuck Targets Docker for Cryptomining Operations

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Scott Fanning from CrowdStrike's research team, joins Dave to discuss their work on "LemonDuck Targets Docker for Cryptomining Operations." LemonDuck is a well-known cryptomining botnet, and research suggests attackers are attracted to the monetary gain from the recent boom in cryptocurrency.</p><p>LemonDuck was caught trying to disguise it's attack against Docker by running an anonymous mining operation by the use of proxy pools. Scott shares how it’s unknown which organizations have been targeted and just how much cryptocurrency has been stolen.</p><p>The research can be found here:</p><ul><li><a href="https://www.crowdstrike.com/blog/lemonduck-botnet-targets-docker-for-cryptomining-operations/">LemonDuck Targets Docker for Cryptomining Operations</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>922</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bf343e82-e2a7-11ec-8b6d-9f739d6ebec5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4156224264.mp3?updated=1685126888" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Managing messaging in a hybrid war.Anti-Tehran hacktivism and Tehran-sponsored cyber ops. Rebranding as sanctions evasion. A threat to firmware. CISA warns of Confluence exploits.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1592/notes</link>
      <description>Moscow wants attention to be paid to its messengers. Western support for Ukraine in cyberspace. US remains on alert for Russian cyberattacks. Iran: anti-government hacktivism and Tehran-sponsored cyber ops. Rebranding as sanctions evasion. A gangland threat to firmware. Johannes Ullrich from SANS on security of browsers caching passwords. Dave Bittner sits down with Perry Carpenter to discuss his new book, "The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer,''co-author was Kai Roer.. And CISA adds an Atlassian issue to its Known Exploited Vulnerabilities Catalog.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/107

Selected reading.
Russia summons heads of U.S. media outlets, warns of 'stringent measures' (Reuters)
US confirms military hackers have conducted cyber operations in support of Ukraine (CNN) 
Advancing security across Central and Eastern Europe (Google) 
US Justice Department Braces for More Russian Cyberattacks (VOA)
Russia, backed by ransomware gangs, actively targeting US, FBI director says (Cybersecurity Dive) 
Exiled Iran Group Claims Tehran Hacking Attack (SecurityWeek)
Exposing POLONIUM activity and infrastructure targeting Israeli organizations (Microsoft Security) 
To HADES and Back: UNC2165 Shifts to LOCKBIT to Evade Sanctions (Mandiant)
Russia-Linked Ransomware Groups Are Changing Tactics to Dodge Crackdowns (Wall Street Journal) 
Conti Targets Critical Firmware (Eclypsium)
Atlassian: Unpatched critical Confluence flaw under attack (Register) 
CISA Adds One Known Exploited Vulnerability (CVE-2022-26134) to Catalog (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 03 Jun 2022 20:30:00 -0000</pubDate>
      <itunes:title>Managing messaging in a hybrid war.Anti-Tehran hacktivism and Tehran-sponsored cyber ops. Rebranding as sanctions evasion. A threat to firmware. CISA warns of Confluence exploits.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1592</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Moscow wants attention to be paid to its messengers. Western support for Ukraine in cyberspace. US remains on alert for Russian cyberattacks. Iran: anti-government hacktivism and Tehran-sponsored cyber ops. Rebranding as sanctions evasion. A gangland threat to firmware. Johannes Ullrich from SANS on security of browsers caching passwords. Dave Bittner sits down with Perry Carpenter to discuss his new book, "The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer,''co-author was Kai Roer.. And CISA adds an Atlassian issue to its Known Exploited Vulnerabilities Catalog.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/107

Selected reading.
Russia summons heads of U.S. media outlets, warns of 'stringent measures' (Reuters)
US confirms military hackers have conducted cyber operations in support of Ukraine (CNN) 
Advancing security across Central and Eastern Europe (Google) 
US Justice Department Braces for More Russian Cyberattacks (VOA)
Russia, backed by ransomware gangs, actively targeting US, FBI director says (Cybersecurity Dive) 
Exiled Iran Group Claims Tehran Hacking Attack (SecurityWeek)
Exposing POLONIUM activity and infrastructure targeting Israeli organizations (Microsoft Security) 
To HADES and Back: UNC2165 Shifts to LOCKBIT to Evade Sanctions (Mandiant)
Russia-Linked Ransomware Groups Are Changing Tactics to Dodge Crackdowns (Wall Street Journal) 
Conti Targets Critical Firmware (Eclypsium)
Atlassian: Unpatched critical Confluence flaw under attack (Register) 
CISA Adds One Known Exploited Vulnerability (CVE-2022-26134) to Catalog (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Moscow wants attention to be paid to its messengers. Western support for Ukraine in cyberspace. US remains on alert for Russian cyberattacks. Iran: anti-government hacktivism and Tehran-sponsored cyber ops. Rebranding as sanctions evasion. A gangland threat to firmware. Johannes Ullrich from SANS on security of browsers caching passwords. Dave Bittner sits down with Perry Carpenter to discuss his new book, "The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer,''co-author was Kai Roer.. And CISA adds an Atlassian issue to its Known Exploited Vulnerabilities Catalog.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/107</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.reuters.com/business/media-telecom/russia-summon-heads-us-media-outlets-warns-stringent-measures-2022-06-03/">Russia summons heads of U.S. media outlets, warns of 'stringent measures'</a> (Reuters)</p><p><a href="https://www.cnn.com/2022/06/02/politics/us-hackers-ukraine-support/index.html?utm_source=sailthru&amp;utm_medium=email&amp;utm_campaign=dfn-ebb">US confirms military hackers have conducted cyber operations in support of Ukraine</a> (CNN) </p><p><a href="https://blog.google/technology/safety-security/advancing-security-across-central-and-eastern-europe/">Advancing security across Central and Eastern Europe</a> (Google) </p><p><a href="https://www.voanews.com/a/us-justice-department-braces-for-more-russian-cyberattacks-/6601042.html">US Justice Department Braces for More Russian Cyberattacks </a>(VOA)</p><p><a href="https://www.cybersecuritydive.com/news/fbi-wray-russia-targeting-us/624790/">Russia, backed by ransomware gangs, actively targeting US, FBI director says</a> (Cybersecurity Dive) </p><p><a href="https://www.securityweek.com/exiled-iran-group-claims-tehran-hacking-attack">Exiled Iran Group Claims Tehran Hacking Attack</a> (SecurityWeek)</p><p><a href="https://www.microsoft.com/security/blog/2022/06/02/exposing-polonium-activity-and-infrastructure-targeting-israeli-organizations/">Exposing POLONIUM activity and infrastructure targeting Israeli organizations</a> (Microsoft Security) </p><p><a href="https://www.mandiant.com/resources/unc2165-shifts-to-evade-sanctions">To HADES and Back: UNC2165 Shifts to LOCKBIT to Evade Sanctions</a> (Mandiant)</p><p><a href="https://www.wsj.com/articles/russia-linked-ransomware-groups-are-changing-tactics-to-dodge-crackdowns-11654178400?mod=djemCybersecruityPro&amp;tpl=cy">Russia-Linked Ransomware Groups Are Changing Tactics to Dodge Crackdowns </a>(Wall Street Journal) </p><p><a href="https://eclypsium.com/2022/06/02/conti-targets-critical-firmware/">Conti Targets Critical Firmware</a> (Eclypsium)</p><p><a href="https://www.theregister.com/2022/06/03/atlassian_confluence_critical_flaw_attacked/">Atlassian: Unpatched critical Confluence flaw under attack</a> (Register) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/06/02/cisa-adds-one-known-exploited-vulnerability-cve-2022-26134-catalog">CISA Adds One Known Exploited Vulnerability (CVE-2022-26134) to Catalog</a> (CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1589</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b575ecb4-7881-11ec-90a9-abbd5619a7d6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3204502319.mp3?updated=1685960715" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber operations in the hybrid war. Karakurt extortion group warning. Clipminer is out in the wild. GootLoader expands its payloads and targeting. Leak brokers and booters shut down.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1591/notes</link>
      <description>Russian government agencies are buying VPNs. CISA and its partners warn about the Karakurt extortion group. Clipminer is out in the wild. GootLoader expands its payloads and targeting. Carole Theriault has the latest on fraudsters imitating law enforcement. Kevin Magee from Microsoft on security incentives by way of insurance. And leak brokers and booters shut down.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/106

Selected reading.
White House: cyber activity not against Russia policy (Reuters) 
Some see cyberwar in Ukraine. Others see just thwarted attacks. (Washington Post) 
ESET Threat Report details targeted attacks connected to the Russian invasion of Ukraine and how the war changed the threat landscape (ESET) 
Ukraine - 100 days of war in cyberspace (CyberPeace Institute) 
Russian VPN Spending (Top 10 VPN)
Karakurt Data Extortion Group (CISA)
Karakurt Data Extortion Group (CISA) 
US Agencies: Karakurt extortion group demanding up to $13 million in attacks (The Record by Recorded Future)
Clipminer Botnet Makes Operators at Least $1.7 Million (Symantec Enterprise Blog)
GootLoader Expands its Payloads Infecting a Law Firm with IcedID (eSentire) 
WeLeakInfo.to and Related Domain Names Seized (US Department of Justice)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 02 Jun 2022 20:15:00 -0000</pubDate>
      <itunes:title>Cyber operations in the hybrid war. Karakurt extortion group warning. Clipminer is out in the wild. GootLoader expands its payloads and targeting. Leak brokers and booters shut down.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1591</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Russian government agencies are buying VPNs. CISA and its partners warn about the Karakurt extortion group. Clipminer is out in the wild. GootLoader expands its payloads and targeting. Carole Theriault has the latest on fraudsters imitating law enforcement. Kevin Magee from Microsoft on security incentives by way of insurance. And leak brokers and booters shut down.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/106

Selected reading.
White House: cyber activity not against Russia policy (Reuters) 
Some see cyberwar in Ukraine. Others see just thwarted attacks. (Washington Post) 
ESET Threat Report details targeted attacks connected to the Russian invasion of Ukraine and how the war changed the threat landscape (ESET) 
Ukraine - 100 days of war in cyberspace (CyberPeace Institute) 
Russian VPN Spending (Top 10 VPN)
Karakurt Data Extortion Group (CISA)
Karakurt Data Extortion Group (CISA) 
US Agencies: Karakurt extortion group demanding up to $13 million in attacks (The Record by Recorded Future)
Clipminer Botnet Makes Operators at Least $1.7 Million (Symantec Enterprise Blog)
GootLoader Expands its Payloads Infecting a Law Firm with IcedID (eSentire) 
WeLeakInfo.to and Related Domain Names Seized (US Department of Justice)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russian government agencies are buying VPNs. CISA and its partners warn about the Karakurt extortion group. Clipminer is out in the wild. GootLoader expands its payloads and targeting. Carole Theriault has the latest on fraudsters imitating law enforcement. Kevin Magee from Microsoft on security incentives by way of insurance. And leak brokers and booters shut down.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/106</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.reuters.com/world/white-house-cyber-activity-not-against-russia-policy-2022-06-01/">White House: cyber activity not against Russia policy</a> (Reuters) </p><p><a href="https://www.washingtonpost.com/politics/2022/04/14/some-see-cyberwar-ukraine-others-see-just-thwarted-attacks">Some see cyberwar in Ukraine. Others see just thwarted attacks.</a> (Washington Post) </p><p><a href="https://www.eset.com/int/about/newsroom/press-releases/research/eset-threat-report-details-targeted-attacks-connected-to-the-russian-invasion-of-ukraine-and-how-the-1/">ESET Threat Report details targeted attacks connected to the Russian invasion of Ukraine and how the war changed the threat landscape</a> (ESET) </p><p><a href="https://cyberpeaceinstitute.org/news/ukraine-100-days-of-war-in-cyberspace/">Ukraine - 100 days of war in cyberspace</a> (CyberPeace Institute) </p><p><a href="https://www.top10vpn.com/research/russia-vpn-spending/">Russian VPN Spending</a> (Top 10 VPN)</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-152a">Karakurt Data Extortion Group</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/06/01/karakurt-data-extortion-group">Karakurt Data Extortion Group</a> (CISA) </p><p><a href="https://therecord.media/us-agencies-karakurt-extortion-group-demanding-up-to-13-million-in-attacks/">US Agencies: Karakurt extortion group demanding up to $13 million in attacks</a> (The Record by Recorded Future)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/clipminer-bitcoin-mining-hijacking">Clipminer Botnet Makes Operators at Least $1.7 Million</a> (Symantec Enterprise Blog)</p><p><a href="https://www.esentire.com/blog/gootloader-initial-access-as-a-service-malware-expands-its-payloads-yet-again-infecting-law-firm-with-icedid">GootLoader Expands its Payloads Infecting a Law Firm with IcedID</a> (eSentire) </p><p><a href="https://www.justice.gov/usao-dc/pr/weleakinfoto-and-related-domain-names-seized">WeLeakInfo.to and Related Domain Names Seized</a> (US Department of Justice)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1407</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b556c85c-7881-11ec-90a9-aff582855cb6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4271856946.mp3?updated=1690312273" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA22-152A – Karakurt data extortion group. [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/19/notes</link>
      <description>The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Department of the Treasury (Treasury), and the Financial Crimes Enforcement Network (FinCEN) are releasing this joint Cybersecurity Advisory to provide information about the Karakurt data extortion group, also known as the Karakurt Team and Karakurt Lair. Karakurt actors have employed a variety of TTPs, creating significant challenges for defense and mitigation. Karakurt victims have not reported encryption of compromised machines or files; rather, Karakurt actors claim to steal data and threaten to auction it or release it to the public unless they receive payment.
AA22-152A Alert, Technical Details, and Mitigations
CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide
Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events. Stopransomware.gov 
CISA's Ransomware Readiness Assessment
CISA's cyber hygiene services
FinCEN Advisory to Financial Institutions on Cyber-Events and Cyber-Enabled Crime
FinCEN Advisory on Ransomware and the Use of the Financial System to Facilitate Ransom Payments
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 01 Jun 2022 21:15:00 -0000</pubDate>
      <itunes:title>CISA Alert AA22-152A – Karakurt data extortion group. [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>19</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Department of the Treasury (Treasury), and the Financial Crimes Enforcement Network (FinCEN) are releasing this joint Cybersecurity Advisory to provide information about the Karakurt data extortion group, also known as the Karakurt Team and Karakurt Lair. Karakurt actors have employed a variety of TTPs, creating significant challenges for defense and mitigation. Karakurt victims have not reported encryption of compromised machines or files; rather, Karakurt actors claim to steal data and threaten to auction it or release it to the public unless they receive payment.
AA22-152A Alert, Technical Details, and Mitigations
CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide
Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events. Stopransomware.gov 
CISA's Ransomware Readiness Assessment
CISA's cyber hygiene services
FinCEN Advisory to Financial Institutions on Cyber-Events and Cyber-Enabled Crime
FinCEN Advisory on Ransomware and the Use of the Financial System to Facilitate Ransom Payments
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), the Department of the Treasury (Treasury), and the Financial Crimes Enforcement Network (FinCEN) are releasing this joint Cybersecurity Advisory to provide information about the Karakurt data extortion group, also known as the Karakurt Team and Karakurt Lair. Karakurt actors have employed a variety of TTPs, creating significant challenges for defense and mitigation. Karakurt victims have not reported encryption of compromised machines or files; rather, Karakurt actors claim to steal data and threaten to auction it or release it to the public unless they receive payment.</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-152a">AA22-152A Alert, Technical Details, and Mitigations</a></p><p><a href="https://www.cisa.gov/sites/default/files/publications/CISA_MS-ISAC_Ransomware%20Guide_S508C.pdf">CISA-Multi-State Information Sharing and Analysis Center (MS-ISAC) Joint Ransomware Guide</a></p><p><a href="https://www.nccoe.nist.gov/projects/building-blocks/data-integrity/detect-respond">Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events</a>. <a href="https://www.cisa.gov/stopransomware">Stopransomware.gov</a> </p><p><a href="https://github.com/cisagov/cset/releases/tag/v10.3.0.0">CISA's Ransomware Readiness Assessment</a></p><p><a href="https://www.cisa.gov/cyber-hygiene-services">CISA's cyber hygiene services</a></p><p><a href="https://www.fincen.gov/resources/advisories/fincen-advisory-fin-2016-a005">FinCEN Advisory to Financial Institutions on Cyber-Events and Cyber-Enabled Crime</a></p><p><a href="https://www.fincen.gov/resources/advisories/fincen-advisory-fin-2021-a004">FinCEN Advisory on Ransomware and the Use of the Financial System to Facilitate Ransom Payments</a></p><p>All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at <a href="mailto:central@cisa.dhs.gov">central@cisa.dhs.gov</a> or (888) 282-0870 and to the FBI via your <a href="https://www.fbi.gov/contact-us/field-offices">local FBI field office</a> or the FBI’s 24/7 CyWatch at (855) 292-3937 or <a href="mailto:CyWatch@fbi.gov">CyWatch@fbi.gov</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>160</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6e55bdc-e1f0-11ec-88b4-e7966706bbd4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8034484865.mp3?updated=1654118511" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Costa Rica hit with another round of ransomware. Cyber phases of Russia’s hybrid war against Ukraine. CISOs and 3rd-party risk. Elasticsearch databases as extortion targets. And Razzlekhan! </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1590/notes</link>
      <description>Costa Rica's healthcare system comes under renewed ransomware attack. Cyber phases of the hybrid war. Charity fraud exploits sympathy for Ukraine. US FBI attributes last year's attack on Boston Children's Hospital to Iran. CISOs surveyed on their challenges (and they're particularly worried about exposure to 3rd-party risk). Robert M. Lee joins us for the launch of the new Control Loop podcast. Josh Ray from Accenture looks at ransomware trends. Razzlekhan and Dutch: a cryptocurrency love song.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/105

Selected reading.
Latest cyberattack in Costa Rica targets hospital system (Reuters)
Costa Rica’s public health agency hit by Hive ransomware (BleepingComputer)
Costa Rican Social Security Fund hit with ransomware attack (The Record by Recorded Future)
Costa Rica May Be Pawn in Conti Ransomware Group’s Bid to Rebrand, Evade Sanctions (KrebsOnSecurity)
Ukraine joins its first NATO cyber defense center meeting (TheHill)
US military hackers conducting offensive operations in support of Ukraine, says head of Cyber Command (Sky News)
The FBI Warns of Scammers Soliciting Donations Related to the Crisis in Ukraine (Internet Crime Complaint Center (IC3))
FBI director blames Iran for ‘despicable’ attempted cyberattack on Boston Children’s Hospital (CNN)
Hackers ransom 1,200 exposed Elasticsearch databases (TechTarget)
The CISOs Report (Security Current)
New York couple accused of laundering $4.5 bln in crypto still in plea talks (Reuters)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 01 Jun 2022 20:15:00 -0000</pubDate>
      <itunes:title>Costa Rica hit with another round of ransomware. Cyber phases of Russia’s hybrid war against Ukraine. CISOs and 3rd-party risk. Elasticsearch databases as extortion targets. And Razzlekhan! </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1590</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Costa Rica's healthcare system comes under renewed ransomware attack. Cyber phases of the hybrid war. Charity fraud exploits sympathy for Ukraine. US FBI attributes last year's attack on Boston Children's Hospital to Iran. CISOs surveyed on their challenges (and they're particularly worried about exposure to 3rd-party risk). Robert M. Lee joins us for the launch of the new Control Loop podcast. Josh Ray from Accenture looks at ransomware trends. Razzlekhan and Dutch: a cryptocurrency love song.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/105

Selected reading.
Latest cyberattack in Costa Rica targets hospital system (Reuters)
Costa Rica’s public health agency hit by Hive ransomware (BleepingComputer)
Costa Rican Social Security Fund hit with ransomware attack (The Record by Recorded Future)
Costa Rica May Be Pawn in Conti Ransomware Group’s Bid to Rebrand, Evade Sanctions (KrebsOnSecurity)
Ukraine joins its first NATO cyber defense center meeting (TheHill)
US military hackers conducting offensive operations in support of Ukraine, says head of Cyber Command (Sky News)
The FBI Warns of Scammers Soliciting Donations Related to the Crisis in Ukraine (Internet Crime Complaint Center (IC3))
FBI director blames Iran for ‘despicable’ attempted cyberattack on Boston Children’s Hospital (CNN)
Hackers ransom 1,200 exposed Elasticsearch databases (TechTarget)
The CISOs Report (Security Current)
New York couple accused of laundering $4.5 bln in crypto still in plea talks (Reuters)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Costa Rica's healthcare system comes under renewed ransomware attack. Cyber phases of the hybrid war. Charity fraud exploits sympathy for Ukraine. US FBI attributes last year's attack on Boston Children's Hospital to Iran. CISOs surveyed on their challenges (and they're particularly worried about exposure to 3rd-party risk). Robert M. Lee joins us for the launch of the new Control Loop podcast. Josh Ray from Accenture looks at ransomware trends. Razzlekhan and Dutch: a cryptocurrency love song.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/105</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.reuters.com/world/americas/latest-cyberattack-costa-rica-targets-hospital-system-2022-05-31/">Latest cyberattack in Costa Rica targets hospital system</a> (Reuters)</p><p><a href="https://www.bleepingcomputer.com/news/security/costa-rica-s-public-health-agency-hit-by-hive-ransomware/">Costa Rica’s public health agency hit by Hive ransomware</a> (BleepingComputer)</p><p><a href="https://therecord.media/costa-rican-social-security-fund-hit-with-ransomware-attack/">Costa Rican Social Security Fund hit with ransomware attack</a> (The Record by Recorded Future)</p><p><a href="https://krebsonsecurity.com/2022/05/costa-rica-may-be-pawn-in-conti-ransomware-groups-bid-to-rebrand-evade-sanctions/">Costa Rica May Be Pawn in Conti Ransomware Group’s Bid to Rebrand, Evade Sanctions</a> (KrebsOnSecurity)</p><p><a href="https://thehill.com/news/3507026-ukraine-joins-its-first-nato-cyber-defense-center-meeting/">Ukraine joins its first NATO cyber defense center meeting</a> (TheHill)</p><p><a href="https://news.sky.com/story/us-military-hackers-conducting-offensive-operations-in-support-of-ukraine-says-head-of-cyber-command-12625139">US military hackers conducting offensive operations in support of Ukraine, says head of Cyber Command</a> (Sky News)</p><p><a href="https://www.ic3.gov/Media/Y2022/PSA220531">The FBI Warns of Scammers Soliciting Donations Related to the Crisis in Ukraine</a> (Internet Crime Complaint Center (IC3))</p><p><a href="https://www.cnn.com/2022/06/01/politics/fbi-blames-iran-hospital-cyberattack/index.html">FBI director blames Iran for ‘despicable’ attempted cyberattack on Boston Children’s Hospital</a> (CNN)</p><p><a href="https://www.techtarget.com/searchsecurity/news/252520946/Hackers-ransom-1200-exposed-Elasticsearch-databases">Hackers ransom 1,200 exposed Elasticsearch databases</a> (TechTarget)</p><p><a href="https://securitycurrent.com/thecisosreport/">The CISOs Report</a> (Security Current)</p><p><a href="https://www.reuters.com/legal/transactional/new-york-couple-accused-laundering-45-bln-crypto-still-plea-talks-2022-05-31/">New York couple accused of laundering $4.5 bln in crypto still in plea talks</a> (Reuters)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1427</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b537bb88-7881-11ec-90a9-8b2d6f97208e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4380236488.mp3?updated=1690312234" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Potential cyber threats to agriculture. Cyber phases of Russia’s hybrid war. REvil prosecution at a stand (and it’s the Americans’ fault, say Russian sources). Microsoft mitigates Follima.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1589/notes</link>
      <description>Sanctions, blockades, and their effects on the world economy. Western nations remain on alert for Russian cyber attacks. REvil prosecution has reached a dead end. Microsoft issues mitigations for a recent zero-day. John Pescatore’s Mr. Security Answer Person is back, looking at authentication. Joe Carrigan looks at new browser vulnerabilities. Notes from the underworld.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/104

Selected reading.
In big bid to punish Moscow, EU bans most Russia oil imports (AP NEWS) 
EU, resolving a deadlock, in deal to cut most Russia oil imports (Reuters
The E.U.’s embargo will bruise Russia’s oil industry, but for now it is doing fine. (New York Times) 
Russia’s Black Sea Blockade Will Turbocharge the Global Food Crisis (Foreign Policy) 
Russia’s Invasion Unleashes ‘Perfect Storm’ in Global Agriculture (Foreign Policy) 
‘War in Ukraine Means Hunger in Africa’ (Foreign Policy)
Afghanistan’s Hungry Will Pay the Price for Putin’s War (Foreign Policy)
Remote bricking of Ukrainian tractors raises agriculture security concerns (CSO Online)
Major supermarkets 'uniquely vulnerable' as Russian cyber attacks rise (ABC)
Italy warns organizations to brace for incoming DDoS attacks (BleepingComputer)
Whitepaper - PIPEDREAM: CHERNOVITE's Emerging Malware Targeting Industrial Environments (Dragos).
Experts believe that Russian Gamaredon APT could fuel a new round of DDoS attacks (IT Security News) 
Putin horror warning over 'own goal' attack on UK coming back to haunt Kremlin (Express.co.uk) 
Putin plot: UK hospitals at risk of chilling ‘sleeper cell’ attack by Russia (Express) 
Will Russia Launch a New Cyber Attack on America? (The National Interest) 
Hackers wage war on Russia’s largest bank (The Telegraph) 
REvil prosecutions reach a 'dead end,' Russian media reports (CyberScoop) 
Microsoft Office zero-day "Follina"—it’s not a bug, it’s a feature! (It's a bug) (Malwarebytes Labs).
Microsoft Word struck by zero-day vulnerability (Register) 
Clop ransomware gang is back, hits 21 victims in a single month (BleepingComputer)
Conti ransomware explained: What you need to know about this aggressive criminal group (CSO Online) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 31 May 2022 20:30:00 -0000</pubDate>
      <itunes:title>Potential cyber threats to agriculture. Cyber phases of Russia’s hybrid war. REvil prosecution at a stand (and it’s the Americans’ fault, say Russian sources). Microsoft mitigates Follima.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1589</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Sanctions, blockades, and their effects on the world economy. Western nations remain on alert for Russian cyber attacks. REvil prosecution has reached a dead end. Microsoft issues mitigations for a recent zero-day. John Pescatore’s Mr. Security Answer Person is back, looking at authentication. Joe Carrigan looks at new browser vulnerabilities. Notes from the underworld.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/104

Selected reading.
In big bid to punish Moscow, EU bans most Russia oil imports (AP NEWS) 
EU, resolving a deadlock, in deal to cut most Russia oil imports (Reuters
The E.U.’s embargo will bruise Russia’s oil industry, but for now it is doing fine. (New York Times) 
Russia’s Black Sea Blockade Will Turbocharge the Global Food Crisis (Foreign Policy) 
Russia’s Invasion Unleashes ‘Perfect Storm’ in Global Agriculture (Foreign Policy) 
‘War in Ukraine Means Hunger in Africa’ (Foreign Policy)
Afghanistan’s Hungry Will Pay the Price for Putin’s War (Foreign Policy)
Remote bricking of Ukrainian tractors raises agriculture security concerns (CSO Online)
Major supermarkets 'uniquely vulnerable' as Russian cyber attacks rise (ABC)
Italy warns organizations to brace for incoming DDoS attacks (BleepingComputer)
Whitepaper - PIPEDREAM: CHERNOVITE's Emerging Malware Targeting Industrial Environments (Dragos).
Experts believe that Russian Gamaredon APT could fuel a new round of DDoS attacks (IT Security News) 
Putin horror warning over 'own goal' attack on UK coming back to haunt Kremlin (Express.co.uk) 
Putin plot: UK hospitals at risk of chilling ‘sleeper cell’ attack by Russia (Express) 
Will Russia Launch a New Cyber Attack on America? (The National Interest) 
Hackers wage war on Russia’s largest bank (The Telegraph) 
REvil prosecutions reach a 'dead end,' Russian media reports (CyberScoop) 
Microsoft Office zero-day "Follina"—it’s not a bug, it’s a feature! (It's a bug) (Malwarebytes Labs).
Microsoft Word struck by zero-day vulnerability (Register) 
Clop ransomware gang is back, hits 21 victims in a single month (BleepingComputer)
Conti ransomware explained: What you need to know about this aggressive criminal group (CSO Online) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sanctions, blockades, and their effects on the world economy. Western nations remain on alert for Russian cyber attacks. REvil prosecution has reached a dead end. Microsoft issues mitigations for a recent zero-day. John Pescatore’s Mr. Security Answer Person is back, looking at authentication. Joe Carrigan looks at new browser vulnerabilities. Notes from the underworld.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/104</p><p><br></p><h2>Selected reading.</h2><p><a href="https://apnews.com/article/russia-ukraine-european-union-global-trade-government-and-politics-116cf5eeba7f1a4df46d7f6a574b2de9">In big bid to punish Moscow, EU bans most Russia oil imports</a> (AP NEWS) </p><p><a href="https://www.reuters.com/world/europe/eu-pledge-support-ukraine-not-ready-with-new-russia-sanctions-2022-05-30/">EU, resolving a deadlock, in deal to cut most Russia oil imports</a> (Reuters</p><p><a href="https://www.nytimes.com/2022/05/30/business/oil-embargo-russia.html">The E.U.’s embargo will bruise Russia’s oil industry, but for now it is doing fine.</a> (New York Times) </p><p><a href="https://foreignpolicy.com/2022/05/24/russia-ukraine-blockade-food-crisis-black-sea/">Russia’s Black Sea Blockade Will Turbocharge the Global Food Crisis</a> (Foreign Policy) </p><p><a href="https://foreignpolicy.com/2022/03/24/russia-war-ukraine-food-crisis-wheat-fertilizer/">Russia’s Invasion Unleashes ‘Perfect Storm’ in Global Agriculture</a> (Foreign Policy) </p><p><a href="https://foreignpolicy.com/2022/03/23/imf-ukraine-war-russia-economic-impact-georgieva-gopinath/">‘War in Ukraine Means Hunger in Africa’</a> (Foreign Policy)</p><p><a href="https://foreignpolicy.com/2022/04/01/afghanistan-food-insecurity-humanitarian-crisis-war/">Afghanistan’s Hungry Will Pay the Price for Putin’s War</a> (Foreign Policy)</p><p><a href="https://www.csoonline.com/article/3661434/remote-bricking-of-ukrainian-tractors-raises-agriculture-security-concerns.html">Remote bricking of Ukrainian tractors raises agriculture security concerns</a> (CSO Online)</p><p><a href="https://www.abc.net.au/news/2022-05-30/food-industry-cyber-attack-russia-hacking-risk/101110386">Major supermarkets 'uniquely vulnerable' as Russian cyber attacks rise</a> (ABC)</p><p><a href="https://www.bleepingcomputer.com/news/security/italy-warns-organizations-to-brace-for-incoming-ddos-attacks/">Italy warns organizations to brace for incoming DDoS attacks</a> (BleepingComputer)</p><p><a href="https://hub.dragos.com/chernovite-pipedream-whitepaper">Whitepaper - PIPEDREAM: CHERNOVITE's Emerging Malware Targeting Industrial Environments</a> (Dragos).</p><p><a href="https://www.itsecuritynews.info/experts-believe-that-russian-gamaredon-apt-could-fuel-a-new-round-of-ddos-attacks/">Experts believe that Russian Gamaredon APT could fuel a new round of DDoS attacks</a> (IT Security News) </p><p><a href="https://www.express.co.uk/news/uk/1616369/Putin-news-cyber-attack-uk-war">Putin horror warning over 'own goal' attack on UK coming back to haunt Kremlin</a> (Express.co.uk) </p><p><a href="https://www.express.co.uk/news/uk/1616338/Putin-news-cyberattack-plans-UK-hospitals-russia">Putin plot: UK hospitals at risk of chilling ‘sleeper cell’ attack by Russia</a> (Express) </p><p><a href="https://nationalinterest.org/blog/techland-when-great-power-competition-meets-digital-world/will-russia-launch-new-cyber-attack">Will Russia Launch a New Cyber Attack on America?</a> (The National Interest) </p><p><a href="https://www.telegraph.co.uk/business/2022/05/29/hackers-wage-war-russias-largest-bank/">Hackers wage war on Russia’s largest bank</a> (The Telegraph) </p><p><a href="https://www.cyberscoop.com/revil-prosecutions-reach-a-dead-end-russian-media-reports/?mod=djemCybersecruityPro&amp;tpl=cy">REvil prosecutions reach a 'dead end,' Russian media reports</a> (CyberScoop) </p><p><a href="https://blog.malwarebytes.com/exploits-and-vulnerabilities/2022/05/microsoft-office-zero-day-follina-its-not-a-bug-its-a-feature-its-a-bug/">Microsoft Office zero-day "Follina"—it’s not a bug, it’s a feature! (It's a bug)</a> (Malwarebytes Labs).</p><p><a href="https://www.theregister.com/2022/05/30/follina_microsoft_office_vulnerability/">Microsoft Word struck by zero-day vulnerability</a> (Register) </p><p><a href="https://www.bleepingcomputer.com/news/security/clop-ransomware-gang-is-back-hits-21-victims-in-a-single-month/">Clop ransomware gang is back, hits 21 victims in a single month</a> (BleepingComputer)</p><p><a href="https://www.csoonline.com/article/3638056/conti-ransomware-explained-and-why-its-one-of-the-most-aggressive-criminal-groups.html">Conti ransomware explained: What you need to know about this aggressive criminal group</a> (CSO Online) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1605</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b32292f0-7881-11ec-90a9-23eddc46c81a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9421038708.mp3?updated=1690312139" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Michael Scott: A team of humble intellects. [Information security] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/102/notes</link>
      <description>Chief Information Security Officer at Immuta, Michael Scott shares his story from working at a forgotten internet service provider to leading the security fight for major food chain restaurants. Michael explains how the different roles at various companies he has worked with paved his way to where he is now at Immuta. He works with a group of colleagues and he leads in a different style, describing that "It really is just a collection of a lot of, we call humble intellects" working with him. Michael attributes adversity to being a cornerstone of existence in the security community, and explains how that helps him keep up the fight. We thank Michael for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 29 May 2022 07:00:00 -0000</pubDate>
      <itunes:title>Michael Scott: A team of humble intellects. [Information security] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>102</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Chief Information Security Officer at Immuta, Michael Scott shares his story from working at a forgotten internet service provider to leading the security fight for major food chain restaurants. Michael explains how the different roles at various companies he has worked with paved his way to where he is now at Immuta. He works with a group of colleagues and he leads in a different style, describing that "It really is just a collection of a lot of, we call humble intellects" working with him. Michael attributes adversity to being a cornerstone of existence in the security community, and explains how that helps him keep up the fight. We thank Michael for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chief Information Security Officer at Immuta, Michael Scott shares his story from working at a forgotten internet service provider to leading the security fight for major food chain restaurants. Michael explains how the different roles at various companies he has worked with paved his way to where he is now at Immuta. He works with a group of colleagues and he leads in a different style, describing that "It really is just a collection of a lot of, we call humble intellects" working with him. Michael attributes adversity to being a cornerstone of existence in the security community, and explains how that helps him keep up the fight. We thank Michael for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>472</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d3087918-dc68-11ec-b9f0-bba545aa5128]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6976157869.mp3?updated=1653507155" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Compromised military tech? [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/234/notes</link>
      <description>Dick O'Brien from Symantec's threat hunter team, joins Dave to discuss their work on "Stonefly: North Korea-linked spying operation continues to hit high-value targets." Stonefly specializes in mounting highly selective targeted attacks against targets that could yield intelligence to assist strategically important sectors.
Symantec found that The attackers breached an engineering firm in February 2022, most likely by exploiting the Log4j vulnerability, Their research describes who these high value targets are and ways to prevent this malware from breaching any more companies as well as indications that you could be compromised.
The research can be found here:
Stonefly: North Korea-linked Spying Operation Continues to Hit High-value Targets

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 May 2022 07:00:00 -0000</pubDate>
      <itunes:title>Compromised military tech? [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>234</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dick O'Brien from Symantec's threat hunter team, joins Dave to discuss their work on "Stonefly: North Korea-linked spying operation continues to hit high-value targets." Stonefly specializes in mounting highly selective targeted attacks against targets that could yield intelligence to assist strategically important sectors.
Symantec found that The attackers breached an engineering firm in February 2022, most likely by exploiting the Log4j vulnerability, Their research describes who these high value targets are and ways to prevent this malware from breaching any more companies as well as indications that you could be compromised.
The research can be found here:
Stonefly: North Korea-linked Spying Operation Continues to Hit High-value Targets

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dick O'Brien from Symantec's threat hunter team, joins Dave to discuss their work on "Stonefly: North Korea-linked spying operation continues to hit high-value targets." Stonefly specializes in mounting highly selective targeted attacks against targets that could yield intelligence to assist strategically important sectors.</p><p>Symantec found that The attackers breached an engineering firm in February 2022, most likely by exploiting the Log4j vulnerability, Their research describes who these high value targets are and ways to prevent this malware from breaching any more companies as well as indications that you could be compromised.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/stonefly-north-korea-espionage">Stonefly: North Korea-linked Spying Operation Continues to Hit High-value Targets</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1172</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a084cd32-dd23-11ec-9e9a-3354b8d3d877]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5389817821.mp3?updated=1684590294" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber ops and a side benefit of sanctions. BlackCat wants $5 million from Carinthia. Fraudster pressures Verizon. Spain responds to surveillance scandal. CISA has 5G implementation  guidelines.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1588/notes</link>
      <description>Pro-Russian DDoS attacks. Sanctions and their effect on ransomware. BlackCat wants $5 million from Carinthia. A fraudster pressures Verizon. Spain will tighten judicial review of intelligence services. Johannes Ullrich looks at VSTO Office Files. Our guests are Cecilia Marinier and Niloo Howe with a preview of the RSAC Innovation Sandbox. CISA releases ICS advisories and with its partners issue guidelines for evaluating 5G implementation.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/103

Selected reading.
Hacktivists Expanding DDoS Attacks as Part of International Cyber Warfare Strategy (Imperva) 
Cyberattacks against UK CNI increase amidst Russia-Ukraine war (Intelligent CIO Europe) 
A cyberwar is already happening in Ukraine, Microsoft analysts say (NPR.org)
NSA: Sanctions on Russia Having a Positive Effect on Ransomware Attacks, Attempts Down Due to Difficulty Collecting Ransom Payments (CPO Magazine) 
BlackCat/ALPHV ransomware asks $5 million to unlock Austrian state (BleepingComputer) 
Hacker Steals Database of Hundreds of Verizon Employees (Vice) 
Drupal Releases Security Updates (CISA)
Keysight N6854A Geolocation server and N6841A RF Sensor software (CISA) 
Horner Automation Cscape Csfont (CISA) 
Spain vows legal reforms in wake of spying allegations (MSN)
Spain’s PM vows to reform intelligence services following phone hacking scandal (The Record by Recorded Future) 
Spain set to strengthen oversight of secret services after NSO spying scandal (Times of Israel) 
CISA and DoD Release 5G Security Evaluation Process Investigation Study (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 27 May 2022 20:15:00 -0000</pubDate>
      <itunes:title>Cyber ops and a side benefit of sanctions. BlackCat wants $5 million from Carinthia. Fraudster pressures Verizon. Spain responds to surveillance scandal. CISA has 5G implementation  guidelines.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1588</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Pro-Russian DDoS attacks. Sanctions and their effect on ransomware. BlackCat wants $5 million from Carinthia. A fraudster pressures Verizon. Spain will tighten judicial review of intelligence services. Johannes Ullrich looks at VSTO Office Files. Our guests are Cecilia Marinier and Niloo Howe with a preview of the RSAC Innovation Sandbox. CISA releases ICS advisories and with its partners issue guidelines for evaluating 5G implementation.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/103

Selected reading.
Hacktivists Expanding DDoS Attacks as Part of International Cyber Warfare Strategy (Imperva) 
Cyberattacks against UK CNI increase amidst Russia-Ukraine war (Intelligent CIO Europe) 
A cyberwar is already happening in Ukraine, Microsoft analysts say (NPR.org)
NSA: Sanctions on Russia Having a Positive Effect on Ransomware Attacks, Attempts Down Due to Difficulty Collecting Ransom Payments (CPO Magazine) 
BlackCat/ALPHV ransomware asks $5 million to unlock Austrian state (BleepingComputer) 
Hacker Steals Database of Hundreds of Verizon Employees (Vice) 
Drupal Releases Security Updates (CISA)
Keysight N6854A Geolocation server and N6841A RF Sensor software (CISA) 
Horner Automation Cscape Csfont (CISA) 
Spain vows legal reforms in wake of spying allegations (MSN)
Spain’s PM vows to reform intelligence services following phone hacking scandal (The Record by Recorded Future) 
Spain set to strengthen oversight of secret services after NSO spying scandal (Times of Israel) 
CISA and DoD Release 5G Security Evaluation Process Investigation Study (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Pro-Russian DDoS attacks. Sanctions and their effect on ransomware. BlackCat wants $5 million from Carinthia. A fraudster pressures Verizon. Spain will tighten judicial review of intelligence services. Johannes Ullrich looks at VSTO Office Files. Our guests are Cecilia Marinier and Niloo Howe with a preview of the RSAC Innovation Sandbox. CISA releases ICS advisories and with its partners issue guidelines for evaluating 5G implementation.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/103</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.imperva.com/blog/hacktivists-expanding-ddos-attacks-as-part-of-international-cyber-warfare-strategy/">Hacktivists Expanding DDoS Attacks as Part of International Cyber Warfare Strategy</a> (Imperva) </p><p><a href="https://www.intelligentcio.com/eu/2022/05/26/cyberattacks-against-uk-cni-increase-amidst-russia-ukraine-war/">Cyberattacks against UK CNI increase amidst Russia-Ukraine war</a> (Intelligent CIO Europe) </p><p><a href="https://www.npr.org/2022/05/26/1101569979/a-cyberwar-is-already-happening-in-ukraine-microsoft-analysts-say">A cyberwar is already happening in Ukraine, Microsoft analysts say</a> (NPR.org)</p><p><a href="https://www.cpomagazine.com/cyber-security/nsa-sanctions-on-russia-having-a-positive-effect-on-ransomware-attacks-attempts-down-due-to-difficulty-collecting-ransom-payments/">NSA: Sanctions on Russia Having a Positive Effect on Ransomware Attacks, Attempts Down Due to Difficulty Collecting Ransom Payments</a> (CPO Magazine) </p><p><a href="https://www.bleepingcomputer.com/news/security/blackcat-alphv-ransomware-asks-5-million-to-unlock-austrian-state/">BlackCat/ALPHV ransomware asks $5 million to unlock Austrian state</a> (BleepingComputer) </p><p><a href="https://www.vice.com/en/article/wxdwxn/hacker-steals-database-of-hundreds-of-verizon-employees">Hacker Steals Database of Hundreds of Verizon Employees</a> (Vice) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/05/26/drupal-releases-security-updates">Drupal Releases Security Updates</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-146-01">Keysight N6854A Geolocation server and N6841A RF Sensor software</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-146-02">Horner Automation Cscape Csfont</a> (CISA) </p><p><a href="https://www.msn.com/en-ca/news/science/spain-vows-legal-reforms-in-wake-of-spying-allegations/ar-AAXKDHp">Spain vows legal reforms in wake of spying allegations</a> (MSN)</p><p><a href="https://therecord.media/spains-pm-vows-to-reform-intelligence-services-following-phone-hacking-scandal/">Spain’s PM vows to reform intelligence services following phone hacking scandal</a> (The Record by Recorded Future) </p><p><a href="https://www.timesofisrael.com/spain-set-to-strengthen-oversight-of-secret-services-after-nso-spying-scandal/">Spain set to strengthen oversight of secret services after NSO spying scandal</a> (Times of Israel) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/05/26/cisa-and-dod-release-5g-security-evaluation-process-investigation">CISA and DoD Release 5G Security Evaluation Process Investigation Study</a> (CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1387</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5188c5e-7881-11ec-90a9-a3dd1a143b3e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1805916869.mp3?updated=1690312122" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>"Pantsdown" firmware vulnerability. ChromeLoader warning. Conti update. Ransomware at SpiceJet. CISA's Known Exploited Vulnerabilities Catalog expands. Kyiv honors Google. Reformed ID thief.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1587/notes</link>
      <description>"Pantsdown" in QCT Baseboard Management Controllers. A warning on ChromeLoader. Conti updates. Ransomware’s effect on SpiceJet. CISA's Known Exploited Vulnerabilities Catalog expands, again. Kyiv honors Google. Josh Ray from Accenture reminds us it’s military appreciation month. Our guest is Melissa Bischoping of Tanium with lessons learned from the American Dental Association ransomware attack. And a poacher turned gamekeeper?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/102

Selected reading.
Critical 'Pantsdown' BMC Vulnerability Affects QCT Servers Used in Data Centers (The Hacker News)
ChromeLoader: a pushy malvertiser (Red Canary) 
Conti leaks data stolen during January attack on Oregon county (The Record by Recorded Future) 
Is the Conti Ransomware Gang Stronger Apart Then Together? (OODA Loop) 
SpiceJet: Passengers stranded as India airline hit by ransomware attack (BBC News) 
SpiceJet's woes continue as ransomware attack delays flights (The Loadstar) .
SpiceJet's brush with ransomware is a timely reminder to protect yourself against this cyber menace (cnbctv18.com
CISA Adds 34 Known Exploited Vulnerabilities to Catalog (CISA) 
Mykhailo Fedorov presented the first "Peace prize" to Google (Digital Gov) 
 Notorious Vietnamese hacker turns government cyber agent (France 24)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 26 May 2022 20:15:00 -0000</pubDate>
      <itunes:title>"Pantsdown" firmware vulnerability. ChromeLoader warning. Conti update. Ransomware at SpiceJet. CISA's Known Exploited Vulnerabilities Catalog expands. Kyiv honors Google. Reformed ID thief.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1587</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>"Pantsdown" in QCT Baseboard Management Controllers. A warning on ChromeLoader. Conti updates. Ransomware’s effect on SpiceJet. CISA's Known Exploited Vulnerabilities Catalog expands, again. Kyiv honors Google. Josh Ray from Accenture reminds us it’s military appreciation month. Our guest is Melissa Bischoping of Tanium with lessons learned from the American Dental Association ransomware attack. And a poacher turned gamekeeper?

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/102

Selected reading.
Critical 'Pantsdown' BMC Vulnerability Affects QCT Servers Used in Data Centers (The Hacker News)
ChromeLoader: a pushy malvertiser (Red Canary) 
Conti leaks data stolen during January attack on Oregon county (The Record by Recorded Future) 
Is the Conti Ransomware Gang Stronger Apart Then Together? (OODA Loop) 
SpiceJet: Passengers stranded as India airline hit by ransomware attack (BBC News) 
SpiceJet's woes continue as ransomware attack delays flights (The Loadstar) .
SpiceJet's brush with ransomware is a timely reminder to protect yourself against this cyber menace (cnbctv18.com
CISA Adds 34 Known Exploited Vulnerabilities to Catalog (CISA) 
Mykhailo Fedorov presented the first "Peace prize" to Google (Digital Gov) 
 Notorious Vietnamese hacker turns government cyber agent (France 24)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>"Pantsdown" in QCT Baseboard Management Controllers. A warning on ChromeLoader. Conti updates. Ransomware’s effect on SpiceJet. CISA's Known Exploited Vulnerabilities Catalog expands, again. Kyiv honors Google. Josh Ray from Accenture reminds us it’s military appreciation month. Our guest is Melissa Bischoping of Tanium with lessons learned from the American Dental Association ransomware attack. And a poacher turned gamekeeper?</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/102</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thehackernews.com/2022/05/critical-pantsdown-bmc-vulnerability.html">Critical 'Pantsdown' BMC Vulnerability Affects QCT Servers Used in Data Centers</a> (The Hacker News)</p><p><a href="https://redcanary.com/blog/chromeloader/">ChromeLoader: a pushy malvertiser</a> (Red Canary) </p><p><a href="https://therecord.media/linn-county-oregon-data-leak-conti-ransomware/">Conti leaks data stolen during January attack on Oregon county</a> (The Record by Recorded Future) </p><p><a href="https://www.oodaloop.com/archive/2022/05/23/is-the-conti-ransomware-gang-stronger-apart-then-together/">Is the Conti Ransomware Gang Stronger Apart Then Together?</a> (OODA Loop) </p><p><a href="https://www.bbc.com/news/world-asia-india-61575773">SpiceJet: Passengers stranded as India airline hit by ransomware attack</a> (BBC News) </p><p><a href="https://theloadstar.com/spicejets-woes-continue-as-ransomware-attack-delays-flights/">SpiceJet's woes continue as ransomware attack delays flights</a> (The Loadstar) .</p><p><a href="https://www.cnbctv18.com/technology/spicejet-ransomware-attack-cyber-security-threat-online-safety-awareness-global-incidents-13609672.htm">SpiceJet's brush with ransomware is a timely reminder to protect yourself against this cyber menace</a> (cnbctv18.com</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/05/25/cisa-adds-34-known-exploited-vulnerabilities-catalog">CISA Adds 34 Known Exploited Vulnerabilities to Catalog</a> (CISA) </p><p><a href="https://thedigital.gov.ua/news/mikhaylo-fedorov-vruchiv-pershu-vidznaku-miru-kompanii-google">Mykhailo Fedorov presented the first "Peace prize" to Google</a> (Digital Gov) </p><p> <a href="https://www.france24.com/en/live-news/20220525-notorious-vietnamese-hacker-turns-government-cyber-agent">Notorious Vietnamese hacker turns government cyber agent</a> (France 24)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1489</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b43d2bc8-7881-11ec-90a9-17ee383fc7e8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3310041958.mp3?updated=1690312109" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More cyberespionage in Russia. Advice on conducting propaganda. Iranian group conducts DDoS against Port of London Authority. News from the underworld. CISA alerts. Operation Delilah.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1586/notes</link>
      <description>More cyberespionage targets Russian networks. Lincoln Project veterans visit Ukraine with advice on conducting an influence campaign against President Putin. A politically motivated DDoS attack hits the Port of London Authority website. Is REvil back and looking into new criminal techniques, or is a recent DDoS campaign the work of impostors? RansomHouse may be operated by frustrated bounty hunters. Kevin Magee from Microsoft sets his security sights toward space. Our guest is Mathieu Gorge of VigiTrust to discuss the threat of printer hacks. Operation Delilah trims SilverTerrier’s locks.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/101

Selected reading.
Unknown APT group has targeted Russia repeatedly since Ukraine invasion (Malwarebytes Labs) 
Hackers target Russian govt with fake Windows updates pushing RATs (BleepingComputer) 
Researchers Find New Malware Attacks Targeting Russian Government Entities (The Hacker News) 
Ukraine May Use Lincoln Project's Anti-Trump Tactics Against Putin (Newsweek)
Pro-Iran Group ALtahrea Hits Port of London Website by DDoS Attack (HackRead)
REvil Resurgence? Or a Copycat? (Akamai)
RansomHouse: Bug bounty hunters gone rogue? (Help Net Security) 
Data theft gang RansomHouse might be 'frustrated' white hat hackers, researchers claim (Tech Monitor)
CISA Adds 20 Known Exploited Vulnerabilities to Catalog (CISA) 
CISA adds 41 flaws to its Known Exploited Vulnerabilities Catalog (Security Affairs) 
Rockwell Automation Logix Controllers (CISA) 
Matrikon OPC Server (CISA) 
Mitsubishi Electric FA Engineering Software Products (Update D) (CISA) 
Mitsubishi Electric Factory Automation Engineering Products (Update F) (CISA) 
Suspected head of cybercrime gang arrested in Nigeria (Interpol)
Interpol arrests alleged leader of the SilverTerrier BEC gang (BleepingComputer) 
INTERPOL hauls in alleged Nigerian cybercrime ringleader (CyberScoop) 
Operation Delilah: Unit 42 Helps INTERPOL Identify Nigerian Business Email Compromise Actor (Unit42)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 25 May 2022 20:15:00 -0000</pubDate>
      <itunes:title>More cyberespionage in Russia. Advice on conducting propaganda. Iranian group conducts DDoS against Port of London Authority. News from the underworld. CISA alerts. Operation Delilah.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1586</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>More cyberespionage targets Russian networks. Lincoln Project veterans visit Ukraine with advice on conducting an influence campaign against President Putin. A politically motivated DDoS attack hits the Port of London Authority website. Is REvil back and looking into new criminal techniques, or is a recent DDoS campaign the work of impostors? RansomHouse may be operated by frustrated bounty hunters. Kevin Magee from Microsoft sets his security sights toward space. Our guest is Mathieu Gorge of VigiTrust to discuss the threat of printer hacks. Operation Delilah trims SilverTerrier’s locks.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/101

Selected reading.
Unknown APT group has targeted Russia repeatedly since Ukraine invasion (Malwarebytes Labs) 
Hackers target Russian govt with fake Windows updates pushing RATs (BleepingComputer) 
Researchers Find New Malware Attacks Targeting Russian Government Entities (The Hacker News) 
Ukraine May Use Lincoln Project's Anti-Trump Tactics Against Putin (Newsweek)
Pro-Iran Group ALtahrea Hits Port of London Website by DDoS Attack (HackRead)
REvil Resurgence? Or a Copycat? (Akamai)
RansomHouse: Bug bounty hunters gone rogue? (Help Net Security) 
Data theft gang RansomHouse might be 'frustrated' white hat hackers, researchers claim (Tech Monitor)
CISA Adds 20 Known Exploited Vulnerabilities to Catalog (CISA) 
CISA adds 41 flaws to its Known Exploited Vulnerabilities Catalog (Security Affairs) 
Rockwell Automation Logix Controllers (CISA) 
Matrikon OPC Server (CISA) 
Mitsubishi Electric FA Engineering Software Products (Update D) (CISA) 
Mitsubishi Electric Factory Automation Engineering Products (Update F) (CISA) 
Suspected head of cybercrime gang arrested in Nigeria (Interpol)
Interpol arrests alleged leader of the SilverTerrier BEC gang (BleepingComputer) 
INTERPOL hauls in alleged Nigerian cybercrime ringleader (CyberScoop) 
Operation Delilah: Unit 42 Helps INTERPOL Identify Nigerian Business Email Compromise Actor (Unit42)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>More cyberespionage targets Russian networks. Lincoln Project veterans visit Ukraine with advice on conducting an influence campaign against President Putin. A politically motivated DDoS attack hits the Port of London Authority website. Is REvil back and looking into new criminal techniques, or is a recent DDoS campaign the work of impostors? RansomHouse may be operated by frustrated bounty hunters. Kevin Magee from Microsoft sets his security sights toward space. Our guest is Mathieu Gorge of VigiTrust to discuss the threat of printer hacks. Operation Delilah trims SilverTerrier’s locks.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/101</p><p><br></p><h2>Selected reading.</h2><p><a href="https://blog.malwarebytes.com/malwarebytes-news/2022/05/unknown-apt-group-has-targeted-russia-repeatedly-since-ukraine-invasion/">Unknown APT group has targeted Russia repeatedly since Ukraine invasion</a> (Malwarebytes Labs) </p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-target-russian-govt-with-fake-windows-updates-pushing-rats/">Hackers target Russian govt with fake Windows updates pushing RATs</a> (BleepingComputer) </p><p><a href="https://thehackernews.com/2022/05/researchers-find-new-malware-attacks.html">Researchers Find New Malware Attacks Targeting Russian Government Entities</a> (The Hacker News) </p><p><a href="https://www.newsweek.com/ukraine-may-use-lincoln-projects-anti-trump-tactics-against-putin-1709311">Ukraine May Use Lincoln Project's Anti-Trump Tactics Against Putin</a> (Newsweek)</p><p><a href="https://www.hackread.com/pro-iran-altahrea-hit-port-of-london-website-ddos-attack/">Pro-Iran Group ALtahrea Hits Port of London Website by DDoS Attack</a> (HackRead)</p><p><a href="https://www.akamai.com/blog/security/revil-resurgence-or-copycat">REvil Resurgence? Or a Copycat?</a> (Akamai)</p><p><a href="https://www.helpnetsecurity.com/2022/05/24/ransomhouse-data-extortion/">RansomHouse: Bug bounty hunters gone rogue?</a> (Help Net Security) </p><p><a href="https://techmonitor.ai/technology/cybersecurity/ransomhouse-cybercime-gang">Data theft gang RansomHouse might be 'frustrated' white hat hackers, researchers claim</a> (Tech Monitor)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/05/24/cisa-adds-20-known-exploited-vulnerabilities-catalog">CISA Adds 20 Known Exploited Vulnerabilities to Catalog</a> (CISA) </p><p><a href="https://securityaffairs.co/wordpress/131646/security/known-exploited-vulnerabilities-catalog-flaws-2.html">CISA adds 41 flaws to its Known Exploited Vulnerabilities Catalog</a> (Security Affairs) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-144-01">Rockwell Automation Logix Controllers</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-144-02">Matrikon OPC Server</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-21-049-02">Mitsubishi Electric FA Engineering Software Products (Update D)</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-20-212-04">Mitsubishi Electric Factory Automation Engineering Products (Update F)</a> (CISA) </p><p><a href="https://www.interpol.int/News-and-Events/News/2022/Suspected-head-of-cybercrime-gang-arrested-in-Nigeria">Suspected head of cybercrime gang arrested in Nigeria</a> (Interpol)</p><p><a href="https://www.bleepingcomputer.com/news/security/interpol-arrests-alleged-leader-of-the-silverterrier-bec-gang/">Interpol arrests alleged leader of the SilverTerrier BEC gang</a> (BleepingComputer) </p><p><a href="https://www.cyberscoop.com/silverterrier-interpol-nigeria-bec/">INTERPOL hauls in alleged Nigerian cybercrime ringleader</a> (CyberScoop) </p><p><a href="https://unit42.paloaltonetworks.com/operation-delilah-business-email-compromise-actor/">Operation Delilah: Unit 42 Helps INTERPOL Identify Nigerian Business Email Compromise Actor</a> (Unit42)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1588</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b41e1a30-7881-11ec-90a9-3b11262fc6e8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7991693049.mp3?updated=1690311991" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Verizon's 2022 DBIR shows a sharp rise in ransomware. Origins of Chaos ransomware. GuLoader’s phishbait. Malicious proofs-of-concept. Hyperlocal disinformation and hybrid warfare. Robin Hood?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1585/notes</link>
      <description>Verizon's 2022 Data Breach Investigation Report shows a sharp rise in ransomware. Origins of the Chaos ransomware operation. The GuLoader campaign uses bogus purchase orders. Security researchers are targeted in a malware campaign. Hyperlocal disinformation. Turla reconnaissance has been detected in Austrian and Estonian networks. Ben Yelin describes a content moderation fight that may be headed to the supreme court. Our guest is Richard Melick from Zimperium to discuss threats to mobile security. Robin Hood (or not).

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/100

Selected reading.
2022 Data Breach Investigations Report (Verizon Business) 
Yashma Ransomware, Tracing the Chaos Family Tree (BlackBerry)
Spoofed Saudi Purchase Order Drops GuLoader: Part 1 (Fortinet Blog) 
Malware Campaign Targets InfoSec Community: Threat Actor Uses Fake Proof of Concept to Deliver Cobalt-Strike Beacon (Cyble)
Network of hyperlocal Russian Telegram channels spew disinformation in occupied Ukraine (CyberScoop) 
Russian hackers perform reconnaissance against Austria, Estonia (BleepingComputer)
New ransomware forces victims to donate to poor (The Independent)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 May 2022 20:15:00 -0000</pubDate>
      <itunes:title>Verizon's 2022 DBIR shows a sharp rise in ransomware. Origins of Chaos ransomware. GuLoader’s phishbait. Malicious proofs-of-concept. Hyperlocal disinformation and hybrid warfare. Robin Hood?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1585</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Verizon's 2022 Data Breach Investigation Report shows a sharp rise in ransomware. Origins of the Chaos ransomware operation. The GuLoader campaign uses bogus purchase orders. Security researchers are targeted in a malware campaign. Hyperlocal disinformation. Turla reconnaissance has been detected in Austrian and Estonian networks. Ben Yelin describes a content moderation fight that may be headed to the supreme court. Our guest is Richard Melick from Zimperium to discuss threats to mobile security. Robin Hood (or not).

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/100

Selected reading.
2022 Data Breach Investigations Report (Verizon Business) 
Yashma Ransomware, Tracing the Chaos Family Tree (BlackBerry)
Spoofed Saudi Purchase Order Drops GuLoader: Part 1 (Fortinet Blog) 
Malware Campaign Targets InfoSec Community: Threat Actor Uses Fake Proof of Concept to Deliver Cobalt-Strike Beacon (Cyble)
Network of hyperlocal Russian Telegram channels spew disinformation in occupied Ukraine (CyberScoop) 
Russian hackers perform reconnaissance against Austria, Estonia (BleepingComputer)
New ransomware forces victims to donate to poor (The Independent)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Verizon's 2022 Data Breach Investigation Report shows a sharp rise in ransomware. Origins of the Chaos ransomware operation. The GuLoader campaign uses bogus purchase orders. Security researchers are targeted in a malware campaign. Hyperlocal disinformation. Turla reconnaissance has been detected in Austrian and Estonian networks. Ben Yelin describes a content moderation fight that may be headed to the supreme court. Our guest is Richard Melick from Zimperium to discuss threats to mobile security. Robin Hood (or not).</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/100</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.verizon.com/business/resources/reports/dbir/">2022 Data Breach Investigations Report</a> (Verizon Business) </p><p><a href="https://blogs.blackberry.com/en/2022/05/yashma-ransomware-tracing-the-chaos-family-tree"><strong>Yashma Ransomware, Tracing the Chaos Family Tree</strong></a> (BlackBerry)</p><p><a href="https://www.fortinet.com/blog/threat-research/spoofed-saudi-purchase-order-drops-guloader">Spoofed Saudi Purchase Order Drops GuLoader: Part 1</a> (Fortinet Blog) </p><p><a href="https://blog.cyble.com/2022/05/20/malware-campaign-targets-infosec-community-threat-actor-uses-fake-proof-of-concept-to-deliver-cobalt-strike-beacon/">Malware Campaign Targets InfoSec Community: Threat Actor Uses Fake Proof of Concept to Deliver Cobalt-Strike Beacon</a> (Cyble)</p><p><a href="https://www.cyberscoop.com/network-telegram-russian-disinformation-ukraine-detector-media/">Network of hyperlocal Russian Telegram channels spew disinformation in occupied Ukraine</a> (CyberScoop) </p><p><a href="https://www.bleepingcomputer.com/news/security/russian-hackers-perform-reconnaissance-against-austria-estonia/">Russian hackers perform reconnaissance against Austria, Estonia</a> (BleepingComputer)</p><p><a href="https://www.independent.co.uk/tech/ransomware-goodwill-cyber-security-cloudsec-b2085089.html">New ransomware forces victims to donate to poor </a>(The Independent)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1673</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b343f18e-7881-11ec-90a9-37e74cb9be87]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9988578728.mp3?updated=1690311976" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A new loader variant for wiper campaigns. Sanctions, hacktivism, and disinformation. Conti’s toxic branding. Happy birthday, US Cyber Command. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1584/notes</link>
      <description>There’s a new loader identified in wiper campaigns. President Putin complains of sanctions and cyberattacks, and vows to increase Russia's cybersecurity. Coordinated inauthenticity at scale. Killnet crows large over Italian operations. Conti's dissolution doesn't mean its operators' disappearance. Rick Howard looks at software defined perimeters. Dinah Davis from Arctic Wolf on how ransomware groups are upping their game to nation state levels. And happy birthday, US Cyber Command...but we're not necessarily wishing you a moonshot for your birthday present.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/99

Selected reading.
Sandworm uses a new version of ArguePatch to attack targets in Ukraine (WeLiveSecurity) 
Putin complains about barrage of cyberattacks (Military Times)
Putin promises to bolster Russia's IT security in face of cyber attacks (Reuters)
Russia keeps getting hacked (Mashable) 
Putin is bringing his disinformation war to Ukraine (Newsweek) 
Putin is bringing his disinformation war to Ukraine (Newsweek)
Russian government procured powerful botnet to shift social media trending topics (The Record by Recorded Future)
Fronton: Russian IoT Botnet Designed to Run Social Media Disinformation Campaigns (The Hacker News) 
Russian Hackers Claim Responsibility for Attacks on Italian Government Websites (Wall Street Journal)
Anonymous Declares Cyber-War on Pro-Russian Hacker Gang Killnet (Infosecurity Magazine) 
DisCONTInued: The End of Conti’s Brand Marks New Chapter For Cybercrime Landscape (AdvIntel) 
Notorious cybercrime gang Conti 'shuts down,' but its influence and talent are still out there (The Record by Recorded Future)
Could a Cyber Attack Overthrow a Government? Conti Ransomware Group Now Threatening To Topple Costa Rican Government if Ransom Not Paid (CPO Magazine) 
Fears grow after ransomware attack on Costa Rica escalates (TechCrunch) 
US Cyber Command’s birthday (US Cyber Command)
U.S. Needs New 'Manhattan Project' to Avoid Cyber Catastrophe | Opinion (Newsweek)
Cyber pros are fed up with talk about a cyber-Manhattan Project (Washington Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 23 May 2022 20:15:00 -0000</pubDate>
      <itunes:title>A new loader variant for wiper campaigns. Sanctions, hacktivism, and disinformation. Conti’s toxic branding. Happy birthday, US Cyber Command. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1584</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>There’s a new loader identified in wiper campaigns. President Putin complains of sanctions and cyberattacks, and vows to increase Russia's cybersecurity. Coordinated inauthenticity at scale. Killnet crows large over Italian operations. Conti's dissolution doesn't mean its operators' disappearance. Rick Howard looks at software defined perimeters. Dinah Davis from Arctic Wolf on how ransomware groups are upping their game to nation state levels. And happy birthday, US Cyber Command...but we're not necessarily wishing you a moonshot for your birthday present.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/99

Selected reading.
Sandworm uses a new version of ArguePatch to attack targets in Ukraine (WeLiveSecurity) 
Putin complains about barrage of cyberattacks (Military Times)
Putin promises to bolster Russia's IT security in face of cyber attacks (Reuters)
Russia keeps getting hacked (Mashable) 
Putin is bringing his disinformation war to Ukraine (Newsweek) 
Putin is bringing his disinformation war to Ukraine (Newsweek)
Russian government procured powerful botnet to shift social media trending topics (The Record by Recorded Future)
Fronton: Russian IoT Botnet Designed to Run Social Media Disinformation Campaigns (The Hacker News) 
Russian Hackers Claim Responsibility for Attacks on Italian Government Websites (Wall Street Journal)
Anonymous Declares Cyber-War on Pro-Russian Hacker Gang Killnet (Infosecurity Magazine) 
DisCONTInued: The End of Conti’s Brand Marks New Chapter For Cybercrime Landscape (AdvIntel) 
Notorious cybercrime gang Conti 'shuts down,' but its influence and talent are still out there (The Record by Recorded Future)
Could a Cyber Attack Overthrow a Government? Conti Ransomware Group Now Threatening To Topple Costa Rican Government if Ransom Not Paid (CPO Magazine) 
Fears grow after ransomware attack on Costa Rica escalates (TechCrunch) 
US Cyber Command’s birthday (US Cyber Command)
U.S. Needs New 'Manhattan Project' to Avoid Cyber Catastrophe | Opinion (Newsweek)
Cyber pros are fed up with talk about a cyber-Manhattan Project (Washington Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>There’s a new loader identified in wiper campaigns. President Putin complains of sanctions and cyberattacks, and vows to increase Russia's cybersecurity. Coordinated inauthenticity at scale. Killnet crows large over Italian operations. Conti's dissolution doesn't mean its operators' disappearance. Rick Howard looks at software defined perimeters. Dinah Davis from Arctic Wolf on how ransomware groups are upping their game to nation state levels. And happy birthday, US Cyber Command...but we're not necessarily wishing you a moonshot for your birthday present.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/99</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.welivesecurity.com/2022/05/20/sandworm-ukraine-new-version-arguepatch-malware-loader/">Sandworm uses a new version of ArguePatch to attack targets in Ukraine</a> (WeLiveSecurity) </p><p><a href="https://www.militarytimes.com/flashpoints/2022/05/20/putin-complains-about-barrage-of-cyberattacks/">Putin complains about barrage of cyberattacks</a> (Military Times)</p><p><a href="https://www.reuters.com/world/europe/putin-warns-cyber-aggression-against-russia-promises-security-shakeup-2022-05-20/">Putin promises to bolster Russia's IT security in face of cyber attacks</a> (Reuters)</p><p><a href="https://mashable.com/article/russia-putin-ukraine-cyber-attacks-hacked">Russia keeps getting hacked</a> (Mashable) </p><p><a href="https://www.newsweek.com/putin-bringing-his-disinformation-war-ukraine-1708674">Putin is bringing his disinformation war to Ukraine</a> (Newsweek) </p><p><a href="https://www.newsweek.com/putin-bringing-his-disinformation-war-ukraine-1708674">Putin is bringing his disinformation war to Ukraine</a> (Newsweek)</p><p><a href="https://therecord.media/russia-botnet-fronton-social-media-nisos/">Russian government procured powerful botnet to shift social media trending topics</a> (The Record by Recorded Future)</p><p><a href="https://thehackernews.com/2022/05/fronton-russian-iot-botnet-designed-to.html">Fronton: Russian IoT Botnet Designed to Run Social Media Disinformation Campaigns</a> (The Hacker News) </p><p><a href="https://www.wsj.com/livecoverage/russia-ukraine-latest-news-2022-05-20/card/russian-hackers-claim-responsibility-for-attacks-on-italian-government-websites-wmCkW0kSJtZDP33vFZfp">Russian Hackers Claim Responsibility for Attacks on Italian Government Websites</a> (Wall Street Journal)</p><p><a href="https://www.infosecurity-magazine.com/news/anonymous-declares-war-on-killnet/">Anonymous Declares Cyber-War on Pro-Russian Hacker Gang Killnet</a> (Infosecurity Magazine) </p><p><a href="https://www.advintel.io/post/discontinued-the-end-of-conti-s-brand-marks-new-chapter-for-cybercrime-landscape">DisCONTInued: The End of Conti’s Brand Marks New Chapter For Cybercrime Landscape</a> (AdvIntel) </p><p><a href="https://therecord.media/conti-ransomware-gang-digital-infrastructure-shut-down/">Notorious cybercrime gang Conti 'shuts down,' but its influence and talent are still out there</a> (The Record by Recorded Future)</p><p><a href="https://www.cpomagazine.com/cyber-security/could-a-cyber-attack-overthrow-a-government-conti-ransomware-group-now-threatening-to-topple-costa-rican-government-if-ransom-not-paid/">Could a Cyber Attack Overthrow a Government? Conti Ransomware Group Now Threatening To Topple Costa Rican Government if Ransom Not Paid</a> (CPO Magazine) </p><p><a href="https://techcrunch.com/2022/05/20/costa-rica-ransomware-attack/">Fears grow after ransomware attack on Costa Rica escalates</a> (TechCrunch) </p><p><a href="https://twitter.com/us_cybercom/status/1528069932998701058">US Cyber Command’s birthday</a> (US Cyber Command)</p><p><a href="https://www.newsweek.com/us-needs-new-manhattan-project-avoid-cyber-catastrophe-opinion-1706557">U.S. Needs New 'Manhattan Project' to Avoid Cyber Catastrophe | Opinion</a> (Newsweek)</p><p><a href="https://twitter.com/us_cybercom/status/1528069932998701058">Cyber pros are fed up with talk about a cyber-Manhattan Project</a> (Washington Post)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1405</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b2df795c-7881-11ec-90a9-d7b820b2a098]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2965206453.mp3?updated=1690311954" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Charity Wright: Pursue what you love [Threat intelligence] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/101/notes</link>
      <description>Threat intelligence analyst at Recorded Future, Charity Wright, shares her story from the army to her career today. Transitioning from the army to cybersecurity was an exciting change for her. During college she was recruited by the U.S army where she started her journey and learned new skills paving her pathway to threat intelligence where she is now. She shares that she works with a great team of junior analysts who are constantly checking each others biases which helps keep Charity grounded in her work. Charity spends her days keeping an eye on threats around the world where she says there is never a dull day in her line of work. We thank Charity for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 22 May 2022 07:00:00 -0000</pubDate>
      <itunes:title>Charity Wright: Pursue what you love [Threat intelligence] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>101</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Threat intelligence analyst at Recorded Future, Charity Wright, shares her story from the army to her career today. Transitioning from the army to cybersecurity was an exciting change for her. During college she was recruited by the U.S army where she started her journey and learned new skills paving her pathway to threat intelligence where she is now. She shares that she works with a great team of junior analysts who are constantly checking each others biases which helps keep Charity grounded in her work. Charity spends her days keeping an eye on threats around the world where she says there is never a dull day in her line of work. We thank Charity for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Threat intelligence analyst at Recorded Future, Charity Wright, shares her story from the army to her career today. Transitioning from the army to cybersecurity was an exciting change for her. During college she was recruited by the U.S army where she started her journey and learned new skills paving her pathway to threat intelligence where she is now. She shares that she works with a great team of junior analysts who are constantly checking each others biases which helps keep Charity grounded in her work. Charity spends her days keeping an eye on threats around the world where she says there is never a dull day in her line of work. We thank Charity for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>485</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2150141e-d78c-11ec-8404-0fa7fe9e4ac0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8052159400.mp3?updated=1652976810" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AutoWarp bug leads to Automation headaches. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/233/notes</link>
      <description>Yanir Tsarimi from Orca Security, joins Dave to discuss how researchers have discovered a critical Azure Automation service vulnerability called AutoWarp. The security flaw was discovered this past March causing Yanir to leap into action announcing the issue to Microsoft who helped to swiftly resolve the cross-account vulnerability.
The research shows how this serious flaw would allow attackers unauthorized access to other customer accounts and potentially full control over resources and data belonging to those accounts, as well as put multiple Fortune 500 companies and billions of dollars at risk. The research shares the crucial time line that the vulnerability was discovered as well as Microsofts response to the vulnerability.
The research can be found here:
AutoWarp: Critical Cross-Account Vulnerability in Microsoft Azure Automation Service

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 May 2022 07:00:00 -0000</pubDate>
      <itunes:title>AutoWarp bug leads to Automation headaches. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>233</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Yanir Tsarimi from Orca Security, joins Dave to discuss how researchers have discovered a critical Azure Automation service vulnerability called AutoWarp. The security flaw was discovered this past March causing Yanir to leap into action announcing the issue to Microsoft who helped to swiftly resolve the cross-account vulnerability.
The research shows how this serious flaw would allow attackers unauthorized access to other customer accounts and potentially full control over resources and data belonging to those accounts, as well as put multiple Fortune 500 companies and billions of dollars at risk. The research shares the crucial time line that the vulnerability was discovered as well as Microsofts response to the vulnerability.
The research can be found here:
AutoWarp: Critical Cross-Account Vulnerability in Microsoft Azure Automation Service

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Yanir Tsarimi from Orca Security, joins Dave to discuss how researchers have discovered a critical Azure Automation service vulnerability called AutoWarp. The security flaw was discovered this past March causing Yanir to leap into action announcing the issue to Microsoft who helped to swiftly resolve the cross-account vulnerability.</p><p>The research shows how this serious flaw would allow attackers unauthorized access to other customer accounts and potentially full control over resources and data belonging to those accounts, as well as put multiple Fortune 500 companies and billions of dollars at risk. The research shares the crucial time line that the vulnerability was discovered as well as Microsofts response to the vulnerability.</p><p>The research can be found here:</p><ul><li><a href="https://orca.security/resources/blog/autowarp-microsoft-azure-automation-service-vulnerability/">AutoWarp: Critical Cross-Account Vulnerability in Microsoft Azure Automation Service</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1091</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9cbc1f84-d86e-11ec-8af4-2f0a56548ef7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7051709411.mp3?updated=1685126806" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Is Conti rebranding? Commercial spyware scrutinized. Notes from the cyber phases of a hybrid war. Notes on the underworld. Software supply chain attack. Canada will exclude Huawei from 5G. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1583/notes</link>
      <description>Was Conti’s digital insurrection in Costa Rica misdirection? Google assesses a commercial spyware threat “with high confidence.” Continuing expectations of escalation in cyberspace. The limitations of an alliance of convenience. Fronton botnet shows versatility. Russian hacktivists hit Italian targets, again. Lazarus Group undertakes new SolarWinds exploitation. Crypters in the C2C market. CrateDepression supply chain attack. Johannes Ullrich describes an advance fee scam hitting crypto markets. Our guest is Marty Roesch, CEO of Netography and inventor of Snort. Canada to exclude Huawei from 5G networks on security grounds.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/98

Selected reading.
Conti ransomware shuts down operation, rebrands into smaller units (BleepingComputer) 
Protecting Android users from 0-Day attacks (Google) 
Microsoft President: Cyber Space Has Become the New Domain of Warfare (Infosecurity Magazine)
Twisted Panda: Chinese APT espionage operation against Russian’s state-owned defense institutes (Check Point Research) 
Chinese Hackers Tried to Steal Russian Defense Data, Report Says (New York Times) 
China-linked Space Pirates APT targets the Russian aerospace industry (Security Affairs) 
This Russian botnet does far more than DDoS attacks - and on a massive scale (ZDNet) 
Pro-Russian hackers attack institutional websites in Italy, police say (Reuters) 
Lazarus hackers target VMware servers with Log4Shell exploits (BleepingComputer)
ITG23 Crypters Highlight Cooperation Between Cybercriminal Groups (Security Intelligence) 
CrateDepression | Rust Supply-Chain Attack Infects Cloud CI Pipelines with Go Malware (SentinelOne) 
Canada to ban Huawei/ZTE 5G equipment, joining Five Eyes allies (Reuters)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 20 May 2022 20:30:00 -0000</pubDate>
      <itunes:title>Is Conti rebranding? Commercial spyware scrutinized. Notes from the cyber phases of a hybrid war. Notes on the underworld. Software supply chain attack. Canada will exclude Huawei from 5G. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1583</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Was Conti’s digital insurrection in Costa Rica misdirection? Google assesses a commercial spyware threat “with high confidence.” Continuing expectations of escalation in cyberspace. The limitations of an alliance of convenience. Fronton botnet shows versatility. Russian hacktivists hit Italian targets, again. Lazarus Group undertakes new SolarWinds exploitation. Crypters in the C2C market. CrateDepression supply chain attack. Johannes Ullrich describes an advance fee scam hitting crypto markets. Our guest is Marty Roesch, CEO of Netography and inventor of Snort. Canada to exclude Huawei from 5G networks on security grounds.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/98

Selected reading.
Conti ransomware shuts down operation, rebrands into smaller units (BleepingComputer) 
Protecting Android users from 0-Day attacks (Google) 
Microsoft President: Cyber Space Has Become the New Domain of Warfare (Infosecurity Magazine)
Twisted Panda: Chinese APT espionage operation against Russian’s state-owned defense institutes (Check Point Research) 
Chinese Hackers Tried to Steal Russian Defense Data, Report Says (New York Times) 
China-linked Space Pirates APT targets the Russian aerospace industry (Security Affairs) 
This Russian botnet does far more than DDoS attacks - and on a massive scale (ZDNet) 
Pro-Russian hackers attack institutional websites in Italy, police say (Reuters) 
Lazarus hackers target VMware servers with Log4Shell exploits (BleepingComputer)
ITG23 Crypters Highlight Cooperation Between Cybercriminal Groups (Security Intelligence) 
CrateDepression | Rust Supply-Chain Attack Infects Cloud CI Pipelines with Go Malware (SentinelOne) 
Canada to ban Huawei/ZTE 5G equipment, joining Five Eyes allies (Reuters)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Was Conti’s digital insurrection in Costa Rica misdirection? Google assesses a commercial spyware threat “with high confidence.” Continuing expectations of escalation in cyberspace. The limitations of an alliance of convenience. Fronton botnet shows versatility. Russian hacktivists hit Italian targets, again. Lazarus Group undertakes new SolarWinds exploitation. Crypters in the C2C market. CrateDepression supply chain attack. Johannes Ullrich describes an advance fee scam hitting crypto markets. Our guest is Marty Roesch, CEO of Netography and inventor of Snort. Canada to exclude Huawei from 5G networks on security grounds.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/98</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/security/conti-ransomware-shuts-down-operation-rebrands-into-smaller-units/">Conti ransomware shuts down operation, rebrands into smaller units</a> (BleepingComputer) </p><p><a href="https://blog.google/threat-analysis-group/protecting-android-users-from-0-day-attacks/">Protecting Android users from 0-Day attacks</a> (Google) </p><p><a href="https://www.infosecurity-magazine.com/news/microsoft-cyberspace-domain-warfare/">Microsoft President: Cyber Space Has Become the New Domain of Warfare</a> (Infosecurity Magazine)</p><p><a href="https://research.checkpoint.com/2022/twisted-panda-chinese-apt-espionage-operation-against-russians-state-owned-defense-institutes/">Twisted Panda: Chinese APT espionage operation against Russian’s state-owned defense institutes</a> (Check Point Research) </p><p><a href="https://www.nytimes.com/2022/05/19/world/asia/china-hackers-russia.html">Chinese Hackers Tried to Steal Russian Defense Data, Report Says</a> (New York Times) </p><p><a href="https://securityaffairs.co/wordpress/131440/apt/space-pirates-targets-space-industry.html">China-linked Space Pirates APT targets the Russian aerospace industry</a> (Security Affairs) </p><p><a href="https://www.zdnet.com/article/russian-fronton-botnet-spreads-misinformation-on-a-massive-scale/#ftag=RSSbaffb68">This Russian botnet does far more than DDoS attacks - and on a massive scale</a> (ZDNet) </p><p><a href="https://www.reuters.com/world/europe/pro-russian-hackers-attack-institutional-websites-italy-police-2022-05-20/">Pro-Russian hackers attack institutional websites in Italy, police say</a> (Reuters) </p><p><a href="https://www.bleepingcomputer.com/news/security/lazarus-hackers-target-vmware-servers-with-log4shell-exploits/">Lazarus hackers target VMware servers with Log4Shell exploits</a> (BleepingComputer)</p><p><a href="https://securityintelligence.com/posts/itg23-crypters-cooperation-between-cybercriminal-groups/">ITG23 Crypters Highlight Cooperation Between Cybercriminal Groups</a> (Security Intelligence) </p><p><a href="https://www.sentinelone.com/labs/cratedepression-rust-supply-chain-attack-infects-cloud-ci-pipelines-with-go-malware/">CrateDepression | Rust Supply-Chain Attack Infects Cloud CI Pipelines with Go Malware</a> (SentinelOne) </p><p><a href="https://www.reuters.com/business/media-telecom/canada-announce-ban-use-huawei-zte-5g-equipment-source-2022-05-19/">Canada to ban Huawei/ZTE 5G equipment, joining Five Eyes allies</a> (Reuters)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1799</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4f98200-7881-11ec-90a9-ff8664b230d2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4198683779.mp3?updated=1690311943" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA22-138B – Threat actors chaining unpatched VMware vulnerabilities for full system control. [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/18/notes</link>
      <description>CISA is releasing this cybersecurity advisory to warn organizations that malicious cyber actors are exploiting CVE-2022-22954 and CVE-2022-22960. These vulnerabilities affect versions of VMware products. Successful exploitation permits malicious actors to trigger a server-side template injection that may result in remote code execution or escalation of privileges to root level access. Based on this activity, CISA expects malicious cyber actors to quickly develop a capability to exploit newly released VMware vulnerabilities CVE-2022-22972 and CVE-2022-22973 in the same impacted VMware products.
AA22-138B Alert, Technical Details, and Mitigations
AA22-138B.stix
Emergency Directive 22-03 Mitigate VMware Vulnerabilities
VMware Security Advisory VMSA-2022-0011
VMware Security Advisory VMSA-2022-0014
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 20 May 2022 13:42:00 -0000</pubDate>
      <itunes:title>CISA Alert AA22-138B – Threat actors chaining unpatched VMware vulnerabilities for full system control. [CISA Cybersecurity Alerts</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>18</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA is releasing this cybersecurity advisory to warn organizations that malicious cyber actors are exploiting CVE-2022-22954 and CVE-2022-22960. These vulnerabilities affect versions of VMware products. Successful exploitation permits malicious actors to trigger a server-side template injection that may result in remote code execution or escalation of privileges to root level access. Based on this activity, CISA expects malicious cyber actors to quickly develop a capability to exploit newly released VMware vulnerabilities CVE-2022-22972 and CVE-2022-22973 in the same impacted VMware products.
AA22-138B Alert, Technical Details, and Mitigations
AA22-138B.stix
Emergency Directive 22-03 Mitigate VMware Vulnerabilities
VMware Security Advisory VMSA-2022-0011
VMware Security Advisory VMSA-2022-0014
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA is releasing this cybersecurity advisory to warn organizations that malicious cyber actors are exploiting CVE-2022-22954 and CVE-2022-22960. These vulnerabilities affect versions of VMware products. Successful exploitation permits malicious actors to trigger a server-side template injection that may result in remote code execution or escalation of privileges to root level access. Based on this activity, CISA expects malicious cyber actors to quickly develop a capability to exploit newly released VMware vulnerabilities CVE-2022-22972 and CVE-2022-22973 in the same impacted VMware products.</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-138b">AA22-138B Alert, Technical Details, and Mitigations</a></p><p><a href="https://www.cisa.gov/uscert/sites/default/files/publications/AA22-138B.stix.xml">AA22-138B.stix</a></p><p><a href="https://www.cisa.gov/emergency-directive-22-03">Emergency Directive 22-03 Mitigate VMware Vulnerabilities</a></p><p><a href="https://www.vmware.com/security/advisories/VMSA-2022-0011.html">VMware Security Advisory VMSA-2022-0011</a></p><p><a href="https://www.vmware.com/security/advisories/VMSA-2022-0014.html">VMware Security Advisory VMSA-2022-0014</a></p><p>All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at <a href="mailto:central@cisa.dhs.gov">central@cisa.dhs.gov</a> or (888) 282-0870 and to the FBI via your <a href="https://www.fbi.gov/contact-us/field-offices">local FBI field office</a> or the FBI’s 24/7 CyWatch at (855) 292-3937 or <a href="mailto:CyWatch@fbi.gov">CyWatch@fbi.gov</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>194</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9afc665c-d843-11ec-bbd3-5b2c78bd6f2e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3599926377.mp3?updated=1653054447" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Information operations and the invasion of Ukraine. VMware patches vulnerabilities. F5 BIG-IP vulnerabilities actively exploited. TDI clarifies data incident. Robo-calling the Kremlin.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1582/notes</link>
      <description>Russian information operations surrounding the invasion of Ukraine. VMware patches vulnerabilities. F5 BIG-IP vulnerabilities undergoing active exploitation. Texas Department of Insurance clarifies facts surrounding its data incident. Robert M. Lee from Dragos is heading to Davos to talk ICS. Rick Howard speaks with author Chase Cunningham on his book "Cyber Warfare –Truth, Tactics and Strategies”. Robo-calling the Kremlin.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/97

Selected reading.
Information Operations Surrounding the Russian Invasion of Ukraine (Mandiant) 
CISA Issues Emergency Directive and Releases Advisory Related to VMware Vulnerabilities (CISA)
Emergency Directive 22-03 (CISA) 
Threat Actors Chaining Unpatched VMware Vulnerabilities for Full System Control (CISA) 
Threat Actors Exploiting F5 BIG IP CVE-2022-1388 (CISA) 
CISA Alert AA22-138A – Threat Actors Exploiting F5 BIG-IP CVE-2022-1388. (The CyberWire) 
Additional facts: TDI data security event (Texas Department of Insurance) 
This Hacktivist Site Lets You Prank Call Russian Officials (Wired) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 19 May 2022 20:15:00 -0000</pubDate>
      <itunes:title>Information operations and the invasion of Ukraine. VMware patches vulnerabilities. F5 BIG-IP vulnerabilities actively exploited. TDI clarifies data incident. Robo-calling the Kremlin.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1582</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Russian information operations surrounding the invasion of Ukraine. VMware patches vulnerabilities. F5 BIG-IP vulnerabilities undergoing active exploitation. Texas Department of Insurance clarifies facts surrounding its data incident. Robert M. Lee from Dragos is heading to Davos to talk ICS. Rick Howard speaks with author Chase Cunningham on his book "Cyber Warfare –Truth, Tactics and Strategies”. Robo-calling the Kremlin.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/97

Selected reading.
Information Operations Surrounding the Russian Invasion of Ukraine (Mandiant) 
CISA Issues Emergency Directive and Releases Advisory Related to VMware Vulnerabilities (CISA)
Emergency Directive 22-03 (CISA) 
Threat Actors Chaining Unpatched VMware Vulnerabilities for Full System Control (CISA) 
Threat Actors Exploiting F5 BIG IP CVE-2022-1388 (CISA) 
CISA Alert AA22-138A – Threat Actors Exploiting F5 BIG-IP CVE-2022-1388. (The CyberWire) 
Additional facts: TDI data security event (Texas Department of Insurance) 
This Hacktivist Site Lets You Prank Call Russian Officials (Wired) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russian information operations surrounding the invasion of Ukraine. VMware patches vulnerabilities. F5 BIG-IP vulnerabilities undergoing active exploitation. Texas Department of Insurance clarifies facts surrounding its data incident. Robert M. Lee from Dragos is heading to Davos to talk ICS. Rick Howard speaks with author Chase Cunningham on his book "Cyber Warfare –Truth, Tactics and Strategies”. Robo-calling the Kremlin.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/97</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.mandiant.com/resources/information-operations-surrounding-ukraine">Information Operations Surrounding the Russian Invasion of Ukraine</a> (Mandiant) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/05/18/cisa-issues-emergency-directive-and-releases-advisory-related">CISA Issues Emergency Directive and Releases Advisory Related to VMware Vulnerabilities</a> (CISA)</p><p><a href="https://www.cisa.gov/emergency-directive-22-03">Emergency Directive 22-03</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-138b">Threat Actors Chaining Unpatched VMware Vulnerabilities for Full System Control</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/05/18/threat-actors-exploiting-f5-big-ip-cve-2022-1388">Threat Actors Exploiting F5 BIG IP CVE-2022-1388</a> (CISA) </p><p><a href="https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/17/notes">CISA Alert AA22-138A – Threat Actors Exploiting F5 BIG-IP CVE-2022-1388.</a> (The CyberWire) </p><p><a href="https://tdi.texas.gov/data-security-event/additional-information.html">Additional facts: TDI data security event</a> (Texas Department of Insurance) </p><p><a href="https://www.wired.com/story/robo-prank-call-russian-officials-website/">This Hacktivist Site Lets You Prank Call Russian Officials</a> (Wired) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1789</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b45c4e9a-7881-11ec-90a9-030a9a3cc7a3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2467532074.mp3?updated=1690311836" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA22-138A – Threat Actors Exploiting F5 BIG-IP CVE-2022-1388. [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/17/notes</link>
      <description>CISA and the Multi-State Information Sharing &amp; Analysis Center (MS-ISAC), are releasing this joint Cybersecurity Advisory in response to active exploitation of CVE-2022-1388. This vulnerability is a critical iControl REST authentication bypass vulnerability affecting multiple versions of F5 Networks BIG-IP. 
AA22-138A Alert, Technical Details, and Mitigations
F5 Security Advisory K23605346 and indicators of compromise
F5 guidance K11438344 for remediating a compromise
Emerging Threats suricata signatures
Palo Alto Networks Unit 42 Threat Brief: CVE-2022-1388. This brief includes indicators of compromise. 
Cisco Talos Intelligence Group - Comprehensive Threat Intelligence: Threat Advisory: Critical F5 BIG-IP Vulnerability. This blog includes indicators of compromise. Note: due to the urgency to share this information, CISA and MS-ISAC have not yet validated this content.
Randori’s bash script. This script can be used to identify vulnerable instances of BIG-IP. Note: MS-ISAC has verified this bash script identifies vulnerable instances of BIG-IP. 
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 19 May 2022 00:49:00 -0000</pubDate>
      <itunes:title>CISA Alert AA22-138A – Threat Actors Exploiting F5 BIG-IP CVE-2022-1388. [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>17</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA and the Multi-State Information Sharing &amp; Analysis Center (MS-ISAC), are releasing this joint Cybersecurity Advisory in response to active exploitation of CVE-2022-1388. This vulnerability is a critical iControl REST authentication bypass vulnerability affecting multiple versions of F5 Networks BIG-IP. 
AA22-138A Alert, Technical Details, and Mitigations
F5 Security Advisory K23605346 and indicators of compromise
F5 guidance K11438344 for remediating a compromise
Emerging Threats suricata signatures
Palo Alto Networks Unit 42 Threat Brief: CVE-2022-1388. This brief includes indicators of compromise. 
Cisco Talos Intelligence Group - Comprehensive Threat Intelligence: Threat Advisory: Critical F5 BIG-IP Vulnerability. This blog includes indicators of compromise. Note: due to the urgency to share this information, CISA and MS-ISAC have not yet validated this content.
Randori’s bash script. This script can be used to identify vulnerable instances of BIG-IP. Note: MS-ISAC has verified this bash script identifies vulnerable instances of BIG-IP. 
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA and the Multi-State Information Sharing &amp; Analysis Center (MS-ISAC), are releasing this joint Cybersecurity Advisory in response to active exploitation of CVE-2022-1388. This vulnerability is a critical iControl REST authentication bypass vulnerability affecting multiple versions of F5 Networks BIG-IP. </p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-138a">AA22-138A Alert, Technical Details, and Mitigations</a></p><p><a href="https://support.f5.com/csp/article/K23605346">F5 Security Advisory K23605346</a> and indicators of compromise</p><p><a href="https://support.f5.com/csp/article/K11438344">F5 guidance K11438344</a> for remediating a compromise</p><p><a href="https://rules.emergingthreats.net/open-nogpl/suricata-4.0/emerging-all.rules">Emerging Threats suricata signatures</a></p><p><a href="https://unit42.paloaltonetworks.com/cve-2022-1388/">Palo Alto Networks Unit 42 Threat Brief: CVE-2022-1388</a>. This brief includes indicators of compromise. </p><p><a href="https://blog.talosintelligence.com/2022/05/threat-advisory-critical-f5-big-ip-vuln.html">Cisco Talos Intelligence Group - Comprehensive Threat Intelligence: Threat Advisory: Critical F5 BIG-IP Vulnerability</a>. This blog includes indicators of compromise. Note: due to the urgency to share this information, CISA and MS-ISAC have not yet validated this content.</p><p><a href="https://www.randori.com/blog/vulnerability-analysis-cve-2022-1388/">Randori’s bash script</a>. This script can be used to identify vulnerable instances of BIG-IP. Note: MS-ISAC has verified this bash script identifies vulnerable instances of BIG-IP. </p><p>All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at <a href="mailto:central@cisa.dhs.gov">central@cisa.dhs.gov</a> or (888) 282-0870 and to the FBI via your <a href="https://www.fbi.gov/contact-us/field-offices">local FBI field office</a> or the FBI’s 24/7 CyWatch at (855) 292-3937 or <a href="mailto:CyWatch@fbi.gov">CyWatch@fbi.gov</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>200</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9966483a-d70d-11ec-a85a-33d9abcd9f44]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6965342916.mp3?updated=1652921389" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Privateering goes fully political. Compromised robots? Conti’s campaign against Costa Rica. Cyberconflict along the Nile. A reset in the cyber insurance market. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1581/notes</link>
      <description>Chaos ransomware group declares for Russia. Hacktivists claim to have compromised Russian-manufactured ground surveillance robots. Conti's ongoing campaign against Costa Rica. The claimed "international" cyberattack against Nile dam was stopped. Rick Howard speaks with author Caroline Wong on her book “Security Metrics, a Beginner's Guide”. Our guests are Kathleen Smith and Rachel Bozeman, hosts of the new podcast, Security Cleared Jobs. And the cyber insurance market experiences a “reset.”

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/96

Selected reading.
Chaos Ransomware Variant Sides with Russia (Fortinet Blog)
Did hackers commandeer surveillance robots at a Russian airport? (The Daily Dot) 
Russian Hacking Cartel Attacks Costa Rican Government Agencies (New York Times) 
Costa Rican president claims collaborators are aiding Conti's ransomware extortion efforts (CyberScoop) 
"We will overthrow the government" - Does Conti have help inside Costa Rica? (Tech Monitor) 
Costa Ricans scrambled to pay taxes by hand after cyberattack took down country’s collection system (Yahoo) 
Ethiopia faces new cyberattacks on its Nile dam (Al-Monitor) 
Cyber Insurers Raise Rates Amid a Surge in Costly Hacks (Wall Street Journal)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 18 May 2022 20:15:00 -0000</pubDate>
      <itunes:title>Privateering goes fully political. Compromised robots? Conti’s campaign against Costa Rica. Cyberconflict along the Nile. A reset in the cyber insurance market. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1581</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Chaos ransomware group declares for Russia. Hacktivists claim to have compromised Russian-manufactured ground surveillance robots. Conti's ongoing campaign against Costa Rica. The claimed "international" cyberattack against Nile dam was stopped. Rick Howard speaks with author Caroline Wong on her book “Security Metrics, a Beginner's Guide”. Our guests are Kathleen Smith and Rachel Bozeman, hosts of the new podcast, Security Cleared Jobs. And the cyber insurance market experiences a “reset.”

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/96

Selected reading.
Chaos Ransomware Variant Sides with Russia (Fortinet Blog)
Did hackers commandeer surveillance robots at a Russian airport? (The Daily Dot) 
Russian Hacking Cartel Attacks Costa Rican Government Agencies (New York Times) 
Costa Rican president claims collaborators are aiding Conti's ransomware extortion efforts (CyberScoop) 
"We will overthrow the government" - Does Conti have help inside Costa Rica? (Tech Monitor) 
Costa Ricans scrambled to pay taxes by hand after cyberattack took down country’s collection system (Yahoo) 
Ethiopia faces new cyberattacks on its Nile dam (Al-Monitor) 
Cyber Insurers Raise Rates Amid a Surge in Costly Hacks (Wall Street Journal)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chaos ransomware group declares for Russia. Hacktivists claim to have compromised Russian-manufactured ground surveillance robots. Conti's ongoing campaign against Costa Rica. The claimed "international" cyberattack against Nile dam was stopped. Rick Howard speaks with author Caroline Wong on her book “Security Metrics, a Beginner's Guide”. Our guests are Kathleen Smith and Rachel Bozeman, hosts of the new podcast, Security Cleared Jobs. And the cyber insurance market experiences a “reset.”</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/96</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.fortinet.com/blog/threat-research/chaos-ransomware-variant-sides-with-russia">Chaos Ransomware Variant Sides with Russia</a> (Fortinet Blog)</p><p><a href="https://www.dailydot.com/debug/hackers-surveillance-robots-russia/">Did hackers commandeer surveillance robots at a Russian airport?</a> (The Daily Dot) </p><p><a href="https://www.nytimes.com/2022/05/17/us/politics/russia-hacking-costa-rica.html">Russian Hacking Cartel Attacks Costa Rican Government Agencies</a> (New York Times) </p><p><a href="https://www.cyberscoop.com/costa-rica-conti-ransomware-extortion-collaborators/">Costa Rican president claims collaborators are aiding Conti's ransomware extortion efforts</a> (CyberScoop) </p><p><a href="https://techmonitor.ai/technology/cybersecurity/conti-costa-rica-ransomware-attack">"We will overthrow the government" - Does Conti have help inside Costa Rica?</a> (Tech Monitor) </p><p><a href="https://news.yahoo.com/costa-ricans-scrambled-pay-taxes-232341596.html">Costa Ricans scrambled to pay taxes by hand after cyberattack took down country’s collection system</a> (Yahoo) </p><p><a href="https://www.al-monitor.com/originals/2022/05/ethiopia-faces-new-cyberattacks-its-nile-dam">Ethiopia faces new cyberattacks on its Nile dam</a> (Al-Monitor) </p><p><a href="https://www.wsj.com/articles/cyber-insurers-raise-rates-amid-a-surge-in-costly-hacks-11652866200">Cyber Insurers Raise Rates Amid a Surge in Costly Hacks</a> (Wall Street Journal)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1473</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b3ff23e6-7881-11ec-90a9-1b44b7de1e18]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6517918882.mp3?updated=1690311807" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA22-137A – Weak security controls and practices routinely exploited for initial access. [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/16/notes</link>
      <description>This joint cybersecurity advisory was coauthored by the cybersecurity authorities of the US, Canada, New Zealand, the Netherlands, and the UK. Cyber actors routinely exploit poor security configurations, weak controls, and other poor cyber hygiene practices to gain initial access or as part of other tactics to compromise a victim’s system. This joint Cybersecurity Advisory identifies commonly exploited controls and practices, and includes best practices to mitigate these risks.
AA22-137A Alert, Technical Details, and Mitigations
White House Executive Order on Improving the Nation’s Cybersecurity
NCSC-NL Factsheet: Prepare for Zero Trust
NCSC-NL Guide to Cyber Security Measures
N-able Blog: Intrusion Detection System (IDS): Signature vs. Anomaly-Based
NCSC-NL Guide to Cyber Security Measures
National Institute of Standards and Technology SP 800-123 – Keeping Servers Secured
NCSC-UK Guidance – Phishing Attacks: Defending Your Organisation 
Open Web Application Security Project (OWASP) Proactive Controls: Enforce Access Controls
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 May 2022 21:15:00 -0000</pubDate>
      <itunes:title>CISA Alert AA22-137A – Weak security controls and practices routinely exploited for initial access. [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>16</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This joint cybersecurity advisory was coauthored by the cybersecurity authorities of the US, Canada, New Zealand, the Netherlands, and the UK. Cyber actors routinely exploit poor security configurations, weak controls, and other poor cyber hygiene practices to gain initial access or as part of other tactics to compromise a victim’s system. This joint Cybersecurity Advisory identifies commonly exploited controls and practices, and includes best practices to mitigate these risks.
AA22-137A Alert, Technical Details, and Mitigations
White House Executive Order on Improving the Nation’s Cybersecurity
NCSC-NL Factsheet: Prepare for Zero Trust
NCSC-NL Guide to Cyber Security Measures
N-able Blog: Intrusion Detection System (IDS): Signature vs. Anomaly-Based
NCSC-NL Guide to Cyber Security Measures
National Institute of Standards and Technology SP 800-123 – Keeping Servers Secured
NCSC-UK Guidance – Phishing Attacks: Defending Your Organisation 
Open Web Application Security Project (OWASP) Proactive Controls: Enforce Access Controls
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This joint cybersecurity advisory was coauthored by the cybersecurity authorities of the US, Canada, New Zealand, the Netherlands, and the UK. Cyber actors routinely exploit poor security configurations, weak controls, and other poor cyber hygiene practices to gain initial access or as part of other tactics to compromise a victim’s system. This joint Cybersecurity Advisory identifies commonly exploited controls and practices, and includes best practices to mitigate these risks.</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-137a">AA22-137A Alert, Technical Details, and Mitigations</a></p><p><a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/">White House Executive Order on Improving the Nation’s Cybersecurity</a></p><p><a href="https://english.ncsc.nl/publications/factsheets/2021/augustus/18/factsheet-prepare-for-zero-trust">NCSC-NL Factsheet: Prepare for Zero Trust</a></p><p><a href="https://english.ncsc.nl/publications/publications/2021/august/4/guide-to-cyber-security-measures">NCSC-NL Guide to Cyber Security Measures</a></p><p><a href="https://www.n-able.com/blog/intrusion-detection-system">N-able Blog: Intrusion Detection System (IDS): Signature vs. Anomaly-Based</a></p><p><a href="https://english.ncsc.nl/publications/publications/2021/august/4/guide-to-cyber-security-measures">NCSC-NL Guide to Cyber Security Measures</a></p><p><a href="https://csrc.nist.gov/publications/detail/sp/800-123/final">National Institute of Standards and Technology SP 800-123 – Keeping Servers Secured</a></p><p><a href="https://www.ncsc.gov.uk/guidance/phishing">NCSC-UK Guidance – Phishing Attacks: Defending Your Organisation </a></p><p><a href="https://owasp.org/www-project-proactive-controls/v3/en/c7-enforce-access-controls">Open Web Application Security Project (OWASP) Proactive Controls: Enforce Access Controls</a></p><p>All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at <a href="mailto:central@cisa.dhs.gov">central@cisa.dhs.gov</a> or (888) 282-0870 and to the FBI via your <a href="https://www.fbi.gov/contact-us/field-offices">local FBI field office</a> or the FBI’s 24/7 CyWatch at (855) 292-3937 or <a href="mailto:CyWatch@fbi.gov">CyWatch@fbi.gov</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>169</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[674b5926-d627-11ec-92d7-0b5e72dd488a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1086030996.mp3?updated=1652822757" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russian cyber threats and NATO’s Article 5. Conti says it’s going to bring Cost Rica to its knees. BLE proof-of-concept hack. CISA warns of initial access methods. Thanos proprietor indicted.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1580/notes</link>
      <description>An assessment of the Russian cyber threat. NATO's Article 5 in cyberspace. Conti's ransomware attack against Costa Rica spreads, in scope and effect. Bluetooth vulnerabilities demonstrated in proof-of-concept. CISA and its international partners urge following best practices to prevent threat actors from gaining initial access. Joe Carrigan looks at updates to the FIDO alliance. Rick Howard and Ben Rothke discuss author Andrew Stewart's book "A Vulnerable System: The History of Information Security in the Computer Age". And,the doctor was in, but wow, was he also way out of line.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/95

Selected reading.
Russia Planned a Major Military Overhaul. Ukraine Shows the Result. (New York Times) 
The Cyberwar Against Pro-Ukrainian Countries is Real. Here’s What to Do (CSO Online) 
Collective cyber defence and attack: NATO’s Article 5 after the Ukraine conflict (European Leadership Network) 
Cyber attack on Costa Rica grows as more agencies hit, president says (Reuters)
Ransomware gang threatens to ‘overthrow’ new Costa Rica government, raises demand to $20 million (The Record by Recorded Future) 
Hacker Shows Off a Way to Unlock Tesla Models, Start Cars (Bloomberg)
NCC Group uncovers Bluetooth Low Energy (BLE) vulnerability that puts millions of cars, mobile devices and locking systems at risk (NCC Group) 
Technical Advisory – Tesla BLE Phone-as-a-Key Passive Entry Vulnerable to Relay Attacks (NCC Group Research) 
Technical Advisory – Kwikset/Weiser BLE Proximity Authentication in Kevo Smart Locks Vulnerable to Relay Attacks (NCC Group Research)
Technical Advisory – BLE Proximity Authentication Vulnerable to Relay Attacks (NCC Group Research) 
Alert (AA22-137A) Weak Security Controls and Practices Routinely Exploited for Initial Access (CISA)
Hacker and Ransomware Designer Charged for Use and Sale of Ransomware, and Profit Sharing Arrangements with Cybercriminals (U.S. Attorney’s Office for the Eastern District of New York) 
US prosecutors allege Venezuelan doctor is ransomware mastermind (ZDNet) 
'Multi-tasking doctor' was mastermind behind 'Thanos' ransomware builder, DOJ says (The Record by Recorded Future) 
U.S. Charges Venezuelan Doctor for Using and Selling Thanos Ransomware (The Hacker News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 May 2022 20:15:00 -0000</pubDate>
      <itunes:title>Russian cyber threats and NATO’s Article 5. Conti says it’s going to bring Cost Rica to its knees. BLE proof-of-concept hack. CISA warns of initial access methods. Thanos proprietor indicted.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1580</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An assessment of the Russian cyber threat. NATO's Article 5 in cyberspace. Conti's ransomware attack against Costa Rica spreads, in scope and effect. Bluetooth vulnerabilities demonstrated in proof-of-concept. CISA and its international partners urge following best practices to prevent threat actors from gaining initial access. Joe Carrigan looks at updates to the FIDO alliance. Rick Howard and Ben Rothke discuss author Andrew Stewart's book "A Vulnerable System: The History of Information Security in the Computer Age". And,the doctor was in, but wow, was he also way out of line.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/95

Selected reading.
Russia Planned a Major Military Overhaul. Ukraine Shows the Result. (New York Times) 
The Cyberwar Against Pro-Ukrainian Countries is Real. Here’s What to Do (CSO Online) 
Collective cyber defence and attack: NATO’s Article 5 after the Ukraine conflict (European Leadership Network) 
Cyber attack on Costa Rica grows as more agencies hit, president says (Reuters)
Ransomware gang threatens to ‘overthrow’ new Costa Rica government, raises demand to $20 million (The Record by Recorded Future) 
Hacker Shows Off a Way to Unlock Tesla Models, Start Cars (Bloomberg)
NCC Group uncovers Bluetooth Low Energy (BLE) vulnerability that puts millions of cars, mobile devices and locking systems at risk (NCC Group) 
Technical Advisory – Tesla BLE Phone-as-a-Key Passive Entry Vulnerable to Relay Attacks (NCC Group Research) 
Technical Advisory – Kwikset/Weiser BLE Proximity Authentication in Kevo Smart Locks Vulnerable to Relay Attacks (NCC Group Research)
Technical Advisory – BLE Proximity Authentication Vulnerable to Relay Attacks (NCC Group Research) 
Alert (AA22-137A) Weak Security Controls and Practices Routinely Exploited for Initial Access (CISA)
Hacker and Ransomware Designer Charged for Use and Sale of Ransomware, and Profit Sharing Arrangements with Cybercriminals (U.S. Attorney’s Office for the Eastern District of New York) 
US prosecutors allege Venezuelan doctor is ransomware mastermind (ZDNet) 
'Multi-tasking doctor' was mastermind behind 'Thanos' ransomware builder, DOJ says (The Record by Recorded Future) 
U.S. Charges Venezuelan Doctor for Using and Selling Thanos Ransomware (The Hacker News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An assessment of the Russian cyber threat. NATO's Article 5 in cyberspace. Conti's ransomware attack against Costa Rica spreads, in scope and effect. Bluetooth vulnerabilities demonstrated in proof-of-concept. CISA and its international partners urge following best practices to prevent threat actors from gaining initial access. Joe Carrigan looks at updates to the FIDO alliance. Rick Howard and Ben Rothke discuss author Andrew Stewart's book "A Vulnerable System: The History of Information Security in the Computer Age". And,the doctor was in, but wow, was he also way out of line.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/95</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.nytimes.com/2022/05/16/world/europe/russia-military-ukraine.html">Russia Planned a Major Military Overhaul. Ukraine Shows the Result.</a> (New York Times) </p><p><a href="https://www.csoonline.com/article/3660576/the-cyberwar-against-pro-ukrainian-countries-is-real-here-s-what-to-do.html">The Cyberwar Against Pro-Ukrainian Countries is Real. Here’s What to Do</a> (CSO Online) </p><p><a href="https://www.europeanleadershipnetwork.org/commentary/collective-cyber-defence-and-attack-natos-article-5-after-the-ukraine-conflict/">Collective cyber defence and attack: NATO’s Article 5 after the Ukraine conflict</a> (European Leadership Network) </p><p><a href="https://www.reuters.com/world/americas/cyber-attack-costa-rica-grows-more-agencies-hit-president-says-2022-05-16/">Cyber attack on Costa Rica grows as more agencies hit, president says</a> (Reuters)</p><p><a href="https://therecord.media/ransomware-gang-threatens-to-overthrow-new-costa-rica-government-raises-demand-to-20-million/">Ransomware gang threatens to ‘overthrow’ new Costa Rica government, raises demand to $20 million</a> (The Record by Recorded Future) </p><p><a href="https://www.bloomberg.com/news/articles/2022-05-16/hacker-shows-off-a-way-to-unlock-tesla-models-start-the-engine">Hacker Shows Off a Way to Unlock Tesla Models, Start Cars</a> (Bloomberg)</p><p><a href="https://newsroom.nccgroup.com/news/ncc-group-uncovers-bluetooth-low-energy-ble-vulnerability-that-puts-millions-of-cars-mobile-devices-and-locking-systems-at-risk-447952">NCC Group uncovers Bluetooth Low Energy (BLE) vulnerability that puts millions of cars, mobile devices and locking systems at risk</a> (NCC Group) </p><p><a href="https://research.nccgroup.com/2022/05/15/technical-advisory-tesla-ble-phone-as-a-key-passive-entry-vulnerable-to-relay-attacks/">Technical Advisory – Tesla BLE Phone-as-a-Key Passive Entry Vulnerable to Relay Attacks</a> (NCC Group Research) </p><p><a href="https://research.nccgroup.com/2022/05/15/technical-advisory-kwikset-weiser-ble-proximity-authentication-in-kevo-smart-locks-vulnerable-to-relay-attacks/">Technical Advisory – Kwikset/Weiser BLE Proximity Authentication in Kevo Smart Locks Vulnerable to Relay Attacks</a> (NCC Group Research)</p><p><a href="https://research.nccgroup.com/2022/05/15/technical-advisory-ble-proximity-authentication-vulnerable-to-relay-attacks/">Technical Advisory – BLE Proximity Authentication Vulnerable to Relay Attacks</a> (NCC Group Research) </p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-137a">Alert (AA22-137A) Weak Security Controls and Practices Routinely Exploited for Initial Access</a> (CISA)</p><p><a href="https://www.justice.gov/usao-edny/pr/hacker-and-ransomware-designer-charged-use-and-sale-ransomware-and-profit-sharing">Hacker and Ransomware Designer Charged for Use and Sale of Ransomware, and Profit Sharing Arrangements with Cybercriminals</a> (U.S. Attorney’s Office for the Eastern District of New York) </p><p><a href="https://www.zdnet.com/article/us-prosecutors-allege-venezuelan-doctor-is-ransomware-mastermind/#:~:text=Justice%20Department%20officials%20claim%20the,ransomware%20including%20Jigsaw%20and%20Thanos.&amp;text=US%20prosecutors%20have%20accused%2055,a%20slew%20of%20notorious%20ransomware.">US prosecutors allege Venezuelan doctor is ransomware mastermind</a> (ZDNet) </p><p><a href="https://therecord.media/thanos-ransomware-builder-doj-charges-venezuelan-doctor/">'Multi-tasking doctor' was mastermind behind 'Thanos' ransomware builder, DOJ says</a> (The Record by Recorded Future) </p><p><a href="https://thehackernews.com/2022/05/us-charges-venezuelan-doctor-for-using.html">U.S. Charges Venezuelan Doctor for Using and Selling Thanos Ransomware</a> (The Hacker News)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1658</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b3635ae2-7881-11ec-90a9-fb494968e771]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3699452607.mp3?updated=1690311785" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Users advised to patch actively exploited Zyxel vulnerability. Hacktivism and influence ops in Russia’s hybrid war. Ransomware notes. Indiscriminate hacktivism? Alt-coin sanctions case will proceed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1579/notes</link>
      <description>Users are advised to patch Zyxel firewalls. Battlefield failure and popular morale in Russia’s hybrid war. Nuisance-level hacktivism in the hybrid war. Sweden and Finland move closer to NATO membership; concern over possible Russian cyberattacks rises. Intelligence, disinformation, or wishful thinking? Conti calls for rebellion in Costa Rica. PayOrGrief is just rebranded DoppelPaymer. Anonymous action in Sri Lanka seems indiscriminate and counterproductive. Dinah Davis from Arctic Wolf examines cyber security for startups. Rick Howard looks at two factor authentication. And a judge says cryptocurrency can’t be used to evade sanctions.
For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/94

Selected reading.
Critical Vulnerability Allows Remote Hacking of Zyxel Firewalls (SecurityWeek) 
Zyxel security advisory for OS command injection vulnerability of firewalls (Zyxel) 
Growing evidence of a military disaster on the Donets pierces a pro-Russian bubble. (New York Times) 
OpRussia update: Anonymous breached other organizations (Security Affairs) 
Italy prevents pro-Russian hacker attacks during Eurovision contest (Reuters) 
Finland, Sweden’s NATO moves prompt fears of Russian cyberattacks (The Hill) 
Coup to remove cancer-stricken Putin underway in Russia, Ukrainian intelligence chief says (Fortune) 
Conti ransomware gang calls for Costa Rican citizens to revolt if government doesn't pay (SC Magazine) 
Anonymous wanted to help Sri Lankans. Their hacks put many in grave danger (Rest of World) 
U.S. issues charges in first criminal cryptocurrency sanctions case (Washington Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 16 May 2022 20:15:00 -0000</pubDate>
      <itunes:title>Users advised to patch actively exploited Zyxel vulnerability. Hacktivism and influence ops in Russia’s hybrid war. Ransomware notes. Indiscriminate hacktivism? Alt-coin sanctions case will proceed.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1579</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Users are advised to patch Zyxel firewalls. Battlefield failure and popular morale in Russia’s hybrid war. Nuisance-level hacktivism in the hybrid war. Sweden and Finland move closer to NATO membership; concern over possible Russian cyberattacks rises. Intelligence, disinformation, or wishful thinking? Conti calls for rebellion in Costa Rica. PayOrGrief is just rebranded DoppelPaymer. Anonymous action in Sri Lanka seems indiscriminate and counterproductive. Dinah Davis from Arctic Wolf examines cyber security for startups. Rick Howard looks at two factor authentication. And a judge says cryptocurrency can’t be used to evade sanctions.
For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/94

Selected reading.
Critical Vulnerability Allows Remote Hacking of Zyxel Firewalls (SecurityWeek) 
Zyxel security advisory for OS command injection vulnerability of firewalls (Zyxel) 
Growing evidence of a military disaster on the Donets pierces a pro-Russian bubble. (New York Times) 
OpRussia update: Anonymous breached other organizations (Security Affairs) 
Italy prevents pro-Russian hacker attacks during Eurovision contest (Reuters) 
Finland, Sweden’s NATO moves prompt fears of Russian cyberattacks (The Hill) 
Coup to remove cancer-stricken Putin underway in Russia, Ukrainian intelligence chief says (Fortune) 
Conti ransomware gang calls for Costa Rican citizens to revolt if government doesn't pay (SC Magazine) 
Anonymous wanted to help Sri Lankans. Their hacks put many in grave danger (Rest of World) 
U.S. issues charges in first criminal cryptocurrency sanctions case (Washington Post)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Users are advised to patch Zyxel firewalls. Battlefield failure and popular morale in Russia’s hybrid war. Nuisance-level hacktivism in the hybrid war. Sweden and Finland move closer to NATO membership; concern over possible Russian cyberattacks rises. Intelligence, disinformation, or wishful thinking? Conti calls for rebellion in Costa Rica. PayOrGrief is just rebranded DoppelPaymer. Anonymous action in Sri Lanka seems indiscriminate and counterproductive. Dinah Davis from Arctic Wolf examines cyber security for startups. Rick Howard looks at two factor authentication. And a judge says cryptocurrency can’t be used to evade sanctions.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/94</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.securityweek.com/critical-vulnerability-allows-remote-hacking-zyxel-firewalls">Critical Vulnerability Allows Remote Hacking of Zyxel Firewalls</a> (SecurityWeek) </p><p><a href="https://www.zyxel.com/us/en/support/Zyxel-security-advisory-for-OS-command-injection-vulnerability-of-firewalls.shtml">Zyxel security advisory for OS command injection vulnerability of firewalls</a> (Zyxel) </p><p><a href="https://www.nytimes.com/2022/05/15/world/europe/pro-russian-war-bloggers-kremlin.html">Growing evidence of a military disaster on the Donets pierces a pro-Russian bubble.</a> (New York Times) </p><p><a href="https://securityaffairs.co/wordpress/131264/hacktivism/anonymous-oprussia-updates.html">OpRussia update: Anonymous breached other organizations</a> (Security Affairs) </p><p><a href="https://www.reuters.com/world/europe/italian-police-prevents-pro-russian-hacker-attacks-during-eurovision-contest-2022-05-15/">Italy prevents pro-Russian hacker attacks during Eurovision contest</a> (Reuters) </p><p><a href="https://thehill.com/policy/cybersecurity/3488518-finland-swedens-nato-moves-prompt-fears-of-russian-cyber-attacks/">Finland, Sweden’s NATO moves prompt fears of Russian cyberattacks</a> (The Hill) </p><p><a href="https://fortune.com/2022/05/14/does-putin-have-cancer-coup-underway-blood-cancer-ukraine-war/">Coup to remove cancer-stricken Putin underway in Russia, Ukrainian intelligence chief says</a> (Fortune) </p><p><a href="https://www.scmagazine.com/analysis/ransomware/conti-ransomware-gang-calls-for-costa-rican-citizens-to-revolt-if-government-doesnt-pay">Conti ransomware gang calls for Costa Rican citizens to revolt if government doesn't pay</a> (SC Magazine) </p><p><a href="https://restofworld.org/2022/anonymous-sri-lankans-hacks-danger/">Anonymous wanted to help Sri Lankans. Their hacks put many in grave danger</a> (Rest of World) </p><p><a href="https://www.washingtonpost.com/dc-md-va/2022/05/16/first-us-criminal-cryptocurrency-sanctions/">U.S. issues charges in first criminal cryptocurrency sanctions case</a> (Washington Post)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1457</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b2be5e5c-7881-11ec-90a9-0fd2a9dae7b6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4752728796.mp3?updated=1690311593" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Eric Escobar: Collaboration is key. [Pen tester] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/100/notes</link>
      <description>Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both his bachelor and master degrees in civil engineering. Upon breaking into a network with a friend, he was bitten by the cybersecurity bug. Making the switch to the red team and basically becoming a bankrobber for hire, Eric tests the security of many companies' networks. He feels that curiosity is an essential trait for cybersecurity and collaboration is key as no one person knows everything. He advises those interested in cybersecurity to just start. We thank Eric for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 15 May 2022 07:00:00 -0000</pubDate>
      <itunes:title>Eric Escobar: Collaboration is key. [Pen tester] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>100</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. </itunes:subtitle>
      <itunes:summary>Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both his bachelor and master degrees in civil engineering. Upon breaking into a network with a friend, he was bitten by the cybersecurity bug. Making the switch to the red team and basically becoming a bankrobber for hire, Eric tests the security of many companies' networks. He feels that curiosity is an essential trait for cybersecurity and collaboration is key as no one person knows everything. He advises those interested in cybersecurity to just start. We thank Eric for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both his bachelor and master degrees in civil engineering. Upon breaking into a network with a friend, he was bitten by the cybersecurity bug. Making the switch to the red team and basically becoming a bankrobber for hire, Eric tests the security of many companies' networks. He feels that curiosity is an essential trait for cybersecurity and collaboration is key as no one person knows everything. He advises those interested in cybersecurity to just start. We thank Eric for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>417</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[85c20d68-d303-11ec-a224-93652a7b645c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6441087542.mp3?updated=1652477381" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The current state of zero trust. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/31/notes</link>
      <description>According to the zero trust philosophy, we all assume that our networks are already compromised and try to design them to limit the damage if it turns out to be so. In this episode of CyberWire-X, we’ve invited subject matter experts, Amanda Fennell, the Chief Information Officer and Chief Security Officer of Relativity, and Galeal Zino, CEO of episode Sponsor NetFoundry, to the Cyberwire Hash Table to discuss all the ways to think about the solution in the modern era: Software Defined Perimeter (SDP), Secure Access Service Edge (SASE), identity and authorization, and private WAN, all through a First Principle lens.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 15 May 2022 07:00:00 -0000</pubDate>
      <itunes:title>The current state of zero trust. [CyberWire-X]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>31</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>According to the zero trust philosophy, we all assume that our networks are already compromised and try to design them to limit the damage if it turns out to be so. In this episode of CyberWire-X, we’ve invited subject matter experts, Amanda Fennell, the Chief Information Officer and Chief Security Officer of Relativity, and Galeal Zino, CEO of episode Sponsor NetFoundry, to the Cyberwire Hash Table to discuss all the ways to think about the solution in the modern era: Software Defined Perimeter (SDP), Secure Access Service Edge (SASE), identity and authorization, and private WAN, all through a First Principle lens.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>According to the zero trust philosophy, we all assume that our networks are already compromised and try to design them to limit the damage if it turns out to be so. In this episode of CyberWire-X, we’ve invited subject matter experts, Amanda Fennell, the Chief Information Officer and Chief Security Officer of Relativity, and Galeal Zino, CEO of episode Sponsor NetFoundry, to the Cyberwire Hash Table to discuss all the ways to think about the solution in the modern era: Software Defined Perimeter (SDP), Secure Access Service Edge (SASE), identity and authorization, and private WAN, all through a First Principle lens.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1911</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[17d2dcd2-d129-11ec-8e49-33b3ba15dc20]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6405261740.mp3?updated=1657564426" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Vulnerabilities in IoT devices. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/232/notes</link>
      <description>Dr. May Wang, Chief Technology Officer at Palo Alto Networks, joins Dave Bittner to discuss their findings detailed in Unit 42's "Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization" research. Unit 42 recently set out to better understand how well hospitals and other healthcare providers are doing in securing smart infusion pumps, which are network-connected devices that deliver medications and fluids to patients. This topic is of critical concern because security lapses in these devices have the potential to put lives at risk or expose sensitive patient data.
Unit 42's discovery of security gaps in three out of four infusion pumps that they reviewed highlights the need for the healthcare industry to redouble efforts to protect against known vulnerabilities, while diligently following best practices for infusion pumps and hospital networks. May walks us through Unit 42's work.
The research can be found here:
Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 May 2022 07:00:00 -0000</pubDate>
      <itunes:title>Vulnerabilities in IoT devices. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>232</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dr. May Wang, Chief Technology Officer at Palo Alto Networks, joins Dave Bittner to discuss their findings detailed in Unit 42's "Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization" research. Unit 42 recently set out to better understand how well hospitals and other healthcare providers are doing in securing smart infusion pumps, which are network-connected devices that deliver medications and fluids to patients. This topic is of critical concern because security lapses in these devices have the potential to put lives at risk or expose sensitive patient data.
Unit 42's discovery of security gaps in three out of four infusion pumps that they reviewed highlights the need for the healthcare industry to redouble efforts to protect against known vulnerabilities, while diligently following best practices for infusion pumps and hospital networks. May walks us through Unit 42's work.
The research can be found here:
Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dr. May Wang, Chief Technology Officer at Palo Alto Networks, joins Dave Bittner to discuss their findings detailed in Unit 42's "Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization" research. Unit 42 recently set out to better understand how well hospitals and other healthcare providers are doing in securing smart infusion pumps, which are network-connected devices that deliver medications and fluids to patients. This topic is of critical concern because security lapses in these devices have the potential to put lives at risk or expose sensitive patient data.</p><p>Unit 42's discovery of security gaps in three out of four infusion pumps that they reviewed highlights the need for the healthcare industry to redouble efforts to protect against known vulnerabilities, while diligently following best practices for infusion pumps and hospital networks. May walks us through Unit 42's work.</p><p>The research can be found here:</p><ul><li><a href="https://unit42.paloaltonetworks.com/infusion-pump-vulnerabilities/">Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1337</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1a761b4e-d15f-11ec-93ab-afa6241d629f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3845295678.mp3?updated=1685126799" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>War crimes in cyberspace? Iranian cyberespionage (and a possible APT side-hustle). A backdoor for Roblox. Darkweb C2C trader sentenced. eBay newsletter conspirator pleads guilty. CIA gets a CISO.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1578/notes</link>
      <description>Ukraine holds its first war crimes trial. Are there war crimes in cyberspace? Iranian cyberespionage (and a possible APT side-hustle). Roblox seems to have been used to introduce a backdoor. CISA issues ICS advisories. Darkweb C2C trader sentenced. The last conspirator in the strange case of the eBay newsletter takes a guilty plea. Carole Theriault looks at Google’s new approach to cookies in Europe. Our guest is Mary Writz of ForgeRock on the growing importance of mobile device authentication security. And CIA gets a CISO.

For links to all of today's stories check out our CyberWire daily news briefing:
httpshttps://thecyberwire.com/newsletters/daily-briefing/11/93

Selected reading.
Ukraine to put first Russian soldier on trial for war crimes | DW | 12.05.2022 (Deutsche Welle)
Russian soldier on trial in first Ukraine war-crimes case (AP NEWS)
First Russian soldier goes on trial in Ukraine for war crimes (the Guardian) 
The Case for War Crimes Charges Against Russia’s Sandworm Hackers (Wired)
Iranian hackers exposed in a highly targeted espionage campaign (BleepingComputer) 
Iranian APT Cobalt Mirage launching ransomware attacks (SearchSecurity)
Iranian Hackers Leveraging BitLocker and DiskCryptor in Ransomware Attacks (The Hacker News) 
Iranian Cyberspy Group Launching Ransomware Attacks Against US (SecurityWeek) 
Please Confirm You Received Our APT | FortiGuard Labs  (Fortinet Blog) 
Roblox Exploited with Trojans from Scripting Engine (Avanan)
Ukrainian cybercriminal sentenced to 4 years in U.S. prison for credential theft scheme (CyberScoop)
Ukrainian sentenced to 4 years for selling hacked passwords (The Record by Recorded Future) 
Ex-eBay exec charged with harassing newsletter publishers pleads guilty (Reuters)
CIA selects new CISO with deep private sector experience (The Record by Recorded Future)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 13 May 2022 20:15:00 -0000</pubDate>
      <itunes:title>War crimes in cyberspace? Iranian cyberespionage (and a possible APT side-hustle). A backdoor for Roblox. Darkweb C2C trader sentenced. eBay newsletter conspirator pleads guilty. CIA gets a CISO.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1578</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ukraine holds its first war crimes trial. Are there war crimes in cyberspace? Iranian cyberespionage (and a possible APT side-hustle). Roblox seems to have been used to introduce a backdoor. CISA issues ICS advisories. Darkweb C2C trader sentenced. The last conspirator in the strange case of the eBay newsletter takes a guilty plea. Carole Theriault looks at Google’s new approach to cookies in Europe. Our guest is Mary Writz of ForgeRock on the growing importance of mobile device authentication security. And CIA gets a CISO.

For links to all of today's stories check out our CyberWire daily news briefing:
httpshttps://thecyberwire.com/newsletters/daily-briefing/11/93

Selected reading.
Ukraine to put first Russian soldier on trial for war crimes | DW | 12.05.2022 (Deutsche Welle)
Russian soldier on trial in first Ukraine war-crimes case (AP NEWS)
First Russian soldier goes on trial in Ukraine for war crimes (the Guardian) 
The Case for War Crimes Charges Against Russia’s Sandworm Hackers (Wired)
Iranian hackers exposed in a highly targeted espionage campaign (BleepingComputer) 
Iranian APT Cobalt Mirage launching ransomware attacks (SearchSecurity)
Iranian Hackers Leveraging BitLocker and DiskCryptor in Ransomware Attacks (The Hacker News) 
Iranian Cyberspy Group Launching Ransomware Attacks Against US (SecurityWeek) 
Please Confirm You Received Our APT | FortiGuard Labs  (Fortinet Blog) 
Roblox Exploited with Trojans from Scripting Engine (Avanan)
Ukrainian cybercriminal sentenced to 4 years in U.S. prison for credential theft scheme (CyberScoop)
Ukrainian sentenced to 4 years for selling hacked passwords (The Record by Recorded Future) 
Ex-eBay exec charged with harassing newsletter publishers pleads guilty (Reuters)
CIA selects new CISO with deep private sector experience (The Record by Recorded Future)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ukraine holds its first war crimes trial. Are there war crimes in cyberspace? Iranian cyberespionage (and a possible APT side-hustle). Roblox seems to have been used to introduce a backdoor. CISA issues ICS advisories. Darkweb C2C trader sentenced. The last conspirator in the strange case of the eBay newsletter takes a guilty plea. Carole Theriault looks at Google’s new approach to cookies in Europe. Our guest is Mary Writz of ForgeRock on the growing importance of mobile device authentication security. And CIA gets a CISO.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>httpshttps://thecyberwire.com/newsletters/daily-briefing/11/93</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.dw.com/en/ukraine-to-put-first-russian-soldier-on-trial-for-war-crimes/a-61766022">Ukraine to put first Russian soldier on trial for war crimes | DW | 12.05.2022</a> (Deutsche Welle)</p><p><a href="https://apnews.com/article/russia-ukraine-kyiv-war-crimes-31b1d5a9464684c2cb8386c634d8c96c">Russian soldier on trial in first Ukraine war-crimes case</a> (AP NEWS)</p><p><a href="https://www.theguardian.com/world/2022/may/13/first-russian-soldier-goes-on-trial-in-ukraine-for-war-crimes">First Russian soldier goes on trial in Ukraine for war crimes</a> (the Guardian) </p><p><a href="https://www.wired.com/story/cyber-war-crimes-sandworm-russia-ukraine/">The Case for War Crimes Charges Against Russia’s Sandworm Hackers</a> (Wired)</p><p><a href="https://www.bleepingcomputer.com/news/security/iranian-hackers-exposed-in-a-highly-targeted-espionage-campaign/">Iranian hackers exposed in a highly targeted espionage campaign</a> (BleepingComputer) </p><p><a href="https://www.techtarget.com/searchsecurity/news/252518151/Iranian-APT-Cobalt-Illusion-launching-ransomware-attacks">Iranian APT Cobalt Mirage launching ransomware attacks</a> (SearchSecurity)</p><p><a href="https://thehackernews.com/2022/05/iranian-hackers-leveraging-bitlocker.html">Iranian Hackers Leveraging BitLocker and DiskCryptor in Ransomware Attacks</a> (The Hacker News) </p><p><a href="https://www.securityweek.com/iranian-cyberspy-group-launching-ransomware-attacks-against-us">Iranian Cyberspy Group Launching Ransomware Attacks Against US</a> (SecurityWeek) </p><p><a href="https://www.fortinet.com/blog/threat-research/please-confirm-you-received-our-apt">Please Confirm You Received Our APT | FortiGuard Labs </a> (Fortinet Blog) </p><p><a href="https://www.avanan.com/blog/roblox-exploited-with-trojans">Roblox Exploited with Trojans from Scripting Engine</a> (Avanan)</p><p><a href="https://www.cyberscoop.com/ukrainian-cybercriminal-sentenced-ivanov-toplinstev/">Ukrainian cybercriminal sentenced to 4 years in U.S. prison for credential theft scheme</a> (CyberScoop)</p><p><a href="https://therecord.media/ukrainian-sentenced-to-4-years-for-selling-hacked-passwords/">Ukrainian sentenced to 4 years for selling hacked passwords</a> (The Record by Recorded Future) </p><p><a href="https://www.reuters.com/legal/government/ex-ebay-exec-charged-with-harassing-newsletter-publishers-pleads-guilty-2022-05-12/">Ex-eBay exec charged with harassing newsletter publishers pleads guilty</a> (Reuters)</p><p><a href="https://therecord.media/cia-ciso-joseph-rich-baich/">CIA selects new CISO with deep private sector experience</a> (The Record by Recorded Future)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4da5e66-7881-11ec-90a9-bb7bfefd10df]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2533885958.mp3?updated=1690311578" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Killnet hits Italian targets. Access restored to RuTube. Hacktivism in the hybrid war. Emotet surges. NPM dependency confusion attacks were pentesting. Cybercrime and punishment. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1577/notes</link>
      <description>Killnet hits Italian targets. Access to RuTube is restored. Hacktivism in the hybrid war. Emotet surges. Clearing up the confusion of NPM dependency confusion attacks. Tim Eades from Cyber Mentor Fund on finding the right investors. Our guest is Michael DeBolt of Intel 471 on the growing interest in Biometrics in the criminal underground. And cybercrime and punishment, Florida-man edition.
For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/92

Selected reading.
Ukraine maps reveal how much territory Russia has lost in just a few days (Newsweek) 
Pro-Russian hackers target Italy institutional websites -ANSA news agency (Reuters) 
Russian cyber experts restore RuTube access after three-day outage (Reuters) 
They Fled Ukraine to Keep Their Cyber Startup Alive. Now, They’re Hacking Back. (Wall Street Journal)
Ukraine hacktivism 'problematic' for security teams says NSA cyber chief (Tech Monitor)
HP Wolf Security Threat Insights Report Q1 2022 | HP Wolf Security (HP Wolf Security)
npm supply chain attack targets Germany-based companies with dangerous backdoor malware (JFrog)
SaaS App Vanity URLs Can Be Spoofed for Phishing, Social Engineerin (SecurityWeek)
Trio Of Cybercriminals Sentenced For Conspiracy To Commit Fraud And Aggravated Identity Theft (US Attorney for the Middle District of Florida)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 12 May 2022 20:15:00 -0000</pubDate>
      <itunes:title>Killnet hits Italian targets. Access restored to RuTube. Hacktivism in the hybrid war. Emotet surges. NPM dependency confusion attacks were pentesting. Cybercrime and punishment. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1577</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Killnet hits Italian targets. Access to RuTube is restored. Hacktivism in the hybrid war. Emotet surges. Clearing up the confusion of NPM dependency confusion attacks. Tim Eades from Cyber Mentor Fund on finding the right investors. Our guest is Michael DeBolt of Intel 471 on the growing interest in Biometrics in the criminal underground. And cybercrime and punishment, Florida-man edition.
For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/92

Selected reading.
Ukraine maps reveal how much territory Russia has lost in just a few days (Newsweek) 
Pro-Russian hackers target Italy institutional websites -ANSA news agency (Reuters) 
Russian cyber experts restore RuTube access after three-day outage (Reuters) 
They Fled Ukraine to Keep Their Cyber Startup Alive. Now, They’re Hacking Back. (Wall Street Journal)
Ukraine hacktivism 'problematic' for security teams says NSA cyber chief (Tech Monitor)
HP Wolf Security Threat Insights Report Q1 2022 | HP Wolf Security (HP Wolf Security)
npm supply chain attack targets Germany-based companies with dangerous backdoor malware (JFrog)
SaaS App Vanity URLs Can Be Spoofed for Phishing, Social Engineerin (SecurityWeek)
Trio Of Cybercriminals Sentenced For Conspiracy To Commit Fraud And Aggravated Identity Theft (US Attorney for the Middle District of Florida)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Killnet hits Italian targets. Access to RuTube is restored. Hacktivism in the hybrid war. Emotet surges. Clearing up the confusion of NPM dependency confusion attacks. Tim Eades from Cyber Mentor Fund on finding the right investors. Our guest is Michael DeBolt of Intel 471 on the growing interest in Biometrics in the criminal underground. And cybercrime and punishment, Florida-man edition.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/92</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.newsweek.com/ukraine-russia-war-territory-lost-map-data-latest-retreating-1705617">Ukraine maps reveal how much territory Russia has lost in just a few days</a> (Newsweek) </p><p><a href="https://www.reuters.com/world/europe/pro-russian-hackers-target-italy-defence-ministry-senate-websites-ansa-news-2022-05-11/">Pro-Russian hackers target Italy institutional websites -ANSA news agency</a> (Reuters) </p><p><a href="https://www.reuters.com/technology/russian-cyber-experts-struggle-recover-rutube-access-third-day-outage-2022-05-11/">Russian cyber experts restore RuTube access after three-day outage</a> (Reuters) </p><p><a href="https://www.wsj.com/articles/they-fled-ukraine-to-keep-their-cyber-startup-alive-now-theyre-hacking-back-11652347802">They Fled Ukraine to Keep Their Cyber Startup Alive. Now, They’re Hacking Back.</a> (Wall Street Journal)</p><p><a href="https://techmonitor.ai/technology/cybersecurity/ukraine-hacktivism-problematic-nsa-ncsc">Ukraine hacktivism 'problematic' for security teams says NSA cyber chief</a> (Tech Monitor)</p><p><a href="https://threatresearch.ext.hp.com/hp-wolf-security-threat-insights-report-q1-2022/">HP Wolf Security Threat Insights Report Q1 2022 | HP Wolf Security</a> (HP Wolf Security)</p><p><a href="https://jfrog.com/blog/npm-supply-chain-attack-targets-german-based-companies/">npm supply chain attack targets Germany-based companies with dangerous backdoor malware</a> (JFrog)</p><p><a href="https://www.securityweek.com/saas-app-vanity-urls-can-be-spoofed-phishing-social-engineering">SaaS App Vanity URLs Can Be Spoofed for Phishing, Social Engineerin</a> (SecurityWeek)</p><p><a href="https://www.justice.gov/usao-mdfl/pr/trio-cybercriminals-sentenced-conspiracy-commit-fraud-and-aggravated-identity-theft">Trio Of Cybercriminals Sentenced For Conspiracy To Commit Fraud And Aggravated Identity Theft</a> (US Attorney for the Middle District of Florida)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1511</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b47bdfee-7881-11ec-90a9-13cc01c79fc3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7991861569.mp3?updated=1690311561" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA Alert AA22-131A – Protecting against cyber threats to managed service providers and their customers. [CISA Cybersecurity Alerts]</title>
      <link>https://thecyberwire.com/podcasts/cisa-cybersecurity-alerts/15/notes</link>
      <description>The cybersecurity authorities of the UK, Australia, Canada, New Zealand, and the US have observed a recent increase in malicious cyber activity against managed service providers (MSPs). Allied cybersecurity authorities expect state-sponsored cyber actors to increase their targeting of MSPs in an attempt to exploit provider-customer trust relationships. This advisory includes security guidance tailored for both MSPs and their customers. 
AA22-131A Alert, Technical Details, and Mitigations
Technical Approaches to Uncovering and Remediating Malicious Activity
Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses
APTs Targeting IT Service Provider Customers
ACSC's Managed Service Providers: How to manage risk to customer networks 
Global Targeting of Enterprise Managed Service Providers
Cyber Security Considerations for Consumers of Managed Services 
How to Manage Your Security When Engaging a Managed Service Provider
Kaseya Ransomware Attack: Guidance for Affected MSPs and their Customers
Baseline Cyber Security Controls for Small and Medium Organizations
Actions to take when the cyber threat is heightened
Top 10 IT Security Action Items to Protect Internet Connected Networks and Information
CCCS's Alert: Malicious Cyber Activity Targeting Managed Service Providers 
CISA Cybersecurity Alert: APT Activity Exploiting MSPs (2018)
CISA Cyber Essentials and CISA Cyber Resource Hub 
Improving Cybersecurity of Managed Service Providers 
Shields Up Technical Guidance
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 12 May 2022 18:45:00 -0000</pubDate>
      <itunes:title>CISA Alert AA22-131A – Protecting against cyber threats to managed service providers and their customers. [CISA Cybersecurity Alerts]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>15</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The cybersecurity authorities of the UK, Australia, Canada, New Zealand, and the US have observed a recent increase in malicious cyber activity against managed service providers (MSPs). Allied cybersecurity authorities expect state-sponsored cyber actors to increase their targeting of MSPs in an attempt to exploit provider-customer trust relationships. This advisory includes security guidance tailored for both MSPs and their customers. 
AA22-131A Alert, Technical Details, and Mitigations
Technical Approaches to Uncovering and Remediating Malicious Activity
Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses
APTs Targeting IT Service Provider Customers
ACSC's Managed Service Providers: How to manage risk to customer networks 
Global Targeting of Enterprise Managed Service Providers
Cyber Security Considerations for Consumers of Managed Services 
How to Manage Your Security When Engaging a Managed Service Provider
Kaseya Ransomware Attack: Guidance for Affected MSPs and their Customers
Baseline Cyber Security Controls for Small and Medium Organizations
Actions to take when the cyber threat is heightened
Top 10 IT Security Action Items to Protect Internet Connected Networks and Information
CCCS's Alert: Malicious Cyber Activity Targeting Managed Service Providers 
CISA Cybersecurity Alert: APT Activity Exploiting MSPs (2018)
CISA Cyber Essentials and CISA Cyber Resource Hub 
Improving Cybersecurity of Managed Service Providers 
Shields Up Technical Guidance
All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at central@cisa.dhs.gov or (888) 282-0870 and to the FBI via your local FBI field office or the FBI’s 24/7 CyWatch at (855) 292-3937 or CyWatch@fbi.gov.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The cybersecurity authorities of the UK, Australia, Canada, New Zealand, and the US have observed a recent increase in malicious cyber activity against managed service providers (MSPs). Allied cybersecurity authorities expect state-sponsored cyber actors to increase their targeting of MSPs in an attempt to exploit provider-customer trust relationships. This advisory includes security guidance tailored for both MSPs and their customers. </p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-131a">AA22-131A Alert, Technical Details, and Mitigations</a></p><p><a href="https://us-cert.cisa.gov/sites/default/files/publications/AA20-245A-Joint_CSA-Technical_Approaches_to_Uncovering_Malicious_Activity_508.pdf">Technical Approaches to Uncovering and Remediating Malicious Activity</a></p><p><a href="https://www.cisa.gov/sites/default/files/publications/CISA%20Insights_Guidance-for-MSPs-and-Small-and-Mid-sized-Businesses_S508C.pdf">Mitigations and Hardening Guidance for MSPs and Small- and Mid-sized Businesses</a></p><p><a href="https://www.cisa.gov/uscert/APTs-Targeting-IT-Service-Provider-Customers">APTs Targeting IT Service Provider Customers</a></p><p><a href="https://www.cyber.gov.au/acsc/view-all-content/publications/managed-service-providers-how-manage-risk-customer-networks">ACSC's Managed Service Providers: How to manage risk to customer networks </a></p><p><a href="https://www.ncsc.gov.uk/information/global-targeting-enterprises-managed-service-providers">Global Targeting of Enterprise Managed Service Providers</a></p><p><a href="https://cyber.gc.ca/sites/default/files/publications/itsm50030-e.pdf">Cyber Security Considerations for Consumers of Managed Services </a></p><p><a href="https://www.cyber.gov.au/acsc/view-all-content/publications/how-manage-your-security-when-engaging-managed-service-provider">How to Manage Your Security When Engaging a Managed Service Provider</a></p><p><a href="https://www.cisa.gov/uscert/kaseya-ransomware-attack">Kaseya Ransomware Attack: Guidance for Affected MSPs and their Customers</a></p><p><a href="https://www.cyber.gc.ca/en/guidance/baseline-cyber-security-controls-small-and-medium-organizations">Baseline Cyber Security Controls for Small and Medium Organizations</a></p><p><a href="https://www.ncsc.gov.uk/guidance/actions-to-take-when-the-cyber-threat-is-heightened">Actions to take when the cyber threat is heightened</a></p><p><a href="https://www.cyber.gc.ca/en/guidance/top-10-it-security-actions-protect-internet-connected-networks-and-information-itsm10089">Top 10 IT Security Action Items to Protect Internet Connected Networks and Information</a></p><p><a href="https://cyber.gc.ca/en/alerts/malicious-cyber-activity-targeting-managed-service-providers">CCCS's Alert: Malicious Cyber Activity Targeting Managed Service Providers </a></p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/TA18-276B">CISA Cybersecurity Alert: APT Activity Exploiting MSPs (2018)</a></p><p><a href="https://www.cisa.gov/cyber-essentials">CISA Cyber Essentials</a> and <a href="https://www.cisa.gov/cyber-resource-hub">CISA Cyber Resource Hub </a></p><p><a href="https://csrc.nist.gov/publications/detail/white-paper/2019/10/08/improving-cybersecurity-of-managed-service-providers/draft">Improving Cybersecurity of Managed Service Providers </a></p><p><a href="https://www.cisa.gov/uscert/shields-technical-guidance">Shields Up Technical Guidance</a></p><p>All organizations should report incidents and anomalous activity to CISA’s 24/7 Operations Center at <a href="mailto:central@cisa.dhs.gov">central@cisa.dhs.gov</a> or (888) 282-0870 and to the FBI via your <a href="https://www.fbi.gov/contact-us/field-offices">local FBI field office</a> or the FBI’s 24/7 CyWatch at (855) 292-3937 or <a href="mailto:CyWatch@fbi.gov">CyWatch@fbi.gov</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>207</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d5723cb0-d223-11ec-89d8-cfb19442301b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5994182750.mp3?updated=1652301059" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Consensus on the Viasat hack: Russia did it. Kaspersky remains under investigation. The Nerbian RAT is out. NPM dependencies exploited, but to what end? Advisories from CISA and its partners.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1576/notes</link>
      <description>There’s international consensus on the cyberattack against Viasat. Kaspersky remains under investigation. The Nerbian RAT is out. NPM dependencies are exploited, but to what end? Caleb Barlow examines Russia’s future on the internet. Our guest is Deepen Desai from Zscaler with the latest phishing research. And new advisories from CISA and its partners.
For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/91

Selected reading.
Nerbian RAT Using COVID-19 Themes Features Sophisticated Evasion Techniques (Proofpoint)
NPM dependency confusion hacks target German firms (ReversingLabs)
npm Supply Chain Attack Targeting Germany-Based Companies (JFrog)
Adminer in Industrial Products (CISA)
Eaton Intelligent Power Protector (CISA) 
Eaton Intelligent Power Manager Infrastructure (CISA) 
Eaton Intelligent Power Manager (CISA)
AVEVA InTouch Access Anywhere and Plant SCADA Access Anywhere (CISA) 
Mitsubishi Electric MELSOFT GT OPC UA (CISA) 
CISA Adds One Known Exploited Vulnerability to Catalog (CISA) 
Alert (AA22-131A) Protecting Against Cyber Threats to Managed Service Providers and their Customers (CISA)
Protecting Against Cyber Threats to Managed Service Providers and their Customers (CISA)
Russia downed satellite internet in Ukraine -Western officials (Reuters) 
US and its allies say Russia waged cyberattack that took out satellite network (Ars Technica) 
Western powers blame Russia for Ukraine satellite hack (The Record by Recorded Future) 
Russian cyber operations against Ukraine: Declaration by the High Representative on behalf of the European Union (European Council) 
Attribution of Russia’s Malicious Cyber Activity Against Ukraine - United States Department of State (United States Department of State) 
U.S. Government Attributes Cyberattacks on SATCOM Networks to Russian State-Sponsored Malicious Cyber Actors (CISA)
Russia behind cyber-attack with Europe-wide impact an hour before Ukraine invasion (GOV.UK)
Estonia joins the statement of attribution on cyberattacks against Ukraine (Ministry of Foreign Affairs, Republic of Estonia) 
Statement on Russia’s malicious cyber activity affecting Europe and Ukraine (Canada.ca) 
Attribution to Russia for malicious cyber activity against European networks (Australian Government Department of Foreign Affairs and Trade) 
Russia hacked an American satellite company one hour before the Ukraine invasion (MIT Technology Review) 
NSA Probing Reach of Software From Russia’s Kaspersky in US Systems (Bloomberg) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 11 May 2022 20:15:00 -0000</pubDate>
      <itunes:title>Consensus on the Viasat hack: Russia did it. Kaspersky remains under investigation. The Nerbian RAT is out. NPM dependencies exploited, but to what end? Advisories from CISA and its partners.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1576</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>There’s international consensus on the cyberattack against Viasat. Kaspersky remains under investigation. The Nerbian RAT is out. NPM dependencies are exploited, but to what end? Caleb Barlow examines Russia’s future on the internet. Our guest is Deepen Desai from Zscaler with the latest phishing research. And new advisories from CISA and its partners.
For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/91

Selected reading.
Nerbian RAT Using COVID-19 Themes Features Sophisticated Evasion Techniques (Proofpoint)
NPM dependency confusion hacks target German firms (ReversingLabs)
npm Supply Chain Attack Targeting Germany-Based Companies (JFrog)
Adminer in Industrial Products (CISA)
Eaton Intelligent Power Protector (CISA) 
Eaton Intelligent Power Manager Infrastructure (CISA) 
Eaton Intelligent Power Manager (CISA)
AVEVA InTouch Access Anywhere and Plant SCADA Access Anywhere (CISA) 
Mitsubishi Electric MELSOFT GT OPC UA (CISA) 
CISA Adds One Known Exploited Vulnerability to Catalog (CISA) 
Alert (AA22-131A) Protecting Against Cyber Threats to Managed Service Providers and their Customers (CISA)
Protecting Against Cyber Threats to Managed Service Providers and their Customers (CISA)
Russia downed satellite internet in Ukraine -Western officials (Reuters) 
US and its allies say Russia waged cyberattack that took out satellite network (Ars Technica) 
Western powers blame Russia for Ukraine satellite hack (The Record by Recorded Future) 
Russian cyber operations against Ukraine: Declaration by the High Representative on behalf of the European Union (European Council) 
Attribution of Russia’s Malicious Cyber Activity Against Ukraine - United States Department of State (United States Department of State) 
U.S. Government Attributes Cyberattacks on SATCOM Networks to Russian State-Sponsored Malicious Cyber Actors (CISA)
Russia behind cyber-attack with Europe-wide impact an hour before Ukraine invasion (GOV.UK)
Estonia joins the statement of attribution on cyberattacks against Ukraine (Ministry of Foreign Affairs, Republic of Estonia) 
Statement on Russia’s malicious cyber activity affecting Europe and Ukraine (Canada.ca) 
Attribution to Russia for malicious cyber activity against European networks (Australian Government Department of Foreign Affairs and Trade) 
Russia hacked an American satellite company one hour before the Ukraine invasion (MIT Technology Review) 
NSA Probing Reach of Software From Russia’s Kaspersky in US Systems (Bloomberg) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>There’s international consensus on the cyberattack against Viasat. Kaspersky remains under investigation. The Nerbian RAT is out. NPM dependencies are exploited, but to what end? Caleb Barlow examines Russia’s future on the internet. Our guest is Deepen Desai from Zscaler with the latest phishing research. And new advisories from CISA and its partners.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/91</p><h2><br></h2><h2>Selected reading.</h2><p><a href="https://www.proofpoint.com/us/blog/threat-insight/nerbian-rat-using-covid-19-themes-features-sophisticated-evasion-techniques">Nerbian RAT Using COVID-19 Themes Features Sophisticated Evasion Techniques</a> (Proofpoint)</p><p><a href="https://blog.reversinglabs.com/blog/npm-dependency-confusion-hacks-target-german-firms">NPM dependency confusion hacks target German firms</a> (ReversingLabs)</p><p><a href="https://jfrog.com/blog/npm-supply-chain-attack-targets-german-based-companies/">npm Supply Chain Attack Targeting Germany-Based Companies</a> (JFrog)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-130-01">Adminer in Industrial Products</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-130-02">Eaton Intelligent Power Protector</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-130-03">Eaton Intelligent Power Manager Infrastructure</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-130-04">Eaton Intelligent Power Manager</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-130-05">AVEVA InTouch Access Anywhere and Plant SCADA Access Anywhere</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-130-06">Mitsubishi Electric MELSOFT GT OPC UA</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/05/10/cisa-adds-one-known-exploited-vulnerability-catalog">CISA Adds One Known Exploited Vulnerability to Catalog</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-131a">Alert (AA22-131A) Protecting Against Cyber Threats to Managed Service Providers and their Customers</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-131a">Protecting Against Cyber Threats to Managed Service Providers and their Customers</a> (CISA)</p><p><a href="https://www.reuters.com/world/europe/russia-behind-cyberattack-against-satellite-internet-modems-ukraine-eu-2022-05-10/">Russia downed satellite internet in Ukraine -Western officials</a> (Reuters) </p><p><a href="https://arstechnica.com/information-technology/2022/05/us-and-its-allies-say-russia-waged-cyberattack-that-took-out-satellite-network/">US and its allies say Russia waged cyberattack that took out satellite network</a> (Ars Technica) </p><p><a href="https://therecord.media/eu-uk-blame-russia-for-ukraine-satellite-hack/">Western powers blame Russia for Ukraine satellite hack</a> (The Record by Recorded Future) </p><p><a href="https://www.consilium.europa.eu/en/press/press-releases/2022/05/10/russian-cyber-operations-against-ukraine-declaration-by-the-high-representative-on-behalf-of-the-european-union/">Russian cyber operations against Ukraine: Declaration by the High Representative on behalf of the European Union</a> (European Council) </p><p><a href="https://www.state.gov/attribution-of-russias-malicious-cyber-activity-against-ukraine/">Attribution of Russia’s Malicious Cyber Activity Against Ukraine - United States Department of State</a> (United States Department of State) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/05/10/us-government-attributes-cyberattacks-satcom-networks-russian">U.S. Government Attributes Cyberattacks on SATCOM Networks to Russian State-Sponsored Malicious Cyber Actors</a> (CISA)</p><p><a href="https://www.gov.uk/government/news/russia-behind-cyber-attack-with-europe-wide-impact-an-hour-before-ukraine-invasion">Russia behind cyber-attack with Europe-wide impact an hour before Ukraine invasion</a> (GOV.UK)</p><p><a href="https://vm.ee/en/news/estonia-joins-statement-attribution-cyberattacks-against-ukraine">Estonia joins the statement of attribution on cyberattacks against Ukraine</a> (Ministry of Foreign Affairs, Republic of Estonia) </p><p><a href="https://www.canada.ca/en/global-affairs/news/2022/05/statement-on-russias-malicious-cyber-activity-affecting-europe-and-ukraine.html">Statement on Russia’s malicious cyber activity affecting Europe and Ukraine</a> (Canada.ca) </p><p><a href="https://www.foreignminister.gov.au/minister/marise-payne/media-release/attribution-russia-malicious-cyber-activity-against-european-networks">Attribution to Russia for malicious cyber activity against European networks</a> (Australian Government Department of Foreign Affairs and Trade) </p><p><a href="https://www.technologyreview.com/2022/05/10/1051973/russia-hack-viasat-satellite-ukraine-invasion/">Russia hacked an American satellite company one hour before the Ukraine invasion</a> (MIT Technology Review) </p><p><a href="https://www.bloomberg.com/news/articles/2022-05-10/nsa-probing-kaspersky-s-reach-in-us-after-russian-invasion">NSA Probing Reach of Software From Russia’s Kaspersky in US Systems</a> (Bloomberg) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1483</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b3e03206-7881-11ec-90a9-77e5fbba2baf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5942839010.mp3?updated=1690311493" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Notes on cyber phases of Russia’s hybrid war, including an assessment of Victory Day as an influence op. A look at C2C markets. And Spain’s spyware scandal claims an intelligence chief. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1575/notes</link>
      <description>A quick introductory note on Russia’s hybrid war against Ukraine. Russian television schedules hacked to display anti-war message. Phishing campaign distributes Jester Stealer in Ukraine. European Council formally attributes cyberattack on Viasat to Russia. Costa Rica declares a state of emergency as Conti ransomware cripples government sites. DCRat and the C2C markets. The gang behind REvil does indeed seem to be back. More Joker-infested apps found in Google Play. Guest Nick Adams from Differential Ventures discusses what will drive continued growth of cybersecurity beyond attack surfaces and governance from a VC's perspective. Partner Ben Yelin from UMD CHHS on digital privacy concerns in the aftermath of the potential overturn of Roe vs Wade. And Spain’s spyware scandal takes down an intelligence chief.
For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/90

Selected reading.
Ukraine morning briefing: Five developments as Joe Biden warns Vladimir Putin has 'no way out' (The Telegraph)
Viewpoint: Putin now faces only different kinds of defeat (BBC News) 
Putin's Victory Day speech gives no clue on Ukraine escalation (Reuters) 
On Victory Day, Putin defends war on Ukraine as fight against ‘Nazis’ (Washington Post) 
In Speech, Putin Shows Reluctance in Demanding Too Much of Russians (New York Times) 
Putin's parade shows he "is going to continue at whatever cost" in Ukraine (Newsweek)
Russia’s display of military might sent the West a strong message – just not the one Putin intended (The Telegraph)
Russian TV Schedules Hacked on Victory Day to Show Anti-War Messages (HackRead) 
Russian TV hacked to say ‘blood of Ukrainians is on your hands’ (The Telegraph) 
Mass Distribution of Self-Destructing Malware in Ukraine (BankInfoSecurity) 
Russian cyber operations against Ukraine: Declaration by the High Representative on behalf of the European Union (European Council)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 May 2022 20:25:00 -0000</pubDate>
      <itunes:title>Notes on cyber phases of Russia’s hybrid war, including an assessment of Victory Day as an influence op. A look at C2C markets. And Spain’s spyware scandal claims an intelligence chief. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1575</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A quick introductory note on Russia’s hybrid war against Ukraine. Russian television schedules hacked to display anti-war message. Phishing campaign distributes Jester Stealer in Ukraine. European Council formally attributes cyberattack on Viasat to Russia. Costa Rica declares a state of emergency as Conti ransomware cripples government sites. DCRat and the C2C markets. The gang behind REvil does indeed seem to be back. More Joker-infested apps found in Google Play. Guest Nick Adams from Differential Ventures discusses what will drive continued growth of cybersecurity beyond attack surfaces and governance from a VC's perspective. Partner Ben Yelin from UMD CHHS on digital privacy concerns in the aftermath of the potential overturn of Roe vs Wade. And Spain’s spyware scandal takes down an intelligence chief.
For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/90

Selected reading.
Ukraine morning briefing: Five developments as Joe Biden warns Vladimir Putin has 'no way out' (The Telegraph)
Viewpoint: Putin now faces only different kinds of defeat (BBC News) 
Putin's Victory Day speech gives no clue on Ukraine escalation (Reuters) 
On Victory Day, Putin defends war on Ukraine as fight against ‘Nazis’ (Washington Post) 
In Speech, Putin Shows Reluctance in Demanding Too Much of Russians (New York Times) 
Putin's parade shows he "is going to continue at whatever cost" in Ukraine (Newsweek)
Russia’s display of military might sent the West a strong message – just not the one Putin intended (The Telegraph)
Russian TV Schedules Hacked on Victory Day to Show Anti-War Messages (HackRead) 
Russian TV hacked to say ‘blood of Ukrainians is on your hands’ (The Telegraph) 
Mass Distribution of Self-Destructing Malware in Ukraine (BankInfoSecurity) 
Russian cyber operations against Ukraine: Declaration by the High Representative on behalf of the European Union (European Council)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A quick introductory note on Russia’s hybrid war against Ukraine. Russian television schedules hacked to display anti-war message. Phishing campaign distributes Jester Stealer in Ukraine. European Council formally attributes cyberattack on Viasat to Russia. Costa Rica declares a state of emergency as Conti ransomware cripples government sites. DCRat and the C2C markets. The gang behind REvil does indeed seem to be back. More Joker-infested apps found in Google Play. Guest Nick Adams from Differential Ventures discusses what will drive continued growth of cybersecurity beyond attack surfaces and governance from a VC's perspective. Partner Ben Yelin from UMD CHHS on digital privacy concerns in the aftermath of the potential overturn of Roe vs Wade. And Spain’s spyware scandal takes down an intelligence chief.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/90</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.telegraph.co.uk/world-news/2022/05/10/ukraine-morning-briefing-five-developments-joe-biden-warns-vladimir/">Ukraine morning briefing: Five developments as Joe Biden warns Vladimir Putin has 'no way out'</a> (The Telegraph)</p><p><a href="https://www.bbc.com/news/world-europe-61348287">Viewpoint: Putin now faces only different kinds of defeat</a> (BBC News) </p><p><a href="https://www.reuters.com/world/europe/putin-mark-soviet-ww2-victory-ukraine-decries-school-bombing-2022-05-09/">Putin's Victory Day speech gives no clue on Ukraine escalation</a> (Reuters) </p><p><a href="https://www.washingtonpost.com/world/2022/05/09/russia-victory-day-putin-speech-ukraine/">On Victory Day, Putin defends war on Ukraine as fight against ‘Nazis’</a> (Washington Post) </p><p><a href="https://www.nytimes.com/2022/05/09/world/europe/putin-speech-victory-day-ukraine-war.html">In Speech, Putin Shows Reluctance in Demanding Too Much of Russians</a> (New York Times) </p><p><a href="https://www.newsweek.com/putins-parade-shows-he-going-continue-whatever-cost-ukraine-1704959">Putin's parade shows he "is going to continue at whatever cost" in Ukraine</a> (Newsweek)</p><p><a href="https://www.telegraph.co.uk/world-news/2022/05/09/russias-military-power-not-scary-vladimir-putin-wants-us-believe/">Russia’s display of military might sent the West a strong message – just not the one Putin intended</a> (The Telegraph)</p><p><a href="https://www.hackread.com/russian-tv-schedules-hacked-victory-day-anti-war/">Russian TV Schedules Hacked on Victory Day to Show Anti-War Messages</a> (HackRead) </p><p><a href="https://www.telegraph.co.uk/world-news/2022/05/09/online-russian-tv-schedule-hacked-say-blood-ukrainians-hands/">Russian TV hacked to say ‘blood of Ukrainians is on your hands’</a> (The Telegraph) </p><p><a href="https://www.bankinfosecurity.com/mass-distribution-self-destructing-malware-in-ukraine-a-19043">Mass Distribution of Self-Destructing Malware in Ukraine</a> (BankInfoSecurity) </p><p><a href="https://www.consilium.europa.eu/en/press/press-releases/2022/05/10/russian-cyber-operations-against-ukraine-declaration-by-the-high-representative-on-behalf-of-the-european-union/">Russian cyber operations against Ukraine: Declaration by the High Representative on behalf of the European Union</a> (European Council)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1714</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b3829c86-7881-11ec-90a9-9311b8ef48b2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9874683375.mp3?updated=1690311481" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mixer gets sanctioned. Reward offered for Conti hoods. Ag company hit with ransomware. Hacktivism and cyberattacks  in Russia’s hybrid war. That apology? The Kremlin takes it back.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1574/notes</link>
      <description>The US Treasury Department sanctions a cryptocurrency mixer. Rewards for Justice is interested in Conti. US tractor manufacturer AGCO was hit by a ransomware attack. Russian hacktivism hits German targets and threatens the UK. A Russian diplomatic account was apparently hijacked. Tracking Cobalt Strike servers used against Ukraine. Dinah Davis from Arctic Wolf defends against DDOS attacks. Rick Howard looks at Single Sign On. And no apology for you, Mr. Bennett.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/89

Selected reading.
U.S. Treasury Issues First-Ever Sanctions on a Virtual Currency Mixer, Targets DPRK Cyber Threats (U.S. Department of the Treasury)
Reward Offers for Information to Bring Conti Ransomware Variant Co-Conspirators to Justice (United States Department of State)
AGCO ransomware attack disrupts tractor sales during U.S. planting season (Reuters)
Agricultural equipment maker AGCO reports ransomware attack (The Record by Recorded Future)
Russia’s chief diplomat in Scotland condemns Ukraine invasion in social media post (The Telegraph)  
Pro-Russian Hackers Hit German Government Sites, Spiegel Says (Bloomberg)
Tracking Cobalt Strike Servers Used in Cyberattacks on Ukraine (IronNet)
Russia tensions with Israel may intensify as Kremlin denies Putin's apology (Newsweek)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 09 May 2022 20:15:00 -0000</pubDate>
      <itunes:title>Mixer gets sanctioned. Reward offered for Conti hoods. Ag company hit with ransomware. Hacktivism and cyberattacks  in Russia’s hybrid war. That apology? The Kremlin takes it back.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1574</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The US Treasury Department sanctions a cryptocurrency mixer. Rewards for Justice is interested in Conti. US tractor manufacturer AGCO was hit by a ransomware attack. Russian hacktivism hits German targets and threatens the UK. A Russian diplomatic account was apparently hijacked. Tracking Cobalt Strike servers used against Ukraine. Dinah Davis from Arctic Wolf defends against DDOS attacks. Rick Howard looks at Single Sign On. And no apology for you, Mr. Bennett.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/89

Selected reading.
U.S. Treasury Issues First-Ever Sanctions on a Virtual Currency Mixer, Targets DPRK Cyber Threats (U.S. Department of the Treasury)
Reward Offers for Information to Bring Conti Ransomware Variant Co-Conspirators to Justice (United States Department of State)
AGCO ransomware attack disrupts tractor sales during U.S. planting season (Reuters)
Agricultural equipment maker AGCO reports ransomware attack (The Record by Recorded Future)
Russia’s chief diplomat in Scotland condemns Ukraine invasion in social media post (The Telegraph)  
Pro-Russian Hackers Hit German Government Sites, Spiegel Says (Bloomberg)
Tracking Cobalt Strike Servers Used in Cyberattacks on Ukraine (IronNet)
Russia tensions with Israel may intensify as Kremlin denies Putin's apology (Newsweek)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US Treasury Department sanctions a cryptocurrency mixer. Rewards for Justice is interested in Conti. US tractor manufacturer AGCO was hit by a ransomware attack. Russian hacktivism hits German targets and threatens the UK. A Russian diplomatic account was apparently hijacked. Tracking Cobalt Strike servers used against Ukraine. Dinah Davis from Arctic Wolf defends against DDOS attacks. Rick Howard looks at Single Sign On. And no apology for you, Mr. Bennett.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/89</p><p><br></p><h2>Selected reading.</h2><p><a href="https://home.treasury.gov/news/press-releases/jy0768">U.S. Treasury Issues First-Ever Sanctions on a Virtual Currency Mixer, Targets DPRK Cyber Threats</a> (U.S. Department of the Treasury)</p><p><a href="https://www.state.gov/reward-offers-for-information-to-bring-conti-ransomware-variant-co-conspirators-to-justice/">Reward Offers for Information to Bring Conti Ransomware Variant Co-Conspirators to Justice</a> (United States Department of State)</p><p><a href="https://www.reuters.com/business/agco-says-some-production-facilities-hit-by-ransomware-attack-2022-05-06/">AGCO ransomware attack disrupts tractor sales during U.S. planting season</a> (Reuters)</p><p><a href="https://therecord.media/agco-ransomware-attack-agricultural-sector/">Agricultural equipment maker AGCO reports ransomware attack</a> (The Record by Recorded Future)</p><p><a href="https://www.telegraph.co.uk/world-news/2022/05/06/russias-chief-diplomat-scotland-condemns-ukraine-invasion-social/">Russia’s chief diplomat in Scotland condemns Ukraine invasion in social media post</a> (The Telegraph)  </p><p><a href="https://www.bloomberg.com/news/articles/2022-05-06/german-government-sites-hit-by-pro-russian-hackers-spiegel-says">Pro-Russian Hackers Hit German Government Sites, Spiegel Says</a> (Bloomberg)</p><p><a href="https://www.ironnet.com/blog/tracking-cobalt-strike-servers-used-in-cyberattacks-on-ukraine">Tracking Cobalt Strike Servers Used in Cyberattacks on Ukraine</a> (IronNet)</p><p><a href="https://www.newsweek.com/russia-tensions-israel-may-intensify-kremlin-denies-putins-apology-1704349">Russia tensions with Israel may intensify as Kremlin denies Putin's apology</a> (Newsweek)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1522</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b29d62b0-7881-11ec-90a9-9bff411bd422]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3401940154.mp3?updated=1690311462" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Amanda Fennell: There's a cyber warrior in all of us [Information] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/98/notes</link>
      <description>Chief security officer and chief information officer at Relativity, Amanda Fennel shares her story from archeology to cybersecurity. She shares the path that lead her towards becoming an archeologist and how it turned out not being exactly what she expected. She then shares how she got into the cyber business and how her past has impacted what she's doing now. She describes how she would like to be remembered in the cyber world, she says "I do hope that I left things better than I found them, not just the security of a product or a company, but I believe strongly that every person has a little cyber warrior inside of them." We thank Amanda for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 08 May 2022 07:00:00 -0000</pubDate>
      <itunes:title>Amanda Fennell: There's a cyber warrior in all of us [Information] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>99</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Chief security officer and chief information officer at Relativity, Amanda Fennel shares her story from archeology to cybersecurity. She shares the path that lead her towards becoming an archeologist and how it turned out not being exactly what she expected. She then shares how she got into the cyber business and how her past has impacted what she's doing now. She describes how she would like to be remembered in the cyber world, she says "I do hope that I left things better than I found them, not just the security of a product or a company, but I believe strongly that every person has a little cyber warrior inside of them." We thank Amanda for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chief security officer and chief information officer at Relativity, Amanda Fennel shares her story from archeology to cybersecurity. She shares the path that lead her towards becoming an archeologist and how it turned out not being exactly what she expected. She then shares how she got into the cyber business and how her past has impacted what she's doing now. She describes how she would like to be remembered in the cyber world, she says "I do hope that I left things better than I found them, not just the security of a product or a company, but I believe strongly that every person has a little cyber warrior inside of them." We thank Amanda for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>468</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ffe9efec-cbd9-11ec-a0fb-03c855983b84]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1954413898.mp3?updated=1652111380" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Attacking where vulnerable. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/231/notes</link>
      <description>Tushar Richabadas from Barracuda joins Dave Bittner to discuss their findings detailed in their "Threat Spotlight: Attacks on Log4Shell vulnerabilities." Their research shows the percentage of attackers targeting the vulnerabilities, and shows where the dips and spikes are over the course of the past couple of months.
The research has also gathered where the attackers main IP addresses are located, with 83% of them located in the United States. They breakdown what this malware can do and how to protect yourself against it. They say "Due to the growing number of vulnerabilities found in web applications, it is getting progressively more complex to protect against attacks."
The research can be found here:
Threat Spotlight: Attacks on Log4Shell vulnerabilities

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 May 2022 07:00:00 -0000</pubDate>
      <itunes:title>Attacking where vulnerable. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>231</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Tushar Richabadas from Barracuda joins Dave Bittner to discuss their findings detailed in their "Threat Spotlight: Attacks on Log4Shell vulnerabilities." Their research shows the percentage of attackers targeting the vulnerabilities, and shows where the dips and spikes are over the course of the past couple of months.
The research has also gathered where the attackers main IP addresses are located, with 83% of them located in the United States. They breakdown what this malware can do and how to protect yourself against it. They say "Due to the growing number of vulnerabilities found in web applications, it is getting progressively more complex to protect against attacks."
The research can be found here:
Threat Spotlight: Attacks on Log4Shell vulnerabilities

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tushar Richabadas from Barracuda joins Dave Bittner to discuss their findings detailed in their "Threat Spotlight: Attacks on Log4Shell vulnerabilities." Their research shows the percentage of attackers targeting the vulnerabilities, and shows where the dips and spikes are over the course of the past couple of months.</p><p>The research has also gathered where the attackers main IP addresses are located, with 83% of them located in the United States. They breakdown what this malware can do and how to protect yourself against it. They say "Due to the growing number of vulnerabilities found in web applications, it is getting progressively more complex to protect against attacks."</p><p>The research can be found here:</p><ul><li><a href="https://blog.barracuda.com/2022/03/02/threat-spotlight-attacks-on-log4shell-vulnerabilities/">Threat Spotlight: Attacks on Log4Shell vulnerabilities</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>959</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1aa3ef32-cbe8-11ec-aaec-3b68bb5058bc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4827937189.mp3?updated=1685126789" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Victory Day approaches so shields up. Hackivists in the battlespace. Raspberry Robin and a USB worm. A carefully operated credential phishing campaign. Happy Mother’s Day (and stay safe online).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1573/notes</link>
      <description>An update on the war in Ukraine as Victory Day approaches. President Lukashenka on the war next door. Hackivists in the battlespace. Raspberry Robin and a USB worm. A carefully operated credential phishing campaign. Another ICS security alert from CISA. Dinah Davis from Arctic Wolf on reflection amplification techniques. Carole Theriault examines zero trust architecture access policies. Happy Mother’s Day (and stay safe online).

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/88

Selected reading.
Mariupol steel mill battle rages as Ukraine repels attacks (Military Times) 
Why the battle for Mariupol is important for Vladimir Putin. (New York Times)
A race against time in Ukraine as Russia advances, West sends weapons (Washington Post)
The AP Interview: Belarus admits Russia's war 'drags on' (AP NEWS)
Russia’s ally Belarus criticises war effort for ‘dragging on’ (The Telegraph)
NSA cyber boss seeks to discourage vigilante hacking against Russia (Defense News)
Shields Up: Russian Cyberattacks Headed Our Way (JD Supra)
Raspberry Robin gets the worm early (Red Canary) 
VIP3R: New actor. Old story. Great success. (Menlo Security)
Johnson Controls Metasys (CISA) 
Top 3 Mother’s Day Scam Sites – Be Smart When Buying Gifts (Trend Micro News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 06 May 2022 20:30:00 -0000</pubDate>
      <itunes:title>Victory Day approaches so shields up. Hackivists in the battlespace. Raspberry Robin and a USB worm. A carefully operated credential phishing campaign. Happy Mother’s Day (and stay safe online).</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1572</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An update on the war in Ukraine as Victory Day approaches. President Lukashenka on the war next door. Hackivists in the battlespace. Raspberry Robin and a USB worm. A carefully operated credential phishing campaign. Another ICS security alert from CISA. Dinah Davis from Arctic Wolf on reflection amplification techniques. Carole Theriault examines zero trust architecture access policies. Happy Mother’s Day (and stay safe online).

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/88

Selected reading.
Mariupol steel mill battle rages as Ukraine repels attacks (Military Times) 
Why the battle for Mariupol is important for Vladimir Putin. (New York Times)
A race against time in Ukraine as Russia advances, West sends weapons (Washington Post)
The AP Interview: Belarus admits Russia's war 'drags on' (AP NEWS)
Russia’s ally Belarus criticises war effort for ‘dragging on’ (The Telegraph)
NSA cyber boss seeks to discourage vigilante hacking against Russia (Defense News)
Shields Up: Russian Cyberattacks Headed Our Way (JD Supra)
Raspberry Robin gets the worm early (Red Canary) 
VIP3R: New actor. Old story. Great success. (Menlo Security)
Johnson Controls Metasys (CISA) 
Top 3 Mother’s Day Scam Sites – Be Smart When Buying Gifts (Trend Micro News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An update on the war in Ukraine as Victory Day approaches. President Lukashenka on the war next door. Hackivists in the battlespace. Raspberry Robin and a USB worm. A carefully operated credential phishing campaign. Another ICS security alert from CISA. Dinah Davis from Arctic Wolf on reflection amplification techniques. Carole Theriault examines zero trust architecture access policies. Happy Mother’s Day (and stay safe online).</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/88</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.militarytimes.com/flashpoints/ukraine/2022/05/05/mariupol-steel-mill-battle-rages-as-ukraine-repels-attacks/">Mariupol steel mill battle rages as Ukraine repels attacks</a> (Military Times) </p><p><a href="https://www.nytimes.com/2022/05/05/world/putin-war-mariupol-ukraine.html">Why the battle for Mariupol is important for Vladimir Putin.</a> (New York Times)</p><p><a href="https://www.washingtonpost.com/world/2022/05/05/ukraine-russia-battles-donbas-weapons/">A race against time in Ukraine as Russia advances, West sends weapons</a> (Washington Post)</p><p><a href="https://apnews.com/article/belarus-alexander-lukashenko-ap-interview-9bc1f6524eb65841b924883705684b7f">The AP Interview: Belarus admits Russia's war 'drags on'</a> (AP NEWS)</p><p><a href="https://www.telegraph.co.uk/world-news/2022/05/05/russias-ally-belarus-criticises-war-effort-dragging/">Russia’s ally Belarus criticises war effort for ‘dragging on’</a> (The Telegraph)</p><p><a href="https://www.defensenews.com/cyber/2022/05/05/nsa-cyber-boss-seeks-to-discourage-vigilante-hacking-against-russia/">NSA cyber boss seeks to discourage vigilante hacking against Russia</a> (Defense News)</p><p><a href="https://www.jdsupra.com/legalnews/shields-up-russian-cyberattacks-headed-9458835/">Shields Up: Russian Cyberattacks Headed Our Way</a> (JD Supra)</p><p><a href="https://redcanary.com/blog/raspberry-robin/">Raspberry Robin gets the worm early</a> (Red Canary) </p><p><a href="https://www.menlosecurity.com/blog/vip3r-new-actor-old-story-great-success/">VIP3R: New actor. Old story. Great success.</a> (Menlo Security)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-125-01">Johnson Controls Metasys</a> (CISA) </p><p><a href="https://news.trendmicro.com/2022/05/05/top-mothers-day-gift-shopping-scams/">Top 3 Mother’s Day Scam Sites – Be Smart When Buying Gifts</a> (Trend Micro News)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1227</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4bb0610-7881-11ec-90a9-9bbbc5d14c3f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7591972822.mp3?updated=1690310096" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dateline Moscow, Kyiv, and Minsk: Hacktivisim and privateering. Log4j vulnerabilities more widespread than initially thought. US Cyber Command deploys "hunt forward" team to Lithuania.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1572/notes</link>
      <description>Hacktivisim and privateering in Moscow, Kyiv, and Minsk. Log4j vulnerabilities are more widespread than initially thought. US Cyber Command deployed a "hunt forward" team to Lithuania. CISA adds five vulnerabilities to its Known Exploited Vulnerabilities Catalog. Jen Miller-Osborn from Palo Alto Networks discusses the findings from the Center for Digital Government's survey on Getting Ahead of Ransomware. Grayson Milbourne of Webroot/OpenText discusses OpenText's 2022 BrightCloud Threat Report. And Anonymous leaks emails allegedly belonging to the Nauru Police Force.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/87

Selected reading.
Russian ally Belarus launches military quick-response drills (Washington Post)
Putin’s Ukraine War: Desperate Belarus dictator strikes back (Atlantic Council)
Russian ransomware group claims attack on Bulgarian refugee agency (CyberScoop)
Russia and Ukraine Conflict Q&amp;A | Cybersixgill (Cybersixgill) Threat Advisory: New Log4j Exploit Demonstrates a Hidden Blind Spot in the Global Digital Supply Chain (Cequence)
Anonymous Leak 82GB of Police Emails Against Australia's Offshore Detention (HackRead)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 05 May 2022 20:30:00 -0000</pubDate>
      <itunes:title>Dateline Moscow, Kyiv, and Minsk: Hacktivisim and privateering. Log4j vulnerabilities more widespread than initially thought. US Cyber Command deploys "hunt forward" team to Lithuania.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1572</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Hacktivisim and privateering in Moscow, Kyiv, and Minsk. Log4j vulnerabilities are more widespread than initially thought. US Cyber Command deployed a "hunt forward" team to Lithuania. CISA adds five vulnerabilities to its Known Exploited Vulnerabilities Catalog. Jen Miller-Osborn from Palo Alto Networks discusses the findings from the Center for Digital Government's survey on Getting Ahead of Ransomware. Grayson Milbourne of Webroot/OpenText discusses OpenText's 2022 BrightCloud Threat Report. And Anonymous leaks emails allegedly belonging to the Nauru Police Force.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/87

Selected reading.
Russian ally Belarus launches military quick-response drills (Washington Post)
Putin’s Ukraine War: Desperate Belarus dictator strikes back (Atlantic Council)
Russian ransomware group claims attack on Bulgarian refugee agency (CyberScoop)
Russia and Ukraine Conflict Q&amp;A | Cybersixgill (Cybersixgill) Threat Advisory: New Log4j Exploit Demonstrates a Hidden Blind Spot in the Global Digital Supply Chain (Cequence)
Anonymous Leak 82GB of Police Emails Against Australia's Offshore Detention (HackRead)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hacktivisim and privateering in Moscow, Kyiv, and Minsk. Log4j vulnerabilities are more widespread than initially thought. US Cyber Command deployed a "hunt forward" team to Lithuania. CISA adds five vulnerabilities to its Known Exploited Vulnerabilities Catalog. Jen Miller-Osborn from Palo Alto Networks discusses the findings from the Center for Digital Government's survey on Getting Ahead of Ransomware. Grayson Milbourne of Webroot/OpenText discusses OpenText's 2022 BrightCloud Threat Report. And Anonymous leaks emails allegedly belonging to the Nauru Police Force.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/87</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.washingtonpost.com/world/2022/05/04/belarus-drills-russia-military-readiness-ukraine/">Russian ally Belarus launches military quick-response drills</a> (Washington Post)</p><p><a href="https://www.atlanticcouncil.org/blogs/belarusalert/putins-ukraine-war-desperate-belarus-dictator-strikes-back/">Putin’s Ukraine War: Desperate Belarus dictator strikes back</a> (Atlantic Council)</p><p><a href="https://www.cyberscoop.com/lockbit-ransomware-attack-bulgarian-refugee-agency/">Russian ransomware group claims attack on Bulgarian refugee agency</a> (CyberScoop)</p><p><a href="https://www.cybersixgill.com/blog/russian-and-ukrainian-conflict/">Russia and Ukraine Conflict Q&amp;A | Cybersixgill</a> (Cybersixgill) <a href="https://www.cequence.ai/blog/long4j/">Threat Advisory: New Log4j Exploit Demonstrates a Hidden Blind Spot in the Global Digital Supply Chain</a> (Cequence)</p><p><a href="https://www.hackread.com/anonymous-leak-police-emails-australia-offshore-detention/">Anonymous Leak 82GB of Police Emails Against Australia's Offshore Detention</a> (HackRead)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1375</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b49b92ee-7881-11ec-90a9-eb8e7a4f4334]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1376832429.mp3?updated=1690310081" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More malware deployed in Eastern Europe. Cozy Bear is typosquatting. CuckooBees swarm around intellectual property. Tracking the DPRK’s hackers. Quiet persistence in corporate networks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1571/notes</link>
      <description>An upswing in malware deployed against targets in Eastern Europe. Cozy Bear is typosquatting. CuckooBees swarm around intellectual property. Tracking the DPRK’s hackers. Quiet persistence in corporate networks. CISA issues an ICS advisory. Caleb Barlow on backup communications for your business during this period of "shields up." Duncan Jones from Cambridge Quantum sits down with Dave to discuss the NIST algorithm finalist Rainbow vulnerability. And, hey, officer, honest, it was just a Squirtle….

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/86

Selected reading.
Update on cyber activity in Eastern Europe (Google) 
Multiple government hacking groups stay busy targeting Ukraine and the region, Google researchers say (CyberScoop)
Google: Nation-state phishing campaigns expanding to target Eastern Europe orgs (The Record by Recorded Future)
SolarWinds hackers set up phony media outlets to trick targets (CyberScoop) 
SOLARDEFLECTION C2 Infrastructure Used by NOBELIUM in Company Brand Misuse (Recorded Future) 
Experts discover a Chinese-APT cyber espionage operation targeting US organizations (VentureBeat)
Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation (Cybereason Nocturnus) 
Operation CuckooBees: Deep-Dive into Stealthy Winnti Techniques (Cybereason) 
Chinese hackers cast wide net for trade secrets in US, Europe and Asia, researchers say (CNN) 
Researchers tie ransomware families to North Korean cyber-army (The Record by Recorded Future)
The Hermit Kingdom’s Ransomware Play (Trellix)
New espionage group is targeting corporate M&amp;A (TechCrunch) 
Cyberespionage Group Targeting M&amp;A, Corporate Transactions Personnel (SecurityWeek) 
UNC3524: Eye Spy on Your Email (Mandiant) 
Yokogawa CENTUM and ProSafe-RS (CISA) 
Cops ignored call to nearby robbery, preferring to hunt Pokémon (Graham Cluley)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 04 May 2022 20:45:00 -0000</pubDate>
      <itunes:title>More malware deployed in Eastern Europe. Cozy Bear is typosquatting. CuckooBees swarm around intellectual property. Tracking the DPRK’s hackers. Quiet persistence in corporate networks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1571</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An upswing in malware deployed against targets in Eastern Europe. Cozy Bear is typosquatting. CuckooBees swarm around intellectual property. Tracking the DPRK’s hackers. Quiet persistence in corporate networks. CISA issues an ICS advisory. Caleb Barlow on backup communications for your business during this period of "shields up." Duncan Jones from Cambridge Quantum sits down with Dave to discuss the NIST algorithm finalist Rainbow vulnerability. And, hey, officer, honest, it was just a Squirtle….

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/86

Selected reading.
Update on cyber activity in Eastern Europe (Google) 
Multiple government hacking groups stay busy targeting Ukraine and the region, Google researchers say (CyberScoop)
Google: Nation-state phishing campaigns expanding to target Eastern Europe orgs (The Record by Recorded Future)
SolarWinds hackers set up phony media outlets to trick targets (CyberScoop) 
SOLARDEFLECTION C2 Infrastructure Used by NOBELIUM in Company Brand Misuse (Recorded Future) 
Experts discover a Chinese-APT cyber espionage operation targeting US organizations (VentureBeat)
Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation (Cybereason Nocturnus) 
Operation CuckooBees: Deep-Dive into Stealthy Winnti Techniques (Cybereason) 
Chinese hackers cast wide net for trade secrets in US, Europe and Asia, researchers say (CNN) 
Researchers tie ransomware families to North Korean cyber-army (The Record by Recorded Future)
The Hermit Kingdom’s Ransomware Play (Trellix)
New espionage group is targeting corporate M&amp;A (TechCrunch) 
Cyberespionage Group Targeting M&amp;A, Corporate Transactions Personnel (SecurityWeek) 
UNC3524: Eye Spy on Your Email (Mandiant) 
Yokogawa CENTUM and ProSafe-RS (CISA) 
Cops ignored call to nearby robbery, preferring to hunt Pokémon (Graham Cluley)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An upswing in malware deployed against targets in Eastern Europe. Cozy Bear is typosquatting. CuckooBees swarm around intellectual property. Tracking the DPRK’s hackers. Quiet persistence in corporate networks. CISA issues an ICS advisory. Caleb Barlow on backup communications for your business during this period of "shields up." Duncan Jones from Cambridge Quantum sits down with Dave to discuss the NIST algorithm finalist Rainbow vulnerability. And, hey, officer, honest, it was just a Squirtle….</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/86</p><p><br></p><h2>Selected reading.</h2><p><a href="https://blog.google/threat-analysis-group/update-on-cyber-activity-in-eastern-europe/">Update on cyber activity in Eastern Europe</a> (Google) </p><p><a href="https://www.cyberscoop.com/google-threat-analysis-group-russia-ukraine-china-belarus-hacking/">Multiple government hacking groups stay busy targeting Ukraine and the region, Google researchers say</a> (CyberScoop)</p><p><a href="https://therecord.media/google-nation-state-phishing-campaigns-expanding-to-target-eastern-europe-orgs/?utm_campaign=cyber-daily&amp;utm_medium=email&amp;_hsmi=211997899&amp;_hsenc=p2ANqtz-8vXciTFop47B8rfakUgYPWcURLwk1hJjMN1FNyMeda7NRW3wSuhBf0l2b0mw2zUFtW852fA_p170kBLu37PPeyjDfnsQ&amp;utm_content=211997899&amp;utm_source=hs_email">Google: Nation-state phishing campaigns expanding to target Eastern Europe orgs</a> (The Record by Recorded Future)</p><p><a href="https://www.cyberscoop.com/solarwinds-recorded-future-nobelium-apt29/">SolarWinds hackers set up phony media outlets to trick targets</a> (CyberScoop) </p><p><a href="https://www.recordedfuture.com/solardeflection-c2-infrastructure-used-by-nobelium-in-company-brand-misuse/">SOLARDEFLECTION C2 Infrastructure Used by NOBELIUM in Company Brand Misuse</a> (Recorded Future) </p><p><a href="https://venturebeat.com/2022/05/03/experts-discover-chinese-cyber-espionage-operation/">Experts discover a Chinese-APT cyber espionage operation targeting US organizations</a> (VentureBeat)</p><p><a href="https://www.cybereason.com/blog/operation-cuckoobees-cybereason-uncovers-massive-chinese-intellectual-property-theft-operation">Operation CuckooBees: Cybereason Uncovers Massive Chinese Intellectual Property Theft Operation</a> (Cybereason Nocturnus) </p><p><a href="https://www.cybereason.com/blog/operation-cuckoobees-deep-dive-into-stealthy-winnti-techniques">Operation CuckooBees: Deep-Dive into Stealthy Winnti Techniques</a> (Cybereason) </p><p><a href="https://www.cnn.com/2022/05/04/politics/china-hackers-economic-espionage-manufacturing/index.html">Chinese hackers cast wide net for trade secrets in US, Europe and Asia, researchers say</a> (CNN) </p><p><a href="https://therecord.media/researchers-tie-ransomware-families-to-north-korean-cyber-army/">Researchers tie ransomware families to North Korean cyber-army</a> (The Record by Recorded Future)</p><p><a href="https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/the-hermit-kingdoms-ransomware-play.html">The Hermit Kingdom’s Ransomware Play</a> (Trellix)</p><p><a href="https://techcrunch.com/2022/05/03/mandiant-espionage-group-mergers-acquisitions/">New espionage group is targeting corporate M&amp;A</a> (TechCrunch) </p><p><a href="https://www.securityweek.com/cyberespionage-group-targeting-ma-corporate-transactions-personnel">Cyberespionage Group Targeting M&amp;A, Corporate Transactions Personnel</a> (SecurityWeek) </p><p><a href="https://www.mandiant.com/resources/unc3524-eye-spy-email">UNC3524: Eye Spy on Your Email</a> (Mandiant) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-123-01">Yokogawa CENTUM and ProSafe-RS</a> (CISA) </p><p><a href="https://grahamcluley.com/cops-ignored-call-to-nearby-robbery-preferring-to-hunt-pokemon/">Cops ignored call to nearby robbery, preferring to hunt Pokémon</a> (Graham Cluley)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1664</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b3c11b96-7881-11ec-90a9-cf5ce32e7c9d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2490074977.mp3?updated=1690310059" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hybrid war and disinfo from the swamp. Stormous hacks on behalf of Russia. DNS poisoning risk. Updates on Chinese cyberespionage campaigns. Notes on ransomware operations.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1570/notes</link>
      <description>Russia reroutes Internet traffic in occupied regions of Ukraine through Russian services. The Stormous gang, hacking on behalf of Russia. DNS poisoning risk. Updates on Chinese cyberespionage campaigns. Our guest Chetan Mathur of Next Pathway finds similarities between the cloud industry and the 1849 California Gold Rush. Eldan Ben-Haim of Apiiro on why cybersecurity is largely a culture issue. Notes on ransomware operations.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/85

Selected reading.
Microsoft sees Russian cyberattacks on Ukraine 'getting more and more disruptive' (Inside Defense) 
Sergey Lavrov claims Hitler had 'Jewish blood' (The Telegraph)
Lavrov’s anti-Semitic outburst exposes absurdity of Russia’s “Nazi Ukraine” claims (Atlantic Council) 
Russia likens Zelensky to Hitler as Mariupol says Russia worse than Nazis (Newsweek) 
Russia reroutes internet in occupied Ukrainian territory through Russian telcos (The Record by Recorded Future) 
Stormous: The Pro-Russian, Clout Hungry Ransomware Gang Targets the US and Ukraine (Trustwave)
Zhadnost ‘stamps’ out Ukrainian National Postal Service’s website. (SecurityScorecard) 
Industrial cybersecurity researchers, looking for help, go public with unpatched IoT bug (The Record by Recorded Future) 
Nozomi Networks Discovers Unpatched DNS Bug in Popular C Standard Library Putting IoT at Risk (Nozomi Networks)
Chinese "Override Panda" Hackers Resurface With New Espionage Attacks (The Hacker News) 
Chinese Hackers Caught Exploiting Popular Antivirus Products to Target Telecom Sector (The Hacker News) 
New Black Basta Ransomware Possibly Linked to Conti Group (SecurityWeek) 
Experts Analyze Conti and Hive Ransomware Gangs' Chats With Their Victims (The Hacker News) 
Conti and Hive ransomware operations: What we learned from these groups' victim chats (Cisco Talos) 
Conti and Hive ransomware operations: (Cisco Talos)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 May 2022 20:15:00 -0000</pubDate>
      <itunes:title>Hybrid war and disinfo from the swamp. Stormous hacks on behalf of Russia. DNS poisoning risk. Updates on Chinese cyberespionage campaigns. Notes on ransomware operations.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1570</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Russia reroutes Internet traffic in occupied regions of Ukraine through Russian services. The Stormous gang, hacking on behalf of Russia. DNS poisoning risk. Updates on Chinese cyberespionage campaigns. Our guest Chetan Mathur of Next Pathway finds similarities between the cloud industry and the 1849 California Gold Rush. Eldan Ben-Haim of Apiiro on why cybersecurity is largely a culture issue. Notes on ransomware operations.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/85

Selected reading.
Microsoft sees Russian cyberattacks on Ukraine 'getting more and more disruptive' (Inside Defense) 
Sergey Lavrov claims Hitler had 'Jewish blood' (The Telegraph)
Lavrov’s anti-Semitic outburst exposes absurdity of Russia’s “Nazi Ukraine” claims (Atlantic Council) 
Russia likens Zelensky to Hitler as Mariupol says Russia worse than Nazis (Newsweek) 
Russia reroutes internet in occupied Ukrainian territory through Russian telcos (The Record by Recorded Future) 
Stormous: The Pro-Russian, Clout Hungry Ransomware Gang Targets the US and Ukraine (Trustwave)
Zhadnost ‘stamps’ out Ukrainian National Postal Service’s website. (SecurityScorecard) 
Industrial cybersecurity researchers, looking for help, go public with unpatched IoT bug (The Record by Recorded Future) 
Nozomi Networks Discovers Unpatched DNS Bug in Popular C Standard Library Putting IoT at Risk (Nozomi Networks)
Chinese "Override Panda" Hackers Resurface With New Espionage Attacks (The Hacker News) 
Chinese Hackers Caught Exploiting Popular Antivirus Products to Target Telecom Sector (The Hacker News) 
New Black Basta Ransomware Possibly Linked to Conti Group (SecurityWeek) 
Experts Analyze Conti and Hive Ransomware Gangs' Chats With Their Victims (The Hacker News) 
Conti and Hive ransomware operations: What we learned from these groups' victim chats (Cisco Talos) 
Conti and Hive ransomware operations: (Cisco Talos)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russia reroutes Internet traffic in occupied regions of Ukraine through Russian services. The Stormous gang, hacking on behalf of Russia. DNS poisoning risk. Updates on Chinese cyberespionage campaigns. Our guest Chetan Mathur of Next Pathway finds similarities between the cloud industry and the 1849 California Gold Rush. Eldan Ben-Haim of Apiiro on why cybersecurity is largely a culture issue. Notes on ransomware operations.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/85</p><p><br></p><h2>Selected reading.</h2><p><a href="https://insidedefense.com/insider/microsoft-sees-russian-cyberattacks-ukraine-getting-more-and-more-disruptive">Microsoft sees Russian cyberattacks on Ukraine 'getting more and more disruptive'</a> (Inside Defense) </p><p><a href="https://www.telegraph.co.uk/world-news/2022/05/02/sergey-lavrov-claims-hitler-had-jewish-blood-zelensky-nazi/">Sergey Lavrov claims Hitler had 'Jewish blood'</a> (The Telegraph)</p><p><a href="https://www.atlanticcouncil.org/blogs/ukrainealert/lavrovs-anti-semitic-outburst-exposes-absurdity-of-russias-nazi-ukraine-claims/">Lavrov’s anti-Semitic outburst exposes absurdity of Russia’s “Nazi Ukraine” claims</a> (Atlantic Council) </p><p><a href="https://www.newsweek.com/russia-likens-zelensky-hitler-mariupol-says-russia-worse-nazis-1702538">Russia likens Zelensky to Hitler as Mariupol says Russia worse than Nazis</a> (Newsweek) </p><p><a href="https://therecord.media/ukraine-internet-blackout-kherson-skynet-russia/">Russia reroutes internet in occupied Ukrainian territory through Russian telcos</a> (The Record by Recorded Future) </p><p><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/stormous-the-pro-russian-clout-hungry-ransomware-gang-targets-the-us-and-ukraine/">Stormous: The Pro-Russian, Clout Hungry Ransomware Gang Targets the US and Ukraine</a> (Trustwave)</p><p><a href="https://securityscorecard.com/blog/zhadnost-stamps-out-ukrainian-national-postal-services-website">Zhadnost ‘stamps’ out Ukrainian National Postal Service’s website.</a> (SecurityScorecard) </p><p><a href="https://therecord.media/iot-vulnerability-ics-nozomi-networks-uclibc-ng/">Industrial cybersecurity researchers, looking for help, go public with unpatched IoT bug</a> (The Record by Recorded Future) </p><p><a href="https://www.nozominetworks.com/blog/nozomi-networks-discovers-unpatched-dns-bug-in-popular-c-standard-library-putting-iot-at-risk/">Nozomi Networks Discovers Unpatched DNS Bug in Popular C Standard Library Putting IoT at Risk</a> (Nozomi Networks)</p><p><a href="https://thehackernews.com/2022/05/chinese-override-panda-hackers.html">Chinese "Override Panda" Hackers Resurface With New Espionage Attacks</a> (The Hacker News) </p><p><a href="https://thehackernews.com/2022/05/chinese-hackers-caught-exploiting.html">Chinese Hackers Caught Exploiting Popular Antivirus Products to Target Telecom Sector</a> (The Hacker News) </p><p><a href="https://www.securityweek.com/new-black-basta-ransomware-possibly-linked-conti-group">New Black Basta Ransomware Possibly Linked to Conti Group</a> (SecurityWeek) </p><p><a href="https://thehackernews.com/2022/05/experts-analyze-conti-and-hive.html">Experts Analyze Conti and Hive Ransomware Gangs' Chats With Their Victims</a> (The Hacker News) </p><p><a href="https://blog.talosintelligence.com/2022/05/conti-and-hive-ransomware-operations.html">Conti and Hive ransomware operations: What we learned from these groups' victim chats</a> (Cisco Talos) </p><p><a href="https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/787/original/ransomware-chats.pdf?1651576098">Conti and Hive ransomware operations:</a> (Cisco Talos)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1388</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b3a1d682-7881-11ec-90a9-ff3d144fba6f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3350918898.mp3?updated=1690310033" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The future of security validation – what next? [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/30/notes</link>
      <description>Security executives need visibility into their real cyber risk in real time. But with the flood of vulnerability alerts, how can organizations pinpoint impactful security gaps? To meet this challenge, security teams are shifting to an exploit-centric approach to security validation to expose potential threats from ransomware, leaked credentials, phishing, &amp; more. 
On this episode, of CyberWire-X, we explore how automation can help teams make this shift to prioritize remediation based on bottom line business impact. Rick Howard, the CyberWire's CSO, Chief Analyst and Senior Fellow, discusses the topic with Rick Doten, CISO, Carolina Complete Health and CyberWire Hash Table member, while Dave Bittner, CyberWire podcast host, engages with Sponsor Pentera's Jay Mar-Tang, Sales Engineering Manager for the Americas, about automated security validation.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 May 2022 14:00:00 -0000</pubDate>
      <itunes:title>The future of security validation – what next? [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>30</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Security executives need visibility into their real cyber risk in real time. But with the flood of vulnerability alerts, how can organizations pinpoint impactful security gaps? To meet this challenge, security teams are shifting to an exploit-centric approach to security validation to expose potential threats from ransomware, leaked credentials, phishing, &amp; more. 
On this episode, of CyberWire-X, we explore how automation can help teams make this shift to prioritize remediation based on bottom line business impact. Rick Howard, the CyberWire's CSO, Chief Analyst and Senior Fellow, discusses the topic with Rick Doten, CISO, Carolina Complete Health and CyberWire Hash Table member, while Dave Bittner, CyberWire podcast host, engages with Sponsor Pentera's Jay Mar-Tang, Sales Engineering Manager for the Americas, about automated security validation.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Security executives need visibility into their real cyber risk in real time. But with the flood of vulnerability alerts, how can organizations pinpoint impactful security gaps? To meet this challenge, security teams are shifting to an exploit-centric approach to security validation to expose potential threats from ransomware, leaked credentials, phishing, &amp; more. </p><p>On this episode, of CyberWire-X, we explore how automation can help teams make this shift to prioritize remediation based on bottom line business impact. Rick Howard, the CyberWire's CSO, Chief Analyst and Senior Fellow, discusses the topic with Rick Doten, CISO, Carolina Complete Health and CyberWire Hash Table member, while Dave Bittner, CyberWire podcast host, engages with Sponsor Pentera's Jay Mar-Tang, Sales Engineering Manager for the Americas, about automated security validation.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1667</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7d0f5db2-caeb-11ec-809f-938c6621a4be]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5976104701.mp3?updated=1651588670" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber sabotage and cyberespionage. Updates on Russia’s hybrid war against Ukraine. REvil seems to have returned.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1569/notes</link>
      <description>Cable sabotage in France remains under investigation. Spearphishing by Cozy Bear. Widespread and damaging Russian cyberattacks have yet to appear, but criminals find a new field of activity. Hacktivism and privateering. The legal and prudential limits to hacktivism. Applying lessons learned from an earlier cyberwar. Romanian authorities say last week’s DDoS incident was retaliation for Bucharest’s support of Kyiv. Rick Howard is dropping some SBOMS. Carole Theriault reports on virtual kidnappings. REvil seems to be back after all.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/84

Selected reading.
How the French fiber optic cable attacks accentuate critical infrastructure vulnerabilities (CyberScoop) 
Russian hackers compromise embassy emails to target governments (BleepingComputer) 
Ukraine's defense applies lessons from a 15-year-old cyberattack on Estonia (NPR) 
Feared Russian cyberattacks against US have yet to materialize (C4ISRNet)
Hacking Russia was off-limits. The Ukraine war made it a free-for-all. (Washington Post) 
A YouTuber is promoting DDoS attacks on Russia — how legal is this? (BleepingComputer)
Ukraine’s Digital Fight Goes Global (Foreign Affairs)
Romanian government says websites attacked by pro-Russian group (The Record by Recorded Future) 
REvil ransomware returns: New malware sample confirms gang is back (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 02 May 2022 20:15:00 -0000</pubDate>
      <itunes:title>Cyber sabotage and cyberespionage. Updates on Russia’s hybrid war against Ukraine. REvil seems to have returned.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1569</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cable sabotage in France remains under investigation. Spearphishing by Cozy Bear. Widespread and damaging Russian cyberattacks have yet to appear, but criminals find a new field of activity. Hacktivism and privateering. The legal and prudential limits to hacktivism. Applying lessons learned from an earlier cyberwar. Romanian authorities say last week’s DDoS incident was retaliation for Bucharest’s support of Kyiv. Rick Howard is dropping some SBOMS. Carole Theriault reports on virtual kidnappings. REvil seems to be back after all.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/84

Selected reading.
How the French fiber optic cable attacks accentuate critical infrastructure vulnerabilities (CyberScoop) 
Russian hackers compromise embassy emails to target governments (BleepingComputer) 
Ukraine's defense applies lessons from a 15-year-old cyberattack on Estonia (NPR) 
Feared Russian cyberattacks against US have yet to materialize (C4ISRNet)
Hacking Russia was off-limits. The Ukraine war made it a free-for-all. (Washington Post) 
A YouTuber is promoting DDoS attacks on Russia — how legal is this? (BleepingComputer)
Ukraine’s Digital Fight Goes Global (Foreign Affairs)
Romanian government says websites attacked by pro-Russian group (The Record by Recorded Future) 
REvil ransomware returns: New malware sample confirms gang is back (BleepingComputer)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cable sabotage in France remains under investigation. Spearphishing by Cozy Bear. Widespread and damaging Russian cyberattacks have yet to appear, but criminals find a new field of activity. Hacktivism and privateering. The legal and prudential limits to hacktivism. Applying lessons learned from an earlier cyberwar. Romanian authorities say last week’s DDoS incident was retaliation for Bucharest’s support of Kyiv. Rick Howard is dropping some SBOMS. Carole Theriault reports on virtual kidnappings. REvil seems to be back after all.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/84</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cyberscoop.com/french-fiber-optic-cables-attack-critical-infrastructure/">How the French fiber optic cable attacks accentuate critical infrastructure vulnerabilities</a> (CyberScoop) </p><p><a href="https://www.bleepingcomputer.com/news/security/russian-hackers-compromise-embassy-emails-to-target-governments/">Russian hackers compromise embassy emails to target governments</a> (BleepingComputer) </p><p><a href="https://www.npr.org/2022/05/01/1095839379/ukraines-defense-applies-lessons-from-a-15-year-old-cyberattack-on-estonia">Ukraine's defense applies lessons from a 15-year-old cyberattack on Estonia</a> (NPR) </p><p><a href="https://www.c4isrnet.com/cyber/2022/04/29/feared-russian-cyberattacks-against-us-have-yet-to-materialize/">Feared Russian cyberattacks against US have yet to materialize</a> (C4ISRNet)</p><p><a href="https://www.washingtonpost.com/technology/2022/05/01/russia-cyber-attacks-hacking/">Hacking Russia was off-limits. The Ukraine war made it a free-for-all.</a> (Washington Post) </p><p><a href="https://www.bleepingcomputer.com/news/security/a-youtuber-is-promoting-ddos-attacks-on-russia-how-legal-is-this/">A YouTuber is promoting DDoS attacks on Russia — how legal is this?</a> (BleepingComputer)</p><p><a href="https://www.foreignaffairs.com/articles/ukraine/2022-05-02/ukraines-digital-fight-goes-global?">Ukraine’s Digital Fight Goes Global</a> (Foreign Affairs)</p><p><a href="https://therecord.media/romanian-government-says-websites-attacked-by-pro-russian-group/">Romanian government says websites attacked by pro-Russian group</a> (The Record by Recorded Future) </p><p><a href="https://www.bleepingcomputer.com/news/security/revil-ransomware-returns-new-malware-sample-confirms-gang-is-back/">REvil ransomware returns: New malware sample confirms gang is back</a> (BleepingComputer)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1459</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b27c4404-7881-11ec-90a9-db2b98e75785]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3166803376.mp3?updated=1690310018" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DevSecOps and securing the container. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/29/notes</link>
      <description>The move to cloud has great potential to improve security, but the required process and cultural changes can be daunting. There are a vast number of critical vulnerabilities that make it to production and demand more effective mitigations. Although “shifting security left” should help, organizations are not able to achieve this quickly enough, and “shifting left” does not account for runtime threats. Organizations must strive to improve the prioritization of vulnerabilities to ensure the most dangerous flaws are fixed early. But even then, some risk will be accepted, and a threat detection and response program is required for full security coverage.
On this episode of CyberWire-X, host Rick Howard, the CyberWire's CSO, Chief Analyst and Senior Fellow, explores how to secure your software development lifecycle, how to use a maturity model like BSIM, where do containers fit in that process, and the Sysdig 2022 Cloud-Native Security and Usage report. Joining Rick on this episode are Tom Quinn, CISO at T. Rowe Price and CyberWire Hash Table member, and from episode sponsor Sysdig is their Director of Thought Leadership, Anna Belak, to discuss their experiences and real world data, as well as practical approaches to managing cloud risk. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 01 May 2022 07:00:00 -0000</pubDate>
      <itunes:title>DevSecOps and securing the container. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>29</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The move to cloud has great potential to improve security, but the required process and cultural changes can be daunting. There are a vast number of critical vulnerabilities that make it to production and demand more effective mitigations. Although “shifting security left” should help, organizations are not able to achieve this quickly enough, and “shifting left” does not account for runtime threats. Organizations must strive to improve the prioritization of vulnerabilities to ensure the most dangerous flaws are fixed early. But even then, some risk will be accepted, and a threat detection and response program is required for full security coverage.
On this episode of CyberWire-X, host Rick Howard, the CyberWire's CSO, Chief Analyst and Senior Fellow, explores how to secure your software development lifecycle, how to use a maturity model like BSIM, where do containers fit in that process, and the Sysdig 2022 Cloud-Native Security and Usage report. Joining Rick on this episode are Tom Quinn, CISO at T. Rowe Price and CyberWire Hash Table member, and from episode sponsor Sysdig is their Director of Thought Leadership, Anna Belak, to discuss their experiences and real world data, as well as practical approaches to managing cloud risk. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The move to cloud has great potential to improve security, but the required process and cultural changes can be daunting. There are a vast number of critical vulnerabilities that make it to production and demand more effective mitigations. Although “shifting security left” should help, organizations are not able to achieve this quickly enough, and “shifting left” does not account for runtime threats. Organizations must strive to improve the prioritization of vulnerabilities to ensure the most dangerous flaws are fixed early. But even then, some risk will be accepted, and a threat detection and response program is required for full security coverage.</p><p>On this episode of CyberWire-X, host Rick Howard, the CyberWire's CSO, Chief Analyst and Senior Fellow, explores how to secure your software development lifecycle, how to use a maturity model like BSIM, where do containers fit in that process, and the Sysdig 2022 Cloud-Native Security and Usage report. Joining Rick on this episode are Tom Quinn, CISO at T. Rowe Price and CyberWire Hash Table member, and from episode sponsor Sysdig is their Director of Thought Leadership, Anna Belak, to discuss their experiences and real world data, as well as practical approaches to managing cloud risk. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1853</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bfff5f0e-c73b-11ec-9cfc-c7315fb8f44c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6496774365.mp3?updated=1651008185" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jon DiMaggio: Two roads diverged. [Strategy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/98/notes</link>
      <description>Chief security strategist from Analyst1, Jon DiMaggio shares his story on how he grew to become apart of the cybersecurity world. He describes different jobs that paved the way to the knowledge he has one the industry right now, and he even shares about an experience that led him to path that split and which decision he would make, would be crucial in his career. He explains which way he ended up going and how a critical part of his career helped to determine that path. He say's "there's two paths when you have that happen, you can either let it defeat you, or you know, you come back swinging." We thank Jon for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 01 May 2022 07:00:00 -0000</pubDate>
      <itunes:title>Jon DiMaggio: Two roads diverged. [Strategy] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>98</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Chief security strategist from Analyst1, Jon DiMaggio shares his story on how he grew to become apart of the cybersecurity world. He describes different jobs that paved the way to the knowledge he has one the industry right now, and he even shares about an experience that led him to path that split and which decision he would make, would be crucial in his career. He explains which way he ended up going and how a critical part of his career helped to determine that path. He say's "there's two paths when you have that happen, you can either let it defeat you, or you know, you come back swinging." We thank Jon for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chief security strategist from Analyst1, Jon DiMaggio shares his story on how he grew to become apart of the cybersecurity world. He describes different jobs that paved the way to the knowledge he has one the industry right now, and he even shares about an experience that led him to path that split and which decision he would make, would be crucial in his career. He explains which way he ended up going and how a critical part of his career helped to determine that path. He say's "there's two paths when you have that happen, you can either let it defeat you, or you know, you come back swinging." We thank Jon for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>454</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[af9321ca-c64e-11ec-9327-0348ba644799]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9941621056.mp3?updated=1651516306" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Attackers coming in from the Backdoor? [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/230/notes</link>
      <description>Vikram Thakur of Symantec Threat Hunter team joins Dave Bittner to discuss their work on Daxin, a new and the most advanced piece of malware researchers have seen from China-linked actors. Symantec said " There is strong evidence to suggest the malware, Backdoor.Daxin, which allows the attacker to perform various communications and data-gathering operations on the infected computer, has been used as recently as November 2021 by attackers linked to China."
They go on to explain how Daxin is used to target organizations and governments of strategic interest to China and how those agencies can protect themselves. Symantec also discusses how this is the most advanced piece of malware their researchers have seen.
The research can be found here:
Daxin: Stealthy Backdoor Designed for Attacks Against Hardened Networks

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Apr 2022 07:00:00 -0000</pubDate>
      <itunes:title>Attackers coming in from the Backdoor? [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>230</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Vikram Thakur of Symantec Threat Hunter team joins Dave Bittner to discuss their work on Daxin, a new and the most advanced piece of malware researchers have seen from China-linked actors. Symantec said " There is strong evidence to suggest the malware, Backdoor.Daxin, which allows the attacker to perform various communications and data-gathering operations on the infected computer, has been used as recently as November 2021 by attackers linked to China."
They go on to explain how Daxin is used to target organizations and governments of strategic interest to China and how those agencies can protect themselves. Symantec also discusses how this is the most advanced piece of malware their researchers have seen.
The research can be found here:
Daxin: Stealthy Backdoor Designed for Attacks Against Hardened Networks

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Vikram Thakur of Symantec Threat Hunter team joins Dave Bittner to discuss their work on Daxin, a new and the most advanced piece of malware researchers have seen from China-linked actors. Symantec said " There is strong evidence to suggest the malware, Backdoor.Daxin, which allows the attacker to perform various communications and data-gathering operations on the infected computer, has been used as recently as November 2021 by attackers linked to China."</p><p>They go on to explain how Daxin is used to target organizations and governments of strategic interest to China and how those agencies can protect themselves. Symantec also discusses how this is the most advanced piece of malware their researchers have seen.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/daxin-backdoor-espionage">Daxin: Stealthy Backdoor Designed for Attacks Against Hardened Networks</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1264</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cf299a44-c66e-11ec-b251-2f556119baa5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8893899105.mp3?updated=1685126782" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber phases of a hybrid war. DDoS in Romania. Flash loan caper hits a DeFi platform. Coca-Cola investigates Stormous claims. A Declaration for the Future of the Internet.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1568/notes</link>
      <description>Russian and Ukrainian operators exchange cyberattacks. Wiper malware: contained, but a potentially resurgent threat. #OpRussia update. DDoS in Romania. Flash loan caper hits a DeFi platform. Coca-Cola investigates Stormous breach claims. CISA issues two new ICS advisories. Caleb Barlow on cleaning up the digital exhaust of your home. Our guests are Freddy Dezeure and George Webster on reporting cyber risk to boards. A Declaration for the Future of the Internet.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/83

Selected reading.
Russian missiles bombard Kyiv during UN chief’s visit (The Telegraph) 
Zelenskiy urges ‘strong response’ after Russia strikes Kyiv during UN Ukraine visit (the Guardian) 
Anonymous hacked Russian PSCB Commercial Bank and companies in the energy sector (Security Affairs) 
Ongoing DDoS attacks from compromised sites hit Ukraine (Security Affairs) 
Ukraine’s Digital Battle With Russia Isn’t Going as Expected (Wired) 
CISA and FBI Update Advisory on Destructive Malware Targeting Organizations in Ukraine (CISA) 
Government and researchers keep US attention on Russia's cyber activity in Ukraine (The Record by Recorded Future) 
CISA Adds New Russian Malware to Cyber Advisory (Nextgov) 
An Overview of the Increasing Wiper Malware Threat (Fortinet Blog) 
Cyber Attacks Hit Romanian Government Websites (Balkan Insight) 
More than $13 million stolen from DeFi platform Deus Finance (The Record by Recorded Future) 
Coca-Cola Investigates Hacking Claim (Wall Street Journal) 
Coca-Cola investigating data breach claims by Stormous group (Computing) 
Has 'clown show' hacking gang Stormous really breached Coca-Cola? (Tech Monitor) 
Delta Electronics DIAEnergie (CISA) 
Johnson Controls Metasys (CISA) 1
A Declaration for the Future of the Internet (The White House) 
FACT SHEET: United States and 60 Global Partners Launch Declaration for the Future of the Internet (The White House) 
US joins 55 nations to set rules for internet, with eye on China and Russia (South China Morning Post)
China, India, Russia missing from future of internet pledge by US, EU, and 33 others (ZDNet) 
US, partners launch plan for 'future' of internet, as China, Russia use 'dangerous' malign practices (Fox News) 
U.S. joins 55 nations to set new global rules for the internet (Reuters)
Reporting Cyber Risk to Boards. Board Edition.
Reporting Cyber Risk to Boards. CISO Edition.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 29 Apr 2022 20:30:00 -0000</pubDate>
      <itunes:title>Cyber phases of a hybrid war. DDoS in Romania. Flash loan caper hits a DeFi platform. Coca-Cola investigates Stormous claims. A Declaration for the Future of the Internet.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1568</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Russian and Ukrainian operators exchange cyberattacks. Wiper malware: contained, but a potentially resurgent threat. #OpRussia update. DDoS in Romania. Flash loan caper hits a DeFi platform. Coca-Cola investigates Stormous breach claims. CISA issues two new ICS advisories. Caleb Barlow on cleaning up the digital exhaust of your home. Our guests are Freddy Dezeure and George Webster on reporting cyber risk to boards. A Declaration for the Future of the Internet.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/83

Selected reading.
Russian missiles bombard Kyiv during UN chief’s visit (The Telegraph) 
Zelenskiy urges ‘strong response’ after Russia strikes Kyiv during UN Ukraine visit (the Guardian) 
Anonymous hacked Russian PSCB Commercial Bank and companies in the energy sector (Security Affairs) 
Ongoing DDoS attacks from compromised sites hit Ukraine (Security Affairs) 
Ukraine’s Digital Battle With Russia Isn’t Going as Expected (Wired) 
CISA and FBI Update Advisory on Destructive Malware Targeting Organizations in Ukraine (CISA) 
Government and researchers keep US attention on Russia's cyber activity in Ukraine (The Record by Recorded Future) 
CISA Adds New Russian Malware to Cyber Advisory (Nextgov) 
An Overview of the Increasing Wiper Malware Threat (Fortinet Blog) 
Cyber Attacks Hit Romanian Government Websites (Balkan Insight) 
More than $13 million stolen from DeFi platform Deus Finance (The Record by Recorded Future) 
Coca-Cola Investigates Hacking Claim (Wall Street Journal) 
Coca-Cola investigating data breach claims by Stormous group (Computing) 
Has 'clown show' hacking gang Stormous really breached Coca-Cola? (Tech Monitor) 
Delta Electronics DIAEnergie (CISA) 
Johnson Controls Metasys (CISA) 1
A Declaration for the Future of the Internet (The White House) 
FACT SHEET: United States and 60 Global Partners Launch Declaration for the Future of the Internet (The White House) 
US joins 55 nations to set rules for internet, with eye on China and Russia (South China Morning Post)
China, India, Russia missing from future of internet pledge by US, EU, and 33 others (ZDNet) 
US, partners launch plan for 'future' of internet, as China, Russia use 'dangerous' malign practices (Fox News) 
U.S. joins 55 nations to set new global rules for the internet (Reuters)
Reporting Cyber Risk to Boards. Board Edition.
Reporting Cyber Risk to Boards. CISO Edition.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russian and Ukrainian operators exchange cyberattacks. Wiper malware: contained, but a potentially resurgent threat. #OpRussia update. DDoS in Romania. Flash loan caper hits a DeFi platform. Coca-Cola investigates Stormous breach claims. CISA issues two new ICS advisories. Caleb Barlow on cleaning up the digital exhaust of your home. Our guests are Freddy Dezeure and George Webster on reporting cyber risk to boards. A Declaration for the Future of the Internet.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/83</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.telegraph.co.uk/world-news/2022/04/29/russian-missiles-bombard-kyiv-un-chiefs-visit/">Russian missiles bombard Kyiv during UN chief’s visit</a> (The Telegraph) </p><p><a href="https://www.theguardian.com/world/2022/apr/28/russia-kyiv-cruise-missile-strike-biden-guterres">Zelenskiy urges ‘strong response’ after Russia strikes Kyiv during UN Ukraine visit</a> (the Guardian) </p><p><a href="https://securityaffairs.co/wordpress/130726/cyber-warfare-2/anonymous-hack-russian-companies.html">Anonymous hacked Russian PSCB Commercial Bank and companies in the energy sector</a> (Security Affairs) </p><p><a href="https://securityaffairs.co/wordpress/130708/hacking/ddos-attack-hit-ukraine.html">Ongoing DDoS attacks from compromised sites hit Ukraine</a> (Security Affairs) </p><p><a href="https://www.wired.com/story/ukraine-russia-digital-battle/">Ukraine’s Digital Battle With Russia Isn’t Going as Expected</a> (Wired) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/04/28/cisa-and-fbi-update-advisory-destructive-malware-targeting">CISA and FBI Update Advisory on Destructive Malware Targeting Organizations in Ukraine</a> (CISA) </p><p><a href="https://therecord.media/government-and-researchers-keep-us-attention-on-russias-cyber-activity-in-ukraine/">Government and researchers keep US attention on Russia's cyber activity in Ukraine</a> (The Record by Recorded Future) </p><p><a href="https://www.nextgov.com/cybersecurity/2022/04/cisa-adds-new-russian-malware-cyber-advisory/366268/">CISA Adds New Russian Malware to Cyber Advisory</a> (Nextgov) </p><p><a href="https://www.fortinet.com/blog/threat-research/the-increasing-wiper-malware-threat">An Overview of the Increasing Wiper Malware Threat</a> (Fortinet Blog) </p><p><a href="https://balkaninsight.com/2022/04/29/cyber-attacks-hit-romanian-government-websites/">Cyber Attacks Hit Romanian Government Websites</a> (Balkan Insight) </p><p><a href="https://therecord.media/more-than-13-million-stolen-from-defi-platform-deus-finance/">More than $13 million stolen from DeFi platform Deus Finance</a> (The Record by Recorded Future) </p><p><a href="https://www.wsj.com/articles/coca-cola-investigates-hacking-claim-11651179938">Coca-Cola Investigates Hacking Claim </a>(Wall Street Journal) </p><p><a href="https://www.computing.co.uk/news/4048864/coca-cola-investigating-breach-claims-stormous-group">Coca-Cola investigating data breach claims by Stormous group </a>(Computing) </p><p><a href="https://techmonitor.ai/technology/cybersecurity/coca-cola-hack-stormous">Has 'clown show' hacking gang Stormous really breached Coca-Cola?</a> (Tech Monitor) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-081-01">Delta Electronics DIAEnergie</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-118-01">Johnson Controls Metasys</a> (CISA) 1</p><p><a href="https://www.whitehouse.gov/wp-content/uploads/2022/04/Declaration-for-the-Future-for-the-Internet_Launch-Event-Signing-Version_FINAL.pdf">A Declaration for the Future of the Internet</a> (The White House) </p><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2022/04/28/fact-sheet-united-states-and-60-global-partners-launch-declaration-for-the-future-of-the-internet/">FACT SHEET: United States and 60 Global Partners Launch Declaration for the Future of the Internet</a> (The White House) </p><p><a href="https://www.scmp.com/news/world/united-states-canada/article/3175903/us-joins-55-nations-set-rules-future-internet-eye">US joins 55 nations to set rules for internet, with eye on China and Russia</a> (South China Morning Post)</p><p><a href="https://www.zdnet.com/article/china-india-russia-missing-from-future-of-internet-pledge-by-us-eu-and-33-others/">China, India, Russia missing from future of internet pledge by US, EU, and 33 others</a> (ZDNet) </p><p><a href="https://www.foxnews.com/politics/future-internet-plan-china-russia-dangerous-malign-practices">US, partners launch plan for 'future' of internet, as China, Russia use 'dangerous' malign practices</a> (Fox News) </p><p><a href="https://www.reuters.com/technology/us-joins-55-nations-set-new-global-rules-internet-2022-04-28/">U.S. joins 55 nations to set new global rules for the internet</a> (Reuters)</p><p><a href="https://www.researchgate.net/publication/359427984_Reporting_Cyber_Risk_to_Boards_Board_Edition">Reporting Cyber Risk to Boards. Board Edition.</a></p><p><a href="https://www.researchgate.net/publication/359338731_Reporting_Cyber_Risk_to_Boards_CISO_Edition">Reporting Cyber Risk to Boards. CISO Edition.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1506</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b0462060-7881-11ec-90a9-379afdd89b4c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7242988029.mp3?updated=1690309996" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russia and Ukraine trade cyberattacks. Chinese intelligence services look at Russian targets. Five Eyes advise on “routinely exploited vulnerabilities.” Physical sabotage as cyberattack. Name that mascot.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1567/notes</link>
      <description>Microsoft summarizes the scale of Russian cyberattacks against Ukraine. Russian cyber capabilities should be neither overestimated nor underestimated. Russia has also come under cyberattack during its hybrid war. Chinese intelligence services are paying close attention to Russian targets. The Five Eyes advise us on “routinely exploited vulnerabilities.” Physical sabotage as cyberattack. Linda Gray-Martin and Britta Glade from RSA discuss what’s new at RSAC and cybersecurity trends. Marc van Zadelhoff of Devo talks about their new podcast Cyber CEOs Decoded coming to the CyberWire network. And, hey kids, name that mascot.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/82

Selected reading.
Special Report: Ukraine (Microsoft) 
Russian Cyber Capabilities Have ‘Reached Their Full Potential,’ Ukrainian Official Says (Wall Street Journal) 
Industroyer2: Nozomi Networks Labs Analyzes the IEC 104 Payload (Nozomi Networks) 
Russia Is Being Hacked at an Unprecedented Scale (Wired)
BRONZE PRESIDENT targets Russian speakers with updated PlugX - Blog (Secureworks)
CISA, FBI, NSA, and International Partners Warn Organizations of Top Routinely Exploited Vulnerabilities (National Security Agency/Central Security Service) 
The Air Force is trusting the internet to name its ridiculous new cybersecurity mascot (Task &amp; Purpose)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 28 Apr 2022 20:15:00 -0000</pubDate>
      <itunes:title>Russia and Ukraine trade cyberattacks. Chinese intelligence services look at Russian targets. Five Eyes advise on “routinely exploited vulnerabilities.” Physical sabotage as cyberattack. Name that mascot.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1567</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Microsoft summarizes the scale of Russian cyberattacks against Ukraine. Russian cyber capabilities should be neither overestimated nor underestimated. Russia has also come under cyberattack during its hybrid war. Chinese intelligence services are paying close attention to Russian targets. The Five Eyes advise us on “routinely exploited vulnerabilities.” Physical sabotage as cyberattack. Linda Gray-Martin and Britta Glade from RSA discuss what’s new at RSAC and cybersecurity trends. Marc van Zadelhoff of Devo talks about their new podcast Cyber CEOs Decoded coming to the CyberWire network. And, hey kids, name that mascot.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/82

Selected reading.
Special Report: Ukraine (Microsoft) 
Russian Cyber Capabilities Have ‘Reached Their Full Potential,’ Ukrainian Official Says (Wall Street Journal) 
Industroyer2: Nozomi Networks Labs Analyzes the IEC 104 Payload (Nozomi Networks) 
Russia Is Being Hacked at an Unprecedented Scale (Wired)
BRONZE PRESIDENT targets Russian speakers with updated PlugX - Blog (Secureworks)
CISA, FBI, NSA, and International Partners Warn Organizations of Top Routinely Exploited Vulnerabilities (National Security Agency/Central Security Service) 
The Air Force is trusting the internet to name its ridiculous new cybersecurity mascot (Task &amp; Purpose)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft summarizes the scale of Russian cyberattacks against Ukraine. Russian cyber capabilities should be neither overestimated nor underestimated. Russia has also come under cyberattack during its hybrid war. Chinese intelligence services are paying close attention to Russian targets. The Five Eyes advise us on “routinely exploited vulnerabilities.” Physical sabotage as cyberattack. Linda Gray-Martin and Britta Glade from RSA discuss what’s new at RSAC and cybersecurity trends. Marc van Zadelhoff of Devo talks about their new podcast Cyber CEOs Decoded coming to the CyberWire network. And, hey kids, name that mascot.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/82</p><p><br></p><h2>Selected reading.</h2><p><a href="https://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE4Vwwd">Special Report: Ukraine</a> (Microsoft) </p><p><a href="https://www.wsj.com/livecoverage/russia-ukraine-latest-news-2022-04-27/card/russian-cyber-capabilities-have-reached-their-full-potential-ukrainian-official-says-QyH0VEv08BLEI9iPmdlM">Russian Cyber Capabilities Have ‘Reached Their Full Potential,’ Ukrainian Official Says</a> (Wall Street Journal) </p><p><a href="https://www.nozominetworks.com/blog/industroyer2-nozomi-networks-labs-analyzes-the-iec-104-payload/">Industroyer2: Nozomi Networks Labs Analyzes the IEC 104 Payload</a> (Nozomi Networks) </p><p><a href="https://www.wired.com/story/russia-hacked-attacks/">Russia Is Being Hacked at an Unprecedented Scale</a> (Wired)</p><p><a href="https://www.secureworks.com/blog/bronze-president-targets-russian-speakers-with-updated-plugx">BRONZE PRESIDENT targets Russian speakers with updated PlugX - Blog</a> (Secureworks)</p><p><a href="https://www.nsa.gov/Press-Room/Press-Releases-Statements/Press-Release-View/Article/3011622/cisa-fbi-nsa-and-international-partners-warn-organizations-of-top-routinely-exp/">CISA, FBI, NSA, and International Partners Warn Organizations of Top Routinely Exploited Vulnerabilities</a> (National Security Agency/Central Security Service) </p><p><a href="https://taskandpurpose.com/news/air-force-cybersecurity-mascot-name/">The Air Force is trusting the internet to name its ridiculous new cybersecurity mascot</a> (Task &amp; Purpose)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1406</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b066fe3e-7881-11ec-90a9-a3c2fc20cb53]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2324478051.mp3?updated=1690309981" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russian privateering continues. Stonefly is straight out of Pyongyang, and the Lazarus Group has never really left. Foggy Bottom seeks (Russian) snitches.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1566/notes</link>
      <description>Heard on the Baltimore waterfront. Privateering against Western brands. An update on sanctions and counter sanctions. Stonefly, straight outta Pyongyang. Lazarus is also back (and not in the good way). Richard Hummel from NETSCOUT discusses their bi-annual Threat Intel Report. Jon DiMaggio from Analyst1 joins us to discuss his new book, “The Art of Cyberwarfare - An Investigator’s Guide to Espionage, Ransomware, and Organized Cybercrime.” And the US Department of State has added six Russian GRU officers to its Rewards for Justice program.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/81

Selected reading.
Britain says Ukraine controls majority of its airspace (Reuters) 
Latest strikes on Russia hint daring Ukraine is not intimidated by the Kremlin (The Telegraph) 
West gearing up to help Ukraine for ‘long haul’, says US defence secretary (the Guardian) 
U.S., allies promise to keep backing Ukraine in its war with Russia (Washington Post) 
Russia-linked hackers claim to have breached Coca-Cola Company (CyberNews)
Stormous ransomware gang claims to have hacked Coca-Cola (Security Affairs) 
Chinese drone-maker DJI quits Russia and Ukraine (Register) 
Russia to Cut Gas to Poland and Bulgaria, Making Energy a Weapon (Bloomberg) 
Russia cuts off gas to Poland, Bulgaria, stoking tensions with E.U. over Ukraine (Washington Post) 
Why Russia’s Economy Is Holding On (Foreign Policy) 
Stonefly: North Korea-linked Spying Operation Continues to Hit High-value Targets (Symantec)
A "Naver"-ending game of Lazarus APT (Zscaler)
U.S. offers $10 mln reward for information on Russian intelligence officers -State Dept (Reuters)
US offering $10 million for info on Russian military hackers accused of NotPetya attacks (The Record by Recorded Future) 
Rewards for Justice – Reward Offer for Information on Russian Military Intelligence Officers Conducting Malicious Activity Against U.S. Critical Infrastructure - United States Department of State (United States Department of State)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 27 Apr 2022 20:55:09 -0000</pubDate>
      <itunes:title>Russian privateering continues. Stonefly is straight out of Pyongyang, and the Lazarus Group has never really left. Foggy Bottom seeks (Russian) snitches.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1566</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Heard on the Baltimore waterfront. Privateering against Western brands. An update on sanctions and counter sanctions. Stonefly, straight outta Pyongyang. Lazarus is also back (and not in the good way). Richard Hummel from NETSCOUT discusses their bi-annual Threat Intel Report. Jon DiMaggio from Analyst1 joins us to discuss his new book, “The Art of Cyberwarfare - An Investigator’s Guide to Espionage, Ransomware, and Organized Cybercrime.” And the US Department of State has added six Russian GRU officers to its Rewards for Justice program.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/81

Selected reading.
Britain says Ukraine controls majority of its airspace (Reuters) 
Latest strikes on Russia hint daring Ukraine is not intimidated by the Kremlin (The Telegraph) 
West gearing up to help Ukraine for ‘long haul’, says US defence secretary (the Guardian) 
U.S., allies promise to keep backing Ukraine in its war with Russia (Washington Post) 
Russia-linked hackers claim to have breached Coca-Cola Company (CyberNews)
Stormous ransomware gang claims to have hacked Coca-Cola (Security Affairs) 
Chinese drone-maker DJI quits Russia and Ukraine (Register) 
Russia to Cut Gas to Poland and Bulgaria, Making Energy a Weapon (Bloomberg) 
Russia cuts off gas to Poland, Bulgaria, stoking tensions with E.U. over Ukraine (Washington Post) 
Why Russia’s Economy Is Holding On (Foreign Policy) 
Stonefly: North Korea-linked Spying Operation Continues to Hit High-value Targets (Symantec)
A "Naver"-ending game of Lazarus APT (Zscaler)
U.S. offers $10 mln reward for information on Russian intelligence officers -State Dept (Reuters)
US offering $10 million for info on Russian military hackers accused of NotPetya attacks (The Record by Recorded Future) 
Rewards for Justice – Reward Offer for Information on Russian Military Intelligence Officers Conducting Malicious Activity Against U.S. Critical Infrastructure - United States Department of State (United States Department of State)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Heard on the Baltimore waterfront. Privateering against Western brands. An update on sanctions and counter sanctions. Stonefly, straight outta Pyongyang. Lazarus is also back (and not in the good way). Richard Hummel from NETSCOUT discusses their bi-annual Threat Intel Report. Jon DiMaggio from Analyst1 joins us to discuss his new book, “The Art of Cyberwarfare - An Investigator’s Guide to Espionage, Ransomware, and Organized Cybercrime.” And the US Department of State has added six Russian GRU officers to its Rewards for Justice program.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/81</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.reuters.com/world/europe/britain-says-ukraine-controls-majority-its-airspace-2022-04-27/">Britain says Ukraine controls majority of its airspace</a> (Reuters) </p><p><a href="https://www.telegraph.co.uk/world-news/2022/04/25/latest-strikes-russia-hint-daring-ukraine-not-intimated-kremlin/">Latest strikes on Russia hint daring Ukraine is not intimidated by the Kremlin</a> (The Telegraph) </p><p><a href="https://www.theguardian.com/world/2022/apr/26/west-gearing-up-to-help-ukraine-for-long-haul-says-us-defence-secretary">West gearing up to help Ukraine for ‘long haul’, says US defence secretary</a> (the Guardian) </p><p><a href="https://www.washingtonpost.com/national-security/2022/04/26/us-ukraine-allies-weapons/">U.S., allies promise to keep backing Ukraine in its war with Russia</a> (Washington Post) </p><p><a href="https://cybernews.com/cyber-war/russia-linked-hackers-claim-to-have-breached-coca-cola-company/">Russia-linked hackers claim to have breached Coca-Cola Company</a> (CyberNews)</p><p><a href="https://securityaffairs.co/wordpress/130614/cyber-crime/stormous-ransomware-hit-coca-cola.html">Stormous ransomware gang claims to have hacked Coca-Cola</a> (Security Affairs) </p><p><a href="https://www.theregister.com/2022/04/27/dji_suspends_russia_and_ukraine/">Chinese drone-maker DJI quits Russia and Ukraine</a> (Register) </p><p><a href="https://www.bloomberg.com/news/articles/2022-04-26/russia-halted-gas-supplies-to-poland-onet-pl-reports-l2gapmmd">Russia to Cut Gas to Poland and Bulgaria, Making Energy a Weapon</a> (Bloomberg) </p><p><a href="https://www.washingtonpost.com/world/2022/04/26/russia-cuts-gas-bulgaria-poland-gazprom/?">Russia cuts off gas to Poland, Bulgaria, stoking tensions with E.U. over Ukraine</a> (Washington Post) </p><p><a href="https://foreignpolicy.com/2022/04/22/russia-war-economy-sanctions-ruble/">Why Russia’s Economy Is Holding On</a> (Foreign Policy) </p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/stonefly-north-korea-espionage">Stonefly: North Korea-linked Spying Operation Continues to Hit High-value Targets</a> (Symantec)</p><p><a href="https://www.zscaler.com/blogs/security-research/naver-ending-game-lazarus-apt">A "Naver"-ending game of Lazarus APT</a> (Zscaler)</p><p><a href="https://www.reuters.com/world/us-offers-10-mln-reward-information-russian-intelligence-officers-state-dept-2022-04-26/">U.S. offers $10 mln reward for information on Russian intelligence officers -State Dept</a> (Reuters)</p><p><a href="https://therecord.media/notpetya-reward-state-department-10-million-gru-sandworm/">US offering $10 million for info on Russian military hackers accused of NotPetya attacks</a> (The Record by Recorded Future) </p><p><a href="https://www.state.gov/rewards-for-justice-reward-offer-for-information-on-russian-military-intelligence-officers-conducting-malicious-activity-against-u-s-critical-infrastructure/">Rewards for Justice – Reward Offer for Information on Russian Military Intelligence Officers Conducting Malicious Activity Against U.S. Critical Infrastructure - United States Department of State</a> (United States Department of State)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1317</itunes:duration>
      <guid isPermaLink="false"><![CDATA[b151317a-7881-11ec-90a9-8bdc555cf88f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7210517325.mp3?updated=1690309963" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Diplomacy and hybrid war. Heightened cyber tension as Quds Day approaches. Conti in Costa Rica. North Korean cyber operators target journalists. C2C notes.. A guilty plea in a cyberstalking case. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1565/notes</link>
      <description>Heightened cyber tension as Quds Day approaches. Costa Rican electrical utility suffers from Conti ransomware. Emotet’s operators seem to be exploring new possibilities. North Korean cyber operators target journalists who cover the DPRK. A guilty plea in a strange case of corporate-connected cyberstalking. Bel Yelin ponders the potential Twitter takeover. Mr. Security Answer Person John Pescatore addresses questions about vendors. And cybercrime, run like a business.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/80

Selected reading.
Russia’s invasion of Ukraine: List of key events from day 62 (Al Jazeera) 
Ukraine takes war behind enemy lines as Russian fuel depots set ablaze (The Telegraph) 
Russia pounds eastern Ukraine as West promises Kyiv new arms (AP NEWS) 
Finland, Sweden to begin NATO application in May, say local media reports (Reuters) 
‘Thanks, Putin’: Finnish and Swedish Lawmakers Aim for NATO Membership (Foreign Policy) 
World War Three now a 'real' danger, Russian foreign minister Sergei Lavrov warns (The Telegraph) 
Moscow cites risk of nuclear war as U.S., allies pledge heavier arms for Ukraine (Reuters) 
Russia Warns of Nuclear War Risk as Ukraine Talks Go On (Bloomberg) 
From Jordan to Japan: US invites 14 non-NATO nations to Ukraine defense summit (Breaking Defense)
State TV says Iran foiled cyberattacks on public services (AP NEWS)
State TV Says Iran Foiled Cyberattacks on Public Services (SecurityWeek)
Iranian hackers claim they’ve hit the Bank of Israel - but ‘no proof,’ cyber authority says (Haaretz)
North Korean hackers targeting journalists with novel malware (BleepingComputer)
The ink-stained trail of GOLDBACKDOOR (Stairwell)
Conti ransomware cripples systems of electricity manager in Costa Rican town (The Record by Recorded Future) 
Emotet Tests New Delivery Techniques (Proofpoint) 
Ex-eBay exec pleads guilty to harassing couple whose newsletter raised ire (Reuters)
Mastermind of Natick couple’s harassment pleads guilty (Boston Globe) 
Former eBay Executive Pleads Guilty to His Role in Cyberstalking Campaign (US Department of Justice) 
Cyberkriminelle bieten Schadsoftware kostenlos an (IT-Markt)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Apr 2022 20:30:00 -0000</pubDate>
      <itunes:title>Diplomacy and hybrid war. Heightened cyber tension as Quds Day approaches. Conti in Costa Rica. North Korean cyber operators target journalists. C2C notes.. A guilty plea in a cyberstalking case. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1565</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Heightened cyber tension as Quds Day approaches. Costa Rican electrical utility suffers from Conti ransomware. Emotet’s operators seem to be exploring new possibilities. North Korean cyber operators target journalists who cover the DPRK. A guilty plea in a strange case of corporate-connected cyberstalking. Bel Yelin ponders the potential Twitter takeover. Mr. Security Answer Person John Pescatore addresses questions about vendors. And cybercrime, run like a business.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/80

Selected reading.
Russia’s invasion of Ukraine: List of key events from day 62 (Al Jazeera) 
Ukraine takes war behind enemy lines as Russian fuel depots set ablaze (The Telegraph) 
Russia pounds eastern Ukraine as West promises Kyiv new arms (AP NEWS) 
Finland, Sweden to begin NATO application in May, say local media reports (Reuters) 
‘Thanks, Putin’: Finnish and Swedish Lawmakers Aim for NATO Membership (Foreign Policy) 
World War Three now a 'real' danger, Russian foreign minister Sergei Lavrov warns (The Telegraph) 
Moscow cites risk of nuclear war as U.S., allies pledge heavier arms for Ukraine (Reuters) 
Russia Warns of Nuclear War Risk as Ukraine Talks Go On (Bloomberg) 
From Jordan to Japan: US invites 14 non-NATO nations to Ukraine defense summit (Breaking Defense)
State TV says Iran foiled cyberattacks on public services (AP NEWS)
State TV Says Iran Foiled Cyberattacks on Public Services (SecurityWeek)
Iranian hackers claim they’ve hit the Bank of Israel - but ‘no proof,’ cyber authority says (Haaretz)
North Korean hackers targeting journalists with novel malware (BleepingComputer)
The ink-stained trail of GOLDBACKDOOR (Stairwell)
Conti ransomware cripples systems of electricity manager in Costa Rican town (The Record by Recorded Future) 
Emotet Tests New Delivery Techniques (Proofpoint) 
Ex-eBay exec pleads guilty to harassing couple whose newsletter raised ire (Reuters)
Mastermind of Natick couple’s harassment pleads guilty (Boston Globe) 
Former eBay Executive Pleads Guilty to His Role in Cyberstalking Campaign (US Department of Justice) 
Cyberkriminelle bieten Schadsoftware kostenlos an (IT-Markt)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Heightened cyber tension as Quds Day approaches. Costa Rican electrical utility suffers from Conti ransomware. Emotet’s operators seem to be exploring new possibilities. North Korean cyber operators target journalists who cover the DPRK. A guilty plea in a strange case of corporate-connected cyberstalking. Bel Yelin ponders the potential Twitter takeover. Mr. Security Answer Person John Pescatore addresses questions about vendors. And cybercrime, run like a business.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/80</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.aljazeera.com/news/2022/4/26/russia-ukraine-war-list-of-key-events-on-day-62">Russia’s invasion of Ukraine: List of key events from day 62</a> (Al Jazeera) </p><p><a href="https://www.telegraph.co.uk/world-news/2022/04/25/ukraine-takes-war-behind-enemy-lines-russian-fuel-depots-set/">Ukraine takes war behind enemy lines as Russian fuel depots set ablaze</a> (The Telegraph) </p><p><a href="https://apnews.com/article/russia-ukraine-zelenskyy-kyiv-business-nato-9198d40f605385550c02e82c6366ccca">Russia pounds eastern Ukraine as West promises Kyiv new arms</a> (AP NEWS) </p><p><a href="https://www.reuters.com/world/europe/finland-sweden-begin-nato-application-may-say-local-media-reports-2022-04-25/">Finland, Sweden to begin NATO application in May, say local media reports</a> (Reuters) </p><p><a href="https://foreignpolicy.com/2022/04/22/finland-sweden-nato-membership-russia-ukraine-war/">‘Thanks, Putin’: Finnish and Swedish Lawmakers Aim for NATO Membership</a> (Foreign Policy) </p><p><a href="https://www.telegraph.co.uk/world-news/2022/04/25/real-danger-third-world-war-mysterious-attacks-russia-says-sergei/">World War Three now a 'real' danger, Russian foreign minister Sergei Lavrov warns</a> (The Telegraph) </p><p><a href="https://www.reuters.com/business/aerospace-defense/russia-warns-serious-nuclear-war-risks-should-not-be-underestimated-2022-04-25/">Moscow cites risk of nuclear war as U.S., allies pledge heavier arms for Ukraine</a> (Reuters) </p><p><a href="https://www.bloomberg.com/news/articles/2022-04-26/russia-warns-of-real-nuclear-war-risk-as-ukraine-talks-go-on">Russia Warns of Nuclear War Risk as Ukraine Talks Go On</a> (Bloomberg) </p><p><a href="https://breakingdefense.com/2022/04/from-jordan-to-japan-us-invites-14-non-nato-nations-to-ukraine-defense-summit/">From Jordan to Japan: US invites 14 non-NATO nations to Ukraine defense summit</a> (Breaking Defense)</p><p><a href="https://apnews.com/article/technology-middle-east-iran-united-states-tehran-7dcfec360b438ca5d4bed8de2ed286c7">State TV says Iran foiled cyberattacks on public services</a> (AP NEWS)</p><p><a href="https://www.securityweek.com/state-tv-says-iran-foiled-cyberattacks-public-services">State TV Says Iran Foiled Cyberattacks on Public Services</a> (SecurityWeek)</p><p><a href="https://www.haaretz.com/israel-news/tech-news/.premium-iran-hackers-claim-they-ve-hit-the-bank-of-israel-but-no-proof-cyber-authority-1.10762379">Iranian hackers claim they’ve hit the Bank of Israel - but ‘no proof,’ cyber authority says</a> (Haaretz)</p><p><a href="https://www.bleepingcomputer.com/news/security/north-korean-hackers-targeting-journalists-with-novel-malware/">North Korean hackers targeting journalists with novel malware</a> (BleepingComputer)</p><p><a href="https://stairwell.com/wp-content/uploads/2022/04/Stairwell-threat-report-The-ink-stained-trail-of-GOLDBACKDOOR.pdf">The ink-stained trail of GOLDBACKDOOR</a> (Stairwell)</p><p><a href="https://therecord.media/conti-ransomware-cripples-systems-of-electricity-manager-in-costa-rican-town/">Conti ransomware cripples systems of electricity manager in Costa Rican town</a> (The Record by Recorded Future) </p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/emotet-tests-new-delivery-techniques">Emotet Tests New Delivery Techniques</a> (Proofpoint) </p><p><a href="https://www.reuters.com/business/retail-consumer/ex-ebay-exec-pleads-guilty-harassing-couple-whose-newsletter-raised-ire-2022-04-25/">Ex-eBay exec pleads guilty to harassing couple whose newsletter raised ire</a> (Reuters)</p><p><a href="https://www.bostonglobe.com/2022/04/25/business/mastermind-natick-couples-harassment-pleads-guilty/">Mastermind of Natick couple’s harassment pleads guilty</a> (Boston Globe) </p><p><a href="https://www.justice.gov/usao-ma/pr/former-ebay-executive-pleads-guilty-his-role-cyberstalking-campaign">Former eBay Executive Pleads Guilty to His Role in Cyberstalking Campaign</a> (US Department of Justice) </p><p><a href="https://www.it-markt.ch/cybersecurity/2022-04-25/cyberkriminelle-bieten-schadsoftware-kostenlos-an">Cyberkriminelle bieten Schadsoftware kostenlos an</a> (IT-Markt)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1634</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b1726d36-7881-11ec-90a9-bb041736eb98]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5550929292.mp3?updated=1690309876" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Swapping small attacks in cyberspace. What Lapsus$ internal chatter reveals. Costa Rica won’t pay Conti’s ransom. No farms, no future. Locked Shields wraps up.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1564/notes</link>
      <description>Anonymous counts coup with their #OpRussia campaign. Alternative energy suppliers in Europe sustain cyberattacks. What Lapsus$ internal chatter reveals. Costa Rica won’t pay Conti’s ransom. Rick Howard hits the history books. Our guest is Paul Giorgi of XM Cyber with a look at multi-cloud hopping. Locked Shields wraps up.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/79

Selected reading.
Ukraine's Postal Service DDOS'd After Printing Moskova Stamps (Gizmodo) 
Since declaring cyber war on Russia Anonymous leaked 5.8 TB of Russian data (Security Affairs)
European Wind-Energy Sector Hit in Wave of Hacks (Wall Street Journal) 
Schneider Electric says no evidence that Incontroller/Pipedream malware exploits vulnerabilities (MarketScreener) 
Aid groups helping Ukraine face both cyber and physical threats (CNN) 
Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code (KrebsOnSecurity) 
Lapsus$ hackers breached T-Mobile’s systems and stole its source code (The Verge)
Lapsus$ hackers targeted T-Mobile (TechCrunch)
FBI Warns of Targeted Cyberattacks on Food Plants Amid Heightened Coverage of Fires (NTD) 
Ransomware Attacks on Agricultural Cooperatives Potentially Timed to Critical Seasons (IC3) 
Cyberattack causes chaos in Costa Rica government systems (ABC News) 
Finland wins NATO cyber defense competition (C4ISRNet)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 25 Apr 2022 20:05:00 -0000</pubDate>
      <itunes:title>Swapping small attacks in cyberspace. What Lapsus$ internal chatter reveals. Costa Rica won’t pay Conti’s ransom. No farms, no future. Locked Shields wraps up.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1564</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Anonymous counts coup with their #OpRussia campaign. Alternative energy suppliers in Europe sustain cyberattacks. What Lapsus$ internal chatter reveals. Costa Rica won’t pay Conti’s ransom. Rick Howard hits the history books. Our guest is Paul Giorgi of XM Cyber with a look at multi-cloud hopping. Locked Shields wraps up.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/79

Selected reading.
Ukraine's Postal Service DDOS'd After Printing Moskova Stamps (Gizmodo) 
Since declaring cyber war on Russia Anonymous leaked 5.8 TB of Russian data (Security Affairs)
European Wind-Energy Sector Hit in Wave of Hacks (Wall Street Journal) 
Schneider Electric says no evidence that Incontroller/Pipedream malware exploits vulnerabilities (MarketScreener) 
Aid groups helping Ukraine face both cyber and physical threats (CNN) 
Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code (KrebsOnSecurity) 
Lapsus$ hackers breached T-Mobile’s systems and stole its source code (The Verge)
Lapsus$ hackers targeted T-Mobile (TechCrunch)
FBI Warns of Targeted Cyberattacks on Food Plants Amid Heightened Coverage of Fires (NTD) 
Ransomware Attacks on Agricultural Cooperatives Potentially Timed to Critical Seasons (IC3) 
Cyberattack causes chaos in Costa Rica government systems (ABC News) 
Finland wins NATO cyber defense competition (C4ISRNet)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Anonymous counts coup with their #OpRussia campaign. Alternative energy suppliers in Europe sustain cyberattacks. What Lapsus$ internal chatter reveals. Costa Rica won’t pay Conti’s ransom. Rick Howard hits the history books. Our guest is Paul Giorgi of XM Cyber with a look at multi-cloud hopping. Locked Shields wraps up.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/79</p><p><br></p><h2>Selected reading.</h2><p><a href="https://gizmodo.com/ukraines-post-office-cyberattack-guard-moskova-stamp-1848829405">Ukraine's Postal Service DDOS'd After Printing Moskova Stamps</a> (Gizmodo) </p><p><a href="https://securityaffairs.co/wordpress/130554/hacktivism/anonymous-leaked-5-8-tb-russian-data.html">Since declaring cyber war on Russia Anonymous leaked 5.8 TB of Russian data</a> (Security Affairs)</p><p><a href="https://www.wsj.com/articles/european-wind-energy-sector-hit-in-wave-of-hacks-11650879000?page=1&amp;mod=djemCybersecruityPro&amp;tpl=cy">European Wind-Energy Sector Hit in Wave of Hacks </a>(Wall Street Journal) </p><p><a href="https://www.marketscreener.com/quote/stock/SCHNEIDER-ELECTRIC-SE-4699/news/Schneider-Electric-says-no-evidence-that-Incontroller-Pipedream-malware-exploits-vulnerabilities-40139424/">Schneider Electric says no evidence that Incontroller/Pipedream malware exploits vulnerabilities</a> (MarketScreener) </p><p><a href="https://www.cnn.com/2022/04/23/politics/humanitarian-aid-ukraine-war-cyberattacks/index.html">Aid groups helping Ukraine face both cyber and physical threats</a> (CNN) </p><p><a href="https://krebsonsecurity.com/2022/04/leaked-chats-show-lapsus-stole-t-mobile-source-code/">Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code</a> (KrebsOnSecurity) </p><p><a href="https://www.theverge.com/2022/4/23/23038570/lapsus-hackers-target-t-mobile-source-code-multiple-breaches-cybersecurity">Lapsus$ hackers breached T-Mobile’s systems and stole its source code</a> (The Verge)</p><p><a href="https://techcrunch.com/2022/04/22/lapsus-hackers-t-mobile/">Lapsus$ hackers targeted T-Mobile</a> (TechCrunch)</p><p><a href="https://www.ntd.com/fbi-warns-of-targeted-cyberattacks-on-food-plants-amid-heightened-coverage-of-fires_770472.html">FBI Warns of Targeted Cyberattacks on Food Plants Amid Heightened Coverage of Fires</a> (NTD) </p><p><a href="https://www.ic3.gov/Media/News/2022/220420-2.pdf">Ransomware Attacks on Agricultural Cooperatives Potentially Timed to Critical Seasons</a> (IC3) </p><p><a href="https://abcnews.go.com/International/wireStory/cyber-attack-chaos-costa-rica-government-systems-84246029">Cyberattack causes chaos in Costa Rica government systems</a> (ABC News) </p><p><a href="https://www.c4isrnet.com/cyber/2022/04/22/finland-wins-nato-cyber-defense-competition/">Finland wins NATO cyber defense competition</a> (C4ISRNet)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1343</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b25adee0-7881-11ec-90a9-1bf93597e697]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7113882318.mp3?updated=1690309340" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Danielle Jablanski: Finding the path to success [Strategy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/97/notes</link>
      <description>Operational technology cybersecurity strategist from Nozomi Networks, Danielle Jablanski shares her story of building a target map to end up where she is today. She shares how she started in college and how different paths in life got her to be on the target of success where she is today. She says " you build out that kind of target of where you want to be, and understand that getting to that point might mean doing things you don't enjoy for a number of years, but figuring that out is another way to get to that target without having like a clear bullseye" She goes on to explain how this target map is helping her to create real change and ultimately makes an impact. We thank Danielle for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 24 Apr 2022 07:00:00 -0000</pubDate>
      <itunes:title>Danielle Jablanski: Finding the path to success [Strategy] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>97</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Operational technology cybersecurity strategist from Nozomi Networks, Danielle Jablanski shares her story of building a target map to end up where she is today. She shares how she started in college and how different paths in life got her to be on the target of success where she is today. She says " you build out that kind of target of where you want to be, and understand that getting to that point might mean doing things you don't enjoy for a number of years, but figuring that out is another way to get to that target without having like a clear bullseye" She goes on to explain how this target map is helping her to create real change and ultimately makes an impact. We thank Danielle for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Operational technology cybersecurity strategist from Nozomi Networks, Danielle Jablanski shares her story of building a target map to end up where she is today. She shares how she started in college and how different paths in life got her to be on the target of success where she is today. She says " you build out that kind of target of where you want to be, and understand that getting to that point might mean doing things you don't enjoy for a number of years, but figuring that out is another way to get to that target without having like a clear bullseye" She goes on to explain how this target map is helping her to create real change and ultimately makes an impact. We thank Danielle for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>456</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[de86b41c-c269-11ec-8b66-ef73a17600b9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5115838295.mp3?updated=1650562811" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BABYSHARK is swimming again! [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/229/notes</link>
      <description>John Hammond from Huntress joins Dave Bittner on this episode to discuss malware known as BABYSHARK and how it is swimming out for blood once again. Huntress's research says "This activity aligns with known tradecraft attributed to North Korean threat actors targeting national security think tanks."
Huntress also adds that the activity was spotted on February 16th and immediately their ThreatOps team began following the trail of breadcrumbs. They said "This led them to uncover the malware that was set to target specifically this organization–and certain influential individuals within it."
The research can be found here:
Targeted APT Activity: BABYSHARK Is Out for Blood

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Apr 2022 07:00:00 -0000</pubDate>
      <itunes:title>BABYSHARK is swimming again! [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>229</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>John Hammond from Huntress joins Dave Bittner on this episode to discuss malware known as BABYSHARK and how it is swimming out for blood once again. Huntress's research says "This activity aligns with known tradecraft attributed to North Korean threat actors targeting national security think tanks."
Huntress also adds that the activity was spotted on February 16th and immediately their ThreatOps team began following the trail of breadcrumbs. They said "This led them to uncover the malware that was set to target specifically this organization–and certain influential individuals within it."
The research can be found here:
Targeted APT Activity: BABYSHARK Is Out for Blood

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>John Hammond from Huntress joins Dave Bittner on this episode to discuss malware known as BABYSHARK and how it is swimming out for blood once again. Huntress's research says "This activity aligns with known tradecraft attributed to North Korean threat actors targeting national security think tanks."</p><p>Huntress also adds that the activity was spotted on February 16th and immediately their ThreatOps team began following the trail of breadcrumbs. They said "This led them to uncover the malware that was set to target specifically this organization–and certain influential individuals within it."</p><p>The research can be found here:</p><ul><li><a href="https://www.huntress.com/blog/targeted-apt-activity-babyshark-is-out-for-blood">Targeted APT Activity: BABYSHARK Is Out for Blood</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2145</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[58dc113c-c0dd-11ec-9a3b-b739c7940a3a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4801074257.mp3?updated=1685126775" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The cyber phases of Russia's war against Ukraine. Sanctions and the criminal underworld. Conti’s fortunes. More_eggs resurfaces. BlackCat ransomware warning.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1563/notes</link>
      <description>A look at Russian malware used against Ukrainian targets. Actual and potential targets harden themselves against Russia cyberattacks. Sanctions and the criminal underworld. Conti’s fortunes. A credential stealer resurfaces in corporate networks. BlackCat ransomware warning. Tomer Bar from SafeBreach discusses MuddyWaters. Dr. Christopher Emdin previews his new book STEM, STEAM, Make, Dream. CISA releases three more ICS security advisories.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/78

Selected reading.
Russia outlines when Ukraine war will end (Newsweek) 
Russia racing against clock to win Ukraine war before May 9 'Victory Day' (Newsweek) 
A deeper look at the malware being used on Ukrainian targets (The Record by Recorded Future)
Ukraine ramps up cyber defences to slow surge in attacks (The Straits Times)
Five Eyes Alert Warns of Heightened Risk of Russian Cyber Attacks (Bloomberg) 
Preparing for Energy Industry Cyberattacks (Wall Street Journal)
US sets dangerous precedents in cyberspace (Global Times) 
Russia’s War in Ukraine Has Complicated the Means Through Which Cybercriminals Launder Funds. Here’s How They’re Adapting (Flashpoint) 
U.S. Treasury Designates Facilitators of Russian Sanctions Evasion (U.S. Department of the Treasury)
Russia says nyet, sanctions Mark Zuckerberg, LinkedIn’s Roslansky, VP Harris and other US leaders (TechCrunch) 
Russia’s War in Ukraine Has Complicated the Means Through Which Cybercriminals Launder Funds. Here’s How They’re Adapting (Flashpoint) 
GOLD ULRICK continues Conti operations despite public disclosures (Secureworks) 
Costa Rica's Alvarado says cyber​​attacks seek to destabilize country as government transitions (Reuters)
Hackers Spearphish Corporate Hiring Managers with Poisoned Resumes, Infecting Them with the More_Eggs Malware, Warns eSentire (eSentire) 
BlackCat/ALPHV Ransomware Indicators of Compromise (IC3) 
FBI: BlackCat ransomware breached at least 60 entities worldwide (BleepingComputer) 
Delta Electronics ASDA-Soft (CISA) 
Johnson Controls Metasys SCT Pro (CISA) 
Hitachi Energy MicroSCADA Pro/X SYS600 (CISA) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 22 Apr 2022 20:15:00 -0000</pubDate>
      <itunes:title>The cyber phases of Russia's war against Ukraine. Sanctions and the criminal underworld. Conti’s fortunes. More_eggs resurfaces. BlackCat ransomware warning.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1563</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A look at Russian malware used against Ukrainian targets. Actual and potential targets harden themselves against Russia cyberattacks. Sanctions and the criminal underworld. Conti’s fortunes. A credential stealer resurfaces in corporate networks. BlackCat ransomware warning. Tomer Bar from SafeBreach discusses MuddyWaters. Dr. Christopher Emdin previews his new book STEM, STEAM, Make, Dream. CISA releases three more ICS security advisories.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/78

Selected reading.
Russia outlines when Ukraine war will end (Newsweek) 
Russia racing against clock to win Ukraine war before May 9 'Victory Day' (Newsweek) 
A deeper look at the malware being used on Ukrainian targets (The Record by Recorded Future)
Ukraine ramps up cyber defences to slow surge in attacks (The Straits Times)
Five Eyes Alert Warns of Heightened Risk of Russian Cyber Attacks (Bloomberg) 
Preparing for Energy Industry Cyberattacks (Wall Street Journal)
US sets dangerous precedents in cyberspace (Global Times) 
Russia’s War in Ukraine Has Complicated the Means Through Which Cybercriminals Launder Funds. Here’s How They’re Adapting (Flashpoint) 
U.S. Treasury Designates Facilitators of Russian Sanctions Evasion (U.S. Department of the Treasury)
Russia says nyet, sanctions Mark Zuckerberg, LinkedIn’s Roslansky, VP Harris and other US leaders (TechCrunch) 
Russia’s War in Ukraine Has Complicated the Means Through Which Cybercriminals Launder Funds. Here’s How They’re Adapting (Flashpoint) 
GOLD ULRICK continues Conti operations despite public disclosures (Secureworks) 
Costa Rica's Alvarado says cyber​​attacks seek to destabilize country as government transitions (Reuters)
Hackers Spearphish Corporate Hiring Managers with Poisoned Resumes, Infecting Them with the More_Eggs Malware, Warns eSentire (eSentire) 
BlackCat/ALPHV Ransomware Indicators of Compromise (IC3) 
FBI: BlackCat ransomware breached at least 60 entities worldwide (BleepingComputer) 
Delta Electronics ASDA-Soft (CISA) 
Johnson Controls Metasys SCT Pro (CISA) 
Hitachi Energy MicroSCADA Pro/X SYS600 (CISA) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A look at Russian malware used against Ukrainian targets. Actual and potential targets harden themselves against Russia cyberattacks. Sanctions and the criminal underworld. Conti’s fortunes. A credential stealer resurfaces in corporate networks. BlackCat ransomware warning. Tomer Bar from SafeBreach discusses MuddyWaters. Dr. Christopher Emdin previews his new book STEM, STEAM, Make, Dream. CISA releases three more ICS security advisories.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/78</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.newsweek.com/russia-ukraine-war-end-alexey-polishchuk-tass-1699666">Russia outlines when Ukraine war will end</a> (Newsweek) </p><p><a href="https://www.newsweek.com/russia-ukraine-war-may-vladimir-putin-victory-day-1699565">Russia racing against clock to win Ukraine war before May 9 'Victory Day'</a> (Newsweek) </p><p><a href="https://therecord.media/a-deeper-look-at-the-malware-being-used-on-ukrainian-targets/">A deeper look at the malware being used on Ukrainian targets</a> (The Record by Recorded Future)</p><p><a href="https://www.straitstimes.com/tech/tech-news/ukraine-ramps-up-cyber-defences-to-slow-surge-in-attacks">Ukraine ramps up cyber defences to slow surge in attacks</a> (The Straits Times)</p><p><a href="https://www.bloomberg.com/news/articles/2022-04-22/five-eyes-alert-warns-of-heightened-risk-of-russian-cyber-attacks">Five Eyes Alert Warns of Heightened Risk of Russian Cyber Attacks</a> (Bloomberg) </p><p><a href="https://www.wsj.com/articles/preparing-for-energy-industry-cyberattacks-11650575213">Preparing for Energy Industry Cyberattacks</a> (Wall Street Journal)</p><p><a href="https://www.globaltimes.cn/page/202204/1260039.shtml">US sets dangerous precedents in cyberspace</a> (Global Times) </p><p><a href="https://www.flashpoint-intel.com/blog/russias-ukraine-war-is-complicating-cybercriminal-money-laundering/">Russia’s War in Ukraine Has Complicated the Means Through Which Cybercriminals Launder Funds. Here’s How They’re Adapting</a> (Flashpoint) </p><p><a href="https://home.treasury.gov/news/press-releases/jy0731">U.S. Treasury Designates Facilitators of Russian Sanctions Evasion</a> (U.S. Department of the Treasury)</p><p><a href="https://techcrunch.com/2022/04/21/russia-says-nyet-sanctions-mark-zuckerberg-linkedins-roslansky-vp-harris-and-other-us-leaders/">Russia says nyet, sanctions Mark Zuckerberg, LinkedIn’s Roslansky, VP Harris and other US leaders</a> (TechCrunch) </p><p><a href="https://www.flashpoint-intel.com/blog/russias-ukraine-war-is-complicating-cybercriminal-money-laundering/">Russia’s War in Ukraine Has Complicated the Means Through Which Cybercriminals Launder Funds. Here’s How They’re Adapting</a> (Flashpoint) </p><p><a href="https://www.secureworks.com/blog/gold-ulrick-continues-conti-operations-despite-public-disclosures">GOLD ULRICK continues Conti operations despite public disclosures </a>(Secureworks) </p><p><a href="https://www.reuters.com/world/americas/costa-ricas-alvarado-says-cyberattacks-seek-destabilize-country-government-2022-04-21/">Costa Rica's Alvarado says cyber​​attacks seek to destabilize country as government transitions</a> (Reuters)</p><p><a href="https://www.esentire.com/blog/hackers-spearphish-corporate-hiring-managers-with-poisoned-resumes-infecting-them-with-the-more-eggs-malware">Hackers Spearphish Corporate Hiring Managers with Poisoned Resumes, Infecting Them with the More_Eggs Malware, Warns eSentire</a> (eSentire) </p><p><a href="https://www.ic3.gov/Media/News/2022/220420.pdf">BlackCat/ALPHV Ransomware Indicators of Compromise</a> (IC3) </p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-blackcat-ransomware-breached-at-least-60-entities-worldwide/">FBI: BlackCat ransomware breached at least 60 entities worldwide</a> (BleepingComputer) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-111-01">Delta Electronics ASDA-Soft</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-111-02">Johnson Controls Metasys SCT Pro</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-111-03">Hitachi Energy MicroSCADA Pro/X SYS600</a> (CISA) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1744</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b02544f8-7881-11ec-90a9-ff5b94922494]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7518536238.mp3?updated=1690305674" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Renewed Five Eyes’ warning about potential Russian cyberattacks. FBI warns of the threat of ransomware attacks against the agriculture sector. REvil may be back in business.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1562/notes</link>
      <description>A renewed Five Eyes’ warning about potential Russian cyberattacks. The FBI warns of the threat of ransomware attacks against the agriculture sector. REvil may be back in business. Carole Theriault shares insights on bug bounty programs. Our own Rick Howard checks in with Zack Barack from Coralogix on where things stand with XDR. And beware of threats of Facebook account suspension.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/77

Selected reading.
Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure
US and allies warn of Russian hacking threat to critical infrastructure
REvil's TOR sites come alive to redirect to new ransomware operation (
FBI Warns of Ransomware Attacks on Farming Co-ops During Planting, Harvest Seasons (
Phishing Site on Facebook Domain Used to Steal Credentials
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 21 Apr 2022 20:15:00 -0000</pubDate>
      <itunes:title>Renewed Five Eyes’ warning about potential Russian cyberattacks. FBI warns of the threat of ransomware attacks against the agriculture sector. REvil may be back in business.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1562</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A renewed Five Eyes’ warning about potential Russian cyberattacks. The FBI warns of the threat of ransomware attacks against the agriculture sector. REvil may be back in business. Carole Theriault shares insights on bug bounty programs. Our own Rick Howard checks in with Zack Barack from Coralogix on where things stand with XDR. And beware of threats of Facebook account suspension.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/77

Selected reading.
Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure
US and allies warn of Russian hacking threat to critical infrastructure
REvil's TOR sites come alive to redirect to new ransomware operation (
FBI Warns of Ransomware Attacks on Farming Co-ops During Planting, Harvest Seasons (
Phishing Site on Facebook Domain Used to Steal Credentials
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A renewed Five Eyes’ warning about potential Russian cyberattacks. The FBI warns of the threat of ransomware attacks against the agriculture sector. REvil may be back in business. Carole Theriault shares insights on bug bounty programs. Our own Rick Howard checks in with Zack Barack from Coralogix on where things stand with XDR. And beware of threats of Facebook account suspension.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/77</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-110a">Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure</a></p><p><a href="https://www.bleepingcomputer.com/news/security/us-and-allies-warn-of-russian-hacking-threat-to-critical-infrastructure/">US and allies warn of Russian hacking threat to critical infrastructure</a></p><p><a href="https://www.bleepingcomputer.com/news/security/revils-tor-sites-come-alive-to-redirect-to-new-ransomware-operation/">REvil's TOR sites come alive to redirect to new ransomware operation</a> (</p><p><a href="https://www.securityweek.com/fbi-warns-ransomware-attacks-farming-co-ops-during-planting-harvest-seasons">FBI Warns of Ransomware Attacks on Farming Co-ops During Planting, Harvest Seasons</a> (</p><p><a href="https://abnormalsecurity.com/blog/facebook-domain-credential-phishing-attack">Phishing Site on Facebook Domain Used to Steal Credentials</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1263</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b0889fa8-7881-11ec-90a9-07312a4b30c3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9941985045.mp3?updated=1690305392" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Updates on Russia’s hybrid war. Pegasus spyware in the service of espionage. CISA issues alerts and vulnerability warnings. C2C markets. Extradition for Assange? A guilty plea in a US cyberstalking case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1561/notes</link>
      <description>A Shuckworm update. Pegasus spyware found in UK government officials’ phones. CISA issues six ICS security alerts and adds three entries to its Known Exploited Vulnerabilities Catalog. Gangs succeed when criminals run them like a business. Julian Assange moves closer to extradition to the US. Tim Eades from Cyber Mentor Fund on cyber valuations. Our guest is Wes Mullins from deepwatch discussing adversary simulations. And a guilty plea in a high-profile cyberstalking case.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/76

Selected reading.
Shuckworm: Espionage Group Continues Intense Campaign Against Ukraine 
UK Government Reportedly Infected With NSO Group Spyware 
‘CatalanGate’ Spyware Infections Tied to NSO Group 
Pegasus Spyware and Citizen Surveillance: What You Need to Know 
Julian Assange extradition order issued by London court, moving WikiLeaks founder closer to US transfer .
Former eBay executive to plead guilty to cyberstalking campaign targeting couple 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 20 Apr 2022 20:15:00 -0000</pubDate>
      <itunes:title>Updates on Russia’s hybrid war. Pegasus spyware in the service of espionage. CISA issues alerts and vulnerability warnings. C2C markets. Extradition for Assange? A guilty plea in a US cyberstalking case.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1561</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A Shuckworm update. Pegasus spyware found in UK government officials’ phones. CISA issues six ICS security alerts and adds three entries to its Known Exploited Vulnerabilities Catalog. Gangs succeed when criminals run them like a business. Julian Assange moves closer to extradition to the US. Tim Eades from Cyber Mentor Fund on cyber valuations. Our guest is Wes Mullins from deepwatch discussing adversary simulations. And a guilty plea in a high-profile cyberstalking case.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/76

Selected reading.
Shuckworm: Espionage Group Continues Intense Campaign Against Ukraine 
UK Government Reportedly Infected With NSO Group Spyware 
‘CatalanGate’ Spyware Infections Tied to NSO Group 
Pegasus Spyware and Citizen Surveillance: What You Need to Know 
Julian Assange extradition order issued by London court, moving WikiLeaks founder closer to US transfer .
Former eBay executive to plead guilty to cyberstalking campaign targeting couple 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Shuckworm update. Pegasus spyware found in UK government officials’ phones. CISA issues six ICS security alerts and adds three entries to its Known Exploited Vulnerabilities Catalog. Gangs succeed when criminals run them like a business. Julian Assange moves closer to extradition to the US. Tim Eades from Cyber Mentor Fund on cyber valuations. Our guest is Wes Mullins from deepwatch discussing adversary simulations. And a guilty plea in a high-profile cyberstalking case.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/76</p><p><br></p><h2>Selected reading.</h2><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/shuckworm-intense-campaign-ukraine">Shuckworm: Espionage Group Continues Intense Campaign Against Ukraine</a> </p><p><a href="https://www.bankinfosecurity.com/uk-government-reportedly-infected-nso-group-spyware-a-18916">UK Government Reportedly Infected With NSO Group Spyware</a> </p><p><a href="https://threatpost.com/catalangate-spyware/179336/">‘CatalanGate’ Spyware Infections Tied to NSO Group</a> </p><p><a href="https://www.cnet.com/tech/mobile/pegasus-spyware-and-citizen-surveillance-what-you-need-to-know/">Pegasus Spyware and Citizen Surveillance: What You Need to Know</a> </p><p><a href="https://www.cnn.com/2022/04/20/uk/julian-assange-extradition-order-intl/index.html">Julian Assange extradition order issued by London court, moving WikiLeaks founder closer to US transfer</a> .</p><p><a href="https://www.reuters.com/technology/former-ebay-executive-plead-guilty-cyberstalking-campaign-targeting-couple-2022-04-19/?mod=djemCybersecruityPro&amp;tpl=cy">Former eBay executive to plead guilty to cyberstalking campaign targeting couple</a> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1503</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b12feb1e-7881-11ec-90a9-5f3be9328bf9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1117744268.mp3?updated=1690305382" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>In a hybrid war, it’s about the timing. Not quite all quiet on the cyber front. Pyongyand is phishing for wallets (and and other blockchained valuables). Emotet really likes those malicious macros.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1560/notes</link>
      <description>In a hybrid war, sometimes it’s about the timing. Not quite all quiet on the cyber front. Pyongyang is phishing for crypto wallets (and your NFTs, and other blockchained valuables). Emotet really likes those malicious macros. Joe Carrigan looks at prompt bombing. Bec McKeown from Immersive Labs explains human cyber capabilities. And it’s our anniversary this week: celebrate with us.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/75

Selected reading.
Ukraine Update: Zelenskiy Says Battle for Donbas Has Begun (Bloomberg) 
Ukraine at D+50: Russian reconstitution continues as shields stay up for ICS attacks. (The CyberWire)
Military intel chief believes Russia not to achieve any wins in Ukraine by Easter as Kremlin wishes (Ukrinform)
Ukraine War Divides Orthodox Faithful (New York Times) 
US officials ramp up warnings about Russian cyberattacks (The Hill) 
NATO Plays Cyberwar to Prep for a Real Russian Attack (Gizmodo) 
FS-ISAC Leads Financial Sector in Global Live-Fire Cyber Exercise Locked Shields (PR Newswire) 
If anyone understands Russian cyber dangers, it's Estonia's former president (Washington Post)
North Korean State-Sponsored APT Targets Blockchain Companies (CISA)  
TraderTraitor: North Korean State-Sponsored APT Targets Blockchain Companies (CISA) 
US warns of Lazarus hackers using malicious cryptocurrency apps (BleepingComputer) 
Trends in the Recent Emotet Maldoc Outbreak | FortiGuard Labs (Fortinet Blog)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Apr 2022 20:45:00 -0000</pubDate>
      <itunes:title>In a hybrid war, it’s about the timing. Not quite all quiet on the cyber front. Pyongyand is phishing for wallets (and and other blockchained valuables). Emotet really likes those malicious macros.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1560</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In a hybrid war, sometimes it’s about the timing. Not quite all quiet on the cyber front. Pyongyang is phishing for crypto wallets (and your NFTs, and other blockchained valuables). Emotet really likes those malicious macros. Joe Carrigan looks at prompt bombing. Bec McKeown from Immersive Labs explains human cyber capabilities. And it’s our anniversary this week: celebrate with us.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/75

Selected reading.
Ukraine Update: Zelenskiy Says Battle for Donbas Has Begun (Bloomberg) 
Ukraine at D+50: Russian reconstitution continues as shields stay up for ICS attacks. (The CyberWire)
Military intel chief believes Russia not to achieve any wins in Ukraine by Easter as Kremlin wishes (Ukrinform)
Ukraine War Divides Orthodox Faithful (New York Times) 
US officials ramp up warnings about Russian cyberattacks (The Hill) 
NATO Plays Cyberwar to Prep for a Real Russian Attack (Gizmodo) 
FS-ISAC Leads Financial Sector in Global Live-Fire Cyber Exercise Locked Shields (PR Newswire) 
If anyone understands Russian cyber dangers, it's Estonia's former president (Washington Post)
North Korean State-Sponsored APT Targets Blockchain Companies (CISA)  
TraderTraitor: North Korean State-Sponsored APT Targets Blockchain Companies (CISA) 
US warns of Lazarus hackers using malicious cryptocurrency apps (BleepingComputer) 
Trends in the Recent Emotet Maldoc Outbreak | FortiGuard Labs (Fortinet Blog)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In a hybrid war, sometimes it’s about the timing. Not quite all quiet on the cyber front. Pyongyang is phishing for crypto wallets (and your NFTs, and other blockchained valuables). Emotet really likes those malicious macros. Joe Carrigan looks at prompt bombing. Bec McKeown from Immersive Labs explains human cyber capabilities. And it’s our anniversary this week: celebrate with us.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/75</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bloomberg.com/news/articles/2022-04-18/ukraine-update-mariupol-defenders-hold-out-against-onslaught">Ukraine Update: Zelenskiy Says Battle for Donbas Has Begun</a> (Bloomberg) </p><p><a href="https://thecyberwire.com/stories/ac19662708324339a475e0875efaa221/ukraine-at-d50-russian-reconstitution-continues-as-shields-stay-up-for-ics-attacks">Ukraine at D+50: Russian reconstitution continues as shields stay up for ICS attacks.</a> (The CyberWire)</p><p><a href="https://www.ukrinform.net/rubric-ato/3460523-military-intel-chief-believes-russia-not-to-achieve-any-wins-in-ukraine-by-easter-as-kremlin-wishes.html">Military intel chief believes Russia not to achieve any wins in Ukraine by Easter as Kremlin wishes</a> (Ukrinform)</p><p><a href="https://www.nytimes.com/2022/04/18/world/europe/ukraine-war-russian-orthodox-church.html">Ukraine War Divides Orthodox Faithful</a> (New York Times) </p><p><a href="https://thehill.com/policy/cybersecurity/3271898-us-officials-ramp-up-warnings-about-russian-cyber-attacks/">US officials ramp up warnings about Russian cyberattacks</a> (The Hill) </p><p><a href="https://gizmodo.com/nato-russia-ukraine-locked-shields-cyberattack-war-game-1848807942">NATO Plays Cyberwar to Prep for a Real Russian Attack</a> (Gizmodo) </p><p><a href="https://www.prnewswire.co.uk/news-releases/fs-isac-leads-financial-sector-in-global-live-fire-cyber-exercise-locked-shields-833171056.html">FS-ISAC Leads Financial Sector in Global Live-Fire Cyber Exercise Locked Shields</a> (PR Newswire) </p><p><a href="https://www.washingtonpost.com/politics/2022/04/19/if-anyone-understands-russian-cyber-dangers-it-estonia-former-president/">If anyone understands Russian cyber dangers, it's Estonia's former president</a> (Washington Post)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/04/18/north-korean-state-sponsored-apt-targets-blockchain-companies">North Korean State-Sponsored APT Targets Blockchain Companies</a> (CISA)  </p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-108a">TraderTraitor: North Korean State-Sponsored APT Targets Blockchain Companies</a> (CISA) </p><p><a href="https://www.bleepingcomputer.com/news/security/us-warns-of-lazarus-hackers-using-malicious-cryptocurrency-apps/">US warns of Lazarus hackers using malicious cryptocurrency apps</a> (BleepingComputer) </p><p><a href="https://www.fortinet.com/blog/threat-research/Trends-in-the-recent-emotet-maldoc-outbreak">Trends in the Recent Emotet Maldoc Outbreak | FortiGuard Labs </a>(Fortinet Blog)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1401</itunes:duration>
      <guid isPermaLink="false"><![CDATA[b193909c-7881-11ec-90a9-3f3386e7ecce]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5313670170.mp3?updated=1690305364" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Nuisance-level cyber ops in a hybrid war. “CatalanGate.” Industrial Spy caters to victims’ competitors? Conti chatter. $5 million reward for info on DPRK ops. Exercise Locked Shields. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1559/notes</link>
      <description>Nuisance-level cyberattacks continue on both sides of Russia’s hybrid war against Ukraine. Face-saving disinformation. “CatalanGate.” Industrial Spy says it caters to its victims’ competitors. More on what’s been learned from Conti’s leaked chatter. Rewards for Justice offers $5 million for tips on DPRK cyber ops. Awais Rashid on supply chain risk management. Our guest is Jack Chapman from Egress to discuss a 232% increase in LInkedIn phishing attacks. And Exercise Locked Shields begins tomorrow.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/74

Selected reading.
Occupants send computer viruses allegedly on behalf of SBU (Interfax-Ukraine)
Ransomware groups go after a new target: Russian organizations (The Record by Recorded Future).
Currency.com Targeted in Failed Cyber-Attack (Accesswire) 
Russia says missile attacks on Kyiv will increase (Military Times) 
Film and photos appear to show Russian cruiser Moskva shortly before it sank (the Guardian)
CatalanGate: Extensive Mercenary Spyware Operation against Catalans Using Pegasus and Candiru (The Citizen Lab)
New Industrial Spy stolen data market promoted through cracks, adware (BleepingComputer) 
Event Overview: CONTI Leaks 2022 (BlueVoyant)
U.S. offers $5 million for info on North Korean cyber operators (The Record by Recorded Future) 
North Korea: Up to $5 Million Reward (US State Department)
World´s Largest International Live-Fire Cyber Exercise launches in Tallinn (CCDCOE) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 18 Apr 2022 20:40:00 -0000</pubDate>
      <itunes:title>Nuisance-level cyber ops in a hybrid war. “CatalanGate.” Industrial Spy caters to victims’ competitors? Conti chatter. $5 million reward for info on DPRK ops. Exercise Locked Shields. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1559</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Nuisance-level cyberattacks continue on both sides of Russia’s hybrid war against Ukraine. Face-saving disinformation. “CatalanGate.” Industrial Spy says it caters to its victims’ competitors. More on what’s been learned from Conti’s leaked chatter. Rewards for Justice offers $5 million for tips on DPRK cyber ops. Awais Rashid on supply chain risk management. Our guest is Jack Chapman from Egress to discuss a 232% increase in LInkedIn phishing attacks. And Exercise Locked Shields begins tomorrow.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/74

Selected reading.
Occupants send computer viruses allegedly on behalf of SBU (Interfax-Ukraine)
Ransomware groups go after a new target: Russian organizations (The Record by Recorded Future).
Currency.com Targeted in Failed Cyber-Attack (Accesswire) 
Russia says missile attacks on Kyiv will increase (Military Times) 
Film and photos appear to show Russian cruiser Moskva shortly before it sank (the Guardian)
CatalanGate: Extensive Mercenary Spyware Operation against Catalans Using Pegasus and Candiru (The Citizen Lab)
New Industrial Spy stolen data market promoted through cracks, adware (BleepingComputer) 
Event Overview: CONTI Leaks 2022 (BlueVoyant)
U.S. offers $5 million for info on North Korean cyber operators (The Record by Recorded Future) 
North Korea: Up to $5 Million Reward (US State Department)
World´s Largest International Live-Fire Cyber Exercise launches in Tallinn (CCDCOE) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Nuisance-level cyberattacks continue on both sides of Russia’s hybrid war against Ukraine. Face-saving disinformation. “CatalanGate.” Industrial Spy says it caters to its victims’ competitors. More on what’s been learned from Conti’s leaked chatter. Rewards for Justice offers $5 million for tips on DPRK cyber ops. Awais Rashid on supply chain risk management. Our guest is Jack Chapman from Egress to discuss a 232% increase in LInkedIn phishing attacks. And Exercise Locked Shields begins tomorrow.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/74</p><p><br></p><h2>Selected reading.</h2><p><a href="https://en.interfax.com.ua/news/general/824701.html">Occupants send computer viruses allegedly on behalf of SBU</a> (Interfax-Ukraine)</p><p><a href="https://therecord.media/ransomware-groups-go-after-a-new-target-russian-organizations/">Ransomware groups go after a new target: Russian organizations</a> (The Record by Recorded Future).</p><p><a href="https://www.accesswire.com/697718/Currencycom-Targeted-in-Failed-Cyber-Attack">Currency.com Targeted in Failed Cyber-Attack</a> (Accesswire) </p><p><a href="https://www.militarytimes.com/flashpoints/ukraine/2022/04/15/russia-says-attacks-on-kyiv-will-increase/">Russia says missile attacks on Kyiv will increase</a> (Military Times) </p><p><a href="https://www.theguardian.com/world/2022/apr/18/film-and-photos-appear-to-show-russian-cruiser-moskva-shortly-before-it-sank">Film and photos appear to show Russian cruiser Moskva shortly before it sank</a> (the Guardian)</p><p><a href="https://citizenlab.ca/2022/04/catalangate-extensive-mercenary-spyware-operation-against-catalans-using-pegasus-candiru/">CatalanGate: Extensive Mercenary Spyware Operation against Catalans Using Pegasus and Candiru</a> (The Citizen Lab)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-industrial-spy-stolen-data-market-promoted-through-cracks-adware/">New Industrial Spy stolen data market promoted through cracks, adware</a> (BleepingComputer) </p><p><a href="https://www.bluevoyant.com/wp-content/uploads/2022/04/BV_ContiLeaks-Report_13.pdf">Event Overview: CONTI Leaks 2022</a> (BlueVoyant)</p><p><a href="https://therecord.media/u-s-offers-5-million-for-info-on-north-korean-cyber-operators/">U.S. offers $5 million for info on North Korean cyber operators</a> (The Record by Recorded Future) </p><p><a href="https://rewardsforjustice.net/index/?north-korea=north-korea">North Korea: Up to $5 Million Reward</a> (US State Department)</p><p><a href="https://ccdcoe.org/news/2022/locked-shields-2022-exercise-to-be-launched-next-week/">World´s Largest International Live-Fire Cyber Exercise launches in Tallinn</a> (CCDCOE) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1460</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b239ac66-7881-11ec-90a9-9f01684a0374]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6295096223.mp3?updated=1690305350" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CyberWire Live: Hack the Port 2022 Fireside chat. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/43/notes</link>
      <description>At the Hack the Port 2022 event, the CyberWire held a CyberWire Live event. CyberWire Daily Podcast host Dave Bittner was joined by Roya Gordon, OT/IoT Security Research Evangelist at Nozomi Networks, and Christian Lees, CTO at Resecurity. During this fireside chat format session, Dave and our guests discussed ICS, OT cybersecurity, the role of security research and demos, supply chain compromise, and IT/OT security trends among other things. Thanks to the team at MISI/DreamPort for this opportunity.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 17 Apr 2022 07:00:00 -0000</pubDate>
      <itunes:title>CyberWire Live: Hack the Port 2022 Fireside chat. [Special Edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>7</itunes:season>
      <itunes:episode>43</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>At the Hack the Port 2022 event, the CyberWire held a CyberWire Live event. CyberWire Daily Podcast host Dave Bittner was joined by Roya Gordon, OT/IoT Security Research Evangelist at Nozomi Networks, and Christian Lees, CTO at Resecurity. During this fireside chat format session, Dave and our guests discussed ICS, OT cybersecurity, the role of security research and demos, supply chain compromise, and IT/OT security trends among other things. Thanks to the team at MISI/DreamPort for this opportunity.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>At the Hack the Port 2022 event, the CyberWire held a CyberWire Live event. CyberWire Daily Podcast host Dave Bittner was joined by Roya Gordon, OT/IoT Security Research Evangelist at Nozomi Networks, and Christian Lees, CTO at Resecurity. During this fireside chat format session, Dave and our guests discussed ICS, OT cybersecurity, the role of security research and demos, supply chain compromise, and IT/OT security trends among other things. Thanks to the team at MISI/DreamPort for this opportunity.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2370</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[91adb3a6-bcf2-11ec-bb03-7f6cd12282b0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6862102996.mp3?updated=1650051179" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Satya Gupta: Rising to your contribution. [CTO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/96/notes</link>
      <description>Co-founder and CTO of Virsec, Satya Gupta shares his story of how he has over 25 years of expertise in embedded systems, network security and systems architecture. He also talks about how a colleague of his told him something that resinated with him, he said " that was really a remarkable statement that I heard from that person. You rise to the point where you can actually contribute." He also discusses how he got into the startup atmosphere and how different scenarios in his life helped to lead him to the successful man he has become in the cyber community. We thank Satya for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 17 Apr 2022 07:00:00 -0000</pubDate>
      <itunes:title>Satya Gupta: Rising to your contribution. [CTO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>96</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Co-founder and CTO of Virsec, Satya Gupta shares his story of how he has over 25 years of expertise in embedded systems, network security and systems architecture. He also talks about how a colleague of his told him something that resinated with him, he said " that was really a remarkable statement that I heard from that person. You rise to the point where you can actually contribute." He also discusses how he got into the startup atmosphere and how different scenarios in his life helped to lead him to the successful man he has become in the cyber community. We thank Satya for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Co-founder and CTO of Virsec, Satya Gupta shares his story of how he has over 25 years of expertise in embedded systems, network security and systems architecture. He also talks about how a colleague of his told him something that resinated with him, he said " that was really a remarkable statement that I heard from that person. You rise to the point where you can actually contribute." He also discusses how he got into the startup atmosphere and how different scenarios in his life helped to lead him to the successful man he has become in the cyber community. We thank Satya for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>490</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0eb08e58-bc28-11ec-afd6-3796428bd505]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2650970257.mp3?updated=1649964321" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A fight to defend Taiwan financial institutions. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/228/notes</link>
      <description>Alan Neville from Symantec/Broadcom joins Dave Bittner on this episode to discuss Antlion, a Chinese state-backed hacker group, are using custom backdoors to target financial institutions in Taiwan. Symantec's blog shares the research behind the attacks and how the backdoor allowed the attackers to run WMI commands remotely.
Symantec's research showed that "The goal of this campaign appears to have been espionage, as we saw the attackers exfiltrating data and staging data for exfiltration from infected networks." They have since found that this attack has been going on over the course of the past 18 months, in which 250 days were spent on the financial organization and around 175 days were spent on the manufacturing organization.
The research can be found here:
Antlion: Chinese APT Uses Custom Backdoor to Target Financial Institutions in Taiwan

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Apr 2022 07:00:00 -0000</pubDate>
      <itunes:title>A fight to defend Taiwan financial institutions. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>228</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Alan Neville from Symantec/Broadcom joins Dave Bittner on this episode to discuss Antlion, a Chinese state-backed hacker group, are using custom backdoors to target financial institutions in Taiwan. Symantec's blog shares the research behind the attacks and how the backdoor allowed the attackers to run WMI commands remotely.
Symantec's research showed that "The goal of this campaign appears to have been espionage, as we saw the attackers exfiltrating data and staging data for exfiltration from infected networks." They have since found that this attack has been going on over the course of the past 18 months, in which 250 days were spent on the financial organization and around 175 days were spent on the manufacturing organization.
The research can be found here:
Antlion: Chinese APT Uses Custom Backdoor to Target Financial Institutions in Taiwan

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Alan Neville from Symantec/Broadcom joins Dave Bittner on this episode to discuss Antlion, a Chinese state-backed hacker group, are using custom backdoors to target financial institutions in Taiwan. Symantec's blog shares the research behind the attacks and how the backdoor allowed the attackers to run WMI commands remotely.</p><p>Symantec's research showed that "The goal of this campaign appears to have been espionage, as we saw the attackers exfiltrating data and staging data for exfiltration from infected networks." They have since found that this attack has been going on over the course of the past 18 months, in which 250 days were spent on the financial organization and around 175 days were spent on the manufacturing organization.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/china-apt-antlion-taiwan-financial-attacks">Antlion: Chinese APT Uses Custom Backdoor to Target Financial Institutions in Taiwan</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1079</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dbfc3df0-bb68-11ec-bd39-1bd64f5a5175]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5942231961.mp3?updated=1685126759" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Further developments in Russia’s hybrid war. Conti claims responsibility for the Nordex hack. Lazarus Group heist. Indictments in influence ops case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1558/notes</link>
      <description>Further developments in the Incontroller/Pipedream industrial control system threat. Conti claims responsibility for the Nordex hack. The half-a-billion stolen from Ronin went to the Lazarus Group. And indictments in an influence ops case.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/73

Selected reading.
Ukraine war: Russia threatens to step up attacks on Kyiv (BBC News) 
Live Updates: Russia Sets Stage for Battle to Control Ukraine’s East (New York Times)
Russian Troops Risk Repeating Blunders If They Try for May 9 Win (Bloomberg) 
Why Putin may be aiming to declare victory over Ukraine on May 9 (Fortune) 
What Victory Day means for Russian identity (Washington Post) 
Spy games: expulsion of diplomats shines light on Russian espionage (the Guardian)
Finland and Sweden pursue unlinked NATO membership (Defense News)
What Finland Can Offer NATO (Foreign Policy)
U.S. warns energy firms of a rapidly advancing hacking threat (E&amp;E News) 
Wind turbine firm Nordex hit by Conti ransomware attack (BleepingComputer) 
Karakurt revealed as data extortion arm of Conti cybercrime syndicate (BleepingComputer)
Threat Spotlight: Conti Ransomware Group Behind the Karakurt Hacking Team (Infinitum)
US agency attributes $540 million Ronin hack to North Korean APT group (The Record by Recorded Future)
North Korea Designation Update (U.S. Department of the Treasury) 
Russian legislator, staff accused of trying to influence US lawmakers: DOJ (Newsweek) 
Russian Legislator and Two Staff Members Charged with Conspiring to Have U.S. Citizen Act as an Illegal Agent of the Russian Government in the United States (US Department of Justice)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 15 Apr 2022 20:15:00 -0000</pubDate>
      <itunes:title>Further developments in Russia’s hybrid war. Conti claims responsibility for the Nordex hack. Lazarus Group heist. Indictments in influence ops case.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1558</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Further developments in the Incontroller/Pipedream industrial control system threat. Conti claims responsibility for the Nordex hack. The half-a-billion stolen from Ronin went to the Lazarus Group. And indictments in an influence ops case.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/73

Selected reading.
Ukraine war: Russia threatens to step up attacks on Kyiv (BBC News) 
Live Updates: Russia Sets Stage for Battle to Control Ukraine’s East (New York Times)
Russian Troops Risk Repeating Blunders If They Try for May 9 Win (Bloomberg) 
Why Putin may be aiming to declare victory over Ukraine on May 9 (Fortune) 
What Victory Day means for Russian identity (Washington Post) 
Spy games: expulsion of diplomats shines light on Russian espionage (the Guardian)
Finland and Sweden pursue unlinked NATO membership (Defense News)
What Finland Can Offer NATO (Foreign Policy)
U.S. warns energy firms of a rapidly advancing hacking threat (E&amp;E News) 
Wind turbine firm Nordex hit by Conti ransomware attack (BleepingComputer) 
Karakurt revealed as data extortion arm of Conti cybercrime syndicate (BleepingComputer)
Threat Spotlight: Conti Ransomware Group Behind the Karakurt Hacking Team (Infinitum)
US agency attributes $540 million Ronin hack to North Korean APT group (The Record by Recorded Future)
North Korea Designation Update (U.S. Department of the Treasury) 
Russian legislator, staff accused of trying to influence US lawmakers: DOJ (Newsweek) 
Russian Legislator and Two Staff Members Charged with Conspiring to Have U.S. Citizen Act as an Illegal Agent of the Russian Government in the United States (US Department of Justice)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Further developments in the Incontroller/Pipedream industrial control system threat. Conti claims responsibility for the Nordex hack. The half-a-billion stolen from Ronin went to the Lazarus Group. And indictments in an influence ops case.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/73</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bbc.com/news/world-europe-61117056">Ukraine war: Russia threatens to step up attacks on Kyiv</a> (BBC News) </p><p><a href="https://www.nytimes.com/live/2022/04/15/world/ukraine-russia-war-news">Live Updates: Russia Sets Stage for Battle to Control Ukraine’s East</a> (New York Times)</p><p><a href="https://www.bloomberg.com/news/articles/2022-04-14/russian-troops-risk-repeating-blunders-if-they-try-for-may-9-win">Russian Troops Risk Repeating Blunders If They Try for May 9 Win</a> (Bloomberg) </p><p><a href="https://fortune.com/2022/04/14/russia-may-9-victory-day-vladimir-putin-plan/">Why Putin may be aiming to declare victory over Ukraine on May 9</a> (Fortune) </p><p><a href="https://www.washingtonpost.com/world/2022/04/12/what-victory-day-means-russian-identity/">What Victory Day means for Russian identity</a> (Washington Post) </p><p><a href="https://www.theguardian.com/world/2022/apr/15/spy-russian-diplomats-europe-espionage-ukraine">Spy games: expulsion of diplomats shines light on Russian espionage</a> (the Guardian)</p><p><a href="https://www.defensenews.com/global/europe/2022/04/14/finland-and-sweden-pursue-unlinked-nato-membership/">Finland and Sweden pursue unlinked NATO membership</a> (Defense News)</p><p><a href="https://foreignpolicy.com/2022/04/14/what-finland-can-offer-nato/">What Finland Can Offer NATO</a> (Foreign Policy)</p><p><a href="https://www.eenews.net/articles/u-s-warns-energy-firms-of-a-rapidly-advancing-hacking-threat/">U.S. warns energy firms of a rapidly advancing hacking threat</a> (E&amp;E News) </p><p><a href="https://www.bleepingcomputer.com/news/security/wind-turbine-firm-nordex-hit-by-conti-ransomware-attack/">Wind turbine firm Nordex hit by Conti ransomware attack</a> (BleepingComputer) </p><p><a href="https://www.bleepingcomputer.com/news/security/karakurt-revealed-as-data-extortion-arm-of-conti-cybercrime-syndicate/">Karakurt revealed as data extortion arm of Conti cybercrime syndicate</a> (BleepingComputer)</p><p><a href="https://www.infinitumit.com.tr/conti-ransomware-group-behind-the-karakurt-hacking-team/">Threat Spotlight: Conti Ransomware Group Behind the Karakurt Hacking Team</a> (Infinitum)</p><p><a href="https://therecord.media/us-agency-attributes-540-million-ronin-hack-to-north-korean-apt-group/">US agency attributes $540 million Ronin hack to North Korean APT group</a> (The Record by Recorded Future)</p><p><a href="https://home.treasury.gov/policy-issues/financial-sanctions/recent-actions/20220414">North Korea Designation Update</a> (U.S. Department of the Treasury) </p><p><a href="https://www.newsweek.com/russian-legislator-staff-accused-trying-influence-us-lawmakers-doj-1698156">Russian legislator, staff accused of trying to influence US lawmakers: DOJ</a> (Newsweek) </p><p><a href="https://www.justice.gov/opa/pr/russian-legislator-and-two-staff-members-charged-conspiring-have-us-citizen-act-illegal-agent">Russian Legislator and Two Staff Members Charged with Conspiring to Have U.S. Citizen Act as an Illegal Agent of the Russian Government in the United States</a> (US Department of Justice)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1380</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b0040806-7881-11ec-90a9-c3be1630a0d5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1035770629.mp3?updated=1690305334" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A nation-state threat actor targets industrial systems. It’s hard to recover from a threat to industrial systems. Lazarus Group resumes Operation Dream Job. OldGremlin is back. Conti runs like a business.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1557/notes</link>
      <description>A nation-state threat actor (probably Russian) targets industrial systems. A quick look at the GRU's earlier attempt against Ukraine's power grid. The difficulty of recovering from a credible threat to industrial systems. Lazarus Group resumes Operation Dream Job. OldGremlin speaks Russian, and it holds Russian companies for ransom. Carole Theriault looks at research on lie detection. Josh Ray from Accenture drops some SBOMs. And another look at the privateers in the Conti gang.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/72

Selected reading.
Ukraine Update: U.S., EU to Send More Arms; Warship Damaged (Bloomberg) 
INCONTROLLER: New State-Sponsored Cyber Attack Tools Target Multiple Industrial Control Systems (Mandiant).
PIPEDREAM: CHERNOVITE's Emerging Malware Targeting Industrial Environments | Dragos (Dragos) 
APT Cyber Tools Targeting ICS/SCADA Devices (CISA) 
U.S. warns newly discovered malware could sabotage energy plants (Washington Post) 
Industroyer2 Targets Ukraine’s Electric Grid: Here’s How Companies Can Stay Protected and Resilient (Nozomi Networks)
Wind Turbine Giant Nordex Hit By Cyber-Attack (Infosecurity Magazine)
Lazarus Targets Chemical Sector (Symantec)
Old Gremlins, new methods (Group-IB)
Leaked documents show notorious ransomware group has an HR department, performance reviews and an 'employee of the month' (CNBC)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 14 Apr 2022 20:30:00 -0000</pubDate>
      <itunes:title>A nation-state threat actor targets industrial systems. It’s hard to recover from a threat to industrial systems. Lazarus Group resumes Operation Dream Job. OldGremlin is back. Conti runs like a business.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1557</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A nation-state threat actor (probably Russian) targets industrial systems. A quick look at the GRU's earlier attempt against Ukraine's power grid. The difficulty of recovering from a credible threat to industrial systems. Lazarus Group resumes Operation Dream Job. OldGremlin speaks Russian, and it holds Russian companies for ransom. Carole Theriault looks at research on lie detection. Josh Ray from Accenture drops some SBOMs. And another look at the privateers in the Conti gang.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/72

Selected reading.
Ukraine Update: U.S., EU to Send More Arms; Warship Damaged (Bloomberg) 
INCONTROLLER: New State-Sponsored Cyber Attack Tools Target Multiple Industrial Control Systems (Mandiant).
PIPEDREAM: CHERNOVITE's Emerging Malware Targeting Industrial Environments | Dragos (Dragos) 
APT Cyber Tools Targeting ICS/SCADA Devices (CISA) 
U.S. warns newly discovered malware could sabotage energy plants (Washington Post) 
Industroyer2 Targets Ukraine’s Electric Grid: Here’s How Companies Can Stay Protected and Resilient (Nozomi Networks)
Wind Turbine Giant Nordex Hit By Cyber-Attack (Infosecurity Magazine)
Lazarus Targets Chemical Sector (Symantec)
Old Gremlins, new methods (Group-IB)
Leaked documents show notorious ransomware group has an HR department, performance reviews and an 'employee of the month' (CNBC)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A nation-state threat actor (probably Russian) targets industrial systems. A quick look at the GRU's earlier attempt against Ukraine's power grid. The difficulty of recovering from a credible threat to industrial systems. Lazarus Group resumes Operation Dream Job. OldGremlin speaks Russian, and it holds Russian companies for ransom. Carole Theriault looks at research on lie detection. Josh Ray from Accenture drops some SBOMs. And another look at the privateers in the Conti gang.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/72</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bloomberg.com/news/articles/2022-04-13/ukraine-update-polish-and-baltic-presidents-set-to-visit-kyiv">Ukraine Update: U.S., EU to Send More Arms; Warship Damaged</a> (Bloomberg) </p><p><a href="https://www.mandiant.com/resources/incontroller-state-sponsored-ics-tool">INCONTROLLER: New State-Sponsored Cyber Attack Tools Target Multiple Industrial Control Systems</a> (Mandiant).</p><p><a href="https://hub.dragos.com/whitepaper/chernovite-pipedream">PIPEDREAM: CHERNOVITE's Emerging Malware Targeting Industrial Environments | Dragos</a> (Dragos) </p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-103a">APT Cyber Tools Targeting ICS/SCADA Devices</a> (CISA) </p><p><a href="https://www.washingtonpost.com/technology/2022/04/13/pipedream-malware-russia-lng/">U.S. warns newly discovered malware could sabotage energy plants</a> (Washington Post) </p><p><a href="https://www.nozominetworks.com/blog/industroyer2-targets-ukraines-electric-grid-heres-how-companies-can-stay-protected-and-resilient/">Industroyer2 Targets Ukraine’s Electric Grid: Here’s How Companies Can Stay Protected and Resilient</a> (Nozomi Networks)</p><p><a href="https://www.infosecurity-magazine.com/news/wind-turbine-nordex-cyber-attack/">Wind Turbine Giant Nordex Hit By Cyber-Attack</a> (Infosecurity Magazine)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/lazarus-dream-job-chemical">Lazarus Targets Chemical Sector</a> (Symantec)</p><p><a href="https://blog.group-ib.com/oldgremlin_comeback">Old Gremlins, new methods</a> (Group-IB)</p><p><a href="https://www.cnbc.com/2022/04/14/conti-ransomware-leak-shows-group-operates-like-normal-tech-company.html">Leaked documents show notorious ransomware group has an HR department, performance reviews and an 'employee of the month'</a> (CNBC)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1327</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b0a9f40a-7881-11ec-90a9-9724db8e28d1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5026751552.mp3?updated=1690304601" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Powergrid attacks, DDoS, and doxing in a hybrid war. Notes on botnets, and a threat actor changes its phish hooks. Patch Tuesday. Sentence passed in a sanctions evasion case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1556/notes</link>
      <description>Indestroyer2 and Ukraine's power grid. More on last week's distributed denial-of-service attack against Finland. Anonymous claims to have doxed Russia's Ministry of Culture. Hafnium gets evasive. Enemybot is under development but worth keeping an eye on. Changing the phish hook. Patch Tuesday notes. Tim Eades from Cyber Mentor Fund on digital &amp; security transformations. Our guest is Aaron Shilts from NetSPI onproactive public-private sector security collaboration. Sanctions evasion is serious business.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/71

Selected reading.
Why Russia’s Cyber Warriors Haven't Crippled Ukraine (The National Interest)
In Ukraine, a ‘Full-Scale Cyberwar’ Emerges (Wall Street Journal) 
Russian hackers tried to bring down Ukraine’s power grid to help the invasion (MIT Technology Review) 
Russia's Sandworm Hackers Attempted a Third Blackout in Ukraine (Wired)
Ukraine Thwarts Cyberattack on Electric Grid, Officials Say (Wall Street Journal) 
Zhadnost strikes again… this time in Finland. (SecurityScorecard)
Anonymous Hits Russian Ministry of Culture- Leaks 446GB of Data (HackRead) 
Tarrask malware uses scheduled tasks for defense evasion (Microsoft Security Blog) 
Enemybot: A Look into Keksec's Latest DDoS Botnet (Fortinet Blog) 
Enemybot: a new Mirai, Gafgyt hybrid botnet joins the scene (ZDNet) 
Qbot malware switches to new Windows Installer infection vector (BleepingComputer) 
Microsoft Releases April 2022 Security Updates (CISA)
Google Releases Security Updates for Chrome (CISA) 
Citrix Releases Security Updates for Multiple Products (CISA)
Apache Releases Security Advisory for Struts 2 (CISA) 
Valmet DNA (CISA) 
Mitsubishi Electric MELSEC-Q Series C Controller Module (CISA) 
Inductive Automation Ignition (CISA) 
Mitsubishi Electric GT25-WLAN (CISA) 
Aethon TUG Home Base Server (CISA) 
U.S. crypto researcher sentenced to five years for helping North Korea evade sanctions (Reuters)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 13 Apr 2022 20:15:00 -0000</pubDate>
      <itunes:title>Powergrid attacks, DDoS, and doxing in a hybrid war. Notes on botnets, and a threat actor changes its phish hooks. Patch Tuesday. Sentence passed in a sanctions evasion case.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1556</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Indestroyer2 and Ukraine's power grid. More on last week's distributed denial-of-service attack against Finland. Anonymous claims to have doxed Russia's Ministry of Culture. Hafnium gets evasive. Enemybot is under development but worth keeping an eye on. Changing the phish hook. Patch Tuesday notes. Tim Eades from Cyber Mentor Fund on digital &amp; security transformations. Our guest is Aaron Shilts from NetSPI onproactive public-private sector security collaboration. Sanctions evasion is serious business.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/71

Selected reading.
Why Russia’s Cyber Warriors Haven't Crippled Ukraine (The National Interest)
In Ukraine, a ‘Full-Scale Cyberwar’ Emerges (Wall Street Journal) 
Russian hackers tried to bring down Ukraine’s power grid to help the invasion (MIT Technology Review) 
Russia's Sandworm Hackers Attempted a Third Blackout in Ukraine (Wired)
Ukraine Thwarts Cyberattack on Electric Grid, Officials Say (Wall Street Journal) 
Zhadnost strikes again… this time in Finland. (SecurityScorecard)
Anonymous Hits Russian Ministry of Culture- Leaks 446GB of Data (HackRead) 
Tarrask malware uses scheduled tasks for defense evasion (Microsoft Security Blog) 
Enemybot: A Look into Keksec's Latest DDoS Botnet (Fortinet Blog) 
Enemybot: a new Mirai, Gafgyt hybrid botnet joins the scene (ZDNet) 
Qbot malware switches to new Windows Installer infection vector (BleepingComputer) 
Microsoft Releases April 2022 Security Updates (CISA)
Google Releases Security Updates for Chrome (CISA) 
Citrix Releases Security Updates for Multiple Products (CISA)
Apache Releases Security Advisory for Struts 2 (CISA) 
Valmet DNA (CISA) 
Mitsubishi Electric MELSEC-Q Series C Controller Module (CISA) 
Inductive Automation Ignition (CISA) 
Mitsubishi Electric GT25-WLAN (CISA) 
Aethon TUG Home Base Server (CISA) 
U.S. crypto researcher sentenced to five years for helping North Korea evade sanctions (Reuters)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Indestroyer2 and Ukraine's power grid. More on last week's distributed denial-of-service attack against Finland. Anonymous claims to have doxed Russia's Ministry of Culture. Hafnium gets evasive. Enemybot is under development but worth keeping an eye on. Changing the phish hook. Patch Tuesday notes. Tim Eades from Cyber Mentor Fund on digital &amp; security transformations. Our guest is Aaron Shilts from NetSPI onproactive public-private sector security collaboration. Sanctions evasion is serious business.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/71</p><p><br></p><h2>Selected reading.</h2><p><a href="https://nationalinterest.org/blog/techland-when-great-power-competition-meets-digital-world/why-russia%E2%80%99s-cyber-warriors-havent">Why Russia’s Cyber Warriors Haven't Crippled Ukraine</a> (The National Interest)</p><p><a href="https://www.wsj.com/articles/in-ukraine-a-full-scale-cyberwar-emerges-11649780203">In Ukraine, a ‘Full-Scale Cyberwar’ Emerges </a>(Wall Street Journal) </p><p><a href="https://www.technologyreview.com/2022/04/12/1049586/russian-hackers-tried-to-bring-down-ukraines-power-grid-to-help-the-invasion/">Russian hackers tried to bring down Ukraine’s power grid to help the invasion</a> (MIT Technology Review) </p><p><a href="https://www.wired.com/story/sandworm-russia-ukraine-blackout-gru/">Russia's Sandworm Hackers Attempted a Third Blackout in Ukraine</a> (Wired)</p><p><a href="https://www.wsj.com/articles/ukraine-thwarts-cyberattack-on-electric-grid-officials-say-11649794612">Ukraine Thwarts Cyberattack on Electric Grid, Officials Say </a>(Wall Street Journal) </p><p><a href="https://securityscorecard.com/blog/zhadnost-strikes-again-this-time-in-finland">Zhadnost strikes again… this time in Finland.</a> (SecurityScorecard)</p><p><a href="https://www.hackread.com/anonymous-hits-russian-ministry-of-culture-leaks-446gb-of-data/">Anonymous Hits Russian Ministry of Culture- Leaks 446GB of Data</a> (HackRead) </p><p><a href="https://www.microsoft.com/security/blog/2022/04/12/tarrask-malware-uses-scheduled-tasks-for-defense-evasion/">Tarrask malware uses scheduled tasks for defense evasion</a> (Microsoft Security Blog) </p><p><a href="https://www.fortinet.com/blog/threat-research/enemybot-a-look-into-keksecs-latest-ddos-botnet">Enemybot: A Look into Keksec's Latest DDoS Botnet</a> (Fortinet Blog) </p><p><a href="https://www.zdnet.com/article/enemybot-a-new-mirai-gafgyt-hybrid-botnet-joins-the-scene/#ftag=RSSbaffb68">Enemybot: a new Mirai, Gafgyt hybrid botnet joins the scene</a> (ZDNet) </p><p><a href="https://www.bleepingcomputer.com/news/security/qbot-malware-switches-to-new-windows-installer-infection-vector/">Qbot malware switches to new Windows Installer infection vector</a> (BleepingComputer) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/04/12/microsoft-releases-april-2022-security-updates">Microsoft Releases April 2022 Security Updates</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/04/12/google-releases-security-updates-chrome">Google Releases Security Updates for Chrome</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/04/12/citrix-releases-security-updates-multiple-products">Citrix Releases Security Updates for Multiple Products</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/04/12/apache-releases-security-advisory-struts-2">Apache Releases Security Advisory for Struts 2</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-102-01">Valmet DNA</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-102-02">Mitsubishi Electric MELSEC-Q Series C Controller Module</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-102-03">Inductive Automation Ignition</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-102-04">Mitsubishi Electric GT25-WLAN</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-102-05">Aethon TUG Home Base Server</a> (CISA) </p><p><a href="https://www.reuters.com/world/us-crypto-researcher-sentenced-five-years-helping-north-korea-evade-sanctions-2022-04-12/">U.S. crypto researcher sentenced to five years for helping North Korea evade sanctions</a> (Reuters)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1487</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b10ea3b4-7881-11ec-90a9-53a70b834d74]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8322807291.mp3?updated=1690304588" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber takes point in a hybrid war. Medical robot vulnerabilities remediated. A Cyber Civil Defense for the US? Europol leads the takedown of RaidForums.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1555/notes</link>
      <description>GRU deploys Industroyer2 against the Ukrainian energy sector. NB65 counts coup against Roscosmos. Anonymous doxes three more Russian companies. President Putin purges the FSB’s Fifth Service. CISA warns of an exploited firewall vulnerability. Medical robots’ vulnerabilities are remediated. A Cyber Civil Defense effort in the US. Ben Yelin on newly passed cyber legislation. Our guest is Chase Snyder from ExtraHop to discuss their recent Cyber Confidence Index. And good riddance to RaidForums.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/70

Selected reading.
Russia’s Reset (New York Times)
Russia will not pause military operation in Ukraine for peace talks (Reuters) 
Industroyer2: Industroyer reloaded | WeLiveSecurity (WeLiveSecurity)
CERT-UA warns of large-scale cyber attack on energy sector (Interfax-Ukraine)
Russia's space programme hit by western cyber attack (The Telegraph)
Anonymous Hits 3 Russian Entities, Leaks 400 GB Worth of Emails (HackRead) 
Russia’s Ukraine Propaganda Has Turned Fully Genocidal (Foreign Policy) 
Russia-Ukraine latest news: Vladimir Putin vows ‘clear and noble’ aims of Russian invasion will be achieved (The Telegraph)
CISA warns orgs of WatchGuard bug exploited by Russian state hackers (BleepingComputer)
CISA Adds Eight Known Exploited Vulnerabilities to Catalog (CISA) 
Cynerio Discovers and Discloses JekyllBot:5, a Series of Critical Zero-Day Vulnerabilities Allowing Attackers to Remotely Control Hospital Robots (Cynerio)
Craig Newmark Philanthropies Pledges $50 Million to Cyber Civil Defense (Global Cyber Alliance) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Apr 2022 20:15:00 -0000</pubDate>
      <itunes:title>Cyber takes point in a hybrid war. Medical robot vulnerabilities remediated. A Cyber Civil Defense for the US? Europol leads the takedown of RaidForums.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1555</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>GRU deploys Industroyer2 against the Ukrainian energy sector. NB65 counts coup against Roscosmos. Anonymous doxes three more Russian companies. President Putin purges the FSB’s Fifth Service. CISA warns of an exploited firewall vulnerability. Medical robots’ vulnerabilities are remediated. A Cyber Civil Defense effort in the US. Ben Yelin on newly passed cyber legislation. Our guest is Chase Snyder from ExtraHop to discuss their recent Cyber Confidence Index. And good riddance to RaidForums.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/70

Selected reading.
Russia’s Reset (New York Times)
Russia will not pause military operation in Ukraine for peace talks (Reuters) 
Industroyer2: Industroyer reloaded | WeLiveSecurity (WeLiveSecurity)
CERT-UA warns of large-scale cyber attack on energy sector (Interfax-Ukraine)
Russia's space programme hit by western cyber attack (The Telegraph)
Anonymous Hits 3 Russian Entities, Leaks 400 GB Worth of Emails (HackRead) 
Russia’s Ukraine Propaganda Has Turned Fully Genocidal (Foreign Policy) 
Russia-Ukraine latest news: Vladimir Putin vows ‘clear and noble’ aims of Russian invasion will be achieved (The Telegraph)
CISA warns orgs of WatchGuard bug exploited by Russian state hackers (BleepingComputer)
CISA Adds Eight Known Exploited Vulnerabilities to Catalog (CISA) 
Cynerio Discovers and Discloses JekyllBot:5, a Series of Critical Zero-Day Vulnerabilities Allowing Attackers to Remotely Control Hospital Robots (Cynerio)
Craig Newmark Philanthropies Pledges $50 Million to Cyber Civil Defense (Global Cyber Alliance) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>GRU deploys Industroyer2 against the Ukrainian energy sector. NB65 counts coup against Roscosmos. Anonymous doxes three more Russian companies. President Putin purges the FSB’s Fifth Service. CISA warns of an exploited firewall vulnerability. Medical robots’ vulnerabilities are remediated. A Cyber Civil Defense effort in the US. Ben Yelin on newly passed cyber legislation. Our guest is Chase Snyder from ExtraHop to discuss their recent Cyber Confidence Index. And good riddance to RaidForums.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/70</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.nytimes.com/2022/04/11/briefing/russia-invasion-ukraine-east-donbas.html">Russia’s Reset</a> (New York Times)</p><p><a href="https://www.reuters.com/world/europe/russia-will-not-pause-military-operation-ukraine-peace-talks-2022-04-11/">Russia will not pause military operation in Ukraine for peace talks</a> (Reuters) </p><p><a href="https://www.welivesecurity.com/2022/04/12/industroyer2-industroyer-reloaded/">Industroyer2: Industroyer reloaded | WeLiveSecurity</a> (WeLiveSecurity)</p><p><a href="https://en.interfax.com.ua/news/telecom/823470.html">CERT-UA warns of large-scale cyber attack on energy sector</a> (Interfax-Ukraine)</p><p><a href="https://www.telegraph.co.uk/business/2022/04/11/russias-space-programme-hit-western-cyber-attack/">Russia's space programme hit by western cyber attack</a> (The Telegraph)</p><p><a href="https://www.hackread.com/anonymous-hits-russian-entities-leaks-400-gb-emails/">Anonymous Hits 3 Russian Entities, Leaks 400 GB Worth of Emails</a> (HackRead) </p><p><a href="https://foreignpolicy.com/2022/04/09/russia-putin-propaganda-ukraine-war-crimes-atrocities/">Russia’s Ukraine Propaganda Has Turned Fully Genocidal</a> (Foreign Policy) </p><p><a href="https://www.telegraph.co.uk/world-news/2022/04/11/ukraine-war-russia-latest-news-zelensky-mariupol-kyiv-putin/">Russia-Ukraine latest news: Vladimir Putin vows ‘clear and noble’ aims of Russian invasion will be achieved</a> (The Telegraph)</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-warns-orgs-of-watchguard-bug-exploited-by-russian-state-hackers/">CISA warns orgs of WatchGuard bug exploited by Russian state hackers</a> (BleepingComputer)</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/04/11/cisa-adds-eight-known-exploited-vulnerabilities-catalog">CISA Adds Eight Known Exploited Vulnerabilities to Catalog</a> (CISA) </p><p><a href="https://www.cynerio.com/blog/cynerio-discovers-and-discloses-jekyllbot-5-a-series-of-critical-zero-day-vulnerabilities-allowing-attackers-to-remotely-control-hospital-robots">Cynerio Discovers and Discloses JekyllBot:5, a Series of Critical Zero-Day Vulnerabilities Allowing Attackers to Remotely Control Hospital Robots</a> (Cynerio)</p><p><a href="https://www.globalcyberalliance.org/cyber-civil-defense/">Craig Newmark Philanthropies Pledges $50 Million to Cyber Civil Defense</a> (Global Cyber Alliance) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1569</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b1b4bc54-7881-11ec-90a9-9b642f1186c9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7360269223.mp3?updated=1690304515" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber skirmishing as Russia redeploys in Ukraine. Spyware in senior EC official’s device. Sharkbot-infested apps ejected from Google Play. Advice from CISA.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1554/notes</link>
      <description>US National Security Advisor says atrocities were part of Russia's plan. Russian commanders seek to keep troops away from dangerous sections of the Internet. Cyberattacks in Finland may be a shot across Helsinki's bow. CERT-UA warns of a phishing campaign. Hacktivists hit Russian organizations. Mixed reviews for US preemptive measures against GRU botnets. Sharkbot-infested apps ejected from Google Play. Johannes Ullrich from SANS on malicious ISO files embedded in HTML. Our guest is Neal Dennis from Cyware on threat intel sharing with members of Auto-ISAC. What you should do when your Shields are Up.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/69

Selected reading.
Russia Shuffles Command in Ukraine as Thousands Flee the East (New York Times) 
Sullivan: Intel indicates plan from ‘highest levels’ of Russian government to target civilians (The Hill) 
Russian soldiers banned from social media as ‘uncomfortable truths’ drain their morale (The Telegraph) 
West Seeks to Pierce Russia’s Digital Iron Curtain (Foreign Policy)
YouTube blocks Russian parliament channel, drawing ire from officials (Reuters) 
U.S. quietly paying millions to send Starlink terminals to Ukraine, contrary to SpaceX claims (Washington Post)
Hackers use Conti's leaked ransomware to attack Russian companies (BleepingComputer) 
Державна служба спеціального зв’язку та захисту інформації України (GUR)
How Russia's Invasion Triggered a US Crackdown on Its Hackers (Wired)
The U.S. Opens a Risky New Front in Cyberdefense (Bloomberg) 
Meet the 1,300 librarians racing to back up Ukraine’s digital archives (Washington Post) 
The Race to Save Posts That May Prove Russian War Crimes (Wired) 
Exclusive: Senior EU officials were targeted with Israeli spyware (Reuters) 
SharkBot Android Malware Continues Popping Up on Google Play (SecurityWeek) 
SharkBot Banking Trojan spreads through fake AV apps on Google Play (Security Affairs) 
Sharing Cyber Event Information: Observe, Act, Report (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 11 Apr 2022 20:15:00 -0000</pubDate>
      <itunes:title>Cyber skirmishing as Russia redeploys in Ukraine. Spyware in senior EC official’s device. Sharkbot-infested apps ejected from Google Play. Advice from CISA.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1554</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>US National Security Advisor says atrocities were part of Russia's plan. Russian commanders seek to keep troops away from dangerous sections of the Internet. Cyberattacks in Finland may be a shot across Helsinki's bow. CERT-UA warns of a phishing campaign. Hacktivists hit Russian organizations. Mixed reviews for US preemptive measures against GRU botnets. Sharkbot-infested apps ejected from Google Play. Johannes Ullrich from SANS on malicious ISO files embedded in HTML. Our guest is Neal Dennis from Cyware on threat intel sharing with members of Auto-ISAC. What you should do when your Shields are Up.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/69

Selected reading.
Russia Shuffles Command in Ukraine as Thousands Flee the East (New York Times) 
Sullivan: Intel indicates plan from ‘highest levels’ of Russian government to target civilians (The Hill) 
Russian soldiers banned from social media as ‘uncomfortable truths’ drain their morale (The Telegraph) 
West Seeks to Pierce Russia’s Digital Iron Curtain (Foreign Policy)
YouTube blocks Russian parliament channel, drawing ire from officials (Reuters) 
U.S. quietly paying millions to send Starlink terminals to Ukraine, contrary to SpaceX claims (Washington Post)
Hackers use Conti's leaked ransomware to attack Russian companies (BleepingComputer) 
Державна служба спеціального зв’язку та захисту інформації України (GUR)
How Russia's Invasion Triggered a US Crackdown on Its Hackers (Wired)
The U.S. Opens a Risky New Front in Cyberdefense (Bloomberg) 
Meet the 1,300 librarians racing to back up Ukraine’s digital archives (Washington Post) 
The Race to Save Posts That May Prove Russian War Crimes (Wired) 
Exclusive: Senior EU officials were targeted with Israeli spyware (Reuters) 
SharkBot Android Malware Continues Popping Up on Google Play (SecurityWeek) 
SharkBot Banking Trojan spreads through fake AV apps on Google Play (Security Affairs) 
Sharing Cyber Event Information: Observe, Act, Report (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>US National Security Advisor says atrocities were part of Russia's plan. Russian commanders seek to keep troops away from dangerous sections of the Internet. Cyberattacks in Finland may be a shot across Helsinki's bow. CERT-UA warns of a phishing campaign. Hacktivists hit Russian organizations. Mixed reviews for US preemptive measures against GRU botnets. Sharkbot-infested apps ejected from Google Play. Johannes Ullrich from SANS on malicious ISO files embedded in HTML. Our guest is Neal Dennis from Cyware on threat intel sharing with members of Auto-ISAC. What you should do when your Shields are Up.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/69</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.nytimes.com/2022/04/09/world/europe/russia-ukraine-general-kramatorsk.html">Russia Shuffles Command in Ukraine as Thousands Flee the East</a> (New York Times) </p><p><a href="https://thehill.com/news/3263435-sullivan-intel-indicates-plan-from-highest-levels-of-russian-government-to-target-civilians/">Sullivan: Intel indicates plan from ‘highest levels’ of Russian government to target civilians</a> (The Hill) </p><p><a href="https://www.telegraph.co.uk/world-news/2022/04/07/internet-ban-russian-soldiers-phones-ukrainian-propaganda-causes/">Russian soldiers banned from social media as ‘uncomfortable truths’ drain their morale</a> (The Telegraph) </p><p><a href="https://foreignpolicy.com/2022/04/08/west-russia-digital-iron-curtain-media/">West Seeks to Pierce Russia’s Digital Iron Curtain</a> (Foreign Policy)</p><p><a href="https://www.reuters.com/world/europe/youtube-blocks-russian-parliament-channel-drawing-ire-officials-2022-04-09/">YouTube blocks Russian parliament channel, drawing ire from officials</a> (Reuters) </p><p><a href="https://www.washingtonpost.com/politics/2022/04/08/us-quietly-paying-millions-send-starlink-terminals-ukraine-contrary-spacexs-claims/">U.S. quietly paying millions to send Starlink terminals to Ukraine, contrary to SpaceX claims</a> (Washington Post)</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-use-contis-leaked-ransomware-to-attack-russian-companies/">Hackers use Conti's leaked ransomware to attack Russian companies</a> (BleepingComputer) </p><p><a href="https://cip.gov.ua/en/news/uvaga-nova-kiberataka-grupi-armageddon-na-derzhavni-organi-ukrayini">Державна служба спеціального зв’язку та захисту інформації України</a> (GUR)</p><p><a href="https://www.wired.com/story/russia-ukraine-us-hacker-counterattack/">How Russia's Invasion Triggered a US Crackdown on Its Hackers</a> (Wired)</p><p><a href="https://www.bloomberg.com/opinion/articles/2022-04-08/u-s-opens-a-risky-new-front-in-cyber-defense">The U.S. Opens a Risky New Front in Cyberdefense</a> (Bloomberg) </p><p><a href="https://www.washingtonpost.com/technology/2022/04/08/ukraine-digital-history/">Meet the 1,300 librarians racing to back up Ukraine’s digital archives</a> (Washington Post) </p><p><a href="https://www.wired.com/story/open-source-russia-war-crimes-ukraine/">The Race to Save Posts That May Prove Russian War Crimes</a> (Wired) </p><p><a href="https://www.reuters.com/technology/exclusive-senior-eu-officials-were-targeted-with-israeli-spyware-sources-2022-04-11/">Exclusive: Senior EU officials were targeted with Israeli spyware</a> (Reuters) </p><p><a href="https://www.securityweek.com/sharkbot-android-malware-continues-popping-google-play">SharkBot Android Malware Continues Popping Up on Google Play</a> (SecurityWeek) </p><p><a href="https://securityaffairs.co/wordpress/130021/malware/sharkbot-banking-trojan-google-play.html">SharkBot Banking Trojan spreads through fake AV apps on Google Play</a> (Security Affairs) </p><p><a href="https://www.cisa.gov/sites/default/files/publications/Sharing_Cyber_Event_Information_Fact_Sheet_FINAL_v4.pdf?mod=djemCybersecruityPro&amp;tpl=cy">Sharing Cyber Event Information: Observe, Act, Report</a> (CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1464</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b2187f14-7881-11ec-90a9-3bf9507c1584]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1214932865.mp3?updated=1690304498" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chenxi Wang: Overcoming the obstacle of fear. [Venture Capital] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/95/notes</link>
      <description>Founder and general partner of Rain Capital, Chenxi shares her story and how she conquered and got over the obstacle of fear to reach her goals in life. " I realized a lot of times my obstacle is my own fear rather than a real obstacle" Wang states, she also shares her story of breaking glass ceilings as a female founder and working in the field of cybersecurity. She hopes to be remembered for being a kind person and developing her own venture fund, as she shares her story to the top, she states what she does and how she got to be where she is today. We thank Chenxi for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 10 Apr 2022 07:00:00 -0000</pubDate>
      <itunes:title>Chenxi Wang: Overcoming the obstacle of fear. [Venture Capital] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>95</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Founder and general partner of Rain Capital, Chenxi shares her story and how she conquered and got over the obstacle of fear to reach her goals in life. " I realized a lot of times my obstacle is my own fear rather than a real obstacle" Wang states, she also shares her story of breaking glass ceilings as a female founder and working in the field of cybersecurity. She hopes to be remembered for being a kind person and developing her own venture fund, as she shares her story to the top, she states what she does and how she got to be where she is today. We thank Chenxi for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Founder and general partner of Rain Capital, Chenxi shares her story and how she conquered and got over the obstacle of fear to reach her goals in life. " I realized a lot of times my obstacle is my own fear rather than a real obstacle" Wang states, she also shares her story of breaking glass ceilings as a female founder and working in the field of cybersecurity. She hopes to be remembered for being a kind person and developing her own venture fund, as she shares her story to the top, she states what she does and how she got to be where she is today. We thank Chenxi for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>592</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8199398c-b5d5-11ec-975f-c7d522179848]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8727850831.mp3?updated=1649270076" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The secrets behind Docker. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/227/notes</link>
      <description>Alon Zahavi from CyberArk, joins Dave Bittner on this episode to discuss CyberArk's work in conjunction with Patch Tuesday. CyberArk published about how Docker inadvertently created a new vulnerability and what happens when it's exploited.
CyberArk's research concluded that an attacker may execute files with capabilities or setuid files in order to escalate its privileges up to root level. CyberArk found the new vuln in some of Microsoft’s Docker images, caused by misuse of Linux capabilities, a powerful additional layer of security that gives admins the ability to assign capabilities and privileges to processes and files in the Linux system
The research can be found here:
How Docker Made Me More Capable and the Host Less Secure

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Apr 2022 07:00:00 -0000</pubDate>
      <itunes:title>The secrets behind Docker. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>227</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Alon Zahavi from CyberArk, joins Dave Bittner on this episode to discuss CyberArk's work in conjunction with Patch Tuesday. CyberArk published about how Docker inadvertently created a new vulnerability and what happens when it's exploited.
CyberArk's research concluded that an attacker may execute files with capabilities or setuid files in order to escalate its privileges up to root level. CyberArk found the new vuln in some of Microsoft’s Docker images, caused by misuse of Linux capabilities, a powerful additional layer of security that gives admins the ability to assign capabilities and privileges to processes and files in the Linux system
The research can be found here:
How Docker Made Me More Capable and the Host Less Secure

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Alon Zahavi from CyberArk, joins Dave Bittner on this episode to discuss CyberArk's work in conjunction with Patch Tuesday. CyberArk published about how Docker inadvertently created a new vulnerability and what happens when it's exploited.</p><p>CyberArk's research concluded that an attacker may execute files with capabilities or setuid files in order to escalate its privileges up to root level. CyberArk found the new vuln in some of Microsoft’s Docker images, caused by misuse of Linux capabilities, a powerful additional layer of security that gives admins the ability to assign capabilities and privileges to processes and files in the Linux system</p><p>The research can be found here:</p><ul><li><a href="https://www.cyberark.com/resources/threat-research-blog/how-docker-made-me-more-capable-and-the-host-less-secure">How Docker Made Me More Capable and the Host Less Secure</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1239</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a617d70c-b5bf-11ec-9076-8b9eaec222a5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8190977914.mp3?updated=1685126752" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Disinformation in Russia’s war of aggression. Correlating overhead imagery and radio intercepts. Taking down state-sponsored cyber ops. Threats to power grids.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1553/notes</link>
      <description>Russian disinformation in its war against Ukraine. Overhead imagery and electronic intercepts suggest that Russian atrocities are matters of policy and strategy. Microsoft disrupts GRU cyber operations. Facebook takes down Iranian coordinated inauthenticity. India’s Power Ministry says it stopped a Chinese cyberattack. Dave Dufour from Webroot on evolving attack mechanisms. Our guest is Dan Petro of Bishop Fox with a warning for document redaction. Grid security and the value of exercises.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/68

Selected reading.
Putin’s ‘probably given up’ on Kyiv as Ukraine war enters new phase (Defense News) 
Ukraine says 39 killed in rocket strike on rail evacuation hub (Reuters)
Russian rocket attack on Kramatorsk train station kills dozens—Ukraine (Newsweek) 
Possible Evidence of Russian Atrocities: German Intelligence Intercepts Radio Traffic Discussing the Murder of Civilians in Bucha (Der Spiegel)
Germany intercepts Russian talk of indiscriminate killings in Ukraine (Washington Post) 
Microsoft says it disrupted Russian cyberattacks targeting Ukraine, West (The Hill)
Disrupting cyberattacks targeting Ukraine - Microsoft On the Issues (Microsoft On the Issues) 
GridEx VI Lessons Learned Report (NERC)
Power Grid Stress Test Finds Low-Tech Needs for High-Tech Problems (Wall Street Journal) 
Dire grid hacking scenario sparked “shields up” approach to Russian threat (Medium)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 08 Apr 2022 20:15:00 -0000</pubDate>
      <itunes:title>Disinformation in Russia’s war of aggression. Correlating overhead imagery and radio intercepts. Taking down state-sponsored cyber ops. Threats to power grids.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1553</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Russian disinformation in its war against Ukraine. Overhead imagery and electronic intercepts suggest that Russian atrocities are matters of policy and strategy. Microsoft disrupts GRU cyber operations. Facebook takes down Iranian coordinated inauthenticity. India’s Power Ministry says it stopped a Chinese cyberattack. Dave Dufour from Webroot on evolving attack mechanisms. Our guest is Dan Petro of Bishop Fox with a warning for document redaction. Grid security and the value of exercises.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/68

Selected reading.
Putin’s ‘probably given up’ on Kyiv as Ukraine war enters new phase (Defense News) 
Ukraine says 39 killed in rocket strike on rail evacuation hub (Reuters)
Russian rocket attack on Kramatorsk train station kills dozens—Ukraine (Newsweek) 
Possible Evidence of Russian Atrocities: German Intelligence Intercepts Radio Traffic Discussing the Murder of Civilians in Bucha (Der Spiegel)
Germany intercepts Russian talk of indiscriminate killings in Ukraine (Washington Post) 
Microsoft says it disrupted Russian cyberattacks targeting Ukraine, West (The Hill)
Disrupting cyberattacks targeting Ukraine - Microsoft On the Issues (Microsoft On the Issues) 
GridEx VI Lessons Learned Report (NERC)
Power Grid Stress Test Finds Low-Tech Needs for High-Tech Problems (Wall Street Journal) 
Dire grid hacking scenario sparked “shields up” approach to Russian threat (Medium)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russian disinformation in its war against Ukraine. Overhead imagery and electronic intercepts suggest that Russian atrocities are matters of policy and strategy. Microsoft disrupts GRU cyber operations. Facebook takes down Iranian coordinated inauthenticity. India’s Power Ministry says it stopped a Chinese cyberattack. Dave Dufour from Webroot on evolving attack mechanisms. Our guest is Dan Petro of Bishop Fox with a warning for document redaction. Grid security and the value of exercises.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/68</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.defensenews.com/pentagon/2022/04/07/putins-probably-given-up-on-kyiv-as-ukraine-war-enters-new-phase/">Putin’s ‘probably given up’ on Kyiv as Ukraine war enters new phase</a> (Defense News) </p><p><a href="https://www.reuters.com/world/europe/russia-laments-tragedy-troop-deaths-ukraine-braces-major-offensive-2022-04-07/">Ukraine says 39 killed in rocket strike on rail evacuation hub</a> (Reuters)</p><p><a href="https://www.newsweek.com/ukraine-news-live-kramatorsk-train-station-bucha-russia-vladimir-putin-1696308">Russian rocket attack on Kramatorsk train station kills dozens—Ukraine</a> (Newsweek) </p><p><a href="https://www.spiegel.de/international/germany/possible-evidence-of-russian-atrocities-german-intelligence-intercepts-radio-traffic-discussing-the-murder-of-civilians-in-bucha-a-0a191c96-634f-4d07-8c5c-c4a772315b0d">Possible Evidence of Russian Atrocities: German Intelligence Intercepts Radio Traffic Discussing the Murder of Civilians in Bucha</a> (Der Spiegel)</p><p><a href="https://www.washingtonpost.com/world/2022/04/07/bucha-german-intelligence-radio-bnd-russia/">Germany intercepts Russian talk of indiscriminate killings in Ukraine</a> (Washington Post) </p><p><a href="https://thehill.com/policy/cybersecurity/3262268-microsoft-says-it-disrupted-russian-cyberattacks-targeting-ukraine-west/">Microsoft says it disrupted Russian cyberattacks targeting Ukraine, West</a> (The Hill)</p><p><a href="https://blogs.microsoft.com/on-the-issues/2022/04/07/cyberattacks-ukraine-strontium-russia/">Disrupting cyberattacks targeting Ukraine - Microsoft On the Issues</a> (Microsoft On the Issues) </p><p><a href="https://www.nerc.com/pa/CI/ESISAC/GridEx/GridEx%20VI%20Report.pdf">GridEx VI Lessons Learned Report</a> (NERC)</p><p><a href="https://www.wsj.com/articles/power-grid-stress-test-finds-low-tech-needs-for-high-tech-problems-11649410201">Power Grid Stress Test Finds Low-Tech Needs for High-Tech Problems </a>(Wall Street Journal) </p><p><a href="https://readme.security/dire-grid-hacking-scenario-sparked-shields-up-approach-to-russian-threat-6b407fae25d9">Dire grid hacking scenario sparked “shields up” approach to Russian threat</a> (Medium)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1388</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[afe2c510-7881-11ec-90a9-33c0cd34cee0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4429869412.mp3?updated=1690303369" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Blocking and tackling in the cyber phases of Russia’s hybrid war against Ukraine. Info-harvesting SDK. Recon into a power grid. Hydra Market indictment. Catphishing. Advance fee scams with a new twist.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1552/notes</link>
      <description>An update on US cyber defensive operations and the war in Ukraine. You can’t tell your oligarchs without a scorecard. Google ejects data-harvesting apps from Play. China preps the cyber battlespace against India’s power grid. More moves against Hydra Market. Bearded Barbie’s catphishing. Betsy Carmelite from BAH on a blueprint for achieving a secure and resilient dot gov. Our guest is Padraic O'Reilly from CyberSaint with a fresh look at ransomware. And your majesty, meet this here dissident, who also needs to move money for the best of reasons….

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/67

Selected reading.
Pentagon: Russia has fully withdrawn from Kyiv, Chernihiv (Washington Post) 
Zelenskyy tells UN: Act now on Russia or dissolve yourself altogether (Atlantic Council) 
DoJ takes down Russian botnet that targeted WatchGuard and Asus routers (ZDNet) 
FBI Disables "Cyclops Blink" Botnet Controlled by Russian Intelligence Agency (SecurityWeek) 
Justice Department Announces Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate (GRU) (US Department of Justice) 
Adversarial Threat Report (Meta)
Facebook cracks down on covert influence networks targeting Ukraine (Washington Post)
Russian-backed hackers broke into Facebook accounts of Ukrainian military officials (CBS News) 
Britain slaps sanctions on Russia’s biggest bank  (The Telegraph) 
Russia hit with new round of U.S. sanctions as Biden decries 'major war crimes' (Reuters) 
U.S. to Sanction Putin Children, Banks Over Bucha Atrocities (Bloomberg)
The Forbes Ultimate Guide To Russian Oligarchs (Forbes) 
Suspected Chinese Hackers Collect Intelligence From India’s Grid (Bloomberg) 
Continued Targeting of Indian Power Grid Assets by Chinese State-Sponsored Activity Group (Recorded Future) 
Operation Bearded Barbie: APT-C-23 Campaign Targeting Israeli Officials (Cybereason) 
Google Bans Apps With Hidden Data-Harvesting Software (Wall Street Journal)
The Nigerian Prince Scam, with a Russian Twist (Avanan)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 07 Apr 2022 20:15:00 -0000</pubDate>
      <itunes:title>Blocking and tackling in the cyber phases of Russia’s hybrid war against Ukraine. Info-harvesting SDK. Recon into a power grid. Hydra Market indictment. Catphishing. Advance fee scams with a new twist.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1552</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An update on US cyber defensive operations and the war in Ukraine. You can’t tell your oligarchs without a scorecard. Google ejects data-harvesting apps from Play. China preps the cyber battlespace against India’s power grid. More moves against Hydra Market. Bearded Barbie’s catphishing. Betsy Carmelite from BAH on a blueprint for achieving a secure and resilient dot gov. Our guest is Padraic O'Reilly from CyberSaint with a fresh look at ransomware. And your majesty, meet this here dissident, who also needs to move money for the best of reasons….

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/67

Selected reading.
Pentagon: Russia has fully withdrawn from Kyiv, Chernihiv (Washington Post) 
Zelenskyy tells UN: Act now on Russia or dissolve yourself altogether (Atlantic Council) 
DoJ takes down Russian botnet that targeted WatchGuard and Asus routers (ZDNet) 
FBI Disables "Cyclops Blink" Botnet Controlled by Russian Intelligence Agency (SecurityWeek) 
Justice Department Announces Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate (GRU) (US Department of Justice) 
Adversarial Threat Report (Meta)
Facebook cracks down on covert influence networks targeting Ukraine (Washington Post)
Russian-backed hackers broke into Facebook accounts of Ukrainian military officials (CBS News) 
Britain slaps sanctions on Russia’s biggest bank  (The Telegraph) 
Russia hit with new round of U.S. sanctions as Biden decries 'major war crimes' (Reuters) 
U.S. to Sanction Putin Children, Banks Over Bucha Atrocities (Bloomberg)
The Forbes Ultimate Guide To Russian Oligarchs (Forbes) 
Suspected Chinese Hackers Collect Intelligence From India’s Grid (Bloomberg) 
Continued Targeting of Indian Power Grid Assets by Chinese State-Sponsored Activity Group (Recorded Future) 
Operation Bearded Barbie: APT-C-23 Campaign Targeting Israeli Officials (Cybereason) 
Google Bans Apps With Hidden Data-Harvesting Software (Wall Street Journal)
The Nigerian Prince Scam, with a Russian Twist (Avanan)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An update on US cyber defensive operations and the war in Ukraine. You can’t tell your oligarchs without a scorecard. Google ejects data-harvesting apps from Play. China preps the cyber battlespace against India’s power grid. More moves against Hydra Market. Bearded Barbie’s catphishing. Betsy Carmelite from BAH on a blueprint for achieving a secure and resilient dot gov. Our guest is Padraic O'Reilly from CyberSaint with a fresh look at ransomware. And your majesty, meet this here dissident, who also needs to move money for the best of reasons….</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/67</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.washingtonpost.com/national-security/2022/04/06/pentagon-russia-withdraws-kyiv-chernihiv/">Pentagon: Russia has fully withdrawn from Kyiv, Chernihiv</a> (Washington Post) </p><p><a href="https://www.atlanticcouncil.org/blogs/ukrainealert/zelenskyy-tells-un-act-now-on-russia-or-dissolve-yourself-altogether/">Zelenskyy tells UN: Act now on Russia or dissolve yourself altogether</a> (Atlantic Council) </p><p><a href="https://www.zdnet.com/article/doj-takes-down-russian-botnet-that-targeted-watchguard-and-asus-routers/">DoJ takes down Russian botnet that targeted WatchGuard and Asus routers</a> (ZDNet) </p><p><a href="https://www.securityweek.com/fbi-disables-cyclops-blink-botnet-controlled-russian-intelligence-agency">FBI Disables "Cyclops Blink" Botnet Controlled by Russian Intelligence Agency</a> (SecurityWeek) </p><p><a href="https://www.justice.gov/opa/pr/justice-department-announces-court-authorized-disruption-botnet-controlled-russian-federation">Justice Department Announces Court-Authorized Disruption of Botnet Controlled by the Russian Federation’s Main Intelligence Directorate (GRU)</a> (US Department of Justice) </p><p><a href="https://about.fb.com/wp-content/uploads/2022/04/Meta-Quarterly-Adversarial-Threat-Report_Q1-2022.pdf">Adversarial Threat Report</a> (Meta)</p><p><a href="https://www.washingtonpost.com/technology/2022/04/07/facebook-covert-influence-ukraine/">Facebook cracks down on covert influence networks targeting Ukraine</a> (Washington Post)</p><p><a href="https://www.cbsnews.com/news/ukraine-military-officials-facebook-hackers-russia-belarus/">Russian-backed hackers broke into Facebook accounts of Ukrainian military officials</a> (CBS News) </p><p><a href="https://www.telegraph.co.uk/business/2022/04/06/ftse-100-markets-live-news-national-insurance-tax-energy/">Britain slaps sanctions on Russia’s biggest bank </a> (The Telegraph) </p><p><a href="https://www.reuters.com/world/us-allies-ban-investments-russia-sanction-banks-2022-04-06/">Russia hit with new round of U.S. sanctions as Biden decries 'major war crimes'</a> (Reuters) </p><p><a href="https://www.bloomberg.com/news/articles/2022-04-06/u-s-to-sanction-putin-s-children-banks-after-bucha-atrocities">U.S. to Sanction Putin Children, Banks Over Bucha Atrocities</a> (Bloomberg)</p><p><a href="https://www.forbes.com/sites/giacomotognini/2022/04/07/the-forbes-ultimate-guide-to-russian-oligarchs/">The Forbes Ultimate Guide To Russian Oligarchs</a> (Forbes) </p><p><a href="https://www.bloomberg.com/news/articles/2022-04-07/suspected-chinese-hackers-collect-intelligence-from-india-s-grid">Suspected Chinese Hackers Collect Intelligence From India’s Grid</a> (Bloomberg) </p><p><a href="https://www.recordedfuture.com/continued-targeting-of-indian-power-grid-assets/">Continued Targeting of Indian Power Grid Assets by Chinese State-Sponsored Activity Group</a> (Recorded Future) </p><p><a href="https://www.cybereason.com/blog/operation-bearded-barbie-apt-c-23-campaign-targeting-israeli-officials">Operation Bearded Barbie: APT-C-23 Campaign Targeting Israeli Officials</a> (Cybereason) </p><p><a href="https://www.wsj.com/articles/apps-with-hidden-data-harvesting-software-are-banned-by-google-11649261181">Google Bans Apps With Hidden Data-Harvesting Software</a> (Wall Street Journal)</p><p><a href="https://www.avanan.com/blog/the-nigerian-prince-scam-with-a-russian-twist">The Nigerian Prince Scam, with a Russian Twist</a> (Avanan)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1635</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b0cbbb3a-7881-11ec-90a9-b304c5af5134]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3554926109.mp3?updated=1690303354" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fire and cyber in Ukraine. Stone Panda (Cicada, APT10) expands its interests. Bogus e-commerce sites harvest banking credentials. Advice and guidance from CISA</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1551/notes</link>
      <description>There’s a maneuver lull in Russia’s hybrid war against Ukraine, but fire and cyber ops continue. The US provides cyber assistance to Ukraine. The Cicada call of Stone Panda. Phony e-commerce sites seek to harvest banking credentials. CISA offers some advice and some guidance. Hydra Market sanctioned. Awais Rashid from Bristol University on anonymous communication systems. Our guest is Armaan Mahbod of DTEX Systems with a look at supermalicious insiders. And the most popular password is...

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/66

Selected reading.
Russian military ‘weeks’ from being ready for new push as war takes its toll (The Telegraph)
Russia's failure to take down Kyiv was a defeat for the ages (AP NEWS)
U.S. Cyber Command providing cyber expertise and intelligence in Ukraine's fight against Russia (FedScoop) 
Cyber Command chief: U.S. has 'stepped up' to protect Ukraine's networks (The Record by Recorded Future) 
How Ukraine has defended itself against cyberattacks – lessons for the US (FIU News) 
Cicada: Chinese APT Group Widens Targeting in Recent Espionage Activity (Symantec) 
Fake e‑shops on the prowl for banking credentials using Android malware (WeLiveSecurity) 
CISA adds Spring4Shell vulnerability, Apple zero-days to exploited catalog (The Record by Recorded Future) 
LifePoint Informatics Patient Portal (CISA) 
Rockwell Automation ISaGRAF (CISA) 
Johnson Controls Metasys (CISA) 
Philips Vue PACS (Update A) (CISA)
Treasury Sanctions Russia-Based Hydra, World’s Largest Darknet Market, and Ransomware-Enabling Virtual Currency Exchange Garantex (U.S. Department of the Treasury)
Most Common Passwords 2022 - Is Yours on the List? (CyberNews)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 06 Apr 2022 20:15:00 -0000</pubDate>
      <itunes:title>Fire and cyber in Ukraine. Stone Panda (Cicada, APT10) expands its interests. Bogus e-commerce sites harvest banking credentials. Advice and guidance from CISA</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1551</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>There’s a maneuver lull in Russia’s hybrid war against Ukraine, but fire and cyber ops continue. The US provides cyber assistance to Ukraine. The Cicada call of Stone Panda. Phony e-commerce sites seek to harvest banking credentials. CISA offers some advice and some guidance. Hydra Market sanctioned. Awais Rashid from Bristol University on anonymous communication systems. Our guest is Armaan Mahbod of DTEX Systems with a look at supermalicious insiders. And the most popular password is...

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/66

Selected reading.
Russian military ‘weeks’ from being ready for new push as war takes its toll (The Telegraph)
Russia's failure to take down Kyiv was a defeat for the ages (AP NEWS)
U.S. Cyber Command providing cyber expertise and intelligence in Ukraine's fight against Russia (FedScoop) 
Cyber Command chief: U.S. has 'stepped up' to protect Ukraine's networks (The Record by Recorded Future) 
How Ukraine has defended itself against cyberattacks – lessons for the US (FIU News) 
Cicada: Chinese APT Group Widens Targeting in Recent Espionage Activity (Symantec) 
Fake e‑shops on the prowl for banking credentials using Android malware (WeLiveSecurity) 
CISA adds Spring4Shell vulnerability, Apple zero-days to exploited catalog (The Record by Recorded Future) 
LifePoint Informatics Patient Portal (CISA) 
Rockwell Automation ISaGRAF (CISA) 
Johnson Controls Metasys (CISA) 
Philips Vue PACS (Update A) (CISA)
Treasury Sanctions Russia-Based Hydra, World’s Largest Darknet Market, and Ransomware-Enabling Virtual Currency Exchange Garantex (U.S. Department of the Treasury)
Most Common Passwords 2022 - Is Yours on the List? (CyberNews)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>There’s a maneuver lull in Russia’s hybrid war against Ukraine, but fire and cyber ops continue. The US provides cyber assistance to Ukraine. The Cicada call of Stone Panda. Phony e-commerce sites seek to harvest banking credentials. CISA offers some advice and some guidance. Hydra Market sanctioned. Awais Rashid from Bristol University on anonymous communication systems. Our guest is Armaan Mahbod of DTEX Systems with a look at supermalicious insiders. And the most popular password is...</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/66</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.telegraph.co.uk/world-news/2022/04/05/ukraine-war-taking-toll-russias-soldiers-could-weeks-return/">Russian military ‘weeks’ from being ready for new push as war takes its toll</a> (The Telegraph)</p><p><a href="https://apnews.com/article/russia-ukraine-putin-kyiv-europe-dc559574ce9f6683668fa221af2d5340">Russia's failure to take down Kyiv was a defeat for the ages</a> (AP NEWS)</p><p><a href="https://www.fedscoop.com/u-s-cyber-command-providing-cyber-expertise-and-intelligence-in-ukraines-fight-against-russia/">U.S. Cyber Command providing cyber expertise and intelligence in Ukraine's fight against Russia</a> (FedScoop) </p><p><a href="https://therecord.media/cyber-command-chief-u-s-has-stepped-up-to-protect-ukraines-networks/">Cyber Command chief: U.S. has 'stepped up' to protect Ukraine's networks</a> (The Record by Recorded Future) </p><p><a href="https://news.fiu.edu/2022/how-ukraine-has-defended-itself-against-cyberattacks-lessons-for-theus">How Ukraine has defended itself against cyberattacks – lessons for the US</a> (FIU News) </p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/cicada-apt10-china-ngo-government-attacks">Cicada: Chinese APT Group Widens Targeting in Recent Espionage Activity</a> (Symantec) </p><p><a href="https://www.welivesecurity.com/2022/04/06/fake-eshops-prowl-banking-credentials-android-malware/">Fake e‑shops on the prowl for banking credentials using Android malware</a> (WeLiveSecurity) </p><p><a href="https://therecord.media/cisa-adds-spring4shell-vulnerability-apple-zero-days-to-exploited-catalog/">CISA adds Spring4Shell vulnerability, Apple zero-days to exploited catalog</a> (The Record by Recorded Future) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsma-22-095-01">LifePoint Informatics Patient Portal</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-095-01">Rockwell Automation ISaGRAF</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-095-02">Johnson Controls Metasys</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsma-21-187-01">Philips Vue PACS (Update A)</a> (CISA)</p><p><a href="https://home.treasury.gov/news/press-releases/jy0701">Treasury Sanctions Russia-Based Hydra, World’s Largest Darknet Market, and Ransomware-Enabling Virtual Currency Exchange Garantex</a> (U.S. Department of the Treasury)</p><p><a href="https://cybernews.com/best-password-managers/most-common-passwords/">Most Common Passwords 2022 - Is Yours on the List?</a> (CyberNews)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1472</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b0ed5056-7881-11ec-90a9-1b5fb1618bad]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4383004827.mp3?updated=1690303336" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Disinformation at the UN. Phishing against Ukraine. Hydra Market taken down. Is someone carrying on for Lapsus$? Compromise at Mailchimp. FIN7 branches out into ransomware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1550/notes</link>
      <description>Disinformation at the UN. Russian cyber operations against Ukraine. Bravo, BKA: German police take down a major contraband market. Under arrest but still in business? At least someone’s carrying on for Lapsus$. Compromise at Mailchimp. Joe Carrigan describes Javascript vulnerabilities. Carole Theriault with an eye on romance scams through the lens of Netflix's "The Tinder Swindler". And a well-known gang branches out.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/65

Selected reading.
Live Updates: U.N. Security Council to Meet as Evidence of War Crimes Mounts (New York Times) 
Elephant Framework Delivered in Phishing Attacks against Ukrainian Organizations (Intezer) 
Germany takes down Hydra, world's largest darknet market (BleepingComputer)
LAPSUS$ hacks continue despite two hacker suspects in court (Naked Security) 
FIN7 hackers evolve toolset, work with multiple ransomware gangs (BleepingComputer)
Notorious hacking group FIN7 adds ransomware to its repertoire (CyberScoop)
Hackers breach MailChimp's internal tools to target crypto customers (BleepingComputer) 
Email marketing giant Mailchimp has confirmed a data breach (TechCrunch) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Apr 2022 20:15:00 -0000</pubDate>
      <itunes:title>Disinformation at the UN. Phishing against Ukraine. Hydra Market taken down. Is someone carrying on for Lapsus$? Compromise at Mailchimp. FIN7 branches out into ransomware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1550</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Disinformation at the UN. Russian cyber operations against Ukraine. Bravo, BKA: German police take down a major contraband market. Under arrest but still in business? At least someone’s carrying on for Lapsus$. Compromise at Mailchimp. Joe Carrigan describes Javascript vulnerabilities. Carole Theriault with an eye on romance scams through the lens of Netflix's "The Tinder Swindler". And a well-known gang branches out.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/65

Selected reading.
Live Updates: U.N. Security Council to Meet as Evidence of War Crimes Mounts (New York Times) 
Elephant Framework Delivered in Phishing Attacks against Ukrainian Organizations (Intezer) 
Germany takes down Hydra, world's largest darknet market (BleepingComputer)
LAPSUS$ hacks continue despite two hacker suspects in court (Naked Security) 
FIN7 hackers evolve toolset, work with multiple ransomware gangs (BleepingComputer)
Notorious hacking group FIN7 adds ransomware to its repertoire (CyberScoop)
Hackers breach MailChimp's internal tools to target crypto customers (BleepingComputer) 
Email marketing giant Mailchimp has confirmed a data breach (TechCrunch) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Disinformation at the UN. Russian cyber operations against Ukraine. Bravo, BKA: German police take down a major contraband market. Under arrest but still in business? At least someone’s carrying on for Lapsus$. Compromise at Mailchimp. Joe Carrigan describes Javascript vulnerabilities. Carole Theriault with an eye on romance scams through the lens of Netflix's "The Tinder Swindler". And a well-known gang branches out.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/65</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.nytimes.com/live/2022/04/05/world/ukraine-russia-war">Live Updates: U.N. Security Council to Meet as Evidence of War Crimes Mounts</a> (New York Times) </p><p><a href="https://www.intezer.com/blog/research/elephant-malware-targeting-ukrainian-orgs/">Elephant Framework Delivered in Phishing Attacks against Ukrainian Organizations</a> (Intezer) </p><p><a href="https://www.bleepingcomputer.com/news/legal/germany-takes-down-hydra-worlds-largest-darknet-market/">Germany takes down Hydra, world's largest darknet market</a> (BleepingComputer)</p><p><a href="https://nakedsecurity.sophos.com/2022/04/04/lapsus-hacks-continue-despite-two-uk-hacker-suspects-in-court/">LAPSUS$ hacks continue despite two hacker suspects in court</a> (Naked Security) </p><p><a href="https://www.bleepingcomputer.com/news/security/fin7-hackers-evolve-toolset-work-with-multiple-ransomware-gangs/">FIN7 hackers evolve toolset, work with multiple ransomware gangs</a> (BleepingComputer)</p><p><a href="https://www.cyberscoop.com/fin7-ransomware-mandiant/">Notorious hacking group FIN7 adds ransomware to its repertoire</a> (CyberScoop)</p><p><a href="https://www.bleepingcomputer.com/news/security/hackers-breach-mailchimps-internal-tools-to-target-crypto-customers/">Hackers breach MailChimp's internal tools to target crypto customers</a> (BleepingComputer) </p><p><a href="https://techcrunch.com/2022/04/04/mailchimp-internal-tool-breach/">Email marketing giant Mailchimp has confirmed a data breach</a> (TechCrunch) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1349</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b1d61b74-7881-11ec-90a9-d3139f76d278]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9157151164.mp3?updated=1690303319" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Doxing, trolling, and censorship in a hybrid war. Borat RAT. State’s Bureau of Cyberspace and Digital Policy. National Supply Chain Integrity Month. Wild youth. Hey spooks: brown bag it like the GRU.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1549/notes</link>
      <description>Doxing, trolling, and censorship in a hybrid war. Western organizations remain on alert for a Russian cyber campaign. Known Russian threat actors continue operations against Ukraine proper. Borat RAT described. Welcome the US State Department’s Bureau of Cyberspace and Digital Policy. National Supply Chain Integrity Month. Your wild ways will break your mother’s heart. Rick Howard weighs in on Shields Up. Josh Ray from Accenture on ideological differences on underground forums. And fast food as an OPSEC issue (and an OSINT source).

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/64

Selected reading.
Ukraine intelligence leaks names of 620 alleged Russian FSB agents (Security Affairs) 
Anonymous leaked 15 GB of data allegedly stolen from the Russian Orthodox Church (Security Affairs) 
Listen Now: Deputy national security adviser talks about the risk of Russia waging cyberwar (NPR One) 
Inside Cyber Front Z, the ‘People’s Movement’ Spreading Russian Propaganda (Vice)
Ukraine Accuses Russia of Using WhatsApp Bot Farm to Ask Military to Surrender (Vice)
‘It’s like 1937’: Informants denounce anti-Ukraine war Russians (The Telegraph) 
Cyber Espionage Actor Deploying Malware Using Excel (Bank Info Security)
New Borat remote access malware is no laughing matter (BleepingComputer)
Deep Dive Analysis – Borat RAT (Cyble)
Establishment of the Bureau of Cyberspace and Digital Policy (United States Department of State) 
Supply Chain Integrity Month (CISA) April is National Supply Chain Integrity Month.
As Russia Plots Its Next Move, an AI Listens to the Chatter (Wired) 
Data leak from Russian delivery app shows dining habits of the secret police (The Verge) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 04 Apr 2022 20:30:00 -0000</pubDate>
      <itunes:title>Doxing, trolling, and censorship in a hybrid war. Borat RAT. State’s Bureau of Cyberspace and Digital Policy. National Supply Chain Integrity Month. Wild youth. Hey spooks: brown bag it like the GRU.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1549</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Doxing, trolling, and censorship in a hybrid war. Western organizations remain on alert for a Russian cyber campaign. Known Russian threat actors continue operations against Ukraine proper. Borat RAT described. Welcome the US State Department’s Bureau of Cyberspace and Digital Policy. National Supply Chain Integrity Month. Your wild ways will break your mother’s heart. Rick Howard weighs in on Shields Up. Josh Ray from Accenture on ideological differences on underground forums. And fast food as an OPSEC issue (and an OSINT source).

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/64

Selected reading.
Ukraine intelligence leaks names of 620 alleged Russian FSB agents (Security Affairs) 
Anonymous leaked 15 GB of data allegedly stolen from the Russian Orthodox Church (Security Affairs) 
Listen Now: Deputy national security adviser talks about the risk of Russia waging cyberwar (NPR One) 
Inside Cyber Front Z, the ‘People’s Movement’ Spreading Russian Propaganda (Vice)
Ukraine Accuses Russia of Using WhatsApp Bot Farm to Ask Military to Surrender (Vice)
‘It’s like 1937’: Informants denounce anti-Ukraine war Russians (The Telegraph) 
Cyber Espionage Actor Deploying Malware Using Excel (Bank Info Security)
New Borat remote access malware is no laughing matter (BleepingComputer)
Deep Dive Analysis – Borat RAT (Cyble)
Establishment of the Bureau of Cyberspace and Digital Policy (United States Department of State) 
Supply Chain Integrity Month (CISA) April is National Supply Chain Integrity Month.
As Russia Plots Its Next Move, an AI Listens to the Chatter (Wired) 
Data leak from Russian delivery app shows dining habits of the secret police (The Verge) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Doxing, trolling, and censorship in a hybrid war. Western organizations remain on alert for a Russian cyber campaign. Known Russian threat actors continue operations against Ukraine proper. Borat RAT described. Welcome the US State Department’s Bureau of Cyberspace and Digital Policy. National Supply Chain Integrity Month. Your wild ways will break your mother’s heart. Rick Howard weighs in on Shields Up. Josh Ray from Accenture on ideological differences on underground forums. And fast food as an OPSEC issue (and an OSINT source).</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/64</p><p><br></p><h2>Selected reading.</h2><p><a href="https://securityaffairs.co/wordpress/129736/cyber-warfare-2/ukraine-intelligence-leaks-names-of-620-alleged-russian-fsb-agents.html">Ukraine intelligence leaks names of 620 alleged Russian FSB agents</a> (Security Affairs) </p><p><a href="https://securityaffairs.co/wordpress/129760/hacktivism/anonymous-hacked-russian-orthodox-church.html">Anonymous leaked 15 GB of data allegedly stolen from the Russian Orthodox Church</a> (Security Affairs) </p><p><a href="https://one.npr.org/?sharedMediaId=1090355053:1090355054">Listen Now: Deputy national security adviser talks about the risk of Russia waging cyberwar</a> (NPR One) </p><p><a href="https://www.vice.com/en/article/7kbjny/russia-cyber-front-z-telegram">Inside Cyber Front Z, the ‘People’s Movement’ Spreading Russian Propaganda</a> (Vice)</p><p><a href="https://www.vice.com/en/article/5dgemn/ukraine-accuses-russia-of-using-whatsapp-bot-farm-to-ask-military-to-surrender">Ukraine Accuses Russia of Using WhatsApp Bot Farm to Ask Military to Surrender</a> (Vice)</p><p><a href="https://www.telegraph.co.uk/world-news/2022/04/02/like-1937-informants-denounce-anti-ukraine-war-russians/">‘It’s like 1937’: Informants denounce anti-Ukraine war Russians</a> (The Telegraph) </p><p><a href="https://www.bankinfosecurity.com/cyber-espionage-actor-deploying-malware-using-excel-a-18830">Cyber Espionage Actor Deploying Malware Using Excel</a> (Bank Info Security)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-borat-remote-access-malware-is-no-laughing-matter/">New Borat remote access malware is no laughing matter</a> (BleepingComputer)</p><p><a href="https://blog.cyble.com/2022/03/31/deep-dive-analysis-borat-rat/">Deep Dive Analysis – Borat RAT</a> (Cyble)</p><p><a href="https://www.state.gov/establishment-of-the-bureau-of-cyberspace-and-digital-policy/">Establishment of the Bureau of Cyberspace and Digital Policy</a> (United States Department of State) </p><p><a href="https://www.cisa.gov/supply-chain-integrity-month">Supply Chain Integrity Month</a> (CISA) April is National Supply Chain Integrity Month.</p><p><a href="https://www.wired.com/story/russia-ukraine-war-ai-surveillance/">As Russia Plots Its Next Move, an AI Listens to the Chatter</a> (Wired) </p><p><a href="https://www.theverge.com/2022/4/3/23008658/data-leak-russian-delivery-app-dining-habits-secret-police-yandex-food">Data leak from Russian delivery app shows dining habits of the secret police</a> (The Verge) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1730</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b1f75910-7881-11ec-90a9-976ae00dc833]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2777809938.mp3?updated=1690303307" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Living security: the current state of XDR. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/28/notes</link>
      <description>In this CyberWire-X episode, host Rick Howard, the CyberWire's CSO, Chief Analyst and Senior Fellow, explores the state of XDR. Joining Rick on this episode are Ted Wagner, SAP National Security Services CISO and CyberWire Hash Table member, and from episode sponsor Trellix are Bryan Palma, the Trellix Chief Executive Officer, and John Fokker, the Trellix Head of Cyber Investigations. Listen as Rick and guests discuss XDR, SASE, SIEM, and SOAR.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 03 Apr 2022 07:00:00 -0000</pubDate>
      <itunes:title>Living security: the current state of XDR. [CyberWire-X]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>28</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this CyberWire-X episode, host Rick Howard, the CyberWire's CSO, Chief Analyst and Senior Fellow, explores the state of XDR. Joining Rick on this episode are Ted Wagner, SAP National Security Services CISO and CyberWire Hash Table member, and from episode sponsor Trellix are Bryan Palma, the Trellix Chief Executive Officer, and John Fokker, the Trellix Head of Cyber Investigations. Listen as Rick and guests discuss XDR, SASE, SIEM, and SOAR.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this CyberWire-X episode, host Rick Howard, the CyberWire's CSO, Chief Analyst and Senior Fellow, explores the state of XDR. Joining Rick on this episode are Ted Wagner, SAP National Security Services CISO and CyberWire Hash Table member, and from episode sponsor Trellix are Bryan Palma, the Trellix Chief Executive Officer, and John Fokker, the Trellix Head of Cyber Investigations. Listen as Rick and guests discuss XDR, SASE, SIEM, and SOAR.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1768</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8b1026d4-b1f1-11ec-b02a-cb30aa6ab790]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3562977988.mp3?updated=1648762671" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Michael DeBolt: From acting to cyber. [Intelligence] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/94/notes</link>
      <description>Chief intelligence officer at Intel 471, Michael shares his story where he started as an actor and quickly changed over to intelligence and what the transition was like for him. Michael grew up wanting to be an actor and even was able to land some acting jobs, after going into the Marine Corps he decided to leave acting behind and start a new path in his journey. He says looking for a purpose really helped to shape him, saying "looking back on it, I feel like my life purpose has really been all about kind of this relentless pursuit of justice" and how the risks in his life has helped to right the wrongs of the world. We thank Michael for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 03 Apr 2022 07:00:00 -0000</pubDate>
      <itunes:title>Michael DeBolt: From acting to cyber. [Intelligence] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>94</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Chief intelligence officer at Intel 471, Michael shares his story where he started as an actor and quickly changed over to intelligence and what the transition was like for him. </itunes:subtitle>
      <itunes:summary>Chief intelligence officer at Intel 471, Michael shares his story where he started as an actor and quickly changed over to intelligence and what the transition was like for him. Michael grew up wanting to be an actor and even was able to land some acting jobs, after going into the Marine Corps he decided to leave acting behind and start a new path in his journey. He says looking for a purpose really helped to shape him, saying "looking back on it, I feel like my life purpose has really been all about kind of this relentless pursuit of justice" and how the risks in his life has helped to right the wrongs of the world. We thank Michael for sharing his story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chief intelligence officer at Intel 471, Michael shares his story where he started as an actor and quickly changed over to intelligence and what the transition was like for him. Michael grew up wanting to be an actor and even was able to land some acting jobs, after going into the Marine Corps he decided to leave acting behind and start a new path in his journey. He says looking for a purpose really helped to shape him, saying "looking back on it, I feel like my life purpose has really been all about kind of this relentless pursuit of justice" and how the risks in his life has helped to right the wrongs of the world. We thank Michael for sharing his story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>353</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b1128bae-b103-11ec-a491-b779a7ee5620]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6153632543.mp3?updated=1648738989" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A popular malware scheme and pay-per-install services. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/226/notes</link>
      <description>Guest Michael DeBolt from Intel 471 joins Dave Bittner on this episode to discuss one of the most popular commodity malware loaders on the underground – PrivateLoader. The blog provides an analysis of campaigns since May 2021, full details on a Pay-per-install (PPI) malware service, the methods operators employ to obtain “installs,” and insights on the malware families the service delivers.
On Intel 471's blog, it shows the breakdown of how the PrivateLoader download is delivered and how it works. The blog states "Visitors are lured into clicking a “Download Crack” or “Download Now” button to obtain an allegedly cracked version of the software." Michael explains more about this popular commodity malware loader.
The research can be found here:
PrivateLoader: The first step in many malware schemes

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Apr 2022 07:00:00 -0000</pubDate>
      <itunes:title>A popular malware scheme and pay-per-install services. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>226</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Michael DeBolt from Intel 471 joins Dave Bittner on this episode to discuss one of the most popular commodity malware loaders on the underground – PrivateLoader. The blog provides an analysis of campaigns since May 2021, full details on a Pay-per-install (PPI) malware service, the methods operators employ to obtain “installs,” and insights on the malware families the service delivers.
On Intel 471's blog, it shows the breakdown of how the PrivateLoader download is delivered and how it works. The blog states "Visitors are lured into clicking a “Download Crack” or “Download Now” button to obtain an allegedly cracked version of the software." Michael explains more about this popular commodity malware loader.
The research can be found here:
PrivateLoader: The first step in many malware schemes

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Michael DeBolt from Intel 471 joins Dave Bittner on this episode to discuss one of the most popular commodity malware loaders on the underground – PrivateLoader. The blog provides an analysis of campaigns since May 2021, full details on a Pay-per-install (PPI) malware service, the methods operators employ to obtain “installs,” and insights on the malware families the service delivers.</p><p>On Intel 471's blog, it shows the breakdown of how the PrivateLoader download is delivered and how it works. The blog states "Visitors are lured into clicking a “Download Crack” or “Download Now” button to obtain an allegedly cracked version of the software." Michael explains more about this popular commodity malware loader.</p><p>The research can be found here:</p><ul><li><a href="https://intel471.com/blog/privateloader-malware">PrivateLoader: The first step in many malware schemes</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1160</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3db2ac1c-b1c5-11ec-951b-93ec2cc351ae]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1020410865.mp3?updated=1685126737" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Epistemic closure in a hybrid war. Wiper used against VIasat modems. US Treasury sanctions more Russian actors. Remediating Spring4shell. Notes from law enforcement. And we’re not joking. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1548/notes</link>
      <description>Attempting to evolve rules of cyber conduct during a hot hybrid war. Waiting for major Russian cyber operations. Viasat terminals were hit by wiper malware. Patches and detection scripts for Spring4shell. Warning of ransomware threat to local governments. Emergency data requests under Senatorial scrutiny. NSA employee charged with mishandling classified material. Andrea Little Limbago from Interos on Bots, Warriors and Trolls. Rick Howard speaks with Maretta Morovitz on cyber deception. And no April Foolin’ here

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/63

Selected reading.
Russia’s War Lacks a Battlefield Commander, U.S. Officials Say (New York Times) 
Putin may be self-isolating from his military advisers, says White House (The Telegraph) 
Confronting Russian Cyber Censorship (Wilson Center) 
Zelensky Fires Two Generals (Wall Street Journal) 
French intelligence chief Vidaud fired over Russian war failings (BBC News) 
Cyber War Talks Heat Up at UN With Russia at Table (Bloomberg.com)
Foreign Ministry statement on continued cyberattack by the “collective West” (Ministry of Foreign Affairs of the Russian Federation) 
New Protestware Found Lurking in Highly Popular NPM Package (Checkmarx.com)
Russia targeting Ukraine, countries opposing war in cyberspace (Jerusalem Post)
Conti Leaks: Examining the Panama Papers of Ransomware (Trellix) 
British intelligence agencies: Moscow continuously attacks Ukraine in cyberspace (The Times Hub)
AcidRain | A Modem Wiper Rains Down on Europe (SentinelOne)
SentinelOne finds ties between Viasat hack and Russian actor (SC Magazine)
ExtraHop CEO: Expect a Russian cyber response to sanctions (Register)
Treasury sanctions Russian research center blamed for Trisis malware (CyberScoop) 
Treasury Targets Sanctions Evasion Networks and Russian Technology Companies Enabling Putin’s War (U.S. Department of the Treasury)
Evgeny Viktorovich Gladkikh – Rewards For JusticeArtboard 4Artboard 4 (Rewards for Justice) 
Spring confirms ‘Spring4Shell’ zero-day, releases patched update (The Record by Recorded Future) 
Spring4Shell (CVE-2022-22965): Are you vulnerable to this Zero Day? (Cyber Security Works) 
Ransomware Attacks Straining Local US Governments and Public Services (IC3) 
Senate’s Wyden Probes Use of Forged Legal Requests by Hackers (Bloomberg) 
NSA Employee Charged with Mishandling Classified Material (Military.com)
National Security Agency Employee Indicted for Willful Transmission and Retention of National Defense Information (US Department of Justice) 
National Security Agency Employee Facing Federal Indictment for Willful Transmission and Retention of National Defense Information (US Department of Justice)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 01 Apr 2022 20:15:00 -0000</pubDate>
      <itunes:title>Epistemic closure in a hybrid war. Wiper used against VIasat modems. US Treasury sanctions more Russian actors. Remediating Spring4shell. Notes from law enforcement. And we’re not joking. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1548</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Attempting to evolve rules of cyber conduct during a hot hybrid war. Waiting for major Russian cyber operations. Viasat terminals were hit by wiper malware. Patches and detection scripts for Spring4shell. Warning of ransomware threat to local governments. Emergency data requests under Senatorial scrutiny. NSA employee charged with mishandling classified material. Andrea Little Limbago from Interos on Bots, Warriors and Trolls. Rick Howard speaks with Maretta Morovitz on cyber deception. And no April Foolin’ here

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/63

Selected reading.
Russia’s War Lacks a Battlefield Commander, U.S. Officials Say (New York Times) 
Putin may be self-isolating from his military advisers, says White House (The Telegraph) 
Confronting Russian Cyber Censorship (Wilson Center) 
Zelensky Fires Two Generals (Wall Street Journal) 
French intelligence chief Vidaud fired over Russian war failings (BBC News) 
Cyber War Talks Heat Up at UN With Russia at Table (Bloomberg.com)
Foreign Ministry statement on continued cyberattack by the “collective West” (Ministry of Foreign Affairs of the Russian Federation) 
New Protestware Found Lurking in Highly Popular NPM Package (Checkmarx.com)
Russia targeting Ukraine, countries opposing war in cyberspace (Jerusalem Post)
Conti Leaks: Examining the Panama Papers of Ransomware (Trellix) 
British intelligence agencies: Moscow continuously attacks Ukraine in cyberspace (The Times Hub)
AcidRain | A Modem Wiper Rains Down on Europe (SentinelOne)
SentinelOne finds ties between Viasat hack and Russian actor (SC Magazine)
ExtraHop CEO: Expect a Russian cyber response to sanctions (Register)
Treasury sanctions Russian research center blamed for Trisis malware (CyberScoop) 
Treasury Targets Sanctions Evasion Networks and Russian Technology Companies Enabling Putin’s War (U.S. Department of the Treasury)
Evgeny Viktorovich Gladkikh – Rewards For JusticeArtboard 4Artboard 4 (Rewards for Justice) 
Spring confirms ‘Spring4Shell’ zero-day, releases patched update (The Record by Recorded Future) 
Spring4Shell (CVE-2022-22965): Are you vulnerable to this Zero Day? (Cyber Security Works) 
Ransomware Attacks Straining Local US Governments and Public Services (IC3) 
Senate’s Wyden Probes Use of Forged Legal Requests by Hackers (Bloomberg) 
NSA Employee Charged with Mishandling Classified Material (Military.com)
National Security Agency Employee Indicted for Willful Transmission and Retention of National Defense Information (US Department of Justice) 
National Security Agency Employee Facing Federal Indictment for Willful Transmission and Retention of National Defense Information (US Department of Justice)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Attempting to evolve rules of cyber conduct during a hot hybrid war. Waiting for major Russian cyber operations. Viasat terminals were hit by wiper malware. Patches and detection scripts for Spring4shell. Warning of ransomware threat to local governments. Emergency data requests under Senatorial scrutiny. NSA employee charged with mishandling classified material. Andrea Little Limbago from Interos on Bots, Warriors and Trolls. Rick Howard speaks with Maretta Morovitz on cyber deception. And no April Foolin’ here</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/63</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.nytimes.com/2022/03/31/us/politics/russia-military-ukraine.html">Russia’s War Lacks a Battlefield Commander, U.S. Officials Say</a> (New York Times) </p><p><a href="https://www.telegraph.co.uk/world-news/2022/03/31/russia-ukraine-war-latest-news-peace-talks-putin-military/">Putin may be self-isolating from his military advisers, says White House</a> (The Telegraph) </p><p><a href="https://www.wilsoncenter.org/event/confronting-russian-cyber-censorship">Confronting Russian Cyber Censorship</a> (Wilson Center) </p><p><a href="https://www.wsj.com/livecoverage/russia-ukraine-latest-news-2022-04-01/card/president-zelensky-fires-two-generals-cASwBg7pfy4FKlh2f25t">Zelensky Fires Two Generals</a> (Wall Street Journal) </p><p><a href="https://www.bbc.com/news/world-europe-60938538">French intelligence chief Vidaud fired over Russian war failings</a> (BBC News) </p><p><a href="https://www.bloomberg.com/news/articles/2022-03-30/un-cyber-war-rules-meeting-grows-testy-with-russia-at-table">Cyber War Talks Heat Up at UN With Russia at Table</a> (Bloomberg.com)</p><p><a href="https://mid.ru/en/foreign_policy/news/1806906/">Foreign Ministry statement on continued cyberattack by the “collective West”</a> (Ministry of Foreign Affairs of the Russian Federation) </p><p><a href="https://checkmarx.com/blog/new-protestware-found-lurking-in-highly-popular-npm-package/">New Protestware Found Lurking in Highly Popular NPM Package</a> (Checkmarx.com)</p><p><a href="https://www.jpost.com/international/article-702859">Russia targeting Ukraine, countries opposing war in cyberspace</a> (Jerusalem Post)</p><p><a href="https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/conti-leaks-examining-the-panama-papers-of-ransomware.html">Conti Leaks: Examining the Panama Papers of Ransomware</a> (Trellix) </p><p><a href="https://thetimeshub.in/british-intelligence-agencies-moscow-continuously-attacks-ukraine-in-cyberspace">British intelligence agencies: Moscow continuously attacks Ukraine in cyberspace</a> (The Times Hub)</p><p><a href="https://www.sentinelone.com/labs/acidrain-a-modem-wiper-rains-down-on-europe/">AcidRain | A Modem Wiper Rains Down on Europe</a> (SentinelOne)</p><p><a href="https://www.scmagazine.com/analysis/critical-infrastructure/sentinelone-finds-loose-ties-between-viasat-hack-and-russian-actor">SentinelOne finds ties between Viasat hack and Russian actor</a> (SC Magazine)</p><p><a href="https://www.theregister.com/2022/03/31/extrahop_russian_sanctions/">ExtraHop CEO: Expect a Russian cyber response to sanctions</a> (Register)</p><p><a href="https://www.cyberscoop.com/gladkikh-trisis-russia-sanctions-treasury-ofac/">Treasury sanctions Russian research center blamed for Trisis malware</a> (CyberScoop) </p><p><a href="https://home.treasury.gov/news/press-releases/jy0692">Treasury Targets Sanctions Evasion Networks and Russian Technology Companies Enabling Putin’s War</a> (U.S. Department of the Treasury)</p><p><a href="https://rewardsforjustice.net/rewards/evgeny-viktorovich-gladkikh/">Evgeny Viktorovich Gladkikh – Rewards For JusticeArtboard 4Artboard 4</a> (Rewards for Justice) </p><p><a href="https://therecord.media/spring-confirms-spring4shell-zero-day-releases-patched-update/">Spring confirms ‘Spring4Shell’ zero-day, releases patched update</a> (The Record by Recorded Future) </p><p><a href="https://cybersecurityworks.com/blog/vulnerabilities/spring4shell-the-next-log4j.html">Spring4Shell (CVE-2022-22965): Are you vulnerable to this Zero Day?</a> (Cyber Security Works) </p><p><a href="https://www.ic3.gov/Media/News/2022/220330.pdf">Ransomware Attacks Straining Local US Governments and Public Services</a> (IC3) </p><p><a href="https://www.bloomberg.com/news/articles/2022-03-31/senate-s-wyden-probes-use-of-forged-legal-requests-by-hackers?srnd=technology-vp">Senate’s Wyden Probes Use of Forged Legal Requests by Hackers</a> (Bloomberg) </p><p><a href="https://www.military.com/daily-news/2022/03/31/nsa-employee-charged-mishandling-classified-material.html">NSA Employee Charged with Mishandling Classified Material</a> (Military.com)</p><p><a href="https://www.justice.gov/opa/pr/national-security-agency-employee-indicted-willful-transmission-and-retention-national">National Security Agency Employee Indicted for Willful Transmission and Retention of National Defense Information</a> (US Department of Justice) </p><p><a href="https://www.justice.gov/usao-md/pr/national-security-agency-employee-facing-federal-indictment-willful-transmission-and">National Security Agency Employee Facing Federal Indictment for Willful Transmission and Retention of National Defense Information</a> (US Department of Justice)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1486</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[afc15984-7881-11ec-90a9-ef06524cd129]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1312723747.mp3?updated=1690303226" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Moscow poorly served by its intelligence services, say London and Washington. Cyber phases of the hybrid war. A new zero-day, and some resurgent criminal activity.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1547/notes</link>
      <description>Russian cyber operators collect against domestic targets. More details on the Viasat hack. Ukrainian hacktivists say they can interfere with Russian geolocation. Spring4shell is another remote-code-execution problem. The Remcos Trojan is seeing a resurgence. Malicious links distributed via Calendly. Johannes Ullrich from SANS on attack surface detection. Our guest is Fleming Shi from Barracuda on cybersecurity champions. Phishing with “emergency data requests.” Lapsus$ may be back from vacation.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/62

Selected reading.
Vladimir Putin is being lied to by his advisers, says GCHQ (The Telegraph) 
U.S. intelligence suggests that Putin’s advisers misinformed him on Ukraine. (New York Times) 
White House: Intel shows Putin misled by advisers on Ukraine (AP NEWS) 
Russian troops sabotaging their own equipment and refusing orders in Ukraine, UK spy chief says (CNBC) 
Phishing campaign targets Russian govt dissidents with Cobalt Strike (BleepingComputer) 
KA-SAT Network cyber attack overview (Viasat.com) 
Tracking cyber activity in Eastern Europe (Google)
Ukrainian Hackers Take Aim at Russian Artillery, Navigation Signals (Defense One) 
Russian efforts in Ukraine have not yet spilled over into cyberattacks on US, says lawmaker (C4ISRNet)
New Spring Framework RCE Vulnerability Confirmed - What to do? (Sonatype) 
New Spring4Shell Zero-Day Vulnerability Confirmed: What it is and how to be prepared (Contrast Security)
Spring Core on JDK9+ is vulnerable to remote code execution (Praetorian) 
Spring4Shell: No need to panic, but mitigations are advised (Help Net Security) 
Remcos Trojan: Analyzing the Attack Chain (Morphisec) 
Apple and Meta Gave User Data to Hackers Who Used Forged Legal Requests (Bloomberg) 
Fresh Phish: Phishers Schedule Victims on Calendar App (INKY) 
Lapsus$ claims Globant as its latest breach victim (TechCrunch)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 31 Mar 2022 20:15:00 -0000</pubDate>
      <itunes:title>Moscow poorly served by its intelligence services, say London and Washington. Cyber phases of the hybrid war. A new zero-day, and some resurgent criminal activity.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1547</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Russian cyber operators collect against domestic targets. More details on the Viasat hack. Ukrainian hacktivists say they can interfere with Russian geolocation. Spring4shell is another remote-code-execution problem. The Remcos Trojan is seeing a resurgence. Malicious links distributed via Calendly. Johannes Ullrich from SANS on attack surface detection. Our guest is Fleming Shi from Barracuda on cybersecurity champions. Phishing with “emergency data requests.” Lapsus$ may be back from vacation.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/62

Selected reading.
Vladimir Putin is being lied to by his advisers, says GCHQ (The Telegraph) 
U.S. intelligence suggests that Putin’s advisers misinformed him on Ukraine. (New York Times) 
White House: Intel shows Putin misled by advisers on Ukraine (AP NEWS) 
Russian troops sabotaging their own equipment and refusing orders in Ukraine, UK spy chief says (CNBC) 
Phishing campaign targets Russian govt dissidents with Cobalt Strike (BleepingComputer) 
KA-SAT Network cyber attack overview (Viasat.com) 
Tracking cyber activity in Eastern Europe (Google)
Ukrainian Hackers Take Aim at Russian Artillery, Navigation Signals (Defense One) 
Russian efforts in Ukraine have not yet spilled over into cyberattacks on US, says lawmaker (C4ISRNet)
New Spring Framework RCE Vulnerability Confirmed - What to do? (Sonatype) 
New Spring4Shell Zero-Day Vulnerability Confirmed: What it is and how to be prepared (Contrast Security)
Spring Core on JDK9+ is vulnerable to remote code execution (Praetorian) 
Spring4Shell: No need to panic, but mitigations are advised (Help Net Security) 
Remcos Trojan: Analyzing the Attack Chain (Morphisec) 
Apple and Meta Gave User Data to Hackers Who Used Forged Legal Requests (Bloomberg) 
Fresh Phish: Phishers Schedule Victims on Calendar App (INKY) 
Lapsus$ claims Globant as its latest breach victim (TechCrunch)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russian cyber operators collect against domestic targets. More details on the Viasat hack. Ukrainian hacktivists say they can interfere with Russian geolocation. Spring4shell is another remote-code-execution problem. The Remcos Trojan is seeing a resurgence. Malicious links distributed via Calendly. Johannes Ullrich from SANS on attack surface detection. Our guest is Fleming Shi from Barracuda on cybersecurity champions. Phishing with “emergency data requests.” Lapsus$ may be back from vacation.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/62</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.telegraph.co.uk/world-news/2022/03/30/vladimir-putin-lied-advisers-says-gchq/">Vladimir Putin is being lied to by his advisers, says GCHQ</a> (The Telegraph) </p><p><a href="https://www.nytimes.com/2022/03/30/world/europe/putin-advisers-ukraine.html">U.S. intelligence suggests that Putin’s advisers misinformed him on Ukraine.</a> (New York Times) </p><p><a href="https://apnews.com/article/russia-ukraine-putin-europe-00716c99579afeff701af31b32ef7c8c">White House: Intel shows Putin misled by advisers on Ukraine</a> (AP NEWS) </p><p><a href="https://www.cnbc.com/2022/03/31/russian-soldiers-sabotaging-own-efforts-in-ukraine-uk-spy-chief-says.html">Russian troops sabotaging their own equipment and refusing orders in Ukraine, UK spy chief says</a> (CNBC) </p><p><a href="https://www.bleepingcomputer.com/news/security/phishing-campaign-targets-russian-govt-dissidents-with-cobalt-strike/">Phishing campaign targets Russian govt dissidents with Cobalt Strike</a> (BleepingComputer) </p><p><a href="https://www.viasat.com/about/newsroom/blog/ka-sat-network-cyber-attack-overview/">KA-SAT Network cyber attack overview</a> (Viasat.com) </p><p><a href="https://blog.google/threat-analysis-group/tracking-cyber-activity-eastern-europe/">Tracking cyber activity in Eastern Europe</a> (Google)</p><p><a href="https://www.defenseone.com/technology/2022/03/ukrainian-hackers-take-aim-russian-artillery-navigation-signals/363854/">Ukrainian Hackers Take Aim at Russian Artillery, Navigation Signals</a> (Defense One) </p><p><a href="https://www.c4isrnet.com/cyber/2022/03/30/russian-efforts-in-ukraine-have-not-yet-spilled-over-into-cyberattacks-on-us-says-lawmaker/">Russian efforts in Ukraine have not yet spilled over into cyberattacks on US, says lawmaker</a> (C4ISRNet)</p><p><a href="https://blog.sonatype.com/new-0-day-spring-framework-vulnerability-confirmed">New Spring Framework RCE Vulnerability Confirmed - What to do?</a> (Sonatype) </p><p><a href="https://www.contrastsecurity.com/security-influencers/new-spring4shell-vulnerability-confirmed-what-it-is-and-how-to-be-prepared">New Spring4Shell Zero-Day Vulnerability Confirmed: What it is and how to be prepared</a> (Contrast Security)</p><p><a href="https://www.praetorian.com/blog/spring-core-jdk9-rce/">Spring Core on JDK9+ is vulnerable to remote code execution</a> (Praetorian) </p><p><a href="https://www.helpnetsecurity.com/2022/03/31/spring4shell/">Spring4Shell: No need to panic, but mitigations are advised</a> (Help Net Security) </p><p><a href="https://blog.morphisec.com/remcos-trojan-analyzing-attack-chain">Remcos Trojan: Analyzing the Attack Chain</a> (Morphisec) </p><p><a href="https://www.bloomberg.com/news/articles/2022-03-30/apple-meta-gave-user-data-to-hackers-who-forged-legal-requests">Apple and Meta Gave User Data to Hackers Who Used Forged Legal Requests</a> (Bloomberg) </p><p><a href="https://www.inky.com/en/blog/phishers-schedule-victims-on-calendar-app">Fresh Phish: Phishers Schedule Victims on Calendar App</a> (INKY) </p><p><a href="https://techcrunch.com/2022/03/30/lapsus-globant-breach/">Lapsus$ claims Globant as its latest breach victim</a> (TechCrunch)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1341</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ae957da6-7881-11ec-90a9-cf37777efc4f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3556330406.mp3?updated=1690303184" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Taking down bot farms. Cyber aggression. Kinetic influence ops, Spamming yourself? CS control system advisories. Sanctions are also biting Russian cyber gangs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1546/notes</link>
      <description>Taking down bot farms. Russia says the US is the aggressor in cyberspace. Influence operations, arriving at Mach 10. The call is coming from inside the house! Cyber incidents affect aviation services. CISA posts ICS control system advisories. I welcome Tim Eades from the Cyber Mentor Fund. Our guest is Alex Holland from HP Wolf Security describing a new wave of attacks. And Sanctions are also biting Russian cyber gangs.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/61

Selected reading.
Ukraine dismantles 5 disinformation bot farms, seizes 10,000 SIM cards (BleepingComputer)
Russia accuses U.S. of massive 'cyber aggression' (Reuters) 
Russia Has Fired 'Multiple' Hypersonic Missiles Into Ukraine, US General Confirms (Defense One) 
BREAKING: Russian Aviation Authority Suffers Cyberattack (Mentour Pilot) 
Bradley Airport Website Suffers Cyber Attack (NBC Connecticut) 
Philips e-Alert (CISA) 
Rockwell Automation ISaGRAF (CISA) 
Omron CX-Position (CISA) 
Hitachi Energy LinkOne WebView (CISA)
Modbus Tools Modbus Slave (CISA) 
Delta Electronics DIAEnergie (CISA)
“Your rubles will only be good for lighting a fire”: Cybercriminals reel from impact of sanctions (Digital Shadows) 
Sanctions Hitting Russian Cyber-Criminals Hard (Infosecurity Magazine) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 30 Mar 2022 20:15:00 -0000</pubDate>
      <itunes:title>Taking down bot farms. Cyber aggression. Kinetic influence ops, Spamming yourself? CS control system advisories. Sanctions are also biting Russian cyber gangs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1546</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Taking down bot farms. Russia says the US is the aggressor in cyberspace. Influence operations, arriving at Mach 10. The call is coming from inside the house! Cyber incidents affect aviation services. CISA posts ICS control system advisories. I welcome Tim Eades from the Cyber Mentor Fund. Our guest is Alex Holland from HP Wolf Security describing a new wave of attacks. And Sanctions are also biting Russian cyber gangs.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/61

Selected reading.
Ukraine dismantles 5 disinformation bot farms, seizes 10,000 SIM cards (BleepingComputer)
Russia accuses U.S. of massive 'cyber aggression' (Reuters) 
Russia Has Fired 'Multiple' Hypersonic Missiles Into Ukraine, US General Confirms (Defense One) 
BREAKING: Russian Aviation Authority Suffers Cyberattack (Mentour Pilot) 
Bradley Airport Website Suffers Cyber Attack (NBC Connecticut) 
Philips e-Alert (CISA) 
Rockwell Automation ISaGRAF (CISA) 
Omron CX-Position (CISA) 
Hitachi Energy LinkOne WebView (CISA)
Modbus Tools Modbus Slave (CISA) 
Delta Electronics DIAEnergie (CISA)
“Your rubles will only be good for lighting a fire”: Cybercriminals reel from impact of sanctions (Digital Shadows) 
Sanctions Hitting Russian Cyber-Criminals Hard (Infosecurity Magazine) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Taking down bot farms. Russia says the US is the aggressor in cyberspace. Influence operations, arriving at Mach 10. The call is coming from inside the house! Cyber incidents affect aviation services. CISA posts ICS control system advisories. I welcome Tim Eades from the Cyber Mentor Fund. Our guest is Alex Holland from HP Wolf Security describing a new wave of attacks. And Sanctions are also biting Russian cyber gangs.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/61</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.bleepingcomputer.com/news/security/ukraine-dismantles-5-disinformation-bot-farms-seizes-10-000-sim-cards/">Ukraine dismantles 5 disinformation bot farms, seizes 10,000 SIM cards</a> (BleepingComputer)</p><p><a href="https://www.reuters.com/world/russia-warns-us-consequences-cyber-aggression-2022-03-29/">Russia accuses U.S. of massive 'cyber aggression'</a> (Reuters) </p><p><a href="https://www.defenseone.com/threats/2022/03/russia-has-fired-hypersonic-missiles-ukraine-us-general-confirms/363777/">Russia Has Fired 'Multiple' Hypersonic Missiles Into Ukraine, US General Confirms</a> (Defense One) </p><p><a href="https://mentourpilot.com/breaking-russian-aviation-authority-suffers-cyberattack/">BREAKING: Russian Aviation Authority Suffers Cyberattack</a> (Mentour Pilot) </p><p><a href="https://www.nbcconnecticut.com/news/local/bradley-airport-website-suffers-cyber-attack/2750473/">Bradley Airport Website Suffers Cyber Attack</a> (NBC Connecticut) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsma-22-088-01">Philips e-Alert</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-01">Rockwell Automation ISaGRAF</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-02">Omron CX-Position</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-03">Hitachi Energy LinkOne WebView</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-088-04">Modbus Tools Modbus Slave</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-081-01">Delta Electronics DIAEnergie</a> (CISA)</p><p><a href="https://www.digitalshadows.com/blog-and-research/cybercriminals-reel-from-impact-of-sanctions/">“Your rubles will only be good for lighting a fire”: Cybercriminals reel from impact of sanctions</a> (Digital Shadows) </p><p><a href="https://www.infosecurity-magazine.com/news/sanctions-hitting-russian-criminals/">Sanctions Hitting Russian Cyber-Criminals Hard</a> (Infosecurity Magazine) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1409</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ae742b88-7881-11ec-90a9-f76ef7ea2935]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3386117561.mp3?updated=1690303166" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber phases of a hybrid war continue at a nuisance level. IcedID’s distribution vectors. Automating software supply-chain attacks. CISA offers power supply risk mitigation guidance.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1545/notes</link>
      <description>A cyberattack takes down a major Ukrainian Internet provider. GhostWriter is said to deploy Cobalt Strike against the Ukrainian government. Anonymous makes some large claims. This just in: spies drive drunk: Ukrainian intelligence doxes FSB officers. Conventional criminals continue to exploit sympathy for Ukraine in social engineering scams. Red-Lili automates software supply-chain attacks. Ben Yelin considers Russian cyber capabilities. Mr. Security Answer Person John Pescatore addresses security automation. And CISA offers mitigation guidance on risks to uninterruptible power supplies.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/60

Selected reading.
Russia says it will scale back near Kyiv as talks progress (AP NEWS) 
Ukraine Claims Some Battle Successes as Russia Focuses on Another Front (New York Times) 
Ukrainian telecom company's internet service disrupted by 'powerful' cyberattack (Reuters) 
‘Most Severe’ Cyberattack Since Russian Invasion Crashes Ukraine Internet Provider (Forbes) 
GhostWriter APT targets state entities of Ukraine with Cobalt Strike Beacon  (Security Affairs) 
Secret World of Pro-Russia Hacking Group Exposed in Leak (Wall Street Journal) 
Anonymous is working on a huge data dump that will blow Russia away (Security Affairs)
While Twitter suspends Anonymous accounts, the group hacked VGTRK Russian Television and Radio (Security Affairs)
Names and addresses of 620 FSB officers published in data breach (Times) 
Russian spies unmasked in embarrassing blow for Vladimir Putin (The Telegraph) 
New Conversation Hijacking Campaign Delivering IcedID (Intezer)
Spoofed Invoice Used to Drop IcedID (Fortinet Blog) 
A Beautiful Factory for Malicious Packages (Checkmarx) 
School of Hard Knocks: Job Fraud Threats Target University Students (Proofpoint) 
Mitigating Attacks Against Uninterruptible Power Supply Devices (CISA Insights)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Mar 2022 20:30:00 -0000</pubDate>
      <itunes:title>Cyber phases of a hybrid war continue at a nuisance level. IcedID’s distribution vectors. Automating software supply-chain attacks. CISA offers power supply risk mitigation guidance.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1545</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cyberattack takes down a major Ukrainian Internet provider. GhostWriter is said to deploy Cobalt Strike against the Ukrainian government. Anonymous makes some large claims. This just in: spies drive drunk: Ukrainian intelligence doxes FSB officers. Conventional criminals continue to exploit sympathy for Ukraine in social engineering scams. Red-Lili automates software supply-chain attacks. Ben Yelin considers Russian cyber capabilities. Mr. Security Answer Person John Pescatore addresses security automation. And CISA offers mitigation guidance on risks to uninterruptible power supplies.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/60

Selected reading.
Russia says it will scale back near Kyiv as talks progress (AP NEWS) 
Ukraine Claims Some Battle Successes as Russia Focuses on Another Front (New York Times) 
Ukrainian telecom company's internet service disrupted by 'powerful' cyberattack (Reuters) 
‘Most Severe’ Cyberattack Since Russian Invasion Crashes Ukraine Internet Provider (Forbes) 
GhostWriter APT targets state entities of Ukraine with Cobalt Strike Beacon  (Security Affairs) 
Secret World of Pro-Russia Hacking Group Exposed in Leak (Wall Street Journal) 
Anonymous is working on a huge data dump that will blow Russia away (Security Affairs)
While Twitter suspends Anonymous accounts, the group hacked VGTRK Russian Television and Radio (Security Affairs)
Names and addresses of 620 FSB officers published in data breach (Times) 
Russian spies unmasked in embarrassing blow for Vladimir Putin (The Telegraph) 
New Conversation Hijacking Campaign Delivering IcedID (Intezer)
Spoofed Invoice Used to Drop IcedID (Fortinet Blog) 
A Beautiful Factory for Malicious Packages (Checkmarx) 
School of Hard Knocks: Job Fraud Threats Target University Students (Proofpoint) 
Mitigating Attacks Against Uninterruptible Power Supply Devices (CISA Insights)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cyberattack takes down a major Ukrainian Internet provider. GhostWriter is said to deploy Cobalt Strike against the Ukrainian government. Anonymous makes some large claims. This just in: spies drive drunk: Ukrainian intelligence doxes FSB officers. Conventional criminals continue to exploit sympathy for Ukraine in social engineering scams. Red-Lili automates software supply-chain attacks. Ben Yelin considers Russian cyber capabilities. Mr. Security Answer Person John Pescatore addresses security automation. And CISA offers mitigation guidance on risks to uninterruptible power supplies.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/60</p><p><br></p><p><strong>Selected reading.</strong></p><p><a href="https://apnews.com/article/russia-ukraine-zelenskyy-ap-top-news-europe-istanbul-4625afe04bd10a05c14914bb9f4ef0b0">Russia says it will scale back near Kyiv as talks progress</a> (AP NEWS) </p><p><a href="https://www.nytimes.com/2022/03/28/world/europe/irpin-donbas-poison.html">Ukraine Claims Some Battle Successes as Russia Focuses on Another Front</a> (New York Times) </p><p><a href="https://www.reuters.com/business/media-telecom/ukrainian-telecom-companys-internet-service-disrupted-by-powerful-cyberattack-2022-03-28/">Ukrainian telecom company's internet service disrupted by 'powerful' cyberattack</a> (Reuters) </p><p><a href="https://www.forbes.com/sites/thomasbrewster/2022/03/28/huge-cyberattack-on-ukrtelecom-biggest-since-russian-invasion-crashes-ukraine-telecom/">‘Most Severe’ Cyberattack Since Russian Invasion Crashes Ukraine Internet Provider</a> (Forbes) </p><p><a href="https://securityaffairs.co/wordpress/129527/apt/ghostwriter-apt-targets-state-entities-of-ukraine-with-cobalt-strike-beacon.html">GhostWriter APT targets state entities of Ukraine with Cobalt Strike Beacon </a> (Security Affairs) </p><p><a href="https://www.wsj.com/articles/trickbot-pro-russia-hacking-gang-documents-ukrainian-leaker-conti-11648480564">Secret World of Pro-Russia Hacking Group Exposed in Leak</a> (Wall Street Journal) </p><p><a href="https://securityaffairs.co/wordpress/129576/hacktivism/anonymous-huge-data-dump.html">Anonymous is working on a huge data dump that will blow Russia away</a> (Security Affairs)</p><p><a href="https://securityaffairs.co/wordpress/129555/hacktivism/anonymous-hacked-vgtrk-russian-radio-tv.html">While Twitter suspends Anonymous accounts, the group hacked VGTRK Russian Television and Radio</a> (Security Affairs)</p><p><a href="https://www.thetimes.co.uk/article/names-and-addresses-of-625-fsb-officers-published-after-data-breach-q68sqdh2t">Names and addresses of 620 FSB officers published in data breach</a> (Times) </p><p><a href="https://www.telegraph.co.uk/world-news/2022/03/28/russian-spies-unmasked-embarrassing-blow-vladimir-putin/">Russian spies unmasked in embarrassing blow for Vladimir Putin</a> (The Telegraph) </p><p><a href="https://www.intezer.com/blog/research/conversation-hijacking-campaign-delivering-icedid/">New Conversation Hijacking Campaign Delivering IcedID</a> (Intezer)</p><p><a href="https://www.fortinet.com/blog/threat-research/spoofed-invoice-drops-iced-id">Spoofed Invoice Used to Drop IcedID</a> (Fortinet Blog) </p><p><a href="https://checkmarx.com/blog/a-beautiful-factory-for-malicious-packages/">A Beautiful Factory for Malicious Packages</a> (Checkmarx) </p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/school-hard-knocks-job-fraud-threats-target-university-students">School of Hard Knocks: Job Fraud Threats Target University Students</a> (Proofpoint) </p><p><a href="https://www.cisa.gov/sites/default/files/publications/CISA-DOE_Insights-Mitigating_Vulnerabilities_Affecting_Uninterruptible_Power_Supply_Devices_Mar_29.pdf">Mitigating Attacks Against Uninterruptible Power Supply Devices</a> (CISA Insights)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1699</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ad45ff16-7881-11ec-90a9-67bcce9c7930]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5082144110.mp3?updated=1690303150" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Notes on the cyber aspects of the ongoing hybrid war. DDoS in the Marshall Islands. Lapsus$ Group post mortems. US FCC sanctions Kaspersky. CISA adds Known Exploited Vulnerabilities to its Catalog.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1544/notes</link>
      <description>Preparing for the spread of cyberattacks. A look at Cyber operations in the hybrid war. C3 and electronic warfare. The Republic of the Marshall Islands suffers rolling DDoS attacks. Okta gives a detailed account of its experience with the Lapsus$ Group. Lapsus$ under the law enforcement microscope. The FCC sanctions Kaspersky. Malek Ben Salem from Accenture on getting full potential from deception systems. Our guest is Greg Scasny of Blueshift Cybersecurity with remote workforce security concerns. And CISA adds to its Known Exploited Vulnerabilities Catalog.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/59

Selected reading.
‘Preparation, not panic’: Top US cyber official asks Americans to look out for Russian hacking efforts CNN
Russia hacked Ukrainian satellite communications, officials believe BBC News
Chinese cyberattacks on NATO countries increase 116% since Russia's invasion of Ukraine: study Fox Business
Why hasn't Russia used its 'full scope' of electronic warfare?Breaking Defense
Russian troops’ tendency to talk on unsecured lines is proving costly Washington Post
Marshall Islands telecom service hit by cyber attack RNZ
Okta: "We made a mistake" delaying the Lapsus$ hack disclosure BleepingComputer
Who is LAPSUS$, the Big, Bad Cybercrime Gang Hacking Tech's Biggest Companies? Gizmodo
FCC puts Kaspersky on security threat list, says it poses “unacceptable risk“ Ars Technica
U.S. FCC adds Russia's Kaspersky, China telecom firms to national security threat list Reuters
CISA Adds 66 Known Exploited Vulnerabilities to Catalog CISA
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 28 Mar 2022 20:15:00 -0000</pubDate>
      <itunes:title>Notes on the cyber aspects of the ongoing hybrid war. DDoS in the Marshall Islands. Lapsus$ Group post mortems. US FCC sanctions Kaspersky. CISA adds Known Exploited Vulnerabilities to its Catalog.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1544</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Preparing for the spread of cyberattacks. A look at Cyber operations in the hybrid war. C3 and electronic warfare. The Republic of the Marshall Islands suffers rolling DDoS attacks. Okta gives a detailed account of its experience with the Lapsus$ Group. Lapsus$ under the law enforcement microscope. The FCC sanctions Kaspersky. Malek Ben Salem from Accenture on getting full potential from deception systems. Our guest is Greg Scasny of Blueshift Cybersecurity with remote workforce security concerns. And CISA adds to its Known Exploited Vulnerabilities Catalog.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/59

Selected reading.
‘Preparation, not panic’: Top US cyber official asks Americans to look out for Russian hacking efforts CNN
Russia hacked Ukrainian satellite communications, officials believe BBC News
Chinese cyberattacks on NATO countries increase 116% since Russia's invasion of Ukraine: study Fox Business
Why hasn't Russia used its 'full scope' of electronic warfare?Breaking Defense
Russian troops’ tendency to talk on unsecured lines is proving costly Washington Post
Marshall Islands telecom service hit by cyber attack RNZ
Okta: "We made a mistake" delaying the Lapsus$ hack disclosure BleepingComputer
Who is LAPSUS$, the Big, Bad Cybercrime Gang Hacking Tech's Biggest Companies? Gizmodo
FCC puts Kaspersky on security threat list, says it poses “unacceptable risk“ Ars Technica
U.S. FCC adds Russia's Kaspersky, China telecom firms to national security threat list Reuters
CISA Adds 66 Known Exploited Vulnerabilities to Catalog CISA
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Preparing for the spread of cyberattacks. A look at Cyber operations in the hybrid war. C3 and electronic warfare. The Republic of the Marshall Islands suffers rolling DDoS attacks. Okta gives a detailed account of its experience with the Lapsus$ Group. Lapsus$ under the law enforcement microscope. The FCC sanctions Kaspersky. Malek Ben Salem from Accenture on getting full potential from deception systems. Our guest is Greg Scasny of Blueshift Cybersecurity with remote workforce security concerns. And CISA adds to its Known Exploited Vulnerabilities Catalog.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/59</p><p><br></p><p><strong>Selected reading.</strong></p><p><a href="https://www.cnn.com/2022/03/26/politics/jen-easterly-interview-russia-cnntv/index.html">‘Preparation, not panic’: Top US cyber official asks Americans to look out for Russian hacking efforts</a> CNN</p><p><a href="https://www.bbc.com/news/technology-60796079">Russia hacked Ukrainian satellite communications, officials believe</a> BBC News</p><p><a href="https://www.foxbusiness.com/technology/chinese-cyberattacks-nato-increase-ukraine">Chinese cyberattacks on NATO countries increase 116% since Russia's invasion of Ukraine: study</a> Fox Business</p><p><a href="https://breakingdefense.com/2022/03/why-hasnt-russia-used-its-full-scope-of-electronic-warfare/">Why hasn't Russia used its 'full scope' of electronic warfare?</a>Breaking Defense</p><p><a href="https://www.washingtonpost.com/national-security/2022/03/27/russian-military-unsecured-communications/">Russian troops’ tendency to talk on unsecured lines is proving costly</a> Washington Post</p><p><a href="https://www.rnz.co.nz/international/pacific-news/464125/marshall-islands-telecom-service-hit-by-cyber-attack">Marshall Islands telecom service hit by cyber attack</a> RNZ</p><p><a href="https://www.bleepingcomputer.com/news/security/okta-we-made-a-mistake-delaying-the-lapsus-hack-disclosure/">Okta: "We made a mistake" delaying the Lapsus$ hack disclosure</a> BleepingComputer</p><p><a href="https://gizmodo.com/who-is-lapsus-the-gang-hacking-microsoft-samsung-an-1848686059">Who is LAPSUS$, the Big, Bad Cybercrime Gang Hacking Tech's Biggest Companies?</a> Gizmodo</p><p><a href="https://arstechnica.com/information-technology/2022/03/fcc-puts-kaspersky-on-security-threat-list-says-it-poses-unacceptable-risk/">FCC puts Kaspersky on security threat list, says it poses “unacceptable risk“</a> Ars Technica</p><p><a href="https://www.reuters.com/business/media-telecom/us-fcc-adds-ao-kaspersky-lab-china-telecom-firms-national-security-threat-list-2022-03-25/">U.S. FCC adds Russia's Kaspersky, China telecom firms to national security threat list</a> Reuters</p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity/2022/03/25/cisa-adds-66-known-exploited-vulnerabilities-catalog">CISA Adds 66 Known Exploited Vulnerabilities to Catalog</a> CISA</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1438</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ad244ff6-7881-11ec-90a9-c37a2fd89e8b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6401233987.mp3?updated=1690302949" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The breakdown of Shuckworm's continued cyber attacks against Ukraine. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/225/notes</link>
      <description>Guest Dick O'Brien from Symantec joins Dave Bittner on this episode to discuss how "Shuckworm Continues Cyber-Espionage Attacks Against Ukraine." The Russia-linked Shuckworm group (aka Gamaredon, Armageddon) has been active since 2013 and is known to use phishing emails to distribute either freely available remote access tools.
In July 2021, Symantec observed Shuckworm activity on an organization in Ukraine and this continued until August 2021. According to a November 2021 report from the Security Service of Ukraine (SSU), since 2014 the Shuckworm group has been responsible for over 5,000 attacks against more than 1,500 Ukrainian government systems. Dick walks us through Symantec's investigation.
The research can be found here:
Shuckworm Continues Cyber-Espionage Attacks Against Ukraine

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Mar 2022 07:00:00 -0000</pubDate>
      <itunes:title>The breakdown of Shuckworm's continued cyber attacks against Ukraine. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>225</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Dick O'Brien from Symantec joins Dave Bittner on this episode to discuss how "Shuckworm Continues Cyber-Espionage Attacks Against Ukraine." The Russia-linked Shuckworm group (aka Gamaredon, Armageddon) has been active since 2013 and is known to use phishing emails to distribute either freely available remote access tools.
In July 2021, Symantec observed Shuckworm activity on an organization in Ukraine and this continued until August 2021. According to a November 2021 report from the Security Service of Ukraine (SSU), since 2014 the Shuckworm group has been responsible for over 5,000 attacks against more than 1,500 Ukrainian government systems. Dick walks us through Symantec's investigation.
The research can be found here:
Shuckworm Continues Cyber-Espionage Attacks Against Ukraine

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Dick O'Brien from Symantec joins Dave Bittner on this episode to discuss how "Shuckworm Continues Cyber-Espionage Attacks Against Ukraine." The Russia-linked Shuckworm group (aka Gamaredon, Armageddon) has been active since 2013 and is known to use phishing emails to distribute either freely available remote access tools.</p><p>In July 2021, Symantec observed Shuckworm activity on an organization in Ukraine and this continued until August 2021. According to a November 2021 report from the Security Service of Ukraine (SSU), since 2014 the Shuckworm group has been responsible for over 5,000 attacks against more than 1,500 Ukrainian government systems. Dick walks us through Symantec's investigation.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/shuckworm-gamaredon-espionage-ukraine">Shuckworm Continues Cyber-Espionage Attacks Against Ukraine</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1161</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[17c2e1e0-aae8-11ec-aee0-db5ba69b0928]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9910801832.mp3?updated=1685126731" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fears of Russian escalation, with both chemical and cyber weapons, rise. DPRK APTs exploit Chrome vulnerabilities. Mustang Panda is back. Arrests made in the Lapsus$ case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1543/notes</link>
      <description>Fears of Russian escalation as Ukraine’s counteroffensive sees successes. Warnings of possible Russian cyberattacks gain context from attribution of the Viasat incident and two US unsealed indictments. CISA continues to recommend best practices. North Korean APTs exploit Chrome vulnerabilities. Mustang Panda is back. David Dufour from Webroot on ransomware gangs and cartels. Our guest is Liliana Monge of Sabio Coding Bootcamp on creating opportunities for those looking to pursue a career in tech. And boy, boy, your wild ways will break your mother’s heart.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/58

Selected reading.
Ukrainian forces advance east of Kyiv as Russians fall back (Reuters)
Counteroffensive in Ukraine Shifts Dynamic of War (New York Times)
Ukrainian forces claim to destroy a Russian landing ship. (New York Times) 
Putin's war in Ukraine nearing possibly more dangerous phase (AP NEWS) 
Syrians watch in horror as Putin deploys the Aleppo playbook in Ukraine (CNN) 
Joe Biden: We will respond in kind if Vladimir Putin uses chemical weapons in Ukraine (The Telegraph) 
A month into the Russian invasion, Ukraine is still mostly online (The Record by Recorded Future)
Russian military behind hack of satellite communication devices in Ukraine at war’s outset, U.S. officials say (Washington Post) 
Hackers Attacked Satellite Terminals Through Management Network, Viasat Officials Say (Air Force Magazine)

Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide (US Department of Justice) 
US charges four Russian hackers over cyber-attacks on global energy sector (the Guardian) 
North Korean Actors Exploited Chrome Flaw to Target U.S. Orgs (Decipher) 
Countering threats from North Korea (Google)
New Mustang Panda hacking campaign targets diplomats, ISPs (BleepingComputer) 
Chinese APT Combines Fresh Hodur RAT with Complex Anti-Detection (Threatpost)
Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal (BBC News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 25 Mar 2022 20:15:00 -0000</pubDate>
      <itunes:title>Fears of Russian escalation, with both chemical and cyber weapons, rise. DPRK APTs exploit Chrome vulnerabilities. Mustang Panda is back. Arrests made in the Lapsus$ case.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1543</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Fears of Russian escalation as Ukraine’s counteroffensive sees successes. Warnings of possible Russian cyberattacks gain context from attribution of the Viasat incident and two US unsealed indictments. CISA continues to recommend best practices. North Korean APTs exploit Chrome vulnerabilities. Mustang Panda is back. David Dufour from Webroot on ransomware gangs and cartels. Our guest is Liliana Monge of Sabio Coding Bootcamp on creating opportunities for those looking to pursue a career in tech. And boy, boy, your wild ways will break your mother’s heart.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/58

Selected reading.
Ukrainian forces advance east of Kyiv as Russians fall back (Reuters)
Counteroffensive in Ukraine Shifts Dynamic of War (New York Times)
Ukrainian forces claim to destroy a Russian landing ship. (New York Times) 
Putin's war in Ukraine nearing possibly more dangerous phase (AP NEWS) 
Syrians watch in horror as Putin deploys the Aleppo playbook in Ukraine (CNN) 
Joe Biden: We will respond in kind if Vladimir Putin uses chemical weapons in Ukraine (The Telegraph) 
A month into the Russian invasion, Ukraine is still mostly online (The Record by Recorded Future)
Russian military behind hack of satellite communication devices in Ukraine at war’s outset, U.S. officials say (Washington Post) 
Hackers Attacked Satellite Terminals Through Management Network, Viasat Officials Say (Air Force Magazine)

Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide (US Department of Justice) 
US charges four Russian hackers over cyber-attacks on global energy sector (the Guardian) 
North Korean Actors Exploited Chrome Flaw to Target U.S. Orgs (Decipher) 
Countering threats from North Korea (Google)
New Mustang Panda hacking campaign targets diplomats, ISPs (BleepingComputer) 
Chinese APT Combines Fresh Hodur RAT with Complex Anti-Detection (Threatpost)
Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal (BBC News)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Fears of Russian escalation as Ukraine’s counteroffensive sees successes. Warnings of possible Russian cyberattacks gain context from attribution of the Viasat incident and two US unsealed indictments. CISA continues to recommend best practices. North Korean APTs exploit Chrome vulnerabilities. Mustang Panda is back. David Dufour from Webroot on ransomware gangs and cartels. Our guest is Liliana Monge of Sabio Coding Bootcamp on creating opportunities for those looking to pursue a career in tech. And boy, boy, your wild ways will break your mother’s heart.</p><h2><br></h2><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/58</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.reuters.com/world/us/ukraine-urges-halt-russias-assault-biden-heads-poland-2022-03-25/">Ukrainian forces advance east of Kyiv as Russians fall back</a> (Reuters)</p><p><a href="https://www.nytimes.com/live/2022/03/24/world/russia-ukraine-war">Counteroffensive in Ukraine Shifts Dynamic of War</a> (New York Times)</p><p><a href="https://www.nytimes.com/2022/03/24/world/europe/russian-landing-ship-berdyansk-ukraine.html">Ukrainian forces claim to destroy a Russian landing ship.</a> (New York Times) </p><p><a href="https://apnews.com/article/russia-ukraine-putin-europe-nato-971463587011b3bf19dde7abb35889ad">Putin's war in Ukraine nearing possibly more dangerous phase</a> (AP NEWS) </p><p><a href="https://www.cnn.com/2022/03/18/middleeast/mideast-summary-03-18-2022-intl/index.html">Syrians watch in horror as Putin deploys the Aleppo playbook in Ukraine</a> (CNN) </p><p><a href="https://www.telegraph.co.uk/world-news/2022/03/24/joe-biden-will-respond-kind-vladimir-putin-uses-chemical-weapons/">Joe Biden: We will respond in kind if Vladimir Putin uses chemical weapons in Ukraine</a> (The Telegraph) </p><p><a href="https://therecord.media/ukraine-internet-russia-invasion/">A month into the Russian invasion, Ukraine is still mostly online</a> (The Record by Recorded Future)</p><p><a href="https://www.washingtonpost.com/national-security/2022/03/24/russian-military-behind-hack-satellite-communication-devices-ukraine-wars-outset-us-officials-say/">Russian military behind hack of satellite communication devices in Ukraine at war’s outset, U.S. officials say</a> (Washington Post) </p><p><a href="https://www.airforcemag.com/hackers-attacked-satellite-terminals-through-management-network-viasat-officials-say/">Hackers Attacked Satellite Terminals Through Management Network, Viasat Officials Say</a> (Air Force Magazine)</p><p><br></p><p><a href="https://www.justice.gov/opa/pr/four-russian-government-employees-charged-two-historical-hacking-campaigns-targeting-critical">Four Russian Government Employees Charged in Two Historical Hacking Campaigns Targeting Critical Infrastructure Worldwide</a> (US Department of Justice) </p><p><a href="https://www.theguardian.com/world/2022/mar/24/us-charges-russian-hackers-cyber-attacks">US charges four Russian hackers over cyber-attacks on global energy sector</a> (the Guardian) </p><p><a href="https://duo.com/decipher/north-korean-actors-exploit-chrome-flaw-to-target-u-s-orgs">North Korean Actors Exploited Chrome Flaw to Target U.S. Orgs</a> (Decipher) </p><p><a href="https://blog.google/threat-analysis-group/countering-threats-north-korea/">Countering threats from North Korea</a> (Google)</p><p><a href="https://www.bleepingcomputer.com/news/security/new-mustang-panda-hacking-campaign-targets-diplomats-isps/">New Mustang Panda hacking campaign targets diplomats, ISPs</a> (BleepingComputer) </p><p><a href="https://threatpost.com/chinese-apt-combines-fresh-hodur-rat-with-complex-anti-detection/179084/">Chinese APT Combines Fresh Hodur RAT with Complex Anti-Detection</a> (Threatpost)</p><p><a href="https://www.bbc.com/news/technology-60864283">Lapsus$: Oxford teen accused of being multi-millionaire cyber-criminal</a> (BBC News)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1503</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[afa02ea8-7881-11ec-90a9-8b5b900f7bef]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7349951142.mp3?updated=1690302903" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Updates on Russia’s hybrid war against Ukraine. The leader of the Lapsus$ Gang may be a 16-year-old living with his Mom. Wanted cybercriminals. Hacktivism’s sometimes wayward aim.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1542/notes</link>
      <description>Concerns persist that President Putin will take his revenge in cyberspace for sanctions. Wiper attacks reported continuing in Ukraine. Russia also sustains cyberattacks. Lapsus$--living at home, with Mom. A carder kingpin finds his way onto the FBI’s Most Wanted List. Andrea Little Limbago from Interos on collective resilience. Our guest is Amit Shaked from Laminar Security on shadow data. Anonymous says it hit Nestlé, but Nestlé says it never happened.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/57

Selected reading.
As Ukraine invasion stalls, Putin looks to cyber for revenge attack on US (Newsweek)
Threat looms of Russian attack on undersea cables to shut down West’s internet (France 24) 
A Mysterious Satellite Hack Has Victims Far Beyond Ukraine (Wired) 
Anonymous hacks unsecured printers to send anti-war messages across Russia (HackRead)
'We want them to go to the Stone Age': Ukrainian coders are splitting their time between work and cyber warfare (CNBC) 
Teen Suspected by Cyber Researchers of Being Lapsus$ Mastermind (Bloomberg)
Nestlé denies Anonymous hack, claiming it accidentally leaked data dump itself (Fortune) 
Nestlé says 'Anonymous' data leak actually a self-own (Register)
Nestlé: You Can't Hack Us, We Leaked Our Own Data (Gizmodo) 
FBI adds Russian cybercrime market owner to most wanted list (BleepingComputer)
United States of America v. Igor Dekhtyar (US District Court for the Eastern District of Texas)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 24 Mar 2022 20:15:00 -0000</pubDate>
      <itunes:title>Updates on Russia’s hybrid war against Ukraine. The leader of the Lapsus$ Gang may be a 16-year-old living with his Mom. Wanted cybercriminals. Hacktivism’s sometimes wayward aim.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1542</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Concerns persist that President Putin will take his revenge in cyberspace for sanctions. Wiper attacks reported continuing in Ukraine. Russia also sustains cyberattacks. Lapsus$--living at home, with Mom. A carder kingpin finds his way onto the FBI’s Most Wanted List. Andrea Little Limbago from Interos on collective resilience. Our guest is Amit Shaked from Laminar Security on shadow data. Anonymous says it hit Nestlé, but Nestlé says it never happened.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/57

Selected reading.
As Ukraine invasion stalls, Putin looks to cyber for revenge attack on US (Newsweek)
Threat looms of Russian attack on undersea cables to shut down West’s internet (France 24) 
A Mysterious Satellite Hack Has Victims Far Beyond Ukraine (Wired) 
Anonymous hacks unsecured printers to send anti-war messages across Russia (HackRead)
'We want them to go to the Stone Age': Ukrainian coders are splitting their time between work and cyber warfare (CNBC) 
Teen Suspected by Cyber Researchers of Being Lapsus$ Mastermind (Bloomberg)
Nestlé denies Anonymous hack, claiming it accidentally leaked data dump itself (Fortune) 
Nestlé says 'Anonymous' data leak actually a self-own (Register)
Nestlé: You Can't Hack Us, We Leaked Our Own Data (Gizmodo) 
FBI adds Russian cybercrime market owner to most wanted list (BleepingComputer)
United States of America v. Igor Dekhtyar (US District Court for the Eastern District of Texas)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Concerns persist that President Putin will take his revenge in cyberspace for sanctions. Wiper attacks reported continuing in Ukraine. Russia also sustains cyberattacks. Lapsus$--living at home, with Mom. A carder kingpin finds his way onto the FBI’s Most Wanted List. Andrea Little Limbago from Interos on collective resilience. Our guest is Amit Shaked from Laminar Security on shadow data. Anonymous says it hit Nestlé, but Nestlé says it never happened.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/57</p><p><br></p><p><strong>Selected reading.</strong></p><p><a href="https://www.newsweek.com/ukraine-invasion-stalls-putin-looks-cyber-revenge-attack-us-1691096">As Ukraine invasion stalls, Putin looks to cyber for revenge attack on US</a> (Newsweek)</p><p><a href="https://www.france24.com/en/europe/20220323-threat-looms-of-russian-attack-on-undersea-cables-to-shut-down-west-s-internet">Threat looms of Russian attack on undersea cables to shut down West’s internet</a> (France 24) </p><p><a href="https://www.wired.com/story/viasat-internet-hack-ukraine-russia/">A Mysterious Satellite Hack Has Victims Far Beyond Ukraine</a> (Wired) </p><p><a href="https://www.hackread.com/anonymous-hacks-unsecured-printers-message-russia/">Anonymous hacks unsecured printers to send anti-war messages across Russia</a> (HackRead)</p><p><a href="https://www.cnbc.com/2022/03/23/ukrainian-coders-splitting-their-time-between-day-job-and-cyberwar.html">'We want them to go to the Stone Age': Ukrainian coders are splitting their time between work and cyber warfare</a> (CNBC) </p><p><a href="https://www.bloomberg.com/news/articles/2022-03-23/teen-suspected-by-cyber-researchers-of-being-lapsus-mastermind">Teen Suspected by Cyber Researchers of Being Lapsus$ Mastermind</a> (Bloomberg)</p><p><a href="https://fortune.com/2022/03/23/nestle-anonymous-leak-hack-russia-business-kitkat-nesquik/">Nestlé denies Anonymous hack, claiming it accidentally leaked data dump itself</a> (Fortune) </p><p><a href="https://www.theregister.com/2022/03/23/nestle_russia_anonymous/">Nestlé says 'Anonymous' data leak actually a self-own</a> (Register)</p><p><a href="https://gizmodo.com/nestle-denies-anonymous-hack-claims-says-it-leaked-dat-1848691484">Nestlé: You Can't Hack Us, We Leaked Our Own Data</a> (Gizmodo) </p><p><a href="https://www.bleepingcomputer.com/news/security/fbi-adds-russian-cybercrime-market-owner-to-most-wanted-list/">FBI adds Russian cybercrime market owner to most wanted list</a> (BleepingComputer)</p><p><a href="https://www.documentcloud.org/documents/21491342-united-states-of-america-v-igor-dekhtyar">United States of America v. Igor Dekhtyar</a> (US District Court for the Eastern District of Texas)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1545</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aeb718da-7881-11ec-90a9-a7f33faa7f84]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3949822329.mp3?updated=1690302891" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Insider Risk Excellence Awards. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/27/notes</link>
      <description>In this CyberWire-X episode, host Dave Bittner chats with the judges of the Insider Risk Excellence Awards. The inaugural awards program, announced during last September's Insider Risk Summit, recognizes the best of the best in Insider Risk Management. They honor the work of individuals and organizations as they address Insider Risk in the most collaborative work environment we’ve ever seen. Judges Joe Payne, President and CEO, Code42 and Chairman, Insider Risk Summit and Wendy Overton, Director of Cyber Strategy and Insider Risk Leader, Optiv, talk about the growing Insider Risk problem, reveal the winners of each award category and pull back the curtain on how each of these Insider Risk trailblazers are making an impact. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 24 Mar 2022 07:00:00 -0000</pubDate>
      <itunes:title>Insider Risk Excellence Awards. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>27</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this CyberWire-X episode, host Dave Bittner chats with the judges of the Insider Risk Excellence Awards. The inaugural awards program, announced during last September's Insider Risk Summit, recognizes the best of the best in Insider Risk Management. They honor the work of individuals and organizations as they address Insider Risk in the most collaborative work environment we’ve ever seen. Judges Joe Payne, President and CEO, Code42 and Chairman, Insider Risk Summit and Wendy Overton, Director of Cyber Strategy and Insider Risk Leader, Optiv, talk about the growing Insider Risk problem, reveal the winners of each award category and pull back the curtain on how each of these Insider Risk trailblazers are making an impact. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this CyberWire-X episode, host Dave Bittner chats with the judges of the Insider Risk Excellence Awards. The inaugural awards program, announced during last September's Insider Risk Summit, recognizes the best of the best in Insider Risk Management. They honor the work of individuals and organizations as they address Insider Risk in the most collaborative work environment we’ve ever seen. Judges Joe Payne, President and CEO, Code42 and Chairman, Insider Risk Summit and Wendy Overton, Director of Cyber Strategy and Insider Risk Leader, Optiv, talk about the growing Insider Risk problem, reveal the winners of each award category and pull back the curtain on how each of these Insider Risk trailblazers are making an impact. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1296</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1b90aa9a-aa26-11ec-bad0-ab308f6985bd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5609731713.mp3?updated=1647964973" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>British-American warnings of a Russian cyber threat, and Russia’s response. More on the Lapsus$ gang incidents at Microsoft and Okta. And Secureworks looks at Conti and sees a criminal ecosystem.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1541/notes</link>
      <description>The US and the UK warn of impending Russian cyberattacks, and Russia responds with warnings against “banditry,” crime, and bad manners. CISA issues two new ICS advisories. Microsoft confirms a Lapsus$ gang incident, and so does Okta, but Okta’s case is more complicated. Josh Ray from Accenture on the cyber workforce. Our guest is Tom Gaffney from F-Secure with some ways to reduce digital anxietySecureworks takes a look at the criminal ecosystem around Conti.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/56

Selected reading.
Ukraine war has put our relationship with US at breaking point - Russia (Daily Post Nigeria) 
Kremlin dismisses U.S. warning of potential Russian cyber attacks (Reuters) .
As Biden puts US on alert, Russia seeks talks to help prevent cyber war (Newsweek) 
U.K. echoes Biden warning on Russian cyberattacks (The Record by Recorded Future) 
Biden: Russia mulling cyberattacks on US (C4ISRNet) 
National Security Advisor details new intelligence on potential Russian cyberattacks (FOX 5 DC)
The Threat of Russian Cyberattacks Looms Large (The New Yorker) 
FBI sees growing Russian hacker interest in US energy firms (AP NEWS) 
CISA Call with Critical Infrastructure Partners on Potential Russian Cyberattacks Against the U.S. (YouTube) 
CISA highlights new reporting hotline amid warnings about potential Russian cyber attacks (Federal News Network)
Delta Electronics DIAEnergie (CISA) 
Delta Electronics DIAEnergie (Update B) (CISA) 
Microsoft, Okta Investigating Data Theft Claims (SecurityWeek) 
Hackers hit authentication firm Okta, customers 'may have been impacted' (Reuters) 
'This Is Really, Really Bad': Lapsus$ Gang Claims Okta Hack (Wired).
Okta ‘identifying and contacting’ customers potentially affected by Lapsus$ breach (The Record by Recorded Future) 
Okta Investigates Report of Security Breach, Says It Finds No Evidence of New Attack (Wall Street Journal) 
Fury As Okta—The Company That Manages 100 Million Logins—Fails To Tell Customers About Breach For Months (Forbes) 
Cloudflare’s investigation of the January 2022 Okta compromise (Cloudflare Blog).
Updated Okta Statement on LAPSUS$ (Okta) 
GOLD ULRICK leaks reveal organizational structure and relationships (Secureworks) 
Details of Conti ransomware affiliate released (ComputerWeekly.com) 
More can be done to curb misuse of Cobalt Strike, expert says (VentureBeat)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 23 Mar 2022 20:20:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1541</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>British-American warnings of a Russian cyber threat, and Russia’s response. More on the Lapsus$ gang incidents at Microsoft and Okta. And Secureworks looks at Conti and sees a criminal ecosystem.</itunes:subtitle>
      <itunes:summary>The US and the UK warn of impending Russian cyberattacks, and Russia responds with warnings against “banditry,” crime, and bad manners. CISA issues two new ICS advisories. Microsoft confirms a Lapsus$ gang incident, and so does Okta, but Okta’s case is more complicated. Josh Ray from Accenture on the cyber workforce. Our guest is Tom Gaffney from F-Secure with some ways to reduce digital anxietySecureworks takes a look at the criminal ecosystem around Conti.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/56

Selected reading.
Ukraine war has put our relationship with US at breaking point - Russia (Daily Post Nigeria) 
Kremlin dismisses U.S. warning of potential Russian cyber attacks (Reuters) .
As Biden puts US on alert, Russia seeks talks to help prevent cyber war (Newsweek) 
U.K. echoes Biden warning on Russian cyberattacks (The Record by Recorded Future) 
Biden: Russia mulling cyberattacks on US (C4ISRNet) 
National Security Advisor details new intelligence on potential Russian cyberattacks (FOX 5 DC)
The Threat of Russian Cyberattacks Looms Large (The New Yorker) 
FBI sees growing Russian hacker interest in US energy firms (AP NEWS) 
CISA Call with Critical Infrastructure Partners on Potential Russian Cyberattacks Against the U.S. (YouTube) 
CISA highlights new reporting hotline amid warnings about potential Russian cyber attacks (Federal News Network)
Delta Electronics DIAEnergie (CISA) 
Delta Electronics DIAEnergie (Update B) (CISA) 
Microsoft, Okta Investigating Data Theft Claims (SecurityWeek) 
Hackers hit authentication firm Okta, customers 'may have been impacted' (Reuters) 
'This Is Really, Really Bad': Lapsus$ Gang Claims Okta Hack (Wired).
Okta ‘identifying and contacting’ customers potentially affected by Lapsus$ breach (The Record by Recorded Future) 
Okta Investigates Report of Security Breach, Says It Finds No Evidence of New Attack (Wall Street Journal) 
Fury As Okta—The Company That Manages 100 Million Logins—Fails To Tell Customers About Breach For Months (Forbes) 
Cloudflare’s investigation of the January 2022 Okta compromise (Cloudflare Blog).
Updated Okta Statement on LAPSUS$ (Okta) 
GOLD ULRICK leaks reveal organizational structure and relationships (Secureworks) 
Details of Conti ransomware affiliate released (ComputerWeekly.com) 
More can be done to curb misuse of Cobalt Strike, expert says (VentureBeat)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US and the UK warn of impending Russian cyberattacks, and Russia responds with warnings against “banditry,” crime, and bad manners. CISA issues two new ICS advisories. Microsoft confirms a Lapsus$ gang incident, and so does Okta, but Okta’s case is more complicated. Josh Ray from Accenture on the cyber workforce. Our guest is Tom Gaffney from F-Secure with some ways to reduce digital anxietySecureworks takes a look at the criminal ecosystem around Conti.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/56</p><p><br></p><h2>Selected reading.</h2><p><a href="https://dailypost.ng/2022/03/22/ukraine-war-has-put-our-relationship-with-us-at-breaking-point-russia/">Ukraine war has put our relationship with US at breaking point - Russia</a> (Daily Post Nigeria) </p><p><a href="https://www.reuters.com/world/europe/kremlin-accuses-us-state-level-banditry-rejects-cyber-attack-plans-2022-03-22/">Kremlin dismisses U.S. warning of potential Russian cyber attacks</a> (Reuters) .</p><p><a href="https://www.newsweek.com/biden-puts-us-alert-russia-seeks-talks-help-prevent-cyber-war-1690673">As Biden puts US on alert, Russia seeks talks to help prevent cyber war</a> (Newsweek) </p><p><a href="https://therecord.media/u-k-echoes-biden-warning-on-russian-cyberattacks/">U.K. echoes Biden warning on Russian cyberattacks</a> (The Record by Recorded Future) </p><p><a href="https://www.c4isrnet.com/cyber/2022/03/22/biden-russia-mulling-cyberattacks-on-us/">Biden: Russia mulling cyberattacks on US</a> (C4ISRNet) </p><p><a href="https://www.fox5dc.com/news/national-security-advisor-details-new-intelligence-on-potential-russian-cyberattacks">National Security Advisor details new intelligence on potential Russian cyberattacks</a> (FOX 5 DC)</p><p><a href="https://www.newyorker.com/news/daily-comment/the-threat-of-russian-cyberattacks-looms-large">The Threat of Russian Cyberattacks Looms Large</a> (The New Yorker) </p><p><a href="https://apnews.com/article/russia-ukraine-technology-business-europe-e4ddad8739fb3d2d923b7edf7c83ed6a">FBI sees growing Russian hacker interest in US energy firms</a> (AP NEWS) </p><p><a href="https://youtu.be/q-vnMmQHASY">CISA Call with Critical Infrastructure Partners on Potential Russian Cyberattacks Against the U.S.</a> (YouTube) </p><p><a href="https://federalnewsnetwork.com/cybersecurity/2022/03/cisa-highlights-new-reporting-hotline-amid-warnings-about-potential-russian-cyber-attacks/">CISA highlights new reporting hotline amid warnings about potential Russian cyber attacks</a> (Federal News Network)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-081-01">Delta Electronics DIAEnergie</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-21-238-03">Delta Electronics DIAEnergie (Update B)</a> (CISA) </p><p><a href="https://www.securityweek.com/microsoft-okta-investigating-data-theft-claims">Microsoft, Okta Investigating Data Theft Claims</a> (SecurityWeek) </p><p><a href="https://www.reuters.com/technology/authentication-services-firm-okta-says-it-is-investigating-report-breach-2022-03-22/">Hackers hit authentication firm Okta, customers 'may have been impacted'</a> (Reuters) </p><p><a href="https://www.wired.com/story/okta-hack-microsoft-bing-code-leak-lapsus/">'This Is Really, Really Bad': Lapsus$ Gang Claims Okta Hack</a> (Wired).</p><p><a href="https://therecord.media/okta-identifying-and-contacting-customers-potentially-affected-by-lapsus-breach/">Okta ‘identifying and contacting’ customers potentially affected by Lapsus$ breach</a> (The Record by Recorded Future) </p><p><a href="https://www.wsj.com/articles/okta-investigates-reports-of-a-digital-breach-11647931174">Okta Investigates Report of Security Breach, Says It Finds No Evidence of New Attack</a> (Wall Street Journal) </p><p><a href="https://www.forbes.com/sites/thomasbrewster/2022/03/22/fury-as-okta-the-company-that-manages-100-million-logins-fails-to-tell-customers-about-breach-for-months/?sh=2ca553687341">Fury As Okta—The Company That Manages 100 Million Logins—Fails To Tell Customers About Breach For Months</a> (Forbes) </p><p><a href="https://blog.cloudflare.com/cloudflare-investigation-of-the-january-2022-okta-compromise/?mod=djemCybersecruityPro&amp;tpl=cy">Cloudflare’s investigation of the January 2022 Okta compromise</a> (Cloudflare Blog).</p><p><a href="https://www.okta.com/blog/2022/03/updated-okta-statement-on-lapsus/">Updated Okta Statement on LAPSUS$</a> (Okta) </p><p><a href="https://www.secureworks.com/blog/gold-ulrick-leaks-reveal-organizational-structure-and-relationships">GOLD ULRICK leaks reveal organizational structure and relationships </a>(Secureworks) </p><p><a href="https://www.computerweekly.com/news/252514952/Details-of-Conti-ransomware-affiliate-released">Details of Conti ransomware affiliate released</a> (ComputerWeekly.com) </p><p><a href="https://venturebeat.com/2022/03/22/more-can-be-done-to-curb-misuse-of-cobalt-strike-expert-says/">More can be done to curb misuse of Cobalt Strike, expert says</a> (VentureBeat)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1535</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ae52d384-7881-11ec-90a9-7b021b8e6485]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1786145452.mp3?updated=1690302774" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>White House adds its voice to CISA’s Shields Up, warning of the possibility of Russian cyberattacks. New malware strains described, new criminal attack techniques observed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1540/notes</link>
      <description>White House warns of large-scale Russian cyberattacks. Browser-in-the-Browser attacks. New Conti affiliate described. Android malware “Facestealer” described. Android malware “Facestealer” described. Microsoft and Okta investigate possible Lapsus$ attacks. Arid Gopher is out in the wild. Our guest is Swathi West of Barr Advisory on opportunities for the underrepresented in cybersecurity. Joe Carrigan wonders if we can’t just get rid of passwords once and for all. And advancing censorship by finding “extremism” and “Russophobia” in Meta’s platforms.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/55

Selected reading.
Russia's hybrid war with Ukraine: strategy, norms, and alliances (The CyberWire)
Statement by President Biden on our Nation’s Cybersecurity (The White House) 
FACT SHEET: Act Now to Protect Against Potential Cyberattacks (The White House) 
Statement from CISA Director Easterly on Potential Russian Cyberattacks Against the United States (CISA) 
Press Briefing by Press Secretary Jen Psaki and Deputy NSA for Cyber and Emerging Technologies Anne Neuberger, March 21, 2022 (The White House) 
Statement from Secretary Mayorkas on Cybersecurity Preparedness (US Department of Homeland Security) 
Conti Affiliate Exposed: New Domain Names, IP Addresses and Email… (eSentire) 
New Phishing toolkit lets anyone create fake Chrome browser windows (BleepingComputer).
New Browser-in-the Browser (BITB) Attack Makes Phishing Nearly Undetectable (The Hacker News)
Arid Gopher: Newest Micropsia Malware Variant (Deep Instinct) 
Spyware dubbed Facestealer infects 100,000+ Google Play users (Pradeo) 
Okta confirms investigation into potential breach (The Record by Recorded Future) 
Microsoft investigating alleged Lapsus$ hack of Azure DevOps source code repositories (Computing) 
Russian War Report: Meta officially declared “extremist organization” in Russia (Atlantic Council) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Mar 2022 20:20:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1540</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>White House adds its voice to CISA’s Shields Up, warning of the possibility of Russian cyberattacks. New malware strains described, new criminal attack techniques observed.</itunes:subtitle>
      <itunes:summary>White House warns of large-scale Russian cyberattacks. Browser-in-the-Browser attacks. New Conti affiliate described. Android malware “Facestealer” described. Android malware “Facestealer” described. Microsoft and Okta investigate possible Lapsus$ attacks. Arid Gopher is out in the wild. Our guest is Swathi West of Barr Advisory on opportunities for the underrepresented in cybersecurity. Joe Carrigan wonders if we can’t just get rid of passwords once and for all. And advancing censorship by finding “extremism” and “Russophobia” in Meta’s platforms.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/55

Selected reading.
Russia's hybrid war with Ukraine: strategy, norms, and alliances (The CyberWire)
Statement by President Biden on our Nation’s Cybersecurity (The White House) 
FACT SHEET: Act Now to Protect Against Potential Cyberattacks (The White House) 
Statement from CISA Director Easterly on Potential Russian Cyberattacks Against the United States (CISA) 
Press Briefing by Press Secretary Jen Psaki and Deputy NSA for Cyber and Emerging Technologies Anne Neuberger, March 21, 2022 (The White House) 
Statement from Secretary Mayorkas on Cybersecurity Preparedness (US Department of Homeland Security) 
Conti Affiliate Exposed: New Domain Names, IP Addresses and Email… (eSentire) 
New Phishing toolkit lets anyone create fake Chrome browser windows (BleepingComputer).
New Browser-in-the Browser (BITB) Attack Makes Phishing Nearly Undetectable (The Hacker News)
Arid Gopher: Newest Micropsia Malware Variant (Deep Instinct) 
Spyware dubbed Facestealer infects 100,000+ Google Play users (Pradeo) 
Okta confirms investigation into potential breach (The Record by Recorded Future) 
Microsoft investigating alleged Lapsus$ hack of Azure DevOps source code repositories (Computing) 
Russian War Report: Meta officially declared “extremist organization” in Russia (Atlantic Council) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>White House warns of large-scale Russian cyberattacks. Browser-in-the-Browser attacks. New Conti affiliate described. Android malware “Facestealer” described. Android malware “Facestealer” described. Microsoft and Okta investigate possible Lapsus$ attacks. Arid Gopher is out in the wild. Our guest is Swathi West of Barr Advisory on opportunities for the underrepresented in cybersecurity. Joe Carrigan wonders if we can’t just get rid of passwords once and for all. And advancing censorship by finding “extremism” and “Russophobia” in Meta’s platforms.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/55</p><p><br></p><p><strong>Selected reading.</strong></p><p><a href="https://thecyberwire.com/stories/8c24f39926e04150b4f3f8769407c244/russias-hybrid-war-with-ukraine-strategy-norms-and-alliances">Russia's hybrid war with Ukraine: strategy, norms, and alliances</a> (The CyberWire)</p><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2022/03/21/statement-by-president-biden-on-our-nations-cybersecurity/">Statement by President Biden on our Nation’s Cybersecurity</a> (The White House) </p><p><a href="https://www.whitehouse.gov/briefing-room/statements-releases/2022/03/21/fact-sheet-act-now-to-protect-against-potential-cyberattacks/">FACT SHEET: Act Now to Protect Against Potential Cyberattacks</a> (The White House) </p><p><a href="https://www.cisa.gov/news/2022/03/21/statement-cisa-director-easterly-potential-russian-cyberattacks-against-united">Statement from CISA Director Easterly on Potential Russian Cyberattacks Against the United States</a> (CISA) </p><p><a href="https://www.whitehouse.gov/briefing-room/press-briefings/2022/03/21/press-briefing-by-press-secretary-jen-psaki-and-deputy-nsa-for-cyber-and-emerging-technologies-anne-neuberger-march-21-2022/">Press Briefing by Press Secretary Jen Psaki and Deputy NSA for Cyber and Emerging Technologies Anne Neuberger, March 21, 2022</a> (The White House) </p><p><a href="https://www.dhs.gov/news/2022/03/21/statement-secretary-mayorkas-cybersecurity-preparedness">Statement from Secretary Mayorkas on Cybersecurity Preparedness</a> (US Department of Homeland Security) </p><p><a href="https://www.esentire.com/blog/conti-affiliate-exposed-new-domain-names-ip-addresses-and-email-addresses-uncovered-by-esentire">Conti Affiliate Exposed: New Domain Names, IP Addresses and Email…</a> (eSentire) </p><p><a href="https://www.bleepingcomputer.com/news/security/new-phishing-toolkit-lets-anyone-create-fake-chrome-browser-windows/">New Phishing toolkit lets anyone create fake Chrome browser windows</a> (BleepingComputer).</p><p><a href="https://thehackernews.com/2022/03/new-browser-in-browser-bitb-attack.html">New Browser-in-the Browser (BITB) Attack Makes Phishing Nearly Undetectable</a> (The Hacker News)</p><p><a href="https://www.deepinstinct.com/blog/arid-gopher-the-newest-micropsia-malware-variant">Arid Gopher: Newest Micropsia Malware Variant</a> (Deep Instinct) </p><p><a href="https://blog.pradeo.com/spyware-facestealer-google-play">Spyware dubbed Facestealer infects 100,000+ Google Play users</a> (Pradeo) </p><p><a href="https://therecord.media/okta-supply-chain-attack/">Okta confirms investigation into potential breach</a> (The Record by Recorded Future) </p><p><a href="https://www.computing.co.uk/news/4046943/microsoft-investigating-alleged-lapsususd-hack-azure-devops-source-code-repositories">Microsoft investigating alleged Lapsus$ hack of Azure DevOps source code repositories </a>(Computing) </p><p><a href="https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-war-report-meta-officially-declared-extremist-organization-in-russia/">Russian War Report: Meta officially declared “extremist organization” in Russia</a> (Atlantic Council) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1469</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ad67e1ee-7881-11ec-90a9-93d6a4a0608a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4774185840.mp3?updated=1690302701" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacktivism, protestware, and information operations in a hybrid war. Brazi-based cyber gangs active in extortion. Steganography opens a backdoor. A free decryptor for Diavol ransomware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1539/notes</link>
      <description>The widely expected, intense Russian cyber campaign has yet to appear. "Protestware" as a dangerous turn in hacktivism. Information operations and the persistence of independent channels of news. Social media as an opsec problem.Lapsus$ may have hit Microsoft. A second Brazilian gang tries its hand at extortion. A snakey backdoor afflicts French organizations. AD Bryan Vorndran of the FBI Cyber Division on what the agency brings to the table in the cyberspace. Rick Howard considers infrastructure as code. Emsisoft offers a free decryptor for Diavol ransomware.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/54

Selected reading.
Volodymyr Zelensky tells Russia to seek ‘meaningful’ peace talks or face catastrophic losses (The Telegraph)
Cyber threats and the Ukraine conflict (Avast)
Cyber ‘cold war’ rages online but Russia holds back on massive digital attacks (Times of Israel) 
Mar 13- Mar 19 Ukraine – Russia the silent cyber conflict (Security Affairs) 
Former CIA officer shows what a Russian cyberattack on the US would look like (Fox News) 
EU and US agencies warn that Russia could attack satellite communications networks (Security Affairs) 
Banks on alert for Russian reprisal cyberattacks on Swift (Ars Technica) 
Activists are targeting Russians with open-source “protestware” (MIT Technology Review) 
Cyber warfare gets real for satellite operators (SpaceNews)
More Conti ransomware source code leaked on Twitter out of revenge (BleepingComputer) 
Open Source Maintainer Sabotages Code to Wipe Russian, Belarusian Computers (Vice) 
Anonymous has unleashed a successful cyberwar to undermine Putin's Ukraine invasion (Fortune) 
Some Russians are breaking through Putin’s digital iron curtain — leading to fights with friends and family (Washington Post) 
On Russia's VK, anti-war messages defy Vladimir Putin's Ukraine censors (Newsweek)
Why Russia’s anti-war movement matters (Atlantic Council) 
Telegram Thrives Amid Russia’s Media Crackdown (Wall Street Journal) 
British soldiers are ordered off WhatsApp amid fears that sensitive military details could be accessed by Russian hackers (Daily Mail)
Microsoft Investigating Claim of Breach by Extortion Gang (Vice) 
Hacking group that went after NVIDIA may have also attacked Microsoft (Windows Central) 
Microsoft Allegedly Breached by LAPSUS Group (Cyber Kendra) 
Lapsus$ gang sends a worrying message to would-be criminals (Register) 
TransUnion cyber attack – hackers demand R225 million ransom (Business Tech).
TransUnion Confirms Data Breach at South Africa Business (SecurityWeek) 
UPDATE | TransUnion believes breach of 54 million SA records unrelated to current hack (Fin24) 
Banks move to protect consumers in wake of TransUnion cyberattack (TechCentral) 
Serpent, No Swiping! New Backdoor Targets French Entities with Unique Attack Chain (Proofpoint) 
Emsisoft releases free decryptor for the victims of the Diavol ransomware (Security Affairs)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 21 Mar 2022 20:15:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1539</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Hacktivism, protestware, and information operations in a hybrid war. Brazi-based cyber gangs active in extortion. Steganography opens a backdoor. A free decryptor for Diavol ransomware.</itunes:subtitle>
      <itunes:summary>The widely expected, intense Russian cyber campaign has yet to appear. "Protestware" as a dangerous turn in hacktivism. Information operations and the persistence of independent channels of news. Social media as an opsec problem.Lapsus$ may have hit Microsoft. A second Brazilian gang tries its hand at extortion. A snakey backdoor afflicts French organizations. AD Bryan Vorndran of the FBI Cyber Division on what the agency brings to the table in the cyberspace. Rick Howard considers infrastructure as code. Emsisoft offers a free decryptor for Diavol ransomware.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/54

Selected reading.
Volodymyr Zelensky tells Russia to seek ‘meaningful’ peace talks or face catastrophic losses (The Telegraph)
Cyber threats and the Ukraine conflict (Avast)
Cyber ‘cold war’ rages online but Russia holds back on massive digital attacks (Times of Israel) 
Mar 13- Mar 19 Ukraine – Russia the silent cyber conflict (Security Affairs) 
Former CIA officer shows what a Russian cyberattack on the US would look like (Fox News) 
EU and US agencies warn that Russia could attack satellite communications networks (Security Affairs) 
Banks on alert for Russian reprisal cyberattacks on Swift (Ars Technica) 
Activists are targeting Russians with open-source “protestware” (MIT Technology Review) 
Cyber warfare gets real for satellite operators (SpaceNews)
More Conti ransomware source code leaked on Twitter out of revenge (BleepingComputer) 
Open Source Maintainer Sabotages Code to Wipe Russian, Belarusian Computers (Vice) 
Anonymous has unleashed a successful cyberwar to undermine Putin's Ukraine invasion (Fortune) 
Some Russians are breaking through Putin’s digital iron curtain — leading to fights with friends and family (Washington Post) 
On Russia's VK, anti-war messages defy Vladimir Putin's Ukraine censors (Newsweek)
Why Russia’s anti-war movement matters (Atlantic Council) 
Telegram Thrives Amid Russia’s Media Crackdown (Wall Street Journal) 
British soldiers are ordered off WhatsApp amid fears that sensitive military details could be accessed by Russian hackers (Daily Mail)
Microsoft Investigating Claim of Breach by Extortion Gang (Vice) 
Hacking group that went after NVIDIA may have also attacked Microsoft (Windows Central) 
Microsoft Allegedly Breached by LAPSUS Group (Cyber Kendra) 
Lapsus$ gang sends a worrying message to would-be criminals (Register) 
TransUnion cyber attack – hackers demand R225 million ransom (Business Tech).
TransUnion Confirms Data Breach at South Africa Business (SecurityWeek) 
UPDATE | TransUnion believes breach of 54 million SA records unrelated to current hack (Fin24) 
Banks move to protect consumers in wake of TransUnion cyberattack (TechCentral) 
Serpent, No Swiping! New Backdoor Targets French Entities with Unique Attack Chain (Proofpoint) 
Emsisoft releases free decryptor for the victims of the Diavol ransomware (Security Affairs)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The widely expected, intense Russian cyber campaign has yet to appear. "Protestware" as a dangerous turn in hacktivism. Information operations and the persistence of independent channels of news. Social media as an opsec problem.Lapsus$ may have hit Microsoft. A second Brazilian gang tries its hand at extortion. A snakey backdoor afflicts French organizations. AD Bryan Vorndran of the FBI Cyber Division on what the agency brings to the table in the cyberspace. Rick Howard considers infrastructure as code. Emsisoft offers a free decryptor for Diavol ransomware.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/54</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.telegraph.co.uk/world-news/2022/03/18/ukraine-news-russia-war-live-putin-zelensky-kyiv-latest/">Volodymyr Zelensky tells Russia to seek ‘meaningful’ peace talks or face catastrophic losses</a> (The Telegraph)</p><p><a href="https://blog.avast.com/cyber-threats-and-the-ukraine-conflict-avast">Cyber threats and the Ukraine conflict</a> (Avast)</p><p><a href="https://www.timesofisrael.com/cyber-cold-war-wages-online-as-russia-holds-back-on-massive-attacks/">Cyber ‘cold war’ rages online but Russia holds back on massive digital attacks</a> (Times of Israel) </p><p><a href="https://securityaffairs.co/wordpress/129263/cyber-warfare-2/mar-13-19-ukraine-russia-cyber-conflict.html">Mar 13- Mar 19 Ukraine – Russia the silent cyber conflict</a> (Security Affairs) </p><p><a href="https://www.foxnews.com/media/former-cia-officer-russian-cyberattack-us">Former CIA officer shows what a Russian cyberattack on the US would look like</a> (Fox News) </p><p><a href="https://securityaffairs.co/wordpress/129243/cyber-warfare-2/russia-could-attack-satellite-communications.html">EU and US agencies warn that Russia could attack satellite communications networks</a> (Security Affairs) </p><p><a href="https://arstechnica.com/information-technology/2022/03/banks-on-alert-for-russian-reprisal-cyberattacks-on-swift/">Banks on alert for Russian reprisal cyberattacks on Swift</a> (Ars Technica) </p><p><a href="https://www.technologyreview.com/2022/03/21/1047489/activists-are-targeting-russians-with-open-source-protestware/">Activists are targeting Russians with open-source “protestware”</a> (MIT Technology Review) </p><p><a href="https://spacenews.com/cyber-warfare-gets-real-for-satellite-operators/">Cyber warfare gets real for satellite operators</a> (SpaceNews)</p><p><a href="https://www.bleepingcomputer.com/news/security/more-conti-ransomware-source-code-leaked-on-twitter-out-of-revenge/">More Conti ransomware source code leaked on Twitter out of revenge</a> (BleepingComputer) </p><p><a href="https://www.vice.com/en/article/dypeek/open-source-sabotage-node-ipc-wipe-russia-belraus-computers">Open Source Maintainer Sabotages Code to Wipe Russian, Belarusian Computers</a> (Vice) </p><p><a href="https://fortune.com/2022/03/18/anonymous-cyberwar-on-putins-ukraine-invasion/">Anonymous has unleashed a successful cyberwar to undermine Putin's Ukraine invasion</a> (Fortune) </p><p><a href="https://www.washingtonpost.com/technology/2022/03/19/russia-vpn-internet/">Some Russians are breaking through Putin’s digital iron curtain — leading to fights with friends and family</a> (Washington Post) </p><p><a href="https://www.newsweek.com/russia-vk-anti-war-messages-defy-vladimir-putin-ukraine-censors-1689518">On Russia's VK, anti-war messages defy Vladimir Putin's Ukraine censors</a> (Newsweek)</p><p><a href="https://www.atlanticcouncil.org/blogs/ukrainealert/why-russias-anti-war-movement-matters/">Why Russia’s anti-war movement matters</a> (Atlantic Council) </p><p><a href="https://www.wsj.com/articles/telegram-thrives-amid-russias-media-crackdown-11647595800?mod=djemalertNEWS">Telegram Thrives Amid Russia’s Media Crackdown</a> (Wall Street Journal) </p><p><a href="https://www.dailymail.co.uk/news/article-10633873/British-soldiers-ordered-WhatsApp-hacking-fears.html">British soldiers are ordered off WhatsApp amid fears that sensitive military details could be accessed by Russian hackers</a> (Daily Mail)</p><p><a href="https://www.vice.com/en/article/y3vk9x/microsoft-hacked-lapsus-extortion-investigating">Microsoft Investigating Claim of Breach by Extortion Gang</a> (Vice) </p><p><a href="https://www.windowscentral.com/microsoft-may-have-been-hit-same-hackers-who-went-after-nvidia">Hacking group that went after NVIDIA may have also attacked Microsoft</a> (Windows Central) </p><p><a href="https://www.cyberkendra.com/2022/03/microsoft-allegedly-breached-by-lapsus.html">Microsoft Allegedly Breached by LAPSUS Group</a> (Cyber Kendra) </p><p><a href="https://www.theregister.com/2022/03/17/lapsus-larger-companies/">Lapsus$ gang sends a worrying message to would-be criminals</a> (Register) </p><p><a href="https://businesstech.co.za/news/cloud-hosting/569658/transunion-cyber-attack-hackers-demand-r225-million-ransom/">TransUnion cyber attack – hackers demand R225 million ransom</a> (Business Tech).</p><p><a href="https://www.securityweek.com/transunion-confirms-data-breach-south-africa-business">TransUnion Confirms Data Breach at South Africa Business</a> (SecurityWeek) </p><p><a href="https://www.news24.com/fin24/companies/transunion-hack-banks-trying-to-protect-accounts-but-warn-of-tricky-impersonators-20220319">UPDATE | TransUnion believes breach of 54 million SA records unrelated to current hack</a> (Fin24) </p><p><a href="https://techcentral.co.za/banks-move-to-protect-consumers-in-wake-of-transunion-cyberattack/209032/">Banks move to protect consumers in wake of TransUnion cyberattack</a> (TechCentral) </p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/serpent-no-swiping-new-backdoor-targets-french-entities-unique-attack-chain">Serpent, No Swiping! New Backdoor Targets French Entities with Unique Attack Chain</a> (Proofpoint) </p><p><a href="https://securityaffairs.co/wordpress/129211/malware/emsisoft-releases-free-decryptor-for-the-victims-of-the-diavol-ransomware.html">Emsisoft releases free decryptor for the victims of the Diavol ransomware</a> (Security Affairs)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1577</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ad02e8d4-7881-11ec-90a9-6b1e4cde20b8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9983075862.mp3?updated=1690302655" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Derek Manky: Putting the rubber to the road. [Threat Intelligence] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/92/notes</link>
      <description>Chief Security Strategist and VP of Global Threat Intelligence at FortiGuard Labs, Derek Manky, shares his story from programmer to cybersecurity and how it all came together. Derek started his career teaching programming because he had such a passion for it. When he joined Fortinet, Derek said putting where it "really started putting the rubber to the road and connecting my previous experience with programming and debugging and knowledge of operating systems and all that with real-world applications." Derek advises that it doesn't need to be complicated getting into the cybersecurity field and that there are many avenues to enter the field. He hopes to have made a real dent, or "hopefully a crater" in cyber crime when he ends his career. We thank Derek for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 20 Mar 2022 07:00:00 -0000</pubDate>
      <itunes:title>Derek Manky: Putting the rubber to the road. [Threat Intelligence] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>92</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Chief Security Strategist and VP of Global Threat Intelligence at FortiGuard Labs, Derek Manky, shares his story from programmer to cybersecurity and how it all came together. </itunes:subtitle>
      <itunes:summary>Chief Security Strategist and VP of Global Threat Intelligence at FortiGuard Labs, Derek Manky, shares his story from programmer to cybersecurity and how it all came together. Derek started his career teaching programming because he had such a passion for it. When he joined Fortinet, Derek said putting where it "really started putting the rubber to the road and connecting my previous experience with programming and debugging and knowledge of operating systems and all that with real-world applications." Derek advises that it doesn't need to be complicated getting into the cybersecurity field and that there are many avenues to enter the field. He hopes to have made a real dent, or "hopefully a crater" in cyber crime when he ends his career. We thank Derek for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chief Security Strategist and VP of Global Threat Intelligence at FortiGuard Labs, Derek Manky, shares his story from programmer to cybersecurity and how it all came together. Derek started his career teaching programming because he had such a passion for it. When he joined Fortinet, Derek said putting where it "really started putting the rubber to the road and connecting my previous experience with programming and debugging and knowledge of operating systems and all that with real-world applications." Derek advises that it doesn't need to be complicated getting into the cybersecurity field and that there are many avenues to enter the field. He hopes to have made a real dent, or "hopefully a crater" in cyber crime when he ends his career. We thank Derek for sharing his story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>473</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cfd6870e-a616-11ec-b93a-1b99c5d7d6f2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1603900951.mp3?updated=1647537986" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Implications of data leaks of sensitive OT information. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/224/notes</link>
      <description>Guest Nathan Brubaker from Mandiant joins Dave Bittner on this episode to discuss Mandiant Threat Intelligence's research: "1 in 7 Ransomware Extortion Attacks Leak Critical Operational Technology Information." Data leaks have always been a concern for organizations. The exposure of sensitive information can result in damage to reputation, legal penalties, loss of intellectual property, and even impact the privacy of employees and customers. However, there is little research about the challenges posed to industrial organizations when threat actors disclose sensitive details about their OT security, production, operations, or technology.
In 2021, Mandiant Threat Intelligence continued observing ransomware operators attempting to extort thousands of victims by disclosing terabytes of stolen information on shaming sites. This trend, which Mandiant Threat Intelligence refers to as “Multifaceted Extortion,” impacted over 1,300 organizations from critical infrastructure and industrial production sectors in just one year. Nathan walks us through their research and findings.
The research can be found here:
1 in 7 Ransomware Extortion Attacks Leak Critical Operational Technology Information

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Mar 2022 07:00:00 -0000</pubDate>
      <itunes:title>Implications of data leaks of sensitive OT information. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>224</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Nathan Brubaker from Mandiant joins Dave Bittner on this episode to discuss Mandiant Threat Intelligence's research: "1 in 7 Ransomware Extortion Attacks Leak Critical Operational Technology Information." Data leaks have always been a concern for organizations. The exposure of sensitive information can result in damage to reputation, legal penalties, loss of intellectual property, and even impact the privacy of employees and customers. However, there is little research about the challenges posed to industrial organizations when threat actors disclose sensitive details about their OT security, production, operations, or technology.
In 2021, Mandiant Threat Intelligence continued observing ransomware operators attempting to extort thousands of victims by disclosing terabytes of stolen information on shaming sites. This trend, which Mandiant Threat Intelligence refers to as “Multifaceted Extortion,” impacted over 1,300 organizations from critical infrastructure and industrial production sectors in just one year. Nathan walks us through their research and findings.
The research can be found here:
1 in 7 Ransomware Extortion Attacks Leak Critical Operational Technology Information

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Nathan Brubaker from Mandiant joins Dave Bittner on this episode to discuss Mandiant Threat Intelligence's research: "1 in 7 Ransomware Extortion Attacks Leak Critical Operational Technology Information." Data leaks have always been a concern for organizations. The exposure of sensitive information can result in damage to reputation, legal penalties, loss of intellectual property, and even impact the privacy of employees and customers. However, there is little research about the challenges posed to industrial organizations when threat actors disclose sensitive details about their OT security, production, operations, or technology.</p><p>In 2021, Mandiant Threat Intelligence continued observing ransomware operators attempting to extort thousands of victims by disclosing terabytes of stolen information on shaming sites. This trend, which Mandiant Threat Intelligence refers to as “Multifaceted Extortion,” impacted over 1,300 organizations from critical infrastructure and industrial production sectors in just one year. Nathan walks us through their research and findings.</p><p>The research can be found here:</p><ul><li><a href="https://www.mandiant.com/resources/ransomware-extortion-ot-docs">1 in 7 Ransomware Extortion Attacks Leak Critical Operational Technology Information</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1373</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5b13e12c-a4c3-11ec-8b64-3fe11d775d1a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2026375095.mp3?updated=1685126725" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacktivism and other cyberattacks continue against Russian targets, but some hacktivism may go too far. C2C market notes. Advice from CISA and NIST. Prank calls as statecraft.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1538/notes</link>
      <description>Hacktivism and other cyberattacks continue against Russian targets, but some hacktivism that affects software supply chains may go too far. An initial access broker in the criminal-to-criminal market. BlackMatter may be working with BlackCat. CISA offers a warning and advice to SATCOM operators. NIST offers some guidance on industrial control system security. Johannes Ullrich reminds us to patch our backup tools. Our guest is Armando Saey from MISI with insights on maritime port security. And Rear Admiral Mehoff, call your office.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/53

Selected reading.
Popular NPM Package Updated to Wipe Russia, Belarus Systems to Protest Ukraine Invasion (The Hacker News) 
Software Supply Chain Weakness: Snyk Warns of 'Deliberate Sabotage' of NPM Ecosystem (SecurityWeek) 
Russian government websites face ‘unprecedented’ wave of hacking attacks, ministry says (Washington Post) 
Ukraine’s Digital Ministry Is a Formidable War Machine (Wired)
Exposing initial access broker with ties to Conti (Google) 
Experts Find Some Affiliates of BlackMatter Now Spreading BlackCat Ransomware (The Hacker News)
Strengthening Cybersecurity of SATCOM Network Providers and Customers (CISA) 
NIST SPECIAL PUBLICATION 1800-10 Protecting Information and System Integrity in Industrial Control System Environments: Cybersecurity for the Manufacturing Sector (NIST)
Hoax caller claiming to be Ukrainian PM got through to UK defence secretary (the Guardian) 
Russians target Priti Patel and Ben Wallace with fake video calls (The Telegraph) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 18 Mar 2022 20:15:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1538</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Hacktivism and other cyberattacks continue against Russian targets, but some hacktivism may go too far. C2C market notes. Advice from CISA and NIST. Prank calls as statecraft.</itunes:subtitle>
      <itunes:summary>Hacktivism and other cyberattacks continue against Russian targets, but some hacktivism that affects software supply chains may go too far. An initial access broker in the criminal-to-criminal market. BlackMatter may be working with BlackCat. CISA offers a warning and advice to SATCOM operators. NIST offers some guidance on industrial control system security. Johannes Ullrich reminds us to patch our backup tools. Our guest is Armando Saey from MISI with insights on maritime port security. And Rear Admiral Mehoff, call your office.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/53

Selected reading.
Popular NPM Package Updated to Wipe Russia, Belarus Systems to Protest Ukraine Invasion (The Hacker News) 
Software Supply Chain Weakness: Snyk Warns of 'Deliberate Sabotage' of NPM Ecosystem (SecurityWeek) 
Russian government websites face ‘unprecedented’ wave of hacking attacks, ministry says (Washington Post) 
Ukraine’s Digital Ministry Is a Formidable War Machine (Wired)
Exposing initial access broker with ties to Conti (Google) 
Experts Find Some Affiliates of BlackMatter Now Spreading BlackCat Ransomware (The Hacker News)
Strengthening Cybersecurity of SATCOM Network Providers and Customers (CISA) 
NIST SPECIAL PUBLICATION 1800-10 Protecting Information and System Integrity in Industrial Control System Environments: Cybersecurity for the Manufacturing Sector (NIST)
Hoax caller claiming to be Ukrainian PM got through to UK defence secretary (the Guardian) 
Russians target Priti Patel and Ben Wallace with fake video calls (The Telegraph) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hacktivism and other cyberattacks continue against Russian targets, but some hacktivism that affects software supply chains may go too far. An initial access broker in the criminal-to-criminal market. BlackMatter may be working with BlackCat. CISA offers a warning and advice to SATCOM operators. NIST offers some guidance on industrial control system security. Johannes Ullrich reminds us to patch our backup tools. Our guest is Armando Saey from MISI with insights on maritime port security. And Rear Admiral Mehoff, call your office.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/53</p><p><br></p><p><strong>Selected reading.</strong></p><p><a href="https://thehackernews.com/2022/03/popular-npm-package-updated-to-wipe.html">Popular NPM Package Updated to Wipe Russia, Belarus Systems to Protest Ukraine Invasion</a> (The Hacker News) </p><p><a href="https://www.securityweek.com/software-supply-chain-weakness-snyk-warns-deliberate-sabotage-npm-ecosystem">Software Supply Chain Weakness: Snyk Warns of 'Deliberate Sabotage' of NPM Ecosystem</a> (SecurityWeek) </p><p><a href="https://www.washingtonpost.com/world/2022/03/17/russia-government-hacking-wave-unprecedented/">Russian government websites face ‘unprecedented’ wave of hacking attacks, ministry says</a> (Washington Post) </p><p><a href="https://www.wired.com/story/ukraine-digital-ministry-war/">Ukraine’s Digital Ministry Is a Formidable War Machine</a> (Wired)</p><p><a href="https://blog.google/threat-analysis-group/exposing-initial-access-broker-ties-conti/">Exposing initial access broker with ties to Conti</a> (Google) </p><p><a href="https://thehackernews.com/2022/03/experts-find-some-affiliates-of.html">Experts Find Some Affiliates of BlackMatter Now Spreading BlackCat Ransomware</a> (The Hacker News)</p><p><a href="https://www.cisa.gov/uscert/ncas/alerts/aa22-076a">Strengthening Cybersecurity of SATCOM Network Providers and Customers</a> (CISA) </p><p><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-10.pdf">NIST SPECIAL PUBLICATION 1800-10 Protecting Information and System Integrity in Industrial Control System Environments: Cybersecurity for the Manufacturing Sector</a> (NIST)</p><p><a href="https://www.theguardian.com/politics/2022/mar/17/hoax-caller-ukrainian-pm-denys-shmyhal-uk-ben-wallace-priti-patel">Hoax caller claiming to be Ukrainian PM got through to UK defence secretary</a> (the Guardian) </p><p><a href="https://www.telegraph.co.uk/news/2022/03/17/russians-target-priti-patel-ben-wallace-fake-video-calls/">Russians target Priti Patel and Ben Wallace with fake video calls</a> (The Telegraph) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1454</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[af7ea094-7881-11ec-90a9-6b36a2b1255d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4590077883.mp3?updated=1690302587" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Debunking deepfakes. Hacktivism and information warfare. The prospect of “splinternets.” Germany warns of security product risks. Disruption of Ukrainian ISPs. New wrinkles in phishing.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1537/notes</link>
      <description>Not-so-deepfakes debunked. Hacktivism and information warfare in Russia’s war against Ukraine. The prospect of an age of “splinternets.” Germany warns of risks from Kaspersky security products. Disruption of Ukrainian ISPs. David Dufour from Webroot on cyberattacks hitting the automotive sector. Carole Theriault ponders parental disclosure of tracking their kids. Three new wrinkles to social engineering.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/52

Selected reading.
Russia and Ukraine ‘draw up 15-point peace plan’ (The Telegraph) 
Deepfake video of Zelenskyy could be 'tip of the iceberg' in info war, experts warn (NPR.org) 
The Russia-Ukraine War And The Revival Of Hacktivism (Digital Shadows) 
In a Chilling Threat, Putin Vows to Rid Russia of ‘Traitors’ (Bloomberg)
Russia is risking the creation of a “splinternet”—and it could be irreversible (MIT Technology Review) 
Traffic interception and MitM attacks among security risks of Russian TLS certs (CSO Online) 
Germany's BSI warns against Kaspersky AV over spying concerns (CSO Online) 
Major Ukrainian Internet Provider Triolan Suffers Severe Cyber Attacks and Infrastructure Destruction During Russian Invasion (CPO Magazine)
The Attack of the Chameleon Phishing Page (Trustwave) 
The Email Bait … and Phish: Instagram Phishing Attack (Armorblox) 
Using CAPTCHA Forms to Bypass Filters (Avanan)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 17 Mar 2022 20:30:00 -0000</pubDate>
      <itunes:title>Debunking deepfakes. Hacktivism and information warfare. The prospect of “splinternets.” Germany warns of security product risks. Disruption of Ukrainian ISPs. New wrinkles in phishing.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1537</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Not-so-deepfakes debunked. Hacktivism and information warfare in Russia’s war against Ukraine. The prospect of an age of “splinternets.” Germany warns of risks from Kaspersky security products. Disruption of Ukrainian ISPs. David Dufour from Webroot on cyberattacks hitting the automotive sector. Carole Theriault ponders parental disclosure of tracking their kids. Three new wrinkles to social engineering.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/52

Selected reading.
Russia and Ukraine ‘draw up 15-point peace plan’ (The Telegraph) 
Deepfake video of Zelenskyy could be 'tip of the iceberg' in info war, experts warn (NPR.org) 
The Russia-Ukraine War And The Revival Of Hacktivism (Digital Shadows) 
In a Chilling Threat, Putin Vows to Rid Russia of ‘Traitors’ (Bloomberg)
Russia is risking the creation of a “splinternet”—and it could be irreversible (MIT Technology Review) 
Traffic interception and MitM attacks among security risks of Russian TLS certs (CSO Online) 
Germany's BSI warns against Kaspersky AV over spying concerns (CSO Online) 
Major Ukrainian Internet Provider Triolan Suffers Severe Cyber Attacks and Infrastructure Destruction During Russian Invasion (CPO Magazine)
The Attack of the Chameleon Phishing Page (Trustwave) 
The Email Bait … and Phish: Instagram Phishing Attack (Armorblox) 
Using CAPTCHA Forms to Bypass Filters (Avanan)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Not-so-deepfakes debunked. Hacktivism and information warfare in Russia’s war against Ukraine. The prospect of an age of “splinternets.” Germany warns of risks from Kaspersky security products. Disruption of Ukrainian ISPs. David Dufour from Webroot on cyberattacks hitting the automotive sector. Carole Theriault ponders parental disclosure of tracking their kids. Three new wrinkles to social engineering.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/52</p><p><br></p><h2>Selected reading.</h2><p><a href="https://www.telegraph.co.uk/world-news/2022/03/16/ukraine-could-become-neutral-state-like-austria-moscow-kyiv/">Russia and Ukraine ‘draw up 15-point peace plan’</a> (The Telegraph) </p><p><a href="https://www.npr.org/2022/03/16/1087062648/deepfake-video-zelenskyy-experts-war-manipulation-ukraine-russia">Deepfake video of Zelenskyy could be 'tip of the iceberg' in info war, experts warn</a> (NPR.org) </p><p><a href="https://www.digitalshadows.com/blog-and-research/the-russia-ukraine-war-and-the-revival-of-hacktivism/">The Russia-Ukraine War And The Revival Of Hacktivism</a> (Digital Shadows) </p><p><a href="https://www.bloomberg.com/news/articles/2022-03-16/in-a-chilling-threat-putin-vows-to-rid-russia-of-traitors">In a Chilling Threat, Putin Vows to Rid Russia of ‘Traitors’</a> (Bloomberg)</p><p><a href="https://www.technologyreview.com/2022/03/17/1047352/russia-splinternet-risk/">Russia is risking the creation of a “splinternet”—and it could be irreversible</a> (MIT Technology Review) </p><p><a href="https://www.csoonline.com/article/3653315/traffic-interception-and-mitm-attacks-among-security-risks-of-russian-tls-certs.html">Traffic interception and MitM attacks among security risks of Russian TLS certs</a> (CSO Online) </p><p><a href="https://www.csoonline.com/article/3653593/germanys-bsi-warns-against-kaspersky-av-over-spying-concerns.html">Germany's BSI warns against Kaspersky AV over spying concerns</a> (CSO Online) </p><p><a href="https://www.cpomagazine.com/cyber-security/major-ukrainian-internet-provider-triolan-suffers-severe-cyber-attacks-and-infrastructure-destruction-during-russian-invasion/">Major Ukrainian Internet Provider Triolan Suffers Severe Cyber Attacks and Infrastructure Destruction During Russian Invasion</a> (CPO Magazine)</p><p><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/the-attack-of-the-chameleon-phishing-page/">The Attack of the Chameleon Phishing Page</a> (Trustwave) </p><p><a href="https://www.armorblox.com/blog/the-email-bait-and-phish-instagram-phishing-attack/">The Email Bait … and Phish: Instagram Phishing Attack</a> (Armorblox) </p><p><a href="https://www.avanan.com/blog/using-captcha-forms-to-bypass-filters">Using CAPTCHA Forms to Bypass Filters</a> (Avanan)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aed88ef2-7881-11ec-90a9-8344f93c22a7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6899645506.mp3?updated=1690302578" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ukrainian President Zelenskyy addresses the US Congress, as Russia’s hybrid war continues. LokiLocker ransomware flies a false flag. CISA warns of Russian cyber threat. Advance fee arrest.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1536/notes</link>
      <description>Ukrainian President Zelenskyy addresses the US Congress, as intelligence services, contractors, and hacktivists wage their part of a hybrid war. BlackBerry describes LokiLocker, a new strain of ransomware that’s not Iranian, but would have you think it is. CISA and the FBI warn of a Russian cyber campaign. Nigeria arrests an alleged advance-fee scam artist (he’s been wanted for some time.)

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/51
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 16 Mar 2022 20:25:00 -0000</pubDate>
      <itunes:title>Ukrainian President Zelenskyy addresses the US Congress, as Russia’s hybrid war continues. LokiLocker ransomware flies a false flag. CISA warns of Russian cyber threat. Advance fee arrest.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1536</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ukrainian President Zelenskyy addresses the US Congress, as intelligence services, contractors, and hacktivists wage their part of a hybrid war. BlackBerry describes LokiLocker, a new strain of ransomware that’s not Iranian, but would have you think it is. CISA and the FBI warn of a Russian cyber campaign. Nigeria arrests an alleged advance-fee scam artist (he’s been wanted for some time.)

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/51
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ukrainian President Zelenskyy addresses the US Congress, as intelligence services, contractors, and hacktivists wage their part of a hybrid war. BlackBerry describes LokiLocker, a new strain of ransomware that’s not Iranian, but would have you think it is. CISA and the FBI warn of a Russian cyber campaign. Nigeria arrests an alleged advance-fee scam artist (he’s been wanted for some time.)</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/51</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1448</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ae3199a8-7881-11ec-90a9-73a6dc234516]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9184886767.mp3?updated=1690302523" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Disinformation and cyberattacks in Russia’s hybrid war against Ukraine. DDoS attack hits Israeli telcos. Captured tools are old news. Recent trends in cybercrime.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1535/notes</link>
      <description>Biowar disinformation. A new wiper is discovered in Ukrainian systems. Cyber criminals look for letters of marque from both sides (and some of them are looking like hacktivists). Ukrainian cybersecurity firms and intelligence services mobilize against Russia. Ben Yelin evaluates cyber engagements in the crisis. A protester crashes a Russian news broadcast. DDoS attack takes down Israeli sites. China claims to have “captured” NSA hacking tools. Our guest is Ben Brook CEO of Transcend with a look at data privacy. Recent trends in cybercrime.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/50

Selected reading.
Researchers find new destructive wiper malware in Ukraine (The Verge) 
Cloud Native Technologies Used in Russia-Ukraine Cyber Attacks (Aqua Security) 
Financially motivated threat actors willing to go after Russian targets (Help Net Security) 
Kyiv’s hackers seize their wartime moment (POLITICO) 
Global Incident Report: Threat Actors Divide Along Ideological Lines over the Russia-Ukraine Conflict on Underground Forums (Accenture)
Political fallout in cybercrime circles upping the threat to Western targets (CyberScoop)
A protester storms a live broadcast on Russia’s most-watched news show, yelling, ‘Stop the war!’ (New York Times)
Denial-of-service attack knocked Israeli government sites offline (CyberScoop) 
China claims it captured NSA spy tool that already leaked (Register) 
Ransomware Variants Q4 2021 (Intel471.com) 
Cequence Security Releases Report Revealing Top 3 Attack Trends in API Security (Cequence) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Mar 2022 20:15:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1535</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Disinformation and cyberattacks in Russia’s hybrid war against Ukraine. DDoS attack hits Israeli telcos. Captured tools are old news. Recent trends in cybercrime.</itunes:subtitle>
      <itunes:summary>Biowar disinformation. A new wiper is discovered in Ukrainian systems. Cyber criminals look for letters of marque from both sides (and some of them are looking like hacktivists). Ukrainian cybersecurity firms and intelligence services mobilize against Russia. Ben Yelin evaluates cyber engagements in the crisis. A protester crashes a Russian news broadcast. DDoS attack takes down Israeli sites. China claims to have “captured” NSA hacking tools. Our guest is Ben Brook CEO of Transcend with a look at data privacy. Recent trends in cybercrime.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/50

Selected reading.
Researchers find new destructive wiper malware in Ukraine (The Verge) 
Cloud Native Technologies Used in Russia-Ukraine Cyber Attacks (Aqua Security) 
Financially motivated threat actors willing to go after Russian targets (Help Net Security) 
Kyiv’s hackers seize their wartime moment (POLITICO) 
Global Incident Report: Threat Actors Divide Along Ideological Lines over the Russia-Ukraine Conflict on Underground Forums (Accenture)
Political fallout in cybercrime circles upping the threat to Western targets (CyberScoop)
A protester storms a live broadcast on Russia’s most-watched news show, yelling, ‘Stop the war!’ (New York Times)
Denial-of-service attack knocked Israeli government sites offline (CyberScoop) 
China claims it captured NSA spy tool that already leaked (Register) 
Ransomware Variants Q4 2021 (Intel471.com) 
Cequence Security Releases Report Revealing Top 3 Attack Trends in API Security (Cequence) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Biowar disinformation. A new wiper is discovered in Ukrainian systems. Cyber criminals look for letters of marque from both sides (and some of them are looking like hacktivists). Ukrainian cybersecurity firms and intelligence services mobilize against Russia. Ben Yelin evaluates cyber engagements in the crisis. A protester crashes a Russian news broadcast. DDoS attack takes down Israeli sites. China claims to have “captured” NSA hacking tools. Our guest is Ben Brook CEO of Transcend with a look at data privacy. Recent trends in cybercrime.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/50</p><p><br></p><p><strong>Selected reading.</strong></p><p><a href="https://www.theverge.com/2022/3/14/22977873/ukraine-new-destructive-caddywiper-malware-eset">Researchers find new destructive wiper malware in Ukraine</a> (The Verge) </p><p><a href="https://blog.aquasec.com/cloud-native-attacks-russia-ukraine">Cloud Native Technologies Used in Russia-Ukraine Cyber Attacks</a> (Aqua Security) </p><p><a href="https://www.helpnetsecurity.com/2022/03/15/threat-actors-russian-targets/">Financially motivated threat actors willing to go after Russian targets</a> (Help Net Security) </p><p><a href="https://www.politico.eu/article/kyiv-cyber-firm-state-backed-hacking-group/">Kyiv’s hackers seize their wartime moment</a> (POLITICO) </p><p><a href="https://acn-marketing-blog.accenture.com/wp-content/uploads/2022/03/UPDATED-ACTI-Global-Incident-Report-Ideological-Divide-Blog-14MARCH22.pdf">Global Incident Report: Threat Actors Divide Along Ideological Lines over the Russia-Ukraine Conflict on Underground Forums</a> (Accenture)</p><p><a href="https://www.cyberscoop.com/russia-ukraine-cybercrime-ransomware-threat/">Political fallout in cybercrime circles upping the threat to Western targets</a> (CyberScoop)</p><p><a href="https://www.nytimes.com/2022/03/14/world/europe/russian-protester-tv.html">A protester storms a live broadcast on Russia’s most-watched news show, yelling, ‘Stop the war!’</a> (New York Times)</p><p><a href="https://www.cyberscoop.com/israel-ddos-government-websites-netblocks/">Denial-of-service attack knocked Israeli government sites offline</a> (CyberScoop) </p><p><a href="https://www.theregister.com/2022/03/14/china_nsa_nopen/">China claims it captured NSA spy tool that already leaked</a> (Register) </p><p><a href="https://intel471.com/resources/whitepapers/ransomware-variants">Ransomware Variants Q4 2021</a> (Intel471.com) </p><p><a href="https://www.cequence.ai/news/cequence-security-releases-report-revealing-top-3-attack-trends-in-api-security/">Cequence Security Releases Report Revealing Top 3 Attack Trends in API Security</a> (Cequence) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1666</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[adab29f4-7881-11ec-90a9-a766e7728220]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7284100665.mp3?updated=1690302408" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russia’s hybrid war against Ukraine becomes more firepower intensive, but hackers make their mark. Cybercrime does business as usual.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1534/notes</link>
      <description>The situation in Russia’s war against Ukraine, and Mr. Putin’s frustration with his intelligence services. Provocations, state-hacking, and influence operations in a hybrid war. Lapsus$ hits Ubisoft with ransomware. LockBit hits Bridgestone America. The Escobar banking Trojan is out in the wild. Kaspersky source apparently not compromised after all. Dan Prince wonders if we are properly preparing for the roles of tomorrow? Rick Howard is pulling on the kill chain. And the wayward aim of public opinion.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/49

Selected reading.
After more than two weeks of war, the Russian military grinds forward at a heavy cost (Washington Post) 
Ukraine war latest: Talks resume as Russia strikes Kyiv (BBC News) 
US view of Putin: Angry, frustrated, likely to escalate war (AP NEWS) 
Kremlin arrests FSB chiefs in fallout from Ukraine chaos (Times) 
Russian Cyber Restraint in Ukraine Puzzles Experts (SecurityWeek)
Russia's cyber offensive against Ukraine has been limited so far. Experts are divided on why (KESQ) ‘
Not the time to go poking around’: How former U.S. hackers view dealing with Russia (POLITICO)
We're seeing 800% increase in cyberattacks, says MSP (Register)
Russia makes claims of US-backed biological weapon plot at UN (the Guardian) 
Russian media spreading disinformation about US bioweapons as troops mass near Ukraine (Bulletin of the Atomic Scientists) 
Russian TikTok Influencers Are Being Paid to Spread Kremlin Propaganda (Vice)
The White House is briefing TikTok stars about the war in Ukraine (Washington Post) 
Android malware Escobar steals your Google Authenticator MFA codes (BleepingComputer) 
Google Attempts to Explain Surge in Chrome Zero-Day Exploitation (SecurityWeek) Google: We're spotting more Chrome browser zero-day flaws in the wild. Here's why (ZDNet).
Ubisoft says it experienced a ‘cyber security incident’, and the purported Nvidia hackers are taking credit (The Verge)
UPDATE 1-Japan's Denso hit by apparent ransomware attack - NHK (Reuters)
LockBit ransomware group claims to have hacked Bridgestone Americas (Security Affairs)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 14 Mar 2022 20:30:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1534</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Russia’s hybrid war against Ukraine becomes more firepower intensive, but hackers make their mark. Cybercrime does business as usual.</itunes:subtitle>
      <itunes:summary>The situation in Russia’s war against Ukraine, and Mr. Putin’s frustration with his intelligence services. Provocations, state-hacking, and influence operations in a hybrid war. Lapsus$ hits Ubisoft with ransomware. LockBit hits Bridgestone America. The Escobar banking Trojan is out in the wild. Kaspersky source apparently not compromised after all. Dan Prince wonders if we are properly preparing for the roles of tomorrow? Rick Howard is pulling on the kill chain. And the wayward aim of public opinion.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/49

Selected reading.
After more than two weeks of war, the Russian military grinds forward at a heavy cost (Washington Post) 
Ukraine war latest: Talks resume as Russia strikes Kyiv (BBC News) 
US view of Putin: Angry, frustrated, likely to escalate war (AP NEWS) 
Kremlin arrests FSB chiefs in fallout from Ukraine chaos (Times) 
Russian Cyber Restraint in Ukraine Puzzles Experts (SecurityWeek)
Russia's cyber offensive against Ukraine has been limited so far. Experts are divided on why (KESQ) ‘
Not the time to go poking around’: How former U.S. hackers view dealing with Russia (POLITICO)
We're seeing 800% increase in cyberattacks, says MSP (Register)
Russia makes claims of US-backed biological weapon plot at UN (the Guardian) 
Russian media spreading disinformation about US bioweapons as troops mass near Ukraine (Bulletin of the Atomic Scientists) 
Russian TikTok Influencers Are Being Paid to Spread Kremlin Propaganda (Vice)
The White House is briefing TikTok stars about the war in Ukraine (Washington Post) 
Android malware Escobar steals your Google Authenticator MFA codes (BleepingComputer) 
Google Attempts to Explain Surge in Chrome Zero-Day Exploitation (SecurityWeek) Google: We're spotting more Chrome browser zero-day flaws in the wild. Here's why (ZDNet).
Ubisoft says it experienced a ‘cyber security incident’, and the purported Nvidia hackers are taking credit (The Verge)
UPDATE 1-Japan's Denso hit by apparent ransomware attack - NHK (Reuters)
LockBit ransomware group claims to have hacked Bridgestone Americas (Security Affairs)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The situation in Russia’s war against Ukraine, and Mr. Putin’s frustration with his intelligence services. Provocations, state-hacking, and influence operations in a hybrid war. Lapsus$ hits Ubisoft with ransomware. LockBit hits Bridgestone America. The Escobar banking Trojan is out in the wild. Kaspersky source apparently not compromised after all. Dan Prince wonders if we are properly preparing for the roles of tomorrow? Rick Howard is pulling on the kill chain. And the wayward aim of public opinion.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/49</p><p><br></p><p><strong>Selected reading.</strong></p><p><a href="https://www.washingtonpost.com/national-security/2022/03/11/russia-military-ukraine-battlefield-progress/">After more than two weeks of war, the Russian military grinds forward at a heavy cost</a> (Washington Post) </p><p><a href="https://www.bbc.com/news/live/world-europe-60717902">Ukraine war latest: Talks resume as Russia strikes Kyiv</a> (BBC News) </p><p><a href="https://apnews.com/article/russia-ukraine-putin-nato-william-burns-europe-1271f76008b3e639df6ff21e3644e339">US view of Putin: Angry, frustrated, likely to escalate war</a> (AP NEWS) </p><p><a href="https://www.thetimes.co.uk/article/kremlin-arrests-fsb-chiefs-in-fallout-from-ukraine-invasion-chaos-92w0829c5">Kremlin arrests FSB chiefs in fallout from Ukraine chaos</a> (Times) </p><p><a href="https://www.securityweek.com/russian-cyber-restraint-ukraine-puzzles-experts">Russian Cyber Restraint in Ukraine Puzzles Experts</a> (SecurityWeek)</p><p><a href="https://kesq.com/news/2022/03/12/russias-cyber-offensive-against-ukraine-has-been-limited-so-far-experts-are-divided-on-why/">Russia's cyber offensive against Ukraine has been limited so far. Experts are divided on why</a> (KESQ) <a href="https://www.politico.com/news/2022/03/12/cyber-russia-hacking-security-00016598">‘</a></p><p><a href="https://www.politico.com/news/2022/03/12/cyber-russia-hacking-security-00016598">Not the time to go poking around’: How former U.S. hackers view dealing with Russia</a> (POLITICO)</p><p><a href="https://www.theregister.com/2022/03/11/russia-invasion-cyber-war-rages/">We're seeing 800% increase in cyberattacks, says MSP</a> (Register)</p><p><a href="https://www.theguardian.com/world/2022/mar/11/russia-un-claims-us-backed-biological-weapon-plot-kremlin-foreign-fighters-ukraine">Russia makes claims of US-backed biological weapon plot at UN</a> (the Guardian) </p><p><a href="https://thebulletin.org/2022/02/russian-media-spreading-disinformation-about-us-bioweapons-as-troops-mass-near-ukraine/">Russian media spreading disinformation about US bioweapons as troops mass near Ukraine</a> (Bulletin of the Atomic Scientists) </p><p><a href="https://www.vice.com/en/article/epxken/russian-tiktok-influencers-paid-propaganda">Russian TikTok Influencers Are Being Paid to Spread Kremlin Propaganda</a> (Vice)</p><p><a href="https://www.washingtonpost.com/technology/2022/03/11/tik-tok-ukraine-white-house/">The White House is briefing TikTok stars about the war in Ukraine</a> (Washington Post) </p><p><a href="https://www.bleepingcomputer.com/news/security/android-malware-escobar-steals-your-google-authenticator-mfa-codes/">Android malware Escobar steals your Google Authenticator MFA codes</a> (BleepingComputer) </p><p><a href="https://www.securityweek.com/google-attempts-explain-surge-chrome-zero-day-exploitation">Google Attempts to Explain Surge in Chrome Zero-Day Exploitation</a> (SecurityWeek) <a href="https://www.zdnet.com/article/google-more-chrome-browser-zero-day-flaws-are-being-spotted-in-the-wild-thats-not-always-a-bad-thing/">Google: We're spotting more Chrome browser zero-day flaws in the wild. Here's why</a> (ZDNet).</p><p><a href="https://www.theverge.com/2022/3/11/22972768/ubisoft-cyber-security-incident-hack">Ubisoft says it experienced a ‘cyber security incident’, and the purported Nvidia hackers are taking credit</a> (The Verge)</p><p><a href="https://www.reuters.com/article/denso-cyberattack/update-1-japans-denso-hit-by-apparent-ransomware-attack-nhk-idINL2N2VG04Q">UPDATE 1-Japan's Denso hit by apparent ransomware attack - NHK</a> (Reuters)</p><p><a href="https://securityaffairs.co/wordpress/128957/cyber-crime/bridgestone-americas-lockbit-ransomware.html">LockBit ransomware group claims to have hacked Bridgestone Americas</a> (Security Affairs)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1561</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ace16cf4-7881-11ec-90a9-67c227b9f0bd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4057633330.mp3?updated=1690302393" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kristin Strand: Be firm in your goals. [Consultant] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/91/notes</link>
      <description>Cybersecurity Associate Consultant at BARR Advisory, Kristin Strand, shares her journey from the military to teaching and now to cybersecurity. Kristin shares how she'd wanted to be a teacher since she was young. She joined the Army to help pay for college and throughout her career has taken advantage of programs to help her move on to her next challenge. From teaching, Kristin decided to transition to IT and came to cybersecurity through a Department of Labor program. She's also currently training to be a drill sergeant. Kristin advises you stand firm to your goals and know what you want. It will come around. We thank Kristin for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 13 Mar 2022 07:00:00 -0000</pubDate>
      <itunes:title>Kristin Strand: Be firm in your goals. [Consultant] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>91</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Cybersecurity Associate Consultant at BARR Advisory, Kristin Strand, shares her journey from the military to teaching and now to cybersecurity. </itunes:subtitle>
      <itunes:summary>Cybersecurity Associate Consultant at BARR Advisory, Kristin Strand, shares her journey from the military to teaching and now to cybersecurity. Kristin shares how she'd wanted to be a teacher since she was young. She joined the Army to help pay for college and throughout her career has taken advantage of programs to help her move on to her next challenge. From teaching, Kristin decided to transition to IT and came to cybersecurity through a Department of Labor program. She's also currently training to be a drill sergeant. Kristin advises you stand firm to your goals and know what you want. It will come around. We thank Kristin for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cybersecurity Associate Consultant at BARR Advisory, Kristin Strand, shares her journey from the military to teaching and now to cybersecurity. Kristin shares how she'd wanted to be a teacher since she was young. She joined the Army to help pay for college and throughout her career has taken advantage of programs to help her move on to her next challenge. From teaching, Kristin decided to transition to IT and came to cybersecurity through a Department of Labor program. She's also currently training to be a drill sergeant. Kristin advises you stand firm to your goals and know what you want. It will come around. We thank Kristin for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>371</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1a9599e0-9f2f-11ec-9fec-93975596f87e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3716206818.mp3?updated=1646777218" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The story of REvil: From origin to beyond. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/223/notes</link>
      <description>Guest Jon DiMaggio, Chief Security Strategist at Analyst1, joins Dave Bittner to discuss his team's research "A History of REvil" that chronicles the rise and fall of REvil. The REvil gang is an organized criminal enterprise based primarily out of Russia that runs a Ransomware as a Service (RaaS) operation. The core members of the gang reside and operate out of Russia. REvil leverages hackers for hire, known as affiliates, to conduct the breach, steal victim data, delete backups, and infect victim systems with ransomware for a share of the profits. Affiliates primarily stem across eastern Europe, though a small percentage operate outside that region. In return, the core gang maintains and provides the ransomware payload, hosts the victim data leak/auction site, facilitates victim communication and payment services, and distributes the decryption key. In simpler terms, the core gang are the service provider and persona behind the operation, while the affiliates are the hired muscle facilitating attacks. Jon walks us through the team's findings and details REvil's story.
The research can be found here:
A History of REvil

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Mar 2022 08:00:00 -0000</pubDate>
      <itunes:title>The story of REvil: From origin to beyond. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>223</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Jon DiMaggio, Chief Security Strategist at Analyst1, joins Dave Bittner to discuss his team's research "A History of REvil" that chronicles the rise and fall of REvil. The REvil gang is an organized criminal enterprise based primarily out of Russia that runs a Ransomware as a Service (RaaS) operation. The core members of the gang reside and operate out of Russia. REvil leverages hackers for hire, known as affiliates, to conduct the breach, steal victim data, delete backups, and infect victim systems with ransomware for a share of the profits. Affiliates primarily stem across eastern Europe, though a small percentage operate outside that region. In return, the core gang maintains and provides the ransomware payload, hosts the victim data leak/auction site, facilitates victim communication and payment services, and distributes the decryption key. In simpler terms, the core gang are the service provider and persona behind the operation, while the affiliates are the hired muscle facilitating attacks. Jon walks us through the team's findings and details REvil's story.
The research can be found here:
A History of REvil

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Jon DiMaggio, Chief Security Strategist at Analyst1, joins Dave Bittner to discuss his team's research "A History of REvil" that chronicles the rise and fall of REvil. The REvil gang is an organized criminal enterprise based primarily out of Russia that runs a Ransomware as a Service (RaaS) operation. The core members of the gang reside and operate out of Russia. REvil leverages hackers for hire, known as affiliates, to conduct the breach, steal victim data, delete backups, and infect victim systems with ransomware for a share of the profits. Affiliates primarily stem across eastern Europe, though a small percentage operate outside that region. In return, the core gang maintains and provides the ransomware payload, hosts the victim data leak/auction site, facilitates victim communication and payment services, and distributes the decryption key. In simpler terms, the core gang are the service provider and persona behind the operation, while the affiliates are the hired muscle facilitating attacks. Jon walks us through the team's findings and details REvil's story.</p><p>The research can be found here:</p><ul><li><a href="https://analyst1.com/file-assets/History-of-REvil.pdf">A History of REvil</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1946</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f83bb6a6-9f36-11ec-9402-efc84357dd58]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7374181272.mp3?updated=1685126717" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An update on the hybrid war in Ukraine. Conti and its users are still up and active. CISA releases twenty-four ICS security advisories. An extradition in the NetWalker case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1533/notes</link>
      <description>An update on the hybrid war in Ukraine. Allegations of war crimes and Russian disinformation. Chemical, biological, and radiological weapons disinformation. Preparing for cyberattacks. Cyber operations against Russia. GPS interference reported along Finland’s border. Conti and its users are still up and active. CISA releases twenty-four ICS security advisories. Malek Ben Salem from Accenture on deception systems. Our guest is Joe Payne from Code42 on data exposure. An extradition in the NetWalker case.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/48

Selected reading.
Russia 'did not attack Ukraine' says Lavrov after meeting Kuleba (euronews) 
Read the latest cybersecurity analysis (Accenture)
Where conflict is reported in Ukraine right now (The Telegraph) 
How U.S. Bioweapons in Ukraine Became Russia’s New Big Lie (Foreign Policy) 
Russian embassy demands Meta stop 'extremist activities' (NASDAQ:FB) (SeekingAlpha)
Transparency Org Releases Alleged Leak of Russian Censorship Agency (Vice) 
SecurityScorecard Discovers new botnet, ‘Zhadnost,’ responsible for… (SecurityScorecard) 
Inside the Russian cyber war on Ukraine that never was (Task &amp; Purpose) 
Report: Recent 10x Increase in Cyberattacks on Ukraine (KrebsOnSecurity) 
Russian defense firm Rostec shuts down website after DDoS attack (BleepingComputer) 
The Spectacular Collapse of Putin’s Disinformation Machinery (Wired) 
Will Russians Choose Truth or Lies? Ukraine’s Fate Depends on Them (Bloomberg) 
Finnish govt agency warns of unusual aircraft GPS interference (BleepingComputer)
Corporate website contact forms used to spread BazarBackdoor malware (BleepingComputer)
U.S. Warns of Conti Ransomware Attacks as Gang Deals With Leak Fallout (SecurityWeek) 
Ex Canadian government worker extradited to U.S. to face more ransomware charges (CBC) 
Former Canadian Government Employee Extradited to the United States to Face Charges for Dozens of Ransomware Attacks Resulting in the Payment of Tens of Millions of Dollars in Ransoms (US Department of Justice) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 11 Mar 2022 21:15:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1533</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>An update on the hybrid war in Ukraine. Conti and its users are still up and active. CISA releases twenty-four ICS security advisories. An extradition in the NetWalker case.</itunes:subtitle>
      <itunes:summary>An update on the hybrid war in Ukraine. Allegations of war crimes and Russian disinformation. Chemical, biological, and radiological weapons disinformation. Preparing for cyberattacks. Cyber operations against Russia. GPS interference reported along Finland’s border. Conti and its users are still up and active. CISA releases twenty-four ICS security advisories. Malek Ben Salem from Accenture on deception systems. Our guest is Joe Payne from Code42 on data exposure. An extradition in the NetWalker case.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/48

Selected reading.
Russia 'did not attack Ukraine' says Lavrov after meeting Kuleba (euronews) 
Read the latest cybersecurity analysis (Accenture)
Where conflict is reported in Ukraine right now (The Telegraph) 
How U.S. Bioweapons in Ukraine Became Russia’s New Big Lie (Foreign Policy) 
Russian embassy demands Meta stop 'extremist activities' (NASDAQ:FB) (SeekingAlpha)
Transparency Org Releases Alleged Leak of Russian Censorship Agency (Vice) 
SecurityScorecard Discovers new botnet, ‘Zhadnost,’ responsible for… (SecurityScorecard) 
Inside the Russian cyber war on Ukraine that never was (Task &amp; Purpose) 
Report: Recent 10x Increase in Cyberattacks on Ukraine (KrebsOnSecurity) 
Russian defense firm Rostec shuts down website after DDoS attack (BleepingComputer) 
The Spectacular Collapse of Putin’s Disinformation Machinery (Wired) 
Will Russians Choose Truth or Lies? Ukraine’s Fate Depends on Them (Bloomberg) 
Finnish govt agency warns of unusual aircraft GPS interference (BleepingComputer)
Corporate website contact forms used to spread BazarBackdoor malware (BleepingComputer)
U.S. Warns of Conti Ransomware Attacks as Gang Deals With Leak Fallout (SecurityWeek) 
Ex Canadian government worker extradited to U.S. to face more ransomware charges (CBC) 
Former Canadian Government Employee Extradited to the United States to Face Charges for Dozens of Ransomware Attacks Resulting in the Payment of Tens of Millions of Dollars in Ransoms (US Department of Justice) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An update on the hybrid war in Ukraine. Allegations of war crimes and Russian disinformation. Chemical, biological, and radiological weapons disinformation. Preparing for cyberattacks. Cyber operations against Russia. GPS interference reported along Finland’s border. Conti and its users are still up and active. CISA releases twenty-four ICS security advisories. Malek Ben Salem from Accenture on deception systems. Our guest is Joe Payne from Code42 on data exposure. An extradition in the NetWalker case.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/48</p><p><br></p><p><strong>Selected reading.</strong></p><p><a href="https://www.euronews.com/2022/03/10/ukraine-war-russia-did-not-attack-ukraine-says-lavrov-after-meeting-kuleba">Russia 'did not attack Ukraine' says Lavrov after meeting Kuleba</a> (euronews) </p><p><a href="https://www.accenture.com/us-en/blogs/cyber-defense/ukraine-russia-2022">Read the latest cybersecurity analysis</a> (Accenture)</p><p><a href="https://www.telegraph.co.uk/world-news/2022/03/10/ukraine-war-live-conflict-map-tracking-open-source-russia-invasion-latest/">Where conflict is reported in Ukraine right now</a> (The Telegraph) </p><p><a href="https://foreignpolicy.com/2022/03/10/bioweapons-ukraine-russia-disinformation/">How U.S. Bioweapons in Ukraine Became Russia’s New Big Lie</a> (Foreign Policy) </p><p><a href="https://seekingalpha.com/news/3812658-russian-embassy-demands-meta-stop-extremist-activities-as-it-allows-calls-for-violence">Russian embassy demands Meta stop 'extremist activities' (NASDAQ:FB)</a> (SeekingAlpha)</p><p><a href="https://www.vice.com/en/article/xgdmj7/russian-censorship-roskomnadzor-hacked-leak-distributed-denial-of-secrets">Transparency Org Releases Alleged Leak of Russian Censorship Agency</a> (Vice) </p><p><a href="https://securityscorecard.com/blog/securityscorecard-discovers-new-botnet-zhadnost-responsible-for-ukraine-ddos-attacks">SecurityScorecard Discovers new botnet, ‘Zhadnost,’ responsible for…</a> (SecurityScorecard) </p><p><a href="https://taskandpurpose.com/news/russia-cyber-attack-ukraine/">Inside the Russian cyber war on Ukraine that never was</a> (Task &amp; Purpose) </p><p><a href="https://krebsonsecurity.com/2022/03/report-recent-10x-increase-in-cyberattacks-on-ukraine/">Report: Recent 10x Increase in Cyberattacks on Ukraine</a> (KrebsOnSecurity) </p><p><a href="https://www.bleepingcomputer.com/news/security/russian-defense-firm-rostec-shuts-down-website-after-ddos-attack/">Russian defense firm Rostec shuts down website after DDoS attack</a> (BleepingComputer) </p><p><a href="https://www.wired.com/story/putin-collapse-disinformation-machinery-ukraine/">The Spectacular Collapse of Putin’s Disinformation Machinery</a> (Wired) </p><p><a href="https://www.bloomberg.com/opinion/articles/2022-03-10/russia-ukraine-war-will-russians-choose-to-believe-truth-or-putin-s-lies">Will Russians Choose Truth or Lies? Ukraine’s Fate Depends on Them</a> (Bloomberg) </p><p><a href="https://www.bleepingcomputer.com/news/technology/finnish-govt-agency-warns-of-unusual-aircraft-gps-interference/">Finnish govt agency warns of unusual aircraft GPS interference</a> (BleepingComputer)</p><p><a href="https://www.bleepingcomputer.com/news/security/corporate-website-contact-forms-used-to-spread-bazarbackdoor-malware/">Corporate website contact forms used to spread BazarBackdoor malware</a> (BleepingComputer)</p><p><a href="https://www.securityweek.com/us-warns-conti-ransomware-attacks-gang-deals-leak-fallout">U.S. Warns of Conti Ransomware Attacks as Gang Deals With Leak Fallout</a> (SecurityWeek) </p><p><a href="https://www.cbc.ca/news/canada/ottawa/sebastien-vachon-desjardins-guilty-plea-sentence-ransomware-bitcoin-1.6379965">Ex Canadian government worker extradited to U.S. to face more ransomware charges</a> (CBC) </p><p><a href="https://www.justice.gov/usao-mdfl/pr/former-canadian-government-employee-extradited-united-states-face-charges-dozens">Former Canadian Government Employee Extradited to the United States to Face Charges for Dozens of Ransomware Attacks Resulting in the Payment of Tens of Millions of Dollars in Ransoms</a> (US Department of Justice) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1547</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[af5d8b70-7881-11ec-90a9-d37dce59bf55]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1573747533.mp3?updated=1690302272" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber phases of a hybrid war. Google stops a Judgment Panda campaign and Symantec tracks Daxin. CISA updates its Conti alert. An alleged REvil member is arraigned in Texas.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1532/notes</link>
      <description>Prebunking a provocation. A spot report on the cyber phases of a hybrid war. Google stops a Judgment Panda campaign against US Government Gmail users. Symantec continues to track the origins and uses of the Daxin backdoor. CISA updates its Conti alert. Josh Ray from Accenture has tips on Log4J. Our guest is Chetan Conikee of ShiftLeft with strategies for reducing attackability. And law northeast of the Pecos, as an alleged member of REVil is arraigned in Texas.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/47

Selected reading.
Vladimir Putin ‘plotting chemical weapons attack in Ukraine’ (The Telegraph)
White House warns Russia could use chemical weapons in Ukraine (TheHill) 
Russia, China May Be Coordinating Cyber Attacks: SaaS Security Firm (eSecurityPlanet) 
More Than 5 Million Anti-Propaganda Text Messages Sent to Russians in Anonymous Information Warfare (Hstoday) 
Anonymous hacked Russian cams, websites, announced a clamorous leak (Security Affairs) 
EXCLUSIVE BNP Paribas bars Russia-based staff from computer systems as cyber attack fears grow (Reuters) 
CISA updates Conti ransomware alert with nearly 100 domain names (BleepingComputer) 
Google Blocks Chinese Phishing Campaign Targeting U.S. Government (SecurityWeek)
Symantec tracked down one developer of ‘China’s most advanced piece of malware’ (Sc Magazine) 
Daxin Backdoor: In-Depth Analysis, Part One (Symantec)
Daxin Backdoor: In-Depth Analysis, Part Two (Symantec)
Sodinokibi/REvil Ransomware Defendant Extradited to United States and Arraigned in Texas (US Department of Justice)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 10 Mar 2022 21:15:00 -0000</pubDate>
      <itunes:title>Cyber phases of a hybrid war. Google stops a Judgment Panda campaign and Symantec tracks Daxin. CISA updates its Conti alert. An alleged REvil member is arraigned in Texas.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1532</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Prebunking a provocation. A spot report on the cyber phases of a hybrid war. Google stops a Judgment Panda campaign against US Government Gmail users. Symantec continues to track the origins and uses of the Daxin backdoor. CISA updates its Conti alert. Josh Ray from Accenture has tips on Log4J. Our guest is Chetan Conikee of ShiftLeft with strategies for reducing attackability. And law northeast of the Pecos, as an alleged member of REVil is arraigned in Texas.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/47

Selected reading.
Vladimir Putin ‘plotting chemical weapons attack in Ukraine’ (The Telegraph)
White House warns Russia could use chemical weapons in Ukraine (TheHill) 
Russia, China May Be Coordinating Cyber Attacks: SaaS Security Firm (eSecurityPlanet) 
More Than 5 Million Anti-Propaganda Text Messages Sent to Russians in Anonymous Information Warfare (Hstoday) 
Anonymous hacked Russian cams, websites, announced a clamorous leak (Security Affairs) 
EXCLUSIVE BNP Paribas bars Russia-based staff from computer systems as cyber attack fears grow (Reuters) 
CISA updates Conti ransomware alert with nearly 100 domain names (BleepingComputer) 
Google Blocks Chinese Phishing Campaign Targeting U.S. Government (SecurityWeek)
Symantec tracked down one developer of ‘China’s most advanced piece of malware’ (Sc Magazine) 
Daxin Backdoor: In-Depth Analysis, Part One (Symantec)
Daxin Backdoor: In-Depth Analysis, Part Two (Symantec)
Sodinokibi/REvil Ransomware Defendant Extradited to United States and Arraigned in Texas (US Department of Justice)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Prebunking a provocation. A spot report on the cyber phases of a hybrid war. Google stops a Judgment Panda campaign against US Government Gmail users. Symantec continues to track the origins and uses of the Daxin backdoor. CISA updates its Conti alert. Josh Ray from Accenture has tips on Log4J. Our guest is Chetan Conikee of ShiftLeft with strategies for reducing attackability. And law northeast of the Pecos, as an alleged member of REVil is arraigned in Texas.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/47</p><p><br></p><p><strong>Selected reading.</strong></p><p><a href="https://www.telegraph.co.uk/world-news/2022/03/09/vladimir-putin-plotting-chemical-weapons-attack-ukraine/">Vladimir Putin ‘plotting chemical weapons attack in Ukraine’</a> (The Telegraph)</p><p><a href="https://thehill.com/homenews/administration/597586-white-house-warns-russia-could-use-chemical-weapons-in-ukraine">White House warns Russia could use chemical weapons in Ukraine</a> (TheHill) </p><p><a href="https://www.esecurityplanet.com/applications/russia-china-may-be-coordinating-cyber-attacks/">Russia, China May Be Coordinating Cyber Attacks: SaaS Security Firm</a> (eSecurityPlanet) </p><p><a href="https://www.hstoday.us/featured/more-than-5-million-anti-propaganda-text-messages-sent-to-russians-in-anonymous-information-warfare/">More Than 5 Million Anti-Propaganda Text Messages Sent to Russians in Anonymous Information Warfare</a> (Hstoday) </p><p><a href="https://securityaffairs.co/wordpress/128847/hacktivism/anonymous-vs-russia.html?utm_source=rss&amp;utm_medium=rss&amp;utm_campaign=anonymous-vs-russia">Anonymous hacked Russian cams, websites, announced a clamorous leak</a> (Security Affairs) </p><p><a href="https://www.reuters.com/markets/europe/exclusive-bnp-paribas-bars-russia-based-staff-computer-systems-cyber-attack-2022-03-09/">EXCLUSIVE BNP Paribas bars Russia-based staff from computer systems as cyber attack fears grow</a> (Reuters) </p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-updates-conti-ransomware-alert-with-nearly-100-domain-names/">CISA updates Conti ransomware alert with nearly 100 domain names</a> (BleepingComputer) </p><p><a href="https://www.securityweek.com/google-blocks-chinese-phishing-campaign-targeting-us-government">Google Blocks Chinese Phishing Campaign Targeting U.S. Government</a> (SecurityWeek)</p><p><a href="https://www.scmagazine.com/analysis/apt/symantec-tracked-down-one-developer-of-chinas-most-advanced-piece-of-malware">Symantec tracked down one developer of ‘China’s most advanced piece of malware’</a> (Sc Magazine) </p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/daxin-malware-espionage-analysis">Daxin Backdoor: In-Depth Analysis, Part One</a> (Symantec)</p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/daxin-backdoor-espionage-analysis">Daxin Backdoor: In-Depth Analysis, Part Two</a> (Symantec)</p><p><a href="https://www.justice.gov/opa/pr/sodinokibirevil-ransomware-defendant-extradited-united-states-and-arraigned-texas">Sodinokibi/REvil Ransomware Defendant Extradited to United States and Arraigned in Texas</a> (US Department of Justice)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1754</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aef9fbd2-7881-11ec-90a9-7f9248a2e147]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4001238317.mp3?updated=1690302356" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Waiting for the Bears to come out. APT41 hits US state governments. A surge in mobile malware, and a look at yesterday’s Patch Tuesday.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1531/notes</link>
      <description>Zelenskyy addresses the House of Commons. Cyber operations in Russia's war against Ukraine. Chinese cyber espionage campaign hits six US state governments (but it might be an APT side-hustle). A surge in mobile malware. Joe Carrigan looks at derestricting your software. Our guest Bob Dudley discusses cyberattacks against the European energy sector. And a quick look back at Patch Tuesday.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/46

Selected reading.
Volodymyr Zelensky speech: Ukrainian President vows to fight Russians in 'forests, fields and on shores' as he channels Winston Churchill (The Telegraph) 
Putin’s Endgame Starts to Look Like Reducing Ukraine to Rubble (Bloomberg
Live Updates: Biden Bans Russian Oil Imports and Major U.S. Brands Close Outlets (New York Times)
The March 2022 Security Update Review (Zero Day Initiative) 
EU countries call for cybersecurity emergency response fund -document (Reuters)
Annual Threat Assessment of the U.S. Intelligence Community (Office of the Director of National Intelligence)
PTC Axeda agent and Axeda Desktop Server | (CISA) 
AVEVA System Platform (CISA)
Sensormatic PowerManage (CISA) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 09 Mar 2022 21:15:00 -0000</pubDate>
      <itunes:title>Waiting for the Bears to come out. APT41 hits US state governments. A surge in mobile malware, and a look at yesterday’s Patch Tuesday.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1531</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Zelenskyy addresses the House of Commons. Cyber operations in Russia's war against Ukraine. Chinese cyber espionage campaign hits six US state governments (but it might be an APT side-hustle). A surge in mobile malware. Joe Carrigan looks at derestricting your software. Our guest Bob Dudley discusses cyberattacks against the European energy sector. And a quick look back at Patch Tuesday.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/46

Selected reading.
Volodymyr Zelensky speech: Ukrainian President vows to fight Russians in 'forests, fields and on shores' as he channels Winston Churchill (The Telegraph) 
Putin’s Endgame Starts to Look Like Reducing Ukraine to Rubble (Bloomberg
Live Updates: Biden Bans Russian Oil Imports and Major U.S. Brands Close Outlets (New York Times)
The March 2022 Security Update Review (Zero Day Initiative) 
EU countries call for cybersecurity emergency response fund -document (Reuters)
Annual Threat Assessment of the U.S. Intelligence Community (Office of the Director of National Intelligence)
PTC Axeda agent and Axeda Desktop Server | (CISA) 
AVEVA System Platform (CISA)
Sensormatic PowerManage (CISA) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Zelenskyy addresses the House of Commons. Cyber operations in Russia's war against Ukraine. Chinese cyber espionage campaign hits six US state governments (but it might be an APT side-hustle). A surge in mobile malware. Joe Carrigan looks at derestricting your software. Our guest Bob Dudley discusses cyberattacks against the European energy sector. And a quick look back at Patch Tuesday.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/46</p><p><br></p><p><strong>Selected reading.</strong></p><p><a href="https://www.telegraph.co.uk/politics/2022/03/08/boris-johnson-news-russia-ukraine-volodymyr-zelensky-speech/">Volodymyr Zelensky speech: Ukrainian President vows to fight Russians in 'forests, fields and on shores' as he channels Winston Churchill </a>(The Telegraph) </p><p><a href="https://www.bloomberg.com/news/articles/2022-03-09/vladimir-putin-s-ukraine-invasion-stares-down-brutal-endgame">Putin’s Endgame Starts to Look Like Reducing Ukraine to Rubble</a> (Bloomberg</p><p><a href="https://www.nytimes.com/live/2022/03/08/world/ukraine-russia-war">Live Updates: Biden Bans Russian Oil Imports and Major U.S. Brands Close Outlets</a> (New York Times)</p><p><a href="https://www.zerodayinitiative.com/blog/2022/3/8/the-march-2022-security-update-review">The March 2022 Security Update Review</a> (Zero Day Initiative) </p><p><a href="https://www.reuters.com/world/europe/eu-countries-call-cybersecurity-emergency-response-fund-document-2022-03-08/">EU countries call for cybersecurity emergency response fund -document</a> (Reuters)</p><p><a href="https://docs.house.gov/meetings/IG/IG00/20220308/114469/HHRG-117-IG00-Wstate-HainesA-20220308.pdf">Annual Threat Assessment of the U.S. Intelligence Community</a> (Office of the Director of National Intelligence)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-067-01">PTC Axeda agent and Axeda Desktop Server |</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-067-02">AVEVA System Platform</a> (CISA)</p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-034-01">Sensormatic PowerManage</a> (CISA) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1633</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ae100b44-7881-11ec-90a9-eb4529c91e28]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6735294601.mp3?updated=1690295836" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Updates on Russia’s hybrid war, including cyber ops and influence operations. Mustang Panda focuses on Europe in its cyberespionage. Ransomware hits oil and gas sector. UPS vulnerabilities.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1530/notes</link>
      <description>Updates from the UK’s Ministry of Defense on Russia’s War in Ukraine. Influence operations: the advantage still seems to go to Ukraine, as Russian efforts look inward. Assessing the effects of hacktivism and cyber operations in the hybrid war. Privateering: Conti, Ragnar Locker, and (probably) others. Mustang Panda rears up in European diplomatic networks. Ransomware hits a Romanian fuel distributor. Andrea Little Limbago from Interos on data traps. Carole Theriault tracks the fight against deepfakes. Vulnerabilities found in UPS devices.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/45
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Mar 2022 21:15:00 -0000</pubDate>
      <itunes:title>Updates on Russia’s hybrid war, including cyber ops and influence operations. Mustang Panda focuses on Europe in its cyberespionage. Ransomware hits oil and gas sector. UPS vulnerabilities.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1530</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Updates from the UK’s Ministry of Defense on Russia’s War in Ukraine. Influence operations: the advantage still seems to go to Ukraine, as Russian efforts look inward. Assessing the effects of hacktivism and cyber operations in the hybrid war. Privateering: Conti, Ragnar Locker, and (probably) others. Mustang Panda rears up in European diplomatic networks. Ransomware hits a Romanian fuel distributor. Andrea Little Limbago from Interos on data traps. Carole Theriault tracks the fight against deepfakes. Vulnerabilities found in UPS devices.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/45
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Updates from the UK’s Ministry of Defense on Russia’s War in Ukraine. Influence operations: the advantage still seems to go to Ukraine, as Russian efforts look inward. Assessing the effects of hacktivism and cyber operations in the hybrid war. Privateering: Conti, Ragnar Locker, and (probably) others. Mustang Panda rears up in European diplomatic networks. Ransomware hits a Romanian fuel distributor. Andrea Little Limbago from Interos on data traps. Carole Theriault tracks the fight against deepfakes. Vulnerabilities found in UPS devices.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/45</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1545</itunes:duration>
      <guid isPermaLink="false"><![CDATA[ad89b256-7881-11ec-90a9-ef1fe64ab678]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9616075866.mp3?updated=1690295825" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber dimensions of Russia’s hybrid war against Ukraine. Hacktivists and cybercriminals choose sides. Lapsu$ releases NVIDIA and Samsung data (and says a victim hacked back).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1529/notes</link>
      <description>Russian influence operations fail as few support Russia's war of aggression. Ukraine will become a "contributing participant" in NATO's CCDCOE. Ukrainian cyberattacks, and the marshaling of hacktivists. Russian cyberattacks: surprisingly restrained and unsurprisingly supported by criminal organizations like Conti. The FBI’s Bryan Vorndran joins us with insights on the work his team did on Sodinokibi. Rick Howard looks at vulnerability management. Lapsu$ gang releases data taken from NVIDIA and Samsung in separate extortion incidents.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/44

Selected reading.
What Happened on Day 11 of Russia’s Invasion of Ukraine (New York Times)
Putin says Ukraine's future in doubt as cease-fires collapse 
After temporary cease-fires break down, Putin threatens Ukraine’s government (AP NEWS) 
Ukraine to join NATO cyber defence centre as 'contributing participant' (Reuters)
Putin Is Raising an Iron Firewall Around Russia (Bloomberg) 
Three reasons Moscow isn't taking down Ukraine's cell networks (POLITICO) 
Hacktivists Stoke Pandemonium Amid Russia’s War in Ukraine (Wired) 
DDoS hacktivism: A highly risky exercise (Avast)
This Ukrainian cyber firm is offering hackers bounties for taking down Russian sites (The Record by Recorded Future)
Ukraine Cyber Official: We Only Attack Military Targets (SecurityWeek) 
Volunteer Hackers Converge on Ukraine Conflict With No One in Charge (New York Times) 
Russia shares list of 17,000 IPs allegedly DDoSing Russian orgs (BleepingComputer) 
Ukraine's 'IT army' targets Belarus railway network, Russian GPS (Reuters) 
HawkEye 360 detects GPS interference in Ukraine (SpaceNews) 
Hackers are being forced to pick sides in the Russia-Ukraine war (KTVH) 
Nvidia allegedly hacks back (Avast)
Credentials of 71,000 NVIDIA Employees Leaked Following Cyberattack (SecurityWeek) 
Leaked stolen Nvidia cert can code-sign Windows malware (Register) 
Hackers claim massive Samsung leak, including encryption keys and source code (Android Police) 
Lapsus$ group leaks 190GB of Samsung data, source code (Computing) 
Samsung’s secret data leaks after devastating cyberattack (SamMobile) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 07 Mar 2022 21:15:00 -0000</pubDate>
      <itunes:title>Cyber dimensions of Russia’s hybrid war against Ukraine. Hacktivists and cybercriminals choose sides. Lapsu$ releases NVIDIA and Samsung data (and says a victim hacked back).</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1529</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Russian influence operations fail as few support Russia's war of aggression. Ukraine will become a "contributing participant" in NATO's CCDCOE. Ukrainian cyberattacks, and the marshaling of hacktivists. Russian cyberattacks: surprisingly restrained and unsurprisingly supported by criminal organizations like Conti. The FBI’s Bryan Vorndran joins us with insights on the work his team did on Sodinokibi. Rick Howard looks at vulnerability management. Lapsu$ gang releases data taken from NVIDIA and Samsung in separate extortion incidents.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/44

Selected reading.
What Happened on Day 11 of Russia’s Invasion of Ukraine (New York Times)
Putin says Ukraine's future in doubt as cease-fires collapse 
After temporary cease-fires break down, Putin threatens Ukraine’s government (AP NEWS) 
Ukraine to join NATO cyber defence centre as 'contributing participant' (Reuters)
Putin Is Raising an Iron Firewall Around Russia (Bloomberg) 
Three reasons Moscow isn't taking down Ukraine's cell networks (POLITICO) 
Hacktivists Stoke Pandemonium Amid Russia’s War in Ukraine (Wired) 
DDoS hacktivism: A highly risky exercise (Avast)
This Ukrainian cyber firm is offering hackers bounties for taking down Russian sites (The Record by Recorded Future)
Ukraine Cyber Official: We Only Attack Military Targets (SecurityWeek) 
Volunteer Hackers Converge on Ukraine Conflict With No One in Charge (New York Times) 
Russia shares list of 17,000 IPs allegedly DDoSing Russian orgs (BleepingComputer) 
Ukraine's 'IT army' targets Belarus railway network, Russian GPS (Reuters) 
HawkEye 360 detects GPS interference in Ukraine (SpaceNews) 
Hackers are being forced to pick sides in the Russia-Ukraine war (KTVH) 
Nvidia allegedly hacks back (Avast)
Credentials of 71,000 NVIDIA Employees Leaked Following Cyberattack (SecurityWeek) 
Leaked stolen Nvidia cert can code-sign Windows malware (Register) 
Hackers claim massive Samsung leak, including encryption keys and source code (Android Police) 
Lapsus$ group leaks 190GB of Samsung data, source code (Computing) 
Samsung’s secret data leaks after devastating cyberattack (SamMobile) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russian influence operations fail as few support Russia's war of aggression. Ukraine will become a "contributing participant" in NATO's CCDCOE. Ukrainian cyberattacks, and the marshaling of hacktivists. Russian cyberattacks: surprisingly restrained and unsurprisingly supported by criminal organizations like Conti. The FBI’s Bryan Vorndran joins us with insights on the work his team did on Sodinokibi. Rick Howard looks at vulnerability management. Lapsu$ gang releases data taken from NVIDIA and Samsung in separate extortion incidents.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/44</p><p><br></p><p><strong>Selected reading.</strong></p><p><a href="https://www.nytimes.com/live/2022/03/06/world/ukraine-russia">What Happened on Day 11 of Russia’s Invasion of Ukraine</a> (New York Times)</p><p><a href="https://apnews.com/article/russia-ukraine-europe-3d9e50b2fa8b08ce1f74c1b09403186e">Putin says Ukraine's future in doubt as cease-fires collapse</a> </p><p><a href="https://www.washingtonpost.com/world/2022/03/05/ukraine-military-battlefield-kyiv-mariupol/">After temporary cease-fires break down, Putin threatens Ukraine’s government</a> (AP NEWS) </p><p><a href="https://www.reuters.com/world/ukraine-join-nato-cyber-defence-centre-contributing-participant-2022-03-04/">Ukraine to join NATO cyber defence centre as 'contributing participant'</a> (Reuters)</p><p><a href="https://www.bloomberg.com/opinion/articles/2022-03-04/china-s-great-firewall-has-inspired-russia-to-try-to-raise-an-iron-one">Putin Is Raising an Iron Firewall Around Russia</a> (Bloomberg) </p><p><a href="https://www.politico.com/news/2022/03/07/ukraine-phones-internet-still-work-00014487">Three reasons Moscow isn't taking down Ukraine's cell networks</a> (POLITICO) </p><p><a href="https://www.wired.com/story/hacktivists-pandemonium-russia-war-ukraine/">Hacktivists Stoke Pandemonium Amid Russia’s War in Ukraine</a> (Wired) </p><p><a href="https://blog.avast.com/ddos-hacktivism-avast">DDoS hacktivism: A highly risky exercise</a> (Avast)</p><p><a href="https://therecord.media/this-ukrainian-cyber-firm-is-offering-hackers-bounties-for-taking-down-russian-sites/">This Ukrainian cyber firm is offering hackers bounties for taking down Russian sites</a> (The Record by Recorded Future)</p><p><a href="https://www.securityweek.com/ukraine-cyber-official-we-only-attack-military-targets">Ukraine Cyber Official: We Only Attack Military Targets</a> (SecurityWeek) </p><p><a href="https://www.nytimes.com/2022/03/04/technology/ukraine-russia-hackers.html">Volunteer Hackers Converge on Ukraine Conflict With No One in Charge</a> (New York Times) </p><p><a href="https://www.bleepingcomputer.com/news/security/russia-shares-list-of-17-000-ips-allegedly-ddosing-russian-orgs/">Russia shares list of 17,000 IPs allegedly DDoSing Russian orgs</a> (BleepingComputer) </p><p><a href="https://www.reuters.com/world/europe/ukraines-it-army-targets-belarus-railway-network-russian-gps-2022-03-03/">Ukraine's 'IT army' targets Belarus railway network, Russian GPS</a> (Reuters) </p><p><a href="https://spacenews.com/hawkeye-360-gps-ukr/">HawkEye 360 detects GPS interference in Ukraine</a> (SpaceNews) </p><p><a href="https://www.ktvh.com/news/national/russia-ukraine-conflict/hackers-are-being-forced-to-pick-sides-in-the-russia-ukraine-war">Hackers are being forced to pick sides in the Russia-Ukraine war</a> (KTVH) </p><p><a href="https://blog.avast.com/nvidia-allegedly-hacks-back-avast">Nvidia allegedly hacks back</a> (Avast)</p><p><a href="https://www.securityweek.com/credentials-71000-nvidia-employees-leaked-following-cyberattack">Credentials of 71,000 NVIDIA Employees Leaked Following Cyberattack</a> (SecurityWeek) </p><p><a href="https://www.theregister.com/2022/03/05/nvidia_stolen_certificate/">Leaked stolen Nvidia cert can code-sign Windows malware</a> (Register) </p><p><a href="https://www.androidpolice.com/hackers-leak-190-gb-of-samsung-data-including-source-code/">Hackers claim massive Samsung leak, including encryption keys and source code</a> (Android Police) </p><p><a href="https://www.computing.co.uk/news/4046030/lapsususd-group-leaks-190gb-samsung-source-code">Lapsus$ group leaks 190GB of Samsung data, source code </a>(Computing) </p><p><a href="https://www.sammobile.com/news/samsungs-secret-data-leaks-devastating-cyberattack/">Samsung’s secret data leaks after devastating cyberattack</a> (SamMobile) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1634</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[acbfeff2-7881-11ec-90a9-abc072cc7a10]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1835164236.mp3?updated=1690295682" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chetan Conikee: Create narratives of your journey. [CTO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/90/notes</link>
      <description>Founder and CTO of ShiftLeft, Chetan Conikee shares his story from computer science to founding his own company. When choosing a career, Chetan notes that "the liking and doing has to matter and be in conjunction with each other." Explaining the parallels in his home country of India and where he studied his for his masters in the US, Chetan stresses the need to find someone who inspires you to follow and learn from. On being an entrepreneur, he says, "The entrepreneurial mindset is a sum total of many sufferings that lead to success." Chethan advises you take time out to write narratives so that you are remembered and so that others following a similar path may learn from you. We thank Chetan for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 06 Mar 2022 08:00:00 -0000</pubDate>
      <itunes:title>Chetan Conikee: Create narratives of your journey. [CTO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>90</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Founder and CTO of ShiftLeft, Chetan Conikee shares his story from computer science to founding his own company. </itunes:subtitle>
      <itunes:summary>Founder and CTO of ShiftLeft, Chetan Conikee shares his story from computer science to founding his own company. When choosing a career, Chetan notes that "the liking and doing has to matter and be in conjunction with each other." Explaining the parallels in his home country of India and where he studied his for his masters in the US, Chetan stresses the need to find someone who inspires you to follow and learn from. On being an entrepreneur, he says, "The entrepreneurial mindset is a sum total of many sufferings that lead to success." Chethan advises you take time out to write narratives so that you are remembered and so that others following a similar path may learn from you. We thank Chetan for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Founder and CTO of ShiftLeft, Chetan Conikee shares his story from computer science to founding his own company. When choosing a career, Chetan notes that "the liking and doing has to matter and be in conjunction with each other." Explaining the parallels in his home country of India and where he studied his for his masters in the US, Chetan stresses the need to find someone who inspires you to follow and learn from. On being an entrepreneur, he says, "The entrepreneurial mindset is a sum total of many sufferings that lead to success." Chethan advises you take time out to write narratives so that you are remembered and so that others following a similar path may learn from you. We thank Chetan for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>524</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[76f43574-9a80-11ec-acfb-fbf41389cf93]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8795785110.mp3?updated=1646263877" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>HEAT: Examining the next-class of browser-based attacks. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/26/notes</link>
      <description>Modern enterprises have evolved drastically over the last two years as a result of the global pandemic. Due in part to organizations pivoting quickly to new business models by migrating apps and services to the cloud to enable hybrid and remote workforces, the “new” office has quickly become the web browser. Today, business users are spending an average of 75% of their workday in a browser – that’s where productivity takes place! But the digital enhancements of the last two years have ushered in widespread transformation that expanded attack surfaces and created new opportunities for cyber miscreants, giving rise to Highly Evasive Advanced Threats (HEAT).
During this episode of CyberWire-X, the CyberWire's Dave Bittner speaks with Dan Prince, Senior Lecturer in Security and Protection Science at the School of Computing and Communications at Lancaster University, about the topic. Show Sponsor Menlo Security's Nick Edwards and Dave explore what HEAT attacks are, how they work, and why they’re resulting in the rise of ransomware attacks and account takeovers.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 06 Mar 2022 08:00:00 -0000</pubDate>
      <itunes:title>HEAT: Examining the next-class of browser-based attacks. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>26</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Modern enterprises have evolved drastically over the last two years as a result of the global pandemic. Due in part to organizations pivoting quickly to new business models by migrating apps and services to the cloud to enable hybrid and remote workforces, the “new” office has quickly become the web browser. Today, business users are spending an average of 75% of their workday in a browser – that’s where productivity takes place! But the digital enhancements of the last two years have ushered in widespread transformation that expanded attack surfaces and created new opportunities for cyber miscreants, giving rise to Highly Evasive Advanced Threats (HEAT).
During this episode of CyberWire-X, the CyberWire's Dave Bittner speaks with Dan Prince, Senior Lecturer in Security and Protection Science at the School of Computing and Communications at Lancaster University, about the topic. Show Sponsor Menlo Security's Nick Edwards and Dave explore what HEAT attacks are, how they work, and why they’re resulting in the rise of ransomware attacks and account takeovers.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Modern enterprises have evolved drastically over the last two years as a result of the global pandemic. Due in part to organizations pivoting quickly to new business models by migrating apps and services to the cloud to enable hybrid and remote workforces, the “new” office has quickly become the web browser. Today, business users are spending an average of 75% of their workday in a browser – that’s where productivity takes place! But the digital enhancements of the last two years have ushered in widespread transformation that expanded attack surfaces and created new opportunities for cyber miscreants, giving rise to Highly Evasive Advanced Threats (HEAT).</p><p>During this episode of CyberWire-X, the CyberWire's Dave Bittner speaks with Dan Prince, Senior Lecturer in Security and Protection Science at the School of Computing and Communications at Lancaster University, about the topic. Show Sponsor Menlo Security's Nick Edwards and Dave explore what HEAT attacks are, how they work, and why they’re resulting in the rise of ransomware attacks and account takeovers.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2072</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ae5fb3e2-9a87-11ec-af34-7b1893ece7fb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2853357172.mp3?updated=1646266256" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An abuse of trust: Potential security issues with open redirects. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/222/notes</link>
      <description>Guest Mike Benjamin, VP of Security Research at Fastly, joins Dave Bittner to talk about the Fastly Security Research Team's work on "Open redirects: real-world abuse and recommendations." Open URL redirection is a class of web application security problems that makes it easier for attackers to direct users to malicious resources. This vulnerability class, also known as “open redirects,” arises when an application allows attackers to pass information to the app that results in users being sent to another location. That location can be an attacker-controlled website or server used to distribute malware, trick a user into trusting a link, execute malicious code in a trusted way, drive ad fraud, or even perform SEO manipulation. Knowing how an open redirect can be abused is helpful — but knowing how to design around it in the first place is even more important.
Mike walks us through what his team uncovered, explains how redirects are used, how they can be abused, and how you can prevent that abuse.
The research can be found here:
Open redirects: real-world abuse and recommendations

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Mar 2022 08:00:00 -0000</pubDate>
      <itunes:title>An abuse of trust: Potential security issues with open redirects. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>222</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Mike Benjamin, VP of Security Research at Fastly, joins Dave Bittner to talk about the Fastly Security Research Team's work on "Open redirects: real-world abuse and recommendations." Open URL redirection is a class of web application security problems that makes it easier for attackers to direct users to malicious resources. This vulnerability class, also known as “open redirects,” arises when an application allows attackers to pass information to the app that results in users being sent to another location. That location can be an attacker-controlled website or server used to distribute malware, trick a user into trusting a link, execute malicious code in a trusted way, drive ad fraud, or even perform SEO manipulation. Knowing how an open redirect can be abused is helpful — but knowing how to design around it in the first place is even more important.
Mike walks us through what his team uncovered, explains how redirects are used, how they can be abused, and how you can prevent that abuse.
The research can be found here:
Open redirects: real-world abuse and recommendations

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Mike Benjamin, VP of Security Research at Fastly, joins Dave Bittner to talk about the Fastly Security Research Team's work on "Open redirects: real-world abuse and recommendations." Open URL redirection is a class of web application security problems that makes it easier for attackers to direct users to malicious resources. This vulnerability class, also known as “open redirects,” arises when an application allows attackers to pass information to the app that results in users being sent to another location. That location can be an attacker-controlled website or server used to distribute malware, trick a user into trusting a link, execute malicious code in a trusted way, drive ad fraud, or even perform SEO manipulation. Knowing how an open redirect can be abused is helpful — but knowing how to design around it in the first place is even more important.</p><p>Mike walks us through what his team uncovered, explains how redirects are used, how they can be abused, and how you can prevent that abuse.</p><p>The research can be found here:</p><ul><li><a href="https://www.fastly.com/blog/open-redirects-real-world-abuse-and-recommendations">Open redirects: real-world abuse and recommendations</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1356</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6cc28fe8-9a75-11ec-94ed-e3a590bc1106]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2471472854.mp3?updated=1685126705" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Swapping propaganda shots. ICANN will not block the Internet in Russia. Hacktivists achieve a nuisance-level of success. NVIDIA gets a most curious demand. And there’s no US draft.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1528/notes</link>
      <description>Propaganda engagements in Russia’s hybrid war against Ukraine. ICANN will not block the Internet in Russia. Hacktivists, real and pretended, achieve a nuisance-level of success in Russia’s war. Scams and misinformation circulate in Telegram. NVIDIA gets a most curious demand from a cyber gang. CISA’s ICS advisories. Johannes Ullrich looks at phishing pages on innocent websites. Our guest is Chase Snyder from ExtraHop to discuss implications of the cyber talent shortage. And, hey, newsflash, no matter what the texts on your phone might say, there’s no military draft in the US.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/43

Selected readings.
Putin Thought Ukraine Would Fall Quickly. An Airport Battle Proved Him Wrong (Wall Street Journal)
Russia's chaotic and confusing invasion of Ukraine is baffling military analysts (CNBC) 
Last Vestiges of Russia’s Free Press Fall Under Kremlin Pressure (New York Times) 
Don’t mention the war: Russian state media sells the lie of Ukrainians shelling their own cities (The Telegraph) 
Russian troops in disarray and ‘crying’ in combat, radio messages reveal (The Telegraph) 
Demoralised Russian soldiers tell of anger at being ‘duped’ into war (the Guardian)
The propaganda war has eclipsed cyberwar in Ukraine (MIT Technology Review)
Ukraine's request to cut off Russia from the global internet has been rejected (CNN) 
No, the Army isn’t sending Ukraine draft notices via text (Army Times) 
Hackers Who Broke Into NVIDIA's Network Leak DLSS Source Code Online (Hacker News) 
Hackers warn Nvidia to open-source their GPU drivers or face data leak (Computing) 
Cybercriminals who breached Nvidia issue one of the most unusual demands ever (Ars Technica) 
BD Pyxis (CISA) 
BD Viper LT (CISA) 
IPCOMM ipDIO (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 04 Mar 2022 21:15:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1528</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Swapping propaganda shots. ICANN will not block the Internet in Russia. Hacktivists achieve a nuisance-level of success. NVIDIA gets a most curious demand. And there’s no US draft.</itunes:subtitle>
      <itunes:summary>Propaganda engagements in Russia’s hybrid war against Ukraine. ICANN will not block the Internet in Russia. Hacktivists, real and pretended, achieve a nuisance-level of success in Russia’s war. Scams and misinformation circulate in Telegram. NVIDIA gets a most curious demand from a cyber gang. CISA’s ICS advisories. Johannes Ullrich looks at phishing pages on innocent websites. Our guest is Chase Snyder from ExtraHop to discuss implications of the cyber talent shortage. And, hey, newsflash, no matter what the texts on your phone might say, there’s no military draft in the US.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/43

Selected readings.
Putin Thought Ukraine Would Fall Quickly. An Airport Battle Proved Him Wrong (Wall Street Journal)
Russia's chaotic and confusing invasion of Ukraine is baffling military analysts (CNBC) 
Last Vestiges of Russia’s Free Press Fall Under Kremlin Pressure (New York Times) 
Don’t mention the war: Russian state media sells the lie of Ukrainians shelling their own cities (The Telegraph) 
Russian troops in disarray and ‘crying’ in combat, radio messages reveal (The Telegraph) 
Demoralised Russian soldiers tell of anger at being ‘duped’ into war (the Guardian)
The propaganda war has eclipsed cyberwar in Ukraine (MIT Technology Review)
Ukraine's request to cut off Russia from the global internet has been rejected (CNN) 
No, the Army isn’t sending Ukraine draft notices via text (Army Times) 
Hackers Who Broke Into NVIDIA's Network Leak DLSS Source Code Online (Hacker News) 
Hackers warn Nvidia to open-source their GPU drivers or face data leak (Computing) 
Cybercriminals who breached Nvidia issue one of the most unusual demands ever (Ars Technica) 
BD Pyxis (CISA) 
BD Viper LT (CISA) 
IPCOMM ipDIO (CISA)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Propaganda engagements in Russia’s hybrid war against Ukraine. ICANN will not block the Internet in Russia. Hacktivists, real and pretended, achieve a nuisance-level of success in Russia’s war. Scams and misinformation circulate in Telegram. NVIDIA gets a most curious demand from a cyber gang. CISA’s ICS advisories. Johannes Ullrich looks at phishing pages on innocent websites. Our guest is Chase Snyder from ExtraHop to discuss implications of the cyber talent shortage. And, hey, newsflash, no matter what the texts on your phone might say, there’s no military draft in the US.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/43</p><p><br></p><p><strong>Selected readings.</strong></p><p><a href="https://www.wsj.com/articles/putin-thought-ukraine-would-fall-quickly-an-airport-battle-proved-him-wrong-11646343121">Putin Thought Ukraine Would Fall Quickly. An Airport Battle Proved Him Wrong</a> (Wall Street Journal)</p><p><a href="https://www.cnbc.com/2022/03/04/russias-invasion-of-ukraine-is-baffling-military-analysts.html">Russia's chaotic and confusing invasion of Ukraine is baffling military analysts</a> (CNBC) </p><p><a href="https://www.nytimes.com/2022/03/03/world/europe/russia-ukraine-propaganda-censorship.html">Last Vestiges of Russia’s Free Press Fall Under Kremlin Pressure</a> (New York Times) </p><p><a href="https://www.telegraph.co.uk/world-news/2022/03/02/dont-mention-war-russian-state-media-talks-ukrainians-shelling/">Don’t mention the war: Russian state media sells the lie of Ukrainians shelling their own cities</a> (The Telegraph) </p><p><a href="https://www.telegraph.co.uk/world-news/2022/03/01/russian-troops-disarray-crying-combat-radio-messages-reveal/">Russian troops in disarray and ‘crying’ in combat, radio messages reveal</a> (The Telegraph) </p><p><a href="https://www.theguardian.com/world/2022/mar/04/russian-soldiers-ukraine-anger-duped-into-war">Demoralised Russian soldiers tell of anger at being ‘duped’ into war</a> (the Guardian)</p><p><a href="https://www.technologyreview.com/2022/03/02/1046646/the-propaganda-war-has-eclipsed-cyberwar-in-ukraine/">The propaganda war has eclipsed cyberwar in Ukraine</a> (MIT Technology Review)</p><p><a href="https://www.cnn.com/2022/03/03/tech/ukraine-russia-internet-icann/">Ukraine's request to cut off Russia from the global internet has been rejected</a> (CNN) </p><p><a href="https://www.armytimes.com/news/your-army/2022/03/02/no-the-army-isnt-sending-ukraine-draft-notices-via-text/">No, the Army isn’t sending Ukraine draft notices via text</a> (Army Times) </p><p><a href="https://amp.thehackernews.com/thn/2022/03/hackers-who-broke-into-nvidias-network.html">Hackers Who Broke Into NVIDIA's Network Leak DLSS Source Code Online</a> (Hacker News) </p><p><a href="https://www.computing.co.uk/news/4045981/hackers-warn-nvidia-open-source-gpu-drivers-leak">Hackers warn Nvidia to open-source their GPU drivers or face data leak </a>(Computing) </p><p><a href="https://arstechnica.com/information-technology/2022/03/cybercriminals-who-breached-nvidia-issue-one-of-the-most-unusual-demands-ever/">Cybercriminals who breached Nvidia issue one of the most unusual demands ever</a> (Ars Technica) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsma-22-062-01">BD Pyxis</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsma-22-062-02">BD Viper LT</a> (CISA) </p><p><a href="https://www.cisa.gov/uscert/ics/advisories/icsa-22-062-01">IPCOMM ipDIO</a> (CISA)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1530</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[af3c6ee0-7881-11ec-90a9-d764de1916d5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8095220375.mp3?updated=1690295680" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russia and Belarus exchange cyber operations with Ukraine. The US announces Task Force KleptoCapture. Vulnerable infusion pumps. TCP middlebox reflection. Notes on sanctions.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1527/notes</link>
      <description>The UN condemns Russia’s war in Ukraine. Ukraine’s cyber volunteers appear to be operating under the direction of Kyiv’s Ministry of Defense, and may be targeting Russian infrastructure. Belarusian cyber operators are phishing with stolen Ukrainian credentials in a cyberespionage campaign. Task Force KleptoCapture. Infusion pumps found vulnerable to cyberattack. TeaBot is found in the Play Store. TCP middlebox reflection. Dan Prince from Lancaster University on trustworthy autonomous systems. Our guest is John Shegerian from ERI on the security angle of e-recycling. And no more Harleys for Mr. Putin.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/42

Selected reading.
Cyber Realism in a Time of War
Russian Hybrid War Report: Social platforms crack down on Kremlin media as Kremlin demands compliance
Russia's war spurs corporate exodus, exposes business risks
Using DDoS, DanaBot targets Ukrainian Ministry of Defense
Asylum Ambuscade: State Actor Uses Compromised Private Ukrainian Military Emails to Target European Governments and Refugee Movement
Phishing campaign targets European officials assisting in refugee operations
Anonymous vs. Russia: Hackers Say Space Agency Breached, More Than 1,500 Websites Hit
Conti Ransomware Source Code Leaked
Hacker Group Anonymous Vows to Disrupt Russia's Internet — RT Websites Become 'Subject of Massive DDoS Attacks'
Ukrainian cyber resistance group targets Russian power grid, railways
Army of Cyber Hackers Rise Up to Back Ukraine
U.S. Officials Detail Efforts to Enforce Raft of New Russia Rules
TCP Middlebox Reflection: Coming to a DDoS Near You
TeaBot Android Banking Malware Spreads Again Through Google Play Store Apps
Infusion Pump Vulnerabilities: Common Security Gaps
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 03 Mar 2022 21:15:00 -0000</pubDate>
      <itunes:title>Russia and Belarus exchange cyber operations with Ukraine. The US announces Task Force KleptoCapture. Vulnerable infusion pumps. TCP middlebox reflection. Notes on sanctions.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1527</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The UN condemns Russia’s war in Ukraine. Ukraine’s cyber volunteers appear to be operating under the direction of Kyiv’s Ministry of Defense, and may be targeting Russian infrastructure. Belarusian cyber operators are phishing with stolen Ukrainian credentials in a cyberespionage campaign. Task Force KleptoCapture. Infusion pumps found vulnerable to cyberattack. TeaBot is found in the Play Store. TCP middlebox reflection. Dan Prince from Lancaster University on trustworthy autonomous systems. Our guest is John Shegerian from ERI on the security angle of e-recycling. And no more Harleys for Mr. Putin.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/42

Selected reading.
Cyber Realism in a Time of War
Russian Hybrid War Report: Social platforms crack down on Kremlin media as Kremlin demands compliance
Russia's war spurs corporate exodus, exposes business risks
Using DDoS, DanaBot targets Ukrainian Ministry of Defense
Asylum Ambuscade: State Actor Uses Compromised Private Ukrainian Military Emails to Target European Governments and Refugee Movement
Phishing campaign targets European officials assisting in refugee operations
Anonymous vs. Russia: Hackers Say Space Agency Breached, More Than 1,500 Websites Hit
Conti Ransomware Source Code Leaked
Hacker Group Anonymous Vows to Disrupt Russia's Internet — RT Websites Become 'Subject of Massive DDoS Attacks'
Ukrainian cyber resistance group targets Russian power grid, railways
Army of Cyber Hackers Rise Up to Back Ukraine
U.S. Officials Detail Efforts to Enforce Raft of New Russia Rules
TCP Middlebox Reflection: Coming to a DDoS Near You
TeaBot Android Banking Malware Spreads Again Through Google Play Store Apps
Infusion Pump Vulnerabilities: Common Security Gaps
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The UN condemns Russia’s war in Ukraine. Ukraine’s cyber volunteers appear to be operating under the direction of Kyiv’s Ministry of Defense, and may be targeting Russian infrastructure. Belarusian cyber operators are phishing with stolen Ukrainian credentials in a cyberespionage campaign. Task Force KleptoCapture. Infusion pumps found vulnerable to cyberattack. TeaBot is found in the Play Store. TCP middlebox reflection. Dan Prince from Lancaster University on trustworthy autonomous systems. Our guest is John Shegerian from ERI on the security angle of e-recycling. And no more Harleys for Mr. Putin.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/42</p><p><br></p><p><strong>Selected reading.</strong></p><p><a href="https://www.lawfareblog.com/cyber-realism-time-war">Cyber Realism in a Time of War</a></p><p><a href="https://www.atlanticcouncil.org/blogs/new-atlanticist/russian-hybrid-war-report-social-platforms-crack-down-on-kremlin-media-as-kremlin-demands-compliance/">Russian Hybrid War Report: Social platforms crack down on Kremlin media as Kremlin demands compliance</a></p><p><a href="https://apnews.com/article/russia-ukraine-vladimir-putin-business-europe-lifestyle-ca0aabe1c4a8fb3fbc0baec76a9c5666">Russia's war spurs corporate exodus, exposes business risks</a></p><p><a href="https://www.zscaler.com/blogs/security-research/danabot-launches-ddos-attack-against-ukrainian-ministry-defense">Using DDoS, DanaBot targets Ukrainian Ministry of Defense</a></p><p><a href="https://www.proofpoint.com/us/blog/threat-insight/asylum-ambuscade-state-actor-uses-compromised-private-ukrainian-military-emails">Asylum Ambuscade: State Actor Uses Compromised Private Ukrainian Military Emails to Target European Governments and Refugee Movement</a></p><p><a href="https://therecord.media/phishing-campaign-targets-european-officials-assisting-in-refugee-operations/">Phishing campaign targets European officials assisting in refugee operations</a></p><p><a href="https://www.hstoday.us/subject-matter-areas/cybersecurity/anonymous-vs-russia-hackers-say-space-agency-breached-more-than-1500-websites-hit/">Anonymous vs. Russia: Hackers Say Space Agency Breached, More Than 1,500 Websites Hit</a></p><p><a href="https://www.securityweek.com/conti-ransomware-source-code-leaked">Conti Ransomware Source Code Leaked</a></p><p><a href="https://news.bitcoin.com/hacker-group-anonymous-vows-to-disrupt-russias-internet-rt-websites-become-subject-of-massive-ddos-attacks/">Hacker Group Anonymous Vows to Disrupt Russia's Internet — RT Websites Become 'Subject of Massive DDoS Attacks'</a></p><p><a href="https://www.reuters.com/technology/ukrainian-cyber-resistance-group-targets-russian-power-grid-railways-2022-03-01/">Ukrainian cyber resistance group targets Russian power grid, railways</a></p><p><a href="https://www.securityweek.com/army-cyber-hackers-rise-back-ukraine">Army of Cyber Hackers Rise Up to Back Ukraine</a></p><p><a href="https://www.wsj.com/articles/u-s-officials-detail-efforts-to-enforce-raft-of-new-russia-rules-11646269191">U.S. Officials Detail Efforts to Enforce Raft of New Russia Rules</a></p><p><a href="https://www.akamai.com/blog/security/tcp-middlebox-reflection">TCP Middlebox Reflection: Coming to a DDoS Near You</a></p><p><a href="https://thehackernews.com/2022/03/teabot-android-banking-malware-spreads.html">TeaBot Android Banking Malware Spreads Again Through Google Play Store Apps</a></p><p><a href="https://unit42.paloaltonetworks.com/infusion-pump-vulnerabilities/">Infusion Pump Vulnerabilities: Common Security Gaps</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1764</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[af1b4d78-7881-11ec-90a9-a78f277261cc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5684804977.mp3?updated=1690295627" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Slow-motion brutality against Ukraine as sanctions begin to bite Russia. Big Tech takes sides. Ransomware continues to bother major corporations.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1526/notes</link>
      <description>Russia’s invasion in Ukraine is still slow, but it’s grown more brutal. Sanctions are beginning to hit Russia hard. The cyber phase of this hybrid war seems more informational than destructive, which is surprising. Big Tech has taken Ukraine’s side, and some Russian companies face a tough balancing act. Our guest is Lavi Lazarovitz from CyberArk with predictions on supply chain security. Malek Ben Salem from Accenture on deploying effective deception systems. And ransomware continues to pester major corporations.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/41

Selected reading.
Ukraine at D+6: Shocking and awful. (The CyberWire)
The Fog of Cyberwar Descends on Ukraine and Russia (Bloomberg) 
Russian Electric Vehicle Chargers Hacked, Tell Users ‘PUTIN IS A DICKHEAD’ (Vice) 
Western Sanctions Bite Russian Economy, but Pose Unpredictable Risks (Wall Street Journal) 
Targeted APT Activity: BABYSHARK Is Out for Blood (Huntress) 
5 New Vulnerabilities Discovered in PJSIP Open Source Library (JFrog) 
Nvidia says hackers are leaking company data after ransomware attack (TechCrunch) 
Insurer Aon falls victim to a cyber attack (Computing) 
Toyota to restart Japan production after cyberattack on supplier triggers one-day halt (The Edge Markets) 
Cyberattack on Toyota's supply chain shuts all its factories in Japan for 24 hours (CNN) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 02 Mar 2022 21:15:00 -0000</pubDate>
      <itunes:title>Slow-motion brutality against Ukraine as sanctions begin to bite Russia. Big Tech takes sides. Ransomware continues to bother major corporations.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1526</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Russia’s invasion in Ukraine is still slow, but it’s grown more brutal. Sanctions are beginning to hit Russia hard. The cyber phase of this hybrid war seems more informational than destructive, which is surprising. Big Tech has taken Ukraine’s side, and some Russian companies face a tough balancing act. Our guest is Lavi Lazarovitz from CyberArk with predictions on supply chain security. Malek Ben Salem from Accenture on deploying effective deception systems. And ransomware continues to pester major corporations.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/41

Selected reading.
Ukraine at D+6: Shocking and awful. (The CyberWire)
The Fog of Cyberwar Descends on Ukraine and Russia (Bloomberg) 
Russian Electric Vehicle Chargers Hacked, Tell Users ‘PUTIN IS A DICKHEAD’ (Vice) 
Western Sanctions Bite Russian Economy, but Pose Unpredictable Risks (Wall Street Journal) 
Targeted APT Activity: BABYSHARK Is Out for Blood (Huntress) 
5 New Vulnerabilities Discovered in PJSIP Open Source Library (JFrog) 
Nvidia says hackers are leaking company data after ransomware attack (TechCrunch) 
Insurer Aon falls victim to a cyber attack (Computing) 
Toyota to restart Japan production after cyberattack on supplier triggers one-day halt (The Edge Markets) 
Cyberattack on Toyota's supply chain shuts all its factories in Japan for 24 hours (CNN) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russia’s invasion in Ukraine is still slow, but it’s grown more brutal. Sanctions are beginning to hit Russia hard. The cyber phase of this hybrid war seems more informational than destructive, which is surprising. Big Tech has taken Ukraine’s side, and some Russian companies face a tough balancing act. Our guest is Lavi Lazarovitz from CyberArk with predictions on supply chain security. Malek Ben Salem from Accenture on deploying effective deception systems. And ransomware continues to pester major corporations.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/41</p><p><br></p><h2>Selected reading.</h2><p><a href="https://thecyberwire.com/stories/8e550fa1ad1a46a991f21dec9bdb855e/ukraine-at-d6-shocking-and-awful">Ukraine at D+6: Shocking and awful.</a> (The CyberWire)</p><p><a href="https://www.bloomberg.com/news/articles/2022-03-02/online-cyberattacks-in-russia-ukraine-show-digital-and-physical-future-of-war">The Fog of Cyberwar Descends on Ukraine and Russia</a> (Bloomberg) </p><p><a href="https://www.vice.com/en/article/akvya5/russian-electric-vehicle-chargers-hacked-tell-users-putin-is-a-dickhead">Russian Electric Vehicle Chargers Hacked, Tell Users ‘PUTIN IS A DICKHEAD’</a> (Vice) </p><p><a href="https://www.wsj.com/articles/western-sanctions-bite-russian-economy-but-pose-unpredictable-risks-11646143908">Western Sanctions Bite Russian Economy, but Pose Unpredictable Risks</a> (Wall Street Journal) </p><p><a href="https://www.huntress.com/blog/targeted-apt-activity-babyshark-is-out-for-blood">Targeted APT Activity: BABYSHARK Is Out for Blood</a> (Huntress) </p><p><a href="https://jfrog.com/blog/jfrog-discloses-5-memory-corruption-vulnerabilities-in-pjsip-a-popular-multimedia-library/">5 New Vulnerabilities Discovered in PJSIP Open Source Library</a> (JFrog) </p><p><a href="https://techcrunch.com/2022/03/01/nvidia-hackers-leak-ransomware/">Nvidia says hackers are leaking company data after ransomware attack</a> (TechCrunch) </p><p><a href="https://www.computing.co.uk/news/4045782/insurer-aon-falls-victim-cyber-attack">Insurer Aon falls victim to a cyber attack </a>(Computing) </p><p><a href="https://www.theedgemarkets.com/article/toyota-restart-japan-production-wednesday-after-cyber-attack-supplier">Toyota to restart Japan production after cyberattack on supplier triggers one-day halt</a> (The Edge Markets) </p><p><a href="https://www.cnn.com/2022/03/01/business/toyota-japan-cyberattack-production-restarts-intl-hnk/index.html">Cyberattack on Toyota's supply chain shuts all its factories in Japan for 24 hours</a> (CNN) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1709</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[adee379e-7881-11ec-90a9-cf90026a2ac8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5369166537.mp3?updated=1690295655" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Updates on Russia’s invasion of Ukraine, and the cyber phases of a hybrid war. Hacktivists and privateers. New Chinese malware described. Registration-bombing.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1525/notes</link>
      <description>Stalled columns, rocket fire, and negotiation over Ukraine. Two new pieces of malware found in use against Ukrainian targets. Ben Yelin joins us with analysis. Dealing with WhisperGate and HermeticWiper. The muted cyber phases of a hybrid war. Leaked files reveal Conti as a privateer. Sanctions move from deterrence to economic "war of attrition." Daxin: a backdoor that hides in normal network traffic. Registration-bombing lets fraud hide in the weeds. Our guest is Tresa Stephens from Allianz on the elevated concern for cyber risk among business leaders. And Razzlekhan talking a deal?
Resources
Ukraine Fighting Overshadows Chance of Russia Talks’ Success (Bloomberg) Both sides agree to second set of talks even as fighting rages. Russia suffers market seizure as ruble plunges on sanctions.
After a Fumbled Start, Russian Forces Hit Harder in Ukraine (New York Times) After days of miscalculation about Ukraine’s resolve to fight, Russian forces are turning toward an old pattern of opening fire on cities and mounting sieges.
The dire predictions about a Russian cyber onslaught haven’t come true in Ukraine. At least not yet. (Washington Post) For more than a decade, military commanders and outside experts have laid out blueprints for how cyberwar would unfold: military and civilian networks would be knocked offline, cutting-edge software would sabotage power plants, and whole populations would be unable to get money, gas or refrigerated food.
A Free-for-All But No Crippling Cyberattacks in Ukraine War (SecurityWeek) In the early days of the war in Ukraine, Russia's ability to create mayhem through malware hasn’t had much of a noticeable impact
CISA, FBI Issue Warnings on WhisperGate, HermeticWiper Attacks (SecurityWeek) The two U.S. agencies warn that both malware families were used in destructive cyberattacks targeting organizations in Ukraine.
Anonymous Hacker Group Targets Russian State Media (SecurityWeek) Hacker group Anonymous claimed responsibility on for disrupting the work of websites of pro-Kremlin Russian media in protest of the invasion of Ukraine.
Ukraine’s Volunteer ‘IT Army’ Is Hacking in Uncharted Territory (Wired) The country has enlisted thousands of cybersecurity professionals in the war effort against Russia.
After Conti backs war, ransomware gangs realize peril of patriotism amid infighting (SC Magazine) Ransomware is actually a complex global economy. Different groups design ransomware and license that ransomware for use in attacks, with the latter often using many different vendors of the former. So while the designers of Conti may be Russian, the affiliate groups using Conti may include Ukrainians. And like in any business, there is peril in angering the consumer.
A ransomware group paid the price for backing Russia (The Verge) Is proximity to the Putin regime becoming a liability?
U.N. General Assembly set to isolate Russia over Ukraine invasion (Reuters) The 193-member United Nations General Assembly began meeting on the crisis in Ukraine on Monday ahead of a vote this week to isolate Russia by deploring its "aggression against Ukraine" and demanding Russian troops stop fighting and withdraw.
Russia defends invasion during emergency UN General Assembly (Deutsche Welle) A clear majority of UN member states are expected to vote to condemn Russia's actions as Moscow becomes increasingly isolated internationally.
The New Russian Sanctions Playbook (Foreign Affairs) Deterrence is out, and economic attrition is in.
Russia seeks to halt investor stampede as sanctions hammer economy (Reuters) Russia said it was placing temporary curbs on foreigners seeking to exit Russian assets on Tuesday, putting the brakes on an accelerating investor exodus driven by crippling Western sanctions imposed over the invasion of Ukraine.

For links to all of today's stories check out CyberWire daily news briefing for March 1, 2022.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Mar 2022 21:15:00 -0000</pubDate>
      <itunes:title>Updates on Russia’s invasion of Ukraine, and the cyber phases of a hybrid war. Hacktivists and privateers. New Chinese malware described. Registration-bombing.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1525</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Stalled columns, rocket fire, and negotiation over Ukraine. Two new pieces of malware found in use against Ukrainian targets. Ben Yelin joins us with analysis. Dealing with WhisperGate and HermeticWiper. The muted cyber phases of a hybrid war. Leaked files reveal Conti as a privateer. Sanctions move from deterrence to economic "war of attrition." Daxin: a backdoor that hides in normal network traffic. Registration-bombing lets fraud hide in the weeds. Our guest is Tresa Stephens from Allianz on the elevated concern for cyber risk among business leaders. And Razzlekhan talking a deal?
Resources
Ukraine Fighting Overshadows Chance of Russia Talks’ Success (Bloomberg) Both sides agree to second set of talks even as fighting rages. Russia suffers market seizure as ruble plunges on sanctions.
After a Fumbled Start, Russian Forces Hit Harder in Ukraine (New York Times) After days of miscalculation about Ukraine’s resolve to fight, Russian forces are turning toward an old pattern of opening fire on cities and mounting sieges.
The dire predictions about a Russian cyber onslaught haven’t come true in Ukraine. At least not yet. (Washington Post) For more than a decade, military commanders and outside experts have laid out blueprints for how cyberwar would unfold: military and civilian networks would be knocked offline, cutting-edge software would sabotage power plants, and whole populations would be unable to get money, gas or refrigerated food.
A Free-for-All But No Crippling Cyberattacks in Ukraine War (SecurityWeek) In the early days of the war in Ukraine, Russia's ability to create mayhem through malware hasn’t had much of a noticeable impact
CISA, FBI Issue Warnings on WhisperGate, HermeticWiper Attacks (SecurityWeek) The two U.S. agencies warn that both malware families were used in destructive cyberattacks targeting organizations in Ukraine.
Anonymous Hacker Group Targets Russian State Media (SecurityWeek) Hacker group Anonymous claimed responsibility on for disrupting the work of websites of pro-Kremlin Russian media in protest of the invasion of Ukraine.
Ukraine’s Volunteer ‘IT Army’ Is Hacking in Uncharted Territory (Wired) The country has enlisted thousands of cybersecurity professionals in the war effort against Russia.
After Conti backs war, ransomware gangs realize peril of patriotism amid infighting (SC Magazine) Ransomware is actually a complex global economy. Different groups design ransomware and license that ransomware for use in attacks, with the latter often using many different vendors of the former. So while the designers of Conti may be Russian, the affiliate groups using Conti may include Ukrainians. And like in any business, there is peril in angering the consumer.
A ransomware group paid the price for backing Russia (The Verge) Is proximity to the Putin regime becoming a liability?
U.N. General Assembly set to isolate Russia over Ukraine invasion (Reuters) The 193-member United Nations General Assembly began meeting on the crisis in Ukraine on Monday ahead of a vote this week to isolate Russia by deploring its "aggression against Ukraine" and demanding Russian troops stop fighting and withdraw.
Russia defends invasion during emergency UN General Assembly (Deutsche Welle) A clear majority of UN member states are expected to vote to condemn Russia's actions as Moscow becomes increasingly isolated internationally.
The New Russian Sanctions Playbook (Foreign Affairs) Deterrence is out, and economic attrition is in.
Russia seeks to halt investor stampede as sanctions hammer economy (Reuters) Russia said it was placing temporary curbs on foreigners seeking to exit Russian assets on Tuesday, putting the brakes on an accelerating investor exodus driven by crippling Western sanctions imposed over the invasion of Ukraine.

For links to all of today's stories check out CyberWire daily news briefing for March 1, 2022.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Stalled columns, rocket fire, and negotiation over Ukraine. Two new pieces of malware found in use against Ukrainian targets. Ben Yelin joins us with analysis. Dealing with WhisperGate and HermeticWiper. The muted cyber phases of a hybrid war. Leaked files reveal Conti as a privateer. Sanctions move from deterrence to economic "war of attrition." Daxin: a backdoor that hides in normal network traffic. Registration-bombing lets fraud hide in the weeds. Our guest is Tresa Stephens from Allianz on the elevated concern for cyber risk among business leaders. And Razzlekhan talking a deal?</p><h2>Resources</h2><p><a href="https://www.bloomberg.com/news/articles/2022-02-28/heavy-fighting-in-ukraine-damages-prospects-for-russia-talks">Ukraine Fighting Overshadows Chance of Russia Talks’ Success</a> (Bloomberg) Both sides agree to second set of talks even as fighting rages. Russia suffers market seizure as ruble plunges on sanctions.</p><p><a href="https://www.nytimes.com/2022/02/28/world/europe/russia-ukraine-military.html">After a Fumbled Start, Russian Forces Hit Harder in Ukraine</a> (New York Times) After days of miscalculation about Ukraine’s resolve to fight, Russian forces are turning toward an old pattern of opening fire on cities and mounting sieges.</p><p><a href="https://www.washingtonpost.com/technology/2022/02/28/internet-war-cyber-russia-ukraine/">The dire predictions about a Russian cyber onslaught haven’t come true in Ukraine. At least not yet.</a> (Washington Post) For more than a decade, military commanders and outside experts have laid out blueprints for how cyberwar would unfold: military and civilian networks would be knocked offline, cutting-edge software would sabotage power plants, and whole populations would be unable to get money, gas or refrigerated food.</p><p><a href="https://www.securityweek.com/free-all-no-crippling-cyberattacks-ukraine-war">A Free-for-All But No Crippling Cyberattacks in Ukraine War</a> (SecurityWeek) In the early days of the war in Ukraine, Russia's ability to create mayhem through malware hasn’t had much of a noticeable impact</p><p><a href="https://www.securityweek.com/cisa-fbi-issue-warnings-whispergate-hermeticwiper-attacks">CISA, FBI Issue Warnings on WhisperGate, HermeticWiper Attacks</a> (SecurityWeek) The two U.S. agencies warn that both malware families were used in destructive cyberattacks targeting organizations in Ukraine.</p><p><a href="https://www.securityweek.com/anonymous-hacker-group-targets-russian-state-media">Anonymous Hacker Group Targets Russian State Media</a> (SecurityWeek) Hacker group Anonymous claimed responsibility on for disrupting the work of websites of pro-Kremlin Russian media in protest of the invasion of Ukraine.</p><p><a href="https://www.wired.com/story/ukraine-it-army-russia-war-cyberattacks-ddos/">Ukraine’s Volunteer ‘IT Army’ Is Hacking in Uncharted Territory</a> (Wired) The country has enlisted thousands of cybersecurity professionals in the war effort against Russia.</p><p><a href="https://www.scmagazine.com/analysis/ransomware/after-conti-backs-war-ransomware-gangs-realize-peril-of-patriotism-amid-infighting">After Conti backs war, ransomware gangs realize peril of patriotism amid infighting</a> (SC Magazine) Ransomware is actually a complex global economy. Different groups design ransomware and license that ransomware for use in attacks, with the latter often using many different vendors of the former. So while the designers of Conti may be Russian, the affiliate groups using Conti may include Ukrainians. And like in any business, there is peril in angering the consumer.</p><p><a href="https://www.theverge.com/2022/2/28/22955246/conti-ransomware-russia-ukraine-chat-logs-leaked">A ransomware group paid the price for backing Russia</a> (The Verge) Is proximity to the Putin regime becoming a liability?</p><p><a href="https://www.reuters.com/world/ukraine-un-chief-says-nuclear-conflict-inconceivable-2022-02-28/">U.N. General Assembly set to isolate Russia over Ukraine invasion</a> (Reuters) The 193-member United Nations General Assembly began meeting on the crisis in Ukraine on Monday ahead of a vote this week to isolate Russia by deploring its "aggression against Ukraine" and demanding Russian troops stop fighting and withdraw.</p><p><a href="https://www.dw.com/en/russia-defends-invasion-during-emergency-un-general-assembly/a-60952167">Russia defends invasion during emergency UN General Assembly</a> (Deutsche Welle) A clear majority of UN member states are expected to vote to condemn Russia's actions as Moscow becomes increasingly isolated internationally.</p><p><a href="https://www.foreignaffairs.com/articles/russia-fsu/2022-02-28/new-russian-sanctions-playbook">The New Russian Sanctions Playbook</a> (Foreign Affairs) Deterrence is out, and economic attrition is in.</p><p><a href="https://www.reuters.com/markets/europe/russia-seeks-halt-investor-stampede-sanctions-hammer-economy-2022-03-01/">Russia seeks to halt investor stampede as sanctions hammer economy</a> (Reuters) Russia said it was placing temporary curbs on foreigners seeking to exit Russian assets on Tuesday, putting the brakes on an accelerating investor exodus driven by crippling Western sanctions imposed over the invasion of Ukraine.</p><p><br></p><p>For links to all of today's stories check out <a href="https://thecyberwire.com/newsletters/daily-briefing/11/40">CyberWire daily news briefing for March 1, 2022</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1727</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[adccafca-7881-11ec-90a9-9b4474ef48a3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5714142435.mp3?updated=1690295543" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An update on Russia’s hybrid war against Ukraine. Offensive cyber operations under hacktivist guise. Russian privateers return (also as hacktivists). Some non-war-related hacking.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1524/notes</link>
      <description>Ukrainian resistance may have stalled the Russian advance at key points. Cyber operations against Ukraine (and Russia). Diplomacy, now short of surrender? A SWIFT kick. Return of the privateers, now in the guise of patriotic hacktivists. Not all hacking is war-related. Josh Ray from Accenture on KillACK Backdoor Malware Continues to Evolve. Rick Howard revisits the cyber sand table. Criminals exploit Ukraine's suffering in social engineering campaigns.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/39
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 28 Feb 2022 21:15:00 -0000</pubDate>
      <itunes:title>An update on Russia’s hybrid war against Ukraine. Offensive cyber operations under hacktivist guise. Russian privateers return (also as hacktivists). Some non-war-related hacking.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1524</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ukrainian resistance may have stalled the Russian advance at key points. Cyber operations against Ukraine (and Russia). Diplomacy, now short of surrender? A SWIFT kick. Return of the privateers, now in the guise of patriotic hacktivists. Not all hacking is war-related. Josh Ray from Accenture on KillACK Backdoor Malware Continues to Evolve. Rick Howard revisits the cyber sand table. Criminals exploit Ukraine's suffering in social engineering campaigns.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/39
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ukrainian resistance may have stalled the Russian advance at key points. Cyber operations against Ukraine (and Russia). Diplomacy, now short of surrender? A SWIFT kick. Return of the privateers, now in the guise of patriotic hacktivists. Not all hacking is war-related. Josh Ray from Accenture on KillACK Backdoor Malware Continues to Evolve. Rick Howard revisits the cyber sand table. Criminals exploit Ukraine's suffering in social engineering campaigns.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/39</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1568</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ab077676-7881-11ec-90a9-f70f3d32cc30]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4218134516.mp3?updated=1690295527" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sloane Menkes: What is the 2%? [Consultant] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/89/notes</link>
      <description>Principal in PricewaterhouseCoopers Cyber Risk and Regulatory Practice, Sloane Menkes, shares her story of how non-linear math helped to shape her life and career. Sloane credits a high school classmate for inspiring her mantra "What is the 2%?" that she employs when she feels like things are shutting down. She talks about her experiences in calculus class at the US AIr Force Academy that helped to enlighten her and inform the intuitive problem solving skill or way of thinking that she'd been employing in her life. She joined Office of Special Investigations and working with Howard Schmidt is where Sloane first started to get interested in cybersecurity. She shares what she loves about the consulting role is that the environment is constantly changing, and she offers some advice for women interested in cybersecurity. We thank Sloane for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 27 Feb 2022 08:00:00 -0000</pubDate>
      <itunes:title>Sloane Menkes: What is the 2%? [Consultant] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>89</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Principal in PricewaterhouseCoopers Cyber Risk and Regulatory Practice, Sloane Menkes, shares her story of how non-linear math helped to shape her life and career. </itunes:subtitle>
      <itunes:summary>Principal in PricewaterhouseCoopers Cyber Risk and Regulatory Practice, Sloane Menkes, shares her story of how non-linear math helped to shape her life and career. Sloane credits a high school classmate for inspiring her mantra "What is the 2%?" that she employs when she feels like things are shutting down. She talks about her experiences in calculus class at the US AIr Force Academy that helped to enlighten her and inform the intuitive problem solving skill or way of thinking that she'd been employing in her life. She joined Office of Special Investigations and working with Howard Schmidt is where Sloane first started to get interested in cybersecurity. She shares what she loves about the consulting role is that the environment is constantly changing, and she offers some advice for women interested in cybersecurity. We thank Sloane for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Principal in PricewaterhouseCoopers Cyber Risk and Regulatory Practice, Sloane Menkes, shares her story of how non-linear math helped to shape her life and career. Sloane credits a high school classmate for inspiring her mantra "What is the 2%?" that she employs when she feels like things are shutting down. She talks about her experiences in calculus class at the US AIr Force Academy that helped to enlighten her and inform the intuitive problem solving skill or way of thinking that she'd been employing in her life. She joined Office of Special Investigations and working with Howard Schmidt is where Sloane first started to get interested in cybersecurity. She shares what she loves about the consulting role is that the environment is constantly changing, and she offers some advice for women interested in cybersecurity. We thank Sloane for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>506</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aa2ebcba-95b3-11ec-80bd-9fa5d715a98d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5446841260.mp3?updated=1645736279" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Noberus ransomware: Coded in Rust and tailored to victim. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/221/notes</link>
      <description>Guest Dick O'Brien, Principal Editor at Symantec, joins Dave to discuss their team's research, "Noberus: Technical Analysis Shows Sophistication of New Rust-based Ransomware." Noberus is new ransomware used in mid-November attack, ConnectWise was likely infection vector.
Symantec, a division of Broadcom Software, tracks this ransomware as Ransom.Noberus and our researchers first spotted it on a victim organization on November 18, 2021, with three variants of Noberus deployed by the attackers over the course of that attack. This would appear to show that this ransomware was active earlier than was previously reported, with MalwareHunterTeam having told BleepingComputer they first saw this ransomware on November 21.
Noberus is an interesting ransomware because it is coded in Rust, and this is the first time we have seen a professional ransomware strain that has been used in real-world attacks coded in this programming language. Noberus appears to carry out the now-typical double extortion ransomware attacks where they first steal information from victim networks before encrypting files. Noberus adds the .sykffle extension to encrypted files.
The research can be found here:
Noberus: Technical Analysis Shows Sophistication of New Rust-based Ransomware

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Feb 2022 08:00:00 -0000</pubDate>
      <itunes:title>Noberus ransomware: Coded in Rust and tailored to victim. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>221</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Dick O'Brien, Principal Editor at Symantec, joins Dave to discuss their team's research, "Noberus: Technical Analysis Shows Sophistication of New Rust-based Ransomware." Noberus is new ransomware used in mid-November attack, ConnectWise was likely infection vector.
Symantec, a division of Broadcom Software, tracks this ransomware as Ransom.Noberus and our researchers first spotted it on a victim organization on November 18, 2021, with three variants of Noberus deployed by the attackers over the course of that attack. This would appear to show that this ransomware was active earlier than was previously reported, with MalwareHunterTeam having told BleepingComputer they first saw this ransomware on November 21.
Noberus is an interesting ransomware because it is coded in Rust, and this is the first time we have seen a professional ransomware strain that has been used in real-world attacks coded in this programming language. Noberus appears to carry out the now-typical double extortion ransomware attacks where they first steal information from victim networks before encrypting files. Noberus adds the .sykffle extension to encrypted files.
The research can be found here:
Noberus: Technical Analysis Shows Sophistication of New Rust-based Ransomware

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Dick O'Brien, Principal Editor at Symantec, joins Dave to discuss their team's research, "Noberus: Technical Analysis Shows Sophistication of New Rust-based Ransomware." Noberus is new ransomware used in mid-November attack, ConnectWise was likely infection vector.</p><p>Symantec, a division of Broadcom Software, tracks this ransomware as Ransom.Noberus and our researchers first spotted it on a victim organization on November 18, 2021, with three variants of Noberus deployed by the attackers over the course of that attack. This would appear to show that this ransomware was active earlier than was previously reported, with MalwareHunterTeam having told BleepingComputer they first saw this ransomware on November 21.</p><p>Noberus is an interesting ransomware because it is coded in Rust, and this is the first time we have seen a professional ransomware strain that has been used in real-world attacks coded in this programming language. Noberus appears to carry out the now-typical double extortion ransomware attacks where they first steal information from victim networks before encrypting files. Noberus adds the .sykffle extension to encrypted files.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/noberus-blackcat-alphv-rust-ransomware">Noberus: Technical Analysis Shows Sophistication of New Rust-based Ransomware</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1219</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[90d1051e-9407-11ec-97db-6f7b41abc2df]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6157001649.mp3?updated=1685126696" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hybrid aggression and hybrid resistance. Sanctions, defense, and (maybe) retaliation. MuddyWater is newly active. Trickbot seems to have retired. Notes on misinformation and the fog of war.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1523/notes</link>
      <description>Russia’s full-scale invasion meets regular and irregular Ukrainian resistance. Public uses of intelligence products. Hybrid aggression and hybrid defense in cyberspace, as the civilized world imposed sanctions on Russia. Iran’s MuddyWater threat actor is back, with renewed cyberespionage. Good-bye to Trickbot. Carole Theriault wraps up her look at mobile device security. Rick Howard checks in with Matthew Sharp ( Logicworks) &amp; "Rock" Lambros (RockCyber) on "The CISO Evolution". And some notes on the fog of war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/38
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 25 Feb 2022 21:30:00 -0000</pubDate>
      <itunes:title>Hybrid aggression and hybrid resistance. Sanctions, defense, and (maybe) retaliation. MuddyWater is newly active. Trickbot seems to have retired. Notes on misinformation and the fog of war.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1523</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Russia’s full-scale invasion meets regular and irregular Ukrainian resistance. Public uses of intelligence products. Hybrid aggression and hybrid defense in cyberspace, as the civilized world imposed sanctions on Russia. Iran’s MuddyWater threat actor is back, with renewed cyberespionage. Good-bye to Trickbot. Carole Theriault wraps up her look at mobile device security. Rick Howard checks in with Matthew Sharp ( Logicworks) &amp; "Rock" Lambros (RockCyber) on "The CISO Evolution". And some notes on the fog of war.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/38
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russia’s full-scale invasion meets regular and irregular Ukrainian resistance. Public uses of intelligence products. Hybrid aggression and hybrid defense in cyberspace, as the civilized world imposed sanctions on Russia. Iran’s MuddyWater threat actor is back, with renewed cyberespionage. Good-bye to Trickbot. Carole Theriault wraps up her look at mobile device security. Rick Howard checks in with Matthew Sharp ( Logicworks) &amp; "Rock" Lambros (RockCyber) on "The CISO Evolution". And some notes on the fog of war.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/38</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1701</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ac9e5252-7881-11ec-90a9-d34be72254df]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5893990165.mp3?updated=1690295519" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russia’s full-scale invasion of Ukraine began this morning at 5:00 AM, Kyiv local time. Cyberattacks are serving as combat support and strategic disruption.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1522/notes</link>
      <description>Russia opens a general war against Ukraine, with rocket fires, heavy forces, and a not-so-veiled threat to NATO. Cyber operations are serving as combat support and strategic disruption. While the war in Ukraine dominates the news, elsewhere in the world cybercrime and cyberespionage continue at their customary levels. Carole Theriault looks to the security of your mobile devices. And our guest is Dr. Chenxi Wang of Rain Capital with insights on the new NIST software supply chain security standards.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/37
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 24 Feb 2022 21:15:00 -0000</pubDate>
      <itunes:title>Russia’s full-scale invasion of Ukraine began this morning at 5:00 AM, Kyiv local time. Cyberattacks are serving as combat support and strategic disruption.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1522</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Russia opens a general war against Ukraine, with rocket fires, heavy forces, and a not-so-veiled threat to NATO. Cyber operations are serving as combat support and strategic disruption. While the war in Ukraine dominates the news, elsewhere in the world cybercrime and cyberespionage continue at their customary levels. Carole Theriault looks to the security of your mobile devices. And our guest is Dr. Chenxi Wang of Rain Capital with insights on the new NIST software supply chain security standards.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/37
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russia opens a general war against Ukraine, with rocket fires, heavy forces, and a not-so-veiled threat to NATO. Cyber operations are serving as combat support and strategic disruption. While the war in Ukraine dominates the news, elsewhere in the world cybercrime and cyberespionage continue at their customary levels. Carole Theriault looks to the security of your mobile devices. And our guest is Dr. Chenxi Wang of Rain Capital with insights on the new NIST software supply chain security standards.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/37</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1447</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[abf5d910-7881-11ec-90a9-0bdc95b6abcd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5259142359.mp3?updated=1690295474" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Putin goes medieval (we paraphrase the UK defense secretary). Cyberattack disrupts a logistics giant. Two reports look at the state of industrial cybersecurity.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1521/notes</link>
      <description>With diplomacy at a stand and Russian troops now openly in Ukraine, Western governments impose sanctions on Russia. A fresh round of distributed denial-of-service attacks against Ukraine. Cobalt Strike continues to be misused by criminals. A cyberattack has severely disrupted a major logistics firm. My conversation with Assistant Director Bryan Vorndran of the FBI Cyber Division. Our guest Ed Amoroso from TAG Cyber explains Research as a Service. And two looks at the recent and prospective state of industrial cybersecurity.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/36
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 23 Feb 2022 21:30:00 -0000</pubDate>
      <itunes:title>Putin goes medieval (we paraphrase the UK defense secretary). Cyberattack disrupts a logistics giant. Two reports look at the state of industrial cybersecurity.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1521</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>With diplomacy at a stand and Russian troops now openly in Ukraine, Western governments impose sanctions on Russia. A fresh round of distributed denial-of-service attacks against Ukraine. Cobalt Strike continues to be misused by criminals. A cyberattack has severely disrupted a major logistics firm. My conversation with Assistant Director Bryan Vorndran of the FBI Cyber Division. Our guest Ed Amoroso from TAG Cyber explains Research as a Service. And two looks at the recent and prospective state of industrial cybersecurity.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/36
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>With diplomacy at a stand and Russian troops now openly in Ukraine, Western governments impose sanctions on Russia. A fresh round of distributed denial-of-service attacks against Ukraine. Cobalt Strike continues to be misused by criminals. A cyberattack has severely disrupted a major logistics firm. My conversation with Assistant Director Bryan Vorndran of the FBI Cyber Division. Our guest Ed Amoroso from TAG Cyber explains Research as a Service. And two looks at the recent and prospective state of industrial cybersecurity.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/36</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1783</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[abcd8cb2-7881-11ec-90a9-2361d575834d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8709379176.mp3?updated=1690295460" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Escalation in Russia’s hybrid aggression. APT10’s espionage against Taiwan’s financial sector. Developments in the C2C market. Jamming your teen’s Internet access.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1520/notes</link>
      <description>Russia escalates its hybrid war against Ukraine, with cyber implications for the rest of the world. Xenomorph banking Trojan hits European Android users. APT10’s months-long espionage campaign against Taiwan’s banks. Hive ransomware’s flawed encryption is good news. Trickbot’s place in the C2C market. Joe Carrigan shares the latest evolution of business email compromise. John Pescatore’s Mr. Security Answer Person returns. And there’s a right way and a wrong way to keep your teen offline.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/35
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Feb 2022 21:15:00 -0000</pubDate>
      <itunes:title>Escalation in Russia’s hybrid aggression. APT10’s espionage against Taiwan’s financial sector. Developments in the C2C market. Jamming your teen’s Internet access.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1520</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Russia escalates its hybrid war against Ukraine, with cyber implications for the rest of the world. Xenomorph banking Trojan hits European Android users. APT10’s months-long espionage campaign against Taiwan’s banks. Hive ransomware’s flawed encryption is good news. Trickbot’s place in the C2C market. Joe Carrigan shares the latest evolution of business email compromise. John Pescatore’s Mr. Security Answer Person returns. And there’s a right way and a wrong way to keep your teen offline.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/35
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russia escalates its hybrid war against Ukraine, with cyber implications for the rest of the world. Xenomorph banking Trojan hits European Android users. APT10’s months-long espionage campaign against Taiwan’s banks. Hive ransomware’s flawed encryption is good news. Trickbot’s place in the C2C market. Joe Carrigan shares the latest evolution of business email compromise. John Pescatore’s Mr. Security Answer Person returns. And there’s a right way and a wrong way to keep your teen offline.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/35</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1757</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ab28a0a8-7881-11ec-90a9-832b5c574e95]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4715214568.mp3?updated=1690295438" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Interview select: Kenneth Geers of NATO's CCD COE on "Cyber War in Perspective: Russian Aggression Against Ukraine."</title>
      <description>As we break to observe Washington's birthday, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. In this extended interview, Dave Bittner speaks with Kenneth Geers from NATO's CCD COE on "Cyber War in Perspective: Russian Aggression Against Ukraine." Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 21 Feb 2022 21:00:00 -0000</pubDate>
      <itunes:title>Interview select: Kenneth Geers of NATO's CCD COE on "Cyber War in Perspective: Russian Aggression Against Ukraine."</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>As we break to observe Washington's birthday, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. In this extended interview, Dave Bittner speaks with Kenneth Geers from NATO's CCD COE on "Cyber War in Perspective: Russian Aggression Against Ukraine." Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As we break to observe Washington's birthday, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. In this extended interview, Dave Bittner speaks with Kenneth Geers from NATO's CCD COE on "Cyber War in Perspective: Russian Aggression Against Ukraine." Like what you hear? Consider subscribing to CyberWire Pro for $99/year. <a href="https://thecyberwire.com/pro">Learn more.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1372</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dd856ba0-9107-11ec-a439-a7b466041dac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9496894145.mp3?updated=1645224205" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bonus: Afternoon Cyber Tea: IoT-Based Infrastructures</title>
      <link>https://thecyberwire.com/podcasts/afternoon-cyber-tea/40/notes</link>
      <description>Afternoon Cyber Tea with Ann Johnson is a CyberWire Network podcast created by Microsoft Security. It's a bi-weekly show that comes out every other Tuesday. We thought you would enjoy this episode in particular and hope you consider subscribing in your favorite podcast app.
Diana Kelly, the co-founder, and CTO of SecurityCurve, a cybersecurity consulting firm, joins Ann Johnson on this episode of Afternoon Cyber Tea. Diana is a globally known security expert who donates much of her time volunteering in the cybersecurity community while also serving on the Association for Computing Machinery Ethics and Plagiarism Committee. Diana talks with Ann about helping inexperienced organizations get up to speed on the cybersecurity landscape, some of the current significant security and privacy hurdles currently plaguing the field, and some of the best practices to assist network defenders and users trying to combat botnet threats.  
  
In This Episode You Will Learn:     

How companies can protect themselves from new unsecure devices  

When security risks correspond with access management and IoT devices 

Why we need security programs to grow to a new level 

  
Some Questions We Ask: 

How should network defenders and users combat botnet threats? 

What types of universal IoT standards need to be created?  

What privacy hurdles are currently plaguing the field of IoT-connected devices? 

  
Resources:   
View Diana Kelly on LinkedIn 
View Ann Johnson on LinkedIn 
 
Related:  
Listen to: Security Unlocked: CISO Series with Bret Arsenault    
Listen to: Security Unlocked  

Afternoon Cyber Tea with Ann Johnson is produced by Microsoft and distributed as part of The CyberWire Network.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 21 Feb 2022 08:00:00 -0000</pubDate>
      <itunes:title>Bonus: Afternoon Cyber Tea: IoT-Based Infrastructures</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Afternoon Cyber Tea with Ann Johnson is a CyberWire Network podcast created by Microsoft Security. It's a bi-weekly show that comes out every other Tuesday. We thought you would enjoy this episode in particular and hope you consider subscribing in your favorite podcast app.
Diana Kelly, the co-founder, and CTO of SecurityCurve, a cybersecurity consulting firm, joins Ann Johnson on this episode of Afternoon Cyber Tea. Diana is a globally known security expert who donates much of her time volunteering in the cybersecurity community while also serving on the Association for Computing Machinery Ethics and Plagiarism Committee. Diana talks with Ann about helping inexperienced organizations get up to speed on the cybersecurity landscape, some of the current significant security and privacy hurdles currently plaguing the field, and some of the best practices to assist network defenders and users trying to combat botnet threats.  
  
In This Episode You Will Learn:     

How companies can protect themselves from new unsecure devices  

When security risks correspond with access management and IoT devices 

Why we need security programs to grow to a new level 

  
Some Questions We Ask: 

How should network defenders and users combat botnet threats? 

What types of universal IoT standards need to be created?  

What privacy hurdles are currently plaguing the field of IoT-connected devices? 

  
Resources:   
View Diana Kelly on LinkedIn 
View Ann Johnson on LinkedIn 
 
Related:  
Listen to: Security Unlocked: CISO Series with Bret Arsenault    
Listen to: Security Unlocked  

Afternoon Cyber Tea with Ann Johnson is produced by Microsoft and distributed as part of The CyberWire Network.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em>Afternoon Cyber Tea with Ann Johnson is a CyberWire Network podcast created by Microsoft Security. It's a bi-weekly show that comes out every other Tuesday. We thought you would enjoy this episode in particular and hope you consider subscribing in your favorite podcast app.</em></p><p>Diana Kelly, the co-founder, and CTO of SecurityCurve, a cybersecurity consulting firm, joins Ann Johnson on this episode of Afternoon Cyber Tea. Diana is a globally known security expert who donates much of her time volunteering in the cybersecurity community while also serving on the Association for Computing Machinery Ethics and Plagiarism Committee. Diana talks with Ann about helping inexperienced organizations get up to speed on the cybersecurity landscape, some of the current significant security and privacy hurdles currently plaguing the field, and some of the best practices to assist network defenders and users trying to combat botnet threats.  </p><p>  </p><p><strong>In This Episode You Will Learn</strong>:     </p><ul>
<li>How companies can protect themselves from new unsecure devices  </li>
<li>When security risks correspond with access management and IoT devices </li>
<li>Why we need security programs to grow to a new level </li>
</ul><p>  </p><p><strong>Some Questions We Ask:</strong> </p><ul>
<li>How should network defenders and users combat botnet threats? </li>
<li>What types of universal IoT standards need to be created?  </li>
<li>What privacy hurdles are currently plaguing the field of IoT-connected devices? </li>
</ul><p>  </p><p><strong>Resources:</strong>   </p><p>View <a href="https://www.linkedin.com/in/dianakelleysecuritycurve/">Diana Kelly on LinkedIn</a> </p><p>View <a href="https://www.linkedin.com/in/ann-johnsons/">Ann Johnson on LinkedIn</a> </p><p> </p><p><strong>Related:</strong>  </p><p>Listen to: <a href="https://securityunlockedcisoseries.com/">Security Unlocked: CISO Series with Bret Arsenault</a>    </p><p>Listen to: <a href="https://securityunlockedpodcast.com/">Security Unlocked</a>  </p><p><br></p><p><em>Afternoon Cyber Tea with Ann Johnson is produced by Microsoft and distributed as part of The CyberWire Network.</em>  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1792</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eb0df3c8-9030-11ec-b930-3bc419fe00e3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3332972723.mp3?updated=1645124613" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Joe Carrigan: Build your network. [Security engineer] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/88/notes</link>
      <description>Senior security engineer with the Johns Hopkins University Information Security Institute and the Institute for Assured Autonomy, Joe Carrigan, shares what he calls his life mistake and what spurred him to finally choose a career in technology. Throughout his life, Joe had interest in technology, he even worked at the computer lab in college, but never set his sights on that for a career. A conversation with a stranger guided him in that direction and he's been there ever since. As co-host of the CyberWire's Hacking Humans, Joe sees some heartbreaking results of scams and feels education of the public will help to prevent these. Joe reminds us to build our networks as they include people we can always go back to either when searching for a position or looking to fill one on our teams. We thank Joe for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 20 Feb 2022 08:00:00 -0000</pubDate>
      <itunes:title>Joe Carrigan: Build your network. [Security engineer] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>88</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Senior security engineer with the Johns Hopkins University Information Security Institute and the Institute for Assured Autonomy, Joe Carrigan, shares his life mistake and what spurred him to finally chose a career in technology. </itunes:subtitle>
      <itunes:summary>Senior security engineer with the Johns Hopkins University Information Security Institute and the Institute for Assured Autonomy, Joe Carrigan, shares what he calls his life mistake and what spurred him to finally choose a career in technology. Throughout his life, Joe had interest in technology, he even worked at the computer lab in college, but never set his sights on that for a career. A conversation with a stranger guided him in that direction and he's been there ever since. As co-host of the CyberWire's Hacking Humans, Joe sees some heartbreaking results of scams and feels education of the public will help to prevent these. Joe reminds us to build our networks as they include people we can always go back to either when searching for a position or looking to fill one on our teams. We thank Joe for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Senior security engineer with the Johns Hopkins University Information Security Institute and the Institute for Assured Autonomy, Joe Carrigan, shares what he calls his life mistake and what spurred him to finally choose a career in technology. Throughout his life, Joe had interest in technology, he even worked at the computer lab in college, but never set his sights on that for a career. A conversation with a stranger guided him in that direction and he's been there ever since. As co-host of the CyberWire's Hacking Humans, Joe sees some heartbreaking results of scams and feels education of the public will help to prevent these. Joe reminds us to build our networks as they include people we can always go back to either when searching for a position or looking to fill one on our teams. We thank Joe for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>534</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d7d8eeca-9030-11ec-ab03-8796fb0eb13a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3658352140.mp3?updated=1645733928" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What Log4Shell has taught us. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/25/notes</link>
      <description>If 2021 taught us anything, it’s that our supply chain–especially our technical supply chain–hangs in the balance of a very fragile system. The year came to a close with the announcement of the Log4j zero day. Talk about saving the best for last.
On this episode of CyberWire-X, the CyberWire's Rick Howard speaks with Tom Quinn CISO at T. Rowe Price, about the topic. Show Sponsor ExtraHop’s Head of Product, Ted Driggs, joins the CyberWire's Dave Bittner to examine what Log4Shell tells us about the state of cyber defense going into 2022, and what enterprises can do to prepare. Through these conversations, we explore the challenges that enterprises had in patching the vulnerability, take a closer look at the advanced post-compromise threat activity spotted in the wild, and glean lessons that can be learned to build resilience against the next Log4j-style zero day.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 20 Feb 2022 06:00:00 -0000</pubDate>
      <itunes:title>What Log4Shell has taught us. [CyberWire-X]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>25</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>If 2021 taught us anything, it’s that our supply chain–especially our technical supply chain–hangs in the balance of a very fragile system. The year came to a close with the announcement of the Log4j zero day. Talk about saving the best for last.
On this episode of CyberWire-X, the CyberWire's Rick Howard speaks with Tom Quinn CISO at T. Rowe Price, about the topic. Show Sponsor ExtraHop’s Head of Product, Ted Driggs, joins the CyberWire's Dave Bittner to examine what Log4Shell tells us about the state of cyber defense going into 2022, and what enterprises can do to prepare. Through these conversations, we explore the challenges that enterprises had in patching the vulnerability, take a closer look at the advanced post-compromise threat activity spotted in the wild, and glean lessons that can be learned to build resilience against the next Log4j-style zero day.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>If 2021 taught us anything, it’s that our supply chain–especially our technical supply chain–hangs in the balance of a very fragile system. The year came to a close with the announcement of the Log4j zero day. Talk about saving the best for last.</p><p>On this episode of CyberWire-X, the CyberWire's Rick Howard speaks with Tom Quinn CISO at T. Rowe Price, about the topic. Show Sponsor ExtraHop’s Head of Product, Ted Driggs, joins the CyberWire's Dave Bittner to examine what Log4Shell tells us about the state of cyber defense going into 2022, and what enterprises can do to prepare. Through these conversations, we explore the challenges that enterprises had in patching the vulnerability, take a closer look at the advanced post-compromise threat activity spotted in the wild, and glean lessons that can be learned to build resilience against the next Log4j-style zero day.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1868</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0218704c-90eb-11ec-b22c-1ff958a19e1c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5710816666.mp3?updated=1645210408" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Instagram hijacks all start with a phish. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/220/notes</link>
      <description>Guest Marcelle Lee, Senior Security Researcher and Emerging Threats Lead, from SecureWorks joins Dave to share her team's work on "Ransoms Demanded for Hijacked Instagram Accounts." An extensive phishing campaign has targeted corporate Instagram accounts since approximately August 2021. The threat actors demand ransoms from the victims to restore access.
Organizations typically focus on traditional enterprise cybersecurity threats. However, some threats are more subtle, targeting organizations on unexpected platforms. In October 2021, Secureworks Counter Threat Unit (CTU) researchers identified a phishing campaign that hijacks corporate Instagram accounts, as well as accounts of individual influencers who have a large number of followers. The threat actors then extort ransom payments from the victims. The activity continues at the time of the interview.
The research can be found here:
Ransoms Demanded for Hijacked Instagram Accounts

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Feb 2022 08:00:00 -0000</pubDate>
      <itunes:title>Instagram hijacks all start with a phish. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>220</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Marcelle Lee, Senior Security Researcher and Emerging Threats Lead, from SecureWorks joins Dave to share her team's work on "Ransoms Demanded for Hijacked Instagram Accounts." An extensive phishing campaign has targeted corporate Instagram accounts since approximately August 2021. The threat actors demand ransoms from the victims to restore access.
Organizations typically focus on traditional enterprise cybersecurity threats. However, some threats are more subtle, targeting organizations on unexpected platforms. In October 2021, Secureworks Counter Threat Unit (CTU) researchers identified a phishing campaign that hijacks corporate Instagram accounts, as well as accounts of individual influencers who have a large number of followers. The threat actors then extort ransom payments from the victims. The activity continues at the time of the interview.
The research can be found here:
Ransoms Demanded for Hijacked Instagram Accounts

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Marcelle Lee, Senior Security Researcher and Emerging Threats Lead, from SecureWorks joins Dave to share her team's work on "Ransoms Demanded for Hijacked Instagram Accounts." An extensive phishing campaign has targeted corporate Instagram accounts since approximately August 2021. The threat actors demand ransoms from the victims to restore access.</p><p>Organizations typically focus on traditional enterprise cybersecurity threats. However, some threats are more subtle, targeting organizations on unexpected platforms. In October 2021, Secureworks Counter Threat Unit (CTU) researchers identified a phishing campaign that hijacks corporate Instagram accounts, as well as accounts of individual influencers who have a large number of followers. The threat actors then extort ransom payments from the victims. The activity continues at the time of the interview.</p><p>The research can be found here:</p><ul><li><a href="https://www.secureworks.com/blog/ransoms-demanded-for-hijacked-instagram-accounts">Ransoms Demanded for Hijacked Instagram Accounts</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1303</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9fd00170-8f78-11ec-a0ee-875d50b817d5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5755836577.mp3?updated=1685126688" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>False flags, disinformation, and cyber operations in a hybrid conflict. Log4j vulnerabilities exploited. Wiper used against Iranian television. Kraken’s evolution. CISA’s guide to free security tools.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1519/notes</link>
      <description>False flags and disinformation in Ukraine, as Western governments warn of the risk of both Russian escalation and the prospects of cyberattacks spreading beyond Ukraine’s borders. Log4j “Day-1” vulnerabilities exploited in the wild. Threat actors deployed a wiper in the course of hijacking Iranian television. The Kraken botnet is evolving, picking up an information-stealing capability. Our guest is Brittany Allen of Sift to discuss the DOJ seizing 3.6B worth of stolen crypto. Chris Novak from Verizon addresses Geopolitics and threat intelligence. And CISA launches a Catalog of Free Cybersecurity Services and Tools.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/34
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 18 Feb 2022 21:15:00 -0000</pubDate>
      <itunes:title>False flags, disinformation, and cyber operations in a hybrid conflict. Log4j vulnerabilities exploited. Wiper used against Iranian television. Kraken’s evolution. CISA’s guide to free security tools.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1519</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>False flags and disinformation in Ukraine, as Western governments warn of the risk of both Russian escalation and the prospects of cyberattacks spreading beyond Ukraine’s borders. Log4j “Day-1” vulnerabilities exploited in the wild. Threat actors deployed a wiper in the course of hijacking Iranian television. The Kraken botnet is evolving, picking up an information-stealing capability. Our guest is Brittany Allen of Sift to discuss the DOJ seizing 3.6B worth of stolen crypto. Chris Novak from Verizon addresses Geopolitics and threat intelligence. And CISA launches a Catalog of Free Cybersecurity Services and Tools.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/34
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>False flags and disinformation in Ukraine, as Western governments warn of the risk of both Russian escalation and the prospects of cyberattacks spreading beyond Ukraine’s borders. Log4j “Day-1” vulnerabilities exploited in the wild. Threat actors deployed a wiper in the course of hijacking Iranian television. The Kraken botnet is evolving, picking up an information-stealing capability. Our guest is Brittany Allen of Sift to discuss the DOJ seizing 3.6B worth of stolen crypto. Chris Novak from Verizon addresses Geopolitics and threat intelligence. And CISA launches a Catalog of Free Cybersecurity Services and Tools.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/34</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1687</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ac7cb048-7881-11ec-90a9-034f6a462fad]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8107869414.mp3?updated=1690295422" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Someone’s engaged in provocation in the Donbas. Ukraine sees a Russian influence operation in recent DDoS attacks. Ice phishing as a threat made for a decentralized web.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1518/notes</link>
      <description>Provocation may have begun in Ukraine, and no one but Russia can see any signs of a Russian withdrawal of troops to garrison. Recent DDoS attacks in Ukraine are seen as an influence operation. The compromise of International Red Cross data has been tentatively attributed to an unnamed state actor. Johannes Ullirch from SANs shares a fancy phish. Our guests are Mike Theis and Stacy Hadeka from Hogan Lovells to discuss the cyber aspects of the False Claims Act. And Microsoft describes ice phishing: social engineering for a decentralized web3.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/33
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 17 Feb 2022 21:15:00 -0000</pubDate>
      <itunes:title>Someone’s engaged in provocation in the Donbas. Ukraine sees a Russian influence operation in recent DDoS attacks. Ice phishing as a threat made for a decentralized web.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1518</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Provocation may have begun in Ukraine, and no one but Russia can see any signs of a Russian withdrawal of troops to garrison. Recent DDoS attacks in Ukraine are seen as an influence operation. The compromise of International Red Cross data has been tentatively attributed to an unnamed state actor. Johannes Ullirch from SANs shares a fancy phish. Our guests are Mike Theis and Stacy Hadeka from Hogan Lovells to discuss the cyber aspects of the False Claims Act. And Microsoft describes ice phishing: social engineering for a decentralized web3.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/33
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Provocation may have begun in Ukraine, and no one but Russia can see any signs of a Russian withdrawal of troops to garrison. Recent DDoS attacks in Ukraine are seen as an influence operation. The compromise of International Red Cross data has been tentatively attributed to an unnamed state actor. Johannes Ullirch from SANs shares a fancy phish. Our guests are Mike Theis and Stacy Hadeka from Hogan Lovells to discuss the cyber aspects of the False Claims Act. And Microsoft describes ice phishing: social engineering for a decentralized web3.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/33</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1702</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ac179320-7881-11ec-90a9-978897e74422]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1388339327.mp3?updated=1690295390" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A warning of cyberespionage targeting US cleared defense contractors. Update on the hybrid war against Ukraine. China’s favorite RAT. QR codes. Addiction to alt-coin speculation.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1517/notes</link>
      <description>US agencies warn of Russian cyberespionage against cleared defense contractors. Updates on the Russian pressure against Ukraine. ShadowPad as China’s RAT of choice. BlackCat claims to have leaked data stolen in a double-extortion ransomware attack. Follow the bouncing QR code. Dinah Davis from Arctic Wolf on Canada’s government ransomware playbook. Rick Howard chats with Bill Mann from Styra on DevSecOps. And if you’re addicted to cryptocurrency speculation, the first step in recovery is admitting you’ve got a problem. (The second step is to step away from the phone.)

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/32
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 16 Feb 2022 21:45:00 -0000</pubDate>
      <itunes:title>A warning of cyberespionage targeting US cleared defense contractors. Update on the hybrid war against Ukraine. China’s favorite RAT. QR codes. Addiction to alt-coin speculation.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1517</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>US agencies warn of Russian cyberespionage against cleared defense contractors. Updates on the Russian pressure against Ukraine. ShadowPad as China’s RAT of choice. BlackCat claims to have leaked data stolen in a double-extortion ransomware attack. Follow the bouncing QR code. Dinah Davis from Arctic Wolf on Canada’s government ransomware playbook. Rick Howard chats with Bill Mann from Styra on DevSecOps. And if you’re addicted to cryptocurrency speculation, the first step in recovery is admitting you’ve got a problem. (The second step is to step away from the phone.)

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/32
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>US agencies warn of Russian cyberespionage against cleared defense contractors. Updates on the Russian pressure against Ukraine. ShadowPad as China’s RAT of choice. BlackCat claims to have leaked data stolen in a double-extortion ransomware attack. Follow the bouncing QR code. Dinah Davis from Arctic Wolf on Canada’s government ransomware playbook. Rick Howard chats with Bill Mann from Styra on DevSecOps. And if you’re addicted to cryptocurrency speculation, the first step in recovery is admitting you’ve got a problem. (The second step is to step away from the phone.)</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/32</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1798</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[abac975a-7881-11ec-90a9-979861f49773]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2941547173.mp3?updated=1690295444" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberattacks reported in Ukraine as Russia signals a willingness to negotiate with NATO. TA2541 targets aviation and allied sectors. BlackCat’s tough to shake. Romance scams. Beamers.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1516/notes</link>
      <description>Reports of cyberattacks against Ukrainian targets as the parties to the crisis resume negotiations. The US has been forthcoming with intelligence on Russia’s ambitions in the region; those revelations form part of an influence strategy. An apparent criminal group is targeting aviation and related sectors. BlackCat ransomware victims are having difficulty recovering. Why conditions favor romance scams. Ben Yelin looks at pending cyber breach notification laws. Our guest Padraic O'Reilly from CyberSaint on the effectiveness of Biden's plan to protect the water sector. And “beamers” defraud Roblox players.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/31
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Feb 2022 21:15:00 -0000</pubDate>
      <itunes:title>Cyberattacks reported in Ukraine as Russia signals a willingness to negotiate with NATO. TA2541 targets aviation and allied sectors. BlackCat’s tough to shake. Romance scams. Beamers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1516</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Reports of cyberattacks against Ukrainian targets as the parties to the crisis resume negotiations. The US has been forthcoming with intelligence on Russia’s ambitions in the region; those revelations form part of an influence strategy. An apparent criminal group is targeting aviation and related sectors. BlackCat ransomware victims are having difficulty recovering. Why conditions favor romance scams. Ben Yelin looks at pending cyber breach notification laws. Our guest Padraic O'Reilly from CyberSaint on the effectiveness of Biden's plan to protect the water sector. And “beamers” defraud Roblox players.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/31
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Reports of cyberattacks against Ukrainian targets as the parties to the crisis resume negotiations. The US has been forthcoming with intelligence on Russia’s ambitions in the region; those revelations form part of an influence strategy. An apparent criminal group is targeting aviation and related sectors. BlackCat ransomware victims are having difficulty recovering. Why conditions favor romance scams. Ben Yelin looks at pending cyber breach notification laws. Our guest Padraic O'Reilly from CyberSaint on the effectiveness of Biden's plan to protect the water sector. And “beamers” defraud Roblox players.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/31</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1578</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ab495848-7881-11ec-90a9-bbbb9648cda3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1444098096.mp3?updated=1690295196" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hybrid war warnings over Russian designs on Ukraine. Senators ask about CIA bulk surveillance. No charges against reporter who inspected a website. Hacktivists or vigilantes?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1515/notes</link>
      <description>The US and the UK warn of the possibility of false-flag provocations as Russia keeps the pressure on Ukraine. NATO members and others issue warnings of the threat of Russian cyber operations spilling over the Ukrainian border. Two US Senators want an accounting from the CIA over an alleged bulk collection operation. No charges filed in the case of a reporter who viewed a website source. Hacktivism and vigilantism. 49ers hacked. Daniel Prince from Lancaster University on improving security in agile health IoT development. Rick Howard targets supply chain issues with the hash table. And have a careful Valentine’s Day.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/30
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 14 Feb 2022 21:15:00 -0000</pubDate>
      <itunes:title>Hybrid war warnings over Russian designs on Ukraine. Senators ask about CIA bulk surveillance. No charges against reporter who inspected a website. Hacktivists or vigilantes?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1515</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The US and the UK warn of the possibility of false-flag provocations as Russia keeps the pressure on Ukraine. NATO members and others issue warnings of the threat of Russian cyber operations spilling over the Ukrainian border. Two US Senators want an accounting from the CIA over an alleged bulk collection operation. No charges filed in the case of a reporter who viewed a website source. Hacktivism and vigilantism. 49ers hacked. Daniel Prince from Lancaster University on improving security in agile health IoT development. Rick Howard targets supply chain issues with the hash table. And have a careful Valentine’s Day.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/30
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US and the UK warn of the possibility of false-flag provocations as Russia keeps the pressure on Ukraine. NATO members and others issue warnings of the threat of Russian cyber operations spilling over the Ukrainian border. Two US Senators want an accounting from the CIA over an alleged bulk collection operation. No charges filed in the case of a reporter who viewed a website source. Hacktivism and vigilantism. 49ers hacked. Daniel Prince from Lancaster University on improving security in agile health IoT development. Rick Howard targets supply chain issues with the hash table. And have a careful Valentine’s Day.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/30</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1413</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aac5e4c2-7881-11ec-90a9-7bca93e453bf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8008839052.mp3?updated=1690295143" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Roselle Safran: So much opportunity. [Entrepreneur][Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/87/notes</link>
      <description>CEO and Founder of KeyCaliber, Roselle Safran, takes us on her circuitous career journey from startup to White House and back to startup again. With a degree in civil engineering, Roselle veered off into a more technical role at a startup and she says "caught the startup bug." After convincing a hiring manager that she could learn on the job, she transitioned to computer forensics and started on the path of cybersecurity. Roselle worked in government for the Department of Homeland Security and then to the Executive Office of the President leading all of the security operations. She jumped back into the world of startups and has stayed there. Roselle tells people interested in a career in cybersecurity to just apply. Learn as much as you can and go for it. We thank Roselle for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 13 Feb 2022 08:00:00 -0000</pubDate>
      <itunes:title>Roselle Safran: So much opportunity. [Entrepreneur][Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>87</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>CEO and Founder of KeyCaliber, Roselle Safran, takes us on her circuitous career journey from startup to White House and back to startup again.  </itunes:subtitle>
      <itunes:summary>CEO and Founder of KeyCaliber, Roselle Safran, takes us on her circuitous career journey from startup to White House and back to startup again. With a degree in civil engineering, Roselle veered off into a more technical role at a startup and she says "caught the startup bug." After convincing a hiring manager that she could learn on the job, she transitioned to computer forensics and started on the path of cybersecurity. Roselle worked in government for the Department of Homeland Security and then to the Executive Office of the President leading all of the security operations. She jumped back into the world of startups and has stayed there. Roselle tells people interested in a career in cybersecurity to just apply. Learn as much as you can and go for it. We thank Roselle for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CEO and Founder of KeyCaliber, Roselle Safran, takes us on her circuitous career journey from startup to White House and back to startup again. With a degree in civil engineering, Roselle veered off into a more technical role at a startup and she says "caught the startup bug." After convincing a hiring manager that she could learn on the job, she transitioned to computer forensics and started on the path of cybersecurity. Roselle worked in government for the Department of Homeland Security and then to the Executive Office of the President leading all of the security operations. She jumped back into the world of startups and has stayed there. Roselle tells people interested in a career in cybersecurity to just apply. Learn as much as you can and go for it. We thank Roselle for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>412</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b525b234-8a9d-11ec-b7ab-d74d2b6f7276]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6809310047.mp3?updated=1644517042" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SysJoker backdoor masquerades as benign updates. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/219/notes</link>
      <description>Guests Avigayil Mechtinger and Ryan Robinson from Intezer discuss SysJoker malware, a backdoor that targets Windows, Linux and MacOS, Malware targeting multiple operating systems has become no exception in the malware threat landscape. Vermilion Strike, which was documented just last September, is among the latest examples until now.  
In December 2021, the team at Intezer discovered a new multi-platform backdoor that targets Windows, Mac, and Linux. The Linux and Mac versions are fully undetected in VirusTotal. Intezer named this backdoor SysJoker.
SysJoker was first discovered during an active attack on a Linux-based web server of a leading educational institution. After further investigation, Intezer found that SysJoker also has Mach-O and Windows PE versions. Based on Command and Control (C2) domain registration and samples found in VirusTotal, Intezer estimates that the SysJoker attack was initiated during the second half of 2021.  
The research can be found here:
New SysJoker Backdoor Targets Windows, Linux, and macOS

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Feb 2022 08:00:00 -0000</pubDate>
      <itunes:title>SysJoker backdoor masquerades as benign updates. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>219</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guests Avigayil Mechtinger and Ryan Robinson from Intezer discuss SysJoker malware, a backdoor that targets Windows, Linux and MacOS, Malware targeting multiple operating systems has become no exception in the malware threat landscape. Vermilion Strike, which was documented just last September, is among the latest examples until now.  
In December 2021, the team at Intezer discovered a new multi-platform backdoor that targets Windows, Mac, and Linux. The Linux and Mac versions are fully undetected in VirusTotal. Intezer named this backdoor SysJoker.
SysJoker was first discovered during an active attack on a Linux-based web server of a leading educational institution. After further investigation, Intezer found that SysJoker also has Mach-O and Windows PE versions. Based on Command and Control (C2) domain registration and samples found in VirusTotal, Intezer estimates that the SysJoker attack was initiated during the second half of 2021.  
The research can be found here:
New SysJoker Backdoor Targets Windows, Linux, and macOS

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guests Avigayil Mechtinger and Ryan Robinson from Intezer discuss SysJoker malware, a backdoor that targets Windows, Linux and MacOS, Malware targeting multiple operating systems has become no exception in the malware threat landscape. <a href="https://www.intezer.com/blog/malware-analysis/vermilionstrike-reimplementation-cobaltstrike/">Vermilion Strike</a>, which was documented just last September, is among the latest examples until now.  </p><p>In December 2021, the team at Intezer discovered a new multi-platform backdoor that targets Windows, Mac, and Linux. The Linux and Mac versions are fully undetected in VirusTotal. Intezer named this backdoor SysJoker.</p><p>SysJoker was first discovered during an active attack on a Linux-based web server of a leading educational institution. After further investigation, Intezer found that SysJoker also has Mach-O and Windows PE versions. Based on Command and Control (C2) domain registration and samples found in VirusTotal, Intezer estimates that the SysJoker attack was initiated during the second half of 2021.  </p><p>The research can be found here:</p><ul><li><a href="https://www.intezer.com/blog/malware-analysis/new-backdoor-sysjoker/">New SysJoker Backdoor Targets Windows, Linux, and macOS</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>869</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2861e548-893a-11ec-8173-efec8df90c31]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2285556788.mp3?updated=1685126676" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Update on Russia’s hybrid threat to Ukraine. Vodafone Portugal continues its recovery. The FritzFrog peer-to-peer botnet is back. And there’s a new wrinkle in the old familiar Nigerian prince scam. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1514/notes</link>
      <description>Update on Russia’s hybrid threat to Ukraine, with observations on possible international spillover. Vodafone Portugal continues its recovery. The FritzFrog peer-to-peer botnet is back, and has resumed operations against government, healthcare, and education targets. Caleb Barlow warns of attacks coming from inside your network. Our guest is Tom Boltman of Kovrr on the shift in the cyber insurance market due to ransomware. And there’s a new wrinkle in the old familiar Nigerian prince scam–did you know the UN was compensating victims by sending them ATM cards? Neither did the UN.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/29
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 11 Feb 2022 21:15:00 -0000</pubDate>
      <itunes:title>Update on Russia’s hybrid threat to Ukraine. Vodafone Portugal continues its recovery. The FritzFrog peer-to-peer botnet is back. And there’s a new wrinkle in the old familiar Nigerian prince scam. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1514</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Update on Russia’s hybrid threat to Ukraine, with observations on possible international spillover. Vodafone Portugal continues its recovery. The FritzFrog peer-to-peer botnet is back, and has resumed operations against government, healthcare, and education targets. Caleb Barlow warns of attacks coming from inside your network. Our guest is Tom Boltman of Kovrr on the shift in the cyber insurance market due to ransomware. And there’s a new wrinkle in the old familiar Nigerian prince scam–did you know the UN was compensating victims by sending them ATM cards? Neither did the UN.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/29
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Update on Russia’s hybrid threat to Ukraine, with observations on possible international spillover. Vodafone Portugal continues its recovery. The FritzFrog peer-to-peer botnet is back, and has resumed operations against government, healthcare, and education targets. Caleb Barlow warns of attacks coming from inside your network. Our guest is Tom Boltman of Kovrr on the shift in the cyber insurance market due to ransomware. And there’s a new wrinkle in the old familiar Nigerian prince scam–did you know the UN was compensating victims by sending them ATM cards? Neither did the UN.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/29</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1686</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ac5b0c5e-7881-11ec-90a9-bb4cd7599105]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2605633134.mp3?updated=1690294989" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Liquidating Lviv botfarms. Notes on hybrid war. Digital frameups in India? The  Lazarus Group’s new yet familiar phishbait. Warnings about ransomware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1513/notes</link>
      <description>Ukraine takes down two botfarms pushing panic. Thoughts on hybrid warfare. Russia and China explain how we ought to see the political and online worlds. Digital frameups are reported in India. Lazarus phishes with bogus job offers. Espionage services looking for journalists’ sources. David Dufour from Webroot ponders the Metaverse. Our guest is Amanda Fennell, host of the Security Sandbox podcast. And public and private-sector warnings about ransomware.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 10 Feb 2022 22:15:00 -0000</pubDate>
      <itunes:title>Liquidating Lviv botfarms. Notes on hybrid war. Digital frameups in India? The  Lazarus Group’s new yet familiar phishbait. Warnings about ransomware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1513</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ukraine takes down two botfarms pushing panic. Thoughts on hybrid warfare. Russia and China explain how we ought to see the political and online worlds. Digital frameups are reported in India. Lazarus phishes with bogus job offers. Espionage services looking for journalists’ sources. David Dufour from Webroot ponders the Metaverse. Our guest is Amanda Fennell, host of the Security Sandbox podcast. And public and private-sector warnings about ransomware.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ukraine takes down two botfarms pushing panic. Thoughts on hybrid warfare. Russia and China explain how we ought to see the political and online worlds. Digital frameups are reported in India. Lazarus phishes with bogus job offers. Espionage services looking for journalists’ sources. David Dufour from Webroot ponders the Metaverse. Our guest is Amanda Fennell, host of the Security Sandbox podcast. And public and private-sector warnings about ransomware.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1672</itunes:duration>
      <guid isPermaLink="false"><![CDATA[ac392742-7881-11ec-90a9-b75731061209]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1029357892.mp3?updated=1690294974" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A Foreign Office hack is disclosed (but that’s it). Preparing for a cyber escalation in the hybrid war Russia’s waging against Ukraine. Multi-cloud threats. Patch Tuesday notes. Razzlekhan raps.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1512/notes</link>
      <description>Britain’s Foreign Office sustained a cyberattack last month (the details are secret). Poland stands up a Cyber Defense Force as Europe and North America raise their level of cyber readiness. Negotiations over the Russian pressure on Ukraine are likely to be protracted. Threats to multi-cloud environments. Patch Tuesday notes. Dinah Davis from Arctic Wolf on keeping kids safe online. Carole Theriault examines Mozilla’s Privacy Not Included campaign. And Razzlekhan rocks the mic with her mad skillz, or used to, anyway.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/27
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 09 Feb 2022 21:15:00 -0000</pubDate>
      <itunes:title>A Foreign Office hack is disclosed (but that’s it). Preparing for a cyber escalation in the hybrid war Russia’s waging against Ukraine. Multi-cloud threats. Patch Tuesday notes. Razzlekhan raps.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1512</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Britain’s Foreign Office sustained a cyberattack last month (the details are secret). Poland stands up a Cyber Defense Force as Europe and North America raise their level of cyber readiness. Negotiations over the Russian pressure on Ukraine are likely to be protracted. Threats to multi-cloud environments. Patch Tuesday notes. Dinah Davis from Arctic Wolf on keeping kids safe online. Carole Theriault examines Mozilla’s Privacy Not Included campaign. And Razzlekhan rocks the mic with her mad skillz, or used to, anyway.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/27
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Britain’s Foreign Office sustained a cyberattack last month (the details are secret). Poland stands up a Cyber Defense Force as Europe and North America raise their level of cyber readiness. Negotiations over the Russian pressure on Ukraine are likely to be protracted. Threats to multi-cloud environments. Patch Tuesday notes. Dinah Davis from Arctic Wolf on keeping kids safe online. Carole Theriault examines Mozilla’s Privacy Not Included campaign. And Razzlekhan rocks the mic with her mad skillz, or used to, anyway.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/27</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1578</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ab8b5644-7881-11ec-90a9-0f89f2a0d1ff]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1474558117.mp3?updated=1690295012" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Crowdfunding hacktivists and other irregulars. The Molerats have some new tools. Right-to-left override. Arrests in a cryptocurrency money-laundering case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1511/notes</link>
      <description>Diplomacy continues over the Russian threat to Ukraine. In the meantime, hacktivists and others are said to be receiving crowdfunding through alt-coin remittances. The Molerats are back, and they have some new tools. Right-to-left override is being seen again in the wild. Vodafone Portugal is taken offline by a cyberattack. Joe Carrigan on Meta’s ten billion dollar privacy hit. Our guest is Greg Otto from Intel 471 to discuss shifts in ransomware strains. And two arrests are made in a money-laundering case connected with the Bitfinex hack.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/26
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Feb 2022 22:00:00 -0000</pubDate>
      <itunes:title>Crowdfunding hacktivists and other irregulars. The Molerats have some new tools. Right-to-left override. Arrests in a cryptocurrency money-laundering case.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1511</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Diplomacy continues over the Russian threat to Ukraine. In the meantime, hacktivists and others are said to be receiving crowdfunding through alt-coin remittances. The Molerats are back, and they have some new tools. Right-to-left override is being seen again in the wild. Vodafone Portugal is taken offline by a cyberattack. Joe Carrigan on Meta’s ten billion dollar privacy hit. Our guest is Greg Otto from Intel 471 to discuss shifts in ransomware strains. And two arrests are made in a money-laundering case connected with the Bitfinex hack.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/26
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Diplomacy continues over the Russian threat to Ukraine. In the meantime, hacktivists and others are said to be receiving crowdfunding through alt-coin remittances. The Molerats are back, and they have some new tools. Right-to-left override is being seen again in the wild. Vodafone Portugal is taken offline by a cyberattack. Joe Carrigan on Meta’s ten billion dollar privacy hit. Our guest is Greg Otto from Intel 471 to discuss shifts in ransomware strains. And two arrests are made in a money-laundering case connected with the Bitfinex hack.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/26</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1619</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ab6a1fce-7881-11ec-90a9-7baaea082657]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9543995803.mp3?updated=1690295011" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russia’s hybrid war against Ukraine is currently heavier on the cyber than it is on the kinetic. BlackCat’s connection with DarkSide. An alert on LockBit. And six Indian call centers indicted. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1510/notes</link>
      <description>The FSB is active against Ukrainian targets as NATO continues to work out the cybersecurity assistance it will provide Kyiv. BlackCat is found to be connected to the DarkSide gang, either as a superseding affiliate or as a simple rebranding of the same old crew. The FBI issues an alert about LockBit. Kevin Magee from Microsoft on their final report on Nobellium and the Solar Winds attack. Rick Howard steers the hash table toward supply chains. And the US has indicted six call centers in India on charges related to some familiar scams.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/25
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 07 Feb 2022 22:00:00 -0000</pubDate>
      <itunes:title>Russia’s hybrid war against Ukraine is currently heavier on the cyber than it is on the kinetic. BlackCat’s connection with DarkSide. An alert on LockBit. And six Indian call centers indicted. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1510</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The FSB is active against Ukrainian targets as NATO continues to work out the cybersecurity assistance it will provide Kyiv. BlackCat is found to be connected to the DarkSide gang, either as a superseding affiliate or as a simple rebranding of the same old crew. The FBI issues an alert about LockBit. Kevin Magee from Microsoft on their final report on Nobellium and the Solar Winds attack. Rick Howard steers the hash table toward supply chains. And the US has indicted six call centers in India on charges related to some familiar scams.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/25
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FSB is active against Ukrainian targets as NATO continues to work out the cybersecurity assistance it will provide Kyiv. BlackCat is found to be connected to the DarkSide gang, either as a superseding affiliate or as a simple rebranding of the same old crew. The FBI issues an alert about LockBit. Kevin Magee from Microsoft on their final report on Nobellium and the Solar Winds attack. Rick Howard steers the hash table toward supply chains. And the US has indicted six call centers in India on charges related to some familiar scams.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/25</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1579</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aaa50dec-7881-11ec-90a9-0b72fdfe10d3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4390928785.mp3?updated=1690294976" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The persistent and patient nature of advanced threat actors. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/218/notes</link>
      <description>Guest Danny Adamitis from Black Lotus Labs joins Dave to discuss their team's new research "New Konni Campaign Kicks the New Year Off by Targeting Russian Ministry of Foreign Affairs." Black Lotus Labs, the threat research team of Lumen Technologies, uncovered a series of targeted actions against the Russian Federation’s Ministry of Foreign Affairs (MID). Based upon the totality of information available and the close correlation with prior reporting, we assess with moderate confidence these actions leveraged the Konni malware, which has previously been associated with the Democratic People’s Republic of Korea, and were undertaken to establish access to the MID network for the purpose of espionage. This activity cluster demonstrates the patient and persistent nature of advanced actors in waging multi-phased campaigns against perceived high-value networks. After gaining access through stolen credentials, the actor was able to exploit trusted connections to distribute and load the malware, first by impersonating a government software program coinciding with new Covid mandates, and then through sending trojanized files from a compromised account.
The research can be found here:
New Konni Campaign Kicks Off The New Year By Targeting Russian Ministry Of Foreign Affairs

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Feb 2022 08:00:00 -0000</pubDate>
      <itunes:title>The persistent and patient nature of advanced threat actors. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>218</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Danny Adamitis from Black Lotus Labs joins Dave to discuss their team's new research "New Konni Campaign Kicks the New Year Off by Targeting Russian Ministry of Foreign Affairs." Black Lotus Labs, the threat research team of Lumen Technologies, uncovered a series of targeted actions against the Russian Federation’s Ministry of Foreign Affairs (MID). Based upon the totality of information available and the close correlation with prior reporting, we assess with moderate confidence these actions leveraged the Konni malware, which has previously been associated with the Democratic People’s Republic of Korea, and were undertaken to establish access to the MID network for the purpose of espionage. This activity cluster demonstrates the patient and persistent nature of advanced actors in waging multi-phased campaigns against perceived high-value networks. After gaining access through stolen credentials, the actor was able to exploit trusted connections to distribute and load the malware, first by impersonating a government software program coinciding with new Covid mandates, and then through sending trojanized files from a compromised account.
The research can be found here:
New Konni Campaign Kicks Off The New Year By Targeting Russian Ministry Of Foreign Affairs

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Danny Adamitis from Black Lotus Labs joins Dave to discuss their team's new research "New Konni Campaign Kicks the New Year Off by Targeting Russian Ministry of Foreign Affairs." Black Lotus Labs, the threat research team of Lumen Technologies, uncovered a series of targeted actions against the Russian Federation’s Ministry of Foreign Affairs (MID). Based upon the totality of information available and the close correlation with prior reporting, we assess with moderate confidence these actions leveraged the Konni malware, which has previously been associated <a href="https://malpedia.caad.fkie.fraunhofer.de/details/win.konni">with the Democratic People’s Republic of Korea</a>, and were undertaken to establish access to the MID network for the purpose of espionage. This activity cluster demonstrates the patient and persistent nature of advanced actors in waging multi-phased campaigns against perceived high-value networks. After gaining access through stolen credentials, the actor was able to exploit trusted connections to distribute and load the malware, first by impersonating a government software program coinciding with new Covid mandates, and then through sending trojanized files from a compromised account.</p><p>The research can be found here:</p><ul><li><a href="https://blog.lumen.com/new-konni-campaign-targeting-russian-ministry-of-foreign-affairs/">New Konni Campaign Kicks Off The New Year By Targeting Russian Ministry Of Foreign Affairs</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1121</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[31132f96-83c5-11ec-b8c3-d36186bef233]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8866503480.mp3?updated=1685126668" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Update on Russian cyber ops and disinformation around Ukraine. Ransomware disrupts European ports. Chinese intelligence services exploit a Zimbra zero-day.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1509/notes</link>
      <description>Primitive Bear is snuffling around Ukraine, and Russia may be preparing deepfake video to lend legitimacy to its claims with respect to its neighbor. European ports and other logistical installations are under attack by ransomware, apparently uncoordinated criminal activity. Daniel Prince from Lancaster University on safeguarding IoT in Healthcare. Our guest is Chris Wysopal of Veracode with research on increases in automation and componentization in software development. And a Chinese APT is said to be exploiting a Zimbra webmail cross-site-scripting zero-day, so users beware.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/24
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 04 Feb 2022 21:15:00 -0000</pubDate>
      <itunes:title>Update on Russian cyber ops and disinformation around Ukraine. Ransomware disrupts European ports. Chinese intelligence services exploit a Zimbra zero-day.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1509</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Primitive Bear is snuffling around Ukraine, and Russia may be preparing deepfake video to lend legitimacy to its claims with respect to its neighbor. European ports and other logistical installations are under attack by ransomware, apparently uncoordinated criminal activity. Daniel Prince from Lancaster University on safeguarding IoT in Healthcare. Our guest is Chris Wysopal of Veracode with research on increases in automation and componentization in software development. And a Chinese APT is said to be exploiting a Zimbra webmail cross-site-scripting zero-day, so users beware.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/24
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Primitive Bear is snuffling around Ukraine, and Russia may be preparing deepfake video to lend legitimacy to its claims with respect to its neighbor. European ports and other logistical installations are under attack by ransomware, apparently uncoordinated criminal activity. Daniel Prince from Lancaster University on safeguarding IoT in Healthcare. Our guest is Chris Wysopal of Veracode with research on increases in automation and componentization in software development. And a Chinese APT is said to be exploiting a Zimbra webmail cross-site-scripting zero-day, so users beware.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/24</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1618</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aa8447b0-7881-11ec-90a9-7b1dd87f318f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7920873513.mp3?updated=1690294975" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ukraine goes to a higher state of cyber alert. Chinese cyberespionage hits financial services in Taiwan. Arid Viper is back, and so is Adalat Ali. BlackCat disrupts fuel distro in Germany. Hacking the DPRK.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1508/notes</link>
      <description>Ukraine and NATO increase their cyber readiness. Chinese cyberespionage has been looking closely at financial services in Taiwan. Hacktivists hit Iranian state television. Arid Viper is phishing for targets in the Palestinian Territories, and apparently doesn’t care who knows it. BlackCat ransomware implicated in attacks on German fuel distribution firms. Verizon’s Chris Novak shares his thoughts on the cyber talent pool. Our guest is Torin Sandall from Styra on Open Policy Agent. And, Bro, treat yourself to a pair of Vans.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/23
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 03 Feb 2022 21:15:00 -0000</pubDate>
      <itunes:title>Ukraine goes to a higher state of cyber alert. Chinese cyberespionage hits financial services in Taiwan. Arid Viper is back, and so is Adalat Ali. BlackCat disrupts fuel distro in Germany. Hacking the DPRK.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1508</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ukraine and NATO increase their cyber readiness. Chinese cyberespionage has been looking closely at financial services in Taiwan. Hacktivists hit Iranian state television. Arid Viper is phishing for targets in the Palestinian Territories, and apparently doesn’t care who knows it. BlackCat ransomware implicated in attacks on German fuel distribution firms. Verizon’s Chris Novak shares his thoughts on the cyber talent pool. Our guest is Torin Sandall from Styra on Open Policy Agent. And, Bro, treat yourself to a pair of Vans.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/23
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ukraine and NATO increase their cyber readiness. Chinese cyberespionage has been looking closely at financial services in Taiwan. Hacktivists hit Iranian state television. Arid Viper is phishing for targets in the Palestinian Territories, and apparently doesn’t care who knows it. BlackCat ransomware implicated in attacks on German fuel distribution firms. Verizon’s Chris Novak shares his thoughts on the cyber talent pool. Our guest is Torin Sandall from Styra on Open Policy Agent. And, Bro, treat yourself to a pair of Vans.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/23</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1722</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aa634434-7881-11ec-90a9-63ab884ec28e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5713510334.mp3?updated=1690294886" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Both sides in the conflict over Ukraine are talking with their allies and preparing for conflict in cyberspace. A cyberattack disrupts gasoline distribution in Germany.  Notes on APTs and privateers.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1507/notes</link>
      <description>Tensions between Russia and Ukraine, and between Russia and NATO, remain high as diplomacy is at a temporary impasse: both sides have stated their incompatible positions and are consulting with their allies. NATO prepares to render cyber assistance to Ukraine. An unspecified cyberattack affects gasoline distribution in Germany. The White Tur threat group borrows heavily from several APTs, but itself remains mysterious. Charming Kitten gets some new claws. Caleb Barlow on Harvard’s analysis of Equifax. Our guest is Gunter Ollmann from Devo discussing their third annual SOC Performance Report. And the Trickbot gang seems to be privateering in that old familiar way.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/22
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 02 Feb 2022 21:15:00 -0000</pubDate>
      <itunes:title>Both sides in the conflict over Ukraine are talking with their allies and preparing for conflict in cyberspace. A cyberattack disrupts gasoline distribution in Germany.  Notes on APTs and privateers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1507</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Tensions between Russia and Ukraine, and between Russia and NATO, remain high as diplomacy is at a temporary impasse: both sides have stated their incompatible positions and are consulting with their allies. NATO prepares to render cyber assistance to Ukraine. An unspecified cyberattack affects gasoline distribution in Germany. The White Tur threat group borrows heavily from several APTs, but itself remains mysterious. Charming Kitten gets some new claws. Caleb Barlow on Harvard’s analysis of Equifax. Our guest is Gunter Ollmann from Devo discussing their third annual SOC Performance Report. And the Trickbot gang seems to be privateering in that old familiar way.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/22
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tensions between Russia and Ukraine, and between Russia and NATO, remain high as diplomacy is at a temporary impasse: both sides have stated their incompatible positions and are consulting with their allies. NATO prepares to render cyber assistance to Ukraine. An unspecified cyberattack affects gasoline distribution in Germany. The White Tur threat group borrows heavily from several APTs, but itself remains mysterious. Charming Kitten gets some new claws. Caleb Barlow on Harvard’s analysis of Equifax. Our guest is Gunter Ollmann from Devo discussing their third annual SOC Performance Report. And the Trickbot gang seems to be privateering in that old familiar way.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/22</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1577</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aa41fab8-7881-11ec-90a9-27ec1ccd11c5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7010903255.mp3?updated=1690294870" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Updates on the crisis over Ukraine, as Russian cyber operations continue. Ransomware threatens OT. Ramnit remains a leading banking Trojan. Bots infesting some NFT markets. Agencies advise opsec.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1506/notes</link>
      <description>No progress so far in talks over the Ukraine crisis, as Moscow’s diplomacy and influence operations merge in a narrative of a Russia beset by armed Nazis, goaded on by a greedy America that doesn’t want Russia competing in world markets. Ransomware and cyberthreats to OT systems. Ramnit is still up and at em in the banking Trojan world. Bots are following big brands in NFT markets, with predictable effects. Ben Yelin has an update on NSO Groups’s marketing attempts to the FBI. An introduction to Dr. Andrew Hammond and the SpyCast podcast. And sending that sample in for your doctor? Bro, buy locally.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/21
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Feb 2022 21:15:00 -0000</pubDate>
      <itunes:title>Updates on the crisis over Ukraine, as Russian cyber operations continue. Ransomware threatens OT. Ramnit remains a leading banking Trojan. Bots infesting some NFT markets. Agencies advise opsec.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1506</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>No progress so far in talks over the Ukraine crisis, as Moscow’s diplomacy and influence operations merge in a narrative of a Russia beset by armed Nazis, goaded on by a greedy America that doesn’t want Russia competing in world markets. Ransomware and cyberthreats to OT systems. Ramnit is still up and at em in the banking Trojan world. Bots are following big brands in NFT markets, with predictable effects. Ben Yelin has an update on NSO Groups’s marketing attempts to the FBI. An introduction to Dr. Andrew Hammond and the SpyCast podcast. And sending that sample in for your doctor? Bro, buy locally.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/21
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>No progress so far in talks over the Ukraine crisis, as Moscow’s diplomacy and influence operations merge in a narrative of a Russia beset by armed Nazis, goaded on by a greedy America that doesn’t want Russia competing in world markets. Ransomware and cyberthreats to OT systems. Ramnit is still up and at em in the banking Trojan world. Bots are following big brands in NFT markets, with predictable effects. Ben Yelin has an update on NSO Groups’s marketing attempts to the FBI. An introduction to Dr. Andrew Hammond and the SpyCast podcast. And sending that sample in for your doctor? Bro, buy locally.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/21</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1830</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aa20c316-7881-11ec-90a9-4ffdf36b3b2c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1264049117.mp3?updated=1690294858" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The UN Security Council will take up Russia’s hybrid war against Ukraine as Western powers prepare sanctions. Other ransomware and social engineering campaigns.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1505/notes</link>
      <description>The US takes Russia to the UN Security Council over its threat to Ukraine, and, while Russian forces remain in assembly areas, a campaign of cyberattack and influence operations continues. Western powers, notably the UK and the US, are preparing sanctions against Russia. Elsewhere, ongoing ransomware and social engineering. Dinah Davis from Arctic Wolf on Linux malware via IoT devices. Rick Howard shares his favorite sources for keeping up to date. And there’s a pair of decisions in a long-running case involving HP Enterprise’s purchase of Autonomy.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/20
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 31 Jan 2022 21:15:00 -0000</pubDate>
      <itunes:title>The UN Security Council will take up Russia’s hybrid war against Ukraine as Western powers prepare sanctions. Other ransomware and social engineering campaigns.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1505</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The US takes Russia to the UN Security Council over its threat to Ukraine, and, while Russian forces remain in assembly areas, a campaign of cyberattack and influence operations continues. Western powers, notably the UK and the US, are preparing sanctions against Russia. Elsewhere, ongoing ransomware and social engineering. Dinah Davis from Arctic Wolf on Linux malware via IoT devices. Rick Howard shares his favorite sources for keeping up to date. And there’s a pair of decisions in a long-running case involving HP Enterprise’s purchase of Autonomy.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/20
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US takes Russia to the UN Security Council over its threat to Ukraine, and, while Russian forces remain in assembly areas, a campaign of cyberattack and influence operations continues. Western powers, notably the UK and the US, are preparing sanctions against Russia. Elsewhere, ongoing ransomware and social engineering. Dinah Davis from Arctic Wolf on Linux malware via IoT devices. Rick Howard shares his favorite sources for keeping up to date. And there’s a pair of decisions in a long-running case involving HP Enterprise’s purchase of Autonomy.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/20</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1650</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a8f93f86-7881-11ec-90a9-57708eee2d22]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5118121062.mp3?updated=1690294967" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Helen Patton: A platform to talk about security. [CISO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/85/notes</link>
      <description>Advisory CISO at Cisco, Helen Patton, shares that a combination of dumb luck, hard work and serendipity that got her to where she is today. Growing up in the country in Australia, Helen notes that computers were not really a thing. She happened into technology after moving to the US, as she was the only person in her office under 40. Of course she would be comfortable with computers and able to handle a database conversion, right? That launched her into a career that spanned supporting small nonprofits, working at one of the biggest banks on Wall Street while leading a global team, being the CISO of a major university, and now Advisory CISO at Cisco. Helen recently wrote a book, "Navigating the Cybersecurity Career Path," to help others know when it's time to move on from one role to another role as part of desire to give back to the community. We thank Helen for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 30 Jan 2022 08:00:00 -0000</pubDate>
      <itunes:title>Helen Patton: A platform to talk about security. [CISO] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>85</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Advisory CISO at Cisco, Helen Patton, shares that a combination of dumb luck, hard work and serendipity got her to where she is today. </itunes:subtitle>
      <itunes:summary>Advisory CISO at Cisco, Helen Patton, shares that a combination of dumb luck, hard work and serendipity that got her to where she is today. Growing up in the country in Australia, Helen notes that computers were not really a thing. She happened into technology after moving to the US, as she was the only person in her office under 40. Of course she would be comfortable with computers and able to handle a database conversion, right? That launched her into a career that spanned supporting small nonprofits, working at one of the biggest banks on Wall Street while leading a global team, being the CISO of a major university, and now Advisory CISO at Cisco. Helen recently wrote a book, "Navigating the Cybersecurity Career Path," to help others know when it's time to move on from one role to another role as part of desire to give back to the community. We thank Helen for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Advisory CISO at Cisco, Helen Patton, shares that a combination of dumb luck, hard work and serendipity that got her to where she is today. Growing up in the country in Australia, Helen notes that computers were not really a thing. She happened into technology after moving to the US, as she was the only person in her office under 40. Of course she would be comfortable with computers and able to handle a database conversion, right? That launched her into a career that spanned supporting small nonprofits, working at one of the biggest banks on Wall Street while leading a global team, being the CISO of a major university, and now Advisory CISO at Cisco. Helen recently wrote a book, "Navigating the Cybersecurity Career Path," to help others know when it's time to move on from one role to another role as part of desire to give back to the community. We thank Helen for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>540</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[68922cc8-8065-11ec-aa1b-8b41c8008ad3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9860111291.mp3?updated=1643393112" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Zero Trust for cloud assets: Identity authentication and authorization. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/24/notes</link>
      <description>Applying Zero Trust principles to access rights can be tricky given the volume and dynamic nature of services in the cloud. Serverless computer services, like AWS Lambda, multiply the volume of identities to manage. These cloud services often have excessive permissions to access sensitive data and can become a potential entry point for an attacker to exploit.
The CyberWire's Rick Howard speaks with Scott Farber, Principal Cyber Architect &amp; Zero Trust Technical Lead at MITRE about the topic. Show Sponsor Sysdig's Vice President of Security Product Management, Maor Goldberg, brings experience with data center and cloud to a discussion with CyberWire-X on the considerations for managing access rights in this hybrid world. They consider the pros and cons of different approaches to enforcing least privilege in the cloud.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 30 Jan 2022 06:00:00 -0000</pubDate>
      <itunes:title>Zero Trust for cloud assets: Identity authentication and authorization. [CyberWire-X]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>24</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Applying Zero Trust principles to access rights can be tricky given the volume and dynamic nature of services in the cloud. Serverless computer services, like AWS Lambda, multiply the volume of identities to manage. These cloud services often have excessive permissions to access sensitive data and can become a potential entry point for an attacker to exploit.
The CyberWire's Rick Howard speaks with Scott Farber, Principal Cyber Architect &amp; Zero Trust Technical Lead at MITRE about the topic. Show Sponsor Sysdig's Vice President of Security Product Management, Maor Goldberg, brings experience with data center and cloud to a discussion with CyberWire-X on the considerations for managing access rights in this hybrid world. They consider the pros and cons of different approaches to enforcing least privilege in the cloud.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Applying Zero Trust principles to access rights can be tricky given the volume and dynamic nature of services in the cloud. Serverless computer services, like AWS Lambda, multiply the volume of identities to manage. These cloud services often have excessive permissions to access sensitive data and can become a potential entry point for an attacker to exploit.</p><p>The CyberWire's Rick Howard speaks with Scott Farber, Principal Cyber Architect &amp; Zero Trust Technical Lead at MITRE about the topic. Show Sponsor Sysdig's Vice President of Security Product Management, Maor Goldberg, brings experience with data center and cloud to a discussion with CyberWire-X on the considerations for managing access rights in this hybrid world. They consider the pros and cons of different approaches to enforcing least privilege in the cloud.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2055</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2f3111fa-7eb8-11ec-9d29-6b061079dc46]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9819825284.mp3?updated=1643207540" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Use of legitimate tools possibly linked to Seedworm. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/217/notes</link>
      <description>Guest Sylvester Segura from the Symantec Threat Hunter Team joins Dave to discuss their team's work on "Espionage Campaign Targets Telecoms Organizations across Middle East and Asia." Attackers most likely linked to Iran have attacked a string of telecoms operators in the Middle East and Asia over the past six months, in addition to a number of IT services organizations and a utility company.
Organizations in Israel, Jordan, Kuwait, Saudi Arabia, the United Arab Emirates, Pakistan, Thailand, and Laos were targeted in the campaign, which appears to have made no use of custom malware and instead relied on a mixture of legitimate tools, publicly available malware, and living-off-the-land tactics. While the identity of the attackers remains unconfirmed, there is some evidence to suggest a link to the Iranian Seedworm (aka MuddyWater) group. The targeting and tactics are consistent with Iranian-sponsored actors.
The research can be found here:
Espionage Campaign Targets Telecoms Organizations across Middle East and Asia

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 Jan 2022 08:00:00 -0000</pubDate>
      <itunes:title>Use of legitimate tools possibly linked to Seedworm. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>217</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Sylvester Segura from the Symantec Threat Hunter Team joins Dave to discuss their team's work on "Espionage Campaign Targets Telecoms Organizations across Middle East and Asia." Attackers most likely linked to Iran have attacked a string of telecoms operators in the Middle East and Asia over the past six months, in addition to a number of IT services organizations and a utility company.
Organizations in Israel, Jordan, Kuwait, Saudi Arabia, the United Arab Emirates, Pakistan, Thailand, and Laos were targeted in the campaign, which appears to have made no use of custom malware and instead relied on a mixture of legitimate tools, publicly available malware, and living-off-the-land tactics. While the identity of the attackers remains unconfirmed, there is some evidence to suggest a link to the Iranian Seedworm (aka MuddyWater) group. The targeting and tactics are consistent with Iranian-sponsored actors.
The research can be found here:
Espionage Campaign Targets Telecoms Organizations across Middle East and Asia

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Sylvester Segura from the Symantec Threat Hunter Team joins Dave to discuss their team's work on "Espionage Campaign Targets Telecoms Organizations across Middle East and Asia." Attackers most likely linked to Iran have attacked a string of telecoms operators in the Middle East and Asia over the past six months, in addition to a number of IT services organizations and a utility company.</p><p>Organizations in Israel, Jordan, Kuwait, Saudi Arabia, the United Arab Emirates, Pakistan, Thailand, and Laos were targeted in the campaign, which appears to have made no use of custom malware and instead relied on a mixture of legitimate tools, publicly available malware, and living-off-the-land tactics. While the identity of the attackers remains unconfirmed, there is some evidence to suggest a link to the Iranian Seedworm (aka MuddyWater) group. The targeting and tactics are consistent with Iranian-sponsored actors.</p><p>The research can be found here:</p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/espionage-campaign-telecoms-asia-middle-east">Espionage Campaign Targets Telecoms Organizations across Middle East and Asia</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>898</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bdcc6c1a-7e37-11ec-9a45-3b935c4a6592]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9367383786.mp3?updated=1685126657" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Diplomacy and cyber warnings in the Ukraine crisis. REvil may not actually be out of business. A warning about Iranian state-directed hacking. And Data Privacy Day is observed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1504/notes</link>
      <description>Diplomatic channels remain open even as NATO and the US reject Russian demands over Ukraine. More warnings over Russian cyber operations in the hybrid conflict (Voodoo Bear is mentioned in dispatches). Social media as a source of tactical intelligence. The FBI tells industry to be alert for Iranian hacking. Ransomware continues to circulate. Josh Ray from Accenture digs into the Bassterlord Networking Manual. Carole Theriault examines a university data backup snafu. And a happy Data Privacy Day to all.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/19
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 28 Jan 2022 21:15:00 -0000</pubDate>
      <itunes:title>Diplomacy and cyber warnings in the Ukraine crisis. REvil may not actually be out of business. A warning about Iranian state-directed hacking. And Data Privacy Day is observed.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1504</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Diplomatic channels remain open even as NATO and the US reject Russian demands over Ukraine. More warnings over Russian cyber operations in the hybrid conflict (Voodoo Bear is mentioned in dispatches). Social media as a source of tactical intelligence. The FBI tells industry to be alert for Iranian hacking. Ransomware continues to circulate. Josh Ray from Accenture digs into the Bassterlord Networking Manual. Carole Theriault examines a university data backup snafu. And a happy Data Privacy Day to all.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/19
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Diplomatic channels remain open even as NATO and the US reject Russian demands over Ukraine. More warnings over Russian cyber operations in the hybrid conflict (Voodoo Bear is mentioned in dispatches). Social media as a source of tactical intelligence. The FBI tells industry to be alert for Iranian hacking. Ransomware continues to circulate. Josh Ray from Accenture digs into the Bassterlord Networking Manual. Carole Theriault examines a university data backup snafu. And a happy Data Privacy Day to all.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/19</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1650</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a9decbd2-7881-11ec-90a9-87a63674c46e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8177656430.mp3?updated=1690293950" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Updates on the hybrid war in Ukraine. Industrial espionage in Germany, conventional espionage in Western Asia. C2C markets, social engineering, and scamware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1502/notes</link>
      <description>Cyber risk continues over Ukraine as the US and NATO reject Russian demands. Emissary Panda’s industrial espionage against German industry. Fancy Bear is spotted in Western Asia. The C2C market’s initial access broker Prophet Spider is selling access to unpatched VMware Horizon instances. Social engineering adapts to its marks. Thomas Etheridge from CrowdStrike on the power of Identity/Zero Trust in stopping ransomware attacks. Our guest is Gary Guseinov of Real Defense to discuss M&amp;A activity. And Dark Herring scamware is ejected from app stores, but not before hitting over a hundred million victims.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/18
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 27 Jan 2022 21:15:00 -0000</pubDate>
      <itunes:title>Updates on the hybrid war in Ukraine. Industrial espionage in Germany, conventional espionage in Western Asia. C2C markets, social engineering, and scamware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1502</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cyber risk continues over Ukraine as the US and NATO reject Russian demands. Emissary Panda’s industrial espionage against German industry. Fancy Bear is spotted in Western Asia. The C2C market’s initial access broker Prophet Spider is selling access to unpatched VMware Horizon instances. Social engineering adapts to its marks. Thomas Etheridge from CrowdStrike on the power of Identity/Zero Trust in stopping ransomware attacks. Our guest is Gary Guseinov of Real Defense to discuss M&amp;A activity. And Dark Herring scamware is ejected from app stores, but not before hitting over a hundred million victims.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/18
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber risk continues over Ukraine as the US and NATO reject Russian demands. Emissary Panda’s industrial espionage against German industry. Fancy Bear is spotted in Western Asia. The C2C market’s initial access broker Prophet Spider is selling access to unpatched VMware Horizon instances. Social engineering adapts to its marks. Thomas Etheridge from CrowdStrike on the power of Identity/Zero Trust in stopping ransomware attacks. Our guest is Gary Guseinov of Real Defense to discuss M&amp;A activity. And Dark Herring scamware is ejected from app stores, but not before hitting over a hundred million victims.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/18</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1447</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a9bdbd52-7881-11ec-90a9-e3c2efa40fe5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4146698364.mp3?updated=1690293926" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tensions between Russia and Ukraine remain high as NATO offers Ukraine cyber, diplomatic, and other support. DDoS in the DPRK. DazzleSpy in the watering hole. TrickBot ups its game. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1502/notes</link>
      <description>Tensions between Russia and Ukraine remain high as NATO offers Ukraine cyber, diplomatic, and other support. North Korea gets DDoSed. DazzleSpy hits Hong Kong dissidents drawn to a watering hole. TrickBot ups its game. A quick look at ransomware trends. Microsoft’s Kevin Magee unpacks a recent World Economic Forum report. Our own Rick Howard speaks with Chriss Knisley from MITRE ATT&amp;CK Defender on certifications. And Dame Fortune teaches Michiganders to throw caution to the winds.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/17
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 26 Jan 2022 21:15:00 -0000</pubDate>
      <itunes:title>Tensions between Russia and Ukraine remain high as NATO offers Ukraine cyber, diplomatic, and other support. DDoS in the DPRK. DazzleSpy in the watering hole. TrickBot ups its game. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1502</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Tensions between Russia and Ukraine remain high as NATO offers Ukraine cyber, diplomatic, and other support. North Korea gets DDoSed. DazzleSpy hits Hong Kong dissidents drawn to a watering hole. TrickBot ups its game. A quick look at ransomware trends. Microsoft’s Kevin Magee unpacks a recent World Economic Forum report. Our own Rick Howard speaks with Chriss Knisley from MITRE ATT&amp;CK Defender on certifications. And Dame Fortune teaches Michiganders to throw caution to the winds.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/17
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tensions between Russia and Ukraine remain high as NATO offers Ukraine cyber, diplomatic, and other support. North Korea gets DDoSed. DazzleSpy hits Hong Kong dissidents drawn to a watering hole. TrickBot ups its game. A quick look at ransomware trends. Microsoft’s Kevin Magee unpacks a recent World Economic Forum report. Our own Rick Howard speaks with Chriss Knisley from MITRE ATT&amp;CK Defender on certifications. And Dame Fortune teaches Michiganders to throw caution to the winds.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/17</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1659</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a97c44bc-7881-11ec-90a9-4b0130948582]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9602191766.mp3?updated=1690293486" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacktivism as irregular operations-short-of-war. A banking Trojan aims at fraudulent wire transfers. DTPacker’s two-step delivery. REvil re-forms? Ransomware and insider threats. DDoS in Andorra.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1501/notes</link>
      <description>Tensions remain high as Russia assembles troops near Ukraine and NATO moves to higher states of readiness. The Belarusian Cyber Partisans claim responsibility for a ransomware attack against Belarusian railroads. The BRATA banking Trojan spreads, as does DTPacker malware. REvil alumni may be getting the band back together. Ransomware operators working harder to recruit insiders at their targets. Joe Carrigan has the story of a romance scammer in custody. Mr. Security Answer Person John Pescatore has thoughts on BYOD. And there’s a major DDoS campaign shutting down the Internet in Andorra.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/16
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Jan 2022 21:15:00 -0000</pubDate>
      <itunes:title>Hacktivism as irregular operations-short-of-war. A banking Trojan aims at fraudulent wire transfers. DTPacker’s two-step delivery. REvil re-forms? Ransomware and insider threats. DDoS in Andorra.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1501</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Tensions remain high as Russia assembles troops near Ukraine and NATO moves to higher states of readiness. The Belarusian Cyber Partisans claim responsibility for a ransomware attack against Belarusian railroads. The BRATA banking Trojan spreads, as does DTPacker malware. REvil alumni may be getting the band back together. Ransomware operators working harder to recruit insiders at their targets. Joe Carrigan has the story of a romance scammer in custody. Mr. Security Answer Person John Pescatore has thoughts on BYOD. And there’s a major DDoS campaign shutting down the Internet in Andorra.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/16
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tensions remain high as Russia assembles troops near Ukraine and NATO moves to higher states of readiness. The Belarusian Cyber Partisans claim responsibility for a ransomware attack against Belarusian railroads. The BRATA banking Trojan spreads, as does DTPacker malware. REvil alumni may be getting the band back together. Ransomware operators working harder to recruit insiders at their targets. Joe Carrigan has the story of a romance scammer in custody. Mr. Security Answer Person John Pescatore has thoughts on BYOD. And there’s a major DDoS campaign shutting down the Internet in Andorra.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/16</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1909</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a93add9c-7881-11ec-90a9-53cdf10d30e6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9277365978.mp3?updated=1690293477" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Updates on the continuing hybrid war in Ukraine. Julian Assange will get another chance to avoid extradition. And Russian privateers find that they’re expendable.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1500/notes</link>
      <description>Updates on the continuing hybrid war in Ukraine. The UK charges Russia with trying to install a puppet in Kyiv. Nominal hacktivists claim an attack against Belarusian railroads. Compromise of Greek parliamentary email accounts reported. Netherlands authorities warn against relaxing your guard against Log4j exploitation. Julian Assange will get another chance to avoid extradition. Rick Howard’s been pondering his reading list. Dinah Davis from Arctic Wolf on securing your smart speakers. And Russian privateers find that they’re expendable.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/15
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 24 Jan 2022 21:15:00 -0000</pubDate>
      <itunes:title>Updates on the continuing hybrid war in Ukraine. Julian Assange will get another chance to avoid extradition. And Russian privateers find that they’re expendable.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1500</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Updates on the continuing hybrid war in Ukraine. The UK charges Russia with trying to install a puppet in Kyiv. Nominal hacktivists claim an attack against Belarusian railroads. Compromise of Greek parliamentary email accounts reported. Netherlands authorities warn against relaxing your guard against Log4j exploitation. Julian Assange will get another chance to avoid extradition. Rick Howard’s been pondering his reading list. Dinah Davis from Arctic Wolf on securing your smart speakers. And Russian privateers find that they’re expendable.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/15
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Updates on the continuing hybrid war in Ukraine. The UK charges Russia with trying to install a puppet in Kyiv. Nominal hacktivists claim an attack against Belarusian railroads. Compromise of Greek parliamentary email accounts reported. Netherlands authorities warn against relaxing your guard against Log4j exploitation. Julian Assange will get another chance to avoid extradition. Rick Howard’s been pondering his reading list. Dinah Davis from Arctic Wolf on securing your smart speakers. And Russian privateers find that they’re expendable.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/15</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1664</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a8d835b6-7881-11ec-90a9-5bd429d8f253]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3865608597.mp3?updated=1690293460" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Andrew Maloney: Never-ending thirst for knowledge. [COO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/84/notes</link>
      <description>COO and Co-Founder of Query. AI, Andrew Maloney, shares how the building blocks he learned in the military helped him get where he is today. Coming from a blue collar family with a minimal knowledge of computers, Andrew went into computer operations in the Air Force. While deployed to Oman just after the start of the Iraq War, Andrew said he got his break into security. That's where he learned the components that fit together in order to effectively secure an environment. Andrew's words of wisdom: You've got to keep pushing and you've got to believe in yourself and never sell yourself short. We thank Andrew for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 23 Jan 2022 08:00:00 -0000</pubDate>
      <itunes:title>Andrew Maloney: Never-ending thirst for knowledge. [COO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>84</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>COO and Co-Founder of Query. AI, Andrew Maloney, shares how the the building blocks he learned in the military helped him get where he is today. </itunes:subtitle>
      <itunes:summary>COO and Co-Founder of Query. AI, Andrew Maloney, shares how the building blocks he learned in the military helped him get where he is today. Coming from a blue collar family with a minimal knowledge of computers, Andrew went into computer operations in the Air Force. While deployed to Oman just after the start of the Iraq War, Andrew said he got his break into security. That's where he learned the components that fit together in order to effectively secure an environment. Andrew's words of wisdom: You've got to keep pushing and you've got to believe in yourself and never sell yourself short. We thank Andrew for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>COO and Co-Founder of Query. AI, Andrew Maloney, shares how the building blocks he learned in the military helped him get where he is today. Coming from a blue collar family with a minimal knowledge of computers, Andrew went into computer operations in the Air Force. While deployed to Oman just after the start of the Iraq War, Andrew said he got his break into security. That's where he learned the components that fit together in order to effectively secure an environment. Andrew's words of wisdom: You've got to keep pushing and you've got to believe in yourself and never sell yourself short. We thank Andrew for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>470</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3a4ea22e-7971-11ec-a279-db20214aab48]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1416706389.mp3?updated=1642687432" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A collaboration stumbles upon threat actor Lyceum. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/216/notes</link>
      <description>Guest Rob Boyce, Accenture's Global Lead for Cyber Incident Response and Transformation Services, joins Dave to discuss joint research done by Accenture’s Cyber Threat Intelligence (ACTI) group and Prevailion’s Adversarial Counterintelligence Team (PACT). The teams dug into recently publicized campaigns of the cyber espionage threat group Lyceum (aka HEXANE, Spirlin) to further analyze the operational infrastructure and victimology of this actor. The team’s findings corroborate and reinforce previous ClearSky and Kaspersky research indicating a primary focus on computer network intrusion events aimed at telecommunications providers in the Middle East. Additionally, the research expands on this victim set by identifying additional targets within internet service providers (ISPs) and government agencies. Although all victim-identifying information has been redacted, this report seeks to provide these targeted industry and geographic verticals with additional knowledge of the threat and mitigation opportunities.
The research can be found here:
Who are latest targets of cyber group Lyceum?

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Jan 2022 08:00:00 -0000</pubDate>
      <itunes:title>A collaboration stumbles upon threat actor Lyceum. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>216</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Rob Boyce, Accenture's Global Lead for Cyber Incident Response and Transformation Services, joins Dave to discuss joint research done by Accenture’s Cyber Threat Intelligence (ACTI) group and Prevailion’s Adversarial Counterintelligence Team (PACT). The teams dug into recently publicized campaigns of the cyber espionage threat group Lyceum (aka HEXANE, Spirlin) to further analyze the operational infrastructure and victimology of this actor. The team’s findings corroborate and reinforce previous ClearSky and Kaspersky research indicating a primary focus on computer network intrusion events aimed at telecommunications providers in the Middle East. Additionally, the research expands on this victim set by identifying additional targets within internet service providers (ISPs) and government agencies. Although all victim-identifying information has been redacted, this report seeks to provide these targeted industry and geographic verticals with additional knowledge of the threat and mitigation opportunities.
The research can be found here:
Who are latest targets of cyber group Lyceum?

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Rob Boyce, Accenture's Global Lead for Cyber Incident Response and Transformation Services, joins Dave to discuss joint research done by Accenture’s Cyber Threat Intelligence (ACTI) group and Prevailion’s Adversarial Counterintelligence Team (PACT). The teams dug into recently publicized campaigns of the cyber espionage threat group Lyceum (aka HEXANE, Spirlin) to further analyze the operational infrastructure and victimology of this actor. The team’s findings corroborate and reinforce previous ClearSky and Kaspersky research indicating a primary focus on computer network intrusion events aimed at telecommunications providers in the Middle East. Additionally, the research expands on this victim set by identifying additional targets within internet service providers (ISPs) and government agencies. Although all victim-identifying information has been redacted, this report seeks to provide these targeted industry and geographic verticals with additional knowledge of the threat and mitigation opportunities.</p><p>The research can be found here:</p><ul><li><a href="https://www.accenture.com/us-en/blogs/cyber-defense/iran-based-lyceum-campaigns">Who are latest targets of cyber group Lyceum?</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1061</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c421f03a-7a3b-11ec-8955-9b292b2beb97]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3164715279.mp3?updated=1685126648" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ukrainian crisis continues, with attendant risk of hybrid warfare. MoonBounce malware in the wild. Pirate radio hacks a number station. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1499/notes</link>
      <description>US and Russian talks over Ukraine conclude with an agreement to further exchanges next week. Western governments continue to recommend vigilance against the threat of Russian cyberattacks against critical infrastructure. The US Treasury Department sanctions four Ukrainian nationals for their work on behalf of Russia’s FSB and its influence operations. A firmware bootkit is discovered in the wild. Security turnover at Twitter. Caleb Barlow looks at wifi hygiene. Our guest is Allan Liska on his latest ransomware book. And a number station gets hacked, in style.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/14
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Jan 2022 00:06:00 -0000</pubDate>
      <itunes:title>Ukrainian crisis continues, with attendant risk of hybrid warfare. MoonBounce malware in the wild. Pirate radio hacks a number station. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1499</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>US and Russian talks over Ukraine conclude with an agreement to further exchanges next week. Western governments continue to recommend vigilance against the threat of Russian cyberattacks against critical infrastructure. The US Treasury Department sanctions four Ukrainian nationals for their work on behalf of Russia’s FSB and its influence operations. A firmware bootkit is discovered in the wild. Security turnover at Twitter. Caleb Barlow looks at wifi hygiene. Our guest is Allan Liska on his latest ransomware book. And a number station gets hacked, in style.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/14
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>US and Russian talks over Ukraine conclude with an agreement to further exchanges next week. Western governments continue to recommend vigilance against the threat of Russian cyberattacks against critical infrastructure. The US Treasury Department sanctions four Ukrainian nationals for their work on behalf of Russia’s FSB and its influence operations. A firmware bootkit is discovered in the wild. Security turnover at Twitter. Caleb Barlow looks at wifi hygiene. Our guest is Allan Liska on his latest ransomware book. And a number station gets hacked, in style.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/14</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1576</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4cf6cc98-7882-11ec-9943-93621addee46]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5560812047.mp3?updated=1690293437" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Looking toward tomorrow’s Russo-American talks about the Ukraine crisis. A memorandum gives NSA oversight authority for NSS. A look at the C2C markets. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1498/notes</link>
      <description>As Russian forces remain in assembly areas near the Ukrainian border, the US and Russia prepare for tomorrow’s high-level talks in Geneva. NATO members look to their cyber defenses. US President Biden issues a Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems. Notes on C2C markets. Mirai is exploiting Log4j flaws. Verizon’s Chris Novak shares insights on Log4j challenges. Our guest is Ryan Kovar from Splunk with a look at the year ahead. And Olympic athletes heading to China? Better grab that burner phone.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/13
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 20 Jan 2022 21:15:00 -0000</pubDate>
      <itunes:title>Looking toward tomorrow’s Russo-American talks about the Ukraine crisis. A memorandum gives NSA oversight authority for NSS. A look at the C2C markets. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1498</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>As Russian forces remain in assembly areas near the Ukrainian border, the US and Russia prepare for tomorrow’s high-level talks in Geneva. NATO members look to their cyber defenses. US President Biden issues a Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems. Notes on C2C markets. Mirai is exploiting Log4j flaws. Verizon’s Chris Novak shares insights on Log4j challenges. Our guest is Ryan Kovar from Splunk with a look at the year ahead. And Olympic athletes heading to China? Better grab that burner phone.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/13
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As Russian forces remain in assembly areas near the Ukrainian border, the US and Russia prepare for tomorrow’s high-level talks in Geneva. NATO members look to their cyber defenses. US President Biden issues a Memorandum on Improving the Cybersecurity of National Security, Department of Defense, and Intelligence Community Systems. Notes on C2C markets. Mirai is exploiting Log4j flaws. Verizon’s Chris Novak shares insights on Log4j challenges. Our guest is Ryan Kovar from Splunk with a look at the year ahead. And Olympic athletes heading to China? Better grab that burner phone.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/13</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1752</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4cd63cbc-7882-11ec-9943-6b0777580e87]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4270071832.mp3?updated=1690293426" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Updates on what Ukraine is now calling “BleedingBear.” CISA advises organizations to prepare for Russian cyberattacks. Other cyberespionage campaigns, and a new ransomware strain.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1497/notes</link>
      <description>Ukraine confirms that it was hit by wiper malware last week, as tension between Moscow and Kyiv remains high. It remains high as well between Russia and NATO, as Russia continues marshaling conventional forces around Ukraine. CISA advises organizations to prepare to withstand Russian cyberattacks. Other cyberespionage campaigns are reported, as is a new strain of ransomware. Microsoft’s Kevin Magee provides friendly counsel for CISOs and boards. Our guest is Clar Rosso from ISC2 on the communication gap between cybersecurity teams and executive leaders when it comes to ransomware. And the natural disaster in Tonga may offer lessons in resilience and recovery.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/12
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 19 Jan 2022 21:15:00 -0000</pubDate>
      <itunes:title>Updates on what Ukraine is now calling “BleedingBear.” CISA advises organizations to prepare for Russian cyberattacks. Other cyberespionage campaigns, and a new ransomware strain.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1497</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ukraine confirms that it was hit by wiper malware last week, as tension between Moscow and Kyiv remains high. It remains high as well between Russia and NATO, as Russia continues marshaling conventional forces around Ukraine. CISA advises organizations to prepare to withstand Russian cyberattacks. Other cyberespionage campaigns are reported, as is a new strain of ransomware. Microsoft’s Kevin Magee provides friendly counsel for CISOs and boards. Our guest is Clar Rosso from ISC2 on the communication gap between cybersecurity teams and executive leaders when it comes to ransomware. And the natural disaster in Tonga may offer lessons in resilience and recovery.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/12
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ukraine confirms that it was hit by wiper malware last week, as tension between Moscow and Kyiv remains high. It remains high as well between Russia and NATO, as Russia continues marshaling conventional forces around Ukraine. CISA advises organizations to prepare to withstand Russian cyberattacks. Other cyberespionage campaigns are reported, as is a new strain of ransomware. Microsoft’s Kevin Magee provides friendly counsel for CISOs and boards. Our guest is Clar Rosso from ISC2 on the communication gap between cybersecurity teams and executive leaders when it comes to ransomware. And the natural disaster in Tonga may offer lessons in resilience and recovery.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/12</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1547</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4cb57dd8-7882-11ec-9943-77bfc7c2d2e6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8997891491.mp3?updated=1690293411" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A new member of the Winnti Cluster is described. Cobalt Strike used against unpatched VMware Horizon servers. Ukraine blames Russia for what seems to be a destructive supply chain attack.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1496/notes</link>
      <description>A new Chinese cyberespionage group is described. Cobalt Strike implants are observed hitting unpatched VMware Horizon servers. Ukraine attributes last week’s cyberattacks to Russia (with some possibility of Belarusian involvement as well). Microsoft doesn’t offer attribution, but it suggests that the incidents were more destructive than ransomware or simple defacements. The US warns of possible provocations. Ben Yelin looks at a bipartisan TLDR bill. Our guest is Lisa Plaggemier from the National Cybersecurity Alliance on the ongoing threat of phishing. And the REvil arrests in Russia may have been for “leverage.”

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/11
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Jan 2022 21:15:00 -0000</pubDate>
      <itunes:title>A new member of the Winnti Cluster is described. Cobalt Strike used against unpatched VMware Horizon servers. Ukraine blames Russia for what seems to be a destructive supply chain attack.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1496</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A new Chinese cyberespionage group is described. Cobalt Strike implants are observed hitting unpatched VMware Horizon servers. Ukraine attributes last week’s cyberattacks to Russia (with some possibility of Belarusian involvement as well). Microsoft doesn’t offer attribution, but it suggests that the incidents were more destructive than ransomware or simple defacements. The US warns of possible provocations. Ben Yelin looks at a bipartisan TLDR bill. Our guest is Lisa Plaggemier from the National Cybersecurity Alliance on the ongoing threat of phishing. And the REvil arrests in Russia may have been for “leverage.”

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/11
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A new Chinese cyberespionage group is described. Cobalt Strike implants are observed hitting unpatched VMware Horizon servers. Ukraine attributes last week’s cyberattacks to Russia (with some possibility of Belarusian involvement as well). Microsoft doesn’t offer attribution, but it suggests that the incidents were more destructive than ransomware or simple defacements. The US warns of possible provocations. Ben Yelin looks at a bipartisan TLDR bill. Our guest is Lisa Plaggemier from the National Cybersecurity Alliance on the ongoing threat of phishing. And the REvil arrests in Russia may have been for “leverage.”</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/11</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1550</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4c94d4c0-7882-11ec-9943-039ee4aae657]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2716965896.mp3?updated=1690293394" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Marina Ciavatta: Going after the human error. [Social engineer] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/83/notes</link>
      <description>Social engineer and CEO of Hekate, Marina Ciavatta, shares her story of how people think her job is a la Mission Impossible coming from the ceiling with a rope and stealing stuff in the dead of the night. Marina does physical pentesting. Starting with an unused degree in journalism, Marina turned her talent for writing into a job as a content producer for a technology company and this appealed to her self-proclaimed nerdism. She fell in love with hacking and got into pentesting thanks to a friend. Marina recommends those interested in physical pentesting "try to find other social engineers to mingle. It's in the name. We are social creatures." We thank Marina for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 16 Jan 2022 08:00:00 -0000</pubDate>
      <itunes:title>Marina Ciavatta: Going after the human error. [Social engineer] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>83</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Social engineer and CEO of Hekate, Marina Ciavatta, shares her story of how people think her job is a la Mission Impossible coming from the ceiling with a rope and stealing stuff in the dead of the night.</itunes:subtitle>
      <itunes:summary>Social engineer and CEO of Hekate, Marina Ciavatta, shares her story of how people think her job is a la Mission Impossible coming from the ceiling with a rope and stealing stuff in the dead of the night. Marina does physical pentesting. Starting with an unused degree in journalism, Marina turned her talent for writing into a job as a content producer for a technology company and this appealed to her self-proclaimed nerdism. She fell in love with hacking and got into pentesting thanks to a friend. Marina recommends those interested in physical pentesting "try to find other social engineers to mingle. It's in the name. We are social creatures." We thank Marina for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Social engineer and CEO of Hekate, Marina Ciavatta, shares her story of how people think her job is a la Mission Impossible coming from the ceiling with a rope and stealing stuff in the dead of the night. Marina does physical pentesting. Starting with an unused degree in journalism, Marina turned her talent for writing into a job as a content producer for a technology company and this appealed to her self-proclaimed nerdism. She fell in love with hacking and got into pentesting thanks to a friend. Marina recommends those interested in physical pentesting "try to find other social engineers to mingle. It's in the name. We are social creatures." We thank Marina for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>561</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6b2a5620-74dc-11ec-aaa3-bf1f96a9eddd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1227398132.mp3?updated=1642125556" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Keeping APIs on the radar: Evaluating the banking industry. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/215/notes</link>
      <description>This episode features guest Alissa Knight, former hacker and partner at Knight Ink, along with Karl Mattson, CISO from Noname Security, discussing findings on severe API vulnerabilities in U.S. banking applications research that was conducted by Alissa and funded by Noname Security. The research, “Scorched Earth: Hacking Bank APIs,” unveils a number of vulnerabilities in the banking, cryptocurrency exchange, and FinTech industries.
In her Money 20/20 keynote presentation entitled “Scorched Earth: Hacking Bank APIs”. In her presentation, Alissa revealed that she was able to gain access to 55 different banks and change PIN codes and move money in and out of accounts. Three lessons learned include: API security vulnerabilities affect all enterprises, API security needs to be operationalized across the enterprise, and API security requires posture management, runtime security, and active testing.
Details can be found here:

White paper: Hacking Banks and Cryptocurrency Exchanges Through Their APIs


Blog post: 3 API Security Lessons from “Scorched Earth: Hacking Bank APIs”


Press release: New Research Shows Vulnerabilities in Banking, Cryptocurrency Exchange, and FinTech APIs Allow Unauthorized Transactions and PIN Code Changes of Customers


Alissa's presentation at Money 20/20.


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Jan 2022 08:00:00 -0000</pubDate>
      <itunes:title>Keeping APIs on the radar: Evaluating the banking industry. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>215</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This episode features guest Alissa Knight, former hacker and partner at Knight Ink, along with Karl Mattson, CISO from Noname Security, discussing findings on severe API vulnerabilities in U.S. banking applications research that was conducted by Alissa and funded by Noname Security. The research, “Scorched Earth: Hacking Bank APIs,” unveils a number of vulnerabilities in the banking, cryptocurrency exchange, and FinTech industries.
In her Money 20/20 keynote presentation entitled “Scorched Earth: Hacking Bank APIs”. In her presentation, Alissa revealed that she was able to gain access to 55 different banks and change PIN codes and move money in and out of accounts. Three lessons learned include: API security vulnerabilities affect all enterprises, API security needs to be operationalized across the enterprise, and API security requires posture management, runtime security, and active testing.
Details can be found here:

White paper: Hacking Banks and Cryptocurrency Exchanges Through Their APIs


Blog post: 3 API Security Lessons from “Scorched Earth: Hacking Bank APIs”


Press release: New Research Shows Vulnerabilities in Banking, Cryptocurrency Exchange, and FinTech APIs Allow Unauthorized Transactions and PIN Code Changes of Customers


Alissa's presentation at Money 20/20.


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This episode features guest Alissa Knight, former hacker and partner at Knight Ink, along with Karl Mattson, CISO from Noname Security, discussing findings on severe API vulnerabilities in U.S. banking applications research that was conducted by Alissa and funded by Noname Security. The research, “Scorched Earth: Hacking Bank APIs,” unveils a number of vulnerabilities in the banking, cryptocurrency exchange, and FinTech industries.</p><p>In her Money 20/20 keynote presentation entitled “Scorched Earth: Hacking Bank APIs”. In her presentation, Alissa revealed that she was able to gain access to 55 different banks and change PIN codes and move money in and out of accounts. Three lessons learned include: API security vulnerabilities affect all enterprises, API security needs to be operationalized across the enterprise, and API security requires posture management, runtime security, and active testing.</p><p>Details can be found here:</p><ul>
<li>White paper: <a href="https://nonamesecurity.com/whitepaper-scorched-earth">Hacking Banks and Cryptocurrency Exchanges Through Their APIs</a>
</li>
<li>Blog post: <a href="https://nonamesecurity.com/blog/3-api-security-lessons-from-scorched-earth-hacking-bank-apis">3 API Security Lessons from “Scorched Earth: Hacking Bank APIs”</a>
</li>
<li>Press release: <a href="https://www.businesswire.com/news/home/20211026006184/en/New-Research-Shows-Vulnerabilities-in-Banking-Cryptocurrency-Exchange-and-FinTech-APIs-Allow-Unauthorized-Transactions-and-PIN-Code-Changes-of-Customers">New Research Shows Vulnerabilities in Banking, Cryptocurrency Exchange, and FinTech APIs Allow Unauthorized Transactions and PIN Code Changes of Customers</a>
</li>
<li>Alissa's <a href="https://www.youtube.com/watch?v=dzJ-UnYvSQ0">presentation at Money 20/20</a>.</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1522</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f3cffa96-73c6-11ec-8ce7-a7263aa278a2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4451407631.mp3?updated=1685126644" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Influence operations in the grey zone. FSB raids REvil. Open Source Software Security Summit looks to public-private cooperation. Privateering and state-sponsored cybercrime.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1495/notes</link>
      <description>A large-scale cyberattack against Ukrainian websites looks like an influence operation, and Russian intelligence services are the prime suspects. The FSB raids REvil. The White House Open Source Software Security Summit looks toward software bills of materials. MuddyWater exploits Log4shell. The DPRK is working to steal cryptocurrency. Caleb Barlow shares the consequences of the 3G network shutdown. Our guest is John Lehmann from Intellectual Point with programs that help military veterans transition to the cybersecurity industry. Honor among thieves, and spies.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/10
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 14 Jan 2022 21:15:00 -0000</pubDate>
      <itunes:title>Influence operations in the grey zone. FSB raids REvil. Open Source Software Security Summit looks to public-private cooperation. Privateering and state-sponsored cybercrime.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1495</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A large-scale cyberattack against Ukrainian websites looks like an influence operation, and Russian intelligence services are the prime suspects. The FSB raids REvil. The White House Open Source Software Security Summit looks toward software bills of materials. MuddyWater exploits Log4shell. The DPRK is working to steal cryptocurrency. Caleb Barlow shares the consequences of the 3G network shutdown. Our guest is John Lehmann from Intellectual Point with programs that help military veterans transition to the cybersecurity industry. Honor among thieves, and spies.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/10
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A large-scale cyberattack against Ukrainian websites looks like an influence operation, and Russian intelligence services are the prime suspects. The FSB raids REvil. The White House Open Source Software Security Summit looks toward software bills of materials. MuddyWater exploits Log4shell. The DPRK is working to steal cryptocurrency. Caleb Barlow shares the consequences of the 3G network shutdown. Our guest is John Lehmann from Intellectual Point with programs that help military veterans transition to the cybersecurity industry. Honor among thieves, and spies.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/10</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1755</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c0c2885c-6369-11ec-a3be-0fcc7ff3af45]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8338884610.mp3?updated=1690293371" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A public-private conference takes up open source software security at the White House. MuddyWater attributed to Iran. Espionage and ransomware arrests.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1494/notes</link>
      <description>A White House government-industry summit today addresses open-source software security. The US officially makes its second attribution of the week to a nation-state: it calls out Iran as the operator of the MuddyWater threat group. Israel arrests five on charges related to spying for Iran (they’re thought to have been recruited through catphishing). Citizen Lab finds Pegasus in Salvadoran phones. Ukraine arrests a ransomware gang. Thomas Etheridge from CrowdStrike on the importance of threat hunting for zero days. Our guest is Dr. David Bader of New Jersey Institute of Technology discussing the challenges of securing massive-scale analytics. And ransomware hits US state and local governments.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/9
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 13 Jan 2022 21:15:00 -0000</pubDate>
      <itunes:title>A public-private conference takes up open source software security at the White House. MuddyWater attributed to Iran. Espionage and ransomware arrests.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1494</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A White House government-industry summit today addresses open-source software security. The US officially makes its second attribution of the week to a nation-state: it calls out Iran as the operator of the MuddyWater threat group. Israel arrests five on charges related to spying for Iran (they’re thought to have been recruited through catphishing). Citizen Lab finds Pegasus in Salvadoran phones. Ukraine arrests a ransomware gang. Thomas Etheridge from CrowdStrike on the importance of threat hunting for zero days. Our guest is Dr. David Bader of New Jersey Institute of Technology discussing the challenges of securing massive-scale analytics. And ransomware hits US state and local governments.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/9
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A White House government-industry summit today addresses open-source software security. The US officially makes its second attribution of the week to a nation-state: it calls out Iran as the operator of the MuddyWater threat group. Israel arrests five on charges related to spying for Iran (they’re thought to have been recruited through catphishing). Citizen Lab finds Pegasus in Salvadoran phones. Ukraine arrests a ransomware gang. Thomas Etheridge from CrowdStrike on the importance of threat hunting for zero days. Our guest is Dr. David Bader of New Jersey Institute of Technology discussing the challenges of securing massive-scale analytics. And ransomware hits US state and local governments.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/9</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1609</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c038821a-6369-11ec-a3be-53185c57f44b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5976999746.mp3?updated=1690293357" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The US and EU seek to shore up cybersecurity as Russo-Ukraininan tensions run high. NIST updates secure system standards. Ransomware exploits Log4shell. Dog bites man: fraud in social media. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1493/notes</link>
      <description>The US issues an alert over the prospect of Russian cyberattacks, and the EU begins a series of stress tests, both in apparent response to concerns over the prospect of a Russian attack on Ukraine. NIST updates its guidance on Engineering Trustworthy Secure Systems. NIght Sky ransomware exploits Log4shell. Phishing afflicts a hotel chain. Carole Theriault examines international efforts to stop digital fraud. Ben Yelin fon Seattle Police Faking Radio Chatter. And we’re shocked, shocked, to learn of fraud and piracy on a social media platform. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/8
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 12 Jan 2022 21:15:00 -0000</pubDate>
      <itunes:title>The US and EU seek to shore up cybersecurity as Russo-Ukraininan tensions run high. NIST updates secure system standards. Ransomware exploits Log4shell. Dog bites man: fraud in social media. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1493</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The US issues an alert over the prospect of Russian cyberattacks, and the EU begins a series of stress tests, both in apparent response to concerns over the prospect of a Russian attack on Ukraine. NIST updates its guidance on Engineering Trustworthy Secure Systems. NIght Sky ransomware exploits Log4shell. Phishing afflicts a hotel chain. Carole Theriault examines international efforts to stop digital fraud. Ben Yelin fon Seattle Police Faking Radio Chatter. And we’re shocked, shocked, to learn of fraud and piracy on a social media platform. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/8
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US issues an alert over the prospect of Russian cyberattacks, and the EU begins a series of stress tests, both in apparent response to concerns over the prospect of a Russian attack on Ukraine. NIST updates its guidance on Engineering Trustworthy Secure Systems. NIght Sky ransomware exploits Log4shell. Phishing afflicts a hotel chain. Carole Theriault examines international efforts to stop digital fraud. Ben Yelin fon Seattle Police Faking Radio Chatter. And we’re shocked, shocked, to learn of fraud and piracy on a social media platform. </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/8</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1584</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bfaebd14-6369-11ec-a3be-3f0309ce3832]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4278771550.mp3?updated=1690293341" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Software supply chains and the free-rider problem. An APT is bitten by its own RAT. Europol told to clean up its data. A leak investigation in Denmark. QR-code phishbait. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1492/notes</link>
      <description>Log4shell as an instance of a more general software supply chain issue. An APT apparently mistakenly infects itself with its own RAT. A new backdoor, SysJoker, is in use in the wild. A warning on commercial surveillance software. A leak investigation continues in Denmark. Joe Carrigan explains bogus QR codes. Our guest is Casey Allen of Concentric on cyber vulnerabilities in automobiles. And, Europol is told it has a year to clear its databases of information on people not involved in crime.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/7
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Jan 2022 21:15:00 -0000</pubDate>
      <itunes:title>Software supply chains and the free-rider problem. An APT is bitten by its own RAT. Europol told to clean up its data. A leak investigation in Denmark. QR-code phishbait. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1492</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Log4shell as an instance of a more general software supply chain issue. An APT apparently mistakenly infects itself with its own RAT. A new backdoor, SysJoker, is in use in the wild. A warning on commercial surveillance software. A leak investigation continues in Denmark. Joe Carrigan explains bogus QR codes. Our guest is Casey Allen of Concentric on cyber vulnerabilities in automobiles. And, Europol is told it has a year to clear its databases of information on people not involved in crime.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/7
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Log4shell as an instance of a more general software supply chain issue. An APT apparently mistakenly infects itself with its own RAT. A new backdoor, SysJoker, is in use in the wild. A warning on commercial surveillance software. A leak investigation continues in Denmark. Joe Carrigan explains bogus QR codes. Our guest is Casey Allen of Concentric on cyber vulnerabilities in automobiles. And, Europol is told it has a year to clear its databases of information on people not involved in crime.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/7</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1592</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bf23b7c8-6369-11ec-a3be-db637351c9d0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8933330363.mp3?updated=1690293328" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA provides an account of progress toward Log4shell remediation. Other issues are reported in open-source libraries. Undersea cable security. FIN7’s BadUSB campaign. Security and Yealink. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1491/notes</link>
      <description>CISA describes progress toward remediating Log4shell. Other open-source libraries are found to have similar issues, in one case problems deliberately introduced by the developer. Concerns are expressed over undersea cable security. FIN7’s BadUSB campaign. Security questions about another Chinese-made phone. Our guest is Bob Maley from Black Kite on their report - The Government Called, Are You Ready to Answer? Chris Novak from Verizon on PCI 4.0. And Russo-American talks open in Geneva.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/6
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 10 Jan 2022 21:15:00 -0000</pubDate>
      <itunes:title>CISA provides an account of progress toward Log4shell remediation. Other issues are reported in open-source libraries. Undersea cable security. FIN7’s BadUSB campaign. Security and Yealink. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1491</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA describes progress toward remediating Log4shell. Other open-source libraries are found to have similar issues, in one case problems deliberately introduced by the developer. Concerns are expressed over undersea cable security. FIN7’s BadUSB campaign. Security questions about another Chinese-made phone. Our guest is Bob Maley from Black Kite on their report - The Government Called, Are You Ready to Answer? Chris Novak from Verizon on PCI 4.0. And Russo-American talks open in Geneva.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/6
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA describes progress toward remediating Log4shell. Other open-source libraries are found to have similar issues, in one case problems deliberately introduced by the developer. Concerns are expressed over undersea cable security. FIN7’s BadUSB campaign. Security questions about another Chinese-made phone. Our guest is Bob Maley from Black Kite on their report - The Government Called, Are You Ready to Answer? Chris Novak from Verizon on PCI 4.0. And Russo-American talks open in Geneva.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/6</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1787</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[be99cb4e-6369-11ec-a3be-0f2cc5c6f924]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3877504937.mp3?updated=1690293315" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Julian Waits: Find a way to help society. [Serial Entrepreneur] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/82/notes</link>
      <description>Senior Vice President and Executive in Residence with Rapid7 and Chairman for Cyversity, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. Julian always wanted to do something where he could find a way to help society to basically help others. Starting out as a Baptist minister with aspirations of being a professional musician, Julian found it more practical to take some technology classes and practice his saxophone when he had time. His first tech job was at Texaco where he worked on early networks and moved into systems engineering at Compaq. Julian notes his ADD made coding less attractive than talking with others to solve problems and Compaq provided him with opportunities to pivot. Searching out diversity, Julian moved to DC, and had his first taste of startups. He now describes himself as a serial entrepreneur. We thank Julian for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 09 Jan 2022 08:00:00 -0000</pubDate>
      <itunes:title>Julian Waits: Find a way to help society. [Serial Entrepreneur] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>82</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Senior Vice President and Executive in Residence with Rapid7, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. </itunes:subtitle>
      <itunes:summary>Senior Vice President and Executive in Residence with Rapid7 and Chairman for Cyversity, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. Julian always wanted to do something where he could find a way to help society to basically help others. Starting out as a Baptist minister with aspirations of being a professional musician, Julian found it more practical to take some technology classes and practice his saxophone when he had time. His first tech job was at Texaco where he worked on early networks and moved into systems engineering at Compaq. Julian notes his ADD made coding less attractive than talking with others to solve problems and Compaq provided him with opportunities to pivot. Searching out diversity, Julian moved to DC, and had his first taste of startups. He now describes himself as a serial entrepreneur. We thank Julian for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Senior Vice President and Executive in Residence with Rapid7 and Chairman for Cyversity, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. Julian always wanted to do something where he could find a way to help society to basically help others. Starting out as a Baptist minister with aspirations of being a professional musician, Julian found it more practical to take some technology classes and practice his saxophone when he had time. His first tech job was at Texaco where he worked on early networks and moved into systems engineering at Compaq. Julian notes his ADD made coding less attractive than talking with others to solve problems and Compaq provided him with opportunities to pivot. Searching out diversity, Julian moved to DC, and had his first taste of startups. He now describes himself as a serial entrepreneur. We thank Julian for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>559</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2a08a2a6-6f40-11ec-bad7-737d428cb6ac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5824131948.mp3?updated=1641495180" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The rise of Karakurt Hacking Team.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/214/notes</link>
      <description>Guest Rob Boyce, Accenture's Global Lead for Cyber Incident Response and Transformation Services, joins Dave to discuss their research "Karakurt rises from its lair." Accenture Security has identified a new threat group, the self-proclaimed Karakurt Hacking Team, that has impacted over 40 victims across multiple geographies. The threat group is financially motivated, opportunistic in nature, and so far, appears to target smaller companies or corporate subsidiaries versus the alternative big game hunting approach. Based on intrusion analysis to date, the threat group focuses solely on data exfiltration and subsequent extortion, rather than the more destructive ransomware deployment. In addition, Accenture Security assesses with moderate-to-high confidence that the threat group’s extortion approach includes steps to avoid, as much as possible, drawing attention to its activities.
The research can be found here:
Karakurt rises from its lair

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Jan 2022 08:00:00 -0000</pubDate>
      <itunes:title>The rise of Karakurt Hacking Team.</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>214</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Rob Boyce, Accenture's Global Lead for Cyber Incident Response and Transformation Services, joins Dave to discuss their research "Karakurt rises from its lair." Accenture Security has identified a new threat group, the self-proclaimed Karakurt Hacking Team, that has impacted over 40 victims across multiple geographies. The threat group is financially motivated, opportunistic in nature, and so far, appears to target smaller companies or corporate subsidiaries versus the alternative big game hunting approach. Based on intrusion analysis to date, the threat group focuses solely on data exfiltration and subsequent extortion, rather than the more destructive ransomware deployment. In addition, Accenture Security assesses with moderate-to-high confidence that the threat group’s extortion approach includes steps to avoid, as much as possible, drawing attention to its activities.
The research can be found here:
Karakurt rises from its lair

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Rob Boyce, Accenture's Global Lead for Cyber Incident Response and Transformation Services, joins Dave to discuss their research "Karakurt rises from its lair." Accenture Security has identified a new threat group, the self-proclaimed Karakurt Hacking Team, that has impacted over 40 victims across multiple geographies. The threat group is financially motivated, opportunistic in nature, and so far, appears to target smaller companies or corporate subsidiaries versus the alternative big game hunting approach. Based on intrusion analysis to date, the threat group focuses solely on data exfiltration and subsequent extortion, rather than the more destructive ransomware deployment. In addition, Accenture Security assesses with moderate-to-high confidence that the threat group’s extortion approach includes steps to avoid, as much as possible, drawing attention to its activities.</p><p>The research can be found here:</p><ul><li><a href="https://www.accenture.com/us-en/blogs/cyber-defense/karakurt-threat-mitigation">Karakurt rises from its lair</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>775</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9735c8ba-6f02-11ec-a9b3-7bb58d48757f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2068020336.mp3?updated=1685126630" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kazakhstan shuts down its Internet as civil unrest continues (and one consequence is a disruption of alt-coin mining in that country). More on Log4j. Ransomware hits school website provider.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1490/notes</link>
      <description>Kazakhstan shuts down its Internet as civil unrest continues (and one consequence is a disruption of alt-coin mining in that country). The UK’s NHS warns of unknown threat actors exploiting Log4j bugs in unpatched VMware Horizon servers. In the US, CISA continues to assist Federal agencies with Log4j remediation, and observers call for more Government support of open-source software security. A major provider of school websites is hit with ransomware. Our guest is John Belizaire of Soluna Computing with a new approach to data center efficiency. Thomas Etheridge from CrowdStrike on supply chain risks. And the US extends the deadline to apply for grants in support of rip-and-replace.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/5
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 07 Jan 2022 21:15:00 -0000</pubDate>
      <itunes:title>Kazakhstan shuts down its Internet as civil unrest continues (and one consequence is a disruption of alt-coin mining in that country). More on Log4j. Ransomware hits school website provider.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1490</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Kazakhstan shuts down its Internet as civil unrest continues (and one consequence is a disruption of alt-coin mining in that country). The UK’s NHS warns of unknown threat actors exploiting Log4j bugs in unpatched VMware Horizon servers. In the US, CISA continues to assist Federal agencies with Log4j remediation, and observers call for more Government support of open-source software security. A major provider of school websites is hit with ransomware. Our guest is John Belizaire of Soluna Computing with a new approach to data center efficiency. Thomas Etheridge from CrowdStrike on supply chain risks. And the US extends the deadline to apply for grants in support of rip-and-replace.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/5
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kazakhstan shuts down its Internet as civil unrest continues (and one consequence is a disruption of alt-coin mining in that country). The UK’s NHS warns of unknown threat actors exploiting Log4j bugs in unpatched VMware Horizon servers. In the US, CISA continues to assist Federal agencies with Log4j remediation, and observers call for more Government support of open-source software security. A major provider of school websites is hit with ransomware. Our guest is John Belizaire of Soluna Computing with a new approach to data center efficiency. Thomas Etheridge from CrowdStrike on supply chain risks. And the US extends the deadline to apply for grants in support of rip-and-replace.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/5</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1478</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c09fe518-6369-11ec-a3be-4b627a63b59e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4703890533.mp3?updated=1690293295" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Log4j and industrial control systems. Regulators consider the software supply chain. Malsmoke hits an old vulnerability. Social engineering via Google Docs. Call spoofing and robocalls.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1489/notes</link>
      <description>ICS vendors address Log4j vulnerabilities. Regulators and legislators think about addressing issues in the software supply chain. Ransomware gangs were quick to exploit Log4shell. An old, and patched, Windows vulnerability is being exploited by the Malsmoke gang. Social engineering of Google Docs users is up. Mr. Klyshin pleads not guilty. Robert M. Lee from Dragos makes the case for salary transparency. Our guest is George Gerchow from Sumo Logic with new approaches for the modern threat landscape. And call spoofing is making robocalls moderately more plausible.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/4
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 06 Jan 2022 21:15:00 -0000</pubDate>
      <itunes:title>Log4j and industrial control systems. Regulators consider the software supply chain. Malsmoke hits an old vulnerability. Social engineering via Google Docs. Call spoofing and robocalls.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1489</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>ICS vendors address Log4j vulnerabilities. Regulators and legislators think about addressing issues in the software supply chain. Ransomware gangs were quick to exploit Log4shell. An old, and patched, Windows vulnerability is being exploited by the Malsmoke gang. Social engineering of Google Docs users is up. Mr. Klyshin pleads not guilty. Robert M. Lee from Dragos makes the case for salary transparency. Our guest is George Gerchow from Sumo Logic with new approaches for the modern threat landscape. And call spoofing is making robocalls moderately more plausible.

For links to all of today's stories check out our CyberWire daily news briefing:
https://thecyberwire.com/newsletters/daily-briefing/11/4
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>ICS vendors address Log4j vulnerabilities. Regulators and legislators think about addressing issues in the software supply chain. Ransomware gangs were quick to exploit Log4shell. An old, and patched, Windows vulnerability is being exploited by the Malsmoke gang. Social engineering of Google Docs users is up. Mr. Klyshin pleads not guilty. Robert M. Lee from Dragos makes the case for salary transparency. Our guest is George Gerchow from Sumo Logic with new approaches for the modern threat landscape. And call spoofing is making robocalls moderately more plausible.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://thecyberwire.com/newsletters/daily-briefing/11/4</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1754</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c01625da-6369-11ec-a3be-134048b9b3a1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8495427439.mp3?updated=1690293288" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA reports progress on Log4j. The FTC warns US businesses about taking Log4j risk mitigation seriously. Gangland updates, and some notes on hybrid war. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1488/notes</link>
      <description>CISA says US Federal agencies are now largely in compliance with Log4j risk mitigation guidance. The FTC issues advice and a warning on Log4j to US businesses. A skimmer is installed through cloud-delivered video. The Vice Society’s ransomware is meddling with supermarket operations in the UK. The Atlantic Council offers advice on strategy for the grey zone. Hacktivists are expected to punish greenwashing in 2022. Caleb Barlow on recent FBI PIN about how ransomware operators are looking for material non-public information to improve their chances of being paid. Our guest is Helen Patton from Cisco on her book, Navigating the Cybersecurity Career Path. And James Pond is the CEO of hybrid war!
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/11/3
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 05 Jan 2022 21:45:00 -0000</pubDate>
      <itunes:title>CISA reports progress on Log4j. The FTC warns US businesses about taking Log4j risk mitigation seriously. Gangland updates, and some notes on hybrid war. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1488</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA says US Federal agencies are now largely in compliance with Log4j risk mitigation guidance. The FTC issues advice and a warning on Log4j to US businesses. A skimmer is installed through cloud-delivered video. The Vice Society’s ransomware is meddling with supermarket operations in the UK. The Atlantic Council offers advice on strategy for the grey zone. Hacktivists are expected to punish greenwashing in 2022. Caleb Barlow on recent FBI PIN about how ransomware operators are looking for material non-public information to improve their chances of being paid. Our guest is Helen Patton from Cisco on her book, Navigating the Cybersecurity Career Path. And James Pond is the CEO of hybrid war!
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/11/3
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA says US Federal agencies are now largely in compliance with Log4j risk mitigation guidance. The FTC issues advice and a warning on Log4j to US businesses. A skimmer is installed through cloud-delivered video. The Vice Society’s ransomware is meddling with supermarket operations in the UK. The Atlantic Council offers advice on strategy for the grey zone. Hacktivists are expected to punish greenwashing in 2022. Caleb Barlow on recent FBI PIN about how ransomware operators are looking for material non-public information to improve their chances of being paid. Our guest is Helen Patton from Cisco on her book, Navigating the Cybersecurity Career Path. And James Pond is the CEO of hybrid war!</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/11/3</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1779</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[df7eb31a-6369-11ec-8ab7-3bb07c85e90b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6829760626.mp3?updated=1690293267" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Log4j issues persist. Konni RAT found in New Year’s greetings. Hacktivism or state-directed cyber action? Moscow worries about Mr. Klyushin’s knowledge. The Show-Me-Too-Much State.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1487/notes</link>
      <description>It’s going to take time, vigilance, and attention to detail to manage the Log4j risks. A North Korean APT is trying to install the Konni RAT into Russian diplomats’ devices. More hacktivist-looking incidents follow the anniversary of Iranian General Soleimani’s death. Other, self-inflicted, software supply chain incidents. The Kremlin is said to be worried about what Mr. Klyushin might tell the Americans who’ve got him in jail. Ben Yelin on the tension between ephemeral messaging apps and the public’s right to know. Mr Security Answer Person John Pescatore joins our show. And the Show-Me state needs to rethink all that showin’.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/11/2
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Jan 2022 21:15:00 -0000</pubDate>
      <itunes:title>Log4j issues persist. Konni RAT found in New Year’s greetings. Hacktivism or state-directed cyber action? Moscow worries about Mr. Klyushin’s knowledge. The Show-Me-Too-Much State.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1487</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>It’s going to take time, vigilance, and attention to detail to manage the Log4j risks. A North Korean APT is trying to install the Konni RAT into Russian diplomats’ devices. More hacktivist-looking incidents follow the anniversary of Iranian General Soleimani’s death. Other, self-inflicted, software supply chain incidents. The Kremlin is said to be worried about what Mr. Klyushin might tell the Americans who’ve got him in jail. Ben Yelin on the tension between ephemeral messaging apps and the public’s right to know. Mr Security Answer Person John Pescatore joins our show. And the Show-Me state needs to rethink all that showin’.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/11/2
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>It’s going to take time, vigilance, and attention to detail to manage the Log4j risks. A North Korean APT is trying to install the Konni RAT into Russian diplomats’ devices. More hacktivist-looking incidents follow the anniversary of Iranian General Soleimani’s death. Other, self-inflicted, software supply chain incidents. The Kremlin is said to be worried about what Mr. Klyushin might tell the Americans who’ve got him in jail. Ben Yelin on the tension between ephemeral messaging apps and the public’s right to know. Mr Security Answer Person John Pescatore joins our show. And the Show-Me state needs to rethink all that showin’.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/11/2</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1947</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[def63ad0-6369-11ec-8ab7-d754e84d17bb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2550055462.mp3?updated=1690293257" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Log4j updates, including an Aquatic Panda sighting. Cyberattacks hit news services in Norway, Israel, and Portugal. Addressing Y2K22. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1486/notes</link>
      <description>Aquatic Panda has been found working Log4shell exploits against an academic institution. Apache fixes new Log4j issues reported last week, and Microsoft also updates Windows Defender to address Log4j risks. Cyberattacks, criminal or hacktivist in motivation, hit news outlets around the new year. Microsoft works on fixing a Y2K22 bug in on-premise Exchange Server. Andrea Little Limbago from Interos on technology spheres of influence. Our guest is Mark Dehus from Lumen’s Black Lotus Labs with DDoS insights. And CISA issues some ICS security advisories.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/11/1
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 03 Jan 2022 21:50:00 -0000</pubDate>
      <itunes:title>Log4j updates, including an Aquatic Panda sighting. Cyberattacks hit news services in Norway, Israel, and Portugal. Addressing Y2K22. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1486</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Aquatic Panda has been found working Log4shell exploits against an academic institution. Apache fixes new Log4j issues reported last week, and Microsoft also updates Windows Defender to address Log4j risks. Cyberattacks, criminal or hacktivist in motivation, hit news outlets around the new year. Microsoft works on fixing a Y2K22 bug in on-premise Exchange Server. Andrea Little Limbago from Interos on technology spheres of influence. Our guest is Mark Dehus from Lumen’s Black Lotus Labs with DDoS insights. And CISA issues some ICS security advisories.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/11/1
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Aquatic Panda has been found working Log4shell exploits against an academic institution. Apache fixes new Log4j issues reported last week, and Microsoft also updates Windows Defender to address Log4j risks. Cyberattacks, criminal or hacktivist in motivation, hit news outlets around the new year. Microsoft works on fixing a Y2K22 bug in on-premise Exchange Server. Andrea Little Limbago from Interos on technology spheres of influence. Our guest is Mark Dehus from Lumen’s Black Lotus Labs with DDoS insights. And CISA issues some ICS security advisories.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/11/1</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1529</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d6045894-6369-11ec-8ab7-b330382de2a3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1229080291.mp3?updated=1690293239" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dr. Rois Ni Thuama: Get into the game. [Cyber governance] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/81/notes</link>
      <description>Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pause her studies. While there, she began making music videos and wildlife documentaries. Upon her return to London, Rois started working in corporate governance and risk at a music technology startup. This ignited her enthusiasm for startups. She now works in a company with several coworkers from that tech startup doing cyber governance. Rois advises law students of many ways into the industry including doing coding, learning risk management, and understanding privacy legislation, and then "just get into the game." We thank Rois for sharing her story. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 02 Jan 2022 08:00:00 -0000</pubDate>
      <itunes:title>Dr. Rois Ni Thuama: Get into the game. [Cyber governance] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>81</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. </itunes:subtitle>
      <itunes:summary>Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pause her studies. While there, she began making music videos and wildlife documentaries. Upon her return to London, Rois started working in corporate governance and risk at a music technology startup. This ignited her enthusiasm for startups. She now works in a company with several coworkers from that tech startup doing cyber governance. Rois advises law students of many ways into the industry including doing coding, learning risk management, and understanding privacy legislation, and then "just get into the game." We thank Rois for sharing her story. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pause her studies. While there, she began making music videos and wildlife documentaries. Upon her return to London, Rois started working in corporate governance and risk at a music technology startup. This ignited her enthusiasm for startups. She now works in a company with several coworkers from that tech startup doing cyber governance. Rois advises law students of many ways into the industry including doing coding, learning risk management, and understanding privacy legislation, and then "just get into the game." We thank Rois for sharing her story. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>485</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d5328b62-eac0-11ee-9297-b729934c3855]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8685303052.mp3?updated=1640222868" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybersecurity predictions for 2022. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/23/notes</link>
      <description>Industry experts discuss their cybersecurity predictions for 2022, what trends and attacks will be most prevalent in the year ahead, and how organizations should be preparing for the new year.
In this show, we cover what they think the industry might see in 2022 (and some we probably won't see). The CyberWire's Rick Howard speaks with Hash Table member Kevin Magee, Chief Security Officer at Microsoft Canada, and show sponsor Keeper Security's CTO &amp; Co-Founder Craig Lurey joins The CyberWire's Dave Bittner on this CyberWire-X and shares his insights on the topic.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 02 Jan 2022 08:00:00 -0000</pubDate>
      <itunes:title>Cybersecurity predictions for 2022. [CyberWire-X]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>23</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Industry experts discuss their cybersecurity predictions for 2022, what trends and attacks will be most prevalent in the year ahead, and how organizations should be preparing for the new year.
In this show, we cover what they think the industry might see in 2022 (and some we probably won't see). The CyberWire's Rick Howard speaks with Hash Table member Kevin Magee, Chief Security Officer at Microsoft Canada, and show sponsor Keeper Security's CTO &amp; Co-Founder Craig Lurey joins The CyberWire's Dave Bittner on this CyberWire-X and shares his insights on the topic.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Industry experts discuss their cybersecurity predictions for 2022, what trends and attacks will be most prevalent in the year ahead, and how organizations should be preparing for the new year.</p><p>In this show, we cover what they think the industry might see in 2022 (and some we probably won't see). The CyberWire's Rick Howard speaks with Hash Table member Kevin Magee, Chief Security Officer at Microsoft Canada, and show sponsor Keeper Security's CTO &amp; Co-Founder Craig Lurey joins The CyberWire's Dave Bittner on this CyberWire-X and shares his insights on the topic.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1734</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[96f6745e-629f-11ec-90fe-c3acb90bb82f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4324757728.mp3?updated=1640117724" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: When big ransomware goes away, where should affiliates go? [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/206/notes</link>
      <description>Our guest Doel Santos, Threat Research Analyst at Palo Alto Networks, joins Dave Bittner to talk about Unit 42's work on "Ransomware Groups to Watch: Emerging Threats." As part of Unit 42’s commitment to stop ransomware attacks, they monitor the activity of existing groups, search for dark web leak sites and fresh onion sites, identify up-and-coming players and study tactics, techniques and procedures. During their operations, Unit 42 observed four emerging ransomware groups that are currently affecting organizations and show signs of having the potential to become more prevalent in the future. Doel discusses these (AvosLocker, Hive Ransomware, HelloKitty, and LockBit 2.0) with Dave.
The research can be found here:
Ransomware Groups to Watch: Emerging Threats

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Jan 2022 08:00:00 -0000</pubDate>
      <itunes:title>Encore: When big ransomware goes away, where should affiliates go? [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>206</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Our guest Doel Santos, Threat Research Analyst at Palo Alto Networks, joins Dave Bittner to talk about Unit 42's work on "Ransomware Groups to Watch: Emerging Threats." As part of Unit 42’s commitment to stop ransomware attacks, they monitor the activity of existing groups, search for dark web leak sites and fresh onion sites, identify up-and-coming players and study tactics, techniques and procedures. During their operations, Unit 42 observed four emerging ransomware groups that are currently affecting organizations and show signs of having the potential to become more prevalent in the future. Doel discusses these (AvosLocker, Hive Ransomware, HelloKitty, and LockBit 2.0) with Dave.
The research can be found here:
Ransomware Groups to Watch: Emerging Threats

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our guest Doel Santos, Threat Research Analyst at Palo Alto Networks, joins Dave Bittner to talk about Unit 42's work on "Ransomware Groups to Watch: Emerging Threats." As part of Unit 42’s commitment to stop ransomware attacks, they monitor the activity of existing groups, search for dark web leak sites and fresh onion sites, identify up-and-coming players and study tactics, techniques and procedures. During their operations, Unit 42 observed four emerging ransomware groups that are currently affecting organizations and show signs of having the potential to become more prevalent in the future. Doel discusses these (AvosLocker, Hive Ransomware, HelloKitty, and LockBit 2.0) with Dave.</p><p>The research can be found here:</p><ul><li><a href="https://unit42.paloaltonetworks.com/emerging-ransomware-groups/">Ransomware Groups to Watch: Emerging Threats</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1168</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d628cb2c-634e-11ec-8d28-475a14079388]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8496607132.mp3?updated=1640309187" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CyberWire Pro Interview Selects: Jaclyn Miller from NTT, Ltd. </title>
      <description>During our winter break, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. On this episode, the interview originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner speaks with Jaclyn Miller from NTT, Ltd. on diversity, inclusion and remote access security. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 31 Dec 2021 21:00:00 -0000</pubDate>
      <itunes:title>CyberWire Pro Interview Selects: Jaclyn Miller from NTT, Ltd. </itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>During our winter break, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. On this episode, the interview originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner speaks with Jaclyn Miller from NTT, Ltd. on diversity, inclusion and remote access security. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>During our winter break, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. On this episode, the interview originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner speaks with Jaclyn Miller from NTT, Ltd. on diversity, inclusion and remote access security. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. <a href="https://thecyberwire.com/pro">Learn more.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>792</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[20ac53d0-634a-11ec-8bb5-a7b02319dba7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9609442883.mp3?updated=1640193165" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CyberWire Pro Interview Selects: Sir David Omand.</title>
      <description>During our winter break, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. On this episode, the interview originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner speaks with Sir David Omand, former GCHQ Director, on his book, How Spies Think: Ten Lessons in Intelligence.. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 30 Dec 2021 21:00:00 -0000</pubDate>
      <itunes:title>CyberWire Pro Interview Selects: Sir David Omand.</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>During our winter break, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. On this episode, the interview originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner speaks with Sir David Omand, former GCHQ Director, on his book, How Spies Think: Ten Lessons in Intelligence.. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>During our winter break, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. On this episode, the interview originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner speaks with Sir David Omand, former GCHQ Director, on his book, <em>How Spies Think: Ten Lessons in Intelligence</em>.. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. <a href="https://thecyberwire.com/pro">Learn more.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1295</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2fbd9b28-6349-11ec-a66e-ef7895dbdcdc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8080952373.mp3?updated=1640193210" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CyberWire Pro Interview Selects: Zan Vautrinot on boards.</title>
      <description>During our winter break, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. On this episode, the interview originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Rick Howard speaks with Zan Vautrinot about boards. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 29 Dec 2021 21:00:00 -0000</pubDate>
      <itunes:title>CyberWire Pro Interview Selects: Zan Vautrinot on boards.</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>During our winter break, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. On this episode, the interview originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Rick Howard speaks with Zan Vautrinot about boards. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>During our winter break, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. On this episode, the interview originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Rick Howard speaks with Zan Vautrinot about boards. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. <a href="https://thecyberwire.com/pro">Learn more.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1217</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0deab23e-6348-11ec-bac2-6f0930ddc2df]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6958493118.mp3?updated=1640192245" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CyberWire Pro Interview Selects: Bill Wright of Splunk.</title>
      <description>During our winter break, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. On this episode, the interview originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner speaks with Bill Wright of Splunk on the ongoing geopolitical ransomware trend. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Dec 2021 21:00:00 -0000</pubDate>
      <itunes:title>CyberWire Pro Interview Selects: Bill Wright of Splunk.</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>During our winter break, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. On this episode, the interview originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner speaks with Bill Wright of Splunk on the ongoing geopolitical ransomware trend. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>During our winter break, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. On this episode, the interview originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner speaks with Bill Wright of Splunk on the ongoing geopolitical ransomware trend. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. <a href="https://thecyberwire.com/pro">Learn more.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>587</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d2066d9a-6346-11ec-b5df-bffb6c9a8234]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7553520242.mp3?updated=1640191772" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Andrew Hammond: Understanding the plot. [Historian and Curator] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/60/notes</link>
      <description>Historian and Curator at the International Spy Museum. Dr. Andrew Hammond, shares how he came to share the history of espionage and intelligence as a career. Starting out in the Royal Air Force when 9/11 happened, Andrew found himself trying to understand what was going on in the world. Studying history and international relations gave him some perspective and led him on his career path which included an introduction to museum industry at the 9/11 Museum. After a stint in academia in the UK, Andrew found his way back to the US and eventually ended up at the International Spy Museum in Washington, DC. He said one of the "greatest parts of the job being able to engage with the artifacts" and share their stories. We thank Andrew for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 26 Dec 2021 08:00:00 -0000</pubDate>
      <itunes:title>Encore: Andrew Hammond: Understanding the plot. [Historian and Curator] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>60</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Historian and Curator at the International Spy Museum., Dr.. Andrew Hammond, shares how he came to share the history of espionage and intelligence as a career.  </itunes:subtitle>
      <itunes:summary>Historian and Curator at the International Spy Museum. Dr. Andrew Hammond, shares how he came to share the history of espionage and intelligence as a career. Starting out in the Royal Air Force when 9/11 happened, Andrew found himself trying to understand what was going on in the world. Studying history and international relations gave him some perspective and led him on his career path which included an introduction to museum industry at the 9/11 Museum. After a stint in academia in the UK, Andrew found his way back to the US and eventually ended up at the International Spy Museum in Washington, DC. He said one of the "greatest parts of the job being able to engage with the artifacts" and share their stories. We thank Andrew for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Historian and Curator at the International Spy Museum. Dr. Andrew Hammond, shares how he came to share the history of espionage and intelligence as a career. Starting out in the Royal Air Force when 9/11 happened, Andrew found himself trying to understand what was going on in the world. Studying history and international relations gave him some perspective and led him on his career path which included an introduction to museum industry at the 9/11 Museum. After a stint in academia in the UK, Andrew found his way back to the US and eventually ended up at the International Spy Museum in Washington, DC. He said one of the "greatest parts of the job being able to engage with the artifacts" and share their stories. We thank Andrew for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>456</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[038032d4-6356-11ec-a670-aff1207fd3db]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8314603190.mp3?updated=1640198308" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CyberWire Pro Research Briefing from 12/21/2021.</title>
      <description>Enjoy a peek into CyberWire Pro's Research Briefing as the team is off taking our long winter's nap. This is the spoken edition of our weekly Research Briefing, focused on threats, vulnerabilities, and consequences, as they’re played out in cyberspace. This week's headlines: US Commission on International Religious Freedom reportedly hacked. Sophistication of NSO exploit on par with nation-state tooling. Conti ransomware actors exploit Log4Shell. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Dec 2021 08:00:00 -0000</pubDate>
      <itunes:title>CyberWire Pro Research Briefing from 12/21/2021.</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy a peek into CyberWire Pro's Research Briefing as the team is off taking our long winter's nap. This is the spoken edition of our weekly Research Briefing, focused on threats, vulnerabilities, and consequences, as they’re played out in cyberspace. This week's headlines: US Commission on International Religious Freedom reportedly hacked. Sophistication of NSO exploit on par with nation-state tooling. Conti ransomware actors exploit Log4Shell. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy a peek into CyberWire Pro's Research Briefing as the team is off taking our long winter's nap. This is the spoken edition of our weekly Research Briefing, focused on threats, vulnerabilities, and consequences, as they’re played out in cyberspace. This week's headlines: US Commission on International Religious Freedom reportedly hacked. Sophistication of NSO exploit on par with nation-state tooling. Conti ransomware actors exploit Log4Shell. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. <a href="https://thecyberwire.com/pro">Learn more</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>544</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5de4a52e-634d-11ec-8e40-d71a98c9f883]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1802762128.mp3?updated=1640194525" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire: The 12 Days of Malware.</title>
      <link>https://thecyberwire.com/stories/f765b7d394aa4c16840fd96d405c2ee7/the-cyberwire-the-12-days-of-malware</link>
      <description>Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings &amp; Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out our video for the full effect!

The 12 Days of Malware lyrics
On the first day of Christmas, my malware gave to me:
A keylogger logging my keys.

On the second day of Christmas, my malware gave to me:
2 Trojan Apps...
And a keylogger logging my keys.

On the third day of Christmas, my malware gave to me:
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fourth day of Christmas, my malware gave to me:
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fifth day of Christmas, my malware gave to me:
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the sixth day of Christmas, my malware gave to me:
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the seventh day of Christmas, my malware gave to me:
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eighth day of Christmas, my malware gave to me:
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the ninth day of Christmas, my malware gave to me:
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the tenth day of Christmas, my malware gave to me:
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eleventh day of Christmas, my malware gave to me:
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the twelfth day of Christmas, my malware gave to me:
12 Hackers hacking...
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Dec 2021 08:00:00 -0000</pubDate>
      <itunes:title>The CyberWire: The 12 Days of Malware.</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings &amp; Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out our video for the full effect!

The 12 Days of Malware lyrics
On the first day of Christmas, my malware gave to me:
A keylogger logging my keys.

On the second day of Christmas, my malware gave to me:
2 Trojan Apps...
And a keylogger logging my keys.

On the third day of Christmas, my malware gave to me:
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fourth day of Christmas, my malware gave to me:
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the fifth day of Christmas, my malware gave to me:
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the sixth day of Christmas, my malware gave to me:
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the seventh day of Christmas, my malware gave to me:
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eighth day of Christmas, my malware gave to me:
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the ninth day of Christmas, my malware gave to me:
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the tenth day of Christmas, my malware gave to me:
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the eleventh day of Christmas, my malware gave to me:
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days! (Bah-dum-dum-dum!)
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.

On the twelfth day of Christmas, my malware gave to me:
12 Hackers hacking...
11 Phishers phishing...
10 Darknet markets...
9 Rootkits rooting...
8 Worms a wiping...
7 Scripts a scraping...
6 Passwords spraying...
5 Zero Days!
4 Crypto scams...
3 Web shells...
2 Trojan Apps...
And a keylogger logging my keys.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings &amp; Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out <a href="https://cms.megaphone.fm/organizations/cd9023bc-9a2c-11ea-bbcb-a7f75b26f845/podcasts/f648c30a-dcde-11ea-aec8-7b76c1eb0a95/episodes/2406c22e-635c-11ec-aff6-db28c974e98c/thecyberwire.com/stories/f765b7d394aa4c16840fd96d405c2ee7/the-cyberwire-the-12-days-of-malware">our video</a> for the full effect!</p><p><br></p><p><strong>The 12 Days of Malware lyrics</strong></p><p><em>On the first day of Christmas, my malware gave to me:</em></p><p><em>A keylogger logging my keys.</em></p><p><br></p><p><em>On the second day of Christmas, my malware gave to me:</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the third day of Christmas, my malware gave to me:</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the fourth day of Christmas, my malware gave to me:</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the fifth day of Christmas, my malware gave to me:</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the sixth day of Christmas, my malware gave to me:</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the seventh day of Christmas, my malware gave to me:</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the eighth day of Christmas, my malware gave to me:</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the ninth day of Christmas, my malware gave to me:</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the tenth day of Christmas, my malware gave to me:</em></p><p><em>10 Darknet markets...</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days! (Bah-dum-dum-dum!)</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the eleventh day of Christmas, my malware gave to me:</em></p><p><em>11 Phishers phishing...</em></p><p><em>10 Darknet markets...</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days! (Bah-dum-dum-dum!)</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p><br></p><p><em>On the twelfth day of Christmas, my malware gave to me:</em></p><p><em>12 Hackers hacking...</em></p><p><em>11 Phishers phishing...</em></p><p><em>10 Darknet markets...</em></p><p><em>9 Rootkits rooting...</em></p><p><em>8 Worms a wiping...</em></p><p><em>7 Scripts a scraping...</em></p><p><em>6 Passwords spraying...</em></p><p><em>5 Zero Days!</em></p><p><em>4 Crypto scams...</em></p><p><em>3 Web shells...</em></p><p><em>2 Trojan Apps...</em></p><p><em>And a keylogger logging my keys.</em></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>448</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8d050cdc-6360-11ec-9ab2-436946331bd1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3567293798.mp3?updated=1640203827" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CyberWire Pro Interview Selects: Hatem Naguib of Barracuda Networks.</title>
      <description>During our winter break, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. On this episode, the interview originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner speaks with Hatem Naguib, new CEO of Barracuda Networks, to discuss his views on how cybersecurity trends have drastically changed over the past year, including the rise of ransomware. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 24 Dec 2021 21:00:00 -0000</pubDate>
      <itunes:title>CyberWire Pro Interview Selects: Hatem Naguib of Barracuda Networks.</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>During our winter break, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. On this episode, the interview originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner speaks with Hatem Naguib, new CEO of Barracuda Networks, to discuss his views on how cybersecurity trends have drastically changed over the past year, including the rise of ransomware. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>During our winter break, our team thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. On this episode, the interview originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner speaks with Hatem Naguib, new CEO of Barracuda Networks, to discuss his views on how cybersecurity trends have drastically changed over the past year, including the rise of ransomware. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. <a href="https://thecyberwire.com/pro">Learn more.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>659</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c9b6fbb0-6345-11ec-b625-b317f369b8ab]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7713002005.mp3?updated=1640191260" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Log4j updates, including one deadline. Other, non-Log4j, challenges. RSAC postpones itself until June. A German court awards pain-and-suffering damages in a breach case. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1485/notes</link>
      <description>An update of where things stand with respect to the Log4j vulnerabilities, and a reminder that there are other matters to attend to as well. RSAC postpones its annual security shindig to June, hoping to avoid the COVID. A German court awards pain-and-suffering damages for a data breach. Carole Theriault looks at hiring challenges in cyber. Robert M. Lee from Dragos with insights from his own entrepreneurial journey. And a new start-up seeks to take lemons and make them into lemonade.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/245
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 23 Dec 2021 21:15:00 -0000</pubDate>
      <itunes:title>Log4j updates, including one deadline. Other, non-Log4j, challenges. RSAC postpones itself until June. A German court awards pain-and-suffering damages in a breach case. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1485</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An update of where things stand with respect to the Log4j vulnerabilities, and a reminder that there are other matters to attend to as well. RSAC postpones its annual security shindig to June, hoping to avoid the COVID. A German court awards pain-and-suffering damages for a data breach. Carole Theriault looks at hiring challenges in cyber. Robert M. Lee from Dragos with insights from his own entrepreneurial journey. And a new start-up seeks to take lemons and make them into lemonade.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/245
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An update of where things stand with respect to the Log4j vulnerabilities, and a reminder that there are other matters to attend to as well. RSAC postpones its annual security shindig to June, hoping to avoid the COVID. A German court awards pain-and-suffering damages for a data breach. Carole Theriault looks at hiring challenges in cyber. Robert M. Lee from Dragos with insights from his own entrepreneurial journey. And a new start-up seeks to take lemons and make them into lemonade.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/245</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1649</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f43f26d0-642d-11ec-94b5-1bf0f33fa396]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1603420507.mp3?updated=1690293090" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Five Eyes have some joint advice on detecting, defending against, and responding to Log4j exploitation. Notes on ransomware, espionage, and cyber conflict. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1484/notes</link>
      <description>More criminals exploit vulnerabilities in Log4j. The Five Eyes issue a joint advisory on Log4j-related vulnerabilities, as other government organizations look into defending themselves against Log4shell. Ransomware updates. Russo-Ukrainian tensions rise, as does the likelihood of Russian cyberattacks against its neighbor. Uganda and NSO Group’s troubles. CISA issues six ICS advisories. Malek Ben Salem explains synthetic voices. Our guest is Dr. David Lanc from Ionburst on embracing Data Out protection. And some advice on how to be the family help desk and CISO during the holiday season.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/244
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 22 Dec 2021 21:15:00 -0000</pubDate>
      <itunes:title>The Five Eyes have some joint advice on detecting, defending against, and responding to Log4j exploitation. Notes on ransomware, espionage, and cyber conflict. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1484</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>More criminals exploit vulnerabilities in Log4j. The Five Eyes issue a joint advisory on Log4j-related vulnerabilities, as other government organizations look into defending themselves against Log4shell. Ransomware updates. Russo-Ukrainian tensions rise, as does the likelihood of Russian cyberattacks against its neighbor. Uganda and NSO Group’s troubles. CISA issues six ICS advisories. Malek Ben Salem explains synthetic voices. Our guest is Dr. David Lanc from Ionburst on embracing Data Out protection. And some advice on how to be the family help desk and CISO during the holiday season.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/244
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>More criminals exploit vulnerabilities in Log4j. The Five Eyes issue a joint advisory on Log4j-related vulnerabilities, as other government organizations look into defending themselves against Log4shell. Ransomware updates. Russo-Ukrainian tensions rise, as does the likelihood of Russian cyberattacks against its neighbor. Uganda and NSO Group’s troubles. CISA issues six ICS advisories. Malek Ben Salem explains synthetic voices. Our guest is Dr. David Lanc from Ionburst on embracing Data Out protection. And some advice on how to be the family help desk and CISO during the holiday season.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/244</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1645</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[122cec28-364d-11eb-b082-6f263c089b93]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9528651584.mp3?updated=1690293076" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Belgium’s MoD suffers Log4shell attack. A man-in-the-middle concept. APT activity. Five Russians face US charges (one’s in custody). Fortunes of coin-mining. Holiday greetings from CISA and the FBI.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1483/notes</link>
      <description>Belgium’s Ministry of Defense comes under attack via Log4j vulnerabilities. A cellular handover, man-in-the-middle exploit is described by researchers. The FBI says an APT group is exploiting unpatched Zoho ManageEngine Desktop Central servers. The US charges five Russian nationals with a range of cybercrimes. Coin-miners in China feel some heat. Ben Yelin describes a Meta lawsuit targeting anonymous phishers. Our guest Todd Carroll of CybelAngel explains the shifting tactics of “troll farms”. And, Grinchbots aside, CISA and the FBI offer holiday greetings and advice.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/243
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Dec 2021 21:15:00 -0000</pubDate>
      <itunes:title>Belgium’s MoD suffers Log4shell attack. A man-in-the-middle concept. APT activity. Five Russians face US charges (one’s in custody). Fortunes of coin-mining. Holiday greetings from CISA and the FBI.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1483</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Belgium’s Ministry of Defense comes under attack via Log4j vulnerabilities. A cellular handover, man-in-the-middle exploit is described by researchers. The FBI says an APT group is exploiting unpatched Zoho ManageEngine Desktop Central servers. The US charges five Russian nationals with a range of cybercrimes. Coin-miners in China feel some heat. Ben Yelin describes a Meta lawsuit targeting anonymous phishers. Our guest Todd Carroll of CybelAngel explains the shifting tactics of “troll farms”. And, Grinchbots aside, CISA and the FBI offer holiday greetings and advice.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/243
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Belgium’s Ministry of Defense comes under attack via Log4j vulnerabilities. A cellular handover, man-in-the-middle exploit is described by researchers. The FBI says an APT group is exploiting unpatched Zoho ManageEngine Desktop Central servers. The US charges five Russian nationals with a range of cybercrimes. Coin-miners in China feel some heat. Ben Yelin describes a Meta lawsuit targeting anonymous phishers. Our guest Todd Carroll of CybelAngel explains the shifting tactics of “troll farms”. And, Grinchbots aside, CISA and the FBI offer holiday greetings and advice.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/243</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1627</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11d24a5c-364d-11eb-b082-3ffd748b6d9a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5963868956.mp3?updated=1690293066" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Log4j: new exploitation, new mitigations, new risk assessments. Service interruptions, Space Force’s capture-the-flag, and official interventions. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1482/notes</link>
      <description>Updates on Log4j vulnerabilities: new exploitation, new mitigations, new risk assessments, some good advice from the NCSC, and from Betsy Carmelite and Mike Saxton, analysts at Booz Allen Hamilton. Kronos interruptions continue into the holiday season. NCA shares compromised passwords with Have I Been Pwned. A power grid security exercise in Ukraine, AWS outage last week put down to congestion. Hack-A-Sat promises more transparency. Tis the season for charity scams, as Carole Theriault reports. And the SEC wants financial services companies to use proper channels, not, say, WhatsApp and personal email.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/242
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 20 Dec 2021 21:15:00 -0000</pubDate>
      <itunes:title>Log4j: new exploitation, new mitigations, new risk assessments. Service interruptions, Space Force’s capture-the-flag, and official interventions. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1482</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Updates on Log4j vulnerabilities: new exploitation, new mitigations, new risk assessments, some good advice from the NCSC, and from Betsy Carmelite and Mike Saxton, analysts at Booz Allen Hamilton. Kronos interruptions continue into the holiday season. NCA shares compromised passwords with Have I Been Pwned. A power grid security exercise in Ukraine, AWS outage last week put down to congestion. Hack-A-Sat promises more transparency. Tis the season for charity scams, as Carole Theriault reports. And the SEC wants financial services companies to use proper channels, not, say, WhatsApp and personal email.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/242
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Updates on Log4j vulnerabilities: new exploitation, new mitigations, new risk assessments, some good advice from the NCSC, and from Betsy Carmelite and Mike Saxton, analysts at Booz Allen Hamilton. Kronos interruptions continue into the holiday season. NCA shares compromised passwords with Have I Been Pwned. A power grid security exercise in Ukraine, AWS outage last week put down to congestion. Hack-A-Sat promises more transparency. Tis the season for charity scams, as Carole Theriault reports. And the SEC wants financial services companies to use proper channels, not, say, WhatsApp and personal email.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/242</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1551</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11c182a8-364d-11eb-b082-270f67c77798]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7388797039.mp3?updated=1690293049" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ed Amoroso: Security shouldn't be the main dish. [Computer Science] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/80/notes</link>
      <description>Chief Executive Officer and Founder of TAG Cyber, Ed Amoroso, shares how he learned on the job and grew his career. In his words, Ed "went from my dad having an ARPANET connection and I'm learning Pascal, to Bell Labs, to CISO, to business, to quitting, to starting something new. And now I'm riding a new exponential up and it's a hell of a ride." Hear from Ed how he sees security as a side dish that you'll progress into naturally once you've paid your dues and mastered a skill like networking, software or databases. We thank Ed for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 19 Dec 2021 08:00:00 -0000</pubDate>
      <itunes:title>Ed Amoroso: Security shouldn't be the main dish. [Computer Science] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>80</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Chief Executive Officer and Founder of TAG Cyber, Ed Amoroso, shares how he learned on the job and grew his career. </itunes:subtitle>
      <itunes:summary>Chief Executive Officer and Founder of TAG Cyber, Ed Amoroso, shares how he learned on the job and grew his career. In his words, Ed "went from my dad having an ARPANET connection and I'm learning Pascal, to Bell Labs, to CISO, to business, to quitting, to starting something new. And now I'm riding a new exponential up and it's a hell of a ride." Hear from Ed how he sees security as a side dish that you'll progress into naturally once you've paid your dues and mastered a skill like networking, software or databases. We thank Ed for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chief Executive Officer and Founder of TAG Cyber, Ed Amoroso, shares how he learned on the job and grew his career. In his words, Ed "went from my dad having an ARPANET connection and I'm learning Pascal, to Bell Labs, to CISO, to business, to quitting, to starting something new. And now I'm riding a new exponential up and it's a hell of a ride." Hear from Ed how he sees security as a side dish that you'll progress into naturally once you've paid your dues and mastered a skill like networking, software or databases. We thank Ed for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>558</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ba69b32e-5e8f-11ec-9cfb-7369a1955092]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9197623088.mp3?updated=1639672218" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Discovering ChaosDB, a critical vulnerability in the CosmosDB. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/213/notes</link>
      <description>Guests Sagi Tzadik and Nir Ohfeld of cloud security company Wiz join Dave to discuss their research "ChaosDB: How we hacked thousands of Azure customers’ databases." Nearly everything we do online these days runs through applications and databases in the cloud. While leaky storage buckets get a lot of attention, database exposure is the bigger risk for most companies because each one can contain millions or even billions of sensitive records. Every CISO’s nightmare is someone getting their access keys and exfiltrating gigabytes of data in one fell swoop.
Database exposures have become alarmingly common in recent years as more companies move to the cloud, and the culprit is usually a misconfiguration in the customer’s environment. In this case, customers were not at fault.
The research can be found here:

ChaosDB: How we hacked thousands of Azure customers’ databases

ChaosDB: How to discover your vulnerable Azure Cosmos DBs and protect them


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Dec 2021 08:00:00 -0000</pubDate>
      <itunes:title>Discovering ChaosDB, a critical vulnerability in the CosmosDB. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>213</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guests Sagi Tzadik and Nir Ohfeld of cloud security company Wiz join Dave to discuss their research "ChaosDB: How we hacked thousands of Azure customers’ databases." Nearly everything we do online these days runs through applications and databases in the cloud. While leaky storage buckets get a lot of attention, database exposure is the bigger risk for most companies because each one can contain millions or even billions of sensitive records. Every CISO’s nightmare is someone getting their access keys and exfiltrating gigabytes of data in one fell swoop.
Database exposures have become alarmingly common in recent years as more companies move to the cloud, and the culprit is usually a misconfiguration in the customer’s environment. In this case, customers were not at fault.
The research can be found here:

ChaosDB: How we hacked thousands of Azure customers’ databases

ChaosDB: How to discover your vulnerable Azure Cosmos DBs and protect them


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guests Sagi Tzadik and Nir Ohfeld of cloud security company Wiz join Dave to discuss their research "ChaosDB: How we hacked thousands of Azure customers’ databases." Nearly everything we do online these days runs through applications and databases in the cloud. While leaky storage buckets get a lot of attention, database exposure is the bigger risk for most companies because each one can contain millions or even billions of sensitive records. Every CISO’s nightmare is someone getting their access keys and exfiltrating gigabytes of data in one fell swoop.</p><p>Database exposures have become alarmingly common in recent years as more companies move to the cloud, and the culprit is usually a misconfiguration in the customer’s environment. In this case, customers were not at fault.</p><p>The research can be found here:</p><ul>
<li><a href="https://www.wiz.io/blog/chaosdb-how-we-hacked-thousands-of-azure-customers-databases">ChaosDB: How we hacked thousands of Azure customers’ databases</a></li>
<li><a href="https://www.wiz.io/blog/protecting-your-environment-from-chaosdb">ChaosDB: How to discover your vulnerable Azure Cosmos DBs and protect them</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>986</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[54e65444-5d27-11ec-8425-e3a2390eb258]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8611027059.mp3?updated=1685126459" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Log4j updates, with a side of Fancy Bear. Roots of Huawei’s career as a security risk. Tropic Trooper is back. Meta boots “cyber mercenaries.” Other cyberespionage incidents. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1481/notes</link>
      <description>It seems that Fancy Bear may be interested in Log4shell after all. CISA issues Emergency Directive 22-02, which addressed Log4j. Huawei’s reputation as a security risk may be traceable to a 2012 incident in an Australian telco’s networks. Tropic Trooper is back, and interested in transportation. Meta kicks out seven “cyber mercenary” surveillance outfits. PseudoManusrypt looks curiously indiscriminate. Johannes Ullrich from SANS Technology Institute on making the great Chinese firewall work for you. Our guest is Terry Halvorsen from IBM on next-gen cybersecurity efforts to fix the cybersecurity inequity. And the US Commission on International Religious Freedom is reportedly hacked.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/241
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 17 Dec 2021 21:15:00 -0000</pubDate>
      <itunes:title>Log4j updates, with a side of Fancy Bear. Roots of Huawei’s career as a security risk. Tropic Trooper is back. Meta boots “cyber mercenaries.” Other cyberespionage incidents. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1481</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>It seems that Fancy Bear may be interested in Log4shell after all. CISA issues Emergency Directive 22-02, which addressed Log4j. Huawei’s reputation as a security risk may be traceable to a 2012 incident in an Australian telco’s networks. Tropic Trooper is back, and interested in transportation. Meta kicks out seven “cyber mercenary” surveillance outfits. PseudoManusrypt looks curiously indiscriminate. Johannes Ullrich from SANS Technology Institute on making the great Chinese firewall work for you. Our guest is Terry Halvorsen from IBM on next-gen cybersecurity efforts to fix the cybersecurity inequity. And the US Commission on International Religious Freedom is reportedly hacked.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/241
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>It seems that Fancy Bear may be interested in Log4shell after all. CISA issues Emergency Directive 22-02, which addressed Log4j. Huawei’s reputation as a security risk may be traceable to a 2012 incident in an Australian telco’s networks. Tropic Trooper is back, and interested in transportation. Meta kicks out seven “cyber mercenary” surveillance outfits. PseudoManusrypt looks curiously indiscriminate. Johannes Ullrich from SANS Technology Institute on making the great Chinese firewall work for you. Our guest is Terry Halvorsen from IBM on next-gen cybersecurity efforts to fix the cybersecurity inequity. And the US Commission on International Religious Freedom is reportedly hacked.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/241</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1526</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[12b70de0-364d-11eb-b082-c3c3abc0a7ed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7076367898.mp3?updated=1690293031" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Log4Shell exploited by criminals and intelligence services. Private sector offensive cyber capabilities. Noberus ransomware used in double-extortion attacks. Squid Game phishbait.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1480/notes</link>
      <description>Log4Shell is exploited by criminals and intelligence services. Private sector offensive cyber capabilities are on par with nation-states. Noberus ransomware is used in double-extortion attacks. Malek Ben Salem from Accenture looks at cyber twins. Our guest is Tom Kellermann from VMware with reaction to CISA’s Binding Operational Directive. And Squid Game phishbait.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/240
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 16 Dec 2021 21:15:00 -0000</pubDate>
      <itunes:title>Log4Shell exploited by criminals and intelligence services. Private sector offensive cyber capabilities. Noberus ransomware used in double-extortion attacks. Squid Game phishbait.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1480</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Log4Shell is exploited by criminals and intelligence services. Private sector offensive cyber capabilities are on par with nation-states. Noberus ransomware is used in double-extortion attacks. Malek Ben Salem from Accenture looks at cyber twins. Our guest is Tom Kellermann from VMware with reaction to CISA’s Binding Operational Directive. And Squid Game phishbait.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/240
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Log4Shell is exploited by criminals and intelligence services. Private sector offensive cyber capabilities are on par with nation-states. Noberus ransomware is used in double-extortion attacks. Malek Ben Salem from Accenture looks at cyber twins. Our guest is Tom Kellermann from VMware with reaction to CISA’s Binding Operational Directive. And Squid Game phishbait.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/240</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1587</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[126c1d8a-364d-11eb-b082-abc04c46f413]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5697101942.mp3?updated=1690293019" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Log4j and Log4shell updates. Cyberespionage and C2C market developments. Patch Tuesday notes. And how do you pronounce that, anyway?. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1479/notes</link>
      <description>A second vulnerability is found and fixed in Log4j as both criminals and nation-state intelligence services increase their exploitation of Log4shell. Iranian intelligence services have been actively conducting cyberespionage against a range of targets in the Middle East and Asia. Andrea Little Limbago from Interos checks in on supply chain issues. Our guest is Suzy Greenberg from Intel with a look ahead toward the coming year. A quick look back at Patch Tuesday, and, finally, some musing on literacy, orality, and the way you pronounce stuff people tweet about...

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/239
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 15 Dec 2021 21:15:00 -0000</pubDate>
      <itunes:title>Log4j and Log4shell updates. Cyberespionage and C2C market developments. Patch Tuesday notes. And how do you pronounce that, anyway?. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1479</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A second vulnerability is found and fixed in Log4j as both criminals and nation-state intelligence services increase their exploitation of Log4shell. Iranian intelligence services have been actively conducting cyberespionage against a range of targets in the Middle East and Asia. Andrea Little Limbago from Interos checks in on supply chain issues. Our guest is Suzy Greenberg from Intel with a look ahead toward the coming year. A quick look back at Patch Tuesday, and, finally, some musing on literacy, orality, and the way you pronounce stuff people tweet about...

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/239
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A second vulnerability is found and fixed in Log4j as both criminals and nation-state intelligence services increase their exploitation of Log4shell. Iranian intelligence services have been actively conducting cyberespionage against a range of targets in the Middle East and Asia. Andrea Little Limbago from Interos checks in on supply chain issues. Our guest is Suzy Greenberg from Intel with a look ahead toward the coming year. A quick look back at Patch Tuesday, and, finally, some musing on literacy, orality, and the way you pronounce stuff people tweet about...</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/239</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1695</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[12181974-364d-11eb-b082-479de0a26f0d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5674497146.mp3?updated=1690293007" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Log4Shell updates. Payroll provider disrupted by ransomware. Companies supporting surveillance distance themselves from the business. Cybercrime and IRL punishment.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1478/notes</link>
      <description>An update on the Log4shell, and how it’s being exploited in the wild. A ransomware attack disrupts a cloud-based business service provider. NSO Group is said to be considering selling off its Pegasus unit. A marketing presentation suggests Huawei has been deeply implicated in providing tools for Chinese repression. Nigeria’s cyber gangs are actng like Murder, Inc. An arrest in Romania, sentences in Germany. Joe Carrigan looks at the language of cyber security. Our guest Brad Hawkins of SaferNet wonders if digital privacy even exists anymore. And news from Mars.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/238
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Dec 2021 21:15:00 -0000</pubDate>
      <itunes:title>Log4Shell updates. Payroll provider disrupted by ransomware. Companies supporting surveillance distance themselves from the business. Cybercrime and IRL punishment.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1478</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An update on the Log4shell, and how it’s being exploited in the wild. A ransomware attack disrupts a cloud-based business service provider. NSO Group is said to be considering selling off its Pegasus unit. A marketing presentation suggests Huawei has been deeply implicated in providing tools for Chinese repression. Nigeria’s cyber gangs are actng like Murder, Inc. An arrest in Romania, sentences in Germany. Joe Carrigan looks at the language of cyber security. Our guest Brad Hawkins of SaferNet wonders if digital privacy even exists anymore. And news from Mars.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/238
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An update on the Log4shell, and how it’s being exploited in the wild. A ransomware attack disrupts a cloud-based business service provider. NSO Group is said to be considering selling off its Pegasus unit. A marketing presentation suggests Huawei has been deeply implicated in providing tools for Chinese repression. Nigeria’s cyber gangs are actng like Murder, Inc. An arrest in Romania, sentences in Germany. Joe Carrigan looks at the language of cyber security. Our guest Brad Hawkins of SaferNet wonders if digital privacy even exists anymore. And news from Mars.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/238</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1920</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11e32124-364d-11eb-b082-476c5883bc87]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1493269327.mp3?updated=1690292991" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Updates on Log4shell, now being exploited in the wild. India PM’s Twitter account is hijacked. Extortion at Brazil’s Ministry of Health and Volvo. Phishing sites’ lifespan. Sentence passed. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1477/notes</link>
      <description>The Log4shell vulnerability is trouble, and its remediation isn’t going to be quick or easy. In India, Prime Minister Modi’s Twitter account was hijacked. Official Brazilian COVID vaccination data bases are stolen and rendered unavailable. Extortionists claim to have taken sensitive, proprietary R&amp;D information from Volvo. Phishing sites appear and vanish in a matter of hours. Rick the Toolman Howard expands his cast of characters. Robert M. Lee from Dragos shines a light on solar storms and risk management. And sentence is passed in a case related to the Kelihos botnet.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/237
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 13 Dec 2021 21:15:00 -0000</pubDate>
      <itunes:title>Updates on Log4shell, now being exploited in the wild. India PM’s Twitter account is hijacked. Extortion at Brazil’s Ministry of Health and Volvo. Phishing sites’ lifespan. Sentence passed. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1477</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Log4shell vulnerability is trouble, and its remediation isn’t going to be quick or easy. In India, Prime Minister Modi’s Twitter account was hijacked. Official Brazilian COVID vaccination data bases are stolen and rendered unavailable. Extortionists claim to have taken sensitive, proprietary R&amp;D information from Volvo. Phishing sites appear and vanish in a matter of hours. Rick the Toolman Howard expands his cast of characters. Robert M. Lee from Dragos shines a light on solar storms and risk management. And sentence is passed in a case related to the Kelihos botnet.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/237
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Log4shell vulnerability is trouble, and its remediation isn’t going to be quick or easy. In India, Prime Minister Modi’s Twitter account was hijacked. Official Brazilian COVID vaccination data bases are stolen and rendered unavailable. Extortionists claim to have taken sensitive, proprietary R&amp;D information from Volvo. Phishing sites appear and vanish in a matter of hours. Rick the Toolman Howard expands his cast of characters. Robert M. Lee from Dragos shines a light on solar storms and risk management. And sentence is passed in a case related to the Kelihos botnet.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/237</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1634</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11b04b0a-364d-11eb-b082-d3b08dcdce02]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2376659640.mp3?updated=1690292973" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hannah Kenney: Focused on people. [Risk] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/79/notes</link>
      <description>Manager in BARR Advisory's Cyber Risk Advisory Practice, Hannah Kenney, shares her journey from never considering technology as a career to having it click in an informations systems class in college. After noticing she was the only one in the room who enjoyed the lecture, Hannah knew she wanted to go down the technology route. In talking about her work, Hannah describes it as creative problem solving. She hopes "people see me as someone who viewed cybersecurity and risk as something that is focused on people first and foremost." We thank Hannah for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 12 Dec 2021 08:00:00 -0000</pubDate>
      <itunes:title>Hannah Kenney: Focused on people. [Risk] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>79</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Manager in BARR Advisory's Cyber Risk Advisory Practice, Hannah Kenney, shares her journey from never considering technology as a career to having it click in an informations systems class in college. </itunes:subtitle>
      <itunes:summary>Manager in BARR Advisory's Cyber Risk Advisory Practice, Hannah Kenney, shares her journey from never considering technology as a career to having it click in an informations systems class in college. After noticing she was the only one in the room who enjoyed the lecture, Hannah knew she wanted to go down the technology route. In talking about her work, Hannah describes it as creative problem solving. She hopes "people see me as someone who viewed cybersecurity and risk as something that is focused on people first and foremost." We thank Hannah for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Manager in BARR Advisory's Cyber Risk Advisory Practice, Hannah Kenney, shares her journey from never considering technology as a career to having it click in an informations systems class in college. After noticing she was the only one in the room who enjoyed the lecture, Hannah knew she wanted to go down the technology route. In talking about her work, Hannah describes it as creative problem solving. She hopes "people see me as someone who viewed cybersecurity and risk as something that is focused on people first and foremost." We thank Hannah for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>391</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e4ca6bfc-586a-11ec-81a1-973af8792605]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4642506892.mp3?updated=1639672842" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FIN7 repositioning focus into ransomware. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/212/notes</link>
      <description>Guest Ilya Volovik, Team Lead of Cyber Intelligence at Gemini Advisory, discusses his team's work on "FIN7 Recruits Talent For Push Into Ransomware." The cybercriminal group FIN7 gained notoriety in the mid-2010s for large-scale malware campaigns targeting the point-of-sale (POS) systems. In 2018, Gemini Advisory reported FIN7’s compromise of Saks Fifth Avenue and Lord &amp; Taylor stores and the subsequent sale of over 5 million payment cards on the dark web. According to the US Department of Justice, the broader FIN7 carding campaigns have resulted in the theft of over 20 million payment card records and cost victims over $1 billion, making FIN7 one of the most infamous and prolific cybercriminal groups of the last decade. Now with ransomware proving to be cybercriminals’ preferred high-profit, jackpot venture, FIN7 has redeployed their expertise and capacity towards ransomware, with reports indicating that the group was involved in attempted ransomware attacks on US companies as early as 2020. Furthermore, despite focus from law enforcement and the arrest of four FIN7 members from 2018 to 2020, FIN7’s continued activity shows that the group remains a powerful, active threat.
The research can be found here:
FIN7 Recruits Talent For Push Into Ransomware

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Dec 2021 08:00:00 -0000</pubDate>
      <itunes:title>FIN7 repositioning focus into ransomware. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>212</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Ilya Volovik, Team Lead of Cyber Intelligence at Gemini Advisory, discusses his team's work on "FIN7 Recruits Talent For Push Into Ransomware." The cybercriminal group FIN7 gained notoriety in the mid-2010s for large-scale malware campaigns targeting the point-of-sale (POS) systems. In 2018, Gemini Advisory reported FIN7’s compromise of Saks Fifth Avenue and Lord &amp; Taylor stores and the subsequent sale of over 5 million payment cards on the dark web. According to the US Department of Justice, the broader FIN7 carding campaigns have resulted in the theft of over 20 million payment card records and cost victims over $1 billion, making FIN7 one of the most infamous and prolific cybercriminal groups of the last decade. Now with ransomware proving to be cybercriminals’ preferred high-profit, jackpot venture, FIN7 has redeployed their expertise and capacity towards ransomware, with reports indicating that the group was involved in attempted ransomware attacks on US companies as early as 2020. Furthermore, despite focus from law enforcement and the arrest of four FIN7 members from 2018 to 2020, FIN7’s continued activity shows that the group remains a powerful, active threat.
The research can be found here:
FIN7 Recruits Talent For Push Into Ransomware

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Ilya Volovik, Team Lead of Cyber Intelligence at Gemini Advisory, discusses his team's work on "FIN7 Recruits Talent For Push Into Ransomware." The cybercriminal group FIN7 gained notoriety in the mid-2010s for large-scale malware campaigns targeting the point-of-sale (POS) systems. In 2018, Gemini Advisory reported FIN7’s compromise of Saks Fifth Avenue and Lord &amp; Taylor stores and the subsequent sale of over 5 million payment cards on the dark web. According to the US Department of Justice, the broader FIN7 carding campaigns have resulted in the theft of over 20 million payment card records and cost victims over $1 billion, making FIN7 one of the most infamous and prolific cybercriminal groups of the last decade. Now with ransomware proving to be cybercriminals’ preferred high-profit, jackpot venture, FIN7 has redeployed their expertise and capacity towards ransomware, with reports indicating that the group was involved in attempted ransomware attacks on US companies as early as 2020. Furthermore, despite focus from law enforcement and the arrest of four FIN7 members from 2018 to 2020, FIN7’s continued activity shows that the group remains a powerful, active threat.</p><p>The research can be found here:</p><ul><li><a href="https://geminiadvisory.io/fin7-ransomware-bastion-secure/">FIN7 Recruits Talent For Push Into Ransomware</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1685</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e1a61980-5865-11ec-a309-534f0cf85f32]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4709511770.mp3?updated=1685126455" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage in Southeast Asia. Two young extortion gangs make their bones. Bot-herders like MikroTik devices. Log4Shell zero-day exploited in the wild. Update on the Assange case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1476/notes</link>
      <description>Cyberespionage in support of Belt and Road, and of Beijing’s claims in the South China Sea. Karakurt ransomware skips the encryption and goes right to the doxing. Black Cat ransomware is rising. Vulnerable MikroTik devices are bot-herders’ favorites. The Log4Shell zero-day is being exploited in the wild, and will be a tough one to remediate. Julian Assange moves closer to extradition. Johannes Ullrich on changing user behavior. Our guest is Oliver Rochford of Securonix on the affordability of good security. And shoulder-surfing as a threat to Snapchat users.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/236
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 10 Dec 2021 21:15:00 -0000</pubDate>
      <itunes:title>Cyberespionage in Southeast Asia. Two young extortion gangs make their bones. Bot-herders like MikroTik devices. Log4Shell zero-day exploited in the wild. Update on the Assange case.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1476</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cyberespionage in support of Belt and Road, and of Beijing’s claims in the South China Sea. Karakurt ransomware skips the encryption and goes right to the doxing. Black Cat ransomware is rising. Vulnerable MikroTik devices are bot-herders’ favorites. The Log4Shell zero-day is being exploited in the wild, and will be a tough one to remediate. Julian Assange moves closer to extradition. Johannes Ullrich on changing user behavior. Our guest is Oliver Rochford of Securonix on the affordability of good security. And shoulder-surfing as a threat to Snapchat users.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/236
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyberespionage in support of Belt and Road, and of Beijing’s claims in the South China Sea. Karakurt ransomware skips the encryption and goes right to the doxing. Black Cat ransomware is rising. Vulnerable MikroTik devices are bot-herders’ favorites. The Log4Shell zero-day is being exploited in the wild, and will be a tough one to remediate. Julian Assange moves closer to extradition. Johannes Ullrich on changing user behavior. Our guest is Oliver Rochford of Securonix on the affordability of good security. And shoulder-surfing as a threat to Snapchat users.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/236</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1470</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[12a598ee-364d-11eb-b082-bbb97ce08641]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2630922058.mp3?updated=1690292958" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware gangs, paycard skimmers, and Grinchbots. Russia blocks Tor, and the US Senate holds hearings on social media and its arguably malign influence on youth. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1475/notes</link>
      <description>Conti continues, undeterred. Magecart skimmers are infesting WooCommerce instances. Users are finding url redirection attacks difficult to detect. A quick look at the workings of the Hive ransomware gang. Russia blocks Tor. The US Senate holds hearings on social media and adolescent mental health. Dinah Davis from Arctic Wolf on assessing your security posture. Our guest Neal Dennis of Cyware discusses Automation And Unification. And Grinchbots are still prowling for presents. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/235
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 09 Dec 2021 21:15:00 -0000</pubDate>
      <itunes:title>Ransomware gangs, paycard skimmers, and Grinchbots. Russia blocks Tor, and the US Senate holds hearings on social media and its arguably malign influence on youth. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1475</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Conti continues, undeterred. Magecart skimmers are infesting WooCommerce instances. Users are finding url redirection attacks difficult to detect. A quick look at the workings of the Hive ransomware gang. Russia blocks Tor. The US Senate holds hearings on social media and adolescent mental health. Dinah Davis from Arctic Wolf on assessing your security posture. Our guest Neal Dennis of Cyware discusses Automation And Unification. And Grinchbots are still prowling for presents. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/235
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Conti continues, undeterred. Magecart skimmers are infesting WooCommerce instances. Users are finding url redirection attacks difficult to detect. A quick look at the workings of the Hive ransomware gang. Russia blocks Tor. The US Senate holds hearings on social media and adolescent mental health. Dinah Davis from Arctic Wolf on assessing your security posture. Our guest Neal Dennis of Cyware discusses Automation And Unification. And Grinchbots are still prowling for presents. </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/235</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1881</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1259f1d2-364d-11eb-b082-634b94d8fc2c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6700061429.mp3?updated=1690292948" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AWS resolves service issues. A summit stand-off. Dark web chatter, and arbitrage courts in the C2C world. Looking for stolen or lost alt-coin. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1474/notes</link>
      <description>Amazon resolves its Tuesday outage as observers wonder about cloud risks. A stand-off at the Russo-American summit, but chatter in the dark web suggests that the Russophone underworld is feeling uneasy. A look at the arbitrage process that governs the criminal-to-criminal market. Carole Theriault reads the fine print. Andrea Little Limbago looks at global regulatory regimes. A DeFi platform asks for its stolen money back, and a guy looks for his private key in a physical garbage dump.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/234
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 08 Dec 2021 21:15:00 -0000</pubDate>
      <itunes:title>AWS resolves service issues. A summit stand-off. Dark web chatter, and arbitrage courts in the C2C world. Looking for stolen or lost alt-coin. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1474</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Amazon resolves its Tuesday outage as observers wonder about cloud risks. A stand-off at the Russo-American summit, but chatter in the dark web suggests that the Russophone underworld is feeling uneasy. A look at the arbitrage process that governs the criminal-to-criminal market. Carole Theriault reads the fine print. Andrea Little Limbago looks at global regulatory regimes. A DeFi platform asks for its stolen money back, and a guy looks for his private key in a physical garbage dump.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/234
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Amazon resolves its Tuesday outage as observers wonder about cloud risks. A stand-off at the Russo-American summit, but chatter in the dark web suggests that the Russophone underworld is feeling uneasy. A look at the arbitrage process that governs the criminal-to-criminal market. Carole Theriault reads the fine print. Andrea Little Limbago looks at global regulatory regimes. A DeFi platform asks for its stolen money back, and a guy looks for his private key in a physical garbage dump.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/234</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1444</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1205d3d6-364d-11eb-b082-f7767ab61349]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7470686522.mp3?updated=1690292923" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Russo-US summit is expected to take up tension over Ukraine and tensions in cyberspace. Microsoft disrupts APT15. Google disrupts Glupteba. Satoshi Nakamoto is...out there still?</title>
      <description>Notes on today’s Russo-America summit. Microsoft seizes websites used by the Chinese threat actor Nickel. Google takes technical and legal action against a Russian botnet. Ben Yelin unpacks Australia’s aim to uncover online trolls. Our guest is Ed Amorosa from TAG Cyber. And the real Satoshi Nakamoto has yet to stand up--just ask a Florida jury.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/233
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Dec 2021 21:15:00 -0000</pubDate>
      <itunes:title>The Russo-US summit is expected to take up tension over Ukraine and tensions in cyberspace. Microsoft disrupts APT15. Google disrupts Glupteba. Satoshi Nakamoto is...out there still?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1473</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Notes on today’s Russo-America summit. Microsoft seizes websites used by the Chinese threat actor Nickel. Google takes technical and legal action against a Russian botnet. Ben Yelin unpacks Australia’s aim to uncover online trolls. Our guest is Ed Amorosa from TAG Cyber. And the real Satoshi Nakamoto has yet to stand up--just ask a Florida jury.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/233
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Notes on today’s Russo-America summit. Microsoft seizes websites used by the Chinese threat actor Nickel. Google takes technical and legal action against a Russian botnet. Ben Yelin unpacks Australia’s aim to uncover online trolls. Our guest is Ed Amorosa from TAG Cyber. And the real Satoshi Nakamoto has yet to stand up--just ask a Florida jury.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/233</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1730</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[119de3ac-364d-11eb-b082-47fc5f041116]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8487458709.mp3?updated=1690292910" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hot wallets hacked. Pegasus found in US State Department personnel’s phones. Cozy Bear update. Cybersecurity on the Russo-US summit agenda. US Cyber Command says it’s imposing costs. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1472/notes</link>
      <description>Cryptocurrency exchange loses almost $200 million as two hot wallets are compromised. Phones belonging to US State Department personnel concerned with Uganda are found to have been infected with NSO Group’s Pegasus surveillance technology. Mandiant reports recent activity by the threat group thought responsible for the SolarWinds compromise. Cybersecurity will be on the agenda at tomorrow’s Russo-US summit. Caleb Barlow outlines threats to the Winter Olympics. Rick the-toolman Howard looks at the marketing hype-cycle. And US Cyber Command says it’s been imposing costs.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/232
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 06 Dec 2021 21:15:00 -0000</pubDate>
      <itunes:title>Hot wallets hacked. Pegasus found in US State Department personnel’s phones. Cozy Bear update. Cybersecurity on the Russo-US summit agenda. US Cyber Command says it’s imposing costs. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1472</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cryptocurrency exchange loses almost $200 million as two hot wallets are compromised. Phones belonging to US State Department personnel concerned with Uganda are found to have been infected with NSO Group’s Pegasus surveillance technology. Mandiant reports recent activity by the threat group thought responsible for the SolarWinds compromise. Cybersecurity will be on the agenda at tomorrow’s Russo-US summit. Caleb Barlow outlines threats to the Winter Olympics. Rick the-toolman Howard looks at the marketing hype-cycle. And US Cyber Command says it’s been imposing costs.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/232
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cryptocurrency exchange loses almost $200 million as two hot wallets are compromised. Phones belonging to US State Department personnel concerned with Uganda are found to have been infected with NSO Group’s Pegasus surveillance technology. Mandiant reports recent activity by the threat group thought responsible for the SolarWinds compromise. Cybersecurity will be on the agenda at tomorrow’s Russo-US summit. Caleb Barlow outlines threats to the Winter Olympics. Rick the-toolman Howard looks at the marketing hype-cycle. And US Cyber Command says it’s been imposing costs.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/232</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1447</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[107c6476-364d-11eb-b082-d70f4bc20688]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5803122115.mp3?updated=1690292893" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ryan Kovar: Everyday, assume compromise. [Strategy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/78/notes</link>
      <description>Distinguished Security Strategist at Splunk, Ryan Kovar, shares his journey that started in the US Navy and how it contributed to his leadership in life after the military. Cutting his teeth as sysadmin on the USS Kitty Hawk, Ryan worked as a contractor following the Navy. At Splunk, he leads the SURGe research team to solve what he calls the "blue collar for the blue team problems". He works hard on incorporating diversity of thought. Ryan notes, "I've been doing cybersecurity or IT now for over 20 years and of that 20 years of knowledge, only about five years of that knowledge is really relevant. You can't sit on your laurels in this industry." We thank Ryan for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 05 Dec 2021 08:00:00 -0000</pubDate>
      <itunes:title>Ryan Kovar: Everyday, assume compromise. [Strategy] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>78</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Distinguished Security Strategist at Splunk, Ryan Kovar, shares his journey from the Navy and how it contributed to his leadership in life after the military. </itunes:subtitle>
      <itunes:summary>Distinguished Security Strategist at Splunk, Ryan Kovar, shares his journey that started in the US Navy and how it contributed to his leadership in life after the military. Cutting his teeth as sysadmin on the USS Kitty Hawk, Ryan worked as a contractor following the Navy. At Splunk, he leads the SURGe research team to solve what he calls the "blue collar for the blue team problems". He works hard on incorporating diversity of thought. Ryan notes, "I've been doing cybersecurity or IT now for over 20 years and of that 20 years of knowledge, only about five years of that knowledge is really relevant. You can't sit on your laurels in this industry." We thank Ryan for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Distinguished Security Strategist at Splunk, Ryan Kovar, shares his journey that started in the US Navy and how it contributed to his leadership in life after the military. Cutting his teeth as sysadmin on the USS Kitty Hawk, Ryan worked as a contractor following the Navy. At Splunk, he leads the SURGe research team to solve what he calls the "blue collar for the blue team problems". He works hard on incorporating diversity of thought. Ryan notes, "I've been doing cybersecurity or IT now for over 20 years and of that 20 years of knowledge, only about five years of that knowledge is really relevant. You can't sit on your laurels in this industry." We thank Ryan for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>449</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[704bd612-53ab-11ec-8270-372351966bb9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8107681426.mp3?updated=1638474846" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rediscover trust in cybersecurity: A women in cybersecurity podcast. [Special edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/42/notes</link>
      <description>It's important for employees to be brought into the fold as security's allies, rather than as its adversaries. For cybersecurity teams that operate with an adversarial mindset appropriate for external threats, it can be challenging to approach internal threats differently. You can't treat employees the same way you treat nation-state hackers. But employees play a pivotal role in preventing data leaks, making it important to create a company-wide culture of transparency. Transparency feeds trust, which builds a strong foundation for Security Awareness Training to be truly effective.
The CyberWire's Jennifer Eiben hosts this women in cybersecurity podcast. Kathleen Smith of ClearedJobs.Net moderates the panel. Panelists include Michelle Killian from Sponsor Code 42, Sam Humphries of Exabeam, and Masha Sedova of Elevate Security.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 05 Dec 2021 08:00:00 -0000</pubDate>
      <itunes:title>Rediscover trust in cybersecurity: A women in cybersecurity podcast. [Special edition]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>42</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>It's important for employees to be brought into the fold as security's allies, rather than as its adversaries. For cybersecurity teams that operate with an adversarial mindset appropriate for external threats, it can be challenging to approach internal threats differently. You can't treat employees the same way you treat nation-state hackers. But employees play a pivotal role in preventing data leaks, making it important to create a company-wide culture of transparency. Transparency feeds trust, which builds a strong foundation for Security Awareness Training to be truly effective.
The CyberWire's Jennifer Eiben hosts this women in cybersecurity podcast. Kathleen Smith of ClearedJobs.Net moderates the panel. Panelists include Michelle Killian from Sponsor Code 42, Sam Humphries of Exabeam, and Masha Sedova of Elevate Security.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>It's important for employees to be brought into the fold as security's allies, rather than as its adversaries. For cybersecurity teams that operate with an adversarial mindset appropriate for external threats, it can be challenging to approach internal threats differently. You can't treat employees the same way you treat nation-state hackers. But employees play a pivotal role in preventing data leaks, making it important to create a company-wide culture of transparency. Transparency feeds trust, which builds a strong foundation for Security Awareness Training to be truly effective.</p><p>The CyberWire's Jennifer Eiben hosts this women in cybersecurity podcast. Kathleen Smith of ClearedJobs.Net moderates the panel. Panelists include Michelle Killian from Sponsor Code 42, Sam Humphries of Exabeam, and Masha Sedova of Elevate Security.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2781</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[981e4e0c-52e5-11ec-bcbe-bf1d01f2588a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5548294498.mp3?updated=1663083155" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Getting in and getting out with SnapMC. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/210/notes</link>
      <description>Guest Christo Butcher of NCC Group's Research and Intelligence Fusion Team discusses their research into a cybercriminal group they dubbed SnapMC. Forget ransomware, too expensive and too much hassle. Randomly enter through a known vulnerability, take a look around, lock away data and leave again. And all that within half an hour: hit &amp; run. An email is then sent to the affected organization: pay or else the stolen data will be published and/or sold.
This is the opportunistic approach of a new group of blackmailers who don't even bother to encrypt data. NCC Group has given them the name SnapMC: a combination of 'snap' (a sudden, sharp cracking sound or movement) and MC, from mc.exe, the primary tool they use to exfiltrate data. They have only seen SnapMC's attacks in the Netherlands for the time being. They do not target specific sectors and we have not (yet) been able to associate them with known attackers.
The research can be found here:

SnapMC: extortion without ransomware

SnapMC skips ransomware, steals data


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Dec 2021 08:00:00 -0000</pubDate>
      <itunes:title>Getting in and getting out with SnapMC. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>211</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Christo Butcher of NCC Group's Research and Intelligence Fusion Team discusses their research into a cybercriminal group they dubbed SnapMC. Forget ransomware, too expensive and too much hassle. Randomly enter through a known vulnerability, take a look around, lock away data and leave again. And all that within half an hour: hit &amp; run. An email is then sent to the affected organization: pay or else the stolen data will be published and/or sold.
This is the opportunistic approach of a new group of blackmailers who don't even bother to encrypt data. NCC Group has given them the name SnapMC: a combination of 'snap' (a sudden, sharp cracking sound or movement) and MC, from mc.exe, the primary tool they use to exfiltrate data. They have only seen SnapMC's attacks in the Netherlands for the time being. They do not target specific sectors and we have not (yet) been able to associate them with known attackers.
The research can be found here:

SnapMC: extortion without ransomware

SnapMC skips ransomware, steals data


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Christo Butcher of NCC Group's Research and Intelligence Fusion Team discusses their research into a cybercriminal group they dubbed SnapMC. Forget ransomware, too expensive and too much hassle. Randomly enter through a known vulnerability, take a look around, lock away data and leave again. And all that within half an hour: hit &amp; run. An email is then sent to the affected organization: pay or else the stolen data will be published and/or sold.</p><p>This is the opportunistic approach of a new group of blackmailers who don't even bother to encrypt data. NCC Group has given them the name SnapMC: a combination of 'snap' (a sudden, sharp cracking sound or movement) and MC, from mc.exe, the primary tool they use to exfiltrate data. They have only seen SnapMC's attacks in the Netherlands for the time being. They do not target specific sectors and we have not (yet) been able to associate them with known attackers.</p><p>The research can be found here:</p><ul>
<li><a href="https://newsroom.nccgroup.com/blog_posts/snapmc-extortion-without-ransomware-104333">SnapMC: extortion without ransomware</a></li>
<li><a href="https://research.nccgroup.com/2021/10/11/snapmc-skips-ransomware-steals-data/">SnapMC skips ransomware, steals data</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1041</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b539751c-52c1-11ec-8a67-ef9e5062b40f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9667930012.mp3?updated=1685126440" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Espionage phishbait in South and Southwest Asia. A utility recovers from a cyber incident. GAO tells the US Congress cyber strategy is wanting. Investigations, Moscow and Missouri style.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1471/notes</link>
      <description>SideCopy, a Pakistani APT, is phishing for information in both India and Afghanistan. A Colorado electrical utility continues to recover from a cyber incident it sustained early last month. The GAO tells the US Congress that the nation still lacks a comprehensive cybersecurity strategy. The Missouri Highway Patrol continues, for some reason, to investigate a responsible disclosure as a criminal hack. Dinah Davis from Arctic Wolf on hackers targeting Minecraft. Our guest is Blake Darché from Area 1 Security with research on phishing. And it appears Moscow thinks a Group-IB leader outed Fancy Bear to the US. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/231
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 03 Dec 2021 21:15:00 -0000</pubDate>
      <itunes:title>Espionage phishbait in South and Southwest Asia. A utility recovers from a cyber incident. GAO tells the US Congress cyber strategy is wanting. Investigations, Moscow and Missouri style.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1471</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>SideCopy, a Pakistani APT, is phishing for information in both India and Afghanistan. A Colorado electrical utility continues to recover from a cyber incident it sustained early last month. The GAO tells the US Congress that the nation still lacks a comprehensive cybersecurity strategy. The Missouri Highway Patrol continues, for some reason, to investigate a responsible disclosure as a criminal hack. Dinah Davis from Arctic Wolf on hackers targeting Minecraft. Our guest is Blake Darché from Area 1 Security with research on phishing. And it appears Moscow thinks a Group-IB leader outed Fancy Bear to the US. 

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/231
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>SideCopy, a Pakistani APT, is phishing for information in both India and Afghanistan. A Colorado electrical utility continues to recover from a cyber incident it sustained early last month. The GAO tells the US Congress that the nation still lacks a comprehensive cybersecurity strategy. The Missouri Highway Patrol continues, for some reason, to investigate a responsible disclosure as a criminal hack. Dinah Davis from Arctic Wolf on hackers targeting Minecraft. Our guest is Blake Darché from Area 1 Security with research on phishing. And it appears Moscow thinks a Group-IB leader outed Fancy Bear to the US. </p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/231</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1527</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[129336b8-364d-11eb-b082-0b9911649829]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8043942747.mp3?updated=1690292879" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More APT activity. Brigading, Mass Reporting, and Coordinated Inauthentic Behavior. CISA names the CSAC members. Cybercriminals sentenced. A whistleblower with an ulterior motive?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1470/notes</link>
      <description>An APT is exploiting Internet-facing instances of ServiceDesk Plus. Meta releases its end-of-year Adversarial Threat Report, and adds “Brigading” and “Mass Reporting” to “Coordinated Inauthentic Behavior” as activities that will get accounts shut down. CISA names the first members of its Cybersecurity Advisory Committee. Sentencing, American and Russian style. Malek Ben Salem has a look at cyber resilience. Our guest is PJ Kirner from Illumio with a look ahead to 2022. And an alleged false whistleblower is under indictment, and under arrest.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/230
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 02 Dec 2021 21:15:00 -0000</pubDate>
      <itunes:title>More APT activity. Brigading, Mass Reporting, and Coordinated Inauthentic Behavior. CISA names the CSAC members. Cybercriminals sentenced. A whistleblower with an ulterior motive?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1470</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An APT is exploiting Internet-facing instances of ServiceDesk Plus. Meta releases its end-of-year Adversarial Threat Report, and adds “Brigading” and “Mass Reporting” to “Coordinated Inauthentic Behavior” as activities that will get accounts shut down. CISA names the first members of its Cybersecurity Advisory Committee. Sentencing, American and Russian style. Malek Ben Salem has a look at cyber resilience. Our guest is PJ Kirner from Illumio with a look ahead to 2022. And an alleged false whistleblower is under indictment, and under arrest.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/230
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An APT is exploiting Internet-facing instances of ServiceDesk Plus. Meta releases its end-of-year Adversarial Threat Report, and adds “Brigading” and “Mass Reporting” to “Coordinated Inauthentic Behavior” as activities that will get accounts shut down. CISA names the first members of its Cybersecurity Advisory Committee. Sentencing, American and Russian style. Malek Ben Salem has a look at cyber resilience. Our guest is PJ Kirner from Illumio with a look ahead to 2022. And an alleged false whistleblower is under indictment, and under arrest.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/230</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1526</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[12434cf2-364d-11eb-b082-eb8ae832a748]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7944171062.mp3?updated=1690292869" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trends among the APTs. Imaginary times and imaginary places. Flubot in Finland. Emotet false alarms in Office. Smishing for Iranian Android users. CISA’s ICS advisories. Moscow on cybercrime. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1469/notes</link>
      <description>RTF template injection is newly favored by APTs. Malware hides in February 31st. Milords and miladies, the Principality of Sealand hath been hacked. Finland's National Cyber Security Center warns of a large-scale Flubot campaign in progress. False alarms are flagging Emotet where it isn’t found. Iranians victimized by a smishing campaign. CISA issues industrial control system advisories. Kevin Magee from Microsoft is really trying to rid the world of passwords. Our guest is Mike Hendrickson of Skillsoft to discuss turning the tide in this fight against cybercrime. And Mr. Putin says Russia’s in favor of international cooperation against cybercrime.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/229
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 01 Dec 2021 21:20:00 -0000</pubDate>
      <itunes:title>Trends among the APTs. Imaginary times and imaginary places. Flubot in Finland. Emotet false alarms in Office. Smishing for Iranian Android users. CISA’s ICS advisories. Moscow on cybercrime. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1469</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>RTF template injection is newly favored by APTs. Malware hides in February 31st. Milords and miladies, the Principality of Sealand hath been hacked. Finland's National Cyber Security Center warns of a large-scale Flubot campaign in progress. False alarms are flagging Emotet where it isn’t found. Iranians victimized by a smishing campaign. CISA issues industrial control system advisories. Kevin Magee from Microsoft is really trying to rid the world of passwords. Our guest is Mike Hendrickson of Skillsoft to discuss turning the tide in this fight against cybercrime. And Mr. Putin says Russia’s in favor of international cooperation against cybercrime.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/229
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>RTF template injection is newly favored by APTs. Malware hides in February 31st. Milords and miladies, the Principality of Sealand hath been hacked. Finland's National Cyber Security Center warns of a large-scale Flubot campaign in progress. False alarms are flagging Emotet where it isn’t found. Iranians victimized by a smishing campaign. CISA issues industrial control system advisories. Kevin Magee from Microsoft is really trying to rid the world of passwords. Our guest is Mike Hendrickson of Skillsoft to discuss turning the tide in this fight against cybercrime. And Mr. Putin says Russia’s in favor of international cooperation against cybercrime.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/229</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1731</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11f378da-364d-11eb-b082-e3aef9cb29d7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8794554849.mp3?updated=1690292855" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybercrime and the criminal-to-criminal markets that support it during the holiday shopping season. Shaming as a pressure tactic. Living large, even when living on the lam. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1468/notes</link>
      <description>Today, it’s all crime all the time. Cybercrime, the C2C underground market, and the expansive holiday shopping season. Rebranding in gangland. How crooks exclude targets on the basis of language or geolocation. Shaming as a criminal pressure tactic. Bad apps in the Play Store. Andrea Little Limbago looks at internet blackouts. Carole Theriault wonders what the Metaverse really means. And living large while living on the lam.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/228
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Nov 2021 21:15:00 -0000</pubDate>
      <itunes:title>Cybercrime and the criminal-to-criminal markets that support it during the holiday shopping season. Shaming as a pressure tactic. Living large, even when living on the lam. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1468</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Today, it’s all crime all the time. Cybercrime, the C2C underground market, and the expansive holiday shopping season. Rebranding in gangland. How crooks exclude targets on the basis of language or geolocation. Shaming as a criminal pressure tactic. Bad apps in the Play Store. Andrea Little Limbago looks at internet blackouts. Carole Theriault wonders what the Metaverse really means. And living large while living on the lam.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/228
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today, it’s all crime all the time. Cybercrime, the C2C underground market, and the expansive holiday shopping season. Rebranding in gangland. How crooks exclude targets on the basis of language or geolocation. Shaming as a criminal pressure tactic. Bad apps in the Play Store. Andrea Little Limbago looks at internet blackouts. Carole Theriault wonders what the Metaverse really means. And living large while living on the lam.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/228</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1545</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1092cb26-364d-11eb-b082-e7907b1c6e33]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1258887187.mp3?updated=1690292839" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Reply-chain attacks. Intelligence services go phishing. Civilian targets hit in Israeli-Iranian cyber conflict. The Entity List expands. Russo-Ukrainian tensions rise.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1467/notes</link>
      <description>A reply-chain incident is reported at a major international furniture and housewares retailer. North Korean operators are phishing for South Korean marks using bogus Samsung recruiting emails as phishbait. Fancy Bear has been seen pawing at Gmail. A regional escalation to civilian targets in the cyber conflict between Iran and Israel. More organizations are added to the US Entity List. Johannes Ullrich looks at decrypting Cobalt Strike. Our own Rick Howard wonders if executive really need to know how to drive that tank. And tension between Russia and Ukraine continues to rise.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/227
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 29 Nov 2021 21:15:00 -0000</pubDate>
      <itunes:title>Reply-chain attacks. Intelligence services go phishing. Civilian targets hit in Israeli-Iranian cyber conflict. The Entity List expands. Russo-Ukrainian tensions rise.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1467</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A reply-chain incident is reported at a major international furniture and housewares retailer. North Korean operators are phishing for South Korean marks using bogus Samsung recruiting emails as phishbait. Fancy Bear has been seen pawing at Gmail. A regional escalation to civilian targets in the cyber conflict between Iran and Israel. More organizations are added to the US Entity List. Johannes Ullrich looks at decrypting Cobalt Strike. Our own Rick Howard wonders if executive really need to know how to drive that tank. And tension between Russia and Ukraine continues to rise.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/227
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A reply-chain incident is reported at a major international furniture and housewares retailer. North Korean operators are phishing for South Korean marks using bogus Samsung recruiting emails as phishbait. Fancy Bear has been seen pawing at Gmail. A regional escalation to civilian targets in the cyber conflict between Iran and Israel. More organizations are added to the US Entity List. Johannes Ullrich looks at decrypting Cobalt Strike. Our own Rick Howard wonders if executive really need to know how to drive that tank. And tension between Russia and Ukraine continues to rise.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/227</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1300</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[106861ba-364d-11eb-b082-ab5f747bcb80]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2269344652.mp3?updated=1690292829" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Anisha Patel: Right along with them. [Program management] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/77/notes</link>
      <description>Associate Director at Raytheon Intelligence and Space in the Cyber Protection Services Division Anisha Patel always loved math and it defined her career journey. As a first-generation American from an Asian household, Anisha said she was destined for a STEM-focused career and chose electrical engineering. She began her career and remains at Raytheon (formerly E-Systems) working in several areas of the business thanks to her skills and informal mentors. Starting a rotational assignment in program management (7 years ago), Anisha said she "went to the dark side and then the hole closed and there I ended up." Anisha talks about the need to bring diversity of thought into the industry and adds to her team with this in mind. We thank Anisha for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 28 Nov 2021 08:00:00 -0000</pubDate>
      <itunes:title>Anisha Patel: Right along with them. [Program management] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>77</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Associate Director at Raytheon Intelligence and Space in the Cyber Protection Services Division Anisha Patel always loved math and it defined her career journey.</itunes:subtitle>
      <itunes:summary>Associate Director at Raytheon Intelligence and Space in the Cyber Protection Services Division Anisha Patel always loved math and it defined her career journey. As a first-generation American from an Asian household, Anisha said she was destined for a STEM-focused career and chose electrical engineering. She began her career and remains at Raytheon (formerly E-Systems) working in several areas of the business thanks to her skills and informal mentors. Starting a rotational assignment in program management (7 years ago), Anisha said she "went to the dark side and then the hole closed and there I ended up." Anisha talks about the need to bring diversity of thought into the industry and adds to her team with this in mind. We thank Anisha for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Associate Director at Raytheon Intelligence and Space in the Cyber Protection Services Division Anisha Patel always loved math and it defined her career journey. As a first-generation American from an Asian household, Anisha said she was destined for a STEM-focused career and chose electrical engineering. She began her career and remains at Raytheon (formerly E-Systems) working in several areas of the business thanks to her skills and informal mentors. Starting a rotational assignment in program management (7 years ago), Anisha said she "went to the dark side and then the hole closed and there I ended up." Anisha talks about the need to bring diversity of thought into the industry and adds to her team with this in mind. We thank Anisha for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>420</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7c43bf3a-4d6f-11ec-b56c-0feb4a64179d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9319356386.mp3?updated=1637789800" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CyberWire Pro Research Briefing from 11/23/2021</title>
      <description>Enjoy a peek into CyberWire Pro's Research Briefing as the team is off recovering from our Thanksgiving feasts. This is the spoken edition of our weekly Research Briefing, focused on threats, vulnerabilities, and consequences, as they’re played out in cyberspace. This week's headlines: Iranian threat actors target the IT supply chain. North Korean cyberespionage. More information on Emotet's return. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Nov 2021 08:00:00 -0000</pubDate>
      <itunes:title>CyberWire Pro Research Briefing from 11/23/2021</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Enjoy a peek into CyberWire Pro's Research Briefing as the team is off recovering from our Thanksgiving feasts. This is the spoken edition of our weekly Research Briefing, focused on threats, vulnerabilities, and consequences, as they’re played out in cyberspace. This week's headlines: Iranian threat actors target the IT supply chain. North Korean cyberespionage. More information on Emotet's return. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Enjoy a peek into CyberWire Pro's Research Briefing as the team is off recovering from our Thanksgiving feasts. This is the spoken edition of our weekly Research Briefing, focused on threats, vulnerabilities, and consequences, as they’re played out in cyberspace. This week's headlines: Iranian threat actors target the IT supply chain. North Korean cyberespionage. More information on Emotet's return. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. <a href="https://thecyberwire.com/pro">Learn more</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>498</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0d687f72-4d49-11ec-b2a6-ff386d6d0517]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5141436988.mp3?updated=1637773475" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CyberWire Pro Interview Selects: Carolyn Crandall of Attivo Networks.</title>
      <description>Our team decided to extend our Thanksgiving holiday and thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. On this episode, the interview October 27th, 2021 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner speaks with Carolyn Crandall of Attivo Networks on what organizations should be focused on to protect AD. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 26 Nov 2021 21:00:00 -0000</pubDate>
      <itunes:title>CyberWire Pro Interview Selects: Carolyn Crandall of Attivo Networks.</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Our team decided to extend our Thanksgiving holiday and thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. On this episode, the interview October 27th, 2021 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner speaks with Carolyn Crandall of Attivo Networks on what organizations should be focused on to protect AD. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our team decided to extend our Thanksgiving holiday and thought you might like to try a sample of a CyberWire Pro podcast called Interview Selects. These podcasts are a series of extended interviews, exclusives, and a curated selection of our most engaging and informative interviews over the years, featuring cyber security professionals, journalists, authors and industry insiders. On this episode, the interview October 27th, 2021 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Dave Bittner speaks with Carolyn Crandall of Attivo Networks on what organizations should be focused on to protect AD. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. <a href="https://thecyberwire.com/pro">Learn more.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>541</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f0e6d862-4d48-11ec-b2a6-cf9530f6c96c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5880898524.mp3?updated=1637773400" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Misdirection and layering with a con in the middle. [Hacking Humans Goes to the Movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/2/notes</link>
      <description>Thanks for joining us for our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Joe's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.
Links to this episode's clips if you'd like to watch along:

Joe's clip from "The Simpsons: Father and Son Grifting" episode

Rick's pick from "Paper Moon"


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 25 Nov 2021 06:00:00 -0000</pubDate>
      <itunes:title>Misdirection and layering with a con in the middle. [Hacking Humans Goes to the Movies]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanks for joining us for our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Joe's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.
Links to this episode's clips if you'd like to watch along:

Joe's clip from "The Simpsons: Father and Son Grifting" episode

Rick's pick from "Paper Moon"


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanks for joining us for our fun project brought to you by the team of Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series where they view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this episode, Dave, Joe and Rick are watching Joe's and Rick's scene picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.</p><p>Links to this episode's clips if you'd like to watch along:</p><ul>
<li>Joe's clip from "<a href="https://www.youtube.com/watch?v=Dy7L_fyYAm8">The Simpsons: Father and Son Grifting</a>" episode</li>
<li>Rick's pick from "<a href="https://www.youtube.com/watch?v=iqueZ1KNeT8">Paper Moon</a>"</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1065</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[145592a2-4c77-11ec-9a53-e70035ac50f5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3799738446.mp3?updated=1668989320" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing in the Iranian diaspora. Not your grandma and grandpa’s crytper. Malware-as-a-service. Proofs-of-concept (one is a zero-day). Apple sues NSO Group.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1466/notes</link>
      <description>An apparent cyberespionage campaign targets the Iranian diaspora. Babadeda is an emerging crypter seeing use against alt-coin and NFt speculators. RATDispenser is out in the wild, a malware-as-a-service operation. Proofs-of-concept published for Microsoft exploits. Apple sues NSO Group. Group-IB’s founder asks President Putin for clemency. Caleb Barlow on the difference between working for a company that is funded by VCs, PEs, angels or is public. Our guest today is Karl Sigler from Trustwave on the results of the 2021 Trustwave SpiderLabs Telemetry Report. And there’s a guilty plea in the Wolf of Sophia case.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/226
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 24 Nov 2021 21:20:00 -0000</pubDate>
      <itunes:title>Phishing in the Iranian diaspora. Not your grandma and grandpa’s crytper. Malware-as-a-service. Proofs-of-concept (one is a zero-day). Apple sues NSO Group.  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1466</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An apparent cyberespionage campaign targets the Iranian diaspora. Babadeda is an emerging crypter seeing use against alt-coin and NFt speculators. RATDispenser is out in the wild, a malware-as-a-service operation. Proofs-of-concept published for Microsoft exploits. Apple sues NSO Group. Group-IB’s founder asks President Putin for clemency. Caleb Barlow on the difference between working for a company that is funded by VCs, PEs, angels or is public. Our guest today is Karl Sigler from Trustwave on the results of the 2021 Trustwave SpiderLabs Telemetry Report. And there’s a guilty plea in the Wolf of Sophia case.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/226
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An apparent cyberespionage campaign targets the Iranian diaspora. Babadeda is an emerging crypter seeing use against alt-coin and NFt speculators. RATDispenser is out in the wild, a malware-as-a-service operation. Proofs-of-concept published for Microsoft exploits. Apple sues NSO Group. Group-IB’s founder asks President Putin for clemency. Caleb Barlow on the difference between working for a company that is funded by VCs, PEs, angels or is public. Our guest today is Karl Sigler from Trustwave on the results of the 2021 Trustwave SpiderLabs Telemetry Report. And there’s a guilty plea in the Wolf of Sophia case.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/226</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1739</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1125c7a0-364d-11eb-b082-c3525ac691dc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8455005071.mp3?updated=1690292816" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tardigrade malware infests the US biomanufacturing sector. GoDaddy suffers a significant data breach. Facebook Papers to be reviewed and released. NSO Group’s troubles.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1465/notes</link>
      <description>Tardigrade malware infests the US biomanufacturing sector. GoDaddy suffers a significant data breach. A Gizmodo-led consortium will review and release the Facebook Papers. Ben Yelin on our privacy rights during emergency situations. Our guest is Ric Longenecker of Open Systems to discuss how ransomware attacks represent the number one threat for universities. And NSO Group may not recover from current controversy over its Pegasus intercept tool.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/225
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Nov 2021 21:20:00 -0000</pubDate>
      <itunes:title>Tardigrade malware infests the US biomanufacturing sector. GoDaddy suffers a significant data breach. Facebook Papers to be reviewed and released. NSO Group’s troubles.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1465</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Tardigrade malware infests the US biomanufacturing sector. GoDaddy suffers a significant data breach. A Gizmodo-led consortium will review and release the Facebook Papers. Ben Yelin on our privacy rights during emergency situations. Our guest is Ric Longenecker of Open Systems to discuss how ransomware attacks represent the number one threat for universities. And NSO Group may not recover from current controversy over its Pegasus intercept tool.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/225
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tardigrade malware infests the US biomanufacturing sector. GoDaddy suffers a significant data breach. A Gizmodo-led consortium will review and release the Facebook Papers. Ben Yelin on our privacy rights during emergency situations. Our guest is Ric Longenecker of Open Systems to discuss how ransomware attacks represent the number one threat for universities. And NSO Group may not recover from current controversy over its Pegasus intercept tool.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/225</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1773</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10aa107e-364d-11eb-b082-3f923738af92]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3905804342.mp3?updated=1690292801" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stealing from the best? An enigma in the criminal-to-criminal market. CISA’s holiday caution. Someone’s impersonating the SEC. Three weekend cyberattacks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1464/notes</link>
      <description>The Lazarus Group seems interested in learning from, by which they mean stealing from, some of the world’s leading state-sponsored cyber operators. Void Balaur remains an enigma, but it’s not the only player in the C2C market. CISA and the FBI warn all, but especially critical infrastructure operators, to remain alert during the holidays. Some scammers are impersonating the US SEC. Dinah Davis from Arctic Wolf on what security gifts to get your family this year. Our guest today is Carole Theriault on online gaming during the pandemic. And cyberattacks are reported on an airline, a utility, and a manufacturer of wind turbines.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/224
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 22 Nov 2021 21:30:00 -0000</pubDate>
      <itunes:title>Stealing from the best? An enigma in the criminal-to-criminal market. CISA’s holiday caution. Someone’s impersonating the SEC. Three weekend cyberattacks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1464</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Lazarus Group seems interested in learning from, by which they mean stealing from, some of the world’s leading state-sponsored cyber operators. Void Balaur remains an enigma, but it’s not the only player in the C2C market. CISA and the FBI warn all, but especially critical infrastructure operators, to remain alert during the holidays. Some scammers are impersonating the US SEC. Dinah Davis from Arctic Wolf on what security gifts to get your family this year. Our guest today is Carole Theriault on online gaming during the pandemic. And cyberattacks are reported on an airline, a utility, and a manufacturer of wind turbines.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/224
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Lazarus Group seems interested in learning from, by which they mean stealing from, some of the world’s leading state-sponsored cyber operators. Void Balaur remains an enigma, but it’s not the only player in the C2C market. CISA and the FBI warn all, but especially critical infrastructure operators, to remain alert during the holidays. Some scammers are impersonating the US SEC. Dinah Davis from Arctic Wolf on what security gifts to get your family this year. Our guest today is Carole Theriault on online gaming during the pandemic. And cyberattacks are reported on an airline, a utility, and a manufacturer of wind turbines.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/224</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1308</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1055778a-364d-11eb-b082-f39d922fe17c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3184635925.mp3?updated=1690292658" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>MK Palmore: Lead from where you stand. [CISO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/76/notes</link>
      <description>Director of Google Cloud's Office of the CISO, MK Palmore, dedicated much of his life to public service and now brings his experience working for the greater good to the private sector. A graduate of the US Naval Academy, including the Naval Academy Prep School that he calls the most impactful educational experience of his life, MK commissioned into the US Marine Corps following his service academy time. He joined the FBI and that is where he came into the cybersecurity realm. MK is passionate about getting more diversity, equity and inclusion into industry. We thank MK for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 21 Nov 2021 08:00:00 -0000</pubDate>
      <itunes:title>MK Palmore: Lead from where you stand. [CISO] [Career Notes]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>76</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Director of Google Cloud's Office of the CISO, MK Palmore, dedicated much of his life to public service and now brings his experience working for the greater good to the private sector.</itunes:subtitle>
      <itunes:summary>Director of Google Cloud's Office of the CISO, MK Palmore, dedicated much of his life to public service and now brings his experience working for the greater good to the private sector. A graduate of the US Naval Academy, including the Naval Academy Prep School that he calls the most impactful educational experience of his life, MK commissioned into the US Marine Corps following his service academy time. He joined the FBI and that is where he came into the cybersecurity realm. MK is passionate about getting more diversity, equity and inclusion into industry. We thank MK for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Director of Google Cloud's Office of the CISO, MK Palmore, dedicated much of his life to public service and now brings his experience working for the greater good to the private sector. A graduate of the US Naval Academy, including the Naval Academy Prep School that he calls the most impactful educational experience of his life, MK commissioned into the US Marine Corps following his service academy time. He joined the FBI and that is where he came into the cybersecurity realm. MK is passionate about getting more diversity, equity and inclusion into industry. We thank MK for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>445</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[003e0530-4748-11ec-9241-93e01574e7dd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2616485886.mp3?updated=1637113577" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How ransomware impacts organizations. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/22/notes</link>
      <description>As ransomware attacks rapidly rise in frequency, eye-popping ransom demands grab headlines, and consumers experience product shortages and difficulty accessing services as the organizations they do business with are knocked offline. However, little is reported about the impact of a ransomware attack inside an organization. However, little is reported about the impact of a ransomware attack inside an organization. 
In this show, we cover what steps organizations are taking now to prepare for a ransomware attack and what happens to an organization on that especially bad day when ransomware comes calling. The CyberWire's Rick Howard speaks with Hash Table member Don Welch, Vice president for Information Technology and Global Chief Information Officer at New York University, and show sponsor Keeper Security's CEO &amp; Co-Founder Darren Guccione joins The CyberWire's Dave Bittner on this CyberWire-X as they share their expertise on the topic.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 21 Nov 2021 08:00:00 -0000</pubDate>
      <itunes:title>How ransomware impacts organizations. [CyberWire-X]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>22</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>As ransomware attacks rapidly rise in frequency, eye-popping ransom demands grab headlines, and consumers experience product shortages and difficulty accessing services as the organizations they do business with are knocked offline. However, little is reported about the impact of a ransomware attack inside an organization. However, little is reported about the impact of a ransomware attack inside an organization. 
In this show, we cover what steps organizations are taking now to prepare for a ransomware attack and what happens to an organization on that especially bad day when ransomware comes calling. The CyberWire's Rick Howard speaks with Hash Table member Don Welch, Vice president for Information Technology and Global Chief Information Officer at New York University, and show sponsor Keeper Security's CEO &amp; Co-Founder Darren Guccione joins The CyberWire's Dave Bittner on this CyberWire-X as they share their expertise on the topic.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As ransomware attacks rapidly rise in frequency, eye-popping ransom demands grab headlines, and consumers experience product shortages and difficulty accessing services as the organizations they do business with are knocked offline. However, little is reported about the impact of a ransomware attack inside an organization. However, little is reported about the impact of a ransomware attack inside an organization. </p><p>In this show, we cover what steps organizations are taking now to prepare for a ransomware attack and what happens to an organization on that especially bad day when ransomware comes calling. The CyberWire's Rick Howard speaks with Hash Table member Don Welch, Vice president for Information Technology and Global Chief Information Officer at New York University, and show sponsor Keeper Security's CEO &amp; Co-Founder Darren Guccione joins The CyberWire's Dave Bittner on this CyberWire-X as they share their expertise on the topic.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1760</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4ee2fd7a-48ac-11ec-a9e8-db8f411287d6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1983860861.mp3?updated=1640117519" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Using bidirectionality override characters to obscure code. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/210/notes</link>
      <description>Guests Nicholas Boucher and Ross Anderson from the University of Cambridge join Dave Bittner to discuss their research, "Trojan Source: Invisible Vulnerabilities." The researchers present a new type of attack in which source code is maliciously encoded so that it appears different to a compiler and to the human eye. This attack exploits subtleties in text-encoding standards such as Unicode to produce source code whose tokens are logically encoded in a different order from the one in which they are displayed, leading to vulnerabilities that cannot be perceived directly by human code reviewers. ‘Trojan Source’ attacks, as they call them, pose an immediate threat both to first-party software and of supply-chain compromise across the industry. They present working examples of Trojan-Source attacks in C, C++, C#, JavaScript, Java, Rust, Go, and Python. They propose definitive compiler-level defenses, and describe other mitigating controls that can be deployed in editors, repositories, and build pipelines while compilers are upgraded to block this attack.
The project website and research can be found here:

Trojan Source: Invisible Source Code Vulnerabilities project website

Trojan Source: Invisible Vulnerabilities research paper


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Nov 2021 08:00:00 -0000</pubDate>
      <itunes:title>Using bidirectionality override characters to obscure code. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>210</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guests Nicholas Boucher and Ross Anderson from the University of Cambridge join Dave Bittner to discuss their research, "Trojan Source: Invisible Vulnerabilities." The researchers present a new type of attack in which source code is maliciously encoded so that it appears different to a compiler and to the human eye. This attack exploits subtleties in text-encoding standards such as Unicode to produce source code whose tokens are logically encoded in a different order from the one in which they are displayed, leading to vulnerabilities that cannot be perceived directly by human code reviewers. ‘Trojan Source’ attacks, as they call them, pose an immediate threat both to first-party software and of supply-chain compromise across the industry. They present working examples of Trojan-Source attacks in C, C++, C#, JavaScript, Java, Rust, Go, and Python. They propose definitive compiler-level defenses, and describe other mitigating controls that can be deployed in editors, repositories, and build pipelines while compilers are upgraded to block this attack.
The project website and research can be found here:

Trojan Source: Invisible Source Code Vulnerabilities project website

Trojan Source: Invisible Vulnerabilities research paper


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guests Nicholas Boucher and Ross Anderson from the University of Cambridge join Dave Bittner to discuss their research, "Trojan Source: Invisible Vulnerabilities." The researchers present a new type of attack in which source code is maliciously encoded so that it appears different to a compiler and to the human eye. This attack exploits subtleties in text-encoding standards such as Unicode to produce source code whose tokens are logically encoded in a different order from the one in which they are displayed, leading to vulnerabilities that cannot be perceived directly by human code reviewers. ‘Trojan Source’ attacks, as they call them, pose an immediate threat both to first-party software and of supply-chain compromise across the industry. They present working examples of Trojan-Source attacks in C, C++, C#, JavaScript, Java, Rust, Go, and Python. They propose definitive compiler-level defenses, and describe other mitigating controls that can be deployed in editors, repositories, and build pipelines while compilers are upgraded to block this attack.</p><p>The project website and research can be found here:</p><ul>
<li><a href="https://www.trojansource.codes/index/">Trojan Source: Invisible Source Code Vulnerabilities project website</a></li>
<li><a href="https://www.trojansource.codes/trojan-source.pdf">Trojan Source: Invisible Vulnerabilities research paper</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1510</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[42dae46a-4803-11ec-8e91-f3ccdd2130ba]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9573252224.mp3?updated=1685126434" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Software supply chain threats. Recent Iranian cyber operations. Banking disclosure rules. ICS updates. UK, US announce closer cooperation in cyberops. A real, literal, evil maid?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1463/notes</link>
      <description>Software supply chain incidents: FatPipe, PyPi, and IT services generally. A look at recent Iranian operations. The US Federal Reserve publishes its disclosure rules for banks sustaining cyber incidents. CISA issues a set of ICS advisories. Two of the Five Eyes announce plans for continued, even closer cooperation in cyberspace. Johannes Ullrich on attackers abusing "PAM" (Plug Authentication Modules). Our guest is Hatem Naguib, CEO at Barracuda Networks. And a real evil maid seems to have been out and about in Tel Aviv.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/223
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 19 Nov 2021 21:20:00 -0000</pubDate>
      <itunes:title>Software supply chain threats. Recent Iranian cyber operations. Banking disclosure rules. ICS updates. UK, US announce closer cooperation in cyberops. A real, literal, evil maid?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1463</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Software supply chain incidents: FatPipe, PyPi, and IT services generally. A look at recent Iranian operations. The US Federal Reserve publishes its disclosure rules for banks sustaining cyber incidents. CISA issues a set of ICS advisories. Two of the Five Eyes announce plans for continued, even closer cooperation in cyberspace. Johannes Ullrich on attackers abusing "PAM" (Plug Authentication Modules). Our guest is Hatem Naguib, CEO at Barracuda Networks. And a real evil maid seems to have been out and about in Tel Aviv.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/223
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Software supply chain incidents: FatPipe, PyPi, and IT services generally. A look at recent Iranian operations. The US Federal Reserve publishes its disclosure rules for banks sustaining cyber incidents. CISA issues a set of ICS advisories. Two of the Five Eyes announce plans for continued, even closer cooperation in cyberspace. Johannes Ullrich on attackers abusing "PAM" (Plug Authentication Modules). Our guest is Hatem Naguib, CEO at Barracuda Networks. And a real evil maid seems to have been out and about in Tel Aviv.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/223</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1543</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[118c586c-364d-11eb-b082-433e17cd9341]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5346253631.mp3?updated=1690292700" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Developments in cyber gangland, and the increasingly complicated entanglement of crooks and spies. Selling confiscated alt-coin to compensate fraud victims.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1462/notes</link>
      <description>Red Curl is a Russophone gang with an unusual target list. North Korea’s TA406 is having a busy year, hacking for intelligence and for profit. Wicked Panda’s getting good at code-signing, and software supply chain attacks are in Beijing’s long-term plans. A spearphishing campaign abuses legitimate collaboration tools. Kevin Magee from Microsoft has an insider’s look at Windows 11 security. Our guest is Kevin Bocek of Venafi to discuss Security Software Build Environments. And selling confiscated cryptocurrency to compensate victims of scams.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/222
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 18 Nov 2021 21:15:00 -0000</pubDate>
      <itunes:title>Developments in cyber gangland, and the increasingly complicated entanglement of crooks and spies. Selling confiscated alt-coin to compensate fraud victims.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1462</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Red Curl is a Russophone gang with an unusual target list. North Korea’s TA406 is having a busy year, hacking for intelligence and for profit. Wicked Panda’s getting good at code-signing, and software supply chain attacks are in Beijing’s long-term plans. A spearphishing campaign abuses legitimate collaboration tools. Kevin Magee from Microsoft has an insider’s look at Windows 11 security. Our guest is Kevin Bocek of Venafi to discuss Security Software Build Environments. And selling confiscated cryptocurrency to compensate victims of scams.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/222
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Red Curl is a Russophone gang with an unusual target list. North Korea’s TA406 is having a busy year, hacking for intelligence and for profit. Wicked Panda’s getting good at code-signing, and software supply chain attacks are in Beijing’s long-term plans. A spearphishing campaign abuses legitimate collaboration tools. Kevin Magee from Microsoft has an insider’s look at Windows 11 security. Our guest is Kevin Bocek of Venafi to discuss Security Software Build Environments. And selling confiscated cryptocurrency to compensate victims of scams.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/222</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1487</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[115747c6-364d-11eb-b082-bf99d5474d60]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5893054653.mp3?updated=1690292687" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA and its partners warn of Iranian cyber ops. Cyberespionage in the Middle East with Candiru tools. Belarus connected to Ghostwriter. Facebook boots SideCopy. RAMP recruits members.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1461/notes</link>
      <description>CISA, the FBI, the ACSC, and the NCSC issue a joint advisory warning of an Iranian cyber campaign exploiting known vulnerabilities in Fortinet and Microsoft Exchange. A Belarusian connection to Ghostwriter. Candiru tools reported in watering holes. SideCopy’s interest in Afghanistan. RAMP shows an interest in attracting Chinese operators. Josh Ray from Accenture Security digs into the CONTI playbook leak. Our guest is Matt Keeley from Bishop Fox on fuzzing. And Pompompurin wants to sell you leaked Robinhood data.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/221
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 17 Nov 2021 21:15:00 -0000</pubDate>
      <itunes:title>CISA and its partners warn of Iranian cyber ops. Cyberespionage in the Middle East with Candiru tools. Belarus connected to Ghostwriter. Facebook boots SideCopy. RAMP recruits members.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1461</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA, the FBI, the ACSC, and the NCSC issue a joint advisory warning of an Iranian cyber campaign exploiting known vulnerabilities in Fortinet and Microsoft Exchange. A Belarusian connection to Ghostwriter. Candiru tools reported in watering holes. SideCopy’s interest in Afghanistan. RAMP shows an interest in attracting Chinese operators. Josh Ray from Accenture Security digs into the CONTI playbook leak. Our guest is Matt Keeley from Bishop Fox on fuzzing. And Pompompurin wants to sell you leaked Robinhood data.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/221
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA, the FBI, the ACSC, and the NCSC issue a joint advisory warning of an Iranian cyber campaign exploiting known vulnerabilities in Fortinet and Microsoft Exchange. A Belarusian connection to Ghostwriter. Candiru tools reported in watering holes. SideCopy’s interest in Afghanistan. RAMP shows an interest in attracting Chinese operators. Josh Ray from Accenture Security digs into the CONTI playbook leak. Our guest is Matt Keeley from Bishop Fox on fuzzing. And Pompompurin wants to sell you leaked Robinhood data.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/221</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1410</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11153214-364d-11eb-b082-037f11cfa691]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6706131432.mp3?updated=1690292671" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Threats and vulnerabilities, old and new, include Emotet and Mirai. CISA advises of DDS vulnerabilities. Arrest in a revenge porn case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1460/notes</link>
      <description>Older threats, including Emotet and Mirai, are out and about, and an old vulnerability, Rowhammer, gets a fresh proof-of-concept. A new banking Trojan threatens Europe. Intel works on vulnerabilities. CISA advises awareness of recently reported DDS vulnerabilities. Joe Carrigan explains how spearphishers are using customer complaints as bait. Rick Howard epaks with Carlos Vega from Devo on Supply Chain issues. And an arrest is made in a Maryland revenge porn case. 
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/220
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Nov 2021 21:15:00 -0000</pubDate>
      <itunes:title>Threats and vulnerabilities, old and new, include Emotet and Mirai. CISA advises of DDS vulnerabilities. Arrest in a revenge porn case.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1460</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Older threats, including Emotet and Mirai, are out and about, and an old vulnerability, Rowhammer, gets a fresh proof-of-concept. A new banking Trojan threatens Europe. Intel works on vulnerabilities. CISA advises awareness of recently reported DDS vulnerabilities. Joe Carrigan explains how spearphishers are using customer complaints as bait. Rick Howard epaks with Carlos Vega from Devo on Supply Chain issues. And an arrest is made in a Maryland revenge porn case. 
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/220
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Older threats, including Emotet and Mirai, are out and about, and an old vulnerability, Rowhammer, gets a fresh proof-of-concept. A new banking Trojan threatens Europe. Intel works on vulnerabilities. CISA advises awareness of recently reported DDS vulnerabilities. Joe Carrigan explains how spearphishers are using customer complaints as bait. Rick Howard epaks with Carlos Vega from Devo on Supply Chain issues. And an arrest is made in a Maryland revenge porn case. </p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/220</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1760</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10bf6294-364d-11eb-b082-ab18a704c9d5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2812679097.mp3?updated=1690292568" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Official online channels hijacked in separate US, Philippine incidents. Update on MosesStaff, a ransomware group interested in politics, not profit. Costco breach. Ryuk money-laundering case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1459/notes</link>
      <description>Exploitation of a configuration error in the FBI’s Law Enforcement Enterprise Portal enables hackers to send bogus warning emails. Philippine Office of Civil Defense Twitter account briefly hijacked. Update on Iranian politically motivated threat group MosesStaff. Discount retailer Costco discloses a point-of-sale skimmer incident. Dinah Davis from Arctic Wolf track zero days. Rick the Toolman Howard drops by the studio. And the US seeks extradition of a Russian alt-coin baron on charges of laundering Ryuk’s money. 
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/219
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 15 Nov 2021 21:15:00 -0000</pubDate>
      <itunes:title>Official online channels hijacked in separate US, Philippine incidents. Update on MosesStaff, a ransomware group interested in politics, not profit. Costco breach. Ryuk money-laundering case.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1459</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Exploitation of a configuration error in the FBI’s Law Enforcement Enterprise Portal enables hackers to send bogus warning emails. Philippine Office of Civil Defense Twitter account briefly hijacked. Update on Iranian politically motivated threat group MosesStaff. Discount retailer Costco discloses a point-of-sale skimmer incident. Dinah Davis from Arctic Wolf track zero days. Rick the Toolman Howard drops by the studio. And the US seeks extradition of a Russian alt-coin baron on charges of laundering Ryuk’s money. 
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/219
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Exploitation of a configuration error in the FBI’s Law Enforcement Enterprise Portal enables hackers to send bogus warning emails. Philippine Office of Civil Defense Twitter account briefly hijacked. Update on Iranian politically motivated threat group MosesStaff. Discount retailer Costco discloses a point-of-sale skimmer incident. Dinah Davis from Arctic Wolf track zero days. Rick the Toolman Howard drops by the studio. And the US seeks extradition of a Russian alt-coin baron on charges of laundering Ryuk’s money. </p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/219</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1338</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[103bda96-364d-11eb-b082-c3066a848941]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7057410835.mp3?updated=1690292552" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The real costs of ransomware in 2021, 2022, and beyond. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/21/notes</link>
      <description>Ransomware: the problem that everyone is talking about, yet somehow continues to get worse with each passing year. In 2021, the cost of ransomware to global businesses is estimated to reach a whopping $20B. The problem has reached such a critical mass that it can no longer be cast away as some unknowable IT problem–everyone from cyber insurance providers to the federal government have taken note. The CyberWire's Rick Howard speaks with Hash Table member Kevin Ford of Environmental Systems Research Institute (ESRI), and ExtraHop's VP, GM of International and Global Security Programs, Mike Campfield, joins The CyberWire's Dave Bittner on this CyberWire-X for a retrospective on ransomware in 2021. Mike shares his predictions on how it will evolve in 2022 and beyond, and what controls enterprises can put into place to build their resilience to the growing threat.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 14 Nov 2021 08:00:00 -0000</pubDate>
      <itunes:title>The real costs of ransomware in 2021, 2022, and beyond. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>21</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ransomware: the problem that everyone is talking about, yet somehow continues to get worse with each passing year. In 2021, the cost of ransomware to global businesses is estimated to reach a whopping $20B. The problem has reached such a critical mass that it can no longer be cast away as some unknowable IT problem–everyone from cyber insurance providers to the federal government have taken note. The CyberWire's Rick Howard speaks with Hash Table member Kevin Ford of Environmental Systems Research Institute (ESRI), and ExtraHop's VP, GM of International and Global Security Programs, Mike Campfield, joins The CyberWire's Dave Bittner on this CyberWire-X for a retrospective on ransomware in 2021. Mike shares his predictions on how it will evolve in 2022 and beyond, and what controls enterprises can put into place to build their resilience to the growing threat.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ransomware: the problem that everyone is talking about, yet somehow continues to get worse with each passing year. In 2021, the cost of ransomware to global businesses is estimated to reach a whopping $20B. The problem has reached such a critical mass that it can no longer be cast away as some unknowable IT problem–everyone from cyber insurance providers to the federal government have taken note. The CyberWire's Rick Howard speaks with Hash Table member Kevin Ford of Environmental Systems Research Institute (ESRI), and ExtraHop's VP, GM of International and Global Security Programs, Mike Campfield, joins The CyberWire's Dave Bittner on this CyberWire-X for a retrospective on ransomware in 2021. Mike shares his predictions on how it will evolve in 2022 and beyond, and what controls enterprises can put into place to build their resilience to the growing threat.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1687</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c5fe4d74-41b3-11ec-9ae2-63c3f7ab2f0d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9322890173.mp3?updated=1636499893" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Swati Shekhar: Challenges increase your risk appetite. [Engineering] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/75/notes</link>
      <description>Ground Labs' Head of Engineering, Swati Shekhar, shares her circuitous route from and back to engineering. Always being interested in leveraging the tools available to solve problems, Swati talks about how she found her place in engineering. She mentions how she had her first real experience with a computer when she was 17 in her first year at college. Aside from being one of 30 young women in a sea of 500 young men there, Swati described it as a "good culture shock because anything that takes you out of your comfort zone actually makes you learn and grow." She notes that challenges experienced in life increase your risk appetite so significantly. Swati advises those looking to make a job change to be certain of what is attracting them and to be yourself. We thank Swati for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 14 Nov 2021 08:00:00 -0000</pubDate>
      <itunes:title>Swati Shekhar: Challenges increase your risk appetite. [Engineering] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>75</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Ground Labs' Head of Engineering, Swati Shekhar, shares her circuitous route from and back to engineering.</itunes:subtitle>
      <itunes:summary>Ground Labs' Head of Engineering, Swati Shekhar, shares her circuitous route from and back to engineering. Always being interested in leveraging the tools available to solve problems, Swati talks about how she found her place in engineering. She mentions how she had her first real experience with a computer when she was 17 in her first year at college. Aside from being one of 30 young women in a sea of 500 young men there, Swati described it as a "good culture shock because anything that takes you out of your comfort zone actually makes you learn and grow." She notes that challenges experienced in life increase your risk appetite so significantly. Swati advises those looking to make a job change to be certain of what is attracting them and to be yourself. We thank Swati for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ground Labs' Head of Engineering, Swati Shekhar, shares her circuitous route from and back to engineering. Always being interested in leveraging the tools available to solve problems, Swati talks about how she found her place in engineering. She mentions how she had her first real experience with a computer when she was 17 in her first year at college. Aside from being one of 30 young women in a sea of 500 young men there, Swati described it as a "good culture shock because anything that takes you out of your comfort zone actually makes you learn and grow." She notes that challenges experienced in life increase your risk appetite so significantly. Swati advises those looking to make a job change to be certain of what is attracting them and to be yourself. We thank Swati for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>559</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a1e4d274-41a3-11ec-a27d-2bef9d243ef0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8827180824.mp3?updated=1636492810" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A glimpse into TeamTNT. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/209/notes</link>
      <description>Senior Intelligence Researcher at Anomali, Tara Gould, joins Dave to discuss their team's work on "Inside TeamTNT’s Impressive Arsenal: A Look Into A TeamTNT Server." Anomali Threat Research discovered an open server to a directory listing that they attribute with high confidence to the German-speaking threat group, TeamTNT.The server contains source code, scripts, binaries, and cryptominers targeting Cloud environments.Other server contents include Amazon Web Services (AWS) Credentials stolen from TeamTNT stealers are also hosted on the server.
This inside view of TeamTNT infrastructure and tools in use can help security operations teams to improve detection capabilities for related attacks, whether coming directly from TeamTNT or other cybercrime groups leveraging their tools.
The research can be found here:
Inside TeamTNT’s Impressive Arsenal: A Look Into A TeamTNT Server

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Nov 2021 08:00:00 -0000</pubDate>
      <itunes:title>A glimpse into TeamTNT. [Research Saturday]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>209</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a018a7a0-4260-11ec-93bd-07aab2950a2f/image/rs.jpeg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Senior Intelligence Researcher at Anomali, Tara Gould, joins Dave to discuss their team's work on "Inside TeamTNT’s Impressive Arsenal: A Look Into A TeamTNT Server." Anomali Threat Research discovered an open server to a directory listing that they attribute with high confidence to the German-speaking threat group, TeamTNT.The server contains source code, scripts, binaries, and cryptominers targeting Cloud environments.Other server contents include Amazon Web Services (AWS) Credentials stolen from TeamTNT stealers are also hosted on the server.
This inside view of TeamTNT infrastructure and tools in use can help security operations teams to improve detection capabilities for related attacks, whether coming directly from TeamTNT or other cybercrime groups leveraging their tools.
The research can be found here:
Inside TeamTNT’s Impressive Arsenal: A Look Into A TeamTNT Server

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Senior Intelligence Researcher at Anomali, Tara Gould, joins Dave to discuss their team's work on "Inside TeamTNT’s Impressive Arsenal: A Look Into A TeamTNT Server." Anomali Threat Research discovered an open server to a directory listing that they attribute with high confidence to the German-speaking threat group, TeamTNT.The server contains source code, scripts, binaries, and cryptominers targeting Cloud environments.Other server contents include Amazon Web Services (AWS) Credentials stolen from TeamTNT stealers are also hosted on the server.</p><p>This inside view of TeamTNT infrastructure and tools in use can help security operations teams to improve detection capabilities for related attacks, whether coming directly from TeamTNT or other cybercrime groups leveraging their tools.</p><p>The research can be found here:</p><ul><li><a href="https://www.anomali.com/blog/inside-teamtnts-impressive-arsenal-a-look-into-a-teamtnt-server">Inside TeamTNT’s Impressive Arsenal: A Look Into A TeamTNT Server</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>906</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a018a7a0-4260-11ec-93bd-07aab2950a2f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8242718568.mp3?updated=1685126421" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tension in Eastern Europe. A Hong Kong watering hole. US, EU join the Paris Call. Cybermercenaries. CISA’s plans for countering disinformation, and for forming a white-hat hacker advisory group.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1458/notes</link>
      <description>Notes on rising international tension in Eastern Europe. A watering-hole campaign in Hong Kong. The US and the EU have joined the Paris Call. NSO Group’s prospective CEO resigns his position before formally assuming it. Void Balaur, a cybermercenary group, is active in the Russophone cyber underground. Johannes Ullrich on leaked vaccination cards and Covid tests. Our guest is Carolyn Crandall of Attivo Networks on what organizations should be focused on to protect Active Directory. CISA intends to increase its capacity to work against misinformation and disinformation. CISA also intends to recruit white hat hackers to an advisory board.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/218
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 12 Nov 2021 21:20:00 -0000</pubDate>
      <itunes:title>Tension in Eastern Europe. A Hong Kong watering hole. US, EU join the Paris Call. Cybermercenaries. CISA’s plans for countering disinformation, and for forming a white-hat hacker advisory group.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1458</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Notes on rising international tension in Eastern Europe. A watering-hole campaign in Hong Kong. The US and the EU have joined the Paris Call. NSO Group’s prospective CEO resigns his position before formally assuming it. Void Balaur, a cybermercenary group, is active in the Russophone cyber underground. Johannes Ullrich on leaked vaccination cards and Covid tests. Our guest is Carolyn Crandall of Attivo Networks on what organizations should be focused on to protect Active Directory. CISA intends to increase its capacity to work against misinformation and disinformation. CISA also intends to recruit white hat hackers to an advisory board.

For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/218
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Notes on rising international tension in Eastern Europe. A watering-hole campaign in Hong Kong. The US and the EU have joined the Paris Call. NSO Group’s prospective CEO resigns his position before formally assuming it. Void Balaur, a cybermercenary group, is active in the Russophone cyber underground. Johannes Ullrich on leaked vaccination cards and Covid tests. Our guest is Carolyn Crandall of Attivo Networks on what organizations should be focused on to protect Active Directory. CISA intends to increase its capacity to work against misinformation and disinformation. CISA also intends to recruit white hat hackers to an advisory board.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/218</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1578</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1179fadc-364d-11eb-b082-47a0afcdff7f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9067375487.mp3?updated=1690292540" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Let's go to the movies. [Hacking Humans Goes to the Movies]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans-goes-to-the-movies/1/notes</link>
      <description>Welcome to a fun new project by the team who brings you Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series. They view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this first episode, Dave, Joe and Rick are watching Dave's and Joe's picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.
Links to movie clips if you'd like to watch along:

Dave's pick from "The Grifters"

Joe's clip from "Matchstick Men"


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 11 Nov 2021 06:00:00 -0000</pubDate>
      <itunes:title>Let's go to the movies. [Hacking Humans Goes to the Movies]</itunes:title>
      <itunes:episodeType>bonus</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/f31f619a-416c-11ec-a3d5-578bdfcb207e/image/HH-Goes-to-Movies-Cover-Art-05.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Welcome to a fun new project by the team who brings you Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series. They view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this first episode, Dave, Joe and Rick are watching Dave's and Joe's picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.
Links to movie clips if you'd like to watch along:

Dave's pick from "The Grifters"

Joe's clip from "Matchstick Men"


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Welcome to a fun new project by the team who brings you Hacking Humans, the CyberWire's social engineering podcast. Co-hosts Dave Bittner and Joe Carrigan are joined by Rick Howard in this series. They view clips from their favorite movies with examples of the social engineering scams and schemes you hear about on Hacking Humans. In this first episode, Dave, Joe and Rick are watching Dave's and Joe's picks. They watch each of the selected scenes, describe the on-screen action for you, and then the team deconstructs what they saw. Grab your popcorn and join us for a trip to the movies.</p><p>Links to movie clips if you'd like to watch along:</p><ul>
<li>Dave's pick from "<a href="https://www.youtube.com/watch?v=rzkI5Sy2sP8">The Grifters</a>"</li>
<li>Joe's clip from "<a href="https://www.youtube.com/watch?v=TOrEE5NeZ9w">Matchstick Men</a>"</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1511</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c57cee92-426b-11ec-87ab-9b69ed6452de]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4017701233.mp3?updated=1668989297" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage from Tehran. Clopp ransomware operators exploit vulnerable SolarWinds instances. Mercenaries and lawful intercept vendors. Patch Tuesday. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1457/notes</link>
      <description>Tehran’s Lyceum group expands its activities against ISPs and telcos in Israel, Morocco, Tunisia, and Saudi Arabia. Clopp is going after unpatched instances of SolarWinds. Cyber mercenaries are quietly competing with lawful intercept vendors. NSO Group receives a setback from the US 9th Circuit. Mexico makes an arrest in its Pegasus investigation. Carole Theriault shares her thoughts on the supply chain. Josh Ray from Accenture Security on Moving Left of the Ransomware Boom. And notes on Patch Tuesday. 
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/217
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 10 Nov 2021 21:15:00 -0000</pubDate>
      <itunes:title>Cyberespionage from Tehran. Clopp ransomware operators exploit vulnerable SolarWinds instances. Mercenaries and lawful intercept vendors. Patch Tuesday. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1457</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Tehran’s Lyceum group expands its activities against ISPs and telcos in Israel, Morocco, Tunisia, and Saudi Arabia. Clopp is going after unpatched instances of SolarWinds. Cyber mercenaries are quietly competing with lawful intercept vendors. NSO Group receives a setback from the US 9th Circuit. Mexico makes an arrest in its Pegasus investigation. Carole Theriault shares her thoughts on the supply chain. Josh Ray from Accenture Security on Moving Left of the Ransomware Boom. And notes on Patch Tuesday. 
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/217
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tehran’s Lyceum group expands its activities against ISPs and telcos in Israel, Morocco, Tunisia, and Saudi Arabia. Clopp is going after unpatched instances of SolarWinds. Cyber mercenaries are quietly competing with lawful intercept vendors. NSO Group receives a setback from the US 9th Circuit. Mexico makes an arrest in its Pegasus investigation. Carole Theriault shares her thoughts on the supply chain. Josh Ray from Accenture Security on Moving Left of the Ransomware Boom. And notes on Patch Tuesday. </p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/217</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1426</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0fd1bcf6-364d-11eb-b082-f7d466f34fea]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5124181404.mp3?updated=1690292525" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware hits an electronics retailer and a new-school financial services company. Updates on international action against REvil.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1456/notes</link>
      <description>Hive ransomware hits electronics retailer Media Markt. Robinhood Markets sustains a data breach it traces to social engineering. Ben Yelin looks at the law behind U.S. police demanding your phone passcode. Dave checks in with Rick Howard for his thoughts on the Trojan Source vulnerability. And more notes on the international action against REvil, including the US application of sanctions (with Baltic cooperation) to three companies involved in supporting the gang’s financial infrastructure.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/216
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Nov 2021 21:15:00 -0000</pubDate>
      <itunes:title>Ransomware hits an electronics retailer and a new-school financial services company. Updates on international action against REvil.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1456</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Hive ransomware hits electronics retailer Media Markt. Robinhood Markets sustains a data breach it traces to social engineering. Ben Yelin looks at the law behind U.S. police demanding your phone passcode. Dave checks in with Rick Howard for his thoughts on the Trojan Source vulnerability. And more notes on the international action against REvil, including the US application of sanctions (with Baltic cooperation) to three companies involved in supporting the gang’s financial infrastructure.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/216
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hive ransomware hits electronics retailer Media Markt. Robinhood Markets sustains a data breach it traces to social engineering. Ben Yelin looks at the law behind U.S. police demanding your phone passcode. Dave checks in with Rick Howard for his thoughts on the Trojan Source vulnerability. And more notes on the international action against REvil, including the US application of sanctions (with Baltic cooperation) to three companies involved in supporting the gang’s financial infrastructure.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/216</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1522</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10d13154-364d-11eb-b082-73174044fb52]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9942870901.mp3?updated=1690292510" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>REvil operators arrested and indicted. China says a foreign intelligence service accessed passenger travel records. Suspected Emissary Panda campaign.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1455/notes</link>
      <description>REvil operators arrested and indicted. China says a foreign intelligence service accessed passenger travel records. Suspected Emissary Panda campaign. Conti (sort of) apologizes. Caleb Barlow thinks it’s time to re-think your security documentation. Our guest is Jessica Hetrick of Optiv Security on cyber fraud running rampant. And the FBI warns of ransomware attacks targeting casinos.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/215
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 08 Nov 2021 21:15:00 -0000</pubDate>
      <itunes:title>REvil operators arrested and indicted. China says a foreign intelligence service accessed passenger travel records. Suspected Emissary Panda campaign.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1455</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>REvil operators arrested and indicted. China says a foreign intelligence service accessed passenger travel records. Suspected Emissary Panda campaign. Conti (sort of) apologizes. Caleb Barlow thinks it’s time to re-think your security documentation. Our guest is Jessica Hetrick of Optiv Security on cyber fraud running rampant. And the FBI warns of ransomware attacks targeting casinos.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/215
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>REvil operators arrested and indicted. China says a foreign intelligence service accessed passenger travel records. Suspected Emissary Panda campaign. Conti (sort of) apologizes. Caleb Barlow thinks it’s time to re-think your security documentation. Our guest is Jessica Hetrick of Optiv Security on cyber fraud running rampant. And the FBI warns of ransomware attacks targeting casinos.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/215</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1487</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1020594c-364d-11eb-b082-2fc19a0be8da]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5993122080.mp3?updated=1690292495" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jamil Jaffer: You should run towards risk. [Strategy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/74/notes</link>
      <description>Senior Vice President for Strategy, Partnerships, and Corporate Development at IronNet Cybersecurity, Jamil Jaffer, shares how his interest in technology brought him full circle. Always a tech guy, Jamil paid he way through college doing computer support. Jamil went to law school and worked in various jobs in Washington DC including a stint in the newly-created National Security division of the Justice Department just after 9/11. When talking about adversity, Jamil notes, "Adversity has happened in life, but you gotta run at those things. To me, you know, I like risk. I think risk is something that a lot of people shy away from." We thank Jamil for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 07 Nov 2021 08:00:00 -0000</pubDate>
      <itunes:title>Jamil Jaffer: You should run towards risk. [Strategy] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>74</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Senior Vice President for Strategy, Partnerships, and Corporate Development at IronNet Cybersecurity, Jamil Jaffer, shares how his interest in technology brought him full circle.  </itunes:subtitle>
      <itunes:summary>Senior Vice President for Strategy, Partnerships, and Corporate Development at IronNet Cybersecurity, Jamil Jaffer, shares how his interest in technology brought him full circle. Always a tech guy, Jamil paid he way through college doing computer support. Jamil went to law school and worked in various jobs in Washington DC including a stint in the newly-created National Security division of the Justice Department just after 9/11. When talking about adversity, Jamil notes, "Adversity has happened in life, but you gotta run at those things. To me, you know, I like risk. I think risk is something that a lot of people shy away from." We thank Jamil for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Senior Vice President for Strategy, Partnerships, and Corporate Development at IronNet Cybersecurity, Jamil Jaffer, shares how his interest in technology brought him full circle. Always a tech guy, Jamil paid he way through college doing computer support. Jamil went to law school and worked in various jobs in Washington DC including a stint in the newly-created National Security division of the Justice Department just after 9/11. When talking about adversity, Jamil notes, "Adversity has happened in life, but you gotta run at those things. To me, you know, I like risk. I think risk is something that a lot of people shy away from." We thank Jamil for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>376</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aa095de0-3ce3-11ec-a061-eb4854aa87a3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8823290112.mp3?updated=1635969505" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An incident response reveals itself as GhostShell tool, ShellClient. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/208/notes</link>
      <description>Guest Mor Levi, Vice President of Cyber Practices from Cybereason, joins Dave Bittner to discuss her team's work on "Operation GhostShell - Novel RAT Targets Global Aerospace and Telecoms Firms." In July 2021, the Cybereason Nocturnus and Incident Response Teams responded to Operation GhostShell, a highly-targeted cyber espionage campaign targeting the Aerospace and Telecommunications industries mainly in the Middle East, with additional victims in the U.S., Russia and Europe. 
The Operation GhostShell campaign aims to steal sensitive information about critical assets, organizations’ infrastructure and technology. During the investigation, the Nocturnus Team uncovered a previously undocumented and stealthy RAT (Remote Access Trojan) dubbed ShellClient which was employed as the primary espionage tool. To learn more, listen to the episode.
The research can be found here:
Operation GhostShell - Novel RAT Targets Global Aerospace and Telecoms Firms

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Nov 2021 07:00:00 -0000</pubDate>
      <itunes:title>An incident response reveals itself as GhostShell tool, ShellClient. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>208</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Mor Levi, Vice President of Cyber Practices from Cybereason, joins Dave Bittner to discuss her team's work on "Operation GhostShell - Novel RAT Targets Global Aerospace and Telecoms Firms." In July 2021, the Cybereason Nocturnus and Incident Response Teams responded to Operation GhostShell, a highly-targeted cyber espionage campaign targeting the Aerospace and Telecommunications industries mainly in the Middle East, with additional victims in the U.S., Russia and Europe. 
The Operation GhostShell campaign aims to steal sensitive information about critical assets, organizations’ infrastructure and technology. During the investigation, the Nocturnus Team uncovered a previously undocumented and stealthy RAT (Remote Access Trojan) dubbed ShellClient which was employed as the primary espionage tool. To learn more, listen to the episode.
The research can be found here:
Operation GhostShell - Novel RAT Targets Global Aerospace and Telecoms Firms

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Mor Levi, Vice President of Cyber Practices from Cybereason, joins Dave Bittner to discuss her team's work on "Operation GhostShell - Novel RAT Targets Global Aerospace and Telecoms Firms." In July 2021, the Cybereason Nocturnus and Incident Response Teams responded to <em>Operation GhostShell</em>, a highly-targeted cyber espionage campaign targeting the Aerospace and Telecommunications industries mainly in the Middle East, with additional victims in the U.S., Russia and Europe. </p><p>The Operation GhostShell campaign aims to steal sensitive information about critical assets, organizations’ infrastructure and technology. During the investigation, the Nocturnus Team uncovered a previously undocumented and stealthy RAT (Remote Access Trojan) dubbed <em>ShellClient</em> which was employed as the primary espionage tool. To learn more, listen to the episode.</p><p>The research can be found here:</p><ul><li><a href="https://www.cybereason.com/blog/operation-ghostshell-novel-rat-targets-global-aerospace-and-telecoms-firms">Operation GhostShell - Novel RAT Targets Global Aerospace and Telecoms Firms</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1124</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e8b99c38-3c18-11ec-b9b8-d7c2d8300d0b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5648885657.mp3?updated=1685126413" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>$10 million reward for DarkSide info. BlackMatter members expected to resurface. Ukraine outlines Russia’s FSB cyber ops. Persistent engagement as deterrence. Arrest in Crossfire Hurricane inquiry.</title>
      <description>The US offers a reward of up to ten million dollars for information leading to the identification or location of the leaders of the DarkSide ransomware gang. Researchers expect BlackMatter’s nominally retired operators to resurface in other criminal organizations. Ukraine outlines Russian FSB cyber operations during the hybrid war that’s been waged since 2014. Deterrence in cyberspace. Carole Theriault takes on high value targets. Our guest is Bill Mann of Styra on rising compliance regulations and security drift. An arrest is made in Special Counsel Durham’s investigation.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/214
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 05 Nov 2021 20:25:00 -0000</pubDate>
      <itunes:title>$10 million reward for DarkSide info. BlackMatter members expected to resurface. Ukraine outlines Russia’s FSB cyber ops. Persistent engagement as deterrence. Arrest in Crossfire Hurricane inquiry.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1454</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The US offers a reward of up to ten million dollars for information leading to the identification or location of the leaders of the DarkSide ransomware gang. Researchers expect BlackMatter’s nominally retired operators to resurface in other criminal organizations. Ukraine outlines Russian FSB cyber operations during the hybrid war that’s been waged since 2014. Deterrence in cyberspace. Carole Theriault takes on high value targets. Our guest is Bill Mann of Styra on rising compliance regulations and security drift. An arrest is made in Special Counsel Durham’s investigation.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/214
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US offers a reward of up to ten million dollars for information leading to the identification or location of the leaders of the DarkSide ransomware gang. Researchers expect BlackMatter’s nominally retired operators to resurface in other criminal organizations. Ukraine outlines Russian FSB cyber operations during the hybrid war that’s been waged since 2014. Deterrence in cyberspace. Carole Theriault takes on high value targets. Our guest is Bill Mann of Styra on rising compliance regulations and security drift. An arrest is made in Special Counsel Durham’s investigation.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/214</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1560</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11683004-364d-11eb-b082-eb53464a45ba]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4754503754.mp3?updated=1690292480" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Britain’s Labour Party sustains a “data incident.” CERT-FR describes a new affiliate gang, Lockean. US, Russian intelligence chiefs discuss cybersecurity. Gas is flowing in Iran again. Start-ups honored.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1453/notes</link>
      <description>Britain’s Labour Party is affected by a ransomware incident a third-party provider sustained. ANSSI identifies a new ransomware affiliate gang, “Lockean.” Notes on how and why BlackMatter and REvil went on the lam. Russo-American talks discussed cybercrime and cybersecurity. Iran’s gas stations are fully back in business, following the cyber sabotage they sustained. Kevin Magee from Microsoft has highlights from their 2021 Digital Defence Report. Our guest is Ofer Ben Noon of Talon Cyber Security addressing browser vulnerabilities. And DataTribe has announced the winners of its fourth annual Cybersecurity Start-up Challenge.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/213
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 04 Nov 2021 20:15:00 -0000</pubDate>
      <itunes:title>Britain’s Labour Party sustains a “data incident.” CERT-FR describes a new affiliate gang, Lockean. US, Russian intelligence chiefs discuss cybersecurity. Gas is flowing in Iran again. Start-ups honored.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1453</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Britain’s Labour Party is affected by a ransomware incident a third-party provider sustained. ANSSI identifies a new ransomware affiliate gang, “Lockean.” Notes on how and why BlackMatter and REvil went on the lam. Russo-American talks discussed cybercrime and cybersecurity. Iran’s gas stations are fully back in business, following the cyber sabotage they sustained. Kevin Magee from Microsoft has highlights from their 2021 Digital Defence Report. Our guest is Ofer Ben Noon of Talon Cyber Security addressing browser vulnerabilities. And DataTribe has announced the winners of its fourth annual Cybersecurity Start-up Challenge.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/213
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Britain’s Labour Party is affected by a ransomware incident a third-party provider sustained. ANSSI identifies a new ransomware affiliate gang, “Lockean.” Notes on how and why BlackMatter and REvil went on the lam. Russo-American talks discussed cybercrime and cybersecurity. Iran’s gas stations are fully back in business, following the cyber sabotage they sustained. Kevin Magee from Microsoft has highlights from their 2021 Digital Defence Report. Our guest is Ofer Ben Noon of Talon Cyber Security addressing browser vulnerabilities. And DataTribe has announced the winners of its fourth annual Cybersecurity Start-up Challenge.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/213</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1558</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1135d6ea-364d-11eb-b082-03f5f6b3b8c9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3130120896.mp3?updated=1690292461" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware gangs talk about retiring, and about deception. High-level Russo-American talks. US sanctions four spyware vendors. CISA tells US agencies to patch known, exploited vulnerbalities.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1452/notes</link>
      <description>The BlackMatter ransomware gang says that it’s retiring under pressure from the authorities. The spokesman for the Groove group says his gang doesn’t exist--he was just playing the media. Quiet, high-level talks held between senior US and Russian officials. The US Commerce Department sanctions four spyware vendors. Carole Theriault wonders if you can train yourself free of social engineering. Josh Ray from Accenture Security with insights from their Cyber Investigations and Forensic Response team. CISA tells Federal agencies to get patching.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/212
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 03 Nov 2021 20:15:00 -0000</pubDate>
      <itunes:title>Ransomware gangs talk about retiring, and about deception. High-level Russo-American talks. US sanctions four spyware vendors. CISA tells US agencies to patch known, exploited vulnerbalities.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1452</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The BlackMatter ransomware gang says that it’s retiring under pressure from the authorities. The spokesman for the Groove group says his gang doesn’t exist--he was just playing the media. Quiet, high-level talks held between senior US and Russian officials. The US Commerce Department sanctions four spyware vendors. Carole Theriault wonders if you can train yourself free of social engineering. Josh Ray from Accenture Security with insights from their Cyber Investigations and Forensic Response team. CISA tells Federal agencies to get patching.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/212
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The BlackMatter ransomware gang says that it’s retiring under pressure from the authorities. The spokesman for the Groove group says his gang doesn’t exist--he was just playing the media. Quiet, high-level talks held between senior US and Russian officials. The US Commerce Department sanctions four spyware vendors. Carole Theriault wonders if you can train yourself free of social engineering. Josh Ray from Accenture Security with insights from their Cyber Investigations and Forensic Response team. CISA tells Federal agencies to get patching.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/212</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1395</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10f39960-364d-11eb-b082-bbde3d92b408]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9309899197.mp3?updated=1690292423" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trojan Source--a threat to the software supply chain. Ransomware goes to influence operations school. Triple extortion? Criminal target selection.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1451/notes</link>
      <description>Researchers describe Trojan Source, a hard-to-detect threat to the software supply chain. A ransomware gang takes a page from the information operator’s book. From double extortion to triple extortion, as other ransomware gangs add distributed denial-of-service to encryption and doxing. Criminals are now hacking on material, non-public information, the FBI warns. Joe Carrigan looks at multifactor adoption at Twitter. Our guest is Steve Ragan from Akamai on API security. And criminals hit healthcare providers in Newfoundland.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/211
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Nov 2021 20:30:00 -0000</pubDate>
      <itunes:title>Trojan Source--a threat to the software supply chain. Ransomware goes to influence operations school. Triple extortion? Criminal target selection.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1451</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers describe Trojan Source, a hard-to-detect threat to the software supply chain. A ransomware gang takes a page from the information operator’s book. From double extortion to triple extortion, as other ransomware gangs add distributed denial-of-service to encryption and doxing. Criminals are now hacking on material, non-public information, the FBI warns. Joe Carrigan looks at multifactor adoption at Twitter. Our guest is Steve Ragan from Akamai on API security. And criminals hit healthcare providers in Newfoundland.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/211
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers describe Trojan Source, a hard-to-detect threat to the software supply chain. A ransomware gang takes a page from the information operator’s book. From double extortion to triple extortion, as other ransomware gangs add distributed denial-of-service to encryption and doxing. Criminals are now hacking on material, non-public information, the FBI warns. Joe Carrigan looks at multifactor adoption at Twitter. Our guest is Steve Ragan from Akamai on API security. And criminals hit healthcare providers in Newfoundland.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/211</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1676</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10e2d436-364d-11eb-b082-3be38fe1f1e0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4825845504.mp3?updated=1690292411" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Iranian officials blame the US and Israel for gas station cyber sabotage. A new direction for NSO? Cyber extortion, Minecraft phishing, and sugar daddies looking for sugar babies (sez they).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1450/notes</link>
      <description>Iran hasn’t finished investigating its gas station cyber sabotage, but Tehran is pretty sure the Great and Lesser Satans are behind it. NSO Group says it’s going in a new, nicer direction. The Conti gang hits a luxury jewelry dealer, and another, unknown group hits an upscale art dealership. The Chaos gang is after Minecraft players (players who cheat). Caleb Barlow on pre-breach pre-approvals. Rick Howard introduces sand tables in cyber space. And sugar daddies come to the world of advance fee scams.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/210
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 01 Nov 2021 20:15:00 -0000</pubDate>
      <itunes:title>Iranian officials blame the US and Israel for gas station cyber sabotage. A new direction for NSO? Cyber extortion, Minecraft phishing, and sugar daddies looking for sugar babies (sez they).</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1450</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Iran hasn’t finished investigating its gas station cyber sabotage, but Tehran is pretty sure the Great and Lesser Satans are behind it. NSO Group says it’s going in a new, nicer direction. The Conti gang hits a luxury jewelry dealer, and another, unknown group hits an upscale art dealership. The Chaos gang is after Minecraft players (players who cheat). Caleb Barlow on pre-breach pre-approvals. Rick Howard introduces sand tables in cyber space. And sugar daddies come to the world of advance fee scams.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/210
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iran hasn’t finished investigating its gas station cyber sabotage, but Tehran is pretty sure the Great and Lesser Satans are behind it. NSO Group says it’s going in a new, nicer direction. The Conti gang hits a luxury jewelry dealer, and another, unknown group hits an upscale art dealership. The Chaos gang is after Minecraft players (players who cheat). Caleb Barlow on pre-breach pre-approvals. Rick Howard introduces sand tables in cyber space. And sugar daddies come to the world of advance fee scams.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/210</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1395</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[100d0d74-364d-11eb-b082-e7cf0ed2ad13]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1997453985.mp3?updated=1690292392" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jadee Hanson: Cybersecurity is a team effort. [CISO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/73/notes</link>
      <description>Jadee Hanson, CIO and CISO at Code 42, started her technology journey thanks to the help of a teacher in high school. She began college studying computer science and ended with a degree in computer information systems as it had more of the business side. Working in the private sector for companies such as Deloitte, Target and Code 42, Jadee gained experience and specialized in insider risk. She notes "utopia for me and my team is to get to a spot where the team is just firing on all cylinders and being really proactive about what's coming and what's changing." Jadee mentions she tries hard to do things that might scare her every day. For those interested in the field, especially young women, Jadee recommends they get involved and then stay curious. We thank Jadee for sharing her story with us.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 31 Oct 2021 07:00:00 -0000</pubDate>
      <itunes:title>Jadee Hanson: Cybersecurity is a team effort. [CISO] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>73</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Jadee Hanson, CIO and CISO at Code 42, started her technology journey thanks to the help of a teacher in high school. </itunes:subtitle>
      <itunes:summary>Jadee Hanson, CIO and CISO at Code 42, started her technology journey thanks to the help of a teacher in high school. She began college studying computer science and ended with a degree in computer information systems as it had more of the business side. Working in the private sector for companies such as Deloitte, Target and Code 42, Jadee gained experience and specialized in insider risk. She notes "utopia for me and my team is to get to a spot where the team is just firing on all cylinders and being really proactive about what's coming and what's changing." Jadee mentions she tries hard to do things that might scare her every day. For those interested in the field, especially young women, Jadee recommends they get involved and then stay curious. We thank Jadee for sharing her story with us.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jadee Hanson, CIO and CISO at Code 42, started her technology journey thanks to the help of a teacher in high school. She began college studying computer science and ended with a degree in computer information systems as it had more of the business side. Working in the private sector for companies such as Deloitte, Target and Code 42, Jadee gained experience and specialized in insider risk. She notes "utopia for me and my team is to get to a spot where the team is just firing on all cylinders and being really proactive about what's coming and what's changing." Jadee mentions she tries hard to do things that might scare her every day. For those interested in the field, especially young women, Jadee recommends they get involved and then stay curious. We thank Jadee for sharing her story with us.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>504</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2ca97ce0-36bc-11ec-b7e4-d3d23038fdfb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7606662216.mp3?updated=1635294152" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Malware sometimes changes its behavior. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/207/notes</link>
      <description>Dr. Tudor Dumitras from University of Maryland and joins Dave Bittner to share a research study conducted in collaboration with industry partners from Facebook, NortonLifeLock Research Group and EURECOM. The project is called: "When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World." In the study, the team analyzed how malware samples change their behavior when executed on different hosts or at different times. Such “split personalities” may confound the current techniques for malware analysis and detection. Malware execution traces are typically collected by executing the samples in a controlled environment (a “sandbox”), and the techniques created and tested using such traces do not account for the broad range of behaviors observed in the wild. In the paper, the team shows how behavior variability can make those techniques appear more effective than they really are, and they make some recommendations for dealing with the variability.
The research and executive summary can be found here:

When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World

Analysing malware variability in the real world


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Oct 2021 07:00:00 -0000</pubDate>
      <itunes:title>Malware sometimes changes its behavior. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>207</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dr. Tudor Dumitras from University of Maryland and joins Dave Bittner to share a research study conducted in collaboration with industry partners from Facebook, NortonLifeLock Research Group and EURECOM. The project is called: "When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World." In the study, the team analyzed how malware samples change their behavior when executed on different hosts or at different times. Such “split personalities” may confound the current techniques for malware analysis and detection. Malware execution traces are typically collected by executing the samples in a controlled environment (a “sandbox”), and the techniques created and tested using such traces do not account for the broad range of behaviors observed in the wild. In the paper, the team shows how behavior variability can make those techniques appear more effective than they really are, and they make some recommendations for dealing with the variability.
The research and executive summary can be found here:

When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World

Analysing malware variability in the real world


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dr. Tudor Dumitras from University of Maryland and joins Dave Bittner to share a research study conducted in collaboration with industry partners from Facebook, NortonLifeLock Research Group and EURECOM. The project is called: "When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World." In the study, the team analyzed how malware samples change their behavior when executed on different hosts or at different times. Such “split personalities” may confound the current techniques for malware analysis and detection. Malware execution traces are typically collected by executing the samples in a controlled environment (a “sandbox”), and the techniques created and tested using such traces do not account for the broad range of behaviors observed in the wild. In the paper, the team shows how behavior variability can make those techniques appear more effective than they really are, and they make some recommendations for dealing with the variability.</p><p>The research and executive summary can be found here:</p><ul>
<li><a href="https://obj.umiacs.umd.edu/securitypapers/malw_variability.pdf">When Malware Changed Its Mind: An Empirical Study of Variable Program Behaviors in the Real World</a></li>
<li><a href="https://albocoder.github.io/malware/2021/08/10/malware-behavior-variability.html">Analysing malware variability in the real world</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1593</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[56da3bbc-36c6-11ec-9ee4-63e92261e0c8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8641081199.mp3?updated=1685126407" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Iranian-Israeli cyber tensions rise. Decaf ransomware described. Philippine government phshbait. Unemployment due to cyberattack. Europol’s latest collars. Facebook rebrands as “Meta.” </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1449/notes</link>
      <description>Tensions between Iran and Israel rise as sources in Tehran blame Israel for hacking gas stations, and as apparent Iranian hacktivists dox Israeli defense personnel. A new ransomware strain is discovered. A criminal group is spoofing emails from Philippine agencies. Europol and partners sweep up a cyber gang. Betsy Carmelite from BAH on convergence of 5G and healthcare. Our guest is Justin Wray from CoreBTS with a look at the security issues facing online gaming and casinos. And the company formerly known as Facebook rebrands as “Meta.”
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/209
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 29 Oct 2021 20:25:00 -0000</pubDate>
      <itunes:title>Iranian-Israeli cyber tensions rise. Decaf ransomware described. Philippine government phshbait. Unemployment due to cyberattack. Europol’s latest collars. Facebook rebrands as “Meta.” </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1449</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Tensions between Iran and Israel rise as sources in Tehran blame Israel for hacking gas stations, and as apparent Iranian hacktivists dox Israeli defense personnel. A new ransomware strain is discovered. A criminal group is spoofing emails from Philippine agencies. Europol and partners sweep up a cyber gang. Betsy Carmelite from BAH on convergence of 5G and healthcare. Our guest is Justin Wray from CoreBTS with a look at the security issues facing online gaming and casinos. And the company formerly known as Facebook rebrands as “Meta.”
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/209
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tensions between Iran and Israel rise as sources in Tehran blame Israel for hacking gas stations, and as apparent Iranian hacktivists dox Israeli defense personnel. A new ransomware strain is discovered. A criminal group is spoofing emails from Philippine agencies. Europol and partners sweep up a cyber gang. Betsy Carmelite from BAH on convergence of 5G and healthcare. Our guest is Justin Wray from CoreBTS with a look at the security issues facing online gaming and casinos. And the company formerly known as Facebook rebrands as “Meta.”</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/209</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1678</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0eac082c-364d-11eb-b082-0fe0c8180082]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7749347553.mp3?updated=1690292376" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Malware Mash!</title>
      <link>https://thecyberwire.com/stories/123bc0f691444be6af3145a6dab6cee4/malware-mash</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 29 Oct 2021 05:00:00 -0000</pubDate>
      <itunes:title>The Malware Mash!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>185</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[372ae908-384f-11ec-8315-a3884c4ca744]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8091870616.mp3?updated=1666877087" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacktivists or intelligence services in Iran? BOLO NIkolay K. Renouncing Conti, and all its empty promises. SEO poisoning. US cyber strategic intent.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1448/notes</link>
      <description>Iran continues its recovery from a cyberattack that disrupted subsidized fuel distribution. Wanted in Stuttgart (but living it up in Russia): ransomware kingpin Nikolay K. The Conti ransomware gang gets poor customer service notices. Food distribution is on the cybercriminals’ target lists. SolarMarker’s use of SEO poisoning. The US publishes a statement of strategic intent for its cybersecurity czar’s office. David Dufour from Webroot wonders if there’s any hope at slowing down malware. Our own Brandon Karpf describes the DoD’s Skillbridge program. And decryptors are made available for three ransomware strains.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/208
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 28 Oct 2021 20:15:00 -0000</pubDate>
      <itunes:title>Hacktivists or intelligence services in Iran? BOLO NIkolay K. Renouncing Conti, and all its empty promises. SEO poisoning. US cyber strategic intent.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1448</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Iran continues its recovery from a cyberattack that disrupted subsidized fuel distribution. Wanted in Stuttgart (but living it up in Russia): ransomware kingpin Nikolay K. The Conti ransomware gang gets poor customer service notices. Food distribution is on the cybercriminals’ target lists. SolarMarker’s use of SEO poisoning. The US publishes a statement of strategic intent for its cybersecurity czar’s office. David Dufour from Webroot wonders if there’s any hope at slowing down malware. Our own Brandon Karpf describes the DoD’s Skillbridge program. And decryptors are made available for three ransomware strains.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/208
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iran continues its recovery from a cyberattack that disrupted subsidized fuel distribution. Wanted in Stuttgart (but living it up in Russia): ransomware kingpin Nikolay K. The Conti ransomware gang gets poor customer service notices. Food distribution is on the cybercriminals’ target lists. SolarMarker’s use of SEO poisoning. The US publishes a statement of strategic intent for its cybersecurity czar’s office. David Dufour from Webroot wonders if there’s any hope at slowing down malware. Our own Brandon Karpf describes the DoD’s Skillbridge program. And decryptors are made available for three ransomware strains.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/208</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1578</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0ec27576-364d-11eb-b082-7f8ebb49feaa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4037464831.mp3?updated=1690292357" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Coups and comms blackouts. Fuel sale sabotage in Iran. Wslink described. Operation Dark HunTor takes down a contraband market. FTC looks into Facebook. LockBit speaks. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1447/notes</link>
      <description>Sudan is under a blackout as a military junta consolidates control over the government. Iran says a cyberattack--unattributed so far--was responsible for disrupting fuel distribution in that country. A novel loader is discovered. Operation Dark HunTor takes down a darkweb contraband market. The US FTC is looking into Facebook’s privacy settlement. The LockBit gang talks, and it’s insufferable. Andrea Little Limbago from Interos on government internet interventions. Carole Theriault weighs in on Facebook glasses. And Halloween is another day closer.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/207
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 27 Oct 2021 20:15:00 -0000</pubDate>
      <itunes:title>Coups and comms blackouts. Fuel sale sabotage in Iran. Wslink described. Operation Dark HunTor takes down a contraband market. FTC looks into Facebook. LockBit speaks. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1447</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Sudan is under a blackout as a military junta consolidates control over the government. Iran says a cyberattack--unattributed so far--was responsible for disrupting fuel distribution in that country. A novel loader is discovered. Operation Dark HunTor takes down a darkweb contraband market. The US FTC is looking into Facebook’s privacy settlement. The LockBit gang talks, and it’s insufferable. Andrea Little Limbago from Interos on government internet interventions. Carole Theriault weighs in on Facebook glasses. And Halloween is another day closer.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/207
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sudan is under a blackout as a military junta consolidates control over the government. Iran says a cyberattack--unattributed so far--was responsible for disrupting fuel distribution in that country. A novel loader is discovered. Operation Dark HunTor takes down a darkweb contraband market. The US FTC is looking into Facebook’s privacy settlement. The LockBit gang talks, and it’s insufferable. Andrea Little Limbago from Interos on government internet interventions. Carole Theriault weighs in on Facebook glasses. And Halloween is another day closer.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/207</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1549</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0f56cd2a-364d-11eb-b082-e37d0554afa1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9297875571.mp3?updated=1690292345" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware and privateering, counteroffense and deterrence. The US State Department will reestablish its cyber office. And looking forward to Halloween. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1446/notes</link>
      <description>Notes on ransomware and privateering: Conti’s barking at its victims, someone’s exploiting billing software, and BlackMatter repeated some coding errors its DarkSide predecessor committed. GCHQ suggests that the UK will undertake a more assertive imposition of costs on cyber gangs. The US State Department will reestablish its cyber bureau. Software supply chain cyberespionage, and what can be done about it. Ben Yelin on school laptop privacy concerns. Our guest is David White of Axio to discuss Ransomware Preparedness. And some more scare-notes for Halloween.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/206
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Oct 2021 20:15:00 -0000</pubDate>
      <itunes:title>Ransomware and privateering, counteroffense and deterrence. The US State Department will reestablish its cyber office. And looking forward to Halloween. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1446</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Notes on ransomware and privateering: Conti’s barking at its victims, someone’s exploiting billing software, and BlackMatter repeated some coding errors its DarkSide predecessor committed. GCHQ suggests that the UK will undertake a more assertive imposition of costs on cyber gangs. The US State Department will reestablish its cyber bureau. Software supply chain cyberespionage, and what can be done about it. Ben Yelin on school laptop privacy concerns. Our guest is David White of Axio to discuss Ransomware Preparedness. And some more scare-notes for Halloween.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/206
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Notes on ransomware and privateering: Conti’s barking at its victims, someone’s exploiting billing software, and BlackMatter repeated some coding errors its DarkSide predecessor committed. GCHQ suggests that the UK will undertake a more assertive imposition of costs on cyber gangs. The US State Department will reestablish its cyber bureau. Software supply chain cyberespionage, and what can be done about it. Ben Yelin on school laptop privacy concerns. Our guest is David White of Axio to discuss Ransomware Preparedness. And some more scare-notes for Halloween.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/206</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1657</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0f6bdd32-364d-11eb-b082-87e87688cbd8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3327918089.mp3?updated=1690292336" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SolarMarket malware carried in some WordPress sites. Russian privateers don’t much like REvil’s takedown. The SVR in the supply chain. Malicious Squid Games app. Scary social media.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1412/notes</link>
      <description>SolarMarket infestations are up, and circulating through WordPress sites. More indications that REvil was taken down by a US-led but thoroughly international public-private partnership, and the other Russian privateers have their noses seriously out of joint. Russia’s SVR is getting busy in software supply chains. Criminals take advantage of the popularity of Squid Games. Dinah Davis from Arctic Wolf on how even hackers have internal politics. Rick Howard checks in with the Hash Table on compliance. And Halloween is coming: do you know what your apps are up to?
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/205
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 25 Oct 2021 20:20:00 -0000</pubDate>
      <itunes:title>SolarMarket malware carried in some WordPress sites. Russian privateers don’t much like REvil’s takedown. The SVR in the supply chain. Malicious Squid Games app. Scary social media.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1445</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>SolarMarket infestations are up, and circulating through WordPress sites. More indications that REvil was taken down by a US-led but thoroughly international public-private partnership, and the other Russian privateers have their noses seriously out of joint. Russia’s SVR is getting busy in software supply chains. Criminals take advantage of the popularity of Squid Games. Dinah Davis from Arctic Wolf on how even hackers have internal politics. Rick Howard checks in with the Hash Table on compliance. And Halloween is coming: do you know what your apps are up to?
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/205
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>SolarMarket infestations are up, and circulating through WordPress sites. More indications that REvil was taken down by a US-led but thoroughly international public-private partnership, and the other Russian privateers have their noses seriously out of joint. Russia’s SVR is getting busy in software supply chains. Criminals take advantage of the popularity of Squid Games. Dinah Davis from Arctic Wolf on how even hackers have internal politics. Rick Howard checks in with the Hash Table on compliance. And Halloween is coming: do you know what your apps are up to?</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/205</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1425</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0ff94474-364d-11eb-b082-0f9ddb48918c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4978865595.mp3?updated=1690292317" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mark Nunnikhoven: Providing clarity about security. [Cloud strategy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/72/notes</link>
      <description>Distinguished Cloud Strategist at Lacework, Mark Nunnikhoven, has gone from taking technology to its limits for his own understanding to providing clarity about security for others. Mark fell in love with his Commodore 128 and once he realized he could bend the machine to his will, it set him on the path to technology. While he had some bumps in the road, dropping out of high school and not following the traditional path in college, Mark did complete his masters in information security. His professional life took him from Canadian public service to the private sector where Mark noted the culture shift was an eye-opening experience. Mark always looks to learn something new and share that with others and that is evidenced as his includes teaching as a facet of his career. We thank Mark for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 24 Oct 2021 07:00:00 -0000</pubDate>
      <itunes:title>Mark Nunnikhoven: Providing clarity about security. [Cloud strategy] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>72</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Distinguished Cloud Strategist at Lacework, Mark Nunnikhoven, taking technology to its limits for his own understanding to providing clarity about security for others. </itunes:subtitle>
      <itunes:summary>Distinguished Cloud Strategist at Lacework, Mark Nunnikhoven, has gone from taking technology to its limits for his own understanding to providing clarity about security for others. Mark fell in love with his Commodore 128 and once he realized he could bend the machine to his will, it set him on the path to technology. While he had some bumps in the road, dropping out of high school and not following the traditional path in college, Mark did complete his masters in information security. His professional life took him from Canadian public service to the private sector where Mark noted the culture shift was an eye-opening experience. Mark always looks to learn something new and share that with others and that is evidenced as his includes teaching as a facet of his career. We thank Mark for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Distinguished Cloud Strategist at Lacework, Mark Nunnikhoven, has gone from taking technology to its limits for his own understanding to providing clarity about security for others. Mark fell in love with his Commodore 128 and once he realized he could bend the machine to his will, it set him on the path to technology. While he had some bumps in the road, dropping out of high school and not following the traditional path in college, Mark did complete his masters in information security. His professional life took him from Canadian public service to the private sector where Mark noted the culture shift was an eye-opening experience. Mark always looks to learn something new and share that with others and that is evidenced as his includes teaching as a facet of his career. We thank Mark for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>428</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3a2c6e3c-31cf-11ec-91f5-f33b9dc3efb7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5021412416.mp3?updated=1749759159" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When big ransomware goes away, where should affiliates go? [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/206/notes</link>
      <description>Our guest Doel Santos, Threat Research Analyst at Palo Alto Networks, joins Dave Bittner to talk about Unit 42's work on "Ransomware Groups to Watch: Emerging Threats." As part of Unit 42’s commitment to stop ransomware attacks, they monitor the activity of existing groups, search for dark web leak sites and fresh onion sites, identify up-and-coming players and study tactics, techniques and procedures. During their operations, Unit 42 observed four emerging ransomware groups that are currently affecting organizations and show signs of having the potential to become more prevalent in the future. Doel discusses these (AvosLocker, Hive Ransomware, HelloKitty, and LockBit 2.0) with Dave.
The research can be found here:
Ransomware Groups to Watch: Emerging Threats

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Oct 2021 07:00:00 -0000</pubDate>
      <itunes:title>When big ransomware goes away, where should affiliates go? [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>206</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Our guest Doel Santos, Threat Research Analyst at Palo Alto Networks, joins Dave Bittner to talk about Unit 42's work on "Ransomware Groups to Watch: Emerging Threats." As part of Unit 42’s commitment to stop ransomware attacks, they monitor the activity of existing groups, search for dark web leak sites and fresh onion sites, identify up-and-coming players and study tactics, techniques and procedures. During their operations, Unit 42 observed four emerging ransomware groups that are currently affecting organizations and show signs of having the potential to become more prevalent in the future. Doel discusses these (AvosLocker, Hive Ransomware, HelloKitty, and LockBit 2.0) with Dave.
The research can be found here:
Ransomware Groups to Watch: Emerging Threats

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our guest Doel Santos, Threat Research Analyst at Palo Alto Networks, joins Dave Bittner to talk about Unit 42's work on "Ransomware Groups to Watch: Emerging Threats." As part of Unit 42’s commitment to stop ransomware attacks, they monitor the activity of existing groups, search for dark web leak sites and fresh onion sites, identify up-and-coming players and study tactics, techniques and procedures. During their operations, Unit 42 observed four emerging ransomware groups that are currently affecting organizations and show signs of having the potential to become more prevalent in the future. Doel discusses these (AvosLocker, Hive Ransomware, HelloKitty, and LockBit 2.0) with Dave.</p><p>The research can be found here:</p><ul><li><a href="https://unit42.paloaltonetworks.com/emerging-ransomware-groups/">Ransomware Groups to Watch: Emerging Threats</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1183</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[779f7924-31e0-11ec-88b5-5b0ac70a23a4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4263026437.mp3?updated=1685126396" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Counting coup against REvil (and other gangs are taking note). Export controls and dual use. A timing bug will surface this weekend.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1444/notes</link>
      <description>REvil’s troubles appear to be the work of an international law enforcement operation. Other gangs have noticed, and they’re looking a little spooked, even as they evolve their tactics in a maturing criminal-to-criminal market. Questions are raised about the efficacy of surveillance tool export controls. Caleb Barlow has cyber security considerations for CEOs and boards. Our guest is Mickey Boodeai of Transmit Security on the movement to do away with passwords. And if you liked Y2K, you’re going to love ten-twenty-four. 
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/203
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 22 Oct 2021 20:15:00 -0000</pubDate>
      <itunes:title>Counting coup against REvil (and other gangs are taking note). Export controls and dual use. A timing bug will surface this weekend.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1444</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>REvil’s troubles appear to be the work of an international law enforcement operation. Other gangs have noticed, and they’re looking a little spooked, even as they evolve their tactics in a maturing criminal-to-criminal market. Questions are raised about the efficacy of surveillance tool export controls. Caleb Barlow has cyber security considerations for CEOs and boards. Our guest is Mickey Boodeai of Transmit Security on the movement to do away with passwords. And if you liked Y2K, you’re going to love ten-twenty-four. 
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/203
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>REvil’s troubles appear to be the work of an international law enforcement operation. Other gangs have noticed, and they’re looking a little spooked, even as they evolve their tactics in a maturing criminal-to-criminal market. Questions are raised about the efficacy of surveillance tool export controls. Caleb Barlow has cyber security considerations for CEOs and boards. Our guest is Mickey Boodeai of Transmit Security on the movement to do away with passwords. And if you liked Y2K, you’re going to love ten-twenty-four. </p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/203</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1666</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0e961a12-364d-11eb-b082-97cbd3a9a684]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9664860634.mp3?updated=1690292305" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Evil Corp identified as the threat actor behind ransomware attacks on Sinclair and Olympus. Privateering. Fin7’s front company. Sentencing in a bulletproof hosting case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1443/notes</link>
      <description>Evil Corp is identified as the operator behind the ransomware that hit the Sinclair Broadcast Group and Olympus. The US Defense Department complains of Russian toleration for ransomware gangs. The Fin7 gang has set up a front company to recruit talent. Betsy Carmelite from Booz Allen Hamilton on building mission-driven 5G security with zero trust. Our guest is Robert Carolina on ethics. And sentences are handed down in a bulletproof hosting case.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/203
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 21 Oct 2021 20:45:00 -0000</pubDate>
      <itunes:title>Evil Corp identified as the threat actor behind ransomware attacks on Sinclair and Olympus. Privateering. Fin7’s front company. Sentencing in a bulletproof hosting case.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1443</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Evil Corp is identified as the operator behind the ransomware that hit the Sinclair Broadcast Group and Olympus. The US Defense Department complains of Russian toleration for ransomware gangs. The Fin7 gang has set up a front company to recruit talent. Betsy Carmelite from Booz Allen Hamilton on building mission-driven 5G security with zero trust. Our guest is Robert Carolina on ethics. And sentences are handed down in a bulletproof hosting case.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/203
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Evil Corp is identified as the operator behind the ransomware that hit the Sinclair Broadcast Group and Olympus. The US Defense Department complains of Russian toleration for ransomware gangs. The Fin7 gang has set up a front company to recruit talent. Betsy Carmelite from Booz Allen Hamilton on building mission-driven 5G security with zero trust. Our guest is Robert Carolina on ethics. And sentences are handed down in a bulletproof hosting case.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/203</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1659</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0ed6e786-364d-11eb-b082-9baf73ab5818]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7131243249.mp3?updated=1690292290" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage campaign looks a lot like SIGINT collection. Magnitude gets more capable. VPN exploits solicited. Ransomware trends. Seven years for UPMC hacker. Plenty of Candy Corn coming.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1442/notes</link>
      <description>The LightBasin “activity cluster” has been active indeed against telecom infrastructure in what looks like an espionage campaign. The Magnitude exploit kit adds capabilities for hitting Chromium browsers. An exploit broker is interested in cloud-based VPNs. Victims continue to pay in ransomware attacks. A hacker gets seven years for conspiracy to defraud and identity theft. David Dufour from Webroot looks at the coming threat landscape. Our guest is Paul Shread from eSecurity Planet on backup tools for ransomware. And a Candy Corn shortage is averted.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/202
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 20 Oct 2021 20:15:00 -0000</pubDate>
      <itunes:title>Cyberespionage campaign looks a lot like SIGINT collection. Magnitude gets more capable. VPN exploits solicited. Ransomware trends. Seven years for UPMC hacker. Plenty of Candy Corn coming.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1442</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The LightBasin “activity cluster” has been active indeed against telecom infrastructure in what looks like an espionage campaign. The Magnitude exploit kit adds capabilities for hitting Chromium browsers. An exploit broker is interested in cloud-based VPNs. Victims continue to pay in ransomware attacks. A hacker gets seven years for conspiracy to defraud and identity theft. David Dufour from Webroot looks at the coming threat landscape. Our guest is Paul Shread from eSecurity Planet on backup tools for ransomware. And a Candy Corn shortage is averted.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/202
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The LightBasin “activity cluster” has been active indeed against telecom infrastructure in what looks like an espionage campaign. The Magnitude exploit kit adds capabilities for hitting Chromium browsers. An exploit broker is interested in cloud-based VPNs. Victims continue to pay in ransomware attacks. A hacker gets seven years for conspiracy to defraud and identity theft. David Dufour from Webroot looks at the coming threat landscape. Our guest is Paul Shread from eSecurity Planet on backup tools for ransomware. And a Candy Corn shortage is averted.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/202</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1472</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0f448f20-364d-11eb-b082-6ba444724548]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7143581016.mp3?updated=1690292272" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>TA505’s recent activity. Advice on defending organizations from BlackMatter. CISA RFI seeks EDR information. REvil’s halting attempts to return. Sinclair’s incident response.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1441/notes</link>
      <description>A look at TA505, familiar yet adaptable. A US joint cybersecurity advisory outlines the BlackMatter threat to critical infrastructure. CISA asks industry for technical information on endpoint detection and response capabilities. Is REvil trying to run on reputation? The Sinclair Broadcasting ransomware incident seems to provide a case study in rapid disclosure. Carole Theriault considers the fight for online anonymity. Joe Carrigan shares steps to protect the C-Suite. And there’s a decryptor out for BlackByte.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/201
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Oct 2021 20:45:00 -0000</pubDate>
      <itunes:title>TA505’s recent activity. Advice on defending organizations from BlackMatter. CISA RFI seeks EDR information. REvil’s halting attempts to return. Sinclair’s incident response.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1441</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A look at TA505, familiar yet adaptable. A US joint cybersecurity advisory outlines the BlackMatter threat to critical infrastructure. CISA asks industry for technical information on endpoint detection and response capabilities. Is REvil trying to run on reputation? The Sinclair Broadcasting ransomware incident seems to provide a case study in rapid disclosure. Carole Theriault considers the fight for online anonymity. Joe Carrigan shares steps to protect the C-Suite. And there’s a decryptor out for BlackByte.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/201
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A look at TA505, familiar yet adaptable. A US joint cybersecurity advisory outlines the BlackMatter threat to critical infrastructure. CISA asks industry for technical information on endpoint detection and response capabilities. Is REvil trying to run on reputation? The Sinclair Broadcasting ransomware incident seems to provide a case study in rapid disclosure. Carole Theriault considers the fight for online anonymity. Joe Carrigan shares steps to protect the C-Suite. And there’s a decryptor out for BlackByte.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/201</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1326</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0f7e82e8-364d-11eb-b082-5324d2aeb7fe]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8314780739.mp3?updated=1690292259" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A US broadcaster sustains a ransomware attack. North Korean catphis expelled from Twitter. REvil’s Tor sites are hijacked. Hacking back. Prosecution and responsible disclosure? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1440/notes</link>
      <description>The Sinclair Broadcast Group discloses that it sustained a ransomware attack over the weekend. Twitter kicks out two North Korean catphish deployed in a cyberespionage campaign. REvil goes offline, again, perhaps this time for good. Hacking back, at least insofar as you let the hoods know you can see them. Rick Howard previews the newest season of CSO Perspectives. Johannes Ullrich from SANS on Expired Domain Dumpster Diving. And an update on the Missouri disclosure and proposed hacking prosecution.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/200
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 18 Oct 2021 20:15:00 -0000</pubDate>
      <itunes:title>A US broadcaster sustains a ransomware attack. North Korean catphis expelled from Twitter. REvil’s Tor sites are hijacked. Hacking back. Prosecution and responsible disclosure? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1440</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Sinclair Broadcast Group discloses that it sustained a ransomware attack over the weekend. Twitter kicks out two North Korean catphish deployed in a cyberespionage campaign. REvil goes offline, again, perhaps this time for good. Hacking back, at least insofar as you let the hoods know you can see them. Rick Howard previews the newest season of CSO Perspectives. Johannes Ullrich from SANS on Expired Domain Dumpster Diving. And an update on the Missouri disclosure and proposed hacking prosecution.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/200
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Sinclair Broadcast Group discloses that it sustained a ransomware attack over the weekend. Twitter kicks out two North Korean catphish deployed in a cyberespionage campaign. REvil goes offline, again, perhaps this time for good. Hacking back, at least insofar as you let the hoods know you can see them. Rick Howard previews the newest season of CSO Perspectives. Johannes Ullrich from SANS on Expired Domain Dumpster Diving. And an update on the Missouri disclosure and proposed hacking prosecution.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/200</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1440</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0fe60f80-364d-11eb-b082-738fb4a50a4e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8655404903.mp3?updated=1690292246" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ell Marquez: It's okay to be new. [Linux] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/71/notes</link>
      <description>Linux and Security Advocate at Intezer Ell Marquez shares her journey from the family ranch to security. Needing a life change due to a bunch of circumstances that had occurred that left her almost homeless, Ell found out about a six week Linux boot camp that took her down the path toward technology. She fell in love security at at BSides Conference and hasn't looked back. Ell says she recently started a campaign called "it's okay to be new" noting that no matter how long you've been in the industry, you need to be new because technology changes so quickly. She concludes by offering one final piece of advice to everybody is just "be unapologetically yourself." We thank Ell for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 17 Oct 2021 07:00:00 -0000</pubDate>
      <itunes:title>Ell Marquez: It's okay to be new. [Linux] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>71</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Linux and Security Advocate at Intezer Ell Marquez shares her journey from the family ranch to security. </itunes:subtitle>
      <itunes:summary>Linux and Security Advocate at Intezer Ell Marquez shares her journey from the family ranch to security. Needing a life change due to a bunch of circumstances that had occurred that left her almost homeless, Ell found out about a six week Linux boot camp that took her down the path toward technology. She fell in love security at at BSides Conference and hasn't looked back. Ell says she recently started a campaign called "it's okay to be new" noting that no matter how long you've been in the industry, you need to be new because technology changes so quickly. She concludes by offering one final piece of advice to everybody is just "be unapologetically yourself." We thank Ell for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Linux and Security Advocate at Intezer Ell Marquez shares her journey from the family ranch to security. Needing a life change due to a bunch of circumstances that had occurred that left her almost homeless, Ell found out about a six week Linux boot camp that took her down the path toward technology. She fell in love security at at BSides Conference and hasn't looked back. Ell says she recently started a campaign called "it's okay to be new" noting that no matter how long you've been in the industry, you need to be new because technology changes so quickly. She concludes by offering one final piece of advice to everybody is just "be unapologetically yourself." We thank Ell for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>487</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[709ac36e-2c67-11ec-a9de-9f76c1311078]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2482649373.mp3?updated=1634320665" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Groove Gang making a name for themselves. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/205/notes</link>
      <description>Guest Michael DeBolt, Chief Intelligence Officer from Intel471, joins Dave Bittner to discuss their work on "How Groove Gang is shaking up the Ransomware-as-a-Service market to empower affiliates." McAfee Enterprise ATR believes, with high confidence, that the Groove gang is associated with the Babuk gang, either as a former affiliate or subgroup. These cybercriminals are happy to put aside previous Ransomware-as-a-Service hierarchies to focus on the ill-gotten gains to be made from controlling victim’s networks, rather than the previous approach which prioritized control of the ransomware itself.

The research can be found here:
How Groove Gang is shaking up the Ransomware-as-a-Service market to empower affiliates

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Oct 2021 07:00:00 -0000</pubDate>
      <itunes:title>Groove Gang making a name for themselves. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>205</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Michael DeBolt, Chief Intelligence Officer from Intel471, joins Dave Bittner to discuss their work on "How Groove Gang is shaking up the Ransomware-as-a-Service market to empower affiliates." McAfee Enterprise ATR believes, with high confidence, that the Groove gang is associated with the Babuk gang, either as a former affiliate or subgroup. These cybercriminals are happy to put aside previous Ransomware-as-a-Service hierarchies to focus on the ill-gotten gains to be made from controlling victim’s networks, rather than the previous approach which prioritized control of the ransomware itself.

The research can be found here:
How Groove Gang is shaking up the Ransomware-as-a-Service market to empower affiliates

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Michael DeBolt, Chief Intelligence Officer from Intel471, joins Dave Bittner to discuss their work on "How Groove Gang is shaking up the Ransomware-as-a-Service market to empower affiliates." McAfee Enterprise ATR believes, with high confidence, that the Groove gang is associated with the Babuk gang, either as a former affiliate or subgroup. These cybercriminals are happy to put aside previous Ransomware-as-a-Service hierarchies to focus on the ill-gotten gains to be made from controlling victim’s networks, rather than the previous approach which prioritized control of the ransomware itself.</p><p><br></p><p>The research can be found here:</p><ul><li><a href="https://intel471.com/blog/groove-gang-ransomware-babuk-revil-blackmatter">How Groove Gang is shaking up the Ransomware-as-a-Service market to empower affiliates</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1248</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9382026a-2c68-11ec-977b-4ffeb74e903a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3954407319.mp3?updated=1685126389" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA and its partners warn of threats to water and wastewater treatment facilities. The curious case of Missouri teachers’ Social Security Numbers.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1439/notes</link>
      <description>A CISA-issued Joint Advisory warns of threats and vulnerabilities at water and wastewater treatment facilities. CISA issues twenty-two other industrial control system advisories. Andrea Little Limbago from Interos on trends in the human element of security. Our guest is Gidi Cohen from Skybox with Vulnerability and Threat Trends. And the Governor of Missouri intends to prosecute the Saint Louis Post-Dispatch to the fullest extent of whatever the law turns out to be.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/199
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 15 Oct 2021 20:15:00 -0000</pubDate>
      <itunes:title>CISA and its partners warn of threats to water and wastewater treatment facilities. The curious case of Missouri teachers’ Social Security Numbers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1439</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A CISA-issued Joint Advisory warns of threats and vulnerabilities at water and wastewater treatment facilities. CISA issues twenty-two other industrial control system advisories. Andrea Little Limbago from Interos on trends in the human element of security. Our guest is Gidi Cohen from Skybox with Vulnerability and Threat Trends. And the Governor of Missouri intends to prosecute the Saint Louis Post-Dispatch to the fullest extent of whatever the law turns out to be.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/199
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A CISA-issued Joint Advisory warns of threats and vulnerabilities at water and wastewater treatment facilities. CISA issues twenty-two other industrial control system advisories. Andrea Little Limbago from Interos on trends in the human element of security. Our guest is Gidi Cohen from Skybox with Vulnerability and Threat Trends. And the Governor of Missouri intends to prosecute the Saint Louis Post-Dispatch to the fullest extent of whatever the law turns out to be.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/199</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1387</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0e80a9b6-364d-11eb-b082-13d35206703c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7704430869.mp3?updated=1690292157" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Notes from the underground: data breach extortion and a criminal market shuts down. International cooperation against ransomware. Cyber risk and higher education. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1438/notes</link>
      <description>Data breach extortion seems to be an emerging criminal trend. Notes on a darknet market’s retirement. Verizon advises Visible users to look to their credentials. Windows users’ attention is drawn to seven potentially serious vulnerabilities (all patchable). The Necro botnet is installing Monero cryptojackers. Organizing an international response to ransomware. Carole Theriault shares thoughts on social engineering. Dinah Davis from Arctic Wolf on the supply chain attack framework. And a quick look at the state of cyber risk in higher education.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/198
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 14 Oct 2021 20:15:00 -0000</pubDate>
      <itunes:title>Notes from the underground: data breach extortion and a criminal market shuts down. International cooperation against ransomware. Cyber risk and higher education. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1438</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Data breach extortion seems to be an emerging criminal trend. Notes on a darknet market’s retirement. Verizon advises Visible users to look to their credentials. Windows users’ attention is drawn to seven potentially serious vulnerabilities (all patchable). The Necro botnet is installing Monero cryptojackers. Organizing an international response to ransomware. Carole Theriault shares thoughts on social engineering. Dinah Davis from Arctic Wolf on the supply chain attack framework. And a quick look at the state of cyber risk in higher education.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/198
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Data breach extortion seems to be an emerging criminal trend. Notes on a darknet market’s retirement. Verizon advises Visible users to look to their credentials. Windows users’ attention is drawn to seven potentially serious vulnerabilities (all patchable). The Necro botnet is installing Monero cryptojackers. Organizing an international response to ransomware. Carole Theriault shares thoughts on social engineering. Dinah Davis from Arctic Wolf on the supply chain attack framework. And a quick look at the state of cyber risk in higher education.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/198</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1537</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0eec5102-364d-11eb-b082-c7b0da022443]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4921393159.mp3?updated=1690292143" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber Espionage, again. Patched SolarWinds yet? Patch Tuesday. The international conference on ransomware has begun. Booter customers get a warning. A disgruntled insider alters aircraft records.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1437/notes</link>
      <description>A Chinese-speaking APT is distributing the MysterySnail RAT in what appears to be a cyberespionage campaign. Some users still haven’t patched vulnerable SolarWinds instances. Notes on yesterday’s Patch Tuesday. The US-convened international ransomware conference kicked off today, and Russia wasn’t invited. Former users of a criminal booter service get a stern warning letter from the Dutch police. Caleb Barlow reacts to a recent ransomware tragedy. Our guest is Rob Gurzeev of CyCognito on the security issues with subsidiaries. And a Florida woman is charged with altering aircraft records.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/197
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 13 Oct 2021 20:15:00 -0000</pubDate>
      <itunes:title>Cyber Espionage, again. Patched SolarWinds yet? Patch Tuesday. The international conference on ransomware has begun. Booter customers get a warning. A disgruntled insider alters aircraft records.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1437</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A Chinese-speaking APT is distributing the MysterySnail RAT in what appears to be a cyberespionage campaign. Some users still haven’t patched vulnerable SolarWinds instances. Notes on yesterday’s Patch Tuesday. The US-convened international ransomware conference kicked off today, and Russia wasn’t invited. Former users of a criminal booter service get a stern warning letter from the Dutch police. Caleb Barlow reacts to a recent ransomware tragedy. Our guest is Rob Gurzeev of CyCognito on the security issues with subsidiaries. And a Florida woman is charged with altering aircraft records.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/197
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Chinese-speaking APT is distributing the MysterySnail RAT in what appears to be a cyberespionage campaign. Some users still haven’t patched vulnerable SolarWinds instances. Notes on yesterday’s Patch Tuesday. The US-convened international ransomware conference kicked off today, and Russia wasn’t invited. Former users of a criminal booter service get a stern warning letter from the Dutch police. Caleb Barlow reacts to a recent ransomware tragedy. Our guest is Rob Gurzeev of CyCognito on the security issues with subsidiaries. And a Florida woman is charged with altering aircraft records.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/197</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1779</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0f2d8384-364d-11eb-b082-47f058299ebe]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7919190802.mp3?updated=1690292131" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Espionage by password spraying, and espionage via peanut butter sandwich. Ransomware and DDoS warnings. Two journalists get the Nobel Peace Prize</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1436/notes</link>
      <description>Teheran is running password spraying attacks (especially on Thursdays and Sundays). More on the renewed popularity of DDoS attacks. NCSC warns British businesses against ransomware. Two journalists win the Nobel Peace Prize. Joe Carrigan shares his thoughts on GriftHorse. Our guest is Bindu Sundaresan from AT&amp;T Cybersecurity football season and cyber risks. And watch out for small data cards in your peanut butter sandwiches, kids.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/196
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Oct 2021 20:15:00 -0000</pubDate>
      <itunes:title>Espionage by password spraying, and espionage via peanut butter sandwich. Ransomware and DDoS warnings. Two journalists get the Nobel Peace Prize</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1436</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Teheran is running password spraying attacks (especially on Thursdays and Sundays). More on the renewed popularity of DDoS attacks. NCSC warns British businesses against ransomware. Two journalists win the Nobel Peace Prize. Joe Carrigan shares his thoughts on GriftHorse. Our guest is Bindu Sundaresan from AT&amp;T Cybersecurity football season and cyber risks. And watch out for small data cards in your peanut butter sandwiches, kids.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/196
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Teheran is running password spraying attacks (especially on Thursdays and Sundays). More on the renewed popularity of DDoS attacks. NCSC warns British businesses against ransomware. Two journalists win the Nobel Peace Prize. Joe Carrigan shares his thoughts on GriftHorse. Our guest is Bindu Sundaresan from AT&amp;T Cybersecurity football season and cyber risks. And watch out for small data cards in your peanut butter sandwiches, kids.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/196</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1799</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0f9336f2-364d-11eb-b082-ef4b3685fb6c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1623725736.mp3?updated=1690292172" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Extra: Let's talk about Facebook's research. [Caveat]</title>
      <link>https://%20thecyberwire.com/podcasts/caveat/96/notes</link>
      <description>Our guest is author and journalist Steven Levy. He’s editor-at-large at Wired and his most recent book is "Facebook: The Inside Story. Steven offers his insights on Facebook’s internal research teams, Ben shares a newly-decided court case on whether Big Tech companies can be sued under the Anti-Terrorism statute, and Dave's got the story of some warrantless surveillance being declared unconstitutional in Colorado. 
While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. 
Links to stories:

Federal appeals court clears social media companies in Pulse shooting lawsuit

Colorado Supreme Court Rules Three Months of Warrantless Video Surveillance Violates the Constitution


Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com or simply leave us a message at (410) 618-3720. Hope to hear from you. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 11 Oct 2021 05:00:00 -0000</pubDate>
      <itunes:title>Extra: Let's talk about Facebook's research. [Caveat]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>96</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Our guest is author and journalist Steven Levy. He’s editor-at-large at Wired and his most recent book is "Facebook: The Inside Story. Steven offers his insights on Facebook’s internal research teams, Ben shares a newly-decided court case on whether Big Tech companies can be sued under the Anti-Terrorism statute, and Dave's got the story of some warrantless surveillance being declared unconstitutional in Colorado. 
While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. 
Links to stories:

Federal appeals court clears social media companies in Pulse shooting lawsuit

Colorado Supreme Court Rules Three Months of Warrantless Video Surveillance Violates the Constitution


Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com or simply leave us a message at (410) 618-3720. Hope to hear from you. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our guest is author and journalist Steven Levy. He’s editor-at-large at Wired and his most recent book is "Facebook: The Inside Story. Steven offers his insights on Facebook’s internal research teams, Ben shares a newly-decided court case on whether Big Tech companies can be sued under the Anti-Terrorism statute, and Dave's got the story of some warrantless surveillance being declared unconstitutional in Colorado. </p><p><em>While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. </em></p><p>Links to stories:</p><ul>
<li><a href="https://www.clickorlando.com/news/2021/09/28/federal-appeals-court-clears-social-media-companies-in-pulse-shooting-lawsuit/">Federal appeals court clears social media companies in Pulse shooting lawsuit</a></li>
<li><a href="https://www.eff.org/deeplinks/2021/09/colorado-supreme-court-rules-three-months-warrantless-video-surveillance-violates">Colorado Supreme Court Rules Three Months of Warrantless Video Surveillance Violates the Constitution</a></li>
</ul><p><br></p><p><em>Got a question you'd like us to answer on our show? You can send your audio file to </em><a href="mailto:caveat@thecyberwire.com"><em>caveat@thecyberwire.com</em></a><em> or simply leave us a message at (410) 618-3720. Hope to hear from you. </em></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2645</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[72ba2258-294b-11ec-a1ed-5f83551e6ceb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2026399851.mp3?updated=1633816686" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Brandon Karpf: A sailor of the 21st century. [Transitioning service member] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/70/notes</link>
      <description>Lieutenant in the US Navy and Skillbridge Fellow at the CyberWire, Brandon Karpf, knew he wanted to join the military at a young age. He achieved that through the US Naval Academy where he was a member of the men's heavyweight rowing team. Commissioning into the cryptologic field as a naval cryptologic warfare officer, Brandon was sent to MIT for a graduate degree where he experienced the exact opposite end of the spectrum from USNA's structured life. Brandon's work with both NSA and US Cyber Command helped him gain experience and cyber operations skills. As he is transitions from active duty to civilian life, Brandon shares the difficulties that process brings about. Through Skillbridge Fellowship program, Brandon's transition has him sharing his skills with the CyberWire. We thank Brandon for sharing his skills and his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 10 Oct 2021 07:00:00 -0000</pubDate>
      <itunes:title>Brandon Karpf: A sailor of the 21st century. [Transitioning service member] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>70</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Lieutenant in the US Navy and Skillbridge Fellow at the CyberWire, Brandon Karpf, knew he wanted to join the military at a young age.</itunes:subtitle>
      <itunes:summary>Lieutenant in the US Navy and Skillbridge Fellow at the CyberWire, Brandon Karpf, knew he wanted to join the military at a young age. He achieved that through the US Naval Academy where he was a member of the men's heavyweight rowing team. Commissioning into the cryptologic field as a naval cryptologic warfare officer, Brandon was sent to MIT for a graduate degree where he experienced the exact opposite end of the spectrum from USNA's structured life. Brandon's work with both NSA and US Cyber Command helped him gain experience and cyber operations skills. As he is transitions from active duty to civilian life, Brandon shares the difficulties that process brings about. Through Skillbridge Fellowship program, Brandon's transition has him sharing his skills with the CyberWire. We thank Brandon for sharing his skills and his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Lieutenant in the US Navy and Skillbridge Fellow at the CyberWire, Brandon Karpf, knew he wanted to join the military at a young age. He achieved that through the US Naval Academy where he was a member of the men's heavyweight rowing team. Commissioning into the cryptologic field as a naval cryptologic warfare officer, Brandon was sent to MIT for a graduate degree where he experienced the exact opposite end of the spectrum from USNA's structured life. Brandon's work with both NSA and US Cyber Command helped him gain experience and cyber operations skills. As he is transitions from active duty to civilian life, Brandon shares the difficulties that process brings about. Through Skillbridge Fellowship program, Brandon's transition has him sharing his skills with the CyberWire. We thank Brandon for sharing his skills and his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>582</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3a589c1a-262a-11ec-90d0-036c8dbe0fe5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5440039093.mp3?updated=1633526193" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Taking a closer look at UNC1151. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/204/notes</link>
      <description>Matt Stafford, Senior Threat Intelligence Researcher, from Prevailion joins Dave to talk about their work on "Diving Deep into UNC1151’s Infrastructure: Ghostwriter and beyond." Prevailion’s Adversarial Counterintelligence Team (PACT) used advanced infrastructure hunting techniques and Prevailion’s visibility into threat actor infrastructure creation to uncover previously unknown domains associated with UNC1151 and the “Ghostwriter” influence campaign. UNC1151 is likely a state-backed threat actor waging an ongoing and far-reaching influence campaign that has targeted numerous countries across Europe. Their operations typically display messaging in general alignment with the security interests of the Russian Federation; their hallmarks include anti-NATO messaging, intimate knowledge of regional culture and politics, and strategic influence operations (such as hack-and-leak operations used in conjunction with fabricated messaging and/or forged documents). PACT assesses with varying degrees of confidence that there are 81 additional, unreported domains clustered with the activity that FireEye and ThreatConnect detailed in their respective reports. PACT also assesses with High Confidence that UNC1151 has targeted additional European entities outside of the Baltics, Poland, Ukraine and Germany, for which no previous public reporting exists.
The research can be found here:
Diving Deep into UNC1151’s Infrastructure: Ghostwriter and beyond

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Oct 2021 07:00:00 -0000</pubDate>
      <itunes:title>Taking a closer look at UNC1151. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>204</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Matt Stafford, Senior Threat Intelligence Researcher, from Prevailion joins Dave to talk about their work on "Diving Deep into UNC1151’s Infrastructure: Ghostwriter and beyond." Prevailion’s Adversarial Counterintelligence Team (PACT) used advanced infrastructure hunting techniques and Prevailion’s visibility into threat actor infrastructure creation to uncover previously unknown domains associated with UNC1151 and the “Ghostwriter” influence campaign. UNC1151 is likely a state-backed threat actor waging an ongoing and far-reaching influence campaign that has targeted numerous countries across Europe. Their operations typically display messaging in general alignment with the security interests of the Russian Federation; their hallmarks include anti-NATO messaging, intimate knowledge of regional culture and politics, and strategic influence operations (such as hack-and-leak operations used in conjunction with fabricated messaging and/or forged documents). PACT assesses with varying degrees of confidence that there are 81 additional, unreported domains clustered with the activity that FireEye and ThreatConnect detailed in their respective reports. PACT also assesses with High Confidence that UNC1151 has targeted additional European entities outside of the Baltics, Poland, Ukraine and Germany, for which no previous public reporting exists.
The research can be found here:
Diving Deep into UNC1151’s Infrastructure: Ghostwriter and beyond

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Matt Stafford, Senior Threat Intelligence Researcher, from Prevailion joins Dave to talk about their work on "Diving Deep into UNC1151’s Infrastructure: Ghostwriter and beyond." Prevailion’s Adversarial Counterintelligence Team (PACT) used advanced infrastructure hunting techniques and Prevailion’s visibility into threat actor infrastructure creation to uncover previously unknown domains associated with UNC1151 and the “Ghostwriter” influence campaign. UNC1151 is likely a state-backed threat actor waging an ongoing and far-reaching influence campaign that has targeted numerous countries across Europe. Their operations typically display messaging in general alignment with the security interests of the Russian Federation; their hallmarks include anti-NATO messaging, intimate knowledge of regional culture and politics, and strategic influence operations (such as hack-and-leak operations used in conjunction with fabricated messaging and/or forged documents). PACT assesses with varying degrees of confidence that there are 81 additional, unreported domains clustered with the activity that FireEye and ThreatConnect detailed in their respective reports. PACT also assesses with High Confidence that UNC1151 has targeted additional European entities outside of the Baltics, Poland, Ukraine and Germany, for which no previous public reporting exists.</p><p>The research can be found here:</p><ul><li><a href="https://www.prevailion.com/diving-deep-into-unc1151s-infrastructure-ghostwriter-and-beyond/">Diving Deep into UNC1151’s Infrastructure: Ghostwriter and beyond</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1016</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7d506e3e-2621-11ec-ad65-dfebbbc89751]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1078560191.mp3?updated=1685126378" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fancy Bear’s snuffling at Gmail credentials. FIN12’s threat to healthcare, and BlackMatter’s threat to agriculture. REvil tries to reestablish itself in the underworld. Twitch update. Sachkov is charged.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1435/notes</link>
      <description>Google warns fourteen-thousand Gmail users that Fancy Bear has probably been after their passwords. FIN12, a fast-running ransomware group, is after hospitals’ and healthcare providers’ money. BlackMatter remains active against the agriculture sector. REvil is back and talking on the RAMP forum, but so far it’s getting a chilly reception. Twitch traces its vulnerability to a server misconfiguration. David Dufour from webroot wonders about cracking down on crypto. Our guest is Jeff Dileo of NCC on mastering container security. And Group-IB’s CEO is charged with treason.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/195
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 08 Oct 2021 19:46:00 -0000</pubDate>
      <itunes:title>Fancy Bear’s snuffling at Gmail credentials. FIN12’s threat to healthcare, and BlackMatter’s threat to agriculture. REvil tries to reestablish itself in the underworld. Twitch update. Sachkov is charged.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1435</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Google warns fourteen-thousand Gmail users that Fancy Bear has probably been after their passwords. FIN12, a fast-running ransomware group, is after hospitals’ and healthcare providers’ money. BlackMatter remains active against the agriculture sector. REvil is back and talking on the RAMP forum, but so far it’s getting a chilly reception. Twitch traces its vulnerability to a server misconfiguration. David Dufour from webroot wonders about cracking down on crypto. Our guest is Jeff Dileo of NCC on mastering container security. And Group-IB’s CEO is charged with treason.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/195
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Google warns fourteen-thousand Gmail users that Fancy Bear has probably been after their passwords. FIN12, a fast-running ransomware group, is after hospitals’ and healthcare providers’ money. BlackMatter remains active against the agriculture sector. REvil is back and talking on the RAMP forum, but so far it’s getting a chilly reception. Twitch traces its vulnerability to a server misconfiguration. David Dufour from webroot wonders about cracking down on crypto. Our guest is Jeff Dileo of NCC on mastering container security. And Group-IB’s CEO is charged with treason.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/195</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1503</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0e6e7afc-364d-11eb-b082-3f15c34fe0de]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3118505291.mp3?updated=1690292104" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Espionage, mostly cyber but also physical. DDoS in the Philippines.  TSA regulations for rail and airline cybersecurity are coming. US DoJ promises civil action for cyber failures. Twitch update. And NFTs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1434/notes</link>
      <description>Cyberespionage seems undeterred by stern warnings. DDoS hits the Philippine Senate. The US Department of Homeland Security intends to issue cybersecurity regulations for passenger rail and airlines. The US Department of Justice intends to use the False Claims Act to bring civil actions against government contractors who fail to follow “recognized cybersecurity standards.” An update on the Twitch breach. Josh Ray from Accenture looks at what’s going on with Fancy Lazarus. Our guest is Sam Ingalls from eSecurity Planet on the state of Blockchain applications in cybersecurity. And what would it take to get you kids into a nice non-fungible token?
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/194
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 07 Oct 2021 19:19:30 -0000</pubDate>
      <itunes:title>Espionage, mostly cyber but also physical. DDoS in the Philippines.  TSA regulations for rail and airline cybersecurity are coming. US DoJ promises civil action for cyber failures. Twitch update. And NFTs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1434</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cyberespionage seems undeterred by stern warnings. DDoS hits the Philippine Senate. The US Department of Homeland Security intends to issue cybersecurity regulations for passenger rail and airlines. The US Department of Justice intends to use the False Claims Act to bring civil actions against government contractors who fail to follow “recognized cybersecurity standards.” An update on the Twitch breach. Josh Ray from Accenture looks at what’s going on with Fancy Lazarus. Our guest is Sam Ingalls from eSecurity Planet on the state of Blockchain applications in cybersecurity. And what would it take to get you kids into a nice non-fungible token?
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/194
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyberespionage seems undeterred by stern warnings. DDoS hits the Philippine Senate. The US Department of Homeland Security intends to issue cybersecurity regulations for passenger rail and airlines. The US Department of Justice intends to use the False Claims Act to bring civil actions against government contractors who fail to follow “recognized cybersecurity standards.” An update on the Twitch breach. Josh Ray from Accenture looks at what’s going on with Fancy Lazarus. Our guest is Sam Ingalls from eSecurity Planet on the state of Blockchain applications in cybersecurity. And what would it take to get you kids into a nice non-fungible token?</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/194</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1571</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0f027158-364d-11eb-b082-8f60fbda32ee]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5414934851.mp3?updated=1690292089" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Twitch is breached. MalKamak: a newly described Iranian threat actor. Chinese cyberespionage against India. SafeMoon phishbait. The ransomware threat. What counts as compromise.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1433/notes</link>
      <description>Twitch is breached. A newly discovered Iranian threat group is described. A Chinese cyberespionage campaign in India proceeds by phishing. SafeMoon alt-coin is trendy phishbait in criminal circles. As the US prepares to convene an anti-ransomware conference, Russian gangs show no signs of slacking off. Betsy Carmelite from BAH on AI/ ML in cyber defensive operations. Our guest is Adam Flatley of Redacted with recommendations from the Ransomware Task Force. And observations on what counts as compromising material.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/193
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 06 Oct 2021 19:39:00 -0000</pubDate>
      <itunes:title>Twitch is breached. MalKamak: a newly described Iranian threat actor. Chinese cyberespionage against India. SafeMoon phishbait. The ransomware threat. What counts as compromise.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1433</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Twitch is breached. A newly discovered Iranian threat group is described. A Chinese cyberespionage campaign in India proceeds by phishing. SafeMoon alt-coin is trendy phishbait in criminal circles. As the US prepares to convene an anti-ransomware conference, Russian gangs show no signs of slacking off. Betsy Carmelite from BAH on AI/ ML in cyber defensive operations. Our guest is Adam Flatley of Redacted with recommendations from the Ransomware Task Force. And observations on what counts as compromising material.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/193
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Twitch is breached. A newly discovered Iranian threat group is described. A Chinese cyberespionage campaign in India proceeds by phishing. SafeMoon alt-coin is trendy phishbait in criminal circles. As the US prepares to convene an anti-ransomware conference, Russian gangs show no signs of slacking off. Betsy Carmelite from BAH on AI/ ML in cyber defensive operations. Our guest is Adam Flatley of Redacted with recommendations from the Ransomware Task Force. And observations on what counts as compromising material.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/193</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1871</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0f1708ca-364d-11eb-b082-97b36e300128]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1883472518.mp3?updated=1690292077" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Facebook’s back up, and the outage was due to an error, not an attack. A look at AvosLocker and Atom Silo ransomware. The case of the Kyiv ransomware gangsters. Thoughts on the Pandora Papers. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1432/notes</link>
      <description>Facebook restores service after dealing with an accidental BGP configuration issue. There’s now a data auction site for AvosLocker ransomware. Atom Silo ransomware is quiet, patient, and stealthy. The state of investigation into those two guys collared on a ransomware beef in Kyiv last week. Ben Yelin is skeptical of data privacy poll results. Our guest is Microsoft’s Ann Johnson, host of the newest show to join the CyberWire network, Afternoon Cyber Tea. And what would they have thought of the Pandora Papers in Deadwood, back in the day?
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/192
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Oct 2021 20:15:00 -0000</pubDate>
      <itunes:title>Facebook’s back up, and the outage was due to an error, not an attack. A look at AvosLocker and Atom Silo ransomware. The case of the Kyiv ransomware gangsters. Thoughts on the Pandora Papers. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1432</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Facebook restores service after dealing with an accidental BGP configuration issue. There’s now a data auction site for AvosLocker ransomware. Atom Silo ransomware is quiet, patient, and stealthy. The state of investigation into those two guys collared on a ransomware beef in Kyiv last week. Ben Yelin is skeptical of data privacy poll results. Our guest is Microsoft’s Ann Johnson, host of the newest show to join the CyberWire network, Afternoon Cyber Tea. And what would they have thought of the Pandora Papers in Deadwood, back in the day?
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/192
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Facebook restores service after dealing with an accidental BGP configuration issue. There’s now a data auction site for AvosLocker ransomware. Atom Silo ransomware is quiet, patient, and stealthy. The state of investigation into those two guys collared on a ransomware beef in Kyiv last week. Ben Yelin is skeptical of data privacy poll results. Our guest is Microsoft’s Ann Johnson, host of the newest show to join the CyberWire network, Afternoon Cyber Tea. And what would they have thought of the Pandora Papers in Deadwood, back in the day?</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/192</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1739</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0fab57aa-364d-11eb-b082-b7a81ee90568]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8986738816.mp3?updated=1690292060" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Privacy and the Pandora Papers. Flubot’s scare tactics. Exploiting an account recovery system. Conti warns victims not to talk to the press. An international meeting on cybercrime? A ransomware bust.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1431/notes</link>
      <description>The Pandora Papers leak erstwhile private financial transactions by the rich and well-connected (and it’s 150 mainstream news organizations who cooperated in bringing them to light). Flubot is using itself to scare victims into installing Flubot. Coinbase thieves exploited account recovery systems to obtain 2FA credentials. The US plans to convene an international conference on fighting cybercrime. Conti warns its victims not to talk to reporters. Andrea Little Limbago from Interos on modeling cyber risk. Carole Theriault has thoughts on facial recognition software. And a ransomware bust in Ukraine leads us to ask, why Capri Sun. (Think about it, kids.)
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/191
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 04 Oct 2021 20:03:00 -0000</pubDate>
      <itunes:title>Privacy and the Pandora Papers. Flubot’s scare tactics. Exploiting an account recovery system. Conti warns victims not to talk to the press. An international meeting on cybercrime? A ransomware bust.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1431</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Pandora Papers leak erstwhile private financial transactions by the rich and well-connected (and it’s 150 mainstream news organizations who cooperated in bringing them to light). Flubot is using itself to scare victims into installing Flubot. Coinbase thieves exploited account recovery systems to obtain 2FA credentials. The US plans to convene an international conference on fighting cybercrime. Conti warns its victims not to talk to reporters. Andrea Little Limbago from Interos on modeling cyber risk. Carole Theriault has thoughts on facial recognition software. And a ransomware bust in Ukraine leads us to ask, why Capri Sun. (Think about it, kids.)
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/191
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Pandora Papers leak erstwhile private financial transactions by the rich and well-connected (and it’s 150 mainstream news organizations who cooperated in bringing them to light). Flubot is using itself to scare victims into installing Flubot. Coinbase thieves exploited account recovery systems to obtain 2FA credentials. The US plans to convene an international conference on fighting cybercrime. Conti warns its victims not to talk to reporters. Andrea Little Limbago from Interos on modeling cyber risk. Carole Theriault has thoughts on facial recognition software. And a ransomware bust in Ukraine leads us to ask, why Capri Sun. (Think about it, kids.)</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/191</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1565</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0fbf7802-364d-11eb-b082-8b73533c5fb2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8180869528.mp3?updated=1690292045" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cloud configuration security: Breaking the endless cycle. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/20/notes</link>
      <description>Moving to the cloud creates a tremendous opportunity to get security right and reduce the risk of data breach. But most cloud security initiatives get underway after services are deployed in the cloud. It’s frustrating when major breaches resulting from basic mistakes, like S3 buckets left unsecured or secrets exposed. Continually checking for risky configurations and unusual behavior in cloud logs is a requirement, but there is an opportunity to be proactive. What if you could configure your security and access controls as you set up cloud infrastructure? The CyberWire's Rick Howard speaks with Hash Table members Kevin Ford of North Dakota State government and Steve Winterfeld of Akamai, as well as sponsor Sysdig's Omer Azaria to discuss how security teams are adopting Infrastructure as Code (IaC) security as part of their overall cloud security strategy to reduce risk.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 03 Oct 2021 07:00:00 -0000</pubDate>
      <itunes:title>Cloud configuration security: Breaking the endless cycle. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>20</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Moving to the cloud creates a tremendous opportunity to get security right and reduce the risk of data breach. But most cloud security initiatives get underway after services are deployed in the cloud. It’s frustrating when major breaches resulting from basic mistakes, like S3 buckets left unsecured or secrets exposed. Continually checking for risky configurations and unusual behavior in cloud logs is a requirement, but there is an opportunity to be proactive. What if you could configure your security and access controls as you set up cloud infrastructure? The CyberWire's Rick Howard speaks with Hash Table members Kevin Ford of North Dakota State government and Steve Winterfeld of Akamai, as well as sponsor Sysdig's Omer Azaria to discuss how security teams are adopting Infrastructure as Code (IaC) security as part of their overall cloud security strategy to reduce risk.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Moving to the cloud creates a tremendous opportunity to get security right and reduce the risk of data breach. But most cloud security initiatives get underway after services are deployed in the cloud. It’s frustrating when major breaches resulting from basic mistakes, like S3 buckets left unsecured or secrets exposed. Continually checking for risky configurations and unusual behavior in cloud logs is a requirement, but there is an opportunity to be proactive. What if you could configure your security and access controls as you set up cloud infrastructure? The CyberWire's Rick Howard speaks with Hash Table members Kevin Ford of North Dakota State government and Steve Winterfeld of Akamai, as well as sponsor Sysdig's Omer Azaria to discuss how security teams are adopting Infrastructure as Code (IaC) security as part of their overall cloud security strategy to reduce risk.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1983</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[659865fc-230c-11ec-a891-831bdc3fa15e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7062859092.mp3?updated=1633128977" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pattie Dillon: Take the leap. [Anti-fraud] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/69/notes</link>
      <description>Product Manager in Anti-Fraud Solutions at SpyCloud, Pattie Dillon shares her journey from raising her family to specializing in the anti-fraud space. Upon reentering the workforce, Pattie worked on identity verification and developed a system with privacy concerns in mind. She moved to work in gift cards and was exposed to money laundering. Traveling along the fraud spectrum, Pattie learned about underground data and feels that this data can be leveraged to actually prevent and fight online fraud. Pattie believes if you don't try, you'll never know. We know we appreciate Pattie sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 03 Oct 2021 07:00:00 -0000</pubDate>
      <itunes:title>Pattie Dillon: Take the leap. [Anti-fraud] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>69</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Product Manager in Anti-Fraud Solutions at SpyCloud, Pattie Dillon shares her journey from raising her family to specializing in the anti-fraud space. </itunes:subtitle>
      <itunes:summary>Product Manager in Anti-Fraud Solutions at SpyCloud, Pattie Dillon shares her journey from raising her family to specializing in the anti-fraud space. Upon reentering the workforce, Pattie worked on identity verification and developed a system with privacy concerns in mind. She moved to work in gift cards and was exposed to money laundering. Traveling along the fraud spectrum, Pattie learned about underground data and feels that this data can be leveraged to actually prevent and fight online fraud. Pattie believes if you don't try, you'll never know. We know we appreciate Pattie sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Product Manager in Anti-Fraud Solutions at SpyCloud, Pattie Dillon shares her journey from raising her family to specializing in the anti-fraud space. Upon reentering the workforce, Pattie worked on identity verification and developed a system with privacy concerns in mind. She moved to work in gift cards and was exposed to money laundering. Traveling along the fraud spectrum, Pattie learned about underground data and feels that this data can be leveraged to actually prevent and fight online fraud. Pattie believes if you don't try, you'll never know. We know we appreciate Pattie sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>441</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d1598690-2249-11ec-a654-271813947352]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5264737791.mp3?updated=1633046342" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>IoT security and the need for randomness. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/203/notes</link>
      <description>Dan Petro, Lead Researcher, and Allan Cecil, Security Consultant, from Bishop Fox join Dave to share their research "You're Doing IoT RNG," that they presented at DefCon 29. There’s a crack in the foundation of Internet of Things (IoT) security, one that affects 35 billion devices worldwide. Basically, every IoT device with a hardware random number generator (RNG) contains a serious vulnerability whereby it fails to properly generate random numbers, which undermines security for any upstream use. In order to perform most security-relevant operations, computers need to generate secrets via an RNG. These secrets then form the basis of cryptography, access controls, authentication, and more. The details of exactly how and why these secrets are generated varies for each use.
The research can be found here:
You're Doing IoT RNG

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Oct 2021 07:00:00 -0000</pubDate>
      <itunes:title>IoT security and the need for randomness. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>203</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dan Petro, Lead Researcher, and Allan Cecil, Security Consultant, from Bishop Fox join Dave to share their research "You're Doing IoT RNG," that they presented at DefCon 29. There’s a crack in the foundation of Internet of Things (IoT) security, one that affects 35 billion devices worldwide. Basically, every IoT device with a hardware random number generator (RNG) contains a serious vulnerability whereby it fails to properly generate random numbers, which undermines security for any upstream use. In order to perform most security-relevant operations, computers need to generate secrets via an RNG. These secrets then form the basis of cryptography, access controls, authentication, and more. The details of exactly how and why these secrets are generated varies for each use.
The research can be found here:
You're Doing IoT RNG

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dan Petro, Lead Researcher, and Allan Cecil, Security Consultant, from Bishop Fox join Dave to share their research "You're Doing IoT RNG," that they presented at DefCon 29. There’s a crack in the foundation of Internet of Things (IoT) security, one that affects 35 billion devices worldwide. Basically, every IoT device with a hardware random number generator (RNG) contains a serious vulnerability whereby it fails to properly generate random numbers, which undermines security for any upstream use. In order to perform most security-relevant operations, computers need to generate secrets via an RNG. These secrets then form the basis of cryptography, access controls, authentication, and more. The details of exactly how and why these secrets are generated varies for each use.</p><p>The research can be found here:</p><ul><li><a href="https://labs.bishopfox.com/tech-blog/youre-doing-iot-rng">You're Doing IoT RNG</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1940</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[62c539fc-208e-11ec-8697-b3ff3d0779cd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5792897021.mp3?updated=1685126375" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing for those who fear Pegasus. ChamelGang APT active against multiple countries. Problems with a ransomware decryptor. Controversial proofs-of-concept. And a death blamed on ransomware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1430/notes</link>
      <description>A malware campaign offers bogus protection against Pegasus surveillance. A new APT, ChamelGang, is found active against targets in at least ten countries. A ransomware gang can’t get its decryptor right. A proof-of-concept shows that charges can be made from a non-contact Visa card in an iPhone wallet. David Dufour from Webroot warns of potential perils in cyber insurance. Our guest is Shamla Naidoo from Netskope with advice for cyber innovators .And ransomware may be responsible for a child’s death in an Alabama hospital.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/190
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 01 Oct 2021 20:15:00 -0000</pubDate>
      <itunes:title>Phishing for those who fear Pegasus. ChamelGang APT active against multiple countries. Problems with a ransomware decryptor. Controversial proofs-of-concept. And a death blamed on ransomware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1430</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A malware campaign offers bogus protection against Pegasus surveillance. A new APT, ChamelGang, is found active against targets in at least ten countries. A ransomware gang can’t get its decryptor right. A proof-of-concept shows that charges can be made from a non-contact Visa card in an iPhone wallet. David Dufour from Webroot warns of potential perils in cyber insurance. Our guest is Shamla Naidoo from Netskope with advice for cyber innovators .And ransomware may be responsible for a child’s death in an Alabama hospital.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/190
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A malware campaign offers bogus protection against Pegasus surveillance. A new APT, ChamelGang, is found active against targets in at least ten countries. A ransomware gang can’t get its decryptor right. A proof-of-concept shows that charges can be made from a non-contact Visa card in an iPhone wallet. David Dufour from Webroot warns of potential perils in cyber insurance. Our guest is Shamla Naidoo from Netskope with advice for cyber innovators .And ransomware may be responsible for a child’s death in an Alabama hospital.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/190</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1548</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0e5c17fe-364d-11eb-b082-4fbe866131f5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9295077881.mp3?updated=1690292031" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>GriftHorse’s premium service scams. Facebook open sources a static analysis tool. Update on the Group-IB affair. What the Familiar Four are up to. Counting ransomware strains. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1429/notes</link>
      <description>GriftHorse will subscribe afflicted Android users to premium services they never knew they’d signed up for (and wouldn’t want if they did). Facebook releases a static analysis tool it uses internally to check apps for security issues. Speculation about what put Group-IB’s CEO in hot water with the Kremlin. A look from NSA about where the major nation-state cyberthreats currently stand. Malek Ben Salem from Accenture has thoughts on quantum security. Our guest is author and Wired editor at large Steven Levy joins us with insights on Facebook’s internal research teams. And a short census of ransomware strains.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/189
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 30 Sep 2021 20:15:00 -0000</pubDate>
      <itunes:title>GriftHorse’s premium service scams. Facebook open sources a static analysis tool. Update on the Group-IB affair. What the Familiar Four are up to. Counting ransomware strains. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1429</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>GriftHorse will subscribe afflicted Android users to premium services they never knew they’d signed up for (and wouldn’t want if they did). Facebook releases a static analysis tool it uses internally to check apps for security issues. Speculation about what put Group-IB’s CEO in hot water with the Kremlin. A look from NSA about where the major nation-state cyberthreats currently stand. Malek Ben Salem from Accenture has thoughts on quantum security. Our guest is author and Wired editor at large Steven Levy joins us with insights on Facebook’s internal research teams. And a short census of ransomware strains.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/189
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>GriftHorse will subscribe afflicted Android users to premium services they never knew they’d signed up for (and wouldn’t want if they did). Facebook releases a static analysis tool it uses internally to check apps for security issues. Speculation about what put Group-IB’s CEO in hot water with the Kremlin. A look from NSA about where the major nation-state cyberthreats currently stand. Malek Ben Salem from Accenture has thoughts on quantum security. Our guest is author and Wired editor at large Steven Levy joins us with insights on Facebook’s internal research teams. And a short census of ransomware strains.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/189</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1721</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0dac03c8-364d-11eb-b082-1767a1e5d279]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8149204202.mp3?updated=1690292000" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DDoS is on an upward trend, and it’s being used for extortion. A payroll provider recovers from an unspecified cyberattack. Russia charges Group-IB CEO with treason. NSA, CISA, advise on using VPNs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1428/notes</link>
      <description>Distributed denial-of-service attacks have been making a comeback, and many of them represent criminal extortion attempts. A major British payroll provider is recovering from a cyberattack, but it’s not providing much information on the nature of that attack. Russian authorities arrest the founder of Group-IB on treason charges. Johannes Ullrich from SANS on Out of Band Phishing Using SMS messages. Our UK correspondent Carole Theriault wonders how online trolling is still a thing. And NSA and CISA release guidelines on secure use of virtual private networks.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/188
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 29 Sep 2021 20:15:00 -0000</pubDate>
      <itunes:title>DDoS is on an upward trend, and it’s being used for extortion. A payroll provider recovers from an unspecified cyberattack. Russia charges Group-IB CEO with treason. NSA, CISA, advise on using VPNs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1428</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Distributed denial-of-service attacks have been making a comeback, and many of them represent criminal extortion attempts. A major British payroll provider is recovering from a cyberattack, but it’s not providing much information on the nature of that attack. Russian authorities arrest the founder of Group-IB on treason charges. Johannes Ullrich from SANS on Out of Band Phishing Using SMS messages. Our UK correspondent Carole Theriault wonders how online trolling is still a thing. And NSA and CISA release guidelines on secure use of virtual private networks.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/188
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Distributed denial-of-service attacks have been making a comeback, and many of them represent criminal extortion attempts. A major British payroll provider is recovering from a cyberattack, but it’s not providing much information on the nature of that attack. Russian authorities arrest the founder of Group-IB on treason charges. Johannes Ullrich from SANS on Out of Band Phishing Using SMS messages. Our UK correspondent Carole Theriault wonders how online trolling is still a thing. And NSA and CISA release guidelines on secure use of virtual private networks.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/188</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1348</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0d990ab6-364d-11eb-b082-5bf5d67c52ba]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8015739278.mp3?updated=1690291985" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Homecomings, happy and not so happy. A backdoor for espionage, a Trojan for cybercrime. DDoS techniques, those iPhone zero-days, and indictments. And one guilty plea.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1427/notes</link>
      <description>The triumphant homecoming of Huawei’s CFO. Microsoft describes the FoggyWeb backdoor, a significant cyberespionage tool. Kaspersky looks at the BloodyStealer Trojan and finds it especially risky to gamers. A novel approach to distributed denial-of-service. Apple looks into those iPhone zero-days. Joe Carrigan looks at the latest offerings in passwordless authentication. Our guest is Mathieu Gorge of VigiTrust on how law enforcement and executives can work together to fight cyber threats. And a look at doings in cybercrime: the US arrests more than thirty members of the Black Axe gang, a Russian convict is deported back to face Russian justice, and a blockchain maven pleads guilty to helping Pyongyang.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/187
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Sep 2021 20:15:00 -0000</pubDate>
      <itunes:title>Homecomings, happy and not so happy. A backdoor for espionage, a Trojan for cybercrime. DDoS techniques, those iPhone zero-days, and indictments. And one guilty plea.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1427</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The triumphant homecoming of Huawei’s CFO. Microsoft describes the FoggyWeb backdoor, a significant cyberespionage tool. Kaspersky looks at the BloodyStealer Trojan and finds it especially risky to gamers. A novel approach to distributed denial-of-service. Apple looks into those iPhone zero-days. Joe Carrigan looks at the latest offerings in passwordless authentication. Our guest is Mathieu Gorge of VigiTrust on how law enforcement and executives can work together to fight cyber threats. And a look at doings in cybercrime: the US arrests more than thirty members of the Black Axe gang, a Russian convict is deported back to face Russian justice, and a blockchain maven pleads guilty to helping Pyongyang.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/187
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The triumphant homecoming of Huawei’s CFO. Microsoft describes the FoggyWeb backdoor, a significant cyberespionage tool. Kaspersky looks at the BloodyStealer Trojan and finds it especially risky to gamers. A novel approach to distributed denial-of-service. Apple looks into those iPhone zero-days. Joe Carrigan looks at the latest offerings in passwordless authentication. Our guest is Mathieu Gorge of VigiTrust on how law enforcement and executives can work together to fight cyber threats. And a look at doings in cybercrime: the US arrests more than thirty members of the Black Axe gang, a Russian convict is deported back to face Russian justice, and a blockchain maven pleads guilty to helping Pyongyang.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/187</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1576</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0d01bef4-364d-11eb-b082-939add4c30f4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7091949738.mp3?updated=1690291973" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The EU ask Russia to knock it off, and specifically to stop with the GhostWriter. Zoombombing in Cambodia. Conti is back; Colossus is a new entrant in the ransomware field. Meng returns to China.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1426/notes</link>
      <description>The EU publicly blames Russia for GhostWriter, and counsels Moscow to amend its ways. Finland’s security services warn of foreign cyberespionage and influence threats. Zoombombing at the highest levels in Cambodia. A ransomware operation, “Colossus,” is described. Conti is back, as predicted, and has hit a major European call center. Dinah Davis from Arctic Wolf on cybersecurity learning standards. Our guest is Otavio Freire from SafeGuard Cyber with insights on how to defend against nation-state actors and zero-day exploits. And Huawei’s CFO is back in China.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/186
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 27 Sep 2021 20:15:00 -0000</pubDate>
      <itunes:title>The EU ask Russia to knock it off, and specifically to stop with the GhostWriter. Zoombombing in Cambodia. Conti is back; Colossus is a new entrant in the ransomware field. Meng returns to China.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1426</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The EU publicly blames Russia for GhostWriter, and counsels Moscow to amend its ways. Finland’s security services warn of foreign cyberespionage and influence threats. Zoombombing at the highest levels in Cambodia. A ransomware operation, “Colossus,” is described. Conti is back, as predicted, and has hit a major European call center. Dinah Davis from Arctic Wolf on cybersecurity learning standards. Our guest is Otavio Freire from SafeGuard Cyber with insights on how to defend against nation-state actors and zero-day exploits. And Huawei’s CFO is back in China.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/186
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The EU publicly blames Russia for GhostWriter, and counsels Moscow to amend its ways. Finland’s security services warn of foreign cyberespionage and influence threats. Zoombombing at the highest levels in Cambodia. A ransomware operation, “Colossus,” is described. Conti is back, as predicted, and has hit a major European call center. Dinah Davis from Arctic Wolf on cybersecurity learning standards. Our guest is Otavio Freire from SafeGuard Cyber with insights on how to defend against nation-state actors and zero-day exploits. And Huawei’s CFO is back in China.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/186</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1488</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0ceecede-364d-11eb-b082-6b6d9f37d3d8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5082319224.mp3?updated=1690291956" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dave Bittner: From puppet shows to podcasts. [Media] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/68/notes</link>
      <description>Host of the CyberWire Podcast, Dave Bittner, wanted to work with the Muppets, so naturally he landed in cybersecurity. Dave and his Cookie Monster puppet spent much of his childhood putting on shows for his parents friends. During one of those performances, he was discovered and got his start at the local PBS station. A radio, television and film major in college, Dave owned his own company and as the most tech-savvy member of the group, handled that side of things. Dave notes his cybersecurity challenges back then consisted of maybe a corrupt floppy disk. It wasn't until he joined the CyberWIre that cybersecurity became Dave's focus. A former boss showed him how to lead a team and treat everyone with kindness regardless of their role. We thank Dave for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 26 Sep 2021 07:00:00 -0000</pubDate>
      <itunes:title>Dave Bittner: From puppet shows to podcasts. [Media] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>68</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Host of the CyberWire Podcast, Dave Bittner, wanted to work with the Muppets, so naturally he landed in cybersecurity.</itunes:subtitle>
      <itunes:summary>Host of the CyberWire Podcast, Dave Bittner, wanted to work with the Muppets, so naturally he landed in cybersecurity. Dave and his Cookie Monster puppet spent much of his childhood putting on shows for his parents friends. During one of those performances, he was discovered and got his start at the local PBS station. A radio, television and film major in college, Dave owned his own company and as the most tech-savvy member of the group, handled that side of things. Dave notes his cybersecurity challenges back then consisted of maybe a corrupt floppy disk. It wasn't until he joined the CyberWIre that cybersecurity became Dave's focus. A former boss showed him how to lead a team and treat everyone with kindness regardless of their role. We thank Dave for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Host of the CyberWire Podcast, Dave Bittner, wanted to work with the Muppets, so naturally he landed in cybersecurity. Dave and his Cookie Monster puppet spent much of his childhood putting on shows for his parents friends. During one of those performances, he was discovered and got his start at the local PBS station. A radio, television and film major in college, Dave owned his own company and as the most tech-savvy member of the group, handled that side of things. Dave notes his cybersecurity challenges back then consisted of maybe a corrupt floppy disk. It wasn't until he joined the CyberWIre that cybersecurity became Dave's focus. A former boss showed him how to lead a team and treat everyone with kindness regardless of their role. We thank Dave for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>542</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aa7d6e12-1c9d-11ec-9608-df3c2835c418]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2439907340.mp3?updated=1632422193" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Why it’s time for cybersecurity to go mainstream. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/19/notes</link>
      <description>The commonly held, idealized picture of technology is that tech makes our lives easier, safer, and better in just about every respect. But an unintended consequence of that picture is an unjustified assumption that companies will sell more products if they serve the public interest, and that may not be so. On the consumer side, personal technology investments are often a race to the price bottom, with little attention paid to the security of the products we buy. Vendors may enjoy less scrutiny and accountability, but that's not necessarily in the consumers' interest. Good things almost always come when technology steps out of the shadows and into the light of the mainstream.
It’s time that happened in cybersecurity, where everyone, from suppliers to consumers, has a role to play. In this episode of CyberWire-X, knowledgeable representatives across that spectrum to learn what they have to say about risk, accountability, and, above all, transparency. Guest Dr. Georgianna Shea from the Foundation for Defense of Democracies shares her insights with the CyberWire's Rick Howard, and Sponsor Tanium's CISO for the Americas Chris Hallenbeck joins the CyberWire's Dave Bittner to discuss achievable steps the government, private sector, and the broader public can take to start moving the needle on cybersecurity.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 26 Sep 2021 05:00:00 -0000</pubDate>
      <itunes:title>Why it’s time for cybersecurity to go mainstream. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>19</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The commonly held, idealized picture of technology is that tech makes our lives easier, safer, and better in just about every respect. But an unintended consequence of that picture is an unjustified assumption that companies will sell more products if they serve the public interest, and that may not be so. On the consumer side, personal technology investments are often a race to the price bottom, with little attention paid to the security of the products we buy. Vendors may enjoy less scrutiny and accountability, but that's not necessarily in the consumers' interest. Good things almost always come when technology steps out of the shadows and into the light of the mainstream.
It’s time that happened in cybersecurity, where everyone, from suppliers to consumers, has a role to play. In this episode of CyberWire-X, knowledgeable representatives across that spectrum to learn what they have to say about risk, accountability, and, above all, transparency. Guest Dr. Georgianna Shea from the Foundation for Defense of Democracies shares her insights with the CyberWire's Rick Howard, and Sponsor Tanium's CISO for the Americas Chris Hallenbeck joins the CyberWire's Dave Bittner to discuss achievable steps the government, private sector, and the broader public can take to start moving the needle on cybersecurity.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The commonly held, idealized picture of technology is that tech makes our lives easier, safer, and better in just about every respect. But an unintended consequence of that picture is an unjustified assumption that companies will sell more products if they serve the public interest, and that may not be so. On the consumer side, personal technology investments are often a race to the price bottom, with little attention paid to the security of the products we buy. Vendors may enjoy less scrutiny and accountability, but that's not necessarily in the consumers' interest. Good things almost always come when technology steps out of the shadows and into the light of the mainstream.</p><p>It’s time that happened in cybersecurity, where everyone, from suppliers to consumers, has a role to play. In this episode of CyberWire-X, knowledgeable representatives across that spectrum to learn what they have to say about risk, accountability, and, above all, transparency. Guest Dr. Georgianna Shea from the Foundation for Defense of Democracies shares her insights with the CyberWire's Rick Howard, and Sponsor Tanium's CISO for the Americas Chris Hallenbeck joins the CyberWire's Dave Bittner to discuss achievable steps the government, private sector, and the broader public can take to start moving the needle on cybersecurity.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2435</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ae24fb96-1bd2-11ec-aa37-77d878afc580]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4781858580.mp3?updated=1632335242" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Vulnerabilities in the public cloud. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/202/notes</link>
      <description>Guest Ariel Zelivansky, Senior Manager of Security Research at Palo Alto Networks, joins Dave to discuss Unit 42's work on the first cross-account container takeover in the public cloud. The Unit 42 Threat Intelligence team has identified the first known vulnerability that could enable one user of a public cloud service to break out of their environment and execute code on environments belonging to other users in the same public cloud service. This unprecedented cross-account takeover affected Microsoft's Azure Container-as-a-Service (CaaS) platform. Researchers named the finding Azurescape because the attack started from a container escape – a technique that enables privilege escalation out of container environments.
The research can be found here:

What You Need to Know About Azurescape

Finding Azurescape – Cross-Account Container Takeover in Azure Container Instances


Note: Microsoft is a sponsor of the CyberWire, however, we cover them as we would any other company.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Sep 2021 07:00:00 -0000</pubDate>
      <itunes:title>Vulnerabilities in the public cloud. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>202</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Ariel Zelivansky, Senior Manager of Security Research at Palo Alto Networks, joins Dave to discuss Unit 42's work on the first cross-account container takeover in the public cloud. The Unit 42 Threat Intelligence team has identified the first known vulnerability that could enable one user of a public cloud service to break out of their environment and execute code on environments belonging to other users in the same public cloud service. This unprecedented cross-account takeover affected Microsoft's Azure Container-as-a-Service (CaaS) platform. Researchers named the finding Azurescape because the attack started from a container escape – a technique that enables privilege escalation out of container environments.
The research can be found here:

What You Need to Know About Azurescape

Finding Azurescape – Cross-Account Container Takeover in Azure Container Instances


Note: Microsoft is a sponsor of the CyberWire, however, we cover them as we would any other company.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Ariel Zelivansky, Senior Manager of Security Research at Palo Alto Networks, joins Dave to discuss Unit 42's work on the first cross-account container takeover in the public cloud. The Unit 42 Threat Intelligence team has identified the first known vulnerability that could enable one user of a public cloud service to break out of their environment and execute code on environments belonging to other users in the same public cloud service. This unprecedented cross-account takeover affected Microsoft's Azure Container-as-a-Service (CaaS) platform. Researchers named the finding Azurescape because the attack started from a container escape – a technique that enables privilege escalation out of container environments.</p><p>The research can be found here:</p><ul>
<li><a href="https://www.paloaltonetworks.com/blog/2021/09/azurescape/">What You Need to Know About Azurescape</a></li>
<li><a href="https://unit42.paloaltonetworks.com/azure-container-instances/">Finding Azurescape – Cross-Account Container Takeover in Azure Container Instances</a></li>
</ul><p><br></p><p><em>Note: Microsoft is a sponsor of the CyberWire, however, we cover them as we would any other company.</em></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1305</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1079b19c-1b33-11ec-a157-4f28cd408cb2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3627637196.mp3?updated=1685126363" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberattacks against a Russian rocket shop and the Port of Houston. As ransomware gangs increase activity, the US considers defenses. Pegasus found in French Ministers’ phones. Meng heads home?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1425/notes</link>
      <description>Someone is phishing for Russian rocketeers. The Port of Houston discloses a cyberattack, which the Port says it deflected before it had operational consequences. Ransomware gangs are up and active, and the US is considering mandatory reporting by victims as a defensive policy. Pegasus spyware is said to have been found in the phones of five French government ministers. Johannes Ullrich from the SANS Technology Institute on Attackers Hunting for Environment Variables. Our guest is Graeme Bunton of DNS Abuse Institute. And Huawei’s Meng Wanzhou may soon be headed home from Vancouver.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/185
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 24 Sep 2021 20:15:00 -0000</pubDate>
      <itunes:title>Cyberattacks against a Russian rocket shop and the Port of Houston. As ransomware gangs increase activity, the US considers defenses. Pegasus found in French Ministers’ phones. Meng heads home?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1425</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Someone is phishing for Russian rocketeers. The Port of Houston discloses a cyberattack, which the Port says it deflected before it had operational consequences. Ransomware gangs are up and active, and the US is considering mandatory reporting by victims as a defensive policy. Pegasus spyware is said to have been found in the phones of five French government ministers. Johannes Ullrich from the SANS Technology Institute on Attackers Hunting for Environment Variables. Our guest is Graeme Bunton of DNS Abuse Institute. And Huawei’s Meng Wanzhou may soon be headed home from Vancouver.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/185
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Someone is phishing for Russian rocketeers. The Port of Houston discloses a cyberattack, which the Port says it deflected before it had operational consequences. Ransomware gangs are up and active, and the US is considering mandatory reporting by victims as a defensive policy. Pegasus spyware is said to have been found in the phones of five French government ministers. Johannes Ullrich from the SANS Technology Institute on Attackers Hunting for Environment Variables. Our guest is Graeme Bunton of DNS Abuse Institute. And Huawei’s Meng Wanzhou may soon be headed home from Vancouver.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/185</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1471</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0e4932c4-364d-11eb-b082-3f050afbd174]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7978285300.mp3?updated=1690291942" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware hits another US farm co-op, as Russan gangs seem to continue attacks without interference from Moscow. A new APT is described. REvil was cheating? CISA warns about Conti. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1424/notes</link>
      <description>Ransomware hits a second US Midwestern farm co-op. The US House hears from the FBI that Russia seems not to have modified its toleration of privateering gangs (at least yet). A new APT, “FamousSparrow,” is described. REvil seems to have been--surprise!--cheating its criminal affiliates. Josh Ray from Accenture with an update on the Hades Threat Group. Our guest is Tim Eades of vArmour on the urgent need to update cyber strategies in healthcare. CISA issues a new warning, this one on the Conti ransomware operation. 
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/184
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 23 Sep 2021 20:15:00 -0000</pubDate>
      <itunes:title>Ransomware hits another US farm co-op, as Russan gangs seem to continue attacks without interference from Moscow. A new APT is described. REvil was cheating? CISA warns about Conti. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1424</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ransomware hits a second US Midwestern farm co-op. The US House hears from the FBI that Russia seems not to have modified its toleration of privateering gangs (at least yet). A new APT, “FamousSparrow,” is described. REvil seems to have been--surprise!--cheating its criminal affiliates. Josh Ray from Accenture with an update on the Hades Threat Group. Our guest is Tim Eades of vArmour on the urgent need to update cyber strategies in healthcare. CISA issues a new warning, this one on the Conti ransomware operation. 
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/184
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ransomware hits a second US Midwestern farm co-op. The US House hears from the FBI that Russia seems not to have modified its toleration of privateering gangs (at least yet). A new APT, “FamousSparrow,” is described. REvil seems to have been--surprise!--cheating its criminal affiliates. Josh Ray from Accenture with an update on the Hades Threat Group. Our guest is Tim Eades of vArmour on the urgent need to update cyber strategies in healthcare. CISA issues a new warning, this one on the Conti ransomware operation. </p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/184</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1490</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0dc1a566-364d-11eb-b082-5fd4c5f16a3c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4800196685.mp3?updated=1690291930" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware is rising, and governments try to evolve an effective response. A look at the cyber underworld. Snooping smartphones. An advance fee scam is criminal business as usual.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1423/notes</link>
      <description>BlackMatter continues to make a nuisance of itself on a large scale. The US is woofing about taking action against ransomware, and Treasury has sanctioned a rogue cryptocurrency exchange, but some advocate stronger measures. Where did all those Ukrainian cybercriminal chat platforms go? A warning of the “censor mode” in some Chinese manufactured smartphones. Caleb Barlow shares thoughts on CMMC certification. Our guest is Kevin Jones of Virsec with reactions to the White House Cybersecurity Summit. And, hey, no, really, Apple is not celebrating the iPhone 13 by giving away a stash of Bitcoin.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/183
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 22 Sep 2021 20:30:00 -0000</pubDate>
      <itunes:title>Ransomware is rising, and governments try to evolve an effective response. A look at the cyber underworld. Snooping smartphones. An advance fee scam is criminal business as usual.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1423</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>BlackMatter continues to make a nuisance of itself on a large scale. The US is woofing about taking action against ransomware, and Treasury has sanctioned a rogue cryptocurrency exchange, but some advocate stronger measures. Where did all those Ukrainian cybercriminal chat platforms go? A warning of the “censor mode” in some Chinese manufactured smartphones. Caleb Barlow shares thoughts on CMMC certification. Our guest is Kevin Jones of Virsec with reactions to the White House Cybersecurity Summit. And, hey, no, really, Apple is not celebrating the iPhone 13 by giving away a stash of Bitcoin.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/183
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>BlackMatter continues to make a nuisance of itself on a large scale. The US is woofing about taking action against ransomware, and Treasury has sanctioned a rogue cryptocurrency exchange, but some advocate stronger measures. Where did all those Ukrainian cybercriminal chat platforms go? A warning of the “censor mode” in some Chinese manufactured smartphones. Caleb Barlow shares thoughts on CMMC certification. Our guest is Kevin Jones of Virsec with reactions to the White House Cybersecurity Summit. And, hey, no, really, Apple is not celebrating the iPhone 13 by giving away a stash of Bitcoin.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/183</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1685</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0d8757b2-364d-11eb-b082-bf5143395a58]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1432787341.mp3?updated=1690291920" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BlackMatter hits an Iowa agricultural cooperative. US Treasury Department moves against ransomware’s support system. FBI gave Kaseya the REvil decryptor. Camorra cybercriminals arrested.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1422/notes</link>
      <description>Ransomware hits an Iowa agricultural cooperative, which doesn’t meet, the criminals say, the standard for “critical infrastructure.” US Treasury Department announces steps against ransomware’s economic support system. Did Kaseya get its REvil decryptor from the FBI? Ben Yelin describes a major federal court victory for security researchers. Our guest is Dave Stapleton from CyberGRX on the rise of extortionware. And Europol, along with Spanish and Italian police, take down a Camorra cybercrime ring.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/182
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Sep 2021 20:15:00 -0000</pubDate>
      <itunes:title>BlackMatter hits an Iowa agricultural cooperative. US Treasury Department moves against ransomware’s support system. FBI gave Kaseya the REvil decryptor. Camorra cybercriminals arrested.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1422</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ransomware hits an Iowa agricultural cooperative, which doesn’t meet, the criminals say, the standard for “critical infrastructure.” US Treasury Department announces steps against ransomware’s economic support system. Did Kaseya get its REvil decryptor from the FBI? Ben Yelin describes a major federal court victory for security researchers. Our guest is Dave Stapleton from CyberGRX on the rise of extortionware. And Europol, along with Spanish and Italian police, take down a Camorra cybercrime ring.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/182
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ransomware hits an Iowa agricultural cooperative, which doesn’t meet, the criminals say, the standard for “critical infrastructure.” US Treasury Department announces steps against ransomware’s economic support system. Did Kaseya get its REvil decryptor from the FBI? Ben Yelin describes a major federal court victory for security researchers. Our guest is Dave Stapleton from CyberGRX on the rise of extortionware. And Europol, along with Spanish and Italian police, take down a Camorra cybercrime ring.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/182</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1588</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0d162e2a-364d-11eb-b082-bbfdead98bb8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8163904296.mp3?updated=1690291901" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Electioneering, domestic, but with international implications. The Mirai botnet is exploiting OMIGOD. Container shipper sustains data breach. Odd ads. Phishing with Mr. Musk’s name.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1421/notes</link>
      <description>Cyber electioneering, in Hungary and Russia, the latter with some international implications. The Mirai botnet is exploiting the OMIGOD vulnerability. A shipping company deals with data extortion. Government websites have been serving up some oddly adult-themed ads. Malek Ben Salem from Accenture has thoughts on quantum security in the automotive industry. Our guest is Padraic O'Reilly of CyberSaint to discuss concerns about the Defense Industrial Base. And no, there’s no such thing as the Elon Musk Mutual Aid Society.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/181
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 20 Sep 2021 20:01:00 -0000</pubDate>
      <itunes:title>Electioneering, domestic, but with international implications. The Mirai botnet is exploiting OMIGOD. Container shipper sustains data breach. Odd ads. Phishing with Mr. Musk’s name.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1421</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cyber electioneering, in Hungary and Russia, the latter with some international implications. The Mirai botnet is exploiting the OMIGOD vulnerability. A shipping company deals with data extortion. Government websites have been serving up some oddly adult-themed ads. Malek Ben Salem from Accenture has thoughts on quantum security in the automotive industry. Our guest is Padraic O'Reilly of CyberSaint to discuss concerns about the Defense Industrial Base. And no, there’s no such thing as the Elon Musk Mutual Aid Society.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/181
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber electioneering, in Hungary and Russia, the latter with some international implications. The Mirai botnet is exploiting the OMIGOD vulnerability. A shipping company deals with data extortion. Government websites have been serving up some oddly adult-themed ads. Malek Ben Salem from Accenture has thoughts on quantum security in the automotive industry. Our guest is Padraic O'Reilly of CyberSaint to discuss concerns about the Defense Industrial Base. And no, there’s no such thing as the Elon Musk Mutual Aid Society.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/181</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1603</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0cda76c8-364d-11eb-b082-d39982c697e6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3029588978.mp3?updated=1690291886" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Limor Kessem: Be an upstander. [Security Advisor] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/67/notes</link>
      <description>Executive Security Advisor at IBM Security Limor Kessem says she started her cybersecurity career by pure chance. Limor made a change from her childhood dream of being a doctor and came into cybersecurity with her passion, investment, discipline, and perseverance. Limor talks about how we must tighten our core security and at the same time we allow innovation to help us move forward with the times. She's been fortunate to have been able to stand up for others and has had others support her. She said that is very motivating and has allowed her to really explore every possible thing in her career that she can contribute without limiting herself to a certain role. We thank Limor for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 19 Sep 2021 07:00:00 -0000</pubDate>
      <itunes:title>Limor Kessem: Be an upstander. [Security Advisor] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>67</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Executive Security Advisor at IBM Security Limor Kessem started her cybersecurity career by pure chance. </itunes:subtitle>
      <itunes:summary>Executive Security Advisor at IBM Security Limor Kessem says she started her cybersecurity career by pure chance. Limor made a change from her childhood dream of being a doctor and came into cybersecurity with her passion, investment, discipline, and perseverance. Limor talks about how we must tighten our core security and at the same time we allow innovation to help us move forward with the times. She's been fortunate to have been able to stand up for others and has had others support her. She said that is very motivating and has allowed her to really explore every possible thing in her career that she can contribute without limiting herself to a certain role. We thank Limor for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Executive Security Advisor at IBM Security Limor Kessem says she started her cybersecurity career by pure chance. Limor made a change from her childhood dream of being a doctor and came into cybersecurity with her passion, investment, discipline, and perseverance. Limor talks about how we must tighten our core security and at the same time we allow innovation to help us move forward with the times. She's been fortunate to have been able to stand up for others and has had others support her. She said that is very motivating and has allowed her to really explore every possible thing in her career that she can contribute without limiting herself to a certain role. We thank Limor for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>402</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[70c3bb62-1663-11ec-a99e-876599329570]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8710539940.mp3?updated=1631735592" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An IoT educational exercise reveals a far-reaching vulnerability. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/201/notes</link>
      <description>Guest Jake Valletta, Director of Professional Services at Mandiant, joins Dave to talk about the critical vulnerability Mandiant disclosed that affects millions of IoT devices. Mandiant disclosed a critical risk vulnerability in coordination with the Cybersecurity and Infrastructure Security Agency (“CISA”) that affects millions of IoT devices that use the ThroughTek “Kalay” network. This vulnerability, discovered by researchers on Mandiant’s Red Team in late 2020, would enable adversaries to remotely compromise victim IoT devices, resulting in the ability to listen to live audio, watch real time video data, and compromise device credentials for further attacks based on exposed device functionality. These further attacks could include actions that would allow an adversary to remotely control affected devices.
The research can be found here:
Mandiant Discloses Critical Vulnerability Affecting Millions of IoT Devices

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Sep 2021 07:00:00 -0000</pubDate>
      <itunes:title>An IoT educational exercise reveals a far-reaching vulnerability. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>201</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Jake Valletta, Director of Professional Services at Mandiant, joins Dave to talk about the critical vulnerability Mandiant disclosed that affects millions of IoT devices. Mandiant disclosed a critical risk vulnerability in coordination with the Cybersecurity and Infrastructure Security Agency (“CISA”) that affects millions of IoT devices that use the ThroughTek “Kalay” network. This vulnerability, discovered by researchers on Mandiant’s Red Team in late 2020, would enable adversaries to remotely compromise victim IoT devices, resulting in the ability to listen to live audio, watch real time video data, and compromise device credentials for further attacks based on exposed device functionality. These further attacks could include actions that would allow an adversary to remotely control affected devices.
The research can be found here:
Mandiant Discloses Critical Vulnerability Affecting Millions of IoT Devices

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Jake Valletta, Director of Professional Services at Mandiant, joins Dave to talk about the critical vulnerability Mandiant disclosed that affects millions of IoT devices. Mandiant disclosed a critical risk vulnerability in coordination with the <a href="https://us-cert.cisa.gov/ics/advisories/icsa-21-229-01">Cybersecurity and Infrastructure Security Agency</a> (“CISA”) that affects millions of IoT devices that use the <a href="https://www.throughtek.com/overview/">ThroughTek “Kalay”</a> network. This vulnerability, discovered by researchers on Mandiant’s Red Team in late 2020, would enable adversaries to remotely compromise victim IoT devices, resulting in the ability to listen to live audio, watch real time video data, and compromise device credentials for further attacks based on exposed device functionality. These further attacks could include actions that would allow an adversary to remotely control affected devices.</p><p>The research can be found here:</p><ul><li><a href="https://www.fireeye.com/blog/threat-research/2021/08/mandiant-discloses-critical-vulnerability-affecting-iot-devices.html">Mandiant Discloses Critical Vulnerability Affecting Millions of IoT Devices</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1389</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[20aa6666-1583-11ec-8580-ab135af89765]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1095268885.mp3?updated=1685126355" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patch that password manager. The hidden hand of the troll farm. Election meddling. Coin-mining’s costs, and a crackdown in China. If you really loved me, you’d speculate in Dogecoin....or something.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1420/notes</link>
      <description>Patch your Zoho software now--vulnerable instances are being actively exploited. Maximum engagement isn’t necessarily good engagement: the hidden hand of the trolls replaces the invisible hand of the marketplace of ideas. Politics ain’t beanbag, Russian edition. An indictment emerges from the US investigation into possible misconduct during the 2016 elections. The costs of coin-mining. Josh Ray from Accenture on protecting critical infrastructure. Our guest is Tony Pepper from Egress with a look at Insider Data Breaches. And don’t mix investment advice with matters of the heart.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/180
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 17 Sep 2021 21:30:57 -0000</pubDate>
      <itunes:title>Patch that password manager. The hidden hand of the troll farm. Election meddling. Coin-mining’s costs, and a crackdown in China. If you really loved me, you’d speculate in Dogecoin....or something.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1420</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Patch your Zoho software now--vulnerable instances are being actively exploited. Maximum engagement isn’t necessarily good engagement: the hidden hand of the trolls replaces the invisible hand of the marketplace of ideas. Politics ain’t beanbag, Russian edition. An indictment emerges from the US investigation into possible misconduct during the 2016 elections. The costs of coin-mining. Josh Ray from Accenture on protecting critical infrastructure. Our guest is Tony Pepper from Egress with a look at Insider Data Breaches. And don’t mix investment advice with matters of the heart.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/180
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Patch your Zoho software now--vulnerable instances are being actively exploited. Maximum engagement isn’t necessarily good engagement: the hidden hand of the trolls replaces the invisible hand of the marketplace of ideas. Politics ain’t beanbag, Russian edition. An indictment emerges from the US investigation into possible misconduct during the 2016 elections. The costs of coin-mining. Josh Ray from Accenture on protecting critical infrastructure. Our guest is Tony Pepper from Egress with a look at Insider Data Breaches. And don’t mix investment advice with matters of the heart.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/180</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1648</itunes:duration>
      <guid isPermaLink="false"><![CDATA[0e379a14-364d-11eb-b082-7ff107ebb66d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2599523927.mp3?updated=1690291742" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Election-season cyber incidents in Germany. South Africa works to recover from a ransomware attack on government networks. Cryptojacking botnet moves to Windows targets. Ransomware notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1419/notes</link>
      <description>Denial-of-service at a German election agency, as Federal prosecutors investigate GhostWriter. More nation-states get into election meddling. South Africa works to recover from a ransomware attack against government networks. A cryptojacking botnet moves from Linux to Windows. A ransomware gang threatens to burn your data if you bring in third-party help. Ransomware cyberinsurance claims rise. Rick Howard checks in with Tom Ayres from Lead Up Strategies on Cyber Piracy. Caleb Barlow shares insights on CMMC. And it’s a really good week to patch.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/179
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 16 Sep 2021 20:15:00 -0000</pubDate>
      <itunes:title>Election-season cyber incidents in Germany. South Africa works to recover from a ransomware attack on government networks. Cryptojacking botnet moves to Windows targets. Ransomware notes.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1419</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Denial-of-service at a German election agency, as Federal prosecutors investigate GhostWriter. More nation-states get into election meddling. South Africa works to recover from a ransomware attack against government networks. A cryptojacking botnet moves from Linux to Windows. A ransomware gang threatens to burn your data if you bring in third-party help. Ransomware cyberinsurance claims rise. Rick Howard checks in with Tom Ayres from Lead Up Strategies on Cyber Piracy. Caleb Barlow shares insights on CMMC. And it’s a really good week to patch.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/179
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Denial-of-service at a German election agency, as Federal prosecutors investigate GhostWriter. More nation-states get into election meddling. South Africa works to recover from a ransomware attack against government networks. A cryptojacking botnet moves from Linux to Windows. A ransomware gang threatens to burn your data if you bring in third-party help. Ransomware cyberinsurance claims rise. Rick Howard checks in with Tom Ayres from Lead Up Strategies on Cyber Piracy. Caleb Barlow shares insights on CMMC. And it’s a really good week to patch.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/179</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1631</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0dd63a76-364d-11eb-b082-2b4c60c3c655]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1652159400.mp3?updated=1690291706" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No crackdown on ransomware from Moscow (at least so far). Cyber Partisans in Belarus. A long-running Chinese cyber campaign. Phishing and other cybercrime. Mercenaries.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1418/notes</link>
      <description>That Russian crackdown on ransomware gangs people thought they were seeing? Hasn’t happened, at least according to the FBI. The Cyber Partisans take a virtual whack at President Lukashenka’s government in Belarus. Operation Harvest is complicated and long-running. Phishing with a promise of infrastructure funding. The criminal market for bogus vaccine cards. Johannes Ullrich from SANS on dealing with image uploads - vulnerabilities in conversion libraries. Our UK correspondent Carole Theriault on Deepfakes - what you need to know now. And a deferred prosecution agreement in a “cyber mercenary” case.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/178
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 15 Sep 2021 20:30:00 -0000</pubDate>
      <itunes:title>No crackdown on ransomware from Moscow (at least so far). Cyber Partisans in Belarus. A long-running Chinese cyber campaign. Phishing and other cybercrime. Mercenaries.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1418</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>That Russian crackdown on ransomware gangs people thought they were seeing? Hasn’t happened, at least according to the FBI. The Cyber Partisans take a virtual whack at President Lukashenka’s government in Belarus. Operation Harvest is complicated and long-running. Phishing with a promise of infrastructure funding. The criminal market for bogus vaccine cards. Johannes Ullrich from SANS on dealing with image uploads - vulnerabilities in conversion libraries. Our UK correspondent Carole Theriault on Deepfakes - what you need to know now. And a deferred prosecution agreement in a “cyber mercenary” case.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/178
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>That Russian crackdown on ransomware gangs people thought they were seeing? Hasn’t happened, at least according to the FBI. The Cyber Partisans take a virtual whack at President Lukashenka’s government in Belarus. Operation Harvest is complicated and long-running. Phishing with a promise of infrastructure funding. The criminal market for bogus vaccine cards. Johannes Ullrich from SANS on dealing with image uploads - vulnerabilities in conversion libraries. Our UK correspondent Carole Theriault on Deepfakes - what you need to know now. And a deferred prosecution agreement in a “cyber mercenary” case.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/178</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1522</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0d745162-364d-11eb-b082-dfe81cd90018]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2877632931.mp3?updated=1690291712" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>NSO Group’s Pegasus was installed in a zero-click exploit: iOS users should patch. Vermillion Strike hits Linux systems. Enforcing the law against cybercrime. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1417/notes</link>
      <description>Citizen Lab finds, and Apple patches, a zero-day used for zero-click installation of Pegasus spyware. A Cobalt Strike beacon has been turned to cyberespionage use against Linux targets. The Russian government could, it seems, take action against cybercrime, but its will-to-enforcement seems to be inconsistent. Ben Yelin from UMD CHHS with more on Apple's CSAM controversy, our guest is Mel Shakir from Dreamit Ventures on selling to CISOs, and their customer sprints. REvil makes nice with grumpy affiliates. And criminals’ commitment to the common good seems weak. That’s not a surprise, is it?
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/177
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Sep 2021 21:30:00 -0000</pubDate>
      <itunes:title>NSO Group’s Pegasus was installed in a zero-click exploit: iOS users should patch. Vermillion Strike hits Linux systems. Enforcing the law against cybercrime. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1417</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Citizen Lab finds, and Apple patches, a zero-day used for zero-click installation of Pegasus spyware. A Cobalt Strike beacon has been turned to cyberespionage use against Linux targets. The Russian government could, it seems, take action against cybercrime, but its will-to-enforcement seems to be inconsistent. Ben Yelin from UMD CHHS with more on Apple's CSAM controversy, our guest is Mel Shakir from Dreamit Ventures on selling to CISOs, and their customer sprints. REvil makes nice with grumpy affiliates. And criminals’ commitment to the common good seems weak. That’s not a surprise, is it?
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/177
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Citizen Lab finds, and Apple patches, a zero-day used for zero-click installation of Pegasus spyware. A Cobalt Strike beacon has been turned to cyberespionage use against Linux targets. The Russian government could, it seems, take action against cybercrime, but its will-to-enforcement seems to be inconsistent. Ben Yelin from UMD CHHS with more on Apple's CSAM controversy, our guest is Mel Shakir from Dreamit Ventures on selling to CISOs, and their customer sprints. REvil makes nice with grumpy affiliates. And criminals’ commitment to the common good seems weak. That’s not a surprise, is it?</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/177</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1352</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0d2aefea-364d-11eb-b082-df0b2c3816d3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1713956808.mp3?updated=1690291673" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The continuing problem of Meris and its bot-driven DDoS. Mustang Panda visits Indonesia. DPRK’s social media battlespace prep. Al Qaeda marks 9/11’s anniversary. And REvil seems to be back.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1416/notes</link>
      <description>The Meris botnet continues to disrupt New Zealand banks, and has turned up elsewhere, too. Mustang Panda compromised Indonesian government networks. North Korean operators are using social media to soften up their prospective targets. Al Qaeda sympathizers marked the twentieth anniversary of 9/11 by calling for--what else?--more 9/11s. Malek Ben Salem from Accenture on deep unlearning, our own Rick Howard is in, talking about the latest episode of CSO Perspectives on adversary playbooks, and REvil seems to be back in business after taking what some of its hoods call “a break.”
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/176
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 13 Sep 2021 20:15:00 -0000</pubDate>
      <itunes:title>The continuing problem of Meris and its bot-driven DDoS. Mustang Panda visits Indonesia. DPRK’s social media battlespace prep. Al Qaeda marks 9/11’s anniversary. And REvil seems to be back.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1416</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Meris botnet continues to disrupt New Zealand banks, and has turned up elsewhere, too. Mustang Panda compromised Indonesian government networks. North Korean operators are using social media to soften up their prospective targets. Al Qaeda sympathizers marked the twentieth anniversary of 9/11 by calling for--what else?--more 9/11s. Malek Ben Salem from Accenture on deep unlearning, our own Rick Howard is in, talking about the latest episode of CSO Perspectives on adversary playbooks, and REvil seems to be back in business after taking what some of its hoods call “a break.”
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/176
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Meris botnet continues to disrupt New Zealand banks, and has turned up elsewhere, too. Mustang Panda compromised Indonesian government networks. North Korean operators are using social media to soften up their prospective targets. Al Qaeda sympathizers marked the twentieth anniversary of 9/11 by calling for--what else?--more 9/11s. Malek Ben Salem from Accenture on deep unlearning, our own Rick Howard is in, talking about the latest episode of CSO Perspectives on adversary playbooks, and REvil seems to be back in business after taking what some of its hoods call “a break.”</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/176</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1354</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0cc5de7a-364d-11eb-b082-bb3677f49ca8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9154509201.mp3?updated=1690291530" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Joe Bradley: A bit of a winding road. [Chief Scientist] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/66/notes</link>
      <description>Chief Scientist at LivePerson Joe Bradley takes us down his circuitous career journey that led him back to math. Joe had many ambitions from opera singer to middle school teacher, spent some time at two national labs and went back to his first love of math and physics. He notes that many of the most mathematically intuitive people that he's met are people that also have a creative outlet and a lot of times it's music. Adding a business aspect to his technical work, Joe came to his current position. He recommends going deep into your preferred subject and hopes that it helps you to become something different because of all you put into the work. We thank Joe for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 12 Sep 2021 07:00:00 -0000</pubDate>
      <itunes:title>Joe Bradley: A bit of a winding road. [Chief Scientist] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>66</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Chief Scientist at LivePerson Joe Bradley takes us down his circuitous career journey that led him back to math. </itunes:subtitle>
      <itunes:summary>Chief Scientist at LivePerson Joe Bradley takes us down his circuitous career journey that led him back to math. Joe had many ambitions from opera singer to middle school teacher, spent some time at two national labs and went back to his first love of math and physics. He notes that many of the most mathematically intuitive people that he's met are people that also have a creative outlet and a lot of times it's music. Adding a business aspect to his technical work, Joe came to his current position. He recommends going deep into your preferred subject and hopes that it helps you to become something different because of all you put into the work. We thank Joe for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chief Scientist at LivePerson Joe Bradley takes us down his circuitous career journey that led him back to math. Joe had many ambitions from opera singer to middle school teacher, spent some time at two national labs and went back to his first love of math and physics. He notes that many of the most mathematically intuitive people that he's met are people that also have a creative outlet and a lot of times it's music. Adding a business aspect to his technical work, Joe came to his current position. He recommends going deep into your preferred subject and hopes that it helps you to become something different because of all you put into the work. We thank Joe for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>344</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9eaef9e4-1003-11ec-a138-fb9c14051c6d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6313098440.mp3?updated=1631037541" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A Google Chrome update that just didn't feel right. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/200/notes</link>
      <description>Guest Jon Hencinski from Expel joins Dave Bittner to discuss his team's recent work on "Expel SOC Stops Ransomware Attack Aimed at WordPress CMS via Drive-By Download Disguised as Google Chrome Update."
In July, 2021, Expel's SOC stopped a ransomware attack at a large software and staffing company. The attackers compromised the company’s WordPress CMS and used the SocGholish framework to trigger a drive-by download of a Remote Access Tool (RAT) disguised as a Google Chrome update.
In total, four hosts downloaded a malicious Zipped JScript file that was configured to deploy a RAT, but we were able to stop the attack before ransomware deployment and help the organization remediate its WordPress CMS. Jons walk us through what happened, how they caught it, and provide recommendations on how to secure your WordPress CMS. 
The research can be found here:
Expel SOC Stops Ransomware Attack Aimed at WordPress CMS via Drive-By Download Disguised as Google Chrome Update

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Sep 2021 07:00:00 -0000</pubDate>
      <itunes:title>A Google Chrome update that just didn't feel right. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>200</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Jon Hencinski from Expel joins Dave Bittner to discuss his team's recent work on "Expel SOC Stops Ransomware Attack Aimed at WordPress CMS via Drive-By Download Disguised as Google Chrome Update."
In July, 2021, Expel's SOC stopped a ransomware attack at a large software and staffing company. The attackers compromised the company’s WordPress CMS and used the SocGholish framework to trigger a drive-by download of a Remote Access Tool (RAT) disguised as a Google Chrome update.
In total, four hosts downloaded a malicious Zipped JScript file that was configured to deploy a RAT, but we were able to stop the attack before ransomware deployment and help the organization remediate its WordPress CMS. Jons walk us through what happened, how they caught it, and provide recommendations on how to secure your WordPress CMS. 
The research can be found here:
Expel SOC Stops Ransomware Attack Aimed at WordPress CMS via Drive-By Download Disguised as Google Chrome Update

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Jon Hencinski from Expel joins Dave Bittner to discuss his team's recent work on "Expel SOC Stops Ransomware Attack Aimed at WordPress CMS via Drive-By Download Disguised as Google Chrome Update."</p><p>In July, 2021, Expel's SOC stopped a ransomware attack at a large software and staffing company. The attackers compromised the company’s WordPress CMS and used the SocGholish framework to trigger a drive-by download of a Remote Access Tool (RAT) disguised as a Google Chrome update.</p><p>In total, four hosts downloaded a malicious Zipped JScript file that was configured to deploy a RAT, but we were able to stop the attack before ransomware deployment and help the organization remediate its WordPress CMS. Jons walk us through what happened, how they caught it, and provide recommendations on how to secure your WordPress CMS. </p><p>The research can be found here:</p><ul><li><a href="https://expel.io/blog/incident-report-spotting-socgholish-wordpress-injection/">Expel SOC Stops Ransomware Attack Aimed at WordPress CMS via Drive-By Download Disguised as Google Chrome Update</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1154</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6fcb721a-10c6-11ec-863f-03f2e235382c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5440192357.mp3?updated=1685126346" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Investigations--the SEC looks into Solarigate, German prosecutors inquire into GhostWriter. The Meris botnet is responsible for recent DDoS attacks. Implausible deniability. The SINET 16 are announced.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1415/notes</link>
      <description>The SEC’s inquiry into the SolarWinds incident may expose other, unrelated data breaches. Researchers identify an IoT botnet, Meris, as responsible for DDoS attacks against a number of banks. German prosecutors have opened an investigation into the GhostWriter campaign. Researchers look at the cozy, implausibly deniable relationship between Russia’s security services and cyber gangs. A money-launderer gets eleven years. David Dufour from Webroot has straight talk about paying the ransom. Our guest is Jeff Williams from Contrast Security with a look at AppSec Observability. Congratulations to the SINET 16 winners. And we remember 9/11: has it already been twenty years?
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/175
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 10 Sep 2021 20:40:00 -0000</pubDate>
      <itunes:title>Investigations--the SEC looks into Solarigate, German prosecutors inquire into GhostWriter. The Meris botnet is responsible for recent DDoS attacks. Implausible deniability. The SINET 16 are announced.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1415</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The SEC’s inquiry into the SolarWinds incident may expose other, unrelated data breaches. Researchers identify an IoT botnet, Meris, as responsible for DDoS attacks against a number of banks. German prosecutors have opened an investigation into the GhostWriter campaign. Researchers look at the cozy, implausibly deniable relationship between Russia’s security services and cyber gangs. A money-launderer gets eleven years. David Dufour from Webroot has straight talk about paying the ransom. Our guest is Jeff Williams from Contrast Security with a look at AppSec Observability. Congratulations to the SINET 16 winners. And we remember 9/11: has it already been twenty years?
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/175
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The SEC’s inquiry into the SolarWinds incident may expose other, unrelated data breaches. Researchers identify an IoT botnet, Meris, as responsible for DDoS attacks against a number of banks. German prosecutors have opened an investigation into the GhostWriter campaign. Researchers look at the cozy, implausibly deniable relationship between Russia’s security services and cyber gangs. A money-launderer gets eleven years. David Dufour from Webroot has straight talk about paying the ransom. Our guest is Jeff Williams from Contrast Security with a look at AppSec Observability. Congratulations to the SINET 16 winners. And we remember 9/11: has it already been twenty years?</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/175</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1632</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0e261690-364d-11eb-b082-378ecd4b9273]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9610961820.mp3?updated=1690291122" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Credential theft at the UN? Intelligence services and privateers. DDoS hits a big multinational. A look at AlphaBay 2.0. Notes on the C2C marketplace.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1414/notes</link>
      <description>A cyberattack is reported at the UN, with agency data apparently lost to parties and parts unknown. The Bears are quieter, but the privateers are up and at ‘em. DDoS hits Yandex. Cyberespionage using the SideWalk backdoor. TeamTNT is getting tougher to detect. A SWOT analysis of the newly reconstituted AlphaBay contraband market. The Groove Gang is a new age criminal affiliate program. Caleb Barlow describes attackers leveraging US and European infrastructure to hide in plain sight. Our guest is Brad Thies of BARR Advisory on what the next 5 years may have in store for cloud security. And irritate your online chums for just 50 bucks a pop.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/174
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 09 Sep 2021 20:15:00 -0000</pubDate>
      <itunes:title>Credential theft at the UN? Intelligence services and privateers. DDoS hits a big multinational. A look at AlphaBay 2.0. Notes on the C2C marketplace.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1414</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cyberattack is reported at the UN, with agency data apparently lost to parties and parts unknown. The Bears are quieter, but the privateers are up and at ‘em. DDoS hits Yandex. Cyberespionage using the SideWalk backdoor. TeamTNT is getting tougher to detect. A SWOT analysis of the newly reconstituted AlphaBay contraband market. The Groove Gang is a new age criminal affiliate program. Caleb Barlow describes attackers leveraging US and European infrastructure to hide in plain sight. Our guest is Brad Thies of BARR Advisory on what the next 5 years may have in store for cloud security. And irritate your online chums for just 50 bucks a pop.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/174
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cyberattack is reported at the UN, with agency data apparently lost to parties and parts unknown. The Bears are quieter, but the privateers are up and at ‘em. DDoS hits Yandex. Cyberespionage using the SideWalk backdoor. TeamTNT is getting tougher to detect. A SWOT analysis of the newly reconstituted AlphaBay contraband market. The Groove Gang is a new age criminal affiliate program. Caleb Barlow describes attackers leveraging US and European infrastructure to hide in plain sight. Our guest is Brad Thies of BARR Advisory on what the next 5 years may have in store for cloud security. And irritate your online chums for just 50 bucks a pop.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/174</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1538</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0de9b61e-364d-11eb-b082-7f394b35a60d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3497135392.mp3?updated=1690291107" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BladeHawk Android cyberespionage campaign in progress. Labor Day was quiet, but the gangs are now back at it. REvil’s remnant stirs. Bulletproof hosting. Phishing keywords.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1413/notes</link>
      <description>BladeHawk cyberespionage campaign in progress. Microsoft warns of targeted attacks in progress. Hey--the hoods took a breather over Labor Day, but the straw hats are off now, and they’re back at work. Someone is rummaging in REvil’s unquiet grave. Bulletproof hosting services and the criminal marketplace. Mike Benjamin from Black Lotus Labs on ReverseRAT 2.0. Rick Howard checks in with Philip Reiner from the Ransomware Taskforce. And does a New Urgent Message Require Action? Maybe not.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/173
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 08 Sep 2021 20:15:00 -0000</pubDate>
      <itunes:title>BladeHawk Android cyberespionage campaign in progress. Labor Day was quiet, but the gangs are now back at it. REvil’s remnant stirs. Bulletproof hosting. Phishing keywords.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1413</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>BladeHawk cyberespionage campaign in progress. Microsoft warns of targeted attacks in progress. Hey--the hoods took a breather over Labor Day, but the straw hats are off now, and they’re back at work. Someone is rummaging in REvil’s unquiet grave. Bulletproof hosting services and the criminal marketplace. Mike Benjamin from Black Lotus Labs on ReverseRAT 2.0. Rick Howard checks in with Philip Reiner from the Ransomware Taskforce. And does a New Urgent Message Require Action? Maybe not.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/173
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>BladeHawk cyberespionage campaign in progress. Microsoft warns of targeted attacks in progress. Hey--the hoods took a breather over Labor Day, but the straw hats are off now, and they’re back at work. Someone is rummaging in REvil’s unquiet grave. Bulletproof hosting services and the criminal marketplace. Mike Benjamin from Black Lotus Labs on ReverseRAT 2.0. Rick Howard checks in with Philip Reiner from the Ransomware Taskforce. And does a New Urgent Message Require Action? Maybe not.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/173</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1462</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0d61d42e-364d-11eb-b082-47423d08ce18]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6402012192.mp3?updated=1690291092" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A threat from Ragnar Locker. GhostWriter in the Bundestag. BKA bought Pegasus. Taliban sifts data for potential opponents. France-Visas hacked. Modified apps. Privacy notes. A TrickBot arrest.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1412/notes</link>
      <description>No spectacular flurry of Labor Day ransomware, but Ragnar Locker threatens its victims. Berlin complains to Moscow about GhostWriter. Another Pegasus customer is disclosed. The Taliban is searching for data on potential domestic opponents. France-Visas hacked. Modified apps in circulation. Joe Carrigan unpacks a Covid based phishing scam. Carole Theriault weighs in on the ransomware pay-or-do-not-pay discussion. ProtonMail answers a warrant, Apple delays CSAM screening, and an alleged TrickBot coder is arrested.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/172
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Sep 2021 20:15:00 -0000</pubDate>
      <itunes:title>A threat from Ragnar Locker. GhostWriter in the Bundestag. BKA bought Pegasus. Taliban sifts data for potential opponents. France-Visas hacked. Modified apps. Privacy notes. A TrickBot arrest.  </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1412</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>No spectacular flurry of Labor Day ransomware, but Ragnar Locker threatens its victims. Berlin complains to Moscow about GhostWriter. Another Pegasus customer is disclosed. The Taliban is searching for data on potential domestic opponents. France-Visas hacked. Modified apps in circulation. Joe Carrigan unpacks a Covid based phishing scam. Carole Theriault weighs in on the ransomware pay-or-do-not-pay discussion. ProtonMail answers a warrant, Apple delays CSAM screening, and an alleged TrickBot coder is arrested.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/172
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>No spectacular flurry of Labor Day ransomware, but Ragnar Locker threatens its victims. Berlin complains to Moscow about GhostWriter. Another Pegasus customer is disclosed. The Taliban is searching for data on potential domestic opponents. France-Visas hacked. Modified apps in circulation. Joe Carrigan unpacks a Covid based phishing scam. Carole Theriault weighs in on the ransomware pay-or-do-not-pay discussion. ProtonMail answers a warrant, Apple delays CSAM screening, and an alleged TrickBot coder is arrested.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/172</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1563</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0d3cf172-364d-11eb-b082-8f81f396eae0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9420549382.mp3?updated=1690291077" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Natali Tshuva: Impacting critical industries. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/65/notes</link>
      <description>CEO and co-founder of Sternum, Natali Tshuva shares how she took her interest in science and technology and made a career and company out of it. Beginning her computer science undergraduate degree at age 14 through a special program in Israel, Natali says it opened up a new world for her. Her required service in the IDF found Natali as a member of Unit 8200, the Israeli intelligence. In the Israeli corporate space following the IDF, Natali discovered how cybersecurity could actually create impact in the real world environment and found a way to combine her cybersecurity expertise with the passion to impact critical industries like the medical industry. Natali recommends that those entering the field get some hands-on experience and use your unique strengths to find a way to make the world a better place. We thank Natali for sharing her story. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 05 Sep 2021 07:00:00 -0000</pubDate>
      <itunes:title>Natali Tshuva: Impacting critical industries. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>65</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>CEO and co-founder of Sternum, Natali Tshuva shares how she took her interest in science and technology and made a career and company out of it. </itunes:subtitle>
      <itunes:summary>CEO and co-founder of Sternum, Natali Tshuva shares how she took her interest in science and technology and made a career and company out of it. Beginning her computer science undergraduate degree at age 14 through a special program in Israel, Natali says it opened up a new world for her. Her required service in the IDF found Natali as a member of Unit 8200, the Israeli intelligence. In the Israeli corporate space following the IDF, Natali discovered how cybersecurity could actually create impact in the real world environment and found a way to combine her cybersecurity expertise with the passion to impact critical industries like the medical industry. Natali recommends that those entering the field get some hands-on experience and use your unique strengths to find a way to make the world a better place. We thank Natali for sharing her story. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CEO and co-founder of Sternum, Natali Tshuva shares how she took her interest in science and technology and made a career and company out of it. Beginning her computer science undergraduate degree at age 14 through a special program in Israel, Natali says it opened up a new world for her. Her required service in the IDF found Natali as a member of Unit 8200, the Israeli intelligence. In the Israeli corporate space following the IDF, Natali discovered how cybersecurity could actually create impact in the real world environment and found a way to combine her cybersecurity expertise with the passion to impact critical industries like the medical industry. Natali recommends that those entering the field get some hands-on experience and use your unique strengths to find a way to make the world a better place. We thank Natali for sharing her story. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>379</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6a91dcde-0b45-11ec-b9e7-9f79bfb9ce5f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8692173968.mp3?updated=1630514979" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Like a computer network but for physical objects. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/199/notes</link>
      <description>Guest Ben Seri, Armis' VP of Research, joins Dave to talk about a set of remote code execution (RCE) vulnerabilities in the pneumatic tube system of Swisslog. Nine vulnerabilities in critical infrastructure used by 80% of major hospitals in North America.
Swisslog’s Translogic Pneumatic Tube System (PTS), a solution that plays a crucial role in patient care, found vulnerable to devastating attack. Dubbed PwnedPiper, the vulnerabilities allow for complete take over of the Translogic Nexus Control Panel, which powers all current models of Translogic PTS stations. Older IP-connected Translogic stations are also impacted, but are no longer supported by Swisslog.
The research can be found here:
PwnedPiper

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Sep 2021 07:00:00 -0000</pubDate>
      <itunes:title>Like a computer network but for physical objects. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>199</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Ben Seri, Armis' VP of Research, joins Dave to talk about a set of remote code execution (RCE) vulnerabilities in the pneumatic tube system of Swisslog. Nine vulnerabilities in critical infrastructure used by 80% of major hospitals in North America.
Swisslog’s Translogic Pneumatic Tube System (PTS), a solution that plays a crucial role in patient care, found vulnerable to devastating attack. Dubbed PwnedPiper, the vulnerabilities allow for complete take over of the Translogic Nexus Control Panel, which powers all current models of Translogic PTS stations. Older IP-connected Translogic stations are also impacted, but are no longer supported by Swisslog.
The research can be found here:
PwnedPiper

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Ben Seri, Armis' VP of Research, joins Dave to talk about a set of remote code execution (RCE) vulnerabilities in the pneumatic tube system of Swisslog. Nine vulnerabilities in critical infrastructure used by 80% of major hospitals in North America.</p><p>Swisslog’s Translogic Pneumatic Tube System (PTS), a solution that plays a crucial role in patient care, found vulnerable to devastating attack. Dubbed PwnedPiper, the vulnerabilities allow for complete take over of the Translogic Nexus Control Panel, which powers all current models of Translogic PTS stations. Older IP-connected Translogic stations are also impacted, but are no longer supported by Swisslog.</p><p>The research can be found here:</p><ul><li><a href="https://www.armis.com/research/pwnedpiper">PwnedPiper</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1414</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[675abf08-0a7e-11ec-b442-ebb0eed007fd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3311494980.mp3?updated=1685126335" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Watch out for cybercrime over holidays (like Labor Day). Ransomware warning for the food and agriculture sector. Gift card and loyalty program fraud. NIST draft IoT guidelines out for comment.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1411/notes</link>
      <description>Uncle Sam recommends cyber vigilance during your kinetic relaxation this Labor Day weekend. The ransomware threat to food and agriculture. “Low and slow” fraud from compromised email in-boxes. Israel promises an investigation of cyber export controls. Josh Ray from Accenture Security on giving back to the community and the Jenkins Attack Framework for red teaming. Our guest is Andy Ellis on the transparency in cybersecurity initiative. And NIST has draft consumer IoT guidelines out for comment.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/171
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 03 Sep 2021 19:55:54 -0000</pubDate>
      <itunes:title>Watch out for cybercrime over holidays (like Labor Day). Ransomware warning for the food and agriculture sector. Gift card and loyalty program fraud. NIST draft IoT guidelines out for comment.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1411</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Uncle Sam recommends cyber vigilance during your kinetic relaxation this Labor Day weekend. The ransomware threat to food and agriculture. “Low and slow” fraud from compromised email in-boxes. Israel promises an investigation of cyber export controls. Josh Ray from Accenture Security on giving back to the community and the Jenkins Attack Framework for red teaming. Our guest is Andy Ellis on the transparency in cybersecurity initiative. And NIST has draft consumer IoT guidelines out for comment.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/171
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Uncle Sam recommends cyber vigilance during your kinetic relaxation this Labor Day weekend. The ransomware threat to food and agriculture. “Low and slow” fraud from compromised email in-boxes. Israel promises an investigation of cyber export controls. Josh Ray from Accenture Security on giving back to the community and the Jenkins Attack Framework for red teaming. Our guest is Andy Ellis on the transparency in cybersecurity initiative. And NIST has draft consumer IoT guidelines out for comment.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/171</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1429</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0e1313e2-364d-11eb-b082-0b366096a73f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8856966858.mp3?updated=1690291061" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>LockBit updates. The BrakTooth bugs infesting Bluetooth. Malicious cable proof-of-concept. EU fines WhatsApp over GDPR issues. Insider threats. Action against an alleged stalkerware vendor.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1410/notes</link>
      <description>The LockBit gang jumps the gun, and crows a bit higher than the facts seem to warrant. Ghostwriter seems to ride a much bigger infrastructure than previously believed. BrakTooth bugs afflict “billions” of Bluetooth devices. OMG cables include a keylogger that phones home. The EU fines WhatsApp over GDPR violations. Insider threats can be difficult to recognize. David Dufour from Webroot thinks it’s great that you haven’t been breached...yet. Our guest is Mark Nunnikhoven from Lacework with results from their Cloud Threat Report. And an alleged stalkerware vendor is sanctioned by the US Federal Trade Commission.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/170
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 02 Sep 2021 20:15:00 -0000</pubDate>
      <itunes:title>LockBit updates. The BrakTooth bugs infesting Bluetooth. Malicious cable proof-of-concept. EU fines WhatsApp over GDPR issues. Insider threats. Action against an alleged stalkerware vendor.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1410</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The LockBit gang jumps the gun, and crows a bit higher than the facts seem to warrant. Ghostwriter seems to ride a much bigger infrastructure than previously believed. BrakTooth bugs afflict “billions” of Bluetooth devices. OMG cables include a keylogger that phones home. The EU fines WhatsApp over GDPR violations. Insider threats can be difficult to recognize. David Dufour from Webroot thinks it’s great that you haven’t been breached...yet. Our guest is Mark Nunnikhoven from Lacework with results from their Cloud Threat Report. And an alleged stalkerware vendor is sanctioned by the US Federal Trade Commission.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/170
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The LockBit gang jumps the gun, and crows a bit higher than the facts seem to warrant. Ghostwriter seems to ride a much bigger infrastructure than previously believed. BrakTooth bugs afflict “billions” of Bluetooth devices. OMG cables include a keylogger that phones home. The EU fines WhatsApp over GDPR violations. Insider threats can be difficult to recognize. David Dufour from Webroot thinks it’s great that you haven’t been breached...yet. Our guest is Mark Nunnikhoven from Lacework with results from their Cloud Threat Report. And an alleged stalkerware vendor is sanctioned by the US Federal Trade Commission.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/170</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1511</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0dfd6060-364d-11eb-b082-0b3fac33f4db]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5300723681.mp3?updated=1690291045" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A look at cyber gangland. Sino-Australian tension in cyberspace. Vulnerabilities reported (and disputed) in a home security system. Labor Day warnings.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1409/notes</link>
      <description>Ransomware continues to hold pride-of-place in cybercrime. A look inside the mind of cyber gangland, or at least that portion of their mind they’re willing to expose. Business email compromise operators look for communication skills, and the underworld seems to think university students make good money mules. Reports of vulnerabilities in a home security system. When Canberra angered Beijing. Caleb Barlow has thoughts on the FBI response to MS Exchange vulnerabilities. Our guest’s are Peter Singer and Lisa Guernsey on New America's Teaching Cyber Citizenship initiative. And CISA and the FBI advise being alert over Labor Day.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/169
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 01 Sep 2021 19:31:30 -0000</pubDate>
      <itunes:title>A look at cyber gangland. Sino-Australian tension in cyberspace. Vulnerabilities reported (and disputed) in a home security system. Labor Day warnings.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1409</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ransomware continues to hold pride-of-place in cybercrime. A look inside the mind of cyber gangland, or at least that portion of their mind they’re willing to expose. Business email compromise operators look for communication skills, and the underworld seems to think university students make good money mules. Reports of vulnerabilities in a home security system. When Canberra angered Beijing. Caleb Barlow has thoughts on the FBI response to MS Exchange vulnerabilities. Our guest’s are Peter Singer and Lisa Guernsey on New America's Teaching Cyber Citizenship initiative. And CISA and the FBI advise being alert over Labor Day.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/169
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ransomware continues to hold pride-of-place in cybercrime. A look inside the mind of cyber gangland, or at least that portion of their mind they’re willing to expose. Business email compromise operators look for communication skills, and the underworld seems to think university students make good money mules. Reports of vulnerabilities in a home security system. When Canberra angered Beijing. Caleb Barlow has thoughts on the FBI response to MS Exchange vulnerabilities. Our guest’s are Peter Singer and Lisa Guernsey on New America's Teaching Cyber Citizenship initiative. And CISA and the FBI advise being alert over Labor Day.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/169</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1572</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0d501360-364d-11eb-b082-7fa1f7c93a62]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4620960003.mp3?updated=1690290906" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dangers of data collected in Afghanistan. Another cryptocurrency theft. Hardware backdoors? LockBit dumps airline’s data. CISA opens registration for the President’s Cup. Too much gaming, kids.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1408/notes</link>
      <description>Possible consequences of the Taliban’s seizure of Afghanistan’s APPS data. Another DeFi platform sustains a cryptocurrency theft. How would one handle a hardware backdoor? LockBit begins dumping data stolen from Bangkok Airways. Registration for CISA’s President’s Cup is now open. Joe Carrigan describes the superiority of AI generated phishing emails. Rick Howard speaks with Art Poghosyan from Britive on Software Defined Perimeters. And China moves to keep minors from wasting too much time in online gaming.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/168
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 31 Aug 2021 20:15:00 -0000</pubDate>
      <itunes:title>Dangers of data collected in Afghanistan. Another cryptocurrency theft. Hardware backdoors? LockBit dumps airline’s data. CISA opens registration for the President’s Cup. Too much gaming, kids.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1408</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Possible consequences of the Taliban’s seizure of Afghanistan’s APPS data. Another DeFi platform sustains a cryptocurrency theft. How would one handle a hardware backdoor? LockBit begins dumping data stolen from Bangkok Airways. Registration for CISA’s President’s Cup is now open. Joe Carrigan describes the superiority of AI generated phishing emails. Rick Howard speaks with Art Poghosyan from Britive on Software Defined Perimeters. And China moves to keep minors from wasting too much time in online gaming.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/168
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Possible consequences of the Taliban’s seizure of Afghanistan’s APPS data. Another DeFi platform sustains a cryptocurrency theft. How would one handle a hardware backdoor? LockBit begins dumping data stolen from Bangkok Airways. Registration for CISA’s President’s Cup is now open. Joe Carrigan describes the superiority of AI generated phishing emails. Rick Howard speaks with Art Poghosyan from Britive on Software Defined Perimeters. And China moves to keep minors from wasting too much time in online gaming.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/168</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1483</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0bdc1d8a-364d-11eb-b082-6f882399a628]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9884094909.mp3?updated=1690290892" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Data breaches and ransomware. Another gang says it’s retiring. New warrants against cybercrime in Australia. Roles and missions in the US. Hoosier data?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1407/notes</link>
      <description>Data breach and ransomware affect an airline’s customers. The Phorpiex botnet operators say they’re going out of business, and everything must go. New warrants for the Australian Federal Police in cybercrime cases. US Federal cybersecurity roles and responsibilities. Rick Howard takes on adversary playbooks. Josh Ray from Accenture Security on The Biden Administration's cybersecurity executive order, what it means for product security. And Indiana warns of a COVID-19 contact tracking database exposure.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/167
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 30 Aug 2021 19:59:29 -0000</pubDate>
      <itunes:title>Data breaches and ransomware. Another gang says it’s retiring. New warrants against cybercrime in Australia. Roles and missions in the US. Hoosier data?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1407</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Data breach and ransomware affect an airline’s customers. The Phorpiex botnet operators say they’re going out of business, and everything must go. New warrants for the Australian Federal Police in cybercrime cases. US Federal cybersecurity roles and responsibilities. Rick Howard takes on adversary playbooks. Josh Ray from Accenture Security on The Biden Administration's cybersecurity executive order, what it means for product security. And Indiana warns of a COVID-19 contact tracking database exposure.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/167
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Data breach and ransomware affect an airline’s customers. The Phorpiex botnet operators say they’re going out of business, and everything must go. New warrants for the Australian Federal Police in cybercrime cases. US Federal cybersecurity roles and responsibilities. Rick Howard takes on adversary playbooks. Josh Ray from Accenture Security on The Biden Administration's cybersecurity executive order, what it means for product security. And Indiana warns of a COVID-19 contact tracking database exposure.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/167</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1311</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0c9ce13c-364d-11eb-b082-23d9a0e7876d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5652097028.mp3?updated=1690290874" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rich Hale: Understanding the data. [CTO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/64/notes</link>
      <description>Chief Technology Officer of ActiveNav Rich Hale takes us through his career aspirations of board game designer (one he has yet to realize), through his experience with the Royal Air Force to the commercial sector where his firm works to secure dark data. During his time in the Air Force, Rich was fortunate to serve on a wide range of different platforms from training aircraft to bombers, and all the way into procurement and policy. Transitioning to the commercial sector, Rich notes he was well prepared for some aspects, but lacking in some he's made up on his own. Rich likes to lead with vision and empower his teams. He counsels that you should not fear making a career change, but be sure to look twice before making the leap. We thank Rich for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 29 Aug 2021 07:00:00 -0000</pubDate>
      <itunes:title>Rich Hale: Understanding the data. [CTO] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>64</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Chief Technology Officer of ActiveNav Rich Hale takes us through his career aspirations of board game designer to dark data. </itunes:subtitle>
      <itunes:summary>Chief Technology Officer of ActiveNav Rich Hale takes us through his career aspirations of board game designer (one he has yet to realize), through his experience with the Royal Air Force to the commercial sector where his firm works to secure dark data. During his time in the Air Force, Rich was fortunate to serve on a wide range of different platforms from training aircraft to bombers, and all the way into procurement and policy. Transitioning to the commercial sector, Rich notes he was well prepared for some aspects, but lacking in some he's made up on his own. Rich likes to lead with vision and empower his teams. He counsels that you should not fear making a career change, but be sure to look twice before making the leap. We thank Rich for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chief Technology Officer of ActiveNav Rich Hale takes us through his career aspirations of board game designer (one he has yet to realize), through his experience with the Royal Air Force to the commercial sector where his firm works to secure dark data. During his time in the Air Force, Rich was fortunate to serve on a wide range of different platforms from training aircraft to bombers, and all the way into procurement and policy. Transitioning to the commercial sector, Rich notes he was well prepared for some aspects, but lacking in some he's made up on his own. Rich likes to lead with vision and empower his teams. He counsels that you should not fear making a career change, but be sure to look twice before making the leap. We thank Rich for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>364</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6e274f2a-05d5-11ec-9112-339fa2b6a552]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1213251091.mp3?updated=1629917569" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Joker malware family: not a joke for Google Play. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/198/notes</link>
      <description>Guest Deepen Desai, Zscaler's Chief Information Security Officer and VP Security Research &amp; Operations, joins Dave to discuss their ThreatLabz team's research "Joker Joking in Google Play: Joker malware targets Google Play store with new tactics." Joker is one of the most prominent malware families targeting Android devices. Despite public awareness of this particular malware, it keeps finding its way into Google’s official application market by employing changes in its code, execution methods, or payload-retrieving techniques. This spyware is designed to steal SMS messages, contact lists, and device information, and to sign the victim up for premium wireless application protocol (WAP) services.
Zscaler’s ThreatLabz research team has been constantly monitoring the Joker malware. Recently, they observed regular uploads of it onto the Google Play store. ThreatLabz notified the Google Android Security team, who have taken prompt action to remove the suspicious apps from the Google Play store. 
This prompted them to evaluate how Joker is so successful at getting around the Google Play vetting process. The team saw 11 different samples regularly uploaded to Google Play recently clocking 30k installs.
The research can be found here:
Joker Joking in Google Play: Joker malware targets Google Play store with new tactics

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Aug 2021 07:00:00 -0000</pubDate>
      <itunes:title>Joker malware family: not a joke for Google Play. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>198</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Deepen Desai, Zscaler's Chief Information Security Officer and VP Security Research &amp; Operations, joins Dave to discuss their ThreatLabz team's research "Joker Joking in Google Play: Joker malware targets Google Play store with new tactics." Joker is one of the most prominent malware families targeting Android devices. Despite public awareness of this particular malware, it keeps finding its way into Google’s official application market by employing changes in its code, execution methods, or payload-retrieving techniques. This spyware is designed to steal SMS messages, contact lists, and device information, and to sign the victim up for premium wireless application protocol (WAP) services.
Zscaler’s ThreatLabz research team has been constantly monitoring the Joker malware. Recently, they observed regular uploads of it onto the Google Play store. ThreatLabz notified the Google Android Security team, who have taken prompt action to remove the suspicious apps from the Google Play store. 
This prompted them to evaluate how Joker is so successful at getting around the Google Play vetting process. The team saw 11 different samples regularly uploaded to Google Play recently clocking 30k installs.
The research can be found here:
Joker Joking in Google Play: Joker malware targets Google Play store with new tactics

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Deepen Desai, Zscaler's Chief Information Security Officer and VP Security Research &amp; Operations, joins Dave to discuss their ThreatLabz team's research "Joker Joking in Google Play: Joker malware targets Google Play store with new tactics." Joker is one of the most prominent malware families targeting Android devices. Despite public awareness of this particular malware, it keeps finding its way into Google’s official application market by employing changes in its code, execution methods, or payload-retrieving techniques. This spyware is designed to steal SMS messages, contact lists, and device information, and to sign the victim up for premium wireless application protocol (WAP) services.</p><p>Zscaler’s ThreatLabz research team has been constantly monitoring the Joker malware. Recently, they observed regular uploads of it onto the Google Play store. ThreatLabz notified the Google Android Security team, who have taken prompt action to remove the suspicious apps from the Google Play store. </p><p>This prompted them to evaluate how Joker is so successful at getting around the Google Play vetting process. The team saw 11 different samples regularly uploaded to Google Play recently clocking 30k installs.</p><p>The research can be found here:</p><ul><li><a href="https://www.zscaler.com/blogs/security-research/joker-joking-google-play">Joker Joking in Google Play: Joker malware targets Google Play store with new tactics</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1062</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c3056d0e-04fb-11ec-929a-cbe887ae0ada]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5107723576.mp3?updated=1685126321" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The T-Mobile hacker speaks (we think). SparklingGoblin enters the cyberespionage ring. Is someone stealing data to train AI? Cellebrite’s availability. Ragnarok ransomware says it’s going out of business.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1406/notes</link>
      <description>A young man claiming responsibility for the T-Mobile breach talks to the Wall Street Journal. A new cyberespionage group, “SparklingGoblin,” seems particularly interested in educational institutions, especially in Southeast and East Asia. Are governments training AI with stolen data? Mitigations for Microsoft issues. Cellebrite tools may still be available to Chinese police. Kevin Magee from Microsoft wonders if leaders have over pivoted toward technical skill. Our guest is Bill Wright of Splunk on the ongoing geopolitical ransomware trend. And another ransomware gang says it’s going out of business...we’ll wait and see.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/166
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 27 Aug 2021 20:30:00 -0000</pubDate>
      <itunes:title>The T-Mobile hacker speaks (we think). SparklingGoblin enters the cyberespionage ring. Is someone stealing data to train AI? Cellebrite’s availability. Ragnarok ransomware says it’s going out of business.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1406</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A young man claiming responsibility for the T-Mobile breach talks to the Wall Street Journal. A new cyberespionage group, “SparklingGoblin,” seems particularly interested in educational institutions, especially in Southeast and East Asia. Are governments training AI with stolen data? Mitigations for Microsoft issues. Cellebrite tools may still be available to Chinese police. Kevin Magee from Microsoft wonders if leaders have over pivoted toward technical skill. Our guest is Bill Wright of Splunk on the ongoing geopolitical ransomware trend. And another ransomware gang says it’s going out of business...we’ll wait and see.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/166
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A young man claiming responsibility for the T-Mobile breach talks to the Wall Street Journal. A new cyberespionage group, “SparklingGoblin,” seems particularly interested in educational institutions, especially in Southeast and East Asia. Are governments training AI with stolen data? Mitigations for Microsoft issues. Cellebrite tools may still be available to Chinese police. Kevin Magee from Microsoft wonders if leaders have over pivoted toward technical skill. Our guest is Bill Wright of Splunk on the ongoing geopolitical ransomware trend. And another ransomware gang says it’s going out of business...we’ll wait and see.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/166</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1514</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0b1e3cc0-364d-11eb-b082-a35bebdcc059]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2568878878.mp3?updated=1702576809" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A quick look back at yesterday’s White House industry meeting. Revolution, coup, or a bit of both? Storytelling for security. Lessons from Olympic scams. Notes from the underworld.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1405/notes</link>
      <description>Outcomes from the White House industry cybersecurity summit: standards, training, zero-trust, and multifactor authentication. The Cyber Partisans aim at the overthrow of Lukashenka’s rule in Minsk. A role for storytelling in security. Scams, sports, and streaming. Speculation about the ShinyHunters’ next moves. Verizon’s Chris Novak on Reducing false positives in threat intelligence. Bentsi Ben Atar from Sepio Systems on the risks of hardware-based attacks, internal abusers, corporate espionage, and Wi-Fi. And cybercriminals like their VPNs, too.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/165
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 26 Aug 2021 19:45:00 -0000</pubDate>
      <itunes:title>A quick look back at yesterday’s White House industry meeting. Revolution, coup, or a bit of both? Storytelling for security. Lessons from Olympic scams. Notes from the underworld.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1405</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Outcomes from the White House industry cybersecurity summit: standards, training, zero-trust, and multifactor authentication. The Cyber Partisans aim at the overthrow of Lukashenka’s rule in Minsk. A role for storytelling in security. Scams, sports, and streaming. Speculation about the ShinyHunters’ next moves. Verizon’s Chris Novak on Reducing false positives in threat intelligence. Bentsi Ben Atar from Sepio Systems on the risks of hardware-based attacks, internal abusers, corporate espionage, and Wi-Fi. And cybercriminals like their VPNs, too.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/165
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Outcomes from the White House industry cybersecurity summit: standards, training, zero-trust, and multifactor authentication. The Cyber Partisans aim at the overthrow of Lukashenka’s rule in Minsk. A role for storytelling in security. Scams, sports, and streaming. Speculation about the ShinyHunters’ next moves. Verizon’s Chris Novak on Reducing false positives in threat intelligence. Bentsi Ben Atar from Sepio Systems on the risks of hardware-based attacks, internal abusers, corporate espionage, and Wi-Fi. And cybercriminals like their VPNs, too.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/165</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1705</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0b34d85e-364d-11eb-b082-1bc78ae5c241]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9428937793.mp3?updated=1702576829" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacktivism in Belarus. The Taliban’s data grab. Four rising ransomware operations. The White House cybersecurity summit with industry leaders is in progress.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1404/notes</link>
      <description>Politically motivated hacktivism in Belarus. The Taliban’s data grab in Afghanistan. Four rising ransomware operations. Mike Benjamin from Black Lotus Labs on UDP reflectors. Our guest is Chris Grove of Nozomi Networks with insights on OT/IoT Security. And the White House says “concrete announcements” are expected after today’s meetings on cybersecurity with industry leaders, so we’ll be staying tuned.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/164
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 25 Aug 2021 19:45:00 -0000</pubDate>
      <itunes:title>Hacktivism in Belarus. The Taliban’s data grab. Four rising ransomware operations. The White House cybersecurity summit with industry leaders is in progress.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1404</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Politically motivated hacktivism in Belarus. The Taliban’s data grab in Afghanistan. Four rising ransomware operations. Mike Benjamin from Black Lotus Labs on UDP reflectors. Our guest is Chris Grove of Nozomi Networks with insights on OT/IoT Security. And the White House says “concrete announcements” are expected after today’s meetings on cybersecurity with industry leaders, so we’ll be staying tuned.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/164
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Politically motivated hacktivism in Belarus. The Taliban’s data grab in Afghanistan. Four rising ransomware operations. Mike Benjamin from Black Lotus Labs on UDP reflectors. Our guest is Chris Grove of Nozomi Networks with insights on OT/IoT Security. And the White House says “concrete announcements” are expected after today’s meetings on cybersecurity with industry leaders, so we’ll be staying tuned.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/164</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1497</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0bc8c154-364d-11eb-b082-c3d6cbba7106]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7497355779.mp3?updated=1702576859" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Apple CSAM: well-intentioned, slippery slope. [Caveat]</title>
      <link>https://thecyberwire.com/podcasts/caveat/91/notes</link>
      <description>Guest David Derigiotis, Corporate Senior Vice President at Burns &amp; Wilcox, joins Dave and Ben for an in-depth discussion this episode. Departing from our usual format, we take a closer look at the implications of Apple’s recent announcements that they will be enabling scanning for Child Sexual Abuse Materials, CSAM, on iOS devices. We devote the entire episode to this topic and hope you will join us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 25 Aug 2021 07:00:00 -0000</pubDate>
      <itunes:title>Apple CSAM: well-intentioned, slippery slope. [Caveat]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>91</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest David Derigiotis, Corporate Senior Vice President at Burns &amp; Wilcox, joins Dave and Ben for an in-depth discussion this episode. Departing from our usual format, we take a closer look at the implications of Apple’s recent announcements that they will be enabling scanning for Child Sexual Abuse Materials, CSAM, on iOS devices. We devote the entire episode to this topic and hope you will join us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest David Derigiotis, Corporate Senior Vice President at Burns &amp; Wilcox, joins Dave and Ben for an in-depth discussion this episode. Departing from our usual format, we take a closer look at the implications of Apple’s recent announcements that they will be enabling scanning for Child Sexual Abuse Materials, CSAM, on iOS devices. We devote the entire episode to this topic and hope you will join us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2515</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3f0ce364-04ed-11ec-8609-df9817db49ae]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7958637991.mp3?updated=1678990988" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Apparent hacktivism exposes Iranian prison CCTV feeds. Misconfigured Power Apps expose data. FBI warns of the OnePercent Group. Mr. White Hat gives back. Dog bites man</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1403/notes</link>
      <description>More hacktivism appears to have hit Iran. Misconfigured Power Apps portals expose data on millions. The FBI warns of the activities of a ransomware affiliate gang. Mr. White Hat really does seem to have given back all that stolen alt-coin. Ben Yelin checks in on Apple’s CSAM plans. Our guest is Charles DeBeck from IBM Security on the true cost Cost of a Data Breach. And, finally, dog bites man: criminals cheat other criminals.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/163
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Aug 2021 20:00:00 -0000</pubDate>
      <itunes:title>Apparent hacktivism exposes Iranian prison CCTV feeds. Misconfigured Power Apps expose data. FBI warns of the OnePercent Group. Mr. White Hat gives back. Dog bites man</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1403</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>More hacktivism appears to have hit Iran. Misconfigured Power Apps portals expose data on millions. The FBI warns of the activities of a ransomware affiliate gang. Mr. White Hat really does seem to have given back all that stolen alt-coin. Ben Yelin checks in on Apple’s CSAM plans. Our guest is Charles DeBeck from IBM Security on the true cost Cost of a Data Breach. And, finally, dog bites man: criminals cheat other criminals.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/163
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>More hacktivism appears to have hit Iran. Misconfigured Power Apps portals expose data on millions. The FBI warns of the activities of a ransomware affiliate gang. Mr. White Hat really does seem to have given back all that stolen alt-coin. Ben Yelin checks in on Apple’s CSAM plans. Our guest is Charles DeBeck from IBM Security on the true cost Cost of a Data Breach. And, finally, dog bites man: criminals cheat other criminals.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/163</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1654</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0bef5396-364d-11eb-b082-1bdb71e85459]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2021816754.mp3?updated=1702576877" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Notes on the fall of Afghanistan, with its cyber and kinetic implications. US State Department hack reported. ShinyHunters resurface. Further incentive to patch Microsoft Exchange Server.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1402/notes</link>
      <description>The Taliban consolidates control over Afghanistan, and it’s doing so online as well as on the ground. Reports say the US State Department has come under cyberattack; State says that any such incident was without significant effect. The ShinyHunters say they’ve obtained a great deal of PII from AT&amp;T, but AT&amp;T says that, whatever the crooks have, it didn’t come from AT&amp;T. Rick Howard on orchestration. Carole Theriault on women in cybersecurity - are thing getting any better? And exploitation gives organizations even more incentive to patch Microsoft Exchange server instances.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/162
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 23 Aug 2021 19:30:00 -0000</pubDate>
      <itunes:title>Notes on the fall of Afghanistan, with its cyber and kinetic implications. US State Department hack reported. ShinyHunters resurface. Further incentive to patch Microsoft Exchange Server.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1402</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Taliban consolidates control over Afghanistan, and it’s doing so online as well as on the ground. Reports say the US State Department has come under cyberattack; State says that any such incident was without significant effect. The ShinyHunters say they’ve obtained a great deal of PII from AT&amp;T, but AT&amp;T says that, whatever the crooks have, it didn’t come from AT&amp;T. Rick Howard on orchestration. Carole Theriault on women in cybersecurity - are thing getting any better? And exploitation gives organizations even more incentive to patch Microsoft Exchange server instances.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/162
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Taliban consolidates control over Afghanistan, and it’s doing so online as well as on the ground. Reports say the US State Department has come under cyberattack; State says that any such incident was without significant effect. The ShinyHunters say they’ve obtained a great deal of PII from AT&amp;T, but AT&amp;T says that, whatever the crooks have, it didn’t come from AT&amp;T. Rick Howard on orchestration. Carole Theriault on women in cybersecurity - are thing getting any better? And exploitation gives organizations even more incentive to patch Microsoft Exchange server instances.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/162</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1194</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0c888908-364d-11eb-b082-6f6fc617fcc3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7899068966.mp3?updated=1702576856" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>From board advisor to board member: evolution of the modern CISO. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/18/notes</link>
      <description>The recent frequency of ransomware attacks and heightened visibility of supply chain risks has garnered the attention of executive teams and boards of directors for companies of all sizes, across all industries. For CISOs, these recent events have significantly amplified the importance of establishing and maintaining effective relationships and lines of communication with boards of directors. CISOs are now spending more time than ever engaging, reporting, and answering to boards regarding questions around where their organization is on the cyber risk spectrum. For CISOs, this heightened risk environment presents both a challenge and an opportunity.
In this episode of CyberWire-X, guest ret. Major General Zan Vautrinot and Sponsor JM Search's Jamey Cummings joins the CyberWire's Rick Howard to discuss how today’s CISOs are challenged to develop an ever-expanding skill set to effectively execute in their role while also satisfying concerns and areas of interest of their board of directors. Jamey will also discuss how the evolving role of the CISO is unlocking opportunities for CISOs to elevate their stature, and can open the door for them to serve in board roles as companies are increasingly prioritizing information security and technology risk management skills for their directors. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 22 Aug 2021 07:00:00 -0000</pubDate>
      <itunes:title>From board advisor to board member: evolution of the modern CISO. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>18</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The recent frequency of ransomware attacks and heightened visibility of supply chain risks has garnered the attention of executive teams and boards of directors for companies of all sizes, across all industries. For CISOs, these recent events have significantly amplified the importance of establishing and maintaining effective relationships and lines of communication with boards of directors. CISOs are now spending more time than ever engaging, reporting, and answering to boards regarding questions around where their organization is on the cyber risk spectrum. For CISOs, this heightened risk environment presents both a challenge and an opportunity.
In this episode of CyberWire-X, guest ret. Major General Zan Vautrinot and Sponsor JM Search's Jamey Cummings joins the CyberWire's Rick Howard to discuss how today’s CISOs are challenged to develop an ever-expanding skill set to effectively execute in their role while also satisfying concerns and areas of interest of their board of directors. Jamey will also discuss how the evolving role of the CISO is unlocking opportunities for CISOs to elevate their stature, and can open the door for them to serve in board roles as companies are increasingly prioritizing information security and technology risk management skills for their directors. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The recent frequency of ransomware attacks and heightened visibility of supply chain risks has garnered the attention of executive teams and boards of directors for companies of all sizes, across all industries. For CISOs, these recent events have significantly amplified the importance of establishing and maintaining effective relationships and lines of communication with boards of directors. CISOs are now spending more time than ever engaging, reporting, and answering to boards regarding questions around where their organization is on the cyber risk spectrum. For CISOs, this heightened risk environment presents both a challenge and an opportunity.</p><p>In this episode of CyberWire-X, guest ret. Major General Zan Vautrinot and Sponsor JM Search's Jamey Cummings joins the CyberWire's Rick Howard to discuss how today’s CISOs are challenged to develop an ever-expanding skill set to effectively execute in their role while also satisfying concerns and areas of interest of their board of directors. Jamey will also discuss how the evolving role of the CISO is unlocking opportunities for CISOs to elevate their stature, and can open the door for them to serve in board roles as companies are increasingly prioritizing information security and technology risk management skills for their directors. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2827</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fc327afe-005f-11ec-8d8b-6b1eeb4ff62f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5736816510.mp3?updated=1629307677" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jennifer Walsmith: Pioneering and defining possible. [Cyber Solutions] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/63/notes</link>
      <description>Vice President for Cyber and Information Solutions within Mission Systems at Northrop Grumman, Jennifer Walsmith takes us on her pioneering career journey. Following in her father's footsteps at the National Security Agency, Jennifer began her career out of high school in computer systems analysis. Jennifer notes she saw the value of a college degree and at her parents' urging attended night school. She completed her bachelors in computer science at University of Maryland, Baltimore County with the support of the NSA. Jennifer talks about the support of her team at NSA where she was one of the first women to have a career and a family, raising two children while working. Upon retirement from government service, Jennifer chose an organization with values that closely matched her own and uses her position to help her team define possible where they sometimes think they can't. We thank Jennifer for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 22 Aug 2021 07:00:00 -0000</pubDate>
      <itunes:title>Jennifer Walsmith: Pioneering and defining possible. [Cyber Solutions] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>63</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Vice President for Cyber and Information Solutions within Mission Systems at Northrop Grumman, Jennifer Walsmith takes us on her pioneering career journey. </itunes:subtitle>
      <itunes:summary>Vice President for Cyber and Information Solutions within Mission Systems at Northrop Grumman, Jennifer Walsmith takes us on her pioneering career journey. Following in her father's footsteps at the National Security Agency, Jennifer began her career out of high school in computer systems analysis. Jennifer notes she saw the value of a college degree and at her parents' urging attended night school. She completed her bachelors in computer science at University of Maryland, Baltimore County with the support of the NSA. Jennifer talks about the support of her team at NSA where she was one of the first women to have a career and a family, raising two children while working. Upon retirement from government service, Jennifer chose an organization with values that closely matched her own and uses her position to help her team define possible where they sometimes think they can't. We thank Jennifer for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Vice President for Cyber and Information Solutions within Mission Systems at Northrop Grumman, Jennifer Walsmith takes us on her pioneering career journey. Following in her father's footsteps at the National Security Agency, Jennifer began her career out of high school in computer systems analysis. Jennifer notes she saw the value of a college degree and at her parents' urging attended night school. She completed her bachelors in computer science at University of Maryland, Baltimore County with the support of the NSA. Jennifer talks about the support of her team at NSA where she was one of the first women to have a career and a family, raising two children while working. Upon retirement from government service, Jennifer chose an organization with values that closely matched her own and uses her position to help her team define possible where they sometimes think they can't. We thank Jennifer for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>459</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eeb523d2-005e-11ec-bb1c-c79f773155ba]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9078245495.mp3?updated=1629299980" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exploring vulnerabilities of off-the-shelf software. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/197/notes</link>
      <description>Guest Tomislav Peričin, Reversing Labs' Chief Software Architect and Co-Founder, joins Dave to discuss his team's research that addresses the importance of validating third-party software components as a way to manage the risks that they can introduce. Developing software solutions is a complex task requiring a lot of time and resources. In order to accelerate time to market and reduce the cost, software developers create smaller pieces of functional code which can be reused across many projects. The concept of code reuse is one of the cornerstones of modern software engineering and it is universally accepted that everybody should strive towards it. However, in addition to the positives, organizations need to be aware of the security risks introduced by such third-party components.
The growing number of cyber incidents that target the software supply chain are focused on high-value target compromises. With the latest surge and public uproar, the US President Biden has issued the Executive Order on Improving the Nation’s Cybersecurity in order to create an institutional framework addressing these kinds of security risks.
The research can be found here:
Third-party code comes with some baggage

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Aug 2021 07:00:00 -0000</pubDate>
      <itunes:title>Exploring vulnerabilities of off-the-shelf software. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>197</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Tomislav Peričin, Reversing Labs' Chief Software Architect and Co-Founder, joins Dave to discuss his team's research that addresses the importance of validating third-party software components as a way to manage the risks that they can introduce. Developing software solutions is a complex task requiring a lot of time and resources. In order to accelerate time to market and reduce the cost, software developers create smaller pieces of functional code which can be reused across many projects. The concept of code reuse is one of the cornerstones of modern software engineering and it is universally accepted that everybody should strive towards it. However, in addition to the positives, organizations need to be aware of the security risks introduced by such third-party components.
The growing number of cyber incidents that target the software supply chain are focused on high-value target compromises. With the latest surge and public uproar, the US President Biden has issued the Executive Order on Improving the Nation’s Cybersecurity in order to create an institutional framework addressing these kinds of security risks.
The research can be found here:
Third-party code comes with some baggage

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Tomislav Peričin, Reversing Labs' Chief Software Architect and Co-Founder, joins Dave to discuss his team's research that addresses the importance of validating third-party software components as a way to manage the risks that they can introduce. Developing software solutions is a complex task requiring a lot of time and resources. In order to accelerate time to market and reduce the cost, software developers create smaller pieces of functional code which can be reused across many projects. The concept of code reuse is one of the cornerstones of modern software engineering and it is universally accepted that everybody should strive towards it. However, in addition to the positives, organizations need to be aware of the security risks introduced by such third-party components.</p><p>The growing number of cyber incidents that target the software supply chain are focused on high-value target compromises. With the latest surge and public uproar, the US President Biden has issued the Executive Order on Improving the Nation’s Cybersecurity in order to create an institutional framework addressing these kinds of security risks.</p><p>The research can be found here:</p><ul><li><a href="https://blog.secure.software/third-party-code-comes-with-some-baggage">Third-party code comes with some baggage</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>975</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1a53a78e-005f-11ec-a557-9717e726a8d1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1228030154.mp3?updated=1685126312" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Warm wallet pilferage. Advice on reducing the ransomware risk. Regulatory action in the T-Mobile breach. China’s privacy law. FTC refiles monopoly complaint against Facebook. Better MICE traps?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1401/notes</link>
      <description>Pilferage reported from Liquid Global’s alt-coin warm wallets. CISA offers advice on reducing the risk of ransomware. The FCC is looking into the T-Mobile breach, and Moody’s raises questions about the telco’s risk management. China passes its own version of GDPR. The FTC refiles its monopoly complaint against Facebook. Caleb Barlow on 3rd Party Breach Notifications and finding out if your information is being traded on the dark web. Rick Howard speaks with hash table member Zan Vautrinot about serving on boards. And the FBI warns that insiders can be recruited for industrial espionage.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/161
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 20 Aug 2021 19:30:00 -0000</pubDate>
      <itunes:title>Warm wallet pilferage. Advice on reducing the ransomware risk. Regulatory action in the T-Mobile breach. China’s privacy law. FTC refiles monopoly complaint against Facebook. Better MICE traps?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1401</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Pilferage reported from Liquid Global’s alt-coin warm wallets. CISA offers advice on reducing the risk of ransomware. The FCC is looking into the T-Mobile breach, and Moody’s raises questions about the telco’s risk management. China passes its own version of GDPR. The FTC refiles its monopoly complaint against Facebook. Caleb Barlow on 3rd Party Breach Notifications and finding out if your information is being traded on the dark web. Rick Howard speaks with hash table member Zan Vautrinot about serving on boards. And the FBI warns that insiders can be recruited for industrial espionage.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/161
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Pilferage reported from Liquid Global’s alt-coin warm wallets. CISA offers advice on reducing the risk of ransomware. The FCC is looking into the T-Mobile breach, and Moody’s raises questions about the telco’s risk management. China passes its own version of GDPR. The FTC refiles its monopoly complaint against Facebook. Caleb Barlow on 3rd Party Breach Notifications and finding out if your information is being traded on the dark web. Rick Howard speaks with hash table member Zan Vautrinot about serving on boards. And the FBI warns that insiders can be recruited for industrial espionage.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/161</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1517</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0b08e302-364d-11eb-b082-4f060491e1b3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8211482618.mp3?updated=1702576924" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>T-Mobile outlines what it’s offering customers hit by its data breach. Taliban on good T&amp;C behavior? Apple’s CSAM. OS bug may affect medical devices. A report on 2020’s US Census Bureau hack.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1400/notes</link>
      <description>T-Mobile describes what it intends to do for those who may have been affected by its big data breach. The Taliban is taking care not to get banned from social media. Apple defends its CSAM measures against a technical objection, but advocacy groups see a slippery policy slope. The US FDA warns of vulnerabilities in an OS used by medical devices. A report on a 2020 incident at the US Census Bureau. David Dufour shares a few surprises from Webroot’s 2021 Threat Report. Our guest is Brandon Hoffman from Intel 471 on cybercriminals creating turbulence for the transportation industry. And a Bitcoin tumbler cops a guilty plea.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/160
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 19 Aug 2021 19:30:00 -0000</pubDate>
      <itunes:title>T-Mobile outlines what it’s offering customers hit by its data breach. Taliban on good T&amp;C behavior? Apple’s CSAM. OS bug may affect medical devices. A report on 2020’s US Census Bureau hack.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1400</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>T-Mobile describes what it intends to do for those who may have been affected by its big data breach. The Taliban is taking care not to get banned from social media. Apple defends its CSAM measures against a technical objection, but advocacy groups see a slippery policy slope. The US FDA warns of vulnerabilities in an OS used by medical devices. A report on a 2020 incident at the US Census Bureau. David Dufour shares a few surprises from Webroot’s 2021 Threat Report. Our guest is Brandon Hoffman from Intel 471 on cybercriminals creating turbulence for the transportation industry. And a Bitcoin tumbler cops a guilty plea.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/160
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>T-Mobile describes what it intends to do for those who may have been affected by its big data breach. The Taliban is taking care not to get banned from social media. Apple defends its CSAM measures against a technical objection, but advocacy groups see a slippery policy slope. The US FDA warns of vulnerabilities in an OS used by medical devices. A report on a 2020 incident at the US Census Bureau. David Dufour shares a few surprises from Webroot’s 2021 Threat Report. Our guest is Brandon Hoffman from Intel 471 on cybercriminals creating turbulence for the transportation industry. And a Bitcoin tumbler cops a guilty plea.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/160</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1510</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0b4ab264-364d-11eb-b082-eb6b4a883ac1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1895931128.mp3?updated=1702576978" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Taliban seizes HIIDE devices. T-Mobile customer data compromised. Ransomware attack against Brazil’s Treasury. Social engineering espionage. Ransomware vs. sewers. IoT bug disclosed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1399/notes</link>
      <description>The Taliban now has, among other things, a lot of biometric devices. T-Mobile concludes that some customer data were compromised in last week’s incident. InkySquid’s in the watering hole. Brazil’s Treasury sustained, and says it contained, a ransomware attack. Siamese Kitten’s social engineering on behalf of Tehran. Sewage systems hacked in rural Maine. Josh Ray from Accenture Security on what nation state adversaries may have learned from observing the events surrounding Colonial pipeline. Our guest Manish Gupta from ShiftLeft looks at issues with the Software Bill of Materials. And an IoT vulnerability is disclosed, and mitigations are recommended.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/159
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 18 Aug 2021 19:45:00 -0000</pubDate>
      <itunes:title>Taliban seizes HIIDE devices. T-Mobile customer data compromised. Ransomware attack against Brazil’s Treasury. Social engineering espionage. Ransomware vs. sewers. IoT bug disclosed.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1399</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Taliban now has, among other things, a lot of biometric devices. T-Mobile concludes that some customer data were compromised in last week’s incident. InkySquid’s in the watering hole. Brazil’s Treasury sustained, and says it contained, a ransomware attack. Siamese Kitten’s social engineering on behalf of Tehran. Sewage systems hacked in rural Maine. Josh Ray from Accenture Security on what nation state adversaries may have learned from observing the events surrounding Colonial pipeline. Our guest Manish Gupta from ShiftLeft looks at issues with the Software Bill of Materials. And an IoT vulnerability is disclosed, and mitigations are recommended.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/159
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Taliban now has, among other things, a lot of biometric devices. T-Mobile concludes that some customer data were compromised in last week’s incident. InkySquid’s in the watering hole. Brazil’s Treasury sustained, and says it contained, a ransomware attack. Siamese Kitten’s social engineering on behalf of Tehran. Sewage systems hacked in rural Maine. Josh Ray from Accenture Security on what nation state adversaries may have learned from observing the events surrounding Colonial pipeline. Our guest Manish Gupta from ShiftLeft looks at issues with the Software Bill of Materials. And an IoT vulnerability is disclosed, and mitigations are recommended.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/159</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1448</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0bb4a8ae-364d-11eb-b082-03caf8675532]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2479151718.mp3?updated=1702576981" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Consequence of the Taliban victory for influence operations and information security. Privateering gangs described. Data exposures, data compromises.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1398/notes</link>
      <description>Al Qaeda online sources cheer the Taliban’s ascendancy. The new rulers of Afghanistan are likely to have acquired a good deal of sensitive data along with political rule and a quantity of US-supplied military equipment. Terrorist watchlist data were found in an exposed server (now taken offline). Connections between gangland and Russian intelligence. T-Mobile was hacked, but it’s unclear what if any data were compromised. Joe Carrigan on FlyTrap Android Malware Compromising Thousands of Facebook Accounts. Our guest is Liam O’Murchu from Symantec on what keeps him up at night. And some personal information was exposed in the Colonial Pipeline incident.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/158
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Aug 2021 19:20:00 -0000</pubDate>
      <itunes:title>Consequence of the Taliban victory for influence operations and information security. Privateering gangs described. Data exposures, data compromises.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1398</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Al Qaeda online sources cheer the Taliban’s ascendancy. The new rulers of Afghanistan are likely to have acquired a good deal of sensitive data along with political rule and a quantity of US-supplied military equipment. Terrorist watchlist data were found in an exposed server (now taken offline). Connections between gangland and Russian intelligence. T-Mobile was hacked, but it’s unclear what if any data were compromised. Joe Carrigan on FlyTrap Android Malware Compromising Thousands of Facebook Accounts. Our guest is Liam O’Murchu from Symantec on what keeps him up at night. And some personal information was exposed in the Colonial Pipeline incident.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/158
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Al Qaeda online sources cheer the Taliban’s ascendancy. The new rulers of Afghanistan are likely to have acquired a good deal of sensitive data along with political rule and a quantity of US-supplied military equipment. Terrorist watchlist data were found in an exposed server (now taken offline). Connections between gangland and Russian intelligence. T-Mobile was hacked, but it’s unclear what if any data were compromised. Joe Carrigan on FlyTrap Android Malware Compromising Thousands of Facebook Accounts. Our guest is Liam O’Murchu from Symantec on what keeps him up at night. And some personal information was exposed in the Colonial Pipeline incident.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/158</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1390</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0c01547e-364d-11eb-b082-bf8b7b73d02f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6863732393.mp3?updated=1702577142" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Possible consequences of Afghanistan’s fall to the Taliban. Non-state actors’ political motives. Poly Network rewards “Mr. White Hat.” C2C offering will check your alt-coin. Breach at T-Mobile?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1397/notes</link>
      <description>The Taliban has effectively taken control of Afghanistan, and the fall of Kabul is likely to have a quick, near-term effect on all forms of security. The Indra Group’s actions against Iranian interests suggest the potential of non-state, politically motivated actors. Crooks returned almost all the money rifled from DeFi provider Poly Network. A new C2C service tells hoods if their alt-coin is clean. DeepBlueMagic is a new strain of ransomware. Chris Novak of Verizon on advancing incident response. Rick Howard is taking on Orchestration in this week’s CSO Perspectives. And T-Mobile investigates claims of a data breach.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/157
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 16 Aug 2021 20:00:00 -0000</pubDate>
      <itunes:title>Possible consequences of Afghanistan’s fall to the Taliban. Non-state actors’ political motives. Poly Network rewards “Mr. White Hat.” C2C offering will check your alt-coin. Breach at T-Mobile?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1397</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Taliban has effectively taken control of Afghanistan, and the fall of Kabul is likely to have a quick, near-term effect on all forms of security. The Indra Group’s actions against Iranian interests suggest the potential of non-state, politically motivated actors. Crooks returned almost all the money rifled from DeFi provider Poly Network. A new C2C service tells hoods if their alt-coin is clean. DeepBlueMagic is a new strain of ransomware. Chris Novak of Verizon on advancing incident response. Rick Howard is taking on Orchestration in this week’s CSO Perspectives. And T-Mobile investigates claims of a data breach.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/157
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Taliban has effectively taken control of Afghanistan, and the fall of Kabul is likely to have a quick, near-term effect on all forms of security. The Indra Group’s actions against Iranian interests suggest the potential of non-state, politically motivated actors. Crooks returned almost all the money rifled from DeFi provider Poly Network. A new C2C service tells hoods if their alt-coin is clean. DeepBlueMagic is a new strain of ransomware. Chris Novak of Verizon on advancing incident response. Rick Howard is taking on Orchestration in this week’s CSO Perspectives. And T-Mobile investigates claims of a data breach.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/157</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1420</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0c712380-364d-11eb-b082-431f96c59fac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5825108730.mp3?updated=1702577123" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rick Howard: Give people resources. [CSO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/62/notes</link>
      <description>Chief Security Officer, Chief Analyst, and Senior Fellow at the CyberWire, Rick Howard, shares his travels through the cybersecurity job space. The son of a gold miner who began his career out of West Point in the US Army, Rick worked his way up to being the Commander of the Army's Computer Emergency Response Team. Rick moved to the commercial sector working for Bruce Schneier running Counterpane's global SOC. Rick's first CSO job was for Palo Alto Networks where he was afforded the opportunity to create the Cybersecurity Canon Hall of Fame and the Cyber Threat Alliance. Upon considering retirement, Rick called up on the CyberWire to ask about doing a podcast and he was hired on to the team. Rick shares a proud moment through a favorite story. We thank Rick for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 15 Aug 2021 07:00:00 -0000</pubDate>
      <itunes:title>Rick Howard: Give people resources. [CSO] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>62</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Chief Security Officer, Chief Analyst, and Senior Fellow at the CyberWire, Rick Howard, shares his travels through the cybersecurity job space.</itunes:subtitle>
      <itunes:summary>Chief Security Officer, Chief Analyst, and Senior Fellow at the CyberWire, Rick Howard, shares his travels through the cybersecurity job space. The son of a gold miner who began his career out of West Point in the US Army, Rick worked his way up to being the Commander of the Army's Computer Emergency Response Team. Rick moved to the commercial sector working for Bruce Schneier running Counterpane's global SOC. Rick's first CSO job was for Palo Alto Networks where he was afforded the opportunity to create the Cybersecurity Canon Hall of Fame and the Cyber Threat Alliance. Upon considering retirement, Rick called up on the CyberWire to ask about doing a podcast and he was hired on to the team. Rick shares a proud moment through a favorite story. We thank Rick for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chief Security Officer, Chief Analyst, and Senior Fellow at the CyberWire, Rick Howard, shares his travels through the cybersecurity job space. The son of a gold miner who began his career out of West Point in the US Army, Rick worked his way up to being the Commander of the Army's Computer Emergency Response Team. Rick moved to the commercial sector working for Bruce Schneier running Counterpane's global SOC. Rick's first CSO job was for Palo Alto Networks where he was afforded the opportunity to create the Cybersecurity Canon Hall of Fame and the Cyber Threat Alliance. Upon considering retirement, Rick called up on the CyberWire to ask about doing a podcast and he was hired on to the team. Rick shares a proud moment through a favorite story. We thank Rick for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>414</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[50aaf08a-fafb-11eb-826a-d3c1cd9a313c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5658956464.mp3?updated=1628723765" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>You can add new features, just secure the old stuff first. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/196/notes</link>
      <description>Guests Will Schroeder and Lee Christensen from SpecterOps join Dave to share the research they recently presented at Black Hat USA on the security of Microsoft's Active Directory Certificate Services.
Their abstract:
Microsoft’s Active Directory Public Key Infrastructure (PKI) implementation, known as Active Directory Certificate Services (AD CS), has largely flown under the radar of both the offensive and defensive communities. AD CS is widely deployed, and provides attackers opportunities for credential theft, machine persistence, domain escalation, and subtle domain persistence. We present relevant background on certificates in Active Directory, detail the abuse of AD CS through certificate theft and active malicious enrollments for user and machine persistence, discuss a set of common misconfigurations that can result in domain escalation, and explain a method for stealing a Certificate Authority’s private key in order to forge new user/machine “golden” certificates. By bringing light to the security implications of AD CS, we hope to raise awareness for both attackers and defenders alike of the security issues surrounding this complex, widely deployed, and often misunderstood system.
The blog post and white paper can be found here:

Certified Pre-Owned blog post

Certified Pre-Owned white paper


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Aug 2021 07:00:00 -0000</pubDate>
      <itunes:title>You can add new features, just secure the old stuff first. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>196</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guests Will Schroeder and Lee Christensen from SpecterOps join Dave to share the research they recently presented at Black Hat USA on the security of Microsoft's Active Directory Certificate Services.
Their abstract:
Microsoft’s Active Directory Public Key Infrastructure (PKI) implementation, known as Active Directory Certificate Services (AD CS), has largely flown under the radar of both the offensive and defensive communities. AD CS is widely deployed, and provides attackers opportunities for credential theft, machine persistence, domain escalation, and subtle domain persistence. We present relevant background on certificates in Active Directory, detail the abuse of AD CS through certificate theft and active malicious enrollments for user and machine persistence, discuss a set of common misconfigurations that can result in domain escalation, and explain a method for stealing a Certificate Authority’s private key in order to forge new user/machine “golden” certificates. By bringing light to the security implications of AD CS, we hope to raise awareness for both attackers and defenders alike of the security issues surrounding this complex, widely deployed, and often misunderstood system.
The blog post and white paper can be found here:

Certified Pre-Owned blog post

Certified Pre-Owned white paper


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guests Will Schroeder and Lee Christensen from SpecterOps join Dave to share the research they recently presented at Black Hat USA on the security of Microsoft's Active Directory Certificate Services.</p><p>Their abstract:</p><p>Microsoft’s Active Directory Public Key Infrastructure (PKI) implementation, known as Active Directory Certificate Services (AD CS), has largely flown under the radar of both the offensive and defensive communities. AD CS is widely deployed, and provides attackers opportunities for credential theft, machine persistence, domain escalation, and subtle domain persistence. We present relevant background on certificates in Active Directory, detail the abuse of AD CS through certificate theft and active malicious enrollments for user and machine persistence, discuss a set of common misconfigurations that can result in domain escalation, and explain a method for stealing a Certificate Authority’s private key in order to forge new user/machine “golden” certificates. By bringing light to the security implications of AD CS, we hope to raise awareness for both attackers and defenders alike of the security issues surrounding this complex, widely deployed, and often misunderstood system.</p><p>The blog post and white paper can be found here:</p><ul>
<li><a href="https://posts.specterops.io/certified-pre-owned-d95910965cd2">Certified Pre-Owned blog post</a></li>
<li><a href="https://www.specterops.io/assets/resources/Certified_Pre-Owned.pdf">Certified Pre-Owned white paper</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1859</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b0244adc-fada-11eb-bb65-ab9190ae47cd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6180942352.mp3?updated=1685126309" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage follows South Asian conflict. LockBit’s $50 million demand. Insider risk. Trend Micro warns unpatched Apex is under attack. PrintNightmare persists. Google and Apple on privacy. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1396/notes</link>
      <description>ReverseRat is back and better, and it’s sniffing at Afghanistan. LockBit wants $50 million from Accenture. When employees leave, do they take your data with them? (Survey, or rather, telemetry, says yes.) Unpatched Apex One instances are under active attack. PrintNightmare continues to resist patching. Google bans SafeGraph. Apple explains what’s up with iCloud privacy. Caleb Barlow wonders if ransomware payments financing criminal infrastructure in Russia. Our guest is Oliver Rochford from Securonix on the notion of cyberwar. And the SynAck ransomware gang rebrands.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/156
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 13 Aug 2021 19:30:00 -0000</pubDate>
      <itunes:title>Cyberespionage follows South Asian conflict. LockBit’s $50 million demand. Insider risk. Trend Micro warns unpatched Apex is under attack. PrintNightmare persists. Google and Apple on privacy. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1396</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>ReverseRat is back and better, and it’s sniffing at Afghanistan. LockBit wants $50 million from Accenture. When employees leave, do they take your data with them? (Survey, or rather, telemetry, says yes.) Unpatched Apex One instances are under active attack. PrintNightmare continues to resist patching. Google bans SafeGraph. Apple explains what’s up with iCloud privacy. Caleb Barlow wonders if ransomware payments financing criminal infrastructure in Russia. Our guest is Oliver Rochford from Securonix on the notion of cyberwar. And the SynAck ransomware gang rebrands.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/156
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>ReverseRat is back and better, and it’s sniffing at Afghanistan. LockBit wants $50 million from Accenture. When employees leave, do they take your data with them? (Survey, or rather, telemetry, says yes.) Unpatched Apex One instances are under active attack. PrintNightmare continues to resist patching. Google bans SafeGraph. Apple explains what’s up with iCloud privacy. Caleb Barlow wonders if ransomware payments financing criminal infrastructure in Russia. Our guest is Oliver Rochford from Securonix on the notion of cyberwar. And the SynAck ransomware gang rebrands.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/156</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1746</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0af2e73c-364d-11eb-b082-f7fc220a4c4c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2580431382.mp3?updated=1702577263" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More stolen alt-coin is returned. Accenture reports minimal effects in the alleged LockBit attack. Home routers attacked. Source code for sale? PrintNightmare exploited in the wild. Extradition cases. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1395/notes</link>
      <description>More stolen coin is returned in the case of the Poly Network cross-chain hack. Accenture says the incident it sustained had no significant effect, and the LockBit ransomware gang who claimed responsibility release some relatively anodyne files. Home routers are under attack. Crooks are offering what they claim to be Bkav source code for sale on Raidforums. Magniber weaponizes a PrintNightmare flaw. Dinah Davis from Arctic Wolf shares stats on the state of women in cyber. Our guest is Peter Voss of Aigo.ai on what’s missing in artificial intelligence. Two extradition cases proceed. And the Solarium Commission reports.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/155
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 12 Aug 2021 19:20:00 -0000</pubDate>
      <itunes:title>More stolen alt-coin is returned. Accenture reports minimal effects in the alleged LockBit attack. Home routers attacked. Source code for sale? PrintNightmare exploited in the wild. Extradition cases. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1395</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>More stolen coin is returned in the case of the Poly Network cross-chain hack. Accenture says the incident it sustained had no significant effect, and the LockBit ransomware gang who claimed responsibility release some relatively anodyne files. Home routers are under attack. Crooks are offering what they claim to be Bkav source code for sale on Raidforums. Magniber weaponizes a PrintNightmare flaw. Dinah Davis from Arctic Wolf shares stats on the state of women in cyber. Our guest is Peter Voss of Aigo.ai on what’s missing in artificial intelligence. Two extradition cases proceed. And the Solarium Commission reports.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/155
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>More stolen coin is returned in the case of the Poly Network cross-chain hack. Accenture says the incident it sustained had no significant effect, and the LockBit ransomware gang who claimed responsibility release some relatively anodyne files. Home routers are under attack. Crooks are offering what they claim to be Bkav source code for sale on Raidforums. Magniber weaponizes a PrintNightmare flaw. Dinah Davis from Arctic Wolf shares stats on the state of women in cyber. Our guest is Peter Voss of Aigo.ai on what’s missing in artificial intelligence. Two extradition cases proceed. And the Solarium Commission reports.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/155</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1567</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0b5fa5d4-364d-11eb-b082-9be113faccc8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4079069159.mp3?updated=1702577227" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A $600 million alt-coin heist. LockBit claims it hit Accenture. A false-flag cyberespionage campaign. A REvil key is posted. AlphaBay is back. Facebook takes down vaccine disinfo campaign.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1394/notes</link>
      <description>Cross-chain attack steals millions in cryptocurrency. LockBit claims to have hit Accenture, but Accenture says with negligible consequences. Emissary Panda flies a false Iranian flag. Ekranoplan posts a key for the REvil strain used against Kaseya. AlphaBay has risen from the grave, sort of. Johannes Ullrich has thoughts on resetting 2FA. Our guest is Idan Plotnik from Apiiro on their win of the 2021 RSAC Innovation Sandbox Contest. And you can’t fool us, you bought-and-paid-for influencers you: no vaccine is going to turn us into monkeys.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/154
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 11 Aug 2021 19:30:00 -0000</pubDate>
      <itunes:title>A $600 million alt-coin heist. LockBit claims it hit Accenture. A false-flag cyberespionage campaign. A REvil key is posted. AlphaBay is back. Facebook takes down vaccine disinfo campaign.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1394</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cross-chain attack steals millions in cryptocurrency. LockBit claims to have hit Accenture, but Accenture says with negligible consequences. Emissary Panda flies a false Iranian flag. Ekranoplan posts a key for the REvil strain used against Kaseya. AlphaBay has risen from the grave, sort of. Johannes Ullrich has thoughts on resetting 2FA. Our guest is Idan Plotnik from Apiiro on their win of the 2021 RSAC Innovation Sandbox Contest. And you can’t fool us, you bought-and-paid-for influencers you: no vaccine is going to turn us into monkeys.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/154
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cross-chain attack steals millions in cryptocurrency. LockBit claims to have hit Accenture, but Accenture says with negligible consequences. Emissary Panda flies a false Iranian flag. Ekranoplan posts a key for the REvil strain used against Kaseya. AlphaBay has risen from the grave, sort of. Johannes Ullrich has thoughts on resetting 2FA. Our guest is Idan Plotnik from Apiiro on their win of the 2021 RSAC Innovation Sandbox Contest. And you can’t fool us, you bought-and-paid-for influencers you: no vaccine is going to turn us into monkeys.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/154</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1632</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0b9f6ea8-364d-11eb-b082-831191cfe294]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7628203008.mp3?updated=1702577324" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A threat to release stolen proprietary data. The C2C market: division of labor and loss-leading marketing ploys. Misconfigured Salesforce Communities. Sanctions-induced headwinds for Huawei. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1393/notes</link>
      <description>RansomEXX threatens to release stolen proprietary data. Some looks at the C2C market, the criminal division of labor, and a splashy carder marketing ploy. Misconfigured Salesforce Communities expose organizational data. Our guest is Ron Brash from Verve International on a CISA advisory regarding GE ICS equipment. Ben Yelin on the proposed U.S. Bureau of Cyber Statistics. Huawei faces sanctions-induced headwinds. Mexico’s investigation of Pegasus abuse continues, but so far without arrests or resignations.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/153
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Aug 2021 20:49:25 -0000</pubDate>
      <itunes:title>A threat to release stolen proprietary data. The C2C market: division of labor and loss-leading marketing ploys. Misconfigured Salesforce Communities. Sanctions-induced headwinds for Huawei. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1393</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>RansomEXX threatens to release stolen proprietary data. Some looks at the C2C market, the criminal division of labor, and a splashy carder marketing ploy. Misconfigured Salesforce Communities expose organizational data. Our guest is Ron Brash from Verve International on a CISA advisory regarding GE ICS equipment. Ben Yelin on the proposed U.S. Bureau of Cyber Statistics. Huawei faces sanctions-induced headwinds. Mexico’s investigation of Pegasus abuse continues, but so far without arrests or resignations.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/153
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>RansomEXX threatens to release stolen proprietary data. Some looks at the C2C market, the criminal division of labor, and a splashy carder marketing ploy. Misconfigured Salesforce Communities expose organizational data. Our guest is Ron Brash from Verve International on a CISA advisory regarding GE ICS equipment. Ben Yelin on the proposed U.S. Bureau of Cyber Statistics. Huawei faces sanctions-induced headwinds. Mexico’s investigation of Pegasus abuse continues, but so far without arrests or resignations.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/153</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1657</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0c18255a-364d-11eb-b082-1b5ff4118e98]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7468550022.mp3?updated=1702577318" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Home router vulnerabilities exploited in the wild. ACSC warns of a LockBit spike in LockBit. Flytrap Android Trojan is out. SCADA recon. Child protection. Wiretaps and social media.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1392/notes</link>
      <description>Home router vulnerabilities exploited in the wild. ACSC warns of a spike in LockBit ransomware attacks. The Flytrap Android Trojan is still concealed in malicious apps. An unidentified threat actor has been prospecting SCADA systems in Southeast Asia. Rick Howard checks in with the Hash Table about Backups. Mike Benjamin from Lotus Labs on watering hole attacks. Apple’s new child protection measures attract skepticism from privacy hawks. Wiretaps extended to social media. And using three random words for your password.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/152
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 09 Aug 2021 21:00:00 -0000</pubDate>
      <itunes:title>Home router vulnerabilities exploited in the wild. ACSC warns of a LockBit spike in LockBit. Flytrap Android Trojan is out. SCADA recon. Child protection. Wiretaps and social media.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1392</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Home router vulnerabilities exploited in the wild. ACSC warns of a spike in LockBit ransomware attacks. The Flytrap Android Trojan is still concealed in malicious apps. An unidentified threat actor has been prospecting SCADA systems in Southeast Asia. Rick Howard checks in with the Hash Table about Backups. Mike Benjamin from Lotus Labs on watering hole attacks. Apple’s new child protection measures attract skepticism from privacy hawks. Wiretaps extended to social media. And using three random words for your password.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/152
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Home router vulnerabilities exploited in the wild. ACSC warns of a spike in LockBit ransomware attacks. The Flytrap Android Trojan is still concealed in malicious apps. An unidentified threat actor has been prospecting SCADA systems in Southeast Asia. Rick Howard checks in with the Hash Table about Backups. Mike Benjamin from Lotus Labs on watering hole attacks. Apple’s new child protection measures attract skepticism from privacy hawks. Wiretaps extended to social media. And using three random words for your password.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/152</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1417</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0c57671a-364d-11eb-b082-8b80f2ad54e6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5853984128.mp3?updated=1702577318" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Alyssa Miller: We have to elevate others. [BISO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/61/notes</link>
      <description>Business Information Security Officer at S&amp;P Global Ratings, Alyssa Miller, joins us to talk about her journey to become a champion to create a welcoming nature and acceptance of diversity in the cybersecurity community. Starting her first full-time tech position while still in college, Alyssa noted the culture shock being in both worlds. Entering as a programmer and then moving to pen testing where she got her start in security, Alyssa grew into a leader who is committed to elevating those around her. Some stumbling blocks along the way gave her pause and helped point her in her current role where Alyssa works to bring more diverse views to improve the problem-solving in the space, something she sees as a key to success for the industry. We thank Alyssa for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 08 Aug 2021 07:00:00 -0000</pubDate>
      <itunes:title>Alyssa Miller: We have to elevate others. [BISO] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>61</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Business Information Security Officer at S&amp;P Global Ratings, Alyssa Miller, joins us to talk about her journey to become a champion for the cybersecurity community. </itunes:subtitle>
      <itunes:summary>Business Information Security Officer at S&amp;P Global Ratings, Alyssa Miller, joins us to talk about her journey to become a champion to create a welcoming nature and acceptance of diversity in the cybersecurity community. Starting her first full-time tech position while still in college, Alyssa noted the culture shock being in both worlds. Entering as a programmer and then moving to pen testing where she got her start in security, Alyssa grew into a leader who is committed to elevating those around her. Some stumbling blocks along the way gave her pause and helped point her in her current role where Alyssa works to bring more diverse views to improve the problem-solving in the space, something she sees as a key to success for the industry. We thank Alyssa for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Business Information Security Officer at S&amp;P Global Ratings, Alyssa Miller, joins us to talk about her journey to become a champion to create a welcoming nature and acceptance of diversity in the cybersecurity community. Starting her first full-time tech position while still in college, Alyssa noted the culture shock being in both worlds. Entering as a programmer and then moving to pen testing where she got her start in security, Alyssa grew into a leader who is committed to elevating those around her. Some stumbling blocks along the way gave her pause and helped point her in her current role where Alyssa works to bring more diverse views to improve the problem-solving in the space, something she sees as a key to success for the industry. We thank Alyssa for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>449</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c5b994c0-f610-11eb-a389-0f690159c1b9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4717946091.mp3?updated=1628179306" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SideCopy malware campaigns expand and evolve. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/195/notes</link>
      <description>Guest Asheer Malhotra, Threat Researcher of Cisco Talos Intelligence Group, joins Dave to discuss his team's research "InSideCopy: How this APT continues to evolve its arsenal." Cisco Talos has observed an expansion in the activity of SideCopy malware campaigns, targeting entities in India. In the past, the attackers have used malicious LNK files and documents to distribute their staple C#-based RAT. We are calling this malware "CetaRAT." SideCopy also relies heavily on the use of Allakore RAT, a publicly available Delphi-based RAT.
Recent activity from the group, however, signals a boost in their development operations. Talos has discovered multiple new RAT families and plugins currently used in SideCopy infection chains.
Targeting tactics and themes observed in SideCopy campaigns indicate a high degree of similarity to the Transparent Tribe APT (aka APT36) also targeting India. These include using decoys posing as operational documents belonging to the military and think tanks and honeytrap-based infections.
The research can be found here:

InSideCopy: How this APT continues to evolve its arsenal blog post

InSideCopy: How this APT continues to evolve its arsenal report


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Aug 2021 07:00:00 -0000</pubDate>
      <itunes:title>SideCopy malware campaigns expand and evolve. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>195</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Asheer Malhotra, Threat Researcher of Cisco Talos Intelligence Group, joins Dave to discuss his team's research "InSideCopy: How this APT continues to evolve its arsenal." Cisco Talos has observed an expansion in the activity of SideCopy malware campaigns, targeting entities in India. In the past, the attackers have used malicious LNK files and documents to distribute their staple C#-based RAT. We are calling this malware "CetaRAT." SideCopy also relies heavily on the use of Allakore RAT, a publicly available Delphi-based RAT.
Recent activity from the group, however, signals a boost in their development operations. Talos has discovered multiple new RAT families and plugins currently used in SideCopy infection chains.
Targeting tactics and themes observed in SideCopy campaigns indicate a high degree of similarity to the Transparent Tribe APT (aka APT36) also targeting India. These include using decoys posing as operational documents belonging to the military and think tanks and honeytrap-based infections.
The research can be found here:

InSideCopy: How this APT continues to evolve its arsenal blog post

InSideCopy: How this APT continues to evolve its arsenal report


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Asheer Malhotra, Threat Researcher of Cisco Talos Intelligence Group, joins Dave to discuss his team's research "InSideCopy: How this APT continues to evolve its arsenal." Cisco Talos has observed an expansion in the activity of SideCopy malware campaigns, targeting entities in India. In the past, the attackers have used malicious LNK files and documents to distribute their staple C#-based RAT. We are calling this malware "CetaRAT." SideCopy also relies heavily on the use of Allakore RAT, a publicly available Delphi-based RAT.</p><p>Recent activity from the group, however, signals a boost in their development operations. Talos has discovered multiple new RAT families and plugins currently used in SideCopy infection chains.</p><p>Targeting tactics and themes observed in SideCopy campaigns indicate a high degree of similarity to the Transparent Tribe APT (aka APT36) also targeting India. These include using decoys posing as operational documents belonging to the military and think tanks and honeytrap-based infections.</p><p>The research can be found here:</p><ul>
<li><a href="https://blog.talosintelligence.com/2021/07/sidecopy.html">InSideCopy: How this APT continues to evolve its arsenal blog post</a></li>
<li><a href="https://s3.amazonaws.com/talos-intelligence-site/production/document_files/files/000/095/591/original/062521_SideCopy_%281%29.pdf?1625657388">InSideCopy: How this APT continues to evolve its arsenal report</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1203</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e8a39f6c-f548-11eb-a584-63e064248a8a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5174149592.mp3?updated=1685126297" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FTC warns of smishing targeting the unemployed. Initial access: buying it one way or another. Is the criminal gig economy vulnerable? Ransomware continues to hit healthcare.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1391/notes</link>
      <description>Smishing campaigns are seeking to exploit the unemployed. Initial access brokers seem not to have missed a beat, although some gangs are seeking to bypass them by trolling for rogue insiders. Are criminal enterprises vulnerable on the gig economy front? Criminal affiliates are disgruntled--good. Clearly, healthcare isn’t off the target list. Thomas Etheridge from CrowdStrike on eCrime Extortion. Chris Jacobs from ThreatQuotient joins us with a look back at BlackHat. Anup Gosh from Fidelis Cybersecurity, with insights on active defense.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/151
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 06 Aug 2021 20:15:00 -0000</pubDate>
      <itunes:title>FTC warns of smishing targeting the unemployed. Initial access: buying it one way or another. Is the criminal gig economy vulnerable? Ransomware continues to hit healthcare.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1391</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Smishing campaigns are seeking to exploit the unemployed. Initial access brokers seem not to have missed a beat, although some gangs are seeking to bypass them by trolling for rogue insiders. Are criminal enterprises vulnerable on the gig economy front? Criminal affiliates are disgruntled--good. Clearly, healthcare isn’t off the target list. Thomas Etheridge from CrowdStrike on eCrime Extortion. Chris Jacobs from ThreatQuotient joins us with a look back at BlackHat. Anup Gosh from Fidelis Cybersecurity, with insights on active defense.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/151
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Smishing campaigns are seeking to exploit the unemployed. Initial access brokers seem not to have missed a beat, although some gangs are seeking to bypass them by trolling for rogue insiders. Are criminal enterprises vulnerable on the gig economy front? Criminal affiliates are disgruntled--good. Clearly, healthcare isn’t off the target list. Thomas Etheridge from CrowdStrike on eCrime Extortion. Chris Jacobs from ThreatQuotient joins us with a look back at BlackHat. Anup Gosh from Fidelis Cybersecurity, with insights on active defense.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/151</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1872</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0addebde-364d-11eb-b082-2359749330e2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8304991092.mp3?updated=1702577493" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA’s new Joint Cyber Defense Collaborative. C2C market update: Prometheus TDS and Prophet Spider. And naiveté about a gang’s reform, or optimism over signs the gang is worried?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1390/notes</link>
      <description>CISA announces a new public-private cybersecurity initiative. Prometheus TDS and Prophet Spider take their places in the C2C market. The money points to BlackMatter being a rebranded DarkSide. Andrea Little Limbago from Interos on Divergent trends of federal data privacy laws and government surveillance. Tonia Dudley from CoFense checks in from the BlackHat show floor. Our guest is Simon Maple from Snyk with a look at Cloud Native Application Security. And where some see naiveté, others see cautious optimism about putting fear in the hearts of ransomware gangs.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/150
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 05 Aug 2021 20:20:00 -0000</pubDate>
      <itunes:title>CISA’s new Joint Cyber Defense Collaborative. C2C market update: Prometheus TDS and Prophet Spider. And naiveté about a gang’s reform, or optimism over signs the gang is worried?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1390</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA announces a new public-private cybersecurity initiative. Prometheus TDS and Prophet Spider take their places in the C2C market. The money points to BlackMatter being a rebranded DarkSide. Andrea Little Limbago from Interos on Divergent trends of federal data privacy laws and government surveillance. Tonia Dudley from CoFense checks in from the BlackHat show floor. Our guest is Simon Maple from Snyk with a look at Cloud Native Application Security. And where some see naiveté, others see cautious optimism about putting fear in the hearts of ransomware gangs.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/150
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA announces a new public-private cybersecurity initiative. Prometheus TDS and Prophet Spider take their places in the C2C market. The money points to BlackMatter being a rebranded DarkSide. Andrea Little Limbago from Interos on Divergent trends of federal data privacy laws and government surveillance. Tonia Dudley from CoFense checks in from the BlackHat show floor. Our guest is Simon Maple from Snyk with a look at Cloud Native Application Security. And where some see naiveté, others see cautious optimism about putting fear in the hearts of ransomware gangs.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/150</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1558</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0b74df30-364d-11eb-b082-cf98cb613ccf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8057388340.mp3?updated=1702577370" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Espionage phishing in unfamiliar places. OT vulnerabilities. LemonDuck’s rising fortunes. Data exposure. Kubernetes advice from NSA and CISA. Meng Wanzhou’s extradition.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1389/notes</link>
      <description>APT31 casts its net into some waters that aren’t yet phished out. Vulnerabilities in the NicheStack TCP/IP stack are reported. LemonDuck may be outgrowing its beginnings as a cryptojacking botnet. A large marketing database is found exposed. NSA and CISA offer advice on securing Kubernetes clusters. Adam Darrah from ZeroFox checks in from the floor at BlackHat. Our guests are Nic Fillingham and Natalia Godyla from Microsoft’s Security Unlocked podcast. David Dufour from Webroot on the hidden costs of ransomware. And Huawei’s CFO returns to court as her extradition hearings enter their endgame.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/149
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 04 Aug 2021 20:10:00 -0000</pubDate>
      <itunes:title>Espionage phishing in unfamiliar places. OT vulnerabilities. LemonDuck’s rising fortunes. Data exposure. Kubernetes advice from NSA and CISA. Meng Wanzhou’s extradition.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1389</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>APT31 casts its net into some waters that aren’t yet phished out. Vulnerabilities in the NicheStack TCP/IP stack are reported. LemonDuck may be outgrowing its beginnings as a cryptojacking botnet. A large marketing database is found exposed. NSA and CISA offer advice on securing Kubernetes clusters. Adam Darrah from ZeroFox checks in from the floor at BlackHat. Our guests are Nic Fillingham and Natalia Godyla from Microsoft’s Security Unlocked podcast. David Dufour from Webroot on the hidden costs of ransomware. And Huawei’s CFO returns to court as her extradition hearings enter their endgame.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/149
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>APT31 casts its net into some waters that aren’t yet phished out. Vulnerabilities in the NicheStack TCP/IP stack are reported. LemonDuck may be outgrowing its beginnings as a cryptojacking botnet. A large marketing database is found exposed. NSA and CISA offer advice on securing Kubernetes clusters. Adam Darrah from ZeroFox checks in from the floor at BlackHat. Our guests are Nic Fillingham and Natalia Godyla from Microsoft’s Security Unlocked podcast. David Dufour from Webroot on the hidden costs of ransomware. And Huawei’s CFO returns to court as her extradition hearings enter their endgame.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/149</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1921</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0b89e7ae-364d-11eb-b082-f777c7e3b566]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8258328273.mp3?updated=1702577489" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Apparent ransomware disrupts Italian vaccine scheduling system. Cyberespionage compromised Southeast Asian telcos. RAT and phishing in the wild. Cybercriminals explain themselves.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1388/notes</link>
      <description>An apparent ransomware attack hits Italy’s online vaccine-scheduling service. A Chinese cyberespionage campaign hits Southeast Asian telcos enroute to high-value targets. Some strategic context for Beijing’s espionage. FatalRAT is spreading by Telegram. Crafty phishing spoofs SharePoint. Joe Carrigan has thoughts on HP's latest Threat Insights Report. Our guest is Marc Gaffan of Hysolate who reveals the “Enterprise Security Paradox”. Plus, Conversations with BlackMatter, and a look at the inside of ransomware negotiations.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/148
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Aug 2021 20:00:00 -0000</pubDate>
      <itunes:title>Apparent ransomware disrupts Italian vaccine scheduling system. Cyberespionage compromised Southeast Asian telcos. RAT and phishing in the wild. Cybercriminals explain themselves.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1388</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An apparent ransomware attack hits Italy’s online vaccine-scheduling service. A Chinese cyberespionage campaign hits Southeast Asian telcos enroute to high-value targets. Some strategic context for Beijing’s espionage. FatalRAT is spreading by Telegram. Crafty phishing spoofs SharePoint. Joe Carrigan has thoughts on HP's latest Threat Insights Report. Our guest is Marc Gaffan of Hysolate who reveals the “Enterprise Security Paradox”. Plus, Conversations with BlackMatter, and a look at the inside of ransomware negotiations.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/148
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An apparent ransomware attack hits Italy’s online vaccine-scheduling service. A Chinese cyberespionage campaign hits Southeast Asian telcos enroute to high-value targets. Some strategic context for Beijing’s espionage. FatalRAT is spreading by Telegram. Crafty phishing spoofs SharePoint. Joe Carrigan has thoughts on HP's latest Threat Insights Report. Our guest is Marc Gaffan of Hysolate who reveals the “Enterprise Security Paradox”. Plus, Conversations with BlackMatter, and a look at the inside of ransomware negotiations.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/148</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1611</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0c2d6e7e-364d-11eb-b082-f32dcc5c3907]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6797826287.mp3?updated=1702577396" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SVR was reading the US Attorneys’ emails. Deliveries still lag as South African ports reopen. EA hackers dump game source code. Another look at criminal markets. And Mr. Hushpuppi cops a plea.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1387/notes</link>
      <description>SVR may have compromised twenty-seven US Attorneys’ offices. Ransomware disruptions of a physical supply chain continue as South African ports reopen. EA hackers give up, and dump the source code they stole. Double extortion may not be paying off. A look at initial access brokers. Operation Top Dog yields indictments in an international fraud case. Rick Howard tackles enterprise backup strategies. Kevin Magee from Microsoft with lessons learned hiring multiple team members during COVID. And a decryptor for Prometheus ransomware is released.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/147
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 02 Aug 2021 20:20:00 -0000</pubDate>
      <itunes:title>SVR was reading the US Attorneys’ emails. Deliveries still lag as South African ports reopen. EA hackers dump game source code. Another look at criminal markets. And Mr. Hushpuppi cops a plea.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1387</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>SVR may have compromised twenty-seven US Attorneys’ offices. Ransomware disruptions of a physical supply chain continue as South African ports reopen. EA hackers give up, and dump the source code they stole. Double extortion may not be paying off. A look at initial access brokers. Operation Top Dog yields indictments in an international fraud case. Rick Howard tackles enterprise backup strategies. Kevin Magee from Microsoft with lessons learned hiring multiple team members during COVID. And a decryptor for Prometheus ransomware is released.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/147
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>SVR may have compromised twenty-seven US Attorneys’ offices. Ransomware disruptions of a physical supply chain continue as South African ports reopen. EA hackers give up, and dump the source code they stole. Double extortion may not be paying off. A look at initial access brokers. Operation Top Dog yields indictments in an international fraud case. Rick Howard tackles enterprise backup strategies. Kevin Magee from Microsoft with lessons learned hiring multiple team members during COVID. And a decryptor for Prometheus ransomware is released.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/147</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1596</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0c411730-364d-11eb-b082-f36da44bcc4e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3935678913.mp3?updated=1702577418" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Andrew Hammond: Understanding the plot. [Historian and Curator] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/60/notes</link>
      <description>Historian and Curator at the International Spy Museum. Dr. Andrew Hammond, shares how he came to share the history of espionage and intelligence as a career. Starting out in the Royal Air Force when 9/11 happened, Andrew found himself trying to understand what was going on in the world. Studying history and international relations gave him some perspective and led him on his career path which included an introduction to museum industry at the 9/11 Museum. After a stint in academia in the UK, Andrew found his way back to the US and eventually ended up at the International Spy Museum in Washington, DC. He said one of the "greatest parts of the job being able to engage with the artifacts" and share their stories. We thank Andrew for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 01 Aug 2021 07:00:00 -0000</pubDate>
      <itunes:title>Andrew Hammond: Understanding the plot. [Historian and Curator] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>60</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Historian and Curator at the International Spy Museum., Dr.. Andrew Hammond, shares how he came to share the history of espionage and intelligence as a career.  </itunes:subtitle>
      <itunes:summary>Historian and Curator at the International Spy Museum. Dr. Andrew Hammond, shares how he came to share the history of espionage and intelligence as a career. Starting out in the Royal Air Force when 9/11 happened, Andrew found himself trying to understand what was going on in the world. Studying history and international relations gave him some perspective and led him on his career path which included an introduction to museum industry at the 9/11 Museum. After a stint in academia in the UK, Andrew found his way back to the US and eventually ended up at the International Spy Museum in Washington, DC. He said one of the "greatest parts of the job being able to engage with the artifacts" and share their stories. We thank Andrew for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Historian and Curator at the International Spy Museum. Dr. Andrew Hammond, shares how he came to share the history of espionage and intelligence as a career. Starting out in the Royal Air Force when 9/11 happened, Andrew found himself trying to understand what was going on in the world. Studying history and international relations gave him some perspective and led him on his career path which included an introduction to museum industry at the 9/11 Museum. After a stint in academia in the UK, Andrew found his way back to the US and eventually ended up at the International Spy Museum in Washington, DC. He said one of the "greatest parts of the job being able to engage with the artifacts" and share their stories. We thank Andrew for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>381</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eaff89fe-efcd-11eb-a4d6-e3aa7b444b73]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5139313309.mp3?updated=1627494174" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Behavioral transparency – the patterns within. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/17/notes</link>
      <description>President Biden's Cyber Executive Order includes provision for a software bill of materials in government contracts. It's a critical and necessary first measure for protecting the software supply chain. To defend against cyber attacks like the ones that affected SolarWinds and Colonial Pipeline, organizations also need transparency about the way the software in their supply chain behaves–how, and with whom, that software engages in and outside of their networks.
In this episode of CyberWire-X, we explore how behavior transparency can give organizations an advantage by distinguishing between expected noise and indications of compromise..Guest and CyberWire Podcast Partner Caleb Barlow shares his insights with the CyberWire's Rick Howard, and Ben Higgins and Ted Driggs from sponsor ExtraHop offer their thoughts to the CyberWire's Dave Bittner.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 01 Aug 2021 07:00:00 -0000</pubDate>
      <itunes:title>Behavioral transparency – the patterns within. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>17</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>President Biden's Cyber Executive Order includes provision for a software bill of materials in government contracts. It's a critical and necessary first measure for protecting the software supply chain. To defend against cyber attacks like the ones that affected SolarWinds and Colonial Pipeline, organizations also need transparency about the way the software in their supply chain behaves–how, and with whom, that software engages in and outside of their networks.
In this episode of CyberWire-X, we explore how behavior transparency can give organizations an advantage by distinguishing between expected noise and indications of compromise..Guest and CyberWire Podcast Partner Caleb Barlow shares his insights with the CyberWire's Rick Howard, and Ben Higgins and Ted Driggs from sponsor ExtraHop offer their thoughts to the CyberWire's Dave Bittner.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>President Biden's Cyber Executive Order includes provision for a software bill of materials in government contracts. It's a critical and necessary first measure for protecting the software supply chain. To defend against cyber attacks like the ones that affected SolarWinds and Colonial Pipeline, organizations also need transparency about the way the software in their supply chain behaves–how, and with whom, that software engages in and outside of their networks.</p><p>In this episode of CyberWire-X, we explore how behavior transparency can give organizations an advantage by distinguishing between expected noise and indications of compromise..Guest and CyberWire Podcast Partner Caleb Barlow shares his insights with the CyberWire's Rick Howard, and Ben Higgins and Ted Driggs from sponsor ExtraHop offer their thoughts to the CyberWire's Dave Bittner.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1940</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5900173c-f0bb-11eb-9b57-cb37be912e99]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8606360207.mp3?updated=1627596203" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>China's influence grows through Digital Silk Road Initiative. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/194/notes</link>
      <description>Guest Charity Wright, Cyber Threat Intelligence Expert in Recorded Future's Insikt Group, joins Dave to discuss her research "China’s Digital Colonialism: Espionage and Repression Along the Digital Silk Road". Through the Digital Silk Road Initiative (DSR), announced in 2015, the People’s Republic of China (PRC) is building an expansive global data infrastructure and exporting surveillance technologies to dictators and illiberal regimes throughout the developing world, in some cases trading technology for access to sensitive user data and facial recognition intelligence. Domestically, China uses this type of technology to assert authority over its citizens, censor the media, quell protests, and systematically oppress religious minorities. Now, over 80 countries are enabled to do the same with Chinese surveillance technology.
The research can be found here:
China’s Digital Colonialism: Espionage and Repression Along the Digital Silk Road

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 31 Jul 2021 07:00:00 -0000</pubDate>
      <itunes:title>China's influence grows through Digital Silk Road Initiative. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>194</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Charity Wright, Cyber Threat Intelligence Expert in Recorded Future's Insikt Group, joins Dave to discuss her research "China’s Digital Colonialism: Espionage and Repression Along the Digital Silk Road". Through the Digital Silk Road Initiative (DSR), announced in 2015, the People’s Republic of China (PRC) is building an expansive global data infrastructure and exporting surveillance technologies to dictators and illiberal regimes throughout the developing world, in some cases trading technology for access to sensitive user data and facial recognition intelligence. Domestically, China uses this type of technology to assert authority over its citizens, censor the media, quell protests, and systematically oppress religious minorities. Now, over 80 countries are enabled to do the same with Chinese surveillance technology.
The research can be found here:
China’s Digital Colonialism: Espionage and Repression Along the Digital Silk Road

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Charity Wright, Cyber Threat Intelligence Expert in Recorded Future's Insikt Group, joins Dave to discuss her research "China’s Digital Colonialism: Espionage and Repression Along the Digital Silk Road". Through the Digital Silk Road Initiative (DSR), announced in 2015, the People’s Republic of China (PRC) is building an expansive global data infrastructure and exporting surveillance technologies to dictators and illiberal regimes throughout the developing world, in some cases trading technology for access to sensitive user data and facial recognition intelligence. Domestically, China uses this type of technology to assert authority over its citizens, censor the media, quell protests, and systematically oppress religious minorities. Now, over 80 countries are enabled to do the same with Chinese surveillance technology.</p><p>The research can be found here:</p><ul><li><a href="https://www.recordedfuture.com/china-digital-colonialism-espionage-silk-road/">China’s Digital Colonialism: Espionage and Repression Along the Digital Silk Road</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1195</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04e020d8-f09e-11eb-a3f9-b7470326b73f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7092280224.mp3?updated=1685126288" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Multiple Cozy Bear sightings (at least the bear tracks). Spyware in a Chinese employee benefits app. Phishing campaigns. DoppelPaymer rebrands. And ignore that bot--it hasn’t been watching you surf.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1386/notes</link>
      <description>Cozy Bear’s active command-and-control servers are found, and people conclude that Moscow’s not too worried about American retaliation after all. Spyware found in an app for companies doing business in China. What to make (and not make) of the Iranian documents Sky News received. Phishing with Crimean bait. HTML smuggling may be enjoying a moderate surge. DoppelPaymer rebrands. Andrea Little Limbago from Interos on growing the next-gen of cyber. Our guest is Jamil Jaffer from IronNet Cybersecurity protecting the BlackHat Network Operations Center. And good news--that blackmailing bot really doesn’t know what you did this summer.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/146
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 30 Jul 2021 20:30:00 -0000</pubDate>
      <itunes:title>Multiple Cozy Bear sightings (at least the bear tracks). Spyware in a Chinese employee benefits app. Phishing campaigns. DoppelPaymer rebrands. And ignore that bot--it hasn’t been watching you surf.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1386</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cozy Bear’s active command-and-control servers are found, and people conclude that Moscow’s not too worried about American retaliation after all. Spyware found in an app for companies doing business in China. What to make (and not make) of the Iranian documents Sky News received. Phishing with Crimean bait. HTML smuggling may be enjoying a moderate surge. DoppelPaymer rebrands. Andrea Little Limbago from Interos on growing the next-gen of cyber. Our guest is Jamil Jaffer from IronNet Cybersecurity protecting the BlackHat Network Operations Center. And good news--that blackmailing bot really doesn’t know what you did this summer.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/146
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cozy Bear’s active command-and-control servers are found, and people conclude that Moscow’s not too worried about American retaliation after all. Spyware found in an app for companies doing business in China. What to make (and not make) of the Iranian documents Sky News received. Phishing with Crimean bait. HTML smuggling may be enjoying a moderate surge. DoppelPaymer rebrands. Andrea Little Limbago from Interos on growing the next-gen of cyber. Our guest is Jamil Jaffer from IronNet Cybersecurity protecting the BlackHat Network Operations Center. And good news--that blackmailing bot really doesn’t know what you did this summer.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/146</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1587</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0ac8ae36-364d-11eb-b082-c7e4dd65ba59]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1224218533.mp3?updated=1702654207" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Public Wi-Fi advice from NSA. South African ports recover from ransomware. Iranian rail incident was a wiper attack. Developments in the criminal-to-criminal market. Intercept vendors under scrutiny.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1385/notes</link>
      <description>Advice on WiFi security from NSA. South African ports are recovering from their ransomware attack. The attack on Iranian railroads was a wiper, of unknown origin and uncertain purpose. Developments in the criminal-to-criminal market. Israel undertakes an investigation of NSO Group. Josh Ray from Accenture Security on the road back to the office. Our guest is Duncan Godfrey from Auth0 with insights on managing digital identities. And a bad password is revealed on an open mic during an Olympic broadcast.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/145
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 29 Jul 2021 20:10:00 -0000</pubDate>
      <itunes:title>Public Wi-Fi advice from NSA. South African ports recover from ransomware. Iranian rail incident was a wiper attack. Developments in the criminal-to-criminal market. Intercept vendors under scrutiny.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1385</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Advice on WiFi security from NSA. South African ports are recovering from their ransomware attack. The attack on Iranian railroads was a wiper, of unknown origin and uncertain purpose. Developments in the criminal-to-criminal market. Israel undertakes an investigation of NSO Group. Josh Ray from Accenture Security on the road back to the office. Our guest is Duncan Godfrey from Auth0 with insights on managing digital identities. And a bad password is revealed on an open mic during an Olympic broadcast.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/145
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Advice on WiFi security from NSA. South African ports are recovering from their ransomware attack. The attack on Iranian railroads was a wiper, of unknown origin and uncertain purpose. Developments in the criminal-to-criminal market. Israel undertakes an investigation of NSO Group. Josh Ray from Accenture Security on the road back to the office. Our guest is Duncan Godfrey from Auth0 with insights on managing digital identities. And a bad password is revealed on an open mic during an Olympic broadcast.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/145</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1626</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0a1123e2-364d-11eb-b082-c77788163f1c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4423115582.mp3?updated=1702654215" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US ICS Cybersecurity Initiative formalized. Developments in the ransomware world. Addressing known vulnerabilities. Caucasus coinmining crackdown. A long-running IRGC catphishing campaign.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1384/notes</link>
      <description>US formally establishes its Industrial Control System Cybersecurity Initiative. Shooting wars in cyberspace. Developments in the ransomware criminal souks. This week’s iOS update may have closed the vulnerability exploited by NSO Group’s Pegasus intercept tool. The US, UK, and Australia issue a joint advisory on the most exploited vulnerabilities. Abkhazia’s crackdown on coinminers. Joe Carrigan looks at the Mespinoza ransomware gang. And meet Marcy Flores, the Robin Sage of Liverpool aerobics.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/144
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 28 Jul 2021 20:50:00 -0000</pubDate>
      <itunes:title>US ICS Cybersecurity Initiative formalized. Developments in the ransomware world. Addressing known vulnerabilities. Caucasus coinmining crackdown. A long-running IRGC catphishing campaign.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1384</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>US formally establishes its Industrial Control System Cybersecurity Initiative. Shooting wars in cyberspace. Developments in the ransomware criminal souks. This week’s iOS update may have closed the vulnerability exploited by NSO Group’s Pegasus intercept tool. The US, UK, and Australia issue a joint advisory on the most exploited vulnerabilities. Abkhazia’s crackdown on coinminers. Joe Carrigan looks at the Mespinoza ransomware gang. And meet Marcy Flores, the Robin Sage of Liverpool aerobics.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/144
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>US formally establishes its Industrial Control System Cybersecurity Initiative. Shooting wars in cyberspace. Developments in the ransomware criminal souks. This week’s iOS update may have closed the vulnerability exploited by NSO Group’s Pegasus intercept tool. The US, UK, and Australia issue a joint advisory on the most exploited vulnerabilities. Abkhazia’s crackdown on coinminers. Joe Carrigan looks at the Mespinoza ransomware gang. And meet Marcy Flores, the Robin Sage of Liverpool aerobics.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/144</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1817</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[09fd0114-364d-11eb-b082-e7e6efe2031b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9117374376.mp3?updated=1702654286" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>South African ports invoke force majeure over cyberattack. Documents indicate Iranian interest in control systems attacks. Dark web wanted ads. Cyber diplomacy. Lousy cafeteria food?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1383/notes</link>
      <description>Transnet declares force majeure over cyberattack on South African port management. The IRGC apparently is Googling a bunch of stuff about gas stations and merchant ships. Kaseya’s denial of paying ransom has legs. Criminal coders like obscure languages. The AvosLocker gang is looking for pentesters, access brokers, and affiliates. The US and China hold “frank and open” conversations about, among other things, cyber tensions. Ben Yelin explains the tech implications of President Biden's recent executive order. Our guest is Eve Maler from ForgeRock on their 3rd annual Breach Report. And, hey NSA, what did you have for lunch today?
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/143
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Jul 2021 21:20:00 -0000</pubDate>
      <itunes:title>South African ports invoke force majeure over cyberattack. Documents indicate Iranian interest in control systems attacks. Dark web wanted ads. Cyber diplomacy. Lousy cafeteria food?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1383</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Transnet declares force majeure over cyberattack on South African port management. The IRGC apparently is Googling a bunch of stuff about gas stations and merchant ships. Kaseya’s denial of paying ransom has legs. Criminal coders like obscure languages. The AvosLocker gang is looking for pentesters, access brokers, and affiliates. The US and China hold “frank and open” conversations about, among other things, cyber tensions. Ben Yelin explains the tech implications of President Biden's recent executive order. Our guest is Eve Maler from ForgeRock on their 3rd annual Breach Report. And, hey NSA, what did you have for lunch today?
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/143
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Transnet declares force majeure over cyberattack on South African port management. The IRGC apparently is Googling a bunch of stuff about gas stations and merchant ships. Kaseya’s denial of paying ransom has legs. Criminal coders like obscure languages. The AvosLocker gang is looking for pentesters, access brokers, and affiliates. The US and China hold “frank and open” conversations about, among other things, cyber tensions. Ben Yelin explains the tech implications of President Biden's recent executive order. Our guest is Eve Maler from ForgeRock on their 3rd annual Breach Report. And, hey NSA, what did you have for lunch today?</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/143</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1643</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0969910e-364d-11eb-b082-bb208e50d086]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8600113160.mp3?updated=1702654358" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The source of Kaseya’s REvil key remains unknown. Cyber incident disrupts port operations at Cape Town and Durban. Updates on the Pegasus Project. And a guilty plea in a swatting case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1382/notes</link>
      <description>Kaseya isn’t saying where it got its REvil decryptor. Transportation services disrupted at two major South African ports by an unspecified cyber incident. Another company is mentioned as an alleged source of abused intercept tools as the controversy over NSO Group’s Pegasus software continues. Johannes Ullrich from SANS on supply chains, development tools and insecure libraries. Our own Rick Howard looks at enterprise encryption. And a guilty plea gets a swatter five years: he got off easy.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/142
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 26 Jul 2021 20:30:00 -0000</pubDate>
      <itunes:title>The source of Kaseya’s REvil key remains unknown. Cyber incident disrupts port operations at Cape Town and Durban. Updates on the Pegasus Project. And a guilty plea in a swatting case.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1382</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Kaseya isn’t saying where it got its REvil decryptor. Transportation services disrupted at two major South African ports by an unspecified cyber incident. Another company is mentioned as an alleged source of abused intercept tools as the controversy over NSO Group’s Pegasus software continues. Johannes Ullrich from SANS on supply chains, development tools and insecure libraries. Our own Rick Howard looks at enterprise encryption. And a guilty plea gets a swatter five years: he got off easy.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/142
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kaseya isn’t saying where it got its REvil decryptor. Transportation services disrupted at two major South African ports by an unspecified cyber incident. Another company is mentioned as an alleged source of abused intercept tools as the controversy over NSO Group’s Pegasus software continues. Johannes Ullrich from SANS on supply chains, development tools and insecure libraries. Our own Rick Howard looks at enterprise encryption. And a guilty plea gets a swatter five years: he got off easy.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/142</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1502</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0953b2c6-364d-11eb-b082-c777f820246c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5685274852.mp3?updated=1702654344" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Is enhanced hardware security the answer to ransomware? [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/16/notes</link>
      <description>With the recent onslaught of ransomware attacks across healthcare institutions, critical infrastructure, and the public sector, it's clear that ransomware isn’t going anywhere. But given how common ransomware attacks have become, how is it that we've been unable to put a stop to them? Companies often overlook the role that hardware security plays in meeting this challenge, and that oversight has become a bad actor's dream. Michael Nordquist speaks about the recent surge in ransomware attacks, and how strong hardware security, combined with software security and personnel security awareness, can be the answer to the industry’s prayers.
In this episode of CyberWire-X, guest Steve Winterfeld from Akamai shares his insights with the CyberWire's Rick Howard, and Michael Nordquist of sponsor Intel offers his thoughts to the CyberWire's Dave Bittner.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 25 Jul 2021 07:00:00 -0000</pubDate>
      <itunes:title>Is enhanced hardware security the answer to ransomware? [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>16</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>With the recent onslaught of ransomware attacks across healthcare institutions, critical infrastructure, and the public sector, it's clear that ransomware isn’t going anywhere. But given how common ransomware attacks have become, how is it that we've been unable to put a stop to them? Companies often overlook the role that hardware security plays in meeting this challenge, and that oversight has become a bad actor's dream. Michael Nordquist speaks about the recent surge in ransomware attacks, and how strong hardware security, combined with software security and personnel security awareness, can be the answer to the industry’s prayers.
In this episode of CyberWire-X, guest Steve Winterfeld from Akamai shares his insights with the CyberWire's Rick Howard, and Michael Nordquist of sponsor Intel offers his thoughts to the CyberWire's Dave Bittner.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>With the recent onslaught of ransomware attacks across healthcare institutions, critical infrastructure, and the public sector, it's clear that ransomware isn’t going anywhere. But given how common ransomware attacks have become, how is it that we've been unable to put a stop to them? Companies often overlook the role that hardware security plays in meeting this challenge, and that oversight has become a bad actor's dream. Michael Nordquist speaks about the recent surge in ransomware attacks, and how strong hardware security, combined with software security<strong><em> </em></strong>and<strong><em> </em></strong>personnel security awareness, can be the answer to the industry’s prayers.</p><p>In this episode of CyberWire-X, guest Steve Winterfeld from Akamai shares his insights with the CyberWire's Rick Howard, and Michael Nordquist of sponsor Intel offers his thoughts to the CyberWire's Dave Bittner.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1905</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[291bab2c-ebdd-11eb-bd22-0b691d0dd084]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9853453608.mp3?updated=1626978461" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ingrid Toppelberg: Knowing how to take risks will pay off. [Cybersecurity education] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/59/notes</link>
      <description>Chief Product Officer at Cybint Solutions, Ingrid Toppelberg, shares her journey from consulting to bootcamp coach and cybersecurity education. As a young girl, Ingrid wanted to do everything from being a teacher to the head of the World Bank. After consulting for several years, Ingrid found cybersecurity. What she found fascinating about the cyber world is how important it is for absolutely everyone at all levels to know about cybersecurity. Ingrid also develops and conducts bootcamps to reskill displaced people into cybersecurity. Ingrid says to those interested in cyber, "just do it. We need different kinds of minds in cyber keeping us safe." We thank Ingrid for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 25 Jul 2021 07:00:00 -0000</pubDate>
      <itunes:title>Ingrid Toppelberg: Knowing how to take risks will pay off. [Cybersecurity education] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>59</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Chief Product Officer at Cybint Solutions, Ingrid Toppleberg, shares her journey from consulting to bootcamp coach and cybersecurity education. </itunes:subtitle>
      <itunes:summary>Chief Product Officer at Cybint Solutions, Ingrid Toppelberg, shares her journey from consulting to bootcamp coach and cybersecurity education. As a young girl, Ingrid wanted to do everything from being a teacher to the head of the World Bank. After consulting for several years, Ingrid found cybersecurity. What she found fascinating about the cyber world is how important it is for absolutely everyone at all levels to know about cybersecurity. Ingrid also develops and conducts bootcamps to reskill displaced people into cybersecurity. Ingrid says to those interested in cyber, "just do it. We need different kinds of minds in cyber keeping us safe." We thank Ingrid for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chief Product Officer at Cybint Solutions, Ingrid Toppelberg, shares her journey from consulting to bootcamp coach and cybersecurity education. As a young girl, Ingrid wanted to do everything from being a teacher to the head of the World Bank. After consulting for several years, Ingrid found cybersecurity. What she found fascinating about the cyber world is how important it is for absolutely everyone at all levels to know about cybersecurity. Ingrid also develops and conducts bootcamps to reskill displaced people into cybersecurity. Ingrid says to those interested in cyber, "just do it. We need different kinds of minds in cyber keeping us safe." We thank Ingrid for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>347</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b6b57704-ea54-11eb-b922-831c67f9acfe]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6583691198.mp3?updated=1626893555" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Free malware with cracked software. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/193/notes</link>
      <description>Guest Christopher Budd, Senior Global Threat Communications Manager at Avast, joins Dave to talk about some research his team did when they looked into a Reddit report saying their Avast folder was empty and other reports like it. The team found a new malware they’re calling “Crackonosh” in part because of some possible indications that the malware author may be Czech. Crackonosh is distributed along with illegal, cracked copies of popular software and searches for and disables many popular antivirus programs as part of its anti-detection and anti-forensics tactics.
The research can be found here:
Crackonosh: A New Malware Distributed in Cracked Software

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Jul 2021 07:00:00 -0000</pubDate>
      <itunes:title>Free malware with cracked software. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>193</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Christopher Budd, Senior Global Threat Communications Manager at Avast, joins Dave to talk about some research his team did when they looked into a Reddit report saying their Avast folder was empty and other reports like it. The team found a new malware they’re calling “Crackonosh” in part because of some possible indications that the malware author may be Czech. Crackonosh is distributed along with illegal, cracked copies of popular software and searches for and disables many popular antivirus programs as part of its anti-detection and anti-forensics tactics.
The research can be found here:
Crackonosh: A New Malware Distributed in Cracked Software

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Christopher Budd, Senior Global Threat Communications Manager at Avast, joins Dave to talk about some research his team did when they looked into a Reddit report saying their Avast folder was empty and other reports like it. The team found a new malware they’re calling “Crackonosh” in part because of some possible indications that the malware author may be Czech. Crackonosh is distributed along with illegal, cracked copies of popular software and searches for and disables many popular antivirus programs as part of its anti-detection and anti-forensics tactics.</p><p>The research can be found here:</p><ul><li><a href="https://decoded.avast.io/danielbenes/crackonosh-a-new-malware-distributed-in-cracked-software/">Crackonosh: A New Malware Distributed in Cracked Software</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>977</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[03f28480-ea50-11eb-8b0b-939324270827]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6564540926.mp3?updated=1685126281" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber threats to, and around, the Olympic Games. Kaseya got a decryptor, from somewhere…. NSO says it’s not responsible for Pegasus misuse. US cyber policy toward China. Fraud Family busted. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1381/notes</link>
      <description>The Olympics are underway, and the authorities are on the alert for cyberattacks. Kaseya has a decryptor for the REvil ransomware, but it hasn’t said how it got the key. NSO Group says it’s not responsible for customer misuse of its Pegasus intercept tool. US policy toward Chinese cyber activities shows continuity, with some diplomatic intensification, but hawks would like to see more action. Our guest Jack Williams from Hexagon joins Dave to discuss the promises and challenges of smart cities. Podcast partner Chris Novak of Verizon talks about advancing incident response. And Dutch police make arrests in their investigation of the Fraud Family.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/141
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 23 Jul 2021 20:20:00 -0000</pubDate>
      <itunes:title>Cyber threats to, and around, the Olympic Games. Kaseya got a decryptor, from somewhere…. NSO says it’s not responsible for Pegasus misuse. US cyber policy toward China. Fraud Family busted. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1381</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Olympics are underway, and the authorities are on the alert for cyberattacks. Kaseya has a decryptor for the REvil ransomware, but it hasn’t said how it got the key. NSO Group says it’s not responsible for customer misuse of its Pegasus intercept tool. US policy toward Chinese cyber activities shows continuity, with some diplomatic intensification, but hawks would like to see more action. Our guest Jack Williams from Hexagon joins Dave to discuss the promises and challenges of smart cities. Podcast partner Chris Novak of Verizon talks about advancing incident response. And Dutch police make arrests in their investigation of the Fraud Family.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/141
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Olympics are underway, and the authorities are on the alert for cyberattacks. Kaseya has a decryptor for the REvil ransomware, but it hasn’t said how it got the key. NSO Group says it’s not responsible for customer misuse of its Pegasus intercept tool. US policy toward Chinese cyber activities shows continuity, with some diplomatic intensification, but hawks would like to see more action. Our guest Jack Williams from Hexagon joins Dave to discuss the promises and challenges of smart cities. Podcast partner Chris Novak of Verizon talks about advancing incident response. And Dutch police make arrests in their investigation of the Fraud Family.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/141</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1571</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0ab488c0-364d-11eb-b082-ff60950a7e93]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8829019085.mp3?updated=1702654565" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Extortion is the motive in the Saudi Aramco incident. Updates on the Pegasus Project. Chinese cyberespionage and Beijing’s tu quoque. FIN7 resurfaces, and a post-mortem on Egregor.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1380/notes</link>
      <description>It’s extortion after all at Saudi Aramco. Controversy and investigation over alleged misuse of NSO Group’s Pegasus intercept tool continues. Warning of Chinese espionage from ANSSI, and China’s denunciation of all this kind of “baseless slander.” Phishing in Milanote. FIN7 resurfaces after the conviction of some key members. Dinah Davis from Arctic Wolf on the importance of identity management. Our guest Jenn Donahue shares key strategies for mentoring and supporting female engineers, scientists, and leaders of the future. And IBM sifts through the ashes of a ransomware gang for a look at the business of crime.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/140
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 22 Jul 2021 19:40:00 -0000</pubDate>
      <itunes:title>Extortion is the motive in the Saudi Aramco incident. Updates on the Pegasus Project. Chinese cyberespionage and Beijing’s tu quoque. FIN7 resurfaces, and a post-mortem on Egregor.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1380</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>It’s extortion after all at Saudi Aramco. Controversy and investigation over alleged misuse of NSO Group’s Pegasus intercept tool continues. Warning of Chinese espionage from ANSSI, and China’s denunciation of all this kind of “baseless slander.” Phishing in Milanote. FIN7 resurfaces after the conviction of some key members. Dinah Davis from Arctic Wolf on the importance of identity management. Our guest Jenn Donahue shares key strategies for mentoring and supporting female engineers, scientists, and leaders of the future. And IBM sifts through the ashes of a ransomware gang for a look at the business of crime.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/140
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>It’s extortion after all at Saudi Aramco. Controversy and investigation over alleged misuse of NSO Group’s Pegasus intercept tool continues. Warning of Chinese espionage from ANSSI, and China’s denunciation of all this kind of “baseless slander.” Phishing in Milanote. FIN7 resurfaces after the conviction of some key members. Dinah Davis from Arctic Wolf on the importance of identity management. Our guest Jenn Donahue shares key strategies for mentoring and supporting female engineers, scientists, and leaders of the future. And IBM sifts through the ashes of a ransomware gang for a look at the business of crime.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/140</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1648</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0a2598b8-364d-11eb-b082-13ade8e446e7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7777934825.mp3?updated=1702654604" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Historical threats to industrial control systems inform current security practices. Ransomware privateering and side-hustling. Updates on the Pegasus Project.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1379/notes</link>
      <description>CISA warns of threats to industrial control systems, profusely illustrated with examples from recent history. Ransomware can be operated either in the course of privateering or as an APT side hustle. Security firms outline new and evolving threats and vulnerabilities. Reaction continues to the Pegasus Project’s reports on intercept tools. Joe Carrigan unpacks recent Facebook revelations and allegations. Our guest is Dave Humphrey from Bain Capital on his tech investment bets and predictions. And do you know what “military grade” means? Neither do we, but we think we have an idea.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/139
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 21 Jul 2021 20:20:00 -0000</pubDate>
      <itunes:title>Historical threats to industrial control systems inform current security practices. Ransomware privateering and side-hustling. Updates on the Pegasus Project.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1379</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA warns of threats to industrial control systems, profusely illustrated with examples from recent history. Ransomware can be operated either in the course of privateering or as an APT side hustle. Security firms outline new and evolving threats and vulnerabilities. Reaction continues to the Pegasus Project’s reports on intercept tools. Joe Carrigan unpacks recent Facebook revelations and allegations. Our guest is Dave Humphrey from Bain Capital on his tech investment bets and predictions. And do you know what “military grade” means? Neither do we, but we think we have an idea.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/139
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA warns of threats to industrial control systems, profusely illustrated with examples from recent history. Ransomware can be operated either in the course of privateering or as an APT side hustle. Security firms outline new and evolving threats and vulnerabilities. Reaction continues to the Pegasus Project’s reports on intercept tools. Joe Carrigan unpacks recent Facebook revelations and allegations. Our guest is Dave Humphrey from Bain Capital on his tech investment bets and predictions. And do you know what “military grade” means? Neither do we, but we think we have an idea.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/139</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1577</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[09e679d0-364d-11eb-b082-e3bff309088e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2560068366.mp3?updated=1702654602" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>APT side hustles and evidence of espionage. NSO replies to the Pegasus Project, and AWS removes NSO from its CloudFront CDM. Other data breaches and ransomware incidents.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1378/notes</link>
      <description>The US says China contracted with criminals to carry out cyberespionage campaigns. Norway says China was behind an attack on its parliamentary email system. China denounces accusations of cyberespionage as slander, and says it’s the real victim, because the CIA is the one stealing IP from China. AWS expels NSO Group from its CloudFront CDM. NSO denies it permits its intercept tools to be abused. Saudi Aramco sustains a data breach. Ben Yelin describes calls for bans on government use of facial recognition software. Our guest is Tom Kellermann from VMware on the potential cybersecurity threats facing the Olympic Games. And an MSP struggles with ransomware.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/138
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Jul 2021 19:50:00 -0000</pubDate>
      <itunes:title>APT side hustles and evidence of espionage. NSO replies to the Pegasus Project, and AWS removes NSO from its CloudFront CDM. Other data breaches and ransomware incidents.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1378</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The US says China contracted with criminals to carry out cyberespionage campaigns. Norway says China was behind an attack on its parliamentary email system. China denounces accusations of cyberespionage as slander, and says it’s the real victim, because the CIA is the one stealing IP from China. AWS expels NSO Group from its CloudFront CDM. NSO denies it permits its intercept tools to be abused. Saudi Aramco sustains a data breach. Ben Yelin describes calls for bans on government use of facial recognition software. Our guest is Tom Kellermann from VMware on the potential cybersecurity threats facing the Olympic Games. And an MSP struggles with ransomware.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/138
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US says China contracted with criminals to carry out cyberespionage campaigns. Norway says China was behind an attack on its parliamentary email system. China denounces accusations of cyberespionage as slander, and says it’s the real victim, because the CIA is the one stealing IP from China. AWS expels NSO Group from its CloudFront CDM. NSO denies it permits its intercept tools to be abused. Saudi Aramco sustains a data breach. Ben Yelin describes calls for bans on government use of facial recognition software. Our guest is Tom Kellermann from VMware on the potential cybersecurity threats facing the Olympic Games. And an MSP struggles with ransomware.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/138</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1621</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[097edd70-364d-11eb-b082-c7605ebd1919]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2673914537.mp3?updated=1702654673" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Microsoft Exchange Server hacks officially attributed to China. Indictment in industrial espionage case. Entities List expands. Abuse of NSO Group’s Pegasus tool reported.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1377/notes</link>
      <description>Allied governments formally attribute exploitation of Microsoft Exchange Server to China’s Ministry of State Security. A US Federal indictment names four MSS officers in conjunction with another, long-running cyberespionage campaign. The US Department of Commerce adds six Russian organizations to the Entities List. The Pegasus Project outlines alleged abuse of NSO Group’s intercept tool. Thomas Etheridge from CrowdStrike on the importance of real-time response, continuous monitoring and remediation. Our guest is Neha Joshi from Accenture on solving the cybersecurity staffing gap and how to stand up a successful, diverse security team. And there’s hacktivism in Southeast Asia.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/137
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 19 Jul 2021 20:30:00 -0000</pubDate>
      <itunes:title>Microsoft Exchange Server hacks officially attributed to China. Indictment in industrial espionage case. Entities List expands. Abuse of NSO Group’s Pegasus tool reported.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1377</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Allied governments formally attribute exploitation of Microsoft Exchange Server to China’s Ministry of State Security. A US Federal indictment names four MSS officers in conjunction with another, long-running cyberespionage campaign. The US Department of Commerce adds six Russian organizations to the Entities List. The Pegasus Project outlines alleged abuse of NSO Group’s intercept tool. Thomas Etheridge from CrowdStrike on the importance of real-time response, continuous monitoring and remediation. Our guest is Neha Joshi from Accenture on solving the cybersecurity staffing gap and how to stand up a successful, diverse security team. And there’s hacktivism in Southeast Asia.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/137
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Allied governments formally attribute exploitation of Microsoft Exchange Server to China’s Ministry of State Security. A US Federal indictment names four MSS officers in conjunction with another, long-running cyberespionage campaign. The US Department of Commerce adds six Russian organizations to the Entities List. The Pegasus Project outlines alleged abuse of NSO Group’s intercept tool. Thomas Etheridge from CrowdStrike on the importance of real-time response, continuous monitoring and remediation. Our guest is Neha Joshi from Accenture on solving the cybersecurity staffing gap and how to stand up a successful, diverse security team. And there’s hacktivism in Southeast Asia.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/137</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1438</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[093dff08-364d-11eb-b082-afafc1ec6185]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4553268172.mp3?updated=1702654657" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Peter Baumann: Adding value to data. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/58/notes</link>
      <description>CEO of ActiveNav, Peter Baumann, takes us on his career journey from minor home electrical experiments to the business of data discovery. He began his career as an electrical engineer, but felt an entrepreneurial spirit was part of his makeup. Following his return to college to study business and finance, Peter talks about being set on the path to shine the light on the data to provide discovery capability. To those interested in the field, he suggests having a broad familiarity of different approaches. We thank Peter for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 18 Jul 2021 07:00:00 -0000</pubDate>
      <itunes:title>Peter Baumann: Adding value to data. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>58</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>CEO of ActiveNav, Peter Baumann, takes us on his career journey from minor home electrical experiments to the business of data discovery. </itunes:subtitle>
      <itunes:summary>CEO of ActiveNav, Peter Baumann, takes us on his career journey from minor home electrical experiments to the business of data discovery. He began his career as an electrical engineer, but felt an entrepreneurial spirit was part of his makeup. Following his return to college to study business and finance, Peter talks about being set on the path to shine the light on the data to provide discovery capability. To those interested in the field, he suggests having a broad familiarity of different approaches. We thank Peter for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CEO of ActiveNav, Peter Baumann, takes us on his career journey from minor home electrical experiments to the business of data discovery. He began his career as an electrical engineer, but felt an entrepreneurial spirit was part of his makeup. Following his return to college to study business and finance, Peter talks about being set on the path to shine the light on the data to provide discovery capability. To those interested in the field, he suggests having a broad familiarity of different approaches. We thank Peter for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>389</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8351cbe0-e5c4-11eb-8416-4f71b076d6df]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1762633706.mp3?updated=1626391861" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Enabling connectivity enables exposures. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/192/notes</link>
      <description>Guest Nathan Howe, Vice President of Emerging Technology at Zscaler, joins Dave to discuss his team's work, "2021 “Exposed” Report Reveals Corporate and Cloud Infrastructures More at Risk Than Ever From Expanded Attack Surfaces." The modern workforce has resulted in an increase of users, devices, and applications existing outside of controlled networks, including corporate networks, the business emphasis on the “network” has decreased and the reliance on the internet as the connective tissue for businesses has increased.
Zscaler analyzes the attack surface of 1,500 organizations and identifies trends affecting businesses of all sizes and industries, across all geographies. Key findings include:

The attack surface impact based on company size

The countries with the greatest attack surface

The industries that are most exposed


The research can be found here:
“Exposed”: The world’s first report to reveal how exposed corporate networks really are.

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Jul 2021 07:00:00 -0000</pubDate>
      <itunes:title>Enabling connectivity enables exposures. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>192</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Nathan Howe, Vice President of Emerging Technology at Zscaler, joins Dave to discuss his team's work, "2021 “Exposed” Report Reveals Corporate and Cloud Infrastructures More at Risk Than Ever From Expanded Attack Surfaces." The modern workforce has resulted in an increase of users, devices, and applications existing outside of controlled networks, including corporate networks, the business emphasis on the “network” has decreased and the reliance on the internet as the connective tissue for businesses has increased.
Zscaler analyzes the attack surface of 1,500 organizations and identifies trends affecting businesses of all sizes and industries, across all geographies. Key findings include:

The attack surface impact based on company size

The countries with the greatest attack surface

The industries that are most exposed


The research can be found here:
“Exposed”: The world’s first report to reveal how exposed corporate networks really are.

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Nathan Howe, Vice President of Emerging Technology at Zscaler, joins Dave to discuss his team's work, "2021 “Exposed” Report Reveals Corporate and Cloud Infrastructures More at Risk Than Ever From Expanded Attack Surfaces." The modern workforce has resulted in an increase of users, devices, and applications existing outside of controlled networks, including corporate networks, the business emphasis on the “network” has decreased and the reliance on the internet as the connective tissue for businesses has increased.</p><p>Zscaler analyzes the attack surface of 1,500 organizations and identifies trends affecting businesses of all sizes and industries, across all geographies. Key findings include:</p><ul>
<li>The attack surface impact based on company size</li>
<li>The countries with the greatest attack surface</li>
<li>The industries that are most exposed</li>
</ul><p><br></p><p>The research can be found here:</p><ul><li><a href="https://info.zscaler.com/resources-ebooks-global-corporate-network-attack-surface-report">“Exposed”: The world’s first report to reveal how exposed corporate networks really are.</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1230</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[93594654-e4f6-11eb-b24b-4f798724f810]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4446521112.mp3?updated=1685126273" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DDoS at Russia’s MoD. Facebook disrupts Iranian catphishing operation. An intercept tool vendor’s activities are exposed. No signs of the US softening on Huawei bans.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1376/notes</link>
      <description>Russia’s Ministry of Defense says its website sustained a distributed denial-of-service attack this morning. Facebook disrupts a complex Iranian catphishing operation aimed at military personnel and employees of defense and aerospace companies. Microsoft and Citizen Lab describe the recent operations of an Israeli intercept tool vendor. The US shows no signs of relenting on Huawei. Johannes Ullrich from the SANS technology institute has been Hunting Phishing Sites with Shodan. Our guest is Rick Van Galen from 1Password with insights from their Hiding in Plain Sight report. And there’s nothing new on the REvil front--the gang is as much in the wind as it was early this week.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/136
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 16 Jul 2021 20:10:00 -0000</pubDate>
      <itunes:title>DDoS at Russia’s MoD. Facebook disrupts Iranian catphishing operation. An intercept tool vendor’s activities are exposed. No signs of the US softening on Huawei bans.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1376</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Russia’s Ministry of Defense says its website sustained a distributed denial-of-service attack this morning. Facebook disrupts a complex Iranian catphishing operation aimed at military personnel and employees of defense and aerospace companies. Microsoft and Citizen Lab describe the recent operations of an Israeli intercept tool vendor. The US shows no signs of relenting on Huawei. Johannes Ullrich from the SANS technology institute has been Hunting Phishing Sites with Shodan. Our guest is Rick Van Galen from 1Password with insights from their Hiding in Plain Sight report. And there’s nothing new on the REvil front--the gang is as much in the wind as it was early this week.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/136
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russia’s Ministry of Defense says its website sustained a distributed denial-of-service attack this morning. Facebook disrupts a complex Iranian catphishing operation aimed at military personnel and employees of defense and aerospace companies. Microsoft and Citizen Lab describe the recent operations of an Israeli intercept tool vendor. The US shows no signs of relenting on Huawei. Johannes Ullrich from the SANS technology institute has been Hunting Phishing Sites with Shodan. Our guest is Rick Van Galen from 1Password with insights from their Hiding in Plain Sight report. And there’s nothing new on the REvil front--the gang is as much in the wind as it was early this week.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/136</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1400</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0aa04f86-364d-11eb-b082-8323ac9c0091]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3413264286.mp3?updated=1702654662" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Luminous Moth or Mustang Panda, it’s the same bad actor (probably). Updates on other cyberespionage and ransomware campaigns. Rewards for tips on cyberattacks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1375/notes</link>
      <description>A Chinese APT is active against targets in Myanmar and, especially, the Philippines. Cyberespionage campaigns suggest that there’s a thriving market for zero-days. MI5 warns against spying, disinformation, and radicalization. REvil continues to lie low (and the Kremlin hasn’t seen anything). CISA offers ransomware mitigation advice. Bogus Coinbase sites steal credentials. Ransomware attacks on old SonicWall products expected. Daniel Prince from Lancaster University looks at Getting into the industry, and whether a degree is worth it. Our guest is Kurtis Minder from GroupSense, tracking 3 divergent ransomware trends. And Rewards for Justice offers a million dollars for tips on cyberattacks. 
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/135
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 15 Jul 2021 19:30:00 -0000</pubDate>
      <itunes:title>Luminous Moth or Mustang Panda, it’s the same bad actor (probably). Updates on other cyberespionage and ransomware campaigns. Rewards for tips on cyberattacks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1375</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A Chinese APT is active against targets in Myanmar and, especially, the Philippines. Cyberespionage campaigns suggest that there’s a thriving market for zero-days. MI5 warns against spying, disinformation, and radicalization. REvil continues to lie low (and the Kremlin hasn’t seen anything). CISA offers ransomware mitigation advice. Bogus Coinbase sites steal credentials. Ransomware attacks on old SonicWall products expected. Daniel Prince from Lancaster University looks at Getting into the industry, and whether a degree is worth it. Our guest is Kurtis Minder from GroupSense, tracking 3 divergent ransomware trends. And Rewards for Justice offers a million dollars for tips on cyberattacks. 
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/135
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Chinese APT is active against targets in Myanmar and, especially, the Philippines. Cyberespionage campaigns suggest that there’s a thriving market for zero-days. MI5 warns against spying, disinformation, and radicalization. REvil continues to lie low (and the Kremlin hasn’t seen anything). CISA offers ransomware mitigation advice. Bogus Coinbase sites steal credentials. Ransomware attacks on old SonicWall products expected. Daniel Prince from Lancaster University looks at Getting into the industry, and whether a degree is worth it. Our guest is Kurtis Minder from GroupSense, tracking 3 divergent ransomware trends. And Rewards for Justice offers a million dollars for tips on cyberattacks. </p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/135</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1662</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0a39d6de-364d-11eb-b082-db1f1ea8c5d6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4125886835.mp3?updated=1702654832" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patch notes. What’s happening with REvil remains unclear, but it would be rash to count the gang out. </title>
      <description>SolarWinds patches a zero-day exploited by a Chinese threat group. Patch Tuesday notes. What’s up with REvil: takedown, retirement, rebranding, or glitch? (Don’t bet against rebranding.) Joe Carrigan from JHU ISI on cell phone carriers sneaking us ads via SMS. Our guest is Nicko van Someren of Absolute Software with a look at endpoint risk. And bots like futbol.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/134
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 14 Jul 2021 19:25:00 -0000</pubDate>
      <itunes:title>Patch notes. What’s happening with REvil remains unclear, but it would be rash to count the gang out. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1374</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>SolarWinds patches a zero-day exploited by a Chinese threat group. Patch Tuesday notes. What’s up with REvil: takedown, retirement, rebranding, or glitch? (Don’t bet against rebranding.) Joe Carrigan from JHU ISI on cell phone carriers sneaking us ads via SMS. Our guest is Nicko van Someren of Absolute Software with a look at endpoint risk. And bots like futbol.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/134
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>SolarWinds patches a zero-day exploited by a Chinese threat group. Patch Tuesday notes. What’s up with REvil: takedown, retirement, rebranding, or glitch? (Don’t bet against rebranding.) Joe Carrigan from JHU ISI on cell phone carriers sneaking us ads via SMS. Our guest is Nicko van Someren of Absolute Software with a look at endpoint risk. And bots like futbol.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/134</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1488</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[09d1b9dc-364d-11eb-b082-7f3b5b9f50ea]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9270400464.mp3?updated=1702654838" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SolarWinds patches a zero-day. Trickbot is back. Bogus Twitter accounts, now suspended, were verified by the social medium. DarkSide hits Guess. Updates on REvil and Kaseya. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1373/notes</link>
      <description>SolarWinds addresses a zero-day that was exploited in the wild. A watering hole campaign lures users of online gaming sites. Inauthentic accounts (now suspended) get a blue check mark. Trickbot is back, with new capabilities. The DarkSide hits fashion retailer Guess. Malek Ben Salem from Accenture on Remediation of Vulnerabilities using AI. Our guest is Jeff Williams from Contrast Security with a look at Application Security in Financial Services. And some updates on Kaseya, its customers, and the current state of REvil.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/133
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Jul 2021 19:15:00 -0000</pubDate>
      <itunes:title>SolarWinds patches a zero-day. Trickbot is back. Bogus Twitter accounts, now suspended, were verified by the social medium. DarkSide hits Guess. Updates on REvil and Kaseya. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1373</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>SolarWinds addresses a zero-day that was exploited in the wild. A watering hole campaign lures users of online gaming sites. Inauthentic accounts (now suspended) get a blue check mark. Trickbot is back, with new capabilities. The DarkSide hits fashion retailer Guess. Malek Ben Salem from Accenture on Remediation of Vulnerabilities using AI. Our guest is Jeff Williams from Contrast Security with a look at Application Security in Financial Services. And some updates on Kaseya, its customers, and the current state of REvil.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/133
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>SolarWinds addresses a zero-day that was exploited in the wild. A watering hole campaign lures users of online gaming sites. Inauthentic accounts (now suspended) get a blue check mark. Trickbot is back, with new capabilities. The DarkSide hits fashion retailer Guess. Malek Ben Salem from Accenture on Remediation of Vulnerabilities using AI. Our guest is Jeff Williams from Contrast Security with a look at Application Security in Financial Services. And some updates on Kaseya, its customers, and the current state of REvil.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/133</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1526</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[09937604-364d-11eb-b082-0f254189f972]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4200235267.mp3?updated=1702654854" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kaseya and REvil--the state of recovery. President Biden calls President Putin to ask for action on ransomware. Cyber incident in Iran. Ukraine says its naval website was hacked. Tracking ransom.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1372/notes</link>
      <description>Kaseya has patched the VSA on-premises and SaaS versions affected by REvil ransomware. The US tries some straight talk about privateering with Russia, but with what effect remains to be seen. Russia’s autarkic Internet poses some challenges for international security. Iranian rail and government sites were hit with a cyber incident over the weekend. Ukraine says Russian threat actors defaced its Naval website. Carole Theriault looks at ethics in phishing simulations. Josh Ray from Accenture tracks real world incident response trends. And tracking just how much the ransomware gangs are taking in.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/132
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 12 Jul 2021 20:55:00 -0000</pubDate>
      <itunes:title>Kaseya and REvil--the state of recovery. President Biden calls President Putin to ask for action on ransomware. Cyber incident in Iran. Ukraine says its naval website was hacked. Tracking ransom.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1372</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Kaseya has patched the VSA on-premises and SaaS versions affected by REvil ransomware. The US tries some straight talk about privateering with Russia, but with what effect remains to be seen. Russia’s autarkic Internet poses some challenges for international security. Iranian rail and government sites were hit with a cyber incident over the weekend. Ukraine says Russian threat actors defaced its Naval website. Carole Theriault looks at ethics in phishing simulations. Josh Ray from Accenture tracks real world incident response trends. And tracking just how much the ransomware gangs are taking in.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/132
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kaseya has patched the VSA on-premises and SaaS versions affected by REvil ransomware. The US tries some straight talk about privateering with Russia, but with what effect remains to be seen. Russia’s autarkic Internet poses some challenges for international security. Iranian rail and government sites were hit with a cyber incident over the weekend. Ukraine says Russian threat actors defaced its Naval website. Carole Theriault looks at ethics in phishing simulations. Josh Ray from Accenture tracks real world incident response trends. And tracking just how much the ransomware gangs are taking in.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/132</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[09280072-364d-11eb-b082-eb07b2657b34]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5321617963.mp3?updated=1702655614" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>APTs transitioning to the cloud. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/15/notes</link>
      <description>Cloud attacks have become so widespread that the Department of Homeland Security (DHS) has warned against an increase of nation states, criminal groups and hacktivists targeting cloud-based enterprise resources.
APTs such as Pacha Group, Rocke Group and TeamTNT have been rapidly modifying their existing tools to target Linux servers in the cloud. Modifying their existing code to create new malware variants which are easily bypassing traditional security solutions. The solution? In order to detect and respond to these attacks security teams need visibility into what code is running on their systems.
In this episode of CyberWire-X, guest Jonas Walker from Fortinet shares his insights with the CyberWire's Rick Howard, and Ell Marquez of sponsor Intezer offers her thoughts to the CyberWire's Dave Bittner.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 11 Jul 2021 07:00:00 -0000</pubDate>
      <itunes:title>APTs transitioning to the cloud. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>15</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cloud attacks have become so widespread that the Department of Homeland Security (DHS) has warned against an increase of nation states, criminal groups and hacktivists targeting cloud-based enterprise resources.
APTs such as Pacha Group, Rocke Group and TeamTNT have been rapidly modifying their existing tools to target Linux servers in the cloud. Modifying their existing code to create new malware variants which are easily bypassing traditional security solutions. The solution? In order to detect and respond to these attacks security teams need visibility into what code is running on their systems.
In this episode of CyberWire-X, guest Jonas Walker from Fortinet shares his insights with the CyberWire's Rick Howard, and Ell Marquez of sponsor Intezer offers her thoughts to the CyberWire's Dave Bittner.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cloud attacks have become so widespread that the Department of Homeland Security (DHS) has warned against an increase of nation states, criminal groups and hacktivists targeting cloud-based enterprise resources.</p><p>APTs such as Pacha Group, Rocke Group and TeamTNT have been rapidly modifying their existing tools to target Linux servers in the cloud. Modifying their existing code to create new malware variants which are easily bypassing traditional security solutions. The solution? In order to detect and respond to these attacks security teams need visibility into what code is running on their systems.</p><p>In this episode of CyberWire-X, guest Jonas Walker from Fortinet shares his insights with the CyberWire's Rick Howard, and Ell Marquez of sponsor Intezer offers her thoughts to the CyberWire's Dave Bittner.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1775</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5fc22ae0-e041-11eb-8b20-afcea61ce9d6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4602781262.mp3?updated=1625784591" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Taree Reardon: A voice for women in cyber. [Threat Analyst] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/57/notes</link>
      <description>Senior Threat Analyst and Shift Lead for VMware Taree Reardon shares her journey to becoming leader for women in the cybersecurity field. A big gamer who has always been interested in hacking and forensics, Taree found her passion while learning about cybersecurity. She's dedicated to diversity and inclusion and found her footing on a team made up of 50% women. Taree spends her days tracking and blocking attacks and as a champion for women. Trusting yourself is top on her list of advice. We thank Taree for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 11 Jul 2021 07:00:00 -0000</pubDate>
      <itunes:title>Taree Reardon: A voice for women in cyber. [Threat Analyst] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>57</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Senior Threat Analyst and Shift Lead at VMware Taree Reardon shares her journey to becoming leader for women in the cybersecurity field. </itunes:subtitle>
      <itunes:summary>Senior Threat Analyst and Shift Lead for VMware Taree Reardon shares her journey to becoming leader for women in the cybersecurity field. A big gamer who has always been interested in hacking and forensics, Taree found her passion while learning about cybersecurity. She's dedicated to diversity and inclusion and found her footing on a team made up of 50% women. Taree spends her days tracking and blocking attacks and as a champion for women. Trusting yourself is top on her list of advice. We thank Taree for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Senior Threat Analyst and Shift Lead for VMware Taree Reardon shares her journey to becoming leader for women in the cybersecurity field. A big gamer who has always been interested in hacking and forensics, Taree found her passion while learning about cybersecurity. She's dedicated to diversity and inclusion and found her footing on a team made up of 50% women. Taree spends her days tracking and blocking attacks and as a champion for women. Trusting yourself is top on her list of advice. We thank Taree for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>371</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[154c70e0-df67-11eb-aec1-0f9e6dfa0963]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2415286151.mp3?updated=1625691598" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dealing illicit goods on encrypted chat apps. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/191/notes</link>
      <description>Guest Daniel Kats, Senior Principal Research Engineer at NortonLifeLock, joins Dave to discuss his team's work, "Encrypted Chat Apps Doubling as Illegal Marketplaces." Encrypted chat apps are gaining popularity worldwide due to their central premise of not sending user data to tech giants. Some popular examples include WhatsApp, Telegram and Signal. These apps have also been adopted by businesses to securely communicate directly to their users. Additionally, these apps have been instrumental to subverting authoritarian regimes.
However, NortonLifeLock found that encrypted chat apps are also being used by criminals to sell illegal goods. Because content moderation is, by design, nearly impossible on these apps, they allow for an easy vector for dealers of illicit goods to communicate directly to customers without fear of law enforcement involvement.
The research can be found here:
Encrypted Chat Apps Doubling as Illegal Marketplaces

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Jul 2021 07:00:00 -0000</pubDate>
      <itunes:title>Dealing illicit goods on encrypted chat apps. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>191</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Daniel Kats, Senior Principal Research Engineer at NortonLifeLock, joins Dave to discuss his team's work, "Encrypted Chat Apps Doubling as Illegal Marketplaces." Encrypted chat apps are gaining popularity worldwide due to their central premise of not sending user data to tech giants. Some popular examples include WhatsApp, Telegram and Signal. These apps have also been adopted by businesses to securely communicate directly to their users. Additionally, these apps have been instrumental to subverting authoritarian regimes.
However, NortonLifeLock found that encrypted chat apps are also being used by criminals to sell illegal goods. Because content moderation is, by design, nearly impossible on these apps, they allow for an easy vector for dealers of illicit goods to communicate directly to customers without fear of law enforcement involvement.
The research can be found here:
Encrypted Chat Apps Doubling as Illegal Marketplaces

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Daniel Kats, Senior Principal Research Engineer at NortonLifeLock, joins Dave to discuss his team's work, "Encrypted Chat Apps Doubling as Illegal Marketplaces." Encrypted chat apps are gaining popularity worldwide due to their central premise of not sending user data to tech giants. Some popular examples include WhatsApp, Telegram and Signal. These apps have also been adopted by businesses to securely communicate directly to their users. Additionally, these apps have been instrumental to subverting authoritarian regimes.</p><p>However, NortonLifeLock found that encrypted chat apps are also being used by criminals to sell illegal goods. Because content moderation is, by design, nearly impossible on these apps, they allow for an easy vector for dealers of illicit goods to communicate directly to customers without fear of law enforcement involvement.</p><p>The research can be found here:</p><ul><li><a href="https://www.nortonlifelock.com/blogs/norton-labs/chat-apps-illegal-marketplaces">Encrypted Chat Apps Doubling as Illegal Marketplaces</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1249</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f467f00e-df6e-11eb-9893-ff0234f32eab]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4813368707.mp3?updated=1685126261" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kaseya continues to work through its REvil days, as does the US Administration. In other news, there’s cyberespionage in Asia, the PrintNightmare fix, and Black Widow as phishbait. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1371/notes</link>
      <description>Kaseya continues to work through remediation of the VSA vulnerability exploited by REvil, with completion expected Sunday afternoon. And while REvil has made a nuisance of itself, this time they may not have seen a big payday, or at least not yet. The US is still considering its retaliatory and other options in the big ransomware case. China’s MSS is active against targets in Asia. Andrea Little Limbago from Interos looks at Government access to data analysis. Our guest is Leon Gilbert from Unisys with data from their Digital Workplace Insights report. And scammers are baiting their hooks with Black Widow lures.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/131
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 09 Jul 2021 19:20:00 -0000</pubDate>
      <itunes:title>Kaseya continues to work through its REvil days, as does the US Administration. In other news, there’s cyberespionage in Asia, the PrintNightmare fix, and Black Widow as phishbait. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1371</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Kaseya continues to work through remediation of the VSA vulnerability exploited by REvil, with completion expected Sunday afternoon. And while REvil has made a nuisance of itself, this time they may not have seen a big payday, or at least not yet. The US is still considering its retaliatory and other options in the big ransomware case. China’s MSS is active against targets in Asia. Andrea Little Limbago from Interos looks at Government access to data analysis. Our guest is Leon Gilbert from Unisys with data from their Digital Workplace Insights report. And scammers are baiting their hooks with Black Widow lures.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/131
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kaseya continues to work through remediation of the VSA vulnerability exploited by REvil, with completion expected Sunday afternoon. And while REvil has made a nuisance of itself, this time they may not have seen a big payday, or at least not yet. The US is still considering its retaliatory and other options in the big ransomware case. China’s MSS is active against targets in Asia. Andrea Little Limbago from Interos looks at Government access to data analysis. Our guest is Leon Gilbert from Unisys with data from their Digital Workplace Insights report. And scammers are baiting their hooks with Black Widow lures.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/131</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1696</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0a8c637c-364d-11eb-b082-6fb69cc3be21]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1467909283.mp3?updated=1702655889" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber conflict sputters in Ukraine? Kaseya delays VSA patch, offers assistance to REvil’s victims. US mulls retaliation for privateering. PrintNightmare patch. Another extradition run at Julian Assange.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1370/notes</link>
      <description>Ukrainian government websites may have come under an unspecified cyberattack early this week. Kaseya delays its VSA patch until Sunday, and offers assistance to victims of VSA exploitation by REvil. The US continues to mull its response to Russia over REvil and Cozy Bear. A small electric utility’s business systems go offline after a ransomware attack. Microsoft continues to grapple with PrintNightmare. Caleb Barlow from CynergisTek on the changing Cyber Insurance landscape. Our guest is Kwame Yamgnane from Qwasar on how he seeks to inspire minority kids to code. And the US will try again to get Julian Assange extradited. 
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/130
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 08 Jul 2021 20:20:00 -0000</pubDate>
      <itunes:title>Cyber conflict sputters in Ukraine? Kaseya delays VSA patch, offers assistance to REvil’s victims. US mulls retaliation for privateering. PrintNightmare patch. Another extradition run at Julian Assange.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1370</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ukrainian government websites may have come under an unspecified cyberattack early this week. Kaseya delays its VSA patch until Sunday, and offers assistance to victims of VSA exploitation by REvil. The US continues to mull its response to Russia over REvil and Cozy Bear. A small electric utility’s business systems go offline after a ransomware attack. Microsoft continues to grapple with PrintNightmare. Caleb Barlow from CynergisTek on the changing Cyber Insurance landscape. Our guest is Kwame Yamgnane from Qwasar on how he seeks to inspire minority kids to code. And the US will try again to get Julian Assange extradited. 
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/130
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ukrainian government websites may have come under an unspecified cyberattack early this week. Kaseya delays its VSA patch until Sunday, and offers assistance to victims of VSA exploitation by REvil. The US continues to mull its response to Russia over REvil and Cozy Bear. A small electric utility’s business systems go offline after a ransomware attack. Microsoft continues to grapple with PrintNightmare. Caleb Barlow from CynergisTek on the changing Cyber Insurance landscape. Our guest is Kwame Yamgnane from Qwasar on how he seeks to inspire minority kids to code. And the US will try again to get Julian Assange extradited. </p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/130</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1424</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0a4e76fc-364d-11eb-b082-cb282d260235]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8344525386.mp3?updated=1702656364" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kaseya works on patching VSA as Washington mulls retaliation and Moscow says it has nothing to do with it. Microsoft patches PrintNightmare. The Lazarus Group is back.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1369/notes</link>
      <description>Kaseya continues to work on patching its VSA products. The US mulls retaliation for the Kaseya ransomware campaign, as well as for Cozy Bear’s attempt on the Republican National Committee and Fancy Bear’s brute-forcing efforts. (Russia denies any wrongdoing.) Current events phishbait. Microsoft patches PrintNightmare. Joe Carrigan looks at recent updates to Google’s Scorecards tool. Our guest Umesh Sachdev of Uniphore describes his entrepreneurial journey. And the Lazarus Group is back, phishing for defense workers.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/129
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 07 Jul 2021 20:05:00 -0000</pubDate>
      <itunes:title>Kaseya works on patching VSA as Washington mulls retaliation and Moscow says it has nothing to do with it. Microsoft patches PrintNightmare. The Lazarus Group is back.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1369</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Kaseya continues to work on patching its VSA products. The US mulls retaliation for the Kaseya ransomware campaign, as well as for Cozy Bear’s attempt on the Republican National Committee and Fancy Bear’s brute-forcing efforts. (Russia denies any wrongdoing.) Current events phishbait. Microsoft patches PrintNightmare. Joe Carrigan looks at recent updates to Google’s Scorecards tool. Our guest Umesh Sachdev of Uniphore describes his entrepreneurial journey. And the Lazarus Group is back, phishing for defense workers.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/129
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kaseya continues to work on patching its VSA products. The US mulls retaliation for the Kaseya ransomware campaign, as well as for Cozy Bear’s attempt on the Republican National Committee and Fancy Bear’s brute-forcing efforts. (Russia denies any wrongdoing.) Current events phishbait. Microsoft patches PrintNightmare. Joe Carrigan looks at recent updates to Google’s Scorecards tool. Our guest Umesh Sachdev of Uniphore describes his entrepreneurial journey. And the Lazarus Group is back, phishing for defense workers.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/129</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1350</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[09bcb4f6-364d-11eb-b082-3b81a38e42e4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8342032799.mp3?updated=1702656373" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Kaseya ransomware incident. Ransomware threats to industrial firms. Malicious Android apps stole Facebook credentials. The Tokyo Olympics and cyber risk. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1368/notes</link>
      <description>Updates on the Kaseya ransomware incident, as REvil strikes again. Concerns about other ransomware attacks against industrial targets rise. Google expels credential-stealing apps from the Play Store. Online gamers draw various threat actors. Carole Theriault examines the elements that could put you in the crosshairs for ransomware. Ben Yelin has an update on the Facebook antitrust case. And the Tokyo Olympic Games will be on alert for cyberattacks.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/128
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Jul 2021 20:30:00 -0000</pubDate>
      <itunes:title>The Kaseya ransomware incident. Ransomware threats to industrial firms. Malicious Android apps stole Facebook credentials. The Tokyo Olympics and cyber risk. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1368</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Updates on the Kaseya ransomware incident, as REvil strikes again. Concerns about other ransomware attacks against industrial targets rise. Google expels credential-stealing apps from the Play Store. Online gamers draw various threat actors. Carole Theriault examines the elements that could put you in the crosshairs for ransomware. Ben Yelin has an update on the Facebook antitrust case. And the Tokyo Olympic Games will be on alert for cyberattacks.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/128
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Updates on the Kaseya ransomware incident, as REvil strikes again. Concerns about other ransomware attacks against industrial targets rise. Google expels credential-stealing apps from the Play Store. Online gamers draw various threat actors. Carole Theriault examines the elements that could put you in the crosshairs for ransomware. Ben Yelin has an update on the Facebook antitrust case. And the Tokyo Olympic Games will be on alert for cyberattacks.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/128</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1507</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[09a86d34-364d-11eb-b082-5fc99f0220f3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2914614431.mp3?updated=1702656538" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dwayne Price: Sharing information. [Project Management] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/56/notes</link>
      <description>Senior technical project manager Dwayne Price takes us on his career journey from databases to project management. Always fascinated with technology and one who appreciates the aspects of the business side of a computer implementations, Dwayne attended UMBC for both his undergraduate and graduate degrees in information systems management. A strong Unix administration background prepared him to understand the relationship between Unix administration and database security. He recommends those interested in cybersecurity check out the NICE Framework as it speaks to all the various different types of roles in cybersecurity, Dwayne prides himself on his communication skills and openness. We thank Dwayne for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 04 Jul 2021 07:00:00 -0000</pubDate>
      <itunes:title>Dwayne Price: Sharing information. [Project Management] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>56</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Senior technical project manager Dwayne Price takes us on his career journey from databases to project management. </itunes:subtitle>
      <itunes:summary>Senior technical project manager Dwayne Price takes us on his career journey from databases to project management. Always fascinated with technology and one who appreciates the aspects of the business side of a computer implementations, Dwayne attended UMBC for both his undergraduate and graduate degrees in information systems management. A strong Unix administration background prepared him to understand the relationship between Unix administration and database security. He recommends those interested in cybersecurity check out the NICE Framework as it speaks to all the various different types of roles in cybersecurity, Dwayne prides himself on his communication skills and openness. We thank Dwayne for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Senior technical project manager Dwayne Price takes us on his career journey from databases to project management. Always fascinated with technology and one who appreciates the aspects of the business side of a computer implementations, Dwayne attended UMBC for both his undergraduate and graduate degrees in information systems management. A strong Unix administration background prepared him to understand the relationship between Unix administration and database security. He recommends those interested in cybersecurity check out the NICE Framework as it speaks to all the various different types of roles in cybersecurity, Dwayne prides himself on his communication skills and openness. We thank Dwayne for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>370</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a49e1776-d9f4-11eb-9c79-c3655d7f1929]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1786703400.mp3?updated=1625092743" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Malware in pirated Windows installation files. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/190/notes</link>
      <description>Guest Tom Roter from Minera Labs joins Dave to discuss his team research: "Rigging a Windows Installation." It is common knowledge that pirated software might contain malware, yet millions still put themselves and their devices at risk and download from dubious sources. It is even more surprising to see the popularity of torrented operating system installations, which are ranked at the top of most torrent tracker ranking lists. Today we will prove conventional wisdom right and show off a devious, yet clever attack chain employed by an infected Windows 10 image, frequently shared and downloaded by tens of thousands of users.
Over the last year, numerous malicious PowerShell events popped up in our telemetry. The events caught our attention because a payload was being downloaded into the “C:\Windows” directory, which is usually well guarded under NTFS permissions, this implies that the attacker had very high privilege on the compromised system. 
The research can be found here:
Rigging a Windows installation 

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Jul 2021 07:00:00 -0000</pubDate>
      <itunes:title>Malware in pirated Windows installation files. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>190</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Tom Roter from Minera Labs joins Dave to discuss his team research: "Rigging a Windows Installation." It is common knowledge that pirated software might contain malware, yet millions still put themselves and their devices at risk and download from dubious sources. It is even more surprising to see the popularity of torrented operating system installations, which are ranked at the top of most torrent tracker ranking lists. Today we will prove conventional wisdom right and show off a devious, yet clever attack chain employed by an infected Windows 10 image, frequently shared and downloaded by tens of thousands of users.
Over the last year, numerous malicious PowerShell events popped up in our telemetry. The events caught our attention because a payload was being downloaded into the “C:\Windows” directory, which is usually well guarded under NTFS permissions, this implies that the attacker had very high privilege on the compromised system. 
The research can be found here:
Rigging a Windows installation 

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Tom Roter from Minera Labs joins Dave to discuss his team research: "Rigging a Windows Installation." It is common knowledge that pirated software might contain malware, yet millions still put themselves and their devices at risk and download from dubious sources. It is even more surprising to see the popularity of torrented operating system installations, which are ranked at the top of most torrent tracker ranking lists. Today we will prove conventional wisdom right and show off a devious, yet clever attack chain employed by an infected Windows 10 image, frequently shared and downloaded by tens of thousands of users.</p><p>Over the last year, numerous malicious PowerShell events popped up in our telemetry. The events caught our attention because a payload was being downloaded into the “C:\Windows” directory, which is usually well guarded under NTFS permissions, this implies that the attacker had very high privilege on the compromised system. </p><p>The research can be found here:</p><ul><li><a href="https://blog.minerva-labs.com/rigging-a-windows-installation">Rigging a Windows installation </a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>845</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ec2c7964-d9f6-11eb-932b-bb03791f44a7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7974143075.mp3?updated=1685126249" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mitigating PrintNightmare. New ransomware strains in circulation. Router firmware patched. Russia denies brute-forcing anyone. What the reinsurance rates tell us. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1367/notes</link>
      <description>Mitigations for the PrintNightmare vulnerability are suggested. Wizard Spider has a new strain of ransomware in its toolkit. A new RagnarLocker strain is in circulation. NETGEAR patches router firmware. Russia reacts to US and US reports of a GRU brute-forcing campaign: Moscow says it didn’t do it. Kevin Magee from Microsoft shares some of the tools he uses to keep himself and his team up to date. Our guest is Andrew Patel from F-Secure on how to prepare security teams for AI-powered malware. And a quick look at the true costs of cybercrime.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/127
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 02 Jul 2021 20:20:00 -0000</pubDate>
      <itunes:title>Mitigating PrintNightmare. New ransomware strains in circulation. Router firmware patched. Russia denies brute-forcing anyone. What the reinsurance rates tell us. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1367</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Mitigations for the PrintNightmare vulnerability are suggested. Wizard Spider has a new strain of ransomware in its toolkit. A new RagnarLocker strain is in circulation. NETGEAR patches router firmware. Russia reacts to US and US reports of a GRU brute-forcing campaign: Moscow says it didn’t do it. Kevin Magee from Microsoft shares some of the tools he uses to keep himself and his team up to date. Our guest is Andrew Patel from F-Secure on how to prepare security teams for AI-powered malware. And a quick look at the true costs of cybercrime.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/127
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Mitigations for the PrintNightmare vulnerability are suggested. Wizard Spider has a new strain of ransomware in its toolkit. A new RagnarLocker strain is in circulation. NETGEAR patches router firmware. Russia reacts to US and US reports of a GRU brute-forcing campaign: Moscow says it didn’t do it. Kevin Magee from Microsoft shares some of the tools he uses to keep himself and his team up to date. Our guest is Andrew Patel from F-Secure on how to prepare security teams for AI-powered malware. And a quick look at the true costs of cybercrime.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/127</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1560</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0a78583c-364d-11eb-b082-eba0b72fe17d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3012187374.mp3?updated=1702656550" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Large-scale GRU brute-forcing campaign in progress. IndigoZebra in Afghanistan. A ransomware gang scorecard. A cyber most-wanted list. Are the phone lines open? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1366/notes</link>
      <description>US and British authorities warn of a large-scale GRU campaign aimed at brute-forcing its way into European and American organizations. Reports of a major cyberattack on German critical infrastructure appear very much exaggerated. IndigoZebra uses Dropbox in ministry-to-ministry deception aimed at the Afghan government. Currently active ransomware groups are profiled, and REvil is now going after Linux systems in addition to Windows machines. A cyber most-wanted, and priorities in a US Treasury campaign against money laundering. Malek Ben Salem looks at supply chain security. Our guest is Brandon Hoffman of Intel471 with insights on China’s data underground. And, hey, it’s Dmitri from Yurga, long-time listener, first-time caller.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/126
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 01 Jul 2021 20:30:00 -0000</pubDate>
      <itunes:title>Large-scale GRU brute-forcing campaign in progress. IndigoZebra in Afghanistan. A ransomware gang scorecard. A cyber most-wanted list. Are the phone lines open? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1366</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>US and British authorities warn of a large-scale GRU campaign aimed at brute-forcing its way into European and American organizations. Reports of a major cyberattack on German critical infrastructure appear very much exaggerated. IndigoZebra uses Dropbox in ministry-to-ministry deception aimed at the Afghan government. Currently active ransomware groups are profiled, and REvil is now going after Linux systems in addition to Windows machines. A cyber most-wanted, and priorities in a US Treasury campaign against money laundering. Malek Ben Salem looks at supply chain security. Our guest is Brandon Hoffman of Intel471 with insights on China’s data underground. And, hey, it’s Dmitri from Yurga, long-time listener, first-time caller.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/126
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>US and British authorities warn of a large-scale GRU campaign aimed at brute-forcing its way into European and American organizations. Reports of a major cyberattack on German critical infrastructure appear very much exaggerated. IndigoZebra uses Dropbox in ministry-to-ministry deception aimed at the Afghan government. Currently active ransomware groups are profiled, and REvil is now going after Linux systems in addition to Windows machines. A cyber most-wanted, and priorities in a US Treasury campaign against money laundering. Malek Ben Salem looks at supply chain security. Our guest is Brandon Hoffman of Intel471 with insights on China’s data underground. And, hey, it’s Dmitri from Yurga, long-time listener, first-time caller.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/126</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1522</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0a638c90-364d-11eb-b082-677993ff7c2d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5187372161.mp3?updated=1702656625" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A look at some threats to ICS endpoints. EternalBlue remains a problem. US preparing attribution of the Microsoft Exchange Server hack. DoubleVPN seized. An arrest in the Gozi case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1365/notes</link>
      <description>A report on threats to industrial control systems is out, and it focuses on ransomware, coinjacking, and legacy malware. EternalBlue remains a problem. The US is preparing a formal attribution in the case of the Microsoft Exchange Server campaign. An international police operation has taken down DoubleVPN, and the authorities seem pretty pleased with their work. Joe Carrigan examines vulnerabilities in systems from Dell. Our guest is Vikram Thakur from Symantec on Multi-Factor Authentication evasion. And the guy who allegedly provided the Gozi banking malware with its bulletproof hosting has been collared in Bogota.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/125
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 30 Jun 2021 20:20:00 -0000</pubDate>
      <itunes:title>A look at some threats to ICS endpoints. EternalBlue remains a problem. US preparing attribution of the Microsoft Exchange Server hack. DoubleVPN seized. An arrest in the Gozi case.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1365</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A report on threats to industrial control systems is out, and it focuses on ransomware, coinjacking, and legacy malware. EternalBlue remains a problem. The US is preparing a formal attribution in the case of the Microsoft Exchange Server campaign. An international police operation has taken down DoubleVPN, and the authorities seem pretty pleased with their work. Joe Carrigan examines vulnerabilities in systems from Dell. Our guest is Vikram Thakur from Symantec on Multi-Factor Authentication evasion. And the guy who allegedly provided the Gozi banking malware with its bulletproof hosting has been collared in Bogota.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/125
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A report on threats to industrial control systems is out, and it focuses on ransomware, coinjacking, and legacy malware. EternalBlue remains a problem. The US is preparing a formal attribution in the case of the Microsoft Exchange Server campaign. An international police operation has taken down DoubleVPN, and the authorities seem pretty pleased with their work. Joe Carrigan examines vulnerabilities in systems from Dell. Our guest is Vikram Thakur from Symantec on Multi-Factor Authentication evasion. And the guy who allegedly provided the Gozi banking malware with its bulletproof hosting has been collared in Bogota.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/125</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1434</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[083ad75c-364d-11eb-b082-7fa8fb8d9cac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2361201097.mp3?updated=1702656699" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A look at the cybercriminal underground, its commodity tools, its rising gangs, how it recruits talent and affiliates, and even how it raises investments. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1634/notes</link>
      <description>Legitimate tools are abused as commodity initial access payloads. Hades ransomware is circulating in some new sectors. Criminal markets are sharing more features with legitimate markets, including advertising, recruiting, and even funding rounds. Cybercrime uses cryptocurrency, but the key to success may be location more than technology. Ben Yelin describes insurance companies collaborating on cyber breach data collection. Our guest is Michael Osborn from Moody's on a recent rash of cyber attacks hitting higher education. And Denmark’s central bank is reported to have been a victim of the SolarWinds compromise.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/124
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Jun 2021 20:00:00 -0000</pubDate>
      <itunes:title>A look at the cybercriminal underground, its commodity tools, its rising gangs, how it recruits talent and affiliates, and even how it raises investments. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1364</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Legitimate tools are abused as commodity initial access payloads. Hades ransomware is circulating in some new sectors. Criminal markets are sharing more features with legitimate markets, including advertising, recruiting, and even funding rounds. Cybercrime uses cryptocurrency, but the key to success may be location more than technology. Ben Yelin describes insurance companies collaborating on cyber breach data collection. Our guest is Michael Osborn from Moody's on a recent rash of cyber attacks hitting higher education. And Denmark’s central bank is reported to have been a victim of the SolarWinds compromise.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/124
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Legitimate tools are abused as commodity initial access payloads. Hades ransomware is circulating in some new sectors. Criminal markets are sharing more features with legitimate markets, including advertising, recruiting, and even funding rounds. Cybercrime uses cryptocurrency, but the key to success may be location more than technology. Ben Yelin describes insurance companies collaborating on cyber breach data collection. Our guest is Michael Osborn from Moody's on a recent rash of cyber attacks hitting higher education. And Denmark’s central bank is reported to have been a victim of the SolarWinds compromise.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/124</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1463</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[084f980e-364d-11eb-b082-df3e396668b5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3693053555.mp3?updated=1702656683" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Nobelium is back. A signed driver is gamer-focused malware. Idle hands. Third-party cloud risk. Bad practices. A net assessment of national cyber power. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1363/notes</link>
      <description>The SVR’s Nobelium appears to be back, this time with a less-than-fully successful cyberespionage campaign. The Netfilter driver is assessed as malware. Idle hands seem to make for more attacks against online gaming. Mercedes-Benz USA reports a data exposure incident. CISA starts to keep track of bad practices. The International Institute for Strategic Studies publishes a net assessment of national cyber power. Carole Theriault looks at the security implications of frictionless online commerce. Our guest is Clar Rosso from (ISC)2 with insights on Building Resilient Cybersecurity Teams. And Loki is a trickster, and his name is a lousy password.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/123
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 28 Jun 2021 20:00:00 -0000</pubDate>
      <itunes:title>Nobelium is back. A signed driver is gamer-focused malware. Idle hands. Third-party cloud risk. Bad practices. A net assessment of national cyber power. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1363</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The SVR’s Nobelium appears to be back, this time with a less-than-fully successful cyberespionage campaign. The Netfilter driver is assessed as malware. Idle hands seem to make for more attacks against online gaming. Mercedes-Benz USA reports a data exposure incident. CISA starts to keep track of bad practices. The International Institute for Strategic Studies publishes a net assessment of national cyber power. Carole Theriault looks at the security implications of frictionless online commerce. Our guest is Clar Rosso from (ISC)2 with insights on Building Resilient Cybersecurity Teams. And Loki is a trickster, and his name is a lousy password.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/123
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The SVR’s Nobelium appears to be back, this time with a less-than-fully successful cyberespionage campaign. The Netfilter driver is assessed as malware. Idle hands seem to make for more attacks against online gaming. Mercedes-Benz USA reports a data exposure incident. CISA starts to keep track of bad practices. The International Institute for Strategic Studies publishes a net assessment of national cyber power. Carole Theriault looks at the security implications of frictionless online commerce. Our guest is Clar Rosso from (ISC)2 with insights on Building Resilient Cybersecurity Teams. And Loki is a trickster, and his name is a lousy password.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/123</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1398</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[08fc6d90-364d-11eb-b082-efa09fca1f54]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6755764583.mp3?updated=1702656699" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Introducing Security Unlocked: CISO Series with Bret Arsenault–Leading an Inclusive Workforce: Emma Smith, Vodafone </title>
      <link>https://thecyberwire.com/podcasts/security-unlocked-ciso-series/4/notes</link>
      <description>There’s truth in the sentiment, “teamwork makes the dream work.” When team members don’t feel included or heard in their environment, they’re not going to do their best work, so it’s up to managers, supervisors, and even global security directors to foster a workplace and culture that doesn’t allow anyone to be silenced. 
On this episode, Microsoft’s CISO, Bret Arsenault, sits with his friend and peer, Emma Smith, Director of Global Cybersecurity for Vodafone. Throughout the conversation, they discuss returning to in-person work after over a year of being remote and some of the inherent difficulties that come with the change, especially as they relate to inclusivity.  

In This Episode You Will Learn: 

How focusing on digital society, inclusion for all, and the planet allows for practical actions. 

Why 5G is so important for a hybrid workforce. 

Why Emma and Bret support eliminating passwords. 


Some Questions We Ask: 

How does Emma look at inclusion initiatives from an industry perspective? 

What is ‘withstander’ training and why is it crucial for effective leadership? 

What are Emma’s three points of wisdom for security practitioners? 

 
Subscribe:
https://SecurityUnlockedCISOSeries.com

Resources: 
Emma Smith’s LinkedIn. 
https://www.linkedin.com/in/emma-smith-0388aa4b/
Brett Arsenault’s LinkedIn: 
https://www.linkedin.com/in/bret-arsenault-97593b60/ 

Related: 
Security Unlocked: The Microsoft Security Podcast
https://SecurityUnlockedPodcast.com

Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 27 Jun 2021 07:05:00 -0000</pubDate>
      <itunes:title>Introducing Security Unlocked: CISO Series with Bret Arsenault–Leading an Inclusive Workforce: Emma Smith, Vodafone </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Emma Smith, Vodafone</itunes:subtitle>
      <itunes:summary>There’s truth in the sentiment, “teamwork makes the dream work.” When team members don’t feel included or heard in their environment, they’re not going to do their best work, so it’s up to managers, supervisors, and even global security directors to foster a workplace and culture that doesn’t allow anyone to be silenced. 
On this episode, Microsoft’s CISO, Bret Arsenault, sits with his friend and peer, Emma Smith, Director of Global Cybersecurity for Vodafone. Throughout the conversation, they discuss returning to in-person work after over a year of being remote and some of the inherent difficulties that come with the change, especially as they relate to inclusivity.  

In This Episode You Will Learn: 

How focusing on digital society, inclusion for all, and the planet allows for practical actions. 

Why 5G is so important for a hybrid workforce. 

Why Emma and Bret support eliminating passwords. 


Some Questions We Ask: 

How does Emma look at inclusion initiatives from an industry perspective? 

What is ‘withstander’ training and why is it crucial for effective leadership? 

What are Emma’s three points of wisdom for security practitioners? 

 
Subscribe:
https://SecurityUnlockedCISOSeries.com

Resources: 
Emma Smith’s LinkedIn. 
https://www.linkedin.com/in/emma-smith-0388aa4b/
Brett Arsenault’s LinkedIn: 
https://www.linkedin.com/in/bret-arsenault-97593b60/ 

Related: 
Security Unlocked: The Microsoft Security Podcast
https://SecurityUnlockedPodcast.com

Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>There’s truth in the sentiment, “teamwork makes the dream work.” When team members don’t feel included or heard in their environment, they’re not going to do their best work, so it’s up to managers, supervisors, and even global security directors to foster a workplace and culture that doesn’t allow anyone to be silenced. </p><p>On this episode, Microsoft’s CISO, <a href="https://www.linkedin.com/in/bret-arsenault-97593b60/">Bret Arsenault</a>, sits with his friend and peer, <a href="https://www.linkedin.com/in/emma-smith-0388aa4b/">Emma Smith</a>, Director of Global Cybersecurity for Vodafone. Throughout the conversation, they discuss returning to in-person work after over a year of being remote and some of the inherent difficulties that come with the change, especially as they relate to inclusivity.  </p><p><br></p><p><strong>In This Episode You Will Learn:</strong> </p><ul>
<li>How focusing on digital society, inclusion for all, and the planet allows for practical actions. </li>
<li>Why 5G is so important for a hybrid workforce. </li>
<li>Why Emma and Bret support eliminating passwords. </li>
</ul><p><br></p><p><strong>Some Questions We Ask:</strong> </p><ul>
<li>How does Emma look at inclusion initiatives from an industry perspective? </li>
<li>What is ‘withstander’ training and why is it crucial for effective leadership? </li>
<li>What are Emma’s three points of wisdom for security practitioners? </li>
</ul><p> </p><p><strong>Subscribe:</strong></p><p><a href="https://securityunlockedcisoseries.com/">https://SecurityUnlockedCISOSeries.com</a></p><p><br></p><p><strong>Resources:</strong> </p><p>Emma Smith’s LinkedIn. </p><p><a href="https://www.linkedin.com/in/emma-smith-0388aa4b/">https://www.linkedin.com/in/emma-smith-0388aa4b/</a></p><p>Brett Arsenault’s LinkedIn: </p><p><a href="https://www.linkedin.com/in/bret-arsenault-97593b60/">https://www.linkedin.com/in/bret-arsenault-97593b60/</a> </p><p><br></p><p><strong>Related</strong>: </p><p>Security Unlocked: The Microsoft Security Podcast</p><p><a href="https://securityunlockedpodcast.com/">https://SecurityUnlockedPodcast.com</a></p><p><br></p><p><em>Security Unlocked: CISO Series with Bret Arsenault is produced by Microsoft and distributed as part of The CyberWire Network.</em></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2145</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[46d9d48c-d45d-11eb-8e78-a71af857b517]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2503240285.mp3?updated=1665400421" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Maria Thompson-Saeb: Be flexible and make it happen. [Program Management] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/55/notes</link>
      <description>Senior Program Manager for Governance, Risk and Compliance at Illumio, Maria Thompson-Saeb shares experiences that led to her career in cybersecurity. Interested in computers and not a fan of math, Maria opted for information systems management rather than computer science. She started her career as a government contractor. Once in the private sector, Maria moved into the Unix and Linux environments where she says "something that would totally change everything." She gained an interest in security and took it upon herself to train up and move into that realm. Maria notes it was not without roadblocks, but that being flexible helped her address those challenges and make her career in security happen. We thank Maria for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 27 Jun 2021 07:00:00 -0000</pubDate>
      <itunes:title>Maria Thompson-Saeb: Be flexible and make it happen. [Program Management] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>55</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Senior Program Manager for Governance, Risk and Compliance at Illumio, Maria Thompson-Saeb shares her story and advice on a career in cybersecurity. </itunes:subtitle>
      <itunes:summary>Senior Program Manager for Governance, Risk and Compliance at Illumio, Maria Thompson-Saeb shares experiences that led to her career in cybersecurity. Interested in computers and not a fan of math, Maria opted for information systems management rather than computer science. She started her career as a government contractor. Once in the private sector, Maria moved into the Unix and Linux environments where she says "something that would totally change everything." She gained an interest in security and took it upon herself to train up and move into that realm. Maria notes it was not without roadblocks, but that being flexible helped her address those challenges and make her career in security happen. We thank Maria for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Senior Program Manager for Governance, Risk and Compliance at Illumio, Maria Thompson-Saeb shares experiences that led to her career in cybersecurity. Interested in computers and not a fan of math, Maria opted for information systems management rather than computer science. She started her career as a government contractor. Once in the private sector, Maria moved into the Unix and Linux environments where she says "something that would totally change everything." She gained an interest in security and took it upon herself to train up and move into that realm. Maria notes it was not without roadblocks, but that being flexible helped her address those challenges and make her career in security happen. We thank Maria for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>461</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2380676e-d451-11eb-986f-67974315778b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5206705907.mp3?updated=1624392290" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exhibiting advanced APT-like behavior. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/189/notes</link>
      <description>Guest Yonatan Striem-Amit joins Dave to talk about Cybereason's research "Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities." The Cybereason Nocturnus Team responded to several incident response (IR) cases involving infections of the Prometei Botnet against companies in North America, observing that the attackers exploited recently published Microsoft Exchange vulnerabilities (CVE-2021-27065 and CVE-2021-26858) in order to penetrate the network and install malware. Yonatan shares his team's findings of the investigation of the attacks, including the initial foothold sequence of the attackers, the functionality of the different components of the malware, the threat actors’ origin and the bot’s infrastructure.
The research can be found here:
Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Jun 2021 07:00:00 -0000</pubDate>
      <itunes:title>Exhibiting advanced APT-like behavior. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>189</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Yonatan Striem-Amit joins Dave to talk about Cybereason's research "Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities." The Cybereason Nocturnus Team responded to several incident response (IR) cases involving infections of the Prometei Botnet against companies in North America, observing that the attackers exploited recently published Microsoft Exchange vulnerabilities (CVE-2021-27065 and CVE-2021-26858) in order to penetrate the network and install malware. Yonatan shares his team's findings of the investigation of the attacks, including the initial foothold sequence of the attackers, the functionality of the different components of the malware, the threat actors’ origin and the bot’s infrastructure.
The research can be found here:
Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Yonatan Striem-Amit joins Dave to talk about Cybereason's research "Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities." The Cybereason Nocturnus Team responded to several incident response (IR) cases involving infections of the Prometei Botnet against companies in North America, observing that the attackers exploited recently published Microsoft Exchange vulnerabilities (CVE-2021-27065 and CVE-2021-26858) in order to penetrate the network and install malware. Yonatan shares his team's findings of the investigation of the attacks, including the initial foothold sequence of the attackers, the functionality of the different components of the malware, the threat actors’ origin and the bot’s infrastructure.</p><p>The research can be found here:</p><ul><li><a href="https://www.cybereason.com/blog/prometei-botnet-exploiting-microsoft-exchange-vulnerabilities">Prometei Botnet Exploiting Microsoft Exchange Vulnerabilities</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1305</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[45714d98-d451-11eb-8f5c-2f5d474959d2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7535834898.mp3?updated=1685125530" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>REvil is back. Misconfiguration with major effect. Mining Monero. Judgments against market-rigging hackers. A FIN7 operator is sentenced.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1362/notes</link>
      <description>REvil hits a Brazilian medical diagnostics company and a British fashion retailer. A misconfigured cloud database exposes millions of WordPress user records. A new cryptojacker is deploying XMrig to mine Monero. A judgment is issued against a hacker and one of the traders he worked with to trade securities on non-public information. Johannes Ullrich from SANS on server site request forgery and errors in validating IP addresses. Our guest is Tom Patterson from Unisys reacts to the DOJ launching a ransomware taskforce. A FIN7 operator is sentenced to seven years.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/122
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 25 Jun 2021 20:10:00 -0000</pubDate>
      <itunes:title>REvil is back. Misconfiguration with major effect. Mining Monero. Judgments against market-rigging hackers. A FIN7 operator is sentenced.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1362</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>REvil hits a Brazilian medical diagnostics company and a British fashion retailer. A misconfigured cloud database exposes millions of WordPress user records. A new cryptojacker is deploying XMrig to mine Monero. A judgment is issued against a hacker and one of the traders he worked with to trade securities on non-public information. Johannes Ullrich from SANS on server site request forgery and errors in validating IP addresses. Our guest is Tom Patterson from Unisys reacts to the DOJ launching a ransomware taskforce. A FIN7 operator is sentenced to seven years.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/122
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>REvil hits a Brazilian medical diagnostics company and a British fashion retailer. A misconfigured cloud database exposes millions of WordPress user records. A new cryptojacker is deploying XMrig to mine Monero. A judgment is issued against a hacker and one of the traders he worked with to trade securities on non-public information. Johannes Ullrich from SANS on server site request forgery and errors in validating IP addresses. Our guest is Tom Patterson from Unisys reacts to the DOJ launching a ransomware taskforce. A FIN7 operator is sentenced to seven years.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/122</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1290</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0774ed44-364d-11eb-b082-db09f6d8ca05]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1754527076.mp3?updated=1690289971" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Notes on current cyber criminal campaigns. Will Exercise Cyber Flag show the way toward an expedition to the virtual shores of a metaphorical Tripoli? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1361/notes</link>
      <description>The ChaChi Trojan is out, about, and interested in educational institutions. Bogus free subscription cancellations figure in a social engineering campaign designed to get the victims to download BazarLoader. Ursnif is automating fraudulent bank transfers with Cerberus Android malware. The US Senate invites the Department of Defense to think of ransomware as analogous to piracy, and Defense says it’s thinking along those lines. And rest in peace, John McAfee.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/121
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 24 Jun 2021 19:15:00 -0000</pubDate>
      <itunes:title>Notes on current cyber criminal campaigns. Will Exercise Cyber Flag show the way toward an expedition to the virtual shores of a metaphorical Tripoli? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1361</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The ChaChi Trojan is out, about, and interested in educational institutions. Bogus free subscription cancellations figure in a social engineering campaign designed to get the victims to download BazarLoader. Ursnif is automating fraudulent bank transfers with Cerberus Android malware. The US Senate invites the Department of Defense to think of ransomware as analogous to piracy, and Defense says it’s thinking along those lines. And rest in peace, John McAfee.
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/121
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The ChaChi Trojan is out, about, and interested in educational institutions. Bogus free subscription cancellations figure in a social engineering campaign designed to get the victims to download BazarLoader. Ursnif is automating fraudulent bank transfers with Cerberus Android malware. The US Senate invites the Department of Defense to think of ransomware as analogous to piracy, and Defense says it’s thinking along those lines. And rest in peace, John McAfee.</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/121</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1571</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[078a7e20-364d-11eb-b082-2303744c6768]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8376784044.mp3?updated=1690289953" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage, in Central Europe and South Asia. Iranian state media sites seized. Sale of inspection and tracing tools leads to an indictment in France. Cooperation, foreign and domestic.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1360/notes</link>
      <description>ReverseRat looks like a state-run espionage tool active in South and Central Asia. The US Justice Department seizes thirty-three sites run by media aligned with the Iranian government. Poland offers more clarity on a cyberespionage campaign it attributes to Russia. An intercept and inspection company’s executives are indicted for complicity with torture. NSA opens a Cybersecurity Collaboration Center for industry. Joe Carrigan examines Apple’s push to replace passwords. Our guest is Shehzad Merchant of Gigamon with a breakdown on security guidelines for hybrid cloud programs. And the FSB says it hopes for “reciprocity.”
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/120
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 23 Jun 2021 20:00:00 -0000</pubDate>
      <itunes:title>Cyberespionage, in Central Europe and South Asia. Iranian state media sites seized. Sale of inspection and tracing tools leads to an indictment in France. Cooperation, foreign and domestic.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1360</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>ReverseRat looks like a state-run espionage tool active in South and Central Asia. The US Justice Department seizes thirty-three sites run by media aligned with the Iranian government. Poland offers more clarity on a cyberespionage campaign it attributes to Russia. An intercept and inspection company’s executives are indicted for complicity with torture. NSA opens a Cybersecurity Collaboration Center for industry. Joe Carrigan examines Apple’s push to replace passwords. Our guest is Shehzad Merchant of Gigamon with a breakdown on security guidelines for hybrid cloud programs. And the FSB says it hopes for “reciprocity.”
For links to all of today's stories check out our CyberWire daily news briefing:
https://www.thecyberwire.com/newsletters/daily-briefing/10/120
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>ReverseRat looks like a state-run espionage tool active in South and Central Asia. The US Justice Department seizes thirty-three sites run by media aligned with the Iranian government. Poland offers more clarity on a cyberespionage campaign it attributes to Russia. An intercept and inspection company’s executives are indicted for complicity with torture. NSA opens a Cybersecurity Collaboration Center for industry. Joe Carrigan examines Apple’s push to replace passwords. Our guest is Shehzad Merchant of Gigamon with a breakdown on security guidelines for hybrid cloud programs. And the FSB says it hopes for “reciprocity.”</p><p>For links to all of today's stories check out our CyberWire daily news briefing:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/120</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1668</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0824f0f4-364d-11eb-b082-6b23303c2391]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4301754876.mp3?updated=1690289930" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Malicious Google ads lead to spoofed Signal and Telegram pages, and then on to malware. LV’s REvil roots. Vulnerable defense contractors. And bogus AIS position reports in the Black Sea. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1359/notes</link>
      <description>Malicious Google ads for Signal and Telegram are being used to lure the unwary into downloading an info-stealer. LV ransomware looks like repurposed REvil. A study of the US Defense Industrial Base finds that many smaller firms, particularly ones that specialize in research and development, are vulnerable to ransomware attacks. Rick Howard ponders how we categorize state sponsored cybercrime. Our guest is Sudheer Koneru from Zenoti on how data privacy impacts salons and spas. And it’s high noon in the Black Sea. Do you know where your warships are?
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/119
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Jun 2021 20:00:00 -0000</pubDate>
      <itunes:title>Malicious Google ads lead to spoofed Signal and Telegram pages, and then on to malware. LV’s REvil roots. Vulnerable defense contractors. And bogus AIS position reports in the Black Sea. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1359</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Malicious Google ads for Signal and Telegram are being used to lure the unwary into downloading an info-stealer. LV ransomware looks like repurposed REvil. A study of the US Defense Industrial Base finds that many smaller firms, particularly ones that specialize in research and development, are vulnerable to ransomware attacks. Rick Howard ponders how we categorize state sponsored cybercrime. Our guest is Sudheer Koneru from Zenoti on how data privacy impacts salons and spas. And it’s high noon in the Black Sea. Do you know where your warships are?
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/119
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Malicious Google ads for Signal and Telegram are being used to lure the unwary into downloading an info-stealer. LV ransomware looks like repurposed REvil. A study of the US Defense Industrial Base finds that many smaller firms, particularly ones that specialize in research and development, are vulnerable to ransomware attacks. Rick Howard ponders how we categorize state sponsored cybercrime. Our guest is Sudheer Koneru from Zenoti on how data privacy impacts salons and spas. And it’s high noon in the Black Sea. Do you know where your warships are?</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/119</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1281</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[08660b98-364d-11eb-b082-774c1c0c0651]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1305407208.mp3?updated=1690289909" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>South Korea’s nuclear research institute discloses cyberespionage incident. Norway attributes 2018 incident to China. Poland blames Russia for email hacking as NATO clarifies alliance cyber policy. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1358/notes</link>
      <description>The South Korean nuclear research organization sustained an apparent cyberespionage incident. Norway’s investigation of its 2018 breach of government networks concludes that China’s APT31 was behind it. Poland accuses Russia in a long-running email hacking case. Our guest is Mark Testoni from SAP NS2 on where the Justice Department should focus during its upcoming cyber review. Chris Novak of Verizon on financial vs. espionage breaches. NATO seeks to clarify its policies in cyberspace, including a recommitment to Article 5 and a revision of the Tallinn Manual.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/118
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 21 Jun 2021 20:25:00 -0000</pubDate>
      <itunes:title>South Korea’s nuclear research institute discloses cyberespionage incident. Norway attributes 2018 incident to China. Poland blames Russia for email hacking as NATO clarifies alliance cyber policy. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1358</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The South Korean nuclear research organization sustained an apparent cyberespionage incident. Norway’s investigation of its 2018 breach of government networks concludes that China’s APT31 was behind it. Poland accuses Russia in a long-running email hacking case. Our guest is Mark Testoni from SAP NS2 on where the Justice Department should focus during its upcoming cyber review. Chris Novak of Verizon on financial vs. espionage breaches. NATO seeks to clarify its policies in cyberspace, including a recommitment to Article 5 and a revision of the Tallinn Manual.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/118
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The South Korean nuclear research organization sustained an apparent cyberespionage incident. Norway’s investigation of its 2018 breach of government networks concludes that China’s APT31 was behind it. Poland accuses Russia in a long-running email hacking case. Our guest is Mark Testoni from SAP NS2 on where the Justice Department should focus during its upcoming cyber review. Chris Novak of Verizon on financial vs. espionage breaches. NATO seeks to clarify its policies in cyberspace, including a recommitment to Article 5 and a revision of the Tallinn Manual.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/118</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1472</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[08e72fde-364d-11eb-b082-d70f9f508a4e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4942721350.mp3?updated=1690289897" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Avi Shua: Try to do things by yourself. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/54/notes</link>
      <description>CEO and co-founder of Orca Security Avi Shua shares his thoughts on ways to succeed in cybersecurity. Avi's excitement about cybersecurity began when he was 13 as he tried to think of ways to get around the school's network security. He joined the Israeli Army's Intelligence Unit 8200 and experienced some unique cybersecurity training programs that he would eventually come to teach. Learning to solve problems on your own is a skill Avi acquired and took into his professional career. In his current position, Avi works to advance Orca's mission. He loves that his company works to reduce friction and enables security people to do their jobs. Instead of becoming of plumbers connecting things, Avi says they can do their job and become real security practitioners. We thank Avi for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 20 Jun 2021 07:00:00 -0000</pubDate>
      <itunes:title>Avi Shua: Try to do things by yourself. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>54</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>CEO and co-founder of Orca Security Avi Shua shares his thoughts on ways to succeed in cybersecurity. </itunes:subtitle>
      <itunes:summary>CEO and co-founder of Orca Security Avi Shua shares his thoughts on ways to succeed in cybersecurity. Avi's excitement about cybersecurity began when he was 13 as he tried to think of ways to get around the school's network security. He joined the Israeli Army's Intelligence Unit 8200 and experienced some unique cybersecurity training programs that he would eventually come to teach. Learning to solve problems on your own is a skill Avi acquired and took into his professional career. In his current position, Avi works to advance Orca's mission. He loves that his company works to reduce friction and enables security people to do their jobs. Instead of becoming of plumbers connecting things, Avi says they can do their job and become real security practitioners. We thank Avi for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CEO and co-founder of Orca Security Avi Shua shares his thoughts on ways to succeed in cybersecurity. Avi's excitement about cybersecurity began when he was 13 as he tried to think of ways to get around the school's network security. He joined the Israeli Army's Intelligence Unit 8200 and experienced some unique cybersecurity training programs that he would eventually come to teach. Learning to solve problems on your own is a skill Avi acquired and took into his professional career. In his current position, Avi works to advance Orca's mission. He loves that his company works to reduce friction and enables security people to do their jobs. Instead of becoming of plumbers connecting things, Avi says they can do their job and become real security practitioners. We thank Avi for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>379</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[87c2550a-cfb2-11eb-8d78-177625ed64c6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6363676932.mp3?updated=1623949467" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Primitive Bear spearphishes for Ukrainian entities. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/188/notes</link>
      <description>Guests Gage Mele and Yury Polozov join Dave to talk about Anomali's research "Primitive Bear (Gamaredon) Targets Ukraine with Timely Themes." Anomali Threat Research identified malicious samples that align with the Russia-sponsored cyberespionage group Primitive Bear’s (Gamaredon, Winterflounder) tactics, techniques, and procedures (TTPs). Primitive Bear, known primarily to focus on Ukraine, has been very active in 2021. However, the themes of the samples Anomali found, as well as those shared by the security community, could also be used to target multiple former Union of Soviet Socialist Republic (USSR) countries. Anomali Threat Research found malicious .docx files being distributed by Primitive Bear, likely through spearphishing, that attempted to download remote template .dot files through template injection.
The research can be found here:
Primitive Bear (Gamaredon) Targets Ukraine with Timely Themes

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Jun 2021 07:00:00 -0000</pubDate>
      <itunes:title>Primitive Bear spearphishes for Ukrainian entities. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>188</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guests Gage Mele and Yury Polozov join Dave to talk about Anomali's research "Primitive Bear (Gamaredon) Targets Ukraine with Timely Themes." Anomali Threat Research identified malicious samples that align with the Russia-sponsored cyberespionage group Primitive Bear’s (Gamaredon, Winterflounder) tactics, techniques, and procedures (TTPs). Primitive Bear, known primarily to focus on Ukraine, has been very active in 2021. However, the themes of the samples Anomali found, as well as those shared by the security community, could also be used to target multiple former Union of Soviet Socialist Republic (USSR) countries. Anomali Threat Research found malicious .docx files being distributed by Primitive Bear, likely through spearphishing, that attempted to download remote template .dot files through template injection.
The research can be found here:
Primitive Bear (Gamaredon) Targets Ukraine with Timely Themes

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guests Gage Mele and Yury Polozov join Dave to talk about Anomali's research "Primitive Bear (Gamaredon) Targets Ukraine with Timely Themes." Anomali Threat Research identified malicious samples that align with the Russia-sponsored cyberespionage group Primitive Bear’s (Gamaredon, Winterflounder) tactics, techniques, and procedures (TTPs). Primitive Bear, known primarily to focus on Ukraine, has been very active in 2021. However, the themes of the samples Anomali found, as well as those shared by the security community, could also be used to target multiple former Union of Soviet Socialist Republic (USSR) countries. Anomali Threat Research found malicious .docx files being distributed by Primitive Bear, likely through spearphishing, that attempted to download remote template .dot files through template injection.</p><p>The research can be found here:</p><ul><li><a href="https://www.anomali.com/blog/primitive-bear-gamaredon-targets-ukraine-with-timely-themes">Primitive Bear (Gamaredon) Targets Ukraine with Timely Themes</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>884</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[afa264d4-cfb2-11eb-a8a2-c32867fbd887]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1394944524.mp3?updated=1684860727" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Notes from the underworld: phishing with hardware, DarkSide impersonation, and cyber vigilantes. Data incidents, and a conviction for a crypter. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1357/notes</link>
      <description>Phishing, with a bogus hardware wallet as bait. Empty threats from a DarkSide impersonator. Cyber vigilantes may be distributing anti-piracy malware. Data security incidents at a cruise line and a US grocery chain. Malek Ben Salem from Accenture looks at optimizing security scanning. Our guest is Edward Roberts of Imperva on their 2021 Bad Bots Report. And a conviction for a crypter, with sentencing to follow.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/117
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 18 Jun 2021 20:05:00 -0000</pubDate>
      <itunes:title>Notes from the underworld: phishing with hardware, DarkSide impersonation, and cyber vigilantes. Data incidents, and a conviction for a crypter. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1357</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Phishing, with a bogus hardware wallet as bait. Empty threats from a DarkSide impersonator. Cyber vigilantes may be distributing anti-piracy malware. Data security incidents at a cruise line and a US grocery chain. Malek Ben Salem from Accenture looks at optimizing security scanning. Our guest is Edward Roberts of Imperva on their 2021 Bad Bots Report. And a conviction for a crypter, with sentencing to follow.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/117
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Phishing, with a bogus hardware wallet as bait. Empty threats from a DarkSide impersonator. Cyber vigilantes may be distributing anti-piracy malware. Data security incidents at a cruise line and a US grocery chain. Malek Ben Salem from Accenture looks at optimizing security scanning. Our guest is Edward Roberts of Imperva on their 2021 Bad Bots Report. And a conviction for a crypter, with sentencing to follow.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/117</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1765</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0756ae88-364d-11eb-b082-c72967d05a67]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5326893830.mp3?updated=1690289874" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Russo-US summit ended in frank exchanges and the prospect of further discussions on cybersecurity. Ferocious Kitten tracked. Initial access brokers. Molerats return. Ransomware arrests. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1356/notes</link>
      <description>The US-Russian summit took up cyber conflict, cyber privateering, and cyber deterrence, ending with the prospect of further discussions. Ferocious Kitten’s domestic surveillance. Ransomware gangs are using a lot of initial access brokers. The Molerats are back. Troubleshooting a wave of intermittent Internet interruptions. NSA offers advice on securing business communication tools. Ukrainian police arrest six alleged Clop gangsters. Andrea Little Limbago from Interos on bringing the private sector back into the defense equation. Our guest is Charles Herring of WitFoo, with the case for cybersecurity as an extension of law enforcement. Nine alleged ransomware hoods collared in Seoul. 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/116
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 17 Jun 2021 19:50:00 -0000</pubDate>
      <itunes:title>The Russo-US summit ended in frank exchanges and the prospect of further discussions on cybersecurity. Ferocious Kitten tracked. Initial access brokers. Molerats return. Ransomware arrests. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1356</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The US-Russian summit took up cyber conflict, cyber privateering, and cyber deterrence, ending with the prospect of further discussions. Ferocious Kitten’s domestic surveillance. Ransomware gangs are using a lot of initial access brokers. The Molerats are back. Troubleshooting a wave of intermittent Internet interruptions. NSA offers advice on securing business communication tools. Ukrainian police arrest six alleged Clop gangsters. Andrea Little Limbago from Interos on bringing the private sector back into the defense equation. Our guest is Charles Herring of WitFoo, with the case for cybersecurity as an extension of law enforcement. Nine alleged ransomware hoods collared in Seoul. 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/116
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US-Russian summit took up cyber conflict, cyber privateering, and cyber deterrence, ending with the prospect of further discussions. Ferocious Kitten’s domestic surveillance. Ransomware gangs are using a lot of initial access brokers. The Molerats are back. Troubleshooting a wave of intermittent Internet interruptions. NSA offers advice on securing business communication tools. Ukrainian police arrest six alleged Clop gangsters. Andrea Little Limbago from Interos on bringing the private sector back into the defense equation. Our guest is Charles Herring of WitFoo, with the case for cybersecurity as an extension of law enforcement. Nine alleged ransomware hoods collared in Seoul. </p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/116</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1550</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[079fbc86-364d-11eb-b082-1b08e4567078]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4813901172.mp3?updated=1690289856" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Airline resolves IT issue. Paradise ransomware source code leaked. Unauthorized access to cameras possible. TSA pipeline cyber guidance under preparation. Russo-US summit. Anonymous extradition. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1355/notes</link>
      <description>Southwest flights are back in the air after an IT issue disrupted them yesterday. Paradise ransomware source code has been leaked online. Some networked camera feeds may be accessible to unauthorized viewers. TSA is preparing a second, more prescriptive pipeline cybersecurity directive. The Russo-US summit is underway. Our guest is Jay Paz from Cobalt on bad actors targeting hackers. Joe Carrigan looks at malware hosted on Steam. And the “face of Anonymous” has been extradited from Mexico to the US.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/115
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 16 Jun 2021 19:30:00 -0000</pubDate>
      <itunes:title>Airline resolves IT issue. Paradise ransomware source code leaked. Unauthorized access to cameras possible. TSA pipeline cyber guidance under preparation. Russo-US summit. Anonymous extradition. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1355</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Southwest flights are back in the air after an IT issue disrupted them yesterday. Paradise ransomware source code has been leaked online. Some networked camera feeds may be accessible to unauthorized viewers. TSA is preparing a second, more prescriptive pipeline cybersecurity directive. The Russo-US summit is underway. Our guest is Jay Paz from Cobalt on bad actors targeting hackers. Joe Carrigan looks at malware hosted on Steam. And the “face of Anonymous” has been extradited from Mexico to the US.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/115
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Southwest flights are back in the air after an IT issue disrupted them yesterday. Paradise ransomware source code has been leaked online. Some networked camera feeds may be accessible to unauthorized viewers. TSA is preparing a second, more prescriptive pipeline cybersecurity directive. The Russo-US summit is underway. Our guest is Jay Paz from Cobalt on bad actors targeting hackers. Joe Carrigan looks at malware hosted on Steam. And the “face of Anonymous” has been extradited from Mexico to the US.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/115</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1446</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[080b75ac-364d-11eb-b082-e702faa4a1b9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2474054854.mp3?updated=1690289843" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Disruption of a major BEC campaign. Scope of cyberespionage expands in Pulse Secure exploitation. What the Hades? Russo-US summitry. A more secure workforce. Reality Winner is out, sort of. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1354/notes</link>
      <description>Microsoft disrupts a major BEC campaign. The scope of cyberespionage undertaken via exploitation of vulnerable Pulse Secure instances seems wider than previously believed. Secureworks offers an account of Hades ransomware, and differs with others on attribution. Final notes during the run-up to tomorrow’s US-Russia summit, where cyber will figure prominently. Helping employees stay secure. Carole Theriault wonders if the internet of things is becoming the internet of everything. Ben Yelin weighs in on the Supreme Court’s ruling affecting the Computer Fraud and Abuse Act. And Reality Winner has been released to a halfway house.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/114
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Jun 2021 20:30:00 -0000</pubDate>
      <itunes:title>Disruption of a major BEC campaign. Scope of cyberespionage expands in Pulse Secure exploitation. What the Hades? Russo-US summitry. A more secure workforce. Reality Winner is out, sort of. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1354</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Microsoft disrupts a major BEC campaign. The scope of cyberespionage undertaken via exploitation of vulnerable Pulse Secure instances seems wider than previously believed. Secureworks offers an account of Hades ransomware, and differs with others on attribution. Final notes during the run-up to tomorrow’s US-Russia summit, where cyber will figure prominently. Helping employees stay secure. Carole Theriault wonders if the internet of things is becoming the internet of everything. Ben Yelin weighs in on the Supreme Court’s ruling affecting the Computer Fraud and Abuse Act. And Reality Winner has been released to a halfway house.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/114
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft disrupts a major BEC campaign. The scope of cyberespionage undertaken via exploitation of vulnerable Pulse Secure instances seems wider than previously believed. Secureworks offers an account of Hades ransomware, and differs with others on attribution. Final notes during the run-up to tomorrow’s US-Russia summit, where cyber will figure prominently. Helping employees stay secure. Carole Theriault wonders if the internet of things is becoming the internet of everything. Ben Yelin weighs in on the Supreme Court’s ruling affecting the Computer Fraud and Abuse Act. And Reality Winner has been released to a halfway house.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/114</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1496</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[087adf0a-364d-11eb-b082-67923c2dbcf8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5854810026.mp3?updated=1690289828" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Third-party data breach at Volkswagen. An anti-monopoly agenda with Big Tech in its crosshairs. Recovery ransom. How EA was hacked. Avaddon gives up its keys. Gamekeeper turned poacher?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1353/notes</link>
      <description>Volkswagen warns North American customers of a third-party data breach. An “anti-monopoly agenda” advances in the US House Judiciary Committee. Speculation about how the FBI recovered ransom from DarkSide. How EA was hacked. Is Avaddon going out of business? Craig Williams from Cisco Talos explains why they’re calling some cyber criminals “privateers”. Rick Howard shares thoughts on professional development. And a strange case of a gamekeeper turned poacher (allegedly).
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/113
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 14 Jun 2021 20:40:00 -0000</pubDate>
      <itunes:title>Third-party data breach at Volkswagen. An anti-monopoly agenda with Big Tech in its crosshairs. Recovery ransom. How EA was hacked. Avaddon gives up its keys. Gamekeeper turned poacher?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1353</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Volkswagen warns North American customers of a third-party data breach. An “anti-monopoly agenda” advances in the US House Judiciary Committee. Speculation about how the FBI recovered ransom from DarkSide. How EA was hacked. Is Avaddon going out of business? Craig Williams from Cisco Talos explains why they’re calling some cyber criminals “privateers”. Rick Howard shares thoughts on professional development. And a strange case of a gamekeeper turned poacher (allegedly).
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/113
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Volkswagen warns North American customers of a third-party data breach. An “anti-monopoly agenda” advances in the US House Judiciary Committee. Speculation about how the FBI recovered ransom from DarkSide. How EA was hacked. Is Avaddon going out of business? Craig Williams from Cisco Talos explains why they’re calling some cyber criminals “privateers”. Rick Howard shares thoughts on professional development. And a strange case of a gamekeeper turned poacher (allegedly).</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/113</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1623</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[08d24eac-364d-11eb-b082-ff28c5db8bf6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6108865808.mp3?updated=1690289813" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Margaret Cunningham: A people scientist with a technology focus. [Behavioral science} [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/53/notes</link>
      <description>Principal Research Scientist for Human Behavior at Forcepoint, Margaret Cunningham shares her story of how she landed in cybersecurity. With a background in psychology and counseling and not feeling that one-on-one counseling was her thing, Margaret had a transformational moment in her PhD program in applied experimental technology when she realized she could "provide helping services and good work services at a broader scale." Margaret found her professional footing at DHS's Human Systems Integration Branch of Science and Technology Department as the person who figured out how to measure how new technologies impacted human performance. Margaret points out that making connections and reading whatever you can is important to stay up to date in the field. She notes that her statistical analysis skills are an asset. She hopes to create champions in human behavior and performance in the world of technology. We thank Margaret for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 13 Jun 2021 07:00:00 -0000</pubDate>
      <itunes:title>Margaret Cunningham: A people scientist with a technology focus. [Behavioral science} [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>53</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Principal Research Scientist for Human Behavior at Forcepoint, Margaret Cunningham shares her story of how she landed in cybersecurity. </itunes:subtitle>
      <itunes:summary>Principal Research Scientist for Human Behavior at Forcepoint, Margaret Cunningham shares her story of how she landed in cybersecurity. With a background in psychology and counseling and not feeling that one-on-one counseling was her thing, Margaret had a transformational moment in her PhD program in applied experimental technology when she realized she could "provide helping services and good work services at a broader scale." Margaret found her professional footing at DHS's Human Systems Integration Branch of Science and Technology Department as the person who figured out how to measure how new technologies impacted human performance. Margaret points out that making connections and reading whatever you can is important to stay up to date in the field. She notes that her statistical analysis skills are an asset. She hopes to create champions in human behavior and performance in the world of technology. We thank Margaret for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Principal Research Scientist for Human Behavior at Forcepoint, Margaret Cunningham shares her story of how she landed in cybersecurity. With a background in psychology and counseling and not feeling that one-on-one counseling was her thing, Margaret had a transformational moment in her PhD program in applied experimental technology when she realized she could "provide helping services and good work services at a broader scale." Margaret found her professional footing at DHS's Human Systems Integration Branch of Science and Technology Department as the person who figured out how to measure how new technologies impacted human performance. Margaret points out that making connections and reading whatever you can is important to stay up to date in the field. She notes that her statistical analysis skills are an asset. She hopes to create champions in human behavior and performance in the world of technology. We thank Margaret for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>311</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2a5f4b26-c958-11eb-8566-f7ca652a9ab4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9127198449.mp3?updated=1623266572" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Taking a look behind the Science of Security. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/187/notes</link>
      <description>Guest Adam Tagert is a Science of Security (SoS) Researcher in the National Security Agency Research Directorate. The National Security Agency (NSA) sponsors the Science of Security (SoS) Initiative for the promotion of a foundational cybersecurity science that is needed to mature the cybersecurity discipline and to underpin advances in cyberdefense. Adam works in all aspects of SoS particularly in the promotion of collaboration and use of foundational cybersecurity research. He promotes rigorous research methods by leading the Annual Best Scientific Cybersecurity Paper Competition. Adam joins Dave Bittner to discuss the NSA's SoS Initiative and their Science of Security and Privacy 2021 Annual Report.
Information on the SoS Initiative and the report can be found here:

Science of Security

Science of Security and Privacy 2021 Annual Report


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Jun 2021 07:00:00 -0000</pubDate>
      <itunes:title>Taking a look behind the Science of Security. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>187</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Adam Tagert is a Science of Security (SoS) Researcher in the National Security Agency Research Directorate. The National Security Agency (NSA) sponsors the Science of Security (SoS) Initiative for the promotion of a foundational cybersecurity science that is needed to mature the cybersecurity discipline and to underpin advances in cyberdefense. Adam works in all aspects of SoS particularly in the promotion of collaboration and use of foundational cybersecurity research. He promotes rigorous research methods by leading the Annual Best Scientific Cybersecurity Paper Competition. Adam joins Dave Bittner to discuss the NSA's SoS Initiative and their Science of Security and Privacy 2021 Annual Report.
Information on the SoS Initiative and the report can be found here:

Science of Security

Science of Security and Privacy 2021 Annual Report


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Adam Tagert is a Science of Security (SoS) Researcher in the National Security Agency Research Directorate. The National Security Agency (NSA) sponsors the <a href="https://cps-vo.org/group/SoS">Science of Security (SoS)</a> Initiative for the promotion of a foundational cybersecurity science that is needed to mature the cybersecurity discipline and to underpin advances in cyberdefense. Adam works in all aspects of SoS particularly in the promotion of collaboration and use of foundational cybersecurity research. He promotes rigorous research methods by leading the Annual Best Scientific Cybersecurity Paper Competition. Adam joins Dave Bittner to discuss the NSA's SoS Initiative and their Science of Security and Privacy 2021 Annual Report.</p><p>Information on the SoS Initiative and the report can be found here:</p><ul>
<li><a href="https://www.nsa.gov/what-we-do/research/science-of-security/">Science of Security</a></li>
<li><a href="Science%20of%20Security%20and%20Privacy%202021%20Annual%20Report">Science of Security and Privacy 2021 Annual Report</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1467</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dfa0f1be-c972-11eb-8dbb-0ff62011bd1a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5092122156.mp3?updated=1685125517" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Diplomatic Backdoor targets charities, embassies, and telcos in Europe, Africa, and Southwest Asia. Fancy Lazarus and DDoS extortion. Slilpp credential market takedown. A data gap? Cyber regulation. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1352/notes</link>
      <description>Diplomatic Backdoor afflicts Africa, Europe, and Southwest Asia. Electronic Arts source code stolen. “Fancy Lazarus” is back: despite the name, it’s an extortion gang, not an espionage service. An international law enforcement action takes down a credential market. Making good data available for AI research. There’s a growing appetite for cyber regulation in Washington. Thomas Etheridge from CrowdStrike looks at protecting cloud data, and Matt Chiodi of Palo Alto Networks' Unit 42 has highlights from their Cloud Threat report. And hold that side order of fries - a McBreach is disclosed.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/112
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 11 Jun 2021 20:00:00 -0000</pubDate>
      <itunes:title>Diplomatic Backdoor targets charities, embassies, and telcos in Europe, Africa, and Southwest Asia. Fancy Lazarus and DDoS extortion. Slilpp credential market takedown. A data gap? Cyber regulation. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1352</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Diplomatic Backdoor afflicts Africa, Europe, and Southwest Asia. Electronic Arts source code stolen. “Fancy Lazarus” is back: despite the name, it’s an extortion gang, not an espionage service. An international law enforcement action takes down a credential market. Making good data available for AI research. There’s a growing appetite for cyber regulation in Washington. Thomas Etheridge from CrowdStrike looks at protecting cloud data, and Matt Chiodi of Palo Alto Networks' Unit 42 has highlights from their Cloud Threat report. And hold that side order of fries - a McBreach is disclosed.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/112
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Diplomatic Backdoor afflicts Africa, Europe, and Southwest Asia. Electronic Arts source code stolen. “Fancy Lazarus” is back: despite the name, it’s an extortion gang, not an espionage service. An international law enforcement action takes down a credential market. Making good data available for AI research. There’s a growing appetite for cyber regulation in Washington. Thomas Etheridge from CrowdStrike looks at protecting cloud data, and Matt Chiodi of Palo Alto Networks' Unit 42 has highlights from their Cloud Threat report. And hold that side order of fries - a McBreach is disclosed.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/112</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1616</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[074042a6-364d-11eb-b082-83cbf4a958b7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2362121709.mp3?updated=1690288544" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Deciding to pay ransom - the cases of JBS and Colonial Pipeline. Gangland branding. Constituent management system hit. Notes on the FBI’s partial recovery of DarkSide’s ransom take.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1351/notes</link>
      <description>JBS discloses that it paid REvil roughly eleven-million dollars in ransom. REvil not only had a good haul, but the gang made a few points about its brand, too. Colonial Pipeline explains, and defends, its decision to pay ransom. The US Congress has a third-party problem that constituents may or may not notice. Dan Prince from Lancaster University on the science of cybersecurity. Our guest is Kris McConkey from PwC on their Cyber Threats 2020 - Report on the Global Threat Landscape. The FBI’s recovery of some of the ransom Colonial Pipeline paid to the DarkSide was good, but it doesn’t necessarily represent a new normal.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/111
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 10 Jun 2021 20:00:00 -0000</pubDate>
      <itunes:title>Deciding to pay ransom - the cases of JBS and Colonial Pipeline. Gangland branding. Constituent management system hit. Notes on the FBI’s partial recovery of DarkSide’s ransom take.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1351</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>JBS discloses that it paid REvil roughly eleven-million dollars in ransom. REvil not only had a good haul, but the gang made a few points about its brand, too. Colonial Pipeline explains, and defends, its decision to pay ransom. The US Congress has a third-party problem that constituents may or may not notice. Dan Prince from Lancaster University on the science of cybersecurity. Our guest is Kris McConkey from PwC on their Cyber Threats 2020 - Report on the Global Threat Landscape. The FBI’s recovery of some of the ransom Colonial Pipeline paid to the DarkSide was good, but it doesn’t necessarily represent a new normal.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/111
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>JBS discloses that it paid REvil roughly eleven-million dollars in ransom. REvil not only had a good haul, but the gang made a few points about its brand, too. Colonial Pipeline explains, and defends, its decision to pay ransom. The US Congress has a third-party problem that constituents may or may not notice. Dan Prince from Lancaster University on the science of cybersecurity. Our guest is Kris McConkey from PwC on their Cyber Threats 2020 - Report on the Global Threat Landscape. The FBI’s recovery of some of the ransom Colonial Pipeline paid to the DarkSide was good, but it doesn’t necessarily represent a new normal.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/111</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1480</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[07b46f8c-364d-11eb-b082-eba07ce6f199]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5245993687.mp3?updated=1690289716" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chinese cyberespionage in Russia? US Executive Order rescinds TikTok, WeChat bans. Operation Trojan Shield. Privateering. NATO’s Article 5 in cyberspace. Patch Tuesday notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1350/notes</link>
      <description>SentinelOne attributes the cyberespionage campaign against Russia’s FSB to Chinese services. President Biden replaces his predecessor’s bans on TikTok and WeChat with a process of engagement, security reviews, and data protection. More on the FBI-led Operation Trojan Shield. Privateering, again. NATO’s Article 5 in cyberspace. Joe Carrigan weighs in on recent high profile cyber incidents. Our guest is Shashi Kiran from Aryaka on their 2021 State of the WAN report. And notes on Patch Tuesday. 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/110
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 09 Jun 2021 20:20:00 -0000</pubDate>
      <itunes:title>Chinese cyberespionage in Russia? US Executive Order rescinds TikTok, WeChat bans. Operation Trojan Shield. Privateering. NATO’s Article 5 in cyberspace. Patch Tuesday notes.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1350</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>SentinelOne attributes the cyberespionage campaign against Russia’s FSB to Chinese services. President Biden replaces his predecessor’s bans on TikTok and WeChat with a process of engagement, security reviews, and data protection. More on the FBI-led Operation Trojan Shield. Privateering, again. NATO’s Article 5 in cyberspace. Joe Carrigan weighs in on recent high profile cyber incidents. Our guest is Shashi Kiran from Aryaka on their 2021 State of the WAN report. And notes on Patch Tuesday. 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/110
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>SentinelOne attributes the cyberespionage campaign against Russia’s FSB to Chinese services. President Biden replaces his predecessor’s bans on TikTok and WeChat with a process of engagement, security reviews, and data protection. More on the FBI-led Operation Trojan Shield. Privateering, again. NATO’s Article 5 in cyberspace. Joe Carrigan weighs in on recent high profile cyber incidents. Our guest is Shashi Kiran from Aryaka on their 2021 State of the WAN report. And notes on Patch Tuesday. </p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/110</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1402</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[07f40e44-364d-11eb-b082-13b98cc079c9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7137922002.mp3?updated=1690289699" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FBI claws back a lot of the ransom DarkSide collected. An international dragnet uses an encrypted chat app to pull in more than 800 suspects. Navistar discloses a cyber incident. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1349/notes</link>
      <description>The FBI seized a large portion of the funds DarkSide obtained from its extortion of Colonial Pipeline. An international sweep stings more than eight-hundred suspected criminals who were caught while using an encrypted chat app law enforcement was listening in on. CISA advises users to update their VMware instances. A new phishing campaign distributes Agent Tesla. Ben Yelin examines renewed controversy surrounding Clearview AI. Our guest is Aimee George Leery from Booz Allen on the challenging intersection of secure spaces and work from home. And a major truck maker discloses a cyber incident.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/109
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Jun 2021 20:00:00 -0000</pubDate>
      <itunes:title>FBI claws back a lot of the ransom DarkSide collected. An international dragnet uses an encrypted chat app to pull in more than 800 suspects. Navistar discloses a cyber incident. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1349</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The FBI seized a large portion of the funds DarkSide obtained from its extortion of Colonial Pipeline. An international sweep stings more than eight-hundred suspected criminals who were caught while using an encrypted chat app law enforcement was listening in on. CISA advises users to update their VMware instances. A new phishing campaign distributes Agent Tesla. Ben Yelin examines renewed controversy surrounding Clearview AI. Our guest is Aimee George Leery from Booz Allen on the challenging intersection of secure spaces and work from home. And a major truck maker discloses a cyber incident.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/109
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FBI seized a large portion of the funds DarkSide obtained from its extortion of Colonial Pipeline. An international sweep stings more than eight-hundred suspected criminals who were caught while using an encrypted chat app law enforcement was listening in on. CISA advises users to update their VMware instances. A new phishing campaign distributes Agent Tesla. Ben Yelin examines renewed controversy surrounding Clearview AI. Our guest is Aimee George Leery from Booz Allen on the challenging intersection of secure spaces and work from home. And a major truck maker discloses a cyber incident.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/109</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1620</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[08953d28-364d-11eb-b082-7f37d3721a58]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2123350347.mp3?updated=1690289687" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dark Side’s way into Colonial Pipeline networks may have been an old VPN. Summit agenda. DDoS hits German banks. Anonymous angry with Elon Musk? Alleged Trickbot coder arraigned. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1348/notes</link>
      <description>Dark Side seems to have attacked Colonial Pipeline through an old VPN account. Washington and Moscow prepare for this month’s summit, with cyber on the agenda. DDoS affects German banks. Anonymous may be back, and out to bring to book those who would troll Bitcoiners. Rick Howard looks at process management in security. David Dufour from Webroot on lessons learned from Exchange Server vulnerabilities. And one of Trickbot’s alleged authors has been arrested and arraigned on multiple charges in a US Federal court.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/108
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 07 Jun 2021 20:30:00 -0000</pubDate>
      <itunes:title>Dark Side’s way into Colonial Pipeline networks may have been an old VPN. Summit agenda. DDoS hits German banks. Anonymous angry with Elon Musk? Alleged Trickbot coder arraigned. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1348</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Dark Side seems to have attacked Colonial Pipeline through an old VPN account. Washington and Moscow prepare for this month’s summit, with cyber on the agenda. DDoS affects German banks. Anonymous may be back, and out to bring to book those who would troll Bitcoiners. Rick Howard looks at process management in security. David Dufour from Webroot on lessons learned from Exchange Server vulnerabilities. And one of Trickbot’s alleged authors has been arrested and arraigned on multiple charges in a US Federal court.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/108
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dark Side seems to have attacked Colonial Pipeline through an old VPN account. Washington and Moscow prepare for this month’s summit, with cyber on the agenda. DDoS affects German banks. Anonymous may be back, and out to bring to book those who would troll Bitcoiners. Rick Howard looks at process management in security. David Dufour from Webroot on lessons learned from Exchange Server vulnerabilities. And one of Trickbot’s alleged authors has been arrested and arraigned on multiple charges in a US Federal court.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/108</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1466</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[08bedc96-364d-11eb-b082-47ec02eaba5f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5953531087.mp3?updated=1690289671" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dave Farrow: The guy that enabled the business. [Security leadership] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/52/notes</link>
      <description>VP of Information Security at Barracuda Dave Farrow shares how a teenage surfer fell in love with software development and made his way in the cybersecurity field. Dave chose to study electrical engineering in college because he wanted to learn something that didn't make sense to him. He says he's done things in his career that he said he'd never do: for example, he went into and fell in love with software development. Taking on leadership of a bug bounty program at Barracuda blossomed into the creation of an internal security team. Dave wants to be the guy who enables the business and not the one who prevented it. He hopes all will come to recognize that there are other threats besides cybersecurity threats to business. We thank Dave for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 06 Jun 2021 05:00:00 -0000</pubDate>
      <itunes:title>Dave Farrow: The guy that enabled the business. [Security leadership] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>52</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>VP of Information Security at Barracuda Dave Farrow shares how a teenage surfer feel in love with software development. </itunes:subtitle>
      <itunes:summary>VP of Information Security at Barracuda Dave Farrow shares how a teenage surfer fell in love with software development and made his way in the cybersecurity field. Dave chose to study electrical engineering in college because he wanted to learn something that didn't make sense to him. He says he's done things in his career that he said he'd never do: for example, he went into and fell in love with software development. Taking on leadership of a bug bounty program at Barracuda blossomed into the creation of an internal security team. Dave wants to be the guy who enables the business and not the one who prevented it. He hopes all will come to recognize that there are other threats besides cybersecurity threats to business. We thank Dave for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>VP of Information Security at Barracuda Dave Farrow shares how a teenage surfer fell in love with software development and made his way in the cybersecurity field. Dave chose to study electrical engineering in college because he wanted to learn something that didn't make sense to him. He says he's done things in his career that he said he'd never do: for example, he went into and fell in love with software development. Taking on leadership of a bug bounty program at Barracuda blossomed into the creation of an internal security team. Dave wants to be the guy who enables the business and not the one who prevented it. He hopes all will come to recognize that there are other threats besides cybersecurity threats to business. We thank Dave for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>395</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e735af96-c611-11eb-b5be-63a8d9f5ed4c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9604740577.mp3?updated=1622751616" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bad building blocks: a new and unusual phishing campaign. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/186/notes</link>
      <description>Guest Karl Sigler of Trustwave's SpiderLabs joins Dave Bittner to talk about their research: "Hidden Phishing at Free JavaScript Site". The research describes an interesting phishing campaign SpiderLabs encountered recently. In this campaign, the email subject pertains to a price revision, followed by some numbers. There is no email body, but there is an attachment about an ”investment.” The attachment’s convoluted filename contains characters the file-naming convention doesn’t allow, notably the vertical stroke, “|.” Even though "xlsx" is in the filename, double-clicking the attachment will prompt the user to open it with the default web browser. Thus, the file indeed appears to be an HTML document. Of course, it’s malicious.
The research can be found here:
HTML Lego: Hidden Phishing at Free JavaScript Site

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Jun 2021 05:00:00 -0000</pubDate>
      <itunes:title>Bad building blocks: a new and unusual phishing campaign. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>186</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Karl Sigler of Trustwave's SpiderLabs joins Dave Bittner to talk about their research: "Hidden Phishing at Free JavaScript Site". The research describes an interesting phishing campaign SpiderLabs encountered recently. In this campaign, the email subject pertains to a price revision, followed by some numbers. There is no email body, but there is an attachment about an ”investment.” The attachment’s convoluted filename contains characters the file-naming convention doesn’t allow, notably the vertical stroke, “|.” Even though "xlsx" is in the filename, double-clicking the attachment will prompt the user to open it with the default web browser. Thus, the file indeed appears to be an HTML document. Of course, it’s malicious.
The research can be found here:
HTML Lego: Hidden Phishing at Free JavaScript Site

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Karl Sigler of Trustwave's SpiderLabs joins Dave Bittner to talk about their research: "Hidden Phishing at Free JavaScript Site". The research describes an interesting phishing campaign SpiderLabs encountered recently. In this campaign, the email subject pertains to a price revision, followed by some numbers. There is no email body, but there is an attachment about an ”investment.” The attachment’s convoluted filename contains characters the file-naming convention doesn’t allow, notably the vertical stroke, “|.” Even though "xlsx" is in the filename, double-clicking the attachment will prompt the user to open it with the default web browser. Thus, the file indeed appears to be an HTML document. Of course, it’s malicious.</p><p>The research can be found here:</p><ul><li><a href="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/html-lego-hidden-phishing-at-free-javascript-site/">HTML Lego: Hidden Phishing at Free JavaScript Site</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1163</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a3111882-c611-11eb-bdf7-5b14d88195b1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8186015225.mp3?updated=1685125504" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Advice on ransomware from the US National Security Council. JBS announces its recovery from the REvil attack. Cyber diplomacy (and maybe retaliation). Ransomware-themed phishbait. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1347/notes</link>
      <description>JBS recovers from its REvil ransomware attack, and this and other apparent instances of privateering will figure among the agenda at the upcoming US-Russia summit. (The US is said to be mulling retaliation.) The White House issues general advice on preparing for ransomware attacks. The Tokyo Olympic committee suffers a data breach. Ransomware may have interrupted some media livestreaming yesterday. Attribution in the MTA attack. Dinah Davis from arctic wolf helps prevent your SOC from becoming ineffective. Carole Theriault warns of data privacy leaks in online home tours. And ransomware-themed phishbait.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/107
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 04 Jun 2021 19:15:00 -0000</pubDate>
      <itunes:title>Advice on ransomware from the US National Security Council. JBS announces its recovery from the REvil attack. Cyber diplomacy (and maybe retaliation). Ransomware-themed phishbait. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1347</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>JBS recovers from its REvil ransomware attack, and this and other apparent instances of privateering will figure among the agenda at the upcoming US-Russia summit. (The US is said to be mulling retaliation.) The White House issues general advice on preparing for ransomware attacks. The Tokyo Olympic committee suffers a data breach. Ransomware may have interrupted some media livestreaming yesterday. Attribution in the MTA attack. Dinah Davis from arctic wolf helps prevent your SOC from becoming ineffective. Carole Theriault warns of data privacy leaks in online home tours. And ransomware-themed phishbait.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/107
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>JBS recovers from its REvil ransomware attack, and this and other apparent instances of privateering will figure among the agenda at the upcoming US-Russia summit. (The US is said to be mulling retaliation.) The White House issues general advice on preparing for ransomware attacks. The Tokyo Olympic committee suffers a data breach. Ransomware may have interrupted some media livestreaming yesterday. Attribution in the MTA attack. Dinah Davis from arctic wolf helps prevent your SOC from becoming ineffective. Carole Theriault warns of data privacy leaks in online home tours. And ransomware-themed phishbait.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/107</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1470</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[07298d0e-364d-11eb-b082-9f08e80a375d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9976504023.mp3?updated=1690289659" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FBI fingers REvil as the gang behind the JBS ransomware. Privateering may come up at the US-Russian summit. Ransomware at regional transportation operations. Cyberespionage in Southeast Asia.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1346/notes</link>
      <description>Evil, your name is REvil, except when it’s Sodinokibi. That’s what the Bureau says about the JBS ransomware attack, anyway. The US is expected to make strong objections to Russian cyber privateering at the upcoming summit. Other ransomware incidents are disclosed by regional transportation operators. A possible Mustang Panda sighting. Andrea Little Limbago from Interos on cyber related executive orders. Our guest is Terry Halvorsen from IBM on the need for investment, research and collaboration in preventing quantum cyberattacks. And mommas, don’t let your babies grow up to be DDoS jockeys.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/106
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 03 Jun 2021 19:30:00 -0000</pubDate>
      <itunes:title>FBI fingers REvil as the gang behind the JBS ransomware. Privateering may come up at the US-Russian summit. Ransomware at regional transportation operations. Cyberespionage in Southeast Asia.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1346</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Evil, your name is REvil, except when it’s Sodinokibi. That’s what the Bureau says about the JBS ransomware attack, anyway. The US is expected to make strong objections to Russian cyber privateering at the upcoming summit. Other ransomware incidents are disclosed by regional transportation operators. A possible Mustang Panda sighting. Andrea Little Limbago from Interos on cyber related executive orders. Our guest is Terry Halvorsen from IBM on the need for investment, research and collaboration in preventing quantum cyberattacks. And mommas, don’t let your babies grow up to be DDoS jockeys.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/106
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Evil, your name is REvil, except when it’s Sodinokibi. That’s what the Bureau says about the JBS ransomware attack, anyway. The US is expected to make strong objections to Russian cyber privateering at the upcoming summit. Other ransomware incidents are disclosed by regional transportation operators. A possible Mustang Panda sighting. Andrea Little Limbago from Interos on cyber related executive orders. Our guest is Terry Halvorsen from IBM on the need for investment, research and collaboration in preventing quantum cyberattacks. And mommas, don’t let your babies grow up to be DDoS jockeys.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/106</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1470</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[07c8a998-364d-11eb-b082-ab282f08ad90]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8132543729.mp3?updated=1690289643" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The big ransomware incident in the food-processing sector. US authorities seize domains used in Nobelium’s USAID impersonation campaign. Siemens addresses PLC vulnerabilities. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1345/notes</link>
      <description>Food processing is also vulnerable to ransomware: the case of multi-national meat-provider JBS. The US and Russia are in communication about the possibility that the criminals responsible for the JBS incident might be harbored in Russia. Domains used in the USAID impersonation campaign have been seized by the US Justice Department. Our guest is Melissa Gaddis from TransUnion with results from their Global Consumer Pulse study. Joe Carrigan looks at criminals abusing online search ads. Siemens addresses a critical issue in its PLCs.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/105
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 02 Jun 2021 19:25:00 -0000</pubDate>
      <itunes:title>The big ransomware incident in the food-processing sector. US authorities seize domains used in Nobelium’s USAID impersonation campaign. Siemens addresses PLC vulnerabilities. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1345</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Food processing is also vulnerable to ransomware: the case of multi-national meat-provider JBS. The US and Russia are in communication about the possibility that the criminals responsible for the JBS incident might be harbored in Russia. Domains used in the USAID impersonation campaign have been seized by the US Justice Department. Our guest is Melissa Gaddis from TransUnion with results from their Global Consumer Pulse study. Joe Carrigan looks at criminals abusing online search ads. Siemens addresses a critical issue in its PLCs.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/105
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Food processing is also vulnerable to ransomware: the case of multi-national meat-provider JBS. The US and Russia are in communication about the possibility that the criminals responsible for the JBS incident might be harbored in Russia. Domains used in the USAID impersonation campaign have been seized by the US Justice Department. Our guest is Melissa Gaddis from TransUnion with results from their Global Consumer Pulse study. Joe Carrigan looks at criminals abusing online search ads. Siemens addresses a critical issue in its PLCs.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/105</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1462</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[07ddb946-364d-11eb-b082-2b410f8b2b9e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9540915903.mp3?updated=1690289624" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Saboteurs trying to look like crooks? CISA on the USAID phishing incident. US receives criticism for alleged surveillance of allies. Epsilon Red is out. No weed, just alt-coin. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1344/notes</link>
      <description>Iran’s wiper attacks may have been posing as criminal gang capers. CISA issues an alert on the USAID Constant Contact credential compromise. European governments express concern over reports of US surveillance (enabled, allegedly, by Danish organizations). Epsilon Red ransomware is out and active. Ben Yelin looks at Florida Governor DeSantis’ bill aimed at Social Media companies. Our guest is Giovanni Vigna from VMware with highlights from their 2020 Threat Landscape Report. And police come looking for cannabis farming and find coin-mining rigs instead.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/104
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Jun 2021 20:30:00 -0000</pubDate>
      <itunes:title>Saboteurs trying to look like crooks? CISA on the USAID phishing incident. US receives criticism for alleged surveillance of allies. Epsilon Red is out. No weed, just alt-coin. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1344</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Iran’s wiper attacks may have been posing as criminal gang capers. CISA issues an alert on the USAID Constant Contact credential compromise. European governments express concern over reports of US surveillance (enabled, allegedly, by Danish organizations). Epsilon Red ransomware is out and active. Ben Yelin looks at Florida Governor DeSantis’ bill aimed at Social Media companies. Our guest is Giovanni Vigna from VMware with highlights from their 2020 Threat Landscape Report. And police come looking for cannabis farming and find coin-mining rigs instead.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/104
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iran’s wiper attacks may have been posing as criminal gang capers. CISA issues an alert on the USAID Constant Contact credential compromise. European governments express concern over reports of US surveillance (enabled, allegedly, by Danish organizations). Epsilon Red ransomware is out and active. Ben Yelin looks at Florida Governor DeSantis’ bill aimed at Social Media companies. Our guest is Giovanni Vigna from VMware with highlights from their 2020 Threat Landscape Report. And police come looking for cannabis farming and find coin-mining rigs instead.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/104</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1507</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[08aa29c2-364d-11eb-b082-17bc23b9cdfb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9273953369.mp3?updated=1690289612" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Zero trust: a change in mindset. [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/41/notes</link>
      <description>Guest Lenny Zeltser, CISO of Axonius, sits down with the CyberWire's CSO and Chief Analyst Rick Howard to discuss one of Rick's favorite topics, zero trust. Lenny shares his views on this cybersecurity first principle, taking into account changes in mindsets during the COVID-19 pandemic that have necessitated many to move toward zero trust.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 31 May 2021 05:00:00 -0000</pubDate>
      <itunes:title>Zero trust: a change in mindset. [Special Editions]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>41</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>A conversation with Lenny Zeltser on zero trust. </itunes:subtitle>
      <itunes:summary>Guest Lenny Zeltser, CISO of Axonius, sits down with the CyberWire's CSO and Chief Analyst Rick Howard to discuss one of Rick's favorite topics, zero trust. Lenny shares his views on this cybersecurity first principle, taking into account changes in mindsets during the COVID-19 pandemic that have necessitated many to move toward zero trust.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Lenny Zeltser, CISO of Axonius, sits down with the CyberWire's CSO and Chief Analyst Rick Howard to discuss one of Rick's favorite topics, zero trust. Lenny shares his views on this cybersecurity first principle, taking into account changes in mindsets during the COVID-19 pandemic that have necessitated many to move toward zero trust.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1099</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[155460f4-be36-11eb-b05d-f3397748f8eb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9823628771.mp3?updated=1662645409" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Baan Alsinawi: Trust ourselves and be courageous. [Compliance] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/51/notes</link>
      <description>Managing Director at Cerberus Sentinel, Chief Compliance Officer and the President of TalaTek, Baan Alsinawi shares her cybersecurity journey from a teenager who wanted to understand computers and held several positions in IT from help desk to systems engineering and cybersecurity. Founding her own business focusing on compliance, Baan says she spends maybe only 20% of her day on technical tasks and that there is always so more to do. Finding the right people for her team is a marker of success for Baan. She talks of the importance of sharing the sense of community of women in technology and nurturing women in the field. We thank Baan for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 30 May 2021 07:00:00 -0000</pubDate>
      <itunes:title>Baan Alsinawi: Trust ourselves and be courageous. [Compliance] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>51</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Managing Director at Cerberus Sentinel, Chief Compliance Officer and the President of TalaTek, Baan Alsinawi shares her cybersecurity journey. </itunes:subtitle>
      <itunes:summary>Managing Director at Cerberus Sentinel, Chief Compliance Officer and the President of TalaTek, Baan Alsinawi shares her cybersecurity journey from a teenager who wanted to understand computers and held several positions in IT from help desk to systems engineering and cybersecurity. Founding her own business focusing on compliance, Baan says she spends maybe only 20% of her day on technical tasks and that there is always so more to do. Finding the right people for her team is a marker of success for Baan. She talks of the importance of sharing the sense of community of women in technology and nurturing women in the field. We thank Baan for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Managing Director at Cerberus Sentinel, Chief Compliance Officer and the President of TalaTek, Baan Alsinawi shares her cybersecurity journey from a teenager who wanted to understand computers and held several positions in IT from help desk to systems engineering and cybersecurity. Founding her own business focusing on compliance, Baan says she spends maybe only 20% of her day on technical tasks and that there is always so more to do. Finding the right people for her team is a marker of success for Baan. She talks of the importance of sharing the sense of community of women in technology and nurturing women in the field. We thank Baan for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>377</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b233ec0c-be43-11eb-9f3a-3b01b32e8899]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7213860191.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Big data, big payoff for China's cybercrime underground. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/185/notes</link>
      <description>Guest Brandon Hoffman of Intel 471 joins Dave Bittner to share his team's research "How China’s cybercrime underground is making money off big data". Through Intel 471’s observation and analysis of open source information and behavior on multiple closed forums, they found actors adopting the use of legitimate big data technology for cybercrime and monetizing the data they obtain on the Chinese-language underground.
The behavior Intel 471 analyzed points to a cycle that involves several different layers of cybercriminals, the use of insider information, and unwitting victims in order to earn ill-gotten gains. The schemes themselves proliferate partly due to China’s desire to be a global epicenter in big data analytics, especially as it pushes to become synonymous with new technology sectors like the Internet of Things (IoT). With China injecting big data into every economic sector, the environment has become ripe for criminals to create and execute schemes that hide in the noise brought on by the amount of data at hand.
The research can be found here:
How China’s cybercrime underground is making money off big data

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 May 2021 07:00:00 -0000</pubDate>
      <itunes:title>Big data, big payoff for China's cybercrime underground. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>185</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Brandon Hoffman of Intel 471 joins Dave Bittner to share his team's research "How China’s cybercrime underground is making money off big data". Through Intel 471’s observation and analysis of open source information and behavior on multiple closed forums, they found actors adopting the use of legitimate big data technology for cybercrime and monetizing the data they obtain on the Chinese-language underground.
The behavior Intel 471 analyzed points to a cycle that involves several different layers of cybercriminals, the use of insider information, and unwitting victims in order to earn ill-gotten gains. The schemes themselves proliferate partly due to China’s desire to be a global epicenter in big data analytics, especially as it pushes to become synonymous with new technology sectors like the Internet of Things (IoT). With China injecting big data into every economic sector, the environment has become ripe for criminals to create and execute schemes that hide in the noise brought on by the amount of data at hand.
The research can be found here:
How China’s cybercrime underground is making money off big data

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Brandon Hoffman of Intel 471 joins Dave Bittner to share his team's research "How China’s cybercrime underground is making money off big data". Through Intel 471’s observation and analysis of open source information and behavior on multiple closed forums, they found actors adopting the use of legitimate big data technology for cybercrime and monetizing the data they obtain on the Chinese-language underground.</p><p>The behavior Intel 471 analyzed points to a cycle that involves several different layers of cybercriminals, the use of insider information, and unwitting victims in order to earn ill-gotten gains. The schemes themselves proliferate partly due to China’s desire to be a global epicenter in big data analytics, especially as it pushes to become synonymous with new technology sectors like the Internet of Things (IoT). With China injecting big data into every economic sector, the environment has become ripe for criminals to create and execute schemes that hide in the noise brought on by the amount of data at hand.</p><p>The research can be found here:</p><ul><li><a href="https://www.intel471.com/blog/china-cybercrime-big-data-privacy-laws/">How China’s cybercrime underground is making money off big data</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1193</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[133fe694-be4a-11eb-b3a4-ff89a0b1b30e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4640948373.mp3?updated=1685125498" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A phishing campaign poses as USAID. APTs exploit unpatched Pulse Secure and Fortinet instances. Healthcare organizations continue recovery from ransomware. A look at Criminal2Criminal markets. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1343/notes</link>
      <description>A phishing campaign this week appears to be the work of Russia’s SVR. Chinese government threat actors continue to exploit unpatched Pulse Secure instances. FBI renews warnings about unpatched Fortinet appliances. Healthcare organizations still work to recover from ransomware. Rick Howard speaks with author Andy Greenberg on his book Sandworm. Ben Yelin weighs in on questions Senator Wyden has for the Pentagon. And a look at the criminal ransomware market, including the consultants who serve the extortionists.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/103
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 28 May 2021 19:30:00 -0000</pubDate>
      <itunes:title>A phishing campaign poses as USAID. APTs exploit unpatched Pulse Secure and Fortinet instances. Healthcare organizations continue recovery from ransomware. A look at Criminal2Criminal markets. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1343</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A phishing campaign this week appears to be the work of Russia’s SVR. Chinese government threat actors continue to exploit unpatched Pulse Secure instances. FBI renews warnings about unpatched Fortinet appliances. Healthcare organizations still work to recover from ransomware. Rick Howard speaks with author Andy Greenberg on his book Sandworm. Ben Yelin weighs in on questions Senator Wyden has for the Pentagon. And a look at the criminal ransomware market, including the consultants who serve the extortionists.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/103
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A phishing campaign this week appears to be the work of Russia’s SVR. Chinese government threat actors continue to exploit unpatched Pulse Secure instances. FBI renews warnings about unpatched Fortinet appliances. Healthcare organizations still work to recover from ransomware. Rick Howard speaks with author Andy Greenberg on his book Sandworm. Ben Yelin weighs in on questions Senator Wyden has for the Pentagon. And a look at the criminal ransomware market, including the consultants who serve the extortionists.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/103</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1598</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0711fe8c-364d-11eb-b082-d707614c05c1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2282556215.mp3?updated=1690289602" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Impersonation campaign targets China’s Uyghur minority. US DHS issues pipeline cybersecurity requirements. Recovering from ransomware. Notes on privateering.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1342/notes</link>
      <description>Chinese-speaking operators are reported to be phishing to compromise devices belonging to Uyghurs. The US Department of Homeland Security issues pipeline cybersecurity regulations. Security companies take various approaches to offering decryptors against ransomware. Huawei would like to chat with President Biden. Rick Howard speaks with authors Peter Singer and Emerson Brooking on their book "LikeWar - The Weaponization of Social Media". Our guest is Darren Shou of NortonLifeLock on the findings of the 6th annual Norton Cyber Safety Insights Report. And a few notes on privateers, then and now, whether on High Barbaree or the dark net.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/102
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 27 May 2021 20:00:00 -0000</pubDate>
      <itunes:title>Impersonation campaign targets China’s Uyghur minority. US DHS issues pipeline cybersecurity requirements. Recovering from ransomware. Notes on privateering.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1342</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Chinese-speaking operators are reported to be phishing to compromise devices belonging to Uyghurs. The US Department of Homeland Security issues pipeline cybersecurity regulations. Security companies take various approaches to offering decryptors against ransomware. Huawei would like to chat with President Biden. Rick Howard speaks with authors Peter Singer and Emerson Brooking on their book "LikeWar - The Weaponization of Social Media". Our guest is Darren Shou of NortonLifeLock on the findings of the 6th annual Norton Cyber Safety Insights Report. And a few notes on privateers, then and now, whether on High Barbaree or the dark net.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/102
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chinese-speaking operators are reported to be phishing to compromise devices belonging to Uyghurs. The US Department of Homeland Security issues pipeline cybersecurity regulations. Security companies take various approaches to offering decryptors against ransomware. Huawei would like to chat with President Biden. Rick Howard speaks with authors Peter Singer and Emerson Brooking on their book "LikeWar - The Weaponization of Social Media". Our guest is Darren Shou of NortonLifeLock on the findings of the 6th annual Norton Cyber Safety Insights Report. And a few notes on privateers, then and now, whether on High Barbaree or the dark net.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/102</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1378</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0685cd7c-364d-11eb-b082-6327d7ef82ad]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5880362509.mp3?updated=1690289562" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybersespionage reported in Belgium. Low-sophistication attacks on OT networks. Healthcare ransomware attacks. Privateering defined. Advice for boards. And news of crime.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1341/notes</link>
      <description>Hafnium visits Belgium. “Low-sophistication” attacks on operational technology. Updates on healthcare sector ransomware attacks in New Zealand and Ireland. Wipers masquerading as ransomware. “Privateers” are defined as a new category of threat actor. TSA’s new standards for pipeline security. The World Economic Forum has advice for Boards in the oil and gas sector. Rick Howard interviews Liza Mundy on her book "Code Girls - The Untold Story of the American Women Code Breakers Who Helped Win World War II". Joe Carrigan describes fraudulent search engine ad buys. And as one criminal is sentenced, eight more are arrested.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/101
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 26 May 2021 19:30:00 -0000</pubDate>
      <itunes:title>Cybersespionage reported in Belgium. Low-sophistication attacks on OT networks. Healthcare ransomware attacks. Privateering defined. Advice for boards. And news of crime.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1341</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Hafnium visits Belgium. “Low-sophistication” attacks on operational technology. Updates on healthcare sector ransomware attacks in New Zealand and Ireland. Wipers masquerading as ransomware. “Privateers” are defined as a new category of threat actor. TSA’s new standards for pipeline security. The World Economic Forum has advice for Boards in the oil and gas sector. Rick Howard interviews Liza Mundy on her book "Code Girls - The Untold Story of the American Women Code Breakers Who Helped Win World War II". Joe Carrigan describes fraudulent search engine ad buys. And as one criminal is sentenced, eight more are arrested.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/101
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hafnium visits Belgium. “Low-sophistication” attacks on operational technology. Updates on healthcare sector ransomware attacks in New Zealand and Ireland. Wipers masquerading as ransomware. “Privateers” are defined as a new category of threat actor. TSA’s new standards for pipeline security. The World Economic Forum has advice for Boards in the oil and gas sector. Rick Howard interviews Liza Mundy on her book "Code Girls - The Untold Story of the American Women Code Breakers Who Helped Win World War II". Joe Carrigan describes fraudulent search engine ad buys. And as one criminal is sentenced, eight more are arrested.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/101</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1555</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[06757ec2-364d-11eb-b082-b3f599247cf1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6479641561.mp3?updated=1690289546" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CryptoCore traced to Pyongyang. Ransomware and risk management. Gangs regroup. A would-be hacker-by-bribery is sentenced in Nevada.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1340/notes</link>
      <description>The CryptoCore campaign that looted cryptocurrency exchanges is said to have been the work of North Korea’s Lazarus Group. Insurers are taking a hard look at ransomware and the cyber insurance policies that might cover it. Managing ransomware risk, and a role for standards bodies. Can there be such a thing as responsible disclosure of decryptors and other remediation tools? Ransomware gangs regroup. Perry Carpenter previews the new 8th Layer Insights podcast. Rick Howard speaks with authors Doug Barth and Evan Gilman. And it’s time served plus deportation in the case of an unsuccessful hacker.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/100
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 May 2021 20:40:00 -0000</pubDate>
      <itunes:title>CryptoCore traced to Pyongyang. Ransomware and risk management. Gangs regroup. A would-be hacker-by-bribery is sentenced in Nevada.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1340</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The CryptoCore campaign that looted cryptocurrency exchanges is said to have been the work of North Korea’s Lazarus Group. Insurers are taking a hard look at ransomware and the cyber insurance policies that might cover it. Managing ransomware risk, and a role for standards bodies. Can there be such a thing as responsible disclosure of decryptors and other remediation tools? Ransomware gangs regroup. Perry Carpenter previews the new 8th Layer Insights podcast. Rick Howard speaks with authors Doug Barth and Evan Gilman. And it’s time served plus deportation in the case of an unsuccessful hacker.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/100
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The CryptoCore campaign that looted cryptocurrency exchanges is said to have been the work of North Korea’s Lazarus Group. Insurers are taking a hard look at ransomware and the cyber insurance policies that might cover it. Managing ransomware risk, and a role for standards bodies. Can there be such a thing as responsible disclosure of decryptors and other remediation tools? Ransomware gangs regroup. Perry Carpenter previews the new 8th Layer Insights podcast. Rick Howard speaks with authors Doug Barth and Evan Gilman. And it’s time served plus deportation in the case of an unsuccessful hacker.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/100</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1513</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[060248e4-364d-11eb-b082-ffd49045c148]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3750381662.mp3?updated=1690289526" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware warnings in Ireland, New Zealand, Germany, and the US. Belgium’s new cybersecurity strategy. A tipline to dime out cryptominers. Air India passenger data breach.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1339/notes</link>
      <description>Ransomware warnings in the US, Ireland, New Zealand, and Germany--healthcare organizations are said to be at particular risk. Belgium adopts a new cybersecurity strategy. China isn’t happy with freelance cryptominers. Air India sustains a third-party breach of passenger personal data. An FBI analyst is indicted for mishandling classified material. Rick Howard previews this week’s CSO Perspective podcast and kicks off cybersecurity canon week with author Perry Carpenter. And happy birthday, US Cyber Command.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/99
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 24 May 2021 20:35:00 -0000</pubDate>
      <itunes:title>Ransomware warnings in Ireland, New Zealand, Germany, and the US. Belgium’s new cybersecurity strategy. A tipline to dime out cryptominers. Air India passenger data breach.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1339</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ransomware warnings in the US, Ireland, New Zealand, and Germany--healthcare organizations are said to be at particular risk. Belgium adopts a new cybersecurity strategy. China isn’t happy with freelance cryptominers. Air India sustains a third-party breach of passenger personal data. An FBI analyst is indicted for mishandling classified material. Rick Howard previews this week’s CSO Perspective podcast and kicks off cybersecurity canon week with author Perry Carpenter. And happy birthday, US Cyber Command.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/99
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ransomware warnings in the US, Ireland, New Zealand, and Germany--healthcare organizations are said to be at particular risk. Belgium adopts a new cybersecurity strategy. China isn’t happy with freelance cryptominers. Air India sustains a third-party breach of passenger personal data. An FBI analyst is indicted for mishandling classified material. Rick Howard previews this week’s CSO Perspective podcast and kicks off cybersecurity canon week with author Perry Carpenter. And happy birthday, US Cyber Command.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/99</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1364</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[05e07cf0-364d-11eb-b082-73c7f3505cbf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2167140877.mp3?updated=1690289508" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Michael Bishop Jr.: Good, bad or indifferent. [Security] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/50/notes</link>
      <description>Senior Security Officer at Centers for Medicare and Medicaid Services Michael Bishop Jr. shares his journey from Army infantryman deployed to Iraq to working in cybersecurity. After 12 years in the U.S. Army, Mike found himself in a rough spot. Looking for work and having some personal challenges, Mike's mentor, an Army officer he met while enlisted, recognized Mike's struggles and helped to nudge him toward cybersecurity. Mike credits his mentor with helping him transition to where he is today. Undergoing training for cybersecurity, he was tested in many areas and found the route he wanted to go. We thank Michael for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 23 May 2021 07:00:00 -0000</pubDate>
      <itunes:title>Michael Bishop Jr.: Good, bad or indifferent. [Security] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>50</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Senior Security Officer at Centers for Medicare and Medicaid Services Mike Bishop shares his journey to cybersecurity.</itunes:subtitle>
      <itunes:summary>Senior Security Officer at Centers for Medicare and Medicaid Services Michael Bishop Jr. shares his journey from Army infantryman deployed to Iraq to working in cybersecurity. After 12 years in the U.S. Army, Mike found himself in a rough spot. Looking for work and having some personal challenges, Mike's mentor, an Army officer he met while enlisted, recognized Mike's struggles and helped to nudge him toward cybersecurity. Mike credits his mentor with helping him transition to where he is today. Undergoing training for cybersecurity, he was tested in many areas and found the route he wanted to go. We thank Michael for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Senior Security Officer at Centers for Medicare and Medicaid Services Michael Bishop Jr. shares his journey from Army infantryman deployed to Iraq to working in cybersecurity. After 12 years in the U.S. Army, Mike found himself in a rough spot. Looking for work and having some personal challenges, Mike's mentor, an Army officer he met while enlisted, recognized Mike's struggles and helped to nudge him toward cybersecurity. Mike credits his mentor with helping him transition to where he is today. Undergoing training for cybersecurity, he was tested in many areas and found the route he wanted to go. We thank Michael for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>335</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4fc22564-b99a-11eb-9727-5f4125e5a6df]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7961925265.mp3?updated=1621457876" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leveraging COVID-19 themes for malicious purposes. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/184/notes</link>
      <description>Guest Joe Slowik joins us from DomainTools to discuss his team's research "COVID-19 Phishing With a Side of Cobalt Strike." Multiple adversaries, from criminal groups to state-directed entities, engaged in malicious cyber activity using COVID-19 pandemic themes since March 2020. Adversaries continue to leverage the pandemic, arguably the most significant issue globally as of this writing, in various ways. Yet the most persistent avenue remains using COVID-19 themes for building malicious document files. Examples include lures associated with Cloud Atlas-linked activity and broader targeting of health authorities.
Given the continued significance of the pandemic and persistent use of pandemic themes by adversaries, DomainTools researchers continuously monitor for items leveraging COVID-19 content for malicious purposes. While conducting this research, DomainTools analysts identified an interesting malicious document with what appeared to be unique staging and execution mechanisms.
Research can be found here:
COVID-19 Phishing With a Side of Cobalt Strike

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 May 2021 07:00:00 -0000</pubDate>
      <itunes:title>Leveraging COVID-19 themes for malicious purposes. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>184</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Joe Slowik joins us from DomainTools to discuss his team's research "COVID-19 Phishing With a Side of Cobalt Strike." Multiple adversaries, from criminal groups to state-directed entities, engaged in malicious cyber activity using COVID-19 pandemic themes since March 2020. Adversaries continue to leverage the pandemic, arguably the most significant issue globally as of this writing, in various ways. Yet the most persistent avenue remains using COVID-19 themes for building malicious document files. Examples include lures associated with Cloud Atlas-linked activity and broader targeting of health authorities.
Given the continued significance of the pandemic and persistent use of pandemic themes by adversaries, DomainTools researchers continuously monitor for items leveraging COVID-19 content for malicious purposes. While conducting this research, DomainTools analysts identified an interesting malicious document with what appeared to be unique staging and execution mechanisms.
Research can be found here:
COVID-19 Phishing With a Side of Cobalt Strike

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Joe Slowik joins us from DomainTools to discuss his team's research "COVID-19 Phishing With a Side of Cobalt Strike." Multiple adversaries, from criminal groups to state-directed entities, engaged in malicious cyber activity using COVID-19 pandemic themes since March 2020. Adversaries continue to leverage the pandemic, arguably the most significant issue globally as of this writing, in various ways. Yet the most persistent avenue remains using COVID-19 themes for building malicious document files. Examples include lures associated with Cloud Atlas-linked activity and broader targeting of health authorities.</p><p>Given the continued significance of the pandemic and persistent use of pandemic themes by adversaries, DomainTools researchers continuously monitor for items leveraging COVID-19 content for malicious purposes. While conducting this research, DomainTools analysts identified an interesting malicious document with what appeared to be unique staging and execution mechanisms.</p><p>Research can be found here:</p><ul><li><a href="https://www.domaintools.com/resources/blog/covid-19-phishing-with-a-side-of-cobalt-strike#">COVID-19 Phishing With a Side of Cobalt Strike</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1487</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6fe4edea-b99a-11eb-9c8f-4b52f960ffd5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8021914516.mp3?updated=1685125490" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DarkSide still more-or-less dark. Updates on Colonial Pipeline and HSE ransomware attacks. CNA said to have paid $40 million in ransom. Cyber privateers and cyber mercenaries.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1338/notes</link>
      <description>The US remains officially mum on whether it took down DarkSide, but it still looks as if the ransomware gang absconded on its own. Colonial Pipeline now faces legal fallout from its ransomware incident. Speculation about how states might handle cyber privateering. Conti’s attack on HSE is described as “catastrophic.” Russia says it was hit by foreign cyber mercenaries last year. Craig Williams from Cisco Talos explains Discord abuses. Our guest is Jon Ford from Mandiant on their M-Trends 2021 report. And CNA pays cyber extortionists $40 million.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/98
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 21 May 2021 20:25:00 -0000</pubDate>
      <itunes:title>DarkSide still more-or-less dark. Updates on Colonial Pipeline and HSE ransomware attacks. CNA said to have paid $40 million in ransom. Cyber privateers and cyber mercenaries.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1338</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The US remains officially mum on whether it took down DarkSide, but it still looks as if the ransomware gang absconded on its own. Colonial Pipeline now faces legal fallout from its ransomware incident. Speculation about how states might handle cyber privateering. Conti’s attack on HSE is described as “catastrophic.” Russia says it was hit by foreign cyber mercenaries last year. Craig Williams from Cisco Talos explains Discord abuses. Our guest is Jon Ford from Mandiant on their M-Trends 2021 report. And CNA pays cyber extortionists $40 million.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/98
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US remains officially mum on whether it took down DarkSide, but it still looks as if the ransomware gang absconded on its own. Colonial Pipeline now faces legal fallout from its ransomware incident. Speculation about how states might handle cyber privateering. Conti’s attack on HSE is described as “catastrophic.” Russia says it was hit by foreign cyber mercenaries last year. Craig Williams from Cisco Talos explains Discord abuses. Our guest is Jon Ford from Mandiant on their M-Trends 2021 report. And CNA pays cyber extortionists $40 million.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/98</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1663</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[06fa654c-364d-11eb-b082-9fa9759f4a75]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8962874123.mp3?updated=1690289494" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DarkSide: absconding, rebranding, or retiring to a life of penitence? (Probably the first two.) Israeli airstrikes said to target Hamas cyber ops centers. Apps behaving badly. Notes on phishbait.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1337/notes</link>
      <description>Did DarkSide really see the light and shut down, with a sincere promise of reform and restitution, or is the gang just rebranding? Researchers look at DarkSide ransomware and find complexity and sophistication. Israel says airstrikes in Gaza were intended to take out Hamas cyber ops facilities. Poor practices seem to have exposed data of millions of Android app users. Phishing from call centers and cloud services. David Dufour from Webroot looks at hacker psychology. Our guest is Rob Price from Snow Software on Shadow IT. And who dunnit to SolarWinds? Not the intern.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/97
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 20 May 2021 19:45:00 -0000</pubDate>
      <itunes:title>DarkSide: absconding, rebranding, or retiring to a life of penitence? (Probably the first two.) Israeli airstrikes said to target Hamas cyber ops centers. Apps behaving badly. Notes on phishbait.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1337</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Did DarkSide really see the light and shut down, with a sincere promise of reform and restitution, or is the gang just rebranding? Researchers look at DarkSide ransomware and find complexity and sophistication. Israel says airstrikes in Gaza were intended to take out Hamas cyber ops facilities. Poor practices seem to have exposed data of millions of Android app users. Phishing from call centers and cloud services. David Dufour from Webroot looks at hacker psychology. Our guest is Rob Price from Snow Software on Shadow IT. And who dunnit to SolarWinds? Not the intern.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/97
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Did DarkSide really see the light and shut down, with a sincere promise of reform and restitution, or is the gang just rebranding? Researchers look at DarkSide ransomware and find complexity and sophistication. Israel says airstrikes in Gaza were intended to take out Hamas cyber ops facilities. Poor practices seem to have exposed data of millions of Android app users. Phishing from call centers and cloud services. David Dufour from Webroot looks at hacker psychology. Our guest is Rob Price from Snow Software on Shadow IT. And who dunnit to SolarWinds? Not the intern.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/97</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1352</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[06968ea0-364d-11eb-b082-eb6a85902fd5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6543950144.mp3?updated=1690289475" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Updates on the Colonial Pipeline incident, and other ransomware incidents. A watering hole for water utilities. Credential harvesting, cryptojacking, and banking Trojans. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1336/notes</link>
      <description>Colonial Pipeline corrected yesterday’s IT glitch, and its CEO explains the decision to pay the ransom. A rundown of recent ransomware activity. A watering hole for water utilities? Credential harvesting and cryptojacking in the cloud. A banking Trojan spreads from Brazil to Europe. Joe Carrigan looks at keyboard biometrics. Our guest Dotan Nahum from Spectral on shifting left in security development. And the metaphysics of attribution.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/96
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 19 May 2021 19:45:00 -0000</pubDate>
      <itunes:title>Updates on the Colonial Pipeline incident, and other ransomware incidents. A watering hole for water utilities. Credential harvesting, cryptojacking, and banking Trojans. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1336</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Colonial Pipeline corrected yesterday’s IT glitch, and its CEO explains the decision to pay the ransom. A rundown of recent ransomware activity. A watering hole for water utilities? Credential harvesting and cryptojacking in the cloud. A banking Trojan spreads from Brazil to Europe. Joe Carrigan looks at keyboard biometrics. Our guest Dotan Nahum from Spectral on shifting left in security development. And the metaphysics of attribution.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/96
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Colonial Pipeline corrected yesterday’s IT glitch, and its CEO explains the decision to pay the ransom. A rundown of recent ransomware activity. A watering hole for water utilities? Credential harvesting and cryptojacking in the cloud. A banking Trojan spreads from Brazil to Europe. Joe Carrigan looks at keyboard biometrics. Our guest Dotan Nahum from Spectral on shifting left in security development. And the metaphysics of attribution.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/96</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1544</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[06644094-364d-11eb-b082-1fa7353b83ef]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8821143798.mp3?updated=1690289463" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>WastedLocker being distributed in RIG campaign. Investigation of the DarkSide attack on Colonial Pipeline. More ransomware gangs go offline. Double encryption. Third-party stalkerware risk.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1335/notes</link>
      <description>A new RIG campaign is distributing WastedLocker. The US Congress considers two bills informed by the Colonial Pipeline incident, and Congressional committees are looking at the company’s response to the attack. More ransomware gangs go offline, but Conti is still trying to collect from the Irish government. Double encryption appears to be an emerging trend in ransomware. Ben Yelin looks at insurance companies clamping down on ransomware payments. Our guest is Nick Gregory of Capsule8 with thoughts on the Linux security landscape. And there’s another problem with stalkerware: third-party risk.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/95
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 May 2021 19:30:00 -0000</pubDate>
      <itunes:title>WastedLocker being distributed in RIG campaign. Investigation of the DarkSide attack on Colonial Pipeline. More ransomware gangs go offline. Double encryption. Third-party stalkerware risk.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1335</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A new RIG campaign is distributing WastedLocker. The US Congress considers two bills informed by the Colonial Pipeline incident, and Congressional committees are looking at the company’s response to the attack. More ransomware gangs go offline, but Conti is still trying to collect from the Irish government. Double encryption appears to be an emerging trend in ransomware. Ben Yelin looks at insurance companies clamping down on ransomware payments. Our guest is Nick Gregory of Capsule8 with thoughts on the Linux security landscape. And there’s another problem with stalkerware: third-party risk.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/95
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A new RIG campaign is distributing WastedLocker. The US Congress considers two bills informed by the Colonial Pipeline incident, and Congressional committees are looking at the company’s response to the attack. More ransomware gangs go offline, but Conti is still trying to collect from the Irish government. Double encryption appears to be an emerging trend in ransomware. Ben Yelin looks at insurance companies clamping down on ransomware payments. Our guest is Nick Gregory of Capsule8 with thoughts on the Linux security landscape. And there’s another problem with stalkerware: third-party risk.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/95</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1496</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[06127fb6-364d-11eb-b082-0310c4889688]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1371436406.mp3?updated=1690289464" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Japan calls out China for cyberespionage. Colonial Pipeline restores service. Wither the DarkSide? Conti hits Irish health organizations, and Avaddon strikes AXA.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1334/notes</link>
      <description>Japan calls out China for cyberespionage. Colonial Pipeline restores service, as organizations look to their own vulnerability to ransomware. The DarkSide gang may have said it’s going out of business, but it’s at least as likely, probably likelier, that they’re either rebranding or absconding. Two other gangs are in business: Conti is hitting Irish health organizations, and Avaddon says it compromised insurer AXA. (AXE-uh) Rick Howard looks at new responsibilities for CISOs. Our guest is Samantha Madrid of Juniper Networks on establishing automation and security integrations seamlessly. And a spy gets fifteen years in a US prison.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/94
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 17 May 2021 20:30:00 -0000</pubDate>
      <itunes:title>Japan calls out China for cyberespionage. Colonial Pipeline restores service. Wither the DarkSide? Conti hits Irish health organizations, and Avaddon strikes AXA.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1334</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Japan calls out China for cyberespionage. Colonial Pipeline restores service, as organizations look to their own vulnerability to ransomware. The DarkSide gang may have said it’s going out of business, but it’s at least as likely, probably likelier, that they’re either rebranding or absconding. Two other gangs are in business: Conti is hitting Irish health organizations, and Avaddon says it compromised insurer AXA. (AXE-uh) Rick Howard looks at new responsibilities for CISOs. Our guest is Samantha Madrid of Juniper Networks on establishing automation and security integrations seamlessly. And a spy gets fifteen years in a US prison.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/94
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Japan calls out China for cyberespionage. Colonial Pipeline restores service, as organizations look to their own vulnerability to ransomware. The DarkSide gang may have said it’s going out of business, but it’s at least as likely, probably likelier, that they’re either rebranding or absconding. Two other gangs are in business: Conti is hitting Irish health organizations, and Avaddon says it compromised insurer AXA. (AXE-uh) Rick Howard looks at new responsibilities for CISOs. Our guest is Samantha Madrid of Juniper Networks on establishing automation and security integrations seamlessly. And a spy gets fifteen years in a US prison.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/94</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1405</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[05d00b2c-364d-11eb-b082-f71e26721285]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1393010378.mp3?updated=1690289428" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dominique West: Security found me. [Strategy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/49/notes</link>
      <description>Technical account manager Dominique West takes us on her career journey from engineering to cybersecurity. Even though her undergraduate degree was in information systems, Dominique did not learn about cybersecurity until she personally experienced credit card fraud. She had a range of positions from working the help desk in an art museum to vulnerability management and cloud security. Dominique mentions remembering feeling isolated as the only black person and one of few women in many situations. These experiences spurred her into action to create Security in Color to help others navigate their way into cybersecurity and share resources are available to them. Dominique recommends those interested in cybersecurity to go ahead and get your hands dirty out there; figure out what you like and what you don't like and do community. We thank Dominique for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 16 May 2021 07:00:00 -0000</pubDate>
      <itunes:title>Dominique West: Security found me. [Strategy] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>49</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Technical account manager Dominique West takes us on her career journey from engineering to cybersecurity. </itunes:subtitle>
      <itunes:summary>Technical account manager Dominique West takes us on her career journey from engineering to cybersecurity. Even though her undergraduate degree was in information systems, Dominique did not learn about cybersecurity until she personally experienced credit card fraud. She had a range of positions from working the help desk in an art museum to vulnerability management and cloud security. Dominique mentions remembering feeling isolated as the only black person and one of few women in many situations. These experiences spurred her into action to create Security in Color to help others navigate their way into cybersecurity and share resources are available to them. Dominique recommends those interested in cybersecurity to go ahead and get your hands dirty out there; figure out what you like and what you don't like and do community. We thank Dominique for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Technical account manager Dominique West takes us on her career journey from engineering to cybersecurity. Even though her undergraduate degree was in information systems, Dominique did not learn about cybersecurity until she personally experienced credit card fraud. She had a range of positions from working the help desk in an art museum to vulnerability management and cloud security. Dominique mentions remembering feeling isolated as the only black person and one of few women in many situations. These experiences spurred her into action to create Security in Color to help others navigate their way into cybersecurity and share resources are available to them. Dominique recommends those interested in cybersecurity to go ahead and get your hands dirty out there; figure out what you like and what you don't like and do community. We thank Dominique for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>368</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c89d05b6-b423-11eb-b17b-4ba179ba8b28]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9499039765.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Zeroing in on zero trust. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/14/notes</link>
      <description>The Zero Trust security model asserts that organizations should not trust anything within its perimeters and instead must inspect every traffic and verify anything connecting to its systems before granting access. While Zero Trust is generating a lot of buzz in the cyber world, it’s often hard to determine the implications of this security model. 
In this episode of CyberWire-X, guests will discuss the origins of the model, cut through the hype, and discuss what you really need to know to design, implement, and monitor an effective Zero Trust approach. John Kindervag of ON2IT Cybersecurity, also known as the "Creator of Zero Trust," shares his insights with the CyberWire's Rick Howard, and Tom Clavel of sponsor ExtraHop joins Kapil Raina from their partner CrowdStrike to offer their thoughts to the CyberWire's Dave Bittner.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 16 May 2021 07:00:00 -0000</pubDate>
      <itunes:title>Zeroing in on zero trust. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>14</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Zero Trust security model asserts that organizations should not trust anything within its perimeters and instead must inspect every traffic and verify anything connecting to its systems before granting access. While Zero Trust is generating a lot of buzz in the cyber world, it’s often hard to determine the implications of this security model. 
In this episode of CyberWire-X, guests will discuss the origins of the model, cut through the hype, and discuss what you really need to know to design, implement, and monitor an effective Zero Trust approach. John Kindervag of ON2IT Cybersecurity, also known as the "Creator of Zero Trust," shares his insights with the CyberWire's Rick Howard, and Tom Clavel of sponsor ExtraHop joins Kapil Raina from their partner CrowdStrike to offer their thoughts to the CyberWire's Dave Bittner.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Zero Trust security model asserts that organizations should not trust anything within its perimeters and instead must inspect every traffic and verify anything connecting to its systems before granting access. While Zero Trust is generating a lot of buzz in the cyber world, it’s often hard to determine the implications of this security model. </p><p>In this episode of CyberWire-X, guests will discuss the origins of the model, cut through the hype, and discuss what you really need to know to design, implement, and monitor an effective Zero Trust approach. John Kindervag of ON2IT Cybersecurity, also known as the "Creator of Zero Trust," shares his insights with the CyberWire's Rick Howard, and Tom Clavel of sponsor ExtraHop joins Kapil Raina from their partner CrowdStrike to offer their thoughts to the CyberWire's Dave Bittner.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1910</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f91a9cb2-b423-11eb-b17b-c3943c73d318]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5889900966.mp3?updated=1620776124" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jack Voltaic: Army Cyber Institute's critical infrastructure resiliency project, not a person. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/183/notes</link>
      <description>Guest LTC Erica Mitchell from Army Cyber Institute joins us to talk about their infrastructure resiliency research project called Jack Voltaic. The Army Cyber Institute’s (ACI’s) Jack Voltaic (JV) project enables the institute to study incident response gaps alongside assembled partners to identify interdependencies among critical infrastructure and provide recommendations. JV provides an innovative, bottom‐up approach to critical infrastructure resilience in two unique ways. Whereas most federal efforts to improve resiliency focus on regional or multistate emergency response, JV focuses on cities and municipalities where critical infrastructure and populations are most heavily populated. Furthermore, JV deviates from other cybersecurity and national preparedness exercises in that it builds around areas of interest nominated by the participants. Although JV events include national-level capabilities and resources, they are conceptually driven by the concerns of the cities and their infrastructure partners. Through this approach, the ACI, the Army, and the Department of Defense (DoD) are able to harvest insights about potential roles, dependencies, partners, and support requests, while cities are able to discover potential capability gaps and expand their critical infrastructure information-sharing networks before a potential disaster strikes.
Research links:

Jack Voltaic Cyber Research Project

Jack Voltaic 3.0 Cyber Research Report Executive Summary


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 May 2021 07:00:00 -0000</pubDate>
      <itunes:title>Jack Voltaic: Army Cyber Institute's critical infrastructure resiliency project, not a person. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>183</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest LTC Erica Mitchell from Army Cyber Institute joins us to talk about their infrastructure resiliency research project called Jack Voltaic. The Army Cyber Institute’s (ACI’s) Jack Voltaic (JV) project enables the institute to study incident response gaps alongside assembled partners to identify interdependencies among critical infrastructure and provide recommendations. JV provides an innovative, bottom‐up approach to critical infrastructure resilience in two unique ways. Whereas most federal efforts to improve resiliency focus on regional or multistate emergency response, JV focuses on cities and municipalities where critical infrastructure and populations are most heavily populated. Furthermore, JV deviates from other cybersecurity and national preparedness exercises in that it builds around areas of interest nominated by the participants. Although JV events include national-level capabilities and resources, they are conceptually driven by the concerns of the cities and their infrastructure partners. Through this approach, the ACI, the Army, and the Department of Defense (DoD) are able to harvest insights about potential roles, dependencies, partners, and support requests, while cities are able to discover potential capability gaps and expand their critical infrastructure information-sharing networks before a potential disaster strikes.
Research links:

Jack Voltaic Cyber Research Project

Jack Voltaic 3.0 Cyber Research Report Executive Summary


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest LTC Erica Mitchell from Army Cyber Institute joins us to talk about their infrastructure resiliency research project called Jack Voltaic. The Army Cyber Institute’s (ACI’s) Jack Voltaic (JV) project enables the institute to study incident response gaps alongside assembled partners to identify interdependencies among critical infrastructure and provide recommendations. JV provides an innovative, bottom‐up approach to critical infrastructure resilience in two unique ways. Whereas most federal efforts to improve resiliency focus on regional or multistate emergency response, JV focuses on cities and municipalities where critical infrastructure and populations are most heavily populated. Furthermore, JV deviates from other cybersecurity and national preparedness exercises in that it builds around areas of interest nominated by the participants. Although JV events include national-level capabilities and resources, they are conceptually driven by the concerns of the cities and their infrastructure partners. Through this approach, the ACI, the Army, and the Department of Defense (DoD) are able to harvest insights about potential roles, dependencies, partners, and support requests, while cities are able to discover potential capability gaps and expand their critical infrastructure information-sharing networks before a potential disaster strikes.</p><p>Research links:</p><ul>
<li><a href="https://cyber.army.mil/Research/Jack-Voltaic/">Jack Voltaic Cyber Research Project</a></li>
<li><a href="https://cyber.army.mil/Portals/3/Documents/JackVoltaic/3.0/JackVoltaic_Executive_Summary_3.0.pdf?ver=nWJUt-NyVHwCdqkbbi7tTw%3d%3d">Jack Voltaic 3.0 Cyber Research Report Executive Summary</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1730</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16db4ff8-b410-11eb-9195-1bfaf1298e2a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1416061952.mp3?updated=1685125481" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware hoods and their enablers may be feeling some heat. Supply chain compromise and third-party risk. Colonial Pipeline resumes deliveries (but paid ransom to no avail).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1333/notes</link>
      <description>DarkSide says it’s feeling the heat and is going out of business, but some of its affiliates are still out and active, for now at least. A popular hackers’ forum says it will no longer accept ransomware ads. The Bash Loader supply chain compromise afflicts another known victim. Colonial Pipeline resumes delivery of fuel. Irresponsible disclosure of vulnerabilities hands attackers a big advantage. Carole Theriault looks at NFTs. Joe Carrigan wonders about the return on your ransomware payment investment. And there’s a lot of Amazon-themed vishing going on out there.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/93
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 14 May 2021 20:00:00 -0000</pubDate>
      <itunes:title>Ransomware hoods and their enablers may be feeling some heat. Supply chain compromise and third-party risk. Colonial Pipeline resumes deliveries (but paid ransom to no avail).</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1333</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>DarkSide says it’s feeling the heat and is going out of business, but some of its affiliates are still out and active, for now at least. A popular hackers’ forum says it will no longer accept ransomware ads. The Bash Loader supply chain compromise afflicts another known victim. Colonial Pipeline resumes delivery of fuel. Irresponsible disclosure of vulnerabilities hands attackers a big advantage. Carole Theriault looks at NFTs. Joe Carrigan wonders about the return on your ransomware payment investment. And there’s a lot of Amazon-themed vishing going on out there.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/93
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>DarkSide says it’s feeling the heat and is going out of business, but some of its affiliates are still out and active, for now at least. A popular hackers’ forum says it will no longer accept ransomware ads. The Bash Loader supply chain compromise afflicts another known victim. Colonial Pipeline resumes delivery of fuel. Irresponsible disclosure of vulnerabilities hands attackers a big advantage. Carole Theriault looks at NFTs. Joe Carrigan wonders about the return on your ransomware payment investment. And there’s a lot of Amazon-themed vishing going on out there.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/93</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1556</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[06e0e8d8-364d-11eb-b082-2759bca30160]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6309939166.mp3?updated=1690289412" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The US Executive Order on cybersecurity is out. Colonial Pipeline, its security and response under scrutiny, resumes deliveries. Verizon’s DBIR is out.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1332/notes</link>
      <description>The US Executive Order on Improving the Nation’s Cybersecurity is out. Colonial Pipeline partially resumed delivery of fuel yesterday evening, as its preparation for and response to the cyberattack it sustained receive scrutiny. The DarkSide’s extortion of the US pipeline company seems likely to prompt regulatory revision. DarkSide operators say they’ve gotten busy against other targets. Our own Rick Howard speaks with Aaron Sant-Miller, Chief Scientist at BAH, on developments in artificial intelligence. And Verizon’s Database Investigations Report is out. I check in with Verizon’s Chris Novak for highlights from the DBIR.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/92
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 13 May 2021 21:05:00 -0000</pubDate>
      <itunes:title>The US Executive Order on cybersecurity is out. Colonial Pipeline, its security and response under scrutiny, resumes deliveries. Verizon’s DBIR is out.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1332</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The US Executive Order on Improving the Nation’s Cybersecurity is out. Colonial Pipeline partially resumed delivery of fuel yesterday evening, as its preparation for and response to the cyberattack it sustained receive scrutiny. The DarkSide’s extortion of the US pipeline company seems likely to prompt regulatory revision. DarkSide operators say they’ve gotten busy against other targets. Our own Rick Howard speaks with Aaron Sant-Miller, Chief Scientist at BAH, on developments in artificial intelligence. And Verizon’s Database Investigations Report is out. I check in with Verizon’s Chris Novak for highlights from the DBIR.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/92
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US Executive Order on Improving the Nation’s Cybersecurity is out. Colonial Pipeline partially resumed delivery of fuel yesterday evening, as its preparation for and response to the cyberattack it sustained receive scrutiny. The DarkSide’s extortion of the US pipeline company seems likely to prompt regulatory revision. DarkSide operators say they’ve gotten busy against other targets. Our own Rick Howard speaks with Aaron Sant-Miller, Chief Scientist at BAH, on developments in artificial intelligence. And Verizon’s Database Investigations Report is out. I check in with Verizon’s Chris Novak for highlights from the DBIR.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/92</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1547</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[06a6702c-364d-11eb-b082-3781d59fb2e2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8130807383.mp3?updated=1690289391" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The security industry looks at DarkSide ransomware. CISA offers advice on defense and recovery. A new banking Trojan is out. Deprecated protocols remain in use. A quick look at Patch Tuesday.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1331/notes</link>
      <description>FireEye provides an overview of the DarkSide ransomware-as-a-service operation. Forcepoint suggests a connection between DarkSide and other ransomware gangs, notably REvil. Colonial Pipeline continues its recovery efforts from the cyber attack it sustained. As ransomware grows more common, CISA offers advice on how to prepare defenses. A new Android banking Trojan is in circulation. Cecelia Marinier from RSA on the RSAC Innovation Sandbox. Bret Arsenault from Microsoft previews his new Microsoft CISO podcast. And yesterday, of course, was Patch Tuesday.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/91
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 12 May 2021 20:10:00 -0000</pubDate>
      <itunes:title>The security industry looks at DarkSide ransomware. CISA offers advice on defense and recovery. A new banking Trojan is out. Deprecated protocols remain in use. A quick look at Patch Tuesday.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1331</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>FireEye provides an overview of the DarkSide ransomware-as-a-service operation. Forcepoint suggests a connection between DarkSide and other ransomware gangs, notably REvil. Colonial Pipeline continues its recovery efforts from the cyber attack it sustained. As ransomware grows more common, CISA offers advice on how to prepare defenses. A new Android banking Trojan is in circulation. Cecelia Marinier from RSA on the RSAC Innovation Sandbox. Bret Arsenault from Microsoft previews his new Microsoft CISO podcast. And yesterday, of course, was Patch Tuesday.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/91
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>FireEye provides an overview of the DarkSide ransomware-as-a-service operation. Forcepoint suggests a connection between DarkSide and other ransomware gangs, notably REvil. Colonial Pipeline continues its recovery efforts from the cyber attack it sustained. As ransomware grows more common, CISA offers advice on how to prepare defenses. A new Android banking Trojan is in circulation. Cecelia Marinier from RSA on the RSAC Innovation Sandbox. Bret Arsenault from Microsoft previews his new Microsoft CISO podcast. And yesterday, of course, was Patch Tuesday.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/91</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1618</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[065430d2-364d-11eb-b082-3f4c56f2c04f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2790304941.mp3?updated=1690289377" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware: DarkSide, Avaddon, and Baduk. 5G threat vectors. Crytpojacking unpatched Exchange Servers. Bogus Chrome app. An espionage trial approaches sentencing. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1330/notes</link>
      <description>Updates on the DarkSide ransomware attack on Colonial Pipeline. Other ransomware strains, including Avaddon and Babuk are out, and dangerous. Guidelines on 5G threat vectors. Lemon Duck cryptojackers are looking for vulnerable Exchange Server instances. A bogus, malicious Chrome app is circulating by smishing. Ben Yelin examines an online facial recognition platform. Our guest is Mathieu Gorge of VigiTrust on the privacy risks of video and audio recordings. And an update on an espionage trial.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/90
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 May 2021 20:30:00 -0000</pubDate>
      <itunes:title>Ransomware: DarkSide, Avaddon, and Baduk. 5G threat vectors. Crytpojacking unpatched Exchange Servers. Bogus Chrome app. An espionage trial approaches sentencing. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1330</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Updates on the DarkSide ransomware attack on Colonial Pipeline. Other ransomware strains, including Avaddon and Babuk are out, and dangerous. Guidelines on 5G threat vectors. Lemon Duck cryptojackers are looking for vulnerable Exchange Server instances. A bogus, malicious Chrome app is circulating by smishing. Ben Yelin examines an online facial recognition platform. Our guest is Mathieu Gorge of VigiTrust on the privacy risks of video and audio recordings. And an update on an espionage trial.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/90
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Updates on the DarkSide ransomware attack on Colonial Pipeline. Other ransomware strains, including Avaddon and Babuk are out, and dangerous. Guidelines on 5G threat vectors. Lemon Duck cryptojackers are looking for vulnerable Exchange Server instances. A bogus, malicious Chrome app is circulating by smishing. Ben Yelin examines an online facial recognition platform. Our guest is Mathieu Gorge of VigiTrust on the privacy risks of video and audio recordings. And an update on an espionage trial.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/90</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1480</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[062361a0-364d-11eb-b082-4f6cd422559d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8262717017.mp3?updated=1690289359" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware disrupts pipeline operations in the Eastern US. Other ransomware attacks reported by US municipal and Tribal governments. UK-US advisory on SVR TTPs. SolarWinds update.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1329/notes</link>
      <description>Colonial Pipeline shuts down some systems after a ransomware attack, disrupting refined petroleum product delivery in the Eastern US. We’ll check in with Sergio Caltagirone from Dragos for his analysis. Other ransomware attacks hit city and Tribal governments. Joint UK-US alert on SVR tactics issued, and the SVR may have changed its methods accordingly. SolarWinds revised downward its estimate of the number of customers affected by its compromise. Rick Howard previews his CSO Perspectives podcasts on risk metrics. Four guilty pleas in “bulletproof hosting” RICO case.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/89
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 10 May 2021 20:30:00 -0000</pubDate>
      <itunes:title>Ransomware disrupts pipeline operations in the Eastern US. Other ransomware attacks reported by US municipal and Tribal governments. UK-US advisory on SVR TTPs. SolarWinds update.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1329</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Colonial Pipeline shuts down some systems after a ransomware attack, disrupting refined petroleum product delivery in the Eastern US. We’ll check in with Sergio Caltagirone from Dragos for his analysis. Other ransomware attacks hit city and Tribal governments. Joint UK-US alert on SVR tactics issued, and the SVR may have changed its methods accordingly. SolarWinds revised downward its estimate of the number of customers affected by its compromise. Rick Howard previews his CSO Perspectives podcasts on risk metrics. Four guilty pleas in “bulletproof hosting” RICO case.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/89
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Colonial Pipeline shuts down some systems after a ransomware attack, disrupting refined petroleum product delivery in the Eastern US. We’ll check in with Sergio Caltagirone from Dragos for his analysis. Other ransomware attacks hit city and Tribal governments. Joint UK-US alert on SVR tactics issued, and the SVR may have changed its methods accordingly. SolarWinds revised downward its estimate of the number of customers affected by its compromise. Rick Howard previews his CSO Perspectives podcasts on risk metrics. Four guilty pleas in “bulletproof hosting” RICO case.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/89</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1562</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[05c063ac-364d-11eb-b082-37a107627390]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8088793738.mp3?updated=1690289220" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Street cred: increasing trust in passwordless authentication. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/13/notes</link>
      <description>Good security gets out of the way of users while getting in the way of adversaries. Passwords fail on both accounts. Users feel the pain of adhering to complex password policies. Adversaries simply copy, break, or brute-force their way in. Why, then, have we spent decades with passwords as the primary factor for authentication?From the very first theft of cleartext passwords to the very latest bypass of a second-factor, time and again improvements in defenses are met with improved attacks. The industry needs to trust passwordless authentication.What holds us back from getting rid of passwords? Trust.
In this episode of CyberWire-X, guests will discuss a framework of technical controls to ensure only trusted sessions authenticate, regardless of faults or failures in any one factor. We will share a path forward for increasing trust in passwordless authentication. Nikk Gilbert of CISO of Cherokee Nation Businesses and retired CSO Gary McAlum share their insights with Rick Howard, and Advisory CISO of Duo Security at Cisco Wolfgang Goerlich from sponsor Duo Security offers his thoughts with Dave Bittner.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 09 May 2021 07:00:00 -0000</pubDate>
      <itunes:title>Street cred: increasing trust in passwordless authentication. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>13</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Good security gets out of the way of users while getting in the way of adversaries. Passwords fail on both accounts. Users feel the pain of adhering to complex password policies. Adversaries simply copy, break, or brute-force their way in. Why, then, have we spent decades with passwords as the primary factor for authentication?From the very first theft of cleartext passwords to the very latest bypass of a second-factor, time and again improvements in defenses are met with improved attacks. The industry needs to trust passwordless authentication.What holds us back from getting rid of passwords? Trust.
In this episode of CyberWire-X, guests will discuss a framework of technical controls to ensure only trusted sessions authenticate, regardless of faults or failures in any one factor. We will share a path forward for increasing trust in passwordless authentication. Nikk Gilbert of CISO of Cherokee Nation Businesses and retired CSO Gary McAlum share their insights with Rick Howard, and Advisory CISO of Duo Security at Cisco Wolfgang Goerlich from sponsor Duo Security offers his thoughts with Dave Bittner.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Good security gets out of the way of users while getting in the way of adversaries. Passwords fail on both accounts. Users feel the pain of adhering to complex password policies. Adversaries simply copy, break, or brute-force their way in. Why, then, have we spent decades with passwords as the primary factor for authentication?From the very first theft of cleartext passwords to the very latest bypass of a second-factor, time and again improvements in defenses are met with improved attacks. The industry needs to trust passwordless authentication.What holds us back from getting rid of passwords? Trust.</p><p>In this episode of CyberWire-X, guests will discuss a framework of technical controls to ensure only trusted sessions authenticate, regardless of faults or failures in any one factor. We will share a path forward for increasing trust in passwordless authentication. Nikk Gilbert of CISO of Cherokee Nation Businesses and retired CSO Gary McAlum share their insights with Rick Howard, and Advisory CISO of Duo Security at Cisco Wolfgang Goerlich from sponsor Duo Security offers his thoughts with Dave Bittner.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1734</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e5dacf3c-af46-11eb-8d9d-935be4c80991]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5321882554.mp3?updated=1620153980" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Yatia (Tia) Hopkins: Grit and right place, right time. [Solutions Architecture] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/47/notes</link>
      <description>VP of Global Solutions Architecture at eSentire Tia Hopkins shares her career journey and talks about its beginnings in engineering and pivots into cybersecurity leadership. Tia shares how she liked to take things apart when she was young, including the brand new computer her mother bought her and how she was fascinated by all the pieces of it spread all across her bedroom floor. As she started studying engineering, Tia learned she was more of a technologist than an engineer. Tia got her start in technology without completing her formal education by what she says is "grit and right place, right time." Once she was in a management role, Tia wanted to validate her knowledge, experience, and ability and not only completed her bachelor's degree, but also two master's degrees. Tia recently started an organization to encourage and grow interest, confidence, and leaders of women of color in the field of cybersecurity. We thank Tia for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 09 May 2021 07:00:00 -0000</pubDate>
      <itunes:title>Yatia (Tia) Hopkins: Grit and right place, right time. [Solutions Architecture] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>48</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>VP of Global Solutions Architecture at eSentire Tia Hopkins shares her career journey and pivots into cybersecurity leadership.</itunes:subtitle>
      <itunes:summary>VP of Global Solutions Architecture at eSentire Tia Hopkins shares her career journey and talks about its beginnings in engineering and pivots into cybersecurity leadership. Tia shares how she liked to take things apart when she was young, including the brand new computer her mother bought her and how she was fascinated by all the pieces of it spread all across her bedroom floor. As she started studying engineering, Tia learned she was more of a technologist than an engineer. Tia got her start in technology without completing her formal education by what she says is "grit and right place, right time." Once she was in a management role, Tia wanted to validate her knowledge, experience, and ability and not only completed her bachelor's degree, but also two master's degrees. Tia recently started an organization to encourage and grow interest, confidence, and leaders of women of color in the field of cybersecurity. We thank Tia for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>VP of Global Solutions Architecture at eSentire Tia Hopkins shares her career journey and talks about its beginnings in engineering and pivots into cybersecurity leadership. Tia shares how she liked to take things apart when she was young, including the brand new computer her mother bought her and how she was fascinated by all the pieces of it spread all across her bedroom floor. As she started studying engineering, Tia learned she was more of a technologist than an engineer. Tia got her start in technology without completing her formal education by what she says is "grit and right place, right time." Once she was in a management role, Tia wanted to validate her knowledge, experience, and ability and not only completed her bachelor's degree, but also two master's degrees. Tia recently started an organization to encourage and grow interest, confidence, and leaders of women of color in the field of cybersecurity. We thank Tia for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>389</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5770e2ea-ae6f-11eb-b379-e39d0e5f2cde]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9601003085.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SUPERNOVA activity and its possible connection to SPIRAL threat group. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/182/notes</link>
      <description>Guest Mike McLellan from Secureworks joins us to share his team's insights about SUPERNOVA and threat group attribution. Similarities between the SUPERNOVA activity and a previous compromise of the network suggest that SPIRAL was responsible for both intrusions and reveal information about the threat group.
In late 2020, Secureworks® Counter Threat Unit™ (CTU) researchers observed a threat actor exploiting an internet-facing SolarWinds server to deploy the SUPERNOVA web shell. Additional analysis revealed similarities to intrusion activity identified on the same network earlier in 2020, suggesting the two intrusions are linked. CTU™ researchers attribute the intrusions to the SPIRAL threat group. Characteristics of the activity suggest the group is based in China.
The research can be found here:
SUPERNOVA Web Shell Deployment Linked to SPIRAL Threat Group

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 May 2021 07:00:00 -0000</pubDate>
      <itunes:title>SUPERNOVA activity and its possible connection to SPIRAL threat group. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>182</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Mike McLellan from Secureworks joins us to share his team's insights about SUPERNOVA and threat group attribution. Similarities between the SUPERNOVA activity and a previous compromise of the network suggest that SPIRAL was responsible for both intrusions and reveal information about the threat group.
In late 2020, Secureworks® Counter Threat Unit™ (CTU) researchers observed a threat actor exploiting an internet-facing SolarWinds server to deploy the SUPERNOVA web shell. Additional analysis revealed similarities to intrusion activity identified on the same network earlier in 2020, suggesting the two intrusions are linked. CTU™ researchers attribute the intrusions to the SPIRAL threat group. Characteristics of the activity suggest the group is based in China.
The research can be found here:
SUPERNOVA Web Shell Deployment Linked to SPIRAL Threat Group

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Mike McLellan from Secureworks joins us to share his team's insights about SUPERNOVA and threat group attribution. Similarities between the SUPERNOVA activity and a previous compromise of the network suggest that SPIRAL was responsible for both intrusions and reveal information about the threat group.</p><p>In late 2020, Secureworks® Counter Threat Unit™ (CTU) researchers observed a threat actor exploiting an internet-facing SolarWinds server to deploy the SUPERNOVA web shell. Additional analysis revealed similarities to intrusion activity identified on the same network earlier in 2020, suggesting the two intrusions are linked. CTU™ researchers attribute the intrusions to the SPIRAL threat group. Characteristics of the activity suggest the group is based in China.</p><p>The research can be found here:</p><ul><li><a href="https://www.secureworks.com/blog/supernova-web-shell-deployment-linked-to-spiral-threat-group">SUPERNOVA Web Shell Deployment Linked to SPIRAL Threat Group</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1208</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[77a8d77a-ae6f-11eb-a468-9b0a930dfdc3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2787000192.mp3?updated=1685125468" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA on FiveHands. Connections among cybergangs, Russian intelligence services? Software supply chain security. Scripps Health incident update. Home routers. Ryuk hits research institute.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1328/notes</link>
      <description>CISA outlines the FiveHands ransomware campaign. Circumstantial evidence suggests that some cybergangs are either controlled by or are doing contract work for Russian intelligence services. US Federal agencies turn their attention to software supply chain security. Scripps Health continues its recovery from cyberattack. Insecure home routers in the UK. Daniel Prince from Lancaster University has thoughts on cybersecurity education. Our guest Rupesh Chokshi from AT&amp;T has suggestions for organizations who want to get SASE, but don’t know where to begin. And Ryuk ransomware throws a wrench in research at a European biomedical institute.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/88
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 07 May 2021 19:15:00 -0000</pubDate>
      <itunes:title>CISA on FiveHands. Connections among cybergangs, Russian intelligence services? Software supply chain security. Scripps Health incident update. Home routers. Ryuk hits research institute.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1328</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA outlines the FiveHands ransomware campaign. Circumstantial evidence suggests that some cybergangs are either controlled by or are doing contract work for Russian intelligence services. US Federal agencies turn their attention to software supply chain security. Scripps Health continues its recovery from cyberattack. Insecure home routers in the UK. Daniel Prince from Lancaster University has thoughts on cybersecurity education. Our guest Rupesh Chokshi from AT&amp;T has suggestions for organizations who want to get SASE, but don’t know where to begin. And Ryuk ransomware throws a wrench in research at a European biomedical institute.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/88
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA outlines the FiveHands ransomware campaign. Circumstantial evidence suggests that some cybergangs are either controlled by or are doing contract work for Russian intelligence services. US Federal agencies turn their attention to software supply chain security. Scripps Health continues its recovery from cyberattack. Insecure home routers in the UK. Daniel Prince from Lancaster University has thoughts on cybersecurity education. Our guest Rupesh Chokshi from AT&amp;T has suggestions for organizations who want to get SASE, but don’t know where to begin. And Ryuk ransomware throws a wrench in research at a European biomedical institute.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/88</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1587</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[06ca00e6-364d-11eb-b082-5b8f1680859a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8410894922.mp3?updated=1690289193" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Some possible insight into what a Chinese cyberespionage unit is up to. Hackathons, from Beijing to Washington. Panda Stealer is after crypto wallets. And Peloton deals with a leaky API.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1327/notes</link>
      <description>Some possible insight into what a Chinese cyberespionage unit is up to. Hackathons, from Beijing to Washington (the one sponsored by Beijing developed an iPhone zero-day used against China’s Uyghurs). Panda Stealer is after crypto wallets. Microsoft's Kevin Magee reflects on lessons learned in the last year. Our own Rick Howard speaks with Todd Neilson from World Wide Technology on Zero Trust. And Peloton deals with a leaky API.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/87
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 06 May 2021 19:45:00 -0000</pubDate>
      <itunes:title>Some possible insight into what a Chinese cyberespionage unit is up to. Hackathons, from Beijing to Washington. Panda Stealer is after crypto wallets. And Peloton deals with a leaky API.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1327</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Some possible insight into what a Chinese cyberespionage unit is up to. Hackathons, from Beijing to Washington (the one sponsored by Beijing developed an iPhone zero-day used against China’s Uyghurs). Panda Stealer is after crypto wallets. Microsoft's Kevin Magee reflects on lessons learned in the last year. Our own Rick Howard speaks with Todd Neilson from World Wide Technology on Zero Trust. And Peloton deals with a leaky API.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/87
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Some possible insight into what a Chinese cyberespionage unit is up to. Hackathons, from Beijing to Washington (the one sponsored by Beijing developed an iPhone zero-day used against China’s Uyghurs). Panda Stealer is after crypto wallets. Microsoft's Kevin Magee reflects on lessons learned in the last year. Our own Rick Howard speaks with Todd Neilson from World Wide Technology on Zero Trust. And Peloton deals with a leaky API.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/87</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1433</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[06b6e592-364d-11eb-b082-7f77581d57bf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2304822544.mp3?updated=1690289180" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DDoS interrupts Belgium’s parliament. New malware in the wild. Spies and crooks work around MFA, OAuth. COVID-19 scam site takedown. Online election fraud (in a homecoming queen election).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1326/notes</link>
      <description>Belgium sustains a DDoS attack that knocks parliamentary sessions offline. New malware strains identified in phishing campaign. Threat actors look for ways of working around multi-factor authentication and open authentication. COVID-19 scams continue online, and attract law enforcement attention. Joe Carrigan describes a compromised password manager. Our guests are Linda Gray Martin &amp; Britta Glade from RSA with a preview of this year’s RSAC conference. And how secure was your high school’s election for homecoming court.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/86
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 05 May 2021 20:25:00 -0000</pubDate>
      <itunes:title>DDoS interrupts Belgium’s parliament. New malware in the wild. Spies and crooks work around MFA, OAuth. COVID-19 scam site takedown. Online election fraud (in a homecoming queen election).</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1326</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Belgium sustains a DDoS attack that knocks parliamentary sessions offline. New malware strains identified in phishing campaign. Threat actors look for ways of working around multi-factor authentication and open authentication. COVID-19 scams continue online, and attract law enforcement attention. Joe Carrigan describes a compromised password manager. Our guests are Linda Gray Martin &amp; Britta Glade from RSA with a preview of this year’s RSAC conference. And how secure was your high school’s election for homecoming court.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/86
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Belgium sustains a DDoS attack that knocks parliamentary sessions offline. New malware strains identified in phishing campaign. Threat actors look for ways of working around multi-factor authentication and open authentication. COVID-19 scams continue online, and attract law enforcement attention. Joe Carrigan describes a compromised password manager. Our guests are Linda Gray Martin &amp; Britta Glade from RSA with a preview of this year’s RSAC conference. And how secure was your high school’s election for homecoming court.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/86</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1646</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[06439f38-364d-11eb-b082-33d34e187787]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6537244094.mp3?updated=1690289186" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>VPN vulnerability exploited for cyberespionage closed. “IT security incident” at medical system. Android banking Trojans and cryptocurrency. Cyber threats to the Tokyo Olympics.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1325/notes</link>
      <description>Pulse Secure patches its VPN, and CISA for one thinks you ought to apply those fixes. Apple has also patched two zero-days in its Webkit engine. Scripps Health recovers from what’s said to be a ransomware attack. Researchers describe Genesis, a criminal market for digital fingerprints. Ben Yelin described a grand jury subpoena for Signal user data. Our guest is Ryan Weeks from Datto on the need for cyber resilience in the MSP community. And Japan works on cybersecurity for this summer’s upcoming Olympic Games.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/85
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 May 2021 20:00:00 -0000</pubDate>
      <itunes:title>VPN vulnerability exploited for cyberespionage closed. “IT security incident” at medical system. Android banking Trojans and cryptocurrency. Cyber threats to the Tokyo Olympics.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1325</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Pulse Secure patches its VPN, and CISA for one thinks you ought to apply those fixes. Apple has also patched two zero-days in its Webkit engine. Scripps Health recovers from what’s said to be a ransomware attack. Researchers describe Genesis, a criminal market for digital fingerprints. Ben Yelin described a grand jury subpoena for Signal user data. Our guest is Ryan Weeks from Datto on the need for cyber resilience in the MSP community. And Japan works on cybersecurity for this summer’s upcoming Olympic Games.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/85
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Pulse Secure patches its VPN, and CISA for one thinks you ought to apply those fixes. Apple has also patched two zero-days in its Webkit engine. Scripps Health recovers from what’s said to be a ransomware attack. Researchers describe Genesis, a criminal market for digital fingerprints. Ben Yelin described a grand jury subpoena for Signal user data. Our guest is Ryan Weeks from Datto on the need for cyber resilience in the MSP community. And Japan works on cybersecurity for this summer’s upcoming Olympic Games.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/85</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1482</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[06337f2c-364d-11eb-b082-977343247206]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1868446721.mp3?updated=1690289149" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Data exposure reported in the Philippines. FISA targets down during the pandemic. Babuk changes its focus. New variant of the Buer loader in the wild. US Justice Department reviews its cyber strategy.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1324/notes</link>
      <description>Possible data exposure at the Philippines’ Office of the Solicitor General. In the US, FISA surveillance targets dropped during 2020’s pandemic. The Babuk gang says it’s giving up encryption to concentrate on doxing. A new version of the Buer loader is out in the wild. Rick Howard looks at security in the energy sector. Betsy Carmelite from Booz Allen Hamilton on telemedicine security concerns. The US Justice Department undertakes a review of its cybersecurity policies and strategy.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/84
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 03 May 2021 19:15:00 -0000</pubDate>
      <itunes:title>Data exposure reported in the Philippines. FISA targets down during the pandemic. Babuk changes its focus. New variant of the Buer loader in the wild. US Justice Department reviews its cyber strategy.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1324</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Possible data exposure at the Philippines’ Office of the Solicitor General. In the US, FISA surveillance targets dropped during 2020’s pandemic. The Babuk gang says it’s giving up encryption to concentrate on doxing. A new version of the Buer loader is out in the wild. Rick Howard looks at security in the energy sector. Betsy Carmelite from Booz Allen Hamilton on telemedicine security concerns. The US Justice Department undertakes a review of its cybersecurity policies and strategy.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/84
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Possible data exposure at the Philippines’ Office of the Solicitor General. In the US, FISA surveillance targets dropped during 2020’s pandemic. The Babuk gang says it’s giving up encryption to concentrate on doxing. A new version of the Buer loader is out in the wild. Rick Howard looks at security in the energy sector. Betsy Carmelite from Booz Allen Hamilton on telemedicine security concerns. The US Justice Department undertakes a review of its cybersecurity policies and strategy.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/84</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1491</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[05b055ca-364d-11eb-b082-7f3790569d94]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4955735435.mp3?updated=1690289117" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jim Zufoletti: Building your experience portfolio. [Entrepreneur] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/47/notes</link>
      <description>CEO and co-founder of SafeGuard Cyber Jim Zufoletti shares his journey starting out as an intrepreneur and transformation into a serial entrepreneur in cybersecurity. Jim shares how he got his feet wet working for others as an intrepreneur and catching the entrepreneurial bug in the mid-90s. He has co-founded a number of companies starting with FreeMarkets, a B2B ecommerce company. After that went public and Jim moved on, he went to business school at the University of Virginia and crossed paths with his future co-founder of SafeGuard Cyber. At UVA, Jim was inspired by a professor who exposed him to the effectuation approach to entrepreneurship, Along those lines, Jim recommends those looking to start a business in cyber build their experience portfolio. Jim took what he learned to help build where he is today. His company helps protect the humans in this new digital world with the current work from home environment. And, we thank Jim for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 02 May 2021 07:00:00 -0000</pubDate>
      <itunes:title>Jim Zufoletti: Building your experience portfolio. [Entrepreneur] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>47</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>CEO and co-founder of SafeGuard Cyber Jim Zufoletti discusses being a serial entrepreneur in cybersecurity. </itunes:subtitle>
      <itunes:summary>CEO and co-founder of SafeGuard Cyber Jim Zufoletti shares his journey starting out as an intrepreneur and transformation into a serial entrepreneur in cybersecurity. Jim shares how he got his feet wet working for others as an intrepreneur and catching the entrepreneurial bug in the mid-90s. He has co-founded a number of companies starting with FreeMarkets, a B2B ecommerce company. After that went public and Jim moved on, he went to business school at the University of Virginia and crossed paths with his future co-founder of SafeGuard Cyber. At UVA, Jim was inspired by a professor who exposed him to the effectuation approach to entrepreneurship, Along those lines, Jim recommends those looking to start a business in cyber build their experience portfolio. Jim took what he learned to help build where he is today. His company helps protect the humans in this new digital world with the current work from home environment. And, we thank Jim for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CEO and co-founder of SafeGuard Cyber Jim Zufoletti shares his journey starting out as an intrepreneur and transformation into a serial entrepreneur in cybersecurity. Jim shares how he got his feet wet working for others as an intrepreneur and catching the entrepreneurial bug in the mid-90s. He has co-founded a number of companies starting with FreeMarkets, a B2B ecommerce company. After that went public and Jim moved on, he went to business school at the University of Virginia and crossed paths with his future co-founder of SafeGuard Cyber. At UVA, Jim was inspired by a professor who exposed him to the effectuation approach to entrepreneurship, Along those lines, Jim recommends those looking to start a business in cyber build their experience portfolio. Jim took what he learned to help build where he is today. His company helps protect the humans in this new digital world with the current work from home environment. And, we thank Jim for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>367</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ac0715ba-a83c-11eb-b409-77ae9221e59b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8820674052.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A snapshot of the ransomware threat landscape. [Research Saturday}</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/181/notes</link>
      <description>Guest Jen Miller-Osborn from Palo Alto Networks' Unit 42 joins Dave to discuss their 2021 Unit 42 Ransomware Threat Report, which highlights a surge in ransomware demands based on a global analysis of the threat landscape in 2020. To evaluate the current state of the ransomware threat landscape, the Unit 42 threat intelligence team and the Crypsis incident response team collaborated to analyze the ransomware threat landscape in 2020, with global data from Unit 42 as well as US, Canada, and Europe data from Crypsis. The report details the top ransomware variants, average ransomware payments, ransomware predictions, and actionable next steps to immediately reduce ransomware risk.
The report can be found here:


2021 Unit 42 Ransomware Threat Report

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 May 2021 07:00:00 -0000</pubDate>
      <itunes:title>A snapshot of the ransomware threat landscape. [Research Saturday}</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>181</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Jen Miller-Osborn from Palo Alto Networks' Unit 42 joins Dave to discuss their 2021 Unit 42 Ransomware Threat Report, which highlights a surge in ransomware demands based on a global analysis of the threat landscape in 2020. To evaluate the current state of the ransomware threat landscape, the Unit 42 threat intelligence team and the Crypsis incident response team collaborated to analyze the ransomware threat landscape in 2020, with global data from Unit 42 as well as US, Canada, and Europe data from Crypsis. The report details the top ransomware variants, average ransomware payments, ransomware predictions, and actionable next steps to immediately reduce ransomware risk.
The report can be found here:


2021 Unit 42 Ransomware Threat Report

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Jen Miller-Osborn from Palo Alto Networks' Unit 42 joins Dave to discuss their 2021 Unit 42 Ransomware Threat Report, which highlights a surge in ransomware demands based on a global analysis of the threat landscape in 2020. To evaluate the current state of the ransomware threat landscape, the Unit 42 threat intelligence team and the Crypsis incident response team collaborated to analyze the ransomware threat landscape in 2020, with global data from Unit 42 as well as US, Canada, and Europe data from Crypsis. The report details the top ransomware variants, average ransomware payments, ransomware predictions, and actionable next steps to immediately reduce ransomware risk.</p><p>The report can be found here:</p><p><br></p><p><br></p><ul><li><a href="https://start.paloaltonetworks.com/unit-42-ransomware-threat-report">2021 Unit 42 Ransomware Threat Report</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1429</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a400e41a-a8fd-11eb-b19f-33e910e45415]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9671494315.mp3?updated=1685125462" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Investigating VPN exploits, and the crooks and spies who use them. BadAlloc afflicts OT. Notes on cyberespionage. The criminal market for deepfakes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1323/notes</link>
      <description>The US Government expands its investigation into Pulse Secure VPN compromises. Microsoft discloses its discovery of BadAlloc IoT and OT vulnerabilities. Someone’s distributing Purple Lambert spyware. Chinese intelligence services seem to be backdooring the Russian defense sector. Financially motivated criminals are exploiting SonicWall VPN vulnerabilities. A look at the emerging criminal market for deepfakes. Josh Ray from Accenture Security on Why Cybersecurity Community Service Matters. Our guest Manish Gupta of ShiftLeft looks at cyber attacks on the CI/CD pipeline. And the World Health Organization attracted impersonators early this month. Again.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/83
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 30 Apr 2021 19:50:00 -0000</pubDate>
      <itunes:title>Investigating VPN exploits, and the crooks and spies who use them. BadAlloc afflicts OT. Notes on cyberespionage. The criminal market for deepfakes.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1323</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The US Government expands its investigation into Pulse Secure VPN compromises. Microsoft discloses its discovery of BadAlloc IoT and OT vulnerabilities. Someone’s distributing Purple Lambert spyware. Chinese intelligence services seem to be backdooring the Russian defense sector. Financially motivated criminals are exploiting SonicWall VPN vulnerabilities. A look at the emerging criminal market for deepfakes. Josh Ray from Accenture Security on Why Cybersecurity Community Service Matters. Our guest Manish Gupta of ShiftLeft looks at cyber attacks on the CI/CD pipeline. And the World Health Organization attracted impersonators early this month. Again.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/83
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US Government expands its investigation into Pulse Secure VPN compromises. Microsoft discloses its discovery of BadAlloc IoT and OT vulnerabilities. Someone’s distributing Purple Lambert spyware. Chinese intelligence services seem to be backdooring the Russian defense sector. Financially motivated criminals are exploiting SonicWall VPN vulnerabilities. A look at the emerging criminal market for deepfakes. Josh Ray from Accenture Security on Why Cybersecurity Community Service Matters. Our guest Manish Gupta of ShiftLeft looks at cyber attacks on the CI/CD pipeline. And the World Health Organization attracted impersonators early this month. Again.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/83</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1505</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04845a7a-364d-11eb-b082-2b07cdde6330]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1372658623.mp3?updated=1690289097" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Buggy APIs may expose credit scores. Dealing with ransomware. Iran-Israeli tensions are up. Russia says it will always see the Americans coming. Surge cyber capacity. NSA’s advice on OT security.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1322/notes</link>
      <description>An API bug may have exposed credit ratings. A study offers advice for the new anti-ransomware task forces emerging in the US and elsewhere. Israelis warned to keep their cyber-guard up on Quds Day next week. Russia says it would spot any US cyberattack before it hit. The US Congress considers establishing surge cyber response capacity. Dinah Davis from Arctic Wolf has tips on preventing RDP attacks. Rick Howard speaks with Rehan Jalil from Securiti on GDPR. NSA offers advice for security OT networks. 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/82
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 29 Apr 2021 19:45:00 -0000</pubDate>
      <itunes:title>Buggy APIs may expose credit scores. Dealing with ransomware. Iran-Israeli tensions are up. Russia says it will always see the Americans coming. Surge cyber capacity. NSA’s advice on OT security.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1322</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An API bug may have exposed credit ratings. A study offers advice for the new anti-ransomware task forces emerging in the US and elsewhere. Israelis warned to keep their cyber-guard up on Quds Day next week. Russia says it would spot any US cyberattack before it hit. The US Congress considers establishing surge cyber response capacity. Dinah Davis from Arctic Wolf has tips on preventing RDP attacks. Rick Howard speaks with Rehan Jalil from Securiti on GDPR. NSA offers advice for security OT networks. 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/82
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An API bug may have exposed credit ratings. A study offers advice for the new anti-ransomware task forces emerging in the US and elsewhere. Israelis warned to keep their cyber-guard up on Quds Day next week. Russia says it would spot any US cyberattack before it hit. The US Congress considers establishing surge cyber response capacity. Dinah Davis from Arctic Wolf has tips on preventing RDP attacks. Rick Howard speaks with Rehan Jalil from Securiti on GDPR. NSA offers advice for security OT networks. </p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/82</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1358</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04950280-364d-11eb-b082-7b5846479d8e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5953324612.mp3?updated=1690288469" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More intelligence on Ghostwriter, and a convergence of hacking and influence operations. Naikon APT has a new backdoor. FluBot returns. MAPP reconsidered. Defense counsel on Cellebrite. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1321/notes</link>
      <description>Ghostwriter is back, and has moved its “chaos troops” against fresh targets in Poland and Germany. The Naikon APT has a new secondary backdoor. FluBot, temporarily inhibited by police raids, is back, and expanding its infection of Android devices across Europe. Microsoft is rethinking how much, and with whom, it wants to share vulnerability information. Joe Carrigan examines a phone scam targeting Amazon Prime customers. Our guest is Tzury Bar Yochay of Reblaze on open-source software and scalability. And Signal’s discovery of Cellebrite issues is finding its way into court.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/81
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 28 Apr 2021 19:40:00 -0000</pubDate>
      <itunes:title>More intelligence on Ghostwriter, and a convergence of hacking and influence operations. Naikon APT has a new backdoor. FluBot returns. MAPP reconsidered. Defense counsel on Cellebrite. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1321</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ghostwriter is back, and has moved its “chaos troops” against fresh targets in Poland and Germany. The Naikon APT has a new secondary backdoor. FluBot, temporarily inhibited by police raids, is back, and expanding its infection of Android devices across Europe. Microsoft is rethinking how much, and with whom, it wants to share vulnerability information. Joe Carrigan examines a phone scam targeting Amazon Prime customers. Our guest is Tzury Bar Yochay of Reblaze on open-source software and scalability. And Signal’s discovery of Cellebrite issues is finding its way into court.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/81
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ghostwriter is back, and has moved its “chaos troops” against fresh targets in Poland and Germany. The Naikon APT has a new secondary backdoor. FluBot, temporarily inhibited by police raids, is back, and expanding its infection of Android devices across Europe. Microsoft is rethinking how much, and with whom, it wants to share vulnerability information. Joe Carrigan examines a phone scam targeting Amazon Prime customers. Our guest is Tzury Bar Yochay of Reblaze on open-source software and scalability. And Signal’s discovery of Cellebrite issues is finding its way into court.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/81</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1408</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[051aacbe-364d-11eb-b082-2763f08c150e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7485506767.mp3?updated=1690289078" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The FBI and CISA take a look at the SVR, and offer advice for potential targets. Openness and information warfare. OPSEC and privacy. Babuk hits DC police. Social engineering notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1320/notes</link>
      <description>FBI, CISA, detail SVR cyber activities. Nine US Combatant Commands see declassification as an important tool in information warfare. A convergence of OPSEC and privacy? Apple fixes a significant Gatekeeper bypass flaw. Babuk ransomware hits DC police. A new twist in credential harvesting. Ben Yelin considers the FTCs stance on racially biased algorithms. Our guest Tony Howlett from SecureLink tracks the evolution of threat hunting. And that was no hack; it was just a careless tweet.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/80
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Apr 2021 19:50:00 -0000</pubDate>
      <itunes:title>The FBI and CISA take a look at the SVR, and offer advice for potential targets. Openness and information warfare. OPSEC and privacy. Babuk hits DC police. Social engineering notes.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1320</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>FBI, CISA, detail SVR cyber activities. Nine US Combatant Commands see declassification as an important tool in information warfare. A convergence of OPSEC and privacy? Apple fixes a significant Gatekeeper bypass flaw. Babuk ransomware hits DC police. A new twist in credential harvesting. Ben Yelin considers the FTCs stance on racially biased algorithms. Our guest Tony Howlett from SecureLink tracks the evolution of threat hunting. And that was no hack; it was just a careless tweet.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/80
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>FBI, CISA, detail SVR cyber activities. Nine US Combatant Commands see declassification as an important tool in information warfare. A convergence of OPSEC and privacy? Apple fixes a significant Gatekeeper bypass flaw. Babuk ransomware hits DC police. A new twist in credential harvesting. Ben Yelin considers the FTCs stance on racially biased algorithms. Our guest Tony Howlett from SecureLink tracks the evolution of threat hunting. And that was no hack; it was just a careless tweet.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/80</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1421</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[052b3232-364d-11eb-b082-17126e254d36]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7274140997.mp3?updated=1690289058" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Prankers on Zoom, with convincing video. Emotet takedown. US response to SolarWinds reviewed. Cancer therapy disrupted by attack on cloud provider. Oscar phishing.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1319/notes</link>
      <description>Zoom prankers deceive European members of parliament with a deepfake video call. A password manager is compromised. Europol took a good whack at Emotet yesterday, removing the botnet’s malware from infected machines. US response to the Holiday Bear campaign receives cautious good reviews. A cyberattack interferes with cancer treatments. Caleb Barlow from CynergisTek on emergency notification systems. Rick Howard previews the latest CSO Perspectives podcast focused on the healthcare vertical. And movie-themed phishbait chummed the waters around yesterday’s Oscars.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/79
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 26 Apr 2021 19:55:00 -0000</pubDate>
      <itunes:title>Prankers on Zoom, with convincing video. Emotet takedown. US response to SolarWinds reviewed. Cancer therapy disrupted by attack on cloud provider. Oscar phishing.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1319</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Zoom prankers deceive European members of parliament with a deepfake video call. A password manager is compromised. Europol took a good whack at Emotet yesterday, removing the botnet’s malware from infected machines. US response to the Holiday Bear campaign receives cautious good reviews. A cyberattack interferes with cancer treatments. Caleb Barlow from CynergisTek on emergency notification systems. Rick Howard previews the latest CSO Perspectives podcast focused on the healthcare vertical. And movie-themed phishbait chummed the waters around yesterday’s Oscars.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/79
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Zoom prankers deceive European members of parliament with a deepfake video call. A password manager is compromised. Europol took a good whack at Emotet yesterday, removing the botnet’s malware from infected machines. US response to the Holiday Bear campaign receives cautious good reviews. A cyberattack interferes with cancer treatments. Caleb Barlow from CynergisTek on emergency notification systems. Rick Howard previews the latest CSO Perspectives podcast focused on the healthcare vertical. And movie-themed phishbait chummed the waters around yesterday’s Oscars.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/79</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1503</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[05a08316-364d-11eb-b082-9b2c4818e64d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3469294888.mp3?updated=1690289016" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Marcelle Lee: Cyber sleuth detecting emerging threats. [Research] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/46/notes</link>
      <description>Senior security researcher from Secureworks Marcelle Lee shares her career journey into cybersecurity and how she helps solve hard problems in her daily work. Marcelle came into cybersecurity not through any traditional path. She describes her route from a different field and starting in cyber at her local community college through a grant program. Marcelle took full advantage of the opportunities she had and grew her career from there. She recommends finding your specialty, but continue to build other skills. As a woman in the field, she is a strong proponent of diversity and encouraging others to find what excites them. And, we thank Marcelle for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 25 Apr 2021 07:00:00 -0000</pubDate>
      <itunes:title>Marcelle Lee: Cyber sleuth detecting emerging threats. [Research] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>46</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Senior security researcher Marcelle Lee shares her career journey and how she helps solve hard problems in cyber. </itunes:subtitle>
      <itunes:summary>Senior security researcher from Secureworks Marcelle Lee shares her career journey into cybersecurity and how she helps solve hard problems in her daily work. Marcelle came into cybersecurity not through any traditional path. She describes her route from a different field and starting in cyber at her local community college through a grant program. Marcelle took full advantage of the opportunities she had and grew her career from there. She recommends finding your specialty, but continue to build other skills. As a woman in the field, she is a strong proponent of diversity and encouraging others to find what excites them. And, we thank Marcelle for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Senior security researcher from Secureworks Marcelle Lee shares her career journey into cybersecurity and how she helps solve hard problems in her daily work. Marcelle came into cybersecurity not through any traditional path. She describes her route from a different field and starting in cyber at her local community college through a grant program. Marcelle took full advantage of the opportunities she had and grew her career from there. She recommends finding your specialty, but continue to build other skills. As a woman in the field, she is a strong proponent of diversity and encouraging others to find what excites them. And, we thank Marcelle for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>370</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e4c39b48-a39c-11eb-8332-03b408f58df5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2808575766.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Channeling the data avalanche. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/12/notes</link>
      <description>Proliferation of data continues to outstrip our ability to manage and secure data. The gap is growing and alarming,especially given the explosion of non-traditional smart devices generating, storing, and sharing information. As edge computing grows, more devices are generating and transmitting data than there are human beings walking the planet. 
High-speed generation of data is here to stay. Are we equipped as people, as organizations, and as a global community to handle all this information? Current evidence suggests not. The International Data Corporation (IDC) predicted in its study, Data Age 2025, that enterprises will need to rely on machine learning, automation and machine-to-machine technologies to stay ahead of the information tsunami, while efficiently determining and iterating on high-value data from the source in order to drive sound business decisions. 
That sounds reasonable, but many well-known names in the industry are trying - and failing - to solve this problem. The struggle lies in the pivot from “big data,” to “fast data,” the ability to extract meaningful, actionable intelligence from a sea of information, and do it quickly. Most of the solutions available are either prohibitively expensive, not scalable, or both.
In this episode of CyberWire-X, guests will discuss present and future threats posed by an unmanageable data avalanche, as well as emerging technologies that may lead public and private sector efforts through the developing crisis. Don Welch of Penn State University and Steve Winterfeld of Akamai share their insights with Rick Howard, and Egon Rinderer from sponsor Tanium offers his thoughts with Dave Bittner.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 25 Apr 2021 07:00:00 -0000</pubDate>
      <itunes:title>Channeling the data avalanche. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>12</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Proliferation of data continues to outstrip our ability to manage and secure data. The gap is growing and alarming,especially given the explosion of non-traditional smart devices generating, storing, and sharing information. As edge computing grows, more devices are generating and transmitting data than there are human beings walking the planet. 
High-speed generation of data is here to stay. Are we equipped as people, as organizations, and as a global community to handle all this information? Current evidence suggests not. The International Data Corporation (IDC) predicted in its study, Data Age 2025, that enterprises will need to rely on machine learning, automation and machine-to-machine technologies to stay ahead of the information tsunami, while efficiently determining and iterating on high-value data from the source in order to drive sound business decisions. 
That sounds reasonable, but many well-known names in the industry are trying - and failing - to solve this problem. The struggle lies in the pivot from “big data,” to “fast data,” the ability to extract meaningful, actionable intelligence from a sea of information, and do it quickly. Most of the solutions available are either prohibitively expensive, not scalable, or both.
In this episode of CyberWire-X, guests will discuss present and future threats posed by an unmanageable data avalanche, as well as emerging technologies that may lead public and private sector efforts through the developing crisis. Don Welch of Penn State University and Steve Winterfeld of Akamai share their insights with Rick Howard, and Egon Rinderer from sponsor Tanium offers his thoughts with Dave Bittner.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Proliferation of data continues to outstrip our ability to manage and secure data. The gap is growing and alarming,especially given the explosion of non-traditional smart devices generating, storing, and sharing information. As edge computing grows, more devices are generating and transmitting data than there are human beings walking the planet. </p><p>High-speed generation of data is here to stay. Are we equipped as people, as organizations, and as a global community to handle all this information? Current evidence suggests not. The International Data Corporation (IDC) predicted in its study, Data Age 2025, that enterprises will need to rely on machine learning, automation and machine-to-machine technologies to stay ahead of the information tsunami, while efficiently determining and iterating on high-value data from the source in order to drive sound business decisions. </p><p>That sounds reasonable, but many well-known names in the industry are trying - and failing - to solve this problem. The struggle lies in the pivot from “big data,” to “fast data,” the ability to extract meaningful, actionable intelligence from a sea of information, and do it quickly. Most of the solutions available are either prohibitively expensive, not scalable, or both.</p><p>In this episode of CyberWire-X, guests will discuss present and future threats posed by an unmanageable data avalanche, as well as emerging technologies that may lead public and private sector efforts through the developing crisis. Don Welch of Penn State University and Steve Winterfeld of Akamai share their insights with Rick Howard, and Egon Rinderer from sponsor Tanium offers his thoughts with Dave Bittner.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1992</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[91480f76-a39c-11eb-a43d-4f3ed0f3ae59]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9591821751.mp3?updated=1619018606" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bulletproof hosting (BPH) and how it powers cybercrime. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/180/notes</link>
      <description>Guest Jason Passwaters of Intel 471 joins us to discuss his team's research into bulletproof hosting (BPH). The research team at Intel 471 defined what a typical BPH service offers and how these services can be stopped in order to limit the damage they have on enterprises, businesses and digital society itself. They examined some popular malware families that actors host or leverage via BPH services. While much more goes into a cybercriminal’s full operation, it would be vastly more difficult to pull off without the ability to host malware and be free from impunity. Finally, they listed of some of the BPH providers that are firmly entrenched in the cybercrime underground and how they give support to other cybercriminal enterprises. By recognizing their behaviors, security teams can begin to take measures to figure out who the actors are, how they operate and what their infrastructure looks like. By doing so, organizations can begin to uncover ways to proactively counter maliciously-used infrastructure before criminals have a chance to launch their attacks. 
The blog posts can be found here:

Hiding in plain sight: Bulletproof Hosting’s dueling forms

Bulletproof hosting: How cybercrime stays resilient

Here’s who is powering the bulletproof hosting market


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Apr 2021 07:00:00 -0000</pubDate>
      <itunes:title>Bulletproof hosting (BPH) and how it powers cybercrime. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>180</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Jason Passwaters of Intel 471 joins us to discuss his team's research into bulletproof hosting (BPH). The research team at Intel 471 defined what a typical BPH service offers and how these services can be stopped in order to limit the damage they have on enterprises, businesses and digital society itself. They examined some popular malware families that actors host or leverage via BPH services. While much more goes into a cybercriminal’s full operation, it would be vastly more difficult to pull off without the ability to host malware and be free from impunity. Finally, they listed of some of the BPH providers that are firmly entrenched in the cybercrime underground and how they give support to other cybercriminal enterprises. By recognizing their behaviors, security teams can begin to take measures to figure out who the actors are, how they operate and what their infrastructure looks like. By doing so, organizations can begin to uncover ways to proactively counter maliciously-used infrastructure before criminals have a chance to launch their attacks. 
The blog posts can be found here:

Hiding in plain sight: Bulletproof Hosting’s dueling forms

Bulletproof hosting: How cybercrime stays resilient

Here’s who is powering the bulletproof hosting market


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Jason Passwaters of Intel 471 joins us to discuss his team's research into bulletproof hosting (BPH). The research team at Intel 471 defined what a typical BPH service offers and how these services can be stopped in order to limit the damage they have on enterprises, businesses and digital society itself. They examined some popular malware families that actors host or leverage via BPH services. While much more goes into a cybercriminal’s full operation, it would be vastly more difficult to pull off without the ability to host malware and be free from impunity. Finally, they listed of some of the BPH providers that are firmly entrenched in the cybercrime underground and how they give support to other cybercriminal enterprises. By recognizing their behaviors, security teams can begin to take measures to figure out who the actors are, how they operate and what their infrastructure looks like. By doing so, organizations can begin to uncover ways to proactively counter maliciously-used infrastructure before criminals have a chance to launch their attacks. </p><p>The blog posts can be found here:</p><ul>
<li><a href="https://intel471.com/blog/bulletproof-hosting-fast-flux-dns-double-flux-vps/">Hiding in plain sight: Bulletproof Hosting’s dueling forms</a></li>
<li><a href="https://intel471.com/blog/bulletproof-hosting-yalishanda-ransomware-banking-trojans-information-stealers/">Bulletproof hosting: How cybercrime stays resilient</a></li>
<li><a href="https://intel471.com/blog/top-bulletproof-hosting-providers-yalishanda-ccweb-brazzzers-2021/">Here’s who is powering the bulletproof hosting market</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1052</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d00a641c-a463-11eb-b1b1-bfddab72072d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3160885383.mp3?updated=1685125450" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Three ransomware gangs up their game. The US Postal Inspection Service’s “Internet Covert Operations Program.” GCHQ warns of dependence on Chinese tech. Undersea cable security.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1318/notes</link>
      <description>Ransomware operators begin timing their releases for more reputational damage. Another gang is equipping its ransomware with scripts to disable defenses, and yet another is now into stock shorting. The US Postal Inspection Service is apparently monitoring social media. GCHQ’s head warns of the dangers of becoming dependent on China’s technology. Johannes Ullrich from SANS on Commodity Malware Targeting Enterprises. Our guest is Etay Maor from Cato with some of the clever ways criminals avoid detection. And it’s not just sharks interested in undersea cables.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/78
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 23 Apr 2021 20:45:00 -0000</pubDate>
      <itunes:title>Three ransomware gangs up their game. The US Postal Inspection Service’s “Internet Covert Operations Program.” GCHQ warns of dependence on Chinese tech. Undersea cable security.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1318</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ransomware operators begin timing their releases for more reputational damage. Another gang is equipping its ransomware with scripts to disable defenses, and yet another is now into stock shorting. The US Postal Inspection Service is apparently monitoring social media. GCHQ’s head warns of the dangers of becoming dependent on China’s technology. Johannes Ullrich from SANS on Commodity Malware Targeting Enterprises. Our guest is Etay Maor from Cato with some of the clever ways criminals avoid detection. And it’s not just sharks interested in undersea cables.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/78
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ransomware operators begin timing their releases for more reputational damage. Another gang is equipping its ransomware with scripts to disable defenses, and yet another is now into stock shorting. The US Postal Inspection Service is apparently monitoring social media. GCHQ’s head warns of the dangers of becoming dependent on China’s technology. Johannes Ullrich from SANS on Commodity Malware Targeting Enterprises. Our guest is Etay Maor from Cato with some of the clever ways criminals avoid detection. And it’s not just sharks interested in undersea cables.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/78</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1554</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[047395dc-364d-11eb-b082-8b513d76e594]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2105819397.mp3?updated=1690235987" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>VPN users remediate systems. New Supernova infection. Cryptojacking botnet afflicts vulnerable Exchange Servers. Facebook takes down spyware groups. Ransomware. Cellebrite bug found.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1317/notes</link>
      <description>Agencies continue to respond to the Pulse Secure VPN vulnerabilities. Updates on the SolarWinds compromise show that it remains a threat, and that it was designed to escape detection and, especially, attribution. A cryptojacking botnet is exploiting vulnerable Microsoft Exchange Server instances. Facebook takes down two Palestinian groups distributing spyware. Ransomware draws more attention. Craig Williams from Cisco Talos looks at cheating the cheater. Our guest is Bruno Kurtic from Sumo Logic on their Continuous Intelligence Report. And a Cellebrite vulnerability is exposed.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/77
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 22 Apr 2021 20:55:00 -0000</pubDate>
      <itunes:title>VPN users remediate systems. New Supernova infection. Cryptojacking botnet afflicts vulnerable Exchange Servers. Facebook takes down spyware groups. Ransomware. Cellebrite bug found.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1317</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Agencies continue to respond to the Pulse Secure VPN vulnerabilities. Updates on the SolarWinds compromise show that it remains a threat, and that it was designed to escape detection and, especially, attribution. A cryptojacking botnet is exploiting vulnerable Microsoft Exchange Server instances. Facebook takes down two Palestinian groups distributing spyware. Ransomware draws more attention. Craig Williams from Cisco Talos looks at cheating the cheater. Our guest is Bruno Kurtic from Sumo Logic on their Continuous Intelligence Report. And a Cellebrite vulnerability is exposed.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/77
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Agencies continue to respond to the Pulse Secure VPN vulnerabilities. Updates on the SolarWinds compromise show that it remains a threat, and that it was designed to escape detection and, especially, attribution. A cryptojacking botnet is exploiting vulnerable Microsoft Exchange Server instances. Facebook takes down two Palestinian groups distributing spyware. Ransomware draws more attention. Craig Williams from Cisco Talos looks at cheating the cheater. Our guest is Bruno Kurtic from Sumo Logic on their Continuous Intelligence Report. And a Cellebrite vulnerability is exposed.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/77</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1594</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04a5d010-364d-11eb-b082-8b2dc601fab7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6940536329.mp3?updated=1690235966" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SonicWall, Pulse Secure products under exploitation (mitigations are available). Power grid security. Cyber conflict in the Near Abroad. ISIS worries about Bitcoin. Bad passwords.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1316/notes</link>
      <description>SonicWall zero-days are under active exploitation; mitigations are available. Pulse Secure VPN is also undergoing exploitation, probably by China, and mitigations are available here, too. The US begins work on shoring up power grid cybersecurity. Cyber ops rise with Russo-Ukrainian tension. The help desk at ISIS tells jihadists to stay away from Bitcoin. Joe Carrigan looks at cryptocurrency anonymity. Our guest is Bert Kashyap from SecureW2 on what needs to be done before devices used for learning from home return to schools. And is your password inspired by cinema?
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/76
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 21 Apr 2021 20:50:00 -0000</pubDate>
      <itunes:title>SonicWall, Pulse Secure products under exploitation (mitigations are available). Power grid security. Cyber conflict in the Near Abroad. ISIS worries about Bitcoin. Bad passwords.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1316</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>SonicWall zero-days are under active exploitation; mitigations are available. Pulse Secure VPN is also undergoing exploitation, probably by China, and mitigations are available here, too. The US begins work on shoring up power grid cybersecurity. Cyber ops rise with Russo-Ukrainian tension. The help desk at ISIS tells jihadists to stay away from Bitcoin. Joe Carrigan looks at cryptocurrency anonymity. Our guest is Bert Kashyap from SecureW2 on what needs to be done before devices used for learning from home return to schools. And is your password inspired by cinema?
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/76
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>SonicWall zero-days are under active exploitation; mitigations are available. Pulse Secure VPN is also undergoing exploitation, probably by China, and mitigations are available here, too. The US begins work on shoring up power grid cybersecurity. Cyber ops rise with Russo-Ukrainian tension. The help desk at ISIS tells jihadists to stay away from Bitcoin. Joe Carrigan looks at cryptocurrency anonymity. Our guest is Bert Kashyap from SecureW2 on what needs to be done before devices used for learning from home return to schools. And is your password inspired by cinema?</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/76</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1428</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[050a22c2-364d-11eb-b082-d7a2a028b072]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7515319744.mp3?updated=1690235951" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Codecov supply chain attack update. Babuk’s victim service. Catphishing in LinkedIn. Sanctioned company responds. SolarWinds, Exchange compromise TFs stand down. 5 Eyes notes. IoT risk. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1315/notes</link>
      <description>Update on the Codecov supply chain attack. The Babuk gang says they’ve debugged their decryptor. MI5 warns of “industrial scale” catphishing in LinkedIn. Positive Technologies responds to US sanctions. The US stands down the two Unified Coordination Groups it established to deal with the SolarWinds and Exchange Server compromises. Are all Five Eyes seeing eye-to-eye on China? Ben Yelin explains the legal side of the FBI removing webshells following the Microsoft Exchange Server hack. Our guest is May Habib from Writer on how the AI is helping the security industry with outdated and problematic terminology. And, psst: your kitchen appliances are a bunch of sellouts...or something.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/75
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Apr 2021 20:00:00 -0000</pubDate>
      <itunes:title>Codecov supply chain attack update. Babuk’s victim service. Catphishing in LinkedIn. Sanctioned company responds. SolarWinds, Exchange compromise TFs stand down. 5 Eyes notes. IoT risk. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1315</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Update on the Codecov supply chain attack. The Babuk gang says they’ve debugged their decryptor. MI5 warns of “industrial scale” catphishing in LinkedIn. Positive Technologies responds to US sanctions. The US stands down the two Unified Coordination Groups it established to deal with the SolarWinds and Exchange Server compromises. Are all Five Eyes seeing eye-to-eye on China? Ben Yelin explains the legal side of the FBI removing webshells following the Microsoft Exchange Server hack. Our guest is May Habib from Writer on how the AI is helping the security industry with outdated and problematic terminology. And, psst: your kitchen appliances are a bunch of sellouts...or something.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/75
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Update on the Codecov supply chain attack. The Babuk gang says they’ve debugged their decryptor. MI5 warns of “industrial scale” catphishing in LinkedIn. Positive Technologies responds to US sanctions. The US stands down the two Unified Coordination Groups it established to deal with the SolarWinds and Exchange Server compromises. Are all Five Eyes seeing eye-to-eye on China? Ben Yelin explains the legal side of the FBI removing webshells following the Microsoft Exchange Server hack. Our guest is May Habib from Writer on how the AI is helping the security industry with outdated and problematic terminology. And, psst: your kitchen appliances are a bunch of sellouts...or something.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/75</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1556</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[053c7e98-364d-11eb-b082-1308028d320e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9203564639.mp3?updated=1690235936" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Codecov may have sustained a supply chain attack. Natanz sabotage update. Big data gangs. Protecting ransomware gangs. Counterretaliation in the SolarWinds affair.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1314/notes</link>
      <description>Another supply chain incident surfaces. The Natanz sabotage seems to have landed a punch, but not a knock-out blow against Iran’s nuclear program (and it appears to have been a bomb). China’s “big data” gangs and their place in the criminal economy. Tolerating (and protecting?) ransomware gangs in Russia? Betsy Carmelite looks at the intersection of 5G and zero trust. Rick Howard is focusing on finance and fraud in the latest season of CSO Perspectives. Russia’s counterretaliation for US sanctions in the SolarWinds affair. 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/74
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 19 Apr 2021 20:15:00 -0000</pubDate>
      <itunes:title>Codecov may have sustained a supply chain attack. Natanz sabotage update. Big data gangs. Protecting ransomware gangs. Counterretaliation in the SolarWinds affair.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1314</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Another supply chain incident surfaces. The Natanz sabotage seems to have landed a punch, but not a knock-out blow against Iran’s nuclear program (and it appears to have been a bomb). China’s “big data” gangs and their place in the criminal economy. Tolerating (and protecting?) ransomware gangs in Russia? Betsy Carmelite looks at the intersection of 5G and zero trust. Rick Howard is focusing on finance and fraud in the latest season of CSO Perspectives. Russia’s counterretaliation for US sanctions in the SolarWinds affair. 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/74
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Another supply chain incident surfaces. The Natanz sabotage seems to have landed a punch, but not a knock-out blow against Iran’s nuclear program (and it appears to have been a bomb). China’s “big data” gangs and their place in the criminal economy. Tolerating (and protecting?) ransomware gangs in Russia? Betsy Carmelite looks at the intersection of 5G and zero trust. Rick Howard is focusing on finance and fraud in the latest season of CSO Perspectives. Russia’s counterretaliation for US sanctions in the SolarWinds affair. </p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/74</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1468</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[058fe592-364d-11eb-b082-8f13ab26c581]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1916240868.mp3?updated=1690235905" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Aviv Grafi: There needs to be fundamental changes in security. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/45/notes</link>
      <description>CEO and Founder of Votiro Aviv Grafi shares his story from serving as a member of the IDF's intelligence forces to leading his own venture. Aviv says his service in the IDF shaped a lot of his thinking and problem solving. Following his military service, Aviv worked to gain more real world and business experience. Starting his own business as a pentester was where the seeds for what would become Votiro would form. Aviv talks about the roller coaster that you experience when starting your own venture and offers some advice. And, we thank Aviv for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 18 Apr 2021 07:00:00 -0000</pubDate>
      <itunes:title>Aviv Grafi: There needs to be fundamental changes in security. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>45</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>CEO and Founder of Votiro Aviv Grafi shares his story from a member of the IDF's intelligence forces to leading his own venture.</itunes:subtitle>
      <itunes:summary>CEO and Founder of Votiro Aviv Grafi shares his story from serving as a member of the IDF's intelligence forces to leading his own venture. Aviv says his service in the IDF shaped a lot of his thinking and problem solving. Following his military service, Aviv worked to gain more real world and business experience. Starting his own business as a pentester was where the seeds for what would become Votiro would form. Aviv talks about the roller coaster that you experience when starting your own venture and offers some advice. And, we thank Aviv for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CEO and Founder of Votiro Aviv Grafi shares his story from serving as a member of the IDF's intelligence forces to leading his own venture. Aviv says his service in the IDF shaped a lot of his thinking and problem solving. Following his military service, Aviv worked to gain more real world and business experience. Starting his own business as a pentester was where the seeds for what would become Votiro would form. Aviv talks about the roller coaster that you experience when starting your own venture and offers some advice. And, we thank Aviv for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>213</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[746b9290-9edf-11eb-ace7-0f512343f508]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8545138311.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Social engineering: MINEBRIDGE RAT embedded to look like job résumés. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/179/notes</link>
      <description>Guest Deepen Desai joins Dave to talk about Zsaler's research "Return of the MINEBRIDGE RAT With New TTPs and Social Engineering Lures." In Jan 2021, Zscaler ThreatLabZ discovered new instances of the MINEBRIDGE remote-access Trojan (RAT) embedded in macro-based Word document files crafted to look like valid job resumes (CVs). Such lures are often used as social engineering schemes by threat actors.
MINEBRIDGE buries itself into the vulnerable remote desktop software TeamViewer, enabling the threat actor to take a wide array of remote follow-on actions such as spying on users or deploying additional malware.The use of social engineering tactics targeting security teams appears to be on an upward trend.
The research can be found here:
Return of the MINEBRIDGE RAT With New TTPs and Social Engineering Lures

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Apr 2021 07:00:00 -0000</pubDate>
      <itunes:title>Social engineering: MINEBRIDGE RAT embedded to look like job résumés. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>179</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Deepen Desai joins Dave to talk about Zsaler's research "Return of the MINEBRIDGE RAT With New TTPs and Social Engineering Lures." In Jan 2021, Zscaler ThreatLabZ discovered new instances of the MINEBRIDGE remote-access Trojan (RAT) embedded in macro-based Word document files crafted to look like valid job resumes (CVs). Such lures are often used as social engineering schemes by threat actors.
MINEBRIDGE buries itself into the vulnerable remote desktop software TeamViewer, enabling the threat actor to take a wide array of remote follow-on actions such as spying on users or deploying additional malware.The use of social engineering tactics targeting security teams appears to be on an upward trend.
The research can be found here:
Return of the MINEBRIDGE RAT With New TTPs and Social Engineering Lures

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Deepen Desai joins Dave to talk about Zsaler's research "Return of the MINEBRIDGE RAT With New TTPs and Social Engineering Lures." In Jan 2021, Zscaler ThreatLabZ discovered new instances of the MINEBRIDGE remote-access Trojan (RAT) embedded in macro-based Word document files crafted to look like valid job resumes (CVs). Such lures are often used as social engineering schemes by threat actors.</p><p>MINEBRIDGE buries itself into the vulnerable remote desktop software TeamViewer, enabling the threat actor to take a wide array of remote follow-on actions such as spying on users or deploying additional malware.The use of social engineering tactics targeting security teams appears to be on an upward trend.</p><p>The research can be found here:</p><ul><li><a href="https://www.zscaler.com/blogs/security-research/return-minebridge-rat-new-ttps-and-social-engineering-lures">Return of the MINEBRIDGE RAT With New TTPs and Social Engineering Lures</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1038</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[94d32d0e-9edf-11eb-93df-db878028b947]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8180888774.mp3?updated=1685125443" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>International reactions to US sanctions against Russia (positively reviewed in Europe and the UK, but panned by Russia). Continuing threats to the cold chain. Natanz back in business? Data breach notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1313/notes</link>
      <description>The European Union expresses solidarity with the US over the SolarWinds incident. The UK joins the US in attributing the incident to Russia. Russia objects to US sanctions and hints strongly that it intends to retaliate. IBM discloses new cyber threats to the COVID-19 vaccine cold chain. Iran says Natanz is back in business. Kevin Magee from Microsoft looks at the security of startups. Our guest is Brad Ree of ioXt Alliance with results from their Mobile IoT Benchmark report. And data breaches hit people who park and people who read.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/73
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 16 Apr 2021 20:50:00 -0000</pubDate>
      <itunes:title>International reactions to US sanctions against Russia (positively reviewed in Europe and the UK, but panned by Russia). Continuing threats to the cold chain. Natanz back in business? Data breach notes.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1313</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The European Union expresses solidarity with the US over the SolarWinds incident. The UK joins the US in attributing the incident to Russia. Russia objects to US sanctions and hints strongly that it intends to retaliate. IBM discloses new cyber threats to the COVID-19 vaccine cold chain. Iran says Natanz is back in business. Kevin Magee from Microsoft looks at the security of startups. Our guest is Brad Ree of ioXt Alliance with results from their Mobile IoT Benchmark report. And data breaches hit people who park and people who read.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/73
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The European Union expresses solidarity with the US over the SolarWinds incident. The UK joins the US in attributing the incident to Russia. Russia objects to US sanctions and hints strongly that it intends to retaliate. IBM discloses new cyber threats to the COVID-19 vaccine cold chain. Iran says Natanz is back in business. Kevin Magee from Microsoft looks at the security of startups. Our guest is Brad Ree of ioXt Alliance with results from their Mobile IoT Benchmark report. And data breaches hit people who park and people who read.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/73</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1502</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04626992-364d-11eb-b082-d748268c8684]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3783176085.mp3?updated=1690235890" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Imposing costs and sending signals (and prominently naming Cozy Bear). More speculation about the Natanz explosion. And a shift in the criminal-to-criminal economy.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1312/notes</link>
      <description>The US announces a broad range of retaliatory actions designed to “impose costs” on Russia for its recent actions in cyberspace, prominently including both the SolarWinds supply chain compromise and attempts to influence elections. More reports on the Natanz incident suggest that a buried bomb was remotely detonated. David Dufour from Webroot has a wakeup call on digital privacy. Our guest is Ganesh Pai from Uptycs on Mitre ATT&amp;CK Evaluations. And IcedID is taking Emotet’s place in the criminal ecosystem.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/72
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 15 Apr 2021 19:30:00 -0000</pubDate>
      <itunes:title>Imposing costs and sending signals (and prominently naming Cozy Bear). More speculation about the Natanz explosion. And a shift in the criminal-to-criminal economy.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1312</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The US announces a broad range of retaliatory actions designed to “impose costs” on Russia for its recent actions in cyberspace, prominently including both the SolarWinds supply chain compromise and attempts to influence elections. More reports on the Natanz incident suggest that a buried bomb was remotely detonated. David Dufour from Webroot has a wakeup call on digital privacy. Our guest is Ganesh Pai from Uptycs on Mitre ATT&amp;CK Evaluations. And IcedID is taking Emotet’s place in the criminal ecosystem.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/72
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US announces a broad range of retaliatory actions designed to “impose costs” on Russia for its recent actions in cyberspace, prominently including both the SolarWinds supply chain compromise and attempts to influence elections. More reports on the Natanz incident suggest that a buried bomb was remotely detonated. David Dufour from Webroot has a wakeup call on digital privacy. Our guest is Ganesh Pai from Uptycs on Mitre ATT&amp;CK Evaluations. And IcedID is taking Emotet’s place in the criminal ecosystem.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/72</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1560</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04b6cc08-364d-11eb-b082-e343a3d04524]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6646763207.mp3?updated=1690235875" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The IAEA investigates the Natanz incident (amid conflicting reports on the nature of the sabotage). Mopping up the SolarWinds Exchange Server hacks. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1311/notes</link>
      <description>Updates on Natanz, where the nature of the sabotage remains unclear--it happened, but there are conflicting explanations of how. Electrical utilities on alert for cyberattack, especially after the SolarWinds incident. The US Government takes extraordinary steps to fix the Microsoft Exchange Server compromise. Joe Carrigan analyses effective phishing campaigns. Our guest is the FBI’s Herb Stapleton on their recent IC3 report. And the US Intelligence Community’s Annual Threat Assessment points, in order of diminishing rsk, to China, Russia, Iran, and North Korea.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/71
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 14 Apr 2021 20:00:00 -0000</pubDate>
      <itunes:title>The IAEA investigates the Natanz incident (amid conflicting reports on the nature of the sabotage). Mopping up the SolarWinds Exchange Server hacks. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1311</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Updates on Natanz, where the nature of the sabotage remains unclear--it happened, but there are conflicting explanations of how. Electrical utilities on alert for cyberattack, especially after the SolarWinds incident. The US Government takes extraordinary steps to fix the Microsoft Exchange Server compromise. Joe Carrigan analyses effective phishing campaigns. Our guest is the FBI’s Herb Stapleton on their recent IC3 report. And the US Intelligence Community’s Annual Threat Assessment points, in order of diminishing rsk, to China, Russia, Iran, and North Korea.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/71
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Updates on Natanz, where the nature of the sabotage remains unclear--it happened, but there are conflicting explanations of how. Electrical utilities on alert for cyberattack, especially after the SolarWinds incident. The US Government takes extraordinary steps to fix the Microsoft Exchange Server compromise. Joe Carrigan analyses effective phishing campaigns. Our guest is the FBI’s Herb Stapleton on their recent IC3 report. And the US Intelligence Community’s Annual Threat Assessment points, in order of diminishing rsk, to China, Russia, Iran, and North Korea.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/71</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1648</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04f956cc-364d-11eb-b082-8f857971c371]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6279816613.mp3?updated=1690235860" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Natanz pre-emptive sabotage updates. NAME:WRECK DNS vulnerabilities. Tax phishing. ATM cards and advance-fee scams. Ransomware-induced cheese shortage. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1310/notes</link>
      <description>Updates on the sabotage at Natanz--whether it was cyber or kinetic, Iran has vowed to take its revenge against Israel. NAME:WRECK vulnerabilities affect DNS implementations. Tax season scammers are phishing for credentials. If you liked the investment opportunities those Nigerian princes used to offer, you’re going to love their loaded ATM cards. Ben Yelin looks at data protection and interoperability. Our guest is Jules Martin from Mimecast on the importance of security integration. And in the Netherlands ransomware is inducing a shortage of cheese.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/70
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Apr 2021 20:00:00 -0000</pubDate>
      <itunes:title>Natanz pre-emptive sabotage updates. NAME:WRECK DNS vulnerabilities. Tax phishing. ATM cards and advance-fee scams. Ransomware-induced cheese shortage. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1310</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Updates on the sabotage at Natanz--whether it was cyber or kinetic, Iran has vowed to take its revenge against Israel. NAME:WRECK vulnerabilities affect DNS implementations. Tax season scammers are phishing for credentials. If you liked the investment opportunities those Nigerian princes used to offer, you’re going to love their loaded ATM cards. Ben Yelin looks at data protection and interoperability. Our guest is Jules Martin from Mimecast on the importance of security integration. And in the Netherlands ransomware is inducing a shortage of cheese.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/70
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Updates on the sabotage at Natanz--whether it was cyber or kinetic, Iran has vowed to take its revenge against Israel. NAME:WRECK vulnerabilities affect DNS implementations. Tax season scammers are phishing for credentials. If you liked the investment opportunities those Nigerian princes used to offer, you’re going to love their loaded ATM cards. Ben Yelin looks at data protection and interoperability. Our guest is Jules Martin from Mimecast on the importance of security integration. And in the Netherlands ransomware is inducing a shortage of cheese.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/70</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1529</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[054e880e-364d-11eb-b082-8b5875be9efc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3482636293.mp3?updated=1690235850" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Apparent cyber sabotage at Natanz. Arrest made in alleged plot to blow up AWS facility. Scraped data for sale in criminal fora. US senior cyber appointments expected soon. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1309/notes</link>
      <description>Iran says Israel was responsible for sabotaging the Natanz nuclear facility yesterday, and Tehran promises revenge. Online plotting results in the arrest of a Texas man alleged to have planned an attack on an Amazon Web Services center. Scraped, not hacked, data from LinkedIn and Clubhouse are being hawked online. Andrea Little Limbago from Interos addresses asymmetric power within cyberspace and how that plays out in warfare. Our guest is Giovanni Vigna from VMware on the takedown of the Emotet infrastructure. And the US moves to fill senior cybersecurity positions.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/69
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 12 Apr 2021 20:20:00 -0000</pubDate>
      <itunes:title>Apparent cyber sabotage at Natanz. Arrest made in alleged plot to blow up AWS facility. Scraped data for sale in criminal fora. US senior cyber appointments expected soon. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1309</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Iran says Israel was responsible for sabotaging the Natanz nuclear facility yesterday, and Tehran promises revenge. Online plotting results in the arrest of a Texas man alleged to have planned an attack on an Amazon Web Services center. Scraped, not hacked, data from LinkedIn and Clubhouse are being hawked online. Andrea Little Limbago from Interos addresses asymmetric power within cyberspace and how that plays out in warfare. Our guest is Giovanni Vigna from VMware on the takedown of the Emotet infrastructure. And the US moves to fill senior cybersecurity positions.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/69
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iran says Israel was responsible for sabotaging the Natanz nuclear facility yesterday, and Tehran promises revenge. Online plotting results in the arrest of a Texas man alleged to have planned an attack on an Amazon Web Services center. Scraped, not hacked, data from LinkedIn and Clubhouse are being hawked online. Andrea Little Limbago from Interos addresses asymmetric power within cyberspace and how that plays out in warfare. Our guest is Giovanni Vigna from VMware on the takedown of the Emotet infrastructure. And the US moves to fill senior cybersecurity positions.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/69</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1424</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[057f0808-364d-11eb-b082-4b18cfd31e18]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1216919084.mp3?updated=1690235834" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Debra Danielson: Be fearless. [CTO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/44/notes</link>
      <description>Chief Technology Officer and Senior Vice President, Engineering for Digital Guardian Debra Danielson shares her career journey. From aspirations of becoming an astronaut studying mechanical and aerospace engineering, Finding her first job at a local software company that turned into a long term commitment after it was acquired by another firm. Debra mentions that when she was heads-down programming, there were many women in the field and when she emerged from the cube to take on management and leadership positions, the ratio of women had dropped dramatically. She noted at this time that it took a lot of energy to be different. Debra shared that each time she had challenges in her career, she learned from them. She offers advice of taking risks earlier in your career as you don't know what it could lead to. And, we thank Debra for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 11 Apr 2021 07:00:00 -0000</pubDate>
      <itunes:title>Debra Danielson: Be fearless. [CTO] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>44</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Chief Technology Officer and Senior Vice President, Engineering for Digital Guardian Debra Danielson on her career journey.</itunes:subtitle>
      <itunes:summary>Chief Technology Officer and Senior Vice President, Engineering for Digital Guardian Debra Danielson shares her career journey. From aspirations of becoming an astronaut studying mechanical and aerospace engineering, Finding her first job at a local software company that turned into a long term commitment after it was acquired by another firm. Debra mentions that when she was heads-down programming, there were many women in the field and when she emerged from the cube to take on management and leadership positions, the ratio of women had dropped dramatically. She noted at this time that it took a lot of energy to be different. Debra shared that each time she had challenges in her career, she learned from them. She offers advice of taking risks earlier in your career as you don't know what it could lead to. And, we thank Debra for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chief Technology Officer and Senior Vice President, Engineering for Digital Guardian Debra Danielson shares her career journey. From aspirations of becoming an astronaut studying mechanical and aerospace engineering, Finding her first job at a local software company that turned into a long term commitment after it was acquired by another firm. Debra mentions that when she was heads-down programming, there were many women in the field and when she emerged from the cube to take on management and leadership positions, the ratio of women had dropped dramatically. She noted at this time that it took a lot of energy to be different. Debra shared that each time she had challenges in her career, she learned from them. She offers advice of taking risks earlier in your career as you don't know what it could lead to. And, we thank Debra for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>355</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[77c1f2a6-989d-11eb-974b-2b988cbf8c6c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4504666567.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Strategic titles point to something more than a commodity campaign. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/178/notes</link>
      <description>Guests Gage Mele, Winston Marydasan, and Yury Polozov from Anomali join Dave to discuss their research into Static Kitten targeting government agencies in the UAE and Kuwait. Anomali Threat Research uncovered malicious activity very likely attributed to the Iran-nexus cyberespionage group, Static Kitten (Seedworm, MERCURY, Temp.Zagros, POWERSTATS, NTSTATS, MuddyWater), which is known to target numerous sectors primarily located in the Middle East This new campaign, which uses tactics, techniques, and procedures (TTPs) consistent with previous Static Kitten activity, uses ScreenConnect launch parameters designed to target any MOFA with mfa[.]gov as part of the custom field. Anomali's team found samples specifically masquerading as the Kuwaiti government and the UAE National Council respectively, based on references in the malicious samples.
The research can be found here:
Probable Iranian Cyber Actors, Static Kitten, Conducting Cyberespionage Campaign Targeting UAE and Kuwait Government Agencies

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Apr 2021 07:00:00 -0000</pubDate>
      <itunes:title>Strategic titles point to something more than a commodity campaign. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>178</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guests Gage Mele, Winston Marydasan, and Yury Polozov from Anomali join Dave to discuss their research into Static Kitten targeting government agencies in the UAE and Kuwait. Anomali Threat Research uncovered malicious activity very likely attributed to the Iran-nexus cyberespionage group, Static Kitten (Seedworm, MERCURY, Temp.Zagros, POWERSTATS, NTSTATS, MuddyWater), which is known to target numerous sectors primarily located in the Middle East This new campaign, which uses tactics, techniques, and procedures (TTPs) consistent with previous Static Kitten activity, uses ScreenConnect launch parameters designed to target any MOFA with mfa[.]gov as part of the custom field. Anomali's team found samples specifically masquerading as the Kuwaiti government and the UAE National Council respectively, based on references in the malicious samples.
The research can be found here:
Probable Iranian Cyber Actors, Static Kitten, Conducting Cyberespionage Campaign Targeting UAE and Kuwait Government Agencies

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guests Gage Mele, Winston Marydasan, and Yury Polozov from Anomali join Dave to discuss their research into Static Kitten targeting government agencies in the UAE and Kuwait. Anomali Threat Research uncovered malicious activity very likely attributed to the Iran-nexus cyberespionage group, Static Kitten (Seedworm, MERCURY, Temp.Zagros, POWERSTATS, NTSTATS, MuddyWater), which is known to target numerous sectors primarily located in the Middle East This new campaign, which uses tactics, techniques, and procedures (TTPs) consistent with previous Static Kitten activity, uses ScreenConnect launch parameters designed to target any MOFA with mfa[.]gov as part of the custom field. Anomali's team found samples specifically masquerading as the Kuwaiti government and the UAE National Council respectively, based on references in the malicious samples.</p><p>The research can be found here:</p><ul><li><a href="https://www.anomali.com/blog/probable-iranian-cyber-actors-static-kitten-conducting-cyberespionage-campaign-targeting-uae-and-kuwait-government-agencies">Probable Iranian Cyber Actors, Static Kitten, Conducting Cyberespionage Campaign Targeting UAE and Kuwait Government Agencies</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1361</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3dfe2a8e-97c2-11eb-a2ed-b7e85ccd398b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5294577057.mp3?updated=1685125434" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A new Lazarus backdoor. Malvertising for a bogus Clubhouse app. Cryptojacking the academy. When is a cartel not a cartel? Strategic competition between the US and China. Choking Twitter. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1308/notes</link>
      <description>Lazarus Group has a new backdoor. Bogus Clubhouse app advertised on Facebook. Cryptojacking goes to school. A ransomware cartel is forming, but so far apparently without much profit-sharing. The US Senate is preparing to make strategic competition with China the law of the land. Dinah Davis from Arctic Wolf looks at phony COVID sites. Our guest is Jaclyn Miller from NTT on the importance of mentoring the next generation. And Russia remains displeased with a lot of Twitter’s content.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/68
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 09 Apr 2021 20:25:00 -0000</pubDate>
      <itunes:title>A new Lazarus backdoor. Malvertising for a bogus Clubhouse app. Cryptojacking the academy. When is a cartel not a cartel? Strategic competition between the US and China. Choking Twitter. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1308</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Lazarus Group has a new backdoor. Bogus Clubhouse app advertised on Facebook. Cryptojacking goes to school. A ransomware cartel is forming, but so far apparently without much profit-sharing. The US Senate is preparing to make strategic competition with China the law of the land. Dinah Davis from Arctic Wolf looks at phony COVID sites. Our guest is Jaclyn Miller from NTT on the importance of mentoring the next generation. And Russia remains displeased with a lot of Twitter’s content.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/68
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Lazarus Group has a new backdoor. Bogus Clubhouse app advertised on Facebook. Cryptojacking goes to school. A ransomware cartel is forming, but so far apparently without much profit-sharing. The US Senate is preparing to make strategic competition with China the law of the land. Dinah Davis from Arctic Wolf looks at phony COVID sites. Our guest is Jaclyn Miller from NTT on the importance of mentoring the next generation. And Russia remains displeased with a lot of Twitter’s content.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/68</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1480</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[045124d4-364d-11eb-b082-33c2a4b4e881]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1777474745.mp3?updated=1690234147" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cring ransomware hits manufacturing plants. Distance learning difficulties. Hafnium’s patient approach to vulnerable Exchange Servers. The Entity List grows. 5G security standards.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1307/notes</link>
      <description>Cring ransomware afflicts vulnerable Fortigate VPN servers. Distance learning in France stumbles due to sudden high demand, and possibly also because of cyberattacks. Hafnium’s attack on Microsoft Exchange Servers may have been long in preparation, and may have used data obtained in earlier breaches. Commerce Department adds seven Chinese organizations to its Entity List. 5G security standards in the US are said likely to emphasize zero trust. Atlantic Media discloses a breach of employee data. Caleb Barlow from CynergisTek with a clever way of thinking about ransomware preparedness. Our guest is Amit Kanfer from build.security on authorization, a problem he says remains mostly unsolved. And emissions testing stations in some US states remain down.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/67
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 08 Apr 2021 19:30:00 -0000</pubDate>
      <itunes:title>Cring ransomware hits manufacturing plants. Distance learning difficulties. Hafnium’s patient approach to vulnerable Exchange Servers. The Entity List grows. 5G security standards.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1307</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cring ransomware afflicts vulnerable Fortigate VPN servers. Distance learning in France stumbles due to sudden high demand, and possibly also because of cyberattacks. Hafnium’s attack on Microsoft Exchange Servers may have been long in preparation, and may have used data obtained in earlier breaches. Commerce Department adds seven Chinese organizations to its Entity List. 5G security standards in the US are said likely to emphasize zero trust. Atlantic Media discloses a breach of employee data. Caleb Barlow from CynergisTek with a clever way of thinking about ransomware preparedness. Our guest is Amit Kanfer from build.security on authorization, a problem he says remains mostly unsolved. And emissions testing stations in some US states remain down.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/67
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cring ransomware afflicts vulnerable Fortigate VPN servers. Distance learning in France stumbles due to sudden high demand, and possibly also because of cyberattacks. Hafnium’s attack on Microsoft Exchange Servers may have been long in preparation, and may have used data obtained in earlier breaches. Commerce Department adds seven Chinese organizations to its Entity List. 5G security standards in the US are said likely to emphasize zero trust. Atlantic Media discloses a breach of employee data. Caleb Barlow from CynergisTek with a clever way of thinking about ransomware preparedness. Our guest is Amit Kanfer from build.security on authorization, a problem he says remains mostly unsolved. And emissions testing stations in some US states remain down.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/67</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1398</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04c68e86-364d-11eb-b082-ff7701fc73df]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3208888705.mp3?updated=1690234122" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A Chinese cyberespionage campaign is active against Vietnamese targets. The European Commission acknowledges cyberattacks are under investigation. Data scraping. Bogus apps. Molerats are dudes. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1306/notes</link>
      <description>Goblin Panda’s upped its game in recent attacks on Vietnamese government targets. The EU is investigating cyberattacks against a number of its organizations. Scraped LinkedIn data is being sold in a hackers’ forum. Facebook talks about the causes of its recent data incident. New Android malware poses as a Netflix app. Joe Carrigan shares comments from the new head of the NCSC. Our guest is Fang Yu from Datavisor with highlights from their Digital Fraud Trends Report. And the Molerats are using voice-changers to phish for IDF personnel.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/66
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 07 Apr 2021 19:20:00 -0000</pubDate>
      <itunes:title>A Chinese cyberespionage campaign is active against Vietnamese targets. The European Commission acknowledges cyberattacks are under investigation. Data scraping. Bogus apps. Molerats are dudes. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1306</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Goblin Panda’s upped its game in recent attacks on Vietnamese government targets. The EU is investigating cyberattacks against a number of its organizations. Scraped LinkedIn data is being sold in a hackers’ forum. Facebook talks about the causes of its recent data incident. New Android malware poses as a Netflix app. Joe Carrigan shares comments from the new head of the NCSC. Our guest is Fang Yu from Datavisor with highlights from their Digital Fraud Trends Report. And the Molerats are using voice-changers to phish for IDF personnel.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/66
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Goblin Panda’s upped its game in recent attacks on Vietnamese government targets. The EU is investigating cyberattacks against a number of its organizations. Scraped LinkedIn data is being sold in a hackers’ forum. Facebook talks about the causes of its recent data incident. New Android malware poses as a Netflix app. Joe Carrigan shares comments from the new head of the NCSC. Our guest is Fang Yu from Datavisor with highlights from their Digital Fraud Trends Report. And the Molerats are using voice-changers to phish for IDF personnel.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/66</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1446</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04e78cbc-364d-11eb-b082-a36f00c84b40]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5591127140.mp3?updated=1690234104" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Watering holes, from Kiev to Canada. File transfer blues. What’s up in the criminal-to-criminal market. And an update on the old Facebook breach. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1305/notes</link>
      <description>A watering hole campaign compromised several Ukrainian sites (and one Canadian one). File transfer blues. A couple of looks into the criminal-to-criminal marketplace: establishing a brand and selling malicious document building tools. Ben Yelin has details on a privacy suit against Intel. Our guest is Steve Ginty from RiskIQ on the threat actors behind LogoKit. And notes on the big and apparently old Facebook breach, including why people care about it.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/65
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Apr 2021 19:00:00 -0000</pubDate>
      <itunes:title>Watering holes, from Kiev to Canada. File transfer blues. What’s up in the criminal-to-criminal market. And an update on the old Facebook breach. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1305</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A watering hole campaign compromised several Ukrainian sites (and one Canadian one). File transfer blues. A couple of looks into the criminal-to-criminal marketplace: establishing a brand and selling malicious document building tools. Ben Yelin has details on a privacy suit against Intel. Our guest is Steve Ginty from RiskIQ on the threat actors behind LogoKit. And notes on the big and apparently old Facebook breach, including why people care about it.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/65
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A watering hole campaign compromised several Ukrainian sites (and one Canadian one). File transfer blues. A couple of looks into the criminal-to-criminal marketplace: establishing a brand and selling malicious document building tools. Ben Yelin has details on a privacy suit against Intel. Our guest is Steve Ginty from RiskIQ on the threat actors behind LogoKit. And notes on the big and apparently old Facebook breach, including why people care about it.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/65</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1325</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[055f38d4-364d-11eb-b082-2fac24bcb552]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6213238759.mp3?updated=1690234083" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An old Facebook database handed over to skids (and it’s a big database). APTs look for vulnerable FortiOS instances. Cryptojacking in GitHub infrastructure. Risk and water utilities.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1304/notes</link>
      <description>An old leaked database has been delivered into the hands of skids. (The news isn’t that the data are out there; it’s that the skids now have it. For free.) CISA and the FBI warn that APTs are scanning for vulnerable Fortinet instances. Cryptojackers pan for alt-coin in GitHub’s infrastructure. Holiday Bear may have looked for network defenders. Threats to water utilities. Johannes Ullrich explains why dynamic data exchange is back. Our guest is Mark Lance from GuidePoint Security tracking parallels between the SolarWinds attack and the RSA hack a decade ago. And a cyberattack snarls vehicle emission testing.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/64
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 05 Apr 2021 19:35:00 -0000</pubDate>
      <itunes:title>An old Facebook database handed over to skids (and it’s a big database). APTs look for vulnerable FortiOS instances. Cryptojacking in GitHub infrastructure. Risk and water utilities.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1304</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An old leaked database has been delivered into the hands of skids. (The news isn’t that the data are out there; it’s that the skids now have it. For free.) CISA and the FBI warn that APTs are scanning for vulnerable Fortinet instances. Cryptojackers pan for alt-coin in GitHub’s infrastructure. Holiday Bear may have looked for network defenders. Threats to water utilities. Johannes Ullrich explains why dynamic data exchange is back. Our guest is Mark Lance from GuidePoint Security tracking parallels between the SolarWinds attack and the RSA hack a decade ago. And a cyberattack snarls vehicle emission testing.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/64
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An old leaked database has been delivered into the hands of skids. (The news isn’t that the data are out there; it’s that the skids now have it. For free.) CISA and the FBI warn that APTs are scanning for vulnerable Fortinet instances. Cryptojackers pan for alt-coin in GitHub’s infrastructure. Holiday Bear may have looked for network defenders. Threats to water utilities. Johannes Ullrich explains why dynamic data exchange is back. Our guest is Mark Lance from GuidePoint Security tracking parallels between the SolarWinds attack and the RSA hack a decade ago. And a cyberattack snarls vehicle emission testing.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/64</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1268</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[056ec7c2-364d-11eb-b082-f76fcee99e01]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8626480586.mp3?updated=1690234068" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Greg Bell: Answer the question of "why?" [Open Source] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/43/notes</link>
      <description>Co-founder and Chief Strategy Officer for Corelight Greg Bell describes the twists and turns of his career bringing him back to his childhood joy of computers. Working in a myriad of fields from human rights to Hollywood to writing a history of conspiracy belief before pivoting back to technology. Focusing on the relationships within the open source community, Greg works to change and improve the world through his mission-based organization. For those looking to begin their career in cyber, Greg offers that great mentorship and working for great organizations where you can soak in the culture are really important. And, we thank Greg for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 04 Apr 2021 07:00:00 -0000</pubDate>
      <itunes:title>Greg Bell: Answer the question of "why?" [Open Source] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>43</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Co-founder and Chief Strategy Officer for Corelight Greg Bell describes the twists and turns of his career bringing him back to his childhood joy of computers. </itunes:subtitle>
      <itunes:summary>Co-founder and Chief Strategy Officer for Corelight Greg Bell describes the twists and turns of his career bringing him back to his childhood joy of computers. Working in a myriad of fields from human rights to Hollywood to writing a history of conspiracy belief before pivoting back to technology. Focusing on the relationships within the open source community, Greg works to change and improve the world through his mission-based organization. For those looking to begin their career in cyber, Greg offers that great mentorship and working for great organizations where you can soak in the culture are really important. And, we thank Greg for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Co-founder and Chief Strategy Officer for Corelight Greg Bell describes the twists and turns of his career bringing him back to his childhood joy of computers. Working in a myriad of fields from human rights to Hollywood to writing a history of conspiracy belief before pivoting back to technology. Focusing on the relationships within the open source community, Greg works to change and improve the world through his mission-based organization. For those looking to begin their career in cyber, Greg offers that great mentorship and working for great organizations where you can soak in the culture are really important. And, we thank Greg for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>285</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[68433244-926d-11eb-8c0e-c33272c4b137]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2568161524.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ezuri: Regenerating a different kind of target. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/177/notes</link>
      <description>Guests Fernando Martinez and Tom Hegel from AT&amp;T Alien Labs join Dave to discuss their team's research "Malware using new Ezuri memory loader." Multiple threat actors have recently started using a Go language (Golang) tool to act as a packer and avoid Antivirus detection. Additionally, the Ezuri memory loader tool acts as a malware loader and executes its payload in memory, without writing the file to disk. While this technique is known and commonly used by Windows malware, it is less popular in Linux environments.
The research can be found here:
Malware using new Ezuri memory loader

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Apr 2021 07:00:00 -0000</pubDate>
      <itunes:title>Ezuri: Regenerating a different kind of target. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>177</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guests Fernando Martinez and Tom Hegel from AT&amp;T Alien Labs join Dave to discuss their team's research "Malware using new Ezuri memory loader." Multiple threat actors have recently started using a Go language (Golang) tool to act as a packer and avoid Antivirus detection. Additionally, the Ezuri memory loader tool acts as a malware loader and executes its payload in memory, without writing the file to disk. While this technique is known and commonly used by Windows malware, it is less popular in Linux environments.
The research can be found here:
Malware using new Ezuri memory loader

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guests Fernando Martinez and Tom Hegel from AT&amp;T Alien Labs join Dave to discuss their team's research "Malware using new Ezuri memory loader." Multiple threat actors have recently started using a Go language (Golang) tool to act as a packer and avoid Antivirus detection. Additionally, the Ezuri memory loader tool acts as a malware loader and executes its payload in memory, without writing the file to disk. While this technique is known and commonly used by Windows malware, it is less popular in Linux environments.</p><p>The research can be found here:</p><ul><li><a href="https://cybersecurity.att.com/blogs/labs-research/malware-using-new-ezuri-memory-loader">Malware using new Ezuri memory loader</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1156</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[12f215ea-9320-11eb-808c-a385350e096b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6236025750.mp3?updated=1685125424" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Goblin Panda sighting? The attempt on Ubiquiti. More universities feel the effects of the Accellion compromise. National Supply Chain Integrity Awareness Month. Down-market phishing. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1303/notes</link>
      <description>Goblin Panda might be out and about. Ubiquiti confirms that an extortion attempt was made, but says the attempted attack on data and source code was unsuccessful. The Accellion compromise claims more university victims. It’s National Supply Chain Integrity Awareness Month in the US. BOLO Mr. Korhsunov. Andrea Little Limbago from Interos on supply chain resilience in a time of tectonic geopolitical shifts. Our guest is Paul Nicholson from A10 Networks on their State of DDoS Weapons report. And some down-market phishing attempts.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/63
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 02 Apr 2021 20:25:00 -0000</pubDate>
      <itunes:title>Goblin Panda sighting? The attempt on Ubiquiti. More universities feel the effects of the Accellion compromise. National Supply Chain Integrity Awareness Month. Down-market phishing. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1303</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Goblin Panda might be out and about. Ubiquiti confirms that an extortion attempt was made, but says the attempted attack on data and source code was unsuccessful. The Accellion compromise claims more university victims. It’s National Supply Chain Integrity Awareness Month in the US. BOLO Mr. Korhsunov. Andrea Little Limbago from Interos on supply chain resilience in a time of tectonic geopolitical shifts. Our guest is Paul Nicholson from A10 Networks on their State of DDoS Weapons report. And some down-market phishing attempts.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/63
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Goblin Panda might be out and about. Ubiquiti confirms that an extortion attempt was made, but says the attempted attack on data and source code was unsuccessful. The Accellion compromise claims more university victims. It’s National Supply Chain Integrity Awareness Month in the US. BOLO Mr. Korhsunov. Andrea Little Limbago from Interos on supply chain resilience in a time of tectonic geopolitical shifts. Our guest is Paul Nicholson from A10 Networks on their State of DDoS Weapons report. And some down-market phishing attempts.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/63</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1583</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04400e06-364d-11eb-b082-0fc5c2e89877]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3045723595.mp3?updated=1690234056" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Holiday Bear’s tricks. Phishing for security experts. Industrial cyberespionage. Human error and failure to patch. EO on breach disclosure discussed. Malware found in game cheat codes. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1302/notes</link>
      <description>US Cyber Command and CISA plan to publish an analysis of the malware Holiday Bear used against SolarWinds. The DPRK is again phishing for security researchers. Exchange Server exploitation continues. Stone Panda goes after industrial data in Japan. Human error remains the principal source of cyber risk. A US Executive Order on cyber hygiene and breach disclosure nears the President’s desk. David Dufour from Webroot on the 3 types of hackers and where you’ve seen them recently. Rick Howard checks in with our guest Sharon Rosenman from Cyberbit on SOC Evolution. And gamers? Don’t cheat.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/62
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 01 Apr 2021 20:30:00 -0000</pubDate>
      <itunes:title>Holiday Bear’s tricks. Phishing for security experts. Industrial cyberespionage. Human error and failure to patch. EO on breach disclosure discussed. Malware found in game cheat codes. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1302</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>US Cyber Command and CISA plan to publish an analysis of the malware Holiday Bear used against SolarWinds. The DPRK is again phishing for security researchers. Exchange Server exploitation continues. Stone Panda goes after industrial data in Japan. Human error remains the principal source of cyber risk. A US Executive Order on cyber hygiene and breach disclosure nears the President’s desk. David Dufour from Webroot on the 3 types of hackers and where you’ve seen them recently. Rick Howard checks in with our guest Sharon Rosenman from Cyberbit on SOC Evolution. And gamers? Don’t cheat.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/62
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>US Cyber Command and CISA plan to publish an analysis of the malware Holiday Bear used against SolarWinds. The DPRK is again phishing for security researchers. Exchange Server exploitation continues. Stone Panda goes after industrial data in Japan. Human error remains the principal source of cyber risk. A US Executive Order on cyber hygiene and breach disclosure nears the President’s desk. David Dufour from Webroot on the 3 types of hackers and where you’ve seen them recently. Rick Howard checks in with our guest Sharon Rosenman from Cyberbit on SOC Evolution. And gamers? Don’t cheat.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/62</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1533</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04d7339e-364d-11eb-b082-8f687c682bb3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5609067466.mp3?updated=1690234043" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage and influence operations. Reading the US State Department’s mail. Risk management and strategic complacency. Volumetric attacks. Keeping suspect hardware out.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1301/notes</link>
      <description>Charming Kitten is back, and interested in medical researchers’ credentials. Russian services appear to have been reading some US State Department emails (it’s thought their access was confined to unclassified systems). Risk management practices and questions about the risks of growing too blasé about “management.” Recognizing the approach of an intelligence officer. Volumetric attacks are up. Joe Carrigan examines a sophisticated Microsoft spoof. Our guest is Donna Grindle from Kardon on updates to the HITECH ACT. More concerns, in India and the US, about Chinese telecom hardware.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/61
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 31 Mar 2021 19:30:00 -0000</pubDate>
      <itunes:title>Cyberespionage and influence operations. Reading the US State Department’s mail. Risk management and strategic complacency. Volumetric attacks. Keeping suspect hardware out.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1301</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Charming Kitten is back, and interested in medical researchers’ credentials. Russian services appear to have been reading some US State Department emails (it’s thought their access was confined to unclassified systems). Risk management practices and questions about the risks of growing too blasé about “management.” Recognizing the approach of an intelligence officer. Volumetric attacks are up. Joe Carrigan examines a sophisticated Microsoft spoof. Our guest is Donna Grindle from Kardon on updates to the HITECH ACT. More concerns, in India and the US, about Chinese telecom hardware.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/61
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Charming Kitten is back, and interested in medical researchers’ credentials. Russian services appear to have been reading some US State Department emails (it’s thought their access was confined to unclassified systems). Risk management practices and questions about the risks of growing too blasé about “management.” Recognizing the approach of an intelligence officer. Volumetric attacks are up. Joe Carrigan examines a sophisticated Microsoft spoof. Our guest is Donna Grindle from Kardon on updates to the HITECH ACT. More concerns, in India and the US, about Chinese telecom hardware.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/61</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1438</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[03a8e65c-364d-11eb-b082-17b7738b0528]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5731269901.mp3?updated=1690234025" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US considers how to settle accounts with Holiday Bear. International norms in cyberspace. Ransomware continues to surge against vulnerable Exchange Servers, and other criminal trends.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1300/notes</link>
      <description>The US Administration continues to prepare its response to Holiday Bear’s romp through the SolarWinds supply chain. Congress is asking for details on what was compromised in the incident, and why the Department of Homeland Security failed to detect the intrusion. The UN offers some recommendations on norms of conduct in cyberspace. Ben Yelin on a New Jersey Supreme Court ruling that phone passcodes are not protected by 5th amendment. Our guest is Frank Kettenstock from FoxIT on the security of PDF files. Developments in ransomware, including Exchange Server exploitation, credible extortion, and attempts to enlist customers against victims. 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/60
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Mar 2021 19:55:00 -0000</pubDate>
      <itunes:title>US considers how to settle accounts with Holiday Bear. International norms in cyberspace. Ransomware continues to surge against vulnerable Exchange Servers, and other criminal trends.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1300</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The US Administration continues to prepare its response to Holiday Bear’s romp through the SolarWinds supply chain. Congress is asking for details on what was compromised in the incident, and why the Department of Homeland Security failed to detect the intrusion. The UN offers some recommendations on norms of conduct in cyberspace. Ben Yelin on a New Jersey Supreme Court ruling that phone passcodes are not protected by 5th amendment. Our guest is Frank Kettenstock from FoxIT on the security of PDF files. Developments in ransomware, including Exchange Server exploitation, credible extortion, and attempts to enlist customers against victims. 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/60
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US Administration continues to prepare its response to Holiday Bear’s romp through the SolarWinds supply chain. Congress is asking for details on what was compromised in the incident, and why the Department of Homeland Security failed to detect the intrusion. The UN offers some recommendations on norms of conduct in cyberspace. Ben Yelin on a New Jersey Supreme Court ruling that phone passcodes are not protected by 5th amendment. Our guest is Frank Kettenstock from FoxIT on the security of PDF files. Developments in ransomware, including Exchange Server exploitation, credible extortion, and attempts to enlist customers against victims. </p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/60</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1507</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0311aed6-364d-11eb-b082-d3e59b64f11a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3895965671.mp3?updated=1690234008" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage in Germany. Australian network knocked off the air by a cyberattack. PHP shuts backdoor. Apple fixes a browser bug. FatFace pays up. Criminal charges: espionage and fraud.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1299/notes</link>
      <description>German politicians’ emails are under attack, and the GRU is the prime suspect. Australia’s Nine Network was knocked off the air by a cyberattack, and a nation-state operation is suspected. PHP takes steps to protect itself from an attempt to insert a backdoor in its source code. Apple fixes browser engine bugs. FatFace pays the ransom. Project Zero caught a Western counterterror operation. Betsy Carmelite from Booz Allen Hamilton on Zero Trust. Our guest is Tal Zamir of Hysolate on CISA's new ransomware guidelines. And a guilty plea for one, and almost five-hundred indictments for others.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/59
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 29 Mar 2021 20:15:00 -0000</pubDate>
      <itunes:title>Cyberespionage in Germany. Australian network knocked off the air by a cyberattack. PHP shuts backdoor. Apple fixes a browser bug. FatFace pays up. Criminal charges: espionage and fraud.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1299</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>German politicians’ emails are under attack, and the GRU is the prime suspect. Australia’s Nine Network was knocked off the air by a cyberattack, and a nation-state operation is suspected. PHP takes steps to protect itself from an attempt to insert a backdoor in its source code. Apple fixes browser engine bugs. FatFace pays the ransom. Project Zero caught a Western counterterror operation. Betsy Carmelite from Booz Allen Hamilton on Zero Trust. Our guest is Tal Zamir of Hysolate on CISA's new ransomware guidelines. And a guilty plea for one, and almost five-hundred indictments for others.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/59
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>German politicians’ emails are under attack, and the GRU is the prime suspect. Australia’s Nine Network was knocked off the air by a cyberattack, and a nation-state operation is suspected. PHP takes steps to protect itself from an attempt to insert a backdoor in its source code. Apple fixes browser engine bugs. FatFace pays the ransom. Project Zero caught a Western counterterror operation. Betsy Carmelite from Booz Allen Hamilton on Zero Trust. Our guest is Tal Zamir of Hysolate on CISA's new ransomware guidelines. And a guilty plea for one, and almost five-hundred indictments for others.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/59</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1539</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[03014af0-364d-11eb-b082-5f7f31b6592d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9548096171.mp3?updated=1690233989" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Teresa Shea: The challenge of adapting new technologies. [Intelligence] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/42/notes</link>
      <description>Vice President of Raytheon's Cyber Offense, Defense Experts Teresa Shea speaks of her journey from math to adapting new technologies on the cutting edge, With a love of math, Teresa was offered a scholarship by the Society of Women Engineering and decided to pursue a degree in electrical engineering. Unsurprisingly, there were few other women in her program, Teresa interned with and then proceeded to work for the National Security Agency becoming their SIGINT director. Following her government career, Teresa worked to help bring new technologies to government through her work at Raytheon. We thank Teresa for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 28 Mar 2021 07:00:00 -0000</pubDate>
      <itunes:title>Teresa Shea: The challenge of adapting new technologies. [Intelligence] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>42</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Vice President of Raytheon's Cyber Offense, Defense Experts Teresa Shea speaks of her journey from math to adapting new technologies on the cutting edge,</itunes:subtitle>
      <itunes:summary>Vice President of Raytheon's Cyber Offense, Defense Experts Teresa Shea speaks of her journey from math to adapting new technologies on the cutting edge, With a love of math, Teresa was offered a scholarship by the Society of Women Engineering and decided to pursue a degree in electrical engineering. Unsurprisingly, there were few other women in her program, Teresa interned with and then proceeded to work for the National Security Agency becoming their SIGINT director. Following her government career, Teresa worked to help bring new technologies to government through her work at Raytheon. We thank Teresa for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Vice President of Raytheon's Cyber Offense, Defense Experts Teresa Shea speaks of her journey from math to adapting new technologies on the cutting edge, With a love of math, Teresa was offered a scholarship by the Society of Women Engineering and decided to pursue a degree in electrical engineering. Unsurprisingly, there were few other women in her program, Teresa interned with and then proceeded to work for the National Security Agency becoming their SIGINT director. Following her government career, Teresa worked to help bring new technologies to government through her work at Raytheon. We thank Teresa for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>332</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c905dcf8-8e49-11eb-9f5c-17807bded0a9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5405103974.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How are we doing in the industrial sector? [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/176/notes</link>
      <description>Guest Sergio Caltagirone from Dragos joins us to take us through their 2020 ICS Cybersecurity Year in Review report. Dragos's annual ICS Year in Review provides an overview and analysis of ICS vulnerabilities, global threat activity targeting industrial environments, and industry trends and observations gathered from customer engagements worldwide. The goal of the report is to give asset owners and operators proactive, actionable information and defensive recommendations in order to prepare for and combat the world’s most significant industrial cybersecurity adversaries.
The report can be found here:
2020 ICS CYBERSECURITY YEAR IN REVIEW

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Mar 2021 07:00:00 -0000</pubDate>
      <itunes:title>How are we doing in the industrial sector? [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>176</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Sergio Caltagirone from Dragos joins us to take us through their 2020 ICS Cybersecurity Year in Review report. Dragos's annual ICS Year in Review provides an overview and analysis of ICS vulnerabilities, global threat activity targeting industrial environments, and industry trends and observations gathered from customer engagements worldwide. The goal of the report is to give asset owners and operators proactive, actionable information and defensive recommendations in order to prepare for and combat the world’s most significant industrial cybersecurity adversaries.
The report can be found here:
2020 ICS CYBERSECURITY YEAR IN REVIEW

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Sergio Caltagirone from Dragos joins us to take us through their 2020 ICS Cybersecurity Year in Review report. Dragos's annual ICS Year in Review provides an overview and analysis of ICS vulnerabilities, global threat activity targeting industrial environments, and industry trends and observations gathered from customer engagements worldwide. The goal of the report is to give asset owners and operators proactive, actionable information and defensive recommendations in order to prepare for and combat the world’s most significant industrial cybersecurity adversaries.</p><p>The report can be found here:</p><ul><li><a href="https://www.dragos.com/year-in-review/">2020 ICS CYBERSECURITY YEAR IN REVIEW</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1310</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[82cd893a-8d9e-11eb-a62e-176789a4bda0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2212582903.mp3?updated=1685124630" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Carding Mafia hacked by other criminals. Gangland extortion. Section 230 reform. Director NSA talks about cyber defense, especially foreign attacks staged domestically. Propaganda. Hacktivism.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1298/notes</link>
      <description>Criminal-on-criminal cyber crime. Ransomware hits European and North American businesses. Big Tech goes (virtually) to Capitol Hill to talk disinformation and Section 230. The head or NSA and US Cyber Command discusses election security and cyber defense with the Senate Armed Services Committee. Russia complains of a US assault on Russia’s “civilizational pillars.” Accenture’s Josh Ray shares his thoughts on securing the supply chain. Our guest is Sergio Caltagirone from Dragos on their 2020 ICS/OT Cybersecurity Year in Review. And there appears to be a minor resurgence of hacktivism.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/58
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 26 Mar 2021 19:30:00 -0000</pubDate>
      <itunes:title>Carding Mafia hacked by other criminals. Gangland extortion. Section 230 reform. Director NSA talks about cyber defense, especially foreign attacks staged domestically. Propaganda. Hacktivism.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1298</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Criminal-on-criminal cyber crime. Ransomware hits European and North American businesses. Big Tech goes (virtually) to Capitol Hill to talk disinformation and Section 230. The head or NSA and US Cyber Command discusses election security and cyber defense with the Senate Armed Services Committee. Russia complains of a US assault on Russia’s “civilizational pillars.” Accenture’s Josh Ray shares his thoughts on securing the supply chain. Our guest is Sergio Caltagirone from Dragos on their 2020 ICS/OT Cybersecurity Year in Review. And there appears to be a minor resurgence of hacktivism.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/58
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Criminal-on-criminal cyber crime. Ransomware hits European and North American businesses. Big Tech goes (virtually) to Capitol Hill to talk disinformation and Section 230. The head or NSA and US Cyber Command discusses election security and cyber defense with the Senate Armed Services Committee. Russia complains of a US assault on Russia’s “civilizational pillars.” Accenture’s Josh Ray shares his thoughts on securing the supply chain. Our guest is Sergio Caltagirone from Dragos on their 2020 ICS/OT Cybersecurity Year in Review. And there appears to be a minor resurgence of hacktivism.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/58</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1703</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[042f6d1c-364d-11eb-b082-6bcf80551201]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2524407133.mp3?updated=1690233972" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mamba ransomware’s evolution. Facebook acts against Evil Eye. Huawei is invited into OIC-CERT. Slack Connect gets poor security and privacy reviews. An excursus on fleeceware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1297/notes</link>
      <description>The FBI warns organizations that Mamba ransomware is out and about in a newly evolved form. Facebook takes down a Chinese cyberespionage operation targeting Uyghurs. Huawei joins the Organization of Islamic Cooperation. Slack thinks it might have made a security and privacy misstep. Caleb Barlow from CynergisTek on Healthcare Interoperability. Our guest is Roei Amit from Deep Instinct on their 2020 Cyber Threat Landscape Report. And a look at fleeceware.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/57
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 25 Mar 2021 20:00:00 -0000</pubDate>
      <itunes:title>Mamba ransomware’s evolution. Facebook acts against Evil Eye. Huawei is invited into OIC-CERT. Slack Connect gets poor security and privacy reviews. An excursus on fleeceware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1297</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The FBI warns organizations that Mamba ransomware is out and about in a newly evolved form. Facebook takes down a Chinese cyberespionage operation targeting Uyghurs. Huawei joins the Organization of Islamic Cooperation. Slack thinks it might have made a security and privacy misstep. Caleb Barlow from CynergisTek on Healthcare Interoperability. Our guest is Roei Amit from Deep Instinct on their 2020 Cyber Threat Landscape Report. And a look at fleeceware.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/57
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FBI warns organizations that Mamba ransomware is out and about in a newly evolved form. Facebook takes down a Chinese cyberespionage operation targeting Uyghurs. Huawei joins the Organization of Islamic Cooperation. Slack thinks it might have made a security and privacy misstep. Caleb Barlow from CynergisTek on Healthcare Interoperability. Our guest is Roei Amit from Deep Instinct on their 2020 Cyber Threat Landscape Report. And a look at fleeceware.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/57</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1452</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[03ba3ac4-364d-11eb-b082-574e4a1c7720]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3261394319.mp3?updated=1690233944" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trends in phishbait. Ransomware exploits vulnerable Exchange Servers. Purple Fox develops worm capabilities. Attacks on industrial production. Third-party risk. What’s on your mind, crooks? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1296/notes</link>
      <description>COVID-themed phishbait has shifted to vaccines. Notes on the ransomware exploiting vulnerable Exchange Servers. Purple Fox gets wormy. Sierra Wireless halts operations to remediate a ransomware incident. Notes on ICS vulnerabilities. More victims of third-party risk. Joe Carrigan looks at SMS security issues. Our guest is Ron Brash from Verve Industrial with takeaways from their 2020 ICS Vulnerabilities report. And what are the cybercriminals thinking?
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/56
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 24 Mar 2021 20:30:00 -0000</pubDate>
      <itunes:title>Trends in phishbait. Ransomware exploits vulnerable Exchange Servers. Purple Fox develops worm capabilities. Attacks on industrial production. Third-party risk. What’s on your mind, crooks? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1296</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>COVID-themed phishbait has shifted to vaccines. Notes on the ransomware exploiting vulnerable Exchange Servers. Purple Fox gets wormy. Sierra Wireless halts operations to remediate a ransomware incident. Notes on ICS vulnerabilities. More victims of third-party risk. Joe Carrigan looks at SMS security issues. Our guest is Ron Brash from Verve Industrial with takeaways from their 2020 ICS Vulnerabilities report. And what are the cybercriminals thinking?
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/56
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>COVID-themed phishbait has shifted to vaccines. Notes on the ransomware exploiting vulnerable Exchange Servers. Purple Fox gets wormy. Sierra Wireless halts operations to remediate a ransomware incident. Notes on ICS vulnerabilities. More victims of third-party risk. Joe Carrigan looks at SMS security issues. Our guest is Ron Brash from Verve Industrial with takeaways from their 2020 ICS Vulnerabilities report. And what are the cybercriminals thinking?</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/56</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1525</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0398f828-364d-11eb-b082-63690b33bda2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5869317593.mp3?updated=1690233874" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bonus Recorded Future Podcast: Correlating the COVID-19 Opportunist Money Trail </title>
      <description>The CyberWire partners with Recorded Future's threat intelligence podcast and our Dave Bittner is the host. It's a weekly show that comes out each Monday afternoon. We thought you might want to check it out and are adding it to our feed today. We hope you like it and consider subscribing in your favorite podcast app.
The COVID-19 global pandemic has, predictably, attracted bad actors intent on using fear and uncertainty as a framework for a variety of actions, from run-of-the-mill money scams to targeting phishing, business email compromise, and even espionage.
Recorded Future’s Insikt Group has been following these money trails and correlating them with a spectrum of bad actors around the globe. They recently published their findings in a blog post titled, “Follow the Money: Qualifying Opportunism Behind Cyberattacks During the COVID-19 Pandemic.”
On today’s episode we’ve got a pair of Insikt Group analysts joining us to share their expertise. Lindsay Kaye is Director of Operational Outcomes and Charity Wright is a Cyber Threat Intelligence Analyst.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 24 Mar 2021 16:00:00 -0000</pubDate>
      <itunes:title>Bonus Recorded Future Podcast: Correlating the COVID-19 Opportunist Money Trail </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The CyberWire partners with Recorded Future's threat intelligence podcast and our Dave Bittner is the host. It's a weekly show that comes out each Monday afternoon. We thought you might want to check it out and are adding it to our feed today. We hope you like it and consider subscribing in your favorite podcast app.
The COVID-19 global pandemic has, predictably, attracted bad actors intent on using fear and uncertainty as a framework for a variety of actions, from run-of-the-mill money scams to targeting phishing, business email compromise, and even espionage.
Recorded Future’s Insikt Group has been following these money trails and correlating them with a spectrum of bad actors around the globe. They recently published their findings in a blog post titled, “Follow the Money: Qualifying Opportunism Behind Cyberattacks During the COVID-19 Pandemic.”
On today’s episode we’ve got a pair of Insikt Group analysts joining us to share their expertise. Lindsay Kaye is Director of Operational Outcomes and Charity Wright is a Cyber Threat Intelligence Analyst.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><em>The CyberWire partners with Recorded Future's threat intelligence podcast and our Dave Bittner is the host. It's a weekly show that comes out each Monday afternoon. We thought you might want to check it out and are adding it to our feed today. We hope you like it and consider subscribing in your favorite podcast app.</em></p><p>The COVID-19 global pandemic has, predictably, attracted bad actors intent on using fear and uncertainty as a framework for a variety of actions, from run-of-the-mill money scams to targeting phishing, business email compromise, and even espionage.</p><p>Recorded Future’s Insikt Group has been following these money trails and correlating them with a spectrum of bad actors around the globe. They recently published their findings in a blog post titled, “<a href="https://www.recordedfuture.com/opportunism-behind-cyberattacks-during-pandemic/">Follow the Money: Qualifying Opportunism Behind Cyberattacks During the COVID-19 Pandemic</a>.”</p><p>On today’s episode we’ve got a pair of Insikt Group analysts joining us to share their expertise. Lindsay Kaye is Director of Operational Outcomes and Charity Wright is a Cyber Threat Intelligence Analyst.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1047</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9fec0834-8ca9-11eb-82a4-ffd2cc23064d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4778448963.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Updates on the state of Microsoft Exchange Server vulnerability, patching, and exploitation. Third-party breaches affect Shell and AFCEA. TikTok’s privacy. A manga site goes down. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1295/notes</link>
      <description>Exchange Server patching is going well, they say, but they also say that patching isn’t enough. Crooks are continuing to look for unpatched instances, and even in the patched systems, you’ve got to check to make sure the bad actors have been found and ejected. AFCEA and Shell both disclose being affected by third-party breaches. Citizen Lab sees no particular problem with TikTok. Ben Yelin ponders possible US response to the Microsoft Exchange Server attacks. Our guest is Alex Gizis from Connectify using VPNs to thwart government internet restrictions in Myanmar. And a major manga fan site is down.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/55
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Mar 2021 19:20:00 -0000</pubDate>
      <itunes:title>Updates on the state of Microsoft Exchange Server vulnerability, patching, and exploitation. Third-party breaches affect Shell and AFCEA. TikTok’s privacy. A manga site goes down. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1295</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Exchange Server patching is going well, they say, but they also say that patching isn’t enough. Crooks are continuing to look for unpatched instances, and even in the patched systems, you’ve got to check to make sure the bad actors have been found and ejected. AFCEA and Shell both disclose being affected by third-party breaches. Citizen Lab sees no particular problem with TikTok. Ben Yelin ponders possible US response to the Microsoft Exchange Server attacks. Our guest is Alex Gizis from Connectify using VPNs to thwart government internet restrictions in Myanmar. And a major manga fan site is down.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/55
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Exchange Server patching is going well, they say, but they also say that patching isn’t enough. Crooks are continuing to look for unpatched instances, and even in the patched systems, you’ve got to check to make sure the bad actors have been found and ejected. AFCEA and Shell both disclose being affected by third-party breaches. Citizen Lab sees no particular problem with TikTok. Ben Yelin ponders possible US response to the Microsoft Exchange Server attacks. Our guest is Alex Gizis from Connectify using VPNs to thwart government internet restrictions in Myanmar. And a major manga fan site is down.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/55</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1483</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[032340a6-364d-11eb-b082-237754709797]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7097062462.mp3?updated=1690233777" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Transportation as an espionage target. Expensive, elaborate cyber campaigns by unidentified threat actors. Infraud operators sentenced in Nevada.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1294/notes</link>
      <description>Indian authorities warn the country’s transportation sector that it may be a target for cyberespionage. Google’s Project Zero describes an elaborate and expensive campaign that exploited zero-day vulnerabilities. The SilverFish threat group is elaborate, well-resourced, and well-organized. Threat actors are quietly altering mailbox permissions. REvil is back. Some say “yes” to Moscow; others say “nyet.” Dinah Davis from Arctic Wolf on Security Metrics. Our guest is Graeme Bunton from the DNS Abuse Institute. And two Infraud operators are sentenced.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/54
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 22 Mar 2021 19:45:00 -0000</pubDate>
      <itunes:title>Transportation as an espionage target. Expensive, elaborate cyber campaigns by unidentified threat actors. Infraud operators sentenced in Nevada.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1294</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Indian authorities warn the country’s transportation sector that it may be a target for cyberespionage. Google’s Project Zero describes an elaborate and expensive campaign that exploited zero-day vulnerabilities. The SilverFish threat group is elaborate, well-resourced, and well-organized. Threat actors are quietly altering mailbox permissions. REvil is back. Some say “yes” to Moscow; others say “nyet.” Dinah Davis from Arctic Wolf on Security Metrics. Our guest is Graeme Bunton from the DNS Abuse Institute. And two Infraud operators are sentenced.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/54
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Indian authorities warn the country’s transportation sector that it may be a target for cyberespionage. Google’s Project Zero describes an elaborate and expensive campaign that exploited zero-day vulnerabilities. The SilverFish threat group is elaborate, well-resourced, and well-organized. Threat actors are quietly altering mailbox permissions. REvil is back. Some say “yes” to Moscow; others say “nyet.” Dinah Davis from Arctic Wolf on Security Metrics. Our guest is Graeme Bunton from the DNS Abuse Institute. And two Infraud operators are sentenced.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/54</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1555</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[02edecda-364d-11eb-b082-bf44ca0ab426]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5453553574.mp3?updated=1690233545" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kevin Magee: Focus on the archer. (CSO) [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/41/notes</link>
      <description>Chief Security Officer of Microsoft Canada Kevin Magee shares his background as a historian and how it applies to his work in cybersecurity. Likening himself to a dashing Indiana Jones, Kevin talks about how he sees history unfolding and the most interesting things right now are happening in security. Spending time tinkering with things in the university's computer room under the stairs gave way to Kevin's love affair with technology. As Chief Security Officer, Kevin says he uses an analogy: "I think we focus on the arrows, not the the archer" meaning there's too much focus on the attacks rather than the ones mounting them. As a historian and witness to our current history, Kevin sees the changes all affecting cybersecurity. We thank Kevin for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 21 Mar 2021 07:00:00 -0000</pubDate>
      <itunes:title>Kevin Magee: Focus on the archer. (CSO) [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>41</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Chief Security Officer of Microsoft Canada Kevin Magee shares his background as a historian and how it applies to cybersecurity. </itunes:subtitle>
      <itunes:summary>Chief Security Officer of Microsoft Canada Kevin Magee shares his background as a historian and how it applies to his work in cybersecurity. Likening himself to a dashing Indiana Jones, Kevin talks about how he sees history unfolding and the most interesting things right now are happening in security. Spending time tinkering with things in the university's computer room under the stairs gave way to Kevin's love affair with technology. As Chief Security Officer, Kevin says he uses an analogy: "I think we focus on the arrows, not the the archer" meaning there's too much focus on the attacks rather than the ones mounting them. As a historian and witness to our current history, Kevin sees the changes all affecting cybersecurity. We thank Kevin for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chief Security Officer of Microsoft Canada Kevin Magee shares his background as a historian and how it applies to his work in cybersecurity. Likening himself to a dashing Indiana Jones, Kevin talks about how he sees history unfolding and the most interesting things right now are happening in security. Spending time tinkering with things in the university's computer room under the stairs gave way to Kevin's love affair with technology. As Chief Security Officer, Kevin says he uses an analogy: "I think we focus on the arrows, not the the archer" meaning there's too much focus on the attacks rather than the ones mounting them. As a historian and witness to our current history, Kevin sees the changes all affecting cybersecurity. We thank Kevin for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>339</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5cd9948a-88e4-11eb-95a9-d7cb01dffaae]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1845696636.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BendyBear: difficult to detect and downloader of malicious payloads. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/175/notes</link>
      <description>Guest Jen Miller-Osborn from Palo Alto Networks' Unit 42 joins us to discuss their research into BendyBear. Highly malleable, highly sophisticated and over 10,000 bytes of machine code. The code behavior and features strongly correlate with that of the WaterBear malware family, which has been active since as early as 2009. The malware is associated with the cyber espionage group BlackTech, which many in the broader threat research community have assessed to have ties to the Chinese government, and is believed to be responsible for recent attacks against several East Asian government organizations. Due to the similarities with WaterBear, and the polymorphic nature of the code, Unit 42 named this novel Chinese shellcode “BendyBear.” It stands in a class of its own in terms of being one of the most sophisticated, well-engineered and difficult-to-detect samples of shellcode employed by an Advanced Persistent Threat (APT).
The research can be found here:
BendyBear: Novel Chinese Shellcode Linked With Cyber Espionage Group BlackTech

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Mar 2021 07:00:00 -0000</pubDate>
      <itunes:title>BendyBear: difficult to detect and downloader of malicious payloads. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>175</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Jen Miller-Osborn from Palo Alto Networks' Unit 42 joins us to discuss their research into BendyBear. Highly malleable, highly sophisticated and over 10,000 bytes of machine code. The code behavior and features strongly correlate with that of the WaterBear malware family, which has been active since as early as 2009. The malware is associated with the cyber espionage group BlackTech, which many in the broader threat research community have assessed to have ties to the Chinese government, and is believed to be responsible for recent attacks against several East Asian government organizations. Due to the similarities with WaterBear, and the polymorphic nature of the code, Unit 42 named this novel Chinese shellcode “BendyBear.” It stands in a class of its own in terms of being one of the most sophisticated, well-engineered and difficult-to-detect samples of shellcode employed by an Advanced Persistent Threat (APT).
The research can be found here:
BendyBear: Novel Chinese Shellcode Linked With Cyber Espionage Group BlackTech

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Jen Miller-Osborn from Palo Alto Networks' Unit 42 joins us to discuss their research into BendyBear. Highly malleable, highly sophisticated and over 10,000 bytes of machine code. The code behavior and features strongly correlate with that of the WaterBear malware family, which has been active since as early as 2009. The malware is associated with the cyber espionage group BlackTech, which many in the broader threat research community have assessed to have ties to the Chinese government, and is believed to be responsible for recent attacks against several East Asian government organizations. Due to the similarities with WaterBear, and the polymorphic nature of the code, Unit 42 named this novel Chinese shellcode “BendyBear.” It stands in a class of its own in terms of being one of the most sophisticated, well-engineered and difficult-to-detect samples of shellcode employed by an Advanced Persistent Threat (APT).</p><p>The research can be found here:</p><ul><li><a href="https://unit42.paloaltonetworks.com/bendybear-shellcode-blacktech/">BendyBear: Novel Chinese Shellcode Linked With Cyber Espionage Group BlackTech</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>952</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[73e5ffe4-88b5-11eb-a7a2-3f90c6adec58]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3692228310.mp3?updated=1685124543" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage against Finland. Moscow’s displeasure. ICS security. Two indictments and why the PLA should stick to Buicks. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1293/notes</link>
      <description>Helsinki blames Beijing’s APT31 for cyberespionage against Finland’s parliament. Russia withdraws its ambassador to the US, calling him home for consultation, post the US IC’s report on election influence ops. Risk management for industrial control systems, and especially for an often overlooked part of the power grid. Johannes Ullrich from SANS on Evading Anti-Malware Sandboxes with New CPU Architectures. Our guest is Tony Cole from Attivo on dealing with adversaries already inside your network. A guilty plea in an odd extortion attempt, why China’s wary of Teslas, and the indictment of a hacktivist.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/53
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 19 Mar 2021 20:10:00 -0000</pubDate>
      <itunes:title>Cyberespionage against Finland. Moscow’s displeasure. ICS security. Two indictments and why the PLA should stick to Buicks. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1293</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Helsinki blames Beijing’s APT31 for cyberespionage against Finland’s parliament. Russia withdraws its ambassador to the US, calling him home for consultation, post the US IC’s report on election influence ops. Risk management for industrial control systems, and especially for an often overlooked part of the power grid. Johannes Ullrich from SANS on Evading Anti-Malware Sandboxes with New CPU Architectures. Our guest is Tony Cole from Attivo on dealing with adversaries already inside your network. A guilty plea in an odd extortion attempt, why China’s wary of Teslas, and the indictment of a hacktivist.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/53
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Helsinki blames Beijing’s APT31 for cyberespionage against Finland’s parliament. Russia withdraws its ambassador to the US, calling him home for consultation, post the US IC’s report on election influence ops. Risk management for industrial control systems, and especially for an often overlooked part of the power grid. Johannes Ullrich from SANS on Evading Anti-Malware Sandboxes with New CPU Architectures. Our guest is Tony Cole from Attivo on dealing with adversaries already inside your network. A guilty plea in an odd extortion attempt, why China’s wary of Teslas, and the indictment of a hacktivist.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/53</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1663</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[041e7778-364d-11eb-b082-d7259abe02bb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1154567739.mp3?updated=1690233527" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Radiation disinformation. CISA warns that Trickbot is surging. FBI releases Internet Crime Report, Crytpers get commodified. And notes from the underworld.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1292/notes</link>
      <description>Disinformation about a radiation leak that wasn’t. Another warning about Trickbot. The FBI says cybercrime cost victims more than $4.2 billion last year. Investigation and remediation of the SolarWinds and Exchange Server compromises continue. Crypters become a commodity for malware developers. Robert M. Lee from Dragos on lessons from the recent Texas power outages. Our guest is Bob Shaker from Norton Lifelock looking at baddies targeting online gamers. And some people are looking for jobs in all the wrong places.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/52
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 18 Mar 2021 20:00:00 -0000</pubDate>
      <itunes:title>Radiation disinformation. CISA warns that Trickbot is surging. FBI releases Internet Crime Report, Crytpers get commodified. And notes from the underworld.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1292</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Disinformation about a radiation leak that wasn’t. Another warning about Trickbot. The FBI says cybercrime cost victims more than $4.2 billion last year. Investigation and remediation of the SolarWinds and Exchange Server compromises continue. Crypters become a commodity for malware developers. Robert M. Lee from Dragos on lessons from the recent Texas power outages. Our guest is Bob Shaker from Norton Lifelock looking at baddies targeting online gamers. And some people are looking for jobs in all the wrong places.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/52
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Disinformation about a radiation leak that wasn’t. Another warning about Trickbot. The FBI says cybercrime cost victims more than $4.2 billion last year. Investigation and remediation of the SolarWinds and Exchange Server compromises continue. Crypters become a commodity for malware developers. Robert M. Lee from Dragos on lessons from the recent Texas power outages. Our guest is Bob Shaker from Norton Lifelock looking at baddies targeting online gamers. And some people are looking for jobs in all the wrong places.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/52</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1476</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[03cb25be-364d-11eb-b082-0fe2d034cf90]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9215674266.mp3?updated=1690233508" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US report on 2020 foreign election meddling is out, and Russian and Iran are prominently mentioned in dispatches. Recovering from the Hafnium and Holiday Bear campaigns. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1291/notes</link>
      <description>The US Intelligence Community has released its report on 2020 foreign election meddling. It found no successful hacking, but a lot of clever influence operations. Ukraine says it stopped a significant Russian cyberespionage campaign. Recovery from the SolarWinds and Exchange Server compromises continues. Joe Carrigan shares thoughts on the Verkada hack. Our guest is Oscar Pedroso from Thimble on getting kids hooked on technology. And no, that celebrity tweeter isn’t really going to send you $2000 for every $1000 you give back to the community.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/51
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 17 Mar 2021 19:30:00 -0000</pubDate>
      <itunes:title>US report on 2020 foreign election meddling is out, and Russian and Iran are prominently mentioned in dispatches. Recovering from the Hafnium and Holiday Bear campaigns. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1291</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The US Intelligence Community has released its report on 2020 foreign election meddling. It found no successful hacking, but a lot of clever influence operations. Ukraine says it stopped a significant Russian cyberespionage campaign. Recovery from the SolarWinds and Exchange Server compromises continues. Joe Carrigan shares thoughts on the Verkada hack. Our guest is Oscar Pedroso from Thimble on getting kids hooked on technology. And no, that celebrity tweeter isn’t really going to send you $2000 for every $1000 you give back to the community.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/51
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US Intelligence Community has released its report on 2020 foreign election meddling. It found no successful hacking, but a lot of clever influence operations. Ukraine says it stopped a significant Russian cyberespionage campaign. Recovery from the SolarWinds and Exchange Server compromises continues. Joe Carrigan shares thoughts on the Verkada hack. Our guest is Oscar Pedroso from Thimble on getting kids hooked on technology. And no, that celebrity tweeter isn’t really going to send you $2000 for every $1000 you give back to the community.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/51</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1486</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0388a8d8-364d-11eb-b082-73dd12a252a7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1777321664.mp3?updated=1690233341" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage prospects telecom companies: Operation Diànxùn. Working against exploitation of Exchange Server. And rerouting SMS messages (it cost only $16).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1290/notes</link>
      <description>McAfee describes Operation Diànxùn, a probable Chinese collection effort directed against telecoms and 5G technology. Organizations around the world continue to work to thwart exploitation of Exchange Server vulnerabilities. What’s a webshell, and what can it do? Ben Yelin looks at cell phone data gathered from the US Capitol riot. Our guest is Ross Rustici from ZeroFOX on the evolution of ransomware. And how much does it cost to redirect all your SMS messages to some goon? Said goon needs only sixteen bucks.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/50
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Mar 2021 19:50:00 -0000</pubDate>
      <itunes:title>Cyberespionage prospects telecom companies: Operation Diànxùn. Working against exploitation of Exchange Server. And rerouting SMS messages (it cost only $16).</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1290</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>McAfee describes Operation Diànxùn, a probable Chinese collection effort directed against telecoms and 5G technology. Organizations around the world continue to work to thwart exploitation of Exchange Server vulnerabilities. What’s a webshell, and what can it do? Ben Yelin looks at cell phone data gathered from the US Capitol riot. Our guest is Ross Rustici from ZeroFOX on the evolution of ransomware. And how much does it cost to redirect all your SMS messages to some goon? Said goon needs only sixteen bucks.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/50
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>McAfee describes Operation Diànxùn, a probable Chinese collection effort directed against telecoms and 5G technology. Organizations around the world continue to work to thwart exploitation of Exchange Server vulnerabilities. What’s a webshell, and what can it do? Ben Yelin looks at cell phone data gathered from the US Capitol riot. Our guest is Ross Rustici from ZeroFOX on the evolution of ransomware. And how much does it cost to redirect all your SMS messages to some goon? Said goon needs only sixteen bucks.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/50</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1482</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[033696ec-364d-11eb-b082-df83e3f2fbfc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1513120120.mp3?updated=1690233321" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Looking for leaks in the Microsoft Exchange Server exploitation. International cyber conflict. Sky Global executives indicted in the US. Scammer demands £1000 pounds to go on do-not-call list.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1289/notes</link>
      <description>Microsoft is looking for a possible leak behind the spread of Exchange Server exploits, and hackers piggyback on webshells placed by other threat actors. The US Government continues to mull how to respond to Holiday Bear and Hafnium. Britain’s PM calls for greater offensive cyber capabilities. India looks for ways of countering China in cyberspace. Sky Global executives indicted for alleged racketeering. Accenture’s Josh Ray takes on defending against nation states. Rick Howard aims the hash table at third party cloud security. And what does it cost to be on a do-not-call list? Nothing. Really.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/49
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 15 Mar 2021 20:00:00 -0000</pubDate>
      <itunes:title>Looking for leaks in the Microsoft Exchange Server exploitation. International cyber conflict. Sky Global executives indicted in the US. Scammer demands £1000 pounds to go on do-not-call list.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1289</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Microsoft is looking for a possible leak behind the spread of Exchange Server exploits, and hackers piggyback on webshells placed by other threat actors. The US Government continues to mull how to respond to Holiday Bear and Hafnium. Britain’s PM calls for greater offensive cyber capabilities. India looks for ways of countering China in cyberspace. Sky Global executives indicted for alleged racketeering. Accenture’s Josh Ray takes on defending against nation states. Rick Howard aims the hash table at third party cloud security. And what does it cost to be on a do-not-call list? Nothing. Really.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/49
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft is looking for a possible leak behind the spread of Exchange Server exploits, and hackers piggyback on webshells placed by other threat actors. The US Government continues to mull how to respond to Holiday Bear and Hafnium. Britain’s PM calls for greater offensive cyber capabilities. India looks for ways of countering China in cyberspace. Sky Global executives indicted for alleged racketeering. Accenture’s Josh Ray takes on defending against nation states. Rick Howard aims the hash table at third party cloud security. And what does it cost to be on a do-not-call list? Nothing. Really.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/49</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1518</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[02dc2d92-364d-11eb-b082-1f0804db8e11]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3994584942.mp3?updated=1690232910" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SolarWinds, SUNBURST, and supply chain security. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/11/notes</link>
      <description>The SolarWinds Orion SUNBURST exploit forced organizations to determine whether and to what extent they’d been compromised. It’s not enough to eject the intruders and their malware from the networks. Affected organizations also need to know what systems and data had been breached, and for how long. The adversary behind SUNBURST is advanced, quietly breaching the perimeter and moving freely to access, steal, or destroy business-critical data, and to disrupt operations.
Joining us to share their expertise on the subject are Ryan Olson of Palo Alto Networks' Unit 42, Bill Yurek of Inspired Hacking Solutions, and we close out the show with Matt Cauthorn, from our sponsor ExtraHop, who joins CyberWire-X to discuss the challenges of detecting such advanced threats, and to share insights from behavioral analysis on what the new breed of threat actor is doing inside our networks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 14 Mar 2021 07:00:00 -0000</pubDate>
      <itunes:title>SolarWinds, SUNBURST, and supply chain security. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>11</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The SolarWinds Orion SUNBURST exploit forced organizations to determine whether and to what extent they’d been compromised. It’s not enough to eject the intruders and their malware from the networks. Affected organizations also need to know what systems and data had been breached, and for how long. The adversary behind SUNBURST is advanced, quietly breaching the perimeter and moving freely to access, steal, or destroy business-critical data, and to disrupt operations.
Joining us to share their expertise on the subject are Ryan Olson of Palo Alto Networks' Unit 42, Bill Yurek of Inspired Hacking Solutions, and we close out the show with Matt Cauthorn, from our sponsor ExtraHop, who joins CyberWire-X to discuss the challenges of detecting such advanced threats, and to share insights from behavioral analysis on what the new breed of threat actor is doing inside our networks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The SolarWinds Orion SUNBURST exploit forced organizations to determine whether and to what extent they’d been compromised. It’s not enough to eject the intruders and their malware from the networks. Affected organizations also need to know what systems and data had been breached, and for how long. The adversary behind SUNBURST is advanced, quietly breaching the perimeter and moving freely to access, steal, or destroy business-critical data, and to disrupt operations.</p><p>Joining us to share their expertise on the subject are Ryan Olson of Palo Alto Networks' Unit 42, Bill Yurek of Inspired Hacking Solutions, and we close out the show with Matt Cauthorn, from our sponsor ExtraHop, who joins CyberWire-X to discuss the challenges of detecting such advanced threats, and to share insights from behavioral analysis on what the new breed of threat actor is doing inside our networks.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2096</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2d27297a-8365-11eb-966c-4fbbf0c61c07]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2678474726.mp3?updated=1615563319" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dinah Davis: Building your network. [R&amp;D] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/40/notes</link>
      <description>Coming from her love of math, VP of R&amp;D at Arctic Wolf Networks Dinah Davis shares how she arrived in the cybersecurity industry after finding her niche. Dinah recalls how at a time of indecision, a computer course at university and a job with the Canadian government helped to solidify her career direction. Dinah mentions how "security and cryptography specifically was this perfect mix of real world problem solving and mathematics and computer science all combined into one ball of happiness." Networking played a key role in Dinah's journey. She recommends that those interested in joining the field to go for what they believe in. And, we thank Dinah for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 14 Mar 2021 07:00:00 -0000</pubDate>
      <itunes:title>Dinah Davis: Building your network. [R&amp;D] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>40</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>VP of R&amp;D at Arctic Wolf Networks Dinah Davis how she arrived in the cybersecurity industry after finding her niche.</itunes:subtitle>
      <itunes:summary>Coming from her love of math, VP of R&amp;D at Arctic Wolf Networks Dinah Davis shares how she arrived in the cybersecurity industry after finding her niche. Dinah recalls how at a time of indecision, a computer course at university and a job with the Canadian government helped to solidify her career direction. Dinah mentions how "security and cryptography specifically was this perfect mix of real world problem solving and mathematics and computer science all combined into one ball of happiness." Networking played a key role in Dinah's journey. She recommends that those interested in joining the field to go for what they believe in. And, we thank Dinah for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Coming from her love of math, VP of R&amp;D at Arctic Wolf Networks Dinah Davis shares how she arrived in the cybersecurity industry after finding her niche. Dinah recalls how at a time of indecision, a computer course at university and a job with the Canadian government helped to solidify her career direction. Dinah mentions how "security and cryptography specifically was this perfect mix of real world problem solving and mathematics and computer science all combined into one ball of happiness." Networking played a key role in Dinah's journey. She recommends that those interested in joining the field to go for what they believe in. And, we thank Dinah for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>385</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5cd3cc78-8342-11eb-bc3b-ab4bb4ed277e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8903716812.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Keeping data confidential with fully homomorphic encryption. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/174/notes</link>
      <description>Guest Dr. Rosario Cammarota from Intel Labs joins us to discuss confidential computing. Confidential computing provides a secure platform for multiple parties to combine, analyze and learn from sensitive data without exposing their data or machine learning algorithms to the other party. This technique goes by several names — multiparty computing, federated learning and privacy-preserving analytics, among them. Confidential computing can enable this type of collaboration while preserving privacy and regulatory compliance.
The research and supporting documents can be found here:

Intel Labs Day 2020: Confidential Computing

Confidential Computing Presentation Slides

Demo video


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Mar 2021 08:00:00 -0000</pubDate>
      <itunes:title>Keeping data confidential with fully homomorphic encryption. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>174</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Dr. Rosario Cammarota from Intel Labs joins us to discuss confidential computing. Confidential computing provides a secure platform for multiple parties to combine, analyze and learn from sensitive data without exposing their data or machine learning algorithms to the other party. This technique goes by several names — multiparty computing, federated learning and privacy-preserving analytics, among them. Confidential computing can enable this type of collaboration while preserving privacy and regulatory compliance.
The research and supporting documents can be found here:

Intel Labs Day 2020: Confidential Computing

Confidential Computing Presentation Slides

Demo video


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Dr. Rosario Cammarota from Intel Labs joins us to discuss confidential computing. Confidential computing provides a secure platform for multiple parties to combine, analyze and learn from sensitive data without exposing their data or machine learning algorithms to the other party. This technique goes by several names — multiparty computing, federated learning and privacy-preserving analytics, among them. Confidential computing can enable this type of collaboration while preserving privacy and regulatory compliance.</p><p>The research and supporting documents can be found here:</p><ul>
<li><a href="https://newsroom.intel.com/press-kits/intel-labs-day-2020/#gs.qivoy1">Intel Labs Day 2020: Confidential Computing</a></li>
<li><a href="https://newsroom.intel.com/wp-content/uploads/sites/11/2020/12/Confidential-Computing-slides-.pdf">Confidential Computing Presentation Slides</a></li>
<li><a href="https://vimeo.com/intelpr/review/486111620/36f4a75b2d">Demo video</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1418</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7946dda0-8342-11eb-bd0e-5fd8ec807a1f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4421636790.mp3?updated=1685113398" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware enters vulnerable Exchange Servers through the backdoor. REvil is out and active. SolarWinds and control systems. Molson Coors responds to a cyber incident.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1288/notes</link>
      <description>Microsoft warns that ransomware operators are exploiting vulnerable Exchange Servers. Threat actors continue to look for unpatched instances of Exchange Server. Johannes Ullrich joins us with his thoughts on the incident. REvil ransomware hits a range of fresh targets. Concerns are raised about the effects of the SolarWinds compromise on embedded devices. Our guest is Sally Carson from Cisco making the case that good design can save cybersecurity. And an unspecified cyber incident shuts down Coors Molson.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/48
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 12 Mar 2021 20:35:00 -0000</pubDate>
      <itunes:title>Ransomware enters vulnerable Exchange Servers through the backdoor. REvil is out and active. SolarWinds and control systems. Molson Coors responds to a cyber incident.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1288</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Microsoft warns that ransomware operators are exploiting vulnerable Exchange Servers. Threat actors continue to look for unpatched instances of Exchange Server. Johannes Ullrich joins us with his thoughts on the incident. REvil ransomware hits a range of fresh targets. Concerns are raised about the effects of the SolarWinds compromise on embedded devices. Our guest is Sally Carson from Cisco making the case that good design can save cybersecurity. And an unspecified cyber incident shuts down Coors Molson.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/48
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft warns that ransomware operators are exploiting vulnerable Exchange Servers. Threat actors continue to look for unpatched instances of Exchange Server. Johannes Ullrich joins us with his thoughts on the incident. REvil ransomware hits a range of fresh targets. Concerns are raised about the effects of the SolarWinds compromise on embedded devices. Our guest is Sally Carson from Cisco making the case that good design can save cybersecurity. And an unspecified cyber incident shuts down Coors Molson.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/48</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1481</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[040dad76-364d-11eb-b082-675192ec5de3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9504578196.mp3?updated=1690232893" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More Exchange Server exploitation, and security advice. Updates on the SolarWinds compromise, criminal TTPs, and the Verkada hack. And news not you, but your friends might be able to use.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1287/notes</link>
      <description>Norway’s parliament is hit with Exchange Server exploitation. CISA and the FBI issue more advice on how to clean up an Exchange Server compromise. CISA hints at more detailed attribution of the SolarWinds compromise “soon,” and US Cyber Command says military networks were successfully defended. Microsoft’s Kevin Magee of exporting cyber talent. Our guest is Hanan Hibshi from Carnegie Mellon University on their picoCTF online hacking competition. Notes on some evolving criminal techniques, an update on the security camera hacktivist incident, and some news you won’t need, but your friends might.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/47
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 11 Mar 2021 21:30:00 -0000</pubDate>
      <itunes:title>More Exchange Server exploitation, and security advice. Updates on the SolarWinds compromise, criminal TTPs, and the Verkada hack. And news not you, but your friends might be able to use.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1287</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Norway’s parliament is hit with Exchange Server exploitation. CISA and the FBI issue more advice on how to clean up an Exchange Server compromise. CISA hints at more detailed attribution of the SolarWinds compromise “soon,” and US Cyber Command says military networks were successfully defended. Microsoft’s Kevin Magee of exporting cyber talent. Our guest is Hanan Hibshi from Carnegie Mellon University on their picoCTF online hacking competition. Notes on some evolving criminal techniques, an update on the security camera hacktivist incident, and some news you won’t need, but your friends might.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/47
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Norway’s parliament is hit with Exchange Server exploitation. CISA and the FBI issue more advice on how to clean up an Exchange Server compromise. CISA hints at more detailed attribution of the SolarWinds compromise “soon,” and US Cyber Command says military networks were successfully defended. Microsoft’s Kevin Magee of exporting cyber talent. Our guest is Hanan Hibshi from Carnegie Mellon University on their picoCTF online hacking competition. Notes on some evolving criminal techniques, an update on the security camera hacktivist incident, and some news you won’t need, but your friends might.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/47</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1535</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[03db7f7c-364d-11eb-b082-4bddd8e4c6b4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2581883864.mp3?updated=1690232881" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patching, with special attention to Hafnium and the rest. Responding to the SolarWinds incident. Hactivists don’t like cameras. Dragnet in the Low Countries. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1286/notes</link>
      <description>Patch Tuesday was a big one this month. Microsoft Exchange Server remains under active attack in the wild, with new threat actors hopping on the opportunity. Russia denies it had anything to do with the SolarWinds incident and says the kinds of US response that the word on the street tells them are under consideration would be nothing more than international crime. Hacktivists strike a blow against cameras and stuff. Joe Carrigan has thoughts on Google’s plans for third party cookies. Our guest is Kelvin Coleman from the National Cyber Security Alliance (NCSA) on how educators can better protect students’ privacy during distance learning sessions. And police in the low countries sweep up more than a hundred cybercrooks.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/46
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 10 Mar 2021 21:15:00 -0000</pubDate>
      <itunes:title>Patching, with special attention to Hafnium and the rest. Responding to the SolarWinds incident. Hactivists don’t like cameras. Dragnet in the Low Countries. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1286</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Patch Tuesday was a big one this month. Microsoft Exchange Server remains under active attack in the wild, with new threat actors hopping on the opportunity. Russia denies it had anything to do with the SolarWinds incident and says the kinds of US response that the word on the street tells them are under consideration would be nothing more than international crime. Hacktivists strike a blow against cameras and stuff. Joe Carrigan has thoughts on Google’s plans for third party cookies. Our guest is Kelvin Coleman from the National Cyber Security Alliance (NCSA) on how educators can better protect students’ privacy during distance learning sessions. And police in the low countries sweep up more than a hundred cybercrooks.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/46
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Patch Tuesday was a big one this month. Microsoft Exchange Server remains under active attack in the wild, with new threat actors hopping on the opportunity. Russia denies it had anything to do with the SolarWinds incident and says the kinds of US response that the word on the street tells them are under consideration would be nothing more than international crime. Hacktivists strike a blow against cameras and stuff. Joe Carrigan has thoughts on Google’s plans for third party cookies. Our guest is Kelvin Coleman from the National Cyber Security Alliance (NCSA) on how educators can better protect students’ privacy during distance learning sessions. And police in the low countries sweep up more than a hundred cybercrooks.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/46</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1549</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[037823be-364d-11eb-b082-87832d3a28f8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6075761325.mp3?updated=1690232852" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dealing with Hafnium’s work against Microsoft Exchange Server and Holiday Bear’s visit to the SolarWinds supply chain. A plea for OSINT, and some wins for the cyber cops. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1285/notes</link>
      <description>CISA urges everyone to take the Microsoft Exchange Server vulnerabilities seriously. The SolarWinds compromise is also going to prove difficult to mop up. The US is said to be preparing a response to Holiday Bear’s SolarWinds compromise (some of that response will be visible, but some will not). A plea for more OSINT. Ben Yelin from UMD CHHS ponders face scanning algorithms in the job application process. Our guest is Sam Crowther from Kasada, asking why are we still talking about bots? And dragnets haul in some cybercrooks.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/45
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Mar 2021 20:40:00 -0000</pubDate>
      <itunes:title>Dealing with Hafnium’s work against Microsoft Exchange Server and Holiday Bear’s visit to the SolarWinds supply chain. A plea for OSINT, and some wins for the cyber cops. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1285</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA urges everyone to take the Microsoft Exchange Server vulnerabilities seriously. The SolarWinds compromise is also going to prove difficult to mop up. The US is said to be preparing a response to Holiday Bear’s SolarWinds compromise (some of that response will be visible, but some will not). A plea for more OSINT. Ben Yelin from UMD CHHS ponders face scanning algorithms in the job application process. Our guest is Sam Crowther from Kasada, asking why are we still talking about bots? And dragnets haul in some cybercrooks.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/45
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA urges everyone to take the Microsoft Exchange Server vulnerabilities seriously. The SolarWinds compromise is also going to prove difficult to mop up. The US is said to be preparing a response to Holiday Bear’s SolarWinds compromise (some of that response will be visible, but some will not). A plea for more OSINT. Ben Yelin from UMD CHHS ponders face scanning algorithms in the job application process. Our guest is Sam Crowther from Kasada, asking why are we still talking about bots? And dragnets haul in some cybercrooks.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/45</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1469</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[03470586-364d-11eb-b082-eb88203993b2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5392745262.mp3?updated=1690232835" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exploitation of Exchange Server spreads rapidly across the globe. The US mulls its response to Russia over the SolarWinds compromise (and to China over Exchange Server hacks).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1284/notes</link>
      <description>Threat actors rush to exploit Exchange Server vulnerabilities before victims get around to patching--it’s like a worldwide fire sale. Rick Howard digs into third party platforms and cloud security. Robert M. Lee from Dragos shares insights on the recent Florida water plant event. The US mulls some form of retaliation against Russia for the SolarWinds supply chain campaign, and it will also need to consider how to respond to China’s operations against Exchange Server. (And another Chinese threat actor may have been exploiting SolarWinds late last year.)
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/44
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 08 Mar 2021 21:15:00 -0000</pubDate>
      <itunes:title>Exploitation of Exchange Server spreads rapidly across the globe. The US mulls its response to Russia over the SolarWinds compromise (and to China over Exchange Server hacks).</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1284</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Threat actors rush to exploit Exchange Server vulnerabilities before victims get around to patching--it’s like a worldwide fire sale. Rick Howard digs into third party platforms and cloud security. Robert M. Lee from Dragos shares insights on the recent Florida water plant event. The US mulls some form of retaliation against Russia for the SolarWinds supply chain campaign, and it will also need to consider how to respond to China’s operations against Exchange Server. (And another Chinese threat actor may have been exploiting SolarWinds late last year.)
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/44
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Threat actors rush to exploit Exchange Server vulnerabilities before victims get around to patching--it’s like a worldwide fire sale. Rick Howard digs into third party platforms and cloud security. Robert M. Lee from Dragos shares insights on the recent Florida water plant event. The US mulls some form of retaliation against Russia for the SolarWinds supply chain campaign, and it will also need to consider how to respond to China’s operations against Exchange Server. (And another Chinese threat actor may have been exploiting SolarWinds late last year.)</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/44</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1558</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[02cb1cb4-364d-11eb-b082-cf18a2558ae1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8245721656.mp3?updated=1690232820" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stephen Hamilton: Getting the mission to the next level. [Military] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/39/notes</link>
      <description>Army Cyber Institute Technical Director and Chief of Staff Colonel Stephen Hamilton takes us on his computer science journey. Fascinated with computers since the second grade, Stephen chose West Point after high school to study computer science. Following graduation he moved into the signal branch as it most closely matched his interest in ham radio as no branch related directly to computing. He was pulled from the motor pool to help with another area's computing needs and then worked his way to teaching computer science at. West Point and US Cyber Command. Stephen recommends coding it first to help realize the nuances, and then code it again. We thank Stephen for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 07 Mar 2021 08:00:00 -0000</pubDate>
      <itunes:title>Stephen Hamilton: Getting the mission to the next level. [Military] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>39</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Army Cyber Institute Technical Director and Chief of Staff Colonel Stephen Hamilton on his computer science journey. </itunes:subtitle>
      <itunes:summary>Army Cyber Institute Technical Director and Chief of Staff Colonel Stephen Hamilton takes us on his computer science journey. Fascinated with computers since the second grade, Stephen chose West Point after high school to study computer science. Following graduation he moved into the signal branch as it most closely matched his interest in ham radio as no branch related directly to computing. He was pulled from the motor pool to help with another area's computing needs and then worked his way to teaching computer science at. West Point and US Cyber Command. Stephen recommends coding it first to help realize the nuances, and then code it again. We thank Stephen for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Army Cyber Institute Technical Director and Chief of Staff Colonel Stephen Hamilton takes us on his computer science journey. Fascinated with computers since the second grade, Stephen chose West Point after high school to study computer science. Following graduation he moved into the signal branch as it most closely matched his interest in ham radio as no branch related directly to computing. He was pulled from the motor pool to help with another area's computing needs and then worked his way to teaching computer science at. West Point and US Cyber Command. Stephen recommends coding it first to help realize the nuances, and then code it again. We thank Stephen for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>353</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cc20abce-7d4c-11eb-8eca-47a0ab874ac3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3835817416.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Diving deep into North Korea's APT37 tool kit. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/173/notes</link>
      <description>Guest Hossein Jazi of Malwarebytes joins us to take a deep dive into North Korea's APT37 (aka ScarCruft, Reaper and Group123) toolkit. On December 7 2020 the Malwarebytes Labs threat team identified a malicious document uploaded to Virus Total which was purporting to be a meeting request likely used to target the government of South Korea. The meeting date mentioned in the document was 23 Jan 2020, which aligns with the document compilation time of 27 Jan 2020, indicating that this attack took place almost a year ago.
The file contains an embedded macro that uses a VBA self decoding technique to decode itself within the memory spaces of Microsoft Office without writing to the disk. It then embeds a variant of the RokRat into Notepad.
Based on the injected payload, the Malwarebytes team believes that this sample is associated with APT37. This North Korean group is also known as ScarCruft, Reaper and Group123 and has been active since at least 2012, primarily targeting victims in South Korea.
The research can be found here:
Retrohunting APT37: North Korean APT used VBA self decode technique to inject RokRat

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Mar 2021 08:00:00 -0000</pubDate>
      <itunes:title>Diving deep into North Korea's APT37 tool kit. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>173</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Hossein Jazi of Malwarebytes joins us to take a deep dive into North Korea's APT37 (aka ScarCruft, Reaper and Group123) toolkit. On December 7 2020 the Malwarebytes Labs threat team identified a malicious document uploaded to Virus Total which was purporting to be a meeting request likely used to target the government of South Korea. The meeting date mentioned in the document was 23 Jan 2020, which aligns with the document compilation time of 27 Jan 2020, indicating that this attack took place almost a year ago.
The file contains an embedded macro that uses a VBA self decoding technique to decode itself within the memory spaces of Microsoft Office without writing to the disk. It then embeds a variant of the RokRat into Notepad.
Based on the injected payload, the Malwarebytes team believes that this sample is associated with APT37. This North Korean group is also known as ScarCruft, Reaper and Group123 and has been active since at least 2012, primarily targeting victims in South Korea.
The research can be found here:
Retrohunting APT37: North Korean APT used VBA self decode technique to inject RokRat

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Hossein Jazi of Malwarebytes joins us to take a deep dive into North Korea's APT37 (aka ScarCruft, Reaper and Group123) toolkit. On December 7 2020 the Malwarebytes Labs threat team identified a malicious document uploaded to Virus Total which was purporting to be a meeting request likely used to target the government of South Korea. The meeting date mentioned in the document was 23 Jan 2020, which aligns with the document compilation time of 27 Jan 2020, indicating that this attack took place almost a year ago.</p><p>The file contains an embedded macro that uses a VBA self decoding technique to decode itself within the memory spaces of Microsoft Office without writing to the disk. It then embeds a variant of the RokRat into Notepad.</p><p>Based on the injected payload, the Malwarebytes team believes that this sample is associated with APT37. This North Korean group is also known as ScarCruft, Reaper and Group123 and has been active since at least 2012, primarily targeting victims in South Korea.</p><p>The research can be found here:</p><ul><li><a href="https://blog.malwarebytes.com/threat-analysis/2021/01/retrohunting-apt37-north-korean-apt-used-vba-self-decode-technique-to-inject-rokrat/">Retrohunting APT37: North Korean APT used VBA self decode technique to inject RokRat</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1098</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f5919868-7d44-11eb-a57f-0bb14c08f6ec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6131760235.mp3?updated=1685109247" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SUNSHUTTLE backdoor described. What the Exchange Server campaign was after. Misconfigured clouds. Airline IT service provided attacked. Criminal-on-criminal crime. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1283/notes</link>
      <description>A new second-stage backdoor has been found in a SolarWinds compromise victim. Those exploiting the now-patched Exchange Server zero days seem to have done so to establish a foothold in the targeted systems. India continues to investigate a Chinese cyber threat to its infrastructure. Misconfigured clouds leak mobile app data. A major airline IT provider sustains a cyber attack. Dinah David helps us prevent account takeover attacks. Our guest is Troy Hunt from NordVPN. And criminals hack other criminals.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/10/43
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 05 Mar 2021 21:35:00 -0000</pubDate>
      <itunes:title>SUNSHUTTLE backdoor described. What the Exchange Server campaign was after. Misconfigured clouds. Airline IT service provided attacked. Criminal-on-criminal crime. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1283</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A new second-stage backdoor has been found in a SolarWinds compromise victim. Those exploiting the now-patched Exchange Server zero days seem to have done so to establish a foothold in the targeted systems. India continues to investigate a Chinese cyber threat to its infrastructure. Misconfigured clouds leak mobile app data. A major airline IT provider sustains a cyber attack. Dinah David helps us prevent account takeover attacks. Our guest is Troy Hunt from NordVPN. And criminals hack other criminals.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/10/43
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A new second-stage backdoor has been found in a SolarWinds compromise victim. Those exploiting the now-patched Exchange Server zero days seem to have done so to establish a foothold in the targeted systems. India continues to investigate a Chinese cyber threat to its infrastructure. Misconfigured clouds leak mobile app data. A major airline IT provider sustains a cyber attack. Dinah David helps us prevent account takeover attacks. Our guest is Troy Hunt from NordVPN. And criminals hack other criminals.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><br></p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/43</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1683</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[03fc9b1c-364d-11eb-b082-4bc0c7aa94ef]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7703625837.mp3?updated=1614979309" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Happy Slam the Scam Day. Indian authorities continue to investigate grid incidents. CISA tells US Federal agencies to clean up Exchange bugs by noon tomorrow. Supply chain compromise.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1282/notes</link>
      <description>Indian authorities say October’s Mumbai blackout was “human error,” not cybersabotage. CISA directs US civilian agencies to clean up Microsoft Exchange on-premise vulnerabilities. More effects of the Accellion FTA supply chain compromise. Some trends in social engineering. Andrea Little Limbago brings us up to date on the RSA supply chain sandbox. Our guest is Brittany Allen from Sift on a new Telegram fraud ring. And happy National Slam the Scam Day.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/42
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 04 Mar 2021 20:15:00 -0000</pubDate>
      <itunes:title>Happy Slam the Scam Day. Indian authorities continue to investigate grid incidents. CISA tells US Federal agencies to clean up Exchange bugs by noon tomorrow. Supply chain compromise.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1282</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Indian authorities say October’s Mumbai blackout was “human error,” not cybersabotage. CISA directs US civilian agencies to clean up Microsoft Exchange on-premise vulnerabilities. More effects of the Accellion FTA supply chain compromise. Some trends in social engineering. Andrea Little Limbago brings us up to date on the RSA supply chain sandbox. Our guest is Brittany Allen from Sift on a new Telegram fraud ring. And happy National Slam the Scam Day.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/42
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Indian authorities say October’s Mumbai blackout was “human error,” not cybersabotage. CISA directs US civilian agencies to clean up Microsoft Exchange on-premise vulnerabilities. More effects of the Accellion FTA supply chain compromise. Some trends in social engineering. Andrea Little Limbago brings us up to date on the RSA supply chain sandbox. Our guest is Brittany Allen from Sift on a new Telegram fraud ring. And happy National Slam the Scam Day.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/42</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1330</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[03ec5e32-364d-11eb-b082-6bf717214fae]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7610008640.mp3?updated=1614962193" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>RedEcho under investigation (amid reassurances). Stopping Operation Exchange Marauder. Containing Ursnif. Cyber proliferation. And another round in the Crypto Wars. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1281/notes</link>
      <description>India continues to investigate the possibility of RedEcho cybersabotage of its power distribution system, but says any hack was stopped and contained. Microsoft issues an out-of-band patch against a Chinese-run “Operation Exchange Marauder.” The financial sector works to contain an Ursnif outbreak. CISA issues ICS security advisories. Myanmar and the difficulty of stopping cyber proliferation. Joe Carrigan looks at CNAME cloaking. Our guest is author Neil Daswani from Stanford University’s Advanced Security Certification Program, on his upcoming book Big Breaches - Cybersecurity Lessons for Everyone. And another round in the Crypto Wars seems ready to start.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/41
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 03 Mar 2021 20:35:00 -0000</pubDate>
      <itunes:title>RedEcho under investigation (amid reassurances). Stopping Operation Exchange Marauder. Containing Ursnif. Cyber proliferation. And another round in the Crypto Wars. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1281</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>India continues to investigate the possibility of RedEcho cybersabotage of its power distribution system, but says any hack was stopped and contained. Microsoft issues an out-of-band patch against a Chinese-run “Operation Exchange Marauder.” The financial sector works to contain an Ursnif outbreak. CISA issues ICS security advisories. Myanmar and the difficulty of stopping cyber proliferation. Joe Carrigan looks at CNAME cloaking. Our guest is author Neil Daswani from Stanford University’s Advanced Security Certification Program, on his upcoming book Big Breaches - Cybersecurity Lessons for Everyone. And another round in the Crypto Wars seems ready to start.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/41
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>India continues to investigate the possibility of RedEcho cybersabotage of its power distribution system, but says any hack was stopped and contained. Microsoft issues an out-of-band patch against a Chinese-run “Operation Exchange Marauder.” The financial sector works to contain an Ursnif outbreak. CISA issues ICS security advisories. Myanmar and the difficulty of stopping cyber proliferation. Joe Carrigan looks at CNAME cloaking. Our guest is author Neil Daswani from Stanford University’s Advanced Security Certification Program, on his upcoming book Big Breaches - Cybersecurity Lessons for Everyone. And another round in the Crypto Wars seems ready to start.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/41</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1407</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[03681884-364d-11eb-b082-03d7241b7388]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3178603490.mp3?updated=1614803210" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>India investigates the possibility of cybersabotage. Walls are opaque to defenders, too. Recommendations for cyber nonproliferation. SolarWinds updates (with an SEC appearance).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1280/notes</link>
      <description>Indian authorities continue to investigate the possibility that Mumbai’s power grid was hacked last October. Apple’s walled garden’s security can inhibit detection of threats that manage to get inside. An Atlantic Council report recommends international action against access-as-a-service brokers to stall proliferation of cyber offensive tools. Ben Yelin has the story of legislators asking the military why they’re so interested in apps serving Muslims. Our guest is John Grange from OppsCompass with insights on the top cloud security mistakes organizations make. Updates on the SolarWinds incident (including an SEC probe into who knew what when).
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/40
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Mar 2021 20:10:00 -0000</pubDate>
      <itunes:title>India investigates the possibility of cybersabotage. Walls are opaque to defenders, too. Recommendations for cyber nonproliferation. SolarWinds updates (with an SEC appearance).</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1280</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Indian authorities continue to investigate the possibility that Mumbai’s power grid was hacked last October. Apple’s walled garden’s security can inhibit detection of threats that manage to get inside. An Atlantic Council report recommends international action against access-as-a-service brokers to stall proliferation of cyber offensive tools. Ben Yelin has the story of legislators asking the military why they’re so interested in apps serving Muslims. Our guest is John Grange from OppsCompass with insights on the top cloud security mistakes organizations make. Updates on the SolarWinds incident (including an SEC probe into who knew what when).
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/40
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Indian authorities continue to investigate the possibility that Mumbai’s power grid was hacked last October. Apple’s walled garden’s security can inhibit detection of threats that manage to get inside. An Atlantic Council report recommends international action against access-as-a-service brokers to stall proliferation of cyber offensive tools. Ben Yelin has the story of legislators asking the military why they’re so interested in apps serving Muslims. Our guest is John Grange from OppsCompass with insights on the top cloud security mistakes organizations make. Updates on the SolarWinds incident (including an SEC probe into who knew what when).</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/40</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[03578a14-364d-11eb-b082-2f88557fc0c8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8451608858.mp3?updated=1614714456" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>“RedEcho’s”activity in India’s power grid is described. US report on Khashoggi murder declassified  SolarWinds compromise inquiry updates. Ill-intentioned SEO. President’s Cup winner announced.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1279/notes</link>
      <description>Chinese cyber engagement with Indian critical infrastructure is reported: the objective isn’t benign from India’s point of view, but exactly what the objective is, specifically, remains a matter of speculation. The US Governemnt declassifies its report on the murder of Saudi journalist Jamal Khashoggi. The SolarWinds supply chain compromise remains under investigation, with an intern making a special appearance. Maligh search engine optimizations. Rick Howard shares hash table opinions on Google Cloud. Josh Ray from Accenture on Cybercrime and the Cloud. And congratulations to the winner’s of CISA’s President’s Cup.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/39
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 01 Mar 2021 21:25:00 -0000</pubDate>
      <itunes:title>“RedEcho’s”activity in India’s power grid is described. US report on Khashoggi murder declassified  SolarWinds compromise inquiry updates. Ill-intentioned SEO. President’s Cup winner announced.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1279</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Chinese cyber engagement with Indian critical infrastructure is reported: the objective isn’t benign from India’s point of view, but exactly what the objective is, specifically, remains a matter of speculation. The US Governemnt declassifies its report on the murder of Saudi journalist Jamal Khashoggi. The SolarWinds supply chain compromise remains under investigation, with an intern making a special appearance. Maligh search engine optimizations. Rick Howard shares hash table opinions on Google Cloud. Josh Ray from Accenture on Cybercrime and the Cloud. And congratulations to the winner’s of CISA’s President’s Cup.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/39
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chinese cyber engagement with Indian critical infrastructure is reported: the objective isn’t benign from India’s point of view, but exactly what the objective is, specifically, remains a matter of speculation. The US Governemnt declassifies its report on the murder of Saudi journalist Jamal Khashoggi. The SolarWinds supply chain compromise remains under investigation, with an intern making a special appearance. Maligh search engine optimizations. Rick Howard shares hash table opinions on Google Cloud. Josh Ray from Accenture on Cybercrime and the Cloud. And congratulations to the winner’s of CISA’s President’s Cup.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/39</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1410</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[02ba1b6c-364d-11eb-b082-63fd34f7e2c9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4206617184.mp3?updated=1614633135" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Aarti Borkar: Make your own choices. [Product} [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/38/notes</link>
      <description>Head of Product for IBM Security Aarti Borkar shares her journey which included going after her lifelong love of math rather than following in her parents' footsteps in the medical field. In following her passions, Aarti found herself studying computer engineering and computer science, and upon taking a pause from her studies, she found a niche working at IBM in a mix of databases and networking. In her current position, Aarti describes her favorite discussion topics very often involve being around the use of AI for converting security into predictive domains. Aarti reminds us that you should pause and see if you are on the right path. Staying on a path just because you started there can be a bad idea. And, we thank Aarti for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 28 Feb 2021 08:00:00 -0000</pubDate>
      <itunes:title>Aarti Borkar: Make your own choices. [Product} [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>38</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Head of Product for IBM Security Aarti Borkar shares her journey which included her lifelong love of math and following her passions. </itunes:subtitle>
      <itunes:summary>Head of Product for IBM Security Aarti Borkar shares her journey which included going after her lifelong love of math rather than following in her parents' footsteps in the medical field. In following her passions, Aarti found herself studying computer engineering and computer science, and upon taking a pause from her studies, she found a niche working at IBM in a mix of databases and networking. In her current position, Aarti describes her favorite discussion topics very often involve being around the use of AI for converting security into predictive domains. Aarti reminds us that you should pause and see if you are on the right path. Staying on a path just because you started there can be a bad idea. And, we thank Aarti for sharing her story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Head of Product for IBM Security Aarti Borkar shares her journey which included going after her lifelong love of math rather than following in her parents' footsteps in the medical field. In following her passions, Aarti found herself studying computer engineering and computer science, and upon taking a pause from her studies, she found a niche working at IBM in a mix of databases and networking. In her current position, Aarti describes her favorite discussion topics very often involve being around the use of AI for converting security into predictive domains. Aarti reminds us that you should pause and see if you are on the right path. Staying on a path just because you started there can be a bad idea. And, we thank Aarti for sharing her story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>323</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[46eb8cba-784e-11eb-8abf-eb90a8734c2c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1790985365.mp3?updated=1614355736" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shining a light on China's cyber underground. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/172/notes</link>
      <description>Guest Maurits Lucas from Intel471 joins us to discuss his team's research into cybercrime in China. Data from Intel 471 show that the Chinese cybercrime underground proliferates through use of common methods or platforms, but behaves differently in large part due to the caution that actors take with regard to their identity. While the average citizen must follow the heavy handed nature of the government’s surveillance of cyberspace, Chinese threat actors take special precautions to protect their forums, TTPs and themselves. This leads to the Chinese cybercrime underground being disorderly when compared to others, particularly Russia, which tend to be much more organized.
The research can be found here:
No pandas, just people: The current state of China’s cybercrime underground

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Feb 2021 08:00:00 -0000</pubDate>
      <itunes:title>Shining a light on China's cyber underground. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>172</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Maurits Lucas from Intel471 joins us to discuss his team's research into cybercrime in China. Data from Intel 471 show that the Chinese cybercrime underground proliferates through use of common methods or platforms, but behaves differently in large part due to the caution that actors take with regard to their identity. While the average citizen must follow the heavy handed nature of the government’s surveillance of cyberspace, Chinese threat actors take special precautions to protect their forums, TTPs and themselves. This leads to the Chinese cybercrime underground being disorderly when compared to others, particularly Russia, which tend to be much more organized.
The research can be found here:
No pandas, just people: The current state of China’s cybercrime underground

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Maurits Lucas from Intel471 joins us to discuss his team's research into cybercrime in China. Data from Intel 471 show that the Chinese cybercrime underground proliferates through use of common methods or platforms, but behaves differently in large part due to the caution that actors take with regard to their identity. While the average citizen must follow the heavy handed nature of the government’s surveillance of cyberspace, Chinese threat actors take special precautions to protect their forums, TTPs and themselves. This leads to the Chinese cybercrime underground being disorderly when compared to others, particularly Russia, which tend to be much more organized.</p><p>The research can be found here:</p><ul><li><a href="https://intel471.com/blog/china-cybercrime-undergrond-deepmix-tea-horse-road-great-firewall/">No pandas, just people: The current state of China’s cybercrime underground</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1436</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[27252be8-784e-11eb-8fd2-03be82d54f13]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7574449073.mp3?updated=1685109084" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Oxford lab studying the COVID-19 virus is hacked. Zoom impersonation campaign. Senators would’ve liked to have heard from Amazon about Solorigate. NSA likes zero trust. NIST IoT guidelines. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1278/notes</link>
      <description>Oxford biology lab hacked. A Zoom impersonation phishing campaign afflicts targets in the EU. Senators disappointed in Amazon’s decision not to appear at this week’s SolarWinds hearing. NSA advocates adopting zero trust principles. CISA issues alerts on industrial control systems. The US Department of Homeland Security describes increases to its cybersecurity grant programs. Dinah Davis examines how healthcare is being targeted by ransomware. Our guest is Michael Hamilton from CI Security on the Public Infrastructure Security Cyber Education System. And NIST’s draft IoT security standards are still open for comment.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/38
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 26 Feb 2021 20:25:00 -0000</pubDate>
      <itunes:title>Oxford lab studying the COVID-19 virus is hacked. Zoom impersonation campaign. Senators would’ve liked to have heard from Amazon about Solorigate. NSA likes zero trust. NIST IoT guidelines. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1278</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Oxford biology lab hacked. A Zoom impersonation phishing campaign afflicts targets in the EU. Senators disappointed in Amazon’s decision not to appear at this week’s SolarWinds hearing. NSA advocates adopting zero trust principles. CISA issues alerts on industrial control systems. The US Department of Homeland Security describes increases to its cybersecurity grant programs. Dinah Davis examines how healthcare is being targeted by ransomware. Our guest is Michael Hamilton from CI Security on the Public Infrastructure Security Cyber Education System. And NIST’s draft IoT security standards are still open for comment.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/38
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Oxford biology lab hacked. A Zoom impersonation phishing campaign afflicts targets in the EU. Senators disappointed in Amazon’s decision not to appear at this week’s SolarWinds hearing. NSA advocates adopting zero trust principles. CISA issues alerts on industrial control systems. The US Department of Homeland Security describes increases to its cybersecurity grant programs. Dinah Davis examines how healthcare is being targeted by ransomware. Our guest is Michael Hamilton from CI Security on the Public Infrastructure Security Cyber Education System. And NIST’s draft IoT security standards are still open for comment.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/38</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1665</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0191abb0-364d-11eb-b082-8b8fc6a50c12]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7799732993.mp3?updated=1690230817" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>PLA spyware keeps Tibetans under surveillance. Cyber conflict between Ukraine and Russia, some conventionally criminal, other state-directed. US Executive Order addresses supply chain resilience.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1277/notes</link>
      <description>FriarFox is a bad browser extension, and it’s interested in Tibet. Ukraine accuses Russia of a software supply chain compromise (maybe Moscow hired Gamaredon to do the work). Egregor hoods who escaped recent Franco-Ukrainian sweeps are thought responsible for DDoS against Kiev security agencies over the weekend. A look at Babuk, a new ransomware-as-a-service entry. VMware servers are patched. Verizon’s Chris Novak looks at the 2021 threat landscape. Our guest is Andrew Hammond from the International Spy Museum. And a US Executive Order on supply chain security.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/37
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 25 Feb 2021 20:25:00 -0000</pubDate>
      <itunes:title>PLA spyware keeps Tibetans under surveillance. Cyber conflict between Ukraine and Russia, some conventionally criminal, other state-directed. US Executive Order addresses supply chain resilience.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1277</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>FriarFox is a bad browser extension, and it’s interested in Tibet. Ukraine accuses Russia of a software supply chain compromise (maybe Moscow hired Gamaredon to do the work). Egregor hoods who escaped recent Franco-Ukrainian sweeps are thought responsible for DDoS against Kiev security agencies over the weekend. A look at Babuk, a new ransomware-as-a-service entry. VMware servers are patched. Verizon’s Chris Novak looks at the 2021 threat landscape. Our guest is Andrew Hammond from the International Spy Museum. And a US Executive Order on supply chain security.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/37
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>FriarFox is a bad browser extension, and it’s interested in Tibet. Ukraine accuses Russia of a software supply chain compromise (maybe Moscow hired Gamaredon to do the work). Egregor hoods who escaped recent Franco-Ukrainian sweeps are thought responsible for DDoS against Kiev security agencies over the weekend. A look at Babuk, a new ransomware-as-a-service entry. VMware servers are patched. Verizon’s Chris Novak looks at the 2021 threat landscape. Our guest is Andrew Hammond from the International Spy Museum. And a US Executive Order on supply chain security.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/37</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1478</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01a3be5e-364d-11eb-b082-fb7cf52cd9f9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1125636836.mp3?updated=1690230721" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Accellion FTA compromise spreads. Ocean Lotus is back. LazyScripter seems to represent a new threat group. Notes from the SolarWinds hearings. New ICS threat actors. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1276/notes</link>
      <description>As more organizations are affected by the Accellion FTA compromise, authorities issue some recommendations for risk mitigation. Ocean Lotus is back, and active against Vietnamese domestic targets. LazyScripter is phishing with COVID and air travel lures. SolarWinds hearings include threat information, exculpation, and calls for more liability protection. Turkey Dog is after bank accounts. Joe Carrigan ponders the ease with which new security flaws are discovered. Rick Howard speaks with our guest Michael Dick from C2A Security on Automotive Security. And some new ICS threat groups are identified.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/36
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 24 Feb 2021 21:00:00 -0000</pubDate>
      <itunes:title>Accellion FTA compromise spreads. Ocean Lotus is back. LazyScripter seems to represent a new threat group. Notes from the SolarWinds hearings. New ICS threat actors. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1276</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>As more organizations are affected by the Accellion FTA compromise, authorities issue some recommendations for risk mitigation. Ocean Lotus is back, and active against Vietnamese domestic targets. LazyScripter is phishing with COVID and air travel lures. SolarWinds hearings include threat information, exculpation, and calls for more liability protection. Turkey Dog is after bank accounts. Joe Carrigan ponders the ease with which new security flaws are discovered. Rick Howard speaks with our guest Michael Dick from C2A Security on Automotive Security. And some new ICS threat groups are identified.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/36
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As more organizations are affected by the Accellion FTA compromise, authorities issue some recommendations for risk mitigation. Ocean Lotus is back, and active against Vietnamese domestic targets. LazyScripter is phishing with COVID and air travel lures. SolarWinds hearings include threat information, exculpation, and calls for more liability protection. Turkey Dog is after bank accounts. Joe Carrigan ponders the ease with which new security flaws are discovered. Rick Howard speaks with our guest Michael Dick from C2A Security on Automotive Security. And some new ICS threat groups are identified.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/36</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1559</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[02185746-364d-11eb-b082-bf91def70208]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7994392845.mp3?updated=1690230678" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DDoS in hybrid war. Accellion compromise attributed. Initial access brokers. Agile C2 for botnets. US Senate’s SolarWinds hearing. US DHS cyber strategy. Shiny new phishbait. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1275/notes</link>
      <description>Ukrainian security services complain of DDoS from Russia. The Accellion compromise is attributed to an extortion gang. Digital Shadow tracks the rise of initial access brokers, new middlemen in the criminal-to-criminal market. A botmaster uses an agile C2 infrastructure to avoid takedowns. IT executives to appear at US Senate hearings on Solorigate. US DHS talks up its cyber strategies. Ben Yelin comments on the latest court ruling on device searches at the border. Rick Howard speaks with Ariel Assaraf from Coralogix on SOAR and SIEM. And don’t be deceived by bogus FedEx and DHL phishbait.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/35
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Feb 2021 20:20:00 -0000</pubDate>
      <itunes:title>DDoS in hybrid war. Accellion compromise attributed. Initial access brokers. Agile C2 for botnets. US Senate’s SolarWinds hearing. US DHS cyber strategy. Shiny new phishbait. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1275</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ukrainian security services complain of DDoS from Russia. The Accellion compromise is attributed to an extortion gang. Digital Shadow tracks the rise of initial access brokers, new middlemen in the criminal-to-criminal market. A botmaster uses an agile C2 infrastructure to avoid takedowns. IT executives to appear at US Senate hearings on Solorigate. US DHS talks up its cyber strategies. Ben Yelin comments on the latest court ruling on device searches at the border. Rick Howard speaks with Ariel Assaraf from Coralogix on SOAR and SIEM. And don’t be deceived by bogus FedEx and DHL phishbait.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/35
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ukrainian security services complain of DDoS from Russia. The Accellion compromise is attributed to an extortion gang. Digital Shadow tracks the rise of initial access brokers, new middlemen in the criminal-to-criminal market. A botmaster uses an agile C2 infrastructure to avoid takedowns. IT executives to appear at US Senate hearings on Solorigate. US DHS talks up its cyber strategies. Ben Yelin comments on the latest court ruling on device searches at the border. Rick Howard speaks with Ariel Assaraf from Coralogix on SOAR and SIEM. And don’t be deceived by bogus FedEx and DHL phishbait.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/35</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1446</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[02291720-364d-11eb-b082-577bc4108b97]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7208461305.mp3?updated=1690230637" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Facebook takes down Myanmar military page. Chinese cyberespionage and cloned Equation Group tools. Supply chain compromises. Threat trends.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1274/notes</link>
      <description>Facebook takes down Myanmar junta’s main page. APT31 clones Equation Group tools. Silver Sparrow’s up to...something or other. Bogus Flash Player update serves fake news and malware. Effects of supply chain compromises spread. Clubhouse’s privacy issues. VC firm breached. CrowdStrike releases its annual threat report. We welcome Josh Ray from Accenture security to our show. Rick Howard examines Google’s cloud services. And a Maryland school concludes its annual cyber challenge.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/34
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 22 Feb 2021 20:50:00 -0000</pubDate>
      <itunes:title>Facebook takes down Myanmar military page. Chinese cyberespionage and cloned Equation Group tools. Supply chain compromises. Threat trends.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1274</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Facebook takes down Myanmar junta’s main page. APT31 clones Equation Group tools. Silver Sparrow’s up to...something or other. Bogus Flash Player update serves fake news and malware. Effects of supply chain compromises spread. Clubhouse’s privacy issues. VC firm breached. CrowdStrike releases its annual threat report. We welcome Josh Ray from Accenture security to our show. Rick Howard examines Google’s cloud services. And a Maryland school concludes its annual cyber challenge.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/34
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Facebook takes down Myanmar junta’s main page. APT31 clones Equation Group tools. Silver Sparrow’s up to...something or other. Bogus Flash Player update serves fake news and malware. Effects of supply chain compromises spread. Clubhouse’s privacy issues. VC firm breached. CrowdStrike releases its annual threat report. We welcome Josh Ray from Accenture security to our show. Rick Howard examines Google’s cloud services. And a Maryland school concludes its annual cyber challenge.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/34</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1429</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[02a5c9a0-364d-11eb-b082-576b17187108]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3851965571.mp3?updated=1690230624" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Billy Wilson: Translating language skills to technical skills. [HPC] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/37/notes</link>
      <description>High Performance Computing Systems Administrator at Brigham Young University Billy Wilson tells his cybersecurity career story translating language skills to technical skills. According to Billy's employer, moving to a technical position at his alma mater occurred because Billy showed this potential and a thirst for learning. He is currently pursuing his master's degree from SANS Technology Institute for Information Security Engineering while working to secure BYU's data for their computationally-intensive research. Billy notes that not everyone has one overarching passion which gives him variety in his work. And, we thank Billy for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 21 Feb 2021 08:00:00 -0000</pubDate>
      <itunes:title>Billy Wilson: Translating language skills to technical skills. [HPC] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>37</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>High Performance Computing Systems Administrator at Brigham Young University Billy Wilson tells his cybersecurity career story. </itunes:subtitle>
      <itunes:summary>High Performance Computing Systems Administrator at Brigham Young University Billy Wilson tells his cybersecurity career story translating language skills to technical skills. According to Billy's employer, moving to a technical position at his alma mater occurred because Billy showed this potential and a thirst for learning. He is currently pursuing his master's degree from SANS Technology Institute for Information Security Engineering while working to secure BYU's data for their computationally-intensive research. Billy notes that not everyone has one overarching passion which gives him variety in his work. And, we thank Billy for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>High Performance Computing Systems Administrator at Brigham Young University Billy Wilson tells his cybersecurity career story translating language skills to technical skills. According to Billy's employer, moving to a technical position at his alma mater occurred because Billy showed this potential and a thirst for learning. He is currently pursuing his master's degree from SANS Technology Institute for Information Security Engineering while working to secure BYU's data for their computationally-intensive research. Billy notes that not everyone has one overarching passion which gives him variety in his work. And, we thank Billy for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>322</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[31647e34-72f3-11eb-8ec9-675f6340d84a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3913989535.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Attackers (ab)using Google Chrome. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/171/notes</link>
      <description>Guest Bojan Zdrnja of Infigo IS and a certified instructor at SANS Institute shares an incident he discovered where attackers were using a pretty novel way of exfiltrating data and using that channel for C&amp;C communication. The code that was acquired was only partially recovered, but enough to indicate powerful features that the attackers were (ab)using in Google Chrome. The basis for this attack were malicious extensions that the attacker dropped on the compromised system.
The research can be found here:
Abusing Google Chrome extension syncing for data exfiltration and C&amp;C

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Feb 2021 08:00:00 -0000</pubDate>
      <itunes:title>Attackers (ab)using Google Chrome. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>171</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Bojan Zdrnja of Infigo IS and a certified instructor at SANS Institute shares an incident he discovered where attackers were using a pretty novel way of exfiltrating data and using that channel for C&amp;C communication. The code that was acquired was only partially recovered, but enough to indicate powerful features that the attackers were (ab)using in Google Chrome. The basis for this attack were malicious extensions that the attacker dropped on the compromised system.
The research can be found here:
Abusing Google Chrome extension syncing for data exfiltration and C&amp;C

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Bojan Zdrnja of Infigo IS and a certified instructor at SANS Institute shares an incident he discovered where attackers were using a pretty novel way of exfiltrating data and using that channel for C&amp;C communication. The code that was acquired was only partially recovered, but enough to indicate powerful features that the attackers were (ab)using in Google Chrome. The basis for this attack were malicious extensions that the attacker dropped on the compromised system.</p><p>The research can be found here:</p><ul><li><a href="https://isc.sans.edu/forums/diary/Abusing+Google+Chrome+extension+syncing+for+data+exfiltration+and+CC/27066/">Abusing Google Chrome extension syncing for data exfiltration and C&amp;C</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1172</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[50192a3c-72f3-11eb-8f7f-4b7ec2af4b7f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1016797684.mp3?updated=1685109067" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mopping up Solorigate. Tehran’s Lightning and Thunder in Amsterdam. The view from Talinn. Malware designed for Apple’s new chips. Lessons from the ice, and how hackers broke bad. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1273/notes</link>
      <description>Microsoft wraps up its internal investigation of Solorigate, which the US Government continues to grapple with, and which has had some effect in Norway. An apparent Iranian APT has been hosting its command-and-control in two Netherlands data centers. Estonia’s annual intelligence report describes Russian and Chinese ambitions in cyberspace. Threat actors are hard at work against Apple’s new processors. Kevin Magee on the Canadian National Cyber Threat Assessment for 2020. Our guest is Mark Testoni from SAP National Security Services on the Biden administration’s first 100 days. Plus, lessons from the ice, and how hackers became cybercriminals.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/33
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 19 Feb 2021 20:30:00 -0000</pubDate>
      <itunes:title>Mopping up Solorigate. Tehran’s Lightning and Thunder in Amsterdam. The view from Talinn. Malware designed for Apple’s new chips. Lessons from the ice, and how hackers broke bad. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1273</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Microsoft wraps up its internal investigation of Solorigate, which the US Government continues to grapple with, and which has had some effect in Norway. An apparent Iranian APT has been hosting its command-and-control in two Netherlands data centers. Estonia’s annual intelligence report describes Russian and Chinese ambitions in cyberspace. Threat actors are hard at work against Apple’s new processors. Kevin Magee on the Canadian National Cyber Threat Assessment for 2020. Our guest is Mark Testoni from SAP National Security Services on the Biden administration’s first 100 days. Plus, lessons from the ice, and how hackers became cybercriminals.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/33
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft wraps up its internal investigation of Solorigate, which the US Government continues to grapple with, and which has had some effect in Norway. An apparent Iranian APT has been hosting its command-and-control in two Netherlands data centers. Estonia’s annual intelligence report describes Russian and Chinese ambitions in cyberspace. Threat actors are hard at work against Apple’s new processors. Kevin Magee on the Canadian National Cyber Threat Assessment for 2020. Our guest is Mark Testoni from SAP National Security Services on the Biden administration’s first 100 days. Plus, lessons from the ice, and how hackers became cybercriminals.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/33</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1537</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0181054e-364d-11eb-b082-43bc00fada63]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9411863157.mp3?updated=1690230600" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The WatchDog Monero cryptojacking operation. “A criminal syndicate with a flag.” US Senator asks FBI, EPA for a report on water system cybersecurity. Cybercrooks placed on notice. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1272/notes</link>
      <description>Watch out for the WatchDog Monero cryptojacking operation. The US Justice Department describes North Korea as “a criminal syndicate with a flag.” CISA outlines the DPRK malware that figures in the AppleJeus toolkit. The Chair of the US Senate Intelligence Committee asks the FBI and EPA for a report on the Oldsmar water system cybersabotage incident. Egregor takes a hit from French and Ukrainian police. Dinah Davis has advice on getting buy-in from the board. Our guest is Bentsi Ben Atar from Sepio Systems on hardware attacks. And the Netherlands Police advise cybercriminals to just move on.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/32
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 18 Feb 2021 20:40:00 -0000</pubDate>
      <itunes:title>The WatchDog Monero cryptojacking operation. “A criminal syndicate with a flag.” US Senator asks FBI, EPA for a report on water system cybersecurity. Cybercrooks placed on notice. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1272</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Watch out for the WatchDog Monero cryptojacking operation. The US Justice Department describes North Korea as “a criminal syndicate with a flag.” CISA outlines the DPRK malware that figures in the AppleJeus toolkit. The Chair of the US Senate Intelligence Committee asks the FBI and EPA for a report on the Oldsmar water system cybersabotage incident. Egregor takes a hit from French and Ukrainian police. Dinah Davis has advice on getting buy-in from the board. Our guest is Bentsi Ben Atar from Sepio Systems on hardware attacks. And the Netherlands Police advise cybercriminals to just move on.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/32
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Watch out for the WatchDog Monero cryptojacking operation. The US Justice Department describes North Korea as “a criminal syndicate with a flag.” CISA outlines the DPRK malware that figures in the AppleJeus toolkit. The Chair of the US Senate Intelligence Committee asks the FBI and EPA for a report on the Oldsmar water system cybersabotage incident. Egregor takes a hit from French and Ukrainian police. Dinah Davis has advice on getting buy-in from the board. Our guest is Bentsi Ben Atar from Sepio Systems on hardware attacks. And the Netherlands Police advise cybercriminals to just move on.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/32</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1433</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01b49800-364d-11eb-b082-d7f96162de01]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1878759811.mp3?updated=1690230581" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US warns of DPRK threat to cryptocurrency holders, and indicts four on conspiracy charges. Centreon says Sandworm affected unsupported open-source tools. Big Hack skepticism. Patch notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1271/notes</link>
      <description>High Bitcoin valuation draws the attention of cybercriminals, and a number of those criminals work for Mr. Kim, of Pyongyang. Alleged criminals, we should say. Centreon offers an update of its investigation of the Sandworm incident ANSSI uncovered. Reports of the Big Hack are received with caution. Patches applied, pulled, and replaced. Joe Carrigan describes a legal dustup between Proofpoint and Facebook over lookalike domains. Our guest is Sinan Eren from Barracuda Networks on their state of cloud networking report. And Florida’s water system cybersabotage provides a good reminder to stay away from unsupported software.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/30
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 17 Feb 2021 20:30:00 -0000</pubDate>
      <itunes:title>US warns of DPRK threat to cryptocurrency holders, and indicts four on conspiracy charges. Centreon says Sandworm affected unsupported open-source tools. Big Hack skepticism. Patch notes.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1271</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>High Bitcoin valuation draws the attention of cybercriminals, and a number of those criminals work for Mr. Kim, of Pyongyang. Alleged criminals, we should say. Centreon offers an update of its investigation of the Sandworm incident ANSSI uncovered. Reports of the Big Hack are received with caution. Patches applied, pulled, and replaced. Joe Carrigan describes a legal dustup between Proofpoint and Facebook over lookalike domains. Our guest is Sinan Eren from Barracuda Networks on their state of cloud networking report. And Florida’s water system cybersabotage provides a good reminder to stay away from unsupported software.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/30
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>High Bitcoin valuation draws the attention of cybercriminals, and a number of those criminals work for Mr. Kim, of Pyongyang. Alleged criminals, we should say. Centreon offers an update of its investigation of the Sandworm incident ANSSI uncovered. Reports of the Big Hack are received with caution. Patches applied, pulled, and replaced. Joe Carrigan describes a legal dustup between Proofpoint and Facebook over lookalike domains. Our guest is Sinan Eren from Barracuda Networks on their state of cloud networking report. And Florida’s water system cybersabotage provides a good reminder to stay away from unsupported software.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/30</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1542</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[02081066-364d-11eb-b082-8339593227bc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2561274024.mp3?updated=1690230565" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>France’s ANSII warns of a longrunning Sandworm campaign. DPRK tried to steal COVID-19 vaccine data. Supermicro is exasperated. Static Kitten phishes in the UAE </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1270/notes</link>
      <description>France finds Sandworm’s trail in a software supply chain. Microsoft is impressed by the amount of effort Russian intelligence services put into the SolarWinds campaign. Pyongyang is reported to have attempted to steal COVID-19 vaccine information. Supermicro reiterates objections to Bloomberg's report on alleged hardware supply chain compromises. Static Kitten is phishing in the UAE. Updates on the Florida water utility cybersabotage. Ben Yelin examines to what degree the FBI can access Signal app messages. Rick Howard gathers the hash table to discuss AWS. And a new executive director arrives at our state cybersecurity association.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/30
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Feb 2021 20:40:00 -0000</pubDate>
      <itunes:title>France’s ANSII warns of a longrunning Sandworm campaign. DPRK tried to steal COVID-19 vaccine data. Supermicro is exasperated. Static Kitten phishes in the UAE </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1270</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>France finds Sandworm’s trail in a software supply chain. Microsoft is impressed by the amount of effort Russian intelligence services put into the SolarWinds campaign. Pyongyang is reported to have attempted to steal COVID-19 vaccine information. Supermicro reiterates objections to Bloomberg's report on alleged hardware supply chain compromises. Static Kitten is phishing in the UAE. Updates on the Florida water utility cybersabotage. Ben Yelin examines to what degree the FBI can access Signal app messages. Rick Howard gathers the hash table to discuss AWS. And a new executive director arrives at our state cybersecurity association.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/30
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>France finds Sandworm’s trail in a software supply chain. Microsoft is impressed by the amount of effort Russian intelligence services put into the SolarWinds campaign. Pyongyang is reported to have attempted to steal COVID-19 vaccine information. Supermicro reiterates objections to Bloomberg's report on alleged hardware supply chain compromises. Static Kitten is phishing in the UAE. Updates on the Florida water utility cybersabotage. Ben Yelin examines to what degree the FBI can access Signal app messages. Rick Howard gathers the hash table to discuss AWS. And a new executive director arrives at our state cybersecurity association.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/30</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1420</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0239db6e-364d-11eb-b082-fbb083f9642e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5531228748.mp3?updated=1690230568" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hank Thomas and Mike Doniger, getting the specs on the cyber SPAC. [update]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/40/notes</link>
      <description>In this special edition, our extended conversation with Hank Thomas and Mike Doniger from their new company SCVX. Both experienced investors, their plan is to bring a new funding mechanism known as a SPAC to cyber security which, they say, is new to the space. 
February 2021 Update: we revisit the topic with guest Hank Thomas to hear the latest on SPACs.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Feb 2021 16:30:00 -0000</pubDate>
      <itunes:title>Hank Thomas and Mike Doniger, getting the specs on the cyber SPAC. [update]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>40</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In this special edition, our extended conversation with Hank Thomas and Mike Doniger from their new company SCVX. Both experienced investors, their plan is to bring a new funding mechanism known as a SPAC to cyber security which, they say, is new to the space. 
February 2021 Update: we revisit the topic with guest Hank Thomas to hear the latest on SPACs.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this special edition, our extended conversation with Hank Thomas and Mike Doniger from their new company SCVX. Both experienced investors, their plan is to bring a new funding mechanism known as a SPAC to cyber security which, they say, is new to the space. </p><p><em>February 2021 Update: we revisit the topic with guest Hank Thomas to hear the latest on SPACs.</em></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2138</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[87eeec86-7072-11eb-bfd5-4fed9c898014]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9452732507.mp3?updated=1662645498" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dr. Jessica Barker: Cybersecurity has a huge people element to it. [Socio-technical] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/36/notes</link>
      <description>Co-founder and socio-technical lead at Cygenta, Dr. Jessica Barker, shares her story from childhood career aspirations of becoming a farmer to her accidental pivot to working in cybersecurity. With a PhD in civic design, Jessica looked at the creation of social and civic places until she was approached by a cybersecurity consultancy interested in the human side of cybersecurity. She jumped in and the rest is history. Having experienced some negativity as a woman in cybersecurity, Jessica is a strong proponent of diversity in the field. She suggests that newcomers to the industry follow what interests them and jump in. And, we thank Jessica for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 14 Feb 2021 08:00:00 -0000</pubDate>
      <itunes:title>Dr. Jessica Barker: Cybersecurity has a huge people element to it. [Socio-technical] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>36</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Co-founder and socio-technical lead Dr. Jessica Barker shares her career aspirations from farmer to cybersecurity.</itunes:subtitle>
      <itunes:summary>Co-founder and socio-technical lead at Cygenta, Dr. Jessica Barker, shares her story from childhood career aspirations of becoming a farmer to her accidental pivot to working in cybersecurity. With a PhD in civic design, Jessica looked at the creation of social and civic places until she was approached by a cybersecurity consultancy interested in the human side of cybersecurity. She jumped in and the rest is history. Having experienced some negativity as a woman in cybersecurity, Jessica is a strong proponent of diversity in the field. She suggests that newcomers to the industry follow what interests them and jump in. And, we thank Jessica for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Co-founder and socio-technical lead at Cygenta, Dr. Jessica Barker, shares her story from childhood career aspirations of becoming a farmer to her accidental pivot to working in cybersecurity. With a PhD in civic design, Jessica looked at the creation of social and civic places until she was approached by a cybersecurity consultancy interested in the human side of cybersecurity. She jumped in and the rest is history. Having experienced some negativity as a woman in cybersecurity, Jessica is a strong proponent of diversity in the field. She suggests that newcomers to the industry follow what interests them and jump in. And, we thank Jessica for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>355</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11fa51a8-6cb9-11eb-8860-6b43a47bef7a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5872980899.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Using the human body as a wire-like communication channel. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/170/notes</link>
      <description>Guest Dr. Shreyas Sen, a Perdue University associate professor of electrical and computer engineering, joins us to discuss the following scenario:. Instead of inserting a card or scanning a smartphone to make a payment, what if you could simply touch the machine with your finger? A prototype developed by Purdue University engineers would essentially let your body act as the link between your card or smartphone and the reader or scanner, making it possible for you to transmit information just by touching a surface.
The research can be found here:


Tech makes it possible to digitally communicate through human touch (press release)


BodyWire-HCI: Enabling New Interaction Modalities by Communicating Strictly During Touch Using Electro-Quasistatic Human Body Communication (research paper)


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Feb 2021 08:00:00 -0000</pubDate>
      <itunes:title>Using the human body as a wire-like communication channel. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>170</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Dr. Shreyas Sen, a Perdue University associate professor of electrical and computer engineering, joins us to discuss the following scenario:. Instead of inserting a card or scanning a smartphone to make a payment, what if you could simply touch the machine with your finger? A prototype developed by Purdue University engineers would essentially let your body act as the link between your card or smartphone and the reader or scanner, making it possible for you to transmit information just by touching a surface.
The research can be found here:


Tech makes it possible to digitally communicate through human touch (press release)


BodyWire-HCI: Enabling New Interaction Modalities by Communicating Strictly During Touch Using Electro-Quasistatic Human Body Communication (research paper)


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Dr. Shreyas Sen, a Perdue University associate professor of electrical and computer engineering, joins us to discuss the following scenario:. Instead of inserting a card or scanning a smartphone to make a payment, what if you could simply touch the machine with your finger? A prototype developed by Purdue University engineers would essentially let your body act as the link between your card or smartphone and the reader or scanner, making it possible for you to transmit information just by touching a surface.</p><p>The research can be found here:</p><ul>
<li>
<a href="https://www.purdue.edu/newsroom/releases/2020/Q4/tech-makes-it-possible-to-digitally-communicate-through-human-touch.html">Tech makes it possible to digitally communicate through human touch</a> (press release)</li>
<li>
<a href="https://dl.acm.org/doi/10.1145/3406238?_ga=2.49263011.401635545.1613068445-2115879037.1613068445">BodyWire-HCI: Enabling New Interaction Modalities by Communicating Strictly During Touch Using Electro-Quasistatic Human Body Communication</a> (research paper)</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1199</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[beb3cfa4-6ca6-11eb-87f1-c318d968ba56]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4400971534.mp3?updated=1685109060" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Alleged hardware backdoors, again. Selling game source code. ICS security, especially with respect to water utility cybersabotage. Don’t be the hacker’s valentine.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1269/notes</link>
      <description>Bloomberg revives its reporting on hardware backdoors on chipsets. Has someone bought the source code for the Witcher and Cyberpunk? CISA issues ICS alerts. The FBI and CISA offer advice about water system cybersabotage as state and local utilities seek to learn from the Oldsmar attack. Verizon’s Chris Novak ponders if you should get your Cybersecurity DIY, managed, or co-managed? Our guest is David Barzilai from Karamba Security on the growing importance of IoT security. And, looking for love on Valentine’s Day? Look carefully...and don’t give that intriguing online stranger money, We know, we know, they seem nice, but still...
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/29
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 12 Feb 2021 20:50:00 -0000</pubDate>
      <itunes:title>Alleged hardware backdoors, again. Selling game source code. ICS security, especially with respect to water utility cybersabotage. Don’t be the hacker’s valentine.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1269</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Bloomberg revives its reporting on hardware backdoors on chipsets. Has someone bought the source code for the Witcher and Cyberpunk? CISA issues ICS alerts. The FBI and CISA offer advice about water system cybersabotage as state and local utilities seek to learn from the Oldsmar attack. Verizon’s Chris Novak ponders if you should get your Cybersecurity DIY, managed, or co-managed? Our guest is David Barzilai from Karamba Security on the growing importance of IoT security. And, looking for love on Valentine’s Day? Look carefully...and don’t give that intriguing online stranger money, We know, we know, they seem nice, but still...
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/29
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Bloomberg revives its reporting on hardware backdoors on chipsets. Has someone bought the source code for the Witcher and Cyberpunk? CISA issues ICS alerts. The FBI and CISA offer advice about water system cybersabotage as state and local utilities seek to learn from the Oldsmar attack. Verizon’s Chris Novak ponders if you should get your Cybersecurity DIY, managed, or co-managed? Our guest is David Barzilai from Karamba Security on the growing importance of IoT security. And, looking for love on Valentine’s Day? Look carefully...and don’t give that intriguing online stranger money, We know, we know, they seem nice, but still...</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/29</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1653</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01707828-364d-11eb-b082-4fe740a9d20f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9080422795.mp3?updated=1690230530" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Spyware in the Subcontinent. Notes on cyber fraud, cyber theft, and ransomware. The US gets a chief to lead response to Solorigate. Updates on the Florida water system cybersabotage. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1268/notes</link>
      <description>Spyware in the Subcontinent. Some crooks auction stolen game source code while others bilk food delivery services. Emotet survived its takedown. Ransomware developments. The US now has a point person for Solorigate investigation and response. Andrea Little Limbago from Interos on her participation in the National Security Institute at George Mason University. Our guest is Chris Cochran from Hacker Valley Studio with a preview of their Black Excellence in Cyber podcast.And there’s no attribution yet in the Oldsmar, Florida, water system cybersabotage, but it’s increasingly clear that the utility wasn’t a hard target. 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/28
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 11 Feb 2021 20:10:00 -0000</pubDate>
      <itunes:title>Spyware in the Subcontinent. Notes on cyber fraud, cyber theft, and ransomware. The US gets a chief to lead response to Solorigate. Updates on the Florida water system cybersabotage. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1268</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Spyware in the Subcontinent. Some crooks auction stolen game source code while others bilk food delivery services. Emotet survived its takedown. Ransomware developments. The US now has a point person for Solorigate investigation and response. Andrea Little Limbago from Interos on her participation in the National Security Institute at George Mason University. Our guest is Chris Cochran from Hacker Valley Studio with a preview of their Black Excellence in Cyber podcast.And there’s no attribution yet in the Oldsmar, Florida, water system cybersabotage, but it’s increasingly clear that the utility wasn’t a hard target. 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/28
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Spyware in the Subcontinent. Some crooks auction stolen game source code while others bilk food delivery services. Emotet survived its takedown. Ransomware developments. The US now has a point person for Solorigate investigation and response. Andrea Little Limbago from Interos on her participation in the National Security Institute at George Mason University. Our guest is Chris Cochran from Hacker Valley Studio with a preview of their Black Excellence in Cyber podcast.And there’s no attribution yet in the Oldsmar, Florida, water system cybersabotage, but it’s increasingly clear that the utility wasn’t a hard target. </p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/28</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1644</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01c5078a-364d-11eb-b082-e31e103d80c0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9909538217.mp3?updated=1690230581" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Paying for the bomb the 21st century way. Domestic Kitten’s international romp. Malware versus gamers. Patch Tuesday notes. An update on the Oldsmar water system cyber sabotage. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1267/notes</link>
      <description>What’s North Korea doing with all that money the Lazarus Group steals? Buying atom bombs, apparently. Iran’s Domestic Kitten is scratching at some international surveillance targets. Not everyone who says they’re a Bear really is one. Parking malware in Discord. Notes on Patch Tuesday. Joe Carrigan details a gift card scam that hit a little close to home. Our guest is Saket Modi, CEO of Safe Security with thoughts on quantifying risk. And the latest on the water system cyber sabotage down in Florida.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/27
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 10 Feb 2021 20:10:00 -0000</pubDate>
      <itunes:title>Paying for the bomb the 21st century way. Domestic Kitten’s international romp. Malware versus gamers. Patch Tuesday notes. An update on the Oldsmar water system cyber sabotage. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1267</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>What’s North Korea doing with all that money the Lazarus Group steals? Buying atom bombs, apparently. Iran’s Domestic Kitten is scratching at some international surveillance targets. Not everyone who says they’re a Bear really is one. Parking malware in Discord. Notes on Patch Tuesday. Joe Carrigan details a gift card scam that hit a little close to home. Our guest is Saket Modi, CEO of Safe Security with thoughts on quantifying risk. And the latest on the water system cyber sabotage down in Florida.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/27
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>What’s North Korea doing with all that money the Lazarus Group steals? Buying atom bombs, apparently. Iran’s Domestic Kitten is scratching at some international surveillance targets. Not everyone who says they’re a Bear really is one. Parking malware in Discord. Notes on Patch Tuesday. Joe Carrigan details a gift card scam that hit a little close to home. Our guest is Saket Modi, CEO of Safe Security with thoughts on quantifying risk. And the latest on the water system cyber sabotage down in Florida.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/27</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1276</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01f774ea-364d-11eb-b082-b3c8591032eb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3699076015.mp3?updated=1690230513" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Almost too much lye in the water, down Florida-way. BlackTech’s new malware strain. Huawei says it’s OK if the White House calls.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1266/notes</link>
      <description>Florida water treatment plant sustains cyberattack: the hack was successful, the sabotage wasn’t. A new malware strain is associated with Chinese intelligence services. Ben Yelin tracks a surveillance plane who’s funding has fallen. Our guest is Col. Stephen Hamilton from Army Cyber Institute at West Point. And Huawei’s CEO says, sure, he’d take a call from President Biden.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/26
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Feb 2021 20:45:00 -0000</pubDate>
      <itunes:title>Almost too much lye in the water, down Florida-way. BlackTech’s new malware strain. Huawei says it’s OK if the White House calls.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1266</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Florida water treatment plant sustains cyberattack: the hack was successful, the sabotage wasn’t. A new malware strain is associated with Chinese intelligence services. Ben Yelin tracks a surveillance plane who’s funding has fallen. Our guest is Col. Stephen Hamilton from Army Cyber Institute at West Point. And Huawei’s CEO says, sure, he’d take a call from President Biden.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/26
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Florida water treatment plant sustains cyberattack: the hack was successful, the sabotage wasn’t. A new malware strain is associated with Chinese intelligence services. Ben Yelin tracks a surveillance plane who’s funding has fallen. Our guest is Col. Stephen Hamilton from Army Cyber Institute at West Point. And Huawei’s CEO says, sure, he’d take a call from President Biden.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/26</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1475</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[025aee08-364d-11eb-b082-b3d7d073a5ed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8637539238.mp3?updated=1612902389" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A junta shuts down a nation’s data networks. Lessons from multi-domain ops against ISIS? SilentFade returns. Iran’s surveillance actors. Data breaches large and small. Company towns returning? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1265/notes</link>
      <description>Myanmar blocks data networks. Notes on offensive cyber operations, from present and former Five Eyes officials. SilentFade seems to be back, with more ad fraud. Iranian cyber operators up their surveillance game. Brazil’s big data breach remains under investigation. Company towns may make a return in Nevada. Rick Howard casts his gaze on the AWS cloud. We welcome Dinah Davis from Arctic Wolf as our newest industry partner. And why in the world are hackers interested in other people’s colonoscopies? 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/25
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 08 Feb 2021 21:00:00 -0000</pubDate>
      <itunes:title>A junta shuts down a nation’s data networks. Lessons from multi-domain ops against ISIS? SilentFade returns. Iran’s surveillance actors. Data breaches large and small. Company towns returning? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1265</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Myanmar blocks data networks. Notes on offensive cyber operations, from present and former Five Eyes officials. SilentFade seems to be back, with more ad fraud. Iranian cyber operators up their surveillance game. Brazil’s big data breach remains under investigation. Company towns may make a return in Nevada. Rick Howard casts his gaze on the AWS cloud. We welcome Dinah Davis from Arctic Wolf as our newest industry partner. And why in the world are hackers interested in other people’s colonoscopies? 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/25
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Myanmar blocks data networks. Notes on offensive cyber operations, from present and former Five Eyes officials. SilentFade seems to be back, with more ad fraud. Iranian cyber operators up their surveillance game. Brazil’s big data breach remains under investigation. Company towns may make a return in Nevada. Rick Howard casts his gaze on the AWS cloud. We welcome Dinah Davis from Arctic Wolf as our newest industry partner. And why in the world are hackers interested in other people’s colonoscopies? </p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/25</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1551</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[02802a24-364d-11eb-b082-9ba032a03e11]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3951490725.mp3?updated=1690230052" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jason Clark: Challenge the way things are done. [Strategy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/35/notes</link>
      <description>Chief strategy officer and chief security officer for Netskope, Jason Clark, shares his journey as he challenges the status quo and works to expand diversity in cybersecurity. Jason started his career by breaking the mold and heading to the Air Force rather than his family legacy of Army service. Following his military service, he became a CISO for the New York Times at age 26 and kept building from there. Jason advises, "You should always be seeking out jobs you're actually not qualified for. I think that's how you grow. If you know you could do the job, and you've got half the skills, go for it." Jason aspires to a legacy of increasing diversity in the cybersecurity industry and founded a non-profit to do just that. And, we thank Jason for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 07 Feb 2021 08:00:00 -0000</pubDate>
      <itunes:title>Jason Clark: Challenge the way things are done. [Strategy] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>35</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Chief strategy officer and chief security officer for Netskope, Jason Clark, shares his journey as he challenges the status quo and works to expand diversity in cybersecurity.</itunes:subtitle>
      <itunes:summary>Chief strategy officer and chief security officer for Netskope, Jason Clark, shares his journey as he challenges the status quo and works to expand diversity in cybersecurity. Jason started his career by breaking the mold and heading to the Air Force rather than his family legacy of Army service. Following his military service, he became a CISO for the New York Times at age 26 and kept building from there. Jason advises, "You should always be seeking out jobs you're actually not qualified for. I think that's how you grow. If you know you could do the job, and you've got half the skills, go for it." Jason aspires to a legacy of increasing diversity in the cybersecurity industry and founded a non-profit to do just that. And, we thank Jason for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chief strategy officer and chief security officer for Netskope, Jason Clark, shares his journey as he challenges the status quo and works to expand diversity in cybersecurity. Jason started his career by breaking the mold and heading to the Air Force rather than his family legacy of Army service. Following his military service, he became a CISO for the New York Times at age 26 and kept building from there. Jason advises, "You should always be seeking out jobs you're actually not qualified for. I think that's how you grow. If you know you could do the job, and you've got half the skills, go for it." Jason aspires to a legacy of increasing diversity in the cybersecurity industry and founded a non-profit to do just that. And, we thank Jason for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>297</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7ca362d6-6725-11eb-b75a-83247e115aa0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9285709394.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>In the clear: what it's like working as a woman in the cleared community. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/39/notes</link>
      <description>This special edition podcast highlights three women, Priyanka, Ashley and Lauren, who chose to focus their careers in cybersecurity for the mission-based organization Northrop Grumman. Kathleen Smith from ClearedJobs.Net joins us as our panel moderator. The CyberWire's Jennifer Eiben hosts the event. We are excited to share this look into the world of women in cybersecurity.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 07 Feb 2021 06:00:00 -0000</pubDate>
      <itunes:title>In the clear: what it's like working as a woman in the cleared community. [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>39</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This special edition podcast highlights three women, Priyanka, Ashley and Lauren, who chose to focus their careers in cybersecurity for the mission-based organization Northrop Grumman. Kathleen Smith from ClearedJobs.Net joins us as our panel moderator. The CyberWire's Jennifer Eiben hosts the event. We are excited to share this look into the world of women in cybersecurity.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This special edition podcast highlights three women, Priyanka, Ashley and Lauren, who chose to focus their careers in cybersecurity for the mission-based organization Northrop Grumman. Kathleen Smith from ClearedJobs.Net joins us as our panel moderator. The CyberWire's Jennifer Eiben hosts the event. We are excited to share this look into the world of women in cybersecurity.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2988</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[24bc1588-6809-11eb-a5c2-37eba00a93b2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1469777606.mp3?updated=1662645631" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>"Follow the money" the cybersecurity way. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/169/notes</link>
      <description>Guest Joe Slowik joins us from Domain Tools to share their research "Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity" where they examined technical artifacts emerging around the 2020 conflict between Armenia and Azerbaijan in the Caucasus region. 
Cyber Threat Intelligence (CTI) practitioners can gain insight into adversary operations by tracking conflicts or geopolitical tensions. Similar to a “follow the money” approach in criminal investigations, looking at conflict zones can reveal cyber capabilities deployed as part of events —either by the parties to the conflict itself, or third parties interested in monitoring events for their own purposes.
Based on precedent, analysts can identify developments in adversary operations and technical capabilities by tracking identifiers related to major events and conflict zones. Identifying capabilities deployed to take advantage of such items can yield insights into fundamental attacker tradecraft and behaviors, and enable defense and response for incidents which may strike far closer to home at a later date.
The research can be found here:
Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Feb 2021 08:00:00 -0000</pubDate>
      <itunes:title>"Follow the money" the cybersecurity way. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>169</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Joe Slowik joins us from Domain Tools to share their research "Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity" where they examined technical artifacts emerging around the 2020 conflict between Armenia and Azerbaijan in the Caucasus region. 
Cyber Threat Intelligence (CTI) practitioners can gain insight into adversary operations by tracking conflicts or geopolitical tensions. Similar to a “follow the money” approach in criminal investigations, looking at conflict zones can reveal cyber capabilities deployed as part of events —either by the parties to the conflict itself, or third parties interested in monitoring events for their own purposes.
Based on precedent, analysts can identify developments in adversary operations and technical capabilities by tracking identifiers related to major events and conflict zones. Identifying capabilities deployed to take advantage of such items can yield insights into fundamental attacker tradecraft and behaviors, and enable defense and response for incidents which may strike far closer to home at a later date.
The research can be found here:
Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Joe Slowik joins us from Domain Tools to share their research "Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity" where they examined technical artifacts emerging around the 2020 conflict between Armenia and Azerbaijan in the Caucasus region. </p><p>Cyber Threat Intelligence (CTI) practitioners can gain insight into adversary operations by tracking conflicts or geopolitical tensions. Similar to a “follow the money” approach in criminal investigations, looking at conflict zones can reveal cyber capabilities deployed as part of events —either by the parties to the conflict itself, or third parties interested in monitoring events for their own purposes.</p><p>Based on precedent, analysts can identify developments in adversary operations and technical capabilities by tracking identifiers related to major events and conflict zones. Identifying capabilities deployed to take advantage of such items can yield insights into fundamental attacker tradecraft and behaviors, and enable defense and response for incidents which may strike far closer to home at a later date.</p><p>The research can be found here:</p><ul><li><a href="https://www.domaintools.com/resources/blog/current-events-to-widespread-campaigns-pivoting-from-samples-to-identify#">Current Events to Widespread Campaigns: Pivoting from Samples to Identify Activity</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1637</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a9920644-6725-11eb-9655-c74bd71a7746]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5536548479.mp3?updated=1685109052" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lazarus Group seems to have deployed an IE zero day. Electrobras discloses ransomware attack. TrickBot returns. Breaches at security companies. Russo-American get-to-know-you talks. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1264/notes</link>
      <description>Lazarus Group seems to have had an IE zero day. Brazilian power utility discloses a ransomware attack on business systems. TrickBot’s back. Automated attacks are going after web applications. Two security firms report breaches. Patching notes. A look at life in the cleared community. Caleb Barlow from CynergisTek with handling disinformation in our runbooks. And Washington and Moscow hold the usual frank discussions--the Americans, at least, talked about cybersecurity.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/24
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 05 Feb 2021 20:45:00 -0000</pubDate>
      <itunes:title>Lazarus Group seems to have deployed an IE zero day. Electrobras discloses ransomware attack. TrickBot returns. Breaches at security companies. Russo-American get-to-know-you talks. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1264</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Caleb Barlow from CynergisTek with handling disinformation in our runbooks.</itunes:subtitle>
      <itunes:summary>Lazarus Group seems to have had an IE zero day. Brazilian power utility discloses a ransomware attack on business systems. TrickBot’s back. Automated attacks are going after web applications. Two security firms report breaches. Patching notes. A look at life in the cleared community. Caleb Barlow from CynergisTek with handling disinformation in our runbooks. And Washington and Moscow hold the usual frank discussions--the Americans, at least, talked about cybersecurity.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/24
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Lazarus Group seems to have had an IE zero day. Brazilian power utility discloses a ransomware attack on business systems. TrickBot’s back. Automated attacks are going after web applications. Two security firms report breaches. Patching notes. A look at life in the cleared community. Caleb Barlow from CynergisTek with handling disinformation in our runbooks. And Washington and Moscow hold the usual frank discussions--the Americans, at least, talked about cybersecurity.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/24</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1653</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[015dce4e-364d-11eb-b082-bfe52f4ef11c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4923454101.mp3?updated=1690230039" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kubernetes clusters attacked. Home insecurity devices. Update on the supply chain incidents. Incomplete patches. Marque and reprisal? Ransomware notes. Class clowns and zoom-bombing. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1263/notes</link>
      <description>Hildegard malware is targeting Kubernetes clusters. Remote access flaws found in consumer security devices. A brief update on the spreading software supply chain incidents. Project Zero sees incomplete patches at the root of most successful zero-day attacks. Recruiting a privateer’s crew. The current mood among ransomware victims. We’ll search for the truth about 5G with Rob Lee and Rick Howard. And who’s behind zoom-bombing remote learning? A hint: the kids aren’t alright.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/23
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 04 Feb 2021 20:40:00 -0000</pubDate>
      <itunes:title>Kubernetes clusters attacked. Home insecurity devices. Update on the supply chain incidents. Incomplete patches. Marque and reprisal? Ransomware notes. Class clowns and zoom-bombing. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1263</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Hildegard malware is targeting Kubernetes clusters. Remote access flaws found in consumer security devices. A brief update on the spreading software supply chain incidents. Project Zero sees incomplete patches at the root of most successful zero-day attacks. Recruiting a privateer’s crew. The current mood among ransomware victims. We’ll search for the truth about 5G with Rob Lee and Rick Howard. And who’s behind zoom-bombing remote learning? A hint: the kids aren’t alright.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/23
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hildegard malware is targeting Kubernetes clusters. Remote access flaws found in consumer security devices. A brief update on the spreading software supply chain incidents. Project Zero sees incomplete patches at the root of most successful zero-day attacks. Recruiting a privateer’s crew. The current mood among ransomware victims. We’ll search for the truth about 5G with Rob Lee and Rick Howard. And who’s behind zoom-bombing remote learning? A hint: the kids aren’t alright.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/23</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1523</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01d5767e-364d-11eb-b082-dbb403e4dcd1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4868860939.mp3?updated=1690229853" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>China gets in on the SolarWinds act. More SolarWinds vulnerabilities disclosed and patched. Abuse of lawful intercept tech in South Sudan. BEC phishes for gift cards. Parasitic card skimmer found. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1262/notes</link>
      <description>It appears Chinese intelligence services have been exploiting a vulnerability in SolarWinds to steal data from a US Government payroll system. The presumed Russian intrusion into SolarWinds may have been going on for nine months or more. Three new SolarWinds vulnerabilities are disclosed and patched. Amnesty accuses South Sudan of abusing intercept tools. BEC compromise is involved in gift card scams. Joe Carrigan has thoughts on opt-in privacy policies. Our guest is Dale Ludwig from CHERRY on USB attacks and hardware security. And carders steal from other carders.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/22
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 03 Feb 2021 20:50:00 -0000</pubDate>
      <itunes:title>China gets in on the SolarWinds act. More SolarWinds vulnerabilities disclosed and patched. Abuse of lawful intercept tech in South Sudan. BEC phishes for gift cards. Parasitic card skimmer found. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1262</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>It appears Chinese intelligence services have been exploiting a vulnerability in SolarWinds to steal data from a US Government payroll system. The presumed Russian intrusion into SolarWinds may have been going on for nine months or more. Three new SolarWinds vulnerabilities are disclosed and patched. Amnesty accuses South Sudan of abusing intercept tools. BEC compromise is involved in gift card scams. Joe Carrigan has thoughts on opt-in privacy policies. Our guest is Dale Ludwig from CHERRY on USB attacks and hardware security. And carders steal from other carders.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/22
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>It appears Chinese intelligence services have been exploiting a vulnerability in SolarWinds to steal data from a US Government payroll system. The presumed Russian intrusion into SolarWinds may have been going on for nine months or more. Three new SolarWinds vulnerabilities are disclosed and patched. Amnesty accuses South Sudan of abusing intercept tools. BEC compromise is involved in gift card scams. Joe Carrigan has thoughts on opt-in privacy policies. Our guest is Dale Ludwig from CHERRY on USB attacks and hardware security. And carders steal from other carders.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/22</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1549</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01e631f8-364d-11eb-b082-a3d0645ca373]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2445748268.mp3?updated=1690229614" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Coups d’état and Internet disruption. Cyberespionage in the supply chain, again. SonicWall zero day exploited in the wild. Tracking criminal infrastructure-as-a-service. Data breach in Washington State. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1261/notes</link>
      <description>Myanmar’s junta jams the Internet. Operation NightScout looks like a highly targeted cyberespionage campaign delivered through a compromised supply chain. SonicWall zero day is being actively exploited in the wild. StrangeU and RandomU are filling a niche in the criminal-to-criminal market. Ben Yelin ponders whether the Solarwinds attack can be considered an act of war. Our guest Jamie Brown from Tenable on the National Cyber Director position and what it means for the Biden administration. Another data breach is associated with Accellion FTA. And it’s Groundhog Day, campers.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/21
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Feb 2021 21:50:00 -0000</pubDate>
      <itunes:title>Coups d’état and Internet disruption. Cyberespionage in the supply chain, again. SonicWall zero day exploited in the wild. Tracking criminal infrastructure-as-a-service. Data breach in Washington State. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1261</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Myanmar’s junta jams the Internet. Operation NightScout looks like a highly targeted cyberespionage campaign delivered through a compromised supply chain. SonicWall zero day is being actively exploited in the wild. StrangeU and RandomU are filling a niche in the criminal-to-criminal market. Ben Yelin ponders whether the Solarwinds attack can be considered an act of war. Our guest Jamie Brown from Tenable on the National Cyber Director position and what it means for the Biden administration. Another data breach is associated with Accellion FTA. And it’s Groundhog Day, campers.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/21
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Myanmar’s junta jams the Internet. Operation NightScout looks like a highly targeted cyberespionage campaign delivered through a compromised supply chain. SonicWall zero day is being actively exploited in the wild. StrangeU and RandomU are filling a niche in the criminal-to-criminal market. Ben Yelin ponders whether the Solarwinds attack can be considered an act of war. Our guest Jamie Brown from Tenable on the National Cyber Director position and what it means for the Biden administration. Another data breach is associated with Accellion FTA. And it’s Groundhog Day, campers.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/21</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1344</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0249ec84-364d-11eb-b082-9f20b166c310]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4014612236.mp3?updated=1690229428" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Solorigate: targeting, collateral damage, or staging? The Cyberspace Solarium has some advice for US President Biden. URKI breach. British Mensa thinks over a data exposure. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1260/notes</link>
      <description>Untangling Solorigate, and distinguishing primary targets from collateral damage (or maybe side benefits, or maybe battlespace preparation). Congress asks NSA for background on an earlier supply chain incident. The Cyberspace Solarium Commission offers the new US Administration some transition advice. Rick Howard hears from the hash table on Microsoft Azure. Andrea Little Limbago from Interos on the intersection of COVID and cyber vulnerabilities. And the week gets off to a rough start for smart Britons.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/20
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 01 Feb 2021 21:40:00 -0000</pubDate>
      <itunes:title>Solorigate: targeting, collateral damage, or staging? The Cyberspace Solarium has some advice for US President Biden. URKI breach. British Mensa thinks over a data exposure. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1260</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Untangling Solorigate, and distinguishing primary targets from collateral damage (or maybe side benefits, or maybe battlespace preparation). Congress asks NSA for background on an earlier supply chain incident. The Cyberspace Solarium Commission offers the new US Administration some transition advice. Rick Howard hears from the hash table on Microsoft Azure. Andrea Little Limbago from Interos on the intersection of COVID and cyber vulnerabilities. And the week gets off to a rough start for smart Britons.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/20
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Untangling Solorigate, and distinguishing primary targets from collateral damage (or maybe side benefits, or maybe battlespace preparation). Congress asks NSA for background on an earlier supply chain incident. The Cyberspace Solarium Commission offers the new US Administration some transition advice. Rick Howard hears from the hash table on Microsoft Azure. Andrea Little Limbago from Interos on the intersection of COVID and cyber vulnerabilities. And the week gets off to a rough start for smart Britons.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/20</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1565</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[026e23ec-364d-11eb-b082-9738bdaad426]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5949597321.mp3?updated=1690228219" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kyla Guru: You are a key piece to our national security. [Education] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/34/notes</link>
      <description>Founder and CEO of nonprofit Bits N' Bytes Cybersecurity Education and undergraduate student at Stanford University, Kyla Guru shares her journey from GenCyber Camp to becoming a cybersecurity thought leader. Seeing the need. for cybersecurity education in her own community spurred Kyla into action engaging our civilian population in understanding their role in the cybersecurity space. Kyla recommends putting yourself out there: taking courses, getting more knowledge, getting internships, meeting people and going to conferences. Kyla thinks her generation has an inquisitive mind and feels that is where advocacy and education come in with cybersecurity. She shares for any young person "thinking about maybe starting something in security, this is definitely the time to do so." And, we thank Kyla for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 31 Jan 2021 08:00:00 -0000</pubDate>
      <itunes:title>Kyla Guru: You are a key piece to our national security. [Education] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>34</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Founder and CEO of Bits N' Bytes Cybersecurity Education and student at Stanford University Kyla Guru on her journey to cybersecurity thought leader. </itunes:subtitle>
      <itunes:summary>Founder and CEO of nonprofit Bits N' Bytes Cybersecurity Education and undergraduate student at Stanford University, Kyla Guru shares her journey from GenCyber Camp to becoming a cybersecurity thought leader. Seeing the need. for cybersecurity education in her own community spurred Kyla into action engaging our civilian population in understanding their role in the cybersecurity space. Kyla recommends putting yourself out there: taking courses, getting more knowledge, getting internships, meeting people and going to conferences. Kyla thinks her generation has an inquisitive mind and feels that is where advocacy and education come in with cybersecurity. She shares for any young person "thinking about maybe starting something in security, this is definitely the time to do so." And, we thank Kyla for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Founder and CEO of nonprofit Bits N' Bytes Cybersecurity Education and undergraduate student at Stanford University, Kyla Guru shares her journey from GenCyber Camp to becoming a cybersecurity thought leader. Seeing the need. for cybersecurity education in her own community spurred Kyla into action engaging our civilian population in understanding their role in the cybersecurity space. Kyla recommends putting yourself out there: taking courses, getting more knowledge, getting internships, meeting people and going to conferences. Kyla thinks her generation has an inquisitive mind and feels that is where advocacy and education come in with cybersecurity. She shares for any young person "thinking about maybe starting something in security, this is definitely the time to do so." And, we thank Kyla for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>334</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e54d3bb6-610a-11eb-a464-03e4e229fb03]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4113935338.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Security platforms vs best of breed point products: What should you deploy? [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/10/notes</link>
      <description>For 20 years, the cybersecurity practitioner’s goto move when confronted with a new risk or compliance requirement has been to install a technical tool somewhere in the security stack to cover it. Over time, the number of tools that the infosec team has to manage has slowly grown. With the advent of bring-your-own device to the workplace, CIOs choosing SaaS applications to do work that has been traditionally handled in the data center, and organizations rushing to deploy their services into hybrid cloud environments, the number of individual data islands where company material information is routinely stored and must be covered by the security stack has increased. The complexity of this situation is immense. Two strategies have emerged to address this problem. The first is to continue down the path of installing more technical tools in each data island to cover the risk and having the infosec team manually process the telemetry of all the security devices with bigger teams and helper-automation-tools like SOAR platforms and SIEM databases. The second strategy is to choose a security vendor's platform that performs most of the security tasks on all the data islands but now makes the organization reliant on a single point of failure.
Joining Rick Howard from the CyberWire's Hash Table's group of experts to consider the matter are Mike Higgins from Haven Health and Greg Notch from the National Hockey League, and later in the show, Rick speaks with Lior Div of Cybereason, who gives their point of view on this debate.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 31 Jan 2021 06:00:00 -0000</pubDate>
      <itunes:title>Security platforms vs best of breed point products: What should you deploy? [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>For 20 years, the cybersecurity practitioner’s goto move when confronted with a new risk or compliance requirement has been to install a technical tool somewhere in the security stack to cover it. Over time, the number of tools that the infosec team has to manage has slowly grown. With the advent of bring-your-own device to the workplace, CIOs choosing SaaS applications to do work that has been traditionally handled in the data center, and organizations rushing to deploy their services into hybrid cloud environments, the number of individual data islands where company material information is routinely stored and must be covered by the security stack has increased. The complexity of this situation is immense. Two strategies have emerged to address this problem. The first is to continue down the path of installing more technical tools in each data island to cover the risk and having the infosec team manually process the telemetry of all the security devices with bigger teams and helper-automation-tools like SOAR platforms and SIEM databases. The second strategy is to choose a security vendor's platform that performs most of the security tasks on all the data islands but now makes the organization reliant on a single point of failure.
Joining Rick Howard from the CyberWire's Hash Table's group of experts to consider the matter are Mike Higgins from Haven Health and Greg Notch from the National Hockey League, and later in the show, Rick speaks with Lior Div of Cybereason, who gives their point of view on this debate.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>For 20 years, the cybersecurity practitioner’s goto move when confronted with a new risk or compliance requirement has been to install a technical tool somewhere in the security stack to cover it. Over time, the number of tools that the infosec team has to manage has slowly grown. With the advent of bring-your-own device to the workplace, CIOs choosing SaaS applications to do work that has been traditionally handled in the data center, and organizations rushing to deploy their services into hybrid cloud environments, the number of individual data islands where company material information is routinely stored and must be covered by the security stack has increased. The complexity of this situation is immense. Two strategies have emerged to address this problem. The first is to continue down the path of installing more technical tools in each data island to cover the risk and having the infosec team manually process the telemetry of all the security devices with bigger teams and helper-automation-tools like SOAR platforms and SIEM databases. The second strategy is to choose a security vendor's platform that performs most of the security tasks on all the data islands but now makes the organization reliant on a single point of failure.</p><p>Joining Rick Howard from the CyberWire's Hash Table's group of experts to consider the matter are Mike Higgins from Haven Health and Greg Notch from the National Hockey League, and later in the show, Rick speaks with Lior Div of Cybereason, who gives their point of view on this debate.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1826</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ded5b7c8-6267-11eb-b8cd-e3616bd1f722]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7355383950.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Kimsuky group from North Korea expands spyware, malware and infrastructure. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/168/notes</link>
      <description>Guest Yonatan Striem-Amit joins us from Cybereason to share their Nocturnus Team research into Kimsuky. The Cybereason Nocturnus Team has been tracking various North Korean threat actors, among them the cyber espionage group known as Kimsuky, (aka: Velvet Chollima, Black Banshee and Thallium), which has been active since at least 2012 and is believed to be operating on behalf of the North Korean regime. The group has a rich and notorious history of offensive cyber operations around the world, including operations targeting South Korean think tanks, but over the past few years they have expanded their targeting to countries including the United States, Russia and various nations in Europe.
The research can be found here:
Back to the Future: Inside the Kimsuky KGH Spyware Suite

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Jan 2021 08:00:00 -0000</pubDate>
      <itunes:title>The Kimsuky group from North Korea expands spyware, malware and infrastructure. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>168</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Yonatan Striem-Amit joins us from Cybereason to share their Nocturnus Team research into Kimsuky. The Cybereason Nocturnus Team has been tracking various North Korean threat actors, among them the cyber espionage group known as Kimsuky, (aka: Velvet Chollima, Black Banshee and Thallium), which has been active since at least 2012 and is believed to be operating on behalf of the North Korean regime. The group has a rich and notorious history of offensive cyber operations around the world, including operations targeting South Korean think tanks, but over the past few years they have expanded their targeting to countries including the United States, Russia and various nations in Europe.
The research can be found here:
Back to the Future: Inside the Kimsuky KGH Spyware Suite

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Yonatan Striem-Amit joins us from Cybereason to share their Nocturnus Team research into Kimsuky. The Cybereason Nocturnus Team has been tracking various North Korean threat actors, among them the cyber espionage group known as Kimsuky, (aka: Velvet Chollima, Black Banshee and Thallium), which has been active since at least 2012 and is believed to be operating on behalf of the North Korean regime. The group has a rich and notorious history of offensive cyber operations around the world, including operations targeting South Korean think tanks, but over the past few years they have expanded their targeting to countries including the United States, Russia and various nations in Europe.</p><p>The research can be found here:</p><ul><li><a href="https://www.cybereason.com/blog/back-to-the-future-inside-the-kimsuky-kgh-spyware-suite">Back to the Future: Inside the Kimsuky KGH Spyware Suite</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1044</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00d46eb8-610b-11eb-b314-8f74e84f8212]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7069630626.mp3?updated=1685109038" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lebanon Cedar’s wide-ranging cyberespionage campaign. Lazarus Group said to be behind the social engineering of vulnerability researchers. Solorigate spreads. Social media and the short squeeze. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1259/notes</link>
      <description>Lebanon Cedar is quietly back, and running a cyberespionage campaign through vulnerable servers. Social engineering of vulnerability researchers is now attributed to the Lazarus Group. That “SolarWinds” incident is a lot bigger than SolarWinds. Notes on social media and the short squeeze. Verizon’s Chris Novak looks at the changing landscape of ransomware payments. Our guest Professor Brian Gant from Maryville University examines cybersecurity threats of the new U.S. administration. And the GAO thinks the US State Department should use “data and evidence.”
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/19
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 29 Jan 2021 20:45:00 -0000</pubDate>
      <itunes:title>Lebanon Cedar’s wide-ranging cyberespionage campaign. Lazarus Group said to be behind the social engineering of vulnerability researchers. Solorigate spreads. Social media and the short squeeze. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1259</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Lebanon Cedar is quietly back, and running a cyberespionage campaign through vulnerable servers. Social engineering of vulnerability researchers is now attributed to the Lazarus Group. That “SolarWinds” incident is a lot bigger than SolarWinds. Notes on social media and the short squeeze. Verizon’s Chris Novak looks at the changing landscape of ransomware payments. Our guest Professor Brian Gant from Maryville University examines cybersecurity threats of the new U.S. administration. And the GAO thinks the US State Department should use “data and evidence.”
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/19
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Lebanon Cedar is quietly back, and running a cyberespionage campaign through vulnerable servers. Social engineering of vulnerability researchers is now attributed to the Lazarus Group. That “SolarWinds” incident is a lot bigger than SolarWinds. Notes on social media and the short squeeze. Verizon’s Chris Novak looks at the changing landscape of ransomware payments. Our guest Professor Brian Gant from Maryville University examines cybersecurity threats of the new U.S. administration. And the GAO thinks the US State Department should use “data and evidence.”</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/19</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1612</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[014d265c-364d-11eb-b082-f7002cd4d8bb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9457788615.mp3?updated=1690220972" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Advice on Supernova and encouragement to patch Sudo. NetWalker taken down. Influencers tighten a big short squeeze. And charges are brought in a 2016 case of alleged US voter suppression.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1258/notes</link>
      <description>Updates from CISA on Supernova. US Cyber Command recommends patching Sudo quickly. US and Bulgarian authorities take down the NetWalker ransomware-as-a-service operation. Influencers drive a big short-squeeze in the stock market. Thomas Etheridge from CrowdStrike on Recovering from a ransomware event. Our guest Zack Schuler from Ninjio examines the security challenges of Work From Anywhere. And another influencer is charged with conspiracy to deprive people of their right to vote.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/18
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 28 Jan 2021 21:10:00 -0000</pubDate>
      <itunes:title>Advice on Supernova and encouragement to patch Sudo. NetWalker taken down. Influencers tighten a big short squeeze. And charges are brought in a 2016 case of alleged US voter suppression.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1258</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Updates from CISA on Supernova. US Cyber Command recommends patching Sudo quickly. US and Bulgarian authorities take down the NetWalker ransomware-as-a-service operation. Influencers drive a big short-squeeze in the stock market. Thomas Etheridge from CrowdStrike on Recovering from a ransomware event. Our guest Zack Schuler from Ninjio examines the security challenges of Work From Anywhere. And another influencer is charged with conspiracy to deprive people of their right to vote.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/18
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Updates from CISA on Supernova. US Cyber Command recommends patching Sudo quickly. US and Bulgarian authorities take down the NetWalker ransomware-as-a-service operation. Influencers drive a big short-squeeze in the stock market. Thomas Etheridge from CrowdStrike on Recovering from a ransomware event. Our guest Zack Schuler from Ninjio examines the security challenges of Work From Anywhere. And another influencer is charged with conspiracy to deprive people of their right to vote.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/18</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1470</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00d5da5c-364d-11eb-b082-bffe40479748]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1416153826.mp3?updated=1690220953" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Emotet takedown. Solorigate updates (and President Biden tells President Putin he’d like him to knock it off). Vulnerabilities and threats discovered and described. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1257/notes</link>
      <description>Europol leads an international, public-private, takedown of Emotet. Four security companies describe their brushes with the compromised SolarWinds Orion supply chain. Solorigate is one of the issues US President Biden raised in his first phone call with Russian President Putin. New vulnerabilities and threats described. Our guest Michael Hamilton of CI Security questions how realistic CISA's latest guidance on agency forensics may be. Joe Carrigan looks at bad guys taking advantage of Google Forms. And the Internet is back in business on the US East Coast.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/17
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 27 Jan 2021 20:30:00 -0000</pubDate>
      <itunes:title>Emotet takedown. Solorigate updates (and President Biden tells President Putin he’d like him to knock it off). Vulnerabilities and threats discovered and described. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1257</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Europol leads an international, public-private, takedown of Emotet. Four security companies describe their brushes with the compromised SolarWinds Orion supply chain. Solorigate is one of the issues US President Biden raised in his first phone call with Russian President Putin. New vulnerabilities and threats described. Our guest Michael Hamilton of CI Security questions how realistic CISA's latest guidance on agency forensics may be. Joe Carrigan looks at bad guys taking advantage of Google Forms. And the Internet is back in business on the US East Coast.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/17
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Europol leads an international, public-private, takedown of Emotet. Four security companies describe their brushes with the compromised SolarWinds Orion supply chain. Solorigate is one of the issues US President Biden raised in his first phone call with Russian President Putin. New vulnerabilities and threats described. Our guest Michael Hamilton of CI Security questions how realistic CISA's latest guidance on agency forensics may be. Joe Carrigan looks at bad guys taking advantage of Google Forms. And the Internet is back in business on the US East Coast.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/17</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1469</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00c5b208-364d-11eb-b082-4fb8480bb6b7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5033749220.mp3?updated=1690220940" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pyongyang’s social engineering campaign to compromise vulnerability researchers. Anonymous is back? Workforce development. Cyber Force? Why not? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1256/notes</link>
      <description>Google reports North Korean social engineering of vulnerability researchers. Anonymous resurfaces, maybe, and tells Malaysia’s government it’s not happy with them. Notes on false credentialism and workforce development from the National Governors Association cyber summit. Kevin Magee from Microsoft Canada on the launch of the Rogers Cybersecurity Catalyst at Ryerson University to support Canadian Cybersecurity Startups. Our guest is James Stanger from CompTIA on their ultimate DDoS guide. And does America need a Cyber Force? Some think so.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/16
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Jan 2021 21:00:00 -0000</pubDate>
      <itunes:title>Pyongyang’s social engineering campaign to compromise vulnerability researchers. Anonymous is back? Workforce development. Cyber Force? Why not? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1256</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Google reports North Korean social engineering of vulnerability researchers. Anonymous resurfaces, maybe, and tells Malaysia’s government it’s not happy with them. Notes on false credentialism and workforce development from the National Governors Association cyber summit. Kevin Magee from Microsoft Canada on the launch of the Rogers Cybersecurity Catalyst at Ryerson University to support Canadian Cybersecurity Startups. Our guest is James Stanger from CompTIA on their ultimate DDoS guide. And does America need a Cyber Force? Some think so.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/16
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Google reports North Korean social engineering of vulnerability researchers. Anonymous resurfaces, maybe, and tells Malaysia’s government it’s not happy with them. Notes on false credentialism and workforce development from the National Governors Association cyber summit. Kevin Magee from Microsoft Canada on the launch of the Rogers Cybersecurity Catalyst at Ryerson University to support Canadian Cybersecurity Startups. Our guest is James Stanger from CompTIA on their ultimate DDoS guide. And does America need a Cyber Force? Some think so.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/16</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1447</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0052bfd2-364d-11eb-b082-9f7ed6ace45c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8375466356.mp3?updated=1690220922" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The FSB warns Russian businesses to up their security game--the Americans are coming. SonicWall’s investigation of a possible cyberattack. DIA and commercial data brokers. OPC issues. Robota. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1255/notes</link>
      <description>Russia’s FSB warns businesses to be on the lookout for American cyberattacks after the White House says it’s reserving its right to respond to the Solorigate cyberespionage campaign. SonicWall investigates an apparent compromise of its systems. Senator asks the US DNI for an explanation of DIA purchases of geolocation data from commercial vendors. OPC issues described. Andrea Little Limbago from Interos on the tech "naughty list" of restricted or sanctioned companies. Rick Howard previews his first principles analysis of Microsoft Azure. And a happy birthday to the word “robot,” now one-hundred years young.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/15
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 25 Jan 2021 21:00:00 -0000</pubDate>
      <itunes:title>The FSB warns Russian businesses to up their security game--the Americans are coming. SonicWall’s investigation of a possible cyberattack. DIA and commercial data brokers. OPC issues. Robota. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1255</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Russia’s FSB warns businesses to be on the lookout for American cyberattacks after the White House says it’s reserving its right to respond to the Solorigate cyberespionage campaign. SonicWall investigates an apparent compromise of its systems. Senator asks the US DNI for an explanation of DIA purchases of geolocation data from commercial vendors. OPC issues described. Andrea Little Limbago from Interos on the tech "naughty list" of restricted or sanctioned companies. Rick Howard previews his first principles analysis of Microsoft Azure. And a happy birthday to the word “robot,” now one-hundred years young.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/15
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russia’s FSB warns businesses to be on the lookout for American cyberattacks after the White House says it’s reserving its right to respond to the Solorigate cyberespionage campaign. SonicWall investigates an apparent compromise of its systems. Senator asks the US DNI for an explanation of DIA purchases of geolocation data from commercial vendors. OPC issues described. Andrea Little Limbago from Interos on the tech "naughty list" of restricted or sanctioned companies. Rick Howard previews his first principles analysis of Microsoft Azure. And a happy birthday to the word “robot,” now one-hundred years young.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/15</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1558</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0042a35e-364d-11eb-b082-3f342cb16bc6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4823406617.mp3?updated=1690220908" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ben Yelin: A detour could be a sliding door moment. [Policy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/33/notes</link>
      <description>Program Director for Public Policy and External Affairs at the University of Maryland's Center for Health and Homeland Security Ben Yelin shares his journey from political junkie to Fourth Amendment specialist. Several significant life defining political developments like the disputed 2000 election, 9/11, and the Iraqi war occurred during his formative years that shaped Ben's interest in public policy and his desire to pursue a degree in law. An opportunity to be a teaching assistant turned out to be one of those sliding door scenarios that led Ben to where he is now, a lawyer in the academic and consulting worlds specializing in cybersecurity and digital privacy issues. Through his work, Ben hopes to elevate the course of the debate on these very important issues. And, we thank Ben for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 24 Jan 2021 08:00:00 -0000</pubDate>
      <itunes:title>Ben Yelin: A detour could be a sliding door moment. [Policy] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>33</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Program Director for Public Policy and External Affairs Ben Yelin shares his journey from political junkie to Fourth Amendment specialist.</itunes:subtitle>
      <itunes:summary>Program Director for Public Policy and External Affairs at the University of Maryland's Center for Health and Homeland Security Ben Yelin shares his journey from political junkie to Fourth Amendment specialist. Several significant life defining political developments like the disputed 2000 election, 9/11, and the Iraqi war occurred during his formative years that shaped Ben's interest in public policy and his desire to pursue a degree in law. An opportunity to be a teaching assistant turned out to be one of those sliding door scenarios that led Ben to where he is now, a lawyer in the academic and consulting worlds specializing in cybersecurity and digital privacy issues. Through his work, Ben hopes to elevate the course of the debate on these very important issues. And, we thank Ben for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Program Director for Public Policy and External Affairs at the University of Maryland's Center for Health and Homeland Security Ben Yelin shares his journey from political junkie to Fourth Amendment specialist. Several significant life defining political developments like the disputed 2000 election, 9/11, and the Iraqi war occurred during his formative years that shaped Ben's interest in public policy and his desire to pursue a degree in law. An opportunity to be a teaching assistant turned out to be one of those sliding door scenarios that led Ben to where he is now, a lawyer in the academic and consulting worlds specializing in cybersecurity and digital privacy issues. Through his work, Ben hopes to elevate the course of the debate on these very important issues. And, we thank Ben for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>336</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[08bf87c2-5cfe-11eb-97af-33e42d146655]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6780205685.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trickbot may be down, but can we count it out? [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/167/notes</link>
      <description>Guest Mark Arena from Intel471 joins us to discuss his team's research into Trickbot and its evolution from a banking trojan to a long-standing, most likely well-resourced operation that was taken down last year. Mark shares some insight into Trickbot's order of operations and what went on behind the scenes that his team working with Brian Krebs were able to discover.
Since the separate and independent actions taken against Trickbot, Intel471 has observed successful disruption of its command and control infrastructure. However, the actors linked to Trickbot have not ceased their criminal activities. These actors have continued engaging in ransomware activity, using BazarLoader instead of Trickbot. Intel471 is unable to assess the long-term impact of the Trickbot disruption activity or whether Trickbot will continue to be used by cybercrime groups. This analysis covers the period from Sept. 22, 2020 until Nov. 6, 2020.
The research can be found here:
Trickbot down, but is it out?

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Jan 2021 08:00:00 -0000</pubDate>
      <itunes:title>Trickbot may be down, but can we count it out? [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>167</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Mark Arena from Intel471 joins us to discuss his team's research into Trickbot and its evolution from a banking trojan to a long-standing, most likely well-resourced operation that was taken down last year. Mark shares some insight into Trickbot's order of operations and what went on behind the scenes that his team working with Brian Krebs were able to discover.
Since the separate and independent actions taken against Trickbot, Intel471 has observed successful disruption of its command and control infrastructure. However, the actors linked to Trickbot have not ceased their criminal activities. These actors have continued engaging in ransomware activity, using BazarLoader instead of Trickbot. Intel471 is unable to assess the long-term impact of the Trickbot disruption activity or whether Trickbot will continue to be used by cybercrime groups. This analysis covers the period from Sept. 22, 2020 until Nov. 6, 2020.
The research can be found here:
Trickbot down, but is it out?

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Mark Arena from Intel471 joins us to discuss his team's research into Trickbot and its evolution from a banking trojan to a long-standing, most likely well-resourced operation that was taken down last year. Mark shares some insight into Trickbot's order of operations and what went on behind the scenes that his team working with Brian Krebs were able to discover.</p><p>Since the separate and independent actions taken against Trickbot, Intel471 has observed successful disruption of its command and control infrastructure. However, the actors linked to Trickbot have not ceased their criminal activities. These actors have continued engaging in ransomware activity, using BazarLoader instead of Trickbot. Intel471 is unable to assess the long-term impact of the Trickbot disruption activity or whether Trickbot will continue to be used by cybercrime groups. This analysis covers the period from Sept. 22, 2020 until Nov. 6, 2020.</p><p>The research can be found here:</p><ul><li><a href="https://intel471.com/blog/trickbot-update-november-2020-bazar-loader-microsoft/">Trickbot down, but is it out?</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1188</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ded056d0-5cfd-11eb-9c35-2b92db8a41d0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4666887535.mp3?updated=1685109027" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Implications of Solorigate’s circumspection. RBNZ cleans data sources. Gamarue in student laptops. Dodgy apps. Ransom DDoS surges. Securing the President’s Peloton. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1254/notes</link>
      <description>Twice, it’s maybe an indicator. Once, it’s nuthin’ at all...to the machines. The Reserve Bank of New Zealand works to clean up its data sources. Wormy student laptops. Daily Food Diary is a glutton for your data. Ransom DDoS. Caleb Barlow examines how we handle disinformation in our runbooks and response plans. Our guest Ron Gula from Gula Tech Adventures shares his thoughts on proper public cyber response to the SolarWinds attack. And should we worry about that White House Peloton?
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/14
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 22 Jan 2021 20:20:00 -0000</pubDate>
      <itunes:title>Implications of Solorigate’s circumspection. RBNZ cleans data sources. Gamarue in student laptops. Dodgy apps. Ransom DDoS surges. Securing the President’s Peloton. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1254</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Twice, it’s maybe an indicator. Once, it’s nuthin’ at all...to the machines. The Reserve Bank of New Zealand works to clean up its data sources. Wormy student laptops. Daily Food Diary is a glutton for your data. Ransom DDoS. Caleb Barlow examines how we handle disinformation in our runbooks and response plans. Our guest Ron Gula from Gula Tech Adventures shares his thoughts on proper public cyber response to the SolarWinds attack. And should we worry about that White House Peloton?
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/14
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Twice, it’s maybe an indicator. Once, it’s nuthin’ at all...to the machines. The Reserve Bank of New Zealand works to clean up its data sources. Wormy student laptops. Daily Food Diary is a glutton for your data. Ransom DDoS. Caleb Barlow examines how we handle disinformation in our runbooks and response plans. Our guest Ron Gula from Gula Tech Adventures shares his thoughts on proper public cyber response to the SolarWinds attack. And should we worry about that White House Peloton?</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/14</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1681</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[013b58aa-364d-11eb-b082-ef86f2973cf8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1509265133.mp3?updated=1690220893" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Solorigate’s stealthy, careful operators. LuckyBoy malvertising. BEC as reconnaissance? Remote work and leaky sites. And good riddance to the Joker’s Stash. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1253/notes</link>
      <description>Microsoft researchers detail the lengths to which the Solorigate threat actor went to stay undetected and establish persistence. LuckyBoy malvertising is described. Business email compromise as a reconnaissance technique? More reminders about the risks that accompany remote work. Ben Yelin looks at cyber policy issues facing the Biden administration. Rick Howard speaks with Frank Duff from Mitre on their ATT&amp;CK Evaluation Program. And good riddance to the Joker’s Stash (we hope).
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/13
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 21 Jan 2021 20:45:00 -0000</pubDate>
      <itunes:title>Solorigate’s stealthy, careful operators. LuckyBoy malvertising. BEC as reconnaissance? Remote work and leaky sites. And good riddance to the Joker’s Stash. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1253</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Microsoft researchers detail the lengths to which the Solorigate threat actor went to stay undetected and establish persistence. LuckyBoy malvertising is described. Business email compromise as a reconnaissance technique? More reminders about the risks that accompany remote work. Ben Yelin looks at cyber policy issues facing the Biden administration. Rick Howard speaks with Frank Duff from Mitre on their ATT&amp;CK Evaluation Program. And good riddance to the Joker’s Stash (we hope).
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/13
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft researchers detail the lengths to which the Solorigate threat actor went to stay undetected and establish persistence. LuckyBoy malvertising is described. Business email compromise as a reconnaissance technique? More reminders about the risks that accompany remote work. Ben Yelin looks at cyber policy issues facing the Biden administration. Rick Howard speaks with Frank Duff from Mitre on their ATT&amp;CK Evaluation Program. And good riddance to the Joker’s Stash (we hope).</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/13</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1445</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00e6ce02-364d-11eb-b082-7fce1d0fedcf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2659774614.mp3?updated=1690220869" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More on that Solorigate threat actor, especially its non-SolarWinds activity. Chimera’s new target list. Executive Order on reducing IaaS exploitation. The case of the stolen laptop. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1252/notes</link>
      <description>Another security company discloses a brush with the threat actor behind Solorigate. Advice on hardening Microsoft 365 against that same threat actor. Chimera turns out to be interested in airlines as well as semiconductor manufacturing intellectual property. Former President Trump’s last Executive Order addresses foreign exploitation of Infrastructure-as-a-Service products. Joe Carrigan looks at a hardware key vulnerability. Our guest is Chris Eng from Veracode with insights from their State of Software Security report. And investigation of that laptop stolen from the Capitol continues.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/12
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 20 Jan 2021 20:12:29 -0000</pubDate>
      <itunes:title>More on that Solorigate threat actor, especially its non-SolarWinds activity. Chimera’s new target list. Executive Order on reducing IaaS exploitation. The case of the stolen laptop. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1252</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Another security company discloses a brush with the threat actor behind Solorigate. Advice on hardening Microsoft 365 against that same threat actor. Chimera turns out to be interested in airlines as well as semiconductor manufacturing intellectual property. Former President Trump’s last Executive Order addresses foreign exploitation of Infrastructure-as-a-Service products. Joe Carrigan looks at a hardware key vulnerability. Our guest is Chris Eng from Veracode with insights from their State of Software Security report. And investigation of that laptop stolen from the Capitol continues.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/12
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Another security company discloses a brush with the threat actor behind Solorigate. Advice on hardening Microsoft 365 against that same threat actor. Chimera turns out to be interested in airlines as well as semiconductor manufacturing intellectual property. Former President Trump’s last Executive Order addresses foreign exploitation of Infrastructure-as-a-Service products. Joe Carrigan looks at a hardware key vulnerability. Our guest is Chris Eng from Veracode with insights from their State of Software Security report. And investigation of that laptop stolen from the Capitol continues.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/12</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1382</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00b53766-364d-11eb-b082-df4b8b637482]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1468102108.mp3?updated=1690220855" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>EMA emails altered before release in apparent disinformation effort. Vishing rising. Another backdoor found in SolarWinds supply chain campaign. An arrest and a stolen laptop. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1251/notes</link>
      <description>The European Medicines Agency says stolen emails about vaccine development were altered before being dumped online. Another backdoor is found associated with the SolarWinds supply chain campaign. DNS cache poisoning vulnerabilities are described. FBI renews warnings about vishing. Iran’s “Enemies of the People” disinformation campaign. Vishing is up. Rick Howard previews his hashtable discussion on Solarigate. Verizon’s Chris Novak looks at cyber espionage. And the FBI makes an arrest in connection with a laptop taken during the Capitol Hill riot.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/10/11
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Jan 2021 21:10:00 -0000</pubDate>
      <itunes:title>EMA emails altered before release in apparent disinformation effort. Vishing rising. Another backdoor found in SolarWinds supply chain campaign. An arrest and a stolen laptop. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1251</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The European Medicines Agency says stolen emails about vaccine development were altered before being dumped online. Another backdoor is found associated with the SolarWinds supply chain campaign. DNS cache poisoning vulnerabilities are described. FBI renews warnings about vishing. Iran’s “Enemies of the People” disinformation campaign. Vishing is up. Rick Howard previews his hashtable discussion on Solarigate. Verizon’s Chris Novak looks at cyber espionage. And the FBI makes an arrest in connection with a laptop taken during the Capitol Hill riot.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/10/11
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The European Medicines Agency says stolen emails about vaccine development were altered before being dumped online. Another backdoor is found associated with the SolarWinds supply chain campaign. DNS cache poisoning vulnerabilities are described. FBI renews warnings about vishing. Iran’s “Enemies of the People” disinformation campaign. Vishing is up. Rick Howard previews his hashtable discussion on Solarigate. Verizon’s Chris Novak looks at cyber espionage. And the FBI makes an arrest in connection with a laptop taken during the Capitol Hill riot.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><br></p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/11</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1385</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00637cc8-364d-11eb-b082-4b46751d10da]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6546919040.mp3?updated=1690220837" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: You will pay for that one way or another. [Caveat]</title>
      <link>https://thecyberwire.com/podcasts/caveat/26/notes</link>
      <description>Dave's got the story of a landlord who may run afoul of the Computer Fraud and Abuse Act, Ben wonders if the big tech CEOs could be held liable for contact tracking apps, and later in the show my conversation with Joseph Cox. He is a Senior Staff Writer at Motherboard and will be discussing his recent article How Big Companies Spy on Your Emails.
While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. 
Links to stories:

Apple and Google CEOs should be held responsible for protecting coronavirus tracking data, says GOP Sen. Hawley

The twitter thread from Dave's story


Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com or simply leave us a message at (410) 618-3720. Hope to hear from you.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 18 Jan 2021 06:00:00 -0000</pubDate>
      <itunes:title>Encore: You will pay for that one way or another. [Caveat]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Dave's got the story of a landlord who may run afoul of the Computer Fraud and Abuse Act, Ben wonders if the big tech CEOs could be held liable for contact tracking apps, and later in the show my conversation with Joseph Cox. He is a Senior Staff...</itunes:subtitle>
      <itunes:summary>Dave's got the story of a landlord who may run afoul of the Computer Fraud and Abuse Act, Ben wonders if the big tech CEOs could be held liable for contact tracking apps, and later in the show my conversation with Joseph Cox. He is a Senior Staff Writer at Motherboard and will be discussing his recent article How Big Companies Spy on Your Emails.
While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. 
Links to stories:

Apple and Google CEOs should be held responsible for protecting coronavirus tracking data, says GOP Sen. Hawley

The twitter thread from Dave's story


Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com or simply leave us a message at (410) 618-3720. Hope to hear from you.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave's got the story of a landlord who may run afoul of the Computer Fraud and Abuse Act, Ben wonders if the big tech CEOs could be held liable for contact tracking apps, and later in the show my conversation with Joseph Cox. He is a Senior Staff Writer at Motherboard and will be discussing his recent article How Big Companies Spy on Your Emails.</p><p><em>While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. </em></p><p>Links to stories:</p><ul>
<li><a href="https://www.cnbc.com/2020/04/21/apple-google-ceos-should-be-liable-for-contact-tracing-data-hawley.html">Apple and Google CEOs should be held responsible for protecting coronavirus tracking data, says GOP Sen. Hawley</a></li>
<li><a href="https://twitter.com/casresistance/status/1251026094121078786?s=12">The twitter thread from Dave's story</a></li>
</ul><p><br></p><p>Got a question you'd like us to answer on our show? You can send your audio file to <a href="mailto:caveat@thecyberwire.com">caveat@thecyberwire.com</a> or simply leave us a message at (410) 618-3720. Hope to hear from you.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2169</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0a5ebba2-577c-11eb-84ad-0fc75e02cd7f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6225617898.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ann Johnson: Trying to make the world safer. [Business Development] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/32/notes</link>
      <description>Microsoft's Corporate Vice President of Cybersecurity Business Development Ann Johnson brings us on her career journey from aspiring lawyer to cybersecurity executive. After pivoting from studying law, Ann started working with computers and found she had a deep technical aptitude for technology and started earning certifications landing in cybersecurity because she found an interest in PKI. At Microsoft, Ann says she solves some of the hardest problems every day. She recommends getting a mentor and finding your area of expertise. She leaves us with three dimensions she hopes to be her legacy: 1. diversity in more than just gender, 2. bringing a human aspect to the industry, and 3. being empathetic to the user experience. We thank Ann for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 17 Jan 2021 08:00:00 -0000</pubDate>
      <itunes:title>Ann Johnson: Trying to make the world safer. [Business Development] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>32</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Microsoft's Corporate Vice President of Cybersecurity Business Development Ann Johnson brings us on her career path from aspiring lawyer to cybersecurity executive.</itunes:subtitle>
      <itunes:summary>Microsoft's Corporate Vice President of Cybersecurity Business Development Ann Johnson brings us on her career journey from aspiring lawyer to cybersecurity executive. After pivoting from studying law, Ann started working with computers and found she had a deep technical aptitude for technology and started earning certifications landing in cybersecurity because she found an interest in PKI. At Microsoft, Ann says she solves some of the hardest problems every day. She recommends getting a mentor and finding your area of expertise. She leaves us with three dimensions she hopes to be her legacy: 1. diversity in more than just gender, 2. bringing a human aspect to the industry, and 3. being empathetic to the user experience. We thank Ann for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft's Corporate Vice President of Cybersecurity Business Development Ann Johnson brings us on her career journey from aspiring lawyer to cybersecurity executive. After pivoting from studying law, Ann started working with computers and found she had a deep technical aptitude for technology and started earning certifications landing in cybersecurity because she found an interest in PKI. At Microsoft, Ann says she solves some of the hardest problems every day. She recommends getting a mentor and finding your area of expertise. She leaves us with three dimensions she hopes to be her legacy: 1. diversity in more than just gender, 2. bringing a human aspect to the industry, and 3. being empathetic to the user experience. We thank Ann for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>332</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7181880-577b-11eb-84ad-cf0671c71490]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8029544857.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Manufacturing sector is increasingly a target for adversaries. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/166/notes</link>
      <description>Guest Selena Larson, senior cyber threat analyst at Dragos, Inc., joins us to discuss their research into recent observations of ICS-targeting threats to manufacturing organizations. 
Cyber risk to the manufacturing sector is increasing, led by disruptive cyberattacks impacting industrial processes, intrusions enabling information gathering and process information theft, and new activity from Industrial Control Systems (ICS)-targeting adversaries. Dragos currently publicly tracks five ICS-focused activity groups targeting manufacturing: CHRYSENE, PARISITE, MAGNALLIUM, WASSONITE, and XENOTIME in addition to various ransomware activities capable of disrupting operations. 
Manufacturing relies on ICS to scale, function, and ensure consistent quality control and product safety. It provides crucial materials, products, and medicine and is classified as critical infrastructure. Due to the interconnected nature of facilities and operations, an attack on a manufacturing entity can have ripple effects across the supply chain that relies on timely and precise production to support product fulfillment, health and safety, and national security objectives. 
Ransomware adversaries are adopting ICS-aware functionality with the ability to stop industrial related processes and cause disruptive – and potentially destructive – impacts. Dragos has not observed ICS-specific malware targeting manufacturing operations on the same scale or sophistication as that used in the disruptive TRISIS and CRASHOVERRIDE malware attacks that targeted energy operations in Saudi Arabia and Ukraine, respectively. However, known and ongoing threats to manufacturing can have direct and indirect impact to operations. This report provides a snapshot of the threat landscape as of October 2020 and is expected to change in the future as adversaries and their behaviors evolve. 
The research can be found here:
ICS Threat Activity on the Rise in Manufacturing Sector

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Jan 2021 08:00:00 -0000</pubDate>
      <itunes:title>Manufacturing sector is increasingly a target for adversaries. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>166</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Guest Selena Larson, senior cyber threat analyst at Dragos, Inc., joins us to discuss their research into recent observations of ICS-targeting threats to manufacturing organizations. 
Cyber risk to the manufacturing sector is increasing, led by disruptive cyberattacks impacting industrial processes, intrusions enabling information gathering and process information theft, and new activity from Industrial Control Systems (ICS)-targeting adversaries. Dragos currently publicly tracks five ICS-focused activity groups targeting manufacturing: CHRYSENE, PARISITE, MAGNALLIUM, WASSONITE, and XENOTIME in addition to various ransomware activities capable of disrupting operations. 
Manufacturing relies on ICS to scale, function, and ensure consistent quality control and product safety. It provides crucial materials, products, and medicine and is classified as critical infrastructure. Due to the interconnected nature of facilities and operations, an attack on a manufacturing entity can have ripple effects across the supply chain that relies on timely and precise production to support product fulfillment, health and safety, and national security objectives. 
Ransomware adversaries are adopting ICS-aware functionality with the ability to stop industrial related processes and cause disruptive – and potentially destructive – impacts. Dragos has not observed ICS-specific malware targeting manufacturing operations on the same scale or sophistication as that used in the disruptive TRISIS and CRASHOVERRIDE malware attacks that targeted energy operations in Saudi Arabia and Ukraine, respectively. However, known and ongoing threats to manufacturing can have direct and indirect impact to operations. This report provides a snapshot of the threat landscape as of October 2020 and is expected to change in the future as adversaries and their behaviors evolve. 
The research can be found here:
ICS Threat Activity on the Rise in Manufacturing Sector

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Guest Selena Larson, senior cyber threat analyst at Dragos, Inc., joins us to discuss their research into recent observations of ICS-targeting threats to manufacturing organizations. </p><p>Cyber risk to the manufacturing sector is increasing, led by disruptive cyberattacks impacting industrial processes, intrusions enabling information gathering and process information theft, and new activity from Industrial Control Systems (ICS)-targeting adversaries. Dragos currently publicly tracks five ICS-focused activity groups targeting manufacturing: CHRYSENE, PARISITE, MAGNALLIUM, WASSONITE, and XENOTIME in addition to various ransomware activities capable of disrupting operations. </p><p>Manufacturing relies on ICS to scale, function, and ensure consistent quality control and product safety. It provides crucial materials, products, and medicine and is classified as critical infrastructure. Due to the interconnected nature of facilities and operations, an attack on a manufacturing entity can have ripple effects across the supply chain that relies on timely and precise production to support product fulfillment, health and safety, and national security objectives. </p><p>Ransomware adversaries are adopting ICS-aware functionality with the ability to stop industrial related processes and cause disruptive – and potentially destructive – impacts. Dragos has not observed ICS-specific malware targeting manufacturing operations on the same scale or sophistication as that used in the disruptive TRISIS and CRASHOVERRIDE malware attacks that targeted energy operations in Saudi Arabia and Ukraine, respectively. However, known and ongoing threats to manufacturing can have direct and indirect impact to operations. This report provides a snapshot of the threat landscape as of October 2020 and is expected to change in the future as adversaries and their behaviors evolve. </p><p>The research can be found here:</p><ul><li><a href="https://www.dragos.com/blog/industry-news/manufacturing-sector-cyber-threats/">ICS Threat Activity on the Rise in Manufacturing Sector</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1472</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d767e228-577b-11eb-8a22-a7915eb01b5c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8197751776.mp3?updated=1685109019" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Charming Kitten’s smishing and phishing. Solorigate updates. Supply chain attacks and the convergence of espionage and crime. Greed-bait. Ring patches bug. Best practices from NSA, CISA. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1250/notes</link>
      <description>Well-constructed phishing and smishing are reported out of Tehran. Estimates of SolarWinds compromise insurance payouts. Notes from industry on the convergence of criminal and espionage TTPs. Social engineering hooks baited with greed. Ring patches a bug that could have exposed users’ geolocation (and their reports of crime). Advice on cyber best practices from CISA and NSA. Robert M. Lee has thoughts for the incoming Biden administration. Our guest is Sir David Omand, former Director of GCHQ, on his book, How Spies Think: Ten Lessons in Intelligence. And an ethics officer is accused of cyberstalking.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/10
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 15 Jan 2021 20:35:00 -0000</pubDate>
      <itunes:title>Charming Kitten’s smishing and phishing. Solorigate updates. Supply chain attacks and the convergence of espionage and crime. Greed-bait. Ring patches bug. Best practices from NSA, CISA. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1250</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Well-constructed phishing and smishing are reported out of Tehran. Estimates of SolarWinds compromise insurance payouts. Notes from industry on the convergence of criminal and espionage TTPs. Social engineering hooks baited with greed. Ring patches a bug that could have exposed users’ geolocation (and their reports of crime). Advice on cyber best practices from CISA and NSA. Robert M. Lee has thoughts for the incoming Biden administration. Our guest is Sir David Omand, former Director of GCHQ, on his book, How Spies Think: Ten Lessons in Intelligence. And an ethics officer is accused of cyberstalking.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/10
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Well-constructed phishing and smishing are reported out of Tehran. Estimates of SolarWinds compromise insurance payouts. Notes from industry on the convergence of criminal and espionage TTPs. Social engineering hooks baited with greed. Ring patches a bug that could have exposed users’ geolocation (and their reports of crime). Advice on cyber best practices from CISA and NSA. Robert M. Lee has thoughts for the incoming Biden administration. Our guest is Sir David Omand, former Director of GCHQ, on his book, How Spies Think: Ten Lessons in Intelligence. And an ethics officer is accused of cyberstalking.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/10</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1561</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[012ab25c-364d-11eb-b082-67248392c63f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2941647808.mp3?updated=1690220821" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SideWinder and South Asian cyberespionage. Project Zero and motivation to patch. CISA’s advice for cloud security. Classiscam in the criminal-to-criminal market. SolarLeaks misdirection? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1249/notes</link>
      <description>There are other things going on besides Solorigate and deplatforming. There’s news about the SideWinder threat actor and its interest in South Asian cyberespionage targets. Google’s Project Zero describes a complex and expensive criminal effort. CISA discusses threats to cloud users, and offers some security recommendations. A scam-as-a-service affiliate network spreads from Russia to Europe and North America. Awais Rashid looks at shadow security. Our own Rick Howard speaks with Christopher Ahlberg from Recorded Future on Cyber Threat Intelligence. And SolarLeaks looks more like misdirection, Guccifer 2.0-style.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/9
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 14 Jan 2021 21:20:00 -0000</pubDate>
      <itunes:title>SideWinder and South Asian cyberespionage. Project Zero and motivation to patch. CISA’s advice for cloud security. Classiscam in the criminal-to-criminal market. SolarLeaks misdirection? </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1249</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>There are other things going on besides Solorigate and deplatforming. There’s news about the SideWinder threat actor and its interest in South Asian cyberespionage targets. Google’s Project Zero describes a complex and expensive criminal effort. CISA discusses threats to cloud users, and offers some security recommendations. A scam-as-a-service affiliate network spreads from Russia to Europe and North America. Awais Rashid looks at shadow security. Our own Rick Howard speaks with Christopher Ahlberg from Recorded Future on Cyber Threat Intelligence. And SolarLeaks looks more like misdirection, Guccifer 2.0-style.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/9
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>There are other things going on besides Solorigate and deplatforming. There’s news about the SideWinder threat actor and its interest in South Asian cyberespionage targets. Google’s Project Zero describes a complex and expensive criminal effort. CISA discusses threats to cloud users, and offers some security recommendations. A scam-as-a-service affiliate network spreads from Russia to Europe and North America. Awais Rashid looks at shadow security. Our own Rick Howard speaks with Christopher Ahlberg from Recorded Future on Cyber Threat Intelligence. And SolarLeaks looks more like misdirection, Guccifer 2.0-style.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/9</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1519</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00f770d6-364d-11eb-b082-bfdfb6a4bbb9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7005303061.mp3?updated=1690220798" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Looking for that threat actor “likely based in Russia.” SolarLeaks and a probably bogus offer of stolen files. Notes on Patch Tuesday.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1248/notes</link>
      <description>Speculation grows that the Solarigate threat actors were also behind the Mimecast compromise. SolarLeaks says it has the goods taken from FireEye and SolarWinds, but caveat emptor. Notes on Patch Tuesday. Joe Carrigan has thoughts on a WhatsApp ultimatum. Our guest is Andrew Cheung of 01 Communique with an update on quantum computing. And farewell to an infosec good guy.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/8
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 13 Jan 2021 21:30:00 -0000</pubDate>
      <itunes:title>Looking for that threat actor “likely based in Russia.” SolarLeaks and a probably bogus offer of stolen files. Notes on Patch Tuesday.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1248</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Speculation grows that the Solarigate threat actors were also behind the Mimecast compromise. SolarLeaks says it has the goods taken from FireEye and SolarWinds, but caveat emptor. Notes on Patch Tuesday. Joe Carrigan has thoughts on a WhatsApp ultimatum. Our guest is Andrew Cheung of 01 Communique with an update on quantum computing. And farewell to an infosec good guy.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/8
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Speculation grows that the Solarigate threat actors were also behind the Mimecast compromise. SolarLeaks says it has the goods taken from FireEye and SolarWinds, but caveat emptor. Notes on Patch Tuesday. Joe Carrigan has thoughts on a WhatsApp ultimatum. Our guest is Andrew Cheung of 01 Communique with an update on quantum computing. And farewell to an infosec good guy.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/8</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1341</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00a4eafa-364d-11eb-b082-dfd019f6040c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6706406711.mp3?updated=1690220766" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage campaign hits Colombia. New malware found in the SolarWinds incident. Mimecast certificates compromised. Ubiquiti tells users to reset passwords. Two wins for the good guys.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1247/notes</link>
      <description>A cyberespionage campaign, so far not attributed to any threat actor, continues to prospect government and industry targets in Colombia. A new bit of malware is found in the SolarWinds backdoor compromise. Mimecast certificates are compromised in another apparent software supply chain incident. Ubiquiti tells users to reset their passwords. A brief Capitol Hill riot update. Bidefender releases a free DarkSide ransomware decryptor. Ben Yelin revisits racial bias in facial recognition software. Our guest is Jessi Marcoff from Privitar on trend toward Chief People Officers. And Europol announces the takedown of the DarkMarket.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/7
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Jan 2021 21:00:00 -0000</pubDate>
      <itunes:title>Cyberespionage campaign hits Colombia. New malware found in the SolarWinds incident. Mimecast certificates compromised. Ubiquiti tells users to reset passwords. Two wins for the good guys.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1247</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A cyberespionage campaign, so far not attributed to any threat actor, continues to prospect government and industry targets in Colombia. A new bit of malware is found in the SolarWinds backdoor compromise. Mimecast certificates are compromised in another apparent software supply chain incident. Ubiquiti tells users to reset their passwords. A brief Capitol Hill riot update. Bidefender releases a free DarkSide ransomware decryptor. Ben Yelin revisits racial bias in facial recognition software. Our guest is Jessi Marcoff from Privitar on trend toward Chief People Officers. And Europol announces the takedown of the DarkMarket.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/7
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cyberespionage campaign, so far not attributed to any threat actor, continues to prospect government and industry targets in Colombia. A new bit of malware is found in the SolarWinds backdoor compromise. Mimecast certificates are compromised in another apparent software supply chain incident. Ubiquiti tells users to reset their passwords. A brief Capitol Hill riot update. Bidefender releases a free DarkSide ransomware decryptor. Ben Yelin revisits racial bias in facial recognition software. Our guest is Jessi Marcoff from Privitar on trend toward Chief People Officers. And Europol announces the takedown of the DarkMarket.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/7</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1466</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0074053e-364d-11eb-b082-3fef1e8263ec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1617140472.mp3?updated=1690220747" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More (ambiguous) evidence for attribution of Solorigate. CISA expands incident response advice. Inspiration, investigation, and deplatforming: notes from the Capitol Hill riot.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1246/notes</link>
      <description>Similarities are found between Sunburst backdoor code and malware used by Turla. CISA expands advice on dealing with Solorigate. Courts revert to paper...and USB drives. More members of the US Congress report devices stolen during last week’s riot. Online inspiration for violence seems distributed, not centralized. Caleb Barlow examines protocols for handling inbound intel. Rick Howard looks at Solorigate through the lens of first principles. And platforms as publishers?
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/6
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 11 Jan 2021 21:15:00 -0000</pubDate>
      <itunes:title>More (ambiguous) evidence for attribution of Solorigate. CISA expands incident response advice. Inspiration, investigation, and deplatforming: notes from the Capitol Hill riot.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1246</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Similarities are found between Sunburst backdoor code and malware used by Turla. CISA expands advice on dealing with Solorigate. Courts revert to paper...and USB drives. More members of the US Congress report devices stolen during last week’s riot. Online inspiration for violence seems distributed, not centralized. Caleb Barlow examines protocols for handling inbound intel. Rick Howard looks at Solorigate through the lens of first principles. And platforms as publishers?
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/6
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Similarities are found between Sunburst backdoor code and malware used by Turla. CISA expands advice on dealing with Solorigate. Courts revert to paper...and USB drives. More members of the US Congress report devices stolen during last week’s riot. Online inspiration for violence seems distributed, not centralized. Caleb Barlow examines protocols for handling inbound intel. Rick Howard looks at Solorigate through the lens of first principles. And platforms as publishers?</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/6</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1652</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00222156-364d-11eb-b082-93b77836453a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8457066446.mp3?updated=1690220733" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tom Gorup: Fail fast and fail forward. [Operations] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/31/notes</link>
      <description>Vice President of Security and Support Operations of Alert Logic Tom Gorup shares how his career path led him from tactics learned in Army infantry using machine guns and claymores to cybersecurity replacing the artillery with antivirus and firewalls. Tom built a security automation solution called the Grunt (in recollection of his role in the Army) that automated firewall blocks. He credits his experience in battle-planning for his expertise in applying strategic thinking to work in cybersecurity, noting that communication is key in both scenarios. Tom advises that those looking into a new career shouldn't shy away from failure as failure is just another opportunity to learn. We thank Tom for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 10 Jan 2021 08:00:00 -0000</pubDate>
      <itunes:title>Tom Gorup: Fail fast and fail forward. [Operations] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>31</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Vice President of Security and Support Operations Tom Gorup shares his experiences from infantry to cybersecurity. </itunes:subtitle>
      <itunes:summary>Vice President of Security and Support Operations of Alert Logic Tom Gorup shares how his career path led him from tactics learned in Army infantry using machine guns and claymores to cybersecurity replacing the artillery with antivirus and firewalls. Tom built a security automation solution called the Grunt (in recollection of his role in the Army) that automated firewall blocks. He credits his experience in battle-planning for his expertise in applying strategic thinking to work in cybersecurity, noting that communication is key in both scenarios. Tom advises that those looking into a new career shouldn't shy away from failure as failure is just another opportunity to learn. We thank Tom for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Vice President of Security and Support Operations of Alert Logic Tom Gorup shares how his career path led him from tactics learned in Army infantry using machine guns and claymores to cybersecurity replacing the artillery with antivirus and firewalls. Tom built a security automation solution called the Grunt (in recollection of his role in the Army) that automated firewall blocks. He credits his experience in battle-planning for his expertise in applying strategic thinking to work in cybersecurity, noting that communication is key in both scenarios. Tom advises that those looking into a new career shouldn't shy away from failure as failure is just another opportunity to learn. We thank Tom for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>314</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[17acc984-51e6-11eb-91c0-9f456127fbd0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7347453904.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Emotet reemerges and becomes one of most prolific threat groups out there. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/165/notes</link>
      <description>Deep Instinct's Shimon Oren joins us to talk about his team's research on "Why Emotet's latest wave is harder to catch than ever before - Part 2." Emotet appears to have reemerged more evasive than before, this time with a payload delivered from a loader that security tools aren’t equipped to handle.
Emotet, the largest malware botnet today, started in 2014 and continues to be one of the most challenging threats in today’s landscape. This botnet causes huge damage by spreading ransomware and info stealers to its infected systems. Recently, a rise in the number of Emotet infections was observed in France, Japan, and New Zealand. The high number of infections shows the effectiveness of the Emotet malware at staying undetected.
Shimon joins us to discuss how Deep Instinct investigated the payload that was encrypted inside the loader, analyzes the next steps in the infection process, and discovers the techniques used to make this malware difficult to analyze.
The original blog post and updated post on the research can be found here:

Emotet Analysis: Why Emotet’s Latest Wave is Harder to Catch than Ever Before

Why Emotet's latest wave is harder to catch than ever before - Part 2


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Jan 2021 08:00:00 -0000</pubDate>
      <itunes:title>Emotet reemerges and becomes one of most prolific threat groups out there. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>165</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Deep Instinct's Shimon Oren joins us to talk about his team's research on "Why Emotet's latest wave is harder to catch than ever before - Part 2." Emotet appears to have reemerged more evasive than before, this time with a payload delivered from a loader that security tools aren’t equipped to handle.
Emotet, the largest malware botnet today, started in 2014 and continues to be one of the most challenging threats in today’s landscape. This botnet causes huge damage by spreading ransomware and info stealers to its infected systems. Recently, a rise in the number of Emotet infections was observed in France, Japan, and New Zealand. The high number of infections shows the effectiveness of the Emotet malware at staying undetected.
Shimon joins us to discuss how Deep Instinct investigated the payload that was encrypted inside the loader, analyzes the next steps in the infection process, and discovers the techniques used to make this malware difficult to analyze.
The original blog post and updated post on the research can be found here:

Emotet Analysis: Why Emotet’s Latest Wave is Harder to Catch than Ever Before

Why Emotet's latest wave is harder to catch than ever before - Part 2


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Deep Instinct's Shimon Oren joins us to talk about his team's research on "Why Emotet's latest wave is harder to catch than ever before - Part 2." Emotet appears to have reemerged more evasive than before, this time with a payload delivered from a loader that security tools aren’t equipped to handle.</p><p>Emotet, the largest malware botnet today, started in 2014 and continues to be one of the most challenging threats in today’s landscape. This botnet causes huge damage by spreading ransomware and info stealers to its infected systems. Recently, a rise in the number of Emotet infections was observed in France, Japan, and New Zealand. The high number of infections shows the effectiveness of the Emotet malware at staying undetected.</p><p>Shimon joins us to discuss how Deep Instinct investigated the payload that was encrypted inside the loader, analyzes the next steps in the infection process, and discovers the techniques used to make this malware difficult to analyze.</p><p>The original blog post and updated post on the research can be found here:</p><ul>
<li><a href="https://www.deepinstinct.com/2020/08/12/why-emotets-latest-wave-is-harder-to-catch-than-ever-before/">Emotet Analysis: Why Emotet’s Latest Wave is Harder to Catch than Ever Before</a></li>
<li><a href="https://www.deepinstinct.com/2020/10/12/why-emotets-latest-wave-is-harder-to-catch-than-ever-before-part-2/">Why Emotet's latest wave is harder to catch than ever before - Part 2</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1475</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a5bd73f4-51dc-11eb-abf8-cfbf52f07da5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1695586332.mp3?updated=1685109011" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Solorigate cyberespionage campaign and sensitive corporate data. The cybersecurity implications of physical access during the Capitol Hill riot. Ransomware’s successful business model.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1245/notes</link>
      <description>Solorigate and its effect on sensitive corporate information. The DC riots show the cybersecurity consequences of brute physical access to systems. A North Korean APT resurfaces with the RokRat Trojan. Ransomware remains very lucrative, and why? Because people continue to pay up. Thomas Etheridge from CrowdStrike on The Role of Outside Counsel in the IR Process.Our guest is Larry Lunetta from Aruba HPE on how enterprises can bolster security in the era of hybrid work environments. And a criminal hacker gets twelve years in US Federal prison.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/8
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 08 Jan 2021 21:40:00 -0000</pubDate>
      <itunes:title>The Solorigate cyberespionage campaign and sensitive corporate data. The cybersecurity implications of physical access during the Capitol Hill riot. Ransomware’s successful business model.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1245</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Solorigate and its effect on sensitive corporate information. The DC riots show the cybersecurity consequences of brute physical access to systems. A North Korean APT resurfaces with the RokRat Trojan. Ransomware remains very lucrative, and why? Because people continue to pay up. Thomas Etheridge from CrowdStrike on The Role of Outside Counsel in the IR Process.Our guest is Larry Lunetta from Aruba HPE on how enterprises can bolster security in the era of hybrid work environments. And a criminal hacker gets twelve years in US Federal prison.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/8
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Solorigate and its effect on sensitive corporate information. The DC riots show the cybersecurity consequences of brute physical access to systems. A North Korean APT resurfaces with the RokRat Trojan. Ransomware remains very lucrative, and why? Because people continue to pay up. Thomas Etheridge from CrowdStrike on The Role of Outside Counsel in the IR Process.Our guest is Larry Lunetta from Aruba HPE on how enterprises can bolster security in the era of hybrid work environments. And a criminal hacker gets twelve years in US Federal prison.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/8</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1536</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01179e92-364d-11eb-b082-27d971af3bca]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1233587295.mp3?updated=1690220155" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA updates its alerts and directives concerning Solorigate as the investigation expands. Rioting, social media, and cybersecurity. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1244/notes</link>
      <description>CISA updates its guidance on Solorigate, and issues an alert that the threat actor may have used attack vectors other than the much-discussed SolarWinds backdoor. Some reports suggest that a widely used development tool produced by a Czech firm may have been compromised. The cyberespionage campaign is now known to have extended to the Department of Justice and the US Federal Courts. Robert M. Lee shares lessons learned from a recent power grid incident in Mumbai. Our guest is Yassir Abousselham from Splunk on how attackers find new ways to exploit emerging technologies. Cyber implications of the Capitol Hill riot.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/4
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 07 Jan 2021 20:45:00 -0000</pubDate>
      <itunes:title>CISA updates its alerts and directives concerning Solorigate as the investigation expands. Rioting, social media, and cybersecurity. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1244</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA updates its guidance on Solorigate, and issues an alert that the threat actor may have used attack vectors other than the much-discussed SolarWinds backdoor. Some reports suggest that a widely used development tool produced by a Czech firm may have been compromised. The cyberespionage campaign is now known to have extended to the Department of Justice and the US Federal Courts. Robert M. Lee shares lessons learned from a recent power grid incident in Mumbai. Our guest is Yassir Abousselham from Splunk on how attackers find new ways to exploit emerging technologies. Cyber implications of the Capitol Hill riot.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/4
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA updates its guidance on Solorigate, and issues an alert that the threat actor may have used attack vectors other than the much-discussed SolarWinds backdoor. Some reports suggest that a widely used development tool produced by a Czech firm may have been compromised. The cyberespionage campaign is now known to have extended to the Department of Justice and the US Federal Courts. Robert M. Lee shares lessons learned from a recent power grid incident in Mumbai. Our guest is Yassir Abousselham from Splunk on how attackers find new ways to exploit emerging technologies. Cyber implications of the Capitol Hill riot.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/4</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1421</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01079394-364d-11eb-b082-c72b745f3074]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6408279506.mp3?updated=1690220057" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Who worked through SolarWinds? An APT “likely Russian in origin,” says the US. Rattling backdoors, rifling cryptowallets, and asking victims if they’re ensured. No bail for Mr. Assange. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1243/notes</link>
      <description>The US Cyber Unified Coordination Group says the Solorigate APT is “likely Russian in origin.” Threat actors are scanning for systems potentially vulnerable to exploitation through a Zyxel backdoor. ElectroRAT targets crypto wallets. Babuk Locker is called the first new ransomware strain of 2021. The New York Stock Exchange re-reconsiders delisting three Chinese telcos. Joe Carrigan from Johns Hopkins joins us with the latest clever exploits from Ben Gurion University. Our guest is Jens Bothe from OTRS Group the importance of the US establishing standardized data privacy regulations. And Julain Assange is denied bail.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/3
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 06 Jan 2021 20:30:00 -0000</pubDate>
      <itunes:title>Who worked through SolarWinds? An APT “likely Russian in origin,” says the US. Rattling backdoors, rifling cryptowallets, and asking victims if they’re ensured. No bail for Mr. Assange. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1243</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The US Cyber Unified Coordination Group says the Solorigate APT is “likely Russian in origin.” Threat actors are scanning for systems potentially vulnerable to exploitation through a Zyxel backdoor. ElectroRAT targets crypto wallets. Babuk Locker is called the first new ransomware strain of 2021. The New York Stock Exchange re-reconsiders delisting three Chinese telcos. Joe Carrigan from Johns Hopkins joins us with the latest clever exploits from Ben Gurion University. Our guest is Jens Bothe from OTRS Group the importance of the US establishing standardized data privacy regulations. And Julain Assange is denied bail.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/3
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US Cyber Unified Coordination Group says the Solorigate APT is “likely Russian in origin.” Threat actors are scanning for systems potentially vulnerable to exploitation through a Zyxel backdoor. ElectroRAT targets crypto wallets. Babuk Locker is called the first new ransomware strain of 2021. The New York Stock Exchange re-reconsiders delisting three Chinese telcos. Joe Carrigan from Johns Hopkins joins us with the latest clever exploits from Ben Gurion University. Our guest is Jens Bothe from OTRS Group the importance of the US establishing standardized data privacy regulations. And Julain Assange is denied bail.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/3</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1482</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0094d62e-364d-11eb-b082-0f8b6d5507a5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5528637349.mp3?updated=1690220042" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>It’s not Kates and Vals over Ford Island, but it’s not just a tourist under diplomatic cover taking pictures of Battleship Row, either. Another APT side hustle? To delist or not to delist. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1242/notes</link>
      <description>More assessments of the Solorigate affair, with an excursus on Pearl Harbor. Shareholders open a class action suit against SolarWinds, but no signs of an enforcement action for speculated insider trading. Emissary Panda seems to be working an APT side hustle. Kevin Magee has insights from the Microsoft Digital Defense Report. Our guest is Jason Passwaters from Intel 471 with a look at the growing range of ransomware as a service offerings. And to-ing and fro-ing on Chinese telecoms at the New York Stock Exchange.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/2
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Jan 2021 20:35:00 -0000</pubDate>
      <itunes:title>It’s not Kates and Vals over Ford Island, but it’s not just a tourist under diplomatic cover taking pictures of Battleship Row, either. Another APT side hustle? To delist or not to delist. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1242</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>More assessments of the Solorigate affair, with an excursus on Pearl Harbor. Shareholders open a class action suit against SolarWinds, but no signs of an enforcement action for speculated insider trading. Emissary Panda seems to be working an APT side hustle. Kevin Magee has insights from the Microsoft Digital Defense Report. Our guest is Jason Passwaters from Intel 471 with a look at the growing range of ransomware as a service offerings. And to-ing and fro-ing on Chinese telecoms at the New York Stock Exchange.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/2
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>More assessments of the Solorigate affair, with an excursus on Pearl Harbor. Shareholders open a class action suit against SolarWinds, but no signs of an enforcement action for speculated insider trading. Emissary Panda seems to be working an APT side hustle. Kevin Magee has insights from the Microsoft Digital Defense Report. Our guest is Jason Passwaters from Intel 471 with a look at the growing range of ransomware as a service offerings. And to-ing and fro-ing on Chinese telecoms at the New York Stock Exchange.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/2</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1448</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00847504-364d-11eb-b082-c7f9b0334f1d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7257452471.mp3?updated=1690219445" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Threat actors were able to see Microsoft source code repositories. Zyxel closes a backdoor. Kawasaki discloses data exposure. Slack’s troubles. Julian Assange escapes extradition to the US. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1241/notes</link>
      <description>Updates on the spreading consequences of Solorigate, including Microsoft’s disclosure that threat actors gained access to source code repositories. A hard-coded backdoor is found in Zyxel firewalls and VPNs. Kawasaki Heavy Industries says parties unknown accessed sensitive corporate information. Slack has been having troubles today. Andrea Little Limbago from Interos on democracies aligning against global techno-dictators. Our guest is Drew Daniels from Druva with a look at the true value of data. And a British court declines to extradite WikiLeaks’ Julian Assange to the United States.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/1
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 04 Jan 2021 21:00:00 -0000</pubDate>
      <itunes:title>Threat actors were able to see Microsoft source code repositories. Zyxel closes a backdoor. Kawasaki discloses data exposure. Slack’s troubles. Julian Assange escapes extradition to the US. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1241</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Updates on the spreading consequences of Solorigate, including Microsoft’s disclosure that threat actors gained access to source code repositories. A hard-coded backdoor is found in Zyxel firewalls and VPNs. Kawasaki Heavy Industries says parties unknown accessed sensitive corporate information. Slack has been having troubles today. Andrea Little Limbago from Interos on democracies aligning against global techno-dictators. Our guest is Drew Daniels from Druva with a look at the true value of data. And a British court declines to extradite WikiLeaks’ Julian Assange to the United States.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/10/1
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Updates on the spreading consequences of Solorigate, including Microsoft’s disclosure that threat actors gained access to source code repositories. A hard-coded backdoor is found in Zyxel firewalls and VPNs. Kawasaki Heavy Industries says parties unknown accessed sensitive corporate information. Slack has been having troubles today. Andrea Little Limbago from Interos on democracies aligning against global techno-dictators. Our guest is Drew Daniels from Druva with a look at the true value of data. And a British court declines to extradite WikiLeaks’ Julian Assange to the United States.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/10/1</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1482</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[000adca8-364d-11eb-b082-cb154e476831]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4446361504.mp3?updated=1690219408" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ellen Sundra: Actions speak louder than words. [Engineering] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/30/notes</link>
      <description>Vice President of Global Systems Engineering Ellen Sundra shares her career path from life as a college grad who found her niche by creating a training program to a leader in cybersecurity. She realized that training and educating people was her passion. Ellen sees her value in providing soft skills as a natural balance to her technical team at Forescout Technologies. Being a woman in a male-dominated world proved to be a challenge and gaining her confidence to share her unique point of view helped her excel in it. Ellen recommends keeping your eyes open for how your skill set fits into cybersecurity. Find your perspective and really embrace it! We thank Ellen for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 03 Jan 2021 08:00:00 -0000</pubDate>
      <itunes:title>Ellen Sundra: Actions speak louder than words. [Engineering] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>30</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Vice President of Global Systems Engineering Ellen Sundra shares her career path development from computer science to cybersecurity. </itunes:subtitle>
      <itunes:summary>Vice President of Global Systems Engineering Ellen Sundra shares her career path from life as a college grad who found her niche by creating a training program to a leader in cybersecurity. She realized that training and educating people was her passion. Ellen sees her value in providing soft skills as a natural balance to her technical team at Forescout Technologies. Being a woman in a male-dominated world proved to be a challenge and gaining her confidence to share her unique point of view helped her excel in it. Ellen recommends keeping your eyes open for how your skill set fits into cybersecurity. Find your perspective and really embrace it! We thank Ellen for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Vice President of Global Systems Engineering Ellen Sundra shares her career path from life as a college grad who found her niche by creating a training program to a leader in cybersecurity. She realized that training and educating people was her passion. Ellen sees her value in providing soft skills as a natural balance to her technical team at Forescout Technologies. Being a woman in a male-dominated world proved to be a challenge and gaining her confidence to share her unique point of view helped her excel in it. Ellen recommends keeping your eyes open for how your skill set fits into cybersecurity. Find your perspective and really embrace it! We thank Ellen for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>349</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[58febe16-4565-11eb-8306-1bf843878085]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2131624833.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Unpacking the Malvertising Ecosystem. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/97/notes</link>
      <description>Researchers at Cisco's Talos Unit recently published research exploring the tactics, technics and procedures of the global malvertising ecosystem. Craig Williams is head of Talos Outreach at Cisco, and he guides us through the life cycle of malicious online ads, along with tips for protecting yourself and your organization.
The research can be found here: 
 https://blog.talosintelligence.com/2019/07/malvertising-deepdive.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Jan 2021 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Unpacking the Malvertising Ecosystem.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6e1080da-4607-11eb-8487-d78ffb364483/image/uploads_2F1608767554948-o0bgr22bx3m-f8b9875d3d82d5f3da35caff07052198_2FRS.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Cisco's Talos Unit recently published research exploring the tactics, technics and procedures of the global malvertising ecosystem. Craig Williams is head of Talos Outreach at Cisco, and he guides us through the life cycle of malicious online ads, along with tips for protecting yourself and your organization.
The research can be found here: 
 https://blog.talosintelligence.com/2019/07/malvertising-deepdive.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Cisco's Talos Unit recently published research exploring the tactics, technics and procedures of the global malvertising ecosystem. Craig Williams is head of Talos Outreach at Cisco, and he guides us through the life cycle of malicious online ads, along with tips for protecting yourself and your organization.</p><p>The research can be found here: </p><p><a href="https://blog.talosintelligence.com/2019/07/malvertising-deepdive.html"> https://blog.talosintelligence.com/2019/07/malvertising-deepdive.html</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1677</itunes:duration>
      <guid isPermaLink="false"><![CDATA[6e1080da-4607-11eb-8487-d78ffb364483]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4186361947.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Andy Greenberg on the Sandworm Indictments. [Interview Selects]</title>
      <description>This interview from November 6th, 2020 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Rick Howard speaks with Andy Greenberg on the Sandworm Indictments.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 01 Jan 2021 06:00:00 -0000</pubDate>
      <itunes:title>Andy Greenberg on the Sandworm Indictments. [Interview Selects]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>This interview from November 6th, 2020 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Rick Howard speaks with Andy Greenberg on the Sandworm Indictments.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This interview from November 6th, 2020 originally aired as a shortened version on the CyberWire Daily Podcast. In this extended interview, Rick Howard speaks with Andy Greenberg on the Sandworm Indictments.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1030</itunes:duration>
      <guid isPermaLink="false"><![CDATA[74261aaa-4604-11eb-a9b9-97447c90e7cf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2048610348.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Selena Larson: The Green Goldfish and cyber threat intelligence. [Analyst] (Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/10/notes</link>
      <description>Cyber threat intelligence analyst Selena Larson takes us on her career journey from being a journalist to making the switch to industrial security. As a child who wrote a book about a green goldfish who dealt with bullying, Selena always liked investigating and researching things. Specializing in cybersecurity journalism led to the realization of how closely aligned or similar skills are required from an investigative journalist and a cyber threat intelligence analyst. Our thanks to Selena for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 27 Dec 2020 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Selena Larson: The Green Goldfish and cyber threat intelligence. [Analyst] </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/e0cb7f98-4603-11eb-97eb-9b293ab7d305/image/uploads_2F1608767568057-evamrwyrlp7-a3bbc0d3438d924e663951248678a28a_2FCN.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyber threat intelligence analyst Selena Larson from journalist to industrial security.</itunes:subtitle>
      <itunes:summary>Cyber threat intelligence analyst Selena Larson takes us on her career journey from being a journalist to making the switch to industrial security. As a child who wrote a book about a green goldfish who dealt with bullying, Selena always liked investigating and researching things. Specializing in cybersecurity journalism led to the realization of how closely aligned or similar skills are required from an investigative journalist and a cyber threat intelligence analyst. Our thanks to Selena for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber threat intelligence analyst Selena Larson takes us on her career journey from being a journalist to making the switch to industrial security. As a child who wrote a book about a green goldfish who dealt with bullying, Selena always liked investigating and researching things. Specializing in cybersecurity journalism led to the realization of how closely aligned or similar skills are required from an investigative journalist and a cyber threat intelligence analyst. Our thanks to Selena for sharing her story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>430</itunes:duration>
      <guid isPermaLink="false"><![CDATA[e0cb7f98-4603-11eb-97eb-9b293ab7d305]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7063189295.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Seedworm digs Middle East intelligence. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/73/notes</link>
      <description>Researchers at Symantec have been tracking Seedworm, a cyber espionage group targeting the Middle East as well as Europe and North America. The threat group targets government agencies, oil &amp; gas facilities, NGOs, telecoms and IT firms.
Al Cooley is director of product management at Symantec, and he joins us to share their findings.
The original research can be found here:
 https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-group
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Dec 2020 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Seedworm digs Middle East intelligence.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5a6e1b2e-456b-11eb-bf14-6fbb6f7c4d77/image/uploads_2F1608767580429-35mhqgvnlvy-435d28d0095d6341f273be714b80c109_2FRS.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Symantec have been tracking Seedworm, a cyber espionage group targeting the Middle East as well as Europe and North America. The threat group targets government agencies, oil &amp; gas facilities, NGOs, telecoms and IT firms.
Al Cooley is director of product management at Symantec, and he joins us to share their findings.
The original research can be found here:
 https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-group
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Symantec have been tracking Seedworm, a cyber espionage group targeting the Middle East as well as Europe and North America. The threat group targets government agencies, oil &amp; gas facilities, NGOs, telecoms and IT firms.</p><p>Al Cooley is director of product management at Symantec, and he joins us to share their findings.</p><p>The original research can be found here:</p><p><a href="https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-group"> https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-group</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1107</itunes:duration>
      <guid isPermaLink="false"><![CDATA[44da19da-4579-11eb-8893-7bfecfcb8209]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2367392733.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Separating fools from money. [Hacking Humans]</title>
      <link>https://thecyberwire.com/podcasts/hacking-humans/5/notes</link>
      <description>Dave shares a story of airport penetration testing with high degree of yuck-factor. Joe explores research on protecting passwords from social engineering. The catch-of-the-day comes courtesy of Graham Cluley's email spam box. Dave interviews Wired's Security Staff Writer Lily Hay Newman on her  article tracking Nigerian email scammers. 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 25 Dec 2020 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Separating fools from money. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/d4a2a818-4577-11eb-8893-2fbc369c006d/image/uploads_2F1608767431691-drkh74waxxa-714c92dec1eb78d1ae31562cababe2e3_2FHH.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Encore: Separating fools from money. </itunes:subtitle>
      <itunes:summary>Dave shares a story of airport penetration testing with high degree of yuck-factor. Joe explores research on protecting passwords from social engineering. The catch-of-the-day comes courtesy of Graham Cluley's email spam box. Dave interviews Wired's Security Staff Writer Lily Hay Newman on her  article tracking Nigerian email scammers. 
Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave shares a story of airport penetration testing with high degree of yuck-factor. Joe explores research on protecting passwords from social engineering. The catch-of-the-day comes courtesy of Graham Cluley's email spam box. Dave interviews Wired's Security Staff Writer Lily Hay Newman on her <a href="https://www.wired.com/story/nigerian-email-scammers-more-effective-than-ever/"> article tracking Nigerian email scammers. </a></p><p>Have a Catch of the Day you'd like to share? Email it to us at <a href="mailto:hackinghumans@thecyberwire.com">hackinghumans@thecyberwire.com</a> or hit us up on <a href="https://twitter.com/HackingHumansCW">Twitter</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1802</itunes:duration>
      <guid isPermaLink="false"><![CDATA[234c7b00-4579-11eb-bcb0-df5b2ef888aa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5403948390.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Technology that allows cops to track your phone. [Caveat]</title>
      <link>https://thecyberwire.com/podcasts/caveat/47/notes</link>
      <description>Dave has an update on Baltimore’s spyplane, Ben describes concerns over violations by the FBI, CIA, NSA of FISA court rules, and later in the show our conversation with Kim Zetter on her recent article in The Intercept, titled “How Cops Can Secretly Track Your Phone.” It’s all about stingrays and dirtboxes, so stick around for that.
While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. 
Links to stories:
Elizabeth Goitein on Twitter
In appeals court, Baltimore surveillance plane suit gets a mixed reaction
Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com or simply leave us a message at (410) 618-3720. Hope to hear from you. 
Thanks to our sponsor, KnowBe4.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 24 Dec 2020 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Technology that allows cops to track your phone. [Caveat]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6e6d460e-4575-11eb-a8bf-17980bfd0399/image/uploads_2F1608767536840-689n655c143-b6217f443babf2c2294d4ee52b10d1c5_2FCV.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Encore: Technology that allows cops to track your phone. [Caveat]</itunes:subtitle>
      <itunes:summary>Dave has an update on Baltimore’s spyplane, Ben describes concerns over violations by the FBI, CIA, NSA of FISA court rules, and later in the show our conversation with Kim Zetter on her recent article in The Intercept, titled “How Cops Can Secretly Track Your Phone.” It’s all about stingrays and dirtboxes, so stick around for that.
While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. 
Links to stories:
Elizabeth Goitein on Twitter
In appeals court, Baltimore surveillance plane suit gets a mixed reaction
Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com or simply leave us a message at (410) 618-3720. Hope to hear from you. 
Thanks to our sponsor, KnowBe4.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave has an update on Baltimore’s spyplane, Ben describes concerns over violations by the FBI, CIA, NSA of FISA court rules, and later in the show our conversation with Kim Zetter on her recent article in The Intercept, titled “How Cops Can Secretly Track Your Phone.” It’s all about stingrays and dirtboxes, so stick around for that.</p><p><em>While this show covers legal topics, and Ben is a lawyer, the views expressed do not constitute legal advice. For official legal advice on any of the topics we cover, please contact your attorney. </em></p><p>Links to stories:</p><p><a href="https://twitter.com/LizaGoitein/status/1301970798190751745">Elizabeth Goitein on Twitter</a></p><p><a href="https://www.baltimorebrew.com/2020/09/11/in-appeals-court-baltimore-surveillance-plane-suit-gets-a-mixed-reaction/">In appeals court, Baltimore surveillance plane suit gets a mixed reaction</a></p><p>Got a question you'd like us to answer on our show? You can send your audio file to <a href="mailto:caveat@thecyberwire.com">caveat@thecyberwire.com</a> or simply leave us a message at (410) 618-3720. Hope to hear from you. </p><p>Thanks to our sponsor, <a href="https://www.knowbe4.com/">KnowBe4</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2948</itunes:duration>
      <guid isPermaLink="false"><![CDATA[fbf0ce76-4578-11eb-81d7-ff7e383a7e94]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7586632403.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cozy Bear: quiet and patient. Counting the costs of cyberespionage. Iranian influence campaign sought to inspire post-US-election violence. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1240/notes</link>
      <description>Cozy Bear lived up to its reputation for quiet patience. Counting the cost of the SVR cyberespionage campaign. What do intelligence services do with all the data they collect? An Iranian influence campaign sought to foment US post-election violence. Joe Carrigan looks at social engineering aimed at domain registrars. Our guest is John Worrall from ZeroNorth on the importance of security champions. And a last look ahead at 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 23 Dec 2020 21:00:00 -0000</pubDate>
      <itunes:title>Cozy Bear: quiet and patient. Counting the costs of cyberespionage. Iranian influence campaign sought to inspire post-US-election violence. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1240</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cozy Bear lived up to its reputation for quiet patience. Counting the cost of the SVR cyberespionage campaign. What do intelligence services do with all the data they collect? An Iranian influence campaign sought to foment US post-election violence. Joe Carrigan looks at social engineering aimed at domain registrars. Our guest is John Worrall from ZeroNorth on the importance of security champions. And a last look ahead at 2021.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cozy Bear lived up to its reputation for quiet patience. Counting the cost of the SVR cyberespionage campaign. What do intelligence services do with all the data they collect? An Iranian influence campaign sought to foment US post-election violence. Joe Carrigan looks at social engineering aimed at domain registrars. Our guest is John Worrall from ZeroNorth on the importance of security champions. And a last look ahead at 2021.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1585</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7f8080e-e18d-11ea-86a1-9b263eb1f33a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7725914997.mp3?updated=1690218554" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bear tracks all over the US Government’s networks. Pandas and Kittens and Bears, oh my... Emotet’s back. Spyware litigation. A few predictions. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1239/notes</link>
      <description>The US continues to count the cost of the SVR’s successful cyberespionage campaign. Attribution, and why it’s the TTPs and not the org chart that matters. Emotet makes an unhappy holiday return. It seems unlikely that NSA and US Cyber Command will be separated in the immediate future. Big Tech objects, in court, to NSO Group and its Pegasus spyware (or lawful intercept product, depending on whether you’re in the plaintiff’s or the respondent’s corner). Ben Yelin looks at hyper realistic masks designed to thwart facial recognition software. Our guest Neal Dennis from Cyware wonders if there really isn't a cybersecurity skills gap. And a quick look at some more predictions.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/245
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Dec 2020 21:00:00 -0000</pubDate>
      <itunes:title>Bear tracks all over the US Government’s networks. Pandas and Kittens and Bears, oh my... Emotet’s back. Spyware litigation. A few predictions. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1239</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The US continues to count the cost of the SVR’s successful cyberespionage campaign. Attribution, and why it’s the TTPs and not the org chart that matters. Emotet makes an unhappy holiday return. It seems unlikely that NSA and US Cyber Command will be separated in the immediate future. Big Tech objects, in court, to NSO Group and its Pegasus spyware (or lawful intercept product, depending on whether you’re in the plaintiff’s or the respondent’s corner). Ben Yelin looks at hyper realistic masks designed to thwart facial recognition software. Our guest Neal Dennis from Cyware wonders if there really isn't a cybersecurity skills gap. And a quick look at some more predictions.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/245
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US continues to count the cost of the SVR’s successful cyberespionage campaign. Attribution, and why it’s the TTPs and not the org chart that matters. Emotet makes an unhappy holiday return. It seems unlikely that NSA and US Cyber Command will be separated in the immediate future. Big Tech objects, in court, to NSO Group and its Pegasus spyware (or lawful intercept product, depending on whether you’re in the plaintiff’s or the respondent’s corner). Ben Yelin looks at hyper realistic masks designed to thwart facial recognition software. Our guest Neal Dennis from Cyware wonders if there really isn't a cybersecurity skills gap. And a quick look at some more predictions.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/245</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1649</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7fd4c7e-e18d-11ea-86a1-bffd5605c023]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1422555682.mp3?updated=1690218540" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sunburst looks worse: bad Bears in US networks, and that’s not just right at all. “Evil mobile emulator farm.” Report: Pegasus used against journalists.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1238/notes</link>
      <description>Cozy Bear’s big sweep through US networks gets bigger, longer, more carefully prepared, and worse in every way. IBM uncovers a big, conventionally criminal “evil mobile emulator farm,” and that’s no good, either. Citizen Lab finds more to complain about with respect to alleged abuse of NSO Group’s Pegasus tools. Awais Rashid from Bristol University on taking a risk-based approach to security. Rick Howard speaks with Cyral CEO Manav Mital on infrastructure as code. And tech executives are worried about Pandas and Bears and Kittens, oh my.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/244
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 21 Dec 2020 20:00:00 -0000</pubDate>
      <itunes:title>Sunburst looks worse: bad Bears in US networks, and that’s not just right at all. “Evil mobile emulator farm.” Report: Pegasus used against journalists.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1238</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cozy Bear’s big sweep through US networks gets bigger, longer, more carefully prepared, and worse in every way. IBM uncovers a big, conventionally criminal “evil mobile emulator farm,” and that’s no good, either. Citizen Lab finds more to complain about with respect to alleged abuse of NSO Group’s Pegasus tools. Awais Rashid from Bristol University on taking a risk-based approach to security. Rick Howard speaks with Cyral CEO Manav Mital on infrastructure as code. And tech executives are worried about Pandas and Bears and Kittens, oh my.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/244
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cozy Bear’s big sweep through US networks gets bigger, longer, more carefully prepared, and worse in every way. IBM uncovers a big, conventionally criminal “evil mobile emulator farm,” and that’s no good, either. Citizen Lab finds more to complain about with respect to alleged abuse of NSO Group’s Pegasus tools. Awais Rashid from Bristol University on taking a risk-based approach to security. Rick Howard speaks with Cyral CEO Manav Mital on infrastructure as code. And tech executives are worried about Pandas and Bears and Kittens, oh my.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/244</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1500</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c802a82c-e18d-11ea-86a1-5f309bee14dc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1292563105.mp3?updated=1690218514" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Robert Lee: Keeping the lights on. [ICS] [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/29/notes</link>
      <description>CEO and co-founder of Dragos Robert Lee talks about how he came to cybersecurity through industrial control systems. Growing up with parents in the Air Force, Robert's father tried to steer him away from military service. Still Rob chose to attend the Air Force Academy where he had greater exposure to computers through ICS. Robert finds his interest lies in things that impact the physical world around us. In his work, Dragos focuses on identifying what people are doing bad and helping people understand how to defend against that. Rob describes the possibility of making a jump to control system security from another area recommending you bring something to the table. Rob talks about the world he would like to leave to his son and his hopes for the future. We thank Rob for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 20 Dec 2020 08:00:00 -0000</pubDate>
      <itunes:title>Robert Lee: Keeping the lights on. [ICS] [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>29</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>CEO and co-founder of Dragos Robert Lee talks about how he came to cybersecurity through industrial control systems. </itunes:subtitle>
      <itunes:summary>CEO and co-founder of Dragos Robert Lee talks about how he came to cybersecurity through industrial control systems. Growing up with parents in the Air Force, Robert's father tried to steer him away from military service. Still Rob chose to attend the Air Force Academy where he had greater exposure to computers through ICS. Robert finds his interest lies in things that impact the physical world around us. In his work, Dragos focuses on identifying what people are doing bad and helping people understand how to defend against that. Rob describes the possibility of making a jump to control system security from another area recommending you bring something to the table. Rob talks about the world he would like to leave to his son and his hopes for the future. We thank Rob for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CEO and co-founder of Dragos Robert Lee talks about how he came to cybersecurity through industrial control systems. Growing up with parents in the Air Force, Robert's father tried to steer him away from military service. Still Rob chose to attend the Air Force Academy where he had greater exposure to computers through ICS. Robert finds his interest lies in things that impact the physical world around us. In his work, Dragos focuses on identifying what people are doing bad and helping people understand how to defend against that. Rob describes the possibility of making a jump to control system security from another area recommending you bring something to the table. Rob talks about the world he would like to leave to his son and his hopes for the future. We thank Rob for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>349</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0f94e6a0-4179-11eb-88f9-9bf11d189bdc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5971343365.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Advertising Software Development Kit (SDK): serving up more than just in-app ads and logging sensitive data. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/164/notes</link>
      <description>On August 24, 2020, Snyk announced the discovery of suspicious behaviors in the iOS version of a popular advertising SDK known as Mintegral. At that time, they had confirmed with partners in the advertising attribution space that at minimum, Mintegral appeared to be using this functionality to gather large amounts of data and commit ad attribution fraud. Their research showed that Mintegral was using code obfuscation and method swizzling to modify the functionality of base iOS SDK methods without the application owner’s knowledge. Further, their research proved that Mintegral was logging all HTTP requests including its headers which could even contain authorization tokens or other sensitive data.
Since that time Mintegral announced that they were opening the source of their SDK to the market. While the SDK can only be downloaded by registered partners, a major game publisher shared the source code with Snyk for further analysis. They also continued their research by digging deeper into the Android versions of the SDK in which they hadn’t found similar behaviors at the time of the initial disclosure. 
This has resulted in some significant discoveries that necessitate an update to the previous disclosure. Additionally, Mintegral and the community at large have responded to the situation, and Snyk felt a summary of the events was a good way to finalize their research into this SDK.
Joining us on Research Saturday to discuss their research is Snyk's Alyssa Miller.
The original blog and Snyk's update can be found here:

SourMint: malicious code, ad fraud, and data leak in iOS

SourMint: iOS remote code execution, Android findings, and community response


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Dec 2020 08:00:00 -0000</pubDate>
      <itunes:title>Advertising Software Development Kit (SDK): serving up more than just in-app ads and logging sensitive data. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>164</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On August 24, 2020, Snyk announced the discovery of suspicious behaviors in the iOS version of a popular advertising SDK known as Mintegral. At that time, they had confirmed with partners in the advertising attribution space that at minimum, Mintegral appeared to be using this functionality to gather large amounts of data and commit ad attribution fraud. Their research showed that Mintegral was using code obfuscation and method swizzling to modify the functionality of base iOS SDK methods without the application owner’s knowledge. Further, their research proved that Mintegral was logging all HTTP requests including its headers which could even contain authorization tokens or other sensitive data.
Since that time Mintegral announced that they were opening the source of their SDK to the market. While the SDK can only be downloaded by registered partners, a major game publisher shared the source code with Snyk for further analysis. They also continued their research by digging deeper into the Android versions of the SDK in which they hadn’t found similar behaviors at the time of the initial disclosure. 
This has resulted in some significant discoveries that necessitate an update to the previous disclosure. Additionally, Mintegral and the community at large have responded to the situation, and Snyk felt a summary of the events was a good way to finalize their research into this SDK.
Joining us on Research Saturday to discuss their research is Snyk's Alyssa Miller.
The original blog and Snyk's update can be found here:

SourMint: malicious code, ad fraud, and data leak in iOS

SourMint: iOS remote code execution, Android findings, and community response


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On August 24, 2020, Snyk announced the discovery of suspicious behaviors in the iOS version of a popular advertising SDK known as Mintegral. At that time, they had confirmed with partners in the advertising attribution space that at minimum, Mintegral appeared to be using this functionality to gather large amounts of data and commit ad attribution fraud. Their research showed that Mintegral was using code obfuscation and method swizzling to modify the functionality of base iOS SDK methods without the application owner’s knowledge. Further, their research proved that Mintegral was logging all HTTP requests including its headers which could even contain authorization tokens or other sensitive data.</p><p>Since that time Mintegral announced that they were opening the source of their SDK to the market. While the SDK can only be downloaded by registered partners, a major game publisher shared the source code with Snyk for further analysis. They also continued their research by digging deeper into the Android versions of the SDK in which they hadn’t found similar behaviors at the time of the initial disclosure. </p><p>This has resulted in some significant discoveries that necessitate an update to the previous disclosure. Additionally, Mintegral and the community at large have responded to the situation, and Snyk felt a summary of the events was a good way to finalize their research into this SDK.</p><p>Joining us on Research Saturday to discuss their research is Snyk's Alyssa Miller.</p><p>The original blog and Snyk's update can be found here:</p><ul>
<li><a href="https://snyk.io/blog/sourmint-malicious-code-ad-fraud-and-data-leak-in-ios/">SourMint: malicious code, ad fraud, and data leak in iOS</a></li>
<li><a href="https://snyk.io/blog/remote-code-execution-rce-sourmint/">SourMint: iOS remote code execution, Android findings, and community response</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1511</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[43eb2d24-407f-11eb-b761-6317983b6fc4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1873267109.mp3?updated=1685108181" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cozy Bear has been very successful at being very bad. Advice on dealing with the supply chain compromise. Joker’s Stash has its problems. And a few thoughts on the near future.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1237/notes</link>
      <description>Cozy Bear’s software supply chain compromise and its massive cyberespionage effort against the US Government and the associated private sector, is still being untangled. But it’s very extensive, very bad, and very tough to remediate. Both CISA and NSA have advice about the incident, and we check in with Robert M. Lee from Dragos for his thoughts. John Pescatore from SANS advocates renewing our focus on information security. Iran may be running a ransomware campaign for influence purposes. The Joker’s Stash criminal souk appears to have taken a hit. And don’t let your guard down during the holidays.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/243
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 18 Dec 2020 20:45:00 -0000</pubDate>
      <itunes:title>Cozy Bear has been very successful at being very bad. Advice on dealing with the supply chain compromise. Joker’s Stash has its problems. And a few thoughts on the near future.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1237</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cozy Bear’s software supply chain compromise and its massive cyberespionage effort against the US Government and the associated private sector, is still being untangled. But it’s very extensive, very bad, and very tough to remediate. Both CISA and NSA have advice about the incident, and we check in with Robert M. Lee from Dragos for his thoughts. John Pescatore from SANS advocates renewing our focus on information security. Iran may be running a ransomware campaign for influence purposes. The Joker’s Stash criminal souk appears to have taken a hit. And don’t let your guard down during the holidays.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/243
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cozy Bear’s software supply chain compromise and its massive cyberespionage effort against the US Government and the associated private sector, is still being untangled. But it’s very extensive, very bad, and very tough to remediate. Both CISA and NSA have advice about the incident, and we check in with Robert M. Lee from Dragos for his thoughts. John Pescatore from SANS advocates renewing our focus on information security. Iran may be running a ransomware campaign for influence purposes. The Joker’s Stash criminal souk appears to have taken a hit. And don’t let your guard down during the holidays.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/243</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1878</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7f2f4fe-e18d-11ea-86a1-a70e54f6e452]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5309419793.mp3?updated=1690218499" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The SVR’s exploitation of the SolarWinds software supply chain proves a very damaging cyberespionage campaign. HPE zero-day. Report on China’s influence ops delayed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1236/notes</link>
      <description>The SolarWinds supply chain compromise may not have been an act of war, but it was certainly a very damaging espionage effort. The FBI, CISA, and ODNI are leading a whole-of-government response to the incident. Three companies have collaborated on a killswitch for the Sunburst backdoor’s initial command and control. HPE discloses a zero day in its SIM software. ODNI will delay its report on Chinese election influence ops. Thomas Etheridge from CrowdStrike on their Services Front Lines report. Our guest is Derek Manky from Fortinet with 2021 threat insights. And, of course, some predictions.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/242
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 17 Dec 2020 20:55:00 -0000</pubDate>
      <itunes:title>The SVR’s exploitation of the SolarWinds software supply chain proves a very damaging cyberespionage campaign. HPE zero-day. Report on China’s influence ops delayed.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1236</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The SolarWinds supply chain compromise may not have been an act of war, but it was certainly a very damaging espionage effort. The FBI, CISA, and ODNI are leading a whole-of-government response to the incident. Three companies have collaborated on a killswitch for the Sunburst backdoor’s initial command and control. HPE discloses a zero day in its SIM software. ODNI will delay its report on Chinese election influence ops. Thomas Etheridge from CrowdStrike on their Services Front Lines report. Our guest is Derek Manky from Fortinet with 2021 threat insights. And, of course, some predictions.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/242
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The SolarWinds supply chain compromise may not have been an act of war, but it was certainly a very damaging espionage effort. The FBI, CISA, and ODNI are leading a whole-of-government response to the incident. Three companies have collaborated on a killswitch for the Sunburst backdoor’s initial command and control. HPE discloses a zero day in its SIM software. ODNI will delay its report on Chinese election influence ops. Thomas Etheridge from CrowdStrike on their Services Front Lines report. Our guest is Derek Manky from Fortinet with 2021 threat insights. And, of course, some predictions.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/242</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1378</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7ed7fba-e18d-11ea-86a1-4b77d5a9608b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6192427234.mp3?updated=1690218480" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SolarWinds breach updates. Microsoft sinkholes Sunburst's C&amp;C domain. Facebook takes down inauthentic networks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1235/notes</link>
      <description>SolarWinds breach reportedly affected parts of the Pentagon. Microsoft and partners seize and sinkhole command-and-control domain used by Sunburst malware. The threat actor behind the breach used a novel technique to bypass multi factor authentication at a think tank. Facebook takes down competing inauthentic networks focused on Africa. Joe Carrigan has insights on Amnesia 33. Our guest, Greg Edwards from CryptoStopper, shares his experience getting back online after a Derecho. And the execution of the FCC’s rip-and-replace plan will likely fall to the next US administration.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/241
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 16 Dec 2020 20:15:00 -0000</pubDate>
      <itunes:title>SolarWinds breach updates. Microsoft sinkholes Sunburst's C&amp;C domain. Facebook takes down inauthentic networks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1235</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>SolarWinds breach reportedly affected parts of the Pentagon. Microsoft and partners seize and sinkhole command-and-control domain used by Sunburst malware. The threat actor behind the breach used a novel technique to bypass multi factor authentication at a think tank. Facebook takes down competing inauthentic networks focused on Africa. Joe Carrigan has insights on Amnesia 33. Our guest, Greg Edwards from CryptoStopper, shares his experience getting back online after a Derecho. And the execution of the FCC’s rip-and-replace plan will likely fall to the next US administration.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/241
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>SolarWinds breach reportedly affected parts of the Pentagon. Microsoft and partners seize and sinkhole command-and-control domain used by Sunburst malware. The threat actor behind the breach used a novel technique to bypass multi factor authentication at a think tank. Facebook takes down competing inauthentic networks focused on Africa. Joe Carrigan has insights on Amnesia 33. Our guest, Greg Edwards from CryptoStopper, shares his experience getting back online after a Derecho. And the execution of the FCC’s rip-and-replace plan will likely fall to the next US administration.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/241</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1338</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7e86368-e18d-11ea-86a1-5fd3cd24ef6e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8513309264.mp3?updated=1690218464" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SolarWinds compromise scope grows clearer. DPRK’s Earth Kitsune. Google’s authentication issue. A look at the near future of cybersecurity. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1234/notes</link>
      <description>SolarWinds’ 8-K suggests the possible scope of the Sunburst incident. CISA leads the US Federal post-attack mopping up as more agencies are known to have been affected. How FireEye found the SolarWinds backdoor. GCHQ is looking for possible signs of Sunburst in the UK. Operation Earth Kitsune is attributed to North Korea. Google explains yesterday’s outage. Ben Yelin looks at retail privacy issues. Our guest is Jasson Casey from Beyond Identity on going passwordless. And if you have trouble getting things done while working from home, maybe blame it on the dogs.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/240
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Dec 2020 21:00:00 -0000</pubDate>
      <itunes:title>SolarWinds compromise scope grows clearer. DPRK’s Earth Kitsune. Google’s authentication issue. A look at the near future of cybersecurity. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1234</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>SolarWinds’ 8-K suggests the possible scope of the Sunburst incident. CISA leads the US Federal post-attack mopping up as more agencies are known to have been affected. How FireEye found the SolarWinds backdoor. GCHQ is looking for possible signs of Sunburst in the UK. Operation Earth Kitsune is attributed to North Korea. Google explains yesterday’s outage. Ben Yelin looks at retail privacy issues. Our guest is Jasson Casey from Beyond Identity on going passwordless. And if you have trouble getting things done while working from home, maybe blame it on the dogs.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/240
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>SolarWinds’ 8-K suggests the possible scope of the Sunburst incident. CISA leads the US Federal post-attack mopping up as more agencies are known to have been affected. How FireEye found the SolarWinds backdoor. GCHQ is looking for possible signs of Sunburst in the UK. Operation Earth Kitsune is attributed to North Korea. Google explains yesterday’s outage. Ben Yelin looks at retail privacy issues. Our guest is Jasson Casey from Beyond Identity on going passwordless. And if you have trouble getting things done while working from home, maybe blame it on the dogs.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/240</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1518</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7e37858-e18d-11ea-86a1-bf346a265222]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6750017249.mp3?updated=1690218447" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A few predictions, but today’s news is dominated by Cozy Bear’s supply chain attack on Solar Winds’ Orion Platform.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1233/notes</link>
      <description>FireEye traces its breach to a compromised SolarWinds update to its Orion Platform. CISA issues an Emergency Directive to get control of an attack that is known to have affected at least two Federal Departments. Rick Howard shares lessons from season three of CSO Perspectives. Betsy Carmelite from Booz Allen continues her analysis of their 2021 Cyber Threat Trends Report. And while reports attribute the supply chain attack to Russia’s SVR, Moscow says Cozy Bear didn’t do nuthin’. 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/239
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 14 Dec 2020 20:40:00 -0000</pubDate>
      <itunes:title>A few predictions, but today’s news is dominated by Cozy Bear’s supply chain attack on Solar Winds’ Orion Platform.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1233</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>FireEye traces its breach to a compromised SolarWinds update to its Orion Platform. CISA issues an Emergency Directive to get control of an attack that is known to have affected at least two Federal Departments. Rick Howard shares lessons from season three of CSO Perspectives. Betsy Carmelite from Booz Allen continues her analysis of their 2021 Cyber Threat Trends Report. And while reports attribute the supply chain attack to Russia’s SVR, Moscow says Cozy Bear didn’t do nuthin’. 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/239
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>FireEye traces its breach to a compromised SolarWinds update to its Orion Platform. CISA issues an Emergency Directive to get control of an attack that is known to have affected at least two Federal Departments. Rick Howard shares lessons from season three of CSO Perspectives. Betsy Carmelite from Booz Allen continues her analysis of their 2021 Cyber Threat Trends Report. And while reports attribute the supply chain attack to Russia’s SVR, Moscow says Cozy Bear didn’t do nuthin’. </p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/239</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1409</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7ddef82-e18d-11ea-86a1-8372e46b794a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8438683618.mp3?updated=1690218445" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Can public/private partnerships prevent a Cyber Pearl Harbor? [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/9/notes</link>
      <description>For many years, public and private sector cybersecurity experts have warned of a large-scale, massively impactful cyber attack on critical infrastructure (CI). Whether you call it a cyber doomsday, a cyber extinction, or as former Defense Secretary Leon Panetta termed it, a “Cyber Pearl Harbor,” the message is clear: it's not a matter of if, it's a matter of when, and it's not just critical infrastructure that's vulnerable. More recently, experts have started to raise the alarm around not just CI, but other systems as well, notably position, navigation and timing (PNT) services. PNT includes things like GPS devices -- extensions of IT systems which are widely used by both private and public sector organizations, and particularly vulnerable to attack thanks to their open source origins and lack of native security controls.  While there is no magic bullet to solve the cybersecurity challenge, there's growing consensus that an effective strategy is going to require large-scale cooperation and coordination between the public and private sectors. While the government is uniquely equipped to source and promulgate guidelines and standards like the Federal Information Processing Standards (FIPS) and NIST Special Publication 800 Series, private sector partners have the expertise to implement these standards across industries. The private sector is also a major driver of innovation in security, making use of sophisticated analytics, AI, and other tools to improve not only native security controls but also hygiene, threat detection, and response. In this episode of Cyberwire-X, guests will discuss the benefits of public/private partnership for cybersecurity, the roles of each, and how the threat of a "Cyber Pearl Harbor" informs the priorities of both.
Joining us today are Keith Mularski from EY, Rob Lee from Dragos, and Egon Rinderer from Tanium.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 14 Dec 2020 14:29:45 -0000</pubDate>
      <itunes:title>Can public/private partnerships prevent a Cyber Pearl Harbor? [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>9</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>For many years, public and private sector cybersecurity experts have warned of a large-scale, massively impactful cyber attack on critical infrastructure (CI). Whether you call it a cyber doomsday, a cyber extinction, or as former Defense Secretary Leon Panetta termed it, a “Cyber Pearl Harbor,” the message is clear: it's not a matter of if, it's a matter of when, and it's not just critical infrastructure that's vulnerable. More recently, experts have started to raise the alarm around not just CI, but other systems as well, notably position, navigation and timing (PNT) services. PNT includes things like GPS devices -- extensions of IT systems which are widely used by both private and public sector organizations, and particularly vulnerable to attack thanks to their open source origins and lack of native security controls.  While there is no magic bullet to solve the cybersecurity challenge, there's growing consensus that an effective strategy is going to require large-scale cooperation and coordination between the public and private sectors. While the government is uniquely equipped to source and promulgate guidelines and standards like the Federal Information Processing Standards (FIPS) and NIST Special Publication 800 Series, private sector partners have the expertise to implement these standards across industries. The private sector is also a major driver of innovation in security, making use of sophisticated analytics, AI, and other tools to improve not only native security controls but also hygiene, threat detection, and response. In this episode of Cyberwire-X, guests will discuss the benefits of public/private partnership for cybersecurity, the roles of each, and how the threat of a "Cyber Pearl Harbor" informs the priorities of both.
Joining us today are Keith Mularski from EY, Rob Lee from Dragos, and Egon Rinderer from Tanium.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>For many years, public and private sector cybersecurity experts have warned of a large-scale, massively impactful cyber attack on critical infrastructure (CI). Whether you call it a cyber doomsday, a cyber extinction, or as former Defense Secretary Leon Panetta termed it, a “Cyber Pearl Harbor,” the message is clear: it's not a matter of if, it's a matter of when, and it's not just critical infrastructure that's vulnerable. More recently, experts have started to raise the alarm around not just CI, but other systems as well, notably position, navigation and timing (PNT) services. PNT includes things like GPS devices -- extensions of IT systems which are widely used by both private and public sector organizations, and particularly vulnerable to attack thanks to their open source origins and lack of native security controls.  While there is no magic bullet to solve the cybersecurity challenge, there's growing consensus that an effective strategy is going to require large-scale cooperation and coordination between the public and private sectors. While the government is uniquely equipped to source and promulgate guidelines and standards like the Federal Information Processing Standards (FIPS) and NIST Special Publication 800 Series, private sector partners have the expertise to implement these standards across industries. The private sector is also a major driver of innovation in security, making use of sophisticated analytics, AI, and other tools to improve not only native security controls but also hygiene, threat detection, and response. In this episode of Cyberwire-X, guests will discuss the benefits of public/private partnership for cybersecurity, the roles of each, and how the threat of a "Cyber Pearl Harbor" informs the priorities of both.</p><p>Joining us today are Keith Mularski from EY, Rob Lee from Dragos, and Egon Rinderer from Tanium.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1973</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e46d9ff2-3e18-11eb-95ac-4bfc490b74dc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5260692334.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Andrea Little Limbago: Look at the intersection of the of humans and technology. [Social Science] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/28/notes</link>
      <description>Computational Social Scientist Andrea Little Limbago shares her journey as a social scientist in cybersecurity. Andrea laments that she wishes she'd known there is no straight line between what you think you want to do and then where you end up going. Beginning her career in international relations and courted by the Department of Defense's Joint Warfare Analysis Center while teaching at New York University, Andrea began her work in cybersecurity. Her team was one of the first to start thinking about the intersection of cybersecurity and geopolitics and quantitative modeling. Andrea reminds us there are many paths and skills needed in cybersecurity and hopes she opened some doors for others. We thank Andrea for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 13 Dec 2020 08:00:00 -0000</pubDate>
      <itunes:title>Andrea Little Limbago: Look at the intersection of the of humans and technology. [Social Science] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>28</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Computational Social Scientist Andrea Little Limbago shares her journey as a social scientist in cybersecurity.</itunes:subtitle>
      <itunes:summary>Computational Social Scientist Andrea Little Limbago shares her journey as a social scientist in cybersecurity. Andrea laments that she wishes she'd known there is no straight line between what you think you want to do and then where you end up going. Beginning her career in international relations and courted by the Department of Defense's Joint Warfare Analysis Center while teaching at New York University, Andrea began her work in cybersecurity. Her team was one of the first to start thinking about the intersection of cybersecurity and geopolitics and quantitative modeling. Andrea reminds us there are many paths and skills needed in cybersecurity and hopes she opened some doors for others. We thank Andrea for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Computational Social Scientist Andrea Little Limbago shares her journey as a social scientist in cybersecurity. Andrea laments that she wishes she'd known there is no straight line between what you think you want to do and then where you end up going. Beginning her career in international relations and courted by the Department of Defense's Joint Warfare Analysis Center while teaching at New York University, Andrea began her work in cybersecurity. Her team was one of the first to start thinking about the intersection of cybersecurity and geopolitics and quantitative modeling. Andrea reminds us there are many paths and skills needed in cybersecurity and hopes she opened some doors for others. We thank Andrea for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>346</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f643dcc2-3bd0-11eb-ba0b-7ff5bcdf14ab]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5368855183.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Following DOJ indictment, a look back on NotPetya and Olympic Destroyer research. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/163/notes</link>
      <description>From US Department of Justice: "On Oct. 15, 2020, a federal grand jury in Pittsburgh returned an indictment charging six computer hackers, all of whom were residents and nationals of the Russian Federation (Russia) and officers in Unit 74455 of the Russian Main Intelligence Directorate (GRU), a military intelligence agency of the General Staff of the Armed Forces. 
These GRU hackers and their co-conspirators engaged in computer intrusions and attacks intended to support Russian government efforts to undermine, retaliate against, or otherwise destabilize: (1) Ukraine; (2) Georgia; (3) elections in France; (4) efforts to hold Russia accountable for its use of a weapons-grade nerve agent, Novichok, on foreign soil; and (5) the 2018 PyeongChang Winter Olympic Games after Russian athletes were banned from participating under their nation’s flag, as a consequence of Russian government-sponsored doping effort. 
Their computer attacks used some of the world’s most destructive malware to date, including: KillDisk and Industroyer, which each caused blackouts in Ukraine; NotPetya, which caused nearly $1 billion in losses to the three victims identified in the indictment alone; and Olympic Destroyer, which disrupted thousands of computers used to support the 2018 PyeongChang Winter Olympics. The indictment charges the defendants with conspiracy, computer hacking, wire fraud, aggravated identity theft, and false registration of a domain name."
Returning to Research Saturday this week to discuss their research of NotPetya and Olympic Destroyer are Cisco Talos' Craig Williams and Matt Olney.
The indictment and Cisco's research can be found here:

Six Russian GRU Officers Charged in Connection with Worldwide Deployment of Destructive Malware and Other Disruptive Actions in Cyberspace

New Ransomware Variant "Nyetya" Compromises Systems Worldwide

The MeDoc Connection

Who Wasn’t Responsible for Olympic Destroyer?

Olympic Destroyer Takes Aim At Winter Olympics


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Dec 2020 08:00:00 -0000</pubDate>
      <itunes:title>Following DOJ indictment, a look back on NotPetya and Olympic Destroyer research. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>163</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>From US Department of Justice: "On Oct. 15, 2020, a federal grand jury in Pittsburgh returned an indictment charging six computer hackers, all of whom were residents and nationals of the Russian Federation (Russia) and officers in Unit 74455 of the Russian Main Intelligence Directorate (GRU), a military intelligence agency of the General Staff of the Armed Forces. 
These GRU hackers and their co-conspirators engaged in computer intrusions and attacks intended to support Russian government efforts to undermine, retaliate against, or otherwise destabilize: (1) Ukraine; (2) Georgia; (3) elections in France; (4) efforts to hold Russia accountable for its use of a weapons-grade nerve agent, Novichok, on foreign soil; and (5) the 2018 PyeongChang Winter Olympic Games after Russian athletes were banned from participating under their nation’s flag, as a consequence of Russian government-sponsored doping effort. 
Their computer attacks used some of the world’s most destructive malware to date, including: KillDisk and Industroyer, which each caused blackouts in Ukraine; NotPetya, which caused nearly $1 billion in losses to the three victims identified in the indictment alone; and Olympic Destroyer, which disrupted thousands of computers used to support the 2018 PyeongChang Winter Olympics. The indictment charges the defendants with conspiracy, computer hacking, wire fraud, aggravated identity theft, and false registration of a domain name."
Returning to Research Saturday this week to discuss their research of NotPetya and Olympic Destroyer are Cisco Talos' Craig Williams and Matt Olney.
The indictment and Cisco's research can be found here:

Six Russian GRU Officers Charged in Connection with Worldwide Deployment of Destructive Malware and Other Disruptive Actions in Cyberspace

New Ransomware Variant "Nyetya" Compromises Systems Worldwide

The MeDoc Connection

Who Wasn’t Responsible for Olympic Destroyer?

Olympic Destroyer Takes Aim At Winter Olympics


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>From US Department of Justice: "On Oct. 15, 2020, a federal grand jury in Pittsburgh returned an indictment charging six computer hackers, all of whom were residents and nationals of the Russian Federation (Russia) and officers in Unit 74455 of the Russian Main Intelligence Directorate (GRU), a military intelligence agency of the General Staff of the Armed Forces. </p><p>These GRU hackers and their co-conspirators engaged in computer intrusions and attacks intended to support Russian government efforts to undermine, retaliate against, or otherwise destabilize: (1) Ukraine; (2) Georgia; (3) elections in France; (4) efforts to hold Russia accountable for its use of a weapons-grade nerve agent, Novichok, on foreign soil; and (5) the 2018 PyeongChang Winter Olympic Games after Russian athletes were banned from participating under their nation’s flag, as a consequence of Russian government-sponsored doping effort. </p><p>Their computer attacks used some of the world’s most destructive malware to date, including: KillDisk and Industroyer, which each caused blackouts in Ukraine; NotPetya, which caused nearly $1 billion in losses to the three victims identified in the indictment alone; and Olympic Destroyer, which disrupted thousands of computers used to support the 2018 PyeongChang Winter Olympics. The indictment charges the defendants with conspiracy, computer hacking, wire fraud, aggravated identity theft, and false registration of a domain name."</p><p>Returning to Research Saturday this week to discuss their research of NotPetya and Olympic Destroyer are Cisco Talos' Craig Williams and Matt Olney.</p><p>The indictment and Cisco's research can be found here:</p><ul>
<li><a href="https://www.justice.gov/opa/pr/six-russian-gru-officers-charged-connection-worldwide-deployment-destructive-malware-and">Six Russian GRU Officers Charged in Connection with Worldwide Deployment of Destructive Malware and Other Disruptive Actions in Cyberspace</a></li>
<li><a href="https://blog.talosintelligence.com/2017/06/worldwide-ransomware-variant.html">New Ransomware Variant "Nyetya" Compromises Systems Worldwide</a></li>
<li><a href="https://blog.talosintelligence.com/2017/07/the-medoc-connection.html">The MeDoc Connection</a></li>
<li><a href="https://blog.talosintelligence.com/2018/02/who-wasnt-responsible-for-olympic.html">Who Wasn’t Responsible for Olympic Destroyer?</a></li>
<li><a href="https://blog.talosintelligence.com/2018/02/olympic-destroyer.html">Olympic Destroyer Takes Aim At Winter Olympics</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1968</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b975cf62-3bd0-11eb-8b20-1fef0a6bd667]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3458154225.mp3?updated=1685108176" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OceanLotus tracked. Threats to K-12 distance education. Adrozek is credential-harvesting adware. MountLocker gains criminal affiliates. FCC acts against Chinese companies. CISA internships.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1232/notes</link>
      <description>Tracking OceanLotus. US advisory warns of cyberthreats active against schools trying to deliver distance learning. Adrozek joins credential harvesting and adware. MountLocker’s criminal affiliate program. The FCC takes action against Chinese companies deemed security risks. Predictions, and holiday advice. Johannes Ullrich from the SANS technology institute wonders what’s in your clipboard? Our guest is Nina Jankowicz from Wilson Center on her new book - How to Lose the Information War - Russia, Fake News, and the Future of Conflict. And internship opportunities at CISA.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/238
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 11 Dec 2020 20:20:00 -0000</pubDate>
      <itunes:title>OceanLotus tracked. Threats to K-12 distance education. Adrozek is credential-harvesting adware. MountLocker gains criminal affiliates. FCC acts against Chinese companies. CISA internships.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1232</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Tracking OceanLotus. US advisory warns of cyberthreats active against schools trying to deliver distance learning. Adrozek joins credential harvesting and adware. MountLocker’s criminal affiliate program. The FCC takes action against Chinese companies deemed security risks. Predictions, and holiday advice. Johannes Ullrich from the SANS technology institute wonders what’s in your clipboard? Our guest is Nina Jankowicz from Wilson Center on her new book - How to Lose the Information War - Russia, Fake News, and the Future of Conflict. And internship opportunities at CISA.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/238
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tracking OceanLotus. US advisory warns of cyberthreats active against schools trying to deliver distance learning. Adrozek joins credential harvesting and adware. MountLocker’s criminal affiliate program. The FCC takes action against Chinese companies deemed security risks. Predictions, and holiday advice. Johannes Ullrich from the SANS technology institute wonders what’s in your clipboard? Our guest is Nina Jankowicz from Wilson Center on her new book - How to Lose the Information War - Russia, Fake News, and the Future of Conflict. And internship opportunities at CISA.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/238</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1529</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7c47796-e18d-11ea-86a1-5bcbfa9956b4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5874923695.mp3?updated=1690218447" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Facebook faces anti-trust suit. COVID-19 vaccine cyberespionage. Emissary Panda spotting. SQL databases for sale. Notes on the FireEye breach, the end of Flash, and the Mirai botnet.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1231/notes</link>
      <description>Facebook faces a US antitrust suit. Cyberespionage hits the European Medicines Agency, apparently looking for COVID-19 vaccine information. Emissary Panda is out and about. A simple ransomware campaign goes for success through volume. Stolen SQL databases are offered for sale back to their owners. React to the FireEye breach, but don’t over-react. We welcome Kevin McGee from Microsoft Canada to the show. Our guest is Liviu Arsene from Bitdefender with insights Business Threat Landscape report for 2020. Flash nears its end-of-life. Predictions for 2020, and another guilty plea in the Mirai case.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/237
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 10 Dec 2020 20:25:00 -0000</pubDate>
      <itunes:title>Facebook faces anti-trust suit. COVID-19 vaccine cyberespionage. Emissary Panda spotting. SQL databases for sale. Notes on the FireEye breach, the end of Flash, and the Mirai botnet.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1231</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Facebook faces a US antitrust suit. Cyberespionage hits the European Medicines Agency, apparently looking for COVID-19 vaccine information. Emissary Panda is out and about. A simple ransomware campaign goes for success through volume. Stolen SQL databases are offered for sale back to their owners. React to the FireEye breach, but don’t over-react. We welcome Kevin McGee from Microsoft Canada to the show. Our guest is Liviu Arsene from Bitdefender with insights Business Threat Landscape report for 2020. Flash nears its end-of-life. Predictions for 2020, and another guilty plea in the Mirai case.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/237
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Facebook faces a US antitrust suit. Cyberespionage hits the European Medicines Agency, apparently looking for COVID-19 vaccine information. Emissary Panda is out and about. A simple ransomware campaign goes for success through volume. Stolen SQL databases are offered for sale back to their owners. React to the FireEye breach, but don’t over-react. We welcome Kevin McGee from Microsoft Canada to the show. Our guest is Liviu Arsene from Bitdefender with insights Business Threat Landscape report for 2020. Flash nears its end-of-life. Predictions for 2020, and another guilty plea in the Mirai case.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/237</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1498</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7c9340c-e18d-11ea-86a1-db34a522063f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9698634501.mp3?updated=1690218425" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bear prints in Oslo and Silicon Valley. Deepfakes may be finally coming... maybe... CISA issues ICS alerts, some having to do with AMNESIA:30. A quick trip through Patch Tuesday.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1230/notes</link>
      <description>Norway calls out the GRU for espionage against the Storting. The SVR (probably) hacks FireEye. Huawei tested recognition software designed to spot Uighurs. 2021 predictions from Avast hold that next year might be the year deepfakes come into their own. CISA issues a long list of industrial control system alerts. Joe Carrigan looks at the iOS zero-click radio proximity vulnerability. Our guest is Matt Drake, director of cyber intelligence at SAIC on what the recents elections can tell us about threat intelligence. And yesterday was Patch Tuesday--do you know where your vulnerabilities are?
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/236
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 09 Dec 2020 20:45:00 -0000</pubDate>
      <itunes:title>Bear prints in Oslo and Silicon Valley. Deepfakes may be finally coming... maybe... CISA issues ICS alerts, some having to do with AMNESIA:30. A quick trip through Patch Tuesday.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1230</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Norway calls out the GRU for espionage against the Storting. The SVR (probably) hacks FireEye. Huawei tested recognition software designed to spot Uighurs. 2021 predictions from Avast hold that next year might be the year deepfakes come into their own. CISA issues a long list of industrial control system alerts. Joe Carrigan looks at the iOS zero-click radio proximity vulnerability. Our guest is Matt Drake, director of cyber intelligence at SAIC on what the recents elections can tell us about threat intelligence. And yesterday was Patch Tuesday--do you know where your vulnerabilities are?
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/236
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Norway calls out the GRU for espionage against the Storting. The SVR (probably) hacks FireEye. Huawei tested recognition software designed to spot Uighurs. 2021 predictions from Avast hold that next year might be the year deepfakes come into their own. CISA issues a long list of industrial control system alerts. Joe Carrigan looks at the iOS zero-click radio proximity vulnerability. Our guest is Matt Drake, director of cyber intelligence at SAIC on what the recents elections can tell us about threat intelligence. And yesterday was Patch Tuesday--do you know where your vulnerabilities are?</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/236</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1450</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7ce1044-e18d-11ea-86a1-d77b74caa714]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5235013522.mp3?updated=1690218429" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>IoT supply chain vulnerabilities described. Spyware in the hands of drug cartels. National security and telecom equipment. US NDAA includes many cyber provisions. Fraud as a side hustle. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1229/notes</link>
      <description>AMNESIA:33 vulnerabilities infest the IoT supply chain. Lawful intercept spyware allegedly finds its way from Mexican police into the hands of drug cartels. Finland’s parliament approves exclusion of telecom equipment on security grounds. The US National Defense Authorization Act’s cyber provisions. Online fraud seems to have become a side hustle. Ben Yelin responds to Supreme Court arguments in a Computer Fraud and Abuse Act case. Our guest is Darren Mar-Elia from Semperis on group policy security. And Moscow police are looking for the crooks who hacked secure delivery lockers.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/235
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Dec 2020 20:00:00 -0000</pubDate>
      <itunes:title>IoT supply chain vulnerabilities described. Spyware in the hands of drug cartels. National security and telecom equipment. US NDAA includes many cyber provisions. Fraud as a side hustle. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1229</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>AMNESIA:33 vulnerabilities infest the IoT supply chain. Lawful intercept spyware allegedly finds its way from Mexican police into the hands of drug cartels. Finland’s parliament approves exclusion of telecom equipment on security grounds. The US National Defense Authorization Act’s cyber provisions. Online fraud seems to have become a side hustle. Ben Yelin responds to Supreme Court arguments in a Computer Fraud and Abuse Act case. Our guest is Darren Mar-Elia from Semperis on group policy security. And Moscow police are looking for the crooks who hacked secure delivery lockers.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/235
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>AMNESIA:33 vulnerabilities infest the IoT supply chain. Lawful intercept spyware allegedly finds its way from Mexican police into the hands of drug cartels. Finland’s parliament approves exclusion of telecom equipment on security grounds. The US National Defense Authorization Act’s cyber provisions. Online fraud seems to have become a side hustle. Ben Yelin responds to Supreme Court arguments in a Computer Fraud and Abuse Act case. Our guest is Darren Mar-Elia from Semperis on group policy security. And Moscow police are looking for the crooks who hacked secure delivery lockers.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/235</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1390</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7d2c7d8-e18d-11ea-86a1-9f05faad898d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2033605166.mp3?updated=1690218393" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>NSA warns that Russia is actively exploiting patched VMware vulnerabilities. CISA alert also a warning to Iran. DeathStalker update. Market pressures in the Darknet. Greetings from Pyongyang. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1228/notes</link>
      <description>NSA warns that Russian state-sponsored actors are actively exploiting patched VMware vulnerabilities in the wild. A CISA alert puts Iran on notice. DeathStalker hired guns are now active in North America. Darknet contraband markets are experiencing the sort of pressure and consolidation legitimate markets undergo. Rick Howard checks in with the hash table on CSO and CISO roles. My continued conversation with Betsy Carmelite from Booz Allen on their 2021 Cyber Threat Trends Report. And a weird shift in North Korean propaganda...is Pyongyang having a Hallmark moment?
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/234
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 07 Dec 2020 21:00:00 -0000</pubDate>
      <itunes:title>NSA warns that Russia is actively exploiting patched VMware vulnerabilities. CISA alert also a warning to Iran. DeathStalker update. Market pressures in the Darknet. Greetings from Pyongyang. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1228</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>NSA warns that Russian state-sponsored actors are actively exploiting patched VMware vulnerabilities in the wild. A CISA alert puts Iran on notice. DeathStalker hired guns are now active in North America. Darknet contraband markets are experiencing the sort of pressure and consolidation legitimate markets undergo. Rick Howard checks in with the hash table on CSO and CISO roles. My continued conversation with Betsy Carmelite from Booz Allen on their 2021 Cyber Threat Trends Report. And a weird shift in North Korean propaganda...is Pyongyang having a Hallmark moment?
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/234
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>NSA warns that Russian state-sponsored actors are actively exploiting patched VMware vulnerabilities in the wild. A CISA alert puts Iran on notice. DeathStalker hired guns are now active in North America. Darknet contraband markets are experiencing the sort of pressure and consolidation legitimate markets undergo. Rick Howard checks in with the hash table on CSO and CISO roles. My continued conversation with Betsy Carmelite from Booz Allen on their 2021 Cyber Threat Trends Report. And a weird shift in North Korean propaganda...is Pyongyang having a Hallmark moment?</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/234</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1353</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7d7fa1e-e18d-11ea-86a1-4ba375027972]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8610712123.mp3?updated=1690218362" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ron Brash: Problem fixer in critical infrastructure. [OT] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/27/notes</link>
      <description>Director of Cyber Security Insights at Verve Industrial aka self-proclaimed industrial cybersecurity geek Ron Brash shares his journey through the industrial cybersecurity space. From taking his parents 286s and 386s to task to working for the "OG of industrial cybersecurity," Ron has pushed limits. Starting off in technical testing, racing through university at 2x speed, and taking a detour through neuroscience with machine learning, Ron decided to return to critical infrastructure working with devices that keep the lights on and the water flowing. Ron hopes his work makes an impact and his life is memorable for those he cares about. We thank Ron for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 06 Dec 2020 08:00:00 -0000</pubDate>
      <itunes:title>Ron Brash: Problem fixer in critical infrastructure. [OT] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>27</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Director of Cyber Security Insights Ron Brash shares his journey through the industrial cybersecurity space.</itunes:subtitle>
      <itunes:summary>Director of Cyber Security Insights at Verve Industrial aka self-proclaimed industrial cybersecurity geek Ron Brash shares his journey through the industrial cybersecurity space. From taking his parents 286s and 386s to task to working for the "OG of industrial cybersecurity," Ron has pushed limits. Starting off in technical testing, racing through university at 2x speed, and taking a detour through neuroscience with machine learning, Ron decided to return to critical infrastructure working with devices that keep the lights on and the water flowing. Ron hopes his work makes an impact and his life is memorable for those he cares about. We thank Ron for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Director of Cyber Security Insights at Verve Industrial aka self-proclaimed industrial cybersecurity geek Ron Brash shares his journey through the industrial cybersecurity space. From taking his parents 286s and 386s to task to working for the "OG of industrial cybersecurity," Ron has pushed limits. Starting off in technical testing, racing through university at 2x speed, and taking a detour through neuroscience with machine learning, Ron decided to return to critical infrastructure working with devices that keep the lights on and the water flowing. Ron hopes his work makes an impact and his life is memorable for those he cares about. We thank Ron for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>396</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8da9efb4-3688-11eb-af98-3bf9769013d6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4600555539.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SSL-based threats remain prevalent and are becoming increasingly sophisticated. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/162/notes</link>
      <description>While SSL/TLS encryption is the industry standard for protecting data in transit from prying eyes, encryption has, itself, become a threat. It is often leveraged by attackers to sneak malware past security tools that do not fully inspect encrypted traffic. As the percentage of traffic that is encrypted continues to grow, so do the opportunities for attackers to deliver threats through encrypted channels.
To better understand the use of encryption and the volume of encrypted traffic that is inspected, Zscaler's research team, ThreatLabZ, analyzed encrypted traffic across the Zscaler cloud for the first nine months of 2020, assessing its use within specific industries. The study also set out to analyze the types of attacks that use encryption and the extent of the current risk. 
Returning to Research Saturday this week to discuss the report is Zscaler's CISO and VP of Security Research, Deepen Desai.
The research can be found here:


2020: The State of Encrypted Attacks Blog


2020: The State of Encrypted Attacks Report


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Dec 2020 08:00:00 -0000</pubDate>
      <itunes:title>SSL-based threats remain prevalent and are becoming increasingly sophisticated. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>162</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>While SSL/TLS encryption is the industry standard for protecting data in transit from prying eyes, encryption has, itself, become a threat. It is often leveraged by attackers to sneak malware past security tools that do not fully inspect encrypted traffic. As the percentage of traffic that is encrypted continues to grow, so do the opportunities for attackers to deliver threats through encrypted channels.
To better understand the use of encryption and the volume of encrypted traffic that is inspected, Zscaler's research team, ThreatLabZ, analyzed encrypted traffic across the Zscaler cloud for the first nine months of 2020, assessing its use within specific industries. The study also set out to analyze the types of attacks that use encryption and the extent of the current risk. 
Returning to Research Saturday this week to discuss the report is Zscaler's CISO and VP of Security Research, Deepen Desai.
The research can be found here:


2020: The State of Encrypted Attacks Blog


2020: The State of Encrypted Attacks Report


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>While SSL/TLS encryption is the industry standard for protecting data in transit from prying eyes, encryption has, itself, become a threat. It is often leveraged by attackers to sneak malware past security tools that do not fully inspect encrypted traffic. As the percentage of traffic that is encrypted continues to grow, so do the opportunities for attackers to deliver threats through encrypted channels.</p><p>To better understand the use of encryption and the volume of encrypted traffic that is inspected, Zscaler's research team, ThreatLabZ, analyzed encrypted traffic across the Zscaler cloud for the first nine months of 2020, assessing its use within specific industries. The study also set out to analyze the types of attacks that use encryption and the extent of the current risk. </p><p>Returning to Research Saturday this week to discuss the report is Zscaler's CISO and VP of Security Research, Deepen Desai.</p><p>The research can be found here:</p><ul>
<li>
<a href="https://www.zscaler.com/blogs/security-research/2020-state-encrypted-attacks">2020: The State of Encrypted Attacks</a> Blog</li>
<li>
<a href="https://www.zscaler.com/resources/industry-reports/state-of-encrypted-attacks.pdf?_gl=1*1wdvp74*_ga*MjEyNTg3NDMyOC4xNTUxMzA3NDM4*_ga_10SPJ4YJL9*MTYwNzAyNTA1Mi4yNy4xLjE2MDcwMjUxNzguMA..&amp;_ga=2.250346053.2117749544.1606841800-2125874328.1551307438&amp;_gac=1.220309354.1605313467.CjwKCAiA17P9BRB2EiwAMvwNyBRy6rW_NLor9iMHlZc1cy2ANz8SzCZlF9ZG_3fc0mozOUFFofD7NBoC4KwQAvD_BwE">2020: The State of Encrypted Attacks</a> Report</li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>956</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b8f7fdc8-3688-11eb-af98-8fc700bb67c6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8814541634.mp3?updated=1685108162" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>2021 may look a lot like 2020 in cyberspace, only moreso. Cold chain cyberespionage. Cybercriminals are also interested in COVID-19 vaccines. And beware of online dog fraud.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1227/notes</link>
      <description>Predictions for 2021 focus on ransomware: it’ll be better, more aggressive, bigger, and a greater problem in every way. Cyberespionage and the cold chain. Cybercriminal interest in COVID-19 vaccines extends to both theft and fraud. Johannes Ullrich on the .well-known Directory. Our guest is Michael Magrath from OneSpan on what the financial sector needs to consider now that we’re post-election season. And what’s one effect of the pandemic? Dog fraud. Ask the Better Business Bureau.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/233
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 04 Dec 2020 20:15:00 -0000</pubDate>
      <itunes:title>2021 may look a lot like 2020 in cyberspace, only moreso. Cold chain cyberespionage. Cybercriminals are also interested in COVID-19 vaccines. And beware of online dog fraud.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1227</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Predictions for 2021 focus on ransomware: it’ll be better, more aggressive, bigger, and a greater problem in every way. Cyberespionage and the cold chain. Cybercriminal interest in COVID-19 vaccines extends to both theft and fraud. Johannes Ullrich on the .well-known Directory. Our guest is Michael Magrath from OneSpan on what the financial sector needs to consider now that we’re post-election season. And what’s one effect of the pandemic? Dog fraud. Ask the Better Business Bureau.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/233
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Predictions for 2021 focus on ransomware: it’ll be better, more aggressive, bigger, and a greater problem in every way. Cyberespionage and the cold chain. Cybercriminal interest in COVID-19 vaccines extends to both theft and fraud. Johannes Ullrich on the .well-known Directory. Our guest is Michael Magrath from OneSpan on what the financial sector needs to consider now that we’re post-election season. And what’s one effect of the pandemic? Dog fraud. Ask the Better Business Bureau.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/233</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1567</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7bf5f40-e18d-11ea-86a1-07259faeb964]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9930879438.mp3?updated=1690218350" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage and influence operations against prospective members of the incoming US Administration. Cold chain attacks. TrickBoot. Vasya, what do you do for a living?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1226/notes</link>
      <description>Chinese intelligence services are prospecting think tanks and prospective members of the next US Administration. Spearphishing the vaccine cold chain. Expect vaccine-themed phishing. After a temporary, pre-US election suppression, TrickBot’s back. Holiday shopping season is bot-season. Consumers are thought likely to get upset about smart device privacy in 2021. Awais Rashid from Bristol University on privacy at scale. Our guest is JP Perez-Etchegoyen from Onapsis on the risk associated with interconnected cloud and SaaS apps. And suppose you’re a cybercriminal...we know, but suppose. What do you tell your sweetie you do for a living?
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/232
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 03 Dec 2020 20:30:00 -0000</pubDate>
      <itunes:title>Cyberespionage and influence operations against prospective members of the incoming US Administration. Cold chain attacks. TrickBoot. Vasya, what do you do for a living?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1226</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Chinese intelligence services are prospecting think tanks and prospective members of the next US Administration. Spearphishing the vaccine cold chain. Expect vaccine-themed phishing. After a temporary, pre-US election suppression, TrickBot’s back. Holiday shopping season is bot-season. Consumers are thought likely to get upset about smart device privacy in 2021. Awais Rashid from Bristol University on privacy at scale. Our guest is JP Perez-Etchegoyen from Onapsis on the risk associated with interconnected cloud and SaaS apps. And suppose you’re a cybercriminal...we know, but suppose. What do you tell your sweetie you do for a living?
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/232
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chinese intelligence services are prospecting think tanks and prospective members of the next US Administration. Spearphishing the vaccine cold chain. Expect vaccine-themed phishing. After a temporary, pre-US election suppression, TrickBot’s back. Holiday shopping season is bot-season. Consumers are thought likely to get upset about smart device privacy in 2021. Awais Rashid from Bristol University on privacy at scale. Our guest is JP Perez-Etchegoyen from Onapsis on the risk associated with interconnected cloud and SaaS apps. And suppose you’re a cybercriminal...we know, but suppose. What do you tell your sweetie you do for a living?</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/232</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1516</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7ba6e22-e18d-11ea-86a1-0f21d20b12eb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2058753989.mp3?updated=1690218348" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Shadow Academy schools anglophone universities. Turla’s Crutch. Cryptojacking as misdirection. Cyberespionage against think tanks. DPRK tries to steal COVID-19 treatment data.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1225/notes</link>
      <description>The Shadow Academy prospects universities in a domain shadowing campaign. Notes on Turla’s Crutch, an information-stealing backdoor. Bismuth was using crytpojacking as misdirection. CISA and the FBI warn think tanks that cyberspies are after them. North Korean cyberespionage is interested in COVID-19 treatments. Our guest is Carey O’Connor Kolaja from AU10TIX on combating fraud in the financial services and payment industry. David Dufour from Webroot has 2021 predictions. And a member of the Apophis Group gets eight years in prison.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/231
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 02 Dec 2020 20:00:00 -0000</pubDate>
      <itunes:title>The Shadow Academy schools anglophone universities. Turla’s Crutch. Cryptojacking as misdirection. Cyberespionage against think tanks. DPRK tries to steal COVID-19 treatment data.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1225</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The Shadow Academy prospects universities in a domain shadowing campaign. Notes on Turla’s Crutch, an information-stealing backdoor. Bismuth was using crytpojacking as misdirection. CISA and the FBI warn think tanks that cyberspies are after them. North Korean cyberespionage is interested in COVID-19 treatments. Our guest is Carey O’Connor Kolaja from AU10TIX on combating fraud in the financial services and payment industry. David Dufour from Webroot has 2021 predictions. And a member of the Apophis Group gets eight years in prison.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/231
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Shadow Academy prospects universities in a domain shadowing campaign. Notes on Turla’s Crutch, an information-stealing backdoor. Bismuth was using crytpojacking as misdirection. CISA and the FBI warn think tanks that cyberspies are after them. North Korean cyberespionage is interested in COVID-19 treatments. Our guest is Carey O’Connor Kolaja from AU10TIX on combating fraud in the financial services and payment industry. David Dufour from Webroot has 2021 predictions. And a member of the Apophis Group gets eight years in prison.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/231</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1586</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7b4c0f8-e18d-11ea-86a1-ebca55a781cc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9038825935.mp3?updated=1690218331" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cryptojacking cyberspies sighted. Crooks mix banking Trojans and ransomware. Conti ransomware hits industrial IoT company. SCOTUS reviews CFAA. And predictions. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1224/notes</link>
      <description>Cryptojacking from Hanoi. Dormant networks rise again, for no easily discernible reason (but it doesn’t look good). A gang is hitting German victims with the Gootkit banking Trojan, and sometimes mixing it up with a REvil ransomware payload. Conti ransomware hits IoT chipmaker. SCOTUS reviews the Computer Fraud and Abuse Act. A few predictions for 2021. Ben Yelin on Congress passing an IoT security bill. Our guest is Stephen Harvey from BitSight, who’s tracking the correlation between companies with strong cybersecurity and financial success. And it may be back to school tomorrow in Baltimore County.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/230
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Dec 2020 20:10:00 -0000</pubDate>
      <itunes:title>Cryptojacking cyberspies sighted. Crooks mix banking Trojans and ransomware. Conti ransomware hits industrial IoT company. SCOTUS reviews CFAA. And predictions. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1224</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cryptojacking from Hanoi. Dormant networks rise again, for no easily discernible reason (but it doesn’t look good). A gang is hitting German victims with the Gootkit banking Trojan, and sometimes mixing it up with a REvil ransomware payload. Conti ransomware hits IoT chipmaker. SCOTUS reviews the Computer Fraud and Abuse Act. A few predictions for 2021. Ben Yelin on Congress passing an IoT security bill. Our guest is Stephen Harvey from BitSight, who’s tracking the correlation between companies with strong cybersecurity and financial success. And it may be back to school tomorrow in Baltimore County.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/230
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cryptojacking from Hanoi. Dormant networks rise again, for no easily discernible reason (but it doesn’t look good). A gang is hitting German victims with the Gootkit banking Trojan, and sometimes mixing it up with a REvil ransomware payload. Conti ransomware hits IoT chipmaker. SCOTUS reviews the Computer Fraud and Abuse Act. A few predictions for 2021. Ben Yelin on Congress passing an IoT security bill. Our guest is Stephen Harvey from BitSight, who’s tracking the correlation between companies with strong cybersecurity and financial success. And it may be back to school tomorrow in Baltimore County.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/230</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1360</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7afaece-e18d-11ea-86a1-ff91da5de78c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2081115027.mp3?updated=1690218312" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing for COVID-19 vaccine data. Bandook is back, and mercenaries have it. School’s out for ransomware. Skepticism about foreign election manipulation. The forever sales.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1223/notes</link>
      <description>North Korean operators phish a major pharma company. The Bandook backdoor is back, and probably being distributed by mercenaries. A school district cancels classes after a ransomware attack. Man U continues to work on recovering its systems. Former CISA Director says there are no signs of foreign manipulation of US elections. Rick Howard wonders what exactly all those CISOs do. Betsy Carmelite from Booz Allen with insights from their 2021 Cyber Threat Trends Report. And Cyber shopping and the forever sales.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/229
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 30 Nov 2020 21:31:00 -0000</pubDate>
      <itunes:title>Phishing for COVID-19 vaccine data. Bandook is back, and mercenaries have it. School’s out for ransomware. Skepticism about foreign election manipulation. The forever sales.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1223</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>North Korean operators phish a major pharma company. The Bandook backdoor is back, and probably being distributed by mercenaries. A school district cancels classes after a ransomware attack. Man U continues to work on recovering its systems. Former CISA Director says there are no signs of foreign manipulation of US elections. Rick Howard wonders what exactly all those CISOs do. Betsy Carmelite from Booz Allen with insights from their 2021 Cyber Threat Trends Report. And Cyber shopping and the forever sales.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/229
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>North Korean operators phish a major pharma company. The Bandook backdoor is back, and probably being distributed by mercenaries. A school district cancels classes after a ransomware attack. Man U continues to work on recovering its systems. Former CISA Director says there are no signs of foreign manipulation of US elections. Rick Howard wonders what exactly all those CISOs do. Betsy Carmelite from Booz Allen with insights from their 2021 Cyber Threat Trends Report. And Cyber shopping and the forever sales.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/229</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1557</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7aae92a-e18d-11ea-86a1-2377a2ac45f9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7942569138.mp3?updated=1690218294" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Camille Stewart: Technology becomes more of an equalizer. [Legal] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/26/notes</link>
      <description>Cybersecurity attorney Camille Stewart shares how her childhood affinity for making contracts pointed to her eventual career as an attorney. Having a computer scientist father contributed to Camille's technical acumen and desire to include technology in her life's work. Camille has worked various facets of cybersecurity law from the private sector, federal government, on the Hill and in the Executive Branch, and now as part of Big Tech as Head of Security Policy and Election Integrity for Google Play and Android where she creates policy geared towards making sure users are safe on their platform and equipped to make informed decisions.. We thank Camille for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 29 Nov 2020 08:00:00 -0000</pubDate>
      <itunes:title>Camille Stewart: Technology becomes more of an equalizer. [Legal] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>26</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Cybersecurity attorney Camille Stewart shares her career journey through various facets of cybersecurity law.   </itunes:subtitle>
      <itunes:summary>Cybersecurity attorney Camille Stewart shares how her childhood affinity for making contracts pointed to her eventual career as an attorney. Having a computer scientist father contributed to Camille's technical acumen and desire to include technology in her life's work. Camille has worked various facets of cybersecurity law from the private sector, federal government, on the Hill and in the Executive Branch, and now as part of Big Tech as Head of Security Policy and Election Integrity for Google Play and Android where she creates policy geared towards making sure users are safe on their platform and equipped to make informed decisions.. We thank Camille for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cybersecurity attorney Camille Stewart shares how her childhood affinity for making contracts pointed to her eventual career as an attorney. Having a computer scientist father contributed to Camille's technical acumen and desire to include technology in her life's work. Camille has worked various facets of cybersecurity law from the private sector, federal government, on the Hill and in the Executive Branch, and now as part of Big Tech as Head of Security Policy and Election Integrity for Google Play and Android where she creates policy geared towards making sure users are safe on their platform and equipped to make informed decisions.. We thank Camille for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>368</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3701a5da-2f58-11eb-8736-b345b901f5d3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5471112959.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Encore: Using global events as lures for malicious activity. </title>
      <description>The goal of malicious activity is to compromise the system to install some unauthorized software. Increasingly that goal is tied to one thing: the user. Over the past several years, we as an industry improved exploit mitigation and the value of working exploits has increased accordingly. Together, these changes have had an impact on the threat landscape. We still see large amounts of active exploitation, but enterprises are getting better at defending against them.
This has left adversaries with a couple of options, develop or buy a working exploit that will defeat today's protections, which can be costly, or pivot to enticing a user to help you. In today's threat landscape, adversaries are always trying to develop and implement the most effective lures to try and draw users into their infection path. They've tried a multitude of different tactics in this space, but one always stands out — current events.
Joining us on this week's Research Saturday from Craig Williams from Cisco's Talos Outreach team to walk us through how current events are used as lures.
The research and blog post can be found here: 
Adversarial use of current events as lures

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Nov 2020 06:00:00 -0000</pubDate>
      <itunes:title>Encore: Using global events as lures for malicious activity. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/968f8d46-2f67-11eb-a7b0-e792a09fc95f/image/uploads_2F1606339400847-8si8u9rhfka-5125459826113c12a869d1e1022c1ed4_2Fuploads_2F1599328499255-a1g67iiui3o-7263d31970ec3d34bd92acf6dd108a9a_2Fcyberwire-research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The goal of malicious activity is to compromise the system to install some unauthorized software. Increasingly that goal is tied to one thing: the user. Over the past several years, we as an industry improved exploit mitigation and the value of working exploits has increased accordingly. Together, these changes have had an impact on the threat landscape. We still see large amounts of active exploitation, but enterprises are getting better at defending against them.
This has left adversaries with a couple of options, develop or buy a working exploit that will defeat today's protections, which can be costly, or pivot to enticing a user to help you. In today's threat landscape, adversaries are always trying to develop and implement the most effective lures to try and draw users into their infection path. They've tried a multitude of different tactics in this space, but one always stands out — current events.
Joining us on this week's Research Saturday from Craig Williams from Cisco's Talos Outreach team to walk us through how current events are used as lures.
The research and blog post can be found here: 
Adversarial use of current events as lures

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The goal of malicious activity is to compromise the system to install some unauthorized software. Increasingly that goal is tied to one thing: the user. Over the past several years, we as an industry improved exploit mitigation and the value of working exploits has increased accordingly. Together, these changes have had an impact on the threat landscape. We still see large amounts of active exploitation, but enterprises are getting better at defending against them.</p><p>This has left adversaries with a couple of options, develop or buy a working exploit that will defeat today's protections, which can be costly, or pivot to enticing a user to help you. In today's threat landscape, adversaries are always trying to develop and implement the most effective lures to try and draw users into their infection path. They've tried a multitude of different tactics in this space, but one always stands out — current events.</p><p>Joining us on this week's Research Saturday from Craig Williams from Cisco's Talos Outreach team to walk us through how current events are used as lures.</p><p>The research and blog post can be found here: </p><ul><li><a href="https://blog.talosintelligence.com/2020/07/current-events-lures.html">Adversarial use of current events as lures</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1252</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[968f8d46-2f67-11eb-a7b0-e792a09fc95f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8995194521.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Influence the gullible, and maybe others will follow. Event site sustains a data breach. Contact tracing and privacy protection. Ransomware, again. Social media used to intimidate witnesses. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1222/notes</link>
      <description>Observers see a shift in Russia’s influence tactics, but prank calls are (probably) not among those tactics. An event site suffers a data breach, and warns customers to be alert for spoofing. COVID-19 contact tracing continues to arouse privacy concerns. Joe Carrigan has tips for safe online shopping during the holidays. Our guest is Dmitry Volkov from Group-IB with insights from their latest Hi-Tech Crime Trends report. Ransomware hits another US school district, and social media are being used to intimidate cooperating witnesses.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/228
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 25 Nov 2020 20:15:00 -0000</pubDate>
      <itunes:title>Influence the gullible, and maybe others will follow. Event site sustains a data breach. Contact tracing and privacy protection. Ransomware, again. Social media used to intimidate witnesses. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1222</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Observers see a shift in Russia’s influence tactics, but prank calls are (probably) not among those tactics. An event site suffers a data breach, and warns customers to be alert for spoofing. COVID-19 contact tracing continues to arouse privacy concerns. Joe Carrigan has tips for safe online shopping during the holidays. Our guest is Dmitry Volkov from Group-IB with insights from their latest Hi-Tech Crime Trends report. Ransomware hits another US school district, and social media are being used to intimidate cooperating witnesses.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/228
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Observers see a shift in Russia’s influence tactics, but prank calls are (probably) not among those tactics. An event site suffers a data breach, and warns customers to be alert for spoofing. COVID-19 contact tracing continues to arouse privacy concerns. Joe Carrigan has tips for safe online shopping during the holidays. Our guest is Dmitry Volkov from Group-IB with insights from their latest Hi-Tech Crime Trends report. Ransomware hits another US school district, and social media are being used to intimidate cooperating witnesses.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/228</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1434</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c79b50f0-e18d-11ea-86a1-37cec5c23f01]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4078712322.mp3?updated=1690218271" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mustang Panda needs to repent. Not the FBI. Dodgy consumer routers and smart doorbells. Prospective Presidential appointees and cyber. Crime and investigation.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1221/notes</link>
      <description>Mustang Panda goes to church, but not in a good way. Hoods are trying to spoof the FBI with Bureau-themed domains. Dodgy routers and suspect smart doorbells. A quick look at the incoming US Administration, from a cybersecurity point of view. Someone’s allegedly swapping iPads for concealed carry permits--say it ain’t so, Santa Clara County. DHS investigates Windows help desk scammers. Ben Yelin on a Massachusetts ballot initiative involving connected cars. Our guest is Larry Roshfeld from AffirmLogic on the pros and cons of a Treasury Dept advisory that could put companies who facilitate ransomware payments in legal jeopardy.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/227
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Nov 2020 21:00:00 -0000</pubDate>
      <itunes:title>Mustang Panda needs to repent. Not the FBI. Dodgy consumer routers and smart doorbells. Prospective Presidential appointees and cyber. Crime and investigation.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1221</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Mustang Panda goes to church, but not in a good way. Hoods are trying to spoof the FBI with Bureau-themed domains. Dodgy routers and suspect smart doorbells. A quick look at the incoming US Administration, from a cybersecurity point of view. Someone’s allegedly swapping iPads for concealed carry permits--say it ain’t so, Santa Clara County. DHS investigates Windows help desk scammers. Ben Yelin on a Massachusetts ballot initiative involving connected cars. Our guest is Larry Roshfeld from AffirmLogic on the pros and cons of a Treasury Dept advisory that could put companies who facilitate ransomware payments in legal jeopardy.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/227
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Mustang Panda goes to church, but not in a good way. Hoods are trying to spoof the FBI with Bureau-themed domains. Dodgy routers and suspect smart doorbells. A quick look at the incoming US Administration, from a cybersecurity point of view. Someone’s allegedly swapping iPads for concealed carry permits--say it ain’t so, Santa Clara County. DHS investigates Windows help desk scammers. Ben Yelin on a Massachusetts ballot initiative involving connected cars. Our guest is Larry Roshfeld from AffirmLogic on the pros and cons of a Treasury Dept advisory that could put companies who facilitate ransomware payments in legal jeopardy.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><br></p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/227</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1372</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7a0f636-e18d-11ea-86a1-9f6879b66374]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5925614730.mp3?updated=1690218255" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ups and downs in the cyber underworld. Enduring effects of COVID-19 in cyberspace. Safer online shopping. “Take me home, United Road, to the place I belong, to Old Trafford, to see United…”</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1220/notes</link>
      <description>Qbot is dropping Egregor ransomware, and RagnarLocker continues its recent rampage. Cryptocurrency platforms troubled by social engineering at a third party. TrickBot reaches version 100. Stuffed credentials exposed in the cloud. COVID-19 practices may endure beyond the pandemic. Advice for safer online shopping over the course of the week. Malek Ben Salem from Accenture Labs has methods for preserving privacy when using machine learning. Rick Howard digs deeper into SOAR. And someone’s hacking a Premier League side.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/226
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 23 Nov 2020 20:20:00 -0000</pubDate>
      <itunes:title>Ups and downs in the cyber underworld. Enduring effects of COVID-19 in cyberspace. Safer online shopping. “Take me home, United Road, to the place I belong, to Old Trafford, to see United…”</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1220</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Qbot is dropping Egregor ransomware, and RagnarLocker continues its recent rampage. Cryptocurrency platforms troubled by social engineering at a third party. TrickBot reaches version 100. Stuffed credentials exposed in the cloud. COVID-19 practices may endure beyond the pandemic. Advice for safer online shopping over the course of the week. Malek Ben Salem from Accenture Labs has methods for preserving privacy when using machine learning. Rick Howard digs deeper into SOAR. And someone’s hacking a Premier League side.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/226
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Qbot is dropping Egregor ransomware, and RagnarLocker continues its recent rampage. Cryptocurrency platforms troubled by social engineering at a third party. TrickBot reaches version 100. Stuffed credentials exposed in the cloud. COVID-19 practices may endure beyond the pandemic. Advice for safer online shopping over the course of the week. Malek Ben Salem from Accenture Labs has methods for preserving privacy when using machine learning. Rick Howard digs deeper into SOAR. And someone’s hacking a Premier League side.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/226</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1494</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7a63010-e18d-11ea-86a1-8370cb94cf38]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4812668321.mp3?updated=1690218238" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>James Hadley: Spend time on what interests you. [CEO] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/25/notes</link>
      <description>Founder and CEO of Immersive Labs James Hadley takes us through his career path from university to cybersecurity startup. James tells us about his first computer and how he liked to push it to its limits and then some. He joined GCHQ after college and consulted across government departments. Teaching in GCHQ's cyber summer school was where James felt a shift in his career. As a company founder, he shares that he is very driven, very fast and also very caring. James offers advice to those looking to get into the industry recommending they chase what interests them rather than certifications. We thank James for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 22 Nov 2020 08:00:00 -0000</pubDate>
      <itunes:title>James Hadley: Spend time on what interests you. [CEO] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>25</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Founder and CEO of Immersive Labs James Hadley takes us through his career path from university to cybersecurity startup.  </itunes:subtitle>
      <itunes:summary>Founder and CEO of Immersive Labs James Hadley takes us through his career path from university to cybersecurity startup. James tells us about his first computer and how he liked to push it to its limits and then some. He joined GCHQ after college and consulted across government departments. Teaching in GCHQ's cyber summer school was where James felt a shift in his career. As a company founder, he shares that he is very driven, very fast and also very caring. James offers advice to those looking to get into the industry recommending they chase what interests them rather than certifications. We thank James for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Founder and CEO of Immersive Labs James Hadley takes us through his career path from university to cybersecurity startup. James tells us about his first computer and how he liked to push it to its limits and then some. He joined GCHQ after college and consulted across government departments. Teaching in GCHQ's cyber summer school was where James felt a shift in his career. As a company founder, he shares that he is very driven, very fast and also very caring. James offers advice to those looking to get into the industry recommending they chase what interests them rather than certifications. We thank James for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>319</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[72261cbc-2a9f-11eb-afb8-0b5fc99598ed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8798315884.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Misconfigured identity and access management (IAM) is much more widespread. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/161/notes</link>
      <description>Identity and access are intrinsically connected when providing security to cloud platforms. But security is only effective when environments are properly configured and maintained. In the 2H 2020 edition of the biannual Unit 42 Cloud Threat Report, researchers conducted Red Team exercises, scanned public cloud data and pulled proprietary Palo Alto Networks data to explore the threat landscape of identity and access management (IAM) and identify where organizations can improve their IAM configurations.
During a Red Team exercise, Unit 42 researchers were able to discover and leverage IAM misconfigurations to obtain admin access to a customer’s entire Amazon Web Services (AWS) cloud environment – a potentially multi-million dollar data breach in the real-world. These examples highlight just how serious the failure to secure IAM can be for an organization.
Joining us in this week's Research Saturday to discuss the report for Palo Alto Networks' Unit 42 is CSO of Public Cloud, Matt Chiodi.
The research can be found here:
Highlights from the Unit 42 Cloud Threat Report, 2H 2020

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Nov 2020 08:00:00 -0000</pubDate>
      <itunes:title>Misconfigured identity and access management (IAM) is much more widespread. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>161</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Identity and access are intrinsically connected when providing security to cloud platforms. But security is only effective when environments are properly configured and maintained. In the 2H 2020 edition of the biannual Unit 42 Cloud Threat Report, researchers conducted Red Team exercises, scanned public cloud data and pulled proprietary Palo Alto Networks data to explore the threat landscape of identity and access management (IAM) and identify where organizations can improve their IAM configurations.
During a Red Team exercise, Unit 42 researchers were able to discover and leverage IAM misconfigurations to obtain admin access to a customer’s entire Amazon Web Services (AWS) cloud environment – a potentially multi-million dollar data breach in the real-world. These examples highlight just how serious the failure to secure IAM can be for an organization.
Joining us in this week's Research Saturday to discuss the report for Palo Alto Networks' Unit 42 is CSO of Public Cloud, Matt Chiodi.
The research can be found here:
Highlights from the Unit 42 Cloud Threat Report, 2H 2020

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Identity and access are intrinsically connected when providing security to cloud platforms. But security is only effective when environments are properly configured and maintained. In the 2H 2020 edition of the biannual Unit 42 Cloud Threat Report, researchers conducted Red Team exercises, scanned public cloud data and pulled proprietary Palo Alto Networks data to explore the threat landscape of identity and access management (IAM) and identify where organizations can improve their IAM configurations.</p><p>During a Red Team exercise, Unit 42 researchers were able to discover and leverage IAM misconfigurations to obtain admin access to a customer’s entire Amazon Web Services (AWS) cloud environment – a potentially multi-million dollar data breach in the real-world. These examples highlight just how serious the failure to secure IAM can be for an organization.</p><p>Joining us in this week's Research Saturday to discuss the report for Palo Alto Networks' Unit 42 is CSO of Public Cloud, Matt Chiodi.</p><p>The research can be found here:</p><ul><li><a href="https://unit42.paloaltonetworks.com/highlight-cloud-threat-report-iam/">Highlights from the Unit 42 Cloud Threat Report, 2H 2020</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1181</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[571bc23c-2a9f-11eb-b6d2-47abf7ab7de9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3677409937.mp3?updated=1685108155" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Prime Minister Johnson tells Parliament about the National Cyber Force. Vietnam squeezes Facebook. Chinese cyberespionage. SEO poisoning. Printing ransom notes. CISA leadership. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1219/notes</link>
      <description>Her Majesty’s Government discloses the existence of a National Cyber Force. Hanoi tells Facebook to crack down on posts critical of Vietnam’s government. Chinese cyberespionage campaign targets Japanese companies. Egregor ransomware prints its extortion notes in hard copy. SEO poisoning with bad reviews. Mike Benjamin from Lumen on credential stuffing and password spraying. Our guest is Mark Forman from SAIC with a look at government agencies' COVID-19 response. And CISA may have a permanent director inbound.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/225
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 20 Nov 2020 20:30:00 -0000</pubDate>
      <itunes:title>Prime Minister Johnson tells Parliament about the National Cyber Force. Vietnam squeezes Facebook. Chinese cyberespionage. SEO poisoning. Printing ransom notes. CISA leadership. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1219</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Her Majesty’s Government discloses the existence of a National Cyber Force. Hanoi tells Facebook to crack down on posts critical of Vietnam’s government. Chinese cyberespionage campaign targets Japanese companies. Egregor ransomware prints its extortion notes in hard copy. SEO poisoning with bad reviews. Mike Benjamin from Lumen on credential stuffing and password spraying. Our guest is Mark Forman from SAIC with a look at government agencies' COVID-19 response. And CISA may have a permanent director inbound.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/225
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Her Majesty’s Government discloses the existence of a National Cyber Force. Hanoi tells Facebook to crack down on posts critical of Vietnam’s government. Chinese cyberespionage campaign targets Japanese companies. Egregor ransomware prints its extortion notes in hard copy. SEO poisoning with bad reviews. Mike Benjamin from Lumen on credential stuffing and password spraying. Our guest is Mark Forman from SAIC with a look at government agencies' COVID-19 response. And CISA may have a permanent director inbound.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/225</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1592</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c795f5ce-e18d-11ea-86a1-ff92e322e4ca]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9234371408.mp3?updated=1690218225" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Haunted virtual meetings. AWS APIs share vulnerabilities. US Intelligence Community conducts a post mortem on 2020 foreign election interference. Meet the future (a lot like the present, only moreso). </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1218/notes</link>
      <description>Ghosts in the virtual machines. Cloudbursts in the forecast. The US Intelligence Community is preparing a report on foreign election interference. CISA has a new interim director. A view of the threat landscape from Canada. Caleb Barlow from Cynergistek on reclassifying the internet as critical infrastructure. Our guests are Shai Cohen and Brooke Snelling from TransUnion on building trust in a digital consumer landscape. And a look into the near future.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/224
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 19 Nov 2020 19:50:00 -0000</pubDate>
      <itunes:title>Haunted virtual meetings. AWS APIs share vulnerabilities. US Intelligence Community conducts a post mortem on 2020 foreign election interference. Meet the future (a lot like the present, only moreso). </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1218</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ghosts in the virtual machines. Cloudbursts in the forecast. The US Intelligence Community is preparing a report on foreign election interference. CISA has a new interim director. A view of the threat landscape from Canada. Caleb Barlow from Cynergistek on reclassifying the internet as critical infrastructure. Our guests are Shai Cohen and Brooke Snelling from TransUnion on building trust in a digital consumer landscape. And a look into the near future.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/224
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ghosts in the virtual machines. Cloudbursts in the forecast. The US Intelligence Community is preparing a report on foreign election interference. CISA has a new interim director. A view of the threat landscape from Canada. Caleb Barlow from Cynergistek on reclassifying the internet as critical infrastructure. Our guests are Shai Cohen and Brooke Snelling from TransUnion on building trust in a digital consumer landscape. And a look into the near future.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/224</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1474</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c78ff4c6-e18d-11ea-86a1-8faada0d8937]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1510615108.mp3?updated=1690218210" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dream a FunnyDream of me. US CISA Director dismissed. Facebook, Twitter CEOs virtually visit the US Senate. Huawei CFO extradition update. Bad passwords.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1217/notes</link>
      <description>FunnyDream? No, it’s real: a cyberespionage crew operating against Southeast Asian governments. President Trump fires US CISA Director Krebs. Twitter and Facebook CEOs testify before the Senate as legislators consider Section 230. The extradition hearing for Huawei’s CFO continues in Vancouver. Joe Carrigan looks at fleeceware on the Google Play store. Rick Howard speaks with Tenable’s Steve Vintz on communication between C-Suites and security teams. And the most common passwords in 2020 are now out, and “password” only comes in at Number 4. We’re not sure that really represents progress, because wait ‘til you hear Number 1.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/223
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 18 Nov 2020 21:10:00 -0000</pubDate>
      <itunes:title>Dream a FunnyDream of me. US CISA Director dismissed. Facebook, Twitter CEOs virtually visit the US Senate. Huawei CFO extradition update. Bad passwords.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1217</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>FunnyDream? No, it’s real: a cyberespionage crew operating against Southeast Asian governments. President Trump fires US CISA Director Krebs. Twitter and Facebook CEOs testify before the Senate as legislators consider Section 230. The extradition hearing for Huawei’s CFO continues in Vancouver. Joe Carrigan looks at fleeceware on the Google Play store. Rick Howard speaks with Tenable’s Steve Vintz on communication between C-Suites and security teams. And the most common passwords in 2020 are now out, and “password” only comes in at Number 4. We’re not sure that really represents progress, because wait ‘til you hear Number 1.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/223
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>FunnyDream? No, it’s real: a cyberespionage crew operating against Southeast Asian governments. President Trump fires US CISA Director Krebs. Twitter and Facebook CEOs testify before the Senate as legislators consider Section 230. The extradition hearing for Huawei’s CFO continues in Vancouver. Joe Carrigan looks at fleeceware on the Google Play store. Rick Howard speaks with Tenable’s Steve Vintz on communication between C-Suites and security teams. And the most common passwords in 2020 are now out, and “password” only comes in at Number 4. We’re not sure that really represents progress, because wait ‘til you hear Number 1.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/223</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1439</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c78a5d4a-e18d-11ea-86a1-e3774f2af28c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6014965829.mp3?updated=1690218197" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hidden Cobra’s new tricks. Notes from the criminal underground. Draft EU data transfer regulations. And the coming ape-man disinformation. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1216/notes</link>
      <description>Hidden Cobra inserts Lazarus malware into security management chains. Malsmoke malvertizing doesn’t need exploit kits, anymore. Ransomware operators shift toward social engineering as the ransomware-as-a-service criminal market flourishes. Draft EU data transfer regulations implement the Schrems II decision. Robert M. Lee from Dragos shares a little love for the lesser-known areas of ICS security. Our guest is Greg Smith from CAMI with insights on promoting cyber capabilities at the state level. And the next thing in disinformation? No surprises here: it’s COVID-19 vaccines.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/222
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Nov 2020 20:25:00 -0000</pubDate>
      <itunes:title>Hidden Cobra’s new tricks. Notes from the criminal underground. Draft EU data transfer regulations. And the coming ape-man disinformation. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1216</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Hidden Cobra inserts Lazarus malware into security management chains. Malsmoke malvertizing doesn’t need exploit kits, anymore. Ransomware operators shift toward social engineering as the ransomware-as-a-service criminal market flourishes. Draft EU data transfer regulations implement the Schrems II decision. Robert M. Lee from Dragos shares a little love for the lesser-known areas of ICS security. Our guest is Greg Smith from CAMI with insights on promoting cyber capabilities at the state level. And the next thing in disinformation? No surprises here: it’s COVID-19 vaccines.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/222
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hidden Cobra inserts Lazarus malware into security management chains. Malsmoke malvertizing doesn’t need exploit kits, anymore. Ransomware operators shift toward social engineering as the ransomware-as-a-service criminal market flourishes. Draft EU data transfer regulations implement the Schrems II decision. Robert M. Lee from Dragos shares a little love for the lesser-known areas of ICS security. Our guest is Greg Smith from CAMI with insights on promoting cyber capabilities at the state level. And the next thing in disinformation? No surprises here: it’s COVID-19 vaccines.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/222</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1380</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c785249c-e18d-11ea-86a1-0f4c42584695]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1164277201.mp3?updated=1690218183" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage and international norms of conduct in cyberspace. DarkSide establishes storage options for its affiliates. TroubleGrabber in Discord. Unapplied patches. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1215/notes</link>
      <description>Nation-states continue to probe COVID-19 vaccine researchers. The Global Commission on the Stability of Cyberspace proposes international norms for promoting stability in cyberspace. DarkSide ransomware-as-a-service operators sweeten their offer with storage options. TroubleGrabber is stealing credentials via Discord. SAD DNS code pulled from GitHub. Betsy Carmelite from Booz Allen with a forward-looking view of 5G. Rick Howard takes a look at SOAR. Many patches remain unapplied, and CMMS wants US Defense contractors to move toward positive security. 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/221
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 16 Nov 2020 20:10:00 -0000</pubDate>
      <itunes:title>Cyberespionage and international norms of conduct in cyberspace. DarkSide establishes storage options for its affiliates. TroubleGrabber in Discord. Unapplied patches. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1215</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Nation-states continue to probe COVID-19 vaccine researchers. The Global Commission on the Stability of Cyberspace proposes international norms for promoting stability in cyberspace. DarkSide ransomware-as-a-service operators sweeten their offer with storage options. TroubleGrabber is stealing credentials via Discord. SAD DNS code pulled from GitHub. Betsy Carmelite from Booz Allen with a forward-looking view of 5G. Rick Howard takes a look at SOAR. Many patches remain unapplied, and CMMS wants US Defense contractors to move toward positive security. 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/221
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Nation-states continue to probe COVID-19 vaccine researchers. The Global Commission on the Stability of Cyberspace proposes international norms for promoting stability in cyberspace. DarkSide ransomware-as-a-service operators sweeten their offer with storage options. TroubleGrabber is stealing credentials via Discord. SAD DNS code pulled from GitHub. Betsy Carmelite from Booz Allen with a forward-looking view of 5G. Rick Howard takes a look at SOAR. Many patches remain unapplied, and CMMS wants US Defense contractors to move toward positive security. </p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/221</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1536</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7801d80-e18d-11ea-86a1-a356854330b1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1241855884.mp3?updated=1690218164" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Malek Ben Salem: Taking those challenges. [R&amp;D] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/24/notes</link>
      <description>Americas Security R&amp;D Lead for Accenture Malek Ben Salem shares how she pivoted from her love of math and background in electrical engineering to a career in cybersecurity R&amp;D. Malek talks about her interest in astrophysics as a young girl, and how her affinity for math and taking on challenges lead her to a degree in electrical engineering. She grew her career using math for data mining and forecasting eventually pursuing a masters and PhD in computer science where she shifted her focus to cybersecurity. Malek now develops and applies new AI techniques to solve security problems at Accenture. We thank Malek for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 15 Nov 2020 08:00:00 -0000</pubDate>
      <itunes:title>Malek Ben Salem: Taking those challenges. [R&amp;D] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>24</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Americas Security R&amp;D Lead for Accenture Malek Ben Salem shares how she pivoted to a career in cybersecurity R&amp;D.</itunes:subtitle>
      <itunes:summary>Americas Security R&amp;D Lead for Accenture Malek Ben Salem shares how she pivoted from her love of math and background in electrical engineering to a career in cybersecurity R&amp;D. Malek talks about her interest in astrophysics as a young girl, and how her affinity for math and taking on challenges lead her to a degree in electrical engineering. She grew her career using math for data mining and forecasting eventually pursuing a masters and PhD in computer science where she shifted her focus to cybersecurity. Malek now develops and applies new AI techniques to solve security problems at Accenture. We thank Malek for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Americas Security R&amp;D Lead for Accenture Malek Ben Salem shares how she pivoted from her love of math and background in electrical engineering to a career in cybersecurity R&amp;D. Malek talks about her interest in astrophysics as a young girl, and how her affinity for math and taking on challenges lead her to a degree in electrical engineering. She grew her career using math for data mining and forecasting eventually pursuing a masters and PhD in computer science where she shifted her focus to cybersecurity. Malek now develops and applies new AI techniques to solve security problems at Accenture. We thank Malek for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>276</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[76504ed6-2534-11eb-8811-bbdc01aa51ac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3231157111.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>That first CVE was a fun find, for sure. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/160/notes</link>
      <description>In the late 90s, hackers who discovered vulnerabilities would sometimes send an email to Bugtraq with details. Bugtraq was a notification system used by people with an interest in network security. It was also a place that might have been monitored by employees of software companies looking for reports of vulnerabilities pertaining to their software. The problem was - there wasn't an easy way to track specific vulnerabilities in specific products. 
It was May 1999. Larry Cashdollar was working as a system administrator for Bath Iron Works under contract by Computer Sciences Corporation. Specifically, he was a UNIX Systems Administrator, level one. His team managed over 3,000 UNIX systems across BIW's campuses. Most of these were CAD systems used for designing AEGIS class destroyers. This position gave me access to over 3,000 various flavors of UNIX ranging from Sun Solaris to IBM AIX.
Joining us in this week's Research Saturday to discuss his journey from finding that first CVE through the next 20 years and hundreds of CVEs is Akamai Senior Response Engineer Larry Cashdollar.
The research can be found here: 
MUSIC TO HACK TO: MY FIRST CVE AND 20 YEARS OF VULNERABILITY RESEARCH

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Nov 2020 08:00:00 -0000</pubDate>
      <itunes:title>That first CVE was a fun find, for sure. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>160</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In the late 90s, hackers who discovered vulnerabilities would sometimes send an email to Bugtraq with details. Bugtraq was a notification system used by people with an interest in network security. It was also a place that might have been monitored by employees of software companies looking for reports of vulnerabilities pertaining to their software. The problem was - there wasn't an easy way to track specific vulnerabilities in specific products. 
It was May 1999. Larry Cashdollar was working as a system administrator for Bath Iron Works under contract by Computer Sciences Corporation. Specifically, he was a UNIX Systems Administrator, level one. His team managed over 3,000 UNIX systems across BIW's campuses. Most of these were CAD systems used for designing AEGIS class destroyers. This position gave me access to over 3,000 various flavors of UNIX ranging from Sun Solaris to IBM AIX.
Joining us in this week's Research Saturday to discuss his journey from finding that first CVE through the next 20 years and hundreds of CVEs is Akamai Senior Response Engineer Larry Cashdollar.
The research can be found here: 
MUSIC TO HACK TO: MY FIRST CVE AND 20 YEARS OF VULNERABILITY RESEARCH

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In the late 90s, hackers who discovered vulnerabilities would sometimes send an email to Bugtraq with details. Bugtraq was a notification system used by people with an interest in network security. It was also a place that might have been monitored by employees of software companies looking for reports of vulnerabilities pertaining to their software. The problem was - there wasn't an easy way to track specific vulnerabilities in specific products. </p><p>It was May 1999. Larry Cashdollar was working as a system administrator for Bath Iron Works under contract by Computer Sciences Corporation. Specifically, he was a UNIX Systems Administrator, level one. His team managed over 3,000 UNIX systems across BIW's campuses. Most of these were CAD systems used for designing AEGIS class destroyers. This position gave me access to over 3,000 various flavors of UNIX ranging from Sun Solaris to IBM AIX.</p><p>Joining us in this week's Research Saturday to discuss his journey from finding that first CVE through the next 20 years and hundreds of CVEs is Akamai Senior Response Engineer Larry Cashdollar.</p><p>The research can be found here: </p><ul><li><a href="https://blogs.akamai.com/sitr/2020/10/music-to-hack-to-my-first-cve-and-20-years-of-vulnerability-research.html">MUSIC TO HACK TO: MY FIRST CVE AND 20 YEARS OF VULNERABILITY RESEARCH</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1656</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5ed3eb2-25fe-11eb-9c3d-e7a7b377354b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8525416459.mp3?updated=1685108149" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA offers its assessment (high) of US election security. An alleged GRU front media group is fingered. Notes on cybercrime, and one cheap proof-of-concept.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1214/notes</link>
      <description>CISA says US elections were secure, that recounts are to be expected in tight races. (But election-themed malspam continues, of course.) A news platform is flagged as a GRU front. A new ransomware strain takes payment through an Iranian Bitcoin exchange. The Jupyter information-stealer is out and active. David Dufour on detecting deepfakes and misinformation. Dr. Jessica Barker on her new book Confident Cyber Security - How to Get Started in Cyber Security and Futureproof Your Career. And PlunderVolt is a $30 proof-of-concept.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/220
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 13 Nov 2020 20:15:00 -0000</pubDate>
      <itunes:title>CISA offers its assessment (high) of US election security. An alleged GRU front media group is fingered. Notes on cybercrime, and one cheap proof-of-concept.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1214</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA says US elections were secure, that recounts are to be expected in tight races. (But election-themed malspam continues, of course.) A news platform is flagged as a GRU front. A new ransomware strain takes payment through an Iranian Bitcoin exchange. The Jupyter information-stealer is out and active. David Dufour on detecting deepfakes and misinformation. Dr. Jessica Barker on her new book Confident Cyber Security - How to Get Started in Cyber Security and Futureproof Your Career. And PlunderVolt is a $30 proof-of-concept.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/220
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA says US elections were secure, that recounts are to be expected in tight races. (But election-themed malspam continues, of course.) A news platform is flagged as a GRU front. A new ransomware strain takes payment through an Iranian Bitcoin exchange. The Jupyter information-stealer is out and active. David Dufour on detecting deepfakes and misinformation. Dr. Jessica Barker on her new book Confident Cyber Security - How to Get Started in Cyber Security and Futureproof Your Career. And PlunderVolt is a $30 proof-of-concept.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/220</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1525</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c761b2d2-e18d-11ea-86a1-bf95a00490f3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8774616824.mp3?updated=1690218366" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An overview of threat actors, two proofs of concept, and an IoT botnet bothers the cloud. Patch Tuesday notes. And control yourself, sir. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1213/notes</link>
      <description>BlackBerry tracks a mercenary group providing cyberespionage services. A rundown from Dragos on threat actors engaging with industrial targets. An Iot botnet is active in the cloud. A research team offers a new proof-of-concept for DNS cache poisoning, and another group of researchers demonstrates a novel power side-channel attack. Patch Tuesday notes. Joe Carrigan wonders if you’re likely to get your money’s worth when paying baddies. Our guest is Michael Daniel from the CTA on the merging fields of cybersecurity and information operations. And a pro-tip: you do know that they can usually see you on Zoom, right?
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/219
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 12 Nov 2020 21:20:00 -0000</pubDate>
      <itunes:title>An overview of threat actors, two proofs of concept, and an IoT botnet bothers the cloud. Patch Tuesday notes. And control yourself, sir. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1213</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>BlackBerry tracks a mercenary group providing cyberespionage services. A rundown from Dragos on threat actors engaging with industrial targets. An Iot botnet is active in the cloud. A research team offers a new proof-of-concept for DNS cache poisoning, and another group of researchers demonstrates a novel power side-channel attack. Patch Tuesday notes. Joe Carrigan wonders if you’re likely to get your money’s worth when paying baddies. Our guest is Michael Daniel from the CTA on the merging fields of cybersecurity and information operations. And a pro-tip: you do know that they can usually see you on Zoom, right?
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/219
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>BlackBerry tracks a mercenary group providing cyberespionage services. A rundown from Dragos on threat actors engaging with industrial targets. An Iot botnet is active in the cloud. A research team offers a new proof-of-concept for DNS cache poisoning, and another group of researchers demonstrates a novel power side-channel attack. Patch Tuesday notes. Joe Carrigan wonders if you’re likely to get your money’s worth when paying baddies. Our guest is Michael Daniel from the CTA on the merging fields of cybersecurity and information operations. And a pro-tip: you do know that they can usually see you on Zoom, right?</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/219</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1461</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c769ef60-e18d-11ea-86a1-97855155a7fc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3125719410.mp3?updated=1690218346" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>shadow IT (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/15/notes</link>
      <description>As we are not publishing in observance of Veterans Day, we thought you might like to check out a couple of episodes of our weekly Word Notes short form podcast that comes out on Tuesdays. Check it out and subscribe today! 

Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioners considered shadow IT as completely negative. Those unauthorized systems were nothing more than a hindrance that created more technical debt in organizations that were already swimming in it with the known and authorized systems. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 11 Nov 2020 21:00:00 -0000</pubDate>
      <itunes:title>shadow IT (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>15</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>As we are not publishing in observance of Veterans Day, we thought you might like to check out a couple of episodes of our weekly Word Notes short form podcast that comes out on Tuesdays. Check it out and subscribe today! 

Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioners considered shadow IT as completely negative. Those unauthorized systems were nothing more than a hindrance that created more technical debt in organizations that were already swimming in it with the known and authorized systems. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong><em>As we are not publishing in observance of Veterans Day, we thought you might like to check out a couple of episodes of our weekly Word Notes short form podcast that comes out on Tuesdays. Check it out and subscribe today! </em></strong></p><p><br></p><p>Technology, software and hardware deployed without explicit organizational approval. In the early days of the computer era from the 1980s through the 2000s security and information system practitioners considered shadow IT as completely negative. Those unauthorized systems were nothing more than a hindrance that created more technical debt in organizations that were already swimming in it with the known and authorized systems. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>294</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[48105e14-23a2-11eb-8f19-2f0b04584198]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8260916178.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>remote access Trojan or RAT (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/14/notes</link>
      <description>As we are not publishing in observance of Veterans Day, we thought you might like to check out a couple of episodes of our weekly Word Notes short form podcast that comes out on Tuesdays. Check it out and subscribe today! 
From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 11 Nov 2020 21:00:00 -0000</pubDate>
      <itunes:title>remote access Trojan or RAT (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>14</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>As we are not publishing in observance of Veterans Day, we thought you might like to check out a couple of episodes of our weekly Word Notes short form podcast that comes out on Tuesdays. Check it out and subscribe today! 
From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong><em>As we are not publishing in observance of Veterans Day, we thought you might like to check out a couple of episodes of our weekly Word Notes short form podcast that comes out on Tuesdays. Check it out and subscribe today! </em></strong></p><p>From the intrusion kill chain model, a program that provides command and control services for an attack campaign. While the first ever deployed RAT is unknown, one early example is Back Orifice made famous by the notorious hacktivist group called “The Cult of the Dead Cow,” or cDc, Back Orifice was written by the hacker, Sir Dystic AKA Josh Bookbinder and released to the public at DEFCON in 1998.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>282</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[79158aca-23a2-11eb-8803-eb93ab8b98c4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5699853999.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A look at what’s up in some of the criminal markets. The continued resilience of TrickBot. What you can buy for $155,000. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1212/notes</link>
      <description>Criminals get the news like everyone else, and online crime continues to follow current events. It’s up, it’s down, it’s up again--forget it: it’s TrickBot. A cyber incident affects computer maker Compal. Zoom settles an FTC complaint. Price check in the criminal markets. Ben Yelin on a Canadian shopping mall's collection of over 5 million shopper's images. Our guest is Ben Brook from Transcend with best practices in privacy and data protections.And spare a thought for a veteran tomorrow.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/218
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Nov 2020 21:10:00 -0000</pubDate>
      <itunes:title>A look at what’s up in some of the criminal markets. The continued resilience of TrickBot. What you can buy for $155,000. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1212</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Criminals get the news like everyone else, and online crime continues to follow current events. It’s up, it’s down, it’s up again--forget it: it’s TrickBot. A cyber incident affects computer maker Compal. Zoom settles an FTC complaint. Price check in the criminal markets. Ben Yelin on a Canadian shopping mall's collection of over 5 million shopper's images. Our guest is Ben Brook from Transcend with best practices in privacy and data protections.And spare a thought for a veteran tomorrow.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/218
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Criminals get the news like everyone else, and online crime continues to follow current events. It’s up, it’s down, it’s up again--forget it: it’s TrickBot. A cyber incident affects computer maker Compal. Zoom settles an FTC complaint. Price check in the criminal markets. Ben Yelin on a Canadian shopping mall's collection of over 5 million shopper's images. Our guest is Ben Brook from Transcend with best practices in privacy and data protections.And spare a thought for a veteran tomorrow.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/218</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1442</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c76fe104-e18d-11ea-86a1-2b1e1470af98]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6348350875.mp3?updated=1690218117" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Supply chain security. New cyberespionage from OceanLotus. Data breaches expose customer information. And GCHQ has had quite enough of this vaccine nonsense, thank you very much. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1211/notes</link>
      <description>Alerts and guidelines on securing the software supply chain (and the hardware supply chain, too). OceanLotus is back with its watering holes. Two significant breaches are disclosed. Malek Ben Salem from Accenture Labs explains privacy attacks on machine learning. Rick Howard brings the Hash Table in on containers. And, hey, we hear there’s weird stuff out there about vaccines, but GCHQ is on the case.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/217
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 09 Nov 2020 21:10:00 -0000</pubDate>
      <itunes:title>Supply chain security. New cyberespionage from OceanLotus. Data breaches expose customer information. And GCHQ has had quite enough of this vaccine nonsense, thank you very much. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1211</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Alerts and guidelines on securing the software supply chain (and the hardware supply chain, too). OceanLotus is back with its watering holes. Two significant breaches are disclosed. Malek Ben Salem from Accenture Labs explains privacy attacks on machine learning. Rick Howard brings the Hash Table in on containers. And, hey, we hear there’s weird stuff out there about vaccines, but GCHQ is on the case.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/217
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Alerts and guidelines on securing the software supply chain (and the hardware supply chain, too). OceanLotus is back with its watering holes. Two significant breaches are disclosed. Malek Ben Salem from Accenture Labs explains privacy attacks on machine learning. Rick Howard brings the Hash Table in on containers. And, hey, we hear there’s weird stuff out there about vaccines, but GCHQ is on the case.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/217</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1497</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c775cb78-e18d-11ea-86a1-d78583fad328]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5917593433.mp3?updated=1690218103" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Richard Clarke: From presidential inspiration to cybersecurity policy pioneer. [Policy] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/23/notes</link>
      <description>CEO and consultant Richard Clarke took his inspiration from President John F Kennedy and turned it into the first cybersecurity position in federal government. Determined to help change the mindset of war, Richard went to work for the Department of Defense at the Pentagon following college during the Vietnam War. From Assistant Secretary of the State Department, he moved to the White House to work for President George W. Bush's administration where he kept an eye on Al-Qaeda and was tasked to take on cybersecurity. Lacking any books or courses to give him a basic understanding of cybersecurity, Richard made it his mission to raise the level of cybersecurity knowledge. Currently as Chairman and CEO at Good Harbor Security Risk Management, Richard advises CISOs. We thank Richard for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 08 Nov 2020 08:00:00 -0000</pubDate>
      <itunes:title>Richard Clarke: From presidential inspiration to cybersecurity policy pioneer. [Policy] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>23</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>CEO and consultant Richard Clarke took his inspiration from President John F Kennedy and turned it into the first cybersecurity position in federal government. </itunes:subtitle>
      <itunes:summary>CEO and consultant Richard Clarke took his inspiration from President John F Kennedy and turned it into the first cybersecurity position in federal government. Determined to help change the mindset of war, Richard went to work for the Department of Defense at the Pentagon following college during the Vietnam War. From Assistant Secretary of the State Department, he moved to the White House to work for President George W. Bush's administration where he kept an eye on Al-Qaeda and was tasked to take on cybersecurity. Lacking any books or courses to give him a basic understanding of cybersecurity, Richard made it his mission to raise the level of cybersecurity knowledge. Currently as Chairman and CEO at Good Harbor Security Risk Management, Richard advises CISOs. We thank Richard for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CEO and consultant Richard Clarke took his inspiration from President John F Kennedy and turned it into the first cybersecurity position in federal government. Determined to help change the mindset of war, Richard went to work for the Department of Defense at the Pentagon following college during the Vietnam War. From Assistant Secretary of the State Department, he moved to the White House to work for President George W. Bush's administration where he kept an eye on Al-Qaeda and was tasked to take on cybersecurity. Lacking any books or courses to give him a basic understanding of cybersecurity, Richard made it his mission to raise the level of cybersecurity knowledge. Currently as Chairman and CEO at Good Harbor Security Risk Management, Richard advises CISOs. We thank Richard for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>329</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cf96c6d4-2050-11eb-a6c1-fff8cd6ffb4d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2889331415.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>PoetRAT: a complete lack of operational security. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/159/notes</link>
      <description>Cisco Talos discovered PoetRAT earlier this year. Since then, they observed multiple new campaigns indicating a change in the actor's capabilities and showing their maturity toward better operational security. They assess with medium confidence this actor continues to use spear-phishing attacks to lure a user to download a malicious document from temporary hosting providers. They currently believe the malware comes from malicious URLs included in the email, resulting in the user clicking and downloading a malicious document. These Word documents continue to contain malicious macros, which in turn download additional payloads once the attacker sets their sites on a particular victim. As the geopolitical tensions grow in Azerbaijan with neighboring countries, this is no doubt a stage of espionage with national security implications being deployed by a malicious actor with a specific interest in various Azerbajiani government departments.
Joining us in this week's Research Saturday to discuss the research from Cisco's Talos Outreach is Craig Williams.
The research can be found here: 
PoetRAT: Malware targeting public and private sector in Azerbaijan evolves

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Nov 2020 08:00:00 -0000</pubDate>
      <itunes:title>PoetRAT: a complete lack of operational security. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>159</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cisco Talos discovered PoetRAT earlier this year. Since then, they observed multiple new campaigns indicating a change in the actor's capabilities and showing their maturity toward better operational security. They assess with medium confidence this actor continues to use spear-phishing attacks to lure a user to download a malicious document from temporary hosting providers. They currently believe the malware comes from malicious URLs included in the email, resulting in the user clicking and downloading a malicious document. These Word documents continue to contain malicious macros, which in turn download additional payloads once the attacker sets their sites on a particular victim. As the geopolitical tensions grow in Azerbaijan with neighboring countries, this is no doubt a stage of espionage with national security implications being deployed by a malicious actor with a specific interest in various Azerbajiani government departments.
Joining us in this week's Research Saturday to discuss the research from Cisco's Talos Outreach is Craig Williams.
The research can be found here: 
PoetRAT: Malware targeting public and private sector in Azerbaijan evolves

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cisco Talos discovered PoetRAT earlier this year. Since then, they observed multiple new campaigns indicating a change in the actor's capabilities and showing their maturity toward better operational security. They assess with medium confidence this actor continues to use spear-phishing attacks to lure a user to download a malicious document from temporary hosting providers. They currently believe the malware comes from malicious URLs included in the email, resulting in the user clicking and downloading a malicious document. These Word documents continue to contain malicious macros, which in turn download additional payloads once the attacker sets their sites on a particular victim. As the geopolitical tensions grow in Azerbaijan with neighboring countries, this is no doubt a stage of espionage with national security implications being deployed by a malicious actor with a specific interest in various Azerbajiani government departments.</p><p>Joining us in this week's Research Saturday to discuss the research from Cisco's Talos Outreach is Craig Williams.</p><p>The research can be found here: </p><ul><li><a href="https://blog.talosintelligence.com/2020/10/poetrat-update.html?m=1">PoetRAT: Malware targeting public and private sector in Azerbaijan evolves</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1260</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[03b8d164-2051-11eb-b000-370409435b69]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2999373145.mp3?updated=1685108139" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>IRGC domains taken down. A look at 2021’s threatscape. Russia says its didn’t do anything (others see Bears.) Forfeiture of Silk Road’s hitherto unaccounted for billion-plus dollars. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1210/notes</link>
      <description>The US Justice Department takes down twenty-seven domains being used by Iran’s Islamic Revolutionary Guard Corps. Booz Allen offers its take on the 2021 threatscape. Russia declares itself innocent of bad behavior in cyberspace, but many remain skeptical. Johannes Ullrich from SANS looks at Supply Chain Risks and Managed Service Providers. Our own Rick Howard speaks with Wired’s Andy Greenberg about the recent Sandworm indictments. Silk Road’s mission billion dollars appear to have been found, and the US Government is working on a forfeiture action.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/216
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 06 Nov 2020 20:15:00 -0000</pubDate>
      <itunes:title>IRGC domains taken down. A look at 2021’s threatscape. Russia says its didn’t do anything (others see Bears.) Forfeiture of Silk Road’s hitherto unaccounted for billion-plus dollars. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1210</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The US Justice Department takes down twenty-seven domains being used by Iran’s Islamic Revolutionary Guard Corps. Booz Allen offers its take on the 2021 threatscape. Russia declares itself innocent of bad behavior in cyberspace, but many remain skeptical. Johannes Ullrich from SANS looks at Supply Chain Risks and Managed Service Providers. Our own Rick Howard speaks with Wired’s Andy Greenberg about the recent Sandworm indictments. Silk Road’s mission billion dollars appear to have been found, and the US Government is working on a forfeiture action.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/216
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US Justice Department takes down twenty-seven domains being used by Iran’s Islamic Revolutionary Guard Corps. Booz Allen offers its take on the 2021 threatscape. Russia declares itself innocent of bad behavior in cyberspace, but many remain skeptical. Johannes Ullrich from SANS looks at Supply Chain Risks and Managed Service Providers. Our own Rick Howard speaks with Wired’s Andy Greenberg about the recent Sandworm indictments. Silk Road’s mission billion dollars appear to have been found, and the US Government is working on a forfeiture action.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/216</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1548</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c75b8f7e-e18d-11ea-86a1-13509da13112]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7219021040.mp3?updated=1690218132" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA’s happy but still wary. Election-themed criminal malspam. New ransomware goes after VMs. Why it makes no sense to trust extortionists. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1209/notes</link>
      <description>CISA declares a modest but satisfying victory for election security, but cautions that it’s not over yet. Criminal gangs are using election-themed phishbait in malspam campaigns. A new strain of ransomware attacks virtual machines. Robert M. Lee from Dragos on the impact climate change could have on ICS security. Our guest is Kelly White of RiskRecon on healthcare organizations managing risk across extensive third party relationships. And if you wondered if the criminals who offered to securely destroy the data they stole if the victims paid the ransom, well, signs point to “no.”
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/215
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 05 Nov 2020 20:15:00 -0000</pubDate>
      <itunes:title>CISA’s happy but still wary. Election-themed criminal malspam. New ransomware goes after VMs. Why it makes no sense to trust extortionists. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1209</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA declares a modest but satisfying victory for election security, but cautions that it’s not over yet. Criminal gangs are using election-themed phishbait in malspam campaigns. A new strain of ransomware attacks virtual machines. Robert M. Lee from Dragos on the impact climate change could have on ICS security. Our guest is Kelly White of RiskRecon on healthcare organizations managing risk across extensive third party relationships. And if you wondered if the criminals who offered to securely destroy the data they stole if the victims paid the ransom, well, signs point to “no.”
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/215
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA declares a modest but satisfying victory for election security, but cautions that it’s not over yet. Criminal gangs are using election-themed phishbait in malspam campaigns. A new strain of ransomware attacks virtual machines. Robert M. Lee from Dragos on the impact climate change could have on ICS security. Our guest is Kelly White of RiskRecon on healthcare organizations managing risk across extensive third party relationships. And if you wondered if the criminals who offered to securely destroy the data they stole if the victims paid the ransom, well, signs point to “no.”</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/215</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1417</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c756511c-e18d-11ea-86a1-d79b3d6e9096]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1531276136.mp3?updated=1690218072" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US elections: CISA calls security success, but reminds all that it’s not over yet. Notes from the cyber underground. Two more indictments in cyberstalking case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1208/notes</link>
      <description>Election security, hunting forward, rumor control, and the value of preparation. Maze may be gone (so its proprietors say) but its affiliate market has moved on to Egregor ransomware-as-a-service. An illicit forum has leaked large repositories of personal information online. Joe Carrigan shares thoughts on hospital systems getting hit by ransomware. Our guest is Alan Radford from One Identity who wonders whether robots should have identities. And two more ex-eBayers are indicted in the Massachusetts cyberstalking case. 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/214
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 04 Nov 2020 20:30:00 -0000</pubDate>
      <itunes:title>US elections: CISA calls security success, but reminds all that it’s not over yet. Notes from the cyber underground. Two more indictments in cyberstalking case.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1208</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Election security, hunting forward, rumor control, and the value of preparation. Maze may be gone (so its proprietors say) but its affiliate market has moved on to Egregor ransomware-as-a-service. An illicit forum has leaked large repositories of personal information online. Joe Carrigan shares thoughts on hospital systems getting hit by ransomware. Our guest is Alan Radford from One Identity who wonders whether robots should have identities. And two more ex-eBayers are indicted in the Massachusetts cyberstalking case. 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/214
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Election security, hunting forward, rumor control, and the value of preparation. Maze may be gone (so its proprietors say) but its affiliate market has moved on to Egregor ransomware-as-a-service. An illicit forum has leaked large repositories of personal information online. Joe Carrigan shares thoughts on hospital systems getting hit by ransomware. Our guest is Alan Radford from One Identity who wonders whether robots should have identities. And two more ex-eBayers are indicted in the Massachusetts cyberstalking case. </p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/214</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1417</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7503e8a-e18d-11ea-86a1-b3b77a674495]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9077188235.mp3?updated=1690218057" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Election security updates from CISA. Maze says it’s out of business (and never really existed). Edward Snowden wants dual Russian-US citizenship. A botmaster goes up river. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1207/notes</link>
      <description>Notes on Election Day security, from CISA. The Maze gang finally releases its press release announcing that it’s going out of business. Mr. Snowden applies for dual Russian-American citizenship. Ben Yelin shares his thoughts on Mark Zuckerberg’s recent Senate testimony. Our guest is Karlo Zanki from Reversing Labs on Hidden Cobra. And a botmaster gets eight years after copping a US Federal guilty plea to conspiracy.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/213
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Nov 2020 20:00:00 -0000</pubDate>
      <itunes:title>Election security updates from CISA. Maze says it’s out of business (and never really existed). Edward Snowden wants dual Russian-US citizenship. A botmaster goes up river. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1207</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Notes on Election Day security, from CISA. The Maze gang finally releases its press release announcing that it’s going out of business. Mr. Snowden applies for dual Russian-American citizenship. Ben Yelin shares his thoughts on Mark Zuckerberg’s recent Senate testimony. Our guest is Karlo Zanki from Reversing Labs on Hidden Cobra. And a botmaster gets eight years after copping a US Federal guilty plea to conspiracy.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/213
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Notes on Election Day security, from CISA. The Maze gang finally releases its press release announcing that it’s going out of business. Mr. Snowden applies for dual Russian-American citizenship. Ben Yelin shares his thoughts on Mark Zuckerberg’s recent Senate testimony. Our guest is Karlo Zanki from Reversing Labs on Hidden Cobra. And a botmaster gets eight years after copping a US Federal guilty plea to conspiracy.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/213</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1407</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c74a5628-e18d-11ea-86a1-b7e8408ce755]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2523978806.mp3?updated=1690218051" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Another look at North Korean cyberespionage. Phishing with Google Docs. How Iran obtained US voter information. Election security enters its endgame.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1206/notes</link>
      <description>Another look at Pyongyang’s Kimsuky campaign. Phishing with bogus Google Docs. How Tehran got its hands on voter information. Rick Howard looks at containers and serverless functions. Malek Ben Salem shares the results of Accenture’s 2020 Cyber Threatscape report. And looking ahead to the election influence endgame.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/212
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 02 Nov 2020 21:30:00 -0000</pubDate>
      <itunes:title>Another look at North Korean cyberespionage. Phishing with Google Docs. How Iran obtained US voter information. Election security enters its endgame.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1206</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Another look at Pyongyang’s Kimsuky campaign. Phishing with bogus Google Docs. How Tehran got its hands on voter information. Rick Howard looks at containers and serverless functions. Malek Ben Salem shares the results of Accenture’s 2020 Cyber Threatscape report. And looking ahead to the election influence endgame.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/212
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Another look at Pyongyang’s Kimsuky campaign. Phishing with bogus Google Docs. How Tehran got its hands on voter information. Rick Howard looks at containers and serverless functions. Malek Ben Salem shares the results of Accenture’s 2020 Cyber Threatscape report. And looking ahead to the election influence endgame.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/212</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1551</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7445a16-e18d-11ea-86a1-fb54c348a036]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7400296949.mp3?updated=1690218044" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>David Sanger on the HBO documentary based off his book, "The Perfect Weapon". [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/38/notes</link>
      <description>On this Special Edition, our extended conversation with author and New York Times national security correspondent David E. Sanger. The Perfect Weapon explores the rise of cyber conflict as the primary way nations now compete with and sabotage one another. ‌
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 01 Nov 2020 08:00:00 -0000</pubDate>
      <itunes:title>David Sanger on the HBO documentary based off his book, "The Perfect Weapon". [Special Edition]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>38</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>On this Special Edition, our extended conversation with author and New York Times national security correspondent David E. Sanger. The Perfect Weapon explores the rise of cyber conflict as the primary way nations now compete with and sabotage one another. ‌
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this Special Edition, our extended conversation with author and <em>New York Times </em>national security correspondent David E. Sanger. <em>The Perfect Weapon </em>explores the rise of cyber conflict as the primary way nations now compete with and sabotage one another. ‌</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1620</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b62de5b0-1baf-11eb-a4df-d3a034a6453b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8264312606.mp3?updated=1662646042" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Carole Theriault: Constantly learning new things. [Media] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/22/notes</link>
      <description>Communications consultant and podcaster Carole Theriault always loved radio and through her career dabbled in many areas .She landed in a communications and podcasting role where she helps technical firms create audio and digital content. In fact, Carole is the CyberWire's UK Correspondent. She says cybersecurity is good place to go because of the many different avenues available and "you don't even have to be a tech head" (though Carole has quite a technical pedigree). Our thanks to Carole for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 01 Nov 2020 08:00:00 -0000</pubDate>
      <itunes:title>Carole Theriault: Constantly learning new things. [Media] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>22</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Communications consultant and podcaster Carole Theriault translated her love of radio into a technical communications and podcasting career.</itunes:subtitle>
      <itunes:summary>Communications consultant and podcaster Carole Theriault always loved radio and through her career dabbled in many areas .She landed in a communications and podcasting role where she helps technical firms create audio and digital content. In fact, Carole is the CyberWire's UK Correspondent. She says cybersecurity is good place to go because of the many different avenues available and "you don't even have to be a tech head" (though Carole has quite a technical pedigree). Our thanks to Carole for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Communications consultant and podcaster Carole Theriault always loved radio and through her career dabbled in many areas .She landed in a communications and podcasting role where she helps technical firms create audio and digital content. In fact, Carole is the CyberWire's UK Correspondent. She says cybersecurity is good place to go because of the many different avenues available and "you don't even have to be a tech head" (though Carole has quite a technical pedigree). Our thanks to Carole for sharing her story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>389</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7f90fcaa-1b81-11eb-b001-67ad066ce0f9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6614392922.mp3?updated=1604098581" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leveraging for a bigger objective. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/158/notes</link>
      <description>The U.S. government has charged seven men in relation to hundreds of cyber attacks against organizations in the U.S. and multiple other countries in Asia and Europe. Two of the men, who were based in Malaysia, were arrested and their extradition to the U.S. has been requested. The other five are based in China and remain at large.
The attacks were attributed to a China-linked organization dubbed APT41 and involved a combination of intellectual property theft and financially motivated cyber crime. While some of our peers monitor APT41 as a single operation, Symantec regards it as two distinct actors: Grayfly and Blackfly.
Joining us in this week's Research Saturday to discuss the research from Symantec's Threat Hunter Team is Jon DiMaggio.
The research can be found here: 
APT41: Indictments Put Chinese Espionage Group in the Spotlight

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 31 Oct 2020 07:00:00 -0000</pubDate>
      <itunes:title>Leveraging for a bigger objective. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>158</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The U.S. government has charged seven men in relation to hundreds of cyber attacks against organizations in the U.S. and multiple other countries in Asia and Europe. Two of the men, who were based in Malaysia, were arrested and their extradition to the U.S. has been requested. The other five are based in China and remain at large.
The attacks were attributed to a China-linked organization dubbed APT41 and involved a combination of intellectual property theft and financially motivated cyber crime. While some of our peers monitor APT41 as a single operation, Symantec regards it as two distinct actors: Grayfly and Blackfly.
Joining us in this week's Research Saturday to discuss the research from Symantec's Threat Hunter Team is Jon DiMaggio.
The research can be found here: 
APT41: Indictments Put Chinese Espionage Group in the Spotlight

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The U.S. government has charged seven men in relation to hundreds of cyber attacks against organizations in the U.S. and multiple other countries in Asia and Europe. Two of the men, who were based in Malaysia, were arrested and their extradition to the U.S. has been requested. The other five are based in China and remain at large.</p><p>The attacks were attributed to a China-linked organization dubbed APT41 and involved a combination of intellectual property theft and financially motivated cyber crime. While some of our peers monitor APT41 as a single operation, Symantec regards it as two distinct actors: Grayfly and Blackfly.</p><p>Joining us in this week's Research Saturday to discuss the research from Symantec's Threat Hunter Team is Jon DiMaggio.</p><p>The research can be found here: </p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/apt41-indictments-china-espionage">APT41: Indictments Put Chinese Espionage Group in the Spotlight</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1484</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[883dad44-1ae6-11eb-ad05-d7b473f63cef]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9554924068.mp3?updated=1685108132" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware epidemic during the pandemic. Cyber insurance and state actors. Cyberstalking. Don’t exaggerate election meddling. Reflections on National Cybersecurity Awareness Month.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1205/notes</link>
      <description>Ransomware becomes endemic in the healthcare sector. Cyber metaphors--we read a good one this morning. Does your cyber insurance indemnify you against state-sponsored attacks? More guilty pleas in the ex-eBayers’ cyberstalking case. US Cyber Command and others advise everyone not to see foreign election meddling where it isn’t. David Defour looks at the spookiest malware of 2020. Our guest is Travis Leblanc from Cooley on the European court Invalidating the EU-US Privacy Shield. And what do we make of National Cybersecurity Awareness Month as it recedes into our collective rearview mirror?
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/211
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 30 Oct 2020 19:40:00 -0000</pubDate>
      <itunes:title>Ransomware epidemic during the pandemic. Cyber insurance and state actors. Cyberstalking. Don’t exaggerate election meddling. Reflections on National Cybersecurity Awareness Month.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1205</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ransomware becomes endemic in the healthcare sector. Cyber metaphors--we read a good one this morning. Does your cyber insurance indemnify you against state-sponsored attacks? More guilty pleas in the ex-eBayers’ cyberstalking case. US Cyber Command and others advise everyone not to see foreign election meddling where it isn’t. David Defour looks at the spookiest malware of 2020. Our guest is Travis Leblanc from Cooley on the European court Invalidating the EU-US Privacy Shield. And what do we make of National Cybersecurity Awareness Month as it recedes into our collective rearview mirror?
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/211
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ransomware becomes endemic in the healthcare sector. Cyber metaphors--we read a good one this morning. Does your cyber insurance indemnify you against state-sponsored attacks? More guilty pleas in the ex-eBayers’ cyberstalking case. US Cyber Command and others advise everyone not to see foreign election meddling where it isn’t. David Defour looks at the spookiest malware of 2020. Our guest is Travis Leblanc from Cooley on the European court Invalidating the EU-US Privacy Shield. And what do we make of National Cybersecurity Awareness Month as it recedes into our collective rearview mirror?</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/211</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1620</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7285ba4-e18d-11ea-86a1-b375d6f6ec50]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6048668362.mp3?updated=1690217501" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Malware Mash!</title>
      <link>https://thecyberwire.com/stories/123bc0f691444be6af3145a6dab6cee4/malware-mash</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 30 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>The Malware Mash!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>185</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[779ac7a4-18a4-11eb-acf3-f7250d5c5ff4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9452960012.mp3?updated=1666877087" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Familiar threat actors are back in the news. Big Tech’s testimony on Capitol Hill had less to do with Section 230 than many had foreseen. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1204/notes</link>
      <description>Some familiar threat actors--both nation-states and criminal gangs--return to the news: Venomous Bear, Charming Kitten, Wizard Spider, and Maze. Mike Benjamin from Lumen looks at the Mozi malware family. Our guest is Neal Dennis from Cyware on why it's time for organizations to step up their data sharing. And Big Tech’s day on Capitol Hill involved more discussion of censorship and bias than it did Section 230 of the Communications Decency Act.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/210
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 29 Oct 2020 18:10:00 -0000</pubDate>
      <itunes:title>Familiar threat actors are back in the news. Big Tech’s testimony on Capitol Hill had less to do with Section 230 than many had foreseen. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1204</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Some familiar threat actors--both nation-states and criminal gangs--return to the news: Venomous Bear, Charming Kitten, Wizard Spider, and Maze. Mike Benjamin from Lumen looks at the Mozi malware family. Our guest is Neal Dennis from Cyware on why it's time for organizations to step up their data sharing. And Big Tech’s day on Capitol Hill involved more discussion of censorship and bias than it did Section 230 of the Communications Decency Act.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/210
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Some familiar threat actors--both nation-states and criminal gangs--return to the news: Venomous Bear, Charming Kitten, Wizard Spider, and Maze. Mike Benjamin from Lumen looks at the Mozi malware family. Our guest is Neal Dennis from Cyware on why it's time for organizations to step up their data sharing. And Big Tech’s day on Capitol Hill involved more discussion of censorship and bias than it did Section 230 of the Communications Decency Act.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/210</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1327</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c72e1a3a-e18d-11ea-86a1-738555d97e24]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4429049049.mp3?updated=1690217487" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Warnings about the DPRK’s Kimsuky Group. Election security in the US during the endgame. Section 220 and Big Tech. Another guilty plea in the eBay-related cyberstalking case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1203/notes</link>
      <description>US authorities warn that North Korea’s Kimsuky APT is out and about and bent on espionage, with a little cryptojacking on the side. As the US elections enter their endgame, observers point out that the appearance of hacking can be just as effective for foreign influence operations as the reality. CISA continues to tweet rumor control and election reassurance. Joe Carirgan share developments in end-to-end encryption. Our guest is Bilyana Lilly from RAND on Russia’s strategic messaging on social media (and the disinformation that may be a part of it). Big Tech returns to Capitol Hill. And another guilty plea in the strange case of eBay-related cyberstalking.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/209
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 28 Oct 2020 20:10:00 -0000</pubDate>
      <itunes:title>Warnings about the DPRK’s Kimsuky Group. Election security in the US during the endgame. Section 220 and Big Tech. Another guilty plea in the eBay-related cyberstalking case.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1203</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>US authorities warn that North Korea’s Kimsuky APT is out and about and bent on espionage, with a little cryptojacking on the side. As the US elections enter their endgame, observers point out that the appearance of hacking can be just as effective for foreign influence operations as the reality. CISA continues to tweet rumor control and election reassurance. Joe Carirgan share developments in end-to-end encryption. Our guest is Bilyana Lilly from RAND on Russia’s strategic messaging on social media (and the disinformation that may be a part of it). Big Tech returns to Capitol Hill. And another guilty plea in the strange case of eBay-related cyberstalking.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/209
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>US authorities warn that North Korea’s Kimsuky APT is out and about and bent on espionage, with a little cryptojacking on the side. As the US elections enter their endgame, observers point out that the appearance of hacking can be just as effective for foreign influence operations as the reality. CISA continues to tweet rumor control and election reassurance. Joe Carirgan share developments in end-to-end encryption. Our guest is Bilyana Lilly from RAND on Russia’s strategic messaging on social media (and the disinformation that may be a part of it). Big Tech returns to Capitol Hill. And another guilty plea in the strange case of eBay-related cyberstalking.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/209</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1454</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c733faf4-e18d-11ea-86a1-1706eb88bd81]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1899537917.mp3?updated=1690217397" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Election phishing, without hook, but with line and sinker? Data breaches, and the importance of prompt disclosure. Misplaced hacktivist sympathy.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1202/notes</link>
      <description>EI-ISAC reports a curious election-related phishing campaign, widespread, but indifferently coordinated and without an obvious motive. Nitro discloses a “low impact security incident.” A breach at a law firm affects current and former Googlers. Finnish psychological clinic Vastaamo dismisses its CEO for not disclosing a breach promptly. Ben Yelin looks at a controversial White House to divvy up 5G spectrum. Carole Theriault shares results from Panaseer’s 2020 GRC Peer Report. And a terrorist murder finds support online.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/208
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Oct 2020 19:45:00 -0000</pubDate>
      <itunes:title>Election phishing, without hook, but with line and sinker? Data breaches, and the importance of prompt disclosure. Misplaced hacktivist sympathy.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1202</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>EI-ISAC reports a curious election-related phishing campaign, widespread, but indifferently coordinated and without an obvious motive. Nitro discloses a “low impact security incident.” A breach at a law firm affects current and former Googlers. Finnish psychological clinic Vastaamo dismisses its CEO for not disclosing a breach promptly. Ben Yelin looks at a controversial White House to divvy up 5G spectrum. Carole Theriault shares results from Panaseer’s 2020 GRC Peer Report. And a terrorist murder finds support online.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/208
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>EI-ISAC reports a curious election-related phishing campaign, widespread, but indifferently coordinated and without an obvious motive. Nitro discloses a “low impact security incident.” A breach at a law firm affects current and former Googlers. Finnish psychological clinic Vastaamo dismisses its CEO for not disclosing a breach promptly. Ben Yelin looks at a controversial White House to divvy up 5G spectrum. Carole Theriault shares results from Panaseer’s 2020 GRC Peer Report. And a terrorist murder finds support online.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/208</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1505</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c738b0a8-e18d-11ea-86a1-43e7467f64a3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1632718189.mp3?updated=1690217115" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russian research institute sanctioned for its role in Triton/Trisis. Coordinated inauthenticity in Myanmar. Clean Network program update. Major data breach in Finland.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1201/notes</link>
      <description>The US Treasury Department sanctions a Russian research institute for its role in the Triton/Trisis ICS malware attacks. Coordinated inauthenticity with a commercial as well as a political purpose. The Clean Network project gains ground in Central and Eastern Europe. Rob Lee from Dragos on insights on the recent DOJ indictments of Russians allegedly responsible for the Sandworm campaign. Rick Howard explores SD-WANs. Data breaches afflict a large Finnish psychiatric institute.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/207
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 26 Oct 2020 20:20:00 -0000</pubDate>
      <itunes:title>Russian research institute sanctioned for its role in Triton/Trisis. Coordinated inauthenticity in Myanmar. Clean Network program update. Major data breach in Finland.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1201</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The US Treasury Department sanctions a Russian research institute for its role in the Triton/Trisis ICS malware attacks. Coordinated inauthenticity with a commercial as well as a political purpose. The Clean Network project gains ground in Central and Eastern Europe. Rob Lee from Dragos on insights on the recent DOJ indictments of Russians allegedly responsible for the Sandworm campaign. Rick Howard explores SD-WANs. Data breaches afflict a large Finnish psychiatric institute.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/207
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US Treasury Department sanctions a Russian research institute for its role in the Triton/Trisis ICS malware attacks. Coordinated inauthenticity with a commercial as well as a political purpose. The Clean Network project gains ground in Central and Eastern Europe. Rob Lee from Dragos on insights on the recent DOJ indictments of Russians allegedly responsible for the Sandworm campaign. Rick Howard explores SD-WANs. Data breaches afflict a large Finnish psychiatric institute.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/207</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1581</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c73d5856-e18d-11ea-86a1-5f21478e4df3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3254939117.mp3?updated=1690216782" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sal Aurigemma: How things work. [Education] [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/21/notes</link>
      <description>Associate Professor of Computer Information Systems at the University of Tulsa Sal Aurigemma shares how his interest in how things worked shaped his career path in nuclear power and computers, Being introduced to computers in high school and learning about the Chernobyl event led Sal to study nuclear engineering followed by time in the Navy as a submarine officer. On the submarine, Sal had to understand how systems worked from soup to nuts and that let him back to IT. As a computer engineer, Sal spent a lot of time on network troubleshooting and was eventually introduced to cybersecurity. Following 9/11, cybersecurity took on greater importance. Sal's research focuses on behavioral cybersecurity. To newcomers, he suggests heading into things with an open mind and doesn't recommend giving users 24-character passwords that have two upper, two lower, and two special characters that cannot be written down. We thank Sal for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 25 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>Sal Aurigemma: How things work. [Education] [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>21</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Associate Professor of Computer Information Systems at the University of Tulsa Sal Aurigemma on how his interest in how things work shaped his career path. </itunes:subtitle>
      <itunes:summary>Associate Professor of Computer Information Systems at the University of Tulsa Sal Aurigemma shares how his interest in how things worked shaped his career path in nuclear power and computers, Being introduced to computers in high school and learning about the Chernobyl event led Sal to study nuclear engineering followed by time in the Navy as a submarine officer. On the submarine, Sal had to understand how systems worked from soup to nuts and that let him back to IT. As a computer engineer, Sal spent a lot of time on network troubleshooting and was eventually introduced to cybersecurity. Following 9/11, cybersecurity took on greater importance. Sal's research focuses on behavioral cybersecurity. To newcomers, he suggests heading into things with an open mind and doesn't recommend giving users 24-character passwords that have two upper, two lower, and two special characters that cannot be written down. We thank Sal for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Associate Professor of Computer Information Systems at the University of Tulsa Sal Aurigemma shares how his interest in how things worked shaped his career path in nuclear power and computers, Being introduced to computers in high school and learning about the Chernobyl event led Sal to study nuclear engineering followed by time in the Navy as a submarine officer. On the submarine, Sal had to understand how systems worked from soup to nuts and that let him back to IT. As a computer engineer, Sal spent a lot of time on network troubleshooting and was eventually introduced to cybersecurity. Following 9/11, cybersecurity took on greater importance. Sal's research focuses on behavioral cybersecurity. To newcomers, he suggests heading into things with an open mind and doesn't recommend giving users 24-character passwords that have two upper, two lower, and two special characters that cannot be written down. We thank Sal for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>362</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[da1ee8ac-1475-11eb-8101-b7b2ad3f95e4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6187101497.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Just saying there are attacks is not enough. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/157/notes</link>
      <description>Ben-Gurion University researchers have developed a new artificial intelligence technique that will protect medical devices from malicious operating instructions in a cyberattack as well as other human and system errors. Complex medical devices such as CT (computed tomography), MRI (magnetic resonance imaging) and ultrasound machines are controlled by instructions sent from a host PC. Abnormal or anomalous instructions introduce many potentially harmful threats to patients, such as radiation overexposure, manipulation of device components or functional manipulation of medical images. Threats can occur due to cyberattacks, human errors such as a technician's configuration mistake or host PC software bugs.
As part of his Ph.D. research, Tom Mahler has developed a technique using artificial intelligence that analyzes the instructions sent from the PC to the physical components using a new architecture for the detection of anomalous instructions.
Joining us in this week's Research Saturday to discuss his research is CBG - Cyber@Ben Gurion University's Tom Mahler.
The research can be found here: 
A Dual-Layer Architecture for the Protection of Medical Devices from Anomalous Instructions

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>Just saying there are attacks is not enough. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>157</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ben-Gurion University researchers have developed a new artificial intelligence technique that will protect medical devices from malicious operating instructions in a cyberattack as well as other human and system errors. Complex medical devices such as CT (computed tomography), MRI (magnetic resonance imaging) and ultrasound machines are controlled by instructions sent from a host PC. Abnormal or anomalous instructions introduce many potentially harmful threats to patients, such as radiation overexposure, manipulation of device components or functional manipulation of medical images. Threats can occur due to cyberattacks, human errors such as a technician's configuration mistake or host PC software bugs.
As part of his Ph.D. research, Tom Mahler has developed a technique using artificial intelligence that analyzes the instructions sent from the PC to the physical components using a new architecture for the detection of anomalous instructions.
Joining us in this week's Research Saturday to discuss his research is CBG - Cyber@Ben Gurion University's Tom Mahler.
The research can be found here: 
A Dual-Layer Architecture for the Protection of Medical Devices from Anomalous Instructions

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ben-Gurion University researchers have developed a new artificial intelligence technique that will protect medical devices from malicious operating instructions in a cyberattack as well as other human and system errors. Complex medical devices such as CT (computed tomography), MRI (magnetic resonance imaging) and ultrasound machines are controlled by instructions sent from a host PC. Abnormal or anomalous instructions introduce many potentially harmful threats to patients, such as radiation overexposure, manipulation of device components or functional manipulation of medical images. Threats can occur due to cyberattacks, human errors such as a technician's configuration mistake or host PC software bugs.</p><p>As part of his Ph.D. research, Tom Mahler has developed a technique using artificial intelligence that analyzes the instructions sent from the PC to the physical components using a new architecture for the detection of anomalous instructions.</p><p>Joining us in this week's Research Saturday to discuss his research is CBG - Cyber@Ben Gurion University's Tom Mahler.</p><p>The research can be found here: </p><ul><li><a href="https://link.springer.com/chapter/10.1007/978-3-030-59137-3_25">A Dual-Layer Architecture for the Protection of Medical Devices from Anomalous Instructions</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1598</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c021804e-1480-11eb-80a5-03b0fb91cd2a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2407397683.mp3?updated=1685108122" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Energetic Bear’s battlespace preparation. Selling voter and consumer personal data. GRU, Qods Force sanctioned. How they knew that Iran dunnit.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1200/notes</link>
      <description>Energetic Bear is back, and maybe getting ready to go berserk in a network near you, Mr. and Mrs. United States. Someone’s selling publicly available voter and consumer information on the dark web. Sanctions against the GRU for the Bundestag hack. The US sanctions Qods Force and associated organizations for disinformation efforts. Johannes Ullrich has tips for preventing burnout. Our Rick Howard speaks with author David Sanger about his new HBO documentary The Perfect Weapon. How Iran was caught in the emailed voter threat campaign.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/205
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 23 Oct 2020 19:50:00 -0000</pubDate>
      <itunes:title>Energetic Bear’s battlespace preparation. Selling voter and consumer personal data. GRU, Qods Force sanctioned. How they knew that Iran dunnit.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1200</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Energetic Bear is back, and maybe getting ready to go berserk in a network near you, Mr. and Mrs. United States. Someone’s selling publicly available voter and consumer information on the dark web. Sanctions against the GRU for the Bundestag hack. The US sanctions Qods Force and associated organizations for disinformation efforts. Johannes Ullrich has tips for preventing burnout. Our Rick Howard speaks with author David Sanger about his new HBO documentary The Perfect Weapon. How Iran was caught in the emailed voter threat campaign.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/205
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Energetic Bear is back, and maybe getting ready to go berserk in a network near you, Mr. and Mrs. United States. Someone’s selling publicly available voter and consumer information on the dark web. Sanctions against the GRU for the Bundestag hack. The US sanctions Qods Force and associated organizations for disinformation efforts. Johannes Ullrich has tips for preventing burnout. Our Rick Howard speaks with author David Sanger about his new HBO documentary The Perfect Weapon. How Iran was caught in the emailed voter threat campaign.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/205</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1539</itunes:duration>
      <guid isPermaLink="false"><![CDATA[c72154bc-e18d-11ea-86a1-5741e26c1254]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5142580058.mp3?updated=1690216804" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Recent email threats to US voters appear to be an Iranian operation. Notes on cyberespionage and influence operations. Hold the “blatant Russophobia,” TASS?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1199/notes</link>
      <description>Emailed election threats to US voters are identified as an Iranian influence operation, disruptive, and so more in the Russian style. Both Iran and Russia appear to be preparing direct marketing influence campaigns. Cyber criminals are also exploiting US election news as phishbait. Seedworm is said to be ‘retooling.” Caleb Barlow from Cynergistek on contact tracing and privacy as students head back to school. Our guest is Jadee Hanson from Code 42 on juggling priorities and protecting her organization as external and internal threats constantly take aim. And TASS deplores the “blatant Russophobia” of recent Five Eyes’ official remarks.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/205
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 22 Oct 2020 20:50:00 -0000</pubDate>
      <itunes:title>Recent email threats to US voters appear to be an Iranian operation. Notes on cyberespionage and influence operations. Hold the “blatant Russophobia,” TASS?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1199</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Emailed election threats to US voters are identified as an Iranian influence operation, disruptive, and so more in the Russian style. Both Iran and Russia appear to be preparing direct marketing influence campaigns. Cyber criminals are also exploiting US election news as phishbait. Seedworm is said to be ‘retooling.” Caleb Barlow from Cynergistek on contact tracing and privacy as students head back to school. Our guest is Jadee Hanson from Code 42 on juggling priorities and protecting her organization as external and internal threats constantly take aim. And TASS deplores the “blatant Russophobia” of recent Five Eyes’ official remarks.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/205
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Emailed election threats to US voters are identified as an Iranian influence operation, disruptive, and so more in the Russian style. Both Iran and Russia appear to be preparing direct marketing influence campaigns. Cyber criminals are also exploiting US election news as phishbait. Seedworm is said to be ‘retooling.” Caleb Barlow from Cynergistek on contact tracing and privacy as students head back to school. Our guest is Jadee Hanson from Code 42 on juggling priorities and protecting her organization as external and internal threats constantly take aim. And TASS deplores the “blatant Russophobia” of recent Five Eyes’ official remarks.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/205</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1350</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c71a1030-e18d-11ea-86a1-a35bd2d52613]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4119134715.mp3?updated=1690216741" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>TrickBot’s return is interrupted. Election rumor control. Supply chain security. Securing the Olympics. NSS Labs closes down.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1198/notes</link>
      <description>TrickBot came back, but so did its nemesis from Redmond--Microsoft and its partners have taken down most of the new infrastructure the gang reestablished. CISA publishes election rumor control. The Cyberspace Solarium Commission has a white paper on supply chain security. Japan says it will take steps to secure next summer’s Olympics. Joe Carrigan takes issue with Twitter and Facebook limiting the spread of published news stories. Our guest is Carolyn Crandall from Attivo with a look at the market for cyber deception tools. And a familiar name exits the industry.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/204
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 21 Oct 2020 19:45:00 -0000</pubDate>
      <itunes:title>TrickBot’s return is interrupted. Election rumor control. Supply chain security. Securing the Olympics. NSS Labs closes down.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1198</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>TrickBot came back, but so did its nemesis from Redmond--Microsoft and its partners have taken down most of the new infrastructure the gang reestablished. CISA publishes election rumor control. The Cyberspace Solarium Commission has a white paper on supply chain security. Japan says it will take steps to secure next summer’s Olympics. Joe Carrigan takes issue with Twitter and Facebook limiting the spread of published news stories. Our guest is Carolyn Crandall from Attivo with a look at the market for cyber deception tools. And a familiar name exits the industry.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/204
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>TrickBot came back, but so did its nemesis from Redmond--Microsoft and its partners have taken down most of the new infrastructure the gang reestablished. CISA publishes election rumor control. The Cyberspace Solarium Commission has a white paper on supply chain security. Japan says it will take steps to secure next summer’s Olympics. Joe Carrigan takes issue with Twitter and Facebook limiting the spread of published news stories. Our guest is Carolyn Crandall from Attivo with a look at the market for cyber deception tools. And a familiar name exits the industry.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/204</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1365</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c713b640-e18d-11ea-86a1-93f98fc002c4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6519514570.mp3?updated=1690216723" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>International cyberespionage: China and Russia versus the Five Eyes and others. Google faces an anti-trust suit. Abandonware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1197/notes</link>
      <description>America’s NSA reviews twenty-five vulnerabilities under active exploitation by Chinese intelligence services. The UK’s NCSC accuses the GRU of more international cyberattacks. The US Justice Department brings its long-expected anti-trust suit against Google. Ben Yelin examines overly invasive company Zoom policies. Our guest is Jessica Gulick from Katczy with a visit to the Cyber Carnival Games. And a warning on “abandonware.”
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/203
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Oct 2020 20:00:00 -0000</pubDate>
      <itunes:title>International cyberespionage: China and Russia versus the Five Eyes and others. Google faces an anti-trust suit. Abandonware.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1197</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>America’s NSA reviews twenty-five vulnerabilities under active exploitation by Chinese intelligence services. The UK’s NCSC accuses the GRU of more international cyberattacks. The US Justice Department brings its long-expected anti-trust suit against Google. Ben Yelin examines overly invasive company Zoom policies. Our guest is Jessica Gulick from Katczy with a visit to the Cyber Carnival Games. And a warning on “abandonware.”
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/203
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>America’s NSA reviews twenty-five vulnerabilities under active exploitation by Chinese intelligence services. The UK’s NCSC accuses the GRU of more international cyberattacks. The US Justice Department brings its long-expected anti-trust suit against Google. Ben Yelin examines overly invasive company Zoom policies. Our guest is Jessica Gulick from Katczy with a visit to the Cyber Carnival Games. And a warning on “abandonware.”</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/203</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1475</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c70cd244-e18d-11ea-86a1-9703f99e671d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1467119451.mp3?updated=1690216703" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Influence operations and cyber probes of presidential campaigns. TrickBot’s recovery. Remote learning woes. Port facilities in Iran reported to have been targeted in cyberattacks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1196/notes</link>
      <description>Updates on influence ops and campaign hacking show that the opposition has its troubles, too. TrickBot operators seem to have returned to business. Schools’ remote learning programs are providing attractive targets for cybercriminals. Iranian news outlets say ports were the targets of last week’s cyberattacks. David Dufour explains how phishing campaigns capitalized on a global crisis. And Charlie Tibor says, “hello world” (we paraphrase).
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/202
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 19 Oct 2020 19:40:00 -0000</pubDate>
      <itunes:title>Influence operations and cyber probes of presidential campaigns. TrickBot’s recovery. Remote learning woes. Port facilities in Iran reported to have been targeted in cyberattacks.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1196</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Updates on influence ops and campaign hacking show that the opposition has its troubles, too. TrickBot operators seem to have returned to business. Schools’ remote learning programs are providing attractive targets for cybercriminals. Iranian news outlets say ports were the targets of last week’s cyberattacks. David Dufour explains how phishing campaigns capitalized on a global crisis. And Charlie Tibor says, “hello world” (we paraphrase).
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/202
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Updates on influence ops and campaign hacking show that the opposition has its troubles, too. TrickBot operators seem to have returned to business. Schools’ remote learning programs are providing attractive targets for cybercriminals. Iranian news outlets say ports were the targets of last week’s cyberattacks. David Dufour explains how phishing campaigns capitalized on a global crisis. And Charlie Tibor says, “hello world” (we paraphrase).</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/202</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1669</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7074004-e18d-11ea-86a1-5f03e247cb29]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7591196215.mp3?updated=1690216692" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rosa Smothers: Secure the planet. [Career Notes] </title>
      <link>https://thecyberwire.com/podcasts/career-notes/20/notes</link>
      <description>Senior VP of Cyber Operations at KnowBe4, Rosa Smothers, talks about her career as an early cybersecurity professional in what she describes as the Wild, Wild West to her path through government intelligence work. Rosa shares how she always knew she wanted to be involved with computers and how being a big Star Trek nerd and fan particularly of Spock and Uhura helped shape her direction. Following 9/11, Rosa wanted to work for the government and pursue the bad guys and she did just that completing her bachelor's degree and starting in the Defense Intelligence Agency as a cyber threat analyst focusing on extremist groups. She joined the CIA and worked on things you see in the movies, things that are science fictionesque. Rosa recommends talking with people to get your feet wet to find your passion. We thank Rosa for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 18 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>Rosa Smothers: Secure the planet. [Career Notes] </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>20</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Senior VP of Cyber Operations Rosa Smothers describes her career as an early cybersecurity professional (aka the Wild, Wild West) to government intelligence work. </itunes:subtitle>
      <itunes:summary>Senior VP of Cyber Operations at KnowBe4, Rosa Smothers, talks about her career as an early cybersecurity professional in what she describes as the Wild, Wild West to her path through government intelligence work. Rosa shares how she always knew she wanted to be involved with computers and how being a big Star Trek nerd and fan particularly of Spock and Uhura helped shape her direction. Following 9/11, Rosa wanted to work for the government and pursue the bad guys and she did just that completing her bachelor's degree and starting in the Defense Intelligence Agency as a cyber threat analyst focusing on extremist groups. She joined the CIA and worked on things you see in the movies, things that are science fictionesque. Rosa recommends talking with people to get your feet wet to find your passion. We thank Rosa for sharing her story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Senior VP of Cyber Operations at KnowBe4, Rosa Smothers, talks about her career as an early cybersecurity professional in what she describes as the Wild, Wild West to her path through government intelligence work. Rosa shares how she always knew she wanted to be involved with computers and how being a big Star Trek nerd and fan particularly of Spock and Uhura helped shape her direction. Following 9/11, Rosa wanted to work for the government and pursue the bad guys and she did just that completing her bachelor's degree and starting in the Defense Intelligence Agency as a cyber threat analyst focusing on extremist groups. She joined the CIA and worked on things you see in the movies, things that are science fictionesque. Rosa recommends talking with people to get your feet wet to find your passion. We thank Rosa for sharing her story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>332</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[94b36748-0fbb-11eb-a429-f7852b78bc2f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9935458965.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Intentionally not drawing attention. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/156/notes</link>
      <description>Bitdefender researchers recently uncovered a sophisticated APT-style attack targeting an international architectural and video production company. The attack shows signs of industrial espionage, similar to another of Bitdefender’s recent investigations of the StrongPity APT group. The real-estate industry is highly competitive, and information exfiltrated by APT mercenary group can give negotiation advantages to other players in high-profile real-estate contracts.
While APT groups traditionally could only be afforded by governments or were financially motivated purely out of self-interest, they recently appear to have become a commodity.
Joining us in this week's Research Saturday to discuss the research is Global Cybersecurity Researcher Liviu Arsene from Bitdefender.
The research can be found here: 
APT Hackers for Hire Used for Industrial Espionage

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>Intentionally not drawing attention. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>156</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Bitdefender researchers recently uncovered a sophisticated APT-style attack targeting an international architectural and video production company. The attack shows signs of industrial espionage, similar to another of Bitdefender’s recent investigations of the StrongPity APT group. The real-estate industry is highly competitive, and information exfiltrated by APT mercenary group can give negotiation advantages to other players in high-profile real-estate contracts.
While APT groups traditionally could only be afforded by governments or were financially motivated purely out of self-interest, they recently appear to have become a commodity.
Joining us in this week's Research Saturday to discuss the research is Global Cybersecurity Researcher Liviu Arsene from Bitdefender.
The research can be found here: 
APT Hackers for Hire Used for Industrial Espionage

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Bitdefender researchers recently uncovered a sophisticated APT-style attack targeting an international architectural and video production company. The attack shows signs of industrial espionage, similar to another of Bitdefender’s recent investigations of the StrongPity APT group. The real-estate industry is highly competitive, and information exfiltrated by APT mercenary group can give negotiation advantages to other players in high-profile real-estate contracts.</p><p>While APT groups traditionally could only be afforded by governments or were financially motivated purely out of self-interest, they recently appear to have become a commodity.</p><p>Joining us in this week's Research Saturday to discuss the research is Global Cybersecurity Researcher Liviu Arsene from Bitdefender.</p><p>The research can be found here: </p><ul><li><a href="https://labs.bitdefender.com/2020/08/apt-hackers-for-hire-used-for-industrial-espionage/">APT Hackers for Hire Used for Industrial Espionage</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1479</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8adb4384-0fbc-11eb-bcb0-e7b3ba859942]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8790732626.mp3?updated=1685108111" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Misdirection and redirection. Content moderation, influence operations, and Section 230. Money-laundering gang taken down. And no wolves in Nova Scotia.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1194/notes</link>
      <description>Phishing through redirector domains. Content moderation, influence operations, and Section 230. A Twitter outage is due to an error, not an attack. QQAAZZ money-laundering gang members indicted. Johannes Ullrich tracks Mirai Bots going after Amanda backups. Our guest is Richard Hummel from Netscout with research on cybersecurity trends and forecasts. And some ruminations about range safety for cyber exercises. 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/201
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 16 Oct 2020 19:50:00 -0000</pubDate>
      <itunes:title>Misdirection and redirection. Content moderation, influence operations, and Section 230. Money-laundering gang taken down. And no wolves in Nova Scotia.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1194</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Phishing through redirector domains. Content moderation, influence operations, and Section 230. A Twitter outage is due to an error, not an attack. QQAAZZ money-laundering gang members indicted. Johannes Ullrich tracks Mirai Bots going after Amanda backups. Our guest is Richard Hummel from Netscout with research on cybersecurity trends and forecasts. And some ruminations about range safety for cyber exercises. 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/201
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Phishing through redirector domains. Content moderation, influence operations, and Section 230. A Twitter outage is due to an error, not an attack. QQAAZZ money-laundering gang members indicted. Johannes Ullrich tracks Mirai Bots going after Amanda backups. Our guest is Richard Hummel from Netscout with research on cybersecurity trends and forecasts. And some ruminations about range safety for cyber exercises. </p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/201</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1517</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6f0527c-e18d-11ea-86a1-2bab48570ea5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1642440927.mp3?updated=1690216673" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Disinformation, foreign and domestic. Content moderation, always harder than it seems. US Cyber Command’s defend forward doctrine. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1194/notes</link>
      <description>Tehran says this week’s cyberattacks are under investigation. Silent Librarian returns to campus for academic year 2020-2021. Crooks are posing as nation-state hackers. Domestic disinformation reported in Guinea and Ghana. Disinformation, content moderation, and the difficulties presented by both. US Cyber Command’s forward engagement campaign. Mike Benjamin from Lumen on how bad actors reuse infrastructure. Our guest is Ralph Sita from Cybrary with a look at their "Skills Gap" research report. And an extended meditation on the Scunthorpe Problem.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/200
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 15 Oct 2020 19:40:00 -0000</pubDate>
      <itunes:title>Disinformation, foreign and domestic. Content moderation, always harder than it seems. US Cyber Command’s defend forward doctrine. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1194</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Tehran says this week’s cyberattacks are under investigation. Silent Librarian returns to campus for academic year 2020-2021. Crooks are posing as nation-state hackers. Domestic disinformation reported in Guinea and Ghana. Disinformation, content moderation, and the difficulties presented by both. US Cyber Command’s forward engagement campaign. Mike Benjamin from Lumen on how bad actors reuse infrastructure. Our guest is Ralph Sita from Cybrary with a look at their "Skills Gap" research report. And an extended meditation on the Scunthorpe Problem.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/200
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tehran says this week’s cyberattacks are under investigation. Silent Librarian returns to campus for academic year 2020-2021. Crooks are posing as nation-state hackers. Domestic disinformation reported in Guinea and Ghana. Disinformation, content moderation, and the difficulties presented by both. US Cyber Command’s forward engagement campaign. Mike Benjamin from Lumen on how bad actors reuse infrastructure. Our guest is Ralph Sita from Cybrary with a look at their "Skills Gap" research report. And an extended meditation on the Scunthorpe Problem.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/200</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1537</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6f6cb66-e18d-11ea-86a1-a3fcbd8ef780]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9961783551.mp3?updated=1690216552" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber conflict and cyberespionage. Social engineering as a turnstile business. Inside a social engineering campaign. A warning about fraudulent unemployment claims. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1193/notes</link>
      <description>Reports of cyberattacks against Iranian government and, possibly, economic targets, are circulating, but details are sparse. Norway accuses Russia of hacking parliamentary emails. A cybercriminal gang’s secret is volume. A social engineering campaign singles out victims with US IP addresses. Joe Carrigan on a million dollar REvil recruitment offer. Our guest is Paul Nicholson from A10 Networks with a look at the "State of DDoS Weapons". And the US Treasury Department warns banks to be on the lookout for signs of unemployment fraud.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/199
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 14 Oct 2020 20:00:00 -0000</pubDate>
      <itunes:title>Cyber conflict and cyberespionage. Social engineering as a turnstile business. Inside a social engineering campaign. A warning about fraudulent unemployment claims. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1193</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Reports of cyberattacks against Iranian government and, possibly, economic targets, are circulating, but details are sparse. Norway accuses Russia of hacking parliamentary emails. A cybercriminal gang’s secret is volume. A social engineering campaign singles out victims with US IP addresses. Joe Carrigan on a million dollar REvil recruitment offer. Our guest is Paul Nicholson from A10 Networks with a look at the "State of DDoS Weapons". And the US Treasury Department warns banks to be on the lookout for signs of unemployment fraud.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/199
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Reports of cyberattacks against Iranian government and, possibly, economic targets, are circulating, but details are sparse. Norway accuses Russia of hacking parliamentary emails. A cybercriminal gang’s secret is volume. A social engineering campaign singles out victims with US IP addresses. Joe Carrigan on a million dollar REvil recruitment offer. Our guest is Paul Nicholson from A10 Networks with a look at the "State of DDoS Weapons". And the US Treasury Department warns banks to be on the lookout for signs of unemployment fraud.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/199</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1400</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6fc163e-e18d-11ea-86a1-0b3acb5abfd3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9553850875.mp3?updated=1690216521" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Suppressing Trickbot: cyber warfare and cyber lawfare. Chaining vulnerabilities. An intergovernmental call for backdoors in the aid of law enforcement. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1192/notes</link>
      <description>Trickbot gets hit by both US Cyber Command and an industry team led by Microsoft. CISA and the FBI warn that an unnamed threat actor is chaining vulnerabilities, including Zerologon, to gain access to infrastructure and government targets. Ben Yelin shares his thoughts on the US House’s report on monopoly status for some of tech's biggest players. Our guest is David Higgins from CyberArk on how work from home has put a light on privilege access security. And the Five Eyes plus two call for legal access to encrypted communications.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/198
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Oct 2020 20:10:00 -0000</pubDate>
      <itunes:title>Suppressing Trickbot: cyber warfare and cyber lawfare. Chaining vulnerabilities. An intergovernmental call for backdoors in the aid of law enforcement. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1192</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Trickbot gets hit by both US Cyber Command and an industry team led by Microsoft. CISA and the FBI warn that an unnamed threat actor is chaining vulnerabilities, including Zerologon, to gain access to infrastructure and government targets. Ben Yelin shares his thoughts on the US House’s report on monopoly status for some of tech's biggest players. Our guest is David Higgins from CyberArk on how work from home has put a light on privilege access security. And the Five Eyes plus two call for legal access to encrypted communications.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/198
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Trickbot gets hit by both US Cyber Command and an industry team led by Microsoft. CISA and the FBI warn that an unnamed threat actor is chaining vulnerabilities, including Zerologon, to gain access to infrastructure and government targets. Ben Yelin shares his thoughts on the US House’s report on monopoly status for some of tech's biggest players. Our guest is David Higgins from CyberArk on how work from home has put a light on privilege access security. And the Five Eyes plus two call for legal access to encrypted communications.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/198</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1479</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7013ca4-e18d-11ea-86a1-a727e2a1b0c5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9544295828.mp3?updated=1690216505" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rigging the game. [Caveat] </title>
      <link>https://thecyberwire.com/podcasts/caveat/16/notes</link>
      <description>Ben describes a decades-long global espionage campaign alleged to have been carried out by the CIA and NSA, Dave shares a story about the feds using cell phone location data for immigration enforcement, and later in the show our conversation with Drew Harwell from the Washington Post on his article on how Colleges are turning students’ phones into surveillance machines.
Links to stories:
 ‘The intelligence coup of the century’
 RIGGING THE GAME Spy sting
 Federal Agencies Use Cellphone Location Data for Immigration Enforcement
Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com or simply leave us a message at (410) 618-3720. Hope to hear from you.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 12 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>16</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a2588be4-09ad-11eb-ab76-bbf495ef753a/image/Caveat-iTunes-Art.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ben describes a decades-long global espionage campaign alleged to have been carried out by the CIA and NSA, Dave shares a story about the feds using cell phone location data for immigration enforcement, and later in the show our conversation with Drew...</itunes:subtitle>
      <itunes:summary>Ben describes a decades-long global espionage campaign alleged to have been carried out by the CIA and NSA, Dave shares a story about the feds using cell phone location data for immigration enforcement, and later in the show our conversation with Drew Harwell from the Washington Post on his article on how Colleges are turning students’ phones into surveillance machines.
Links to stories:
 ‘The intelligence coup of the century’
 RIGGING THE GAME Spy sting
 Federal Agencies Use Cellphone Location Data for Immigration Enforcement
Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com or simply leave us a message at (410) 618-3720. Hope to hear from you.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ben describes a decades-long global espionage campaign alleged to have been carried out by the CIA and NSA, Dave shares a story about the feds using cell phone location data for immigration enforcement, and later in the show our conversation with Drew Harwell from the Washington Post on his article on how Colleges are turning students’ phones into surveillance machines.</p><p>Links to stories:</p><p><a href="https://www.washingtonpost.com/graphics/2020/world/national-security/cia-crypto-encryption-machines-espionage/?itid=hp_hp-banner-main_crypto-730am%3Ahomepage%2Fstory-ans"> ‘The intelligence coup of the century’</a></p><p><a href="https://www.baltimoresun.com/news/bs-xpm-1995-12-10-1995344001-story.html"> RIGGING THE GAME Spy sting</a></p><p><a href="https://www.wsj.com/articles/federal-agencies-use-cellphone-location-data-for-immigration-enforcement-11581078600?emailToken=73f514241d110392d7e574efb625b8d3n1nsgMbRzM3fjIzvBMD1LS5C9PLDgNunwwKjTZhVMdmz5WrEfzEYbIS6yLadfSZwSSBtn+KnxVlNlHarPJC4EljV0n6GMjs/QKLj3tzWj0Wi3BrJ57kWNt/GLLpC6ZRSDweHEqAZqPWy3l9z2/ALig%3D%3D&amp;reflink=article_copyURL_share"> Federal Agencies Use Cellphone Location Data for Immigration Enforcement</a></p><p>Got a question you'd like us to answer on our show? You can send your audio file to <a href="mailto:caveat@thecyberwire.com">caveat@thecyberwire.com</a> or simply leave us a message at (410) 618-3720. Hope to hear from you.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2560</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f9421355-36cd-4cca-b078-35704721fd8d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8711849054.mp3?updated=1683147527" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Geoff White: Suddenly all of the pieces start to line up. [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/19/notes</link>
      <description>Investigative journalist and author Geoff White talks about tracing a line through the dots of his career covering technology. Geoff shares that he has always been "quite geeky," but came to covering technology after several roles in the journalism industry. Newspapers, magazines and television were all media Geoff worked in before covering technology. Geoff got into journalism not due to the glamour sometimes associated with it, but because he wanted to fight for the public to cover stories that helped those who didn't have massive amounts of money, power or a huge lobbying campaign in political circles. When writing his book, Crime Dot Com, Geoff reflected on the cybercrime and cybersecurity stories he's covered and saw how things started falling into place. Our thanks to Geoff for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 11 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>Geoff White: Suddenly all of the pieces start to line up. [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>19</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Investigative Journalist and Author Geoff White talks about connecting the dots of his career covering technology.</itunes:subtitle>
      <itunes:summary>Investigative journalist and author Geoff White talks about tracing a line through the dots of his career covering technology. Geoff shares that he has always been "quite geeky," but came to covering technology after several roles in the journalism industry. Newspapers, magazines and television were all media Geoff worked in before covering technology. Geoff got into journalism not due to the glamour sometimes associated with it, but because he wanted to fight for the public to cover stories that helped those who didn't have massive amounts of money, power or a huge lobbying campaign in political circles. When writing his book, Crime Dot Com, Geoff reflected on the cybercrime and cybersecurity stories he's covered and saw how things started falling into place. Our thanks to Geoff for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Investigative journalist and author Geoff White talks about tracing a line through the dots of his career covering technology. Geoff shares that he has always been "quite geeky," but came to covering technology after several roles in the journalism industry. Newspapers, magazines and television were all media Geoff worked in before covering technology. Geoff got into journalism not due to the glamour sometimes associated with it, but because he wanted to fight for the public to cover stories that helped those who didn't have massive amounts of money, power or a huge lobbying campaign in political circles. When writing his book, Crime Dot Com, Geoff reflected on the cybercrime and cybersecurity stories he's covered and saw how things started falling into place. Our thanks to Geoff for sharing his story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>376</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[883e1c90-0a5e-11eb-9b97-e74e1c0b18bb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3334337599.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>It's still possible to find ways to break out. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/155/notes</link>
      <description>Containers offer speed, performance, and portability, but do they actually contain? While they try their best, the shared kernel is a disturbing attack surface: a mere kernel vulnerability may allow containerized processes to escape and compromise the host. This issue prompted a new wave of sandboxing tools that use either unikernels, lightweight VMs or userspace-kernels to separate the host OS from the container's OS.
One of these solutions is Kata Containers, a container runtime that spawns each container inside a lightweight VM, and can function as the underlying runtime in Docker and Kubernetes. Kata's virtualized containers provide two layers of isolation: even if an attacker breaks out of the container, he is still confined to the microVM.
Joining us in this week's Research Saturday to discuss the research is Yuval Avrahami from Palo Alto Networks Unit 42.
The research presented at Black Hat USA 2020 can be found here: 
Escaping Virtualized Containers

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>It's still possible to find ways to break out. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>155</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Containers offer speed, performance, and portability, but do they actually contain? While they try their best, the shared kernel is a disturbing attack surface: a mere kernel vulnerability may allow containerized processes to escape and compromise the host. This issue prompted a new wave of sandboxing tools that use either unikernels, lightweight VMs or userspace-kernels to separate the host OS from the container's OS.
One of these solutions is Kata Containers, a container runtime that spawns each container inside a lightweight VM, and can function as the underlying runtime in Docker and Kubernetes. Kata's virtualized containers provide two layers of isolation: even if an attacker breaks out of the container, he is still confined to the microVM.
Joining us in this week's Research Saturday to discuss the research is Yuval Avrahami from Palo Alto Networks Unit 42.
The research presented at Black Hat USA 2020 can be found here: 
Escaping Virtualized Containers

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Containers offer speed, performance, and portability, but do they actually contain? While they try their best, the shared kernel is a disturbing attack surface: a mere kernel vulnerability may allow containerized processes to escape and compromise the host. This issue prompted a new wave of sandboxing tools that use either unikernels, lightweight VMs or userspace-kernels to separate the host OS from the container's OS.</p><p>One of these solutions is Kata Containers, a container runtime that spawns each container inside a lightweight VM, and can function as the underlying runtime in Docker and Kubernetes. Kata's virtualized containers provide two layers of isolation: even if an attacker breaks out of the container, he is still confined to the microVM.</p><p>Joining us in this week's Research Saturday to discuss the research is Yuval Avrahami from Palo Alto Networks Unit 42.</p><p>The research presented at Black Hat USA 2020 can be found here: </p><ul><li><a href="https://www.blackhat.com/us-20/briefings/schedule/index.html#escaping-virtualized-containers-20514">Escaping Virtualized Containers</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1139</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[263d9ace-0a5f-11eb-b91f-af6a1c14b652]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4883826813.mp3?updated=1685107963" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A Parliamentary report alleges active Huawei cooperation with Chinese intelligence. Coordinated inauthenticity, mostly focused on domestic opinion. Guilty pleas from former eBayers.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1191/notes</link>
      <description>A Parliamentary committee issues a scathing report on Huawei’s connection to the Chinese government and the Communist Party of China. Facebook takes down coordinated inauthenticity with a domestic focus in four countries. Twitter goes after influence operators in four other countries. Betsy Carmelite addresses threats to telehealth platforms. Our guests are the FBI’s Herb Stapleton and the US Secret Service’s Greg McAleer new multi-agency mission center to tackle the highest priority cyber criminal threats facing the US. And two of the former eBayers charged in a cyber-stalking case have taken their expected guilty pleas.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/197
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 09 Oct 2020 19:50:00 -0000</pubDate>
      <itunes:title>A Parliamentary report alleges active Huawei cooperation with Chinese intelligence. Coordinated inauthenticity, mostly focused on domestic opinion. Guilty pleas from former eBayers.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1191</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A Parliamentary committee issues a scathing report on Huawei’s connection to the Chinese government and the Communist Party of China. Facebook takes down coordinated inauthenticity with a domestic focus in four countries. Twitter goes after influence operators in four other countries. Betsy Carmelite addresses threats to telehealth platforms. Our guests are the FBI’s Herb Stapleton and the US Secret Service’s Greg McAleer new multi-agency mission center to tackle the highest priority cyber criminal threats facing the US. And two of the former eBayers charged in a cyber-stalking case have taken their expected guilty pleas.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/197
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Parliamentary committee issues a scathing report on Huawei’s connection to the Chinese government and the Communist Party of China. Facebook takes down coordinated inauthenticity with a domestic focus in four countries. Twitter goes after influence operators in four other countries. Betsy Carmelite addresses threats to telehealth platforms. Our guests are the FBI’s Herb Stapleton and the US Secret Service’s Greg McAleer new multi-agency mission center to tackle the highest priority cyber criminal threats facing the US. And two of the former eBayers charged in a cyber-stalking case have taken their expected guilty pleas.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/197</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1502</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6e9fe0e-e18d-11ea-86a1-2398b1520d50]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5786176455.mp3?updated=1690216486" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bahamut’s hackers-for-hire. SlothfulMedia looks made-in-China. Domains run by IRGC seized. Phishbait uses current events as chum. Who dunnit? Not us, or rather, prove it, says Moscow.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1190/notes</link>
      <description>Add the Bahamut cyber mercenaries to the shadow armies for hire in cyberspace. Reports associate the SlothfulMedia RAT with Chinese intelligence services, and claim that it’s being used against India and China. The US takes down domains the Islamic Revolutionary Guard Corps uses to push disinformation. Trends in phishbait. Caleb Barlow rethinks a TED talk he gave a while back, given what we’ve learned from COVID-19. Our guest is Dr. Greg Rattray from Next Peak on 'Advanced Persistent Threats' a term, by the way, that he coined. And Moscow says, hey, we don’t meddle in anyone’s elections.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/196
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 08 Oct 2020 19:20:00 -0000</pubDate>
      <itunes:title>Bahamut’s hackers-for-hire. SlothfulMedia looks made-in-China. Domains run by IRGC seized. Phishbait uses current events as chum. Who dunnit? Not us, or rather, prove it, says Moscow.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1190</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Add the Bahamut cyber mercenaries to the shadow armies for hire in cyberspace. Reports associate the SlothfulMedia RAT with Chinese intelligence services, and claim that it’s being used against India and China. The US takes down domains the Islamic Revolutionary Guard Corps uses to push disinformation. Trends in phishbait. Caleb Barlow rethinks a TED talk he gave a while back, given what we’ve learned from COVID-19. Our guest is Dr. Greg Rattray from Next Peak on 'Advanced Persistent Threats' a term, by the way, that he coined. And Moscow says, hey, we don’t meddle in anyone’s elections.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/196
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Add the Bahamut cyber mercenaries to the shadow armies for hire in cyberspace. Reports associate the SlothfulMedia RAT with Chinese intelligence services, and claim that it’s being used against India and China. The US takes down domains the Islamic Revolutionary Guard Corps uses to push disinformation. Trends in phishbait. Caleb Barlow rethinks a TED talk he gave a while back, given what we’ve learned from COVID-19. Our guest is Dr. Greg Rattray from Next Peak on 'Advanced Persistent Threats' a term, by the way, that he coined. And Moscow says, hey, we don’t meddle in anyone’s elections.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/196</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1411</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6e259c4-e18d-11ea-86a1-132577701ba0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1950394960.mp3?updated=1690216470" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber conflict in the Caucasus. Zerologon exploited in the wild. Emotet rising. The Four Horsemen of Silicon Valley. Alt-coin regulation. DDoS in Honolulu. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1189/notes</link>
      <description>Cyber ops accompany fighting in the Caucasus. Iranian threat group exploits Zerologon in the wild. The Kraken gets unleashed in Southeast Asia, of all places. Emotet is back, and it’s after state and local governments. The US House identifies the Four Horsemen of Silicon Valley. Monero gains criminal market share. The US Comptroller of the Currency moves for clarity in alt-coin regulation. Joe Carrigan takes a look at ransomware trends. Our guest is Mathew Newfield from Unisys with remote school safety tips for students and parents. And a cyberattack from Waikiki.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/195
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 07 Oct 2020 20:10:00 -0000</pubDate>
      <itunes:title>Cyber conflict in the Caucasus. Zerologon exploited in the wild. Emotet rising. The Four Horsemen of Silicon Valley. Alt-coin regulation. DDoS in Honolulu. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1189</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cyber ops accompany fighting in the Caucasus. Iranian threat group exploits Zerologon in the wild. The Kraken gets unleashed in Southeast Asia, of all places. Emotet is back, and it’s after state and local governments. The US House identifies the Four Horsemen of Silicon Valley. Monero gains criminal market share. The US Comptroller of the Currency moves for clarity in alt-coin regulation. Joe Carrigan takes a look at ransomware trends. Our guest is Mathew Newfield from Unisys with remote school safety tips for students and parents. And a cyberattack from Waikiki.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/195
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber ops accompany fighting in the Caucasus. Iranian threat group exploits Zerologon in the wild. The Kraken gets unleashed in Southeast Asia, of all places. Emotet is back, and it’s after state and local governments. The US House identifies the Four Horsemen of Silicon Valley. Monero gains criminal market share. The US Comptroller of the Currency moves for clarity in alt-coin regulation. Joe Carrigan takes a look at ransomware trends. Our guest is Mathew Newfield from Unisys with remote school safety tips for students and parents. And a cyberattack from Waikiki.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/195</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1401</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6d724d2-e18d-11ea-86a1-f30a20472f36]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8601155789.mp3?updated=1690216455" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New, Mirai-based threat in the wild. PLA told to steer clear of US election stories. Big data in small spreadsheets. John McAfee arrested. A hackable marital (or something) aid. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1188/notes</link>
      <description>Spyware version of Mirai detected in the wild. The People’s Liberation Army is told, by its government, to lighten up on US election stories. Centripetal wins a major patent lawsuit. Excel is not a big data tool. John McAfee is arrested on US tax charges. Our guest is Roger Barranco from Akamai on tracking increased DDoS attacks. Ben Yelin on a case involving warrants for Wifi location data. And an aid to chastity is found to be hackable, but at least it errs on the side of continence.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/194
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Oct 2020 20:10:00 -0000</pubDate>
      <itunes:title>New, Mirai-based threat in the wild. PLA told to steer clear of US election stories. Big data in small spreadsheets. John McAfee arrested. A hackable marital (or something) aid. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1188</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Spyware version of Mirai detected in the wild. The People’s Liberation Army is told, by its government, to lighten up on US election stories. Centripetal wins a major patent lawsuit. Excel is not a big data tool. John McAfee is arrested on US tax charges. Our guest is Roger Barranco from Akamai on tracking increased DDoS attacks. Ben Yelin on a case involving warrants for Wifi location data. And an aid to chastity is found to be hackable, but at least it errs on the side of continence.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/194
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Spyware version of Mirai detected in the wild. The People’s Liberation Army is told, by its government, to lighten up on US election stories. Centripetal wins a major patent lawsuit. Excel is not a big data tool. John McAfee is arrested on US tax charges. Our guest is Roger Barranco from Akamai on tracking increased DDoS attacks. Ben Yelin on a case involving warrants for Wifi location data. And an aid to chastity is found to be hackable, but at least it errs on the side of continence.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/194</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1416</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6cf8330-e18d-11ea-86a1-77c984242164]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1840866081.mp3?updated=1690216439" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Maritime shipping hacks remind observers of NotPetya. Spyware through the firmware. New ransomware strain. Huawei in Europe. Go ahead, Lefty, give ‘em your fingerprints.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1187/notes</link>
      <description>Attacks on maritime shipping organizations raise concerns about global supply chains. Someone’s pushing spyware through the firmware. Someone else is messing with the heads of Trickbot’s masters. A new ransomware strain, Egregor, shows again that a ransomware attack amounts to a data breach. Huawei may be losing ground in Europe. Mike Benjamin from Lumen on DDoS ransoms. Scott Algeier from IT-ISAC looks back on 20 years of information sharing. And criminals give their fingerprints to police, virtually.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/193
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 05 Oct 2020 20:00:00 -0000</pubDate>
      <itunes:title>Maritime shipping hacks remind observers of NotPetya. Spyware through the firmware. New ransomware strain. Huawei in Europe. Go ahead, Lefty, give ‘em your fingerprints.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1187</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Attacks on maritime shipping organizations raise concerns about global supply chains. Someone’s pushing spyware through the firmware. Someone else is messing with the heads of Trickbot’s masters. A new ransomware strain, Egregor, shows again that a ransomware attack amounts to a data breach. Huawei may be losing ground in Europe. Mike Benjamin from Lumen on DDoS ransoms. Scott Algeier from IT-ISAC looks back on 20 years of information sharing. And criminals give their fingerprints to police, virtually.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/193
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Attacks on maritime shipping organizations raise concerns about global supply chains. Someone’s pushing spyware through the firmware. Someone else is messing with the heads of Trickbot’s masters. A new ransomware strain, Egregor, shows again that a ransomware attack amounts to a data breach. Huawei may be losing ground in Europe. Mike Benjamin from Lumen on DDoS ransoms. Scott Algeier from IT-ISAC looks back on 20 years of information sharing. And criminals give their fingerprints to police, virtually.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/193</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1436</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6c8b168-e18d-11ea-86a1-67e53c7d8449]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9723094586.mp3?updated=1690214973" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Diane M. Janosek: It's only together that we are going to rise. [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/18/notes</link>
      <description>Commandant for the National Security Agency's National Cryptologic School Diane M. Janosek shares the story of her career going global Diane explains how she's always been drawn to doing things that could help and raise the nation. From a position as a law clerk during law school, to the role of a judicial clerk, and joining the White House Counsel's office, Diane was exposed to many things and felt she experienced the full circle. Moving on to the Pentagon and finally, the NSA, Diane transitioned into her current role where she orchestrates the educational environment for military and civilian cyber and cryptologists worldwide for the nation. Diane encourages those who love to learn to join the multidisciplinary cybersecurity field. Our thanks to Diane for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 04 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>Diane M. Janosek: It's only together that we are going to rise. [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>18</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Commandant for the National Security Agency's National Cryptologic School Diane M. Janosek shares the story of her career going global.</itunes:subtitle>
      <itunes:summary>Commandant for the National Security Agency's National Cryptologic School Diane M. Janosek shares the story of her career going global Diane explains how she's always been drawn to doing things that could help and raise the nation. From a position as a law clerk during law school, to the role of a judicial clerk, and joining the White House Counsel's office, Diane was exposed to many things and felt she experienced the full circle. Moving on to the Pentagon and finally, the NSA, Diane transitioned into her current role where she orchestrates the educational environment for military and civilian cyber and cryptologists worldwide for the nation. Diane encourages those who love to learn to join the multidisciplinary cybersecurity field. Our thanks to Diane for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Commandant for the National Security Agency's National Cryptologic School Diane M. Janosek shares the story of her career going global Diane explains how she's always been drawn to doing things that could help and raise the nation. From a position as a law clerk during law school, to the role of a judicial clerk, and joining the White House Counsel's office, Diane was exposed to many things and felt she experienced the full circle. Moving on to the Pentagon and finally, the NSA, Diane transitioned into her current role where she orchestrates the educational environment for military and civilian cyber and cryptologists worldwide for the nation. Diane encourages those who love to learn to join the multidisciplinary cybersecurity field. Our thanks to Diane for sharing her story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>364</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ca7f9698-04ef-11eb-bfde-2b5695f8099f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6958242065.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Smaug: Ransomware-as-a-service drag(s)on. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/154/notes</link>
      <description>Threat actors and cybercriminals that don’t have the ability to develop their own ransomware for malicious campaigns can turn to the Smaug Ransomware as a Service (RaaS) offering, which is available via a Dark Web Onion site. At least two threat actors are operating the site, providing ransomware that can be used to target Windows, macOS, and Linux machines. The site is built with ease of use in mind. To launch an attack, threat actors simply need to sign up, create a campaign, and then start distributing the malware. The site also handles decryption key purchasing and tracking for victims.
Joining us in this week's Research Saturday to discuss the research is Anomali's Joakim Kennedy and Rory Gould.
The research can be found here: 
Anomali Threat Research Releases First Public Analysis of Smaug Ransomware as a Service

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Oct 2020 05:00:00 -0000</pubDate>
      <itunes:title>Smaug: Ransomware-as-a-service drag(s)on. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>154</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Threat actors and cybercriminals that don’t have the ability to develop their own ransomware for malicious campaigns can turn to the Smaug Ransomware as a Service (RaaS) offering, which is available via a Dark Web Onion site. At least two threat actors are operating the site, providing ransomware that can be used to target Windows, macOS, and Linux machines. The site is built with ease of use in mind. To launch an attack, threat actors simply need to sign up, create a campaign, and then start distributing the malware. The site also handles decryption key purchasing and tracking for victims.
Joining us in this week's Research Saturday to discuss the research is Anomali's Joakim Kennedy and Rory Gould.
The research can be found here: 
Anomali Threat Research Releases First Public Analysis of Smaug Ransomware as a Service

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Threat actors and cybercriminals that don’t have the ability to develop their own ransomware for malicious campaigns can turn to the Smaug Ransomware as a Service (RaaS) offering, which is available via a Dark Web Onion site. At least two threat actors are operating the site, providing ransomware that can be used to target Windows, macOS, and Linux machines. The site is built with ease of use in mind. To launch an attack, threat actors simply need to sign up, create a campaign, and then start distributing the malware. The site also handles decryption key purchasing and tracking for victims.</p><p>Joining us in this week's Research Saturday to discuss the research is Anomali's Joakim Kennedy and Rory Gould.</p><p>The research can be found here: </p><ul><li><a href="https://www.anomali.com/blog/anomali-threat-research-releases-first-public-analysis-of-smaug-ransomware-as-a-service">Anomali Threat Research Releases First Public Analysis of Smaug Ransomware as a Service</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1357</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eac45844-04ef-11eb-bfde-af9710a94487]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5112757860.mp3?updated=1685108099" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA and Cyber Command describe a new RAT. Emotet spams Team Blue. Spyware campaigns described. Maritime sector hacks. And another reason not to pay the ransom.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1186/notes</link>
      <description>SlothfulMedia is the new RAT in town. Emotet spam counts on political commitments. ESET describes two distinct spyware campaigns in the Middle East and Eastern Europe. Hackers are paying more attention than usual to the maritime sector. Awais Rashid from the University of Bristol on privacy concerns of contact tracing apps. Our guest is Krystle Portocarrero from Juniper Networks on the continued rise of encryption and the technical and privacy challenges that come with it. And the US Treasury Department cautions all that paying up in a ransomware attack might land you in sanctions hot water.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/192
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 02 Oct 2020 19:20:00 -0000</pubDate>
      <itunes:title>CISA and Cyber Command describe a new RAT. Emotet spams Team Blue. Spyware campaigns described. Maritime sector hacks. And another reason not to pay the ransom.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1186</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>SlothfulMedia is the new RAT in town. Emotet spam counts on political commitments. ESET describes two distinct spyware campaigns in the Middle East and Eastern Europe. Hackers are paying more attention than usual to the maritime sector. Awais Rashid from the University of Bristol on privacy concerns of contact tracing apps. Our guest is Krystle Portocarrero from Juniper Networks on the continued rise of encryption and the technical and privacy challenges that come with it. And the US Treasury Department cautions all that paying up in a ransomware attack might land you in sanctions hot water.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/192
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>SlothfulMedia is the new RAT in town. Emotet spam counts on political commitments. ESET describes two distinct spyware campaigns in the Middle East and Eastern Europe. Hackers are paying more attention than usual to the maritime sector. Awais Rashid from the University of Bristol on privacy concerns of contact tracing apps. Our guest is Krystle Portocarrero from Juniper Networks on the continued rise of encryption and the technical and privacy challenges that come with it. And the US Treasury Department cautions all that paying up in a ransomware attack might land you in sanctions hot water.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/192</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1612</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6c174de-e18d-11ea-86a1-c7f10fa242f2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2879675374.mp3?updated=1690214479" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware incidents: worse than feared. And some of them pose a threat to patient safety. A Fancy Bear sighting? Glitch suspends trading in Tokyo.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1185/notes</link>
      <description>Two ransomware incidents now seem worse than originally believed. Hacking hospitals raises concerns for patient safety. It appears Fancy Bear was the group that hacked the US Federal agency CISA warned about recently. Chris Novak from Verizon considers whether investigations should be performed under attorney client privilege and if that privilege will hold. Alex Mosher from MobileIron explains how yours truly got phished. With Cookies. And interruptions to trading on Japan’s exchanges seem to be due to technical problems, and not to cyberattack.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/191
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 01 Oct 2020 19:40:00 -0000</pubDate>
      <itunes:title>Ransomware incidents: worse than feared. And some of them pose a threat to patient safety. A Fancy Bear sighting? Glitch suspends trading in Tokyo.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1185</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Two ransomware incidents now seem worse than originally believed. Hacking hospitals raises concerns for patient safety. It appears Fancy Bear was the group that hacked the US Federal agency CISA warned about recently. Chris Novak from Verizon considers whether investigations should be performed under attorney client privilege and if that privilege will hold. Alex Mosher from MobileIron explains how yours truly got phished. With Cookies. And interruptions to trading on Japan’s exchanges seem to be due to technical problems, and not to cyberattack.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/191
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Two ransomware incidents now seem worse than originally believed. Hacking hospitals raises concerns for patient safety. It appears Fancy Bear was the group that hacked the US Federal agency CISA warned about recently. Chris Novak from Verizon considers whether investigations should be performed under attorney client privilege and if that privilege will hold. Alex Mosher from MobileIron explains how yours truly got phished. With Cookies. And interruptions to trading on Japan’s exchanges seem to be due to technical problems, and not to cyberattack.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/191</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1410</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6b6da88-e18d-11ea-86a1-a3d46ac824db]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8416538752.mp3?updated=1690214422" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Opportunistic paydays and soft targets. Crooks use captchas and padlocks, too. Protecting against Zerologon. A microelectronics strategy. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1184/notes</link>
      <description>Ransomware gangs continue to look for an opportunistic payday. Another exposed database is found, and secured. Captchas and padlock icons have their place, but they’re not a guarantee of security. Microsoft explains how to reduce exposure to Zerologon. The US looks to reduce dependence on foreign microelectronics. Joe Carrigan has thoughts on Facebook running SuperPAC ads. Our guest is Sanjay Gupta from Mitek on how online marketplaces can balance security with biometrics. And there’s just one shopping day before National Cybersecurity Month.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/190
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 30 Sep 2020 19:45:00 -0000</pubDate>
      <itunes:title>Opportunistic paydays and soft targets. Crooks use captchas and padlocks, too. Protecting against Zerologon. A microelectronics strategy. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1184</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ransomware gangs continue to look for an opportunistic payday. Another exposed database is found, and secured. Captchas and padlock icons have their place, but they’re not a guarantee of security. Microsoft explains how to reduce exposure to Zerologon. The US looks to reduce dependence on foreign microelectronics. Joe Carrigan has thoughts on Facebook running SuperPAC ads. Our guest is Sanjay Gupta from Mitek on how online marketplaces can balance security with biometrics. And there’s just one shopping day before National Cybersecurity Month.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/190
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ransomware gangs continue to look for an opportunistic payday. Another exposed database is found, and secured. Captchas and padlock icons have their place, but they’re not a guarantee of security. Microsoft explains how to reduce exposure to Zerologon. The US looks to reduce dependence on foreign microelectronics. Joe Carrigan has thoughts on Facebook running SuperPAC ads. Our guest is Sanjay Gupta from Mitek on how online marketplaces can balance security with biometrics. And there’s just one shopping day before National Cybersecurity Month.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/190</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1413</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6ac3876-e18d-11ea-86a1-174ea40d85e4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5865568196.mp3?updated=1690214409" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware versus shipping, hospitals, and schools. Cyberattacks’ growing sophistication. An interim rule enables implementation of the US Defense Department’s CMMC program.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1183/notes</link>
      <description>Three (count ‘em) three big ransomware attacks are in progress. One of them has moved into its doxing phase. Microsoft resolves authentication problems that briefly disrupted services yesterday. Tracking trends in cyberattacks--the sophistication seems to lie in the execution. The US Defense Department now has an interim rule implementing its CMMC program. Ben Yelin describes the extensive use of facial recognition software by the LAPD. Our guest is Christy Wyatt from Absolute on their Endpoint Resilience report. And why do hackers hack? To a large extent it seems they do so...because they can.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/189
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Sep 2020 19:00:00 -0000</pubDate>
      <itunes:title>Ransomware versus shipping, hospitals, and schools. Cyberattacks’ growing sophistication. An interim rule enables implementation of the US Defense Department’s CMMC program.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1183</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Three (count ‘em) three big ransomware attacks are in progress. One of them has moved into its doxing phase. Microsoft resolves authentication problems that briefly disrupted services yesterday. Tracking trends in cyberattacks--the sophistication seems to lie in the execution. The US Defense Department now has an interim rule implementing its CMMC program. Ben Yelin describes the extensive use of facial recognition software by the LAPD. Our guest is Christy Wyatt from Absolute on their Endpoint Resilience report. And why do hackers hack? To a large extent it seems they do so...because they can.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/189
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Three (count ‘em) three big ransomware attacks are in progress. One of them has moved into its doxing phase. Microsoft resolves authentication problems that briefly disrupted services yesterday. Tracking trends in cyberattacks--the sophistication seems to lie in the execution. The US Defense Department now has an interim rule implementing its CMMC program. Ben Yelin describes the extensive use of facial recognition software by the LAPD. Our guest is Christy Wyatt from Absolute on their Endpoint Resilience report. And why do hackers hack? To a large extent it seems they do so...because they can.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/189</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1473</itunes:duration>
      <guid isPermaLink="false"><![CDATA[c6a0f3a8-e18d-11ea-86a1-4bc45590a63e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6458523153.mp3?updated=1690214252" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Will no one rid me of this turbulent newsletter? US court delays TikTok ban. Microsoft takes down cyberespionage operation. Huawei’s CFO gets another day in court. REvil recruits.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1182/notes</link>
      <description>The TikTok ban has been delayed; the November goal for the company’s change in ownership still stands, at least for now. Microsoft takes down infrastructure used by a Chinese cyberespionage group. Huawei’s CFO returns to court in Vancouver. The UK shows some of its cyber offensive hand. DDoS in Hungary; malware in Texas. The strange and sad case of eBay and a newsletter. Rick Howard shares lessons learned from his CSO Perspectives podcast. Our guest is Thomas Etheridge from CrowdStrike on mitigating the risk of public cloud key compromises. And REvil wants to recruit more criminal affiliates.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/188
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 28 Sep 2020 19:35:00 -0000</pubDate>
      <itunes:title>Will no one rid me of this turbulent newsletter? US court delays TikTok ban. Microsoft takes down cyberespionage operation. Huawei’s CFO gets another day in court. REvil recruits.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1182</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The TikTok ban has been delayed; the November goal for the company’s change in ownership still stands, at least for now. Microsoft takes down infrastructure used by a Chinese cyberespionage group. Huawei’s CFO returns to court in Vancouver. The UK shows some of its cyber offensive hand. DDoS in Hungary; malware in Texas. The strange and sad case of eBay and a newsletter. Rick Howard shares lessons learned from his CSO Perspectives podcast. Our guest is Thomas Etheridge from CrowdStrike on mitigating the risk of public cloud key compromises. And REvil wants to recruit more criminal affiliates.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/188
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The TikTok ban has been delayed; the November goal for the company’s change in ownership still stands, at least for now. Microsoft takes down infrastructure used by a Chinese cyberespionage group. Huawei’s CFO returns to court in Vancouver. The UK shows some of its cyber offensive hand. DDoS in Hungary; malware in Texas. The strange and sad case of eBay and a newsletter. Rick Howard shares lessons learned from his CSO Perspectives podcast. Our guest is Thomas Etheridge from CrowdStrike on mitigating the risk of public cloud key compromises. And REvil wants to recruit more criminal affiliates.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/188</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1367</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c68d204e-e18d-11ea-86a1-d7bbb7e3d921]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4836270745.mp3?updated=1690214237" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Richard Torres: Getting that level of experience is going to be crucial. [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/17/notes</link>
      <description>Director of security operations at Syntax Richard Torres talks about his path leading him working in juvenile justice to becoming a private investigator to physical security at a nuclear power plant to cybersecurity presently. Always a fan of police shows, Richard became a member of the Air Force Junior ROTC in high school and began his path there. Richard shares the challenges of working in several facets of the security industry including his transition from SWAT team member to cybersecurity. He notes the role that diplomacy plays when you're trying to get honesty and be steered in the right direction. Our thanks to Richard for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 27 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>Richard Torres: Getting that level of experience is going to be crucial. [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>17</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Director of security operations at Syntax Richard Torres on his path leading from juvenile justice to PI to physical security to cybersecurity. </itunes:subtitle>
      <itunes:summary>Director of security operations at Syntax Richard Torres talks about his path leading him working in juvenile justice to becoming a private investigator to physical security at a nuclear power plant to cybersecurity presently. Always a fan of police shows, Richard became a member of the Air Force Junior ROTC in high school and began his path there. Richard shares the challenges of working in several facets of the security industry including his transition from SWAT team member to cybersecurity. He notes the role that diplomacy plays when you're trying to get honesty and be steered in the right direction. Our thanks to Richard for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Director of security operations at Syntax Richard Torres talks about his path leading him working in juvenile justice to becoming a private investigator to physical security at a nuclear power plant to cybersecurity presently. Always a fan of police shows, Richard became a member of the Air Force Junior ROTC in high school and began his path there. Richard shares the challenges of working in several facets of the security industry including his transition from SWAT team member to cybersecurity. He notes the role that diplomacy plays when you're trying to get honesty and be steered in the right direction. Our thanks to Richard for sharing his story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>494</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ced02308-ff71-11ea-ac2a-17965b96b545]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4952828867.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What came first, the Golden Chickens or more_eggs? [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/153/notes</link>
      <description>Throughout March and April, QuoIntelligence (QuoINT) observed four attacks (i.e. sightings) utilizing various tools from the Golden Chickens (GC) Malware-as-a-Service (MaaS) portfolio – they recently declassified their findings, after first notifying their clients. Further, during their analysis of the sightings, QuoIntelligence confirmed the GC MaaS Operator, Badbullzvenom, released improved variants with code updates to three tools in the service portfolio.
Joining us in this week's Research Saturday to discuss the research is QuoIntelligence's Vice President of Threat Intelligence, Chaz Hobson. 
The research can be found here: 
Latest Golden Chickens MaaS Tools Updates and Observed Attacks

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>What came first, the Golden Chickens or more_eggs? [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>153</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Throughout March and April, QuoIntelligence (QuoINT) observed four attacks (i.e. sightings) utilizing various tools from the Golden Chickens (GC) Malware-as-a-Service (MaaS) portfolio – they recently declassified their findings, after first notifying their clients. Further, during their analysis of the sightings, QuoIntelligence confirmed the GC MaaS Operator, Badbullzvenom, released improved variants with code updates to three tools in the service portfolio.
Joining us in this week's Research Saturday to discuss the research is QuoIntelligence's Vice President of Threat Intelligence, Chaz Hobson. 
The research can be found here: 
Latest Golden Chickens MaaS Tools Updates and Observed Attacks

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Throughout March and April, QuoIntelligence (QuoINT) observed four attacks (i.e. sightings) utilizing various tools from the Golden Chickens (GC) Malware-as-a-Service (MaaS) portfolio – they recently declassified their findings, after first notifying their clients. Further, during their analysis of the sightings, QuoIntelligence confirmed the GC MaaS Operator, Badbullzvenom, released improved variants with code updates to three tools in the service portfolio.</p><p>Joining us in this week's Research Saturday to discuss the research is QuoIntelligence's Vice President of Threat Intelligence, Chaz Hobson. </p><p>The research can be found here: </p><ul><li><a href="https://quointelligence.eu/2020/07/golden-chickens-evolution-of-the-maas/">Latest Golden Chickens MaaS Tools Updates and Observed Attacks</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1116</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e963d854-ff71-11ea-b21f-3ff94d47b3d5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1913351371.mp3?updated=1685108088" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lots of coordinated inauthenticity, but a small return in influence. Confidence building in cyberspace? CISA reports finding that a Federal agency was hacked. Cyberattacks on hospitals are up.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1181/notes</link>
      <description>Facebook takes down three Russian networks for coordinated inauthenticity: a lot of activity but not much evident ROI. Russia calls for confidence-building measures in cyberspace. CISA detects a successful incursion into an unnamed Federal agency. Governments warn of heightened rates of cyberattacks against medical organizations. Mike Benjamin from Lumen joins us with details on Alina malware. Our guest is James Dawson with insights on how to best calibrate your security budget. And there’s a not-guilty plea in the case of the attempted bribery of a Tesla insider.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/187
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 25 Sep 2020 19:20:00 -0000</pubDate>
      <itunes:title>Lots of coordinated inauthenticity, but a small return in influence. Confidence building in cyberspace? CISA reports finding that a Federal agency was hacked. Cyberattacks on hospitals are up.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1181</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Facebook takes down three Russian networks for coordinated inauthenticity: a lot of activity but not much evident ROI. Russia calls for confidence-building measures in cyberspace. CISA detects a successful incursion into an unnamed Federal agency. Governments warn of heightened rates of cyberattacks against medical organizations. Mike Benjamin from Lumen joins us with details on Alina malware. Our guest is James Dawson with insights on how to best calibrate your security budget. And there’s a not-guilty plea in the case of the attempted bribery of a Tesla insider.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/187
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Facebook takes down three Russian networks for coordinated inauthenticity: a lot of activity but not much evident ROI. Russia calls for confidence-building measures in cyberspace. CISA detects a successful incursion into an unnamed Federal agency. Governments warn of heightened rates of cyberattacks against medical organizations. Mike Benjamin from Lumen joins us with details on Alina malware. Our guest is James Dawson with insights on how to best calibrate your security budget. And there’s a not-guilty plea in the case of the attempted bribery of a Tesla insider.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><br></p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/187</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1559</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6798002-e18d-11ea-86a1-53a0085b3b5f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3186085396.mp3?updated=1690214225" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Not the Gremlin from the Kremlin.  Zerologn exploited in the wild. Cyberespionage phishing in NATO’s pond. US Treasury announces sanctions. Four guilty pleas coming in eBay cyberstalking case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1180/notes</link>
      <description>Zerologon is being actively exploited in the wild. The OldGremlin ransomware gang picks on Russian targets. Thought Fancy Bear was done with NATO? (Think again.) The US Treasury Department sanctions more organizations and individuals for malign influence operations. Betsy Carmelite from BAH on vaccine laboratory cybersecurity. Our guest is Shena Tharnish from Comcast Business with insights for small businesses concerned with COVID-19 related phishing. And four of the defendants indicted in the eBay cyberstalking case have chosen their pleas.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/186
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 24 Sep 2020 19:40:00 -0000</pubDate>
      <itunes:title>Not the Gremlin from the Kremlin.  Zerologn exploited in the wild. Cyberespionage phishing in NATO’s pond. US Treasury announces sanctions. Four guilty pleas coming in eBay cyberstalking case.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1180</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Zerologon is being actively exploited in the wild. The OldGremlin ransomware gang picks on Russian targets. Thought Fancy Bear was done with NATO? (Think again.) The US Treasury Department sanctions more organizations and individuals for malign influence operations. Betsy Carmelite from BAH on vaccine laboratory cybersecurity. Our guest is Shena Tharnish from Comcast Business with insights for small businesses concerned with COVID-19 related phishing. And four of the defendants indicted in the eBay cyberstalking case have chosen their pleas.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/186
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Zerologon is being actively exploited in the wild. The OldGremlin ransomware gang picks on Russian targets. Thought Fancy Bear was done with NATO? (Think again.) The US Treasury Department sanctions more organizations and individuals for malign influence operations. Betsy Carmelite from BAH on vaccine laboratory cybersecurity. Our guest is Shena Tharnish from Comcast Business with insights for small businesses concerned with COVID-19 related phishing. And four of the defendants indicted in the eBay cyberstalking case have chosen their pleas.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><br></p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/186</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1376</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c66c99fa-e18d-11ea-86a1-8fb7985292a8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5538017433.mp3?updated=1690214205" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Naval Gazing around the South China Sea, and other disinformation. LokiBot is back in a big way. Darknet merchants busted. Cyber rioting along the Blue Nile. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1179/notes</link>
      <description>Facebook takes down coordinated inauthenticity. A ransomware-involved death is attributed to DoppelPaymer. CISA and the FBI warn of coming election disinformation. LokiBot is back in a big way. Operation DisrupTor collars a hundred-seventy Darknet contraband merchants. Joe Carrigan comments on the botched ransomware attack in Germany that led to a woman's death. Our guest is Matt Davey from 1Password on why single sign on isn’t a silver bullet for enterprise security. And patriotic hacktivism flares along the Blue Nile.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/185
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 23 Sep 2020 19:15:00 -0000</pubDate>
      <itunes:title>Naval Gazing around the South China Sea, and other disinformation. LokiBot is back in a big way. Darknet merchants busted. Cyber rioting along the Blue Nile. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1179</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Facebook takes down coordinated inauthenticity. A ransomware-involved death is attributed to DoppelPaymer. CISA and the FBI warn of coming election disinformation. LokiBot is back in a big way. Operation DisrupTor collars a hundred-seventy Darknet contraband merchants. Joe Carrigan comments on the botched ransomware attack in Germany that led to a woman's death. Our guest is Matt Davey from 1Password on why single sign on isn’t a silver bullet for enterprise security. And patriotic hacktivism flares along the Blue Nile.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/185
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Facebook takes down coordinated inauthenticity. A ransomware-involved death is attributed to DoppelPaymer. CISA and the FBI warn of coming election disinformation. LokiBot is back in a big way. Operation DisrupTor collars a hundred-seventy Darknet contraband merchants. Joe Carrigan comments on the botched ransomware attack in Germany that led to a woman's death. Our guest is Matt Davey from 1Password on why single sign on isn’t a silver bullet for enterprise security. And patriotic hacktivism flares along the Blue Nile.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><br></p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/185</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1412</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6639b84-e18d-11ea-86a1-73e44449d591]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5107983696.mp3?updated=1690214188" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bing backend exposed, for a bit. CIA thinks Russian influence ops are top-directed. TikTok Global spin-off may not be enough. Destination automation. Hacks that weren’t, and one big guilty plea.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1178/notes</link>
      <description>In an unusual lapse, Microsoft briefly left a Bing backend server exposed online--now fixed. Sources say the CIA has concluded that Russian President Putin is personally involved in setting the direction of operations designed to influence the US elections, The deal to spin out TikTok Global to avoid a US ban may not be enough, Europe looks for more control over tech companies. Activision’s hack seems to be a mere rumor. Ben Yelin on section 230 of the communications decency act. Our guest is Ramon Pinero from Blackberry on the challenges of coordinating public services during the pandemic. And a Dark Overlord cops a plea.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/184
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Sep 2020 20:00:00 -0000</pubDate>
      <itunes:title>Bing backend exposed, for a bit. CIA thinks Russian influence ops are top-directed. TikTok Global spin-off may not be enough. Destination automation. Hacks that weren’t, and one big guilty plea.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1178</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>In an unusual lapse, Microsoft briefly left a Bing backend server exposed online--now fixed. Sources say the CIA has concluded that Russian President Putin is personally involved in setting the direction of operations designed to influence the US elections, The deal to spin out TikTok Global to avoid a US ban may not be enough, Europe looks for more control over tech companies. Activision’s hack seems to be a mere rumor. Ben Yelin on section 230 of the communications decency act. Our guest is Ramon Pinero from Blackberry on the challenges of coordinating public services during the pandemic. And a Dark Overlord cops a plea.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/184
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In an unusual lapse, Microsoft briefly left a Bing backend server exposed online--now fixed. Sources say the CIA has concluded that Russian President Putin is personally involved in setting the direction of operations designed to influence the US elections, The deal to spin out TikTok Global to avoid a US ban may not be enough, Europe looks for more control over tech companies. Activision’s hack seems to be a mere rumor. Ben Yelin on section 230 of the communications decency act. Our guest is Ramon Pinero from Blackberry on the challenges of coordinating public services during the pandemic. And a Dark Overlord cops a plea.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><br></p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/184</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1420</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c654d752-e18d-11ea-86a1-a323abe60529]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4824430045.mp3?updated=1690214173" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patch by midnight, and reply by endorsement. Cerberus is howling; Rampant Kitten is yowling. TikTok and WeChat both get reprieves. German police want ransomware operators for homicide. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1177/notes</link>
      <description>CISA tells the Feds to patch Zerologon by midnight tonight. Cerberus surges after its source code is released. Rampant Kitten, an Iranian surveillance operation, is described. The US bans on WeChat and TikTok were both postponed. Justin Harvey from Accenture marks three years since wannacry with a look at ransomware. Our own Rick Howard on red and blue team operations. And police in Germany are looking for ransomware attackers on a homicide charge.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/183
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 21 Sep 2020 19:25:00 -0000</pubDate>
      <itunes:title>Patch by midnight, and reply by endorsement. Cerberus is howling; Rampant Kitten is yowling. TikTok and WeChat both get reprieves. German police want ransomware operators for homicide. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1177</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA tells the Feds to patch Zerologon by midnight tonight. Cerberus surges after its source code is released. Rampant Kitten, an Iranian surveillance operation, is described. The US bans on WeChat and TikTok were both postponed. Justin Harvey from Accenture marks three years since wannacry with a look at ransomware. Our own Rick Howard on red and blue team operations. And police in Germany are looking for ransomware attackers on a homicide charge.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/183
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA tells the Feds to patch Zerologon by midnight tonight. Cerberus surges after its source code is released. Rampant Kitten, an Iranian surveillance operation, is described. The US bans on WeChat and TikTok were both postponed. Justin Harvey from Accenture marks three years since wannacry with a look at ransomware. Our own Rick Howard on red and blue team operations. And police in Germany are looking for ransomware attackers on a homicide charge.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><br></p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/183</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1501</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c643fce8-e18d-11ea-86a1-778b71ac9c05]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1656381725.mp3?updated=1690214158" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The cybersecurity paradox. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/8/notes</link>
      <description>The cybersecurity space is nothing if not crowded. Yet despite all the fantastic offers and promises being made by vendors, the sober reality persists that spending has not equated to improved security. Did you know that 80% of IT security budgets are focused on detection and containment controls, even though 70% of security experts believe that a greater focus on prevention would strengthen their security posture? Joining the conversation are Bob Olsen from Ankura giving his insight on the many options out there when buying cyber security systems and platforms. Later, we will be joined by Steve Salinas, Head of Product Marketing at Deep Instinct, as he addresses this paradox of why organizations are spending their scarce budget in ways that are contrary to their interests.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 20 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>The cybersecurity paradox. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The cybersecurity space is nothing if not crowded. Yet despite all the fantastic offers and promises being made by vendors, the sober reality persists that spending has not equated to improved security. Did you know that 80% of IT security budgets are focused on detection and containment controls, even though 70% of security experts believe that a greater focus on prevention would strengthen their security posture? Joining the conversation are Bob Olsen from Ankura giving his insight on the many options out there when buying cyber security systems and platforms. Later, we will be joined by Steve Salinas, Head of Product Marketing at Deep Instinct, as he addresses this paradox of why organizations are spending their scarce budget in ways that are contrary to their interests.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The cybersecurity space is nothing if not crowded. Yet despite all the fantastic offers and promises being made by vendors, the sober reality persists that spending has not equated to improved security. Did you know that 80% of IT security budgets are focused on detection and containment controls, even though 70% of security experts believe that a greater focus on prevention would strengthen their security posture? Joining the conversation are Bob Olsen from Ankura giving his insight on the many options out there when buying cyber security systems and platforms. Later, we will be joined by Steve Salinas, Head of Product Marketing at Deep Instinct, as he addresses this paradox of why organizations are spending their scarce budget in ways that are contrary to their interests.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2171</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[17af39c8-f9d3-11ea-bd17-9f41de71bd1f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7566466862.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Monica Ruiz: Moving ahead when not many look like you. [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/16/notes</link>
      <description>Cyber Initiative and Special Projects Fellow at the Hewlett Foundation Monica Ruiz shares her career development from aspirations of being a weather woman to her current role as a grantmaker and connector in cybersecurity. Monica discusses how her international study experience changed her outlook and brought her to the field of security. She shares the difficulties she faced as a woman of color when when not that many people look like you, and how she used that as her reason to move forward and better the cybersecurity field through her work. Our thanks to Monica for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 20 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>Monica Ruiz: Moving ahead when not many look like you. [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>16</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Cyber Initiative and Special Projects Fellow Monica Ruiz on her career development from weather woman to grantmaker and connector. </itunes:subtitle>
      <itunes:summary>Cyber Initiative and Special Projects Fellow at the Hewlett Foundation Monica Ruiz shares her career development from aspirations of being a weather woman to her current role as a grantmaker and connector in cybersecurity. Monica discusses how her international study experience changed her outlook and brought her to the field of security. She shares the difficulties she faced as a woman of color when when not that many people look like you, and how she used that as her reason to move forward and better the cybersecurity field through her work. Our thanks to Monica for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber Initiative and Special Projects Fellow at the Hewlett Foundation Monica Ruiz shares her career development from aspirations of being a weather woman to her current role as a grantmaker and connector in cybersecurity. Monica discusses how her international study experience changed her outlook and brought her to the field of security. She shares the difficulties she faced as a woman of color when when not that many people look like you, and how she used that as her reason to move forward and better the cybersecurity field through her work. Our thanks to Monica for sharing her story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>356</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b654a95c-f9cc-11ea-aa7a-6bbef7e4095a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5947956463.mp3?updated=1600616930" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Election 2020: What to expect when we are electing. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/152/notes</link>
      <description>After the 2016 General Election, the talk was all around foreign meddling. Rumors swirled that some votes may have been changed or influenced by state-sponsored actors. Sanctions and accusations followed. Four years later, is the U.S. any more prepared to protect the results of its largest elections? More than you may realize.
Talos researchers take a deep dive into election security after spending the past four years talking to local, state and national officials, performing their own independent research and even watching one state plan an election in real-time.
Joining us in this week's Research Saturday to discuss the report on this timely topic is Cisco Talos' Matt Olney. 
The research can be found here: 

What to expect when you’re electing: Talos’ 2020 election security primer.

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>Election 2020: What to expect when we are electing. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>152</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>After the 2016 General Election, the talk was all around foreign meddling. Rumors swirled that some votes may have been changed or influenced by state-sponsored actors. Sanctions and accusations followed. Four years later, is the U.S. any more prepared to protect the results of its largest elections? More than you may realize.
Talos researchers take a deep dive into election security after spending the past four years talking to local, state and national officials, performing their own independent research and even watching one state plan an election in real-time.
Joining us in this week's Research Saturday to discuss the report on this timely topic is Cisco Talos' Matt Olney. 
The research can be found here: 

What to expect when you’re electing: Talos’ 2020 election security primer.

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>After the 2016 General Election, the talk was all around foreign meddling. Rumors swirled that some votes may have been changed or influenced by state-sponsored actors. Sanctions and accusations followed. Four years later, is the U.S. any more prepared to protect the results of its largest elections? More than you may realize.</p><p>Talos researchers take a deep dive into election security after spending the past four years talking to local, state and national officials, performing their own independent research and even watching one state plan an election in real-time.</p><p>Joining us in this week's Research Saturday to discuss the report on this timely topic is Cisco Talos' Matt Olney. </p><p>The research can be found here: </p><ul><li>
<a href="https://blog.talosintelligence.com/2020/07/what-to-expect-when-youre-electing.html">What to expect when you’re electing: Talos’ 2020 election security primer</a>.</li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1428</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[781356d4-f9cc-11ea-a5b1-07de2eb9ea2b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7317630277.mp3?updated=1685108082" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sunday looks like sanction day for WeChat and TikTok. Grayfly and Blackfly (and APT41). Maze hides payloads in VMs. Ransomware is implicated in a death. Google Play housecleaning. Fox, chickencoop. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1176/notes</link>
      <description>The US Commerce Department announces a clampdown on TikTok and WeChat, to begin Sunday. An overview of the Grayfly and Blackfly units of APT41. Maze begins delivering payloads inside a VM. A ransomware attack on a Düsseldorf hospital is implicated in the death of a patient. Google wants less stalkerware and misrepresentation in the Play store. Caleb Barlow from Cynergistek on the Military's CMMC program. Our guest Galina Antova from Claroty highlights importance of secure remote access in industrial systems during times of crisis. And an alleged fox was allegedly guarding the henhouse.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/182
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 18 Sep 2020 20:00:00 -0000</pubDate>
      <itunes:title>Sunday looks like sanction day for WeChat and TikTok. Grayfly and Blackfly (and APT41). Maze hides payloads in VMs. Ransomware is implicated in a death. Google Play housecleaning. Fox, chickencoop. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1176</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The US Commerce Department announces a clampdown on TikTok and WeChat, to begin Sunday. An overview of the Grayfly and Blackfly units of APT41. Maze begins delivering payloads inside a VM. A ransomware attack on a Düsseldorf hospital is implicated in the death of a patient. Google wants less stalkerware and misrepresentation in the Play store. Caleb Barlow from Cynergistek on the Military's CMMC program. Our guest Galina Antova from Claroty highlights importance of secure remote access in industrial systems during times of crisis. And an alleged fox was allegedly guarding the henhouse.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/182
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US Commerce Department announces a clampdown on TikTok and WeChat, to begin Sunday. An overview of the Grayfly and Blackfly units of APT41. Maze begins delivering payloads inside a VM. A ransomware attack on a Düsseldorf hospital is implicated in the death of a patient. Google wants less stalkerware and misrepresentation in the Play store. Caleb Barlow from Cynergistek on the Military's CMMC program. Our guest Galina Antova from Claroty highlights importance of secure remote access in industrial systems during times of crisis. And an alleged fox was allegedly guarding the henhouse.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/182</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1576</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c63751be-e18d-11ea-86a1-2ff88f4a842d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4267880551.mp3?updated=1690214143" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Criminal markets and the criminals who shop there. Elections may be safe and secure, but influence operations seem here to stay. TikTok’s state of play. Indictments and extraditions. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1175/notes</link>
      <description>Cerberus is available for free, the Empire Market’s old and betrayed customers are probably looking for another marketplace where English is spoken, and it seems the Russian mob is selling access to North Korea’s Lazarus Group. NSA thinks US elections will be safe and secure, but that influence operations are probably here to stay. Betsy Carmelite from BAH on medical device security, our guest is Jonathan Langer from Medigate on lessons to help clinical and IT leaders at institutions heavily affected by COVID-19. Two Iranians are indicted for espionage and theft, and more evidence allegedly surfaces of Huawei’s role in sanctions evasion. 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/181
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 17 Sep 2020 19:35:00 -0000</pubDate>
      <itunes:title>Criminal markets and the criminals who shop there. Elections may be safe and secure, but influence operations seem here to stay. TikTok’s state of play. Indictments and extraditions. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1175</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Cerberus is available for free, the Empire Market’s old and betrayed customers are probably looking for another marketplace where English is spoken, and it seems the Russian mob is selling access to North Korea’s Lazarus Group. NSA thinks US elections will be safe and secure, but that influence operations are probably here to stay. Betsy Carmelite from BAH on medical device security, our guest is Jonathan Langer from Medigate on lessons to help clinical and IT leaders at institutions heavily affected by COVID-19. Two Iranians are indicted for espionage and theft, and more evidence allegedly surfaces of Huawei’s role in sanctions evasion. 
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/181
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cerberus is available for free, the Empire Market’s old and betrayed customers are probably looking for another marketplace where English is spoken, and it seems the Russian mob is selling access to North Korea’s Lazarus Group. NSA thinks US elections will be safe and secure, but that influence operations are probably here to stay. Betsy Carmelite from BAH on medical device security, our guest is Jonathan Langer from Medigate on lessons to help clinical and IT leaders at institutions heavily affected by COVID-19. Two Iranians are indicted for espionage and theft, and more evidence allegedly surfaces of Huawei’s role in sanctions evasion. </p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/181</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1477</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c62c6164-e18d-11ea-86a1-8b269ee567ba]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7816248750.mp3?updated=1690214129" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>VPNs in Tehran’s crosshairs. US indictments of foreign cyber threat actors. Strife exacerbated by social media. ByteDance’s plan for TikTok. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1174/notes</link>
      <description>CISA and the FBI warn of extensive Iranian cyberattacks that exploit flaws in widely used VPNs. The US indicts two men for website defacements undertaken for the benefit of Iran, and in retribution for the US drone strike that killed Quds Force commander Soleimani. The US has also indicted seven in a cybercrime and cyberespionage wave conducted in conjunction with Wicked Panda. Ethiopian strife made worse by social media. Joe Carrigan describes scammers using fake alerts on web sites. Our guest is Kevin Ford, CISO of the state of North Dakota on their move to offer free anti-malware to all state k-12 institutions. And ByteDance’s plans for TikTok grow clearer.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/180
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 16 Sep 2020 19:50:00 -0000</pubDate>
      <itunes:title>VPNs in Tehran’s crosshairs. US indictments of foreign cyber threat actors. Strife exacerbated by social media. ByteDance’s plan for TikTok. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1174</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>CISA and the FBI warn of extensive Iranian cyberattacks that exploit flaws in widely used VPNs. The US indicts two men for website defacements undertaken for the benefit of Iran, and in retribution for the US drone strike that killed Quds Force commander Soleimani. The US has also indicted seven in a cybercrime and cyberespionage wave conducted in conjunction with Wicked Panda. Ethiopian strife made worse by social media. Joe Carrigan describes scammers using fake alerts on web sites. Our guest is Kevin Ford, CISO of the state of North Dakota on their move to offer free anti-malware to all state k-12 institutions. And ByteDance’s plans for TikTok grow clearer.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/180
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA and the FBI warn of extensive Iranian cyberattacks that exploit flaws in widely used VPNs. The US indicts two men for website defacements undertaken for the benefit of Iran, and in retribution for the US drone strike that killed Quds Force commander Soleimani. The US has also indicted seven in a cybercrime and cyberespionage wave conducted in conjunction with Wicked Panda. Ethiopian strife made worse by social media. Joe Carrigan describes scammers using fake alerts on web sites. Our guest is Kevin Ford, CISO of the state of North Dakota on their move to offer free anti-malware to all state k-12 institutions. And ByteDance’s plans for TikTok grow clearer.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/180</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1404</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c624efc4-e18d-11ea-86a1-e71eee0d7ab5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5559285479.mp3?updated=1690214105" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Zerologon: hey, patch already. CISA describes China’s cyberespionage techniques (and, hey, patch already). A data breach at the US Department of Veterans Affairs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1173/notes</link>
      <description>Details of the Zerologon vulnerability are published, and it seems a serious one indeed. CISA describes Chinese cyberespionage practices--they’re not exotic, but they’re effective. What’s the difference between highly targeted market research and intelligence collection against individuals? Better commercials? Ben Yelin explains a 9th circuit court opinion with 4th amendment implications. Our guest is Exabeam’s Richard Cassidy on why when it comes to insider risk, context is everything. And there’s been a data breach at the VA.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/179
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Sep 2020 20:00:00 -0000</pubDate>
      <itunes:title>Zerologon: hey, patch already. CISA describes China’s cyberespionage techniques (and, hey, patch already). A data breach at the US Department of Veterans Affairs.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1173</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Details of the Zerologon vulnerability are published, and it seems a serious one indeed. CISA describes Chinese cyberespionage practices--they’re not exotic, but they’re effective. What’s the difference between highly targeted market research and intelligence collection against individuals? Better commercials? Ben Yelin explains a 9th circuit court opinion with 4th amendment implications. Our guest is Exabeam’s Richard Cassidy on why when it comes to insider risk, context is everything. And there’s been a data breach at the VA.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/179
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Details of the Zerologon vulnerability are published, and it seems a serious one indeed. CISA describes Chinese cyberespionage practices--they’re not exotic, but they’re effective. What’s the difference between highly targeted market research and intelligence collection against individuals? Better commercials? Ben Yelin explains a 9th circuit court opinion with 4th amendment implications. Our guest is Exabeam’s Richard Cassidy on why when it comes to insider risk, context is everything. And there’s been a data breach at the VA.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><br></p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/179</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1377</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6108f52-e18d-11ea-86a1-d3ba21842360]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7982150232.mp3?updated=1690214078" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Turning good words into bad. Crooks push those exploits through aging software while they still can. A big OSINT DB out of Shenzehn. TikTok’s fate grows narrower but murkier. Wildfire misinformation.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1171/notes</link>
      <description>Social engineers use text from legitimate recent warnings. Cybercrooks go for whatever they can get from software about to reach the end of its life. A big database filled with individual information is leaked from a Chinese government contractor. In the race to do whatever it is US companies hope to do with TikTok, Microsoft is apparently out, but Oracle is apparently in. Rick Howard looks at red versus blue. Our gust is Colby Prior, Infrastructure Engineer for AusCERT, on running honeypots. And the FBI wants you to know, contrary what you may have seen online, that Oregon wildfires are not extremist arson.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/178
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 14 Sep 2020 20:20:00 -0000</pubDate>
      <itunes:title>Turning good words into bad. Crooks push those exploits through aging software while they still can. A big OSINT DB out of Shenzehn. TikTok’s fate grows narrower but murkier. Wildfire misinformation.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1171</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Social engineers use text from legitimate recent warnings. Cybercrooks go for whatever they can get from software about to reach the end of its life. A big database filled with individual information is leaked from a Chinese government contractor. In the race to do whatever it is US companies hope to do with TikTok, Microsoft is apparently out, but Oracle is apparently in. Rick Howard looks at red versus blue. Our gust is Colby Prior, Infrastructure Engineer for AusCERT, on running honeypots. And the FBI wants you to know, contrary what you may have seen online, that Oregon wildfires are not extremist arson.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/178
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Social engineers use text from legitimate recent warnings. Cybercrooks go for whatever they can get from software about to reach the end of its life. A big database filled with individual information is leaked from a Chinese government contractor. In the race to do whatever it is US companies hope to do with TikTok, Microsoft is apparently out, but Oracle is apparently in. Rick Howard looks at red versus blue. Our gust is Colby Prior, Infrastructure Engineer for AusCERT, on running honeypots. And the FBI wants you to know, contrary what you may have seen online, that Oregon wildfires are not extremist arson.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/178</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1522</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6051d8e-e18d-11ea-86a1-432d97778905]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7840535896.mp3?updated=1690214061" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ode to Wealthy Elite. [Shadowspeak]</title>
      <description>A reading of “Ode to Wealthy Elite”, written circa August 16, 2016. From “The collected works of the Shadow Brokers, volume I,” read by D.W. Bittner, compiled and edited by the CyberWire. The Shadow Brokers represent themselves as hackers who sell stolen exploits, hacking tools, and other scandalous material online to the detriment of Wealthy Elite, whose hidden hands the ShadowBrokers wish to convince you secretly move the world's events. Their online auctions have been notorious fizzles, finding few takers, but they continue to reappear with their offers from time to time. The smart money bets that the Brokers are a Russian intelligence service operation. They communicate in Hollywood scriptwriter broken English as opposed to any known natural language.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 14 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>Ode to Wealthy Elite.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Maybe big advantage for you?</itunes:subtitle>
      <itunes:summary>A reading of “Ode to Wealthy Elite”, written circa August 16, 2016. From “The collected works of the Shadow Brokers, volume I,” read by D.W. Bittner, compiled and edited by the CyberWire. The Shadow Brokers represent themselves as hackers who sell stolen exploits, hacking tools, and other scandalous material online to the detriment of Wealthy Elite, whose hidden hands the ShadowBrokers wish to convince you secretly move the world's events. Their online auctions have been notorious fizzles, finding few takers, but they continue to reappear with their offers from time to time. The smart money bets that the Brokers are a Russian intelligence service operation. They communicate in Hollywood scriptwriter broken English as opposed to any known natural language.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A reading of “Ode to Wealthy Elite”, written circa August 16, 2016. From “The collected works of the Shadow Brokers, volume I,” read by D.W. Bittner, compiled and edited by the CyberWire. The Shadow Brokers represent themselves as hackers who sell stolen exploits, hacking tools, and other scandalous material online to the detriment of Wealthy Elite, whose hidden hands the ShadowBrokers wish to convince you secretly move the world's events. Their online auctions have been notorious fizzles, finding few takers, but they continue to reappear with their offers from time to time. The smart money bets that the Brokers are a Russian intelligence service operation. They communicate in Hollywood scriptwriter broken English as opposed to any known natural language.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>137</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[efa0a638-f455-11ea-b237-47f0c7e9146b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8892448439.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Brandon Robinson: Built from the ground up. [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/15/notes</link>
      <description>Cybersecurity Sales Engineer Brandon Robinson shares how he built his career in technology and the barriers he experienced along the way. He talks about how his job involves him interacting with customers at the highest levels making sure their solution is meeting needs. In addition, Brandon describes how as a black man and a trailblazer, he's been met with resistance. His positive spin on moving ahead involves relying on himself. Brandon's advice: find your passion, don't be intimidated and you will be met with success. Our thanks to Brandon for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 13 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>Brandon Robinson: Built from the ground up. [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>15</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Cybersecurity Sales Engineer Brandon Robinson on building his career and breaking through barriers along the way.. </itunes:subtitle>
      <itunes:summary>Cybersecurity Sales Engineer Brandon Robinson shares how he built his career in technology and the barriers he experienced along the way. He talks about how his job involves him interacting with customers at the highest levels making sure their solution is meeting needs. In addition, Brandon describes how as a black man and a trailblazer, he's been met with resistance. His positive spin on moving ahead involves relying on himself. Brandon's advice: find your passion, don't be intimidated and you will be met with success. Our thanks to Brandon for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cybersecurity Sales Engineer Brandon Robinson shares how he built his career in technology and the barriers he experienced along the way. He talks about how his job involves him interacting with customers at the highest levels making sure their solution is meeting needs. In addition, Brandon describes how as a black man and a trailblazer, he's been met with resistance. His positive spin on moving ahead involves relying on himself. Brandon's advice: find your passion, don't be intimidated and you will be met with success. Our thanks to Brandon for sharing his story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>315</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[94002bd8-f44f-11ea-afc1-6bc07685006f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2849108680.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leveraging legitimate tools. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/151/notes</link>
      <description>Researchers at Symantec spotted a Sodinokibi targeted ransomware campaign in which the attackers are also scanning the networks of some victims for credit card or point of sale (PoS) software.
It is not clear if the attackers are targeting this software for encryption or because they want to scrape this information as a way to make even more money from this attack.
Joining us in this week's Research Saturday to discuss the report is Jon DiMaggio of Symantec. 
The research can be found here: 
Sodinokibi: Ransomware Attackers also Scanning for PoS Software, Leveraging Cobalt Strike

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>Leveraging legitimate tools. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>151</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Researchers at Symantec spotted a Sodinokibi targeted ransomware campaign in which the attackers are also scanning the networks of some victims for credit card or point of sale (PoS) software.
It is not clear if the attackers are targeting this software for encryption or because they want to scrape this information as a way to make even more money from this attack.
Joining us in this week's Research Saturday to discuss the report is Jon DiMaggio of Symantec. 
The research can be found here: 
Sodinokibi: Ransomware Attackers also Scanning for PoS Software, Leveraging Cobalt Strike

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Symantec spotted a Sodinokibi targeted ransomware campaign in which the attackers are also scanning the networks of some victims for credit card or point of sale (PoS) software.</p><p>It is not clear if the attackers are targeting this software for encryption or because they want to scrape this information as a way to make even more money from this attack.</p><p>Joining us in this week's Research Saturday to discuss the report is Jon DiMaggio of Symantec. </p><p>The research can be found here: </p><ul><li><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/sodinokibi-ransomware-cobalt-strike-pos">Sodinokibi: Ransomware Attackers also Scanning for PoS Software, Leveraging Cobalt Strike</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1868</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04726b82-f456-11ea-b237-af14b0655052]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5470594032.mp3?updated=1685107946" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Elemental election meddling spooks US campaigns. CISA’s email advice. Remote workers behaving badly. Momentum Cyber’s state of the Sector. The SINET 16. And remember 9/11.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1171/notes</link>
      <description>Kittens and Pandas and Bears, oh my. Ransomware gets its skates on, but it still has loose idiomatic control. CISA has some advice on email. While at home on pandemic lockdown, a lot of people (not you) are spending too much time on unedifying sites. Momentum Cyber looks at the state of the cybersecurity sector in 2020. The SINET 16 have been announced. Chris Novak from Verizon on understanding the complexities of PFI breach investigations. Our guest is Steve Vintz from Tenable on why CFOs should lean into cybersecurity issues. And, finally, take a moment today to remember 9/11.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/177
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 11 Sep 2020 20:00:00 -0000</pubDate>
      <itunes:title>Elemental election meddling spooks US campaigns. CISA’s email advice. Remote workers behaving badly. Momentum Cyber’s state of the Sector. The SINET 16. And remember 9/11.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1171</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Kittens and Pandas and Bears, oh my. Ransomware gets its skates on, but it still has loose idiomatic control. CISA has some advice on email. While at home on pandemic lockdown, a lot of people (not you) are spending too much time on unedifying sites. Momentum Cyber looks at the state of the cybersecurity sector in 2020. The SINET 16 have been announced. Chris Novak from Verizon on understanding the complexities of PFI breach investigations. Our guest is Steve Vintz from Tenable on why CFOs should lean into cybersecurity issues. And, finally, take a moment today to remember 9/11.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/177
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kittens and Pandas and Bears, oh my. Ransomware gets its skates on, but it still has loose idiomatic control. CISA has some advice on email. While at home on pandemic lockdown, a lot of people (not you) are spending too much time on unedifying sites. Momentum Cyber looks at the state of the cybersecurity sector in 2020. The SINET 16 have been announced. Chris Novak from Verizon on understanding the complexities of PFI breach investigations. Our guest is Steve Vintz from Tenable on why CFOs should lean into cybersecurity issues. And, finally, take a moment today to remember 9/11.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/177</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1672</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c5f32ea8-e18d-11ea-86a1-53f89463334a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8204598586.mp3?updated=1690214044" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware hits Equinix. Tools for vandalism for sale. Stealing VoIP call data records. ByteDance negotiates for TikTok. EU clamps down on Facebook data handling. A high-profile Twitter hijacking.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1170/notes</link>
      <description>Ransomware hits a major data center provider, but appears to have left service unaffected. There’s a thriving criminal market for website defacement tools: vandals can be consumers, too. CDRThief does what its name implies. ByteDance tried negotiating TikTok’s American future. Ireland’s Data Protection Commission starts enforcing Schrems II against Facebook. Awais Rashid outlines software development security pitfalls. Our guest is John Morello from Palo Alto with insights from their new State of Cloud Native Security report. And China’s ambassador to the UK has his Twitter account hacked.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/176
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 10 Sep 2020 19:00:00 -0000</pubDate>
      <itunes:title>Ransomware hits Equinix. Tools for vandalism for sale. Stealing VoIP call data records. ByteDance negotiates for TikTok. EU clamps down on Facebook data handling. A high-profile Twitter hijacking.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1170</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ransomware hits a major data center provider, but appears to have left service unaffected. There’s a thriving criminal market for website defacement tools: vandals can be consumers, too. CDRThief does what its name implies. ByteDance tried negotiating TikTok’s American future. Ireland’s Data Protection Commission starts enforcing Schrems II against Facebook. Awais Rashid outlines software development security pitfalls. Our guest is John Morello from Palo Alto with insights from their new State of Cloud Native Security report. And China’s ambassador to the UK has his Twitter account hacked.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/176
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ransomware hits a major data center provider, but appears to have left service unaffected. There’s a thriving criminal market for website defacement tools: vandals can be consumers, too. CDRThief does what its name implies. ByteDance tried negotiating TikTok’s American future. Ireland’s Data Protection Commission starts enforcing Schrems II against Facebook. Awais Rashid outlines software development security pitfalls. Our guest is John Morello from Palo Alto with insights from their new State of Cloud Native Security report. And China’s ambassador to the UK has his Twitter account hacked.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/176</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1377</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c5dfa1c6-e18d-11ea-86a1-cf2331cec0a9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9891199642.mp3?updated=1690214024" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware slows down many students’ return to school, even virtually. Hacking gamers. Patch Tuesday. Notes on election security from CISA. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1169/notes</link>
      <description>Back to school time for everyone...or it would be, if it weren’t for all that ransomware. The sad criminal underworld stealing from online gamers. Notes on Patch Tuesday. Joe Carrigan considers digital comfort zones. Our guest is Sandra Wheatley from Fortinet with key findings from their new report on the cybersecurity skills shortage. And some thoughts on election security and disinformation from the US Cybersecurity and Infrastructure Security Agency.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/175
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 09 Sep 2020 19:40:00 -0000</pubDate>
      <itunes:title>Ransomware slows down many students’ return to school, even virtually. Hacking gamers. Patch Tuesday. Notes on election security from CISA. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1169</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Back to school time for everyone...or it would be, if it weren’t for all that ransomware. The sad criminal underworld stealing from online gamers. Notes on Patch Tuesday. Joe Carrigan considers digital comfort zones. Our guest is Sandra Wheatley from Fortinet with key findings from their new report on the cybersecurity skills shortage. And some thoughts on election security and disinformation from the US Cybersecurity and Infrastructure Security Agency.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/175
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Back to school time for everyone...or it would be, if it weren’t for all that ransomware. The sad criminal underworld stealing from online gamers. Notes on Patch Tuesday. Joe Carrigan considers digital comfort zones. Our guest is Sandra Wheatley from Fortinet with key findings from their new report on the cybersecurity skills shortage. And some thoughts on election security and disinformation from the US Cybersecurity and Infrastructure Security Agency.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/175</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1387</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c5d221cc-e18d-11ea-86a1-c77bcdd9280f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7665170195.mp3?updated=1690213998" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware or wiper? Emotet’s resurgence. Updates on Services NSW breach. COVID-19 cyberespionage. BTS replaces Guy Fawkes?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1168/notes</link>
      <description>Thanos is back, but as ransomware or a wiper? Cyber agencies in France, Japan, and New Zealand warn of a spike in Emotet infections. Australian authorities say 186,00 were affected by the breach at Services NSW. Georgia decries cyberespionage at its Lugar Lab. COVID-19 cyberespionage efforts have been intense, as have counterintelligence efforts designed to defend labs and supply chains. Rick Howard looks at identity management. Ben Yelin covers tightened surveillance of political advisors. And Anonymous may have a successor: K-pop stans.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/174
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Sep 2020 20:00:00 -0000</pubDate>
      <itunes:title>Ransomware or wiper? Emotet’s resurgence. Updates on Services NSW breach. COVID-19 cyberespionage. BTS replaces Guy Fawkes?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1168</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Thanos is back, but as ransomware or a wiper? Cyber agencies in France, Japan, and New Zealand warn of a spike in Emotet infections. Australian authorities say 186,00 were affected by the breach at Services NSW. Georgia decries cyberespionage at its Lugar Lab. COVID-19 cyberespionage efforts have been intense, as have counterintelligence efforts designed to defend labs and supply chains. Rick Howard looks at identity management. Ben Yelin covers tightened surveillance of political advisors. And Anonymous may have a successor: K-pop stans.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/174
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Thanos is back, but as ransomware or a wiper? Cyber agencies in France, Japan, and New Zealand warn of a spike in Emotet infections. Australian authorities say 186,00 were affected by the breach at Services NSW. Georgia decries cyberespionage at its Lugar Lab. COVID-19 cyberespionage efforts have been intense, as have counterintelligence efforts designed to defend labs and supply chains. Rick Howard looks at identity management. Ben Yelin covers tightened surveillance of political advisors. And Anonymous may have a successor: K-pop stans.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><br></p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/174</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1576</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c5c6fafe-e18d-11ea-86a1-f3e36dd21d80]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6669468406.mp3?updated=1690213989" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exploring the cultural values of personal privacy. [Caveat]</title>
      <link>https://thecyberwire.com/podcasts/caveat/13/notes</link>
      <description>Dave shares a story about our own state of Maryland trying to crack down on ransomware, Ben shares a New York Times story about facial recognition software, and later in the show our conversation with Stuart Thompson from the New York Times on the article, Twelve Million Phones, One Dataset, Zero Privacy.
Links to stories:
 How ransomware bill would tighten focus on the threat in Maryland
 The Secretive Company That Might End Privacy As We Know It
Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com or simply leave us a message at (410) 618-3720. Hope to hear from you.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 07 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>13</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9022964a-ed4c-11ea-912b-5f8d742b8d57/image/Caveat-iTunes-Art.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dave shares a story about our own state of Maryland trying to crack down on ransomware, Ben shares a New York Times story about facial recognition software, and later in the show our conversation with Stuart Thompson from the New York Times on the...</itunes:subtitle>
      <itunes:summary>Dave shares a story about our own state of Maryland trying to crack down on ransomware, Ben shares a New York Times story about facial recognition software, and later in the show our conversation with Stuart Thompson from the New York Times on the article, Twelve Million Phones, One Dataset, Zero Privacy.
Links to stories:
 How ransomware bill would tighten focus on the threat in Maryland
 The Secretive Company That Might End Privacy As We Know It
Got a question you'd like us to answer on our show? You can send your audio file to caveat@thecyberwire.com or simply leave us a message at (410) 618-3720. Hope to hear from you.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dave shares a story about our own state of Maryland trying to crack down on ransomware, Ben shares a New York Times story about facial recognition software, and later in the show our conversation with Stuart Thompson from the New York Times on the article, Twelve Million Phones, One Dataset, Zero Privacy.</p><p>Links to stories:</p><p><a href="https://www.delmarvanow.com/story/news/local/maryland/2020/01/21/how-ransomware-bill-would-tighten-focus-threat-maryland/4522267002/"> How ransomware bill would tighten focus on the threat in Maryland</a></p><p><a href="https://www.nytimes.com/2020/01/18/technology/clearview-privacy-facial-recognition.html"> The Secretive Company That Might End Privacy As We Know It</a></p><p>Got a question you'd like us to answer on our show? You can send your audio file to <a href="mailto:caveat@thecyberwire.com">caveat@thecyberwire.com</a> or simply leave us a message at (410) 618-3720. Hope to hear from you.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2993</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4591cb54-acb2-41fa-93d9-cf5c12fa0b35]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5927919220.mp3?updated=1683147495" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Elizabeth Wharton: Strong shoulders for someone else to stand on. [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/14/notes</link>
      <description>Technology attorney and startup chief of staff Elizabeth Wharton shares her experiences and how she came to work with companies in technology. Elizabeth talks about how she always liked solving problems and Nancy Drew mysteries, but not litigation. These morphed finding into her home in the policy legal world and some time later, technology law. Elizabeth describes how she loves planning and strategy in her work and encourages others to ask questions and absorb all of the information. Our thanks to Elizabeth for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 06 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>Elizabeth Wharton: Strong shoulders for someone else to stand on.  [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>14</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Technology attorney and startup chief of staff Elizabeth Wharton on coming to specialize in technology. </itunes:subtitle>
      <itunes:summary>Technology attorney and startup chief of staff Elizabeth Wharton shares her experiences and how she came to work with companies in technology. Elizabeth talks about how she always liked solving problems and Nancy Drew mysteries, but not litigation. These morphed finding into her home in the policy legal world and some time later, technology law. Elizabeth describes how she loves planning and strategy in her work and encourages others to ask questions and absorb all of the information. Our thanks to Elizabeth for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Technology attorney and startup chief of staff Elizabeth Wharton shares her experiences and how she came to work with companies in technology. Elizabeth talks about how she always liked solving problems and Nancy Drew mysteries, but not litigation. These morphed finding into her home in the policy legal world and some time later, technology law. Elizabeth describes how she loves planning and strategy in her work and encourages others to ask questions and absorb all of the information. Our thanks to Elizabeth for sharing her story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>328</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[42db1bba-ee22-11ea-94c4-1ff6b39a9076]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7730962751.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Going after the most valuable data. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/150/notes</link>
      <description>A look at the realities of ransomware from Sophos, including an industry-first detailed look at new detection evasion techniques in WastedLocker ransomware attacks that leverage the Windows Cache Manager and memory-mapped I/O to encrypt files. A complementary article examines the evasion-centric arms race of ransomware, providing a months-long review of how cybercriminals have been escalating and markedly changing evasion techniques, tactics and procedures (TTPs) since Snatch ransomware in December 2019. 
The research also breaks down the five early warning signs organizations are about to be attacked by ransomware and why ransomware attacks continue to occur.
Joining us on this week's Research Saturday to walk us through the research and share their findings is Sophos' Principal Research Scientist Chet Wisniewski and EVP &amp; Chief Product Officer Dan Schiappa.
The media alert and research articles can be found here: 

Media Alert: Sophos Reports on the Realities of Ransomware

WastedLocker’s techniques point to a familiar heritage

Ransomware’s evasion-centric arms race

5 signs you’re about to be hit by ransomware

The realities of ransomware: extortion goes social

Ransomware: why it’s not just a passing fad


Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Sep 2020 05:00:00 -0000</pubDate>
      <itunes:title>Going after the most valuable data. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>150</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A look at the realities of ransomware from Sophos, including an industry-first detailed look at new detection evasion techniques in WastedLocker ransomware attacks that leverage the Windows Cache Manager and memory-mapped I/O to encrypt files. A complementary article examines the evasion-centric arms race of ransomware, providing a months-long review of how cybercriminals have been escalating and markedly changing evasion techniques, tactics and procedures (TTPs) since Snatch ransomware in December 2019. 
The research also breaks down the five early warning signs organizations are about to be attacked by ransomware and why ransomware attacks continue to occur.
Joining us on this week's Research Saturday to walk us through the research and share their findings is Sophos' Principal Research Scientist Chet Wisniewski and EVP &amp; Chief Product Officer Dan Schiappa.
The media alert and research articles can be found here: 

Media Alert: Sophos Reports on the Realities of Ransomware

WastedLocker’s techniques point to a familiar heritage

Ransomware’s evasion-centric arms race

5 signs you’re about to be hit by ransomware

The realities of ransomware: extortion goes social

Ransomware: why it’s not just a passing fad


Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A look at the realities of ransomware from Sophos, including an industry-first detailed look at new detection evasion techniques in WastedLocker ransomware attacks that leverage the Windows Cache Manager and memory-mapped I/O to encrypt files. A complementary article examines the evasion-centric arms race of ransomware, providing a months-long review of how cybercriminals have been escalating and markedly changing evasion techniques, tactics and procedures (TTPs) since Snatch ransomware in December 2019. </p><p>The research also breaks down the five early warning signs organizations are about to be attacked by ransomware and why ransomware attacks continue to occur.</p><p>Joining us on this week's Research Saturday to walk us through the research and share their findings is Sophos' Principal Research Scientist Chet Wisniewski and EVP &amp; Chief Product Officer Dan Schiappa.</p><p>The media alert and research articles can be found here: </p><ul>
<li><a href="https://www.sophos.com/en-us/press-office/press-releases/2020/08/sophos-reports-on-the-realities-of-ransomware.aspx">Media Alert: Sophos Reports on the Realities of Ransomware</a></li>
<li><a href="https://news.sophos.com/en-us/2020/08/04/wastedlocker-techniques-point-to-a-familiar-heritage">WastedLocker’s techniques point to a familiar heritage</a></li>
<li><a href="https://news.sophos.com/en-us/2020/08/04/the-realities-of-ransomware-the-evasion-arms-race">Ransomware’s evasion-centric arms race</a></li>
<li><a href="https://news.sophos.com/en-us/2020/08/04/the-realities-of-ransomware-five-signs-youre-about-to-be-attacked">5 signs you’re about to be hit by ransomware</a></li>
<li><a href="https://news.sophos.com/en-us/2020/08/04/the-realities-of-ransomware-extortion-goes-social-in-2020">The realities of ransomware: extortion goes social</a></li>
<li><a href="https://news.sophos.com/en-us/2020/08/04/the-realities-of-ransomware-why-its-not-just-a-passing-fad">Ransomware: why it’s not just a passing fad</a></li>
</ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1521</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04691d96-ee22-11ea-8cc2-737eab07072c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4181096531.mp3?updated=1685108069" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransom DDoS is now a widespread problem. Phishing campaign stages malicious payloads in legitimate file-sharing services. Back to school? Back with a new cyber risk. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/11617/notes</link>
      <description>Ransom DDoS: it’s been around for awhile, but now it’s become a much bigger thing. Phishing campaigns are putting malicious payloads into legitimate file-sharing services. Malek Ben Salem from Accenture on proactive "alpha innovator" organizations. Our guest is Joseph Marks from The Washington Post on his recent coverage of election security. And it’s time to go back to school, at least virtually, with all the attendant cyber risk.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/173
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 04 Sep 2020 20:10:00 -0000</pubDate>
      <itunes:title>Ransom DDoS is now a widespread problem. Phishing campaign stages malicious payloads in legitimate file-sharing services. Back to school? Back with a new cyber risk. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1167</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ransom DDoS: it’s been around for awhile, but now it’s become a much bigger thing. Phishing campaigns are putting malicious payloads into legitimate file-sharing services. Malek Ben Salem from Accenture on proactive "alpha innovator" organizations. Our guest is Joseph Marks from The Washington Post on his recent coverage of election security. And it’s time to go back to school, at least virtually, with all the attendant cyber risk.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/173
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ransom DDoS: it’s been around for awhile, but now it’s become a much bigger thing. Phishing campaigns are putting malicious payloads into legitimate file-sharing services. Malek Ben Salem from Accenture on proactive "alpha innovator" organizations. Our guest is Joseph Marks from The Washington Post on his recent coverage of election security. And it’s time to go back to school, at least virtually, with all the attendant cyber risk.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/173</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1673</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c5bd865e-e18d-11ea-86a1-533dd1f84725]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8347466427.mp3?updated=1690211523" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberattacks in Norway under investigation. Developments in the criminal marketplace. Scammers do TikTok. Disrupting school, from Florida to Northumberland.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1166/notes</link>
      <description>Updates on cyberattacks against Norway’s parliament and the Hedmark region. A popular TikTok page is infested with scammers. Magecart’s Inter scanner gains criminal market share. Thomas Etheridge from CrowdStrike on the many potential benefits of outsourced threat hunting. Our guest is Lauren Bean Buitta from Girl Security on closing the gender gap in national security. Heading back to school in Miami? Not so fast, kids. And in Northumberland? Same goes there. (That’s Northumberland, England, by the way, not Northumberland, Pennsylvania.)
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/172
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 03 Sep 2020 19:35:00 -0000</pubDate>
      <itunes:title>Cyberattacks in Norway under investigation. Developments in the criminal marketplace. Scammers do TikTok. Disrupting school, from Florida to Northumberland.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1166</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Updates on cyberattacks against Norway’s parliament and the Hedmark region. A popular TikTok page is infested with scammers. Magecart’s Inter scanner gains criminal market share. Thomas Etheridge from CrowdStrike on the many potential benefits of outsourced threat hunting. Our guest is Lauren Bean Buitta from Girl Security on closing the gender gap in national security. Heading back to school in Miami? Not so fast, kids. And in Northumberland? Same goes there. (That’s Northumberland, England, by the way, not Northumberland, Pennsylvania.)
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/172
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Updates on cyberattacks against Norway’s parliament and the Hedmark region. A popular TikTok page is infested with scammers. Magecart’s Inter scanner gains criminal market share. Thomas Etheridge from CrowdStrike on the many potential benefits of outsourced threat hunting. Our guest is Lauren Bean Buitta from Girl Security on closing the gender gap in national security. Heading back to school in Miami? Not so fast, kids. And in Northumberland? Same goes there. (That’s Northumberland, England, by the way, not Northumberland, Pennsylvania.)</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><br></p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/172</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1393</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c5b0c1ee-e18d-11ea-86a1-9ff4aa11388b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3292071290.mp3?updated=1690211497" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Facebook’s latest takedowns reach Pakistan, Russia, and the US. Election meddling. Chinese espionage looks inward, again. New alt-coin stealer. NZX DDoS update. That Twitter hack.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1165/notes</link>
      <description>Facebook’s August takedowns included coordinated inauthenticity from Pakistan, Russia (that’s St. Petersburg, with a waystation in DC), and a US strategic communication firm. CISA and the FBI say nope, the Russians weren’t in voter databases. A Chinese APT turns its attention from Europe back to Tibet. A new cryptocurrency stealer is active in Central Europe. New Zealand DDoS attacks may be an extortion attempt. Joe Carrigan has the story of a reporter's stolen Facebook account. Our guest is Ophir Harpaz from Guardicore Labs with their Botnet Encyclopedia. And there may be another teenage mastermind behind last month’s Twitter hack.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/171
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 02 Sep 2020 20:10:00 -0000</pubDate>
      <itunes:title>Facebook’s latest takedowns reach Pakistan, Russia, and the US. Election meddling. Chinese espionage looks inward, again. New alt-coin stealer. NZX DDoS update. That Twitter hack.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1165</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Facebook’s August takedowns included coordinated inauthenticity from Pakistan, Russia (that’s St. Petersburg, with a waystation in DC), and a US strategic communication firm. CISA and the FBI say nope, the Russians weren’t in voter databases. A Chinese APT turns its attention from Europe back to Tibet. A new cryptocurrency stealer is active in Central Europe. New Zealand DDoS attacks may be an extortion attempt. Joe Carrigan has the story of a reporter's stolen Facebook account. Our guest is Ophir Harpaz from Guardicore Labs with their Botnet Encyclopedia. And there may be another teenage mastermind behind last month’s Twitter hack.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/171
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Facebook’s August takedowns included coordinated inauthenticity from Pakistan, Russia (that’s St. Petersburg, with a waystation in DC), and a US strategic communication firm. CISA and the FBI say nope, the Russians weren’t in voter databases. A Chinese APT turns its attention from Europe back to Tibet. A new cryptocurrency stealer is active in Central Europe. New Zealand DDoS attacks may be an extortion attempt. Joe Carrigan has the story of a reporter's stolen Facebook account. Our guest is Ophir Harpaz from Guardicore Labs with their Botnet Encyclopedia. And there may be another teenage mastermind behind last month’s Twitter hack.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/171</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1393</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c5a8fca2-e18d-11ea-86a1-47ce0ffbb5ce]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9578481219.mp3?updated=1690211445" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The difference between a breach and, well, a public record. Pioneer Kitten’s lucrative bycatch. Malware gets past Gatekeeper. A gamer’s bandit economy. And happy birthday, Cyber Branch. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1164/notes</link>
      <description>An election hack that wasn’t. More DDoS in New Zealand’s stock exchange. A look at how Iranian cyber contractors make money as a byproduct of cyberespionage. Malware sneeks past Apple’s notarization process. The bandit economy that’s grown up around Fortnite. Ben Yelin looks at how the upcoming US elections could direct the nation’s cybersecurity strategies. Our guest is Julian Waits from Devo with highlights from their 2nd annual SOC performance report. And the US Army’s youngest branch celebrates a birthday.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/170
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Sep 2020 20:00:00 -0000</pubDate>
      <itunes:title>The difference between a breach and, well, a public record. Pioneer Kitten’s lucrative bycatch. Malware gets past Gatekeeper. A gamer’s bandit economy. And happy birthday, Cyber Branch. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>6</itunes:season>
      <itunes:episode>1164</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>An election hack that wasn’t. More DDoS in New Zealand’s stock exchange. A look at how Iranian cyber contractors make money as a byproduct of cyberespionage. Malware sneeks past Apple’s notarization process. The bandit economy that’s grown up around Fortnite. Ben Yelin looks at how the upcoming US elections could direct the nation’s cybersecurity strategies. Our guest is Julian Waits from Devo with highlights from their 2nd annual SOC performance report. And the US Army’s youngest branch celebrates a birthday.
For links to all of today's stories check out our CyberWire daily news brief:
https://www.thecyberwire.com/newsletters/daily-briefing/9/170
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An election hack that wasn’t. More DDoS in New Zealand’s stock exchange. A look at how Iranian cyber contractors make money as a byproduct of cyberespionage. Malware sneeks past Apple’s notarization process. The bandit economy that’s grown up around Fortnite. Ben Yelin looks at how the upcoming US elections could direct the nation’s cybersecurity strategies. Our guest is Julian Waits from Devo with highlights from their 2nd annual SOC performance report. And the US Army’s youngest branch celebrates a birthday.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/170</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1376</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c59d7d32-e18d-11ea-86a1-d35d94f651f4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4915578809.mp3?updated=1690211427" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DDoS continues to trouble New Zealand’s stock exchange. A glitch, not an attack. New Chinese export controls. Oversharing agencies? Who’s the bank robber? A botnet serving ad fraud.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1163/notes</link>
      <description>New Zealand’s stock exchange continues to fight through offshore DDoS attacks. Sunday’s Internet outage was a glitch, not an attack. China enacts new technology export controls that may impede the sale of TikTok. Danish authorities investigate allegations of data sharing with NSA. North Korea says it doesn’t rob banks, but Americans do. Caleb Barlow looks at security validation and how it can help manage vendors and SOCs. Rick Howard has the CSO Perspective on Identity Management. And a look at Terracotta, a botnet serving up ad fraud.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/169
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 31 Aug 2020 19:45:00 -0000</pubDate>
      <itunes:title>DDoS continues to trouble New Zealand’s stock exchange. A glitch, not an attack. New Chinese export controls. Oversharing agencies? Who’s the bank robber? A botnet serving ad fraud.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1163</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>New Zealand’s stock exchange continues to fight through offshore DDoS attacks. Sunday’s Internet outage was a glitch, not an attack. China enacts new technology export controls that may impede the sale of TikTok. Danish authorities investigate allegations of data sharing with NSA. North Korea says it doesn’t rob banks, but Americans do. Caleb Barlow looks at security validation and how it can help manage vendors and SOCs. Rick Howard has the CSO Perspective on Identity Management. And a look at Terracotta, a botnet serving up ad fraud.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/169
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>New Zealand’s stock exchange continues to fight through offshore DDoS attacks. Sunday’s Internet outage was a glitch, not an attack. China enacts new technology export controls that may impede the sale of TikTok. Danish authorities investigate allegations of data sharing with NSA. North Korea says it doesn’t rob banks, but Americans do. Caleb Barlow looks at security validation and how it can help manage vendors and SOCs. Rick Howard has the CSO Perspective on Identity Management. And a look at Terracotta, a botnet serving up ad fraud.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><br></p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/169</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1509</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c5955af8-e18d-11ea-86a1-3bfa6a4276ee]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8187489563.mp3?updated=1690211409" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jack Rhysider: Get your experience points in everything. [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/13/notes</link>
      <description>Host of Darknet Diaries podcast Jack Rhysider shares his experiences from studying computer engineering at university to his strategy of using gamification on his career that led to him landing in the security space. Jack talks about how his wide experiences came together in security and what prompted him to learn podcasting. Jack endeavors to share the whole story through his podcasts while making them entertaining, enlightening and inspirational. Our thanks to Jack for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 30 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:title>Jack Rhysider: Get your experience points in everything. [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>13</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Host of Darknet Diaries podcast Jack Rhysider on gamification of his career.</itunes:subtitle>
      <itunes:summary>Host of Darknet Diaries podcast Jack Rhysider shares his experiences from studying computer engineering at university to his strategy of using gamification on his career that led to him landing in the security space. Jack talks about how his wide experiences came together in security and what prompted him to learn podcasting. Jack endeavors to share the whole story through his podcasts while making them entertaining, enlightening and inspirational. Our thanks to Jack for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Host of Darknet Diaries podcast Jack Rhysider shares his experiences from studying computer engineering at university to his strategy of using gamification on his career that led to him landing in the security space. Jack talks about how his wide experiences came together in security and what prompted him to learn podcasting. Jack endeavors to share the whole story through his podcasts while making them entertaining, enlightening and inspirational. Our thanks to Jack for sharing his story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>369</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9d933e04-e899-11ea-bb69-1373c5e3a04a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7085962950.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>They fooled a lot of people. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/149/notes</link>
      <description>Docker containers have been gaining popularity over the past few years as an effective way of packaging software applications. Docker Hub provides a strong community-based model for users and companies to share their software applications. This is also attracting the attention of malicious actors intending to make money by cryptojacking within Docker containers and using Docker Hub to distribute these images.
Palo Alto Networks' Unit 42 researchers identified a malicious Docker Hub account, azurenql, active since October 2019 that was hosting six malicious images intended to mine the cryptocurrency, Monero. The images hosted on this account have been collectively pulled more than two million times. Additionally, when last checked minexmr.com for this wallet ID, Palo Alto's team saw recent activity indicating that it’s still being used.
Joining us on this week's Research Saturday is Jen Miller-Osborn from Palo Alto Networks' Unit 42 group to share the research and findings.
The research and blog post can be found here: 
Attackers Cryptojacking Docker Images to Mine for Monero

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:title>They fooled a lot of people. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>149</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Docker containers have been gaining popularity over the past few years as an effective way of packaging software applications. Docker Hub provides a strong community-based model for users and companies to share their software applications. This is also attracting the attention of malicious actors intending to make money by cryptojacking within Docker containers and using Docker Hub to distribute these images.
Palo Alto Networks' Unit 42 researchers identified a malicious Docker Hub account, azurenql, active since October 2019 that was hosting six malicious images intended to mine the cryptocurrency, Monero. The images hosted on this account have been collectively pulled more than two million times. Additionally, when last checked minexmr.com for this wallet ID, Palo Alto's team saw recent activity indicating that it’s still being used.
Joining us on this week's Research Saturday is Jen Miller-Osborn from Palo Alto Networks' Unit 42 group to share the research and findings.
The research and blog post can be found here: 
Attackers Cryptojacking Docker Images to Mine for Monero

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Docker containers have been gaining popularity over the past few years as an effective way of packaging software applications. Docker Hub provides a strong community-based model for users and companies to share their software applications. This is also attracting the attention of malicious actors intending to make money by cryptojacking within Docker containers and using Docker Hub to distribute these images.</p><p>Palo Alto Networks' Unit 42 researchers identified a malicious Docker Hub account, azurenql, active since October 2019 that was hosting six malicious images intended to mine the cryptocurrency, Monero. The images hosted on this account have been collectively pulled more than two million times. Additionally, when last checked minexmr.com for this wallet ID, Palo Alto's team saw recent activity indicating that it’s still being used.</p><p>Joining us on this week's Research Saturday is Jen Miller-Osborn from Palo Alto Networks' Unit 42 group to share the research and findings.</p><p>The research and blog post can be found here: </p><ul><li><a href="https://unit42.paloaltonetworks.com/cryptojacking-docker-images-for-mining-monero/">Attackers Cryptojacking Docker Images to Mine for Monero</a></li></ul><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>852</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8d90ba26-e8a4-11ea-bc54-1bc5f93be194]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2523821071.mp3?updated=1685108056" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stock exchange DDoS continues. Another criminal market exits. Pyongyang cybercrooks face criminal forfeiture. Instagram hijacking. Old malware returns. Treason’s motives. An attempt to hack Tesla.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1162/notes</link>
      <description>Denial-of-service attacks continue to cripple New Zealand’s NZX stock exchange. The Empire criminal market has exited, and done so with its users funds. US authorities have filed for civil forfeiture of Hidden Cobra’s stolen crytpo assets. An Instagram hijacking campaign is under way. Qbot and Emotet are back, and together again. The former Green Beret who allegedly spied for the GRU offers an insight into his (alleged) motives. We welcome our newest partner to the show, Betsy Carmelite from BAH. Our guest is Mark Calandra from CSC on their 2020 domain security report that revealed shortfalls among the Forbes Global 2000. And the unnamed company cited in the arrest of a Russian national this week has now been named: it’s Tesla. 
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/168
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 28 Aug 2020 20:10:00 -0000</pubDate>
      <itunes:title>Stock exchange DDoS continues. Another criminal market exits. Pyongyang cybercrooks face criminal forfeiture. Instagram hijacking. Old malware returns. Treason’s motives. An attempt to hack Tesla.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1162</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Denial-of-service attacks continue to cripple New Zealand’s NZX stock exchange. The Empire criminal market has exited, and done so with its users funds. US authorities have filed for civil forfeiture of Hidden Cobra’s stolen crytpo assets. An Instagram hijacking campaign is under way. Qbot and Emotet are back, and together again. The former Green Beret who allegedly spied for the GRU offers an insight into his (alleged) motives. We welcome our newest partner to the show, Betsy Carmelite from BAH. Our guest is Mark Calandra from CSC on their 2020 domain security report that revealed shortfalls among the Forbes Global 2000. And the unnamed company cited in the arrest of a Russian national this week has now been named: it’s Tesla. 
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/168
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Denial-of-service attacks continue to cripple New Zealand’s NZX stock exchange. The Empire criminal market has exited, and done so with its users funds. US authorities have filed for civil forfeiture of Hidden Cobra’s stolen crytpo assets. An Instagram hijacking campaign is under way. Qbot and Emotet are back, and together again. The former Green Beret who allegedly spied for the GRU offers an insight into his (alleged) motives. We welcome our newest partner to the show, Betsy Carmelite from BAH. Our guest is Mark Calandra from CSC on their 2020 domain security report that revealed shortfalls among the Forbes Global 2000. And the unnamed company cited in the arrest of a Russian national this week has now been named: it’s Tesla. </p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><br></p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/168</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1564</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c58c463e-e18d-11ea-86a1-83a644004961]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6425369008.mp3?updated=1690211390" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybercrime pays, criminal tools are commodities, and some cyber gangs get sophisticated. The skid market for booters. Pyongyang unleashes the BeagleBoyz.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1161/notes</link>
      <description>Several Magecart campaigns turn out to be the work of one gang. The unfortunate persistence of DDoS-for-hire services. Ransomware’s growing sophistication as a class of criminal enterprise. Andrea Little Limbago from Interos on supply chain attacks &amp; risks. Our guest is Mark Testoni from SAP's NS2 on how Covid-19 reshaped classified work. And hey kids: the BeagleBoyz are on a crime spree.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/167
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 27 Aug 2020 19:45:00 -0000</pubDate>
      <itunes:title>Cybercrime pays, criminal tools are commodities, and some cyber gangs get sophisticated. The skid market for booters. Pyongyang unleashes the BeagleBoyz.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1161</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Several Magecart campaigns turn out to be the work of one gang. The unfortunate persistence of DDoS-for-hire services. Ransomware’s growing sophistication as a class of criminal enterprise. Andrea Little Limbago from Interos on supply chain attacks &amp; risks. Our guest is Mark Testoni from SAP's NS2 on how Covid-19 reshaped classified work. And hey kids: the BeagleBoyz are on a crime spree.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/167
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Several Magecart campaigns turn out to be the work of one gang. The unfortunate persistence of DDoS-for-hire services. Ransomware’s growing sophistication as a class of criminal enterprise. Andrea Little Limbago from Interos on supply chain attacks &amp; risks. Our guest is Mark Testoni from SAP's NS2 on how Covid-19 reshaped classified work. And hey kids: the BeagleBoyz are on a crime spree.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><br></p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/167</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1398</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c583158c-e18d-11ea-86a1-bf28cb099ca3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3912817299.mp3?updated=1690211372" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New Zealand stock exchange sustains DDoS attacks. Flash alert on GoldenSpy. Cyber mercenaries and industrial espionage. Lèse-majesté online. Offering $1 million to a potential co-conspirator?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1160/notes</link>
      <description>New Zealand’s stock exchange has sustained two distributed denial-of-service attacks this week. CISA and FBI issue an alert about GoldenSpy. Two cyber mercenary groups are engaged in industrial espionage for hire. Thailand decides to crack down on sites that host content the government deems illegal. Joe Carrigan looks at new types of crimes made possible by AI. Our guest is Shane Harris from The Washington Post on an Elite CIA unit which failed to secure its own systems. And a Russian national faces US charges of conspiracy to damage a computer.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/166
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 26 Aug 2020 19:40:00 -0000</pubDate>
      <itunes:title>New Zealand stock exchange sustains DDoS attacks. Flash alert on GoldenSpy. Cyber mercenaries and industrial espionage. Lèse-majesté online. Offering $1 million to a potential co-conspirator?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1160</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>New Zealand’s stock exchange has sustained two distributed denial-of-service attacks this week. CISA and FBI issue an alert about GoldenSpy. Two cyber mercenary groups are engaged in industrial espionage for hire. Thailand decides to crack down on sites that host content the government deems illegal. Joe Carrigan looks at new types of crimes made possible by AI. Our guest is Shane Harris from The Washington Post on an Elite CIA unit which failed to secure its own systems. And a Russian national faces US charges of conspiracy to damage a computer.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/166
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>New Zealand’s stock exchange has sustained two distributed denial-of-service attacks this week. CISA and FBI issue an alert about GoldenSpy. Two cyber mercenary groups are engaged in industrial espionage for hire. Thailand decides to crack down on sites that host content the government deems illegal. Joe Carrigan looks at new types of crimes made possible by AI. Our guest is Shane Harris from The Washington Post on an Elite CIA unit which failed to secure its own systems. And a Russian national faces US charges of conspiracy to damage a computer.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><br></p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/166</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1377</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c57bd2a4-e18d-11ea-86a1-4fcea35895c0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4682477810.mp3?updated=1690211359" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The pandemic and trends in cybersecurity. The secret to the handset’s low, low price? Fleeceware and adware. TikTok’s lawsuit. Influence ops. Bogus Bitcoin exchange.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1159/notes</link>
      <description>Security trends during the pandemic include shifts in underworld markets and some enduring changes in the way organizations approach cybersecurity. Discount phones come preloaded with adware and fleeceware. TikTok files its lawsuit. Ben Yelin on the Massachusetts Attorney General creating a data privacy office. Our guest is Nitzan Miron from Barracuda Networks on how brick &amp; mortar shops have accelerated their shift online. And spoofing a Bitcoin exchange to spread malware. 
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/165
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Aug 2020 19:00:00 -0000</pubDate>
      <itunes:title>The pandemic and trends in cybersecurity. The secret to the handset’s low, low price? Fleeceware and adware. TikTok’s lawsuit. Influence ops. Bogus Bitcoin exchange.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1159</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Security trends during the pandemic include shifts in underworld markets and some enduring changes in the way organizations approach cybersecurity. Discount phones come preloaded with adware and fleeceware. TikTok files its lawsuit. Ben Yelin on the Massachusetts Attorney General creating a data privacy office. Our guest is Nitzan Miron from Barracuda Networks on how brick &amp; mortar shops have accelerated their shift online. And spoofing a Bitcoin exchange to spread malware. 
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/165
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Security trends during the pandemic include shifts in underworld markets and some enduring changes in the way organizations approach cybersecurity. Discount phones come preloaded with adware and fleeceware. TikTok files its lawsuit. Ben Yelin on the Massachusetts Attorney General creating a data privacy office. Our guest is Nitzan Miron from Barracuda Networks on how brick &amp; mortar shops have accelerated their shift online. And spoofing a Bitcoin exchange to spread malware. </p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><br></p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/165</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1382</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c574b23a-e18d-11ea-86a1-8b2d47af6ae4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9371023571.mp3?updated=1690211341" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Crooks and spies, together again? Hiding ad-fraud malware in an SDK. A turn to the DarkSide. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1158/notes</link>
      <description>Iranian wannabes successfully use Dharma ransomware against soft targets. SourMint hid an ad-fraud and info-stealing package in an SDK. A former US Army officer and sometime Government contractor is charged with working for the GRU. DarkSide ransomware rises as affiliates go into business on their own. Awais Rashid from the University of Bristol on aligning cyber security metrics with business goals. Rick Howard talks data loss prevention with members of the Hash Table. And copycat DDoS extortionists pretend to be, who else? Fancy Bear.

For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/164
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 24 Aug 2020 19:45:00 -0000</pubDate>
      <itunes:title>Crooks and spies, together again? Hiding ad-fraud malware in an SDK. A turn to the DarkSide. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1158</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Iranian wannabes successfully use Dharma ransomware against soft targets. SourMint hid an ad-fraud and info-stealing package in an SDK. A former US Army officer and sometime Government contractor is charged with working for the GRU. DarkSide ransomware rises as affiliates go into business on their own. Awais Rashid from the University of Bristol on aligning cyber security metrics with business goals. Rick Howard talks data loss prevention with members of the Hash Table. And copycat DDoS extortionists pretend to be, who else? Fancy Bear.

For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/164
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iranian wannabes successfully use Dharma ransomware against soft targets. SourMint hid an ad-fraud and info-stealing package in an SDK. A former US Army officer and sometime Government contractor is charged with working for the GRU. DarkSide ransomware rises as affiliates go into business on their own. Awais Rashid from the University of Bristol on aligning cyber security metrics with business goals. Rick Howard talks data loss prevention with members of the Hash Table. And copycat DDoS extortionists pretend to be, who else? Fancy Bear.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><br></p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/164</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1379</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c56c16fc-e18d-11ea-86a1-abb4e0064e14]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9250414012.mp3?updated=1690211326" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kiersten Todt: Problem solving and building solutions. [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/12/notes</link>
      <description>Managing director of the Cyber Readiness Institute Kiersten Todt shares how she came to be in the cybersecurity industry helping to provide free tools and resources for small businesses through a nonprofit. She describes how her work on the Hill prior to and just after 9/11 changed. Kiersten talks about the diversity of skills that benefit work in cybersecurity and offers her advice on going after what you want to do. Our thanks to Kiersten for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 23 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:title>Kiersten Todt: Problem solving and building solutions. [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>12</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Managing director of the Cyber Readiness Institute Kiersten Todt on the power to make change.</itunes:subtitle>
      <itunes:summary>Managing director of the Cyber Readiness Institute Kiersten Todt shares how she came to be in the cybersecurity industry helping to provide free tools and resources for small businesses through a nonprofit. She describes how her work on the Hill prior to and just after 9/11 changed. Kiersten talks about the diversity of skills that benefit work in cybersecurity and offers her advice on going after what you want to do. Our thanks to Kiersten for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Managing director of the Cyber Readiness Institute Kiersten Todt shares how she came to be in the cybersecurity industry helping to provide free tools and resources for small businesses through a nonprofit. She describes how her work on the Hill prior to and just after 9/11 changed. Kiersten talks about the diversity of skills that benefit work in cybersecurity and offers her advice on going after what you want to do. Our thanks to Kiersten for sharing her story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>341</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3bd112ee-e471-11ea-89e5-431724acbfd4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3402610391.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Using global events as lures. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/148/notes</link>
      <description>The goal of malicious activity is to compromise the system to install some unauthorized software. Increasingly that goal is tied to one thing: the user. Over the past several years, we as an industry improved exploit mitigation and the value of working exploits has increased accordingly. Together, these changes have had an impact on the threat landscape. We still see large amounts of active exploitation, but enterprises are getting better at defending against them.
This has left adversaries with a couple of options, develop or buy a working exploit that will defeat today's protections, which can be costly, or pivot to enticing a user to help you. In today's threat landscape, adversaries are always trying to develop and implement the most effective lures to try and draw users into their infection path. They've tried a multitude of different tactics in this space, but one always stands out — current events.
Joining us on this week's Research Saturday from Craig Williams from Cisco's Talos Outreach team to walk us through how current events are used as lures.
The research and blog post can be found here: 
Adversarial use of current events as lures

The CyberWire's Research Saturday is presented by Juniper Networks.
Thanks to our sponsor Enveil, closing the last gap in data security.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Aug 2020 11:59:00 -0000</pubDate>
      <itunes:title>Using global events as lures. [Research Saturday]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>148</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>The goal of malicious activity is to compromise the system to install some unauthorized software. Increasingly that goal is tied to one thing: the user. Over the past several years, we as an industry improved exploit mitigation and the value of working exploits has increased accordingly. Together, these changes have had an impact on the threat landscape. We still see large amounts of active exploitation, but enterprises are getting better at defending against them.
This has left adversaries with a couple of options, develop or buy a working exploit that will defeat today's protections, which can be costly, or pivot to enticing a user to help you. In today's threat landscape, adversaries are always trying to develop and implement the most effective lures to try and draw users into their infection path. They've tried a multitude of different tactics in this space, but one always stands out — current events.
Joining us on this week's Research Saturday from Craig Williams from Cisco's Talos Outreach team to walk us through how current events are used as lures.
The research and blog post can be found here: 
Adversarial use of current events as lures

The CyberWire's Research Saturday is presented by Juniper Networks.
Thanks to our sponsor Enveil, closing the last gap in data security.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The goal of malicious activity is to compromise the system to install some unauthorized software. Increasingly that goal is tied to one thing: the user. Over the past several years, we as an industry improved exploit mitigation and the value of working exploits has increased accordingly. Together, these changes have had an impact on the threat landscape. We still see large amounts of active exploitation, but enterprises are getting better at defending against them.</p><p>This has left adversaries with a couple of options, develop or buy a working exploit that will defeat today's protections, which can be costly, or pivot to enticing a user to help you. In today's threat landscape, adversaries are always trying to develop and implement the most effective lures to try and draw users into their infection path. They've tried a multitude of different tactics in this space, but one always stands out — current events.</p><p>Joining us on this week's Research Saturday from Craig Williams from Cisco's Talos Outreach team to walk us through how current events are used as lures.</p><p>The research and blog post can be found here: </p><ul><li><a href="https://blog.talosintelligence.com/2020/07/current-events-lures.html">Adversarial use of current events as lures</a></li></ul><p><br></p><p>The CyberWire's Research Saturday is presented by <a href="https://www.juniper.net/us/en/">Juniper Networks</a>.</p><p>Thanks to our sponsor <a href="https://www.enveil.com/">Enveil</a>, closing the last gap in data security.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1297</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[15441164-e46f-11ea-ba1e-033d80fa1f08]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2485491067.mp3?updated=1685108051" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Transparent Tribe upgrades Crimson RAT.  More countries interested in influencing US elections. University pays ransom.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1157/notes</link>
      <description>Transparent Tribe upgrades Crimson RAT. Cuba, North Korea, and Saudi Arabia are also interested in influencing the upcoming US election. The University of Utah restored from backups after a ransomware attack, but paid the ransom to prevent the crooks from publishing stolen data. Uber’s former CSO has been charged with allegedly covering up a hack the company sustained in 2016. Justin Harvey from Accenture on how the pandemic has affected Incident Response. Gerald Beuchelt from LogMeIn on how secure remote access may or may not be. And a popular fertility app was found to be sharing data with advertisers without users’ permission.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/163
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 21 Aug 2020 19:00:00 -0000</pubDate>
      <itunes:title>Transparent Tribe upgrades Crimson RAT.  More countries interested in influencing US elections. University pays ransom.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1157</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Transparent Tribe upgrades Crimson RAT. Cuba, North Korea, and Saudi Arabia are also interested in influencing the upcoming US election. The University of Utah restored from backups after a ransomware attack, but paid the ransom to prevent the crooks from publishing stolen data. Uber’s former CSO has been charged with allegedly covering up a hack the company sustained in 2016. Justin Harvey from Accenture on how the pandemic has affected Incident Response. Gerald Beuchelt from LogMeIn on how secure remote access may or may not be. And a popular fertility app was found to be sharing data with advertisers without users’ permission.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/163
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Transparent Tribe upgrades Crimson RAT. Cuba, North Korea, and Saudi Arabia are also interested in influencing the upcoming US election. The University of Utah restored from backups after a ransomware attack, but paid the ransom to prevent the crooks from publishing stolen data. Uber’s former CSO has been charged with allegedly covering up a hack the company sustained in 2016. Justin Harvey from Accenture on how the pandemic has affected Incident Response. Gerald Beuchelt from LogMeIn on how secure remote access may or may not be. And a popular fertility app was found to be sharing data with advertisers without users’ permission.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><br></p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/163</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1517</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fa346b54-e08a-11ea-9b89-7ff6cc801134]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8398414432.mp3?updated=1690211305" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Gamaredon Group is phishing ahead of Ukraine’s independence day. North Korea blamed for BLINDINGCAN RAT. Google patches Gmail flaw.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1156/notes</link>
      <description>Ukraine warns that Russia’s Gamaredon Group is running a phishing campaign ahead of Ukraine’s independence day. CISA and the FBI publish details on a North Korean remote access Trojan. Google patches a serious Gmail flaw. Marriott faces another lawsuit over its 2018 data breach. The WannaRen ransomware operators have released a decryption key. Rob Lee from Dragos with lessons learned from recent virtual conferences. Our guest is Rachel Tobac from SocialProof with her insights on social engineering and the Twitter hack. 
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/162
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 20 Aug 2020 20:15:00 -0000</pubDate>
      <itunes:title>Gamaredon Group is phishing ahead of Ukraine’s independence day. North Korea blamed for BLINDINGCAN RAT. Google patches Gmail flaw.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1156</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Ukraine warns that Russia’s Gamaredon Group is running a phishing campaign ahead of Ukraine’s independence day. CISA and the FBI publish details on a North Korean remote access Trojan. Google patches a serious Gmail flaw. Marriott faces another lawsuit over its 2018 data breach. The WannaRen ransomware operators have released a decryption key. Rob Lee from Dragos with lessons learned from recent virtual conferences. Our guest is Rachel Tobac from SocialProof with her insights on social engineering and the Twitter hack. 
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/162
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ukraine warns that Russia’s Gamaredon Group is running a phishing campaign ahead of Ukraine’s independence day. CISA and the FBI publish details on a North Korean remote access Trojan. Google patches a serious Gmail flaw. Marriott faces another lawsuit over its 2018 data breach. The WannaRen ransomware operators have released a decryption key. Rob Lee from Dragos with lessons learned from recent virtual conferences. Our guest is Rachel Tobac from SocialProof with her insights on social engineering and the Twitter hack. </p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><br></p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/162</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1386</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fa2ff83a-e08a-11ea-9b89-87ec3b0ae0cf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1197663996.mp3?updated=1690211285" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phone spearphishing is catching on after the Twitter hack. Taiwan blames China for hacking government agencies. FritzFrog botnet is cryptomining, for now.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1155/notes</link>
      <description>Phone spearphishing is catching on after the Twitter hack. Taiwan blames China for hacking government agencies. FritzFrog botnet is cryptomining, for now. Whoever’s behind GoldenSpy is trying to cover their tracks. WastedLocker ransomware is successful without stealing data. The US Senate Select Committee on Intelligence releases its final report on Russian interference with the 2016 election. Joe Carrigan looks at shady SIM cards. Our guest is Nathan Jones from WhiteCanyon Software on secure data destruction. And an AI company exposes millions of medical records.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/161
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 19 Aug 2020 19:04:51 -0000</pubDate>
      <itunes:title>Phone spearphishing is catching on after the Twitter hack. Taiwan blames China for hacking government agencies. FritzFrog botnet is cryptomining, for now.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1155</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Phone spearphishing is catching on after the Twitter hack. Taiwan blames China for hacking government agencies. FritzFrog botnet is cryptomining, for now. Whoever’s behind GoldenSpy is trying to cover their tracks. WastedLocker ransomware is successful without stealing data. The US Senate Select Committee on Intelligence releases its final report on Russian interference with the 2016 election. Joe Carrigan looks at shady SIM cards. Our guest is Nathan Jones from WhiteCanyon Software on secure data destruction. And an AI company exposes millions of medical records.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/161
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Phone spearphishing is catching on after the Twitter hack. Taiwan blames China for hacking government agencies. FritzFrog botnet is cryptomining, for now. Whoever’s behind GoldenSpy is trying to cover their tracks. WastedLocker ransomware is successful without stealing data. The US Senate Select Committee on Intelligence releases its final report on Russian interference with the 2016 election. Joe Carrigan looks at shady SIM cards. Our guest is Nathan Jones from WhiteCanyon Software on secure data destruction. And an AI company exposes millions of medical records.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><br></p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/161</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1408</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fa2b4f24-e08a-11ea-9b89-c7629de685d0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2543354204.mp3?updated=1690211263" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patriotic hacktivism? Cryptomining worm steals AWS credentials. Carnival discloses data incident. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1154/notes</link>
      <description>Suspected patriotic hacktivists are defacing websites. A cryptomining worm is stealing AWS credentials. Cruise company Carnival suffered a ransomware attack that involved data theft. US measures against Huawei are expected to make things much more difficult for the Chinese company. Ben Yelin on new tools tracking cyber data on US borders. Our guest is Jesse Rothstein from ExtraHop on what happens to enterprise security when the network goes dark. And a look at the organizational structure of North Korea’s hacking units.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/160
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Aug 2020 19:15:00 -0000</pubDate>
      <itunes:title>Patriotic hacktivism? Cryptomining worm steals AWS credentials. Carnival discloses data incident. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1154</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Suspected patriotic hacktivists are defacing websites. A cryptomining worm is stealing AWS credentials. Cruise company Carnival suffered a ransomware attack that involved data theft. US measures against Huawei are expected to make things much more difficult for the Chinese company. Ben Yelin on new tools tracking cyber data on US borders. Our guest is Jesse Rothstein from ExtraHop on what happens to enterprise security when the network goes dark. And a look at the organizational structure of North Korea’s hacking units.
For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/160
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Suspected patriotic hacktivists are defacing websites. A cryptomining worm is stealing AWS credentials. Cruise company Carnival suffered a ransomware attack that involved data theft. US measures against Huawei are expected to make things much more difficult for the Chinese company. Ben Yelin on new tools tracking cyber data on US borders. Our guest is Jesse Rothstein from ExtraHop on what happens to enterprise security when the network goes dark. And a look at the organizational structure of North Korea’s hacking units.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><br></p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/160</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1355</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fa26bd9c-e08a-11ea-9b89-ab9192f5657e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1094820239.mp3?updated=1690211191" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>North Korea harasses defectors. Researchers exploited Emotet bug for six months. RedCurl APT conducts corporate espionage.</title>
      <description>North Korea harasses defectors. Researchers have been exploiting a bug in Emotet to inoculate systems against the malware for the past six months. CISA warns of KONNI spearphishing. RedCurl APT conducts corporate espionage. The US announces more restrictions on Huawei’s access to US-made chips. Chris Novak from Verizon on the evolving role of cyber insurance. Rick Howard on data loss prevention. And Australian schools are without email after an unpleasant experience with Reply-All.

For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/159
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 17 Aug 2020 20:13:21 -0000</pubDate>
      <itunes:title>North Korea harasses defectors. Researchers exploited Emotet bug for six months. RedCurl APT conducts corporate espionage.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>1153</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>North Korea harasses defectors. Researchers have been exploiting a bug in Emotet to inoculate systems against the malware for the past six months. CISA warns of KONNI spearphishing. RedCurl APT conducts corporate espionage. The US announces more restrictions on Huawei’s access to US-made chips. Chris Novak from Verizon on the evolving role of cyber insurance. Rick Howard on data loss prevention. And Australian schools are without email after an unpleasant experience with Reply-All.

For links to all of today's stories check out our CyberWire daily news brief:

https://www.thecyberwire.com/newsletters/daily-briefing/9/159
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>North Korea harasses defectors. Researchers have been exploiting a bug in Emotet to inoculate systems against the malware for the past six months. CISA warns of KONNI spearphishing. RedCurl APT conducts corporate espionage. The US announces more restrictions on Huawei’s access to US-made chips. Chris Novak from Verizon on the evolving role of cyber insurance. Rick Howard on data loss prevention. And Australian schools are without email after an unpleasant experience with Reply-All.</p><p><br></p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><br></p><p>https://www.thecyberwire.com/newsletters/daily-briefing/9/159</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1595</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fa20afd8-e08a-11ea-9b89-1354589c8216]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3955871019.mp3?updated=1690210783" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trying for a win, win, win game. [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/11/notes</link>
      <description>Founder and CEO Stu Sjouwerman takes us on a journey of how his career developed from starting a software service company to currently focusing on the infosec side of the business where his team essentially helps to create human firewalls. Stu talks about learning all aspects of the business while creating startups and suggests you learn to speak the language of the area you are looking to get into. He even touches on predicting the future and taking over the world. Our thanks to Stu for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 16 Aug 2020 05:01:00 -0000</pubDate>
      <itunes:title>Trying for a win, win, win game. [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>11</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Founder and CEO Stu Sjouwerman on startups and predicting the future. </itunes:subtitle>
      <itunes:summary>Founder and CEO Stu Sjouwerman takes us on a journey of how his career developed from starting a software service company to currently focusing on the infosec side of the business where his team essentially helps to create human firewalls. Stu talks about learning all aspects of the business while creating startups and suggests you learn to speak the language of the area you are looking to get into. He even touches on predicting the future and taking over the world. Our thanks to Stu for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Founder and CEO Stu Sjouwerman takes us on a journey of how his career developed from starting a software service company to currently focusing on the infosec side of the business where his team essentially helps to create human firewalls. Stu talks about learning all aspects of the business while creating startups and suggests you learn to speak the language of the area you are looking to get into. He even touches on predicting the future and taking over the world. Our thanks to Stu for sharing his story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>251</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dcaf6510-df05-11ea-83d6-0b8b24d93465]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1584613789.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The ABCs of cybersecurity for the education sector. [CyberWire-X]</title>
      <link>https://www.thecyberwire.com/podcasts/cyberwire-x/7/notes</link>
      <description>Teachers, students, admin, parents: The education sector has possibly the most diverse user base, each requiring its own user privileges, access requirements, and behavioral trends. Yet besides this, there are a number of unique challenges to securing an educational environment, including ensuring broad attack surface protection, minimal false positives, and maintaining a cost-effective security posture. Join us in as we chat with Kevin Ford, Chief Information Security Officer for the state of North Dakota, about these challenges for securing statewide educational institutions and their networks. Later, we will be joined by Steve Salinas, Head of Product Marketing at Deep Instinct and Matthew Fredrickson, Director of IT at Council Rock School District, in what should be a steep learning curve on protecting educational environments.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 16 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:title>The ABCs of cybersecurity for the education sector. [CyberWire-X]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>7</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Teachers, students, admin, parents: The education sector has possibly the most diverse user base, each requiring its own user privileges, access requirements, and behavioral trends. Yet besides this, there are a number of unique challenges to securing an educational environment, including ensuring broad attack surface protection, minimal false positives, and maintaining a cost-effective security posture. Join us in as we chat with Kevin Ford, Chief Information Security Officer for the state of North Dakota, about these challenges for securing statewide educational institutions and their networks. Later, we will be joined by Steve Salinas, Head of Product Marketing at Deep Instinct and Matthew Fredrickson, Director of IT at Council Rock School District, in what should be a steep learning curve on protecting educational environments.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Teachers, students, admin, parents: The education sector has possibly the most diverse user base, each requiring its own user privileges, access requirements, and behavioral trends. Yet besides this, there are a number of unique challenges to securing an educational environment, including ensuring broad attack surface protection, minimal false positives, and maintaining a cost-effective security posture. Join us in as we chat with Kevin Ford, Chief Information Security Officer for the state of North Dakota, about these challenges for securing statewide educational institutions and their networks. Later, we will be joined by Steve Salinas, Head of Product Marketing at Deep Instinct and Matthew Fredrickson, Director of IT at Council Rock School District, in what should be a steep learning curve on protecting educational environments.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1697</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[36e8bf9a-df01-11ea-b7a3-23b140b0c956]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5207769273.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Waiting for their victims. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/147/notes</link>
      <description>Bitdefender researchers have recently found the APT group StrongPity has been targeting victims in Turkey and Syria. Using watering hole tactics to selectively infect victims and deploying a three-tier C&amp;C infrastructure to thwart forensic investigations, the APT group leveraged Trojanized popular tools, such as archivers, file recovery applications, remote connections applications, utilities, and even security software, to cover a wide range of options that targeted victims might be seeking.
Joining us on this week's Research Saturday to discuss the research is Bitdefender's Liviu Arsene. 
You can find the research here:
 StrongPity APT – Revealing Trojanized Tools, Working Hours and Infrastructure
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>147</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>Bitdefender researchers have recently found the APT group StrongPity has been targeting victims in Turkey and Syria. Using watering hole tactics to selectively infect victims and deploying a three-tier C&amp;C infrastructure to thwart forensic investigations, the APT group leveraged Trojanized popular tools, such as archivers, file recovery applications, remote connections applications, utilities, and even security software, to cover a wide range of options that targeted victims might be seeking.
Joining us on this week's Research Saturday to discuss the research is Bitdefender's Liviu Arsene. 
You can find the research here:
 StrongPity APT – Revealing Trojanized Tools, Working Hours and Infrastructure
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Bitdefender researchers have recently found the APT group StrongPity has been targeting victims in Turkey and Syria. Using watering hole tactics to selectively infect victims and deploying a three-tier C&amp;C infrastructure to thwart forensic investigations, the APT group leveraged Trojanized popular tools, such as archivers, file recovery applications, remote connections applications, utilities, and even security software, to cover a wide range of options that targeted victims might be seeking.</p><p>Joining us on this week's Research Saturday to discuss the research is Bitdefender's Liviu Arsene. </p><p>You can find the research here:</p><p><a href="https://labs.bitdefender.com/2020/06/strongpity-apt-revealing-trojanized-tools-working-hours-and-infrastructure/"> StrongPity APT – Revealing Trojanized Tools, Working Hours and Infrastructure</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1402</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[99860ca2-df15-11ea-9e51-735aa381a2d6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2077516275.mp3?updated=1685108044" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bad Woodcutter is still bad, but not invincible. CactusPete is in Eastern European networks. Exploiting COVID-19. Celebrity endorsements (not).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1152/notes</link>
      <description>An update on Fancy Bear and its Drovorub rootkit. Karma Panda, a.k.a. CactusPete, is scouting Eastern European financial and military targets with the latest version of a venerable backdoor. How criminals and terrorists exploit COVID-19, and how law enforcement tracks them down. Caleb Barlow from Cynergistek covers security assessments and HIPAA data. Our guest is Ryan Olson from Palo Alto Networks on the 10th Anniversary of Stuxnet. And those celebrity endorsed investment scams aren’t actually endorsed by celebrities, and they’re not actually good investments.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/158
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 14 Aug 2020 19:21:58 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1152</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5a8beade-def8-11ea-911f-eb0667c5cfea/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>An update on Fancy Bear and its Drovorub rootkit. Karma Panda, a.k.a. CactusPete, is scouting Eastern European financial and military targets with the latest version of a venerable backdoor. How criminals and terrorists exploit COVID-19, and how law...</itunes:subtitle>
      <itunes:summary>An update on Fancy Bear and its Drovorub rootkit. Karma Panda, a.k.a. CactusPete, is scouting Eastern European financial and military targets with the latest version of a venerable backdoor. How criminals and terrorists exploit COVID-19, and how law enforcement tracks them down. Caleb Barlow from Cynergistek covers security assessments and HIPAA data. Our guest is Ryan Olson from Palo Alto Networks on the 10th Anniversary of Stuxnet. And those celebrity endorsed investment scams aren’t actually endorsed by celebrities, and they’re not actually good investments.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/158
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An update on Fancy Bear and its Drovorub rootkit. Karma Panda, a.k.a. CactusPete, is scouting Eastern European financial and military targets with the latest version of a venerable backdoor. How criminals and terrorists exploit COVID-19, and how law enforcement tracks them down. Caleb Barlow from Cynergistek covers security assessments and HIPAA data. Our guest is Ryan Olson from Palo Alto Networks on the 10th Anniversary of Stuxnet. And those celebrity endorsed investment scams aren’t actually endorsed by celebrities, and they’re not actually good investments.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/158</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1520</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[841971de-9eaa-4aaa-ba71-318a603f08a9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8760592618.mp3?updated=1608756624" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>This Woodcutter’s no Railsplitter. Operation Dream Job. COVID-19 phishing.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1151/notes</link>
      <description>NSA and FBI release a detailed report on a GRU toolset. North Korea’s Operation Dream Job phishes in Israeli waters. CISA warns of COVID-19 loan relief scams. Malek Ben Salem from Accenture with highlights from their 2020 Security Vision report. Our guest is Mike Hamilton from CI Security, who clears the air on election security and the shift to absentee status. And crooks are using infection and job loss as retail phishbait.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/157
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 13 Aug 2020 18:58:02 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1151</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5aa497e6-def8-11ea-911f-ffb81bb9ca9f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>NSA and FBI release a detailed report on a GRU toolset. North Korea’s Operation Dream Job phishes in Israeli waters. CISA warns of COVID-19 loan relief scams. Malek Ben Salem from Accenture with highlights from their 2020 Security Vision report. Our...</itunes:subtitle>
      <itunes:summary>NSA and FBI release a detailed report on a GRU toolset. North Korea’s Operation Dream Job phishes in Israeli waters. CISA warns of COVID-19 loan relief scams. Malek Ben Salem from Accenture with highlights from their 2020 Security Vision report. Our guest is Mike Hamilton from CI Security, who clears the air on election security and the shift to absentee status. And crooks are using infection and job loss as retail phishbait.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/157
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>NSA and FBI release a detailed report on a GRU toolset. North Korea’s Operation Dream Job phishes in Israeli waters. CISA warns of COVID-19 loan relief scams. Malek Ben Salem from Accenture with highlights from their 2020 Security Vision report. Our guest is Mike Hamilton from CI Security, who clears the air on election security and the shift to absentee status. And crooks are using infection and job loss as retail phishbait.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/157</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1282</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[918720c4-f9c5-42b0-85cc-b759a4c658ab]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2615013886.mp3?updated=1690210414" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Domestic cyber squabbling in Belarus and Iran. Pakistan accuses India of a cyber offensive. More on Papua’s data center. More privacy questions for TikTok. Parental control or stalker’s tool?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1150/notes</link>
      <description>Regional rivals tussle in cyberspace, and governments have it out with dissidents and the opposition. Market penetration as an instrument of state power. TikTok gets more unwelcome scrutiny over its privacy practices. Joe Carrigan on a credential harvesting phishing scheme using Zoom as bait. Our guest is Avi Shua from Orca Security on accidental vulnerabilities. And suppressing creepware is apparently harder than it looks.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/156
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 12 Aug 2020 19:21:46 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1150</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5ab6745c-def8-11ea-911f-bfc568b8503d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Regional rivals tussle in cyberspace, and governments have it out with dissidents and the opposition. Market penetration as an instrument of state power. TikTok gets more unwelcome scrutiny over its privacy practices. Joe Carrigan on a credential...</itunes:subtitle>
      <itunes:summary>Regional rivals tussle in cyberspace, and governments have it out with dissidents and the opposition. Market penetration as an instrument of state power. TikTok gets more unwelcome scrutiny over its privacy practices. Joe Carrigan on a credential harvesting phishing scheme using Zoom as bait. Our guest is Avi Shua from Orca Security on accidental vulnerabilities. And suppressing creepware is apparently harder than it looks.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/156
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Regional rivals tussle in cyberspace, and governments have it out with dissidents and the opposition. Market penetration as an instrument of state power. TikTok gets more unwelcome scrutiny over its privacy practices. Joe Carrigan on a credential harvesting phishing scheme using Zoom as bait. Our guest is Avi Shua from Orca Security on accidental vulnerabilities. And suppressing creepware is apparently harder than it looks.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/156</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1295</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[39f3eb0f-cf7c-4b5e-913c-0fa4ee04b0dd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2044002260.mp3?updated=1690208759" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Internet blackout in Belarus. Papua New Guinea’s insecure National Data Centre. Chrome and CSP rule bypass. Zoom gets sued in DC. Patch Tuesday. Go Spartans.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1149/notes</link>
      <description>Belarus shuts down its Internet after its incumbent president’s surprising, perhaps implausible, no...really implausible landslide reelection. Papua New Guinea undergoes buyer’s remorse over that Huawei-built National Data Centre it sprung for a couple of years ago. Versions of Chrome found susceptible to CSP rule bypass. Zoom is taken to court over encryption. Patch Tuesday notes. Ben Yelin looks at mobile surveillance in a Baltimore criminal case. Carole Theriault returns to speak with our guest, Alex Guirakhoo from Digital Shadows with a look at dark web travel agencies. And card-skimmers hit a university’s online store.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/155
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Aug 2020 19:45:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1149</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5acee94c-def8-11ea-911f-af55f14201e3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Belarus shuts down its Internet after its incumbent president’s surprising, perhaps implausible, no...really implausible landslide reelection. Papua New Guinea undergoes buyer’s remorse over that Huawei-built National Data Centre it sprung for a...</itunes:subtitle>
      <itunes:summary>Belarus shuts down its Internet after its incumbent president’s surprising, perhaps implausible, no...really implausible landslide reelection. Papua New Guinea undergoes buyer’s remorse over that Huawei-built National Data Centre it sprung for a couple of years ago. Versions of Chrome found susceptible to CSP rule bypass. Zoom is taken to court over encryption. Patch Tuesday notes. Ben Yelin looks at mobile surveillance in a Baltimore criminal case. Carole Theriault returns to speak with our guest, Alex Guirakhoo from Digital Shadows with a look at dark web travel agencies. And card-skimmers hit a university’s online store.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/155
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Belarus shuts down its Internet after its incumbent president’s surprising, perhaps implausible, no...really implausible landslide reelection. Papua New Guinea undergoes buyer’s remorse over that Huawei-built National Data Centre it sprung for a couple of years ago. Versions of Chrome found susceptible to CSP rule bypass. Zoom is taken to court over encryption. Patch Tuesday notes. Ben Yelin looks at mobile surveillance in a Baltimore criminal case. Carole Theriault returns to speak with our guest, Alex Guirakhoo from Digital Shadows with a look at dark web travel agencies. And card-skimmers hit a university’s online store.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/155</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1412</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0fc87090-0c3e-431a-85ff-9fa82f7f9edd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7793645711.mp3?updated=1690208510" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>NMAP (noun) [Word Notes]</title>
      <link>https://thecyberwire.com/podcasts/word-notes/1/notes</link>
      <description>A network mapping tool that pings IP addresses looking for a response and can discover host names, open communications ports, operating system names and versions. Written and maintained by Gordon Lyon, a.k.a. Fyodor, it is a free and open source software application used by both system admins and hackers alike and has been a staple in the security community for well over two decades.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:title>NMAP (noun) [Word Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle></itunes:subtitle>
      <itunes:summary>A network mapping tool that pings IP addresses looking for a response and can discover host names, open communications ports, operating system names and versions. Written and maintained by Gordon Lyon, a.k.a. Fyodor, it is a free and open source software application used by both system admins and hackers alike and has been a staple in the security community for well over two decades.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A network mapping tool that pings IP addresses looking for a response and can discover host names, open communications ports, operating system names and versions. Written and maintained by Gordon Lyon, a.k.a. Fyodor, it is a free and open source software application used by both system admins and hackers alike and has been a staple in the security community for well over two decades.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>233</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cc00b4d0-df28-11ea-8fd8-8f54fd9d99c8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9430443246.mp3?updated=1655146122" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What are the adversaries’ goals in election interference? A case study in the ransomware-as-a-service market. Untangling TikTok, as the clock ticks toward September 15th.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1148/notes</link>
      <description>The US Office of the Director of National Intelligence has released an appreciation of the goals of election interference among three principal US adversaries, Russia, China and Iran. Anomali offers a look at the ransomware-as-a-service market with its research on Smaug. The CyberWire’s Rick Howard continues his exploration of incident response. Andrea Little Limbago from Interos on cyber regionalism. And the tangles that need to be untangled in the TikTok affair, with a deadline looming less than a month from now.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/154
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 10 Aug 2020 19:39:44 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1148</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5ade2920-def8-11ea-911f-178921fd66b8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The US Office of the Director of National Intelligence has released an appreciation of the goals of election interference among three principal US adversaries, Russia, China and Iran. Anomali offers a look at the ransomware-as-a-service market with...</itunes:subtitle>
      <itunes:summary>The US Office of the Director of National Intelligence has released an appreciation of the goals of election interference among three principal US adversaries, Russia, China and Iran. Anomali offers a look at the ransomware-as-a-service market with its research on Smaug. The CyberWire’s Rick Howard continues his exploration of incident response. Andrea Little Limbago from Interos on cyber regionalism. And the tangles that need to be untangled in the TikTok affair, with a deadline looming less than a month from now.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/154
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US Office of the Director of National Intelligence has released an appreciation of the goals of election interference among three principal US adversaries, Russia, China and Iran. Anomali offers a look at the ransomware-as-a-service market with its research on Smaug. The CyberWire’s Rick Howard continues his exploration of incident response. Andrea Little Limbago from Interos on cyber regionalism. And the tangles that need to be untangled in the TikTok affair, with a deadline looming less than a month from now.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/154</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1487</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dd7819d5-0be5-473b-a820-7213f8595bd2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4906990839.mp3?updated=1690208491" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Green Goldfish and cyber threat intelligence. [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/10/notes</link>
      <description>Cyber threat intelligence analyst Selena Larson takes us on her career journey from being a journalist to making the switch to industrial security. As a child who wrote a book about a green goldfish who dealt with bullying, Selena always liked investigating and researching things. Specializing in cybersecurity journalism led to the realization of how closely aligned or similar skills are required from an investigative journalist and a cyber threat intelligence analyst. Our thanks to Selena for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 09 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:title>The Green Goldfish and cyber threat intelligence. [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Cyber threat intelligence analyst Selena Larson from journalist to industrial security.</itunes:subtitle>
      <itunes:summary>Cyber threat intelligence analyst Selena Larson takes us on her career journey from being a journalist to making the switch to industrial security. As a child who wrote a book about a green goldfish who dealt with bullying, Selena always liked investigating and researching things. Specializing in cybersecurity journalism led to the realization of how closely aligned or similar skills are required from an investigative journalist and a cyber threat intelligence analyst. Our thanks to Selena for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber threat intelligence analyst Selena Larson takes us on her career journey from being a journalist to making the switch to industrial security. As a child who wrote a book about a green goldfish who dealt with bullying, Selena always liked investigating and researching things. Specializing in cybersecurity journalism led to the realization of how closely aligned or similar skills are required from an investigative journalist and a cyber threat intelligence analyst. Our thanks to Selena for sharing her story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>355</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d9c12366-df05-11ea-bd36-d39317b7407f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7555589958.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Like anything these days, you have to disinfect it first. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/146/notes</link>
      <description>“Cyberbunker” refers to a criminal group that operated a “bulletproof” hosting facility out of an actual military bunker. “Bullet Proof” hosting usually refers to hosting locations in countries with little or corrupt law enforcement, making shutting down criminal activity difficult. Cyberbunker, which is also known as “ZYZtm” and “Calibour”, was a bit different in that it actually operated out of a bulletproof bunker. In September of last year, German police raided this actual Cyberbunker and arrested several suspects.
While most of the group's assets were seized during the initial raid, the IP address space remained and was later sold to Legaco Networks. Before being shut down, Legaco Networks temporarily redirected the traffic to the SANS Internet Storm Center honeypots for examination.
Joining us on this week's Research Saturday from SANS Technology Institute is graduate student Karim Lalji and Dean of Research Johannes Ullrich to discuss their experiences. 
The research and blog post can be found here: 
 Real-Time Honeypot Forensic Investigation on a German Organized Crime Network
 Cyberbunker 2.0: Analysis of the Remnants of a Bullet Proof Hosting Provider
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>146</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a89a141e-df14-11ea-aa91-1f6dc7c62844/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>“Cyberbunker” refers to a criminal group that operated a “bulletproof” hosting facility out of an actual military bunker. “Bullet Proof” hosting usually refers to hosting locations in countries with little or corrupt law enforcement,...</itunes:subtitle>
      <itunes:summary>“Cyberbunker” refers to a criminal group that operated a “bulletproof” hosting facility out of an actual military bunker. “Bullet Proof” hosting usually refers to hosting locations in countries with little or corrupt law enforcement, making shutting down criminal activity difficult. Cyberbunker, which is also known as “ZYZtm” and “Calibour”, was a bit different in that it actually operated out of a bulletproof bunker. In September of last year, German police raided this actual Cyberbunker and arrested several suspects.
While most of the group's assets were seized during the initial raid, the IP address space remained and was later sold to Legaco Networks. Before being shut down, Legaco Networks temporarily redirected the traffic to the SANS Internet Storm Center honeypots for examination.
Joining us on this week's Research Saturday from SANS Technology Institute is graduate student Karim Lalji and Dean of Research Johannes Ullrich to discuss their experiences. 
The research and blog post can be found here: 
 Real-Time Honeypot Forensic Investigation on a German Organized Crime Network
 Cyberbunker 2.0: Analysis of the Remnants of a Bullet Proof Hosting Provider
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>“Cyberbunker” refers to a criminal group that operated a “bulletproof” hosting facility out of an actual military bunker. “Bullet Proof” hosting usually refers to hosting locations in countries with little or corrupt law enforcement, making shutting down criminal activity difficult. Cyberbunker, which is also known as “ZYZtm” and “Calibour”, was a bit different in that it actually operated out of a bulletproof bunker. In September of last year, German police raided this actual Cyberbunker and arrested several suspects.</p><p>While most of the group's assets were seized during the initial raid, the IP address space remained and was later sold to Legaco Networks. Before being shut down, Legaco Networks temporarily redirected the traffic to the SANS Internet Storm Center honeypots for examination.</p><p>Joining us on this week's Research Saturday from SANS Technology Institute is graduate student Karim Lalji and Dean of Research Johannes Ullrich to discuss their experiences. </p><p>The research and blog post can be found here: </p><p><a href="https://www.sans.org/reading-room/whitepapers/threathunting/paper/39640"> Real-Time Honeypot Forensic Investigation on a German Organized Crime Network</a></p><p><a href="https://isc.sans.edu/forums/diary/Cyberbunker+20+Analysis+of+the+Remnants+of+a+Bullet+Proof+Hosting+Provider/26266/"> Cyberbunker 2.0: Analysis of the Remnants of a Bullet Proof Hosting Provider</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1570</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a3d6f834-12ac-4179-b37b-d786de8b9607]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8691122785.mp3?updated=1685108038" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US Executive Orders against TikTok, WeChat. Chimera takes chip IP. Intel data leaked. Texting Rewards for Justice. Coordinated inauthenticity. Magecart’s homoglyph attacks. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1147/notes</link>
      <description>President Trump issues Executive Orders restricting TikTok and WeChat in the US. A Chinese APT has been active in industrial espionage against Taiwan’s semiconductor industry. Intel sustains a leak of sensitive company intellectual property. Rewards for Justice communicated to Russian and Iranian individuals by text message. Coordinated inauthenticity from Romanian actors, probably criminals. Magecart moves to homoglyph attacks. Craig Williams from Cisco Talos on ransomware campaigns making use of Maze and Snake malware. Our guest is Monica Ruiz from the Hewlett Foundation Cyber Initiative on the potential for a volunteer cyber workforce. And, sorry Fort Meade--there are limits to telework.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/153
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 07 Aug 2020 19:58:19 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1147</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5af54a4c-def8-11ea-911f-57606ceb07c1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>President Trump issues Executive Orders restricting TikTok and WeChat in the US. A Chinese APT has been active in industrial espionage against Taiwan’s semiconductor industry. Intel sustains a leak of sensitive company intellectual property. Rewards...</itunes:subtitle>
      <itunes:summary>President Trump issues Executive Orders restricting TikTok and WeChat in the US. A Chinese APT has been active in industrial espionage against Taiwan’s semiconductor industry. Intel sustains a leak of sensitive company intellectual property. Rewards for Justice communicated to Russian and Iranian individuals by text message. Coordinated inauthenticity from Romanian actors, probably criminals. Magecart moves to homoglyph attacks. Craig Williams from Cisco Talos on ransomware campaigns making use of Maze and Snake malware. Our guest is Monica Ruiz from the Hewlett Foundation Cyber Initiative on the potential for a volunteer cyber workforce. And, sorry Fort Meade--there are limits to telework.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/153
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>President Trump issues Executive Orders restricting TikTok and WeChat in the US. A Chinese APT has been active in industrial espionage against Taiwan’s semiconductor industry. Intel sustains a leak of sensitive company intellectual property. Rewards for Justice communicated to Russian and Iranian individuals by text message. Coordinated inauthenticity from Romanian actors, probably criminals. Magecart moves to homoglyph attacks. Craig Williams from Cisco Talos on ransomware campaigns making use of Maze and Snake malware. Our guest is Monica Ruiz from the Hewlett Foundation Cyber Initiative on the potential for a volunteer cyber workforce. And, sorry Fort Meade--there are limits to telework.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/153</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1486</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e7d77572-737e-4666-bf8b-d15a96594f6c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3736969893.mp3?updated=1608756625" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US Clean Network program outlines measures against Chinese operations. $10 million reward offered for info on election interference. Australia’s cyber strategy is out. Grand larceny and petty lulz. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1146/notes</link>
      <description>The US announces five new lines of effort for the Clean Network program, and none of them are exactly mash notes for Beijing. The US is also offering rewards of up to ten million dollars for information about foreign computer crimes aimed at interfering with US elections. Australia’s new cybersecurity strategy is out. Maze may have hit Canon. Rob Lee from Dragos addresses speculation of an ICS supply chain back door. Our guest is Theresa Lanowitz from AT&amp;T Cybersecurity on 5G security threats to businesses. And a bail hearing is disrupted by Zoom-bombing.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/152
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 06 Aug 2020 19:43:53 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1146</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5b100490-def8-11ea-911f-bf52bf171b9b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The US announces five new lines of effort for the Clean Network program, and none of them are exactly mash notes for Beijing. The US is also offering rewards of up to ten million dollars for information about foreign computer crimes aimed at...</itunes:subtitle>
      <itunes:summary>The US announces five new lines of effort for the Clean Network program, and none of them are exactly mash notes for Beijing. The US is also offering rewards of up to ten million dollars for information about foreign computer crimes aimed at interfering with US elections. Australia’s new cybersecurity strategy is out. Maze may have hit Canon. Rob Lee from Dragos addresses speculation of an ICS supply chain back door. Our guest is Theresa Lanowitz from AT&amp;T Cybersecurity on 5G security threats to businesses. And a bail hearing is disrupted by Zoom-bombing.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/152
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US announces five new lines of effort for the Clean Network program, and none of them are exactly mash notes for Beijing. The US is also offering rewards of up to ten million dollars for information about foreign computer crimes aimed at interfering with US elections. Australia’s new cybersecurity strategy is out. Maze may have hit Canon. Rob Lee from Dragos addresses speculation of an ICS supply chain back door. Our guest is Theresa Lanowitz from AT&amp;T Cybersecurity on 5G security threats to businesses. And a bail hearing is disrupted by Zoom-bombing.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/152</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1420</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[72ea8e74-eab1-4469-a468-53e5ab8acfc6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7306026106.mp3?updated=1690208348" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Privacy, Fort Meade style. Interpol looks at cybercrime. Oilrig gets DNSExfiltrator. Please move on from Windows 7. Updates on the Twitter hack. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1145/notes</link>
      <description>NSA, yes, NSA, has some privacy advice. Interpol offers its take on where cybercrime is going during the time of the pandemic. Iran’s Oilrig is getting clever with its data exfiltration. The FBI would like to know when you’re finally going to move on from Windows 7--like, c’mon people. Joe Carrigan looks at pesky ads from the Google Play store. Our guest is Bobby McLernon from Axonius on how federal cybersecurity is particularly vulnerable during the shutdown. And a not-guilty plea from one of the three alleged Twitter hackers, along with some notes on how whoever dunnit dunnit.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/151
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 05 Aug 2020 19:56:53 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1145</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5b29e856-def8-11ea-911f-7bbd4a60b891/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>NSA, yes, NSA, has some privacy advice. Interpol offers its take on where cybercrime is going during the time of the pandemic. Iran’s Oilrig is getting clever with its data exfiltration. The FBI would like to know when you’re finally going to move...</itunes:subtitle>
      <itunes:summary>NSA, yes, NSA, has some privacy advice. Interpol offers its take on where cybercrime is going during the time of the pandemic. Iran’s Oilrig is getting clever with its data exfiltration. The FBI would like to know when you’re finally going to move on from Windows 7--like, c’mon people. Joe Carrigan looks at pesky ads from the Google Play store. Our guest is Bobby McLernon from Axonius on how federal cybersecurity is particularly vulnerable during the shutdown. And a not-guilty plea from one of the three alleged Twitter hackers, along with some notes on how whoever dunnit dunnit.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/151
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>NSA, yes, NSA, has some privacy advice. Interpol offers its take on where cybercrime is going during the time of the pandemic. Iran’s Oilrig is getting clever with its data exfiltration. The FBI would like to know when you’re finally going to move on from Windows 7--like, c’mon people. Joe Carrigan looks at pesky ads from the Google Play store. Our guest is Bobby McLernon from Axonius on how federal cybersecurity is particularly vulnerable during the shutdown. And a not-guilty plea from one of the three alleged Twitter hackers, along with some notes on how whoever dunnit dunnit.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/151</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1276</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cc6e845f-af3f-4c14-8e77-66e0f6128027]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2596328563.mp3?updated=1690208155" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US attributes Taidoor RAT to China’s government. Pegasus spyware in Togo. The TikTok affair. More fallout from the Blackbaud ransomware incident.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1144/notes</link>
      <description>The US attributes the Taidoor remote access Trojan to the Chinese government. Sources tell Reuters that documents used in an attempt to influence the last British general election were taken from the compromised email account of the trade minister. Pegasus spyware is found deployed against churchmen and political opposition figures in Togo. China denounces the American smash-and-grab of TikTok. Ben Yelin looks at international law and attribution. Our guest is Ameesh Divatia from Baffle on misconfigured databases being attacked within just hours after coming online. And the Blackbaud ransomware attack continues to affect new victims.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/150
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Aug 2020 18:59:07 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1144</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5b476084-def8-11ea-911f-af8c29aff826/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The US attributes the Taidoor remote access Trojan to the Chinese government. Sources tell Reuters that documents used in an attempt to influence the last British general election were taken from the compromised email account of the trade minister....</itunes:subtitle>
      <itunes:summary>The US attributes the Taidoor remote access Trojan to the Chinese government. Sources tell Reuters that documents used in an attempt to influence the last British general election were taken from the compromised email account of the trade minister. Pegasus spyware is found deployed against churchmen and political opposition figures in Togo. China denounces the American smash-and-grab of TikTok. Ben Yelin looks at international law and attribution. Our guest is Ameesh Divatia from Baffle on misconfigured databases being attacked within just hours after coming online. And the Blackbaud ransomware attack continues to affect new victims.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/150
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US attributes the Taidoor remote access Trojan to the Chinese government. Sources tell Reuters that documents used in an attempt to influence the last British general election were taken from the compromised email account of the trade minister. Pegasus spyware is found deployed against churchmen and political opposition figures in Togo. China denounces the American smash-and-grab of TikTok. Ben Yelin looks at international law and attribution. Our guest is Ameesh Divatia from Baffle on misconfigured databases being attacked within just hours after coming online. And the Blackbaud ransomware attack continues to affect new victims.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/150</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1267</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d86b82a4-8bc5-4f9d-9ca9-1a5a22d0b518]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3929969228.mp3?updated=1690208143" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Microsoft considers acquiring TikTok. The US considers other Chinese companies as potential security threats. Charges in the Twiter hack. DDoS turns out to be a glitch. Garmin hack update.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1143/notes</link>
      <description>Microsoft is in talks to acquire TikTok as the US hints that it may be considering action against other Chinese software companies. Three young men have been charged in the Twitter hack. An apparent distributed denial-of-service attack turns out to have been a glitch. We welcome Verizon’s Chris Novak to the show. Rick Howard talks incident response. And updates on the Garmin hack suggest shifts in the ransomware threat.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/149
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 03 Aug 2020 20:04:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1143</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5b590f6e-def8-11ea-911f-879fe38bc610/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Microsoft is in talks to acquire TikTok as the US hints that it may be considering action against other Chinese software companies. Three young men have been charged in the Twitter hack. An apparent distributed denial-of-service attack turns out to...</itunes:subtitle>
      <itunes:summary>Microsoft is in talks to acquire TikTok as the US hints that it may be considering action against other Chinese software companies. Three young men have been charged in the Twitter hack. An apparent distributed denial-of-service attack turns out to have been a glitch. We welcome Verizon’s Chris Novak to the show. Rick Howard talks incident response. And updates on the Garmin hack suggest shifts in the ransomware threat.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/149
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft is in talks to acquire TikTok as the US hints that it may be considering action against other Chinese software companies. Three young men have been charged in the Twitter hack. An apparent distributed denial-of-service attack turns out to have been a glitch. We welcome Verizon’s Chris Novak to the show. Rick Howard talks incident response. And updates on the Garmin hack suggest shifts in the ransomware threat.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/149</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1354</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[27b92df2-7b78-46a2-9470-8be791211121]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8171030438.mp3?updated=1690208124" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rely on your strengths in the areas of the unknown. [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/9/notes</link>
      <description>Director of Security Engineering at Marqeta and Host of Hacker Valley Studio podcast Chris Cochran describes his transitions throughout the cybersecurity industry, from an intelligence job with the Marine Corps, to starting the intelligence apparatus for the House of Representatives, then on to leading Netflix's threat intelligence capability. Chris points out that when pivoting to different roles and responsibilities, you must rely on your own strengths to move forward and bring value to your work Our thanks to Chris for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 02 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>9</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Rely on your strengths in the areas of the unknown. [Career Notes]</itunes:subtitle>
      <itunes:summary>Director of Security Engineering at Marqeta and Host of Hacker Valley Studio podcast Chris Cochran describes his transitions throughout the cybersecurity industry, from an intelligence job with the Marine Corps, to starting the intelligence apparatus for the House of Representatives, then on to leading Netflix's threat intelligence capability. Chris points out that when pivoting to different roles and responsibilities, you must rely on your own strengths to move forward and bring value to your work Our thanks to Chris for sharing his story with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Director of Security Engineering at Marqeta and Host of Hacker Valley Studio podcast Chris Cochran describes his transitions throughout the cybersecurity industry, from an intelligence job with the Marine Corps, to starting the intelligence apparatus for the House of Representatives, then on to leading Netflix's threat intelligence capability. Chris points out that when pivoting to different roles and responsibilities, you must rely on your own strengths to move forward and bring value to your work Our thanks to Chris for sharing his story with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>342</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d873f880-df05-11ea-bc93-0b827ef7271d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7541338805.mp3?updated=1596045528" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Detecting Twitter bots in real time. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/145/notes</link>
      <description>NortonLifeLock Research Group (NRG) released a prototype browser extension called BotSight that leverages machine learning to detect Twitter bots in real-time. The tool is intended to help users understand the prevalence of bots and disinformation campaigns within their Twitter feeds, particularly with the increase in disinformation of COVID-19.
Joining us on this week's Research Saturday to discuss this tool is Daniel Kats from NortonLifeLock Research Group.
You can find the research here:
 Introducing BotSight
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Aug 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>145</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a45dd106-df14-11ea-8499-ab739c40feab/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>NortonLifeLock Research Group (NRG) released a prototype browser extension called BotSight that leverages machine learning to detect Twitter bots in real-time. The tool is intended to help users understand the prevalence of bots and disinformation...</itunes:subtitle>
      <itunes:summary>NortonLifeLock Research Group (NRG) released a prototype browser extension called BotSight that leverages machine learning to detect Twitter bots in real-time. The tool is intended to help users understand the prevalence of bots and disinformation campaigns within their Twitter feeds, particularly with the increase in disinformation of COVID-19.
Joining us on this week's Research Saturday to discuss this tool is Daniel Kats from NortonLifeLock Research Group.
You can find the research here:
 Introducing BotSight
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>NortonLifeLock Research Group (NRG) released a prototype browser extension called BotSight that leverages machine learning to detect Twitter bots in real-time. The tool is intended to help users understand the prevalence of bots and disinformation campaigns within their Twitter feeds, particularly with the increase in disinformation of COVID-19.</p><p>Joining us on this week's Research Saturday to discuss this tool is Daniel Kats from NortonLifeLock Research Group.</p><p>You can find the research here:</p><p><a href="https://www.nortonlifelock.com/blogs/research-group/botsight-tool-detect-twitter-bots"> Introducing BotSight</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1420</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e0ed0d06-b373-4dde-a36a-64db971fe0d3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2852606666.mp3?updated=1685108030" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Social engineering at Twitter. Phishing kits and hackers for hire. Cyberespionage. The EU sanctions actors for Cloudhopper, WannaCry, and NotPetya. And security advice from NSA and NIST. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1142/notes</link>
      <description>An update on social engineering at Twitter. A quick look at the phishing kit criminal market. The European Union sanctions individuals and organizations in Russia, China, and North Korea for involvement in notorious hacking campaigns. North Korea’s North Star campaign is back and dangling bogus job offers in front of its marks. Deceptikons snoop into European law firms. Zully Ramzan from RSA on Digital Contact Tracing. Our guest is Tom Kellermann from Vmware Carbon Black on top financial CISOs analyzing the 2020 attack landscape. And both NSA and NIST have some advice on shoring up your security.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/148
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 31 Jul 2020 19:11:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1142</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5b72387c-def8-11ea-911f-77a817a6304c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>An update on social engineering at Twitter. A quick look at the phishing kit criminal market. The European Union sanctions individuals and organizations in Russia, China, and North Korea for involvement in notorious hacking campaigns. North Korea’s...</itunes:subtitle>
      <itunes:summary>An update on social engineering at Twitter. A quick look at the phishing kit criminal market. The European Union sanctions individuals and organizations in Russia, China, and North Korea for involvement in notorious hacking campaigns. North Korea’s North Star campaign is back and dangling bogus job offers in front of its marks. Deceptikons snoop into European law firms. Zully Ramzan from RSA on Digital Contact Tracing. Our guest is Tom Kellermann from Vmware Carbon Black on top financial CISOs analyzing the 2020 attack landscape. And both NSA and NIST have some advice on shoring up your security.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/148
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An update on social engineering at Twitter. A quick look at the phishing kit criminal market. The European Union sanctions individuals and organizations in Russia, China, and North Korea for involvement in notorious hacking campaigns. North Korea’s North Star campaign is back and dangling bogus job offers in front of its marks. Deceptikons snoop into European law firms. Zully Ramzan from RSA on Digital Contact Tracing. Our guest is Tom Kellermann from Vmware Carbon Black on top financial CISOs analyzing the 2020 attack landscape. And both NSA and NIST have some advice on shoring up your security.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/148</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1565</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[375c5f7c-d18b-4d0e-8a18-3d660476d394]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6025987796.mp3?updated=1608756597" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A quick look at Big Tech’s antitrust testimony. BootHole may be tough to patch. Fake COVID contact tracers. Netwalker warning. And Chinese espionage against the Vatican and the United Kingdom. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1141/notes</link>
      <description>Yesterday’s antitrust hearings in the US House of Representatives focus on Big Tech’s big data as something open to use in restraint of trade. And there are questions about community standards as well. The BootHole vulnerability may not represent an emergency, but it will be tough to fix. Android malware masquerades as COVID-19 contact-tracers. The FBI warns against Netwalker ransomware. China says it didn’t hack the Vatican. Justin Harvey from Accenture demystifies red teaming. Our guest is Christopher Ahlberg from Recorded Future on trends in threat intelligence. And somebody’s spoofing a British MP: he’s looking at you, Peoples Liberation Army.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/147
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 30 Jul 2020 18:55:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1141</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5b89729e-def8-11ea-911f-0f8fd52468b1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Yesterday’s antitrust hearings in the US House of Representatives focus on Big Tech’s big data as something open to use in restraint of trade. And there are questions about community standards as well. The BootHole vulnerability may not represent...</itunes:subtitle>
      <itunes:summary>Yesterday’s antitrust hearings in the US House of Representatives focus on Big Tech’s big data as something open to use in restraint of trade. And there are questions about community standards as well. The BootHole vulnerability may not represent an emergency, but it will be tough to fix. Android malware masquerades as COVID-19 contact-tracers. The FBI warns against Netwalker ransomware. China says it didn’t hack the Vatican. Justin Harvey from Accenture demystifies red teaming. Our guest is Christopher Ahlberg from Recorded Future on trends in threat intelligence. And somebody’s spoofing a British MP: he’s looking at you, Peoples Liberation Army.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/147
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Yesterday’s antitrust hearings in the US House of Representatives focus on Big Tech’s big data as something open to use in restraint of trade. And there are questions about community standards as well. The BootHole vulnerability may not represent an emergency, but it will be tough to fix. Android malware masquerades as COVID-19 contact-tracers. The FBI warns against Netwalker ransomware. China says it didn’t hack the Vatican. Justin Harvey from Accenture demystifies red teaming. Our guest is Christopher Ahlberg from Recorded Future on trends in threat intelligence. And somebody’s spoofing a British MP: he’s looking at you, Peoples Liberation Army.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/147</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1246</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f9cc360b-8406-4438-9b46-63a8f4bfdcd1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7956974795.mp3?updated=1690207941" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Alleged Russian disinformation campaigns. Beijing’s cyberespionage hits the Vatican. Costly PII losses. VPNs and OT security. Big Tech’s day with Congress. Online bar exams. Snooping for the Saudis.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1140/notes</link>
      <description>Alleged Russian influence operations described by US intelligence services. “Ghostwriter” targets the Baltic region with anti-NATO false narratives. Chinese intelligence is said to have compromised Vatican networks. Loss of customer PII seems the costliest kind of data breach. VPN bugs represent a risk to OT networks. Big Tech comes to Capitol Hill, virtually. Michigan’s online bar exam knocked offline, briefly, by a cyber attack. Joe Carrigan on password stealers targeting gaming. Our guests are Troy Smith and Mike Koontz from Raytheon on defending communications operations across cloud platforms. And a superseding indictment for two ex-Twitterati charged with snooping for Saudi Arabia.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/146
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 29 Jul 2020 19:27:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1140</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5b9fdd68-def8-11ea-911f-a78d262b1973/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Alleged Russian influence operations described by US intelligence services. “Ghostwriter” targets the Baltic region with anti-NATO false narratives. Chinese intelligence is said to have compromised Vatican networks. Loss of customer PII seems the...</itunes:subtitle>
      <itunes:summary>Alleged Russian influence operations described by US intelligence services. “Ghostwriter” targets the Baltic region with anti-NATO false narratives. Chinese intelligence is said to have compromised Vatican networks. Loss of customer PII seems the costliest kind of data breach. VPN bugs represent a risk to OT networks. Big Tech comes to Capitol Hill, virtually. Michigan’s online bar exam knocked offline, briefly, by a cyber attack. Joe Carrigan on password stealers targeting gaming. Our guests are Troy Smith and Mike Koontz from Raytheon on defending communications operations across cloud platforms. And a superseding indictment for two ex-Twitterati charged with snooping for Saudi Arabia.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/146
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Alleged Russian influence operations described by US intelligence services. “Ghostwriter” targets the Baltic region with anti-NATO false narratives. Chinese intelligence is said to have compromised Vatican networks. Loss of customer PII seems the costliest kind of data breach. VPN bugs represent a risk to OT networks. Big Tech comes to Capitol Hill, virtually. Michigan’s online bar exam knocked offline, briefly, by a cyber attack. Joe Carrigan on password stealers targeting gaming. Our guests are Troy Smith and Mike Koontz from Raytheon on defending communications operations across cloud platforms. And a superseding indictment for two ex-Twitterati charged with snooping for Saudi Arabia.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/146</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1306</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11db39fd-28e6-4dde-a57f-7be6407f8973]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9884737491.mp3?updated=1690207901" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Data breaches and responsibility. Where do you get a decryptor for WastedLocker? Third-party risk. Misconfigured databases. Follow-up on the Twitter hack. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1139/notes</link>
      <description>Cloudflare says that reported Ukrainian breaches aren’t its issue. Trend Micro describes a new and unusually capable strain of malware. Garmin is reported to have obtained a decryptor for WastedLocker ransomware. Third-party risk continues in the news, as do misconfigured databases that expose personal information. Huawei’s CFO alleges misconduct by Canadian police and intelligence agencies. Ben Yelin examines the EFF's online Atlas of Surveillance. Dave DeWalt with SafeGuard Cyber on the evolving threat landscape as folks return to the workplace. And the Twitter incident seems to have been a problem waiting to appear.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/145
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Jul 2020 19:59:24 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1139</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5bbc9610-def8-11ea-911f-5f6b248a3c9f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cloudflare says that reported Ukrainian breaches aren’t its issue. Trend Micro describes a new and unusually capable strain of malware. Garmin is reported to have obtained a decryptor for WastedLocker ransomware. Third-party risk continues in the...</itunes:subtitle>
      <itunes:summary>Cloudflare says that reported Ukrainian breaches aren’t its issue. Trend Micro describes a new and unusually capable strain of malware. Garmin is reported to have obtained a decryptor for WastedLocker ransomware. Third-party risk continues in the news, as do misconfigured databases that expose personal information. Huawei’s CFO alleges misconduct by Canadian police and intelligence agencies. Ben Yelin examines the EFF's online Atlas of Surveillance. Dave DeWalt with SafeGuard Cyber on the evolving threat landscape as folks return to the workplace. And the Twitter incident seems to have been a problem waiting to appear.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/145
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cloudflare says that reported Ukrainian breaches aren’t its issue. Trend Micro describes a new and unusually capable strain of malware. Garmin is reported to have obtained a decryptor for WastedLocker ransomware. Third-party risk continues in the news, as do misconfigured databases that expose personal information. Huawei’s CFO alleges misconduct by Canadian police and intelligence agencies. Ben Yelin examines the EFF's online Atlas of Surveillance. Dave DeWalt with SafeGuard Cyber on the evolving threat landscape as folks return to the workplace. And the Twitter incident seems to have been a problem waiting to appear.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/145</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1312</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[61f6d4c8-ecc2-4184-93d2-bf061023ed2c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7698580253.mp3?updated=1690207883" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Vigilante action against Emotet. Third-party risks and data breaches. Cerberus is for sale. And WastedLocker ransomware and the fortunes of crime.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1138/notes</link>
      <description>A vigilante appears to be interfering with Emotet’s payloads. A fintech breach is blamed on a third-party service provider. A list of Cloudflare users is dumped online. There’s a going-out-of-business sale over at the Cerberus cybergang. Malek ben Salem from Accenture Labs on DeepFake detection. Our own Rick Howard gathers the Hash Table to sort some SOCs. And Garmin, restoring its services after last week’s attack, may have been the victim of Evil Corp’s WastedLocker ransomware.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/144
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 27 Jul 2020 19:36:22 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1138</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5bcfe74c-def8-11ea-911f-cb934532bdd0/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A vigilante appears to be interfering with Emotet’s payloads. A fintech breach is blamed on a third-party service provider. A list of Cloudflare users is dumped online. There’s a going-out-of-business sale over at the Cerberus cybergang. Malek ben...</itunes:subtitle>
      <itunes:summary>A vigilante appears to be interfering with Emotet’s payloads. A fintech breach is blamed on a third-party service provider. A list of Cloudflare users is dumped online. There’s a going-out-of-business sale over at the Cerberus cybergang. Malek ben Salem from Accenture Labs on DeepFake detection. Our own Rick Howard gathers the Hash Table to sort some SOCs. And Garmin, restoring its services after last week’s attack, may have been the victim of Evil Corp’s WastedLocker ransomware.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/144
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A vigilante appears to be interfering with Emotet’s payloads. A fintech breach is blamed on a third-party service provider. A list of Cloudflare users is dumped online. There’s a going-out-of-business sale over at the Cerberus cybergang. Malek ben Salem from Accenture Labs on DeepFake detection. Our own Rick Howard gathers the Hash Table to sort some SOCs. And Garmin, restoring its services after last week’s attack, may have been the victim of Evil Corp’s WastedLocker ransomware.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/144</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1285</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8b4681dc-19b2-49f0-8e26-ad6cbcd9c8f4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1212669106.mp3?updated=1690207864" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No matter the statistic, even if against the odds, focus on what you want. [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/8/notes</link>
      <description>Privacy and data security lawyer, Dominique Shelton Leipzig shares that she has always wanted to be a lawyer, ever since she was a little girl. She talks about what her role is with clients in protecting and managing their data, sometimes adhering to up to 134 different data protection laws for global companies. Learn that not a lot has changed for an African-American woman partner at an Amlaw 100 firm as far as diversity during Dominique's career, and how Dominique suggests young lawyers should address those odds. Our thanks to Dominque for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 26 Jul 2020 05:00:00 -0000</pubDate>
      <itunes:title>No matter the statistics, even if against the odds, focus on what you want. [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Privacy and data security lawyer, Dominique Shelton Leipzig on doing what she's always wanted to do with a cyber twist.</itunes:subtitle>
      <itunes:summary>Privacy and data security lawyer, Dominique Shelton Leipzig shares that she has always wanted to be a lawyer, ever since she was a little girl. She talks about what her role is with clients in protecting and managing their data, sometimes adhering to up to 134 different data protection laws for global companies. Learn that not a lot has changed for an African-American woman partner at an Amlaw 100 firm as far as diversity during Dominique's career, and how Dominique suggests young lawyers should address those odds. Our thanks to Dominque for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Privacy and data security lawyer, Dominique Shelton Leipzig shares that she has always wanted to be a lawyer, ever since she was a little girl. She talks about what her role is with clients in protecting and managing their data, sometimes adhering to up to 134 different data protection laws for global companies. Learn that not a lot has changed for an African-American woman partner at an Amlaw 100 firm as far as diversity during Dominique's career, and how Dominique suggests young lawyers should address those odds. Our thanks to Dominque for sharing her story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>314</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d4e4a9ee-df05-11ea-beb2-4f8f768a8c40]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4605106675.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>It was only a matter of time. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/144/notes</link>
      <description>On April 29, 2020, the Salt management framework, authored by the IT automation company SaltStack, received a patch concerning two CVEs; CVE-2020-11651, an authentication bypass vulnerability, and CVE-2020-11652, a directory-traversal vulnerability.
On April 30, 2020, researchers at F-Secure disclosed their vulnerability findings to the public, with an urgent warning for Salt users - patch now. Before the weekend was out, criminals were deploying malware and targeting vulnerable Salt installations, successfully affecting operations at Ghost, DigiCert, and LineageOS. The malware is a cryptominer, but there is an additional component, a Remote Access Tool written in Go called nspps. Researchers at Akamai have also observed in-the-wild attacks on Salt vulnerabilities. 
Joining us on this week's Research Saturday is Larry Cashdollar, Senior Security Response Engineer at Akamai, to discuss this issue. 
The research can be found here: 
 SaltStack Vulnerabilities Actively Exploited in the Wild
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Jul 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>144</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a1517648-df14-11ea-83e4-ef906f7f3cf7/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>On April 29, 2020, the Salt management framework, authored by the IT automation company SaltStack, received a patch concerning two CVEs; CVE-2020-11651, an authentication bypass vulnerability, and CVE-2020-11652, a directory-traversal vulnerability....</itunes:subtitle>
      <itunes:summary>On April 29, 2020, the Salt management framework, authored by the IT automation company SaltStack, received a patch concerning two CVEs; CVE-2020-11651, an authentication bypass vulnerability, and CVE-2020-11652, a directory-traversal vulnerability.
On April 30, 2020, researchers at F-Secure disclosed their vulnerability findings to the public, with an urgent warning for Salt users - patch now. Before the weekend was out, criminals were deploying malware and targeting vulnerable Salt installations, successfully affecting operations at Ghost, DigiCert, and LineageOS. The malware is a cryptominer, but there is an additional component, a Remote Access Tool written in Go called nspps. Researchers at Akamai have also observed in-the-wild attacks on Salt vulnerabilities. 
Joining us on this week's Research Saturday is Larry Cashdollar, Senior Security Response Engineer at Akamai, to discuss this issue. 
The research can be found here: 
 SaltStack Vulnerabilities Actively Exploited in the Wild
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On April 29, 2020, the Salt management framework, authored by the IT automation company SaltStack, received a patch concerning two CVEs; CVE-2020-11651, an authentication bypass vulnerability, and CVE-2020-11652, a directory-traversal vulnerability.</p><p>On April 30, 2020, researchers at F-Secure disclosed their vulnerability findings to the public, with an urgent warning for Salt users - patch now. Before the weekend was out, criminals were deploying malware and targeting vulnerable Salt installations, successfully affecting operations at Ghost, DigiCert, and LineageOS. The malware is a cryptominer, but there is an additional component, a Remote Access Tool written in Go called nspps. Researchers at Akamai have also observed in-the-wild attacks on Salt vulnerabilities. </p><p>Joining us on this week's Research Saturday is Larry Cashdollar, Senior Security Response Engineer at Akamai, to discuss this issue. </p><p>The research can be found here: </p><p><a href="https://blogs.akamai.com/sitr/2020/05/saltstack-vulnerabilities-actively-exploited-in-the-wild.html"> SaltStack Vulnerabilities Actively Exploited in the Wild</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>898</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[be62ce9c-942c-42c0-8364-bed14392f12b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1027840729.mp3?updated=1685108017" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A warning for US critical infrastructure operators. Blackbaud extortion and data breach update. Who’s got the keys to Twitter? Sino-American cyber tensions.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1137/notes</link>
      <description>CISA and NSA warn of a foreign threat to US critical infrastructure. A look at what the Bears have been up to lately. The Blackbaud extortion incident shows its ripple effects. An awful lot of Twitter employees had access to powerful admin tools. China orders a US consulate closed in a tit-for-tat response to the closure of China’s consulate in Houston. Andrea Little Limbago on cyber in a re-globalized world system. Our guest is Dominique Shelton Leipzig from Perkins Coie LLP on the CA Consumer Privacy Act. And DJI drones may be a bit nosey.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/143
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 24 Jul 2020 19:47:37 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1137</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5bf3d9e0-def8-11ea-911f-a78461ecc358/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>CISA and NSA warn of a foreign threat to US critical infrastructure. A look at what the Bears have been up to lately. The Blackbaud extortion incident shows its ripple effects. An awful lot of Twitter employees had access to powerful admin tools....</itunes:subtitle>
      <itunes:summary>CISA and NSA warn of a foreign threat to US critical infrastructure. A look at what the Bears have been up to lately. The Blackbaud extortion incident shows its ripple effects. An awful lot of Twitter employees had access to powerful admin tools. China orders a US consulate closed in a tit-for-tat response to the closure of China’s consulate in Houston. Andrea Little Limbago on cyber in a re-globalized world system. Our guest is Dominique Shelton Leipzig from Perkins Coie LLP on the CA Consumer Privacy Act. And DJI drones may be a bit nosey.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/143
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA and NSA warn of a foreign threat to US critical infrastructure. A look at what the Bears have been up to lately. The Blackbaud extortion incident shows its ripple effects. An awful lot of Twitter employees had access to powerful admin tools. China orders a US consulate closed in a tit-for-tat response to the closure of China’s consulate in Houston. Andrea Little Limbago on cyber in a re-globalized world system. Our guest is Dominique Shelton Leipzig from Perkins Coie LLP on the CA Consumer Privacy Act. And DJI drones may be a bit nosey.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/143</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1538</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dbe0e6c1-a9e2-4d32-9264-712536459162]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1735121771.mp3?updated=1608756612" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Twitter: hackers got a few accounts’ DMs. French policy toward Huawei hardens. Crooks against British sport. You and your boss should talk more. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1136/notes</link>
      <description>Twitter updates the news of last week’s incident: the attackers seem to have accessed some direct messages. France’s partial permission for Huawei to operate in that country now looks like a ban with a 2028 deadline. A quiet cryptominer. The cyber threat to British sport. Awais Rashid from the University of Bristol on cyber security and remote working. John Ford from IronNet Cybersecurity with updated 2020 predictions and cyber priorities. And bosses and employees see things differently, cyberwise.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/142
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 23 Jul 2020 18:47:20 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1136</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5c03648c-def8-11ea-911f-8f6c17f8c5d4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Twitter updates the news of last week’s incident: the attackers seem to have accessed some direct messages. France’s partial permission for Huawei to operate in that country now looks like a ban with a 2028 deadline. A quiet cryptominer. The cyber...</itunes:subtitle>
      <itunes:summary>Twitter updates the news of last week’s incident: the attackers seem to have accessed some direct messages. France’s partial permission for Huawei to operate in that country now looks like a ban with a 2028 deadline. A quiet cryptominer. The cyber threat to British sport. Awais Rashid from the University of Bristol on cyber security and remote working. John Ford from IronNet Cybersecurity with updated 2020 predictions and cyber priorities. And bosses and employees see things differently, cyberwise.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/142
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Twitter updates the news of last week’s incident: the attackers seem to have accessed some direct messages. France’s partial permission for Huawei to operate in that country now looks like a ban with a 2028 deadline. A quiet cryptominer. The cyber threat to British sport. Awais Rashid from the University of Bristol on cyber security and remote working. John Ford from IronNet Cybersecurity with updated 2020 predictions and cyber priorities. And bosses and employees see things differently, cyberwise.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/142</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1309</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8cc93fad-0204-4c5b-9336-f511100507ec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4806085847.mp3?updated=1690207787" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Meowing exposed databases. US indicts two Chinese nationals for hacking, and orders China to close its Houston consulate. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1135/notes</link>
      <description>“Meowing” is now a thing: the automated discovery and wiping of exposed and unprotected databases. The US indicts two Chinese nationals on eleven counts of hacking and reports evidence that Chinese intelligence services are now using cybercriminals as contractors. Mike Schaub from CloudCheckr on why COVID-19 has ignited modernization projects for government agencies. Joe Carrigan on counterfeit Cisco routers. The US State Department tells China to close its consulate in Houston.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/141
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 22 Jul 2020 18:08:02 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1135</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5c1a125e-def8-11ea-911f-6f295d5df915/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>“Meowing” is now a thing: the automated discovery and wiping of exposed and unprotected databases. The US indicts two Chinese nationals on eleven counts of hacking and reports evidence that Chinese intelligence services are now using...</itunes:subtitle>
      <itunes:summary>“Meowing” is now a thing: the automated discovery and wiping of exposed and unprotected databases. The US indicts two Chinese nationals on eleven counts of hacking and reports evidence that Chinese intelligence services are now using cybercriminals as contractors. Mike Schaub from CloudCheckr on why COVID-19 has ignited modernization projects for government agencies. Joe Carrigan on counterfeit Cisco routers. The US State Department tells China to close its consulate in Houston.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/141
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>“Meowing” is now a thing: the automated discovery and wiping of exposed and unprotected databases. The US indicts two Chinese nationals on eleven counts of hacking and reports evidence that Chinese intelligence services are now using cybercriminals as contractors. Mike Schaub from CloudCheckr on why COVID-19 has ignited modernization projects for government agencies. Joe Carrigan on counterfeit Cisco routers. The US State Department tells China to close its consulate in Houston.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/141</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1283</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1a708745-7101-4d91-8551-1c9b3b3ea993]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3577877691.mp3?updated=1690207766" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Parliament gets its report on Russian hacking. A look at the cyber criminal economy. Russia says it has no hackers. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1134/notes</link>
      <description>The Intelligence and Security Committee of Parliament has rendered its report on the Russian cyber threat. Trend Micro reports on the workings of the cyber criminal underground economy. Ben Yelin on U.S. Customs and Border Protection collecting license plate data. Our guest is Kevin O'Brien from GreatHorn on the role of business policies in security to keep users safe during high-risk events. And it turns out that Russia has no hackers whatsoever: Moscow’s Finance Minister says so, so you can take that to the bank.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/140
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Jul 2020 18:48:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1134</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5c2fa04c-def8-11ea-911f-6bef78576dc3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The Intelligence and Security Committee of Parliament has rendered its report on the Russian cyber threat. Trend Micro reports on the workings of the cyber criminal underground economy. Ben Yelin on U.S. Customs and Border Protection collecting...</itunes:subtitle>
      <itunes:summary>The Intelligence and Security Committee of Parliament has rendered its report on the Russian cyber threat. Trend Micro reports on the workings of the cyber criminal underground economy. Ben Yelin on U.S. Customs and Border Protection collecting license plate data. Our guest is Kevin O'Brien from GreatHorn on the role of business policies in security to keep users safe during high-risk events. And it turns out that Russia has no hackers whatsoever: Moscow’s Finance Minister says so, so you can take that to the bank.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/140
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Intelligence and Security Committee of Parliament has rendered its report on the Russian cyber threat. Trend Micro reports on the workings of the cyber criminal underground economy. Ben Yelin on U.S. Customs and Border Protection collecting license plate data. Our guest is Kevin O'Brien from GreatHorn on the role of business policies in security to keep users safe during high-risk events. And it turns out that Russia has no hackers whatsoever: Moscow’s Finance Minister says so, so you can take that to the bank.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/140</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1322</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[15088161-e34e-4c12-8e79-9edb96270d88]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9477614101.mp3?updated=1690207745" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Following the spoor of the Twitter hackers, a couple of whom seem to be talking to the press. Marketing databases and intelligence collection. TikTok ban? Hacking biomedical research.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1133/notes</link>
      <description>Notes on last week’s Twitter hack, and on the allure of original gangster and other celebrity usernames. Using marketing databases for intelligence collection. The US Government mulls a ban on TikTok. Johannes Ullrich from SANS on Google Cloud storage becoming a more popular phishing platform. Our own Rick Howard on security operations centers, and a preview of the latest episode of his CSO Perspectives podcast. And more reaction to alleged Russian and Chinese attempts to hack COVID-19 biomedical research.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/139
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 20 Jul 2020 19:47:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1133</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5c4460a4-def8-11ea-911f-63763a1865f7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Notes on last week’s Twitter hack, and on the allure of original gangster and other celebrity usernames. Using marketing databases for intelligence collection. The US Government mulls a ban on TikTok. Johannes Ullrich from SANS on Google Cloud...</itunes:subtitle>
      <itunes:summary>Notes on last week’s Twitter hack, and on the allure of original gangster and other celebrity usernames. Using marketing databases for intelligence collection. The US Government mulls a ban on TikTok. Johannes Ullrich from SANS on Google Cloud storage becoming a more popular phishing platform. Our own Rick Howard on security operations centers, and a preview of the latest episode of his CSO Perspectives podcast. And more reaction to alleged Russian and Chinese attempts to hack COVID-19 biomedical research.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/139
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Notes on last week’s Twitter hack, and on the allure of original gangster and other celebrity usernames. Using marketing databases for intelligence collection. The US Government mulls a ban on TikTok. Johannes Ullrich from SANS on Google Cloud storage becoming a more popular phishing platform. Our own Rick Howard on security operations centers, and a preview of the latest episode of his CSO Perspectives podcast. And more reaction to alleged Russian and Chinese attempts to hack COVID-19 biomedical research.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/139</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1146</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[455c0cd9-6bcf-43b6-879e-abf17991ce5b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3622087505.mp3?updated=1690207726" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Have to be able to communicate to everybody. [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/7/notes</link>
      <description>Computer security writer, podcaster and public speaker Graham Cluley describes learning to program on his own from magazines, creating text adventure games for donations, and his journey from programming to presenting and writing with a bit of tap dancing on the side. Along the way, Graham collaborated with others and learned to communicate so that all could understand, not just techies. Our thanks to Graham for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 19 Jul 2020 05:00:00 -0000</pubDate>
      <itunes:title>Have to be able to communicate to everybody. [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>7</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Computer security writer, podcaster and public speaker Graham Cluley on bullying his way out of programming. </itunes:subtitle>
      <itunes:summary>Computer security writer, podcaster and public speaker Graham Cluley describes learning to program on his own from magazines, creating text adventure games for donations, and his journey from programming to presenting and writing with a bit of tap dancing on the side. Along the way, Graham collaborated with others and learned to communicate so that all could understand, not just techies. Our thanks to Graham for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Computer security writer, podcaster and public speaker Graham Cluley describes learning to program on his own from magazines, creating text adventure games for donations, and his journey from programming to presenting and writing with a bit of tap dancing on the side. Along the way, Graham collaborated with others and learned to communicate so that all could understand, not just techies. Our thanks to Graham for sharing his story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>356</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d0ea34e4-df05-11ea-9e0c-c7e68b1e7285]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3180890334.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Every time we get smarter, the bad guy changes something. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/143/notes</link>
      <description>Researchers at Symantec spotted a Sodinokibi targeted ransomware campaign in which the attackers are also scanning the networks of some victims for credit card or point of sale (PoS) software.
It is not clear if the attackers are targeting this software for encryption or because they want to scrape this information as a way to make even more money from this attack.
Joining us in this week's Research Saturday to discuss the report is Jon DiMaggio of Symantec. 
The research can be found here: 
 Sodinokibi: Ransomware Attackers also Scanning for PoS Software, Leveraging Cobalt Strike
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Jul 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>143</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9e5ae6fe-df14-11ea-9769-8bc23b204628/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Researchers at Symantec spotted a Sodinokibi targeted ransomware campaign in which the attackers are also scanning the networks of some victims for credit card or point of sale (PoS) software. It is not clear if the attackers are targeting this...</itunes:subtitle>
      <itunes:summary>Researchers at Symantec spotted a Sodinokibi targeted ransomware campaign in which the attackers are also scanning the networks of some victims for credit card or point of sale (PoS) software.
It is not clear if the attackers are targeting this software for encryption or because they want to scrape this information as a way to make even more money from this attack.
Joining us in this week's Research Saturday to discuss the report is Jon DiMaggio of Symantec. 
The research can be found here: 
 Sodinokibi: Ransomware Attackers also Scanning for PoS Software, Leveraging Cobalt Strike
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Symantec spotted a Sodinokibi targeted ransomware campaign in which the attackers are also scanning the networks of some victims for credit card or point of sale (PoS) software.</p><p>It is not clear if the attackers are targeting this software for encryption or because they want to scrape this information as a way to make even more money from this attack.</p><p>Joining us in this week's Research Saturday to discuss the report is Jon DiMaggio of Symantec. </p><p>The research can be found here: </p><p><a href="https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/sodinokibi-ransomware-cobalt-strike-pos"> Sodinokibi: Ransomware Attackers also Scanning for PoS Software, Leveraging Cobalt Strike</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1930</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[018af23b-d1cf-4fb6-b1cb-c421b4a8b79c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1650921310.mp3?updated=1685108015" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>High-grade grifter. Twitter’s disinformation potential. Hacking vaccine research and doxing trade talks. What Iran’s hackers are up to. And CISA says, for heaven’s sake, patch already. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1132/notes</link>
      <description>The Twitter hack is looking more like high-grade, low-end crime. It also worries people over the disinformation potential it suggests. People care, they really do, that someone hacked COVID-19 biomedical research (we’ll explain). Australia joins the UK, Canada, and the US in blaming Russia for Cozy Bear’s capers. Russia says it didn’t do nothin’. Rob Lee from Dragos with thoughts on the Ripple 20 vulnerabilities on industrial control systems. Our guest is Sal Aurigemma from University of Tulsa on fake ANTIFA twitter accounts. And CISA’s serious about getting the Feds to apply Tuesday’s Windows patch.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/138
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 17 Jul 2020 19:48:43 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1132</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5c559c8e-def8-11ea-911f-67d63c5e77c4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The Twitter hack is looking more like high-grade, low-end crime. It also worries people over the disinformation potential it suggests. People care, they really do, that someone hacked COVID-19 biomedical research (we’ll explain). Australia joins the...</itunes:subtitle>
      <itunes:summary>The Twitter hack is looking more like high-grade, low-end crime. It also worries people over the disinformation potential it suggests. People care, they really do, that someone hacked COVID-19 biomedical research (we’ll explain). Australia joins the UK, Canada, and the US in blaming Russia for Cozy Bear’s capers. Russia says it didn’t do nothin’. Rob Lee from Dragos with thoughts on the Ripple 20 vulnerabilities on industrial control systems. Our guest is Sal Aurigemma from University of Tulsa on fake ANTIFA twitter accounts. And CISA’s serious about getting the Feds to apply Tuesday’s Windows patch.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/138
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Twitter hack is looking more like high-grade, low-end crime. It also worries people over the disinformation potential it suggests. People care, they really do, that someone hacked COVID-19 biomedical research (we’ll explain). Australia joins the UK, Canada, and the US in blaming Russia for Cozy Bear’s capers. Russia says it didn’t do nothin’. Rob Lee from Dragos with thoughts on the Ripple 20 vulnerabilities on industrial control systems. Our guest is Sal Aurigemma from University of Tulsa on fake ANTIFA twitter accounts. And CISA’s serious about getting the Feds to apply Tuesday’s Windows patch.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/138</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1501</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[64f7db1c-c874-42df-868b-aefbcd9a0304]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4442021509.mp3?updated=1608756623" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Twitter takes down verified accounts after major hack (most service now restored). Russian influence operations. Cozy Bear’s biomedical intelligence collection. Spearphishing in Hong Kong.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1131/notes</link>
      <description>Twitter sustained a major incident in which celebrity accounts were hijacked yesterday. It seems to have been a social engineering caper, but it’s motivation, nominally financial, remains unclear. British authorities call out Russia for an influence campaign mounted during last year’s elections. Cozy Bear is back, and sniffing for COVID-19 biomedical intelligence. Craig Williams from Cisco Talos on Dynamic Data Resolver, a plugin that makes reverse-engineering malware easier. Our guest is Ashlee Benge, formerly from ZeroFox, on emerging and persistent digital attack tactics facing the financial services industry. And Chinese intelligence services are spearphishing Hong Kong Catholics.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/137
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 16 Jul 2020 18:35:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1131</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5c6d2caa-def8-11ea-911f-ff29e3f950fa/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Twitter sustained a major incident in which celebrity accounts were hijacked yesterday. It seems to have been a social engineering caper, but it’s motivation, nominally financial, remains unclear. British authorities call out Russia for an influence...</itunes:subtitle>
      <itunes:summary>Twitter sustained a major incident in which celebrity accounts were hijacked yesterday. It seems to have been a social engineering caper, but it’s motivation, nominally financial, remains unclear. British authorities call out Russia for an influence campaign mounted during last year’s elections. Cozy Bear is back, and sniffing for COVID-19 biomedical intelligence. Craig Williams from Cisco Talos on Dynamic Data Resolver, a plugin that makes reverse-engineering malware easier. Our guest is Ashlee Benge, formerly from ZeroFox, on emerging and persistent digital attack tactics facing the financial services industry. And Chinese intelligence services are spearphishing Hong Kong Catholics.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/137
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Twitter sustained a major incident in which celebrity accounts were hijacked yesterday. It seems to have been a social engineering caper, but it’s motivation, nominally financial, remains unclear. British authorities call out Russia for an influence campaign mounted during last year’s elections. Cozy Bear is back, and sniffing for COVID-19 biomedical intelligence. Craig Williams from Cisco Talos on Dynamic Data Resolver, a plugin that makes reverse-engineering malware easier. Our guest is Ashlee Benge, formerly from ZeroFox, on emerging and persistent digital attack tactics facing the financial services industry. And Chinese intelligence services are spearphishing Hong Kong Catholics.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/137</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1385</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[37adcd92-1a13-4771-b794-a5f58a8074f9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3300115414.mp3?updated=1690207490" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A 2018 Presidential finding authorized the CIA to conduct a broad range of offensive cyber ops. Data breaches and ransomware incidents. Sloppy VPNs. SEC warns, and China woofs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1130/notes</link>
      <description>A 2018 Presidential finding authorized extensive CIA cyber operations against Russia, China, Iran, and North Korea. Wattpad may have been breached. The SEC asks its registrants to take steps to protect themselves against ransomware. Free VPNs’ databases found exposed. Joe Carrigan on privacy vs. security on Android devices. Our guest is Chris Deluzio from Pitt Cyber on election security. And Beijing woofs in the direction of London over the UK’s Huawei ban.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/136
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 15 Jul 2020 18:46:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1130</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5c812ea8-def8-11ea-911f-e78557abd166/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A 2018 Presidential finding authorized extensive CIA cyber operations against Russia, China, Iran, and North Korea. Wattpad may have been breached. The SEC asks its registrants to take steps to protect themselves against ransomware. Free VPNs’...</itunes:subtitle>
      <itunes:summary>A 2018 Presidential finding authorized extensive CIA cyber operations against Russia, China, Iran, and North Korea. Wattpad may have been breached. The SEC asks its registrants to take steps to protect themselves against ransomware. Free VPNs’ databases found exposed. Joe Carrigan on privacy vs. security on Android devices. Our guest is Chris Deluzio from Pitt Cyber on election security. And Beijing woofs in the direction of London over the UK’s Huawei ban.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/136
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A 2018 Presidential finding authorized extensive CIA cyber operations against Russia, China, Iran, and North Korea. Wattpad may have been breached. The SEC asks its registrants to take steps to protect themselves against ransomware. Free VPNs’ databases found exposed. Joe Carrigan on privacy vs. security on Android devices. Our guest is Chris Deluzio from Pitt Cyber on election security. And Beijing woofs in the direction of London over the UK’s Huawei ban.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/136</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1286</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7454e3d-c0b3-4ce4-a798-53a3a384bb98]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8125840601.mp3?updated=1690207474" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Huawei to be closed out of UK’s 5G infrastructure. Spyware, ransomware, and botnets. The odd case of Data Viper. SAP has a major patch out. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1129/notes</link>
      <description>The British Government decides to ban Huawei. More on the malware associated with Golden Tax software package. The Molerats appear to be behind some spyware misrepresenting itself as a secure chat app. The Porphiex botnet is back distributing a new ransomware strain. The odd case of the Data Viper breach. Ben Yelin tracks a ruling from the DC circuit court on the release of electronic surveillance records. Our guest is Ann Johnson from Microsoft discussing her keynote at RSA APJ, The Rise of Digital Empathy. And SAP has a patch out--if you’re a user, CISA advises you to take this one seriously.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/135
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Jul 2020 18:54:25 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1129</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5c9ac516-def8-11ea-911f-bbd1bebfbf25/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The British Government decides to ban Huawei. More on the malware associated with Golden Tax software package. The Molerats appear to be behind some spyware misrepresenting itself as a secure chat app. The Porphiex botnet is back distributing a new...</itunes:subtitle>
      <itunes:summary>The British Government decides to ban Huawei. More on the malware associated with Golden Tax software package. The Molerats appear to be behind some spyware misrepresenting itself as a secure chat app. The Porphiex botnet is back distributing a new ransomware strain. The odd case of the Data Viper breach. Ben Yelin tracks a ruling from the DC circuit court on the release of electronic surveillance records. Our guest is Ann Johnson from Microsoft discussing her keynote at RSA APJ, The Rise of Digital Empathy. And SAP has a patch out--if you’re a user, CISA advises you to take this one seriously.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/135
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The British Government decides to ban Huawei. More on the malware associated with Golden Tax software package. The Molerats appear to be behind some spyware misrepresenting itself as a secure chat app. The Porphiex botnet is back distributing a new ransomware strain. The odd case of the Data Viper breach. Ben Yelin tracks a ruling from the DC circuit court on the release of electronic surveillance records. Our guest is Ann Johnson from Microsoft discussing her keynote at RSA APJ, The Rise of Digital Empathy. And SAP has a patch out--if you’re a user, CISA advises you to take this one seriously.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/135</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1315</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[648ba86b-090d-4bfe-8523-feef432b1fe8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1030032912.mp3?updated=1690207462" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Presidential authorization for US Cyber Command action. DPRK hacking and internal regime dynamics. TrickBot’s developers. Cybercriminals in the dock. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1128/notes</link>
      <description>President Trump says he authorized US Cyber Command’s retaliation against Russia’s Internet Research Agency for midterm election meddling. North Korean financially motivated hacking as a sign of internal power dynamics. TrickBot accidentally deploys a new module. TikTok, privacy, and security. LinkedIn hacker convicted. Justin Harvey from Accenture on what should and shouldn’t go in emails. Our guest is Matt Davey from 1password on the under-celebrated role of IT in the work from home transition. And advice to alleged criminals on the lam: give ‘em a low silhouette.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/134
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 13 Jul 2020 18:19:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1128</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5cb6395e-def8-11ea-911f-cf1468409592/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>President Trump says he authorized US Cyber Command’s retaliation against Russia’s Internet Research Agency for midterm election meddling. North Korean financially motivated hacking as a sign of internal power dynamics. TrickBot accidentally...</itunes:subtitle>
      <itunes:summary>President Trump says he authorized US Cyber Command’s retaliation against Russia’s Internet Research Agency for midterm election meddling. North Korean financially motivated hacking as a sign of internal power dynamics. TrickBot accidentally deploys a new module. TikTok, privacy, and security. LinkedIn hacker convicted. Justin Harvey from Accenture on what should and shouldn’t go in emails. Our guest is Matt Davey from 1password on the under-celebrated role of IT in the work from home transition. And advice to alleged criminals on the lam: give ‘em a low silhouette.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/134
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>President Trump says he authorized US Cyber Command’s retaliation against Russia’s Internet Research Agency for midterm election meddling. North Korean financially motivated hacking as a sign of internal power dynamics. TrickBot accidentally deploys a new module. TikTok, privacy, and security. LinkedIn hacker convicted. Justin Harvey from Accenture on what should and shouldn’t go in emails. Our guest is Matt Davey from 1password on the under-celebrated role of IT in the work from home transition. And advice to alleged criminals on the lam: give ‘em a low silhouette.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/134</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1304</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[250cf6ab-ac1a-4eb9-9624-05dccc9e2581]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2570327406.mp3?updated=1690207448" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Turn challenges into opportunities. [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/6/notes</link>
      <description>Cybersecurity and disinformation researcher Bilyana Lilly shares her career path from studying where she was always a foreigner to an expert on the Russian perspective. While studying international law in Kosovo, Bilyana realized there are no winners in war. Through her work, she hopes to bring a greater understanding of Russia's strategic thinking. Our thanks to Bilyana for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 12 Jul 2020 05:00:00 -0000</pubDate>
      <itunes:title>Turn challenges into opportunities. [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>6</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Cybersecurity and disinformation researcher Bilyana Lilly on her career path to affecting greater understanding.</itunes:subtitle>
      <itunes:summary>Cybersecurity and disinformation researcher Bilyana Lilly shares her career path from studying where she was always a foreigner to an expert on the Russian perspective. While studying international law in Kosovo, Bilyana realized there are no winners in war. Through her work, she hopes to bring a greater understanding of Russia's strategic thinking. Our thanks to Bilyana for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cybersecurity and disinformation researcher Bilyana Lilly shares her career path from studying where she was always a foreigner to an expert on the Russian perspective. While studying international law in Kosovo, Bilyana realized there are no winners in war. Through her work, she hopes to bring a greater understanding of Russia's strategic thinking. Our thanks to Bilyana for sharing her story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>340</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cfc0c024-df05-11ea-bb0b-cb4250d0dc14]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6131785796.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Are you running what you think you're running? [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/142/notes</link>
      <description>Built into virtually every hardware device, firmware is lower-level software that is programmed to ensure that hardware functions properly.
As software security has been significantly hardened over the past two decades, hackers have responded by moving down the stack to focus on firmware entry points. Firmware offers a target that basic security controls can’t access or scan as easily as software, while allowing them to persist and continue leveraging many of their tried and true attack techniques.
Joining us on this week's Research Saturday is Maggie Jauregui, security researcher at Dell, to discuss this issue. 
The research can be found here: 
Three firmware blind spots impacting security
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Jul 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>142</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9cdfaa26-df14-11ea-a446-9f1a89896141/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Built into virtually every hardware device, firmware is lower-level software that is programmed to ensure that hardware functions properly. As software security has been significantly hardened over the past two decades, hackers have responded by...</itunes:subtitle>
      <itunes:summary>Built into virtually every hardware device, firmware is lower-level software that is programmed to ensure that hardware functions properly.
As software security has been significantly hardened over the past two decades, hackers have responded by moving down the stack to focus on firmware entry points. Firmware offers a target that basic security controls can’t access or scan as easily as software, while allowing them to persist and continue leveraging many of their tried and true attack techniques.
Joining us on this week's Research Saturday is Maggie Jauregui, security researcher at Dell, to discuss this issue. 
The research can be found here: 
Three firmware blind spots impacting security
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Built into virtually every hardware device, firmware is lower-level software that is programmed to ensure that hardware functions properly.</p><p>As software security has been significantly hardened over the past two decades, hackers have responded by moving down the stack to focus on firmware entry points. Firmware offers a target that basic security controls can’t access or scan as easily as software, while allowing them to persist and continue leveraging many of their tried and true attack techniques.</p><p>Joining us on this week's Research Saturday is Maggie Jauregui, security researcher at Dell, to discuss this issue. </p><p>The research can be found here: </p><p><a href="https://www.helpnetsecurity.com/2020/04/27/firmware-blind-spots/">Three firmware blind spots impacting security</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>969</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b9ae047f-5e69-4a4e-b344-2545ad5cf5e0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2526554314.mp3?updated=1685107999" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The importance of staying up-to-date. Conti ransomware gains as Ryuk fades. Germany warns of Chinese companies’ data collection. Huawei’s fortunes in Canada and UK. Hushpuppi update. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1127/notes</link>
      <description>Unpatched and beyond-end-of-life systems are (again) at risk. Conti ransomware appears to be steadily displacing its ancestor Ryuk in criminal markets. Are privacy laws as consumer friendly as they’re often taken to be? There may be some grounds for doubt. German security services warn of the espionage potential of Chinese companies’ data collection. Huawei skepticism grows in Germany, Canada, and the UK. Zully Ramzan from RSA on zero trust. Our guest is Conan Ward from QOMPLX on the unfortunate reality of cyber insurance in light of the 3rd anniversary of NotPetya. And Ray Hushpuppi says the Feds didn’t extradite him; they kidnapped him.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/133
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 10 Jul 2020 19:54:33 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1127</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5ccff97a-def8-11ea-911f-dff47841a17f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Unpatched and beyond-end-of-life systems are (again) at risk. Conti ransomware appears to be steadily displacing its ancestor Ryuk in criminal markets. Are privacy laws as consumer friendly as they’re often taken to be? There may be some grounds for...</itunes:subtitle>
      <itunes:summary>Unpatched and beyond-end-of-life systems are (again) at risk. Conti ransomware appears to be steadily displacing its ancestor Ryuk in criminal markets. Are privacy laws as consumer friendly as they’re often taken to be? There may be some grounds for doubt. German security services warn of the espionage potential of Chinese companies’ data collection. Huawei skepticism grows in Germany, Canada, and the UK. Zully Ramzan from RSA on zero trust. Our guest is Conan Ward from QOMPLX on the unfortunate reality of cyber insurance in light of the 3rd anniversary of NotPetya. And Ray Hushpuppi says the Feds didn’t extradite him; they kidnapped him.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/133
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Unpatched and beyond-end-of-life systems are (again) at risk. Conti ransomware appears to be steadily displacing its ancestor Ryuk in criminal markets. Are privacy laws as consumer friendly as they’re often taken to be? There may be some grounds for doubt. German security services warn of the espionage potential of Chinese companies’ data collection. Huawei skepticism grows in Germany, Canada, and the UK. Zully Ramzan from RSA on zero trust. Our guest is Conan Ward from QOMPLX on the unfortunate reality of cyber insurance in light of the 3rd anniversary of NotPetya. And Ray Hushpuppi says the Feds didn’t extradite him; they kidnapped him.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/133</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1533</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a0f17c68-a9d9-42bc-8fcd-ab9cd18c1d55]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9209486008.mp3?updated=1608756609" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Coordinated inauthenticity with a domestic bent. Preinstalled malware in discount phones. Evilnum and the Joker continue to evolve. Incidents at FreddieMac and RMC. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1126/notes</link>
      <description>Facebook takes down more coordinated inauthenticity. Preinstalled malware is found in discount phones available under the FCC’s Lifeline program. The Evilnum APT continues its attacks against fintech platforms and services. Joker Android malware adapts and overcomes its way back into the Play store. FreddieMac discloses a third-party databreach. Johannes Ullrich from SANS on defending against Evil Maids with glitter. Our guest is Rohit Ghai from RSA with a preview of his keynote, Reality Check: Cybersecurity’s Story. And the Royal Military College of Canada’s hack attack remains under investigation.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/132
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 09 Jul 2020 18:29:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1126</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5ce62d8a-def8-11ea-911f-97398178cf40/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Facebook takes down more coordinated inauthenticity. Preinstalled malware is found in discount phones available under the FCC’s Lifeline program. The Evilnum APT continues its attacks against fintech platforms and services. Joker Android malware...</itunes:subtitle>
      <itunes:summary>Facebook takes down more coordinated inauthenticity. Preinstalled malware is found in discount phones available under the FCC’s Lifeline program. The Evilnum APT continues its attacks against fintech platforms and services. Joker Android malware adapts and overcomes its way back into the Play store. FreddieMac discloses a third-party databreach. Johannes Ullrich from SANS on defending against Evil Maids with glitter. Our guest is Rohit Ghai from RSA with a preview of his keynote, Reality Check: Cybersecurity’s Story. And the Royal Military College of Canada’s hack attack remains under investigation.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/132
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Facebook takes down more coordinated inauthenticity. Preinstalled malware is found in discount phones available under the FCC’s Lifeline program. The Evilnum APT continues its attacks against fintech platforms and services. Joker Android malware adapts and overcomes its way back into the Play store. FreddieMac discloses a third-party databreach. Johannes Ullrich from SANS on defending against Evil Maids with glitter. Our guest is Rohit Ghai from RSA with a preview of his keynote, Reality Check: Cybersecurity’s Story. And the Royal Military College of Canada’s hack attack remains under investigation.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/132</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1299</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[43540d43-b428-469a-9033-7c3925aca1ed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3058447725.mp3?updated=1690206878" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Traditional sabotage at Natanz. CISA’s ICS strategy. DDoSecrets’ server seized by German police at the request of the US. COVID-19-themed phishing infrastructure taken down. Cyberespionage. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1125/notes</link>
      <description>The Natanz blast looks like traditional sabotage. CISA releases its strategy for securing industrial control systems. Authorities in Germany seize DDoSecrets’ server pursuant to a US request. Microsoft takes down COVID-19-themed BEC and phishing infrastructure. FBI Director denounces China’s cyberespionage. Joe Carrigan helps review personal privacy measures for ios and Android. Rick Howard speaks with Steve Moore from Exabeam with insights from a year spent interviewing CISOs. And some DDoS and ransomware attempts.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/131
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 08 Jul 2020 18:48:33 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1125</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5cff3352-def8-11ea-911f-3f4a21123bbb/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The Natanz blast looks like traditional sabotage. CISA releases its strategy for securing industrial control systems. Authorities in Germany seize DDoSecrets’ server pursuant to a US request. Microsoft takes down COVID-19-themed BEC and phishing...</itunes:subtitle>
      <itunes:summary>The Natanz blast looks like traditional sabotage. CISA releases its strategy for securing industrial control systems. Authorities in Germany seize DDoSecrets’ server pursuant to a US request. Microsoft takes down COVID-19-themed BEC and phishing infrastructure. FBI Director denounces China’s cyberespionage. Joe Carrigan helps review personal privacy measures for ios and Android. Rick Howard speaks with Steve Moore from Exabeam with insights from a year spent interviewing CISOs. And some DDoS and ransomware attempts.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/131
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Natanz blast looks like traditional sabotage. CISA releases its strategy for securing industrial control systems. Authorities in Germany seize DDoSecrets’ server pursuant to a US request. Microsoft takes down COVID-19-themed BEC and phishing infrastructure. FBI Director denounces China’s cyberespionage. Joe Carrigan helps review personal privacy measures for ios and Android. Rick Howard speaks with Steve Moore from Exabeam with insights from a year spent interviewing CISOs. And some DDoS and ransomware attempts.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/131</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1328</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6a30acd5-6704-4e0f-8a10-e33a57ac4cac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9493920008.mp3?updated=1690206865" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sabotage, not cyber? Cosmic Lynx pounces on some big companies with BEC. Purple Fox upgrade. Coordinated inauthenticity in the journalistic supply chain.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1124/notes</link>
      <description>Explosions at Iranian nuclear sites remain unexplained, but look increasingly like conventional sabotage as opposed to cyberattacks. The Cosmic Lynx gang sets a high bar for business email compromise. The Purple Fox exploit kit gets an upgrade. Ben Yelin describes a 5th amendment compelled decryption case that may be headed to the Supreme Court. Our guest is Hugh Thompson, Chairman of the RSA Conference Program, on the human element of cyber security and lessons learned shifting a conference online. And a network of coordinated inauthenticity and fictitious personae is found pushing an Emirati official line.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/130
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Jul 2020 18:56:51 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1124</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5d142c08-def8-11ea-911f-775bf92d1a9b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Explosions at Iranian nuclear sites remain unexplained, but look increasingly like conventional sabotage as opposed to cyberattacks. The Cosmic Lynx gang sets a high bar for business email compromise. The Purple Fox exploit kit gets an upgrade. Ben...</itunes:subtitle>
      <itunes:summary>Explosions at Iranian nuclear sites remain unexplained, but look increasingly like conventional sabotage as opposed to cyberattacks. The Cosmic Lynx gang sets a high bar for business email compromise. The Purple Fox exploit kit gets an upgrade. Ben Yelin describes a 5th amendment compelled decryption case that may be headed to the Supreme Court. Our guest is Hugh Thompson, Chairman of the RSA Conference Program, on the human element of cyber security and lessons learned shifting a conference online. And a network of coordinated inauthenticity and fictitious personae is found pushing an Emirati official line.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/130
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Explosions at Iranian nuclear sites remain unexplained, but look increasingly like conventional sabotage as opposed to cyberattacks. The Cosmic Lynx gang sets a high bar for business email compromise. The Purple Fox exploit kit gets an upgrade. Ben Yelin describes a 5th amendment compelled decryption case that may be headed to the Supreme Court. Our guest is Hugh Thompson, Chairman of the RSA Conference Program, on the human element of cyber security and lessons learned shifting a conference online. And a network of coordinated inauthenticity and fictitious personae is found pushing an Emirati official line.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/130</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1341</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c2c314a9-6cd3-426e-ae57-f39bf388156d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1735348314.mp3?updated=1690206854" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Damage at Natanz, maybe cyber-induced but maybe not. Official Huawei skepticism spreads. Big European dragnet. Hushpuppi in custody.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1123/notes</link>
      <description>An Iranian nuclear installation may have been hacked. Or maybe not, but in any case it was damaged. Huawei gets more skeptical looks. European police round up hundreds of online contraband dealers. Thomas Etheridge from CrowdStrike on the increased need for speed, scale, and remote investigative and recovery services. Our guest is Tobias Whitney from Fortress Information Security on the Asset to Vendor Network (A2V). And an accused Nigerian money-launderer (and an admitted influencer) is now in US custody, facing Federal charges.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/129
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 06 Jul 2020 20:27:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1123</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5d28abec-def8-11ea-911f-3fb9bcf4d36c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>An Iranian nuclear installation may have been hacked. Or maybe not, but in any case it was damaged. Huawei gets more skeptical looks. European police round up hundreds of online contraband dealers. Thomas Etheridge from CrowdStrike on the increased...</itunes:subtitle>
      <itunes:summary>An Iranian nuclear installation may have been hacked. Or maybe not, but in any case it was damaged. Huawei gets more skeptical looks. European police round up hundreds of online contraband dealers. Thomas Etheridge from CrowdStrike on the increased need for speed, scale, and remote investigative and recovery services. Our guest is Tobias Whitney from Fortress Information Security on the Asset to Vendor Network (A2V). And an accused Nigerian money-launderer (and an admitted influencer) is now in US custody, facing Federal charges.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/129
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An Iranian nuclear installation may have been hacked. Or maybe not, but in any case it was damaged. Huawei gets more skeptical looks. European police round up hundreds of online contraband dealers. Thomas Etheridge from CrowdStrike on the increased need for speed, scale, and remote investigative and recovery services. Our guest is Tobias Whitney from Fortress Information Security on the Asset to Vendor Network (A2V). And an accused Nigerian money-launderer (and an admitted influencer) is now in US custody, facing Federal charges.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/129</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1292</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f16427b9-fffc-45ee-bb41-74118e367031]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5886853270.mp3?updated=1690206840" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Solving hard problems and pursuing your passions. [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/5/notes</link>
      <description>CEO, Matt Devost, describes many firsts in his career including hacking into systems on an aircraft carrier at sea. He shares how he enjoys solving hard problems and the red teamer perspective, and how he was able to translate those into a career. For those interested in cybersecurity, Matt advises opportunities for self-directed learning including heading down to your basement and building your own lab. Our thanks to Matt for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 05 Jul 2020 05:00:00 -0000</pubDate>
      <itunes:title>Solving hard problems and pursuing your passions. [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>CEO Matt Devost shares how his two loves, computer science and national security, converged.</itunes:subtitle>
      <itunes:summary>CEO, Matt Devost, describes many firsts in his career including hacking into systems on an aircraft carrier at sea. He shares how he enjoys solving hard problems and the red teamer perspective, and how he was able to translate those into a career. For those interested in cybersecurity, Matt advises opportunities for self-directed learning including heading down to your basement and building your own lab. Our thanks to Matt for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CEO, Matt Devost, describes many firsts in his career including hacking into systems on an aircraft carrier at sea. He shares how he enjoys solving hard problems and the red teamer perspective, and how he was able to translate those into a career. For those interested in cybersecurity, Matt advises opportunities for self-directed learning including heading down to your basement and building your own lab. Our thanks to Matt for sharing his story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>363</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cd3f318c-df05-11ea-8799-a38623e25a50]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6713235640.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Evil Corp versus newspapers. Trolling for unprotected MongoDB. Taurus in the criminal souks. Law and security. Loot boxes as gambling items. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1122/notes</link>
      <description>Evil Corp seems to have been shuffling through some newspaper sites. Don’t take the gangs’ communiqués at face value, but some appear to be trolling for unprotected MongoDB databases. A look at Taurus, an information-stealer being sold in criminal-to-criminal markets. Chinese law and online security. The EARN-IT Act is being debated. Justin Harvey on “Smishing”. Our guest is Jeff Styles from FireMon on COVID-19 increasing misconfiguration risks. And there’s trouble in Tilted Towers.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/128
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 02 Jul 2020 18:49:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1122</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5d401156-def8-11ea-911f-5f36f8adb82f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Evil Corp seems to have been shuffling through some newspaper sites. Don’t take the gangs’ communiqués at face value, but some appear to be trolling for unprotected MongoDB databases. A look at Taurus, an information-stealer being sold in...</itunes:subtitle>
      <itunes:summary>Evil Corp seems to have been shuffling through some newspaper sites. Don’t take the gangs’ communiqués at face value, but some appear to be trolling for unprotected MongoDB databases. A look at Taurus, an information-stealer being sold in criminal-to-criminal markets. Chinese law and online security. The EARN-IT Act is being debated. Justin Harvey on “Smishing”. Our guest is Jeff Styles from FireMon on COVID-19 increasing misconfiguration risks. And there’s trouble in Tilted Towers.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/128
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Evil Corp seems to have been shuffling through some newspaper sites. Don’t take the gangs’ communiqués at face value, but some appear to be trolling for unprotected MongoDB databases. A look at Taurus, an information-stealer being sold in criminal-to-criminal markets. Chinese law and online security. The EARN-IT Act is being debated. Justin Harvey on “Smishing”. Our guest is Jeff Styles from FireMon on COVID-19 increasing misconfiguration risks. And there’s trouble in Tilted Towers.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/128</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1300</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[22cf41f8-955a-425e-9f0e-17b0b799c08c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9997980733.mp3?updated=1690206293" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>EvilQuest ransomware identified. Out-of-band patches. The scope of Chinese surveillance of Uighurs. Hong Kong and the National Security Law. FCC finds against Huawei, ZTE. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1121/notes</link>
      <description>EvilQuest ransomware found in pirated versions of Little Snitch app. Out-of-band patches from Microsoft and Oracle. Extensive Chinese surveillance of Uighurs described. Hong Kong and the world react to China’s new National Security Law. The US FCC finds both Huawei and ZTE are threats to national security. Joe Carrigan on password stealers that target gaming. Our guest is Kiersten Todt from the Cyber Readiness Institute on how COVID-19 has changed small business security and what to expect going forward. And Britain rethinks its position on Huawei and 5G infrastructure.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/127
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 01 Jul 2020 18:49:24 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1121</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5d57e2b8-def8-11ea-911f-372097bd35ec/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>EvilQuest ransomware found in pirated versions of Little Snitch app. Out-of-band patches from Microsoft and Oracle. Extensive Chinese surveillance of Uighurs described. Hong Kong and the world react to China’s new National Security Law. The US FCC...</itunes:subtitle>
      <itunes:summary>EvilQuest ransomware found in pirated versions of Little Snitch app. Out-of-band patches from Microsoft and Oracle. Extensive Chinese surveillance of Uighurs described. Hong Kong and the world react to China’s new National Security Law. The US FCC finds both Huawei and ZTE are threats to national security. Joe Carrigan on password stealers that target gaming. Our guest is Kiersten Todt from the Cyber Readiness Institute on how COVID-19 has changed small business security and what to expect going forward. And Britain rethinks its position on Huawei and 5G infrastructure.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/127
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>EvilQuest ransomware found in pirated versions of Little Snitch app. Out-of-band patches from Microsoft and Oracle. Extensive Chinese surveillance of Uighurs described. Hong Kong and the world react to China’s new National Security Law. The US FCC finds both Huawei and ZTE are threats to national security. Joe Carrigan on password stealers that target gaming. Our guest is Kiersten Todt from the Cyber Readiness Institute on how COVID-19 has changed small business security and what to expect going forward. And Britain rethinks its position on Huawei and 5G infrastructure.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/127</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1291</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2568f881-9cde-47ae-88fc-912421633f11]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2064948057.mp3?updated=1690206278" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Critical bug disclosed in Palo Alto products (a fix is available). StronPity (a.k.a. Promethium) is back. A big Bitcoin scam. Lots of PII newly offered in the dark web. Australia and India look to their defenses. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1120/notes</link>
      <description>NSA and CISA agree: take Palo Alto’s advisory about its PAN-OS operating system seriously. StrongPity is back and active against targets in Turkey and Syria. A big Bitcoin scam is using spoofed news outlets and bogus celebrity endorsements to lure victims. A large trove of PII has appeared in the dark web. Ben Yelin from UMD CHHS on whether or not the EARN IT Act violates the constitution, our guest is Brad Stone with Booz Allen Hamilton on how technology is changing the battlefield and why cyber is becoming so important in the DoD space. Finally, both Australia and India look to shore up their defenses against cyber threats from China.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/126
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Jun 2020 19:05:04 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1120</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5d6c5072-def8-11ea-911f-23f828e3486f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>NSA and CISA agree: take Palo Alto’s advisory about its PAN-OS operating system seriously. StrongPity is back and active against targets in Turkey and Syria. A big Bitcoin scam is using spoofed news outlets and bogus celebrity endorsements to lure...</itunes:subtitle>
      <itunes:summary>NSA and CISA agree: take Palo Alto’s advisory about its PAN-OS operating system seriously. StrongPity is back and active against targets in Turkey and Syria. A big Bitcoin scam is using spoofed news outlets and bogus celebrity endorsements to lure victims. A large trove of PII has appeared in the dark web. Ben Yelin from UMD CHHS on whether or not the EARN IT Act violates the constitution, our guest is Brad Stone with Booz Allen Hamilton on how technology is changing the battlefield and why cyber is becoming so important in the DoD space. Finally, both Australia and India look to shore up their defenses against cyber threats from China.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/126
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>NSA and CISA agree: take Palo Alto’s advisory about its PAN-OS operating system seriously. StrongPity is back and active against targets in Turkey and Syria. A big Bitcoin scam is using spoofed news outlets and bogus celebrity endorsements to lure victims. A large trove of PII has appeared in the dark web. Ben Yelin from UMD CHHS on whether or not the EARN IT Act violates the constitution, our guest is Brad Stone with Booz Allen Hamilton on how technology is changing the battlefield and why cyber is becoming so important in the DoD space. Finally, both Australia and India look to shore up their defenses against cyber threats from China.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/126</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1275</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11edded2-5b93-4946-a228-d94b72347019]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4477943984.mp3?updated=1690206267" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware pays, in California. Kashmir utility recovers from cyberattack. Update on hacktivism vs. Ethiopia. Another misconfigured AWS account. Guilt and sentencing in high-profile cybercrime.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1119/notes</link>
      <description>The University of California San Francisco pays Netwalker extortionists nearly a million and a half to recover its data. A Kashmir utility restores business systems after last week’s cyberattack. The website defacements in Ethiopia continue to look more like hacktivism than state-sponsored activity. Our own Rick Howard talks about wrapping up his first season of CSO Perspectives. Our guest is Sanjay Gupta from Mitek discussing how online marketplaces can balance security with biometrics. Data are exposed at an e-learning platform. Three prominent cyber-hoods go down in US Federal courts. And Lion says the beer is flowing, post ransomware.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/125
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 29 Jun 2020 20:03:44 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1119</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5d81b606-def8-11ea-911f-57c86ad6422d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The University of California San Francisco pays Netwalker extortionists nearly a million and a half to recover its data. A Kashmir utility restores business systems after last week’s cyberattack. The website defacements in Ethiopia continue to look...</itunes:subtitle>
      <itunes:summary>The University of California San Francisco pays Netwalker extortionists nearly a million and a half to recover its data. A Kashmir utility restores business systems after last week’s cyberattack. The website defacements in Ethiopia continue to look more like hacktivism than state-sponsored activity. Our own Rick Howard talks about wrapping up his first season of CSO Perspectives. Our guest is Sanjay Gupta from Mitek discussing how online marketplaces can balance security with biometrics. Data are exposed at an e-learning platform. Three prominent cyber-hoods go down in US Federal courts. And Lion says the beer is flowing, post ransomware.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/125
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The University of California San Francisco pays Netwalker extortionists nearly a million and a half to recover its data. A Kashmir utility restores business systems after last week’s cyberattack. The website defacements in Ethiopia continue to look more like hacktivism than state-sponsored activity. Our own Rick Howard talks about wrapping up his first season of CSO Perspectives. Our guest is Sanjay Gupta from Mitek discussing how online marketplaces can balance security with biometrics. Data are exposed at an e-learning platform. Three prominent cyber-hoods go down in US Federal courts. And Lion says the beer is flowing, post ransomware.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/125</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1269</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c782a2f6-5da9-4a1b-a998-59ba04905109]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1058670891.mp3?updated=1690205877" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Get your foot in the door and prove your worth. [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/4/notes</link>
      <description>Vice President of Marketing, Kathleen Booth, shares her career path from political science and international development to marketing for a cybersecurity company. Early dreams of acting morphed into goals of making the world a better place. Chief marketer and podcaster Kathleen is doing just that. She shares how proving your worth can lead to success. Listen for Kathleen's advice on getting your foot in the door. Our thanks to Kathleen for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 28 Jun 2020 05:00:00 -0000</pubDate>
      <itunes:title>Get your foot in the door and prove your worth. [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Vice President of Marketing, Kathleen Booth, takes us from dreams of acting to cybersecurity marketing.</itunes:subtitle>
      <itunes:summary>Vice President of Marketing, Kathleen Booth, shares her career path from political science and international development to marketing for a cybersecurity company. Early dreams of acting morphed into goals of making the world a better place. Chief marketer and podcaster Kathleen is doing just that. She shares how proving your worth can lead to success. Listen for Kathleen's advice on getting your foot in the door. Our thanks to Kathleen for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Vice President of Marketing, Kathleen Booth, shares her career path from political science and international development to marketing for a cybersecurity company. Early dreams of acting morphed into goals of making the world a better place. Chief marketer and podcaster Kathleen is doing just that. She shares how proving your worth can lead to success. Listen for Kathleen's advice on getting your foot in the door. Our thanks to Kathleen for sharing her story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>321</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[be6ece6a-df05-11ea-83d6-43134b62b647]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1932523726.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Enter the RAT. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/141/notes</link>
      <description>A new report examines how five related APT groups operating in the interest of the Chinese government have systematically targeted Linux servers, Windows systems and Android mobile devices while remaining undetected for nearly a decade.
The report comes on the heels of the U.S. Department of Justice announcing several high-profile indictments from over 1,000 open FBI investigations into economic espionage as part of the DOJ’s China Initiative.
Joining us in this week's Research Saturday to discuss the report is Eric Cornelius of Blackberry. 
The research can be found here: 
Decade of the RATs: Novel APT Attacks Targeting Linux, Windows and Android
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Jun 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>141</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9b171bde-df14-11ea-a446-77102ebe1091/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A new report examines how five related APT groups operating in the interest of the Chinese government have systematically targeted Linux servers, Windows systems and Android mobile devices while remaining undetected for nearly a decade. The report...</itunes:subtitle>
      <itunes:summary>A new report examines how five related APT groups operating in the interest of the Chinese government have systematically targeted Linux servers, Windows systems and Android mobile devices while remaining undetected for nearly a decade.
The report comes on the heels of the U.S. Department of Justice announcing several high-profile indictments from over 1,000 open FBI investigations into economic espionage as part of the DOJ’s China Initiative.
Joining us in this week's Research Saturday to discuss the report is Eric Cornelius of Blackberry. 
The research can be found here: 
Decade of the RATs: Novel APT Attacks Targeting Linux, Windows and Android
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A new report examines how five related APT groups operating in the interest of the Chinese government have systematically targeted Linux servers, Windows systems and Android mobile devices while remaining undetected for nearly a decade.</p><p>The report comes on the heels of the U.S. Department of Justice announcing several high-profile indictments from over 1,000 open FBI investigations into economic espionage as part of the DOJ’s <em>China Initiative.</em></p><p>Joining us in this week's Research Saturday to discuss the report is Eric Cornelius of Blackberry. </p><p>The research can be found here: </p><p><a href="https://blogs.blackberry.com/en/2020/04/decade-of-the-rats">Decade of the RATs: Novel APT Attacks Targeting Linux, Windows and Android</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1415</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5e068bf8-aff2-422a-8a7b-456ab900f189]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8703256205.mp3?updated=1685107994" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patch Exchange already, will ya? GoldenSpy lurks in tax software Chinese banks prefer their foreign clients to use. Magecart gets cleverer. Another unsecured AWS S3 bucket, and this one’s not funny.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1118/notes</link>
      <description>Microsoft urges Exchange server patching. Sure it does your taxes, but it’s got another agenda, too: the GoldenSpy backdoor may be in your tax software if you do business in China. Magecart ups its game. DDoSecrets says they’re not going to roll over for Twitter’s “Nixonian” schtick. Camille Stewart from Google and Lauren Zabierek from Harvard’s Belfer Center on the #Sharethemicincyber event and why systemic racism is a threat to cybersecurity. Rick Howard wraps up cybersecurity canon week with guests Richard Clarke and Robert Knake, authors of The Fifth Domain. And there’s another unsecured Amazon S3 bucket, and this exposure could present a serious risk to some people who already have trouble enough.
 For links to all of today's stories check out our CyberWire daily news brief:
 https://www.thecyberwire.com/newsletters/daily-briefing/9/124
 - More info on the #Sharethemicincyber event.
 - Camille Stewart's essay on systemic racism in cyber.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 26 Jun 2020 20:01:45 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1118</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5d98fe56-def8-11ea-911f-5fe2775ef80a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Microsoft urges Exchange server patching. Sure it does your taxes, but it’s got another agenda, too: the GoldenSpy backdoor may be in your tax software if you do business in China. Magecart ups its game. DDoSecrets says they’re not going to roll...</itunes:subtitle>
      <itunes:summary>Microsoft urges Exchange server patching. Sure it does your taxes, but it’s got another agenda, too: the GoldenSpy backdoor may be in your tax software if you do business in China. Magecart ups its game. DDoSecrets says they’re not going to roll over for Twitter’s “Nixonian” schtick. Camille Stewart from Google and Lauren Zabierek from Harvard’s Belfer Center on the #Sharethemicincyber event and why systemic racism is a threat to cybersecurity. Rick Howard wraps up cybersecurity canon week with guests Richard Clarke and Robert Knake, authors of The Fifth Domain. And there’s another unsecured Amazon S3 bucket, and this exposure could present a serious risk to some people who already have trouble enough.
 For links to all of today's stories check out our CyberWire daily news brief:
 https://www.thecyberwire.com/newsletters/daily-briefing/9/124
 - More info on the #Sharethemicincyber event.
 - Camille Stewart's essay on systemic racism in cyber.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft urges Exchange server patching. Sure it does your taxes, but it’s got another agenda, too: the GoldenSpy backdoor may be in your tax software if you do business in China. Magecart ups its game. DDoSecrets says they’re not going to roll over for Twitter’s “Nixonian” schtick. Camille Stewart from Google and Lauren Zabierek from Harvard’s Belfer Center on the #Sharethemicincyber event and why systemic racism is a threat to cybersecurity. Rick Howard wraps up cybersecurity canon week with guests Richard Clarke and Robert Knake, authors of The Fifth Domain. And there’s another unsecured Amazon S3 bucket, and this exposure could present a serious risk to some people who already have trouble enough.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p><a href="https://www.thecyberwire.com/newsletters/daily-briefing/9/124">https://www.thecyberwire.com/newsletters/daily-briefing/9/124</a></p> <p>- More info on the <a href="http://sharethemicincyber.splashthat.com/">#Sharethemicincyber</a> event.</p> <p>- Camille Stewart's <a href="https://www.cfr.org/blog/systemic-racism-cybersecurity-threat">essay</a> on systemic racism in cyber.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1532</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[63248dc5-3738-4564-8597-4678e93883e4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3222479616.mp3?updated=1690206256" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Big big DDoS. Evolving malware families. (More) privacy by default. A superseding indictment in the US case against Julian Assange. The EU reviews two years of GDPR.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1117/notes</link>
      <description>Akamai’s report on the record-setting DDoS attack it stopped this week. Glupteba GLOOP-tib-yeh and Lucifer malware strains described. Apple and Google move their defaults in the direction of greater privacy. The US designates Huawei and Hikvision as controlled by China’s military. A superseding indictment in Julian Assange’s case. The EU looks at GDPR and likes what it sees. REvil gets ready to sell stolen data. David Dufour from Webroot with tips on navigating new workplace realities. Our guest is David Sanger, author of The Perfect Weapon - War, Sabotage, and Fear in the Cyber Age. And the Navy recruiting campaign that wasn’t.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/123
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 25 Jun 2020 19:31:52 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1117</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5db662fc-def8-11ea-911f-ffc00c702e20/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Akamai’s report on the record-setting DDoS attack it stopped this week. Glupteba GLOOP-tib-yeh and Lucifer malware strains described. Apple and Google move their defaults in the direction of greater privacy. The US designates Huawei and Hikvision as...</itunes:subtitle>
      <itunes:summary>Akamai’s report on the record-setting DDoS attack it stopped this week. Glupteba GLOOP-tib-yeh and Lucifer malware strains described. Apple and Google move their defaults in the direction of greater privacy. The US designates Huawei and Hikvision as controlled by China’s military. A superseding indictment in Julian Assange’s case. The EU looks at GDPR and likes what it sees. REvil gets ready to sell stolen data. David Dufour from Webroot with tips on navigating new workplace realities. Our guest is David Sanger, author of The Perfect Weapon - War, Sabotage, and Fear in the Cyber Age. And the Navy recruiting campaign that wasn’t.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/123
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Akamai’s report on the record-setting DDoS attack it stopped this week. Glupteba GLOOP-tib-yeh and Lucifer malware strains described. Apple and Google move their defaults in the direction of greater privacy. The US designates Huawei and Hikvision as controlled by China’s military. A superseding indictment in Julian Assange’s case. The EU looks at GDPR and likes what it sees. REvil gets ready to sell stolen data. David Dufour from Webroot with tips on navigating new workplace realities. Our guest is David Sanger, author of The Perfect Weapon - War, Sabotage, and Fear in the Cyber Age. And the Navy recruiting campaign that wasn’t.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/123</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1286</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f4f329cf-b3b0-4465-aa04-77e7ed44f475]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9176602319.mp3?updated=1690206243" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BlueLeaks updates and fallout. Hidden Cobra hunt. Hacking leads to trade wars. What the crooks are watching, from their home and yours.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1116/notes</link>
      <description>Twitter permanently suspends DDoSecrets for violating its policy with respect to hacked material. DDoSecrets explains its thinking with respect to BlueLeaks. A quick look at a Hidden Cobra hunt. Sino-Australian dispute over hacking may be moving into a trade war phase. Lessons on election management. What do cybercriminals watch when they binge-watch? Joe Carrigan explains the Ripple 20 vulnerabilities. Cybersecurity Canon week continues with Joseph Menn, author of Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World. And some notes on the most malware-infested movie and television fan communities.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/122
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 24 Jun 2020 18:30:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1116</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5dc7ae04-def8-11ea-911f-df30e3beed76/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Twitter permanently suspends DDoSecrets for violating its policy with respect to hacked material. DDoSecrets explains its thinking with respect to BlueLeaks. A quick look at a Hidden Cobra hunt. Sino-Australian dispute over hacking may be moving into...</itunes:subtitle>
      <itunes:summary>Twitter permanently suspends DDoSecrets for violating its policy with respect to hacked material. DDoSecrets explains its thinking with respect to BlueLeaks. A quick look at a Hidden Cobra hunt. Sino-Australian dispute over hacking may be moving into a trade war phase. Lessons on election management. What do cybercriminals watch when they binge-watch? Joe Carrigan explains the Ripple 20 vulnerabilities. Cybersecurity Canon week continues with Joseph Menn, author of Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World. And some notes on the most malware-infested movie and television fan communities.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/122
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Twitter permanently suspends DDoSecrets for violating its policy with respect to hacked material. DDoSecrets explains its thinking with respect to BlueLeaks. A quick look at a Hidden Cobra hunt. Sino-Australian dispute over hacking may be moving into a trade war phase. Lessons on election management. What do cybercriminals watch when they binge-watch? Joe Carrigan explains the Ripple 20 vulnerabilities. Cybersecurity Canon week continues with Joseph Menn, author of Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World. And some notes on the most malware-infested movie and television fan communities.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/122</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1367</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3ee54a20-b0b5-417d-b51c-988574754b20]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4893221530.mp3?updated=1690206232" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacking attends international conflicts and disputes in India, Australia, and Ethiopia. US designates four Chinese media outlets foreign missions. Sodinokibi evolves; Evil Corps rises from its virtual grave.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1115/notes</link>
      <description>International conflicts and disputes are attended by hacking in South Asia, Australia, and Africa. The US designates four Chinese media outlets as foreign missions, that is, propaganda outfits. Sodinokibi ransomware sniffs at paycard and point-of-sale systems. Ben Yelin on TSA’s facial recognition program. Cybersecurity Canon Week continues with our guest is Bill Bonney, Co-Author of CISO Desk Reference Guide. And Evil Corp is back, apparently because you just can’t keep a bad man down.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/121
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Jun 2020 19:21:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1115</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5ddcd608-def8-11ea-911f-8b5b473cb185/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>International conflicts and disputes are attended by hacking in South Asia, Australia, and Africa. The US designates four Chinese media outlets as foreign missions, that is, propaganda outfits. Sodinokibi ransomware sniffs at paycard and point-of-sale...</itunes:subtitle>
      <itunes:summary>International conflicts and disputes are attended by hacking in South Asia, Australia, and Africa. The US designates four Chinese media outlets as foreign missions, that is, propaganda outfits. Sodinokibi ransomware sniffs at paycard and point-of-sale systems. Ben Yelin on TSA’s facial recognition program. Cybersecurity Canon Week continues with our guest is Bill Bonney, Co-Author of CISO Desk Reference Guide. And Evil Corp is back, apparently because you just can’t keep a bad man down.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/121
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>International conflicts and disputes are attended by hacking in South Asia, Australia, and Africa. The US designates four Chinese media outlets as foreign missions, that is, propaganda outfits. Sodinokibi ransomware sniffs at paycard and point-of-sale systems. Ben Yelin on TSA’s facial recognition program. Cybersecurity Canon Week continues with our guest is Bill Bonney, Co-Author of CISO Desk Reference Guide. And Evil Corp is back, apparently because you just can’t keep a bad man down.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/121</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1343</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0a1c5d97-ba44-44fc-a612-cd2bc1fcf25f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8421051814.mp3?updated=1690206224" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BlueLeaks hacktivists dump police files online. NSO Group back in the news. COVID-19 apps and databases versus privacy. Cyber conflict: China versus India and Australia. An alt-coin baron’s story. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1114/notes</link>
      <description>BlueLeaks dumps stolen police files online. A report of spyware delivered via network injection. COVID-19 apps and databases are reported to have indifferent privacy safeguards, and there’s been one big recent leak. India and Australia both on alert for Chinese cyberattacks. Our own Rick Howard on intelligence operations. It’s cybersecurity Canon Week, our guest is Todd Fitzgerald, author of CISO Compass. And New Zealand piles on in the case of a Russian alt-coin baron.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/120
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 22 Jun 2020 19:08:27 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1114</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5df2afc8-def8-11ea-911f-d70b2403796b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>BlueLeaks dumps stolen police files online. A report of spyware delivered via network injection. COVID-19 apps and databases are reported to have indifferent privacy safeguards, and there’s been one big recent leak. India and Australia both on alert...</itunes:subtitle>
      <itunes:summary>BlueLeaks dumps stolen police files online. A report of spyware delivered via network injection. COVID-19 apps and databases are reported to have indifferent privacy safeguards, and there’s been one big recent leak. India and Australia both on alert for Chinese cyberattacks. Our own Rick Howard on intelligence operations. It’s cybersecurity Canon Week, our guest is Todd Fitzgerald, author of CISO Compass. And New Zealand piles on in the case of a Russian alt-coin baron.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/120
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>BlueLeaks dumps stolen police files online. A report of spyware delivered via network injection. COVID-19 apps and databases are reported to have indifferent privacy safeguards, and there’s been one big recent leak. India and Australia both on alert for Chinese cyberattacks. Our own Rick Howard on intelligence operations. It’s cybersecurity Canon Week, our guest is Todd Fitzgerald, author of CISO Compass. And New Zealand piles on in the case of a Russian alt-coin baron.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/120</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1310</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1994b997-1ad6-4869-b989-e0aeca3a0655]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5077788184.mp3?updated=1690206207" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Superhero origin stories and lessons that last. [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/3/notes</link>
      <description>Dean of Research, Johannes Ullrich, relays his experiences from studying the hard sciences to his career shift to cybersecurity. Basic principles, superhero origin stories, physics labs and radiation all figure in. And there’s a lot in common with network security best practices. Have a listen to what Johannes has learned and what he hopes to impart on his students. Our thanks to Johannes for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 21 Jun 2020 05:00:00 -0000</pubDate>
      <itunes:title>Superhero origin stories and lessons that last. [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Dean of Research, Johannes Ullrich takes us from physics to the cybersecurity classroom. </itunes:subtitle>
      <itunes:summary>Dean of Research, Johannes Ullrich, relays his experiences from studying the hard sciences to his career shift to cybersecurity. Basic principles, superhero origin stories, physics labs and radiation all figure in. And there’s a lot in common with network security best practices. Have a listen to what Johannes has learned and what he hopes to impart on his students. Our thanks to Johannes for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dean of Research, Johannes Ullrich, relays his experiences from studying the hard sciences to his career shift to cybersecurity. Basic principles, superhero origin stories, physics labs and radiation all figure in. And there’s a lot in common with network security best practices. Have a listen to what Johannes has learned and what he hopes to impart on his students. Our thanks to Johannes for sharing his story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>339</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bbb4844e-df05-11ea-88ab-3f7099959ac0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5204532293.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Click here to update your webhook. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/140/notes</link>
      <description>Slack is a cloud-based messaging platform that is commonly used in workplace communications. Slack Incoming Webhooks allow you to post messages from your applications to Slack. Generally, Slack webhooks are considered a low risk integration. A deeper dive into webhooks shows that this is not entirely accurate. 
Joining us in this week's Research Saturday is Ashley Graves from AT&amp;T Cybersecurity's Alien Labs to discuss her research. 
The research can be found here: 
 Slack phishing attacks using webhooks
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Jun 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>140</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/56e3921c-df14-11ea-851c-5f18c92e13eb/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Slack is a cloud-based messaging platform that is commonly used in workplace communications. Slack Incoming Webhooks allow you to post messages from your applications to Slack. Generally, Slack webhooks are considered a low risk integration. A deeper...</itunes:subtitle>
      <itunes:summary>Slack is a cloud-based messaging platform that is commonly used in workplace communications. Slack Incoming Webhooks allow you to post messages from your applications to Slack. Generally, Slack webhooks are considered a low risk integration. A deeper dive into webhooks shows that this is not entirely accurate. 
Joining us in this week's Research Saturday is Ashley Graves from AT&amp;T Cybersecurity's Alien Labs to discuss her research. 
The research can be found here: 
 Slack phishing attacks using webhooks
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Slack is a cloud-based messaging platform that is commonly used in workplace communications. Slack Incoming Webhooks allow you to post messages from your applications to Slack. Generally, Slack webhooks are considered a low risk integration. A deeper dive into webhooks shows that this is not entirely accurate. </p><p>Joining us in this week's Research Saturday is Ashley Graves from AT&amp;T Cybersecurity's Alien Labs to discuss her research. </p><p>The research can be found here: </p><p><a href="https://cybersecurity.att.com/blogs/labs-research/slack-phishing-attacks-using-webhooks"> Slack phishing attacks using webhooks</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1138</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d159f685-7a0d-49c4-af44-deacac5c8d23]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7669520811.mp3?updated=1685107893" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Australia warns of a large-scale espionage campaign. China indicts two long-detained Canadians. And the Lazarus Group may be about to undertake a widespread COVID-19-themed fraud effort.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1113/notes</link>
      <description>A look at the “state-based cyber actor” the Australian government is concerned about. Some signs of Chinese retaliation for Five Eyes’ skepticism of Huawei. Johannes Ullrich explains malware triggering multiple signatures in anti-malware products. Our guest is Geoff White, author of Crime Dot Com, on how he tracked down the creator of the Love Bug. And an alert about the possibility of some COVID-19-themed fraud from the Lazarus Group.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/119
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 19 Jun 2020 18:47:45 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1113</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5e102ce2-def8-11ea-911f-0767b3f8b992/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A look at the “state-based cyber actor” the Australian government is concerned about. Some signs of Chinese retaliation for Five Eyes’ skepticism of Huawei. Johannes Ullrich explains malware triggering multiple signatures in anti-malware...</itunes:subtitle>
      <itunes:summary>A look at the “state-based cyber actor” the Australian government is concerned about. Some signs of Chinese retaliation for Five Eyes’ skepticism of Huawei. Johannes Ullrich explains malware triggering multiple signatures in anti-malware products. Our guest is Geoff White, author of Crime Dot Com, on how he tracked down the creator of the Love Bug. And an alert about the possibility of some COVID-19-themed fraud from the Lazarus Group.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/119
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A look at the “state-based cyber actor” the Australian government is concerned about. Some signs of Chinese retaliation for Five Eyes’ skepticism of Huawei. Johannes Ullrich explains malware triggering multiple signatures in anti-malware products. Our guest is Geoff White, author of Crime Dot Com, on how he tracked down the creator of the Love Bug. And an alert about the possibility of some COVID-19-themed fraud from the Lazarus Group.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/119</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1417</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[df56f589-07cc-4fa1-8ef4-b04e1b71229e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2437087901.mp3?updated=1608756584" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber support for a kinetic conflict. Cyberespionage. Spyware in Chrome extensions. Criminal phishing bypasses defenses. Proposed revisions to Section 230. Zoom and encryption.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1112/notes</link>
      <description>Sino-Indian conflict extends to cyberspace. InvisiMole connected to Gamaredon. Spyware found in Chrome extensions. Phishing around technical defenses (and some criminal use of captchas). The US Justice Department releases its study of Section 230 of the Communications Decency Act. Zully Ramzan from RSA on privacy and security in a post-COVID world. Our guest is Michael Powell from NCTA on the importance of the UK cybersecurity sector. And Zoom decides to make end-to-end encryption generally available.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/118
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 18 Jun 2020 19:17:21 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1112</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5e25504a-def8-11ea-911f-73436082b09e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Sino-Indian conflict extends to cyberspace. InvisiMole connected to Gamaredon. Spyware found in Chrome extensions. Phishing around technical defenses (and some criminal use of captchas). The US Justice Department releases its study of Section 230 of...</itunes:subtitle>
      <itunes:summary>Sino-Indian conflict extends to cyberspace. InvisiMole connected to Gamaredon. Spyware found in Chrome extensions. Phishing around technical defenses (and some criminal use of captchas). The US Justice Department releases its study of Section 230 of the Communications Decency Act. Zully Ramzan from RSA on privacy and security in a post-COVID world. Our guest is Michael Powell from NCTA on the importance of the UK cybersecurity sector. And Zoom decides to make end-to-end encryption generally available.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/118
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sino-Indian conflict extends to cyberspace. InvisiMole connected to Gamaredon. Spyware found in Chrome extensions. Phishing around technical defenses (and some criminal use of captchas). The US Justice Department releases its study of Section 230 of the Communications Decency Act. Zully Ramzan from RSA on privacy and security in a post-COVID world. Our guest is Michael Powell from NCTA on the importance of the UK cybersecurity sector. And Zoom decides to make end-to-end encryption generally available.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/118</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1318</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f7b18282-2d80-40a6-8dcb-81a7a6ff917c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6004282755.mp3?updated=1690206179" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ripple20 flaws in the IoT supply chain. Operation In(ter)ception looks for intelligence, and cash, too. Sino-Indian tensions. A look at Secondary Infektion. How not to influence reviewers. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1111/notes</link>
      <description>Ripple20 vulnerabilities are reported in the IoT software supply chain. North Korean operators go for intelligence, but also for cash, and they’re phishing in LinkedIn’s pond. Sino-Indian tensions find expression in cyberspace. A long look at the Russian influence operation, Secondary Infektion. Joe Carrigan from JHU ISI on why older adults share more misinformation online. Our guest Will LaSala from OneSpan tracks the increase in online banking fraud during COVID-19. And the strange case of the bloggers who angered eBay may have more indictments on the way.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/117
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 17 Jun 2020 19:40:16 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1111</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5e3fbb9c-def8-11ea-911f-5bb3533e58d8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ripple20 vulnerabilities are reported in the IoT software supply chain. North Korean operators go for intelligence, but also for cash, and they’re phishing in LinkedIn’s pond. Sino-Indian tensions find expression in cyberspace. A long look at the...</itunes:subtitle>
      <itunes:summary>Ripple20 vulnerabilities are reported in the IoT software supply chain. North Korean operators go for intelligence, but also for cash, and they’re phishing in LinkedIn’s pond. Sino-Indian tensions find expression in cyberspace. A long look at the Russian influence operation, Secondary Infektion. Joe Carrigan from JHU ISI on why older adults share more misinformation online. Our guest Will LaSala from OneSpan tracks the increase in online banking fraud during COVID-19. And the strange case of the bloggers who angered eBay may have more indictments on the way.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/117
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ripple20 vulnerabilities are reported in the IoT software supply chain. North Korean operators go for intelligence, but also for cash, and they’re phishing in LinkedIn’s pond. Sino-Indian tensions find expression in cyberspace. A long look at the Russian influence operation, Secondary Infektion. Joe Carrigan from JHU ISI on why older adults share more misinformation online. Our guest Will LaSala from OneSpan tracks the increase in online banking fraud during COVID-19. And the strange case of the bloggers who angered eBay may have more indictments on the way.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/117</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1339</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8c00ef92-dac4-4ed3-b5d5-d6c834962886]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7344942292.mp3?updated=1690206166" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage and counterespionage. The DDoS that never was. A very strange case of cyberstalking. And leaky niche dating sites.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1110/notes</link>
      <description>What does Beijing want to know about US Presidential campaigns? Position papers, mostly. A redacted version of the CIA’s inquiry into the WikiLeaks Vault 7 material is out. That DDoS attack you read about on Twitter? Never happened. Former eBay employees face Federal charges of conspiracy to commit cyberstalking and witness tampering. Ben Yelin explains a judge refusing to sign off on a potential Facebook facial recognition settlement. Our guest is Randy Vanderhoof from the Secure Technology Alliance on mobile drivers licenses. And where would you store “niche” dating app material? In a misconfigured AWS S3 bucket. Where else?
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/116
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Jun 2020 18:42:11 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1110</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5e551e06-def8-11ea-911f-6f238dee25b2/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>What does Beijing want to know about US Presidential campaigns? Position papers, mostly. A redacted version of the CIA’s inquiry into the WikiLeaks Vault 7 material is out. That DDoS attack you read about on Twitter? Never happened. Former eBay...</itunes:subtitle>
      <itunes:summary>What does Beijing want to know about US Presidential campaigns? Position papers, mostly. A redacted version of the CIA’s inquiry into the WikiLeaks Vault 7 material is out. That DDoS attack you read about on Twitter? Never happened. Former eBay employees face Federal charges of conspiracy to commit cyberstalking and witness tampering. Ben Yelin explains a judge refusing to sign off on a potential Facebook facial recognition settlement. Our guest is Randy Vanderhoof from the Secure Technology Alliance on mobile drivers licenses. And where would you store “niche” dating app material? In a misconfigured AWS S3 bucket. Where else?
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/116
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>What does Beijing want to know about US Presidential campaigns? Position papers, mostly. A redacted version of the CIA’s inquiry into the WikiLeaks Vault 7 material is out. That DDoS attack you read about on Twitter? Never happened. Former eBay employees face Federal charges of conspiracy to commit cyberstalking and witness tampering. Ben Yelin explains a judge refusing to sign off on a potential Facebook facial recognition settlement. Our guest is Randy Vanderhoof from the Secure Technology Alliance on mobile drivers licenses. And where would you store “niche” dating app material? In a misconfigured AWS S3 bucket. Where else?</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/116</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1323</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9b6d3c0d-0334-494a-b422-a7f98383d849]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6907197273.mp3?updated=1690206154" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ActionSpy Android spyware deployed against Uyghurs in Tibet. Anonymous claims an action against Atlanta PD. Security vendor or malware purveyor? Spelling counts.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1109/notes</link>
      <description>A new Android spyware tool is deployed against China’s Uyghur minority. Anonymous claims it disrupted the Atlanta Police Department’s website yesterday to protest a police shooting. An apparently legitimate security firm has apparently been selling malware to criminals. Breachstortion joins sextortion as a criminal tactic. Craig Williams from Cisco Talos on Astaroth, an information-stealer that has been targeting Brazil, Our own Rick Howard on risk assessments. And why spelling always counts.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/115
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 15 Jun 2020 19:27:31 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1109</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5e68c3e8-def8-11ea-911f-97dec17fc611/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A new Android spyware tool is deployed against China’s Uyghur minority. Anonymous claims it disrupted the Atlanta Police Department’s website yesterday to protest a police shooting. An apparently legitimate security firm has apparently been...</itunes:subtitle>
      <itunes:summary>A new Android spyware tool is deployed against China’s Uyghur minority. Anonymous claims it disrupted the Atlanta Police Department’s website yesterday to protest a police shooting. An apparently legitimate security firm has apparently been selling malware to criminals. Breachstortion joins sextortion as a criminal tactic. Craig Williams from Cisco Talos on Astaroth, an information-stealer that has been targeting Brazil, Our own Rick Howard on risk assessments. And why spelling always counts.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/115
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A new Android spyware tool is deployed against China’s Uyghur minority. Anonymous claims it disrupted the Atlanta Police Department’s website yesterday to protest a police shooting. An apparently legitimate security firm has apparently been selling malware to criminals. Breachstortion joins sextortion as a criminal tactic. Craig Williams from Cisco Talos on Astaroth, an information-stealer that has been targeting Brazil, Our own Rick Howard on risk assessments. And why spelling always counts.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/115</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1210</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bbb59037-5e1b-4130-a471-5b9b2fd8730c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6335575739.mp3?updated=1690206139" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The mark of making a difference. [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/2/notes</link>
      <description>Financial firm CISO, Tom Quinn, takes us from his first experience with modern computers in the military to his current role as a Chief Information Security Officer. It's important to understand how the technology works, but it's also important to understand how people work. And, to make a difference. Our thanks to Tom for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 14 Jun 2020 05:00:00 -0000</pubDate>
      <itunes:title>The mark of making a difference. [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Financial firm CISO, Tom Quinn, takes us on journey from the military to the financial industry.</itunes:subtitle>
      <itunes:summary>Financial firm CISO, Tom Quinn, takes us from his first experience with modern computers in the military to his current role as a Chief Information Security Officer. It's important to understand how the technology works, but it's also important to understand how people work. And, to make a difference. Our thanks to Tom for sharing his story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Financial firm CISO, Tom Quinn, takes us from his first experience with modern computers in the military to his current role as a Chief Information Security Officer. It's important to understand how the technology works, but it's also important to understand how people work. And, to make a difference. Our thanks to Tom for sharing his story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>291</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ba565dc0-df05-11ea-88ab-43b6ab438c13]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8855471118.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The value of the why and the who. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/139/notes</link>
      <description>Proactive, efficient threat mitigation and risk management require understanding adversaries’ fundamental thought processes, not just their tools and methods. Cyber threat intelligence analysts combed through 15 years (2004 to 2019) of public sources that have documented the activities of one prolific threat actor, Russia’s military intelligence agency, the GRU. Analysis shows that the timing, targets, and impacts of this activity mirrored Russian strategic concerns about specific events and developments. 
Joining us in this week's Research Saturday are Brad Stone &amp; Nate Beach-Westmoreland from Booz Allen Hamilton to discuss their report and some of the 33 case studies presented in it.
The research can be found here: 
 Bearing Witness: Uncovering the Logic Behind Russian Military Cyber Operations
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Jun 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>139</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/53746692-df14-11ea-9e92-bf8c844e68be/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Proactive, efficient threat mitigation and risk management require understanding adversaries’ fundamental thought processes, not just their tools and methods. Cyber threat intelligence analysts combed through 15 years (2004 to 2019) of public...</itunes:subtitle>
      <itunes:summary>Proactive, efficient threat mitigation and risk management require understanding adversaries’ fundamental thought processes, not just their tools and methods. Cyber threat intelligence analysts combed through 15 years (2004 to 2019) of public sources that have documented the activities of one prolific threat actor, Russia’s military intelligence agency, the GRU. Analysis shows that the timing, targets, and impacts of this activity mirrored Russian strategic concerns about specific events and developments. 
Joining us in this week's Research Saturday are Brad Stone &amp; Nate Beach-Westmoreland from Booz Allen Hamilton to discuss their report and some of the 33 case studies presented in it.
The research can be found here: 
 Bearing Witness: Uncovering the Logic Behind Russian Military Cyber Operations
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Proactive, efficient threat mitigation and risk management require understanding adversaries’ fundamental thought processes, not just their tools and methods. Cyber threat intelligence analysts combed through 15 years (2004 to 2019) of public sources that have documented the activities of one prolific threat actor, Russia’s military intelligence agency, the GRU. Analysis shows that the timing, targets, and impacts of this activity mirrored Russian strategic concerns about specific events and developments. </p><p>Joining us in this week's Research Saturday are Brad Stone &amp; Nate Beach-Westmoreland from Booz Allen Hamilton to discuss their report and some of the 33 case studies presented in it.</p><p>The research can be found here: </p><p><a href="https://www.boozallen.com/c/insight/publication/the-logic-behind-russian-military-cyber-operations.html"> Bearing Witness: Uncovering the Logic Behind Russian Military Cyber Operations</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1599</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a10a5386-fdc1-4734-96a9-deceb1dff983]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9760929706.mp3?updated=1685107881" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chinese, Russian, and Turkish domestic influence campaigns. Zoom’s China troubles. Honda, Enil recover from Ekans. Ransomware attacks against a city and an M&amp;A consultancy. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1108/notes</link>
      <description>Twitter’s transparency efforts see through accounts being run by Chinese, Russian, and Turkish actors. Zoom is working to both comply with Chinese law and contain the reputational damage involved in doing so. Industrial firms recover from Ekans infestations. Caleb Barlow from CynergisTek on how hospital CISOs are dealing with the COVID-19 situation. Our guest is Ronald Eddings from Palo Alto Networks and the Hacker Valley Studio Podcast on strategies for finding and managing security architects. And it’s not Posh Spice who’s got the attention of Maze; it’s just her M&amp;A advisors.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/114
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 12 Jun 2020 18:59:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1108</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5e8d0d98-def8-11ea-911f-83c55c409b07/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Twitter’s transparency efforts see through accounts being run by Chinese, Russian, and Turkish actors. Zoom is working to both comply with Chinese law and contain the reputational damage involved in doing so. Industrial firms recover from Ekans...</itunes:subtitle>
      <itunes:summary>Twitter’s transparency efforts see through accounts being run by Chinese, Russian, and Turkish actors. Zoom is working to both comply with Chinese law and contain the reputational damage involved in doing so. Industrial firms recover from Ekans infestations. Caleb Barlow from CynergisTek on how hospital CISOs are dealing with the COVID-19 situation. Our guest is Ronald Eddings from Palo Alto Networks and the Hacker Valley Studio Podcast on strategies for finding and managing security architects. And it’s not Posh Spice who’s got the attention of Maze; it’s just her M&amp;A advisors.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/114
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Twitter’s transparency efforts see through accounts being run by Chinese, Russian, and Turkish actors. Zoom is working to both comply with Chinese law and contain the reputational damage involved in doing so. Industrial firms recover from Ekans infestations. Caleb Barlow from CynergisTek on how hospital CISOs are dealing with the COVID-19 situation. Our guest is Ronald Eddings from Palo Alto Networks and the Hacker Valley Studio Podcast on strategies for finding and managing security architects. And it’s not Posh Spice who’s got the attention of Maze; it’s just her M&amp;A advisors.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/114</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1557</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6975439b-9cb8-458b-96b3-2e3c47542577]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6340559302.mp3?updated=1608756613" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Gamaredon ups its crazy game. Doxing during unrest. Bogus contact-tracing apps spread spyware. Thanos in the ransomware market. Crypto Wars notes. Another 419 scam. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1107/notes</link>
      <description>The Gamaredon Group is back, and what’s their secret? Like Crazy Eddie’s, it’s volume! Doxing during times of unrest. Phoney contact-tracing apps are snooping on personal information in at least ten countries. Thanos is a criminal favorite in the ransomware-as-a-service market. Another skirmish in the Crypto Wars is brewing up on Capitol Hill. David Dufour from Webroot on how organizations can successfully navigate their new workplace realities. Our guest is Chester Wisniewski from Sophos on fleeceware apps found in the Apple app store. And no, really, Elon Musk is not on YouTube offering you Bitcoin.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/113
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 11 Jun 2020 18:50:38 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1107</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5ea571ee-def8-11ea-911f-478cf4b95ea8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The Gamaredon Group is back, and what’s their secret? Like Crazy Eddie’s, it’s volume! Doxing during times of unrest. Phoney contact-tracing apps are snooping on personal information in at least ten countries. Thanos is a criminal favorite in...</itunes:subtitle>
      <itunes:summary>The Gamaredon Group is back, and what’s their secret? Like Crazy Eddie’s, it’s volume! Doxing during times of unrest. Phoney contact-tracing apps are snooping on personal information in at least ten countries. Thanos is a criminal favorite in the ransomware-as-a-service market. Another skirmish in the Crypto Wars is brewing up on Capitol Hill. David Dufour from Webroot on how organizations can successfully navigate their new workplace realities. Our guest is Chester Wisniewski from Sophos on fleeceware apps found in the Apple app store. And no, really, Elon Musk is not on YouTube offering you Bitcoin.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/113
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Gamaredon Group is back, and what’s their secret? Like Crazy Eddie’s, it’s volume! Doxing during times of unrest. Phoney contact-tracing apps are snooping on personal information in at least ten countries. Thanos is a criminal favorite in the ransomware-as-a-service market. Another skirmish in the Crypto Wars is brewing up on Capitol Hill. David Dufour from Webroot on how organizations can successfully navigate their new workplace realities. Our guest is Chester Wisniewski from Sophos on fleeceware apps found in the Apple app store. And no, really, Elon Musk is not on YouTube offering you Bitcoin.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/113</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1277</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5f152915-3938-410d-9d20-d44c088dcbbf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3801491342.mp3?updated=1690206114" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A big Patch Tuesday. Honda ransomware update. Facebook helped the FBI with a zero-day. Cloud service outages. Breach settlements. BellTroX explains itself, sort of.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1106/notes</link>
      <description>Notes on Patch Tuesday--it was a fairly big one this time. Honda continues its investigation of the incident it sustained over the weekend, and outsiders see it as a ransomware attack. Facebook is said to have developed a Tails zero-day to help the FBI with a notorious case. Crooks are turning to search engine optimization. IBM and Google cloud services recovered quickly from outages. You’re unlikely to get rich from a breach settlement. Joe Carrigan describes free online courseware aimed at Community College students. Our guest is Dennis Toomey from BAE on how financial institutions need to enact stronger cyber protocols as employees migrate to working from home. And BellTroX says, hey, it was just helping some private eyes.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/112
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 10 Jun 2020 18:34:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1106</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5ed4a194-def8-11ea-911f-ebfb25829657/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Notes on Patch Tuesday--it was a fairly big one this time. Honda continues its investigation of the incident it sustained over the weekend, and outsiders see it as a ransomware attack. Facebook is said to have developed a Tails zero-day to help the...</itunes:subtitle>
      <itunes:summary>Notes on Patch Tuesday--it was a fairly big one this time. Honda continues its investigation of the incident it sustained over the weekend, and outsiders see it as a ransomware attack. Facebook is said to have developed a Tails zero-day to help the FBI with a notorious case. Crooks are turning to search engine optimization. IBM and Google cloud services recovered quickly from outages. You’re unlikely to get rich from a breach settlement. Joe Carrigan describes free online courseware aimed at Community College students. Our guest is Dennis Toomey from BAE on how financial institutions need to enact stronger cyber protocols as employees migrate to working from home. And BellTroX says, hey, it was just helping some private eyes.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/112
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Notes on Patch Tuesday--it was a fairly big one this time. Honda continues its investigation of the incident it sustained over the weekend, and outsiders see it as a ransomware attack. Facebook is said to have developed a Tails zero-day to help the FBI with a notorious case. Crooks are turning to search engine optimization. IBM and Google cloud services recovered quickly from outages. You’re unlikely to get rich from a breach settlement. Joe Carrigan describes free online courseware aimed at Community College students. Our guest is Dennis Toomey from BAE on how financial institutions need to enact stronger cyber protocols as employees migrate to working from home. And BellTroX says, hey, it was just helping some private eyes.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/112</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1293</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f18e7d36-00c6-4af2-8fe8-d64bb9fdda21]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5315007428.mp3?updated=1690206103" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tracking down hackers-for-hire. SNAKE ransomware bites Honda. Anti-DDoS for criminal markets. And a menu for cyber contraband.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1105/notes</link>
      <description>Commercialized hacking-for-hire is traced to an Indian firm, but it’s probably not an isolated problem. Ransomware shuts down Honda production lines in three continents. Criminals develop and distribute an anti-DDoS tool to help keep the dark web souks responsive and available. Ben Yelin revisits Twitter’s flagging or removing the U.S. President’s tweets. Our guest is Jeremy Oddo from The Third Floor to discuss cybersecurity in Hollywood during COVID-19. And researchers compile a menu of cyber contraband.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/111
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Jun 2020 19:43:43 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1105</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5eeba81c-def8-11ea-911f-a38e7f557af5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Commercialized hacking-for-hire is traced to an Indian firm, but it’s probably not an isolated problem. Ransomware shuts down Honda production lines in three continents. Criminals develop and distribute an anti-DDoS tool to help keep the dark web...</itunes:subtitle>
      <itunes:summary>Commercialized hacking-for-hire is traced to an Indian firm, but it’s probably not an isolated problem. Ransomware shuts down Honda production lines in three continents. Criminals develop and distribute an anti-DDoS tool to help keep the dark web souks responsive and available. Ben Yelin revisits Twitter’s flagging or removing the U.S. President’s tweets. Our guest is Jeremy Oddo from The Third Floor to discuss cybersecurity in Hollywood during COVID-19. And researchers compile a menu of cyber contraband.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/111
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Commercialized hacking-for-hire is traced to an Indian firm, but it’s probably not an isolated problem. Ransomware shuts down Honda production lines in three continents. Criminals develop and distribute an anti-DDoS tool to help keep the dark web souks responsive and available. Ben Yelin revisits Twitter’s flagging or removing the U.S. President’s tweets. Our guest is Jeremy Oddo from The Third Floor to discuss cybersecurity in Hollywood during COVID-19. And researchers compile a menu of cyber contraband.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/111</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1311</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2722bc72-c1ae-4ea1-9f5f-84d738d99e2f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9626386249.mp3?updated=1690206088" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Regional rivals jostle in cyberspace. Election interference and vulnerable online voting. Phishing for a competitive advantage. Reducing dependence on foreign companies for infrastructure.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1104/notes</link>
      <description>South and Southwest Asian regional rivalries play out in cyberspace. Election interference could move from disruptive influence operations to actual vote manipulation. Someone is spearphishing leaders in Germany’s PPE task force. Nations move to restrict dependence on foreign companies in their infrastructure. Justin Harvey from Accenture on the train of thought behind breach disclosure. Our own Rick Howard on DevSecOps. And Washington State recovers some, but not all, of the unemployment funds lost to fraud.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/110
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 08 Jun 2020 19:05:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1104</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5f00d836-def8-11ea-911f-bf580f059599/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>South and Southwest Asian regional rivalries play out in cyberspace. Election interference could move from disruptive influence operations to actual vote manipulation. Someone is spearphishing leaders in Germany’s PPE task force. Nations move to...</itunes:subtitle>
      <itunes:summary>South and Southwest Asian regional rivalries play out in cyberspace. Election interference could move from disruptive influence operations to actual vote manipulation. Someone is spearphishing leaders in Germany’s PPE task force. Nations move to restrict dependence on foreign companies in their infrastructure. Justin Harvey from Accenture on the train of thought behind breach disclosure. Our own Rick Howard on DevSecOps. And Washington State recovers some, but not all, of the unemployment funds lost to fraud.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/110
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>South and Southwest Asian regional rivalries play out in cyberspace. Election interference could move from disruptive influence operations to actual vote manipulation. Someone is spearphishing leaders in Germany’s PPE task force. Nations move to restrict dependence on foreign companies in their infrastructure. Justin Harvey from Accenture on the train of thought behind breach disclosure. Our own Rick Howard on DevSecOps. And Washington State recovers some, but not all, of the unemployment funds lost to fraud.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/110</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1288</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1304327b-f4af-4961-82e9-e0e527cdf377]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5279398113.mp3?updated=1690206076" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ask more people to dance. [Career Notes]</title>
      <link>https://thecyberwire.com/podcasts/career-notes/1/notes</link>
      <description>Cyber analyst, Tracy Maleeff, shares her unexpected journey from the library to cybersecurity and offers advice for those both seeking to make a change and those doing the hiring. It's not just about the invitation, it's more than that. Our thanks to Tracy for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 07 Jun 2020 05:00:00 -0000</pubDate>
      <itunes:title>Ask more people to dance. [Career Notes]</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:subtitle>Cyber analyst Tracy Maleeff's journey from library science to cybersecurity.</itunes:subtitle>
      <itunes:summary>Cyber analyst, Tracy Maleeff, shares her unexpected journey from the library to cybersecurity and offers advice for those both seeking to make a change and those doing the hiring. It's not just about the invitation, it's more than that. Our thanks to Tracy for sharing her story with us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber analyst, Tracy Maleeff, shares her unexpected journey from the library to cybersecurity and offers advice for those both seeking to make a change and those doing the hiring. It's not just about the invitation, it's more than that. Our thanks to Tracy for sharing her story with us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>244</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b8c8547c-df05-11ea-88ab-fb241a61e612]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7192902054.mp3?updated=1591047854" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Due diligence cannot be done as a one-off. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/138/notes</link>
      <description>Earlier this year, a Virgin Media database containing the personal details of 900,000 people was discovered to be unsecured and accessible online for 10 months. The breach was discovered by researchers at the security firm TurgenSec. This breach had major implications under GDPR. 
Joining us in this week's Research Saturday are George Punter and Peter Hansen from TurgenSec to talk about the discovery of the breach. 
The research can be found here: 
 Virgin Media Disclosure Statement &amp; Resources
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Jun 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>138</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/4eaeaac8-df14-11ea-8499-7f0c724e9f8d/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Earlier this year, a Virgin Media database containing the personal details of 900,000 people was discovered to be unsecured and accessible online for 10 months. The breach was discovered by researchers at the security firm TurgenSec. This breach had...</itunes:subtitle>
      <itunes:summary>Earlier this year, a Virgin Media database containing the personal details of 900,000 people was discovered to be unsecured and accessible online for 10 months. The breach was discovered by researchers at the security firm TurgenSec. This breach had major implications under GDPR. 
Joining us in this week's Research Saturday are George Punter and Peter Hansen from TurgenSec to talk about the discovery of the breach. 
The research can be found here: 
 Virgin Media Disclosure Statement &amp; Resources
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Earlier this year, a Virgin Media database containing the personal details of 900,000 people was discovered to be unsecured and accessible online for 10 months. The breach was discovered by researchers at the security firm TurgenSec. This breach had major implications under GDPR. </p><p>Joining us in this week's Research Saturday are George Punter and Peter Hansen from TurgenSec to talk about the discovery of the breach. </p><p>The research can be found here: </p><p><a href="https://community.turgensec.com/virgin-media-disclosure-statement/"> Virgin Media Disclosure Statement &amp; Resources</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1216</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[009b7297-5500-4530-aafd-731c831749a9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3389035236.mp3?updated=1685107877" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hurricane Panda and Charming Kitten paw at, respectively, the campaigns of Mr. Biden and Mr. Trump. Lies’ bodyguard of truth. Information warfare in the Gulf.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1103/notes</link>
      <description>It’s mostly cyberespionage today, with an admixture of influence operations. Google has warned both major US Presidential campaigns that Chinese and Iranian intelligence services are after their staffers’ email accounts, so far apparently without much success. Russia, China, and Iran devote some purposive media attention to US civil unrest. Johannes Ullrich from SANS on malicious PowerPoint add-ins. Our guest is Bil Harmer from SecureAuth on credential carelessness. And Qatar’s rivals in the Gulf continue their information campaign against Doha: this time it’s bogus news of a coup.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/109
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 05 Jun 2020 19:38:15 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1103</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5f1c7938-def8-11ea-911f-a3940166cb98/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>It’s mostly cyberespionage today, with an admixture of influence operations. Google has warned both major US Presidential campaigns that Chinese and Iranian intelligence services are after their staffers’ email accounts, so far apparently without...</itunes:subtitle>
      <itunes:summary>It’s mostly cyberespionage today, with an admixture of influence operations. Google has warned both major US Presidential campaigns that Chinese and Iranian intelligence services are after their staffers’ email accounts, so far apparently without much success. Russia, China, and Iran devote some purposive media attention to US civil unrest. Johannes Ullrich from SANS on malicious PowerPoint add-ins. Our guest is Bil Harmer from SecureAuth on credential carelessness. And Qatar’s rivals in the Gulf continue their information campaign against Doha: this time it’s bogus news of a coup.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/109
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>It’s mostly cyberespionage today, with an admixture of influence operations. Google has warned both major US Presidential campaigns that Chinese and Iranian intelligence services are after their staffers’ email accounts, so far apparently without much success. Russia, China, and Iran devote some purposive media attention to US civil unrest. Johannes Ullrich from SANS on malicious PowerPoint add-ins. Our guest is Bil Harmer from SecureAuth on credential carelessness. And Qatar’s rivals in the Gulf continue their information campaign against Doha: this time it’s bogus news of a coup.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/109</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1373</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0adcb533-7c67-4c6a-98d4-278f194b9c15]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2114657289.mp3?updated=1608756589" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Nuisance-level hacktivism. Ongoing cyberespionage and cybercriminal campaigns. EU unhappy with Russia’s hacking the Bundestag. CISA has a new cybersecurity resource. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1102/notes</link>
      <description>Nuisance-level hacktivism continues to surround US protests. The Higaisa APT is active in Southeast Asia. Goblin Panda is back, with USB-borne malware. A new strain of ransomware is described: “Tycoon.” The EU considers whether to sanction Russia over the GRU’s hack of Germany’s Bundestag. CISA launches a new public resource for cybersecurity. Zulfikar Ramzan from RSA on cybersecurity and digital risk in the context of pandemics. Our guest is Grant Goodes from GuardSquare on security of mobile app voting. And a Texas man pleads guilty to conspiracy to commit money-laundering in the course of a BEC scam.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/108
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 04 Jun 2020 19:03:04 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1102</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5f33801a-def8-11ea-911f-2ff0858c69fd/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Nuisance-level hacktivism continues to surround US protests. The Higaisa APT is active in Southeast Asia. Goblin Panda is back, with USB-borne malware. A new strain of ransomware is described: “Tycoon.” The EU considers whether to sanction Russia...</itunes:subtitle>
      <itunes:summary>Nuisance-level hacktivism continues to surround US protests. The Higaisa APT is active in Southeast Asia. Goblin Panda is back, with USB-borne malware. A new strain of ransomware is described: “Tycoon.” The EU considers whether to sanction Russia over the GRU’s hack of Germany’s Bundestag. CISA launches a new public resource for cybersecurity. Zulfikar Ramzan from RSA on cybersecurity and digital risk in the context of pandemics. Our guest is Grant Goodes from GuardSquare on security of mobile app voting. And a Texas man pleads guilty to conspiracy to commit money-laundering in the course of a BEC scam.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/108
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Nuisance-level hacktivism continues to surround US protests. The Higaisa APT is active in Southeast Asia. Goblin Panda is back, with USB-borne malware. A new strain of ransomware is described: “Tycoon.” The EU considers whether to sanction Russia over the GRU’s hack of Germany’s Bundestag. CISA launches a new public resource for cybersecurity. Zulfikar Ramzan from RSA on cybersecurity and digital risk in the context of pandemics. Our guest is Grant Goodes from GuardSquare on security of mobile app voting. And a Texas man pleads guilty to conspiracy to commit money-laundering in the course of a BEC scam.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/108</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1260</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[61283fc7-3c55-4808-83d4-190cdcef5aa1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6762730979.mp3?updated=1690206046" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Slacktivism and vandalism in a time of unrest. Ransomware operators continue to evolve. Email voting. Looking up how-to-guides to cybercrime during social isolation.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1101/notes</link>
      <description>Protest groups sustain DDoS attacks, too. Old school denial-of-service afflicts police radio networks in Chicago: they’re being jammed with talk, music, and other noise. Influencers and wannabes continue to use unrest as an occasion for on-line branding. The Sodinokibi gang is selling data stolen in ransomware attacks, and Maze seems to be establishing a criminal cartel. Is email to voting what shadow IT is to the enterprise? Ben Yelin describes a federal case involving police screenshots of a suspects’ phone as evidence. Our guest is Steve Durbin from the Information Security Forum on the Threat Horizon 2022 report. And cybercrime for dummies.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/107
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 03 Jun 2020 19:19:40 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1101</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5f4aa114-def8-11ea-911f-4f320ad613ae/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Protest groups sustain DDoS attacks, too. Old school denial-of-service afflicts police radio networks in Chicago: they’re being jammed with talk, music, and other noise. Influencers and wannabes continue to use unrest as an occasion for on-line...</itunes:subtitle>
      <itunes:summary>Protest groups sustain DDoS attacks, too. Old school denial-of-service afflicts police radio networks in Chicago: they’re being jammed with talk, music, and other noise. Influencers and wannabes continue to use unrest as an occasion for on-line branding. The Sodinokibi gang is selling data stolen in ransomware attacks, and Maze seems to be establishing a criminal cartel. Is email to voting what shadow IT is to the enterprise? Ben Yelin describes a federal case involving police screenshots of a suspects’ phone as evidence. Our guest is Steve Durbin from the Information Security Forum on the Threat Horizon 2022 report. And cybercrime for dummies.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/107
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Protest groups sustain DDoS attacks, too. Old school denial-of-service afflicts police radio networks in Chicago: they’re being jammed with talk, music, and other noise. Influencers and wannabes continue to use unrest as an occasion for on-line branding. The Sodinokibi gang is selling data stolen in ransomware attacks, and Maze seems to be establishing a criminal cartel. Is email to voting what shadow IT is to the enterprise? Ben Yelin describes a federal case involving police screenshots of a suspects’ phone as evidence. Our guest is Steve Durbin from the Information Security Forum on the Threat Horizon 2022 report. And cybercrime for dummies.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/107</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1279</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3e007e3e-8379-42ed-8649-d62c288fc842]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6297942581.mp3?updated=1690206033" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Current forms of hacktivism, misinformation, and disinformation. More recommendations from the Cyberspace Solarium. Fraud accompanies Test and Trace. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1100/notes</link>
      <description>Unrest accompanied by misinformation, disinformation, and Anonymous theater. Booter hacktivism. Extremist inauthenticity. The Cyberspace Solarium Commission releases its white paper on the pandemic’s lessons for cybersecurity. Joe Carrigan unpacks Casio executing a DMCA takedown on a hardware hack. Our guest is Herb Stapleton from the FBI on the 20 year anniversary of the IC3. And the UK’s Test and Trace system is expected to be accompanied by a wave of fraud. Actually, that fraud has already begun.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/106
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Jun 2020 19:10:11 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1100</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5f5ba842-def8-11ea-911f-ef9721b20e47/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Unrest accompanied by misinformation, disinformation, and Anonymous theater. Booter hacktivism. Extremist inauthenticity. The Cyberspace Solarium Commission releases its white paper on the pandemic’s lessons for cybersecurity. Joe Carrigan unpacks...</itunes:subtitle>
      <itunes:summary>Unrest accompanied by misinformation, disinformation, and Anonymous theater. Booter hacktivism. Extremist inauthenticity. The Cyberspace Solarium Commission releases its white paper on the pandemic’s lessons for cybersecurity. Joe Carrigan unpacks Casio executing a DMCA takedown on a hardware hack. Our guest is Herb Stapleton from the FBI on the 20 year anniversary of the IC3. And the UK’s Test and Trace system is expected to be accompanied by a wave of fraud. Actually, that fraud has already begun.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/106
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Unrest accompanied by misinformation, disinformation, and Anonymous theater. Booter hacktivism. Extremist inauthenticity. The Cyberspace Solarium Commission releases its white paper on the pandemic’s lessons for cybersecurity. Joe Carrigan unpacks Casio executing a DMCA takedown on a hardware hack. Our guest is Herb Stapleton from the FBI on the 20 year anniversary of the IC3. And the UK’s Test and Trace system is expected to be accompanied by a wave of fraud. Actually, that fraud has already begun.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/106</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1291</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[679323f3-0e2f-47d8-8305-a0a946855f9d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4282713756.mp3?updated=1690206022" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberattacks and hacktivism around Minnesota’s unrest. Amtrak breach. Port scanning. Some lessons from the pandemic.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1099/notes</link>
      <description>Hacking, and more claims of hacking, surround the unrest in Minnesota. Data breach at Amtrak Guest Rewards. More companies found port scanning. Four cybersecurity lessons from the pandemic. David Dufour from Webroot with an overview of online scams his team is tracking during COVID-19, Our own Rick Howard compares resiliency with business continuity. And a new 5G device is not only holographic, but quantum oscillatin’ too.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/105
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 01 Jun 2020 20:10:31 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1099</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5f7096c6-def8-11ea-911f-e30fc3303529/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hacking, and more claims of hacking, surround the unrest in Minnesota. Data breach at Amtrak Guest Rewards. More companies found port scanning. Four cybersecurity lessons from the pandemic. David Dufour from Webroot with an overview of online scams...</itunes:subtitle>
      <itunes:summary>Hacking, and more claims of hacking, surround the unrest in Minnesota. Data breach at Amtrak Guest Rewards. More companies found port scanning. Four cybersecurity lessons from the pandemic. David Dufour from Webroot with an overview of online scams his team is tracking during COVID-19, Our own Rick Howard compares resiliency with business continuity. And a new 5G device is not only holographic, but quantum oscillatin’ too.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/105
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hacking, and more claims of hacking, surround the unrest in Minnesota. Data breach at Amtrak Guest Rewards. More companies found port scanning. Four cybersecurity lessons from the pandemic. David Dufour from Webroot with an overview of online scams his team is tracking during COVID-19, Our own Rick Howard compares resiliency with business continuity. And a new 5G device is not only holographic, but quantum oscillatin’ too.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/105</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1235</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bfd8d789-1e17-4d52-bd29-3a118420b61c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7859707445.mp3?updated=1690206005" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Extending security tools to the at home workforce during the pandemic. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/cyberwire-x/6/notes</link>
      <description>In this episode of CyberWire-X, Rick Howard, the CyberWire’s Chief Analyst, interviews security thought leaders on the strategy and tactics to extend the security controls we’ve typically used to protect our handful of remote employees in the past to today, during the pandemic, that requires us to deploy flexible but equivalent controls at scale to everybody in the organization. Joining us is Bob Turner, CISO of the University of Wisconsin at Madison. Later in the program, we will hear from Mounir Hahad, the head of Threat Labs, and Mike Spanbauer, a security evangelist, at Juniper Networks, the sponsor of the show. Thanks to our sponsor, Juniper Networks. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 31 May 2020 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/30df1cca-df01-11ea-a18f-5799d360e27f/image/cyberwire-x-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this episode of CyberWire-X, Rick Howard, the CyberWire’s Chief Analyst, interviews security thought leaders on the strategy and tactics to extend the security controls we’ve typically used to protect our handful of remote employees in the past...</itunes:subtitle>
      <itunes:summary>In this episode of CyberWire-X, Rick Howard, the CyberWire’s Chief Analyst, interviews security thought leaders on the strategy and tactics to extend the security controls we’ve typically used to protect our handful of remote employees in the past to today, during the pandemic, that requires us to deploy flexible but equivalent controls at scale to everybody in the organization. Joining us is Bob Turner, CISO of the University of Wisconsin at Madison. Later in the program, we will hear from Mounir Hahad, the head of Threat Labs, and Mike Spanbauer, a security evangelist, at Juniper Networks, the sponsor of the show. Thanks to our sponsor, Juniper Networks. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of CyberWire-X, Rick Howard, the CyberWire’s Chief Analyst, interviews security thought leaders on the strategy and tactics to extend the security controls we’ve typically used to protect our handful of remote employees in the past to today, during the pandemic, that requires us to deploy flexible but equivalent controls at scale to everybody in the organization. Joining us is Bob Turner, CISO of the University of Wisconsin at Madison. Later in the program, we will hear from Mounir Hahad, the head of Threat Labs, and Mike Spanbauer, a security evangelist, at Juniper Networks, the sponsor of the show. Thanks to our sponsor, <a href="http://www.juniper.net/enterpriseathome">Juniper Networks</a>. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1762</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[520cf3d1-075d-4ce1-91e5-fb2ef9bae8b1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2903054408.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Twofold snooping venture. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/137/notes</link>
      <description>Working with many different honeypot implementations, a security researcher did an experiment expanding on that setting up a simple docker image with SSH, running a guessable root password. The catch? What happened in the next 24 hours was unexpected.
Joining us in this week's Research Saturday to talk about his experiment is Larry Cashdollar of Akamai. 
The research can be found here: 
 A Brief History of a Rootable Docker Image
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 May 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>137</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/45cfd60c-df14-11ea-98a8-c3ccceddb00d/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Working with many different honeypot implementations, a security researcher did an experiment expanding on that setting up a simple docker image with SSH, running a guessable root password. The catch? What happened in the next 24 hours was unexpected....</itunes:subtitle>
      <itunes:summary>Working with many different honeypot implementations, a security researcher did an experiment expanding on that setting up a simple docker image with SSH, running a guessable root password. The catch? What happened in the next 24 hours was unexpected.
Joining us in this week's Research Saturday to talk about his experiment is Larry Cashdollar of Akamai. 
The research can be found here: 
 A Brief History of a Rootable Docker Image
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Working with many different honeypot implementations, a security researcher did an experiment expanding on that setting up a simple docker image with SSH, running a guessable root password. The catch? What happened in the next 24 hours was unexpected.</p><p>Joining us in this week's Research Saturday to talk about his experiment is Larry Cashdollar of Akamai. </p><p>The research can be found here: </p><p><a href="https://blogs.akamai.com/sitr/2020/04/a-brief-history-of-a-rootable-docker-image.html"> A Brief History of a Rootable Docker Image</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1208</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01e85aaa-68b0-492e-b5d3-6c3f71e5f85e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2894310266.mp3?updated=1685107864" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sandworm is out and about, so patch already. Steganography used in attacks on industrial targets. An Executive Order on Preventing Online Censorship. Breaches, ransomware, and lessons.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1098/notes</link>
      <description>NSA warns that the GRU’s Sandworm outfit has been actively exploiting a known vulnerability in Exim. Someone is attacking industrial targets in Japan and Europe using steganography and other evasive tactics. NTT Communications is breached, and Michigan State University sustains a ransomware attack. Ben Yelin unpacks the President’s executive order aimed at social media companies. Our guest is Vik Arora of the Hospital for Special Surgery on protecting health care organizations during COVID-19.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/104
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 29 May 2020 19:32:22 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1098</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5f85bdc6-def8-11ea-911f-77d6194b472c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>NSA warns that the GRU’s Sandworm outfit has been actively exploiting a known vulnerability in Exim. Someone is attacking industrial targets in Japan and Europe using steganography and other evasive tactics. NTT Communications is breached, and...</itunes:subtitle>
      <itunes:summary>NSA warns that the GRU’s Sandworm outfit has been actively exploiting a known vulnerability in Exim. Someone is attacking industrial targets in Japan and Europe using steganography and other evasive tactics. NTT Communications is breached, and Michigan State University sustains a ransomware attack. Ben Yelin unpacks the President’s executive order aimed at social media companies. Our guest is Vik Arora of the Hospital for Special Surgery on protecting health care organizations during COVID-19.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/104
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>NSA warns that the GRU’s Sandworm outfit has been actively exploiting a known vulnerability in Exim. Someone is attacking industrial targets in Japan and Europe using steganography and other evasive tactics. NTT Communications is breached, and Michigan State University sustains a ransomware attack. Ben Yelin unpacks the President’s executive order aimed at social media companies. Our guest is Vik Arora of the Hospital for Special Surgery on protecting health care organizations during COVID-19.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/104</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1490</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7cd7dd16-6dd5-4065-a40b-c38fe2b29de5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8250596454.mp3?updated=1608756481" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hackers for hire. A bulk power distribution risk? An Executive Order on social media is under consideration. COVID-19 and cybersecurity.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1097/notes</link>
      <description>Hackers-for-hire find criminal work during the pandemic. The US Department of Energy is said to have taken possession of a Chinese-manufactured transformer. US President Trump may be considering an Executive Order about the legal status of social media. Contact-tracing apps in France and the UK are scrutinized for privacy. Ben Yelin from with the latest iPhone cracking case between the FBI and Apple. Our guest is retired CIA master of disguise Jonna Mendez on her book The Moscow Rules. Canada’s Centre for Cyber Security assesses current risks, and Huawei’s CFO loses a round in a Vancouver court.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/103
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 28 May 2020 20:05:01 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1097</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5fa5ef9c-def8-11ea-911f-dfa5124054cc/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hackers-for-hire find criminal work during the pandemic. The US Department of Energy is said to have taken possession of a Chinese-manufactured transformer. US President Trump may be considering an Executive Order about the legal status of social...</itunes:subtitle>
      <itunes:summary>Hackers-for-hire find criminal work during the pandemic. The US Department of Energy is said to have taken possession of a Chinese-manufactured transformer. US President Trump may be considering an Executive Order about the legal status of social media. Contact-tracing apps in France and the UK are scrutinized for privacy. Ben Yelin from with the latest iPhone cracking case between the FBI and Apple. Our guest is retired CIA master of disguise Jonna Mendez on her book The Moscow Rules. Canada’s Centre for Cyber Security assesses current risks, and Huawei’s CFO loses a round in a Vancouver court.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/103
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hackers-for-hire find criminal work during the pandemic. The US Department of Energy is said to have taken possession of a Chinese-manufactured transformer. US President Trump may be considering an Executive Order about the legal status of social media. Contact-tracing apps in France and the UK are scrutinized for privacy. Ben Yelin from with the latest iPhone cracking case between the FBI and Apple. Our guest is retired CIA master of disguise Jonna Mendez on her book The Moscow Rules. Canada’s Centre for Cyber Security assesses current risks, and Huawei’s CFO loses a round in a Vancouver court.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/103</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1293</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0549a7de-ad7f-47a0-8f7e-865847f50988]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7352515409.mp3?updated=1690205978" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Berserk Bear is back, and still loves that critical infrastructure honey. COVID-19 apps: good, bad, and bogus. Android issues discovered. A FIN7 arrest. Mr. Faraday’s underwear.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1096/notes</link>
      <description>Berserk Bear is back, and snuffling around Germany’s infrastructure. Two new Android issues surface. India opens up the source code for its COVID-19 contact-tracing app as such technological adjuncts to public health continue to arouse privacy concerns. [F]Unicorn poses as Italy’s Immuni app. An alleged FIN7 gangster is arrested. Australia’s Data61 urges companies not to scrimp on R&amp;D. Joe Carrigan on Android mobile malware getting new features. Our guest is Frederick “Flee” Lee from Gusto on CCPA. And does your underwear come with a Faraday cage? We thought it might.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/102
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 27 May 2020 20:00:55 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1096</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5fbce940-def8-11ea-911f-67058e822af7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Berserk Bear is back, and snuffling around Germany’s infrastructure. Two new Android issues surface. India opens up the source code for its COVID-19 contact-tracing app as such technological adjuncts to public health continue to arouse privacy...</itunes:subtitle>
      <itunes:summary>Berserk Bear is back, and snuffling around Germany’s infrastructure. Two new Android issues surface. India opens up the source code for its COVID-19 contact-tracing app as such technological adjuncts to public health continue to arouse privacy concerns. [F]Unicorn poses as Italy’s Immuni app. An alleged FIN7 gangster is arrested. Australia’s Data61 urges companies not to scrimp on R&amp;D. Joe Carrigan on Android mobile malware getting new features. Our guest is Frederick “Flee” Lee from Gusto on CCPA. And does your underwear come with a Faraday cage? We thought it might.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/102
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Berserk Bear is back, and snuffling around Germany’s infrastructure. Two new Android issues surface. India opens up the source code for its COVID-19 contact-tracing app as such technological adjuncts to public health continue to arouse privacy concerns. [F]Unicorn poses as Italy’s Immuni app. An alleged FIN7 gangster is arrested. Australia’s Data61 urges companies not to scrimp on R&amp;D. Joe Carrigan on Android mobile malware getting new features. Our guest is Frederick “Flee” Lee from Gusto on CCPA. And does your underwear come with a Faraday cage? We thought it might.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/102</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1292</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3f66d7e2-ae3f-47cb-ac9e-dc7006e3495f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8031362313.mp3?updated=1690205966" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The evolution of malware, both criminal and state-run.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1095/notes</link>
      <description>Turla tunes its tools. The commodity Trojan AnarchyGrabber is now stealing passwords. A new iOS jailbreak has been released. The UK reconsiders its decision to allow Huawei into its 5G networks. A tech group lobbies the US House against warrantless inspection of searches. Remote work’s regulatory risk. COVID-19 conspiracy theories. Hackers say they’re vigilantes. Our own Rick Howard on intrusion kill chains, his latest episode of CSO Perspectives. Our guest is Nico Fischbach from Forcepoint on deepfakes expanding outside of disinformation campaigns to the enterprise. And too many remote workers appear to have too much time on their hands.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/101
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 May 2020 18:31:16 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1095</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5fdd6116-def8-11ea-911f-732aef6201a5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Turla tunes its tools. The commodity Trojan AnarchyGrabber is now stealing passwords. A new iOS jailbreak has been released. The UK reconsiders its decision to allow Huawei into its 5G networks. A tech group lobbies the US House against warrantless...</itunes:subtitle>
      <itunes:summary>Turla tunes its tools. The commodity Trojan AnarchyGrabber is now stealing passwords. A new iOS jailbreak has been released. The UK reconsiders its decision to allow Huawei into its 5G networks. A tech group lobbies the US House against warrantless inspection of searches. Remote work’s regulatory risk. COVID-19 conspiracy theories. Hackers say they’re vigilantes. Our own Rick Howard on intrusion kill chains, his latest episode of CSO Perspectives. Our guest is Nico Fischbach from Forcepoint on deepfakes expanding outside of disinformation campaigns to the enterprise. And too many remote workers appear to have too much time on their hands.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://www.thecyberwire.com/newsletters/daily-briefing/9/101
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Turla tunes its tools. The commodity Trojan AnarchyGrabber is now stealing passwords. A new iOS jailbreak has been released. The UK reconsiders its decision to allow Huawei into its 5G networks. A tech group lobbies the US House against warrantless inspection of searches. Remote work’s regulatory risk. COVID-19 conspiracy theories. Hackers say they’re vigilantes. Our own Rick Howard on intrusion kill chains, his latest episode of CSO Perspectives. Our guest is Nico Fischbach from Forcepoint on deepfakes expanding outside of disinformation campaigns to the enterprise. And too many remote workers appear to have too much time on their hands.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://www.thecyberwire.com/newsletters/daily-briefing/9/101</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1215</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[54b0561c-4e95-40f8-8438-3154d4081bcd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5594583860.mp3?updated=1690205955" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Naming and shaming is the worst thing we can do. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/136/notes</link>
      <description>In December 2019, the GOLD VILLAGE threat group that operates the Maze ransomware created a public website to name and shame victims. The threat actors used the website to dump data they exfiltrated from victims' networks before they deployed the ransomware. Secureworks Counter Threat Unit (CTU) researchers have observed several ransomware operators following suit.
Joining us in this week's Research Saturday is Alex Tilley of SecureWorks' Counter Threat Unit. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 May 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>136</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/4119700a-df14-11ea-b61d-bb7c98dfe0cf/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In December 2019, the GOLD VILLAGE threat group that operates the Maze ransomware created a public website to name and shame victims. The threat actors used the website to dump data they exfiltrated from victims' networks before they deployed the...</itunes:subtitle>
      <itunes:summary>In December 2019, the GOLD VILLAGE threat group that operates the Maze ransomware created a public website to name and shame victims. The threat actors used the website to dump data they exfiltrated from victims' networks before they deployed the ransomware. Secureworks Counter Threat Unit (CTU) researchers have observed several ransomware operators following suit.
Joining us in this week's Research Saturday is Alex Tilley of SecureWorks' Counter Threat Unit. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In December 2019, the GOLD VILLAGE threat group that operates the Maze ransomware created a public website to name and shame victims. The threat actors used the website to dump data they exfiltrated from victims' networks before they deployed the ransomware. Secureworks Counter Threat Unit (CTU) researchers have observed several ransomware operators following suit.</p><p>Joining us in this week's Research Saturday is Alex Tilley of SecureWorks' Counter Threat Unit. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1579</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d7fb2432-3bfb-45e8-9cd9-52844549f22a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6804230321.mp3?updated=1685107860" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An election database leaks. Phishing from Firebase. Shiny Hunters sell Mathway user records. COVID-19-themed scams. On that return to the office thing... </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1094/notes</link>
      <description>Indonesia’s election database has leaked, and PII is for sale in the dark web. Phishing campaigns abuse Firebase. The Shiny Hunters are selling Mathway user records. US agencies warn of COVID-19-themed criminal campaigns. Contact tracing technology hits a rough patch. Johannes Ullrich from SANS on phishing PDFs with incremental updates. Our guest is author Peter Singer on his new book, Burn-In. And what are you going to do when you return to the workplace? If, that is, you’ve left the workplace at all, and if you’re in fact ever going to return?
 For links to all of today's stories check out our CyberWire daily news brief:
 https://www.thecyberwire.com/newsletters/daily-briefing/9/100
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 22 May 2020 19:54:45 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1094</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5ffad80e-def8-11ea-911f-3fa735027d4e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Indonesia’s election database has leaked, and PII is for sale in the dark web. Phishing campaigns abuse Firebase. The Shiny Hunters are selling Mathway user records. US agencies warn of COVID-19-themed criminal campaigns. Contact tracing technology...</itunes:subtitle>
      <itunes:summary>Indonesia’s election database has leaked, and PII is for sale in the dark web. Phishing campaigns abuse Firebase. The Shiny Hunters are selling Mathway user records. US agencies warn of COVID-19-themed criminal campaigns. Contact tracing technology hits a rough patch. Johannes Ullrich from SANS on phishing PDFs with incremental updates. Our guest is author Peter Singer on his new book, Burn-In. And what are you going to do when you return to the workplace? If, that is, you’ve left the workplace at all, and if you’re in fact ever going to return?
 For links to all of today's stories check out our CyberWire daily news brief:
 https://www.thecyberwire.com/newsletters/daily-briefing/9/100
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Indonesia’s election database has leaked, and PII is for sale in the dark web. Phishing campaigns abuse Firebase. The Shiny Hunters are selling Mathway user records. US agencies warn of COVID-19-themed criminal campaigns. Contact tracing technology hits a rough patch. Johannes Ullrich from SANS on phishing PDFs with incremental updates. Our guest is author Peter Singer on his new book, Burn-In. And what are you going to do when you return to the workplace? If, that is, you’ve left the workplace at all, and if you’re in fact ever going to return?</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p><a href="https://www.thecyberwire.com/newsletters/daily-briefing/9/100">https://www.thecyberwire.com/newsletters/daily-briefing/9/100</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1533</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6419b0d4-8c7f-4fc9-ae94-9610b5ba6424]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9904403560.mp3?updated=1608756461" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberwar, cybercrime, and hacktivism: updates on all three. Contact tracing and its discontents. Cybersecurity economic trends during the pandemic. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1093/notes</link>
      <description>Website defacements in Israel may be hacktivist work. Iranian cyberespionage against Saudi Arabia and Kuwait. The latest evolution of ZeuS. The Winnti Group is still hacking, and it still likes stealing in-game commodities. Contact tracing during the pandemic proves harder than many thought it would be. Economic trends for the security sector as it prepares to emerge from the general state of emergency. Caleb Barlow wonders if GDPR may have unintended consequences for stopping COVID-19 scammers. Gabriel Bassett from Verizon on the 2020 DBIR. And if you’re looking for qualified workers, follow the layoff news.
 For links to all of today's stories check out our CyberWire daily news brief:
 https://www.thecyberwire.com/newsletters/daily-briefing/9/98
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 21 May 2020 18:17:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1093</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6018c832-def8-11ea-911f-3300b879c601/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Website defacements in Israel may be hacktivist work. Iranian cyberespionage against Saudi Arabia and Kuwait. The latest evolution of ZeuS. The Winnti Group is still hacking, and it still likes stealing in-game commodities. Contact tracing during the...</itunes:subtitle>
      <itunes:summary>Website defacements in Israel may be hacktivist work. Iranian cyberespionage against Saudi Arabia and Kuwait. The latest evolution of ZeuS. The Winnti Group is still hacking, and it still likes stealing in-game commodities. Contact tracing during the pandemic proves harder than many thought it would be. Economic trends for the security sector as it prepares to emerge from the general state of emergency. Caleb Barlow wonders if GDPR may have unintended consequences for stopping COVID-19 scammers. Gabriel Bassett from Verizon on the 2020 DBIR. And if you’re looking for qualified workers, follow the layoff news.
 For links to all of today's stories check out our CyberWire daily news brief:
 https://www.thecyberwire.com/newsletters/daily-briefing/9/98
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Website defacements in Israel may be hacktivist work. Iranian cyberespionage against Saudi Arabia and Kuwait. The latest evolution of ZeuS. The Winnti Group is still hacking, and it still likes stealing in-game commodities. Contact tracing during the pandemic proves harder than many thought it would be. Economic trends for the security sector as it prepares to emerge from the general state of emergency. Caleb Barlow wonders if GDPR may have unintended consequences for stopping COVID-19 scammers. Gabriel Bassett from Verizon on the 2020 DBIR. And if you’re looking for qualified workers, follow the layoff news.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p>https://www.thecyberwire.com/newsletters/daily-briefing/9/98</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1321</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ad585a1d-fcdb-4e29-9f1a-0c482b0046cd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1455292505.mp3?updated=1690205220" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber espionage: many operations and many targets. Misinformation and online fraud during the pandemic. Beer and conviviality versus operational security.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1092/notes</link>
      <description>Cyber spies steal prototype missile data. Others hack into South Asian telecoms, and still others go after easyJet passengers’ travel data. Cyberattacks, misinformation, and cyber fraud continue to follow the COVID-19 pandemic. Joe Carrigan weighs in on the Thunderspy vulnerability. Our guest is James Dawson with insights on DMARK threats and why it’s worse during COVID-19. And think twice before you post, no matter how good or bad you think the beer is.
 For links to all of today's stories check out our CyberWire daily news brief:
 https://www.thecyberwire.com/newsletters/daily-briefing/9/98
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 20 May 2020 19:12:06 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1092</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/602e4c0c-def8-11ea-911f-0f2f3a971211/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyber spies steal prototype missile data. Others hack into South Asian telecoms, and still others go after easyJet passengers’ travel data. Cyberattacks, misinformation, and cyber fraud continue to follow the COVID-19 pandemic. Joe Carrigan weighs...</itunes:subtitle>
      <itunes:summary>Cyber spies steal prototype missile data. Others hack into South Asian telecoms, and still others go after easyJet passengers’ travel data. Cyberattacks, misinformation, and cyber fraud continue to follow the COVID-19 pandemic. Joe Carrigan weighs in on the Thunderspy vulnerability. Our guest is James Dawson with insights on DMARK threats and why it’s worse during COVID-19. And think twice before you post, no matter how good or bad you think the beer is.
 For links to all of today's stories check out our CyberWire daily news brief:
 https://www.thecyberwire.com/newsletters/daily-briefing/9/98
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber spies steal prototype missile data. Others hack into South Asian telecoms, and still others go after easyJet passengers’ travel data. Cyberattacks, misinformation, and cyber fraud continue to follow the COVID-19 pandemic. Joe Carrigan weighs in on the Thunderspy vulnerability. Our guest is James Dawson with insights on DMARK threats and why it’s worse during COVID-19. And think twice before you post, no matter how good or bad you think the beer is.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p>https://www.thecyberwire.com/newsletters/daily-briefing/9/98</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1309</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2b8cea2f-8eca-467a-9025-2208cc730c21]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4084412353.mp3?updated=1690205157" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber conflict in the Middle East. EasyJet breached. More errors than exploits. The Dark Web during the pandemic. 5G misinformation. REvil updates. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1091/notes</link>
      <description>Foreign intelligence services attribute a recent cyberattack on an Iranian port to Israeli operators. EasyJet discloses a breach of passenger information. Verizon’s annual Data Breach Report is out, and it finds more errors than it does exploits. A look at the Dark Web during the pandemic. US authorities warn local law enforcement to watch for misinformation-driven telecom vandalism. Ben Yelin explains why the ACLU is suing Baltimore over a surveillance plane. Our guest is Robb Reck from Ping Identity on a recent CISO Advisory Council meeting regarding the sudden shift to working from home. And REvil is still offering celebrity dirt for sale...if they’ve actually got any.
 For links to all of today's stories check out our CyberWire daily news brief:
 https://www.thecyberwire.com/newsletters/daily-briefing/9/97
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 May 2020 18:29:53 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1091</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6043e79c-def8-11ea-911f-f38851527d0f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Foreign intelligence services attribute a recent cyberattack on an Iranian port to Israeli operators. EasyJet discloses a breach of passenger information. Verizon’s annual Data Breach Report is out, and it finds more errors than it does exploits. A...</itunes:subtitle>
      <itunes:summary>Foreign intelligence services attribute a recent cyberattack on an Iranian port to Israeli operators. EasyJet discloses a breach of passenger information. Verizon’s annual Data Breach Report is out, and it finds more errors than it does exploits. A look at the Dark Web during the pandemic. US authorities warn local law enforcement to watch for misinformation-driven telecom vandalism. Ben Yelin explains why the ACLU is suing Baltimore over a surveillance plane. Our guest is Robb Reck from Ping Identity on a recent CISO Advisory Council meeting regarding the sudden shift to working from home. And REvil is still offering celebrity dirt for sale...if they’ve actually got any.
 For links to all of today's stories check out our CyberWire daily news brief:
 https://www.thecyberwire.com/newsletters/daily-briefing/9/97
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Foreign intelligence services attribute a recent cyberattack on an Iranian port to Israeli operators. EasyJet discloses a breach of passenger information. Verizon’s annual Data Breach Report is out, and it finds more errors than it does exploits. A look at the Dark Web during the pandemic. US authorities warn local law enforcement to watch for misinformation-driven telecom vandalism. Ben Yelin explains why the ACLU is suing Baltimore over a surveillance plane. Our guest is Robb Reck from Ping Identity on a recent CISO Advisory Council meeting regarding the sudden shift to working from home. And REvil is still offering celebrity dirt for sale...if they’ve actually got any.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p><a href="https://www.thecyberwire.com/newsletters/daily-briefing/9/97">https://www.thecyberwire.com/newsletters/daily-briefing/9/97</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1296</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[accf6f0e-3643-4348-a2d9-dfa2139f90eb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5408633347.mp3?updated=1690205144" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Supercomputers as cryptomining rigs. UK grid operator recovers from hack. EU Parliament data exposure. REvil ransomware gang promises dirty laundry. US-China conflict. Catphishing. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1090/notes</link>
      <description>European supercomputers were hacked by cryptominers. UK electrical power distributor recovers from its cyberattack. A database containing personal data related to the EU Parliament is found exposed. REvil says it’s got the celebrity goods, but has yet to show its hand. The US and China move into a new round of trade and security conflict. Justin Harvey shares insights on how companies are adjusting to the new remote working environment and the impacts to their security posture. Our guest is Ehsan Foroughi from SecurityCompass on compliance issues. And catphishing with some pretty implausible impersonations of US Army generals.
 For links to all of today's stories check out our CyberWire daily news brief:
 https://thecyberwire.com/newsletters/daily-briefing/9/96
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 18 May 2020 19:08:04 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1090</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6058c018-def8-11ea-911f-cf0f96a42872/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>European supercomputers were hacked by cryptominers. UK electrical power distributor recovers from its cyberattack. A database containing personal data related to the EU Parliament is found exposed. REvil says it’s got the celebrity goods, but has...</itunes:subtitle>
      <itunes:summary>European supercomputers were hacked by cryptominers. UK electrical power distributor recovers from its cyberattack. A database containing personal data related to the EU Parliament is found exposed. REvil says it’s got the celebrity goods, but has yet to show its hand. The US and China move into a new round of trade and security conflict. Justin Harvey shares insights on how companies are adjusting to the new remote working environment and the impacts to their security posture. Our guest is Ehsan Foroughi from SecurityCompass on compliance issues. And catphishing with some pretty implausible impersonations of US Army generals.
 For links to all of today's stories check out our CyberWire daily news brief:
 https://thecyberwire.com/newsletters/daily-briefing/9/96
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>European supercomputers were hacked by cryptominers. UK electrical power distributor recovers from its cyberattack. A database containing personal data related to the EU Parliament is found exposed. REvil says it’s got the celebrity goods, but has yet to show its hand. The US and China move into a new round of trade and security conflict. Justin Harvey shares insights on how companies are adjusting to the new remote working environment and the impacts to their security posture. Our guest is Ehsan Foroughi from SecurityCompass on compliance issues. And catphishing with some pretty implausible impersonations of US Army generals.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p><a href="https://thecyberwire.com/newsletters/daily-briefing/9/96">https://thecyberwire.com/newsletters/daily-briefing/9/96</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1276</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[31e61c1d-239c-4fce-868a-e206a1b4ddd0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5431128495.mp3?updated=1690205133" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Gangnam Industrial Style APT campaign targets South Korea. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/135/notes</link>
      <description>Section 52, CyberX’s threat intelligence team, has uncovered an ongoing industrial cyberespionage campaign targeting hundreds of manufacturing and other industrial firms primarily located in South Korea. CyberX has identified more than 200 compromised systems from this campaign, including one belonging to a multi-billion dollar Korean conglomerate that manufactures critical infrastructure equipment such as heavy equipment for power transmission and distribution facilities, renewable energy, chemical plants, welding, and construction.
Joining us in this week's Research Saturday is Phil Neray, one of the authors of this report. 
The research can be found here:
 Gangnam Industrial Style: APT Campaign Targets Korean Industrial Companies
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 May 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>135</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/3ff90b7c-df14-11ea-b170-57b7c450e863/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Section 52, CyberX’s threat intelligence team, has uncovered an ongoing industrial cyberespionage campaign targeting hundreds of manufacturing and other industrial firms primarily located in South Korea. CyberX has identified more than 200...</itunes:subtitle>
      <itunes:summary>Section 52, CyberX’s threat intelligence team, has uncovered an ongoing industrial cyberespionage campaign targeting hundreds of manufacturing and other industrial firms primarily located in South Korea. CyberX has identified more than 200 compromised systems from this campaign, including one belonging to a multi-billion dollar Korean conglomerate that manufactures critical infrastructure equipment such as heavy equipment for power transmission and distribution facilities, renewable energy, chemical plants, welding, and construction.
Joining us in this week's Research Saturday is Phil Neray, one of the authors of this report. 
The research can be found here:
 Gangnam Industrial Style: APT Campaign Targets Korean Industrial Companies
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Section 52, CyberX’s threat intelligence team, has uncovered an ongoing industrial cyberespionage campaign targeting hundreds of manufacturing and other industrial firms primarily located in South Korea. CyberX has identified more than 200 compromised systems from this campaign, including one belonging to a multi-billion dollar Korean conglomerate that manufactures critical infrastructure equipment such as heavy equipment for power transmission and distribution facilities, renewable energy, chemical plants, welding, and construction.</p><p>Joining us in this week's Research Saturday is Phil Neray, one of the authors of this report. </p><p>The research can be found here:</p><p><a href="https://cyberx-labs.com/blog/gangnam-industrial-style-apt-campaign-targets-korean-industrial-companies/"> Gangnam Industrial Style: APT Campaign Targets Korean Industrial Companies</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1194</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11b54ed6-33f2-4a60-a125-d42ee32277d2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1703746193.mp3?updated=1685107843" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Malware versus air-gapped systems. Ransomware against utilities and hospitals. Lessons for cybersecurity from the pandemic response. Outlaw blues.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1089/notes</link>
      <description>More malware designed for air-gapped systems. A British utility sustains a ransomware attack. The US Cyberspace Solarium Commission sees lessons in the pandemic for cybersecurity. Contact-tracing technologies take a step back,maybe a step or two forward. Rob Lee from Dragos comparing the state of ICS security around the world, our guest is Ian Pitt from LogMeIn on lessons learned working remotely during COVID-19. Criminals increase ransomware attacks on hospitals, and swap templates to impersonate government relief agencies.
 For links to all of today's stories check out our CyberWire daily news brief:
 https://thecyberwire.com/newsletters/daily-briefing/9/95
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 15 May 2020 18:55:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1089</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/606c3206-def8-11ea-911f-af5a8a929038/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>More malware designed for air-gapped systems. A British utility sustains a ransomware attack. The US Cyberspace Solarium Commission sees lessons in the pandemic for cybersecurity. Contact-tracing technologies take a step back,maybe a step or two...</itunes:subtitle>
      <itunes:summary>More malware designed for air-gapped systems. A British utility sustains a ransomware attack. The US Cyberspace Solarium Commission sees lessons in the pandemic for cybersecurity. Contact-tracing technologies take a step back,maybe a step or two forward. Rob Lee from Dragos comparing the state of ICS security around the world, our guest is Ian Pitt from LogMeIn on lessons learned working remotely during COVID-19. Criminals increase ransomware attacks on hospitals, and swap templates to impersonate government relief agencies.
 For links to all of today's stories check out our CyberWire daily news brief:
 https://thecyberwire.com/newsletters/daily-briefing/9/95
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>More malware designed for air-gapped systems. A British utility sustains a ransomware attack. The US Cyberspace Solarium Commission sees lessons in the pandemic for cybersecurity. Contact-tracing technologies take a step back,maybe a step or two forward. Rob Lee from Dragos comparing the state of ICS security around the world, our guest is Ian Pitt from LogMeIn on lessons learned working remotely during COVID-19. Criminals increase ransomware attacks on hospitals, and swap templates to impersonate government relief agencies.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p><a href="https://thecyberwire.com/newsletters/daily-briefing/9/95">https://thecyberwire.com/newsletters/daily-briefing/9/95</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1495</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3a7a982d-8e45-4a78-ab3a-cedbe78bb0d2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9666041791.mp3?updated=1608756481" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ARCHER incident. Contact tracing smishing. Malware vs. air gaps. A surcharge for deletion. Anti-creepware. 5G coronavirus delusions. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1088/notes</link>
      <description>ARCHER goes offline after a security incident. Scammers smish victims with bogus contact-tracing messages. Ramsay malware goes after air-gapped systems. Ako ransomware now places a surcharge on deletion of stolen data. Google boots creepware apps with the help of the CreepRank algorithm. Johannes Ullrich explains that when it comes to malicious binaries bypassing anti-malware filters, size matters. Our guest is Pat Craven, Director of the Center for Cyber Safety and Education on the security social media apps. And kooky 5G conspiracists go after cell towers in the US.
 For links to all of today's stories check out our CyberWire daily news brief:
 https://thecyberwire.com/newsletters/daily-briefing/9/93
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 14 May 2020 19:00:32 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1088</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6081afdc-def8-11ea-911f-6353d83d87bd/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>ARCHER goes offline after a security incident. Scammers smish victims with bogus contact-tracing messages. Ramsay malware goes after air-gapped systems. Ako ransomware now places a surcharge on deletion of stolen data. Google boots creepware apps with...</itunes:subtitle>
      <itunes:summary>ARCHER goes offline after a security incident. Scammers smish victims with bogus contact-tracing messages. Ramsay malware goes after air-gapped systems. Ako ransomware now places a surcharge on deletion of stolen data. Google boots creepware apps with the help of the CreepRank algorithm. Johannes Ullrich explains that when it comes to malicious binaries bypassing anti-malware filters, size matters. Our guest is Pat Craven, Director of the Center for Cyber Safety and Education on the security social media apps. And kooky 5G conspiracists go after cell towers in the US.
 For links to all of today's stories check out our CyberWire daily news brief:
 https://thecyberwire.com/newsletters/daily-briefing/9/93
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>ARCHER goes offline after a security incident. Scammers smish victims with bogus contact-tracing messages. Ramsay malware goes after air-gapped systems. Ako ransomware now places a surcharge on deletion of stolen data. Google boots creepware apps with the help of the CreepRank algorithm. Johannes Ullrich explains that when it comes to malicious binaries bypassing anti-malware filters, size matters. Our guest is Pat Craven, Director of the Center for Cyber Safety and Education on the security social media apps. And kooky 5G conspiracists go after cell towers in the US.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p>https://thecyberwire.com/newsletters/daily-briefing/9/93</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1234</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d33fe39c-0371-4828-be2a-b15bf3eeb42d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9741363616.mp3?updated=1690205104" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More data theft by ransomware. Patch Tuesday notes. Espionage and possible data corruption against COVID-19 researchers. Be a role model for your AI.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1087/notes</link>
      <description>Ransomware continues to steal personal information. Notes on Patch Tuesday--and please, by all means patch. The FBI says it’s investigating cyberespionage directed against COVID-19 researchers (and US officials see direct data corruption in espionage). And the AI doesn’t really know what to make of us any more. Joe Carrigan from JHU ISI on Twitter’s response to 5G related Coronavirus conspiracy theories, our guest is Chris Cochran from Netflix on the importance of personal health and safety.
For links to all of today's stories check out our CyberWire daily news brief:
https://thecyberwire.com/newsletters/daily-briefing/9/93
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 13 May 2020 19:37:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1087</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/60973050-def8-11ea-911f-9f42377fd345/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ransomware continues to steal personal information. Notes on Patch Tuesday--and please, by all means patch. The FBI says it’s investigating cyberespionage directed against COVID-19 researchers (and US officials see direct data corruption in...</itunes:subtitle>
      <itunes:summary>Ransomware continues to steal personal information. Notes on Patch Tuesday--and please, by all means patch. The FBI says it’s investigating cyberespionage directed against COVID-19 researchers (and US officials see direct data corruption in espionage). And the AI doesn’t really know what to make of us any more. Joe Carrigan from JHU ISI on Twitter’s response to 5G related Coronavirus conspiracy theories, our guest is Chris Cochran from Netflix on the importance of personal health and safety.
For links to all of today's stories check out our CyberWire daily news brief:
https://thecyberwire.com/newsletters/daily-briefing/9/93
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ransomware continues to steal personal information. Notes on Patch Tuesday--and please, by all means patch. The FBI says it’s investigating cyberespionage directed against COVID-19 researchers (and US officials see direct data corruption in espionage). And the AI doesn’t really know what to make of us any more. Joe Carrigan from JHU ISI on Twitter’s response to 5G related Coronavirus conspiracy theories, our guest is Chris Cochran from Netflix on the importance of personal health and safety.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://thecyberwire.com/newsletters/daily-briefing/9/93</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1268</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[947f094b-a7af-441b-9607-73dd32658615]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8809910858.mp3?updated=1690205091" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberwar looms in the Middle East? Hidden Cobra’s fangs described. Evasive Astaroth. Ransomware in Texas courts. COVID-19 espionage. Content moderation.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1086/notes</link>
      <description>Unattributed cyberattacks in an Iranian port prompt speculation that a broader cyberwar in the Middle East may be in the offing. CISA releases malware analysis reports on North Korea’s Hidden Cobra. Astaroth malware grows more evasive (and it was already pretty good at hiding). Texas courts sustain a ransomware attack. COVID-19 espionage warnings are on the way. Twitter’s misinformation warning system. Ben Yelin describes a Fourth Amendment case on automated license plate reader (ALPR) databases. Our guest is Brian Dye from Corelight on dealing with encrypted traffic without compromising privacy. And taking down Plandemic’s trailer.
For links to all of today's stories check out our CyberWire daily news brief:
https://thecyberwire.com/newsletters/daily-briefing/9/92
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 May 2020 19:04:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1086</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/60ab51c0-def8-11ea-911f-5f5bc40fd5de/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Unattributed cyberattacks in an Iranian port prompt speculation that a broader cyberwar in the Middle East may be in the offing. CISA releases malware analysis reports on North Korea’s Hidden Cobra. Astaroth malware grows more evasive (and it was...</itunes:subtitle>
      <itunes:summary>Unattributed cyberattacks in an Iranian port prompt speculation that a broader cyberwar in the Middle East may be in the offing. CISA releases malware analysis reports on North Korea’s Hidden Cobra. Astaroth malware grows more evasive (and it was already pretty good at hiding). Texas courts sustain a ransomware attack. COVID-19 espionage warnings are on the way. Twitter’s misinformation warning system. Ben Yelin describes a Fourth Amendment case on automated license plate reader (ALPR) databases. Our guest is Brian Dye from Corelight on dealing with encrypted traffic without compromising privacy. And taking down Plandemic’s trailer.
For links to all of today's stories check out our CyberWire daily news brief:
https://thecyberwire.com/newsletters/daily-briefing/9/92
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Unattributed cyberattacks in an Iranian port prompt speculation that a broader cyberwar in the Middle East may be in the offing. CISA releases malware analysis reports on North Korea’s Hidden Cobra. Astaroth malware grows more evasive (and it was already pretty good at hiding). Texas courts sustain a ransomware attack. COVID-19 espionage warnings are on the way. Twitter’s misinformation warning system. Ben Yelin describes a Fourth Amendment case on automated license plate reader (ALPR) databases. Our guest is Brian Dye from Corelight on dealing with encrypted traffic without compromising privacy. And taking down Plandemic’s trailer.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p><a href="https://thecyberwire.com/newsletters/daily-briefing/9/92">https://thecyberwire.com/newsletters/daily-briefing/9/92</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1267</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a1c15d43-a48f-4da4-b3fc-f75f98069ed8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2593382502.mp3?updated=1690205077" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberattacks with kinetic consequences. Thunderspy and evil maids. Developing background to the US bulk power security executive order. Conspiracy theories and the culture of social media.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1085/notes</link>
      <description>A cyberattack with kinetic effect. Shiny Hunters post more stolen wares online. Thunderspy and evil maids. Some developing background to the US bulk power state-of-emergency Executive Order. Contact tracing apps: reliability, privacy, security, familiarity, and rates of adoption all raise questions. The economic consequences of the pandemic emergency. Caleb Barlow from CynergisTek on Alan Brunacini’s concept of an Incident Action Plan, our guest is James Yeager from CrowdStrike on their Global Threat Report. And the reappearance of the yellow press in social media.
For links to all of today's stories check out our CyberWire daily news brief:
https://thecyberwire.com/issues/issues2020/May/CyberWire_2020_05_11.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 11 May 2020 19:23:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1085</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/60bf97fc-def8-11ea-911f-b702d230d6d1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A cyberattack with kinetic effect. Shiny Hunters post more stolen wares online. Thunderspy and evil maids. Some developing background to the US bulk power state-of-emergency Executive Order. Contact tracing apps: reliability, privacy, security,...</itunes:subtitle>
      <itunes:summary>A cyberattack with kinetic effect. Shiny Hunters post more stolen wares online. Thunderspy and evil maids. Some developing background to the US bulk power state-of-emergency Executive Order. Contact tracing apps: reliability, privacy, security, familiarity, and rates of adoption all raise questions. The economic consequences of the pandemic emergency. Caleb Barlow from CynergisTek on Alan Brunacini’s concept of an Incident Action Plan, our guest is James Yeager from CrowdStrike on their Global Threat Report. And the reappearance of the yellow press in social media.
For links to all of today's stories check out our CyberWire daily news brief:
https://thecyberwire.com/issues/issues2020/May/CyberWire_2020_05_11.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A cyberattack with kinetic effect. Shiny Hunters post more stolen wares online. Thunderspy and evil maids. Some developing background to the US bulk power state-of-emergency Executive Order. Contact tracing apps: reliability, privacy, security, familiarity, and rates of adoption all raise questions. The economic consequences of the pandemic emergency. Caleb Barlow from CynergisTek on Alan Brunacini’s concept of an Incident Action Plan, our guest is James Yeager from CrowdStrike on their Global Threat Report. And the reappearance of the yellow press in social media.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://thecyberwire.com/issues/issues2020/May/CyberWire_2020_05_11.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1279</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[36e4f80f-5f07-48f2-ac63-5751d846224a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2496234465.mp3?updated=1690205065" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The U.S. campaign trail is actually quite secure. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/134/notes</link>
      <description>Multiple media reports have indicated that the United States’ (U.S.) 2020 general election could be targeted by foreign and domestic actors after the successful cyber and misinformation attacks during the 2016 general election. The responsibility of secure and ethical online campaigning has become a central issue in the 2020 election. In some cases, it has become part of candidate platforms.
Joining us in this week's Research Saturday is Paul Gagliardi from Security Scorecard, discussing their recent report detailing the cybersecurity of the 2020 Presidential race. 
The research can be found here:
 2020 Democratic Presidential Candidates Get Smart to Cybersecurity Report
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 May 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>134</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/3c755140-df14-11ea-8499-4b5076559143/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Multiple media reports have indicated that the United States’ (U.S.) 2020 general election could be targeted by foreign and domestic actors after the successful cyber and misinformation attacks during the 2016 general election. The responsibility of...</itunes:subtitle>
      <itunes:summary>Multiple media reports have indicated that the United States’ (U.S.) 2020 general election could be targeted by foreign and domestic actors after the successful cyber and misinformation attacks during the 2016 general election. The responsibility of secure and ethical online campaigning has become a central issue in the 2020 election. In some cases, it has become part of candidate platforms.
Joining us in this week's Research Saturday is Paul Gagliardi from Security Scorecard, discussing their recent report detailing the cybersecurity of the 2020 Presidential race. 
The research can be found here:
 2020 Democratic Presidential Candidates Get Smart to Cybersecurity Report
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Multiple media reports have indicated that the United States’ (U.S.) 2020 general election could be targeted by foreign and domestic actors after the successful cyber and misinformation attacks during the 2016 general election. The responsibility of secure and ethical online campaigning has become a central issue in the 2020 election. In some cases, it has become part of candidate platforms.</p><p>Joining us in this week's Research Saturday is Paul Gagliardi from Security Scorecard, discussing their recent report detailing the cybersecurity of the 2020 Presidential race. </p><p>The research can be found here:</p><p><a href="https://securityscorecard.com/resources/democratic-candidate-report-2020"> 2020 Democratic Presidential Candidates Get Smart to Cybersecurity Report</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1287</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9fe8637a-284b-44ab-8a5a-e61e79465911]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6175244805.mp3?updated=1685107835" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>PLA cyber espionage, and training WeChat censorship algorithms against the Chinese diaspora. Snake is back, and so is Charming Kitten. Election security. Recruiting money mules.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1084/notes</link>
      <description>Naikon has returned from four years in the shadows to snoop around the shores of the South China Sea. Tencent trains censorship algorithms on WeChat. Snake ransomware is back, making its way through the healthcare sector. Seeing Charming Kitten's pawprints in World Health Organization networks. Voting security during (or even after) a pandemic. Malek Ben Salem from Accenture on their Technology Vision report, our guest is Thomas Rid from Johns Hopkins University on his book, Active Measures. And unemployed workers are offered gigs as money mules.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/May/CyberWire_2020_05_08.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 08 May 2020 19:31:32 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1084</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/60d9b83a-def8-11ea-911f-bf8a35a2a017/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Naikon has returned from four years in the shadows to snoop around the shores of the South China Sea. Tencent trains censorship algorithms on WeChat. Snake ransomware is back, making its way through the healthcare sector. Seeing Charming Kitten's...</itunes:subtitle>
      <itunes:summary>Naikon has returned from four years in the shadows to snoop around the shores of the South China Sea. Tencent trains censorship algorithms on WeChat. Snake ransomware is back, making its way through the healthcare sector. Seeing Charming Kitten's pawprints in World Health Organization networks. Voting security during (or even after) a pandemic. Malek Ben Salem from Accenture on their Technology Vision report, our guest is Thomas Rid from Johns Hopkins University on his book, Active Measures. And unemployed workers are offered gigs as money mules.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/May/CyberWire_2020_05_08.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Naikon has returned from four years in the shadows to snoop around the shores of the South China Sea. Tencent trains censorship algorithms on WeChat. Snake ransomware is back, making its way through the healthcare sector. Seeing Charming Kitten's pawprints in World Health Organization networks. Voting security during (or even after) a pandemic. Malek Ben Salem from Accenture on their Technology Vision report, our guest is Thomas Rid from Johns Hopkins University on his book, Active Measures. And unemployed workers are offered gigs as money mules.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/May/CyberWire_2020_05_08.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1495</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d61aa463-02c0-49f1-a831-bdf30bb75612]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4502211209.mp3?updated=1608756482" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mining Monero. A RAT in a 2FA app. The decline of the Cereal botnet. Markets during the pandemic. Ransomware in Taiwan. Twitter appeals to reason. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1083/notes</link>
      <description>A new Monero miner is out and about. Hidden Cobra is pushing a RAT through a Trojanized two-factor authentication app. The rise and fall of a botnet. Markets, criminal and legitimate, react to the pandemic. Ransomware hits Taiwan. Remcos is resurgent. Michael Sechrist from BAH on where things are headed with ransomware, our guest is Rachael Stockton from LastPass on their Psychology of Passwords report. And, despite what you saw on Twitter when you were “doing your own research,” 5G does not cause COVID-19, and telecom repair crews are not agents of the Illuminati.
For links to all of today's stories check out our CyberWire daily news brief:
https://thecyberwire.com/issues/issues2020/May/CyberWire_2020_05_07.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 07 May 2020 19:22:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1083</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/60ef47f4-def8-11ea-911f-5700bad7f3df/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A new Monero miner is out and about. Hidden Cobra is pushing a RAT through a Trojanized two-factor authentication app. The rise and fall of a botnet. Markets, criminal and legitimate, react to the pandemic. Ransomware hits Taiwan. Remcos is resurgent....</itunes:subtitle>
      <itunes:summary>A new Monero miner is out and about. Hidden Cobra is pushing a RAT through a Trojanized two-factor authentication app. The rise and fall of a botnet. Markets, criminal and legitimate, react to the pandemic. Ransomware hits Taiwan. Remcos is resurgent. Michael Sechrist from BAH on where things are headed with ransomware, our guest is Rachael Stockton from LastPass on their Psychology of Passwords report. And, despite what you saw on Twitter when you were “doing your own research,” 5G does not cause COVID-19, and telecom repair crews are not agents of the Illuminati.
For links to all of today's stories check out our CyberWire daily news brief:
https://thecyberwire.com/issues/issues2020/May/CyberWire_2020_05_07.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A new Monero miner is out and about. Hidden Cobra is pushing a RAT through a Trojanized two-factor authentication app. The rise and fall of a botnet. Markets, criminal and legitimate, react to the pandemic. Ransomware hits Taiwan. Remcos is resurgent. Michael Sechrist from BAH on where things are headed with ransomware, our guest is Rachael Stockton from LastPass on their Psychology of Passwords report. And, despite what you saw on Twitter when you were “doing your own research,” 5G does not cause COVID-19, and telecom repair crews are not agents of the Illuminati.</p><p>For links to all of today's stories check out our CyberWire daily news brief:</p><p>https://thecyberwire.com/issues/issues2020/May/CyberWire_2020_05_07.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1243</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16998269-9a73-4298-b1c9-5c86f5a01655]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9383737882.mp3?updated=1690205022" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Taking down coordinated inauthenticity. Contact tracing and other COVID-19 notes. BlackInfinity taken down.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1082/notes</link>
      <description>Facebook reports on the coordinated inauthenticity it took down in April. Investigations into COVID-19’s origins continue, as does medical espionage. Contact tracing’s challenges. Joe Carrigan from JHU ISI on recent flaws in antivirus products, our guests are Laura Deimling and Courtney Wandeloski from Down To Staff on interviewing tips for employees and hiring managers. And European police take down the BlackInfinity credential traffickers.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/May/CyberWire_2020_05_06.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 06 May 2020 19:28:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1082</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/610276c6-def8-11ea-911f-8bc12002f8f4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Facebook reports on the coordinated inauthenticity it took down in April. Investigations into COVID-19’s origins continue, as does medical espionage. Contact tracing’s challenges. Joe Carrigan from JHU ISI on recent flaws in antivirus products,...</itunes:subtitle>
      <itunes:summary>Facebook reports on the coordinated inauthenticity it took down in April. Investigations into COVID-19’s origins continue, as does medical espionage. Contact tracing’s challenges. Joe Carrigan from JHU ISI on recent flaws in antivirus products, our guests are Laura Deimling and Courtney Wandeloski from Down To Staff on interviewing tips for employees and hiring managers. And European police take down the BlackInfinity credential traffickers.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/May/CyberWire_2020_05_06.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Facebook reports on the coordinated inauthenticity it took down in April. Investigations into COVID-19’s origins continue, as does medical espionage. Contact tracing’s challenges. Joe Carrigan from JHU ISI on recent flaws in antivirus products, our guests are Laura Deimling and Courtney Wandeloski from Down To Staff on interviewing tips for employees and hiring managers. And European police take down the BlackInfinity credential traffickers.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/May/CyberWire_2020_05_06.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1291</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[76679012-8969-49be-87ec-ed9aa690097c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6383313255.mp3?updated=1690205009" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bear hunt in the Bundestag. Kaiji botnet described. Cryptojacking. Joint US-UK warning against attacks on COVID-19 response. Contact tracing. Puppy scams. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1081/notes</link>
      <description>A pretty Fancy Bear hunt in Germany. A new IoT botnet surfaces. Cryptojackers exploit a Salt bug. Bribing an insider as a way to get personal data. The UK’s NCSC and the US CISA issue a joint warning about campaigns directed against institutions working on a response to COVID-19. Britain’s contact tracing app starts its trial on the Isle of Wight. Ben Yelin from UMD CHHS on AI inventions and their pending patents, our guest is Matt Glenn from Illumio on why companies should break up with their firewalls. And don’t get puppy scammed--you’re looking for wags in all the wrong places.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/May/CyberWire_2020_05_05.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 May 2020 19:34:53 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1081</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6119ed10-def8-11ea-911f-5fff433db7eb/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A pretty Fancy Bear hunt in Germany. A new IoT botnet surfaces. Cryptojackers exploit a Salt bug. Bribing an insider as a way to get personal data. The UK’s NCSC and the US CISA issue a joint warning about campaigns directed against institutions...</itunes:subtitle>
      <itunes:summary>A pretty Fancy Bear hunt in Germany. A new IoT botnet surfaces. Cryptojackers exploit a Salt bug. Bribing an insider as a way to get personal data. The UK’s NCSC and the US CISA issue a joint warning about campaigns directed against institutions working on a response to COVID-19. Britain’s contact tracing app starts its trial on the Isle of Wight. Ben Yelin from UMD CHHS on AI inventions and their pending patents, our guest is Matt Glenn from Illumio on why companies should break up with their firewalls. And don’t get puppy scammed--you’re looking for wags in all the wrong places.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/May/CyberWire_2020_05_05.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A pretty Fancy Bear hunt in Germany. A new IoT botnet surfaces. Cryptojackers exploit a Salt bug. Bribing an insider as a way to get personal data. The UK’s NCSC and the US CISA issue a joint warning about campaigns directed against institutions working on a response to COVID-19. Britain’s contact tracing app starts its trial on the Isle of Wight. Ben Yelin from UMD CHHS on AI inventions and their pending patents, our guest is Matt Glenn from Illumio on why companies should break up with their firewalls. And don’t get puppy scammed--you’re looking for wags in all the wrong places.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/May/CyberWire_2020_05_05.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1311</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8c4245c2-3c03-4ea8-98b9-f409c924135f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8120469604.mp3?updated=1690204809" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A state of emergency over bulk power in the States. Beijing’s disinformation about COVID-19, and its motivation for a coverup. Hacking biomedical research. Curious Xiaomi phones.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1080/notes</link>
      <description>A US Executive Order on Securing the United States Bulk-Power System declares a state of emergency in electricity generation and distribution. China’s disinformation about COVID-19 may have begun in the earliest stages of the pandemic. Someone’s hacking for information on British biomedical research. Xiaomi seems very interested in users of its phones. Andrea Little Limbago on global privacy trends, our guest is Mathew Newfield from Unisys with insights on cybersecurity breaches. And the Love Bug’s creator is found.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/May/CyberWire_2020_05_04.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 04 May 2020 19:31:32 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1080</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6131d4b6-def8-11ea-911f-47fe379269e2/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A US Executive Order on Securing the United States Bulk-Power System declares a state of emergency in electricity generation and distribution. China’s disinformation about COVID-19 may have begun in the earliest stages of the pandemic. Someone’s...</itunes:subtitle>
      <itunes:summary>A US Executive Order on Securing the United States Bulk-Power System declares a state of emergency in electricity generation and distribution. China’s disinformation about COVID-19 may have begun in the earliest stages of the pandemic. Someone’s hacking for information on British biomedical research. Xiaomi seems very interested in users of its phones. Andrea Little Limbago on global privacy trends, our guest is Mathew Newfield from Unisys with insights on cybersecurity breaches. And the Love Bug’s creator is found.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/May/CyberWire_2020_05_04.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A US Executive Order on Securing the United States Bulk-Power System declares a state of emergency in electricity generation and distribution. China’s disinformation about COVID-19 may have begun in the earliest stages of the pandemic. Someone’s hacking for information on British biomedical research. Xiaomi seems very interested in users of its phones. Andrea Little Limbago on global privacy trends, our guest is Mathew Newfield from Unisys with insights on cybersecurity breaches. And the Love Bug’s creator is found.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/May/CyberWire_2020_05_04.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1281</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4fed9758-051f-431d-9299-9e1b5ba5530d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6391118331.mp3?updated=1690204800" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fingerprint authentication is not completely secure. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/133/notes</link>
      <description>Passwords are the traditional authentication methods for computers and networks. But passwords can be stolen. Biometric authentication seems the perfect solution for that problem.
Our guest today is Craig Williams, director of Talos outreach at Cisco. He'll be discussing and providing insights into their report which shows that fingerprints are good enough to protect the average person's privacy if they lose their phone. However, a person that is likely to be targeted by a well-funded and motivated actor should not use fingerprint authentication.
The research can be found here:
 Fingerprint cloning: Myth or reality?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 May 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>133</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/3933ac0c-df14-11ea-9269-070047171406/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Passwords are the traditional authentication methods for computers and networks. But passwords can be stolen. Biometric authentication seems the perfect solution for that problem. Our guest today is Craig Williams, director of Talos outreach at Cisco....</itunes:subtitle>
      <itunes:summary>Passwords are the traditional authentication methods for computers and networks. But passwords can be stolen. Biometric authentication seems the perfect solution for that problem.
Our guest today is Craig Williams, director of Talos outreach at Cisco. He'll be discussing and providing insights into their report which shows that fingerprints are good enough to protect the average person's privacy if they lose their phone. However, a person that is likely to be targeted by a well-funded and motivated actor should not use fingerprint authentication.
The research can be found here:
 Fingerprint cloning: Myth or reality?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Passwords are the traditional authentication methods for computers and networks. But passwords can be stolen. Biometric authentication seems the perfect solution for that problem.</p><p>Our guest today is Craig Williams, director of Talos outreach at Cisco. He'll be discussing and providing insights into their report which shows that fingerprints are good enough to protect the average person's privacy if they lose their phone. However, a person that is likely to be targeted by a well-funded and motivated actor should not use fingerprint authentication.</p><p>The research can be found here:</p><p><a href="https://blog.talosintelligence.com/2020/04/fingerprint-research.html"> Fingerprint cloning: Myth or reality?</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1263</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[62582dc8-48af-499a-b63b-4a0894b32b4a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2645661608.mp3?updated=1685107826" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>China hacks at Vietnam over a territorial dispute. Kim’s still in charge, but could Hidden Cobra get loose if his grip slackens? COVID-19 and cybersecurity. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1079/notes</link>
      <description>Tensions between China and its neighbors. ICS incursions are troubling. The US intelligence community comments on COVID 19 disinformation. The FBI tracks increased cybercrime activity during the pandemic. Johannes Ullrich explains Excel 4 Macro vulnerabilities. Our guest is Tina C. Williams-Koroma, from TCecure on the importance of strong, effective leadership in cybersecurity. And smile for the web-cam. Your boss may be watching.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/May/CyberWire_2020_05_01.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 01 May 2020 19:12:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1079</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/614fbd8c-def8-11ea-911f-6b907c789f55/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Tensions between China and its neighbors. ICS incursions are troubling. The US intelligence community comments on COVID 19 disinformation. The FBI tracks increased cybercrime activity during the pandemic. Johannes Ullrich explains Excel 4 Macro...</itunes:subtitle>
      <itunes:summary>Tensions between China and its neighbors. ICS incursions are troubling. The US intelligence community comments on COVID 19 disinformation. The FBI tracks increased cybercrime activity during the pandemic. Johannes Ullrich explains Excel 4 Macro vulnerabilities. Our guest is Tina C. Williams-Koroma, from TCecure on the importance of strong, effective leadership in cybersecurity. And smile for the web-cam. Your boss may be watching.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/May/CyberWire_2020_05_01.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tensions between China and its neighbors. ICS incursions are troubling. The US intelligence community comments on COVID 19 disinformation. The FBI tracks increased cybercrime activity during the pandemic. Johannes Ullrich explains Excel 4 Macro vulnerabilities. Our guest is Tina C. Williams-Koroma, from TCecure on the importance of strong, effective leadership in cybersecurity. And smile for the web-cam. Your boss may be watching.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/May/CyberWire_2020_05_01.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1500</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2917a877-cd23-4867-a5f0-7cbea8f7a7b8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2436845614.mp3?updated=1608756500" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The persistence of ransomware. Exposure notifications and contact tracing. Doxing and conspiracy theories. More notes on the underworld.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1078/notes</link>
      <description>Ransomware not only encrypts and steals data, but establishes persistence as well. Apple and Google roll out their exposure notification API. GCHQ will help secure Britain’s centralized contact tracing system. A conspiracy-minded motive for doxing. Criminal markets and criminal enterprises continue to mimic legitimate ones. And a new wrinkle in mobile ransomware. Rob Lee from Dragos with insights on a recent ransomware incident shutting down a gas pipeline, guest is Drex DeFord from Drexio on Cybersecurity in Healthcare amid COVID-19.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_30.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 30 Apr 2020 18:57:50 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1078</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/617636ba-def8-11ea-911f-e7ae63d36cf5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ransomware not only encrypts and steals data, but establishes persistence as well. Apple and Google roll out their exposure notification API. GCHQ will help secure Britain’s centralized contact tracing system. A conspiracy-minded motive for doxing....</itunes:subtitle>
      <itunes:summary>Ransomware not only encrypts and steals data, but establishes persistence as well. Apple and Google roll out their exposure notification API. GCHQ will help secure Britain’s centralized contact tracing system. A conspiracy-minded motive for doxing. Criminal markets and criminal enterprises continue to mimic legitimate ones. And a new wrinkle in mobile ransomware. Rob Lee from Dragos with insights on a recent ransomware incident shutting down a gas pipeline, guest is Drex DeFord from Drexio on Cybersecurity in Healthcare amid COVID-19.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_30.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ransomware not only encrypts and steals data, but establishes persistence as well. Apple and Google roll out their exposure notification API. GCHQ will help secure Britain’s centralized contact tracing system. A conspiracy-minded motive for doxing. Criminal markets and criminal enterprises continue to mimic legitimate ones. And a new wrinkle in mobile ransomware. Rob Lee from Dragos with insights on a recent ransomware incident shutting down a gas pipeline, guest is Drex DeFord from Drexio on Cybersecurity in Healthcare amid COVID-19.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_30.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1296</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f1de6944-e3b2-42a2-a7f8-cae73caeb09d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5662086287.mp3?updated=1690204610" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Content farmers and disinformation tactics. PhantomLance: quiet, selective, and apparently effective. Lawful intercept and contact-tracing apps. A look at the black market.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1077/notes</link>
      <description>Researchers see a coming shift in tactics used by Chinese “content farmers.” Amplifying disinformation through influencers and other agents of influence. PhantomLance is a quiet and selective Vietnamese cyber espionage campaign. Lawful intercept and contact tracing apps. And the black market for malware is surprisingly open, cheap, and attentive to its customers. Joe Carrigan from JHU ISI on cheating in online games, guest is Tonya Ugoretz from the FBI on engagement with public and private sector during COVID-19.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_29.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 29 Apr 2020 19:15:04 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1077</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/618cfdc8-def8-11ea-911f-2ba586fc7850/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Researchers see a coming shift in tactics used by Chinese “content farmers.” Amplifying disinformation through influencers and other agents of influence. PhantomLance is a quiet and selective Vietnamese cyber espionage campaign. Lawful intercept...</itunes:subtitle>
      <itunes:summary>Researchers see a coming shift in tactics used by Chinese “content farmers.” Amplifying disinformation through influencers and other agents of influence. PhantomLance is a quiet and selective Vietnamese cyber espionage campaign. Lawful intercept and contact tracing apps. And the black market for malware is surprisingly open, cheap, and attentive to its customers. Joe Carrigan from JHU ISI on cheating in online games, guest is Tonya Ugoretz from the FBI on engagement with public and private sector during COVID-19.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_29.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers see a coming shift in tactics used by Chinese “content farmers.” Amplifying disinformation through influencers and other agents of influence. PhantomLance is a quiet and selective Vietnamese cyber espionage campaign. Lawful intercept and contact tracing apps. And the black market for malware is surprisingly open, cheap, and attentive to its customers. Joe Carrigan from JHU ISI on cheating in online games, guest is Tonya Ugoretz from the FBI on engagement with public and private sector during COVID-19.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_29.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1292</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9c892337-8eec-4b61-8c13-40af4fbf96ec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4837556469.mp3?updated=1690204598" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shade shuts down. CLOP hits pharma. Medical research firm breached. The pain caused by disinformation. Mr. Kim goes downy ocean?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1076/notes</link>
      <description>Shade ransomware operators close down, or so they say. A US pharmaceutical company is the victim of CLOP ransomware, and a Chinese medical research firm is breached by cyber criminals. Centralized versus decentralized approaches to contact tracing. A GDPR assistance site proves leaky. Disinformation breeds misinformation which breeds folly that brings misery. And Mr. Kim seems to be chillin’ downy ocean. Ben Yelin from UMD CHHS on responses to the EARN IT Act, guest is Katie Arrington, CISO for Assistant Secretary for Defense Acquisition on the Cybersecurity Maturity Model (CMMC) certification.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_28.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Apr 2020 19:14:45 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1076</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/61a3cf80-def8-11ea-911f-e70a6b9ca0a1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Shade ransomware operators close down, or so they say. A US pharmaceutical company is the victim of CLOP ransomware, and a Chinese medical research firm is breached by cyber criminals. Centralized versus decentralized approaches to contact tracing. A...</itunes:subtitle>
      <itunes:summary>Shade ransomware operators close down, or so they say. A US pharmaceutical company is the victim of CLOP ransomware, and a Chinese medical research firm is breached by cyber criminals. Centralized versus decentralized approaches to contact tracing. A GDPR assistance site proves leaky. Disinformation breeds misinformation which breeds folly that brings misery. And Mr. Kim seems to be chillin’ downy ocean. Ben Yelin from UMD CHHS on responses to the EARN IT Act, guest is Katie Arrington, CISO for Assistant Secretary for Defense Acquisition on the Cybersecurity Maturity Model (CMMC) certification.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_28.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Shade ransomware operators close down, or so they say. A US pharmaceutical company is the victim of CLOP ransomware, and a Chinese medical research firm is breached by cyber criminals. Centralized versus decentralized approaches to contact tracing. A GDPR assistance site proves leaky. Disinformation breeds misinformation which breeds folly that brings misery. And Mr. Kim seems to be chillin’ downy ocean. Ben Yelin from UMD CHHS on responses to the EARN IT Act, guest is Katie Arrington, CISO for Assistant Secretary for Defense Acquisition on the Cybersecurity Maturity Model (CMMC) certification.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_28.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1282</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b473b6d2-3325-4bc3-b5cc-ce756b7be5b3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8982243650.mp3?updated=1690204588" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Where’s Kim Jong-un? Disinformation campaigns against European targets. Cyberattack against wastewater treatment plants. Hupigon RAT is back. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1075/notes</link>
      <description>Reports to the contrary, as far as anyone really knows, North Korea’s Kim is still large and in charge. Poland reports Russian disinformation effort. The EU issues a controversial report on COVID-19 disinformation amid accusations that Europe is knuckling under to Chinese pressure. A cyberattack on wastewater treatment systems in Israel is reported. And the old Hupigon RAT is back, and looking for love. Caleb Barlow from CynergisTek on his responsibilities during an incident from the SOC operator to the CEO, guest is Dave Weinstein from Claroty on threats and existing security violations facing the U.S. critical infrastructure.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_27.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 27 Apr 2020 19:40:05 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1075</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/61b3ca0c-def8-11ea-911f-b745ab99c1b9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Reports to the contrary, as far as anyone really knows, North Korea’s Kim is still large and in charge. Poland reports Russian disinformation effort. The EU issues a controversial report on COVID-19 disinformation amid accusations that Europe is...</itunes:subtitle>
      <itunes:summary>Reports to the contrary, as far as anyone really knows, North Korea’s Kim is still large and in charge. Poland reports Russian disinformation effort. The EU issues a controversial report on COVID-19 disinformation amid accusations that Europe is knuckling under to Chinese pressure. A cyberattack on wastewater treatment systems in Israel is reported. And the old Hupigon RAT is back, and looking for love. Caleb Barlow from CynergisTek on his responsibilities during an incident from the SOC operator to the CEO, guest is Dave Weinstein from Claroty on threats and existing security violations facing the U.S. critical infrastructure.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_27.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Reports to the contrary, as far as anyone really knows, North Korea’s Kim is still large and in charge. Poland reports Russian disinformation effort. The EU issues a controversial report on COVID-19 disinformation amid accusations that Europe is knuckling under to Chinese pressure. A cyberattack on wastewater treatment systems in Israel is reported. And the old Hupigon RAT is back, and looking for love. Caleb Barlow from CynergisTek on his responsibilities during an incident from the SOC operator to the CEO, guest is Dave Weinstein from Claroty on threats and existing security violations facing the U.S. critical infrastructure.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_27.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1271</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5ccb74ba-27e5-4698-86cd-7d1971685725]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2671755916.mp3?updated=1690204562" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Contact tracing as COVID-19 aid. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/132/notes</link>
      <description>Successful containment of the Coronavirus pandemic rests on the ability to quickly and reliably identify those who have been in close proximity to a contagious individual.
Mayank Varia from Boston University describes how his team suggests an approach based on using short-range communication
mechanisms, like Bluetooth, that are available in all modern cell phones.
The research can be found here:
Anonymous Collocation Discovery:
Harnessing Privacy to Tame the Coronavirus
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Apr 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>132</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/37b4a1d8-df14-11ea-8499-23f6f79223b6/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Successful containment of the Coronavirus pandemic rests on the ability to quickly and reliably identify those who have been in close proximity to a contagious individual. Mayank Varia from Boston University describes how his team suggests an approach...</itunes:subtitle>
      <itunes:summary>Successful containment of the Coronavirus pandemic rests on the ability to quickly and reliably identify those who have been in close proximity to a contagious individual.
Mayank Varia from Boston University describes how his team suggests an approach based on using short-range communication
mechanisms, like Bluetooth, that are available in all modern cell phones.
The research can be found here:
Anonymous Collocation Discovery:
Harnessing Privacy to Tame the Coronavirus
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Successful containment of the Coronavirus pandemic rests on the ability to quickly and reliably identify those who have been in close proximity to a contagious individual.</p><p>Mayank Varia from Boston University describes how his team suggests an approach based on using short-range communication</p><p>mechanisms, like Bluetooth, that are available in all modern cell phones.</p><p>The research can be found here:</p><p><a href="https://arxiv.org/pdf/2003.13670.pdf">Anonymous Collocation Discovery:</a></p><p><a href="https://arxiv.org/pdf/2003.13670.pdf">Harnessing Privacy to Tame the Coronavirus</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2035</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f66c5bf6-4b3e-435d-8fa5-d6c31df46303]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1227292492.mp3?updated=1685107823" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>iOS zero-days, reconsidered. Hacking during a pandemic. An old campaign connected with the ShadowBrokers comes to light. Advice on web shells. Astroturfing and influence.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1074/notes</link>
      <description>An update on those iOS zero-days: they may not be as serious as assumed. Calls to take biomedical facilities off the hacking target list. Nazar and the ShadowBrokers. NSA and ASD issue joint advice on web shell malware. A report on astroturfing and influence operations. Joker’s Stash lays out more stolen cards. And Nintendo reports a problem with a legacy system. Michael Sechrist from BAH on the increase in IT/OT convergence, guest is Terence Jackson from Thycotic on HIPAA, telemedicine and the new normal of data regulation.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_24.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 24 Apr 2020 19:59:42 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1074</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/61d9179e-def8-11ea-911f-c779d675d0a8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>An update on those iOS zero-days: they may not be as serious as assumed. Calls to take biomedical facilities off the hacking target list. Nazar and the ShadowBrokers. NSA and ASD issue joint advice on web shell malware. A report on astroturfing and...</itunes:subtitle>
      <itunes:summary>An update on those iOS zero-days: they may not be as serious as assumed. Calls to take biomedical facilities off the hacking target list. Nazar and the ShadowBrokers. NSA and ASD issue joint advice on web shell malware. A report on astroturfing and influence operations. Joker’s Stash lays out more stolen cards. And Nintendo reports a problem with a legacy system. Michael Sechrist from BAH on the increase in IT/OT convergence, guest is Terence Jackson from Thycotic on HIPAA, telemedicine and the new normal of data regulation.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_24.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An update on those iOS zero-days: they may not be as serious as assumed. Calls to take biomedical facilities off the hacking target list. Nazar and the ShadowBrokers. NSA and ASD issue joint advice on web shell malware. A report on astroturfing and influence operations. Joker’s Stash lays out more stolen cards. And Nintendo reports a problem with a legacy system. Michael Sechrist from BAH on the increase in IT/OT convergence, guest is Terence Jackson from Thycotic on HIPAA, telemedicine and the new normal of data regulation.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_24.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1544</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[add06daf-31fc-49cc-b6db-1ec7bc6613f0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4821997145.mp3?updated=1608756487" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>APT32 activity reported. Florentine Banker’s patient BEC. iOS zero-days exploited in the wild. Sinkholing a cryptomining botnet. Intelligence services and gangs follow the news.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1073/notes</link>
      <description>Someone, probably Vietnam, is trying to develop intelligence on China’s experience with the coronavirus. Florentine Banker is an example of well-organized crime. iOS zero-days have been exploited in the wild; a fix is promised. A cryptomining botnet is sinkholed. And intelligence services and criminals are tuning their phishbait to current events, as they always do. Malek Ben Salem from Accenture on encrypted DNS, guest is Russ Mohr with MobileIron on why the applications that excite us about 5G are the same applications that warrant the most concern.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_23.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 23 Apr 2020 18:44:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1073</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/61f15b92-def8-11ea-911f-a31e35cb2f5f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Someone, probably Vietnam, is trying to develop intelligence on China’s experience with the coronavirus. Florentine Banker is an example of well-organized crime. iOS zero-days have been exploited in the wild; a fix is promised. A cryptomining botnet...</itunes:subtitle>
      <itunes:summary>Someone, probably Vietnam, is trying to develop intelligence on China’s experience with the coronavirus. Florentine Banker is an example of well-organized crime. iOS zero-days have been exploited in the wild; a fix is promised. A cryptomining botnet is sinkholed. And intelligence services and criminals are tuning their phishbait to current events, as they always do. Malek Ben Salem from Accenture on encrypted DNS, guest is Russ Mohr with MobileIron on why the applications that excite us about 5G are the same applications that warrant the most concern.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_23.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Someone, probably Vietnam, is trying to develop intelligence on China’s experience with the coronavirus. Florentine Banker is an example of well-organized crime. iOS zero-days have been exploited in the wild; a fix is promised. A cryptomining botnet is sinkholed. And intelligence services and criminals are tuning their phishbait to current events, as they always do. Malek Ben Salem from Accenture on encrypted DNS, guest is Russ Mohr with MobileIron on why the applications that excite us about 5G are the same applications that warrant the most concern.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_23.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1301</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[593a231b-1c25-497d-8249-f475cadc0b20]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8432038760.mp3?updated=1690204012" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>COVID-19 relief. Data exposure at the SBA. Ransomware gangland. The CTL-League’s volunteer defenders. Active measures, disinformation, and cyber deterrence.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1072/notes</link>
      <description>The US Senate authorizes more COVID-19 small business relief. A data exposure at the US Small Business Administration. The CTL-League looks like a model for cyber volunteer organizations. The US Senate reports its evaluation of the Intelligence Community’s look at Russian active measures in 2016. Calls for deterrence amid a converged campaign of disinformation. Joe Carrigan from JHU ISI on Microsoft zero-days, guest is Chris Chiles from OST on what companies need to consider before implementing 5G.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_22.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 22 Apr 2020 18:53:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1072</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/62020492-def8-11ea-911f-ff80d1ae5bea/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The US Senate authorizes more COVID-19 small business relief. A data exposure at the US Small Business Administration. The CTL-League looks like a model for cyber volunteer organizations. The US Senate reports its evaluation of the Intelligence...</itunes:subtitle>
      <itunes:summary>The US Senate authorizes more COVID-19 small business relief. A data exposure at the US Small Business Administration. The CTL-League looks like a model for cyber volunteer organizations. The US Senate reports its evaluation of the Intelligence Community’s look at Russian active measures in 2016. Calls for deterrence amid a converged campaign of disinformation. Joe Carrigan from JHU ISI on Microsoft zero-days, guest is Chris Chiles from OST on what companies need to consider before implementing 5G.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_22.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US Senate authorizes more COVID-19 small business relief. A data exposure at the US Small Business Administration. The CTL-League looks like a model for cyber volunteer organizations. The US Senate reports its evaluation of the Intelligence Community’s look at Russian active measures in 2016. Calls for deterrence amid a converged campaign of disinformation. Joe Carrigan from JHU ISI on Microsoft zero-days, guest is Chris Chiles from OST on what companies need to consider before implementing 5G.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_22.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1316</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[063beb88-7ef7-4c70-87d2-2142b4ad29a9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2240122540.mp3?updated=1690203999" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DPRK leadership crisis? Probably not. Economic espionage in the oil patch. COVID-19 relief fraud. US Supreme Court will take up CFAA. Virtual proctoring.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1071/notes</link>
      <description>Fears about North Korean instability can wait until it’s determined that there’s actually instability. An economic espionage campaign targeted the oil and gas sector. Much phishing surrounds government COVID-19 economic relief programs around the world. The US Supreme Court will hear a case involving the Computer Fraud and Abuse Act. And if you’re studying from home, don’t cheat. And teacher, maybe don’t spy. Ben Yelin from UMD CHHS on training facial recognition software to recognize medical masks, guest is Gonda Lamberink from UL on making product security transparent and accessible to consumers.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_21.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Apr 2020 19:13:07 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1071</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/621399aa-def8-11ea-911f-17df660fa7af/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fears about North Korean instability can wait until it’s determined that there’s actually instability. An economic espionage campaign targeted the oil and gas sector. Much phishing surrounds government COVID-19 economic relief programs around the...</itunes:subtitle>
      <itunes:summary>Fears about North Korean instability can wait until it’s determined that there’s actually instability. An economic espionage campaign targeted the oil and gas sector. Much phishing surrounds government COVID-19 economic relief programs around the world. The US Supreme Court will hear a case involving the Computer Fraud and Abuse Act. And if you’re studying from home, don’t cheat. And teacher, maybe don’t spy. Ben Yelin from UMD CHHS on training facial recognition software to recognize medical masks, guest is Gonda Lamberink from UL on making product security transparent and accessible to consumers.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_21.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Fears about North Korean instability can wait until it’s determined that there’s actually instability. An economic espionage campaign targeted the oil and gas sector. Much phishing surrounds government COVID-19 economic relief programs around the world. The US Supreme Court will hear a case involving the Computer Fraud and Abuse Act. And if you’re studying from home, don’t cheat. And teacher, maybe don’t spy. Ben Yelin from UMD CHHS on training facial recognition software to recognize medical masks, guest is Gonda Lamberink from UL on making product security transparent and accessible to consumers.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_21.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1315</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[156ca58a-8162-40dd-aff2-5abb5ed27d83]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4516483695.mp3?updated=1690203986" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Update on threats to Czech infrastructure. Relief funds looted. PoetRAT vs. ICS. CISA updates essential workforce guidelines. Data breaches. Zoom-bombing.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1070/notes</link>
      <description>A wave of attacks against hospitals and infrastructure in the Czech Republic seems to have been largely unsuccessful, but more may be on their way. German relief funds earmarked for small business are looted by cybercrooks. PoetRAT is active against ICS targets in Azerbaijan. CISA updates its Guidance on the Essential Critical Infrastructure Workforce. Breaches at Cognizant, Aptoide, and Webkinz World. And more Zoom-bombing. David Dufour from Webroot on AI and machine learning, guest is Kelly White of Mastercard’s RiskRecon on how one of their healthcare customers is tracking COVID-19 infections.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_20.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 20 Apr 2020 18:31:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1070</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/623b2a06-def8-11ea-911f-2b5c58132cdd/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A wave of attacks against hospitals and infrastructure in the Czech Republic seems to have been largely unsuccessful, but more may be on their way. German relief funds earmarked for small business are looted by cybercrooks. PoetRAT is active against...</itunes:subtitle>
      <itunes:summary>A wave of attacks against hospitals and infrastructure in the Czech Republic seems to have been largely unsuccessful, but more may be on their way. German relief funds earmarked for small business are looted by cybercrooks. PoetRAT is active against ICS targets in Azerbaijan. CISA updates its Guidance on the Essential Critical Infrastructure Workforce. Breaches at Cognizant, Aptoide, and Webkinz World. And more Zoom-bombing. David Dufour from Webroot on AI and machine learning, guest is Kelly White of Mastercard’s RiskRecon on how one of their healthcare customers is tracking COVID-19 infections.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_20.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A wave of attacks against hospitals and infrastructure in the Czech Republic seems to have been largely unsuccessful, but more may be on their way. German relief funds earmarked for small business are looted by cybercrooks. PoetRAT is active against ICS targets in Azerbaijan. CISA updates its Guidance on the Essential Critical Infrastructure Workforce. Breaches at Cognizant, Aptoide, and Webkinz World. And more Zoom-bombing. David Dufour from Webroot on AI and machine learning, guest is Kelly White of Mastercard’s RiskRecon on how one of their healthcare customers is tracking COVID-19 infections.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_20.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1297</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e521b5cc-0c29-4f61-b34b-b35e0d71a5fd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2226163047.mp3?updated=1690203973" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Complementary colors: teaming tactics in cybersecurity. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/cyberwire-x/5/notes</link>
      <description>We often hear cybersecurity professionals talking about red teams, blue teams, and purple teams. In this episode of CyberWire-X, we investigate what those terms mean, how security teaming approaches have changed over time, and the value of teaming for organizations large and small. Join us for a lively conversation with our experts Austin Scott from Dragos, and Caleb Barlow, from Cynergistek in part one. In part 2, we’ll also hear from Dan DeCloss from Plextrac, the sponsor of today’s episode. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 19 Apr 2020 14:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/2e3cf1fe-df01-11ea-9e12-5f76a52fe9ff/image/cyberwire-x-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>We often hear cybersecurity professionals talking about red teams, blue teams, and purple teams. In this episode of CyberWire-X, we investigate what those terms mean, how security teaming approaches have changed over time, and the value of teaming for...</itunes:subtitle>
      <itunes:summary>We often hear cybersecurity professionals talking about red teams, blue teams, and purple teams. In this episode of CyberWire-X, we investigate what those terms mean, how security teaming approaches have changed over time, and the value of teaming for organizations large and small. Join us for a lively conversation with our experts Austin Scott from Dragos, and Caleb Barlow, from Cynergistek in part one. In part 2, we’ll also hear from Dan DeCloss from Plextrac, the sponsor of today’s episode. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>We often hear cybersecurity professionals talking about red teams, blue teams, and purple teams. In this episode of CyberWire-X, we investigate what those terms mean, how security teaming approaches have changed over time, and the value of teaming for organizations large and small. Join us for a lively conversation with our experts Austin Scott from Dragos, and Caleb Barlow, from Cynergistek in part one. In part 2, we’ll also hear from Dan DeCloss from Plextrac, the sponsor of today’s episode. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1647</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d7960839-7ca6-4a38-90bc-1f9c8c1f59f3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1304855465.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How low can they go? A spike in Coronavirus phishing. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/131/notes</link>
      <description>As much of the world grapples with the new coronavirus, COVID-19, and how to handle it, attackers are taking advantage of the widespread discussion of COVID-19 in emails and across the web.
Joining us today is Fleming Shi, CTO of Barracuda discussing their report on these types of attacks, which are up 667-percent since the end of February.
The research can be found here:
 Threat Spotlight: Coronavirus-Related Phishing
To learn more about our Academic and Military discounts, visit The CyberWire and click on the Contact Us button in the Academic or Government &amp; Military box. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Apr 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>131</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/35c14462-df14-11ea-9e92-c312b1087e1d/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>As much of the world grapples with the new coronavirus, COVID-19, and how to handle it, attackers are taking advantage of the widespread discussion of COVID-19 in emails and across the web. Joining us today is Fleming Shi, CTO of Barracuda discussing...</itunes:subtitle>
      <itunes:summary>As much of the world grapples with the new coronavirus, COVID-19, and how to handle it, attackers are taking advantage of the widespread discussion of COVID-19 in emails and across the web.
Joining us today is Fleming Shi, CTO of Barracuda discussing their report on these types of attacks, which are up 667-percent since the end of February.
The research can be found here:
 Threat Spotlight: Coronavirus-Related Phishing
To learn more about our Academic and Military discounts, visit The CyberWire and click on the Contact Us button in the Academic or Government &amp; Military box. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As much of the world grapples with the new coronavirus, COVID-19, and how to handle it, attackers are taking advantage of the widespread discussion of COVID-19 in emails and across the web.</p><p>Joining us today is Fleming Shi, CTO of Barracuda discussing their report on these types of attacks, which are up 667-percent since the end of February.</p><p>The research can be found here:</p><p><a href="https://blog.barracuda.com/2020/03/26/threat-spotlight-coronavirus-related-phishing/"> Threat Spotlight: Coronavirus-Related Phishing</a></p><p>To learn more about our Academic and Military discounts, visit <a href="https://thecyberwire.com/pro">The CyberWire</a> and click on the Contact Us button in the Academic or Government &amp; Military box. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1051</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1851c668-fa9f-48f4-b90a-11366b72d5dc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5734067207.mp3?updated=1685107806" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Warnings on healthcare attacks and espionage campaigns. Post-patching issues in VPNs. COVID-19 phishing. Contact tracing, for lungs and minds. Telework notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1069/notes</link>
      <description>Czech intelligence warns of an impending cyber campaign against hospitals. The US Defense Department alerts contractors that Electric Panda is back, and after their data. Pulse Secure VPN’s post- patching issues. Google blocks COVID-19 phishing emails. Apple and Google work on tracing physical contact, but Facebook is tracing contact with misinformation. Zoom offers some fixes, gets banned in India, and receives a mashnote from Larry Ellison. And notes on HIPAA and CMMC. Johannes Ullrich from SANS on exposed RDP servers while we work from home, guest is Tia Hopkins from eSentire on STEM/cybersecurity education.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_17.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 17 Apr 2020 19:20:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1069</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6259a2a6-def8-11ea-911f-bb8f1ad8aee7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Czech intelligence warns of an impending cyber campaign against hospitals. The US Defense Department alerts contractors that Electric Panda is back, and after their data. Pulse Secure VPN’s post- patching issues. Google blocks COVID-19 phishing...</itunes:subtitle>
      <itunes:summary>Czech intelligence warns of an impending cyber campaign against hospitals. The US Defense Department alerts contractors that Electric Panda is back, and after their data. Pulse Secure VPN’s post- patching issues. Google blocks COVID-19 phishing emails. Apple and Google work on tracing physical contact, but Facebook is tracing contact with misinformation. Zoom offers some fixes, gets banned in India, and receives a mashnote from Larry Ellison. And notes on HIPAA and CMMC. Johannes Ullrich from SANS on exposed RDP servers while we work from home, guest is Tia Hopkins from eSentire on STEM/cybersecurity education.
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_17.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Czech intelligence warns of an impending cyber campaign against hospitals. The US Defense Department alerts contractors that Electric Panda is back, and after their data. Pulse Secure VPN’s post- patching issues. Google blocks COVID-19 phishing emails. Apple and Google work on tracing physical contact, but Facebook is tracing contact with misinformation. Zoom offers some fixes, gets banned in India, and receives a mashnote from Larry Ellison. And notes on HIPAA and CMMC. Johannes Ullrich from SANS on exposed RDP servers while we work from home, guest is Tia Hopkins from eSentire on STEM/cybersecurity education.</p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_17.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1561</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[45fc35e3-387a-4a6d-834a-1c30d1afa0ed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9775374460.mp3?updated=1608756503" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US warns of DPRK cyber activity. Replacing Huawei. COVID-19-themed cybercrime and state-directed activity. Telework notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1068/notes</link>
      <description>The US Government issues a major advisory warning of North Korean offensives in cyberspace, most of them financially motivated. Ericsson will provide BT the equipment to replace Huawei gear in its networks. Notes on COVID-19-themed cybercrime. Some temporary telework may become permanent. Disinformation from Tehran; domestic phishbait from Damascus. And to Zoom or not to Zoom? Rob Lee from Dragos with a summary of his RSA keynote, guest is Gregg Smith from Attila on cybersecurity concerns for employees working from home during the COVID-19 pandemic.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_16.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 16 Apr 2020 19:01:28 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1068</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/627cb6f6-def8-11ea-911f-5fcbd86d0956/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The US Government issues a major advisory warning of North Korean offensives in cyberspace, most of them financially motivated. Ericsson will provide BT the equipment to replace Huawei gear in its networks. Notes on COVID-19-themed cybercrime. Some...</itunes:subtitle>
      <itunes:summary>The US Government issues a major advisory warning of North Korean offensives in cyberspace, most of them financially motivated. Ericsson will provide BT the equipment to replace Huawei gear in its networks. Notes on COVID-19-themed cybercrime. Some temporary telework may become permanent. Disinformation from Tehran; domestic phishbait from Damascus. And to Zoom or not to Zoom? Rob Lee from Dragos with a summary of his RSA keynote, guest is Gregg Smith from Attila on cybersecurity concerns for employees working from home during the COVID-19 pandemic.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_16.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US Government issues a major advisory warning of North Korean offensives in cyberspace, most of them financially motivated. Ericsson will provide BT the equipment to replace Huawei gear in its networks. Notes on COVID-19-themed cybercrime. Some temporary telework may become permanent. Disinformation from Tehran; domestic phishbait from Damascus. And to Zoom or not to Zoom? Rob Lee from Dragos with a summary of his RSA keynote, guest is Gregg Smith from Attila on cybersecurity concerns for employees working from home during the COVID-19 pandemic.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_16.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1306</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9ff535de-72cb-4c9a-8e72-dd3d6bb00bd3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8991407199.mp3?updated=1690203862" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Energetic Bear lands at SFO. Windpower utility hit with RagnarLocker ransomware. COVID-19-themed threats. Telework advice. Zooming.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1067/notes</link>
      <description>Energetic Bear’s pawprints seen at SFO. A leading windpower company is hit with ransomware. Advice for more secure telework. Why healthcare is an attractive target for cyberattack during a pandemic. ICANN pleads for action against scam domains. And the fortunes of Zoom. Joe Carrigan from JHU ISI on undocumented backdoors in Android apps, guest is Emily Mossburg from Deloitte on the geographical and cultural elements of privacy.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_15.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 15 Apr 2020 18:46:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1067</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6298b9f0-def8-11ea-911f-c34f1cc2b87f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Energetic Bear’s pawprints seen at SFO. A leading windpower company is hit with ransomware. Advice for more secure telework. Why healthcare is an attractive target for cyberattack during a pandemic. ICANN pleads for action against scam domains. And...</itunes:subtitle>
      <itunes:summary>Energetic Bear’s pawprints seen at SFO. A leading windpower company is hit with ransomware. Advice for more secure telework. Why healthcare is an attractive target for cyberattack during a pandemic. ICANN pleads for action against scam domains. And the fortunes of Zoom. Joe Carrigan from JHU ISI on undocumented backdoors in Android apps, guest is Emily Mossburg from Deloitte on the geographical and cultural elements of privacy.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_15.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Energetic Bear’s pawprints seen at SFO. A leading windpower company is hit with ransomware. Advice for more secure telework. Why healthcare is an attractive target for cyberattack during a pandemic. ICANN pleads for action against scam domains. And the fortunes of Zoom. Joe Carrigan from JHU ISI on undocumented backdoors in Android apps, guest is Emily Mossburg from Deloitte on the geographical and cultural elements of privacy.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_15.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1321</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e8f8ee8f-566f-40ee-9464-9647a420b890]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1748632471.mp3?updated=1690203852" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The online stresses of the COVID-19 pandemic. APT41’s backdoor campaign. Contact-tracking and privacy. Virtual court is now in online session. Zoom’s fortunes. And tax-season online fraud.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1066/notes</link>
      <description>Demand for online services during the pandemic stresses government providers. APT41’s backdoor campaign aimed at information theft. Contact-tracking apps and privacy. Some courts move to hear cases online. Zoom’s continuing mixed success. And did you file your tax return? The crooks might have done so for you. Ben Yelin from UMD CHHS on Microsoft’s reaction to Washington State’s new facial recognition law, guest is Francis Dinha from OpenVPN on remote working during the COVID-19 pandemic.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_14.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Apr 2020 18:44:58 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1066</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/62b6ffbe-def8-11ea-911f-1724f22a3209/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Demand for online services during the pandemic stresses government providers. APT41’s backdoor campaign aimed at information theft. Contact-tracking apps and privacy. Some courts move to hear cases online. Zoom’s continuing mixed success. And did...</itunes:subtitle>
      <itunes:summary>Demand for online services during the pandemic stresses government providers. APT41’s backdoor campaign aimed at information theft. Contact-tracking apps and privacy. Some courts move to hear cases online. Zoom’s continuing mixed success. And did you file your tax return? The crooks might have done so for you. Ben Yelin from UMD CHHS on Microsoft’s reaction to Washington State’s new facial recognition law, guest is Francis Dinha from OpenVPN on remote working during the COVID-19 pandemic.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_14.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Demand for online services during the pandemic stresses government providers. APT41’s backdoor campaign aimed at information theft. Contact-tracking apps and privacy. Some courts move to hear cases online. Zoom’s continuing mixed success. And did you file your tax return? The crooks might have done so for you. Ben Yelin from UMD CHHS on Microsoft’s reaction to Washington State’s new facial recognition law, guest is Francis Dinha from OpenVPN on remote working during the COVID-19 pandemic.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_14.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1253</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2556bd84-6d26-4e95-bf23-8bf822b60702]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9310886852.mp3?updated=1690203837" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ill-received pranks. SFO breach. Silicon Valley cooperates on contact tracking. COVID-19 disinformation and scams. Notes on ransomware and booter services. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1065/notes</link>
      <description>Vandals prank victims with security researchers’ names. San Francisco International discloses compromised networks. Google and Apple cooperate on contact tracking tech. Chinese disinformation campaigns rely on ad purchases and social media amplification. Phishing attempts and other scams. Notes on ransomware. And police in the Netherlands take down some DDoS-for-hire services. Andrea Little Limbago on government created internet blackouts, guest is Herb Stapleton from the FBI on COVID-19 scams.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_13.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 13 Apr 2020 20:09:58 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1065</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/62ca53f2-def8-11ea-911f-7fd31e9ce857/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Vandals prank victims with security researchers’ names. San Francisco International discloses compromised networks. Google and Apple cooperate on contact tracking tech. Chinese disinformation campaigns rely on ad purchases and social media...</itunes:subtitle>
      <itunes:summary>Vandals prank victims with security researchers’ names. San Francisco International discloses compromised networks. Google and Apple cooperate on contact tracking tech. Chinese disinformation campaigns rely on ad purchases and social media amplification. Phishing attempts and other scams. Notes on ransomware. And police in the Netherlands take down some DDoS-for-hire services. Andrea Little Limbago on government created internet blackouts, guest is Herb Stapleton from the FBI on COVID-19 scams.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_13.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Vandals prank victims with security researchers’ names. San Francisco International discloses compromised networks. Google and Apple cooperate on contact tracking tech. Chinese disinformation campaigns rely on ad purchases and social media amplification. Phishing attempts and other scams. Notes on ransomware. And police in the Netherlands take down some DDoS-for-hire services. Andrea Little Limbago on government created internet blackouts, guest is Herb Stapleton from the FBI on COVID-19 scams.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_13.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1333</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[318db6cf-046d-4918-9f80-c10404f67ad3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2256435292.mp3?updated=1690203824" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Profiling an audacious Nigerian cybercriminal. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/130/notes</link>
      <description>By day, he is Dton, an upstanding Nigerian citizen. He believes in professionalism, hard work and excellence. He’s a leader, a content creator, an entrepreneur and an innovator; an accomplished business administrator; a renaissance man who is adored by his colleagues. But by night, he is Bill Henry, Cybercriminal Entrepreneur. We sat down with a researcher at CheckPoint for the inside scoop into this fascinating, brazen individual. 
The research can be found here:
 The Inside Scoop on a Six-Figure Nigerian Fraud Campaign
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Apr 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>130</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/aa803430-df13-11ea-b170-1b752d23823f/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>By day, he is Dton, an upstanding Nigerian citizen. He believes in professionalism, hard work and excellence. He’s a leader, a content creator, an entrepreneur and an innovator; an accomplished business administrator; a renaissance man who is adored...</itunes:subtitle>
      <itunes:summary>By day, he is Dton, an upstanding Nigerian citizen. He believes in professionalism, hard work and excellence. He’s a leader, a content creator, an entrepreneur and an innovator; an accomplished business administrator; a renaissance man who is adored by his colleagues. But by night, he is Bill Henry, Cybercriminal Entrepreneur. We sat down with a researcher at CheckPoint for the inside scoop into this fascinating, brazen individual. 
The research can be found here:
 The Inside Scoop on a Six-Figure Nigerian Fraud Campaign
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>By day, he is Dton, an upstanding Nigerian citizen. He believes in professionalism, hard work and excellence. He’s a leader, a content creator, an entrepreneur and an innovator; an accomplished business administrator; a renaissance man who is adored by his colleagues. But by night, he is Bill Henry, Cybercriminal Entrepreneur. We sat down with a researcher at CheckPoint for the inside scoop into this fascinating, brazen individual. </p><p>The research can be found here:</p><p><a href="https://research.checkpoint.com/2020/the-inside-scoop-on-a-six-figure-nigerian-fraud-campaign/"> The Inside Scoop on a Six-Figure Nigerian Fraud Campaign</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1367</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[43fd24b9-a1b9-4fde-8ba7-a94e906737c0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1296711384.mp3?updated=1685107800" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>That odd and bogus 5G meme. Malvertising. Data breach hits Pakistani mobile users. xHelper update. Data privacy and data utility. COVID-19 and cybersecurity.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1064/notes</link>
      <description>The curious history of the delusion that COVID-19 has something to do with 5G. Malvertising spoofs a security company’s website. Data breach hits Pakistani mobile users. xHelper is still in circulation. Data privacy versus data utility. COVID-19-driven patterns of cybercrime. And more on Zoom and the challenges of working remotely. Mike Benjamin from CenturyLink on ddosing, botnets and IoT news, guest is Nathalie Marcotte from Schneider Electric on the role cybersecurity plays in convergence of IT/OT.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_10.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 10 Apr 2020 19:01:54 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1064</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/62daa784-def8-11ea-911f-d348b99de84b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The curious history of the delusion that COVID-19 has something to do with 5G. Malvertising spoofs a security company’s website. Data breach hits Pakistani mobile users. xHelper is still in circulation. Data privacy versus data utility....</itunes:subtitle>
      <itunes:summary>The curious history of the delusion that COVID-19 has something to do with 5G. Malvertising spoofs a security company’s website. Data breach hits Pakistani mobile users. xHelper is still in circulation. Data privacy versus data utility. COVID-19-driven patterns of cybercrime. And more on Zoom and the challenges of working remotely. Mike Benjamin from CenturyLink on ddosing, botnets and IoT news, guest is Nathalie Marcotte from Schneider Electric on the role cybersecurity plays in convergence of IT/OT.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_10.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The curious history of the delusion that COVID-19 has something to do with 5G. Malvertising spoofs a security company’s website. Data breach hits Pakistani mobile users. xHelper is still in circulation. Data privacy versus data utility. COVID-19-driven patterns of cybercrime. And more on Zoom and the challenges of working remotely. Mike Benjamin from CenturyLink on ddosing, botnets and IoT news, guest is Nathalie Marcotte from Schneider Electric on the role cybersecurity plays in convergence of IT/OT.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_10.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1603</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7981451e-6505-47a9-b077-da22fb183fe4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4857619758.mp3?updated=1608756489" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Operation Pinball. Implausibly spoofed, not really official, COVID-19 emails. CISA updates US Federal telework guidance. ICO defers some big GDPR fines. Zoom agonistes. Fleeceware in Apple’s store.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1063/notes</link>
      <description>Operation Pinball roils up Eastern Europe and the Near Abroad. Crooks who can’t write idiomatic American English are spoofing emails from the White House in a COVID-19-themed phishing campaign. CISA updates telework guidelines for Federal agencies. Some GDPR fines are deferred until after the pandemic. Zoom continues to reel from its success. And fleeceware is found in the iTunes store. Caleb Barlow from CynergisTek on OODA loops, guest is Or Katz from Akamai on how current industry (and employee) phishing defenses are being bypassed by attackers.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_09.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 09 Apr 2020 18:31:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1063</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/62f7a5aa-def8-11ea-911f-e3d04d3194af/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Operation Pinball roils up Eastern Europe and the Near Abroad. Crooks who can’t write idiomatic American English are spoofing emails from the White House in a COVID-19-themed phishing campaign. CISA updates telework guidelines for Federal agencies....</itunes:subtitle>
      <itunes:summary>Operation Pinball roils up Eastern Europe and the Near Abroad. Crooks who can’t write idiomatic American English are spoofing emails from the White House in a COVID-19-themed phishing campaign. CISA updates telework guidelines for Federal agencies. Some GDPR fines are deferred until after the pandemic. Zoom continues to reel from its success. And fleeceware is found in the iTunes store. Caleb Barlow from CynergisTek on OODA loops, guest is Or Katz from Akamai on how current industry (and employee) phishing defenses are being bypassed by attackers.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_09.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Operation Pinball roils up Eastern Europe and the Near Abroad. Crooks who can’t write idiomatic American English are spoofing emails from the White House in a COVID-19-themed phishing campaign. CISA updates telework guidelines for Federal agencies. Some GDPR fines are deferred until after the pandemic. Zoom continues to reel from its success. And fleeceware is found in the iTunes store. Caleb Barlow from CynergisTek on OODA loops, guest is Or Katz from Akamai on how current industry (and employee) phishing defenses are being bypassed by attackers.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_09.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1301</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[be819062-3819-47d0-8f3f-147a43f42cb9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5986256188.mp3?updated=1690203799" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Joint UK-US warning on COVID-19-themed cyber threats. Disinformation in the subcontinent. Public and private apps with privacy issues. A new IoT botnet. APT notes. Frontiers in biometrics.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1062/notes</link>
      <description>NCSC and CISA issue a joint warning on cyber threats during the COVID-19 pandemic. India’s government seeks to limit disinformation in social media. Zoom works on privacy issues, and government contact-tracking apps face their own problems. A new DDoS botnet, “dark_nexus,” is out. BGP hijack questions persist. Is a front company facilitating Chinese government RATs? Spies and spyware. And a biometric advance leads from the rear. Joe Carrigan from JHU ISI on how COVID-19 is reinforcing TLS 1.0, guest is Pedram Amini from InQuest on winning the Cyber Tank contest.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_08.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 08 Apr 2020 19:16:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1062</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6317d226-def8-11ea-911f-63b334663b65/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>NCSC and CISA issue a joint warning on cyber threats during the COVID-19 pandemic. India’s government seeks to limit disinformation in social media. Zoom works on privacy issues, and government contact-tracking apps face their own problems. A new...</itunes:subtitle>
      <itunes:summary>NCSC and CISA issue a joint warning on cyber threats during the COVID-19 pandemic. India’s government seeks to limit disinformation in social media. Zoom works on privacy issues, and government contact-tracking apps face their own problems. A new DDoS botnet, “dark_nexus,” is out. BGP hijack questions persist. Is a front company facilitating Chinese government RATs? Spies and spyware. And a biometric advance leads from the rear. Joe Carrigan from JHU ISI on how COVID-19 is reinforcing TLS 1.0, guest is Pedram Amini from InQuest on winning the Cyber Tank contest.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_08.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>NCSC and CISA issue a joint warning on cyber threats during the COVID-19 pandemic. India’s government seeks to limit disinformation in social media. Zoom works on privacy issues, and government contact-tracking apps face their own problems. A new DDoS botnet, “dark_nexus,” is out. BGP hijack questions persist. Is a front company facilitating Chinese government RATs? Spies and spyware. And a biometric advance leads from the rear. Joe Carrigan from JHU ISI on how COVID-19 is reinforcing TLS 1.0, guest is Pedram Amini from InQuest on winning the Cyber Tank contest.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_08.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1287</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cca6c798-f1a5-4d53-8205-1ff0a1674d9f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2183258853.mp3?updated=1690203788" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trends in COVID-19-themed cybercrime. Social media seek to inhibit the misinformation pandemic. Corp[dot] off the market. BEC in cloud services. Investment notes. Big big fraud.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1061/notes</link>
      <description>Criminals increase their targeting of hospitals and pharmaceutical companies. Ordinary scams proliferate worldwide, using COVID-19 as their bait. Social media seek to inhibit the flow of coronavirus misinformation. The commodification of zero-day exploits. Corp[dot]com is no longer available. FBI warns of business email compromise via cloud services. A quick look at investment, and, finally, something other than the Brooklyn Bridge is for sale. Ben Yelin from UMD CHHS on a class action lawsuit against Zoom, guest is Matt Davey from 1Password on shadow IT trends, security risks, and best practices for oversight.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_07.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Apr 2020 18:51:50 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1061</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/632bbe26-def8-11ea-911f-db47d72e494e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Criminals increase their targeting of hospitals and pharmaceutical companies. Ordinary scams proliferate worldwide, using COVID-19 as their bait. Social media seek to inhibit the flow of coronavirus misinformation. The commodification of zero-day...</itunes:subtitle>
      <itunes:summary>Criminals increase their targeting of hospitals and pharmaceutical companies. Ordinary scams proliferate worldwide, using COVID-19 as their bait. Social media seek to inhibit the flow of coronavirus misinformation. The commodification of zero-day exploits. Corp[dot]com is no longer available. FBI warns of business email compromise via cloud services. A quick look at investment, and, finally, something other than the Brooklyn Bridge is for sale. Ben Yelin from UMD CHHS on a class action lawsuit against Zoom, guest is Matt Davey from 1Password on shadow IT trends, security risks, and best practices for oversight.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_07.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Criminals increase their targeting of hospitals and pharmaceutical companies. Ordinary scams proliferate worldwide, using COVID-19 as their bait. Social media seek to inhibit the flow of coronavirus misinformation. The commodification of zero-day exploits. Corp[dot]com is no longer available. FBI warns of business email compromise via cloud services. A quick look at investment, and, finally, something other than the Brooklyn Bridge is for sale. Ben Yelin from UMD CHHS on a class action lawsuit against Zoom, guest is Matt Davey from 1Password on shadow IT trends, security risks, and best practices for oversight.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_07.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1301</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f445db84-a037-4113-a023-cd2111558edc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1170371288.mp3?updated=1690203760" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>COVID-19 updates: crime, propaganda, and craziness. (Also telework.) BGP hijacking. DarkHotel sighting. Apps behaving badly. And a risk of sim-swapping. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1060/notes</link>
      <description>The COVID-19 pandemic continues to drive a spike in cybercrime. It’s also been the occasion for various state-operated disinformation campaigns, and for some surprisingly widespread popular delusions. Zoom’s acknowledgement that some traffic was mistakenly routed through China draws more scrutiny to the teleconferencing service. A possible BGP hijack is reported. DarkHotel is said to be back. Bad stuff in Google Play. And a sim-swapping risk. Malek Ben Salem from Accenture on CISO health concerns, guest is Dr. Celeste Paul from NSA on cognitive capacity and burnout.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_06.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 06 Apr 2020 19:09:14 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1060</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/634090d0-def8-11ea-911f-8fc38cd7dcda/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The COVID-19 pandemic continues to drive a spike in cybercrime. It’s also been the occasion for various state-operated disinformation campaigns, and for some surprisingly widespread popular delusions. Zoom’s acknowledgement that some traffic was...</itunes:subtitle>
      <itunes:summary>The COVID-19 pandemic continues to drive a spike in cybercrime. It’s also been the occasion for various state-operated disinformation campaigns, and for some surprisingly widespread popular delusions. Zoom’s acknowledgement that some traffic was mistakenly routed through China draws more scrutiny to the teleconferencing service. A possible BGP hijack is reported. DarkHotel is said to be back. Bad stuff in Google Play. And a sim-swapping risk. Malek Ben Salem from Accenture on CISO health concerns, guest is Dr. Celeste Paul from NSA on cognitive capacity and burnout.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_06.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The COVID-19 pandemic continues to drive a spike in cybercrime. It’s also been the occasion for various state-operated disinformation campaigns, and for some surprisingly widespread popular delusions. Zoom’s acknowledgement that some traffic was mistakenly routed through China draws more scrutiny to the teleconferencing service. A possible BGP hijack is reported. DarkHotel is said to be back. Bad stuff in Google Play. And a sim-swapping risk. Malek Ben Salem from Accenture on CISO health concerns, guest is Dr. Celeste Paul from NSA on cognitive capacity and burnout.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_06.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1278</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cb78581a-555b-4d03-8fc3-604d633b5fd6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6974585091.mp3?updated=1690203747" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A rough year ahead for ransomware attacks - and how to stop them. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/129/notes</link>
      <description>2020 is shaping up to be a rough year. Ransomware attacks will continue to grow as cybercriminals get more sophisticated in their methods and expand their reach. Allan Liska, Senior Analyst at Recorded Future, shares their findings and predictions in a new report. 
The research can be found here:
5 Ransomware Trends to Watch in 2020
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Apr 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>129</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a69d6fb8-df13-11ea-9dfb-efc55939ce45/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>2020 is shaping up to be a rough year. Ransomware attacks will continue to grow as cybercriminals get more sophisticated in their methods and expand their reach. Allan Liska, Senior Analyst at Recorded Future, shares their findings and predictions in...</itunes:subtitle>
      <itunes:summary>2020 is shaping up to be a rough year. Ransomware attacks will continue to grow as cybercriminals get more sophisticated in their methods and expand their reach. Allan Liska, Senior Analyst at Recorded Future, shares their findings and predictions in a new report. 
The research can be found here:
5 Ransomware Trends to Watch in 2020
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>2020 is shaping up to be a rough year. Ransomware attacks will continue to grow as cybercriminals get more sophisticated in their methods and expand their reach. Allan Liska, Senior Analyst at Recorded Future, shares their findings and predictions in a new report. </p><p>The research can be found here:</p><p><a href="https://www.recordedfuture.com/ransomware-trends-2020/">5 Ransomware Trends to Watch in 2020</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>877</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[678cf086-0784-4f08-b809-17d012023ab9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6828091645.mp3?updated=1685107788" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cybersecurity notes during the pandemic emergency. Twitter bots. Ransomware attack on a biotech firm. WHO updates. And how are the cyber gangs doing these days?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1059/notes</link>
      <description>Geolocation in support of social distancing. Fixing vulnerabilities in a popular teleconferencing service. Twitter bots running an influence campaign against the Turkish government are taken down. A biotech firm reports a ransomware attack. More on attempts to compromise the World Health Organization. And a look at how cyber criminals are faring during the emergency. Michael Sechrist from BAH on cybercrime changes in the age of Coronavirus, guest is Admiral James Stavridis (Ret.) from Preveil on global cyber security threats and realities.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_03.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 03 Apr 2020 19:08:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1059</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6354c3b6-def8-11ea-911f-c393cee3eb91/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Geolocation in support of social distancing. Fixing vulnerabilities in a popular teleconferencing service. Twitter bots running an influence campaign against the Turkish government are taken down. A biotech firm reports a ransomware attack. More on...</itunes:subtitle>
      <itunes:summary>Geolocation in support of social distancing. Fixing vulnerabilities in a popular teleconferencing service. Twitter bots running an influence campaign against the Turkish government are taken down. A biotech firm reports a ransomware attack. More on attempts to compromise the World Health Organization. And a look at how cyber criminals are faring during the emergency. Michael Sechrist from BAH on cybercrime changes in the age of Coronavirus, guest is Admiral James Stavridis (Ret.) from Preveil on global cyber security threats and realities.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_03.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Geolocation in support of social distancing. Fixing vulnerabilities in a popular teleconferencing service. Twitter bots running an influence campaign against the Turkish government are taken down. A biotech firm reports a ransomware attack. More on attempts to compromise the World Health Organization. And a look at how cyber criminals are faring during the emergency. Michael Sechrist from BAH on cybercrime changes in the age of Coronavirus, guest is Admiral James Stavridis (Ret.) from Preveil on global cyber security threats and realities.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_03.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1581</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[afaa8772-0251-4a4e-b67c-d17c2845c4c7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9903880542.mp3?updated=1608756472" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>WHO email accounts prospected. Mandrake versus Android users. Vollgar versus MS-SQL servers. Ransomware and hospitals. Notes on the effects of COVID-19, and a disinformation campaign.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1058/notes</link>
      <description>Attempts on World Health Organization email accounts possibly linked to Iran. Mandrake Android malware is active against carefully selected targets. Vollgar attacks Windows systems running MS-SQL Server. Hospitals remain attractive targets for ransomware gangs. Italy’s social security operations shut down by hacking. Coronavirus disinformation. The pandemic’s effects on business. And a look at the fortunes of Zoom. Andrea Little Limbago from Virtru on the global battle for information control, guest is Perry Carpenter from KnowBe4 on security awareness.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_02.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 02 Apr 2020 19:06:17 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1058</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/636c7394-def8-11ea-911f-230d439a79d4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Attempts on World Health Organization email accounts possibly linked to Iran. Mandrake Android malware is active against carefully selected targets. Vollgar attacks Windows systems running MS-SQL Server. Hospitals remain attractive targets for...</itunes:subtitle>
      <itunes:summary>Attempts on World Health Organization email accounts possibly linked to Iran. Mandrake Android malware is active against carefully selected targets. Vollgar attacks Windows systems running MS-SQL Server. Hospitals remain attractive targets for ransomware gangs. Italy’s social security operations shut down by hacking. Coronavirus disinformation. The pandemic’s effects on business. And a look at the fortunes of Zoom. Andrea Little Limbago from Virtru on the global battle for information control, guest is Perry Carpenter from KnowBe4 on security awareness.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_02.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Attempts on World Health Organization email accounts possibly linked to Iran. Mandrake Android malware is active against carefully selected targets. Vollgar attacks Windows systems running MS-SQL Server. Hospitals remain attractive targets for ransomware gangs. Italy’s social security operations shut down by hacking. Coronavirus disinformation. The pandemic’s effects on business. And a look at the fortunes of Zoom. Andrea Little Limbago from Virtru on the global battle for information control, guest is Perry Carpenter from KnowBe4 on security awareness.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_02.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1243</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a4a3d194-60ef-4cbc-8918-e1558546f01d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3090618519.mp3?updated=1690203722" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More data breaches. DPRK spearphishing. DoJ IG sees problems in FISA warrant processes. Houseparty updates. Huawei sanctions. And notes about the pandemic.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1057/notes</link>
      <description>Marriott discloses a major data breach. Another insecurely configured Elasticsearch database is found, this one belonging to a secure cloud backup provider. More spearphishing from Pyongyang. The US Justice Department IG sees systemic problems in the FISA warrant process. Updates on the Houseparty affair. Huawei suggests that Beijing will retaliate against more sanctions from Washington. And more COVID-19 notes concerning the cyber sector. Joe Carrigan from JHU ISI on Safari blocking third-party cookies, guest is Monzy Merza of Splunk on becoming an InfoSec leader.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_01.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 01 Apr 2020 19:57:57 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1057</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/63978c78-def8-11ea-911f-c36aa34ea1b0/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Marriott discloses a major data breach. Another insecurely configured Elasticsearch database is found, this one belonging to a secure cloud backup provider. More spearphishing from Pyongyang. The US Justice Department IG sees systemic problems in the...</itunes:subtitle>
      <itunes:summary>Marriott discloses a major data breach. Another insecurely configured Elasticsearch database is found, this one belonging to a secure cloud backup provider. More spearphishing from Pyongyang. The US Justice Department IG sees systemic problems in the FISA warrant process. Updates on the Houseparty affair. Huawei suggests that Beijing will retaliate against more sanctions from Washington. And more COVID-19 notes concerning the cyber sector. Joe Carrigan from JHU ISI on Safari blocking third-party cookies, guest is Monzy Merza of Splunk on becoming an InfoSec leader.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_01.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Marriott discloses a major data breach. Another insecurely configured Elasticsearch database is found, this one belonging to a secure cloud backup provider. More spearphishing from Pyongyang. The US Justice Department IG sees systemic problems in the FISA warrant process. Updates on the Houseparty affair. Huawei suggests that Beijing will retaliate against more sanctions from Washington. And more COVID-19 notes concerning the cyber sector. Joe Carrigan from JHU ISI on Safari blocking third-party cookies, guest is Monzy Merza of Splunk on becoming an InfoSec leader.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/April/CyberWire_2020_04_01.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1233</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5d17e594-b611-4f93-b9f6-6a157778cdf9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6226232943.mp3?updated=1690203712" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Supply chain attack warning. CFAA clarified. COVID-19 and its economic squalls. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1056/notes</link>
      <description>FBI warns of another supply chain attack, this one distributing the Kwampirs RAT. More exposed databases found. The US Computer Fraud and Abuse Act gets some clarification from a Federal Court. Security and networking companies are weathering the COVID-19 economic storm, but not without squalls, some legal, some cyber, and others just reputational. Ben Yelin from UMD CHHS on ending targeted advertising, guest is Brendan O’Connor from AppOmni on the state of cloud security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_31.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 31 Mar 2020 19:56:58 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1056</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/63aa194c-def8-11ea-911f-1b991ac0fd99/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>FBI warns of another supply chain attack, this one distributing the Kwampirs RAT. More exposed databases found. The US Computer Fraud and Abuse Act gets some clarification from a Federal Court. Security and networking companies are weathering the...</itunes:subtitle>
      <itunes:summary>FBI warns of another supply chain attack, this one distributing the Kwampirs RAT. More exposed databases found. The US Computer Fraud and Abuse Act gets some clarification from a Federal Court. Security and networking companies are weathering the COVID-19 economic storm, but not without squalls, some legal, some cyber, and others just reputational. Ben Yelin from UMD CHHS on ending targeted advertising, guest is Brendan O’Connor from AppOmni on the state of cloud security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_31.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>FBI warns of another supply chain attack, this one distributing the Kwampirs RAT. More exposed databases found. The US Computer Fraud and Abuse Act gets some clarification from a Federal Court. Security and networking companies are weathering the COVID-19 economic storm, but not without squalls, some legal, some cyber, and others just reputational. Ben Yelin from UMD CHHS on ending targeted advertising, guest is Brendan O’Connor from AppOmni on the state of cloud security.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_31.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1266</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bb37a362-621f-48f4-9747-833c81139528]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1666937337.mp3?updated=1690203699" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Updates on the cyber ramifications of the coronavirus pandemic. Saudi surveillance program. Ransomware developments. Lost USB attacks are in progress. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1055/notes</link>
      <description>Updates on the coronavirus and its effect on the cyber sector. Criminals spoof infection warnings from hospitals. The country of Georgia’s voter data has been exposed online. The Kingdom of Saudi Arabia seems to have conducted extensive surveillance of its subjects as they travel in the US. The Zeus Sphinx Trojan is back. Dharma ransomware’s source code is for sale in the black market. And beware teddy bears bearing USB drives. David Dufour from Webroot on differences between privacy and security, guest is Daniel dos Santos from Forescout on Ransomware, IoT, and the impact on critical infrastructure.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_30.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 30 Mar 2020 19:30:12 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1055</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/63c0da2e-def8-11ea-911f-077e2d46899e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Updates on the coronavirus and its effect on the cyber sector. Criminals spoof infection warnings from hospitals. The country of Georgia’s voter data has been exposed online. The Kingdom of Saudi Arabia seems to have conducted extensive surveillance...</itunes:subtitle>
      <itunes:summary>Updates on the coronavirus and its effect on the cyber sector. Criminals spoof infection warnings from hospitals. The country of Georgia’s voter data has been exposed online. The Kingdom of Saudi Arabia seems to have conducted extensive surveillance of its subjects as they travel in the US. The Zeus Sphinx Trojan is back. Dharma ransomware’s source code is for sale in the black market. And beware teddy bears bearing USB drives. David Dufour from Webroot on differences between privacy and security, guest is Daniel dos Santos from Forescout on Ransomware, IoT, and the impact on critical infrastructure.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_30.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Updates on the coronavirus and its effect on the cyber sector. Criminals spoof infection warnings from hospitals. The country of Georgia’s voter data has been exposed online. The Kingdom of Saudi Arabia seems to have conducted extensive surveillance of its subjects as they travel in the US. The Zeus Sphinx Trojan is back. Dharma ransomware’s source code is for sale in the black market. And beware teddy bears bearing USB drives. David Dufour from Webroot on differences between privacy and security, guest is Daniel dos Santos from Forescout on Ransomware, IoT, and the impact on critical infrastructure.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_30.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1256</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1eba196d-14fd-4c3d-b163-84e5b1a91a4e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9327945703.mp3?updated=1690203691" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hidden dangers inside Windows and LINUX computers. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/128/notes</link>
      <description>Eclypsium has issued a study that suggests the prevalence of “unsigned firmware in WiFi adapters, USB hubs, trackpads, and cameras used in computers from Lenovo, Dell, HP and other major manufacturers.” Here to discuss their findings is Rick Altherr, a Principle Engineer at Eclypsium.
The research can be found here:
Perilous Peripherals: The Hidden Dangers Inside Windows and LINUX Computers. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Mar 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>128</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a31b577e-df13-11ea-b170-7b17cf0ba0eb/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Eclypsium has issued a study that suggests the prevalence of “unsigned firmware in WiFi adapters, USB hubs, trackpads, and cameras used in computers from Lenovo, Dell, HP and other major manufacturers.” Here to discuss their findings is Rick...</itunes:subtitle>
      <itunes:summary>Eclypsium has issued a study that suggests the prevalence of “unsigned firmware in WiFi adapters, USB hubs, trackpads, and cameras used in computers from Lenovo, Dell, HP and other major manufacturers.” Here to discuss their findings is Rick Altherr, a Principle Engineer at Eclypsium.
The research can be found here:
Perilous Peripherals: The Hidden Dangers Inside Windows and LINUX Computers. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Eclypsium has issued a study that suggests the prevalence of “unsigned firmware in WiFi adapters, USB hubs, trackpads, and cameras used in computers from Lenovo, Dell, HP and other major manufacturers.” Here to discuss their findings is Rick Altherr, a Principle Engineer at Eclypsium.</p><p>The research can be found here:</p><p><a href="https://eclypsium.com/2020/2/18/unsigned-peripheral-firmware/">Perilous Peripherals: The Hidden Dangers Inside Windows and LINUX Computers. </a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1382</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bbbff1d8-c6df-4a73-a19a-66c67b281cdc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1002223291.mp3?updated=1685107783" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Some notes on cyber gangland. South Koren APT using zero days against North Koreans? USB attacks. Telework challenges. CMMC remains on schedule. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1054/notes</link>
      <description>Ransomware gangs don’t seem to be trimming their activities for the greater good. TA505 and Silence identified as the groups behind recent attacks on European companies. An APT possibly connected to South Korea is linked to attacks on North Korean professionals. A criminal campaign of USB attacks is reported. Problems with VPNs and teleconferencing. The Pentagon’s CMMC will move forward on schedule. Rob Lee from Dragos on ICS resiliency in the face of Coronavirus, guest is James Dawson from Danske Bank on the unique challenges of IT Risk &amp; Controls in global banking.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_27.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 27 Mar 2020 19:54:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1054</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/63dc70c2-def8-11ea-911f-ffa68cc96e19/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ransomware gangs don’t seem to be trimming their activities for the greater good. TA505 and Silence identified as the groups behind recent attacks on European companies. An APT possibly connected to South Korea is linked to attacks on North Korean...</itunes:subtitle>
      <itunes:summary>Ransomware gangs don’t seem to be trimming their activities for the greater good. TA505 and Silence identified as the groups behind recent attacks on European companies. An APT possibly connected to South Korea is linked to attacks on North Korean professionals. A criminal campaign of USB attacks is reported. Problems with VPNs and teleconferencing. The Pentagon’s CMMC will move forward on schedule. Rob Lee from Dragos on ICS resiliency in the face of Coronavirus, guest is James Dawson from Danske Bank on the unique challenges of IT Risk &amp; Controls in global banking.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_27.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ransomware gangs don’t seem to be trimming their activities for the greater good. TA505 and Silence identified as the groups behind recent attacks on European companies. An APT possibly connected to South Korea is linked to attacks on North Korean professionals. A criminal campaign of USB attacks is reported. Problems with VPNs and teleconferencing. The Pentagon’s CMMC will move forward on schedule. Rob Lee from Dragos on ICS resiliency in the face of Coronavirus, guest is James Dawson from Danske Bank on the unique challenges of IT Risk &amp; Controls in global banking.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_27.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1569</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[92fd20fe-fe5b-452a-a19b-eaea370d3bb9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7069276728.mp3?updated=1608756460" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Advice on secure telework. Magecart infestations. DNS hijacking with a COVID-19 twist and an info-stealer hook. Patch notes. The US 5G security strategy. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1053/notes</link>
      <description>NIST offers advice on telework, as does Microsoft. Things to do for your professional growth while you’re in your bunker. Magecart hits Tupperware, and they won’t be the last as e-commerce targeting spikes. DNS hijacking contributes to an info-stealing campaign. Apple and Adobe both patch. The US publishes its 5G security strategy. And some thoughts on the value of work, as brought into relief by a pandemic. Thomas Etheridge from Crowdstrike on their 2020 Cyber Front Lines Report, guest is Michelle Koblas from AppDynamics on third-party risk management.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_26.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 26 Mar 2020 18:12:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1053</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/63fea480-def8-11ea-911f-7bb2cfe8a15f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>NIST offers advice on telework, as does Microsoft. Things to do for your professional growth while you’re in your bunker. Magecart hits Tupperware, and they won’t be the last as e-commerce targeting spikes. DNS hijacking contributes to an...</itunes:subtitle>
      <itunes:summary>NIST offers advice on telework, as does Microsoft. Things to do for your professional growth while you’re in your bunker. Magecart hits Tupperware, and they won’t be the last as e-commerce targeting spikes. DNS hijacking contributes to an info-stealing campaign. Apple and Adobe both patch. The US publishes its 5G security strategy. And some thoughts on the value of work, as brought into relief by a pandemic. Thomas Etheridge from Crowdstrike on their 2020 Cyber Front Lines Report, guest is Michelle Koblas from AppDynamics on third-party risk management.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_26.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>NIST offers advice on telework, as does Microsoft. Things to do for your professional growth while you’re in your bunker. Magecart hits Tupperware, and they won’t be the last as e-commerce targeting spikes. DNS hijacking contributes to an info-stealing campaign. Apple and Adobe both patch. The US publishes its 5G security strategy. And some thoughts on the value of work, as brought into relief by a pandemic. Thomas Etheridge from Crowdstrike on their 2020 Cyber Front Lines Report, guest is Michelle Koblas from AppDynamics on third-party risk management.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_26.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1201</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eb250890-7fa4-4bac-87fc-853cf310c90c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7261574074.mp3?updated=1690203662" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>APT41 is back from its Lunar New Year break. Commodity attack tools for states and gangs. Russia takes down a domestic carding crew. Restricting misinformation. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1052/notes</link>
      <description>APT41 is back, and throwing its weight around in about twenty verticals. States and gangs swap commodity malware. The FSB--yes, that FSB--takes down a major Russian carding gang. Coronavirus-themed attacks are likely to outlast the pandemic. Facebook Messenger considers limiting mass message forwarding as a way of slowing the spread of COVID-19 misinformation. Joe Carrigan from JHU ISI on stimulus check scams, guest is Rachael Stockton from LogMeIn (LastPass) on the future of business network access security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_25.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 25 Mar 2020 19:34:20 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1052</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/641a07ac-def8-11ea-911f-e3a7ded9f894/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>APT41 is back, and throwing its weight around in about twenty verticals. States and gangs swap commodity malware. The FSB--yes, that FSB--takes down a major Russian carding gang. Coronavirus-themed attacks are likely to outlast the pandemic. Facebook...</itunes:subtitle>
      <itunes:summary>APT41 is back, and throwing its weight around in about twenty verticals. States and gangs swap commodity malware. The FSB--yes, that FSB--takes down a major Russian carding gang. Coronavirus-themed attacks are likely to outlast the pandemic. Facebook Messenger considers limiting mass message forwarding as a way of slowing the spread of COVID-19 misinformation. Joe Carrigan from JHU ISI on stimulus check scams, guest is Rachael Stockton from LogMeIn (LastPass) on the future of business network access security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_25.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>APT41 is back, and throwing its weight around in about twenty verticals. States and gangs swap commodity malware. The FSB--yes, that FSB--takes down a major Russian carding gang. Coronavirus-themed attacks are likely to outlast the pandemic. Facebook Messenger considers limiting mass message forwarding as a way of slowing the spread of COVID-19 misinformation. Joe Carrigan from JHU ISI on stimulus check scams, guest is Rachael Stockton from LogMeIn (LastPass) on the future of business network access security.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_25.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1254</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[da6231ef-3e19-4b2d-a0b5-58125795c278]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2978090745.mp3?updated=1690203642" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Active ICS threats. TrickBot and TrickMo. RCE vulnerability in Windows. Google ejects click-fraud malware infested apps from Play. Attackers hit WHO, hospitals, and biomedical research.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1051/notes</link>
      <description>WildPressure APT targets industrial systems in the Middle East. ICS attack tools show increasing commodification. TrickMo works against secure banking. Microsoft warns of RCE vulnerability in the way Windows renders fonts. Click fraud malware found in childrens’ apps sold in Google Play. DarkHotel attacks the World Health Organization. Ransomware hits Parisian hospitals and a British biomedical research firm. More COVID-19 phishbait. Ben Yelin from UMD CHHS on Coronavirus detecting cameras, guest is Allan Liska from Recorded Future on security in the time of Coronavirus.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_24.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Mar 2020 19:19:44 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1051</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/64311550-def8-11ea-911f-07faee6a67ba/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>WildPressure APT targets industrial systems in the Middle East. ICS attack tools show increasing commodification. TrickMo works against secure banking. Microsoft warns of RCE vulnerability in the way Windows renders fonts. Click fraud malware found in...</itunes:subtitle>
      <itunes:summary>WildPressure APT targets industrial systems in the Middle East. ICS attack tools show increasing commodification. TrickMo works against secure banking. Microsoft warns of RCE vulnerability in the way Windows renders fonts. Click fraud malware found in childrens’ apps sold in Google Play. DarkHotel attacks the World Health Organization. Ransomware hits Parisian hospitals and a British biomedical research firm. More COVID-19 phishbait. Ben Yelin from UMD CHHS on Coronavirus detecting cameras, guest is Allan Liska from Recorded Future on security in the time of Coronavirus.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_24.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>WildPressure APT targets industrial systems in the Middle East. ICS attack tools show increasing commodification. TrickMo works against secure banking. Microsoft warns of RCE vulnerability in the way Windows renders fonts. Click fraud malware found in childrens’ apps sold in Google Play. DarkHotel attacks the World Health Organization. Ransomware hits Parisian hospitals and a British biomedical research firm. More COVID-19 phishbait. Ben Yelin from UMD CHHS on Coronavirus detecting cameras, guest is Allan Liska from Recorded Future on security in the time of Coronavirus.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_24.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1290</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9b7b89c8-65bb-406c-ba81-34fd0a8fe3c2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7361731190.mp3?updated=1690203630" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Coronavirus fraud booms; prosecutors are taking note. Stolen data on the dark net. Software updates affected by pandemic. A new Mirai variant is out. A DDoS that wasn’t.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1050/notes</link>
      <description>US prosecutors begin to follow through on their announced determination to pay close attention to coronavirus fraud. Data stolen from Chinese social network Weibo is now for sale on the black market--at a discount. The pandemic affects scheduled software updates and sunsets at Google and Microsoft. A new Mirai variant is out in the wild. And a DDoS attack in Australia turns out to be just a lot of Australians in need of government services. Mike Benjamin from CenturyLink on threat actors using 3rd party file hosting, guest is Andrew Peterson from Signal Sciences on top application security attacks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_23.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 23 Mar 2020 19:14:37 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1050</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/644b77e2-def8-11ea-911f-13d10266e80a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>US prosecutors begin to follow through on their announced determination to pay close attention to coronavirus fraud. Data stolen from Chinese social network Weibo is now for sale on the black market--at a discount. The pandemic affects scheduled...</itunes:subtitle>
      <itunes:summary>US prosecutors begin to follow through on their announced determination to pay close attention to coronavirus fraud. Data stolen from Chinese social network Weibo is now for sale on the black market--at a discount. The pandemic affects scheduled software updates and sunsets at Google and Microsoft. A new Mirai variant is out in the wild. And a DDoS attack in Australia turns out to be just a lot of Australians in need of government services. Mike Benjamin from CenturyLink on threat actors using 3rd party file hosting, guest is Andrew Peterson from Signal Sciences on top application security attacks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_23.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>US prosecutors begin to follow through on their announced determination to pay close attention to coronavirus fraud. Data stolen from Chinese social network Weibo is now for sale on the black market--at a discount. The pandemic affects scheduled software updates and sunsets at Google and Microsoft. A new Mirai variant is out in the wild. And a DDoS attack in Australia turns out to be just a lot of Australians in need of government services. Mike Benjamin from CenturyLink on threat actors using 3rd party file hosting, guest is Andrew Peterson from Signal Sciences on top application security attacks.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_23.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1275</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[67620ed4-ee7a-44b5-b932-7ae8117442cc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6570740494.mp3?updated=1690203616" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The security implications of cloud infrastructure in IoT. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/127/notes</link>
      <description>Cloud computing is now at the center of nearly every business strategy. But, as with the rapid adoption of any new technology, growing pains persist. The key findings in these reports shed light on security missteps that are actually in practice by organizations across the globe.
Joining us in this special Research Saturday are Palo Alto Network's Matthew Chiodi and Ryan Olson. They discuss their findings in two different threat reports. 
The research can be found here:
Cloud Threat Report
IoT Threat Report
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Mar 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>127</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a12366d2-df13-11ea-9c25-e70e493b9314/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cloud computing is now at the center of nearly every business strategy. But, as with the rapid adoption of any new technology, growing pains persist. The key findings in these reports shed light on security missteps that are actually in practice by...</itunes:subtitle>
      <itunes:summary>Cloud computing is now at the center of nearly every business strategy. But, as with the rapid adoption of any new technology, growing pains persist. The key findings in these reports shed light on security missteps that are actually in practice by organizations across the globe.
Joining us in this special Research Saturday are Palo Alto Network's Matthew Chiodi and Ryan Olson. They discuss their findings in two different threat reports. 
The research can be found here:
Cloud Threat Report
IoT Threat Report
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cloud computing is now at the center of nearly every business strategy. But, as with the rapid adoption of any new technology, growing pains persist. The key findings in these reports shed light on security missteps that are actually in practice by organizations across the globe.</p><p>Joining us in this special Research Saturday are Palo Alto Network's Matthew Chiodi and Ryan Olson. They discuss their findings in two different threat reports. </p><p>The research can be found here:</p><p><a href="https://unit42.paloaltonetworks.com/cloud-threat-report-intro/">Cloud Threat Report</a></p><p><a href="https://unit42.paloaltonetworks.com/iot-threat-report-2020/">IoT Threat Report</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1791</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d12d8e24-c8fd-45ec-b4db-1a13d08ea08a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4786812669.mp3?updated=1685107777" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA on running critical sectors during an emergency. Disinformation, phishbait, and rumor. What’s Fancy Bear up to these days? Distinguishing altruism from self-interest.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1049/notes</link>
      <description>CISA describes what counts as critical infrastructure during a pandemic, and offers some advice on how to organize work during the emergency. Iran runs a disinformation campaign--apparently mostly for the benefit of a domestic audience--alleging that COVID-19 is a US biowar operation. Intelligence services, criminals, vandals, and gossips all flack coronavirus hooey in cyberspace. Fancy Bear is back. And what would provoke good behavior among thieves? (A hint: not altruism.) Malek Ben Salem from Accenture on mobile tracking and privacy, guest is Thomas Quinn from T Rowe Price on the job of protecting a financial institution.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_20.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 20 Mar 2020 20:05:49 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1049</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6462b6fa-def8-11ea-911f-273b42d25a19/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>CISA describes what counts as critical infrastructure during a pandemic, and offers some advice on how to organize work during the emergency. Iran runs a disinformation campaign--apparently mostly for the benefit of a domestic audience--alleging that...</itunes:subtitle>
      <itunes:summary>CISA describes what counts as critical infrastructure during a pandemic, and offers some advice on how to organize work during the emergency. Iran runs a disinformation campaign--apparently mostly for the benefit of a domestic audience--alleging that COVID-19 is a US biowar operation. Intelligence services, criminals, vandals, and gossips all flack coronavirus hooey in cyberspace. Fancy Bear is back. And what would provoke good behavior among thieves? (A hint: not altruism.) Malek Ben Salem from Accenture on mobile tracking and privacy, guest is Thomas Quinn from T Rowe Price on the job of protecting a financial institution.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_20.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA describes what counts as critical infrastructure during a pandemic, and offers some advice on how to organize work during the emergency. Iran runs a disinformation campaign--apparently mostly for the benefit of a domestic audience--alleging that COVID-19 is a US biowar operation. Intelligence services, criminals, vandals, and gossips all flack coronavirus hooey in cyberspace. Fancy Bear is back. And what would provoke good behavior among thieves? (A hint: not altruism.) Malek Ben Salem from Accenture on mobile tracking and privacy, guest is Thomas Quinn from T Rowe Price on the job of protecting a financial institution.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_20.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1571</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[50ddf5c5-1d53-4758-8e62-73aaa45b4cb8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2607668210.mp3?updated=1608756467" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>EU suspects Russia of disinformation. TrickBot’s latest module is a brute. Parallax RAT and the MaaS black market. Pandemic hacking trends. What to do with time on your hands.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1048/notes</link>
      <description>The EU suggests that Russia’s mounting an ongoing disinformation campaign concerning COVID-19. Russia says they didn’t do nuthin’. TrickBot is back with a new module, still under development, and it seems most interested in Hong Kong and the US. The Parallax RAT is the latest offering in the malware-as-a-service market. Food delivery services are now targets of opportunity for cybercriminals. Zoom-bombing is now a thing. And some advice from an astronaut. Andrea Little Limbago from Virtru with insights into her career path, guest is Tom Creedon from LookingGlass Cyber on the Asia-Pacific Cyber Conflict.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_19.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 19 Mar 2020 18:34:24 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1048</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/647f149e-def8-11ea-911f-33b9606dc7c7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The EU suggests that Russia’s mounting an ongoing disinformation campaign concerning COVID-19. Russia says they didn’t do nuthin’. TrickBot is back with a new module, still under development, and it seems most interested in Hong Kong and the US....</itunes:subtitle>
      <itunes:summary>The EU suggests that Russia’s mounting an ongoing disinformation campaign concerning COVID-19. Russia says they didn’t do nuthin’. TrickBot is back with a new module, still under development, and it seems most interested in Hong Kong and the US. The Parallax RAT is the latest offering in the malware-as-a-service market. Food delivery services are now targets of opportunity for cybercriminals. Zoom-bombing is now a thing. And some advice from an astronaut. Andrea Little Limbago from Virtru with insights into her career path, guest is Tom Creedon from LookingGlass Cyber on the Asia-Pacific Cyber Conflict.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_19.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The EU suggests that Russia’s mounting an ongoing disinformation campaign concerning COVID-19. Russia says they didn’t do nuthin’. TrickBot is back with a new module, still under development, and it seems most interested in Hong Kong and the US. The Parallax RAT is the latest offering in the malware-as-a-service market. Food delivery services are now targets of opportunity for cybercriminals. Zoom-bombing is now a thing. And some advice from an astronaut. Andrea Little Limbago from Virtru with insights into her career path, guest is Tom Creedon from LookingGlass Cyber on the Asia-Pacific Cyber Conflict.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_19.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1287</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f6fc954f-a174-4ca1-af18-f3dcb07879f9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1694801051.mp3?updated=1690203593" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Coronavirus phishing. Money mule recruiting. Remote work and behavioral baselining. HHS incident seems to have been...an incident. Advice from NIST, and from Dame Vera Lynne.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1047/notes</link>
      <description>More coronavirus phishing expeditions. Don’t let idleness or desperation lead you into a money-mule scam. How do behavioral expectations change during periods of remote work? The Health and Human Services incident appears to be just that. NIST has some advice for video-conferencing and virtual meetings. And an exhortation to return to the Blitz spirit. Joe Carrigan from JHU ISI on limitations of two-factor authenticator mobile apps, guest is Johnnie Konstantas from Oracle on cloud misconfigurations and shared responsibility in the public cloud.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_18.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 18 Mar 2020 19:16:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1047</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/64930dfa-def8-11ea-911f-7f95b927a705/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>More coronavirus phishing expeditions. Don’t let idleness or desperation lead you into a money-mule scam. How do behavioral expectations change during periods of remote work? The Health and Human Services incident appears to be just that. NIST has...</itunes:subtitle>
      <itunes:summary>More coronavirus phishing expeditions. Don’t let idleness or desperation lead you into a money-mule scam. How do behavioral expectations change during periods of remote work? The Health and Human Services incident appears to be just that. NIST has some advice for video-conferencing and virtual meetings. And an exhortation to return to the Blitz spirit. Joe Carrigan from JHU ISI on limitations of two-factor authenticator mobile apps, guest is Johnnie Konstantas from Oracle on cloud misconfigurations and shared responsibility in the public cloud.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_18.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>More coronavirus phishing expeditions. Don’t let idleness or desperation lead you into a money-mule scam. How do behavioral expectations change during periods of remote work? The Health and Human Services incident appears to be just that. NIST has some advice for video-conferencing and virtual meetings. And an exhortation to return to the Blitz spirit. Joe Carrigan from JHU ISI on limitations of two-factor authenticator mobile apps, guest is Johnnie Konstantas from Oracle on cloud misconfigurations and shared responsibility in the public cloud.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_18.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1411</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[27b99610-b297-4a03-b9a1-476ef395df2c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2314952602.mp3?updated=1690203581" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberattack on US HHS probably a minor probe. Disinformation about COVID-19 continues to serve as both phishbait and disruption. US prosecutors move to stop prosecution Concord Management.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1046/notes</link>
      <description>The cyberattack on the US Department of Health and Human Services seems now to have been a minor incident. Disinformation about COVID-19 and measures to contain the pandemic continues to serve as both phishbait and disruption. And US prosecutors move to stop prosecution of a Russian influence shop fingered by the Mueller investigation. Ben Yelin from UMD CHHS on HHS issuing health data rules, guest is Kevin Mitnick from KnowBe4 on the state of cybersecurity from the RSAC 2020 floor. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_17.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Mar 2020 17:49:12 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1046</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/64a7ff94-def8-11ea-911f-b3f532a02f2f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The cyberattack on the US Department of Health and Human Services seems now to have been a minor incident. Disinformation about COVID-19 and measures to contain the pandemic continues to serve as both phishbait and disruption. And US prosecutors move...</itunes:subtitle>
      <itunes:summary>The cyberattack on the US Department of Health and Human Services seems now to have been a minor incident. Disinformation about COVID-19 and measures to contain the pandemic continues to serve as both phishbait and disruption. And US prosecutors move to stop prosecution of a Russian influence shop fingered by the Mueller investigation. Ben Yelin from UMD CHHS on HHS issuing health data rules, guest is Kevin Mitnick from KnowBe4 on the state of cybersecurity from the RSAC 2020 floor. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_17.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The cyberattack on the US Department of Health and Human Services seems now to have been a minor incident. Disinformation about COVID-19 and measures to contain the pandemic continues to serve as both phishbait and disruption. And US prosecutors move to stop prosecution of a Russian influence shop fingered by the Mueller investigation. Ben Yelin from UMD CHHS on HHS issuing health data rules, guest is Kevin Mitnick from KnowBe4 on the state of cybersecurity from the RSAC 2020 floor. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_17.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1281</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cda2d32e-3049-4e84-babc-0b7ad2369baf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2795159350.mp3?updated=1690203567" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>COVID-19’s effects on cyberspace: disinformation, espionage, data theft, fraud, and extortion. Also far greater remote working.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1045/notes</link>
      <description>COVID-19’s effects on cyberspace: disinformation, espionage, data theft, fraud, and extortion. Also far greater remote working. David Dufour from Webroot on their 2020 Threat Report, guest is Simone Petrella from CyberVista on cybersecurity skills.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_16.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 16 Mar 2020 19:42:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1045</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/64bec9b8-def8-11ea-911f-a744ffa42281/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>COVID-19’s effects on cyberspace: disinformation, espionage, data theft, fraud, and extortion. Also far greater remote working. David Dufour from Webroot on their 2020 Threat Report, guest is Simone Petrella from CyberVista on cybersecurity skills....</itunes:subtitle>
      <itunes:summary>COVID-19’s effects on cyberspace: disinformation, espionage, data theft, fraud, and extortion. Also far greater remote working. David Dufour from Webroot on their 2020 Threat Report, guest is Simone Petrella from CyberVista on cybersecurity skills.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_16.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>COVID-19’s effects on cyberspace: disinformation, espionage, data theft, fraud, and extortion. Also far greater remote working. David Dufour from Webroot on their 2020 Threat Report, guest is Simone Petrella from CyberVista on cybersecurity skills.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_16.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1250</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1be81115-6d02-4f67-a991-298f0203d1a0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7899563299.mp3?updated=1690203555" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>TLS is here to stay. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/126/notes</link>
      <description>As websites and apps more widely adopt TLS (Transport Layer Security) and communicate over HTTPS connections, unencrypted traffic may draw even more attention, since it’s easier for analysts and security tools to identify malicious communication patterns in those plain HTTP sessions. Malware authors know this, and they’ve made it a priority to adopt TLS and thereby obfuscate the contents of malicious communication.
Joining us on this week's Research Saturday is Chester Wisniewski from SophosLabs discussing their research on the subject. 
The research can be found here:
 Nearly a quarter of malware now communicates using TLS
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Mar 2020 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>126</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9cbac16c-df13-11ea-b170-b79fa9fcb246/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>As websites and apps more widely adopt TLS (Transport Layer Security) and communicate over HTTPS connections, unencrypted traffic may draw even more attention, since it’s easier for analysts and security tools to identify malicious communication...</itunes:subtitle>
      <itunes:summary>As websites and apps more widely adopt TLS (Transport Layer Security) and communicate over HTTPS connections, unencrypted traffic may draw even more attention, since it’s easier for analysts and security tools to identify malicious communication patterns in those plain HTTP sessions. Malware authors know this, and they’ve made it a priority to adopt TLS and thereby obfuscate the contents of malicious communication.
Joining us on this week's Research Saturday is Chester Wisniewski from SophosLabs discussing their research on the subject. 
The research can be found here:
 Nearly a quarter of malware now communicates using TLS
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As websites and apps more widely adopt TLS (Transport Layer Security) and communicate over HTTPS connections, unencrypted traffic may draw even more attention, since it’s easier for analysts and security tools to identify malicious communication patterns in those plain HTTP sessions. Malware authors know this, and they’ve made it a priority to adopt TLS and thereby obfuscate the contents of malicious communication.</p><p>Joining us on this week's Research Saturday is Chester Wisniewski from SophosLabs discussing their research on the subject. </p><p>The research can be found here:</p><p><a href="https://news.sophos.com/en-us/2020/02/18/nearly-a-quarter-of-malware-now-communicates-using-tls/"> Nearly a quarter of malware now communicates using TLS</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1115</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[753eeaf3-aecc-4333-b569-57b020e49e50]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7696887779.mp3?updated=1685107763" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>COVID-19 as both incentive for remote work and phishbait. Offshored trolling. A list of “digital predators.” US Senate doesn’t extend domestic surveillance authority.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1044/notes</link>
      <description>COVID-19 significantly increased remote working, and the pandemic is now a favorite lure in the phishing tackle of both intelligence services and criminal gangs. Russian trolling has been off-shored, setting up shop in Ghana and Nigeria for running influence operations against the US. Microsoft issues an out-of-band patch. Reporters Without Borders publishes its list of “digital predators.” And the Senate doesn’t renew US domestic surveillance authorities. Thomas Etheridge from Crowdstrike on the impact of ransomware, guest is Josiah Dykstra from NSA on Cloud Vulnerabilities from an NSA viewpoint.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_13.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 13 Mar 2020 19:09:45 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1044</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/64d9bcdc-def8-11ea-911f-a33d9df5576f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>COVID-19 significantly increased remote working, and the pandemic is now a favorite lure in the phishing tackle of both intelligence services and criminal gangs. Russian trolling has been off-shored, setting up shop in Ghana and Nigeria for running...</itunes:subtitle>
      <itunes:summary>COVID-19 significantly increased remote working, and the pandemic is now a favorite lure in the phishing tackle of both intelligence services and criminal gangs. Russian trolling has been off-shored, setting up shop in Ghana and Nigeria for running influence operations against the US. Microsoft issues an out-of-band patch. Reporters Without Borders publishes its list of “digital predators.” And the Senate doesn’t renew US domestic surveillance authorities. Thomas Etheridge from Crowdstrike on the impact of ransomware, guest is Josiah Dykstra from NSA on Cloud Vulnerabilities from an NSA viewpoint.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_13.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>COVID-19 significantly increased remote working, and the pandemic is now a favorite lure in the phishing tackle of both intelligence services and criminal gangs. Russian trolling has been off-shored, setting up shop in Ghana and Nigeria for running influence operations against the US. Microsoft issues an out-of-band patch. Reporters Without Borders publishes its list of “digital predators.” And the Senate doesn’t renew US domestic surveillance authorities. Thomas Etheridge from Crowdstrike on the impact of ransomware, guest is Josiah Dykstra from NSA on Cloud Vulnerabilities from an NSA viewpoint.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_13.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1496</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[19465757-2c02-4d95-8f16-0126f0eb00cb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4141012989.mp3?updated=1608756462" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The return of Turla. Data exposure incidents disclosed. Beijing accuses Taipei of waging cyberwarfare against the PRC. Coronavirus disinformation.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1043/notes</link>
      <description>Turla’s back, this time with watering holes in compromised Armenian websites. Data exposures are reported in the Netherlands and the United States. China accuses Taiwan of waging cyberwarfare in an attempt to disrupt Beijing’s management of the coronavirus epidemic. The US and the EU separately undertake efforts to suppress COVID-19 disinformation. And the ins-and-outs of teleworking. Mike Benjamin from CenturyLink with Emotet updates, guest is Tom Pendergast from MediaPRO on their State of Privacy and Security Awareness Report.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_12.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 12 Mar 2020 19:53:20 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1043</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/64ef7a2c-def8-11ea-911f-6790d8dec293/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Turla’s back, this time with watering holes in compromised Armenian websites. Data exposures are reported in the Netherlands and the United States. China accuses Taiwan of waging cyberwarfare in an attempt to disrupt Beijing’s management of the...</itunes:subtitle>
      <itunes:summary>Turla’s back, this time with watering holes in compromised Armenian websites. Data exposures are reported in the Netherlands and the United States. China accuses Taiwan of waging cyberwarfare in an attempt to disrupt Beijing’s management of the coronavirus epidemic. The US and the EU separately undertake efforts to suppress COVID-19 disinformation. And the ins-and-outs of teleworking. Mike Benjamin from CenturyLink with Emotet updates, guest is Tom Pendergast from MediaPRO on their State of Privacy and Security Awareness Report.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_12.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Turla’s back, this time with watering holes in compromised Armenian websites. Data exposures are reported in the Netherlands and the United States. China accuses Taiwan of waging cyberwarfare in an attempt to disrupt Beijing’s management of the coronavirus epidemic. The US and the EU separately undertake efforts to suppress COVID-19 disinformation. And the ins-and-outs of teleworking. Mike Benjamin from CenturyLink with Emotet updates, guest is Tom Pendergast from MediaPRO on their State of Privacy and Security Awareness Report.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_12.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1330</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[98889451-23b0-471c-aee5-fdee0dd9d273]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8535374890.mp3?updated=1690203530" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Cyberspace Solarium reports. Coronavirus scams and coronavirus realities. Notes on March’s Patch Tuesday.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1042/notes</link>
      <description>The Cyberspace Solarium has released its report, as promised, and they wish to make your flesh creep. Coronavirus scams and phishbait amount to what some are calling an “infodemic.” Some notes on Patch Tuesday, and, finally, some words on the actual coronavirus epidemic. Joe Carrigan from JHU ISI on FBI recovering stolen funds, guest is Josh Mayfield from RiskIQ on his 2020 predictions.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_11.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 11 Mar 2020 19:22:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1042</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/650578b8-def8-11ea-911f-f7324e3fb8f6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The Cyberspace Solarium has released its report, as promised, and they wish to make your flesh creep. Coronavirus scams and phishbait amount to what some are calling an “infodemic.” Some notes on Patch Tuesday, and, finally, some words on the...</itunes:subtitle>
      <itunes:summary>The Cyberspace Solarium has released its report, as promised, and they wish to make your flesh creep. Coronavirus scams and phishbait amount to what some are calling an “infodemic.” Some notes on Patch Tuesday, and, finally, some words on the actual coronavirus epidemic. Joe Carrigan from JHU ISI on FBI recovering stolen funds, guest is Josh Mayfield from RiskIQ on his 2020 predictions.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_11.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Cyberspace Solarium has released its report, as promised, and they wish to make your flesh creep. Coronavirus scams and phishbait amount to what some are calling an “infodemic.” Some notes on Patch Tuesday, and, finally, some words on the actual coronavirus epidemic. Joe Carrigan from JHU ISI on FBI recovering stolen funds, guest is Josh Mayfield from RiskIQ on his 2020 predictions.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_11.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1229</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[94488490-9173-4680-af41-06388deaeec4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7961029774.mp3?updated=1690203518" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Caution in the Play store. EU power consortium’s business systems hacked. Cablegate--a look back. Schulte trial ends in minor convictions, but a hung jury on major counts. The cyber underworld.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1041/notes</link>
      <description>Google removes from the Play store an app nominally designed to track COVID-19 infections. An EU power distribution consortium says its business systems were hacked. An assessment of Cablegate has been declassified. Ex-CIA employee Schulte’s trial for disclosing classified information ends in a hung jury. The alleged proprietor of a criminal market is arrested. Crooks hack rival crooks. More US primaries are held today. And a case of identity theft in North Carolina. Ben Yelin from UMD CHHS with updates on ClearView AI, guest is Kathleen Kuczma from Recorded Future on 2019 Top Vulnerabilities List.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_10.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Mar 2020 19:51:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1041</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/65197d72-def8-11ea-911f-439a319af684/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Google removes from the Play store an app nominally designed to track COVID-19 infections. An EU power distribution consortium says its business systems were hacked. An assessment of Cablegate has been declassified. Ex-CIA employee Schulte’s trial...</itunes:subtitle>
      <itunes:summary>Google removes from the Play store an app nominally designed to track COVID-19 infections. An EU power distribution consortium says its business systems were hacked. An assessment of Cablegate has been declassified. Ex-CIA employee Schulte’s trial for disclosing classified information ends in a hung jury. The alleged proprietor of a criminal market is arrested. Crooks hack rival crooks. More US primaries are held today. And a case of identity theft in North Carolina. Ben Yelin from UMD CHHS with updates on ClearView AI, guest is Kathleen Kuczma from Recorded Future on 2019 Top Vulnerabilities List.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_10.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Google removes from the Play store an app nominally designed to track COVID-19 infections. An EU power distribution consortium says its business systems were hacked. An assessment of Cablegate has been declassified. Ex-CIA employee Schulte’s trial for disclosing classified information ends in a hung jury. The alleged proprietor of a criminal market is arrested. Crooks hack rival crooks. More US primaries are held today. And a case of identity theft in North Carolina. Ben Yelin from UMD CHHS with updates on ClearView AI, guest is Kathleen Kuczma from Recorded Future on 2019 Top Vulnerabilities List.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_10.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1301</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4eb5d53c-b98f-40d3-892f-746b1704a63a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1270424724.mp3?updated=1690203507" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Coronavirus misinformation, phishbait, and disinformation. Ransomware’s growing reach. How criminals’ desire for glory works against their desire to escape apprehension.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1040/notes</link>
      <description>Coronavirus misinformation, coronavirus online scams, and coronavirus disinformation. Ransomware hits a steel plant, local government, and a defense contractor. And how criminals’ desire for glory betrays them in social media. Zulfikar Ramzan from RSA Security with three product updates, guest is Robert Waitman from Cisco on their Annual Data Privacy Benchmark study.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_09.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 09 Mar 2020 19:53:55 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1040</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/653984aa-def8-11ea-911f-c3ef04c4602e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Coronavirus misinformation, coronavirus online scams, and coronavirus disinformation. Ransomware hits a steel plant, local government, and a defense contractor. And how criminals’ desire for glory betrays them in social media. Zulfikar Ramzan from...</itunes:subtitle>
      <itunes:summary>Coronavirus misinformation, coronavirus online scams, and coronavirus disinformation. Ransomware hits a steel plant, local government, and a defense contractor. And how criminals’ desire for glory betrays them in social media. Zulfikar Ramzan from RSA Security with three product updates, guest is Robert Waitman from Cisco on their Annual Data Privacy Benchmark study.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_09.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Coronavirus misinformation, coronavirus online scams, and coronavirus disinformation. Ransomware hits a steel plant, local government, and a defense contractor. And how criminals’ desire for glory betrays them in social media. Zulfikar Ramzan from RSA Security with three product updates, guest is Robert Waitman from Cisco on their Annual Data Privacy Benchmark study.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_09.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1317</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9d069a1d-dd81-4dca-b18b-5e68f25b4604]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1394213618.mp3?updated=1690203494" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Overworked developers write vulnerable software. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/125/notes</link>
      <description>Why do some developers and development teams write more secure code than others? Software is written by people, either alone or in teams. Ultimately secure code development depends on the actions and decisions taken by the people who develop the code. Understanding the human factors that influence the introduction of software vulnerabilities, and acting on that knowledge, is a definitive way to shift security to the left. 
On this Research Saturday, our conversation with Anita D’Amico from CodeDX on which developers and teams are more likely to write vulnerable software.
The research can be found here:
 Which Developers and Teams Are More Likely to Write Vulnerable Software?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Mar 2020 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>125</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/98f0a24a-df13-11ea-98a8-5701563e2876/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Why do some developers and development teams write more secure code than others? Software is written by people, either alone or in teams. Ultimately secure code development depends on the actions and decisions taken by the people who develop the code....</itunes:subtitle>
      <itunes:summary>Why do some developers and development teams write more secure code than others? Software is written by people, either alone or in teams. Ultimately secure code development depends on the actions and decisions taken by the people who develop the code. Understanding the human factors that influence the introduction of software vulnerabilities, and acting on that knowledge, is a definitive way to shift security to the left. 
On this Research Saturday, our conversation with Anita D’Amico from CodeDX on which developers and teams are more likely to write vulnerable software.
The research can be found here:
 Which Developers and Teams Are More Likely to Write Vulnerable Software?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Why do some developers and development teams write more secure code than others? Software is written by people, either alone or in teams. Ultimately secure code development depends on the actions and decisions taken by the people who develop the code. Understanding the human factors that influence the introduction of software vulnerabilities, and acting on that knowledge, is a definitive way to shift security to the left. </p><p>On this Research Saturday, our conversation with Anita D’Amico from CodeDX on which developers and teams are more likely to write vulnerable software.</p><p>The research can be found here:</p><p><a href="https://www.rsaconference.com/usa/agenda/which-developers-and-teams-are-more-likely-to-write-vulnerable-software"> Which Developers and Teams Are More Likely to Write Vulnerable Software?</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1011</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7ba79af-7601-4340-9412-039763dfc919]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4150077818.mp3?updated=1685107754" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Misconfigured databases, again. Vulnerable subdomains. Dark web search engines. Troll farming. An update on the crypto wars.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1039/notes</link>
      <description>Virgin Media discloses a data exposure incident, another misconfigured database. Microsoft subdomains are reported vulnerable to takeover. A dark web search engine is gaining popularity, and black market share. Researchers find that Russian disinformation trolls have upped their game. The crypto wars have flared up as the US Senate considers the EARN IT act. Tech companies sign on to voluntary child protection principles. And Huawei talks about backdoors. Thomas Etheridge from Crowdstrike on empowering business leaders to manage cyber risk, guest is Sherri Davidoff on her book, Data Breaches: Crisis and Opportunity.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_06.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 06 Mar 2020 19:52:14 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1039</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/655537fe-def8-11ea-911f-af2ae89e6771/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Virgin Media discloses a data exposure incident, another misconfigured database. Microsoft subdomains are reported vulnerable to takeover. A dark web search engine is gaining popularity, and black market share. Researchers find that Russian...</itunes:subtitle>
      <itunes:summary>Virgin Media discloses a data exposure incident, another misconfigured database. Microsoft subdomains are reported vulnerable to takeover. A dark web search engine is gaining popularity, and black market share. Researchers find that Russian disinformation trolls have upped their game. The crypto wars have flared up as the US Senate considers the EARN IT act. Tech companies sign on to voluntary child protection principles. And Huawei talks about backdoors. Thomas Etheridge from Crowdstrike on empowering business leaders to manage cyber risk, guest is Sherri Davidoff on her book, Data Breaches: Crisis and Opportunity.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_06.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Virgin Media discloses a data exposure incident, another misconfigured database. Microsoft subdomains are reported vulnerable to takeover. A dark web search engine is gaining popularity, and black market share. Researchers find that Russian disinformation trolls have upped their game. The crypto wars have flared up as the US Senate considers the EARN IT act. Tech companies sign on to voluntary child protection principles. And Huawei talks about backdoors. Thomas Etheridge from Crowdstrike on empowering business leaders to manage cyber risk, guest is Sherri Davidoff on her book, Data Breaches: Crisis and Opportunity.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_06.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1449</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7fd63bcf-8bc5-4f16-ab8d-881c3f3d573b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8538547924.mp3?updated=1608756453" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Credential stuffing attacks and data breaches. Coronavirus-themed phishbait is an international problem. Super Tuesday security post mortems. Huawei agonistes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1038/notes</link>
      <description>Credential stuffing affects J. Crew and Tesco customers. T-Mobile discloses a data breach. Emcor works to recover from a ransomware infestation. Coronavirus-themed emails remain common phishbait--it’s an international problem. US authorities are pleased with how election security on Super Tuesday went, but some local governments are recovering from self-inflicted tech wounds. And there’s more on official US suspicion of Huawei. Mike Benjamin from CenturyLink on Nanocore, guest is Bil Harmer from SecureAuth on nation-state attacks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_05.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 05 Mar 2020 20:11:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1038</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/656d2fc6-def8-11ea-911f-d3b796cc3a15/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Credential stuffing affects J. Crew and Tesco customers. T-Mobile discloses a data breach. Emcor works to recover from a ransomware infestation. Coronavirus-themed emails remain common phishbait--it’s an international problem. US authorities are...</itunes:subtitle>
      <itunes:summary>Credential stuffing affects J. Crew and Tesco customers. T-Mobile discloses a data breach. Emcor works to recover from a ransomware infestation. Coronavirus-themed emails remain common phishbait--it’s an international problem. US authorities are pleased with how election security on Super Tuesday went, but some local governments are recovering from self-inflicted tech wounds. And there’s more on official US suspicion of Huawei. Mike Benjamin from CenturyLink on Nanocore, guest is Bil Harmer from SecureAuth on nation-state attacks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_05.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Credential stuffing affects J. Crew and Tesco customers. T-Mobile discloses a data breach. Emcor works to recover from a ransomware infestation. Coronavirus-themed emails remain common phishbait--it’s an international problem. US authorities are pleased with how election security on Super Tuesday went, but some local governments are recovering from self-inflicted tech wounds. And there’s more on official US suspicion of Huawei. Mike Benjamin from CenturyLink on Nanocore, guest is Bil Harmer from SecureAuth on nation-state attacks.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_05.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1257</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2ead0a35-3204-40b6-80ce-f409ada11aaf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9821205833.mp3?updated=1690203457" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Election security--a look back at Super Tuesday. Cyberspace Solarium preview. Rapid Alert System engaged in EU. Cyber capability building in Ukraine. Cloud backups as attack surface.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1037/notes</link>
      <description>A quick security retrospective on Super Tuesday, a day on which no dogs barked (or bears growled, or kittens yowled, or pandas did whatever it is that pandas do). The Cyberspace Solarium previewed the good-government framework it intends to recommend in next Wednesday’s final report. The EU uses its Rapid Alert System against coronavirus disinformation. US aid will go to Ukraine for cybersecurity capability building. And backups are an attack surface, too. Joe Carrigan from JHU ISI on FBI convictions of Romanian criminals, guest is Chris Kubic from Fidelis Cybersecurity with lessons learned from securing the country’s biggest and deepest secrets. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_04.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 04 Mar 2020 19:33:57 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1037</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/65824866-def8-11ea-911f-5b0565b20c65/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A quick security retrospective on Super Tuesday, a day on which no dogs barked (or bears growled, or kittens yowled, or pandas did whatever it is that pandas do). The Cyberspace Solarium previewed the good-government framework it intends to recommend...</itunes:subtitle>
      <itunes:summary>A quick security retrospective on Super Tuesday, a day on which no dogs barked (or bears growled, or kittens yowled, or pandas did whatever it is that pandas do). The Cyberspace Solarium previewed the good-government framework it intends to recommend in next Wednesday’s final report. The EU uses its Rapid Alert System against coronavirus disinformation. US aid will go to Ukraine for cybersecurity capability building. And backups are an attack surface, too. Joe Carrigan from JHU ISI on FBI convictions of Romanian criminals, guest is Chris Kubic from Fidelis Cybersecurity with lessons learned from securing the country’s biggest and deepest secrets. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_04.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A quick security retrospective on Super Tuesday, a day on which no dogs barked (or bears growled, or kittens yowled, or pandas did whatever it is that pandas do). The Cyberspace Solarium previewed the good-government framework it intends to recommend in next Wednesday’s final report. The EU uses its Rapid Alert System against coronavirus disinformation. US aid will go to Ukraine for cybersecurity capability building. And backups are an attack surface, too. Joe Carrigan from JHU ISI on FBI convictions of Romanian criminals, guest is Chris Kubic from Fidelis Cybersecurity with lessons learned from securing the country’s biggest and deepest secrets. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_04.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1326</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2f656517-89b9-4111-9822-28535b8bbaed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3140966961.mp3?updated=1690203446" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Vault 7, again, as Beijing names and shames. Schulte case goes to jury. Maersk to cut incident response jobs. The Cyberspace Solarium’s election security preview. Advice for intel collection.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1036/notes</link>
      <description>Chinese security firm calls out the US CIA for Vault 7 campaigns against civil aviation. Meanwhile, the jury’s out in the Joshua Shulte Vault 7 case. Incident responders in the UK may be reentering the labor market. US agencies issue a joint warning to adversaries (and joint encouragement to citizens) about election interference. The Cyberspace Solarium talks about elections. And the Justice Department offers advice on cyber threat intelligence collection. Ben Yelin from UMD CHHS on telecommunications companies in hot water with the FCC, guest is Stuart Reed from Nominet with new CISO stress research.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_03.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Mar 2020 22:09:12 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1036</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6597ccae-def8-11ea-911f-93152ce8f6ef/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Chinese security firm calls out the US CIA for Vault 7 campaigns against civil aviation. Meanwhile, the jury’s out in the Joshua Shulte Vault 7 case. Incident responders in the UK may be reentering the labor market. US agencies issue a joint warning...</itunes:subtitle>
      <itunes:summary>Chinese security firm calls out the US CIA for Vault 7 campaigns against civil aviation. Meanwhile, the jury’s out in the Joshua Shulte Vault 7 case. Incident responders in the UK may be reentering the labor market. US agencies issue a joint warning to adversaries (and joint encouragement to citizens) about election interference. The Cyberspace Solarium talks about elections. And the Justice Department offers advice on cyber threat intelligence collection. Ben Yelin from UMD CHHS on telecommunications companies in hot water with the FCC, guest is Stuart Reed from Nominet with new CISO stress research.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_03.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chinese security firm calls out the US CIA for Vault 7 campaigns against civil aviation. Meanwhile, the jury’s out in the Joshua Shulte Vault 7 case. Incident responders in the UK may be reentering the labor market. US agencies issue a joint warning to adversaries (and joint encouragement to citizens) about election interference. The Cyberspace Solarium talks about elections. And the Justice Department offers advice on cyber threat intelligence collection. Ben Yelin from UMD CHHS on telecommunications companies in hot water with the FCC, guest is Stuart Reed from Nominet with new CISO stress research.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_03.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1446</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0b6c07bc-cb9e-4c19-8e85-91ea9d35d477]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6973485703.mp3?updated=1690203435" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Super Tuesday eve primary jitters. DoppelPaymer hits an aerospace supplier. WordPress plugins exploited in the wild. Vote for the catphish.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1035/notes</link>
      <description>It’s Super Tuesday eve, and people worry about influence operations, both foreign and domestic. DoppelPaymer hits a precision manufacturer, and moves surprisingly quickly to expose stolen files. Vulnerable WordPress plugins are being exploited in the wild. And a catphish is running for Congress in Rhode Island--he’s even got the blue checkmark. Johannes Ullrich from the SANS Technology Center on the development of authentication issues in iOS, guest is Elvis Chan from the FBI on election security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_02.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 02 Mar 2020 21:00:04 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1035</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/65b01836-def8-11ea-911f-9357c9e81a33/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>It’s Super Tuesday eve, and people worry about influence operations, both foreign and domestic. DoppelPaymer hits a precision manufacturer, and moves surprisingly quickly to expose stolen files. Vulnerable WordPress plugins are being exploited in...</itunes:subtitle>
      <itunes:summary>It’s Super Tuesday eve, and people worry about influence operations, both foreign and domestic. DoppelPaymer hits a precision manufacturer, and moves surprisingly quickly to expose stolen files. Vulnerable WordPress plugins are being exploited in the wild. And a catphish is running for Congress in Rhode Island--he’s even got the blue checkmark. Johannes Ullrich from the SANS Technology Center on the development of authentication issues in iOS, guest is Elvis Chan from the FBI on election security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_02.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>It’s Super Tuesday eve, and people worry about influence operations, both foreign and domestic. DoppelPaymer hits a precision manufacturer, and moves surprisingly quickly to expose stolen files. Vulnerable WordPress plugins are being exploited in the wild. And a catphish is running for Congress in Rhode Island--he’s even got the blue checkmark. Johannes Ullrich from the SANS Technology Center on the development of authentication issues in iOS, guest is Elvis Chan from the FBI on election security.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/March/CyberWire_2020_03_02.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1136</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2b795d19-63b8-4672-b0d9-ce03ba4ad320]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4825696210.mp3?updated=1690203422" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Application tracking in Wacom tablets. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/124/notes</link>
      <description>Today's Research Saturday features our conversation with Robert Heaton, a software engineer with Stripe who penned a blog post about his disappointing discovery involving his Wacom tablet tracking his applications. The post struck a nerve and has since been widely distributed.
The research can be found here: 
 Wacom drawing tablets track the name of every application that you open
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 Feb 2020 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>124</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/956bffde-df13-11ea-9d6e-6b5232fc6b2f/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Today's Research Saturday features our conversation with Robert Heaton, a software engineer with Stripe who penned a blog post about his disappointing discovery involving his Wacom tablet tracking his applications. The post struck a nerve and has...</itunes:subtitle>
      <itunes:summary>Today's Research Saturday features our conversation with Robert Heaton, a software engineer with Stripe who penned a blog post about his disappointing discovery involving his Wacom tablet tracking his applications. The post struck a nerve and has since been widely distributed.
The research can be found here: 
 Wacom drawing tablets track the name of every application that you open
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today's Research Saturday features our conversation with Robert Heaton, a software engineer with Stripe who penned a blog post about his disappointing discovery involving his Wacom tablet tracking his applications. The post struck a nerve and has since been widely distributed.</p><p>The research can be found here: </p><p><a href="https://robertheaton.com/2020/02/05/wacom-drawing-tablets-track-name-of-every-application-you-open/"> Wacom drawing tablets track the name of every application that you open</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1238</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7f4b6e4-caf7-48f1-ab96-1047d34ede41]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3711804984.mp3?updated=1685107745" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>South Carolina primary affords the next test of US election security. Cerberus evolves. Bot-driven fraud. FCC to fine wireless carriers for location data handling. FISA changes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1034/notes</link>
      <description>South Carolina prepares for tomorrow’s primary, confident that it will be able to conduct the vote securely and without disruption. An evolved version of the Cerberus Trojan has been spotted. Bots are making fraudulent appeals for brushfire aid to the Australian Red Cross. The FCC is preparing to fine four major wireless carriers for mishandling user geolocation data. Proposed changes to FISA surveillance in the US. And farewell to RSAC 2020. Partner is Mike Benjamin from CenturyLink with observations from RSA, guests are magicians Penn and Teller with insights on deception and social engineering.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_28.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 28 Feb 2020 21:13:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1034</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/65c92484-def8-11ea-911f-0b6a9af47729/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>South Carolina prepares for tomorrow’s primary, confident that it will be able to conduct the vote securely and without disruption. An evolved version of the Cerberus Trojan has been spotted. Bots are making fraudulent appeals for brushfire aid to...</itunes:subtitle>
      <itunes:summary>South Carolina prepares for tomorrow’s primary, confident that it will be able to conduct the vote securely and without disruption. An evolved version of the Cerberus Trojan has been spotted. Bots are making fraudulent appeals for brushfire aid to the Australian Red Cross. The FCC is preparing to fine four major wireless carriers for mishandling user geolocation data. Proposed changes to FISA surveillance in the US. And farewell to RSAC 2020. Partner is Mike Benjamin from CenturyLink with observations from RSA, guests are magicians Penn and Teller with insights on deception and social engineering.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_28.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>South Carolina prepares for tomorrow’s primary, confident that it will be able to conduct the vote securely and without disruption. An evolved version of the Cerberus Trojan has been spotted. Bots are making fraudulent appeals for brushfire aid to the Australian Red Cross. The FCC is preparing to fine four major wireless carriers for mishandling user geolocation data. Proposed changes to FISA surveillance in the US. And farewell to RSAC 2020. Partner is Mike Benjamin from CenturyLink with observations from RSA, guests are magicians Penn and Teller with insights on deception and social engineering.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_28.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1545</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dde48aa2-d827-4c44-ab2f-7e59e79c9fc7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9356480879.mp3?updated=1608756464" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>RSAC 2020. Naming and shaming. Kitty espionage update. Wi-Fi crypto flaw. Impersonating the DNC. Ransomware gets more aggressive. When is removing a GPS tracker theft?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1033/notes</link>
      <description>Naming and shaming seems to work, at least against China’s Ministry of State Security. Iranian cyberespionage continues its regional focus. Wi-Fi chip flaws could expose encrypted traffic to snoopers. Someone, maybe from abroad, is pretending to be the US Democratic National Committee. Tips on backing up files. Ransomware gangs up their game. And that unmarked small box on your car? Go ahead: you can take it off. David Dufour from Webroot with trends and predictions from the floor at RSA, guest is Liesyl Franz from the Dept. of State on nation state cyber activities and deterrence in cyberspace.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_27.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 27 Feb 2020 20:05:14 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1033</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/65d97d70-def8-11ea-911f-977305abcee9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Naming and shaming seems to work, at least against China’s Ministry of State Security. Iranian cyberespionage continues its regional focus. Wi-Fi chip flaws could expose encrypted traffic to snoopers. Someone, maybe from abroad, is pretending to be...</itunes:subtitle>
      <itunes:summary>Naming and shaming seems to work, at least against China’s Ministry of State Security. Iranian cyberespionage continues its regional focus. Wi-Fi chip flaws could expose encrypted traffic to snoopers. Someone, maybe from abroad, is pretending to be the US Democratic National Committee. Tips on backing up files. Ransomware gangs up their game. And that unmarked small box on your car? Go ahead: you can take it off. David Dufour from Webroot with trends and predictions from the floor at RSA, guest is Liesyl Franz from the Dept. of State on nation state cyber activities and deterrence in cyberspace.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_27.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Naming and shaming seems to work, at least against China’s Ministry of State Security. Iranian cyberespionage continues its regional focus. Wi-Fi chip flaws could expose encrypted traffic to snoopers. Someone, maybe from abroad, is pretending to be the US Democratic National Committee. Tips on backing up files. Ransomware gangs up their game. And that unmarked small box on your car? Go ahead: you can take it off. David Dufour from Webroot with trends and predictions from the floor at RSA, guest is Liesyl Franz from the Dept. of State on nation state cyber activities and deterrence in cyberspace.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_27.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1378</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fa08aed4-0a5f-47c1-94ee-01a213ec7e01]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5327864118.mp3?updated=1690203320" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chrome zero-day patched. Ransomware against infrastructure. Notes from RSAC 2020. Julian Assange’s extradition hearing.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1032/notes</link>
      <description>Google patches a Chrome zero-day. Ransomware attacks against infrastructure. DoppelPaymer prepares to dox its victims. How CISA and NSA cooperate. Dallas County, Iowa, finally drops charges against pentesters. Mr. Assange’s evolving defense against extradition to the US. Notes on RSAC 2020. And if you were a superhero, which superhero would you be? Justin Harvey from Accenture on his RSA observations, guest is Keith Mularski from EY on ransomware.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_26.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 26 Feb 2020 20:10:51 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1032</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/65fa97da-def8-11ea-911f-6b244a00e42d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Google patches a Chrome zero-day. Ransomware attacks against infrastructure. DoppelPaymer prepares to dox its victims. How CISA and NSA cooperate. Dallas County, Iowa, finally drops charges against pentesters. Mr. Assange’s evolving defense against...</itunes:subtitle>
      <itunes:summary>Google patches a Chrome zero-day. Ransomware attacks against infrastructure. DoppelPaymer prepares to dox its victims. How CISA and NSA cooperate. Dallas County, Iowa, finally drops charges against pentesters. Mr. Assange’s evolving defense against extradition to the US. Notes on RSAC 2020. And if you were a superhero, which superhero would you be? Justin Harvey from Accenture on his RSA observations, guest is Keith Mularski from EY on ransomware.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_26.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Google patches a Chrome zero-day. Ransomware attacks against infrastructure. DoppelPaymer prepares to dox its victims. How CISA and NSA cooperate. Dallas County, Iowa, finally drops charges against pentesters. Mr. Assange’s evolving defense against extradition to the US. Notes on RSAC 2020. And if you were a superhero, which superhero would you be? Justin Harvey from Accenture on his RSA observations, guest is Keith Mularski from EY on ransomware.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_26.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1293</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4ae9253f-523f-4953-afbd-d2fa21a2993e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7726888289.mp3?updated=1690203307" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cloud Snooper is out and about. US states’ contracts with Chinese vendors. Voatz receives more scrutiny. Facebook’s troll hunt--no joy this time. Notes from RSAC 2020. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1031/notes</link>
      <description>Cloud Snooper is infesting cloud infrastructure servers. A China-skeptical advocacy group draws attention to US states’ contracts with Chinese vendors that aren’t named “Huawei.” Senator Wyden would like the security company that audited the Voatz to explain the clean bill of health it gave the voting app. Facebook’s campaign troll hunt comes up empty, so far, this time. And what we’re seeing and hearing at RSAC 2020. Our Chief Analyst Rick Howard on SASE and what he’s looking for at RSA, guest is Dr. Chenxi Wang from Rain Capital previewing her panel at RSA and discussing innovations in the industry. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_25.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Feb 2020 18:54:15 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1031</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/66182228-def8-11ea-911f-c7d19dc73547/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cloud Snooper is infesting cloud infrastructure servers. A China-skeptical advocacy group draws attention to US states’ contracts with Chinese vendors that aren’t named “Huawei.” Senator Wyden would like the security company that audited the...</itunes:subtitle>
      <itunes:summary>Cloud Snooper is infesting cloud infrastructure servers. A China-skeptical advocacy group draws attention to US states’ contracts with Chinese vendors that aren’t named “Huawei.” Senator Wyden would like the security company that audited the Voatz to explain the clean bill of health it gave the voting app. Facebook’s campaign troll hunt comes up empty, so far, this time. And what we’re seeing and hearing at RSAC 2020. Our Chief Analyst Rick Howard on SASE and what he’s looking for at RSA, guest is Dr. Chenxi Wang from Rain Capital previewing her panel at RSA and discussing innovations in the industry. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_25.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cloud Snooper is infesting cloud infrastructure servers. A China-skeptical advocacy group draws attention to US states’ contracts with Chinese vendors that aren’t named “Huawei.” Senator Wyden would like the security company that audited the Voatz to explain the clean bill of health it gave the voting app. Facebook’s campaign troll hunt comes up empty, so far, this time. And what we’re seeing and hearing at RSAC 2020. Our Chief Analyst Rick Howard on SASE and what he’s looking for at RSA, guest is Dr. Chenxi Wang from Rain Capital previewing her panel at RSA and discussing innovations in the industry. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_25.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1436</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2c4e3760-2044-4d25-bd57-b3b8d319663f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9243129891.mp3?updated=1690203296" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Reactions to allegations in Georgia’s October cyber incidents. Commodification of spamming kit. Satellite vulnerabilities. Election security. FISA reauthorization? Mr. Assange’s extradition. RSAC 2020.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1030/notes</link>
      <description>The EU condemns Russian cyberattacks on Georgia, and Russia says Russia didn’t do it--it’s all propaganda. Skids can buy spamming tools for less than twenty bucks. Satellite constellations offer an expanding attack surface. Amid continuing worries about US election security, the question of Russian trolling or home-grown American vitriol arises in Nevada (but the smart money’s on the U S of A). FISA reauthorization is coming up. And hello from RSAC 2020. Joe Carrigan from JHU ISI on SIM swappers targeting carrier employees, guest is Erez Yalon from Checkmarx on the recently published OWASP API Security Top Ten list.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_24.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 24 Feb 2020 20:54:40 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1030</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/663ae1dc-def8-11ea-911f-cb95e589ba25/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The EU condemns Russian cyberattacks on Georgia, and Russia says Russia didn’t do it--it’s all propaganda. Skids can buy spamming tools for less than twenty bucks. Satellite constellations offer an expanding attack surface. Amid continuing worries...</itunes:subtitle>
      <itunes:summary>The EU condemns Russian cyberattacks on Georgia, and Russia says Russia didn’t do it--it’s all propaganda. Skids can buy spamming tools for less than twenty bucks. Satellite constellations offer an expanding attack surface. Amid continuing worries about US election security, the question of Russian trolling or home-grown American vitriol arises in Nevada (but the smart money’s on the U S of A). FISA reauthorization is coming up. And hello from RSAC 2020. Joe Carrigan from JHU ISI on SIM swappers targeting carrier employees, guest is Erez Yalon from Checkmarx on the recently published OWASP API Security Top Ten list.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_24.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The EU condemns Russian cyberattacks on Georgia, and Russia says Russia didn’t do it--it’s all propaganda. Skids can buy spamming tools for less than twenty bucks. Satellite constellations offer an expanding attack surface. Amid continuing worries about US election security, the question of Russian trolling or home-grown American vitriol arises in Nevada (but the smart money’s on the U S of A). FISA reauthorization is coming up. And hello from RSAC 2020. Joe Carrigan from JHU ISI on SIM swappers targeting carrier employees, guest is Erez Yalon from Checkmarx on the recently published OWASP API Security Top Ten list.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_24.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1278</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2c4896aa-ab79-4b7e-b234-1e85c981d291]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9756089007.mp3?updated=1690203282" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New vulnerabilities in PC sound cards. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/123/notes</link>
      <description>SafeBreach Labs discovered a new vulnerability in the Realtek HD Audio Driver Package, which is deployed on PCs containing Realtek sound cards. 
On this week's Research Saturday, our conversation with Itzik Kotler, who is Co-Founder and CTO at SafeBreach. 
The research can be found here: 
 Realtek HD Audio Driver Package - DLL Preloading and Potential Abuses
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Feb 2020 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>123</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/92399b0a-df13-11ea-98a8-e7dd2c9d8167/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>SafeBreach Labs discovered a new vulnerability in the Realtek HD Audio Driver Package, which is deployed on PCs containing Realtek sound cards.  On this week's Research Saturday, our conversation with Itzik Kotler, who is Co-Founder and CTO at...</itunes:subtitle>
      <itunes:summary>SafeBreach Labs discovered a new vulnerability in the Realtek HD Audio Driver Package, which is deployed on PCs containing Realtek sound cards. 
On this week's Research Saturday, our conversation with Itzik Kotler, who is Co-Founder and CTO at SafeBreach. 
The research can be found here: 
 Realtek HD Audio Driver Package - DLL Preloading and Potential Abuses
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>SafeBreach Labs discovered a new vulnerability in the Realtek HD Audio Driver Package, which is deployed on PCs containing Realtek sound cards. </p><p>On this week's Research Saturday, our conversation with Itzik Kotler, who is Co-Founder and CTO at SafeBreach. </p><p>The research can be found here: </p><p><a href="https://safebreach.com/Post/Realtek-HD-Audio-Driver-Package-DLL-Preloading-and-Potential-Abuses-CVE-2019-19705"> Realtek HD Audio Driver Package - DLL Preloading and Potential Abuses</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1300</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a750d79f-0bee-4b2c-8c59-f4d6c873893c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4477582296.mp3?updated=1685107738" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DISA data breach. More complaint against alleged GUR operations in Georgia. Trolls move from creation to curation. The UK deals with high-risk 5G vendors.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1029/notes</link>
      <description>The US Defense Information Agency discloses a data breach affecting personal information of up to two-hundred thousand individuals. More international reprobation for the alleged GRU hack of Georgian websites. Trolls move from creation to curation. Stalkerware data exposure. And a look at how the UK might actually implement its compromise position on high-risk 5G vendors. Joining us in studio, a surprise new addition to the CyberWire team, guest is Aisling MacRunnels from Synack on women in cyber.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_21.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 21 Feb 2020 19:56:56 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1029</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/664fafa4-def8-11ea-911f-7334aa3b9765/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The US Defense Information Agency discloses a data breach affecting personal information of up to two-hundred thousand individuals. More international reprobation for the alleged GRU hack of Georgian websites. Trolls move from creation to curation....</itunes:subtitle>
      <itunes:summary>The US Defense Information Agency discloses a data breach affecting personal information of up to two-hundred thousand individuals. More international reprobation for the alleged GRU hack of Georgian websites. Trolls move from creation to curation. Stalkerware data exposure. And a look at how the UK might actually implement its compromise position on high-risk 5G vendors. Joining us in studio, a surprise new addition to the CyberWire team, guest is Aisling MacRunnels from Synack on women in cyber.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_21.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US Defense Information Agency discloses a data breach affecting personal information of up to two-hundred thousand individuals. More international reprobation for the alleged GRU hack of Georgian websites. Trolls move from creation to curation. Stalkerware data exposure. And a look at how the UK might actually implement its compromise position on high-risk 5G vendors. Joining us in studio, a surprise new addition to the CyberWire team, guest is Aisling MacRunnels from Synack on women in cyber.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_21.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1403</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a5a91b3a-ccdd-4587-a803-cbd7ef7e4530]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3220415665.mp3?updated=1608756438" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>UK, US blame Russia for 2019 Georgia hacks. Senator Sanders thinks Russian bots could impersonate supporters. Mr. Assange’s extradition. MGM Resorts breach. Ms Winner wants a pardon.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1028/notes</link>
      <description>British and American authorities blame Russia’s GRU for last October’s defacement campaign against Georgian websites. Senator Sanders thinks maybe some of his apparent supporters are Russian bots--the ones who are tweeting bad stuff in social media. Julian Assange says he was offered a pardon to say the Russians didn’t meddle with the DNC. Stolen data from MGM Resorts turns up in a hacker forum. NSA leaker Reality Winner would like a pardon. Justin Harvey from Accenture on staying prepared against potential Iranian cyberattacks, guest is Jamie Tomasello from Cisco Duo on cognitive capacity and burnout.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_20.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 20 Feb 2020 19:45:11 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1028</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/666a7424-def8-11ea-911f-b34bc85a96ad/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>British and American authorities blame Russia’s GRU for last October’s defacement campaign against Georgian websites. Senator Sanders thinks maybe some of his apparent supporters are Russian bots--the ones who are tweeting bad stuff in social...</itunes:subtitle>
      <itunes:summary>British and American authorities blame Russia’s GRU for last October’s defacement campaign against Georgian websites. Senator Sanders thinks maybe some of his apparent supporters are Russian bots--the ones who are tweeting bad stuff in social media. Julian Assange says he was offered a pardon to say the Russians didn’t meddle with the DNC. Stolen data from MGM Resorts turns up in a hacker forum. NSA leaker Reality Winner would like a pardon. Justin Harvey from Accenture on staying prepared against potential Iranian cyberattacks, guest is Jamie Tomasello from Cisco Duo on cognitive capacity and burnout.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_20.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>British and American authorities blame Russia’s GRU for last October’s defacement campaign against Georgian websites. Senator Sanders thinks maybe some of his apparent supporters are Russian bots--the ones who are tweeting bad stuff in social media. Julian Assange says he was offered a pardon to say the Russians didn’t meddle with the DNC. Stolen data from MGM Resorts turns up in a hacker forum. NSA leaker Reality Winner would like a pardon. Justin Harvey from Accenture on staying prepared against potential Iranian cyberattacks, guest is Jamie Tomasello from Cisco Duo on cognitive capacity and burnout.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_20.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1277</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f2ac4fc6-bba1-42d5-b9f4-e4c290fdd4c9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4112276150.mp3?updated=1690203256" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware hits US natural gas pipeline facility. DRBControl’s espionage campaign. Firmware signing. No bill of attainder against Huawei. A mistrial in the Vault 7 case?  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1027/notes</link>
      <description>CISA reports a ransomware infestation in a US natural gas compression facility--it arrived by spearphishing and there are, CISA thinks, larger lessons to be learned. A new threat actor, possibly linked to China’s government, is running an espionage campaign against gambling and betting operations in Southeast Asia. More notes on firmware signatures. Huawei loses one in US Federal Court, and the defense asks for a mistrial in the Vault 7 case. Caleb Barlow from CynergisTek on Wigle and the impact your SSID name can have on your privacy, guest is Anita D’Amico from CodeDX on which developers and teams are more likely to write vulnerable software.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_19.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 19 Feb 2020 20:16:55 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1027</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/667efa3e-def8-11ea-911f-b7b731ba1e25/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>CISA reports a ransomware infestation in a US natural gas compression facility--it arrived by spearphishing and there are, CISA thinks, larger lessons to be learned. A new threat actor, possibly linked to China’s government, is running an espionage...</itunes:subtitle>
      <itunes:summary>CISA reports a ransomware infestation in a US natural gas compression facility--it arrived by spearphishing and there are, CISA thinks, larger lessons to be learned. A new threat actor, possibly linked to China’s government, is running an espionage campaign against gambling and betting operations in Southeast Asia. More notes on firmware signatures. Huawei loses one in US Federal Court, and the defense asks for a mistrial in the Vault 7 case. Caleb Barlow from CynergisTek on Wigle and the impact your SSID name can have on your privacy, guest is Anita D’Amico from CodeDX on which developers and teams are more likely to write vulnerable software.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_19.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>CISA reports a ransomware infestation in a US natural gas compression facility--it arrived by spearphishing and there are, CISA thinks, larger lessons to be learned. A new threat actor, possibly linked to China’s government, is running an espionage campaign against gambling and betting operations in Southeast Asia. More notes on firmware signatures. Huawei loses one in US Federal Court, and the defense asks for a mistrial in the Vault 7 case. Caleb Barlow from CynergisTek on Wigle and the impact your SSID name can have on your privacy, guest is Anita D’Amico from CodeDX on which developers and teams are more likely to write vulnerable software.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_19.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1311</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bf8c1916-98e7-4fc1-86ef-2bebb278862b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1465172933.mp3?updated=1690203245" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fox Kitten campaign linked to Iran. LokiBot’s new clothes. Unsigned firmware. Iowa Democratic caucus post-mortem. SoftBank and the GRU. Hacker madness.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1026/notes</link>
      <description>Fox Kitten appears to combine three APTs linked to Iran. LokiBot is masquerading as an installer for Epic Games. Unsigned firmware found in multiple devices. Extortionists threaten to flood AdSense banners with bot traffic. China says the Empire of Hackers is in Washington, not Beijing. Iowa Democratic caucus IT post-mortems continue. Japan connects SoftBank breach to GRU. And more on that hacker-madness poster from the West Midlands. Ben Yelin from UMD CHHS on wireless carriers selling location data. Guest is Kaitlin Bulavinetz from Washington Cyber Roundtable on facilitating conversations among the industry. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_18.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Feb 2020 22:02:14 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1026</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/669fd40c-def8-11ea-911f-f7e6f74b72e9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fox Kitten appears to combine three APTs linked to Iran. LokiBot is masquerading as an installer for Epic Games. Unsigned firmware found in multiple devices. Extortionists threaten to flood AdSense banners with bot traffic. China says the Empire of...</itunes:subtitle>
      <itunes:summary>Fox Kitten appears to combine three APTs linked to Iran. LokiBot is masquerading as an installer for Epic Games. Unsigned firmware found in multiple devices. Extortionists threaten to flood AdSense banners with bot traffic. China says the Empire of Hackers is in Washington, not Beijing. Iowa Democratic caucus IT post-mortems continue. Japan connects SoftBank breach to GRU. And more on that hacker-madness poster from the West Midlands. Ben Yelin from UMD CHHS on wireless carriers selling location data. Guest is Kaitlin Bulavinetz from Washington Cyber Roundtable on facilitating conversations among the industry. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_18.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Fox Kitten appears to combine three APTs linked to Iran. LokiBot is masquerading as an installer for Epic Games. Unsigned firmware found in multiple devices. Extortionists threaten to flood AdSense banners with bot traffic. China says the Empire of Hackers is in Washington, not Beijing. Iowa Democratic caucus IT post-mortems continue. Japan connects SoftBank breach to GRU. And more on that hacker-madness poster from the West Midlands. Ben Yelin from UMD CHHS on wireless carriers selling location data. Guest is Kaitlin Bulavinetz from Washington Cyber Roundtable on facilitating conversations among the industry. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_18.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1240</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6899ece9-07bb-49c4-8f84-229c746335fe]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3037480246.mp3?updated=1690203231" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>If you can't detect it, you can't steal it. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/122/notes</link>
      <description>BGN Technologies, the technology transfer company of Ben-Gurion University (BGU) of the Negev, Israel, is introducing the first all-optical “stealth” encryption technology that will be significantly more secure and private for highly-sensitive cloud computing and data center network transmission. Joining us in this special Research Saturday is BGN's Dan Sadot who helped pioneer this technology. 
The Research can be found here:
Ben-Gurion University Researchers Introduce the FirstAll-Optical, Stealth Data Encryption Technology
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Feb 2020 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>122</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8fe37f06-df13-11ea-9fc1-0bf29f5ed3a2/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>BGN Technologies, the technology transfer company of Ben-Gurion University (BGU) of the Negev, Israel, is introducing the first all-optical “stealth” encryption technology that will be significantly more secure and private for highly-sensitive...</itunes:subtitle>
      <itunes:summary>BGN Technologies, the technology transfer company of Ben-Gurion University (BGU) of the Negev, Israel, is introducing the first all-optical “stealth” encryption technology that will be significantly more secure and private for highly-sensitive cloud computing and data center network transmission. Joining us in this special Research Saturday is BGN's Dan Sadot who helped pioneer this technology. 
The Research can be found here:
Ben-Gurion University Researchers Introduce the FirstAll-Optical, Stealth Data Encryption Technology
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>BGN Technologies, the technology transfer company of Ben-Gurion University (BGU) of the Negev, Israel, is introducing the first all-optical “stealth” encryption technology that will be significantly more secure and private for highly-sensitive cloud computing and data center network transmission. Joining us in this special Research Saturday is BGN's Dan Sadot who helped pioneer this technology. </p><p>The Research can be found here:</p><p><a href="https://in.bgu.ac.il/en/bgn/Pages/default.aspx">Ben-Gurion University Researchers Introduce the FirstAll-Optical, Stealth Data Encryption Technology</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1533</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dc22013e-5dfe-4e9f-8ba4-e042d23bcd2f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6745380325.mp3?updated=1685107733" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Huawei gets a RICO prosecution. Details on DPRK Hidden Cobra Trojans. Google takes down Chrome malvertising network. Run DNC. Hacker madness. Happy St. Valentine’s Day.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1025/notes</link>
      <description>The US indicts Huawei for racketeering. The FBI and CISA release details on malware used by North Korea’s Hidden Cobra. Iran attributes last week’s DDoS attack to the US. Google takes down a big malvertising and click-fraud network that exploited Chrome extensions. Reports surface of DNC involvement in IowaReporterApp. Not all official advice is necessarily good advice. And if things don’t work out with your object of affection, don’t spy on their social media accounts, OK? Craig Williams from Cisco Talos with updates on JhoneRAT. Guest is Shuvo Chatterjee from Google on their Advanced Protection Program (APP).
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_14.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 14 Feb 2020 19:53:01 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1025</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/66c3ada0-def8-11ea-911f-ef63b8cb7a94/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The US indicts Huawei for racketeering. The FBI and CISA release details on malware used by North Korea’s Hidden Cobra. Iran attributes last week’s DDoS attack to the US. Google takes down a big malvertising and click-fraud network that exploited...</itunes:subtitle>
      <itunes:summary>The US indicts Huawei for racketeering. The FBI and CISA release details on malware used by North Korea’s Hidden Cobra. Iran attributes last week’s DDoS attack to the US. Google takes down a big malvertising and click-fraud network that exploited Chrome extensions. Reports surface of DNC involvement in IowaReporterApp. Not all official advice is necessarily good advice. And if things don’t work out with your object of affection, don’t spy on their social media accounts, OK? Craig Williams from Cisco Talos with updates on JhoneRAT. Guest is Shuvo Chatterjee from Google on their Advanced Protection Program (APP).
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_14.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US indicts Huawei for racketeering. The FBI and CISA release details on malware used by North Korea’s Hidden Cobra. Iran attributes last week’s DDoS attack to the US. Google takes down a big malvertising and click-fraud network that exploited Chrome extensions. Reports surface of DNC involvement in IowaReporterApp. Not all official advice is necessarily good advice. And if things don’t work out with your object of affection, don’t spy on their social media accounts, OK? Craig Williams from Cisco Talos with updates on JhoneRAT. Guest is Shuvo Chatterjee from Google on their Advanced Protection Program (APP).</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_14.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1416</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e33f80e9-651a-41b7-85b3-9e1426747999]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8271584723.mp3?updated=1690203220" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Internecine phishing in the Palestinian Territories. What could Iran do in cyberspace? US Census 2020 and cybersecurity. Mobile voting. How to make bigger money in sextortion.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1024/notes</link>
      <description>Researchers report phishing campaigns underway in the Palestinian Territories. They appear to be a Hamas-linked effort targeting the rival Fatah organization. FireEye offers a summary of current Iranian cyber capabilities. The GAO warns that the Census Bureau still has some cyber security work to do before this year’s count. Researchers call mobile voting into question. And some observations about why some extortion brings in a bigger haul than its rivals. Johannes Ullrich from SANS Technology Center on IoT threats. Guest is Darren Van Booven from Trustwave on how to know if the CCPA applies to your organization. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_13.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 13 Feb 2020 19:11:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1024</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/66f25cc2-def8-11ea-911f-fbf26013f5c4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Researchers report phishing campaigns underway in the Palestinian Territories. They appear to be a Hamas-linked effort targeting the rival Fatah organization. FireEye offers a summary of current Iranian cyber capabilities. The GAO warns that the...</itunes:subtitle>
      <itunes:summary>Researchers report phishing campaigns underway in the Palestinian Territories. They appear to be a Hamas-linked effort targeting the rival Fatah organization. FireEye offers a summary of current Iranian cyber capabilities. The GAO warns that the Census Bureau still has some cyber security work to do before this year’s count. Researchers call mobile voting into question. And some observations about why some extortion brings in a bigger haul than its rivals. Johannes Ullrich from SANS Technology Center on IoT threats. Guest is Darren Van Booven from Trustwave on how to know if the CCPA applies to your organization. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_13.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers report phishing campaigns underway in the Palestinian Territories. They appear to be a Hamas-linked effort targeting the rival Fatah organization. FireEye offers a summary of current Iranian cyber capabilities. The GAO warns that the Census Bureau still has some cyber security work to do before this year’s count. Researchers call mobile voting into question. And some observations about why some extortion brings in a bigger haul than its rivals. Johannes Ullrich from SANS Technology Center on IoT threats. Guest is Darren Van Booven from Trustwave on how to know if the CCPA applies to your organization. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_13.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1277</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ee6282f2-d5af-4d91-8cb1-c48a05468e65]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8057952187.mp3?updated=1690203206" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Facebook takes down coordinated inauthenticity. US says it’s got the goods on Huawei. EU will leave facial recognition policy up to member states. Patch Tuesday. Counting on the caucus.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1023/notes</link>
      <description>Facebook takes down coordinated inauthenticity from Myanmar, Vietnam, Iran, and Russia. The US says it’s got the goods on Huawei’s backdoors. Notes on Patch Tuesday. The EU backs away from a five-year moratorium on facial recognition software. Switzerland takes a look at Crypto AG. And the Nevada Democratic caucus a week from Saturday will use iPads, Google Forms, and some tools to process the results. That’s “tools,” Jack, not “apps.” Ben Yelin from UMD CHHS on the Senate GOP blocking election security bills. Guest is Christopher Hadnagy from Social-Engineer, LLC on social engineering trends they are tracking. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_12.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 12 Feb 2020 20:03:07 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1023</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/670d74da-def8-11ea-911f-a3933d64ddf7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Facebook takes down coordinated inauthenticity from Myanmar, Vietnam, Iran, and Russia. The US says it’s got the goods on Huawei’s backdoors. Notes on Patch Tuesday. The EU backs away from a five-year moratorium on facial recognition software....</itunes:subtitle>
      <itunes:summary>Facebook takes down coordinated inauthenticity from Myanmar, Vietnam, Iran, and Russia. The US says it’s got the goods on Huawei’s backdoors. Notes on Patch Tuesday. The EU backs away from a five-year moratorium on facial recognition software. Switzerland takes a look at Crypto AG. And the Nevada Democratic caucus a week from Saturday will use iPads, Google Forms, and some tools to process the results. That’s “tools,” Jack, not “apps.” Ben Yelin from UMD CHHS on the Senate GOP blocking election security bills. Guest is Christopher Hadnagy from Social-Engineer, LLC on social engineering trends they are tracking. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_12.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Facebook takes down coordinated inauthenticity from Myanmar, Vietnam, Iran, and Russia. The US says it’s got the goods on Huawei’s backdoors. Notes on Patch Tuesday. The EU backs away from a five-year moratorium on facial recognition software. Switzerland takes a look at Crypto AG. And the Nevada Democratic caucus a week from Saturday will use iPads, Google Forms, and some tools to process the results. That’s “tools,” Jack, not “apps.” Ben Yelin from UMD CHHS on the Senate GOP blocking election security bills. Guest is Christopher Hadnagy from Social-Engineer, LLC on social engineering trends they are tracking. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_12.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1311</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7c713864-f032-4c91-aec3-e16f9992dbcf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3324612898.mp3?updated=1690203178" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pyongyang’s guide to hacking on behalf of rogue regimes. RATs in the supply chain? Data exposures and data breaches. Securing elections (and caucuses, too).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1022/notes</link>
      <description>Pyongyang establishes a template for pariah states trying to profit in cyberspace. The FBI warns that there’s a RAT in the ICS software supply chain. The US has a new counterintelligence strategy, and cyber figures in it prominently. Likud’s exposure of Israeli voter data may benefit opposition intelligence services. Notes on the Equifax breach indictments. As New Hampshire votes in its primaries, CISA warns everyone not to get impatient. And Iowa? Still counting. Robert M. Lee from Dragos on their recent report, “Industrial Cyber Attacks: A Humanitarian Crisis in the Making.” Guest is Andrew Wajs from Scenera on the NICE Alliance and Cloud Privacy. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_11.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Feb 2020 20:32:37 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1022</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6725a154-def8-11ea-911f-cb10d00878f0/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Pyongyang establishes a template for pariah states trying to profit in cyberspace. The FBI warns that there’s a RAT in the ICS software supply chain. The US has a new counterintelligence strategy, and cyber figures in it prominently. Likud’s...</itunes:subtitle>
      <itunes:summary>Pyongyang establishes a template for pariah states trying to profit in cyberspace. The FBI warns that there’s a RAT in the ICS software supply chain. The US has a new counterintelligence strategy, and cyber figures in it prominently. Likud’s exposure of Israeli voter data may benefit opposition intelligence services. Notes on the Equifax breach indictments. As New Hampshire votes in its primaries, CISA warns everyone not to get impatient. And Iowa? Still counting. Robert M. Lee from Dragos on their recent report, “Industrial Cyber Attacks: A Humanitarian Crisis in the Making.” Guest is Andrew Wajs from Scenera on the NICE Alliance and Cloud Privacy. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_11.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Pyongyang establishes a template for pariah states trying to profit in cyberspace. The FBI warns that there’s a RAT in the ICS software supply chain. The US has a new counterintelligence strategy, and cyber figures in it prominently. Likud’s exposure of Israeli voter data may benefit opposition intelligence services. Notes on the Equifax breach indictments. As New Hampshire votes in its primaries, CISA warns everyone not to get impatient. And Iowa? Still counting. Robert M. Lee from Dragos on their recent report, “Industrial Cyber Attacks: A Humanitarian Crisis in the Making.” Guest is Andrew Wajs from Scenera on the NICE Alliance and Cloud Privacy. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_11.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1324</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[78d90d4d-2493-470f-96c3-2a1488a82b71]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1681962555.mp3?updated=1690203166" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US indicts PLA officers in Equifax hack. Pyongyang shows pariah states how it’s done. DDoS in Iran. Updates on Democratic Party caucus IT issues. Likud has a buggy app, too.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1021/notes</link>
      <description>US indicts four members of China’s People’s Liberation Army in connection with the 2017 Equifax breach. North Korea establishes an Internet template for pariah regimes’ sanctions evasion. Iran sustained a major DDoS attack Saturday. US Democratic Party seeks to avoid a repetition of the Iowa caucus in other states as the Sanders campaign asks for a partial recanvas. Israel’s Likud Party involved in a voter database exposure incident via its own app. Joe Carrigan from JHU ISI with a look back at the Clipper chip. Guest is Shannon Brewster from AT&amp;T Cybersecurity with thoughts on election security. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_10.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 10 Feb 2020 19:08:53 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1021</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6741ec92-def8-11ea-911f-6bd2665da47e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>US indicts four members of China’s People’s Liberation Army in connection with the 2017 Equifax breach. North Korea establishes an Internet template for pariah regimes’ sanctions evasion. Iran sustained a major DDoS attack Saturday. US...</itunes:subtitle>
      <itunes:summary>US indicts four members of China’s People’s Liberation Army in connection with the 2017 Equifax breach. North Korea establishes an Internet template for pariah regimes’ sanctions evasion. Iran sustained a major DDoS attack Saturday. US Democratic Party seeks to avoid a repetition of the Iowa caucus in other states as the Sanders campaign asks for a partial recanvas. Israel’s Likud Party involved in a voter database exposure incident via its own app. Joe Carrigan from JHU ISI with a look back at the Clipper chip. Guest is Shannon Brewster from AT&amp;T Cybersecurity with thoughts on election security. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_10.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>US indicts four members of China’s People’s Liberation Army in connection with the 2017 Equifax breach. North Korea establishes an Internet template for pariah regimes’ sanctions evasion. Iran sustained a major DDoS attack Saturday. US Democratic Party seeks to avoid a repetition of the Iowa caucus in other states as the Sanders campaign asks for a partial recanvas. Israel’s Likud Party involved in a voter database exposure incident via its own app. Joe Carrigan from JHU ISI with a look back at the Clipper chip. Guest is Shannon Brewster from AT&amp;T Cybersecurity with thoughts on election security. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_10.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1335</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1bbe93b6-0431-4e86-b3e9-bd5a95b825a8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5901765277.mp3?updated=1690203154" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Chameleon attacks Online Social Networks. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/121/notes</link>
      <description>The Chameleon attack technique is a new type of OSN-based trickery where malicious posts and profiles change the way they are displayed to OSN users to conceal themselves before the attack or avoid detection. Joining us to discuss their findings in a new report entitled "The Chameleon Attack: Manipulating Content Display in Online Social Media" is Ben-Gurion University's Rami Puzis. 
The research can be found here:
The Chameleon Attack: Manipulating Content Display in Online Social Media
Demonstration video of a Chameleon Attack
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Feb 2020 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>121</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8eb40c9a-df13-11ea-9fc1-b376c967c532/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The Chameleon attack technique is a new type of OSN-based trickery where malicious posts and profiles change the way they are displayed to OSN users to conceal themselves before the attack or avoid detection. Joining us to discuss their findings in a...</itunes:subtitle>
      <itunes:summary>The Chameleon attack technique is a new type of OSN-based trickery where malicious posts and profiles change the way they are displayed to OSN users to conceal themselves before the attack or avoid detection. Joining us to discuss their findings in a new report entitled "The Chameleon Attack: Manipulating Content Display in Online Social Media" is Ben-Gurion University's Rami Puzis. 
The research can be found here:
The Chameleon Attack: Manipulating Content Display in Online Social Media
Demonstration video of a Chameleon Attack
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Chameleon attack technique is a new type of OSN-based trickery where malicious posts and profiles change the way they are displayed to OSN users to conceal themselves before the attack or avoid detection. Joining us to discuss their findings in a new report entitled "The Chameleon Attack: Manipulating Content Display in Online Social Media" is Ben-Gurion University's Rami Puzis. </p><p>The research can be found here:</p><p><a href="https://arxiv.org/abs/2001.05668">The Chameleon Attack: Manipulating Content Display in Online Social Media</a></p><p><a href="https://www.youtube.com/watch?v=CRg6Sy5Ygws">Demonstration video of a Chameleon Attack</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1113</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[67cd438c-179c-456c-a95b-23d9b193c831]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2724940489.mp3?updated=1685107719" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chinese cyber espionage in Malaysia and Japan. Android Bluetooth bug. Google expels suspect apps from the Play store. More Iowa caucus finger-pointing. US preps indictments of Chinese nationals. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1020/notes</link>
      <description>Chinese espionage groups target Malaysian officials, and two more Japanese defense contractors say they were breached, also by China. Google patches Android problems, including an unusual Bluetooth bug. Google also expels apps that wanted unreasonable permissions from the Play store. Some in Iowa say the DNC pushed an eleventh-hour security patch to IowaReporterApp. The US may indict more Chinese nationals for hacking. More Senate reporting on 2016 Russian influence. Caleb Barlow from Synergistek with more insights on hospitals and ransomware, this time from the patient’s perspective. Guest is Matt Cauthorn from ExtraHop comparing cloud platforms’ similarities and differences.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_07.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 07 Feb 2020 20:38:25 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1020</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/67598c1c-def8-11ea-911f-af38eb0134cf/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Chinese espionage groups target Malaysian officials, and two more Japanese defense contractors say they were breached, also by China. Google patches Android problems, including an unusual Bluetooth bug. Google also expels apps that wanted unreasonable...</itunes:subtitle>
      <itunes:summary>Chinese espionage groups target Malaysian officials, and two more Japanese defense contractors say they were breached, also by China. Google patches Android problems, including an unusual Bluetooth bug. Google also expels apps that wanted unreasonable permissions from the Play store. Some in Iowa say the DNC pushed an eleventh-hour security patch to IowaReporterApp. The US may indict more Chinese nationals for hacking. More Senate reporting on 2016 Russian influence. Caleb Barlow from Synergistek with more insights on hospitals and ransomware, this time from the patient’s perspective. Guest is Matt Cauthorn from ExtraHop comparing cloud platforms’ similarities and differences.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_07.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chinese espionage groups target Malaysian officials, and two more Japanese defense contractors say they were breached, also by China. Google patches Android problems, including an unusual Bluetooth bug. Google also expels apps that wanted unreasonable permissions from the Play store. Some in Iowa say the DNC pushed an eleventh-hour security patch to IowaReporterApp. The US may indict more Chinese nationals for hacking. More Senate reporting on 2016 Russian influence. Caleb Barlow from Synergistek with more insights on hospitals and ransomware, this time from the patient’s perspective. Guest is Matt Cauthorn from ExtraHop comparing cloud platforms’ similarities and differences.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_07.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1601</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[46596dd0-06ff-40f7-b53b-103307ee6f14]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6978874144.mp3?updated=1608756458" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Iowa caucus problems induced by buggy counting and reporting app. Bitbucket repositories used to spread malware. Gamaredon active again against Ukraine. Charming Kitten’s phishing. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1019/notes</link>
      <description>Iowa Democrats continue to count their caucus results, and blame for the mess is falling squarely on Shadow, Inc.’s IowaReporterApp. Bitbucket repositories are found spreading malware. The attack on Toll Group turns out to be Mailto ransomware. The Gamaredon Group is active, against, against Ukrainian targets. Charming Kitten’s been phishing. And there’s a new legal theory out and about: the pain-in-the-ass defense. (We know some colleagues who’d plead to that.) Justin Harvey from Accenture on DNS over HTTPS (DoH). Guest is Peter Smith from Edgewise Networks on defending against Python attacks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_06.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 06 Feb 2020 19:36:55 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1019</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/67714726-def8-11ea-911f-53aee1b62b42/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Iowa Democrats continue to count their caucus results, and blame for the mess is falling squarely on Shadow, Inc.’s IowaReporterApp. Bitbucket repositories are found spreading malware. The attack on Toll Group turns out to be Mailto ransomware. The...</itunes:subtitle>
      <itunes:summary>Iowa Democrats continue to count their caucus results, and blame for the mess is falling squarely on Shadow, Inc.’s IowaReporterApp. Bitbucket repositories are found spreading malware. The attack on Toll Group turns out to be Mailto ransomware. The Gamaredon Group is active, against, against Ukrainian targets. Charming Kitten’s been phishing. And there’s a new legal theory out and about: the pain-in-the-ass defense. (We know some colleagues who’d plead to that.) Justin Harvey from Accenture on DNS over HTTPS (DoH). Guest is Peter Smith from Edgewise Networks on defending against Python attacks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_06.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iowa Democrats continue to count their caucus results, and blame for the mess is falling squarely on Shadow, Inc.’s IowaReporterApp. Bitbucket repositories are found spreading malware. The attack on Toll Group turns out to be Mailto ransomware. The Gamaredon Group is active, against, against Ukrainian targets. Charming Kitten’s been phishing. And there’s a new legal theory out and about: the pain-in-the-ass defense. (We know some colleagues who’d plead to that.) Justin Harvey from Accenture on DNS over HTTPS (DoH). Guest is Peter Smith from Edgewise Networks on defending against Python attacks.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_06.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1313</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ad199bf1-4361-4746-beae-6eeecade98d8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7594111703.mp3?updated=1690202905" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Update on the Iowa Democrats’ bad app. DDoS warning for state election sites. DDoS trends. New ransomware tracked. Tehran spoofing emails? Nintendo hacker pleads guilty.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1018/notes</link>
      <description>Iowa’s Democrats are still counting their caucus results, but on the other hand they weren’t hacked. A poorly built and badly tested app is still being blamed, and that judgment seems likely to hold up. The FBI warns of a DDoS attempt against a state voter registration site. Trends in DDoS. Some new strains of ransomware are out in the wild. Spoofed emails may be an Iranian espionage effort. And the confessed Ninendo hacker cops a plea. Craig Williams from Cisco Talos with updates on Emotet. Guest is Kurtis Minder from GroupSense on the Pros and Cons of notifying breached companies.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_05.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 05 Feb 2020 21:15:28 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1018</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/678ff2e8-def8-11ea-911f-771409fb3b3f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Iowa’s Democrats are still counting their caucus results, but on the other hand they weren’t hacked. A poorly built and badly tested app is still being blamed, and that judgment seems likely to hold up. The FBI warns of a DDoS attempt against a...</itunes:subtitle>
      <itunes:summary>Iowa’s Democrats are still counting their caucus results, but on the other hand they weren’t hacked. A poorly built and badly tested app is still being blamed, and that judgment seems likely to hold up. The FBI warns of a DDoS attempt against a state voter registration site. Trends in DDoS. Some new strains of ransomware are out in the wild. Spoofed emails may be an Iranian espionage effort. And the confessed Ninendo hacker cops a plea. Craig Williams from Cisco Talos with updates on Emotet. Guest is Kurtis Minder from GroupSense on the Pros and Cons of notifying breached companies.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_05.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iowa’s Democrats are still counting their caucus results, but on the other hand they weren’t hacked. A poorly built and badly tested app is still being blamed, and that judgment seems likely to hold up. The FBI warns of a DDoS attempt against a state voter registration site. Trends in DDoS. Some new strains of ransomware are out in the wild. Spoofed emails may be an Iranian espionage effort. And the confessed Ninendo hacker cops a plea. Craig Williams from Cisco Talos with updates on Emotet. Guest is Kurtis Minder from GroupSense on the Pros and Cons of notifying breached companies.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_05.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1325</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7cafe7fc-e23e-4b94-b356-6bad637d45f3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8589278982.mp3?updated=1690202889" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Buggy app delays count in Iowa Democratic caucus. US county election sites ill-prepared against influence ops. Twitter fixes API exploited by fake accounts. NIST on ransomware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1017/notes</link>
      <description>Iowa Democrats work to sort out app-induced confusion over Monday’s Presidential caucus. A McAfee study finds widespread susceptibility to influence operations in US county websites. Twitter fixes an API vulnerability and suspends a large network of fake accounts. NIST’s proposed ransomware defense standards are out for your review--comments are open until February 26th. Ben Yelin from UMD CHHS on rules regarding destruction of electronic evidence. Guest is Alex Burkardt from VERA on how to protect critical financial data beyond the corporate perimeter. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_04.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Feb 2020 19:58:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1017</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/67a817c4-def8-11ea-911f-cb2243373cf0/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Iowa Democrats work to sort out app-induced confusion over Monday’s Presidential caucus. A McAfee study finds widespread susceptibility to influence operations in US county websites. Twitter fixes an API vulnerability and suspends a large network of...</itunes:subtitle>
      <itunes:summary>Iowa Democrats work to sort out app-induced confusion over Monday’s Presidential caucus. A McAfee study finds widespread susceptibility to influence operations in US county websites. Twitter fixes an API vulnerability and suspends a large network of fake accounts. NIST’s proposed ransomware defense standards are out for your review--comments are open until February 26th. Ben Yelin from UMD CHHS on rules regarding destruction of electronic evidence. Guest is Alex Burkardt from VERA on how to protect critical financial data beyond the corporate perimeter. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_04.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iowa Democrats work to sort out app-induced confusion over Monday’s Presidential caucus. A McAfee study finds widespread susceptibility to influence operations in US county websites. Twitter fixes an API vulnerability and suspends a large network of fake accounts. NIST’s proposed ransomware defense standards are out for your review--comments are open until February 26th. Ben Yelin from UMD CHHS on rules regarding destruction of electronic evidence. Guest is Alex Burkardt from VERA on how to protect critical financial data beyond the corporate perimeter. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_04.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1353</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f3b18e4a-df0f-4f50-8eab-2c35680977cf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3838954502.mp3?updated=1690202875" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More on EKANS, the ransomware with an ICS kicker. Shipping company customer-facing IT disrupted in cyber incident. Coronavirus as phishbait. Election security, new DoD rules, and insider threats.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1016/notes</link>
      <description>Dragos publicly releases its full report on EKANS ransomware, the first known ransomware with a real if primitive capability against industrial control systems. An Australian logistics company struggles with an unspecified malware infestation. Coronovirus fake news used as phishbait. Election security may get an early test in Iowa. The US Department of Defense issues new cybersecurity rules for contractors. And two cases of insider threats (alleged insider threats). Joe Carrigan from JHU ISI with reactions to ransomware legislation proposed in Maryland.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_03.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 03 Feb 2020 20:48:07 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1016</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/67f1aba0-def8-11ea-911f-c3661b3a874b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dragos publicly releases its full report on EKANS ransomware, the first known ransomware with a real if primitive capability against industrial control systems. An Australian logistics company struggles with an unspecified malware infestation....</itunes:subtitle>
      <itunes:summary>Dragos publicly releases its full report on EKANS ransomware, the first known ransomware with a real if primitive capability against industrial control systems. An Australian logistics company struggles with an unspecified malware infestation. Coronovirus fake news used as phishbait. Election security may get an early test in Iowa. The US Department of Defense issues new cybersecurity rules for contractors. And two cases of insider threats (alleged insider threats). Joe Carrigan from JHU ISI with reactions to ransomware legislation proposed in Maryland.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_03.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dragos publicly releases its full report on EKANS ransomware, the first known ransomware with a real if primitive capability against industrial control systems. An Australian logistics company struggles with an unspecified malware infestation. Coronovirus fake news used as phishbait. Election security may get an early test in Iowa. The US Department of Defense issues new cybersecurity rules for contractors. And two cases of insider threats (alleged insider threats). Joe Carrigan from JHU ISI with reactions to ransomware legislation proposed in Maryland.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/February/CyberWire_2020_02_03.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1068</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[94e2bd57-c703-4562-8f44-142bac7e913e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2099253451.mp3?updated=1690202859" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Eric Haseltine on his book, "The Spy in Moscow Station." [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/37/notes</link>
      <description>On this Special Edition, our extended conversation with Eric Haseltine on his book "The Spy in Moscow Station." The book... "tells of a time when—much like today—Russian spycraft had proven itself far beyond the best technology the U.S. had to offer. The perils of American arrogance mixed with bureaucratic infighting left the country unspeakably vulnerable to ultra-sophisticated Russian electronic surveillance and espionage." 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 02 Feb 2020 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>37</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/1b2f8a64-df05-11ea-8956-cb582ddc5931/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>On this Special Edition, our extended conversation with Eric Haseltine on his book "." The book... "tells of a time when—much like today—Russian spycraft had proven itself far beyond the best technology the U.S. had to offer. The perils of...</itunes:subtitle>
      <itunes:summary>On this Special Edition, our extended conversation with Eric Haseltine on his book "The Spy in Moscow Station." The book... "tells of a time when—much like today—Russian spycraft had proven itself far beyond the best technology the U.S. had to offer. The perils of American arrogance mixed with bureaucratic infighting left the country unspeakably vulnerable to ultra-sophisticated Russian electronic surveillance and espionage." 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On this Special Edition, our extended conversation with Eric Haseltine on his book "<a href="https://us.macmillan.com/books/9781250301161">The Spy in Moscow Station</a>." The book... "tells of a time when—much like today—Russian spycraft had proven itself far beyond the best technology the U.S. had to offer. The perils of American arrogance mixed with bureaucratic infighting left the country unspeakably vulnerable to ultra-sophisticated Russian electronic surveillance and espionage." </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1655</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5303d81f-a802-4927-8ea0-6f45733090d4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5237294916.mp3?updated=1662646083" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tracking one of China's hidden hacking groups. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/120/notes</link>
      <description>Operation Wocao (我操, “Wǒ cāo”, is a Chinese curse word) is the name that Fox-IT uses to describe the hacking activities of a Chinese based hacking group.
We are joined by Fox-IT's Maarten van Dantzig who shares his insights into their new report entitled "Operation Wocao: Shining a light on one of China’s hidden hacking groups".
The Research can be found here:



 Operation Wocao: Shining a light on one of China’s hidden hacking groups
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Feb 2020 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>120</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/1a12525c-df13-11ea-ac0c-6f8ad3b29a74/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Operation Wocao (我操, “Wǒ cāo”, is a Chinese curse word) is the name that Fox-IT uses to describe the hacking activities of a Chinese based hacking group. We are joined by Fox-IT's Maarten van Dantzig who shares his insights into their new...</itunes:subtitle>
      <itunes:summary>Operation Wocao (我操, “Wǒ cāo”, is a Chinese curse word) is the name that Fox-IT uses to describe the hacking activities of a Chinese based hacking group.
We are joined by Fox-IT's Maarten van Dantzig who shares his insights into their new report entitled "Operation Wocao: Shining a light on one of China’s hidden hacking groups".
The Research can be found here:



 Operation Wocao: Shining a light on one of China’s hidden hacking groups
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Operation Wocao (我操, “Wǒ cāo”, is a Chinese curse word) is the name that Fox-IT uses to describe the hacking activities of a Chinese based hacking group.</p><p>We are joined by Fox-IT's Maarten van Dantzig who shares his insights into their new report entitled "Operation Wocao: Shining a light on one of China’s hidden hacking groups".</p><p>The Research can be found here:</p><p><br></p><p><br></p><p><br></p><p><a href="https://www.fox-it.com/en/news/whitepapers/operation-wocao-shining-a-light-on-one-of-chinas-hidden-hacking-groups/"> Operation Wocao: Shining a light on one of China’s hidden hacking groups</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1197</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6167f5bf-d264-429f-9e70-2c64d385a774]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6408511588.mp3?updated=1685107484" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Winnti Group is interested in Hong Kong protestors. The UK, the US, and the EU all look for a cooperative way forward into 5G. DDoS for hire hits an independent Serbian media outlet. Ransomware may have hit a US defense contractor. EvilCorp is back. T</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1015/notes</link>
      <description>The Winnti Group is interested in Hong Kong protestors. The UK, the US, and the EU all look for a cooperative way forward into 5G. DDoS for hire hits an independent Serbian media outlet. Ransomware may have hit a US defense contractor. EvilCorp is back. The Sodinokibi ransomware gang is running an essay contest. And the 2015 Ashley Madison breach keeps on giving, in the form of blackmail. Emily Wilson from Terbium Labs on the sale of “points” and “status benefits” on the dark web. Guest is Michael Sutton from Stonemill Ventures with insights from the cyber VC world.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_31.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 31 Jan 2020 21:12:14 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1015</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6804e864-def8-11ea-911f-57d06e0e4693/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The Winnti Group is interested in Hong Kong protestors. The UK, the US, and the EU all look for a cooperative way forward into 5G. DDoS for hire hits an independent Serbian media outlet. Ransomware may have hit a US defense contractor. EvilCorp is...</itunes:subtitle>
      <itunes:summary>The Winnti Group is interested in Hong Kong protestors. The UK, the US, and the EU all look for a cooperative way forward into 5G. DDoS for hire hits an independent Serbian media outlet. Ransomware may have hit a US defense contractor. EvilCorp is back. The Sodinokibi ransomware gang is running an essay contest. And the 2015 Ashley Madison breach keeps on giving, in the form of blackmail. Emily Wilson from Terbium Labs on the sale of “points” and “status benefits” on the dark web. Guest is Michael Sutton from Stonemill Ventures with insights from the cyber VC world.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_31.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Winnti Group is interested in Hong Kong protestors. The UK, the US, and the EU all look for a cooperative way forward into 5G. DDoS for hire hits an independent Serbian media outlet. Ransomware may have hit a US defense contractor. EvilCorp is back. The Sodinokibi ransomware gang is running an essay contest. And the 2015 Ashley Madison breach keeps on giving, in the form of blackmail. Emily Wilson from Terbium Labs on the sale of “points” and “status benefits” on the dark web. Guest is Michael Sutton from Stonemill Ventures with insights from the cyber VC world.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_31.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1473</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f17fab51-8802-4c73-a4ec-c44a68978af4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9591780338.mp3?updated=1608756430" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacking the UN. Avast closes Jumpshot over privacy uproar. Facebook settles a biometric lawsuit. Data exposures, a LiveRamp compromise, and more newly aggressive ransomware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1014/notes</link>
      <description>UN agencies in Geneva and Vienna were successfully hacked last summer in an apparent espionage campaign. Avast shuts down its Jumpshot data analysis subsidiary and resolves to stick to its security last. Facebook reaches a preliminary, $550 million settlement in a privacy class-action lawsuit. SpiceJet and Sprint suffer data exposures. LiveRamp was compromised for ad fraud. And Russia blocks ProtonMail and StartMail. Caleb Barlow from Cynergistek on the business impact of ransomware on a hospital. Guest is Matthew Doan, cyberecurity policy fellow at New America, discussing his recent recent Harvard Business Review article “Companies Need to Rethink What Cybersecurity Leadership Is.”
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_30.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 30 Jan 2020 20:53:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1014</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/68234c00-def8-11ea-911f-ff25d228a803/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>UN agencies in Geneva and Vienna were successfully hacked last summer in an apparent espionage campaign. Avast shuts down its Jumpshot data analysis subsidiary and resolves to stick to its security last. Facebook reaches a preliminary, $550 million...</itunes:subtitle>
      <itunes:summary>UN agencies in Geneva and Vienna were successfully hacked last summer in an apparent espionage campaign. Avast shuts down its Jumpshot data analysis subsidiary and resolves to stick to its security last. Facebook reaches a preliminary, $550 million settlement in a privacy class-action lawsuit. SpiceJet and Sprint suffer data exposures. LiveRamp was compromised for ad fraud. And Russia blocks ProtonMail and StartMail. Caleb Barlow from Cynergistek on the business impact of ransomware on a hospital. Guest is Matthew Doan, cyberecurity policy fellow at New America, discussing his recent recent Harvard Business Review article “Companies Need to Rethink What Cybersecurity Leadership Is.”
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_30.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>UN agencies in Geneva and Vienna were successfully hacked last summer in an apparent espionage campaign. Avast shuts down its Jumpshot data analysis subsidiary and resolves to stick to its security last. Facebook reaches a preliminary, $550 million settlement in a privacy class-action lawsuit. SpiceJet and Sprint suffer data exposures. LiveRamp was compromised for ad fraud. And Russia blocks ProtonMail and StartMail. Caleb Barlow from Cynergistek on the business impact of ransomware on a hospital. Guest is Matthew Doan, cyberecurity policy fellow at New America, discussing his recent recent Harvard Business Review article “Companies Need to Rethink What Cybersecurity Leadership Is.”</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_30.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1437</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d7cf43ad-3092-43eb-986f-469af2ef09ca]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6776724583.mp3?updated=1690155970" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware in industrial control systems. Phone hacks, proved and unproved. Britain’s compromise decision on Huawei. Wawa cards in the Joker’s Stash. CardPlanet boss pleads guilty.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1013/notes</link>
      <description>Snake ransomware appears to have hit industrial control systems, and may be connected to Iran. The verdict on the Saudi hack of Mr. Bezos’ phone seems to stand at not proven, but the Kingdom does seem to have used Pegasus intercept tools against journalists and critics of the regime. Neither the US nor China are happy with Britain’s decision on Huawei. Cards from the Wawa breach are on sale in the Joker’s Stash. And CardPlanet’s boss will do some Federal time. Ben Yelin from UMD CHHS on AOC’s comments during House hearings on facial recognition technology. Guest is Dan Conrad from One Identity on sophisticated “pass the hash” attacks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_29.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 29 Jan 2020 20:18:24 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1013</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/683b3c70-def8-11ea-911f-d73d0663ac68/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Snake ransomware appears to have hit industrial control systems, and may be connected to Iran. The verdict on the Saudi hack of Mr. Bezos’ phone seems to stand at not proven, but the Kingdom does seem to have used Pegasus intercept tools against...</itunes:subtitle>
      <itunes:summary>Snake ransomware appears to have hit industrial control systems, and may be connected to Iran. The verdict on the Saudi hack of Mr. Bezos’ phone seems to stand at not proven, but the Kingdom does seem to have used Pegasus intercept tools against journalists and critics of the regime. Neither the US nor China are happy with Britain’s decision on Huawei. Cards from the Wawa breach are on sale in the Joker’s Stash. And CardPlanet’s boss will do some Federal time. Ben Yelin from UMD CHHS on AOC’s comments during House hearings on facial recognition technology. Guest is Dan Conrad from One Identity on sophisticated “pass the hash” attacks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_29.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Snake ransomware appears to have hit industrial control systems, and may be connected to Iran. The verdict on the Saudi hack of Mr. Bezos’ phone seems to stand at not proven, but the Kingdom does seem to have used Pegasus intercept tools against journalists and critics of the regime. Neither the US nor China are happy with Britain’s decision on Huawei. Cards from the Wawa breach are on sale in the Joker’s Stash. And CardPlanet’s boss will do some Federal time. Ben Yelin from UMD CHHS on AOC’s comments during House hearings on facial recognition technology. Guest is Dan Conrad from One Identity on sophisticated “pass the hash” attacks.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_29.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1411</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bcdc70cd-d8d3-4270-83ca-5efa5472c5df]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6190986731.mp3?updated=1690155954" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Huawei will play in UK infrastructure, at least a little. Citizen Lab on KINGDOM, a Pegasus operator. Avast and sale of user data. Happy Data Privacy Day.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1012/notes</link>
      <description>Britain decides to let Huawei into its 5G infrastructure, just a little bit, anyway. Citizen Lab reports on its investigation of Saudi use of Pegasus spyware against journalists. Avast is again collecting user data and sharing anonymized data with a subsidiary for sale to business customers. Some Data Privacy Day thoughts on agreeing to terms and conditions, with reflections on the first systematic look at End User License Agreements, found in the final chapter of Plato’s Republic. Joe Carrigan from JHU ISI on evolving ransomware business models. Guest is Dr. Christopher Pierson from BLACKCLOAK with insights on the alleged Bezos phone hack and the vulnerabilities of high-profile individuals.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_28.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Jan 2020 20:41:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1012</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/684d3074-def8-11ea-911f-ab0cf1f10fe8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Britain decides to let Huawei into its 5G infrastructure, just a little bit, anyway. Citizen Lab reports on its investigation of Saudi use of Pegasus spyware against journalists. Avast is again collecting user data and sharing anonymized data with a...</itunes:subtitle>
      <itunes:summary>Britain decides to let Huawei into its 5G infrastructure, just a little bit, anyway. Citizen Lab reports on its investigation of Saudi use of Pegasus spyware against journalists. Avast is again collecting user data and sharing anonymized data with a subsidiary for sale to business customers. Some Data Privacy Day thoughts on agreeing to terms and conditions, with reflections on the first systematic look at End User License Agreements, found in the final chapter of Plato’s Republic. Joe Carrigan from JHU ISI on evolving ransomware business models. Guest is Dr. Christopher Pierson from BLACKCLOAK with insights on the alleged Bezos phone hack and the vulnerabilities of high-profile individuals.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_28.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Britain decides to let Huawei into its 5G infrastructure, just a little bit, anyway. Citizen Lab reports on its investigation of Saudi use of Pegasus spyware against journalists. Avast is again collecting user data and sharing anonymized data with a subsidiary for sale to business customers. Some Data Privacy Day thoughts on agreeing to terms and conditions, with reflections on the first systematic look at End User License Agreements, found in the final chapter of Plato’s Republic. Joe Carrigan from JHU ISI on evolving ransomware business models. Guest is Dr. Christopher Pierson from BLACKCLOAK with insights on the alleged Bezos phone hack and the vulnerabilities of high-profile individuals.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_28.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1366</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6cd5efb6-385c-40fc-ad45-893fa9399ee4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7981026462.mp3?updated=1690155938" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A cyber espionage campaign is to use DNS hijacking. More observations on l’affaire Bezos. Operation Night Fury versus e-commerce hackers. Farewell to Clayton Christensen.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1011/notes</link>
      <description>Someone has been running a DNS hijacking campaign against governments in southeast Europe and southwest Asia, and Reuters thinks that someone looks like Turkey. Experts would like to see a more thorough forensic analysis of Mr. Bezos’ iPhone: that hack may look like a Saudi job, but the evidence remains circumstantial. Interpol’s Operation Night Fury dismantles a gang that had been preying on e-commerce. And ave atque vale, Clayton Christensen, theorist of disruptive innovation. Robert M. Lee from Dragos with 2020 predictions (reluctantly).
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_27.html
 Support our show
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 27 Jan 2020 20:44:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1011</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/686434a4-def8-11ea-911f-574260cdf669/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Someone has been running a DNS hijacking campaign against governments in southeast Europe and southwest Asia, and Reuters thinks that someone looks like Turkey. Experts would like to see a more thorough forensic analysis of Mr. Bezos’ iPhone: that...</itunes:subtitle>
      <itunes:summary>Someone has been running a DNS hijacking campaign against governments in southeast Europe and southwest Asia, and Reuters thinks that someone looks like Turkey. Experts would like to see a more thorough forensic analysis of Mr. Bezos’ iPhone: that hack may look like a Saudi job, but the evidence remains circumstantial. Interpol’s Operation Night Fury dismantles a gang that had been preying on e-commerce. And ave atque vale, Clayton Christensen, theorist of disruptive innovation. Robert M. Lee from Dragos with 2020 predictions (reluctantly).
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_27.html
 Support our show
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Someone has been running a DNS hijacking campaign against governments in southeast Europe and southwest Asia, and Reuters thinks that someone looks like Turkey. Experts would like to see a more thorough forensic analysis of Mr. Bezos’ iPhone: that hack may look like a Saudi job, but the evidence remains circumstantial. Interpol’s Operation Night Fury dismantles a gang that had been preying on e-commerce. And ave atque vale, Clayton Christensen, theorist of disruptive innovation. Robert M. Lee from Dragos with 2020 predictions (reluctantly).</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_27.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p> <p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1202</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f811820b-acef-4e19-b3b9-c2e309813bf8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3764118778.mp3?updated=1690155920" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Know Thine Enemy - Identifying North American Cyber Threats. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/119/notes</link>
      <description>The electric utility industry is a valuable target for adversaries seeking to exploit industrial control systems (ICS) and operations technology (OT) for a variety of purposes. As adversaries and their sponsors invest more effort and money into obtaining effects-focused capabilities, the risk of a disruptive or destructive attack on the electric sector significantly increases.
Selena Larson from Dragos joins us to discuss their new report North American Electric Cyber Threat Perspective.
The report can be found here:
 North American Electric Cyber Threat Perspective
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Jan 2020 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>119</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/166ab874-df13-11ea-9c25-83ed3b077a64/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The electric utility industry is a valuable target for adversaries seeking to exploit industrial control systems (ICS) and operations technology (OT) for a variety of purposes. As adversaries and their sponsors invest more effort and money into...</itunes:subtitle>
      <itunes:summary>The electric utility industry is a valuable target for adversaries seeking to exploit industrial control systems (ICS) and operations technology (OT) for a variety of purposes. As adversaries and their sponsors invest more effort and money into obtaining effects-focused capabilities, the risk of a disruptive or destructive attack on the electric sector significantly increases.
Selena Larson from Dragos joins us to discuss their new report North American Electric Cyber Threat Perspective.
The report can be found here:
 North American Electric Cyber Threat Perspective
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The electric utility industry is a valuable target for adversaries seeking to exploit industrial control systems (ICS) and operations technology (OT) for a variety of purposes. As adversaries and their sponsors invest more effort and money into obtaining effects-focused capabilities, the risk of a disruptive or destructive attack on the electric sector significantly increases.</p><p>Selena Larson from Dragos joins us to discuss their new report North American Electric Cyber Threat Perspective.</p><p>The report can be found here:</p><p><a href="https://dragos.com/resource/north-american-electric-cyber-threat-perspective/"> North American Electric Cyber Threat Perspective</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1722</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ca1157a3-ddc7-4b4c-901c-23f183226e6a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4448322068.mp3?updated=1685107482" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>PupyRAT is back. So is the Konni Group. Twitter storm over claims that MBS hacked Jeff Bezos. Anti-disinformaiton laws considered. Canada is ready to impose costs on cyber attackers.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1010/notes</link>
      <description>PupyRAT was found in a European energy organization: it may be associated with Iranian threat actors. Another threat actor, the Konni Group, was active against a US government agency last year. Saudi Arabia maintains it had nothing to do with hacking Jeff Bezos’s phone. The EU and Ukraine separately consider anti-disinformation regulations. Canada may be ready to “impose costs” in cyberspace. And Huawei’s a threat, but what’re you gonna do? Justin Harvey from Accenture with an outlook on 2020. Guests are Hank Thomas and Mike Doniger from SCVX, describing their plan to bring a funding mechanism know as a SPAC to cyber security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_24.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 24 Jan 2020 20:49:33 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1010</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/687fb5e4-def8-11ea-911f-7f274aed7bf5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>PupyRAT was found in a European energy organization: it may be associated with Iranian threat actors. Another threat actor, the Konni Group, was active against a US government agency last year. Saudi Arabia maintains it had nothing to do with hacking...</itunes:subtitle>
      <itunes:summary>PupyRAT was found in a European energy organization: it may be associated with Iranian threat actors. Another threat actor, the Konni Group, was active against a US government agency last year. Saudi Arabia maintains it had nothing to do with hacking Jeff Bezos’s phone. The EU and Ukraine separately consider anti-disinformation regulations. Canada may be ready to “impose costs” in cyberspace. And Huawei’s a threat, but what’re you gonna do? Justin Harvey from Accenture with an outlook on 2020. Guests are Hank Thomas and Mike Doniger from SCVX, describing their plan to bring a funding mechanism know as a SPAC to cyber security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_24.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>PupyRAT was found in a European energy organization: it may be associated with Iranian threat actors. Another threat actor, the Konni Group, was active against a US government agency last year. Saudi Arabia maintains it had nothing to do with hacking Jeff Bezos’s phone. The EU and Ukraine separately consider anti-disinformation regulations. Canada may be ready to “impose costs” in cyberspace. And Huawei’s a threat, but what’re you gonna do? Justin Harvey from Accenture with an outlook on 2020. Guests are Hank Thomas and Mike Doniger from SCVX, describing their plan to bring a funding mechanism know as a SPAC to cyber security.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_24.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1260</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1a317a46-e9b8-4878-b158-6670a9390896]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5915476873.mp3?updated=1690155897" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing with a RAT in the Gulf. More on how Jeff Bezos was hacked. Microsoft discloses data exposure. Ransomware continues to dump data. Windows 7, already back from the great beyond.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1009/notes</link>
      <description>There’s more phishing around the Arabian Gulf, but it doesn’t look local. Reactions to Brazil’s indictment of Glenn Greenwald. The forensic report on Jeff Bezos’s smartphone has emerged, and the UN wants some investigating. Microsoft discloses an exposed database, now secured. Ransomware gets even leakier--if it hits you, assume a data breach. And Windows 7 is going to enjoy an afterlife in software Valhalla--you know, around Berlin. Tom Etheridge from CrowdStrike with thoughts on incident response plans.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_23.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 23 Jan 2020 20:05:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1009</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6898e2e4-def8-11ea-911f-9bcc89248cb3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>There’s more phishing around the Arabian Gulf, but it doesn’t look local. Reactions to Brazil’s indictment of Glenn Greenwald. The forensic report on Jeff Bezos’s smartphone has emerged, and the UN wants some investigating. Microsoft discloses...</itunes:subtitle>
      <itunes:summary>There’s more phishing around the Arabian Gulf, but it doesn’t look local. Reactions to Brazil’s indictment of Glenn Greenwald. The forensic report on Jeff Bezos’s smartphone has emerged, and the UN wants some investigating. Microsoft discloses an exposed database, now secured. Ransomware gets even leakier--if it hits you, assume a data breach. And Windows 7 is going to enjoy an afterlife in software Valhalla--you know, around Berlin. Tom Etheridge from CrowdStrike with thoughts on incident response plans.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_23.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>There’s more phishing around the Arabian Gulf, but it doesn’t look local. Reactions to Brazil’s indictment of Glenn Greenwald. The forensic report on Jeff Bezos’s smartphone has emerged, and the UN wants some investigating. Microsoft discloses an exposed database, now secured. Ransomware gets even leakier--if it hits you, assume a data breach. And Windows 7 is going to enjoy an afterlife in software Valhalla--you know, around Berlin. Tom Etheridge from CrowdStrike with thoughts on incident response plans.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_23.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1121</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c8429c36-7f8e-4163-a271-5abe1f45d999]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7331532555.mp3?updated=1690155860" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The UN takes up a case of spyware; it’s linked to an extrajudicial killing. Glenn Greenwald indicted on hacking charges in Brazil. NetWire and StarsLord are back. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1008/notes</link>
      <description>UN rapporteurs say that the Saudi Crown Prince was probably involved in the installation of spyware on Amazon founder Jeff Bezos’s personal phone. Brazilian prosecutors have indicted Glenn Greenwald, co-founder of the Intercept, on hacking charges. IBM describes a renewed NetWire campaign, and Microsoft says StarsLord is back, too. And in cyberspace, there’s nothing new on the US-Iranian front. Ben Yelin from UMD CHHS on surveillance cameras hidden in gravestones. Guest is Sean Frazier from Cisco Duo on their most recent State of the Auth report. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_22.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 22 Jan 2020 20:55:44 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1008</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/68adbad4-def8-11ea-911f-e371a5832056/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>UN rapporteurs say that the Saudi Crown Prince was probably involved in the installation of spyware on Amazon founder Jeff Bezos’s personal phone. Brazilian prosecutors have indicted Glenn Greenwald, co-founder of the Intercept, on hacking charges....</itunes:subtitle>
      <itunes:summary>UN rapporteurs say that the Saudi Crown Prince was probably involved in the installation of spyware on Amazon founder Jeff Bezos’s personal phone. Brazilian prosecutors have indicted Glenn Greenwald, co-founder of the Intercept, on hacking charges. IBM describes a renewed NetWire campaign, and Microsoft says StarsLord is back, too. And in cyberspace, there’s nothing new on the US-Iranian front. Ben Yelin from UMD CHHS on surveillance cameras hidden in gravestones. Guest is Sean Frazier from Cisco Duo on their most recent State of the Auth report. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_22.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>UN rapporteurs say that the Saudi Crown Prince was probably involved in the installation of spyware on Amazon founder Jeff Bezos’s personal phone. Brazilian prosecutors have indicted Glenn Greenwald, co-founder of the Intercept, on hacking charges. IBM describes a renewed NetWire campaign, and Microsoft says StarsLord is back, too. And in cyberspace, there’s nothing new on the US-Iranian front. Ben Yelin from UMD CHHS on surveillance cameras hidden in gravestones. Guest is Sean Frazier from Cisco Duo on their most recent State of the Auth report. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_22.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1308</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8afaa2c8-785a-44a0-ba14-433b16c8d66e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9067409901.mp3?updated=1690155838" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>RATs, backdoors, and a remote code execution zero-day. Hoods breach Mitsubishi Electric. Telnet credentials dumped.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1007/notes</link>
      <description>A new RAT goes after Arabic-speaking targets. Updates on US-Iranian tension in cyberspace. An Internet Explorer bug is being exploited in the wild; a patch will arrive in February. A pseudo-vigilante seems to be preparing Citrix devices for future exploitation. Mitsubishi Electric discloses a breach. A booter service dumps half a million Telnet credentials online. And tomorrow is the last day to file a claim under the Equifax breach settlement. Joe Carrigan from JHU ISI with the story of a random encounter that set him on his professional path. Carole Theriault speaks with Jon Fielding from Apricorn on whether or not anything has really changed with GDPR, 18 months into it.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_21.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Jan 2020 19:28:54 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1007</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/68c63bb8-def8-11ea-911f-bfed0a85ef0e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A new RAT goes after Arabic-speaking targets. Updates on US-Iranian tension in cyberspace. An Internet Explorer bug is being exploited in the wild; a patch will arrive in February. A pseudo-vigilante seems to be preparing Citrix devices for future...</itunes:subtitle>
      <itunes:summary>A new RAT goes after Arabic-speaking targets. Updates on US-Iranian tension in cyberspace. An Internet Explorer bug is being exploited in the wild; a patch will arrive in February. A pseudo-vigilante seems to be preparing Citrix devices for future exploitation. Mitsubishi Electric discloses a breach. A booter service dumps half a million Telnet credentials online. And tomorrow is the last day to file a claim under the Equifax breach settlement. Joe Carrigan from JHU ISI with the story of a random encounter that set him on his professional path. Carole Theriault speaks with Jon Fielding from Apricorn on whether or not anything has really changed with GDPR, 18 months into it.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_21.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A new RAT goes after Arabic-speaking targets. Updates on US-Iranian tension in cyberspace. An Internet Explorer bug is being exploited in the wild; a patch will arrive in February. A pseudo-vigilante seems to be preparing Citrix devices for future exploitation. Mitsubishi Electric discloses a breach. A booter service dumps half a million Telnet credentials online. And tomorrow is the last day to file a claim under the Equifax breach settlement. Joe Carrigan from JHU ISI with the story of a random encounter that set him on his professional path. Carole Theriault speaks with Jon Fielding from Apricorn on whether or not anything has really changed with GDPR, 18 months into it.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_21.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1271</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6be6daff-5cf4-4dee-b991-407a0544a877]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2302173306.mp3?updated=1690155820" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Clever breaches demonstrate IoT security gaps. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/118/notes</link>
      <description>Some of our favorite and most trusted IoT devices help make us feel secure in our homes. From garage door openers to the locks on our front doors, we trust these devices to recognize and alert us when people are entering our home. It should come as no surprise that these too are subject to attack. 
Steve Povolny is head of advanced research at McAfee; we discuss a pair of research projects they recently published involving popular IoT devices. 
The research can be found here:
McAfee Advanced Threat Research demo McLear NFC Ring
McAfee Advanced Threat Research Demo Chamberlain MyQ
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Jan 2020 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>118</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/12025ba2-df13-11ea-914b-ff659d96f128/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Some of our favorite and most trusted IoT devices help make us feel secure in our homes. From garage door openers to the locks on our front doors, we trust these devices to recognize and alert us when people are entering our home. It should come as no...</itunes:subtitle>
      <itunes:summary>Some of our favorite and most trusted IoT devices help make us feel secure in our homes. From garage door openers to the locks on our front doors, we trust these devices to recognize and alert us when people are entering our home. It should come as no surprise that these too are subject to attack. 
Steve Povolny is head of advanced research at McAfee; we discuss a pair of research projects they recently published involving popular IoT devices. 
The research can be found here:
McAfee Advanced Threat Research demo McLear NFC Ring
McAfee Advanced Threat Research Demo Chamberlain MyQ
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Some of our favorite and most trusted IoT devices help make us feel secure in our homes. From garage door openers to the locks on our front doors, we trust these devices to recognize and alert us when people are entering our home. It should come as no surprise that these too are subject to attack. </p><p>Steve Povolny is head of advanced research at McAfee; we discuss a pair of research projects they recently published involving popular IoT devices. </p><p>The research can be found here:</p><p><a href="https://www.youtube.com/watch?v=nqi42aSQIKY&amp;t=7s">McAfee Advanced Threat Research demo McLear NFC Ring</a></p><p><a href="https://www.youtube.com/watch?v=6ZgK_r7g7kA">McAfee Advanced Threat Research Demo Chamberlain MyQ</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1397</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a43cd600-42ef-4bc3-9d63-38860471e676]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5946925901.mp3?updated=1685107467" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacks, and rumors of hacks. Burisma incident under investigation. SharePoint exploitation. How to spark a run on a bank. WeLinkInfo taken down. Phishbait update.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1006/notes</link>
      <description>Hacks and rumors of hacks surrounding US-Iranian tension. Ukrainian authorities are looking into the Burisma hack, and they’d like FBI assistance. The FBI quietly warns that two US cities were hacked by a foreign service. The New York Fed has thoughts on how a cyberattack could cascade into a run on banks. Arrests and a site takedown in the WeLeakInfo case. And a quick look at the chum being dangled in front of prospective phishing victims these days. Emily Wilson from Terbium Labs on synthetic identity detection. Guest is Eric Haseltine, author of The Spy in Moscow Station.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_17.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 17 Jan 2020 18:55:16 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1006</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/68e1bee2-def8-11ea-911f-6b7b0c2a0f54/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hacks and rumors of hacks surrounding US-Iranian tension. Ukrainian authorities are looking into the Burisma hack, and they’d like FBI assistance. The FBI quietly warns that two US cities were hacked by a foreign service. The New York Fed has...</itunes:subtitle>
      <itunes:summary>Hacks and rumors of hacks surrounding US-Iranian tension. Ukrainian authorities are looking into the Burisma hack, and they’d like FBI assistance. The FBI quietly warns that two US cities were hacked by a foreign service. The New York Fed has thoughts on how a cyberattack could cascade into a run on banks. Arrests and a site takedown in the WeLeakInfo case. And a quick look at the chum being dangled in front of prospective phishing victims these days. Emily Wilson from Terbium Labs on synthetic identity detection. Guest is Eric Haseltine, author of The Spy in Moscow Station.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_17.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hacks and rumors of hacks surrounding US-Iranian tension. Ukrainian authorities are looking into the Burisma hack, and they’d like FBI assistance. The FBI quietly warns that two US cities were hacked by a foreign service. The New York Fed has thoughts on how a cyberattack could cascade into a run on banks. Arrests and a site takedown in the WeLeakInfo case. And a quick look at the chum being dangled in front of prospective phishing victims these days. Emily Wilson from Terbium Labs on synthetic identity detection. Guest is Eric Haseltine, author of The Spy in Moscow Station.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_17.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1552</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a6cb8141-6f7a-4886-9ee4-27b95d692df6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9235281947.mp3?updated=1608756422" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Curveball proofs-of-concept. CISA warns chemical industry. Military families harassed online. Phishing the UN. Fleeceware in the Play Store. Moscow says there was no Burisma hack.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1005/notes</link>
      <description>Proof-of-concept exploits for the CryptoAPI vulnerability Microsoft patched this week have been released. CISA warns the chemical industry to look to its security during this period of what the agency calls “heightened geopolitical tension.” Families of deployed US soldiers receive threats via social media. Someone’s been phishing in Turtle Bay. More fleeceware turns up in the Play Store. And Moscow heaps scorn on anyone who thinks they hacked Burisma. Craig Williams from Cisco Talos on how adversaries take advantage of politics. Guest is Ron Hayman from AVANT on how companies might leverage Trusted Advisors to proactively prepare their security response.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_16.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 16 Jan 2020 20:43:38 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1005</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/68f58ad0-def8-11ea-911f-3f6a132c6b69/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Proof-of-concept exploits for the CryptoAPI vulnerability Microsoft patched this week have been released. CISA warns the chemical industry to look to its security during this period of what the agency calls “heightened geopolitical tension.”...</itunes:subtitle>
      <itunes:summary>Proof-of-concept exploits for the CryptoAPI vulnerability Microsoft patched this week have been released. CISA warns the chemical industry to look to its security during this period of what the agency calls “heightened geopolitical tension.” Families of deployed US soldiers receive threats via social media. Someone’s been phishing in Turtle Bay. More fleeceware turns up in the Play Store. And Moscow heaps scorn on anyone who thinks they hacked Burisma. Craig Williams from Cisco Talos on how adversaries take advantage of politics. Guest is Ron Hayman from AVANT on how companies might leverage Trusted Advisors to proactively prepare their security response.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_16.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Proof-of-concept exploits for the CryptoAPI vulnerability Microsoft patched this week have been released. CISA warns the chemical industry to look to its security during this period of what the agency calls “heightened geopolitical tension.” Families of deployed US soldiers receive threats via social media. Someone’s been phishing in Turtle Bay. More fleeceware turns up in the Play Store. And Moscow heaps scorn on anyone who thinks they hacked Burisma. Craig Williams from Cisco Talos on how adversaries take advantage of politics. Guest is Ron Hayman from AVANT on how companies might leverage Trusted Advisors to proactively prepare their security response.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_16.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1310</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e2a6e4ba-8d5c-4e1e-9772-88b5186bc82e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3087132407.mp3?updated=1690155784" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Disclosure, patching, and warning. Norway takes on “out-of-control” data sharing by dating  apps. Ransomware all-in on doxing. What to do about Huawei.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1004/notes</link>
      <description>NSA gives Microsoft a heads-up about a Windows vulnerability, and CISA is right behind them with instructions for Federal civilian agencies and advice for everyone else. Norway’s Consumer Council finds that dating apps are “out of control” with the way they share data. Ransomware goes all-in for doxing. The US pushes the UK on Huawei as Washington prepares further restrictions on the Chinese companies. And think twice before you book that alt-coin conference in Pyongyang. Johannes Ullrich from SANS Technology on malicious AutoCAD files. Guest is Chris Duvall from Chertoff Group with an overview of the current state of ransomware. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_15.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 15 Jan 2020 19:38:42 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1004</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/69116dcc-def8-11ea-911f-43c86d7064db/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>NSA gives Microsoft a heads-up about a Windows vulnerability, and CISA is right behind them with instructions for Federal civilian agencies and advice for everyone else. Norway’s Consumer Council finds that dating apps are “out of control” with...</itunes:subtitle>
      <itunes:summary>NSA gives Microsoft a heads-up about a Windows vulnerability, and CISA is right behind them with instructions for Federal civilian agencies and advice for everyone else. Norway’s Consumer Council finds that dating apps are “out of control” with the way they share data. Ransomware goes all-in for doxing. The US pushes the UK on Huawei as Washington prepares further restrictions on the Chinese companies. And think twice before you book that alt-coin conference in Pyongyang. Johannes Ullrich from SANS Technology on malicious AutoCAD files. Guest is Chris Duvall from Chertoff Group with an overview of the current state of ransomware. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_15.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>NSA gives Microsoft a heads-up about a Windows vulnerability, and CISA is right behind them with instructions for Federal civilian agencies and advice for everyone else. Norway’s Consumer Council finds that dating apps are “out of control” with the way they share data. Ransomware goes all-in for doxing. The US pushes the UK on Huawei as Washington prepares further restrictions on the Chinese companies. And think twice before you book that alt-coin conference in Pyongyang. Johannes Ullrich from SANS Technology on malicious AutoCAD files. Guest is Chris Duvall from Chertoff Group with an overview of the current state of ransomware. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_15.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1322</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c9a4ee22-6c0c-425e-b23f-254606978271]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5013729347.mp3?updated=1690155765" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Microsoft patches a vulnerability NSA disclosed. Fronting for APT40 in Hainan. Fancy Bear pawed at Burisma. The NSA Pensacola shooting and the debate over encryption.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1003/notes</link>
      <description>NSA discloses a vulnerability to Microsoft so it can be patched quickly. Intrusion Truth describes thirteen front companies for China’s APT40--they’re interested in offensive cyber capabilities. Area 1 reports that Russia’s GRU conducted a focused phishing campaign against Urkraine’s Burisma Group, the energy company that figured prominently in the House’s resolution to impeach US President Trump. And the US Justice Department moves for access to encrypted communications. Joe Carrigan from JHU ISI on the security issues of Android bloatware. Guest is Haiyan Song from Splunk with 2020 predictions.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_14.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Jan 2020 20:02:41 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1003</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/695465e6-def8-11ea-911f-a3702ffabeb4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>NSA discloses a vulnerability to Microsoft so it can be patched quickly. Intrusion Truth describes thirteen front companies for China’s APT40--they’re interested in offensive cyber capabilities. Area 1 reports that Russia’s GRU conducted a...</itunes:subtitle>
      <itunes:summary>NSA discloses a vulnerability to Microsoft so it can be patched quickly. Intrusion Truth describes thirteen front companies for China’s APT40--they’re interested in offensive cyber capabilities. Area 1 reports that Russia’s GRU conducted a focused phishing campaign against Urkraine’s Burisma Group, the energy company that figured prominently in the House’s resolution to impeach US President Trump. And the US Justice Department moves for access to encrypted communications. Joe Carrigan from JHU ISI on the security issues of Android bloatware. Guest is Haiyan Song from Splunk with 2020 predictions.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_14.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>NSA discloses a vulnerability to Microsoft so it can be patched quickly. Intrusion Truth describes thirteen front companies for China’s APT40--they’re interested in offensive cyber capabilities. Area 1 reports that Russia’s GRU conducted a focused phishing campaign against Urkraine’s Burisma Group, the energy company that figured prominently in the House’s resolution to impeach US President Trump. And the US Justice Department moves for access to encrypted communications. Joe Carrigan from JHU ISI on the security issues of Android bloatware. Guest is Haiyan Song from Splunk with 2020 predictions.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_14.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1354</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f7a907a4-0f8a-4396-af86-161972a8d708]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4772536164.mp3?updated=1690155749" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber tensions and cyberwar. China’s influence ops against Taiwan apparently backfire. Maze gang goes for doxing. SIM swapping. FBI promises FISA Court it will do better.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1002/notes</link>
      <description>The FBI reiterates prudent, consensus warnings about a heightened probability of cyberattacks from Iran, but so far nothing beyond credential-spraying battlespace preparation has come to notice. The US Congress mulls the definition of “act of war” in cyberspace. Taiwan’s president is re-elected amid signs that Chinese influence operations backfired on Beijing. The Maze gang doxes a victim. SIM swapping enters a new phase. And the FBI promises the FISA Court it will do better. Ben Yelin from UMD CHHS on a Washington Post story about college campuses gathering location data on their students.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_13.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 13 Jan 2020 19:03:53 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1002</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/696f4a32-def8-11ea-911f-a73edf21c9a6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The FBI reiterates prudent, consensus warnings about a heightened probability of cyberattacks from Iran, but so far nothing beyond credential-spraying battlespace preparation has come to notice. The US Congress mulls the definition of “act of war”...</itunes:subtitle>
      <itunes:summary>The FBI reiterates prudent, consensus warnings about a heightened probability of cyberattacks from Iran, but so far nothing beyond credential-spraying battlespace preparation has come to notice. The US Congress mulls the definition of “act of war” in cyberspace. Taiwan’s president is re-elected amid signs that Chinese influence operations backfired on Beijing. The Maze gang doxes a victim. SIM swapping enters a new phase. And the FBI promises the FISA Court it will do better. Ben Yelin from UMD CHHS on a Washington Post story about college campuses gathering location data on their students.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_13.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The FBI reiterates prudent, consensus warnings about a heightened probability of cyberattacks from Iran, but so far nothing beyond credential-spraying battlespace preparation has come to notice. The US Congress mulls the definition of “act of war” in cyberspace. Taiwan’s president is re-elected amid signs that Chinese influence operations backfired on Beijing. The Maze gang doxes a victim. SIM swapping enters a new phase. And the FBI promises the FISA Court it will do better. Ben Yelin from UMD CHHS on a Washington Post story about college campuses gathering location data on their students.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_13.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1229</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7ba6085d-e160-486a-81e0-b19120414586]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4451226789.mp3?updated=1690155729" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Profiling the Linken Sphere anti-detection browser. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/117/notes</link>
      <description>Multiple e-commerce and financial organizations around the world are targeted by cybercriminals attempting to bypass or disable their security mechanisms, in some cases by using tools that imitate the activities of legitimate users. Linken Sphere, an anti-detection browser, is one of the most popular tools of this kind at the moment.
Staffan Truvé is the CTO and Co-Founder of Recorded Future, he joins us to discuss their new report on the browser. 
The research can be found here:
Profiling the Linken Sphere Anti-Detection Browser
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Jan 2020 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>117</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0fea674c-df13-11ea-8fd0-b379492824ae/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Multiple e-commerce and financial organizations around the world are targeted by cybercriminals attempting to bypass or disable their security mechanisms, in some cases by using tools that imitate the activities of legitimate users. Linken Sphere, an...</itunes:subtitle>
      <itunes:summary>Multiple e-commerce and financial organizations around the world are targeted by cybercriminals attempting to bypass or disable their security mechanisms, in some cases by using tools that imitate the activities of legitimate users. Linken Sphere, an anti-detection browser, is one of the most popular tools of this kind at the moment.
Staffan Truvé is the CTO and Co-Founder of Recorded Future, he joins us to discuss their new report on the browser. 
The research can be found here:
Profiling the Linken Sphere Anti-Detection Browser
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Multiple e-commerce and financial organizations around the world are targeted by cybercriminals attempting to bypass or disable their security mechanisms, in some cases by using tools that imitate the activities of legitimate users. Linken Sphere, an anti-detection browser, is one of the most popular tools of this kind at the moment.</p><p>Staffan Truvé is the CTO and Co-Founder of Recorded Future, he joins us to discuss their new report on the browser. </p><p>The research can be found here:</p><p><a href="https://www.recordedfuture.com/linken-sphere-profile/">Profiling the Linken Sphere Anti-Detection Browser</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>817</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a26d8ee7-e5f1-4a13-99a1-84a0c32dae21]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7071212805.mp3?updated=1685107454" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Updates on US-Iranian tensions, and especially on hacktivism and possible power grid battlespace preparation. Researchers complain of preinstalled malware said to be in discount Android phones. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1001/notes</link>
      <description>Amid indications that both Iran and the US would prefer to back away from open war, concerns about Iranian power grid battlespace preparation remain high. Recent website defacements, however, increasingly look more like the work of young hacktivists than a campaign run by Tehran. Phones delivered under the FCC’s Lifeliine Assistance program may come with malware preinstalled. And we’ll take Cybersecurity for six hundred, Alex. Tom Etheridge from Crowdstrike on having a board of directors’ playbook. Guest is Curtis Simpson from Armis on CISO burnout.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_10.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 10 Jan 2020 20:01:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1001</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/698f8a7c-def8-11ea-911f-5be8b9142cc3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Amid indications that both Iran and the US would prefer to back away from open war, concerns about Iranian power grid battlespace preparation remain high. Recent website defacements, however, increasingly look more like the work of young hacktivists...</itunes:subtitle>
      <itunes:summary>Amid indications that both Iran and the US would prefer to back away from open war, concerns about Iranian power grid battlespace preparation remain high. Recent website defacements, however, increasingly look more like the work of young hacktivists than a campaign run by Tehran. Phones delivered under the FCC’s Lifeliine Assistance program may come with malware preinstalled. And we’ll take Cybersecurity for six hundred, Alex. Tom Etheridge from Crowdstrike on having a board of directors’ playbook. Guest is Curtis Simpson from Armis on CISO burnout.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_10.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Amid indications that both Iran and the US would prefer to back away from open war, concerns about Iranian power grid battlespace preparation remain high. Recent website defacements, however, increasingly look more like the work of young hacktivists than a campaign run by Tehran. Phones delivered under the FCC’s Lifeliine Assistance program may come with malware preinstalled. And we’ll take Cybersecurity for six hundred, Alex. Tom Etheridge from Crowdstrike on having a board of directors’ playbook. Guest is Curtis Simpson from Armis on CISO burnout.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_10.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1564</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aa04ff43-8b7a-403b-9240-69b230f41d2c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4975330053.mp3?updated=1608756455" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber alert remains high as the US-Iranian confrontation cools. Information ops, wipers, and energy sector targeting.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1000/notes</link>
      <description>As kinetic combat abates in Iraq, warnings of cyber threats increase. US intelligence agencies warn of heightened likelihood of Iranian cyber operations. These may be more serious than the low-grade website defacements and Twitter impersonations so far observed. One operation, “Dustman” has hit Bahrain, and it looks like an Iranian wiper. And some notes on the Lazarus Group, and a quick look at information ops across the Taiwan Strait. Emily Wilson from Terbium Labs with details from their recent report, “How Fraud Stole Christmas.” Guest is Karl Sigler from Trustwave in the risks of using Windows 7.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_09.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 09 Jan 2020 19:54:40 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>1000</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6a79f49a-def8-11ea-911f-7b9857babffc/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>As kinetic combat abates in Iraq, warnings of cyber threats increase. US intelligence agencies warn of heightened likelihood of Iranian cyber operations. These may be more serious than the low-grade website defacements and Twitter impersonations so...</itunes:subtitle>
      <itunes:summary>As kinetic combat abates in Iraq, warnings of cyber threats increase. US intelligence agencies warn of heightened likelihood of Iranian cyber operations. These may be more serious than the low-grade website defacements and Twitter impersonations so far observed. One operation, “Dustman” has hit Bahrain, and it looks like an Iranian wiper. And some notes on the Lazarus Group, and a quick look at information ops across the Taiwan Strait. Emily Wilson from Terbium Labs with details from their recent report, “How Fraud Stole Christmas.” Guest is Karl Sigler from Trustwave in the risks of using Windows 7.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_09.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>As kinetic combat abates in Iraq, warnings of cyber threats increase. US intelligence agencies warn of heightened likelihood of Iranian cyber operations. These may be more serious than the low-grade website defacements and Twitter impersonations so far observed. One operation, “Dustman” has hit Bahrain, and it looks like an Iranian wiper. And some notes on the Lazarus Group, and a quick look at information ops across the Taiwan Strait. Emily Wilson from Terbium Labs with details from their recent report, “How Fraud Stole Christmas.” Guest is Karl Sigler from Trustwave in the risks of using Windows 7.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_09.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1337</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d38cff0a-69ea-4654-b949-7260ca7b4e85]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3125492836.mp3?updated=1690155669" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No major Iranian cyberattacks against the US so far, as both sides appear interested in cooling off. The Cyber Solarium offers a preview of its coming report on US cyber strategy.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/999/notes</link>
      <description>Iran took some missile shots at two US air bases in Iraq last night, and President Trump barked back in a late morning press conference, but actually both sides seem inclined to move toward de-escalation. No major Iranian cyberattacks have developed, despite some low-grade skid vandalism of indifferently defended sites, but CISA’s warnings seem generally to be taken seriously. And the Cyber Solarium gave a preview of its recommendations for a US national cyber strategy. Caleb Barlow from CynergisTek with insights on potential cyber attacks from Iran.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_08.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 08 Jan 2020 21:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>999</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6ac0fa0c-def8-11ea-911f-e352dacdc2a7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Iran took some missile shots at two US air bases in Iraq last night, and President Trump barked back in a late morning press conference, but actually both sides seem inclined to move toward de-escalation. No major Iranian cyberattacks have developed,...</itunes:subtitle>
      <itunes:summary>Iran took some missile shots at two US air bases in Iraq last night, and President Trump barked back in a late morning press conference, but actually both sides seem inclined to move toward de-escalation. No major Iranian cyberattacks have developed, despite some low-grade skid vandalism of indifferently defended sites, but CISA’s warnings seem generally to be taken seriously. And the Cyber Solarium gave a preview of its recommendations for a US national cyber strategy. Caleb Barlow from CynergisTek with insights on potential cyber attacks from Iran.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_08.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iran took some missile shots at two US air bases in Iraq last night, and President Trump barked back in a late morning press conference, but actually both sides seem inclined to move toward de-escalation. No major Iranian cyberattacks have developed, despite some low-grade skid vandalism of indifferently defended sites, but CISA’s warnings seem generally to be taken seriously. And the Cyber Solarium gave a preview of its recommendations for a US national cyber strategy. Caleb Barlow from CynergisTek with insights on potential cyber attacks from Iran.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_08.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1351</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ab80f46e-e5d3-4ed8-801b-e29538e9b43c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2043136982.mp3?updated=1690155655" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No more Iranian cyberattacks since the minor weekend vandalism, but the US Government advises all to look to their defenses. Fancy Bear is the usual suspect in Austria. A guilty plea by an insider threat.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/998/notes</link>
      <description>The kittens haven’t scratched much so far, but the US Government and others are warning organizations to be alert to the likelihood of Iranian cyberattacks in retaliation for the combat death, by US missile, of Quds Force commander Soleimani. Fancy Bear is the usual suspect in the case of the Austrian Foreign Ministry hack. Patch your Pulse Secure VPN servers if you’ve got ‘em. ToTok is back in the Play Store. And there’s an executive who turned out to be an insider threat. Robert M. Lee from Dragos with a look back at 2019 ICS security issues. Guest is Tom Tovar from AppDome on mobile API security. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_08.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Jan 2020 18:54:47 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>998</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6afdf92a-def8-11ea-911f-cf32a5fb9c2d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The kittens haven’t scratched much so far, but the US Government and others are warning organizations to be alert to the likelihood of Iranian cyberattacks in retaliation for the combat death, by US missile, of Quds Force commander Soleimani. Fancy...</itunes:subtitle>
      <itunes:summary>The kittens haven’t scratched much so far, but the US Government and others are warning organizations to be alert to the likelihood of Iranian cyberattacks in retaliation for the combat death, by US missile, of Quds Force commander Soleimani. Fancy Bear is the usual suspect in the case of the Austrian Foreign Ministry hack. Patch your Pulse Secure VPN servers if you’ve got ‘em. ToTok is back in the Play Store. And there’s an executive who turned out to be an insider threat. Robert M. Lee from Dragos with a look back at 2019 ICS security issues. Guest is Tom Tovar from AppDome on mobile API security. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_08.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The kittens haven’t scratched much so far, but the US Government and others are warning organizations to be alert to the likelihood of Iranian cyberattacks in retaliation for the combat death, by US missile, of Quds Force commander Soleimani. Fancy Bear is the usual suspect in the case of the Austrian Foreign Ministry hack. Patch your Pulse Secure VPN servers if you’ve got ‘em. ToTok is back in the Play Store. And there’s an executive who turned out to be an insider threat. Robert M. Lee from Dragos with a look back at 2019 ICS security issues. Guest is Tom Tovar from AppDome on mobile API security. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_08.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1350</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[45822163-5741-4898-bf74-3a627cacb936]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8133613579.mp3?updated=1690155636" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sequelae of the US Reaper strike against the Quds Force commander. Warnings of Iranian retaliation, with an emphasis on cyberspace. Espionage in Austria, and a second look at an LSE outage. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/997/notes</link>
      <description>Iran vows retribution for the US drone strike that killed the commander of the Quds Force. The US prepares for Iranian action, and the Department of Homeland Security warns that cyberattacks are particularly likely. Some low-grade Iranian cyber operations may have already taken place. Austria’s Foreign Ministry sustains an apparent state-directed cyber espionage attack, and in the UK authorities are taking a second look at the August outages at the London Stock Exchange. Joe Carrigan from JHU ISI, describing a clever defense against laptop theft. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_06.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 06 Jan 2020 20:25:04 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>997</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6b19b534-def8-11ea-911f-2bece31b1035/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Iran vows retribution for the US drone strike that killed the commander of the Quds Force. The US prepares for Iranian action, and the Department of Homeland Security warns that cyberattacks are particularly likely. Some low-grade Iranian cyber...</itunes:subtitle>
      <itunes:summary>Iran vows retribution for the US drone strike that killed the commander of the Quds Force. The US prepares for Iranian action, and the Department of Homeland Security warns that cyberattacks are particularly likely. Some low-grade Iranian cyber operations may have already taken place. Austria’s Foreign Ministry sustains an apparent state-directed cyber espionage attack, and in the UK authorities are taking a second look at the August outages at the London Stock Exchange. Joe Carrigan from JHU ISI, describing a clever defense against laptop theft. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_06.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iran vows retribution for the US drone strike that killed the commander of the Quds Force. The US prepares for Iranian action, and the Department of Homeland Security warns that cyberattacks are particularly likely. Some low-grade Iranian cyber operations may have already taken place. Austria’s Foreign Ministry sustains an apparent state-directed cyber espionage attack, and in the UK authorities are taking a second look at the August outages at the London Stock Exchange. Joe Carrigan from JHU ISI, describing a clever defense against laptop theft. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_06.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1077</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[adb9b3ab-58e0-4fa3-85eb-e3f8546dfab0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2042751127.mp3?updated=1690155612" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Escalation in the Gulf as a US air strike kills Iran’s Quds commander. Travelex and RavnAir continue their recovery from cyberattacks. Taiwan’s memes against misinformation.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/996/notes</link>
      <description>The US and Iran trade fire in Iraq, and a leading Iranian general is killed in a US airstrike. A corresponding escalation of cyber operations can be expected. Currency exchange Travelex continues to operate manually as it works to recover from what it calls “a software virus.” There’s speculation that the RavnAir incident may have been a ransomware attack. And Taiwan adopts an active policy against Chinese attempts to influence its elections. Johannes Ullrich from the SANS Technology Center on vulnerabilities in Citrix NetScaler installations. Guest is Derek Manky from Fortinet on what to expect in AI for 2020. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_03.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 03 Jan 2020 19:19:17 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>996</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6b57fed4-def8-11ea-911f-4b3cd98dee97/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The US and Iran trade fire in Iraq, and a leading Iranian general is killed in a US airstrike. A corresponding escalation of cyber operations can be expected. Currency exchange Travelex continues to operate manually as it works to recover from what it...</itunes:subtitle>
      <itunes:summary>The US and Iran trade fire in Iraq, and a leading Iranian general is killed in a US airstrike. A corresponding escalation of cyber operations can be expected. Currency exchange Travelex continues to operate manually as it works to recover from what it calls “a software virus.” There’s speculation that the RavnAir incident may have been a ransomware attack. And Taiwan adopts an active policy against Chinese attempts to influence its elections. Johannes Ullrich from the SANS Technology Center on vulnerabilities in Citrix NetScaler installations. Guest is Derek Manky from Fortinet on what to expect in AI for 2020. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_03.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US and Iran trade fire in Iraq, and a leading Iranian general is killed in a US airstrike. A corresponding escalation of cyber operations can be expected. Currency exchange Travelex continues to operate manually as it works to recover from what it calls “a software virus.” There’s speculation that the RavnAir incident may have been a ransomware attack. And Taiwan adopts an active policy against Chinese attempts to influence its elections. Johannes Ullrich from the SANS Technology Center on vulnerabilities in Citrix NetScaler installations. Guest is Derek Manky from Fortinet on what to expect in AI for 2020. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_03.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1449</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8d2d1c4e-84f8-4819-8be4-5f7b4a4aaf23]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2291527892.mp3?updated=1690155599" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A Jira vulnerability that’s leaking data in the public cloud. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/116/notes</link>
      <description>Unit 42 (the Palo Alto Networks threat intelligence team) released new research on a Jira vulnerability that’s leaking data of technology, industrial and media organizations in the public cloud. The vulnerability (a Server Side Request Forgery -- SSRF) is the same type that led to the Capital One data breach in July 2019.
Jen Miller-Osborn is the Deputy Director of Threat Intelligence for Unit 42 at Palo Alto Networks, and she joins us to share their findings.
The research can be found here:
https://unit42.paloaltonetworks.com/server-side-request-forgery-exposes-data-of-technology-industrial-and-media-organizations/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 02 Jan 2020 23:35:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>116</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0c66a734-df13-11ea-ac0c-0728b370154f/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Unit 42 (the Palo Alto Networks threat intelligence team) released new research on a Jira vulnerability that’s leaking data of technology, industrial and media organizations in the public cloud. The vulnerability (a Server Side Request Forgery --...</itunes:subtitle>
      <itunes:summary>Unit 42 (the Palo Alto Networks threat intelligence team) released new research on a Jira vulnerability that’s leaking data of technology, industrial and media organizations in the public cloud. The vulnerability (a Server Side Request Forgery -- SSRF) is the same type that led to the Capital One data breach in July 2019.
Jen Miller-Osborn is the Deputy Director of Threat Intelligence for Unit 42 at Palo Alto Networks, and she joins us to share their findings.
The research can be found here:
https://unit42.paloaltonetworks.com/server-side-request-forgery-exposes-data-of-technology-industrial-and-media-organizations/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Unit 42 (the Palo Alto Networks threat intelligence team) released new research on a Jira vulnerability that’s leaking data of technology, industrial and media organizations in the public cloud. The vulnerability (a Server Side Request Forgery -- SSRF) is the same type that led to the Capital One data breach in July 2019.</p><p>Jen Miller-Osborn is the Deputy Director of Threat Intelligence for Unit 42 at Palo Alto Networks, and she joins us to share their findings.</p><p>The research can be found here:</p><p><a href="https://www.google.com/url?q=https://unit42.paloaltonetworks.com/server-side-request-forgery-exposes-data-of-technology-industrial-and-media-organizations/&amp;sa=D&amp;ust=1575757565425000&amp;usg=AOvVaw21WsE6SV66zfD7XE67vGv1">https://unit42.paloaltonetworks.com/server-side-request-forgery-exposes-data-of-technology-industrial-and-media-organizations/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>965</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a522684b-f14b-44de-8b00-397780ed113b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5446752056.mp3?updated=1685107447" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Taking down Thallium. Cloud Hopper: bigger (and worse) than thought. US tightens screws on the supply chain. The bite of winter and the scent of plums.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/995/notes</link>
      <description>Microsoft takes down bogus domains operated by North Korea’s Thallium Advanced Persistent Threat. The Cloud Hoppercyber espionage campaign turns out to have been far more extensive than hitherto believed. The US wants Huawei (and ZTE) out of contractor supply chains this year. India will test equipment before allowing it into its 5G networks. And the California Consumer Privacy Act is now in effect. Joe Carrigan from JHU ISI with the story of a financial advisor who payed the price for falling for a phishing scheme. Guest is Dave Burg from EY on the global perspective of cyber security risk.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_02.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 02 Jan 2020 19:45:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>5</itunes:season>
      <itunes:episode>995</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6b6dbd78-def8-11ea-911f-d70a95ffb115/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Microsoft takes down bogus domains operated by North Korea’s Thallium Advanced Persistent Threat. The Cloud Hoppercyber espionage campaign turns out to have been far more extensive than hitherto believed. The US wants Huawei (and ZTE) out of...</itunes:subtitle>
      <itunes:summary>Microsoft takes down bogus domains operated by North Korea’s Thallium Advanced Persistent Threat. The Cloud Hoppercyber espionage campaign turns out to have been far more extensive than hitherto believed. The US wants Huawei (and ZTE) out of contractor supply chains this year. India will test equipment before allowing it into its 5G networks. And the California Consumer Privacy Act is now in effect. Joe Carrigan from JHU ISI with the story of a financial advisor who payed the price for falling for a phishing scheme. Guest is Dave Burg from EY on the global perspective of cyber security risk.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_02.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Microsoft takes down bogus domains operated by North Korea’s Thallium Advanced Persistent Threat. The Cloud Hoppercyber espionage campaign turns out to have been far more extensive than hitherto believed. The US wants Huawei (and ZTE) out of contractor supply chains this year. India will test equipment before allowing it into its 5G networks. And the California Consumer Privacy Act is now in effect. Joe Carrigan from JHU ISI with the story of a financial advisor who payed the price for falling for a phishing scheme. Guest is Dave Burg from EY on the global perspective of cyber security risk.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2020/January/CyberWire_2020_01_02.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1293</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[461da5c1-4497-4892-b88b-d0e12b493d4f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1370095128.mp3?updated=1690155578" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ron Gula and Mike Janke - VC pitfalls and how to avoid them. [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/35/notes</link>
      <description>In this CyberWire special edition, advice from a pair of seasoned cyber security investors. Ron Gula caught our eye with an article he recently penned titled "Cyber entrepreneur pitfalls you can avoid." In it, he gathers a group of tech investors to get their takes on the dos and don'ts of pitching to venture capitalists. Ron runs Gula Tech Adventures along with his wife Cindi, where they aim to support the next generation of cyber technology strategy and policy. DataTribe's Mike Janke joins the conversation with his experiences guiding hopeful young entrepreneurs through the pitch process.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 30 Dec 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>35</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/1365f156-df05-11ea-8799-5f203dff4e0e/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In this CyberWire special edition, advice from a pair of seasoned cyber security investors. Ron Gula caught our eye with an article he recently penned titled "Cyber entrepreneur pitfalls you can avoid." In it, he gathers a group of tech investors to...</itunes:subtitle>
      <itunes:summary>In this CyberWire special edition, advice from a pair of seasoned cyber security investors. Ron Gula caught our eye with an article he recently penned titled "Cyber entrepreneur pitfalls you can avoid." In it, he gathers a group of tech investors to get their takes on the dos and don'ts of pitching to venture capitalists. Ron runs Gula Tech Adventures along with his wife Cindi, where they aim to support the next generation of cyber technology strategy and policy. DataTribe's Mike Janke joins the conversation with his experiences guiding hopeful young entrepreneurs through the pitch process.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this CyberWire special edition, advice from a pair of seasoned cyber security investors. Ron Gula caught our eye with an article he recently penned titled "Cyber entrepreneur pitfalls you can avoid." In it, he gathers a group of tech investors to get their takes on the dos and don'ts of pitching to venture capitalists. Ron runs Gula Tech Adventures along with his wife Cindi, where they aim to support the next generation of cyber technology strategy and policy. DataTribe's Mike Janke joins the conversation with his experiences guiding hopeful young entrepreneurs through the pitch process.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1868</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[25a06971-3f55-48e7-b8c7-4dbf785c2f36]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5291192971.mp3?updated=1662646437" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Inside Magecart and Genesis. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/115/notes</link>
      <description>Dan Woods is VP of the intelligence center and Shape Security. He shares insights on two noteworthy attacks tools, Genesis and Magecart. Before joining Shape Security Dan served as assistant chief agent of special investigations at the Arizona attorney general's office, where he investigated complex fraud. Prior to that, he spent 20 years with federal law enforcement agencies and intelligence organizations, including the CIA and FBI, where he specialized in information operations and cybercrime.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Dec 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>115</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0995e9a2-df13-11ea-866e-2b1d40b47e25/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dan Woods is VP of the intelligence center and Shape Security. He shares insights on two noteworthy attacks tools, Genesis and Magecart. Before joining Shape Security Dan served as assistant chief agent of special investigations at the Arizona...</itunes:subtitle>
      <itunes:summary>Dan Woods is VP of the intelligence center and Shape Security. He shares insights on two noteworthy attacks tools, Genesis and Magecart. Before joining Shape Security Dan served as assistant chief agent of special investigations at the Arizona attorney general's office, where he investigated complex fraud. Prior to that, he spent 20 years with federal law enforcement agencies and intelligence organizations, including the CIA and FBI, where he specialized in information operations and cybercrime.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dan Woods is VP of the intelligence center and Shape Security. He shares insights on two noteworthy attacks tools, Genesis and Magecart. Before joining Shape Security Dan served as assistant chief agent of special investigations at the Arizona attorney general's office, where he investigated complex fraud. Prior to that, he spent 20 years with federal law enforcement agencies and intelligence organizations, including the CIA and FBI, where he specialized in information operations and cybercrime.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1218</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ba9354a6-f0e2-40c7-9e4c-c305693311f0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5958126316.mp3?updated=1685107441" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pegasus and Pakistan. What’s in Legion Loader. Threats to financial markets. Seasonal scams. What would Clippy do?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/994/notes</link>
      <description>Pegasus may have appeared in Pakistan. Legion Loader packs in six bits of malware in one Hornets’ Nest campaign. Someone may have hacked Bank of England press releases to give them a few seconds’ advantage in high-speed trading. Frakfurt, in the German Land of Hessen, is clearing its networks of an Emotet infection. Some seasonal, topical scams are circulating. And what would Clippy do? Craig Williams from Cisco Talos with a look back at 2019's most serious vulnerabilities. Guest is Bob Ackerman from Allegis Capital with insights on the cyber security VC environment.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_20.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 20 Dec 2019 20:45:05 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>994</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6ba1c49c-def8-11ea-911f-bf2bd9d72ff9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Pegasus may have appeared in Pakistan. Legion Loader packs in six bits of malware in one Hornets’ Nest campaign. Someone may have hacked Bank of England press releases to give them a few seconds’ advantage in high-speed trading. Frakfurt, in the...</itunes:subtitle>
      <itunes:summary>Pegasus may have appeared in Pakistan. Legion Loader packs in six bits of malware in one Hornets’ Nest campaign. Someone may have hacked Bank of England press releases to give them a few seconds’ advantage in high-speed trading. Frakfurt, in the German Land of Hessen, is clearing its networks of an Emotet infection. Some seasonal, topical scams are circulating. And what would Clippy do? Craig Williams from Cisco Talos with a look back at 2019's most serious vulnerabilities. Guest is Bob Ackerman from Allegis Capital with insights on the cyber security VC environment.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_20.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Pegasus may have appeared in Pakistan. Legion Loader packs in six bits of malware in one Hornets’ Nest campaign. Someone may have hacked Bank of England press releases to give them a few seconds’ advantage in high-speed trading. Frakfurt, in the German Land of Hessen, is clearing its networks of an Emotet infection. Some seasonal, topical scams are circulating. And what would Clippy do? Craig Williams from Cisco Talos with a look back at 2019's most serious vulnerabilities. Guest is Bob Ackerman from Allegis Capital with insights on the cyber security VC environment.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_20.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1299</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[47864af7-562d-43f7-a176-197a23569f68]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6899482325.mp3?updated=1608756317" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>TV program swap-out. Cyber espionage out of Beijing. US Congress in a mood to sanction. Emotet phishing spoofs Germany’s BSI. A Dark Overlord pleads not guilty.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/993/notes</link>
      <description>Spanish TV is temporarily replaced by Russian programming. APT20, Violin Panda, is back, and playing a familiar tune. Rancor against Cambodia. The US Congress gets frosty with China and Russia. How Zeppelin ransomware spreads. Due diligence in M&amp;A. Germany’s BSI warns of an Emotet campaign. A suspect in the Dark Overlord case is arraigned in St. Louis. The FBI collars a guy who ratted himself out over social media. David Dufour from Webroot with a review of their 2019 mid-year threat report. Guest is James Ritchey from GitLab with lessons learned on the one-year anniversary of their bug bounty program.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_19.html 
 Support our show
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 19 Dec 2019 18:42:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>993</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6bb585e0-def8-11ea-911f-971ad8d472f0/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Spanish TV is temporarily replaced by Russian programming. APT20, Violin Panda, is back, and playing a familiar tune. Rancor against Cambodia. The US Congress gets frosty with China and Russia. How Zeppelin ransomware spreads. Due diligence in...</itunes:subtitle>
      <itunes:summary>Spanish TV is temporarily replaced by Russian programming. APT20, Violin Panda, is back, and playing a familiar tune. Rancor against Cambodia. The US Congress gets frosty with China and Russia. How Zeppelin ransomware spreads. Due diligence in M&amp;A. Germany’s BSI warns of an Emotet campaign. A suspect in the Dark Overlord case is arraigned in St. Louis. The FBI collars a guy who ratted himself out over social media. David Dufour from Webroot with a review of their 2019 mid-year threat report. Guest is James Ritchey from GitLab with lessons learned on the one-year anniversary of their bug bounty program.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_19.html 
 Support our show
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Spanish TV is temporarily replaced by Russian programming. APT20, Violin Panda, is back, and playing a familiar tune. Rancor against Cambodia. The US Congress gets frosty with China and Russia. How Zeppelin ransomware spreads. Due diligence in M&amp;A. Germany’s BSI warns of an Emotet campaign. A suspect in the Dark Overlord case is arraigned in St. Louis. The FBI collars a guy who ratted himself out over social media. David Dufour from Webroot with a review of their 2019 mid-year threat report. Guest is James Ritchey from GitLab with lessons learned on the one-year anniversary of their bug bounty program.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_19.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p> <p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1321</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[39e51ed6-3a9d-4407-9070-dff7ccaa8b12]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6070200262.mp3?updated=1690155545" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Steal first, encrypt later. Cobots at risk? Gangnam Industrial Style looks for industrial info. Rancor update. FISC takes FBI to the woodshed. Vlad the Updater.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/992/notes</link>
      <description>More ransomware steals first, encrypts later. Are cobots vulnerable to novel forms of ransomware? Gangnam Industrial Style--the espionage campaign, not the K-pop dance number. Rancor is a persistent, well-resourced, and creative APT, but without much success to its credit. The Foreign Intelligence Surveillance Court takes the FBI to the woodshed. And, hey, maybe he’s really Vlad the Updater? Tom Etheridge from CrowdStrike on incident response speed and the 1-10-60 concept. Guest is Eli Sugarman from the Hewlett Foundation with the results of their CyberVisuals contest. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_18.html 
 Support our show
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 18 Dec 2019 20:30:12 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>992</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6bce638a-def8-11ea-911f-933e884923c7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>More ransomware steals first, encrypts later. Are cobots vulnerable to novel forms of ransomware? Gangnam Industrial Style--the espionage campaign, not the K-pop dance number. Rancor is a persistent, well-resourced, and creative APT, but without much...</itunes:subtitle>
      <itunes:summary>More ransomware steals first, encrypts later. Are cobots vulnerable to novel forms of ransomware? Gangnam Industrial Style--the espionage campaign, not the K-pop dance number. Rancor is a persistent, well-resourced, and creative APT, but without much success to its credit. The Foreign Intelligence Surveillance Court takes the FBI to the woodshed. And, hey, maybe he’s really Vlad the Updater? Tom Etheridge from CrowdStrike on incident response speed and the 1-10-60 concept. Guest is Eli Sugarman from the Hewlett Foundation with the results of their CyberVisuals contest. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_18.html 
 Support our show
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>More ransomware steals first, encrypts later. Are cobots vulnerable to novel forms of ransomware? Gangnam Industrial Style--the espionage campaign, not the K-pop dance number. Rancor is a persistent, well-resourced, and creative APT, but without much success to its credit. The Foreign Intelligence Surveillance Court takes the FBI to the woodshed. And, hey, maybe he’s really Vlad the Updater? Tom Etheridge from CrowdStrike on incident response speed and the 1-10-60 concept. Guest is Eli Sugarman from the Hewlett Foundation with the results of their CyberVisuals contest. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_18.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p> <p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1326</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[642b18bf-3392-4316-ab22-9e7800e7c487]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5176727615.mp3?updated=1690155533" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware updates. Lazarus Group’s new Trojan. IoT insecurity. Exploiting older versions of WhatsApp. Mr. Assange’s extradition. Door kick in IP beef. Someone naughty’s still running XP.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/991/notes</link>
      <description>Updates on the ransomware attacks in Florida and Louisiana. North Korea’s Lazarus Group adopts a new Trojan as it shows signs of pivoting into the Linux ecosystem. Insufficient entropy in IoT key generation. Older versions of WhatsApp are vulnerable to exploitation. The state of Julian Assange’s extradition to the US. Hey--this is Moscow! Where’d you think you were, Iowa? And guess who’s still running Windows XP? Ben Yelin from UMD CHHS on Google location data being used to find a bank robber. Guest is Michael Chertoff from the Chertoff group on the 5G transition.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_17.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Dec 2019 19:59:01 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>991</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6be5fb6c-def8-11ea-911f-53c57d1293d2/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ransomware updates. Lazarus Group’s new Trojan. IoT insecurity. Exploiting older versions of WhatsApp. Mr. Assange’s extradition. Door kick in IP beef. Someone naughty’s still running XP.</itunes:subtitle>
      <itunes:summary>Updates on the ransomware attacks in Florida and Louisiana. North Korea’s Lazarus Group adopts a new Trojan as it shows signs of pivoting into the Linux ecosystem. Insufficient entropy in IoT key generation. Older versions of WhatsApp are vulnerable to exploitation. The state of Julian Assange’s extradition to the US. Hey--this is Moscow! Where’d you think you were, Iowa? And guess who’s still running Windows XP? Ben Yelin from UMD CHHS on Google location data being used to find a bank robber. Guest is Michael Chertoff from the Chertoff group on the 5G transition.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_17.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Updates on the ransomware attacks in Florida and Louisiana. North Korea’s Lazarus Group adopts a new Trojan as it shows signs of pivoting into the Linux ecosystem. Insufficient entropy in IoT key generation. Older versions of WhatsApp are vulnerable to exploitation. The state of Julian Assange’s extradition to the US. Hey--this is Moscow! Where’d you think you were, Iowa? And guess who’s still running Windows XP? Ben Yelin from UMD CHHS on Google location data being used to find a bank robber. Guest is Michael Chertoff from the Chertoff group on the 5G transition.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_17.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1395</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4a5fd949-6e06-4f48-b5dd-51f89ee6d852]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4655954497.mp3?updated=1690155519" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Iran says it stopped a cyber espionage campaign by China’s APT27. India closes the Internet in two states. Ransomware in Louisiana and New Jersey. National Security Letters.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/990/notes</link>
      <description>Iran says it’s foiled a cyber espionage campaign mounted by APT27, a Chinese threat group. The Indian government responds to protests over a citizenship law in two states by sending in troops and cutting off the Internet in those states. The City of New Orleans sustains what appears to be a ransomware attack. So does a New Jersey healthcare network. And three Senators would like credit bureaus to tell them what the FBI is asking for. Joe Carrigan from JHU ISI on Twitter’s proposal to shift to open standards. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_16.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 16 Dec 2019 20:17:08 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>990</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6bfa0d0a-def8-11ea-911f-bb0ac3903a5e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Iran says it stopped a cyber espionage campaign by China’s APT27. India closes the Internet in two states. Ransomware in Louisiana and New Jersey. National Security Letters.</itunes:subtitle>
      <itunes:summary>Iran says it’s foiled a cyber espionage campaign mounted by APT27, a Chinese threat group. The Indian government responds to protests over a citizenship law in two states by sending in troops and cutting off the Internet in those states. The City of New Orleans sustains what appears to be a ransomware attack. So does a New Jersey healthcare network. And three Senators would like credit bureaus to tell them what the FBI is asking for. Joe Carrigan from JHU ISI on Twitter’s proposal to shift to open standards. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_16.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iran says it’s foiled a cyber espionage campaign mounted by APT27, a Chinese threat group. The Indian government responds to protests over a citizenship law in two states by sending in troops and cutting off the Internet in those states. The City of New Orleans sustains what appears to be a ransomware attack. So does a New Jersey healthcare network. And three Senators would like credit bureaus to tell them what the FBI is asking for. Joe Carrigan from JHU ISI on Twitter’s proposal to shift to open standards. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_16.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1117</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[50c06d69-32cd-40e1-83bd-cdd4920c73c3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6251023008.mp3?updated=1690155495" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Capturing the flag at NXTWORK 2019 [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/34/notes</link>
      <description>Capture the Flag competitions are an increasingly popular and valuable way for both cyber security students and seasoned professionals to test their skills, stay sharp and maybe even put a bit swagger on display. We set out to capture the excitement of a capture the flag event. As luck would have it, our sponsors at Juniper Networks were hosting a capture the flag hackathon at their annual NXTWork conference in Las Vegas, and they invited our CyberWire team to join them to experience it for ourselves.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 15 Dec 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>34</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/1216505c-df05-11ea-8956-1f39bea74193/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Capturing the flag at NXTWORK 2019 [Special Editions]</itunes:subtitle>
      <itunes:summary>Capture the Flag competitions are an increasingly popular and valuable way for both cyber security students and seasoned professionals to test their skills, stay sharp and maybe even put a bit swagger on display. We set out to capture the excitement of a capture the flag event. As luck would have it, our sponsors at Juniper Networks were hosting a capture the flag hackathon at their annual NXTWork conference in Las Vegas, and they invited our CyberWire team to join them to experience it for ourselves.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Capture the Flag competitions are an increasingly popular and valuable way for both cyber security students and seasoned professionals to test their skills, stay sharp and maybe even put a bit swagger on display. We set out to capture the excitement of a capture the flag event. As luck would have it, our sponsors at Juniper Networks were hosting a capture the flag hackathon at their annual NXTWork conference in Las Vegas, and they invited our CyberWire team to join them to experience it for ourselves.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1987</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3dbbb914-cef2-4caa-a4fb-dc40f5d9415f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9996819284.mp3?updated=1663085968" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>WAV files carry malicious data payloads. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/114/notes</link>
      <description>Researchers at BlackBerry Cylance have been tracking ordinary WAV audio files being used to carry hidden malicious data used by threat actors. 
Eric Milam is VP of threat research and intelligence at BlackBerry Cylance, and he joins us to share their findings.
The research can be found here:
 https://threatvector.cylance.com/en_us/home/malicious-payloads-hiding-beneath-the-wav.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Dec 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>114</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/035bc246-df13-11ea-bcec-4b8d1dd05e8d/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>WAV files carry malicious data payloads. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at BlackBerry Cylance have been tracking ordinary WAV audio files being used to carry hidden malicious data used by threat actors. 
Eric Milam is VP of threat research and intelligence at BlackBerry Cylance, and he joins us to share their findings.
The research can be found here:
 https://threatvector.cylance.com/en_us/home/malicious-payloads-hiding-beneath-the-wav.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at BlackBerry Cylance have been tracking ordinary WAV audio files being used to carry hidden malicious data used by threat actors. </p><p>Eric Milam is VP of threat research and intelligence at BlackBerry Cylance, and he joins us to share their findings.</p><p>The research can be found here:</p><p><a href="https://threatvector.cylance.com/en_us/home/malicious-payloads-hiding-beneath-the-wav.html"> https://threatvector.cylance.com/en_us/home/malicious-payloads-hiding-beneath-the-wav.html</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1169</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5bd2ce28-3081-4ace-a5a0-1ec703273a60]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6545859685.mp3?updated=1685107432" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing for credentials. Compromised Telegram accounts. Lateral movement. Crypto Wars updates. Data retention compliance. Iago did it for the lulz.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/989/notes</link>
      <description>Parties unknown are phishing for government credentials in at least eight countries. Some other parties unknown are compromising Telegram accounts in Russia. Lateral movement is in the news, but not the good, Lamar Jackson kind. A familiar order of battle in the Crypto Wars emerges, again. NSA’s IG reports on SIGINT data retention. And a peek into what we suppose we must call the minds of some of the people hacking Ring systems. Daniel Prince from Lancaster University on Cyber security testbeds for IoT research. Guest is David Belson with Internet Society on Russian “Sovereign Internet” Law.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_13.html 
 Support our show
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 13 Dec 2019 21:19:09 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>989</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6c0d8bbe-def8-11ea-911f-f72f70373f17/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Phishing for credentials. Compromised Telegram accounts. Lateral movement. Crypto Wars updates. Data retention compliance. Iago did it for the lulz.</itunes:subtitle>
      <itunes:summary>Parties unknown are phishing for government credentials in at least eight countries. Some other parties unknown are compromising Telegram accounts in Russia. Lateral movement is in the news, but not the good, Lamar Jackson kind. A familiar order of battle in the Crypto Wars emerges, again. NSA’s IG reports on SIGINT data retention. And a peek into what we suppose we must call the minds of some of the people hacking Ring systems. Daniel Prince from Lancaster University on Cyber security testbeds for IoT research. Guest is David Belson with Internet Society on Russian “Sovereign Internet” Law.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_13.html 
 Support our show
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Parties unknown are phishing for government credentials in at least eight countries. Some other parties unknown are compromising Telegram accounts in Russia. Lateral movement is in the news, but not the good, Lamar Jackson kind. A familiar order of battle in the Crypto Wars emerges, again. NSA’s IG reports on SIGINT data retention. And a peek into what we suppose we must call the minds of some of the people hacking Ring systems. Daniel Prince from Lancaster University on Cyber security testbeds for IoT research. Guest is David Belson with Internet Society on Russian “Sovereign Internet” Law.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_13.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p> <p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1399</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[07af8973-6128-4c33-bffe-6b0107d77b4f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9553032308.mp3?updated=1608756324" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>False flags and attack kit hijacking. Maze ransomware in Pensacola. China’s own OS. Crypto Wars update. TrickBot phishing. And Krampus spoils Christmas.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/988/notes</link>
      <description>Flying false flags, and borrowing someone else’s attack tools as the mast you use to run them up. The Pensacola cyber attack has been identified as involving Maze ransomware. China moves toward building its own autarkic operating system. US Senate Judiciary Committee hearings take an anti-encryption turn. TrickBot is phishing with payroll phishbait. And Krampus malware is punishing iPhone users as they shop during the holidays. Tom Etheridge VP of services from CrowdStrike, introducing himself. Guest is Dean Sysman from Axonius on S3 security flaws.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_12.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 12 Dec 2019 20:14:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>988</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6c316b74-def8-11ea-911f-0f564db519e1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>False flags and attack kit hijacking. Maze ransomware in Pensacola. China’s own OS. Crypto Wars update. TrickBot phishing. And Krampus spoils Christmas.</itunes:subtitle>
      <itunes:summary>Flying false flags, and borrowing someone else’s attack tools as the mast you use to run them up. The Pensacola cyber attack has been identified as involving Maze ransomware. China moves toward building its own autarkic operating system. US Senate Judiciary Committee hearings take an anti-encryption turn. TrickBot is phishing with payroll phishbait. And Krampus malware is punishing iPhone users as they shop during the holidays. Tom Etheridge VP of services from CrowdStrike, introducing himself. Guest is Dean Sysman from Axonius on S3 security flaws.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_12.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Flying false flags, and borrowing someone else’s attack tools as the mast you use to run them up. The Pensacola cyber attack has been identified as involving Maze ransomware. China moves toward building its own autarkic operating system. US Senate Judiciary Committee hearings take an anti-encryption turn. TrickBot is phishing with payroll phishbait. And Krampus malware is punishing iPhone users as they shop during the holidays. Tom Etheridge VP of services from CrowdStrike, introducing himself. Guest is Dean Sysman from Axonius on S3 security flaws.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_12.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1263</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a2878f9d-fab0-46c9-81ad-5779de896c5b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7337831370.mp3?updated=1690155300" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacking in Iran? The Lazarus Group hires Trickbot. Election influence ops. Cryptowars updata. Ransomware in municipal and tribal governments.  Patch Tuesday notes. Do it for State.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/987/notes</link>
      <description>Iran says it’s stopped a cyber attack, and that an insider was responsible for a major paycard exposure. Trickbot is now working for the Lazarus Group. Influence operations both foreign and domestic concern British voters on the eve of the general election. The cryptowars are heating up again as the US Senate opens hearings on encryption. Pensacola’s cyberattack was ransomware, and so too apparently was the one that hit the Cherokee Nation. And do it for state. Emily Wilson from Terbium Labs with warnings about connected gifts for children. Guest is Kevin Lancaster from ID Agent on monitoring people affected by the OPM breach. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_11.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 11 Dec 2019 20:33:20 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>987</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6c52c6fc-def8-11ea-911f-c3602ab6de10/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hacking in Iran? The Lazarus Group hires Trickbot. Election influence ops. Cryptowars updata. Ransomware in municipal and tribal governments.  Patch Tuesday notes. Do it for State.</itunes:subtitle>
      <itunes:summary>Iran says it’s stopped a cyber attack, and that an insider was responsible for a major paycard exposure. Trickbot is now working for the Lazarus Group. Influence operations both foreign and domestic concern British voters on the eve of the general election. The cryptowars are heating up again as the US Senate opens hearings on encryption. Pensacola’s cyberattack was ransomware, and so too apparently was the one that hit the Cherokee Nation. And do it for state. Emily Wilson from Terbium Labs with warnings about connected gifts for children. Guest is Kevin Lancaster from ID Agent on monitoring people affected by the OPM breach. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_11.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iran says it’s stopped a cyber attack, and that an insider was responsible for a major paycard exposure. Trickbot is now working for the Lazarus Group. Influence operations both foreign and domestic concern British voters on the eve of the general election. The cryptowars are heating up again as the US Senate opens hearings on encryption. Pensacola’s cyberattack was ransomware, and so too apparently was the one that hit the Cherokee Nation. And do it for state. Emily Wilson from Terbium Labs with warnings about connected gifts for children. Guest is Kevin Lancaster from ID Agent on monitoring people affected by the OPM breach. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_11.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1356</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[efa98f28-4d59-46bd-a5f2-9213067a1285]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2799001107.mp3?updated=1690155281" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pensacola under cyberattack. Notes on ransomware. The US Justice Department IG report on Crossfire Hurricane. Who let the bots out?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/986/notes</link>
      <description>The city of Pensacola is hit hard by an unspecified cyberattack. Ryuk ransomware decryptors may cause data loss. A new variant of Snatch ransomware evades anti-virus protection. The US Justice Department’s Inspector General has reported on the FBI’s Crossfire Hurricane investigation. Another unsecured database exposes PII. Keep an eye out for Patch Tuesday updates. And it’s prediction season, so CyberScoop lets the bots out. Ben Yelin from UMD CHHS on legislating the right to sue online platforms. Guest is Chris Wysopal from Veracode with findings on security debt from their State of Software Security report.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_10.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Dec 2019 20:47:47 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>986</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6c68d4ba-def8-11ea-911f-87e6a31106d7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Pensacola under cyberattack. Notes on ransomware. The US Justice Department IG report on Crossfire Hurricane. Who let the bots out?</itunes:subtitle>
      <itunes:summary>The city of Pensacola is hit hard by an unspecified cyberattack. Ryuk ransomware decryptors may cause data loss. A new variant of Snatch ransomware evades anti-virus protection. The US Justice Department’s Inspector General has reported on the FBI’s Crossfire Hurricane investigation. Another unsecured database exposes PII. Keep an eye out for Patch Tuesday updates. And it’s prediction season, so CyberScoop lets the bots out. Ben Yelin from UMD CHHS on legislating the right to sue online platforms. Guest is Chris Wysopal from Veracode with findings on security debt from their State of Software Security report.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_10.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The city of Pensacola is hit hard by an unspecified cyberattack. Ryuk ransomware decryptors may cause data loss. A new variant of Snatch ransomware evades anti-virus protection. The US Justice Department’s Inspector General has reported on the FBI’s Crossfire Hurricane investigation. Another unsecured database exposes PII. Keep an eye out for Patch Tuesday updates. And it’s prediction season, so CyberScoop lets the bots out. Ben Yelin from UMD CHHS on legislating the right to sue online platforms. Guest is Chris Wysopal from Veracode with findings on security debt from their State of Software Security report.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_10.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1298</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[59c72b9b-124c-4748-95e5-df511ba98c64]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4276299751.mp3?updated=1690155263" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ocean Lotus versus car manufacturers. Ransomware versus dental practices. $5 million reward offered in Dridex case. Information operations and the UK’s general election. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/985/notes</link>
      <description>Ocean Lotus puts down more roots in automobile manufacturing. Ransomware hits dentists’ IT providers as well as a Rhode Island town. The US is offering a reward of $5 million for information leading to the arrest or--and we stress “or”--conviction of Dridex proprietor Maksim Yakubets. Russian influence operations seem to be aiming at stirring things up over this week’s British election. And an awful lot of Windows 7 machines still seem to be out there. Joe Carrigan from JHU ISI on McAfee predictions of two-stage ransomware extortion. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_09.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 09 Dec 2019 21:31:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>985</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6c9e0f68-def8-11ea-911f-5bda56139646/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ocean Lotus versus car manufacturers. Ransomware versus dental practices. $5 million reward offered in Dridex case. Information operations and the UK’s general election. </itunes:subtitle>
      <itunes:summary>Ocean Lotus puts down more roots in automobile manufacturing. Ransomware hits dentists’ IT providers as well as a Rhode Island town. The US is offering a reward of $5 million for information leading to the arrest or--and we stress “or”--conviction of Dridex proprietor Maksim Yakubets. Russian influence operations seem to be aiming at stirring things up over this week’s British election. And an awful lot of Windows 7 machines still seem to be out there. Joe Carrigan from JHU ISI on McAfee predictions of two-stage ransomware extortion. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_09.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ocean Lotus puts down more roots in automobile manufacturing. Ransomware hits dentists’ IT providers as well as a Rhode Island town. The US is offering a reward of $5 million for information leading to the arrest or--and we stress “or”--conviction of Dridex proprietor Maksim Yakubets. Russian influence operations seem to be aiming at stirring things up over this week’s British election. And an awful lot of Windows 7 machines still seem to be out there. Joe Carrigan from JHU ISI on McAfee predictions of two-stage ransomware extortion. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_09.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>966</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5e39bb7a-9b61-4723-8487-b7ee0365b976]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5529184461.mp3?updated=1690155242" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Targeting routers to hit gaming servers. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/113/notes</link>
      <description>Researchers at Palo Alto Networks' Unit 42 recently published research outlining attacks on home and small-business routers, taking advantage of known vulnerabilities to make the routers parts of botnets, ultimately used to attack gaming servers.
Jen Miller-Osborn is the Deputy Director of Threat Intelligence for Unit 42 at Palo Alto Networks. She joins us to share their findings.
The research can be found here:
 https://unit42.paloaltonetworks.com/home-small-office-wireless-routers-exploited-to-attack-gaming-servers/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Dec 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>113</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0031cf20-df13-11ea-9fc1-8734f520d7d7/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Targeting routers to hit gaming servers. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at Palo Alto Networks' Unit 42 recently published research outlining attacks on home and small-business routers, taking advantage of known vulnerabilities to make the routers parts of botnets, ultimately used to attack gaming servers.
Jen Miller-Osborn is the Deputy Director of Threat Intelligence for Unit 42 at Palo Alto Networks. She joins us to share their findings.
The research can be found here:
 https://unit42.paloaltonetworks.com/home-small-office-wireless-routers-exploited-to-attack-gaming-servers/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Palo Alto Networks' Unit 42 recently published research outlining attacks on home and small-business routers, taking advantage of known vulnerabilities to make the routers parts of botnets, ultimately used to attack gaming servers.</p><p>Jen Miller-Osborn is the Deputy Director of Threat Intelligence for Unit 42 at Palo Alto Networks. She joins us to share their findings.</p><p>The research can be found here:</p><p><a href="https://unit42.paloaltonetworks.com/home-small-office-wireless-routers-exploited-to-attack-gaming-servers/"> https://unit42.paloaltonetworks.com/home-small-office-wireless-routers-exploited-to-attack-gaming-servers/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1120</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2f44bcc2-d3a7-42ca-8cb8-010aba7d4a8e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1603994328.mp3?updated=1685107424" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Facebook sues over ad fraud. Tampering with VPN connections. Russian disinformation in Lithuania.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/984/notes</link>
      <description>Facebook sues a company for ad fraud. Unix-based VPN traffic is vulnerable to tampering. Russian disinformation in Lithuania. Apple explains why new iPhones say they’re using Location Services, even when Location Services are switched off. Researchers set a new record for cracking an encryption key. And ransomware hits a New Jersey theater.  David Dufour from Webroot with a look back at 2019's nastiest cyber threats. Guest is Robert Waitman from Cisco with results from their recent Consumer Privacy Survey.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_06.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 06 Dec 2019 21:18:55 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>984</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6cba813e-def8-11ea-911f-bfd92e1ee5cf/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Facebook sues over ad fraud. Tampering with VPN connections. Russian disinformation in Lithuania.</itunes:subtitle>
      <itunes:summary>Facebook sues a company for ad fraud. Unix-based VPN traffic is vulnerable to tampering. Russian disinformation in Lithuania. Apple explains why new iPhones say they’re using Location Services, even when Location Services are switched off. Researchers set a new record for cracking an encryption key. And ransomware hits a New Jersey theater.  David Dufour from Webroot with a look back at 2019's nastiest cyber threats. Guest is Robert Waitman from Cisco with results from their recent Consumer Privacy Survey.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_06.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Facebook sues a company for ad fraud. Unix-based VPN traffic is vulnerable to tampering. Russian disinformation in Lithuania. Apple explains why new iPhones say they’re using Location Services, even when Location Services are switched off. Researchers set a new record for cracking an encryption key. And ransomware hits a New Jersey theater.  David Dufour from Webroot with a look back at 2019's nastiest cyber threats. Guest is Robert Waitman from Cisco with results from their recent Consumer Privacy Survey.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_06.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1371</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8dfce542-9b68-4a23-8d11-f3f2a6c388ca]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5447195336.mp3?updated=1690155226" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Data center ransomware. Third-party breach hits telco customers. Buran and Buer on the black market. The Great Canon opens fire. Russia trolls Lithuania. Big bad BEC. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/983/notes</link>
      <description>Data center operator CyrusOne sustains a ransomware attack. Another third-party breach involves a database inadvertently left exposed on an unprotected server. Buran ransomware finds its place in the black market, as does the new loader Buer. China’s Great Cannon is back and firing DDoS all over Hong Kong. Russian trolls are newly active in Lithuania. And a business email compromise scam fleeces a Chinese venture capital firm of $1 million--enough for a nice seed round. Robert M. Lee from Dragos on the evolution of safety and security in ICS. Guest is Sean O’Brien from @RISK Technologies on how states and cities need to prepare against election-targeted cyber attacks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_05.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 05 Dec 2019 21:03:47 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>983</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6cd60d5a-def8-11ea-911f-0780c68c7f7a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Data center ransomware. Third-party breach hits telco customers. Buran and Buer on the black market. The Great Canon opens fire. Russia trolls Lithuania. Big bad BEC. </itunes:subtitle>
      <itunes:summary>Data center operator CyrusOne sustains a ransomware attack. Another third-party breach involves a database inadvertently left exposed on an unprotected server. Buran ransomware finds its place in the black market, as does the new loader Buer. China’s Great Cannon is back and firing DDoS all over Hong Kong. Russian trolls are newly active in Lithuania. And a business email compromise scam fleeces a Chinese venture capital firm of $1 million--enough for a nice seed round. Robert M. Lee from Dragos on the evolution of safety and security in ICS. Guest is Sean O’Brien from @RISK Technologies on how states and cities need to prepare against election-targeted cyber attacks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_05.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Data center operator CyrusOne sustains a ransomware attack. Another third-party breach involves a database inadvertently left exposed on an unprotected server. Buran ransomware finds its place in the black market, as does the new loader Buer. China’s Great Cannon is back and firing DDoS all over Hong Kong. Russian trolls are newly active in Lithuania. And a business email compromise scam fleeces a Chinese venture capital firm of $1 million--enough for a nice seed round. Robert M. Lee from Dragos on the evolution of safety and security in ICS. Guest is Sean O’Brien from @RISK Technologies on how states and cities need to prepare against election-targeted cyber attacks.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_05.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1366</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[98625dff-15b1-445e-8ff9-17015bcb7f5a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1922305834.mp3?updated=1690155208" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lazarus Group interested in thorium reactors? Disinformation by phishing. ZeroCleare wiper in the wild. NATO addresses cyber conflict. NotPetya litigation. Black market takedown.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/982/notes</link>
      <description>North Korea’s Lazarus Group may have been looking for Indian reactor design information. A possible case of Russian influence operations, served up by phishing, is under investigation in the UK. The ZeroCleare wiper malware is out and active in the wild. NATO’s summit addresses cyber conflict, and a big NotPetya victim challenges insurers’ contentions that the malware was an act of war. And an international police action takes down a black market spyware souk. Michael Sechrist from Booz Allen Hamilton on security concerns with messaging apps like Slack. Guest is Roger Hale from YL Ventures on the changing role of the CISO when it comes to managing risk.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_04.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 04 Dec 2019 20:45:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>982</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6cece322-def8-11ea-911f-fb8e476675e7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Lazarus Group interested in thorium reactors? Disinformation by phishing. ZeroCleare wiper in the wild. NATO addresses cyber conflict. NotPetya litigation. Black market takedown.</itunes:subtitle>
      <itunes:summary>North Korea’s Lazarus Group may have been looking for Indian reactor design information. A possible case of Russian influence operations, served up by phishing, is under investigation in the UK. The ZeroCleare wiper malware is out and active in the wild. NATO’s summit addresses cyber conflict, and a big NotPetya victim challenges insurers’ contentions that the malware was an act of war. And an international police action takes down a black market spyware souk. Michael Sechrist from Booz Allen Hamilton on security concerns with messaging apps like Slack. Guest is Roger Hale from YL Ventures on the changing role of the CISO when it comes to managing risk.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_04.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>North Korea’s Lazarus Group may have been looking for Indian reactor design information. A possible case of Russian influence operations, served up by phishing, is under investigation in the UK. The ZeroCleare wiper malware is out and active in the wild. NATO’s summit addresses cyber conflict, and a big NotPetya victim challenges insurers’ contentions that the malware was an act of war. And an international police action takes down a black market spyware souk. Michael Sechrist from Booz Allen Hamilton on security concerns with messaging apps like Slack. Guest is Roger Hale from YL Ventures on the changing role of the CISO when it comes to managing risk.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_04.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1322</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[56fd7d61-994e-413a-a51d-6aca83b498f2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7571285454.mp3?updated=1690155189" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Secondary Infektion may be back, and interested in UK elections. Quantum Dragon. FaceApp risks. PyXie RAT in the wild. An Ethereum developer is charged with helping North Korea evade sanctions.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/981/notes</link>
      <description>Someone believes, or would like others to believe, that Britain’s National Health Service is for sale to the US. There’s no word on whether the US has offered the Brooklyn Bridge in exchange. The “Quantum Dragon” study summarizes Chinese efforts to obtain quantum research results from Western institutions. The FBI says FaceApp is a security threat. PyXie, a Python RAT, has been quietly active in the wild since 2018. An Ethereum developer is accused with aiding Pyongyang. Ben Yelin from UMD CHHS on a bipartisan bill requiring a warrant for facial recognition use. Guest is Earl Matthews from Verodin on the importance of collaboration between state governments and technology vendors to ensure election security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_03.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Dec 2019 20:45:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>981</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6d0a674e-def8-11ea-911f-e70214e3d1ef/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Secondary Infektion may be back, and interested in UK elections. Quantum Dragon. FaceApp risks. PyXie RAT in the wild. An Ethereum developer is charged with helping North Korea evade sanctions.</itunes:subtitle>
      <itunes:summary>Someone believes, or would like others to believe, that Britain’s National Health Service is for sale to the US. There’s no word on whether the US has offered the Brooklyn Bridge in exchange. The “Quantum Dragon” study summarizes Chinese efforts to obtain quantum research results from Western institutions. The FBI says FaceApp is a security threat. PyXie, a Python RAT, has been quietly active in the wild since 2018. An Ethereum developer is accused with aiding Pyongyang. Ben Yelin from UMD CHHS on a bipartisan bill requiring a warrant for facial recognition use. Guest is Earl Matthews from Verodin on the importance of collaboration between state governments and technology vendors to ensure election security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_03.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Someone believes, or would like others to believe, that Britain’s National Health Service is for sale to the US. There’s no word on whether the US has offered the Brooklyn Bridge in exchange. The “Quantum Dragon” study summarizes Chinese efforts to obtain quantum research results from Western institutions. The FBI says FaceApp is a security threat. PyXie, a Python RAT, has been quietly active in the wild since 2018. An Ethereum developer is accused with aiding Pyongyang. Ben Yelin from UMD CHHS on a bipartisan bill requiring a warrant for facial recognition use. Guest is Earl Matthews from Verodin on the importance of collaboration between state governments and technology vendors to ensure election security.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_03.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1309</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1ede9f5b-cc90-4eff-8ae4-0b7b30e00c5f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6095792334.mp3?updated=1690155173" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ANSSI considering retaliation for ransomware attack. MixCloud breached. Imminent Monitor shut down.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/980/notes</link>
      <description>France might go on the offensive against ransomware attackers. The UK’s NCSC has been helping an unnamed nuclear power company recover from a cyberattack. A failed cyberattack targeted the Ohio Secretary of State’s website on Election Day. MixCloud confirms data breach. The Imminent Monitor RAT is shut down by law enforcement. And a cryptocurrency exchange loses nearly fifty-million dollars. Joe Carrigan from JHU ISI on victim blaming.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_02.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 02 Dec 2019 20:48:01 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>980</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6d1ee5e8-def8-11ea-911f-e3814b9ebb33/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>ANSSI considering retaliation for ransomware attack. MixCloud breached. Imminent Monitor shut down.</itunes:subtitle>
      <itunes:summary>France might go on the offensive against ransomware attackers. The UK’s NCSC has been helping an unnamed nuclear power company recover from a cyberattack. A failed cyberattack targeted the Ohio Secretary of State’s website on Election Day. MixCloud confirms data breach. The Imminent Monitor RAT is shut down by law enforcement. And a cryptocurrency exchange loses nearly fifty-million dollars. Joe Carrigan from JHU ISI on victim blaming.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_02.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>France might go on the offensive against ransomware attackers. The UK’s NCSC has been helping an unnamed nuclear power company recover from a cyberattack. A failed cyberattack targeted the Ohio Secretary of State’s website on Election Day. MixCloud confirms data breach. The Imminent Monitor RAT is shut down by law enforcement. And a cryptocurrency exchange loses nearly fifty-million dollars. Joe Carrigan from JHU ISI on victim blaming.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/December/CyberWire_2019_12_02.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1018</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7bdb840f-aab5-4417-b370-70976fc81411]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4032603723.mp3?updated=1690155148" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Peter W. Singer author of LikeWar [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/33/notes</link>
      <description>In this CyberWire special edition, an extended version of our conversation from earlier this year with Peter W. Singer. We spoke not long after the publication of his book, Like War - the Weaponization of Social Media.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Nov 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>33</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0fad032e-df05-11ea-ad1f-8fc82b7dce97/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Peter W. Singer author of LikeWar [Special Editions]</itunes:subtitle>
      <itunes:summary>In this CyberWire special edition, an extended version of our conversation from earlier this year with Peter W. Singer. We spoke not long after the publication of his book, Like War - the Weaponization of Social Media.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this CyberWire special edition, an extended version of our conversation from earlier this year with Peter W. Singer. We spoke not long after the publication of his book, <em>Like War - the Weaponization of Social Media.</em></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2070</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4d9af2ad-1cdd-44eb-87c2-f588b7a16425]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9683504354.mp3?updated=1663086310" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>John Maeda author of How to Speak Machine [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/32/notes</link>
      <description>In this CyberWire special edition, a conversation with John Maeda. He’s a Graphic designer, visual artist, and computer scientist, and former President of the Rhode Island School of Design and founder of the SIMPLICITY Consortium at the MIT Media Lab. His newly released book is How to Speak Machine - Computational Thinking for the Rest of Us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 29 Nov 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>32</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/d711f68c-df04-11ea-bd36-43cb78e6c70b/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>John Maeda author of How to Speak Machine [Special Editions]</itunes:subtitle>
      <itunes:summary>In this CyberWire special edition, a conversation with John Maeda. He’s a Graphic designer, visual artist, and computer scientist, and former President of the Rhode Island School of Design and founder of the SIMPLICITY Consortium at the MIT Media Lab. His newly released book is How to Speak Machine - Computational Thinking for the Rest of Us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this CyberWire special edition, a conversation with John Maeda. He’s a Graphic designer, visual artist, and computer scientist, and former President of the Rhode Island School of Design and founder of the SIMPLICITY Consortium at the MIT Media Lab. His newly released book is <em>How to Speak Machine - Computational Thinking for the Rest of Us.</em></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1386</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cd1df9a9-6714-4fb3-a7a0-40263bc81411]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4549479548.mp3?updated=1663090540" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing, cryptojacking, and commodity malware. New supply chain security measures. And have you heard about this Black Friday thing?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/979/notes</link>
      <description>A Fullz House for Thanksgiving. Google finds that nation-state phishing continues at its customary high levels. DeathRansom, the low-end ransomware that didn’t actually encrypt files, has now begun to do so. The Stantinko botnet adds cryptomining functionality. Microsoft reflects on Dexphot, and the sophistication it brings to ordinary malware. Supply chain security rules are coming to the US. A lawsuit in Tel Aviv. And some final notes on Black Friday. Daniel Prince from Lancaster University on business innovation and cyber security. Guest is Francesca Spidalieri from Salve Regina University on the importance of collaboration from all sectors.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_27.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 27 Nov 2019 19:21:28 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>979</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6d38a6cc-def8-11ea-911f-b368efdde448/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Phishing, cryptojacking, and commodity malware. New supply chain security measures. And have you heard about this Black Friday thing?</itunes:subtitle>
      <itunes:summary>A Fullz House for Thanksgiving. Google finds that nation-state phishing continues at its customary high levels. DeathRansom, the low-end ransomware that didn’t actually encrypt files, has now begun to do so. The Stantinko botnet adds cryptomining functionality. Microsoft reflects on Dexphot, and the sophistication it brings to ordinary malware. Supply chain security rules are coming to the US. A lawsuit in Tel Aviv. And some final notes on Black Friday. Daniel Prince from Lancaster University on business innovation and cyber security. Guest is Francesca Spidalieri from Salve Regina University on the importance of collaboration from all sectors.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_27.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Fullz House for Thanksgiving. Google finds that nation-state phishing continues at its customary high levels. DeathRansom, the low-end ransomware that didn’t actually encrypt files, has now begun to do so. The Stantinko botnet adds cryptomining functionality. Microsoft reflects on Dexphot, and the sophistication it brings to ordinary malware. Supply chain security rules are coming to the US. A lawsuit in Tel Aviv. And some final notes on Black Friday. Daniel Prince from Lancaster University on business innovation and cyber security. Guest is Francesca Spidalieri from Salve Regina University on the importance of collaboration from all sectors.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_27.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1307</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[45888d36-2ef7-4eeb-bd71-27f4fcf81abf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8848737796.mp3?updated=1690155106" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Potentially malicious SDKs draw cease-and-desist letters. Nursing homes get ransom demands. A look back at the Sony Pictures hack. CISA offers advice on safe online shopping.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/978/notes</link>
      <description>Twitter and Facebook warn of potentially malicious software development kits being used by app developers to, potentially, harvest and monetize users’ data. Nursing homes affected by a third-party ransomware incident receive extortion demands that amount to some $14 million. THe Hollywood Reporter retails skeptical musings about the Sony Pictures hack on the fifth anniversary of the North Korean attack. And CISA offers advice for safe holiday shopping. Justin Harvey from Accenture with thoughts on smart cities. Guest is Sam Bakken from OneSpan on mobile app developers protecting against jailbreaking.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_26.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Nov 2019 21:04:39 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>978</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6d550934-def8-11ea-911f-5b45bc56bc36/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Potentially malicious SDKs draw cease-and-desist letters. Nursing homes get ransom demands. A look back at the Sony Pictures hack. CISA offers advice on safe online shopping.</itunes:subtitle>
      <itunes:summary>Twitter and Facebook warn of potentially malicious software development kits being used by app developers to, potentially, harvest and monetize users’ data. Nursing homes affected by a third-party ransomware incident receive extortion demands that amount to some $14 million. THe Hollywood Reporter retails skeptical musings about the Sony Pictures hack on the fifth anniversary of the North Korean attack. And CISA offers advice for safe holiday shopping. Justin Harvey from Accenture with thoughts on smart cities. Guest is Sam Bakken from OneSpan on mobile app developers protecting against jailbreaking.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_26.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Twitter and Facebook warn of potentially malicious software development kits being used by app developers to, potentially, harvest and monetize users’ data. Nursing homes affected by a third-party ransomware incident receive extortion demands that amount to some $14 million. THe Hollywood Reporter retails skeptical musings about the Sony Pictures hack on the fifth anniversary of the North Korean attack. And CISA offers advice for safe holiday shopping. Justin Harvey from Accenture with thoughts on smart cities. Guest is Sam Bakken from OneSpan on mobile app developers protecting against jailbreaking.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_26.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1244</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[47717a46-d9d1-403d-a1c6-7c47d2f2d483]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7198091013.mp3?updated=1690155079" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Arrest by algorithm. Dangers of data enrichment. Golden Falcon in Kazakhstan. FCC vs. Huawei and ZTE. Internet sovereignty. Chuckling Squad popped for Twitter caper. Other crime and punishment. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/977/notes</link>
      <description>A defection and a leak expose Chinese espionage and social control operations. Data aggregation and enrichment seem to underlie a big inadvertent data exposure. Something seems to be up in Kazakhstan’s networks. The US FCC takes a swing at Huawei and ZTE. Russia moves closer to its desired Internet sovereignty. A Chuckling Squad member is in custody. A spy goes to prison, cyber hoods do time, and the rats are up to no good in Estonia. That’s the rodents, not the Trojans. Caleb Barlow from Cynergistek with insights gained from a scammer’s call.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_25.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 25 Nov 2019 20:27:33 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>977</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6d750860-def8-11ea-911f-433102a5a5cd/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Arrest by algorithm. Dangers of data enrichment. Golden Falcon in Kazakhstan. FCC vs. Huawei and ZTE. Internet sovereignty. Chuckling Squad popped for Twitter caper. Other crime and punishment. </itunes:subtitle>
      <itunes:summary>A defection and a leak expose Chinese espionage and social control operations. Data aggregation and enrichment seem to underlie a big inadvertent data exposure. Something seems to be up in Kazakhstan’s networks. The US FCC takes a swing at Huawei and ZTE. Russia moves closer to its desired Internet sovereignty. A Chuckling Squad member is in custody. A spy goes to prison, cyber hoods do time, and the rats are up to no good in Estonia. That’s the rodents, not the Trojans. Caleb Barlow from Cynergistek with insights gained from a scammer’s call.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_25.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A defection and a leak expose Chinese espionage and social control operations. Data aggregation and enrichment seem to underlie a big inadvertent data exposure. Something seems to be up in Kazakhstan’s networks. The US FCC takes a swing at Huawei and ZTE. Russia moves closer to its desired Internet sovereignty. A Chuckling Squad member is in custody. A spy goes to prison, cyber hoods do time, and the rats are up to no good in Estonia. That’s the rodents, not the Trojans. Caleb Barlow from Cynergistek with insights gained from a scammer’s call.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_25.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1307</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a01e588b-7959-47f9-af1e-2bdffb4327fa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6040694626.mp3?updated=1690154976" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mustang Panda leverages Windows shortcut files. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/112/notes</link>
      <description>Researchers at Anomali have been tracking China-based threat group, Mustang Panda, believing them to be responsible for attacks making clever use of Windows shortcut files. 
Parthiban is a researcher at Anomali, and he joins us to share their findings.
The research is here:
 https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Nov 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>112</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/fe4a4a70-df12-11ea-9dfb-af9c5b343bb0/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Mustang Panda leverages Windows shortcut files. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at Anomali have been tracking China-based threat group, Mustang Panda, believing them to be responsible for attacks making clever use of Windows shortcut files. 
Parthiban is a researcher at Anomali, and he joins us to share their findings.
The research is here:
 https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Anomali have been tracking China-based threat group, Mustang Panda, believing them to be responsible for attacks making clever use of Windows shortcut files. </p><p>Parthiban is a researcher at Anomali, and he joins us to share their findings.</p><p>The research is here:</p><p><a href="https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations"> https://www.anomali.com/blog/china-based-apt-mustang-panda-targets-minority-groups-public-and-private-sector-organizations</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>882</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c23d9dd6-58d4-4ac8-b1ad-a8b22239ca27]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2723709387.mp3?updated=1685107410" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sandworm in Google Play. Internet sovereignty. Bogus accounts on LInkedIn. Pupil becomes teacher. Six-year sentence for DDoS. Big bug bounty at Google. Ransomware updates. Pegasus inquest.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/976/notes</link>
      <description>Google researchers provide a Sandworm update. Internet sovereignty considered: an aid to law enforcement or a means of social control. LinkedIn reports on the 21-million bogus accounts it closed over the past year. Teacher becomes pupil as marketing learns from informaiton operators. Ohio man gets six years in Akron DDoS case. Ransomware case updates. A Parliamentary inquiry in India will look into the deployment of Pegasus against WhatsApp users. Craig Williams from Cisco Talos on the Panda cryptominer. Guest is Keenan Skelly from Circadence on getting the younger generation excited about cyber.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_22.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 22 Nov 2019 20:45:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>976</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6d8b7d16-def8-11ea-911f-8beeacda0ad4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Sandworm in Google Play. Internet sovereignty. Bogus accounts on LInkedIn. Pupil becomes teacher. Six-year sentence for DDoS. Big bug bounty at Google. Ransomware updates. Pegasus inquest.</itunes:subtitle>
      <itunes:summary>Google researchers provide a Sandworm update. Internet sovereignty considered: an aid to law enforcement or a means of social control. LinkedIn reports on the 21-million bogus accounts it closed over the past year. Teacher becomes pupil as marketing learns from informaiton operators. Ohio man gets six years in Akron DDoS case. Ransomware case updates. A Parliamentary inquiry in India will look into the deployment of Pegasus against WhatsApp users. Craig Williams from Cisco Talos on the Panda cryptominer. Guest is Keenan Skelly from Circadence on getting the younger generation excited about cyber.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_22.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Google researchers provide a Sandworm update. Internet sovereignty considered: an aid to law enforcement or a means of social control. LinkedIn reports on the 21-million bogus accounts it closed over the past year. Teacher becomes pupil as marketing learns from informaiton operators. Ohio man gets six years in Akron DDoS case. Ransomware case updates. A Parliamentary inquiry in India will look into the deployment of Pegasus against WhatsApp users. Craig Williams from Cisco Talos on the Panda cryptominer. Guest is Keenan Skelly from Circadence on getting the younger generation excited about cyber.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_22.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1660</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6540e95f-893e-4bbc-9920-ce1c18c7b8bd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2074723327.mp3?updated=1608756299" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Refined Kitten paws at ICS. Debunking BlueKeep rumors. FBI warns Detroit of cyber threats. The UN’s long deliberation over cybercrime. Cryptowars. 5G security and a 5G czar. Ransomware updates.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/975/notes</link>
      <description>Refined Kitten seems to be up to something, perhaps in the control system world. Microsoft debunks claims about Teams, BlueKeep, and Doppelpaymer ransomware. The FBI warns the auto industry that it’s attracting attackers’ attention. A new attack technique, RIPlace, is described. Phineas Fisher’s bouty, considered. The UN, the AG, and the course of the cryptowars. Does America need a 5G czar? And ransomware from Baton Rouge to Rouen. Michael Sechrist from BAH on third party malware risks. Guest is Bill Connor from SonicWall with results from their Q3 Threat Data Report.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_21.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 21 Nov 2019 19:24:33 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>975</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6dad3f1e-def8-11ea-911f-f736ce96934b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Refined Kitten paws at ICS. Debunking BlueKeep rumors. FBI warns Detroit of cyber threats. The UN’s long deliberation over cybercrime. Cryptowars. 5G security and a 5G czar. Ransomware updates.</itunes:subtitle>
      <itunes:summary>Refined Kitten seems to be up to something, perhaps in the control system world. Microsoft debunks claims about Teams, BlueKeep, and Doppelpaymer ransomware. The FBI warns the auto industry that it’s attracting attackers’ attention. A new attack technique, RIPlace, is described. Phineas Fisher’s bouty, considered. The UN, the AG, and the course of the cryptowars. Does America need a 5G czar? And ransomware from Baton Rouge to Rouen. Michael Sechrist from BAH on third party malware risks. Guest is Bill Connor from SonicWall with results from their Q3 Threat Data Report.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_21.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Refined Kitten seems to be up to something, perhaps in the control system world. Microsoft debunks claims about Teams, BlueKeep, and Doppelpaymer ransomware. The FBI warns the auto industry that it’s attracting attackers’ attention. A new attack technique, RIPlace, is described. Phineas Fisher’s bouty, considered. The UN, the AG, and the course of the cryptowars. Does America need a 5G czar? And ransomware from Baton Rouge to Rouen. Michael Sechrist from BAH on third party malware risks. Guest is Bill Connor from SonicWall with results from their Q3 Threat Data Report.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_21.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1311</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c41d06d8-9db7-40b9-8db9-6d1a040f5623]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8832760780.mp3?updated=1690154903" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Louisiana works to recover from Monday’s ransomware attack. Gekko Group sustains a massive data exposure. US student charged with coding for ISIS.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/974/notes</link>
      <description>Louisiana works to recover from Monday’s ransomware attack. The HydSeven criminal group is delivering Trojans via spearphishing. A hotel reservation company sustained a massive data exposure. India’s government says it’s legally permitted to surveil citizens’ devices when it’s deemed necessary. Google, Facebook, Apple, and Amazon answer questions for Congress’s antitrust inquiry. A Chicago student is charged with coding for ISIS. And the National Security Agency offers advice for implementing TLSI. David Dufour from Webroot with findings from their midyear threat report . Guest is Bill Harrod from MobileIron on biometric data in the federal space.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 20 Nov 2019 21:26:31 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>974</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6dcbbc50-def8-11ea-911f-3783d84ef0e9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Louisiana works to recover from Monday’s ransomware attack. Gekko Group sustains a massive data exposure. US student charged with coding for ISIS.</itunes:subtitle>
      <itunes:summary>Louisiana works to recover from Monday’s ransomware attack. The HydSeven criminal group is delivering Trojans via spearphishing. A hotel reservation company sustained a massive data exposure. India’s government says it’s legally permitted to surveil citizens’ devices when it’s deemed necessary. Google, Facebook, Apple, and Amazon answer questions for Congress’s antitrust inquiry. A Chicago student is charged with coding for ISIS. And the National Security Agency offers advice for implementing TLSI. David Dufour from Webroot with findings from their midyear threat report . Guest is Bill Harrod from MobileIron on biometric data in the federal space.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Louisiana works to recover from Monday’s ransomware attack. The HydSeven criminal group is delivering Trojans via spearphishing. A hotel reservation company sustained a massive data exposure. India’s government says it’s legally permitted to surveil citizens’ devices when it’s deemed necessary. Google, Facebook, Apple, and Amazon answer questions for Congress’s antitrust inquiry. A Chicago student is charged with coding for ISIS. And the National Security Agency offers advice for implementing TLSI. David Dufour from Webroot with findings from their midyear threat report . Guest is Bill Harrod from MobileIron on biometric data in the federal space.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1239</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fb16e979-a26c-424a-91bf-c079ae4b2808]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7047054869.mp3?updated=1690154821" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware recovery in Louisiana. DPRK phishing for aerospace jobseekers? Cybercrime campaigns. Notes on current legal matters.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/973/notes</link>
      <description>Louisiana recovers from a ransomware attack against state servers. North Korea appears to still be interested in Indian industry--this time it’s people looking for jobs at Hindustan Aeronautics. Compromised CMS distributing info-stealing Trojans. HydSeven mounts a cross-platform spearphishing campaign. Macy’s and Magecart. Thoughts on supply chain security and cyber deterrence. And some legal updates, including some alleged academic money laundering.  Ben Yelin from UMD CHHS on your rights to images you post of yourself online. Guest is Tom Miller from ClearForce on continuous discovery of insider threats.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_19.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Nov 2019 20:36:42 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>973</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6ddc5556-def8-11ea-911f-af4028913a5d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ransomware recovery in Louisiana. DPRK phishing for aerospace jobseekers? Cybercrime campaigns. Notes on current legal matters.</itunes:subtitle>
      <itunes:summary>Louisiana recovers from a ransomware attack against state servers. North Korea appears to still be interested in Indian industry--this time it’s people looking for jobs at Hindustan Aeronautics. Compromised CMS distributing info-stealing Trojans. HydSeven mounts a cross-platform spearphishing campaign. Macy’s and Magecart. Thoughts on supply chain security and cyber deterrence. And some legal updates, including some alleged academic money laundering.  Ben Yelin from UMD CHHS on your rights to images you post of yourself online. Guest is Tom Miller from ClearForce on continuous discovery of insider threats.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_19.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Louisiana recovers from a ransomware attack against state servers. North Korea appears to still be interested in Indian industry--this time it’s people looking for jobs at Hindustan Aeronautics. Compromised CMS distributing info-stealing Trojans. HydSeven mounts a cross-platform spearphishing campaign. Macy’s and Magecart. Thoughts on supply chain security and cyber deterrence. And some legal updates, including some alleged academic money laundering.  Ben Yelin from UMD CHHS on your rights to images you post of yourself online. Guest is Tom Miller from ClearForce on continuous discovery of insider threats.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_19.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1358</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[31572aea-b41e-43de-9743-d6e1059b6904]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4572830045.mp3?updated=1690154806" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Disney+ credentials hacked. Kudankulam reassurance. Chinese, Iranian documents leak. Iran and Venezuela restrict Internet access. Russia proposes Internet control treaty. Hacktivist notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/972/notes</link>
      <description>Disney+ credentials already on sale in the black market souks. India reassures nuclear power partners that the Kudankulam incident didn’t compromise safety. Documents pertaining to Chinese and Iranian security operations leak. Internet restrictions go into force in Iran and Venezuela. Russia offers an Internet control treaty at the UN. The Lizard Squad might be back, and Phineas Fisher has also resurfaced. And happy birthday, CISA. Joe Carrigan from JHU ISI on the NICE conference.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_18.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 18 Nov 2019 20:34:49 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>972</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6df58454-def8-11ea-911f-07ff78253e2e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Disney+ credentials hacked. Kudankulam reassurance. Chinese, Iranian documents leak. Iran and Venezuela restrict Internet access. Russia proposes Internet control treaty. Hacktivist notes.</itunes:subtitle>
      <itunes:summary>Disney+ credentials already on sale in the black market souks. India reassures nuclear power partners that the Kudankulam incident didn’t compromise safety. Documents pertaining to Chinese and Iranian security operations leak. Internet restrictions go into force in Iran and Venezuela. Russia offers an Internet control treaty at the UN. The Lizard Squad might be back, and Phineas Fisher has also resurfaced. And happy birthday, CISA. Joe Carrigan from JHU ISI on the NICE conference.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_18.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Disney+ credentials already on sale in the black market souks. India reassures nuclear power partners that the Kudankulam incident didn’t compromise safety. Documents pertaining to Chinese and Iranian security operations leak. Internet restrictions go into force in Iran and Venezuela. Russia offers an Internet control treaty at the UN. The Lizard Squad might be back, and Phineas Fisher has also resurfaced. And happy birthday, CISA. Joe Carrigan from JHU ISI on the NICE conference.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_18.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>962</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[770673a2-c181-4a0d-bee9-0c634ec95d45]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5652182688.mp3?updated=1690154735" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sodinokibi aka REvil connections to GandCrab. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/111/notes</link>
      <description>Researchers at McAfee's Advanced Threat Research Team have been analyzing Sodinokibi ransomware as a service, also known as REvil. John Fokker is head of cyber investigations for McAfee Advanced Threat Research, and he joins us to share their findings.
The research is here:
 https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/mcafee-atr-analyzes-sodinokibi-aka-revil-ransomware-as-a-service-what-the-code-tells-us/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Nov 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>111</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/fcf70532-df12-11ea-851c-132911726ea3/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Sodinokibi aka REvil connections to GandCrab [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at McAfee's Advanced Threat Research Team have been analyzing Sodinokibi ransomware as a service, also known as REvil. John Fokker is head of cyber investigations for McAfee Advanced Threat Research, and he joins us to share their findings.
The research is here:
 https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/mcafee-atr-analyzes-sodinokibi-aka-revil-ransomware-as-a-service-what-the-code-tells-us/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at McAfee's Advanced Threat Research Team have been analyzing Sodinokibi ransomware as a service, also known as REvil. John Fokker is head of cyber investigations for McAfee Advanced Threat Research, and he joins us to share their findings.</p><p>The research is here:</p><p><a href="https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/mcafee-atr-analyzes-sodinokibi-aka-revil-ransomware-as-a-service-what-the-code-tells-us/"> https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/mcafee-atr-analyzes-sodinokibi-aka-revil-ransomware-as-a-service-what-the-code-tells-us/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1178</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[36ee4516819945658cfe0c65c767e607]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3200919217.mp3?updated=1685107403" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pemex ransomware update. Spearphishing with spoofed government phishbait. Trojan two-fer. AntiFrigus ransomware avoids C-drive files. BLE bug. DataTribe’s annual Challenge. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/971/notes</link>
      <description>Pemex has recovered from the ransomware attack it sustained...or has it? TA2101 is spoofing German, Italian, and US government agencies in its phishing emails. A dropper in the wild is delivering a Trojan two-fer. AntiFrigus ransomware is avoiding C-drives for some reason. Ohio State researchers find a Bluetooth vulnerability. And the results of the annual DataTribe Challenge are in--we heard the three finalists pitch yesterday, and the judges have a winner. Robert M. Lee from Dragos on purple-teaming ICS networks. Guest is David Spark from the CISO/Security Vendor Relationship Podcast on marketing to CISOs.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_15.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 15 Nov 2019 21:05:03 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>971</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6e2827d8-def8-11ea-911f-77f21e10cd39/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Pemex ransomware update. Spearphishing with spoofed government phishbait. Trojan two-fer. AntiFrigus ransomware avoids C-drive files. BLE bug. DataTribe’s annual Challenge. </itunes:subtitle>
      <itunes:summary>Pemex has recovered from the ransomware attack it sustained...or has it? TA2101 is spoofing German, Italian, and US government agencies in its phishing emails. A dropper in the wild is delivering a Trojan two-fer. AntiFrigus ransomware is avoiding C-drives for some reason. Ohio State researchers find a Bluetooth vulnerability. And the results of the annual DataTribe Challenge are in--we heard the three finalists pitch yesterday, and the judges have a winner. Robert M. Lee from Dragos on purple-teaming ICS networks. Guest is David Spark from the CISO/Security Vendor Relationship Podcast on marketing to CISOs.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_15.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Pemex has recovered from the ransomware attack it sustained...or has it? TA2101 is spoofing German, Italian, and US government agencies in its phishing emails. A dropper in the wild is delivering a Trojan two-fer. AntiFrigus ransomware is avoiding C-drives for some reason. Ohio State researchers find a Bluetooth vulnerability. And the results of the annual DataTribe Challenge are in--we heard the three finalists pitch yesterday, and the judges have a winner. Robert M. Lee from Dragos on purple-teaming ICS networks. Guest is David Spark from the CISO/Security Vendor Relationship Podcast on marketing to CISOs.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_15.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1695</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6c570d69-78c1-4eac-bc67-1662bd70f0f9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6052073859.mp3?updated=1608756307" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>PureLocker ransomware. APT33 update. Hong Kong and information war, in the courts and on PornHub. Facebook content takedowns. Alleged criminals prepare to face the court. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/970/notes</link>
      <description>PureLocker is a new ransomware strain available in the black market. APT33 is showing a surge of activity. Lawfare and information operations in and around Hong Kong. Facebook takes down content for violating its Community Standards. And two alleged cyber criminals are facing charges: one is allegedly the former proprietor of Cardplanet, the other was selling a remote administrative tool the RCMP says was really a different kind of RAT.  Justin Harvey from Accenture on the increasing use of biometrics in security. Guest is Jennifer Ayers from Crowdstrike with the insights from their Overwatch threat hunting report.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_14.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 14 Nov 2019 19:54:37 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>970</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6e3e5918-def8-11ea-911f-fb125e3dd195/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>PureLocker ransomware. APT33 update. Hong Kong and information war, in the courts and on PornHub. Facebook content takedowns. Alleged criminals prepare to face the court. </itunes:subtitle>
      <itunes:summary>PureLocker is a new ransomware strain available in the black market. APT33 is showing a surge of activity. Lawfare and information operations in and around Hong Kong. Facebook takes down content for violating its Community Standards. And two alleged cyber criminals are facing charges: one is allegedly the former proprietor of Cardplanet, the other was selling a remote administrative tool the RCMP says was really a different kind of RAT.  Justin Harvey from Accenture on the increasing use of biometrics in security. Guest is Jennifer Ayers from Crowdstrike with the insights from their Overwatch threat hunting report.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_14.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>PureLocker is a new ransomware strain available in the black market. APT33 is showing a surge of activity. Lawfare and information operations in and around Hong Kong. Facebook takes down content for violating its Community Standards. And two alleged cyber criminals are facing charges: one is allegedly the former proprietor of Cardplanet, the other was selling a remote administrative tool the RCMP says was really a different kind of RAT.  Justin Harvey from Accenture on the increasing use of biometrics in security. Guest is Jennifer Ayers from Crowdstrike with the insights from their Overwatch threat hunting report.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_14.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1269</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[250c01b8-d17e-49a2-9cd8-f70a778525ce]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6705341823.mp3?updated=1690154672" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>NAM hacked during US-China trade tensions. DDoS against British political parties. Pemex recovers from ransomware. Project Nightingale gets US Federal scrutiny. Patch notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/969/notes</link>
      <description>National Association of Manufacturers hacked during Sino-American trade negotiations (and tensions). Ineffectual DDoS attacks hit both of the UK’s largest political parties. Pemex says it’s completed recovery from ransomware. The US Department of Health and Human Services will investigate Google’s Project Nightingale for possible HIPAA issues. And did BlueKeep warnings scare people into patching? Apparently not.  Ben Yelin from UMD CHHS on California going after Facebook on alleged user privacy violations. Guest is Edward Roberts from Imperva on Ecommerce and bots.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 13 Nov 2019 17:52:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>969</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6e550db6-def8-11ea-911f-3f87ddb1441e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>NAM hacked during US-China trade tensions. DDoS against British political parties. Pemex recovers from ransomware. Project Nightingale gets US Federal scrutiny. Patch notes.</itunes:subtitle>
      <itunes:summary>National Association of Manufacturers hacked during Sino-American trade negotiations (and tensions). Ineffectual DDoS attacks hit both of the UK’s largest political parties. Pemex says it’s completed recovery from ransomware. The US Department of Health and Human Services will investigate Google’s Project Nightingale for possible HIPAA issues. And did BlueKeep warnings scare people into patching? Apparently not.  Ben Yelin from UMD CHHS on California going after Facebook on alleged user privacy violations. Guest is Edward Roberts from Imperva on Ecommerce and bots.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>National Association of Manufacturers hacked during Sino-American trade negotiations (and tensions). Ineffectual DDoS attacks hit both of the UK’s largest political parties. Pemex says it’s completed recovery from ransomware. The US Department of Health and Human Services will investigate Google’s Project Nightingale for possible HIPAA issues. And did BlueKeep warnings scare people into patching? Apparently not.  Ben Yelin from UMD CHHS on California going after Facebook on alleged user privacy violations. Guest is Edward Roberts from Imperva on Ecommerce and bots.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1307</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[702fadcf-f9ae-4409-b566-3bf9405ee862]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9594272007.mp3?updated=1690154657" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Labour Party reports a cyberattack. What the Lazarus Group is up to. Platinum adds a quiet backdoor. Buran competes on price. PCI DSS compliance falling. Ahoy, Yantar.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/968/notes</link>
      <description>The UK’s Labour Party says it was hacked, but unsuccessfully. The Lazarus Group seems to be back out and about, and apparently interested in India. The Platinum threat actor continues to prospect Southeast Asian targets with stealthy malware, and a new backdoor. Buran tries to take black market share in the ransomware-as-a-service souk. Paycard standard compliance is down. And is that a spy ship we see, or are you just looking at the seabed, all for science? Joe Carrigan from JHU ISI with browser vulnerabilities in Chrome and Firefox.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Nov 2019 20:27:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>968</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6e70c8c6-def8-11ea-911f-277ce57d6cf1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Labour Party reports a cyberattack. What the Lazarus Group is up to. Platinum adds a quiet backdoor. Buran competes on price. PCI DSS compliance falling. Ahoy, Yantar.</itunes:subtitle>
      <itunes:summary>The UK’s Labour Party says it was hacked, but unsuccessfully. The Lazarus Group seems to be back out and about, and apparently interested in India. The Platinum threat actor continues to prospect Southeast Asian targets with stealthy malware, and a new backdoor. Buran tries to take black market share in the ransomware-as-a-service souk. Paycard standard compliance is down. And is that a spy ship we see, or are you just looking at the seabed, all for science? Joe Carrigan from JHU ISI with browser vulnerabilities in Chrome and Firefox.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The UK’s Labour Party says it was hacked, but unsuccessfully. The Lazarus Group seems to be back out and about, and apparently interested in India. The Platinum threat actor continues to prospect Southeast Asian targets with stealthy malware, and a new backdoor. Buran tries to take black market share in the ransomware-as-a-service souk. Paycard standard compliance is down. And is that a spy ship we see, or are you just looking at the seabed, all for science? Joe Carrigan from JHU ISI with browser vulnerabilities in Chrome and Firefox.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>993</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7adacb56e1bf4062936ad046860447f6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6473792609.mp3?updated=1690151902" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Andy Greenberg from WIRED on his book "Sandworm." [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/31/notes</link>
      <description>In this CyberWire special edition, a conversation with Andy Greenberg, senior writer at WIRED and author of the new book "Sandworm - A New Era of CyberWar and the Hunt for the Kremlin’s Most Dangerous Hackers." It’s a thrilling investigation of the Olympic Destroyer malware, and an accounting of the new era in which we find ourselves, where nation states can target their adversaries critical infrastructure, and the often unintended consequences that follow.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 11 Nov 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>31</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/d42cec24-df04-11ea-a40f-4fa54ea38829/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Andy Greenberg from WIRED on his book "Sandworm." [Special Editions]</itunes:subtitle>
      <itunes:summary>In this CyberWire special edition, a conversation with Andy Greenberg, senior writer at WIRED and author of the new book "Sandworm - A New Era of CyberWar and the Hunt for the Kremlin’s Most Dangerous Hackers." It’s a thrilling investigation of the Olympic Destroyer malware, and an accounting of the new era in which we find ourselves, where nation states can target their adversaries critical infrastructure, and the often unintended consequences that follow.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this CyberWire special edition, a conversation with Andy Greenberg, senior writer at WIRED and author of the new book "Sandworm - A New Era of CyberWar and the Hunt for the Kremlin’s Most Dangerous Hackers." It’s a thrilling investigation of the Olympic Destroyer malware, and an accounting of the new era in which we find ourselves, where nation states can target their adversaries critical infrastructure, and the often unintended consequences that follow.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1736</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[98d016a54b224711b13d3305c25ba32d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9724240439.mp3?updated=1663090322" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Monitoring the growing sophistication of PKPLUG. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/110/notes</link>
      <description>Researchers from Palo Alto Networks' Unit 42 have been tracking a Chinese cyber espionage group they've named PKPLUG. The group mainly targets victims in the Southeast Asia region. Ryan Olson is VP of threat intelligence at Palo Alto Networks, and he joins us to share their findings.
The original research is here:
 https://unit42.paloaltonetworks.com/pkplug_chinese_cyber_espionage_group_attacking_asia/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Nov 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>110</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/12158b7e-df12-11ea-851c-3b573dc08137/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Monitoring the growing sophistication of PKPLUG. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers from Palo Alto Networks' Unit 42 have been tracking a Chinese cyber espionage group they've named PKPLUG. The group mainly targets victims in the Southeast Asia region. Ryan Olson is VP of threat intelligence at Palo Alto Networks, and he joins us to share their findings.
The original research is here:
 https://unit42.paloaltonetworks.com/pkplug_chinese_cyber_espionage_group_attacking_asia/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers from Palo Alto Networks' Unit 42 have been tracking a Chinese cyber espionage group they've named PKPLUG. The group mainly targets victims in the Southeast Asia region. Ryan Olson is VP of threat intelligence at Palo Alto Networks, and he joins us to share their findings.</p><p>The original research is here:</p><p><a href="https://unit42.paloaltonetworks.com/pkplug_chinese_cyber_espionage_group_attacking_asia/"> https://unit42.paloaltonetworks.com/pkplug_chinese_cyber_espionage_group_attacking_asia/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1385</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c37cb64cc0c24be59a1dcdc757b4afc2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9893331020.mp3?updated=1685107397" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Warnings about Emotet and BlueKeep. Crooks test their stolen cards before the holiday shopping season. Amazon fixes Ring. Chinese security gear allegedly sold as made-in-USA.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/967/notes</link>
      <description>Warnings and advice about Emotet and BlueKeep, both being actively used or exploited in the wild. Two new carding bots are in circulation against e-commerce sites. Expect more of this as criminals test stolen credentials in advance of the holiday shopping season. Amazon fixes a security flaw in its Ring doorbell. A Long Island company is charged with selling bad Chinese security systems as good made-in-USA articles. Michael Sechrist from BAH on preventing supply chain attacks. Guest is Andy Greenberg, senior writer at Wired an author of the book Sandworm — A new era of cyberwar and the hunt for the Kremlin’s most dangerous hackers.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_08.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 08 Nov 2019 21:09:43 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>967</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6e86bc08-def8-11ea-911f-cbc1afc1e117/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Warnings about Emotet and BlueKeep. Crooks test their stolen cards before the holiday shopping season. Amazon fixes Ring. Chinese security gear allegedly sold as made-in-USA.</itunes:subtitle>
      <itunes:summary>Warnings and advice about Emotet and BlueKeep, both being actively used or exploited in the wild. Two new carding bots are in circulation against e-commerce sites. Expect more of this as criminals test stolen credentials in advance of the holiday shopping season. Amazon fixes a security flaw in its Ring doorbell. A Long Island company is charged with selling bad Chinese security systems as good made-in-USA articles. Michael Sechrist from BAH on preventing supply chain attacks. Guest is Andy Greenberg, senior writer at Wired an author of the book Sandworm — A new era of cyberwar and the hunt for the Kremlin’s most dangerous hackers.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_08.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Warnings and advice about Emotet and BlueKeep, both being actively used or exploited in the wild. Two new carding bots are in circulation against e-commerce sites. Expect more of this as criminals test stolen credentials in advance of the holiday shopping season. Amazon fixes a security flaw in its Ring doorbell. A Long Island company is charged with selling bad Chinese security systems as good made-in-USA articles. Michael Sechrist from BAH on preventing supply chain attacks. Guest is Andy Greenberg, senior writer at Wired an author of the book Sandworm — A new era of cyberwar and the hunt for the Kremlin’s most dangerous hackers.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_08.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1488</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eff6d3319afa4010830e17f292128222]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4389755376.mp3?updated=1690153758" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US off-off-year elections go off OK, but don’t get cocky, kids. US charges three in Saudi spy case. Adware dropping apps removed from Google Play. Patch Confluence.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/966/notes</link>
      <description>The US off-off-year elections seem to have gone off largely free of interference, but officials caution that major foreign influence campaigns can be expected in 2020. Three former Twitter employees are charged with spying for Saudi Arabia. The website defacement campaign in Georgia remains unattributed. Google boots seven adware droppers from the Play Store. Phishers are using web analytics for better hauls. And nation-states are targeting unpatched Confluence. Johannes Ullrich from the SANS Technology Institute on encrypted SNI in TLS 1.3 and how that can be used for domain fronting. Guest is Kevin O’Brien from GreatHorn on managing email threats.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_07.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 07 Nov 2019 20:46:45 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>966</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6ea02eae-def8-11ea-911f-fb574c684444/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>US off-off-year elections go off OK, but don’t get cocky, kids. US charges three in Saudi spy case. Adware dropping apps removed from Google Play. Patch Confluence.</itunes:subtitle>
      <itunes:summary>The US off-off-year elections seem to have gone off largely free of interference, but officials caution that major foreign influence campaigns can be expected in 2020. Three former Twitter employees are charged with spying for Saudi Arabia. The website defacement campaign in Georgia remains unattributed. Google boots seven adware droppers from the Play Store. Phishers are using web analytics for better hauls. And nation-states are targeting unpatched Confluence. Johannes Ullrich from the SANS Technology Institute on encrypted SNI in TLS 1.3 and how that can be used for domain fronting. Guest is Kevin O’Brien from GreatHorn on managing email threats.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_07.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US off-off-year elections seem to have gone off largely free of interference, but officials caution that major foreign influence campaigns can be expected in 2020. Three former Twitter employees are charged with spying for Saudi Arabia. The website defacement campaign in Georgia remains unattributed. Google boots seven adware droppers from the Play Store. Phishers are using web analytics for better hauls. And nation-states are targeting unpatched Confluence. Johannes Ullrich from the SANS Technology Institute on encrypted SNI in TLS 1.3 and how that can be used for domain fronting. Guest is Kevin O’Brien from GreatHorn on managing email threats.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_07.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1320</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f35194add2324c279233256a83e21480]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2727527206.mp3?updated=1690153732" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>App developers had access to more Facebook Group data than intended. Election security and disinformation. DarkUniverse described. Millions lost to business email compromise.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/965/notes</link>
      <description>Facebook closes a hole in Group data access. US authorities seek to reassure Congress and the public concerning the security of election infrastructure. Disinformation remains a challenge, however, as the US prepares for the 2020 elections. Criminals catch Potomac fever as they use politicians’ names and likenesses as an aid to distributing malware. Kaspersky outlines the now-shuttered DarkUniverse campaign. And Nikkei America loses millions to a BEC scam. Justin Harvey from Accenture on automated incident response. Carole Theriault speaks with Kristen Poulos from Tripwire on protecting the IoT.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_06.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 06 Nov 2019 20:53:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>965</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6eb41f72-def8-11ea-911f-87e10d9f5432/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>App developers had access to more Facebook Group data than intended. Election security and disinformation. DarkUniverse described. Millions lost to business email compromise.</itunes:subtitle>
      <itunes:summary>Facebook closes a hole in Group data access. US authorities seek to reassure Congress and the public concerning the security of election infrastructure. Disinformation remains a challenge, however, as the US prepares for the 2020 elections. Criminals catch Potomac fever as they use politicians’ names and likenesses as an aid to distributing malware. Kaspersky outlines the now-shuttered DarkUniverse campaign. And Nikkei America loses millions to a BEC scam. Justin Harvey from Accenture on automated incident response. Carole Theriault speaks with Kristen Poulos from Tripwire on protecting the IoT.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_06.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Facebook closes a hole in Group data access. US authorities seek to reassure Congress and the public concerning the security of election infrastructure. Disinformation remains a challenge, however, as the US prepares for the 2020 elections. Criminals catch Potomac fever as they use politicians’ names and likenesses as an aid to distributing malware. Kaspersky outlines the now-shuttered DarkUniverse campaign. And Nikkei America loses millions to a BEC scam. Justin Harvey from Accenture on automated incident response. Carole Theriault speaks with Kristen Poulos from Tripwire on protecting the IoT.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_06.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1328</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c12df7fdc9a04d518b578bd335c1c6dc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4647702916.mp3?updated=1690153715" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware in Spain. Pegasus in India. TikTok on the Huawei highway? Booz Allen predicts! And good dogs sniff out bad data.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/964/notes</link>
      <description>Ransomware hits Spanish companies. Pegasus continues to excite controversy in India. TikTok applies for Big Tech’s good-citizen club, but has apparently so far been blackballed. Booz Allen offers nine predictions for 2020: balkanization, supply chain threats, automotive data theft, war-droning, satellite hacks, tougher attribution, election interference, missiles against malware, and Olympic interference. And good dogs go after bad guys’ data storage devices. Ben Yelin from UMD CHHS on AT&amp;T’s claims that they cannot be sued for selling location data to bounty hunters.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_05.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Nov 2019 20:47:37 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>964</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6eca8d0c-def8-11ea-911f-73a8de31cca1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ransomware in Spain. Pegasus in India. TikTok on the Huawei highway? Booz Allen predicts! And good dogs sniff out bad data.</itunes:subtitle>
      <itunes:summary>Ransomware hits Spanish companies. Pegasus continues to excite controversy in India. TikTok applies for Big Tech’s good-citizen club, but has apparently so far been blackballed. Booz Allen offers nine predictions for 2020: balkanization, supply chain threats, automotive data theft, war-droning, satellite hacks, tougher attribution, election interference, missiles against malware, and Olympic interference. And good dogs go after bad guys’ data storage devices. Ben Yelin from UMD CHHS on AT&amp;T’s claims that they cannot be sued for selling location data to bounty hunters.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_05.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ransomware hits Spanish companies. Pegasus continues to excite controversy in India. TikTok applies for Big Tech’s good-citizen club, but has apparently so far been blackballed. Booz Allen offers nine predictions for 2020: balkanization, supply chain threats, automotive data theft, war-droning, satellite hacks, tougher attribution, election interference, missiles against malware, and Olympic interference. And good dogs go after bad guys’ data storage devices. Ben Yelin from UMD CHHS on AT&amp;T’s claims that they cannot be sued for selling location data to bounty hunters.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_05.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1032</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7b52a2a335e84716ad64694082e00813]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8484823143.mp3?updated=1690153694" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BlueKeep is exploited for cryptojacking. Ransomware hits Canadian provincial government. Pegasus lands in India. Magecart, GandCrab updates. US Cyber Command deploys to Montenegro.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/963/notes</link>
      <description>BlueKeep is being exploited in the wild, not too seriously, yet, but you should still patch. Nunavut’s government is recovering from a ransomware attack is sustained Saturday morning. The NSO Group controversy spreads into an Indian politcal dust-up. Different Magecart groups are found to be be independently hitting the same victims. GandCrab provided a new template for the cyber underworld. And US Cyber Command deploys to Montenegro. Joe Carrigan with thoughts on the Coalfire pentesters criminal case.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_04.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 04 Nov 2019 20:53:56 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>963</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6ee97a96-def8-11ea-911f-9f27337a6ca1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>BlueKeep is exploited for cryptojacking. Ransomware hits Canadian provincial government. Pegasus lands in India. Magecart, GandCrab updates. US Cyber Command deploys to Montenegro.</itunes:subtitle>
      <itunes:summary>BlueKeep is being exploited in the wild, not too seriously, yet, but you should still patch. Nunavut’s government is recovering from a ransomware attack is sustained Saturday morning. The NSO Group controversy spreads into an Indian politcal dust-up. Different Magecart groups are found to be be independently hitting the same victims. GandCrab provided a new template for the cyber underworld. And US Cyber Command deploys to Montenegro. Joe Carrigan with thoughts on the Coalfire pentesters criminal case.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_04.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>BlueKeep is being exploited in the wild, not too seriously, yet, but you should still patch. Nunavut’s government is recovering from a ransomware attack is sustained Saturday morning. The NSO Group controversy spreads into an Indian politcal dust-up. Different Magecart groups are found to be be independently hitting the same victims. GandCrab provided a new template for the cyber underworld. And US Cyber Command deploys to Montenegro. Joe Carrigan with thoughts on the Coalfire pentesters criminal case.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_04.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>988</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[25302763a23440d6ad3e4402c3b42560]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5950070541.mp3?updated=1690153676" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Insider Threats [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/30/notes</link>
      <description>What’s an insider threat? Loosely, it’s a threat that operates from within your organization. In this CyberWire special edition, our UK correspondent Carole Theriault speaks with experts who’ll talk us through the different ways insider threats manifest themselves. 
A quick note - when Carole interviewed Dr. Richard Ford he was with Forcepoint. He’s since moved on to Cyren.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 03 Nov 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>30</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/d1857612-df04-11ea-bc93-e336ba9cbb1d/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Insider Threats [Special Editions]</itunes:subtitle>
      <itunes:summary>What’s an insider threat? Loosely, it’s a threat that operates from within your organization. In this CyberWire special edition, our UK correspondent Carole Theriault speaks with experts who’ll talk us through the different ways insider threats manifest themselves. 
A quick note - when Carole interviewed Dr. Richard Ford he was with Forcepoint. He’s since moved on to Cyren.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>What’s an insider threat? Loosely, it’s a threat that operates from within your organization. In this CyberWire special edition, our UK correspondent Carole Theriault speaks with experts who’ll talk us through the different ways insider threats manifest themselves. </p><p>A quick note - when Carole interviewed Dr. Richard Ford he was with Forcepoint. He’s since moved on to Cyren.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1523</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e21ad5214fd24cc78b55c8a2f2b25f78]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6560861853.mp3?updated=1663090495" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Usable security is a delicate balance. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/109/notes</link>
      <description>Until recently, usability was often an afterthought when developing security tools. These days there's growing realization that usability is a fundamental part of security. Lorrie Cranor is director of the CyLab Usable Privacy and Security lab (CUPS) at Carnegie Mellon University. She shares the work she's been doing with her colleagues and students to improve security through usability.
The research can be found here:
https://www.cylab.cmu.edu/news/2019/07/29-usability-history.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Nov 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>109</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0d9d3d3a-df12-11ea-9d6e-13fd122bd84d/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Usable security is a delicate balance. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Until recently, usability was often an afterthought when developing security tools. These days there's growing realization that usability is a fundamental part of security. Lorrie Cranor is director of the CyLab Usable Privacy and Security lab (CUPS) at Carnegie Mellon University. She shares the work she's been doing with her colleagues and students to improve security through usability.
The research can be found here:
https://www.cylab.cmu.edu/news/2019/07/29-usability-history.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Until recently, usability was often an afterthought when developing security tools. These days there's growing realization that usability is a fundamental part of security. Lorrie Cranor is director of the CyLab Usable Privacy and Security lab (CUPS) at Carnegie Mellon University. She shares the work she's been doing with her colleagues and students to improve security through usability.</p><p>The research can be found here:</p><p><a href="https://www.cylab.cmu.edu/news/2019/07/29-usability-history.html">https://www.cylab.cmu.edu/news/2019/07/29-usability-history.html</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1230</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fc78e48f88fa4ce099de26c363b763f0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1992337078.mp3?updated=1685106907" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber espionage. Russia tries Web autarky. The US will investigate TikTok. A bad keyboard app is out of Google Play but still in circulation. Crime comes to e-sports. Happy hundredth, GCHQ. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/962/notes</link>
      <description>FireEye warns of Messagetap malware and its spying on SMS. NSO Group’s Pegasus troubles seem to be expanding. Russia prepares to disconnect its Internet. The US opens a national security investigation into TikTok. An Android keyboard app is making bogus purchases and doing other adware stuff. E-sports draw criminal attention. And happy birthday, GCHQ. Robert M. Lee from Dragos on why it’s important for him to set aside time for teaching. Guest is Phil Quade from Fortinet on his recently published book, The Digital Big Bang, which makes an analogy between the Big Bang that created our Universe, and the explosion of bits &amp; chaos in humankind’s age of cyber.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_01.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 01 Nov 2019 19:34:02 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>962</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6f1684a0-def8-11ea-911f-077432e9a3fb/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyber espionage. Russia tries Web autarky. The US will investigate TikTok. A bad keyboard app is out of Google Play but still in circulation. Crime comes to e-sports. Happy hundredth, GCHQ. </itunes:subtitle>
      <itunes:summary>FireEye warns of Messagetap malware and its spying on SMS. NSO Group’s Pegasus troubles seem to be expanding. Russia prepares to disconnect its Internet. The US opens a national security investigation into TikTok. An Android keyboard app is making bogus purchases and doing other adware stuff. E-sports draw criminal attention. And happy birthday, GCHQ. Robert M. Lee from Dragos on why it’s important for him to set aside time for teaching. Guest is Phil Quade from Fortinet on his recently published book, The Digital Big Bang, which makes an analogy between the Big Bang that created our Universe, and the explosion of bits &amp; chaos in humankind’s age of cyber.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_01.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>FireEye warns of Messagetap malware and its spying on SMS. NSO Group’s Pegasus troubles seem to be expanding. Russia prepares to disconnect its Internet. The US opens a national security investigation into TikTok. An Android keyboard app is making bogus purchases and doing other adware stuff. E-sports draw criminal attention. And happy birthday, GCHQ. Robert M. Lee from Dragos on why it’s important for him to set aside time for teaching. Guest is Phil Quade from Fortinet on his recently published book, The Digital Big Bang, which makes an analogy between the Big Bang that created our Universe, and the explosion of bits &amp; chaos in humankind’s age of cyber.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/November/CyberWire_2019_11_01.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1586</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[308bc602ed7345338200625dee1126cc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6800637580.mp3?updated=1608756303" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Malware in nuclear plant business system, but not in control systems. Facebook versus inauthenticity and spyware. Twitter refuses political ads. NIST wants comments. Cyber risk a factor in credit ratings. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/961/notes</link>
      <description>The Kudankulam Nuclear Power Plant confirms it had malware in a business system, but that control systems were unaffected. Franchising coordinated inauthenticity. Facebook deletes NSO Group employees. Twitter says it will no longer accept political ads. NIST wants your comments. And Moody’s appears ready to consider cyber risk in its credit ratings. Ben Yelin from UMD CHHS on Europeans' right to repair. Guest is part two of my interview with Tanya Janca from Security Sidekick on web application inventory and vulnerability discovery.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_31.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 31 Oct 2019 18:27:55 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>961</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6f2debfe-def8-11ea-911f-831e524b3d65/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Malware in nuclear plant business system, but not in control systems. Facebook versus inauthenticity and spyware. Twitter refuses political ads. NIST wants comments. Cyber risk a factor in credit ratings. </itunes:subtitle>
      <itunes:summary>The Kudankulam Nuclear Power Plant confirms it had malware in a business system, but that control systems were unaffected. Franchising coordinated inauthenticity. Facebook deletes NSO Group employees. Twitter says it will no longer accept political ads. NIST wants your comments. And Moody’s appears ready to consider cyber risk in its credit ratings. Ben Yelin from UMD CHHS on Europeans' right to repair. Guest is part two of my interview with Tanya Janca from Security Sidekick on web application inventory and vulnerability discovery.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_31.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Kudankulam Nuclear Power Plant confirms it had malware in a business system, but that control systems were unaffected. Franchising coordinated inauthenticity. Facebook deletes NSO Group employees. Twitter says it will no longer accept political ads. NIST wants your comments. And Moody’s appears ready to consider cyber risk in its credit ratings. Ben Yelin from UMD CHHS on Europeans' right to repair. Guest is part two of my interview with Tanya Janca from Security Sidekick on web application inventory and vulnerability discovery.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_31.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1335</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9e3cdf9280e74c2f8a7ac4f752b169af]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5620850964.mp3?updated=1690153627" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>WhatsApp sues NSO Group over Pegasus distribution. Georgia continues its recovery, as does Johannesburg. Facebook stops more inauthentic action. A Bed, Bath, and Beyond breach.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/960/notes</link>
      <description>WhatsApp sues NSO Group for spreading Pegasus intercept software through WhatsApp’s service. Georgia continues its recovery from the large website defacement campaign it suffered at the beginning of the week. Facebook ejects more inauthenticity. Johannesburg hangs tough on cyber extortion. Money laundering finds its way into online games. Norsk Hydro’s insurance claim. An update on pentesting in Iowa. And Bed, Bath, and Beyond sustains a data breach.  Awais Rashid from Bristol University on securing large scale infrastructure. Guest is Tanya Janca from Security Sidekick on finding mentors and starting her own company.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 30 Oct 2019 19:35:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>960</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6f415284-def8-11ea-911f-0306f3a6e84e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>WhatsApp sues NSO Group over Pegasus distribution. Georgia continues its recovery, as does Johannesburg. Facebook stops more inauthentic action. A Bed, Bath, and Beyond breach.</itunes:subtitle>
      <itunes:summary>WhatsApp sues NSO Group for spreading Pegasus intercept software through WhatsApp’s service. Georgia continues its recovery from the large website defacement campaign it suffered at the beginning of the week. Facebook ejects more inauthenticity. Johannesburg hangs tough on cyber extortion. Money laundering finds its way into online games. Norsk Hydro’s insurance claim. An update on pentesting in Iowa. And Bed, Bath, and Beyond sustains a data breach.  Awais Rashid from Bristol University on securing large scale infrastructure. Guest is Tanya Janca from Security Sidekick on finding mentors and starting her own company.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>WhatsApp sues NSO Group for spreading Pegasus intercept software through WhatsApp’s service. Georgia continues its recovery from the large website defacement campaign it suffered at the beginning of the week. Facebook ejects more inauthenticity. Johannesburg hangs tough on cyber extortion. Money laundering finds its way into online games. Norsk Hydro’s insurance claim. An update on pentesting in Iowa. And Bed, Bath, and Beyond sustains a data breach.  Awais Rashid from Bristol University on securing large scale infrastructure. Guest is Tanya Janca from Security Sidekick on finding mentors and starting her own company.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1334</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e63be5c1d2a248d7b060cde292b1e8e5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1065811845.mp3?updated=1690153610" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fancy Bear paws at anti-doping agencies. Johannesburg says no to the Shadow Kill Hackers. Adwind jRAT’s new misdirection. US FCC versus Huawei, ZTE. Georgia hacked. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/959/notes</link>
      <description>Fancy Bear is pawing at anti-doping agencies, again, suggesting more to come for the 2020 Tokyo Olympics. Johannesburg has declined to pay the Shadow Kill Hackers the money they demanded. Adwind jRAT has gotten a bit harder to detect. The US FCC is considering a measure that would prevent certain funds from being used to purchase Huawei or ZTE gear. Pwn2Own goes ICS. Georgia is hit by unknown hackers, and Magecart appears in an American Cancer Society website. Daniel Prince from Lancaster University on risk management and uncertainty. Guest is Robb Reck from Ping Identity with their research, 5 Steps to Improve API Security.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Oct 2019 19:47:56 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>959</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6f5804c0-def8-11ea-911f-3f6a41ac15f2/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fancy Bear paws at anti-doping agencies. Johannesburg says no to the Shadow Kill Hackers. Adwind jRAT’s new misdirection. US FCC versus Huawei, ZTE. Georgia hacked. </itunes:subtitle>
      <itunes:summary>Fancy Bear is pawing at anti-doping agencies, again, suggesting more to come for the 2020 Tokyo Olympics. Johannesburg has declined to pay the Shadow Kill Hackers the money they demanded. Adwind jRAT has gotten a bit harder to detect. The US FCC is considering a measure that would prevent certain funds from being used to purchase Huawei or ZTE gear. Pwn2Own goes ICS. Georgia is hit by unknown hackers, and Magecart appears in an American Cancer Society website. Daniel Prince from Lancaster University on risk management and uncertainty. Guest is Robb Reck from Ping Identity with their research, 5 Steps to Improve API Security.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Fancy Bear is pawing at anti-doping agencies, again, suggesting more to come for the 2020 Tokyo Olympics. Johannesburg has declined to pay the Shadow Kill Hackers the money they demanded. Adwind jRAT has gotten a bit harder to detect. The US FCC is considering a measure that would prevent certain funds from being used to purchase Huawei or ZTE gear. Pwn2Own goes ICS. Georgia is hit by unknown hackers, and Magecart appears in an American Cancer Society website. Daniel Prince from Lancaster University on risk management and uncertainty. Guest is Robb Reck from Ping Identity with their research, 5 Steps to Improve API Security.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1350</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3f45e068a8fb4a85a32876fbaf62dc49]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7692263030.mp3?updated=1690153412" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Actionable intelligence, and the difficulty of cutting through noise. Extortion hits Johannesburg. Criminal-to-criminal markets. Who’s more vulnerable to phishing, the old or the young?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/958/notes</link>
      <description>Actionable intelligence, culling signal from noise, and the online resilience of threat groups. Ransomware hits a legal case management system. The city of Johannesburg continues its recovery from an online extortion attempt. The Raccoon information stealer looks like a disruptive product in the criminal-to-criminal market: not the best, but good enough, and cheaper than the high-end alternatives. And who’s more vulnerable to scams: seniors or young adults? It’s complicated.  Joe Carrigan from JHU ISI on Metasploit as a tool for good or bad.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_28.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 28 Oct 2019 19:12:16 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>958</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6f7189a4-def8-11ea-911f-9f9f8902816e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Actionable intelligence, and the difficulty of cutting through noise. Extortion hits Johannesburg. Criminal-to-criminal markets. Who’s more vulnerable to phishing, the old or the young?</itunes:subtitle>
      <itunes:summary>Actionable intelligence, culling signal from noise, and the online resilience of threat groups. Ransomware hits a legal case management system. The city of Johannesburg continues its recovery from an online extortion attempt. The Raccoon information stealer looks like a disruptive product in the criminal-to-criminal market: not the best, but good enough, and cheaper than the high-end alternatives. And who’s more vulnerable to scams: seniors or young adults? It’s complicated.  Joe Carrigan from JHU ISI on Metasploit as a tool for good or bad.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_28.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Actionable intelligence, culling signal from noise, and the online resilience of threat groups. Ransomware hits a legal case management system. The city of Johannesburg continues its recovery from an online extortion attempt. The Raccoon information stealer looks like a disruptive product in the criminal-to-criminal market: not the best, but good enough, and cheaper than the high-end alternatives. And who’s more vulnerable to scams: seniors or young adults? It’s complicated.  Joe Carrigan from JHU ISI on Metasploit as a tool for good or bad.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_28.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1017</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[081756e65b3849cfa72a0b4d4bf0c632]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2087763455.mp3?updated=1690153392" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Masad Steals via Social Media. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/108/notes</link>
      <description>Researchers at Juniper Networks have been tracking a trojan they call Masad Stealer, which uses the Telegram instant messaging platform for part it its command and control infrastructure. (Telegram wasn't hacked; it's the innocent conduit.) Mounir Hahad is head of Juniper Threat Labs at Juniper Networks and he joins us to share their findings
The original research is here:
 https://forums.juniper.net/t5/Threat-Research/Masad-Stealer-Exfiltrating-using-Telegram/ba-p/468559
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Oct 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>108</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0a016912-df12-11ea-9dfb-8fa43c7689ae/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Masad Steals via Social Media. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at Juniper Networks have been tracking a trojan they call Masad Stealer, which uses the Telegram instant messaging platform for part it its command and control infrastructure. (Telegram wasn't hacked; it's the innocent conduit.) Mounir Hahad is head of Juniper Threat Labs at Juniper Networks and he joins us to share their findings
The original research is here:
 https://forums.juniper.net/t5/Threat-Research/Masad-Stealer-Exfiltrating-using-Telegram/ba-p/468559
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Juniper Networks have been tracking a trojan they call Masad Stealer, which uses the Telegram instant messaging platform for part it its command and control infrastructure. (Telegram wasn't hacked; it's the innocent conduit.) Mounir Hahad is head of Juniper Threat Labs at Juniper Networks and he joins us to share their findings</p><p>The original research is here:</p><p><a href="https://forums.juniper.net/t5/Threat-Research/Masad-Stealer-Exfiltrating-using-Telegram/ba-p/468559"> https://forums.juniper.net/t5/Threat-Research/Masad-Stealer-Exfiltrating-using-Telegram/ba-p/468559</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1204</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a5b2311d9f744da78bf15f65c25ca6f8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3208884243.mp3?updated=1685106898" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Spearphishing the UN and NGOs. Clickware kicked out of app stores. ICS security notes. Close-reading the Turla false-flag reports. A good use for the dark web. Senators call for investigations.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/957/notes</link>
      <description>A spearphishing campaign is found targeting humanitarian, aid, and policy organizaitons. Google and Apple remove clickfraud-infested apps from their stores. A last look back at SecurityWeek’s 2019 ICS Cyber Security Conference, which wrapped up in Atlanta yesterday afternoon. Close- reading GCHQ and NSA advisories. The BBC takes to the dark web, in a good way. And Senators call for investigations of Amazon and TikTok. David Dufour from Webroot with research on phishing. Guest is Jeremy N. Smith, author and host of The Hacker Next Door podcast.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_25
 .html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 25 Oct 2019 19:51:40 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>957</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6f8308b4-def8-11ea-911f-2be3fa3efec5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Spearphishing the UN and NGOs. Clickware kicked out of app stores. ICS security notes. Close-reading the Turla false-flag reports. A good use for the dark web. Senators call for investigations.</itunes:subtitle>
      <itunes:summary>A spearphishing campaign is found targeting humanitarian, aid, and policy organizaitons. Google and Apple remove clickfraud-infested apps from their stores. A last look back at SecurityWeek’s 2019 ICS Cyber Security Conference, which wrapped up in Atlanta yesterday afternoon. Close- reading GCHQ and NSA advisories. The BBC takes to the dark web, in a good way. And Senators call for investigations of Amazon and TikTok. David Dufour from Webroot with research on phishing. Guest is Jeremy N. Smith, author and host of The Hacker Next Door podcast.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_25
 .html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A spearphishing campaign is found targeting humanitarian, aid, and policy organizaitons. Google and Apple remove clickfraud-infested apps from their stores. A last look back at SecurityWeek’s 2019 ICS Cyber Security Conference, which wrapped up in Atlanta yesterday afternoon. Close- reading GCHQ and NSA advisories. The BBC takes to the dark web, in a good way. And Senators call for investigations of Amazon and TikTok. David Dufour from Webroot with research on phishing. Guest is Jeremy N. Smith, author and host of The Hacker Next Door podcast.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p><a href="https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_25"> https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_25</a></p> <p>.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1673</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9ffce0c33c6741368c53e236264ed632]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6530076936.mp3?updated=1608756312" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Clouds are back after being out. Bitpaymer hits German manufacturer. Cross-plaform mobile malware.  SecurityWeek’s 2019 ICS Cyber Security Conference.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/956/notes</link>
      <description>AWS and Google Cloud are back up after early week unrelated outages. A German automation tool manufacturer discloses a ransomware infestation. Mobile malware in the spies’ toolkit. The FBI’s Protected Voices share election secuirty informaiton. Notes from SecurityWeek’s 2019 ICS Cyber Security Conference. NCSC’s annual report. And people have things to say about backdoors, bribes, and those aliens at Area 51. (Chemtrails, too.) Craig Williams from Cisco Talos with an update on Emotet. Guest is Dave Weinstein from Claroty discussing threats to critical infrastructure.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_24.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 24 Oct 2019 18:34:43 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>956</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6f94b8a2-def8-11ea-911f-ab0f9653214c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Clouds are back after being out. Bitpaymer hits German manufacturer. Cross-plaform mobile malware.  SecurityWeek’s 2019 ICS Cyber Security Conference.</itunes:subtitle>
      <itunes:summary>AWS and Google Cloud are back up after early week unrelated outages. A German automation tool manufacturer discloses a ransomware infestation. Mobile malware in the spies’ toolkit. The FBI’s Protected Voices share election secuirty informaiton. Notes from SecurityWeek’s 2019 ICS Cyber Security Conference. NCSC’s annual report. And people have things to say about backdoors, bribes, and those aliens at Area 51. (Chemtrails, too.) Craig Williams from Cisco Talos with an update on Emotet. Guest is Dave Weinstein from Claroty discussing threats to critical infrastructure.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_24.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>AWS and Google Cloud are back up after early week unrelated outages. A German automation tool manufacturer discloses a ransomware infestation. Mobile malware in the spies’ toolkit. The FBI’s Protected Voices share election secuirty informaiton. Notes from SecurityWeek’s 2019 ICS Cyber Security Conference. NCSC’s annual report. And people have things to say about backdoors, bribes, and those aliens at Area 51. (Chemtrails, too.) Craig Williams from Cisco Talos with an update on Emotet. Guest is Dave Weinstein from Claroty discussing threats to critical infrastructure.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_24.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1363</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[715b4f1a571a4be8b41c4a7c39021882]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5176600249.mp3?updated=1690153344" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Criminal connections. The risky business of acquisition. Joker is back, and it’s not funny. Most dangerous celebrities. Notes from SecurityWeek’s ICS Cyber Security Conference. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/955/notes</link>
      <description>Magecart Group 5 is linked to the Carbanak gang. Another recently acquired reservation systems brings a headache to hospitality. Another app is found to carry the Joker malware. Some more notes from SecurityWeek’s ICS Cyber Security Conference in Atlanta, where the emphasis remains on attention to detail and taking care of first things first. And a list of the most dangerous celebrities offers a peek into the bad actors’ tackle box. Ben Yelin from UMD CHHS on a federal injunction against a company scraping user profiles from LinkedIn. Guest is Mandy Rogers from Northrop Grumman, on her own professional journey and the importance of diversity.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_23.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 23 Oct 2019 20:05:46 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>955</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6faeaa00-def8-11ea-911f-df44b7f53b11/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Criminal connections. The risky business of acquisition. Joker is back, and it’s not funny. Most dangerous celebrities. Notes from SecurityWeek’s ICS Cyber Security Conference. </itunes:subtitle>
      <itunes:summary>Magecart Group 5 is linked to the Carbanak gang. Another recently acquired reservation systems brings a headache to hospitality. Another app is found to carry the Joker malware. Some more notes from SecurityWeek’s ICS Cyber Security Conference in Atlanta, where the emphasis remains on attention to detail and taking care of first things first. And a list of the most dangerous celebrities offers a peek into the bad actors’ tackle box. Ben Yelin from UMD CHHS on a federal injunction against a company scraping user profiles from LinkedIn. Guest is Mandy Rogers from Northrop Grumman, on her own professional journey and the importance of diversity.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_23.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Magecart Group 5 is linked to the Carbanak gang. Another recently acquired reservation systems brings a headache to hospitality. Another app is found to carry the Joker malware. Some more notes from SecurityWeek’s ICS Cyber Security Conference in Atlanta, where the emphasis remains on attention to detail and taking care of first things first. And a list of the most dangerous celebrities offers a peek into the bad actors’ tackle box. Ben Yelin from UMD CHHS on a federal injunction against a company scraping user profiles from LinkedIn. Guest is Mandy Rogers from Northrop Grumman, on her own professional journey and the importance of diversity.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_23.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1333</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a9690fbcb5f8421e9733ed400d3d19c6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5936325553.mp3?updated=1690153329" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More coordinated inauthenticity taken down. The Westphalian system and cyber conflict. VPNs and an AV company sustain incidents. Assange and extradition.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/954/notes</link>
      <description>Facebook takes down more coordinated inauthenticity from Iran and Russia, and announces a new transparency policy about news sources. The former NSA Director schools an ICS security audience on the Westphalian system. Three VPNs and one antivirus provider sustain breaches that may be contained, but that may also derive from exploitation of phantom accounts. Microsoft gets more EU scrutiny. And Mr. Assange gets another day in court.  Johannes Ullrich from the SANS Technology Institute on phishing targeting the financial industry. Guest is Ori Eisen from Trusona on moving beyond phone numbers, usernames and passwords online.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_22.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Oct 2019 20:09:19 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>954</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6fc224e0-def8-11ea-911f-539c6082ea54/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>More coordinated inauthenticity taken down. The Westphalian system and cyber conflict. VPNs and an AV company sustain incidents. Assange and extradition.</itunes:subtitle>
      <itunes:summary>Facebook takes down more coordinated inauthenticity from Iran and Russia, and announces a new transparency policy about news sources. The former NSA Director schools an ICS security audience on the Westphalian system. Three VPNs and one antivirus provider sustain breaches that may be contained, but that may also derive from exploitation of phantom accounts. Microsoft gets more EU scrutiny. And Mr. Assange gets another day in court.  Johannes Ullrich from the SANS Technology Institute on phishing targeting the financial industry. Guest is Ori Eisen from Trusona on moving beyond phone numbers, usernames and passwords online.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_22.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Facebook takes down more coordinated inauthenticity from Iran and Russia, and announces a new transparency policy about news sources. The former NSA Director schools an ICS security audience on the Westphalian system. Three VPNs and one antivirus provider sustain breaches that may be contained, but that may also derive from exploitation of phantom accounts. Microsoft gets more EU scrutiny. And Mr. Assange gets another day in court.  Johannes Ullrich from the SANS Technology Institute on phishing targeting the financial industry. Guest is Ori Eisen from Trusona on moving beyond phone numbers, usernames and passwords online.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_22.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1386</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[83b6f996ff474122ada5f7a406713e76]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7549255365.mp3?updated=1690153239" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Not every incident is necessarily an attack. Not everything that purrs is a kitten (sometimes it’s a bear that would like you to think it’s a kitten). ICS security notes. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/953/notes</link>
      <description>Some notes on not jumping to conclusions that incidents are cyber attacks. A false flag operation shows the difficulty of attribution: not everything that purrs is a kitten, because sometimes it’s a bear. Notes from the ISC Security Conference in Atlanta, including some reflections on the criminal market’s business cycle, the dangers of social engineering, and the importance of attending to the fundamentals. And the Vatican fixes a bug. Joe Carrigan from JHU ISI on the ease with which one’s identity can be determined using previously anonymized data sets.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_21.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 21 Oct 2019 19:52:19 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>953</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6fd5b3c0-def8-11ea-911f-83c669816480/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Not every incident is necessarily an attack. Not everything that purrs is a kitten (sometimes it’s a bear that would like you to think it’s a kitten). ICS security notes. </itunes:subtitle>
      <itunes:summary>Some notes on not jumping to conclusions that incidents are cyber attacks. A false flag operation shows the difficulty of attribution: not everything that purrs is a kitten, because sometimes it’s a bear. Notes from the ISC Security Conference in Atlanta, including some reflections on the criminal market’s business cycle, the dangers of social engineering, and the importance of attending to the fundamentals. And the Vatican fixes a bug. Joe Carrigan from JHU ISI on the ease with which one’s identity can be determined using previously anonymized data sets.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_21.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Some notes on not jumping to conclusions that incidents are cyber attacks. A false flag operation shows the difficulty of attribution: not everything that purrs is a kitten, because sometimes it’s a bear. Notes from the ISC Security Conference in Atlanta, including some reflections on the criminal market’s business cycle, the dangers of social engineering, and the importance of attending to the fundamentals. And the Vatican fixes a bug. Joe Carrigan from JHU ISI on the ease with which one’s identity can be determined using previously anonymized data sets.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_21.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1023</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5da735c0bfea4ea882b64196bcbf681a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8426793523.mp3?updated=1690152578" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hoping for SOHO security. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/107/notes</link>
      <description>Researchers at Independent Security Evaluators (ISE) recently published a report titled SOHOpelessly Broken 2.0, Security Vulnerabilities in Network Accessible Services. This publication continues and expands previous work they did examining small office/home office (SOHO) routers, network-attached storage devices (NAS), and IP cameras. 
Shaun Mirani is a security analyst at ISE, and he joins us to share their findings. 

The original research is here:
https://www.ise.io/whitepaper/sohopelessly-broken-2/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Oct 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>107</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/074f9e3c-df12-11ea-9c25-17fc00f932ce/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hoping for SOHO security. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at Independent Security Evaluators (ISE) recently published a report titled SOHOpelessly Broken 2.0, Security Vulnerabilities in Network Accessible Services. This publication continues and expands previous work they did examining small office/home office (SOHO) routers, network-attached storage devices (NAS), and IP cameras. 
Shaun Mirani is a security analyst at ISE, and he joins us to share their findings. 

The original research is here:
https://www.ise.io/whitepaper/sohopelessly-broken-2/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Independent Security Evaluators (ISE) recently published a report titled SOHOpelessly Broken 2.0, Security Vulnerabilities in Network Accessible Services. This publication continues and expands previous work they did examining small office/home office (SOHO) routers, network-attached storage devices (NAS), and IP cameras. </p><p>Shaun Mirani is a security analyst at ISE, and he joins us to share their findings. </p><p><br></p><p>The original research is here:</p><p><a href="https://www.ise.io/whitepaper/sohopelessly-broken-2/">https://www.ise.io/whitepaper/sohopelessly-broken-2/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1065</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f228f639c0d2491aace468b3b46cdad5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9797016749.mp3?updated=1685106884" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Clickfraud and third-parties (both SDKs and stores). Trojanized TOR browser steals from Russian users. WiFi bugs. Sketchy jailbreak. Big Tech on free speech. Cooperation against terrorism.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/952/notes</link>
      <description>Clickfraud arrives via a third-party SDK, and the app developers who used it say they didn’t know nuthin’. Maybe they didn’t. A Trojanized TOR browser warns its bro’s that, whoa, you’re out of date and the police might see you, but it’s really just stealing the bros’ alt-coin. WiFi bugs are fixed in Kindle and Alexa. Don’t try to jailbreak your iPhone from a sketchy Checkrain site. Two Big Tech companies take different directions on free speech. And Russia gets an assist from Uncle Sam. Craig Williams from Cisco Talos on a Tortoiseshell creating a fake veteran’s job site. Guest is Caleb Barlow from Cynergistek on the challenges of securing medical records.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_18.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 18 Oct 2019 19:46:15 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>952</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6fef3d68-def8-11ea-911f-23015920f281/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Clickfraud and third-parties (both SDKs and stores). Trojanized TOR browser steals from Russian users. WiFi bugs. Sketchy jailbreak. Big Tech on free speech. Cooperation against terrorism.</itunes:subtitle>
      <itunes:summary>Clickfraud arrives via a third-party SDK, and the app developers who used it say they didn’t know nuthin’. Maybe they didn’t. A Trojanized TOR browser warns its bro’s that, whoa, you’re out of date and the police might see you, but it’s really just stealing the bros’ alt-coin. WiFi bugs are fixed in Kindle and Alexa. Don’t try to jailbreak your iPhone from a sketchy Checkrain site. Two Big Tech companies take different directions on free speech. And Russia gets an assist from Uncle Sam. Craig Williams from Cisco Talos on a Tortoiseshell creating a fake veteran’s job site. Guest is Caleb Barlow from Cynergistek on the challenges of securing medical records.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_18.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Clickfraud arrives via a third-party SDK, and the app developers who used it say they didn’t know nuthin’. Maybe they didn’t. A Trojanized TOR browser warns its bro’s that, whoa, you’re out of date and the police might see you, but it’s really just stealing the bros’ alt-coin. WiFi bugs are fixed in Kindle and Alexa. Don’t try to jailbreak your iPhone from a sketchy Checkrain site. Two Big Tech companies take different directions on free speech. And Russia gets an assist from Uncle Sam. Craig Williams from Cisco Talos on a Tortoiseshell creating a fake veteran’s job site. Guest is Caleb Barlow from Cynergistek on the challenges of securing medical records.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_18.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1615</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8604b22203ef45bcad13d48d4315ebe2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1109734353.mp3?updated=1608756323" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cozy Bear never really left. Iran denies it suffered a US cyberattack. Malicious WAV files. Darknet dragnet hauls in child exploitation ring. Graboid infests Docker hosts.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/951/notes</link>
      <description>Cozy Bear isn’t back--Cozy Bear never really left at all. Iran says the Americans are dreaming: there was no cyberattack in retaliation for Iran’s implausibly deniable missile strikes on Saudi oil fields last month. Malicious audio files are dropping cryptominers and reverse shells into victim systems. An international dragnet collars hundreds in a darknet child exploitation sweep. And Graboid is out there, worming its cryptojacker into susceptible Docker hosts. Robert M. Lee from Dragos on their contribution to the Splunk Boss of the SOC (BOTS) capture-the-flag (CTF) competition. Guest is Chris Hickman from Keyfactor on Public Key Infrastructure.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_17.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 17 Oct 2019 19:32:58 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>951</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7003f05a-def8-11ea-911f-73bb360c9194/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cozy Bear never really left. Iran denies it suffered a US cyberattack. Malicious WAV files. Darknet dragnet hauls in child exploitation ring. Graboid infests Docker hosts.</itunes:subtitle>
      <itunes:summary>Cozy Bear isn’t back--Cozy Bear never really left at all. Iran says the Americans are dreaming: there was no cyberattack in retaliation for Iran’s implausibly deniable missile strikes on Saudi oil fields last month. Malicious audio files are dropping cryptominers and reverse shells into victim systems. An international dragnet collars hundreds in a darknet child exploitation sweep. And Graboid is out there, worming its cryptojacker into susceptible Docker hosts. Robert M. Lee from Dragos on their contribution to the Splunk Boss of the SOC (BOTS) capture-the-flag (CTF) competition. Guest is Chris Hickman from Keyfactor on Public Key Infrastructure.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_17.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cozy Bear isn’t back--Cozy Bear never really left at all. Iran says the Americans are dreaming: there was no cyberattack in retaliation for Iran’s implausibly deniable missile strikes on Saudi oil fields last month. Malicious audio files are dropping cryptominers and reverse shells into victim systems. An international dragnet collars hundreds in a darknet child exploitation sweep. And Graboid is out there, worming its cryptojacker into susceptible Docker hosts. Robert M. Lee from Dragos on their contribution to the Splunk Boss of the SOC (BOTS) capture-the-flag (CTF) competition. Guest is Chris Hickman from Keyfactor on Public Key Infrastructure.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_17.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1301</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dcac782a346b4871a2d2ca535497481f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5856095784.mp3?updated=1690152531" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber retaliation for a kinetic attack, again. Industrial espionage from China. Botnet does sextortion. Typosquatting the other candidate. A poor approach to reputation management.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/950/notes</link>
      <description>The US may have retaliated in cyberspace for Iran’s strikes against Saudi oil fields. China’s new C919 airliner seems to have benefited greatly from industrial espionage. An old botnet learns new tricks. Typosquatting as an election influence trick. A look at price lists in the Criminal-to-Criminal marketplace. Recovering from ransomware. And when it comes to reputation management, there’s not so much a right to be forgotten as there is a right to fuggeddaboutit, if your get what we mean. Justin Harvey from Accenture on ESports gaining popularity in cyber security.  Guest is Aashka, a high school junior who helped plan the Raytheon Girl Scouts National Cyber Challenge.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_16.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 16 Oct 2019 20:01:11 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>950</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/701d52c0-def8-11ea-911f-3fd216ca6b0d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyber retaliation for a kinetic attack, again. Industrial espionage from China. Botnet does sextortion. Typosquatting the other candidate. A poor approach to reputation management.</itunes:subtitle>
      <itunes:summary>The US may have retaliated in cyberspace for Iran’s strikes against Saudi oil fields. China’s new C919 airliner seems to have benefited greatly from industrial espionage. An old botnet learns new tricks. Typosquatting as an election influence trick. A look at price lists in the Criminal-to-Criminal marketplace. Recovering from ransomware. And when it comes to reputation management, there’s not so much a right to be forgotten as there is a right to fuggeddaboutit, if your get what we mean. Justin Harvey from Accenture on ESports gaining popularity in cyber security.  Guest is Aashka, a high school junior who helped plan the Raytheon Girl Scouts National Cyber Challenge.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_16.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US may have retaliated in cyberspace for Iran’s strikes against Saudi oil fields. China’s new C919 airliner seems to have benefited greatly from industrial espionage. An old botnet learns new tricks. Typosquatting as an election influence trick. A look at price lists in the Criminal-to-Criminal marketplace. Recovering from ransomware. And when it comes to reputation management, there’s not so much a right to be forgotten as there is a right to fuggeddaboutit, if your get what we mean. Justin Harvey from Accenture on ESports gaining popularity in cyber security.  Guest is Aashka, a high school junior who helped plan the Raytheon Girl Scouts National Cyber Challenge.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_16.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1190</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2c4f6b3b008947f2988ecd9c2e8bfca8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5463770374.mp3?updated=1690152478" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware hits US, French companies. ISPs as combat support arms. Lawful intercept gone rogue? Lazarus Group is back and in GitHub. China’s security laws and security risks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/949/notes</link>
      <description>Ransomware hits companies in France and the US. A Finnish energy company sustains a suspicious IT incident. Turkey jams social media as it rolls tanks against the Kurds. Pegasus spyware said to be in use against Moroccan activists. Silent Librarian is still making noise. The Lazarus Group is back with a malign crypto-trading app. China tightens its cyber laws, and the EU privately warns itself that, yes, companies like Huawei are a security risk. Joe Carrigan from JHU ISI, responding to a listener question about training new employees. Carole Theriault interviews Dirk Schrader from Greenbone Networks on the security of medical data.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_15.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Oct 2019 20:00:07 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>949</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7036d24a-def8-11ea-911f-4be4d8c99f0b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ransomware hits US, French companies. ISPs as combat support arms. Lawful intercept gone rogue? Lazarus Group is back and in GitHub. China’s security laws and security risks.</itunes:subtitle>
      <itunes:summary>Ransomware hits companies in France and the US. A Finnish energy company sustains a suspicious IT incident. Turkey jams social media as it rolls tanks against the Kurds. Pegasus spyware said to be in use against Moroccan activists. Silent Librarian is still making noise. The Lazarus Group is back with a malign crypto-trading app. China tightens its cyber laws, and the EU privately warns itself that, yes, companies like Huawei are a security risk. Joe Carrigan from JHU ISI, responding to a listener question about training new employees. Carole Theriault interviews Dirk Schrader from Greenbone Networks on the security of medical data.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_15.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ransomware hits companies in France and the US. A Finnish energy company sustains a suspicious IT incident. Turkey jams social media as it rolls tanks against the Kurds. Pegasus spyware said to be in use against Moroccan activists. Silent Librarian is still making noise. The Lazarus Group is back with a malign crypto-trading app. China tightens its cyber laws, and the EU privately warns itself that, yes, companies like Huawei are a security risk. Joe Carrigan from JHU ISI, responding to a listener question about training new employees. Carole Theriault interviews Dirk Schrader from Greenbone Networks on the security of medical data.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_15.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1321</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[59099fa4fa4f477987e7623c243ec8b4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4464935779.mp3?updated=1690152398" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Decrypting ransomware for good. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/106/notes</link>
      <description>Michael Gillespie is a programmer at Emsisoft, as well as a host of the popular ID Ransomware web site that helps victims identify what strain of ransomware they may have been infected with, and what decryptors may be available. He's written many decryptors himself, most recently for the Syrk strain of ransomware. 
Links to the research and Michael's work:
 https://blog.emsisoft.com/en/33885/emsisoft-releases-a-free-decryptor-for-the-syrk-ransomware/
https://id-ransomware.malwarehunterteam.com/
https://www.youtube.com/user/Demonslay335
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Oct 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>106</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/060eda88-df12-11ea-aa91-b74980738c74/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Decrypting ransomware for good. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Michael Gillespie is a programmer at Emsisoft, as well as a host of the popular ID Ransomware web site that helps victims identify what strain of ransomware they may have been infected with, and what decryptors may be available. He's written many decryptors himself, most recently for the Syrk strain of ransomware. 
Links to the research and Michael's work:
 https://blog.emsisoft.com/en/33885/emsisoft-releases-a-free-decryptor-for-the-syrk-ransomware/
https://id-ransomware.malwarehunterteam.com/
https://www.youtube.com/user/Demonslay335
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Michael Gillespie is a programmer at Emsisoft, as well as a host of the popular ID Ransomware web site that helps victims identify what strain of ransomware they may have been infected with, and what decryptors may be available. He's written many decryptors himself, most recently for the Syrk strain of ransomware. </p><p>Links to the research and Michael's work:</p><p><a href="https://blog.emsisoft.com/en/33885/emsisoft-releases-a-free-decryptor-for-the-syrk-ransomware/"> https://blog.emsisoft.com/en/33885/emsisoft-releases-a-free-decryptor-for-the-syrk-ransomware/</a></p><p><a href="https://id-ransomware.malwarehunterteam.com/">https://id-ransomware.malwarehunterteam.com/</a></p><p><a href="https://www.youtube.com/user/Demonslay335">https://www.youtube.com/user/Demonslay335</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1341</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[971c1ab6877e4ddbb693ee6ffe05e3db]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1361028823.mp3?updated=1685106877" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware and a zero-day. A newly discovered espionage platform. FIN7’s new tricks. Beijing speaks and Apple listens. A visit to NSA’s Cybersecurity Directorate. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/947/notes</link>
      <description>BitPaymer ransomware is exploiting an Apple zero-day. “Attor” isn’t your ordinary malign faerie: it’s also an espionage platform that’s been carefully deployed against Russian and Eastern European targets. FIN7 upgrades its toolkit. Apple does what the Chinese government asks it to do, blocking a mapping and a news app from users in China. And a look inside the black box, as we visit NSA’s Cybersecurity Directorate. Awais Rashid from Bristol University on the need for real-world experimentation. Guest is Kumar Saurabh from LogicHub on the importance of making breach forensics public.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_11.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 11 Oct 2019 19:19:59 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>947</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/70471060-def8-11ea-911f-f74a269b1be4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ransomware and a zero-day. A newly discovered espionage platform. FIN7’s new tricks. Beijing speaks and Apple listens. A visit to NSA’s Cybersecurity Directorate. </itunes:subtitle>
      <itunes:summary>BitPaymer ransomware is exploiting an Apple zero-day. “Attor” isn’t your ordinary malign faerie: it’s also an espionage platform that’s been carefully deployed against Russian and Eastern European targets. FIN7 upgrades its toolkit. Apple does what the Chinese government asks it to do, blocking a mapping and a news app from users in China. And a look inside the black box, as we visit NSA’s Cybersecurity Directorate. Awais Rashid from Bristol University on the need for real-world experimentation. Guest is Kumar Saurabh from LogicHub on the importance of making breach forensics public.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_11.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>BitPaymer ransomware is exploiting an Apple zero-day. “Attor” isn’t your ordinary malign faerie: it’s also an espionage platform that’s been carefully deployed against Russian and Eastern European targets. FIN7 upgrades its toolkit. Apple does what the Chinese government asks it to do, blocking a mapping and a news app from users in China. And a look inside the black box, as we visit NSA’s Cybersecurity Directorate. Awais Rashid from Bristol University on the need for real-world experimentation. Guest is Kumar Saurabh from LogicHub on the importance of making breach forensics public.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_11.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1449</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7b21475aa42a4882a929db6bec6ff7a7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8363773798.mp3?updated=1608756315" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Alleged DIA leaker. Europol cybergang study. Protecting the DIB. Chinese information operations.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/946/notes</link>
      <description>A US Defense Intelligence Agency analyst has been charged with leaking national defense information. Europol releases its 2019 Internet Organized Crime Threat Assessment. NSA Director Nakasone says the Agency’s Cybersecurity Directorate will first focus on protecting the Defense Industrial Base from intellectual property theft. CISA wants subpoena power over ISPs. And US companies are criticised for caving to Beijing's demands. Robert M. Lee from Dragos on regulations vs incentives when securing the electrical grid. Guest is Robb Reck from Ping Identity with results from their CISO Advisory Council’s new research on Securing Customer Identity.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_10.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 10 Oct 2019 19:55:41 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>946</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/705f5efe-def8-11ea-911f-df538214bd7e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Alleged DIA leaker. Europol cybergang study. Protecting the DIB. Chinese information operations.</itunes:subtitle>
      <itunes:summary>A US Defense Intelligence Agency analyst has been charged with leaking national defense information. Europol releases its 2019 Internet Organized Crime Threat Assessment. NSA Director Nakasone says the Agency’s Cybersecurity Directorate will first focus on protecting the Defense Industrial Base from intellectual property theft. CISA wants subpoena power over ISPs. And US companies are criticised for caving to Beijing's demands. Robert M. Lee from Dragos on regulations vs incentives when securing the electrical grid. Guest is Robb Reck from Ping Identity with results from their CISO Advisory Council’s new research on Securing Customer Identity.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_10.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A US Defense Intelligence Agency analyst has been charged with leaking national defense information. Europol releases its 2019 Internet Organized Crime Threat Assessment. NSA Director Nakasone says the Agency’s Cybersecurity Directorate will first focus on protecting the Defense Industrial Base from intellectual property theft. CISA wants subpoena power over ISPs. And US companies are criticised for caving to Beijing's demands. Robert M. Lee from Dragos on regulations vs incentives when securing the electrical grid. Guest is Robb Reck from Ping Identity with results from their CISO Advisory Council’s new research on Securing Customer Identity.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_10.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1275</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cba47ac6b10e475ea2d7e1024fefeeac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7604703781.mp3?updated=1690152145" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Twitter and two-factor authentication. Privacy concerns. The US Senate Intelligence Committee reports on Russian troll farms. Turla is back with some new tricks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/945/notes</link>
      <description>Twitter says it’s sorry is anything might have inadvertently happened with users’ email addresses and phone numbers, and that it’s taking steps to stop whatever might have happened from happening again. If anything actually happened. Other concerns about privacy surface elsewhere. The US  Senate Intelligence Committee issues its report on influence operations in the 2016 elections. Kaspersky ties a sophisticated malware campaign to Turla. Ben Yelin from UMD CHHS on a DARPA-inspired program exploring the possibility of using predictive technology to identify dangerous individuals. Guest is Neill Sciarrone from Trinity Cyber, discussing her career and the importance of attracting women to cyber.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_09.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 09 Oct 2019 19:06:11 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>945</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/707311d8-def8-11ea-911f-cb287a26b48e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Twitter and two-factor authentication. Privacy concerns. The US Senate Intelligence Committee reports on Russian troll farms. Turla is back with some new tricks.</itunes:subtitle>
      <itunes:summary>Twitter says it’s sorry is anything might have inadvertently happened with users’ email addresses and phone numbers, and that it’s taking steps to stop whatever might have happened from happening again. If anything actually happened. Other concerns about privacy surface elsewhere. The US  Senate Intelligence Committee issues its report on influence operations in the 2016 elections. Kaspersky ties a sophisticated malware campaign to Turla. Ben Yelin from UMD CHHS on a DARPA-inspired program exploring the possibility of using predictive technology to identify dangerous individuals. Guest is Neill Sciarrone from Trinity Cyber, discussing her career and the importance of attracting women to cyber.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_09.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Twitter says it’s sorry is anything might have inadvertently happened with users’ email addresses and phone numbers, and that it’s taking steps to stop whatever might have happened from happening again. If anything actually happened. Other concerns about privacy surface elsewhere. The US  Senate Intelligence Committee issues its report on influence operations in the 2016 elections. Kaspersky ties a sophisticated malware campaign to Turla. Ben Yelin from UMD CHHS on a DARPA-inspired program exploring the possibility of using predictive technology to identify dangerous individuals. Guest is Neill Sciarrone from Trinity Cyber, discussing her career and the importance of attracting women to cyber.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_09.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1338</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7b5a9b94319f41d5965aaaf65112f8e5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9958478252.mp3?updated=1690152122" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Riding herd on Mustang Panda. Drupalgeddon2 is out in the wild. VPN warnings and mitigations. Patch notes. An offer to share intelligence about Huawei. Presidential sites get low privacy grades.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/944/notes</link>
      <description>An update on Mustang Panda, and its pursuit of the goals outlined in the Thirteenth Five Year Plan. Unpatched Drupal instances are being hit as targets of opportunity. NSA adds its warnings to those of CISA and NCSC concering widely used VPNs: if you use them, patch them. (And change your credentials). Five Senators tell Microsoft, nicely, that Redmond is naive about Huawei. Patch Tuesday is here. And US Presidential campaign websites get privacy grades. Johannes Ullrich from the SANS Technology Institute on server side request forging. Guest is Jadee Hanson from Code42 with the results of their 2019 Global Data Exposure Report.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_08.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Oct 2019 19:48:45 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>944</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/70863d6c-def8-11ea-911f-931b883be395/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Riding herd on Mustang Panda. Drupalgeddon2 is out in the wild. VPN warnings and mitigations. Patch notes. An offer to share intelligence about Huawei. Presidential sites get low privacy grades.</itunes:subtitle>
      <itunes:summary>An update on Mustang Panda, and its pursuit of the goals outlined in the Thirteenth Five Year Plan. Unpatched Drupal instances are being hit as targets of opportunity. NSA adds its warnings to those of CISA and NCSC concering widely used VPNs: if you use them, patch them. (And change your credentials). Five Senators tell Microsoft, nicely, that Redmond is naive about Huawei. Patch Tuesday is here. And US Presidential campaign websites get privacy grades. Johannes Ullrich from the SANS Technology Institute on server side request forging. Guest is Jadee Hanson from Code42 with the results of their 2019 Global Data Exposure Report.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_08.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An update on Mustang Panda, and its pursuit of the goals outlined in the Thirteenth Five Year Plan. Unpatched Drupal instances are being hit as targets of opportunity. NSA adds its warnings to those of CISA and NCSC concering widely used VPNs: if you use them, patch them. (And change your credentials). Five Senators tell Microsoft, nicely, that Redmond is naive about Huawei. Patch Tuesday is here. And US Presidential campaign websites get privacy grades. Johannes Ullrich from the SANS Technology Institute on server side request forging. Guest is Jadee Hanson from Code42 with the results of their 2019 Global Data Exposure Report.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_08.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1239</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ff36b4ea586241c39426f6df7f7f7fcb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9202222114.mp3?updated=1690152056" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Iran hacks for influence. Brazilian PII up for auction. Prince Harry vs. Fleet Street. Electrical infrastructure cyber risk. Paying ransom. HildaCrypt developers say they’re going straight.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/943/notes</link>
      <description>Iranian threat group Phosphorus (or Charming Kitten) has been found active against US elections and other targets. A big database of PII on Brazilians is up for auction in the dark web souks. Prince Harry takes a legal whack at Fleet Street. An Atlantic Council session takes a look at electrical infrastructure cyber risk. An Alabama medical system pays the ransom to get its files back. And HildaCrypt’s developers say it was all in fun, and release their own keys. Joe Carrigan from JHU ISI on the wider availability of malicious lightning charging cables.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_07.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 07 Oct 2019 19:25:09 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>943</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/709cb696-def8-11ea-911f-532c01df6557/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Iran hacks for influence. Brazilian PII up for auction. Prince Harry vs. Fleet Street. Electrical infrastructure cyber risk. Paying ransom. HildaCrypt developers say they’re going straight.</itunes:subtitle>
      <itunes:summary>Iranian threat group Phosphorus (or Charming Kitten) has been found active against US elections and other targets. A big database of PII on Brazilians is up for auction in the dark web souks. Prince Harry takes a legal whack at Fleet Street. An Atlantic Council session takes a look at electrical infrastructure cyber risk. An Alabama medical system pays the ransom to get its files back. And HildaCrypt’s developers say it was all in fun, and release their own keys. Joe Carrigan from JHU ISI on the wider availability of malicious lightning charging cables.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_07.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iranian threat group Phosphorus (or Charming Kitten) has been found active against US elections and other targets. A big database of PII on Brazilians is up for auction in the dark web souks. Prince Harry takes a legal whack at Fleet Street. An Atlantic Council session takes a look at electrical infrastructure cyber risk. An Alabama medical system pays the ransom to get its files back. And HildaCrypt’s developers say it was all in fun, and release their own keys. Joe Carrigan from JHU ISI on the wider availability of malicious lightning charging cables.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_07.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1076</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bbef20a3696348cbb85c548cb0a15fcd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6403521733.mp3?updated=1690152011" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The fuzzy boundaries of APT41. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/105/notes</link>
      <description>Researchers at FireEye recently released a report detailing the activities of APT41, a Chinese cyber threat group notable for the range of tools they use, their origins in the world of video gaming, and their willingness to shift from seemingly state-sponsored activity to hacking for personal gain. 
Nalani Fraser and Fred Plan contributed to the report, and they join us to share their findings.
The original research is here:
 https://www.fireeye.com/blog/threat-research/2019/08/apt41-dual-espionage-and-cyber-crime-operation.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Oct 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>105</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/01e680b4-df12-11ea-b5e1-a76c374b554e/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The fuzzy boundaries of APT41. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at FireEye recently released a report detailing the activities of APT41, a Chinese cyber threat group notable for the range of tools they use, their origins in the world of video gaming, and their willingness to shift from seemingly state-sponsored activity to hacking for personal gain. 
Nalani Fraser and Fred Plan contributed to the report, and they join us to share their findings.
The original research is here:
 https://www.fireeye.com/blog/threat-research/2019/08/apt41-dual-espionage-and-cyber-crime-operation.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at FireEye recently released a report detailing the activities of APT41, a Chinese cyber threat group notable for the range of tools they use, their origins in the world of video gaming, and their willingness to shift from seemingly state-sponsored activity to hacking for personal gain. </p><p>Nalani Fraser and Fred Plan contributed to the report, and they join us to share their findings.</p><p>The original research is here:</p><p><a href="https://www.fireeye.com/blog/threat-research/2019/08/apt41-dual-espionage-and-cyber-crime-operation.html"> https://www.fireeye.com/blog/threat-research/2019/08/apt41-dual-espionage-and-cyber-crime-operation.html</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1520</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3eb8fc34c8ed4420b3b89058f87959a8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8557481513.mp3?updated=1685106868" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Android vulnerability exploited in the wild. Careless spycraft. The Eye on the Nile. A new Chinese threat actor. A spoiling attack in the CryptoWars. Take election interference, please.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/942/notes</link>
      <description>Project Zero warns that a use-after-free vulnerability in widely used Android devices is being exploited in the wild. Uzbekistan’s National Security Service continues to get stick in the court of public opinion for sloppy opsec. Check Point reports on what appears to be an Egyptian domestic surveillance operation. Palo Alto reports on a newly discovered Chinese state threat actor. A new volley in the Cryptowars. And Vlad gets out the rubber chicken. Guest is Paige Schaffer, CEO of Generali Global Assistance’s Identity and Digital Protection Services Global Unit, on the University of Texas ITAP report.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_04.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 04 Oct 2019 19:52:39 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>942</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/70b8e53c-def8-11ea-911f-cfce50bb3ea5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Android vulnerability exploited in the wild. Careless spycraft. The Eye on the Nile. A new Chinese threat actor. A spoiling attack in the CryptoWars. Take election interference, please.</itunes:subtitle>
      <itunes:summary>Project Zero warns that a use-after-free vulnerability in widely used Android devices is being exploited in the wild. Uzbekistan’s National Security Service continues to get stick in the court of public opinion for sloppy opsec. Check Point reports on what appears to be an Egyptian domestic surveillance operation. Palo Alto reports on a newly discovered Chinese state threat actor. A new volley in the Cryptowars. And Vlad gets out the rubber chicken. Guest is Paige Schaffer, CEO of Generali Global Assistance’s Identity and Digital Protection Services Global Unit, on the University of Texas ITAP report.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_04.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Project Zero warns that a use-after-free vulnerability in widely used Android devices is being exploited in the wild. Uzbekistan’s National Security Service continues to get stick in the court of public opinion for sloppy opsec. Check Point reports on what appears to be an Egyptian domestic surveillance operation. Palo Alto reports on a newly discovered Chinese state threat actor. A new volley in the Cryptowars. And Vlad gets out the rubber chicken. Guest is Paige Schaffer, CEO of Generali Global Assistance’s Identity and Digital Protection Services Global Unit, on the University of Texas ITAP report.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_04.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1601</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8756c5c23d65469ba2cef839d61b0851]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4312307248.mp3?updated=1608756325" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A new threat group, Avivore, is called out in the Airbus hack. Ransomware and VPN exploit warnings. EU tells Facebook to take down some content, everywhere. Spearphishing ANU. SandCat’s bad opsec.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/941/notes</link>
      <description>Who’s been hacking aerospace firms? Context Security suggests it’s a new Chinese threat actor, “Avivore.” The FBI issues a ransomware alert. The NCSC warns of active exploitation of vulnerable VPNs. The EU issues a sweeping takedown order to Facebook. US Senators ask Facebook about deep fakes. Spearphishing at the Australian National University. FireEye may be for sale. And the SandCat threat group shows poor opsec. Craig Williams from Cisco Talos on maliciously crafted ODT files. Guest is Yoav Leitersdof of YL Ventures with insights on the VC market in Israel.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_03.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 03 Oct 2019 20:04:21 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>941</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/70da6324-def8-11ea-911f-97319eae4db1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A new threat group, Avivore, is called out in the Airbus hack. Ransomware and VPN exploit warnings. EU tells Facebook to take down some content, everywhere. Spearphishing ANU. SandCat’s bad opsec.</itunes:subtitle>
      <itunes:summary>Who’s been hacking aerospace firms? Context Security suggests it’s a new Chinese threat actor, “Avivore.” The FBI issues a ransomware alert. The NCSC warns of active exploitation of vulnerable VPNs. The EU issues a sweeping takedown order to Facebook. US Senators ask Facebook about deep fakes. Spearphishing at the Australian National University. FireEye may be for sale. And the SandCat threat group shows poor opsec. Craig Williams from Cisco Talos on maliciously crafted ODT files. Guest is Yoav Leitersdof of YL Ventures with insights on the VC market in Israel.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_03.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Who’s been hacking aerospace firms? Context Security suggests it’s a new Chinese threat actor, “Avivore.” The FBI issues a ransomware alert. The NCSC warns of active exploitation of vulnerable VPNs. The EU issues a sweeping takedown order to Facebook. US Senators ask Facebook about deep fakes. Spearphishing at the Australian National University. FireEye may be for sale. And the SandCat threat group shows poor opsec. Craig Williams from Cisco Talos on maliciously crafted ODT files. Guest is Yoav Leitersdof of YL Ventures with insights on the VC market in Israel.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_03.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1281</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0acd13cfb76b4845935939c427842c49]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9549059021.mp3?updated=1690151954" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>RATs, ransomware, payloads, and unsecured data: a look at the cybercriminal underground. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/940/notes</link>
      <description>Sobinokibi ransomware looks more like the child of GandCrab, and McAfee has some thoughts on how ransomware-as-a-service operates. FakeUpdates are back, and they’re installing ransomware, too. The Adwind RAT is back and infesting a new set of targets: it’s moved on from hospitality and retail and into the oil industry. Maliciously crafted ODT files are appearing in the wild. And a big database about Russian taxpayers has appeared in an unsecured Elasticsearch cluster. Ben Yelin from UMD CHHS on a California town implementing a robot police patrol unit. Guest is Daniel Garrie from Law &amp; Forensics on eDiscovery.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_02.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 02 Oct 2019 19:59:50 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>940</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/70eae654-def8-11ea-911f-ffeaecc51854/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>RATs, ransomware, payloads, and unsecured data: a look at the cybercriminal underground. </itunes:subtitle>
      <itunes:summary>Sobinokibi ransomware looks more like the child of GandCrab, and McAfee has some thoughts on how ransomware-as-a-service operates. FakeUpdates are back, and they’re installing ransomware, too. The Adwind RAT is back and infesting a new set of targets: it’s moved on from hospitality and retail and into the oil industry. Maliciously crafted ODT files are appearing in the wild. And a big database about Russian taxpayers has appeared in an unsecured Elasticsearch cluster. Ben Yelin from UMD CHHS on a California town implementing a robot police patrol unit. Guest is Daniel Garrie from Law &amp; Forensics on eDiscovery.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_02.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sobinokibi ransomware looks more like the child of GandCrab, and McAfee has some thoughts on how ransomware-as-a-service operates. FakeUpdates are back, and they’re installing ransomware, too. The Adwind RAT is back and infesting a new set of targets: it’s moved on from hospitality and retail and into the oil industry. Maliciously crafted ODT files are appearing in the wild. And a big database about Russian taxpayers has appeared in an unsecured Elasticsearch cluster. Ben Yelin from UMD CHHS on a California town implementing a robot police patrol unit. Guest is Daniel Garrie from Law &amp; Forensics on eDiscovery.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_02.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1305</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bc3c2cbcf7ee4709935f9c5699f53fd7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4410842442.mp3?updated=1690151595" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Piling on sanctions. The disinformation-as-a-service black market. Technological sovereignty through R&amp;D investment? Ransomware continues to rise. NSA’s new Cybersecurity Directorate.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/939/notes</link>
      <description>The oligarch behind the St. Petersburg troll farm is sanctioned, again. Recorded Future looks at disinformation and finds there’s a functioning private sector market for it. The European Union seems likely to pursue technological sovereignty, at least to the tune of some R&amp;D investment. Ransomware attacks against US state and local governments have been trending up, and that trend is likely to continue. And NSA has its new Cybersecurity Directorate.  Joe Carrigan from JHU ISI on Microsoft no longer trusting built-in encryption on hard drives. Carole Theriault speaks with Simon Rodway from Entersekt about Facebook’s Libra and how it may effect traditional banks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_01.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Oct 2019 19:34:34 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>939</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/710220e4-def8-11ea-911f-6f505f1200dc/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Piling on sanctions. The disinformation-as-a-service black market. Technological sovereignty through R&amp;D investment? Ransomware continues to rise. NSA’s new Cybersecurity Directorate.</itunes:subtitle>
      <itunes:summary>The oligarch behind the St. Petersburg troll farm is sanctioned, again. Recorded Future looks at disinformation and finds there’s a functioning private sector market for it. The European Union seems likely to pursue technological sovereignty, at least to the tune of some R&amp;D investment. Ransomware attacks against US state and local governments have been trending up, and that trend is likely to continue. And NSA has its new Cybersecurity Directorate.  Joe Carrigan from JHU ISI on Microsoft no longer trusting built-in encryption on hard drives. Carole Theriault speaks with Simon Rodway from Entersekt about Facebook’s Libra and how it may effect traditional banks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_01.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The oligarch behind the St. Petersburg troll farm is sanctioned, again. Recorded Future looks at disinformation and finds there’s a functioning private sector market for it. The European Union seems likely to pursue technological sovereignty, at least to the tune of some R&amp;D investment. Ransomware attacks against US state and local governments have been trending up, and that trend is likely to continue. And NSA has its new Cybersecurity Directorate.  Joe Carrigan from JHU ISI on Microsoft no longer trusting built-in encryption on hard drives. Carole Theriault speaks with Simon Rodway from Entersekt about Facebook’s Libra and how it may effect traditional banks.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/October/CyberWire_2019_10_01.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1306</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d2513cc7da56454895903a6df2c2a810]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6100480361.mp3?updated=1690151571" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Industrial firms disclose cyber incidents. US DHS to check airliner cybersecurity. RCMP security case update. Bulletproof host taken down. Gnosticplayers. Royal phish. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/938/notes</link>
      <description>Rheinmetall and DCC have disclosed sustaining cyber attacks. The US Government is looking at airliner cyber vulnerabilities. SimJacker is real, but recent phones seem unaffected. RCMP data misappropriation case update. German police raid a bulletproof host. Gnosticplayers may be back. And someone is sending phishing snail mail that claims the British Crown needs your help to ease the economic fallout of Brexit--a Bitcoin wallet is helpfully made available. Malek Ben Salem from Accenture labs with an overview of five threat factors influencing the cyber security landscape.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_30.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 30 Sep 2019 19:36:07 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>938</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/71171512-def8-11ea-911f-83608b5f6113/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Industrial firms disclose cyber incidents. US DHS to check airliner cybersecurity. RCMP security case update. Bulletproof host taken down. Gnosticplayers. Royal phish. </itunes:subtitle>
      <itunes:summary>Rheinmetall and DCC have disclosed sustaining cyber attacks. The US Government is looking at airliner cyber vulnerabilities. SimJacker is real, but recent phones seem unaffected. RCMP data misappropriation case update. German police raid a bulletproof host. Gnosticplayers may be back. And someone is sending phishing snail mail that claims the British Crown needs your help to ease the economic fallout of Brexit--a Bitcoin wallet is helpfully made available. Malek Ben Salem from Accenture labs with an overview of five threat factors influencing the cyber security landscape.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_30.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Rheinmetall and DCC have disclosed sustaining cyber attacks. The US Government is looking at airliner cyber vulnerabilities. SimJacker is real, but recent phones seem unaffected. RCMP data misappropriation case update. German police raid a bulletproof host. Gnosticplayers may be back. And someone is sending phishing snail mail that claims the British Crown needs your help to ease the economic fallout of Brexit--a Bitcoin wallet is helpfully made available. Malek Ben Salem from Accenture labs with an overview of five threat factors influencing the cyber security landscape.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_30.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1181</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8a0254bb8022424fa2d61063e827256e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6526012201.mp3?updated=1690151548" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Focusing on Autumn Aperture. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/104/notes</link>
      <description>Researchers at Prevalion have been tracking a malware campaign making use of antiquated file formats and social engineering to target specific groups. 

Danny Adamitis and Elizabeth Wharton are coauthors of the report, and they join us to share their findings.
The research can be found here:
https://blog.prevailion.com/2019/09/autumn-aperture-report.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Sep 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>104</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/fecaefdc-df11-11ea-b61d-df2bc420bfc4/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Focusing on Autumn Aperture. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at Prevalion have been tracking a malware campaign making use of antiquated file formats and social engineering to target specific groups. 

Danny Adamitis and Elizabeth Wharton are coauthors of the report, and they join us to share their findings.
The research can be found here:
https://blog.prevailion.com/2019/09/autumn-aperture-report.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Prevalion have been tracking a malware campaign making use of antiquated file formats and social engineering to target specific groups. </p><p><br></p><p>Danny Adamitis and Elizabeth Wharton are coauthors of the report, and they join us to share their findings.</p><p>The research can be found here:</p><p><a href="https://blog.prevailion.com/2019/09/autumn-aperture-report.html">https://blog.prevailion.com/2019/09/autumn-aperture-report.html</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1253</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[61baf074391b400cb1f1a23c23568034]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2233576448.mp3?updated=1684590268" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Supply chain hacks versus Airbus. Phishing around Google Cloud. Masad Clipper and Stealer on the criminal-to-criminal market. Quick zero-day exploitation. DoorDash hack. Inside JTF Ares.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/937/notes</link>
      <description>The Airbus supply chain is reported to be under attack, possibly by Chinese industrial espionage operators. Phishing campaigns impersonate Google Cloud services. A new commodity information stealer is on offer in the black market. The vBulletin zero-day was weaponized surprisingly quickly. DoorDash discloses a hack that exposed almost five million persons’ data. And a look at JTF Ares operations against ISIS shows commendable attention to increasing the enemy’s friction.  David Dufour from Webroot on the need for a variety of areas of expertise in security. Guest is Caleb Barlow CEO and President of Cynergistek, discussing the security implications of being CEO of a public company.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_27.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 27 Sep 2019 19:43:38 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>937</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7130261a-def8-11ea-911f-9b83e5f6b31a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Supply chain hacks versus Airbus. Phishing around Google Cloud. Masad Clipper and Stealer on the criminal-to-criminal market. Quick zero-day exploitation. DoorDash hack. Inside JTF Ares.</itunes:subtitle>
      <itunes:summary>The Airbus supply chain is reported to be under attack, possibly by Chinese industrial espionage operators. Phishing campaigns impersonate Google Cloud services. A new commodity information stealer is on offer in the black market. The vBulletin zero-day was weaponized surprisingly quickly. DoorDash discloses a hack that exposed almost five million persons’ data. And a look at JTF Ares operations against ISIS shows commendable attention to increasing the enemy’s friction.  David Dufour from Webroot on the need for a variety of areas of expertise in security. Guest is Caleb Barlow CEO and President of Cynergistek, discussing the security implications of being CEO of a public company.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_27.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Airbus supply chain is reported to be under attack, possibly by Chinese industrial espionage operators. Phishing campaigns impersonate Google Cloud services. A new commodity information stealer is on offer in the black market. The vBulletin zero-day was weaponized surprisingly quickly. DoorDash discloses a hack that exposed almost five million persons’ data. And a look at JTF Ares operations against ISIS shows commendable attention to increasing the enemy’s friction.  David Dufour from Webroot on the need for a variety of areas of expertise in security. Guest is Caleb Barlow CEO and President of Cynergistek, discussing the security implications of being CEO of a public company.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_27.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1627</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7b538a6fd2184591a226645e88ca21af]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5567319218.mp3?updated=1608756300" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lazarus Group in India. Suspected Chinese APT uses fake Narrator. Fleeceware. DNI testimony. TalkTalk hacker charged in US. Yahoo breach compensation. Chameleon spam campaign.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/936/notes</link>
      <description>North Korea’s Lazarus Group is active against targets in India. A “suspected Chinese advanced persistent threat group” is exploiting a Windows accessibility feature. Sophos warns of “fleeceware.” US DNI testifies efore the House Intelligence Committee. The TalkTalk hacker and an alleged accomplice are indicted on US charges. What’s involved in receiving compensation in the Yahoo breach settlement. And notes on the Chameleon spam campaign. Jonathan Katz from George Mason University with an overview of salting and hashing. Guest is Greg Martin from JASK on DOJ’s efforts to improve outreach with hackers.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_26.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 26 Sep 2019 19:23:03 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>936</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7143f17c-def8-11ea-911f-cff3264bf7b6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Lazarus Group in India. Suspected Chinese APT uses fake Narrator. Fleeceware. DNI testimony. TalkTalk hacker charged in US. Yahoo breach compensation. Chameleon spam campaign.</itunes:subtitle>
      <itunes:summary>North Korea’s Lazarus Group is active against targets in India. A “suspected Chinese advanced persistent threat group” is exploiting a Windows accessibility feature. Sophos warns of “fleeceware.” US DNI testifies efore the House Intelligence Committee. The TalkTalk hacker and an alleged accomplice are indicted on US charges. What’s involved in receiving compensation in the Yahoo breach settlement. And notes on the Chameleon spam campaign. Jonathan Katz from George Mason University with an overview of salting and hashing. Guest is Greg Martin from JASK on DOJ’s efforts to improve outreach with hackers.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_26.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>North Korea’s Lazarus Group is active against targets in India. A “suspected Chinese advanced persistent threat group” is exploiting a Windows accessibility feature. Sophos warns of “fleeceware.” US DNI testifies efore the House Intelligence Committee. The TalkTalk hacker and an alleged accomplice are indicted on US charges. What’s involved in receiving compensation in the Yahoo breach settlement. And notes on the Chameleon spam campaign. Jonathan Katz from George Mason University with an overview of salting and hashing. Guest is Greg Martin from JASK on DOJ’s efforts to improve outreach with hackers.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_26.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1328</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4feff05539f94b8bbb1b7ec58eb22c7e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3275507862.mp3?updated=1690151043" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Notes on Tortoiseshell. Fancy Bear snuffles around embassies and foreign ministries. Poison Carp targets Tibetan groups. GandCrab unretires. And Chameleon’s curious spam. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/935/notes</link>
      <description>Tortoiseshell is trolling for military veterans. There’s been a fresh Fancy Bear sighting. The transcript of a conversation between the US and Ukrainian presidents has been released. Citizen Lab warns that Poison Carp is actively working against Tibetan groups. A zero-day afflicting vBulletin forum software is out. GandCrab comes out of retirement. And there’s an odd spam campaign in circulation that looks like phishing but seems not to be.  Ben Yelin from UMD CHHS on the White House blocking Congress from auditing its offensive hacking strategy. Guest is Tim Keeler from Remediant looking at lateral movement in the context of the NotPetya attacks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_25.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 25 Sep 2019 19:23:47 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>935</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/71588880-def8-11ea-911f-ebc6923bd0d9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Notes on Tortoiseshell. Fancy Bear snuffles around embassies and foreign ministries. Poison Carp targets Tibetan groups. GandCrab unretires. And Chameleon’s curious spam. </itunes:subtitle>
      <itunes:summary>Tortoiseshell is trolling for military veterans. There’s been a fresh Fancy Bear sighting. The transcript of a conversation between the US and Ukrainian presidents has been released. Citizen Lab warns that Poison Carp is actively working against Tibetan groups. A zero-day afflicting vBulletin forum software is out. GandCrab comes out of retirement. And there’s an odd spam campaign in circulation that looks like phishing but seems not to be.  Ben Yelin from UMD CHHS on the White House blocking Congress from auditing its offensive hacking strategy. Guest is Tim Keeler from Remediant looking at lateral movement in the context of the NotPetya attacks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_25.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tortoiseshell is trolling for military veterans. There’s been a fresh Fancy Bear sighting. The transcript of a conversation between the US and Ukrainian presidents has been released. Citizen Lab warns that Poison Carp is actively working against Tibetan groups. A zero-day afflicting vBulletin forum software is out. GandCrab comes out of retirement. And there’s an odd spam campaign in circulation that looks like phishing but seems not to be.  Ben Yelin from UMD CHHS on the White House blocking Congress from auditing its offensive hacking strategy. Guest is Tim Keeler from Remediant looking at lateral movement in the context of the NotPetya attacks.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_25.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1300</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[396d2f12c3284fef8ec2999a10e39700]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8227233863.mp3?updated=1690150936" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Utility phishing. Google wins on the right to be forgotten. Transatlantic data transfer. Responsible state behavior in cyberspace. Huawei and 5G. Permanent Record, temporarily phishbait. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/934/notes</link>
      <description>APT10 has been phishing in US utilities. Google wins a big round over the EU’s right to be forgotten. European courts are also considering binding contractual clauses and Privacy Shield, which together have facilitated transatlantic data transfer. Twenty-seven nations agree on “responsible state behavior in cyberspace.” A hawkish take on Huawei’s 5G ambitions. And Edward Snowden’s book is being used as phishbait (not, we hasten to say, by Mr. Snowden). Johannes Ullrich from the SANS Technology Institute on the security issues with local host web servers. Guest is Fleming Shi from Barracuda with research on city/state ransomware attacks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_24.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Sep 2019 19:46:19 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>934</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7173296a-def8-11ea-911f-8b4dbcd5eea7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Utility phishing. Google wins on the right to be forgotten. Transatlantic data transfer. Responsible state behavior in cyberspace. Huawei and 5G. Permanent Record, temporarily phishbait. </itunes:subtitle>
      <itunes:summary>APT10 has been phishing in US utilities. Google wins a big round over the EU’s right to be forgotten. European courts are also considering binding contractual clauses and Privacy Shield, which together have facilitated transatlantic data transfer. Twenty-seven nations agree on “responsible state behavior in cyberspace.” A hawkish take on Huawei’s 5G ambitions. And Edward Snowden’s book is being used as phishbait (not, we hasten to say, by Mr. Snowden). Johannes Ullrich from the SANS Technology Institute on the security issues with local host web servers. Guest is Fleming Shi from Barracuda with research on city/state ransomware attacks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_24.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>APT10 has been phishing in US utilities. Google wins a big round over the EU’s right to be forgotten. European courts are also considering binding contractual clauses and Privacy Shield, which together have facilitated transatlantic data transfer. Twenty-seven nations agree on “responsible state behavior in cyberspace.” A hawkish take on Huawei’s 5G ambitions. And Edward Snowden’s book is being used as phishbait (not, we hasten to say, by Mr. Snowden). Johannes Ullrich from the SANS Technology Institute on the security issues with local host web servers. Guest is Fleming Shi from Barracuda with research on city/state ransomware attacks.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p><a href="https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_24"> https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_24</a>.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1224</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5d30dd8cb4f849d78015c8b6c70c9452]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6066644457.mp3?updated=1690150922" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>YouTube account hijacking. Facebook finds more apps misusing data. Cyber deterrence in the Gulf region. Huawei’s CFO continues to fight extradition from Canada to the US. Pentesting blues. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/933/notes</link>
      <description>YouTube creators in the “car community” get their accounts hijacked over the weekend. Facebook finds tens of thousands of apps behaving badly with respect to priority--the social network’s announcement has been cooly received in the US Senate. The Gulf region continues to be a field of cyber as well as kinetic competition. Huawei’s CFO is back in court today. And Iowa tries to sort out what it actually hired pentesters to do (and to whom they were supposed to do it.) Joe Carrigan from JHU ISI on smart TV privacy concerns.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_23.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 23 Sep 2019 19:55:57 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>933</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/71969936-def8-11ea-911f-c398bd04b61c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>YouTube account hijacking. Facebook finds more apps misusing data. Cyber deterrence in the Gulf region. Huawei’s CFO continues to fight extradition from Canada to the US. Pentesting blues. </itunes:subtitle>
      <itunes:summary>YouTube creators in the “car community” get their accounts hijacked over the weekend. Facebook finds tens of thousands of apps behaving badly with respect to priority--the social network’s announcement has been cooly received in the US Senate. The Gulf region continues to be a field of cyber as well as kinetic competition. Huawei’s CFO is back in court today. And Iowa tries to sort out what it actually hired pentesters to do (and to whom they were supposed to do it.) Joe Carrigan from JHU ISI on smart TV privacy concerns.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_23.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>YouTube creators in the “car community” get their accounts hijacked over the weekend. Facebook finds tens of thousands of apps behaving badly with respect to priority--the social network’s announcement has been cooly received in the US Senate. The Gulf region continues to be a field of cyber as well as kinetic competition. Huawei’s CFO is back in court today. And Iowa tries to sort out what it actually hired pentesters to do (and to whom they were supposed to do it.) Joe Carrigan from JHU ISI on smart TV privacy concerns.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p><a href="https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_2"> https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_2</a>3.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1045</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7ffc69bd6eeb4abc8bc93a9a883dede4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1850296523.mp3?updated=1690150904" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leaky guest networks and covert channels. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/103/notes</link>
      <description>Many users of inexpensive internet routers use guest network functionality to help secure their home networks. Researchers at Ben Gurion University have discovered methods for defeating these security measures. Dr. Yossi Oren joins us to share their findings.
The original research is here:
https://www.usenix.org/system/files/woot19-paper_ovadia.pdf
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Sep 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>103</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/fb5f4bea-df11-11ea-b61d-8b46dd16ff14/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Leaky guest networks and covert channels. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Many users of inexpensive internet routers use guest network functionality to help secure their home networks. Researchers at Ben Gurion University have discovered methods for defeating these security measures. Dr. Yossi Oren joins us to share their findings.
The original research is here:
https://www.usenix.org/system/files/woot19-paper_ovadia.pdf
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Many users of inexpensive internet routers use guest network functionality to help secure their home networks. Researchers at Ben Gurion University have discovered methods for defeating these security measures. Dr. Yossi Oren joins us to share their findings.</p><p>The original research is here:</p><p><a href="https://www.usenix.org/system/files/woot19-paper_ovadia.pdf">https://www.usenix.org/system/files/woot19-paper_ovadia.pdf</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1068</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6508bb5913ef4aa0a06f287a15441134]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1867363296.mp3?updated=1685044947" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Coordinated inauthenticity in five countries draws action from Twitter. Cryptomining continues. Huawei fights its ban in US Federal court. Notes from CISA’s Cybersecurity Summit.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/932/notes</link>
      <description>Twitter details actions against coordinated inauthenticity in Egypt, the United Arab Emirates, Ecuador, Spain, and China. Tension with Iran remain high, but cyber action hasn’t sharply spiked. The Smominru botnet installs malware, including miners, and kicks other malicious code out of infected machines. Panda cryptojackers are careless but effective. Huawei says it’s the victim of a bill of attainder. And notes from CISA’s National Cybersecurity Summit.  Malek Ben Salem from Accenture labs on the security aspects of facial recognition systems. Guest is Henry Harrison CTO of Garrison on Hardsec, a new approach to security that came out of the UK.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_20.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 20 Sep 2019 19:26:43 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>932</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/71b17206-def8-11ea-911f-6f303dbd2d87/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Coordinated inauthenticity in five countries draws action from Twitter. Cryptomining continues. Huawei fights its ban in US Federal court. Notes from CISA’s Cybersecurity Summit.</itunes:subtitle>
      <itunes:summary>Twitter details actions against coordinated inauthenticity in Egypt, the United Arab Emirates, Ecuador, Spain, and China. Tension with Iran remain high, but cyber action hasn’t sharply spiked. The Smominru botnet installs malware, including miners, and kicks other malicious code out of infected machines. Panda cryptojackers are careless but effective. Huawei says it’s the victim of a bill of attainder. And notes from CISA’s National Cybersecurity Summit.  Malek Ben Salem from Accenture labs on the security aspects of facial recognition systems. Guest is Henry Harrison CTO of Garrison on Hardsec, a new approach to security that came out of the UK.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_20.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Twitter details actions against coordinated inauthenticity in Egypt, the United Arab Emirates, Ecuador, Spain, and China. Tension with Iran remain high, but cyber action hasn’t sharply spiked. The Smominru botnet installs malware, including miners, and kicks other malicious code out of infected machines. Panda cryptojackers are careless but effective. Huawei says it’s the victim of a bill of attainder. And notes from CISA’s National Cybersecurity Summit.  Malek Ben Salem from Accenture labs on the security aspects of facial recognition systems. Guest is Henry Harrison CTO of Garrison on Hardsec, a new approach to security that came out of the UK.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_20.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1563</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f501ce76f5f6491eb7fe65243518a9f5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2641942114.mp3?updated=1608756321" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Notes from the CISA Summit. New DDoS vector reported. Medical images exposed online. Huawei and US sanctions. Engaging ISIS in cyberspace.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/931/notes</link>
      <description>A quick look at CISA’s National Cybersecurity Summit. A big new distributed denial-of-service vector is reported. Medical servers leave patient information exposed to the public Internet. Huawei is suspended from the FIRST group as it argues its case in a US Federal court. And one of the challenges of engaging ISIS online is that it relies so heavily on commercial infrastructure--it’s got to be targeted carefully. Ben Yelin from UMD CHHS on a case of compelled encryption which may be heading to the supreme court. Guest is David Talaga from Talend on how privacy fines have informed customers’ approach to planning around data security compliance.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_19.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 19 Sep 2019 20:11:53 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>931</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/71c9e93a-def8-11ea-911f-539a8082deb1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Notes from the CISA Summit. New DDoS vector reported. Medical images exposed online. Huawei and US sanctions. Engaging ISIS in cyberspace.</itunes:subtitle>
      <itunes:summary>A quick look at CISA’s National Cybersecurity Summit. A big new distributed denial-of-service vector is reported. Medical servers leave patient information exposed to the public Internet. Huawei is suspended from the FIRST group as it argues its case in a US Federal court. And one of the challenges of engaging ISIS online is that it relies so heavily on commercial infrastructure--it’s got to be targeted carefully. Ben Yelin from UMD CHHS on a case of compelled encryption which may be heading to the supreme court. Guest is David Talaga from Talend on how privacy fines have informed customers’ approach to planning around data security compliance.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_19.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A quick look at CISA’s National Cybersecurity Summit. A big new distributed denial-of-service vector is reported. Medical servers leave patient information exposed to the public Internet. Huawei is suspended from the FIRST group as it argues its case in a US Federal court. And one of the challenges of engaging ISIS online is that it relies so heavily on commercial infrastructure--it’s got to be targeted carefully. Ben Yelin from UMD CHHS on a case of compelled encryption which may be heading to the supreme court. Guest is David Talaga from Talend on how privacy fines have informed customers’ approach to planning around data security compliance.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_19.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1192</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[679516e743214235bfdb02639ff1bca3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1185395581.mp3?updated=1690150872" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tortoiseshell threat-actor active in the Middle East. Simjacker less dangerous than thought? Decentralizing cyber attack. The Ortis affair. Mr. Snowden’s book deal.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/930/notes</link>
      <description>A newly discovered threat actor, “Tortoiseshell,” has been active against targets in the Middle East. The Simjacker vulnerability may not be as widely exploitable as early reports led many to believe. The US Army seems committed to decentralizing cyber operations along long-familiar artillery lines. Joint Task Force Ares continues to keep an eye on ISIS. Canada seeks to reassure allies over the Orts affair. And the Justice Department wants any royalties Mr. Snowden’s book might earn. Daniel Prince from Lancaster University on cyber security as a force multiplier. Guest is Brian Roddy from Cisco on securing the multi-cloud.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_18.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 18 Sep 2019 19:59:27 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>930</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/71dd20a4-def8-11ea-911f-7f4aa752ed52/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Tortoiseshell threat-actor active in the Middle East. Simjacker less dangerous than thought? Decentralizing cyber attack. The Ortis affair. Mr. Snowden’s book deal.</itunes:subtitle>
      <itunes:summary>A newly discovered threat actor, “Tortoiseshell,” has been active against targets in the Middle East. The Simjacker vulnerability may not be as widely exploitable as early reports led many to believe. The US Army seems committed to decentralizing cyber operations along long-familiar artillery lines. Joint Task Force Ares continues to keep an eye on ISIS. Canada seeks to reassure allies over the Orts affair. And the Justice Department wants any royalties Mr. Snowden’s book might earn. Daniel Prince from Lancaster University on cyber security as a force multiplier. Guest is Brian Roddy from Cisco on securing the multi-cloud.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_18.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A newly discovered threat actor, “Tortoiseshell,” has been active against targets in the Middle East. The Simjacker vulnerability may not be as widely exploitable as early reports led many to believe. The US Army seems committed to decentralizing cyber operations along long-familiar artillery lines. Joint Task Force Ares continues to keep an eye on ISIS. Canada seeks to reassure allies over the Orts affair. And the Justice Department wants any royalties Mr. Snowden’s book might earn. Daniel Prince from Lancaster University on cyber security as a force multiplier. Guest is Brian Roddy from Cisco on securing the multi-cloud.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_18.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1269</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[292c2c3958eb49f9bba3a144d9f18807]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9022715742.mp3?updated=1690150709" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More updates on the Royal Canadian Mounted Police counterintelligence case. Australian elections and China’s interests. ISIS howls to the lone wolves. Ed Snowden would prefer Paris to Moscow.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/929/notes</link>
      <description>More notes on the RCMP espionage scandal. The CSE’s preliminary assessment sounds serious indeed, and Canadian intelligence services are trying to identify and contain the damage Cameron Ortis is alleged to have done. And the other Four Eyes are doing so as well. Australia considered that a hacking incident early this spring may have been a Chinese effort to compromise election systems. ISIS is back online. And Mr. Snowden wouldn’t mind asylum in France. David Dufour from Webroot with thoughts on backups. Carole Theriault interviews ethical hacker Zoe Rose, who shares insights on entering the industry.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_17.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Sep 2019 18:49:15 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>929</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/71f55bba-def8-11ea-911f-3be237dcc499/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>More updates on the Royal Canadian Mounted Police counterintelligence case. Australian elections and China’s interests. ISIS howls to the lone wolves. Ed Snowden would prefer Paris to Moscow.</itunes:subtitle>
      <itunes:summary>More notes on the RCMP espionage scandal. The CSE’s preliminary assessment sounds serious indeed, and Canadian intelligence services are trying to identify and contain the damage Cameron Ortis is alleged to have done. And the other Four Eyes are doing so as well. Australia considered that a hacking incident early this spring may have been a Chinese effort to compromise election systems. ISIS is back online. And Mr. Snowden wouldn’t mind asylum in France. David Dufour from Webroot with thoughts on backups. Carole Theriault interviews ethical hacker Zoe Rose, who shares insights on entering the industry.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_17.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>More notes on the RCMP espionage scandal. The CSE’s preliminary assessment sounds serious indeed, and Canadian intelligence services are trying to identify and contain the damage Cameron Ortis is alleged to have done. And the other Four Eyes are doing so as well. Australia considered that a hacking incident early this spring may have been a Chinese effort to compromise election systems. ISIS is back online. And Mr. Snowden wouldn’t mind asylum in France. David Dufour from Webroot with thoughts on backups. Carole Theriault interviews ethical hacker Zoe Rose, who shares insights on entering the industry.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_17.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1269</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ce17e5efed0946cab3927c815c3218a6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8885614977.mp3?updated=1690150592" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Espionage and counter-espionage in at least three of the FIve Eyes. New sanctions against North Korea. Password managers and flashlights.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/928/notes</link>
      <description>Spy versus spy, in America, Canada, and Australia, with special guest stars from the Russian and Chinese services. The US Treasury Department issues more sanctions against North Korea’s  Reconnaissance General Bureau, better known as the Lazarus Group or Hidden Cobra. Russian election influence goes local (and domestic). Password manager security problems. And why does your flashlight want to know so much about you? Justin Harvey from Accenture with insights on HTTPS and phishing.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 16 Sep 2019 19:29:49 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>928</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/720cc0b6-def8-11ea-911f-6f5cd5934fba/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Espionage and counter-espionage in at least three of the FIve Eyes. New sanctions against North Korea. Password managers and flashlights.</itunes:subtitle>
      <itunes:summary>Spy versus spy, in America, Canada, and Australia, with special guest stars from the Russian and Chinese services. The US Treasury Department issues more sanctions against North Korea’s  Reconnaissance General Bureau, better known as the Lazarus Group or Hidden Cobra. Russian election influence goes local (and domestic). Password manager security problems. And why does your flashlight want to know so much about you? Justin Harvey from Accenture with insights on HTTPS and phishing.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Spy versus spy, in America, Canada, and Australia, with special guest stars from the Russian and Chinese services. The US Treasury Department issues more sanctions against North Korea’s  Reconnaissance General Bureau, better known as the Lazarus Group or Hidden Cobra. Russian election influence goes local (and domestic). Password manager security problems. And why does your flashlight want to know so much about you? Justin Harvey from Accenture with insights on HTTPS and phishing.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1093</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[526ad9f5d40f4371b042ac98e8f7d99e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8388582242.mp3?updated=1690150497" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bluetooth blues: KNOB attack explained. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/102/notes</link>
      <description>A team of researchers have published a report titled, "KNOB Attack.
Key Negotiation of Bluetooth Attack: Breaking Bluetooth Security." The report outlines vulnerabilities in the Bluetooth standard, along with mitigations to prevent them. 
Daniele Antonioli is from Singapore University of Technology and Design, and is one of the researchers studying KNOB. He joins us to share their findings.
The research can be found here:
https://knobattack.com
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Sep 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>102</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/fa08df68-df11-11ea-851c-975a3847bd0c/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Bluetooth blues: KNOB attack explained. [Research Saturday]</itunes:subtitle>
      <itunes:summary>A team of researchers have published a report titled, "KNOB Attack.
Key Negotiation of Bluetooth Attack: Breaking Bluetooth Security." The report outlines vulnerabilities in the Bluetooth standard, along with mitigations to prevent them. 
Daniele Antonioli is from Singapore University of Technology and Design, and is one of the researchers studying KNOB. He joins us to share their findings.
The research can be found here:
https://knobattack.com
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A team of researchers have published a report titled, "KNOB Attack.</p><p>Key Negotiation of Bluetooth Attack: Breaking Bluetooth Security." The report outlines vulnerabilities in the Bluetooth standard, along with mitigations to prevent them. </p><p>Daniele Antonioli is from Singapore University of Technology and Design, and is one of the researchers studying KNOB. He joins us to share their findings.</p><p>The research can be found here:</p><p><a href="https://knobattack.com">https://knobattack.com</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1158</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[184870f69d214967aff0e253a29c95cd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7043138303.mp3?updated=1685044937" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CRASHOVERRIDE tried to be worse than it was. InnfiRAT scouts for wallets. Simjacker exploited in the Middle East. SINET 16 are out. Pentesting scope. Back up your files, Mayor. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/927/notes</link>
      <description>The Ukrainian electrical grid hack seems, on further review, to have been designed to do far more damage than it actually accomplished. InnfiRAT is scouting for access to cryptocurrency wallets. A sophisticated threat actor is using Simjacker for surveillance on phones in the Middle East. The SINET 16 have been announced. A penetration test goes bad due to a misunderstanding of scope, and Baltimore decides, hey, it might be a good idea to back up files.  Johannes Ullrich from the SANS Technology Institute on web spam systems. Guest is Rosa Smothers from KnowBe4 discussing her career journey and the importance of diversity in tech.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_13.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 13 Sep 2019 19:37:04 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>927</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/721ebc58-def8-11ea-911f-0f04eabe42f6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>CRASHOVERRIDE tried to be worse than it was. InnfiRAT scouts for wallets. Simjacker exploited in the Middle East. SINET 16 are out. Pentesting scope. Back up your files, Mayor. </itunes:subtitle>
      <itunes:summary>The Ukrainian electrical grid hack seems, on further review, to have been designed to do far more damage than it actually accomplished. InnfiRAT is scouting for access to cryptocurrency wallets. A sophisticated threat actor is using Simjacker for surveillance on phones in the Middle East. The SINET 16 have been announced. A penetration test goes bad due to a misunderstanding of scope, and Baltimore decides, hey, it might be a good idea to back up files.  Johannes Ullrich from the SANS Technology Institute on web spam systems. Guest is Rosa Smothers from KnowBe4 discussing her career journey and the importance of diversity in tech.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_13.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Ukrainian electrical grid hack seems, on further review, to have been designed to do far more damage than it actually accomplished. InnfiRAT is scouting for access to cryptocurrency wallets. A sophisticated threat actor is using Simjacker for surveillance on phones in the Middle East. The SINET 16 have been announced. A penetration test goes bad due to a misunderstanding of scope, and Baltimore decides, hey, it might be a good idea to back up files.  Johannes Ullrich from the SANS Technology Institute on web spam systems. Guest is Rosa Smothers from KnowBe4 discussing her career journey and the importance of diversity in tech.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_13.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1611</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a8215cfd0bcd4edea698ee829403d1c4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9041166374.mp3?updated=1608756309" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The StingRays that were n DC. Old-school file formats and attack code. Ransomware becomes spyware. Joker apps ejected from the Play store. Multifaceted deterrence. Advice on BEC.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/926/notes</link>
      <description>DC StingRays alleged to be Israeli devices. North Korea is slipping malware past defenses by putting it into old, obscure file formats. Ryuk ransomware gets some spyware functionality. Google has purged Joker-infested apps from the Play store. The US Defense Department explains its “multifaceted” approach to cyber deterrence. The FBI warns that business email compromise is on the upswing, and offers some advice on staying safe. Awais Rashid from Bristol University with warnings on accepting default settings on mobile devices. Guest is Bill Conner from SonicWall on side channel attacks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_12.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 12 Sep 2019 19:59:38 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>926</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/723757a4-def8-11ea-911f-ebb480934c64/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The StingRays that were n DC. Old-school file formats and attack code. Ransomware becomes spyware. Joker apps ejected from the Play store. Multifaceted deterrence. Advice on BEC.</itunes:subtitle>
      <itunes:summary>DC StingRays alleged to be Israeli devices. North Korea is slipping malware past defenses by putting it into old, obscure file formats. Ryuk ransomware gets some spyware functionality. Google has purged Joker-infested apps from the Play store. The US Defense Department explains its “multifaceted” approach to cyber deterrence. The FBI warns that business email compromise is on the upswing, and offers some advice on staying safe. Awais Rashid from Bristol University with warnings on accepting default settings on mobile devices. Guest is Bill Conner from SonicWall on side channel attacks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_12.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>DC StingRays alleged to be Israeli devices. North Korea is slipping malware past defenses by putting it into old, obscure file formats. Ryuk ransomware gets some spyware functionality. Google has purged Joker-infested apps from the Play store. The US Defense Department explains its “multifaceted” approach to cyber deterrence. The FBI warns that business email compromise is on the upswing, and offers some advice on staying safe. Awais Rashid from Bristol University with warnings on accepting default settings on mobile devices. Guest is Bill Conner from SonicWall on side channel attacks.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_12.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1244</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6c62c357c378444f8fa80b0586f54420]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6742684647.mp3?updated=1690150368" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cobalt Dickens, coming to a university library near you. UNICEF data exposure. Election security notes. Operation reWired arrests 281 alleged BEC scammers.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/925/notes</link>
      <description>Cobalt Dickens is back, and phishing in universities’ ponds. UNICEF scores a security own-goal. Patch Tuesday notes. A look at US election security offers bad news, but with some hope for improvement. The US extends its state of national emergency with respect to foreign meddling in elections. And an international police sweep draws in 281 alleged BEC scammers. Ben Yelin from UMD CHHS on the privacy implications of geofencing. Guest is Drew Kilbourne from Synopsys with result of their report, The State of Software Security in the Financial Services Industry.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_11.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 11 Sep 2019 19:30:24 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>925</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/724ca802-def8-11ea-911f-c7d01bcd9c51/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cobalt Dickens, coming to a university library near you. UNICEF data exposure. Election security notes. Operation reWired arrests 281 alleged BEC scammers.</itunes:subtitle>
      <itunes:summary>Cobalt Dickens is back, and phishing in universities’ ponds. UNICEF scores a security own-goal. Patch Tuesday notes. A look at US election security offers bad news, but with some hope for improvement. The US extends its state of national emergency with respect to foreign meddling in elections. And an international police sweep draws in 281 alleged BEC scammers. Ben Yelin from UMD CHHS on the privacy implications of geofencing. Guest is Drew Kilbourne from Synopsys with result of their report, The State of Software Security in the Financial Services Industry.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_11.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cobalt Dickens is back, and phishing in universities’ ponds. UNICEF scores a security own-goal. Patch Tuesday notes. A look at US election security offers bad news, but with some hope for improvement. The US extends its state of national emergency with respect to foreign meddling in elections. And an international police sweep draws in 281 alleged BEC scammers. Ben Yelin from UMD CHHS on the privacy implications of geofencing. Guest is Drew Kilbourne from Synopsys with result of their report, The State of Software Security in the Financial Services Industry.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_11.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1352</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d9d4993def5441da9be50a62455b04bb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4220226596.mp3?updated=1690150253" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US National Security Advisor to be replaced. Stealth Falcon’s new backdoor. DDoS, social engineering investigations proceed. Exfiltrating an agent. Patch Tuesday notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/924/notes</link>
      <description>John Bolton is out as US National Security Advisor. A new backdoor is attributed to Stealth Falcon. Wikipedia’s DDoS attack remains under investigation. So does a business email compromise at Toyota Boshoku and a raid on the Oklahoma Law Enforcement Retirement Services. Vulnerable web radios get patches. The US is said to have exfiltrated a HUMINT asset from Russia in 2017. Microsoft patches 79 vulnerabilities, 17 of them rated critical. Michael Sechrist from Booz Allen Hamilton on the spillover of geopolitical issues into cyber security. Guest is Ashish Gupta from Bugcrowd on the economics of hacking and the adoption of ethical hacking.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_010.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Sep 2019 19:22:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>924</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/726227ae-def8-11ea-911f-4f31d62371fb/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>US National Security Advisor to be replaced. Stealth Falcon’s new backdoor. DDoS, social engineering investigations proceed. Exfiltrating an agent. Patch Tuesday notes.</itunes:subtitle>
      <itunes:summary>John Bolton is out as US National Security Advisor. A new backdoor is attributed to Stealth Falcon. Wikipedia’s DDoS attack remains under investigation. So does a business email compromise at Toyota Boshoku and a raid on the Oklahoma Law Enforcement Retirement Services. Vulnerable web radios get patches. The US is said to have exfiltrated a HUMINT asset from Russia in 2017. Microsoft patches 79 vulnerabilities, 17 of them rated critical. Michael Sechrist from Booz Allen Hamilton on the spillover of geopolitical issues into cyber security. Guest is Ashish Gupta from Bugcrowd on the economics of hacking and the adoption of ethical hacking.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_010.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>John Bolton is out as US National Security Advisor. A new backdoor is attributed to Stealth Falcon. Wikipedia’s DDoS attack remains under investigation. So does a business email compromise at Toyota Boshoku and a raid on the Oklahoma Law Enforcement Retirement Services. Vulnerable web radios get patches. The US is said to have exfiltrated a HUMINT asset from Russia in 2017. Microsoft patches 79 vulnerabilities, 17 of them rated critical. Michael Sechrist from Booz Allen Hamilton on the spillover of geopolitical issues into cyber security. Guest is Ashish Gupta from Bugcrowd on the economics of hacking and the adoption of ethical hacking.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_010.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1329</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c9c981ddc17c44c18dc83a3cfd1c9f0f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7393823231.mp3?updated=1690150043" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BEC attack pulls millions from car parts company. Wikipedia DDoS. NERC and FERC on grid hacking. Trolling Pyongyang. Mike Hammer goes to the DMV.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/923/notes</link>
      <description>A big BEC extracts more than $37 million from a major automotive parts supplier. Wikipedia suffers a DDoS attack in Europe and the Middle East. NERC and FERC get to work. Thrip may really be Billbug, and that’s attribution, not etymology. Was US Cyber Command trolling North Korea on the DPRK’s national day? And what does the Department of Motor Vehicles do with all the data they collect on drivers? In some US states, it seems, they sell it to private eyes. Joe Carrigan from JHU ISI on a GMail update for iOS which enables the blocking of tracking pixels.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_09.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 09 Sep 2019 20:04:32 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>923</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7287de04-def8-11ea-911f-5372e34b587f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>BEC attack pulls millions from car parts company. Wikipedia DDoS. NERC and FERC on grid hacking. Trolling Pyongyang. Mike Hammer goes to the DMV.</itunes:subtitle>
      <itunes:summary>A big BEC extracts more than $37 million from a major automotive parts supplier. Wikipedia suffers a DDoS attack in Europe and the Middle East. NERC and FERC get to work. Thrip may really be Billbug, and that’s attribution, not etymology. Was US Cyber Command trolling North Korea on the DPRK’s national day? And what does the Department of Motor Vehicles do with all the data they collect on drivers? In some US states, it seems, they sell it to private eyes. Joe Carrigan from JHU ISI on a GMail update for iOS which enables the blocking of tracking pixels.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_09.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A big BEC extracts more than $37 million from a major automotive parts supplier. Wikipedia suffers a DDoS attack in Europe and the Middle East. NERC and FERC get to work. Thrip may really be Billbug, and that’s attribution, not etymology. Was US Cyber Command trolling North Korea on the DPRK’s national day? And what does the Department of Motor Vehicles do with all the data they collect on drivers? In some US states, it seems, they sell it to private eyes. Joe Carrigan from JHU ISI on a GMail update for iOS which enables the blocking of tracking pixels.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_09.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>978</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[940d6c9fcfc04fbb94463ec6904e4d1c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5445532975.mp3?updated=1690150002" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>VOIP phone system harbors decade-old vulnerability. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/101/notes</link>
      <description>Researchers at McAfee's Advanced Threat Research Team recently published the results of their investigation into a popular VOIP system, where they discovered a well-know, decade-old vulnerability in open source software used on the platform. 
Steve Povolny serves as the Head of Advanced Threat Research at McAfee, and he joins us to share their findings.
The original research can be found here:
 https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/avaya-deskphone-decade-old-vulnerability-found-in-phones-firmware/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Sep 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>101</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/f8de5d34-df11-11ea-9dfb-237c6cd8e223/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>VOIP phone system harbors decade-old vulnerability. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at McAfee's Advanced Threat Research Team recently published the results of their investigation into a popular VOIP system, where they discovered a well-know, decade-old vulnerability in open source software used on the platform. 
Steve Povolny serves as the Head of Advanced Threat Research at McAfee, and he joins us to share their findings.
The original research can be found here:
 https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/avaya-deskphone-decade-old-vulnerability-found-in-phones-firmware/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at McAfee's Advanced Threat Research Team recently published the results of their investigation into a popular VOIP system, where they discovered a well-know, decade-old vulnerability in open source software used on the platform. </p><p>Steve Povolny serves as the Head of Advanced Threat Research at McAfee, and he joins us to share their findings.</p><p>The original research can be found here:</p><p><a href="https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/avaya-deskphone-decade-old-vulnerability-found-in-phones-firmware/"> https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/avaya-deskphone-decade-old-vulnerability-found-in-phones-firmware/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1705</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[63f35802db874d60abef8ece3bddaed8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9239241374.mp3?updated=1685044924" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>China hacks to track. Turning the enemy’s weapons against them? Notes from the Billington CyberSecurity Summit. Anti-trust investigations for Facebook and, probably, Google. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/922/notes</link>
      <description>Chinese intelligence and security services have been busy in cyberspace. A third-party customer leaks data it received from Monster.com. There’s a Joker in the Play Store. Some notes from the Billington CyberSecurity Summit: a military look at cyber ops, what CISA’s up to, and some advice from the NCSC. Anti-trust investigations are on the way for Facebook, and it seems likely that Google will be next. Malek Ben Salem from Accenture Labs on leveraging the blockchain for AI. Guest is Doug Grindstaff from the CMMI institute, who makes the case that CISOs need to think more like VCs.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_06.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 06 Sep 2019 19:57:43 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>922</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/72c5ef5a-def8-11ea-911f-a3ba57242b84/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>China hacks to track. Turning the enemy’s weapons against them? Notes from the Billington CyberSecurity Summit. Anti-trust investigations for Facebook and, probably, Google. </itunes:subtitle>
      <itunes:summary>Chinese intelligence and security services have been busy in cyberspace. A third-party customer leaks data it received from Monster.com. There’s a Joker in the Play Store. Some notes from the Billington CyberSecurity Summit: a military look at cyber ops, what CISA’s up to, and some advice from the NCSC. Anti-trust investigations are on the way for Facebook, and it seems likely that Google will be next. Malek Ben Salem from Accenture Labs on leveraging the blockchain for AI. Guest is Doug Grindstaff from the CMMI institute, who makes the case that CISOs need to think more like VCs.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_06.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chinese intelligence and security services have been busy in cyberspace. A third-party customer leaks data it received from Monster.com. There’s a Joker in the Play Store. Some notes from the Billington CyberSecurity Summit: a military look at cyber ops, what CISA’s up to, and some advice from the NCSC. Anti-trust investigations are on the way for Facebook, and it seems likely that Google will be next. Malek Ben Salem from Accenture Labs on leveraging the blockchain for AI. Guest is Doug Grindstaff from the CMMI institute, who makes the case that CISOs need to think more like VCs.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_06.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1634</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6961ad052cfa40d7a89d6a750bcb8f00]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6837296115.mp3?updated=1608756327" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scraped data found gurgling around in an unsecured third-party database. Ransomware and election security. Spy in your pocket? (Probably not.) Guilty plea in the Satori case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/921/notes</link>
      <description>A database scraped from Facebook in the bad old days before last year’s reforms holds informaiton about 419 million users. The ransomware threat to election security. Notes from the Billington CyberSecurity Summit. Is your phone reporting back to Mountain View or Cupertino? Probably not, at least not in the way the Twitterverse would have you believe. And the Feds get a guilty plea in the case of the Satori botnet. Awais Rashid from Bristol University on the notion of bystander privacy. Carole Theriault speaks with Dov Goldman, Director of Risk and Compliance at Panorays on the most noteworthy third-party breaches of 2019 so far.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_05.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 05 Sep 2019 16:27:20 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>921</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/72ebaeca-def8-11ea-911f-7b762a8b2303/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Scraped data found gurgling around in an unsecured third-party database. Ransomware and election security. Spy in your pocket? (Probably not.) Guilty plea in the Satori case.</itunes:subtitle>
      <itunes:summary>A database scraped from Facebook in the bad old days before last year’s reforms holds informaiton about 419 million users. The ransomware threat to election security. Notes from the Billington CyberSecurity Summit. Is your phone reporting back to Mountain View or Cupertino? Probably not, at least not in the way the Twitterverse would have you believe. And the Feds get a guilty plea in the case of the Satori botnet. Awais Rashid from Bristol University on the notion of bystander privacy. Carole Theriault speaks with Dov Goldman, Director of Risk and Compliance at Panorays on the most noteworthy third-party breaches of 2019 so far.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_05.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A database scraped from Facebook in the bad old days before last year’s reforms holds informaiton about 419 million users. The ransomware threat to election security. Notes from the Billington CyberSecurity Summit. Is your phone reporting back to Mountain View or Cupertino? Probably not, at least not in the way the Twitterverse would have you believe. And the Feds get a guilty plea in the case of the Satori botnet. Awais Rashid from Bristol University on the notion of bystander privacy. Carole Theriault speaks with Dov Goldman, Director of Risk and Compliance at Panorays on the most noteworthy third-party breaches of 2019 so far.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_05.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1236</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fd45c5d2e83749999340ac03c8232cc4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8461165492.mp3?updated=1690149909" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware, Bitcoin, underwriters, and the bandit economy. OTA provisioning could lead to subtle phishing. Alleged spammers indicted. ZAO flashes and flickers out, for now.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/920/notes</link>
      <description>A look at the ongoing ransomware epidemic, with some speculation about its connection to the criminal economy. Over-the-air provisioning might open Android users to sophisticated phishing approaches. Alleged spammers are indicted in California. And, ZAO, we hardly knew ye. Jonathan Katz from UMD on the evolution of Rowhammer attacks. Tamika Smith speaks with Troy Gill from AppRiver about cities being hit with ransomware.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_04.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 04 Sep 2019 20:20:32 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>920</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7309f254-def8-11ea-911f-0b0bee8b7717/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ransomware, Bitcoin, underwriters, and the bandit economy. OTA provisioning could lead to subtle phishing. Alleged spammers indicted. ZAO flashes and flickers out, for now.</itunes:subtitle>
      <itunes:summary>A look at the ongoing ransomware epidemic, with some speculation about its connection to the criminal economy. Over-the-air provisioning might open Android users to sophisticated phishing approaches. Alleged spammers are indicted in California. And, ZAO, we hardly knew ye. Jonathan Katz from UMD on the evolution of Rowhammer attacks. Tamika Smith speaks with Troy Gill from AppRiver about cities being hit with ransomware.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_04.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A look at the ongoing ransomware epidemic, with some speculation about its connection to the criminal economy. Over-the-air provisioning might open Android users to sophisticated phishing approaches. Alleged spammers are indicted in California. And, ZAO, we hardly knew ye. Jonathan Katz from UMD on the evolution of Rowhammer attacks. Tamika Smith speaks with Troy Gill from AppRiver about cities being hit with ransomware.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_04.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1223</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d8ba91a6fc2b4bdc80a680a7d2255681]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2872131773.mp3?updated=1690149881" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stuxnet’s story. Watering hole was designed to attract China’s Muslim minority. USBAnywhere affects some Supermicro servers. Twitter’s CEO has his Twitter stream hijacked.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/919/notes</link>
      <description>A report on Stuxnet suggests there were at least five and probably six countries whose intelligence services cooperated in the disabling cyberattack against Iran’s nuclear enrichment program. The watering hole Project Zero reported last week seems to have affected Android and Windows as well as iOS devices, and appears directed against China’s Uyghur minority. USBAnywhere vulnerability affects servers. And no, those tweets last Friday weren’t from Mr. Dorsey. Joe Carrigan from JHU ISI with thoughts on security onboarding as the fall semester begins. Guest is Rinki Sethi from Rubrick on the cybersecurity skills gap and the importance of diversity.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_03.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Sep 2019 19:40:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>919</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/73259c8e-def8-11ea-911f-cb6be9aef3ea/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Stuxnet’s story. Watering hole was designed to attract China’s Muslim minority. USBAnywhere affects some Supermicro servers. Twitter’s CEO has his Twitter stream hijacked.</itunes:subtitle>
      <itunes:summary>A report on Stuxnet suggests there were at least five and probably six countries whose intelligence services cooperated in the disabling cyberattack against Iran’s nuclear enrichment program. The watering hole Project Zero reported last week seems to have affected Android and Windows as well as iOS devices, and appears directed against China’s Uyghur minority. USBAnywhere vulnerability affects servers. And no, those tweets last Friday weren’t from Mr. Dorsey. Joe Carrigan from JHU ISI with thoughts on security onboarding as the fall semester begins. Guest is Rinki Sethi from Rubrick on the cybersecurity skills gap and the importance of diversity.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_03.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A report on Stuxnet suggests there were at least five and probably six countries whose intelligence services cooperated in the disabling cyberattack against Iran’s nuclear enrichment program. The watering hole Project Zero reported last week seems to have affected Android and Windows as well as iOS devices, and appears directed against China’s Uyghur minority. USBAnywhere vulnerability affects servers. And no, those tweets last Friday weren’t from Mr. Dorsey. Joe Carrigan from JHU ISI with thoughts on security onboarding as the fall semester begins. Guest is Rinki Sethi from Rubrick on the cybersecurity skills gap and the importance of diversity.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/September/CyberWire_2019_09_03.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1253</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[df7cbeffea56493ca65ea7f28663f3c5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1087427896.mp3?updated=1690149854" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Emotet's updated business model. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/100/notes</link>
      <description>The Emotet malware came on the scene in 2014 as a banking trojan and has since evolved in sophistication and shifted its business model. Researchers at Bromium have taken a detailed look at Emotet, and malware analyst Alex Holland joins us to share their findings.
The research can be found here:
 https://www.google.com/url?q=https://www.bromium.com/resource/emotet-a-technical-analysis-of-the-destructive-polymorphic-malware
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 31 Aug 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>100</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/77dc87f6-df11-11ea-bcec-2f2a203ab04e/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Emotet's updated business model. [Research Saturday]</itunes:subtitle>
      <itunes:summary>The Emotet malware came on the scene in 2014 as a banking trojan and has since evolved in sophistication and shifted its business model. Researchers at Bromium have taken a detailed look at Emotet, and malware analyst Alex Holland joins us to share their findings.
The research can be found here:
 https://www.google.com/url?q=https://www.bromium.com/resource/emotet-a-technical-analysis-of-the-destructive-polymorphic-malware
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Emotet malware came on the scene in 2014 as a banking trojan and has since evolved in sophistication and shifted its business model. Researchers at Bromium have taken a detailed look at Emotet, and malware analyst Alex Holland joins us to share their findings.</p><p>The research can be found here:</p><p><a href="https://www.google.com/url?q=https://www.bromium.com/resource/emotet-a-technical-analysis-of-the-destructive-polymorphic-malware"> https://www.google.com/url?q=https://www.bromium.com/resource/emotet-a-technical-analysis-of-the-destructive-polymorphic-malware</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1524</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3675f10b3d124a6d93cb078b83db4d8e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1577282320.mp3?updated=1685044909" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Watering hole for iPhones. Dental record service hit with ransomware. Huawei reportedly under investigation for IP theft. “erratic” faces cryptojacking charges. Farewell to a Bletchley Wren.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/918/notes</link>
      <description>Google’s Project Zero releases information on a long-running watering-hole campaign against iPhone users. A dental record backup service is hit by ransomware, and the decryptor the extortionists gave them may not work. Huawei may be in fresh legal hot water over alleged IP theft. Cryptojacking charges are added to those the accused Capital One hacker faces. And we say farewell to a Bletchley Park veteran. Emily Wilson from Terbium Labs on back-to-school season in the fraud markets. Guest is the one-and-only Jack Bittner, with his insights on how middle-schoolers are handling security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/August/CyberWire_2019_08_30.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 30 Aug 2019 19:13:49 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>918</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/73416ffe-def8-11ea-911f-d3502ad126a2/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Watering hole for iPhones. Dental record service hit with ransomware. Huawei reportedly under investigation for IP theft. “erratic” faces cryptojacking charges. Farewell to a Bletchley Wren.</itunes:subtitle>
      <itunes:summary>Google’s Project Zero releases information on a long-running watering-hole campaign against iPhone users. A dental record backup service is hit by ransomware, and the decryptor the extortionists gave them may not work. Huawei may be in fresh legal hot water over alleged IP theft. Cryptojacking charges are added to those the accused Capital One hacker faces. And we say farewell to a Bletchley Park veteran. Emily Wilson from Terbium Labs on back-to-school season in the fraud markets. Guest is the one-and-only Jack Bittner, with his insights on how middle-schoolers are handling security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/August/CyberWire_2019_08_30.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Google’s Project Zero releases information on a long-running watering-hole campaign against iPhone users. A dental record backup service is hit by ransomware, and the decryptor the extortionists gave them may not work. Huawei may be in fresh legal hot water over alleged IP theft. Cryptojacking charges are added to those the accused Capital One hacker faces. And we say farewell to a Bletchley Park veteran. Emily Wilson from Terbium Labs on back-to-school season in the fraud markets. Guest is the one-and-only Jack Bittner, with his insights on how middle-schoolers are handling security.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/August/CyberWire_2019_08_30.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1342</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[235f77267f8d44c09670602970d0f79a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4261211495.mp3?updated=1608756285" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberattacks and intelligence trade-offs. TrickBot’s new interests. Fancy Bear versus machine learning. Facebook looks for more ad transparency. Retadup take-down.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/917/notes</link>
      <description>Senior US officials say the June 20th attacks on Iranian networks helped stop Tehran’s attacks on tankers in the Arabian Gulf. TrickBot seems to be going after mobile users’ PINs. Fancy Bear has taken note of machine learning and modified her behavior accordingly. Facebook revises its rules to achieve greater transparency in political and issue advertising. A multinational takedown cleans up the Retadup worm infestation. Ben Yelin from UMD CHHS on the proliferation of privately owned license plate readers. Guest is Martin Zizi from Aerendir on biometric security technologies.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/August/CyberWire_2019_08_29.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 29 Aug 2019 19:32:46 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>917</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7356ecb2-def8-11ea-911f-f7039d8a0608/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyberattacks and intelligence trade-offs. TrickBot’s new interests. Fancy Bear versus machine learning. Facebook looks for more ad transparency. Retadup take-down.</itunes:subtitle>
      <itunes:summary>Senior US officials say the June 20th attacks on Iranian networks helped stop Tehran’s attacks on tankers in the Arabian Gulf. TrickBot seems to be going after mobile users’ PINs. Fancy Bear has taken note of machine learning and modified her behavior accordingly. Facebook revises its rules to achieve greater transparency in political and issue advertising. A multinational takedown cleans up the Retadup worm infestation. Ben Yelin from UMD CHHS on the proliferation of privately owned license plate readers. Guest is Martin Zizi from Aerendir on biometric security technologies.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/August/CyberWire_2019_08_29.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Senior US officials say the June 20th attacks on Iranian networks helped stop Tehran’s attacks on tankers in the Arabian Gulf. TrickBot seems to be going after mobile users’ PINs. Fancy Bear has taken note of machine learning and modified her behavior accordingly. Facebook revises its rules to achieve greater transparency in political and issue advertising. A multinational takedown cleans up the Retadup worm infestation. Ben Yelin from UMD CHHS on the proliferation of privately owned license plate readers. Guest is Martin Zizi from Aerendir on biometric security technologies.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/August/CyberWire_2019_08_29.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1276</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bcae3fd081604c65bd616578cd81914f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4624672718.mp3?updated=1690149678" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>LYCEUM active against Middle Eastern energy-sector targets. LinkedIn used to recruit spies. Autonomous car expert indicted. Imperva exposure. VPN software patches. AI writes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/916/notes</link>
      <description>LYCEUM is active against the oil and gas sector in the Middle East. Leaving government service? That nice offer from the head-hunters you got on LinkedIn may be the beginning of an approach by Chinese Intelligence. Autonomous car expert indicted for alleged theft of trade secrets. Imperva discloses a possible breach. Exploitation attempts against VPNs reported. And why did the chicken cross the road? The AI’s not sure, but it thinks the chicken used LIDAR.  Joe Carrigan from JHU ISI on the federal office of the CIO’s Cyber Reskilling Academy graduating their first class. Guest is Peter Smith from Edgewise on microsegmentation.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/August/CyberWire_2019_08_28.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 28 Aug 2019 18:32:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>916</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/736d5d12-def8-11ea-911f-77105fa97f25/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>LYCEUM active against Middle Eastern energy-sector targets. LinkedIn used to recruit spies. Autonomous car expert indicted. Imperva exposure. VPN software patches. AI writes.</itunes:subtitle>
      <itunes:summary>LYCEUM is active against the oil and gas sector in the Middle East. Leaving government service? That nice offer from the head-hunters you got on LinkedIn may be the beginning of an approach by Chinese Intelligence. Autonomous car expert indicted for alleged theft of trade secrets. Imperva discloses a possible breach. Exploitation attempts against VPNs reported. And why did the chicken cross the road? The AI’s not sure, but it thinks the chicken used LIDAR.  Joe Carrigan from JHU ISI on the federal office of the CIO’s Cyber Reskilling Academy graduating their first class. Guest is Peter Smith from Edgewise on microsegmentation.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/August/CyberWire_2019_08_28.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>LYCEUM is active against the oil and gas sector in the Middle East. Leaving government service? That nice offer from the head-hunters you got on LinkedIn may be the beginning of an approach by Chinese Intelligence. Autonomous car expert indicted for alleged theft of trade secrets. Imperva discloses a possible breach. Exploitation attempts against VPNs reported. And why did the chicken cross the road? The AI’s not sure, but it thinks the chicken used LIDAR.  Joe Carrigan from JHU ISI on the federal office of the CIO’s Cyber Reskilling Academy graduating their first class. Guest is Peter Smith from Edgewise on microsegmentation.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/August/CyberWire_2019_08_28.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1296</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4e9f10c66dbb4d2fa2658886fbf771c6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9257996312.mp3?updated=1690149660" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hostinger resets passwords after an intrusion. Social media fraud. Notes on RATs and ransomware. Free decryptor for Syrk. Hedge funds go bananas.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/915/notes</link>
      <description>Hostinger resets passwords after a breach. Arkose finds that more than half the social media logins they investigated during the recent quarter were fraudulent. US State governors seem likely to call on the National Guard to help with cyber incidents. A new phishing campaign is distributing the Quasar RAT. A new ransomware strain, Nemty, is out in the wild. Fortnite account encrypted? Emsisoft can help. And who knew that hedge funds liked bananas. David Dufour from Webroot on company cyber security assessments. Carole Theriault speaks with Omar Yaacoubi from Barac on the growth in encrypted hacks, and how they use metadata to detect and analyze them.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/August/CyberWire_2019_08_27.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Aug 2019 19:23:57 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>915</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/73891c14-def8-11ea-911f-67b5d538700d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hostinger resets passwords after an intrusion. Social media fraud. Notes on RATs and ransomware. Free decryptor for Syrk. Hedge funds go bananas.</itunes:subtitle>
      <itunes:summary>Hostinger resets passwords after a breach. Arkose finds that more than half the social media logins they investigated during the recent quarter were fraudulent. US State governors seem likely to call on the National Guard to help with cyber incidents. A new phishing campaign is distributing the Quasar RAT. A new ransomware strain, Nemty, is out in the wild. Fortnite account encrypted? Emsisoft can help. And who knew that hedge funds liked bananas. David Dufour from Webroot on company cyber security assessments. Carole Theriault speaks with Omar Yaacoubi from Barac on the growth in encrypted hacks, and how they use metadata to detect and analyze them.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/August/CyberWire_2019_08_27.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Hostinger resets passwords after a breach. Arkose finds that more than half the social media logins they investigated during the recent quarter were fraudulent. US State governors seem likely to call on the National Guard to help with cyber incidents. A new phishing campaign is distributing the Quasar RAT. A new ransomware strain, Nemty, is out in the wild. Fortnite account encrypted? Emsisoft can help. And who knew that hedge funds liked bananas. David Dufour from Webroot on company cyber security assessments. Carole Theriault speaks with Omar Yaacoubi from Barac on the growth in encrypted hacks, and how they use metadata to detect and analyze them.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/August/CyberWire_2019_08_27.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1211</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e4805ef0cdba486aa0019bc45b93c82b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2334648752.mp3?updated=1690149642" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BioWatch info potentially exposed. Scammers indicted. Ukrainian cryptojacking exposed sensitive data. Social engineering notes. Boo birds and lawsuits. Data use and privacy. Low-earth orbit hack.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/914/notes</link>
      <description>BioWatch info exposed. Patched vulnerabilities are weaponized in the wild. Romance and other scam indictments name eighty defendants. Cryptomining and data exposure. Social engineering with a sheen of multi-factor authentication. Suing the boo birds and the people who let them in. The road to unhappiness is paved with mutually exclusive good intentions. And alleged identity theft from low-earth orbit. Craig Williams from Cisco Talos discussing Heaven’s Gate RAT. Guest is Mike Weber from Coalfire on their recently published Penetration Risk Report.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/August/CyberWire_2019_08_26.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 26 Aug 2019 19:46:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>914</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/73a0b694-def8-11ea-911f-a31f7a40ca81/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>BioWatch info potentially exposed. Scammers indicted. Ukrainian cryptojacking exposed sensitive data. Social engineering notes. Boo birds and lawsuits. Data use and privacy. Low-earth orbit hack.</itunes:subtitle>
      <itunes:summary>BioWatch info exposed. Patched vulnerabilities are weaponized in the wild. Romance and other scam indictments name eighty defendants. Cryptomining and data exposure. Social engineering with a sheen of multi-factor authentication. Suing the boo birds and the people who let them in. The road to unhappiness is paved with mutually exclusive good intentions. And alleged identity theft from low-earth orbit. Craig Williams from Cisco Talos discussing Heaven’s Gate RAT. Guest is Mike Weber from Coalfire on their recently published Penetration Risk Report.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/August/CyberWire_2019_08_26.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>BioWatch info exposed. Patched vulnerabilities are weaponized in the wild. Romance and other scam indictments name eighty defendants. Cryptomining and data exposure. Social engineering with a sheen of multi-factor authentication. Suing the boo birds and the people who let them in. The road to unhappiness is paved with mutually exclusive good intentions. And alleged identity theft from low-earth orbit. Craig Williams from Cisco Talos discussing Heaven’s Gate RAT. Guest is Mike Weber from Coalfire on their recently published Penetration Risk Report.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/August/CyberWire_2019_08_26.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1281</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0cd108263c6a4f749463a14df1fb4e5d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2181348388.mp3?updated=1690149621" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Gift card bots evolve and adapt. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/99/notes</link>
      <description>Researchers at Distil Networks have been tracking online bots targeting ecommerce gift card systems of major online retailers. The threat actors show remarkable resourcefulness and adaptability. Jonathan Butler is technical account team manager at Distil Networks, part of Imperva, and he joins to share their findings.
The research can be found here:
 https://resources.distilnetworks.com/all-blog-posts/giftghostbot-attacks-ecommerce-gift-card-systems
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Aug 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>99</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/75e4e150-df11-11ea-8fd0-97e5fef8e843/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Gift card bots evolve and adapt. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at Distil Networks have been tracking online bots targeting ecommerce gift card systems of major online retailers. The threat actors show remarkable resourcefulness and adaptability. Jonathan Butler is technical account team manager at Distil Networks, part of Imperva, and he joins to share their findings.
The research can be found here:
 https://resources.distilnetworks.com/all-blog-posts/giftghostbot-attacks-ecommerce-gift-card-systems
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Distil Networks have been tracking online bots targeting ecommerce gift card systems of major online retailers. The threat actors show remarkable resourcefulness and adaptability. Jonathan Butler is technical account team manager at Distil Networks, part of Imperva, and he joins to share their findings.</p><p>The research can be found here:</p><p><a href="https://resources.distilnetworks.com/all-blog-posts/giftghostbot-attacks-ecommerce-gift-card-systems"> https://resources.distilnetworks.com/all-blog-posts/giftghostbot-attacks-ecommerce-gift-card-systems</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1547</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8a495db7633f40b98d8b4338164caf64]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8925183732.mp3?updated=1685044895" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Google takes down YouTube influence operation. Cryptomining in a nuclear plant. Spyware in the Google Play Store.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/913/notes</link>
      <description>Google takes down YouTube accounts spreading disinformation about Hong Kong protests. Cryptomining gear seized at a Ukrainian nuclear plant. CISA outlines its strategic vision. Telcos and law enforcement team up to stop robocalls. Spyware makes it into the Google Play Store twice. And a man gets life in prison for installing hidden cameras. Awais Rashid from University of Bristol on cybersecurity risk decisions. Guest is Cathy Hall from Sila on Privileged Access Management.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 23 Aug 2019 21:08:43 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>913</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/73ba6706-def8-11ea-911f-7f3f6d5a8427/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Google takes down YouTube influence operation. Cryptomining in a nuclear plant. Spyware in the Google Play Store.</itunes:subtitle>
      <itunes:summary>Google takes down YouTube accounts spreading disinformation about Hong Kong protests. Cryptomining gear seized at a Ukrainian nuclear plant. CISA outlines its strategic vision. Telcos and law enforcement team up to stop robocalls. Spyware makes it into the Google Play Store twice. And a man gets life in prison for installing hidden cameras. Awais Rashid from University of Bristol on cybersecurity risk decisions. Guest is Cathy Hall from Sila on Privileged Access Management.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Google takes down YouTube accounts spreading disinformation about Hong Kong protests. Cryptomining gear seized at a Ukrainian nuclear plant. CISA outlines its strategic vision. Telcos and law enforcement team up to stop robocalls. Spyware makes it into the Google Play Store twice. And a man gets life in prison for installing hidden cameras. Awais Rashid from University of Bristol on cybersecurity risk decisions. Guest is Cathy Hall from Sila on Privileged Access Management.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1362</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cc35d733a53d4b9ea3c993c7e38235af]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5498299933.mp3?updated=1608756303" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>North Korean and Chinese cyber espionage. Updates on Texas ransomware. Steam zero-day released.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/912/notes</link>
      <description>A North Korean cyber espionage campaign targets universities, think tanks, and foreign ministries. Chinese cyber spies goes after the healthcare sector. A bug hunter discloses a zero-day for Steam. Updates on the Texas ransomware attacks. Adult sites leak user information. And Veracruz fans hack their club president’s Twitter account to express their displeasure. Guest is Stewart Kantor, CFO and co-founder of Ondas Networks, on securing licensed spectrum. Emily Wilson from Terbium Labs on Phishing Kits.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 22 Aug 2019 18:09:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>912</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/73cf0b16-def8-11ea-911f-bfc5d5290f1b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>North Korean and Chinese cyber espionage. Updates on Texas ransomware. Steam zero-day released.</itunes:subtitle>
      <itunes:summary>A North Korean cyber espionage campaign targets universities, think tanks, and foreign ministries. Chinese cyber spies goes after the healthcare sector. A bug hunter discloses a zero-day for Steam. Updates on the Texas ransomware attacks. Adult sites leak user information. And Veracruz fans hack their club president’s Twitter account to express their displeasure. Guest is Stewart Kantor, CFO and co-founder of Ondas Networks, on securing licensed spectrum. Emily Wilson from Terbium Labs on Phishing Kits.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A North Korean cyber espionage campaign targets universities, think tanks, and foreign ministries. Chinese cyber spies goes after the healthcare sector. A bug hunter discloses a zero-day for Steam. Updates on the Texas ransomware attacks. Adult sites leak user information. And Veracruz fans hack their club president’s Twitter account to express their displeasure. Guest is Stewart Kantor, CFO and co-founder of Ondas Networks, on securing licensed spectrum. Emily Wilson from Terbium Labs on Phishing Kits.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1233</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a0d4aac56e5455c824a8c17629f3859]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5417357887.mp3?updated=1690149469" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>China criticizes Twitter and Facebook. Silence expands internationally. A popular Ruby library was backdoored.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/911/notes</link>
      <description>China says Twitter and Facebook are restricting its freedom of speech. The Silence criminal gang has expanded internationally. Google, Mozilla, and Apple are blocking the Kazakh government’s root certificate. A popular Ruby library was backdoored after a developer’s account was hacked. And scammers buy ads to place their phone numbers at the top of search results. Daniel Prince from Lancaster University on cyber risk in a global economy and guest is Rick Howard Palo Alto Networks on a study revealing Americans are confused about cybersecurity.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 21 Aug 2019 19:50:41 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>911</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/73e55ee8-def8-11ea-911f-4bacd7626169/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>China criticizes Twitter and Facebook. Silence expands internationally. A popular Ruby library was backdoored.</itunes:subtitle>
      <itunes:summary>China says Twitter and Facebook are restricting its freedom of speech. The Silence criminal gang has expanded internationally. Google, Mozilla, and Apple are blocking the Kazakh government’s root certificate. A popular Ruby library was backdoored after a developer’s account was hacked. And scammers buy ads to place their phone numbers at the top of search results. Daniel Prince from Lancaster University on cyber risk in a global economy and guest is Rick Howard Palo Alto Networks on a study revealing Americans are confused about cybersecurity.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>China says Twitter and Facebook are restricting its freedom of speech. The Silence criminal gang has expanded internationally. Google, Mozilla, and Apple are blocking the Kazakh government’s root certificate. A popular Ruby library was backdoored after a developer’s account was hacked. And scammers buy ads to place their phone numbers at the top of search results. Daniel Prince from Lancaster University on cyber risk in a global economy and guest is Rick Howard Palo Alto Networks on a study revealing Americans are confused about cybersecurity.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1253</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[21be2ea174bd4a1ca8200712e9df9a36]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6992579467.mp3?updated=1690149418" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chinese information operations on Twitter and Facebook. iOS jailbreak released. Adult websites leak information.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/910/notes</link>
      <description>Twitter and Facebook shut down Chinese information operations. A jailbreak for the latest version of iOS is out. Facebook may have known about the “view as” bug. Vulnerabilities in Google’s Nest cams are patched. Instagram gets a data abuse bounty program. The FCC released a report on the CenturyLink outage. And adult websites leak information. Michael Sechrist from Booz Allen Hamilton on exploits. Guest is John Bennett from LogMeIn on addressing the growing cyber threats to the SMB market.
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Aug 2019 21:01:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>910</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/73ffc83c-def8-11ea-911f-afa2d3a0fd28/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Chinese information operations on Twitter and Facebook. iOS jailbreak released. Adult websites leak information.</itunes:subtitle>
      <itunes:summary>Twitter and Facebook shut down Chinese information operations. A jailbreak for the latest version of iOS is out. Facebook may have known about the “view as” bug. Vulnerabilities in Google’s Nest cams are patched. Instagram gets a data abuse bounty program. The FCC released a report on the CenturyLink outage. And adult websites leak information. Michael Sechrist from Booz Allen Hamilton on exploits. Guest is John Bennett from LogMeIn on addressing the growing cyber threats to the SMB market.
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Twitter and Facebook shut down Chinese information operations. A jailbreak for the latest version of iOS is out. Facebook may have known about the “view as” bug. Vulnerabilities in Google’s Nest cams are patched. Instagram gets a data abuse bounty program. The FCC released a report on the CenturyLink outage. And adult websites leak information. Michael Sechrist from Booz Allen Hamilton on exploits. Guest is John Bennett from LogMeIn on addressing the growing cyber threats to the SMB market.</p> <p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1341</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7d9314fc0be4c2d9463e3b2ac1355a3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3027069077.mp3?updated=1690149402" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ISIS claims Kabul massacre. Huawei gets a temporary break. Texas governments hit by ransomware. Hy-Vee warns of point-of-sale attack.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/909/notes</link>
      <description>ISIS claims responsibility for Kabul massacre. Huawei gets another temporary reprieve. Local governments in Texas sustain ransomware attacks. Georgia hopes to combat cyberattacks with training. Google cuts a data sharing service. Bulletproof VPN services purchase residential IPs. Smartphones could be used to carry out acoustic side channel attacks. And Hy-Vee warns of a point-of-sale breach. Joe Carrigan from JHU ISI discusses corporate password policies. Guest is Ben Waugh from RedOx talks about bug bounties in healthcare.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 19 Aug 2019 20:17:21 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>909</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/741ed8c6-def8-11ea-911f-07b46aa48cdf/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>ISIS claims Kabul massacre. Huawei gets a temporary break. Texas governments hit by ransomware. Hy-Vee warns of point-of-sale attack.</itunes:subtitle>
      <itunes:summary>ISIS claims responsibility for Kabul massacre. Huawei gets another temporary reprieve. Local governments in Texas sustain ransomware attacks. Georgia hopes to combat cyberattacks with training. Google cuts a data sharing service. Bulletproof VPN services purchase residential IPs. Smartphones could be used to carry out acoustic side channel attacks. And Hy-Vee warns of a point-of-sale breach. Joe Carrigan from JHU ISI discusses corporate password policies. Guest is Ben Waugh from RedOx talks about bug bounties in healthcare.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>ISIS claims responsibility for Kabul massacre. Huawei gets another temporary reprieve. Local governments in Texas sustain ransomware attacks. Georgia hopes to combat cyberattacks with training. Google cuts a data sharing service. Bulletproof VPN services purchase residential IPs. Smartphones could be used to carry out acoustic side channel attacks. And Hy-Vee warns of a point-of-sale breach. Joe Carrigan from JHU ISI discusses corporate password policies. Guest is Ben Waugh from RedOx talks about bug bounties in healthcare.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1252</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e3df45e49a0a42618dd62dce27c92909]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9550048281.mp3?updated=1690149240" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Detecting dating profile fraud. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/98/notes</link>
      <description>Researchers from King’s College London, University of Bristol, Boston University, and University of Melbourne recently collaborated to publish a report titled, "Automatically Dismantling Online Dating Fraud." The research outlines techniques to analyze and identify fraudulent online dating profiles with a high degree of accuracy.

Professor Awais Rashid is one of the report's authors, and he joins us to share their findings.
The original research can be found here:
https://arxiv.org/pdf/1905.12593.pdf
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Aug 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>98</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/727fe9b0-df11-11ea-b170-3f52353a360a/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Detecting dating profile fraud [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers from King’s College London, University of Bristol, Boston University, and University of Melbourne recently collaborated to publish a report titled, "Automatically Dismantling Online Dating Fraud." The research outlines techniques to analyze and identify fraudulent online dating profiles with a high degree of accuracy.

Professor Awais Rashid is one of the report's authors, and he joins us to share their findings.
The original research can be found here:
https://arxiv.org/pdf/1905.12593.pdf
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers from King’s College London, University of Bristol, Boston University, and University of Melbourne recently collaborated to publish a report titled, "Automatically Dismantling Online Dating Fraud." The research outlines techniques to analyze and identify fraudulent online dating profiles with a high degree of accuracy.</p><p><br></p><p>Professor Awais Rashid is one of the report's authors, and he joins us to share their findings.</p><p>The original research can be found here:</p><p><a href="https://arxiv.org/pdf/1905.12593.pdf">https://arxiv.org/pdf/1905.12593.pdf</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1642</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2506374ad03b4c9c82e5a8aa991d2f87]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8473721503.mp3?updated=1685044848" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ECB sustains an intrusion into a third-party-hosted service. Norman quietly mines Monero. MetaMorph appears in a stealthy phishing campaign. Information operations.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/908/notes</link>
      <description>The European Central Bank shutters a service due to a hostile intrusion. Norman quietly mines Monero. MetaMorph passes through email security filters. Some Capital One insiders thought they saw trouble brewing. Instagram crowd-sources epistemology. Deep fakes are well and good, but the will to believe probably gets along just fine with shallow fakes. US Cyber Command posts North Korea’s Electric Fish malware to VirusTotal. Johannes Ullrich from the SANS Technology Institute on IP fragmentation in operating systems. Guest is John Smith from ExtraHop on the aftermath of an insurance claim.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 16 Aug 2019 19:39:25 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>908</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7435fd8a-def8-11ea-911f-1b2f03d8a8d3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>ECB sustains an intrusion into a third-party-hosted service. Norman quietly mines Monero. MetaMorph appears in a stealthy phishing campaign. Information operations.</itunes:subtitle>
      <itunes:summary>The European Central Bank shutters a service due to a hostile intrusion. Norman quietly mines Monero. MetaMorph passes through email security filters. Some Capital One insiders thought they saw trouble brewing. Instagram crowd-sources epistemology. Deep fakes are well and good, but the will to believe probably gets along just fine with shallow fakes. US Cyber Command posts North Korea’s Electric Fish malware to VirusTotal. Johannes Ullrich from the SANS Technology Institute on IP fragmentation in operating systems. Guest is John Smith from ExtraHop on the aftermath of an insurance claim.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The European Central Bank shutters a service due to a hostile intrusion. Norman quietly mines Monero. MetaMorph passes through email security filters. Some Capital One insiders thought they saw trouble brewing. Instagram crowd-sources epistemology. Deep fakes are well and good, but the will to believe probably gets along just fine with shallow fakes. US Cyber Command posts North Korea’s Electric Fish malware to VirusTotal. Johannes Ullrich from the SANS Technology Institute on IP fragmentation in operating systems. Guest is John Smith from ExtraHop on the aftermath of an insurance claim.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1493</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e5d7e4439f3a4b7487a6b7201f2cc17a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3674386840.mp3?updated=1608756314" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Huawei accused of abetting domestic surveillance in Africa. Cyber gangs adapt and evolve. Prosecutors indicate they’ll add charges to “erratic.” Bluetana detects card skimmers.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/907/notes</link>
      <description>Huawei accused of aiding government surveillance programs in Zambia and Uganda. Cyber gangs are adapting to law enforcement, and they’ve turned to “big game hunting.” They’re also adapting legitimate tools to criminal purposes. US Federal prosecutors indicate they intend to add charges to those Paige Thompson already faces for alleged data theft from Capital One. And there’s a new tool out there for detecting gas pump paycard skimmers. Malek Ben Salem from Accenture Labs on transparency and community standards online. Guest is Taylor Armerding from Synopsis on the projected employment shortfall in cyber security.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 15 Aug 2019 20:03:16 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>907</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/744f5582-def8-11ea-911f-ab33e377d0ce/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Huawei accused of abetting domestic surveillance in Africa. Cyber gangs adapt and evolve. Prosecutors indicate they’ll add charges to “erratic.” Bluetana detects card skimmers.</itunes:subtitle>
      <itunes:summary>Huawei accused of aiding government surveillance programs in Zambia and Uganda. Cyber gangs are adapting to law enforcement, and they’ve turned to “big game hunting.” They’re also adapting legitimate tools to criminal purposes. US Federal prosecutors indicate they intend to add charges to those Paige Thompson already faces for alleged data theft from Capital One. And there’s a new tool out there for detecting gas pump paycard skimmers. Malek Ben Salem from Accenture Labs on transparency and community standards online. Guest is Taylor Armerding from Synopsis on the projected employment shortfall in cyber security.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Huawei accused of aiding government surveillance programs in Zambia and Uganda. Cyber gangs are adapting to law enforcement, and they’ve turned to “big game hunting.” They’re also adapting legitimate tools to criminal purposes. US Federal prosecutors indicate they intend to add charges to those Paige Thompson already faces for alleged data theft from Capital One. And there’s a new tool out there for detecting gas pump paycard skimmers. Malek Ben Salem from Accenture Labs on transparency and community standards online. Guest is Taylor Armerding from Synopsis on the projected employment shortfall in cyber security.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1194</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[35d332c521b14054a3fd7e932573b80e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6868136290.mp3?updated=1690149144" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacking the Czech Foreign Ministry. Microsoft patches new wormable bugs. More controversial  human review of AI. Insecure links, exposed databases, and a California vanity plate.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/906/notes</link>
      <description>The Czech Senate wants action on what it describes as a foreign state’s cyberattack on the country’s Foreign Ministry. Microsoft warns against the wormable DéjaBlue set of vulnerabilities. More humans found training AI. Insecure airline check-in links. Exposed databases involve BioStar 2 and Choice Hotels--the latter was held at a third-party vendor. And the LAPD doesn’t find a vanity license plate with the letters N-U-L-L particularly funny. David Dufour from Webroot with thoughts on cyber security insurance policies. Guest is Elisa Costante from ForeScout on building automation vulnerabilities.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 14 Aug 2019 19:57:25 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>906</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7468583e-def8-11ea-911f-0b203c9848f8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hacking the Czech Foreign Ministry. Microsoft patches new wormable bugs. More controversial  human review of AI. Insecure links, exposed databases, and a California vanity plate.</itunes:subtitle>
      <itunes:summary>The Czech Senate wants action on what it describes as a foreign state’s cyberattack on the country’s Foreign Ministry. Microsoft warns against the wormable DéjaBlue set of vulnerabilities. More humans found training AI. Insecure airline check-in links. Exposed databases involve BioStar 2 and Choice Hotels--the latter was held at a third-party vendor. And the LAPD doesn’t find a vanity license plate with the letters N-U-L-L particularly funny. David Dufour from Webroot with thoughts on cyber security insurance policies. Guest is Elisa Costante from ForeScout on building automation vulnerabilities.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Czech Senate wants action on what it describes as a foreign state’s cyberattack on the country’s Foreign Ministry. Microsoft warns against the wormable DéjaBlue set of vulnerabilities. More humans found training AI. Insecure airline check-in links. Exposed databases involve BioStar 2 and Choice Hotels--the latter was held at a third-party vendor. And the LAPD doesn’t find a vanity license plate with the letters N-U-L-L particularly funny. David Dufour from Webroot with thoughts on cyber security insurance policies. Guest is Elisa Costante from ForeScout on building automation vulnerabilities.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1293</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5cb59ef74c3d46d1af740983dde57ae2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3346367597.mp3?updated=1690149105" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>UN Security Council looks at North Korean cybercrime. Notes on PsiXBot and BITTER APT. The state of spearphishing. Election security. A final look back at Black Hat and Def Con. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/905/notes</link>
      <description>More on the UN Security Council’s report on North Korean state-sponsored cyber crime. PsiXBot evolves. BITTER APT probes Chinese government networks in an apparent espionage campaign. A study looks at the state of spearphishing. It’s not just the three-letter agencies out securing US voting systems; it’s the four-letter agencies who are taking point. And a last look back at Black Hat and Def Con. Jonathan Katz from UMD on Apple’s clever new cryptographic protocol. Guest is Mike Overly from Foley and Lardner LLP on the House’s hold on the State Department’s proposal for a Bureau of Cyberspace Securities and Emerging Technologies.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Aug 2019 19:22:02 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>905</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7481a1ae-def8-11ea-911f-4f85a12ab437/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>UN Security Council looks at North Korean cybercrime. Notes on PsiXBot and BITTER APT. The state of spearphishing. Election security. A final look back at Black Hat and Def Con. </itunes:subtitle>
      <itunes:summary>More on the UN Security Council’s report on North Korean state-sponsored cyber crime. PsiXBot evolves. BITTER APT probes Chinese government networks in an apparent espionage campaign. A study looks at the state of spearphishing. It’s not just the three-letter agencies out securing US voting systems; it’s the four-letter agencies who are taking point. And a last look back at Black Hat and Def Con. Jonathan Katz from UMD on Apple’s clever new cryptographic protocol. Guest is Mike Overly from Foley and Lardner LLP on the House’s hold on the State Department’s proposal for a Bureau of Cyberspace Securities and Emerging Technologies.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>More on the UN Security Council’s report on North Korean state-sponsored cyber crime. PsiXBot evolves. BITTER APT probes Chinese government networks in an apparent espionage campaign. A study looks at the state of spearphishing. It’s not just the three-letter agencies out securing US voting systems; it’s the four-letter agencies who are taking point. And a last look back at Black Hat and Def Con. Jonathan Katz from UMD on Apple’s clever new cryptographic protocol. Guest is Mike Overly from Foley and Lardner LLP on the House’s hold on the State Department’s proposal for a Bureau of Cyberspace Securities and Emerging Technologies.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1284</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b05aaa4be3c54b508529f48c7e510d7f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9577595131.mp3?updated=1690148991" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A look back at Black Hat and Def Con. Sometimes failures that look like accidents are accidents. Russia wants better content suppression from Google. Notes on intelligence services.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/904/notes</link>
      <description>A look back at Black Hat and Def Con, with notes on technology and public policy. Participants urge people to contribute their expertise to policymakers. Power failures in the UK at the end of last week are largely resolved, and authorities say they’ve ruled out cyberattack as a possible cause. Russia puts Google on notice that it had better moderate YouTube content to put an end to what Moscow considers incitement to unrest. And China says reports of criminal activity are bunkum. Joe Carrigan from JHU ISI with thoughts on corporate password policies. Guest is Ralph Russo from Tulane University on how schools like Tulane are shaping their programs to meet the needs of business and government.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 12 Aug 2019 18:56:27 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>904</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/749cfb3e-def8-11ea-911f-0b481cf32682/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A look back at Black Hat and Def Con. Sometimes failures that look like accidents are accidents. Russia wants better content suppression from Google. Notes on intelligence services.</itunes:subtitle>
      <itunes:summary>A look back at Black Hat and Def Con, with notes on technology and public policy. Participants urge people to contribute their expertise to policymakers. Power failures in the UK at the end of last week are largely resolved, and authorities say they’ve ruled out cyberattack as a possible cause. Russia puts Google on notice that it had better moderate YouTube content to put an end to what Moscow considers incitement to unrest. And China says reports of criminal activity are bunkum. Joe Carrigan from JHU ISI with thoughts on corporate password policies. Guest is Ralph Russo from Tulane University on how schools like Tulane are shaping their programs to meet the needs of business and government.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A look back at Black Hat and Def Con, with notes on technology and public policy. Participants urge people to contribute their expertise to policymakers. Power failures in the UK at the end of last week are largely resolved, and authorities say they’ve ruled out cyberattack as a possible cause. Russia puts Google on notice that it had better moderate YouTube content to put an end to what Moscow considers incitement to unrest. And China says reports of criminal activity are bunkum. Joe Carrigan from JHU ISI with thoughts on corporate password policies. Guest is Ralph Russo from Tulane University on how schools like Tulane are shaping their programs to meet the needs of business and government.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1334</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e3c46e8de8b846b8942d562db4311e93]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2819565340.mp3?updated=1690148976" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unpacking the Malvertising Ecosystem. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/97/notes</link>
      <description>Researchers at Cisco's Talos Unit recently published research exploring the tactics, technics and procedures of the global malvertising ecosystem. Craig Williams is head of Talos Outreach at Cisco, and he guides us through the life cycle of malicious online ads, along with tips for protecting yourself and your organization.
The research can be found here: 
 https://blog.talosintelligence.com/2019/07/malvertising-deepdive.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Aug 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>97</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7063fc66-df11-11ea-b61d-c7c3fb9516af/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Unpacking the Malvertising Ecosystem. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at Cisco's Talos Unit recently published research exploring the tactics, technics and procedures of the global malvertising ecosystem. Craig Williams is head of Talos Outreach at Cisco, and he guides us through the life cycle of malicious online ads, along with tips for protecting yourself and your organization.
The research can be found here: 
 https://blog.talosintelligence.com/2019/07/malvertising-deepdive.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Cisco's Talos Unit recently published research exploring the tactics, technics and procedures of the global malvertising ecosystem. Craig Williams is head of Talos Outreach at Cisco, and he guides us through the life cycle of malicious online ads, along with tips for protecting yourself and your organization.</p><p>The research can be found here: </p><p><a href="https://blog.talosintelligence.com/2019/07/malvertising-deepdive.html"> https://blog.talosintelligence.com/2019/07/malvertising-deepdive.html</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1707</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[558642666e3243f9ad455929bf8d63e6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5140260255.mp3?updated=1685044839" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Voting machine security. Airliner firmware. Attribution and deterrence in cyberwar. Monitoring social media. Broadcom buys Symantec’s enterprise security business. Policing, privacy, and an IoT OS. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/903/notes</link>
      <description>Are voting machines too connected for comfort? Airliner firmware security is in dispute. Attribution, deterrence, and the problem of an adversary who doesn’t have much to lose. Monitoring social media for signs of violent extremism. Broadcom will buy Symantec’s enterprise business for $10.7 billion. Amazon’s Ring and the police. A CISA update on VxWorks vulnerabilities. And human second-guessing of AI presents some surprising privacy issues.  Justin Harvey from Accenture with his insights from the Black Hat show floor. Guest is Tim Tully from Splunk on the AI race between the US and China.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 09 Aug 2019 20:01:11 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>903</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/74b38052-def8-11ea-911f-9b3f6c36063e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Voting machine security. Airliner firmware. Attribution and deterrence in cyberwar. Monitoring social media. Broadcom buys Symantec’s enterprise security business. Policing, privacy, and an IoT OS. </itunes:subtitle>
      <itunes:summary>Are voting machines too connected for comfort? Airliner firmware security is in dispute. Attribution, deterrence, and the problem of an adversary who doesn’t have much to lose. Monitoring social media for signs of violent extremism. Broadcom will buy Symantec’s enterprise business for $10.7 billion. Amazon’s Ring and the police. A CISA update on VxWorks vulnerabilities. And human second-guessing of AI presents some surprising privacy issues.  Justin Harvey from Accenture with his insights from the Black Hat show floor. Guest is Tim Tully from Splunk on the AI race between the US and China.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Are voting machines too connected for comfort? Airliner firmware security is in dispute. Attribution, deterrence, and the problem of an adversary who doesn’t have much to lose. Monitoring social media for signs of violent extremism. Broadcom will buy Symantec’s enterprise business for $10.7 billion. Amazon’s Ring and the police. A CISA update on VxWorks vulnerabilities. And human second-guessing of AI presents some surprising privacy issues.  Justin Harvey from Accenture with his insights from the Black Hat show floor. Guest is Tim Tully from Splunk on the AI race between the US and China.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1584</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dc7956a29ea14721a1b703120257f8ce]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8452826074.mp3?updated=1608756346" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacking in the Gulf region. Vulnerability research into airliner avionics. Phishing and ransomware move to the cloud. EU data responsibilities. US bans five Chinese companies. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/902/notes</link>
      <description>Tensions in the Gulf are accompanied by an increase in cyber optempo. A warning about vulnerable airliner avionics. Phishing is moving to the cloud, and so is ransomware. Android’s August patches address important Wi-Fi issues. An EU court decision clarifies data responsibilities. The US bans contractors from dealing with five Chinese companies. Bogus Equifax settlement sites are established for fraud. Our guests are both offering insights and observations from this year’s Black Hat conference. Matt Aldridge is from Webroot and Bob Huber is CSO at Tenable.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 08 Aug 2019 19:30:24 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>902</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/74c7e04c-def8-11ea-911f-3781eaa33333/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hacking in the Gulf region. Vulnerability research into airliner avionics. Phishing and ransomware move to the cloud. EU data responsibilities. US bans five Chinese companies. </itunes:subtitle>
      <itunes:summary>Tensions in the Gulf are accompanied by an increase in cyber optempo. A warning about vulnerable airliner avionics. Phishing is moving to the cloud, and so is ransomware. Android’s August patches address important Wi-Fi issues. An EU court decision clarifies data responsibilities. The US bans contractors from dealing with five Chinese companies. Bogus Equifax settlement sites are established for fraud. Our guests are both offering insights and observations from this year’s Black Hat conference. Matt Aldridge is from Webroot and Bob Huber is CSO at Tenable.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tensions in the Gulf are accompanied by an increase in cyber optempo. A warning about vulnerable airliner avionics. Phishing is moving to the cloud, and so is ransomware. Android’s August patches address important Wi-Fi issues. An EU court decision clarifies data responsibilities. The US bans contractors from dealing with five Chinese companies. Bogus Equifax settlement sites are established for fraud. Our guests are both offering insights and observations from this year’s Black Hat conference. Matt Aldridge is from Webroot and Bob Huber is CSO at Tenable.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1262</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[42c0674279544d57a22249f8a5a83173]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9659563702.mp3?updated=1690148600" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Another speculative execution flaw. LokiBot evolves. APT41 moonlights. Scammers exploit tragedies. Black Hat notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/901/notes</link>
      <description>A new speculative execution processor flaw is addressed with software mitigations. LokiBot gets more persistent, and it adopts steganography for better obfuscation. The cyber-spies of APT41 seem to be doing some moonlighting. An accused criminal who bribed telco workers to unlock phones is in custody. Scammers are exploiting the tragedies in El Paso and Dayton. And a call at Black Hat for the security sector to bring in some safety engineers. Ben Yelin from UMD CHHS on Virginia updating legislation to address Deep Fakes. Guest is James Plouffe from MobileIron on the challenges of authentication and the legacy of passwords.
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 07 Aug 2019 20:05:27 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>901</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/74de76ea-def8-11ea-911f-375a30307433/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Another speculative execution flaw. LokiBot evolves. APT41 moonlights. Scammers exploit tragedies. Black Hat notes.</itunes:subtitle>
      <itunes:summary>A new speculative execution processor flaw is addressed with software mitigations. LokiBot gets more persistent, and it adopts steganography for better obfuscation. The cyber-spies of APT41 seem to be doing some moonlighting. An accused criminal who bribed telco workers to unlock phones is in custody. Scammers are exploiting the tragedies in El Paso and Dayton. And a call at Black Hat for the security sector to bring in some safety engineers. Ben Yelin from UMD CHHS on Virginia updating legislation to address Deep Fakes. Guest is James Plouffe from MobileIron on the challenges of authentication and the legacy of passwords.
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A new speculative execution processor flaw is addressed with software mitigations. LokiBot gets more persistent, and it adopts steganography for better obfuscation. The cyber-spies of APT41 seem to be doing some moonlighting. An accused criminal who bribed telco workers to unlock phones is in custody. Scammers are exploiting the tragedies in El Paso and Dayton. And a call at Black Hat for the security sector to bring in some safety engineers. Ben Yelin from UMD CHHS on Virginia updating legislation to address Deep Fakes. Guest is James Plouffe from MobileIron on the challenges of authentication and the legacy of passwords.</p> <p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1286</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8449fa219969425c84c3154d6c77a63c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2347609133.mp3?updated=1690148580" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fancy Bear is snuffling around corporate IoT devices. Machete takes its cuts at Venezuelan military targets. What Mr. Kim is buying. MegaCortex goes for automation. Vigilantes, misconfigurations, etc. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/900/notes</link>
      <description>Fancy Bear is back, and maybe in your office printer. El Machete, a cyber espionage group active at least since 2014, is currently working against the Venezuelan military. A UN report allegedly offers a look at what Mr. Kim is doing with the money his hackers raked in. MegaCortex ransomware shows growing automation. Another unsecured AWS S3 bucket is found. A bank stores some PINs in a log file. Vigilante smishing. And when popping off becomes arguably criminal. Craig Williams from Cisco Talos with updates on Sea Turtle. Guest is Chris Roberts from Attivo Networks with a preview of his Black Hat keynote, A Hacker’s Perspective, Where Do We Go From Here?
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/August/CyberWire_2019_08_06.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Aug 2019 19:05:13 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>900</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/74f2f91c-def8-11ea-911f-03b094e3110a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fancy Bear is snuffling around corporate IoT devices. Machete takes its cuts at Venezuelan military targets. What Mr. Kim is buying. MegaCortex goes for automation. Vigilantes, misconfigurations, etc. </itunes:subtitle>
      <itunes:summary>Fancy Bear is back, and maybe in your office printer. El Machete, a cyber espionage group active at least since 2014, is currently working against the Venezuelan military. A UN report allegedly offers a look at what Mr. Kim is doing with the money his hackers raked in. MegaCortex ransomware shows growing automation. Another unsecured AWS S3 bucket is found. A bank stores some PINs in a log file. Vigilante smishing. And when popping off becomes arguably criminal. Craig Williams from Cisco Talos with updates on Sea Turtle. Guest is Chris Roberts from Attivo Networks with a preview of his Black Hat keynote, A Hacker’s Perspective, Where Do We Go From Here?
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/August/CyberWire_2019_08_06.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Fancy Bear is back, and maybe in your office printer. El Machete, a cyber espionage group active at least since 2014, is currently working against the Venezuelan military. A UN report allegedly offers a look at what Mr. Kim is doing with the money his hackers raked in. MegaCortex ransomware shows growing automation. Another unsecured AWS S3 bucket is found. A bank stores some PINs in a log file. Vigilante smishing. And when popping off becomes arguably criminal. Craig Williams from Cisco Talos with updates on Sea Turtle. Guest is Chris Roberts from Attivo Networks with a preview of his Black Hat keynote, A Hacker’s Perspective, Where Do We Go From Here?</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/August/CyberWire_2019_08_06.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1323</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[84cbc5ce360145438de3eee0e17da4ec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8486890652.mp3?updated=1690148560" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware attacks in Mexico and Germany. Wipers in criminal service. Supervising Siri and Alexa. Mass shooters find inspiration and online expression.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/899/notes</link>
      <description>A Mexican publisher is hit with an extortion demand. Ransomware increasingly carries a destructive, wiper component: Germany is dealing with a virulent strain right now. Apple and Amazon, after the bad optics of reports that they’re farming out Siri and Alexa recordings to human contractors for quality control, are both modifying their approaches to training the assistants. And investigators sort through mass shooters’ digital trails. Joe Carrigan from JHU ISI on the VXWorks operating system vulnerabilities. Guest is Eli Sugarman from the Hewlett Foundation on their efforts to reimagine cybersecurity visuals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 05 Aug 2019 18:40:21 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>899</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/75102a00-def8-11ea-911f-ffa6958cf80c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ransomware attacks in Mexico and Germany. Wipers in criminal service. Supervising Siri and Alexa. Mass shooters find inspiration and online expression.</itunes:subtitle>
      <itunes:summary>A Mexican publisher is hit with an extortion demand. Ransomware increasingly carries a destructive, wiper component: Germany is dealing with a virulent strain right now. Apple and Amazon, after the bad optics of reports that they’re farming out Siri and Alexa recordings to human contractors for quality control, are both modifying their approaches to training the assistants. And investigators sort through mass shooters’ digital trails. Joe Carrigan from JHU ISI on the VXWorks operating system vulnerabilities. Guest is Eli Sugarman from the Hewlett Foundation on their efforts to reimagine cybersecurity visuals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Mexican publisher is hit with an extortion demand. Ransomware increasingly carries a destructive, wiper component: Germany is dealing with a virulent strain right now. Apple and Amazon, after the bad optics of reports that they’re farming out Siri and Alexa recordings to human contractors for quality control, are both modifying their approaches to training the assistants. And investigators sort through mass shooters’ digital trails. Joe Carrigan from JHU ISI on the VXWorks operating system vulnerabilities. Guest is Eli Sugarman from the Hewlett Foundation on their efforts to reimagine cybersecurity visuals.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1157</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cf321ab59b12455e98334216cd6c7b45]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6796102320.mp3?updated=1690148278" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Package manager repository malware detection. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/96/notes</link>
      <description>Researchers at Reversing Labs have been tracking malware hidden in software package manager repositories, and it's use as a supply chain attack vector. Robert Perica is a principal engineer at Reversing Labs, and he joins us to share their findings. 
The research can be found here:
 https://blog.reversinglabs.com/blog/suppy-chain-malware-detecting-malware-in-package-manager-repositories
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Aug 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>96</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6cecc4b4-df11-11ea-9dfb-67c7c6adcd3b/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Package manager repository malware detection. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at Reversing Labs have been tracking malware hidden in software package manager repositories, and it's use as a supply chain attack vector. Robert Perica is a principal engineer at Reversing Labs, and he joins us to share their findings. 
The research can be found here:
 https://blog.reversinglabs.com/blog/suppy-chain-malware-detecting-malware-in-package-manager-repositories
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Reversing Labs have been tracking malware hidden in software package manager repositories, and it's use as a supply chain attack vector. Robert Perica is a principal engineer at Reversing Labs, and he joins us to share their findings. </p><p>The research can be found here:</p><p><a href="https://blog.reversinglabs.com/blog/suppy-chain-malware-detecting-malware-in-package-manager-repositories"> https://blog.reversinglabs.com/blog/suppy-chain-malware-detecting-malware-in-package-manager-repositories</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>836</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[69c06ae5e9d44abbbf6fad01d3d0c49e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8780810971.mp3?updated=1685044815" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Spearphishing utility companies. Bellingcat as gadfly, and target. Facebook takes down more coordinated inauthenticity. Card skimming. Tech regulation. Random acts of cruelty. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/898/notes</link>
      <description>LookBack malware used in spearphishing campaigns against US utilities. Phishing Bellingcat. Facebook takes down two campaigns of coordinated inauthenticity that had been active in the Middle East and North Africa. The growing problem of online card skimming. The FTC’s investigation of Facebook centers on acquisitions. The Fed visits Amazon. And followers of a YouTube streamer treat the homeless as punchlines in a big practical joke. Prof. Awais Rashid from University of Bristol on the ability to “smell” security issues in software. Guest is Matt Howard from Sonotype on their State of the Software Supply Chain report.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 02 Aug 2019 19:52:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>898</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/75293fea-def8-11ea-911f-c3b8f91cdbce/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Spearphishing utility companies. Bellingcat as gadfly, and target. Facebook takes down more coordinated inauthenticity. Card skimming. Tech regulation. Random acts of cruelty. </itunes:subtitle>
      <itunes:summary>LookBack malware used in spearphishing campaigns against US utilities. Phishing Bellingcat. Facebook takes down two campaigns of coordinated inauthenticity that had been active in the Middle East and North Africa. The growing problem of online card skimming. The FTC’s investigation of Facebook centers on acquisitions. The Fed visits Amazon. And followers of a YouTube streamer treat the homeless as punchlines in a big practical joke. Prof. Awais Rashid from University of Bristol on the ability to “smell” security issues in software. Guest is Matt Howard from Sonotype on their State of the Software Supply Chain report.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>LookBack malware used in spearphishing campaigns against US utilities. Phishing Bellingcat. Facebook takes down two campaigns of coordinated inauthenticity that had been active in the Middle East and North Africa. The growing problem of online card skimming. The FTC’s investigation of Facebook centers on acquisitions. The Fed visits Amazon. And followers of a YouTube streamer treat the homeless as punchlines in a big practical joke. Prof. Awais Rashid from University of Bristol on the ability to “smell” security issues in software. Guest is Matt Howard from Sonotype on their State of the Software Supply Chain report.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1553</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[258f3a6b35ff42be9ef522c92c06da4e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3761804057.mp3?updated=1608756099" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Capital One investigation update. Don’t give up on the cloud. Exposed databases and backdoors. Cybercrime as high-stakes poker. Phishing the financials. Bots on holiday. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/897/notes</link>
      <description>Investigators pursue the possibility that the alleged Capital One hacker might have hit other companies’ data. An exposed ElastiSearch database, now secured, was found at Honda Motors. Data from beauty retailer Sephora are found on the dark web. Defenders are urged to think of themselves as in a poker game with the opposition. Phishing remains the biggest threat to financial services. And what vacation spots attract the eyes of bots? Emily Wilson from Terbium Labs with more details from their recent fraud and international crime report. Guest is Giovanni Vigna from Lastline with thoughts on the upcoming Black Hat conference.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/August/CyberWire_2019_08_01.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 01 Aug 2019 19:52:03 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>897</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7542a458-def8-11ea-911f-7755b41b05bd/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Capital One investigation update. Don’t give up on the cloud. Exposed databases and backdoors. Cybercrime as high-stakes poker. Phishing the financials. Bots on holiday. </itunes:subtitle>
      <itunes:summary>Investigators pursue the possibility that the alleged Capital One hacker might have hit other companies’ data. An exposed ElastiSearch database, now secured, was found at Honda Motors. Data from beauty retailer Sephora are found on the dark web. Defenders are urged to think of themselves as in a poker game with the opposition. Phishing remains the biggest threat to financial services. And what vacation spots attract the eyes of bots? Emily Wilson from Terbium Labs with more details from their recent fraud and international crime report. Guest is Giovanni Vigna from Lastline with thoughts on the upcoming Black Hat conference.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/August/CyberWire_2019_08_01.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Investigators pursue the possibility that the alleged Capital One hacker might have hit other companies’ data. An exposed ElastiSearch database, now secured, was found at Honda Motors. Data from beauty retailer Sephora are found on the dark web. Defenders are urged to think of themselves as in a poker game with the opposition. Phishing remains the biggest threat to financial services. And what vacation spots attract the eyes of bots? Emily Wilson from Terbium Labs with more details from their recent fraud and international crime report. Guest is Giovanni Vigna from Lastline with thoughts on the upcoming Black Hat conference.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/August/CyberWire_2019_08_01.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1300</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3ababad28c78415ca66295354b6fb699]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8478418149.mp3?updated=1690148070" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Capital One breach update. CISA warns of avionics CAN bus vulnerabilities. More attacks on local Louisiana governments. Change at the SEC. Cyber summer school for NATO, EU diplomats.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/896/notes</link>
      <description>Capital One takes a market hit from its data loss. Observers see the incident as a reminder that cloud users need to pay attention to their configurations. CISA warns of vulnerabilities in small, general aviation aircraft. Another parish in Louisiana is hit with a cyberattack. The SEC’s top cyber enforcer is moving on from the Commission. And diplomats go to cyber summer school in Estonia. It’s not a coding bootcamp, but it should give them the lay of the cyber land.  Jonathan Katz from UMD on speculation of what a quantum internet might involve. Guest is Jessica Gulick from Katzcy Consulting on the Wicked6 eSports-style cyber competition coming to Las Vegas during Black Hat &amp; Defcon.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_31.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 31 Jul 2019 16:58:05 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>896</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/755af5f8-def8-11ea-911f-bf64e2b3dc65/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Capital One breach update. CISA warns of avionics CAN bus vulnerabilities. More attacks on local Louisiana governments. Change at the SEC. Cyber summer school for NATO, EU diplomats.</itunes:subtitle>
      <itunes:summary>Capital One takes a market hit from its data loss. Observers see the incident as a reminder that cloud users need to pay attention to their configurations. CISA warns of vulnerabilities in small, general aviation aircraft. Another parish in Louisiana is hit with a cyberattack. The SEC’s top cyber enforcer is moving on from the Commission. And diplomats go to cyber summer school in Estonia. It’s not a coding bootcamp, but it should give them the lay of the cyber land.  Jonathan Katz from UMD on speculation of what a quantum internet might involve. Guest is Jessica Gulick from Katzcy Consulting on the Wicked6 eSports-style cyber competition coming to Las Vegas during Black Hat &amp; Defcon.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_31.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Capital One takes a market hit from its data loss. Observers see the incident as a reminder that cloud users need to pay attention to their configurations. CISA warns of vulnerabilities in small, general aviation aircraft. Another parish in Louisiana is hit with a cyberattack. The SEC’s top cyber enforcer is moving on from the Commission. And diplomats go to cyber summer school in Estonia. It’s not a coding bootcamp, but it should give them the lay of the cyber land.  Jonathan Katz from UMD on speculation of what a quantum internet might involve. Guest is Jessica Gulick from Katzcy Consulting on the Wicked6 eSports-style cyber competition coming to Las Vegas during Black Hat &amp; Defcon.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_31.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1267</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5c8b58ec0ad54f7d925e40d18c45b907]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7624948875.mp3?updated=1690148038" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Capital One sustains a major data breach. Phishing in LinkedIn. VxWorks patches and mitigations. Brute-forcing NAS credentials. LAPD doxed? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/895/notes</link>
      <description>Capital One sustains a major data breach affecting 106 million customers, and a suspect is in custody, thanks largely to her incautious online boasting. Iranian social engineers are phishing in LinkedIn, baiting the hook with a bogus job offer. WindRiver fixes VxWorks bugs. Network Attached Storage is being brute-forced. A hacker claims to have doxed members of the Los Angeles Police Department.  Ben Yelin from UMD CHHS on cities piloting aerial surveillance programs. Tamika Smith interviews Noam Cohen from the New Yorker on California’s new law regulating bots.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_30.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Jul 2019 19:29:02 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>895</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/75730134-def8-11ea-911f-b7be2f60953c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Capital One sustains a major data breach. Phishing in LinkedIn. VxWorks patches and mitigations. Brute-forcing NAS credentials. LAPD doxed? </itunes:subtitle>
      <itunes:summary>Capital One sustains a major data breach affecting 106 million customers, and a suspect is in custody, thanks largely to her incautious online boasting. Iranian social engineers are phishing in LinkedIn, baiting the hook with a bogus job offer. WindRiver fixes VxWorks bugs. Network Attached Storage is being brute-forced. A hacker claims to have doxed members of the Los Angeles Police Department.  Ben Yelin from UMD CHHS on cities piloting aerial surveillance programs. Tamika Smith interviews Noam Cohen from the New Yorker on California’s new law regulating bots.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_30.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Capital One sustains a major data breach affecting 106 million customers, and a suspect is in custody, thanks largely to her incautious online boasting. Iranian social engineers are phishing in LinkedIn, baiting the hook with a bogus job offer. WindRiver fixes VxWorks bugs. Network Attached Storage is being brute-forced. A hacker claims to have doxed members of the Los Angeles Police Department.  Ben Yelin from UMD CHHS on cities piloting aerial surveillance programs. Tamika Smith interviews Noam Cohen from the New Yorker on California’s new law regulating bots.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_30.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1300</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[90025d417b5b4abfb4c36ad97ae14ae5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1554849880.mp3?updated=1690147977" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bears sniff at Bellingcat. Magecart in spoofed domains. MyDoom is still active. Shipboard malware was Emotet. Hutchins sentenced. Digital assistants have big ears. Taxes owed on alt-coin gains.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/894/notes</link>
      <description>Bellingcat gets a look-in from the Bears. Magecart card-skimming code found in bogus domains. The MyDoom worm remains active in the wild, fifteen years after it first surfaced. Election security threats. The US Coast Guard says the malware that hit a container ship off New York earlier this year was Emotet. Marcus Hutchins gets time served. Fresh concerns about digital assistants and privacy. And yes, you do owe taxes on those alt-coins. Joe Carrigan from JHU ISI on the availability of the BlueKeep vulnerability. Guest is Tom Hegel from AT&amp;T Cybersecurity with thoughts on integrating threat intelligence.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_29.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 29 Jul 2019 19:51:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>894</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/758b9c94-def8-11ea-911f-3f2af707040c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Bears sniff at Bellingcat. Magecart in spoofed domains. MyDoom is still active. Shipboard malware was Emotet. Hutchins sentenced. Digital assistants have big ears. Taxes owed on alt-coin gains.</itunes:subtitle>
      <itunes:summary>Bellingcat gets a look-in from the Bears. Magecart card-skimming code found in bogus domains. The MyDoom worm remains active in the wild, fifteen years after it first surfaced. Election security threats. The US Coast Guard says the malware that hit a container ship off New York earlier this year was Emotet. Marcus Hutchins gets time served. Fresh concerns about digital assistants and privacy. And yes, you do owe taxes on those alt-coins. Joe Carrigan from JHU ISI on the availability of the BlueKeep vulnerability. Guest is Tom Hegel from AT&amp;T Cybersecurity with thoughts on integrating threat intelligence.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_29.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Bellingcat gets a look-in from the Bears. Magecart card-skimming code found in bogus domains. The MyDoom worm remains active in the wild, fifteen years after it first surfaced. Election security threats. The US Coast Guard says the malware that hit a container ship off New York earlier this year was Emotet. Marcus Hutchins gets time served. Fresh concerns about digital assistants and privacy. And yes, you do owe taxes on those alt-coins. Joe Carrigan from JHU ISI on the availability of the BlueKeep vulnerability. Guest is Tom Hegel from AT&amp;T Cybersecurity with thoughts on integrating threat intelligence.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_29.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1273</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ba5bf7d92b7a4a91a0fa6c6ae1ed862c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6355548576.mp3?updated=1690147917" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cult of the Dead Cow author Joseph Menn extended interview. [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/29/notes</link>
      <description>Our guest today is Joseph Menn. He’s a longtime investigative reporter on technology issues, currently working for Reuters in San Francisco. He’s the author of several books, the latest of which is titled Cult of the Dead Cow - How the original hacking supergroup might just save the world.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 28 Jul 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>29</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/d002e8e2-df04-11ea-91d6-97499f6f7b3c/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cult of the Dead Cow author Joseph Menn extended interview. [Special Editions]</itunes:subtitle>
      <itunes:summary>Our guest today is Joseph Menn. He’s a longtime investigative reporter on technology issues, currently working for Reuters in San Francisco. He’s the author of several books, the latest of which is titled Cult of the Dead Cow - How the original hacking supergroup might just save the world.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our guest today is Joseph Menn. He’s a longtime investigative reporter on technology issues, currently working for Reuters in San Francisco. He’s the author of several books, the latest of which is titled Cult of the Dead Cow - How the original hacking supergroup might just save the world.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1559</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7c89dbc31bd843dcb91cbe6b9acc4cac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3910127792.mp3?updated=1663091005" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Day to day app fraud in the Google Play store. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/95/notes</link>
      <description>Researchers at bot mitigation firm White Ops have been tracking fraudulent apps in the Google Play store. These apps often imitate legitimate apps, even going so far as to lift code directly from them, but instead of providing true functionality they harvest user data and send it back to command and control servers.
Marcelle Lee is a principal threat intel researcher at White Ops, and she shares their findings. 
The original research can be found here —
https://www.whiteops.com/blog/another-day-another-fraudulent-app
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Jul 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>95</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/69ce1a58-df11-11ea-b5e1-83a0d01a6af0/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Day to day app fraud in the Google Play store. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at bot mitigation firm White Ops have been tracking fraudulent apps in the Google Play store. These apps often imitate legitimate apps, even going so far as to lift code directly from them, but instead of providing true functionality they harvest user data and send it back to command and control servers.
Marcelle Lee is a principal threat intel researcher at White Ops, and she shares their findings. 
The original research can be found here —
https://www.whiteops.com/blog/another-day-another-fraudulent-app
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at bot mitigation firm White Ops have been tracking fraudulent apps in the Google Play store. These apps often imitate legitimate apps, even going so far as to lift code directly from them, but instead of providing true functionality they harvest user data and send it back to command and control servers.</p><p>Marcelle Lee is a principal threat intel researcher at White Ops, and she shares their findings. </p><p>The original research can be found here —</p><p><a href="https://www.whiteops.com/blog/another-day-another-fraudulent-app">https://www.whiteops.com/blog/another-day-another-fraudulent-app</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1345</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1bff691f08714b88bcf226943b854c38]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2776887804.mp3?updated=1685044805" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Winnti and other Chinese espionage activity. Volume I of the US Senate report on election meddling is out. Ransomware from Sabine, Louisiana, to Johannesburg, South Africa.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/893/notes</link>
      <description>Winnti and other Chinese threats have been active against German and French targets. The US Senate Intelligence Committee has issued the first volume of its report on Russian operations against US elections--this one deals with infrastructure. Louisiana declares a state of cyber emergency over ransomware. Johannesburg’s power utility is also hit with ransomware. And you could get up to $175 from the Equifax breach settlement. Daniel Prince from Lancaster University on experimental protocols for ICS security systems. Guest is Joseph Menn, author of The Cult of the Dead Cow.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_26.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 26 Jul 2019 20:13:13 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>893</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/75a6d0d6-def8-11ea-911f-8be1f12ed923/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Winnti and other Chinese espionage activity. Volume I of the US Senate report on election meddling is out. Ransomware from Sabine, Louisiana, to Johannesburg, South Africa.</itunes:subtitle>
      <itunes:summary>Winnti and other Chinese threats have been active against German and French targets. The US Senate Intelligence Committee has issued the first volume of its report on Russian operations against US elections--this one deals with infrastructure. Louisiana declares a state of cyber emergency over ransomware. Johannesburg’s power utility is also hit with ransomware. And you could get up to $175 from the Equifax breach settlement. Daniel Prince from Lancaster University on experimental protocols for ICS security systems. Guest is Joseph Menn, author of The Cult of the Dead Cow.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_26.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Winnti and other Chinese threats have been active against German and French targets. The US Senate Intelligence Committee has issued the first volume of its report on Russian operations against US elections--this one deals with infrastructure. Louisiana declares a state of cyber emergency over ransomware. Johannesburg’s power utility is also hit with ransomware. And you could get up to $175 from the Equifax breach settlement. Daniel Prince from Lancaster University on experimental protocols for ICS security systems. Guest is Joseph Menn, author of The Cult of the Dead Cow.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_26.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1622</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[24bc1e9658c8447d82003ecb646a6577]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4855462514.mp3?updated=1608756138" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>News about Russian and Chinese government threat actors. Powerful crimeware active in Brazil. BlueKeep really needs to be patched. Messenger Kids issues. Dispatches from the cryptowars. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/892/notes</link>
      <description>Did you know that Fancy Bear has taken to wearing a Monokle? A new Chinese cyber espionage campaign is identified. Intrusion Truth tracks APT17 to Jinan, and China’s Ministry of State Security. Guildma malware is active in Brazil, and may be spreading. BlueKeep is out in the wild, and now available to pentesters. Facebook’s Messenger Kids app has been behaving badly. And an update on the cryptowars, with some dispatches from the American front. Michael Sechrist from Booz Allen Hamilton on municipalities paying ransomware. Guest is Eric Murphy from SpyCloud on threat intelligence at scale.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_25.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 25 Jul 2019 18:56:56 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>892</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/75bcd4ee-def8-11ea-911f-c35c4f157a95/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>News about Russian and Chinese government threat actors. Powerful crimeware active in Brazil. BlueKeep really needs to be patched. Messenger Kids issues. Dispatches from the cryptowars. </itunes:subtitle>
      <itunes:summary>Did you know that Fancy Bear has taken to wearing a Monokle? A new Chinese cyber espionage campaign is identified. Intrusion Truth tracks APT17 to Jinan, and China’s Ministry of State Security. Guildma malware is active in Brazil, and may be spreading. BlueKeep is out in the wild, and now available to pentesters. Facebook’s Messenger Kids app has been behaving badly. And an update on the cryptowars, with some dispatches from the American front. Michael Sechrist from Booz Allen Hamilton on municipalities paying ransomware. Guest is Eric Murphy from SpyCloud on threat intelligence at scale.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_25.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Did you know that Fancy Bear has taken to wearing a Monokle? A new Chinese cyber espionage campaign is identified. Intrusion Truth tracks APT17 to Jinan, and China’s Ministry of State Security. Guildma malware is active in Brazil, and may be spreading. BlueKeep is out in the wild, and now available to pentesters. Facebook’s Messenger Kids app has been behaving badly. And an update on the cryptowars, with some dispatches from the American front. Michael Sechrist from Booz Allen Hamilton on municipalities paying ransomware. Guest is Eric Murphy from SpyCloud on threat intelligence at scale.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_25.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1295</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5e85c0361dcd44dc91daeb0dd09ee3e2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6593256644.mp3?updated=1690147651" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lancaster University breached. Kazakhstan is testing out HTTPS interception. The UK postpones its decision on Huawei’s 5G gear. The FTC is requiring Facebook to set up a privacy committee.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/891/notes</link>
      <description>In today’s podcast, we hear that Lancaster University has suffered a data breach. A reportedly critical vulnerability in VLC Media Player may have already been fixed last year. Kazakhstan is testing out HTTPS interception. The UK postpones its decision on Huawei’s 5G gear. The FTC is requiring Facebook to set up a privacy committee. Attorney General Barr wants a way for law enforcement to access encrypted data. And the National Security Agency is launching a Cybersecurity Directorate. David Dufour from Webroot on security awareness training. Guest is Emily Wilson from Terbium Labs about the Federal Trade Commission’s investigation into complaints over Youtube’s improper data collection of kids online data.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 24 Jul 2019 20:34:19 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>891</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/75df811a-def8-11ea-911f-9f365a0209fe/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Lancaster University breached. Kazakhstan is testing out HTTPS interception. The UK postpones its decision on Huawei’s 5G gear. The FTC is requiring Facebook to set up a privacy committee.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Lancaster University has suffered a data breach. A reportedly critical vulnerability in VLC Media Player may have already been fixed last year. Kazakhstan is testing out HTTPS interception. The UK postpones its decision on Huawei’s 5G gear. The FTC is requiring Facebook to set up a privacy committee. Attorney General Barr wants a way for law enforcement to access encrypted data. And the National Security Agency is launching a Cybersecurity Directorate. David Dufour from Webroot on security awareness training. Guest is Emily Wilson from Terbium Labs about the Federal Trade Commission’s investigation into complaints over Youtube’s improper data collection of kids online data.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Lancaster University has suffered a data breach. A reportedly critical vulnerability in VLC Media Player may have already been fixed last year. Kazakhstan is testing out HTTPS interception. The UK postpones its decision on Huawei’s 5G gear. The FTC is requiring Facebook to set up a privacy committee. Attorney General Barr wants a way for law enforcement to access encrypted data. And the National Security Agency is launching a Cybersecurity Directorate. David Dufour from Webroot on security awareness training. Guest is Emily Wilson from Terbium Labs about the Federal Trade Commission’s investigation into complaints over Youtube’s improper data collection of kids online data.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1241</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7bde2d8efccb4c49b6a9fdb3a2e933c8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7330858843.mp3?updated=1690147632" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Venezuela blames power failure on exotic sabotage, again. Huawei may have built North Korea’s 3G wireless networks. Were record privacy fines high enough? Logic bombing the customer.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/890/notes</link>
      <description>Venezuela’s government says the country’s massive blackout is the work of sabotage by foreign actors (read, the Yanquis) who took down the grid with an “electromagnetic attack.” Documents leaked from Huawei indicate that the electronics giant did essential work for North Korea’s infrastructure. Both Facebook and Equifax say major fines over privacy issues, but there’s growing sentiment that the fines were on the low side. And, coders, make loyalty programs, not logic bombs. Malek Ben Salem from Accenture Labs on defending against disinformation. Guest is Robb Reck from Ping Identity on insider threat programs.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_23.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Jul 2019 18:06:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>890</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/75f6ec74-def8-11ea-911f-cf6b464c07a5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Venezuela blames power failure on exotic sabotage, again. Huawei may have built North Korea’s 3G wireless networks. Were record privacy fines high enough? Logic bombing the customer.</itunes:subtitle>
      <itunes:summary>Venezuela’s government says the country’s massive blackout is the work of sabotage by foreign actors (read, the Yanquis) who took down the grid with an “electromagnetic attack.” Documents leaked from Huawei indicate that the electronics giant did essential work for North Korea’s infrastructure. Both Facebook and Equifax say major fines over privacy issues, but there’s growing sentiment that the fines were on the low side. And, coders, make loyalty programs, not logic bombs. Malek Ben Salem from Accenture Labs on defending against disinformation. Guest is Robb Reck from Ping Identity on insider threat programs.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_23.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Venezuela’s government says the country’s massive blackout is the work of sabotage by foreign actors (read, the Yanquis) who took down the grid with an “electromagnetic attack.” Documents leaked from Huawei indicate that the electronics giant did essential work for North Korea’s infrastructure. Both Facebook and Equifax say major fines over privacy issues, but there’s growing sentiment that the fines were on the low side. And, coders, make loyalty programs, not logic bombs. Malek Ben Salem from Accenture Labs on defending against disinformation. Guest is Robb Reck from Ping Identity on insider threat programs.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_23.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1222</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6f2cedcf2614352a6732acd13617dc9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5413706042.mp3?updated=1690147614" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FSB contractor hacked. Pegasus now able to rummage clouds? Iranian cyber ops spike. Fraudulent student profiles. Judgement in Equifax FTC case. NSA hoarder gets nine years.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/889/notes</link>
      <description>A contractor for Russia’s FSB security agency was apparently breached. NSO Group says its Pegasus software can now obtain access to private messages held in major cloud services. Iranian cyber operations are said to be spiking, and Tehran is paying particular attention to LinkedIn. Colleges and universities are experiencing ERP issues, and a minor wave of bogus student applications. Equifax receives its judgment. And there’s a sentence in the case of the NSA hoarder.  Joe Carrigan from JHU ISI on Android apps circumventing privacy permission settings. Guest is David Brumley from ForAllSecure on autonomous security and DevSecOps.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_22.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 22 Jul 2019 19:46:40 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>889</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/761463f8-def8-11ea-911f-d37ae0d9d690/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>FSB contractor hacked. Pegasus now able to rummage clouds? Iranian cyber ops spike. Fraudulent student profiles. Judgement in Equifax FTC case. NSA hoarder gets nine years.</itunes:subtitle>
      <itunes:summary>A contractor for Russia’s FSB security agency was apparently breached. NSO Group says its Pegasus software can now obtain access to private messages held in major cloud services. Iranian cyber operations are said to be spiking, and Tehran is paying particular attention to LinkedIn. Colleges and universities are experiencing ERP issues, and a minor wave of bogus student applications. Equifax receives its judgment. And there’s a sentence in the case of the NSA hoarder.  Joe Carrigan from JHU ISI on Android apps circumventing privacy permission settings. Guest is David Brumley from ForAllSecure on autonomous security and DevSecOps.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_22.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A contractor for Russia’s FSB security agency was apparently breached. NSO Group says its Pegasus software can now obtain access to private messages held in major cloud services. Iranian cyber operations are said to be spiking, and Tehran is paying particular attention to LinkedIn. Colleges and universities are experiencing ERP issues, and a minor wave of bogus student applications. Equifax receives its judgment. And there’s a sentence in the case of the NSA hoarder.  Joe Carrigan from JHU ISI on Android apps circumventing privacy permission settings. Guest is David Brumley from ForAllSecure on autonomous security and DevSecOps.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_22.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1284</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3368b7edabe04e62b50405c69ca1cec4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5428643996.mp3?updated=1690147597" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Fifth Domain coauthor Richard A. Clarke. [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/28/notes</link>
      <description>Our guest today is Richard A. Clarke, former National Coordinator for Security, Infrastructure Protection and Counter-terrorism for the United States. Under President George W. Bush he was appointed Special Advisor to the President on cybersecurity. He’s currently Chairman of Good Harbor Consulting. He’s the author or coauthor of several books, the latest of which is titled The Fifth Domain - Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats.
This is an extended version of an interview originally aired on the July 19, 2019 edition of the CyberWire daily podcast.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 21 Jul 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>28</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ccc00bb0-df04-11ea-a18f-cb4162a604c0/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The Fifth Domain coauthor Richard A. Clarke. [Special Editions]</itunes:subtitle>
      <itunes:summary>Our guest today is Richard A. Clarke, former National Coordinator for Security, Infrastructure Protection and Counter-terrorism for the United States. Under President George W. Bush he was appointed Special Advisor to the President on cybersecurity. He’s currently Chairman of Good Harbor Consulting. He’s the author or coauthor of several books, the latest of which is titled The Fifth Domain - Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats.
This is an extended version of an interview originally aired on the July 19, 2019 edition of the CyberWire daily podcast.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our guest today is Richard A. Clarke, former National Coordinator for Security, Infrastructure Protection and Counter-terrorism for the United States. Under President George W. Bush he was appointed Special Advisor to the President on cybersecurity. He’s currently Chairman of Good Harbor Consulting. He’s the author or coauthor of several books, the latest of which is titled The Fifth Domain - Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats.</p><p>This is an extended version of an interview originally aired on the July 19, 2019 edition of the CyberWire daily podcast.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1498</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1cbc400b7ead41de932cc1454c16572f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5506259953.mp3?updated=1663090822" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Nansh0u not your normal cryptominer. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/94/notes</link>
      <description>Researchers at Guardicore Labs have been tracking an unusual cryptominer that seems to be based in China and is targeting Windows MS-SQL and phpMyAdmin servers. Some elements of the exploit make use of sophisticated components previously associated with nation-state actors.
Ophir Harpaz and Daniel Goldberg are members of the Guardicore Labs team, and they join us to explain their findings.
The research can be found here - 
 https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Jul 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>94</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6545cf80-df11-11ea-98a8-bfdcabbb1ab0/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Nansh0u not your normal cryptominer. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at Guardicore Labs have been tracking an unusual cryptominer that seems to be based in China and is targeting Windows MS-SQL and phpMyAdmin servers. Some elements of the exploit make use of sophisticated components previously associated with nation-state actors.
Ophir Harpaz and Daniel Goldberg are members of the Guardicore Labs team, and they join us to explain their findings.
The research can be found here - 
 https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Guardicore Labs have been tracking an unusual cryptominer that seems to be based in China and is targeting Windows MS-SQL and phpMyAdmin servers. Some elements of the exploit make use of sophisticated components previously associated with nation-state actors.</p><p>Ophir Harpaz and Daniel Goldberg are members of the Guardicore Labs team, and they join us to explain their findings.</p><p>The research can be found here - </p><p><a href="https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/"> https://www.guardicore.com/2019/05/nansh0u-campaign-hackers-arsenal-grows-stronger/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1206</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[29a07624a59d4c6db65f9b100ef5b918]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1781733226.mp3?updated=1685044790" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Following K3chang. Bulgaria’s tax agency breach. An alternative currency gets some incipient regulatory scrutiny. Why towns are hit with ransomware. A hair-care hack. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/888/notes</link>
      <description>K3chang is out, about, and more evasive than ever. Data breached at Bulgaria’s National Revenue Agency has turned up online in at least one hacker forum. Facebook’s planned Libra cryptocurrency received close scrutiny and a tepid reception on Capitol Hill this week. Emsisoft offers some common-sense reflections on why local governments are attractive ransomware targets. Please patch BlueKeep. And a hair care product is vulnerable to hacking. Johannes Ullrich from the SANS Technology Institute with tips on ensuring your vulnerability scans are secure. Guest is Richard Clarke, former National Coordinator for Security, Infrastructure Protection and Counter-terrorism for the United States, and coauthor of the book The Fifth Domain.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_19.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 19 Jul 2019 19:11:12 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>888</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/762e5fe2-def8-11ea-911f-9f639629a30e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Following K3chang. Bulgaria’s tax agency breach. An alternative currency gets some incipient regulatory scrutiny. Why towns are hit with ransomware. A hair-care hack. </itunes:subtitle>
      <itunes:summary>K3chang is out, about, and more evasive than ever. Data breached at Bulgaria’s National Revenue Agency has turned up online in at least one hacker forum. Facebook’s planned Libra cryptocurrency received close scrutiny and a tepid reception on Capitol Hill this week. Emsisoft offers some common-sense reflections on why local governments are attractive ransomware targets. Please patch BlueKeep. And a hair care product is vulnerable to hacking. Johannes Ullrich from the SANS Technology Institute with tips on ensuring your vulnerability scans are secure. Guest is Richard Clarke, former National Coordinator for Security, Infrastructure Protection and Counter-terrorism for the United States, and coauthor of the book The Fifth Domain.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_19.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>K3chang is out, about, and more evasive than ever. Data breached at Bulgaria’s National Revenue Agency has turned up online in at least one hacker forum. Facebook’s planned Libra cryptocurrency received close scrutiny and a tepid reception on Capitol Hill this week. Emsisoft offers some common-sense reflections on why local governments are attractive ransomware targets. Please patch BlueKeep. And a hair care product is vulnerable to hacking. Johannes Ullrich from the SANS Technology Institute with tips on ensuring your vulnerability scans are secure. Guest is Richard Clarke, former National Coordinator for Security, Infrastructure Protection and Counter-terrorism for the United States, and coauthor of the book The Fifth Domain.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_19.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1587</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a6033687ee1049bdb6527f85678ea60e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1183909543.mp3?updated=1608756114" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>TrickBot’s new tricks. Poisoning the ad supply chain. Clouds get schooled. Novel phishing tackle, but stale bait. Cyberwar powers. Election interference. FaceApp fears. Bad macro suspect arrested. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/887/notes</link>
      <description>TrickBot gets some new tricks, and they’re being called Trickbooster. Poisoning the advertising supply chain. Hessian schools will shy away from American cloud services. A novel phishing campaign is technically savvy but gives itself away with broken English phishbait. Congress would like to see Presidential cyberwar instructions. Microsoft warns of foreign attacks on elections. FaceApp looks suspicious. And a suspect is collared in a malicious macro case. Jonathan Katz from UMD on random number issues in YubiKeys. Carole Theriault speaks with Michael Madon from MimeCast on email imposter scams.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_18.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 18 Jul 2019 19:15:05 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>887</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7654b372-def8-11ea-911f-2b2651129112/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>TrickBot’s new tricks. Poisoning the ad supply chain. Clouds get schooled. Novel phishing tackle, but stale bait. Cyberwar powers. Election interference. FaceApp fears. Bad macro suspect arrested. </itunes:subtitle>
      <itunes:summary>TrickBot gets some new tricks, and they’re being called Trickbooster. Poisoning the advertising supply chain. Hessian schools will shy away from American cloud services. A novel phishing campaign is technically savvy but gives itself away with broken English phishbait. Congress would like to see Presidential cyberwar instructions. Microsoft warns of foreign attacks on elections. FaceApp looks suspicious. And a suspect is collared in a malicious macro case. Jonathan Katz from UMD on random number issues in YubiKeys. Carole Theriault speaks with Michael Madon from MimeCast on email imposter scams.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_18.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>TrickBot gets some new tricks, and they’re being called Trickbooster. Poisoning the advertising supply chain. Hessian schools will shy away from American cloud services. A novel phishing campaign is technically savvy but gives itself away with broken English phishbait. Congress would like to see Presidential cyberwar instructions. Microsoft warns of foreign attacks on elections. FaceApp looks suspicious. And a suspect is collared in a malicious macro case. Jonathan Katz from UMD on random number issues in YubiKeys. Carole Theriault speaks with Michael Madon from MimeCast on email imposter scams.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_18.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1256</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3cb5d58896bd44b493c591c54e83e53b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2030862096.mp3?updated=1690147562" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Telco data breach. Firmware supply chain problems. Hacking BLE. Census security. Continuity of operations. Decryptor for GandCrab, NSPM 13. Bulgaria’s tax hack. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/886/notes</link>
      <description>Sprint warns of data breach. Eclypsium announces discovery of server firmware supply chain problems. Bluetooth Low Energy may be less secure than thought. Congress hears about US census cybersecurity. Ransomware and continuity of operations. The FBI offers help decrypting GandCrab-affected files. Venafi on why financial services are especially affected by certificate issues. Congress asks to see NSPM 13. And an arrest is made in Bulgaria’s tax agency hack. Ben Yelin from UMD CHHS on the DOJ being required to make public attempts to break encryption in Facebook Messenger. Tamika Smith speaks with Alex Guirakhoo from Digital Shadows about scammers registering fake domains to try to capitalize on Facebook’s Libra cryptocurrency plans.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_17.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 17 Jul 2019 19:59:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>886</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/766a87e2-def8-11ea-911f-c756c7ddd58c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Telco data breach. Firmware supply chain problems. Hacking BLE. Census security. Continuity of operations. Decryptor for GandCrab, NSPM 13. Bulgaria’s tax hack. </itunes:subtitle>
      <itunes:summary>Sprint warns of data breach. Eclypsium announces discovery of server firmware supply chain problems. Bluetooth Low Energy may be less secure than thought. Congress hears about US census cybersecurity. Ransomware and continuity of operations. The FBI offers help decrypting GandCrab-affected files. Venafi on why financial services are especially affected by certificate issues. Congress asks to see NSPM 13. And an arrest is made in Bulgaria’s tax agency hack. Ben Yelin from UMD CHHS on the DOJ being required to make public attempts to break encryption in Facebook Messenger. Tamika Smith speaks with Alex Guirakhoo from Digital Shadows about scammers registering fake domains to try to capitalize on Facebook’s Libra cryptocurrency plans.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_17.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sprint warns of data breach. Eclypsium announces discovery of server firmware supply chain problems. Bluetooth Low Energy may be less secure than thought. Congress hears about US census cybersecurity. Ransomware and continuity of operations. The FBI offers help decrypting GandCrab-affected files. Venafi on why financial services are especially affected by certificate issues. Congress asks to see NSPM 13. And an arrest is made in Bulgaria’s tax agency hack. Ben Yelin from UMD CHHS on the DOJ being required to make public attempts to break encryption in Facebook Messenger. Tamika Smith speaks with Alex Guirakhoo from Digital Shadows about scammers registering fake domains to try to capitalize on Facebook’s Libra cryptocurrency plans.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_17.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1344</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6723fe80a81d40738c29018f4a5c2df6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7589467948.mp3?updated=1690147547" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>GandCrab hoods may be back with new ransomware. Video-on issues. Broadcom-Symantec talks are off, for now. Treason or just business? Robo-calls. A decryptor for Ims0rry ransomware. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/885/notes</link>
      <description>The retirement of GandCrab’s hoods may have been exaggerated. Video conferencing tools RingCentral and Zhumu may have picked up Zoom’s issues in the tech they licensed. Broadcom’s projected acquisition of Symantec is on hold, at least for now. One Silicon Valley executive calls another company “treasonous.” The US FCC wants to reign in robo-calls. And there’s a free decryptor out for Ims0rry ransomware. Emily Wilson from Terbium Labs on recent Terbium research on transnational crime. Guest is Wim Coekaerts from Oracle on security in the age of AI.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_16.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Jul 2019 19:33:43 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>885</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/76839b74-def8-11ea-911f-5b7bcec1b6de/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>GandCrab hoods may be back with new ransomware. Video-on issues. Broadcom-Symantec talks are off, for now. Treason or just business? Robo-calls. A decryptor for Ims0rry ransomware. </itunes:subtitle>
      <itunes:summary>The retirement of GandCrab’s hoods may have been exaggerated. Video conferencing tools RingCentral and Zhumu may have picked up Zoom’s issues in the tech they licensed. Broadcom’s projected acquisition of Symantec is on hold, at least for now. One Silicon Valley executive calls another company “treasonous.” The US FCC wants to reign in robo-calls. And there’s a free decryptor out for Ims0rry ransomware. Emily Wilson from Terbium Labs on recent Terbium research on transnational crime. Guest is Wim Coekaerts from Oracle on security in the age of AI.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_16.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The retirement of GandCrab’s hoods may have been exaggerated. Video conferencing tools RingCentral and Zhumu may have picked up Zoom’s issues in the tech they licensed. Broadcom’s projected acquisition of Symantec is on hold, at least for now. One Silicon Valley executive calls another company “treasonous.” The US FCC wants to reign in robo-calls. And there’s a free decryptor out for Ims0rry ransomware. Emily Wilson from Terbium Labs on recent Terbium research on transnational crime. Guest is Wim Coekaerts from Oracle on security in the age of AI.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_16.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1289</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4393d9a64ecc46c18a57aae5ba812091]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9945168453.mp3?updated=1690147532" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Voting machine woes. Router exploits trouble Brazil, Bitpoint alt-coin exchange investigates theft. Facebook fined $5 billion. Power failures probably unrelated to cyberattacks. Amazon Prime phishing. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/884/notes</link>
      <description>Upgraded voting machines may not be as secure, or as upgraded, as election officials seem to think. Criminals continue to exploit routers in Brazil. A Japanese cryptocurrency exchange shuts down while it investigates a multimillion dollar theft. The Federal Trade Commission fines Facebook $5 billion over privacy issues. Weekend power outages seem not to have been the result of cyberattacks. Another city sustains a ransomware attack. Shop carefully on Amazon Prime Day. Joe Carrigan from JHU ISI on Apple pushing an update to mitigate Zoom conferencing app vulnerabilities. Guest is Patrick Cox from TrustID on government agencies using inadequate ID authentication via phone.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_15.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 15 Jul 2019 19:54:55 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>884</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/76956a20-def8-11ea-911f-1b12fd2c68ca/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Voting machine woes. Router exploits trouble Brazil, Bitpoint alt-coin exchange investigates theft. Facebook fined $5 billion. Power failures probably unrelated to cyberattacks. Amazon Prime phishing. </itunes:subtitle>
      <itunes:summary>Upgraded voting machines may not be as secure, or as upgraded, as election officials seem to think. Criminals continue to exploit routers in Brazil. A Japanese cryptocurrency exchange shuts down while it investigates a multimillion dollar theft. The Federal Trade Commission fines Facebook $5 billion over privacy issues. Weekend power outages seem not to have been the result of cyberattacks. Another city sustains a ransomware attack. Shop carefully on Amazon Prime Day. Joe Carrigan from JHU ISI on Apple pushing an update to mitigate Zoom conferencing app vulnerabilities. Guest is Patrick Cox from TrustID on government agencies using inadequate ID authentication via phone.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_15.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Upgraded voting machines may not be as secure, or as upgraded, as election officials seem to think. Criminals continue to exploit routers in Brazil. A Japanese cryptocurrency exchange shuts down while it investigates a multimillion dollar theft. The Federal Trade Commission fines Facebook $5 billion over privacy issues. Weekend power outages seem not to have been the result of cyberattacks. Another city sustains a ransomware attack. Shop carefully on Amazon Prime Day. Joe Carrigan from JHU ISI on Apple pushing an update to mitigate Zoom conferencing app vulnerabilities. Guest is Patrick Cox from TrustID on government agencies using inadequate ID authentication via phone.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_15.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1243</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5caf9016643b4c43b7e66c330778a5ea]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9373117902.mp3?updated=1690147515" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Opportunistic botnets round up vulnerable routers. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/93/notes</link>
      <description>Researchers at Netscout's ASERT Team have been tracking the growth of botnets originating in Egypt and targeting routers in South Africa. The payload is a variant of the Hakai DDoS bot.
Richard Hummel is threat intelligence manager at Netscout, and he joins us to share their findings.
The original research is here:
 https://www.netscout.com/blog/asert/realtek-sdk-exploits-rise-egypt
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Jul 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>93</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/635f5c36-df11-11ea-b170-5f68e7b217df/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Opportunistic botnets round up vulnerable routers. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at Netscout's ASERT Team have been tracking the growth of botnets originating in Egypt and targeting routers in South Africa. The payload is a variant of the Hakai DDoS bot.
Richard Hummel is threat intelligence manager at Netscout, and he joins us to share their findings.
The original research is here:
 https://www.netscout.com/blog/asert/realtek-sdk-exploits-rise-egypt
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Netscout's ASERT Team have been tracking the growth of botnets originating in Egypt and targeting routers in South Africa. The payload is a variant of the Hakai DDoS bot.</p><p>Richard Hummel is threat intelligence manager at Netscout, and he joins us to share their findings.</p><p>The original research is here:</p><p><a href="https://www.netscout.com/blog/asert/realtek-sdk-exploits-rise-egypt"> https://www.netscout.com/blog/asert/realtek-sdk-exploits-rise-egypt</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1226</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5e9be9ee6ef14f2286e0b5f5f04bdb1a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4759287820.mp3?updated=1685044773" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Buhtrap gets into the spying game. US cyber operations against Iran considered: there are both strategic and Constitutional issues. Election security. Water bills. And again with the WannaCry. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/883/notes</link>
      <description>Buhtrap moves from financial crime to cyber espionage. There may have been as many as three distinct US cyber operations against Iran late last month. The US legislative and executive branches continue to try to sort out Constitutional issues surrounding cyber conflict. The US Intelligence Community tell Congress that there are “active threats” to upcoming elections. One city’s cyber woes will be expressed in water bills. And WannaCry may ride again, if you don’t patch. Mike Benjamin from CenturyLink on DNS scanning they’re tracking. Guest is Martha Saunders, President of the University of West Florida, on how her institution is adapting to meet the workforce needs for cyber security professionals.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_12.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 12 Jul 2019 19:30:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>883</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/76a9a620-def8-11ea-911f-7feae926cc10/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Buhtrap gets into the spying game. US cyber operations against Iran considered: there are both strategic and Constitutional issues. Election security. Water bills. And again with the WannaCry. </itunes:subtitle>
      <itunes:summary>Buhtrap moves from financial crime to cyber espionage. There may have been as many as three distinct US cyber operations against Iran late last month. The US legislative and executive branches continue to try to sort out Constitutional issues surrounding cyber conflict. The US Intelligence Community tell Congress that there are “active threats” to upcoming elections. One city’s cyber woes will be expressed in water bills. And WannaCry may ride again, if you don’t patch. Mike Benjamin from CenturyLink on DNS scanning they’re tracking. Guest is Martha Saunders, President of the University of West Florida, on how her institution is adapting to meet the workforce needs for cyber security professionals.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_12.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Buhtrap moves from financial crime to cyber espionage. There may have been as many as three distinct US cyber operations against Iran late last month. The US legislative and executive branches continue to try to sort out Constitutional issues surrounding cyber conflict. The US Intelligence Community tell Congress that there are “active threats” to upcoming elections. One city’s cyber woes will be expressed in water bills. And WannaCry may ride again, if you don’t patch. Mike Benjamin from CenturyLink on DNS scanning they’re tracking. Guest is Martha Saunders, President of the University of West Florida, on how her institution is adapting to meet the workforce needs for cyber security professionals.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_12.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1484</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ff5f1acc4afb4c9790c20e0aec11618c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1665678009.mp3?updated=1608756117" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Magecart is getting interested in exposed databases. Agent Smith may be in your Android app store. Tracking FinSpy. A contractor gets spearphished.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/882/notes</link>
      <description>GDPR fines and their implications. A reminder about Magecart, and some notes on its recent interest in scanning for unprotected AWS S-3 buckets. Agent Smith (of Guangzhou, not the Matrix) is infesting Android stores with evil twins of legitimate apps. FinSpy is out and about in the wild again. “Daniel Drunz” is the catphish face of a gang that stung a US Government contractor for millions in goods. Justin Harvey from Accenture on the recent GDPR fines. Carole Theriault speaks with Michael Covington from Wandera on the risks facing financial services firms.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 11 Jul 2019 20:02:39 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>882</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/76bfed36-def8-11ea-911f-97b93bdd2c81/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Magecart is getting interested in exposed databases. Agent Smith may be in your Android app store. Tracking FinSpy. A contractor gets spearphished.</itunes:subtitle>
      <itunes:summary>GDPR fines and their implications. A reminder about Magecart, and some notes on its recent interest in scanning for unprotected AWS S-3 buckets. Agent Smith (of Guangzhou, not the Matrix) is infesting Android stores with evil twins of legitimate apps. FinSpy is out and about in the wild again. “Daniel Drunz” is the catphish face of a gang that stung a US Government contractor for millions in goods. Justin Harvey from Accenture on the recent GDPR fines. Carole Theriault speaks with Michael Covington from Wandera on the risks facing financial services firms.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>GDPR fines and their implications. A reminder about Magecart, and some notes on its recent interest in scanning for unprotected AWS S-3 buckets. Agent Smith (of Guangzhou, not the Matrix) is infesting Android stores with evil twins of legitimate apps. FinSpy is out and about in the wild again. “Daniel Drunz” is the catphish face of a gang that stung a US Government contractor for millions in goods. Justin Harvey from Accenture on the recent GDPR fines. Carole Theriault speaks with Michael Covington from Wandera on the risks facing financial services firms.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1299</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1e87b98b778a4cd9a7a6b5dc81ca393a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3704396158.mp3?updated=1690147475" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Zoom addresses concerns about call joining and cameras. ICS vulnerabilities addressed. Patch Tuesday notes. Tracing a disinformation campaign.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/881/notes</link>
      <description>Zoom agrees to change what it still sort of regards as a feature and not a bug. Industrial control system vulnerabilities are reported and patched. Microsoft issues seventy-seven fixes on Patch Tuesday. Adobe has a relatively light month for patches. Marriott is hit with a large fine from the UK’s Information Commissioner’s Office. An investigative report traces disinformation about a 2016 Washington murder to Russia’s SVR foreign intelligence service. Craig Williams from Cisco Talos with info on the Spelevo exploit kit. Tamika Smith speaks with Myke Lyons, CISO for Collibra, on new industry regulations based on GDPR.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_10.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 10 Jul 2019 20:00:11 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>881</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/76de61d0-def8-11ea-911f-ffe96afce305/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Zoom addresses concerns about call joining and cameras. ICS vulnerabilities addressed. Patch Tuesday notes. Tracing a disinformation campaign.</itunes:subtitle>
      <itunes:summary>Zoom agrees to change what it still sort of regards as a feature and not a bug. Industrial control system vulnerabilities are reported and patched. Microsoft issues seventy-seven fixes on Patch Tuesday. Adobe has a relatively light month for patches. Marriott is hit with a large fine from the UK’s Information Commissioner’s Office. An investigative report traces disinformation about a 2016 Washington murder to Russia’s SVR foreign intelligence service. Craig Williams from Cisco Talos with info on the Spelevo exploit kit. Tamika Smith speaks with Myke Lyons, CISO for Collibra, on new industry regulations based on GDPR.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_10.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Zoom agrees to change what it still sort of regards as a feature and not a bug. Industrial control system vulnerabilities are reported and patched. Microsoft issues seventy-seven fixes on Patch Tuesday. Adobe has a relatively light month for patches. Marriott is hit with a large fine from the UK’s Information Commissioner’s Office. An investigative report traces disinformation about a 2016 Washington murder to Russia’s SVR foreign intelligence service. Craig Williams from Cisco Talos with info on the Spelevo exploit kit. Tamika Smith speaks with Myke Lyons, CISO for Collibra, on new industry regulations based on GDPR.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_10.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1333</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3053c2862d9f48bd8f054800e00aacef]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1853667550.mp3?updated=1690147456" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Security issues with Zoom for Macs. Astaroth fileless malware reported in Brazil. GoBotKR distributed by torrent. ICO hits British Airways with a record fine. State attacks and state defenses.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/880/notes</link>
      <description>Zoom user security appears to have been sacrificed on the altar of user experience. The fileless Astaroth Trojan is again in circulation, mostly, for now, in Brazil. Torrents are distributing the GoBot2 backdoor. The UK’s Information Commissioner’s Office clobbers British Airways with a record fine under GDPR, probably to encourage all the rest of us. Croatian government offices are spearphished. Iran says it’s now got an attack-proof comms system. And NSA’s IG reports.  Joe Carrigan from JHU ISI on security issues with D-Link routers. Guest is Martin Mckeay from Akamai on their most recent State of the Internet report.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_09.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Jul 2019 19:09:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>880</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/76f45f58-def8-11ea-911f-7fdf7d9e1cdb/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Security issues with Zoom for Macs. Astaroth fileless malware reported in Brazil. GoBotKR distributed by torrent. ICO hits British Airways with a record fine. State attacks and state defenses.</itunes:subtitle>
      <itunes:summary>Zoom user security appears to have been sacrificed on the altar of user experience. The fileless Astaroth Trojan is again in circulation, mostly, for now, in Brazil. Torrents are distributing the GoBot2 backdoor. The UK’s Information Commissioner’s Office clobbers British Airways with a record fine under GDPR, probably to encourage all the rest of us. Croatian government offices are spearphished. Iran says it’s now got an attack-proof comms system. And NSA’s IG reports.  Joe Carrigan from JHU ISI on security issues with D-Link routers. Guest is Martin Mckeay from Akamai on their most recent State of the Internet report.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_09.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Zoom user security appears to have been sacrificed on the altar of user experience. The fileless Astaroth Trojan is again in circulation, mostly, for now, in Brazil. Torrents are distributing the GoBot2 backdoor. The UK’s Information Commissioner’s Office clobbers British Airways with a record fine under GDPR, probably to encourage all the rest of us. Croatian government offices are spearphished. Iran says it’s now got an attack-proof comms system. And NSA’s IG reports.  Joe Carrigan from JHU ISI on security issues with D-Link routers. Guest is Martin Mckeay from Akamai on their most recent State of the Internet report.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_09.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1307</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[084db238a8994ef3873e1b6ad2604736]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4727526211.mp3?updated=1690147442" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Another ransomware victim pays extortionists. Business email compromise. Government impostor scams. ShadowBrokers still airborne. Exploit supply chain. Silence suspected in bank heists.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/879/notes</link>
      <description>Another ransomware victim pays up. Privilege escalation comes to ransomware. Vendor impersonation scams hit cities, and government impersonation scams hit citizens: be wary of both. Former NSA contractor Hal Martin will be sentenced later this month, with suspected connections with the ShadowBrokers still unresolved. An exploit supply chain is described. The Silence gang is suspected in Bangladeshi bank heists. And a bad message can brick a phone. Ben Yelin from UMD CHHS on privacy concerns with a shared bar patron database. Guest is Derek E. Weeks from Sonotype on supply chain security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_08.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 08 Jul 2019 19:38:05 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>879</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/770d111a-def8-11ea-911f-fb7174672809/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Another ransomware victim pays extortionists. Business email compromise. Government impostor scams. ShadowBrokers still airborne. Exploit supply chain. Silence suspected in bank heists.</itunes:subtitle>
      <itunes:summary>Another ransomware victim pays up. Privilege escalation comes to ransomware. Vendor impersonation scams hit cities, and government impersonation scams hit citizens: be wary of both. Former NSA contractor Hal Martin will be sentenced later this month, with suspected connections with the ShadowBrokers still unresolved. An exploit supply chain is described. The Silence gang is suspected in Bangladeshi bank heists. And a bad message can brick a phone. Ben Yelin from UMD CHHS on privacy concerns with a shared bar patron database. Guest is Derek E. Weeks from Sonotype on supply chain security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_08.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Another ransomware victim pays up. Privilege escalation comes to ransomware. Vendor impersonation scams hit cities, and government impersonation scams hit citizens: be wary of both. Former NSA contractor Hal Martin will be sentenced later this month, with suspected connections with the ShadowBrokers still unresolved. An exploit supply chain is described. The Silence gang is suspected in Bangladeshi bank heists. And a bad message can brick a phone. Ben Yelin from UMD CHHS on privacy concerns with a shared bar patron database. Guest is Derek E. Weeks from Sonotype on supply chain security.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_08.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1313</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fc40a600d0cd4be889a5398ac6c43c57]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2962934960.mp3?updated=1690147420" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Warnings of Outlook exploitation, with a possible Iranian connection. GPS jamming in the Eastern Med. Satellite vulnerabilities. 505 errors. TA505’s new tactics. Content moderation updates. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/878/notes</link>
      <description>US Cyber Command warns that an Outlook vulnerability is being actively exploited in the wild. Other sources see a connection with Iran. GPS signals are being jammed near Tel Aviv, and Russian electronic activity in Syria is suspected as the cause. A look at the consequences of satellite cyber vulnerabilities. The TA505 gang changes some of its tactics. Yesterday’s brief Internet outages are traced to a Cloudflare glitch. Facebook and YouTube continue to grapple with content moderation. Mike Benjamin from CenturyLink on Emotet’s C2 behavior. Guest is Avital Grushcovski  from Source Defense on the risk posed by third party web site tools.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_03.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 03 Jul 2019 18:03:46 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>878</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/771dda18-def8-11ea-911f-2bcba828e0b1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Warnings of Outlook exploitation, with a possible Iranian connection. GPS jamming in the Eastern Med. Satellite vulnerabilities. 505 errors. TA505’s new tactics. Content moderation updates. </itunes:subtitle>
      <itunes:summary>US Cyber Command warns that an Outlook vulnerability is being actively exploited in the wild. Other sources see a connection with Iran. GPS signals are being jammed near Tel Aviv, and Russian electronic activity in Syria is suspected as the cause. A look at the consequences of satellite cyber vulnerabilities. The TA505 gang changes some of its tactics. Yesterday’s brief Internet outages are traced to a Cloudflare glitch. Facebook and YouTube continue to grapple with content moderation. Mike Benjamin from CenturyLink on Emotet’s C2 behavior. Guest is Avital Grushcovski  from Source Defense on the risk posed by third party web site tools.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_03.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>US Cyber Command warns that an Outlook vulnerability is being actively exploited in the wild. Other sources see a connection with Iran. GPS signals are being jammed near Tel Aviv, and Russian electronic activity in Syria is suspected as the cause. A look at the consequences of satellite cyber vulnerabilities. The TA505 gang changes some of its tactics. Yesterday’s brief Internet outages are traced to a Cloudflare glitch. Facebook and YouTube continue to grapple with content moderation. Mike Benjamin from CenturyLink on Emotet’s C2 behavior. Guest is Avital Grushcovski  from Source Defense on the risk posed by third party web site tools.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_03.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1273</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fab69db130df4e3a89110eb331355a18]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9968044951.mp3?updated=1690147407" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US-Iranian tension expressed in cyberspace. OceanLotus and Ratsnif. Ransomware in Georgia, again. Going low-tech to protect the grid. Magecart update. Cryptowars and agency equities. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/877/notes</link>
      <description>Tensions between the US and Iran are likely to find further expression in cyberspace. OceanLotus’s Ratsnif kit isn’t up to the threat actors normally high standards of coding, but it’s plenty good enough. Cyberattacks in the states of Florida and Georgia. Utilities are urged to go lower tech where possible. Magecart skimmer “Inter” is being hawked on the dark web. And no, they haven’t videoed you using EternalBlue: just dump that email. Johannes Ullrich from the SANS Technology Institute and the ISC Stormcast podcast on Weblogic exploits. Guest is Nick Jovanovic from Thales on cloud security in the federal space.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_02.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Jul 2019 17:58:20 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>877</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/77339100-def8-11ea-911f-e7d27d81fd3c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>US-Iranian tension expressed in cyberspace. OceanLotus and Ratsnif. Ransomware in Georgia, again. Going low-tech to protect the grid. Magecart update. Cryptowars and agency equities. </itunes:subtitle>
      <itunes:summary>Tensions between the US and Iran are likely to find further expression in cyberspace. OceanLotus’s Ratsnif kit isn’t up to the threat actors normally high standards of coding, but it’s plenty good enough. Cyberattacks in the states of Florida and Georgia. Utilities are urged to go lower tech where possible. Magecart skimmer “Inter” is being hawked on the dark web. And no, they haven’t videoed you using EternalBlue: just dump that email. Johannes Ullrich from the SANS Technology Institute and the ISC Stormcast podcast on Weblogic exploits. Guest is Nick Jovanovic from Thales on cloud security in the federal space.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_02.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tensions between the US and Iran are likely to find further expression in cyberspace. OceanLotus’s Ratsnif kit isn’t up to the threat actors normally high standards of coding, but it’s plenty good enough. Cyberattacks in the states of Florida and Georgia. Utilities are urged to go lower tech where possible. Magecart skimmer “Inter” is being hawked on the dark web. And no, they haven’t videoed you using EternalBlue: just dump that email. Johannes Ullrich from the SANS Technology Institute and the ISC Stormcast podcast on Weblogic exploits. Guest is Nick Jovanovic from Thales on cloud security in the federal space.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_02.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1240</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e9ccb607ba9c403d84628b79e697858f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8031184042.mp3?updated=1690147387" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Huawei spits the hook? CISA warns about the risk of Iranian cyberattack. Power grid security. Cryptocurrency and fraud. Content moderation. Senators like Hack the Pentagon. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/876/notes</link>
      <description>Huawei gets to buy some products from US companies, again. CISA reiterates warnings about the risk of cyberattack from Iran. Considerations about power grid security. Cryptocurrencies draw criminals, and some of the scammers are looking ahead. Australia and New Zealand will conduct a simulation to study ways of removing “abhorrent content” from the Web. The Senate likes Hack the Pentagon. And tech enthusiasm or voyeurism? You decide. Justin Harvey from Accenture on ways attackers are bypassing 2-factor authentication on mobile devices. Guest is Gretel Egan from Proofpoint on the shift toward human-centric security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_01.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 01 Jul 2019 20:01:02 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>876</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7743eba4-def8-11ea-911f-778866041ef9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Huawei spits the hook? CISA warns about the risk of Iranian cyberattack. Power grid security. Cryptocurrency and fraud. Content moderation. Senators like Hack the Pentagon. </itunes:subtitle>
      <itunes:summary>Huawei gets to buy some products from US companies, again. CISA reiterates warnings about the risk of cyberattack from Iran. Considerations about power grid security. Cryptocurrencies draw criminals, and some of the scammers are looking ahead. Australia and New Zealand will conduct a simulation to study ways of removing “abhorrent content” from the Web. The Senate likes Hack the Pentagon. And tech enthusiasm or voyeurism? You decide. Justin Harvey from Accenture on ways attackers are bypassing 2-factor authentication on mobile devices. Guest is Gretel Egan from Proofpoint on the shift toward human-centric security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_01.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Huawei gets to buy some products from US companies, again. CISA reiterates warnings about the risk of cyberattack from Iran. Considerations about power grid security. Cryptocurrencies draw criminals, and some of the scammers are looking ahead. Australia and New Zealand will conduct a simulation to study ways of removing “abhorrent content” from the Web. The Senate likes Hack the Pentagon. And tech enthusiasm or voyeurism? You decide. Justin Harvey from Accenture on ways attackers are bypassing 2-factor authentication on mobile devices. Guest is Gretel Egan from Proofpoint on the shift toward human-centric security.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/July/CyberWire_2019_07_01.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1275</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1dbe52ce29944e6499645a19a57ffd80]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9020670503.mp3?updated=1690147371" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Giving everyone a stake in the success of Open Source implementation. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/92/notes</link>
      <description>Synopsys recently published the 2019 edition of their Open Source Security and Risk Analysis (OSSRA) Report, providing an in-depth look at the state of open source security, compliance, and code quality risk in commercial software.

Tim Mackey is principal security strategist within the Synopsys Cyber Research Center, and he joins us to share their findings.
The research can be found here:
 https://www.synopsys.com/software-integrity/resources/analyst-reports/2019-open-source-security-risk-analysis.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 Jun 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>92</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5f977e08-df11-11ea-914b-430958715f11/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Giving everyone a stake in the success of Open Source implementation. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Synopsys recently published the 2019 edition of their Open Source Security and Risk Analysis (OSSRA) Report, providing an in-depth look at the state of open source security, compliance, and code quality risk in commercial software.

Tim Mackey is principal security strategist within the Synopsys Cyber Research Center, and he joins us to share their findings.
The research can be found here:
 https://www.synopsys.com/software-integrity/resources/analyst-reports/2019-open-source-security-risk-analysis.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Synopsys recently published the 2019 edition of their Open Source Security and Risk Analysis (OSSRA) Report, providing an in-depth look at the state of open source security, compliance, and code quality risk in commercial software.</p><p><br></p><p>Tim Mackey is principal security strategist within the Synopsys Cyber Research Center, and he joins us to share their findings.</p><p>The research can be found here:</p><p><a href="https://www.synopsys.com/software-integrity/resources/analyst-reports/2019-open-source-security-risk-analysis.html"> https://www.synopsys.com/software-integrity/resources/analyst-reports/2019-open-source-security-risk-analysis.html</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1450</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[55f3c61ef228424bb6ccc1a6f028feb4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9143022730.mp3?updated=1685043125" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Regin in Yandex? Golang is out and busy. So is the ShadowGate crew. The ICO wants an explanation from the Metropolitan Police. Trackers in news sites. Phishing those who seek “Verification.” </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/875/notes</link>
      <description>Yandex says it was hacked with Regin spyware. The Golang cryptominer is spreading, again. And the ShadowGate ransomware crew is newly active with a dangerous drive-by. Three data exposures are reported. London’s Metropolitan Police are in trouble with the Information Commissioner’s Office. A look as tracker behavior. The Verified Badge as a phishing lure. And congratulations to a Loeb Award winner. Micahel Sechrist from BAH on Deep Fakes and data integrity. Deloitte’s new head of cyber Deborah Golden shares her leadership philosophy.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_28.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 28 Jun 2019 20:23:19 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>875</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/776b6d64-def8-11ea-911f-efc02aef4003/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Regin in Yandex? Golang is out and busy. So is the ShadowGate crew. The ICO wants an explanation from the Metropolitan Police. Trackers in news sites. Phishing those who seek “Verification.” </itunes:subtitle>
      <itunes:summary>Yandex says it was hacked with Regin spyware. The Golang cryptominer is spreading, again. And the ShadowGate ransomware crew is newly active with a dangerous drive-by. Three data exposures are reported. London’s Metropolitan Police are in trouble with the Information Commissioner’s Office. A look as tracker behavior. The Verified Badge as a phishing lure. And congratulations to a Loeb Award winner. Micahel Sechrist from BAH on Deep Fakes and data integrity. Deloitte’s new head of cyber Deborah Golden shares her leadership philosophy.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_28.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Yandex says it was hacked with Regin spyware. The Golang cryptominer is spreading, again. And the ShadowGate ransomware crew is newly active with a dangerous drive-by. Three data exposures are reported. London’s Metropolitan Police are in trouble with the Information Commissioner’s Office. A look as tracker behavior. The Verified Badge as a phishing lure. And congratulations to a Loeb Award winner. Micahel Sechrist from BAH on Deep Fakes and data integrity. Deloitte’s new head of cyber Deborah Golden shares her leadership philosophy.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_28.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1579</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8a3e90c9eda44b518a1302b0031777ed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1413183571.mp3?updated=1608756118" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Washington and Tehran confront one another in cyberspace. Dominion National investigates data incident. Facebook on info ops (and identity). Labor market notes. Skids on skids.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/874/notes</link>
      <description>The US cyberattack against Iranian targets remains only indistinctly visible in the information fog of cyberwar. Iran’s APT33 seems to have altered its tactics after its operations against Saudi targets were described by Symantec at the end of March. An insurer and provider of vision and dental benefits investigates a “data incident.” Skids-on-skids, kids. Facebook talks information operations, and teases plans concerning identity. Notes on the labor market. Johannes Ullrich from the SANS Technology Institute and the ISC Stormcast podcast on malware C&amp;C channels making use of TLS. Tamika Smith speaks with Harrison Van Riper from Digital Shadows about their recent report, “Too Much Information: The Sequel,” outlining the increase in data exposure over the past year.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_27.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 27 Jun 2019 18:25:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>874</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/78618528-def8-11ea-911f-fbd9970ddd55/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Washington and Tehran confront one another in cyberspace. Dominion National investigates data incident. Facebook on info ops (and identity). Labor market notes. Skids on skids.</itunes:subtitle>
      <itunes:summary>The US cyberattack against Iranian targets remains only indistinctly visible in the information fog of cyberwar. Iran’s APT33 seems to have altered its tactics after its operations against Saudi targets were described by Symantec at the end of March. An insurer and provider of vision and dental benefits investigates a “data incident.” Skids-on-skids, kids. Facebook talks information operations, and teases plans concerning identity. Notes on the labor market. Johannes Ullrich from the SANS Technology Institute and the ISC Stormcast podcast on malware C&amp;C channels making use of TLS. Tamika Smith speaks with Harrison Van Riper from Digital Shadows about their recent report, “Too Much Information: The Sequel,” outlining the increase in data exposure over the past year.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_27.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US cyberattack against Iranian targets remains only indistinctly visible in the information fog of cyberwar. Iran’s APT33 seems to have altered its tactics after its operations against Saudi targets were described by Symantec at the end of March. An insurer and provider of vision and dental benefits investigates a “data incident.” Skids-on-skids, kids. Facebook talks information operations, and teases plans concerning identity. Notes on the labor market. Johannes Ullrich from the SANS Technology Institute and the ISC Stormcast podcast on malware C&amp;C channels making use of TLS. Tamika Smith speaks with Harrison Van Riper from Digital Shadows about their recent report, “Too Much Information: The Sequel,” outlining the increase in data exposure over the past year.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_27.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1329</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[db6cc12bf4ae4da6a8ce7e2d7c91d9a2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9347840090.mp3?updated=1690147334" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Militia said to be target of US cyberattack. Myanmar shuts down networks. Spam campaign. Supply chain issues for Huawei gear. Election security. Recovering from ransomware by paying up? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/873/notes</link>
      <description>Sources name a Shi’ite militia aligned with Iran as one target of last week’s US cyberattacks. Myanmar shuts down mobile networks in its Rakhine province, where the Buddhist insurgents of the Arakan Army have been using Facebook for coordination and inspiration. A major spam campaign is distributing LokiBot and NanoCore. Finite State finds bugs in Huawei gear. Election security notes. And paying the ransom to ransomware extortionists. David Dufour from Webroot on the different trends they are tracking in Europe vs. the US. Guest is David Politis from BetterCloud with a warning about information sprawl.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_26.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 26 Jun 2019 18:55:03 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>873</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7873cf94-def8-11ea-911f-6f0fff6205bf/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Militia said to be target of US cyberattack. Myanmar shuts down networks. Spam campaign. Supply chain issues for Huawei gear. Election security. Recovering from ransomware by paying up? </itunes:subtitle>
      <itunes:summary>Sources name a Shi’ite militia aligned with Iran as one target of last week’s US cyberattacks. Myanmar shuts down mobile networks in its Rakhine province, where the Buddhist insurgents of the Arakan Army have been using Facebook for coordination and inspiration. A major spam campaign is distributing LokiBot and NanoCore. Finite State finds bugs in Huawei gear. Election security notes. And paying the ransom to ransomware extortionists. David Dufour from Webroot on the different trends they are tracking in Europe vs. the US. Guest is David Politis from BetterCloud with a warning about information sprawl.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_26.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sources name a Shi’ite militia aligned with Iran as one target of last week’s US cyberattacks. Myanmar shuts down mobile networks in its Rakhine province, where the Buddhist insurgents of the Arakan Army have been using Facebook for coordination and inspiration. A major spam campaign is distributing LokiBot and NanoCore. Finite State finds bugs in Huawei gear. Election security notes. And paying the ransom to ransomware extortionists. David Dufour from Webroot on the different trends they are tracking in Europe vs. the US. Guest is David Politis from BetterCloud with a warning about information sprawl.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_26.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1313</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4850dacc881947fc826382ec8a344df3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4299916277.mp3?updated=1690147318" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Operation Soft Cell targets mobile networks. DC and Tehran trade barbs. Critical infrastructure concerns. Maryland’s Cyber Defense Initiative. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/872/notes</link>
      <description>Operation Soft Cell was low, slow, patient, and focused, and apparently run from China. Washington and Tehran are woofing at each other, with more exchanges in cyberspace expected. Cyber due diligence is taken increasingly seriously during mergers and acquisitions. Short-sighted design choices affect app security. The US security clearance process gets an overhaul. Shimmers replace skimmers. And yesterday’s US Internet outage explained. Sergio Caltagirone from Dragos on the growing tensions between the US, Russia and Iran and how providers of critical infrastructure can prepare. Tamika Smith interviews Danielle Gaines, a reporter for Maryland Matters, on MD Gov. Hogan’s response to the Baltimore ransomware incident, the creation of the Maryland Cyber Defense Initiative.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_25.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Jun 2019 18:46:06 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>872</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/789e35fe-def8-11ea-911f-aff1034a5508/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Operation Soft Cell targets mobile networks. DC and Tehran trade barbs. Critical infrastructure concerns. Maryland’s Cyber Defense Initiative. </itunes:subtitle>
      <itunes:summary>Operation Soft Cell was low, slow, patient, and focused, and apparently run from China. Washington and Tehran are woofing at each other, with more exchanges in cyberspace expected. Cyber due diligence is taken increasingly seriously during mergers and acquisitions. Short-sighted design choices affect app security. The US security clearance process gets an overhaul. Shimmers replace skimmers. And yesterday’s US Internet outage explained. Sergio Caltagirone from Dragos on the growing tensions between the US, Russia and Iran and how providers of critical infrastructure can prepare. Tamika Smith interviews Danielle Gaines, a reporter for Maryland Matters, on MD Gov. Hogan’s response to the Baltimore ransomware incident, the creation of the Maryland Cyber Defense Initiative.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_25.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Operation Soft Cell was low, slow, patient, and focused, and apparently run from China. Washington and Tehran are woofing at each other, with more exchanges in cyberspace expected. Cyber due diligence is taken increasingly seriously during mergers and acquisitions. Short-sighted design choices affect app security. The US security clearance process gets an overhaul. Shimmers replace skimmers. And yesterday’s US Internet outage explained. Sergio Caltagirone from Dragos on the growing tensions between the US, Russia and Iran and how providers of critical infrastructure can prepare. Tamika Smith interviews Danielle Gaines, a reporter for Maryland Matters, on MD Gov. Hogan’s response to the Baltimore ransomware incident, the creation of the Maryland Cyber Defense Initiative.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_25.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1335</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[806ce032444a4dc0a2d586f439d180e4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3636712136.mp3?updated=1690147302" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Notes on a reported US cyberattack against Iran. A look at “Secondary Infektion.” And some cases of cyber stalking.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/871/notes</link>
      <description>The US is said to have conducted cyberattacks against Iranian targets related to recent Iranian moves in the Gulf. They cyber operations are also said to have been a covert alternative to conventional military strikes. The Atlantic Council describes “Secondary Infektion,” a Russian disinformation campaign that begins obscurely, then depends upon amplification. And a case of cyber stalking in Minnesota goes to court. Joe Carrigan from JHU ISI on the escalating calls to patch the BlueKeep vulnerability.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_24.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 24 Jun 2019 19:21:17 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>871</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/78b59d52-def8-11ea-911f-978d463a4ed3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Notes on a reported US cyberattack against Iran. A look at “Secondary Infektion.” And some cases of cyber stalking.</itunes:subtitle>
      <itunes:summary>The US is said to have conducted cyberattacks against Iranian targets related to recent Iranian moves in the Gulf. They cyber operations are also said to have been a covert alternative to conventional military strikes. The Atlantic Council describes “Secondary Infektion,” a Russian disinformation campaign that begins obscurely, then depends upon amplification. And a case of cyber stalking in Minnesota goes to court. Joe Carrigan from JHU ISI on the escalating calls to patch the BlueKeep vulnerability.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_24.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US is said to have conducted cyberattacks against Iranian targets related to recent Iranian moves in the Gulf. They cyber operations are also said to have been a covert alternative to conventional military strikes. The Atlantic Council describes “Secondary Infektion,” a Russian disinformation campaign that begins obscurely, then depends upon amplification. And a case of cyber stalking in Minnesota goes to court. Joe Carrigan from JHU ISI on the escalating calls to patch the BlueKeep vulnerability.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_24.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1223</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[49f05233004e4a7fa4ec054653cfe551]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7333656534.mp3?updated=1690147284" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Middleboxes may be meddling with TLS connections. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/91/notes</link>
      <description>Researchers at Cloudflare have been examining HTTPS interception, a technique that weakens security, and have developed tools to help detect it. 
Nick Sullivan is head of cryptography at Cloudflare, and he joins to us share their findings.
The research can be found here:
https://blog.cloudflare.com/monsters-in-the-middleboxes/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Jun 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>91</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5d8480d4-df11-11ea-9d6e-6bfbde55ce92/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Middleboxes may be meddling with TLS connections. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at Cloudflare have been examining HTTPS interception, a technique that weakens security, and have developed tools to help detect it. 
Nick Sullivan is head of cryptography at Cloudflare, and he joins to us share their findings.
The research can be found here:
https://blog.cloudflare.com/monsters-in-the-middleboxes/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Cloudflare have been examining HTTPS interception, a technique that weakens security, and have developed tools to help detect it. </p><p>Nick Sullivan is head of cryptography at Cloudflare, and he joins to us share their findings.</p><p>The research can be found here:</p><p><a href="https://blog.cloudflare.com/monsters-in-the-middleboxes/">https://blog.cloudflare.com/monsters-in-the-middleboxes/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1452</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7bb2ef053c0c4e04bde4be123704a4a4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6357497051.mp3?updated=1685043110" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US-Iranian tensions find expression in cyberspace as Refined Kitten returns. Facebook tries friction against abuse. Cryptominers in the wild. Lead generation for cyber criminals. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/870/notes</link>
      <description>Tensions between the US and Iran over tanker attacks, nuclear ambitions, and the downing of a Global Hawk drone seem to be finding expression in cyberspace: Refined Kitten sees to be pawing for some American phish. Facebook tries friction as an alternative to content moderation in damping its abuse in fomenting South Asian violence. Cryptomining campaigns are showing some renewed vigor. And a look at lead generation for Nigerian prince scams. Mike Benjamin from CenturyLink on RDP scanning and the GoldBrute campaign. Guest is Michael Coates, former CISO for Twitter and former head of security for Mozilla, from Altitude Networks on better addressing the needs of CISOs and improving the sales process.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_21.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 21 Jun 2019 18:47:14 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>870</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/78cd2bb6-def8-11ea-911f-e74ad79ebe27/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>US-Iranian tensions find expression in cyberspace as Refined Kitten returns. Facebook tries friction against abuse. Cryptominers in the wild. Lead generation for cyber criminals. </itunes:subtitle>
      <itunes:summary>Tensions between the US and Iran over tanker attacks, nuclear ambitions, and the downing of a Global Hawk drone seem to be finding expression in cyberspace: Refined Kitten sees to be pawing for some American phish. Facebook tries friction as an alternative to content moderation in damping its abuse in fomenting South Asian violence. Cryptomining campaigns are showing some renewed vigor. And a look at lead generation for Nigerian prince scams. Mike Benjamin from CenturyLink on RDP scanning and the GoldBrute campaign. Guest is Michael Coates, former CISO for Twitter and former head of security for Mozilla, from Altitude Networks on better addressing the needs of CISOs and improving the sales process.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_21.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tensions between the US and Iran over tanker attacks, nuclear ambitions, and the downing of a Global Hawk drone seem to be finding expression in cyberspace: Refined Kitten sees to be pawing for some American phish. Facebook tries friction as an alternative to content moderation in damping its abuse in fomenting South Asian violence. Cryptomining campaigns are showing some renewed vigor. And a look at lead generation for Nigerian prince scams. Mike Benjamin from CenturyLink on RDP scanning and the GoldBrute campaign. Guest is Michael Coates, former CISO for Twitter and former head of security for Mozilla, from Altitude Networks on better addressing the needs of CISOs and improving the sales process.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_21.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1592</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3b62f1cc4d6a4a0b9d96a2560613150e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3059454127.mp3?updated=1608756136" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Turla hijacks OilRig infrastructure. Bouncing Golf is no game. CISA panel recommends supply chain security reforms. AMCA driven toward bankruptcy by data breach. Florida town pays ransom. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/869/notes</link>
      <description>Call it Waterbug or call it Turla, the Russian cyber operation has been hijacking Iran’s OilRIg cyber espionage infrastructure. Other cyber campaigns also afflict Middle Eastern targets. A US panel convened by CISA has some recommendations for supply chain security. An ad agency inadvertently exposes sensitive personal data. A bankruptcy filing in the AMCA breach. And Riviera Beach, Florida, decides to pay $600,000 in ransom to decrypt its files. Johannes Ullrich from SANS and the ISC Stormcast podcast on DNS security issues. Carole Theriault returns with an interview with ethical hacker Zoe Rose, who shares her advice for woman working in cyber security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_20.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 20 Jun 2019 18:55:34 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>869</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/78eb3b88-def8-11ea-911f-a75dd3ed5105/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Turla hijacks OilRig infrastructure. Bouncing Golf is no game. CISA panel recommends supply chain security reforms. AMCA driven toward bankruptcy by data breach. Florida town pays ransom. </itunes:subtitle>
      <itunes:summary>Call it Waterbug or call it Turla, the Russian cyber operation has been hijacking Iran’s OilRIg cyber espionage infrastructure. Other cyber campaigns also afflict Middle Eastern targets. A US panel convened by CISA has some recommendations for supply chain security. An ad agency inadvertently exposes sensitive personal data. A bankruptcy filing in the AMCA breach. And Riviera Beach, Florida, decides to pay $600,000 in ransom to decrypt its files. Johannes Ullrich from SANS and the ISC Stormcast podcast on DNS security issues. Carole Theriault returns with an interview with ethical hacker Zoe Rose, who shares her advice for woman working in cyber security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_20.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Call it Waterbug or call it Turla, the Russian cyber operation has been hijacking Iran’s OilRIg cyber espionage infrastructure. Other cyber campaigns also afflict Middle Eastern targets. A US panel convened by CISA has some recommendations for supply chain security. An ad agency inadvertently exposes sensitive personal data. A bankruptcy filing in the AMCA breach. And Riviera Beach, Florida, decides to pay $600,000 in ransom to decrypt its files. Johannes Ullrich from SANS and the ISC Stormcast podcast on DNS security issues. Carole Theriault returns with an interview with ethical hacker Zoe Rose, who shares her advice for woman working in cyber security.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_20.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1290</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[58b366388b21433c94b0d39a406a3cbc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5913543535.mp3?updated=1690147139" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BlueKeep, again. Facebook’s cryptocurrency play. Updates on alleged or suspected electrical grid hacks. Catphishing and spying. Compromised social media accounts.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/868/notes</link>
      <description>More advice to patch BlueKeep, already. Facebook announces its planned launch of a cryptocurrency, Libra, to the accompaniment of considerable acclaim and at least as much skepticism. Updates on alleged power grid cyber operations. Catphishing and the adaptation of traditional espionage craft in the digital age. And cheap sunglasses turn up as phishbait in compromised social media accounts. Justin Harvey from Accenture with thoughts on tabletop exercises. Guest is Tom Hickman from Edgewise Networks on access control and zero trust.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_19.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 19 Jun 2019 19:59:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>868</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7906e324-def8-11ea-911f-977a378e1dd6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>BlueKeep, again. Facebook’s cryptocurrency play. Updates on alleged or suspected electrical grid hacks. Catphishing and spying. Compromised social media accounts.</itunes:subtitle>
      <itunes:summary>More advice to patch BlueKeep, already. Facebook announces its planned launch of a cryptocurrency, Libra, to the accompaniment of considerable acclaim and at least as much skepticism. Updates on alleged power grid cyber operations. Catphishing and the adaptation of traditional espionage craft in the digital age. And cheap sunglasses turn up as phishbait in compromised social media accounts. Justin Harvey from Accenture with thoughts on tabletop exercises. Guest is Tom Hickman from Edgewise Networks on access control and zero trust.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_19.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>More advice to patch BlueKeep, already. Facebook announces its planned launch of a cryptocurrency, Libra, to the accompaniment of considerable acclaim and at least as much skepticism. Updates on alleged power grid cyber operations. Catphishing and the adaptation of traditional espionage craft in the digital age. And cheap sunglasses turn up as phishbait in compromised social media accounts. Justin Harvey from Accenture with thoughts on tabletop exercises. Guest is Tom Hickman from Edgewise Networks on access control and zero trust.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_19.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1283</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9dbf5e68417f4240b4df3d453093d778]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5071253341.mp3?updated=1690147124" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Power grids, accidents, the challenge of forensics, and the nature of deterrence. BlueKeep considerations. Third- and fourth-party risks. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/867/notes</link>
      <description>Investigation into Argentina’s power failure continues, with preliminary indications suggesting “operational and design errors were responsible for the outage. Russia reacts to reports that the US staged malware in its power grid. Iran says it stopped US cyberespionage. ISIS worries about its vulnerability to BlueKeep. A breach at EatStreet illustrates some of the features of third-party risk. Ben Yelin from UMD CHHS on a Virginia license plate reader ban. Guest is Jack Danahy from Alert Logic on the troubling issue of adversary dwell time and the IT vigilance gap.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_18.html 
 Support our show
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Jun 2019 19:53:07 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>867</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/791d35b6-def8-11ea-911f-9bac48cdfafc/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Power grids, accidents, the challenge of forensics, and the nature of deterrence. BlueKeep considerations. Third- and fourth-party risks. </itunes:subtitle>
      <itunes:summary>Investigation into Argentina’s power failure continues, with preliminary indications suggesting “operational and design errors were responsible for the outage. Russia reacts to reports that the US staged malware in its power grid. Iran says it stopped US cyberespionage. ISIS worries about its vulnerability to BlueKeep. A breach at EatStreet illustrates some of the features of third-party risk. Ben Yelin from UMD CHHS on a Virginia license plate reader ban. Guest is Jack Danahy from Alert Logic on the troubling issue of adversary dwell time and the IT vigilance gap.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_18.html 
 Support our show
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Investigation into Argentina’s power failure continues, with preliminary indications suggesting “operational and design errors were responsible for the outage. Russia reacts to reports that the US staged malware in its power grid. Iran says it stopped US cyberespionage. ISIS worries about its vulnerability to BlueKeep. A breach at EatStreet illustrates some of the features of third-party risk. Ben Yelin from UMD CHHS on a Virginia license plate reader ban. Guest is Jack Danahy from Alert Logic on the troubling issue of adversary dwell time and the IT vigilance gap.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_18.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p> <p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1295</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ae28e20022c64e53b726e1f92ff86e37]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5449700780.mp3?updated=1690147109" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber deterrence? What grid failure looks like (and it needn’t come from a cyberattack). EU complains of Russian info ops. Twitter takes down inauthentic accounts.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/866/notes</link>
      <description>The New York Times reports that the US has staged malware in Russia’s power grid, presumably as deterrence against Russian cyberattacks against the US. South America has largely recovered from a large-scale power outage that seems, so far, to have been accidental. An EU report claims that Russian information operations against the EU are increasing. Twitter takes down more inauthentic sites. The Target outage over the weekend seems to have been caused by glitches, not hacking. Joe Carrigan from JHU ISI on the GDPR fine of a Spanish soccer league for a spying app. Tamika Smith speaks with Britt Paris from the Data &amp; Society Research Institute on the weaponization of AI.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_17.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 17 Jun 2019 17:53:15 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>866</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7933bf0c-def8-11ea-911f-437e9307d04a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyber deterrence? What grid failure looks like (and it needn’t come from a cyberattack). EU complains of Russian info ops. Twitter takes down inauthentic accounts.</itunes:subtitle>
      <itunes:summary>The New York Times reports that the US has staged malware in Russia’s power grid, presumably as deterrence against Russian cyberattacks against the US. South America has largely recovered from a large-scale power outage that seems, so far, to have been accidental. An EU report claims that Russian information operations against the EU are increasing. Twitter takes down more inauthentic sites. The Target outage over the weekend seems to have been caused by glitches, not hacking. Joe Carrigan from JHU ISI on the GDPR fine of a Spanish soccer league for a spying app. Tamika Smith speaks with Britt Paris from the Data &amp; Society Research Institute on the weaponization of AI.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_17.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The New York Times reports that the US has staged malware in Russia’s power grid, presumably as deterrence against Russian cyberattacks against the US. South America has largely recovered from a large-scale power outage that seems, so far, to have been accidental. An EU report claims that Russian information operations against the EU are increasing. Twitter takes down more inauthentic sites. The Target outage over the weekend seems to have been caused by glitches, not hacking. Joe Carrigan from JHU ISI on the GDPR fine of a Spanish soccer league for a spying app. Tamika Smith speaks with Britt Paris from the Data &amp; Society Research Institute on the weaponization of AI.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_17.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1270</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c9bd431a9bb34cc38962b12a17b00e64]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3665065252.mp3?updated=1690147092" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Apps on third-party Android store carry unwelcome code. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/90/notes</link>
      <description>Researchers at Zscaler have been tracking look-alike apps in third-party Android app stores that carry malicious code. Deepen Desai is VP of security research and operations and Zscaler, and he joins us to share their findings. 
The original research can be found here:
 https://www.zscaler.com/blogs/research/third-party-android-store-sms-trojan
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Jun 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>90</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/d58b02f2-df10-11ea-914b-7b716328dd94/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Apps on third-party Android store carry unwelcome code. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at Zscaler have been tracking look-alike apps in third-party Android app stores that carry malicious code. Deepen Desai is VP of security research and operations and Zscaler, and he joins us to share their findings. 
The original research can be found here:
 https://www.zscaler.com/blogs/research/third-party-android-store-sms-trojan
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Zscaler have been tracking look-alike apps in third-party Android app stores that carry malicious code. Deepen Desai is VP of security research and operations and Zscaler, and he joins us to share their findings. </p><p>The original research can be found here:</p><p><a href="https://www.zscaler.com/blogs/research/third-party-android-store-sms-trojan"> https://www.zscaler.com/blogs/research/third-party-android-store-sms-trojan</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>880</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8c7bceb1f4b345cea4e001134f2a2a2e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7692989330.mp3?updated=1685043088" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Xenotime is now interested in the power grid. Vulnerable Exim servers under attack. Mr. Assange goes to court. Credential-stuffing attacks on gamers. And that Ms Katie Jones? Not a real person. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/865/notes</link>
      <description>Xenotime is detected snooping around the North American power grid. Hacking groups exploit the Return of the Wizard vulnerability in Exim servers. Hearings on the extradition of WikiLeaks’ Julian Assange have begun. Online gamers are being chased with credential stuffing attacks: they’re after your skins, your accounts, your credit cards. And some LinkedIn catphish seem to be going to AI charm school. Justin Harvey from Accenture with advice for job-hunting grads. Guest is Dr. Matthew Dunlop, Vice President and Chief Information Security Officer for Under Armour, on the challenges of protecting one of the world’s most well-known brands.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_14.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 14 Jun 2019 19:41:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>865</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/794acd96-def8-11ea-911f-1fa9aa1e155b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Xenotime is now interested in the power grid. Vulnerable Exim servers under attack. Mr. Assange goes to court. Credential-stuffing attacks on gamers. And that Ms Katie Jones? Not a real person. </itunes:subtitle>
      <itunes:summary>Xenotime is detected snooping around the North American power grid. Hacking groups exploit the Return of the Wizard vulnerability in Exim servers. Hearings on the extradition of WikiLeaks’ Julian Assange have begun. Online gamers are being chased with credential stuffing attacks: they’re after your skins, your accounts, your credit cards. And some LinkedIn catphish seem to be going to AI charm school. Justin Harvey from Accenture with advice for job-hunting grads. Guest is Dr. Matthew Dunlop, Vice President and Chief Information Security Officer for Under Armour, on the challenges of protecting one of the world’s most well-known brands.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_14.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Xenotime is detected snooping around the North American power grid. Hacking groups exploit the Return of the Wizard vulnerability in Exim servers. Hearings on the extradition of WikiLeaks’ Julian Assange have begun. Online gamers are being chased with credential stuffing attacks: they’re after your skins, your accounts, your credit cards. And some LinkedIn catphish seem to be going to AI charm school. Justin Harvey from Accenture with advice for job-hunting grads. Guest is Dr. Matthew Dunlop, Vice President and Chief Information Security Officer for Under Armour, on the challenges of protecting one of the world’s most well-known brands.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_14.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1571</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4f61042ca0844457b5ea212df079abe0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9720875320.mp3?updated=1608756133" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Telegram recovers from DDoS. Fishwrap campaign breaks old news. Ransomware hits ACSO plants. Congress considers hacking back, again. That ol’ devil limbic system.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/864/notes</link>
      <description>Telegram recovers from a distributed denial-of-service attack. No attribution yet, but all the circumstantial evidence points to the Chinese security services. Operation Fishwrap, conducted by parties unknown, is an influence campaign that substitutes olds for news. Aircraft component manufacturer ASCO’s production is hit by ransomware. Hacking back is back, in Congress. Why don’t people patch? And a tip on fact-checking. Ben Yelin from UMD CHHS on NYPD cellphone surveillance. Guest is Dave Aitel from Cyxtera on offense oriented security and the INFILTRATE conference.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_13.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 13 Jun 2019 19:43:07 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>864</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/79603c8a-def8-11ea-911f-df97faaa2c22/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Telegram recovers from DDoS. Fishwrap campaign breaks old news. Ransomware hits ACSO plants. Congress considers hacking back, again. That ol’ devil limbic system.</itunes:subtitle>
      <itunes:summary>Telegram recovers from a distributed denial-of-service attack. No attribution yet, but all the circumstantial evidence points to the Chinese security services. Operation Fishwrap, conducted by parties unknown, is an influence campaign that substitutes olds for news. Aircraft component manufacturer ASCO’s production is hit by ransomware. Hacking back is back, in Congress. Why don’t people patch? And a tip on fact-checking. Ben Yelin from UMD CHHS on NYPD cellphone surveillance. Guest is Dave Aitel from Cyxtera on offense oriented security and the INFILTRATE conference.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_13.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Telegram recovers from a distributed denial-of-service attack. No attribution yet, but all the circumstantial evidence points to the Chinese security services. Operation Fishwrap, conducted by parties unknown, is an influence campaign that substitutes olds for news. Aircraft component manufacturer ASCO’s production is hit by ransomware. Hacking back is back, in Congress. Why don’t people patch? And a tip on fact-checking. Ben Yelin from UMD CHHS on NYPD cellphone surveillance. Guest is Dave Aitel from Cyxtera on offense oriented security and the INFILTRATE conference.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_13.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1298</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a05152d02a0945f99b213b2bd9efb259]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3725092943.mp3?updated=1690147058" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shifting techniques in cybercrime. Miscreants take note: “the aperture” will henceforth be wider for US Cyber Command and offensive ops. What Radiohead did. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/863/notes</link>
      <description>TA505 and Fin8 are both up to their old ways, with some new tricks in their criminal bag. A reminder about social engineering and Google Calendar. A new assertiveness is promised in US cyber operations, as the Administration “widens the aperture.” Updates on the security concerns that surround Huawei and ZTE. And Radiohead takes a different approach to online extortion--just render what they’re holding for ransom valueless. Craig Williams from Cisco Talos on the Jasper Loader. Guest is Lisa Sotto from Hunton Andrews Kurth LLP on the report Seeking Solutions: Aligning Data breach Notification rules across borders.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_12.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 12 Jun 2019 19:47:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>863</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7978df4c-def8-11ea-911f-cbc309b1c5d8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Shifting techniques in cybercrime. Miscreants take note: “the aperture” will henceforth be wider for US Cyber Command and offensive ops. What Radiohead did. </itunes:subtitle>
      <itunes:summary>TA505 and Fin8 are both up to their old ways, with some new tricks in their criminal bag. A reminder about social engineering and Google Calendar. A new assertiveness is promised in US cyber operations, as the Administration “widens the aperture.” Updates on the security concerns that surround Huawei and ZTE. And Radiohead takes a different approach to online extortion--just render what they’re holding for ransom valueless. Craig Williams from Cisco Talos on the Jasper Loader. Guest is Lisa Sotto from Hunton Andrews Kurth LLP on the report Seeking Solutions: Aligning Data breach Notification rules across borders.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_12.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>TA505 and Fin8 are both up to their old ways, with some new tricks in their criminal bag. A reminder about social engineering and Google Calendar. A new assertiveness is promised in US cyber operations, as the Administration “widens the aperture.” Updates on the security concerns that surround Huawei and ZTE. And Radiohead takes a different approach to online extortion--just render what they’re holding for ransom valueless. Craig Williams from Cisco Talos on the Jasper Loader. Guest is Lisa Sotto from Hunton Andrews Kurth LLP on the report Seeking Solutions: Aligning Data breach Notification rules across borders.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_12.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1298</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[da2622c132884da687685d51f80284ed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3009080117.mp3?updated=1690147039" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russia’s sovereign Internet. Huawei updates. CBP discloses exposure of images collected at a border crossing. Gmail features used for social engineering. M&amp;A notes. Top bugs found by bounty hunters.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/862/notes</link>
      <description>Russia says shrapnel from America’s war on that nice company Huawei is “destroying the world.” Russia also tells Tinder to fork over user pictures and messages. A Recorded Future study outlines the case for regarding Huawei as a security risk. US Customs and Border Protection discloses a breach of images collected at a border-crossing point. Crooks are taking advantage of Gmail features. Notes on recent mergers. And the top ten bugs bug hunters are finding. Johannes Ullrich from SANS and the ISC Stormcast podcast on the GoldBrute botnet. Guest is Tim Woods from FireMon reflecting on the past year under GDPR.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_11.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Jun 2019 19:56:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>862</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7991edd4-def8-11ea-911f-eb370cdf329e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Russia’s sovereign Internet. Huawei updates. CBP discloses exposure of images collected at a border crossing. Gmail features used for social engineering. M&amp;A notes. Top bugs found by bounty hunters.</itunes:subtitle>
      <itunes:summary>Russia says shrapnel from America’s war on that nice company Huawei is “destroying the world.” Russia also tells Tinder to fork over user pictures and messages. A Recorded Future study outlines the case for regarding Huawei as a security risk. US Customs and Border Protection discloses a breach of images collected at a border-crossing point. Crooks are taking advantage of Gmail features. Notes on recent mergers. And the top ten bugs bug hunters are finding. Johannes Ullrich from SANS and the ISC Stormcast podcast on the GoldBrute botnet. Guest is Tim Woods from FireMon reflecting on the past year under GDPR.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_11.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russia says shrapnel from America’s war on that nice company Huawei is “destroying the world.” Russia also tells Tinder to fork over user pictures and messages. A Recorded Future study outlines the case for regarding Huawei as a security risk. US Customs and Border Protection discloses a breach of images collected at a border-crossing point. Crooks are taking advantage of Gmail features. Notes on recent mergers. And the top ten bugs bug hunters are finding. Johannes Ullrich from SANS and the ISC Stormcast podcast on the GoldBrute botnet. Guest is Tim Woods from FireMon reflecting on the past year under GDPR.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_11.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1290</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0ccfd9e5a5a941de93b985ed9d9d8883]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3581787644.mp3?updated=1690147022" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>An espionage campaign succeeds without zero-days. Spam serves up old Office exploit. Disinformation makes it into YouTube. The Huawei Affair. Raytheon to be acquired.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/861/notes</link>
      <description>MuddyWater shows renewed activity--no zero-days and no exotic malware, just clever approaches and determined social engineering. Spam is serving up payloads that exploit an old Microsoft Office vulnerability. Russian-sponsored disinformation has been romping freely through YouTube. Some back-and-forth over Huawei: Washington isn’t relenting, but some relief for US companies may be forthcoming. And Beijing rumbles about retaliation. United Technologies has agreed to acquire Raytheon. Joe Carrigan from JHU ISI on Apple’s newly announced secure sign-in service and it’s focus on privacy.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_10.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 10 Jun 2019 19:06:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>861</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/79a61da4-def8-11ea-911f-073002ad2ba9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>An espionage campaign succeeds without zero-days. Spam serves up old Office exploit. Disinformation makes it into YouTube. The Huawei Affair. Raytheon to be acquired.</itunes:subtitle>
      <itunes:summary>MuddyWater shows renewed activity--no zero-days and no exotic malware, just clever approaches and determined social engineering. Spam is serving up payloads that exploit an old Microsoft Office vulnerability. Russian-sponsored disinformation has been romping freely through YouTube. Some back-and-forth over Huawei: Washington isn’t relenting, but some relief for US companies may be forthcoming. And Beijing rumbles about retaliation. United Technologies has agreed to acquire Raytheon. Joe Carrigan from JHU ISI on Apple’s newly announced secure sign-in service and it’s focus on privacy.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_10.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>MuddyWater shows renewed activity--no zero-days and no exotic malware, just clever approaches and determined social engineering. Spam is serving up payloads that exploit an old Microsoft Office vulnerability. Russian-sponsored disinformation has been romping freely through YouTube. Some back-and-forth over Huawei: Washington isn’t relenting, but some relief for US companies may be forthcoming. And Beijing rumbles about retaliation. United Technologies has agreed to acquire Raytheon. Joe Carrigan from JHU ISI on Apple’s newly announced secure sign-in service and it’s focus on privacy.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_10.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1047</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[899f34878ebe4f658033eef8a5f50a94]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9638288877.mp3?updated=1690147006" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Xwo scans for default credentials and exposed web services. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/89/notes</link>
      <description>Researchers at AT&amp;T Alien Labs have been tracking a new malware family they've named "Xwo" that's scanning systems for default credentials and vulnerable web services. 
Tom Hegel is security researcher with AT&amp;T Alien Labs, and he share their findings.
The original research is here:
 https://www.alienvault.com/blogs/labs-research/xwo-a-python-based-bot-scanner
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Jun 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>89</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/d361d686-df10-11ea-9fc1-6b5d94928460/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Xwo scans for default credentials and exposed web services. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at AT&amp;T Alien Labs have been tracking a new malware family they've named "Xwo" that's scanning systems for default credentials and vulnerable web services. 
Tom Hegel is security researcher with AT&amp;T Alien Labs, and he share their findings.
The original research is here:
 https://www.alienvault.com/blogs/labs-research/xwo-a-python-based-bot-scanner
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at AT&amp;T Alien Labs have been tracking a new malware family they've named "Xwo" that's scanning systems for default credentials and vulnerable web services. </p><p>Tom Hegel is security researcher with AT&amp;T Alien Labs, and he share their findings.</p><p>The original research is here:</p><p><a href="https://www.alienvault.com/blogs/labs-research/xwo-a-python-based-bot-scanner"> https://www.alienvault.com/blogs/labs-research/xwo-a-python-based-bot-scanner</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>998</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0d2becfb26364c9eb280eb8630bbd540]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3397703218.mp3?updated=1685043069" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Recruiting spies at university? GoldBrute botnet and RDP vulnerabilities. MuddyWater update. RIG delivers Buran. Achilles claims to sell access. NRC’s IG reports on cyber. Antitrust for Big Tech. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/860/notes</link>
      <description>The Australian National University hack and data loss look to many observers like the work of Chinese intelligence services. The GoldBrute botnet is scanning vulnerable RDP servers. MuddyWater is back, undeterred by leaks and learning from the best. The RIG exploit kit is delivering Buran ransomware. Achilles says he’s got the goods. The Nuclear Regulatory Commission IG looks at cyber inspections. And Big Tech prepares for big antitrust. Robert M. Lee from Dragos on natural gas infrastructure security. Guest is Frank Downs from ISACA on the challenges educators face preparing the cyber security workforce.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 07 Jun 2019 20:36:04 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>860</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/79bd6ad6-def8-11ea-911f-43b5a25459cd/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Recruiting spies at university? GoldBrute botnet and RDP vulnerabilities. MuddyWater update. RIG delivers Buran. Achilles claims to sell access. NRC’s IG reports on cyber. Antitrust for Big Tech. </itunes:subtitle>
      <itunes:summary>The Australian National University hack and data loss look to many observers like the work of Chinese intelligence services. The GoldBrute botnet is scanning vulnerable RDP servers. MuddyWater is back, undeterred by leaks and learning from the best. The RIG exploit kit is delivering Buran ransomware. Achilles says he’s got the goods. The Nuclear Regulatory Commission IG looks at cyber inspections. And Big Tech prepares for big antitrust. Robert M. Lee from Dragos on natural gas infrastructure security. Guest is Frank Downs from ISACA on the challenges educators face preparing the cyber security workforce.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Australian National University hack and data loss look to many observers like the work of Chinese intelligence services. The GoldBrute botnet is scanning vulnerable RDP servers. MuddyWater is back, undeterred by leaks and learning from the best. The RIG exploit kit is delivering Buran ransomware. Achilles says he’s got the goods. The Nuclear Regulatory Commission IG looks at cyber inspections. And Big Tech prepares for big antitrust. Robert M. Lee from Dragos on natural gas infrastructure security. Guest is Frank Downs from ISACA on the challenges educators face preparing the cyber security workforce.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1634</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04831ea3911044ca80e0020e75130692]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5125012484.mp3?updated=1608756125" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BlueKeep proofs-of-concept. BeiTaAd plug-in is a serious Android pest. Cyber espionage against the EU’s Moscow embassy. Influence operations. A motive for GPS spoofing?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/859/notes</link>
      <description>BlueKeep proof-of-concept exploits have been developed, and people are urged to patch. An annoying, disruptive advertising plug-in comes bundled with a couple of hundred Android apps in the Play Store. The EU’s Moscow embassy seems to have been the focus of Russian cyber espionage since 2017. Influence operations feature a small core of sites surrounded by many amplifying accounts. A possible motive for GPS spoofing. Johannes Ullrich from SANS and the ISC Stormcast podcast on Google throwing their weight behind MTA-STS, a protocol to make e-mail more secure. Guest is Josh Stella from Fugue on security and compliance in cloud infrastructure.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_06.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 06 Jun 2019 19:53:56 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>859</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/79da5132-def8-11ea-911f-e3b66f97f247/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>BlueKeep proofs-of-concept. BeiTaAd plug-in is a serious Android pest. Cyber espionage against the EU’s Moscow embassy. Influence operations. A motive for GPS spoofing?</itunes:subtitle>
      <itunes:summary>BlueKeep proof-of-concept exploits have been developed, and people are urged to patch. An annoying, disruptive advertising plug-in comes bundled with a couple of hundred Android apps in the Play Store. The EU’s Moscow embassy seems to have been the focus of Russian cyber espionage since 2017. Influence operations feature a small core of sites surrounded by many amplifying accounts. A possible motive for GPS spoofing. Johannes Ullrich from SANS and the ISC Stormcast podcast on Google throwing their weight behind MTA-STS, a protocol to make e-mail more secure. Guest is Josh Stella from Fugue on security and compliance in cloud infrastructure.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_06.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>BlueKeep proof-of-concept exploits have been developed, and people are urged to patch. An annoying, disruptive advertising plug-in comes bundled with a couple of hundred Android apps in the Play Store. The EU’s Moscow embassy seems to have been the focus of Russian cyber espionage since 2017. Influence operations feature a small core of sites surrounded by many amplifying accounts. A possible motive for GPS spoofing. Johannes Ullrich from SANS and the ISC Stormcast podcast on Google throwing their weight behind MTA-STS, a protocol to make e-mail more secure. Guest is Josh Stella from Fugue on security and compliance in cloud infrastructure.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p><a href="https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_06"> https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_06</a>.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1269</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2d7dbf842ad74631adc5cdac6525a831]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3899111633.mp3?updated=1690146972" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AMCA breach extends to LabCorp. Still no EternalBlue in Baltimore ransomware attack. Frankenstein malware. Real hacking isn’t like the movies. Huawei’s no-spy deal. US Data Strategy. Patch BlueKeep.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/858/notes</link>
      <description>Another medical testing firm is hit by the third-party breach at AMCA. More officials say there’s no EternalBlue involved in Baltimore’s ransomware attack. (And that attack may have involved some doxing, too--investigation is underway.) Real hacking isn’t like the movies. It’s alive: Frankenstein malware, that is. Huawei offers a no-spy agreement. The draft US Data Strategy is out. Really, you should patch for BlueKeep. A university’s donor list exposed online. Ben Yelin from UMD CHHS on secret tracking pixels in emails to the Navy Times in a controversial legal case. Tamika Smith speaks with Ariana Mirian from UC San Diego on research on the Hacker for Hire market.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_05.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 05 Jun 2019 19:37:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>858</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/79f2771c-def8-11ea-911f-333638b4ce3f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>AMCA breach extends to LabCorp. Still no EternalBlue in Baltimore ransomware attack. Frankenstein malware. Real hacking isn’t like the movies. Huawei’s no-spy deal. US Data Strategy. Patch BlueKeep.</itunes:subtitle>
      <itunes:summary>Another medical testing firm is hit by the third-party breach at AMCA. More officials say there’s no EternalBlue involved in Baltimore’s ransomware attack. (And that attack may have involved some doxing, too--investigation is underway.) Real hacking isn’t like the movies. It’s alive: Frankenstein malware, that is. Huawei offers a no-spy agreement. The draft US Data Strategy is out. Really, you should patch for BlueKeep. A university’s donor list exposed online. Ben Yelin from UMD CHHS on secret tracking pixels in emails to the Navy Times in a controversial legal case. Tamika Smith speaks with Ariana Mirian from UC San Diego on research on the Hacker for Hire market.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_05.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Another medical testing firm is hit by the third-party breach at AMCA. More officials say there’s no EternalBlue involved in Baltimore’s ransomware attack. (And that attack may have involved some doxing, too--investigation is underway.) Real hacking isn’t like the movies. It’s alive: Frankenstein malware, that is. Huawei offers a no-spy agreement. The draft US Data Strategy is out. Really, you should patch for BlueKeep. A university’s donor list exposed online. Ben Yelin from UMD CHHS on secret tracking pixels in emails to the Navy Times in a controversial legal case. Tamika Smith speaks with Ariana Mirian from UC San Diego on research on the Hacker for Hire market.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_05.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1333</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[47bbd2a2ad114abe9e571bcfc0ca70e2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7897645988.mp3?updated=1690146939" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Iranian brute-forcing tool leaked. Third-party data breach touches medical testing company. Ransomware news and updates. An antitrust look at Silicon Valley?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/857/notes</link>
      <description>Jason, an Iranian brute-forcing tool, has been leaked. A third-party breach affects customer and patient data held by Quest Diagnostics. Eurofins Scientific is recovering from a ransomware attack. A look at Baltimore City’s ransomware infestation shows no signs of EternalBlue, security firm Armor says. Instead, it looks like “vanilla ransomware.” And the prospect of antitrust investigations drives down Big Tech stock prices, tipping the Nasdaq into a correction. Emily Wilson from Terbium Labs on dark web fraud guide pricing. Guest is Jordan Blake from BehavioSec on digital transformations.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_04.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Jun 2019 19:41:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>857</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7a19bc3c-def8-11ea-911f-fb3289cf1ba9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Iranian brute-forcing tool leaked. Third-party data breach touches medical testing company. Ransomware news and updates. An antitrust look at Silicon Valley?</itunes:subtitle>
      <itunes:summary>Jason, an Iranian brute-forcing tool, has been leaked. A third-party breach affects customer and patient data held by Quest Diagnostics. Eurofins Scientific is recovering from a ransomware attack. A look at Baltimore City’s ransomware infestation shows no signs of EternalBlue, security firm Armor says. Instead, it looks like “vanilla ransomware.” And the prospect of antitrust investigations drives down Big Tech stock prices, tipping the Nasdaq into a correction. Emily Wilson from Terbium Labs on dark web fraud guide pricing. Guest is Jordan Blake from BehavioSec on digital transformations.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_04.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jason, an Iranian brute-forcing tool, has been leaked. A third-party breach affects customer and patient data held by Quest Diagnostics. Eurofins Scientific is recovering from a ransomware attack. A look at Baltimore City’s ransomware infestation shows no signs of EternalBlue, security firm Armor says. Instead, it looks like “vanilla ransomware.” And the prospect of antitrust investigations drives down Big Tech stock prices, tipping the Nasdaq into a correction. Emily Wilson from Terbium Labs on dark web fraud guide pricing. Guest is Jordan Blake from BehavioSec on digital transformations.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_04.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1287</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0e2ca7c226fc44e7b9c4e616fc759b16]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4047223020.mp3?updated=1690146919" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Recovery from network congestion. GandCrab to close. BlackSquid drops XMRig. BlueKeep patching lags. Crypto for criminals trial. Antitrust investigation of Google. “Persistence of Chaos” sold.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/856/notes</link>
      <description>Google’s cloud services recover from network congestion. GandCrab’s proprietors say they’re retiring rich at the end of the month. BlackSquid delivers the XMRig Monero miner. Updates on the Baltimore ransomware incident. Too many machines not yet patched against BlueKeep. CEO sentenced for providing criminals crypto. The US Justice Department is said to be preparing an antitrust investigation of Google. And “The Persistence of Chaos” has been sold for $1.3 million.  Joe Carrigan from JHU ISI on Google restricting ad-blocking in upcoming versions of Chrome. Tamika Smith speaks with Washington Post writer Geoffrey Fowler on his recent article “It’s the middle of the night. Do you know who your iPhone is talking to?”
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_03.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 03 Jun 2019 20:01:47 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>856</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7a31afb8-def8-11ea-911f-2fdc9c7e37d1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Recovery from network congestion. GandCrab to close. BlackSquid drops XMRig. BlueKeep patching lags. Crypto for criminals trial. Antitrust investigation of Google. “Persistence of Chaos” sold.</itunes:subtitle>
      <itunes:summary>Google’s cloud services recover from network congestion. GandCrab’s proprietors say they’re retiring rich at the end of the month. BlackSquid delivers the XMRig Monero miner. Updates on the Baltimore ransomware incident. Too many machines not yet patched against BlueKeep. CEO sentenced for providing criminals crypto. The US Justice Department is said to be preparing an antitrust investigation of Google. And “The Persistence of Chaos” has been sold for $1.3 million.  Joe Carrigan from JHU ISI on Google restricting ad-blocking in upcoming versions of Chrome. Tamika Smith speaks with Washington Post writer Geoffrey Fowler on his recent article “It’s the middle of the night. Do you know who your iPhone is talking to?”
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_03.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Google’s cloud services recover from network congestion. GandCrab’s proprietors say they’re retiring rich at the end of the month. BlackSquid delivers the XMRig Monero miner. Updates on the Baltimore ransomware incident. Too many machines not yet patched against BlueKeep. CEO sentenced for providing criminals crypto. The US Justice Department is said to be preparing an antitrust investigation of Google. And “The Persistence of Chaos” has been sold for $1.3 million.  Joe Carrigan from JHU ISI on Google restricting ad-blocking in upcoming versions of Chrome. Tamika Smith speaks with Washington Post writer Geoffrey Fowler on his recent article “It’s the middle of the night. Do you know who your iPhone is talking to?”</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/June/CyberWire_2019_06_03.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1342</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4674dd4688a84e5f89366a2cb566dfab]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3322997960.mp3?updated=1690146903" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Blockchain bandits plunder weak wallets. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/88/notes</link>
      <description>Adrian Bednarek is a senior research analyst at Independent Security Evaluators. He and his colleagues looked at weak private cryptocurrency keys on the Ethereum blockchain in an attempt to discover how and why they are being generated as well as how bad actors are taking advantage of them.
The original research is here:
https://www.securityevaluators.com/casestudies/ethercombing/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Jun 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>88</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cf344de6-df10-11ea-9dfb-a7f78233d590/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Blockchain bandits plunder weak wallets. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Adrian Bednarek is a senior research analyst at Independent Security Evaluators. He and his colleagues looked at weak private cryptocurrency keys on the Ethereum blockchain in an attempt to discover how and why they are being generated as well as how bad actors are taking advantage of them.
The original research is here:
https://www.securityevaluators.com/casestudies/ethercombing/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Adrian Bednarek is a senior research analyst at Independent Security Evaluators. He and his colleagues looked at weak private cryptocurrency keys on the Ethereum blockchain in an attempt to discover how and why they are being generated as well as how bad actors are taking advantage of them.</p><p>The original research is here:</p><p><a href="https://www.securityevaluators.com/casestudies/ethercombing/">https://www.securityevaluators.com/casestudies/ethercombing/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1294</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[988bf7285d3340dd8020c7b5da309b13]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8594971319.mp3?updated=1685029043" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Malicious misdirection. Found on the subway. A summary of file exposure. Turla’s back, and as clever as ever. ICRC proposes rules of cyberwar. Baltimore ransomware update. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/855/notes</link>
      <description>Malicious misdirection served up from unpatched WordPress sites. A big, big set of dating site records has been found exposed online--it’s in China, but the records seem to belong to anglophones. Many other files are exposed elsewhere, too, so it’s not a single problem. Turla’s back, and still after diplomats. The International Red Cross proposes rules for cyber conflict. And Baltimore City calculates the cost of not patching. It’s a lot higher than the cost of patching. Craig Williams from Cisco Talos with his take on a critical Microsoft vulnerability, CVE-2019-0708. Guest is Matt Aldridge from Webroot on the San Francisco facial recognition ban. Justin Harvey from Accenture on the dramatic increase in targeted ransomware. Guest is NSA’s Diane M. Janosek, celebrating the 20th year of their Centers of Academic Excellence in Cybersecurity program.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 31 May 2019 20:11:54 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>855</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7a42e12a-def8-11ea-911f-0b2bfe8b96cf/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Malicious misdirection. Found on the subway. A summary of file exposure. Turla’s back, and as clever as ever. ICRC proposes rules of cyberwar. Baltimore ransomware update. </itunes:subtitle>
      <itunes:summary>Malicious misdirection served up from unpatched WordPress sites. A big, big set of dating site records has been found exposed online--it’s in China, but the records seem to belong to anglophones. Many other files are exposed elsewhere, too, so it’s not a single problem. Turla’s back, and still after diplomats. The International Red Cross proposes rules for cyber conflict. And Baltimore City calculates the cost of not patching. It’s a lot higher than the cost of patching. Craig Williams from Cisco Talos with his take on a critical Microsoft vulnerability, CVE-2019-0708. Guest is Matt Aldridge from Webroot on the San Francisco facial recognition ban. Justin Harvey from Accenture on the dramatic increase in targeted ransomware. Guest is NSA’s Diane M. Janosek, celebrating the 20th year of their Centers of Academic Excellence in Cybersecurity program.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Malicious misdirection served up from unpatched WordPress sites. A big, big set of dating site records has been found exposed online--it’s in China, but the records seem to belong to anglophones. Many other files are exposed elsewhere, too, so it’s not a single problem. Turla’s back, and still after diplomats. The International Red Cross proposes rules for cyber conflict. And Baltimore City calculates the cost of not patching. It’s a lot higher than the cost of patching. Craig Williams from Cisco Talos with his take on a critical Microsoft vulnerability, CVE-2019-0708. Guest is Matt Aldridge from Webroot on the San Francisco facial recognition ban. Justin Harvey from Accenture on the dramatic increase in targeted ransomware. Guest is NSA’s Diane M. Janosek, celebrating the 20th year of their Centers of Academic Excellence in Cybersecurity program.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1664</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bd69be272a3b4415ac9d4733f65738f9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8434135490.mp3?updated=1608756109" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Malicious misdirection. Found on the subway. A summary of file exposure. Turla’s back, and as clever as ever. ICRC proposes rules of cyberwar. Baltimore ransomware update. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/854/notes</link>
      <description>Malicious misdirection served up from unpatched WordPress sites. A big, big set of dating site records has been found exposed online--it’s in China, but the records seem to belong to anglophones. Many other files are exposed elsewhere, too, so it’s not a single problem. Turla’s back, and still after diplomats. The International Red Cross proposes rules for cyber conflict. And Baltimore City calculates the cost of not patching. It’s a lot higher than the cost of patching. Craig Williams from Cisco Talos with his take on a critical Microsoft vulnerability, CVE-2019-0708. Guest is Matt Aldridge from Webroot on the San Francisco facial recognition ban.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_30.html 
 Support our show
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 30 May 2019 20:08:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>854</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7a5311bc-def8-11ea-911f-7fa4906e315a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Malicious misdirection. Found on the subway. A summary of file exposure. Turla’s back, and as clever as ever. ICRC proposes rules of cyberwar. Baltimore ransomware update. </itunes:subtitle>
      <itunes:summary>Malicious misdirection served up from unpatched WordPress sites. A big, big set of dating site records has been found exposed online--it’s in China, but the records seem to belong to anglophones. Many other files are exposed elsewhere, too, so it’s not a single problem. Turla’s back, and still after diplomats. The International Red Cross proposes rules for cyber conflict. And Baltimore City calculates the cost of not patching. It’s a lot higher than the cost of patching. Craig Williams from Cisco Talos with his take on a critical Microsoft vulnerability, CVE-2019-0708. Guest is Matt Aldridge from Webroot on the San Francisco facial recognition ban.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_30.html 
 Support our show
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Malicious misdirection served up from unpatched WordPress sites. A big, big set of dating site records has been found exposed online--it’s in China, but the records seem to belong to anglophones. Many other files are exposed elsewhere, too, so it’s not a single problem. Turla’s back, and still after diplomats. The International Red Cross proposes rules for cyber conflict. And Baltimore City calculates the cost of not patching. It’s a lot higher than the cost of patching. Craig Williams from Cisco Talos with his take on a critical Microsoft vulnerability, CVE-2019-0708. Guest is Matt Aldridge from Webroot on the San Francisco facial recognition ban.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_30.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p> <p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1336</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b1ee2a392fef4cfa89babbda3449946a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5535879605.mp3?updated=1690146863" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Special Counsel Mueller speaks about his investigation of Russian influence in the 2016 US presidential campaign. Iranian coordinated inauthenticity. BlueKeep, Pegasus updates. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/853/notes</link>
      <description>Special Counsel Mueller makes his first public statement about the results of his investigation into influence operations surrounding the 2016 US Presidential campaign. He says his first statement will also be his last. FireEye identifies Iranian coordinated inauthenticity in US 2018 midterm elections, and Twitter and Facebook take down the offending accounts. Notes on the BlueKeep exploit. More Pegasus infestations. Reality Winner revisited. Updates on Baltimore ransomware.  Ben Yelin from UMD CHHS reacts to allegations that NSA may have some culpability in the Baltimore ransomware incident. Guests are Julie Bernard from Deloitte and John Carlson from the FS-ISAC on the recent report, “Pursuing cybersecurity maturity at financial institutions.”
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_29.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 29 May 2019 19:25:46 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>853</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7a6e65d4-def8-11ea-911f-eb678aea4fac/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Special Counsel Mueller speaks about his investigation of Russian influence in the 2016 US presidential campaign. Iranian coordinated inauthenticity. BlueKeep, Pegasus updates. </itunes:subtitle>
      <itunes:summary>Special Counsel Mueller makes his first public statement about the results of his investigation into influence operations surrounding the 2016 US Presidential campaign. He says his first statement will also be his last. FireEye identifies Iranian coordinated inauthenticity in US 2018 midterm elections, and Twitter and Facebook take down the offending accounts. Notes on the BlueKeep exploit. More Pegasus infestations. Reality Winner revisited. Updates on Baltimore ransomware.  Ben Yelin from UMD CHHS reacts to allegations that NSA may have some culpability in the Baltimore ransomware incident. Guests are Julie Bernard from Deloitte and John Carlson from the FS-ISAC on the recent report, “Pursuing cybersecurity maturity at financial institutions.”
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_29.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Special Counsel Mueller makes his first public statement about the results of his investigation into influence operations surrounding the 2016 US Presidential campaign. He says his first statement will also be his last. FireEye identifies Iranian coordinated inauthenticity in US 2018 midterm elections, and Twitter and Facebook take down the offending accounts. Notes on the BlueKeep exploit. More Pegasus infestations. Reality Winner revisited. Updates on Baltimore ransomware.  Ben Yelin from UMD CHHS reacts to allegations that NSA may have some culpability in the Baltimore ransomware incident. Guests are Julie Bernard from Deloitte and John Carlson from the FS-ISAC on the recent report, “Pursuing cybersecurity maturity at financial institutions.”</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_29.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1370</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3612f31cefc645c6bba1298a08789800]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3719704456.mp3?updated=1690146842" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sensitive mortgage documents left exposed online. Someone’s scanning for BlueKeep RDP issues. Huawei updates. The case of Baltimore City’s ransomware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/852/notes</link>
      <description>First American Financial suffers a data exposure, with hundreds of millions of mortgage-related documents left open to the Internet. Someone is scanning Tor for signs of BlueKeep RDP vulnerabilities. China complains about US complaints against Huawei as some major German firms rethink their dealings with Shenzhen. And no, NSA did not hold Baltimore for ransom, but Baltimore wants Washington to pick up its remediation and recovery tab. Malek Ben Salem from Accenture Labs on NIST transitioning some crypto algorithms.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_28.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 May 2019 20:00:06 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>852</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7a84a0e2-def8-11ea-911f-63e6167f859c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Sensitive mortgage documents left exposed online. Someone’s scanning for BlueKeep RDP issues. Huawei updates. The case of Baltimore City’s ransomware.</itunes:subtitle>
      <itunes:summary>First American Financial suffers a data exposure, with hundreds of millions of mortgage-related documents left open to the Internet. Someone is scanning Tor for signs of BlueKeep RDP vulnerabilities. China complains about US complaints against Huawei as some major German firms rethink their dealings with Shenzhen. And no, NSA did not hold Baltimore for ransom, but Baltimore wants Washington to pick up its remediation and recovery tab. Malek Ben Salem from Accenture Labs on NIST transitioning some crypto algorithms.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_28.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>First American Financial suffers a data exposure, with hundreds of millions of mortgage-related documents left open to the Internet. Someone is scanning Tor for signs of BlueKeep RDP vulnerabilities. China complains about US complaints against Huawei as some major German firms rethink their dealings with Shenzhen. And no, NSA did not hold Baltimore for ransom, but Baltimore wants Washington to pick up its remediation and recovery tab. Malek Ben Salem from Accenture Labs on NIST transitioning some crypto algorithms.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_28.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1010</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2c9b77418122423ba9563d885d6d0833]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5999165477.mp3?updated=1690146823" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A fresh look at GOSSIPGIRL and the Supra Threat Actors. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/87/notes</link>
      <description>Chronicle researchers Juan Andres Guerrero Saade and Silas Cutler recently published research tracking the development of the Stuxnet family of malware, which ultimately led them to the GOSSIPGIRL Supra Group of threat actors. 
Juan Andres Guerrero Saade joins us to share their findings.
The research can be found here:
https://medium.com/chronicle-blog/who-is-gossipgirl-3b4170f846c0
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 May 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>87</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cb4d183e-df10-11ea-aa91-e3a3f8232e26/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A fresh look at GOSSIPGIRL and the Supra Threat Actors. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Chronicle researchers Juan Andres Guerrero Saade and Silas Cutler recently published research tracking the development of the Stuxnet family of malware, which ultimately led them to the GOSSIPGIRL Supra Group of threat actors. 
Juan Andres Guerrero Saade joins us to share their findings.
The research can be found here:
https://medium.com/chronicle-blog/who-is-gossipgirl-3b4170f846c0
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chronicle researchers Juan Andres Guerrero Saade and Silas Cutler recently published research tracking the development of the Stuxnet family of malware, which ultimately led them to the GOSSIPGIRL Supra Group of threat actors. </p><p>Juan Andres Guerrero Saade joins us to share their findings.</p><p>The research can be found here:</p><p><a href="https://medium.com/chronicle-blog/who-is-gossipgirl-3b4170f846c0">https://medium.com/chronicle-blog/who-is-gossipgirl-3b4170f846c0</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1909</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[925a77e37895459895dc21c5605f047f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3686793998.mp3?updated=1685029026" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stone Panda update. A new strain of Mirai. Bogus cryptocurrency apps are trending in Google Play. Mr. Assange is charged under the Espionage Act. Info ops. Law firms as phishbait. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/851/notes</link>
      <description>Stone Panda is distributing the Quasar RAT. A new strain of Mirai is out. Bitcoin prices are up, and so is the incidence of malicious cryptocurrency apps in Google Play. The US charges Wikileaks’ Julain Assagne with seventeen new counts under the Espionage Act. UK political parties are said to have poor security. Huawei’s charm offensive. Russia points with sad alarm to NATO cyber deterrence policy. Bogus law firm emails prove effective phishbait. Joe Carrigan from JHU ISI on recent research from Google on the effectiveness of basic security hygiene. Guest is Nate Lesser from Cypient Black on  “entangled enterprise risk.”
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_24.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 24 May 2019 20:08:52 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>851</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7a973b4e-def8-11ea-911f-db49a8e68666/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Stone Panda update. A new strain of Mirai. Bogus cryptocurrency apps are trending in Google Play. Mr. Assange is charged under the Espionage Act. Info ops. Law firms as phishbait. </itunes:subtitle>
      <itunes:summary>Stone Panda is distributing the Quasar RAT. A new strain of Mirai is out. Bitcoin prices are up, and so is the incidence of malicious cryptocurrency apps in Google Play. The US charges Wikileaks’ Julain Assagne with seventeen new counts under the Espionage Act. UK political parties are said to have poor security. Huawei’s charm offensive. Russia points with sad alarm to NATO cyber deterrence policy. Bogus law firm emails prove effective phishbait. Joe Carrigan from JHU ISI on recent research from Google on the effectiveness of basic security hygiene. Guest is Nate Lesser from Cypient Black on  “entangled enterprise risk.”
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_24.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Stone Panda is distributing the Quasar RAT. A new strain of Mirai is out. Bitcoin prices are up, and so is the incidence of malicious cryptocurrency apps in Google Play. The US charges Wikileaks’ Julain Assagne with seventeen new counts under the Espionage Act. UK political parties are said to have poor security. Huawei’s charm offensive. Russia points with sad alarm to NATO cyber deterrence policy. Bogus law firm emails prove effective phishbait. Joe Carrigan from JHU ISI on recent research from Google on the effectiveness of basic security hygiene. Guest is Nate Lesser from Cypient Black on  “entangled enterprise risk.”</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_24.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1631</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[add821d5407e4386baf81fff091b3580]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7965694722.mp3?updated=1608756134" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>NATO and UK to Russia: hands off elections and infrastructure. More trouble for Huawei, and maybe for others. Notes from the Cyber Investing Summit. Equifax downgraded over 2017 breach. Is it art?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/850/notes</link>
      <description>The UK and NATO send Moscow a pointed message about the consequences of meddling with either infrastructure or elections. More companies, including ARM, decide they won’t be working with Huawei. Other Chinese companies seem headed for US blacklisting. Moody’s cuts Equifax’s rating over its 2017 breach. Notes from last week’s Cyber Investing Summit. And we may not know much about art, but we know what we like. Justin Harvey from Accenture on the ongoing threat of USB devices. Tamika Smith speaks with Sydney Freedberg Jr. from Breaking Defense about his article, “Can NSA Stop China Copying Its Cyber Weapons?”
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_23.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 23 May 2019 20:06:47 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>850</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7ab1a61e-def8-11ea-911f-fb79a2ff3b2e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>NATO and UK to Russia: hands off elections and infrastructure. More trouble for Huawei, and maybe for others. Notes from the Cyber Investing Summit. Equifax downgraded over 2017 breach. Is it art?</itunes:subtitle>
      <itunes:summary>The UK and NATO send Moscow a pointed message about the consequences of meddling with either infrastructure or elections. More companies, including ARM, decide they won’t be working with Huawei. Other Chinese companies seem headed for US blacklisting. Moody’s cuts Equifax’s rating over its 2017 breach. Notes from last week’s Cyber Investing Summit. And we may not know much about art, but we know what we like. Justin Harvey from Accenture on the ongoing threat of USB devices. Tamika Smith speaks with Sydney Freedberg Jr. from Breaking Defense about his article, “Can NSA Stop China Copying Its Cyber Weapons?”
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_23.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The UK and NATO send Moscow a pointed message about the consequences of meddling with either infrastructure or elections. More companies, including ARM, decide they won’t be working with Huawei. Other Chinese companies seem headed for US blacklisting. Moody’s cuts Equifax’s rating over its 2017 breach. Notes from last week’s Cyber Investing Summit. And we may not know much about art, but we know what we like. Justin Harvey from Accenture on the ongoing threat of USB devices. Tamika Smith speaks with Sydney Freedberg Jr. from Breaking Defense about his article, “Can NSA Stop China Copying Its Cyber Weapons?”</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_23.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1320</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[78bb75f8d5eb413fa89756d4b7b4f732]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3270411833.mp3?updated=1690146746" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fancy Bear fingered, again. Warnings for travelers. Political parties get a cybersecurity grade. Updates on US restrictions on Chinese companies. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/849/notes</link>
      <description>Fancy Bear’s latest campaign is using malware reported to Virus Total by US Cyber Command. IBM’s X-Force looks at cybersecurity for travelers, and shares a bunch of horror stories. Security Scorecard looks at the online security of political parties in the US and Europe: some are better than others, but all could use some help. Updates on Huawei and other Chinese companies facing US sanctions. And if you’re listening to this in the US, you may believe you know more than you in fact do. Johannes Ullrich from SANS and the ISC Stormcast podcast on website vulnerabilities due to third party tools. Guest is Inga Goddijn from Risk Based Security on their Q1 Data Breach Report and cyber insurance issues.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_22.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 22 May 2019 19:54:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>849</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7ac809a4-def8-11ea-911f-8fedfce5f015/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fancy Bear fingered, again. Warnings for travelers. Political parties get a cybersecurity grade. Updates on US restrictions on Chinese companies. </itunes:subtitle>
      <itunes:summary>Fancy Bear’s latest campaign is using malware reported to Virus Total by US Cyber Command. IBM’s X-Force looks at cybersecurity for travelers, and shares a bunch of horror stories. Security Scorecard looks at the online security of political parties in the US and Europe: some are better than others, but all could use some help. Updates on Huawei and other Chinese companies facing US sanctions. And if you’re listening to this in the US, you may believe you know more than you in fact do. Johannes Ullrich from SANS and the ISC Stormcast podcast on website vulnerabilities due to third party tools. Guest is Inga Goddijn from Risk Based Security on their Q1 Data Breach Report and cyber insurance issues.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_22.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Fancy Bear’s latest campaign is using malware reported to Virus Total by US Cyber Command. IBM’s X-Force looks at cybersecurity for travelers, and shares a bunch of horror stories. Security Scorecard looks at the online security of political parties in the US and Europe: some are better than others, but all could use some help. Updates on Huawei and other Chinese companies facing US sanctions. And if you’re listening to this in the US, you may believe you know more than you in fact do. Johannes Ullrich from SANS and the ISC Stormcast podcast on website vulnerabilities due to third party tools. Guest is Inga Goddijn from Risk Based Security on their Q1 Data Breach Report and cyber insurance issues.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_22.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1270</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d7baac4da28a49fa8149d73475a1cb0f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4542642329.mp3?updated=1690146728" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BlackWater snoops through the Middle East. TeamViewer hacked. Android app behaving badly. A misconfigured database with scraped Instagram data. Ransomware notes. Huawei updates.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/848/notes</link>
      <description>BlackWater is snooping around the Middle East. It’s evasive, and it looks a lot like the more familiar MuddyWater threat actor. TeamViewer turns out to have been hacked, and the perpetrators look like the proprietors of the Winnti backdoor. An Android app is behaving badly. Another unsecured database is found hanging out on the Internet. There’s a free decryptor out for a strain of ransomware, but  also it won’t help Baltimore. And the market’s look at the Huawei ban. Craig Williams from Cisco Talos discussing honeypots on Elasticsearch. Guest is Dave Venable from Masergy on cyber vulnerabilities at the infrastructure level.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_21.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 May 2019 20:40:45 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>848</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7ae759f8-def8-11ea-911f-13270de18e52/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>BlackWater snoops through the Middle East. TeamViewer hacked. Android app behaving badly. A misconfigured database with scraped Instagram data. Ransomware notes. Huawei updates.</itunes:subtitle>
      <itunes:summary>BlackWater is snooping around the Middle East. It’s evasive, and it looks a lot like the more familiar MuddyWater threat actor. TeamViewer turns out to have been hacked, and the perpetrators look like the proprietors of the Winnti backdoor. An Android app is behaving badly. Another unsecured database is found hanging out on the Internet. There’s a free decryptor out for a strain of ransomware, but  also it won’t help Baltimore. And the market’s look at the Huawei ban. Craig Williams from Cisco Talos discussing honeypots on Elasticsearch. Guest is Dave Venable from Masergy on cyber vulnerabilities at the infrastructure level.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_21.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>BlackWater is snooping around the Middle East. It’s evasive, and it looks a lot like the more familiar MuddyWater threat actor. TeamViewer turns out to have been hacked, and the perpetrators look like the proprietors of the Winnti backdoor. An Android app is behaving badly. Another unsecured database is found hanging out on the Internet. There’s a free decryptor out for a strain of ransomware, but  also it won’t help Baltimore. And the market’s look at the Huawei ban. Craig Williams from Cisco Talos discussing honeypots on Elasticsearch. Guest is Dave Venable from Masergy on cyber vulnerabilities at the infrastructure level.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_21.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1199</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[59d4f6f3169342f09ed410f2de14c469]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8994565699.mp3?updated=1690146709" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Huawei agonistes. Hacktivism is way down. New EU sanctions regime. Facebook goes after more coordinated inauthenticity. Salesforce still fixing its fix. OGuser hacked. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/847/notes</link>
      <description>Huawei is on the US Entity List, and US exporters have been quick to notice and cut the Shenzhen company off. Security concerns are now expected to shift to the undersea cable market. Hacktivism seems to have gone into eclipse. The EU enacts a sanctions regime to deter election hacking. Facebook shutters inauthentic accounts targeting African politics. Salesforce is restoring service after an unhappy upgrade. OGuser forum hacked. And don’t worry about a hacker draft. Jonathan Katz from UMD on encryption for better security at border crossings. Tamika Smith reports on the Baltimore City government ransomware situation.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_20.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 20 May 2019 19:53:20 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>847</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7b0a7a96-def8-11ea-911f-930506042b72/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Huawei agonistes. Hacktivism is way down. New EU sanctions regime. Facebook goes after more coordinated inauthenticity. Salesforce still fixing its fix. OGuser hacked. </itunes:subtitle>
      <itunes:summary>Huawei is on the US Entity List, and US exporters have been quick to notice and cut the Shenzhen company off. Security concerns are now expected to shift to the undersea cable market. Hacktivism seems to have gone into eclipse. The EU enacts a sanctions regime to deter election hacking. Facebook shutters inauthentic accounts targeting African politics. Salesforce is restoring service after an unhappy upgrade. OGuser forum hacked. And don’t worry about a hacker draft. Jonathan Katz from UMD on encryption for better security at border crossings. Tamika Smith reports on the Baltimore City government ransomware situation.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_20.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Huawei is on the US Entity List, and US exporters have been quick to notice and cut the Shenzhen company off. Security concerns are now expected to shift to the undersea cable market. Hacktivism seems to have gone into eclipse. The EU enacts a sanctions regime to deter election hacking. Facebook shutters inauthentic accounts targeting African politics. Salesforce is restoring service after an unhappy upgrade. OGuser forum hacked. And don’t worry about a hacker draft. Jonathan Katz from UMD on encryption for better security at border crossings. Tamika Smith reports on the Baltimore City government ransomware situation.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_20.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1301</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4c8e128d366541cbb4f44398b5ea74c9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8859095177.mp3?updated=1690146602" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Elfin APT group targets Middle East energy sector. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/86/notes</link>
      <description>Researchers at Symantec have been tracking an espionage group known as Elfin (aka APT 33) that has targeted dozens of organizations over the past three years, primarily focusing on Saudi Arabia and the United States. 
Alan Neville is a principal threat intelligence analyst at Symantec, and he joins us to share their findings.
The research can be found here:
 https://www.symantec.com/blogs/threat-intelligence/elfin-apt33-espionage
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 May 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>86</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c54e1a46-df10-11ea-a0a9-dbf81f9693d1/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Elfin APT group targets Middle East energy sector. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at Symantec have been tracking an espionage group known as Elfin (aka APT 33) that has targeted dozens of organizations over the past three years, primarily focusing on Saudi Arabia and the United States. 
Alan Neville is a principal threat intelligence analyst at Symantec, and he joins us to share their findings.
The research can be found here:
 https://www.symantec.com/blogs/threat-intelligence/elfin-apt33-espionage
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Symantec have been tracking an espionage group known as Elfin (aka APT 33) that has targeted dozens of organizations over the past three years, primarily focusing on Saudi Arabia and the United States. </p><p>Alan Neville is a principal threat intelligence analyst at Symantec, and he joins us to share their findings.</p><p>The research can be found here:</p><p><a href="https://www.symantec.com/blogs/threat-intelligence/elfin-apt33-espionage"> https://www.symantec.com/blogs/threat-intelligence/elfin-apt33-espionage</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1061</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0b98be1e77374167a8235d2bcd6bf191]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1882297780.mp3?updated=1685029005" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Slack closes a vulnerability. Email tracking in a court martial. Restrictions on doing business with Huawei come into place. A case of responsible disclosure.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/846/notes</link>
      <description>A Slack vulnerability is disclosed and fixed. And this is not as seen on TV: a real NCIS investigation is likely to occupy real JAGs for some time to come, with implications for military and civilian cyber law. The US is moving rapidly on Huawei and its associated companies: it’s now much harder for US companies to do business with them, and there’s likely to be fallout in other countries as well. An exposed database affords an instructive case of responsible disclosure.  Joe Carrigan from JHU ISI on USB device encryption and best practices. Guest is Mike Kijewski from MedCrypt on security for new and legacy medical devices.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_17.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 17 May 2019 19:13:59 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>846</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7b1e0110-def8-11ea-911f-4f2b4a1f4d74/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Slack closes a vulnerability. Email tracking in a court martial. Restrictions on doing business with Huawei come into place. A case of responsible disclosure.</itunes:subtitle>
      <itunes:summary>A Slack vulnerability is disclosed and fixed. And this is not as seen on TV: a real NCIS investigation is likely to occupy real JAGs for some time to come, with implications for military and civilian cyber law. The US is moving rapidly on Huawei and its associated companies: it’s now much harder for US companies to do business with them, and there’s likely to be fallout in other countries as well. An exposed database affords an instructive case of responsible disclosure.  Joe Carrigan from JHU ISI on USB device encryption and best practices. Guest is Mike Kijewski from MedCrypt on security for new and legacy medical devices.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_17.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A Slack vulnerability is disclosed and fixed. And this is not as seen on TV: a real NCIS investigation is likely to occupy real JAGs for some time to come, with implications for military and civilian cyber law. The US is moving rapidly on Huawei and its associated companies: it’s now much harder for US companies to do business with them, and there’s likely to be fallout in other countries as well. An exposed database affords an instructive case of responsible disclosure.  Joe Carrigan from JHU ISI on USB device encryption and best practices. Guest is Mike Kijewski from MedCrypt on security for new and legacy medical devices.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_17.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1628</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fed46a6c34de46078736cc7bc02224dc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9523787439.mp3?updated=1608756086" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US Executive Order aimed at China, and Huawei. Hunting backdoors in Dutch networks. Spyware proliferation. Cipher stunting. Titan key spoofing. Meaconing warning. Exposed PII in Russia.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/845/notes</link>
      <description>President Trump declares a state of emergency over the threat from foreign adversaries and the companies they control. (And yes, Huawei, he’s looking at you.) Dutch intelligence is said to be investigating the possibility of backdoors in telecommunications networks. Concerns about spyware proliferation rise. Cipher stunting is observed in the wild. Titan security keys are spoofable. Meaconing airliners. And misconfigurations expose PII in Russia. Emily Wilson from Terbium Labs on the surprisingly open nature of online sales of elicit goods and services. Guest is Kris Beevers from NS1 on DNS security and management technology.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_16.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 16 May 2019 19:37:20 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>845</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7b3d2086-def8-11ea-911f-8f3fa6ba0108/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>US Executive Order aimed at China, and Huawei. Hunting backdoors in Dutch networks. Spyware proliferation. Cipher stunting. Titan key spoofing. Meaconing warning. Exposed PII in Russia.</itunes:subtitle>
      <itunes:summary>President Trump declares a state of emergency over the threat from foreign adversaries and the companies they control. (And yes, Huawei, he’s looking at you.) Dutch intelligence is said to be investigating the possibility of backdoors in telecommunications networks. Concerns about spyware proliferation rise. Cipher stunting is observed in the wild. Titan security keys are spoofable. Meaconing airliners. And misconfigurations expose PII in Russia. Emily Wilson from Terbium Labs on the surprisingly open nature of online sales of elicit goods and services. Guest is Kris Beevers from NS1 on DNS security and management technology.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_16.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>President Trump declares a state of emergency over the threat from foreign adversaries and the companies they control. (And yes, Huawei, he’s looking at you.) Dutch intelligence is said to be investigating the possibility of backdoors in telecommunications networks. Concerns about spyware proliferation rise. Cipher stunting is observed in the wild. Titan security keys are spoofable. Meaconing airliners. And misconfigurations expose PII in Russia. Emily Wilson from Terbium Labs on the surprisingly open nature of online sales of elicit goods and services. Guest is Kris Beevers from NS1 on DNS security and management technology.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_16.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1340</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6419672285d541a38714048ba9414997]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5033251288.mp3?updated=1690145959" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sharing espionage tools and  infrastructure. Speculative execution flaws found in Intel chips. A big Patch Tuesday. CrowdStrike’s  IPO. WhatsApp exploitation. Cyber Solarium. Ransomware in Baltimore.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/844/notes</link>
      <description>Chinese domestic and foreign intelligence services are cooperating more closely in cyberspace. Another set of speculative execution issues is found in Intel chips. This month’s Patch Tuesday was a big one. CrowdStrike files for its long-anticipated IPO. WhatsApp, spyware, and zero-days. Apple may be required to open its devices to apps from third-party stores. The Cyber Solarium is ready to get started, and Russia offers a helpful hand. Baltimore continues to suffer from ransomware. Malek Ben Salem from Accenture Labs with an overview of the Accenture Technology Vision report. Guest is Tom Pedersen from OneLogin on password use trends.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_15.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 15 May 2019 17:58:56 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>844</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7b573e44-def8-11ea-911f-9b7b5d7e2551/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Sharing espionage tools and  infrastructure. Speculative execution flaws found in Intel chips. A big Patch Tuesday. CrowdStrike’s  IPO. WhatsApp exploitation. Cyber Solarium. Ransomware in Baltimore.</itunes:subtitle>
      <itunes:summary>Chinese domestic and foreign intelligence services are cooperating more closely in cyberspace. Another set of speculative execution issues is found in Intel chips. This month’s Patch Tuesday was a big one. CrowdStrike files for its long-anticipated IPO. WhatsApp, spyware, and zero-days. Apple may be required to open its devices to apps from third-party stores. The Cyber Solarium is ready to get started, and Russia offers a helpful hand. Baltimore continues to suffer from ransomware. Malek Ben Salem from Accenture Labs with an overview of the Accenture Technology Vision report. Guest is Tom Pedersen from OneLogin on password use trends.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_15.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Chinese domestic and foreign intelligence services are cooperating more closely in cyberspace. Another set of speculative execution issues is found in Intel chips. This month’s Patch Tuesday was a big one. CrowdStrike files for its long-anticipated IPO. WhatsApp, spyware, and zero-days. Apple may be required to open its devices to apps from third-party stores. The Cyber Solarium is ready to get started, and Russia offers a helpful hand. Baltimore continues to suffer from ransomware. Malek Ben Salem from Accenture Labs with an overview of the Accenture Technology Vision report. Guest is Tom Pedersen from OneLogin on password use trends.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_15.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1186</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[08e60cb9da6f406db3fc3015aafe040a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3912371513.mp3?updated=1690145829" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russians hacked two Florida counties. Fxmsp targets named. WhatsApp patches spyware-enabling flaws. Breach costs. Cisco patches routers. Endless Mayfly’s endless hogwash.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/843/notes</link>
      <description>Russian operators breached two Florida counties’ voting systems, but without altering vote counts. Symantec, McAfee and Trend Micro are thought to be the security vendors hit by Fxmsp cybercrminals. WhatApp patches a flaw exploited to install spyware. The Equifax breach seems to have cost the company $1.4 billion. Companies are increasingly aware of data’s potential toxicity. Cisco patches two flaws. And Endless Mayfly peddled fake news on behalf of Iran. Daniel Prince from Lancaster University on asymmetric information and attacker/defender dynamics. Tamika Smith debuts on our show with her story on Hackground, a STEM and robotics club.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_14.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 May 2019 20:16:44 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>843</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7b6f2612-def8-11ea-911f-9b3ede4ce9b8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Russians hacked two Florida counties. Fxmsp targets named. WhatsApp patches spyware-enabling flaws. Breach costs. Cisco patches routers. Endless Mayfly’s endless hogwash.</itunes:subtitle>
      <itunes:summary>Russian operators breached two Florida counties’ voting systems, but without altering vote counts. Symantec, McAfee and Trend Micro are thought to be the security vendors hit by Fxmsp cybercrminals. WhatApp patches a flaw exploited to install spyware. The Equifax breach seems to have cost the company $1.4 billion. Companies are increasingly aware of data’s potential toxicity. Cisco patches two flaws. And Endless Mayfly peddled fake news on behalf of Iran. Daniel Prince from Lancaster University on asymmetric information and attacker/defender dynamics. Tamika Smith debuts on our show with her story on Hackground, a STEM and robotics club.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_14.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russian operators breached two Florida counties’ voting systems, but without altering vote counts. Symantec, McAfee and Trend Micro are thought to be the security vendors hit by Fxmsp cybercrminals. WhatApp patches a flaw exploited to install spyware. The Equifax breach seems to have cost the company $1.4 billion. Companies are increasingly aware of data’s potential toxicity. Cisco patches two flaws. And Endless Mayfly peddled fake news on behalf of Iran. Daniel Prince from Lancaster University on asymmetric information and attacker/defender dynamics. Tamika Smith debuts on our show with her story on Hackground, a STEM and robotics club.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_14.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1339</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3e2045fb1c744fc0891082f79e455408]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3356580850.mp3?updated=1690145729" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Security companies allegedly hacked by Fxmsp remain unidentified. SharePoint bug exploited in the wild. G7 preps major cyber exercise. Anthem hack motive? Amnesty takes NSO Group to court.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/842/notes</link>
      <description>Fxmsp criminals are now said to have code from a fourth security company, but none of the claimed victims have been publicly identified. A SharePoint vulnerability is being exploited against unpatched servers in the wild. The G7 are preparing a major exercise to evaluate the financial system’s ability to withstand a major cyberattack. No one is saying what the Anthem hackers were after. Amnesty takes NSO Group to court. And the Pentagon takes a security look at VCs. Jonathan Katz from UMD on differential privacy, a technique for providing privacy for individuals taking part in studies.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_13.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 13 May 2019 19:19:06 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>842</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7b8488d6-def8-11ea-911f-8b5dfbd3681b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Security companies allegedly hacked by Fxmsp remain unidentified. SharePoint bug exploited in the wild. G7 preps major cyber exercise. Anthem hack motive? Amnesty takes NSO Group to court.</itunes:subtitle>
      <itunes:summary>Fxmsp criminals are now said to have code from a fourth security company, but none of the claimed victims have been publicly identified. A SharePoint vulnerability is being exploited against unpatched servers in the wild. The G7 are preparing a major exercise to evaluate the financial system’s ability to withstand a major cyberattack. No one is saying what the Anthem hackers were after. Amnesty takes NSO Group to court. And the Pentagon takes a security look at VCs. Jonathan Katz from UMD on differential privacy, a technique for providing privacy for individuals taking part in studies.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_13.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Fxmsp criminals are now said to have code from a fourth security company, but none of the claimed victims have been publicly identified. A SharePoint vulnerability is being exploited against unpatched servers in the wild. The G7 are preparing a major exercise to evaluate the financial system’s ability to withstand a major cyberattack. No one is saying what the Anthem hackers were after. Amnesty takes NSO Group to court. And the Pentagon takes a security look at VCs. Jonathan Katz from UMD on differential privacy, a technique for providing privacy for individuals taking part in studies.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_13.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1019</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b1d8d829ea3c4a97bff10dd3d98f9830]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8575032195.mp3?updated=1690145686" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Steganography enables sophisticated OceanLotus payloads. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/85/notes</link>
      <description>Researchers at Blackberry Cylance have been tracking payload obfuscation techniques employed by OceanLotus (APT32), specifically steganography used to hide code within seemingly benign image files.

Tom Bonner is director of threat research at Blackberry Cylance, and he joins us to share their findings.
The original research can be found here:
 https://www.cylance.com/en-us/lp/threat-research-and-intelligence/oceanlotus-steganography-malware-analysis-white-paper-2019.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 May 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>85</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c2220c92-df10-11ea-83fe-6731788bf48c/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Steganography enables sophisticated OceanLotus payloads. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at Blackberry Cylance have been tracking payload obfuscation techniques employed by OceanLotus (APT32), specifically steganography used to hide code within seemingly benign image files.

Tom Bonner is director of threat research at Blackberry Cylance, and he joins us to share their findings.
The original research can be found here:
 https://www.cylance.com/en-us/lp/threat-research-and-intelligence/oceanlotus-steganography-malware-analysis-white-paper-2019.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Blackberry Cylance have been tracking payload obfuscation techniques employed by OceanLotus (APT32), specifically steganography used to hide code within seemingly benign image files.</p><p><br></p><p>Tom Bonner is director of threat research at Blackberry Cylance, and he joins us to share their findings.</p><p>The original research can be found here:</p><p><a href="https://www.cylance.com/en-us/lp/threat-research-and-intelligence/oceanlotus-steganography-malware-analysis-white-paper-2019.html"> https://www.cylance.com/en-us/lp/threat-research-and-intelligence/oceanlotus-steganography-malware-analysis-white-paper-2019.html</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1193</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ccaf20bd84b2441cb99c4088875aa416]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1725378899.mp3?updated=1685028997" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Breaches at AV companies? Pyongyang’s ElectricFish. Symantec’s CEO steps down. Calls to break up Facebook and regulate the pieces. US Federal indictments for leaks and breaches. Verizon DBIR reviewed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/841/notes</link>
      <description>Fxmsp may have breached three anti-virus companies. US-CERT and CISA warn against a new North Korean malware tool being used by Hidden Cobra: they’re calling it “ElectricFish.” A changing of the guard at Symantec. Former Facebook insiders call for breaking up the company and for more regulation. Facebook disagrees about the breakup, but says it likes the idea of regulation. Two indictments are unsealed--one for leaking classified information, the other for the Anthem breach. Johannes Ullrich shares some vulnerabilities involving tools from Google. Verizon DBIR coauthor Alex Pinto shares this year’s key findings.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 10 May 2019 15:49:08 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>841</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7b9c7e50-def8-11ea-911f-d71cd97c9b8c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Breaches at AV companies? Pyongyang’s ElectricFish. Symantec’s CEO steps down. Calls to break up Facebook and regulate the pieces. US Federal indictments for leaks and breaches. Verizon DBIR reviewed.</itunes:subtitle>
      <itunes:summary>Fxmsp may have breached three anti-virus companies. US-CERT and CISA warn against a new North Korean malware tool being used by Hidden Cobra: they’re calling it “ElectricFish.” A changing of the guard at Symantec. Former Facebook insiders call for breaking up the company and for more regulation. Facebook disagrees about the breakup, but says it likes the idea of regulation. Two indictments are unsealed--one for leaking classified information, the other for the Anthem breach. Johannes Ullrich shares some vulnerabilities involving tools from Google. Verizon DBIR coauthor Alex Pinto shares this year’s key findings.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Fxmsp may have breached three anti-virus companies. US-CERT and CISA warn against a new North Korean malware tool being used by Hidden Cobra: they’re calling it “ElectricFish.” A changing of the guard at Symantec. Former Facebook insiders call for breaking up the company and for more regulation. Facebook disagrees about the breakup, but says it likes the idea of regulation. Two indictments are unsealed--one for leaking classified information, the other for the Anthem breach. Johannes Ullrich shares some vulnerabilities involving tools from Google. Verizon DBIR coauthor Alex Pinto shares this year’s key findings.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1539</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ba9baebccc194ef7b0cd219ce6153837]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5692260611.mp3?updated=1690145653" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Someone is after Tehran’s hackers. GitLab misconfiguration. AI’s attack potential. Amazon pursues hackers who defrauded sellers. DeepDotWeb indictments. Evil Clippy. Lunch hacks in San Mateo. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/840/notes</link>
      <description>The Green Leakers release more information about Iranian cyber operators, including details about MuddyWater and the Rana Institute. A misconfigured GitLab instance exposes data used by Samsung engineers. Thoughts on how AI can shift the advantage to the attacker.  Amazon is after hackers who defrauded sellers. DeepDotWeb proprietors are indicted. “Evil Cippy” does VBA stomping. And a food fight in San Mateo’s corner of cyberspace. Justin Harvey from Accenture reviews cyber insurance. UVA’s Mariah Carey shares her experience as captain of the championship winning NCCDC team.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 09 May 2019 19:14:57 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>840</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7bb556c8-def8-11ea-911f-c30088337be3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Someone is after Tehran’s hackers. GitLab misconfiguration. AI’s attack potential. Amazon pursues hackers who defrauded sellers. DeepDotWeb indictments. Evil Clippy. Lunch hacks in San Mateo. </itunes:subtitle>
      <itunes:summary>The Green Leakers release more information about Iranian cyber operators, including details about MuddyWater and the Rana Institute. A misconfigured GitLab instance exposes data used by Samsung engineers. Thoughts on how AI can shift the advantage to the attacker.  Amazon is after hackers who defrauded sellers. DeepDotWeb proprietors are indicted. “Evil Cippy” does VBA stomping. And a food fight in San Mateo’s corner of cyberspace. Justin Harvey from Accenture reviews cyber insurance. UVA’s Mariah Carey shares her experience as captain of the championship winning NCCDC team.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Green Leakers release more information about Iranian cyber operators, including details about MuddyWater and the Rana Institute. A misconfigured GitLab instance exposes data used by Samsung engineers. Thoughts on how AI can shift the advantage to the attacker.  Amazon is after hackers who defrauded sellers. DeepDotWeb proprietors are indicted. “Evil Cippy” does VBA stomping. And a food fight in San Mateo’s corner of cyberspace. Justin Harvey from Accenture reviews cyber insurance. UVA’s Mariah Carey shares her experience as captain of the championship winning NCCDC team.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1224</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ca2d461e6f45495597b9aa7f02838205]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6000000202.mp3?updated=1690145619" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Turla’s new backdoor. Verizon’s 2019 Data Breach Investigations Report. Bad actors seek to influence the EU. US CYBERCOM preps for 2020. Baltimore’s ransomware. Monolingual content moderation.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/839/notes</link>
      <description>Turla is back, and with a clever backdoor called “LightNeuron.” Verizon’s Data Breach Investigations Report shows that the C-suite remains a big target of social engineers, that crooks are following companies into the cloud, that ransomware remains popular, and that people seem warier of phishing. Bad actors peddle influence in the EU. Binance gets looted, Baltimore gets hacked. Meny Har from Siemplify explains SOCs, SIEMs and SOARs. Ben Yelin from UMD CHHS considers emojis in the courtroom.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 08 May 2019 18:58:44 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>839</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7bd0c4ee-def8-11ea-911f-3b0420bc4df5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Turla’s new backdoor. Verizon’s 2019 Data Breach Investigations Report. Bad actors seek to influence the EU. US CYBERCOM preps for 2020. Baltimore’s ransomware. Monolingual content moderation.</itunes:subtitle>
      <itunes:summary>Turla is back, and with a clever backdoor called “LightNeuron.” Verizon’s Data Breach Investigations Report shows that the C-suite remains a big target of social engineers, that crooks are following companies into the cloud, that ransomware remains popular, and that people seem warier of phishing. Bad actors peddle influence in the EU. Binance gets looted, Baltimore gets hacked. Meny Har from Siemplify explains SOCs, SIEMs and SOARs. Ben Yelin from UMD CHHS considers emojis in the courtroom.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Turla is back, and with a clever backdoor called “LightNeuron.” Verizon’s Data Breach Investigations Report shows that the C-suite remains a big target of social engineers, that crooks are following companies into the cloud, that ransomware remains popular, and that people seem warier of phishing. Bad actors peddle influence in the EU. Binance gets looted, Baltimore gets hacked. Meny Har from Siemplify explains SOCs, SIEMs and SOARs. Ben Yelin from UMD CHHS considers emojis in the courtroom.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1338</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cb1ea45b64ca4cdab4fe78f78965751f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4111657776.mp3?updated=1690145587" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Reverse engineering Equation Group attack tools (and putting them to bad use). Hacking, jamming, and airstrikes. Taking down coordinated inauthenticity. How big is the dark web?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/838/notes</link>
      <description>Buckeye seems to have reengineered some of Uncle Sam’s cyber tools, and they did it without, apparently, help from the ShadowBrokers. More on airstrikes as retaliation for hacking, with a brief excursus on electronic warfare. Notes on malicious commitment as one of the hazards of open source software development. How big is the dark web? Big enough, but maybe not as big as everyone thinks. And beware of bogus Avengers Endgame sites. David Dufour from Webroot with thoughts on HTTPS security concerns. Guest is Michael Figueroa from the Advance Cyber Security Center on their recent report identifying a need for a board-level cyber risk management standard.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_07.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 May 2019 19:55:11 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>838</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7be8249a-def8-11ea-911f-8f008388ebd5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Reverse engineering Equation Group attack tools (and putting them to bad use). Hacking, jamming, and airstrikes. Taking down coordinated inauthenticity. How big is the dark web?</itunes:subtitle>
      <itunes:summary>Buckeye seems to have reengineered some of Uncle Sam’s cyber tools, and they did it without, apparently, help from the ShadowBrokers. More on airstrikes as retaliation for hacking, with a brief excursus on electronic warfare. Notes on malicious commitment as one of the hazards of open source software development. How big is the dark web? Big enough, but maybe not as big as everyone thinks. And beware of bogus Avengers Endgame sites. David Dufour from Webroot with thoughts on HTTPS security concerns. Guest is Michael Figueroa from the Advance Cyber Security Center on their recent report identifying a need for a board-level cyber risk management standard.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_07.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Buckeye seems to have reengineered some of Uncle Sam’s cyber tools, and they did it without, apparently, help from the ShadowBrokers. More on airstrikes as retaliation for hacking, with a brief excursus on electronic warfare. Notes on malicious commitment as one of the hazards of open source software development. How big is the dark web? Big enough, but maybe not as big as everyone thinks. And beware of bogus Avengers Endgame sites. David Dufour from Webroot with thoughts on HTTPS security concerns. Guest is Michael Figueroa from the Advance Cyber Security Center on their recent report identifying a need for a board-level cyber risk management standard.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_07.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1347</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[174be035a67448f5b15d02829c054a4c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4994790748.mp3?updated=1690145558" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Supply chain hacking campaign looks like espionage. Airstrikes versus hackers. FTC versus Facebook. Notes from the Global Cyber Innovation Summit. What’s up with MegaCortex.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/837/notes</link>
      <description>Tracking a group that’s after the software supply chain. Israel adds airstrikes to the array of responses it’s prepared to make to hackers. The US Federal Trade Commission still doesn’t know how you solve a problem like Mark. Some more notes from last week’s Global Cyber Innovation Summit. Sophos has more details on MegaCortex, a new strain of ransomware. And criminal organizations organize and operate a lot like legitimate businesses. Joe Carrigan from JHU ISI with information on a remote code execution vulnerability affecting Dell systems. Guest is Blake Sobczak from E &amp; E News on the recent electrical grid “cyber event”.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_06.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 06 May 2019 20:05:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>837</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7bf9d8b6-def8-11ea-911f-9f188384c36d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Supply chain hacking campaign looks like espionage. Airstrikes versus hackers. FTC versus Facebook. Notes from the Global Cyber Innovation Summit. What’s up with MegaCortex.</itunes:subtitle>
      <itunes:summary>Tracking a group that’s after the software supply chain. Israel adds airstrikes to the array of responses it’s prepared to make to hackers. The US Federal Trade Commission still doesn’t know how you solve a problem like Mark. Some more notes from last week’s Global Cyber Innovation Summit. Sophos has more details on MegaCortex, a new strain of ransomware. And criminal organizations organize and operate a lot like legitimate businesses. Joe Carrigan from JHU ISI with information on a remote code execution vulnerability affecting Dell systems. Guest is Blake Sobczak from E &amp; E News on the recent electrical grid “cyber event”.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_06.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Tracking a group that’s after the software supply chain. Israel adds airstrikes to the array of responses it’s prepared to make to hackers. The US Federal Trade Commission still doesn’t know how you solve a problem like Mark. Some more notes from last week’s Global Cyber Innovation Summit. Sophos has more details on MegaCortex, a new strain of ransomware. And criminal organizations organize and operate a lot like legitimate businesses. Joe Carrigan from JHU ISI with information on a remote code execution vulnerability affecting Dell systems. Guest is Blake Sobczak from E &amp; E News on the recent electrical grid “cyber event”.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_06.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1353</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[138f462ac0d042e58418a5d1324a7dd0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4357207557.mp3?updated=1690145533" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sea Turtle state-sponsored DNS hijacking. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/84/notes</link>
      <description>Researchers at Cisco Talos have been tracking what they believe is a state-sponsored attack on DNS systems, targeting the Middle East and North Africa. This attack has the potential to erode trust and stability of the DNS system, so critical to the global economy.
Craig Williams is director of Talos Outreach at Cisco, and he joins us to share their findings. 
The original research can be found here:
https://blog.talosintelligence.com/2019/04/seaturtle.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 May 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>84</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bf3e1926-df10-11ea-8fd0-3ff131e313bc/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Sea Turtle state-sponsored DNS hijacking. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at Cisco Talos have been tracking what they believe is a state-sponsored attack on DNS systems, targeting the Middle East and North Africa. This attack has the potential to erode trust and stability of the DNS system, so critical to the global economy.
Craig Williams is director of Talos Outreach at Cisco, and he joins us to share their findings. 
The original research can be found here:
https://blog.talosintelligence.com/2019/04/seaturtle.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Cisco Talos have been tracking what they believe is a state-sponsored attack on DNS systems, targeting the Middle East and North Africa. This attack has the potential to erode trust and stability of the DNS system, so critical to the global economy.</p><p>Craig Williams is director of Talos Outreach at Cisco, and he joins us to share their findings. </p><p>The original research can be found here:</p><p>https://blog.talosintelligence.com/2019/04/seaturtle.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1556</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[65c5cb4119a44c03b6dd0947e04a5edd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7831029808.mp3?updated=1685028979" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Utility hack update. Surveillance tool proliferation. Exploit black market. Novel ransomware, old distro channel. Notes from the Global Cyber Innovation Summit.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/836/notes</link>
      <description>That cyber incident that affected electrical utilities in the western United States seems to have been a denial-of-service attack. Concerns arise over potential proliferation of Chinese security service tools. Exploit blackmarketeer Volodya and some customers. The Retefe banking Trojan is back. Some new ransomware thinks it’s the moving finger that writes, and, having written, moves on. And some cause for measured optimism at the Global Cyber Innovation Summit. Emily Wilson from Terbium Labs on the Dynamic Connections conference, hosted by General Dynamics. Guest is Joseph Carson from Thycotic on lessons he’s learned (the hard way) on communications with the board.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_03.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 03 May 2019 20:13:49 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>836</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7c10da02-def8-11ea-911f-e3776a29bf5d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Utility hack update. Surveillance tool proliferation. Exploit black market. Novel ransomware, old distro channel. Notes from the Global Cyber Innovation Summit.  </itunes:subtitle>
      <itunes:summary>That cyber incident that affected electrical utilities in the western United States seems to have been a denial-of-service attack. Concerns arise over potential proliferation of Chinese security service tools. Exploit blackmarketeer Volodya and some customers. The Retefe banking Trojan is back. Some new ransomware thinks it’s the moving finger that writes, and, having written, moves on. And some cause for measured optimism at the Global Cyber Innovation Summit. Emily Wilson from Terbium Labs on the Dynamic Connections conference, hosted by General Dynamics. Guest is Joseph Carson from Thycotic on lessons he’s learned (the hard way) on communications with the board.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_03.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>That cyber incident that affected electrical utilities in the western United States seems to have been a denial-of-service attack. Concerns arise over potential proliferation of Chinese security service tools. Exploit blackmarketeer Volodya and some customers. The Retefe banking Trojan is back. Some new ransomware thinks it’s the moving finger that writes, and, having written, moves on. And some cause for measured optimism at the Global Cyber Innovation Summit. Emily Wilson from Terbium Labs on the Dynamic Connections conference, hosted by General Dynamics. Guest is Joseph Carson from Thycotic on lessons he’s learned (the hard way) on communications with the board.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_03.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1633</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[426cd45b50ad482a970fea48324ff2b7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8962034275.mp3?updated=1608756104" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Wipro update. Office 365 attacks. The "Smart Content Store" is bad mojo. Russian Internet sovereignty. Global Cyber Innovation Summit notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/835/notes</link>
      <description>The group behind the Wipro attack has been active since 2015. Office 365 are still being targeted by account takeover attacks. A third-party Android app store is serving malware. The UK Defense Secretary has been sacked over leaked information. The US warned Russia to cease its support of Venezuela’s Chavista regime. Russia’s Internet sovereignty bill is signed into law. And notes on the Global Cyber Innovation Summit. Jonathan Katz from UMD on law enforcement requests for “ghost” encryption. Guest is Cody Cornell from Swimlane on collaborative SOCs.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 02 May 2019 20:04:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>835</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7c2c12ae-def8-11ea-911f-f37499d94e3f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Wipro update. Office 365 attacks. The "Smart Content Store" is bad mojo. Russian Internet sovereignty. Global Cyber Innovation Summit notes.</itunes:subtitle>
      <itunes:summary>The group behind the Wipro attack has been active since 2015. Office 365 are still being targeted by account takeover attacks. A third-party Android app store is serving malware. The UK Defense Secretary has been sacked over leaked information. The US warned Russia to cease its support of Venezuela’s Chavista regime. Russia’s Internet sovereignty bill is signed into law. And notes on the Global Cyber Innovation Summit. Jonathan Katz from UMD on law enforcement requests for “ghost” encryption. Guest is Cody Cornell from Swimlane on collaborative SOCs.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The group behind the Wipro attack has been active since 2015. Office 365 are still being targeted by account takeover attacks. A third-party Android app store is serving malware. The UK Defense Secretary has been sacked over leaked information. The US warned Russia to cease its support of Venezuela’s Chavista regime. Russia’s Internet sovereignty bill is signed into law. And notes on the Global Cyber Innovation Summit. Jonathan Katz from UMD on law enforcement requests for “ghost” encryption. Guest is Cody Cornell from Swimlane on collaborative SOCs.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1107</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6840023358b1469fb8f5cd99df94d9f6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4668190783.mp3?updated=1690145292" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US Energy Department alludes to March cyber incident. BND 19-02 is out. Facebook likes privacy. Assange gets a short nickel.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/834/notes</link>
      <description>In today’s podcast, we hear that a US Energy Department report alludes to a March cyber incident. Citycomp refused to yield to blackmail, so now its client data is being leaked. The US Department of Homeland Security has issued Binding Operational Directive 19-02. A UK judge sentenced Julian Assange to fifty weeks jail for bail jumping. Facebook the privacy-focused initiatives it plans to implement. And notes on the Global Cyber Innovation Summit. Robert M. Lee from Dragos on the pros and cons of conferences like RSA. Guest is Bert Grantges from Vera on cyber security as a business enabler.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_01.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 01 May 2019 19:56:21 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>834</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7c40cb72-def8-11ea-911f-33d48ebb38b3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>US Energy Department alludes to March cyber incident. BND 19-02 is out. Facebook likes privacy. Assange gets a short nickel.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that a US Energy Department report alludes to a March cyber incident. Citycomp refused to yield to blackmail, so now its client data is being leaked. The US Department of Homeland Security has issued Binding Operational Directive 19-02. A UK judge sentenced Julian Assange to fifty weeks jail for bail jumping. Facebook the privacy-focused initiatives it plans to implement. And notes on the Global Cyber Innovation Summit. Robert M. Lee from Dragos on the pros and cons of conferences like RSA. Guest is Bert Grantges from Vera on cyber security as a business enabler.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_01.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that a US Energy Department report alludes to a March cyber incident. Citycomp refused to yield to blackmail, so now its client data is being leaked. The US Department of Homeland Security has issued Binding Operational Directive 19-02. A UK judge sentenced Julian Assange to fifty weeks jail for bail jumping. Facebook the privacy-focused initiatives it plans to implement. And notes on the Global Cyber Innovation Summit. Robert M. Lee from Dragos on the pros and cons of conferences like RSA. Guest is Bert Grantges from Vera on cyber security as a business enabler.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/May/CyberWire_2019_05_01.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1310</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[447f495d4d1247c79e5d16bd0247e737]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8281734011.mp3?updated=1690145243" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Telnet may not be the backdoor you’re looking for. Large PII database left exposed by parties unknown. DHS has a Critical Functions List. ISIS inspiration is back. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/833/notes</link>
      <description>A backdoor turns out to be a familiar kind of Telnet implementation (and it was fixed seven years ago in any case). A large database of US household personally identifiable information was found exposed online, but who owned it remains unclear. The US Department of Homeland Security releases a Critical Functions List. ISIS’s sometime Caliph is back online. And piracy streaming is loaded with malware. Who knew? Craig Williams from Cisco Talos on their research into malware markets on Facebook. Guest is Dean Pipes from TetraVX on the root cause of shadow IT.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_30.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Apr 2019 19:56:59 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>833</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7c5715ee-def8-11ea-911f-2b20df576236/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Telnet may not be the backdoor you’re looking for. Large PII database left exposed by parties unknown. DHS has a Critical Functions List. ISIS inspiration is back. </itunes:subtitle>
      <itunes:summary>A backdoor turns out to be a familiar kind of Telnet implementation (and it was fixed seven years ago in any case). A large database of US household personally identifiable information was found exposed online, but who owned it remains unclear. The US Department of Homeland Security releases a Critical Functions List. ISIS’s sometime Caliph is back online. And piracy streaming is loaded with malware. Who knew? Craig Williams from Cisco Talos on their research into malware markets on Facebook. Guest is Dean Pipes from TetraVX on the root cause of shadow IT.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_30.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A backdoor turns out to be a familiar kind of Telnet implementation (and it was fixed seven years ago in any case). A large database of US household personally identifiable information was found exposed online, but who owned it remains unclear. The US Department of Homeland Security releases a Critical Functions List. ISIS’s sometime Caliph is back online. And piracy streaming is loaded with malware. Who knew? Craig Williams from Cisco Talos on their research into malware markets on Facebook. Guest is Dean Pipes from TetraVX on the root cause of shadow IT.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_30.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1299</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[54d63a0082c04f7aad255eb4c3af9d23]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1093587064.mp3?updated=1690145005" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>IoT devices exposed in peer-to-peer software vulnerability. Car hacking claims. More warnings of possible violence in Sri Lanka. Curating app stores for security. eScooter’s “voices” hacked. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/832/notes</link>
      <description>Vulnerable peer-to-peer software exposes consumer and small-business IoT devices to compromise. A hacker says he’s hacked automotive GPS trackers, all for the good, of course, and could even turn off a car’s engine. Not, you know, that he would. Sri Lanka warns of the possibility of more violence, and journalists wonder if prior restraint of certain speech might be worth considering. Curating app stores for security. And potty-mouthed eScooters on Brisbane streets.  Joe Carrigan from JHU ISI on Facebook’s continuing privacy violations, potential FTC fines and PR woes.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_29.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 29 Apr 2019 20:02:54 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>832</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7c683ad6-def8-11ea-911f-fbfbac2c4fc8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>IoT devices exposed in peer-to-peer software vulnerability. Car hacking claims. More warnings of possible violence in Sri Lanka. Curating app stores for security. eScooter’s “voices” hacked. </itunes:subtitle>
      <itunes:summary>Vulnerable peer-to-peer software exposes consumer and small-business IoT devices to compromise. A hacker says he’s hacked automotive GPS trackers, all for the good, of course, and could even turn off a car’s engine. Not, you know, that he would. Sri Lanka warns of the possibility of more violence, and journalists wonder if prior restraint of certain speech might be worth considering. Curating app stores for security. And potty-mouthed eScooters on Brisbane streets.  Joe Carrigan from JHU ISI on Facebook’s continuing privacy violations, potential FTC fines and PR woes.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_29.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Vulnerable peer-to-peer software exposes consumer and small-business IoT devices to compromise. A hacker says he’s hacked automotive GPS trackers, all for the good, of course, and could even turn off a car’s engine. Not, you know, that he would. Sri Lanka warns of the possibility of more violence, and journalists wonder if prior restraint of certain speech might be worth considering. Curating app stores for security. And potty-mouthed eScooters on Brisbane streets.  Joe Carrigan from JHU ISI on Facebook’s continuing privacy violations, potential FTC fines and PR woes.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_29.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>975</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[99a6b191577b4a149197ce91f004b9ee]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1427985207.mp3?updated=1690144930" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Deep Learning threatens 3D medical imaging integrity. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/83/notes</link>
      <description>Researchers at Ben Gurion University in Israel have developed techniques to infiltrate medical imaging system networks and alter 3D medical scans within, fooling both human and automated examiners with a high rate of success. 
Yisroel Mirsky is a cybersecurity researcher and project manager at Ben Gurion University, and he joins us to share what his team discovered.
The original research can be found here:
https://arxiv.org/pdf/1901.03597.pdf
A video demonstrating the exploit is here:
https://youtu.be/_mkRAArj-x0
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Apr 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>83</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bde222ac-df10-11ea-8499-6fb358b7e096/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Deep Learning threatens 3D medical imaging integrity. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at Ben Gurion University in Israel have developed techniques to infiltrate medical imaging system networks and alter 3D medical scans within, fooling both human and automated examiners with a high rate of success. 
Yisroel Mirsky is a cybersecurity researcher and project manager at Ben Gurion University, and he joins us to share what his team discovered.
The original research can be found here:
https://arxiv.org/pdf/1901.03597.pdf
A video demonstrating the exploit is here:
https://youtu.be/_mkRAArj-x0
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Ben Gurion University in Israel have developed techniques to infiltrate medical imaging system networks and alter 3D medical scans within, fooling both human and automated examiners with a high rate of success. </p><p>Yisroel Mirsky is a cybersecurity researcher and project manager at Ben Gurion University, and he joins us to share what his team discovered.</p><p>The original research can be found here:</p><p><a href="https://arxiv.org/pdf/1901.03597.pdf">https://arxiv.org/pdf/1901.03597.pdf</a></p><p>A video demonstrating the exploit is here:</p><p><a href="https://youtu.be/_mkRAArj-x0">https://youtu.be/_mkRAArj-x0</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1412</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4debc947169d4f9c9e1525900944b718]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5595732346.mp3?updated=1685028960" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sri Lanka bombing investigation updates. Cryptojacking targets enterprises in East Asia. Oracle web server zero-day. The criminal-to-criminal credential-stuffing market. Who talked about Huawei in UK?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/831/notes</link>
      <description>Investigation of the Easter massacres in Sri Lanka continues. For all the concern about online inspiration, some of the coordination seems to have been face-to-face. Symantec describes a cryptojacking campaign, Beapy, that propagates using EternalBlue. An Oracle web server zero-day is reported. Recorded Future describes the commodified black market for credential-stuffing. And there’s a cabinet dust-up in the UK over a leak about the government’s plans for Huawei. Johannes Ullrich from SANS and the ISC Stormcast podcast on the increase in DHCP client vulnerabilities he’s been tracking. Guest is Anura Fernando from UL on the technological and regulatory challenges of medical devices and wearables.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_26.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 26 Apr 2019 19:43:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>831</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7cd23472-def8-11ea-911f-6b24a1a14355/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Sri Lanka bombing investigation updates. Cryptojacking targets enterprises in East Asia. Oracle web server zero-day. The criminal-to-criminal credential-stuffing market. Who talked about Huawei in UK?</itunes:subtitle>
      <itunes:summary>Investigation of the Easter massacres in Sri Lanka continues. For all the concern about online inspiration, some of the coordination seems to have been face-to-face. Symantec describes a cryptojacking campaign, Beapy, that propagates using EternalBlue. An Oracle web server zero-day is reported. Recorded Future describes the commodified black market for credential-stuffing. And there’s a cabinet dust-up in the UK over a leak about the government’s plans for Huawei. Johannes Ullrich from SANS and the ISC Stormcast podcast on the increase in DHCP client vulnerabilities he’s been tracking. Guest is Anura Fernando from UL on the technological and regulatory challenges of medical devices and wearables.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_26.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Investigation of the Easter massacres in Sri Lanka continues. For all the concern about online inspiration, some of the coordination seems to have been face-to-face. Symantec describes a cryptojacking campaign, Beapy, that propagates using EternalBlue. An Oracle web server zero-day is reported. Recorded Future describes the commodified black market for credential-stuffing. And there’s a cabinet dust-up in the UK over a leak about the government’s plans for Huawei. Johannes Ullrich from SANS and the ISC Stormcast podcast on the increase in DHCP client vulnerabilities he’s been tracking. Guest is Anura Fernando from UL on the technological and regulatory challenges of medical devices and wearables.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_26.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1605</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9cbe3d3c10034bacbc29cb43849d2378]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1799478604.mp3?updated=1608756096" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pledging allegiance to ISIS, and then going forth to kill. Adware in Google Play. Context-aware phishbait. Facebook and the FTC. Server crash or exit scam? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/830/notes</link>
      <description>Sri Lanka’s investigation of the Easter massacres continues, with some ISIS video surfacing. Apps with aggressive adware found in Google Play. Context-aware phishbait may be bringing the Qbot banking Trojan to an email thread near you. Facebook seems to think the FTC is about to hit it hard, and sets aside a rainy day fund. And the Wall Street Market, a contraband souk on the dark web, may be engaged in an exit scam.  Ben Yelin from UMD CHHS on the NSA recommending dropping the phone surveillance program. Guest is Jason Mical from Devo on the increasing importance of threat hunting.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_25.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 25 Apr 2019 19:20:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>830</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7cf12f58-def8-11ea-911f-bbcbdcdddde2/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Pledging allegiance to ISIS, and then going forth to kill. Adware in Google Play. Context-aware phishbait. Facebook and the FTC. Server crash or exit scam? </itunes:subtitle>
      <itunes:summary>Sri Lanka’s investigation of the Easter massacres continues, with some ISIS video surfacing. Apps with aggressive adware found in Google Play. Context-aware phishbait may be bringing the Qbot banking Trojan to an email thread near you. Facebook seems to think the FTC is about to hit it hard, and sets aside a rainy day fund. And the Wall Street Market, a contraband souk on the dark web, may be engaged in an exit scam.  Ben Yelin from UMD CHHS on the NSA recommending dropping the phone surveillance program. Guest is Jason Mical from Devo on the increasing importance of threat hunting.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_25.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sri Lanka’s investigation of the Easter massacres continues, with some ISIS video surfacing. Apps with aggressive adware found in Google Play. Context-aware phishbait may be bringing the Qbot banking Trojan to an email thread near you. Facebook seems to think the FTC is about to hit it hard, and sets aside a rainy day fund. And the Wall Street Market, a contraband souk on the dark web, may be engaged in an exit scam.  Ben Yelin from UMD CHHS on the NSA recommending dropping the phone surveillance program. Guest is Jason Mical from Devo on the increasing importance of threat hunting.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_25.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1333</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bfc35ab775ab4e0398fa6bdb5b9c5761]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4990314537.mp3?updated=1690144484" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sri Lanka bombing investigation update. Christchurch call. ShadowHammer moves upstream. Carbanak in VirusTotal after all. Spoofing banks. Bots vs. Mueller Report. ASD’s best practices.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/829/notes</link>
      <description>Sri Lanka investigates a homegrown jihadist group with possible international connections for the Easter massacres. New Zealand is preparing the Christchurch Call to exclude violent terrorist content from the Internet. ShadowHammer moves its supply chain attacks upstream. Carbanak source code seems to have been in VirusTotal for two years. Someone’s spoofing financial institutions. Bots surged upon the release of the Mueller report. ASD offers a counsel of perfection. Prof. Awais Rashid from University of Bristol on evidence based risk assessment. Guest is Michael P. Morris from Topcoder on the challenges of creating secure apps in the gig economy.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_24.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 24 Apr 2019 20:22:08 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>829</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7d067fa2-def8-11ea-911f-43c8c0d2abd9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Sri Lanka bombing investigation update. Christchurch call. ShadowHammer moves upstream. Carbanak in VirusTotal after all. Spoofing banks. Bots vs. Mueller Report. ASD’s best practices.</itunes:subtitle>
      <itunes:summary>Sri Lanka investigates a homegrown jihadist group with possible international connections for the Easter massacres. New Zealand is preparing the Christchurch Call to exclude violent terrorist content from the Internet. ShadowHammer moves its supply chain attacks upstream. Carbanak source code seems to have been in VirusTotal for two years. Someone’s spoofing financial institutions. Bots surged upon the release of the Mueller report. ASD offers a counsel of perfection. Prof. Awais Rashid from University of Bristol on evidence based risk assessment. Guest is Michael P. Morris from Topcoder on the challenges of creating secure apps in the gig economy.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_24.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sri Lanka investigates a homegrown jihadist group with possible international connections for the Easter massacres. New Zealand is preparing the Christchurch Call to exclude violent terrorist content from the Internet. ShadowHammer moves its supply chain attacks upstream. Carbanak source code seems to have been in VirusTotal for two years. Someone’s spoofing financial institutions. Bots surged upon the release of the Mueller report. ASD offers a counsel of perfection. Prof. Awais Rashid from University of Bristol on evidence based risk assessment. Guest is Michael P. Morris from Topcoder on the challenges of creating secure apps in the gig economy.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_24.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1373</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[03f495c2d5c7414abcd0864fd1ab40f8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1559936339.mp3?updated=1690144418" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ISIS claims responsibility for Sri Lanka massacre. Spearphishing embassies in Europe. How the Blockchain Bandit probably did it. Mexican embassy doxed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/828/notes</link>
      <description>ISIS claims responsibility for the Sri Lankan bombings. The government maintains its declared state of emergency, and has arrested at least forty in the course of its investigation. Check Point describes a spearphishing campaign against embassies in Europe. It’s thought to be the work of the Russian mob. Weak keys let the “Blockchain Bandit” rifle alt-coin wallets. And a disgruntled bug hunter doxes one of Mexico’s embassies. Justin Harvey from Accenture on preserving digital evidence in the aftermath of a cyber attack. Guest is Maryam Rahmani on the upcoming NYIT Girls in Engineering and Technology Day.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_23.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Apr 2019 19:46:45 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>828</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7d1f615c-def8-11ea-911f-8f999643c25b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>ISIS claims responsibility for Sri Lanka massacre. Spearphishing embassies in Europe. How the Blockchain Bandit probably did it. Mexican embassy doxed.</itunes:subtitle>
      <itunes:summary>ISIS claims responsibility for the Sri Lankan bombings. The government maintains its declared state of emergency, and has arrested at least forty in the course of its investigation. Check Point describes a spearphishing campaign against embassies in Europe. It’s thought to be the work of the Russian mob. Weak keys let the “Blockchain Bandit” rifle alt-coin wallets. And a disgruntled bug hunter doxes one of Mexico’s embassies. Justin Harvey from Accenture on preserving digital evidence in the aftermath of a cyber attack. Guest is Maryam Rahmani on the upcoming NYIT Girls in Engineering and Technology Day.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_23.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>ISIS claims responsibility for the Sri Lankan bombings. The government maintains its declared state of emergency, and has arrested at least forty in the course of its investigation. Check Point describes a spearphishing campaign against embassies in Europe. It’s thought to be the work of the Russian mob. Weak keys let the “Blockchain Bandit” rifle alt-coin wallets. And a disgruntled bug hunter doxes one of Mexico’s embassies. Justin Harvey from Accenture on preserving digital evidence in the aftermath of a cyber attack. Guest is Maryam Rahmani on the upcoming NYIT Girls in Engineering and Technology Day.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_23.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1320</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[33d78d2907fd45b28df68f99d21ea77a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3681182542.mp3?updated=1690144340" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sri Lanka’s social media clamp-down, and investigation of Easter massacres. CIA said to have details on Huawei’s relationship with China’s security services. Marcus Hutchins pleads guilty. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/827/notes</link>
      <description>Sri Lanka clamps down on social media in the wake of Easter massacres. Authorities suspect an Islamist group, but no terrorist organization has so far claimed responsibility. CIA intelligence is said to have the goods on Chinese security services’ hold over Huawei. Marcus Hutchins, also known as MalwareTech, and famous as the sometime hero of the WannaCry kill-switch, has taken a guilty plea to charges connected with the distribution of Kronos banking malware. Joe Carrigan from JHU ISI on password research from WP Engine.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_22.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 22 Apr 2019 19:23:47 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>827</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7d449a58-def8-11ea-911f-9f456a4b0a43/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Sri Lanka’s social media clamp-down, and investigation of Easter massacres. CIA said to have details on Huawei’s relationship with China’s security services. Marcus Hutchins pleads guilty. </itunes:subtitle>
      <itunes:summary>Sri Lanka clamps down on social media in the wake of Easter massacres. Authorities suspect an Islamist group, but no terrorist organization has so far claimed responsibility. CIA intelligence is said to have the goods on Chinese security services’ hold over Huawei. Marcus Hutchins, also known as MalwareTech, and famous as the sometime hero of the WannaCry kill-switch, has taken a guilty plea to charges connected with the distribution of Kronos banking malware. Joe Carrigan from JHU ISI on password research from WP Engine.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_22.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sri Lanka clamps down on social media in the wake of Easter massacres. Authorities suspect an Islamist group, but no terrorist organization has so far claimed responsibility. CIA intelligence is said to have the goods on Chinese security services’ hold over Huawei. Marcus Hutchins, also known as MalwareTech, and famous as the sometime hero of the WannaCry kill-switch, has taken a guilty plea to charges connected with the distribution of Kronos banking malware. Joe Carrigan from JHU ISI on password research from WP Engine.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_22.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1056</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01298e506fd948df979b84bca7c1c13a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8413925998.mp3?updated=1690144302" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Undetectable vote manipulation in SwissPost e-voting system. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/82/notes</link>
      <description>Researchers have discovered a number of vulnerabilities in the SwissPost e-vote system which could allow undetectable manipulation of votes. 
Dr Vanessa Teague is Associate Professor and Chair, Cybersecurity and Democracy Network at the Melbourne School of Engineering, University of Melbourne, Australia. She joins us to explain her team's findings.
The original research is here:
https://people.eng.unimelb.edu.au/vjteague/SwissVote
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Apr 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>82</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bc67e90c-df10-11ea-98a8-67de094008f2/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Undetectable vote manipulation in SwissPost e-voting system. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers have discovered a number of vulnerabilities in the SwissPost e-vote system which could allow undetectable manipulation of votes. 
Dr Vanessa Teague is Associate Professor and Chair, Cybersecurity and Democracy Network at the Melbourne School of Engineering, University of Melbourne, Australia. She joins us to explain her team's findings.
The original research is here:
https://people.eng.unimelb.edu.au/vjteague/SwissVote
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers have discovered a number of vulnerabilities in the SwissPost e-vote system which could allow undetectable manipulation of votes. </p><p>Dr Vanessa Teague is Associate Professor and Chair, Cybersecurity and Democracy Network at the Melbourne School of Engineering, University of Melbourne, Australia. She joins us to explain her team's findings.</p><p>The original research is here:</p><p><a href="https://people.eng.unimelb.edu.au/vjteague/SwissVote">https://people.eng.unimelb.edu.au/vjteague/SwissVote</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1701</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f1d4e91f3ced456c9d5073cf2ed290cb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8556416815.mp3?updated=1685028939" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Observations on the Mueller Report. Doxing Iranian intelligence. Insecure messaging. Old Excel macros. Wipro hack and gift cards. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/826/notes</link>
      <description>Some observations on the Mueller Report, in particular its insight into what two specific GRU units were up to. (And some naming of DCLeaks and Guccifer 2.0 as GRU fronts.) Someone is doxing Iran’s OilRig cyberespionage group. A French government messaging app appears less secure than intended. Old Excel macros can still be exploited. And what were the Wipro hackers after? Gift cards, apparently. Malek Ben Salem from Accenture Labs on the Cisco Talos report on malware markets in Facebook groups. Guest is Barbara Lawler from Looker Data Sciences on GDPR, CCPA and the coming wave of privacy legislation.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_19.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 19 Apr 2019 18:56:50 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>826</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7d610990-def8-11ea-911f-c3888c67323a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Observations on the Mueller Report. Doxing Iranian intelligence. Insecure messaging. Old Excel macros. Wipro hack and gift cards. </itunes:subtitle>
      <itunes:summary>Some observations on the Mueller Report, in particular its insight into what two specific GRU units were up to. (And some naming of DCLeaks and Guccifer 2.0 as GRU fronts.) Someone is doxing Iran’s OilRig cyberespionage group. A French government messaging app appears less secure than intended. Old Excel macros can still be exploited. And what were the Wipro hackers after? Gift cards, apparently. Malek Ben Salem from Accenture Labs on the Cisco Talos report on malware markets in Facebook groups. Guest is Barbara Lawler from Looker Data Sciences on GDPR, CCPA and the coming wave of privacy legislation.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_19.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Some observations on the Mueller Report, in particular its insight into what two specific GRU units were up to. (And some naming of DCLeaks and Guccifer 2.0 as GRU fronts.) Someone is doxing Iran’s OilRig cyberespionage group. A French government messaging app appears less secure than intended. Old Excel macros can still be exploited. And what were the Wipro hackers after? Gift cards, apparently. Malek Ben Salem from Accenture Labs on the Cisco Talos report on malware markets in Facebook groups. Guest is Barbara Lawler from Looker Data Sciences on GDPR, CCPA and the coming wave of privacy legislation.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_19.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1585</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[20712e66ec9049f08bd147782af8c812]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1402459800.mp3?updated=1608756121" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mueller Report is out. Sea Turtle DNS-manipulation campaign. Over-privileged and under-honest apps kicked out of Google Play. Facebook has another privacy incident. Fraud and destruction.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/825/notes</link>
      <description>The US Justice Department releases the redacted Mueller Report: investigators found no evidence sufficient to establish conspiracy or coordination between any US persons and the Russians over the 2016 campaign, but the Bears were busy. The Sea Turtle campaign sets a worrisome example of DNS manipulation. Sneaky apps booted from Google Play. Facebook apologizes again. Notre Dame fire fraud. Replication in cyber research. And an act of gratuitous computer destruction. Robert M. Lee from Dragos with a look back at the evolution of ICS technology. Guest is Nathan Katzenstein. He’s got 20 years in IT, and offers his perspective on the job market as he finishes up his masters in cyber security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_18.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 18 Apr 2019 19:29:16 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>825</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7d7503aa-def8-11ea-911f-57df0fcac7e6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Mueller Report is out. Sea Turtle DNS-manipulation campaign. Over-privileged and under-honest apps kicked out of Google Play. Facebook has another privacy incident. Fraud and destruction.</itunes:subtitle>
      <itunes:summary>The US Justice Department releases the redacted Mueller Report: investigators found no evidence sufficient to establish conspiracy or coordination between any US persons and the Russians over the 2016 campaign, but the Bears were busy. The Sea Turtle campaign sets a worrisome example of DNS manipulation. Sneaky apps booted from Google Play. Facebook apologizes again. Notre Dame fire fraud. Replication in cyber research. And an act of gratuitous computer destruction. Robert M. Lee from Dragos with a look back at the evolution of ICS technology. Guest is Nathan Katzenstein. He’s got 20 years in IT, and offers his perspective on the job market as he finishes up his masters in cyber security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_18.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US Justice Department releases the redacted Mueller Report: investigators found no evidence sufficient to establish conspiracy or coordination between any US persons and the Russians over the 2016 campaign, but the Bears were busy. The Sea Turtle campaign sets a worrisome example of DNS manipulation. Sneaky apps booted from Google Play. Facebook apologizes again. Notre Dame fire fraud. Replication in cyber research. And an act of gratuitous computer destruction. Robert M. Lee from Dragos with a look back at the evolution of ICS technology. Guest is Nathan Katzenstein. He’s got 20 years in IT, and offers his perspective on the job market as he finishes up his masters in cyber security.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_18.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1364</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b56d3ea7660546b79672e4d2607cd24d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8793683637.mp3?updated=1690142430" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Spearphishing from “Luhansk.” Pro-Assange hacktivism. Another undercover private eye? Pirated Game of Thrones episodes carry malware. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/824/notes</link>
      <description>Spearphishing campaign against Ukraine traced to the so-called “Luhansk People’s Republic.” Anonymice threaten to rain chaos on Yorkshire if Julian Assange isn’t freed--actually, more chaos since the initial chaos was perhaps too easily overlooked. An implausible venture capitalist is asking people if they’re being paid to bad-mouth a security firm. Pirated Game of Thrones episodes carry malware. David Dufour from Webroot with survey results on AI and ML. Guest is Derek Vadala from Moody’s Investor Service on Moody’s framework for assessing cyber risk.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_17.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 17 Apr 2019 19:41:02 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>824</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7d8dc8f4-def8-11ea-911f-aff6b86c8b51/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Spearphishing from “Luhansk.” Pro-Assange hacktivism. Another undercover private eye? Pirated Game of Thrones episodes carry malware. </itunes:subtitle>
      <itunes:summary>Spearphishing campaign against Ukraine traced to the so-called “Luhansk People’s Republic.” Anonymice threaten to rain chaos on Yorkshire if Julian Assange isn’t freed--actually, more chaos since the initial chaos was perhaps too easily overlooked. An implausible venture capitalist is asking people if they’re being paid to bad-mouth a security firm. Pirated Game of Thrones episodes carry malware. David Dufour from Webroot with survey results on AI and ML. Guest is Derek Vadala from Moody’s Investor Service on Moody’s framework for assessing cyber risk.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_17.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Spearphishing campaign against Ukraine traced to the so-called “Luhansk People’s Republic.” Anonymice threaten to rain chaos on Yorkshire if Julian Assange isn’t freed--actually, more chaos since the initial chaos was perhaps too easily overlooked. An implausible venture capitalist is asking people if they’re being paid to bad-mouth a security firm. Pirated Game of Thrones episodes carry malware. David Dufour from Webroot with survey results on AI and ML. Guest is Derek Vadala from Moody’s Investor Service on Moody’s framework for assessing cyber risk.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_17.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1309</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c6f7f694b9f64b1db3ad05c9fced2c7f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7251485042.mp3?updated=1690142282" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fraud will follow fire, alas. Wipro compromise. DDoS in Ecuador. Brazil’s hacker underground. Selling a keylogger. Facebook and data. EU copyright law. Huawei’s prospects. Fact-checkin’, fer real.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/823/notes</link>
      <description>Condolences to the city of Paris and the people of France. And, alas, expect fraud to follow fire. A compromise may have turned a company’s networks against its customers. Denial-of-service in Ecuador. A look at Brazil’s cyber criminals. Selling a keylogger, complete with terms of service. Facebook’s attitude toward data. The EU finalizes its controversial copyright law. Huawei’s prospects. And what did the algorithm know, and when did the algorithm know it? Emily Wilson from Terbium Labs with their Fraud Guides 101 report. Guest is Ed Bellis from Kenna Security on their latest research report focused on vulnerability remediation.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_16.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Apr 2019 20:01:08 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>823</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7da712dc-def8-11ea-911f-d3ac8fd754e6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fraud will follow fire, alas. Wipro compromise. DDoS in Ecuador. Brazil’s hacker underground. Selling a keylogger. Facebook and data. EU copyright law. Huawei’s prospects. Fact-checkin’, fer real.</itunes:subtitle>
      <itunes:summary>Condolences to the city of Paris and the people of France. And, alas, expect fraud to follow fire. A compromise may have turned a company’s networks against its customers. Denial-of-service in Ecuador. A look at Brazil’s cyber criminals. Selling a keylogger, complete with terms of service. Facebook’s attitude toward data. The EU finalizes its controversial copyright law. Huawei’s prospects. And what did the algorithm know, and when did the algorithm know it? Emily Wilson from Terbium Labs with their Fraud Guides 101 report. Guest is Ed Bellis from Kenna Security on their latest research report focused on vulnerability remediation.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_16.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Condolences to the city of Paris and the people of France. And, alas, expect fraud to follow fire. A compromise may have turned a company’s networks against its customers. Denial-of-service in Ecuador. A look at Brazil’s cyber criminals. Selling a keylogger, complete with terms of service. Facebook’s attitude toward data. The EU finalizes its controversial copyright law. Huawei’s prospects. And what did the algorithm know, and when did the algorithm know it? Emily Wilson from Terbium Labs with their Fraud Guides 101 report. Guest is Ed Bellis from Kenna Security on their latest research report focused on vulnerability remediation.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_16.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1295</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6376b0b04ae649ac899a53d04bd72aba]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7331118275.mp3?updated=1690142259" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ISIS inspiration in exile. Facebook’s Sunday outage. A Microsoft IE bug, and a web-mail breach. Issues with VPNs. Last minute tax scams. Oculus Easter eggs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/822/notes</link>
      <description>An ISIS hard drive suggests the Caliphate’s plans for inspiration as it enters exile. Facebook’s Sunday outage remains unexplained. Microsoft deals with a breach in its consumer web mail products. A researcher drops an Internet Explorer zero-day that may affect you even if you don’t use IE. CISA warns of bugs in widely used VPNs. Last minute Tax Day online scams. Security pros advocate poor restroom hygiene. Easter eggs in Oculus. Joe Carrigan from JHU ISI on research from Tenable on Verizon FIOS router vulnerabilities.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_15.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 15 Apr 2019 19:14:13 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>822</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7dc6e1ca-def8-11ea-911f-975a1750d560/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>ISIS inspiration in exile. Facebook’s Sunday outage. A Microsoft IE bug, and a web-mail breach. Issues with VPNs. Last minute tax scams. Oculus Easter eggs.</itunes:subtitle>
      <itunes:summary>An ISIS hard drive suggests the Caliphate’s plans for inspiration as it enters exile. Facebook’s Sunday outage remains unexplained. Microsoft deals with a breach in its consumer web mail products. A researcher drops an Internet Explorer zero-day that may affect you even if you don’t use IE. CISA warns of bugs in widely used VPNs. Last minute Tax Day online scams. Security pros advocate poor restroom hygiene. Easter eggs in Oculus. Joe Carrigan from JHU ISI on research from Tenable on Verizon FIOS router vulnerabilities.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_15.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>An ISIS hard drive suggests the Caliphate’s plans for inspiration as it enters exile. Facebook’s Sunday outage remains unexplained. Microsoft deals with a breach in its consumer web mail products. A researcher drops an Internet Explorer zero-day that may affect you even if you don’t use IE. CISA warns of bugs in widely used VPNs. Last minute Tax Day online scams. Security pros advocate poor restroom hygiene. Easter eggs in Oculus. Joe Carrigan from JHU ISI on research from Tenable on Verizon FIOS router vulnerabilities.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_15.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1015</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[700963045457468a8063ae439ab8bfcc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7764190347.mp3?updated=1690142205" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The ghost and the mole; Eric O'Neill's Gray Day. [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/27/notes</link>
      <description>Eric O’Neill is a former FBI counterintelligence and counterterrorism operative, and founder of the Georgetown Group, a security and investigative firm, as well as national security strategist for Carbon Black. In his book Gray Day, My Undercover Mission to Expose America’s First Cyber Spy, Eric O’Neil shares the fascinating and sometimes harrowing tale of his experience being assigned to help expose Robert Hanssen, the FBI’s most notorious mole. In 2001 Hanssen pleaded guilty to multiple charges of espionage for sharing classified information with the Soviet Union and Russia over the course of over two decades.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sun, 14 Apr 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>27</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c810836a-df04-11ea-8146-afd27b5eb7d3/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The ghost and the mole; Eric O'Neill's Gray Day. [Special Editions]</itunes:subtitle>
      <itunes:summary>Eric O’Neill is a former FBI counterintelligence and counterterrorism operative, and founder of the Georgetown Group, a security and investigative firm, as well as national security strategist for Carbon Black. In his book Gray Day, My Undercover Mission to Expose America’s First Cyber Spy, Eric O’Neil shares the fascinating and sometimes harrowing tale of his experience being assigned to help expose Robert Hanssen, the FBI’s most notorious mole. In 2001 Hanssen pleaded guilty to multiple charges of espionage for sharing classified information with the Soviet Union and Russia over the course of over two decades.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Eric O’Neill is a former FBI counterintelligence and counterterrorism operative, and founder of the Georgetown Group, a security and investigative firm, as well as national security strategist for Carbon Black. In his book Gray Day, My Undercover Mission to Expose America’s First Cyber Spy, Eric O’Neil shares the fascinating and sometimes harrowing tale of his experience being assigned to help expose Robert Hanssen, the FBI’s most notorious mole. In 2001 Hanssen pleaded guilty to multiple charges of espionage for sharing classified information with the Soviet Union and Russia over the course of over two decades.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2347</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9f07d87801094a8a8baafed242570d8c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3463289611.mp3?updated=1656711825" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Establishing software root of trust unconditionally. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/81/notes</link>
      <description>Researchers at Carnegie Mellon University's CyLab Security and Privacy Institute claim to have made an important breakthrough in establishing root of trust (RoT) to detect malware in computing devices. Virgil Gligor is one of the authors of the research, and he joins us to share their findings.
Link to original research - 
 https://www.ndss-symposium.org/ndss-paper/establishing-software-root-of-trust-unconditionally/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Apr 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>81</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b6ea549c-df10-11ea-ac0c-0bd7bb93698b/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Establishing software root of trust unconditionally. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at Carnegie Mellon University's CyLab Security and Privacy Institute claim to have made an important breakthrough in establishing root of trust (RoT) to detect malware in computing devices. Virgil Gligor is one of the authors of the research, and he joins us to share their findings.
Link to original research - 
 https://www.ndss-symposium.org/ndss-paper/establishing-software-root-of-trust-unconditionally/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Carnegie Mellon University's CyLab Security and Privacy Institute claim to have made an important breakthrough in establishing root of trust (RoT) to detect malware in computing devices. Virgil Gligor is one of the authors of the research, and he joins us to share their findings.</p><p>Link to original research - </p><p><a href="https://www.ndss-symposium.org/ndss-paper/establishing-software-root-of-trust-unconditionally/"> https://www.ndss-symposium.org/ndss-paper/establishing-software-root-of-trust-unconditionally/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1494</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d6027be292304da2b4d0ceece77425de]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5981005679.mp3?updated=1685028924" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mr. Assange’s courthouse future(s). Dragonblood Wi-Fi vulnerabilities. Tax fraud and identity theft dark web souks. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/821/notes</link>
      <description>Julian Assange remains in British custody. Hearings on the US extradition warrant are expected to begin next month. The US indictment revives discussion of the Computer Fraud and Abuse Act under which Mr. Assange was charged. Some notes on why Ecuador decided to revoke the WikiLeaks leader’s asylum. Notes on Dragonblood. And we’re at the end of tax season, but the dark web souks are still hawking 1040s and W-2s. Ben Yelin from UMD CHHS on pending state legislation restricting law enforcement use of DNA data. Guest is Eric O’Neill, former FBI operative and author of Gray Day, My Undercover Mission to Expose America’s First Cyber Spy. This is a preview of the full interview that will run on Sunday.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_12.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 12 Apr 2019 19:34:59 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>821</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7dd4df6e-def8-11ea-911f-a3534830f007/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Mr. Assange’s courthouse future(s). Dragonblood Wi-Fi vulnerabilities. Tax fraud and identity theft dark web souks. </itunes:subtitle>
      <itunes:summary>Julian Assange remains in British custody. Hearings on the US extradition warrant are expected to begin next month. The US indictment revives discussion of the Computer Fraud and Abuse Act under which Mr. Assange was charged. Some notes on why Ecuador decided to revoke the WikiLeaks leader’s asylum. Notes on Dragonblood. And we’re at the end of tax season, but the dark web souks are still hawking 1040s and W-2s. Ben Yelin from UMD CHHS on pending state legislation restricting law enforcement use of DNA data. Guest is Eric O’Neill, former FBI operative and author of Gray Day, My Undercover Mission to Expose America’s First Cyber Spy. This is a preview of the full interview that will run on Sunday.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_12.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Julian Assange remains in British custody. Hearings on the US extradition warrant are expected to begin next month. The US indictment revives discussion of the Computer Fraud and Abuse Act under which Mr. Assange was charged. Some notes on why Ecuador decided to revoke the WikiLeaks leader’s asylum. Notes on Dragonblood. And we’re at the end of tax season, but the dark web souks are still hawking 1040s and W-2s. Ben Yelin from UMD CHHS on pending state legislation restricting law enforcement use of DNA data. Guest is Eric O’Neill, former FBI operative and author of Gray Day, My Undercover Mission to Expose America’s First Cyber Spy. This is a preview of the full interview that will run on Sunday.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_12.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1561</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ad3343feec1040fd85484612fc0c7518]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5159052701.mp3?updated=1690142085" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Julian Assange is out of the embassy and in custody. Pyongyang’s HOPLIGHT. Operations SneakyPastes. Incident response planning blues. High school jam. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/820/notes</link>
      <description>Julian Assange is out of the Ecuadoran embassy and in British custody. He’s been found guilty of bail jumping, and will face extradition to the US on charges related to conspiracy to release classified material. Hidden Cobra is back with a new Trojan: “HOPLIGHT.” Kaspersky describes Operation SneakyPastes. IBM Security finds organizations don’t exercise incident response plans. Two New Jersey high school boys are in trouble for jamming Secaucus High’s wi-fi.  Jonathan Katz from UMD with his response to a skeptical critique of quantum computing. Guest is Maurice Singleton from Vidsys on the convergence of IoT security devices and IT security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_11.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 11 Apr 2019 18:55:31 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>820</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7ded702e-def8-11ea-911f-072d54b90666/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Julian Assange is out of the embassy and in custody. Pyongyang’s HOPLIGHT. Operations SneakyPastes. Incident response planning blues. High school jam. </itunes:subtitle>
      <itunes:summary>Julian Assange is out of the Ecuadoran embassy and in British custody. He’s been found guilty of bail jumping, and will face extradition to the US on charges related to conspiracy to release classified material. Hidden Cobra is back with a new Trojan: “HOPLIGHT.” Kaspersky describes Operation SneakyPastes. IBM Security finds organizations don’t exercise incident response plans. Two New Jersey high school boys are in trouble for jamming Secaucus High’s wi-fi.  Jonathan Katz from UMD with his response to a skeptical critique of quantum computing. Guest is Maurice Singleton from Vidsys on the convergence of IoT security devices and IT security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_11.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Julian Assange is out of the Ecuadoran embassy and in British custody. He’s been found guilty of bail jumping, and will face extradition to the US on charges related to conspiracy to release classified material. Hidden Cobra is back with a new Trojan: “HOPLIGHT.” Kaspersky describes Operation SneakyPastes. IBM Security finds organizations don’t exercise incident response plans. Two New Jersey high school boys are in trouble for jamming Secaucus High’s wi-fi.  Jonathan Katz from UMD with his response to a skeptical critique of quantum computing. Guest is Maurice Singleton from Vidsys on the convergence of IoT security devices and IT security.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_11.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1323</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8ddb429729ef45b882fbd41b78fd86e6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4138521264.mp3?updated=1690141963" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Triton actor seems to be back. Project TajMahal is after diplomatic secrets. California’s motor-voter program and a DMV hack.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/819/notes</link>
      <description>FireEye says that the Triton actor is back. There’s some ICS malware staged in an unnamed “critical infrastructure” facility, and it looks as if the people who went after a petrochemical plant in 2017 are back for battlespace preparation. Kaspersky describes Project TajMahal, a cyberespionage effort against a Central Asian embassy. And California’s motor-voter program hits a hacker-induced bump in the road. Johannes Ullrich from SANS and the ISC Stormcast podcast on protecting yourself from hidden cameras when vacationing. Guest is Dr. Ratinder Ahuja from ShieldX on Elastic Microsegmentation.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_10.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 10 Apr 2019 19:13:17 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>819</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7e075624-def8-11ea-911f-efb7904c2166/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The Triton actor seems to be back. Project TajMahal is after diplomatic secrets. California’s motor-voter program and a DMV hack.</itunes:subtitle>
      <itunes:summary>FireEye says that the Triton actor is back. There’s some ICS malware staged in an unnamed “critical infrastructure” facility, and it looks as if the people who went after a petrochemical plant in 2017 are back for battlespace preparation. Kaspersky describes Project TajMahal, a cyberespionage effort against a Central Asian embassy. And California’s motor-voter program hits a hacker-induced bump in the road. Johannes Ullrich from SANS and the ISC Stormcast podcast on protecting yourself from hidden cameras when vacationing. Guest is Dr. Ratinder Ahuja from ShieldX on Elastic Microsegmentation.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_10.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>FireEye says that the Triton actor is back. There’s some ICS malware staged in an unnamed “critical infrastructure” facility, and it looks as if the people who went after a petrochemical plant in 2017 are back for battlespace preparation. Kaspersky describes Project TajMahal, a cyberespionage effort against a Central Asian embassy. And California’s motor-voter program hits a hacker-induced bump in the road. Johannes Ullrich from SANS and the ISC Stormcast podcast on protecting yourself from hidden cameras when vacationing. Guest is Dr. Ratinder Ahuja from ShieldX on Elastic Microsegmentation.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_10.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1165</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9086a3fe8d054bf981506b6e10897bf6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8155666994.mp3?updated=1690141727" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>GossipGirl, the supra threat actor. LockerGoga’s destructive functionality. More hacking allegations out of Caracas. Revolutionary Guard now a designated terrorist group. Creepy crime. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/818/notes</link>
      <description>In today’s podcast, we hear about GossipGirl, potentially a “supra threat actor” Chronicle sees linking Stuxnet, Flame, and Duqu. LockerGoga’s destructive functionality may be a feature, not a bug. Venezuela now says its power grid is being hacked by Chile and Colombia. The US designates Iran’s Revolutionary Guard a terrorist organization. What’s up with New Zealand and hidden, networked cameras? And second thoughts about what counts as a “preliminary forensic investigation.” Joe Carrigan from JHU ISI on minding permissions on mobile devices. Guest is Mike O’Malley from Radware on the true costs of cyber attacks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_09.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Apr 2019 19:43:19 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>818</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7e1d4308-def8-11ea-911f-4f82dfbfd738/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>GossipGirl, the supra threat actor. LockerGoga’s destructive functionality. More hacking allegations out of Caracas. Revolutionary Guard now a designated terrorist group. Creepy crime. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear about GossipGirl, potentially a “supra threat actor” Chronicle sees linking Stuxnet, Flame, and Duqu. LockerGoga’s destructive functionality may be a feature, not a bug. Venezuela now says its power grid is being hacked by Chile and Colombia. The US designates Iran’s Revolutionary Guard a terrorist organization. What’s up with New Zealand and hidden, networked cameras? And second thoughts about what counts as a “preliminary forensic investigation.” Joe Carrigan from JHU ISI on minding permissions on mobile devices. Guest is Mike O’Malley from Radware on the true costs of cyber attacks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_09.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear about GossipGirl, potentially a “supra threat actor” Chronicle sees linking Stuxnet, Flame, and Duqu. LockerGoga’s destructive functionality may be a feature, not a bug. Venezuela now says its power grid is being hacked by Chile and Colombia. The US designates Iran’s Revolutionary Guard a terrorist organization. What’s up with New Zealand and hidden, networked cameras? And second thoughts about what counts as a “preliminary forensic investigation.” Joe Carrigan from JHU ISI on minding permissions on mobile devices. Guest is Mike O’Malley from Radware on the true costs of cyber attacks.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_09.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1362</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a24180dc98984ea4877366ac5c9a3485]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8870459599.mp3?updated=1690141687" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US DHS Secretary Nielsen resigns. Credential stuffing campaigns. Cryptojacking disrupts a business. A duty of care, online. Tax season scams. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/817/notes</link>
      <description>In today’s podcast, we hear about leadership changes at the US Department of Homeland Security. A look at credential stuffing. Cryptojacking disrupts production at an optical equipment manufacturer. The British Government moves toward establishing a duty of care that would impose new legal responsibilities on search engines, social media, and others. Tax season scams grow more plausible, and some of them are aimed at rounding up money mules.  Rick Howard from Palo Alto networks reflects on the accomplishments of the Cyber Threat Alliance.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_08.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 08 Apr 2019 19:57:56 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>817</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7e31aeba-def8-11ea-911f-8776cccd08b6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>US DHS Secretary Nielsen resigns. Credential stuffing campaigns. Cryptojacking disrupts a business. A duty of care, online. Tax season scams. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear about leadership changes at the US Department of Homeland Security. A look at credential stuffing. Cryptojacking disrupts production at an optical equipment manufacturer. The British Government moves toward establishing a duty of care that would impose new legal responsibilities on search engines, social media, and others. Tax season scams grow more plausible, and some of them are aimed at rounding up money mules.  Rick Howard from Palo Alto networks reflects on the accomplishments of the Cyber Threat Alliance.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_08.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear about leadership changes at the US Department of Homeland Security. A look at credential stuffing. Cryptojacking disrupts production at an optical equipment manufacturer. The British Government moves toward establishing a duty of care that would impose new legal responsibilities on search engines, social media, and others. Tax season scams grow more plausible, and some of them are aimed at rounding up money mules.  Rick Howard from Palo Alto networks reflects on the accomplishments of the Cyber Threat Alliance.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_08.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1006</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[24e6747c4d984e7ea83acdd02b797644]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8464330632.mp3?updated=1690141652" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lessons learned from Ukraine elections. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/80/notes</link>
      <description>Joep Gommers from EclecticIQ joins us to share their research tracking the information operations and and security methods they've been tracking that Russians have been using in advance of the recently held elections in Ukraine.
The research can be found here:
 https://www.eclecticiq.com/resources/fusion-center-report-situational-awareness-ukraine-elections
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Apr 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>80</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/1c224258-df10-11ea-b61d-cbc590ae3505/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Lessons learned from Ukraine elections. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Joep Gommers from EclecticIQ joins us to share their research tracking the information operations and and security methods they've been tracking that Russians have been using in advance of the recently held elections in Ukraine.
The research can be found here:
 https://www.eclecticiq.com/resources/fusion-center-report-situational-awareness-ukraine-elections
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joep Gommers from EclecticIQ joins us to share their research tracking the information operations and and security methods they've been tracking that Russians have been using in advance of the recently held elections in Ukraine.</p><p>The research can be found here:</p><p><a href="https://www.eclecticiq.com/resources/fusion-center-report-situational-awareness-ukraine-elections"> https://www.eclecticiq.com/resources/fusion-center-report-situational-awareness-ukraine-elections</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1539</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[02702238dc4b420a8edcb0c35227ae46]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6957347089.mp3?updated=1685028504" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Crooks use Facebook, too. Congress asks FEMA for an explanation. Card skimmers in Mexico. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/816/notes</link>
      <description>In today’s podcast we hear about an “Amazon-style fulfillment model” for the criminal-to-criminal market. Criminals have Facebook groups, too, and lots of friends (“friends” here being a term of art). Xiaomi patches man-in-the-middle problems in its phones. Defense firms organize a supply chain security task force. Congress would like FEMA to explain its privacy incident. Alleged card skimmers arrested on other charges in Mexico. And Mr. Assange remains in Ecuador’s London embassy, at least for now. Ben Yelin from UMD CHHS on predictive policing software. Guest is Rob Strayer, Ambassador and Deputy Assistant US Secretary of State on security challenges in the global supply chain.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_05.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 05 Apr 2019 19:57:57 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>816</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7e42031e-def8-11ea-911f-876caa2077a0/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Crooks use Facebook, too. Congress asks FEMA for an explanation. Card skimmers in Mexico. </itunes:subtitle>
      <itunes:summary>In today’s podcast we hear about an “Amazon-style fulfillment model” for the criminal-to-criminal market. Criminals have Facebook groups, too, and lots of friends (“friends” here being a term of art). Xiaomi patches man-in-the-middle problems in its phones. Defense firms organize a supply chain security task force. Congress would like FEMA to explain its privacy incident. Alleged card skimmers arrested on other charges in Mexico. And Mr. Assange remains in Ecuador’s London embassy, at least for now. Ben Yelin from UMD CHHS on predictive policing software. Guest is Rob Strayer, Ambassador and Deputy Assistant US Secretary of State on security challenges in the global supply chain.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_05.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear about an “Amazon-style fulfillment model” for the criminal-to-criminal market. Criminals have Facebook groups, too, and lots of friends (“friends” here being a term of art). Xiaomi patches man-in-the-middle problems in its phones. Defense firms organize a supply chain security task force. Congress would like FEMA to explain its privacy incident. Alleged card skimmers arrested on other charges in Mexico. And Mr. Assange remains in Ecuador’s London embassy, at least for now. Ben Yelin from UMD CHHS on predictive policing software. Guest is Rob Strayer, Ambassador and Deputy Assistant US Secretary of State on security challenges in the global supply chain.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_05.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1358</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[223ee6e6c6754b69afa933bbf0a67dd9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8311096108.mp3?updated=1608756111" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Keeping Winnti out of the goods while keeping an eye on them. GlitchPOS malware. What do apps want? Third-party Facebook data exposure. Digital hygiene. A scareware scam.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/815/notes</link>
      <description>In today’s podcast we hear that Bayer, maker of pharmaceuticals and agricultural products, blocked an espionage attempt by China’s Winnti Group, and has been quietly monitoring the threat actor since last year. GlitchPOS and its evolution. Do those apps really need all that access? Two breaches of Facebook data by third parties. Some good digital hygiene notes:  change default passwords and backup your data in a secure and recoverable way. And no, there’s no CIA officer warning you’ll be arrested if you don’t pony up 1.4 Bitcoin. Craig Williams from Cisco Talos with research on GlitchPOS malware. Guest is Leo Simonovich from Siemens Energy on challenges and opportunities in the energy sector.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_04.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 04 Apr 2019 19:37:37 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>815</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7e5dcf5e-def8-11ea-911f-17ed7502c35d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Keeping Winnti out of the goods while keeping an eye on them. GlitchPOS malware. What do apps want? Third-party Facebook data exposure. Digital hygiene. A scareware scam.</itunes:subtitle>
      <itunes:summary>In today’s podcast we hear that Bayer, maker of pharmaceuticals and agricultural products, blocked an espionage attempt by China’s Winnti Group, and has been quietly monitoring the threat actor since last year. GlitchPOS and its evolution. Do those apps really need all that access? Two breaches of Facebook data by third parties. Some good digital hygiene notes:  change default passwords and backup your data in a secure and recoverable way. And no, there’s no CIA officer warning you’ll be arrested if you don’t pony up 1.4 Bitcoin. Craig Williams from Cisco Talos with research on GlitchPOS malware. Guest is Leo Simonovich from Siemens Energy on challenges and opportunities in the energy sector.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_04.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear that Bayer, maker of pharmaceuticals and agricultural products, blocked an espionage attempt by China’s Winnti Group, and has been quietly monitoring the threat actor since last year. GlitchPOS and its evolution. Do those apps really need all that access? Two breaches of Facebook data by third parties. Some good digital hygiene notes:  change default passwords and backup your data in a secure and recoverable way. And no, there’s no CIA officer warning you’ll be arrested if you don’t pony up 1.4 Bitcoin. Craig Williams from Cisco Talos with research on GlitchPOS malware. Guest is Leo Simonovich from Siemens Energy on challenges and opportunities in the energy sector.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_04.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1335</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1f15780e9820460f9713173971df2c9d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1576869439.mp3?updated=1690141413" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>For OceanLotus, a picture is worth a thousand words (or at least a few lines of loader code). Georgia Tech breached. Mounties raid offices associated with Orcus RAT. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/814/notes</link>
      <description>In today’s podcast, we hear that OceanLotus, a.k.a. Cobalt Kitty, a.k.a. APT32, is out and about and using a steganographic vector to deliver its loader. Georgia Tech suffers a major data breach, with access to student, staff, and faculty records by parties unknown. Research universities remain attractive targets. Reflections on dual-use technologies. The Royal Canadian Mounted Police have raided offices connected with the production of the Orcus RAT, which is either a legitimate tool or a commodity Trojan, depending on whom you believe. David Dufour from Webroot with results from their most recent threat report. Guest is Roy Zur from Cybint Solutions on the essentials of hunting and fishing for information online.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_03.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 03 Apr 2019 19:58:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>814</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7e792178-def8-11ea-911f-732fe35b9d9a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>For OceanLotus, a picture is worth a thousand words (or at least a few lines of loader code). Georgia Tech breached. Mounties raid offices associated with Orcus RAT. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that OceanLotus, a.k.a. Cobalt Kitty, a.k.a. APT32, is out and about and using a steganographic vector to deliver its loader. Georgia Tech suffers a major data breach, with access to student, staff, and faculty records by parties unknown. Research universities remain attractive targets. Reflections on dual-use technologies. The Royal Canadian Mounted Police have raided offices connected with the production of the Orcus RAT, which is either a legitimate tool or a commodity Trojan, depending on whom you believe. David Dufour from Webroot with results from their most recent threat report. Guest is Roy Zur from Cybint Solutions on the essentials of hunting and fishing for information online.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_03.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that OceanLotus, a.k.a. Cobalt Kitty, a.k.a. APT32, is out and about and using a steganographic vector to deliver its loader. Georgia Tech suffers a major data breach, with access to student, staff, and faculty records by parties unknown. Research universities remain attractive targets. Reflections on dual-use technologies. The Royal Canadian Mounted Police have raided offices connected with the production of the Orcus RAT, which is either a legitimate tool or a commodity Trojan, depending on whom you believe. David Dufour from Webroot with results from their most recent threat report. Guest is Roy Zur from Cybint Solutions on the essentials of hunting and fishing for information online.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_03.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1345</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7b8a76075b314ae0a31bb261a39465e5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8279028594.mp3?updated=1690141195" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware deletes dupes. Exodus scandal grows in Italy. Election reports from Ukraine and Israel.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/813/notes</link>
      <description>In today’s podcast, we hear that a ransomware strain deletes duplicates. But you know that just keeping a duplicate on the same drive wasn’t a secure backup, right? Right? Exodus spyware, now ejected from Google Play, is becoming a significant scandal in Italy. Influence operations meet campaigning in India and Israel--fair or unfair seems to be in the eye of the campaigner. In Ukraine, they’re just so much disinformation. OpIsrael hacktivists are expected back this weekend. More on below-the-belt selfies. Prof. Awais Rashid from University of Bristol on training people to work with cyber security complexity at scale. Guest is Hank Thomas from Strategic Cyber Ventures on the current environment for VC funding in cyber security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_02.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Apr 2019 19:47:08 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>813</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7e8780f6-def8-11ea-911f-0f86f09ff20f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ransomware deletes dupes. Exodus scandal grows in Italy. Election reports from Ukraine and Israel.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that a ransomware strain deletes duplicates. But you know that just keeping a duplicate on the same drive wasn’t a secure backup, right? Right? Exodus spyware, now ejected from Google Play, is becoming a significant scandal in Italy. Influence operations meet campaigning in India and Israel--fair or unfair seems to be in the eye of the campaigner. In Ukraine, they’re just so much disinformation. OpIsrael hacktivists are expected back this weekend. More on below-the-belt selfies. Prof. Awais Rashid from University of Bristol on training people to work with cyber security complexity at scale. Guest is Hank Thomas from Strategic Cyber Ventures on the current environment for VC funding in cyber security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_02.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that a ransomware strain deletes duplicates. But you know that just keeping a duplicate on the same drive wasn’t a secure backup, right? Right? Exodus spyware, now ejected from Google Play, is becoming a significant scandal in Italy. Influence operations meet campaigning in India and Israel--fair or unfair seems to be in the eye of the campaigner. In Ukraine, they’re just so much disinformation. OpIsrael hacktivists are expected back this weekend. More on below-the-belt selfies. Prof. Awais Rashid from University of Bristol on training people to work with cyber security complexity at scale. Guest is Hank Thomas from Strategic Cyber Ventures on the current environment for VC funding in cyber security.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_02.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1327</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[18243dd0ca0349ef99b94ab48d65518b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7131754259.mp3?updated=1690141163" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patch Magento soon. Toyota hacked again. Exodus spyware hits app stores. Moscow seeks to corral VPN providers. Facebook wants regulation. Swatting sentence. Phishing tackle in Nigeria. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/812/notes</link>
      <description>In today’s podcast, we hear that Magento users are being  urged to patch as risk of exploitation rises. Toyota experiences another cyber attack, and some observers blame, on grounds of motive, opportunity, and track record, OceanLotus. Exodus spyware in the Google Play store looks like a case of lawful intercept tools getting loose. Moscow seeks to control and limit VPN providers. Mr. Zuckerberg wants regulation. Mr. Barriss gets twenty years for swatting. And, hey, there’s phishing tackle on the Nigerian National Assembly’s site. Joe Carrigan from JHU ISI on a spying a leaving unsecured data online.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_01.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 01 Apr 2019 18:33:32 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>812</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7ea024e4-def8-11ea-911f-f7623a7df5a9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Patch Magento soon. Toyota hacked again. Exodus spyware hits app stores. Moscow seeks to corral VPN providers. Facebook wants regulation. Swatting sentence. Phishing tackle in Nigeria. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Magento users are being  urged to patch as risk of exploitation rises. Toyota experiences another cyber attack, and some observers blame, on grounds of motive, opportunity, and track record, OceanLotus. Exodus spyware in the Google Play store looks like a case of lawful intercept tools getting loose. Moscow seeks to control and limit VPN providers. Mr. Zuckerberg wants regulation. Mr. Barriss gets twenty years for swatting. And, hey, there’s phishing tackle on the Nigerian National Assembly’s site. Joe Carrigan from JHU ISI on a spying a leaving unsecured data online.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_01.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Magento users are being  urged to patch as risk of exploitation rises. Toyota experiences another cyber attack, and some observers blame, on grounds of motive, opportunity, and track record, OceanLotus. Exodus spyware in the Google Play store looks like a case of lawful intercept tools getting loose. Moscow seeks to control and limit VPN providers. Mr. Zuckerberg wants regulation. Mr. Barriss gets twenty years for swatting. And, hey, there’s phishing tackle on the Nigerian National Assembly’s site. Joe Carrigan from JHU ISI on a spying a leaving unsecured data online.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/April/CyberWire_2019_04_01.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1157</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5fe9fc0f47704f8b96a672d5d2a94238]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4046863801.mp3?updated=1690141140" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Alarming vulnerabilities in automotive security systems. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/79/notes</link>
      <description>Researchers at Pen Test Partners recently examined a variety of third-party automotive security systems and found serious security issues, potentially giving bad actors the ability to locate, disable or meddle with multiple vehicle systems.
Ken Munro is a security researcher with Pen Test Partners, and he joins us to share their findings.
The original research can be found here:
 https://www.pentestpartners.com/security-blog/gone-in-six-seconds-exploiting-car-alarms/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Mar 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>79</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/17256a32-df10-11ea-a0a9-03f01ffde117/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Alarming vulnerabilities in automotive security systems. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at Pen Test Partners recently examined a variety of third-party automotive security systems and found serious security issues, potentially giving bad actors the ability to locate, disable or meddle with multiple vehicle systems.
Ken Munro is a security researcher with Pen Test Partners, and he joins us to share their findings.
The original research can be found here:
 https://www.pentestpartners.com/security-blog/gone-in-six-seconds-exploiting-car-alarms/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Pen Test Partners recently examined a variety of third-party automotive security systems and found serious security issues, potentially giving bad actors the ability to locate, disable or meddle with multiple vehicle systems.</p><p>Ken Munro is a security researcher with Pen Test Partners, and he joins us to share their findings.</p><p>The original research can be found here:</p><p><a href="https://www.pentestpartners.com/security-blog/gone-in-six-seconds-exploiting-car-alarms/"> https://www.pentestpartners.com/security-blog/gone-in-six-seconds-exploiting-car-alarms/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1267</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[59b0da5412b34308b3a7558b43a84752]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3178519275.mp3?updated=1685028487" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russian information operations, and lessons on election security from the Near Abroad. Magneto proof-of-concept exploit. Huawei, security, and bugs. Training AI. Labor market news.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/811/notes</link>
      <description>In today’s podcast, we hear that Ukraine is preparing for this weekend’s elections while facing intense Russian information operations. Estonia’s experience with such interference may hold lessons. A Magneto vulnerability, just patched, could compromise paycards on e-commerce sites. Huawei reports record profits, and comes in for sharp British criticism over slipshod engineering. Prisoners in Finland will be helping train AI. And security companies hungry for talent should take note of tech layoffs in the larger IT sector. Ben Yelin from UMD CHHS with news that law enforcement agencies are encrypting their radio communications. Guest is Lorrie Cranor, director of CyLab at Carnegie Mellon University.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_29.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 29 Mar 2019 19:33:32 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>811</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7eb448ac-def8-11ea-911f-c7818c94ab39/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Russian information operations, and lessons on election security from the Near Abroad. Magneto proof-of-concept exploit. Huawei, security, and bugs. Training AI. Labor market news.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Ukraine is preparing for this weekend’s elections while facing intense Russian information operations. Estonia’s experience with such interference may hold lessons. A Magneto vulnerability, just patched, could compromise paycards on e-commerce sites. Huawei reports record profits, and comes in for sharp British criticism over slipshod engineering. Prisoners in Finland will be helping train AI. And security companies hungry for talent should take note of tech layoffs in the larger IT sector. Ben Yelin from UMD CHHS with news that law enforcement agencies are encrypting their radio communications. Guest is Lorrie Cranor, director of CyLab at Carnegie Mellon University.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_29.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Ukraine is preparing for this weekend’s elections while facing intense Russian information operations. Estonia’s experience with such interference may hold lessons. A Magneto vulnerability, just patched, could compromise paycards on e-commerce sites. Huawei reports record profits, and comes in for sharp British criticism over slipshod engineering. Prisoners in Finland will be helping train AI. And security companies hungry for talent should take note of tech layoffs in the larger IT sector. Ben Yelin from UMD CHHS with news that law enforcement agencies are encrypting their radio communications. Guest is Lorrie Cranor, director of CyLab at Carnegie Mellon University.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_29.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1571</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7dbbe73d83434744a341b96bb97a0f99]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8642224646.mp3?updated=1608756136" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Gustuff is out and after Android devices. Microsoft takes down Phosphorus. Elfin is working for Tehran. Russian cyber troops come to help Venezuela’s Chavistas. Guilty plea expected in Martin case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/810/notes</link>
      <description>In today’s podcast we hear that a  young banking Trojan gains criminal marketshare in the Android ecosystem. Microsoft lawyers up and seizes sites Iran’s Charming Kitten used to stage its attacks. Another Iranian APT, “Elfin,” is described. A battalion’s worth of Russian special operators and cyber troops are on the ground in Venezuela. Washington wants them out; Moscow says they’re in for the duration. And accused NSA leaker Hal Martin is expected to take a guilty plea this week. Daniel Prince from Lancaster University on cyber risk management. Guest is Satish Thiagarajan from Tata Consultancy Services on customizing machine learning to combat cyber attacks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_28.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 28 Mar 2019 19:43:20 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>810</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7ec671b2-def8-11ea-911f-d33656644c6b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Gustuff is out and after Android devices. Microsoft takes down Phosphorus. Elfin is working for Tehran. Russian cyber troops come to help Venezuela’s Chavistas. Guilty plea expected in Martin case.</itunes:subtitle>
      <itunes:summary>In today’s podcast we hear that a  young banking Trojan gains criminal marketshare in the Android ecosystem. Microsoft lawyers up and seizes sites Iran’s Charming Kitten used to stage its attacks. Another Iranian APT, “Elfin,” is described. A battalion’s worth of Russian special operators and cyber troops are on the ground in Venezuela. Washington wants them out; Moscow says they’re in for the duration. And accused NSA leaker Hal Martin is expected to take a guilty plea this week. Daniel Prince from Lancaster University on cyber risk management. Guest is Satish Thiagarajan from Tata Consultancy Services on customizing machine learning to combat cyber attacks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_28.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear that a  young banking Trojan gains criminal marketshare in the Android ecosystem. Microsoft lawyers up and seizes sites Iran’s Charming Kitten used to stage its attacks. Another Iranian APT, “Elfin,” is described. A battalion’s worth of Russian special operators and cyber troops are on the ground in Venezuela. Washington wants them out; Moscow says they’re in for the duration. And accused NSA leaker Hal Martin is expected to take a guilty plea this week. Daniel Prince from Lancaster University on cyber risk management. Guest is Satish Thiagarajan from Tata Consultancy Services on customizing machine learning to combat cyber attacks.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_28.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1292</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d5ae5a7d5d8146d6bcdd803187d13da2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2886801041.mp3?updated=1690140970" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>State cyber-espionage. Influence operations and coordinated inauthenticity. Add Lucky Elephant to the menagerie. ASUS supply chain updates. Notes on Norsk Hydro’s recovery. Reactions to the Mueller Report. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/809/notes</link>
      <description>In today’s podcast, we hear that the Spanish Defense Ministry has been reported to have suffered cyberespionage. The Lazarus Group’s life of crime. Facebook takes down “coordinated inauthenticity.” Add Lucky Elephant to the bad actor menagerie: it’s harvesting credentials in South Asia. Notes on the ASUS supply chain backdoor. Updates on Norsk Hydro’s recovery from its LockerGoga infestation. Russia says, hey, the Mueller Report totally exonerated us, too. Emily Wilson from Terbium Labs on data collection and protecting PII. Guest is Matthew Montgomery from Verizon on their Mobile Security Index report.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_27.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 27 Mar 2019 19:35:06 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>809</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7ee8dc34-def8-11ea-911f-47cf7f12cfde/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>State cyber-espionage. Influence operations and coordinated inauthenticity. Add Lucky Elephant to the menagerie. ASUS supply chain updates. Notes on Norsk Hydro’s recovery. Reactions to the Mueller Report. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that the Spanish Defense Ministry has been reported to have suffered cyberespionage. The Lazarus Group’s life of crime. Facebook takes down “coordinated inauthenticity.” Add Lucky Elephant to the bad actor menagerie: it’s harvesting credentials in South Asia. Notes on the ASUS supply chain backdoor. Updates on Norsk Hydro’s recovery from its LockerGoga infestation. Russia says, hey, the Mueller Report totally exonerated us, too. Emily Wilson from Terbium Labs on data collection and protecting PII. Guest is Matthew Montgomery from Verizon on their Mobile Security Index report.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_27.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that the Spanish Defense Ministry has been reported to have suffered cyberespionage. The Lazarus Group’s life of crime. Facebook takes down “coordinated inauthenticity.” Add Lucky Elephant to the bad actor menagerie: it’s harvesting credentials in South Asia. Notes on the ASUS supply chain backdoor. Updates on Norsk Hydro’s recovery from its LockerGoga infestation. Russia says, hey, the Mueller Report totally exonerated us, too. Emily Wilson from Terbium Labs on data collection and protecting PII. Guest is Matthew Montgomery from Verizon on their Mobile Security Index report.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_27.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1341</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[91a69b5c108e4cae91eced497b438f8b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1707479299.mp3?updated=1690140944" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More on ASUS supply chain backdoor. FEMA data mishandling. LockerGoga ransomware. Mueller report responses.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/808/notes</link>
      <description>In today’s podcast we hear about supply chain attacks and Operation ShadowHammer’s ASUS backdoor. LockerGoga ransomware may be slow and sloppy, but its masters are determined and willing to play for high stakes. What will happen with FEMA over its data mishandling incident? Responses to the Mueller Report’s conclusions. Venezuela says it was hacked again--the rhetorical technique is implausible insistence. And what do PewDiePie fans call themselves? The Nine Year Olds, the Bro Army. Fans of Mr. Pie’s girlfriend are the Marzipans. Joe Carrigan from JHU ISI with thoughts on recent revelations that Facebook was making unencrypted passwords accessible to thousands of employees. Guest is Greg Jensen from Oracle on their 2019 Cloud Threat Report.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_26.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Mar 2019 19:00:27 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>808</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7f0143aa-def8-11ea-911f-6f6c87d8a7ac/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>More on ASUS supply chain backdoor. FEMA data mishandling. LockerGoga ransomware. Mueller report responses.</itunes:subtitle>
      <itunes:summary>In today’s podcast we hear about supply chain attacks and Operation ShadowHammer’s ASUS backdoor. LockerGoga ransomware may be slow and sloppy, but its masters are determined and willing to play for high stakes. What will happen with FEMA over its data mishandling incident? Responses to the Mueller Report’s conclusions. Venezuela says it was hacked again--the rhetorical technique is implausible insistence. And what do PewDiePie fans call themselves? The Nine Year Olds, the Bro Army. Fans of Mr. Pie’s girlfriend are the Marzipans. Joe Carrigan from JHU ISI with thoughts on recent revelations that Facebook was making unencrypted passwords accessible to thousands of employees. Guest is Greg Jensen from Oracle on their 2019 Cloud Threat Report.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_26.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear about supply chain attacks and Operation ShadowHammer’s ASUS backdoor. LockerGoga ransomware may be slow and sloppy, but its masters are determined and willing to play for high stakes. What will happen with FEMA over its data mishandling incident? Responses to the Mueller Report’s conclusions. Venezuela says it was hacked again--the rhetorical technique is implausible insistence. And what do PewDiePie fans call themselves? The Nine Year Olds, the Bro Army. Fans of Mr. Pie’s girlfriend are the Marzipans. Joe Carrigan from JHU ISI with thoughts on recent revelations that Facebook was making unencrypted passwords accessible to thousands of employees. Guest is Greg Jensen from Oracle on their 2019 Cloud Threat Report.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_26.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1315</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[20598c8d005645d984e7c6102a108173]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8751529785.mp3?updated=1690140848" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mueller finds no evidence of Russia collusion. ISIS no longer holds any ground. LockerGoga hits chemical plants. FEMA fumbles PII. Cyber 9/12. PewDiePie versus T-Series.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/807/notes</link>
      <description>In today’s podcast, we hear that the  US Attorney General has reported to Congress the results of Special Counsel Mueller’s investigation. The basic finding is that there’s no evidence of collusion with Russian influence operations. ISIS no longer holds any ground. Expect it back in cyberspace. LockerGoga ransomware hits two chemical plants. FEMA mishandles more than two-million disaster victims’ PII. Notes on Cyber 9/12. And there’s a squabble for YouTube subscribers. Robert M. Lee from Dragos on their recent purchase of Next Defense and the subsequent open-sourcing of their tools. Guest is Rohit Sethi from Security Compass on the PCI security framework.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_25.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 25 Mar 2019 19:54:57 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>807</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7f18bf62-def8-11ea-911f-b71ed6130809/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Mueller finds no evidence of Russia collusion. ISIS no longer holds any ground. LockerGoga hits chemical plants. FEMA fumbles PII. Cyber 9/12. PewDiePie versus T-Series.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that the  US Attorney General has reported to Congress the results of Special Counsel Mueller’s investigation. The basic finding is that there’s no evidence of collusion with Russian influence operations. ISIS no longer holds any ground. Expect it back in cyberspace. LockerGoga ransomware hits two chemical plants. FEMA mishandles more than two-million disaster victims’ PII. Notes on Cyber 9/12. And there’s a squabble for YouTube subscribers. Robert M. Lee from Dragos on their recent purchase of Next Defense and the subsequent open-sourcing of their tools. Guest is Rohit Sethi from Security Compass on the PCI security framework.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_25.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that the  US Attorney General has reported to Congress the results of Special Counsel Mueller’s investigation. The basic finding is that there’s no evidence of collusion with Russian influence operations. ISIS no longer holds any ground. Expect it back in cyberspace. LockerGoga ransomware hits two chemical plants. FEMA mishandles more than two-million disaster victims’ PII. Notes on Cyber 9/12. And there’s a squabble for YouTube subscribers. Robert M. Lee from Dragos on their recent purchase of Next Defense and the subsequent open-sourcing of their tools. Guest is Rohit Sethi from Security Compass on the PCI security framework.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_25.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1259</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f359a4d35ce441dea78d4e137ac36b5d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5633244963.mp3?updated=1690140707" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ryuk ransomware relationship revelations. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/78/notes</link>
      <description>Investigators from McAfee's advanced threat research unit, working with partners at Coveware, have reevaluated hasty attributions of Ryuk ransomware to North Korea and have explored the inner workings of the threat.
John Fokker is head of cyber investigations in McAfee's Advanced Threat research unit. He join us to share their findings.
The original research can be found here:
 https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/ryuk-exploring-the-human-connection/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Mar 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>78</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/165acf7a-df10-11ea-a697-5f12a2a10a2b/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ryuk ransomware relationship revelations. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Investigators from McAfee's advanced threat research unit, working with partners at Coveware, have reevaluated hasty attributions of Ryuk ransomware to North Korea and have explored the inner workings of the threat.
John Fokker is head of cyber investigations in McAfee's Advanced Threat research unit. He join us to share their findings.
The original research can be found here:
 https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/ryuk-exploring-the-human-connection/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Investigators from McAfee's advanced threat research unit, working with partners at Coveware, have reevaluated hasty attributions of Ryuk ransomware to North Korea and have explored the inner workings of the threat.</p><p>John Fokker is head of cyber investigations in McAfee's Advanced Threat research unit. He join us to share their findings.</p><p>The original research can be found here:</p><p><a href="https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/ryuk-exploring-the-human-connection/"> https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/ryuk-exploring-the-human-connection/</a></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1445</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0e10f441f83c4b45a8b2d274b820e0d4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3919212066.mp3?updated=1685028249" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Finland’s data protection authority investigates suspicious smartphone activity. GitHub repos are leaking keys. Cardiac devices can be hacked.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/806/notes</link>
      <description>In today’s podcast, we hear that Finland’s data protection authority is investigating reports that Nokia 7 Plus smartphones are sending data to a Chinese telecom server. Thousands of API tokens and cryptographic keys are exposed in public GitHub repositories. The US government warns that certain cardiac devices can be hacked from close range. A North Carolina county government is dealing with its third ransomware attack. And Magecart groups go after bedding companies. Malek Ben Salem from Accenture Labs with thoughts on securing the digital economy. Guest is Adam Isles from the Chertoff Group on supply chain risks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_22.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 22 Mar 2019 20:18:44 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>806</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7f2acfa4-def8-11ea-911f-37ac96027fd6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Finland’s data protection authority investigates suspicious smartphone activity. GitHub repos are leaking keys. Cardiac devices can be hacked.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Finland’s data protection authority is investigating reports that Nokia 7 Plus smartphones are sending data to a Chinese telecom server. Thousands of API tokens and cryptographic keys are exposed in public GitHub repositories. The US government warns that certain cardiac devices can be hacked from close range. A North Carolina county government is dealing with its third ransomware attack. And Magecart groups go after bedding companies. Malek Ben Salem from Accenture Labs with thoughts on securing the digital economy. Guest is Adam Isles from the Chertoff Group on supply chain risks.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_22.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Finland’s data protection authority is investigating reports that Nokia 7 Plus smartphones are sending data to a Chinese telecom server. Thousands of API tokens and cryptographic keys are exposed in public GitHub repositories. The US government warns that certain cardiac devices can be hacked from close range. A North Carolina county government is dealing with its third ransomware attack. And Magecart groups go after bedding companies. Malek Ben Salem from Accenture Labs with thoughts on securing the digital economy. Guest is Adam Isles from the Chertoff Group on supply chain risks.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_22.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1529</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4910ae52ae894d57a94afaeabd722528]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9180277021.mp3?updated=1608756100" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russian APTs target EU governments. FIN7 is back. Google and Facebook scammed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/805/notes</link>
      <description>Fancy Bear and Sandworm are launching cyberespionage campaigns against European governments before the EU parliamentary elections. The FIN7 cybercrime group is still active, and it’s using new malware. A scammer stole more than $100 million from Google and Facebook. Facebook stored hundreds of millions of passwords in plaintext for years. And chatbots can learn to impersonate you based on your texts. Ben Yelin from UMD CHHS on rumors of NSA shutting down the Section 215 program. Guest is Jadee Hanson from Code 42 on insider threats.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_21.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 21 Mar 2019 20:02:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>805</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7f4768bc-def8-11ea-911f-7f4c1352bac6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Russian APTs target EU governments. FIN7 is back. Google and Facebook scammed.</itunes:subtitle>
      <itunes:summary>Fancy Bear and Sandworm are launching cyberespionage campaigns against European governments before the EU parliamentary elections. The FIN7 cybercrime group is still active, and it’s using new malware. A scammer stole more than $100 million from Google and Facebook. Facebook stored hundreds of millions of passwords in plaintext for years. And chatbots can learn to impersonate you based on your texts. Ben Yelin from UMD CHHS on rumors of NSA shutting down the Section 215 program. Guest is Jadee Hanson from Code 42 on insider threats.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_21.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Fancy Bear and Sandworm are launching cyberespionage campaigns against European governments before the EU parliamentary elections. The FIN7 cybercrime group is still active, and it’s using new malware. A scammer stole more than $100 million from Google and Facebook. Facebook stored hundreds of millions of passwords in plaintext for years. And chatbots can learn to impersonate you based on your texts. Ben Yelin from UMD CHHS on rumors of NSA shutting down the Section 215 program. Guest is Jadee Hanson from Code 42 on insider threats.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_21.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1290</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c0cf8395402d48ab8335ae6255693d5d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6160071774.mp3?updated=1690140545" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Norsk Hydro recovers from LockerGoga infection. Cyber conflict, cyber deterrence, and an economic case for security. EU out of compliance with GDPR? Big Tech in court. Thoughts on courtship.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/804/notes</link>
      <description>In today’s podcast, we hear that Norsk Hydro’s recovery continues, with high marks for transparency. Some notes on the challenges of deterrence in cyberspace from yesterday’s CYBERSEC DC conference, along with context for US skepticism about Huawei hardware. Cookiebot says the EU is out of compliance with GDPR, it’s sites infested with data-scraping adtech. Google and Facebook get, if not a haircut, at least a trim, in EU and US courts. And some animadversions concerning digital courtship displays.  Dr. Charles Clancy from VA Tech’s Hume Center on updates to the GPS system. Guest is Landon Lewis from Pondurance on balancing AI and human intelligence.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_20.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 20 Mar 2019 19:31:15 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>804</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7f6a0b9c-def8-11ea-911f-8f978b60ec35/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Norsk Hydro recovers from LockerGoga infection. Cyber conflict, cyber deterrence, and an economic case for security. EU out of compliance with GDPR? Big Tech in court. Thoughts on courtship.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Norsk Hydro’s recovery continues, with high marks for transparency. Some notes on the challenges of deterrence in cyberspace from yesterday’s CYBERSEC DC conference, along with context for US skepticism about Huawei hardware. Cookiebot says the EU is out of compliance with GDPR, it’s sites infested with data-scraping adtech. Google and Facebook get, if not a haircut, at least a trim, in EU and US courts. And some animadversions concerning digital courtship displays.  Dr. Charles Clancy from VA Tech’s Hume Center on updates to the GPS system. Guest is Landon Lewis from Pondurance on balancing AI and human intelligence.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_20.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Norsk Hydro’s recovery continues, with high marks for transparency. Some notes on the challenges of deterrence in cyberspace from yesterday’s CYBERSEC DC conference, along with context for US skepticism about Huawei hardware. Cookiebot says the EU is out of compliance with GDPR, it’s sites infested with data-scraping adtech. Google and Facebook get, if not a haircut, at least a trim, in EU and US courts. And some animadversions concerning digital courtship displays.  Dr. Charles Clancy from VA Tech’s Hume Center on updates to the GPS system. Guest is Landon Lewis from Pondurance on balancing AI and human intelligence.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_20.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1296</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c5e3895f9b6d484dbfae05ce603d5083]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7967416116.mp3?updated=1690140487" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>LockerGoga hits Norse Hydro. Mirai botnet malware gets an update. The DHS is concerned about cybersecurity.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/803/notes</link>
      <description>In today’s podcast, we hear that an aluminum manufacturing giant in Norway has suffered a major ransomware attack. A new version of the Mirai botnet malware is targeting enterprise systems. The US Homeland Security Secretary says the private sector and the government in the United States need to work together against cyber threats. Europol has a new cyber incident response strategy. And cybersecurity executives say some vendors’ marketing tactics are having a detrimental effect on the security industry. Johannes Ullrich from SANS and the ISC Stormcast Podcast on hardware security issues at the perimeter. Guest is Nathan Burke from Axonius, winners of the 2019 RSAC Innovation Sandbox competition.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_19.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Mar 2019 20:25:13 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>803</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7f8184f2-def8-11ea-911f-bf54c6fd2b8b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>LockerGoga hits Norse Hydro. Mirai botnet malware gets an update. The DHS is concerned about cybersecurity.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that an aluminum manufacturing giant in Norway has suffered a major ransomware attack. A new version of the Mirai botnet malware is targeting enterprise systems. The US Homeland Security Secretary says the private sector and the government in the United States need to work together against cyber threats. Europol has a new cyber incident response strategy. And cybersecurity executives say some vendors’ marketing tactics are having a detrimental effect on the security industry. Johannes Ullrich from SANS and the ISC Stormcast Podcast on hardware security issues at the perimeter. Guest is Nathan Burke from Axonius, winners of the 2019 RSAC Innovation Sandbox competition.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_19.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that an aluminum manufacturing giant in Norway has suffered a major ransomware attack. A new version of the Mirai botnet malware is targeting enterprise systems. The US Homeland Security Secretary says the private sector and the government in the United States need to work together against cyber threats. Europol has a new cyber incident response strategy. And cybersecurity executives say some vendors’ marketing tactics are having a detrimental effect on the security industry. Johannes Ullrich from SANS and the ISC Stormcast Podcast on hardware security issues at the perimeter. Guest is Nathan Burke from Axonius, winners of the 2019 RSAC Innovation Sandbox competition.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_19.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1255</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fcf8ebbb9fd940dc9f4e9a65409adf53]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9873306792.mp3?updated=1690140450" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Online content and terrorism. Huawei’s shifting strategy. Venezuela’s grid failure is explicable by corruption and incompetence--no hacking or sabotage required. Gnostiplayers are back. AI and evil.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/802/notes</link>
      <description>In today’s podcast we hear about content moderation in the aftermath of the New Zealand mosque shootings. A shift in Huawei’s strategy in the face of Five Eye--and especially US--sanctions: the US doesn’t like us because we’re a threat to their ability to conduct untrammeled surveillance. Corruption, neglect, and replacement of experts by politically reliable operators seem to have caused Venezuela’s blackouts. Gnosticplayers are back, with more commodity data. And AI has no monopoly on evil--natural intelligence has that market cornered. Joe Carrigan from JHU ISI on the recently announced DARPA funded effort to develop and open-source voting system.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_18.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 18 Mar 2019 19:22:40 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>802</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7f97d086-def8-11ea-911f-3f98dd088b12/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Online content and terrorism. Huawei’s shifting strategy. Venezuela’s grid failure is explicable by corruption and incompetence--no hacking or sabotage required. Gnostiplayers are back. AI and evil.</itunes:subtitle>
      <itunes:summary>In today’s podcast we hear about content moderation in the aftermath of the New Zealand mosque shootings. A shift in Huawei’s strategy in the face of Five Eye--and especially US--sanctions: the US doesn’t like us because we’re a threat to their ability to conduct untrammeled surveillance. Corruption, neglect, and replacement of experts by politically reliable operators seem to have caused Venezuela’s blackouts. Gnosticplayers are back, with more commodity data. And AI has no monopoly on evil--natural intelligence has that market cornered. Joe Carrigan from JHU ISI on the recently announced DARPA funded effort to develop and open-source voting system.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_18.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear about content moderation in the aftermath of the New Zealand mosque shootings. A shift in Huawei’s strategy in the face of Five Eye--and especially US--sanctions: the US doesn’t like us because we’re a threat to their ability to conduct untrammeled surveillance. Corruption, neglect, and replacement of experts by politically reliable operators seem to have caused Venezuela’s blackouts. Gnosticplayers are back, with more commodity data. And AI has no monopoly on evil--natural intelligence has that market cornered. Joe Carrigan from JHU ISI on the recently announced DARPA funded effort to develop and open-source voting system.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_18.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1079</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[99c673a1533e423e859e467b74f8240b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9745350742.mp3?updated=1690122928" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ThinkPHP exploit from Asia-Pacific region goes global. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/77/notes</link>
      <description>Akamai's Larry Cashdollar joins us to describe an exploit he recently came across while researching MageCart incidents. It's a remote command execution vulnerability affecting ThinkPHP, a popular web framework.
The original research can be found here:
 https://blogs.akamai.com/sitr/2019/01/thinkphp-exploit-actively-exploited-in-the-wild.html
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Mar 2019 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>77</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/111d212a-df10-11ea-9dfb-f77864c36b85/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>ThinkPHP exploit from Asia-Pacific region goes global. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Akamai's Larry Cashdollar joins us to describe an exploit he recently came across while researching MageCart incidents. It's a remote command execution vulnerability affecting ThinkPHP, a popular web framework.
The original research can be found here:
 https://blogs.akamai.com/sitr/2019/01/thinkphp-exploit-actively-exploited-in-the-wild.html
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Akamai's Larry Cashdollar joins us to describe an exploit he recently came across while researching MageCart incidents. It's a remote command execution vulnerability affecting ThinkPHP, a popular web framework.</p><p>The original research can be found here:</p><p><a href="https://blogs.akamai.com/sitr/2019/01/thinkphp-exploit-actively-exploited-in-the-wild.html"> https://blogs.akamai.com/sitr/2019/01/thinkphp-exploit-actively-exploited-in-the-wild.html</a></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>848</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0fbfbea5e0fe4a3093124403a6f6a4c9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6794380256.mp3?updated=1685022996" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Terror, announced and celebrated online. JavaScript sniffer afflicts e-commerce sites. Cryptojacking in the cloud. Perspectives on regulation, thoughts on a pervasive IoT. China’s IP protection law.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/801/notes</link>
      <description>In today’s podcast, we hear that a terror attack against two New Zealand mosques is announced on Twitter and live-streamed on Facebook. A new, unobtrusive JavaScript sniffer infests some e-commerce sites in the UK and the US. Cryptojacking finds its way into the cloud. A look at the consequences of regulation, both good and bad. How CISOs will have to grapple with the increasingly pervasive Internet-of-things. And China’s National People’s Congress makes a gesture toward respecting IP, but the world remains skeptical. Craig Williams from Cisco Talos with an update of crypto miners. Guest is Nirmal John, author of the book, “Breach: Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe.”
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_15.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 15 Mar 2019 19:23:55 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>801</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7fb1fd12-def8-11ea-911f-dfbe76ae42b2/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Terror, announced and celebrated online. JavaScript sniffer afflicts e-commerce sites. Cryptojacking in the cloud. Perspectives on regulation, thoughts on a pervasive IoT. China’s IP protection law.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that a terror attack against two New Zealand mosques is announced on Twitter and live-streamed on Facebook. A new, unobtrusive JavaScript sniffer infests some e-commerce sites in the UK and the US. Cryptojacking finds its way into the cloud. A look at the consequences of regulation, both good and bad. How CISOs will have to grapple with the increasingly pervasive Internet-of-things. And China’s National People’s Congress makes a gesture toward respecting IP, but the world remains skeptical. Craig Williams from Cisco Talos with an update of crypto miners. Guest is Nirmal John, author of the book, “Breach: Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe.”
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_15.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that a terror attack against two New Zealand mosques is announced on Twitter and live-streamed on Facebook. A new, unobtrusive JavaScript sniffer infests some e-commerce sites in the UK and the US. Cryptojacking finds its way into the cloud. A look at the consequences of regulation, both good and bad. How CISOs will have to grapple with the increasingly pervasive Internet-of-things. And China’s National People’s Congress makes a gesture toward respecting IP, but the world remains skeptical. Craig Williams from Cisco Talos with an update of crypto miners. Guest is Nirmal John, author of the book, “Breach: Remarkable Stories of Espionage and Data Theft and the Fight to Keep Secrets Safe.”</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_15.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1404</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1af7522fdd0742e899024337059db2e4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5086241186.mp3?updated=1608756095" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Indonesian election security. Watering hole in Pakistani passport site. RAT hunting. “Intelligence brute-forcing.” Just-patched zero-day exploited. PoS DGA attack. Operation Sheep. BND advises “nein” to Huawei.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/800/notes</link>
      <description>In today’s podcast, we hear that Indonesia says it’s got its voting security under control, and a lot of the problems sound like good old familiar fraud and dirty campaigning. Trustwave warns of a watering hole on a Pakistani government site. Recorded Future goes RAT hunting. Proofpoint offers a look at “intelligent brute-forcing.” Kaspersky reports on two espionage APTs exploiting a just-patched Microsoft zero-day. Flashpoint describes an unusual point-of-sale attack, and Check Point find Trojanized Android apps. Germany’s BND warns against Huawei.  Robert M. Lee from Dragos with thoughts on the Venezuelan power outages. Guest is Jeremy Tillman from Ghostery on the California Consumer Privacy Act.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_14.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 14 Mar 2019 19:27:09 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>800</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7fcd7880-def8-11ea-911f-ff0428e6e2a0/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Indonesian election security. Watering hole in Pakistani passport site. RAT hunting. “Intelligence brute-forcing.” Just-patched zero-day exploited. PoS DGA attack. Operation Sheep. BND advises “nein” to Huawei.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Indonesia says it’s got its voting security under control, and a lot of the problems sound like good old familiar fraud and dirty campaigning. Trustwave warns of a watering hole on a Pakistani government site. Recorded Future goes RAT hunting. Proofpoint offers a look at “intelligent brute-forcing.” Kaspersky reports on two espionage APTs exploiting a just-patched Microsoft zero-day. Flashpoint describes an unusual point-of-sale attack, and Check Point find Trojanized Android apps. Germany’s BND warns against Huawei.  Robert M. Lee from Dragos with thoughts on the Venezuelan power outages. Guest is Jeremy Tillman from Ghostery on the California Consumer Privacy Act.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_14.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Indonesia says it’s got its voting security under control, and a lot of the problems sound like good old familiar fraud and dirty campaigning. Trustwave warns of a watering hole on a Pakistani government site. Recorded Future goes RAT hunting. Proofpoint offers a look at “intelligent brute-forcing.” Kaspersky reports on two espionage APTs exploiting a just-patched Microsoft zero-day. Flashpoint describes an unusual point-of-sale attack, and Check Point find Trojanized Android apps. Germany’s BND warns against Huawei.  Robert M. Lee from Dragos with thoughts on the Venezuelan power outages. Guest is Jeremy Tillman from Ghostery on the California Consumer Privacy Act.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_14.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1332</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1c7497f75dad43b8965aeea2223a09cb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4271020879.mp3?updated=1690122680" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Election security and influence operations. Hacking the Fleet. Undersea cable competition. 5G worries. Calls to rein in Big Tech. UN report outlines North Korean cyber crime (there’s a lot of it). </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/799/notes</link>
      <description>In  today’s podcast, we hear that election interference concerns persist around the world. Governments seek to address them with a mix of threat intelligence and attention to security basics. A US Navy report says the Fleet’s supply chain is well on the way to being pwned by Chinese intelligence. Undersea cables are a center of Sino-US competition. The European Parliament warns about the Chinese threat to 5G infrastructure. More calls to rein in Big Tech. And the UN looks at North Korea and sees massive cyber crime. Emily Wilson from Terbium Labs with a look back at the Equifax breach. Guest is Dr. Wenliang (Kevin) Du from Syracuse University on his SEED labs and the importance of hands-on training in cyber security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_13.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 13 Mar 2019 20:06:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>799</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7fe19d42-def8-11ea-911f-f79f9349cd54/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Election security and influence operations. Hacking the Fleet. Undersea cable competition. 5G worries. Calls to rein in Big Tech. UN report outlines North Korean cyber crime (there’s a lot of it). </itunes:subtitle>
      <itunes:summary>In  today’s podcast, we hear that election interference concerns persist around the world. Governments seek to address them with a mix of threat intelligence and attention to security basics. A US Navy report says the Fleet’s supply chain is well on the way to being pwned by Chinese intelligence. Undersea cables are a center of Sino-US competition. The European Parliament warns about the Chinese threat to 5G infrastructure. More calls to rein in Big Tech. And the UN looks at North Korea and sees massive cyber crime. Emily Wilson from Terbium Labs with a look back at the Equifax breach. Guest is Dr. Wenliang (Kevin) Du from Syracuse University on his SEED labs and the importance of hands-on training in cyber security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_13.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In  today’s podcast, we hear that election interference concerns persist around the world. Governments seek to address them with a mix of threat intelligence and attention to security basics. A US Navy report says the Fleet’s supply chain is well on the way to being pwned by Chinese intelligence. Undersea cables are a center of Sino-US competition. The European Parliament warns about the Chinese threat to 5G infrastructure. More calls to rein in Big Tech. And the UN looks at North Korea and sees massive cyber crime. Emily Wilson from Terbium Labs with a look back at the Equifax breach. Guest is Dr. Wenliang (Kevin) Du from Syracuse University on his SEED labs and the importance of hands-on training in cyber security.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_13.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1342</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2d1b4985b6b04a0bb0e0088df25514a9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5925659768.mp3?updated=1690122665" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Venezuela power blackout updates. Social media and social control. Trojanized games. Free decryptor out for ransomware strain. Ads on Facebook. A look at 30 years of the web. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/798/notes</link>
      <description>In today’s podcast, we hear an update on Venezuela and its power outages. Amplification of social media posts as a form of mass persuasion. A look at how control of the Internet has replaced control of the radio station as a move in civil war and coup or counter-coup planning. Asian game makers get backdoored out of China. Decryptors are out for BigBobRoss ransomware. Senator Warren versus Facebook, and Facebook versus itself. And Sir Tim Berners-Lee on the Web’s 30th birthday. Joe Carrigan from JHU ISI with an early look at NSA’s Ghidra reverse engineering tool. Guest is Dr. Phyllis Schneck from Promontory Financial Group (an IBM company) on regulation in cyber security, a preview of her talk at the upcoming JHU Annual Cybersecurity Conference for Executives. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_12.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Mar 2019 18:19:27 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>798</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7ff71370-def8-11ea-911f-bba5ac2d5405/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Venezuela power blackout updates. Social media and social control. Trojanized games. Free decryptor out for ransomware strain. Ads on Facebook. A look at 30 years of the web. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear an update on Venezuela and its power outages. Amplification of social media posts as a form of mass persuasion. A look at how control of the Internet has replaced control of the radio station as a move in civil war and coup or counter-coup planning. Asian game makers get backdoored out of China. Decryptors are out for BigBobRoss ransomware. Senator Warren versus Facebook, and Facebook versus itself. And Sir Tim Berners-Lee on the Web’s 30th birthday. Joe Carrigan from JHU ISI with an early look at NSA’s Ghidra reverse engineering tool. Guest is Dr. Phyllis Schneck from Promontory Financial Group (an IBM company) on regulation in cyber security, a preview of her talk at the upcoming JHU Annual Cybersecurity Conference for Executives. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_12.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear an update on Venezuela and its power outages. Amplification of social media posts as a form of mass persuasion. A look at how control of the Internet has replaced control of the radio station as a move in civil war and coup or counter-coup planning. Asian game makers get backdoored out of China. Decryptors are out for BigBobRoss ransomware. Senator Warren versus Facebook, and Facebook versus itself. And Sir Tim Berners-Lee on the Web’s 30th birthday. Joe Carrigan from JHU ISI with an early look at NSA’s Ghidra reverse engineering tool. Guest is Dr. Phyllis Schneck from Promontory Financial Group (an IBM company) on regulation in cyber security, a preview of her talk at the upcoming JHU Annual Cybersecurity Conference for Executives. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_12.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1331</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c39819e084e042d6b08116ccbb2a1436]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9749326827.mp3?updated=1690122652" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Allegations and information operations. Iridium group may have compromised Citrix. Sino-American trade and security conflicts continue. Fashions in trolling.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/797/notes</link>
      <description>Venezuela sustains power outages, and the regime blames hackers and wreckers. The opposition says it’s all due to the regime’s corruption, incompetence, and neglect. Citrix loses business documents in what might have been an Iranian espionage operation. Huawei’s suit against the US gets some official cheering from Beijing. The US warns against Chinese information operations. And Russian troll farmers turn to amplification. Daniel Prince from Lancaster University on the importance of Cyber Design. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_11.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 11 Mar 2019 20:33:17 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>797</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/801cd902-def8-11ea-911f-3f0086a2f4b8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Allegations and information operations. Iridium group may have compromised Citrix. Sino-American trade and security conflicts continue. Fashions in trolling.  </itunes:subtitle>
      <itunes:summary>Venezuela sustains power outages, and the regime blames hackers and wreckers. The opposition says it’s all due to the regime’s corruption, incompetence, and neglect. Citrix loses business documents in what might have been an Iranian espionage operation. Huawei’s suit against the US gets some official cheering from Beijing. The US warns against Chinese information operations. And Russian troll farmers turn to amplification. Daniel Prince from Lancaster University on the importance of Cyber Design. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_11.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Venezuela sustains power outages, and the regime blames hackers and wreckers. The opposition says it’s all due to the regime’s corruption, incompetence, and neglect. Citrix loses business documents in what might have been an Iranian espionage operation. Huawei’s suit against the US gets some official cheering from Beijing. The US warns against Chinese information operations. And Russian troll farmers turn to amplification. Daniel Prince from Lancaster University on the importance of Cyber Design. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_11.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1100</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e556b7c833e44156a2c9b983113f074a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3483426100.mp3?updated=1690122630" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Job-seeker exposes banking network to Lazurus Group. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/76/notes</link>
      <description>Vitali Kremez is a Director of Research at Flashpoint. His team discovered that the recently disclosed intrusion suffered in December 2018 by Chilean interbank network Redbanc involved PowerRatankba, a malware toolkit with ties to North Korea-linked group Lazarus. The intrusion represents the latest known example of Lazarus-affiliated tools being deployed within financially motivated activity targeted toward financial institutions in Latin America.
The original research can be found here:
 https://www.flashpoint-intel.com/blog/disclosure-chilean-redbanc-intrusion-lazarus-ties/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Mar 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>76</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0cf289e6-df10-11ea-9447-13176d3e7703/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Job-seeker exposes banking network to Lazurus Group. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Vitali Kremez is a Director of Research at Flashpoint. His team discovered that the recently disclosed intrusion suffered in December 2018 by Chilean interbank network Redbanc involved PowerRatankba, a malware toolkit with ties to North Korea-linked group Lazarus. The intrusion represents the latest known example of Lazarus-affiliated tools being deployed within financially motivated activity targeted toward financial institutions in Latin America.
The original research can be found here:
 https://www.flashpoint-intel.com/blog/disclosure-chilean-redbanc-intrusion-lazarus-ties/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Vitali Kremez is a Director of Research at Flashpoint. His team discovered that the recently disclosed intrusion suffered in December 2018 by Chilean interbank network Redbanc involved PowerRatankba, a malware toolkit with ties to North Korea-linked group Lazarus. The intrusion represents the latest known example of Lazarus-affiliated tools being deployed within financially motivated activity targeted toward financial institutions in Latin America.</p><p>The original research can be found here:</p><p><a href="https://www.flashpoint-intel.com/blog/disclosure-chilean-redbanc-intrusion-lazarus-ties/"> https://www.flashpoint-intel.com/blog/disclosure-chilean-redbanc-intrusion-lazarus-ties/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1475</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ad206584fb4e4a8caee2d0fb21c78791]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6665438712.mp3?updated=1685022934" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chinese influence campaigns. Egyptian spear phishing. Hundreds of million email records exposed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/796/notes</link>
      <description>In today’s podcast, we hear that Chinese information operations on US social media are widespread. The Egyptian government launches spear phishing attacks against activists. Hundreds of millions of email records were found online. Chelsea Manning is back in jail. The US is retaliating for Chinese cyberespionage. And Facebook wants to change its image. Ben Yelin from UMD CHHS on a PA supreme court ruling on protection of employee’s personal information. Guest is Scott Shackelford from Indiana University on the Paris call for trust and security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_08.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 08 Mar 2019 21:08:55 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>796</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/802e8ac6-def8-11ea-911f-e3ec0d47b26f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Chinese influence campaigns. Egyptian spear phishing. Hundreds of million email records exposed.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Chinese information operations on US social media are widespread. The Egyptian government launches spear phishing attacks against activists. Hundreds of millions of email records were found online. Chelsea Manning is back in jail. The US is retaliating for Chinese cyberespionage. And Facebook wants to change its image. Ben Yelin from UMD CHHS on a PA supreme court ruling on protection of employee’s personal information. Guest is Scott Shackelford from Indiana University on the Paris call for trust and security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_08.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Chinese information operations on US social media are widespread. The Egyptian government launches spear phishing attacks against activists. Hundreds of millions of email records were found online. Chelsea Manning is back in jail. The US is retaliating for Chinese cyberespionage. And Facebook wants to change its image. Ben Yelin from UMD CHHS on a PA supreme court ruling on protection of employee’s personal information. Guest is Scott Shackelford from Indiana University on the Paris call for trust and security.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_08.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1506</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a3ac450b507346868065c817f6fd5eaf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4826453653.mp3?updated=1608755799" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Scope of APT33 attacks revealed. GandCrab criminals shift tactics. Slub malware uses Slack. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/795/notes</link>
      <description>The scope of Iran-linked APT33 cyberattacks has been revealed. GandCrab criminals are using more sophisticated tactics. A new type of malware was using Slack to communicate. Chrome gets an important update. Huawei sues the US, and Germany sets tougher security rules for telecom companies. And people who invest in cryptocurrency often don't know what they're getting into. David Dufour from Webroot with his thoughts on RSA Conference. Guest is Asaf Cidon from Barracuda Networks on account takeover vulnerabilities.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_07.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 07 Mar 2019 21:01:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>795</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8055584a-def8-11ea-911f-27ee3347226d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Scope of APT33 attacks revealed. GandCrab criminals shift tactics. Slub malware uses Slack. </itunes:subtitle>
      <itunes:summary>The scope of Iran-linked APT33 cyberattacks has been revealed. GandCrab criminals are using more sophisticated tactics. A new type of malware was using Slack to communicate. Chrome gets an important update. Huawei sues the US, and Germany sets tougher security rules for telecom companies. And people who invest in cryptocurrency often don't know what they're getting into. David Dufour from Webroot with his thoughts on RSA Conference. Guest is Asaf Cidon from Barracuda Networks on account takeover vulnerabilities.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_07.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The scope of Iran-linked APT33 cyberattacks has been revealed. GandCrab criminals are using more sophisticated tactics. A new type of malware was using Slack to communicate. Chrome gets an important update. Huawei sues the US, and Germany sets tougher security rules for telecom companies. And people who invest in cryptocurrency often don't know what they're getting into. David Dufour from Webroot with his thoughts on RSA Conference. Guest is Asaf Cidon from Barracuda Networks on account takeover vulnerabilities.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_07.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1368</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[592fe157432e453283f3fb1a3e65cb03]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5867696770.mp3?updated=1690122491" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>5G worries. Whitefly vs. SingHealth. Speculative execution bug.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/794/notes</link>
      <description>In today’s podcast, we hear that Australia's former prime minister warns Britain about Chinese tech companies. Symantec says Whitefly was behind SingHealth's massive data breach. Iranian hackers show code overlap. Intel CPUs are vulnerable to another speculative execution flaw. The NSA hasn't been using its domestic phone surveillance program lately. Sharing code presents dangers. And Google will ban political ads in Canada. Justin Harvey from Accenture with results from their Costs of Crime report, as well as observations from RSAC. Guest is Gerald Beuchelt from LogMeIn with info from their latest password survey.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_06.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 06 Mar 2019 21:31:58 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>794</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/806dca4c-def8-11ea-911f-23bb4e93bc28/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>5G worries. Whitefly vs. SingHealth. Speculative execution bug.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Australia's former prime minister warns Britain about Chinese tech companies. Symantec says Whitefly was behind SingHealth's massive data breach. Iranian hackers show code overlap. Intel CPUs are vulnerable to another speculative execution flaw. The NSA hasn't been using its domestic phone surveillance program lately. Sharing code presents dangers. And Google will ban political ads in Canada. Justin Harvey from Accenture with results from their Costs of Crime report, as well as observations from RSAC. Guest is Gerald Beuchelt from LogMeIn with info from their latest password survey.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_06.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Australia's former prime minister warns Britain about Chinese tech companies. Symantec says Whitefly was behind SingHealth's massive data breach. Iranian hackers show code overlap. Intel CPUs are vulnerable to another speculative execution flaw. The NSA hasn't been using its domestic phone surveillance program lately. Sharing code presents dangers. And Google will ban political ads in Canada. Justin Harvey from Accenture with results from their Costs of Crime report, as well as observations from RSAC. Guest is Gerald Beuchelt from LogMeIn with info from their latest password survey.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_06.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1323</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b474f729854e4585a7950d68c293fad0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9905728224.mp3?updated=1690122484" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>India hacks back. Rob Joyce discusses cyber conflict. Chinese hackers look for maritime technologies. Google reveals a macOS vulnerability.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/793/notes</link>
      <description>In today’s podcast, we hear that India went on the offensive when its government websites were attacked by hackers from Pakistan. Rob Joyce, Senior Advisor for Cybersecurity Strategy to the Director of the US National Security Agency, discusses trends in cyber conflict. A Chinese cyberespionage group hacks for maritime technologies. Facebook lets people look you up by your two-factor authentication phone number. And Google researchers disclose a vulnerability in macOS.  CyberWire Editor John Petrik with results from the RSA Conference Innovation Sandbox. Guest Balaji Parimi from CloudKnox weighs the pros and cons of various authorization schemes.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_05.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Mar 2019 20:51:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>793</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/809ba836-def8-11ea-911f-2fd0084baccc/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>India hacks back. Rob Joyce discusses cyber conflict. Chinese hackers look for maritime technologies. Google reveals a macOS vulnerability.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that India went on the offensive when its government websites were attacked by hackers from Pakistan. Rob Joyce, Senior Advisor for Cybersecurity Strategy to the Director of the US National Security Agency, discusses trends in cyber conflict. A Chinese cyberespionage group hacks for maritime technologies. Facebook lets people look you up by your two-factor authentication phone number. And Google researchers disclose a vulnerability in macOS.  CyberWire Editor John Petrik with results from the RSA Conference Innovation Sandbox. Guest Balaji Parimi from CloudKnox weighs the pros and cons of various authorization schemes.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_05.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that India went on the offensive when its government websites were attacked by hackers from Pakistan. Rob Joyce, Senior Advisor for Cybersecurity Strategy to the Director of the US National Security Agency, discusses trends in cyber conflict. A Chinese cyberespionage group hacks for maritime technologies. Facebook lets people look you up by your two-factor authentication phone number. And Google researchers disclose a vulnerability in macOS.  CyberWire Editor John Petrik with results from the RSA Conference Innovation Sandbox. Guest Balaji Parimi from CloudKnox weighs the pros and cons of various authorization schemes.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_05.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1301</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d68fef710a3742e0a203b530e034ae5c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3731034652.mp3?updated=1690122464" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Operation Sharpshooter. Canada begins extradition process. Huawei will sue the US. Facebook’s global lobbying practices revealed. Visitor management systems are vulnerable. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/792/notes</link>
      <description>In today’s podcast, we hear that Operation Sharpshooter is linked to North Korea. Canada begins the extradition process for Meng Wanzhou. Huawei is planning to sue the US for banning its equipment from government use.  Facebook may have used questionable tactics to lobby against stricter data protection laws. Thailand passes a controversial cybersecurity law. And IBM interns discover a host of vulnerabilities in visitor management systems. Joe Carrigan from JHU ISI with details on a Ring Doorbell vulnerability.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_04.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 04 Mar 2019 20:32:21 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>792</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/80b3c402-def8-11ea-911f-8fde57de6458/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Operation Sharpshooter. Canada begins extradition process. Huawei will sue the US. Facebook’s global lobbying practices revealed. Visitor management systems are vulnerable. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Operation Sharpshooter is linked to North Korea. Canada begins the extradition process for Meng Wanzhou. Huawei is planning to sue the US for banning its equipment from government use.  Facebook may have used questionable tactics to lobby against stricter data protection laws. Thailand passes a controversial cybersecurity law. And IBM interns discover a host of vulnerabilities in visitor management systems. Joe Carrigan from JHU ISI with details on a Ring Doorbell vulnerability.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_04.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Operation Sharpshooter is linked to North Korea. Canada begins the extradition process for Meng Wanzhou. Huawei is planning to sue the US for banning its equipment from government use.  Facebook may have used questionable tactics to lobby against stricter data protection laws. Thailand passes a controversial cybersecurity law. And IBM interns discover a host of vulnerabilities in visitor management systems. Joe Carrigan from JHU ISI with details on a Ring Doorbell vulnerability.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_04.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>985</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[81f6a66986af4c5d807264cc01ed0a6a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7622927210.mp3?updated=1690122447" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fake Fortnite app scams infect gamers. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/75/notes</link>
      <description>Researchers at Zscaler have been tracking a variety fake versions of the popular Fortnite game on the Google Play store, along with associated scams. Deepen Desai is head of security research at Zscaler, and he joins us to share their findings.

The original research can be found here:

 https://www.zscaler.com/blogs/research/fake-fortnite-apps-scamming-and-spying-android-gamers
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Mar 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>75</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/09896888-df10-11ea-92cb-c3c309a58a49/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fake Fortnite app scams infect gamers. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at Zscaler have been tracking a variety fake versions of the popular Fortnite game on the Google Play store, along with associated scams. Deepen Desai is head of security research at Zscaler, and he joins us to share their findings.

The original research can be found here:

 https://www.zscaler.com/blogs/research/fake-fortnite-apps-scamming-and-spying-android-gamers
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Zscaler have been tracking a variety fake versions of the popular Fortnite game on the Google Play store, along with associated scams. Deepen Desai is head of security research at Zscaler, and he joins us to share their findings.</p><p><br></p><p>The original research can be found here:</p><p><br></p><p><a href="https://www.zscaler.com/blogs/research/fake-fortnite-apps-scamming-and-spying-android-gamers"> https://www.zscaler.com/blogs/research/fake-fortnite-apps-scamming-and-spying-android-gamers</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1058</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[37e129f843f444409ab1decba46f6790]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2904284529.mp3?updated=1685022908" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Qbot spreads. Bug hunting makes a millionaire. US Cyber Command shows what “persistent engagement” looks like. Huawei agonistes. There’s no Momo, really. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/791/notes</link>
      <description>Qbot infections are spreading. The bounty-hunting gig economy apparently has its first millionaire. Observers are liking what they see in US Cyber Command’s “persistent engagement.” Canada mulls the extradition of Huawei’s CFO to the US. The US continues to call Huawei a security risk, and Huawei has some things to say back. The Momo Challenge is a viral online craze, but not the way you may have heard. Awais Rashid from Bristol University with thoughts on edge computing. Guest is Dr. Dena Haritos Tsamitis from Carnegie Mellon University on improving the culture of infosec, as well as her thoughts on the upcoming RSA conference. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_01.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 01 Mar 2019 20:08:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>791</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/80d43c50-def8-11ea-911f-4b2199559f3b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Qbot spreads. Bug hunting makes a millionaire. US Cyber Command shows what “persistent engagement” looks like. Huawei agonistes. There’s no Momo, really. </itunes:subtitle>
      <itunes:summary>Qbot infections are spreading. The bounty-hunting gig economy apparently has its first millionaire. Observers are liking what they see in US Cyber Command’s “persistent engagement.” Canada mulls the extradition of Huawei’s CFO to the US. The US continues to call Huawei a security risk, and Huawei has some things to say back. The Momo Challenge is a viral online craze, but not the way you may have heard. Awais Rashid from Bristol University with thoughts on edge computing. Guest is Dr. Dena Haritos Tsamitis from Carnegie Mellon University on improving the culture of infosec, as well as her thoughts on the upcoming RSA conference. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_01.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Qbot infections are spreading. The bounty-hunting gig economy apparently has its first millionaire. Observers are liking what they see in US Cyber Command’s “persistent engagement.” Canada mulls the extradition of Huawei’s CFO to the US. The US continues to call Huawei a security risk, and Huawei has some things to say back. The Momo Challenge is a viral online craze, but not the way you may have heard. Awais Rashid from Bristol University with thoughts on edge computing. Guest is Dr. Dena Haritos Tsamitis from Carnegie Mellon University on improving the culture of infosec, as well as her thoughts on the upcoming RSA conference. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/March/CyberWire_2019_03_01.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1484</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[55ea065e90f5409090d032e09e2ceaf8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7324728970.mp3?updated=1608755804" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Third-parties can misconfigure, too. Coinhive goes out of business. Intel decides 5G project with Chinese partner is too hard. Bronze Union. Clearing Facebook data. Proper disposal of lawful intercept tools.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/790/notes</link>
      <description>In today’s podcast we hear that a misconfigured Amazon Web Services database has exposed a risk screening database--and it seems the exposure itself was an instance of third-party risk. Farewell to Coinhive, long a favorite of cryptominers everywhere. Intel pulls back from a 5G project with a Chinese partner. A quick look at Bronze Union, and what the threat actor’s up to. Facebook will soon help you clear your data. And if you have a lawful intercept tool you no longer need, please don’t sell it on eBay. Malek Ben Salem from Accenture Labs on the commoditization of malware. Guest is Michelle Dennedy from Cisco with results from their most recent Data Privacy Benchmark Study.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_28.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 28 Feb 2019 21:05:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>790</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/80f9653e-def8-11ea-911f-8720145cd2dd/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Third-parties can misconfigure, too. Coinhive goes out of business. Intel decides 5G project with Chinese partner is too hard. Bronze Union. Clearing Facebook data. Proper disposal of lawful intercept tools.</itunes:subtitle>
      <itunes:summary>In today’s podcast we hear that a misconfigured Amazon Web Services database has exposed a risk screening database--and it seems the exposure itself was an instance of third-party risk. Farewell to Coinhive, long a favorite of cryptominers everywhere. Intel pulls back from a 5G project with a Chinese partner. A quick look at Bronze Union, and what the threat actor’s up to. Facebook will soon help you clear your data. And if you have a lawful intercept tool you no longer need, please don’t sell it on eBay. Malek Ben Salem from Accenture Labs on the commoditization of malware. Guest is Michelle Dennedy from Cisco with results from their most recent Data Privacy Benchmark Study.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_28.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear that a misconfigured Amazon Web Services database has exposed a risk screening database--and it seems the exposure itself was an instance of third-party risk. Farewell to Coinhive, long a favorite of cryptominers everywhere. Intel pulls back from a 5G project with a Chinese partner. A quick look at Bronze Union, and what the threat actor’s up to. Facebook will soon help you clear your data. And if you have a lawful intercept tool you no longer need, please don’t sell it on eBay. Malek Ben Salem from Accenture Labs on the commoditization of malware. Guest is Michelle Dennedy from Cisco with results from their most recent Data Privacy Benchmark Study.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_28.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1341</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e0a3f86a55764e93858efd18aa6a03d2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7165831506.mp3?updated=1690122417" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Router vulnerabilities. Hacking around the Hanoi summit. DDoSing an election. Brushing back a troll farm. Crytpojacking an embassy.   </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/789/notes</link>
      <description>In today’s podcast, we hear that Nokia routers have been found vulnerable to man-in-the-middle and denial-of-service attacks. As one would expect, the  US and North Korean summit in Hanoi this week summons up some hacking. Ukraine accuses Russia of DDoS attacks in the service of election disruption. US Cyber Command played some chin music for St. Petersburg during US midterm elections. And if you’re going to hack into an embassy, wouldn’t you want to do more than install a cryptojacker? David Dufour from Webroot with insights on their pending purchase by Carbonite. Guest is Randy Vanderhoof from the Secure Technology Alliance on managing identity and fraud in the payment space. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_27.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 27 Feb 2019 21:16:46 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>789</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/81213ca8-def8-11ea-911f-eb4a9e52f9b3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Router vulnerabilities. Hacking around the Hanoi summit. DDoSing an election. Brushing back a troll farm. Crytpojacking an embassy.   </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Nokia routers have been found vulnerable to man-in-the-middle and denial-of-service attacks. As one would expect, the  US and North Korean summit in Hanoi this week summons up some hacking. Ukraine accuses Russia of DDoS attacks in the service of election disruption. US Cyber Command played some chin music for St. Petersburg during US midterm elections. And if you’re going to hack into an embassy, wouldn’t you want to do more than install a cryptojacker? David Dufour from Webroot with insights on their pending purchase by Carbonite. Guest is Randy Vanderhoof from the Secure Technology Alliance on managing identity and fraud in the payment space. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_27.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Nokia routers have been found vulnerable to man-in-the-middle and denial-of-service attacks. As one would expect, the  US and North Korean summit in Hanoi this week summons up some hacking. Ukraine accuses Russia of DDoS attacks in the service of election disruption. US Cyber Command played some chin music for St. Petersburg during US midterm elections. And if you’re going to hack into an embassy, wouldn’t you want to do more than install a cryptojacker? David Dufour from Webroot with insights on their pending purchase by Carbonite. Guest is Randy Vanderhoof from the Secure Technology Alliance on managing identity and fraud in the payment space. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_27.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1324</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[66080a19e17547feb38182205dfb1273]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9468145619.mp3?updated=1690122313" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sino-Australian, Sino-American cyber tensions. Threat trends. Bare-metal cloud issues addressed. USB-C and memory attacks, Credential stuffing in tax season. Twitter hijacking. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/788/notes</link>
      <description>In today’s podcast, we hear updates on suspicions of Chinese operators. Some trend reports from IBM and NETSCOUT. Bare-metal cloud services get reflashed. USB-C ports may be more vulnerable than thought to direct memory access attacks. Credential-stuffing attacks hit users of online tax-preparation services. And that missile attack on Tampa was not a drill—in fact, it never happened at all—and congratulations to the citizens of Florida for recognizing a hack and a hoax when they see one.  Justin Harvey from Accenture on the types of vulnerabilities adversaries target. Guest is Guarav Tuli from F-Prime Capital on the current venture capital environment for cyber. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_26.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Feb 2019 20:09:13 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>788</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8139e83e-def8-11ea-911f-5324df2e2608/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Sino-Australian, Sino-American cyber tensions. Threat trends. Bare-metal cloud issues addressed. USB-C and memory attacks, Credential stuffing in tax season. Twitter hijacking. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear updates on suspicions of Chinese operators. Some trend reports from IBM and NETSCOUT. Bare-metal cloud services get reflashed. USB-C ports may be more vulnerable than thought to direct memory access attacks. Credential-stuffing attacks hit users of online tax-preparation services. And that missile attack on Tampa was not a drill—in fact, it never happened at all—and congratulations to the citizens of Florida for recognizing a hack and a hoax when they see one.  Justin Harvey from Accenture on the types of vulnerabilities adversaries target. Guest is Guarav Tuli from F-Prime Capital on the current venture capital environment for cyber. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_26.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear updates on suspicions of Chinese operators. Some trend reports from IBM and NETSCOUT. Bare-metal cloud services get reflashed. USB-C ports may be more vulnerable than thought to direct memory access attacks. Credential-stuffing attacks hit users of online tax-preparation services. And that missile attack on Tampa was not a drill—in fact, it never happened at all—and congratulations to the citizens of Florida for recognizing a hack and a hoax when they see one.  Justin Harvey from Accenture on the types of vulnerabilities adversaries target. Guest is Guarav Tuli from F-Prime Capital on the current venture capital environment for cyber. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_26.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1327</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b398ac4692a2449ab8b1f0920e361e44]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5184508450.mp3?updated=1690122297" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Another warning of DNS hijacking. B0r0nt0k ransomware is out and about, and in too many servers. Whitelisting a controversial CA. Blockchain security. Bots get on the consular calendar. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/787/notes</link>
      <description>In today’s podcast, we hear that ICANN has warned of a DNS hijacking wave, and is urging widespread DNSSEC adoption. Security firms see Iran as a particularly active DNS hijacker. A B0r0nt0k ransomware outbreak infests Linux servers, but Windows users might be at risk as well. A request for whitelisting in the Firefox certificate store arouses controversy. Technology Review raises questions about blockchain security. Bots keep people from getting consular appointments, and people don’t like it. And telling minotaurs from unicorns. Rick Howard from Palo Alto Networks with tips on moving data to the cloud.  
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_25.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 25 Feb 2019 20:35:11 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>787</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/815148e4-def8-11ea-911f-97336c02e837/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Another warning of DNS hijacking. B0r0nt0k ransomware is out and about, and in too many servers. Whitelisting a controversial CA. Blockchain security. Bots get on the consular calendar. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that ICANN has warned of a DNS hijacking wave, and is urging widespread DNSSEC adoption. Security firms see Iran as a particularly active DNS hijacker. A B0r0nt0k ransomware outbreak infests Linux servers, but Windows users might be at risk as well. A request for whitelisting in the Firefox certificate store arouses controversy. Technology Review raises questions about blockchain security. Bots keep people from getting consular appointments, and people don’t like it. And telling minotaurs from unicorns. Rick Howard from Palo Alto Networks with tips on moving data to the cloud.  
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_25.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that ICANN has warned of a DNS hijacking wave, and is urging widespread DNSSEC adoption. Security firms see Iran as a particularly active DNS hijacker. A B0r0nt0k ransomware outbreak infests Linux servers, but Windows users might be at risk as well. A request for whitelisting in the Firefox certificate store arouses controversy. Technology Review raises questions about blockchain security. Bots keep people from getting consular appointments, and people don’t like it. And telling minotaurs from unicorns. Rick Howard from Palo Alto Networks with tips on moving data to the cloud.  </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_25.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1045</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f74dc5d11ac2415ab454d15aec381254]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9917138282.mp3?updated=1690122281" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rosneft suspicions shift from espionage to business email compromise. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/74/notes</link>
      <description>Researchers at security firm Cylance have been tracking a threat group targeting the Rosneft Russian oil company. As Cylance uncovered details, suspicions shifted from state-sponsored espionage to business email compromise. 

Kevin Livelli is director of threat intelligence at Cylance, and he joins us to share what they found.
The original research can be found here:
 https://threatvector.cylance.com/en_us/home/poking-the-bear-three-year-campaign-targets-russian-critical-infrastructure.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Feb 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>74</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/063a7dde-df10-11ea-9dfb-6b9ce60d822a/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Rosneft suspicions shift from espionage to business email compromise. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at security firm Cylance have been tracking a threat group targeting the Rosneft Russian oil company. As Cylance uncovered details, suspicions shifted from state-sponsored espionage to business email compromise. 

Kevin Livelli is director of threat intelligence at Cylance, and he joins us to share what they found.
The original research can be found here:
 https://threatvector.cylance.com/en_us/home/poking-the-bear-three-year-campaign-targets-russian-critical-infrastructure.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at security firm Cylance have been tracking a threat group targeting the Rosneft Russian oil company. As Cylance uncovered details, suspicions shifted from state-sponsored espionage to business email compromise. </p><p><br></p><p>Kevin Livelli is director of threat intelligence at Cylance, and he joins us to share what they found.</p><p>The original research can be found here:</p><p><a href="https://threatvector.cylance.com/en_us/home/poking-the-bear-three-year-campaign-targets-russian-critical-infrastructure.html"> https://threatvector.cylance.com/en_us/home/poking-the-bear-three-year-campaign-targets-russian-critical-infrastructure.html</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1767</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0cbd22f5bd244b9c9a92b3c1b7fd908c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5609520477.mp3?updated=1685022901" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Influence operations in Ukraine’s elections. Australian hacks look more like China’s work. Huawei and the 5G future. Objectionable content in comments. DrainerNot. No more soldier-selfies in Russia. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/786/notes</link>
      <description>In today’s podcast, we hear that Kiev says it’s found complex, large-scale Russian influence operations in Ukraine’s presidential election. Australian investigators are said to be closer to concluding that recent hacking attempts were the work of Chinese intelligence services. There’s also plenty of ordinary crime to go around. Huawei continues its charm and affordability offensive. User comments drive advertisers away from YouTube. DrainerBot sucks power from phones. And Russia outlaws soldier-selfies. Ben Yelin from UMD CHHS about a lawsuit involving a man refusing to unlock his phone at the U.S. border. Guest is Linda Burger from NSA with information on their Technology Transfer Program. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_22.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 22 Feb 2019 20:50:28 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>786</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/816c01e8-def8-11ea-911f-e75ac7614101/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Influence operations in Ukraine’s elections. Australian hacks look more like China’s work. Huawei and the 5G future. Objectionable content in comments. DrainerNot. No more soldier-selfies in Russia. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Kiev says it’s found complex, large-scale Russian influence operations in Ukraine’s presidential election. Australian investigators are said to be closer to concluding that recent hacking attempts were the work of Chinese intelligence services. There’s also plenty of ordinary crime to go around. Huawei continues its charm and affordability offensive. User comments drive advertisers away from YouTube. DrainerBot sucks power from phones. And Russia outlaws soldier-selfies. Ben Yelin from UMD CHHS about a lawsuit involving a man refusing to unlock his phone at the U.S. border. Guest is Linda Burger from NSA with information on their Technology Transfer Program. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_22.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Kiev says it’s found complex, large-scale Russian influence operations in Ukraine’s presidential election. Australian investigators are said to be closer to concluding that recent hacking attempts were the work of Chinese intelligence services. There’s also plenty of ordinary crime to go around. Huawei continues its charm and affordability offensive. User comments drive advertisers away from YouTube. DrainerBot sucks power from phones. And Russia outlaws soldier-selfies. Ben Yelin from UMD CHHS about a lawsuit involving a man refusing to unlock his phone at the U.S. border. Guest is Linda Burger from NSA with information on their Technology Transfer Program. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_22.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1622</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04323665b6a1475e9bf9cb891ec7afe7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1335909119.mp3?updated=1608755801" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hybrid war and tactical influence operations. Separ lives off the land. NoRelationship attacks get past email filters. Responsible disclosure. Man-in-the-room bug. Ship hacking. Password managers. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/785/notes</link>
      <description>In today’s podcast we hear about a test of influencing soldiers through their social media: Instagram works best, Twitter not so much. Separ credential-stealing malware successfully lives off the land. NoRelationship attacks get past some email filters. Spamming users to get your point across may not be the best form of disclosure. University researchers find a man-in-the-room bug. Other researchers think they could capsize a ship. Britain’s NCSC continues its dance with Huawei. Password managers remain a good idea. Emily Wilson from Terbium Labs discussing law enforcement on the dark web. UK correspondent Carole Theriault returns with the story of surveillance and facial recognition in London. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_21.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 21 Feb 2019 19:06:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>785</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/81834466-def8-11ea-911f-9bab22d9ad18/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hybrid war and tactical influence operations. Separ lives off the land. NoRelationship attacks get past email filters. Responsible disclosure. Man-in-the-room bug. Ship hacking. Password managers. </itunes:subtitle>
      <itunes:summary>In today’s podcast we hear about a test of influencing soldiers through their social media: Instagram works best, Twitter not so much. Separ credential-stealing malware successfully lives off the land. NoRelationship attacks get past some email filters. Spamming users to get your point across may not be the best form of disclosure. University researchers find a man-in-the-room bug. Other researchers think they could capsize a ship. Britain’s NCSC continues its dance with Huawei. Password managers remain a good idea. Emily Wilson from Terbium Labs discussing law enforcement on the dark web. UK correspondent Carole Theriault returns with the story of surveillance and facial recognition in London. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_21.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear about a test of influencing soldiers through their social media: Instagram works best, Twitter not so much. Separ credential-stealing malware successfully lives off the land. NoRelationship attacks get past some email filters. Spamming users to get your point across may not be the best form of disclosure. University researchers find a man-in-the-room bug. Other researchers think they could capsize a ship. Britain’s NCSC continues its dance with Huawei. Password managers remain a good idea. Emily Wilson from Terbium Labs discussing law enforcement on the dark web. UK correspondent Carole Theriault returns with the story of surveillance and facial recognition in London. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_21.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1293</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e3bbd4c6790f49c399fcbdd704907904]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8872112915.mp3?updated=1690122059" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fancy Bear phishes in think tanks. Lazarus Group takes a swipe at Russian organizations. New decryptor for GandCrab. Citizen Lab and Novalpina discuss NSO Group. Ryuk’s lousy help desk. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/784/notes</link>
      <description>In today’s podcast, we hear that Microsoft has disclosed a Fancy Bear sighting, snuffling around Atlanticist think tanks in Europe. Ukraine says, in effect, see, we told you so. Speaking of bears, it seems that North Korea’s Hidden Cobra may be striking at the biggest bear of them all, going after Russian targets. There’s new decryptor available for GandCrab ransomware. Citizen Lab and NSO Group’s new partial owner exchange notes. A look at a ransomware help desk. Mike Benjamin from CenturyLink with an update on the Necurs botnet. Guest is Tommy McDowell from the R-CISC (the retail ISAC) on the importance of sharing threat data.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 20 Feb 2019 21:16:13 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>784</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/81af6b72-def8-11ea-911f-b75d7e85f928/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fancy Bear phishes in think tanks. Lazarus Group takes a swipe at Russian organizations. New decryptor for GandCrab. Citizen Lab and Novalpina discuss NSO Group. Ryuk’s lousy help desk. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Microsoft has disclosed a Fancy Bear sighting, snuffling around Atlanticist think tanks in Europe. Ukraine says, in effect, see, we told you so. Speaking of bears, it seems that North Korea’s Hidden Cobra may be striking at the biggest bear of them all, going after Russian targets. There’s new decryptor available for GandCrab ransomware. Citizen Lab and NSO Group’s new partial owner exchange notes. A look at a ransomware help desk. Mike Benjamin from CenturyLink with an update on the Necurs botnet. Guest is Tommy McDowell from the R-CISC (the retail ISAC) on the importance of sharing threat data.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Microsoft has disclosed a Fancy Bear sighting, snuffling around Atlanticist think tanks in Europe. Ukraine says, in effect, see, we told you so. Speaking of bears, it seems that North Korea’s Hidden Cobra may be striking at the biggest bear of them all, going after Russian targets. There’s new decryptor available for GandCrab ransomware. Citizen Lab and NSO Group’s new partial owner exchange notes. A look at a ransomware help desk. Mike Benjamin from CenturyLink with an update on the Necurs botnet. Guest is Tommy McDowell from the R-CISC (the retail ISAC) on the importance of sharing threat data.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1315</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[05584a7570224a11b8fd03b0e2e4a34c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9563772176.mp3?updated=1690122033" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>International cyber conflict: India and Pakistan; Australia and China. Rietspoof malware. Microsoft ejects cyptojackers from its store. NCSC may go easy on Huawei. Parliament criticizes Facebook. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/783/notes</link>
      <description>In today’s podcast, we hear of a small flare in cyber conflict between India and Pakistan. Australian political parties as well as Parliament subjected to attempted cyberattacks. A new strain of malware is being distributed through messaging apps. Microsoft pulls cryptojacking Windows 10 apps from its store. Britain’s NCSC is rumored to have concluded that it can mitigate Huawei risks. Facebook gets a harsh report from Westminster. And a hacker claims a higher motive for his breach (but still wants Bitcoin).  Joe Carrigan from JHU ISI on Apple requiring two-factor authentication for developers. Guest is Igal Gofman from XM Cyber on network compromise through email.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_18.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Feb 2019 20:22:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>783</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/81c0e55a-def8-11ea-911f-5fcf87f7aecb/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>International cyber conflict: India and Pakistan; Australia and China. Rietspoof malware. Microsoft ejects cyptojackers from its store. NCSC may go easy on Huawei. Parliament criticizes Facebook. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear of a small flare in cyber conflict between India and Pakistan. Australian political parties as well as Parliament subjected to attempted cyberattacks. A new strain of malware is being distributed through messaging apps. Microsoft pulls cryptojacking Windows 10 apps from its store. Britain’s NCSC is rumored to have concluded that it can mitigate Huawei risks. Facebook gets a harsh report from Westminster. And a hacker claims a higher motive for his breach (but still wants Bitcoin).  Joe Carrigan from JHU ISI on Apple requiring two-factor authentication for developers. Guest is Igal Gofman from XM Cyber on network compromise through email.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_18.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear of a small flare in cyber conflict between India and Pakistan. Australian political parties as well as Parliament subjected to attempted cyberattacks. A new strain of malware is being distributed through messaging apps. Microsoft pulls cryptojacking Windows 10 apps from its store. Britain’s NCSC is rumored to have concluded that it can mitigate Huawei risks. Facebook gets a harsh report from Westminster. And a hacker claims a higher motive for his breach (but still wants Bitcoin).  Joe Carrigan from JHU ISI on Apple requiring two-factor authentication for developers. Guest is Igal Gofman from XM Cyber on network compromise through email.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_18.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1288</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a2e8f0829711497c9d6b04c022f6c22c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6352398972.mp3?updated=1690121981" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Seedworm digs Middle East intelligence. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/73/notes</link>
      <description>Researchers at Symantec have been tracking Seedworm, a cyber espionage group targeting the Middle East as well as Europe and North America. The threat group targets government agencies, oil &amp; gas facilities, NGOs, telecoms and IT firms.
Al Cooley is director of product management at Symantec, and he joins us to share their findings.
The original research can be found here:
 https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-group
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Feb 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>73</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/02c5f25a-df10-11ea-a0a9-eb21a78bd8f1/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Seedworm digs Middle East intelligence. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at Symantec have been tracking Seedworm, a cyber espionage group targeting the Middle East as well as Europe and North America. The threat group targets government agencies, oil &amp; gas facilities, NGOs, telecoms and IT firms.
Al Cooley is director of product management at Symantec, and he joins us to share their findings.
The original research can be found here:
 https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-group
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Symantec have been tracking Seedworm, a cyber espionage group targeting the Middle East as well as Europe and North America. The threat group targets government agencies, oil &amp; gas facilities, NGOs, telecoms and IT firms.</p><p>Al Cooley is director of product management at Symantec, and he joins us to share their findings.</p><p>The original research can be found here:</p><p><a href="https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-group"> https://www.symantec.com/blogs/threat-intelligence/seedworm-espionage-group</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1137</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6591a1845c0b4b67b733acdba4b540b3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1765054011.mp3?updated=1685022887" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>GandCrab notes. Make tests, not bans, says GSMA. Content moderation. Takedown of inauthentic accounts. Influence operations. Happy birthday, GCHQ. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/782/notes</link>
      <description>In today’s podcast, we hear that GandCrab has been scuttling through unpatched holes. Independent testing as an alternative to banning specific vendors as security risks. Big Tech gets some Congressional scrutiny over content moderation. Facebook takes down inauthentic accounts working to influence the Moldovan elections. The Federal Trade Commission is rumored to be queuing up a record privacy fine. Defending forward from disillusioned Bears. And happy birthday, GCHQ. Craig Williams from Cisco Talos on router vulnerabilities. Guest is Amanda Berlin, founder of Mental Health Hackers on her efforts to address mental health issues in infosec.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_15.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 15 Feb 2019 21:12:05 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>782</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/81d9ae78-def8-11ea-911f-634b3641d35f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>GandCrab notes. Make tests, not bans, says GSMA. Content moderation. Takedown of inauthentic accounts. Influence operations. Happy birthday, GCHQ. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that GandCrab has been scuttling through unpatched holes. Independent testing as an alternative to banning specific vendors as security risks. Big Tech gets some Congressional scrutiny over content moderation. Facebook takes down inauthentic accounts working to influence the Moldovan elections. The Federal Trade Commission is rumored to be queuing up a record privacy fine. Defending forward from disillusioned Bears. And happy birthday, GCHQ. Craig Williams from Cisco Talos on router vulnerabilities. Guest is Amanda Berlin, founder of Mental Health Hackers on her efforts to address mental health issues in infosec.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_15.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that GandCrab has been scuttling through unpatched holes. Independent testing as an alternative to banning specific vendors as security risks. Big Tech gets some Congressional scrutiny over content moderation. Facebook takes down inauthentic accounts working to influence the Moldovan elections. The Federal Trade Commission is rumored to be queuing up a record privacy fine. Defending forward from disillusioned Bears. And happy birthday, GCHQ. Craig Williams from Cisco Talos on router vulnerabilities. Guest is Amanda Berlin, founder of Mental Health Hackers on her efforts to address mental health issues in infosec.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_15.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1658</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6a1078754ff94b5a9ae33274a0fbcb55]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2966550618.mp3?updated=1608755785" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Former Air Force counterintelligence specialist indicted on charges of spying for Iran. Where’s the stolen Equifax data? Two alleged Apophis Squad clowns indicted. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/781/notes</link>
      <description>In today’s podcast we hear that US prosecutors have unsealed the indictment of a former US Air Force counterintelligence specialist on charges she conspired to commit espionage on behalf of Iran. The US Treasury Department announces further sanctions on Iranian individuals and one organization named in that indictment. Two alleged members of Apophis Squad are indicted. Whatever became of the all the data stolen from Equifax? That information’s apparently not for sale on the dark web. Malek Ben Salem from Accenture Labs on reducing the attack surface of containers. Guest is Kevin McNamee from Nokia with results from their recent threat intelligence report. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_14.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 14 Feb 2019 20:38:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>781</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/81eb1eb0-def8-11ea-911f-832cc1e83c78/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Former Air Force counterintelligence specialist indicted on charges of spying for Iran. Where’s the stolen Equifax data? Two alleged Apophis Squad clowns indicted. </itunes:subtitle>
      <itunes:summary>In today’s podcast we hear that US prosecutors have unsealed the indictment of a former US Air Force counterintelligence specialist on charges she conspired to commit espionage on behalf of Iran. The US Treasury Department announces further sanctions on Iranian individuals and one organization named in that indictment. Two alleged members of Apophis Squad are indicted. Whatever became of the all the data stolen from Equifax? That information’s apparently not for sale on the dark web. Malek Ben Salem from Accenture Labs on reducing the attack surface of containers. Guest is Kevin McNamee from Nokia with results from their recent threat intelligence report. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_14.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear that US prosecutors have unsealed the indictment of a former US Air Force counterintelligence specialist on charges she conspired to commit espionage on behalf of Iran. The US Treasury Department announces further sanctions on Iranian individuals and one organization named in that indictment. Two alleged members of Apophis Squad are indicted. Whatever became of the all the data stolen from Equifax? That information’s apparently not for sale on the dark web. Malek Ben Salem from Accenture Labs on reducing the attack surface of containers. Guest is Kevin McNamee from Nokia with results from their recent threat intelligence report. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_14.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1335</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eba8135e428f4f689122f8dfa49b3b1b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3170366205.mp3?updated=1690121864" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>China says it had nothing to do with the Parliament hack in Australia. Notes on Patch Tuesday. Shlayer and GreyEnergy malware analyzed. Tomorrow is Valentine’s Day—act accordingly.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/780/notes</link>
      <description>In today’s podcast, we hear that China has denied involvement in the Australian Parliament hack. Patch Tuesday notes. A new strain of Shlayer malware is out. A look at GreyEnergy. Reactions to the destructive VFEmail attack. And thoughts on St. Valentine’s Day, with advice, admonition, and an excursus on credential-stuffing and holiday doughnuts. Dr. Charles Clancy from VA Tech’s Hume Center on the Pentagon’s use of AI for RF spectrum management. Guest is Matt Cauthorn from ExtraHop on malicious Chrome extensions.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_13.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 13 Feb 2019 20:32:07 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>780</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/81fdd3fc-def8-11ea-911f-6feadafc07b9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>China says it had nothing to do with the Parliament hack in Australia. Notes on Patch Tuesday. Shlayer and GreyEnergy malware analyzed. Tomorrow is Valentine’s Day—act accordingly.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that China has denied involvement in the Australian Parliament hack. Patch Tuesday notes. A new strain of Shlayer malware is out. A look at GreyEnergy. Reactions to the destructive VFEmail attack. And thoughts on St. Valentine’s Day, with advice, admonition, and an excursus on credential-stuffing and holiday doughnuts. Dr. Charles Clancy from VA Tech’s Hume Center on the Pentagon’s use of AI for RF spectrum management. Guest is Matt Cauthorn from ExtraHop on malicious Chrome extensions.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_13.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that China has denied involvement in the Australian Parliament hack. Patch Tuesday notes. A new strain of Shlayer malware is out. A look at GreyEnergy. Reactions to the destructive VFEmail attack. And thoughts on St. Valentine’s Day, with advice, admonition, and an excursus on credential-stuffing and holiday doughnuts. Dr. Charles Clancy from VA Tech’s Hume Center on the Pentagon’s use of AI for RF spectrum management. Guest is Matt Cauthorn from ExtraHop on malicious Chrome extensions.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_13.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1292</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[61b6cf7ba1944e068c4a0cbbe9e24c71]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8833844124.mp3?updated=1690121824" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>VFEmail attacked, infrastructure wiped. EU considers a response to APT10. US Executive Order on AI is out. GPS jamming threat. Stryker hack. Shadow IT in the Corps.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/779/notes</link>
      <description>In today’s podcast, we hear that VFEmail has sustained a devastating, data-destroying attack. The EU considers whether it should, can, or will make a coordinated response to China’s APT10. A US Executive Order outlines a strategy to maintain superiority in artificial intelligence. Norway warns, again, of the risk of GPS jamming. US Army Stryker vehicles were hacked during testing last year. And some Marines are getting ahead of themselves, downloading close air support control apps to personal tablets. Johannes Ullrich from SANS and the ISC Stormcast podcast on using hardware flaws for network access. Guest is Shane Harris from the Washington Post with an update on the Paul Whelan case in Russia.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_12.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Feb 2019 20:45:38 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>779</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8216c812-def8-11ea-911f-b346830cd345/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>VFEmail attacked, infrastructure wiped. EU considers a response to APT10. US Executive Order on AI is out. GPS jamming threat. Stryker hack. Shadow IT in the Corps.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that VFEmail has sustained a devastating, data-destroying attack. The EU considers whether it should, can, or will make a coordinated response to China’s APT10. A US Executive Order outlines a strategy to maintain superiority in artificial intelligence. Norway warns, again, of the risk of GPS jamming. US Army Stryker vehicles were hacked during testing last year. And some Marines are getting ahead of themselves, downloading close air support control apps to personal tablets. Johannes Ullrich from SANS and the ISC Stormcast podcast on using hardware flaws for network access. Guest is Shane Harris from the Washington Post with an update on the Paul Whelan case in Russia.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_12.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that VFEmail has sustained a devastating, data-destroying attack. The EU considers whether it should, can, or will make a coordinated response to China’s APT10. A US Executive Order outlines a strategy to maintain superiority in artificial intelligence. Norway warns, again, of the risk of GPS jamming. US Army Stryker vehicles were hacked during testing last year. And some Marines are getting ahead of themselves, downloading close air support control apps to personal tablets. Johannes Ullrich from SANS and the ISC Stormcast podcast on using hardware flaws for network access. Guest is Shane Harris from the Washington Post with an update on the Paul Whelan case in Russia.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_12.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1274</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8fdb26d1a39748d1a480ee98b9fb7e8e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9823335299.mp3?updated=1690121766" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cryptojackers gone wild. Attempted hack of Australia’s Parliament investigated. Huawei security concerns continue. Russia tests Internet autarky. Prosecutors investigate alleged blackmail. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/778/notes</link>
      <description>In today’s podcast, we hear that clipper malware has been ejected from Google Play. A different cryptojacker is kicking its competitors out of infected machines. Australian authorities continue to investigate the attempted hack of Parliament, with Chinese intelligence services as the prime suspects. How do you solve a problem like Huawei? Russia prepares to test its ability to disconnect from the Internet in the event of war. Prosecutors investigate alleged blackmail by below-the-belt selfie. Ben Yelin from UMD CHHS on politicians blocking citizens on social media.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_11.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 11 Feb 2019 20:47:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>778</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/822d0b40-def8-11ea-911f-23ef4902a708/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cryptojackers gone wild. Attempted hack of Australia’s Parliament investigated. Huawei security concerns continue. Russia tests Internet autarky. Prosecutors investigate alleged blackmail. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that clipper malware has been ejected from Google Play. A different cryptojacker is kicking its competitors out of infected machines. Australian authorities continue to investigate the attempted hack of Parliament, with Chinese intelligence services as the prime suspects. How do you solve a problem like Huawei? Russia prepares to test its ability to disconnect from the Internet in the event of war. Prosecutors investigate alleged blackmail by below-the-belt selfie. Ben Yelin from UMD CHHS on politicians blocking citizens on social media.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_11.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that clipper malware has been ejected from Google Play. A different cryptojacker is kicking its competitors out of infected machines. Australian authorities continue to investigate the attempted hack of Parliament, with Chinese intelligence services as the prime suspects. How do you solve a problem like Huawei? Russia prepares to test its ability to disconnect from the Internet in the event of war. Prosecutors investigate alleged blackmail by below-the-belt selfie. Ben Yelin from UMD CHHS on politicians blocking citizens on social media.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_11.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1183</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e6363cc66ce04471abf34c83c3acc8de]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9549538691.mp3?updated=1690121745" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trends and tips for cloud security. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/72/notes</link>
      <description>The team at Palo Alto Networks' Unit 42 recently published research tracking trends in how organizations are addressing cloud security, along with tips for improvement. 
Ryan Olson is VP of threat intelligence at Palo Alto Networks, and he joins us to share their findings.
The original research can be found here:
 https://unit42.paloaltonetworks.com/unit-42-cloud-security-trends-tips/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Feb 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>72</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0193ad50-df10-11ea-802a-77448956d3b3/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Trends and tips for cloud security. [Research Saturday]</itunes:subtitle>
      <itunes:summary>The team at Palo Alto Networks' Unit 42 recently published research tracking trends in how organizations are addressing cloud security, along with tips for improvement. 
Ryan Olson is VP of threat intelligence at Palo Alto Networks, and he joins us to share their findings.
The original research can be found here:
 https://unit42.paloaltonetworks.com/unit-42-cloud-security-trends-tips/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The team at Palo Alto Networks' Unit 42 recently published research tracking trends in how organizations are addressing cloud security, along with tips for improvement. </p><p>Ryan Olson is VP of threat intelligence at Palo Alto Networks, and he joins us to share their findings.</p><p>The original research can be found here:</p><p><a href="https://unit42.paloaltonetworks.com/unit-42-cloud-security-trends-tips/"> https://unit42.paloaltonetworks.com/unit-42-cloud-security-trends-tips/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1347</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7facb47d756a41bcae5f17478cd477d9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3024884341.mp3?updated=1685022854" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Australia’s Federal Parliament has a cyber incident. DHS warns of third-party spying. Legit privacy app tampered with. Credit Union phishing. Bezos vs. Pecker. FaceTime bounty. Seal scat.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/777/notes</link>
      <description>In today’s podcast, we hear that Australia is investigating an attempted hack of its Federal Parliament. The US Department of Homeland Security warns that spies are working through third parties to get to their targets. Spyware is bundled in a legitimate privacy app. Credit unions get spearphished. Mr. Bezos says, “No thanks, Mr. Pecker.” Apple will pay a FaceTime bug bounty. Microsoft says don’t use IE as a browser. And what they found in that seal scat.  Justin Harvey from Accenture on credential stuffing. Guest is Sandi Roddy from Johns Hopkins APL on secure key management.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_08.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 08 Feb 2019 20:39:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>777</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/82411d7e-def8-11ea-911f-67fe98d44f92/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Australia’s Federal Parliament has a cyber incident. DHS warns of third-party spying. Legit privacy app tampered with. Credit Union phishing. Bezos vs. Pecker. FaceTime bounty. Seal scat.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Australia is investigating an attempted hack of its Federal Parliament. The US Department of Homeland Security warns that spies are working through third parties to get to their targets. Spyware is bundled in a legitimate privacy app. Credit unions get spearphished. Mr. Bezos says, “No thanks, Mr. Pecker.” Apple will pay a FaceTime bug bounty. Microsoft says don’t use IE as a browser. And what they found in that seal scat.  Justin Harvey from Accenture on credential stuffing. Guest is Sandi Roddy from Johns Hopkins APL on secure key management.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_08.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Australia is investigating an attempted hack of its Federal Parliament. The US Department of Homeland Security warns that spies are working through third parties to get to their targets. Spyware is bundled in a legitimate privacy app. Credit unions get spearphished. Mr. Bezos says, “No thanks, Mr. Pecker.” Apple will pay a FaceTime bug bounty. Microsoft says don’t use IE as a browser. And what they found in that seal scat.  Justin Harvey from Accenture on credential stuffing. Guest is Sandi Roddy from Johns Hopkins APL on secure key management.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_08.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1632</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[46e9f69f6da64ea292ab14544e86b915]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8792510842.mp3?updated=1608755805" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Social engineering and the power of brands. Insecure check-ins? APT10 is quiet but not gone. MacOS Keychain bug. Assessment of Chinese device manufacturers continues. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/776/notes</link>
      <description>In today’s podcast, we hear about social engineering, with a few new twists. Some airlines may be exposing passenger data with insecure check-in links. APT10 may be lying low, for now, but the US Department of Homeland Security expects the cyber spies to be back. A researcher finds a macOS Keychain bug, but would rather not tell Apple about it. Governments in Europe and North America continue to assess risks associated with Huawei and ZTE. And a Trojan hides in The Sims 4. Awais Rashid from Bristol University with thoughts on the challenges of securing smart phones. Carole Theriault explores recent concerns over popular video app VLC Player security issues with Sophos’ Paul Ducklin.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_07.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 07 Feb 2019 18:37:11 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>776</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/82553944-def8-11ea-911f-6bb0619bf7fb/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Social engineering and the power of brands. Insecure check-ins? APT10 is quiet but not gone. MacOS Keychain bug. Assessment of Chinese device manufacturers continues. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear about social engineering, with a few new twists. Some airlines may be exposing passenger data with insecure check-in links. APT10 may be lying low, for now, but the US Department of Homeland Security expects the cyber spies to be back. A researcher finds a macOS Keychain bug, but would rather not tell Apple about it. Governments in Europe and North America continue to assess risks associated with Huawei and ZTE. And a Trojan hides in The Sims 4. Awais Rashid from Bristol University with thoughts on the challenges of securing smart phones. Carole Theriault explores recent concerns over popular video app VLC Player security issues with Sophos’ Paul Ducklin.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_07.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear about social engineering, with a few new twists. Some airlines may be exposing passenger data with insecure check-in links. APT10 may be lying low, for now, but the US Department of Homeland Security expects the cyber spies to be back. A researcher finds a macOS Keychain bug, but would rather not tell Apple about it. Governments in Europe and North America continue to assess risks associated with Huawei and ZTE. And a Trojan hides in The Sims 4. Awais Rashid from Bristol University with thoughts on the challenges of securing smart phones. Carole Theriault explores recent concerns over popular video app VLC Player security issues with Sophos’ Paul Ducklin.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_07.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1317</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d2bb067a642349208d8a093e27eea2ac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7364391667.mp3?updated=1690121552" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>APT10 stays busy. More skepticism about Huawei (and ZTE, for that matter). No foreign “material effect” on US midterms. Reverse RDP risk. IIoT bug found. RSA Innovation Sandbox finalists. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/775/notes</link>
      <description>In today’s podcast, we hear that Chinese threat group APT10 seems to have been busy lately, and up to its familiar industrial espionage. More governments express skepticism about Chinese manufacturers. The US report on election security is out: influence ops were found to have had no material effect on the midterms. Lithuania worries about Russian election meddling. A reverse RDP attack risk is reported. An industrial IoT remote code flaw. And congratulations to the finalists in RSA’s Innovation Sandbox. Emily Wilson from Terbium Labs on biometrics for sale on the dark web. Guest is Katie Nickels from MITRE on the ATT&amp;CK knowledge base.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_06.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 06 Feb 2019 20:41:28 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>775</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/826f3c18-def8-11ea-911f-973424d8456f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>APT10 stays busy. More skepticism about Huawei (and ZTE, for that matter). No foreign “material effect” on US midterms. Reverse RDP risk. IIoT bug found. RSA Innovation Sandbox finalists. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Chinese threat group APT10 seems to have been busy lately, and up to its familiar industrial espionage. More governments express skepticism about Chinese manufacturers. The US report on election security is out: influence ops were found to have had no material effect on the midterms. Lithuania worries about Russian election meddling. A reverse RDP attack risk is reported. An industrial IoT remote code flaw. And congratulations to the finalists in RSA’s Innovation Sandbox. Emily Wilson from Terbium Labs on biometrics for sale on the dark web. Guest is Katie Nickels from MITRE on the ATT&amp;CK knowledge base.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_06.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Chinese threat group APT10 seems to have been busy lately, and up to its familiar industrial espionage. More governments express skepticism about Chinese manufacturers. The US report on election security is out: influence ops were found to have had no material effect on the midterms. Lithuania worries about Russian election meddling. A reverse RDP attack risk is reported. An industrial IoT remote code flaw. And congratulations to the finalists in RSA’s Innovation Sandbox. Emily Wilson from Terbium Labs on biometrics for sale on the dark web. Guest is Katie Nickels from MITRE on the ATT&amp;CK knowledge base.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_06.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1358</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7585f7459e54fb8a6bacb3b03e91e82]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5046896545.mp3?updated=1690121539" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ExileRAT versus Tibet. SpeakUp backdoors Linux. Facebook bans Myanmar militias. Norway sees a threat in Huawei. Westminster gets hacked? Bangladesh Bank sues over SWIFT caper. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/774/notes</link>
      <description>In today’s podcast, we hear that ExileRAT is targeting Tibet’s government-in-exile. The SpeakUp backdoor afflicts many varieties of Linux systems. Facebook bans ethnic militias in Myanmar from its platform. Norway’s PST intelligence service says that Huawei constitutes a security risk, and China says that’s nonsense. Someone seems to be hacking contact lists belonging to UK Members of Parliament. Bangladesh Bank is suing to recover the $81 million missing from its 2016 SWIFT heist. Joe Carrigan from JHU ISI on Facebook’s password flexibility on mobile devices. Guest is Josef Williamson from EclecticIQ on cyber espionage and nation state threats.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_05.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Feb 2019 18:46:28 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>774</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8288a860-def8-11ea-911f-0bb7ccfc4e51/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>ExileRAT versus Tibet. SpeakUp backdoors Linux. Facebook bans Myanmar militias. Norway sees a threat in Huawei. Westminster gets hacked? Bangladesh Bank sues over SWIFT caper. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that ExileRAT is targeting Tibet’s government-in-exile. The SpeakUp backdoor afflicts many varieties of Linux systems. Facebook bans ethnic militias in Myanmar from its platform. Norway’s PST intelligence service says that Huawei constitutes a security risk, and China says that’s nonsense. Someone seems to be hacking contact lists belonging to UK Members of Parliament. Bangladesh Bank is suing to recover the $81 million missing from its 2016 SWIFT heist. Joe Carrigan from JHU ISI on Facebook’s password flexibility on mobile devices. Guest is Josef Williamson from EclecticIQ on cyber espionage and nation state threats.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_05.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that ExileRAT is targeting Tibet’s government-in-exile. The SpeakUp backdoor afflicts many varieties of Linux systems. Facebook bans ethnic militias in Myanmar from its platform. Norway’s PST intelligence service says that Huawei constitutes a security risk, and China says that’s nonsense. Someone seems to be hacking contact lists belonging to UK Members of Parliament. Bangladesh Bank is suing to recover the $81 million missing from its 2016 SWIFT heist. Joe Carrigan from JHU ISI on Facebook’s password flexibility on mobile devices. Guest is Josef Williamson from EclecticIQ on cyber espionage and nation state threats.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_05.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1297</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4926769097e64ae18183a1e2ebf0515e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5923475137.mp3?updated=1690121524" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tracking the impresario behind Collection#1. OceanLotus and a new downloader. CookieMiner malware afflicts Macs. Huawei’ prospects. Influence ops. Extortion by bluff. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/773/notes</link>
      <description>In today’s podcast, we hear that Collection#1 looks like the work of an aggregator who goes by the name of “C0rpz.” OceanLotus is working with a new downloader. CookieMiner malware is poking around in Macs. Huawei continues to receive harsh security scrutiny internationally even as it seeks to position itself as a 5G leader. Russian influencers begin to attend to Venezuela. And if someone says they’ve got video of you looking at things you shouldn’t, they probably don’t. Rick Howard from Palo Alto Networks on Australia’s controversial encryption legislation. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_04.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 04 Feb 2019 20:04:07 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>773</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/82a3fd68-def8-11ea-911f-17bfb1db1ffe/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Tracking the impresario behind Collection#1. OceanLotus and a new downloader. CookieMiner malware afflicts Macs. Huawei’ prospects. Influence ops. Extortion by bluff. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Collection#1 looks like the work of an aggregator who goes by the name of “C0rpz.” OceanLotus is working with a new downloader. CookieMiner malware is poking around in Macs. Huawei continues to receive harsh security scrutiny internationally even as it seeks to position itself as a 5G leader. Russian influencers begin to attend to Venezuela. And if someone says they’ve got video of you looking at things you shouldn’t, they probably don’t. Rick Howard from Palo Alto Networks on Australia’s controversial encryption legislation. 
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_04.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Collection#1 looks like the work of an aggregator who goes by the name of “C0rpz.” OceanLotus is working with a new downloader. CookieMiner malware is poking around in Macs. Huawei continues to receive harsh security scrutiny internationally even as it seeks to position itself as a 5G leader. Russian influencers begin to attend to Venezuela. And if someone says they’ve got video of you looking at things you shouldn’t, they probably don’t. Rick Howard from Palo Alto Networks on Australia’s controversial encryption legislation. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_04.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1149</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[25b30a9f82794be282fa29893c579309]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1882335479.mp3?updated=1690121485" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Online underground markets in the Middle East. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/71/notes</link>
      <description>Researchers at Trend Micro recently published their look inside online underground marketplaces in the Middle East and North Africa, where criminals are buying and selling malware, laundering money and event booking their next discount vacation.
Jon Clay is director of global threat communications at Trend Micro, and he joins us with their findings. 

The original research can be found here:
 https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/cash-and-communication-new-trends-in-the-middle-east-and-north-africa-underground
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Feb 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>71</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/001b028e-df10-11ea-9447-4f5476c5250f/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Online underground markets in the Middle East. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at Trend Micro recently published their look inside online underground marketplaces in the Middle East and North Africa, where criminals are buying and selling malware, laundering money and event booking their next discount vacation.
Jon Clay is director of global threat communications at Trend Micro, and he joins us with their findings. 

The original research can be found here:
 https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/cash-and-communication-new-trends-in-the-middle-east-and-north-africa-underground
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Trend Micro recently published their look inside online underground marketplaces in the Middle East and North Africa, where criminals are buying and selling malware, laundering money and event booking their next discount vacation.</p><p>Jon Clay is director of global threat communications at Trend Micro, and he joins us with their findings. </p><p><br></p><p>The original research can be found here:</p><p><a href="https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/cash-and-communication-new-trends-in-the-middle-east-and-north-africa-underground"> https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/cash-and-communication-new-trends-in-the-middle-east-and-north-africa-underground</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1238</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9d05d911cffd43a6a647141f9db12c74]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5705885994.mp3?updated=1685022844" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No more Apple time-out for Facebook and Google. Inauthentic sites taken down. Fancy Bear paws at Washington, again. Malware-serving ads. Amplification DDoS. Data exposures in India. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/772/notes</link>
      <description>In today’s podcast, we hear that Apple has let Facebook and Google out of time-out. Russia decides it would like access to Apple data because, you know, its Russian law. Social networks take down large numbers of inauthentic accounts. Fancy Bear is snuffling around Washington again, already, with some spoofed think-tank sites. Shape shifting campaign afflicts ads. China sees CoAPP DDoS attacks. An Aadhaar breach hits an Indian state as the SBI bank recovers from a data exposure incident. Johannes Ullrich from SANS and the ISC Stormcast Podcast on the effectiveness of blocklists. Guest is Daniel Faggella from Emerj Artificial Intelligence Research on the future of AI and security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_01.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 01 Feb 2019 20:49:17 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>772</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/82ba1058-def8-11ea-911f-032aa40411cf/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>No more Apple time-out for Facebook and Google. Inauthentic sites taken down. Fancy Bear paws at Washington, again. Malware-serving ads. Amplification DDoS. Data exposures in India. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Apple has let Facebook and Google out of time-out. Russia decides it would like access to Apple data because, you know, its Russian law. Social networks take down large numbers of inauthentic accounts. Fancy Bear is snuffling around Washington again, already, with some spoofed think-tank sites. Shape shifting campaign afflicts ads. China sees CoAPP DDoS attacks. An Aadhaar breach hits an Indian state as the SBI bank recovers from a data exposure incident. Johannes Ullrich from SANS and the ISC Stormcast Podcast on the effectiveness of blocklists. Guest is Daniel Faggella from Emerj Artificial Intelligence Research on the future of AI and security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_01.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Apple has let Facebook and Google out of time-out. Russia decides it would like access to Apple data because, you know, its Russian law. Social networks take down large numbers of inauthentic accounts. Fancy Bear is snuffling around Washington again, already, with some spoofed think-tank sites. Shape shifting campaign afflicts ads. China sees CoAPP DDoS attacks. An Aadhaar breach hits an Indian state as the SBI bank recovers from a data exposure incident. Johannes Ullrich from SANS and the ISC Stormcast Podcast on the effectiveness of blocklists. Guest is Daniel Faggella from Emerj Artificial Intelligence Research on the future of AI and security.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2019/February/CyberWire_2019_02_01.html </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1601</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8b537bd3d87949d1b114a603679045b6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3175274139.mp3?updated=1608755790" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Commodity credential stuffing gets four new collections. Google was also doing a pay-to-pwn, like Facebook. Russian trolling. FaceTime bug investigation. Joanap botnet. Other online scams.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/771/notes</link>
      <description>In today’s podcast, we hear that Collections #2 through #5 have joined Collection #1 in hacker fora. Google is found to be collecting data from devices in much the same way its advertising peer Facebook was. Russian trolls seek to discredit the Special Counsel’s investigation of influence ops. New York State opens an investigation into Apple’s response to the FaceTIme bug. The US Department of Justice aims to disrupt a North Korean botnet. And a rundown of some current online scams. Mike Benjamin from Century Link with information on TheMoon botnet and how it targets websites. Guest is Lewie Dunsworth, CISO &amp; Executive Vice President of Technical Operations at Herjavec Group on projected increases in ransomware aimed at hospitals.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_31.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 31 Jan 2019 20:06:21 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>771</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/82d1eb92-def8-11ea-911f-4f50f23387b8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Commodity credential stuffing gets four new collections. Google was also doing a pay-to-pwn, like Facebook. Russian trolling. FaceTime bug investigation. Joanap botnet. Other online scams.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Collections #2 through #5 have joined Collection #1 in hacker fora. Google is found to be collecting data from devices in much the same way its advertising peer Facebook was. Russian trolls seek to discredit the Special Counsel’s investigation of influence ops. New York State opens an investigation into Apple’s response to the FaceTIme bug. The US Department of Justice aims to disrupt a North Korean botnet. And a rundown of some current online scams. Mike Benjamin from Century Link with information on TheMoon botnet and how it targets websites. Guest is Lewie Dunsworth, CISO &amp; Executive Vice President of Technical Operations at Herjavec Group on projected increases in ransomware aimed at hospitals.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_31.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Collections #2 through #5 have joined Collection #1 in hacker fora. Google is found to be collecting data from devices in much the same way its advertising peer Facebook was. Russian trolls seek to discredit the Special Counsel’s investigation of influence ops. New York State opens an investigation into Apple’s response to the FaceTIme bug. The US Department of Justice aims to disrupt a North Korean botnet. And a rundown of some current online scams. Mike Benjamin from Century Link with information on TheMoon botnet and how it targets websites. Guest is Lewie Dunsworth, CISO &amp; Executive Vice President of Technical Operations at Herjavec Group on projected increases in ransomware aimed at hospitals.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p><a href="https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_31.html"> https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_31.html</a></p> <p> </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1325</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3bc74b238a0b48e6a1b95bab1e5d13ac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3273728385.mp3?updated=1690120886" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US IC on cyber threats. Iran goes after PII. UAE surveillance described. Scanning for unpatched routers. Huawei’s possible fates. Scam exploits child. FaceTime disclosure. Facebook Research.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/770/notes</link>
      <description>In today’s CyberWire, we hear that US Intelligence Community leaders testify that the major cyber threat comes from Russia, China, North Korea, and Iran. Iran’s APT39 takes an interest in PII. A UAE surveillance program is revealed. Hackers scanning for unpatched Cisco routers. What Huawei faces, in addition to fines. The FaceTime bug and responsible disclosure. Facebook was paying people to pwn their phones. Scam artists exploit a small disabled girl. And the Government shutdown’s mixed effect on cybersecurity. Craig Williams from Cisco Talos on Pylocky, a ransomware strain they’ve been tracking. Guest is Mark Orlando from Raytheon on safeguarding online information.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_30.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 30 Jan 2019 20:35:51 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>770</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/82ea5e7a-def8-11ea-911f-af44f7d46439/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>US IC on cyber threats. Iran goes after PII. UAE surveillance described. Scanning for unpatched routers. Huawei’s possible fates. Scam exploits child. FaceTime disclosure. Facebook Research.</itunes:subtitle>
      <itunes:summary>In today’s CyberWire, we hear that US Intelligence Community leaders testify that the major cyber threat comes from Russia, China, North Korea, and Iran. Iran’s APT39 takes an interest in PII. A UAE surveillance program is revealed. Hackers scanning for unpatched Cisco routers. What Huawei faces, in addition to fines. The FaceTime bug and responsible disclosure. Facebook was paying people to pwn their phones. Scam artists exploit a small disabled girl. And the Government shutdown’s mixed effect on cybersecurity. Craig Williams from Cisco Talos on Pylocky, a ransomware strain they’ve been tracking. Guest is Mark Orlando from Raytheon on safeguarding online information.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_30.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s CyberWire, we hear that US Intelligence Community leaders testify that the major cyber threat comes from Russia, China, North Korea, and Iran. Iran’s APT39 takes an interest in PII. A UAE surveillance program is revealed. Hackers scanning for unpatched Cisco routers. What Huawei faces, in addition to fines. The FaceTime bug and responsible disclosure. Facebook was paying people to pwn their phones. Scam artists exploit a small disabled girl. And the Government shutdown’s mixed effect on cybersecurity. Craig Williams from Cisco Talos on Pylocky, a ransomware strain they’ve been tracking. Guest is Mark Orlando from Raytheon on safeguarding online information.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p><a href="https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_30.html"> https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_30.html</a></p> <p> </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1309</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[10d5e99bd8cf4b01a56ec9e39e819825]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7338282443.mp3?updated=1690120873" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Case studies in risk and regulation. [CyberWire-X]</title>
      <link>https://thecyberwire.com/podcasts/cyberwire-x/4/notes</link>
      <description>In the final episode of our four-part series, called “Ground Truth or Consequences: the challenges and opportunities of regulation in cyberspace,” we examine some of the game changing high profile breaches like Yahoo, Equifax and OPM, along with their impacts and lessons learned.
Our guest is Dr. Christopher Pierson, CEO and founder of BlackCloak.
Later in the program we'll hear from Jason Hart, CTO for enterprise and cybersecurity at Gemalto. They're the sponsors of this show.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 30 Jan 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/27f57d20-df01-11ea-b138-b3a59a41c228/image/cyberwire-x-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Case studies in risk and regulation. [CyberWire-X]</itunes:subtitle>
      <itunes:summary>In the final episode of our four-part series, called “Ground Truth or Consequences: the challenges and opportunities of regulation in cyberspace,” we examine some of the game changing high profile breaches like Yahoo, Equifax and OPM, along with their impacts and lessons learned.
Our guest is Dr. Christopher Pierson, CEO and founder of BlackCloak.
Later in the program we'll hear from Jason Hart, CTO for enterprise and cybersecurity at Gemalto. They're the sponsors of this show.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In the final episode of our four-part series, called “Ground Truth or Consequences: the challenges and opportunities of regulation in cyberspace,” we examine some of the game changing high profile breaches like Yahoo, Equifax and OPM, along with their impacts and lessons learned.</p><p>Our guest is Dr. Christopher Pierson, CEO and founder of BlackCloak.</p><p>Later in the program we'll hear from Jason Hart, CTO for enterprise and cybersecurity at Gemalto. They're the sponsors of this show.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1932</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2060570cd690444c85485a049a2a62d3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7859353921.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FaceTime’s odd bug, and how to squash it. FormBook malware surges through a new hosting service. Some international law enforcement wins. International conflict in cyberspace. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/769/notes</link>
      <description>In today’s podcast, we hear that a FaceTime bug lets you listen to someone’s phone before they’ve even picked up. FormBook malware’s surge is abetted by a new hosting service. Compromised server market xDedic has been taken down. Europol is looking for Webstressor users. Huawei faces new US criminal charges. Kim’s ambitious economic plan may augur ambitious North Korean hacking. EU foretells a surge in Iranian cyberattacks. Waiting for information operations around the Venezuelan crisis. Joe Carrigan from JHU ISI on legacy Twitter location data privacy issues. Guest is Jamil Jaffer from IronNet Cybersecurity with highlights from his recent Capital Hill briefing, “Nation-State Threats, Collective Defense, and Strategic Deterrence in Cyberspace: (How) Can We Get Better Fast?”
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_29.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Jan 2019 20:37:47 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>769</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/82feaeca-def8-11ea-911f-a7c8a3965993/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>FaceTime’s odd bug, and how to squash it. FormBook malware surges through a new hosting service. Some international law enforcement wins. International conflict in cyberspace. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that a FaceTime bug lets you listen to someone’s phone before they’ve even picked up. FormBook malware’s surge is abetted by a new hosting service. Compromised server market xDedic has been taken down. Europol is looking for Webstressor users. Huawei faces new US criminal charges. Kim’s ambitious economic plan may augur ambitious North Korean hacking. EU foretells a surge in Iranian cyberattacks. Waiting for information operations around the Venezuelan crisis. Joe Carrigan from JHU ISI on legacy Twitter location data privacy issues. Guest is Jamil Jaffer from IronNet Cybersecurity with highlights from his recent Capital Hill briefing, “Nation-State Threats, Collective Defense, and Strategic Deterrence in Cyberspace: (How) Can We Get Better Fast?”
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_29.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that a FaceTime bug lets you listen to someone’s phone before they’ve even picked up. FormBook malware’s surge is abetted by a new hosting service. Compromised server market xDedic has been taken down. Europol is looking for Webstressor users. Huawei faces new US criminal charges. Kim’s ambitious economic plan may augur ambitious North Korean hacking. EU foretells a surge in Iranian cyberattacks. Waiting for information operations around the Venezuelan crisis. Joe Carrigan from JHU ISI on legacy Twitter location data privacy issues. Guest is Jamil Jaffer from IronNet Cybersecurity with highlights from his recent Capital Hill briefing, “Nation-State Threats, Collective Defense, and Strategic Deterrence in Cyberspace: (How) Can We Get Better Fast?”</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p><a href="https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_29.html"> https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_29.html</a></p> <p> </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1321</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[92f2b6e394e04ac1840b2ef5fc146283]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3609283270.mp3?updated=1690120859" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Someone takes an unhealthy interest in Citizen Lab. Ukraines accuses Russia of election phishing. Russian bigshots doxed. Tension over Venezuela. Swatting indictments. National Privacy Day.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/768/notes</link>
      <description>In today’s podcast, we hear about some Spy vs. Spy at Citizen Lab, but who the spies were working for isn’t clear. Ukraine’s cyber police accuse Russia of phishing for election influence. As Fortuna’s wheel turns, Russian bigwigs get doxed by transparency hacktivists. Great power tension over Venezuela bears watching in cyberspace. Alleged swatters indicted and arrested. Happy National Privacy Day. Emily Wilson from Terbium Labs on “fullz” records of children being sold on the dark web. Guest is Sean Lyngaas from CyberScoop with his insights on the DNS hijacking threat.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_28.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 28 Jan 2019 20:35:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>768</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/831d5e42-def8-11ea-911f-a77da5b37fef/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Someone takes an unhealthy interest in Citizen Lab. Ukraines accuses Russia of election phishing. Russian bigshots doxed. Tension over Venezuela. Swatting indictments. National Privacy Day.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear about some Spy vs. Spy at Citizen Lab, but who the spies were working for isn’t clear. Ukraine’s cyber police accuse Russia of phishing for election influence. As Fortuna’s wheel turns, Russian bigwigs get doxed by transparency hacktivists. Great power tension over Venezuela bears watching in cyberspace. Alleged swatters indicted and arrested. Happy National Privacy Day. Emily Wilson from Terbium Labs on “fullz” records of children being sold on the dark web. Guest is Sean Lyngaas from CyberScoop with his insights on the DNS hijacking threat.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_28.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear about some Spy vs. Spy at Citizen Lab, but who the spies were working for isn’t clear. Ukraine’s cyber police accuse Russia of phishing for election influence. As Fortuna’s wheel turns, Russian bigwigs get doxed by transparency hacktivists. Great power tension over Venezuela bears watching in cyberspace. Alleged swatters indicted and arrested. Happy National Privacy Day. Emily Wilson from Terbium Labs on “fullz” records of children being sold on the dark web. Guest is Sean Lyngaas from CyberScoop with his insights on the DNS hijacking threat.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p><a href="https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_28.html"> https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_28.html</a></p> <p> </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1230</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[27647f805a76489c807f1ad0164ab3b0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7955131901.mp3?updated=1690120841" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Amplification bots and how to detect them. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/70/notes</link>
      <description>Researchers from Duo Security have been analyzing the behavior of Twitter bots in a series of posts on their web site. Their most recent dive into the subject explores amplification bots, which boost the impact of tweets through likes and retweets.

Jordan Wright is a principal R&amp;D engineer at Duo Security, and he joins us to share their findings.
Link to the original research - 
 https://duo.com/labs/research/anatomy-of-twitter-bots-amplification-bots
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 Jan 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>70</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7175b290-df0f-11ea-98a8-9bbf3793b2a0/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Amplification bots and how to detect them. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers from Duo Security have been analyzing the behavior of Twitter bots in a series of posts on their web site. Their most recent dive into the subject explores amplification bots, which boost the impact of tweets through likes and retweets.

Jordan Wright is a principal R&amp;D engineer at Duo Security, and he joins us to share their findings.
Link to the original research - 
 https://duo.com/labs/research/anatomy-of-twitter-bots-amplification-bots
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers from Duo Security have been analyzing the behavior of Twitter bots in a series of posts on their web site. Their most recent dive into the subject explores amplification bots, which boost the impact of tweets through likes and retweets.</p><p><br></p><p>Jordan Wright is a principal R&amp;D engineer at Duo Security, and he joins us to share their findings.</p><p>Link to the original research - </p><p><a href="https://duo.com/labs/research/anatomy-of-twitter-bots-amplification-bots"> https://duo.com/labs/research/anatomy-of-twitter-bots-amplification-bots</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1273</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[977fbead5fd0414aa7364f476f91a0fe]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7576965644.mp3?updated=1685022834" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Glitches, not attacks or takedowns. Tracing Gray Energy and Zebrocy back to their servers. US Army tactical cyber operations. Venezuela crisis. Bellingcat and OSINT. Roger Stone arrested.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/767/notes</link>
      <description>In today’s podcast, we hear that two potential cyberattacks now look like glitches. Gray Energy and Zebrocy look as if they’re close enough to be, if not the same threat actor, at least first cousins. The US Army pushes significant cyber capability to a tactical level. Venezuela’s crisis may provide the next occasion for Russian information operations. How Bellingcat exposes info operations. Special Counsel Mueller secures the indictment and arrest of Roger Stone. And leave the Nest alone. Dr. Charles Clancy from the Hume Center at VA Tech on confusing marketing claims from AT&amp;T with regard to 5G cellular technology. Guest is P. W. Singer, author of the book LikeWar, the Weaponization of Social Media.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_25.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 25 Jan 2019 20:19:17 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>767</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/83338b5e-def8-11ea-911f-839bf5b33c2a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Glitches, not attacks or takedowns. Tracing Gray Energy and Zebrocy back to their servers. US Army tactical cyber operations. Venezuela crisis. Bellingcat and OSINT. Roger Stone arrested.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that two potential cyberattacks now look like glitches. Gray Energy and Zebrocy look as if they’re close enough to be, if not the same threat actor, at least first cousins. The US Army pushes significant cyber capability to a tactical level. Venezuela’s crisis may provide the next occasion for Russian information operations. How Bellingcat exposes info operations. Special Counsel Mueller secures the indictment and arrest of Roger Stone. And leave the Nest alone. Dr. Charles Clancy from the Hume Center at VA Tech on confusing marketing claims from AT&amp;T with regard to 5G cellular technology. Guest is P. W. Singer, author of the book LikeWar, the Weaponization of Social Media.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_25.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that two potential cyberattacks now look like glitches. Gray Energy and Zebrocy look as if they’re close enough to be, if not the same threat actor, at least first cousins. The US Army pushes significant cyber capability to a tactical level. Venezuela’s crisis may provide the next occasion for Russian information operations. How Bellingcat exposes info operations. Special Counsel Mueller secures the indictment and arrest of Roger Stone. And leave the Nest alone. Dr. Charles Clancy from the Hume Center at VA Tech on confusing marketing claims from AT&amp;T with regard to 5G cellular technology. Guest is P. W. Singer, author of the book LikeWar, the Weaponization of Social Media.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p><a href="https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_25.html"> https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_25.html</a></p> <p> </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1577</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[58639e3bbc324a6f83152cf03c09b0b9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7693643183.mp3?updated=1608755787" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The US House of Representatives wants to know more about DNS-hijacking. Huawei skepticism. Anonymous dunnit, say the Russians. Financial data exposed. Family spooked by hackers.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/766/notes</link>
      <description>In today’s podcast, we hear that the US House would like some more information from DHS about what prompted its emergency directive about DNS hijacking. More skepticism about Huawei from various governments. A British think tank has been hacked—observers think Russia’s GRU is good for it, but Russia says no, hey, it was Anonymous, and they did a good job. Exposed database leaves financial information out for the taking. Creeps take over a family’s Nest. Ben Yelin from UMD CHHS with a 4th amendment  personal privacy case out of Alaska. Guest is Kathleen Smith from CybersecJobs.com and ClearedJobs.net on the career benefits of volunteering.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_24.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 24 Jan 2019 20:46:16 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>766</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/834457c2-def8-11ea-911f-a30e447db4a4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The US House of Representatives wants to know more about DNS-hijacking. Huawei skepticism. Anonymous dunnit, say the Russians. Financial data exposed. Family spooked by hackers.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that the US House would like some more information from DHS about what prompted its emergency directive about DNS hijacking. More skepticism about Huawei from various governments. A British think tank has been hacked—observers think Russia’s GRU is good for it, but Russia says no, hey, it was Anonymous, and they did a good job. Exposed database leaves financial information out for the taking. Creeps take over a family’s Nest. Ben Yelin from UMD CHHS with a 4th amendment  personal privacy case out of Alaska. Guest is Kathleen Smith from CybersecJobs.com and ClearedJobs.net on the career benefits of volunteering.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_24.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that the US House would like some more information from DHS about what prompted its emergency directive about DNS hijacking. More skepticism about Huawei from various governments. A British think tank has been hacked—observers think Russia’s GRU is good for it, but Russia says no, hey, it was Anonymous, and they did a good job. Exposed database leaves financial information out for the taking. Creeps take over a family’s Nest. Ben Yelin from UMD CHHS with a 4th amendment  personal privacy case out of Alaska. Guest is Kathleen Smith from CybersecJobs.com and ClearedJobs.net on the career benefits of volunteering.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p><a href="https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_24.html"> https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_24.html</a></p> <p> </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1297</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a3e4e2996f314265b1ffcfcff4d7d54f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1617791235.mp3?updated=1690120805" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Emergency Directive 19-01 versus DNS hijacking. 2019 US National Intelligence Strategy on cyber. France says cyber war is upon us. Courts in UK have email trouble. Hacks and lulz.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/765/notes</link>
      <description>In today’s podcast, we hear that Emergency Directive 19-01 has told US Federal civilian agencies to take steps to stop an ongoing DNS-hijacking campaign. The US National Intelligence Strategy is out, and it prominently features cyber as a “topical mission objective.” France says that war has begun in cyberspace, and that the enemy should be en garde. British barristers scramble to restore secure email. A metals firm sustains an attack on business systems. And some clown cuts Australian telecoms cables. Justin Harvey from Accenture on blocking incoming threats. Guest is Tom Huckle from Crucial on closing the skills gap.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_23.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 23 Jan 2019 20:01:09 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>765</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8358147e-def8-11ea-911f-af59025bbbd9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Emergency Directive 19-01 versus DNS hijacking. 2019 US National Intelligence Strategy on cyber. France says cyber war is upon us. Courts in UK have email trouble. Hacks and lulz.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Emergency Directive 19-01 has told US Federal civilian agencies to take steps to stop an ongoing DNS-hijacking campaign. The US National Intelligence Strategy is out, and it prominently features cyber as a “topical mission objective.” France says that war has begun in cyberspace, and that the enemy should be en garde. British barristers scramble to restore secure email. A metals firm sustains an attack on business systems. And some clown cuts Australian telecoms cables. Justin Harvey from Accenture on blocking incoming threats. Guest is Tom Huckle from Crucial on closing the skills gap.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_23.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Emergency Directive 19-01 has told US Federal civilian agencies to take steps to stop an ongoing DNS-hijacking campaign. The US National Intelligence Strategy is out, and it prominently features cyber as a “topical mission objective.” France says that war has begun in cyberspace, and that the enemy should be en garde. British barristers scramble to restore secure email. A metals firm sustains an attack on business systems. And some clown cuts Australian telecoms cables. Justin Harvey from Accenture on blocking incoming threats. Guest is Tom Huckle from Crucial on closing the skills gap.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p><a href="https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_23.html"> https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_23.html</a></p> <p> </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1234</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3ca0c299585a488bb83942916ee69cb3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9289754416.mp3?updated=1690120789" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ex-employee backdoor. Stealthy DDoS. Anubis dropper looks for motion. Influence operations. Privacy actions. The curious case of the espionage arrest in Russia. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/764/notes</link>
      <description>In today’s podcast, we hear that the WordPress Multilingual Plugin was compromised by a disgruntled ex-employee. Stealthy DDoS might escape notice. Anubis droppers wait for the phone to move before executing. EU works against influence in its May elections. France fines Google for lack of transparency under GDPR. Facebook may face FTC action. And more emerges on the curious case of the American/Canadian/Irish/British citizen arrested in Moscow for spying.  Johannes Ullrich from SANS and the ISC Stormcast podcast on gift card scams. Carole Theriault speaks with guest Maria Varmazis about Fortnite vulnerabilities.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_22.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Jan 2019 20:23:28 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>764</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8371aaba-def8-11ea-911f-132be662a583/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ex-employee backdoor. Stealthy DDoS. Anubis dropper looks for motion. Influence operations. Privacy actions. The curious case of the espionage arrest in Russia. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that the WordPress Multilingual Plugin was compromised by a disgruntled ex-employee. Stealthy DDoS might escape notice. Anubis droppers wait for the phone to move before executing. EU works against influence in its May elections. France fines Google for lack of transparency under GDPR. Facebook may face FTC action. And more emerges on the curious case of the American/Canadian/Irish/British citizen arrested in Moscow for spying.  Johannes Ullrich from SANS and the ISC Stormcast podcast on gift card scams. Carole Theriault speaks with guest Maria Varmazis about Fortnite vulnerabilities.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_22.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that the WordPress Multilingual Plugin was compromised by a disgruntled ex-employee. Stealthy DDoS might escape notice. Anubis droppers wait for the phone to move before executing. EU works against influence in its May elections. France fines Google for lack of transparency under GDPR. Facebook may face FTC action. And more emerges on the curious case of the American/Canadian/Irish/British citizen arrested in Moscow for spying.  Johannes Ullrich from SANS and the ISC Stormcast podcast on gift card scams. Carole Theriault speaks with guest Maria Varmazis about Fortnite vulnerabilities.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p><a href="https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_22.html"> https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_22.html</a></p> <p> </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1341</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[68f263c39398404da7af2a05dced27d3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2403226125.mp3?updated=1690120774" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Luring IoT botnets to the honeypot. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/69/notes</link>
      <description>Researchers from Netscout's ASERT team have been making use of honeypots to gather information on rapidly evolving IoT botnets that take advantage of default usernames and passwords to gain access and take control of unprotected devices.
Matt Bing is a security research analyst with Netscout, and he guides us through their findings.
The original research can be found here:
https://asert.arbornetworks.com/dipping-into-the-honeypot/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 Jan 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>69</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6ee8e056-df0f-11ea-98a8-7bcb76911ec4/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Luring IoT botnets to the honeypot. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers from Netscout's ASERT team have been making use of honeypots to gather information on rapidly evolving IoT botnets that take advantage of default usernames and passwords to gain access and take control of unprotected devices.
Matt Bing is a security research analyst with Netscout, and he guides us through their findings.
The original research can be found here:
https://asert.arbornetworks.com/dipping-into-the-honeypot/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers from Netscout's ASERT team have been making use of honeypots to gather information on rapidly evolving IoT botnets that take advantage of default usernames and passwords to gain access and take control of unprotected devices.</p><p>Matt Bing is a security research analyst with Netscout, and he guides us through their findings.</p><p>The original research can be found here:</p><p><a href="https://asert.arbornetworks.com/dipping-into-the-honeypot/">https://asert.arbornetworks.com/dipping-into-the-honeypot/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1292</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e99e390078794f99817a403e401c62bf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4638501185.mp3?updated=1685022826" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Collection #1 and the threat of credential stuffing. Cryptojacker disables some cloud security tools. Don’t chat with strange bots. Facbebook shutters more Russian coordinated inauthenticity.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/763/notes</link>
      <description>In today’s podcast we hear that Collection #1 is big but not the end-of-the-world. Still, be on the lookout for credential stuffing attacks. Rocke cryptojacker can disable some cloud security services. Beware of Telegram bots. Facebook shuts down a few hundred inauthentic Russian pages, and Sputnik shows up as either a free-speech paladin or another troll farm—take your pick. Epic Games closes a vulnerability that exposed data of Fortnite players. Malek Ben Salem from Accenture Labs on power grid vulnerabilities to botnets. Guest is former U.S. Secretary of Homeland Security Michael Chertoff discussing his book Exploding Data.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_18.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 18 Jan 2019 18:54:25 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>763</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8384e40e-def8-11ea-911f-ab45fe16664c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Collection #1 and the threat of credential stuffing. Cryptojacker disables some cloud security tools. Don’t chat with strange bots. Facbebook shutters more Russian coordinated inauthenticity.</itunes:subtitle>
      <itunes:summary>In today’s podcast we hear that Collection #1 is big but not the end-of-the-world. Still, be on the lookout for credential stuffing attacks. Rocke cryptojacker can disable some cloud security services. Beware of Telegram bots. Facebook shuts down a few hundred inauthentic Russian pages, and Sputnik shows up as either a free-speech paladin or another troll farm—take your pick. Epic Games closes a vulnerability that exposed data of Fortnite players. Malek Ben Salem from Accenture Labs on power grid vulnerabilities to botnets. Guest is former U.S. Secretary of Homeland Security Michael Chertoff discussing his book Exploding Data.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_18.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear that Collection #1 is big but not the end-of-the-world. Still, be on the lookout for credential stuffing attacks. Rocke cryptojacker can disable some cloud security services. Beware of Telegram bots. Facebook shuts down a few hundred inauthentic Russian pages, and Sputnik shows up as either a free-speech paladin or another troll farm—take your pick. Epic Games closes a vulnerability that exposed data of Fortnite players. Malek Ben Salem from Accenture Labs on power grid vulnerabilities to botnets. Guest is former U.S. Secretary of Homeland Security Michael Chertoff discussing his book Exploding Data.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p><a href="https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_18.html"> https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_18.html</a></p> <p> </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1657</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6d75b17b5cbf409eae5dfd99c7836525]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4829973905.mp3?updated=1608755809" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber espionage vs. the RoK MoD. Fancy Bear’s old Lojax tricks. US rumored to be prepping another case against Huawei. Database exposure in Oklahoma. Yes Men prank Post.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/762/notes</link>
      <description>In today’s podcast, we hear that South Korea’s Defense Ministry has disclosed a cyber espionage incident. Fancy Bear sticks to its old tricks with Lojax. The US Justice Department is rumored not to be done with Huawei—this time an IP theft beef is believed to be coming. A big database exposure case in Oklahoma. And an update on yesterday's bogus Washington Post edition: it was a prank by the Yes Men. Mike Benjamin from Century Link with an update on the Mylobot botnet. Guest is Angie White from Iovation on PSD2, the payment services directive update.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_17.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 17 Jan 2019 16:16:28 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>762</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8399ee76-def8-11ea-911f-eb416ed8723f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyber espionage vs. the RoK MoD. Fancy Bear’s old Lojax tricks. US rumored to be prepping another case against Huawei. Database exposure in Oklahoma. Yes Men prank Post.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that South Korea’s Defense Ministry has disclosed a cyber espionage incident. Fancy Bear sticks to its old tricks with Lojax. The US Justice Department is rumored not to be done with Huawei—this time an IP theft beef is believed to be coming. A big database exposure case in Oklahoma. And an update on yesterday's bogus Washington Post edition: it was a prank by the Yes Men. Mike Benjamin from Century Link with an update on the Mylobot botnet. Guest is Angie White from Iovation on PSD2, the payment services directive update.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_17.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that South Korea’s Defense Ministry has disclosed a cyber espionage incident. Fancy Bear sticks to its old tricks with Lojax. The US Justice Department is rumored not to be done with Huawei—this time an IP theft beef is believed to be coming. A big database exposure case in Oklahoma. And an update on yesterday's bogus Washington Post edition: it was a prank by the Yes Men. Mike Benjamin from Century Link with an update on the Mylobot botnet. Guest is Angie White from Iovation on PSD2, the payment services directive update.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p><a href="https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_17.html"> https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_17.html</a></p> <p> </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1297</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3555ec987f7e499daa1dcab07edfd20f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2853192081.mp3?updated=1690120718" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SEC, DoJ, issue civil and criminal complaints against EDGAR hackers. Lazarus Group in Chile? Iran’s Ashiyane Forum. Cryptomix ransomware. Money laundering through Fortnite. Fake WaPo edition.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/761/notes</link>
      <description>In today’s podcast, we hear that the SEC and the Department of Justice are going after EDGAR hackers for securities fraud. Flashpoint sees the Lazarus Group in an attack on Chile’s Redbanc. Recorded Future shares notes on Iran’s Ashiyane Forum. Crytpomix ransomware is being distributed by fraudulent charitable appeals. Organized gangs are using Fortnite in-game currency for money laundering. A slickly done bogus edition of the Washington Post was being handed out in DC this morning. Ben Yelin from UMD CHHS on a recent ruling regarding 5th amendment protections for biometrics. Guest is Kevin O’Brien from GreatHorn on techniques to improve email security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_16.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 16 Jan 2019 18:17:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>761</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/83b372ec-def8-11ea-911f-f737122dcfec/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>SEC, DoJ, issue civil and criminal complaints against EDGAR hackers. Lazarus Group in Chile? Iran’s Ashiyane Forum. Cryptomix ransomware. Money laundering through Fortnite. Fake WaPo edition.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that the SEC and the Department of Justice are going after EDGAR hackers for securities fraud. Flashpoint sees the Lazarus Group in an attack on Chile’s Redbanc. Recorded Future shares notes on Iran’s Ashiyane Forum. Crytpomix ransomware is being distributed by fraudulent charitable appeals. Organized gangs are using Fortnite in-game currency for money laundering. A slickly done bogus edition of the Washington Post was being handed out in DC this morning. Ben Yelin from UMD CHHS on a recent ruling regarding 5th amendment protections for biometrics. Guest is Kevin O’Brien from GreatHorn on techniques to improve email security.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_16.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that the SEC and the Department of Justice are going after EDGAR hackers for securities fraud. Flashpoint sees the Lazarus Group in an attack on Chile’s Redbanc. Recorded Future shares notes on Iran’s Ashiyane Forum. Crytpomix ransomware is being distributed by fraudulent charitable appeals. Organized gangs are using Fortnite in-game currency for money laundering. A slickly done bogus edition of the Washington Post was being handed out in DC this morning. Ben Yelin from UMD CHHS on a recent ruling regarding 5th amendment protections for biometrics. Guest is Kevin O’Brien from GreatHorn on techniques to improve email security.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p><a href="https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_16.html"> https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_16.html</a></p> <p> </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1333</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a2c669cfe9d44677a78931c9fefc4575]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6509409985.mp3?updated=1690120697" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Web hosts fix account takeover issues. Passenger Name Record exposure proof-of-concept. Swatting isn’t funny. Chinese manufacturers and suspicions of espinonage. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/760/notes</link>
      <description>In today’s podcast, we hear that a bug hunter has found and responsibly disclosed issues in web hosts. Compromising Passenger Name Records in airline reservations. Business email compromise seems on the rise, and it’s also growing a bit more interactive. A Facebook executive is swatted, and absolutely nobody should dismiss this sort of thing as a joke. China would like everyone to stop saying bad stuff about Huawei, but the Polish government seems unconvinced that there’s nothing to see here. Rick Howard from Palo Alto Networks, revisiting the notion of a cyber moon shot. Carole Theriault reports on a hack of the Australian emergency warning system. She speaks with Paul Baccas from Proofpoint.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_15.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Jan 2019 20:27:54 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>760</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/83c5fca0-def8-11ea-911f-83dd9cf32182/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Web hosts fix account takeover issues. Passenger Name Record exposure proof-of-concept. Swatting isn’t funny. Chinese manufacturers and suspicions of espinonage. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that a bug hunter has found and responsibly disclosed issues in web hosts. Compromising Passenger Name Records in airline reservations. Business email compromise seems on the rise, and it’s also growing a bit more interactive. A Facebook executive is swatted, and absolutely nobody should dismiss this sort of thing as a joke. China would like everyone to stop saying bad stuff about Huawei, but the Polish government seems unconvinced that there’s nothing to see here. Rick Howard from Palo Alto Networks, revisiting the notion of a cyber moon shot. Carole Theriault reports on a hack of the Australian emergency warning system. She speaks with Paul Baccas from Proofpoint.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_15.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that a bug hunter has found and responsibly disclosed issues in web hosts. Compromising Passenger Name Records in airline reservations. Business email compromise seems on the rise, and it’s also growing a bit more interactive. A Facebook executive is swatted, and absolutely nobody should dismiss this sort of thing as a joke. China would like everyone to stop saying bad stuff about Huawei, but the Polish government seems unconvinced that there’s nothing to see here. Rick Howard from Palo Alto Networks, revisiting the notion of a cyber moon shot. Carole Theriault reports on a hack of the Australian emergency warning system. She speaks with Paul Baccas from Proofpoint.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p><a href="https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_15.html"> https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_15.html</a></p> <p> </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1287</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[94d1340b065e4770a039e57db0d9bf3b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5418594876.mp3?updated=1690120678" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Polish espionage case. Ryuk tactics, and some thoughts on its attribution. Access-control system zero-days. Lawsuit may bring clarity to cyber insurance war exclusion clauses. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/759/notes</link>
      <description>In today’s podcast, we hear that Huawei has fired the sales manager arrested for espionage in Poland, and says that if he was spying, he was freelancing. Ryuk ransomware now looks more like a criminal than a state-sponsored operation. And its “big-game hunting” has pulled in almost four million dollars since August. Access control system zero-days found. And a lawsuit is likely to set some precedents concerning what counts as cyberwar. Joe Carrigan from JHU ISI on updated NIST password guidelines. Guest is Vijaya Kaza from Lookout on the shifting role of privacy in infosec.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_14.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 14 Jan 2019 20:34:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>759</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/83e40916-def8-11ea-911f-a38eb335f63c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Polish espionage case. Ryuk tactics, and some thoughts on its attribution. Access-control system zero-days. Lawsuit may bring clarity to cyber insurance war exclusion clauses. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Huawei has fired the sales manager arrested for espionage in Poland, and says that if he was spying, he was freelancing. Ryuk ransomware now looks more like a criminal than a state-sponsored operation. And its “big-game hunting” has pulled in almost four million dollars since August. Access control system zero-days found. And a lawsuit is likely to set some precedents concerning what counts as cyberwar. Joe Carrigan from JHU ISI on updated NIST password guidelines. Guest is Vijaya Kaza from Lookout on the shifting role of privacy in infosec.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_14.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Huawei has fired the sales manager arrested for espionage in Poland, and says that if he was spying, he was freelancing. Ryuk ransomware now looks more like a criminal than a state-sponsored operation. And its “big-game hunting” has pulled in almost four million dollars since August. Access control system zero-days found. And a lawsuit is likely to set some precedents concerning what counts as cyberwar. Joe Carrigan from JHU ISI on updated NIST password guidelines. Guest is Vijaya Kaza from Lookout on the shifting role of privacy in infosec.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p><a href="https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_14.html"> https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_14.html</a></p> <p> </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1242</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d9a8726311f8423bb32172c303f48350]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9205665505.mp3?updated=1690121678" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Magecart payment card theft analysis. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/68/notes</link>
      <description>Researchers at RiskIQ have been tracking a series of web-based credit card skimmers known as Magecart. We take a closer look at attacks on Ticketmaster, British Airways, NewEgg and Shopper Approved payment card pages. 
Yonathan Klijnsma is lead of threat research at RiskIQ, and he guides us through what they've learned.
Links to RiskIQ research:
https://www.riskiq.com/blog/labs/magecart-ticketmaster-breach/
https://www.riskiq.com/blog/labs/magecart-british-airways-breach/
https://www.riskiq.com/blog/labs/magecart-newegg/
https://www.riskiq.com/blog/labs/magecart-shopper-approved/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 Jan 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>68</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6aed65e4-df0f-11ea-b61d-5b9cb7fb431f/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Magecart payment card theft analysis. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at RiskIQ have been tracking a series of web-based credit card skimmers known as Magecart. We take a closer look at attacks on Ticketmaster, British Airways, NewEgg and Shopper Approved payment card pages. 
Yonathan Klijnsma is lead of threat research at RiskIQ, and he guides us through what they've learned.
Links to RiskIQ research:
https://www.riskiq.com/blog/labs/magecart-ticketmaster-breach/
https://www.riskiq.com/blog/labs/magecart-british-airways-breach/
https://www.riskiq.com/blog/labs/magecart-newegg/
https://www.riskiq.com/blog/labs/magecart-shopper-approved/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at RiskIQ have been tracking a series of web-based credit card skimmers known as Magecart. We take a closer look at attacks on Ticketmaster, British Airways, NewEgg and Shopper Approved payment card pages. </p><p>Yonathan Klijnsma is lead of threat research at RiskIQ, and he guides us through what they've learned.</p><p>Links to RiskIQ research:</p><p>https://www.riskiq.com/blog/labs/magecart-ticketmaster-breach/</p><p>https://www.riskiq.com/blog/labs/magecart-british-airways-breach/</p><p>https://www.riskiq.com/blog/labs/magecart-newegg/</p><p><a href="https://www.riskiq.com/blog/labs/magecart-shopper-approved/">https://www.riskiq.com/blog/labs/magecart-shopper-approved/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1900</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[03e5969e861c492bb4190e1749fc6083]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2289192982.mp3?updated=1685022820" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Iran linked to DNS hijacking campaign. Smart doorbells not smart enough about security. Fuze cards are convenient for crooks, too. Huawei espionage arrest in Poland. Russian sympathy for NSA. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/758/notes</link>
      <description>In today’s podcast, we hear that FireEye has called out Iran “with moderate confidence” for a long-running DNS-hijacking campaign. Smart doorbells may not be smart enough for their users’ comfort, if reports of video sharing are to be credited. Crooks are finding Fuze cards as handy as good-guy consumers do. Poland makes two arrests in an espionage case linked to Huawei. And the Russian media are happy to offer sympathy to NSA for some alleged security lapses at Fort Meade. Craig Williams from Cisco Talos with details on Persian Stalker targeting secure messaging apps. Guest is Rajiv Dholakia from Nok Nok Labs on the security pros and cons of biometrics.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_11.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 11 Jan 2019 21:15:59 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>758</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8400ec2a-def8-11ea-911f-53875eaf370e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Iran linked to DNS hijacking campaign. Smart doorbells not smart enough about security. Fuze cards are convenient for crooks, too. Huawei espionage arrest in Poland. Russian sympathy for NSA. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that FireEye has called out Iran “with moderate confidence” for a long-running DNS-hijacking campaign. Smart doorbells may not be smart enough for their users’ comfort, if reports of video sharing are to be credited. Crooks are finding Fuze cards as handy as good-guy consumers do. Poland makes two arrests in an espionage case linked to Huawei. And the Russian media are happy to offer sympathy to NSA for some alleged security lapses at Fort Meade. Craig Williams from Cisco Talos with details on Persian Stalker targeting secure messaging apps. Guest is Rajiv Dholakia from Nok Nok Labs on the security pros and cons of biometrics.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_11.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that FireEye has called out Iran “with moderate confidence” for a long-running DNS-hijacking campaign. Smart doorbells may not be smart enough for their users’ comfort, if reports of video sharing are to be credited. Crooks are finding Fuze cards as handy as good-guy consumers do. Poland makes two arrests in an espionage case linked to Huawei. And the Russian media are happy to offer sympathy to NSA for some alleged security lapses at Fort Meade. Craig Williams from Cisco Talos with details on Persian Stalker targeting secure messaging apps. Guest is Rajiv Dholakia from Nok Nok Labs on the security pros and cons of biometrics.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p><a href="https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_10.html"> https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_11.html</a></p> <p> </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1433</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4ef0ff956b7f4adaaaa91d888d9cf685]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9825613929.mp3?updated=1608755804" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>TA505’s new tools. ISIS turns to emerging chat apps. Reddit asks for password resets. The EU’s right to be forgotten gets some court-imposed limits. The tweets Kaspersky flagged to NSA.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/757/notes</link>
      <description>In today’s podcast, we hear that Proofpoint researchers are tracking the latest developments from the unusually diligent cyber criminals fo TA505. ISIS turns to newer, less closely monitored and moderated apps as it’s pushed out of larger social networks. Reddit asks users to reset their passwords, and to make them good ones. Google seems to have made strides against expansive interpretation of the EU’s right to be forgotten. And the curious tweets of @HAL999999999. Jonathan Katz from UMD on updated WiFi security. Guest is Ameesh Divatia from Baffle on the growing frustration with how companies handle our private information.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_10.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 10 Jan 2019 20:46:58 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>757</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8419c542-def8-11ea-911f-c3d6e3ec7e29/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>TA505’s new tools. ISIS turns to emerging chat apps. Reddit asks for password resets. The EU’s right to be forgotten gets some court-imposed limits. The tweets Kaspersky flagged to NSA.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Proofpoint researchers are tracking the latest developments from the unusually diligent cyber criminals fo TA505. ISIS turns to newer, less closely monitored and moderated apps as it’s pushed out of larger social networks. Reddit asks users to reset their passwords, and to make them good ones. Google seems to have made strides against expansive interpretation of the EU’s right to be forgotten. And the curious tweets of @HAL999999999. Jonathan Katz from UMD on updated WiFi security. Guest is Ameesh Divatia from Baffle on the growing frustration with how companies handle our private information.
 For links to all of today's stories check our our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_10.html
  
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Proofpoint researchers are tracking the latest developments from the unusually diligent cyber criminals fo TA505. ISIS turns to newer, less closely monitored and moderated apps as it’s pushed out of larger social networks. Reddit asks users to reset their passwords, and to make them good ones. Google seems to have made strides against expansive interpretation of the EU’s right to be forgotten. And the curious tweets of @HAL999999999. Jonathan Katz from UMD on updated WiFi security. Guest is Ameesh Divatia from Baffle on the growing frustration with how companies handle our private information.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:</p> <p><a href="https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_10.html"> https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_10.html</a></p> <p> </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1270</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a7538ff567bc41c2888ddc60ee4881dd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5535164835.mp3?updated=1690120548" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ICEPick-3PC in the wild. Influence ops warning in Israel. Hackerangriff and a lone hacktivist. OXO and Magecart. The Dark Overlord wants you. Oversharing. Internet autarky. Kaspersky helped NSA?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/756/notes</link>
      <description>In today’s podcast, we hear that ICEPick-3PC is out in the wild and scooping up Android IP addresses. Shin Bet warns of influence operations threatening Israel’s April election—much predictable yelling and finger-pointing ensues. German authorities are pretty convinced Hackerangriff is the work of a lone, disgruntled student. OXO may have suffered a Magecart infestation. Dark Overlord’s labor market play. Facebook sharing. Internet autarky. And did Kaspersky finger an NSA contractor to NSA for mishandling secrets? Dr. Charles Clancy from VA Tech on security gaps in the 5G specification. Guest is Denis Cosgrove from Booz Allen Hamilton on the growing connectivity and autonomy in motor vehicles. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_09.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 09 Jan 2019 20:52:21 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>756</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/842bf28a-def8-11ea-911f-8b5cbdb910b4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>ICEPick-3PC in the wild. Influence ops warning in Israel. Hackerangriff and a lone hacktivist. OXO and Magecart. The Dark Overlord wants you. Oversharing. Internet autarky. Kaspersky helped NSA?</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that ICEPick-3PC is out in the wild and scooping up Android IP addresses. Shin Bet warns of influence operations threatening Israel’s April election—much predictable yelling and finger-pointing ensues. German authorities are pretty convinced Hackerangriff is the work of a lone, disgruntled student. OXO may have suffered a Magecart infestation. Dark Overlord’s labor market play. Facebook sharing. Internet autarky. And did Kaspersky finger an NSA contractor to NSA for mishandling secrets? Dr. Charles Clancy from VA Tech on security gaps in the 5G specification. Guest is Denis Cosgrove from Booz Allen Hamilton on the growing connectivity and autonomy in motor vehicles. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_09.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that ICEPick-3PC is out in the wild and scooping up Android IP addresses. Shin Bet warns of influence operations threatening Israel’s April election—much predictable yelling and finger-pointing ensues. German authorities are pretty convinced Hackerangriff is the work of a lone, disgruntled student. OXO may have suffered a Magecart infestation. Dark Overlord’s labor market play. Facebook sharing. Internet autarky. And did Kaspersky finger an NSA contractor to NSA for mishandling secrets? Dr. Charles Clancy from VA Tech on security gaps in the 5G specification. Guest is Denis Cosgrove from Booz Allen Hamilton on the growing connectivity and autonomy in motor vehicles. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2019/January/CyberWire_2019_01_09.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1269</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ce7e994a9cfc43b89db2f4f42fa139d0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9282915392.mp3?updated=1690120520" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>German police have a suspect in #hackerangriff. Cyber espionage awareness campaign. Cyber cold war in the offing? US political operators learn from Russian trolls. WikiLeaks on the record. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/755/notes</link>
      <description>In today’s podcast, an arrest has been made in #hackerangriff: a student in the German state of Hessen. The US begins a campaign to heighten businesses’ awareness of cyber espionage. Observers see a coming “cyber cold war,” with China on one side and a large number of other countries on the other. Facebook is following a widening investigation into the use of inauthentic accounts, ads, and sites in recent US elections. WikiLeaks’ lawyers tell news media to stop defaming the organization and its founder.  Emily Wilson from Terbium Labs on the nine lives of a credit card. Guest is Robb Reck from Ping Identity on NIST password guidance.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2019_01_08.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Jan 2019 20:35:04 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>755</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/848511f8-def8-11ea-911f-7feeaaf8fff0/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>German police have a suspect in #hackerangriff. Cyber espionage awareness campaign. Cyber cold war in the offing? US political operators learn from Russian trolls. WikiLeaks on the record. </itunes:subtitle>
      <itunes:summary>In today’s podcast, an arrest has been made in #hackerangriff: a student in the German state of Hessen. The US begins a campaign to heighten businesses’ awareness of cyber espionage. Observers see a coming “cyber cold war,” with China on one side and a large number of other countries on the other. Facebook is following a widening investigation into the use of inauthentic accounts, ads, and sites in recent US elections. WikiLeaks’ lawyers tell news media to stop defaming the organization and its founder.  Emily Wilson from Terbium Labs on the nine lives of a credit card. Guest is Robb Reck from Ping Identity on NIST password guidance.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2019_01_08.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, an arrest has been made in #hackerangriff: a student in the German state of Hessen. The US begins a campaign to heighten businesses’ awareness of cyber espionage. Observers see a coming “cyber cold war,” with China on one side and a large number of other countries on the other. Facebook is following a widening investigation into the use of inauthentic accounts, ads, and sites in recent US elections. WikiLeaks’ lawyers tell news media to stop defaming the organization and its founder.  Emily Wilson from Terbium Labs on the nine lives of a credit card. Guest is Robb Reck from Ping Identity on NIST password guidance.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2019_01_08.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1292</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[16cc633a7e4747b29b948a79627f8946]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6551561798.mp3?updated=1690120504" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>German doxing incident remains under investigation. Marriott breach update. Dark Overlord watch. Can cryptocurrency become less burdensome in terms of energy consumption? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/754/notes</link>
      <description>In today’s podcast, we hear that investigation into the doxing campaign German political leaders suffered continues, and the Interior Minister promises a transparent inquiry. Attribution remains unsettled, but a lot of people are looking toward Russia. Marriott thinks fewer guests were affected by its Starwood breach than initially feared. Online gamers affected by breaches. The Dark Overlord continues to make a pest of itself. And can alt-coin production become less of an energy hog? Awais Rashid from Bristol University on securing large-scale infrastructure. Guests are Karen Waltermire and Harry Perper from NIST, discussing the NIST National Cybersecurity Center of Excellence (NCCoE).
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2019_01_07.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 07 Jan 2019 21:11:31 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>754</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/849e2576-def8-11ea-911f-d32d4dfc0b01/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>German doxing incident remains under investigation. Marriott breach update. Dark Overlord watch. Can cryptocurrency become less burdensome in terms of energy consumption? </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that investigation into the doxing campaign German political leaders suffered continues, and the Interior Minister promises a transparent inquiry. Attribution remains unsettled, but a lot of people are looking toward Russia. Marriott thinks fewer guests were affected by its Starwood breach than initially feared. Online gamers affected by breaches. The Dark Overlord continues to make a pest of itself. And can alt-coin production become less of an energy hog? Awais Rashid from Bristol University on securing large-scale infrastructure. Guests are Karen Waltermire and Harry Perper from NIST, discussing the NIST National Cybersecurity Center of Excellence (NCCoE).
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2019_01_07.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that investigation into the doxing campaign German political leaders suffered continues, and the Interior Minister promises a transparent inquiry. Attribution remains unsettled, but a lot of people are looking toward Russia. Marriott thinks fewer guests were affected by its Starwood breach than initially feared. Online gamers affected by breaches. The Dark Overlord continues to make a pest of itself. And can alt-coin production become less of an energy hog? Awais Rashid from Bristol University on securing large-scale infrastructure. Guests are Karen Waltermire and Harry Perper from NIST, discussing the NIST National Cybersecurity Center of Excellence (NCCoE).</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2019_01_07.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1303</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[90cfb1212a274b95a3666312f4512357]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5716753911.mp3?updated=1690120491" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>NOKKI, Reaper and DOGCALL target Russians and Cambodians. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/67/notes</link>
      <description>Researchers from Unit 42 at Palo Alto Networks have discovered an interesting relationship between the NOKKI and DOGCALL malware families, as well as a new RAT being used to deploy the malware.
Jen Miller-Osborn is Deputy Director of Threat Intelligence with Unit 42, and she joins us to share their findings.
The original research can be found here:
 https://unit42.paloaltonetworks.com/unit42-nokki-almost-ties-the-knot-with-dogcall-reaper-group-uses-new-malware-to-deploy-rat/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 Jan 2019 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>67</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6a1a6d24-df0f-11ea-b61d-17595c097c73/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>NOKKI, Reaper and Dogcall target Russians and Cambodians. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers from Unit 42 at Palo Alto Networks have discovered an interesting relationship between the NOKKI and DOGCALL malware families, as well as a new RAT being used to deploy the malware.
Jen Miller-Osborn is Deputy Director of Threat Intelligence with Unit 42, and she joins us to share their findings.
The original research can be found here:
 https://unit42.paloaltonetworks.com/unit42-nokki-almost-ties-the-knot-with-dogcall-reaper-group-uses-new-malware-to-deploy-rat/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers from Unit 42 at Palo Alto Networks have discovered an interesting relationship between the NOKKI and DOGCALL malware families, as well as a new RAT being used to deploy the malware.</p><p>Jen Miller-Osborn is Deputy Director of Threat Intelligence with Unit 42, and she joins us to share their findings.</p><p>The original research can be found here:</p><p><a href="https://unit42.paloaltonetworks.com/unit42-nokki-almost-ties-the-knot-with-dogcall-reaper-group-uses-new-malware-to-deploy-rat/"> https://unit42.paloaltonetworks.com/unit42-nokki-almost-ties-the-knot-with-dogcall-reaper-group-uses-new-malware-to-deploy-rat/</a></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1027</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3e5dd8c65531432f8feec63037f44865]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1010287969.mp3?updated=1685022806" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Doxing in Germany. How Lojax works. Spyware found in apps downloaded from Google Play. ISIS hijacks dormant Twitter accounts. Update on Moscow spy case. Chromecast hacking endgame. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/753/notes</link>
      <description>In today’s podcast, we hear that German politicians, celebrities, and journalists have been doxed by parties unknown. ESET describes the workings of Lojax malware. Google ejects spyware-infested apps from the Play Store. ISIS returns online to inspire, via some hijacked dormant Twitter accounts. Updates on the arrest of a dual US-UK citizen on spying charges in Moscow. And some PewDiePie followers sort of say they’re sorry for hacking Chromecasts. Sort of. Justin Harvey from Accenture with his outlook toward 2019. Guest is Ken Modeste from UL (Underwriters Laboratories) on their evolution as a safety certification organization.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2019_01_04.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 04 Jan 2019 20:49:56 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>753</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/84c0dbc0-def8-11ea-911f-3b16d1cb3e46/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Doxing in Germany. How Lojax works. Spyware found in apps downloaded from Google Play. ISIS hijacks dormant Twitter accounts. Update on Moscow spy case. Chromecast hacking endgame. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that German politicians, celebrities, and journalists have been doxed by parties unknown. ESET describes the workings of Lojax malware. Google ejects spyware-infested apps from the Play Store. ISIS returns online to inspire, via some hijacked dormant Twitter accounts. Updates on the arrest of a dual US-UK citizen on spying charges in Moscow. And some PewDiePie followers sort of say they’re sorry for hacking Chromecasts. Sort of. Justin Harvey from Accenture with his outlook toward 2019. Guest is Ken Modeste from UL (Underwriters Laboratories) on their evolution as a safety certification organization.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2019_01_04.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that German politicians, celebrities, and journalists have been doxed by parties unknown. ESET describes the workings of Lojax malware. Google ejects spyware-infested apps from the Play Store. ISIS returns online to inspire, via some hijacked dormant Twitter accounts. Updates on the arrest of a dual US-UK citizen on spying charges in Moscow. And some PewDiePie followers sort of say they’re sorry for hacking Chromecasts. Sort of. Justin Harvey from Accenture with his outlook toward 2019. Guest is Ken Modeste from UL (Underwriters Laboratories) on their evolution as a safety certification organization.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2019_01_04.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1550</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bdf8e61d99e140b5815ea67d68216c58]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5402454952.mp3?updated=1690120479" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>2019’s first noteworthy breach. Update on the Tribune Publishing hack. reCAPTCHA defeated in proof-of-concept. Dark Overlord should avail itself of the right to remain silent. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/752/notes</link>
      <description>In today’s podcast, we hear that prize for first big breach of 2019 goes to Australia, but the year is young. Ryuk “artisanal” malware implicated in newspaper print-plant hacks. reCAPTCHA gets captchu’d, again. The Dark Overlord teases some pretty dull stuff, a step ahead of the law and Pastebin content moderators. PewDiePie followers continue to pester Internet users. And there’s a new play about Reality Winner, the alleged NSA leaker. Johannes Ullrich from SANS and the ISC Stormcast podcast on cold boot attacks on laptops. Guest is Sarah Squire from Ping Identity with results from a survey on consumer response to breaches.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2019_01_03.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 03 Jan 2019 20:37:32 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>752</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/84dbc714-def8-11ea-911f-43e901979d7a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>2019’s first noteworthy breach. Update on the Tribune Publishing hack. reCAPTCHA defeated in proof-of-concept. Dark Overlord should avail itself of the right to remain silent. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that prize for first big breach of 2019 goes to Australia, but the year is young. Ryuk “artisanal” malware implicated in newspaper print-plant hacks. reCAPTCHA gets captchu’d, again. The Dark Overlord teases some pretty dull stuff, a step ahead of the law and Pastebin content moderators. PewDiePie followers continue to pester Internet users. And there’s a new play about Reality Winner, the alleged NSA leaker. Johannes Ullrich from SANS and the ISC Stormcast podcast on cold boot attacks on laptops. Guest is Sarah Squire from Ping Identity with results from a survey on consumer response to breaches.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2019_01_03.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that prize for first big breach of 2019 goes to Australia, but the year is young. Ryuk “artisanal” malware implicated in newspaper print-plant hacks. reCAPTCHA gets captchu’d, again. The Dark Overlord teases some pretty dull stuff, a step ahead of the law and Pastebin content moderators. PewDiePie followers continue to pester Internet users. And there’s a new play about Reality Winner, the alleged NSA leaker. Johannes Ullrich from SANS and the ISC Stormcast podcast on cold boot attacks on laptops. Guest is Sarah Squire from Ping Identity with results from a survey on consumer response to breaches.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2019_01_03.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1277</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c83bffe1fca740f3a30f8b411f3c9515]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2282376727.mp3?updated=1690120453" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stop the presses—the presses were stopped by ransomware. Video security system found vulnerable to oversharing. Changes in US DoD leadership. An arrest in Moscow, a court ruling in Baltimore. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/751/notes</link>
      <description>In today’s podcast, we hear that US newspapers sustained a major cyberattack—possibly ransomware—over the weekend that disrupted printing. The attack is said to have originated overseas, but attribution so far is preliminary, murky, and circumstantial. Home security video system is found to have hard-coded credentials. Changes in US Defense leadership. An American is arrested in Mosow on espionage charges. And alleged NSA leaker Hal Martin wins one and loses two in court. Ben Yelin from UMD CHHS on whether remotely wiping a mobile device could be considered destruction of evidence. Guest is Steve Durbin from the ISF on using a human-centered approach to building security teams.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2019_01_02.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 02 Jan 2019 20:31:45 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>4</itunes:season>
      <itunes:episode>751</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/84f41e40-def8-11ea-911f-43af01bc1709/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Stop the presses—the presses were stopped by ransomware. Video security system found vulnerable to oversharing. Changes in US DoD leadership. An arrest in Moscow, a court ruling in Baltimore. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that US newspapers sustained a major cyberattack—possibly ransomware—over the weekend that disrupted printing. The attack is said to have originated overseas, but attribution so far is preliminary, murky, and circumstantial. Home security video system is found to have hard-coded credentials. Changes in US Defense leadership. An American is arrested in Mosow on espionage charges. And alleged NSA leaker Hal Martin wins one and loses two in court. Ben Yelin from UMD CHHS on whether remotely wiping a mobile device could be considered destruction of evidence. Guest is Steve Durbin from the ISF on using a human-centered approach to building security teams.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2019_01_02.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that US newspapers sustained a major cyberattack—possibly ransomware—over the weekend that disrupted printing. The attack is said to have originated overseas, but attribution so far is preliminary, murky, and circumstantial. Home security video system is found to have hard-coded credentials. Changes in US Defense leadership. An American is arrested in Mosow on espionage charges. And alleged NSA leaker Hal Martin wins one and loses two in court. Ben Yelin from UMD CHHS on whether remotely wiping a mobile device could be considered destruction of evidence. Guest is Steve Durbin from the ISF on using a human-centered approach to building security teams.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2019_01_02.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1295</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c95c76e6bc3743d9985e0083569c2cd9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2674061773.mp3?updated=1690120437" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Apple Device Enrollment Program vulnerabilities explored. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/66/notes</link>
      <description>Researchers at Duo Security have been looking into Apple's Device Enrollment Program (DEM) and have discovered vulnerabilities that could expose users of the service to potential issues from social engineering and rogue devices.
James Barclay is Senior R&amp;D Engineer at Duo Security, and he joins us to share what they've found.
The original research can be found here:
 https://duo.com/blog/weak-apple-dep-authentication-leaves-enterprises-vulnerable-to-social-engineering-attacks-and-rogue-devices
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Dec 2018 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>66</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/64d9b482-df0f-11ea-a0a9-471466057703/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Apple Device Enrollment Program vulnerabilities explored. [Research Saturday]</itunes:subtitle>
      <itunes:summary>Researchers at Duo Security have been looking into Apple's Device Enrollment Program (DEM) and have discovered vulnerabilities that could expose users of the service to potential issues from social engineering and rogue devices.
James Barclay is Senior R&amp;D Engineer at Duo Security, and he joins us to share what they've found.
The original research can be found here:
 https://duo.com/blog/weak-apple-dep-authentication-leaves-enterprises-vulnerable-to-social-engineering-attacks-and-rogue-devices
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Duo Security have been looking into Apple's Device Enrollment Program (DEM) and have discovered vulnerabilities that could expose users of the service to potential issues from social engineering and rogue devices.</p><p>James Barclay is Senior R&amp;D Engineer at Duo Security, and he joins us to share what they've found.</p><p>The original research can be found here:</p><p><a href="https://duo.com/blog/weak-apple-dep-authentication-leaves-enterprises-vulnerable-to-social-engineering-attacks-and-rogue-devices"> https://duo.com/blog/weak-apple-dep-authentication-leaves-enterprises-vulnerable-to-social-engineering-attacks-and-rogue-devices</a></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1200</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[acf4a35e33174bde9e8554bbd4e054ff]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4537352740.mp3?updated=1685022715" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Operation Cloudhopper and industrial espionage. Anonymous social network Blind server left exposed. Reputation jacking. Alexa shares too much, by accident. Hitman scam is back.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/750/notes</link>
      <description>In today’s podcast, we hear that the Five Eyes have had quite enough of Stone Panda’s Cloudhopping, thank you very much, and they want Beijing to put a stop to it. Beijing says it’s all slander, and that the Yankees are probably just as bad. Blind turns out not to be as blind as its users thought. Reputation jacking comes to business email compromise. Alexa complies with GDPR, but goes a little overboard. And no, a hitman has not been hired to get you, no matter what that email says. Joe Carrigan from JHU ISI on hackers bypassing GMail two-factor authentication. Guest is Brian McCullough, host of the TechMeme Ride Home podcast and author of the book How the Internet Happened.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_21.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 21 Dec 2018 21:41:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>750</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/85083d76-def8-11ea-911f-035ef17226bb/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Operation Cloudhopper and industrial espionage. Anonymous social network Blind server left exposed. Reputation jacking. Alexa shares too much, by accident. Hitman scam is back.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that the Five Eyes have had quite enough of Stone Panda’s Cloudhopping, thank you very much, and they want Beijing to put a stop to it. Beijing says it’s all slander, and that the Yankees are probably just as bad. Blind turns out not to be as blind as its users thought. Reputation jacking comes to business email compromise. Alexa complies with GDPR, but goes a little overboard. And no, a hitman has not been hired to get you, no matter what that email says. Joe Carrigan from JHU ISI on hackers bypassing GMail two-factor authentication. Guest is Brian McCullough, host of the TechMeme Ride Home podcast and author of the book How the Internet Happened.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_21.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that the Five Eyes have had quite enough of Stone Panda’s Cloudhopping, thank you very much, and they want Beijing to put a stop to it. Beijing says it’s all slander, and that the Yankees are probably just as bad. Blind turns out not to be as blind as its users thought. Reputation jacking comes to business email compromise. Alexa complies with GDPR, but goes a little overboard. And no, a hitman has not been hired to get you, no matter what that email says. Joe Carrigan from JHU ISI on hackers bypassing GMail two-factor authentication. Guest is Brian McCullough, host of the TechMeme Ride Home podcast and author of the book How the Internet Happened.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_21.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1734</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4d119e7427cf41d8b63c92bd80f4653a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8880773792.mp3?updated=1608755801" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Risk and regulation in the financial sector. [CyberWire-X]</title>
      <link>https://thecyberwire.com/podcasts/cyberwire-x/3/notes</link>
      <description>In the third episode of our four-part series, called “Ground Truth or Consequences: the challenges and opportunities of regulation in cyberspace,” we take at risk and regulation in the financial sector, specifically how it intersects with cyber security. How do organizations operate in a heavily regulated global financial environment, while protecting their employees, their customers, and the integrity of a system largely built on trust?
Joining us are Valerie Abend from Accenture and Josh Magri from the Bank Policy Institute.
Later in the program we'll hear from Jason Hart, CTO for enterprise and cybersecurity at Gemalto. They're the sponsors of this show.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 21 Dec 2018 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/23e1eb24-df01-11ea-8799-d7dbb2350f9e/image/cyberwire-x-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Risk and regulation in the financial sector. [CyberWire-X]</itunes:subtitle>
      <itunes:summary>In the third episode of our four-part series, called “Ground Truth or Consequences: the challenges and opportunities of regulation in cyberspace,” we take at risk and regulation in the financial sector, specifically how it intersects with cyber security. How do organizations operate in a heavily regulated global financial environment, while protecting their employees, their customers, and the integrity of a system largely built on trust?
Joining us are Valerie Abend from Accenture and Josh Magri from the Bank Policy Institute.
Later in the program we'll hear from Jason Hart, CTO for enterprise and cybersecurity at Gemalto. They're the sponsors of this show.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In the third episode of our four-part series, called “Ground Truth or Consequences: the challenges and opportunities of regulation in cyberspace,” we take at risk and regulation in the financial sector, specifically how it intersects with cyber security. How do organizations operate in a heavily regulated global financial environment, while protecting their employees, their customers, and the integrity of a system largely built on trust?</p><p>Joining us are Valerie Abend from Accenture and Josh Magri from the Bank Policy Institute.</p><p>Later in the program we'll hear from Jason Hart, CTO for enterprise and cybersecurity at Gemalto. They're the sponsors of this show.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1748</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9c4012ae652d4f099bebaf42191b0118]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8211599481.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US indicts two Stone Panda operators amid ongoing international concern over Chinese IP theft. Suspicious customer support traffic on Twitter. Emergency IE patch. Influence experiment.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/749/notes</link>
      <description>In today’s podcast, we hear that the US has indicted two hackers working for China’s Ministry of State Security. US and allies are said to be planning a joint response to China’s industrial espionage. Twitter sees suspicious customer support traffic. Microsoft issues an emergency patch for Internet Explorer. Facebook continues to struggle with transparency. New Knowledge CEO acknowledges a questionable experiment in social media manipulation. And, flash: Russian embassy hack was “brutal.” Rick Howard from Palo Alto Networks with some holiday reading suggestions. Guest is Sarah Tennant from the Michigan Economic Development Corporation describing new cyber security initiatives at Michigan universities.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_20.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 20 Dec 2018 20:30:21 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>749</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/851f9bc4-def8-11ea-911f-e3213c0e9ae8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>US indicts two Stone Panda operators amid ongoing international concern over Chinese IP theft. Suspicious customer support traffic on Twitter. Emergency IE patch. Influence experiment.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that the US has indicted two hackers working for China’s Ministry of State Security. US and allies are said to be planning a joint response to China’s industrial espionage. Twitter sees suspicious customer support traffic. Microsoft issues an emergency patch for Internet Explorer. Facebook continues to struggle with transparency. New Knowledge CEO acknowledges a questionable experiment in social media manipulation. And, flash: Russian embassy hack was “brutal.” Rick Howard from Palo Alto Networks with some holiday reading suggestions. Guest is Sarah Tennant from the Michigan Economic Development Corporation describing new cyber security initiatives at Michigan universities.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_20.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that the US has indicted two hackers working for China’s Ministry of State Security. US and allies are said to be planning a joint response to China’s industrial espionage. Twitter sees suspicious customer support traffic. Microsoft issues an emergency patch for Internet Explorer. Facebook continues to struggle with transparency. New Knowledge CEO acknowledges a questionable experiment in social media manipulation. And, flash: Russian embassy hack was “brutal.” Rick Howard from Palo Alto Networks with some holiday reading suggestions. Guest is Sarah Tennant from the Michigan Economic Development Corporation describing new cyber security initiatives at Michigan universities.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_20.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1297</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c797b94c4dd641cab55a0625207c5b47]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4521374753.mp3?updated=1690120402" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Suspicion of Chinese hardware manufacturers continues. EU diplomatic cables leaked. Hiding out by dumbing down. Facebook data-sharing. NASA PII exposed. Parrot uses Alexa to advantage.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/748/notes</link>
      <description>In today’s podcast we hear of more international skittishness about Chinese hardware manufacturers. Information operations in Taiwan’s elections. EU diplomatic cables hacked, rehacked, and published. Dumbing down cyber craft as a form of misdirection. More Facebook data-sharing practices come under scrutiny. NASA PII exposed; investigation continues. And did you hear the one about the parrot, Alexa, Amazon orders, and sappy dance tunes?  Jonathan Katz from UMD describing security improvements in the Signal messaging app. Guest Michael Doran from Optiv with tips on protecting your organization from ransomware.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_19.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 19 Dec 2018 20:56:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>748</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/852db916-def8-11ea-911f-4724cfc46fad/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Suspicion of Chinese hardware manufacturers continues. EU diplomatic cables leaked. Hiding out by dumbing down. Facebook data-sharing. NASA PII exposed. Parrot uses Alexa to advantage.</itunes:subtitle>
      <itunes:summary>In today’s podcast we hear of more international skittishness about Chinese hardware manufacturers. Information operations in Taiwan’s elections. EU diplomatic cables hacked, rehacked, and published. Dumbing down cyber craft as a form of misdirection. More Facebook data-sharing practices come under scrutiny. NASA PII exposed; investigation continues. And did you hear the one about the parrot, Alexa, Amazon orders, and sappy dance tunes?  Jonathan Katz from UMD describing security improvements in the Signal messaging app. Guest Michael Doran from Optiv with tips on protecting your organization from ransomware.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_19.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear of more international skittishness about Chinese hardware manufacturers. Information operations in Taiwan’s elections. EU diplomatic cables hacked, rehacked, and published. Dumbing down cyber craft as a form of misdirection. More Facebook data-sharing practices come under scrutiny. NASA PII exposed; investigation continues. And did you hear the one about the parrot, Alexa, Amazon orders, and sappy dance tunes?  Jonathan Katz from UMD describing security improvements in the Signal messaging app. Guest Michael Doran from Optiv with tips on protecting your organization from ransomware.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_19.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1275</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[84a7fc2fcdcd4c149dfa0c4f01a17b40]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1093188813.mp3?updated=1690120384" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shamoon 3 and Charming Kitten. Czech CERT issues warning concerning Huawei, ZTE. Influence ops and a Facebook boycott. PewDiePie’s followers versus the Wall Street Journal. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/747/notes</link>
      <description>In today’s podcast, we hear that Shamoon 3 and the renewed activity of Charming Kitty strike observers as the long-expected Iranian cyber retaliation for reimposition of sanctions. The Czech CERT says Huawei and ZTE both represent a threat. Huawei insists it didn’t do nuthin’. Facebook faces a boycott in the wake of Senate commissioned reports on Russian trolling. And PewDiePie’s followers deface a Wall Street Journal page. Craig Williams from Cisco Talos with a look back at 2018. Carole Thieriault speaks with Rapid7's Tod Beardsley about their Industry Cyber Exposure report.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Dec 2018 21:24:59 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>747</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8543c4a4-def8-11ea-911f-f756ab8403ed/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Shamoon 3 and Charming Kitten. Czech CERT issues warning concerning Huawei, ZTE. Influence ops and a Facebook boycott. PewDiePie’s followers versus the Wall Street Journal. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Shamoon 3 and the renewed activity of Charming Kitty strike observers as the long-expected Iranian cyber retaliation for reimposition of sanctions. The Czech CERT says Huawei and ZTE both represent a threat. Huawei insists it didn’t do nuthin’. Facebook faces a boycott in the wake of Senate commissioned reports on Russian trolling. And PewDiePie’s followers deface a Wall Street Journal page. Craig Williams from Cisco Talos with a look back at 2018. Carole Thieriault speaks with Rapid7's Tod Beardsley about their Industry Cyber Exposure report.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Shamoon 3 and the renewed activity of Charming Kitty strike observers as the long-expected Iranian cyber retaliation for reimposition of sanctions. The Czech CERT says Huawei and ZTE both represent a threat. Huawei insists it didn’t do nuthin’. Facebook faces a boycott in the wake of Senate commissioned reports on Russian trolling. And PewDiePie’s followers deface a Wall Street Journal page. Craig Williams from Cisco Talos with a look back at 2018. Carole Thieriault speaks with Rapid7's Tod Beardsley about their Industry Cyber Exposure report.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1273</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f475713f9bfb44898277b905f57146f7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4188182602.mp3?updated=1690120346" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Huawei and the Five Eyes. Report on Russian trolling finds fluency in American. Boomstortion scammers turn to new threats. PewDiePie followers hack printers, again. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/746/notes</link>
      <description>In today’s podcast, we hear that the Five Eyes agreed to contain Huawei’s potential for espionage. Huawei and ZTE both continue their charm offensive to convince international customers it’s safe to use their gear. Senate commissioned report on Russian influence operations finds the St. Petersburg troll farmers “fluent in American trolling.” Boomstortion scammers now threaten acid attacks. PewDiePie followers—again—hack printers, but this time they say it’s for the public good. Justin Harvey from Accenture on M&amp;A targets and resilience.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_17.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 17 Dec 2018 20:46:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>746</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8555c4ec-def8-11ea-911f-f79910e2c4b8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Huawei and the Five Eyes. Report on Russian trolling finds fluency in American. Boomstortion scammers turn to new threats. PewDiePie followers hack printers, again. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that the Five Eyes agreed to contain Huawei’s potential for espionage. Huawei and ZTE both continue their charm offensive to convince international customers it’s safe to use their gear. Senate commissioned report on Russian influence operations finds the St. Petersburg troll farmers “fluent in American trolling.” Boomstortion scammers now threaten acid attacks. PewDiePie followers—again—hack printers, but this time they say it’s for the public good. Justin Harvey from Accenture on M&amp;A targets and resilience.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_17.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that the Five Eyes agreed to contain Huawei’s potential for espionage. Huawei and ZTE both continue their charm offensive to convince international customers it’s safe to use their gear. Senate commissioned report on Russian influence operations finds the St. Petersburg troll farmers “fluent in American trolling.” Boomstortion scammers now threaten acid attacks. PewDiePie followers—again—hack printers, but this time they say it’s for the public good. Justin Harvey from Accenture on M&amp;A targets and resilience.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_17.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>958</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d1c17b5f2529412c8be8f2af08115161]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9123746453.mp3?updated=1690120322" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Sony hack and the perils of attribution. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/65/notes</link>
      <description>Researchers at Risk Based Security took a detailed look back at the 2014 Sony hack, comparing analysis that occurred while the facts were still unfolding with what we know, today. There are interesting lessons to be learned, especially when it comes to attribution.
Brian Martin is V.P. of vulnerability intelligence at Risk Based Security, and he shares their findings.
The research can be found here:
 https://www.riskbasedsecurity.com/2018/09/you-didnt-think-the-sony-saga-was-over-did-you/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Dec 2018 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>65</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/6321c238-df0f-11ea-9dfb-0fbd6152535c/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The Sony hack and the perils of attribution</itunes:subtitle>
      <itunes:summary>Researchers at Risk Based Security took a detailed look back at the 2014 Sony hack, comparing analysis that occurred while the facts were still unfolding with what we know, today. There are interesting lessons to be learned, especially when it comes to attribution.
Brian Martin is V.P. of vulnerability intelligence at Risk Based Security, and he shares their findings.
The research can be found here:
 https://www.riskbasedsecurity.com/2018/09/you-didnt-think-the-sony-saga-was-over-did-you/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Risk Based Security took a detailed look back at the 2014 Sony hack, comparing analysis that occurred while the facts were still unfolding with what we know, today. There are interesting lessons to be learned, especially when it comes to attribution.</p><p>Brian Martin is V.P. of vulnerability intelligence at Risk Based Security, and he shares their findings.</p><p>The research can be found here:</p><p><a href="https://www.riskbasedsecurity.com/2018/09/you-didnt-think-the-sony-saga-was-over-did-you/"> https://www.riskbasedsecurity.com/2018/09/you-didnt-think-the-sony-saga-was-over-did-you/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1371</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e1d4faa8e79e4ad0ba999cbe51741731]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1150599974.mp3?updated=1685022696" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>False flags and real flags. ISIS claims the Strasbourg killer as one of its soldiers. A bogus bomb threat circulates by email.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/745/notes</link>
      <description>In today’s podcast, we hear about false flag cyberattacks that mimic state actors, especially Chinese state actors. Chinese intelligence services are prospecting US Navy contractors. Russia’s Fancy Bear continues its worldwide phishing campaign. ISIS claims the career criminal responsible for the Strasbourg Christmas market killings as one of its soldiers. And a bogus bomb threat is being circulated by email—call the technique “boomstortion.”  Malek Ben Salem from Accenture Labs on smart speaker vulnerabilities. Guest is Laura Noren from Obsidian Security on data science ethics.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_14.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 14 Dec 2018 21:13:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>745</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/856577c0-def8-11ea-911f-0f0ce9e6dac8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>False flags and real flags. ISIS claims the Strasbourg killer as one of its soldiers. A bogus bomb threat circulates by email.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear about false flag cyberattacks that mimic state actors, especially Chinese state actors. Chinese intelligence services are prospecting US Navy contractors. Russia’s Fancy Bear continues its worldwide phishing campaign. ISIS claims the career criminal responsible for the Strasbourg Christmas market killings as one of its soldiers. And a bogus bomb threat is being circulated by email—call the technique “boomstortion.”  Malek Ben Salem from Accenture Labs on smart speaker vulnerabilities. Guest is Laura Noren from Obsidian Security on data science ethics.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_14.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear about false flag cyberattacks that mimic state actors, especially Chinese state actors. Chinese intelligence services are prospecting US Navy contractors. Russia’s Fancy Bear continues its worldwide phishing campaign. ISIS claims the career criminal responsible for the Strasbourg Christmas market killings as one of its soldiers. And a bogus bomb threat is being circulated by email—call the technique “boomstortion.”  Malek Ben Salem from Accenture Labs on smart speaker vulnerabilities. Guest is Laura Noren from Obsidian Security on data science ethics.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_14.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1567</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e3f09bcdb15c41d68d60e2abd7c0f36f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4923351748.mp3?updated=1608755809" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shamoon variant implicated in Saipem hack. Charming Kitten reappears. Sino-American tension over trade and industrial espionage. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/744/notes</link>
      <description>In today’s podcast we hear that the Saipem hack looks like a new Shamoon variant. Charming Kitten started prowling through relevant places after the Iran sanctions became more serious. US authorities denounce Chinese espionage, especially industrial espionage, but there are as yet no new indictments or sanctions. Concerns mount over Chinese influence operations. Another Canadian may be in Chinese custody—possibly in retaliation for the detention of Huawei’s CFO. Ben Yelin from UMD CHHS on how password policies align with the 5th amendment. Guest is Liz Rice from Aqua Security on the notion of security teams “shifting left.”
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_13.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 13 Dec 2018 20:53:52 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>744</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/85820ba6-def8-11ea-911f-07106ccab9ec/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Shamoon variant implicated in Saipem hack. Charming Kitten reappears. Sino-American tension over trade and industrial espionage. </itunes:subtitle>
      <itunes:summary>In today’s podcast we hear that the Saipem hack looks like a new Shamoon variant. Charming Kitten started prowling through relevant places after the Iran sanctions became more serious. US authorities denounce Chinese espionage, especially industrial espionage, but there are as yet no new indictments or sanctions. Concerns mount over Chinese influence operations. Another Canadian may be in Chinese custody—possibly in retaliation for the detention of Huawei’s CFO. Ben Yelin from UMD CHHS on how password policies align with the 5th amendment. Guest is Liz Rice from Aqua Security on the notion of security teams “shifting left.”
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_13.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear that the Saipem hack looks like a new Shamoon variant. Charming Kitten started prowling through relevant places after the Iran sanctions became more serious. US authorities denounce Chinese espionage, especially industrial espionage, but there are as yet no new indictments or sanctions. Concerns mount over Chinese influence operations. Another Canadian may be in Chinese custody—possibly in retaliation for the detention of Huawei’s CFO. Ben Yelin from UMD CHHS on how password policies align with the 5th amendment. Guest is Liz Rice from Aqua Security on the notion of security teams “shifting left.”</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_13.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1308</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e289300177b44f5987fc20be4cdbac9c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2130233162.mp3?updated=1689971265" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Operation Sharpshooter. Meng makes bail. Sino-American cyber tensions. Leadership crises in the UK and France. Congress doesn’t lay a glove on Google. 2018’s bad password practices. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/743/notes</link>
      <description>In today’s podcast, we hear some of McAfee’s description of Operation Sharpshooter, an ambitious cyber reconnaissance campaign. Huawei’s CFO Meng makes bail in Vancouver, and China reacts sharply to the arrest. The US is said to be preparing sanctions and indictments in response to various Chinese hacking activities. A no-confidence vote is called in the UK. In France, President Macron makes concessions to the Yellow Vests. Google skates through its interrogation by Congress. And bad passwords get rated. Johannes Ullrich from SANs and the ISC Stormcast Podcast with holiday tips on securing new devices. Guest is Ali Golshan from StackRox on the shift toward DevOps.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_12.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 12 Dec 2018 21:19:44 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>743</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/85982896-def8-11ea-911f-33bd12a5ae52/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Operation Sharpshooter. Meng makes bail. Sino-American cyber tensions. Leadership crises in the UK and France. Congress doesn’t lay a glove on Google. 2018’s bad password practices. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear some of McAfee’s description of Operation Sharpshooter, an ambitious cyber reconnaissance campaign. Huawei’s CFO Meng makes bail in Vancouver, and China reacts sharply to the arrest. The US is said to be preparing sanctions and indictments in response to various Chinese hacking activities. A no-confidence vote is called in the UK. In France, President Macron makes concessions to the Yellow Vests. Google skates through its interrogation by Congress. And bad passwords get rated. Johannes Ullrich from SANs and the ISC Stormcast Podcast with holiday tips on securing new devices. Guest is Ali Golshan from StackRox on the shift toward DevOps.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_12.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear some of McAfee’s description of Operation Sharpshooter, an ambitious cyber reconnaissance campaign. Huawei’s CFO Meng makes bail in Vancouver, and China reacts sharply to the arrest. The US is said to be preparing sanctions and indictments in response to various Chinese hacking activities. A no-confidence vote is called in the UK. In France, President Macron makes concessions to the Yellow Vests. Google skates through its interrogation by Congress. And bad passwords get rated. Johannes Ullrich from SANs and the ISC Stormcast Podcast with holiday tips on securing new devices. Guest is Ali Golshan from StackRox on the shift toward DevOps.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_12.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1277</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[96f5bd138f7245b390e5029b2049b6e2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6885551477.mp3?updated=1689971062" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Audit finds no Chinese spy chips on motherboards. Huawei CFO hearings continue in Vancouver. Oilfield services firm’s servers attacked. Spyware and adware. Congressional hearings, reports.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/742/notes</link>
      <description>Audit finds no “Chinese spy chips” on Supermicro motherboards. Huawei CFO Meng’s hearing continues. Oil services firm’s servers attacked. Seedworm shows some new tricks. Secure instant messaging apps may be less secure than hoped. A new adware strain reported. Mr. Pichai goes to Washington, and Uncle Pennybags puts in an appearance. The US House Oversight and Government Reform Committee reports on the Equifax breach. Prof. Awais Rashid from Bristol University on risk management in a data-intensive world. Guest is Barry Hensley from Secureworks on supply chain risks.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_11.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Dec 2018 20:36:58 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>742</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/85ae5c7e-def8-11ea-911f-73e695fd10db/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Audit finds no Chinese spy chips on motherboards. Huawei CFO hearings continue in Vancouver. Oilfield services firm’s servers attacked. Spyware and adware. Congressional hearings, reports.</itunes:subtitle>
      <itunes:summary>Audit finds no “Chinese spy chips” on Supermicro motherboards. Huawei CFO Meng’s hearing continues. Oil services firm’s servers attacked. Seedworm shows some new tricks. Secure instant messaging apps may be less secure than hoped. A new adware strain reported. Mr. Pichai goes to Washington, and Uncle Pennybags puts in an appearance. The US House Oversight and Government Reform Committee reports on the Equifax breach. Prof. Awais Rashid from Bristol University on risk management in a data-intensive world. Guest is Barry Hensley from Secureworks on supply chain risks.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_11.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Audit finds no “Chinese spy chips” on Supermicro motherboards. Huawei CFO Meng’s hearing continues. Oil services firm’s servers attacked. Seedworm shows some new tricks. Secure instant messaging apps may be less secure than hoped. A new adware strain reported. Mr. Pichai goes to Washington, and Uncle Pennybags puts in an appearance. The US House Oversight and Government Reform Committee reports on the Equifax breach. Prof. Awais Rashid from Bristol University on risk management in a data-intensive world. Guest is Barry Hensley from Secureworks on supply chain risks.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_11.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1265</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9cec00ed87604b469a8cb06d3e8f222a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1298374560.mp3?updated=1689970976" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A bail hearing in Vancouver. The prospect of indictments in IP theft cases. Kubernetes vulnerabilities. Russia and Ukraine swap hacks? An advance fee scam asks for help getting out of jail.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/741/notes</link>
      <description>In today’s podcast, we hear that Huawei’s CFO awaits her immediate fate in a Vancouver detention facility, where she faces possible extradition to the US on a sanctions-violation beef. Huawei itself receives hostile scrutiny from the Five Eyes, the EU, and Japan. US indictments are expected soon in other IP theft cases involving China. Upgrade Kubernetes. Russia and Ukraine swap cyberattacks in their ongoing hybrid war. An advance fee scam promises not only money, but maybe love, too. Emily Wilson from Terbium labs, on why she feels the Lesbians Who Tech conference gets diversity right. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_10.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 10 Dec 2018 21:16:09 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>741</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/85bfface-def8-11ea-911f-8bcf8537a2d8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A bail hearing in Vancouver. The prospect of indictments in IP theft cases. Kubernetes vulnerabilities. Russia and Ukraine swap hacks? An advance fee scam asks for help getting out of jail.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Huawei’s CFO awaits her immediate fate in a Vancouver detention facility, where she faces possible extradition to the US on a sanctions-violation beef. Huawei itself receives hostile scrutiny from the Five Eyes, the EU, and Japan. US indictments are expected soon in other IP theft cases involving China. Upgrade Kubernetes. Russia and Ukraine swap cyberattacks in their ongoing hybrid war. An advance fee scam promises not only money, but maybe love, too. Emily Wilson from Terbium labs, on why she feels the Lesbians Who Tech conference gets diversity right. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_10.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Huawei’s CFO awaits her immediate fate in a Vancouver detention facility, where she faces possible extradition to the US on a sanctions-violation beef. Huawei itself receives hostile scrutiny from the Five Eyes, the EU, and Japan. US indictments are expected soon in other IP theft cases involving China. Upgrade Kubernetes. Russia and Ukraine swap cyberattacks in their ongoing hybrid war. An advance fee scam promises not only money, but maybe love, too. Emily Wilson from Terbium labs, on why she feels the Lesbians Who Tech conference gets diversity right. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_10.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1232</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c07586a632b94687a6f105fa91780e51]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9882503926.mp3?updated=1689969916" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Operation Red Signature targets South Korean supply chain. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/64/notes</link>
      <description>Researchers at Trend Micro uncovered a supply chain attack targeting organizations in South Korea. With the goal of information theft, attackers compromised the update server of a third party support provider, resulting in the installation of a RAT, or remote access trojan.

Rik Ferguson is Vice President of Security Research at Trend Micro, and he guides us through their discoveries.

The research can be found here:
 https://blog.trendmicro.com/trendlabs-security-intelligence/supply-chain-attack-operation-red-signature-targets-south-korean-organizations/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Dec 2018 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>64</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5ee8b992-df0f-11ea-9c25-fb7628070baa/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Operation Red Signature targets South Korean supply chain</itunes:subtitle>
      <itunes:summary>Researchers at Trend Micro uncovered a supply chain attack targeting organizations in South Korea. With the goal of information theft, attackers compromised the update server of a third party support provider, resulting in the installation of a RAT, or remote access trojan.

Rik Ferguson is Vice President of Security Research at Trend Micro, and he guides us through their discoveries.

The research can be found here:
 https://blog.trendmicro.com/trendlabs-security-intelligence/supply-chain-attack-operation-red-signature-targets-south-korean-organizations/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Trend Micro uncovered a supply chain attack targeting organizations in South Korea. With the goal of information theft, attackers compromised the update server of a third party support provider, resulting in the installation of a RAT, or remote access trojan.</p><p><br></p><p>Rik Ferguson is Vice President of Security Research at Trend Micro, and he guides us through their discoveries.</p><p><br></p><p>The research can be found here:</p><p><a href="https://blog.trendmicro.com/trendlabs-security-intelligence/supply-chain-attack-operation-red-signature-targets-south-korean-organizations/"> https://blog.trendmicro.com/trendlabs-security-intelligence/supply-chain-attack-operation-red-signature-targets-south-korean-organizations/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1591</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8312255bd7bb4e05b456b42454d10189]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5454871642.mp3?updated=1685022688" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Huawei legal and security updates. A shift to personalized spam in attacks on retailers. “Hollywood hacks” in Eastern European banks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/740/notes</link>
      <description>In today’s podcast we hear that Huawei’s CFO remains in Canadian custody, perhaps facing extradition to the US. All Five Eyes have now expressed strong reservations about Huawei on security grounds. They’ve been joined in this by Japan and the European Union. Proofpoint sees a shift in cybercrime toward more carefully targeted and thoughtful social engineering. Kaspersky describes “DarkVishnaya,” a criminal campaign using surreptitiously planted hardware to loot Eastern European banks. Justin Harvey from Accenture discussing what should be in your incident response “go bag.” Guest is New York Times national security correspondent David E. Sanger, discussing his latest book The Perfect Weapon.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_07.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 07 Dec 2018 20:55:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>740</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/85df6936-def8-11ea-911f-f77a44f6e9c8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Huawei legal and security updates. A shift to personalized spam in attacks on retailers. “Hollywood hacks” in Eastern European banks.</itunes:subtitle>
      <itunes:summary>In today’s podcast we hear that Huawei’s CFO remains in Canadian custody, perhaps facing extradition to the US. All Five Eyes have now expressed strong reservations about Huawei on security grounds. They’ve been joined in this by Japan and the European Union. Proofpoint sees a shift in cybercrime toward more carefully targeted and thoughtful social engineering. Kaspersky describes “DarkVishnaya,” a criminal campaign using surreptitiously planted hardware to loot Eastern European banks. Justin Harvey from Accenture discussing what should be in your incident response “go bag.” Guest is New York Times national security correspondent David E. Sanger, discussing his latest book The Perfect Weapon.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_07.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear that Huawei’s CFO remains in Canadian custody, perhaps facing extradition to the US. All Five Eyes have now expressed strong reservations about Huawei on security grounds. They’ve been joined in this by Japan and the European Union. Proofpoint sees a shift in cybercrime toward more carefully targeted and thoughtful social engineering. Kaspersky describes “DarkVishnaya,” a criminal campaign using surreptitiously planted hardware to loot Eastern European banks. Justin Harvey from Accenture discussing what should be in your incident response “go bag.” Guest is New York Times national security correspondent David E. Sanger, discussing his latest book The Perfect Weapon.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_07.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1617</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[666cca15db9f4dbbbe8fc5f1732d2e0c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1941486904.mp3?updated=1608755803" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Huawei CFO arrested in Canada, faces extradition to US. Anonymous claims that Chinese intelligence hacked Marriott. Russian hospital phished. SamSam indictments, warnings. Facebook agonistes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/739/notes</link>
      <description>In today’s podcast, we hear that Huawei’s CFO was arrested in Vancouver on a US sanctions beef. Anonymous sources tell Reuters Chinese intelligence was behind the Marriott hack. A Flash zero-day is used in an attack against a Russian hospital. SamSam warnings and new US indictments. In the UK, Parliament releases internal Facebook emails that suggest discreditable data-use practices. Facebook says the emails are being taken out of context. And DDoS downs Illinois homework. Dr. Charles Clancy from VA Tech’s Hume Center on the ban of specific 5G hardware around the world. Guest is Tom Bonner from Cylance on the SpyRATs of Ocean Lotus.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_06.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 06 Dec 2018 20:47:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>739</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/85f4418a-def8-11ea-911f-5f41c3ac391a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Huawei CFO arrested in Canada, faces extradition to US. Anonymous claims that Chinese intelligence hacked Marriott. Russian hospital phished. SamSam indictments, warnings. Facebook agonistes.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Huawei’s CFO was arrested in Vancouver on a US sanctions beef. Anonymous sources tell Reuters Chinese intelligence was behind the Marriott hack. A Flash zero-day is used in an attack against a Russian hospital. SamSam warnings and new US indictments. In the UK, Parliament releases internal Facebook emails that suggest discreditable data-use practices. Facebook says the emails are being taken out of context. And DDoS downs Illinois homework. Dr. Charles Clancy from VA Tech’s Hume Center on the ban of specific 5G hardware around the world. Guest is Tom Bonner from Cylance on the SpyRATs of Ocean Lotus.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_06.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Huawei’s CFO was arrested in Vancouver on a US sanctions beef. Anonymous sources tell Reuters Chinese intelligence was behind the Marriott hack. A Flash zero-day is used in an attack against a Russian hospital. SamSam warnings and new US indictments. In the UK, Parliament releases internal Facebook emails that suggest discreditable data-use practices. Facebook says the emails are being taken out of context. And DDoS downs Illinois homework. Dr. Charles Clancy from VA Tech’s Hume Center on the ban of specific 5G hardware around the world. Guest is Tom Bonner from Cylance on the SpyRATs of Ocean Lotus.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_06.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1288</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3c58bacf592246b3a40dcc4985ccf12f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5908901880.mp3?updated=1689969585" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DDoS and BEC risks rising. Ukraine says it stopped Russian cyber campaign. EU looks to stopping disinformation. NRCC email compromise. Facebook emails released by Parliament. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/738/notes</link>
      <description>In today’s podcast, we hear that CoAp-based DDoS attacks are on the rise. A Nigerian gang has done some industrial-scale work on business email compromise. Ukraine says it stopped a major Russian cyber attack. The EU looks toward its May elections and determines to do something about disinformation. The US National Republican Congressional Committee sustains an email compromise. Attribtution of a phishing expedition to Cozy Bear grows dubious. And Westminster doxes Facebook.  Joe Carrigan from JHU ISI explaining the National Centers for Academic Excellence. Carole Theriault interviews SANS’ James Lyne explains the Cyber Discovery program which aims bolster the security workforce.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_05.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 05 Dec 2018 22:16:52 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>738</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/860e56ce-def8-11ea-911f-a7dd2109cf0f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>DDoS and BEC risks rising. Ukraine says it stopped Russian cyber campaign. EU looks to stopping disinformation. NRCC email compromise. Facebook emails released by Parliament. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that CoAp-based DDoS attacks are on the rise. A Nigerian gang has done some industrial-scale work on business email compromise. Ukraine says it stopped a major Russian cyber attack. The EU looks toward its May elections and determines to do something about disinformation. The US National Republican Congressional Committee sustains an email compromise. Attribtution of a phishing expedition to Cozy Bear grows dubious. And Westminster doxes Facebook.  Joe Carrigan from JHU ISI explaining the National Centers for Academic Excellence. Carole Theriault interviews SANS’ James Lyne explains the Cyber Discovery program which aims bolster the security workforce.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_05.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that CoAp-based DDoS attacks are on the rise. A Nigerian gang has done some industrial-scale work on business email compromise. Ukraine says it stopped a major Russian cyber attack. The EU looks toward its May elections and determines to do something about disinformation. The US National Republican Congressional Committee sustains an email compromise. Attribtution of a phishing expedition to Cozy Bear grows dubious. And Westminster doxes Facebook.  Joe Carrigan from JHU ISI explaining the National Centers for Academic Excellence. Carole Theriault interviews SANS’ James Lyne explains the Cyber Discovery program which aims bolster the security workforce.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_05.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1299</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f6cca5855ec24f29a9aad1b5655f27cc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1285719349.mp3?updated=1689969054" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fancy Bear in Czech government systems. Watering hole attacks. Quora breached. Marriott breach follow-up. Kubernetes privilege escalation flaw. Scams kicked out of Apple’s App Store.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/737/notes</link>
      <description>In today’s podcast we hear how Fancy Bears and free-range catphish have been disporting themselves in the Czech Republic. China reported to have used watering hole attacks to gain entry into Australian institutions. Quora suffers a data breach. Marriott’s breach response earns mediocre marks. A Kubernetes privilege escalation flaw is found and patched. Two scammy apps are ejected from Apple’s App Store. An object lesson in the difficulty of controlling fake news—or at least fake op-eds.  Jonathan Katz from UMD on SSD drive encryption security woes. Guest is Brian Egenrieder from SyncDog on the challenges of commingling work and personal mobile devices.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_04.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Dec 2018 18:59:25 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>737</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/86269f72-def8-11ea-911f-1f6167926c24/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fancy Bear in Czech government systems. Watering hole attacks. Quora breached. Marriott breach follow-up. Kubernetes privilege escalation flaw. Scams kicked out of Apple’s App Store.</itunes:subtitle>
      <itunes:summary>In today’s podcast we hear how Fancy Bears and free-range catphish have been disporting themselves in the Czech Republic. China reported to have used watering hole attacks to gain entry into Australian institutions. Quora suffers a data breach. Marriott’s breach response earns mediocre marks. A Kubernetes privilege escalation flaw is found and patched. Two scammy apps are ejected from Apple’s App Store. An object lesson in the difficulty of controlling fake news—or at least fake op-eds.  Jonathan Katz from UMD on SSD drive encryption security woes. Guest is Brian Egenrieder from SyncDog on the challenges of commingling work and personal mobile devices.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_04.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear how Fancy Bears and free-range catphish have been disporting themselves in the Czech Republic. China reported to have used watering hole attacks to gain entry into Australian institutions. Quora suffers a data breach. Marriott’s breach response earns mediocre marks. A Kubernetes privilege escalation flaw is found and patched. Two scammy apps are ejected from Apple’s App Store. An object lesson in the difficulty of controlling fake news—or at least fake op-eds.  Jonathan Katz from UMD on SSD drive encryption security woes. Guest is Brian Egenrieder from SyncDog on the challenges of commingling work and personal mobile devices.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_12_04.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1309</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a3c9de03a79b488087d8b987f7f2b55e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2444582013.mp3?updated=1689969049" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US Defense Department and UK’s MI6 aren’t buying Russian honey over cyber operations. Iranian influence operations. Marriott breach fallout. Court upholds Kaspersky ban. Ransom and sanctions.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/736/notes</link>
      <description>In today’s podcast, we hear that senior US and UK officials have harsh words for Russian actions in cyberspace even as President Putin undertakes a charm offensive at the G20 meetings. (In fairness to the US and UK officials, it’s a pretty dour charm offensive.) Iran ups its influence operations game. Legal investigations and legislative responses to the Marriott breach begin. A US Court upholds the Government’s ban on Kaspersky products. And paying ransom to cyber extortionists could violate US sanctions. Daniel Prince from Lancaster University discussing growth, innovation and productivity within cyber security.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_13_03.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 03 Dec 2018 21:35:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>736</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/863b044e-def8-11ea-911f-db91349e2ef8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>US Defense Department and UK’s MI6 aren’t buying Russian honey over cyber operations. Iranian influence operations. Marriott breach fallout. Court upholds Kaspersky ban. Ransom and sanctions.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that senior US and UK officials have harsh words for Russian actions in cyberspace even as President Putin undertakes a charm offensive at the G20 meetings. (In fairness to the US and UK officials, it’s a pretty dour charm offensive.) Iran ups its influence operations game. Legal investigations and legislative responses to the Marriott breach begin. A US Court upholds the Government’s ban on Kaspersky products. And paying ransom to cyber extortionists could violate US sanctions. Daniel Prince from Lancaster University discussing growth, innovation and productivity within cyber security.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_13_03.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that senior US and UK officials have harsh words for Russian actions in cyberspace even as President Putin undertakes a charm offensive at the G20 meetings. (In fairness to the US and UK officials, it’s a pretty dour charm offensive.) Iran ups its influence operations game. Legal investigations and legislative responses to the Marriott breach begin. A US Court upholds the Government’s ban on Kaspersky products. And paying ransom to cyber extortionists could violate US sanctions. Daniel Prince from Lancaster University discussing growth, innovation and productivity within cyber security.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_13_03.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>968</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[74dd6a62eeb2494e876b540c794098fc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3987301235.mp3?updated=1689968348" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Settling in with GDPR. [CyberWire-X]</title>
      <link>https://thecyberwire.com/podcasts/cyberwire-x/2/notes</link>
      <description>In the second episode of our new, four-part series, called “Ground Truth or Consequences: the challenges and opportunities of regulation in cyberspace,” we take a look at the impact GDPR has had since it's implementation in May 2018.
Joining us are Emily Mossburg from Deloitte, Caleb Barlow from IBM and Steve Durbin from ISF.
Later in the program we'll hear from Jason Hart, CTO for enterprise and cybersecurity at Gemalto. They're the sponsors of this show.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 03 Dec 2018 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/20c01b50-df01-11ea-beb2-47b6b28e662e/image/cyberwire-x-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Settling in with GDPR</itunes:subtitle>
      <itunes:summary>In the second episode of our new, four-part series, called “Ground Truth or Consequences: the challenges and opportunities of regulation in cyberspace,” we take a look at the impact GDPR has had since it's implementation in May 2018.
Joining us are Emily Mossburg from Deloitte, Caleb Barlow from IBM and Steve Durbin from ISF.
Later in the program we'll hear from Jason Hart, CTO for enterprise and cybersecurity at Gemalto. They're the sponsors of this show.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In the second episode of our new, four-part series, called “Ground Truth or Consequences: the challenges and opportunities of regulation in cyberspace,” we take a look at the impact GDPR has had since it's implementation in May 2018.</p><p>Joining us are Emily Mossburg from Deloitte, Caleb Barlow from IBM and Steve Durbin from ISF.</p><p>Later in the program we'll hear from Jason Hart, CTO for enterprise and cybersecurity at Gemalto. They're the sponsors of this show.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1794</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[edc1b331bba3435084e0d2cd594df83f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5301077053.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Getting an education on Cobalt Dickens. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/63/notes</link>
      <description>Researchers from Secureworks' Counter Threat Unit have been tracking a threat group spoofing login pages for universities. Evidence suggests the Iranian group Cobalt Dickens is likely responsible.
Allison Wikoff is a senior researcher at Secureworks, and she joins us to share what they've found.

The original research is here:
 https://www.secureworks.com/blog/back-to-school-cobalt-dickens-targets-universities
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Dec 2018 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>63</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5c5a620c-df0f-11ea-92cb-8f7b25669097/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Getting an education on Cobalt Dickens</itunes:subtitle>
      <itunes:summary>Researchers from Secureworks' Counter Threat Unit have been tracking a threat group spoofing login pages for universities. Evidence suggests the Iranian group Cobalt Dickens is likely responsible.
Allison Wikoff is a senior researcher at Secureworks, and she joins us to share what they've found.

The original research is here:
 https://www.secureworks.com/blog/back-to-school-cobalt-dickens-targets-universities
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers from Secureworks' Counter Threat Unit have been tracking a threat group spoofing login pages for universities. Evidence suggests the Iranian group Cobalt Dickens is likely responsible.</p><p>Allison Wikoff is a senior researcher at Secureworks, and she joins us to share what they've found.</p><p><br></p><p>The original research is here:</p><p><a href="https://www.secureworks.com/blog/back-to-school-cobalt-dickens-targets-universities"> https://www.secureworks.com/blog/back-to-school-cobalt-dickens-targets-universities</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>901</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7850397d559a446596ed2e7febdd2ba0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7502973525.mp3?updated=1685022679" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Marriott suffers data breach. Dunkin Donuts credential stuffing attack. Urban Massage database exposed, unsecured. Fancy Bear paws at German government targets. SamSam cost. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/735/notes</link>
      <description>In today’s podcast we hear about Marriott’s big breach. And Dunkin’ Donuts big breach. And, and, Urban Massage’s embarrassing exposure. Lessons are drawn about third-party risk, password reuse, and the importance of being less creepy to the people you do business with. Fancy Bear shows up to paw at the phish swimming in Germany’s government. And how much did SamSam really cost people? FBI? DoJ? Is it millions or billions? In either case you’re talking about real money. Robert M. Lee from Dragos discussing the notion of IoT hot water heaters taking down the power grid. Guest is Michelle Guel from Cisco, discussing smart cities and her perspective as a pioneering woman in the industry.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_30.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 30 Nov 2018 20:16:14 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>735</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/864d3c04-def8-11ea-911f-7f838da604bc/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Marriott suffers data breach. Dunkin Donuts credential stuffing attack. Urban Massage database exposed, unsecured. Fancy Bear paws at German government targets. SamSam cost. </itunes:subtitle>
      <itunes:summary>In today’s podcast we hear about Marriott’s big breach. And Dunkin’ Donuts big breach. And, and, Urban Massage’s embarrassing exposure. Lessons are drawn about third-party risk, password reuse, and the importance of being less creepy to the people you do business with. Fancy Bear shows up to paw at the phish swimming in Germany’s government. And how much did SamSam really cost people? FBI? DoJ? Is it millions or billions? In either case you’re talking about real money. Robert M. Lee from Dragos discussing the notion of IoT hot water heaters taking down the power grid. Guest is Michelle Guel from Cisco, discussing smart cities and her perspective as a pioneering woman in the industry.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_30.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear about Marriott’s big breach. And Dunkin’ Donuts big breach. And, and, Urban Massage’s embarrassing exposure. Lessons are drawn about third-party risk, password reuse, and the importance of being less creepy to the people you do business with. Fancy Bear shows up to paw at the phish swimming in Germany’s government. And how much did SamSam really cost people? FBI? DoJ? Is it millions or billions? In either case you’re talking about real money. Robert M. Lee from Dragos discussing the notion of IoT hot water heaters taking down the power grid. Guest is Michelle Guel from Cisco, discussing smart cities and her perspective as a pioneering woman in the industry.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_30.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1510</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[047aac24faf940b88171843cb3a4aab9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2001503827.mp3?updated=1608755799" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Reconnaissance and degradation. Hybrid war in Eastern Europe and Southwest Asia. Eternal Silence infects unpatched systems. Dell customers reset passwords. SamSam indictments.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/734/notes</link>
      <description>In today’s podcast, we hear warnings of Russian recon “degradation” of the North American power grid. Information operations in Russia’s hybrid war against Ukraine. Factions in Yemen’s civil war contest cyberspace (and fiber optic cables). Eternal Silence exploits systems not patched against EternalBlue and EternalRed. Dell tells its customers to reset their passwords. And the US indicts two Iranians for deploying the SamSam ransomware. Emily Wilson from Terbium labs with unintended consequences of GDPR. Guest is Francis Dinha, founder and CEO of OpenVPN, discussing the VPN landscape.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_29.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 29 Nov 2018 22:06:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>734</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8665de08-def8-11ea-911f-d76faa2ca2b0/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Reconnaissance and degradation. Hybrid war in Eastern Europe and Southwest Asia. Eternal Silence infects unpatched systems. Dell customers reset passwords. SamSam indictments.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear warnings of Russian recon “degradation” of the North American power grid. Information operations in Russia’s hybrid war against Ukraine. Factions in Yemen’s civil war contest cyberspace (and fiber optic cables). Eternal Silence exploits systems not patched against EternalBlue and EternalRed. Dell tells its customers to reset their passwords. And the US indicts two Iranians for deploying the SamSam ransomware. Emily Wilson from Terbium labs with unintended consequences of GDPR. Guest is Francis Dinha, founder and CEO of OpenVPN, discussing the VPN landscape.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_29.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear warnings of Russian recon “degradation” of the North American power grid. Information operations in Russia’s hybrid war against Ukraine. Factions in Yemen’s civil war contest cyberspace (and fiber optic cables). Eternal Silence exploits systems not patched against EternalBlue and EternalRed. Dell tells its customers to reset their passwords. And the US indicts two Iranians for deploying the SamSam ransomware. Emily Wilson from Terbium labs with unintended consequences of GDPR. Guest is Francis Dinha, founder and CEO of OpenVPN, discussing the VPN landscape.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_29.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1267</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4e69642fe4e4c9394926b5299c878ef]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3915483744.mp3?updated=1689968320" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DNSpionage. Cobalt Dickens’ unwelcome return. iOS spyware may be more widespread than believed. Governments move toward content moderation. Small towns, big problems.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/733/notes</link>
      <description>In today’s podcast, we hear that DNSpionage espionage tools are hitting Middle Eastern targets. Iran’s Cobalt Dickens returns to pester universities. Lawful intercept vendors receive more scrutiny, and that scrutiny suggests iOS might not have escaped their attention as much as many had assumed. Facebook gets grilled in London. Nine Western countries issue a joint communique resolving to control “false and misleading” content on the Internet. And lessons from small towns. Ben Yelin from UMD CHHS reviewing government requests of Google’s Nest to turn over user information. UK correspondent Carole Theriault speaks with Graham Cluley about police monitoring criminals using the Ironchat secure messaging service.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_28.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 28 Nov 2018 20:46:50 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>733</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/867deba6-def8-11ea-911f-7be4a2b9bb45/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>DNSpionage. Cobalt Dickens’ unwelcome return. iOS spyware may be more widespread than believed. Governments move toward content moderation. Small towns, big problems.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that DNSpionage espionage tools are hitting Middle Eastern targets. Iran’s Cobalt Dickens returns to pester universities. Lawful intercept vendors receive more scrutiny, and that scrutiny suggests iOS might not have escaped their attention as much as many had assumed. Facebook gets grilled in London. Nine Western countries issue a joint communique resolving to control “false and misleading” content on the Internet. And lessons from small towns. Ben Yelin from UMD CHHS reviewing government requests of Google’s Nest to turn over user information. UK correspondent Carole Theriault speaks with Graham Cluley about police monitoring criminals using the Ironchat secure messaging service.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_28.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that DNSpionage espionage tools are hitting Middle Eastern targets. Iran’s Cobalt Dickens returns to pester universities. Lawful intercept vendors receive more scrutiny, and that scrutiny suggests iOS might not have escaped their attention as much as many had assumed. Facebook gets grilled in London. Nine Western countries issue a joint communique resolving to control “false and misleading” content on the Internet. And lessons from small towns. Ben Yelin from UMD CHHS reviewing government requests of Google’s Nest to turn over user information. UK correspondent Carole Theriault speaks with Graham Cluley about police monitoring criminals using the Ironchat secure messaging service.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_28.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1284</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3e3f1a1a69c3459db258e6fe0aaaa987]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5105456042.mp3?updated=1689968308" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rotexy Trojan gets worse. Bad apps in Google Play. Backdoor for crypto-wallets. Facebook goes before Parliament. Pegasus spyware versus journalists. Russian hybrid war. Too-smart devices. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/732/notes</link>
      <description>In today’s podcast we hear that the Rotexy Trojan has evolved into phishing and ransomware. Bad apps found in Google Play. An open source library used in cryptocurrency wallets had a wide-open backdoor. Facebook goes before Parliament, which seems in a pretty feisty mood. Pegasus spyware found to have been deployed against journalists in Mexico and elsewhere. Russia escalates its hybrid war against Ukraine. Do people care if their smart speakers eavesdrop? How about their smart lightbulbs? Johannes Ullrich from SANs and the ISC Stormcast podcast on DNS over HTTPS and network visibility. Guest is Shaun Bierweiler from Hortonworks on the use of open source software in the federal space.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_27.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Nov 2018 21:16:13 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>732</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/868c4958-def8-11ea-911f-c3db7dcc75ed/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Rotexy Trojan gets worse. Bad apps in Google Play. Backdoor for crypto-wallets. Facebook goes before Parliament. Pegasus spyware versus journalists. Russian hybrid war. Too-smart devices. </itunes:subtitle>
      <itunes:summary>In today’s podcast we hear that the Rotexy Trojan has evolved into phishing and ransomware. Bad apps found in Google Play. An open source library used in cryptocurrency wallets had a wide-open backdoor. Facebook goes before Parliament, which seems in a pretty feisty mood. Pegasus spyware found to have been deployed against journalists in Mexico and elsewhere. Russia escalates its hybrid war against Ukraine. Do people care if their smart speakers eavesdrop? How about their smart lightbulbs? Johannes Ullrich from SANs and the ISC Stormcast podcast on DNS over HTTPS and network visibility. Guest is Shaun Bierweiler from Hortonworks on the use of open source software in the federal space.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_27.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear that the Rotexy Trojan has evolved into phishing and ransomware. Bad apps found in Google Play. An open source library used in cryptocurrency wallets had a wide-open backdoor. Facebook goes before Parliament, which seems in a pretty feisty mood. Pegasus spyware found to have been deployed against journalists in Mexico and elsewhere. Russia escalates its hybrid war against Ukraine. Do people care if their smart speakers eavesdrop? How about their smart lightbulbs? Johannes Ullrich from SANs and the ISC Stormcast podcast on DNS over HTTPS and network visibility. Guest is Shaun Bierweiler from Hortonworks on the use of open source software in the federal space.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_27.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1213</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[496f4bc42e8f4807813eeb28b33633cb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2831031231.mp3?updated=1689968288" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A quick look at the state of spam. Phishing for power grids. Industrial espionage. Free and command economy versions of social control. Lessons from JTF Ares.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/731/notes</link>
      <description>In today’s podcast we hear that Emotet ramped up for Black Friday—beware of the spam. Social engineering and the power grid. Industrial espionage resurfaces as an issue in Sino-American relations. Huawei remains unforgiven in Washington. China’s emerging social credit system. Bottom-up social control in the US: first they came for the dogwalkers. Making a Dutch book on social media. Russia tightens Internet laws. The US Army learns some lessons, in a good way, from Joint Task Force Ares. Joe Carrigan from JHU ISI, wondering if we have a cyber skills gap or a shortage of courage. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_26.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 26 Nov 2018 21:48:54 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>731</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/86a31822-def8-11ea-911f-6bc69cc50e26/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A quick look at the state of spam. Phishing for power grids. Industrial espionage. Free and command economy versions of social control. Lessons from JTF Ares.</itunes:subtitle>
      <itunes:summary>In today’s podcast we hear that Emotet ramped up for Black Friday—beware of the spam. Social engineering and the power grid. Industrial espionage resurfaces as an issue in Sino-American relations. Huawei remains unforgiven in Washington. China’s emerging social credit system. Bottom-up social control in the US: first they came for the dogwalkers. Making a Dutch book on social media. Russia tightens Internet laws. The US Army learns some lessons, in a good way, from Joint Task Force Ares. Joe Carrigan from JHU ISI, wondering if we have a cyber skills gap or a shortage of courage. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_26.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear that Emotet ramped up for Black Friday—beware of the spam. Social engineering and the power grid. Industrial espionage resurfaces as an issue in Sino-American relations. Huawei remains unforgiven in Washington. China’s emerging social credit system. Bottom-up social control in the US: first they came for the dogwalkers. Making a Dutch book on social media. Russia tightens Internet laws. The US Army learns some lessons, in a good way, from Joint Task Force Ares. Joe Carrigan from JHU ISI, wondering if we have a cyber skills gap or a shortage of courage. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_26.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1135</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[828557737e7e4e0ca3e350c458b75e4a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2730474392.mp3?updated=1689968279" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Perils of paycards, as Cyber Weekend approacheth. Tessa88 is identified. Many more people than before have now heard of High Tail Hall.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/730/notes</link>
      <description>In today’s podcast, we hear that Amazon has offered customers a modified, limited hangout on some kind of data exposure. The online retailer says everything’s OK, but it hasn’t said much else. Facebook is back online—yesterday’s outage attributed to a server misconfiguration. Shoppers and retailers prepare for Cyber Weekend. Tessa88, the dark web data hawker, may have been identified. Cyber espionage continues. And there’s been another breach in what we’ve curiously agreed to call an “adult” site. David Dufour from Webroot on the pros and cons of open source code. Guest is Andrew Kling from Schneider Electric with an update on Triton malware.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_21.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 21 Nov 2018 20:20:43 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>730</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/86b6c07a-def8-11ea-911f-abe9fac3c5c1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Perils of paycards, as Cyber Weekend approacheth. Tessa88 is identified. Many more people than before have now heard of High Tail Hall.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Amazon has offered customers a modified, limited hangout on some kind of data exposure. The online retailer says everything’s OK, but it hasn’t said much else. Facebook is back online—yesterday’s outage attributed to a server misconfiguration. Shoppers and retailers prepare for Cyber Weekend. Tessa88, the dark web data hawker, may have been identified. Cyber espionage continues. And there’s been another breach in what we’ve curiously agreed to call an “adult” site. David Dufour from Webroot on the pros and cons of open source code. Guest is Andrew Kling from Schneider Electric with an update on Triton malware.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_21.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Amazon has offered customers a modified, limited hangout on some kind of data exposure. The online retailer says everything’s OK, but it hasn’t said much else. Facebook is back online—yesterday’s outage attributed to a server misconfiguration. Shoppers and retailers prepare for Cyber Weekend. Tessa88, the dark web data hawker, may have been identified. Cyber espionage continues. And there’s been another breach in what we’ve curiously agreed to call an “adult” site. David Dufour from Webroot on the pros and cons of open source code. Guest is Andrew Kling from Schneider Electric with an update on Triton malware.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_21.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1282</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fe7047bedb8c4274ac336603cb68b99a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8498943047.mp3?updated=1689968265" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Nation-state cyber campaigns: North Korean, Iranian, Russian, and unknown. Social media outages.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/729/notes</link>
      <description>In today’s podcast, we hear about nations behaving badly (but from the point-of-view of cyberespionage they’re doing, unfortunately, well). The Lazarus Group is back robbing banks in Asia and Latin America. Russia’s Hades Group, known for Olympic Destroyer, is back, too. Gamaredon and Cozy Bear have returned, respectively pestering Ukraine and the US. Iran’s OilRig is upping its game with just-in-time malicious phishbait. And it’s not you: Facebook has been down. Malek Ben Salem from Accenture Labs on skills squatting with Amazon’s Alexa. Guest is Ronnie Tokazowski from Flashpoint on his work with the business email compromise working group.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Nov 2018 20:46:09 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>729</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/86cb996e-def8-11ea-911f-2f68c0dc043a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Nation-state cyber campaigns: North Korean, Iranian, Russian, and unknown. Social media outages.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear about nations behaving badly (but from the point-of-view of cyberespionage they’re doing, unfortunately, well). The Lazarus Group is back robbing banks in Asia and Latin America. Russia’s Hades Group, known for Olympic Destroyer, is back, too. Gamaredon and Cozy Bear have returned, respectively pestering Ukraine and the US. Iran’s OilRig is upping its game with just-in-time malicious phishbait. And it’s not you: Facebook has been down. Malek Ben Salem from Accenture Labs on skills squatting with Amazon’s Alexa. Guest is Ronnie Tokazowski from Flashpoint on his work with the business email compromise working group.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear about nations behaving badly (but from the point-of-view of cyberespionage they’re doing, unfortunately, well). The Lazarus Group is back robbing banks in Asia and Latin America. Russia’s Hades Group, known for Olympic Destroyer, is back, too. Gamaredon and Cozy Bear have returned, respectively pestering Ukraine and the US. Iran’s OilRig is upping its game with just-in-time malicious phishbait. And it’s not you: Facebook has been down. Malek Ben Salem from Accenture Labs on skills squatting with Amazon’s Alexa. Guest is Ronnie Tokazowski from Flashpoint on his work with the business email compromise working group.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1286</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2d8a24534f6945a2b6038371aa0cd4ed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1152982996.mp3?updated=1689968253" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CISA is now officially an agency. Cozy Bear is back. Gmail spoofing issue opens social engineering possibilities. Speculation about “cyber 9/11s.” </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/728/notes</link>
      <description>In today’s podcast, we hear that CISA is now an agency within DHS. Cozy Bear is back, and spearphishing in American civilian waters. Ukrainian authorities say they’ve detected and blocked a malware campaign that appears targeted against former Soviet Republics. A reported Gmail issue may make for more plausible social engineering. The Outlaw criminal group expands into cryptojacking. Infrastructure, financial, and data corruption attacks discussed as possible “cyber 9/11s”. Rick Howard from Palo Alto Networks with a book recommendation from the Cybersecurity Canon project.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_19.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 19 Nov 2018 20:46:13 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>728</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/86e5e2d8-def8-11ea-911f-5b637c689171/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>CISA is now officially an agency. Cozy Bear is back. Gmail spoofing issue opens social engineering possibilities. Speculation about “cyber 9/11s.” </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that CISA is now an agency within DHS. Cozy Bear is back, and spearphishing in American civilian waters. Ukrainian authorities say they’ve detected and blocked a malware campaign that appears targeted against former Soviet Republics. A reported Gmail issue may make for more plausible social engineering. The Outlaw criminal group expands into cryptojacking. Infrastructure, financial, and data corruption attacks discussed as possible “cyber 9/11s”. Rick Howard from Palo Alto Networks with a book recommendation from the Cybersecurity Canon project.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_19.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that CISA is now an agency within DHS. Cozy Bear is back, and spearphishing in American civilian waters. Ukrainian authorities say they’ve detected and blocked a malware campaign that appears targeted against former Soviet Republics. A reported Gmail issue may make for more plausible social engineering. The Outlaw criminal group expands into cryptojacking. Infrastructure, financial, and data corruption attacks discussed as possible “cyber 9/11s”. Rick Howard from Palo Alto Networks with a book recommendation from the Cybersecurity Canon project.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_19.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1033</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6ad56968d13c4f63b1a6270175bb8bdf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1580789197.mp3?updated=1689968241" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Doubling down on Cobalt Group activity. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/62/notes</link>
      <description>The NETSCOUT Arbor ASERT team has been tracking Cobalt Group campaigns targeting financial institutions. Richard Hummel is manager of threat intelligence with ASERT, and he joins us to share his team's findings. 
The research can be found here:
 https://asert.arbornetworks.com/double-the-infection-double-the-fun/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Nov 2018 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>62</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/59682bce-df0f-11ea-a9f1-fb1195b1f17d/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Doubling down on Cobalt Group activity</itunes:subtitle>
      <itunes:summary>The NETSCOUT Arbor ASERT team has been tracking Cobalt Group campaigns targeting financial institutions. Richard Hummel is manager of threat intelligence with ASERT, and he joins us to share his team's findings. 
The research can be found here:
 https://asert.arbornetworks.com/double-the-infection-double-the-fun/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The NETSCOUT Arbor ASERT team has been tracking Cobalt Group campaigns targeting financial institutions. Richard Hummel is manager of threat intelligence with ASERT, and he joins us to share his team's findings. </p><p>The research can be found here:</p><p><a href="https://asert.arbornetworks.com/double-the-infection-double-the-fun/"> https://asert.arbornetworks.com/double-the-infection-double-the-fun/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1292</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[45d8fbb399a84fe09406e8c75badc50b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7553680547.mp3?updated=1685022666" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>GPS jamming. Bank phishing. Exposed server. Censorship, East, West, and South. Is there a sealed indictment of Julian Assange?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/727/notes</link>
      <description>In today’s podcast, we ask a question: when does a military exercise become hybrid warfare? Answer: when it affects civilian safety. Like with GPS jamming. Russian banks are sustaining a major, and well-crafted, phishing campaign. An unprotected server exposes SMS messages. China tightens laws enabling censorship and social control. It also helps Venezuela to do likewise. And did the US indict Julian Assange, or is it just a cut-and-paste error? Craig Williams from Cisco Talos with info on the sextortion scams they’ve been tracking. Guest is Christopher Porter from FireEye on threats in the aviation sector.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_16.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 16 Nov 2018 20:46:43 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>727</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/870aa474-def8-11ea-911f-7f4b9e46281b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>GPS jamming. Bank phishing. Exposed server. Censorship, East, West, and South. Is there a sealed indictment of Julian Assange?</itunes:subtitle>
      <itunes:summary>In today’s podcast, we ask a question: when does a military exercise become hybrid warfare? Answer: when it affects civilian safety. Like with GPS jamming. Russian banks are sustaining a major, and well-crafted, phishing campaign. An unprotected server exposes SMS messages. China tightens laws enabling censorship and social control. It also helps Venezuela to do likewise. And did the US indict Julian Assange, or is it just a cut-and-paste error? Craig Williams from Cisco Talos with info on the sextortion scams they’ve been tracking. Guest is Christopher Porter from FireEye on threats in the aviation sector.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_16.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we ask a question: when does a military exercise become hybrid warfare? Answer: when it affects civilian safety. Like with GPS jamming. Russian banks are sustaining a major, and well-crafted, phishing campaign. An unprotected server exposes SMS messages. China tightens laws enabling censorship and social control. It also helps Venezuela to do likewise. And did the US indict Julian Assange, or is it just a cut-and-paste error? Craig Williams from Cisco Talos with info on the sextortion scams they’ve been tracking. Guest is Christopher Porter from FireEye on threats in the aviation sector.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_16.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1452</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[796bd487b67749819759a80b601c9cbe]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3952207003.mp3?updated=1608755802" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>RATs and the long game. New ransomware, Learning from other espionage services. Advance-fee scams continue to infest Twitter. Fancy Bear says it can’t be sued. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/726/notes</link>
      <description>In today’s podcast, we hear that tRAT indicates a criminal shift to a longer game. Chinese industrial espionage copies Russian services’ tricks. Dharma ransomware evolves. Bitcoin’s price may be tanking, but Bitcoin-based advance-fee scams are still all over Twitter, with bogus big brands’ blue checks all over them. Nigeria plans to go after cyber gangs. Fancy Bear says it can’t be sued, even if it did anything. And why a password manager is better than an infernal machine. Jonathan Katz from UMD describing a side channel attack on mobile device encryption. Guest is Mike McKee from ObserveIT on nation state attacks.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_15.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 15 Nov 2018 21:32:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>726</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/87261646-def8-11ea-911f-bbaaef655c05/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>RATs and the long game. New ransomware, Learning from other espionage services. Advance-fee scams continue to infest Twitter. Fancy Bear says it can’t be sued. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that tRAT indicates a criminal shift to a longer game. Chinese industrial espionage copies Russian services’ tricks. Dharma ransomware evolves. Bitcoin’s price may be tanking, but Bitcoin-based advance-fee scams are still all over Twitter, with bogus big brands’ blue checks all over them. Nigeria plans to go after cyber gangs. Fancy Bear says it can’t be sued, even if it did anything. And why a password manager is better than an infernal machine. Jonathan Katz from UMD describing a side channel attack on mobile device encryption. Guest is Mike McKee from ObserveIT on nation state attacks.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_15.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that tRAT indicates a criminal shift to a longer game. Chinese industrial espionage copies Russian services’ tricks. Dharma ransomware evolves. Bitcoin’s price may be tanking, but Bitcoin-based advance-fee scams are still all over Twitter, with bogus big brands’ blue checks all over them. Nigeria plans to go after cyber gangs. Fancy Bear says it can’t be sued, even if it did anything. And why a password manager is better than an infernal machine. Jonathan Katz from UMD describing a side channel attack on mobile device encryption. Guest is Mike McKee from ObserveIT on nation state attacks.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_15.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1206</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e0675d2e6f644fa19a45fb7b358e1a99]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5099109861.mp3?updated=1689961239" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When BGP hijacking isn’t hijacking at all. The White Company’s Operation Shaheen. SWAuTistic pleads guilty. NPPD will become CISA. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/725/notes</link>
      <description>In today’s podcast, we hear that Monday’s BGP hijacking wasn’t hijacking at all, but rather a fumbled upgrade in an ISP. The White Company’s Operation Shaheen is a nation-state espionage campaign directed against Pakistan’s military. Sleazy gamer and hacker SWAuTistic pleads guilty to Wichita swatting charges, and to bomb threats just about everywhere else. And the NPPD will soon become CISA, and the lead US civilian cybersecurity agency. Emily Wilson from Terbium Labs on their recent Truth About Dark Web Pricing white paper. Guest is Gregory Garrett from BDO on their telecommunications risk report.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_14.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 14 Nov 2018 20:22:51 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>725</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/875846b6-def8-11ea-911f-33f75e274641/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>When BGP hijacking isn’t hijacking at all. The White Company’s Operation Shaheen. SWAuTistic pleads guilty. NPPD will become CISA. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Monday’s BGP hijacking wasn’t hijacking at all, but rather a fumbled upgrade in an ISP. The White Company’s Operation Shaheen is a nation-state espionage campaign directed against Pakistan’s military. Sleazy gamer and hacker SWAuTistic pleads guilty to Wichita swatting charges, and to bomb threats just about everywhere else. And the NPPD will soon become CISA, and the lead US civilian cybersecurity agency. Emily Wilson from Terbium Labs on their recent Truth About Dark Web Pricing white paper. Guest is Gregory Garrett from BDO on their telecommunications risk report.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_14.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Monday’s BGP hijacking wasn’t hijacking at all, but rather a fumbled upgrade in an ISP. The White Company’s Operation Shaheen is a nation-state espionage campaign directed against Pakistan’s military. Sleazy gamer and hacker SWAuTistic pleads guilty to Wichita swatting charges, and to bomb threats just about everywhere else. And the NPPD will soon become CISA, and the lead US civilian cybersecurity agency. Emily Wilson from Terbium Labs on their recent Truth About Dark Web Pricing white paper. Guest is Gregory Garrett from BDO on their telecommunications risk report.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_14.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1300</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9a789b42d5a6481db21ed8ae86590464]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7556199180.mp3?updated=1689961222" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>GPS jamming. Jihadist account hijacking. ISIS on Wickr? Magecart exposed. Cathay Pacific breach. Paris Call for Trust and Security in Cyberspace.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/724/notes</link>
      <description>In today’s podcast, we hear that Finland is investigating  GPS signal jamming during NATO exercises. Russia’s the usual suspect, as usual Russia feels picked on and ill-used. Jihadists seem to be feeling the effects of social media screening, and may turn to account hijacking. Indian intelligence services look at ISIS use of Wickr. A look at Magecart. Cathay Pacific’s breach now believed to be worse than originally thought. The “Paris Call for Trust and Security in Cyberspace” expresses eight aspirations. Joe Carrigan from JHU ISI with a report on the NICE conference, and a presentation on including psychologists in cyber security decision making. Guest is Rich Bolstridge from Akamai with credential stuffing info from their latest State of Internet Security report.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_13.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Nov 2018 20:56:40 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>724</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8771ee7c-def8-11ea-911f-b7c6bbf1e53f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>GPS jamming. Jihadist account hijacking. ISIS on Wickr? Magecart exposed. Cathay Pacific breach. Paris Call for Trust and Security in Cyberspace.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that Finland is investigating  GPS signal jamming during NATO exercises. Russia’s the usual suspect, as usual Russia feels picked on and ill-used. Jihadists seem to be feeling the effects of social media screening, and may turn to account hijacking. Indian intelligence services look at ISIS use of Wickr. A look at Magecart. Cathay Pacific’s breach now believed to be worse than originally thought. The “Paris Call for Trust and Security in Cyberspace” expresses eight aspirations. Joe Carrigan from JHU ISI with a report on the NICE conference, and a presentation on including psychologists in cyber security decision making. Guest is Rich Bolstridge from Akamai with credential stuffing info from their latest State of Internet Security report.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_13.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that Finland is investigating  GPS signal jamming during NATO exercises. Russia’s the usual suspect, as usual Russia feels picked on and ill-used. Jihadists seem to be feeling the effects of social media screening, and may turn to account hijacking. Indian intelligence services look at ISIS use of Wickr. A look at Magecart. Cathay Pacific’s breach now believed to be worse than originally thought. The “Paris Call for Trust and Security in Cyberspace” expresses eight aspirations. Joe Carrigan from JHU ISI with a report on the NICE conference, and a presentation on including psychologists in cyber security decision making. Guest is Rich Bolstridge from Akamai with credential stuffing info from their latest State of Internet Security report.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_13.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1306</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c4c36cce62944405ab3297354191bf26]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1889341605.mp3?updated=1689961210" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Regulation in the U.S. [CyberWire-X}</title>
      <link>https://thecyberwire.com/podcasts/cyberwire-x/1/notes</link>
      <description>In this premier episode of our new, four-part series, called “Ground Truth or Consequences: the challenges and opportunities of regulation in cyberspace,” we take a closer look at cyber security regulation in the U.S. 
Joining us are Dr. Christopher Pierson from BlackCloak and Randy Sabett from Cooley LLC. 
Later in the program we'll hear from Jason Hart, CTO for enterprise and cybersecurity at Gemalto. They're the sponsors of this show.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Nov 2018 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/1f474a64-df01-11ea-83fc-d7b7cb78729c/image/cyberwire-x-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Regulation in the U.S.</itunes:subtitle>
      <itunes:summary>In this premier episode of our new, four-part series, called “Ground Truth or Consequences: the challenges and opportunities of regulation in cyberspace,” we take a closer look at cyber security regulation in the U.S. 
Joining us are Dr. Christopher Pierson from BlackCloak and Randy Sabett from Cooley LLC. 
Later in the program we'll hear from Jason Hart, CTO for enterprise and cybersecurity at Gemalto. They're the sponsors of this show.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this premier episode of our new, four-part series, called “Ground Truth or Consequences: the challenges and opportunities of regulation in cyberspace,” we take a closer look at cyber security regulation in the U.S. </p><p>Joining us are Dr. Christopher Pierson from BlackCloak and Randy Sabett from Cooley LLC. </p><p>Later in the program we'll hear from Jason Hart, CTO for enterprise and cybersecurity at Gemalto. They're the sponsors of this show.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1697</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6b88af89b35f4f789027207e110ced5e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2486088781.mp3" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Establishing international norms in cyberspace. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/61/notes</link>
      <description>Joseph Nye is former dean of the Harvard Kennedy School of Government. He served as Chair of the National Intelligence Council, and as Assistant Secretary of Defense for International Security Affairs under President Clinton. He serves as a Commissioner for the Global Commission on Internet Governance, and is the author of over a dozen books, including, “Soft Power: The means to success in work politics,” and “The future of power.”
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Nov 2018 06:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>61</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/56f9872a-df0f-11ea-a432-377033444ac9/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Establishing international norms in cyberspace</itunes:subtitle>
      <itunes:summary>Joseph Nye is former dean of the Harvard Kennedy School of Government. He served as Chair of the National Intelligence Council, and as Assistant Secretary of Defense for International Security Affairs under President Clinton. He serves as a Commissioner for the Global Commission on Internet Governance, and is the author of over a dozen books, including, “Soft Power: The means to success in work politics,” and “The future of power.”
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Joseph Nye is former dean of the Harvard Kennedy School of Government. He served as Chair of the National Intelligence Council, and as Assistant Secretary of Defense for International Security Affairs under President Clinton. He serves as a Commissioner for the Global Commission on Internet Governance, and is the author of over a dozen books, including, “Soft Power: The means to success in work politics,” and “The future of power.”</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1386</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fc0c7f1965d946eebc7191b1c4e5d3fe]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4849118794.mp3?updated=1685022675" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Critical infrastructure resiliency. Lazarus Group’s FASTcash robberies. China’s ongoing industrial espionage. Trolls aside, Russian observers think the US elections were A-OK.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/723/notes</link>
      <description>In today’s podcast we hear that Britain’s NCSC has warned, again, that the UK is likely to face a Category One cyberattack within the next few years. In the US, Government-industry-academic partnerships work toward making critical infrastructure more resilient to cyberattack. Pyongyang’s Lazarus Group continues to rob ATMs using malware. US officials complain that China is in violation of 2015’s agreement to avoid industrial espionage. Any Russian observers give the US a passing grade for fair midterm elections. Awais Rashid from Bristol University with thoughts on placing trust in blockchain systems. Guest is Bruce Schneier, discussing his latest book, “Click here to kill everybody.”
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_09.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 09 Nov 2018 20:43:42 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>723</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/878480fa-def8-11ea-911f-27fe59deff3b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Critical infrastructure resiliency. Lazarus Group’s FASTcash robberies. China’s ongoing industrial espionage. Trolls aside, Russian observers think the US elections were A-OK.</itunes:subtitle>
      <itunes:summary>In today’s podcast we hear that Britain’s NCSC has warned, again, that the UK is likely to face a Category One cyberattack within the next few years. In the US, Government-industry-academic partnerships work toward making critical infrastructure more resilient to cyberattack. Pyongyang’s Lazarus Group continues to rob ATMs using malware. US officials complain that China is in violation of 2015’s agreement to avoid industrial espionage. Any Russian observers give the US a passing grade for fair midterm elections. Awais Rashid from Bristol University with thoughts on placing trust in blockchain systems. Guest is Bruce Schneier, discussing his latest book, “Click here to kill everybody.”
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_09.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear that Britain’s NCSC has warned, again, that the UK is likely to face a Category One cyberattack within the next few years. In the US, Government-industry-academic partnerships work toward making critical infrastructure more resilient to cyberattack. Pyongyang’s Lazarus Group continues to rob ATMs using malware. US officials complain that China is in violation of 2015’s agreement to avoid industrial espionage. Any Russian observers give the US a passing grade for fair midterm elections. Awais Rashid from Bristol University with thoughts on placing trust in blockchain systems. Guest is Bruce Schneier, discussing his latest book, “Click here to kill everybody.”</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_09.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1559</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2c972356a47542c98654705279b15d55]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4960363085.mp3?updated=1608755801" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Post hack ergo propter hack: DHS calls Russian claims “noisy garbage.” Responsible and irresponsible disclosure. FCC wants an end to robocalls. USPS Informed Delivery abused. Post Canada—whoa. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/722/notes</link>
      <description>In today’s podcast, we hear that, while election hacking seems not have happened in the US this week, that hasn’t stopped the IRA and its mouthpieces in Sputnik, RT, and elsewhere from loudly claiming it has. Election influence operations continue long after the election. VirtualBox zero-day disclosed to everyone. USCYBERCOM posts Lojack to VirusTotal. FCC vs. robocalls. US Postal Services’ Informed Delivery exploited. Canada Post slips to reveal cannabis customers. Dr. Charles Clancy from the Hume Center at VA Tech on in-car cell phone jammers. Guest is Ian Paterson from Plurilock Security Solutions on behavioral biometrics.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_08.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 08 Nov 2018 21:09:38 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>722</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/879a973c-def8-11ea-911f-939783c25f3e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Post hack ergo propter hack: DHS calls Russian claims “noisy garbage.” Responsible and irresponsible disclosure. FCC wants an end to robocalls. USPS Informed Delivery abused. Post Canada—whoa. </itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear that, while election hacking seems not have happened in the US this week, that hasn’t stopped the IRA and its mouthpieces in Sputnik, RT, and elsewhere from loudly claiming it has. Election influence operations continue long after the election. VirtualBox zero-day disclosed to everyone. USCYBERCOM posts Lojack to VirusTotal. FCC vs. robocalls. US Postal Services’ Informed Delivery exploited. Canada Post slips to reveal cannabis customers. Dr. Charles Clancy from the Hume Center at VA Tech on in-car cell phone jammers. Guest is Ian Paterson from Plurilock Security Solutions on behavioral biometrics.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_08.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear that, while election hacking seems not have happened in the US this week, that hasn’t stopped the IRA and its mouthpieces in Sputnik, RT, and elsewhere from loudly claiming it has. Election influence operations continue long after the election. VirtualBox zero-day disclosed to everyone. USCYBERCOM posts Lojack to VirusTotal. FCC vs. robocalls. US Postal Services’ Informed Delivery exploited. Canada Post slips to reveal cannabis customers. Dr. Charles Clancy from the Hume Center at VA Tech on in-car cell phone jammers. Guest is Ian Paterson from Plurilock Security Solutions on behavioral biometrics.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_08.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1205</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[23462ef899a540bb964ff63997aecdba]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5039528484.mp3?updated=1689961148" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A quick look back at the US midterms, and the cyber Pearl Harbor that wasn’t. Update Apache Struts. Smishing with the Play Store. Another advance fee scam.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/721/notes</link>
      <description>In today’s podcast we take a quick look back at the US midterm elections, and at what did and didn’t happen. Is Iran looking at waging cyber-enabled economic warfare? If you use Apache Struts, update now to avoid remote code execution. A spyware-delivering app is used to smish Spanish-speaking users of the Play Store. And, once again, people really seem to think that Elon Musk will return them their Bitcoin donations tenfold. (Enough people to make crime pay, anyway.) Justin Harvey from Accenture on notification laws and incident response. Guest is Christian Lees from InfoArmor with thoughts on what they’re seeing trafficked on the dark web.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_07.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 07 Nov 2018 21:22:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>721</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/87b4ecd6-def8-11ea-911f-b36135e610ee/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A quick look back at the US midterms, and the cyber Pearl Harbor that wasn’t. Update Apache Struts. Smishing with the Play Store. Another advance fee scam.</itunes:subtitle>
      <itunes:summary>In today’s podcast we take a quick look back at the US midterm elections, and at what did and didn’t happen. Is Iran looking at waging cyber-enabled economic warfare? If you use Apache Struts, update now to avoid remote code execution. A spyware-delivering app is used to smish Spanish-speaking users of the Play Store. And, once again, people really seem to think that Elon Musk will return them their Bitcoin donations tenfold. (Enough people to make crime pay, anyway.) Justin Harvey from Accenture on notification laws and incident response. Guest is Christian Lees from InfoArmor with thoughts on what they’re seeing trafficked on the dark web.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_07.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we take a quick look back at the US midterm elections, and at what did and didn’t happen. Is Iran looking at waging cyber-enabled economic warfare? If you use Apache Struts, update now to avoid remote code execution. A spyware-delivering app is used to smish Spanish-speaking users of the Play Store. And, once again, people really seem to think that Elon Musk will return them their Bitcoin donations tenfold. (Enough people to make crime pay, anyway.) Justin Harvey from Accenture on notification laws and incident response. Guest is Christian Lees from InfoArmor with thoughts on what they’re seeing trafficked on the dark web.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_07.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1273</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[231a3aba16bb4185a0dd355545958808]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5010427951.mp3?updated=1689961131" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Iran complains, threatens, and spies. Election Day cybersecurity notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/720/notes</link>
      <description>In today's podcast, we hear that Iran has accused Israel of a second Stuxnet, claiming the attack was thwarted, and threatening retaliation. Nor is Tehran neglecting domestic surveillance of its own: Persian Stalker is involved with some pretty suspicious greyware. It's Election Day in the US, and officials are cautiously optimistic work to secure the voting will be successful. Concerns about information operations persist, and people continue to work to distinguish them from good-old-fashioned American confident chatter. Ben Yelin from UMD CHHS on the FBI using Google location data to nab crooks. Guest is Victor Danevich from Infoblox on the challenges on managing higher ed networks.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_06.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Nov 2018 19:53:03 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>720</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/87c64fa8-def8-11ea-911f-0bde800abd34/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Iran complains, threatens, and spies. Election Day cybersecurity notes.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Iran has accused Israel of a second Stuxnet, claiming the attack was thwarted, and threatening retaliation. Nor is Tehran neglecting domestic surveillance of its own: Persian Stalker is involved with some pretty suspicious greyware. It's Election Day in the US, and officials are cautiously optimistic work to secure the voting will be successful. Concerns about information operations persist, and people continue to work to distinguish them from good-old-fashioned American confident chatter. Ben Yelin from UMD CHHS on the FBI using Google location data to nab crooks. Guest is Victor Danevich from Infoblox on the challenges on managing higher ed networks.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_06.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Iran has accused Israel of a second Stuxnet, claiming the attack was thwarted, and threatening retaliation. Nor is Tehran neglecting domestic surveillance of its own: Persian Stalker is involved with some pretty suspicious greyware. It's Election Day in the US, and officials are cautiously optimistic work to secure the voting will be successful. Concerns about information operations persist, and people continue to work to distinguish them from good-old-fashioned American confident chatter. Ben Yelin from UMD CHHS on the FBI using Google location data to nab crooks. Guest is Victor Danevich from Infoblox on the challenges on managing higher ed networks.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_06.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1259</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d005ccba6ada4d189e364fa1522ec248]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4629902067.mp3?updated=1689961118" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US midterm election cybersecurity updates. PortSmash side-channel proof-of-concept. Botnets compete to cryptojack Android devices. And will the GRU get its "R" back?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/719/notes</link>
      <description>In today's podcast, we note that US midterm elections end tomorrow evening, with officials on high alert for election hacking. Russia sends poll watcher to the US to make sure democratic norms are observed. Side-channel attack proof-of-concept announced for CPUs, but risk seems relatively low. Botnets are fighting over Android devices for cryptojacking power. And Russia's GU, né GRU? It looks like it's going to get its "R" back. Rick Howard from Palo Alto Networks with thoughts on DevOps and the future of orchestration. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_05.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 05 Nov 2018 21:03:38 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>719</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/87f7b7fa-def8-11ea-911f-e30b0e8d08e5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>US midterm election cybersecurity updates. PortSmash side-channel proof-of-concept. Botnets compete to cryptojack Android devices. And will the GRU get its "R" back?</itunes:subtitle>
      <itunes:summary>In today's podcast, we note that US midterm elections end tomorrow evening, with officials on high alert for election hacking. Russia sends poll watcher to the US to make sure democratic norms are observed. Side-channel attack proof-of-concept announced for CPUs, but risk seems relatively low. Botnets are fighting over Android devices for cryptojacking power. And Russia's GU, né GRU? It looks like it's going to get its "R" back. Rick Howard from Palo Alto Networks with thoughts on DevOps and the future of orchestration. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_05.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we note that US midterm elections end tomorrow evening, with officials on high alert for election hacking. Russia sends poll watcher to the US to make sure democratic norms are observed. Side-channel attack proof-of-concept announced for CPUs, but risk seems relatively low. Botnets are fighting over Android devices for cryptojacking power. And Russia's GU, né GRU? It looks like it's going to get its "R" back. Rick Howard from Palo Alto Networks with thoughts on DevOps and the future of orchestration. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_05.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1004</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8e62abffa1b44d3eb79fe4d530cd19ca]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2937412228.mp3?updated=1689960859" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Election protection. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/60/notes</link>
      <description>Symantec technical director Vikram Thakur returns to share his team's look at threat groups APT 28 and APT 29, the influence they had on the 2016 election, and how the cyber security industry has responded in preparation for the 2018 midterms.

The original research can be found here:
 https://www.symantec.com/blogs/election-security/election-hacking-faq
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Nov 2018 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>60</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/e4059dda-df0e-11ea-8fd0-07b2cd14172a/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Election protection</itunes:subtitle>
      <itunes:summary>Symantec technical director Vikram Thakur returns to share his team's look at threat groups APT 28 and APT 29, the influence they had on the 2016 election, and how the cyber security industry has responded in preparation for the 2018 midterms.

The original research can be found here:
 https://www.symantec.com/blogs/election-security/election-hacking-faq
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Symantec technical director Vikram Thakur returns to share his team's look at threat groups APT 28 and APT 29, the influence they had on the 2016 election, and how the cyber security industry has responded in preparation for the 2018 midterms.</p><p><br></p><p>The original research can be found here:</p><p><a href="https://www.symantec.com/blogs/election-security/election-hacking-faq"> https://www.symantec.com/blogs/election-security/election-hacking-faq</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1498</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11cb8172a8bb4df5b75f155f89dfb13a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2575020012.mp3?updated=1685022653" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber Sitzkrieg. Waiting for the Bears to show up (and ready to set the Dogs on them). Facebook private messages for sale.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/718/notes</link>
      <description>In today's podcast, we hear that people are asking if that lull in Chinese cyber operations was just a strategic pause. Huawei's on a charm offensive. People are seeing plenty of Russian trolling, but election hacking proper continues to be quiet. Another strategic pause? US Cyber Command is said to be ready to respond to any election cyberattacks swiftly and in kind. And if you want to hear what people think about 80s techno-pop, a dark web souk will sell you the relevant Facebook messages for just one thin dime apiece. Malek Ben Salem from Accenture Labs on blockchain use in election security. Guest is Shannon Morse, host and producer at Hak5.org.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_02.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 02 Nov 2018 20:20:04 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>718</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/88115e6c-def8-11ea-911f-03eab02c133b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyber Sitzkrieg. Waiting for the Bears to show up (and ready to set the Dogs on them). Facebook private messages for sale.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that people are asking if that lull in Chinese cyber operations was just a strategic pause. Huawei's on a charm offensive. People are seeing plenty of Russian trolling, but election hacking proper continues to be quiet. Another strategic pause? US Cyber Command is said to be ready to respond to any election cyberattacks swiftly and in kind. And if you want to hear what people think about 80s techno-pop, a dark web souk will sell you the relevant Facebook messages for just one thin dime apiece. Malek Ben Salem from Accenture Labs on blockchain use in election security. Guest is Shannon Morse, host and producer at Hak5.org.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_02.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that people are asking if that lull in Chinese cyber operations was just a strategic pause. Huawei's on a charm offensive. People are seeing plenty of Russian trolling, but election hacking proper continues to be quiet. Another strategic pause? US Cyber Command is said to be ready to respond to any election cyberattacks swiftly and in kind. And if you want to hear what people think about 80s techno-pop, a dark web souk will sell you the relevant Facebook messages for just one thin dime apiece. Malek Ben Salem from Accenture Labs on blockchain use in election security. Guest is Shannon Morse, host and producer at Hak5.org.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_02.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1574</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5554cb13a02a4ea7930a698c19458af1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5019025725.mp3?updated=1608755811" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Wi-Fi access point zero-day reported. US Cyber Command on the offensive. Transparency is tougher than it looks. GandCrab not paying out as much—good. PIPEDA takes effect. Soulmate spyware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/717/notes</link>
      <description>In today's podcast, we hear that Bleeding Bit flaws leave Wi-Fi access points open to war drivers and other malefactors within a hundred meters of your equipment. US Cyber Command continues its attempts to dissuade foreign influence operations against midterm elections. Social networks have difficulty identifying who's buying ads. Canada's data privacy law takes effect today. GandCrab crooks take a million-dollar bath. And if you go to Soulmates in Google Play, you're looking for love in all the wrong places. Johannes Ullrich from the ISC Stormcast podcast on hiding malware in benign files. Guest is Tara Combs from Alfresco on coming US cyber regulations.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_01.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 01 Nov 2018 20:36:40 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>717</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8827cb0c-def8-11ea-911f-5b807990ae68/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Wi-Fi access point zero-day reported. US Cyber Command on the offensive. Transparency is tougher than it looks. GandCrab not paying out as much—good. PIPEDA takes effect. Soulmate spyware.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Bleeding Bit flaws leave Wi-Fi access points open to war drivers and other malefactors within a hundred meters of your equipment. US Cyber Command continues its attempts to dissuade foreign influence operations against midterm elections. Social networks have difficulty identifying who's buying ads. Canada's data privacy law takes effect today. GandCrab crooks take a million-dollar bath. And if you go to Soulmates in Google Play, you're looking for love in all the wrong places. Johannes Ullrich from the ISC Stormcast podcast on hiding malware in benign files. Guest is Tara Combs from Alfresco on coming US cyber regulations.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_01.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Bleeding Bit flaws leave Wi-Fi access points open to war drivers and other malefactors within a hundred meters of your equipment. US Cyber Command continues its attempts to dissuade foreign influence operations against midterm elections. Social networks have difficulty identifying who's buying ads. Canada's data privacy law takes effect today. GandCrab crooks take a million-dollar bath. And if you go to Soulmates in Google Play, you're looking for love in all the wrong places. Johannes Ullrich from the ISC Stormcast podcast on hiding malware in benign files. Guest is Tara Combs from Alfresco on coming US cyber regulations.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/November/CyberWire_2018_11_01.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1314</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cfa6d7cf37134cc297bddeffa97c30b2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8588905859.mp3?updated=1689960194" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Influence operations, and advice on recognizing them. Ransomware updates. US indicts Chinese nationals for industrial espionage. An object lesson from the US Geological Survey.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/716/notes</link>
      <description>In today's podcast, we hear about influence operations in social media (again): Americans remain more vulnerable (because they lack a cultural experience of state propaganda) than Eastern Europeans. Rules of thumb for recognizing the good, the bad, and the bogus online. Kraken Cryptor is a black market leading ransomware strain. SamSam remains active. US indicts Chinese industrial spies. And what not to look at on your Government laptop. David Dufour from Webroot with thoughts on processor vulnerabilities. Guest is Maria Rerecich from Consumer Reports on their product testing processes, and how they’ve evolved to keep up with the times.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_31.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 31 Oct 2018 20:17:46 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>716</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/885e099c-def8-11ea-911f-cf6253cc08a1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Influence operations, and advice on recognizing them. Ransomware updates. US indicts Chinese nationals for industrial espionage. An object lesson from the US Geological Survey.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about influence operations in social media (again): Americans remain more vulnerable (because they lack a cultural experience of state propaganda) than Eastern Europeans. Rules of thumb for recognizing the good, the bad, and the bogus online. Kraken Cryptor is a black market leading ransomware strain. SamSam remains active. US indicts Chinese industrial spies. And what not to look at on your Government laptop. David Dufour from Webroot with thoughts on processor vulnerabilities. Guest is Maria Rerecich from Consumer Reports on their product testing processes, and how they’ve evolved to keep up with the times.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_31.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about influence operations in social media (again): Americans remain more vulnerable (because they lack a cultural experience of state propaganda) than Eastern Europeans. Rules of thumb for recognizing the good, the bad, and the bogus online. Kraken Cryptor is a black market leading ransomware strain. SamSam remains active. US indicts Chinese industrial spies. And what not to look at on your Government laptop. David Dufour from Webroot with thoughts on processor vulnerabilities. Guest is Maria Rerecich from Consumer Reports on their product testing processes, and how they’ve evolved to keep up with the times.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_31.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1275</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9f8b744ee1464f88853dea5ae0368c41]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1707628144.mp3?updated=1689960174" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>This cybersecurity stuff is tougher than it looks, US state election officials learn. Saudi surveillance. Espionage in Iran. New attack varieties. Chinese hardware concerns. US sanctions chipmaker.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/715/notes</link>
      <description>In today's podcast, we hear that installing cybersecurity tools to protect elections is tougher than it looks. Information operations continue to pose the most prominent foreign threat to US midterm elections, although there are concerns about voting machine security. Cointracker looks like a trader's tool with a side order of malware. Video embedded in Microsoft Word documents can carry malicious payloads through detection systems. Hardware worries and sanctions. Competing visions of norms in cyberspace. Robert M. Lee from Dragos with thoughts on the real-world threat of electromagnetic pulses. Guest is Rahul Kashyapp from Awake Security on the skills shortage and the importance of mentorship.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_30.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Oct 2018 20:24:07 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>715</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/887662b2-def8-11ea-911f-875c471d905e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>This cybersecurity stuff is tougher than it looks, US state election officials learn. Saudi surveillance. Espionage in Iran. New attack varieties. Chinese hardware concerns. US sanctions chipmaker.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that installing cybersecurity tools to protect elections is tougher than it looks. Information operations continue to pose the most prominent foreign threat to US midterm elections, although there are concerns about voting machine security. Cointracker looks like a trader's tool with a side order of malware. Video embedded in Microsoft Word documents can carry malicious payloads through detection systems. Hardware worries and sanctions. Competing visions of norms in cyberspace. Robert M. Lee from Dragos with thoughts on the real-world threat of electromagnetic pulses. Guest is Rahul Kashyapp from Awake Security on the skills shortage and the importance of mentorship.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_30.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that installing cybersecurity tools to protect elections is tougher than it looks. Information operations continue to pose the most prominent foreign threat to US midterm elections, although there are concerns about voting machine security. Cointracker looks like a trader's tool with a side order of malware. Video embedded in Microsoft Word documents can carry malicious payloads through detection systems. Hardware worries and sanctions. Competing visions of norms in cyberspace. Robert M. Lee from Dragos with thoughts on the real-world threat of electromagnetic pulses. Guest is Rahul Kashyapp from Awake Security on the skills shortage and the importance of mentorship.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_30.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1260</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[db1d8cca4bca4ceea899a86eae26c0fd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8750928759.mp3?updated=1689960160" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Facebook takes down Iranian-run accounts. Criminal investigations look online. IBM to buy Red Hat. Satori is still with us. British Airways and Magecart. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/714/notes</link>
      <description>Facebook takes down accounts linked to Iran for coordinated inauthenticity. Iranian information operations appear to be learning from the Russian approach: be divisive, be negative, and be opportunistic. Investigations of pipe-bombs and the Pittsburgh synagogue shooting look at the suspects' digital record. IBM announces its acquisition of Red Hat. The Satori botnet continues to evolve. British Airways and Magecart. Supply chain seeding, probably not; dragonnades, yes. Emily Wilson from Terbium Labs on data from the most recent Facebook breach showing up on the dark web.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_29.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 29 Oct 2018 20:05:46 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>714</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/88871dd2-def8-11ea-911f-6f89d475f3c1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Facebook takes down Iranian-run accounts. Criminal investigations look online. IBM to buy Red Hat. Satori is still with us. British Airways and Magecart. </itunes:subtitle>
      <itunes:summary>Facebook takes down accounts linked to Iran for coordinated inauthenticity. Iranian information operations appear to be learning from the Russian approach: be divisive, be negative, and be opportunistic. Investigations of pipe-bombs and the Pittsburgh synagogue shooting look at the suspects' digital record. IBM announces its acquisition of Red Hat. The Satori botnet continues to evolve. British Airways and Magecart. Supply chain seeding, probably not; dragonnades, yes. Emily Wilson from Terbium Labs on data from the most recent Facebook breach showing up on the dark web.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_29.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Facebook takes down accounts linked to Iran for coordinated inauthenticity. Iranian information operations appear to be learning from the Russian approach: be divisive, be negative, and be opportunistic. Investigations of pipe-bombs and the Pittsburgh synagogue shooting look at the suspects' digital record. IBM announces its acquisition of Red Hat. The Satori botnet continues to evolve. British Airways and Magecart. Supply chain seeding, probably not; dragonnades, yes. Emily Wilson from Terbium Labs on data from the most recent Facebook breach showing up on the dark web.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_29.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1058</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d300a4bdcd5743418e391757d51f3d53]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5513006189.mp3?updated=1689960147" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Faxploitation. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/59/notes</link>
      <description>Researchers at security firm Check Point Software Technologies explored the possibility of exploiting old, complex fax protocols to gain access to modern multifunction office printers, and then pivot to connected networks. 
Yaniv Balmas is head of security research at Check Point, and he joins us to share what he and his colleague Eyal Itkin discovered.
The research can be found here:
 https://research.checkpoint.com/sending-fax-back-to-the-dark-ages/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Oct 2018 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>59</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/dfafadac-df0e-11ea-80b8-034a34b47d1e/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Faxploitation</itunes:subtitle>
      <itunes:summary>Researchers at security firm Check Point Software Technologies explored the possibility of exploiting old, complex fax protocols to gain access to modern multifunction office printers, and then pivot to connected networks. 
Yaniv Balmas is head of security research at Check Point, and he joins us to share what he and his colleague Eyal Itkin discovered.
The research can be found here:
 https://research.checkpoint.com/sending-fax-back-to-the-dark-ages/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at security firm Check Point Software Technologies explored the possibility of exploiting old, complex fax protocols to gain access to modern multifunction office printers, and then pivot to connected networks. </p><p>Yaniv Balmas is head of security research at Check Point, and he joins us to share what he and his colleague Eyal Itkin discovered.</p><p>The research can be found here:</p><p><a href="https://research.checkpoint.com/sending-fax-back-to-the-dark-ages/"> https://research.checkpoint.com/sending-fax-back-to-the-dark-ages/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1031</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6d1215ee63884ff3a8d61a480fb42539]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4565624546.mp3?updated=1685022632" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Airline breach bigger than thought. Securing Mexican financial institutions. Demonbot vs. Hadoop. New decryptor out for GandCrab ransomware. Civilian Cybersecurity Corps? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/713/notes</link>
      <description>In today's podcast, we hear that British Airways' breach has gotten bigger. Mexico's financial institutions say they've contained the anomalies in interbank transfer systems. "Demonbot" is infesting poorly secured Hadoop servers. Google receives criticism for slow action against ad fraud. Bitdefender and Romanian police produce a decryptor for GandCrab ransomware. Discussion of a "Civilian Cybersecurity Corps:" are white hats the radio hams of the Twenty-first Century? Daniel Prince from Lancaster University joins us to talk about quantum hardware primitives. And Britney Hommertzheim, director of information security at AMC Theaters, sits down with Dave to talk about building partnerships within your organization to strengthen security’s role.
 For links to all the stories mentioned in today' podcast, check out today's Daily Briefing: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_26.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 26 Oct 2018 20:23:56 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>713</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/889dcd66-def8-11ea-911f-7f4bc3bab3c6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Airline breach bigger than thought. Securing Mexican financial institutions. Demonbot vs. Hadoop. New decryptor out for GandCrab ransomware. Civilian Cybersecurity Corps? </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that British Airways' breach has gotten bigger. Mexico's financial institutions say they've contained the anomalies in interbank transfer systems. "Demonbot" is infesting poorly secured Hadoop servers. Google receives criticism for slow action against ad fraud. Bitdefender and Romanian police produce a decryptor for GandCrab ransomware. Discussion of a "Civilian Cybersecurity Corps:" are white hats the radio hams of the Twenty-first Century? Daniel Prince from Lancaster University joins us to talk about quantum hardware primitives. And Britney Hommertzheim, director of information security at AMC Theaters, sits down with Dave to talk about building partnerships within your organization to strengthen security’s role.
 For links to all the stories mentioned in today' podcast, check out today's Daily Briefing: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_26.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that British Airways' breach has gotten bigger. Mexico's financial institutions say they've contained the anomalies in interbank transfer systems. "Demonbot" is infesting poorly secured Hadoop servers. Google receives criticism for slow action against ad fraud. Bitdefender and Romanian police produce a decryptor for GandCrab ransomware. Discussion of a "Civilian Cybersecurity Corps:" are white hats the radio hams of the Twenty-first Century? Daniel Prince from Lancaster University joins us to talk about quantum hardware primitives. And Britney Hommertzheim, director of information security at AMC Theaters, sits down with Dave to talk about building partnerships within your organization to strengthen security’s role.</p> <p>For links to all the stories mentioned in today' podcast, check out today's Daily Briefing: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_26.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1465</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0ef5adb4b3074d2c89e5c6dd1364b268]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1446176574.mp3?updated=1608755783" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Influence operations, da. Direct hacking? Maybe nyet. Chalubo botnet borrows old tricks. Financial sector alert in Mexico. Airline breach disclosed. Lawsuits over privacy. ICS Security notes. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/712/notes</link>
      <description>In today's podcast, we hear that the US Department of Homeland Security sees lower-than-expected rates of Russian election system probing even as Russian information operations continue. Sophos warns of the emergence of the Linux-based "Chalubo" botnet. Mexico's Central Bank raises its alert level. Cathay Pacific discloses a breach of passenger information. Privacy-related fines and lawsuits. And notes from the 2018 ICS Cyber Security Conference. Justin Harvey from Accenture joins us to talk about insourcing vs. outsourcing threat intelligence, and Tony Pepper from Egress Software Technologies shares his perspective on protecting unstructured data.
 For links to all of the stories mentioned in today's podcast, check out our Daily Briefing: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_25.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 25 Oct 2018 18:50:57 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>712</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/88b414e0-def8-11ea-911f-cb933ffa11bd/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Influence operations, da. Direct hacking? Maybe nyet. Chalubo botnet borrows old tricks. Financial sector alert in Mexico. Airline breach disclosed. Lawsuits over privacy. ICS Security notes. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the US Department of Homeland Security sees lower-than-expected rates of Russian election system probing even as Russian information operations continue. Sophos warns of the emergence of the Linux-based "Chalubo" botnet. Mexico's Central Bank raises its alert level. Cathay Pacific discloses a breach of passenger information. Privacy-related fines and lawsuits. And notes from the 2018 ICS Cyber Security Conference. Justin Harvey from Accenture joins us to talk about insourcing vs. outsourcing threat intelligence, and Tony Pepper from Egress Software Technologies shares his perspective on protecting unstructured data.
 For links to all of the stories mentioned in today's podcast, check out our Daily Briefing: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_25.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the US Department of Homeland Security sees lower-than-expected rates of Russian election system probing even as Russian information operations continue. Sophos warns of the emergence of the Linux-based "Chalubo" botnet. Mexico's Central Bank raises its alert level. Cathay Pacific discloses a breach of passenger information. Privacy-related fines and lawsuits. And notes from the 2018 ICS Cyber Security Conference. Justin Harvey from Accenture joins us to talk about insourcing vs. outsourcing threat intelligence, and Tony Pepper from Egress Software Technologies shares his perspective on protecting unstructured data.</p> <p>For links to all of the stories mentioned in today's podcast, check out our Daily Briefing: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_25.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1212</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6a53b781a08141d1bd8e41b1c3664924]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1044286185.mp3?updated=1689961029" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trolling the trolls. Triton/Trisis attributed to Russia. Asset management in ICS. Threat intelligence drives threat evolution. Shadow web-apps. Apple likes GDPR, hates the Data-Industrial Complex. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/711/notes</link>
      <description>In today's podcast, we hear that US Cyber Command has been reaching out to tell the trolls Uncle Sam cares. Industrial control system security suffers from poor asset management practices. FireEye looks at the Triton malware and says the Russians did it, but of course things are complicated. Are hostile intelligence service hackers superheroes, salaryman nebbishes, or something in between? How threat intelligence drives threat evolution. The risk of shadow web-apps. Apple speaks on privacy. Ben Yelin from the University of Maryland Center for Health and Homeland Security talks with us about the EFF coming out against license plate sharing between retailers and law enforcement. Our UK correspondent Carole Theriault speaks with ESET’s Lysa Meyers about overcoming the cyber skills shortage and attracting new talent to the industry.
 For links to all the stories in today's podcast, check out today's Daily Briefing: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_24.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 24 Oct 2018 19:06:09 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>711</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/88c440fe-def8-11ea-911f-d3bff012431e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Trolling the trolls. Triton/Trisis attributed to Russia. Asset management in ICS. Threat intelligence drives threat evolution. Shadow web-apps. Apple likes GDPR, hates the Data-Industrial Complex. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that US Cyber Command has been reaching out to tell the trolls Uncle Sam cares. Industrial control system security suffers from poor asset management practices. FireEye looks at the Triton malware and says the Russians did it, but of course things are complicated. Are hostile intelligence service hackers superheroes, salaryman nebbishes, or something in between? How threat intelligence drives threat evolution. The risk of shadow web-apps. Apple speaks on privacy. Ben Yelin from the University of Maryland Center for Health and Homeland Security talks with us about the EFF coming out against license plate sharing between retailers and law enforcement. Our UK correspondent Carole Theriault speaks with ESET’s Lysa Meyers about overcoming the cyber skills shortage and attracting new talent to the industry.
 For links to all the stories in today's podcast, check out today's Daily Briefing: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_24.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that US Cyber Command has been reaching out to tell the trolls Uncle Sam cares. Industrial control system security suffers from poor asset management practices. FireEye looks at the Triton malware and says the Russians did it, but of course things are complicated. Are hostile intelligence service hackers superheroes, salaryman nebbishes, or something in between? How threat intelligence drives threat evolution. The risk of shadow web-apps. Apple speaks on privacy. Ben Yelin from the University of Maryland Center for Health and Homeland Security talks with us about the EFF coming out against license plate sharing between retailers and law enforcement. Our UK correspondent Carole Theriault speaks with ESET’s Lysa Meyers about overcoming the cyber skills shortage and attracting new talent to the industry.</p> <p>For links to all the stories in today's podcast, check out today's Daily Briefing: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_24.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1299</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7b201f90e90042e689ae7324d49095ad]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3539756327.mp3?updated=1689955198" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Influence operations in Brazil and the US. Vulnerabilities disclosed in commonly used software. Healthcare.gov breach. Industrial control system cybersecurity. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/710/notes</link>
      <description>In today's podcast we wonder WhatsApp with Brazil's runoff election? Hacktivism hits Davos-in-the-Desert. Kraken Cryptor ransomware gets an upgrade. Remote code execution vulnerabilities disclosed in two classes of systems. Healthcare.gov breach under investigation. More calls for retraction of the spy chip story. Cozy Bear calls for proper Internet governance. US on effects of influence ops. Notes on industrial control system cybersecurity, with an emphasis on attending to the obvious. We talk to Awais Rashid from Bristol University to get his thoughts on supply chain security, and we also hear from IJay Palansky from Armstrong Teasdale on IoT legal liability concerns.
 For links to all of the stories discussed in today's podcast, visit https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_23.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Oct 2018 19:41:31 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>710</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/88d9c3ca-def8-11ea-911f-df4ed907f6e8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Influence operations in Brazil and the US. Vulnerabilities disclosed in commonly used software. Healthcare.gov breach. Industrial control system cybersecurity. </itunes:subtitle>
      <itunes:summary>In today's podcast we wonder WhatsApp with Brazil's runoff election? Hacktivism hits Davos-in-the-Desert. Kraken Cryptor ransomware gets an upgrade. Remote code execution vulnerabilities disclosed in two classes of systems. Healthcare.gov breach under investigation. More calls for retraction of the spy chip story. Cozy Bear calls for proper Internet governance. US on effects of influence ops. Notes on industrial control system cybersecurity, with an emphasis on attending to the obvious. We talk to Awais Rashid from Bristol University to get his thoughts on supply chain security, and we also hear from IJay Palansky from Armstrong Teasdale on IoT legal liability concerns.
 For links to all of the stories discussed in today's podcast, visit https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_23.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we wonder WhatsApp with Brazil's runoff election? Hacktivism hits Davos-in-the-Desert. Kraken Cryptor ransomware gets an upgrade. Remote code execution vulnerabilities disclosed in two classes of systems. Healthcare.gov breach under investigation. More calls for retraction of the spy chip story. Cozy Bear calls for proper Internet governance. US on effects of influence ops. Notes on industrial control system cybersecurity, with an emphasis on attending to the obvious. We talk to Awais Rashid from Bristol University to get his thoughts on supply chain security, and we also hear from IJay Palansky from Armstrong Teasdale on IoT legal liability concerns.</p> <p>For links to all of the stories discussed in today's podcast, visit https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_23.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1184</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ed539c5a083c492e9f4a9b045b1daf50]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5267523616.mp3?updated=1689955183" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Making the business case for privacy. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/26/notes</link>
      <description>In this cyberwire special edition, my guest is Cisco’s Chief Privacy Officer Michelle Dennedy. We discuss what exactly a chief privacy officer does at a global organization like Cisco, why she thinks we’re in the early stages of a privacy revolution, why we all tend to shake our heads cynically when I company claims, “Your privacy is important to us” and how, maybe, respecting the privacy of your users and customers could be a competitive advantage.

This conversation continues on Michelle Dennedy's podcast, Privacy Sigma Riders. 
 https://www.cisco.com/c/en/us/about/trust-center/privacy-podcast.html
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Oct 2018 16:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>26</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c6461d42-df04-11ea-bb0b-339d09bd50f0/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Making the business case for privacy.</itunes:subtitle>
      <itunes:summary>In this cyberwire special edition, my guest is Cisco’s Chief Privacy Officer Michelle Dennedy. We discuss what exactly a chief privacy officer does at a global organization like Cisco, why she thinks we’re in the early stages of a privacy revolution, why we all tend to shake our heads cynically when I company claims, “Your privacy is important to us” and how, maybe, respecting the privacy of your users and customers could be a competitive advantage.

This conversation continues on Michelle Dennedy's podcast, Privacy Sigma Riders. 
 https://www.cisco.com/c/en/us/about/trust-center/privacy-podcast.html
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this cyberwire special edition, my guest is Cisco’s Chief Privacy Officer Michelle Dennedy. We discuss what exactly a chief privacy officer does at a global organization like Cisco, why she thinks we’re in the early stages of a privacy revolution, why we all tend to shake our heads cynically when I company claims, “Your privacy is important to us” and how, maybe, respecting the privacy of your users and customers could be a competitive advantage.</p><p><br></p><p>This conversation continues on Michelle Dennedy's podcast, Privacy Sigma Riders. </p><p><a href="https://www.cisco.com/c/en/us/about/trust-center/privacy-podcast.html"> https://www.cisco.com/c/en/us/about/trust-center/privacy-podcast.html</a></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1373</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c9e4660bb1954cecab9626fd828f6858]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6931474279.mp3?updated=1656711767" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russian indicted in US midterm election influence conspiracy case. Styles and goals of info ops. Cyber deterrence. DPRK petty crime. Alt-coin scammer. Spy chip story remains unconfirmed, unretracted. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/709/notes</link>
      <description>In today's podcast we hear that the US has indicted a Russian accountant for conspiring to influence US midterm elections. Different nations have different styles of information operations because they have different goals. Technology shifts, but underlying principles of propaganda remain. The EU barks cyber deterrence but doesn't bite, yet. North Korea's petty cyber crime wave. A scammer is after alt-coin enthusiasts. And there's neither confirmation nor retraction of Bloomberg's spy-chip story. Joe Carrigan from the Johns Hopkins Information Security Institute joins us to discuss network segmentation.
 For links to all of today's stories, visit https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_22.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 22 Oct 2018 20:55:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>709</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/88f5188c-def8-11ea-911f-ffd1eafca435/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Russian indicted in US midterm election influence conspiracy case. Styles and goals of info ops. Cyber deterrence. DPRK petty crime. Alt-coin scammer. Spy chip story remains unconfirmed, unretracted. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that the US has indicted a Russian accountant for conspiring to influence US midterm elections. Different nations have different styles of information operations because they have different goals. Technology shifts, but underlying principles of propaganda remain. The EU barks cyber deterrence but doesn't bite, yet. North Korea's petty cyber crime wave. A scammer is after alt-coin enthusiasts. And there's neither confirmation nor retraction of Bloomberg's spy-chip story. Joe Carrigan from the Johns Hopkins Information Security Institute joins us to discuss network segmentation.
 For links to all of today's stories, visit https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_22.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that the US has indicted a Russian accountant for conspiring to influence US midterm elections. Different nations have different styles of information operations because they have different goals. Technology shifts, but underlying principles of propaganda remain. The EU barks cyber deterrence but doesn't bite, yet. North Korea's petty cyber crime wave. A scammer is after alt-coin enthusiasts. And there's neither confirmation nor retraction of Bloomberg's spy-chip story. Joe Carrigan from the Johns Hopkins Information Security Institute joins us to discuss network segmentation.</p> <p>For links to all of today's stories, visit https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_22.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>877</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[88dba28638e24ae8abd67b40b3844489]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4200848360.mp3?updated=1689955155" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stormy weather in the Office 365 cloud. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/58/notes</link>
      <description>Security firm Lastline recently took a close look at threats to the Office 365 cloud environment, taking advantage of the insights they gain protecting their clients. 
Andy Norton is director of threat intelligence at Lastline, and he joins us to describe their findings. 
The research can be found here:
 https://www.lastline.com/blog/malspam-malscape-snapshot-malicious-activity-in-the-office-365-cloud/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Oct 2018 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>58</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ddf00642-df0e-11ea-a432-87f199e077b2/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Stormy weather in the Office 365 cloud.</itunes:subtitle>
      <itunes:summary>Security firm Lastline recently took a close look at threats to the Office 365 cloud environment, taking advantage of the insights they gain protecting their clients. 
Andy Norton is director of threat intelligence at Lastline, and he joins us to describe their findings. 
The research can be found here:
 https://www.lastline.com/blog/malspam-malscape-snapshot-malicious-activity-in-the-office-365-cloud/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Security firm Lastline recently took a close look at threats to the Office 365 cloud environment, taking advantage of the insights they gain protecting their clients. </p><p>Andy Norton is director of threat intelligence at Lastline, and he joins us to describe their findings. </p><p>The research can be found here:</p><p><a href="https://www.lastline.com/blog/malspam-malscape-snapshot-malicious-activity-in-the-office-365-cloud/"> https://www.lastline.com/blog/malspam-malscape-snapshot-malicious-activity-in-the-office-365-cloud/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1457</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9ca65657c2b141e582e53f796de0763a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3434088926.mp3?updated=1685022638" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chinese supply-chain hack story gets vanishingly thin. Twitter downs pro-Saudi bots. SEO poisoning. OceanLotus evolves. Ransomware notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/708/notes</link>
      <description>In today's podcast, we hear that no one but Bloomberg seems to retain much faith in Bloomberg's story about Chinese supply-chain seeding attacks. Twitter blocks bots retailing coordinated Saudi talking points about the disappearance of journalist Jamal Khashoggi. Latvia says it blocked attempts to interfere with its October elections. SEO poisoning exploits interest in key words associated with US midterms. OceanLotus shows some new trick. A Connecticut town pays ransom. Ransomware hoods take pity on a grieving father. We speak with our Johannes Ullrich from the SANS Institute who discusses DNSSEC root key rollover and Mike Horning from Virginia Tech, shares the results of a study on the implications of regulating social media. For links to all of today's stories, visit https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_19.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 19 Oct 2018 19:30:53 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>708</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/890600a2-def8-11ea-911f-9328b2a480d1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Chinese supply-chain hack story gets vanishingly thin. Twitter downs pro-Saudi bots. SEO poisoning. OceanLotus evolves. Ransomware notes.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that no one but Bloomberg seems to retain much faith in Bloomberg's story about Chinese supply-chain seeding attacks. Twitter blocks bots retailing coordinated Saudi talking points about the disappearance of journalist Jamal Khashoggi. Latvia says it blocked attempts to interfere with its October elections. SEO poisoning exploits interest in key words associated with US midterms. OceanLotus shows some new trick. A Connecticut town pays ransom. Ransomware hoods take pity on a grieving father. We speak with our Johannes Ullrich from the SANS Institute who discusses DNSSEC root key rollover and Mike Horning from Virginia Tech, shares the results of a study on the implications of regulating social media. For links to all of today's stories, visit https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_19.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that no one but Bloomberg seems to retain much faith in Bloomberg's story about Chinese supply-chain seeding attacks. Twitter blocks bots retailing coordinated Saudi talking points about the disappearance of journalist Jamal Khashoggi. Latvia says it blocked attempts to interfere with its October elections. SEO poisoning exploits interest in key words associated with US midterms. OceanLotus shows some new trick. A Connecticut town pays ransom. Ransomware hoods take pity on a grieving father. We speak with our Johannes Ullrich from the SANS Institute who discusses DNSSEC root key rollover and Mike Horning from Virginia Tech, shares the results of a study on the implications of regulating social media. For links to all of today's stories, visit https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_19.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1502</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[934914d478804d65bc9336410bc007dc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8042196845.mp3?updated=1608755776" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Looks like Comment Crew, but probably isn't. Facebook breached by spammers. Twitter's big troll trove. Router issues. Who dunnit to YouTube?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/707/notes</link>
      <description>In today's podcast, we hear that a campaign reuses some of the old Comment Crew code, but McAfee researchers think it's not the same old Crew. Facebook thinks its big breach was the work of spammers, not spies. Twitter releases a trove of trolling and invites researchers to take a look. Researchers disclose flaws in D-Link and Linksys routers. Ghost Squad says that they downed YouTube the other day, but who knows? And if YouTube goes down, please don't call 911.  Dr. Charles Clancy from VA Tech’s Hume Center on cognitive electronic warfare. Guest is Mike Janke from DataTribe on Maryland’s aspirations to be the nation’s hub of cyber operations.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_18.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 18 Oct 2018 17:40:52 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>707</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/89206e38-def8-11ea-911f-13d5da19f33d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Looks like Comment Crew, but probably isn't. Facebook breached by spammers. Twitter's big troll trove. Router issues. Who dunnit to YouTube?</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that a campaign reuses some of the old Comment Crew code, but McAfee researchers think it's not the same old Crew. Facebook thinks its big breach was the work of spammers, not spies. Twitter releases a trove of trolling and invites researchers to take a look. Researchers disclose flaws in D-Link and Linksys routers. Ghost Squad says that they downed YouTube the other day, but who knows? And if YouTube goes down, please don't call 911.  Dr. Charles Clancy from VA Tech’s Hume Center on cognitive electronic warfare. Guest is Mike Janke from DataTribe on Maryland’s aspirations to be the nation’s hub of cyber operations.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_18.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that a campaign reuses some of the old Comment Crew code, but McAfee researchers think it's not the same old Crew. Facebook thinks its big breach was the work of spammers, not spies. Twitter releases a trove of trolling and invites researchers to take a look. Researchers disclose flaws in D-Link and Linksys routers. Ghost Squad says that they downed YouTube the other day, but who knows? And if YouTube goes down, please don't call 911.  Dr. Charles Clancy from VA Tech’s Hume Center on cognitive electronic warfare. Guest is Mike Janke from DataTribe on Maryland’s aspirations to be the nation’s hub of cyber operations.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_18.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1268</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[024872c06eec4a6e96e96bf5dfd8d33a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2088784155.mp3?updated=1689955095" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Meddling with the midterms. [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/25/notes</link>
      <description>Kim Zetter is longtime cybersecurity and national security reporter for the New York Times, and author of the book Countdown to Zero Day. She joins us to discuss her recent feature for the New York Times Magazine, titled The Crisis of Election Security. In it she explores the structure and fragile integrity of the US election system, how we got to where we are today, and what can be done to reestablish confidence in the system.
Link to Kim Zetter's feature The Crisis of Election Security:
https://www.nytimes.com/2018/09/26/magazine/election-security-crisis-midterms.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 17 Oct 2018 20:30:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>25</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c2a5a81a-df04-11ea-8146-af43efc16b5a/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Meddling with the midterms</itunes:subtitle>
      <itunes:summary>Kim Zetter is longtime cybersecurity and national security reporter for the New York Times, and author of the book Countdown to Zero Day. She joins us to discuss her recent feature for the New York Times Magazine, titled The Crisis of Election Security. In it she explores the structure and fragile integrity of the US election system, how we got to where we are today, and what can be done to reestablish confidence in the system.
Link to Kim Zetter's feature The Crisis of Election Security:
https://www.nytimes.com/2018/09/26/magazine/election-security-crisis-midterms.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kim Zetter is longtime cybersecurity and national security reporter for the New York Times, and author of the book Countdown to Zero Day. She joins us to discuss her recent feature for the New York Times Magazine, titled The Crisis of Election Security. In it she explores the structure and fragile integrity of the US election system, how we got to where we are today, and what can be done to reestablish confidence in the system.</p><p>Link to Kim Zetter's feature The Crisis of Election Security:</p><p>https://www.nytimes.com/2018/09/26/magazine/election-security-crisis-midterms.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1370</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a4c9cb8de990448bb59deb5b4a95972e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7318971407.mp3?updated=1656711801" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Two ways of hacking the vote. BlackEnergy is active in Poland and Ukraine. ISIS and info ops. Hurricane-stressed utility further stressed by ransomware. Silicon Valley governance.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/706/notes</link>
      <description>In today's podcast, we hear about election security, and two ways of hacking the vote. DHS points out that the states are getting better about sharing election security information. ISIS sets the template for terrorist information operations. BlackEnergy is back, in Poland and Ukraine, with new, "GreyEnergy" malware. Diplomatic targets prospected in Central Asia. North Carolina, recovering from hurricane damage, also faces some ransomware. Silicon Valley governance receives scrutiny. Craig Williams from CISCO Talos on dealing with FUD. New York Times writer Kim Zetter on election security.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_17.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 17 Oct 2018 19:57:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>706</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8931ae00-def8-11ea-911f-f366d6a0d04b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Two ways of hacking the vote. BlackEnergy is active in Poland and Ukraine. ISIS and info ops. Hurricane-stressed utility further stressed by ransomware. Silicon Valley governance.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about election security, and two ways of hacking the vote. DHS points out that the states are getting better about sharing election security information. ISIS sets the template for terrorist information operations. BlackEnergy is back, in Poland and Ukraine, with new, "GreyEnergy" malware. Diplomatic targets prospected in Central Asia. North Carolina, recovering from hurricane damage, also faces some ransomware. Silicon Valley governance receives scrutiny. Craig Williams from CISCO Talos on dealing with FUD. New York Times writer Kim Zetter on election security.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_17.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about election security, and two ways of hacking the vote. DHS points out that the states are getting better about sharing election security information. ISIS sets the template for terrorist information operations. BlackEnergy is back, in Poland and Ukraine, with new, "GreyEnergy" malware. Diplomatic targets prospected in Central Asia. North Carolina, recovering from hurricane damage, also faces some ransomware. Silicon Valley governance receives scrutiny. Craig Williams from CISCO Talos on dealing with FUD. New York Times writer Kim Zetter on election security.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_17.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1216</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[28956b9957c246a28aea96e93a26a734]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6057262204.mp3?updated=1689955072" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Facebook in Myanmar. Supply chain seeding attack update. Election hacking. NCSC reports. EU prepares sanctions (Russia feels ill-used).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/705/notes</link>
      <description>In today's podcast we hear about social networking for genocide in Myanmar: Facebook takes down the Army's inauthentic and inflammatory pages. The supply chain seeding attack from China remains dubious. Probes of US election infrastructure, and black market offers of voter databases, are reported. GCHQ sees cybercrime as a chronic threat, but state-sponsored cyber operations as an acute problem. EU prepares sanctions against a big country to the east. And farewell to Paul Allen, departed this life yesterday at the age of 65. Mike Benjamin from CenturyLink with an update on the Satori botnet. Guest is Larry Sjelin, Director of Game Development at the Center for Infrastructure Assurance and Security, discussing the Cyber Threat Defender card game.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_16.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Oct 2018 20:01:13 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>705</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8947762c-def8-11ea-911f-ffbca4c673a1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Facebook in Myanmar. Supply chain seeding attack update. Election hacking. NCSC reports. EU prepares sanctions (Russia feels ill-used).</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about social networking for genocide in Myanmar: Facebook takes down the Army's inauthentic and inflammatory pages. The supply chain seeding attack from China remains dubious. Probes of US election infrastructure, and black market offers of voter databases, are reported. GCHQ sees cybercrime as a chronic threat, but state-sponsored cyber operations as an acute problem. EU prepares sanctions against a big country to the east. And farewell to Paul Allen, departed this life yesterday at the age of 65. Mike Benjamin from CenturyLink with an update on the Satori botnet. Guest is Larry Sjelin, Director of Game Development at the Center for Infrastructure Assurance and Security, discussing the Cyber Threat Defender card game.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_16.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about social networking for genocide in Myanmar: Facebook takes down the Army's inauthentic and inflammatory pages. The supply chain seeding attack from China remains dubious. Probes of US election infrastructure, and black market offers of voter databases, are reported. GCHQ sees cybercrime as a chronic threat, but state-sponsored cyber operations as an acute problem. EU prepares sanctions against a big country to the east. And farewell to Paul Allen, departed this life yesterday at the age of 65. Mike Benjamin from CenturyLink with an update on the Satori botnet. Guest is Larry Sjelin, Director of Game Development at the Center for Infrastructure Assurance and Security, discussing the Cyber Threat Defender card game.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_16.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1142</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[325a34d0ce3049d5bbc78753fe932f1e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8644775312.mp3?updated=1689955015" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Facebook breach details. Privacy issues and an image problem for advocates. Supply-chain-attack skepticism. Info ops, bikers, and deniable paramilitaries.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/704/notes</link>
      <description>In today's podcast, we heat that Facebook has found that fewer users than feared were affected by its breach, but that in this case "fewer" still means "a lot"—nearly thirty-million of them. Do privacy advocates have an image problem? Supply chain seeding attack story draws more skeptical comment. A pipeline accident turns out not to have been a cyberattack. Estonia joins the UK and the Netherlands in an effort to clarify EU cyber sanctions. But Italy pumps the brakes. (Do Putin's Angels rejoice?) Rick Howard from Palo Alto Networks on exponential technologies, and how they could change the notion of scarcity.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_15.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 15 Oct 2018 18:57:44 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>704</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8959b5bc-def8-11ea-911f-c79ab91ce6bf/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Facebook breach details. Privacy issues and an image problem for advocates. Supply-chain-attack skepticism. Info ops, bikers, and deniable paramilitaries.</itunes:subtitle>
      <itunes:summary>In today's podcast, we heat that Facebook has found that fewer users than feared were affected by its breach, but that in this case "fewer" still means "a lot"—nearly thirty-million of them. Do privacy advocates have an image problem? Supply chain seeding attack story draws more skeptical comment. A pipeline accident turns out not to have been a cyberattack. Estonia joins the UK and the Netherlands in an effort to clarify EU cyber sanctions. But Italy pumps the brakes. (Do Putin's Angels rejoice?) Rick Howard from Palo Alto Networks on exponential technologies, and how they could change the notion of scarcity.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_15.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we heat that Facebook has found that fewer users than feared were affected by its breach, but that in this case "fewer" still means "a lot"—nearly thirty-million of them. Do privacy advocates have an image problem? Supply chain seeding attack story draws more skeptical comment. A pipeline accident turns out not to have been a cyberattack. Estonia joins the UK and the Netherlands in an effort to clarify EU cyber sanctions. But Italy pumps the brakes. (Do Putin's Angels rejoice?) Rick Howard from Palo Alto Networks on exponential technologies, and how they could change the notion of scarcity.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_15.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1210</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f0ba3e0885994052be42ea6a58808159]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4533166553.mp3?updated=1689955002" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Driving GPS manipulation. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/57/notes</link>
      <description>Researchers at Virginia Tech investigate possible ways to manipulate GPS signals and send drivers to specific locations without their knowledge. 

Gang Wang is Assistant Professor of Computer Science at Virginia Tech, and he joins us to share his team's findings.

The original research can be found here:
https://people.cs.vt.edu/gangwang/sec18-gps.pdf
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Oct 2018 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>57</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/da6fc05c-df0e-11ea-a432-fbce17c80a59/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Driving GPS manipulation</itunes:subtitle>
      <itunes:summary>Researchers at Virginia Tech investigate possible ways to manipulate GPS signals and send drivers to specific locations without their knowledge. 

Gang Wang is Assistant Professor of Computer Science at Virginia Tech, and he joins us to share his team's findings.

The original research can be found here:
https://people.cs.vt.edu/gangwang/sec18-gps.pdf
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Virginia Tech investigate possible ways to manipulate GPS signals and send drivers to specific locations without their knowledge. </p><p><br></p><p>Gang Wang is Assistant Professor of Computer Science at Virginia Tech, and he joins us to share his team's findings.</p><p><br></p><p>The original research can be found here:</p><p>https://people.cs.vt.edu/gangwang/sec18-gps.pdf</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1806</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e8a88019db2c4e6d916f0c0b40ba79e0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3481185242.mp3?updated=1685022619" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Busy Bears, again. Mixing IT and OT is a risky business. New Android Trojan. Supply chain seeding attack updates. Facebook purges more "inauthentic" accounts. Data privacy. Cyber sanctions.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/703/notes</link>
      <description>In today's podcast we hear that Ukraine says it's under cyberattack, again. ESET connects Telebots and BlackEnergy. Port hacks suggest risks of mixing IT and OT. Talos finds a new Android Trojan. Skepticism over Chinese supply chain seeding attack report continues. Facebook purges more "inauthentic" sites—this time they're American. Data privacy regulation is trending, in both Sacramento and Washington. EU will consider cyber sanctions policy. NATO looks to cyber IOC. Alleged SIM-swappers arrested. Jonathan Katz from UMD on the use of a cryptographic ledger to provide accountability for law enforcement. Guest is April Wensel from Compassionate Coding on her work bringing emotional intelligence and ethics to the tech industry.
 For links to today's stories check out our CyberWire daily news brief:  https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_12.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 12 Oct 2018 19:13:01 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>703</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/897a047a-def8-11ea-911f-9b9321c84d2d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Busy Bears, again. Mixing IT and OT is a risky business. New Android Trojan. Supply chain seeding attack updates. Facebook purges more "inauthentic" accounts. Data privacy. Cyber sanctions.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Ukraine says it's under cyberattack, again. ESET connects Telebots and BlackEnergy. Port hacks suggest risks of mixing IT and OT. Talos finds a new Android Trojan. Skepticism over Chinese supply chain seeding attack report continues. Facebook purges more "inauthentic" sites—this time they're American. Data privacy regulation is trending, in both Sacramento and Washington. EU will consider cyber sanctions policy. NATO looks to cyber IOC. Alleged SIM-swappers arrested. Jonathan Katz from UMD on the use of a cryptographic ledger to provide accountability for law enforcement. Guest is April Wensel from Compassionate Coding on her work bringing emotional intelligence and ethics to the tech industry.
 For links to today's stories check out our CyberWire daily news brief:  https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_12.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Ukraine says it's under cyberattack, again. ESET connects Telebots and BlackEnergy. Port hacks suggest risks of mixing IT and OT. Talos finds a new Android Trojan. Skepticism over Chinese supply chain seeding attack report continues. Facebook purges more "inauthentic" sites—this time they're American. Data privacy regulation is trending, in both Sacramento and Washington. EU will consider cyber sanctions policy. NATO looks to cyber IOC. Alleged SIM-swappers arrested. Jonathan Katz from UMD on the use of a cryptographic ledger to provide accountability for law enforcement. Guest is April Wensel from Compassionate Coding on her work bringing emotional intelligence and ethics to the tech industry.</p> <p>For links to today's stories check out our CyberWire daily news brief:<br> <a href="https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_10.html"> https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_12.html</a><br> </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1544</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[65266344f30845328156d576eae8e4c6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8204091005.mp3?updated=1608755798" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Seeding-attack skepticism. MSS officer arrested, will face industrial espionage charges in the US. Russia says again that it didn't hack the OPCW.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/702/notes</link>
      <description>In today's podcast, we hear that the report of Chinese supply chain seeding attacks comes in for more skepticism: NSA never heard of it, and Congress would like some answers. The US has an officer of China's MSS in front of a Cincinnati court on charges of industrial espionage: he was extradited this week from Belgium. Notes on officers and agents. Russia repeats denials of hacking the Organisation for the Prevention of Chemical Warfare. Ben Yelin from UMD CHHS with a court case on cell site location data. Guest is Brian Vecci from Varonis with results from their data breach survey.
 For links to today's stories check out our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_11.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 11 Oct 2018 20:06:31 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>702</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/898cdbae-def8-11ea-911f-cf9e54d8d5ea/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Seeding-attack skepticism. MSS officer arrested, will face industrial espionage charges in the US. Russia says again that it didn't hack the OPCW.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the report of Chinese supply chain seeding attacks comes in for more skepticism: NSA never heard of it, and Congress would like some answers. The US has an officer of China's MSS in front of a Cincinnati court on charges of industrial espionage: he was extradited this week from Belgium. Notes on officers and agents. Russia repeats denials of hacking the Organisation for the Prevention of Chemical Warfare. Ben Yelin from UMD CHHS with a court case on cell site location data. Guest is Brian Vecci from Varonis with results from their data breach survey.
 For links to today's stories check out our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_11.html 
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the report of Chinese supply chain seeding attacks comes in for more skepticism: NSA never heard of it, and Congress would like some answers. The US has an officer of China's MSS in front of a Cincinnati court on charges of industrial espionage: he was extradited this week from Belgium. Notes on officers and agents. Russia repeats denials of hacking the Organisation for the Prevention of Chemical Warfare. Ben Yelin from UMD CHHS with a court case on cell site location data. Guest is Brian Vecci from Varonis with results from their data breach survey.</p> <p>For links to today's stories check out our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_11.html<br> </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1259</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6ccd77edd7db4fd099d024f0eafd510d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9340106059.mp3?updated=1689954894" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Updates on supply-chain seeding reports. DDoS in Ukraine. GAO reports on US weapon system cyber vulnerabilities. Bugs exploited by Mirai persist. Patch note and toe dialing.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/701/notes</link>
      <description>In today's podcast we hear that there's no consensus, yet, on Bloomberg's report of Chinese seeding attacks on the IT hardware supply chain. Ukrainian fiscal authority sustains DDoS attack. GAO reports on cyber vulnerabilities in US Defense Department weapon systems. Xiongmai DVRs and cameras still exhibit bugs exploited by the Mirai botnet. Patch notes. And a lizard toe-dials from a veterinary clinic—he wasn't a patient; just visiting. Robert M. Lee from Dragos with insights on the Bloomberg hardware supply chain story. Guest is Stephen Cobb from ESET with results from their recent AI and ML silver bullet survey.
 For links to today's stories check out our CyberWire daily news brief:  https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_10.html 
 Support our show
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 10 Oct 2018 18:15:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>701</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/89a46f80-def8-11ea-911f-3778691045dd/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Updates on supply-chain seeding reports. DDoS in Ukraine. GAO reports on US weapon system cyber vulnerabilities. Bugs exploited by Mirai persist. Patch note and toe dialing.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that there's no consensus, yet, on Bloomberg's report of Chinese seeding attacks on the IT hardware supply chain. Ukrainian fiscal authority sustains DDoS attack. GAO reports on cyber vulnerabilities in US Defense Department weapon systems. Xiongmai DVRs and cameras still exhibit bugs exploited by the Mirai botnet. Patch notes. And a lizard toe-dials from a veterinary clinic—he wasn't a patient; just visiting. Robert M. Lee from Dragos with insights on the Bloomberg hardware supply chain story. Guest is Stephen Cobb from ESET with results from their recent AI and ML silver bullet survey.
 For links to today's stories check out our CyberWire daily news brief:  https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_10.html 
 Support our show
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that there's no consensus, yet, on Bloomberg's report of Chinese seeding attacks on the IT hardware supply chain. Ukrainian fiscal authority sustains DDoS attack. GAO reports on cyber vulnerabilities in US Defense Department weapon systems. Xiongmai DVRs and cameras still exhibit bugs exploited by the Mirai botnet. Patch notes. And a lizard toe-dials from a veterinary clinic—he wasn't a patient; just visiting. Robert M. Lee from Dragos with insights on the Bloomberg hardware supply chain story. Guest is Stephen Cobb from ESET with results from their recent AI and ML silver bullet survey.</p> <p>For links to today's stories check out our CyberWire daily news brief:<br> <a href="https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_10.html"> https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_10.html</a><br> </p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p> <p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1317</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[94b38d9a93524bdd94801526c2dbaa83]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9934689163.mp3?updated=1689954872" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Update on supply chain seeding reports. GRU comes in for more criticism. UK prepares cyber retaliatory capability. Power grid resilience. Panda Banker. Google's good and bad news.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/700/notes</link>
      <description>In today's podcast we hear that Bloomberg's report of a Chinese seeding attack on the IT hardware supply chain comes in for skepticism, but Bloomberg stands by—and adds to—its reporting. Everyone is seeing Russia's GRU everywhere, and Russia feels aggrieved by the accusations. The UK prepares a retaliatory cyber capability. The US looks to grid security. Cylance describes Panda Banker. Google had a good day in UK courts Monday, but a bad day elsewhere. Justin Harvey from Accenture with thoughts in OSINT reconnaissance.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_09.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Oct 2018 19:34:45 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>700</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/89bc6324-def8-11ea-911f-9b2e7f168a1f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Update on supply chain seeding reports. GRU comes in for more criticism. UK prepares cyber retaliatory capability. Power grid resilience. Panda Banker. Google's good and bad news.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Bloomberg's report of a Chinese seeding attack on the IT hardware supply chain comes in for skepticism, but Bloomberg stands by—and adds to—its reporting. Everyone is seeing Russia's GRU everywhere, and Russia feels aggrieved by the accusations. The UK prepares a retaliatory cyber capability. The US looks to grid security. Cylance describes Panda Banker. Google had a good day in UK courts Monday, but a bad day elsewhere. Justin Harvey from Accenture with thoughts in OSINT reconnaissance.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_09.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Bloomberg's report of a Chinese seeding attack on the IT hardware supply chain comes in for skepticism, but Bloomberg stands by—and adds to—its reporting. Everyone is seeing Russia's GRU everywhere, and Russia feels aggrieved by the accusations. The UK prepares a retaliatory cyber capability. The US looks to grid security. Cylance describes Panda Banker. Google had a good day in UK courts Monday, but a bad day elsewhere. Justin Harvey from Accenture with thoughts in OSINT reconnaissance.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_09.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1258</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bb90fdc889134aa3b98288b9a51bf6e4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3770763313.mp3?updated=1689954857" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cryptojacking criminal capers continue. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/56/notes</link>
      <description>Researchers at Palo Alto Networks' Unit 42 have been tracking the rise of cryptocurrency mining operations run by criminal groups around the world. Ryan Olson is V.P. of threat intelligence at Palo Alto Networks, and he joins us to share what they've learned.
The original research can be found here:
https://researchcenter.paloaltonetworks.com/2018/06/unit42-rise-cryptocurrency-miners/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Oct 2018 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>56</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/d77c2ef8-df0e-11ea-866e-1389b29a5548/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cryptojacking criminal capers continue </itunes:subtitle>
      <itunes:summary>Researchers at Palo Alto Networks' Unit 42 have been tracking the rise of cryptocurrency mining operations run by criminal groups around the world. Ryan Olson is V.P. of threat intelligence at Palo Alto Networks, and he joins us to share what they've learned.
The original research can be found here:
https://researchcenter.paloaltonetworks.com/2018/06/unit42-rise-cryptocurrency-miners/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Palo Alto Networks' Unit 42 have been tracking the rise of cryptocurrency mining operations run by criminal groups around the world. Ryan Olson is V.P. of threat intelligence at Palo Alto Networks, and he joins us to share what they've learned.</p><p>The original research can be found here:</p><p>https://researchcenter.paloaltonetworks.com/2018/06/unit42-rise-cryptocurrency-miners/</p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1518</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[95912ad48e364d478ca4bead22d5a65d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2292388393.mp3?updated=1685022634" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Reports of Chinese seeding attacks on the supply chain. Five Eyes and other allies push back at Russia's GRU. NPPD to become Cybersecurity and Infrastructure Security Agency</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/699/notes</link>
      <description>In today's podcast, we hear more on the possibility that China's Peoples Liberation Army engaged in seeding the supply chain with malicious chips. Companies deny it, but Bloomberg stands by its story. All Five Eyes denounce Russia's GRU for hacking. Russia responds unconvincingly. And the NPPD will become a new agency within the US Department of Homeland Security, and the lead civilian agency responsible for cybersecurity and critical infrastructure protection. Malek Ben Salem from Accenture Labs on pervasive cyber resilience. Guest is Adam Anderson, scholar in residence at Clemson University’s Center for Corporate Learning and founder of Element Security Group, on behavioral science and cyber crime.
 For links to all of today's stories check our our CyberWire daily news brief:  https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_05.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 05 Oct 2018 20:13:08 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>699</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/89d6f0ae-def8-11ea-911f-8b6b1247203b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Reports of Chinese seeding attacks on the supply chain. Five Eyes and other allies push back at Russia's GRU. NPPD to become Cybersecurity and Infrastructure Security Agency</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear more on the possibility that China's Peoples Liberation Army engaged in seeding the supply chain with malicious chips. Companies deny it, but Bloomberg stands by its story. All Five Eyes denounce Russia's GRU for hacking. Russia responds unconvincingly. And the NPPD will become a new agency within the US Department of Homeland Security, and the lead civilian agency responsible for cybersecurity and critical infrastructure protection. Malek Ben Salem from Accenture Labs on pervasive cyber resilience. Guest is Adam Anderson, scholar in residence at Clemson University’s Center for Corporate Learning and founder of Element Security Group, on behavioral science and cyber crime.
 For links to all of today's stories check our our CyberWire daily news brief:  https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_05.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear more on the possibility that China's Peoples Liberation Army engaged in seeding the supply chain with malicious chips. Companies deny it, but Bloomberg stands by its story. All Five Eyes denounce Russia's GRU for hacking. Russia responds unconvincingly. And the NPPD will become a new agency within the US Department of Homeland Security, and the lead civilian agency responsible for cybersecurity and critical infrastructure protection. Malek Ben Salem from Accenture Labs on pervasive cyber resilience. Guest is Adam Anderson, scholar in residence at Clemson University’s Center for Corporate Learning and founder of Element Security Group, on behavioral science and cyber crime.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> <a href="https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_24.html"> https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_05.html</a></p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1524</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3034dc6f21e644deab40ccfc3d98a2fb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5872884021.mp3?updated=1608755193" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bloomberg reports a seeding attack on the supply chain by Chinese intelligence services. GRU is named, shamed, indicted, and expelled.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/698/notes</link>
      <description>In today's podcast, we hear that Bloomberg reports that a Chinese hardware hack has infested sensitive US supply chains. Dutch authorities expel GRU officers for attempting to hack the international body investigating the nerve agent attacks in Salisbury. Australia, the UK, and Canada all finger the GRU as responsible for high-profile cyberattacks. The US indicts seven GRU officers for a range of hacking-related crimes. Craig Williams from Cisco Talos with tips on getting the most out of security conferences. Guest is Oussama El-Hilali from Arcserve with thoughts on business continuity and disaster recovery.
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 04 Oct 2018 20:41:12 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>698</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/89f2a434-def8-11ea-911f-c730cc8e534a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Bloomberg reports a seeding attack on the supply chain by Chinese intelligence services. GRU is named, shamed, indicted, and expelled.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Bloomberg reports that a Chinese hardware hack has infested sensitive US supply chains. Dutch authorities expel GRU officers for attempting to hack the international body investigating the nerve agent attacks in Salisbury. Australia, the UK, and Canada all finger the GRU as responsible for high-profile cyberattacks. The US indicts seven GRU officers for a range of hacking-related crimes. Craig Williams from Cisco Talos with tips on getting the most out of security conferences. Guest is Oussama El-Hilali from Arcserve with thoughts on business continuity and disaster recovery.
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Bloomberg reports that a Chinese hardware hack has infested sensitive US supply chains. Dutch authorities expel GRU officers for attempting to hack the international body investigating the nerve agent attacks in Salisbury. Australia, the UK, and Canada all finger the GRU as responsible for high-profile cyberattacks. The US indicts seven GRU officers for a range of hacking-related crimes. Craig Williams from Cisco Talos with tips on getting the most out of security conferences. Guest is Oussama El-Hilali from Arcserve with thoughts on business continuity and disaster recovery.</p> <p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1271</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2353bb276cd14443976d1322321c9b03]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8498232488.mp3?updated=1689954735" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Facebook breach updates. Bogus Zoho Office Suite. Brazil's big botnet. Vulnerable router firmware. Patch news. A DGSI officer arrested for dark web collusion with the mob. Bad Fortnite cheats.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/697/notes</link>
      <description>In today's podcast, we hear that Facebook continues to investigate its breach, and says it's not found any evidence of apps compromised through Facebook Login. Irish authorities open a GDPR investigation of Facebook. Bogus offers of Zoho Office Suite are malicious. A big botnet hits Brazil's banking customers. Home routers found vulnerable. Google and Adobe patch. A DGSI officer is arrested in France for dark web trafficking. FEMA tests its emergency text system. Fortnite cheats are bad news. David Dufour from Webroot on security issues in video games as they become social networks. Guest is Michael Feiertag from tCell with results from their Q2 incident report.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_03.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 03 Oct 2018 19:35:43 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>697</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8a07816a-def8-11ea-911f-2b0076d013c5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Facebook breach updates. Bogus Zoho Office Suite. Brazil's big botnet. Vulnerable router firmware. Patch news. A DGSI officer arrested for dark web collusion with the mob. Bad Fortnite cheats.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Facebook continues to investigate its breach, and says it's not found any evidence of apps compromised through Facebook Login. Irish authorities open a GDPR investigation of Facebook. Bogus offers of Zoho Office Suite are malicious. A big botnet hits Brazil's banking customers. Home routers found vulnerable. Google and Adobe patch. A DGSI officer is arrested in France for dark web trafficking. FEMA tests its emergency text system. Fortnite cheats are bad news. David Dufour from Webroot on security issues in video games as they become social networks. Guest is Michael Feiertag from tCell with results from their Q2 incident report.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_03.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Facebook continues to investigate its breach, and says it's not found any evidence of apps compromised through Facebook Login. Irish authorities open a GDPR investigation of Facebook. Bogus offers of Zoho Office Suite are malicious. A big botnet hits Brazil's banking customers. Home routers found vulnerable. Google and Adobe patch. A DGSI officer is arrested in France for dark web trafficking. FEMA tests its emergency text system. Fortnite cheats are bad news. David Dufour from Webroot on security issues in video games as they become social networks. Guest is Michael Feiertag from tCell with results from their Q2 incident report.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_03.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1251</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[92ef7f11d2b94484aae4df4fa5837b5e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3278280075.mp3?updated=1689954717" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>RDP exploitation. More on the Facebook breach. Google and content moderation. Reaper Group stayed busy even after US-DPRK summit. Spyware in Canada. Hacking an airport.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/696/notes</link>
      <description>In today's podcast we hear that the US FBI and DHS warn that RDP exploitation is up. Facebook's breach exhibits the tension between swift disclosure and sound incident response. A look at slow-rolled disclosure. Google draws criticism for some content it hosts. North Korea's Reaper Group never missed a beat. Citizen Lab says Saudi Arabia is spying on at least one prominent dissident who's a permanent resident in Canada. Nepal's airport is hacked, apparently for the lulz. Joe Carrigan from JHU ISI on Android password managers being vulnerable to malicious apps. Guest is Robb Reck from Ping Identity on recently published white papers from the CISO Advisory Council.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_02.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Oct 2018 18:46:04 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>696</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8a1f6f32-def8-11ea-911f-13485a932e04/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>RDP exploitation. More on the Facebook breach. Google and content moderation. Reaper Group stayed busy even after US-DPRK summit. Spyware in Canada. Hacking an airport.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that the US FBI and DHS warn that RDP exploitation is up. Facebook's breach exhibits the tension between swift disclosure and sound incident response. A look at slow-rolled disclosure. Google draws criticism for some content it hosts. North Korea's Reaper Group never missed a beat. Citizen Lab says Saudi Arabia is spying on at least one prominent dissident who's a permanent resident in Canada. Nepal's airport is hacked, apparently for the lulz. Joe Carrigan from JHU ISI on Android password managers being vulnerable to malicious apps. Guest is Robb Reck from Ping Identity on recently published white papers from the CISO Advisory Council.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_02.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that the US FBI and DHS warn that RDP exploitation is up. Facebook's breach exhibits the tension between swift disclosure and sound incident response. A look at slow-rolled disclosure. Google draws criticism for some content it hosts. North Korea's Reaper Group never missed a beat. Citizen Lab says Saudi Arabia is spying on at least one prominent dissident who's a permanent resident in Canada. Nepal's airport is hacked, apparently for the lulz. Joe Carrigan from JHU ISI on Android password managers being vulnerable to malicious apps. Guest is Robb Reck from Ping Identity on recently published white papers from the CISO Advisory Council.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/October/CyberWire_2018_10_02.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1288</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6cd91bd35d3647449af25f8c5cf80809]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1593409619.mp3?updated=1689954692" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Facebook agonistes. Election meddling. Livestreamed hack gets cancelled.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/695/notes</link>
      <description>In today's podcast we hear an update on Facebook's data breach, including EU inquiries, Congressional attention, FTC scrutiny, and user unhappiness. The threat of Chinese election meddling seems to be a matter of concern in the US Intelligence Committee. And, despite promises, there was no livestreamed obliteration of much of anything yesterday. Rick Howard from Palo Alto Networks on rebooting the kill chain.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_10_01.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 01 Oct 2018 19:42:20 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>695</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8a3912a2-def8-11ea-911f-d3b3797bf715/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Facebook agonistes. Election meddling. Livestreamed hack gets cancelled.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear an update on Facebook's data breach, including EU inquiries, Congressional attention, FTC scrutiny, and user unhappiness. The threat of Chinese election meddling seems to be a matter of concern in the US Intelligence Committee. And, despite promises, there was no livestreamed obliteration of much of anything yesterday. Rick Howard from Palo Alto Networks on rebooting the kill chain.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_10_01.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear an update on Facebook's data breach, including EU inquiries, Congressional attention, FTC scrutiny, and user unhappiness. The threat of Chinese election meddling seems to be a matter of concern in the US Intelligence Committee. And, despite promises, there was no livestreamed obliteration of much of anything yesterday. Rick Howard from Palo Alto Networks on rebooting the kill chain.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_10_01.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1250</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3cc5de7fe3634ff1b9a164518edc6250]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3041717663.mp3?updated=1689954678" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sophisticated FIN7 criminal group hits payment card data. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/55/notes</link>
      <description>Researchers at security firm FireEye have been tracking malicious actors they call FIN7, a group which targets payment card data in the hospitality industry and elsewhere. They make use of targeted phishing campaigns, telephone vishing and even a convincing front company to do their deeds. 
Nick Carr and Barry Vengerick are coauthors of the research, along with their colleagues Kimberly Goody and Steve Miller. 
The research is titled On the Hunt for FIN7: Pursuing an Enigmatic and Evasive Global Criminal Operation. It can be found here:
https://www.fireeye.com/blog/threat-research/2018/08/fin7-pursuing-an-enigmatic-and-evasive-global-criminal-operation.html
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 29 Sep 2018 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>55</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/d46c5f6c-df0e-11ea-a9f1-8bb48e5960d2/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Sophisticated FIN7 criminal group hits payment card data.</itunes:subtitle>
      <itunes:summary>Researchers at security firm FireEye have been tracking malicious actors they call FIN7, a group which targets payment card data in the hospitality industry and elsewhere. They make use of targeted phishing campaigns, telephone vishing and even a convincing front company to do their deeds. 
Nick Carr and Barry Vengerick are coauthors of the research, along with their colleagues Kimberly Goody and Steve Miller. 
The research is titled On the Hunt for FIN7: Pursuing an Enigmatic and Evasive Global Criminal Operation. It can be found here:
https://www.fireeye.com/blog/threat-research/2018/08/fin7-pursuing-an-enigmatic-and-evasive-global-criminal-operation.html
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at security firm FireEye have been tracking malicious actors they call FIN7, a group which targets payment card data in the hospitality industry and elsewhere. They make use of targeted phishing campaigns, telephone vishing and even a convincing front company to do their deeds. </p><p>Nick Carr and Barry Vengerick are coauthors of the research, along with their colleagues Kimberly Goody and Steve Miller. </p><p>The research is titled On the Hunt for FIN7: Pursuing an Enigmatic and Evasive Global Criminal Operation. It can be found here:</p><p>https://www.fireeye.com/blog/threat-research/2018/08/fin7-pursuing-an-enigmatic-and-evasive-global-criminal-operation.html</p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2050</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00a14914819e43ad852d1bc768f2cca1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9967500400.mp3?updated=1685022617" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Facebook discloses a major breach. Botnet brute forcing ransomware. Retail domain typosquatting. ATM wiretapping. Ransomware in San Diego. SEC hits cyber deficiencies. Assange retires?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/694/notes</link>
      <description>In today's podcast, we hear that Facebook has disclosed a cyberattack that affected fifty million users. A botnet is brute-forcing credentials. Cybercriminals show signs of ramping up spoofed retail domains in preparation for holiday shopping. The US Secret Service warns of ATM wiretapping. The Port of San Diego struggles with ransomware. The US SEC fines a company for cyber deficiencies. Mr. Assange goes offline. And some guy says he'll live-stream his annihilation of a prominent Facebook page. Jonathan Katz from University of MD on Bluetooth pairing protocol vulnerabilities. Guest is Andrea Little Limbago from Endgame on the internet’s effect on global conflict.
 For links to all of today's stories check our our CyberWire daily news brief:  https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_28.html
 Extended interview with Endgame's Andrea Little Limbago: https://www.patreon.com/posts/21704947
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 28 Sep 2018 19:33:46 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>694</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8a4f5ff8-def8-11ea-911f-23609db7c884/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Facebook discloses a major breach. Botnet brute forcing ransomware. Retail domain typosquatting. ATM wiretapping. Ransomware in San Diego. SEC hits cyber deficiencies. Assange retires?</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Facebook has disclosed a cyberattack that affected fifty million users. A botnet is brute-forcing credentials. Cybercriminals show signs of ramping up spoofed retail domains in preparation for holiday shopping. The US Secret Service warns of ATM wiretapping. The Port of San Diego struggles with ransomware. The US SEC fines a company for cyber deficiencies. Mr. Assange goes offline. And some guy says he'll live-stream his annihilation of a prominent Facebook page. Jonathan Katz from University of MD on Bluetooth pairing protocol vulnerabilities. Guest is Andrea Little Limbago from Endgame on the internet’s effect on global conflict.
 For links to all of today's stories check our our CyberWire daily news brief:  https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_28.html
 Extended interview with Endgame's Andrea Little Limbago: https://www.patreon.com/posts/21704947
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Facebook has disclosed a cyberattack that affected fifty million users. A botnet is brute-forcing credentials. Cybercriminals show signs of ramping up spoofed retail domains in preparation for holiday shopping. The US Secret Service warns of ATM wiretapping. The Port of San Diego struggles with ransomware. The US SEC fines a company for cyber deficiencies. Mr. Assange goes offline. And some guy says he'll live-stream his annihilation of a prominent Facebook page. Jonathan Katz from University of MD on Bluetooth pairing protocol vulnerabilities. Guest is Andrea Little Limbago from Endgame on the internet’s effect on global conflict.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> <a href="https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_28.html"> https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_28.html</a></p> <p>Extended interview with Endgame's Andrea Little Limbago:<br> https://www.patreon.com/posts/21704947</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1516</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[947162564fe441bc9093793833636ddf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7512661616.mp3?updated=1608755178" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fancy Bear, again and again. QRecorder is a banking Trojan. Authentication issues with Apple's Device Enrollment Program. Notes on regulation. Farewell to a code-breaker.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/693/notes</link>
      <description>In today's podcast, we find out that Fancy Bear has its very own rootkit. VPNFilter turns out to do a lot more than previously suspected. One of the Salisbury assassins is identified as a GRU colonel. A voice recorder app is kicked out of Google Play for being a banking Trojan. Apple's Device Enrollment Program may have authentication issues. Big Tech might learn to like being regulated. And farewell to one of Bletchley Park's Jenny Wrens. Mike Benjamin from CenturyLink with thoughts on the Foreshadow vulnerability. Guest is Daniel Riedel from New Context Services, discussing synthetic identities.
 For links to all of today's stories check our our CyberWire daily news brief:  https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_27.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 27 Sep 2018 19:20:20 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>693</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8a5f77c6-def8-11ea-911f-b30680a9486d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fancy Bear, again and again. QRecorder is a banking Trojan. Authentication issues with Apple's Device Enrollment Program. Notes on regulation. Farewell to a code-breaker.</itunes:subtitle>
      <itunes:summary>In today's podcast, we find out that Fancy Bear has its very own rootkit. VPNFilter turns out to do a lot more than previously suspected. One of the Salisbury assassins is identified as a GRU colonel. A voice recorder app is kicked out of Google Play for being a banking Trojan. Apple's Device Enrollment Program may have authentication issues. Big Tech might learn to like being regulated. And farewell to one of Bletchley Park's Jenny Wrens. Mike Benjamin from CenturyLink with thoughts on the Foreshadow vulnerability. Guest is Daniel Riedel from New Context Services, discussing synthetic identities.
 For links to all of today's stories check our our CyberWire daily news brief:  https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_27.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we find out that Fancy Bear has its very own rootkit. VPNFilter turns out to do a lot more than previously suspected. One of the Salisbury assassins is identified as a GRU colonel. A voice recorder app is kicked out of Google Play for being a banking Trojan. Apple's Device Enrollment Program may have authentication issues. Big Tech might learn to like being regulated. And farewell to one of Bletchley Park's Jenny Wrens. Mike Benjamin from CenturyLink with thoughts on the Foreshadow vulnerability. Guest is Daniel Riedel from New Context Services, discussing synthetic identities.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> <a href="https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_24.html"> https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_27.html</a></p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1215</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[21cc7f11e5444ccea5249388bb7a7e06]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6446759976.mp3?updated=1689954631" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cryptojacking and ransomware news. The black market in zero-days looks like a bear market. Google budges (a little) on Chrome login. Senate hearings on privacy. Political campaign cybersecurity.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/692/notes</link>
      <description>In today's podcast, we hear that cryptojacking apps have reappeared in Google Play. A brewer's experience with ransomware shows that victims needn't be helpless in the face of extortion. A look at the black market finds that zero-day vendors have grown a lot scarcer on the ground. Google responds—a little—to concerns about privacy in Chrome login. The US Senate is holding hearings on privacy. Big Tech will be there. And are political campaigns slipping into learned helplessness about cybersecurity? Dr. Charles Clancy from VA Tech’s Hume Center on university spin-offs and partnerships. Guest is Dinah Davis from Code Like a Girl on how men can help increase diversity through mentorship.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_26.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 26 Sep 2018 18:56:01 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>692</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8a7f2f08-def8-11ea-911f-8b27e4fa5cae/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cryptojacking and ransomware news. The black market in zero-days looks like a bear market. Google budges (a little) on Chrome login. Senate hearings on privacy. Political campaign cybersecurity.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that cryptojacking apps have reappeared in Google Play. A brewer's experience with ransomware shows that victims needn't be helpless in the face of extortion. A look at the black market finds that zero-day vendors have grown a lot scarcer on the ground. Google responds—a little—to concerns about privacy in Chrome login. The US Senate is holding hearings on privacy. Big Tech will be there. And are political campaigns slipping into learned helplessness about cybersecurity? Dr. Charles Clancy from VA Tech’s Hume Center on university spin-offs and partnerships. Guest is Dinah Davis from Code Like a Girl on how men can help increase diversity through mentorship.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_26.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that cryptojacking apps have reappeared in Google Play. A brewer's experience with ransomware shows that victims needn't be helpless in the face of extortion. A look at the black market finds that zero-day vendors have grown a lot scarcer on the ground. Google responds—a little—to concerns about privacy in Chrome login. The US Senate is holding hearings on privacy. Big Tech will be there. And are political campaigns slipping into learned helplessness about cybersecurity? Dr. Charles Clancy from VA Tech’s Hume Center on university spin-offs and partnerships. Guest is Dinah Davis from Code Like a Girl on how men can help increase diversity through mentorship.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_26.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1138</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[52463fe60422478b95a4d93070c696e3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4422383992.mp3?updated=1689954612" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Follow-up to terror attack in Iran. UN data exposure. Kodi and cryptojacking. SHEIN retail breach. Atlanta's ransomware remediation. Payroll phishing. Quantum strategy.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/691/notes</link>
      <description>In today's podcast, we hear that Iran has accused Saudi Arabia, UAE, and the US of running Saturday's terror attack "from the shadows." Data exposure at the UN. Kodi platform exploited for cryptojacking. SHEIN retail breach affects more than six million. Atlanta says its ransomware incident is now "over." FBI warns of payroll phishing. A US strategy for quantum technology is offered. A look at sports and cybersecurity. Has the Riemann hypothesis been proved?  Johannes Ullrich from the SANS ISC Stormcast podcast with warnings of post-hurricane scams. Our UK correspondent Carole Theriault explores overly complex online terms and conditions, and speaks with a company that’s chosen a different way. Jeremy Forsberg is CMO at Axel.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_25.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Sep 2018 20:02:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>691</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8a9954a0-def8-11ea-911f-8b03a25342e4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Follow-up to terror attack in Iran. UN data exposure. Kodi and cryptojacking. SHEIN retail breach. Atlanta's ransomware remediation. Payroll phishing. Quantum strategy.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Iran has accused Saudi Arabia, UAE, and the US of running Saturday's terror attack "from the shadows." Data exposure at the UN. Kodi platform exploited for cryptojacking. SHEIN retail breach affects more than six million. Atlanta says its ransomware incident is now "over." FBI warns of payroll phishing. A US strategy for quantum technology is offered. A look at sports and cybersecurity. Has the Riemann hypothesis been proved?  Johannes Ullrich from the SANS ISC Stormcast podcast with warnings of post-hurricane scams. Our UK correspondent Carole Theriault explores overly complex online terms and conditions, and speaks with a company that’s chosen a different way. Jeremy Forsberg is CMO at Axel.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_25.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Iran has accused Saudi Arabia, UAE, and the US of running Saturday's terror attack "from the shadows." Data exposure at the UN. Kodi platform exploited for cryptojacking. SHEIN retail breach affects more than six million. Atlanta says its ransomware incident is now "over." FBI warns of payroll phishing. A US strategy for quantum technology is offered. A look at sports and cybersecurity. Has the Riemann hypothesis been proved?  Johannes Ullrich from the SANS ISC Stormcast podcast with warnings of post-hurricane scams. Our UK correspondent Carole Theriault explores overly complex online terms and conditions, and speaks with a company that’s chosen a different way. Jeremy Forsberg is CMO at Axel.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_25.html</p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1223</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bdb813c8452940afbf27db5d7faf5aef]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7175164809.mp3?updated=1689954588" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Terror attack in Iran prompts info skirmishing, and perhaps worse to come. JET bug disclosed. ANSSI open-sources OS. Anglo-American response to Russian cyber ops. Russian elections. Scam notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/690/notes</link>
      <description>In today's CyberWire, we hear about a terror attack in Iran that has heightened tensions among adversaries: expect a heightened cyber optempo.  A JET vulnerability in Microsoft products is publicly disclosed as Microsoft misses the Zero Day Initiative's 120-day deadline. France will open-source its secure operating system. UK, US attitudes continue to stiffen towards Russia in cyberspace. Russian elections are surprising, by Russian standards. Notes on some current scams. Ben Yelin from UMD CHHS on a ruling on warrantless GPS tracking at the U.S. border.
 For links to all of today's stories check our our CyberWire daily news brief:  https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_24.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 24 Sep 2018 19:55:55 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>690</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8aadba26-def8-11ea-911f-4342ba944c57/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Terror attack in Iran prompts info skirmishing, and perhaps worse to come. JET bug disclosed. ANSSI open-sources OS. Anglo-American response to Russian cyber ops. Russian elections. Scam notes.</itunes:subtitle>
      <itunes:summary>In today's CyberWire, we hear about a terror attack in Iran that has heightened tensions among adversaries: expect a heightened cyber optempo.  A JET vulnerability in Microsoft products is publicly disclosed as Microsoft misses the Zero Day Initiative's 120-day deadline. France will open-source its secure operating system. UK, US attitudes continue to stiffen towards Russia in cyberspace. Russian elections are surprising, by Russian standards. Notes on some current scams. Ben Yelin from UMD CHHS on a ruling on warrantless GPS tracking at the U.S. border.
 For links to all of today's stories check our our CyberWire daily news brief:  https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_24.html
 Support our show
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's CyberWire, we hear about a terror attack in Iran that has heightened tensions among adversaries: expect a heightened cyber optempo.  A JET vulnerability in Microsoft products is publicly disclosed as Microsoft misses the Zero Day Initiative's 120-day deadline. France will open-source its secure operating system. UK, US attitudes continue to stiffen towards Russia in cyberspace. Russian elections are surprising, by Russian standards. Notes on some current scams. Ben Yelin from UMD CHHS on a ruling on warrantless GPS tracking at the U.S. border.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> <a href="https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_09_24.html"> https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_24.html</a></p> <p><a href="https://www.patreon.com/thecyberwire">Support our show</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1071</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[267c6d52115d4682959448139a70ed36]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7025508889.mp3?updated=1689954571" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ICS honeypots attract sophisticated snoops. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/54/notes</link>
      <description>Researchers at security firm Cybereason recently set up online honeypots to attract adversaries interested in industrial control system environments. It didn't take long for sophisticated attackers to sniff out the virtual honey and start snuffling around.
Ross Rustici is senior director of intelligence services at Cybereason, and he joins us to share what they learned.
The research is titled ICS Threat Broadens: Nation-state Hackers are no Longer the Only Game in Town. It can be found here:
https://www.cybereason.com/blog/industrial-control-system-specialized-hackers
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 22 Sep 2018 05:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>54</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/d1d2c52a-df0e-11ea-9909-9bd19a479367/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>ICS honeypots attract sophisticated snoops.</itunes:subtitle>
      <itunes:summary>Researchers at security firm Cybereason recently set up online honeypots to attract adversaries interested in industrial control system environments. It didn't take long for sophisticated attackers to sniff out the virtual honey and start snuffling around.
Ross Rustici is senior director of intelligence services at Cybereason, and he joins us to share what they learned.
The research is titled ICS Threat Broadens: Nation-state Hackers are no Longer the Only Game in Town. It can be found here:
https://www.cybereason.com/blog/industrial-control-system-specialized-hackers
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at security firm Cybereason recently set up online honeypots to attract adversaries interested in industrial control system environments. It didn't take long for sophisticated attackers to sniff out the virtual honey and start snuffling around.</p><p>Ross Rustici is senior director of intelligence services at Cybereason, and he joins us to share what they learned.</p><p>The research is titled ICS Threat Broadens: Nation-state Hackers are no Longer the Only Game in Town. It can be found here:</p><p>https://www.cybereason.com/blog/industrial-control-system-specialized-hackers</p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1436</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2f061e66deb442d7a3853f505ae59366]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5161916931.mp3?updated=1685022597" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US National Cyber Strategy. New sanctions. GCHQ beefs up Russia unit. Cryptocurrency heist. Hacking Senatorial Gmail. Crime and punishment.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/689/notes</link>
      <description>In today's podcast, we hear about the US national cyber security strategy, and developing international norms, calling out bad actors, establishing a credible deterrent, and imposing consequences are important parts of it. The State Department blacklists thirty-three Russian bad actors. GCHQ is standing up a 4000-person cyber operations group to counter Russian activity. A cryptocurrency heist in Tokyo. Hacking Senatorial Gmail. And some notes on crime and punishment.  Emily Wilson from Terbium Labs on Dark Web exit scamming. Guest is Tanya Janca from Microsoft on her OWASP DevSlop project.
 Extended interview with Tanya Janca -  https://www.patreon.com/posts/21559930   OWASP DevSlop show on Twitch -  https://www.twitch.tv/videos/307974412 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_09_21.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 21 Sep 2018 20:16:11 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>689</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8abcf180-def8-11ea-911f-1b2bbd50759b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>US National Cyber Strategy. New sanctions. GCHQ beefs up Russia unit. Cryptocurrency heist. Hacking Senatorial Gmail. Crime and punishment.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about the US national cyber security strategy, and developing international norms, calling out bad actors, establishing a credible deterrent, and imposing consequences are important parts of it. The State Department blacklists thirty-three Russian bad actors. GCHQ is standing up a 4000-person cyber operations group to counter Russian activity. A cryptocurrency heist in Tokyo. Hacking Senatorial Gmail. And some notes on crime and punishment.  Emily Wilson from Terbium Labs on Dark Web exit scamming. Guest is Tanya Janca from Microsoft on her OWASP DevSlop project.
 Extended interview with Tanya Janca -  https://www.patreon.com/posts/21559930   OWASP DevSlop show on Twitch -  https://www.twitch.tv/videos/307974412 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_09_21.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about the US national cyber security strategy, and developing international norms, calling out bad actors, establishing a credible deterrent, and imposing consequences are important parts of it. The State Department blacklists thirty-three Russian bad actors. GCHQ is standing up a 4000-person cyber operations group to counter Russian activity. A cryptocurrency heist in Tokyo. Hacking Senatorial Gmail. And some notes on crime and punishment.  Emily Wilson from Terbium Labs on Dark Web exit scamming. Guest is Tanya Janca from Microsoft on her OWASP DevSlop project.</p> <p>Extended interview with Tanya Janca - <br> <a href="https://www.patreon.com/posts/21559930">https://www.patreon.com/posts/21559930</a><br>  <br> OWASP DevSlop show on Twitch - <br> <a href="https://www.twitch.tv/videos/307974412">https://www.twitch.tv/videos/307974412</a><br> </p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_09_21.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1580</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e6d7b52be4f54f5d803c34f50313d608]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4051083767.mp3?updated=1608755202" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Magecart is back. Bad apps booted from Google Play. OilRig taken seriously. Election influence operations. Sending in the National Guard. ICO fines Equifax for last year's breach.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/688/notes</link>
      <description>In today's podcast, we hear that Magecart has hit a Philippine media conglomerate. Bogus (and malicious) financial apps are ejected from Google Play. Gulf states are taking warnings about Iran's OilRig seriously. A cloud hosting service serves up phish. Taiwan believes China is preparing to meddle in its elections. Facebook sets up an anti-disinformation war room. Nebraska sends in the National Guard. The UK ICO fines Equifax for last year's breach. Craig Williams from Cisco Talos on distinguishing between features and bugs with regards to security. Guest is Roela Santos from Engility, describing the CyberWarrior scholarship for veterans.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_20.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 20 Sep 2018 19:32:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>688</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8ad9a1d6-def8-11ea-911f-733135275070/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Magecart is back. Bad apps booted from Google Play. OilRig taken seriously. Election influence operations. Sending in the National Guard. ICO fines Equifax for last year's breach.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Magecart has hit a Philippine media conglomerate. Bogus (and malicious) financial apps are ejected from Google Play. Gulf states are taking warnings about Iran's OilRig seriously. A cloud hosting service serves up phish. Taiwan believes China is preparing to meddle in its elections. Facebook sets up an anti-disinformation war room. Nebraska sends in the National Guard. The UK ICO fines Equifax for last year's breach. Craig Williams from Cisco Talos on distinguishing between features and bugs with regards to security. Guest is Roela Santos from Engility, describing the CyberWarrior scholarship for veterans.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_20.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Magecart has hit a Philippine media conglomerate. Bogus (and malicious) financial apps are ejected from Google Play. Gulf states are taking warnings about Iran's OilRig seriously. A cloud hosting service serves up phish. Taiwan believes China is preparing to meddle in its elections. Facebook sets up an anti-disinformation war room. Nebraska sends in the National Guard. The UK ICO fines Equifax for last year's breach. Craig Williams from Cisco Talos on distinguishing between features and bugs with regards to security. Guest is Roela Santos from Engility, describing the CyberWarrior scholarship for veterans.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_20.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1072</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[711f62c771544512ae4c8a009d0dbae4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8877573920.mp3?updated=1689952753" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>State Department cybersecurity issues. Iron Group's pseudoransomware. Bristol Airport's deliberate recovery. State of cryptojacking. Facebook offers campaigns help. US cyber strategy. Mirai masters.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/687/notes</link>
      <description>In this podcast, we hear that the US State Department has acknowledged an email breach. The criminal gang Iron Group is hitting targets with data-stealing and data destroying pseudoransomware. Bristol Airport continues its slow recovery from whatever hit a at the end of last week. A cryptomining study is out. Facebook offers help to political campaigns. The new US cyber strategy is out. ICOs get regulation. Mirai masters get suspended sentences in recognition for the help they've rendered the Government. Daniel Prince from Lancaster University with thoughts on asset-based risk assessment. Guest is Ray Watson from Masergy on soft targets.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_19.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 19 Sep 2018 19:53:24 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>687</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8aeeea8c-def8-11ea-911f-d7219e7bd3eb/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>State Department cybersecurity issues. Iron Group's pseudoransomware. Bristol Airport's deliberate recovery. State of cryptojacking. Facebook offers campaigns help. US cyber strategy. Mirai masters.</itunes:subtitle>
      <itunes:summary>In this podcast, we hear that the US State Department has acknowledged an email breach. The criminal gang Iron Group is hitting targets with data-stealing and data destroying pseudoransomware. Bristol Airport continues its slow recovery from whatever hit a at the end of last week. A cryptomining study is out. Facebook offers help to political campaigns. The new US cyber strategy is out. ICOs get regulation. Mirai masters get suspended sentences in recognition for the help they've rendered the Government. Daniel Prince from Lancaster University with thoughts on asset-based risk assessment. Guest is Ray Watson from Masergy on soft targets.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_19.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this podcast, we hear that the US State Department has acknowledged an email breach. The criminal gang Iron Group is hitting targets with data-stealing and data destroying pseudoransomware. Bristol Airport continues its slow recovery from whatever hit a at the end of last week. A cryptomining study is out. Facebook offers help to political campaigns. The new US cyber strategy is out. ICOs get regulation. Mirai masters get suspended sentences in recognition for the help they've rendered the Government. Daniel Prince from Lancaster University with thoughts on asset-based risk assessment. Guest is Ray Watson from Masergy on soft targets.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_19.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1281</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6d0dd59fa22e41378c047480d3c42813]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9183181004.mp3?updated=1689952741" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tracking Pegasus. OilRig spearphishing. IP theft from universities. Peekaboo bug in surveillance cameras. WannaMine won't be EternalBlue's last ride. Preventing data abuse.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/686/notes</link>
      <description>In today's podcast, we hear about a Citizen Lab report on the global use of Pegasus lawful intercept tools. OilRig seems to be spearphishing in Bahrain. University IP theft by Iran seems widespread, but it also doesn't look very lucrative. Peekaboo vulnerability affects security cameras. WannaMine is the latest campaign to exploit the stubborn EternalBlue vulnerability. Data firms work toward guidelines to prevent political data abuse. David Dufour from Webroot with a primer on quantum computing. Guest is Sam Bisbee from Threat Stack on public cloud breaches.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_18.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Sep 2018 20:10:25 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>686</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8aff663c-def8-11ea-911f-fb4957c87402/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Tracking Pegasus. OilRig spearphishing. IP theft from universities. Peekaboo bug in surveillance cameras. WannaMine won't be EternalBlue's last ride. Preventing data abuse.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about a Citizen Lab report on the global use of Pegasus lawful intercept tools. OilRig seems to be spearphishing in Bahrain. University IP theft by Iran seems widespread, but it also doesn't look very lucrative. Peekaboo vulnerability affects security cameras. WannaMine is the latest campaign to exploit the stubborn EternalBlue vulnerability. Data firms work toward guidelines to prevent political data abuse. David Dufour from Webroot with a primer on quantum computing. Guest is Sam Bisbee from Threat Stack on public cloud breaches.
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_18.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about a Citizen Lab report on the global use of Pegasus lawful intercept tools. OilRig seems to be spearphishing in Bahrain. University IP theft by Iran seems widespread, but it also doesn't look very lucrative. Peekaboo vulnerability affects security cameras. WannaMine is the latest campaign to exploit the stubborn EternalBlue vulnerability. Data firms work toward guidelines to prevent political data abuse. David Dufour from Webroot with a primer on quantum computing. Guest is Sam Bisbee from Threat Stack on public cloud breaches.</p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_18.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1257</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cd5963d546f24edf9fefa09a944ab2f5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6698975457.mp3?updated=1689952729" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware and cryptojacking are all the rage. Iran seeks IP, North Korea seeks a quick buck. More on EU content moderation. Alleged Russian hacking of WADA, Spiez Laboratory. Propaganda overreach?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/685/notes</link>
      <description>In today's podcast, we hear about the ransomware that's clogged systems at a UK airport. New variants of ransomware are out and about in the wild. EternalBlue continues to be used to install cryptojackers in vulnerable systems—the campaign is being called WannaMine. EU considers short deadlines and sharp penalties for failure to remove "extremist content" from the Internet. Russia suspected in WADA and Spiez Lab hacking. Did Moscow overreach with its latest Novichok disinformation effort? Malek Ben Salem from Accenture on encryption techniques that make use of DNA.
  For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_17.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 17 Sep 2018 19:43:15 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>685</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8b119744-def8-11ea-911f-df1231bca840/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ransomware and cryptojacking are all the rage. Iran seeks IP, North Korea seeks a quick buck. More on EU content moderation. Alleged Russian hacking of WADA, Spiez Laboratory. Propaganda overreach?</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about the ransomware that's clogged systems at a UK airport. New variants of ransomware are out and about in the wild. EternalBlue continues to be used to install cryptojackers in vulnerable systems—the campaign is being called WannaMine. EU considers short deadlines and sharp penalties for failure to remove "extremist content" from the Internet. Russia suspected in WADA and Spiez Lab hacking. Did Moscow overreach with its latest Novichok disinformation effort? Malek Ben Salem from Accenture on encryption techniques that make use of DNA.
  For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_17.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about the ransomware that's clogged systems at a UK airport. New variants of ransomware are out and about in the wild. EternalBlue continues to be used to install cryptojackers in vulnerable systems—the campaign is being called WannaMine. EU considers short deadlines and sharp penalties for failure to remove "extremist content" from the Internet. Russia suspected in WADA and Spiez Lab hacking. Did Moscow overreach with its latest Novichok disinformation effort? Malek Ben Salem from Accenture on encryption techniques that make use of DNA.</p> <p> For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_17.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1183</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dcdf362f5e6648ab9586b03fb6d0f3f6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1498415174.mp3?updated=1689952718" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Android device eavesdropping investigation. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/53/notes</link>
      <description> 
A team of researchers from Northeastern University and UC Santa Barbara examined over 17,000 Android apps, and revealed a number of alarming privacy risks. 
Elleen Pan and Christo Wilson were members of the research team, and they join us to share what they found. 
The research is titled Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications. It can be found here:
https://recon.meddle.mobi/papers/panoptispy18pets.pdf
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 15 Sep 2018 10:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>53</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ced94ea2-df0e-11ea-b61d-abd9395aa9d6/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Android device eavesdropping investigation.</itunes:subtitle>
      <itunes:summary> 
A team of researchers from Northeastern University and UC Santa Barbara examined over 17,000 Android apps, and revealed a number of alarming privacy risks. 
Elleen Pan and Christo Wilson were members of the research team, and they join us to share what they found. 
The research is titled Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications. It can be found here:
https://recon.meddle.mobi/papers/panoptispy18pets.pdf
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>A team of researchers from Northeastern University and UC Santa Barbara examined over 17,000 Android apps, and revealed a number of alarming privacy risks. </p><p>Elleen Pan and Christo Wilson were members of the research team, and they join us to share what they found. </p><p>The research is titled Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications. It can be found here:</p><p>https://recon.meddle.mobi/papers/panoptispy18pets.pdf</p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1208</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[33ca416ec16243eab5212d8a6d8f50d5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5926409585.mp3?updated=1685022583" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Magecart continues its way. Evil cursor attacks. Seasonal trends in Trojans. More Novichok disinformation. Pyongyand denounces a "smear campaign." Wait and see on pipeline fires.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/684/notes</link>
      <description>In today's podcast we hear that Magecart has achieved another library infestation as Feedify is hit. An evil cursor attack is a variant of a familiar tech support scam. The Ramnit banking Trojan seems to be spiking during the summer, and there are various theories as to why this might be so. More Novichok disinformation is out. Safari url spoofing seems more nuisance than serious menace. North Korea denounces the US for a "smear campaign" against the Lazarus Group, which doesn’t exist, either. Joe Carrigan from JHU ISI shares his frustrations with his bank’s insufficient password practices. Guest is Ron Gula, former CEO and co-founder of Tenable Network Security, currently President at Gula Tech Adventures which focuses on investing and advisement of two dozen cyber-security companies.
  For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_14.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 14 Sep 2018 19:58:12 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>684</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8b2368b6-def8-11ea-911f-2f269e9dab9f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Magecart continues its way. Evil cursor attacks. Seasonal trends in Trojans. More Novichok disinformation. Pyongyand denounces a "smear campaign." Wait and see on pipeline fires.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Magecart has achieved another library infestation as Feedify is hit. An evil cursor attack is a variant of a familiar tech support scam. The Ramnit banking Trojan seems to be spiking during the summer, and there are various theories as to why this might be so. More Novichok disinformation is out. Safari url spoofing seems more nuisance than serious menace. North Korea denounces the US for a "smear campaign" against the Lazarus Group, which doesn’t exist, either. Joe Carrigan from JHU ISI shares his frustrations with his bank’s insufficient password practices. Guest is Ron Gula, former CEO and co-founder of Tenable Network Security, currently President at Gula Tech Adventures which focuses on investing and advisement of two dozen cyber-security companies.
  For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_14.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Magecart has achieved another library infestation as Feedify is hit. An evil cursor attack is a variant of a familiar tech support scam. The Ramnit banking Trojan seems to be spiking during the summer, and there are various theories as to why this might be so. More Novichok disinformation is out. Safari url spoofing seems more nuisance than serious menace. North Korea denounces the US for a "smear campaign" against the Lazarus Group, which doesn’t exist, either. Joe Carrigan from JHU ISI shares his frustrations with his bank’s insufficient password practices. Guest is Ron Gula, former CEO and co-founder of Tenable Network Security, currently President at Gula Tech Adventures which focuses on investing and advisement of two dozen cyber-security companies.</p> <p> For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_14.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1538</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9db4b39f99d64ed4821c03e56b71fe6d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5812644134.mp3?updated=1608755183" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Domestic Kitten spyware. Crypto wallet shenanigans. Firmware issues enable cold boot attacks. BlueBorne bugs are still out and about. Tech support scams. Election security. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/683/notes</link>
      <description>In today's podcast we hear that an Iranian domestic spyware campaign has been reported: it's most interested in ethnic Kurds. A bogus cryptocurrency wallet site is taken down. F-Secure warns of a widespread firmware problem that could be exploited for cold boot attacks. The BlueBorne Bluetooth bugs are apparently still out there. Tech support scam ads are taken down. Policies for election security continue to evolve. And Facebook's founder offers some thoughts on how his platform can save democracy. Ben Yelin from UMD CHHS with analysis of a Florida court decision on the use of cell site simulators. Guest is Josh Mayfield from Absolute Software with tips on cyber hygiene. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_13.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 13 Sep 2018 19:42:54 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>683</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8b3b6772-def8-11ea-911f-abeee61f939e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Domestic Kitten spyware. Crypto wallet shenanigans. Firmware issues enable cold boot attacks. BlueBorne bugs are still out and about. Tech support scams. Election security. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that an Iranian domestic spyware campaign has been reported: it's most interested in ethnic Kurds. A bogus cryptocurrency wallet site is taken down. F-Secure warns of a widespread firmware problem that could be exploited for cold boot attacks. The BlueBorne Bluetooth bugs are apparently still out there. Tech support scam ads are taken down. Policies for election security continue to evolve. And Facebook's founder offers some thoughts on how his platform can save democracy. Ben Yelin from UMD CHHS with analysis of a Florida court decision on the use of cell site simulators. Guest is Josh Mayfield from Absolute Software with tips on cyber hygiene. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_13.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that an Iranian domestic spyware campaign has been reported: it's most interested in ethnic Kurds. A bogus cryptocurrency wallet site is taken down. F-Secure warns of a widespread firmware problem that could be exploited for cold boot attacks. The BlueBorne Bluetooth bugs are apparently still out there. Tech support scam ads are taken down. Policies for election security continue to evolve. And Facebook's founder offers some thoughts on how his platform can save democracy. Ben Yelin from UMD CHHS with analysis of a Florida court decision on the use of cell site simulators. Guest is Josh Mayfield from Absolute Software with tips on cyber hygiene. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_13.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1279</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d8bad117082d4299be76ebe9566ded89]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3376125145.mp3?updated=1689952684" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Executive Order mandates election interference sanctions. British Airways regulatory exposure. Patch Tuesday notes. EU passes copyright law. Russia says no to Novichok. WhatsApp scam. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/682/notes</link>
      <description>In our podcast we hear that a US Executive Order issued today will impose sanctions on foreign actors following a determination that there's been an attempt at election meddling. The Executive Order covers both hacking and propaganda. British Airways may receive a heavy fine under GDPR for its recent breach. The EU passes controversial copyright legislation. Russia says the accused Novichok hitmen didn't do nothin'. And watch out for Olivia on WhatsApp—she's not what she at first seems to be. Jonathan Katz from the University of Maryland, with a cryptocurrency bug story from the MIT media lab. Guest is Robert Block from SecureAuth + CoreSecurity, with best practices for securing Office 365. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_12.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 12 Sep 2018 20:11:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>682</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8b49911c-def8-11ea-911f-ff623a01e219/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Executive Order mandates election interference sanctions. British Airways regulatory exposure. Patch Tuesday notes. EU passes copyright law. Russia says no to Novichok. WhatsApp scam. </itunes:subtitle>
      <itunes:summary>In our podcast we hear that a US Executive Order issued today will impose sanctions on foreign actors following a determination that there's been an attempt at election meddling. The Executive Order covers both hacking and propaganda. British Airways may receive a heavy fine under GDPR for its recent breach. The EU passes controversial copyright legislation. Russia says the accused Novichok hitmen didn't do nothin'. And watch out for Olivia on WhatsApp—she's not what she at first seems to be. Jonathan Katz from the University of Maryland, with a cryptocurrency bug story from the MIT media lab. Guest is Robert Block from SecureAuth + CoreSecurity, with best practices for securing Office 365. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_12.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In our podcast we hear that a US Executive Order issued today will impose sanctions on foreign actors following a determination that there's been an attempt at election meddling. The Executive Order covers both hacking and propaganda. British Airways may receive a heavy fine under GDPR for its recent breach. The EU passes controversial copyright legislation. Russia says the accused Novichok hitmen didn't do nothin'. And watch out for Olivia on WhatsApp—she's not what she at first seems to be. Jonathan Katz from the University of Maryland, with a cryptocurrency bug story from the MIT media lab. Guest is Robert Block from SecureAuth + CoreSecurity, with best practices for securing Office 365. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_12.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1268</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01e6c21c9c994b1dba72c41eab8e00c6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2687848900.mp3?updated=1689952598" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trend Micro answers spying allegations. Magecart blamed for British Airways breach. Tor Browser exploit disclosed. Google vs. the right to be forgotten. Accused JPMorgan hacker extradited.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/681/notes</link>
      <description>In today's podcast, we hear that Trend Micro has clarified what was up with allegations it was deploying spyware with its tools—no spyware, but they've changed their products to remove the appearance of impropriety. RiskIQ fingers the Magecart gang as the hoods behind the British Airways data breach. Exploit broker Zerodium discloses a no-longer profitable Tor Browser vulnerability. Google will challenge the EU's right-to-be-forgotten in court this week. An extradition in the JPMorgan hack. Justin Harvey from Accenture with tips on building an effective incident response plan. Guest is Colin McKinty from BAE systems, discussing the launch of The Intelligence Network, a collaborative task force developed in partnership with Vodafone and Surrey University, to engage, unite and activate the global security community in the fight against cybercrime. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_11.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Sep 2018 19:42:24 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>681</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8b5fc040-def8-11ea-911f-370cb1c006bb/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Trend Micro answers spying allegations. Magecart blamed for British Airways breach. Tor Browser exploit disclosed. Google vs. the right to be forgotten. Accused JPMorgan hacker extradited.  </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Trend Micro has clarified what was up with allegations it was deploying spyware with its tools—no spyware, but they've changed their products to remove the appearance of impropriety. RiskIQ fingers the Magecart gang as the hoods behind the British Airways data breach. Exploit broker Zerodium discloses a no-longer profitable Tor Browser vulnerability. Google will challenge the EU's right-to-be-forgotten in court this week. An extradition in the JPMorgan hack. Justin Harvey from Accenture with tips on building an effective incident response plan. Guest is Colin McKinty from BAE systems, discussing the launch of The Intelligence Network, a collaborative task force developed in partnership with Vodafone and Surrey University, to engage, unite and activate the global security community in the fight against cybercrime. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_11.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Trend Micro has clarified what was up with allegations it was deploying spyware with its tools—no spyware, but they've changed their products to remove the appearance of impropriety. RiskIQ fingers the Magecart gang as the hoods behind the British Airways data breach. Exploit broker Zerodium discloses a no-longer profitable Tor Browser vulnerability. Google will challenge the EU's right-to-be-forgotten in court this week. An extradition in the JPMorgan hack. Justin Harvey from Accenture with tips on building an effective incident response plan. Guest is Colin McKinty from BAE systems, discussing the launch of The Intelligence Network, a collaborative task force developed in partnership with Vodafone and Surrey University, to engage, unite and activate the global security community in the fight against cybercrime. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_11.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1270</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[80d9ff60dbf346f585c05266f2031fc4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7812666175.mp3?updated=1689952584" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Elections and information operations, but not necessarily the elections you expect. Apple purges dodgy security apps. Who are the Silence criminals? BA's breach. Cyber moonshots. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/680/notes</link>
      <description>In today's podcast, we hear about foreign information operations surrounding elections in Israel and Sweden. Domestic information operations surround local elections in Russia. Apple purges questionable security apps from its store. Are the Silence cyber criminals security industry veterans? British Airways continues to recover from its data breach. What a "cyber moonshot" might actually mean. And ProtonMail says the coppers have collared an Apophis Squad member. Zulfikar Ramzan from RSA with a reality check on blockchain hype . Guest is Yehuda Lindell from Unbound Tech on the Foreshadow vulnerability. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_10.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 10 Sep 2018 18:55:15 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>680</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8b7e9a10-def8-11ea-911f-2370b12cb344/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Elections and information operations, but not necessarily the elections you expect. Apple purges dodgy security apps. Who are the Silence criminals? BA's breach. Cyber moonshots. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about foreign information operations surrounding elections in Israel and Sweden. Domestic information operations surround local elections in Russia. Apple purges questionable security apps from its store. Are the Silence cyber criminals security industry veterans? British Airways continues to recover from its data breach. What a "cyber moonshot" might actually mean. And ProtonMail says the coppers have collared an Apophis Squad member. Zulfikar Ramzan from RSA with a reality check on blockchain hype . Guest is Yehuda Lindell from Unbound Tech on the Foreshadow vulnerability. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_10.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about foreign information operations surrounding elections in Israel and Sweden. Domestic information operations surround local elections in Russia. Apple purges questionable security apps from its store. Are the Silence cyber criminals security industry veterans? British Airways continues to recover from its data breach. What a "cyber moonshot" might actually mean. And ProtonMail says the coppers have collared an Apophis Squad member. Zulfikar Ramzan from RSA with a reality check on blockchain hype . Guest is Yehuda Lindell from Unbound Tech on the Foreshadow vulnerability. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_10.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1199</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[242bc69fac6249af8386578fc3ee57c2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2561473024.mp3?updated=1689952575" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leafminer espionage digs the Middle East. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/52/notes</link>
      <description>Researchers at Symantec recently published their findings on an active attack group named Leafminer that's targeting government organizations and businesses in the Middle East region. 
Vikram Thakur is a technical director at Symantec, and he joins us to share what they've found.
The research can be found here:
https://www.symantec.com/blogs/threat-intelligence/leafminer-espionage-middle-east
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 08 Sep 2018 10:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>52</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cd8953a8-df0e-11ea-9c25-578e7252645d/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Leafminer espionage digs the Middle East.</itunes:subtitle>
      <itunes:summary>Researchers at Symantec recently published their findings on an active attack group named Leafminer that's targeting government organizations and businesses in the Middle East region. 
Vikram Thakur is a technical director at Symantec, and he joins us to share what they've found.
The research can be found here:
https://www.symantec.com/blogs/threat-intelligence/leafminer-espionage-middle-east
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Symantec recently published their findings on an active attack group named Leafminer that's targeting government organizations and businesses in the Middle East region. </p><p>Vikram Thakur is a technical director at Symantec, and he joins us to share what they've found.</p><p>The research can be found here:</p><p>https://www.symantec.com/blogs/threat-intelligence/leafminer-espionage-middle-east</p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1500</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[56aba6ce46834bccac65cf49a8193b4e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2808130795.mp3?updated=1685022572" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russia does the info ops dance. An indictment of a Lazarus Groupie. FOIA shares too much. British Airways breaches. Silence makes some noise. Notes from the Billington Cybersecurity Summit. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/679/notes</link>
      <description>In today's podcast we hear that Russia says it had nothing to do with the Salisbury nerve agent attacks, but no one really seems to be buying the denial. The US indicts a North Korean hacker in matters pertaining to the Lazarus Group. FOIA.gov overshares. British Airways sustains a data breach. The "Silence" gang makes some noise in the underworld. Notes from yesterday's Billington Cybersecurity Summit. And Twitter bans a grandstander…for life. Dr. Charles Clancy from VA Tech’s Hume Center describes the Virginia Commonwealth Cyber Initiative. Guest is Rich Baich, CISO at Wells Fargo with insights on protecting a major financial institution. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 07 Sep 2018 19:29:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>679</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8ba23e3e-def8-11ea-911f-236756e60850/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Russia does the info ops dance. An indictment of a Lazarus Groupie. FOIA shares too much. British Airways breaches. Silence makes some noise. Notes from the Billington Cybersecurity Summit. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Russia says it had nothing to do with the Salisbury nerve agent attacks, but no one really seems to be buying the denial. The US indicts a North Korean hacker in matters pertaining to the Lazarus Group. FOIA.gov overshares. British Airways sustains a data breach. The "Silence" gang makes some noise in the underworld. Notes from yesterday's Billington Cybersecurity Summit. And Twitter bans a grandstander…for life. Dr. Charles Clancy from VA Tech’s Hume Center describes the Virginia Commonwealth Cyber Initiative. Guest is Rich Baich, CISO at Wells Fargo with insights on protecting a major financial institution. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Russia says it had nothing to do with the Salisbury nerve agent attacks, but no one really seems to be buying the denial. The US indicts a North Korean hacker in matters pertaining to the Lazarus Group. FOIA.gov overshares. British Airways sustains a data breach. The "Silence" gang makes some noise in the underworld. Notes from yesterday's Billington Cybersecurity Summit. And Twitter bans a grandstander…for life. Dr. Charles Clancy from VA Tech’s Hume Center describes the Virginia Commonwealth Cyber Initiative. Guest is Rich Baich, CISO at Wells Fargo with insights on protecting a major financial institution. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1520</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3711e31959e948ddb0c9b5691512c573]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5727273012.mp3?updated=1608755183" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberwar looms between Russia and the UK. Twitter and Facebook complete testimony, but inquiries continue. Unpatched MikroTik routers exploited. OilRig's new tricks. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/678/notes</link>
      <description>In today's podcast, we hear that the Novichok attacks have brought Britain and Russia to the brink of cyberwar. The UK will take its case to the UN Security Council. Twitter and Facebook have completed their testimony on Capitol Hill, but investigation of tech's role in influence operations and public discourse continue. So do concerns about election security. Unpatched MikroTik routers are being exploited in the wild. OilRig shows some new tricks.  Joe Carrigan from JHU ISI on biometric scanners tagging travelers at the border. Guest is Robert Anderson from the Chertoff Group with insights on the encryption debate. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_06.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 06 Sep 2018 18:28:38 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>678</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8bb9164a-def8-11ea-911f-9ff310b5cb62/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyberwar looms between Russia and the UK. Twitter and Facebook complete testimony, but inquiries continue. Unpatched MikroTik routers exploited. OilRig's new tricks. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the Novichok attacks have brought Britain and Russia to the brink of cyberwar. The UK will take its case to the UN Security Council. Twitter and Facebook have completed their testimony on Capitol Hill, but investigation of tech's role in influence operations and public discourse continue. So do concerns about election security. Unpatched MikroTik routers are being exploited in the wild. OilRig shows some new tricks.  Joe Carrigan from JHU ISI on biometric scanners tagging travelers at the border. Guest is Robert Anderson from the Chertoff Group with insights on the encryption debate. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_06.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the Novichok attacks have brought Britain and Russia to the brink of cyberwar. The UK will take its case to the UN Security Council. Twitter and Facebook have completed their testimony on Capitol Hill, but investigation of tech's role in influence operations and public discourse continue. So do concerns about election security. Unpatched MikroTik routers are being exploited in the wild. OilRig shows some new tricks.  Joe Carrigan from JHU ISI on biometric scanners tagging travelers at the border. Guest is Robert Anderson from the Chertoff Group with insights on the encryption debate. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_06.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1247</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0a6614c78e6f40ecbd94dd9cf219c484]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2458051025.mp3?updated=1689952547" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Sleeper malware. Hakai botnet spreads. SamSam is still with us. US DNI warns of election threats. Congressional panels interrogate Facebook and Twitter, but not Google. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/677/notes</link>
      <description>In today's podcast, we hear that German security authorities warn about the possibility of sleeper sabotage malware. A botnet to rival Satori, this one called Hakai, continues to spread to new classes of router. SamSam ransomware remains dishearteningly successful. The US Director of National Intelligence warns against foreign influence in elections. Facebook's former security chief says the midterms could be the World Cup of information Warfare. Silicon Valley comes to Capitol Hill, but without Google. Craig Williams from Talos at Cisco with an update on the Remcos RAT. Guest is Robert Holmes from Proofpoint on the DHS’s Binding Operational Directive (BOD) 18-01 mandate to secure their email systems. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_05.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 05 Sep 2018 19:40:17 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>677</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8bcd0b14-def8-11ea-911f-fbbc64fc4000/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Sleeper malware. Hakai botnet spreads. SamSam is still with us. US DNI warns of election threats. Congressional panels interrogate Facebook and Twitter, but not Google. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that German security authorities warn about the possibility of sleeper sabotage malware. A botnet to rival Satori, this one called Hakai, continues to spread to new classes of router. SamSam ransomware remains dishearteningly successful. The US Director of National Intelligence warns against foreign influence in elections. Facebook's former security chief says the midterms could be the World Cup of information Warfare. Silicon Valley comes to Capitol Hill, but without Google. Craig Williams from Talos at Cisco with an update on the Remcos RAT. Guest is Robert Holmes from Proofpoint on the DHS’s Binding Operational Directive (BOD) 18-01 mandate to secure their email systems. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_05.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that German security authorities warn about the possibility of sleeper sabotage malware. A botnet to rival Satori, this one called Hakai, continues to spread to new classes of router. SamSam ransomware remains dishearteningly successful. The US Director of National Intelligence warns against foreign influence in elections. Facebook's former security chief says the midterms could be the World Cup of information Warfare. Silicon Valley comes to Capitol Hill, but without Google. Craig Williams from Talos at Cisco with an update on the Remcos RAT. Guest is Robert Holmes from Proofpoint on the DHS’s Binding Operational Directive (BOD) 18-01 mandate to secure their email systems. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_05.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1291</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e61f9b10cb264ea784230ed065dadc23]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9701352676.mp3?updated=1689952533" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tracking Stone Panda to the Tianjin Bureau. Ad-fraud and Tokelau. RansomWarrior decrypted. US Congress to grill Facebook, Google, and Twitter. Celebrity scams. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/676/notes</link>
      <description>In today's podcast, we hear that Intrusion Truth seems to have Stone Panda dead to rights. Chinese intelligence increases targeting of expatriate Uyghurs. Zscaler warns that an ad-fraud campaign is making use of the Tokelau top-level domain. Check Point has a decryptor for RansomWarrior. The US House and Senate will hear from Facebook, Twitter, and Google this week about influence operations, content moderation, and alleged monopolistic practices. And no, Pope Francis isn't giving away Bitcoin, nor did former President Obama encrypt your files. Emily Wilson from Terbium Labs with a look back at the effects of last year’s Alpha Bay takedown.  
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_04.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Sep 2018 20:11:39 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>676</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8bdf3d34-def8-11ea-911f-c7f14cacf7ed/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Tracking Stone Panda to the Tianjin Bureau. Ad-fraud and Tokelau. RansomWarrior decrypted. US Congress to grill Facebook, Google, and Twitter. Celebrity scams. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Intrusion Truth seems to have Stone Panda dead to rights. Chinese intelligence increases targeting of expatriate Uyghurs. Zscaler warns that an ad-fraud campaign is making use of the Tokelau top-level domain. Check Point has a decryptor for RansomWarrior. The US House and Senate will hear from Facebook, Twitter, and Google this week about influence operations, content moderation, and alleged monopolistic practices. And no, Pope Francis isn't giving away Bitcoin, nor did former President Obama encrypt your files. Emily Wilson from Terbium Labs with a look back at the effects of last year’s Alpha Bay takedown.  
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_04.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Intrusion Truth seems to have Stone Panda dead to rights. Chinese intelligence increases targeting of expatriate Uyghurs. Zscaler warns that an ad-fraud campaign is making use of the Tokelau top-level domain. Check Point has a decryptor for RansomWarrior. The US House and Senate will hear from Facebook, Twitter, and Google this week about influence operations, content moderation, and alleged monopolistic practices. And no, Pope Francis isn't giving away Bitcoin, nor did former President Obama encrypt your files. Emily Wilson from Terbium Labs with a look back at the effects of last year’s Alpha Bay takedown.  </p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/September/CyberWire_2018_09_04.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>965</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6b708b4c45bf4df49047dfeb4275d326]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8536734115.mp3?updated=1689952518" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ATM hacks on the rise. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/51/notes</link>
      <description>Threat researcher Marcelle Lee from LookingGlass Cyber Solutions joins us to share her research on the growing threat of ATM hacks in the U.S. 
The research can be found here:
https://www.lookingglasscyber.com/blog/atm-hacking-you-dont-have-to-pay-to-play/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 01 Sep 2018 10:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>51</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cc286742-df0e-11ea-8fd0-1fe5b97dd54a/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>ATM hacks on the rise.</itunes:subtitle>
      <itunes:summary>Threat researcher Marcelle Lee from LookingGlass Cyber Solutions joins us to share her research on the growing threat of ATM hacks in the U.S. 
The research can be found here:
https://www.lookingglasscyber.com/blog/atm-hacking-you-dont-have-to-pay-to-play/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Threat researcher Marcelle Lee from LookingGlass Cyber Solutions joins us to share her research on the growing threat of ATM hacks in the U.S. </p><p>The research can be found here:</p><p>https://www.lookingglasscyber.com/blog/atm-hacking-you-dont-have-to-pay-to-play/</p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1522</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[77a0b29925074a2a87ce18f382d00185]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1573100128.mp3?updated=1685022578" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Recruiting spies via LinkedIn. WindShift in the Gulf. GlobeImposter ransomware. Blocking Telegram is harder than it looks. Policy notes from the Five Eyes. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/675/notes</link>
      <description>In today's podcast we hear that the US Intelligence Community says that China is actively trying to recruit spies over LinkedIn. Britain and Germany had earlier issued similar warnings. WindShift espionage group is active in the Gulf. GlobeImposter ransomware continues its evolution and spread. The Five Eyes issue some communiques about cooperation in cyberspace. Russia would like to block Telegram if it could do so without too much collateral traffic damage. Supply chain questions about Google's Titan. Johannes Ullrich from SANS and the ICS Stormcast podcast, with iPhone unlocking techniques. Guest is Andy Greenberg from WIRED discussing his recent article on NotPetya. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_31.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 31 Aug 2018 19:43:08 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>675</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8bf167f2-def8-11ea-911f-03b786dde793/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Recruiting spies via LinkedIn. WindShift in the Gulf. GlobeImposter ransomware. Blocking Telegram is harder than it looks. Policy notes from the Five Eyes. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that the US Intelligence Community says that China is actively trying to recruit spies over LinkedIn. Britain and Germany had earlier issued similar warnings. WindShift espionage group is active in the Gulf. GlobeImposter ransomware continues its evolution and spread. The Five Eyes issue some communiques about cooperation in cyberspace. Russia would like to block Telegram if it could do so without too much collateral traffic damage. Supply chain questions about Google's Titan. Johannes Ullrich from SANS and the ICS Stormcast podcast, with iPhone unlocking techniques. Guest is Andy Greenberg from WIRED discussing his recent article on NotPetya. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_31.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that the US Intelligence Community says that China is actively trying to recruit spies over LinkedIn. Britain and Germany had earlier issued similar warnings. WindShift espionage group is active in the Gulf. GlobeImposter ransomware continues its evolution and spread. The Five Eyes issue some communiques about cooperation in cyberspace. Russia would like to block Telegram if it could do so without too much collateral traffic damage. Supply chain questions about Google's Titan. Johannes Ullrich from SANS and the ICS Stormcast podcast, with iPhone unlocking techniques. Guest is Andy Greenberg from WIRED discussing his recent article on NotPetya. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_31.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1563</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[64e8b0b7f423460699f764e80fc64b4a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6868527415.mp3?updated=1608755201" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Twitter bots in Swedish politics. A different approach to influence operations. Hotel guest PII for sale. Medical device vulnerabilities. Charges in the case of the Satori botnet. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/674/notes</link>
      <description>In today's podcast, we hear that Twitter bots have shown up in Sweden's political discourse. Not so much Chinese hacking for influence: Beijing seems to prefer funding sympathetic cultural and research centers. 130 million hotel guests have their PII offered for sale on the dark web. Medical device vulnerabilities are disclosed, and hospitals are urged to patch. Nexus Zeta faces charges in a US Federal Court, apparently in connection with the Satori botnet. Mike Benjamin from CenturyLink with an update on the Necurs botnet. Guest is Gilad Peleg from SecBI on the challenges of secure BYOD policies. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_30.html
 1
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 30 Aug 2018 19:22:49 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>674</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8c11acd8-def8-11ea-911f-177a2bcb831c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Twitter bots in Swedish politics. A different approach to influence operations. Hotel guest PII for sale. Medical device vulnerabilities. Charges in the case of the Satori botnet. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Twitter bots have shown up in Sweden's political discourse. Not so much Chinese hacking for influence: Beijing seems to prefer funding sympathetic cultural and research centers. 130 million hotel guests have their PII offered for sale on the dark web. Medical device vulnerabilities are disclosed, and hospitals are urged to patch. Nexus Zeta faces charges in a US Federal Court, apparently in connection with the Satori botnet. Mike Benjamin from CenturyLink with an update on the Necurs botnet. Guest is Gilad Peleg from SecBI on the challenges of secure BYOD policies. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_30.html
 1
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Twitter bots have shown up in Sweden's political discourse. Not so much Chinese hacking for influence: Beijing seems to prefer funding sympathetic cultural and research centers. 130 million hotel guests have their PII offered for sale on the dark web. Medical device vulnerabilities are disclosed, and hospitals are urged to patch. Nexus Zeta faces charges in a US Federal Court, apparently in connection with the Satori botnet. Mike Benjamin from CenturyLink with an update on the Necurs botnet. Guest is Gilad Peleg from SecBI on the challenges of secure BYOD policies. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_30.html</p> <p>1</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1096</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f5e9e00b9b3140e2ae105205066c75b9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7033948921.mp3?updated=1689952489" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unpatched Apache Struts installations being exploited in the wild. Windows local privilege escalation flaw. Similarities among spyware. Stalkerware hack. Criminal threats to the grid. Breaches. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/673/notes</link>
      <description>In today's podcast we hear that the Apache Struts vulnerability, patched last week, is being actively exploited by cryptojackers. Microsoft works on a fix for local privilege escalation flaw in Windows. Trend Micro sees similarities among Urpage, Confucius, Patchwork, and Bahamut campaigns. Air Canada suffers a breach. Criminal threats to power grids. And searching for search engine optimization in all the wrong places. Jonathan Katz from UMD on flaws in Intel processors’ secure enclave. Guest is Fred Kneip from CyberGRX on third party risk. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_29.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 29 Aug 2018 19:15:08 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>673</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8c233d5e-def8-11ea-911f-3f265d72a685/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Unpatched Apache Struts installations being exploited in the wild. Windows local privilege escalation flaw. Similarities among spyware. Stalkerware hack. Criminal threats to the grid. Breaches. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that the Apache Struts vulnerability, patched last week, is being actively exploited by cryptojackers. Microsoft works on a fix for local privilege escalation flaw in Windows. Trend Micro sees similarities among Urpage, Confucius, Patchwork, and Bahamut campaigns. Air Canada suffers a breach. Criminal threats to power grids. And searching for search engine optimization in all the wrong places. Jonathan Katz from UMD on flaws in Intel processors’ secure enclave. Guest is Fred Kneip from CyberGRX on third party risk. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_29.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that the Apache Struts vulnerability, patched last week, is being actively exploited by cryptojackers. Microsoft works on a fix for local privilege escalation flaw in Windows. Trend Micro sees similarities among Urpage, Confucius, Patchwork, and Bahamut campaigns. Air Canada suffers a breach. Criminal threats to power grids. And searching for search engine optimization in all the wrong places. Jonathan Katz from UMD on flaws in Intel processors’ secure enclave. Guest is Fred Kneip from CyberGRX on third party risk. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_29.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1244</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a9e37519ab374027867292751ef3605f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3651661202.mp3?updated=1689952478" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Social media struggle with their social role. Election hacking concerns remain high. Australia's new government shuffles cybersecurity responsibilities. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/672/notes</link>
      <description>In today's podcast, we hear that Twitter has suspended more accounts for "divisive social commentary" and "coordinated manipulation." Facebook blocks accounts belonging to Myanmar leaders over Rohingya persecution. US Senators are unconvinced by claims that it's dangerous to research voting-machine vulnerabilities. The House takes a look at the CVE database. Australia's new government reorganizes its cybersecurity portfolio. Justin Harvey from Accenture with details from their mid-year cyber threatscape report. Guest is Sean Tierney from Infoblox with their shadow IoT report. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_28.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Aug 2018 19:42:32 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>672</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8c393884-def8-11ea-911f-738e52d0a219/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Social media struggle with their social role. Election hacking concerns remain high. Australia's new government shuffles cybersecurity responsibilities. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Twitter has suspended more accounts for "divisive social commentary" and "coordinated manipulation." Facebook blocks accounts belonging to Myanmar leaders over Rohingya persecution. US Senators are unconvinced by claims that it's dangerous to research voting-machine vulnerabilities. The House takes a look at the CVE database. Australia's new government reorganizes its cybersecurity portfolio. Justin Harvey from Accenture with details from their mid-year cyber threatscape report. Guest is Sean Tierney from Infoblox with their shadow IoT report. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_28.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Twitter has suspended more accounts for "divisive social commentary" and "coordinated manipulation." Facebook blocks accounts belonging to Myanmar leaders over Rohingya persecution. US Senators are unconvinced by claims that it's dangerous to research voting-machine vulnerabilities. The House takes a look at the CVE database. Australia's new government reorganizes its cybersecurity portfolio. Justin Harvey from Accenture with details from their mid-year cyber threatscape report. Guest is Sean Tierney from Infoblox with their shadow IoT report. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_28.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1227</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[09967b5ad8f440d4b29c03283cc8d69e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9640199479.mp3?updated=1689951925" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Moscow HUMINT drought? Spying on the Patriarch. Ottoman hacktivism. Iranian information operations. ISIS in cyberspace. RtPOS malware discovered. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/671/notes</link>
      <description>In today's podcast, we discuss reports that suggest US HUMINT collection in Russia has dried up. Russian intelligence services are showing an interest in disrupting a grant of autonomy to the Ukrainian Orthodox Church by the Ecumenical Patriarch. Turkish hacktivism shows up in the US, as journalists' social media accounts are hijacked. A look at Iranian information operations. ISIS limps back into cyberspace. A new point-of-sale malware family is discovered. David Dufour from Webroot on the role of engineers in securing an organization. 
  For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_27.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 27 Aug 2018 19:48:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>671</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8c4f0ef2-def8-11ea-911f-5b7df47002e1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Moscow HUMINT drought? Spying on the Patriarch. Ottoman hacktivism. Iranian information operations. ISIS in cyberspace. RtPOS malware discovered. </itunes:subtitle>
      <itunes:summary>In today's podcast, we discuss reports that suggest US HUMINT collection in Russia has dried up. Russian intelligence services are showing an interest in disrupting a grant of autonomy to the Ukrainian Orthodox Church by the Ecumenical Patriarch. Turkish hacktivism shows up in the US, as journalists' social media accounts are hijacked. A look at Iranian information operations. ISIS limps back into cyberspace. A new point-of-sale malware family is discovered. David Dufour from Webroot on the role of engineers in securing an organization. 
  For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_27.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we discuss reports that suggest US HUMINT collection in Russia has dried up. Russian intelligence services are showing an interest in disrupting a grant of autonomy to the Ukrainian Orthodox Church by the Ecumenical Patriarch. Turkish hacktivism shows up in the US, as journalists' social media accounts are hijacked. A look at Iranian information operations. ISIS limps back into cyberspace. A new point-of-sale malware family is discovered. David Dufour from Webroot on the role of engineers in securing an organization. </p> <p> For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_27.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1001</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[844d03b371bb45b6898642cfe46e7925]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8065093610.mp3?updated=1689951885" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber espionage coming from Chinese University. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/50/notes</link>
      <description>Threat intelligence firm Recorded Future recently published research describing espionage activities originating from servers at a major Chinese university, coinciding with international economic development efforts.
Winnona DeSombre and Sanil Chohan are authors of the report, Chinese Cyberespionage Originating from Tsinghua University Infrastructure, along with their colleague Justin Grosfelt.
The research can be found here:
 https://www.recordedfuture.com/chinese-cyberespionage-operations/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Aug 2018 10:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>50</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/45e23154-df0e-11ea-9fc1-ff82342b6e97/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyber espionage coming from Chinese University.</itunes:subtitle>
      <itunes:summary>Threat intelligence firm Recorded Future recently published research describing espionage activities originating from servers at a major Chinese university, coinciding with international economic development efforts.
Winnona DeSombre and Sanil Chohan are authors of the report, Chinese Cyberespionage Originating from Tsinghua University Infrastructure, along with their colleague Justin Grosfelt.
The research can be found here:
 https://www.recordedfuture.com/chinese-cyberespionage-operations/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Threat intelligence firm Recorded Future recently published research describing espionage activities originating from servers at a major Chinese university, coinciding with international economic development efforts.</p><p>Winnona DeSombre and Sanil Chohan are authors of the report, Chinese Cyberespionage Originating from Tsinghua University Infrastructure, along with their colleague Justin Grosfelt.</p><p>The research can be found here:</p><p><a href="https://www.recordedfuture.com/chinese-cyberespionage-operations/"> https://www.recordedfuture.com/chinese-cyberespionage-operations/</a></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1703</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[50115e598e814632991c9908d9e602d6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4566095666.mp3?updated=1685022567" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More action against Iranian influence operations. Tehran's cyberespionage against universities. Counter-value targeting in cyber deterrence. Sino-Australian trade war? Law and order. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/670/notes</link>
      <description>In today's podcast, we hear that Google has put the cats out. Secureworks describes an Iranian cyberespionage campaign targeting universities. That DNC phishing campaign is confirmed to be a false alarm caused by a Michigan misstep, but almost fifteen million voter records appear to have been inadvertently exposed in Texas. The US tells Russia to knock off the influence operations, and some suggest a counter-value deterrent strategy to tame the Bears. China warns Australia its new government will face trade retaliation for banning ZTE and Huawei. Reality Winner gets five years, and two Minnesota lawyers go away, too. Ben Yelin From UMD CHHS on attempts by the State Department to establish international norms for behavior for cyber. Guest is Theresa Payton from Fortalice Solutions, addressing hype vs reality when it comes to blockchain, AI, and the IoT. 
  For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_24.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 24 Aug 2018 19:47:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>670</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8c62ae62-def8-11ea-911f-73abbae0842d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>More action against Iranian influence operations. Tehran's cyberespionage against universities. Counter-value targeting in cyber deterrence. Sino-Australian trade war? Law and order. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Google has put the cats out. Secureworks describes an Iranian cyberespionage campaign targeting universities. That DNC phishing campaign is confirmed to be a false alarm caused by a Michigan misstep, but almost fifteen million voter records appear to have been inadvertently exposed in Texas. The US tells Russia to knock off the influence operations, and some suggest a counter-value deterrent strategy to tame the Bears. China warns Australia its new government will face trade retaliation for banning ZTE and Huawei. Reality Winner gets five years, and two Minnesota lawyers go away, too. Ben Yelin From UMD CHHS on attempts by the State Department to establish international norms for behavior for cyber. Guest is Theresa Payton from Fortalice Solutions, addressing hype vs reality when it comes to blockchain, AI, and the IoT. 
  For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_24.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Google has put the cats out. Secureworks describes an Iranian cyberespionage campaign targeting universities. That DNC phishing campaign is confirmed to be a false alarm caused by a Michigan misstep, but almost fifteen million voter records appear to have been inadvertently exposed in Texas. The US tells Russia to knock off the influence operations, and some suggest a counter-value deterrent strategy to tame the Bears. China warns Australia its new government will face trade retaliation for banning ZTE and Huawei. Reality Winner gets five years, and two Minnesota lawyers go away, too. Ben Yelin From UMD CHHS on attempts by the State Department to establish international norms for behavior for cyber. Guest is Theresa Payton from Fortalice Solutions, addressing hype vs reality when it comes to blockchain, AI, and the IoT. </p> <p> For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_24.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1591</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d3de71654fd3475abf9823967460b83b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7691243716.mp3?updated=1608755179" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>If you're running a red team, let someone know it's a drill. Apache patches Struts. Another exposed AWS bucket. Remcos abused by hackers. DPRK goes after Macs. Dark Tequila runs in Mexico. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/669/notes</link>
      <description>In today's podcast, we hear that a phishing attempt against the Democratic National Committee turned out to have been a poorly coordinated red-team exercise. Apache patches a remote code execution vulnerability in Struts. Another exposed AWS bucket. Remcos remote administration tool is being abused by black hats. Dark Tequila goes after customers of Mexican financial institutions. The Lazarus Group is back, and it's getting into Macs for the first time. Joe Carrigan from JHU ISI on Android vs. iOS data privacy. Guest is Oren Falkowitz from Area 1 Security on protection against phishing attempts. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_23.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 23 Aug 2018 19:46:44 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>669</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8c83fd74-def8-11ea-911f-8b5de76a8a88/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>If you're running a red team, let someone know it's a drill. Apache patches Struts. Another exposed AWS bucket. Remcos abused by hackers. DPRK goes after Macs. Dark Tequila runs in Mexico. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that a phishing attempt against the Democratic National Committee turned out to have been a poorly coordinated red-team exercise. Apache patches a remote code execution vulnerability in Struts. Another exposed AWS bucket. Remcos remote administration tool is being abused by black hats. Dark Tequila goes after customers of Mexican financial institutions. The Lazarus Group is back, and it's getting into Macs for the first time. Joe Carrigan from JHU ISI on Android vs. iOS data privacy. Guest is Oren Falkowitz from Area 1 Security on protection against phishing attempts. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_23.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that a phishing attempt against the Democratic National Committee turned out to have been a poorly coordinated red-team exercise. Apache patches a remote code execution vulnerability in Struts. Another exposed AWS bucket. Remcos remote administration tool is being abused by black hats. Dark Tequila goes after customers of Mexican financial institutions. The Lazarus Group is back, and it's getting into Macs for the first time. Joe Carrigan from JHU ISI on Android vs. iOS data privacy. Guest is Oren Falkowitz from Area 1 Security on protection against phishing attempts. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_23.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1214</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[522f15567bab409c938cca0cc7c23d01]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8502095487.mp3?updated=1689951789" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Facebook takes down "inauthentic" Russian and Iranian fronts. Twitter blocks Iranian false-flags, and FireEye explains why they think it's Tehran. Triout Android spyware described. Hacking back? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/668/notes</link>
      <description>In today's podcast we hear that Facebook has taken down more inauthentic pages—some are Russian, but others are Iranian. Twitter blocks Iranian accounts for being bogus. Russia denies, again, any involvement in information operations against the US. US Army Cyber Command's boss wonders if his job isn't more "information ops" than "cyber." Bitdefender describes Triout, an Android spyware framework. And some in industry caution the Senate not to expect them to get frisky hacking back. Craig Williams from Cisco’s Talos team, discussing MDM (mobile device management) vulnerabilities. Guest is James Burns from CFC Underwriting on cyber security insurance. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_22.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 22 Aug 2018 18:23:41 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>668</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8c9d49be-def8-11ea-911f-279b923d5865/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Facebook takes down "inauthentic" Russian and Iranian fronts. Twitter blocks Iranian false-flags, and FireEye explains why they think it's Tehran. Triout Android spyware described. Hacking back? </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Facebook has taken down more inauthentic pages—some are Russian, but others are Iranian. Twitter blocks Iranian accounts for being bogus. Russia denies, again, any involvement in information operations against the US. US Army Cyber Command's boss wonders if his job isn't more "information ops" than "cyber." Bitdefender describes Triout, an Android spyware framework. And some in industry caution the Senate not to expect them to get frisky hacking back. Craig Williams from Cisco’s Talos team, discussing MDM (mobile device management) vulnerabilities. Guest is James Burns from CFC Underwriting on cyber security insurance. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_22.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Facebook has taken down more inauthentic pages—some are Russian, but others are Iranian. Twitter blocks Iranian accounts for being bogus. Russia denies, again, any involvement in information operations against the US. US Army Cyber Command's boss wonders if his job isn't more "information ops" than "cyber." Bitdefender describes Triout, an Android spyware framework. And some in industry caution the Senate not to expect them to get frisky hacking back. Craig Williams from Cisco’s Talos team, discussing MDM (mobile device management) vulnerabilities. Guest is James Burns from CFC Underwriting on cyber security insurance. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_22.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1302</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7dcb3ba038504a23956728528995dacc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3943347519.mp3?updated=1689951633" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fancy Bear bogus sites taken down. Some in the US Congress think they want hack-back laws. Cyber and sanctions. Operation Red Signature. Doxing Chinese Intelligence. Buggy medical devices. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/667/notes</link>
      <description>In today's podcast, we hear that Microsoft has sprung its bear trap, again, and caught Fancy Bear. This time the targets are more to the right than the left. The US Senate holds hearings on cybersecurity—hacking back is expected to be on the table. The UK wants more sanctions on Russia. US Senators are looking into reducing sanctions' collateral economic damage. Operation Red Signature pokes at South Korean supply chains. Intrusion Truth doxes Chinese intelligence officers. Medical device bugs. Rick Howard from Palo Alto Networks with tips buying cybersecurity products. Guest is Travis Rosiek from BluVector on fileless attacks. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_21.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Aug 2018 19:59:07 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>667</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8cb4c990-def8-11ea-911f-dfb0043706a8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fancy Bear bogus sites taken down. Some in the US Congress think they want hack-back laws. Cyber and sanctions. Operation Red Signature. Doxing Chinese Intelligence. Buggy medical devices. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Microsoft has sprung its bear trap, again, and caught Fancy Bear. This time the targets are more to the right than the left. The US Senate holds hearings on cybersecurity—hacking back is expected to be on the table. The UK wants more sanctions on Russia. US Senators are looking into reducing sanctions' collateral economic damage. Operation Red Signature pokes at South Korean supply chains. Intrusion Truth doxes Chinese intelligence officers. Medical device bugs. Rick Howard from Palo Alto Networks with tips buying cybersecurity products. Guest is Travis Rosiek from BluVector on fileless attacks. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_21.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Microsoft has sprung its bear trap, again, and caught Fancy Bear. This time the targets are more to the right than the left. The US Senate holds hearings on cybersecurity—hacking back is expected to be on the table. The UK wants more sanctions on Russia. US Senators are looking into reducing sanctions' collateral economic damage. Operation Red Signature pokes at South Korean supply chains. Intrusion Truth doxes Chinese intelligence officers. Medical device bugs. Rick Howard from Palo Alto Networks with tips buying cybersecurity products. Guest is Travis Rosiek from BluVector on fileless attacks. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_21.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1292</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2cc11a62e8d04053aff5ec8a1528a79a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8956354441.mp3?updated=1689951620" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DarkHotel is back. So is Necurs, and it's distributing a modular malware dropper. Industrial espionage follows international trade. Election meddling. The use and abuse of data.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/666/notes</link>
      <description>In today's podcast, we hear that an evolved DarkHotel campaign is under way. A new malware dropper is out and about thanks to the Necurs botnet. Researchers demonstrate proof-of-concept exploits. Cyber espionage follows trade. Notes on election meddling. Google and Facebook encounter some regulatory and legal headwinds over data collection. Connected cars know a lot about their drivers, and there's money in those data. Robert M. Lee from Dragos on the notion of cyber attacks as a distraction. 
   For links to all today's stories, check out our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_20.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 20 Aug 2018 19:46:01 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>666</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8ccaefc2-def8-11ea-911f-bf9c122ee18e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>DarkHotel is back. So is Necurs, and it's distributing a modular malware dropper. Industrial espionage follows international trade. Election meddling. The use and abuse of data.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that an evolved DarkHotel campaign is under way. A new malware dropper is out and about thanks to the Necurs botnet. Researchers demonstrate proof-of-concept exploits. Cyber espionage follows trade. Notes on election meddling. Google and Facebook encounter some regulatory and legal headwinds over data collection. Connected cars know a lot about their drivers, and there's money in those data. Robert M. Lee from Dragos on the notion of cyber attacks as a distraction. 
   For links to all today's stories, check out our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_20.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that an evolved DarkHotel campaign is under way. A new malware dropper is out and about thanks to the Necurs botnet. Researchers demonstrate proof-of-concept exploits. Cyber espionage follows trade. Notes on election meddling. Google and Facebook encounter some regulatory and legal headwinds over data collection. Connected cars know a lot about their drivers, and there's money in those data. Robert M. Lee from Dragos on the notion of cyber attacks as a distraction. </p> <p>  For links to all today's stories, check out our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_20.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1067</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8d48329afb6848f995832e9e55180cff]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5591534400.mp3?updated=1689951682" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stealthy ad fraud campaign evades detection. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/49/notes</link>
      <description>Researchers at Bitdefender have been tracking a bit of complex rootkit malware called Zacinlo that they suspect has been operating virtually undetected for over six years. Bogdan Botezatu is a senior cyber security analyst with Bitdefender, and he describes what they've found.
Research link:
 https://labs.bitdefender.com/2018/06/six-years-and-counting-inside-the-complex-zacinlo-ad-fraud-operation/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Aug 2018 10:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>49</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/43963666-df0e-11ea-a9f1-27f0aa95804e/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Stealthy ad fraud campaign evades detection.</itunes:subtitle>
      <itunes:summary>Researchers at Bitdefender have been tracking a bit of complex rootkit malware called Zacinlo that they suspect has been operating virtually undetected for over six years. Bogdan Botezatu is a senior cyber security analyst with Bitdefender, and he describes what they've found.
Research link:
 https://labs.bitdefender.com/2018/06/six-years-and-counting-inside-the-complex-zacinlo-ad-fraud-operation/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Bitdefender have been tracking a bit of complex rootkit malware called Zacinlo that they suspect has been operating virtually undetected for over six years. Bogdan Botezatu is a senior cyber security analyst with Bitdefender, and he describes what they've found.</p><p>Research link:</p><p><a href="https://labs.bitdefender.com/2018/06/six-years-and-counting-inside-the-complex-zacinlo-ad-fraud-operation/"> https://labs.bitdefender.com/2018/06/six-years-and-counting-inside-the-complex-zacinlo-ad-fraud-operation/</a></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1290</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c559c10c440f4e60abd638fe9b5b81bc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4870455190.mp3?updated=1685022544" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Election risks—hacking and influence. Chinese industrial espionage spike. Misconfigured project management. Necurs appears briefly. Bogus Fortnite downloads. What they heard in the banya. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/665/notes</link>
      <description>In today's podcast we run through a brief guide to election risks, and the difference between hacking and influence operations. An Alaskan trade mission prompts a wave of Chinese industrial espionage. Misconfigured project management pages may have exposed Canadian and British Government information. Necurs flared up in a short-lived spam campaign against banks this week. Crooks use bogus Fortnite download pages. Final briefs are submitted in Kaspersky's court challenge to its US ban. Emily Wilson from Terbium Labs on her experience getting certified as a fraud examiner. Guest is Marco Rubin from the Center for Innovative Technology, on the security of UAVs and drones. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_17.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 17 Aug 2018 20:28:13 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>665</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8cde2f56-def8-11ea-911f-5f718b5041eb/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Election risks—hacking and influence. Chinese industrial espionage spike. Misconfigured project management. Necurs appears briefly. Bogus Fortnite downloads. What they heard in the banya. </itunes:subtitle>
      <itunes:summary>In today's podcast we run through a brief guide to election risks, and the difference between hacking and influence operations. An Alaskan trade mission prompts a wave of Chinese industrial espionage. Misconfigured project management pages may have exposed Canadian and British Government information. Necurs flared up in a short-lived spam campaign against banks this week. Crooks use bogus Fortnite download pages. Final briefs are submitted in Kaspersky's court challenge to its US ban. Emily Wilson from Terbium Labs on her experience getting certified as a fraud examiner. Guest is Marco Rubin from the Center for Innovative Technology, on the security of UAVs and drones. 
 For links to all of today's stories check our our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_17.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we run through a brief guide to election risks, and the difference between hacking and influence operations. An Alaskan trade mission prompts a wave of Chinese industrial espionage. Misconfigured project management pages may have exposed Canadian and British Government information. Necurs flared up in a short-lived spam campaign against banks this week. Crooks use bogus Fortnite download pages. Final briefs are submitted in Kaspersky's court challenge to its US ban. Emily Wilson from Terbium Labs on her experience getting certified as a fraud examiner. Guest is Marco Rubin from the Center for Innovative Technology, on the security of UAVs and drones. </p> <p>For links to all of today's stories check our our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_17.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1561</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fa14abf00e00451da58b98c1616fbb21]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5358711059.mp3?updated=1608755198" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacking Old Man River. Nation-state cyber conflict: objectives and norms of behavior. Australia's new cyber laws. ATM campaign. Lawsuits, and the Dread Pirate Robert asks for pardon. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/664/notes</link>
      <description>In today's podcast we hear that cyber threats to river traffic have intermodal implications. Nation state hacking, Presidential Policy Directive 20, and international norms of cyber conflict. The tragic consequences of overconfidence concerning communications security. Australia's new cyber laws are more legal hammer than required backdoor. A campaign of ATM robbery nets millions worldwide. A cryptocurrency speculator sues the phone company, a spyware firm sues a former employee, and the Dread Pirate Roberts would like a pardon. Johannes Ullrich from SANS and the ICS Stormcast Podcast, on lingering legacy passwords in Office documents. Guest is Phil Neray from CyberX on the National Risk Management Center being spun up by DHS. 
  For links to all today's stories, check out our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_16.html 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 16 Aug 2018 18:44:01 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>664</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8cfa7fe4-def8-11ea-911f-ef43d0e0ce42/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hacking Old Man River. Nation-state cyber conflict: objectives and norms of behavior. Australia's new cyber laws. ATM campaign. Lawsuits, and the Dread Pirate Robert asks for pardon. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that cyber threats to river traffic have intermodal implications. Nation state hacking, Presidential Policy Directive 20, and international norms of cyber conflict. The tragic consequences of overconfidence concerning communications security. Australia's new cyber laws are more legal hammer than required backdoor. A campaign of ATM robbery nets millions worldwide. A cryptocurrency speculator sues the phone company, a spyware firm sues a former employee, and the Dread Pirate Roberts would like a pardon. Johannes Ullrich from SANS and the ICS Stormcast Podcast, on lingering legacy passwords in Office documents. Guest is Phil Neray from CyberX on the National Risk Management Center being spun up by DHS. 
  For links to all today's stories, check out our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_16.html 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that cyber threats to river traffic have intermodal implications. Nation state hacking, Presidential Policy Directive 20, and international norms of cyber conflict. The tragic consequences of overconfidence concerning communications security. Australia's new cyber laws are more legal hammer than required backdoor. A campaign of ATM robbery nets millions worldwide. A cryptocurrency speculator sues the phone company, a spyware firm sues a former employee, and the Dread Pirate Roberts would like a pardon. Johannes Ullrich from SANS and the ICS Stormcast Podcast, on lingering legacy passwords in Office documents. Guest is Phil Neray from CyberX on the National Risk Management Center being spun up by DHS. </p> <p> For links to all today's stories, check out our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_16.html<br> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1287</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[748b2a4bc25c43eca58ddafe8e27b11b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6275796435.mp3?updated=1689951202" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Notes on patching. Foreshadow speculative execution vulnerability. Influence operations. The FBI's new cyber chief. Are stickers a temptation to thieves, hackers, and customs officers? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/663/notes</link>
      <description>In today's podcast we hear some Patch Tuesday notes—both Microsoft and Adobe were busy yesterday. Foreshadow, a new speculative execution vulnerability, is reported. Malaysia gets attention from Chinese espionage services. Competition for jihadist mindshare. Influence operations as marketing. The US FBI gets a new cyber boss. The Kremlin thinks the BBC is biased in the crypto-wars. And laptop stickers: are they good, bad, or ugly? Zulfikar Ramzan from RSA on SOCs and IoT. Guest is Dimitris Maniatis from Upstream on Android ad fraud malware. 
 For links to all of today's stories check out the CyberWire daily briefing: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_15.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 15 Aug 2018 20:00:39 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>663</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8d1029ca-def8-11ea-911f-7f80fba1794b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Notes on patching. Foreshadow speculative execution vulnerability. Influence operations. The FBI's new cyber chief. Are stickers a temptation to thieves, hackers, and customs officers? </itunes:subtitle>
      <itunes:summary>In today's podcast we hear some Patch Tuesday notes—both Microsoft and Adobe were busy yesterday. Foreshadow, a new speculative execution vulnerability, is reported. Malaysia gets attention from Chinese espionage services. Competition for jihadist mindshare. Influence operations as marketing. The US FBI gets a new cyber boss. The Kremlin thinks the BBC is biased in the crypto-wars. And laptop stickers: are they good, bad, or ugly? Zulfikar Ramzan from RSA on SOCs and IoT. Guest is Dimitris Maniatis from Upstream on Android ad fraud malware. 
 For links to all of today's stories check out the CyberWire daily briefing: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_15.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear some Patch Tuesday notes—both Microsoft and Adobe were busy yesterday. Foreshadow, a new speculative execution vulnerability, is reported. Malaysia gets attention from Chinese espionage services. Competition for jihadist mindshare. Influence operations as marketing. The US FBI gets a new cyber boss. The Kremlin thinks the BBC is biased in the crypto-wars. And laptop stickers: are they good, bad, or ugly? Zulfikar Ramzan from RSA on SOCs and IoT. Guest is Dimitris Maniatis from Upstream on Android ad fraud malware. </p> <p>For links to all of today's stories check out the CyberWire daily briefing:<br> https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_15.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1274</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d24094de2db0409ea03b03c48f825937]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9674592480.mp3?updated=1689951194" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cryptowars notes. DDoS in Finland. Bears aren't under the beds; they're in the routers. Smart city attack surfaces. Sanction notes. Training through puzzle-solving .</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/662/notes</link>
      <description>In today's podcast, we hear about the cryptowars down under. Major DDoS incident in Finland. Bears in the home routers, and concerns about IoT and power grid security prompt a US Senator to demand answers. Smart cities present big attack surfaces. Preliminary notes on patches. ZTE and Huawei devices formally disinvited from US Government networks. Cyber retaliation expected from Russia and Iran over sanctions. And locking people in a room to teach them good cyber hygiene. Justin Harvey from Accenture on threat hunting. Guest is Bob Stevens from Lookout discussing app-based malware on mobile devices. 
  For links to all of today's stories check out our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_14.html 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Aug 2018 18:24:58 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>662</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8d255b4c-def8-11ea-911f-8bd8ab9639e5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cryptowars notes. DDoS in Finland. Bears aren't under the beds; they're in the routers. Smart city attack surfaces. Sanction notes. Training through puzzle-solving .</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about the cryptowars down under. Major DDoS incident in Finland. Bears in the home routers, and concerns about IoT and power grid security prompt a US Senator to demand answers. Smart cities present big attack surfaces. Preliminary notes on patches. ZTE and Huawei devices formally disinvited from US Government networks. Cyber retaliation expected from Russia and Iran over sanctions. And locking people in a room to teach them good cyber hygiene. Justin Harvey from Accenture on threat hunting. Guest is Bob Stevens from Lookout discussing app-based malware on mobile devices. 
  For links to all of today's stories check out our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_14.html 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about the cryptowars down under. Major DDoS incident in Finland. Bears in the home routers, and concerns about IoT and power grid security prompt a US Senator to demand answers. Smart cities present big attack surfaces. Preliminary notes on patches. ZTE and Huawei devices formally disinvited from US Government networks. Cyber retaliation expected from Russia and Iran over sanctions. And locking people in a room to teach them good cyber hygiene. Justin Harvey from Accenture on threat hunting. Guest is Bob Stevens from Lookout discussing app-based malware on mobile devices. </p> <p> For links to all of today's stories check out our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_14.html<br> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1292</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7df7cb49c5424487b87b2f06c9b4e134]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2656431939.mp3?updated=1689951143" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Spyware for states and spouses. Election hacking demos. New ransomware strains, and a clipper for Android. Airline Wi-Fi is not only irritating, but insecure as well. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/661/notes</link>
      <description>In today's podcast, we hear about spyware in the guise of a missile attack warning app. New Dharma variant out. Android.Clipper redirects transactions to crooks' cryptowallets. DLink exploits rob Brazilian banking customers. Utilities prepare for grid hacks, but researchers say an appliance botnet could cycle demand enough to induce blackouts. Vulnerabilities in airline Wi-Fi and SATCOM connectivity. Election hacking demos may or may not be realistic. Family spy ware proves vulnerable to data exfiltration. Ben Yelin from UMD CHHS on police using facial recognition software to nab a suspect. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 13 Aug 2018 19:36:08 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>661</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8d3edbee-def8-11ea-911f-ffb8eeb07328/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Spyware for states and spouses. Election hacking demos. New ransomware strains, and a clipper for Android. Airline Wi-Fi is not only irritating, but insecure as well. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about spyware in the guise of a missile attack warning app. New Dharma variant out. Android.Clipper redirects transactions to crooks' cryptowallets. DLink exploits rob Brazilian banking customers. Utilities prepare for grid hacks, but researchers say an appliance botnet could cycle demand enough to induce blackouts. Vulnerabilities in airline Wi-Fi and SATCOM connectivity. Election hacking demos may or may not be realistic. Family spy ware proves vulnerable to data exfiltration. Ben Yelin from UMD CHHS on police using facial recognition software to nab a suspect. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about spyware in the guise of a missile attack warning app. New Dharma variant out. Android.Clipper redirects transactions to crooks' cryptowallets. DLink exploits rob Brazilian banking customers. Utilities prepare for grid hacks, but researchers say an appliance botnet could cycle demand enough to induce blackouts. Vulnerabilities in airline Wi-Fi and SATCOM connectivity. Election hacking demos may or may not be realistic. Family spy ware proves vulnerable to data exfiltration. Ben Yelin from UMD CHHS on police using facial recognition software to nab a suspect. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1059</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2ff5aab5580547f8b92185f57fe93efd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1623404892.mp3?updated=1689951099" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Thrip espionage group lives off the land. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/48/notes</link>
      <description>Researchers at Symantec have been tracking a wide-ranging espionage operation that's targeting satellite, telecom and defense companies. 
Jon DiMaggio is a senior cyber intelligence analyst at Symantec, and he takes us through what they've discovered.
The research can be found here:
 https://www.symantec.com/blogs/threat-intelligence/thrip-hits-satellite-telecoms-defense-targets
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Aug 2018 10:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>48</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/3ff98bca-df0e-11ea-a9f1-7fb0d0fe1ef3/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Thrip espionage group lives off the land.</itunes:subtitle>
      <itunes:summary>Researchers at Symantec have been tracking a wide-ranging espionage operation that's targeting satellite, telecom and defense companies. 
Jon DiMaggio is a senior cyber intelligence analyst at Symantec, and he takes us through what they've discovered.
The research can be found here:
 https://www.symantec.com/blogs/threat-intelligence/thrip-hits-satellite-telecoms-defense-targets
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Symantec have been tracking a wide-ranging espionage operation that's targeting satellite, telecom and defense companies. </p><p>Jon DiMaggio is a senior cyber intelligence analyst at Symantec, and he takes us through what they've discovered.</p><p>The research can be found here:</p><p><a href="https://www.symantec.com/blogs/threat-intelligence/thrip-hits-satellite-telecoms-defense-targets"> https://www.symantec.com/blogs/threat-intelligence/thrip-hits-satellite-telecoms-defense-targets</a></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1703</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aaf4968088234323b93cbd4be3941035]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4151747747.mp3?updated=1685022590" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DPRK RAT in the wild. Vulnerable WPA2 4-way handshake implementations. Black Hat notes. Sanctions and retaliation. RoK to reorganize Cyber Command. PGA and ransomware. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/660/notes</link>
      <description>In today's podcast we hear that US-CERT is warning of a North Korean RAT. Researchers find vulnerable WPA2 handshake implementations. A sales call results in inadvertent data exposure. Notes on Black Hat: circumspection, hype, barkers, and artificial intelligence. Russia braces for US sanctions and promises retaliation. South Korea will reorganize its Cyber Command. The PGA is hit with ransomware. Guests are Andrei Soldatov and Irina Borogan, authors of the book The Red Web. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 10 Aug 2018 17:25:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>660</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8d5efb68-def8-11ea-911f-07791f49aaa7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>DPRK RAT in the wild. Vulnerable WPA2 4-way handshake implementations. Black Hat notes. Sanctions and retaliation. RoK to reorganize Cyber Command. PGA and ransomware. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that US-CERT is warning of a North Korean RAT. Researchers find vulnerable WPA2 handshake implementations. A sales call results in inadvertent data exposure. Notes on Black Hat: circumspection, hype, barkers, and artificial intelligence. Russia braces for US sanctions and promises retaliation. South Korea will reorganize its Cyber Command. The PGA is hit with ransomware. Guests are Andrei Soldatov and Irina Borogan, authors of the book The Red Web. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that US-CERT is warning of a North Korean RAT. Researchers find vulnerable WPA2 handshake implementations. A sales call results in inadvertent data exposure. Notes on Black Hat: circumspection, hype, barkers, and artificial intelligence. Russia braces for US sanctions and promises retaliation. South Korea will reorganize its Cyber Command. The PGA is hit with ransomware. Guests are Andrei Soldatov and Irina Borogan, authors of the book The Red Web. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1370</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bf18b7ede46d45e9ac65ed217fbb56c1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4147920364.mp3?updated=1689947156" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>State-sponsored ransomware campaigns coming? DarkHydrus and Phishery. Hitting ATMs for alt-coin. US sanctions Russia. IBM looks at artificially intelligent malware. Black Hat notes. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/659/notes</link>
      <description>In today's podcast we hear that Tehran seems ready to follow Pyongyang into state-sponsored theft to redress financial shortfalls: cryptocurrency ransomware looks like Iran's preferred approach. DarkHydrus uses commodity tool Phishery in Middle Eastern campaign. Jackpotting cryptocurrency ATMs. The US imposes sanctions on Russia. Reality Winner's sentencing date announced. IBM looks at artificially intelligent malware. The mob's role in the cyber black market. What's the bigger gaming threat, sideloading apps or the Fortnite dance? We're asking for a friend. Awais Rashid from Bristol University on issues with software warranties. Guest is Cheryl Biswas from the Diana Initiative, a conference in Las Vegas celebrating diversity, women in security, and how to pursue a career in information security and technology. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 09 Aug 2018 19:57:25 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>659</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8d6cf254-def8-11ea-911f-cfcdd3e3ab01/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>State-sponsored ransomware campaigns coming? DarkHydrus and Phishery. Hitting ATMs for alt-coin. US sanctions Russia. IBM looks at artificially intelligent malware. Black Hat notes. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Tehran seems ready to follow Pyongyang into state-sponsored theft to redress financial shortfalls: cryptocurrency ransomware looks like Iran's preferred approach. DarkHydrus uses commodity tool Phishery in Middle Eastern campaign. Jackpotting cryptocurrency ATMs. The US imposes sanctions on Russia. Reality Winner's sentencing date announced. IBM looks at artificially intelligent malware. The mob's role in the cyber black market. What's the bigger gaming threat, sideloading apps or the Fortnite dance? We're asking for a friend. Awais Rashid from Bristol University on issues with software warranties. Guest is Cheryl Biswas from the Diana Initiative, a conference in Las Vegas celebrating diversity, women in security, and how to pursue a career in information security and technology. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Tehran seems ready to follow Pyongyang into state-sponsored theft to redress financial shortfalls: cryptocurrency ransomware looks like Iran's preferred approach. DarkHydrus uses commodity tool Phishery in Middle Eastern campaign. Jackpotting cryptocurrency ATMs. The US imposes sanctions on Russia. Reality Winner's sentencing date announced. IBM looks at artificially intelligent malware. The mob's role in the cyber black market. What's the bigger gaming threat, sideloading apps or the Fortnite dance? We're asking for a friend. Awais Rashid from Bristol University on issues with software warranties. Guest is Cheryl Biswas from the Diana Initiative, a conference in Las Vegas celebrating diversity, women in security, and how to pursue a career in information security and technology. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1233</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[da45161c7b484b76a126a9f57e478d7e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4871054713.mp3?updated=1689949922" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Payment processors probed with BGP exploits for redirection attacks. WhatsApp vulnerable to manipulation? Deterrence and retaliation. Anonymous vs. QAnon. Notes from Black Hat. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/658/notes</link>
      <description>In today's podcast we hare that Oracle has warned of BGP exploits against payment processors. Check Point says it's found vulnerabilities in WhatsApp that could enable chat sessions to be intercepted and manipulated. Germany, Ukraine, and the US independently mull responses to hacking and influence operations. Anonymous announces it wants to take its shots at QAnon. Notes from Black Hat, including observations on grid hacks, AI, and the gray hat phenomenon. David Dufour from Webroot with a look at the year in review. Guest is Travis Moore from TechCongress describing their fellowship programs. 
  For links to all of today's stories check out our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_08.html 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 08 Aug 2018 16:44:53 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>658</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8d846c4a-def8-11ea-911f-f30605d5009c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Payment processors probed with BGP exploits for redirection attacks. WhatsApp vulnerable to manipulation? Deterrence and retaliation. Anonymous vs. QAnon. Notes from Black Hat. </itunes:subtitle>
      <itunes:summary>In today's podcast we hare that Oracle has warned of BGP exploits against payment processors. Check Point says it's found vulnerabilities in WhatsApp that could enable chat sessions to be intercepted and manipulated. Germany, Ukraine, and the US independently mull responses to hacking and influence operations. Anonymous announces it wants to take its shots at QAnon. Notes from Black Hat, including observations on grid hacks, AI, and the gray hat phenomenon. David Dufour from Webroot with a look at the year in review. Guest is Travis Moore from TechCongress describing their fellowship programs. 
  For links to all of today's stories check out our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_08.html 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hare that Oracle has warned of BGP exploits against payment processors. Check Point says it's found vulnerabilities in WhatsApp that could enable chat sessions to be intercepted and manipulated. Germany, Ukraine, and the US independently mull responses to hacking and influence operations. Anonymous announces it wants to take its shots at QAnon. Notes from Black Hat, including observations on grid hacks, AI, and the gray hat phenomenon. David Dufour from Webroot with a look at the year in review. Guest is Travis Moore from TechCongress describing their fellowship programs. </p> <p> For links to all of today's stories check out our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_08.html<br> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1112</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c91b4960a6b54878a62d68c5bc72c620]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2833382525.mp3?updated=1689949900" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>TSMC recovers from WannaCry infection. OpenEMR fixes 30 bugs. UK will ask Russia to extradite two GRU operators for Novichok attacks. Twitterbots flourish. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/657/notes</link>
      <description>In today's podcast we hear that chipmaker TSMC says the virus that shut it down in Taiwan was WannaCry. It appears to have been an incidental infection enabled by inattentive installation of software. OpenEMR fixes bugs that could have exposed millions of patient records. British authorities are said to be readying an extradition request for GRU operators they hold responsible for the Novichok attack in Salisbury—the incident has prompted Russian hacking and disinformation. Mike Benjamin from CenturyLink on DDoS attack trends. Casey Ellis from Bugcrowd with an overview of bug bounty programs. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Aug 2018 20:53:19 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>657</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8d9f4bd2-def8-11ea-911f-bb85b9c731c3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>TSMC recovers from WannaCry infection. OpenEMR fixes 30 bugs. UK will ask Russia to extradite two GRU operators for Novichok attacks. Twitterbots flourish. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that chipmaker TSMC says the virus that shut it down in Taiwan was WannaCry. It appears to have been an incidental infection enabled by inattentive installation of software. OpenEMR fixes bugs that could have exposed millions of patient records. British authorities are said to be readying an extradition request for GRU operators they hold responsible for the Novichok attack in Salisbury—the incident has prompted Russian hacking and disinformation. Mike Benjamin from CenturyLink on DDoS attack trends. Casey Ellis from Bugcrowd with an overview of bug bounty programs. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that chipmaker TSMC says the virus that shut it down in Taiwan was WannaCry. It appears to have been an incidental infection enabled by inattentive installation of software. OpenEMR fixes bugs that could have exposed millions of patient records. British authorities are said to be readying an extradition request for GRU operators they hold responsible for the Novichok attack in Salisbury—the incident has prompted Russian hacking and disinformation. Mike Benjamin from CenturyLink on DDoS attack trends. Casey Ellis from Bugcrowd with an overview of bug bounty programs. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1232</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f490d12520b649cdaf96731b92ab5852]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6906909993.mp3?updated=1689949887" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More data exposures, from banks and a major CRM provider. Ransomware strikes back. The irresistibility of data. An unhackable wallet gets hacked…maybe. Spreading goodwill through Akido? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/656/notes</link>
      <description>Leaky API may have exposed Salesforce customers' data, TSMC reports a virus in its semiconductor plants. TCM Bank discloses a paycard application leak. Ransomware in Hong Kong. The US Census Bureau prepares to secure its 2020 "fully digital" census. The unbearable, irresistible urge to monetize data. Notes on automotive cybersecurity. Depending on whom you ask, the Bitfi wallet was either hacked, or not. And a new goodwill ambassador seeks to repair US-Russian relations. Rick Howard from Palo Alto Networks exploring the notion of superforecasting. 
 For links to all of today's stories check out our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_06.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 06 Aug 2018 18:03:44 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>656</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8db67910-def8-11ea-911f-07ad36f98bf3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>More data exposures, from banks and a major CRM provider. Ransomware strikes back. The irresistibility of data. An unhackable wallet gets hacked…maybe. Spreading goodwill through Akido? </itunes:subtitle>
      <itunes:summary>Leaky API may have exposed Salesforce customers' data, TSMC reports a virus in its semiconductor plants. TCM Bank discloses a paycard application leak. Ransomware in Hong Kong. The US Census Bureau prepares to secure its 2020 "fully digital" census. The unbearable, irresistible urge to monetize data. Notes on automotive cybersecurity. Depending on whom you ask, the Bitfi wallet was either hacked, or not. And a new goodwill ambassador seeks to repair US-Russian relations. Rick Howard from Palo Alto Networks exploring the notion of superforecasting. 
 For links to all of today's stories check out our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_06.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Leaky API may have exposed Salesforce customers' data, TSMC reports a virus in its semiconductor plants. TCM Bank discloses a paycard application leak. Ransomware in Hong Kong. The US Census Bureau prepares to secure its 2020 "fully digital" census. The unbearable, irresistible urge to monetize data. Notes on automotive cybersecurity. Depending on whom you ask, the Bitfi wallet was either hacked, or not. And a new goodwill ambassador seeks to repair US-Russian relations. Rick Howard from Palo Alto Networks exploring the notion of superforecasting. </p> <p>For links to all of today's stories check out our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_06.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1268</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0e505f24edf54707b5299ad09cd9bd1d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6058451700.mp3?updated=1689947322" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cortana voice assistant lets you in. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/47/notes</link>
      <description>Researchers at McAfee recently discovered code execution vulnerabilities in the default settings of the Cortana voice-activated digital assistant in Windows 10 systems. 
Steve Povolny is head of advanced threat research at McAfee and he shares their findings.
The research can be found here:
 https://securingtomorrow.mcafee.com/mcafee-labs/want-to-break-into-a-locked-windows-10-device-ask-cortana-cve-2018-8140
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Aug 2018 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>47</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/3da8e122-df0e-11ea-92cb-67610992e5dd/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cortana voice assistant lets you in.</itunes:subtitle>
      <itunes:summary>Researchers at McAfee recently discovered code execution vulnerabilities in the default settings of the Cortana voice-activated digital assistant in Windows 10 systems. 
Steve Povolny is head of advanced threat research at McAfee and he shares their findings.
The research can be found here:
 https://securingtomorrow.mcafee.com/mcafee-labs/want-to-break-into-a-locked-windows-10-device-ask-cortana-cve-2018-8140
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at McAfee recently discovered code execution vulnerabilities in the default settings of the Cortana voice-activated digital assistant in Windows 10 systems. </p><p>Steve Povolny is head of advanced threat research at McAfee and he shares their findings.</p><p>The research can be found here:</p><p><a href="https://securingtomorrow.mcafee.com/mcafee-labs/want-to-break-into-a-locked-windows-10-device-ask-cortana-cve-2018-8140"> https://securingtomorrow.mcafee.com/mcafee-labs/want-to-break-into-a-locked-windows-10-device-ask-cortana-cve-2018-8140</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1450</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e614c95806fe46319110219632678367]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2412359219.mp3?updated=1685022578" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russian threats and threats to Russia. Cryptojacking wave spreads out from Brazil. Recovering from malware in Alaska and Atlanta. Notes on automotive cybersecurity. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/655/notes</link>
      <description>In today's podcast we hear that the US Intelligence Community warns of Russian threats, again. A criminal spearphishing campaign hits Russian industrial companies. A cryptojacking wave is installing CoinHive in MicroTik routers. Speakers at the Billington Automotive CyberSecuirty Summit stress collaboration, design for security, and the convergence of cyber and safety. Autonomy and connectivity make these imperative for the next generation of vehicles. Municipalities hit by malware feel the pain.  Ben Yelin from UMD CHHS on a NYT story on records being seized from a reporter. Guest is David Spark, cohost of the CISO Security Vendor Relationship podcast.  
  For links to all of today's stories check out our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_03.html 
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 03 Aug 2018 20:00:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>655</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8dcb91ce-def8-11ea-911f-e39277518b1b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Russian threats and threats to Russia. Cryptojacking wave spreads out from Brazil. Recovering from malware in Alaska and Atlanta. Notes on automotive cybersecurity. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that the US Intelligence Community warns of Russian threats, again. A criminal spearphishing campaign hits Russian industrial companies. A cryptojacking wave is installing CoinHive in MicroTik routers. Speakers at the Billington Automotive CyberSecuirty Summit stress collaboration, design for security, and the convergence of cyber and safety. Autonomy and connectivity make these imperative for the next generation of vehicles. Municipalities hit by malware feel the pain.  Ben Yelin from UMD CHHS on a NYT story on records being seized from a reporter. Guest is David Spark, cohost of the CISO Security Vendor Relationship podcast.  
  For links to all of today's stories check out our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_03.html 
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that the US Intelligence Community warns of Russian threats, again. A criminal spearphishing campaign hits Russian industrial companies. A cryptojacking wave is installing CoinHive in MicroTik routers. Speakers at the Billington Automotive CyberSecuirty Summit stress collaboration, design for security, and the convergence of cyber and safety. Autonomy and connectivity make these imperative for the next generation of vehicles. Municipalities hit by malware feel the pain.  Ben Yelin from UMD CHHS on a NYT story on records being seized from a reporter. Guest is David Spark, cohost of the CISO Security Vendor Relationship podcast.  </p> <p> For links to all of today's stories check out our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_03.html<br> </p> <p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1538</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1c92cf0261c54a559857a689ff6773c3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2457860862.mp3?updated=1608755196" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>RASPITE noses around the US power grid. Cisco will buy Duo Security. Sandworm afflicts lab investigating Novichok attack. Influence ops can be no-lose proposition.Crytpojacking and malspam. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/654/notes</link>
      <description>In today's podcast, we hear that Cisco plans to buy Duo Security. Dragos warns of the RASPITE adversary actor. Russia's Sandworm group is phishing people connected with a Swiss chemical forensics lab. How influence operations can be a no-lose proposition. A cryptojacking campaign is discovered and stopped. Malspam is using gifs to carry a keylogger payload. And Facebook CSO Alex Stamos has fixed a date for his departure for Stanford. Robert M. Lee from Dragos with thoughts on categorizing threat actors. Guest is Wendi Whitmore from IBM with their 2018 Cost of a Data Breach study. 
 For links to all of today's stories check out our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_02.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 02 Aug 2018 19:31:54 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>654</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8de1bfd0-def8-11ea-911f-579c8937eba6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>RASPITE noses around the US power grid. Cisco will buy Duo Security. Sandworm afflicts lab investigating Novichok attack. Influence ops can be no-lose proposition.Crytpojacking and malspam. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Cisco plans to buy Duo Security. Dragos warns of the RASPITE adversary actor. Russia's Sandworm group is phishing people connected with a Swiss chemical forensics lab. How influence operations can be a no-lose proposition. A cryptojacking campaign is discovered and stopped. Malspam is using gifs to carry a keylogger payload. And Facebook CSO Alex Stamos has fixed a date for his departure for Stanford. Robert M. Lee from Dragos with thoughts on categorizing threat actors. Guest is Wendi Whitmore from IBM with their 2018 Cost of a Data Breach study. 
 For links to all of today's stories check out our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_02.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Cisco plans to buy Duo Security. Dragos warns of the RASPITE adversary actor. Russia's Sandworm group is phishing people connected with a Swiss chemical forensics lab. How influence operations can be a no-lose proposition. A cryptojacking campaign is discovered and stopped. Malspam is using gifs to carry a keylogger payload. And Facebook CSO Alex Stamos has fixed a date for his departure for Stanford. Robert M. Lee from Dragos with thoughts on categorizing threat actors. Guest is Wendi Whitmore from IBM with their 2018 Cost of a Data Breach study. </p> <p>For links to all of today's stories check out our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_02.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1165</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c0e229ba341c4ed4823744c4a389041b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5742502236.mp3?updated=1689947287" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Reddit Hacked. Ukrainians nabbed. Facebook boots "inauthentic" accounts for malign influence. Pegasus spyware found in Amnesty phone. Yale's old breach. Google and censorship. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/653/notes</link>
      <description>In today's podcast we hear that a Swiss chemical agent forensic lab has seen Sandworm phishing attempts. Facebook kicks thirty-one "inauthentic" accounts from its platform: they seem to have been engaged in influence operations, possibly Russian. Attribution remains difficult. NSO Group's Pegasus spyware found in Amnesty International phone. SamSam ransomware exacts a high cost. Yale realizes it was breached about ten years ago. Google allegedly prepares a censor-engine for Chinese web searchers.  Craig Williams from Cisco’s Talos unit, describing his team and the work they do. Guest is Thomas Hofmann from Flashpoint on ransomware and online extortion. 
 For links to all of today's stories check out out Cyberwire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_01.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 01 Aug 2018 19:16:31 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>653</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8df93890-def8-11ea-911f-fb164b2f6495/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Reddit Hacked. Ukrainians nabbed. Facebook boots "inauthentic" accounts for malign influence. Pegasus spyware found in Amnesty phone. Yale's old breach. Google and censorship. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that a Swiss chemical agent forensic lab has seen Sandworm phishing attempts. Facebook kicks thirty-one "inauthentic" accounts from its platform: they seem to have been engaged in influence operations, possibly Russian. Attribution remains difficult. NSO Group's Pegasus spyware found in Amnesty International phone. SamSam ransomware exacts a high cost. Yale realizes it was breached about ten years ago. Google allegedly prepares a censor-engine for Chinese web searchers.  Craig Williams from Cisco’s Talos unit, describing his team and the work they do. Guest is Thomas Hofmann from Flashpoint on ransomware and online extortion. 
 For links to all of today's stories check out out Cyberwire daily news brief: https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_01.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that a Swiss chemical agent forensic lab has seen Sandworm phishing attempts. Facebook kicks thirty-one "inauthentic" accounts from its platform: they seem to have been engaged in influence operations, possibly Russian. Attribution remains difficult. NSO Group's Pegasus spyware found in Amnesty International phone. SamSam ransomware exacts a high cost. Yale realizes it was breached about ten years ago. Google allegedly prepares a censor-engine for Chinese web searchers.  Craig Williams from Cisco’s Talos unit, describing his team and the work they do. Guest is Thomas Hofmann from Flashpoint on ransomware and online extortion. </p> <p>For links to all of today's stories check out out Cyberwire daily news brief:<br> https://thecyberwire.com/issues/issues2018/August/CyberWire_2018_08_01.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1167</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5ee5609285034db6a695c51a2948d6e0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9470337046.mp3?updated=1689947272" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Data-centric security. [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/24/notes</link>
      <description>In this CyberWire special edition, we take a look at data-centric security, focusing on the security of the data itself, rather than the surrounding networks, application or servers. 
 
To help us on our journey of understanding we’ve lined up a number of industry experts. Ellison Anne Williams is CEO of Enveil, a company that’s developed cutting edge encryption techniques. Adam Nichols is principle of software security at Grimm, a cybersecurity engineering and consulting firm. Mark Forrest is CEO of Cryptshare, maker of secure electronic communication technologies for the exchange of business sensitive information. And John Prisco is CEO at QuantumXchange, a provider of what they claim is unbreakable quantum-safe encryption.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 01 Aug 2018 16:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>24</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c10bf054-df04-11ea-88ab-77ab88f406a3/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Data-centric security.</itunes:subtitle>
      <itunes:summary>In this CyberWire special edition, we take a look at data-centric security, focusing on the security of the data itself, rather than the surrounding networks, application or servers. 
 
To help us on our journey of understanding we’ve lined up a number of industry experts. Ellison Anne Williams is CEO of Enveil, a company that’s developed cutting edge encryption techniques. Adam Nichols is principle of software security at Grimm, a cybersecurity engineering and consulting firm. Mark Forrest is CEO of Cryptshare, maker of secure electronic communication technologies for the exchange of business sensitive information. And John Prisco is CEO at QuantumXchange, a provider of what they claim is unbreakable quantum-safe encryption.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this CyberWire special edition, we take a look at data-centric security, focusing on the security of the data itself, rather than the surrounding networks, application or servers. </p><p> </p><p>To help us on our journey of understanding we’ve lined up a number of industry experts. Ellison Anne Williams is CEO of Enveil, a company that’s developed cutting edge encryption techniques. Adam Nichols is principle of software security at Grimm, a cybersecurity engineering and consulting firm. Mark Forrest is CEO of Cryptshare, maker of secure electronic communication technologies for the exchange of business sensitive information. And John Prisco is CEO at QuantumXchange, a provider of what they claim is unbreakable quantum-safe encryption.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1753</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6dcb2e51eaa64774891779eff08f878a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8260249408.mp3?updated=1656711854" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Infrastructure security, especially power, finance, and elections. Preparation pays off. Proofpoint warns of new AZORult malware. Check Point tracks Master134 malvertising. Crime news. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/652/notes</link>
      <description>In today's podcast we hear more warnings about Russian cyber operators in the North American power grid. The US Department of Homeland Security announces formation of a National Risk Management Center. Cosco's preparation may have rendered the shipper more resilient to the cyberattack it sustained. Congress worries over election hacking and deep fakes. Electronic warfare is back. An alt-coin platform is hacked, a carder goes to jail, an alleged sim-swapper is arrested, and coaches behave badly.  Johannes Ullrich from SANS and the ISC Stormcast podcast on TLS 1.3 implementation. Guest is Mark Orlando from Raytheon on critical infrastructure security. 
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_31.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 31 Jul 2018 19:11:52 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>652</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8e0c5628-def8-11ea-911f-d358a5895be8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Infrastructure security, especially power, finance, and elections. Preparation pays off. Proofpoint warns of new AZORult malware. Check Point tracks Master134 malvertising. Crime news. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear more warnings about Russian cyber operators in the North American power grid. The US Department of Homeland Security announces formation of a National Risk Management Center. Cosco's preparation may have rendered the shipper more resilient to the cyberattack it sustained. Congress worries over election hacking and deep fakes. Electronic warfare is back. An alt-coin platform is hacked, a carder goes to jail, an alleged sim-swapper is arrested, and coaches behave badly.  Johannes Ullrich from SANS and the ISC Stormcast podcast on TLS 1.3 implementation. Guest is Mark Orlando from Raytheon on critical infrastructure security. 
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_31.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear more warnings about Russian cyber operators in the North American power grid. The US Department of Homeland Security announces formation of a National Risk Management Center. Cosco's preparation may have rendered the shipper more resilient to the cyberattack it sustained. Congress worries over election hacking and deep fakes. Electronic warfare is back. An alt-coin platform is hacked, a carder goes to jail, an alleged sim-swapper is arrested, and coaches behave badly.  Johannes Ullrich from SANS and the ISC Stormcast podcast on TLS 1.3 implementation. Guest is Mark Orlando from Raytheon on critical infrastructure security. </p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_31.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1241</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[de4ba6b233fa4dd1b8952e3e1545bf1f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7155964176.mp3?updated=1689947020" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>NetSpectre proof-of-concept. Election hacking, in the US and Australia. Cyber industrial espionage. Cyber threats to power grids. Hacking JPay. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/651/notes</link>
      <description>In today's podcast, we hear about NetSpectre, a new speculative execution proof-of-concept. Australia's Electoral Commission says there were no signs of hacking recent by-elections. US states remain concerned about election hacking. Missouri Senator McCaskill confirms that Fancy Bear made an unsuccessful attempt to access her staff's network. Russian threats to power grids. Industrial espionage continues to go after corporate IP. And news you can use about JPay (we know: you're asking for a friend). Jonathan Katz from UMD on the timeline for practical quantum computers. 
 For links to all of these stories check out our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_30.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 30 Jul 2018 18:02:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>651</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8e1eb58e-def8-11ea-911f-2f68010b1b29/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>NetSpectre proof-of-concept. Election hacking, in the US and Australia. Cyber industrial espionage. Cyber threats to power grids. Hacking JPay. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about NetSpectre, a new speculative execution proof-of-concept. Australia's Electoral Commission says there were no signs of hacking recent by-elections. US states remain concerned about election hacking. Missouri Senator McCaskill confirms that Fancy Bear made an unsuccessful attempt to access her staff's network. Russian threats to power grids. Industrial espionage continues to go after corporate IP. And news you can use about JPay (we know: you're asking for a friend). Jonathan Katz from UMD on the timeline for practical quantum computers. 
 For links to all of these stories check out our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_30.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about NetSpectre, a new speculative execution proof-of-concept. Australia's Electoral Commission says there were no signs of hacking recent by-elections. US states remain concerned about election hacking. Missouri Senator McCaskill confirms that Fancy Bear made an unsuccessful attempt to access her staff's network. Russian threats to power grids. Industrial espionage continues to go after corporate IP. And news you can use about JPay (we know: you're asking for a friend). Jonathan Katz from UMD on the timeline for practical quantum computers. </p> <p>For links to all of these stories check out our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_30.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1042</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4ba8928de52a4ae89f60daac35b86aba]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6513915689.mp3?updated=1689947004" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BabaYaga strangely symbiotic Wordpress malware. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/46/notes</link>
      <description>Researchers at Defiant recently analyzed a malware family they named "BabaYaga," which has the curious behavior of clearing out other malware and keeping infected sites up to date.
Brad Hass is a senior security analyst at Defiant, and he guides us through their findings.
The research can be found here:
 https://www.wordfence.com/blog/2018/06/babayaga-wordpress-malware/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Jul 2018 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>46</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/39e458c8-df0e-11ea-9dfb-f3d15769a9af/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>BabaYaga strangely symbiotic Wordpress malware</itunes:subtitle>
      <itunes:summary>Researchers at Defiant recently analyzed a malware family they named "BabaYaga," which has the curious behavior of clearing out other malware and keeping infected sites up to date.
Brad Hass is a senior security analyst at Defiant, and he guides us through their findings.
The research can be found here:
 https://www.wordfence.com/blog/2018/06/babayaga-wordpress-malware/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Defiant recently analyzed a malware family they named "BabaYaga," which has the curious behavior of clearing out other malware and keeping infected sites up to date.</p><p>Brad Hass is a senior security analyst at Defiant, and he guides us through their findings.</p><p>The research can be found here:</p><p><a href="https://www.wordfence.com/blog/2018/06/babayaga-wordpress-malware/"> https://www.wordfence.com/blog/2018/06/babayaga-wordpress-malware/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1387</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5fc5e61710a84b908630b29dbeb9b566]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7176865137.mp3?updated=1685022509" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fancy Bear sniffs around Senatorial staffs. US NSC considers Russian election interference. Chinese and Iranian cyberespionage. Malware loaders. Smart home bugs. Stealing WiFi. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/650/notes</link>
      <description>In today's podcast we learn that Fancy Bear is said to be snuffling around at least one US Senatorial office. The US National Security Council meets to consider Russian election interference. Notes on Chinese and Iranian cyberespionage. New malware loaders are offered on the black market. Smart home hubs are shown to be hackable. Tenable enjoys a good IPO. A burglar in Silicon Valley didn't say, your money or your life, but rather, dude I'm outta data—can I have your WiFi password? Dr. Charles Clancy from VA Tech on the security aspects of digital vs analog RF spectrum. Guest is Lisa Beegle from Akamai with info from their State of Internet Security report. 
 For link to all of today's stories check out the CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_27.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 27 Jul 2018 20:14:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>650</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8e356644-def8-11ea-911f-4b2a9514658e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fancy Bear sniffs around Senatorial staffs. US NSC considers Russian election interference. Chinese and Iranian cyberespionage. Malware loaders. Smart home bugs. Stealing WiFi. </itunes:subtitle>
      <itunes:summary>In today's podcast we learn that Fancy Bear is said to be snuffling around at least one US Senatorial office. The US National Security Council meets to consider Russian election interference. Notes on Chinese and Iranian cyberespionage. New malware loaders are offered on the black market. Smart home hubs are shown to be hackable. Tenable enjoys a good IPO. A burglar in Silicon Valley didn't say, your money or your life, but rather, dude I'm outta data—can I have your WiFi password? Dr. Charles Clancy from VA Tech on the security aspects of digital vs analog RF spectrum. Guest is Lisa Beegle from Akamai with info from their State of Internet Security report. 
 For link to all of today's stories check out the CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_27.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we learn that Fancy Bear is said to be snuffling around at least one US Senatorial office. The US National Security Council meets to consider Russian election interference. Notes on Chinese and Iranian cyberespionage. New malware loaders are offered on the black market. Smart home hubs are shown to be hackable. Tenable enjoys a good IPO. A burglar in Silicon Valley didn't say, your money or your life, but rather, dude I'm outta data—can I have your WiFi password? Dr. Charles Clancy from VA Tech on the security aspects of digital vs analog RF spectrum. Guest is Lisa Beegle from Akamai with info from their State of Internet Security report. </p> <p>For link to all of today's stories check out the CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_27.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1388</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b5083b7c3024ad8be49987e27b512b6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4801618989.mp3?updated=1608755177" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>LifeLock closes proof-of-concept hole. US-CERT warns of active campaigns against ERP applications. Ad blockers may function as spyware. Parasite HTTP RAT. Underminer EK. NSA's IG scowls. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/649/notes</link>
      <description>In today's podcast we hear that LifeLock gets locked down—probably no harm done, maybe. US-CERT warns of active campaigns against ERP applications. Ad blockers may be doubling as spyware. A new RAT gnaws away at corporate HR departments. Underminer shows that exploit kits aren't obsolete after all. NSA gets a bad report from its IG. Congress worries over Russian infrastructure reconnaissance and influence operations. Iran's OilRig and Leafminer remain active regional threats. Joe Carrigan from JHU ISI on infosec pros reusing passwords. Guest is Jessica Ortega from SiteLock, discussing how having social media icons on your website increases the odds of falling victim to attacks.  
 For links to stories in today's podcast check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_26.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 26 Jul 2018 19:35:50 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>649</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8e4ad2ae-def8-11ea-911f-9392d2973761/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>LifeLock closes proof-of-concept hole. US-CERT warns of active campaigns against ERP applications. Ad blockers may function as spyware. Parasite HTTP RAT. Underminer EK. NSA's IG scowls. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that LifeLock gets locked down—probably no harm done, maybe. US-CERT warns of active campaigns against ERP applications. Ad blockers may be doubling as spyware. A new RAT gnaws away at corporate HR departments. Underminer shows that exploit kits aren't obsolete after all. NSA gets a bad report from its IG. Congress worries over Russian infrastructure reconnaissance and influence operations. Iran's OilRig and Leafminer remain active regional threats. Joe Carrigan from JHU ISI on infosec pros reusing passwords. Guest is Jessica Ortega from SiteLock, discussing how having social media icons on your website increases the odds of falling victim to attacks.  
 For links to stories in today's podcast check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_26.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that LifeLock gets locked down—probably no harm done, maybe. US-CERT warns of active campaigns against ERP applications. Ad blockers may be doubling as spyware. A new RAT gnaws away at corporate HR departments. Underminer shows that exploit kits aren't obsolete after all. NSA gets a bad report from its IG. Congress worries over Russian infrastructure reconnaissance and influence operations. Iran's OilRig and Leafminer remain active regional threats. Joe Carrigan from JHU ISI on infosec pros reusing passwords. Guest is Jessica Ortega from SiteLock, discussing how having social media icons on your website increases the odds of falling victim to attacks.  </p> <p>For links to stories in today's podcast check out our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_26.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1270</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ca73ee9f4f75401c8582a6a3356d7498]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4112492500.mp3?updated=1689947081" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leafminer wants to learn from the best, and that's not good. Shipper hacked. Old malware resurfaces in improved form. Russian grid and election threats. What insurance covers. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/648/notes</link>
      <description>In today's podcast, we hear that Leafminer is infesting networks in the Middle East. Red Alert, Kronos, Mirai, and Gafgyt make their reappearance in new forms. Shipping firm Cosco is dealing with a cyberattack. US officials raise warnings about Russian threats to the power grid and elections. Congress considers cyber retaliation. A dispute over cyber insurance coverage lands the insured and the insurer in court. Awais Rashid from Bristol University on IoT and OT convergence. Guest is Jason Morgan from Wiretap on their Human Behavior Risk Analysis Report. 
  For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_25.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 25 Jul 2018 20:20:22 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>648</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8e653284-def8-11ea-911f-d3329d81699b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Leafminer wants to learn from the best, and that's not good. Shipper hacked. Old malware resurfaces in improved form. Russian grid and election threats. What insurance covers. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Leafminer is infesting networks in the Middle East. Red Alert, Kronos, Mirai, and Gafgyt make their reappearance in new forms. Shipping firm Cosco is dealing with a cyberattack. US officials raise warnings about Russian threats to the power grid and elections. Congress considers cyber retaliation. A dispute over cyber insurance coverage lands the insured and the insurer in court. Awais Rashid from Bristol University on IoT and OT convergence. Guest is Jason Morgan from Wiretap on their Human Behavior Risk Analysis Report. 
  For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_25.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Leafminer is infesting networks in the Middle East. Red Alert, Kronos, Mirai, and Gafgyt make their reappearance in new forms. Shipping firm Cosco is dealing with a cyberattack. US officials raise warnings about Russian threats to the power grid and elections. Congress considers cyber retaliation. A dispute over cyber insurance coverage lands the insured and the insurer in court. Awais Rashid from Bristol University on IoT and OT convergence. Guest is Jason Morgan from Wiretap on their Human Behavior Risk Analysis Report. </p> <p> For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_25.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1293</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3fd60ac5428642a2ae23dd849a3306e7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6153711965.mp3?updated=1689946954" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Warnings of Russian cyber threat to power grids. Phishing rises. Patch gets patched. SingHealth breach. Satori botnet. Bluetooth MitM. Evil maids? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/647/notes</link>
      <description>In today's podcast, we hear that warnings of Russian prep for an attack on power grids become more pointed. Phishing and impersonation attacks continue to rise. Microsoft patches a patch. The SingHealth breach remains under investigation. The Satori botnet may be taking another run at Android devices. Bluetooth vulnerabilities render paired devices susceptible to man-in-the-middle attacks. And evil maid attacks may be less difficult than you thought. Emily Wilson from Terbium Labs, sharing her experience attending a conference for professionals working to fight fraud. Guest is Brian Martin from Risk Based Security with their research on vulnerabilities they discovered with the Click2Gov service.  
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_24.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Jul 2018 19:48:32 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>647</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8e7d0e2c-def8-11ea-911f-df5e35e7ee0b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Warnings of Russian cyber threat to power grids. Phishing rises. Patch gets patched. SingHealth breach. Satori botnet. Bluetooth MitM. Evil maids? </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that warnings of Russian prep for an attack on power grids become more pointed. Phishing and impersonation attacks continue to rise. Microsoft patches a patch. The SingHealth breach remains under investigation. The Satori botnet may be taking another run at Android devices. Bluetooth vulnerabilities render paired devices susceptible to man-in-the-middle attacks. And evil maid attacks may be less difficult than you thought. Emily Wilson from Terbium Labs, sharing her experience attending a conference for professionals working to fight fraud. Guest is Brian Martin from Risk Based Security with their research on vulnerabilities they discovered with the Click2Gov service.  
 For links to all of today's stories check out our CyberWire daily news brief:
  https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_24.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that warnings of Russian prep for an attack on power grids become more pointed. Phishing and impersonation attacks continue to rise. Microsoft patches a patch. The SingHealth breach remains under investigation. The Satori botnet may be taking another run at Android devices. Bluetooth vulnerabilities render paired devices susceptible to man-in-the-middle attacks. And evil maid attacks may be less difficult than you thought. Emily Wilson from Terbium Labs, sharing her experience attending a conference for professionals working to fight fraud. Guest is Brian Martin from Risk Based Security with their research on vulnerabilities they discovered with the Click2Gov service.  </p> <p>For links to all of today's stories check out our CyberWire daily news brief:</p> <p> https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_24.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1267</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5f424ec2f85546eda872bc248d37e31b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5034564058.mp3?updated=1689946940" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SingHealth breach hits Singapore. Manufacturers afflicted with third-party data exposure. Aspen Security Forum takes cyber threats seriously. Ecuador may withdraw asylum from Assange. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/646/notes</link>
      <description>In today's podcast we hear that Singapore's SingHealth has sustained a major data breach: authorities speculate it may have been the work of a nation-state yet to be determined (or at least named). A third-party data exposure affects major manufacturers, including car makers. The Aspen Security Forum concludes with sobering warnings from senior US Government officials and the private sector of election interference and the prospects of a "cyber 9/11." Ecuador may be tiring of Mr. Assange. Rick Howard from Palo Alto Networks revisiting the notion of a metaphorical cyber moon-shot. 
  For links to all of today's stories check out our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_23.html 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 23 Jul 2018 18:03:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>646</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8ea25a56-def8-11ea-911f-d76c23ca17f6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>SingHealth breach hits Singapore. Manufacturers afflicted with third-party data exposure. Aspen Security Forum takes cyber threats seriously. Ecuador may withdraw asylum from Assange. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Singapore's SingHealth has sustained a major data breach: authorities speculate it may have been the work of a nation-state yet to be determined (or at least named). A third-party data exposure affects major manufacturers, including car makers. The Aspen Security Forum concludes with sobering warnings from senior US Government officials and the private sector of election interference and the prospects of a "cyber 9/11." Ecuador may be tiring of Mr. Assange. Rick Howard from Palo Alto Networks revisiting the notion of a metaphorical cyber moon-shot. 
  For links to all of today's stories check out our CyberWire daily news brief: https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_23.html 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Singapore's SingHealth has sustained a major data breach: authorities speculate it may have been the work of a nation-state yet to be determined (or at least named). A third-party data exposure affects major manufacturers, including car makers. The Aspen Security Forum concludes with sobering warnings from senior US Government officials and the private sector of election interference and the prospects of a "cyber 9/11." Ecuador may be tiring of Mr. Assange. Rick Howard from Palo Alto Networks revisiting the notion of a metaphorical cyber moon-shot. </p> <p> For links to all of today's stories check out our CyberWire daily news brief:<br> https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_23.html<br> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>946</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aaf58061f7cd4c39bdadce561ca31a07]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6892462687.mp3?updated=1689946991" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Measuring the spearphishing threat. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/45/notes</link>
      <description>Researchers Gang Wang and Hang Hu from Virginia Tech recently conducted an end-to-end measurement on 35 popular email providers and examining user reactions to spoofing through a real-world spoofing/phishing test. Gang Wang joins us to share the sobering results.
End-to-End Measurements of Email Spoofing Attacks
https://people.cs.vt.edu/gangwang/usenix-draft.pdf
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Jul 2018 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>45</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/38b561e0-df0e-11ea-a697-7f73712bad25/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Measuring the spearphishing threat</itunes:subtitle>
      <itunes:summary>Researchers Gang Wang and Hang Hu from Virginia Tech recently conducted an end-to-end measurement on 35 popular email providers and examining user reactions to spoofing through a real-world spoofing/phishing test. Gang Wang joins us to share the sobering results.
End-to-End Measurements of Email Spoofing Attacks
https://people.cs.vt.edu/gangwang/usenix-draft.pdf
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers Gang Wang and Hang Hu from Virginia Tech recently conducted an end-to-end measurement on 35 popular email providers and examining user reactions to spoofing through a real-world spoofing/phishing test. Gang Wang joins us to share the sobering results.</p><p>End-to-End Measurements of Email Spoofing Attacks</p><p><a href="https://people.cs.vt.edu/gangwang/usenix-draft.pdf">https://people.cs.vt.edu/gangwang/usenix-draft.pdf</a></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1578</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[69003e972cee40b8a064f638b2ca698c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9025104282.mp3?updated=1685022539" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage and influence operations. Big botnet assembled in less than a day. Monetizing stolen paycards through online games. Amazon nudges developers. Report on Huawei. Phishing notes. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/645/notes</link>
      <description>In today's podcast we hear that the US Intelligence Community remains convinced the Bears are up to no good. Finland experienced elevated rates of cyberattack during the Helsinki summit, mostly Chinese espionage. The hacker "Anarchy" assembled an 18,000-member botnet in less than a day, using known vulnerabilities. Crooks monetize stolen credit cards through online games. Amazon works to induce better AWS configurations. Annual UK report on Huawei is out. Phishing campaign notes. Zulfikar Ranzan from RSA on cyber risk quantification. Guest is Mark Peters II, author of the book Cashing in on Cyber Power. 
 For links to all of today's stories, check out our CyberWire daily news brief. https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_20.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 20 Jul 2018 20:05:55 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>645</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8ebbf7b8-def8-11ea-911f-438e9bdeecd3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyberespionage and influence operations. Big botnet assembled in less than a day. Monetizing stolen paycards through online games. Amazon nudges developers. Report on Huawei. Phishing notes. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that the US Intelligence Community remains convinced the Bears are up to no good. Finland experienced elevated rates of cyberattack during the Helsinki summit, mostly Chinese espionage. The hacker "Anarchy" assembled an 18,000-member botnet in less than a day, using known vulnerabilities. Crooks monetize stolen credit cards through online games. Amazon works to induce better AWS configurations. Annual UK report on Huawei is out. Phishing campaign notes. Zulfikar Ranzan from RSA on cyber risk quantification. Guest is Mark Peters II, author of the book Cashing in on Cyber Power. 
 For links to all of today's stories, check out our CyberWire daily news brief. https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_20.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that the US Intelligence Community remains convinced the Bears are up to no good. Finland experienced elevated rates of cyberattack during the Helsinki summit, mostly Chinese espionage. The hacker "Anarchy" assembled an 18,000-member botnet in less than a day, using known vulnerabilities. Crooks monetize stolen credit cards through online games. Amazon works to induce better AWS configurations. Annual UK report on Huawei is out. Phishing campaign notes. Zulfikar Ranzan from RSA on cyber risk quantification. Guest is Mark Peters II, author of the book Cashing in on Cyber Power. </p> <p>For links to all of today's stories, check out our CyberWire daily news brief.<br> https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_20.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1399</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[88c87de0f60049ebae49ce49cba597c5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6140880663.mp3?updated=1608755180" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fancy Bear's Roman Holiday. RAT phishing in Ukraine. AWS S3 bucket leaks robocaller data. Bug or abuse? NIST to withdraw outdated cybersecurity publications. Content moderation. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/644/notes</link>
      <description>In today's podcast, we hear that Fancy Bear has taken a Roman Holiday, and the Italian Navy may be taking note. A criminal espionage campaign is underway, with Ukraine's government as its target. An exposed AWS S3 bucket leaks voter information. A security firm and a vendor dispute whether an issue is a vulnerability or a case of user abuse. NIST announces its intention of withdrawing some obsolete cybersecurity publications. Congress presses tech companies about content moderation. Daniel Prince from Lancaster University on rewriting digital histories. Guest is Matt Cauthorn from ExtraHop on a new worm spreading through Android devices.  
 For links to all of today's stories, check out the CyberWire daily news brief - 
  https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_19.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 19 Jul 2018 19:53:37 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>644</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8ed724ac-def8-11ea-911f-2fb976dc593d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fancy Bear's Roman Holiday. RAT phishing in Ukraine. AWS S3 bucket leaks robocaller data. Bug or abuse? NIST to withdraw outdated cybersecurity publications. Content moderation. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Fancy Bear has taken a Roman Holiday, and the Italian Navy may be taking note. A criminal espionage campaign is underway, with Ukraine's government as its target. An exposed AWS S3 bucket leaks voter information. A security firm and a vendor dispute whether an issue is a vulnerability or a case of user abuse. NIST announces its intention of withdrawing some obsolete cybersecurity publications. Congress presses tech companies about content moderation. Daniel Prince from Lancaster University on rewriting digital histories. Guest is Matt Cauthorn from ExtraHop on a new worm spreading through Android devices.  
 For links to all of today's stories, check out the CyberWire daily news brief - 
  https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_19.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Fancy Bear has taken a Roman Holiday, and the Italian Navy may be taking note. A criminal espionage campaign is underway, with Ukraine's government as its target. An exposed AWS S3 bucket leaks voter information. A security firm and a vendor dispute whether an issue is a vulnerability or a case of user abuse. NIST announces its intention of withdrawing some obsolete cybersecurity publications. Congress presses tech companies about content moderation. Daniel Prince from Lancaster University on rewriting digital histories. Guest is Matt Cauthorn from ExtraHop on a new worm spreading through Android devices.  </p> <p>For links to all of today's stories, check out the CyberWire daily news brief - </p> <p> https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_19.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1265</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4ae6bac2921242d6b99133252db9e370]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6082252921.mp3?updated=1689946974" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Magnibur ransomware spreads. LabCorp discloses suspicious incident on its networks. Spectre, Meltdown notes. Oracle patches. Helsinki summit backing and filling and backing. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/643/notes</link>
      <description>In today's podcast, we hear about the spread of Magnibur ransomware. LabCorp discloses "suspicious activity" on its networks. The Pentagon will add cybersecurity checks to its test and evaluation process. Siemens updates customers on Spectre and Meltdown. Oracle's quarterly patch bulletin is out. Fallout, clarifications, and more fallout from the Helsinki summit. US agencies continue preparations to secure elections and infrastructure. Robert M. Lee from Dragos on the Electrum threat group. Guest is Jonathan Couch from Threat Quotient on Dark Web markets.  
 For links to stories in today's CyberWire podcast, check out our daily news brief.
  https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_18.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 18 Jul 2018 19:17:58 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>643</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8ef136e4-def8-11ea-911f-d33880a4cc6b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Magnibur ransomware spreads. LabCorp discloses suspicious incident on its networks. Spectre, Meltdown notes. Oracle patches. Helsinki summit backing and filling and backing. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about the spread of Magnibur ransomware. LabCorp discloses "suspicious activity" on its networks. The Pentagon will add cybersecurity checks to its test and evaluation process. Siemens updates customers on Spectre and Meltdown. Oracle's quarterly patch bulletin is out. Fallout, clarifications, and more fallout from the Helsinki summit. US agencies continue preparations to secure elections and infrastructure. Robert M. Lee from Dragos on the Electrum threat group. Guest is Jonathan Couch from Threat Quotient on Dark Web markets.  
 For links to stories in today's CyberWire podcast, check out our daily news brief.
  https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_18.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about the spread of Magnibur ransomware. LabCorp discloses "suspicious activity" on its networks. The Pentagon will add cybersecurity checks to its test and evaluation process. Siemens updates customers on Spectre and Meltdown. Oracle's quarterly patch bulletin is out. Fallout, clarifications, and more fallout from the Helsinki summit. US agencies continue preparations to secure elections and infrastructure. Robert M. Lee from Dragos on the Electrum threat group. Guest is Jonathan Couch from Threat Quotient on Dark Web markets.  </p> <p>For links to stories in today's CyberWire podcast, check out our daily news brief.</p> <p> https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_18.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1255</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4a7076065e7a4b6ead3d9406ffce6659]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2118394625.mp3?updated=1689946995" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trump-Putin summit. East Asian cyberespionage campaigns. Vulnerable DVRs. Concern about census security. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/642/notes</link>
      <description>In today's podcast we review fallout from the Trump-Putin summit. Cyberespionage campaigns resurface in East Asia—at least one of them originates in North Korea. Telefonica sustains a major data breach of Spanish customers' details. Passwords to DVRs are found cached in an IoT search engine. Those DVRs' firmware is also vulnerable to exploitation. The US Census Bureau is asked to provide an overview of measures being taken to secure the 2020 census. David Dufour from Webroot on ransomware in the UK. Guest is James Tabor from MEDIA Protocol on using blockchain technology with online advertising.  
 For links to all of the stories mentioned in today's podcast, check out our CyberWire daily news brief -  https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_17.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Jul 2018 19:36:50 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>642</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8f062e14-def8-11ea-911f-a7a59456ebce/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Trump-Putin summit. East Asian cyberespionage campaigns. Vulnerable DVRs. Concern about census security. </itunes:subtitle>
      <itunes:summary>In today's podcast we review fallout from the Trump-Putin summit. Cyberespionage campaigns resurface in East Asia—at least one of them originates in North Korea. Telefonica sustains a major data breach of Spanish customers' details. Passwords to DVRs are found cached in an IoT search engine. Those DVRs' firmware is also vulnerable to exploitation. The US Census Bureau is asked to provide an overview of measures being taken to secure the 2020 census. David Dufour from Webroot on ransomware in the UK. Guest is James Tabor from MEDIA Protocol on using blockchain technology with online advertising.  
 For links to all of the stories mentioned in today's podcast, check out our CyberWire daily news brief -  https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_17.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we review fallout from the Trump-Putin summit. Cyberespionage campaigns resurface in East Asia—at least one of them originates in North Korea. Telefonica sustains a major data breach of Spanish customers' details. Passwords to DVRs are found cached in an IoT search engine. Those DVRs' firmware is also vulnerable to exploitation. The US Census Bureau is asked to provide an overview of measures being taken to secure the 2020 census. David Dufour from Webroot on ransomware in the UK. Guest is James Tabor from MEDIA Protocol on using blockchain technology with online advertising.  </p> <p>For links to all of the stories mentioned in today's podcast, check out our CyberWire daily news brief - <br> https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_17.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1279</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d396fb5c0d8e4c8bb673352b6664e7a1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7301159647.mp3?updated=1689946874" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DNI warns of cyber threats. Russo-US summit. Mueller investigation and indictments. Huawei agonists. Congress reconsiders ZTE reinstatement. Kaspersky receives no emergency ban relief. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/641/notes</link>
      <description>DNI says "warning lights are blinking red" over cyber threats. Election interference remains a risk despite lower than expected levels of threat activity. Presidents Trump and Putin meet in Helsinki. Notes on the Mueller investigation and the GRU indictments. Huawei, under suspicion over African cyberespionage, is said to be excluded from participation in Australian 5G buildout. Congress may reimpose ban on ZTE. Kaspersky fails to win emergency injunction against US sanctions. Ben Yelin from UMD CHHS, weighing in on the indictments of the Russians. 
 For links to all of the stories mentioned in this podcast, visit our daily news brief on our web page.
  https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_16.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 16 Jul 2018 18:42:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>641</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8f20c35a-def8-11ea-911f-23d9bdfe84cd/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>DNI warns of cyber threats. Russo-US summit. Mueller investigation and indictments. Huawei agonists. Congress reconsiders ZTE reinstatement. Kaspersky receives no emergency ban relief. </itunes:subtitle>
      <itunes:summary>DNI says "warning lights are blinking red" over cyber threats. Election interference remains a risk despite lower than expected levels of threat activity. Presidents Trump and Putin meet in Helsinki. Notes on the Mueller investigation and the GRU indictments. Huawei, under suspicion over African cyberespionage, is said to be excluded from participation in Australian 5G buildout. Congress may reimpose ban on ZTE. Kaspersky fails to win emergency injunction against US sanctions. Ben Yelin from UMD CHHS, weighing in on the indictments of the Russians. 
 For links to all of the stories mentioned in this podcast, visit our daily news brief on our web page.
  https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_16.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>DNI says "warning lights are blinking red" over cyber threats. Election interference remains a risk despite lower than expected levels of threat activity. Presidents Trump and Putin meet in Helsinki. Notes on the Mueller investigation and the GRU indictments. Huawei, under suspicion over African cyberespionage, is said to be excluded from participation in Australian 5G buildout. Congress may reimpose ban on ZTE. Kaspersky fails to win emergency injunction against US sanctions. Ben Yelin from UMD CHHS, weighing in on the indictments of the Russians. </p> <p>For links to all of the stories mentioned in this podcast, visit our daily news brief on our web page.</p> <p> https://thecyberwire.com/issues/issues2018/July/CyberWire_2018_07_16.html</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1251</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0b526bfdda724588be25b471a4cfb33a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5434331494.mp3?updated=1689946861" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A new approach to mission critical systems.</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/44/notes</link>
      <description>Andy Bochman is senior grid strategist for Idaho National Lab’s National and Homeland Security directorate. Today we’re discussing the research the INL has been doing, developing new approaches to protecting mission critical systems.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Jul 2018 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>44</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/2fbd76d6-df0e-11ea-9fc1-7f8cc2fb63e5/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A new approach to mission critical systems</itunes:subtitle>
      <itunes:summary>Andy Bochman is senior grid strategist for Idaho National Lab’s National and Homeland Security directorate. Today we’re discussing the research the INL has been doing, developing new approaches to protecting mission critical systems.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Andy Bochman is senior grid strategist for Idaho National Lab’s National and Homeland Security directorate. Today we’re discussing the research the INL has been doing, developing new approaches to protecting mission critical systems.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1434</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a3c46cc50e864a34ae54df8ab13591c4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2969524791.mp3?updated=1685022494" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fancy Bear indictments. VPNFilter found in Ukrainian water-treatment chlorine plant. Comment spam. Speculative execution side-channel attacks. MDM exploits in India.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/640/notes</link>
      <description>In today's podcast, we hear that Special Counsel Mueller has secured an indictment of twelve Russian intelligence officers for hacking during the 2016 US presidential elections. Ukraine finds VPNFilter in a water treatment facility. Comment spam returns. Speculative execution issues. Mobile-device-management tool used against smartphone users in India. The US Army directly commissions two cyber operators—congratulations, First Lieutenants. Ben Yelin from UMD CHHS on California’s consumer privacy ballot measure. Guest is Martin Hellman, professor emeritus at Stanford University and known for his work on Diffie–Hellman key exchange. His new book is A New Map for Relationships: Creating True Love at Home and Peace on the Planet. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 13 Jul 2018 20:07:45 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>640</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8f41f57a-def8-11ea-911f-53d99180d9fd/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fancy Bear indictments. VPNFilter found in Ukrainian water-treatment chlorine plant. Comment spam. Speculative execution side-channel attacks. MDM exploits in India.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Special Counsel Mueller has secured an indictment of twelve Russian intelligence officers for hacking during the 2016 US presidential elections. Ukraine finds VPNFilter in a water treatment facility. Comment spam returns. Speculative execution issues. Mobile-device-management tool used against smartphone users in India. The US Army directly commissions two cyber operators—congratulations, First Lieutenants. Ben Yelin from UMD CHHS on California’s consumer privacy ballot measure. Guest is Martin Hellman, professor emeritus at Stanford University and known for his work on Diffie–Hellman key exchange. His new book is A New Map for Relationships: Creating True Love at Home and Peace on the Planet. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Special Counsel Mueller has secured an indictment of twelve Russian intelligence officers for hacking during the 2016 US presidential elections. Ukraine finds VPNFilter in a water treatment facility. Comment spam returns. Speculative execution issues. Mobile-device-management tool used against smartphone users in India. The US Army directly commissions two cyber operators—congratulations, First Lieutenants. Ben Yelin from UMD CHHS on California’s consumer privacy ballot measure. Guest is Martin Hellman, professor emeritus at Stanford University and known for his work on Diffie–Hellman key exchange. His new book is A New Map for Relationships: Creating True Love at Home and Peace on the Planet. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1579</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b33f8fd00a7e4557ac20fafa909662d0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5334226128.mp3?updated=1608755182" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Timehop refines its breach disclosure. Speculative execution side-channel attacks described. Tech manuals offered for sale on the dark web. Twitter versus bots. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/639/notes</link>
      <description>In today's podcast, we hear that Timehop has released more information as its breach investigation proceeds. The case will be interesting as an indicator of what GDPR enforcement will look like. Two speculative execution side-channel attacks are described (in the lab, but not yet, it's believed, in the wild). The US Senate's flesh creeps over bug disclosure practices. Someone uses a Netgear exploit to get some US technical manuals. Twitter goes to work against bogus accounts. Mike Benjamin from CenturyLink on cryptojacking. Guest is Yaniv Avidan from MinerEye on cloud GDPR compliance.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 12 Jul 2018 19:39:14 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>639</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8f5cb4f0-def8-11ea-911f-4bbc25e5e9d3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Timehop refines its breach disclosure. Speculative execution side-channel attacks described. Tech manuals offered for sale on the dark web. Twitter versus bots. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Timehop has released more information as its breach investigation proceeds. The case will be interesting as an indicator of what GDPR enforcement will look like. Two speculative execution side-channel attacks are described (in the lab, but not yet, it's believed, in the wild). The US Senate's flesh creeps over bug disclosure practices. Someone uses a Netgear exploit to get some US technical manuals. Twitter goes to work against bogus accounts. Mike Benjamin from CenturyLink on cryptojacking. Guest is Yaniv Avidan from MinerEye on cloud GDPR compliance.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Timehop has released more information as its breach investigation proceeds. The case will be interesting as an indicator of what GDPR enforcement will look like. Two speculative execution side-channel attacks are described (in the lab, but not yet, it's believed, in the wild). The US Senate's flesh creeps over bug disclosure practices. Someone uses a Netgear exploit to get some US technical manuals. Twitter goes to work against bogus accounts. Mike Benjamin from CenturyLink on cryptojacking. Guest is Yaniv Avidan from MinerEye on cloud GDPR compliance.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1273</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ac93167f65074fd1b8a00e357b82ab21]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4157399736.mp3?updated=1689946833" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ticketmaster paycard breach is part of a very large skimmer campaign. Chinese cyberespionage and censorship. Smartphone privacy issues. Data misuse litigation. Affirming the consequent. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/638/notes</link>
      <description>In today's podcast we hear reports that the Ticketmaster breach is the tip of a big software supply chain iceberg. Chinese intelligence services closely interested in Cambodia's elections. iOS crashes appear related to code designed to block displays of Taiwan's flag to users in China. Congress wants some answers on smartphone privacy from both Apple and Alphabet. Facebook's wrist is slapped in the UK. Langley Credit Union identity theft case proves not necessarily related to the OPM breach. Johannes Ullrich from SANS and the ISC Podcast on securing DNS. Guest is Ken Spinner from Varonis, cautioning that we not allow the high-profile insider threat cases distract us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 11 Jul 2018 18:59:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>638</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8f77e022-def8-11ea-911f-d730cf9e1bbd/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ticketmaster paycard breach is part of a very large skimmer campaign. Chinese cyberespionage and censorship. Smartphone privacy issues. Data misuse litigation. Affirming the consequent. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear reports that the Ticketmaster breach is the tip of a big software supply chain iceberg. Chinese intelligence services closely interested in Cambodia's elections. iOS crashes appear related to code designed to block displays of Taiwan's flag to users in China. Congress wants some answers on smartphone privacy from both Apple and Alphabet. Facebook's wrist is slapped in the UK. Langley Credit Union identity theft case proves not necessarily related to the OPM breach. Johannes Ullrich from SANS and the ISC Podcast on securing DNS. Guest is Ken Spinner from Varonis, cautioning that we not allow the high-profile insider threat cases distract us. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear reports that the Ticketmaster breach is the tip of a big software supply chain iceberg. Chinese intelligence services closely interested in Cambodia's elections. iOS crashes appear related to code designed to block displays of Taiwan's flag to users in China. Congress wants some answers on smartphone privacy from both Apple and Alphabet. Facebook's wrist is slapped in the UK. Langley Credit Union identity theft case proves not necessarily related to the OPM breach. Johannes Ullrich from SANS and the ISC Podcast on securing DNS. Guest is Ken Spinner from Varonis, cautioning that we not allow the high-profile insider threat cases distract us. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1238</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[13d9d0ad7cb14f64a1bcb964133071c7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4090638364.mp3?updated=1689946820" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More Elon Musk impersonators in social media. Cryptocurrency raided. Spearphishing in Palestine. BlackTech espionage group. Apple upgrades. Polar Flow fitness app and oversharing. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/637/notes</link>
      <description>In today's podcast, we hear that advance fee scams run by Elon Musk impersonators are using the recently rescued boys' soccer team as phishbait. Bancor wallet robbed of crytpocurrencies. Palestinian police spearphished. BlackTech espionage group using stolen certificates to sign malware. Apple's upgrades are out—one privacy enhancement has a workaround. Microsoft is in the process of patching. And another fitness app, Polar Flow, overshares.  Jonathan Katz from UMD on homomorphic encryption standards. Guests are Julie Bernard from Deloitte and John Carlson from the FS-ISAC with results from a recent FS-ISAC survey. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Jul 2018 20:04:21 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>637</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8f90c18c-def8-11ea-911f-b3b75e67bdbc/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>More Elon Musk impersonators in social media. Cryptocurrency raided. Spearphishing in Palestine. BlackTech espionage group. Apple upgrades. Polar Flow fitness app and oversharing. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that advance fee scams run by Elon Musk impersonators are using the recently rescued boys' soccer team as phishbait. Bancor wallet robbed of crytpocurrencies. Palestinian police spearphished. BlackTech espionage group using stolen certificates to sign malware. Apple's upgrades are out—one privacy enhancement has a workaround. Microsoft is in the process of patching. And another fitness app, Polar Flow, overshares.  Jonathan Katz from UMD on homomorphic encryption standards. Guests are Julie Bernard from Deloitte and John Carlson from the FS-ISAC with results from a recent FS-ISAC survey. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that advance fee scams run by Elon Musk impersonators are using the recently rescued boys' soccer team as phishbait. Bancor wallet robbed of crytpocurrencies. Palestinian police spearphished. BlackTech espionage group using stolen certificates to sign malware. Apple's upgrades are out—one privacy enhancement has a workaround. Microsoft is in the process of patching. And another fitness app, Polar Flow, overshares.  Jonathan Katz from UMD on homomorphic encryption standards. Guests are Julie Bernard from Deloitte and John Carlson from the FS-ISAC with results from a recent FS-ISAC survey. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1280</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7763a5a2c47e41b4866b2ad8ea15a7f0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8882349324.mp3?updated=1689946806" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Malware infections down during World Cup matches. UK-Russia tensions. Australian National University hacked. Data breach notes. Calls for cooperation. Tell it to the Marines. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/636/notes</link>
      <description>In today's podcast, we hear that if your nation's team was playing a World Cup match, you probably weren't visiting dodgy websites. Concerns mount in the UK that Russia may be readying a long-expected attack on British infrastructure and holding it until the Cup is decided. The Australian National University is hacked in an apparent espionage attempt. Data breaches at Timehop, DomainFactory, and Macy's. Russia calls for international cooperation. The Marines say it wasn't them on that dating app. Malek Ben Salem from Accenture Labs with tips on GDPR compliance. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 09 Jul 2018 18:54:39 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>636</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8fa857fc-def8-11ea-911f-230eb4801f9f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Malware infections down during World Cup matches. UK-Russia tensions. Australian National University hacked. Data breach notes. Calls for cooperation. Tell it to the Marines. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that if your nation's team was playing a World Cup match, you probably weren't visiting dodgy websites. Concerns mount in the UK that Russia may be readying a long-expected attack on British infrastructure and holding it until the Cup is decided. The Australian National University is hacked in an apparent espionage attempt. Data breaches at Timehop, DomainFactory, and Macy's. Russia calls for international cooperation. The Marines say it wasn't them on that dating app. Malek Ben Salem from Accenture Labs with tips on GDPR compliance. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that if your nation's team was playing a World Cup match, you probably weren't visiting dodgy websites. Concerns mount in the UK that Russia may be readying a long-expected attack on British infrastructure and holding it until the Cup is decided. The Australian National University is hacked in an apparent espionage attempt. Data breaches at Timehop, DomainFactory, and Macy's. Russia calls for international cooperation. The Marines say it wasn't them on that dating app. Malek Ben Salem from Accenture Labs with tips on GDPR compliance. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1022</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[51f4da23be2748478f2262e6093710d1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3896585531.mp3?updated=1689946792" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No Distribute Scanners help sell malware. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/43/notes</link>
      <description>Sellers of malware on Dark Web forums often use No Distribute malware scanning tools to help verify the effectiveness of their wares, while preventing legitimate virus scanning tools from adding the malware to their database.
Daniel Hatheway is a Senior Security Analyst at Recorded Future, and he takes us through their recently published research, Uncover Unseen Malware Samples with No Distribute Scanners. 
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Jul 2018 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>43</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/2c9d8f68-df0e-11ea-9fc1-6355fcff8a54/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>No Distribute Scanners help sell malware</itunes:subtitle>
      <itunes:summary>Sellers of malware on Dark Web forums often use No Distribute malware scanning tools to help verify the effectiveness of their wares, while preventing legitimate virus scanning tools from adding the malware to their database.
Daniel Hatheway is a Senior Security Analyst at Recorded Future, and he takes us through their recently published research, Uncover Unseen Malware Samples with No Distribute Scanners. 
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Sellers of malware on Dark Web forums often use No Distribute malware scanning tools to help verify the effectiveness of their wares, while preventing legitimate virus scanning tools from adding the malware to their database.</p><p>Daniel Hatheway is a Senior Security Analyst at Recorded Future, and he takes us through their recently published research, <a href="https://www.recordedfuture.com/no-distribute-scanners/">Uncover Unseen Malware Samples with No Distribute Scanners. </a></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1027</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[778e388781844433971d74dedc623f15]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7104852981.mp3?updated=1685022372" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>When catphishing, it pays to know what bait they'll take. Permission hogs are often misers. Cyber comes to the NTC. Natural intelligence screening for artificial intelligence. The Thermanator. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/635/notes</link>
      <description>In today's podcast we hear about catphishing in Berlin and Tel Aviv: whether you're offering payment for a white paper or up-to-date futbol scores, it pays to know the right bait. Android apps may be permission hogs, but it's surprising how often the hogs hoard like misers, never really using them. The US Army pushes cyber into the brigades. How Facebook checks facts. The Thermanator knows which keys you've typed from the heat your hot hand leaves behind. Emily Wilson from Terbium Labs on their recently released white paper on fraud as a supply chain. Guest is Brian Wells from Merlin International discussing how high-performing health care organizations are addressing cyber threats.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 06 Jul 2018 17:55:01 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>635</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8fba5830-def8-11ea-911f-7bd030ef6c43/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>When catphishing, it pays to know what bait they'll take. Permission hogs are often misers. Cyber comes to the NTC. Natural intelligence screening for artificial intelligence. The Thermanator. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear about catphishing in Berlin and Tel Aviv: whether you're offering payment for a white paper or up-to-date futbol scores, it pays to know the right bait. Android apps may be permission hogs, but it's surprising how often the hogs hoard like misers, never really using them. The US Army pushes cyber into the brigades. How Facebook checks facts. The Thermanator knows which keys you've typed from the heat your hot hand leaves behind. Emily Wilson from Terbium Labs on their recently released white paper on fraud as a supply chain. Guest is Brian Wells from Merlin International discussing how high-performing health care organizations are addressing cyber threats.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about catphishing in Berlin and Tel Aviv: whether you're offering payment for a white paper or up-to-date futbol scores, it pays to know the right bait. Android apps may be permission hogs, but it's surprising how often the hogs hoard like misers, never really using them. The US Army pushes cyber into the brigades. How Facebook checks facts. The Thermanator knows which keys you've typed from the heat your hot hand leaves behind. Emily Wilson from Terbium Labs on their recently released white paper on fraud as a supply chain. Guest is Brian Wells from Merlin International discussing how high-performing health care organizations are addressing cyber threats.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1423</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5d7a99d2895a4a45bf014834747e9d23]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6651852198.mp3?updated=1608755182" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Catphish and Charming Kittens. Data-sharing receives more scrutiny. European copyright law won't be fast-tracked. ZTE gets some relief. Juggalos and Juggalettes defeat facial recognition tools. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/634/notes</link>
      <description>In today's podcast we hear about some catphishing in the IDF's pond. Charming Kitten uses itself as bait. Facebook and Google face scrutiny over sharing users' information with third-parties. The Pirate Bay is back after its hiatus, and it's back to cryptojacking. The European Parliament voted today to reopen debate on its controversial copyright legislation. ZTE receives some perhaps temporary, perhaps more enduring, relief from US sanctions.  And confusion to the Muggalos' facial recognition software. Justin Harvey from Accenture with thoughts on quantum computing. Guest is Gadi Naveh from Check Point Software with a look at open source security tools. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 05 Jul 2018 18:24:32 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>634</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8fcf02d0-def8-11ea-911f-87aa433bb6ec/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Catphish and Charming Kittens. Data-sharing receives more scrutiny. European copyright law won't be fast-tracked. ZTE gets some relief. Juggalos and Juggalettes defeat facial recognition tools. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear about some catphishing in the IDF's pond. Charming Kitten uses itself as bait. Facebook and Google face scrutiny over sharing users' information with third-parties. The Pirate Bay is back after its hiatus, and it's back to cryptojacking. The European Parliament voted today to reopen debate on its controversial copyright legislation. ZTE receives some perhaps temporary, perhaps more enduring, relief from US sanctions.  And confusion to the Muggalos' facial recognition software. Justin Harvey from Accenture with thoughts on quantum computing. Guest is Gadi Naveh from Check Point Software with a look at open source security tools. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about some catphishing in the IDF's pond. Charming Kitten uses itself as bait. Facebook and Google face scrutiny over sharing users' information with third-parties. The Pirate Bay is back after its hiatus, and it's back to cryptojacking. The European Parliament voted today to reopen debate on its controversial copyright legislation. ZTE receives some perhaps temporary, perhaps more enduring, relief from US sanctions.  And confusion to the Muggalos' facial recognition software. Justin Harvey from Accenture with thoughts on quantum computing. Guest is Gadi Naveh from Check Point Software with a look at open source security tools. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1232</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d11e4d38e3a34db28aeb992a008c836d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4317417399.mp3?updated=1689946766" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hybrid warfare. Inveterate DDoS against ProtonMail. Security concerns about Chinese companies. Retail breaches. Agencies scrutinize Facebook data abuse. Infrasound weapons? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/633/notes</link>
      <description>In today's podcast we hear that Ukraine has warned of hybrid warfare during UN counter-terrorism meetings. ProtonMail DDoS continues. Security concerns surrounding ZTE, Huawei, and China Mobile. Retail data breaches. A quiz app's backup data are accessed by unauthorized parties. FBI, FTC, and SEC sift through Facebook's answers to questions for the record. A strange set of symptoms among diplomats in China arouses suspicion of infrasound weapons. Rick Howard from Palo Alto Networks on the Cyber Threat Alliance. Guest is Vince Arneja from 5nine on secure cloud implementations.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Jul 2018 18:14:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>633</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8fdfb238-def8-11ea-911f-675f287a4eb8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hybrid warfare. Inveterate DDoS against ProtonMail. Security concerns about Chinese companies. Retail breaches. Agencies scrutinize Facebook data abuse. Infrasound weapons? </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Ukraine has warned of hybrid warfare during UN counter-terrorism meetings. ProtonMail DDoS continues. Security concerns surrounding ZTE, Huawei, and China Mobile. Retail data breaches. A quiz app's backup data are accessed by unauthorized parties. FBI, FTC, and SEC sift through Facebook's answers to questions for the record. A strange set of symptoms among diplomats in China arouses suspicion of infrasound weapons. Rick Howard from Palo Alto Networks on the Cyber Threat Alliance. Guest is Vince Arneja from 5nine on secure cloud implementations.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Ukraine has warned of hybrid warfare during UN counter-terrorism meetings. ProtonMail DDoS continues. Security concerns surrounding ZTE, Huawei, and China Mobile. Retail data breaches. A quiz app's backup data are accessed by unauthorized parties. FBI, FTC, and SEC sift through Facebook's answers to questions for the record. A strange set of symptoms among diplomats in China arouses suspicion of infrasound weapons. Rick Howard from Palo Alto Networks on the Cyber Threat Alliance. Guest is Vince Arneja from 5nine on secure cloud implementations.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1201</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d29114cdb3e143abb704c9c0ee24e721]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6515719232.mp3?updated=1689946753" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Adidas data breach. Facebook on data abuse. Investigation of Exactis data exposure continues. Algonquin College hacked. Tenable's IPO. US-Russia summit will talk election influence ops. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/632/notes</link>
      <description>In today's podcast we hear a bit about the data breach Adidas disclosed late last week. Facebook answers Congressional questions for the record and adopts a data abuse bounty program. Investigation of the Exactis data exposure incident continues, but the class action lawsuits have already begun. Algonquin College discloses a hacking incident. Tenable with hold an IPO. US-Russian summit will take up election influence ops. FireEye says North Korea is hacking Latin American banks. Joe Carrigan from JHU ISI reviewing a recent Black Hat survey of cyber security industry professionals. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 02 Jul 2018 19:56:15 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>632</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8ffb8346-def8-11ea-911f-fb8d7a202fe2/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Adidas data breach. Facebook on data abuse. Investigation of Exactis data exposure continues. Algonquin College hacked. Tenable's IPO. US-Russia summit will talk election influence ops. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear a bit about the data breach Adidas disclosed late last week. Facebook answers Congressional questions for the record and adopts a data abuse bounty program. Investigation of the Exactis data exposure incident continues, but the class action lawsuits have already begun. Algonquin College discloses a hacking incident. Tenable with hold an IPO. US-Russian summit will take up election influence ops. FireEye says North Korea is hacking Latin American banks. Joe Carrigan from JHU ISI reviewing a recent Black Hat survey of cyber security industry professionals. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear a bit about the data breach Adidas disclosed late last week. Facebook answers Congressional questions for the record and adopts a data abuse bounty program. Investigation of the Exactis data exposure incident continues, but the class action lawsuits have already begun. Algonquin College discloses a hacking incident. Tenable with hold an IPO. US-Russian summit will take up election influence ops. FireEye says North Korea is hacking Latin American banks. Joe Carrigan from JHU ISI reviewing a recent Black Hat survey of cyber security industry professionals. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>987</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[428fd75f663b4bc5ad02d517dadc1533]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1841267087.mp3?updated=1689946739" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>VPNFilter malware could brick devices worldwide. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/42/notes</link>
      <description>Researchers from Cisco Talos continue to track malware they've named VPNFilter, a multi-stage infection with multiple capabilities, targeting consumer-grade routers. Craig Williams is head of Cisco Talos Outreach, and he joins us with the details. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Jun 2018 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>42</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/2b707a06-df0e-11ea-a697-e39e739522e8/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>VPNFilter malware could brick devices worldwide </itunes:subtitle>
      <itunes:summary>Researchers from Cisco Talos continue to track malware they've named VPNFilter, a multi-stage infection with multiple capabilities, targeting consumer-grade routers. Craig Williams is head of Cisco Talos Outreach, and he joins us with the details. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers from Cisco Talos continue to track <a href="https://blog.talosintelligence.com/2018/06/vpnfilter-update.html">malware they've named VPNFilter</a>, a multi-stage infection with multiple capabilities, targeting consumer-grade routers. Craig Williams is head of Cisco Talos Outreach, and he joins us with the details. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1880</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[33da6e4f73d74758816285df38fe71ee]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6376685944.mp3?updated=1685022328" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Data breaches and data exposure. Privacy legislation. Improperly collected phone call records destroyed.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/631/notes</link>
      <description>In today's podcast we hear that Ticketmaster UK's hacking incident will provide an interesting GDPR test case. Data aggregator Exactis left nearly two terabytes of personal and business information exposed on the publicly accessible Internet. NSA destroys telephone call data collected in ways it can't square with applicable law. California hastily passes a data protection law. Ave atque vale Harlon Ellison. And our condolences to the victims of the shooting at the Capital Gazette in Annapolis. Dr. Charles Clancy from VA Tech’s Hume Center, discussing his recent congressional testimony concerning supply chain security. Guest is Dr. Mansur Hasib, discussing his book Cybersecurity Leadership. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 29 Jun 2018 20:14:20 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>631</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9063a39a-def8-11ea-911f-935a88f6e448/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Data breaches and data exposure. Privacy legislation. Improperly collected phone call records destroyed.  </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Ticketmaster UK's hacking incident will provide an interesting GDPR test case. Data aggregator Exactis left nearly two terabytes of personal and business information exposed on the publicly accessible Internet. NSA destroys telephone call data collected in ways it can't square with applicable law. California hastily passes a data protection law. Ave atque vale Harlon Ellison. And our condolences to the victims of the shooting at the Capital Gazette in Annapolis. Dr. Charles Clancy from VA Tech’s Hume Center, discussing his recent congressional testimony concerning supply chain security. Guest is Dr. Mansur Hasib, discussing his book Cybersecurity Leadership. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Ticketmaster UK's hacking incident will provide an interesting GDPR test case. Data aggregator Exactis left nearly two terabytes of personal and business information exposed on the publicly accessible Internet. NSA destroys telephone call data collected in ways it can't square with applicable law. California hastily passes a data protection law. Ave atque vale Harlon Ellison. And our condolences to the victims of the shooting at the Capital Gazette in Annapolis. Dr. Charles Clancy from VA Tech’s Hume Center, discussing his recent congressional testimony concerning supply chain security. Guest is Dr. Mansur Hasib, discussing his book Cybersecurity Leadership. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1580</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f669b35f2e364a2e86072d07cf77ee03]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4022126462.mp3?updated=1608755216" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ukraine accuses Russia of preparing a cyber campaign. China eyes Tibetan diaspora. A decryptor for Thanatos ransomware. Nudging away from privacy. Dark web undercover. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/630/notes</link>
      <description>In today's podcast we hear that Ukraine has warned that Russia is preparing a coordinated attack against Ukrainian financial and energy infrastructure. China appears to be stepping up surveillance of the Tibetan diaspora. Cisco's Talos unit has a free decryptor for Thanatos ransomware. Facebook's self-audit of data usage proves both more difficult and more skeleton-rattling than hoped. Norwegian consumer watchdogs find that Facebook and Google nudge users away from privacy. An alt-coin sting against drug dealers. Mike Benjamin from CenturyLink on Malspam, and how it differs from run of the mill spam. Guest is Jaime Blasco from AlienVault on the security implications of using open source tools.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 28 Jun 2018 19:00:57 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>630</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/907b0a58-def8-11ea-911f-67f866e71725/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ukraine accuses Russia of preparing a cyber campaign. China eyes Tibetan diaspora. A decryptor for Thanatos ransomware. Nudging away from privacy. Dark web undercover. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Ukraine has warned that Russia is preparing a coordinated attack against Ukrainian financial and energy infrastructure. China appears to be stepping up surveillance of the Tibetan diaspora. Cisco's Talos unit has a free decryptor for Thanatos ransomware. Facebook's self-audit of data usage proves both more difficult and more skeleton-rattling than hoped. Norwegian consumer watchdogs find that Facebook and Google nudge users away from privacy. An alt-coin sting against drug dealers. Mike Benjamin from CenturyLink on Malspam, and how it differs from run of the mill spam. Guest is Jaime Blasco from AlienVault on the security implications of using open source tools.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Ukraine has warned that Russia is preparing a coordinated attack against Ukrainian financial and energy infrastructure. China appears to be stepping up surveillance of the Tibetan diaspora. Cisco's Talos unit has a free decryptor for Thanatos ransomware. Facebook's self-audit of data usage proves both more difficult and more skeleton-rattling than hoped. Norwegian consumer watchdogs find that Facebook and Google nudge users away from privacy. An alt-coin sting against drug dealers. Mike Benjamin from CenturyLink on Malspam, and how it differs from run of the mill spam. Guest is Jaime Blasco from AlienVault on the security implications of using open source tools.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1258</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e3259aa7844d486580d0f56ec55dc344]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3858085723.mp3?updated=1689946712" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DDoS attack on ProtonMail. Rancor cyberespionage campaign. PythonBot serves ads and a cryptominer. EU joint cyber response unit forming. Arrests in BEC campaign. Reality Winner's plea. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/629/notes</link>
      <description>In today's podcast, we hear that ProtonMail was hit this morning by an Apophis Squad DDoS attack. Rancor cyberespionage campaign observed in Southeast Asia. PythonBot serves up adware and cryptojacking. WannaCry-themed protection racket is all bark and no bite. EU organizing a joint cyber incident response force. FBI and international partners make arrests in an Africa-based business email compromise racket. Reality Winner's guilty plea. Emily Wilson from Terbium labs with a story of a six-year-old dealing with identity theft. Guest is Paul Aubin from Varonis on the protection of federal systems. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 27 Jun 2018 20:02:24 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>629</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9091998a-def8-11ea-911f-cb2fd0e17e7a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>DDoS attack on ProtonMail. Rancor cyberespionage campaign. PythonBot serves ads and a cryptominer. EU joint cyber response unit forming. Arrests in BEC campaign. Reality Winner's plea. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that ProtonMail was hit this morning by an Apophis Squad DDoS attack. Rancor cyberespionage campaign observed in Southeast Asia. PythonBot serves up adware and cryptojacking. WannaCry-themed protection racket is all bark and no bite. EU organizing a joint cyber incident response force. FBI and international partners make arrests in an Africa-based business email compromise racket. Reality Winner's guilty plea. Emily Wilson from Terbium labs with a story of a six-year-old dealing with identity theft. Guest is Paul Aubin from Varonis on the protection of federal systems. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that ProtonMail was hit this morning by an Apophis Squad DDoS attack. Rancor cyberespionage campaign observed in Southeast Asia. PythonBot serves up adware and cryptojacking. WannaCry-themed protection racket is all bark and no bite. EU organizing a joint cyber incident response force. FBI and international partners make arrests in an Africa-based business email compromise racket. Reality Winner's guilty plea. Emily Wilson from Terbium labs with a story of a six-year-old dealing with identity theft. Guest is Paul Aubin from Varonis on the protection of federal systems. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1253</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9a20d38c8abc42d5a69939be6f9dea09]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8828474878.mp3?updated=1689946699" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Romania, UK, warn of Russian cyber ops. International norms of cyber conflict. Bronze Butler's USB drives. Too-smart batteries not smart enough. Industry notes. Game cheater gets jail time. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/628/notes</link>
      <description>In today's podcast, we hear warnings of Russian cyber operations from Romania and the UK. Recent attempts at developing international rules of conduct (and conflict) in cyberspace. Bronze Butler's naughty USB drives—not as scary as they sound, but a useful reminder of some sound precautions. FireEye says it never hacked back. Smart batteries may be too smart for their users' good. A new venture fund lends credibility to cryptocurrency and blockchain startups. Overwatch hacker gets jail time in Inchon. Daniel Prince from Lancaster University on cascading failures in complex systems. Guest is Vikram Thakur from Symantec on the VPNfilter router infestation. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Jun 2018 19:59:07 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>628</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/90a6d836-def8-11ea-911f-e3a90a343068/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Romania, UK, warn of Russian cyber ops. International norms of cyber conflict. Bronze Butler's USB drives. Too-smart batteries not smart enough. Industry notes. Game cheater gets jail time. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear warnings of Russian cyber operations from Romania and the UK. Recent attempts at developing international rules of conduct (and conflict) in cyberspace. Bronze Butler's naughty USB drives—not as scary as they sound, but a useful reminder of some sound precautions. FireEye says it never hacked back. Smart batteries may be too smart for their users' good. A new venture fund lends credibility to cryptocurrency and blockchain startups. Overwatch hacker gets jail time in Inchon. Daniel Prince from Lancaster University on cascading failures in complex systems. Guest is Vikram Thakur from Symantec on the VPNfilter router infestation. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear warnings of Russian cyber operations from Romania and the UK. Recent attempts at developing international rules of conduct (and conflict) in cyberspace. Bronze Butler's naughty USB drives—not as scary as they sound, but a useful reminder of some sound precautions. FireEye says it never hacked back. Smart batteries may be too smart for their users' good. A new venture fund lends credibility to cryptocurrency and blockchain startups. Overwatch hacker gets jail time in Inchon. Daniel Prince from Lancaster University on cascading failures in complex systems. Guest is Vikram Thakur from Symantec on the VPNfilter router infestation. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1265</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1a75ab66c8ad4a908c47a5ada8debcf5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8147717971.mp3?updated=1689946683" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Nation-state cyberespionage and cybercrime. Cryptocurrency fraud and theft give alt-coins a rocky ride. Sino-US trade conflict update. GDPR data extortion. Spammy protection racket. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/627/notes</link>
      <description>In today's podcast, we hear that Taiwan continues to receive the PLA's cyber attentions. A look at what the Lazarus Group is up to. Cryptocurrency fraudsters arrested as alt-coin values have a rocky ride. Continuing US hot water for ZTE and Huawei. GDPR-themed data extortion. Business email compromise is up. So are ransomware attacks against US city governments. And when is a ransomware attack not a ransomware attack? When it's just a protection racket. Johannes Ullrich from SANS and the ISC Internet Storm Center podcast on evasive cryptocoin miners. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 25 Jun 2018 19:16:27 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>627</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/90c28842-def8-11ea-911f-a7e39a5ec3f5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Nation-state cyberespionage and cybercrime. Cryptocurrency fraud and theft give alt-coins a rocky ride. Sino-US trade conflict update. GDPR data extortion. Spammy protection racket. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Taiwan continues to receive the PLA's cyber attentions. A look at what the Lazarus Group is up to. Cryptocurrency fraudsters arrested as alt-coin values have a rocky ride. Continuing US hot water for ZTE and Huawei. GDPR-themed data extortion. Business email compromise is up. So are ransomware attacks against US city governments. And when is a ransomware attack not a ransomware attack? When it's just a protection racket. Johannes Ullrich from SANS and the ISC Internet Storm Center podcast on evasive cryptocoin miners. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Taiwan continues to receive the PLA's cyber attentions. A look at what the Lazarus Group is up to. Cryptocurrency fraudsters arrested as alt-coin values have a rocky ride. Continuing US hot water for ZTE and Huawei. GDPR-themed data extortion. Business email compromise is up. So are ransomware attacks against US city governments. And when is a ransomware attack not a ransomware attack? When it's just a protection racket. Johannes Ullrich from SANS and the ISC Internet Storm Center podcast on evasive cryptocoin miners. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>892</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cd8ab5c3725a478eb40084f5426dab19]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8442460802.mp3?updated=1689946667" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>LG smartphone keyboard vulnerabilities. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/41/notes</link>
      <description>Researchers at Check Point Research recently discovered vulnerabilities in some LG smartphone keyboards, vulnerabilities that could have been used to remotely execute code with elevated privileges, act as a keylogger and thereby compromise the users’ privacy and authentication details.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Jun 2018 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>41</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/2a6fc6e8-df0e-11ea-866e-3f3d7b1b9c7f/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>LG smartphone keyboard vulnerabilities</itunes:subtitle>
      <itunes:summary>Researchers at Check Point Research recently discovered vulnerabilities in some LG smartphone keyboards, vulnerabilities that could have been used to remotely execute code with elevated privileges, act as a keylogger and thereby compromise the users’ privacy and authentication details.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Check Point Research <a href="https://research.checkpoint.com/lg-keyboard-vulnerabilities/">recently discovered vulnerabilities in some LG smartphone keyboards</a>, vulnerabilities that could have been used to remotely execute code with elevated privileges, act as a keylogger and thereby compromise the users’ privacy and authentication details.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1137</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e9589ac7b4de429da29bccd805a1186a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6800499908.mp3?updated=1685022369" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing plays small ball with depressing success. Chinese cyberespionage up. US IC, JCS, worries about innovation. Guilty plea in US espionage case. Ex-Knesset member suspected of spying. Supreme Court decides location privacy case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/626/notes</link>
      <description>In today's podcast, we hear that phishing scams continue to nibble away at bank accounts and reputations: the State of Oregon is among those suffering. Avoid emails promising you leaked pictures of YouTube stars. Chinese espionage against US targets rises. US Intelligence officials worry that failure to play a long game puts the country at a disadvantage with respect to innovation. The Joint Chiefs mull electronic warfare issues. Reality Winner makes a plea agreement in her espionage case. And from ecstasy tablets to Iranian spying is a short sad road. Ben Yelin from UMD CHHS weighs in on the US Supreme Court decision on location data privacy. Guest is Taavi Kotka, former CIO of the Estonian government, discussing that nation’s innovative digital identity system. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 22 Jun 2018 18:03:28 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>626</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/90d710c8-def8-11ea-911f-d3f6d30a2a12/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Phishing plays small ball with depressing success. Chinese cyberespionage up. US IC, JCS, worries about innovation. Guilty plea in US espionage case. Ex-Knesset member suspected of spying. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that phishing scams continue to nibble away at bank accounts and reputations: the State of Oregon is among those suffering. Avoid emails promising you leaked pictures of YouTube stars. Chinese espionage against US targets rises. US Intelligence officials worry that failure to play a long game puts the country at a disadvantage with respect to innovation. The Joint Chiefs mull electronic warfare issues. Reality Winner makes a plea agreement in her espionage case. And from ecstasy tablets to Iranian spying is a short sad road. Ben Yelin from UMD CHHS weighs in on the US Supreme Court decision on location data privacy. Guest is Taavi Kotka, former CIO of the Estonian government, discussing that nation’s innovative digital identity system. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that phishing scams continue to nibble away at bank accounts and reputations: the State of Oregon is among those suffering. Avoid emails promising you leaked pictures of YouTube stars. Chinese espionage against US targets rises. US Intelligence officials worry that failure to play a long game puts the country at a disadvantage with respect to innovation. The Joint Chiefs mull electronic warfare issues. Reality Winner makes a plea agreement in her espionage case. And from ecstasy tablets to Iranian spying is a short sad road. Ben Yelin from UMD CHHS weighs in on the US Supreme Court decision on location data privacy. Guest is Taavi Kotka, former CIO of the Estonian government, discussing that nation’s innovative digital identity system. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1475</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d8bf1aa6977246a687e28a0284935f00]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1954039947.mp3?updated=1689885528" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Malicious apps, a clever botnet, and cryptojacking. Patch notes. EU copyright regulations. Congress still doesn't like the cut of ZTE's or Huawei's jib. Tesla sues a former employee. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/625/notes</link>
      <description>In today's podcast we hear about a malicious app that will save your battery, but it will also install a backdoor, steal information, and click on a bunch of ads. A sophisticated and patient botnet, Mylobot, is observed in the wild, but it's not yet clear what it's up to. Cryptojackers exploit a known (and patched) Drupal vulnerability. Vectra finds tunnels. Google adds security metadata to Android apps. Cisco patches. The EU's proposed copyright regulations attract little love. Congress pursues ZTE and Huawei. And Tesla sues a former employee. Ryan LaSalle from Accenture, on the opening of their new Cyber Fusion Center. Guest is Ned Miller from McAfee on their “Winning the Game” report on the gamification of security training. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 21 Jun 2018 20:17:27 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>625</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/90efc24e-def8-11ea-911f-4b4be4ebe79c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Malicious apps, a clever botnet, and cryptojacking. Patch notes. EU copyright regulations. Congress still doesn't like the cut of ZTE's or Huawei's jib. Tesla sues a former employee. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear about a malicious app that will save your battery, but it will also install a backdoor, steal information, and click on a bunch of ads. A sophisticated and patient botnet, Mylobot, is observed in the wild, but it's not yet clear what it's up to. Cryptojackers exploit a known (and patched) Drupal vulnerability. Vectra finds tunnels. Google adds security metadata to Android apps. Cisco patches. The EU's proposed copyright regulations attract little love. Congress pursues ZTE and Huawei. And Tesla sues a former employee. Ryan LaSalle from Accenture, on the opening of their new Cyber Fusion Center. Guest is Ned Miller from McAfee on their “Winning the Game” report on the gamification of security training. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about a malicious app that will save your battery, but it will also install a backdoor, steal information, and click on a bunch of ads. A sophisticated and patient botnet, Mylobot, is observed in the wild, but it's not yet clear what it's up to. Cryptojackers exploit a known (and patched) Drupal vulnerability. Vectra finds tunnels. Google adds security metadata to Android apps. Cisco patches. The EU's proposed copyright regulations attract little love. Congress pursues ZTE and Huawei. And Tesla sues a former employee. Ryan LaSalle from Accenture, on the opening of their new Cyber Fusion Center. Guest is Ned Miller from McAfee on their “Winning the Game” report on the gamification of security training. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1279</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[36147fb73aae46149b9cf1964b179933]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6229296046.mp3?updated=1689885447" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Satellite communications suffer from Thrip(s). Zacinlo rootkit poses as a VPN. Insecure Firebase apps. EU copyright legislation. Kardon Loader. Bithumb robbed. #Opicarus2018. Bitcoin Baron jailed. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/624/notes</link>
      <description>In today's podcast, we hear that the Chinese espionage group Thrip is targeting satellite communications operators and others in the US and Southeast Asia. Zacinlo rootkit hides inside a bogus VPN. Developers are leaving Firebase apps insecure. The EU's controversial copyright regulation advances from committee. Kardon Loader malware is in beta. South Korean cryptocurrency exchange Bithumb is looted of more than $30 million. Anonymous is back with Opicarus2018. And the Bitcoin Baron goes to jail. Awais Rashid from Bristol University on why real-world experimentation is vital to cyber security. Guest is Dr. Chris Pierson from Binary Sun Cyber Risk Advisors, weighing in on the claims of sabotage at Tesla.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 20 Jun 2018 17:31:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>624</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9105003c-def8-11ea-911f-67d8c8307453/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Satellite communications suffer from Thrip(s). Zacinlo rootkit poses as a VPN. Insecure Firebase apps. EU copyright legislation. Kardon Loader. Bithumb robbed. #Opicarus2018. Bitcoin Baron jailed. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the Chinese espionage group Thrip is targeting satellite communications operators and others in the US and Southeast Asia. Zacinlo rootkit hides inside a bogus VPN. Developers are leaving Firebase apps insecure. The EU's controversial copyright regulation advances from committee. Kardon Loader malware is in beta. South Korean cryptocurrency exchange Bithumb is looted of more than $30 million. Anonymous is back with Opicarus2018. And the Bitcoin Baron goes to jail. Awais Rashid from Bristol University on why real-world experimentation is vital to cyber security. Guest is Dr. Chris Pierson from Binary Sun Cyber Risk Advisors, weighing in on the claims of sabotage at Tesla.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the Chinese espionage group Thrip is targeting satellite communications operators and others in the US and Southeast Asia. Zacinlo rootkit hides inside a bogus VPN. Developers are leaving Firebase apps insecure. The EU's controversial copyright regulation advances from committee. Kardon Loader malware is in beta. South Korean cryptocurrency exchange Bithumb is looted of more than $30 million. Anonymous is back with Opicarus2018. And the Bitcoin Baron goes to jail. Awais Rashid from Bristol University on why real-world experimentation is vital to cyber security. Guest is Dr. Chris Pierson from Binary Sun Cyber Risk Advisors, weighing in on the claims of sabotage at Tesla.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1260</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5e550a9dde80416c8d7ea3184b8a8919]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5090753995.mp3?updated=1689885408" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Charges in Vault 7 case. Olympic Destroyer appears to be back. Liberty Life hack. Does Tesla have a rogue insider? US Senate hits at ZTE. Guilty plea in OPM hack-related fraud. Motive: blackmail. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/623/notes</link>
      <description>In today's podcast we hear that the US has charged a former CIA engineer in the WikiLeaks Vault 7 case. Olympic Destroyer may be back, and preparing to hit chemical weapons investigators and arms control specialists. Updates on the Liberty Life data extortion investigation. Elon Musk says Tesla Motors has an internal saboteur. The US Senate snatches the lifeline out of ZTE's hands. A guilty plea in OPM-breach-related fraud. A possible motive in the Jeopardy champ's email hacking. David Dufour from Webroot with insights on the impact they’re seeing from GDPR. Guest is Lenny Zeltser from Minerva Labs discussing his IT and security “cheat sheets.” 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Jun 2018 18:03:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>623</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/911dc7de-def8-11ea-911f-bf0ab8236120/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Charges in Vault 7 case. Olympic Destroyer appears to be back. Liberty Life hack. Does Tesla have a rogue insider? US Senate hits at ZTE. Guilty plea in OPM hack-related fraud. Motive: blackmail. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that the US has charged a former CIA engineer in the WikiLeaks Vault 7 case. Olympic Destroyer may be back, and preparing to hit chemical weapons investigators and arms control specialists. Updates on the Liberty Life data extortion investigation. Elon Musk says Tesla Motors has an internal saboteur. The US Senate snatches the lifeline out of ZTE's hands. A guilty plea in OPM-breach-related fraud. A possible motive in the Jeopardy champ's email hacking. David Dufour from Webroot with insights on the impact they’re seeing from GDPR. Guest is Lenny Zeltser from Minerva Labs discussing his IT and security “cheat sheets.” 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that the US has charged a former CIA engineer in the WikiLeaks Vault 7 case. Olympic Destroyer may be back, and preparing to hit chemical weapons investigators and arms control specialists. Updates on the Liberty Life data extortion investigation. Elon Musk says Tesla Motors has an internal saboteur. The US Senate snatches the lifeline out of ZTE's hands. A guilty plea in OPM-breach-related fraud. A possible motive in the Jeopardy champ's email hacking. David Dufour from Webroot with insights on the impact they’re seeing from GDPR. Guest is Lenny Zeltser from Minerva Labs discussing his IT and security “cheat sheets.” </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1285</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[07f2d0afa971475db14bfd61f51391c1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4966284494.mp3?updated=1689885397" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Date extortion attempt against Liberty Life. Rex Mundi, Black Hand arrests. Hidden Cobra's back. Clipboard hijacking hits cryptocurrency wallets. ZTE, Huawei security fears. Pulp fiction. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/622/notes</link>
      <description>In today's podcast we hear that Liberty Life has sustained an attempt at data extortion. In separate operations, international police agencies cooperate against Rex Mundi, Black Hand, and the remnants of Silk Road. Cyber espionage notes. North Korean hacking resumes. More clipboard hijacking afflicts cryptocurrency wallets. Security concerns tighten around ZTE and Huawei. And pulp fiction: from Russia with love, and from the Clinton Library. Malek Ben Salem from Accenture Labs on concerns over emerging technology capable of voice impersonation.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 18 Jun 2018 15:38:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>622</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/912f4f68-def8-11ea-911f-8321652e939b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Date extortion attempt against Liberty Life. Rex Mundi, Black Hand arrests. Hidden Cobra's back. Clipboard hijacking hits cryptocurrency wallets. ZTE, Huawei security fears. Pulp fiction. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Liberty Life has sustained an attempt at data extortion. In separate operations, international police agencies cooperate against Rex Mundi, Black Hand, and the remnants of Silk Road. Cyber espionage notes. North Korean hacking resumes. More clipboard hijacking afflicts cryptocurrency wallets. Security concerns tighten around ZTE and Huawei. And pulp fiction: from Russia with love, and from the Clinton Library. Malek Ben Salem from Accenture Labs on concerns over emerging technology capable of voice impersonation.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Liberty Life has sustained an attempt at data extortion. In separate operations, international police agencies cooperate against Rex Mundi, Black Hand, and the remnants of Silk Road. Cyber espionage notes. North Korean hacking resumes. More clipboard hijacking afflicts cryptocurrency wallets. Security concerns tighten around ZTE and Huawei. And pulp fiction: from Russia with love, and from the Clinton Library. Malek Ben Salem from Accenture Labs on concerns over emerging technology capable of voice impersonation.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1185</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[609449449fbf49f4b2228b7c52cae3f1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4635890284.mp3?updated=1689885382" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber bank heists. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/40/notes</link>
      <description>Carbon Black's Chief Cybersecurity Officer Tom Kellerman shares the results of their recent report, Modern Bank Heists: Cyberattacks &amp; Lateral Movement in the Financial Sector.
For the report, they interviewed CISOs at 40 major financial institutions, revealing attack and mitigation trends.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Jun 2018 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>40</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/94eb3eea-df0d-11ea-a697-ab45c2561606/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyber bank heists</itunes:subtitle>
      <itunes:summary>Carbon Black's Chief Cybersecurity Officer Tom Kellerman shares the results of their recent report, Modern Bank Heists: Cyberattacks &amp; Lateral Movement in the Financial Sector.
For the report, they interviewed CISOs at 40 major financial institutions, revealing attack and mitigation trends.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Carbon Black's Chief Cybersecurity Officer Tom Kellerman shares the results of their recent report, <a href="https://www.carbonblack.com/resource/modern-bank-heists-cyberattacks-lateral-movement-in-the-financial-sector/">Modern Bank Heists: Cyberattacks &amp; Lateral Movement in the Financial Sector.</a></p><p>For the report, they interviewed CISOs at 40 major financial institutions, revealing attack and mitigation trends.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1113</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a0acba22781b46c1b2c8de2b8713d954]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7312152899.mp3?updated=1685022289" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>MysteryBot developed from LokiBot. Satan rebranded as DBGer. Snooping on iOS got harder, but maybe not impossible. IG report on the FBI is out, not damning but not good, either.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/621/notes</link>
      <description>In today's podcast we hear that MysteryBot is under development and presumably being prepared for sale on the black market. Satan ransomware gets a makeover and a new name. Apple has taken measures to make iOS traffic less accessible to snooping, but lawful snoops may already have a way around that security. Kasperky will no longer work with Europol. The US Justice Department IG reports on the FBI. And a former Jeopardy champion cops a hacking plea. Robert M. Lee from Dragos, on his efforts to educate through the use of comic strips. Guest is Scott Petry from Authentic8 discussing their FAKE booth at the RSA conference.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 15 Jun 2018 19:13:13 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>621</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/91439e78-def8-11ea-911f-6b5a8d6152a6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>MysteryBot developed from LokiBot. Satan rebranded as DBGer. Snooping on iOS got harder, but maybe not impossible. IG report on the FBI is out, not damning but not good, either.  </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that MysteryBot is under development and presumably being prepared for sale on the black market. Satan ransomware gets a makeover and a new name. Apple has taken measures to make iOS traffic less accessible to snooping, but lawful snoops may already have a way around that security. Kasperky will no longer work with Europol. The US Justice Department IG reports on the FBI. And a former Jeopardy champion cops a hacking plea. Robert M. Lee from Dragos, on his efforts to educate through the use of comic strips. Guest is Scott Petry from Authentic8 discussing their FAKE booth at the RSA conference.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that MysteryBot is under development and presumably being prepared for sale on the black market. Satan ransomware gets a makeover and a new name. Apple has taken measures to make iOS traffic less accessible to snooping, but lawful snoops may already have a way around that security. Kasperky will no longer work with Europol. The US Justice Department IG reports on the FBI. And a former Jeopardy champion cops a hacking plea. Robert M. Lee from Dragos, on his efforts to educate through the use of comic strips. Guest is Scott Petry from Authentic8 discussing their FAKE booth at the RSA conference.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1463</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[09e1c0069a094d96a08a3773984b7490]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2875639059.mp3?updated=1608755181" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chinese espionage in Central Asia. Dixons Carphone data exposure. Lazy State speculative execution bug. Pyongyang is expected to come roaring back into cyberspace. Unlucky 13. Chinese espionage in Central Asia. Dixons Carphone data exposure. Lazy State sp</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/620/notes</link>
      <description>In today's podcast, we hear that LuckyMouse has crept into an unnamed Central Asian house. Dixons Carphone data exposure presents complex legal and regulatory issues—it's the first big incident since GDPR came into effect. "Lazy State" is another CPU speculative execution bug. The US Congress doesn't care for ZTE, Australia's government is wary of Huawei, and the EU doesn't like Kaspersky at all. If you didn't like the end of net neutrality, wait until you get a load of the proposed EU Copyright Regulation's Article 13. More hacking expected from Pyongyang. Dr. Charles Clancy from VA Tech, discussing research on antifragile communications. Guest is Stacey Smith from CAMI on MD's legislation supporting cyber security businesses. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 14 Jun 2018 18:31:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>620</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/91563b0a-def8-11ea-911f-cf76ada34be3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Chinese espionage in Central Asia. Dixons Carphone data exposure. Lazy State speculative execution bug. Pyongyang is expected to come roaring back into cyberspace. Unlucky 13. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that LuckyMouse has crept into an unnamed Central Asian house. Dixons Carphone data exposure presents complex legal and regulatory issues—it's the first big incident since GDPR came into effect. "Lazy State" is another CPU speculative execution bug. The US Congress doesn't care for ZTE, Australia's government is wary of Huawei, and the EU doesn't like Kaspersky at all. If you didn't like the end of net neutrality, wait until you get a load of the proposed EU Copyright Regulation's Article 13. More hacking expected from Pyongyang. Dr. Charles Clancy from VA Tech, discussing research on antifragile communications. Guest is Stacey Smith from CAMI on MD's legislation supporting cyber security businesses. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that LuckyMouse has crept into an unnamed Central Asian house. Dixons Carphone data exposure presents complex legal and regulatory issues—it's the first big incident since GDPR came into effect. "Lazy State" is another CPU speculative execution bug. The US Congress doesn't care for ZTE, Australia's government is wary of Huawei, and the EU doesn't like Kaspersky at all. If you didn't like the end of net neutrality, wait until you get a load of the proposed EU Copyright Regulation's Article 13. More hacking expected from Pyongyang. Dr. Charles Clancy from VA Tech, discussing research on antifragile communications. Guest is Stacey Smith from CAMI on MD's legislation supporting cyber security businesses. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1190</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ea11a5ab84c04878bfab7aa4b5f15f5e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4616407372.mp3?updated=1689885081" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cable-tapping for a new century. Lazarus Group update. BabaYaga's cannibalistic malware. Patch Tuesday notes. Cryptojacking. World Cup surveillance. Beware of strangers bearing gifts with USB connections. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/619/notes</link>
      <description>In today's podcast we hear that old news is new news when it comes to undersea cables. The Lazarus Group is still at it, against South Korean targets. BabaYaga eats other malware so it can stage WordPress spam. Patch Tuesday notes, including some products that Redmond will no longer support. Crytpojackers are still busy. One new strain of coin-mining malware uses the Eternal Romance exploit to spread. World Cup surveillance threatens visiting fans. And don't plug gifts from strangers into your USB port.  Justin Harvey from Accenture with thoughts on supply chain security. Guests are Saher Naumaan and Kirsten Ward promoting RESET, BAE Systems’ Women in cyber event. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 13 Jun 2018 19:12:15 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>619</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9168d0c6-def8-11ea-911f-afe4828b1b71/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cable-tapping for a new century. Lazarus Group update. BabaYaga's cannibalistic malware. Patch Tuesday notes. Cryptojacking. World Cup surveillance. Beware of strangers bearing gifts with USB connections. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that old news is new news when it comes to undersea cables. The Lazarus Group is still at it, against South Korean targets. BabaYaga eats other malware so it can stage WordPress spam. Patch Tuesday notes, including some products that Redmond will no longer support. Crytpojackers are still busy. One new strain of coin-mining malware uses the Eternal Romance exploit to spread. World Cup surveillance threatens visiting fans. And don't plug gifts from strangers into your USB port.  Justin Harvey from Accenture with thoughts on supply chain security. Guests are Saher Naumaan and Kirsten Ward promoting RESET, BAE Systems’ Women in cyber event. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that old news is new news when it comes to undersea cables. The Lazarus Group is still at it, against South Korean targets. BabaYaga eats other malware so it can stage WordPress spam. Patch Tuesday notes, including some products that Redmond will no longer support. Crytpojackers are still busy. One new strain of coin-mining malware uses the Eternal Romance exploit to spread. World Cup surveillance threatens visiting fans. And don't plug gifts from strangers into your USB port.  Justin Harvey from Accenture with thoughts on supply chain security. Guests are Saher Naumaan and Kirsten Ward promoting RESET, BAE Systems’ Women in cyber event. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1069</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7ecf5f6c91564b47bb9ac2937b800080]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7418814826.mp3?updated=1689884947" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Don't get cozy with Cozy Bear. Code-signing issues stem from muddled documentation. Devices ship with inadvertent backdoor. Matryosha attack. Operation WireWire versus BEC scammers. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/618/notes</link>
      <description>In today's podcast we hear that the US Treasury Department has announced sanctions against Russian entities it says were too cyber-cozy with the FSB. Code-signing issue looks like what we have here is a failure to communicate. Android devices are being shipped with ADB enabled, and cryptojackers enter by the backdoor. A layered criminal attack posing as emails from Samsung spearphishes Russian victims. Operation WireWire reels in seventy-four business email compromise suspects. Ben Yelin from UMD CHHS on the framing of the encryption debate.  Guest is Steve Schult from LogMeIn and LastPass on best practices password security. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Jun 2018 18:01:50 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>618</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9183555e-def8-11ea-911f-d7e3f43f6de6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Don't get cozy with Cozy Bear. Code-signing issues stem from muddled documentation. Devices ship with inadvertent backdoor. Matryosha attack. Operation WireWire versus BEC scammers. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that the US Treasury Department has announced sanctions against Russian entities it says were too cyber-cozy with the FSB. Code-signing issue looks like what we have here is a failure to communicate. Android devices are being shipped with ADB enabled, and cryptojackers enter by the backdoor. A layered criminal attack posing as emails from Samsung spearphishes Russian victims. Operation WireWire reels in seventy-four business email compromise suspects. Ben Yelin from UMD CHHS on the framing of the encryption debate.  Guest is Steve Schult from LogMeIn and LastPass on best practices password security. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that the US Treasury Department has announced sanctions against Russian entities it says were too cyber-cozy with the FSB. Code-signing issue looks like what we have here is a failure to communicate. Android devices are being shipped with ADB enabled, and cryptojackers enter by the backdoor. A layered criminal attack posing as emails from Samsung spearphishes Russian victims. Operation WireWire reels in seventy-four business email compromise suspects. Ben Yelin from UMD CHHS on the framing of the encryption debate.  Guest is Steve Schult from LogMeIn and LastPass on best practices password security. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1282</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[060fb768ee35464b9cb819f29614bcf9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1200968560.mp3?updated=1689884811" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SWIFT fraud (behind a wiper). Coinrail ICO robbery. Chinese espionage. G7 agrees to a coordinated response to hostile cyber operations. Malwaretech faces new charges. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/617/notes</link>
      <description>In today's podcast, we hear about more SWIFT fraud, with a wiper attack as misdirection. Cryptocurrency exchange looted of ICO tokens. Chinese espionage in Rhode Island, and a conviction in Virginia. Dropping Elephant spearphishes in think tanks. G7 agreement suggests a coordinated response to hostile cyber operations. Net neutrality expired this morning in the US. And Marcus Hutchins faces additional charges. Jonathan Katz from UMD discussing hashing. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 11 Jun 2018 18:32:08 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>617</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/919662fc-def8-11ea-911f-d7cd43ce50f4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>SWIFT fraud (behind a wiper). Coinrail ICO robbery. Chinese espionage. G7 agrees to a coordinated response to hostile cyber operations. Malwaretech faces new charges. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about more SWIFT fraud, with a wiper attack as misdirection. Cryptocurrency exchange looted of ICO tokens. Chinese espionage in Rhode Island, and a conviction in Virginia. Dropping Elephant spearphishes in think tanks. G7 agreement suggests a coordinated response to hostile cyber operations. Net neutrality expired this morning in the US. And Marcus Hutchins faces additional charges. Jonathan Katz from UMD discussing hashing. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about more SWIFT fraud, with a wiper attack as misdirection. Cryptocurrency exchange looted of ICO tokens. Chinese espionage in Rhode Island, and a conviction in Virginia. Dropping Elephant spearphishes in think tanks. G7 agreement suggests a coordinated response to hostile cyber operations. Net neutrality expired this morning in the US. And Marcus Hutchins faces additional charges. Jonathan Katz from UMD discussing hashing. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1104</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[da8a51efd35f4cb7b49ee0cb3cda4189]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7864633616.mp3?updated=1689884796" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Winnti Umbrella Chinese threat group. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/39/notes</link>
      <description>Researchers from ProtectWise's 401TRG team recently published research linking a variety of new and previously reported Chinese cyber threat groups.
Tom Hegel is a Senior Threat Researcher with the 401TRG, and he joins us to share their findings. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Jun 2018 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>39</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/915ac8f4-df0d-11ea-a697-ff0c28c04f33/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Winnti Umbrella Chinese threat group</itunes:subtitle>
      <itunes:summary>Researchers from ProtectWise's 401TRG team recently published research linking a variety of new and previously reported Chinese cyber threat groups.
Tom Hegel is a Senior Threat Researcher with the 401TRG, and he joins us to share their findings. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers from ProtectWise's 401TRG team recently <a href="https://401trg.com/burning-umbrella/">published research</a> linking a variety of new and previously reported Chinese cyber threat groups.</p><p>Tom Hegel is a Senior Threat Researcher with the 401TRG, and he joins us to share their findings. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1414</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[755b7e27ebeb45f98b5fed932f214927]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4832250499.mp3?updated=1685022371" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Adobe patches a zero-day being exploited in the wild. Chinese cyber espionage, and the risks of data-sharing. Facebook default settings glitch. Industry notes. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/616/notes</link>
      <description>In today's podcast, we hear that Adobe has patched a Flash vulnerability. InvisiMole is a discrete, selective cyber espionage tool. A Facebook glitch inadvertently changed users' default privacy settings. Leidos exits the commercial cyber market. China is back at IP theft, and some conventional cyber espionage, too. Congress wants explanations of data-sharing with Huawei and ZTE, and it wants those companies investigated as security risks. Feds Facebook friend felons. Rick Howard from Palo Alto Networks with the winners from this year’s Cyber Security Canon gala. Guest is Cory Petty from BAH, host of the BitCoin podcast, discussing blockchain.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 08 Jun 2018 19:18:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>616</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/91b0effa-def8-11ea-911f-1fa74c904002/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Adobe patches a zero-day being exploited in the wild. Chinese cyber espionage, and the risks of data-sharing. Facebook default settings glitch. Industry notes. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Adobe has patched a Flash vulnerability. InvisiMole is a discrete, selective cyber espionage tool. A Facebook glitch inadvertently changed users' default privacy settings. Leidos exits the commercial cyber market. China is back at IP theft, and some conventional cyber espionage, too. Congress wants explanations of data-sharing with Huawei and ZTE, and it wants those companies investigated as security risks. Feds Facebook friend felons. Rick Howard from Palo Alto Networks with the winners from this year’s Cyber Security Canon gala. Guest is Cory Petty from BAH, host of the BitCoin podcast, discussing blockchain.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Adobe has patched a Flash vulnerability. InvisiMole is a discrete, selective cyber espionage tool. A Facebook glitch inadvertently changed users' default privacy settings. Leidos exits the commercial cyber market. China is back at IP theft, and some conventional cyber espionage, too. Congress wants explanations of data-sharing with Huawei and ZTE, and it wants those companies investigated as security risks. Feds Facebook friend felons. Rick Howard from Palo Alto Networks with the winners from this year’s Cyber Security Canon gala. Guest is Cory Petty from BAH, host of the BitCoin podcast, discussing blockchain.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1572</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ba29e103046e490a800772c1e3e97061]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7894140452.mp3?updated=1608755186" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New criminal campaigns out and about. Fancy Bear changes style, but not management. VPNFilter hits more devices. CloudPets overshare, but maybe more benignly than Google and Facebook. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/615/notes</link>
      <description>Iron Group said to use Hacking Team source code to build a backdoor. Operation Prowli both cryptojacks and sells traffic. Fancy Bear may be getting noisier. VPNFilter has a more extensive set of victim devices than previously believed. ZTE pays a billion dollar fine. CloudPets are oversharing via an unsecured server. The US Senate wants answers from both Facebook and Google about their user data sharing with Chinese companies. Daniel Prince from Lancaster University on the security of Industrial Control Systems. Guests are Kyle Lady and Olabode Anise from Duo Security covering their annual report on authentication. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 07 Jun 2018 19:28:21 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>615</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/91c95da6-def8-11ea-911f-8ff0cb5e0408/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>New criminal campaigns out and about. Fancy Bear changes style, but not management. VPNFilter hits more devices. CloudPets overshare, but maybe more benignly than Google and Facebook. </itunes:subtitle>
      <itunes:summary>Iron Group said to use Hacking Team source code to build a backdoor. Operation Prowli both cryptojacks and sells traffic. Fancy Bear may be getting noisier. VPNFilter has a more extensive set of victim devices than previously believed. ZTE pays a billion dollar fine. CloudPets are oversharing via an unsecured server. The US Senate wants answers from both Facebook and Google about their user data sharing with Chinese companies. Daniel Prince from Lancaster University on the security of Industrial Control Systems. Guests are Kyle Lady and Olabode Anise from Duo Security covering their annual report on authentication. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Iron Group said to use Hacking Team source code to build a backdoor. Operation Prowli both cryptojacks and sells traffic. Fancy Bear may be getting noisier. VPNFilter has a more extensive set of victim devices than previously believed. ZTE pays a billion dollar fine. CloudPets are oversharing via an unsecured server. The US Senate wants answers from both Facebook and Google about their user data sharing with Chinese companies. Daniel Prince from Lancaster University on the security of Industrial Control Systems. Guests are Kyle Lady and Olabode Anise from Duo Security covering their annual report on authentication. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1207</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b0698316db53449d9341344fe0c339e0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8613695382.mp3?updated=1689884700" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Espionage, influence, summits, and elections. What counts as a luxury? An iCloud warrant raises cryptowars speculation. Microsoft's GitHub acquisition. Facebook's coziness with Shanghai? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/614/notes</link>
      <description>In today's podcast, we hear that TempTick and Turla are interested in the US-North Korean summit. That summit might not take up many cybersecurity issues. Where did North Korea get all that digital rope they want to hang the West with? It seems we competed to sell it to them, more-or-less unwittingly. Russian influence ops continue to give lies their bodyguard of truth. The FBI gets a warrant for a high-profile iCloud account. Microsoft outbid Google for GitHub—what will Redmond do with all that code? Facebook may have a complicated relationship with Shanghai. Johannes Ullrich from the ICS Stormcast podcast on deserialization. Guest is Ameesh Divatia from Baffle on GDPR and cloud data privacy. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 06 Jun 2018 19:59:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>614</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/91e31dcc-def8-11ea-911f-33a212ae66b1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Espionage, influence, summits, and elections. What counts as a luxury? An iCloud warrant raises cryptowars speculation. Microsoft's GitHub acquisition. Facebook's coziness with Shanghai? </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that TempTick and Turla are interested in the US-North Korean summit. That summit might not take up many cybersecurity issues. Where did North Korea get all that digital rope they want to hang the West with? It seems we competed to sell it to them, more-or-less unwittingly. Russian influence ops continue to give lies their bodyguard of truth. The FBI gets a warrant for a high-profile iCloud account. Microsoft outbid Google for GitHub—what will Redmond do with all that code? Facebook may have a complicated relationship with Shanghai. Johannes Ullrich from the ICS Stormcast podcast on deserialization. Guest is Ameesh Divatia from Baffle on GDPR and cloud data privacy. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that TempTick and Turla are interested in the US-North Korean summit. That summit might not take up many cybersecurity issues. Where did North Korea get all that digital rope they want to hang the West with? It seems we competed to sell it to them, more-or-less unwittingly. Russian influence ops continue to give lies their bodyguard of truth. The FBI gets a warrant for a high-profile iCloud account. Microsoft outbid Google for GitHub—what will Redmond do with all that code? Facebook may have a complicated relationship with Shanghai. Johannes Ullrich from the ICS Stormcast podcast on deserialization. Guest is Ameesh Divatia from Baffle on GDPR and cloud data privacy. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1265</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ac8cbc54008c492ea91d2ac09303b608]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9858045896.mp3?updated=1689884237" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DPRK hackers quieter in the run-up to the Kim-Trump summit. Russian EW. Cryptocurrencies and crime. Law firm social engineering. Dodgy World Cup Wi-Fi. Bad AI, a time-traveler's poly. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/613/notes</link>
      <description>In today's podcast, North Korea still seems to be leaving American IoT networks more-or-less alone, for now, however actively they're hacking elsewhere. Everything old is new again, at least with Russian EW. Cryptocurrency crime is a worry everywhere. A look at law firm hacks shows the counselors could use the help of some street-savvy hotel detectives more than a tech-savvy perimeter security solution, although that wouldn't be bad, either. Beware of letting World Cup Wi-FI be an own-goal. Apple's latest updates seem privacy friendly. Thoughts on AI, and the polygraphing of a time traveler that sounds totally legit. David Dufour from Webroot on new roles for security, and how that impacts hiring and education. Guest is John Dickson from Denim Group on securing voting infrastructure. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Jun 2018 18:18:13 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>613</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/91f5cc2e-def8-11ea-911f-b3db4f04d951/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>DPRK hackers quieter in the run-up to the Kim-Trump summit. Russian EW. Cryptocurrencies and crime. Law firm social engineering. Dodgy World Cup Wi-Fi. Bad AI, a time-traveler's poly. </itunes:subtitle>
      <itunes:summary>In today's podcast, North Korea still seems to be leaving American IoT networks more-or-less alone, for now, however actively they're hacking elsewhere. Everything old is new again, at least with Russian EW. Cryptocurrency crime is a worry everywhere. A look at law firm hacks shows the counselors could use the help of some street-savvy hotel detectives more than a tech-savvy perimeter security solution, although that wouldn't be bad, either. Beware of letting World Cup Wi-FI be an own-goal. Apple's latest updates seem privacy friendly. Thoughts on AI, and the polygraphing of a time traveler that sounds totally legit. David Dufour from Webroot on new roles for security, and how that impacts hiring and education. Guest is John Dickson from Denim Group on securing voting infrastructure. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, North Korea still seems to be leaving American IoT networks more-or-less alone, for now, however actively they're hacking elsewhere. Everything old is new again, at least with Russian EW. Cryptocurrency crime is a worry everywhere. A look at law firm hacks shows the counselors could use the help of some street-savvy hotel detectives more than a tech-savvy perimeter security solution, although that wouldn't be bad, either. Beware of letting World Cup Wi-FI be an own-goal. Apple's latest updates seem privacy friendly. Thoughts on AI, and the polygraphing of a time traveler that sounds totally legit. David Dufour from Webroot on new roles for security, and how that impacts hiring and education. Guest is John Dickson from Denim Group on securing voting infrastructure. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1171</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[600a2dbd4e66443fa9d017b1fc986b76]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3578540534.mp3?updated=1689884012" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Microsoft buys GitHub for $7.5 billion. VPNFilter tries to reconstitute itself. Ransomware and DDoS notes. USA Really seems to be latest in Russian disinformation. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/612/notes</link>
      <description>In today's podcast we hear that Microsoft is buying GitHub for $7.5 billion. VPNFilter seeks to reestablish itself. Financial Trojans are up and ransomware is down, but don't count the ransomware out, not yet. A get-decrypted-for-free card to Russian ransomware victims. The children of Mirai trouble an unhappy world. USA Really may be the latest incarnation of the Internet Research Agency, complete with rabid Florida squirrels, Wisconsin blood-suckers, and advice on Louisiana's secession. Malek Ben Salem from Accenture Labs on using keyboard biometrics to detect mental disorders. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 04 Jun 2018 19:48:06 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>612</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/92113630-def8-11ea-911f-3feec915e3c9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Microsoft buys GitHub for $7.5 billion. VPNFilter tries to reconstitute itself. Ransomware and DDoS notes. USA Really seems to be latest in Russian disinformation. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Microsoft is buying GitHub for $7.5 billion. VPNFilter seeks to reestablish itself. Financial Trojans are up and ransomware is down, but don't count the ransomware out, not yet. A get-decrypted-for-free card to Russian ransomware victims. The children of Mirai trouble an unhappy world. USA Really may be the latest incarnation of the Internet Research Agency, complete with rabid Florida squirrels, Wisconsin blood-suckers, and advice on Louisiana's secession. Malek Ben Salem from Accenture Labs on using keyboard biometrics to detect mental disorders. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Microsoft is buying GitHub for $7.5 billion. VPNFilter seeks to reestablish itself. Financial Trojans are up and ransomware is down, but don't count the ransomware out, not yet. A get-decrypted-for-free card to Russian ransomware victims. The children of Mirai trouble an unhappy world. USA Really may be the latest incarnation of the Internet Research Agency, complete with rabid Florida squirrels, Wisconsin blood-suckers, and advice on Louisiana's secession. Malek Ben Salem from Accenture Labs on using keyboard biometrics to detect mental disorders. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>980</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2cc4cac528cf417e9dfcd518b414e03d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1168428065.mp3?updated=1689883946" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Islamic State propaganda persistence. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/38/notes</link>
      <description>Researchers from Flashpoint recently explored ISIS' ability to distribute propaganda across the internet, and their use of major internet service providers to help them achieve persistence.

Ken Wolf is a Senior Analyst at Flashpoint, and he describes what they learned.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Jun 2018 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>38</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8fbe2b62-df0d-11ea-a0a9-33f7c451382c/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Islamic State propaganda persistence</itunes:subtitle>
      <itunes:summary>Researchers from Flashpoint recently explored ISIS' ability to distribute propaganda across the internet, and their use of major internet service providers to help them achieve persistence.

Ken Wolf is a Senior Analyst at Flashpoint, and he describes what they learned.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers from Flashpoint recently explored ISIS' ability to distribute propaganda across the internet, and their use of major internet service providers to help them achieve persistence.</p><p><br></p><p>Ken Wolf is a Senior Analyst at Flashpoint, and he describes what they learned.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1297</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3e0098dbf3e6462da3d4e18bedd2969b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2987751826.mp3?updated=1685022288" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lazarus Group updates. Cybercrime's GDP. New Zealand a Chinese espionage target? ZTE and Huawei criticized. BND will continue to monitor Frankfurt hub. Google's knowledge panels. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/611/notes</link>
      <description>In today's podcast we hear that the Lazarus Group may be on (relative, selective) good behavior. A study suggests that if cybercrime were a country, it would have a GDP comparable to Russia's. The Canadian Security Intelligence Service warns, in the nicest way possible, that Chinese spies are out to get New Zealand. ZTE and Huawei come in for more criticism. The BND gets a court victory in Leipzig. Google's ground-truth algorithms are looking a little truthy. Joe Carrigan from JHU ISI with follow-up on listener comments from last week’s iOS vs Android discussion. Guest is Todd Inskeep from BAH with highlights from a talk he gave at RSA on NotPetya. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 01 Jun 2018 19:50:21 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>611</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9227edc6-def8-11ea-911f-b342752128e0/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Lazarus Group updates. Cybercrime's GDP. New Zealand a Chinese espionage target? ZTE and Huawei criticized. BND will continue to monitor Frankfurt hub. Google's knowledge panels. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that the Lazarus Group may be on (relative, selective) good behavior. A study suggests that if cybercrime were a country, it would have a GDP comparable to Russia's. The Canadian Security Intelligence Service warns, in the nicest way possible, that Chinese spies are out to get New Zealand. ZTE and Huawei come in for more criticism. The BND gets a court victory in Leipzig. Google's ground-truth algorithms are looking a little truthy. Joe Carrigan from JHU ISI with follow-up on listener comments from last week’s iOS vs Android discussion. Guest is Todd Inskeep from BAH with highlights from a talk he gave at RSA on NotPetya. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that the Lazarus Group may be on (relative, selective) good behavior. A study suggests that if cybercrime were a country, it would have a GDP comparable to Russia's. The Canadian Security Intelligence Service warns, in the nicest way possible, that Chinese spies are out to get New Zealand. ZTE and Huawei come in for more criticism. The BND gets a court victory in Leipzig. Google's ground-truth algorithms are looking a little truthy. Joe Carrigan from JHU ISI with follow-up on listener comments from last week’s iOS vs Android discussion. Guest is Todd Inskeep from BAH with highlights from a talk he gave at RSA on NotPetya. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1555</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eb086e01e4414bc6916d865fb6c9ff05]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9437071973.mp3?updated=1608755194" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kaspersky loses court challenge to US Government ban. Cryptomix ransomware. US Departments of Commerce, Homeland Security, and Energy plan resiliency. A packrat at CIA? Reboot your routers. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/610/notes</link>
      <description>In today's podcast we hear that Kaspersky has lost its court challenge to the US Government ban on its products, but plans to  appeal. Cryptomix ransomware is out in the wild. Vulnerabilities found in SingTel routers. Chrome 67 update includes patches. The US Departments of Commerce and Homeland Security address botnets (and ask for research). The US Department of Energy plans for resiliency. Twitter takes down tweens. A packrat at CIA? Reboot your routers. Robert M. Lee from Dragos, reviewing some recently published ICS security reports. Guest is Adam Vincent from ThreatConnect on the increasing importance of threat intelligence for many organizations. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 31 May 2018 20:07:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>610</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/923cfa54-def8-11ea-911f-173000a585e0/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Kaspersky loses court challenge to US Government ban. Cryptomix ransomware. US Departments of Commerce, Homeland Security, and Energy plan resiliency. A packrat at CIA? Reboot your routers. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Kaspersky has lost its court challenge to the US Government ban on its products, but plans to  appeal. Cryptomix ransomware is out in the wild. Vulnerabilities found in SingTel routers. Chrome 67 update includes patches. The US Departments of Commerce and Homeland Security address botnets (and ask for research). The US Department of Energy plans for resiliency. Twitter takes down tweens. A packrat at CIA? Reboot your routers. Robert M. Lee from Dragos, reviewing some recently published ICS security reports. Guest is Adam Vincent from ThreatConnect on the increasing importance of threat intelligence for many organizations. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Kaspersky has lost its court challenge to the US Government ban on its products, but plans to  appeal. Cryptomix ransomware is out in the wild. Vulnerabilities found in SingTel routers. Chrome 67 update includes patches. The US Departments of Commerce and Homeland Security address botnets (and ask for research). The US Department of Energy plans for resiliency. Twitter takes down tweens. A packrat at CIA? Reboot your routers. Robert M. Lee from Dragos, reviewing some recently published ICS security reports. Guest is Adam Vincent from ThreatConnect on the increasing importance of threat intelligence for many organizations. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1285</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a85e2390610a4b6e8c3d74c9086a903f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9250404826.mp3?updated=1689883337" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More North Korean malware identified. EOS scanned for misconfigurations by parties unknown. Canadian banks won't pay extortion. Stay away from Joker's Stash. Crime and punishment. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/609/notes</link>
      <description>In today' s podcast, we hear that the US has attributed two more strains of malware to North Korea. And whether you call them Hidden Cobra or the Lazarus Group, it's the same reliable crew of Pyongyang hoods. More trouble for the ICO world as unknown but probably bad actors scan for misconfigurations in EOS blockchain nodes. Canadian banks decline to pay extortion. Joker's Stash counterfeits show there's even less honor among thieves than you may have thought. Baratov gets five years for the Yahoo! hack, and "Courvoisier" gets a solid ten-year sentence for multiple crimes. Justin Harvey from Accenture with thoughts on GDPR. Guest is Ruvi Kitov from Tufin on why automation should be in wider use than it is.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 30 May 2018 19:27:54 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>609</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/92679fca-def8-11ea-911f-739e3b2ab455/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>More North Korean malware identified. EOS scanned for misconfigurations by parties unknown. Canadian banks won't pay extortion. Stay away from Joker's Stash. Crime and punishment. </itunes:subtitle>
      <itunes:summary>In today' s podcast, we hear that the US has attributed two more strains of malware to North Korea. And whether you call them Hidden Cobra or the Lazarus Group, it's the same reliable crew of Pyongyang hoods. More trouble for the ICO world as unknown but probably bad actors scan for misconfigurations in EOS blockchain nodes. Canadian banks decline to pay extortion. Joker's Stash counterfeits show there's even less honor among thieves than you may have thought. Baratov gets five years for the Yahoo! hack, and "Courvoisier" gets a solid ten-year sentence for multiple crimes. Justin Harvey from Accenture with thoughts on GDPR. Guest is Ruvi Kitov from Tufin on why automation should be in wider use than it is.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today' s podcast, we hear that the US has attributed two more strains of malware to North Korea. And whether you call them Hidden Cobra or the Lazarus Group, it's the same reliable crew of Pyongyang hoods. More trouble for the ICO world as unknown but probably bad actors scan for misconfigurations in EOS blockchain nodes. Canadian banks decline to pay extortion. Joker's Stash counterfeits show there's even less honor among thieves than you may have thought. Baratov gets five years for the Yahoo! hack, and "Courvoisier" gets a solid ten-year sentence for multiple crimes. Justin Harvey from Accenture with thoughts on GDPR. Guest is Ruvi Kitov from Tufin on why automation should be in wider use than it is.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1187</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a3605b45847543ecbf658b66a4c1fb55]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2242632672.mp3?updated=1689883326" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Rebooting routers against VPNFilter. Canadian banks compromised? Cobalt gang is back. 51% attacks on blockchains. "Courvoisier" sentenced. NATO looks at Russia's weaponized jokes. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/608/notes</link>
      <description>In today's podcast we hear that the FBI recommends rebooting your routers against VPNFilter. Data extortion hits Canadian banks. The Cobalt Gang is back. 51% attacks fiddle with cryptocurrencies. BackSwap banking Trojan is tough to detect. Coca-Cola discloses data theft by a former employee. Courvoisier—the hacker, not the cognac, gets ten years. Facebook continues to work on its content moderation, and Papua New Guinea may block the platform for a month of study. NATO studies humor, very seriously. Ben Yelin from UMD CHHS on police attempts to use a deceased person’s fingerprints to unlock a phone. Guest is Mike Benjamin from CenturyLink on their recent threat report covering IoT and DDoS. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 May 2018 19:43:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>608</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9286b004-def8-11ea-911f-2f0a088bf572/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Rebooting routers against VPNFilter. Canadian banks compromised? Cobalt gang is back. 51% attacks on blockchains. "Courvoisier" sentenced. NATO looks at Russia's weaponized jokes. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that the FBI recommends rebooting your routers against VPNFilter. Data extortion hits Canadian banks. The Cobalt Gang is back. 51% attacks fiddle with cryptocurrencies. BackSwap banking Trojan is tough to detect. Coca-Cola discloses data theft by a former employee. Courvoisier—the hacker, not the cognac, gets ten years. Facebook continues to work on its content moderation, and Papua New Guinea may block the platform for a month of study. NATO studies humor, very seriously. Ben Yelin from UMD CHHS on police attempts to use a deceased person’s fingerprints to unlock a phone. Guest is Mike Benjamin from CenturyLink on their recent threat report covering IoT and DDoS. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that the FBI recommends rebooting your routers against VPNFilter. Data extortion hits Canadian banks. The Cobalt Gang is back. 51% attacks fiddle with cryptocurrencies. BackSwap banking Trojan is tough to detect. Coca-Cola discloses data theft by a former employee. Courvoisier—the hacker, not the cognac, gets ten years. Facebook continues to work on its content moderation, and Papua New Guinea may block the platform for a month of study. NATO studies humor, very seriously. Ben Yelin from UMD CHHS on police attempts to use a deceased person’s fingerprints to unlock a phone. Guest is Mike Benjamin from CenturyLink on their recent threat report covering IoT and DDoS. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1284</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[91f622ae13034fa7a01515935d328e3b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2447291947.mp3?updated=1689883305" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>UPnProxy infiltrates home routers. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/37/notes</link>
      <description>Researchers at Akamai recently published a white paper titled UPnProxy: Blackhat proxies via NAT Injections.
In it, they describe vulnerabilities with Universal Plug and Play capabilities in home routers, and how malicious actors could take advantage of them. 
Chad Seaman is a senior CERT engineer at Akamai, and he's our guide. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 26 May 2018 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>37</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8ce9d3c8-df0d-11ea-a697-fb70792d607e/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>UPnProxy infiltrates home routers</itunes:subtitle>
      <itunes:summary>Researchers at Akamai recently published a white paper titled UPnProxy: Blackhat proxies via NAT Injections.
In it, they describe vulnerabilities with Universal Plug and Play capabilities in home routers, and how malicious actors could take advantage of them. 
Chad Seaman is a senior CERT engineer at Akamai, and he's our guide. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Akamai recently published a white paper titled <a href="https://www.akamai.com/us/en/multimedia/documents/white-paper/upnproxy-blackhat-proxies-via-nat-injections-white-paper.pdf">UPnProxy: Blackhat proxies via NAT Injections.</a></p><p>In it, they describe vulnerabilities with Universal Plug and Play capabilities in home routers, and how malicious actors could take advantage of them. </p><p>Chad Seaman is a senior CERT engineer at Akamai, and he's our guide. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1382</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4ccda07136df499ea0d1f3af3fea0206]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9339070448.mp3?updated=1685022276" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>VPNFilter takedown. Low-cost Android phones with preloaded adware. Alexa's selective attention. BMW patches connected cars. Cryptocurrency crimes. New swatting charges. GDPR is here. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/607/notes</link>
      <description>In today's podcast, we hear that the FBI's takedown of VPNFilter may have averted a major state-directed campaign. Some discount Android phones come with preloaded adware. Amazon's Echo echoed a little too much. BMW patches some potentially serious vulnerabilities in its connected cars. Cryptocurrency exchanges hit by a double-spending crook. The US Justice Department investigates crypto exchange price manipulation. New charges have been filed in the December Kansas swatting death. And GDPR is now with us. Let the lawsuits begin. Joe Carrigan from JHU ISI, comparing the security of iOS vs. Android. Guest is Mischel Kwon from MKACyber on the evolving role of SOCs. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 25 May 2018 18:53:21 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>607</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/929f9268-def8-11ea-911f-8bf7f90a5a39/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>VPNFilter takedown. Low-cost Android phones with preloaded adware. Alexa's selective attention. BMW patches connected cars. Cryptocurrency crimes. New swatting charges. GDPR is here. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the FBI's takedown of VPNFilter may have averted a major state-directed campaign. Some discount Android phones come with preloaded adware. Amazon's Echo echoed a little too much. BMW patches some potentially serious vulnerabilities in its connected cars. Cryptocurrency exchanges hit by a double-spending crook. The US Justice Department investigates crypto exchange price manipulation. New charges have been filed in the December Kansas swatting death. And GDPR is now with us. Let the lawsuits begin. Joe Carrigan from JHU ISI, comparing the security of iOS vs. Android. Guest is Mischel Kwon from MKACyber on the evolving role of SOCs. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the FBI's takedown of VPNFilter may have averted a major state-directed campaign. Some discount Android phones come with preloaded adware. Amazon's Echo echoed a little too much. BMW patches some potentially serious vulnerabilities in its connected cars. Cryptocurrency exchanges hit by a double-spending crook. The US Justice Department investigates crypto exchange price manipulation. New charges have been filed in the December Kansas swatting death. And GDPR is now with us. Let the lawsuits begin. Joe Carrigan from JHU ISI, comparing the security of iOS vs. Android. Guest is Mischel Kwon from MKACyber on the evolving role of SOCs. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1573</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5d863a03710649d5845d4db0655d07b4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8679264150.mp3?updated=1608755184" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>VPNFilter and battlespace preparation. XENOTIME may be back, and after industrial systems. GDPR updates. Following Presidential Tweets. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/606/notes</link>
      <description>In today's podcast, we hear that VPNFilter, described by Cisco's Talos research unit, looks like battlespace preparation for Fancy Bear. The FBI may have succeeded in impeding its operation. Dragos describes XENOTIME, the threat actor behind the TRISIS industrial safety system attacks, and they say we can expect them back. GDPR is coming tomorrow, and a company has found a way of letting worried CISOs sleep at night. And your right to follow theRealDonaldTrump on Twitter has now been secured by the US Federal Court for the Southern District of New York. Enjoy. Dr. Charles Clancy from the Hume Center at VA Tech, discussing how cell towers track you even when you have location services disabled (and why that’s a good thing). Guest is Erez Yalon from Checkmarx with their research on Amazon Echo eavesdropping vulnerabilities. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 24 May 2018 20:05:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>606</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/92b86ffe-def8-11ea-911f-278bb8a19c1a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>VPNFilter and battlespace preparation. XENOTIME may be back, and after industrial systems. GDPR updates. Following Presidential Tweets. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that VPNFilter, described by Cisco's Talos research unit, looks like battlespace preparation for Fancy Bear. The FBI may have succeeded in impeding its operation. Dragos describes XENOTIME, the threat actor behind the TRISIS industrial safety system attacks, and they say we can expect them back. GDPR is coming tomorrow, and a company has found a way of letting worried CISOs sleep at night. And your right to follow theRealDonaldTrump on Twitter has now been secured by the US Federal Court for the Southern District of New York. Enjoy. Dr. Charles Clancy from the Hume Center at VA Tech, discussing how cell towers track you even when you have location services disabled (and why that’s a good thing). Guest is Erez Yalon from Checkmarx with their research on Amazon Echo eavesdropping vulnerabilities. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that VPNFilter, described by Cisco's Talos research unit, looks like battlespace preparation for Fancy Bear. The FBI may have succeeded in impeding its operation. Dragos describes XENOTIME, the threat actor behind the TRISIS industrial safety system attacks, and they say we can expect them back. GDPR is coming tomorrow, and a company has found a way of letting worried CISOs sleep at night. And your right to follow theRealDonaldTrump on Twitter has now been secured by the US Federal Court for the Southern District of New York. Enjoy. Dr. Charles Clancy from the Hume Center at VA Tech, discussing how cell towers track you even when you have location services disabled (and why that’s a good thing). Guest is Erez Yalon from Checkmarx with their research on Amazon Echo eavesdropping vulnerabilities. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1279</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[84a7ecf6382440ed8e54895635cf3933]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8104408391.mp3?updated=1689882497" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Variant 4 and other chipset vulnerabilities. Confucius and Patchwork. Turla goes two-stage. Misconfigured not-for-profit bucket. ZTE's fraying lifeline. Facebook and the EU. Brain Food. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/605/notes</link>
      <description>In today's podcast we hear a bit more on Variant 4—we may see more like it. Mitigations are under preparation. The Confucius threat group modifies its approach to targets. Turla adopts a two-stage infection technique. A misconfigured AWS S3 bucket exposes a California not-for-profit's clients. ZTE's lifeline may not be so strong after all: the US Administration wants significant concessions and the US Congress seems to want none of it at all. Facebook's EU testimony gets tepid reviews. And a botnet is pushing smart pills and diet supplements—not that any of you will be tempted. Daniel Prince from Lancaster University on risk management and uncertainty. Guest is Sung Cho from SEWORKS on research they did on the security of fitness apps.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 23 May 2018 19:35:33 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>605</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/92d2892a-def8-11ea-911f-8f5c346863ca/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Variant 4 and other chipset vulnerabilities. Confucius and Patchwork. Turla goes two-stage. Misconfigured not-for-profit bucket. ZTE's fraying lifeline. Facebook and the EU. Brain Food. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear a bit more on Variant 4—we may see more like it. Mitigations are under preparation. The Confucius threat group modifies its approach to targets. Turla adopts a two-stage infection technique. A misconfigured AWS S3 bucket exposes a California not-for-profit's clients. ZTE's lifeline may not be so strong after all: the US Administration wants significant concessions and the US Congress seems to want none of it at all. Facebook's EU testimony gets tepid reviews. And a botnet is pushing smart pills and diet supplements—not that any of you will be tempted. Daniel Prince from Lancaster University on risk management and uncertainty. Guest is Sung Cho from SEWORKS on research they did on the security of fitness apps.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear a bit more on Variant 4—we may see more like it. Mitigations are under preparation. The Confucius threat group modifies its approach to targets. Turla adopts a two-stage infection technique. A misconfigured AWS S3 bucket exposes a California not-for-profit's clients. ZTE's lifeline may not be so strong after all: the US Administration wants significant concessions and the US Congress seems to want none of it at all. Facebook's EU testimony gets tepid reviews. And a botnet is pushing smart pills and diet supplements—not that any of you will be tempted. Daniel Prince from Lancaster University on risk management and uncertainty. Guest is Sung Cho from SEWORKS on research they did on the security of fitness apps.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1275</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c0f77b2ab89a411d9932c8e79be8ff9b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5777049807.mp3?updated=1689882211" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Speculative Store Bypass. GPON-based botnet. Customer data exposures. Roaming Mantis gets more capable. Nation-state threats. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/604/notes</link>
      <description>In today' podcast we hear about the Speculative Store Bypass vulnerability that's been found in most current chipsets. GPON-based routers assembled into botnets. Comcast and TeenSafe close vulnerabilities in transmission and storage of customer data. Roaming Mantis banking Trojan acquires new functionality. Is Moscow waiting for the World Cup to conclude before going on cyberattack? How about Iran and China? Will DPRK hacking be on the summit agenda? And GDPR is coming Friday, to some information near you. Emily Wilson from Terbium Labs on the notion of fear vs. empowerment applied to security. Guest is Sam Elliott from Bomgar with a review of their 2018 Privileged Access Threat Report.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 May 2018 19:11:01 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>604</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/93098eac-def8-11ea-911f-7b1b907db583/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Speculative Store Bypass. GPON-based botnet. Customer data exposures. Roaming Mantis gets more capable. Nation-state threats. </itunes:subtitle>
      <itunes:summary>In today' podcast we hear about the Speculative Store Bypass vulnerability that's been found in most current chipsets. GPON-based routers assembled into botnets. Comcast and TeenSafe close vulnerabilities in transmission and storage of customer data. Roaming Mantis banking Trojan acquires new functionality. Is Moscow waiting for the World Cup to conclude before going on cyberattack? How about Iran and China? Will DPRK hacking be on the summit agenda? And GDPR is coming Friday, to some information near you. Emily Wilson from Terbium Labs on the notion of fear vs. empowerment applied to security. Guest is Sam Elliott from Bomgar with a review of their 2018 Privileged Access Threat Report.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today' podcast we hear about the Speculative Store Bypass vulnerability that's been found in most current chipsets. GPON-based routers assembled into botnets. Comcast and TeenSafe close vulnerabilities in transmission and storage of customer data. Roaming Mantis banking Trojan acquires new functionality. Is Moscow waiting for the World Cup to conclude before going on cyberattack? How about Iran and China? Will DPRK hacking be on the summit agenda? And GDPR is coming Friday, to some information near you. Emily Wilson from Terbium Labs on the notion of fear vs. empowerment applied to security. Guest is Sam Elliott from Bomgar with a review of their 2018 Privileged Access Threat Report.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1226</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2661d6ad5dfd4b3396cbe79ae92c8b0d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2961644481.mp3?updated=1689882196" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DPRK's Sun Team works from three apps in Google Play. PII for sale in Zheijiang. SPEI theft. Jihadist content in social media. SEA charges. DDoS-for-hire sentencing. ZipperDown bug. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/603/notes</link>
      <description>In today's podcast, we hear that North Korea's Sun Team is rising in Red Dawn. Much PII, mostly out of Japan, appears in the black-market stall of a poorly reviewed vendor. The Mexican bank raid seems, the Central Bank says, to have started with a small brokerage and spread from there. Facebook and Google+ continue to be infested with jihadist inspiration. More charges for alleged Syrian Electronic Army hoods. A man gets fifteen years for, among other things, DDoSing former employers. And mobile app users? XYZ. Ben Yelin from UMD CHHS on controversy involving North Carolina police using overly broad warrants to gather location data from Google. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 21 May 2018 18:26:53 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>603</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/931a0bec-def8-11ea-911f-372fd92eaf28/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>DPRK's Sun Team works from three apps in Google Play. PII for sale in Zheijiang. SPEI theft. Jihadist content in social media. SEA charges. DDoS-for-hire sentencing. ZipperDown bug. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that North Korea's Sun Team is rising in Red Dawn. Much PII, mostly out of Japan, appears in the black-market stall of a poorly reviewed vendor. The Mexican bank raid seems, the Central Bank says, to have started with a small brokerage and spread from there. Facebook and Google+ continue to be infested with jihadist inspiration. More charges for alleged Syrian Electronic Army hoods. A man gets fifteen years for, among other things, DDoSing former employers. And mobile app users? XYZ. Ben Yelin from UMD CHHS on controversy involving North Carolina police using overly broad warrants to gather location data from Google. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that North Korea's Sun Team is rising in Red Dawn. Much PII, mostly out of Japan, appears in the black-market stall of a poorly reviewed vendor. The Mexican bank raid seems, the Central Bank says, to have started with a small brokerage and spread from there. Facebook and Google+ continue to be infested with jihadist inspiration. More charges for alleged Syrian Electronic Army hoods. A man gets fifteen years for, among other things, DDoSing former employers. And mobile app users? XYZ. Ben Yelin from UMD CHHS on controversy involving North Carolina police using overly broad warrants to gather location data from Google. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1029</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[203873dea1a840df8fd340b715dfd7a0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7829939637.mp3?updated=1689882184" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Threat actors hijack Lojack. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/36/notes</link>
      <description>Researchers from Arbor Networks' ASERT Threat Intelligence Team recently published a report titled, "Lojack Becomes a Double Agent." It outlines how threat actors are altering legitimate recovery utility software and simulating its command and control servers to gain access to target machines. 
Richard Hummel is manager of the ASERT Threat Research Team, and he joins us to describe their work. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 19 May 2018 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>36</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8b699ee8-df0d-11ea-866e-13c1b34f1355/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Threat actors hijack Lojack</itunes:subtitle>
      <itunes:summary>Researchers from Arbor Networks' ASERT Threat Intelligence Team recently published a report titled, "Lojack Becomes a Double Agent." It outlines how threat actors are altering legitimate recovery utility software and simulating its command and control servers to gain access to target machines. 
Richard Hummel is manager of the ASERT Threat Research Team, and he joins us to describe their work. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers from Arbor Networks' ASERT Threat Intelligence Team recently published a report titled, "<a href="https://asert.arbornetworks.com/lojack-becomes-a-double-agent/">Lojack Becomes a Double Agent.</a>" It outlines how threat actors are altering legitimate recovery utility software and simulating its command and control servers to gain access to target machines. </p><p>Richard Hummel is manager of the ASERT Threat Research Team, and he joins us to describe their work. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1183</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f98c7d864dc643f885e6a4f85726d79c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4367931861.mp3?updated=1685022277" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Something Wicked this way comes. Automating wallet pilferage. Office 365 phsihing scams. DPRK hackers remain active. Recognizing alt-coin investment frauds. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/602/notes</link>
      <description>In today's podcast, we hear that a new Mirai variant is out and about: they call it "Wicked." MEWkit automates coin theft. LocationSmart was buggy and leaky. The US Senate has confirmed Gina Haspel as Director of Cetnral Intelligence. Relaxed tensions along the 38th Parallel aside, North Korea remains active against South Korea in cyberspace. There's a lot of fraud in cryptocurrency investing, and the SEC would like to help you recognize it. David Dufour from Webroot on threat trends. Guest is Heather Vescent, a futurist and author, describing how she applies her work to cyber security.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 18 May 2018 18:56:54 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>602</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/93400234-def8-11ea-911f-7b912d732992/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Something Wicked this way comes. Automating wallet pilferage. Office 365 phsihing scams. DPRK hackers remain active. Recognizing alt-coin investment frauds. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that a new Mirai variant is out and about: they call it "Wicked." MEWkit automates coin theft. LocationSmart was buggy and leaky. The US Senate has confirmed Gina Haspel as Director of Cetnral Intelligence. Relaxed tensions along the 38th Parallel aside, North Korea remains active against South Korea in cyberspace. There's a lot of fraud in cryptocurrency investing, and the SEC would like to help you recognize it. David Dufour from Webroot on threat trends. Guest is Heather Vescent, a futurist and author, describing how she applies her work to cyber security.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that a new Mirai variant is out and about: they call it "Wicked." MEWkit automates coin theft. LocationSmart was buggy and leaky. The US Senate has confirmed Gina Haspel as Director of Cetnral Intelligence. Relaxed tensions along the 38th Parallel aside, North Korea remains active against South Korea in cyberspace. There's a lot of fraud in cryptocurrency investing, and the SEC would like to help you recognize it. David Dufour from Webroot on threat trends. Guest is Heather Vescent, a futurist and author, describing how she applies her work to cyber security.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1529</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3134a8024b7648709d753c02e11c89c7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2792489931.mp3?updated=1608755214" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Competing for terrorist mindshare. ICS threat group update. AnonPlus vandalizes US state sites. GDPR's disclosure timeline. Congressional hearings. DarkOverlord collared. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/601/notes</link>
      <description>In today's podcast, we hear that Al Qaeda is back, howling online toward whatever lone wolves might be within earshot. The CHRYSENE ICS threat group may be looking beyond the Arabian Gulf. AnonPlus is after US state governments—New Mexico, Idaho, and Connecticut have received the hacktivists' puzzling vandalism. What the EU will expect of you within seventy-two hours of discovering a breach. The US Congress wants answers about, among other things, ZTE and Cambridge Analytica. And an alleged DarkOverlord is nabbed in Serbia. Dr. Charles Clancy from the VA Tech’s Hume Center, discussing the skills shortage for the 5G network buildout. Guest is Ryan Barnette from Akamai on Drupalgeddon 2.0. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 17 May 2018 19:43:33 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>601</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/93579548-def8-11ea-911f-4bb954bf6db5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Competing for terrorist mindshare. ICS threat group update. AnonPlus vandalizes US state sites. GDPR's disclosure timeline. Congressional hearings. DarkOverlord collared. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Al Qaeda is back, howling online toward whatever lone wolves might be within earshot. The CHRYSENE ICS threat group may be looking beyond the Arabian Gulf. AnonPlus is after US state governments—New Mexico, Idaho, and Connecticut have received the hacktivists' puzzling vandalism. What the EU will expect of you within seventy-two hours of discovering a breach. The US Congress wants answers about, among other things, ZTE and Cambridge Analytica. And an alleged DarkOverlord is nabbed in Serbia. Dr. Charles Clancy from the VA Tech’s Hume Center, discussing the skills shortage for the 5G network buildout. Guest is Ryan Barnette from Akamai on Drupalgeddon 2.0. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Al Qaeda is back, howling online toward whatever lone wolves might be within earshot. The CHRYSENE ICS threat group may be looking beyond the Arabian Gulf. AnonPlus is after US state governments—New Mexico, Idaho, and Connecticut have received the hacktivists' puzzling vandalism. What the EU will expect of you within seventy-two hours of discovering a breach. The US Congress wants answers about, among other things, ZTE and Cambridge Analytica. And an alleged DarkOverlord is nabbed in Serbia. Dr. Charles Clancy from the VA Tech’s Hume Center, discussing the skills shortage for the 5G network buildout. Guest is Ryan Barnette from Akamai on Drupalgeddon 2.0. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1225</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7f113212a6b64075af2b66baafad3702]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2866876831.mp3?updated=1689882136" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Spyware campaigns: phishing and watering holes. Signal patches (fast). DHS cyber strategy. Russian election hacking. Cyber Investing Summit. Do smart people pick better passwords? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/600/notes</link>
      <description>In today's podcast we hear that a spyware campaign centered on Pakistan and thought to be the work of Pakistan's military, comes in two variants: one for Android, the other for iOS. Vietnam is said to be phishing in a compromised Phom Penh Post website. Signal patches a cross-site-scripting issue very rapidly. The US Department of Homeland Security releases its cybersecurity strategy. The Cambridge Analytica whistleblower talks to the Senate Judiciary Committee. The Senate Intelligence Committee concludes that the Russians didn't like Hilary Clinton. Investigation of Vault 7 leaks continues. Notes from the Cyber Investing Summit. And if you're so smart, how come your password is "Ninja?" Johannes Ullrich from SANS and the ISC Stormcast podcast, discusses the EFail email encryption issue. Guest is Michelle Maitland from SecureStrux on risk management framework compliance.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 16 May 2018 20:19:50 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>600</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/937b4bd2-def8-11ea-911f-0b74ca4a5441/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Spyware campaigns: phishing and watering holes. Signal patches (fast). DHS cyber strategy. Russian election hacking. Cyber Investing Summit. Do smart people pick better passwords? </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that a spyware campaign centered on Pakistan and thought to be the work of Pakistan's military, comes in two variants: one for Android, the other for iOS. Vietnam is said to be phishing in a compromised Phom Penh Post website. Signal patches a cross-site-scripting issue very rapidly. The US Department of Homeland Security releases its cybersecurity strategy. The Cambridge Analytica whistleblower talks to the Senate Judiciary Committee. The Senate Intelligence Committee concludes that the Russians didn't like Hilary Clinton. Investigation of Vault 7 leaks continues. Notes from the Cyber Investing Summit. And if you're so smart, how come your password is "Ninja?" Johannes Ullrich from SANS and the ISC Stormcast podcast, discusses the EFail email encryption issue. Guest is Michelle Maitland from SecureStrux on risk management framework compliance.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that a spyware campaign centered on Pakistan and thought to be the work of Pakistan's military, comes in two variants: one for Android, the other for iOS. Vietnam is said to be phishing in a compromised Phom Penh Post website. Signal patches a cross-site-scripting issue very rapidly. The US Department of Homeland Security releases its cybersecurity strategy. The Cambridge Analytica whistleblower talks to the Senate Judiciary Committee. The Senate Intelligence Committee concludes that the Russians didn't like Hilary Clinton. Investigation of Vault 7 leaks continues. Notes from the Cyber Investing Summit. And if you're so smart, how come your password is "Ninja?" Johannes Ullrich from SANS and the ISC Stormcast podcast, discusses the EFail email encryption issue. Guest is Michelle Maitland from SecureStrux on risk management framework compliance.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1249</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[764de8673bff417ea6b5d51553405ed3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8590374950.mp3?updated=1689881984" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Email client vulnerabilities. Sanctions and trade policy. FinFisher in Turkey. myPersonality data scandal. Patch news. High school phishing. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/599/notes</link>
      <description>In today's podcast, we hear about reports of email client vulnerabilities. Worries about Russian and Chinese software and hardware vendors. Security and trade policy notes. FinFisher found used in Turkey. The data scandal that brought down Cambridge Analytica moves to the University of Cambridge, but there the issues seem to be security, anonymization, and possible oversharing. Adobe and Samsung issue patches. A California high school student is accused of phishing for grade books. Ben Yelin from UMD CHHS on the Microsoft overseas data storage case that went to the U.S. Supreme Court. Guest is John Grimm from Thales eSecurity on their Global Encryption Trends study that they put together along with the Ponemon Institute.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 May 2018 19:02:15 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>599</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/93935f74-def8-11ea-911f-ef0f8b742786/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Email client vulnerabilities. Sanctions and trade policy. FinFisher in Turkey. myPersonality data scandal. Patch news. High school phishing. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about reports of email client vulnerabilities. Worries about Russian and Chinese software and hardware vendors. Security and trade policy notes. FinFisher found used in Turkey. The data scandal that brought down Cambridge Analytica moves to the University of Cambridge, but there the issues seem to be security, anonymization, and possible oversharing. Adobe and Samsung issue patches. A California high school student is accused of phishing for grade books. Ben Yelin from UMD CHHS on the Microsoft overseas data storage case that went to the U.S. Supreme Court. Guest is John Grimm from Thales eSecurity on their Global Encryption Trends study that they put together along with the Ponemon Institute.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about reports of email client vulnerabilities. Worries about Russian and Chinese software and hardware vendors. Security and trade policy notes. FinFisher found used in Turkey. The data scandal that brought down Cambridge Analytica moves to the University of Cambridge, but there the issues seem to be security, anonymization, and possible oversharing. Adobe and Samsung issue patches. A California high school student is accused of phishing for grade books. Ben Yelin from UMD CHHS on the Microsoft overseas data storage case that went to the U.S. Supreme Court. Guest is John Grimm from Thales eSecurity on their Global Encryption Trends study that they put together along with the Ponemon Institute.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1281</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f2d54fc12a0c407d83ed738d4a5361ef]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9963026288.mp3?updated=1689881969" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Unauthorized banking transfers in Mexico? A lifeline for ZTE. Iranian cyber op-tempo rises. Russian troll farm's ad buys. Reining in apps. Cell tracking. Anonymous is back. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/598/notes</link>
      <description>In today's podcast we hear that Mexican banks may have sustained unauthorized funds transfers. Presidents Trump and Xi seem willing to toss a lifeline to drowning ZTE. Some researchers report an uptick in Iranian cyber operations. Russia's premier troll farm bought Facebook and Instagram ads targeting American teenaged girls. Apple, Facebook, and Twitter tighten their grip on apps connecting to their stores or services. Police cell-tracking receives scrutiny. And Anonymous is back. Justin Harvey from Accenture with his thoughts on whether the U.S. pulling out of the Iran nuclear deal will lead to more cyber attacks from Iran. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 14 May 2018 18:02:16 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>598</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/93acae20-def8-11ea-911f-bfd1f2a5ad00/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Unauthorized banking transfers in Mexico? A lifeline for ZTE. Iranian cyber op-tempo rises. Russian troll farm's ad buys. Reining in apps. Cell tracking. Anonymous is back. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Mexican banks may have sustained unauthorized funds transfers. Presidents Trump and Xi seem willing to toss a lifeline to drowning ZTE. Some researchers report an uptick in Iranian cyber operations. Russia's premier troll farm bought Facebook and Instagram ads targeting American teenaged girls. Apple, Facebook, and Twitter tighten their grip on apps connecting to their stores or services. Police cell-tracking receives scrutiny. And Anonymous is back. Justin Harvey from Accenture with his thoughts on whether the U.S. pulling out of the Iran nuclear deal will lead to more cyber attacks from Iran. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Mexican banks may have sustained unauthorized funds transfers. Presidents Trump and Xi seem willing to toss a lifeline to drowning ZTE. Some researchers report an uptick in Iranian cyber operations. Russia's premier troll farm bought Facebook and Instagram ads targeting American teenaged girls. Apple, Facebook, and Twitter tighten their grip on apps connecting to their stores or services. Police cell-tracking receives scrutiny. And Anonymous is back. Justin Harvey from Accenture with his thoughts on whether the U.S. pulling out of the Iran nuclear deal will lead to more cyber attacks from Iran. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>969</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[abe51f305aee502ed53f5268745acad8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6599161461.mp3?updated=1689881956" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Three pillars of Artificial Intelligence. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/35/notes</link>
      <description>Bobby Filar is a Principal Data Scientist at Endgame, and coauthor of the research paper, The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. The report surveys the landscape of potential security threats from malicious uses of AI, and proposes ways to better forecast, prevent, and mitigate these threats. Bobby Filar joins us to discuss the paper, and his views on the evolving role of AI in cybersecurity. 
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 12 May 2018 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>35</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/88cfe53e-df0d-11ea-9c25-5716f9ffbb98/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Three pillars of Artificial Intelligence</itunes:subtitle>
      <itunes:summary>Bobby Filar is a Principal Data Scientist at Endgame, and coauthor of the research paper, The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. The report surveys the landscape of potential security threats from malicious uses of AI, and proposes ways to better forecast, prevent, and mitigate these threats. Bobby Filar joins us to discuss the paper, and his views on the evolving role of AI in cybersecurity. 
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Bobby Filar is a Principal Data Scientist at Endgame, and coauthor of the research paper, The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation. The report surveys the landscape of potential security threats from malicious uses of AI, and proposes ways to better forecast, prevent, and mitigate these threats. Bobby Filar joins us to discuss the paper, and his views on the evolving role of AI in cybersecurity. </p><p><a href="https://arxiv.org/abs/1802.07228">The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and Mitigation</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2090</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[89bdf7f153fae7ea5e87670499d55e75]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4503444091.mp3?updated=1685022367" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Vigilantes and hacktivists. Point-of-sale malware source code leaks. Malicious extensions and apps. US Federal indictments: spying and hacking. Robo-caller gets record fine.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/597/notes</link>
      <description>In today's podcast, we hear that vigilantes have visited ZooPark, and the lights go out—voluntarily—on some Georgia hacktivists. Treasure Hunter source code posted to a criminal forum. Malicious Chrome extensions and malicious Android photo-editing apps. GrandCrab ransomware served by compromised legitimate sites. Russian influence ops. Concerns about a resumption of Iranian hacking. Ex-CIA officer charged with espionage. Hobby hacker indicted on Federal charges. FCC hits a robo-caller with a record fine. Jonathan Katz from UMD on why cryptography is more challenging than many software engineers think. Guest is Cyrus Farivar, author of the book Habeas Data, Privacy vs. the Rise of Surveillance Tech. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 11 May 2018 20:13:02 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>597</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/93c823da-def8-11ea-911f-37c4b3c22291/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Vigilantes and hacktivists. Point-of-sale malware source code leaks. Malicious extensions and apps. US Federal indictments: spying and hacking. Robo-caller gets record fine.  </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that vigilantes have visited ZooPark, and the lights go out—voluntarily—on some Georgia hacktivists. Treasure Hunter source code posted to a criminal forum. Malicious Chrome extensions and malicious Android photo-editing apps. GrandCrab ransomware served by compromised legitimate sites. Russian influence ops. Concerns about a resumption of Iranian hacking. Ex-CIA officer charged with espionage. Hobby hacker indicted on Federal charges. FCC hits a robo-caller with a record fine. Jonathan Katz from UMD on why cryptography is more challenging than many software engineers think. Guest is Cyrus Farivar, author of the book Habeas Data, Privacy vs. the Rise of Surveillance Tech. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that vigilantes have visited ZooPark, and the lights go out—voluntarily—on some Georgia hacktivists. Treasure Hunter source code posted to a criminal forum. Malicious Chrome extensions and malicious Android photo-editing apps. GrandCrab ransomware served by compromised legitimate sites. Russian influence ops. Concerns about a resumption of Iranian hacking. Ex-CIA officer charged with espionage. Hobby hacker indicted on Federal charges. FCC hits a robo-caller with a record fine. Jonathan Katz from UMD on why cryptography is more challenging than many software engineers think. Guest is Cyrus Farivar, author of the book Habeas Data, Privacy vs. the Rise of Surveillance Tech. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1493</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c5034cc87bb23f8b4cab9f2559dcbc33]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6822201596.mp3?updated=1608754742" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber conflict between Iran and the US widely expected. ALLENITE threat group is after US, UK power grids. Jack-in-the-Box vulnerability. Signal's memory. Is ZTE going down? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/596/notes</link>
      <description>In today's podcast we hear that US withdrawal from the Iranian nuclear deal is widely taken as heralding a new round of cyber conflict. Cyberattacks on critical infrastructure are seen as an asymmetric way of war. The ALLANITE threat group is observed successfully reconnoitering US and UK electrical power grids. Jack-in-the-Box does nasty things with images. Signal's self-deleting messages don't, or at least they don't always. And US sanctions may be putting ZTE out of business. Robert M. Lee from Dragos on the sliding scale of cyber security. Guest is Jonathan Matkowsky from RiskIQ with concerns over ICANNs pending interim policy changes on the WHOIS database in response to GDPR.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 10 May 2018 19:50:17 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>596</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/93e4a578-def8-11ea-911f-fb6a6b062f89/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyber conflict between Iran and the US widely expected. ALLENITE threat group is after US, UK power grids. Jack-in-the-Box vulnerability. Signal's memory. Is ZTE going down? </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that US withdrawal from the Iranian nuclear deal is widely taken as heralding a new round of cyber conflict. Cyberattacks on critical infrastructure are seen as an asymmetric way of war. The ALLANITE threat group is observed successfully reconnoitering US and UK electrical power grids. Jack-in-the-Box does nasty things with images. Signal's self-deleting messages don't, or at least they don't always. And US sanctions may be putting ZTE out of business. Robert M. Lee from Dragos on the sliding scale of cyber security. Guest is Jonathan Matkowsky from RiskIQ with concerns over ICANNs pending interim policy changes on the WHOIS database in response to GDPR.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that US withdrawal from the Iranian nuclear deal is widely taken as heralding a new round of cyber conflict. Cyberattacks on critical infrastructure are seen as an asymmetric way of war. The ALLANITE threat group is observed successfully reconnoitering US and UK electrical power grids. Jack-in-the-Box does nasty things with images. Signal's self-deleting messages don't, or at least they don't always. And US sanctions may be putting ZTE out of business. Robert M. Lee from Dragos on the sliding scale of cyber security. Guest is Jonathan Matkowsky from RiskIQ with concerns over ICANNs pending interim policy changes on the WHOIS database in response to GDPR.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1250</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5d6ac97b0bcc54ce178fd01f088fd9ed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1085300453.mp3?updated=1689881438" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Subborn IoT botnets. Razzle-dazzle HTML phishing lure. Fancy Bear's false flag. Busy Yahoo boys. Crooks turn from Tor to Telegram. Kaspersky and contractors. Patch notes. SB 315 vetoed. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/595/notes</link>
      <description>In today's podcast we hear about Hide-and-Seek, a hard to flush botnet. A phishing technique takes advantage of an email client's rendering of HTML. Facebook death threats in 2015 are said to have been the work of Fancy Bear, dressed up as the Cyber Caliphate. Nigeria's Yahoo boys are busier than ever. DHS wonders what it will take to get US Federal contractors to get rid of Kaspersky. Crooks turn from Tor to Telegram. Patch Tuesday notes. And Georgia's governor vetoes a controversial cybersecurity bill. Joe Carrigan from JHU ISI on a pilot program from Delaware on mobile drivers licenses. Guest is Phillip Dunkelberger from Nok Nok Labs on authentication usability, standardization, and security issues. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 09 May 2018 18:29:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>595</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/93f5aad0-def8-11ea-911f-1793de522cea/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Subborn IoT botnets. Razzle-dazzle HTML phishing lure. Fancy Bear's false flag. Busy Yahoo boys. Crooks turn from Tor to Telegram. Kaspersky and contractors. Patch notes. SB 315 vetoed. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear about Hide-and-Seek, a hard to flush botnet. A phishing technique takes advantage of an email client's rendering of HTML. Facebook death threats in 2015 are said to have been the work of Fancy Bear, dressed up as the Cyber Caliphate. Nigeria's Yahoo boys are busier than ever. DHS wonders what it will take to get US Federal contractors to get rid of Kaspersky. Crooks turn from Tor to Telegram. Patch Tuesday notes. And Georgia's governor vetoes a controversial cybersecurity bill. Joe Carrigan from JHU ISI on a pilot program from Delaware on mobile drivers licenses. Guest is Phillip Dunkelberger from Nok Nok Labs on authentication usability, standardization, and security issues. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about Hide-and-Seek, a hard to flush botnet. A phishing technique takes advantage of an email client's rendering of HTML. Facebook death threats in 2015 are said to have been the work of Fancy Bear, dressed up as the Cyber Caliphate. Nigeria's Yahoo boys are busier than ever. DHS wonders what it will take to get US Federal contractors to get rid of Kaspersky. Crooks turn from Tor to Telegram. Patch Tuesday notes. And Georgia's governor vetoes a controversial cybersecurity bill. Joe Carrigan from JHU ISI on a pilot program from Delaware on mobile drivers licenses. Guest is Phillip Dunkelberger from Nok Nok Labs on authentication usability, standardization, and security issues. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1188</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[34d549bb966e90d8d3068f655e0b3d6c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6621128812.mp3?updated=1689881426" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Greek and Turkish hacktivists swap defacements. Process Doppelgänging in the wild. GDRP is coming (like winter, for you Game of Thrones fans.) Profiling infosec enthusiasts. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/594/notes</link>
      <description>In today's podcast we hear that hacktivist lightning is flashing across the Aegean, hitting Greek and Turkish TV stations. Process Doppelgänging is observed in ransomware circulating in the wild. Unstructured data could expose enterprises to GDPR regulatory risk. So might transitive data sharing. Big US companies are ready to follow GDPR standards in North America as well as Europe. Older Lantech industrial servers appear vulnerable to remote code execution. Vandals hit security cameras in Japan. And teachers, don't necessarily leave those kids alone, but maybe that cultist is actually an infosec enthusiast. Emily Wilson from Terbium Labs on third party data showing up on the dark web. Guest is Chris Dollase from Mimecast on the role of the threat researcher.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 May 2018 17:15:14 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>594</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9411e682-def8-11ea-911f-df9ff7cca4be/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Greek and Turkish hacktivists swap defacements. Process Doppelgänging in the wild. GDRP is coming (like winter, for you Game of Thrones fans.) Profiling infosec enthusiasts. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that hacktivist lightning is flashing across the Aegean, hitting Greek and Turkish TV stations. Process Doppelgänging is observed in ransomware circulating in the wild. Unstructured data could expose enterprises to GDPR regulatory risk. So might transitive data sharing. Big US companies are ready to follow GDPR standards in North America as well as Europe. Older Lantech industrial servers appear vulnerable to remote code execution. Vandals hit security cameras in Japan. And teachers, don't necessarily leave those kids alone, but maybe that cultist is actually an infosec enthusiast. Emily Wilson from Terbium Labs on third party data showing up on the dark web. Guest is Chris Dollase from Mimecast on the role of the threat researcher.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that hacktivist lightning is flashing across the Aegean, hitting Greek and Turkish TV stations. Process Doppelgänging is observed in ransomware circulating in the wild. Unstructured data could expose enterprises to GDPR regulatory risk. So might transitive data sharing. Big US companies are ready to follow GDPR standards in North America as well as Europe. Older Lantech industrial servers appear vulnerable to remote code execution. Vandals hit security cameras in Japan. And teachers, don't necessarily leave those kids alone, but maybe that cultist is actually an infosec enthusiast. Emily Wilson from Terbium Labs on third party data showing up on the dark web. Guest is Chris Dollase from Mimecast on the role of the threat researcher.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1209</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7019a13b29d9a351a7e874745717ebf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4086543354.mp3?updated=1689881414" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>2018 RSAC Outlook. [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/23/notes</link>
      <description>Just before the RSA conference this year, we spoke with a pair of industry experts for their take on the year so far, and what they expect to see in the coming months. In this CyberWire Special Edition, we hear from Craig Williams, Director of Talos Outreach at Cisco, and later in the show from Jon Rooney, Vice President of Product marketing at Splunk.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 May 2018 15:38:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>23</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a5c69cd6-df04-11ea-ac92-2fc5228b72b4/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>2018 RSAC Outlook</itunes:subtitle>
      <itunes:summary>Just before the RSA conference this year, we spoke with a pair of industry experts for their take on the year so far, and what they expect to see in the coming months. In this CyberWire Special Edition, we hear from Craig Williams, Director of Talos Outreach at Cisco, and later in the show from Jon Rooney, Vice President of Product marketing at Splunk.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Just before the RSA conference this year, we spoke with a pair of industry experts for their take on the year so far, and what they expect to see in the coming months. In this CyberWire Special Edition, we hear from Craig Williams, Director of Talos Outreach at Cisco, and later in the show from Jon Rooney, Vice President of Product marketing at Splunk.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1177</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3d590d7f19f13b8ca42b5673c8f636e5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3548272160.mp3?updated=1656711871" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Winnti Umbrella covers multiple threat actors. DPRK off-shores cyber ops. ZooPark is in its fourth generation. GPON router bugs exploited in the wild. Russian Twitterbots. Block the EU? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/593/notes</link>
      <description>In today's podcast we hear that Chinese intelligence services have been seen beneath the Winnti Umbrella. North Korea's off-shoring of cyber operations. ZooPark Android spyware is now in its fourth generation, and still active in the Middle East and North Africa. Vulnerabilities in Dasan GPON routers are exploited in the wild. Russian Twitterbots are suspected of tweeting death threats in the UK. David Dufour from Webroot on anti-malware testing procedures. And how do you solve a problem like GDPR? 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 07 May 2018 19:16:55 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>593</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/942a00a0-def8-11ea-911f-cf671e81b265/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Winnti Umbrella covers multiple threat actors. DPRK off-shores cyber ops. ZooPark is in its fourth generation. GPON router bugs exploited in the wild. Russian Twitterbots. Block the EU? </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Chinese intelligence services have been seen beneath the Winnti Umbrella. North Korea's off-shoring of cyber operations. ZooPark Android spyware is now in its fourth generation, and still active in the Middle East and North Africa. Vulnerabilities in Dasan GPON routers are exploited in the wild. Russian Twitterbots are suspected of tweeting death threats in the UK. David Dufour from Webroot on anti-malware testing procedures. And how do you solve a problem like GDPR? 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Chinese intelligence services have been seen beneath the Winnti Umbrella. North Korea's off-shoring of cyber operations. ZooPark Android spyware is now in its fourth generation, and still active in the Middle East and North Africa. Vulnerabilities in Dasan GPON routers are exploited in the wild. Russian Twitterbots are suspected of tweeting death threats in the UK. David Dufour from Webroot on anti-malware testing procedures. And how do you solve a problem like GDPR? </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1026</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a750bf477a910d93a7361546ac5d513c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5399887969.mp3?updated=1689881400" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BlackTDS and ThreadKit offered in criminal markets. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/34/notes</link>
      <description>Kevin Epstein is Vice President of Proofpoint's Threat Operations Center. We’re discussing two bits of research with him today. The first is about  BlackTDS, a traffic distribution tool for sale in dark web markets. A little later in the show, he’ll tell us about  ThreadKit, a document exploit builder.
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 05 May 2018 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>34</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/860b8ba0-df0d-11ea-8fcf-6fd3578c86ab/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>BlackTDS and ThreadKit offered in criminal markets</itunes:subtitle>
      <itunes:summary>Kevin Epstein is Vice President of Proofpoint's Threat Operations Center. We’re discussing two bits of research with him today. The first is about  BlackTDS, a traffic distribution tool for sale in dark web markets. A little later in the show, he’ll tell us about  ThreadKit, a document exploit builder.
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Kevin Epstein is Vice President of Proofpoint's Threat Operations Center. We’re discussing two bits of research with him today. The first is about <a href="https://www.proofpoint.com/us/threat-insight/post/drive-service-blacktds"> BlackTDS, a traffic distribution tool</a> for sale in dark web markets. A little later in the show, he’ll tell us about <a href="https://www.proofpoint.com/us/threat-insight/post/unraveling-ThreadKit-new-document-exploit-builder-distribute-The-Trick-Formbook-Loki-Bot-malware"> ThreadKit, a document exploit builder.</a></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1432</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6695fe330548bc161b91b3452097218a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8310924898.mp3?updated=1685021729" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>In the shredder or off the truck? Battlespace prep for a supply chain campaign? NG-Spectre found in Intel chips. No domain fronting for you. Kitty mines monero. NSA, US Cyber Command under new management. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/592/notes</link>
      <description>In today's podcast we hear that they're hoping in Australia that backup tapes made it to the shredder, and didn't fall off the truck. Equifax's board of directors gets reelected. Are China's espionage services preparing the battlespace for a supply chain attack. New Spectre-like vulnerabilities are found in Intel chips. Google and Amazon clamp down on domain fronting, and anti-censorship advocates are unhappy. Here Kitty…we have Monero for you. And a change of command at NSA and US Cyber Command. Johannes Ullrich from SANS and the Internet Stormcast podcast, reviewing the history of hardware flaws. Guest is Philip Tully from ZeroFox with a recap of a talk he gave at RSA on AI. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 04 May 2018 19:53:15 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>592</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/944538f2-def8-11ea-911f-23c68a03606d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In the shredder or off the truck? Battlespace prep for a supply chain campaign? NG-Spectre found in Intel chips. No domain fronting for you. Kitty mines monero. NSA, US Cyber Command under new management. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that they're hoping in Australia that backup tapes made it to the shredder, and didn't fall off the truck. Equifax's board of directors gets reelected. Are China's espionage services preparing the battlespace for a supply chain attack. New Spectre-like vulnerabilities are found in Intel chips. Google and Amazon clamp down on domain fronting, and anti-censorship advocates are unhappy. Here Kitty…we have Monero for you. And a change of command at NSA and US Cyber Command. Johannes Ullrich from SANS and the Internet Stormcast podcast, reviewing the history of hardware flaws. Guest is Philip Tully from ZeroFox with a recap of a talk he gave at RSA on AI. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that they're hoping in Australia that backup tapes made it to the shredder, and didn't fall off the truck. Equifax's board of directors gets reelected. Are China's espionage services preparing the battlespace for a supply chain attack. New Spectre-like vulnerabilities are found in Intel chips. Google and Amazon clamp down on domain fronting, and anti-censorship advocates are unhappy. Here Kitty…we have Monero for you. And a change of command at NSA and US Cyber Command. Johannes Ullrich from SANS and the Internet Stormcast podcast, reviewing the history of hardware flaws. Guest is Philip Tully from ZeroFox with a recap of a talk he gave at RSA on AI. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1599</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[005b8c3da43ffe6d075da6a1ca2d105e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2353600239.mp3?updated=1608754760" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lojack for Laptops backdoor? World Cup cybersecurity. Schneider Electric patch. Reward points for sale. Medical device vulnerabilities. PPD-20 revision?  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/591/notes</link>
      <description>In today's podcast we look at some indications that LoJack for Laptops might have been compromised to report back to Moscow. World Cup cybersecurity. Schneider Electric patches developer's tools. Travel and hospitality rewards points are the menhaden of the black market. Medical device vulnerabilities. Taking the gloves off Cyber Command. It's National Password Day, and Microsoft (along with many others) would like to move beyond the password. And a requiem on Press Freedom Day for working journalists murdered by the Taliban. Ben Yelin from UMD CHHS discussing who’s responsible when an AI kills someone. Guest is Edna Conway from Cisco on pervasive security architecture and third party risk. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 03 May 2018 19:32:06 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>591</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/945f0836-def8-11ea-911f-7bfb3649e2d5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Lojack for Laptops backdoor? World Cup cybersecurity. Schneider Electric patch. Reward points for sale. Medical device vulnerabilities. PPD-20 revision?  </itunes:subtitle>
      <itunes:summary>In today's podcast we look at some indications that LoJack for Laptops might have been compromised to report back to Moscow. World Cup cybersecurity. Schneider Electric patches developer's tools. Travel and hospitality rewards points are the menhaden of the black market. Medical device vulnerabilities. Taking the gloves off Cyber Command. It's National Password Day, and Microsoft (along with many others) would like to move beyond the password. And a requiem on Press Freedom Day for working journalists murdered by the Taliban. Ben Yelin from UMD CHHS discussing who’s responsible when an AI kills someone. Guest is Edna Conway from Cisco on pervasive security architecture and third party risk. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we look at some indications that LoJack for Laptops might have been compromised to report back to Moscow. World Cup cybersecurity. Schneider Electric patches developer's tools. Travel and hospitality rewards points are the menhaden of the black market. Medical device vulnerabilities. Taking the gloves off Cyber Command. It's National Password Day, and Microsoft (along with many others) would like to move beyond the password. And a requiem on Press Freedom Day for working journalists murdered by the Taliban. Ben Yelin from UMD CHHS discussing who’s responsible when an AI kills someone. Guest is Edna Conway from Cisco on pervasive security architecture and third party risk. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1294</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4209f27609d958bbfbe9b463fd67d8f0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7909707636.mp3?updated=1689880353" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New nation-state actors in cyberspace. SiliVaccine AV said to incorporate pirated code. Credential stuffing and password reuse. GravityRAT evades sandboxes. GDPR approaches. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/590/notes</link>
      <description>In today's podcast we hear that more nation-states have acquired and are using cyber capabilities. North Korea's SiliVaccine anti-virus product appears to have pirated an old version of Trend Micro's scan engine. Despite warnings of credential stuffing, people still reuse passwords. GravityRAT now takes its victims' temperature. Many firms remain unprepared for GDPR. Questions arise about possible overpreparation by two of the biggest companies out there. And some dimwit has hacked a highway sign in Arizona. (Congratulations, knucklehead.) Justin Harvey from Accenture on the uptick in credential harvesting they’re seeing. Guest is Piero DePaoli from Service Now with results from their recently published security report. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 02 May 2018 18:01:33 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>590</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/94751db0-def8-11ea-911f-2314d83a3547/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>New nation-state actors in cyberspace. SiliVaccine AV said to incorporate pirated code. Credential stuffing and password reuse. GravityRAT evades sandboxes. GDPR approaches. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that more nation-states have acquired and are using cyber capabilities. North Korea's SiliVaccine anti-virus product appears to have pirated an old version of Trend Micro's scan engine. Despite warnings of credential stuffing, people still reuse passwords. GravityRAT now takes its victims' temperature. Many firms remain unprepared for GDPR. Questions arise about possible overpreparation by two of the biggest companies out there. And some dimwit has hacked a highway sign in Arizona. (Congratulations, knucklehead.) Justin Harvey from Accenture on the uptick in credential harvesting they’re seeing. Guest is Piero DePaoli from Service Now with results from their recently published security report. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that more nation-states have acquired and are using cyber capabilities. North Korea's SiliVaccine anti-virus product appears to have pirated an old version of Trend Micro's scan engine. Despite warnings of credential stuffing, people still reuse passwords. GravityRAT now takes its victims' temperature. Many firms remain unprepared for GDPR. Questions arise about possible overpreparation by two of the biggest companies out there. And some dimwit has hacked a highway sign in Arizona. (Congratulations, knucklehead.) Justin Harvey from Accenture on the uptick in credential harvesting they’re seeing. Guest is Piero DePaoli from Service Now with results from their recently published security report. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1264</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[712adac6301268fe93271430851e762c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5301831017.mp3?updated=1689880338" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Payment system hack investigated. Patch weaponization. Medical zero-days for sale. Responsible disclosure. Bad bots attack. Car hacking. Trends in phishbait. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/589/notes</link>
      <description>In today's podcast, we hear that a possible bank payment system hack remains under investigation in Mexico. Medical zero-days for sale, and not on the black market. SamSam continues to spread. What to look for in bad bots. Patched vulnerabilities are being weaponized at higher rates. Proof-of-concept car hacking demonstration shows in-vehicle infotainment system vulnerabilities. And when you see these phishbait phrases in an email subject line, be sure to spit the hook. Emily Wilson from Terbium Labs on recent takedowns of content on Reddit. Guest is Patrick Peterson from Agari on Brand Indicators for Message Identification (BIMI), a proposed standard to better secure email. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 May 2018 19:51:17 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>589</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/948c4cf6-def8-11ea-911f-47453c81d725/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Payment system hack investigated. Patch weaponization. Medical zero-days for sale. Responsible disclosure. Bad bots attack. Car hacking. Trends in phishbait. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that a possible bank payment system hack remains under investigation in Mexico. Medical zero-days for sale, and not on the black market. SamSam continues to spread. What to look for in bad bots. Patched vulnerabilities are being weaponized at higher rates. Proof-of-concept car hacking demonstration shows in-vehicle infotainment system vulnerabilities. And when you see these phishbait phrases in an email subject line, be sure to spit the hook. Emily Wilson from Terbium Labs on recent takedowns of content on Reddit. Guest is Patrick Peterson from Agari on Brand Indicators for Message Identification (BIMI), a proposed standard to better secure email. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that a possible bank payment system hack remains under investigation in Mexico. Medical zero-days for sale, and not on the black market. SamSam continues to spread. What to look for in bad bots. Patched vulnerabilities are being weaponized at higher rates. Proof-of-concept car hacking demonstration shows in-vehicle infotainment system vulnerabilities. And when you see these phishbait phrases in an email subject line, be sure to spit the hook. Emily Wilson from Terbium Labs on recent takedowns of content on Reddit. Guest is Patrick Peterson from Agari on Brand Indicators for Message Identification (BIMI), a proposed standard to better secure email. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1222</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8333c5e2396dbbdacb19eaa0d0476582]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3240439333.mp3?updated=1689880323" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bank hack in Mexico. FacexWorm goes cryptomining. SamSam's volume discount. Influence ops. Researchers confirm that teams use teamwork. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/588/notes</link>
      <description>In today's podcast, we hear about an attempted banking hack in Mexcio. Hidden Cobra gets busy around diplomacy. The FacexWorm adds cryptomining functionality. SamSam ransomware looks to catpure entire enterprises. A Sunday Times investigation finds that Russian Twitterbots tried to swing British voters toward Labour. The US House Intelligence Committee has released its report on influence operations during the last US Presidential election. Researchers find that teams and committees are different things. Robert M. Lee from Dragos on regulations vs. incentives. Guest is Dan Lyon from Synopsys on IoT security.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 30 Apr 2018 19:30:03 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>588</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/94a4bbf6-def8-11ea-911f-3f77f5a034a6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Bank hack in Mexico. FacexWorm goes cryptomining. SamSam's volume discount. Influence ops. Researchers confirm that teams use teamwork. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about an attempted banking hack in Mexcio. Hidden Cobra gets busy around diplomacy. The FacexWorm adds cryptomining functionality. SamSam ransomware looks to catpure entire enterprises. A Sunday Times investigation finds that Russian Twitterbots tried to swing British voters toward Labour. The US House Intelligence Committee has released its report on influence operations during the last US Presidential election. Researchers find that teams and committees are different things. Robert M. Lee from Dragos on regulations vs. incentives. Guest is Dan Lyon from Synopsys on IoT security.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about an attempted banking hack in Mexcio. Hidden Cobra gets busy around diplomacy. The FacexWorm adds cryptomining functionality. SamSam ransomware looks to catpure entire enterprises. A Sunday Times investigation finds that Russian Twitterbots tried to swing British voters toward Labour. The US House Intelligence Committee has released its report on influence operations during the last US Presidential election. Researchers find that teams and committees are different things. Robert M. Lee from Dragos on regulations vs. incentives. Guest is Dan Lyon from Synopsys on IoT security.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1305</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1ca6bc9988c3ae41641299dd82acbad2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4725983284.mp3?updated=1689880311" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New MacOS backdoor linked to OceanLotus. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/33/notes</link>
      <description>Researchers at Trend Micro recently discovered a backdoor targeting MacOS users that they believe is the work of the OceanLotus threat group, an organization previously thought to have launched targeted attacks against human rights organizations, media organizations, research institutes, and maritime construction firms.
Mark Nunnikhoven is VP of Cloud Research at Trend Micro, and he explains what they've learned. 
https://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Apr 2018 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>33</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/821e5946-df0d-11ea-9fc1-0b0cd99039e2/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>New MacOS backdoor linked to OceanLotus</itunes:subtitle>
      <itunes:summary>Researchers at Trend Micro recently discovered a backdoor targeting MacOS users that they believe is the work of the OceanLotus threat group, an organization previously thought to have launched targeted attacks against human rights organizations, media organizations, research institutes, and maritime construction firms.
Mark Nunnikhoven is VP of Cloud Research at Trend Micro, and he explains what they've learned. 
https://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Trend Micro recently discovered a backdoor targeting MacOS users that they believe is the work of the OceanLotus threat group, an organization previously thought to have launched targeted attacks against human rights organizations, media organizations, research institutes, and maritime construction firms.</p><p>Mark Nunnikhoven is VP of Cloud Research at Trend Micro, and he explains what they've learned. </p><p>https://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/</p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1354</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e7c40a56a774585db10694ad9a64f0f5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3182286855.mp3?updated=1685021721" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Crimeware kits, ransomware, and source code breaches. The Internet conduces to organic radicalization. Russia in Finland. Snooper's Charter notes. Crypt armistice or just key escrow? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/587/notes</link>
      <description>In today's podcast we hear that Rubella hits the shelves of the criminal black market—it's the crimeware kit, not the German measles. Necurs gets shifty by going retro. iPhone unlocking specialists endure an apparently minor breach. The sad story of structural extremism on the Internet. Finland says the Russians are coming there, too. Snooper's Charter setback. Proposed bill would make it easier for DHS to clean US Federal networks. Crypto Wars modus vivendi said to be just key escrow. Dr. Charles Clancy from VA Tech Hume Center on the 5G mobile network rollout. Guest is Merike Kaeo from Farsight Security, discussing DNS data as an early warning system for cyber threats. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 27 Apr 2018 20:13:22 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>587</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/94bc4a14-def8-11ea-911f-e74eec77f932/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Crimeware kits, ransomware, and source code breaches. The Internet conduces to organic radicalization. Russia in Finland. Snooper's Charter notes. Crypt armistice or just key escrow? </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Rubella hits the shelves of the criminal black market—it's the crimeware kit, not the German measles. Necurs gets shifty by going retro. iPhone unlocking specialists endure an apparently minor breach. The sad story of structural extremism on the Internet. Finland says the Russians are coming there, too. Snooper's Charter setback. Proposed bill would make it easier for DHS to clean US Federal networks. Crypto Wars modus vivendi said to be just key escrow. Dr. Charles Clancy from VA Tech Hume Center on the 5G mobile network rollout. Guest is Merike Kaeo from Farsight Security, discussing DNS data as an early warning system for cyber threats. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Rubella hits the shelves of the criminal black market—it's the crimeware kit, not the German measles. Necurs gets shifty by going retro. iPhone unlocking specialists endure an apparently minor breach. The sad story of structural extremism on the Internet. Finland says the Russians are coming there, too. Snooper's Charter setback. Proposed bill would make it easier for DHS to clean US Federal networks. Crypto Wars modus vivendi said to be just key escrow. Dr. Charles Clancy from VA Tech Hume Center on the 5G mobile network rollout. Guest is Merike Kaeo from Farsight Security, discussing DNS data as an early warning system for cyber threats. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1339</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ea33aaac288e0b400ce315ec84343b8c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1729457267.mp3?updated=1608754760" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Some fix fast, others not at all. Ransomware campaign's demands are non-negotiable (for most victims—Russians get a hometown discount). Content filtering. Jamming in Syria. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/586/notes</link>
      <description>In today's podcast we hear about another exposed data base, trouble with routers, issues with storage cameras, and problems with storage devices. Some have been promptly fixed, but others are offering users Hobson's choice: take it or leave it. An apparent ransomware campaign says payment demands are "non-negotiable," unless, of course, you happen to be Russian, in which case, let's talk. Citizen Lab complains about certain kinds of content filtering in South Asia. What's up with Compass Call in Syria?  Jonathan Katz from UMD on mathematical backdoors. Guest is Paul Burbage from Flashpoint on the compromised Magento sites. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 26 Apr 2018 19:49:42 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>586</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/94d24f94-def8-11ea-911f-630d3c0d74ef/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Some fix fast, others not at all. Ransomware campaign's demands are non-negotiable (for most victims—Russians get a hometown discount). Content filtering. Jamming in Syria. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear about another exposed data base, trouble with routers, issues with storage cameras, and problems with storage devices. Some have been promptly fixed, but others are offering users Hobson's choice: take it or leave it. An apparent ransomware campaign says payment demands are "non-negotiable," unless, of course, you happen to be Russian, in which case, let's talk. Citizen Lab complains about certain kinds of content filtering in South Asia. What's up with Compass Call in Syria?  Jonathan Katz from UMD on mathematical backdoors. Guest is Paul Burbage from Flashpoint on the compromised Magento sites. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about another exposed data base, trouble with routers, issues with storage cameras, and problems with storage devices. Some have been promptly fixed, but others are offering users Hobson's choice: take it or leave it. An apparent ransomware campaign says payment demands are "non-negotiable," unless, of course, you happen to be Russian, in which case, let's talk. Citizen Lab complains about certain kinds of content filtering in South Asia. What's up with Compass Call in Syria?  Jonathan Katz from UMD on mathematical backdoors. Guest is Paul Burbage from Flashpoint on the compromised Magento sites. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1251</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7967ded3a0a0c908f3cc7351e77cc994]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2706250127.mp3?updated=1689880275" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DPRK plays offense and defense. PyRoMine and EternalRomance. Russian disinformation on Syrian massacre. Alt-coin heist may be misdirection. Nakasone confirmed at NSA. Webstresser takedown. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/585/notes</link>
      <description>In today's podcast, we hear that North Korea has gone big with GhostSecret. Meanwhile, Pyongyang's elite tries to cover its online tracks. PyRoMine uses EternalRomance to disable security systems enroute to cryptomining. Russia enagages in video disinformation about Syrian nerve agent attacks. A complicated alt-coin heist may be misdirection for something bigger. Huawei may be in trouble over Iran sanctions. Apple patches. Europol takes down Webstresser. General Nakasone confirmed as Director NSA and Commander US CyberCom. Daniel Prince from Lancaster University on security in the financial sector. Guest is Joe Cincotta from Thinking Studio on how smart design leads to better security.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 25 Apr 2018 19:39:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>585</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/94e89754-def8-11ea-911f-234ef8a707af/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>DPRK plays offense and defense. PyRoMine and EternalRomance. Russian disinformation on Syrian massacre. Alt-coin heist may be misdirection. Nakasone confirmed at NSA. Webstresser takedown. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that North Korea has gone big with GhostSecret. Meanwhile, Pyongyang's elite tries to cover its online tracks. PyRoMine uses EternalRomance to disable security systems enroute to cryptomining. Russia enagages in video disinformation about Syrian nerve agent attacks. A complicated alt-coin heist may be misdirection for something bigger. Huawei may be in trouble over Iran sanctions. Apple patches. Europol takes down Webstresser. General Nakasone confirmed as Director NSA and Commander US CyberCom. Daniel Prince from Lancaster University on security in the financial sector. Guest is Joe Cincotta from Thinking Studio on how smart design leads to better security.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that North Korea has gone big with GhostSecret. Meanwhile, Pyongyang's elite tries to cover its online tracks. PyRoMine uses EternalRomance to disable security systems enroute to cryptomining. Russia enagages in video disinformation about Syrian nerve agent attacks. A complicated alt-coin heist may be misdirection for something bigger. Huawei may be in trouble over Iran sanctions. Apple patches. Europol takes down Webstresser. General Nakasone confirmed as Director NSA and Commander US CyberCom. Daniel Prince from Lancaster University on security in the financial sector. Guest is Joe Cincotta from Thinking Studio on how smart design leads to better security.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1302</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[47be47eaddd2ecdd4708c52dde42f27c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4300703444.mp3?updated=1689880260" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware in Ukraine's Energy Ministry. Energetic Bear infrastructure. Anonymous Twitter accounts equal bots? Orangeworm in x-ray, MRI machines. Sanction notes. Election security. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/584/notes</link>
      <description>In today's podcast, we hear that Ukraine's Energy Ministry is under ransomware attack. Kaspersky finds infrastructure belonging to Energetic Bear. Lots of anonymous Twitter accounts pop up in East Asia. Orangeworm is after something in healthcare networks, but whether it's IP or PII is unclear. Disclosure and patch notes. Kaspersky may be the subject of US sanctions. A hacker in the Yahoo! breach case could get almost eight years. As US midterms approach, thoughts turn to election security. Joe Carrigan from JHU ISI on devices that unlock iPhones. Guest is Jerry Caponera from Nehemiah Security on quantifying cyber risk. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Apr 2018 19:40:34 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>584</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/94fdf32e-def8-11ea-911f-0339ecec7cc5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ransomware in Ukraine's Energy Ministry. Energetic Bear infrastructure. Anonymous Twitter accounts equal bots? Orangeworm in x-ray, MRI machines. Sanction notes. Election security. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Ukraine's Energy Ministry is under ransomware attack. Kaspersky finds infrastructure belonging to Energetic Bear. Lots of anonymous Twitter accounts pop up in East Asia. Orangeworm is after something in healthcare networks, but whether it's IP or PII is unclear. Disclosure and patch notes. Kaspersky may be the subject of US sanctions. A hacker in the Yahoo! breach case could get almost eight years. As US midterms approach, thoughts turn to election security. Joe Carrigan from JHU ISI on devices that unlock iPhones. Guest is Jerry Caponera from Nehemiah Security on quantifying cyber risk. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Ukraine's Energy Ministry is under ransomware attack. Kaspersky finds infrastructure belonging to Energetic Bear. Lots of anonymous Twitter accounts pop up in East Asia. Orangeworm is after something in healthcare networks, but whether it's IP or PII is unclear. Disclosure and patch notes. Kaspersky may be the subject of US sanctions. A hacker in the Yahoo! breach case could get almost eight years. As US midterms approach, thoughts turn to election security. Joe Carrigan from JHU ISI on devices that unlock iPhones. Guest is Jerry Caponera from Nehemiah Security on quantifying cyber risk. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1223</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6cf935dbf5be12b3224b1ee598a8994b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1145296176.mp3?updated=1689880216" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ISIS coordinates online inspiration campaign with terror attacks. APT10 spearphishing. IE zero day. Twitter won't sell Kaspersky ads. UK sentence in Crackas with Attitude case. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/583/notes</link>
      <description>ISIS returns to its grim inspiration. China's APT10 collects against Japan. An Internet Explorer zero-day is reported undergoing exploitation in the wild. Twitter won't sell Kaspersky any more ads, but doesn't have any specific explanation for why not. For its part Kaspersky says it's going to donate its Twitter advertising budget to the Electronic Frontier Foundation. Bad but expected news about router security. ZTE's regulatory troubles. Cracka with Attitude will do time. Malek Ben Salem from Accenture Labs on the malicious use of AI. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 23 Apr 2018 19:50:55 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>583</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/95108520-def8-11ea-911f-0f2681b2e698/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>ISIS coordinates online inspiration campaign with terror attacks. APT10 spearphishing. IE zero day. Twitter won't sell Kaspersky ads. UK sentence in Crackas with Attitude case. </itunes:subtitle>
      <itunes:summary>ISIS returns to its grim inspiration. China's APT10 collects against Japan. An Internet Explorer zero-day is reported undergoing exploitation in the wild. Twitter won't sell Kaspersky any more ads, but doesn't have any specific explanation for why not. For its part Kaspersky says it's going to donate its Twitter advertising budget to the Electronic Frontier Foundation. Bad but expected news about router security. ZTE's regulatory troubles. Cracka with Attitude will do time. Malek Ben Salem from Accenture Labs on the malicious use of AI. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>ISIS returns to its grim inspiration. China's APT10 collects against Japan. An Internet Explorer zero-day is reported undergoing exploitation in the wild. Twitter won't sell Kaspersky any more ads, but doesn't have any specific explanation for why not. For its part Kaspersky says it's going to donate its Twitter advertising budget to the Electronic Frontier Foundation. Bad but expected news about router security. ZTE's regulatory troubles. Cracka with Attitude will do time. Malek Ben Salem from Accenture Labs on the malicious use of AI. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1008</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[116b12664b5f278b6bad694d546f76c3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4805318478.mp3?updated=1689880201" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>InnaputRAT exfiltrates victim data. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/32/notes</link>
      <description>Researchers with Arbor Networks ASERT team have been tracking a malware campaign targeting commercial manufacturing, and have uncovered various samples dating back to at least 2016.

Richard Hummel is Threat Intelligence Manager for Arbor Networks' ASERT Team, and he takes us through what they've discovered.
 https://www.arbornetworks.com/blog/asert/innaput-actors-utilize-remote-access-trojan-since-2016-presumably-targeting-victim-files/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Apr 2018 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>32</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7f5740ce-df0d-11ea-9c25-a7986f8ce467/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>InnaputRAT exfiltrates victim data</itunes:subtitle>
      <itunes:summary>Researchers with Arbor Networks ASERT team have been tracking a malware campaign targeting commercial manufacturing, and have uncovered various samples dating back to at least 2016.

Richard Hummel is Threat Intelligence Manager for Arbor Networks' ASERT Team, and he takes us through what they've discovered.
 https://www.arbornetworks.com/blog/asert/innaput-actors-utilize-remote-access-trojan-since-2016-presumably-targeting-victim-files/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers with Arbor Networks ASERT team have been tracking a malware campaign targeting commercial manufacturing, and have uncovered various samples dating back to at least 2016.</p><p><br></p><p>Richard Hummel is Threat Intelligence Manager for Arbor Networks' ASERT Team, and he takes us through what they've discovered.</p><p><a href="https://www.arbornetworks.com/blog/asert/innaput-actors-utilize-remote-access-trojan-since-2016-presumably-targeting-victim-files/"> https://www.arbornetworks.com/blog/asert/innaput-actors-utilize-remote-access-trojan-since-2016-presumably-targeting-victim-files/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1373</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1f00b22d2ab5ca99a283e1f3df3d1be3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7217559443.mp3?updated=1685021709" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>RSA wraps up. Staging offensive cyber operations. (Information ops, too.) Business email compromise affects maritime shipping sectors. Sanctions bit Chinese device giants. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/582/notes</link>
      <description>In today's podcast, we take look back at RSA as the big security conference wraps up. Tension between Russia and the West continues to manifest itself in apparent staging attacks and information operations. ISIS in its diaspora returns to recruiting and inspiration. A business email compromise campaign afflicts the maritime shipping sector. Atlanta still struggles to recover from SamSam rasomware. Sanctions drive Huawei from the US market; ZTE may soon follow. David Dufour from Webroot, with thoughts on the conference. Guest is CyberWire editor John Petrik, with thoughts on a cyber Geneva convention. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 20 Apr 2018 16:00:47 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>582</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9527db76-def8-11ea-911f-8722b8fd56ad/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>RSA wraps up. Staging offensive cyber operations. (Information ops, too.) Business email compromise affects maritime shipping sectors. Sanctions bit Chinese device giants. </itunes:subtitle>
      <itunes:summary>In today's podcast, we take look back at RSA as the big security conference wraps up. Tension between Russia and the West continues to manifest itself in apparent staging attacks and information operations. ISIS in its diaspora returns to recruiting and inspiration. A business email compromise campaign afflicts the maritime shipping sector. Atlanta still struggles to recover from SamSam rasomware. Sanctions drive Huawei from the US market; ZTE may soon follow. David Dufour from Webroot, with thoughts on the conference. Guest is CyberWire editor John Petrik, with thoughts on a cyber Geneva convention. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we take look back at RSA as the big security conference wraps up. Tension between Russia and the West continues to manifest itself in apparent staging attacks and information operations. ISIS in its diaspora returns to recruiting and inspiration. A business email compromise campaign afflicts the maritime shipping sector. Atlanta still struggles to recover from SamSam rasomware. Sanctions drive Huawei from the US market; ZTE may soon follow. David Dufour from Webroot, with thoughts on the conference. Guest is CyberWire editor John Petrik, with thoughts on a cyber Geneva convention. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1240</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[76edf493a82ccf8b708f8c2397b6e696]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2881824522.mp3?updated=1608754726" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dispatches from RSA 2018. Russia continues to test the Five Eyes' patience and resolve. Trustjacking, Stresspaint, and an exposed AWS bucket. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/581/notes</link>
      <description>In today's podcast we have some RSA notes: an industry-led cyber Geneva Convention, threats and deterrence, and addressing a labor shortage. New Zealand joins Australia, the UK, and the US in warning that someone's exploiting vulnerable routers. Moscow demands to see the evidence that this someone is Russia. Trustjacking afflicts iOS users. Stresspaint Trojan is out in the wild, posing as an innocent app. Another exposed AWS bucket is found. Rick Howard from Palo Alto on the notion of a "cyber moon shot." Guest is Malcolm Harkins from Cylance on why it's unacceptable to adopt the attitude that bad guys getting in is inevitable. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 19 Apr 2018 21:53:28 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>581</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/953eb602-def8-11ea-911f-33f94b78cf5d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dispatches from RSA 2018. Russia continues to test the Five Eyes' patience and resolve. Trustjacking, Stresspaint, and an exposed AWS bucket. </itunes:subtitle>
      <itunes:summary>In today's podcast we have some RSA notes: an industry-led cyber Geneva Convention, threats and deterrence, and addressing a labor shortage. New Zealand joins Australia, the UK, and the US in warning that someone's exploiting vulnerable routers. Moscow demands to see the evidence that this someone is Russia. Trustjacking afflicts iOS users. Stresspaint Trojan is out in the wild, posing as an innocent app. Another exposed AWS bucket is found. Rick Howard from Palo Alto on the notion of a "cyber moon shot." Guest is Malcolm Harkins from Cylance on why it's unacceptable to adopt the attitude that bad guys getting in is inevitable. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we have some RSA notes: an industry-led cyber Geneva Convention, threats and deterrence, and addressing a labor shortage. New Zealand joins Australia, the UK, and the US in warning that someone's exploiting vulnerable routers. Moscow demands to see the evidence that this someone is Russia. Trustjacking afflicts iOS users. Stresspaint Trojan is out in the wild, posing as an innocent app. Another exposed AWS bucket is found. Rick Howard from Palo Alto on the notion of a "cyber moon shot." Guest is Malcolm Harkins from Cylance on why it's unacceptable to adopt the attitude that bad guys getting in is inevitable. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1226</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5cb1a42514c927894da550749b849298]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2052047789.mp3?updated=1689880169" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More cyber battlespace preparation. Hacking as the continuation of war by other means. Ongoing social media privacy concerns. Tech glitch extends tax deadline. Notes from RSA. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/580/notes</link>
      <description>Reconnaissance and staging in cyberspace, with Five Eye warnings to Russia. Privacy class action suit complains of Facebook facial recognition. Australia joins the ranks of ZTE sceptics. Cyberwarfare discussed at RSA: retaliation, deterrence, renunciation, and a private sector push for international norms. Attention tax procrastinators: the IRS says it was hit by a glitch, and not hacked. Zulfikar Ramzan from RSA with thoughts on the conference. Guest is Kevin McNamee from Nokia, discussing threat intelligence and mobile device ransomware. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 18 Apr 2018 19:03:56 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>580</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9555d724-def8-11ea-911f-17b0cee00c84/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>More cyber battlespace preparation. Hacking as the continuation of war by other means. Ongoing social media privacy concerns. Tech glitch extends tax deadline. Notes from RSA. </itunes:subtitle>
      <itunes:summary>Reconnaissance and staging in cyberspace, with Five Eye warnings to Russia. Privacy class action suit complains of Facebook facial recognition. Australia joins the ranks of ZTE sceptics. Cyberwarfare discussed at RSA: retaliation, deterrence, renunciation, and a private sector push for international norms. Attention tax procrastinators: the IRS says it was hit by a glitch, and not hacked. Zulfikar Ramzan from RSA with thoughts on the conference. Guest is Kevin McNamee from Nokia, discussing threat intelligence and mobile device ransomware. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Reconnaissance and staging in cyberspace, with Five Eye warnings to Russia. Privacy class action suit complains of Facebook facial recognition. Australia joins the ranks of ZTE sceptics. Cyberwarfare discussed at RSA: retaliation, deterrence, renunciation, and a private sector push for international norms. Attention tax procrastinators: the IRS says it was hit by a glitch, and not hacked. Zulfikar Ramzan from RSA with thoughts on the conference. Guest is Kevin McNamee from Nokia, discussing threat intelligence and mobile device ransomware. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1105</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c7d0e7437c7eef88f917987360038875]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9955995998.mp3?updated=1689880155" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russia versus routers. Desert Scorpion swept out of Google Play. ZTE faces sanctions. RSA notes, and a Sandbox winner. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/579/notes</link>
      <description>In today's podcast we hear that Western governments attribute a large-scale campaign against poorly secured connected devices to Russia. Battlespace preparation is suspected. No new US sanctions against Russia, yet, but the matter remains under consideration. ZTE falls under the same cloud as Huawei. Desert Scorpion spyware ejected from Google Play. And there's a winner in RSA's Innovation Sandbox: BigID took away the prize. Justin Harvey from Accenture, joined by the head of Accenture's Cyber Defense team, Ryan LaSalle, discussing their 2018 State of Cyber Resilience report. Guest is Jason Brvenik from NSS labs on their Advanced Endpoint Protection (AEP) Group Test. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Apr 2018 19:11:44 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>579</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/956aae56-def8-11ea-911f-dfcc171c1f3c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Russia versus routers. Desert Scorpion swept out of Google Play. ZTE faces sanctions. RSA notes, and a Sandbox winner. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Western governments attribute a large-scale campaign against poorly secured connected devices to Russia. Battlespace preparation is suspected. No new US sanctions against Russia, yet, but the matter remains under consideration. ZTE falls under the same cloud as Huawei. Desert Scorpion spyware ejected from Google Play. And there's a winner in RSA's Innovation Sandbox: BigID took away the prize. Justin Harvey from Accenture, joined by the head of Accenture's Cyber Defense team, Ryan LaSalle, discussing their 2018 State of Cyber Resilience report. Guest is Jason Brvenik from NSS labs on their Advanced Endpoint Protection (AEP) Group Test. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Western governments attribute a large-scale campaign against poorly secured connected devices to Russia. Battlespace preparation is suspected. No new US sanctions against Russia, yet, but the matter remains under consideration. ZTE falls under the same cloud as Huawei. Desert Scorpion spyware ejected from Google Play. And there's a winner in RSA's Innovation Sandbox: BigID took away the prize. Justin Harvey from Accenture, joined by the head of Accenture's Cyber Defense team, Ryan LaSalle, discussing their 2018 State of Cyber Resilience report. Guest is Jason Brvenik from NSS labs on their Advanced Endpoint Protection (AEP) Group Test. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1373</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c4b14aaa731ec32324e86cb36aee6444]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2086572272.mp3?updated=1689880140" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Info ops follow airstrikes, to be followed by sanctions. Expect cyberattacks and reprisals, with a chance of kompromat. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/578/notes</link>
      <description>In today's podcast, we note that RSA has opened with ten rising stars in its annual Innovation Sandbox. US, British, and French coordinated strikes against Syrian chemical warfare targets prompt Russian information ops and warnings from Britain that the UK will retaliate against any cyberattacks against infrastructure. Charges are filed against an alleged Reveton ransomware money launderer. Emily Wilson from Terbium Labs with tips for conference-goers. Guest is Paul Martini from iBoss with thoughts on growing cyber security companies in a crowded marketplace.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 16 Apr 2018 19:31:43 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>578</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/95838480-def8-11ea-911f-6f3af584bfe6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Info ops follow airstrikes, to be followed by sanctions. Expect cyberattacks and reprisals, with a chance of kompromat. </itunes:subtitle>
      <itunes:summary>In today's podcast, we note that RSA has opened with ten rising stars in its annual Innovation Sandbox. US, British, and French coordinated strikes against Syrian chemical warfare targets prompt Russian information ops and warnings from Britain that the UK will retaliate against any cyberattacks against infrastructure. Charges are filed against an alleged Reveton ransomware money launderer. Emily Wilson from Terbium Labs with tips for conference-goers. Guest is Paul Martini from iBoss with thoughts on growing cyber security companies in a crowded marketplace.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we note that RSA has opened with ten rising stars in its annual Innovation Sandbox. US, British, and French coordinated strikes against Syrian chemical warfare targets prompt Russian information ops and warnings from Britain that the UK will retaliate against any cyberattacks against infrastructure. Charges are filed against an alleged Reveton ransomware money launderer. Emily Wilson from Terbium Labs with tips for conference-goers. Guest is Paul Martini from iBoss with thoughts on growing cyber security companies in a crowded marketplace.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>963</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c5787b77aa8ffa5b8a47c860f048b82b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3048842868.mp3?updated=1689880123" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Energetic Dragonfly and DYMALLOY Bear 2.0. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/31/notes</link>
      <description>Researchers at Cylance recently uncovered the malicious use of a core router in a campaign aimed at critical infrastructure around the world. 

Kevin Levelli is Director of Threat Intelligence at Cylance, and he takes us through what they've discovered. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Apr 2018 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>31</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7da98d0e-df0d-11ea-83f0-83c13bfde638/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Energetic Dragonfly and DYMALLOY Bear 2.0</itunes:subtitle>
      <itunes:summary>Researchers at Cylance recently uncovered the malicious use of a core router in a campaign aimed at critical infrastructure around the world. 

Kevin Levelli is Director of Threat Intelligence at Cylance, and he takes us through what they've discovered. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Cylance recently uncovered the malicious use of a core router in a campaign aimed at critical infrastructure around the world. </p><p><br></p><p>Kevin Levelli is Director of Threat Intelligence at Cylance, and he takes us through what they've discovered. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1283</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9654bf62afa402a6ec746bffbe6c6f32]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9425182488.mp3?updated=1685021696" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Operation Parliament seems to have got what it came for. EITest finally sinkholed. Facebook testimony on Capitol Hill. Estonia reports. Swatting case teaches nothing? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/577/notes</link>
      <description>In today's podcast, we hear that, while the operators behind Operation Parliament pretend to be nothing but a bunch of skids, they're anything but. EITest gets taken down. Facebook this week faced questions about privacy and ideological bias. Most observers think these questions were largely ducked. Estonia's Annual Report on security is worth reading no matter where you live. And an accused swatter seems to have learned nothing from his experience. Dr. Charles Clancy from the Hume Center at VA Tech, discussing LTE network vulnerabilities. Guest is Dinah Davis from CodeLikeaGirl.io and Arctic Wolf Networks, discussing diversity at tech conferences. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 13 Apr 2018 18:12:05 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>577</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9597d7c8-def8-11ea-911f-5ff1502fa490/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Operation Parliament seems to have got what it came for. EITest finally sinkholed. Facebook testimony on Capitol Hill. Estonia reports. Swatting case teaches nothing? </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that, while the operators behind Operation Parliament pretend to be nothing but a bunch of skids, they're anything but. EITest gets taken down. Facebook this week faced questions about privacy and ideological bias. Most observers think these questions were largely ducked. Estonia's Annual Report on security is worth reading no matter where you live. And an accused swatter seems to have learned nothing from his experience. Dr. Charles Clancy from the Hume Center at VA Tech, discussing LTE network vulnerabilities. Guest is Dinah Davis from CodeLikeaGirl.io and Arctic Wolf Networks, discussing diversity at tech conferences. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that, while the operators behind Operation Parliament pretend to be nothing but a bunch of skids, they're anything but. EITest gets taken down. Facebook this week faced questions about privacy and ideological bias. Most observers think these questions were largely ducked. Estonia's Annual Report on security is worth reading no matter where you live. And an accused swatter seems to have learned nothing from his experience. Dr. Charles Clancy from the Hume Center at VA Tech, discussing LTE network vulnerabilities. Guest is Dinah Davis from CodeLikeaGirl.io and Arctic Wolf Networks, discussing diversity at tech conferences. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1524</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4dfb425e32669feaba6ffafb016a7220]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8462804962.mp3?updated=1689873684" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Zuckerberg testimony. Supply chain cyber threat to satellites. DPRK destructive malware. "Early bird" code injection. GCHQ vs. ISIS. Germany blames compromise on Russia. Salisbury attack update. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/576/notes</link>
      <description>In today's podcast we hear that Facebook's CEO Mark Zuckerberg has finished testifying on Capitol Hill, denying that Facebook sells data or that it knew what those people at Cambridge were up to with the data they obtained. Supply chain cyber threats to satellites. North Korean destructive malware may be back. Early bird code injection. GCHQ takes on ISIS in cyberspace. Germany attributes 2017 network intrusions to Russia. International body confirms British official accounts of the Salisbury nerve agent attacks. Chris Poulin from BAH on self driving car tech that monitors the driver’s gaze to make sure they are paying attention to the road. Guest is Oren Falkowitz from Area 1 Security, looking at the Atlanta ransomware incident. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 12 Apr 2018 19:18:07 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>576</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/95b25314-def8-11ea-911f-830b8ffbc931/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Zuckerberg testimony. Supply chain cyber threat to satellites. DPRK destructive malware. "Early bird" code injection. GCHQ vs. ISIS. Germany blames compromise on Russia. Salisbury attack update. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Facebook's CEO Mark Zuckerberg has finished testifying on Capitol Hill, denying that Facebook sells data or that it knew what those people at Cambridge were up to with the data they obtained. Supply chain cyber threats to satellites. North Korean destructive malware may be back. Early bird code injection. GCHQ takes on ISIS in cyberspace. Germany attributes 2017 network intrusions to Russia. International body confirms British official accounts of the Salisbury nerve agent attacks. Chris Poulin from BAH on self driving car tech that monitors the driver’s gaze to make sure they are paying attention to the road. Guest is Oren Falkowitz from Area 1 Security, looking at the Atlanta ransomware incident. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Facebook's CEO Mark Zuckerberg has finished testifying on Capitol Hill, denying that Facebook sells data or that it knew what those people at Cambridge were up to with the data they obtained. Supply chain cyber threats to satellites. North Korean destructive malware may be back. Early bird code injection. GCHQ takes on ISIS in cyberspace. Germany attributes 2017 network intrusions to Russia. International body confirms British official accounts of the Salisbury nerve agent attacks. Chris Poulin from BAH on self driving car tech that monitors the driver’s gaze to make sure they are paying attention to the road. Guest is Oren Falkowitz from Area 1 Security, looking at the Atlanta ransomware incident. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1252</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[211d42b5a8dd22c7b6b8939d4c5035f1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9851039567.mp3?updated=1689873662" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mark Zuckerberg testifies about Facebook, big data, and influence. Patch Tuesday notes. Deterrence or open conflict in cyberspace? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/575/notes</link>
      <description>Today we're following all things Facebook—it's four o'clock: do you know where your data are? We're betting no. Neither side of the aisle seems content with the answers Mr. Zuckerberg gave to the Senate panel. He's speaking before a House panel today. Patch Tuesday notes. Cyber tensions continue to rise as kinetic and chemical tensions rise between Russia and the West. Justin Harvey from Accenture, discussing cyber hygiene blind spots. Guest is Nahuel Sanchez from Onapsis on vulnerable password recovery systems. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 11 Apr 2018 19:41:39 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>575</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/95d4b152-def8-11ea-911f-4f093f623143/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Mark Zuckerberg testifies about Facebook, big data, and influence. Patch Tuesday notes. Deterrence or open conflict in cyberspace? </itunes:subtitle>
      <itunes:summary>Today we're following all things Facebook—it's four o'clock: do you know where your data are? We're betting no. Neither side of the aisle seems content with the answers Mr. Zuckerberg gave to the Senate panel. He's speaking before a House panel today. Patch Tuesday notes. Cyber tensions continue to rise as kinetic and chemical tensions rise between Russia and the West. Justin Harvey from Accenture, discussing cyber hygiene blind spots. Guest is Nahuel Sanchez from Onapsis on vulnerable password recovery systems. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we're following all things Facebook—it's four o'clock: do you know where your data are? We're betting no. Neither side of the aisle seems content with the answers Mr. Zuckerberg gave to the Senate panel. He's speaking before a House panel today. Patch Tuesday notes. Cyber tensions continue to rise as kinetic and chemical tensions rise between Russia and the West. Justin Harvey from Accenture, discussing cyber hygiene blind spots. Guest is Nahuel Sanchez from Onapsis on vulnerable password recovery systems. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1034</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3af031d2afa1b22220051c669e67f0cd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7857688596.mp3?updated=1689873648" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Facebook comes to Washington. Research ethics? IoT threats. Switch bug exploited in the wild. Criminal misdirection. Russia and the West, again. And what do cybercriminals earn? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/574/notes</link>
      <description>In today's podcast, we hear that Facebook begins facing the Congressional music today.  What are the rules for online research, professors? Experts say they're worried about weaponized IoT hacks. Hoods exploiting Cisco switch vulnerability in unpatched systems. Named threat groups and bugs as insider misdirection. As relations between Russia and the West worsen, some in Moscow call an end to Peter the Great's experiment. And how do cybercriminals make, and what do they spend it on? Daniel Prince from Lancaster University on clandestine data transmission and steganography. Guest is Gabriel Bassett from Verizon, reviewing his work on the Verizon DBIR report. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Apr 2018 18:34:14 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>574</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/95e7661c-def8-11ea-911f-03fbb18ef0c9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Facebook comes to Washington. Research ethics? IoT threats. Switch bug exploited in the wild. Criminal misdirection. Russia and the West, again. And what do cybercriminals earn? </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Facebook begins facing the Congressional music today.  What are the rules for online research, professors? Experts say they're worried about weaponized IoT hacks. Hoods exploiting Cisco switch vulnerability in unpatched systems. Named threat groups and bugs as insider misdirection. As relations between Russia and the West worsen, some in Moscow call an end to Peter the Great's experiment. And how do cybercriminals make, and what do they spend it on? Daniel Prince from Lancaster University on clandestine data transmission and steganography. Guest is Gabriel Bassett from Verizon, reviewing his work on the Verizon DBIR report. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Facebook begins facing the Congressional music today.  What are the rules for online research, professors? Experts say they're worried about weaponized IoT hacks. Hoods exploiting Cisco switch vulnerability in unpatched systems. Named threat groups and bugs as insider misdirection. As relations between Russia and the West worsen, some in Moscow call an end to Peter the Great's experiment. And how do cybercriminals make, and what do they spend it on? Daniel Prince from Lancaster University on clandestine data transmission and steganography. Guest is Gabriel Bassett from Verizon, reviewing his work on the Verizon DBIR report. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1246</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c57bd5b7a768fe07920b27133478045e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1858919072.mp3?updated=1689873637" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacktivists may be warning Russia and Iran against interfering in US elections. Britain on alert for Russian moves against infrastructure. Facebook preps for Congress. Ransomware updates. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/573/notes</link>
      <description>In today's podcast we hear about the curious case of hacktivists who may be slugging for Uncle Sam. Maybe. Britain's NCSC warns of battlespace preparation for a campaign against critical infrastructure. Facebook prepares for its appearance on Capitol Hill. Facebook also cancels a plan to share anonymized medical data for research purposes. Atlanta continues to recover from SamSam. And some good news: Malwarebytes has solved LockCrypt ransomware. Robert M. Lee from Dragos with his take on why indicting foreign hackers is a bad move. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 09 Apr 2018 20:32:15 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>573</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/960b3902-def8-11ea-911f-0b33e3a315e0/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hacktivists may be warning Russia and Iran against interfering in US elections. Britain on alert for Russian moves against infrastructure. Facebook preps for Congress. Ransomware updates. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear about the curious case of hacktivists who may be slugging for Uncle Sam. Maybe. Britain's NCSC warns of battlespace preparation for a campaign against critical infrastructure. Facebook prepares for its appearance on Capitol Hill. Facebook also cancels a plan to share anonymized medical data for research purposes. Atlanta continues to recover from SamSam. And some good news: Malwarebytes has solved LockCrypt ransomware. Robert M. Lee from Dragos with his take on why indicting foreign hackers is a bad move. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about the curious case of hacktivists who may be slugging for Uncle Sam. Maybe. Britain's NCSC warns of battlespace preparation for a campaign against critical infrastructure. Facebook prepares for its appearance on Capitol Hill. Facebook also cancels a plan to share anonymized medical data for research purposes. Atlanta continues to recover from SamSam. And some good news: Malwarebytes has solved LockCrypt ransomware. Robert M. Lee from Dragos with his take on why indicting foreign hackers is a bad move. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>933</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cfa5acafe3e1dc6f6b564af77683eb58]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7556375400.mp3?updated=1689873623" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Crypto crumple zones. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/30/notes</link>
      <description>In their recently published paper, "Crypto Crumple Zones: Enabling Limited Access Without Mass Surveillance," coauthors Charles Wright and Mayank Varia make their case for an alternative approach to the encryption debate, one based on economics as a limiting factor on government overreach and surveillance. 

Crypto Crumple Zones: Enabling Limited Access Without Mass Surveillance
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Apr 2018 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>30</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0a0a1c92-df0d-11ea-b61d-17466533d11e/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Crypto crumple zones</itunes:subtitle>
      <itunes:summary>In their recently published paper, "Crypto Crumple Zones: Enabling Limited Access Without Mass Surveillance," coauthors Charles Wright and Mayank Varia make their case for an alternative approach to the encryption debate, one based on economics as a limiting factor on government overreach and surveillance. 

Crypto Crumple Zones: Enabling Limited Access Without Mass Surveillance
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In their recently published paper, "Crypto Crumple Zones: Enabling Limited Access Without Mass Surveillance," coauthors Charles Wright and Mayank Varia make their case for an alternative approach to the encryption debate, one based on economics as a limiting factor on government overreach and surveillance. </p><p><br></p><p><a href="http://web.cecs.pdx.edu/~cvwright/papers/crumplezones.pdf">Crypto Crumple Zones: Enabling Limited Access Without Mass Surveillance</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2294</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ec7e763a8e555692b42a5b441aa1cf7c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9903590159.mp3?updated=1685021685" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Multibreach via chat app. OceanLotus notes. Mirai vs. Banks. Energetic Bear vs. Switches. Russia warns Britain against provocation. DataTribe finalists. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/572/notes</link>
      <description>In today's podcast we hear that a breach in several companies' consumer-facing systems is attributed to a third-party chat vendor. Crooks are tampering with chipped debit cards. Ocean Lotus is back, with a MacOS backdoor. A Mirai variant was used against banks earlier this year. Energetic Bear may be exploiting misconfigured switches. Microsoft looks into Office 360 outages. Russia warns Britain against playing with fire. And three cyber startups are DataTribe finalists. Johannes Ullrich from SANS and the ISC Stormcast podcast, on API security. Guest is Jimmy Heschl, head of digital security at Red Bull, discussing the challenges of securing a global brand. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 06 Apr 2018 17:52:38 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>572</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9622f4a2-def8-11ea-911f-8f2a76c1637f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Multibreach via chat app. OceanLotus notes. Mirai vs. Banks. Energetic Bear vs. Switches. Russia warns Britain against provocation. DataTribe finalists. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that a breach in several companies' consumer-facing systems is attributed to a third-party chat vendor. Crooks are tampering with chipped debit cards. Ocean Lotus is back, with a MacOS backdoor. A Mirai variant was used against banks earlier this year. Energetic Bear may be exploiting misconfigured switches. Microsoft looks into Office 360 outages. Russia warns Britain against playing with fire. And three cyber startups are DataTribe finalists. Johannes Ullrich from SANS and the ISC Stormcast podcast, on API security. Guest is Jimmy Heschl, head of digital security at Red Bull, discussing the challenges of securing a global brand. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that a breach in several companies' consumer-facing systems is attributed to a third-party chat vendor. Crooks are tampering with chipped debit cards. Ocean Lotus is back, with a MacOS backdoor. A Mirai variant was used against banks earlier this year. Energetic Bear may be exploiting misconfigured switches. Microsoft looks into Office 360 outages. Russia warns Britain against playing with fire. And three cyber startups are DataTribe finalists. Johannes Ullrich from SANS and the ISC Stormcast podcast, on API security. Guest is Jimmy Heschl, head of digital security at Red Bull, discussing the challenges of securing a global brand. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1378</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0a2ee016a749699257053db629097295]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7508946081.mp3?updated=1608754733" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Facebook agonistes. Really agonizing. Ad-supported apps like them some data. Sino-US trade tensions and Chinese cyber espionage. Russian wet work and disinformation. Western reprisals. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/571/notes</link>
      <description>In today's podcast we hear that Facebook's troubles are getting worse: more people's data were scraped, deleted videos were archived by Facebook, and so on. Appthority finds a more general problem with ad-supported apps: they're all hungry for data. Sino-American trade disputes are thought likely to find expression in cyber espionage. China's more interested in confidential financials than in IP. Russia and the West remain at loggerheads. One tip from Sweden on countering Moscow's info ops: don't get caught dancing in yellow rain boots. Joe Carrigan from JHU on power companies charging a premium rate for bitcoin miners. Guest is Larry Cochran from Claimatic on how driverless cars and automation is changing the landscape for insurance carriers.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 05 Apr 2018 20:13:59 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>571</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/96372fd0-def8-11ea-911f-df414458592b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Facebook agonistes. Really agonizing. Ad-supported apps like them some data. Sino-US trade tensions and Chinese cyber espionage. Russian wet work and disinformation. Western reprisals. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Facebook's troubles are getting worse: more people's data were scraped, deleted videos were archived by Facebook, and so on. Appthority finds a more general problem with ad-supported apps: they're all hungry for data. Sino-American trade disputes are thought likely to find expression in cyber espionage. China's more interested in confidential financials than in IP. Russia and the West remain at loggerheads. One tip from Sweden on countering Moscow's info ops: don't get caught dancing in yellow rain boots. Joe Carrigan from JHU on power companies charging a premium rate for bitcoin miners. Guest is Larry Cochran from Claimatic on how driverless cars and automation is changing the landscape for insurance carriers.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Facebook's troubles are getting worse: more people's data were scraped, deleted videos were archived by Facebook, and so on. Appthority finds a more general problem with ad-supported apps: they're all hungry for data. Sino-American trade disputes are thought likely to find expression in cyber espionage. China's more interested in confidential financials than in IP. Russia and the West remain at loggerheads. One tip from Sweden on countering Moscow's info ops: don't get caught dancing in yellow rain boots. Joe Carrigan from JHU on power companies charging a premium rate for bitcoin miners. Guest is Larry Cochran from Claimatic on how driverless cars and automation is changing the landscape for insurance carriers.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1255</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[43999bbc12a9fa652409f7884cd9cfd0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8947874246.mp3?updated=1689873576" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Facebook boots Russian trolls for being trolls. Zuckerberg will testify before Congress. Different continents, different privacy protections. YouTube shootings. Pipeline hacks. Panera Bread's incident response. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/570/notes</link>
      <description>In today's podcast, we hear that Facebook has kicked some Russian trolls out from under its bridge. Why? Because they're Russian trolls, that's why. Facebook CEO Zuckerberg will testify about data security before a House panel next Wednesday. Privacy for the Old World, but maybe not as much for the new. The YouTube shooting may have been motivated by anger over the platform's policies. European air traffic control problems were a glitch, not a hack. Pipeline operators recovering from IT hack. Homeland Security tells the US Senate hostile intelligence services have stingrays in Washington. Panera Bread's response to its potential data exposure. Rick Howard from Palo Alto Networks on whether security platforms are putting all of your eggs in one basket. Guest is Jim Routh, CSO at Aetna, on Model-driven security and the rise of unconventional controls. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 04 Apr 2018 19:51:49 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>570</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/964c7d86-def8-11ea-911f-972c8d29d24e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Facebook boots Russian trolls for being trolls. Zuckerberg will testify before Congress. Different continents, different privacy protections. YouTube shootings. Pipeline hacks. Panera Bread's incident response. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Facebook has kicked some Russian trolls out from under its bridge. Why? Because they're Russian trolls, that's why. Facebook CEO Zuckerberg will testify about data security before a House panel next Wednesday. Privacy for the Old World, but maybe not as much for the new. The YouTube shooting may have been motivated by anger over the platform's policies. European air traffic control problems were a glitch, not a hack. Pipeline operators recovering from IT hack. Homeland Security tells the US Senate hostile intelligence services have stingrays in Washington. Panera Bread's response to its potential data exposure. Rick Howard from Palo Alto Networks on whether security platforms are putting all of your eggs in one basket. Guest is Jim Routh, CSO at Aetna, on Model-driven security and the rise of unconventional controls. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Facebook has kicked some Russian trolls out from under its bridge. Why? Because they're Russian trolls, that's why. Facebook CEO Zuckerberg will testify about data security before a House panel next Wednesday. Privacy for the Old World, but maybe not as much for the new. The YouTube shooting may have been motivated by anger over the platform's policies. European air traffic control problems were a glitch, not a hack. Pipeline operators recovering from IT hack. Homeland Security tells the US Senate hostile intelligence services have stingrays in Washington. Panera Bread's response to its potential data exposure. Rick Howard from Palo Alto Networks on whether security platforms are putting all of your eggs in one basket. Guest is Jim Routh, CSO at Aetna, on Model-driven security and the rise of unconventional controls. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1258</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0099f9d3b08dbb20e920bafe17b69723]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1570293064.mp3?updated=1689873564" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Magento brute-forcing. Android IM spyware. njRAT updated. Panera breach. Pipeline operator hacked. Cyber tensions. Cambridge Analytica named in class action suit. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/569/notes</link>
      <description>In today's podcast, we hear that the Magento e-commerce platform has brute forced. A new Android Trojan steals messaging info. njRAT gets an update, and some new and trendy criminal functionality. Notes on the Panera Bread data breach. A major US natural gas pipeline operator has its customer billing and scheduling system hacked, which reminds observers of threats to infrastructure. Russia thinks the US and UK are no longer as decent and trustworthy as they used to be during the Cold War. Another data scandal class action suit is filed, naming Cambridge Analytica. Jonathan Katz from UMD on isogeny-based cryptography. Guest is Mike McKee from ObserveIT, discussing data exfiltration. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Apr 2018 19:34:49 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>569</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9660c548-def8-11ea-911f-7b43dbc74348/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Magento brute-forcing. Android IM spyware. njRAT updated. Panera breach. Pipeline operator hacked. Cyber tensions. Cambridge Analytica named in class action suit. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the Magento e-commerce platform has brute forced. A new Android Trojan steals messaging info. njRAT gets an update, and some new and trendy criminal functionality. Notes on the Panera Bread data breach. A major US natural gas pipeline operator has its customer billing and scheduling system hacked, which reminds observers of threats to infrastructure. Russia thinks the US and UK are no longer as decent and trustworthy as they used to be during the Cold War. Another data scandal class action suit is filed, naming Cambridge Analytica. Jonathan Katz from UMD on isogeny-based cryptography. Guest is Mike McKee from ObserveIT, discussing data exfiltration. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the Magento e-commerce platform has brute forced. A new Android Trojan steals messaging info. njRAT gets an update, and some new and trendy criminal functionality. Notes on the Panera Bread data breach. A major US natural gas pipeline operator has its customer billing and scheduling system hacked, which reminds observers of threats to infrastructure. Russia thinks the US and UK are no longer as decent and trustworthy as they used to be during the Cold War. Another data scandal class action suit is filed, naming Cambridge Analytica. Jonathan Katz from UMD on isogeny-based cryptography. Guest is Mike McKee from ObserveIT, discussing data exfiltration. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1260</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[39a28f2b16edb91af3f3bb7cc60d91bd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4930234399.mp3?updated=1689873553" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Department stores suffer a paycard breach. Atlanta still working on SamSam recovery. Ransomware in India. SWIFT fraud attempt. Facebook's troubles. Kremlin doxed. Reality Winner case update. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/568/notes</link>
      <description>In today's podcast we hear about Saks and hacks, Lord and Taylor and JokerStash: a department store data breach. Atlanta still can't get fully back on its feet after SamSam. An Indian power utility's billing data are held for ransom. More SWIFT fraud reported—this round seems to have been unsuccessful. Russia gets doxed. Facebook on who really cares for you. Threats to avionics and undersea cables. And Reality Winner's defense team wants to subpoena a lot of witnesses. Malek Ben Salem from Accenture Labs, looking at a long-term approach to implementation of cryptography. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 02 Apr 2018 19:04:09 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>568</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/96756e08-def8-11ea-911f-cf2fd605d004/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Department stores suffer a paycard breach. Atlanta still working on SamSam recovery. Ransomware in India. SWIFT fraud attempt. Facebook's troubles. Kremlin doxed. Reality Winner case update. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear about Saks and hacks, Lord and Taylor and JokerStash: a department store data breach. Atlanta still can't get fully back on its feet after SamSam. An Indian power utility's billing data are held for ransom. More SWIFT fraud reported—this round seems to have been unsuccessful. Russia gets doxed. Facebook on who really cares for you. Threats to avionics and undersea cables. And Reality Winner's defense team wants to subpoena a lot of witnesses. Malek Ben Salem from Accenture Labs, looking at a long-term approach to implementation of cryptography. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about Saks and hacks, Lord and Taylor and JokerStash: a department store data breach. Atlanta still can't get fully back on its feet after SamSam. An Indian power utility's billing data are held for ransom. More SWIFT fraud reported—this round seems to have been unsuccessful. Russia gets doxed. Facebook on who really cares for you. Threats to avionics and undersea cables. And Reality Winner's defense team wants to subpoena a lot of witnesses. Malek Ben Salem from Accenture Labs, looking at a long-term approach to implementation of cryptography. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1061</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1f76fc2a6a4b4e2a017bdf0dbfff4b19]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8012889303.mp3?updated=1689873540" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chasing FlawedAMMYY. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/29/notes</link>
      <description>FlawedAMMYY is a newly discovered remote access trojan (RAT) that’s been used in malicious email campaigns, as far back as 2016.
Ryan Kalember is Senior Vice President of Cyber Security Strategy at Proofpoint, and he takes us through  their research. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 31 Mar 2018 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>29</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/06efb422-df0d-11ea-8fcf-4321c047fb1b/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Chasing FlawedAMMYY</itunes:subtitle>
      <itunes:summary>FlawedAMMYY is a newly discovered remote access trojan (RAT) that’s been used in malicious email campaigns, as far back as 2016.
Ryan Kalember is Senior Vice President of Cyber Security Strategy at Proofpoint, and he takes us through  their research. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>FlawedAMMYY is a newly discovered remote access trojan (RAT) that’s been used in malicious email campaigns, as far back as 2016.</p><p>Ryan Kalember is Senior Vice President of Cyber Security Strategy at Proofpoint, and he takes us through <a href="https://www.proofpoint.com/us/threat-insight/post/leaked-source-code-ammyy-admin-turned-flawedammyy-rat"> their research.</a> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1389</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e62973ecb700e3185388b88e33ea7e6f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2077903677.mp3?updated=1684873792" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Under Armour fitness app breached. Warning shot from WannaCry. Lazarus Group update. Aadhaar security questions. Ransomware and city governments. FBI agent charged in leak case. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/567/notes</link>
      <description>In today's podcast, we hear that Under Armour's MyFItnessPal app has sustained a data breach. Boeing's WannaCry incident is minor, but a timely warning that this particular threat hasn't vanished. The Lazarus Group is showing fresh signs of activity against its usual targets. Questions about the security of India's Aadhaar circulate. Baltimore and Atlanta incidents show the ransomware threat to city governments. An FBI agent is charged with leaking secret documents. Updates on the Novichok affair and the Facebook data scandal. Awais Rashid from Bristol University on blockchain trust issues. Guest is Laurin Buchanan from Secure Decisions, discussing NICE competitions. She is co-chair of the competitions subgroup. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 30 Mar 2018 19:36:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>567</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/968468b8-def8-11ea-911f-7baa8a54ecf2/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Under Armour fitness app breached. Warning shot from WannaCry. Lazarus Group update. Aadhaar security questions. Ransomware and city governments. FBI agent charged in leak case. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Under Armour's MyFItnessPal app has sustained a data breach. Boeing's WannaCry incident is minor, but a timely warning that this particular threat hasn't vanished. The Lazarus Group is showing fresh signs of activity against its usual targets. Questions about the security of India's Aadhaar circulate. Baltimore and Atlanta incidents show the ransomware threat to city governments. An FBI agent is charged with leaking secret documents. Updates on the Novichok affair and the Facebook data scandal. Awais Rashid from Bristol University on blockchain trust issues. Guest is Laurin Buchanan from Secure Decisions, discussing NICE competitions. She is co-chair of the competitions subgroup. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Under Armour's MyFItnessPal app has sustained a data breach. Boeing's WannaCry incident is minor, but a timely warning that this particular threat hasn't vanished. The Lazarus Group is showing fresh signs of activity against its usual targets. Questions about the security of India's Aadhaar circulate. Baltimore and Atlanta incidents show the ransomware threat to city governments. An FBI agent is charged with leaking secret documents. Updates on the Novichok affair and the Facebook data scandal. Awais Rashid from Bristol University on blockchain trust issues. Guest is Laurin Buchanan from Secure Decisions, discussing NICE competitions. She is co-chair of the competitions subgroup. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1317</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[53a7e7c66c1b8e283018597a0c8b3730]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9231599765.mp3?updated=1608754734" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russia retaliates against the US with tit-for-tat PNGs, consular closure. Assange has no more Internet (until he behaves). Fauxpersky and WannaCry seen in the wild. Facebook works on privacy. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/566/notes</link>
      <description>In today's podcast, we hear that Russia has retaliated against the US with diplomatic expulsions and at least one consulate closure. Potential cyber operations remain a matter of concern. Julian Assange no longer has Internet access in his room at Ecuador's embassy. WannaCry hits a Boeing plant, but Boeing is resilient enough to work through the infection. A new keylogger pretends to be Kaspersky AV, but not very convincingly. Facebook works to upgrade user privacy, and Apple says it doesn't need to do the same. David Dufour from Webroot with tips for first-time conference goers. Guest is Deral Heiland from Rapid7 on smart sensors.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 29 Mar 2018 19:34:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>566</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/96988528-def8-11ea-911f-dff5c38f7a7c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Russia retaliates against the US with tit-for-tat PNGs, consular closure. Assange has no more Internet (until he behaves). Fauxpersky and WannaCry seen in the wild. Facebook works on privacy. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Russia has retaliated against the US with diplomatic expulsions and at least one consulate closure. Potential cyber operations remain a matter of concern. Julian Assange no longer has Internet access in his room at Ecuador's embassy. WannaCry hits a Boeing plant, but Boeing is resilient enough to work through the infection. A new keylogger pretends to be Kaspersky AV, but not very convincingly. Facebook works to upgrade user privacy, and Apple says it doesn't need to do the same. David Dufour from Webroot with tips for first-time conference goers. Guest is Deral Heiland from Rapid7 on smart sensors.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Russia has retaliated against the US with diplomatic expulsions and at least one consulate closure. Potential cyber operations remain a matter of concern. Julian Assange no longer has Internet access in his room at Ecuador's embassy. WannaCry hits a Boeing plant, but Boeing is resilient enough to work through the infection. A new keylogger pretends to be Kaspersky AV, but not very convincingly. Facebook works to upgrade user privacy, and Apple says it doesn't need to do the same. David Dufour from Webroot with tips for first-time conference goers. Guest is Deral Heiland from Rapid7 on smart sensors.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1242</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[66d96f7fa1df3ebb17227327d4cebdaf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4110850664.mp3?updated=1689873481" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tensions over Salisbury nerve agent attack remain high. BranchScope raises concerns about side-channel attacks. Facebook data scandal updates. Atlanta and Baltimore recover from hacks. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/565/notes</link>
      <description>In today's podcast, we hear that tensions continue to rise between Russia and other, mostly Western, countries as the number of nations taking diplomatic measures to protest the Salisbury attack exceeds twenty-five. Western governments are on alert for Russian cyber operations as well as diplomatic reprisals. A new bug, BranchScope, is found affecting Intel processors. The Facebook data scandal continues. Atlanta and Baltimore recover from hacks of municipal systems. Dr. Charles Clancy from the Hume Center at VA Tech, discussing the security of analog devices in cyber physical systems. Guest is Liv Rowley from Flashpoint on Dark Web refund fraud. And don't be gulled by bogus job offers. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 28 Mar 2018 18:32:58 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>565</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/96ae54ca-def8-11ea-911f-f3bddf477485/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Tensions over Salisbury nerve agent attack remain high. BranchScope raises concerns about side-channel attacks. Facebook data scandal updates. Atlanta and Baltimore recover from hacks. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that tensions continue to rise between Russia and other, mostly Western, countries as the number of nations taking diplomatic measures to protest the Salisbury attack exceeds twenty-five. Western governments are on alert for Russian cyber operations as well as diplomatic reprisals. A new bug, BranchScope, is found affecting Intel processors. The Facebook data scandal continues. Atlanta and Baltimore recover from hacks of municipal systems. Dr. Charles Clancy from the Hume Center at VA Tech, discussing the security of analog devices in cyber physical systems. Guest is Liv Rowley from Flashpoint on Dark Web refund fraud. And don't be gulled by bogus job offers. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that tensions continue to rise between Russia and other, mostly Western, countries as the number of nations taking diplomatic measures to protest the Salisbury attack exceeds twenty-five. Western governments are on alert for Russian cyber operations as well as diplomatic reprisals. A new bug, BranchScope, is found affecting Intel processors. The Facebook data scandal continues. Atlanta and Baltimore recover from hacks of municipal systems. Dr. Charles Clancy from the Hume Center at VA Tech, discussing the security of analog devices in cyber physical systems. Guest is Liv Rowley from Flashpoint on Dark Web refund fraud. And don't be gulled by bogus job offers. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1269</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cb4e6606f00034f3eec97f4e65c23d7e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9954664272.mp3?updated=1689873460" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Blockchains that bind us. [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/22/notes</link>
      <description>The past few month have been all abuzz with excitement about cryptocurrencies and the blockchain. The price of Bitcoin took a rocket ride toward the stars, and stories were coming fast and furious about how the blockchain was going to tranform and revolutionize just about everything.
 Jonathan Katz is a professor of computer science at the University of Maryland and director of the Maryland cybersecurity center. As we’ll hear in this CyberWire special edition, he’s been following blockchain technology and cryptocurrency from its humble beginnings, and he’s our guide to understanding how it all works.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 28 Mar 2018 16:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>22</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a458dfa8-df04-11ea-beb2-772b395237b0/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Blockchains that bind us</itunes:subtitle>
      <itunes:summary>The past few month have been all abuzz with excitement about cryptocurrencies and the blockchain. The price of Bitcoin took a rocket ride toward the stars, and stories were coming fast and furious about how the blockchain was going to tranform and revolutionize just about everything.
 Jonathan Katz is a professor of computer science at the University of Maryland and director of the Maryland cybersecurity center. As we’ll hear in this CyberWire special edition, he’s been following blockchain technology and cryptocurrency from its humble beginnings, and he’s our guide to understanding how it all works.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The past few month have been all abuzz with excitement about cryptocurrencies and the blockchain. The price of Bitcoin took a rocket ride toward the stars, and stories were coming fast and furious about how the blockchain was going to tranform and revolutionize just about everything.</p><p> Jonathan Katz is a professor of computer science at the University of Maryland and director of the Maryland cybersecurity center. As we’ll hear in this CyberWire special edition, he’s been following blockchain technology and cryptocurrency from its humble beginnings, and he’s our guide to understanding how it all works.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2131</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[abe9cdccaa2089c15fa8213961a3cc50]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1159781595.mp3?updated=1656712025" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing from the library. Facebook and Cambridge Analytica updates. Bots as propaganda readers. SamSam still plagues Atlanta. Aadhaar leaky? Many nations expel Russian diplomats. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/564/notes</link>
      <description>In today's podcast, we hear that the Mabna Institute was pretty good at phishing. Facebook's Mark Zuckerberg sends regrets to Westminster. Facebook is under FTC investigation. Cambridge Analytica is in hot water with the FEC. Kaspersky says outing Slingshot was just part of the job. The City of Atlanta is finding it surprisingly hard to recover from SamSam ransomware. Aadhaar may be leaky, again. Bots as Lord Haw-Haws. More than twenty countries expel Russian diplomats. Russian cyber reprisal expected. Justin Harvey from Accenture on cryptocurrency mining. Guest is Steve Piper from CyberEdge with results from their 2018 Cyberthreat Defense Report. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Mar 2018 20:13:31 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>564</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/96c2d13e-def8-11ea-911f-4b34769d9afc/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Phishing from the library. Facebook and Cambridge Analytica updates. Bots as propaganda readers. SamSam still plagues Atlanta. Aadhaar leaky? Many nations expel Russian diplomats. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the Mabna Institute was pretty good at phishing. Facebook's Mark Zuckerberg sends regrets to Westminster. Facebook is under FTC investigation. Cambridge Analytica is in hot water with the FEC. Kaspersky says outing Slingshot was just part of the job. The City of Atlanta is finding it surprisingly hard to recover from SamSam ransomware. Aadhaar may be leaky, again. Bots as Lord Haw-Haws. More than twenty countries expel Russian diplomats. Russian cyber reprisal expected. Justin Harvey from Accenture on cryptocurrency mining. Guest is Steve Piper from CyberEdge with results from their 2018 Cyberthreat Defense Report. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the Mabna Institute was pretty good at phishing. Facebook's Mark Zuckerberg sends regrets to Westminster. Facebook is under FTC investigation. Cambridge Analytica is in hot water with the FEC. Kaspersky says outing Slingshot was just part of the job. The City of Atlanta is finding it surprisingly hard to recover from SamSam ransomware. Aadhaar may be leaky, again. Bots as Lord Haw-Haws. More than twenty countries expel Russian diplomats. Russian cyber reprisal expected. Justin Harvey from Accenture on cryptocurrency mining. Guest is Steve Piper from CyberEdge with results from their 2018 Cyberthreat Defense Report. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1189</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2cea141a119774f59f68632999160808]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2603759704.mp3?updated=1689873448" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Persona non grata, Ivan Ivanovich. Grid threat worries. Data scandal updates. Malware notes. Reaction to Iranian indictments. Alleged Carbanak kingpin collared. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/563/notes</link>
      <description>In today's podcast we hear that Sixty Russian diplomats are now persona non grata in the US. It's the largest such retaliation so far for the Russian nerve agent attack in Salisbury, England. Fear of a Russian riposte against Western power grids remains high. Cambridge Analytica was raided over the weekend in the continuing Facebook data scandal. Facebook faces more difficulties over Android data collection. Notes on malware circulating in the wild. Iran objects to US indictments.  Daniel Prince from Lancaster University discussing risk management. And the alleged Carbanak "mastermind" is arrested in Spain. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 26 Mar 2018 19:24:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>563</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/96d06f1a-def8-11ea-911f-5f13ca23469f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Persona non grata, Ivan Ivanovich. Grid threat worries. Data scandal updates. Malware notes. Reaction to Iranian indictments. Alleged Carbanak kingpin collared. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Sixty Russian diplomats are now persona non grata in the US. It's the largest such retaliation so far for the Russian nerve agent attack in Salisbury, England. Fear of a Russian riposte against Western power grids remains high. Cambridge Analytica was raided over the weekend in the continuing Facebook data scandal. Facebook faces more difficulties over Android data collection. Notes on malware circulating in the wild. Iran objects to US indictments.  Daniel Prince from Lancaster University discussing risk management. And the alleged Carbanak "mastermind" is arrested in Spain. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Sixty Russian diplomats are now persona non grata in the US. It's the largest such retaliation so far for the Russian nerve agent attack in Salisbury, England. Fear of a Russian riposte against Western power grids remains high. Cambridge Analytica was raided over the weekend in the continuing Facebook data scandal. Facebook faces more difficulties over Android data collection. Notes on malware circulating in the wild. Iran objects to US indictments.  Daniel Prince from Lancaster University discussing risk management. And the alleged Carbanak "mastermind" is arrested in Spain. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1128</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cfbadff5ab3048b75db156d5343fc85e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9630174827.mp3?updated=1689873427" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Code comments cause SAML conundrum. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/28/notes</link>
      <description>Researchers at Duo Security recently unearthed a new vulnerability class that affects SAML-based single sign-on (SSO) systems. This vulnerability can allow an attacker with authenticated access to trick SAML systems into authenticating as a different user without knowledge of the victim user’s password.
Kelby Ludwig is a Senior Application Security Engineer at Duo security, and he takes us  through his discoveries. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Mar 2018 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>28</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/064a16f2-df0d-11ea-b61d-67f80911eafc/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Code comments cause SAML conundrum</itunes:subtitle>
      <itunes:summary>Researchers at Duo Security recently unearthed a new vulnerability class that affects SAML-based single sign-on (SSO) systems. This vulnerability can allow an attacker with authenticated access to trick SAML systems into authenticating as a different user without knowledge of the victim user’s password.
Kelby Ludwig is a Senior Application Security Engineer at Duo security, and he takes us  through his discoveries. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Duo Security recently unearthed a new vulnerability class that affects SAML-based single sign-on (SSO) systems. This vulnerability can allow an attacker with authenticated access to trick SAML systems into authenticating as a different user without knowledge of the victim user’s password.</p><p>Kelby Ludwig is a Senior Application Security Engineer at Duo security, and he takes us <a href="https://duo.com/blog/duo-finds-saml-vulnerabilities-affecting-multiple-implementations"> through his discoveries</a>. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1142</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[60240d70409b7baa496eb11359448635]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2458589185.mp3?updated=1684873776" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US indicts Iranian hackers. Guccifer 2.0 is a GRU Bear. Atlanta hit with ransomware. Equifax breach cost consumers plenty. Facebook's troubles persist, as do Cambridge Analytica's. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/562/notes</link>
      <description>In today's podcast, we hear that the US has indicted Iranian hackers. Guccifer 2.0 has been fingered as a GRU team. Inquiries into their activities are folded into Special Counsel Mueller's investigation. Atlanta, Georgia, hit with ransomware. A study estimates the direct cost of the Equifax breach to consumers. App stores show a decline in malware infestations. Facebook leaders speak, finally, but do little to ease the company's pain. An FTC inquiry could be costly. The Cambridge Analytica affair will have implications for regulations, marketing, and consumer trust.  Ben Yelin from UMD CHHS on the Equifax probe being put on ice by the US Consumer Protection agencies. Guest is Kevin Haley from Symantec, on their annual Internet Security Threat Report. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 23 Mar 2018 16:33:47 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>562</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/96e40548-def8-11ea-911f-e7b05708144c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>US indicts Iranian hackers. Guccifer 2.0 is a GRU Bear. Atlanta hit with ransomware. Equifax breach cost consumers plenty. Facebook's troubles persist, as do Cambridge Analytica's. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the US has indicted Iranian hackers. Guccifer 2.0 has been fingered as a GRU team. Inquiries into their activities are folded into Special Counsel Mueller's investigation. Atlanta, Georgia, hit with ransomware. A study estimates the direct cost of the Equifax breach to consumers. App stores show a decline in malware infestations. Facebook leaders speak, finally, but do little to ease the company's pain. An FTC inquiry could be costly. The Cambridge Analytica affair will have implications for regulations, marketing, and consumer trust.  Ben Yelin from UMD CHHS on the Equifax probe being put on ice by the US Consumer Protection agencies. Guest is Kevin Haley from Symantec, on their annual Internet Security Threat Report. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the US has indicted Iranian hackers. Guccifer 2.0 has been fingered as a GRU team. Inquiries into their activities are folded into Special Counsel Mueller's investigation. Atlanta, Georgia, hit with ransomware. A study estimates the direct cost of the Equifax breach to consumers. App stores show a decline in malware infestations. Facebook leaders speak, finally, but do little to ease the company's pain. An FTC inquiry could be costly. The Cambridge Analytica affair will have implications for regulations, marketing, and consumer trust.  Ben Yelin from UMD CHHS on the Equifax probe being put on ice by the US Consumer Protection agencies. Guest is Kevin Haley from Symantec, on their annual Internet Security Threat Report. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1652</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dcc69939b4dc40515a558d002ed4023a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4252251045.mp3?updated=1608754783" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kaspersky burned a JSOC op? Facebook affair: apps, legal fallout, regulatory inspiration, apologies and resolution to sin no more. Tariffs against IP theft. Best Buy shows Huawei the highway. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/561/notes</link>
      <description>In today's podcast, we learn that Kaspersky Lab appears to have burned a US operation. Facebook has some other governments to answer to, now. Facebook CEO Zuckerberg finally discusses the Cambridge Analytics affair in public. Lawsuits and calls for regulation are shouted up. Best Buy shows Huawei the highway. And we have a brief wrap-up of the Billington International CyberSecurity Summit. Joe Carrigan from JHU ISI responding to a listener inquiry about job hunting. Guests are Chad Seaman: Senior Engineer, Security Intelligence Response Team and Lisa Beegle: Senior Manager, Security Intelligence, Akamai, describing the record-setting DDoD attack they recently experienced and helped mitigate. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 22 Mar 2018 16:47:44 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>561</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/96fb5bf8-def8-11ea-911f-3ba5666fc216/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Kaspersky burned a JSOC op? Facebook affair: apps, legal fallout, regulatory inspiration, apologies and resolution to sin no more. Tariffs against IP theft. Best Buy shows Huawei the highway. </itunes:subtitle>
      <itunes:summary>In today's podcast, we learn that Kaspersky Lab appears to have burned a US operation. Facebook has some other governments to answer to, now. Facebook CEO Zuckerberg finally discusses the Cambridge Analytics affair in public. Lawsuits and calls for regulation are shouted up. Best Buy shows Huawei the highway. And we have a brief wrap-up of the Billington International CyberSecurity Summit. Joe Carrigan from JHU ISI responding to a listener inquiry about job hunting. Guests are Chad Seaman: Senior Engineer, Security Intelligence Response Team and Lisa Beegle: Senior Manager, Security Intelligence, Akamai, describing the record-setting DDoD attack they recently experienced and helped mitigate. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we learn that Kaspersky Lab appears to have burned a US operation. Facebook has some other governments to answer to, now. Facebook CEO Zuckerberg finally discusses the Cambridge Analytics affair in public. Lawsuits and calls for regulation are shouted up. Best Buy shows Huawei the highway. And we have a brief wrap-up of the Billington International CyberSecurity Summit. Joe Carrigan from JHU ISI responding to a listener inquiry about job hunting. Guests are Chad Seaman: Senior Engineer, Security Intelligence Response Team and Lisa Beegle: Senior Manager, Security Intelligence, Akamai, describing the record-setting DDoD attack they recently experienced and helped mitigate. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1243</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ea8e36a2f76d5e1345deca19d8d27c93]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5873534941.mp3?updated=1689873393" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Preparing for grid attacks. Notes on breaches, crime, and punishment. And Facebook's no-good, bad, awful week. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/560/notes</link>
      <description>In today's podcast we hear that the US Department of Energy says the power grid is preparing for Russian attacks. Teenager finds flaw in hardware wallet. Travel service Orbit suffers a data breach. Laurie Love won't be extradited to the US. Notes from today's Billington International CyberSecurity Summit. And Facebook's truly awful week continues: the Silicon Age is looking right now a lot like the end stages of the Gilded Age. Jonathan Katz from UMD on the security of e-passports. Guest is J.R. Cunningham from Optiv, with advice to not get carried away with GDPR. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 21 Mar 2018 17:29:53 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>560</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/971c2ac2-def8-11ea-911f-a7e6d1ad43d3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Preparing for grid attacks. Notes on breaches, crime, and punishment. And Facebook's no-good, bad, awful week. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that the US Department of Energy says the power grid is preparing for Russian attacks. Teenager finds flaw in hardware wallet. Travel service Orbit suffers a data breach. Laurie Love won't be extradited to the US. Notes from today's Billington International CyberSecurity Summit. And Facebook's truly awful week continues: the Silicon Age is looking right now a lot like the end stages of the Gilded Age. Jonathan Katz from UMD on the security of e-passports. Guest is J.R. Cunningham from Optiv, with advice to not get carried away with GDPR. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that the US Department of Energy says the power grid is preparing for Russian attacks. Teenager finds flaw in hardware wallet. Travel service Orbit suffers a data breach. Laurie Love won't be extradited to the US. Notes from today's Billington International CyberSecurity Summit. And Facebook's truly awful week continues: the Silicon Age is looking right now a lot like the end stages of the Gilded Age. Jonathan Katz from UMD on the security of e-passports. Guest is J.R. Cunningham from Optiv, with advice to not get carried away with GDPR. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1227</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7218e208f3ad9ab2ba5ac6d6c6356355]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7247142100.mp3?updated=1689873378" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Power grid threats coming through the router. Cambridge Analytica and Facebook face tough questions.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/559/notes</link>
      <description>In today's podcast, we hear that ICS experts continue to warn of grid vulnerability to hacking. AMD chip flaws called real, but not very serious. Cambridge Analytica under investigation in the UK. Facebook tries without much success so far to disentangle itself from Cambridge Analytica's use of Facebook data. President Putin wins reelection amid accusations of voting fraud. Former French President Sarkozy is in police custody over Libyan campaign contributions. (The Libyans want their money back, too.) Chris Poulin from BAH on malware evolution. Guest is Patrick Craven from the Center for Cyber Safety and Education, a nonprofit that has scholarships available. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Mar 2018 17:22:17 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>559</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/973008c6-def8-11ea-911f-83b01a0427de/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Power grid threats coming through the router. Cambridge Analytica and Facebook face tough questions.  </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that ICS experts continue to warn of grid vulnerability to hacking. AMD chip flaws called real, but not very serious. Cambridge Analytica under investigation in the UK. Facebook tries without much success so far to disentangle itself from Cambridge Analytica's use of Facebook data. President Putin wins reelection amid accusations of voting fraud. Former French President Sarkozy is in police custody over Libyan campaign contributions. (The Libyans want their money back, too.) Chris Poulin from BAH on malware evolution. Guest is Patrick Craven from the Center for Cyber Safety and Education, a nonprofit that has scholarships available. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that ICS experts continue to warn of grid vulnerability to hacking. AMD chip flaws called real, but not very serious. Cambridge Analytica under investigation in the UK. Facebook tries without much success so far to disentangle itself from Cambridge Analytica's use of Facebook data. President Putin wins reelection amid accusations of voting fraud. Former French President Sarkozy is in police custody over Libyan campaign contributions. (The Libyans want their money back, too.) Chris Poulin from BAH on malware evolution. Guest is Patrick Craven from the Center for Cyber Safety and Education, a nonprofit that has scholarships available. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1254</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[616475ac48736ae740cfbde07c948dee]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4720368907.mp3?updated=1689872937" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Power grid hacking fears running high. Social media problems. Election DDoS reported in Russia. FTC and SEC cyber enforcement actions. NSA hoarder case update. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/558/notes</link>
      <description>In today's podcast, we hear that tensions between Britain and Russia remain high, as the UK fears a cyberattack. US power utilities are also on alert to an ongoing Russian cyber campaign. Despite a claimed DDoS attack, President Putin is re-elected in Russia. Facebook under fire for Cambridge Analytica data incident. More political bots in Twitter. YouTube tries content moderation. FTC takes on an alt-coin Ponzi scheme. SEC has "dozens" of ICO investigations in progress. Notes on the Hal Martin alleged NSA-hoarder case. Malek Ben Salem from Accenture Labs with tips on cryptography deployment. Guest is Paul Brigner from the Security and Software Engineering Research Center (S2ERC) at Georgetown University, discussing their research on Virtual Browsers. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 19 Mar 2018 19:02:17 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>558</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/974129f8-def8-11ea-911f-bfe2b4898a76/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Power grid hacking fears running high. Social media problems. Election DDoS reported in Russia. FTC and SEC cyber enforcement actions. NSA hoarder case update. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that tensions between Britain and Russia remain high, as the UK fears a cyberattack. US power utilities are also on alert to an ongoing Russian cyber campaign. Despite a claimed DDoS attack, President Putin is re-elected in Russia. Facebook under fire for Cambridge Analytica data incident. More political bots in Twitter. YouTube tries content moderation. FTC takes on an alt-coin Ponzi scheme. SEC has "dozens" of ICO investigations in progress. Notes on the Hal Martin alleged NSA-hoarder case. Malek Ben Salem from Accenture Labs with tips on cryptography deployment. Guest is Paul Brigner from the Security and Software Engineering Research Center (S2ERC) at Georgetown University, discussing their research on Virtual Browsers. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that tensions between Britain and Russia remain high, as the UK fears a cyberattack. US power utilities are also on alert to an ongoing Russian cyber campaign. Despite a claimed DDoS attack, President Putin is re-elected in Russia. Facebook under fire for Cambridge Analytica data incident. More political bots in Twitter. YouTube tries content moderation. FTC takes on an alt-coin Ponzi scheme. SEC has "dozens" of ICO investigations in progress. Notes on the Hal Martin alleged NSA-hoarder case. Malek Ben Salem from Accenture Labs with tips on cryptography deployment. Guest is Paul Brigner from the Security and Software Engineering Research Center (S2ERC) at Georgetown University, discussing their research on Virtual Browsers. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1219</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[32b924ead211244c5758fea21e439ce1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9494676030.mp3?updated=1689873285" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cryptojacking injections heat up. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/27/notes</link>
      <description>There's been an epidemic of cryptojacking code injections recently, as bad actors attempt to cash in on the cryptocurrency craze through unauthorized cryptomining operations on unsuspecting users. 
Marcelle Lee is a threat researcher at LookingGlass, and she takes us through her recently published research,  Cryptojacking — Coming to a Server Near You. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Mar 2018 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>27</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/038e3628-df0d-11ea-b61d-6795991db32c/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cryptojacking injections heat up</itunes:subtitle>
      <itunes:summary>There's been an epidemic of cryptojacking code injections recently, as bad actors attempt to cash in on the cryptocurrency craze through unauthorized cryptomining operations on unsuspecting users. 
Marcelle Lee is a threat researcher at LookingGlass, and she takes us through her recently published research,  Cryptojacking — Coming to a Server Near You. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>There's been an epidemic of cryptojacking code injections recently, as bad actors attempt to cash in on the cryptocurrency craze through unauthorized cryptomining operations on unsuspecting users. </p><p>Marcelle Lee is a threat researcher at LookingGlass, and she takes us through her recently published research, <a href="https://www.lookingglasscyber.com/blog/cryptojacking-coming-soon-server-near/"> Cryptojacking — Coming to a Server Near You. </a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1520</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[357ab9b433c5e6031d99e88036775c3c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7687446196.mp3?updated=1684873759" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>NATO-Russian cyber tensions high. They're also high between Saudi Arabia and Iran. Updates on AMD vulnerability report. Another exposed AWS S3 bucket? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/557/notes</link>
      <description>In today's podcast we hear that NATO has condemned Russia for a chemical attack in England. The US sanctions Russia for NotPetya and election meddling, and warns of Russian preparations for an attack against US infrastructure. Chinese cyber operations support that country's claims to the South China Sea. Iran shows increased cyber espionage activity. Observers fear a return of Triton/Trisis ICS malware. Another unsecured AWS bucket may have been found. Johannes Ullrich from SANS and the Internet Storm Center podcast, discussing credential stuffing. Guest is Rico Chandra from Arktis Radiation Detectors on securing radiation detectors.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 16 Mar 2018 17:37:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>557</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/97598a20-def8-11ea-911f-8f9dd1ffa99f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>NATO-Russian cyber tensions high. They're also high between Saudi Arabia and Iran. Updates on AMD vulnerability report. Another exposed AWS S3 bucket? </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that NATO has condemned Russia for a chemical attack in England. The US sanctions Russia for NotPetya and election meddling, and warns of Russian preparations for an attack against US infrastructure. Chinese cyber operations support that country's claims to the South China Sea. Iran shows increased cyber espionage activity. Observers fear a return of Triton/Trisis ICS malware. Another unsecured AWS bucket may have been found. Johannes Ullrich from SANS and the Internet Storm Center podcast, discussing credential stuffing. Guest is Rico Chandra from Arktis Radiation Detectors on securing radiation detectors.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that NATO has condemned Russia for a chemical attack in England. The US sanctions Russia for NotPetya and election meddling, and warns of Russian preparations for an attack against US infrastructure. Chinese cyber operations support that country's claims to the South China Sea. Iran shows increased cyber espionage activity. Observers fear a return of Triton/Trisis ICS malware. Another unsecured AWS bucket may have been found. Johannes Ullrich from SANS and the Internet Storm Center podcast, discussing credential stuffing. Guest is Rico Chandra from Arktis Radiation Detectors on securing radiation detectors.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1509</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c580fb85e4967d75390286539fe3cad1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7523596075.mp3?updated=1608754748" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Chip vulnerability disclosure controversial. Black market and point-of-sale malware. SEC charges ex-Equifax exec with breach-related insider trading. Tensions over Salisbury nerve agent attack. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/556/notes</link>
      <description>In today's podcast, we hear that AMD continues its investigation of the backdoors and other vulnerabilities CTS Labs publicly disclosed. That disclosure remains controversial. BlackTDS offers malware distribution as-a-service on the black market. PinkKite is a small but persistent point-of-sale threat. The SEC charges a former Equifax exec with trading on non-public information of the credit bureau's data breach. Germany, France, and the United States join the United Kingdom in denouncing Russia for the Salisbury nerve agent attack. Rick Howard from Palo Alto Networks, with this year’s Cyber Cannon nominees. Guest is Ted Bardusch from Usermind on data-rich marketing and GDPR. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 15 Mar 2018 18:59:57 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>556</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/976db2de-def8-11ea-911f-1f2b02385287/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Chip vulnerability disclosure controversial. Black market and point-of-sale malware. SEC charges ex-Equifax exec with breach-related insider trading. Tensions over Salisbury nerve agent attack. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that AMD continues its investigation of the backdoors and other vulnerabilities CTS Labs publicly disclosed. That disclosure remains controversial. BlackTDS offers malware distribution as-a-service on the black market. PinkKite is a small but persistent point-of-sale threat. The SEC charges a former Equifax exec with trading on non-public information of the credit bureau's data breach. Germany, France, and the United States join the United Kingdom in denouncing Russia for the Salisbury nerve agent attack. Rick Howard from Palo Alto Networks, with this year’s Cyber Cannon nominees. Guest is Ted Bardusch from Usermind on data-rich marketing and GDPR. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that AMD continues its investigation of the backdoors and other vulnerabilities CTS Labs publicly disclosed. That disclosure remains controversial. BlackTDS offers malware distribution as-a-service on the black market. PinkKite is a small but persistent point-of-sale threat. The SEC charges a former Equifax exec with trading on non-public information of the credit bureau's data breach. Germany, France, and the United States join the United Kingdom in denouncing Russia for the Salisbury nerve agent attack. Rick Howard from Palo Alto Networks, with this year’s Cyber Cannon nominees. Guest is Ted Bardusch from Usermind on data-rich marketing and GDPR. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1257</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[83a47e34241529b4feb8bb543012b04e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9967327073.mp3?updated=1689873248" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AMD investigates report of processor flaws. A look at OceanLotus. Patch Tuesday. Russo-British tensions high. MuddyWater threatens researchers. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/555/notes</link>
      <description>In today's podcast, we hear that AMD is investigating a report of exploitable flaws in its processors. Vietnamese threat actor OceanLotus gets a look from researchers. Patch Tuesday notes. Britain expels Russian diplomats in retaliation for a nerve agent attack. Russia demands to know what these cyberattacks are that the UK is said to be threatening. A brief history of Russo-British Twenty-first Century espionage and cyber tensions. Iranian threat actor MuddyWaters threatens researchers.  Justin Harvey from Accenture on the importance of the first 48 hours following a breach. Guest is Patrick Sullivan from Akamai on VPNs and the notion of “verify and never trust.” 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 14 Mar 2018 18:02:45 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>555</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9783fcf6-def8-11ea-911f-af97e9fc91d4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>AMD investigates report of processor flaws. A look at OceanLotus. Patch Tuesday. Russo-British tensions high. MuddyWater threatens researchers. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that AMD is investigating a report of exploitable flaws in its processors. Vietnamese threat actor OceanLotus gets a look from researchers. Patch Tuesday notes. Britain expels Russian diplomats in retaliation for a nerve agent attack. Russia demands to know what these cyberattacks are that the UK is said to be threatening. A brief history of Russo-British Twenty-first Century espionage and cyber tensions. Iranian threat actor MuddyWaters threatens researchers.  Justin Harvey from Accenture on the importance of the first 48 hours following a breach. Guest is Patrick Sullivan from Akamai on VPNs and the notion of “verify and never trust.” 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that AMD is investigating a report of exploitable flaws in its processors. Vietnamese threat actor OceanLotus gets a look from researchers. Patch Tuesday notes. Britain expels Russian diplomats in retaliation for a nerve agent attack. Russia demands to know what these cyberattacks are that the UK is said to be threatening. A brief history of Russo-British Twenty-first Century espionage and cyber tensions. Iranian threat actor MuddyWaters threatens researchers.  Justin Harvey from Accenture on the importance of the first 48 hours following a breach. Guest is Patrick Sullivan from Akamai on VPNs and the notion of “verify and never trust.” </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1278</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d8100e73249f2e7a3666547ea2552f20]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6844195293.mp3?updated=1689873235" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>May hands Putin an ultimatum (and cyber conflict is expected). HenBox spies on Uyghurs. Vixen Panda creeps in UK targets by backdoors. Changes at US State Department, CIA. SINET ITSEF notes. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/554/notes</link>
      <description>In today's podcast we hear that Britain has given Russia an ultimatum: explain by midnight how your nerve agent got to Salisbury or face the consequences. Russia calls it nonsense. Cyber conflict between the two countries is widely expected. Palo Alto's Unit 42 finds HenBox Android spyware. NCC Labs describes Chinese backdoors used against UK Government and industry targets. President Trump replaces Secretary of State Tillerson with DCI Pompeo. Gina Haspel is tapped as next DCI. Awais Rashid from University of Bristol on cyber physical systems. Guest is Tom Badders from Telos on obfuscation as applied to threat intelligence. And a wrap-up of SINET ITSEF. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Mar 2018 19:00:11 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>554</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/97aaf040-def8-11ea-911f-577f01fe58bc/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>May hands Putin an ultimatum (and cyber conflict is expected). HenBox spies on Uyghurs. Vixen Panda creeps in UK targets by backdoors. Changes at US State Department, CIA. SINET ITSEF notes. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Britain has given Russia an ultimatum: explain by midnight how your nerve agent got to Salisbury or face the consequences. Russia calls it nonsense. Cyber conflict between the two countries is widely expected. Palo Alto's Unit 42 finds HenBox Android spyware. NCC Labs describes Chinese backdoors used against UK Government and industry targets. President Trump replaces Secretary of State Tillerson with DCI Pompeo. Gina Haspel is tapped as next DCI. Awais Rashid from University of Bristol on cyber physical systems. Guest is Tom Badders from Telos on obfuscation as applied to threat intelligence. And a wrap-up of SINET ITSEF. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Britain has given Russia an ultimatum: explain by midnight how your nerve agent got to Salisbury or face the consequences. Russia calls it nonsense. Cyber conflict between the two countries is widely expected. Palo Alto's Unit 42 finds HenBox Android spyware. NCC Labs describes Chinese backdoors used against UK Government and industry targets. President Trump replaces Secretary of State Tillerson with DCI Pompeo. Gina Haspel is tapped as next DCI. Awais Rashid from University of Bristol on cyber physical systems. Guest is Tom Badders from Telos on obfuscation as applied to threat intelligence. And a wrap-up of SINET ITSEF. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1283</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[69a66d60dbfb0348e8300516aa02b966]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9530931080.mp3?updated=1689873222" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Iran grows more capable and assertive in cyberspace. Bots have nothing on humans when it comes to peddling disinformation. Chinese influence ops. Fancy Bear, Slingshot updates. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/553/notes</link>
      <description>In today's podcasts, we hear that security firms are warning of Iran's growing cyber capabilities, and Tehran's disposition to use them. Gossips and activists far outdo bots in spreading disinformation. Memcache kill-switch should be approached with legal caution. Slingshot espionage tools active quietly in the Middle East and Africa for six years. Fancy Bear sniffs at Asia. Australia is concerned about Chinese espionage and influence operations. Jonathan Katz from UMD with his thoughts on Spectre and Meltdown. Guest is Christopher Pierson from Binary Sun Cyber Risk Advisors, with an update on SEC cyber security guidance. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 12 Mar 2018 18:59:44 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>553</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/97c41e8a-def8-11ea-911f-4f01b1e90ea9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Iran grows more capable and assertive in cyberspace. Bots have nothing on humans when it comes to peddling disinformation. Chinese influence ops. Fancy Bear, Slingshot updates. </itunes:subtitle>
      <itunes:summary>In today's podcasts, we hear that security firms are warning of Iran's growing cyber capabilities, and Tehran's disposition to use them. Gossips and activists far outdo bots in spreading disinformation. Memcache kill-switch should be approached with legal caution. Slingshot espionage tools active quietly in the Middle East and Africa for six years. Fancy Bear sniffs at Asia. Australia is concerned about Chinese espionage and influence operations. Jonathan Katz from UMD with his thoughts on Spectre and Meltdown. Guest is Christopher Pierson from Binary Sun Cyber Risk Advisors, with an update on SEC cyber security guidance. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcasts, we hear that security firms are warning of Iran's growing cyber capabilities, and Tehran's disposition to use them. Gossips and activists far outdo bots in spreading disinformation. Memcache kill-switch should be approached with legal caution. Slingshot espionage tools active quietly in the Middle East and Africa for six years. Fancy Bear sniffs at Asia. Australia is concerned about Chinese espionage and influence operations. Jonathan Katz from UMD with his thoughts on Spectre and Meltdown. Guest is Christopher Pierson from Binary Sun Cyber Risk Advisors, with an update on SEC cyber security guidance. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1211</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ecb5e9e9e4efbdd521a89f3013a6e619]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7291847456.mp3?updated=1689873249" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dark Caracal APT steals out of Lebanon. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/26/notes</link>
      <description>Researcher from Lookout and the EFF have discovered an APT group operating out of Lebanon they've named Dark Caracal. The group is running a global espionage campaign, targeting journalists, military personnel, activists, lawyers, medical professionals and educational institutions. 
Mike Murray is VP of Security Intelligence at Lookout, and he's our guide through their research.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Mar 2018 12:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>26</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0143e6ba-df0d-11ea-87e7-9bf2774af1a2/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dark Caracal APT steals out of Lebanon</itunes:subtitle>
      <itunes:summary>Researcher from Lookout and the EFF have discovered an APT group operating out of Lebanon they've named Dark Caracal. The group is running a global espionage campaign, targeting journalists, military personnel, activists, lawyers, medical professionals and educational institutions. 
Mike Murray is VP of Security Intelligence at Lookout, and he's our guide through their research.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researcher from Lookout and the EFF have discovered an APT group operating out of Lebanon they've named Dark Caracal. The group is running a global espionage campaign, targeting journalists, military personnel, activists, lawyers, medical professionals and educational institutions. </p><p>Mike Murray is VP of Security Intelligence at Lookout, and he's our guide through their research.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2400</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a9f853959a0bd8d5c7f41db67667ed22]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5461395718.mp3?updated=1684873752" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber reconnaissance. Vulnerability database misdirection. Cryptoming attempts. New Memcrash DDoS. Policy changes in the US coming as agencies report? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/552/notes</link>
      <description>In today's podcast, we hear reports of cyber reconnaissance of Turkish financial institutions: Hidden Cobra is the suspect. The Chinese government appears to have finagled its national vulnerability database to afford misdirection to cyber operations. Cryptomining attempts hit Windows endpoints. Other cryptojacking campaigns afflict vulnerable servers. Memcrash DDoS hits new targets. The US Administration hints at possible cyber policy changes. Emily Wilson from Terbium Labs, on the issue of trying to spend our way to security. Guest is Priscilla Moriuchi from Recorded Future, with research documenting a backdating issue in the CNNVD, China’s National Vulnerability Database. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 09 Mar 2018 20:45:03 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>552</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/97e8d1b2-def8-11ea-911f-d7fc2757c845/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyber reconnaissance. Vulnerability database misdirection. Cryptoming attempts. New Memcrash DDoS. Policy changes in the US coming as agencies report? </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear reports of cyber reconnaissance of Turkish financial institutions: Hidden Cobra is the suspect. The Chinese government appears to have finagled its national vulnerability database to afford misdirection to cyber operations. Cryptomining attempts hit Windows endpoints. Other cryptojacking campaigns afflict vulnerable servers. Memcrash DDoS hits new targets. The US Administration hints at possible cyber policy changes. Emily Wilson from Terbium Labs, on the issue of trying to spend our way to security. Guest is Priscilla Moriuchi from Recorded Future, with research documenting a backdating issue in the CNNVD, China’s National Vulnerability Database. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear reports of cyber reconnaissance of Turkish financial institutions: Hidden Cobra is the suspect. The Chinese government appears to have finagled its national vulnerability database to afford misdirection to cyber operations. Cryptomining attempts hit Windows endpoints. Other cryptojacking campaigns afflict vulnerable servers. Memcrash DDoS hits new targets. The US Administration hints at possible cyber policy changes. Emily Wilson from Terbium Labs, on the issue of trying to spend our way to security. Guest is Priscilla Moriuchi from Recorded Future, with research documenting a backdating issue in the CNNVD, China’s National Vulnerability Database. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1391</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4be3245bd7104a1d88d70e13b4246b59]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2935539436.mp3?updated=1608754747" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A Memcrash kill-switch. Shadow Brokers' leaked "Territorial Dispute" tools. Dutch DDoS, Indian hacks. FBI and backdoors. Notes from SINET ITSEF. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/551/notes</link>
      <description>In today's podcast, we hear that a kill-switch for Memcrash may have been found (and Memcrash may be dangerous for other purposes than denial-of-service). Researchers in Hungary take a look at the Shadow Brokers' dumps and speculate about the purpose of the "Territorial Dispute" module. The Dutch Tax Authority sustained another DDoS attack last night. India's CERT renders a troubling report to Parliament. The FBI still wants a non-backdoor backdoor. David Dufour from Webroot on vulnerabilities in cryptocurrency markets. Guest is Richard Henderson from Absolute Software on protecting against insider threats. And some notes from SINET ITSEF. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 08 Mar 2018 20:00:14 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>551</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/98015930-def8-11ea-911f-1fd2fcff086b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A Memcrash kill-switch. Shadow Brokers' leaked "Territorial Dispute" tools. Dutch DDoS, Indian hacks. FBI and backdoors. Notes from SINET ITSEF. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that a kill-switch for Memcrash may have been found (and Memcrash may be dangerous for other purposes than denial-of-service). Researchers in Hungary take a look at the Shadow Brokers' dumps and speculate about the purpose of the "Territorial Dispute" module. The Dutch Tax Authority sustained another DDoS attack last night. India's CERT renders a troubling report to Parliament. The FBI still wants a non-backdoor backdoor. David Dufour from Webroot on vulnerabilities in cryptocurrency markets. Guest is Richard Henderson from Absolute Software on protecting against insider threats. And some notes from SINET ITSEF. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that a kill-switch for Memcrash may have been found (and Memcrash may be dangerous for other purposes than denial-of-service). Researchers in Hungary take a look at the Shadow Brokers' dumps and speculate about the purpose of the "Territorial Dispute" module. The Dutch Tax Authority sustained another DDoS attack last night. India's CERT renders a troubling report to Parliament. The FBI still wants a non-backdoor backdoor. David Dufour from Webroot on vulnerabilities in cryptocurrency markets. Guest is Richard Henderson from Absolute Software on protecting against insider threats. And some notes from SINET ITSEF. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1073</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6370ef9c2c44f0f34a8f942d15de3381]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4009924932.mp3?updated=1689873173" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patchable vulnerabilities in Apache Struts and Exim. CombJack malware. DPRK vs. UN Panel of Experts. Cyberwar and legal limits. Espionage Act prosecution. Infowars turn grimly kinetic. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/550/notes</link>
      <description>In today's podcast, we hear that spies like Apache Struts exploits. Server vulnerabilities described. A new cryptojacker steals at least four varieties of cryptocurrency. North Korea may have hacked UN sanctions enforcers. Dutch Intelligence (and Microsoft) warn of cyberwar, but it's not a declared war, which makes response harder. Update to the pack rat defense, with considerations of mens rea. ISIS terror inspiration. And a possible assassination attempt. Chris Poulin from BAH on next generation IoT devices, like security robots. Guest is Sylvain Gil from Exabeam on business by design, and the importance of the design process in security solutions. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 07 Mar 2018 18:23:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>550</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/981a6650-def8-11ea-911f-abfd6370f58f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Patchable vulnerabilities in Apache Struts and Exim. CombJack malware. DPRK vs. UN Panel of Experts. Cyberwar and legal limits. Espionage Act prosecution. Infowars turn grimly kinetic. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that spies like Apache Struts exploits. Server vulnerabilities described. A new cryptojacker steals at least four varieties of cryptocurrency. North Korea may have hacked UN sanctions enforcers. Dutch Intelligence (and Microsoft) warn of cyberwar, but it's not a declared war, which makes response harder. Update to the pack rat defense, with considerations of mens rea. ISIS terror inspiration. And a possible assassination attempt. Chris Poulin from BAH on next generation IoT devices, like security robots. Guest is Sylvain Gil from Exabeam on business by design, and the importance of the design process in security solutions. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that spies like Apache Struts exploits. Server vulnerabilities described. A new cryptojacker steals at least four varieties of cryptocurrency. North Korea may have hacked UN sanctions enforcers. Dutch Intelligence (and Microsoft) warn of cyberwar, but it's not a declared war, which makes response harder. Update to the pack rat defense, with considerations of mens rea. ISIS terror inspiration. And a possible assassination attempt. Chris Poulin from BAH on next generation IoT devices, like security robots. Guest is Sylvain Gil from Exabeam on business by design, and the importance of the design process in security solutions. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1194</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[36ff329cc62b83e27f0d3728b1c69650]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5468077898.mp3?updated=1689873157" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber espionage in Central and Eastern Europe. Cyber deterrence. Notes from Matrosskaya Tishina. Exabeam describes what crooks can get from your browser.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/549/notes</link>
      <description>In today's podcast we hear that Fancy Bear sightings continue—Fancy seems to have settled down in Montenegro, and Germany is seeing bears and snakes. Cyber deterrence is much desired but difficult to achieve. Notes from a Russian jail. Reddit purges influence ops trolls. What criminals can learn from your browser. CFIUS puts hold on Broadcom's bid for Qualcomm. The US FDA wants to block its people from looking at adult content at work. Daniel Prince, Senior Lecturer in Cyber Security at Lancaster University, introduces himself as our newest academic research partner. Guest is Jeremy Wittkop from InteliSecure with a call for participants in their Critical Data Protection Benchmark Survey. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Mar 2018 20:35:05 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>549</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/982ad2a6-def8-11ea-911f-8f77e2f4c584/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyber espionage in Central and Eastern Europe. Cyber deterrence. Notes from Matrosskaya Tishina. Exabeam describes what crooks can get from your browser.  </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Fancy Bear sightings continue—Fancy seems to have settled down in Montenegro, and Germany is seeing bears and snakes. Cyber deterrence is much desired but difficult to achieve. Notes from a Russian jail. Reddit purges influence ops trolls. What criminals can learn from your browser. CFIUS puts hold on Broadcom's bid for Qualcomm. The US FDA wants to block its people from looking at adult content at work. Daniel Prince, Senior Lecturer in Cyber Security at Lancaster University, introduces himself as our newest academic research partner. Guest is Jeremy Wittkop from InteliSecure with a call for participants in their Critical Data Protection Benchmark Survey. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Fancy Bear sightings continue—Fancy seems to have settled down in Montenegro, and Germany is seeing bears and snakes. Cyber deterrence is much desired but difficult to achieve. Notes from a Russian jail. Reddit purges influence ops trolls. What criminals can learn from your browser. CFIUS puts hold on Broadcom's bid for Qualcomm. The US FDA wants to block its people from looking at adult content at work. Daniel Prince, Senior Lecturer in Cyber Security at Lancaster University, introduces himself as our newest academic research partner. Guest is Jeremy Wittkop from InteliSecure with a call for participants in their Critical Data Protection Benchmark Survey. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1180</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3c71749050852144e96e850b0fa6c324]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9223411848.mp3?updated=1689872040" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Humanitarian organizations targeted. Memcrash extortion. Spring Break bug. Equifax breach update. Russian influence operations (and American "yelling and hollering"). </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/548/notes</link>
      <description>In today's podcast, we hear about a new campaign that targets humanitarian organizations with North Korean phishbait. Memcrash is now being exploited by criminal extortionists. Equifax losses from last year's breach are said to mount. Germany says it detected the compromise of a secure government network before too much damage was done. They don't offer official attribution, but everyone else says it was the Russians. The Russians say they didn't do it. President Putin deplores "yelling and hollering" in the US Congress. Ben Yelin from UMD CHHS on section 702 reauthorization. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 05 Mar 2018 19:44:02 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>548</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/98443d04-def8-11ea-911f-3fd900cc81e7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Humanitarian organizations targeted. Memcrash extortion. Spring Break bug. Equifax breach update. Russian influence operations (and American "yelling and hollering"). </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about a new campaign that targets humanitarian organizations with North Korean phishbait. Memcrash is now being exploited by criminal extortionists. Equifax losses from last year's breach are said to mount. Germany says it detected the compromise of a secure government network before too much damage was done. They don't offer official attribution, but everyone else says it was the Russians. The Russians say they didn't do it. President Putin deplores "yelling and hollering" in the US Congress. Ben Yelin from UMD CHHS on section 702 reauthorization. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about a new campaign that targets humanitarian organizations with North Korean phishbait. Memcrash is now being exploited by criminal extortionists. Equifax losses from last year's breach are said to mount. Germany says it detected the compromise of a secure government network before too much damage was done. They don't offer official attribution, but everyone else says it was the Russians. The Russians say they didn't do it. President Putin deplores "yelling and hollering" in the US Congress. Ben Yelin from UMD CHHS on section 702 reauthorization. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1082</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cb3ecad083aff26f8562f318b021bc79]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6269880023.mp3?updated=1689872029" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lebal malware phishes for victims. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/25/notes</link>
      <description>Researchers at Comodo Security Solutions have been tracking a recently discovered strain of malware named Lebal. The malware uses several clever techniques to attempt to hide itself, and once installed targets credentials and cryptocurrency wallets. 
Fatih Orhan is VP of Threat Labs at Comodo, and he takes us through their research.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Mar 2018 12:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>25</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ff1701e2-df0c-11ea-bfcf-b38d19e52862/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Lebal malware phishes for victims</itunes:subtitle>
      <itunes:summary>Researchers at Comodo Security Solutions have been tracking a recently discovered strain of malware named Lebal. The malware uses several clever techniques to attempt to hide itself, and once installed targets credentials and cryptocurrency wallets. 
Fatih Orhan is VP of Threat Labs at Comodo, and he takes us through their research.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at Comodo Security Solutions have been tracking a recently discovered strain of malware named Lebal. The malware uses several clever techniques to attempt to hide itself, and once installed targets credentials and cryptocurrency wallets. </p><p>Fatih Orhan is VP of Threat Labs at Comodo, and he takes us through their research.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1050</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[94a8c94496aed6cc68ff83afa68e2a4f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4838534099.mp3?updated=1684873727" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Memcrashing no longer just a theoretical possibility. Fancy Bear's pawprints in German networks and other peoples' embassies. Deterrence in cyberspace. High-profile fraud victims. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/547/notes</link>
      <description>In today's podcast, we hear that a Memcrash amplification attack took GitHub offline, but only briefly, thanks to Akamai mitigation. Germany continues to fight off ongoing attacks on sensitive government networks. Germany hasn't said so, but everyone else sees Fancy Bears pawprints over this one. Fancy Bear is also said to be snuffling around embassies and other diplomatic targets. Capitol Hill mulls cyber deterrence. Equifax breach looks worse. Robert M. Lee from Dragos on ICS in advanced manufacturing. Guest is Marcus Harris from Saul Ewing Arnstein &amp; Lehr LLP, discussing the decision by companies like McAfee and Symantec to allow the Russians to look at their source code. Two high-profile fraud victims. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 02 Mar 2018 21:00:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>547</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/985991cc-def8-11ea-911f-0b4eb19e36cf/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Memcrashing no longer just a theoretical possibility. Fancy Bear's pawprints in German networks and other peoples' embassies. Deterrence in cyberspace. High-profile fraud victims. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that a Memcrash amplification attack took GitHub offline, but only briefly, thanks to Akamai mitigation. Germany continues to fight off ongoing attacks on sensitive government networks. Germany hasn't said so, but everyone else sees Fancy Bears pawprints over this one. Fancy Bear is also said to be snuffling around embassies and other diplomatic targets. Capitol Hill mulls cyber deterrence. Equifax breach looks worse. Robert M. Lee from Dragos on ICS in advanced manufacturing. Guest is Marcus Harris from Saul Ewing Arnstein &amp; Lehr LLP, discussing the decision by companies like McAfee and Symantec to allow the Russians to look at their source code. Two high-profile fraud victims. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that a Memcrash amplification attack took GitHub offline, but only briefly, thanks to Akamai mitigation. Germany continues to fight off ongoing attacks on sensitive government networks. Germany hasn't said so, but everyone else sees Fancy Bears pawprints over this one. Fancy Bear is also said to be snuffling around embassies and other diplomatic targets. Capitol Hill mulls cyber deterrence. Equifax breach looks worse. Robert M. Lee from Dragos on ICS in advanced manufacturing. Guest is Marcus Harris from Saul Ewing Arnstein &amp; Lehr LLP, discussing the decision by companies like McAfee and Symantec to allow the Russians to look at their source code. Two high-profile fraud victims. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1369</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7e6fdb92744b097cd5568dd194ed6b03]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8027753538.mp3?updated=1608754724" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fancy Bear finds Berlin just right. RedDrop Android blackmail malware. Another AWS S3 exposure. FTC settles; SEC investigates. Blockchain radix malorum? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/546/notes</link>
      <description>In today's podcast, we hear that Fancy Bear has been busy in a sensitive German government network. RedDrop Android malware is built for blackmail. Another exposed AWS S3 bucket is disclosed. Intel issues another Spectre fix. The FTC reaches a settlement with Venmo over privacy, security, and availability of funds. The SEC is investigating a number of initial coin offerings. Johannes Ullrich from SANS and the ICS Stormcast podcast, with information on the Memcache DOS issue. Guest is Rami Sass from WhiteSource on open source software.  And Mr. Gates is no fan of cryptocurrencies (and it seems cryptocurrency mavens are no fan of Mr. Gates). 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 01 Mar 2018 17:39:15 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>546</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/986977ae-def8-11ea-911f-4f2c08aa6b71/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fancy Bear finds Berlin just right. RedDrop Android blackmail malware. Another AWS S3 exposure. FTC settles; SEC investigates. Blockchain radix malorum? </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Fancy Bear has been busy in a sensitive German government network. RedDrop Android malware is built for blackmail. Another exposed AWS S3 bucket is disclosed. Intel issues another Spectre fix. The FTC reaches a settlement with Venmo over privacy, security, and availability of funds. The SEC is investigating a number of initial coin offerings. Johannes Ullrich from SANS and the ICS Stormcast podcast, with information on the Memcache DOS issue. Guest is Rami Sass from WhiteSource on open source software.  And Mr. Gates is no fan of cryptocurrencies (and it seems cryptocurrency mavens are no fan of Mr. Gates). 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Fancy Bear has been busy in a sensitive German government network. RedDrop Android malware is built for blackmail. Another exposed AWS S3 bucket is disclosed. Intel issues another Spectre fix. The FTC reaches a settlement with Venmo over privacy, security, and availability of funds. The SEC is investigating a number of initial coin offerings. Johannes Ullrich from SANS and the ICS Stormcast podcast, with information on the Memcache DOS issue. Guest is Rami Sass from WhiteSource on open source software.  And Mr. Gates is no fan of cryptocurrencies (and it seems cryptocurrency mavens are no fan of Mr. Gates). </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1101</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[79067e6762b1f2f6ba55be2ecad12c32]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3901347751.mp3?updated=1689871996" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Memcrash and amplification attacks. SAML vulnerabilities. Thanatos ransomware. Petya returns (so does Marcher). Deterrence and election security. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/545/notes</link>
      <description>In today's podcast, we hear that Memcrash threatens big DDoS events. Problems with single-sign-on solutions. Thanatos ransomware looks like its masters botched it, but that's not necessarily good news. The Marcher banking Trojan is back and bigger than ever. A new variant of Petya ransomware may be in circulation. What's the point of a false flag if no one's fooled? Dale Drew from CenturyLink on collaboration trends. Guest is Eric Cole, author of Online Danger. And the US Senate asks, how do you solve a problem like Vladimir? 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 28 Feb 2018 19:05:55 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>545</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/987cc2d2-def8-11ea-911f-eb08d97ce7a8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Memcrash and amplification attacks. SAML vulnerabilities. Thanatos ransomware. Petya returns (so does Marcher). Deterrence and election security. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Memcrash threatens big DDoS events. Problems with single-sign-on solutions. Thanatos ransomware looks like its masters botched it, but that's not necessarily good news. The Marcher banking Trojan is back and bigger than ever. A new variant of Petya ransomware may be in circulation. What's the point of a false flag if no one's fooled? Dale Drew from CenturyLink on collaboration trends. Guest is Eric Cole, author of Online Danger. And the US Senate asks, how do you solve a problem like Vladimir? 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Memcrash threatens big DDoS events. Problems with single-sign-on solutions. Thanatos ransomware looks like its masters botched it, but that's not necessarily good news. The Marcher banking Trojan is back and bigger than ever. A new variant of Petya ransomware may be in circulation. What's the point of a false flag if no one's fooled? Dale Drew from CenturyLink on collaboration trends. Guest is Eric Cole, author of Online Danger. And the US Senate asks, how do you solve a problem like Vladimir? </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1177</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0f2801e163904e8f1aa130b87aa1b2cf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6751315693.mp3?updated=1689871986" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cryptojacking through an AWS S3 bucket. Threats, risk, and unintentional mistakes. Crime and punishment. Industry notes. Alien hackers? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/544/notes</link>
      <description>In today's podcast, we hear that CoinHive was installed via a misconfigured AWS S3 bucket. Unintentional password collection. Threat and risk trends for 2018. Avalanche phisher king rearrested in Kiev. Huawei says it's being picked on. Apple makes nice with Beijing. Industry notes—controlling interests and an ICS security Series B round. Reality Winner wants her confession suppressed. Hal Martin's packrat defense may have received an unexpected boost. Johannes Ullrich from SANS and the Internet Stormcast podcast, on hacked third-party cables. Guest is Terry Dunlap from Refirm Labs on firmware vulnerabilities. And could alien signals be alien hacks? 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Feb 2018 20:51:40 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>544</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/98ac5c54-def8-11ea-911f-2b194b633b37/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cryptojacking through an AWS S3 bucket. Threats, risk, and unintentional mistakes. Crime and punishment. Industry notes. Alien hackers? </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that CoinHive was installed via a misconfigured AWS S3 bucket. Unintentional password collection. Threat and risk trends for 2018. Avalanche phisher king rearrested in Kiev. Huawei says it's being picked on. Apple makes nice with Beijing. Industry notes—controlling interests and an ICS security Series B round. Reality Winner wants her confession suppressed. Hal Martin's packrat defense may have received an unexpected boost. Johannes Ullrich from SANS and the Internet Stormcast podcast, on hacked third-party cables. Guest is Terry Dunlap from Refirm Labs on firmware vulnerabilities. And could alien signals be alien hacks? 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that CoinHive was installed via a misconfigured AWS S3 bucket. Unintentional password collection. Threat and risk trends for 2018. Avalanche phisher king rearrested in Kiev. Huawei says it's being picked on. Apple makes nice with Beijing. Industry notes—controlling interests and an ICS security Series B round. Reality Winner wants her confession suppressed. Hal Martin's packrat defense may have received an unexpected boost. Johannes Ullrich from SANS and the Internet Stormcast podcast, on hacked third-party cables. Guest is Terry Dunlap from Refirm Labs on firmware vulnerabilities. And could alien signals be alien hacks? </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1211</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d4aa3a8812a9708ec8d9707a912a637a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1122433552.mp3?updated=1689871716" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Olympic hacking—false flags and attack infrastructure. Cryptojacking. Smartphone security bans. Heraldic animals of hacking. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/543/notes</link>
      <description>In today's podcast, we hear that anonymous US Intelligence sources call the Olympic hacks a Russian false flag operation. More cyberattacks are expected from the infrastructure set up to hit the Games. Calls for international norms for cyber conflict rise. CrowdStrike's Global Threat Report sees proliferation and commodification of attack tools. Ad network serves cryptojacker. Malicious smartphones or just a trade war?  Joe Carrigan from JHU on securing AWS buckets. Guest is Randall Murch from VA Tech on cyber bio security. And a scorecard for hacking heraldry.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 26 Feb 2018 19:04:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>543</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/98bf514c-def8-11ea-911f-c72da5114472/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Olympic hacking—false flags and attack infrastructure. Cryptojacking. Smartphone security bans. Heraldic animals of hacking. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that anonymous US Intelligence sources call the Olympic hacks a Russian false flag operation. More cyberattacks are expected from the infrastructure set up to hit the Games. Calls for international norms for cyber conflict rise. CrowdStrike's Global Threat Report sees proliferation and commodification of attack tools. Ad network serves cryptojacker. Malicious smartphones or just a trade war?  Joe Carrigan from JHU on securing AWS buckets. Guest is Randall Murch from VA Tech on cyber bio security. And a scorecard for hacking heraldry.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that anonymous US Intelligence sources call the Olympic hacks a Russian false flag operation. More cyberattacks are expected from the infrastructure set up to hit the Games. Calls for international norms for cyber conflict rise. CrowdStrike's Global Threat Report sees proliferation and commodification of attack tools. Ad network serves cryptojacker. Malicious smartphones or just a trade war?  Joe Carrigan from JHU on securing AWS buckets. Guest is Randall Murch from VA Tech on cyber bio security. And a scorecard for hacking heraldry.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1267</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[28206cf92cab23a85e7896cd37348750]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5171366480.mp3?updated=1689871651" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing for holiday winnings. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/24/notes</link>
      <description>Or Katz is principal lead security researcher for Akamai's Enterprise Security Business Unit, and the research he’s sharing today is a widespread phishing campaign targeting users using an advertising tactic. The research is titled, “Gone Phishing for the Holidays."
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 24 Feb 2018 12:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>24</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/fd88135c-df0c-11ea-87e7-cf0d98796ece/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Phishing for holiday winnings</itunes:subtitle>
      <itunes:summary>Or Katz is principal lead security researcher for Akamai's Enterprise Security Business Unit, and the research he’s sharing today is a widespread phishing campaign targeting users using an advertising tactic. The research is titled, “Gone Phishing for the Holidays."
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Or Katz is principal lead security researcher for Akamai's Enterprise Security Business Unit, and the research he’s sharing today is a widespread phishing campaign targeting users using an advertising tactic. The research is titled, “<a href="https://blogs.akamai.com/2018/01/gone-phishing-for-the-holidays.html">Gone Phishing for the Holidays</a>."</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1394</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e1839d1fa835b49bd3bf4c4cc73f659b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4828666438.mp3?updated=1684873716" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mirai variant establishes proxies. Buggy smart contracts. Banking glitch. Studies from Verizon, Thales. FTC addresses credential stuffing. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/542/notes</link>
      <description>In today's podcast we hear, OMG, that Mirai is out in a new and improved form. Researchers find buggy smart contracts on Ethereum. A Chase glitch briefly exposed banking customers' information to other banking customers. Hacktivists continue to hit spyware companies. Verizon's Mobile Index warns that mobile security is being traded for business efficiencies. Thales looks at data security and finds that data breaches seem to have risen with cloud migration. The FTC doesn't like credential stuffing. Emily Wilson from Terbium Labs with an update on Dark Web markets after last year’s Alpha Bay takedown.  Guest is Andrea Little Limbago from Endgame, discussing her blog post, “The March Toward Data Localization.” 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 23 Feb 2018 19:29:15 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>542</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/98d5bdb0-def8-11ea-911f-cfdc164a3215/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Mirai variant establishes proxies. Buggy smart contracts. Banking glitch. Studies from Verizon, Thales. FTC addresses credential stuffing. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear, OMG, that Mirai is out in a new and improved form. Researchers find buggy smart contracts on Ethereum. A Chase glitch briefly exposed banking customers' information to other banking customers. Hacktivists continue to hit spyware companies. Verizon's Mobile Index warns that mobile security is being traded for business efficiencies. Thales looks at data security and finds that data breaches seem to have risen with cloud migration. The FTC doesn't like credential stuffing. Emily Wilson from Terbium Labs with an update on Dark Web markets after last year’s Alpha Bay takedown.  Guest is Andrea Little Limbago from Endgame, discussing her blog post, “The March Toward Data Localization.” 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear, OMG, that Mirai is out in a new and improved form. Researchers find buggy smart contracts on Ethereum. A Chase glitch briefly exposed banking customers' information to other banking customers. Hacktivists continue to hit spyware companies. Verizon's Mobile Index warns that mobile security is being traded for business efficiencies. Thales looks at data security and finds that data breaches seem to have risen with cloud migration. The FTC doesn't like credential stuffing. Emily Wilson from Terbium Labs with an update on Dark Web markets after last year’s Alpha Bay takedown.  Guest is Andrea Little Limbago from Endgame, discussing her blog post, “The March Toward Data Localization.” </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1398</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3afc3fdeaa82cd06656a6fbc35dafff2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4740213487.mp3?updated=1608754752" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Code signing certificates for sale. Impact of cybercrime on the world economy. Reaper out from under Lazarus's shadow. Catphishing. Cyber intelligence against terror. Ransomware and other hacks. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/541/notes</link>
      <description>In today's podcast, we hear that counterfeit certificates are on sale in criminal souks. Cybercrime is said to cost $600 billion globally every year. Russia objects to being called a bad actor in cyberspace. North Korea's Reaper threat actor steps out from the shadow of its big brother, the Lazarus Group. Catphish from Lebanon spread spyware through Facebook. Israel says it gave Australia a cyber assist against ISIS terror last summer. Ransomware notes. Prof. Awais Rashid from University of Bristol on what students should be learning about cyber security. Guest is Martijn Grooten from Virus Bulletin on security product testing and the changes they’ve seen over time in the products they test.  Harper's was hacked, and so was Allentown, Pennsylvania.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 22 Feb 2018 21:00:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>541</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/992bc228-def8-11ea-911f-6f1eccc68083/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Code signing certificates for sale. Impact of cybercrime on the world economy. Reaper out from under Lazarus's shadow. Catphishing. Cyber intelligence against terror. Ransomware and other hacks. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that counterfeit certificates are on sale in criminal souks. Cybercrime is said to cost $600 billion globally every year. Russia objects to being called a bad actor in cyberspace. North Korea's Reaper threat actor steps out from the shadow of its big brother, the Lazarus Group. Catphish from Lebanon spread spyware through Facebook. Israel says it gave Australia a cyber assist against ISIS terror last summer. Ransomware notes. Prof. Awais Rashid from University of Bristol on what students should be learning about cyber security. Guest is Martijn Grooten from Virus Bulletin on security product testing and the changes they’ve seen over time in the products they test.  Harper's was hacked, and so was Allentown, Pennsylvania.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that counterfeit certificates are on sale in criminal souks. Cybercrime is said to cost $600 billion globally every year. Russia objects to being called a bad actor in cyberspace. North Korea's Reaper threat actor steps out from the shadow of its big brother, the Lazarus Group. Catphish from Lebanon spread spyware through Facebook. Israel says it gave Australia a cyber assist against ISIS terror last summer. Ransomware notes. Prof. Awais Rashid from University of Bristol on what students should be learning about cyber security. Guest is Martijn Grooten from Virus Bulletin on security product testing and the changes they’ve seen over time in the products they test.  Harper's was hacked, and so was Allentown, Pennsylvania.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1172</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b9c4cc2b1a491b0d79aee239fcd10050]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8668881855.mp3?updated=1689870760" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SWIFT phishbait. DPRK hacking gets better; GRU hacking looks east. Coldroot RAT. Cryptojacking. Election cybersecurity. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/540/notes</link>
      <description>In today's podcast, we hear that SWIFT phishbait is hitting inboxes. North Korean hackers show fresh sophistication and new ambitions. Fancy Bear seems to be snuffling east. Monero miners in Word, and why cryptojacking for Bitcoin is harder than it is for other currencies. The Coldroot RAT hides in plain sight. The US Departments of Justice and Homeland Security undertake new approaches to election security. Justin Harvey from Accenture on data-centric security. Guest is Scott Totzke from ISARA on the threat to encrypted data by quantum computing. And Facebook has a new verification mode: send in a postcard. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 21 Feb 2018 19:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>540</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/99443a38-def8-11ea-911f-e31bad4189b6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>SWIFT phishbait. DPRK hacking gets better; GRU hacking looks east. Coldroot RAT. Cryptojacking. Election cybersecurity. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that SWIFT phishbait is hitting inboxes. North Korean hackers show fresh sophistication and new ambitions. Fancy Bear seems to be snuffling east. Monero miners in Word, and why cryptojacking for Bitcoin is harder than it is for other currencies. The Coldroot RAT hides in plain sight. The US Departments of Justice and Homeland Security undertake new approaches to election security. Justin Harvey from Accenture on data-centric security. Guest is Scott Totzke from ISARA on the threat to encrypted data by quantum computing. And Facebook has a new verification mode: send in a postcard. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that SWIFT phishbait is hitting inboxes. North Korean hackers show fresh sophistication and new ambitions. Fancy Bear seems to be snuffling east. Monero miners in Word, and why cryptojacking for Bitcoin is harder than it is for other currencies. The Coldroot RAT hides in plain sight. The US Departments of Justice and Homeland Security undertake new approaches to election security. Justin Harvey from Accenture on data-centric security. Guest is Scott Totzke from ISARA on the threat to encrypted data by quantum computing. And Facebook has a new verification mode: send in a postcard. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1253</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f24821ecf680418528cf7f8e2dd330ee]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1301546603.mp3?updated=1689870748" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SWIFT fraud in India. DPRK hacking updates. Notes on Russian influence ops, both indictments and continuing activity. Alleged Florida gunman may have been an Internet known wolf. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/539/notes</link>
      <description>In today's podcast we hear that SWIFT fraud has hit an Indian lender. North Korean hacking continues, even during the DPRK's Winter Olympics charm offensive. US indicts Russian influence operators—the Internet Research Agency is the leading defendant. Russian trolling continues, exploiting the Florida school shooting. (And the alleged shooter apparently expressed his intentions online.) Rick Howard from Palo Alto Networks, on the importance of partnering with universities to improve the quantity and diversity of people coming through the STEM pipeline.  All Five Eyes see Fancy Bear behind NotPetya. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Feb 2018 20:34:59 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>539</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/995ac2b2-def8-11ea-911f-db71e0502e50/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>SWIFT fraud in India. DPRK hacking updates. Notes on Russian influence ops, both indictments and continuing activity. Alleged Florida gunman may have been an Internet known wolf. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that SWIFT fraud has hit an Indian lender. North Korean hacking continues, even during the DPRK's Winter Olympics charm offensive. US indicts Russian influence operators—the Internet Research Agency is the leading defendant. Russian trolling continues, exploiting the Florida school shooting. (And the alleged shooter apparently expressed his intentions online.) Rick Howard from Palo Alto Networks, on the importance of partnering with universities to improve the quantity and diversity of people coming through the STEM pipeline.  All Five Eyes see Fancy Bear behind NotPetya. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that SWIFT fraud has hit an Indian lender. North Korean hacking continues, even during the DPRK's Winter Olympics charm offensive. US indicts Russian influence operators—the Internet Research Agency is the leading defendant. Russian trolling continues, exploiting the Florida school shooting. (And the alleged shooter apparently expressed his intentions online.) Rick Howard from Palo Alto Networks, on the importance of partnering with universities to improve the quantity and diversity of people coming through the STEM pipeline.  All Five Eyes see Fancy Bear behind NotPetya. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1126</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2985e7bdfec7248518681bfc3e83d532]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9853018881.mp3?updated=1689870736" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The uncanny HEX men. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/23/notes</link>
      <description>The research we’re discussing today is called, “Beware the Hex Men”, and it tracks multiple attack campaigns conducted by a Chinese threat actor. The GuardiCore Labs team identified three attack variants that they named Hex, Hanako and Taylor, targeting SQL servers.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 17 Feb 2018 12:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>23</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/f77bd08e-df0c-11ea-bfcf-63056134e301/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The uncanny HEX men</itunes:subtitle>
      <itunes:summary>The research we’re discussing today is called, “Beware the Hex Men”, and it tracks multiple attack campaigns conducted by a Chinese threat actor. The GuardiCore Labs team identified three attack variants that they named Hex, Hanako and Taylor, targeting SQL servers.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The research we’re discussing today is called, “Beware the Hex Men”, and it tracks multiple attack campaigns conducted by a Chinese threat actor. The GuardiCore Labs team identified three attack variants that they named Hex, Hanako and Taylor, targeting SQL servers.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1523</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c53e9d090c40c0cc97588f6f2a633fec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9236902859.mp3?updated=1684873702" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The complexities of Olympic Destroyer. More blame for Russia in the matter of NotPetya. Congress mulls election security. New York cyber milestone. Ed Snowden as phishbait. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/538/notes</link>
      <description>In today's podcast, we hear more about Olympic Destroyer: its relationship status with known threat actors is "complicated." The US joins the UK in blaming Russia for NotPetya, and seems to be considering sanctions. The US Congress considers election security, and considers a state-level option: let governors call in the National Guard. New York cyber law reaches its second milestone. Zulfikar Ramzan from RSA, discussing the hype around blockchain technology. Guest is Jack Rhysider, producer and host of the Darknet Diaries podcast.  And no, Edward Snowden has not moved in down the block and bought a two-terabyte iCloud storage plan. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 16 Feb 2018 19:10:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>538</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/99711580-def8-11ea-911f-6742e4378608/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The complexities of Olympic Destroyer. More blame for Russia in the matter of NotPetya. Congress mulls election security. New York cyber milestone. Ed Snowden as phishbait. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear more about Olympic Destroyer: its relationship status with known threat actors is "complicated." The US joins the UK in blaming Russia for NotPetya, and seems to be considering sanctions. The US Congress considers election security, and considers a state-level option: let governors call in the National Guard. New York cyber law reaches its second milestone. Zulfikar Ramzan from RSA, discussing the hype around blockchain technology. Guest is Jack Rhysider, producer and host of the Darknet Diaries podcast.  And no, Edward Snowden has not moved in down the block and bought a two-terabyte iCloud storage plan. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear more about Olympic Destroyer: its relationship status with known threat actors is "complicated." The US joins the UK in blaming Russia for NotPetya, and seems to be considering sanctions. The US Congress considers election security, and considers a state-level option: let governors call in the National Guard. New York cyber law reaches its second milestone. Zulfikar Ramzan from RSA, discussing the hype around blockchain technology. Guest is Jack Rhysider, producer and host of the Darknet Diaries podcast.  And no, Edward Snowden has not moved in down the block and bought a two-terabyte iCloud storage plan. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1446</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dc20b487e5bb26f393c981c0525a8576]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7605991245.mp3?updated=1608754766" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Olympic Destroyer took its time, compromised the IT supply chain. NotPetya attribution. Coin scams. Coin miners. Botnets old and new. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/537/notes</link>
      <description>In today's podcast we hear that Olympic Destroyer may have started with a supply-chain compromise back in December. The British Foreign Office blames Russia for NotPetya pseudoransomware, and the Russian Foreign Ministry says they didn't do anything. Trend Micro researchers find a new Monero cryptomining campaign underway. Coinherder phishes in alt-coin wallets. The Satori botnet has expanded its target list. A new IoT botnet, DoubleDoor, gets into routers with a one-two punch. Ben Yelin from UMD CHHS, on New Jersey taking on the FCC and net neutrality.  Guest is Scott Register from Ixia on security issues with the coming 5G cellular rollout. And the LoopX ICO vanishes into thin air. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 15 Feb 2018 20:39:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>537</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9986e98c-def8-11ea-911f-fb1a02ef9239/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Olympic Destroyer took its time, compromised the IT supply chain. NotPetya attribution. Coin scams. Coin miners. Botnets old and new. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Olympic Destroyer may have started with a supply-chain compromise back in December. The British Foreign Office blames Russia for NotPetya pseudoransomware, and the Russian Foreign Ministry says they didn't do anything. Trend Micro researchers find a new Monero cryptomining campaign underway. Coinherder phishes in alt-coin wallets. The Satori botnet has expanded its target list. A new IoT botnet, DoubleDoor, gets into routers with a one-two punch. Ben Yelin from UMD CHHS, on New Jersey taking on the FCC and net neutrality.  Guest is Scott Register from Ixia on security issues with the coming 5G cellular rollout. And the LoopX ICO vanishes into thin air. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Olympic Destroyer may have started with a supply-chain compromise back in December. The British Foreign Office blames Russia for NotPetya pseudoransomware, and the Russian Foreign Ministry says they didn't do anything. Trend Micro researchers find a new Monero cryptomining campaign underway. Coinherder phishes in alt-coin wallets. The Satori botnet has expanded its target list. A new IoT botnet, DoubleDoor, gets into routers with a one-two punch. Ben Yelin from UMD CHHS, on New Jersey taking on the FCC and net neutrality.  Guest is Scott Register from Ixia on security issues with the coming 5G cellular rollout. And the LoopX ICO vanishes into thin air. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1224</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7980f322b8cf2d1c648ff4ca85f26342]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2760255637.mp3?updated=1689870709" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Olympic Destroyer updates. Cyber forecasts from the US Intelligence Community. Patch notes. Cryptojacking and coinming. Ad blockers (also an incentive to coin mining). </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/536/notes</link>
      <description>In today's podcast, we hear that Olympic Destroyer exploits EternalRomance and morphs as it moves from machine to machine. Other Olympic hacks are out there, too. The US Intelligence Community tells Congress to expect a more assertive Iran, Russia, and North Korea in cyberspace. They also forecast more election influence operations. General Nakasone has been nominated to succeed Admiral Rogers at NSA and US Cyber Command. Yossi Oren from BGU on two-factor authentication for the disabled. Guest is John Kuhn from IBM X-Force Iris on the uptick in spam around the Valentine’s Day holiday.Coin mining continues to make a nuisance of itself. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 14 Feb 2018 18:22:01 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>536</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/999f9108-def8-11ea-911f-5f0ae46c14cf/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Olympic Destroyer updates. Cyber forecasts from the US Intelligence Community. Patch notes. Cryptojacking and coinming. Ad blockers (also an incentive to coin mining). </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Olympic Destroyer exploits EternalRomance and morphs as it moves from machine to machine. Other Olympic hacks are out there, too. The US Intelligence Community tells Congress to expect a more assertive Iran, Russia, and North Korea in cyberspace. They also forecast more election influence operations. General Nakasone has been nominated to succeed Admiral Rogers at NSA and US Cyber Command. Yossi Oren from BGU on two-factor authentication for the disabled. Guest is John Kuhn from IBM X-Force Iris on the uptick in spam around the Valentine’s Day holiday.Coin mining continues to make a nuisance of itself. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Olympic Destroyer exploits EternalRomance and morphs as it moves from machine to machine. Other Olympic hacks are out there, too. The US Intelligence Community tells Congress to expect a more assertive Iran, Russia, and North Korea in cyberspace. They also forecast more election influence operations. General Nakasone has been nominated to succeed Admiral Rogers at NSA and US Cyber Command. Yossi Oren from BGU on two-factor authentication for the disabled. Guest is John Kuhn from IBM X-Force Iris on the uptick in spam around the Valentine’s Day holiday.Coin mining continues to make a nuisance of itself. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1218</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2c22b2cca96ecc8922d81ec7f23468d5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1143255375.mp3?updated=1689870698" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patch Tuesday notes. Skype DLL hijacking vulnerability. Olympic Destroyer malware described. Lazarus Group newly active. BitGrail heist? Cyber Valentine. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/535/notes</link>
      <description>In today's podcast, we hear that Patch Tuesday will not include a Skype fix—that one will take some time and attention. Olympic Destroyer is the malware thought to be infesting the Winter Games. Attribution remains unclear, but a lot of suspicious eyes are looking at you, Mr. Putin.  The Lazarus Group is stepping up its cryptocurrency stealing game. Questions swirl around the alleged BitGrail cryptocurrency exchange losses. David Dufour from Webroot on Mac vulnerabilities. Guest is Mark Loveless from Duo security, looking at IoT personal safety devices.  And, hey—Valentine's Day is tomorrow. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Feb 2018 20:42:24 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>535</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/99adf996-def8-11ea-911f-afebf6ec22cc/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Patch Tuesday notes. Skype DLL hijacking vulnerability. Olympic Destroyer malware described. Lazarus Group newly active. BitGrail heist? Cyber Valentine. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Patch Tuesday will not include a Skype fix—that one will take some time and attention. Olympic Destroyer is the malware thought to be infesting the Winter Games. Attribution remains unclear, but a lot of suspicious eyes are looking at you, Mr. Putin.  The Lazarus Group is stepping up its cryptocurrency stealing game. Questions swirl around the alleged BitGrail cryptocurrency exchange losses. David Dufour from Webroot on Mac vulnerabilities. Guest is Mark Loveless from Duo security, looking at IoT personal safety devices.  And, hey—Valentine's Day is tomorrow. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Patch Tuesday will not include a Skype fix—that one will take some time and attention. Olympic Destroyer is the malware thought to be infesting the Winter Games. Attribution remains unclear, but a lot of suspicious eyes are looking at you, Mr. Putin.  The Lazarus Group is stepping up its cryptocurrency stealing game. Questions swirl around the alleged BitGrail cryptocurrency exchange losses. David Dufour from Webroot on Mac vulnerabilities. Guest is Mark Loveless from Duo security, looking at IoT personal safety devices.  And, hey—Valentine's Day is tomorrow. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1181</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[40de11a7df86ffbad8afbd3f0e2f304c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6282845107.mp3?updated=1689870348" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Olympic hacking, cryptojacking and other illicit coin mining. Ransomware updates. The curious case of an alleged kompromat buy. Bots turn to ticket scalping. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/534/notes</link>
      <description>In today's podcast we hear that the the Winter Olympics report ongoing hacking. Cryptojacker hits government websites in the UK, Australia, and the US. Engineers use a research institute's supercomputer to mine Bitcoin in Sarov, Russia. The Equifax breach may be bigger and worse than hitherto believed. The Sacramento Bee deletes encrypted database rather than pay ransom. IBM patches Spectre and Meltdown. Emily Wilson from Terbium Labs offers a dark web scorecard on the 2018 Olympics and the 2018 elections, specifically addressing how matters stand in comparison with the last round of games and voting. The CIA says it was no way bilked by a proffered sale of kompromat. And bots scalp airline seats. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 12 Feb 2018 19:25:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>534</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/99c16378-def8-11ea-911f-03d88c7d5629/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Olympic hacking, cryptojacking and other illicit coin mining. Ransomware updates. The curious case of an alleged kompromat buy. Bots turn to ticket scalping. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that the the Winter Olympics report ongoing hacking. Cryptojacker hits government websites in the UK, Australia, and the US. Engineers use a research institute's supercomputer to mine Bitcoin in Sarov, Russia. The Equifax breach may be bigger and worse than hitherto believed. The Sacramento Bee deletes encrypted database rather than pay ransom. IBM patches Spectre and Meltdown. Emily Wilson from Terbium Labs offers a dark web scorecard on the 2018 Olympics and the 2018 elections, specifically addressing how matters stand in comparison with the last round of games and voting. The CIA says it was no way bilked by a proffered sale of kompromat. And bots scalp airline seats. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that the the Winter Olympics report ongoing hacking. Cryptojacker hits government websites in the UK, Australia, and the US. Engineers use a research institute's supercomputer to mine Bitcoin in Sarov, Russia. The Equifax breach may be bigger and worse than hitherto believed. The Sacramento Bee deletes encrypted database rather than pay ransom. IBM patches Spectre and Meltdown. Emily Wilson from Terbium Labs offers a dark web scorecard on the 2018 Olympics and the 2018 elections, specifically addressing how matters stand in comparison with the last round of games and voting. The CIA says it was no way bilked by a proffered sale of kompromat. And bots scalp airline seats. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>925</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2238efc8981b4de5a9489ef09156be8f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1572888644.mp3?updated=1689870335" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>IcedID banking trojan. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/22/notes</link>
      <description>IcedID is a banking trojan recently discovered and tracked by IBM's X-Force research team, targeting banks, payment card providers, mobile services providers, payroll, webmail and e-commerce sites in the U.S. 
Limor Kessem is an executive security advisor with IBM Security. She returns to Research Saturday to describe what she and her team found.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 10 Feb 2018 12:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>22</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/f65121c8-df0c-11ea-9447-af358ec86b99/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>IcedID banking trojan</itunes:subtitle>
      <itunes:summary>IcedID is a banking trojan recently discovered and tracked by IBM's X-Force research team, targeting banks, payment card providers, mobile services providers, payroll, webmail and e-commerce sites in the U.S. 
Limor Kessem is an executive security advisor with IBM Security. She returns to Research Saturday to describe what she and her team found.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>IcedID is a banking trojan recently discovered and tracked by IBM's X-Force research team, targeting banks, payment card providers, mobile services providers, payroll, webmail and e-commerce sites in the U.S. </p><p>Limor Kessem is an executive security advisor with IBM Security. She returns to Research Saturday to describe what she and her team found.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1436</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8a8079d1d22b8749b48de97f8386b55a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1624910545.mp3?updated=1684873687" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trends in phishing. Olympic hacking. Cryptojacking spreads. Litecoin gains black market share. Influence operations. Can Strava be exploited by bicycle thieves? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/533/notes</link>
      <description>In today's podcast we hear that phishing has gotten more personal with conversation hijacking and attempts on direct deposit instructions. The Olympics have opened: do you know where your hackers are? Apple finds leaked iOS source code on Github. Cryptominers found in hospital systems. Litecoin picks up black market share. Notes on recent patches. Concerns about Russian influence operations continue as US midterm elections approach. Dale Drew from CenturyLink on victim notification. Guest is Deidre Diamond from #brainbabe. They are a nonprofit working to replace “booth babes” at trade shows with students. And are bicycle thieves going online?  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 09 Feb 2018 20:54:07 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>533</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/99d08be6-def8-11ea-911f-57736afaa470/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Trends in phishing. Olympic hacking. Cryptojacking spreads. Litecoin gains black market share. Influence operations. Can Strava be exploited by bicycle thieves? </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that phishing has gotten more personal with conversation hijacking and attempts on direct deposit instructions. The Olympics have opened: do you know where your hackers are? Apple finds leaked iOS source code on Github. Cryptominers found in hospital systems. Litecoin picks up black market share. Notes on recent patches. Concerns about Russian influence operations continue as US midterm elections approach. Dale Drew from CenturyLink on victim notification. Guest is Deidre Diamond from #brainbabe. They are a nonprofit working to replace “booth babes” at trade shows with students. And are bicycle thieves going online?  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that phishing has gotten more personal with conversation hijacking and attempts on direct deposit instructions. The Olympics have opened: do you know where your hackers are? Apple finds leaked iOS source code on Github. Cryptominers found in hospital systems. Litecoin picks up black market share. Notes on recent patches. Concerns about Russian influence operations continue as US midterm elections approach. Dale Drew from CenturyLink on victim notification. Guest is Deidre Diamond from #brainbabe. They are a nonprofit working to replace “booth babes” at trade shows with students. And are bicycle thieves going online?  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1423</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a43440b82575a4441c94ceecc031f87d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7347100367.mp3?updated=1608754765" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Operation Shadow Web rolls up carding gang. Fancy Bear sightings. DPRK buying zero-days? Cryptojacking ICS. Huawei, ZTE get Congressional razzing. Jita scams. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/532/notes</link>
      <description>In today's podcast we hear that Operation Shadow Web has tken down the Infraud criminal carding gang. Two more Fancy Bear sightings—one in voter databases, one in Defense contractor emails. North Korea may have purchased its Flash Player zero-day from a third-party. Cryptojacking hits a European water utility. US Senate considers banning Huawei and ZTE from Federal use. Johannes Ullrich on cryptocurrency theft, and advice for protecting your virtual currency. Guest is Christopher Doman from AlienVault on their discovery of a Monero cryptocurrency miner linked to North Korea. And no, Messrs. McAfee and Musk aren't Nigerian princes, and they're not giving away Bitcoin. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 08 Feb 2018 20:52:50 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>532</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/99e864b4-def8-11ea-911f-ef78ee20e44c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Operation Shadow Web rolls up carding gang. Fancy Bear sightings. DPRK buying zero-days? Cryptojacking ICS. Huawei, ZTE get Congressional razzing. Jita scams. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Operation Shadow Web has tken down the Infraud criminal carding gang. Two more Fancy Bear sightings—one in voter databases, one in Defense contractor emails. North Korea may have purchased its Flash Player zero-day from a third-party. Cryptojacking hits a European water utility. US Senate considers banning Huawei and ZTE from Federal use. Johannes Ullrich on cryptocurrency theft, and advice for protecting your virtual currency. Guest is Christopher Doman from AlienVault on their discovery of a Monero cryptocurrency miner linked to North Korea. And no, Messrs. McAfee and Musk aren't Nigerian princes, and they're not giving away Bitcoin. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Operation Shadow Web has tken down the Infraud criminal carding gang. Two more Fancy Bear sightings—one in voter databases, one in Defense contractor emails. North Korea may have purchased its Flash Player zero-day from a third-party. Cryptojacking hits a European water utility. US Senate considers banning Huawei and ZTE from Federal use. Johannes Ullrich on cryptocurrency theft, and advice for protecting your virtual currency. Guest is Christopher Doman from AlienVault on their discovery of a Monero cryptocurrency miner linked to North Korea. And no, Messrs. McAfee and Musk aren't Nigerian princes, and they're not giving away Bitcoin. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1185</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[510a2103a56d189ac0c06311d9200b58]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8722906285.mp3?updated=1689870313" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dutch DDoS arrest. Pyongyang is interested in cryptocurrency. So is the US SEC (in a different way). Uber explains its breach disclosure. New wrinkle in the "Microsoft" Help Desk scam. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/531/notes</link>
      <description>In today's podcast we hear that Dutch police have made an arrest in last week's financial sector DDoS case: it's a teenager. North Korean interest in stealing cryptocurrency remains high. Adobe patches the zero-day Pyongyang had exploited against Seoul. Hardware wallets found vulnerable to man-in-the-middle attacks. Crytpojacking trends. US regulators take a hard look at alt-coins and how they're traded. Uber says it regrets not coming clean sooner about its breach. Justin Harvey from Accenture on ransomware, to pay or not to pay. Guest is Yassir Abousselham from Okta on their 2018 Business at Work report. New trends in an old help desk scam. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 07 Feb 2018 20:46:09 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>531</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/99fd798a-def8-11ea-911f-9bdc6fc5f7a1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dutch DDoS arrest. Pyongyang is interested in cryptocurrency. So is the US SEC (in a different way). Uber explains its breach disclosure. New wrinkle in the "Microsoft" Help Desk scam. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Dutch police have made an arrest in last week's financial sector DDoS case: it's a teenager. North Korean interest in stealing cryptocurrency remains high. Adobe patches the zero-day Pyongyang had exploited against Seoul. Hardware wallets found vulnerable to man-in-the-middle attacks. Crytpojacking trends. US regulators take a hard look at alt-coins and how they're traded. Uber says it regrets not coming clean sooner about its breach. Justin Harvey from Accenture on ransomware, to pay or not to pay. Guest is Yassir Abousselham from Okta on their 2018 Business at Work report. New trends in an old help desk scam. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Dutch police have made an arrest in last week's financial sector DDoS case: it's a teenager. North Korean interest in stealing cryptocurrency remains high. Adobe patches the zero-day Pyongyang had exploited against Seoul. Hardware wallets found vulnerable to man-in-the-middle attacks. Crytpojacking trends. US regulators take a hard look at alt-coins and how they're traded. Uber says it regrets not coming clean sooner about its breach. Justin Harvey from Accenture on ransomware, to pay or not to pay. Guest is Yassir Abousselham from Okta on their 2018 Business at Work report. New trends in an old help desk scam. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1219</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3034f0abf1490a7ae5dd6232f8236a37]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6664065963.mp3?updated=1689870303" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More Eternal exploits found more troublesome. Cryptominer updates. NIST SP 800-171. Paycard skimmers. Tsunami false alarm. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/530/notes</link>
      <description>In today's podcast, we hear that the Shadow Broker exploits have now been found to be more exploitable. Cryptocurrency miners are recognized as a problem: MacUpdate sustained a brief infestation late last week, and a new Android mining campaign takes a page from Mirai's playbook. Smominru botnet rakes in $3.6 million. T-Mobile warns of SIM-hijacking. Comment period extended for NIST Special Publication 800-171. New paycard skimmer found in Pennsylvania stores. Emily Wilson from Terbium Labs on tax fraud issues. Guest is Woody Shea from Covata on S3 bucket leaks. And a tsunami false alarm on the US East Coast. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Feb 2018 20:28:24 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>530</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9a10415a-def8-11ea-911f-0321468b27a4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>More Eternal exploits found more troublesome. Cryptominer updates. NIST SP 800-171. Paycard skimmers. Tsunami false alarm. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the Shadow Broker exploits have now been found to be more exploitable. Cryptocurrency miners are recognized as a problem: MacUpdate sustained a brief infestation late last week, and a new Android mining campaign takes a page from Mirai's playbook. Smominru botnet rakes in $3.6 million. T-Mobile warns of SIM-hijacking. Comment period extended for NIST Special Publication 800-171. New paycard skimmer found in Pennsylvania stores. Emily Wilson from Terbium Labs on tax fraud issues. Guest is Woody Shea from Covata on S3 bucket leaks. And a tsunami false alarm on the US East Coast. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the Shadow Broker exploits have now been found to be more exploitable. Cryptocurrency miners are recognized as a problem: MacUpdate sustained a brief infestation late last week, and a new Android mining campaign takes a page from Mirai's playbook. Smominru botnet rakes in $3.6 million. T-Mobile warns of SIM-hijacking. Comment period extended for NIST Special Publication 800-171. New paycard skimmer found in Pennsylvania stores. Emily Wilson from Terbium Labs on tax fraud issues. Guest is Woody Shea from Covata on S3 bucket leaks. And a tsunami false alarm on the US East Coast. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1094</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7ef5173ae99eedf6433239bc37177d92]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5236529068.mp3?updated=1689870291" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DPRK exploiting Flash Player zero-day. ISIS wants hacking help. JenX DDoS, Scrareby ransomware updates. Crime and punishment. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/529/notes</link>
      <description>In today's podcast, we hear that Flash Player is being exploited by DPRK's TEMP.Reaper, also known as Group 123. ISIS may have a hacker help-wanted sign out. JenX botnet update. Scareby ransomware tells victims it will shred their files if they don't pay up. The Nunes Memo remains a political Rohrschach Test. A Japanese teenager is arrested for writing cryptocurrency-stealing code. Lauri Love will not be extradited to the US. Peter Levashov is not so lucky.  Joe Carrigan from JHU responds to listener mail on passwords. And the FBI is not emailing you to say you may be entitled to compensation.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 05 Feb 2018 20:04:07 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>529</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9a221b3c-def8-11ea-911f-e30fce7b3f3f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>DPRK exploiting Flash Player zero-day. ISIS wants hacking help. JenX DDoS, Scrareby ransomware updates. Crime and punishment. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Flash Player is being exploited by DPRK's TEMP.Reaper, also known as Group 123. ISIS may have a hacker help-wanted sign out. JenX botnet update. Scareby ransomware tells victims it will shred their files if they don't pay up. The Nunes Memo remains a political Rohrschach Test. A Japanese teenager is arrested for writing cryptocurrency-stealing code. Lauri Love will not be extradited to the US. Peter Levashov is not so lucky.  Joe Carrigan from JHU responds to listener mail on passwords. And the FBI is not emailing you to say you may be entitled to compensation.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Flash Player is being exploited by DPRK's TEMP.Reaper, also known as Group 123. ISIS may have a hacker help-wanted sign out. JenX botnet update. Scareby ransomware tells victims it will shred their files if they don't pay up. The Nunes Memo remains a political Rohrschach Test. A Japanese teenager is arrested for writing cryptocurrency-stealing code. Lauri Love will not be extradited to the US. Peter Levashov is not so lucky.  Joe Carrigan from JHU responds to listener mail on passwords. And the FBI is not emailing you to say you may be entitled to compensation.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1013</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[db1014831e11add15f0c25a15d8525fe]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5947335468.mp3?updated=1689870278" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Advanced adware with nation-state tactics. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/21/notes</link>
      <description>Adware is generally considered unsophisticated, and because of its low perceived threat level it's often ignored. Researchers at the Booz Allen Dark Labs' Advanced Threat Hunt Team have recently published research describing a more advanced type of adware, using infection techniques usually attributed to nation-state actors. 

Jay Novak is a threat hunter and tech lead at Booz Allen, and he takes us through their research.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 03 Feb 2018 12:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>21</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/f4c3d5c6-df0c-11ea-8fcf-f7efd46a8fc8/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Advanced adware with nation-state tactics</itunes:subtitle>
      <itunes:summary>Adware is generally considered unsophisticated, and because of its low perceived threat level it's often ignored. Researchers at the Booz Allen Dark Labs' Advanced Threat Hunt Team have recently published research describing a more advanced type of adware, using infection techniques usually attributed to nation-state actors. 

Jay Novak is a threat hunter and tech lead at Booz Allen, and he takes us through their research.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Adware is generally considered unsophisticated, and because of its low perceived threat level it's often ignored. Researchers at the Booz Allen Dark Labs' Advanced Threat Hunt Team have recently published research describing a more advanced type of adware, using infection techniques usually attributed to nation-state actors. </p><p><br></p><p>Jay Novak is a threat hunter and tech lead at Booz Allen, and he takes us through their research.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1163</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fff13a92f3df3631a38a97bbb56c77a7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8084550691.mp3?updated=1684873666" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>JenX botnet and DDoS-for-hire. RoK CERT warns of Flash Player zero-day. Cryptocurrency mining and scamming. ICS security trends. Twitter cleared in terror trial. The Nunes Memo is out. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/528/notes</link>
      <description>In today's podcast, we hear that the JenX botnet will conduct DDoS-for-hire, if you've got twenty bucks. South Korea's CERT warns of an Adobe Flash Player zero-day being exploited in the wild. Bitcoin's price drops below $9000, but miners and scammers are still after this and other cryptocurrencies. BeeToken's ICO is used to phish for Ethereum. ICS security reflections in the wake of the Triton/Trisis attack. The 9th Circuit rules that Twitter didn't provide material support to ISIS killers. Rob Lee from Dragos on the security of wind power systems. Guest is Dana Simberkoff from AvePoint, with a discussion on women working in privacy, and why it’s one area where we are doing well at getting and equal number of women engaged. And the Nunes Memo is out, declassified and unredacted. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 02 Feb 2018 20:58:22 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>528</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9a37eade-def8-11ea-911f-0b3e14008782/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>JenX botnet and DDoS-for-hire. RoK CERT warns of Flash Player zero-day. Cryptocurrency mining and scamming. ICS security trends. Twitter cleared in terror trial. The Nunes Memo is out. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the JenX botnet will conduct DDoS-for-hire, if you've got twenty bucks. South Korea's CERT warns of an Adobe Flash Player zero-day being exploited in the wild. Bitcoin's price drops below $9000, but miners and scammers are still after this and other cryptocurrencies. BeeToken's ICO is used to phish for Ethereum. ICS security reflections in the wake of the Triton/Trisis attack. The 9th Circuit rules that Twitter didn't provide material support to ISIS killers. Rob Lee from Dragos on the security of wind power systems. Guest is Dana Simberkoff from AvePoint, with a discussion on women working in privacy, and why it’s one area where we are doing well at getting and equal number of women engaged. And the Nunes Memo is out, declassified and unredacted. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the JenX botnet will conduct DDoS-for-hire, if you've got twenty bucks. South Korea's CERT warns of an Adobe Flash Player zero-day being exploited in the wild. Bitcoin's price drops below $9000, but miners and scammers are still after this and other cryptocurrencies. BeeToken's ICO is used to phish for Ethereum. ICS security reflections in the wake of the Triton/Trisis attack. The 9th Circuit rules that Twitter didn't provide material support to ISIS killers. Rob Lee from Dragos on the security of wind power systems. Guest is Dana Simberkoff from AvePoint, with a discussion on women working in privacy, and why it’s one area where we are doing well at getting and equal number of women engaged. And the Nunes Memo is out, declassified and unredacted. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1548</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4265cf16723b870c5a597cf6b5e32a4e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9474649300.mp3?updated=1608754769" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ISIS war on families. Cryptomining botnets. The weaponization of Spectre and Meltdown. Phishig with bogus emails spoofing Google, Microsoft. Apps that know too much. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/527/notes</link>
      <description>In today's podcast, we hear that ISIS inspiration is increasingly directed at children. Cryptomining botnets use same EternalBlue exploit as WannaCry. Criminals experiment to weaponize Spectre and Meltdown vulnerabilities. Phishing campaigns exploit well-known services including Google Docs and Outlook. Patch notes. Ben Yelin from UMD CHHS on the National Association of Insurance Commissioners adopting a model data cyber security law. Guest is Shashi Kiran from Quali on cyber ranges and cloud sandboxes. Geolocation and other app-collected info raise OPSEC concerns. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 01 Feb 2018 20:54:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>527</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9a5fd08a-def8-11ea-911f-67048995e907/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>ISIS war on families. Cryptomining botnets. The weaponization of Spectre and Meltdown. Phishig with bogus emails spoofing Google, Microsoft. Apps that know too much. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that ISIS inspiration is increasingly directed at children. Cryptomining botnets use same EternalBlue exploit as WannaCry. Criminals experiment to weaponize Spectre and Meltdown vulnerabilities. Phishing campaigns exploit well-known services including Google Docs and Outlook. Patch notes. Ben Yelin from UMD CHHS on the National Association of Insurance Commissioners adopting a model data cyber security law. Guest is Shashi Kiran from Quali on cyber ranges and cloud sandboxes. Geolocation and other app-collected info raise OPSEC concerns. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that ISIS inspiration is increasingly directed at children. Cryptomining botnets use same EternalBlue exploit as WannaCry. Criminals experiment to weaponize Spectre and Meltdown vulnerabilities. Phishing campaigns exploit well-known services including Google Docs and Outlook. Patch notes. Ben Yelin from UMD CHHS on the National Association of Insurance Commissioners adopting a model data cyber security law. Guest is Shashi Kiran from Quali on cyber ranges and cloud sandboxes. Geolocation and other app-collected info raise OPSEC concerns. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1216</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[576fb3342df1725b46d464706958d26a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2313682284.mp3?updated=1689869300" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing campaign targets Israeli scientists. Low-level contract phishing in China's hinterlands? Apps with privacy flaws. Cisco patches ASA products. Cryptocurrency speculation and fraud. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/526/notes</link>
      <description>In today's podcast we hear about a possible Charming Kitten sighting. Phishing in Tibet shows just how successful cheap skid labor can be. Cisco patches a serious flaw in VPN products. Fitness app Strava says it will work to close privacy holes. Experts say you're just a tap away from giving yourself away, and it's not just Strava, not by a long shot. South Korea considers how cryptocurrency might be regulated. The US SEC shuts down an allegedly fraudulent ICO. Yossi Oren from BGU on insecure mobile device cases. Guest is JT Keating from Zimperium on the effects of Meltdown and Spectre on mobile devices. And what do you call an ICO that steals the price of a cheap seat? 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 31 Jan 2018 20:11:07 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>526</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9a7188d4-def8-11ea-911f-8f264e4bb33d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Phishing campaign targets Israeli scientists. Low-level contract phishing in China's hinterlands? Apps with privacy flaws. Cisco patches ASA products. Cryptocurrency speculation and fraud. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear about a possible Charming Kitten sighting. Phishing in Tibet shows just how successful cheap skid labor can be. Cisco patches a serious flaw in VPN products. Fitness app Strava says it will work to close privacy holes. Experts say you're just a tap away from giving yourself away, and it's not just Strava, not by a long shot. South Korea considers how cryptocurrency might be regulated. The US SEC shuts down an allegedly fraudulent ICO. Yossi Oren from BGU on insecure mobile device cases. Guest is JT Keating from Zimperium on the effects of Meltdown and Spectre on mobile devices. And what do you call an ICO that steals the price of a cheap seat? 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about a possible Charming Kitten sighting. Phishing in Tibet shows just how successful cheap skid labor can be. Cisco patches a serious flaw in VPN products. Fitness app Strava says it will work to close privacy holes. Experts say you're just a tap away from giving yourself away, and it's not just Strava, not by a long shot. South Korea considers how cryptocurrency might be regulated. The US SEC shuts down an allegedly fraudulent ICO. Yossi Oren from BGU on insecure mobile device cases. Guest is JT Keating from Zimperium on the effects of Meltdown and Spectre on mobile devices. And what do you call an ICO that steals the price of a cheap seat? </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1213</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b9f927bc047833aa2a645ec3d6523fa8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5802126479.mp3?updated=1689869290" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Netherlands financial sector recovers from DDoS. Lizard Squad, Mirai, and coin mining. IOTA wallets emptied. Snooper's Charter loses in court. US House may release surveillance memos. Strava OPSEC. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/525/notes</link>
      <description>In today's podcast we hear that the Dutch financial sector is well on its way to recovering from the recent DDoS wave, which could be the work of anyone from teenaged skids to some nation's intelligence service. Lizard Squad may have a connection to Mirai. The reptiles are also getting into the coin mining business. Patient phishing relieves IOTA cryptocurrency users of the contents of their wallets. UK's Snooper's Charter smacked down by High Court. US House Intelligence Committee votes to release classified memo on surveillance. Jonathan Katz from UMD on the “fuzzing” of private healthcare information. Guest is Michael Simon from Cryptonite with results from their 2018 Health Care Cyber Report. US military personnel get an OPSEC lesson on Strava. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Jan 2018 20:29:05 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>525</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9a8ab5c0-def8-11ea-911f-1f0cccf75d9b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Netherlands financial sector recovers from DDoS. Lizard Squad, Mirai, and coin mining. IOTA wallets emptied. Snooper's Charter loses in court. US House may release surveillance memos. Strava OPSEC. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that the Dutch financial sector is well on its way to recovering from the recent DDoS wave, which could be the work of anyone from teenaged skids to some nation's intelligence service. Lizard Squad may have a connection to Mirai. The reptiles are also getting into the coin mining business. Patient phishing relieves IOTA cryptocurrency users of the contents of their wallets. UK's Snooper's Charter smacked down by High Court. US House Intelligence Committee votes to release classified memo on surveillance. Jonathan Katz from UMD on the “fuzzing” of private healthcare information. Guest is Michael Simon from Cryptonite with results from their 2018 Health Care Cyber Report. US military personnel get an OPSEC lesson on Strava. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that the Dutch financial sector is well on its way to recovering from the recent DDoS wave, which could be the work of anyone from teenaged skids to some nation's intelligence service. Lizard Squad may have a connection to Mirai. The reptiles are also getting into the coin mining business. Patient phishing relieves IOTA cryptocurrency users of the contents of their wallets. UK's Snooper's Charter smacked down by High Court. US House Intelligence Committee votes to release classified memo on surveillance. Jonathan Katz from UMD on the “fuzzing” of private healthcare information. Guest is Michael Simon from Cryptonite with results from their 2018 Health Care Cyber Report. US military personnel get an OPSEC lesson on Strava. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1167</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f4fee0d58ae021638b04e0a13a013022]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7198526068.mp3?updated=1689868804" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Coincheck cryptocurrency heist. ICO phishing. Jackpotting comes to America. Dridex and FriedEx. Transduction attack threat to IoT sensors. Jihadist steganography. Oversharing with Strava? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/524/notes</link>
      <description>In today's podcast, we hear that hackers have looted cryptocurrency exchange Coincheck to the tune of about $530 million. Experty's ICO speculators get phished by crooks. Jackpotting hits American ATMs. The Dridex banking Trojan apparently has a ransomware sibling: FriedEx. Transduction attacks could hit IoT sensors. Steganographic app "Muslim Crypt" is designed for jihadist communication. North Korea tells Britain to mind its own business about WannaCry. Zulfikar Ramzan from RSA with his perspective on Spectre and Meltdown. Strava fitness app reveals locations of user activity. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 29 Jan 2018 20:18:45 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>524</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9aa17a3a-def8-11ea-911f-1f2af8ef7792/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Coincheck cryptocurrency heist. ICO phishing. Jackpotting comes to America. Dridex and FriedEx. Transduction attack threat to IoT sensors. Jihadist steganography. Oversharing with Strava? </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that hackers have looted cryptocurrency exchange Coincheck to the tune of about $530 million. Experty's ICO speculators get phished by crooks. Jackpotting hits American ATMs. The Dridex banking Trojan apparently has a ransomware sibling: FriedEx. Transduction attacks could hit IoT sensors. Steganographic app "Muslim Crypt" is designed for jihadist communication. North Korea tells Britain to mind its own business about WannaCry. Zulfikar Ramzan from RSA with his perspective on Spectre and Meltdown. Strava fitness app reveals locations of user activity. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that hackers have looted cryptocurrency exchange Coincheck to the tune of about $530 million. Experty's ICO speculators get phished by crooks. Jackpotting hits American ATMs. The Dridex banking Trojan apparently has a ransomware sibling: FriedEx. Transduction attacks could hit IoT sensors. Steganographic app "Muslim Crypt" is designed for jihadist communication. North Korea tells Britain to mind its own business about WannaCry. Zulfikar Ramzan from RSA with his perspective on Spectre and Meltdown. Strava fitness app reveals locations of user activity. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>927</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[66343ea902bdcb408d91e8be27341c2b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4232087680.mp3?updated=1689868590" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Targeting Olympic organizations. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/20/notes</link>
      <description>This week we’re discussing the a campaign the McAfee Advanced Threat Research team recently discovered, one that’s targeting organizations involved with the upcoming Pyeongchang Winter Olympics.
Raj Samani is chief scientist at McAfee, and he shares the campaign's clever details.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 27 Jan 2018 12:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>20</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/69191734-df0c-11ea-9447-b7b82f43bc09/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Targeting Olympic organizations</itunes:subtitle>
      <itunes:summary>This week we’re discussing the a campaign the McAfee Advanced Threat Research team recently discovered, one that’s targeting organizations involved with the upcoming Pyeongchang Winter Olympics.
Raj Samani is chief scientist at McAfee, and he shares the campaign's clever details.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>This week we’re discussing the a campaign the McAfee Advanced Threat Research team recently discovered, one that’s targeting organizations involved with the upcoming Pyeongchang Winter Olympics.</p><p>Raj Samani is chief scientist at McAfee, and he shares the campaign's clever details.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1306</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[57977fe845a9952d1c0f427957558b55]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3182321587.mp3?updated=1684873652" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lebal's layered approach to infection. Crytominers are becoming a big problem. Tracking influence ops. Dutch intelligence spotted Cozy Bear early. Exploiting password recovery. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/523/notes</link>
      <description>In today's podcast, we hear how Lebal malware steps its way through layered defenses. Cryptocurrency mining campaigns go after Monero with XMRig, WannaMine, and other toolkits. It's not a victimless crime, either—CPUs can be rendered effectively unusable. Influence operations are tracked in Twitter and Facebook. Dutch intelligence services penetrated Cozy Bear and shared warnings with allied services. Russia demanded, and got, source code access as a condition of doing business. Dale Drew from CenturyLink shares his outlook on 2018. Stacey Higginbotham, host of the Internet of Things Podcast, chats about IoT security. A creep exploits password recovery utilities. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 26 Jan 2018 19:18:20 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>523</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9ab8b182-def8-11ea-911f-272acc7584fa/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Lebal's layered approach to infection. Crytominers are becoming a big problem. Tracking influence ops. Dutch intelligence spotted Cozy Bear early. Exploiting password recovery. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear how Lebal malware steps its way through layered defenses. Cryptocurrency mining campaigns go after Monero with XMRig, WannaMine, and other toolkits. It's not a victimless crime, either—CPUs can be rendered effectively unusable. Influence operations are tracked in Twitter and Facebook. Dutch intelligence services penetrated Cozy Bear and shared warnings with allied services. Russia demanded, and got, source code access as a condition of doing business. Dale Drew from CenturyLink shares his outlook on 2018. Stacey Higginbotham, host of the Internet of Things Podcast, chats about IoT security. A creep exploits password recovery utilities. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear how Lebal malware steps its way through layered defenses. Cryptocurrency mining campaigns go after Monero with XMRig, WannaMine, and other toolkits. It's not a victimless crime, either—CPUs can be rendered effectively unusable. Influence operations are tracked in Twitter and Facebook. Dutch intelligence services penetrated Cozy Bear and shared warnings with allied services. Russia demanded, and got, source code access as a condition of doing business. Dale Drew from CenturyLink shares his outlook on 2018. Stacey Higginbotham, host of the Internet of Things Podcast, chats about IoT security. A creep exploits password recovery utilities. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1406</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a4a3c691ca9241855ec2d01b483d92f5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8324217724.mp3?updated=1689868399" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>2018 forecast [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/21/notes</link>
      <description>It’s fair to say that 2017 was a busy year when it came to cyber security, and as we head into 2018 there’s certainly no sign of things slowing down. Days into the new year the news of serious vulnerabilities like Meltdown and Spectre, the ongoing threat of ransomware, major data and privacy breaches, and political unrest around the world, well, hold onto your hats, it looks like we may be in for a bumpy ride.
In this CyberWire special edition, we’ve gathered a group of seasoned cyber security experts to share their views on what we might expect over the coming year.
 Nate Beach-Westmoreland is Head of Strategic Threat Intelligence at Booz Allen's Cyber4Sight.
https://www.linkedin.com/in/natebeachw/
 
Christopher Porter is Chief Intelligence Strategist at FireEye.
https://www.linkedin.com/in/christopher-porter-039620112/
 
Caleb Barlow is Vice President Threat Intelligence at IBM Security.
https://www.linkedin.com/in/calebbarlow/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 26 Jan 2018 15:32:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>21</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a28c9d86-df04-11ea-bd36-07a54f4aa208/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>2018 forecast</itunes:subtitle>
      <itunes:summary>It’s fair to say that 2017 was a busy year when it came to cyber security, and as we head into 2018 there’s certainly no sign of things slowing down. Days into the new year the news of serious vulnerabilities like Meltdown and Spectre, the ongoing threat of ransomware, major data and privacy breaches, and political unrest around the world, well, hold onto your hats, it looks like we may be in for a bumpy ride.
In this CyberWire special edition, we’ve gathered a group of seasoned cyber security experts to share their views on what we might expect over the coming year.
 Nate Beach-Westmoreland is Head of Strategic Threat Intelligence at Booz Allen's Cyber4Sight.
https://www.linkedin.com/in/natebeachw/
 
Christopher Porter is Chief Intelligence Strategist at FireEye.
https://www.linkedin.com/in/christopher-porter-039620112/
 
Caleb Barlow is Vice President Threat Intelligence at IBM Security.
https://www.linkedin.com/in/calebbarlow/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>It’s fair to say that 2017 was a busy year when it came to cyber security, and as we head into 2018 there’s certainly no sign of things slowing down. Days into the new year the news of serious vulnerabilities like Meltdown and Spectre, the ongoing threat of ransomware, major data and privacy breaches, and political unrest around the world, well, hold onto your hats, it looks like we may be in for a bumpy ride.</p><p>In this CyberWire special edition, we’ve gathered a group of seasoned cyber security experts to share their views on what we might expect over the coming year.</p><p> Nate Beach-Westmoreland is Head of Strategic Threat Intelligence at Booz Allen's Cyber4Sight.</p><p><a href="https://www.linkedin.com/in/natebeachw/">https://www.linkedin.com/in/natebeachw/</a></p><p> </p><p>Christopher Porter is Chief Intelligence Strategist at FireEye.</p><p><a href="https://www.linkedin.com/in/christopher-porter-039620112/">https://www.linkedin.com/in/christopher-porter-039620112/</a></p><p> </p><p>Caleb Barlow is Vice President Threat Intelligence at IBM Security.</p><p><a href="https://www.linkedin.com/in/calebbarlow/">https://www.linkedin.com/in/calebbarlow/</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2064</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[61ee98924dc5054a716a40d403231362]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2799780112.mp3?updated=1656712061" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patriotic hacktivism. HNS botnet spreads P2P. Electron vulnerabilities found, mitigated, Criminals target ICOs. Ransomware-as-a-service. Cryptowars. Fancy Bear doxes luge. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/522/notes</link>
      <description>In today's podcast, we hear about how patriotic hacktivists are talking turkey to high-profile Twitter accounts. The Hide 'N' Seek IoT botnet spreads swiftly through specially crafted peer-to-peer communications. Vulnerabilities found in the Electron developers framework. ICOs are heavily targeted by criminals. Bell Canada was breached, and the Mounties are on the case. Ontario transit operator Metrolinx is asked how it knows North Korea hacked it. British Prime Minister May takes a swing at secure messaging and tech companies generally. Fancy Bear doesn't like Olympic luge. David DuFour from WebRoot with his outlook on ransomware for the coming year. Guest is Malcolm Harkins from Cylance with thoughts on the Aadhaar data breach. And what's the significance of a values statement? 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 25 Jan 2018 20:27:33 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>522</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9ac806a0-def8-11ea-911f-afd688c5d9c4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Patriotic hacktivism. HNS botnet spreads P2P. Electron vulnerabilities found, mitigated, Criminals target ICOs. Ransomware-as-a-service. Cryptowars. Fancy Bear doxes luge. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how patriotic hacktivists are talking turkey to high-profile Twitter accounts. The Hide 'N' Seek IoT botnet spreads swiftly through specially crafted peer-to-peer communications. Vulnerabilities found in the Electron developers framework. ICOs are heavily targeted by criminals. Bell Canada was breached, and the Mounties are on the case. Ontario transit operator Metrolinx is asked how it knows North Korea hacked it. British Prime Minister May takes a swing at secure messaging and tech companies generally. Fancy Bear doesn't like Olympic luge. David DuFour from WebRoot with his outlook on ransomware for the coming year. Guest is Malcolm Harkins from Cylance with thoughts on the Aadhaar data breach. And what's the significance of a values statement? 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how patriotic hacktivists are talking turkey to high-profile Twitter accounts. The Hide 'N' Seek IoT botnet spreads swiftly through specially crafted peer-to-peer communications. Vulnerabilities found in the Electron developers framework. ICOs are heavily targeted by criminals. Bell Canada was breached, and the Mounties are on the case. Ontario transit operator Metrolinx is asked how it knows North Korea hacked it. British Prime Minister May takes a swing at secure messaging and tech companies generally. Fancy Bear doesn't like Olympic luge. David DuFour from WebRoot with his outlook on ransomware for the coming year. Guest is Malcolm Harkins from Cylance with thoughts on the Aadhaar data breach. And what's the significance of a values statement? </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1237</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[09914b0cb1582ada77fd8c99d1e6b7e7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1503634325.mp3?updated=1689868387" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Satori variants. Hacking in Anatolia. Lazarus Group improves its tradecraft. Tindr vulnerabilties. UK's new office to combat disinformation. Pirated pdfs hold malware. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/521/notes</link>
      <description>In today's podcast, we hear that new Satori variants are out. Turkish hacktivists use Twitter for social engineering. Parties unknown are conducting an espionage campaign against Turkish defense contractors. North Korea's Lazarus Group improves its cryptocurrency theft tradecraft. Dating app vulnerabilities are a cyber-stalker's dream date. Britain will combat disinformation with a national office of rumor control. Justin Harvey from Accenture addressing the cyber skills shortage. Guest is Jon Condra from Flashpoint, reviewing their Business Risk Intelligence Decision Report. Plus, say phooey to pirated copies of Fire and Fury. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 24 Jan 2018 19:23:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>521</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9addf028-def8-11ea-911f-e785d19b1423/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Satori variants. Hacking in Anatolia. Lazarus Group improves its tradecraft. Tindr vulnerabilties. UK's new office to combat disinformation. Pirated pdfs hold malware. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that new Satori variants are out. Turkish hacktivists use Twitter for social engineering. Parties unknown are conducting an espionage campaign against Turkish defense contractors. North Korea's Lazarus Group improves its cryptocurrency theft tradecraft. Dating app vulnerabilities are a cyber-stalker's dream date. Britain will combat disinformation with a national office of rumor control. Justin Harvey from Accenture addressing the cyber skills shortage. Guest is Jon Condra from Flashpoint, reviewing their Business Risk Intelligence Decision Report. Plus, say phooey to pirated copies of Fire and Fury. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that new Satori variants are out. Turkish hacktivists use Twitter for social engineering. Parties unknown are conducting an espionage campaign against Turkish defense contractors. North Korea's Lazarus Group improves its cryptocurrency theft tradecraft. Dating app vulnerabilities are a cyber-stalker's dream date. Britain will combat disinformation with a national office of rumor control. Justin Harvey from Accenture addressing the cyber skills shortage. Guest is Jon Condra from Flashpoint, reviewing their Business Risk Intelligence Decision Report. Plus, say phooey to pirated copies of Fire and Fury. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1163</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[965cabfcc17b66c4a7aa8027196da675]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3602260853.mp3?updated=1689868370" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ISIS messaging. Intel will roll out new Spectre/Meltdown patches. Identities for sale on the dark web. IDN spoofing. SpriteCoin ransomware, with a malware chaser. Three Sonic games may be trouble. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/520/notes</link>
      <description>In today's podcast we hear that ISIS is howling "we are in your home" as they lose their own home. Intel says a new patch for Spectre and Meltdown is coming to fix instability problems. Babies' social security numbers and other data are for sale on the dark web. So are email credentials from top-500 British law firms. Look closely at urls—IDN spoofing is out and about. Satori expands the reach of its botnets. New ransomware strains surface. SpriteCoin is no coin at all. Joe Carrigan from JHU responding to listener mail about disabling links in email. Chris Webber from SafeBreach on using simulations to test for Meltdown and Spectre vulnerabilities. And Sonic the Hedgehog fans watch out: three popular games may expose you to hacking. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Jan 2018 18:34:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>520</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9af47b54-def8-11ea-911f-2baab4f75af1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>ISIS messaging. Intel will roll out new Spectre/Meltdown patches. Identities for sale on the dark web. IDN spoofing. SpriteCoin ransomware, with a malware chaser. Three Sonic games may be trouble. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that ISIS is howling "we are in your home" as they lose their own home. Intel says a new patch for Spectre and Meltdown is coming to fix instability problems. Babies' social security numbers and other data are for sale on the dark web. So are email credentials from top-500 British law firms. Look closely at urls—IDN spoofing is out and about. Satori expands the reach of its botnets. New ransomware strains surface. SpriteCoin is no coin at all. Joe Carrigan from JHU responding to listener mail about disabling links in email. Chris Webber from SafeBreach on using simulations to test for Meltdown and Spectre vulnerabilities. And Sonic the Hedgehog fans watch out: three popular games may expose you to hacking. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that ISIS is howling "we are in your home" as they lose their own home. Intel says a new patch for Spectre and Meltdown is coming to fix instability problems. Babies' social security numbers and other data are for sale on the dark web. So are email credentials from top-500 British law firms. Look closely at urls—IDN spoofing is out and about. Satori expands the reach of its botnets. New ransomware strains surface. SpriteCoin is no coin at all. Joe Carrigan from JHU responding to listener mail about disabling links in email. Chris Webber from SafeBreach on using simulations to test for Meltdown and Spectre vulnerabilities. And Sonic the Hedgehog fans watch out: three popular games may expose you to hacking. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1125</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e838b0f0174012bdd36ff26b1bee9588]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5116619059.mp3?updated=1689868302" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Evrial and the Clipboard threat. SamSam ransomware recovery. Olympic hacking? Russian bots. Crime and punishment. Speculated origins of Bitcoin. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/519/notes</link>
      <description>In today's podcast, we learn that the Evrial Trojan is interested in what's on your Windows Clipboard. The healthcare sector continues its struggle to recover from SamSam ransomware. People raise the possibility that Olympic timekeeping could be hacked. They're not saying it was, just that it might be. Russian troll farms are barking at the US House Intelligence Committee and the Czech Presidential run-off election. Some notes on crime and possible punishment. Malek Ben Salem from Accenture Labs on the challenges of deploying next-generation cryptography. And there are two new theories about Satoshi Nakamoto. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 22 Jan 2018 20:51:41 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>519</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9b0a2f58-def8-11ea-911f-dfa289bf00a1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Evrial and the Clipboard threat. SamSam ransomware recovery. Olympic hacking? Russian bots. Crime and punishment. Speculated origins of Bitcoin. </itunes:subtitle>
      <itunes:summary>In today's podcast, we learn that the Evrial Trojan is interested in what's on your Windows Clipboard. The healthcare sector continues its struggle to recover from SamSam ransomware. People raise the possibility that Olympic timekeeping could be hacked. They're not saying it was, just that it might be. Russian troll farms are barking at the US House Intelligence Committee and the Czech Presidential run-off election. Some notes on crime and possible punishment. Malek Ben Salem from Accenture Labs on the challenges of deploying next-generation cryptography. And there are two new theories about Satoshi Nakamoto. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we learn that the Evrial Trojan is interested in what's on your Windows Clipboard. The healthcare sector continues its struggle to recover from SamSam ransomware. People raise the possibility that Olympic timekeeping could be hacked. They're not saying it was, just that it might be. Russian troll farms are barking at the US House Intelligence Committee and the Czech Presidential run-off election. Some notes on crime and possible punishment. Malek Ben Salem from Accenture Labs on the challenges of deploying next-generation cryptography. And there are two new theories about Satoshi Nakamoto. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1031</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6f1bb55390044013c882084430d66d36]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8125478302.mp3?updated=1689868224" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fancy Bear Duping Doping Domains. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/19/notes</link>
      <description>Researchers at ThreatConnect have discovered evidence that Fancy Bear, a cyber espionage group generally associated with Russia's military agency GRU, may be spoofing domains belonging to the World Anti-Doping Agency (WADA), the US Anti-Doping Agency (USADA), and the Olympic Council of Asia.

Kyle Ehmke is a threat intelligence researcher with ThreatConnect, and he takes us through their work.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 20 Jan 2018 12:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>19</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/662768e6-df0c-11ea-bfcf-ab518ca55508/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fancy Bear Duping Doping Domains</itunes:subtitle>
      <itunes:summary>Researchers at ThreatConnect have discovered evidence that Fancy Bear, a cyber espionage group generally associated with Russia's military agency GRU, may be spoofing domains belonging to the World Anti-Doping Agency (WADA), the US Anti-Doping Agency (USADA), and the Olympic Council of Asia.

Kyle Ehmke is a threat intelligence researcher with ThreatConnect, and he takes us through their work.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers at ThreatConnect have discovered evidence that Fancy Bear, a cyber espionage group generally associated with Russia's military agency GRU, may be spoofing domains belonging to the World Anti-Doping Agency (WADA), the US Anti-Doping Agency (USADA), and the Olympic Council of Asia.</p><p><br></p><p>Kyle Ehmke is a threat intelligence researcher with ThreatConnect, and he takes us through their work.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1004</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b8ba0f95c9765447690a56338b7f0141]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1952880786.mp3?updated=1684873629" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AllScripts works to remediate ransomware in medical apps. Group 123 hits ROK targets. Triton/Trisis zero-day. Dark Caracal espionage op. Section 702 renewed. GhostTeam ejected from Play Store. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/518/notes</link>
      <description>In today's podcast we hear about ransomware afflicting a healthcare IT provider. Group 123 phishes in South Korean waters. Schneider Electric describes the zero-day Triton/Trisis exploited. The Dark Caracal spyware campaign is attributed to Lebanon's intelligence service. The US Congress will extend Section 702 surveillance authority for six years. GhostTeam-infected apps are booted from the Play Store. Jonathan Katz from the University of Maryland ponders "uncrackable" quantum encryption. Graham Cluley from the Smashing Security podcast drops by for a chat about the state of the industry. And is there ever a good reason to write down a password? 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 19 Jan 2018 20:36:51 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>518</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9b27d62a-def8-11ea-911f-dbaf7938e87f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>AllScripts works to remediate ransomware in medical apps. Group 123 hits ROK targets. Triton/Trisis zero-day. Dark Caracal espionage op. Section 702 renewed. GhostTeam ejected from Play Store. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear about ransomware afflicting a healthcare IT provider. Group 123 phishes in South Korean waters. Schneider Electric describes the zero-day Triton/Trisis exploited. The Dark Caracal spyware campaign is attributed to Lebanon's intelligence service. The US Congress will extend Section 702 surveillance authority for six years. GhostTeam-infected apps are booted from the Play Store. Jonathan Katz from the University of Maryland ponders "uncrackable" quantum encryption. Graham Cluley from the Smashing Security podcast drops by for a chat about the state of the industry. And is there ever a good reason to write down a password? 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about ransomware afflicting a healthcare IT provider. Group 123 phishes in South Korean waters. Schneider Electric describes the zero-day Triton/Trisis exploited. The Dark Caracal spyware campaign is attributed to Lebanon's intelligence service. The US Congress will extend Section 702 surveillance authority for six years. GhostTeam-infected apps are booted from the Play Store. Jonathan Katz from the University of Maryland ponders "uncrackable" quantum encryption. Graham Cluley from the Smashing Security podcast drops by for a chat about the state of the industry. And is there ever a good reason to write down a password? </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1558</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4567b70b4b7a54ee8b5a4f535658032d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2195913345.mp3?updated=1608754779" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Big healthcare data breach. False civil defense alerts. Davos will take up cyber next week (among other topics). Exobot on the block. Satori in your wallet? Ponzi scheme or pump-and-dump? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/517/notes</link>
      <description>In today's podcast we hear that Norway's Southern and Eastern Regional Health Authority has suffered a breach. False civil defense alerts are mistakes, not hacks, but they're worth some attention. Davos will take up international conflict and cybersecurity next week. Banking Trojan Exobot holds a going-out-of-business sale. Satori botnet rifles cryptocurrency wallets. Emily Wilson from Terbium Labs, looking at the upcoming Olympics and midterm elections. Guest is Nadav Avital from Imperva on web application vulnerabilities. And was Bitconnect's collapse a Ponzi scheme, a pump and dump, or something else? 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 18 Jan 2018 20:22:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>517</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9b40c428-def8-11ea-911f-975660a2641b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Big healthcare data breach. False civil defense alerts. Davos will take up cyber next week (among other topics). Exobot on the block. Satori in your wallet? Ponzi scheme or pump-and-dump? </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Norway's Southern and Eastern Regional Health Authority has suffered a breach. False civil defense alerts are mistakes, not hacks, but they're worth some attention. Davos will take up international conflict and cybersecurity next week. Banking Trojan Exobot holds a going-out-of-business sale. Satori botnet rifles cryptocurrency wallets. Emily Wilson from Terbium Labs, looking at the upcoming Olympics and midterm elections. Guest is Nadav Avital from Imperva on web application vulnerabilities. And was Bitconnect's collapse a Ponzi scheme, a pump and dump, or something else? 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Norway's Southern and Eastern Regional Health Authority has suffered a breach. False civil defense alerts are mistakes, not hacks, but they're worth some attention. Davos will take up international conflict and cybersecurity next week. Banking Trojan Exobot holds a going-out-of-business sale. Satori botnet rifles cryptocurrency wallets. Emily Wilson from Terbium Labs, looking at the upcoming Olympics and midterm elections. Guest is Nadav Avital from Imperva on web application vulnerabilities. And was Bitconnect's collapse a Ponzi scheme, a pump and dump, or something else? </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1097</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[473c6a9df5930bf992b1b4a42b2b2d94]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8211069167.mp3?updated=1689867926" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Section 702 update. Kaspersky reports on Skygofree—dangerous Android spyware. Recorded Future on DPRK spearphishing. Healthcare hacks. Bogus patches. VR game could expose users. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/516/notes</link>
      <description>In today's podcast, we hear that the US Senate is ready, after a successful cloture motion, to vote on Section 702 surveillance reauthorization. Bipartisan Congressional support for election security bill. Skygofree is an unusually capable variety of Android spyware. More evidence ties North Korea's Lazarus Group to a Bitcoin spearphishing campaign. German users lured by fake Spectre/Meltdown patch sites. Healthcare organizations hit with a variety of attacks. Zulfikar Ramzan, CTO at RSA, introduces himself as we welcome him to the show. Guest is Mark Orlando from Raytheon Cyber on the Korean Olympics phishing campaigns. Thinking of VR adult content? Think twice. No, better, think thrice. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 17 Jan 2018 20:08:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>516</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9b55990c-def8-11ea-911f-63884ddfbcc9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Section 702 update. Kaspersky reports on Skygofree—dangerous Android spyware. Recorded Future on DPRK spearphishing. Healthcare hacks. Bogus patches. VR game could expose users. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the US Senate is ready, after a successful cloture motion, to vote on Section 702 surveillance reauthorization. Bipartisan Congressional support for election security bill. Skygofree is an unusually capable variety of Android spyware. More evidence ties North Korea's Lazarus Group to a Bitcoin spearphishing campaign. German users lured by fake Spectre/Meltdown patch sites. Healthcare organizations hit with a variety of attacks. Zulfikar Ramzan, CTO at RSA, introduces himself as we welcome him to the show. Guest is Mark Orlando from Raytheon Cyber on the Korean Olympics phishing campaigns. Thinking of VR adult content? Think twice. No, better, think thrice. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the US Senate is ready, after a successful cloture motion, to vote on Section 702 surveillance reauthorization. Bipartisan Congressional support for election security bill. Skygofree is an unusually capable variety of Android spyware. More evidence ties North Korea's Lazarus Group to a Bitcoin spearphishing campaign. German users lured by fake Spectre/Meltdown patch sites. Healthcare organizations hit with a variety of attacks. Zulfikar Ramzan, CTO at RSA, introduces himself as we welcome him to the show. Guest is Mark Orlando from Raytheon Cyber on the Korean Olympics phishing campaigns. Thinking of VR adult content? Think twice. No, better, think thrice. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1067</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f6d97612a7ea18267ba8df590d98d88f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4219388274.mp3?updated=1689867252" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>New Mirai variant forming. Meltdown and Spectre remediation updates. Notes on Russian hacking. Charges in swatting death. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/515/notes</link>
      <description>In today's podcast, we hear that a new Mirai variant, Okiru, is forming botnets of ARC-based IoT devices. Meltdown and Spectre remediation continues. CIA is said to have confirmed that NotPetya was a GRU operation. Suspicions rise that the Shadow Brokers used security tools to scan for classified documents. US and Canadian officials raise alarms about election influence operations. Wichita swatter charged with involuntary manslaughter. Malicious Chrome extensions spotted. Robert M. Lee from Dragos on the security of petroleum ICS. Guest is Lance Cottrell from Ntrepid on the importance of net neutrality for security. And USB drives contain the darndest things. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Jan 2018 20:58:15 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>515</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9b67aebc-def8-11ea-911f-6338ea99252b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>New Mirai variant forming. Meltdown and Spectre remediation updates. Notes on Russian hacking. Charges in swatting death. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that a new Mirai variant, Okiru, is forming botnets of ARC-based IoT devices. Meltdown and Spectre remediation continues. CIA is said to have confirmed that NotPetya was a GRU operation. Suspicions rise that the Shadow Brokers used security tools to scan for classified documents. US and Canadian officials raise alarms about election influence operations. Wichita swatter charged with involuntary manslaughter. Malicious Chrome extensions spotted. Robert M. Lee from Dragos on the security of petroleum ICS. Guest is Lance Cottrell from Ntrepid on the importance of net neutrality for security. And USB drives contain the darndest things. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that a new Mirai variant, Okiru, is forming botnets of ARC-based IoT devices. Meltdown and Spectre remediation continues. CIA is said to have confirmed that NotPetya was a GRU operation. Suspicions rise that the Shadow Brokers used security tools to scan for classified documents. US and Canadian officials raise alarms about election influence operations. Wichita swatter charged with involuntary manslaughter. Malicious Chrome extensions spotted. Robert M. Lee from Dragos on the security of petroleum ICS. Guest is Lance Cottrell from Ntrepid on the importance of net neutrality for security. And USB drives contain the darndest things. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1265</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d459cd19510bb684b441086bd55222f4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6601292201.mp3?updated=1689867060" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shake Your MoneyTaker. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/18/notes</link>
      <description>A group of Russian-speaking hackers have stolen nearly $10 million from banks around the world. Group-IB, a company with expertise in computer forensics, information security and, specifically, Russian‑speaking criminal groups, have named these thieves MoneyTaker. Nicholas Palmer is the director of international business development at Group-IB, and he's joined by their head of threat intelligence, Dmitry Volkob to explain the MoneyTaker group's schemes.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 13 Jan 2018 12:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>18</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/641c2820-df0c-11ea-87e7-af4529dda118/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Shake Your MoneyTaker</itunes:subtitle>
      <itunes:summary>A group of Russian-speaking hackers have stolen nearly $10 million from banks around the world. Group-IB, a company with expertise in computer forensics, information security and, specifically, Russian‑speaking criminal groups, have named these thieves MoneyTaker. Nicholas Palmer is the director of international business development at Group-IB, and he's joined by their head of threat intelligence, Dmitry Volkob to explain the MoneyTaker group's schemes.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>A group of Russian-speaking hackers have stolen nearly $10 million from banks around the world. Group-IB, a company with expertise in computer forensics, information security and, specifically, Russian‑speaking criminal groups, have named these thieves MoneyTaker. Nicholas Palmer is the director of international business development at Group-IB, and he's joined by their head of threat intelligence, Dmitry Volkob to explain the MoneyTaker group's schemes.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1295</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7dd165a6446519c8d5ccb4b2ae90180a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4490399148.mp3?updated=1684873614" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Spectre and Meltdown patches may be messy, but not as performance-killing as feared. AMT exploit. Mobile ICS apps. Monero mining. Badness in the Play Store. Huawei ban? Droning while drunk. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/514/notes</link>
      <description>In today's podcast, we hear that Spectre and Meltdown have continued to receive patches, and they may not be as performance-killing as feared. F-Secure says if you leave your laptop alone it could be pwned in 30 seconds. Mobile ICS apps seem to be getting less, not more, secure. Google boots more bad stuff from the Play Store. Monero miners afflict unpatched Oracle WebLogic servers (so patch). The US Congress considers a Huawei ban. Johannes Ullrich from SANS and the Internet Stormcast podcast on IoT gifts. Guest is Phil Reitinger from the Global Cyber Alliance, an international, non-profit organization headquartered in New York City and London that is focused on eradicating systemic cybersecurity risks. And New Jersey is considering solving one of its biggest problems: droning under the influence. Sprung from cages on Highway 9 or not, don't try that on the turnpike, kids. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 12 Jan 2018 21:22:21 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>514</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9b77f268-def8-11ea-911f-978712891d47/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Spectre and Meltdown patches may be messy, but not as performance-killing as feared. AMT exploit. Mobile ICS apps. Monero mining. Badness in the Play Store. Huawei ban? Droning while drunk. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Spectre and Meltdown have continued to receive patches, and they may not be as performance-killing as feared. F-Secure says if you leave your laptop alone it could be pwned in 30 seconds. Mobile ICS apps seem to be getting less, not more, secure. Google boots more bad stuff from the Play Store. Monero miners afflict unpatched Oracle WebLogic servers (so patch). The US Congress considers a Huawei ban. Johannes Ullrich from SANS and the Internet Stormcast podcast on IoT gifts. Guest is Phil Reitinger from the Global Cyber Alliance, an international, non-profit organization headquartered in New York City and London that is focused on eradicating systemic cybersecurity risks. And New Jersey is considering solving one of its biggest problems: droning under the influence. Sprung from cages on Highway 9 or not, don't try that on the turnpike, kids. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Spectre and Meltdown have continued to receive patches, and they may not be as performance-killing as feared. F-Secure says if you leave your laptop alone it could be pwned in 30 seconds. Mobile ICS apps seem to be getting less, not more, secure. Google boots more bad stuff from the Play Store. Monero miners afflict unpatched Oracle WebLogic servers (so patch). The US Congress considers a Huawei ban. Johannes Ullrich from SANS and the Internet Stormcast podcast on IoT gifts. Guest is Phil Reitinger from the Global Cyber Alliance, an international, non-profit organization headquartered in New York City and London that is focused on eradicating systemic cybersecurity risks. And New Jersey is considering solving one of its biggest problems: droning under the influence. Sprung from cages on Highway 9 or not, don't try that on the turnpike, kids. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1553</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f61dfecc1f3c6cfb124e7319ebb671f1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7586734951.mp3?updated=1608754778" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Aadhaar updates. Fancy Bear doxes the Olympics. WhatsApp snooping vulnerability discussed. Spectre and Meltdown patching. US House reauthorizes Section 702. Bitcoin isn't Bitcoin Cash. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/513/notes</link>
      <description>In today's podcast we hear that the Government of India is working on Aadhaar security, suspending many officials' access. Fancy Bear doxes the IOC. WhatsApp snooping proof-of-concept revealed. Spectre and Meltdown patching continues. The US House voted to reauthorize Section 702 surveillance (the Senate is considering its own version). On the FBI's unwanted list: jerks and evil geniuses (and they're scowling in the direction of Cupertino). Rick Howard from Palo Alto Networks on AI and ML in cyber security. Guest is Shelley Westman from EY, with the results from their Global Information Security Survey. Conflating Bitcoin with Bitcoin cash could have been an e-commerce issue. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 11 Jan 2018 20:53:16 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>513</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9b91064a-def8-11ea-911f-3fcf45ea6dcb/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Aadhaar updates. Fancy Bear doxes the Olympics. WhatsApp snooping vulnerability discussed. Spectre and Meltdown patching. US House reauthorizes Section 702. Bitcoin isn't Bitcoin Cash. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that the Government of India is working on Aadhaar security, suspending many officials' access. Fancy Bear doxes the IOC. WhatsApp snooping proof-of-concept revealed. Spectre and Meltdown patching continues. The US House voted to reauthorize Section 702 surveillance (the Senate is considering its own version). On the FBI's unwanted list: jerks and evil geniuses (and they're scowling in the direction of Cupertino). Rick Howard from Palo Alto Networks on AI and ML in cyber security. Guest is Shelley Westman from EY, with the results from their Global Information Security Survey. Conflating Bitcoin with Bitcoin cash could have been an e-commerce issue. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that the Government of India is working on Aadhaar security, suspending many officials' access. Fancy Bear doxes the IOC. WhatsApp snooping proof-of-concept revealed. Spectre and Meltdown patching continues. The US House voted to reauthorize Section 702 surveillance (the Senate is considering its own version). On the FBI's unwanted list: jerks and evil geniuses (and they're scowling in the direction of Cupertino). Rick Howard from Palo Alto Networks on AI and ML in cyber security. Guest is Shelley Westman from EY, with the results from their Global Information Security Survey. Conflating Bitcoin with Bitcoin cash could have been an e-commerce issue. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1249</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7d430f1665e1e46d681122637ea92801]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3897453941.mp3?updated=1689866770" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Turla returns. Moscow interested in Mexican elections? FakeBank mobile Trojan hits Russian banks. Phishing the Olympics. Patch Tuesday. Bad flashlights, nice doggie. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/512/notes</link>
      <description>In today's podcast, we hear that Turla's back, with a depressingly nifty man-in-the-middle campaign. The US thinks it sees Russia trying to influence Mexico's national elections. Russian banks are hit with a new mobile Trojan. Iran continues its Internet crackdown, and conducts more domestic surveillance and hacking. Winter Olympics-themed cyberattacks rely on well-crafted social engineering. Patch Tuesday addressed Spectre, Meltdown, Flash, and an Office zero-day. Yossi Oren from BGU on vulnerabilities in mobile device replacement touchscreens. Stay away from flashlight apps. (And take a look at your dog-walker's app, too, while you're at it.) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 10 Jan 2018 21:49:56 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>512</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9ba3a408-def8-11ea-911f-bfb9a37f3888/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Turla returns. Moscow interested in Mexican elections? FakeBank mobile Trojan hits Russian banks. Phishing the Olympics. Patch Tuesday. Bad flashlights, nice doggie. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Turla's back, with a depressingly nifty man-in-the-middle campaign. The US thinks it sees Russia trying to influence Mexico's national elections. Russian banks are hit with a new mobile Trojan. Iran continues its Internet crackdown, and conducts more domestic surveillance and hacking. Winter Olympics-themed cyberattacks rely on well-crafted social engineering. Patch Tuesday addressed Spectre, Meltdown, Flash, and an Office zero-day. Yossi Oren from BGU on vulnerabilities in mobile device replacement touchscreens. Stay away from flashlight apps. (And take a look at your dog-walker's app, too, while you're at it.) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Turla's back, with a depressingly nifty man-in-the-middle campaign. The US thinks it sees Russia trying to influence Mexico's national elections. Russian banks are hit with a new mobile Trojan. Iran continues its Internet crackdown, and conducts more domestic surveillance and hacking. Winter Olympics-themed cyberattacks rely on well-crafted social engineering. Patch Tuesday addressed Spectre, Meltdown, Flash, and an Office zero-day. Yossi Oren from BGU on vulnerabilities in mobile device replacement touchscreens. Stay away from flashlight apps. (And take a look at your dog-walker's app, too, while you're at it.) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1029</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[285ed3d2e7ab217019515c1993f1f3e4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7518421544.mp3?updated=1689866715" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Spectre and Meltdown mitigations. Psiphon and Iran's unrest. Olympic phishing. Mobil pop-up redirection. Alt-coin speculation. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/511/notes</link>
      <description>In today's podcast, we hear about how Spectre and Meltdown mitigations are proceeding, with many successes (but some blue-screen-of-death failures, too). Psiphon looks like the souped-up VPN of choice for Iranian dissidents, as that country's Internet crackdown continues. Pop-up ads infest mobile devices as an old tactic finds new scope for its misapplication. Olympic phishing targets South Korean companies. China moves to stop illicit cryptocurrency miners. Jonathan Katz from UMD on bitcoin mining power use. Guest is Udi Yavo from Ensilo on Process Doppelganging. Is there an alt-coin bubble? Sure looks like it. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Jan 2018 21:01:15 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>511</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9bb88bb6-def8-11ea-911f-3b20f4df8a05/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Spectre and Meltdown mitigations. Psiphon and Iran's unrest. Olympic phishing. Mobil pop-up redirection. Alt-coin speculation. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how Spectre and Meltdown mitigations are proceeding, with many successes (but some blue-screen-of-death failures, too). Psiphon looks like the souped-up VPN of choice for Iranian dissidents, as that country's Internet crackdown continues. Pop-up ads infest mobile devices as an old tactic finds new scope for its misapplication. Olympic phishing targets South Korean companies. China moves to stop illicit cryptocurrency miners. Jonathan Katz from UMD on bitcoin mining power use. Guest is Udi Yavo from Ensilo on Process Doppelganging. Is there an alt-coin bubble? Sure looks like it. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how Spectre and Meltdown mitigations are proceeding, with many successes (but some blue-screen-of-death failures, too). Psiphon looks like the souped-up VPN of choice for Iranian dissidents, as that country's Internet crackdown continues. Pop-up ads infest mobile devices as an old tactic finds new scope for its misapplication. Olympic phishing targets South Korean companies. China moves to stop illicit cryptocurrency miners. Jonathan Katz from UMD on bitcoin mining power use. Guest is Udi Yavo from Ensilo on Process Doppelganging. Is there an alt-coin bubble? Sure looks like it. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1111</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[afc3e97a14cdf2964963b7f1b1fc532a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4051199976.mp3?updated=1689865920" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Korean-language phishing targets interest in the Winter Olympics. Unrest continues in Iran. Meltdown and Spectre updates. Aadhaar security. Admiral Rogers will retire this spring from NSA. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/510/notes</link>
      <description>In today's podcast we hear that someone is phishing for hockey enthusiasts during the run-up to the Winter Olympics. Continued unrest in Iran, with more arrests. More on Meltdown and Spectre, as most experts agree you should apply the mitigations being offered. Intel receives much hostile scrutiny over the chip bugs, but other vendor's processes are affected, too. India says Aadhaar is secure, but many aren't so sure. Admiral Rogers will retire as NSA Director this spring. Ben Yelin from UMD CHHS on legislation to enable hacking back, ACDC, the Active Cyber Defense Certainty act. Marcus Hutchins' attorneys want his confession to involvement with Kronos thrown out. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 08 Jan 2018 20:59:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>510</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9be2a87e-def8-11ea-911f-13cde0409f47/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Korean-language phishing targets interest in the Winter Olympics. Unrest continues in Iran. Meltdown and Spectre updates. Aadhaar security. Admiral Rogers will retire this spring from NSA. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that someone is phishing for hockey enthusiasts during the run-up to the Winter Olympics. Continued unrest in Iran, with more arrests. More on Meltdown and Spectre, as most experts agree you should apply the mitigations being offered. Intel receives much hostile scrutiny over the chip bugs, but other vendor's processes are affected, too. India says Aadhaar is secure, but many aren't so sure. Admiral Rogers will retire as NSA Director this spring. Ben Yelin from UMD CHHS on legislation to enable hacking back, ACDC, the Active Cyber Defense Certainty act. Marcus Hutchins' attorneys want his confession to involvement with Kronos thrown out. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that someone is phishing for hockey enthusiasts during the run-up to the Winter Olympics. Continued unrest in Iran, with more arrests. More on Meltdown and Spectre, as most experts agree you should apply the mitigations being offered. Intel receives much hostile scrutiny over the chip bugs, but other vendor's processes are affected, too. India says Aadhaar is secure, but many aren't so sure. Admiral Rogers will retire as NSA Director this spring. Ben Yelin from UMD CHHS on legislation to enable hacking back, ACDC, the Active Cyber Defense Certainty act. Marcus Hutchins' attorneys want his confession to involvement with Kronos thrown out. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1014</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5d1c24ecc2895121dc5420d9b0255371]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2716933092.mp3?updated=1689859313" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>TRISIS Malware: Fail-safe fail. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/17/notes</link>
      <description>Robert M. Lee. is CEO of Dragos Security, a company that specializes in the protection of industrial control systems. He’s describing his team's research on TRISIS, tailored ICS malware infecting safety instrumented systems (SIS), so far found only in the middle east. It's only the fifth known incident of malware targeting ICS systems. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 06 Jan 2018 12:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>17</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/61c5962e-df0c-11ea-87e7-27c0fee38602/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>TRISIS Malware: Fail-safe fail</itunes:subtitle>
      <itunes:summary>Robert M. Lee. is CEO of Dragos Security, a company that specializes in the protection of industrial control systems. He’s describing his team's research on TRISIS, tailored ICS malware infecting safety instrumented systems (SIS), so far found only in the middle east. It's only the fifth known incident of malware targeting ICS systems. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Robert M. Lee. is CEO of Dragos Security, a company that specializes in the protection of industrial control systems. He’s describing his team's research on TRISIS, tailored ICS malware infecting safety instrumented systems (SIS), so far found only in the middle east. It's only the fifth known incident of malware targeting ICS systems. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2319</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e2ef8239cc39e740f2a52621978ffefd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2737477659.mp3?updated=1684873606" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Meltdown and Spectre, risks and mitigations. Aadhaar compromised. Blockchain bubbles. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/509/notes</link>
      <description>In today's podcast we hear how Meltdown and Spectre have put the fear of hardware flaws into enterprises everywhere. No family of systems can be safely assumed to be immune. Most are positively identified as vulnerable. Proofs-of-concept show that remote attacks exploiting chips' speculative execution features are feasible. India's Aadhaar national identification database is compromised. Justin Harvey from Accenture with his outlook on 2018. Guest is Dinah Davis from Code.likeagirl.io and Arctic Wolf Networks. We’re discussing trade shows and conferences, and the importance of having diverse panels. Cryptocurrency speculative mania continues. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 05 Jan 2018 21:38:11 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>509</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9bf578b4-def8-11ea-911f-db25c0426abd/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Meltdown and Spectre, risks and mitigations. Aadhaar compromised. Blockchain bubbles. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear how Meltdown and Spectre have put the fear of hardware flaws into enterprises everywhere. No family of systems can be safely assumed to be immune. Most are positively identified as vulnerable. Proofs-of-concept show that remote attacks exploiting chips' speculative execution features are feasible. India's Aadhaar national identification database is compromised. Justin Harvey from Accenture with his outlook on 2018. Guest is Dinah Davis from Code.likeagirl.io and Arctic Wolf Networks. We’re discussing trade shows and conferences, and the importance of having diverse panels. Cryptocurrency speculative mania continues. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear how Meltdown and Spectre have put the fear of hardware flaws into enterprises everywhere. No family of systems can be safely assumed to be immune. Most are positively identified as vulnerable. Proofs-of-concept show that remote attacks exploiting chips' speculative execution features are feasible. India's Aadhaar national identification database is compromised. Justin Harvey from Accenture with his outlook on 2018. Guest is Dinah Davis from Code.likeagirl.io and Arctic Wolf Networks. We’re discussing trade shows and conferences, and the importance of having diverse panels. Cryptocurrency speculative mania continues. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1370</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7ad8b4b6ced659702c029ed40bb2f219]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9076277065.mp3?updated=1608754728" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Meltdown and Spectre arose from engineering for speed—most chips are affected. Bogus security apps kicked out of Google Play. Iran's Internet crackdown. Indications of a guilty plea in NSA leak case. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/508/notes</link>
      <description>In today's podcast we follow the story of Meltdown and Spectre, which pose kernel-level security issues: speed was inadvertently purchased at the price of insecurity. Spectre affects most chips, not just those from Intel. Mitigations are on the way. Bogus security apps booted from Google Play. Be on the lookout for phony Android Uber apps. Iran's Internet crackdown continues. Michael Daly from Raytheon and David DuFour from Webroot share their views on Meltdown and Spectre. And former NSA contractor Hal Martin may plea to taking one classified document home with him. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 04 Jan 2018 20:09:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>508</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9c0e521c-def8-11ea-911f-1360a0dec725/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Meltdown and Spectre arose from engineering for speed—most chips are affected. Bogus security apps kicked out of Google Play. Iran's Internet crackdown. Indications of a guilty plea in NSA leak case. </itunes:subtitle>
      <itunes:summary>In today's podcast we follow the story of Meltdown and Spectre, which pose kernel-level security issues: speed was inadvertently purchased at the price of insecurity. Spectre affects most chips, not just those from Intel. Mitigations are on the way. Bogus security apps booted from Google Play. Be on the lookout for phony Android Uber apps. Iran's Internet crackdown continues. Michael Daly from Raytheon and David DuFour from Webroot share their views on Meltdown and Spectre. And former NSA contractor Hal Martin may plea to taking one classified document home with him. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we follow the story of Meltdown and Spectre, which pose kernel-level security issues: speed was inadvertently purchased at the price of insecurity. Spectre affects most chips, not just those from Intel. Mitigations are on the way. Bogus security apps booted from Google Play. Be on the lookout for phony Android Uber apps. Iran's Internet crackdown continues. Michael Daly from Raytheon and David DuFour from Webroot share their views on Meltdown and Spectre. And former NSA contractor Hal Martin may plea to taking one classified document home with him. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1093</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b213251b8a0e3b119febf7415f604a1e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2086671378.mp3?updated=1689859285" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Iranian dissent takes to Tor. Iran cracks down on Internet services (and Infy gets busy). Kernel memory issue in Intel processors. macOS bug published. "Trackmageddon." Curating YouTube. Condolences to a SWATTING victim's family. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/507/notes</link>
      <description>In today's podcast we hear that Iran's crackdown on Internet channels of dissent continues. Intel processors are determined to have a deep security flaw: cloud users are likely to be affected. A macOS local privilege escalation vulnerability is published. The "Trackmageddon" location service vulnerability seems to originate in a buggy API. The suicide forest video appears to have passed through YouTube's human curators. The man arrested in the Wichita police shooting may have been a serial SWATTER. Joe Carrigan from JHU on holiday IoT devices. Guest is Thomas Jones from Bay Dynamics on updated NIST rules for DOD contractors. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 03 Jan 2018 20:07:08 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>507</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9c2935be-def8-11ea-911f-e3ce65cfb921/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Iranian dissent takes to Tor. Iran cracks down on Internet services (and Infy gets busy). Kernel memory issue in Intel processors. macOS bug published. "Trackmageddon." Curating YouTube. Condolences to a SWATTING victim's family. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Iran's crackdown on Internet channels of dissent continues. Intel processors are determined to have a deep security flaw: cloud users are likely to be affected. A macOS local privilege escalation vulnerability is published. The "Trackmageddon" location service vulnerability seems to originate in a buggy API. The suicide forest video appears to have passed through YouTube's human curators. The man arrested in the Wichita police shooting may have been a serial SWATTER. Joe Carrigan from JHU on holiday IoT devices. Guest is Thomas Jones from Bay Dynamics on updated NIST rules for DOD contractors. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Iran's crackdown on Internet channels of dissent continues. Intel processors are determined to have a deep security flaw: cloud users are likely to be affected. A macOS local privilege escalation vulnerability is published. The "Trackmageddon" location service vulnerability seems to originate in a buggy API. The suicide forest video appears to have passed through YouTube's human curators. The man arrested in the Wichita police shooting may have been a serial SWATTER. Joe Carrigan from JHU on holiday IoT devices. Guest is Thomas Jones from Bay Dynamics on updated NIST rules for DOD contractors. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1174</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[05a21c5f628b6b926faaa058b79d5363]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1841525071.mp3?updated=1689859255" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ISIS claims responsibility for bombing in Russia. Iranian unrest involves Telegram, Instagram. Proposed FERC reporting standards. YouTube gone bad, and an arrest in a horrific swatting prank. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/506/notes</link>
      <description>In today's podcast we hear that ISIS has claimed responsibility for the December 27th St. Petersburg shopping center bombing. UK authorities seek to think ahead about cyber terror. US standards bodies propose more stringent mandatory reporting of cyber incidents at electrical utilities. Unrest in Iran prompts a government crackdown on the Internet. We meet our newest academic &amp; research partner, Dr. Yossi Oren from Ben Gurion University. A YouTube celebrity learns something of the limits of the funny, and a Los Angeles man is arrested in a horrifying SWATTING attack that killed an utterly uninvolved bystander. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Jan 2018 20:17:08 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>3</itunes:season>
      <itunes:episode>506</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9c436f60-def8-11ea-911f-074627b0a321/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>ISIS claims responsibility for bombing in Russia. Iranian unrest involves Telegram, Instagram. Proposed FERC reporting standards. YouTube gone bad, and an arrest in a horrific swatting prank. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that ISIS has claimed responsibility for the December 27th St. Petersburg shopping center bombing. UK authorities seek to think ahead about cyber terror. US standards bodies propose more stringent mandatory reporting of cyber incidents at electrical utilities. Unrest in Iran prompts a government crackdown on the Internet. We meet our newest academic &amp; research partner, Dr. Yossi Oren from Ben Gurion University. A YouTube celebrity learns something of the limits of the funny, and a Los Angeles man is arrested in a horrifying SWATTING attack that killed an utterly uninvolved bystander. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that ISIS has claimed responsibility for the December 27th St. Petersburg shopping center bombing. UK authorities seek to think ahead about cyber terror. US standards bodies propose more stringent mandatory reporting of cyber incidents at electrical utilities. Unrest in Iran prompts a government crackdown on the Internet. We meet our newest academic &amp; research partner, Dr. Yossi Oren from Ben Gurion University. A YouTube celebrity learns something of the limits of the funny, and a Los Angeles man is arrested in a horrifying SWATTING attack that killed an utterly uninvolved bystander. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>897</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[47799835ebb01310018421917accac23]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8276234980.mp3?updated=1689859234" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hunting the Sowbug. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/16/notes</link>
      <description>Alan Neville is a senior threat intelligence analyst at Symantec located in Dublin. He is responsible for leading and documenting investigations into high priority attacks.

He recently published research on the Sowbug cyber espionage group targeting South American and Southeast Asian governments.

 https://www.symantec.com/connect/blogs/sowbug-cyber-espionage-group-targets-south-american-and-southeast-asian-governments
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Dec 2017 12:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>16</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5f39e50e-df0c-11ea-9317-87f85a74a10b/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hunting the Sowbug</itunes:subtitle>
      <itunes:summary>Alan Neville is a senior threat intelligence analyst at Symantec located in Dublin. He is responsible for leading and documenting investigations into high priority attacks.

He recently published research on the Sowbug cyber espionage group targeting South American and Southeast Asian governments.

 https://www.symantec.com/connect/blogs/sowbug-cyber-espionage-group-targets-south-american-and-southeast-asian-governments
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Alan Neville is a senior threat intelligence analyst at Symantec located in Dublin. He is responsible for leading and documenting investigations into high priority attacks.</p><p><br></p><p>He recently published research on the Sowbug cyber espionage group targeting South American and Southeast Asian governments.</p><p><br></p><p><a href="https://www.symantec.com/connect/blogs/sowbug-cyber-espionage-group-targets-south-american-and-southeast-asian-governments%20"> https://www.symantec.com/connect/blogs/sowbug-cyber-espionage-group-targets-south-american-and-southeast-asian-governments</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1197</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[47630f9b5864eb9eb4b9b286f0bfcf46]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7888962806.mp3?updated=1684873587" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The German Cybersecurity Market with Gerald Hahn</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/505/notes</link>
      <description>Gerald Hahn is CEO of Softshell ag, a German cybersecurity company. He shares his insights into the market for cybersecurity products in the German market, and how US companies can best prepare themselves to do business, there. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 29 Dec 2017 17:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>505</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9c61ab7e-def8-11ea-911f-a744ac2d3ff5/image/cyberwire-daily-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The German Cybersecurity Market with Gerald Hahn</itunes:subtitle>
      <itunes:summary>Gerald Hahn is CEO of Softshell ag, a German cybersecurity company. He shares his insights into the market for cybersecurity products in the German market, and how US companies can best prepare themselves to do business, there. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Gerald Hahn is CEO of Softshell ag, a German cybersecurity company. He shares his insights into the market for cybersecurity products in the German market, and how US companies can best prepare themselves to do business, there. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>850</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4a0c5b1f98227a750889b1d568947d0c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4435812137.mp3?updated=1689818467" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CISO's changing role with Andrew Wild</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/504/notes</link>
      <description>Andrew Wild is CISO at QTS Data Centers. He shares his insights into the changing role of the Chief Information Security Officer, as businesses shift their focus toward risk.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 28 Dec 2017 17:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>504</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9c74c402-def8-11ea-911f-2b8944ad37e6/image/cyberwire-daily-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The CISO's changing role with Andrew Wild</itunes:subtitle>
      <itunes:summary>Andrew Wild is CISO at QTS Data Centers. He shares his insights into the changing role of the Chief Information Security Officer, as businesses shift their focus toward risk.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Andrew Wild is CISO at QTS Data Centers. He shares his insights into the changing role of the Chief Information Security Officer, as businesses shift their focus toward risk.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>985</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b5d8b01d108fa670d4f2765e44f05f26]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5349969876.mp3?updated=1689818322" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>"Hacked Again" author Scott Schober</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/503/notes</link>
      <description>Cybersecurity expert and author Scott Schober shares his personal story of being hacked, and how it set him on a mission to help prevent it from happening to others.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 27 Dec 2017 17:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>503</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9c899382-def8-11ea-911f-3331c7c8c4e8/image/cyberwire-daily-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>"Hacked Again" author Scott Schober</itunes:subtitle>
      <itunes:summary>Cybersecurity expert and author Scott Schober shares his personal story of being hacked, and how it set him on a mission to help prevent it from happening to others.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cybersecurity expert and author Scott Schober shares his personal story of being hacked, and how it set him on a mission to help prevent it from happening to others.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1185</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d8597fbaaec69c232f09604998d3da48]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3189063271.mp3?updated=1689818278" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Active defense and “hacking back" with Johnathan Braverman from Cymmetria</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/502/notes</link>
      <description>Jonathan is Cymmetria's General Counsel. A former trial attorney, Mr. Braverman is an expert in cyber-security law, policy and regulation. He has written policy papers on export controls over cyber technology, active defense and "hacking back."
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Dec 2017 17:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>502</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9caa29d0-def8-11ea-911f-fbe263c80e58/image/cyberwire-daily-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Active defense and “hacking back" with Johnathan Braverman from Cymmetria</itunes:subtitle>
      <itunes:summary>Jonathan is Cymmetria's General Counsel. A former trial attorney, Mr. Braverman is an expert in cyber-security law, policy and regulation. He has written policy papers on export controls over cyber technology, active defense and "hacking back."
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Jonathan is Cymmetria's General Counsel. A former trial attorney, Mr. Braverman is an expert in cyber-security law, policy and regulation. He has written policy papers on export controls over cyber technology, active defense and "hacking back."</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1003</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[50f0d52f44cd17195ec151c95cf30f34]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6337368697.mp3?updated=1689818242" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Keyboys back in town. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/15/notes</link>
      <description>In this edition of the CyberWire Research Saturday, we'll take a look at a more recent intrusion PwC has uncovered, named KeyBoy and highly likely a China-based threat actor. It uses compromised Word documents to gain access.

Bart Parys is a lead researcher in PwC's cyber threat intelligence team, responsible for tracking cyber threat actors, their latest toolsets and methodologies. 


 https://www.pwc.co.uk/issues/cyber-security-data-privacy/research/the-keyboys-are-back-in-town.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Dec 2017 12:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>15</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5e1d2442-df0c-11ea-9317-e341c66e1b41/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Keyboys back in town</itunes:subtitle>
      <itunes:summary>In this edition of the CyberWire Research Saturday, we'll take a look at a more recent intrusion PwC has uncovered, named KeyBoy and highly likely a China-based threat actor. It uses compromised Word documents to gain access.

Bart Parys is a lead researcher in PwC's cyber threat intelligence team, responsible for tracking cyber threat actors, their latest toolsets and methodologies. 


 https://www.pwc.co.uk/issues/cyber-security-data-privacy/research/the-keyboys-are-back-in-town.html
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this edition of the CyberWire Research Saturday, we'll take a look at a more recent intrusion PwC has uncovered, named KeyBoy and highly likely a China-based threat actor. It uses compromised Word documents to gain access.</p><p><br></p><p>Bart Parys is a lead researcher in PwC's cyber threat intelligence team, responsible for tracking cyber threat actors, their latest toolsets and methodologies. </p><p><br></p><p><br></p><p><a href="https://www.pwc.co.uk/issues/cyber-security-data-privacy/research/the-keyboys-are-back-in-town.html"> https://www.pwc.co.uk/issues/cyber-security-data-privacy/research/the-keyboys-are-back-in-town.html</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1265</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7f067c6bc653a9518354357d8c542ab6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6290043870.mp3?updated=1684873571" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Updates on Triton ICS malware attack. DPRK and WannaCry. Cryptocurrency crime and an alt-coin market correction. Fancy Bear sightings. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/501/notes</link>
      <description>In today's podcast we hear some updates on the Triton ICS malware campaign. North Korea amplifies its denials of responsibility for WannaCry. Cryptocurrency markets undergo a strong correction. "Blockchain" remains a word to conjure with. Citing a potential risk to national security, Lithuania's government bans Kaspersky software. ESET thinks Fancy Bear is growing more cunning and evasive. Chris Poulin from BAH on the transition to self driving cars, and the problem with selling fear and uncertainty. Guest is Kim DeCarlis from Gigamon on marketing cyber security. And how does Siri handle various linguistic challenges? 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 22 Dec 2017 19:58:27 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>501</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9cc42100-def8-11ea-911f-cb72349c7ace/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Updates on Triton ICS malware attack. DPRK and WannaCry. Cryptocurrency crime and an alt-coin market correction. Fancy Bear sightings. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear some updates on the Triton ICS malware campaign. North Korea amplifies its denials of responsibility for WannaCry. Cryptocurrency markets undergo a strong correction. "Blockchain" remains a word to conjure with. Citing a potential risk to national security, Lithuania's government bans Kaspersky software. ESET thinks Fancy Bear is growing more cunning and evasive. Chris Poulin from BAH on the transition to self driving cars, and the problem with selling fear and uncertainty. Guest is Kim DeCarlis from Gigamon on marketing cyber security. And how does Siri handle various linguistic challenges? 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear some updates on the Triton ICS malware campaign. North Korea amplifies its denials of responsibility for WannaCry. Cryptocurrency markets undergo a strong correction. "Blockchain" remains a word to conjure with. Citing a potential risk to national security, Lithuania's government bans Kaspersky software. ESET thinks Fancy Bear is growing more cunning and evasive. Chris Poulin from BAH on the transition to self driving cars, and the problem with selling fear and uncertainty. Guest is Kim DeCarlis from Gigamon on marketing cyber security. And how does Siri handle various linguistic challenges? </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1430</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[874afcebf72f347f61624f059ce8de06]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1164757308.mp3?updated=1608754741" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More data found exposed in an AWS S3 bucket. EtherDelta's DNS impersonation issue. DPRK says it doesn't hack. FISA Section 702 nears sunset. Wassenaar updated. Kaspersky says its due process rights have been violated. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/500/notes</link>
      <description>In today's podcast, we suggest a new year's resolution all organizations should make: resolve to configure your cloud services for privacy and security. Another cryptocurrency exchange gets hacked, this one by DNS hijacking. North Korea finally says it had nothing to do with WannaCry, but few are convinced. The Lazarus Group continues to be a prime suspect in cryptocurrency theft. Section 702 nears sunset. Wassenaar seems to have become friendlier to researchers.  David DuFour from Webroot on quantum computing and AI. Guest is Joseph Carson from Thycotic on stolen passwords on the black market. And Kaspersky Lab wants redress in court. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 21 Dec 2017 20:24:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>500</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9cd80b16-def8-11ea-911f-73b401014193/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>More data found exposed in an AWS S3 bucket. EtherDelta's DNS impersonation issue. DPRK says it doesn't hack. FISA Section 702 nears sunset. Wassenaar updated. Kaspersky says its due process rights have been violated. </itunes:subtitle>
      <itunes:summary>In today's podcast, we suggest a new year's resolution all organizations should make: resolve to configure your cloud services for privacy and security. Another cryptocurrency exchange gets hacked, this one by DNS hijacking. North Korea finally says it had nothing to do with WannaCry, but few are convinced. The Lazarus Group continues to be a prime suspect in cryptocurrency theft. Section 702 nears sunset. Wassenaar seems to have become friendlier to researchers.  David DuFour from Webroot on quantum computing and AI. Guest is Joseph Carson from Thycotic on stolen passwords on the black market. And Kaspersky Lab wants redress in court. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we suggest a new year's resolution all organizations should make: resolve to configure your cloud services for privacy and security. Another cryptocurrency exchange gets hacked, this one by DNS hijacking. North Korea finally says it had nothing to do with WannaCry, but few are convinced. The Lazarus Group continues to be a prime suspect in cryptocurrency theft. Section 702 nears sunset. Wassenaar seems to have become friendlier to researchers.  David DuFour from Webroot on quantum computing and AI. Guest is Joseph Carson from Thycotic on stolen passwords on the black market. And Kaspersky Lab wants redress in court. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1173</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[70475edad7b23c969ffe8e75cae2ad19]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1450073729.mp3?updated=1689818182" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pyongyang's snarling through cyberspace, and what others are doing about it. Coppersmith espionage campaign in the Middle East. GDPR approaches. Giving your kid a smartphone? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/499/notes</link>
      <description>In today's podcast, we talk about what the Five Eyes see. Implications of North Korean responsibility for WannaCry. Defense and deterrence go with naming and shaming. The Lazarus Group looks to cryptocurrency theft to redress North Korean financial shortfalls. Copperfield cyber espionage campaign in the Middle East. GDPR approaches, and organizations look to get their data houses in order (and buy insurance). Justin Harvey from Accenture on choosing threat intelligence. Guest is Stan Engelbrecht from D3 Security on the vulnerabilities in public transportation. And what to do if your child gets a phone from Santa. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 20 Dec 2017 20:04:31 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>499</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9cf2d9aa-def8-11ea-911f-abde8105aa01/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Pyongyang's snarling through cyberspace, and what others are doing about it. Coppersmith espionage campaign in the Middle East. GDPR approaches. Giving your kid a smartphone? </itunes:subtitle>
      <itunes:summary>In today's podcast, we talk about what the Five Eyes see. Implications of North Korean responsibility for WannaCry. Defense and deterrence go with naming and shaming. The Lazarus Group looks to cryptocurrency theft to redress North Korean financial shortfalls. Copperfield cyber espionage campaign in the Middle East. GDPR approaches, and organizations look to get their data houses in order (and buy insurance). Justin Harvey from Accenture on choosing threat intelligence. Guest is Stan Engelbrecht from D3 Security on the vulnerabilities in public transportation. And what to do if your child gets a phone from Santa. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we talk about what the Five Eyes see. Implications of North Korean responsibility for WannaCry. Defense and deterrence go with naming and shaming. The Lazarus Group looks to cryptocurrency theft to redress North Korean financial shortfalls. Copperfield cyber espionage campaign in the Middle East. GDPR approaches, and organizations look to get their data houses in order (and buy insurance). Justin Harvey from Accenture on choosing threat intelligence. Guest is Stan Engelbrecht from D3 Security on the vulnerabilities in public transportation. And what to do if your child gets a phone from Santa. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1153</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[03f72448fe8779d54a457a75b499522f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6093358599.mp3?updated=1689818172" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>North Korea officially blamed for WannaCry. US National Security Strategy and cyber. Hex Men are up to no good. Cryptocurrency crimes. Cyberespionage. Misconfigured printers. Bad passwords. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/498/notes</link>
      <description>In today's podcast, we hear that the Five Eyes look at WannaCry and officially see Pyongyang. New US National Security Strategy emphasizes economic power and cybersecurity (and names the adversaries). Hex Men are no super heroes. More Bitcoin theft bankrupts an alt-currency exchange. Android Monero miner can basically melt your phone, it's working so hard. Users leave Lexmark printers open to the Internet. AnubisSpy peeks at Arabic-speaking Android users. Joe Carrigan from JHU on holiday IoT devices. Guest is Chris Webber from SafeBreach, reviewing the third edition of their Hacker’s Playbook. And guess the two worst passwords of 2017. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Dec 2017 20:23:07 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>498</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9d10bde4-def8-11ea-911f-03b7f5f91595/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>North Korea officially blamed for WannaCry. US National Security Strategy and cyber. Hex Men are up to no good. Cryptocurrency crimes. Cyberespionage. Misconfigured printers. Bad passwords. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the Five Eyes look at WannaCry and officially see Pyongyang. New US National Security Strategy emphasizes economic power and cybersecurity (and names the adversaries). Hex Men are no super heroes. More Bitcoin theft bankrupts an alt-currency exchange. Android Monero miner can basically melt your phone, it's working so hard. Users leave Lexmark printers open to the Internet. AnubisSpy peeks at Arabic-speaking Android users. Joe Carrigan from JHU on holiday IoT devices. Guest is Chris Webber from SafeBreach, reviewing the third edition of their Hacker’s Playbook. And guess the two worst passwords of 2017. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the Five Eyes look at WannaCry and officially see Pyongyang. New US National Security Strategy emphasizes economic power and cybersecurity (and names the adversaries). Hex Men are no super heroes. More Bitcoin theft bankrupts an alt-currency exchange. Android Monero miner can basically melt your phone, it's working so hard. Users leave Lexmark printers open to the Internet. AnubisSpy peeks at Arabic-speaking Android users. Joe Carrigan from JHU on holiday IoT devices. Guest is Chris Webber from SafeBreach, reviewing the third edition of their Hacker’s Playbook. And guess the two worst passwords of 2017. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1192</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dacd5858a0e62661f6fb40d79db8d54a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2071452509.mp3?updated=1689818160" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Zealot and Monero mining. Bitfinex DDoS. Triton/Trisis shows risks of committing safety and control to the same systems. Bitcoin crime. M&amp;A news. Hair of the dog. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/497/notes</link>
      <description>In today's podcast, we hear how the Zealot campaign uses ShadowBrokers' exploits to install a Monero miner on victim systems. Bitfinex suffers another DDoS attack as Bitcoin valuations remain high. Triton attack on industrial safety systems shows the risk of mixing control with safety. Exposed database of California voters investigated. Thales will buy Gemalto. Johannes Ullrich from SANS and the Internet Storm Center podcast, on scammers profiteering from natural disasters. And suffering from social media hangover? Try a little hair of the dog that bit you (say social media vendors). 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 18 Dec 2017 20:49:09 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>497</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9d36c606-def8-11ea-911f-e71e99dec8fd/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Zealot and Monero mining. Bitfinex DDoS. Triton/Trisis shows risks of committing safety and control to the same systems. Bitcoin crime. M&amp;A news. Hair of the dog. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear how the Zealot campaign uses ShadowBrokers' exploits to install a Monero miner on victim systems. Bitfinex suffers another DDoS attack as Bitcoin valuations remain high. Triton attack on industrial safety systems shows the risk of mixing control with safety. Exposed database of California voters investigated. Thales will buy Gemalto. Johannes Ullrich from SANS and the Internet Storm Center podcast, on scammers profiteering from natural disasters. And suffering from social media hangover? Try a little hair of the dog that bit you (say social media vendors). 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear how the Zealot campaign uses ShadowBrokers' exploits to install a Monero miner on victim systems. Bitfinex suffers another DDoS attack as Bitcoin valuations remain high. Triton attack on industrial safety systems shows the risk of mixing control with safety. Exposed database of California voters investigated. Thales will buy Gemalto. Johannes Ullrich from SANS and the Internet Storm Center podcast, on scammers profiteering from natural disasters. And suffering from social media hangover? Try a little hair of the dog that bit you (say social media vendors). </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>886</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f20b01f365855b0e47242ab42fa59d42]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9858860717.mp3?updated=1689818146" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The unique culture of the Middle Eastern and North African underground. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/14/notes</link>
      <description>Online underground markets thrive across the globe, with the Middle East and North Africa being no exception. Researchers at Trend Micro recently too a look inside these digital souks, and while much of what they discovered matches similar online marketplaces, there are unique cultural elements that set these regional trading posts apart.
Jon Clay is a cyber security expert from Trend Micro, and he takes us through their research paper,  "Digital Souks: A Glimpse into the Middle East and North African Underground."
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Dec 2017 12:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>14</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5b12b546-df0c-11ea-9317-d716abb9b75c/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The unique culture of the Middle Eastern and North African underground</itunes:subtitle>
      <itunes:summary>Online underground markets thrive across the globe, with the Middle East and North Africa being no exception. Researchers at Trend Micro recently too a look inside these digital souks, and while much of what they discovered matches similar online marketplaces, there are unique cultural elements that set these regional trading posts apart.
Jon Clay is a cyber security expert from Trend Micro, and he takes us through their research paper,  "Digital Souks: A Glimpse into the Middle East and North African Underground."
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Online underground markets thrive across the globe, with the Middle East and North Africa being no exception. Researchers at Trend Micro recently too a look inside these digital souks, and while much of what they discovered matches similar online marketplaces, there are unique cultural elements that set these regional trading posts apart.</p><p>Jon Clay is a cyber security expert from Trend Micro, and he takes us through their research paper, <a href="https://documents.trendmicro.com/assets/white_papers/wp-middle-eastern-north-african-underground.pdf"> "Digital Souks: A Glimpse into the Middle East and North African Underground."</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1496</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b2f5cc4d9e6b5f4f677cebbe4cf84f41]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7746106867.mp3?updated=1684873557" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Internet shut down in Ethiopia. TRITON ICS malware updates. Security products patched. Cryptocurrency capers. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/496/notes</link>
      <description>In today's podcast, we hear that Ethiopia's government has shut down the country's Internet during a period of unrest. TRITON ICS malware update. The FCC moves away from net neutrality. UK warnings about cable vulnerabilities. When a keylogger isn’t a keylogger. Security companies patch some products. Pyongyang likes Bitcoin. More on the NiceHash Bitcoin caper. Emily Wilson from Terbium Labs on breach fatigue. Colleen Huber from MediaPro on their 2017 State of Privacy and Security Awareness Report.  And, stick 'em up: your Ether or your life. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 15 Dec 2017 20:56:06 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>496</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9d4b8938-def8-11ea-911f-73ce05cd4d15/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Internet shut down in Ethiopia. TRITON ICS malware updates. Security products patched. Cryptocurrency capers. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Ethiopia's government has shut down the country's Internet during a period of unrest. TRITON ICS malware update. The FCC moves away from net neutrality. UK warnings about cable vulnerabilities. When a keylogger isn’t a keylogger. Security companies patch some products. Pyongyang likes Bitcoin. More on the NiceHash Bitcoin caper. Emily Wilson from Terbium Labs on breach fatigue. Colleen Huber from MediaPro on their 2017 State of Privacy and Security Awareness Report.  And, stick 'em up: your Ether or your life. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Ethiopia's government has shut down the country's Internet during a period of unrest. TRITON ICS malware update. The FCC moves away from net neutrality. UK warnings about cable vulnerabilities. When a keylogger isn’t a keylogger. Security companies patch some products. Pyongyang likes Bitcoin. More on the NiceHash Bitcoin caper. Emily Wilson from Terbium Labs on breach fatigue. Colleen Huber from MediaPro on their 2017 State of Privacy and Security Awareness Report.  And, stick 'em up: your Ether or your life. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1411</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[07e64119eadbe246b59c07d9e0681c68]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8903704668.mp3?updated=1608753588" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacktivism threatened over embassy move. Significant probe of an industrial plant. That was no BGP error. TV blues. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/495/notes</link>
      <description>In today's podcast we hear that Anonymous has called for action against US and Israeli government sites. FireEye reports a significant attack against an industrial plant, possibly involving nation-state reconnaissance. A lot of Internet traffic was briefly rerouted through Russia yesterday, possibly deliberately, for unclear reasons. TV troubles. Dale Drew from CenturyLink on measuring against standards and certs. Torsten Mayer from FICO on using AI to help protect nonprofits online.  And if toys are getting too connected, consider a puppy—very interactive. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 14 Dec 2017 21:01:32 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>495</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9d6e66ec-def8-11ea-911f-9380c1e57a09/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hacktivism threatened over embassy move. Significant probe of an industrial plant. That was no BGP error. TV blues. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Anonymous has called for action against US and Israeli government sites. FireEye reports a significant attack against an industrial plant, possibly involving nation-state reconnaissance. A lot of Internet traffic was briefly rerouted through Russia yesterday, possibly deliberately, for unclear reasons. TV troubles. Dale Drew from CenturyLink on measuring against standards and certs. Torsten Mayer from FICO on using AI to help protect nonprofits online.  And if toys are getting too connected, consider a puppy—very interactive. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Anonymous has called for action against US and Israeli government sites. FireEye reports a significant attack against an industrial plant, possibly involving nation-state reconnaissance. A lot of Internet traffic was briefly rerouted through Russia yesterday, possibly deliberately, for unclear reasons. TV troubles. Dale Drew from CenturyLink on measuring against standards and certs. Torsten Mayer from FICO on using AI to help protect nonprofits online.  And if toys are getting too connected, consider a puppy—very interactive. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1054</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[58a02e1c020f4b0af8e0e0068246a795]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3974121527.mp3?updated=1689818115" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A look back at Patch Tuesday. Classic games on Android serve malware. Cryptocurrency speculation. Info ops updates. Phony hitmen. Guilty pleas in Mirai case. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/494/notes</link>
      <description>In today's podcast we hear a reminder about yesterday's Patch Tuesday. Classic Android games are serving malware. Crytpocurrency speculative fever continues to rise. More unwelcome miners are pulling Monero out of streaming video services. Ransomware extortionists are finding Bitcoin prices sometimes rise too fast for comfort. False hit-man spam. A Russian hacking defendant, in Russia, says Putin made him do it. Robert M. Lee from Dragos on the security of the water supply. Guest is Evan Dornbush from point3 security on the disconnect between employers and educational institutions. Guilty pleas in the Mirai case. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 13 Dec 2017 20:17:32 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>494</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9d845bbe-def8-11ea-911f-db2bd35d9d49/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A look back at Patch Tuesday. Classic games on Android serve malware. Cryptocurrency speculation. Info ops updates. Phony hitmen. Guilty pleas in Mirai case. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear a reminder about yesterday's Patch Tuesday. Classic Android games are serving malware. Crytpocurrency speculative fever continues to rise. More unwelcome miners are pulling Monero out of streaming video services. Ransomware extortionists are finding Bitcoin prices sometimes rise too fast for comfort. False hit-man spam. A Russian hacking defendant, in Russia, says Putin made him do it. Robert M. Lee from Dragos on the security of the water supply. Guest is Evan Dornbush from point3 security on the disconnect between employers and educational institutions. Guilty pleas in the Mirai case. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear a reminder about yesterday's Patch Tuesday. Classic Android games are serving malware. Crytpocurrency speculative fever continues to rise. More unwelcome miners are pulling Monero out of streaming video services. Ransomware extortionists are finding Bitcoin prices sometimes rise too fast for comfort. False hit-man spam. A Russian hacking defendant, in Russia, says Putin made him do it. Robert M. Lee from Dragos on the security of the water supply. Guest is Evan Dornbush from point3 security on the disconnect between employers and educational institutions. Guilty pleas in the Mirai case. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1207</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[df1bbf93a3b4de863ced2fa3a25a0a10]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6624016657.mp3?updated=1689818101" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Catphishing for spies. Banking Trojans. Spider ransomware. CoinHive comes to Starbucks. SEC stops another ICO. BrickerBot retired? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/493/notes</link>
      <description>In today's podcast, we hear that Berlin says Beijing's been catphishing, and that Beijing says no way. Banking Trojans in Google Play look for Polish accounts. Spider malware spins out of the Balkans. Transferring risk doesn't mean you can ignore it. The SEC calls cease-and-desist on another ICO. That venti in Buenos Aires may have come with a CoinHive miner. Rick Howard from Palo Alto Networks on DevOps vs. site reliability engineers. Marcelle Lee from LookingGlass on the Bad Rabbit ransomware. The Doctor puts down his tools and closes BrickerBot. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Dec 2017 19:53:02 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>493</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9d98fd12-def8-11ea-911f-773149ca9e9d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Catphishing for spies. Banking Trojans. Spider ransomware. CoinHive comes to Starbucks. SEC stops another ICO. BrickerBot retired? </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Berlin says Beijing's been catphishing, and that Beijing says no way. Banking Trojans in Google Play look for Polish accounts. Spider malware spins out of the Balkans. Transferring risk doesn't mean you can ignore it. The SEC calls cease-and-desist on another ICO. That venti in Buenos Aires may have come with a CoinHive miner. Rick Howard from Palo Alto Networks on DevOps vs. site reliability engineers. Marcelle Lee from LookingGlass on the Bad Rabbit ransomware. The Doctor puts down his tools and closes BrickerBot. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Berlin says Beijing's been catphishing, and that Beijing says no way. Banking Trojans in Google Play look for Polish accounts. Spider malware spins out of the Balkans. Transferring risk doesn't mean you can ignore it. The SEC calls cease-and-desist on another ICO. That venti in Buenos Aires may have come with a CoinHive miner. Rick Howard from Palo Alto Networks on DevOps vs. site reliability engineers. Marcelle Lee from LookingGlass on the Bad Rabbit ransomware. The Doctor puts down his tools and closes BrickerBot. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1192</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[42f01236b4b55b36c394e3b65e77f5d2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7154179250.mp3?updated=1689818088" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Al Qaeda tries its hand at inspiration. MoneyTaker cyber bank robbers. Dark web database holds a billion credentials. Bitcoin speculation and Bitcoin fraud. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/492/notes</link>
      <description>In today's podcast, we hear that al Qaeda is working on ISIS-style inspiration. The MoneyTaker gang has been raiding banks quietly for about a year and a half. HP fixes an inadvertent keylogger in its laptops. 4iQ finds a huge database of aggregated credentials from many breaches for sale on the dark web. Bitcoin and other cryptocurrencies attract scams and hackers. Why? That's where the money is. Ben Yelin from UMD CHHS on the proposed Cybersecurity Improvement Act of 2017 legislation. An ICO scam artist is in the SEC's crosshairs, but they'll have to wait until Québec is through with him. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 11 Dec 2017 20:37:12 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>492</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9dbfca00-def8-11ea-911f-d37d4d1a5f09/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Al Qaeda tries its hand at inspiration. MoneyTaker cyber bank robbers. Dark web database holds a billion credentials. Bitcoin speculation and Bitcoin fraud. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that al Qaeda is working on ISIS-style inspiration. The MoneyTaker gang has been raiding banks quietly for about a year and a half. HP fixes an inadvertent keylogger in its laptops. 4iQ finds a huge database of aggregated credentials from many breaches for sale on the dark web. Bitcoin and other cryptocurrencies attract scams and hackers. Why? That's where the money is. Ben Yelin from UMD CHHS on the proposed Cybersecurity Improvement Act of 2017 legislation. An ICO scam artist is in the SEC's crosshairs, but they'll have to wait until Québec is through with him. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that al Qaeda is working on ISIS-style inspiration. The MoneyTaker gang has been raiding banks quietly for about a year and a half. HP fixes an inadvertent keylogger in its laptops. 4iQ finds a huge database of aggregated credentials from many breaches for sale on the dark web. Bitcoin and other cryptocurrencies attract scams and hackers. Why? That's where the money is. Ben Yelin from UMD CHHS on the proposed Cybersecurity Improvement Act of 2017 legislation. An ICO scam artist is in the SEC's crosshairs, but they'll have to wait until Québec is through with him. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>845</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[807138a795f6a4d23b1dde9760fced3e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1657813980.mp3?updated=1689818074" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stealthy Zberp Banking Trojan. {Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/13/notes</link>
      <description>Zberp is a stealthy banking trojan with an unconventional process injection technique. A hybrid of the ZeusVM and Carberp malware, Zberp uses a variety of techniques to prevent detection while it gathers information from infected systems. 
Limor Kessem is an executive security advisor for IBM, and she's our guide.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 09 Dec 2017 12:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>13</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/5934feb4-df0c-11ea-9447-336e7b1cb7e0/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Stealthy Zberp Banking Trojan</itunes:subtitle>
      <itunes:summary>Zberp is a stealthy banking trojan with an unconventional process injection technique. A hybrid of the ZeusVM and Carberp malware, Zberp uses a variety of techniques to prevent detection while it gathers information from infected systems. 
Limor Kessem is an executive security advisor for IBM, and she's our guide.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Zberp is a stealthy banking trojan with an unconventional process injection technique. A hybrid of the ZeusVM and Carberp malware, Zberp uses a variety of techniques to prevent detection while it gathers information from infected systems. </p><p>Limor Kessem is an executive security advisor for IBM, and she's our guide.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1559</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8aa6dcb8dd16f0580494a65cf55364d1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9093604442.mp3?updated=1684873057" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Iranian reconnaissance of critical infrastructure? Leaky banking apps. Microsoft's emergency patch. Ghosts of the Caliphate threaten, but have yet to deliver. New horizons in biometrics. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/491/notes</link>
      <description>In today's podcast we learn that FireEye is warning of patient reconnaissance on the part of the (probably) Iranian APT34. The Electronic Ghosts of the Caliphate have so far failed to say "boo," except maybe in South Jersey. Flaws discovered in mobile banking apps. Bike-sharing service leaked data. Bitcoin's bubble. Microsoft patches its Malware Protection Engine. Chris Poulin from BAH on closing the gap between IT and OT people in ICS. Adam Segal from the Council on Foreign Relations on the rollout of their cyber operations tracker. And biometrics have come to the beagles: your pet door can now recognize Rover or Boots, and let them on in. Their raccoon pals stay outside. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 08 Dec 2017 18:54:16 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>491</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9dd4e28c-def8-11ea-911f-177a332e7594/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Iranian reconnaissance of critical infrastructure? Leaky banking apps. Microsoft's emergency patch. Ghosts of the Caliphate threaten, but have yet to deliver. New horizons in biometrics. </itunes:subtitle>
      <itunes:summary>In today's podcast we learn that FireEye is warning of patient reconnaissance on the part of the (probably) Iranian APT34. The Electronic Ghosts of the Caliphate have so far failed to say "boo," except maybe in South Jersey. Flaws discovered in mobile banking apps. Bike-sharing service leaked data. Bitcoin's bubble. Microsoft patches its Malware Protection Engine. Chris Poulin from BAH on closing the gap between IT and OT people in ICS. Adam Segal from the Council on Foreign Relations on the rollout of their cyber operations tracker. And biometrics have come to the beagles: your pet door can now recognize Rover or Boots, and let them on in. Their raccoon pals stay outside. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we learn that FireEye is warning of patient reconnaissance on the part of the (probably) Iranian APT34. The Electronic Ghosts of the Caliphate have so far failed to say "boo," except maybe in South Jersey. Flaws discovered in mobile banking apps. Bike-sharing service leaked data. Bitcoin's bubble. Microsoft patches its Malware Protection Engine. Chris Poulin from BAH on closing the gap between IT and OT people in ICS. Adam Segal from the Council on Foreign Relations on the rollout of their cyber operations tracker. And biometrics have come to the beagles: your pet door can now recognize Rover or Boots, and let them on in. Their raccoon pals stay outside. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1312</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1cb0a26423c9ff956a00460e5dc79875]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6194500847.mp3?updated=1608753685" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hamas calls for intifada; hacktivism expected. Ethiopian government surveillance ops. Crime and cryptocurrency. Keylogger in the wild. Fixes to MacOS, Android app development tools. Uber hack and bug bounties.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/490/notes</link>
      <description>In today's podcast we consider warnings of a hacktivist intifada as the US prepares to recognize Jerusalem as Israel's capital. How Ethiopia's surveillance was discovered. Criminals flock to cryptocurrency sites with everything from DDoS to miners to theft. Keylogger found infesting WordPress sites. Android app development tools get quick fixes. Apple updates MacOS High Sierra again. What Uber may have thought it was doing when it paid off its hackers. Section 702 surveillance authority update. Jonathan Katz from UMD on NIST’s call for algorithms for post-quantum computing. Drew Cohen from MasterPeace Solutions on drawing government talent to the private sector. A jeopardy champ faces hacking charges, and Kromtech warns about Ashley Madison (on grounds of security, not propriety). 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 07 Dec 2017 20:33:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>490</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9df4e3e8-def8-11ea-911f-ff19db75eb62/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hamas calls for intifada; hacktivism expected. Ethiopian government surveillance ops. Crime and cryptocurrency. Keylogger in the wild. Fixes to MacOS, Android app development tools. Uber hack and bug bounties.  </itunes:subtitle>
      <itunes:summary>In today's podcast we consider warnings of a hacktivist intifada as the US prepares to recognize Jerusalem as Israel's capital. How Ethiopia's surveillance was discovered. Criminals flock to cryptocurrency sites with everything from DDoS to miners to theft. Keylogger found infesting WordPress sites. Android app development tools get quick fixes. Apple updates MacOS High Sierra again. What Uber may have thought it was doing when it paid off its hackers. Section 702 surveillance authority update. Jonathan Katz from UMD on NIST’s call for algorithms for post-quantum computing. Drew Cohen from MasterPeace Solutions on drawing government talent to the private sector. A jeopardy champ faces hacking charges, and Kromtech warns about Ashley Madison (on grounds of security, not propriety). 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we consider warnings of a hacktivist intifada as the US prepares to recognize Jerusalem as Israel's capital. How Ethiopia's surveillance was discovered. Criminals flock to cryptocurrency sites with everything from DDoS to miners to theft. Keylogger found infesting WordPress sites. Android app development tools get quick fixes. Apple updates MacOS High Sierra again. What Uber may have thought it was doing when it paid off its hackers. Section 702 surveillance authority update. Jonathan Katz from UMD on NIST’s call for algorithms for post-quantum computing. Drew Cohen from MasterPeace Solutions on drawing government talent to the private sector. A jeopardy champ faces hacking charges, and Kromtech warns about Ashley Madison (on grounds of security, not propriety). </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1073</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a0c767883d13e2ddf6a1496e290f48d3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1166285283.mp3?updated=1689818048" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Satori botnet is awake (and it's not engaged in enlightenment). State-sponsored spyware campaigns. ISIS threatens cyberattacks.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/489/notes</link>
      <description>In today's podcast, we learn that the Satori botnet flashed into existence yesterday with 280,000 bots. Is there a router zero-day out there? Insecure cryptocurrency apps aren't deterring speculators. How much energy does Bitcoin use? About as much as Denmark. Ethiopia's government is said to be using spyware against journalists. Iran's Charming Kitty espionage group is looking at media, academics, activists, and political advisors. ISIS threatens cyber havoc this Friday. Joe Carrigan from JHU on breach fatigue. Cat Coode from Binary Tattoo on social media safety. And the IOC takes a poke at Russia. Expect Fancy and Cozy Bear to poke right back. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 06 Dec 2017 20:42:58 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>489</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9e07bb6c-def8-11ea-911f-6b7983c3705f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Satori botnet is awake (and it's not engaged in enlightenment). State-sponsored spyware campaigns. ISIS threatens cyberattacks.  </itunes:subtitle>
      <itunes:summary>In today's podcast, we learn that the Satori botnet flashed into existence yesterday with 280,000 bots. Is there a router zero-day out there? Insecure cryptocurrency apps aren't deterring speculators. How much energy does Bitcoin use? About as much as Denmark. Ethiopia's government is said to be using spyware against journalists. Iran's Charming Kitty espionage group is looking at media, academics, activists, and political advisors. ISIS threatens cyber havoc this Friday. Joe Carrigan from JHU on breach fatigue. Cat Coode from Binary Tattoo on social media safety. And the IOC takes a poke at Russia. Expect Fancy and Cozy Bear to poke right back. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we learn that the Satori botnet flashed into existence yesterday with 280,000 bots. Is there a router zero-day out there? Insecure cryptocurrency apps aren't deterring speculators. How much energy does Bitcoin use? About as much as Denmark. Ethiopia's government is said to be using spyware against journalists. Iran's Charming Kitty espionage group is looking at media, academics, activists, and political advisors. ISIS threatens cyber havoc this Friday. Joe Carrigan from JHU on breach fatigue. Cat Coode from Binary Tattoo on social media safety. And the IOC takes a poke at Russia. Expect Fancy and Cozy Bear to poke right back. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1208</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0f215e5a04d3c2f63ae2cbcb39faa414]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5360895244.mp3?updated=1689818033" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Andromeda takedown (with an arrest in Belarus). Mirai is back; Reaper still threatens. PayPal phishing. Tech support scam evolves. Cryptowars notes. SEC goes after an ICO. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/488/notes</link>
      <description>In today's podcast, we hear how an international police operation took down Andromeda, and possibly the criminal mastermind known as Ar3s. Mirai is back, and so are warnings about Reaper. There's a PayPal phishing expedition in progress (don't let yourself be a wild-caught sucker). A new variant of the familiar tech support scam features a bogus blue screen of death. Germany's Interior Minister considers backdooring the IoT. The US Securities and Exchange Commission is going after dodgy ICOs. Justin Harvey from Accenture on cyber ranges. Adam Meyers from CrowdStrike on supply chain attacks. And we're not going to talk about the Internet of Those Kinds of Things. (Don't act so innocent—you know who you are.) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Dec 2017 20:59:46 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>488</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9e1b18d8-def8-11ea-911f-b724b0a962c8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Andromeda takedown (with an arrest in Belarus). Mirai is back; Reaper still threatens. PayPal phishing. Tech support scam evolves. Cryptowars notes. SEC goes after an ICO. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear how an international police operation took down Andromeda, and possibly the criminal mastermind known as Ar3s. Mirai is back, and so are warnings about Reaper. There's a PayPal phishing expedition in progress (don't let yourself be a wild-caught sucker). A new variant of the familiar tech support scam features a bogus blue screen of death. Germany's Interior Minister considers backdooring the IoT. The US Securities and Exchange Commission is going after dodgy ICOs. Justin Harvey from Accenture on cyber ranges. Adam Meyers from CrowdStrike on supply chain attacks. And we're not going to talk about the Internet of Those Kinds of Things. (Don't act so innocent—you know who you are.) 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear how an international police operation took down Andromeda, and possibly the criminal mastermind known as Ar3s. Mirai is back, and so are warnings about Reaper. There's a PayPal phishing expedition in progress (don't let yourself be a wild-caught sucker). A new variant of the familiar tech support scam features a bogus blue screen of death. Germany's Interior Minister considers backdooring the IoT. The US Securities and Exchange Commission is going after dodgy ICOs. Justin Harvey from Accenture on cyber ranges. Adam Meyers from CrowdStrike on supply chain attacks. And we're not going to talk about the Internet of Those Kinds of Things. (Don't act so innocent—you know who you are.) </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1113</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0853179a2dfdd7d13f625e5ba63f6982]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7231751474.mp3?updated=1689818020" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Nghia Hoang Pho charged with mishandling classified NSA material. A review of other recent leaks. Kaspersky under fire in the UK. More Uber executives depart. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/487/notes</link>
      <description>In today's podcast, we hear about an NSA employee who was charged Friday with "willful retention of national defense information." This appears to be the individual whose computer was equipped with Kaspersky security software, and scanned either by that security product or by a backdoor, depending on whom you believe. A look back at the other three alleged NSA leakers: Snowden, Martin, and Winner. Johannes Ullrich from SANS and the ISC Stormcast podcast, talking about the Kaspersky data exfiltration accusations. The UK expresses official misgivings about Kaspersky products. More Uber executives depart the company. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 04 Dec 2017 14:47:51 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>487</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9e318afa-def8-11ea-911f-fbd8f3e13cd7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Nghia Hoang Pho charged with mishandling classified NSA material. A review of other recent leaks. Kaspersky under fire in the UK. More Uber executives depart. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about an NSA employee who was charged Friday with "willful retention of national defense information." This appears to be the individual whose computer was equipped with Kaspersky security software, and scanned either by that security product or by a backdoor, depending on whom you believe. A look back at the other three alleged NSA leakers: Snowden, Martin, and Winner. Johannes Ullrich from SANS and the ISC Stormcast podcast, talking about the Kaspersky data exfiltration accusations. The UK expresses official misgivings about Kaspersky products. More Uber executives depart the company. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about an NSA employee who was charged Friday with "willful retention of national defense information." This appears to be the individual whose computer was equipped with Kaspersky security software, and scanned either by that security product or by a backdoor, depending on whom you believe. A look back at the other three alleged NSA leakers: Snowden, Martin, and Winner. Johannes Ullrich from SANS and the ISC Stormcast podcast, talking about the Kaspersky data exfiltration accusations. The UK expresses official misgivings about Kaspersky products. More Uber executives depart the company. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>884</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d04b69956e94c544d71a205ac5bf3182]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4258890079.mp3?updated=1689818005" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Staying ahead of Fast Flux Networks. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/12/notes</link>
      <description>Bad actors are using Fast Flux Networks with quickly-changing IP addresses and domain names to help hide their activities.
Or Katz, Principal Lead Security Researcher at Akamai, takes us through their recently-published white paper, "Digging Deeper — An In-Depth Analysis of a Fast Flux Network."
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 02 Dec 2017 12:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>12</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/54ba1b76-df0c-11ea-a9f1-0f5177d56378/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Staying ahead of Fast Flux Networks</itunes:subtitle>
      <itunes:summary>Bad actors are using Fast Flux Networks with quickly-changing IP addresses and domain names to help hide their activities.
Or Katz, Principal Lead Security Researcher at Akamai, takes us through their recently-published white paper, "Digging Deeper — An In-Depth Analysis of a Fast Flux Network."
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Bad actors are using Fast Flux Networks with quickly-changing IP addresses and domain names to help hide their activities.</p><p>Or Katz, Principal Lead Security Researcher at Akamai, takes us through their recently-published white paper, "Digging Deeper — An In-Depth Analysis of a Fast Flux Network."</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1200</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4596174b22750a1ebcd468ecf4c313ef]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2082140469.mp3?updated=1684873037" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Flynn pleads guilty in Mueller probe. Misconfigured AWS S3 buckets, again. Election trolling and spy versus oligarch. Black Friday fraud down. Crime and punishment. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/486/notes</link>
      <description>In today's podcast, we hear that former National Security Advisor Flynn pleads guilty to lying to the FBI. Another misconfigured AWS account is found. Cobalt is either careless or engaged in misdirection. Election trolling and mutual suspicion between Russia and the US. Kaspersky says his company didn't, doesn't, and won't spy for the Russian government as US agencies begin to purge their systems of his security software. Black Friday fraud seems to be down this year. South Korea's investigation of domestic election meddling by its cyber command sharpens. Malek Ben Salem from Accenture Labs with thoughts on GDPR. Gary Golomb from Awake Security with thoughts on properly setting priorities. And Roman Seleznev gets another fourteen years on carding charges. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 01 Dec 2017 19:21:16 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>486</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9e47fab0-def8-11ea-911f-afa52efbcc24/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Flynn pleads guilty in Mueller probe. Misconfigured AWS S3 buckets, again. Election trolling and spy versus oligarch. Black Friday fraud down. Crime and punishment. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that former National Security Advisor Flynn pleads guilty to lying to the FBI. Another misconfigured AWS account is found. Cobalt is either careless or engaged in misdirection. Election trolling and mutual suspicion between Russia and the US. Kaspersky says his company didn't, doesn't, and won't spy for the Russian government as US agencies begin to purge their systems of his security software. Black Friday fraud seems to be down this year. South Korea's investigation of domestic election meddling by its cyber command sharpens. Malek Ben Salem from Accenture Labs with thoughts on GDPR. Gary Golomb from Awake Security with thoughts on properly setting priorities. And Roman Seleznev gets another fourteen years on carding charges. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that former National Security Advisor Flynn pleads guilty to lying to the FBI. Another misconfigured AWS account is found. Cobalt is either careless or engaged in misdirection. Election trolling and mutual suspicion between Russia and the US. Kaspersky says his company didn't, doesn't, and won't spy for the Russian government as US agencies begin to purge their systems of his security software. Black Friday fraud seems to be down this year. South Korea's investigation of domestic election meddling by its cyber command sharpens. Malek Ben Salem from Accenture Labs with thoughts on GDPR. Gary Golomb from Awake Security with thoughts on properly setting priorities. And Roman Seleznev gets another fourteen years on carding charges. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1248</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[49ba7d6e112041ca7dafe0693017d86d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6798821949.mp3?updated=1608753588" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Breaches, extortion, and insider threats. Credit bureaus and GDPR. HP addresses spyware allegations. When is a snack bag more than a snack bag? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/485/notes</link>
      <description>In today's podcast we learn that British shipping giant Clarksons was breached but refuses to pay hackers extortion. The US House may be reaching consensus on surveillance authorities. INSCOM mops up Red Disk leak. The US Defense Department may have more work to do countering insider threats. HP denies reports of spyware in its PCs. Apple fixes High Sierra. Credit services think through the implications of GDPR. Robert M. Lee from Dragos, reviewing ICS and natural gas. Shaun Walsh from Cylance on AI. And snack foods, mens rea, Faraday cages, and employment law. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 30 Nov 2017 19:06:41 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>485</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9e655ccc-def8-11ea-911f-136f2efa6aab/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Breaches, extortion, and insider threats. Credit bureaus and GDPR. HP addresses spyware allegations. When is a snack bag more than a snack bag? </itunes:subtitle>
      <itunes:summary>In today's podcast we learn that British shipping giant Clarksons was breached but refuses to pay hackers extortion. The US House may be reaching consensus on surveillance authorities. INSCOM mops up Red Disk leak. The US Defense Department may have more work to do countering insider threats. HP denies reports of spyware in its PCs. Apple fixes High Sierra. Credit services think through the implications of GDPR. Robert M. Lee from Dragos, reviewing ICS and natural gas. Shaun Walsh from Cylance on AI. And snack foods, mens rea, Faraday cages, and employment law. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we learn that British shipping giant Clarksons was breached but refuses to pay hackers extortion. The US House may be reaching consensus on surveillance authorities. INSCOM mops up Red Disk leak. The US Defense Department may have more work to do countering insider threats. HP denies reports of spyware in its PCs. Apple fixes High Sierra. Credit services think through the implications of GDPR. Robert M. Lee from Dragos, reviewing ICS and natural gas. Shaun Walsh from Cylance on AI. And snack foods, mens rea, Faraday cages, and employment law. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1049</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5fd0b299d23eaa5217167e69bf89b2dd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3075127161.mp3?updated=1689817980" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Building your cyber security career. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/20/notes</link>
      <description>In this CyberWire special edition, we take a closer look at finding your career in cyber security. Just how important is that degree? Does it make sense to invest in certifications? What are employers really looking for when they’re searching for qualified cyber security talent? And why is it critical that you not just hunt down a sexy, high paying job, but build yourself a fulfilling career?
Sharing their insights and expertise are Kathleen Smith, CMO from Clearedjobs.net and cybersecjobs.com, and Robert M. Lee, CEO of Dragos.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 30 Nov 2017 13:09:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>20</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9ab2f188-df03-11ea-b7a3-b7480d6dc0d6/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Building your cyber security career</itunes:subtitle>
      <itunes:summary>In this CyberWire special edition, we take a closer look at finding your career in cyber security. Just how important is that degree? Does it make sense to invest in certifications? What are employers really looking for when they’re searching for qualified cyber security talent? And why is it critical that you not just hunt down a sexy, high paying job, but build yourself a fulfilling career?
Sharing their insights and expertise are Kathleen Smith, CMO from Clearedjobs.net and cybersecjobs.com, and Robert M. Lee, CEO of Dragos.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this CyberWire special edition, we take a closer look at finding your career in cyber security. Just how important is that degree? Does it make sense to invest in certifications? What are employers really looking for when they’re searching for qualified cyber security talent? And why is it critical that you not just hunt down a sexy, high paying job, but build yourself a fulfilling career?</p><p>Sharing their insights and expertise are Kathleen Smith, CMO from Clearedjobs.net and cybersecjobs.com, and Robert M. Lee, CEO of Dragos.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2056</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[73edd95effdba08c0382133220e9ae19]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7623003487.mp3?updated=1656712126" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Another misconfigured AWS S3 bucket, this one with US Army INSCOM files. Apple fixes a major issue in MacOS. Influence ops and autarky. Boyusec disbanded. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/484/notes</link>
      <description>In today's podcast we hear that another misconfigured AWS S3 bucket has turned up. This one holds sensitive US Army files. Apple fixes a big flaw in the latest MacOS High Sierra version—the password is…"root." Russia says American aggression in cyberspace is moving it to create its own DNS. Russia and Venezuela exploit the Catalan independence movement for disruptive information operations. Boyusec, mentioned in recent US indictment, has been disbanded.  Dale Drew from CenturyLink with lessons on consolidation. Jason McGee from IBM on software containers. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 29 Nov 2017 20:08:55 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>484</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9e756842-def8-11ea-911f-7f1c3c544f80/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Another misconfigured AWS S3 bucket, this one with US Army INSCOM files. Apple fixes a major issue in MacOS. Influence ops and autarky. Boyusec disbanded. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that another misconfigured AWS S3 bucket has turned up. This one holds sensitive US Army files. Apple fixes a big flaw in the latest MacOS High Sierra version—the password is…"root." Russia says American aggression in cyberspace is moving it to create its own DNS. Russia and Venezuela exploit the Catalan independence movement for disruptive information operations. Boyusec, mentioned in recent US indictment, has been disbanded.  Dale Drew from CenturyLink with lessons on consolidation. Jason McGee from IBM on software containers. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that another misconfigured AWS S3 bucket has turned up. This one holds sensitive US Army files. Apple fixes a big flaw in the latest MacOS High Sierra version—the password is…"root." Russia says American aggression in cyberspace is moving it to create its own DNS. Russia and Venezuela exploit the Catalan independence movement for disruptive information operations. Boyusec, mentioned in recent US indictment, has been disbanded.  Dale Drew from CenturyLink with lessons on consolidation. Jason McGee from IBM on software containers. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1252</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7dd3ae9a623eaf321e87fd592233eb18]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6154735136.mp3?updated=1689817971" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Who's the third man in the Shadow Brokers leaks? ISIS diaspora means more ISIS online. Monero miner identified. Tizi backdoored apps booted from Google Play. Scarab ransomware. M&amp;A notes. Indictments in IP theft. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/483/notes</link>
      <description>In today's podcast we hear rumors that the third-man in the Shadow Brokers leak might soon become publicly known. ISIS enters its diaspora phase. Monero miner targets Macs. Google Play ejects apps with the Tizi [tizzy] backdoor. Scarab ransomware blasted out in spam campaign. Uber's value takes a hit, post-breach-disclosure. Barracuda Networks taken private. Trend Micro buys Immunio.  Emily Wilson from Terbium Labs on the privacy of children online. Bryan Ware from Haystax on analyzing incoming data streams. And the Pittsburgh FBI office takes another whack at Chinese industrial espionage. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Nov 2017 18:59:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>483</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9e8d7c02-def8-11ea-911f-0f43294c6955/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Who's the third man in the Shadow Brokers leaks? ISIS diaspora means more ISIS online. Monero miner identified. Tizi backdoored apps booted from Google Play. Scarab ransomware. M&amp;A notes. Indictments in IP theft. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear rumors that the third-man in the Shadow Brokers leak might soon become publicly known. ISIS enters its diaspora phase. Monero miner targets Macs. Google Play ejects apps with the Tizi [tizzy] backdoor. Scarab ransomware blasted out in spam campaign. Uber's value takes a hit, post-breach-disclosure. Barracuda Networks taken private. Trend Micro buys Immunio.  Emily Wilson from Terbium Labs on the privacy of children online. Bryan Ware from Haystax on analyzing incoming data streams. And the Pittsburgh FBI office takes another whack at Chinese industrial espionage. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear rumors that the third-man in the Shadow Brokers leak might soon become publicly known. ISIS enters its diaspora phase. Monero miner targets Macs. Google Play ejects apps with the Tizi [tizzy] backdoor. Scarab ransomware blasted out in spam campaign. Uber's value takes a hit, post-breach-disclosure. Barracuda Networks taken private. Trend Micro buys Immunio.  Emily Wilson from Terbium Labs on the privacy of children online. Bryan Ware from Haystax on analyzing incoming data streams. And the Pittsburgh FBI office takes another whack at Chinese industrial espionage. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1092</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5939119ac57fbc99d3fa5c8e12bbb335]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4094961902.mp3?updated=1689817957" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Breach disclosure: fast and slow. Mirai's minor comeback. Anti-ISIS Hacktivsts strike Amaq. North Koreans studying blockchain. Alleged Game of Thrones hacker indicted. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/482/notes</link>
      <description>In today's podcast, we hear that image-sharing service Imgur disclosed a data breach. It happened sometime ago, but they were quick to get the word out once they were aware of it. Uber faces regulatory attention and possible post-hack headwinds for its aniticipated IPO. Mozilla's working on a Firefox add-on to warn you that a site you're visiting has been breached. There's a minor resurgence of Mirai, mostly from routers in Argentina. Anti-ISIS hacktivists school the Caliphate in information operations. What did the FBI know about Fancy Bear? North Koreans study blockchain. Ben Yelin from UMD CHHS on President Trump’s recently signed Cyber Crime Fighting Act. And winter is coming for an Iranian hacker. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 27 Nov 2017 20:29:14 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>482</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9eac1d88-def8-11ea-911f-7b9ed5726685/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Breach disclosure: fast and slow. Mirai's minor comeback. Anti-ISIS Hacktivsts strike Amaq. North Koreans studying blockchain. Alleged Game of Thrones hacker indicted. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that image-sharing service Imgur disclosed a data breach. It happened sometime ago, but they were quick to get the word out once they were aware of it. Uber faces regulatory attention and possible post-hack headwinds for its aniticipated IPO. Mozilla's working on a Firefox add-on to warn you that a site you're visiting has been breached. There's a minor resurgence of Mirai, mostly from routers in Argentina. Anti-ISIS hacktivists school the Caliphate in information operations. What did the FBI know about Fancy Bear? North Koreans study blockchain. Ben Yelin from UMD CHHS on President Trump’s recently signed Cyber Crime Fighting Act. And winter is coming for an Iranian hacker. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that image-sharing service Imgur disclosed a data breach. It happened sometime ago, but they were quick to get the word out once they were aware of it. Uber faces regulatory attention and possible post-hack headwinds for its aniticipated IPO. Mozilla's working on a Firefox add-on to warn you that a site you're visiting has been breached. There's a minor resurgence of Mirai, mostly from routers in Argentina. Anti-ISIS hacktivists school the Caliphate in information operations. What did the FBI know about Fancy Bear? North Koreans study blockchain. Ben Yelin from UMD CHHS on President Trump’s recently signed Cyber Crime Fighting Act. And winter is coming for an Iranian hacker. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>921</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5f09cc70409b4d3daaa2cb82882abbbd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9765200446.mp3?updated=1689817943" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Waiting for Terdot, a sneaky banking Trojan. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/11/notes</link>
      <description>The Terdot Banker Trojan is a descendant of the Zeus family of malware, and has evolved to feature serious espionage capabilities. It can compromise transactions, steal accounts and credit card information, and can eavesdrop on and modify traffic on social media and email platforms. While not yet widely spread, it's a threat to consumers and businesses alike.
Bogdan Botezatu is a senior e-threat analyst at Bitdefender, and he takes us through their recently published whitepaper.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 25 Nov 2017 12:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>11</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/51e34b20-df0c-11ea-866e-7b2fab768b20/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Waiting for Terdot, a sneaky banking Trojan</itunes:subtitle>
      <itunes:summary>The Terdot Banker Trojan is a descendant of the Zeus family of malware, and has evolved to feature serious espionage capabilities. It can compromise transactions, steal accounts and credit card information, and can eavesdrop on and modify traffic on social media and email platforms. While not yet widely spread, it's a threat to consumers and businesses alike.
Bogdan Botezatu is a senior e-threat analyst at Bitdefender, and he takes us through their recently published whitepaper.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The Terdot Banker Trojan is a descendant of the Zeus family of malware, and has evolved to feature serious espionage capabilities. It can compromise transactions, steal accounts and credit card information, and can eavesdrop on and modify traffic on social media and email platforms. While not yet widely spread, it's a threat to consumers and businesses alike.</p><p>Bogdan Botezatu is a senior e-threat analyst at Bitdefender, and he takes us through their recently published whitepaper.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1234</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eeeb76777da32180ac0fc84437deaddd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8482195078.mp3?updated=1684864741" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Right to Be Forgotten with Yale Law School's Tiffany Li</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/481/notes</link>
      <description>Our guest today is Tiffany Li. She’s an attorney and Resident Fellow at Yale Law School’s Information Society Project. She's an expert on privacy, intellectual property, and law and policy, and her research includes legal issues involving online speech, access to information, and Internet freedom. She’s coauthor of the paper, Humans Forget, Machines Remember: Artificial Intelligence and the Right to Be Forgotten, which will be published soon in Computer Security &amp; Law Review.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 22 Nov 2017 18:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>481</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9ec3c4ce-def8-11ea-911f-2bf96690a468/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The Right to Be Forgotten with Yale Law School's Tiffany Li</itunes:subtitle>
      <itunes:summary>Our guest today is Tiffany Li. She’s an attorney and Resident Fellow at Yale Law School’s Information Society Project. She's an expert on privacy, intellectual property, and law and policy, and her research includes legal issues involving online speech, access to information, and Internet freedom. She’s coauthor of the paper, Humans Forget, Machines Remember: Artificial Intelligence and the Right to Be Forgotten, which will be published soon in Computer Security &amp; Law Review.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our guest today is Tiffany Li. She’s an attorney and Resident Fellow at Yale Law School’s Information Society Project. She's an expert on privacy, intellectual property, and law and policy, and her research includes legal issues involving online speech, access to information, and Internet freedom. She’s coauthor of the paper, Humans Forget, Machines Remember: Artificial Intelligence and the Right to Be Forgotten, which will be published soon in Computer Security &amp; Law Review.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1155</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2e74f882f79f2ed568b6bba425a0104c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1880943305.mp3?updated=1689817931" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberspace in Peace and War author Martin C. Libicki</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/480/notes</link>
      <description>Today's show features an extended interview with Martin C. Libicki. He holds the Maryellen and Richard Keyser chair of cybersecurity studies at the U.S. Naval Academy. His most recent book is Cyberspace in Peace and War. Topics include the differences between cyber war and cyber espionage, the possibilities of a cyber Pearl Harbor or Cyber 9/11, and the risk of nations overreacting to cyber attacks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Nov 2017 18:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>480</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9ede3250-def8-11ea-911f-17d7e179d601/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyberspace in Peace and War author Martin C. Libicki</itunes:subtitle>
      <itunes:summary>Today's show features an extended interview with Martin C. Libicki. He holds the Maryellen and Richard Keyser chair of cybersecurity studies at the U.S. Naval Academy. His most recent book is Cyberspace in Peace and War. Topics include the differences between cyber war and cyber espionage, the possibilities of a cyber Pearl Harbor or Cyber 9/11, and the risk of nations overreacting to cyber attacks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today's show features an extended interview with Martin C. Libicki. He holds the Maryellen and Richard Keyser chair of cybersecurity studies at the U.S. Naval Academy. His most recent book is <em>Cyberspace in Peace and War</em>. Topics include the differences between cyber war and cyber espionage, the possibilities of a cyber Pearl Harbor or Cyber 9/11, and the risk of nations overreacting to cyber attacks.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1670</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[db086bada7fe21e584a04eae435c4c5f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7586256341.mp3?updated=1689817927" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>PwC Principal Jocelyn Aqua on Earning Consumer Trust and Business</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/479/notes</link>
      <description>Our guest today is Jocelyn Aqua. She’s a principal at PwC, where her specialty is regulatory privacy and cybersecurity. Our conversation centers on a recently published report from PWC called Protect Me, what they describe as an in-depth look at what consumers want, what worries them, and what companies can do to earn their trust and their business.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 20 Nov 2017 18:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>479</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9ef51420-def8-11ea-911f-7f5fd93ed131/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>PwC Principal Jocelyn Aqua on Earning Consumer Trust and Business</itunes:subtitle>
      <itunes:summary>Our guest today is Jocelyn Aqua. She’s a principal at PwC, where her specialty is regulatory privacy and cybersecurity. Our conversation centers on a recently published report from PWC called Protect Me, what they describe as an in-depth look at what consumers want, what worries them, and what companies can do to earn their trust and their business.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our guest today is Jocelyn Aqua. She’s a principal at PwC, where her specialty is regulatory privacy and cybersecurity. Our conversation centers on a recently published report from PWC called Protect Me, what they describe as an in-depth look at what consumers want, what worries them, and what companies can do to earn their trust and their business.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1298</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5b92f529b6e5453f753dd8c703ae5c11]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9565808173.mp3?updated=1689817906" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dark Net Pricing with Flashpoint's Liv Rowley. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/10/notes</link>
      <description>Cybercriminals offer all sorts of illicit goods for sale on Deep and Dark Web markets. In this episode, Liv Rowley, cybercrime intelligence analyst at Flashpoint, takes us through her team's research into the pricing of certain illegal goods online, including "Fullz", exploit kits, DDoS for hire, RDP servers, card data, bank logs and passports. Supply meets demand in this shady underground ecosystem.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 18 Nov 2017 12:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b853c818-df0b-11ea-9fc1-3b5f1f72664f/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dark Net Pricing with Flashpoint's Liv Rowley</itunes:subtitle>
      <itunes:summary>Cybercriminals offer all sorts of illicit goods for sale on Deep and Dark Web markets. In this episode, Liv Rowley, cybercrime intelligence analyst at Flashpoint, takes us through her team's research into the pricing of certain illegal goods online, including "Fullz", exploit kits, DDoS for hire, RDP servers, card data, bank logs and passports. Supply meets demand in this shady underground ecosystem.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cybercriminals offer all sorts of illicit goods for sale on Deep and Dark Web markets. In this episode, Liv Rowley, cybercrime intelligence analyst at Flashpoint, takes us through her team's research into the pricing of certain illegal goods online, including "Fullz", exploit kits, DDoS for hire, RDP servers, card data, bank logs and passports. Supply meets demand in this shady underground ecosystem.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1327</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a725fccc00b5c90343c884ff917c5923]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5032251907.mp3?updated=1684864732" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>AWS S3 misconfigurations. Kaspersky's report on the Equation Group affair. Cybercrime notes. DPRK cyber campaigns. The VEP reviews continue positive. Amazon Key has issues. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/478/notes</link>
      <description>In today's podcast, we hear about more misconfigured S3 buckets (these in Australia). Kaspersky Lab protests its innocence as it releases a study of Equation Group leaks. Notes from the world of crime: dual-purpose Trojans, fake-news-as-a-service, and how the cops are keeping the robbers hopping. Some thoughts on Hidden Cobra, and what it means for ICS operators in particular. More positive notices for the VEP. Chris Poulin from BAH on AI ethical conundrums with self-driving cars. Jeremy Wittkop from InteliSecure on the trouble with Social Security Numbers. And Amazon Key may unlock more than one would like.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 17 Nov 2017 20:33:11 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>478</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9f0bdc1e-def8-11ea-911f-eb93c708a944/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>AWS S3 misconfigurations. Kaspersky's report on the Equation Group affair. Cybercrime notes. DPRK cyber campaigns. The VEP reviews continue positive. Amazon Key has issues. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about more misconfigured S3 buckets (these in Australia). Kaspersky Lab protests its innocence as it releases a study of Equation Group leaks. Notes from the world of crime: dual-purpose Trojans, fake-news-as-a-service, and how the cops are keeping the robbers hopping. Some thoughts on Hidden Cobra, and what it means for ICS operators in particular. More positive notices for the VEP. Chris Poulin from BAH on AI ethical conundrums with self-driving cars. Jeremy Wittkop from InteliSecure on the trouble with Social Security Numbers. And Amazon Key may unlock more than one would like.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about more misconfigured S3 buckets (these in Australia). Kaspersky Lab protests its innocence as it releases a study of Equation Group leaks. Notes from the world of crime: dual-purpose Trojans, fake-news-as-a-service, and how the cops are keeping the robbers hopping. Some thoughts on Hidden Cobra, and what it means for ICS operators in particular. More positive notices for the VEP. Chris Poulin from BAH on AI ethical conundrums with self-driving cars. Jeremy Wittkop from InteliSecure on the trouble with Social Security Numbers. And Amazon Key may unlock more than one would like.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1322</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5e3973960890bff76754c0ad4c2dad6f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2036618170.mp3?updated=1608753669" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Revisions to the US VEP (and comparisons to China's). DPRK hacking. Laurel mole hunt. BlueBorne is back. Snakes in the Play Store. Can you sound like a child? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/477/notes</link>
      <description>In today's podcast, we get an update on the US Vulnerabilities Equities Process, which now promises more transparency, accountability, and stakeholder representation in handling zero-days. A look at China's equivalent…doesn't. Worries about North Korean hacking. Mole hunting at Fort Meade. BlueBorne bugs in home assistants. More malware in Google Play. David DuFour from Webroot on the importance of communication with the board of directors. Roy Katmor from Ensilo on attacks using social engineering. And how to get around that pesky voice recognition software. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 16 Nov 2017 21:08:55 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>477</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9f1a8eee-def8-11ea-911f-eff31253f621/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Revisions to the US VEP (and comparisons to China's). DPRK hacking. Laurel mole hunt. BlueBorne is back. Snakes in the Play Store. Can you sound like a child? </itunes:subtitle>
      <itunes:summary>In today's podcast, we get an update on the US Vulnerabilities Equities Process, which now promises more transparency, accountability, and stakeholder representation in handling zero-days. A look at China's equivalent…doesn't. Worries about North Korean hacking. Mole hunting at Fort Meade. BlueBorne bugs in home assistants. More malware in Google Play. David DuFour from Webroot on the importance of communication with the board of directors. Roy Katmor from Ensilo on attacks using social engineering. And how to get around that pesky voice recognition software. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we get an update on the US Vulnerabilities Equities Process, which now promises more transparency, accountability, and stakeholder representation in handling zero-days. A look at China's equivalent…doesn't. Worries about North Korean hacking. Mole hunting at Fort Meade. BlueBorne bugs in home assistants. More malware in Google Play. David DuFour from Webroot on the importance of communication with the board of directors. Roy Katmor from Ensilo on attacks using social engineering. And how to get around that pesky voice recognition software. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1151</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[593643bbe947a5b54f50863a779e7c1b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9870297114.mp3?updated=1689817880" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hidden Cobra's RATs. IoT bugs. Patch Tuesday notes. Backdoored smartphones. Russian trolling, propaganda. DPRK short wave hacked? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/476/notes</link>
      <description>In today's podcast, we hear that the DHS and FBI have warned that two North Korean malware campaigns are active in the wild. IoT vulnerabilities are disclosed. :Smartphones ship with apparently inadvertent backdoors. Patch Tuesday was a big one, this month. Russian trolls took both sides in the Brexit vote. A pro-tip from the squints: a screenshot from a video game isn't, you know, actually gun-camera footage. Ben Yelin from UMD CHHS on the possible expiration of section 702 of the FISA act. Orion Hindawi, CEO of Tanium, with insights gathered from their annual Converge conference. And North Korean shortwave gets hacked to play Eighties rock. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 15 Nov 2017 20:53:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>476</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9f2df4ca-def8-11ea-911f-9f311a801773/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hidden Cobra's RATs. IoT bugs. Patch Tuesday notes. Backdoored smartphones. Russian trolling, propaganda. DPRK short wave hacked? </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the DHS and FBI have warned that two North Korean malware campaigns are active in the wild. IoT vulnerabilities are disclosed. :Smartphones ship with apparently inadvertent backdoors. Patch Tuesday was a big one, this month. Russian trolls took both sides in the Brexit vote. A pro-tip from the squints: a screenshot from a video game isn't, you know, actually gun-camera footage. Ben Yelin from UMD CHHS on the possible expiration of section 702 of the FISA act. Orion Hindawi, CEO of Tanium, with insights gathered from their annual Converge conference. And North Korean shortwave gets hacked to play Eighties rock. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the DHS and FBI have warned that two North Korean malware campaigns are active in the wild. IoT vulnerabilities are disclosed. :Smartphones ship with apparently inadvertent backdoors. Patch Tuesday was a big one, this month. Russian trolls took both sides in the Brexit vote. A pro-tip from the squints: a screenshot from a video game isn't, you know, actually gun-camera footage. Ben Yelin from UMD CHHS on the possible expiration of section 702 of the FISA act. Orion Hindawi, CEO of Tanium, with insights gathered from their annual Converge conference. And North Korean shortwave gets hacked to play Eighties rock. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1175</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9d783d280dea29c096500d219d425522]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1153163376.mp3?updated=1689817865" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Influence operations in Catalonia? IcedID banking Trojan. The Shadow Brokers: an intelligence service or a bunch of moles? Patch notes. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/475/notes</link>
      <description>In today's podcast, we hear that Spain sees foreign influence operations in Catalonia. IBM's X-Force warns of a new banking Trojan. There may be a mole hunt going on in NSA—and somewhere the Shadow Brokers are smiling. Anti-virus companies fix the AVGater vulnerability. Firefox and Google both commit to security upgrades. Johannes Ullrich from SANS Technology Institute and the ISC Stormcast podcast on the challenges of random number generation. Steve McGregory from Ixia on the challenges of dealing with the virtually infinite computing power and bandwidth of cloud computing. Tenable urges people to avoid breaches through good hygiene, and Carbon Black wishes we'd stop calling attackers "hackers." 
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. We read Recorded Future’s free intel daily, you might find it valuable, too.
 Cylance is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Learn more at cylance.com.
 Dragos is leading a webinar on November 21st that will help enable industrial control system (#ICS) security teams to defend their environments appropriately. Check it out at thecyberwire.com/dragos.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Nov 2017 20:45:21 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>475</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9f498cee-def8-11ea-911f-ab3bf0db09a7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Influence operations in Catalonia? IcedID banking Trojan. The Shadow Brokers: an intelligence service or a bunch of moles? Patch notes. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Spain sees foreign influence operations in Catalonia. IBM's X-Force warns of a new banking Trojan. There may be a mole hunt going on in NSA—and somewhere the Shadow Brokers are smiling. Anti-virus companies fix the AVGater vulnerability. Firefox and Google both commit to security upgrades. Johannes Ullrich from SANS Technology Institute and the ISC Stormcast podcast on the challenges of random number generation. Steve McGregory from Ixia on the challenges of dealing with the virtually infinite computing power and bandwidth of cloud computing. Tenable urges people to avoid breaches through good hygiene, and Carbon Black wishes we'd stop calling attackers "hackers." 
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. We read Recorded Future’s free intel daily, you might find it valuable, too.
 Cylance is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Learn more at cylance.com.
 Dragos is leading a webinar on November 21st that will help enable industrial control system (#ICS) security teams to defend their environments appropriately. Check it out at thecyberwire.com/dragos.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Spain sees foreign influence operations in Catalonia. IBM's X-Force warns of a new banking Trojan. There may be a mole hunt going on in NSA—and somewhere the Shadow Brokers are smiling. Anti-virus companies fix the AVGater vulnerability. Firefox and Google both commit to security upgrades. Johannes Ullrich from SANS Technology Institute and the ISC Stormcast podcast on the challenges of random number generation. Steve McGregory from Ixia on the challenges of dealing with the virtually infinite computing power and bandwidth of cloud computing. Tenable urges people to avoid breaches through good hygiene, and Carbon Black wishes we'd stop calling attackers "hackers." </p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. We read <a href="http://goo.gl/wphZ1z">Recorded Future’s free intel daily</a>, you might find it valuable, too.</p> <p>Cylance is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Learn more at <a href="https://goo.gl/fHR65L">cylance.com</a>.</p> <p>Dragos is leading a webinar on November 21st that will help enable industrial control system (#ICS) security teams to defend their environments appropriately. Check it out at <a href="https://goo.gl/nqR2yq">thecyberwire.com/dragos</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1201</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4545cb451b9e8ae7f34e1f6813be5899]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5706800023.mp3?updated=1689817850" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Vault 8 and false-flag allegations. Mole hunting. Equifax breach costs. ISIS returns to WordPress defacements. RoK domestic political influence scandal. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/474/notes</link>
      <description>In today's podcast, we hear how Vault 8 has succeeded Vault 7 among WikiLeaks dumps (but it's still all CIA all the time from Mr. Assange and company). GCHQ expresses concerns about Kaspersky anti-virus products. Media reports suggest that NSA is in the middle of a big mole hunt. Equifax begins to tally up the costs of its breach. The US Intelligence Community reiterates its conclusion that dog bites man, or rather, that Russia wants to work mischief with the United States. ISIS defaces school websites. Bin Laden fils [feess] takes up his late father's mantle online. Some notes on South Korea's domestic influence investigations. A look back at the SINET showcase. Rick Howard from Palo Alto networks discussing “vendor in depth” and “best of breed” strategies. 
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. We read Recorded Future’s free intel daily, you might find it valuable, too.
 Cylance is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Learn more at cylance.com.
 Dragos is leading a webinar on November 21st that will help enable industrial control system (#ICS) security teams to defend their environments appropriately. Check it out at thecyberwire.com/dragos.
 Podcast sponsor 1-Recorded Future: http://goo.gl/wphZ1z Podcast sponsor 2- Cylance: https://goo.gl/fHR65L Friday sponsor- Dragos: https://goo.gl/nqR2yq
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 13 Nov 2017 19:49:57 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>474</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9f6254d6-def8-11ea-911f-9b07ab74281a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Vault 8 and false-flag allegations. Mole hunting. Equifax breach costs. ISIS returns to WordPress defacements. RoK domestic political influence scandal. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear how Vault 8 has succeeded Vault 7 among WikiLeaks dumps (but it's still all CIA all the time from Mr. Assange and company). GCHQ expresses concerns about Kaspersky anti-virus products. Media reports suggest that NSA is in the middle of a big mole hunt. Equifax begins to tally up the costs of its breach. The US Intelligence Community reiterates its conclusion that dog bites man, or rather, that Russia wants to work mischief with the United States. ISIS defaces school websites. Bin Laden fils [feess] takes up his late father's mantle online. Some notes on South Korea's domestic influence investigations. A look back at the SINET showcase. Rick Howard from Palo Alto networks discussing “vendor in depth” and “best of breed” strategies. 
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. We read Recorded Future’s free intel daily, you might find it valuable, too.
 Cylance is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Learn more at cylance.com.
 Dragos is leading a webinar on November 21st that will help enable industrial control system (#ICS) security teams to defend their environments appropriately. Check it out at thecyberwire.com/dragos.
 Podcast sponsor 1-Recorded Future: http://goo.gl/wphZ1z Podcast sponsor 2- Cylance: https://goo.gl/fHR65L Friday sponsor- Dragos: https://goo.gl/nqR2yq
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear how Vault 8 has succeeded Vault 7 among WikiLeaks dumps (but it's still all CIA all the time from Mr. Assange and company). GCHQ expresses concerns about Kaspersky anti-virus products. Media reports suggest that NSA is in the middle of a big mole hunt. Equifax begins to tally up the costs of its breach. The US Intelligence Community reiterates its conclusion that dog bites man, or rather, that Russia wants to work mischief with the United States. ISIS defaces school websites. Bin Laden fils [feess] takes up his late father's mantle online. Some notes on South Korea's domestic influence investigations. A look back at the SINET showcase. Rick Howard from Palo Alto networks discussing “vendor in depth” and “best of breed” strategies. </p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. We read <a href="http://goo.gl/wphZ1z">Recorded Future’s free intel daily</a>, you might find it valuable, too.</p> <p>Cylance is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Learn more at <a href="https://goo.gl/fHR65L">cylance.com</a>.</p> <p>Dragos is leading a webinar on November 21st that will help enable industrial control system (#ICS) security teams to defend their environments appropriately. Check it out at <a href="https://goo.gl/nqR2yq">thecyberwire.com/dragos</a>.</p> <p>Podcast sponsor 1-Recorded Future: http://goo.gl/wphZ1z<br> Podcast sponsor 2- Cylance: https://goo.gl/fHR65L<br> Friday sponsor- Dragos: https://goo.gl/nqR2yq</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1000</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cdc3d6a8d56d79bddcdf3c08e26b207a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5660866373.mp3?updated=1689817756" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Taiwan Bank Heist and Lazurus Group with BAE's Adrian Nish. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/9/notes</link>
      <description>Dr. Adrian Nish is head of cyber threat intelligence at BAE Systems. His team has been tracking a new cyber-enabled bank heist in Asia. Some of the tools used are reminiscent of the Bangladesh Bank attack from February 2016.
The full report  can be found here.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 11 Nov 2017 12:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>9</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b7531522-df0b-11ea-a0a9-33f050db6efb/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Taiwan Bank Heist and Lazurus Group with BAE's Adrian Nish</itunes:subtitle>
      <itunes:summary>Dr. Adrian Nish is head of cyber threat intelligence at BAE Systems. His team has been tracking a new cyber-enabled bank heist in Asia. Some of the tools used are reminiscent of the Bangladesh Bank attack from February 2016.
The full report  can be found here.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dr. Adrian Nish is head of cyber threat intelligence at BAE Systems. His team has been tracking a new cyber-enabled bank heist in Asia. Some of the tools used are reminiscent of the Bangladesh Bank attack from February 2016.</p><p>The full report <a href="http://baesystemsai.blogspot.com/2017/10/taiwan-heist-lazarus-tools.html"> can be found here</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>982</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8c51da0466a732b5760abcb446548c87]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1721757933.mp3?updated=1684864717" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Macro-less malware. Metacriminals and botnet herders. Hacking ships and airliners. Cryptocurrency glitch. Congratulations to the SINET 16. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/473/notes</link>
      <description>In today's podcast, we hear that there's no honor among thieves, or botnet herders, either. Reaper still seems quiet. Macro-less malware is a problem, Microsoft warns. Researchers show you can hack an airliner's avionics. The maritime shipping sector worries that Maerk's experience with NotPetya isn't just a one-off. Ether—the cryptocurrency—is disappearing into the aether (at least this once). Justin Harvey from Accenture on the importance of not failing the basics. Guest is David Barzilai from Karamba Security on the security of embedded systems in automated cars. And we congratulate this year's SINET 16. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 09 Nov 2017 20:35:52 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>473</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9f787310-def8-11ea-911f-a325b3b3d7d8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Macro-less malware. Metacriminals and botnet herders. Hacking ships and airliners. Cryptocurrency glitch. Congratulations to the SINET 16. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that there's no honor among thieves, or botnet herders, either. Reaper still seems quiet. Macro-less malware is a problem, Microsoft warns. Researchers show you can hack an airliner's avionics. The maritime shipping sector worries that Maerk's experience with NotPetya isn't just a one-off. Ether—the cryptocurrency—is disappearing into the aether (at least this once). Justin Harvey from Accenture on the importance of not failing the basics. Guest is David Barzilai from Karamba Security on the security of embedded systems in automated cars. And we congratulate this year's SINET 16. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that there's no honor among thieves, or botnet herders, either. Reaper still seems quiet. Macro-less malware is a problem, Microsoft warns. Researchers show you can hack an airliner's avionics. The maritime shipping sector worries that Maerk's experience with NotPetya isn't just a one-off. Ether—the cryptocurrency—is disappearing into the aether (at least this once). Justin Harvey from Accenture on the importance of not failing the basics. Guest is David Barzilai from Karamba Security on the security of embedded systems in automated cars. And we congratulate this year's SINET 16. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1307</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f9fd18343fc0c22db00621fa19c5d5f7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4452019531.mp3?updated=1608753666" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fancy Bear's new moves. OceanLotus and Sowbug cyber espionage groups active. Notes from CyCon, and a look at industry news. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/472/notes</link>
      <description>In today's podcast we hear some industry news today, briefly, before we get to the cloak-and-keyboard stuff. Fancy Bear has some new dance steps. OceanLotus and Sowbug, threat actors, not plants or insects, as you might be forgiven for thinking, snoop on ASEAN and Latin America, respectively. Notes on international law and the future of cyberwar from CyCon. Joe Carrigan from JHU on the difficulties in reporting vulnerabilities. Robert Rodriguez from SINET on the trends he sees from the companies winning the SINET 16. And Appleby insists the Paradise Papers were not an inside job. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 08 Nov 2017 20:02:34 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>472</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9f917c3e-def8-11ea-911f-2f2addea5e85/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fancy Bear's new moves. OceanLotus and Sowbug cyber espionage groups active. Notes from CyCon, and a look at industry news. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear some industry news today, briefly, before we get to the cloak-and-keyboard stuff. Fancy Bear has some new dance steps. OceanLotus and Sowbug, threat actors, not plants or insects, as you might be forgiven for thinking, snoop on ASEAN and Latin America, respectively. Notes on international law and the future of cyberwar from CyCon. Joe Carrigan from JHU on the difficulties in reporting vulnerabilities. Robert Rodriguez from SINET on the trends he sees from the companies winning the SINET 16. And Appleby insists the Paradise Papers were not an inside job. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear some industry news today, briefly, before we get to the cloak-and-keyboard stuff. Fancy Bear has some new dance steps. OceanLotus and Sowbug, threat actors, not plants or insects, as you might be forgiven for thinking, snoop on ASEAN and Latin America, respectively. Notes on international law and the future of cyberwar from CyCon. Joe Carrigan from JHU on the difficulties in reporting vulnerabilities. Robert Rodriguez from SINET on the trends he sees from the companies winning the SINET 16. And Appleby insists the Paradise Papers were not an inside job. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1198</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b98ec304a6e26c54b0260036cad46752]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5884584550.mp3?updated=1689817732" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Stolen Paradise Papers aren't making people or companies look good. Off-year election security. Trollhunting. Notes on the future of cyber conflict from CyCon 2017. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/471/notes</link>
      <description>In today's podcast we hear more on the Paradise Papers, where the optics are looking more Inferno than Paradiso. Off-year elections in the US are on today amid general concerns about, well, somebody doing something to them. Trollhunting sometimes brings down the wrong targets. Notes on the future of cyber conflict from CyCon 2017. The Internet's co-inventor says it's time to hold coders accountable for buggy software. Emily Wilson from Terbium Labs with thoughts from a conference in the Netherlands. Wesley Simpson from (ISC)2 making the case that security is a people problem. And Facebook will keep your naughty selfies off the Internet. Really—just upload them to the right place. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Nov 2017 20:12:04 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>471</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9fa5da26-def8-11ea-911f-7351c81eaffc/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Stolen Paradise Papers aren't making people or companies look good. Off-year election security. Trollhunting. Notes on the future of cyber conflict from CyCon 2017. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear more on the Paradise Papers, where the optics are looking more Inferno than Paradiso. Off-year elections in the US are on today amid general concerns about, well, somebody doing something to them. Trollhunting sometimes brings down the wrong targets. Notes on the future of cyber conflict from CyCon 2017. The Internet's co-inventor says it's time to hold coders accountable for buggy software. Emily Wilson from Terbium Labs with thoughts from a conference in the Netherlands. Wesley Simpson from (ISC)2 making the case that security is a people problem. And Facebook will keep your naughty selfies off the Internet. Really—just upload them to the right place. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear more on the Paradise Papers, where the optics are looking more Inferno than Paradiso. Off-year elections in the US are on today amid general concerns about, well, somebody doing something to them. Trollhunting sometimes brings down the wrong targets. Notes on the future of cyber conflict from CyCon 2017. The Internet's co-inventor says it's time to hold coders accountable for buggy software. Emily Wilson from Terbium Labs with thoughts from a conference in the Netherlands. Wesley Simpson from (ISC)2 making the case that security is a people problem. And Facebook will keep your naughty selfies off the Internet. Really—just upload them to the right place. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1232</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[db6752330552e586551371261e1507c3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8588640530.mp3?updated=1689817720" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Paradise Papers, tax avoidance, and quiet investments. Kaspersky affair updates. Retaliation against influence operations? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/470/notes</link>
      <description>In today's podcast, we hear about the Paradise Papers, a trove of documents obtained from a Bermuda law firm thatcontain details not only about wealthy tax avoiders, but about investments as well. Kaspersky says that its antivirus software did, after all, copy files that weren't viruses. (But they were still bad files.) US Senate Majority Leader McConnell says tech companies should help the US retaliate against nation-states' cyberattacks. Dale Drew from CenturyLink with a call for introspection when considering cyber defenses. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 06 Nov 2017 20:32:49 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>470</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9fbf30d4-def8-11ea-911f-833e6a1d990b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The Paradise Papers, tax avoidance, and quiet investments. Kaspersky affair updates. Retaliation against influence operations? </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about the Paradise Papers, a trove of documents obtained from a Bermuda law firm thatcontain details not only about wealthy tax avoiders, but about investments as well. Kaspersky says that its antivirus software did, after all, copy files that weren't viruses. (But they were still bad files.) US Senate Majority Leader McConnell says tech companies should help the US retaliate against nation-states' cyberattacks. Dale Drew from CenturyLink with a call for introspection when considering cyber defenses. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about the Paradise Papers, a trove of documents obtained from a Bermuda law firm thatcontain details not only about wealthy tax avoiders, but about investments as well. Kaspersky says that its antivirus software did, after all, copy files that weren't viruses. (But they were still bad files.) US Senate Majority Leader McConnell says tech companies should help the US retaliate against nation-states' cyberattacks. Dale Drew from CenturyLink with a call for introspection when considering cyber defenses. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>865</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[863adc6780aab299fed1a4c8f294b6b5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1210530933.mp3?updated=1689817703" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exploring Phishing Kits with Duo Security's Jordan Wright. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/8/notes</link>
      <description>In this episode of the CyberWire’s Research Saturday we are joined by Jordan Wright, Senior Research and Development Engineer at Duo Security. He’s the author of the research report, “Phish in a Barrel,” which describes his work gathering and examining thousands of phishing kits from around the web.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 04 Nov 2017 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b161fac0-df0b-11ea-92cb-5796b18bc7d2/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Exploring Phishing Kits with Duo Security's Jordan Wright</itunes:subtitle>
      <itunes:summary>In this episode of the CyberWire’s Research Saturday we are joined by Jordan Wright, Senior Research and Development Engineer at Duo Security. He’s the author of the research report, “Phish in a Barrel,” which describes his work gathering and examining thousands of phishing kits from around the web.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this episode of the CyberWire’s Research Saturday we are joined by Jordan Wright, Senior Research and Development Engineer at Duo Security. He’s the author of the research report, “Phish in a Barrel,” which describes his work gathering and examining thousands of phishing kits from around the web.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1965</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fcab23ed0daad46b8ec27a7ed3c25ef5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5285741143.mp3?updated=1684864715" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BadRabbit misdirection? Fancy Bear's wish list. AWS misconfigurations. Data breach notes. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/469/notes</link>
      <description>In today's podcast, we hear that BadRabbit looks like misdirection. Fancy Bear's wish list is out, and it's very long, and very global. US prosecutors may be preparing to indict half-a-dozen Russian officials in the DNC hack. Malaysia continues to recover from a major series of data breaches. GhostWriter poses a man-in-the-middle threat to AWS users who misconfigure their accounts. And it was Halloween, but the ShadowBrokers weren't much in evidence. Perhaps they were unrecognizable in their Wonder Woman and Mighty Thor costumes? David DuFour from Webroot on recent ransomware trends.  Guests are Sherrie Caltagirone, founder and executive director of the Global Emancipation Network (GEN), and Andrew Lewman, SVP of DarkOwl. They are using the tools of cyber security to help stop human trafficking online. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 03 Nov 2017 17:21:38 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>469</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9fceb8c4-def8-11ea-911f-c3029c4a3ee7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>BadRabbit misdirection? Fancy Bear's wish list. AWS misconfigurations. Data breach notes. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that BadRabbit looks like misdirection. Fancy Bear's wish list is out, and it's very long, and very global. US prosecutors may be preparing to indict half-a-dozen Russian officials in the DNC hack. Malaysia continues to recover from a major series of data breaches. GhostWriter poses a man-in-the-middle threat to AWS users who misconfigure their accounts. And it was Halloween, but the ShadowBrokers weren't much in evidence. Perhaps they were unrecognizable in their Wonder Woman and Mighty Thor costumes? David DuFour from Webroot on recent ransomware trends.  Guests are Sherrie Caltagirone, founder and executive director of the Global Emancipation Network (GEN), and Andrew Lewman, SVP of DarkOwl. They are using the tools of cyber security to help stop human trafficking online. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that BadRabbit looks like misdirection. Fancy Bear's wish list is out, and it's very long, and very global. US prosecutors may be preparing to indict half-a-dozen Russian officials in the DNC hack. Malaysia continues to recover from a major series of data breaches. GhostWriter poses a man-in-the-middle threat to AWS users who misconfigure their accounts. And it was Halloween, but the ShadowBrokers weren't much in evidence. Perhaps they were unrecognizable in their Wonder Woman and Mighty Thor costumes? David DuFour from Webroot on recent ransomware trends. <br> Guests are Sherrie Caltagirone, founder and executive director of the Global Emancipation Network (GEN), and Andrew Lewman, SVP of DarkOwl. They are using the tools of cyber security to help stop human trafficking online. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1329</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[91885d9b3afd3b141e120cd98afec47d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3944408951.mp3?updated=1608753714" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Manhattan terror suspect claims allegiance to ISIS, but ISIS hasn't claimed him. Crimeware notes. Patching news. Crypto wars update. What the Senate learned about info ops. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/468/notes</link>
      <description>In today's podcast, we hear that, while the Manhattan truck-ramming terrorist claims ISIS, ISIS hasn't claimed him. Notes on conventional cybercrime, with some resurgent banking Trojans and mobile malware. Apple patches iOS against KRACK vulnerabilities. WordPress issues another fix for SQL injection bugs. US Deputy Attorney General Rosenstein takes up the pro-access banner in the crypto wars, but few from the tech sector are rallying to him. Senate hearings on Russian influence operations continue. Chris Poulin from BAH on augmenting human capabilities. Robert Knapp from CyberGhost on employers raising awareness of cyber security within their organizations.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 02 Nov 2017 18:06:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>468</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9fe2222e-def8-11ea-911f-2783a67cc92c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The Manhattan terror suspect claims allegiance to ISIS, but ISIS hasn't claimed him. Crimeware notes. Patching news. Crypto wars update. What the Senate learned about info ops. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that, while the Manhattan truck-ramming terrorist claims ISIS, ISIS hasn't claimed him. Notes on conventional cybercrime, with some resurgent banking Trojans and mobile malware. Apple patches iOS against KRACK vulnerabilities. WordPress issues another fix for SQL injection bugs. US Deputy Attorney General Rosenstein takes up the pro-access banner in the crypto wars, but few from the tech sector are rallying to him. Senate hearings on Russian influence operations continue. Chris Poulin from BAH on augmenting human capabilities. Robert Knapp from CyberGhost on employers raising awareness of cyber security within their organizations.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that, while the Manhattan truck-ramming terrorist claims ISIS, ISIS hasn't claimed him. Notes on conventional cybercrime, with some resurgent banking Trojans and mobile malware. Apple patches iOS against KRACK vulnerabilities. WordPress issues another fix for SQL injection bugs. US Deputy Attorney General Rosenstein takes up the pro-access banner in the crypto wars, but few from the tech sector are rallying to him. Senate hearings on Russian influence operations continue. Chris Poulin from BAH on augmenting human capabilities. Robert Knapp from CyberGhost on employers raising awareness of cyber security within their organizations.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1114</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[343e09cc532f05f1c7df9d6613e16007]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5849826811.mp3?updated=1689817639" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware old and ransomware new, but can you distinguish it from a wiper? Influence operations hearings on Capitol Hill. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/467/notes</link>
      <description>In today's podcast, we hear about ONI ansomware in Japan that may prove to be a wiper. Ukraine blames NotPetya operators Black Energy for BadRabbit. Pyongyang feels London is picking on it. Fishing Facebook in Nordic nations. Security firms sell certificate authority business. Twitter won't sell any more ads to RT or Sputnik. Johannes Ullrich from SANS Technology Institute and the ISC Stormcast podcast on honeypots. Russell Jones from Deloitte with the results from a recent medical security poll.During hearings on influence operations, Senators wonder why Facebook wasn't suspicious when people paid for their advertising in rubles. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 01 Nov 2017 20:08:11 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>467</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9ff9e3d2-def8-11ea-911f-9ff4e8773a35/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ransomware old and ransomware new, but can you distinguish it from a wiper? Influence operations hearings on Capitol Hill. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about ONI ansomware in Japan that may prove to be a wiper. Ukraine blames NotPetya operators Black Energy for BadRabbit. Pyongyang feels London is picking on it. Fishing Facebook in Nordic nations. Security firms sell certificate authority business. Twitter won't sell any more ads to RT or Sputnik. Johannes Ullrich from SANS Technology Institute and the ISC Stormcast podcast on honeypots. Russell Jones from Deloitte with the results from a recent medical security poll.During hearings on influence operations, Senators wonder why Facebook wasn't suspicious when people paid for their advertising in rubles. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about ONI ansomware in Japan that may prove to be a wiper. Ukraine blames NotPetya operators Black Energy for BadRabbit. Pyongyang feels London is picking on it. Fishing Facebook in Nordic nations. Security firms sell certificate authority business. Twitter won't sell any more ads to RT or Sputnik. Johannes Ullrich from SANS Technology Institute and the ISC Stormcast podcast on honeypots. Russell Jones from Deloitte with the results from a recent medical security poll.During hearings on influence operations, Senators wonder why Facebook wasn't suspicious when people paid for their advertising in rubles. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1147</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2ec778e239a7b843b1b079b3f3b01b06]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2322261154.mp3?updated=1689817529" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A BadRabbit and Reaper update. EU and cyberwar. DPRK denies WannaCry responsibility. China's cyber espionage shifts. Oracle emergency patch. Buganizer wide open. Influence ops. Heathrow security. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/466/notes</link>
      <description>In today's podcast, we hear about the state of BadRabbit and Reaper. The EU drafts a diplomatic framework for self-defense in cyberspace. Pyongyang denies UK attribution of WannaCry to North Korea. Threat intelligence types suspect the Sino-US cyber modus vivendi might not be the unqualified success it's been taken to be. Oracle issues an emergency patch. A researcher gets an unauthorized peek at Google's Buganizer. Congress will hear testimony about influence operations in Twitter, Google, and Facebook. Rick Howard from Palo Alto Networks warns that board members might be targets. And USB sticks contain the darndest things.
 Plus, the Malware Mash.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 31 Oct 2017 20:09:50 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>466</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a019d228-def8-11ea-911f-3ba09ed43559/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A BadRabbit and Reaper update. EU and cyberwar. DPRK denies WannaCry responsibility. China's cyber espionage shifts. Oracle emergency patch. Buganizer wide open. Influence ops. Heathrow security. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about the state of BadRabbit and Reaper. The EU drafts a diplomatic framework for self-defense in cyberspace. Pyongyang denies UK attribution of WannaCry to North Korea. Threat intelligence types suspect the Sino-US cyber modus vivendi might not be the unqualified success it's been taken to be. Oracle issues an emergency patch. A researcher gets an unauthorized peek at Google's Buganizer. Congress will hear testimony about influence operations in Twitter, Google, and Facebook. Rick Howard from Palo Alto Networks warns that board members might be targets. And USB sticks contain the darndest things.
 Plus, the Malware Mash.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about the state of BadRabbit and Reaper. The EU drafts a diplomatic framework for self-defense in cyberspace. Pyongyang denies UK attribution of WannaCry to North Korea. Threat intelligence types suspect the Sino-US cyber modus vivendi might not be the unqualified success it's been taken to be. Oracle issues an emergency patch. A researcher gets an unauthorized peek at Google's Buganizer. Congress will hear testimony about influence operations in Twitter, Google, and Facebook. Rick Howard from Palo Alto Networks warns that board members might be targets. And USB sticks contain the darndest things.</p> <p>Plus, the Malware Mash.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>859</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[67d03a08b74b3787311bad7dc2d66653]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9741518504.mp3?updated=1689817513" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Reaper looks like a criminal booter on the Chinese black market. BadRabbit shows some moves. Catch-All malicious Chrome extension. Android currency miners in Google Play. Indictments in Russia probe. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/465/notes</link>
      <description>In today's podcast, we hear that the Reaper botnet is still quiet, and looking like a booter-for-hire. BadRabbit shows some odd stealth, and some interesting strategic selectivity. A malicious Chrome extension steals everything you put on a website. Currency miners on phones seem to be the kind of crime that doesn't pay, but that's not stopping crooks from stuffing them into Google Play. First indictments in the US probe of Russian election influence operations are out.  Emily Wilson from Terbium Labs on third party breaches, what she describes as “Not your breach, still your problem.” And a class action suit is filed over the Equifax breach.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 We read Recorded Future’s free intel daily, you might find it valuable, too. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper. Interested in the latest research in cyber security? Cylance is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Learn more at cylance.com.
 Podcast sponsor 1-Recorded Future: http://goo.gl/wphZ1z Podcast sponsor 2- E8 Security: https://goo.gl/yBBx55 Friday sponsor- Cylance: https://goo.gl/fHR65L
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 30 Oct 2017 18:15:21 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>465</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a02ff486-def8-11ea-911f-d72b438330ea/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Reaper looks like a criminal booter on the Chinese black market. BadRabbit shows some moves. Catch-All malicious Chrome extension. Android currency miners in Google Play. Indictments in Russia probe. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the Reaper botnet is still quiet, and looking like a booter-for-hire. BadRabbit shows some odd stealth, and some interesting strategic selectivity. A malicious Chrome extension steals everything you put on a website. Currency miners on phones seem to be the kind of crime that doesn't pay, but that's not stopping crooks from stuffing them into Google Play. First indictments in the US probe of Russian election influence operations are out.  Emily Wilson from Terbium Labs on third party breaches, what she describes as “Not your breach, still your problem.” And a class action suit is filed over the Equifax breach.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 We read Recorded Future’s free intel daily, you might find it valuable, too. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper. Interested in the latest research in cyber security? Cylance is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Learn more at cylance.com.
 Podcast sponsor 1-Recorded Future: http://goo.gl/wphZ1z Podcast sponsor 2- E8 Security: https://goo.gl/yBBx55 Friday sponsor- Cylance: https://goo.gl/fHR65L
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the Reaper botnet is still quiet, and looking like a booter-for-hire. BadRabbit shows some odd stealth, and some interesting strategic selectivity. A malicious Chrome extension steals everything you put on a website. Currency miners on phones seem to be the kind of crime that doesn't pay, but that's not stopping crooks from stuffing them into Google Play. First indictments in the US probe of Russian election influence operations are out.  Emily Wilson from Terbium Labs on third party breaches, what she describes as “Not your breach, still your problem.” And a class action suit is filed over the Equifax breach.</p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>We read Recorded Future’s free intel daily, you might find it valuable, too. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper. Interested in the latest research in cyber security? Cylance is revolutionizing cybersecurity with products and services that proactively prevent, rather than reactively detect the execution of advanced persistent threats and malware. Learn more at cylance.com.</p> <p>Podcast sponsor 1-Recorded Future: http://goo.gl/wphZ1z<br> Podcast sponsor 2- E8 Security: https://goo.gl/yBBx55<br> Friday sponsor- Cylance: https://goo.gl/fHR65L</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>880</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c46f8a10a6b6af8b0719384d92456bb4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2236650451.mp3?updated=1689817501" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Tracking a Trojan: KHRAT. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/7/notes</link>
      <description>The moniker KHRAT came about because of the identification of a Remote Access Trojan (RAT) with command and control infrastructure found in Cambodia (KH). In the most recent episode of the CyberWire's Research Saturday, Ryan Olson, Director of Threat Intelligence at Palo Alto Networks, talks with us about the capabilities of KHRAT and shares details the feature set it provides to threat actors that use it.
https://researchcenter.paloaltonetworks.com/2017/08/unit42-updated-khrat-malware-used-in-cambodia-attacks/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 28 Oct 2017 15:06:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>7</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ac9cf8b4-df0b-11ea-a0a9-0328967a8708/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Tracking a Trojan: KHRAT</itunes:subtitle>
      <itunes:summary>The moniker KHRAT came about because of the identification of a Remote Access Trojan (RAT) with command and control infrastructure found in Cambodia (KH). In the most recent episode of the CyberWire's Research Saturday, Ryan Olson, Director of Threat Intelligence at Palo Alto Networks, talks with us about the capabilities of KHRAT and shares details the feature set it provides to threat actors that use it.
https://researchcenter.paloaltonetworks.com/2017/08/unit42-updated-khrat-malware-used-in-cambodia-attacks/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The moniker KHRAT came about because of the identification of a Remote Access Trojan (RAT) with command and control infrastructure found in Cambodia (KH). In the most recent episode of the CyberWire's Research Saturday, Ryan Olson, Director of Threat Intelligence at Palo Alto Networks, talks with us about the capabilities of KHRAT and shares details the feature set it provides to threat actors that use it.</p><p>https://researchcenter.paloaltonetworks.com/2017/08/unit42-updated-khrat-malware-used-in-cambodia-attacks/</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1199</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6513aad7a950bcf890c0b0c20840cc17]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6472965266.mp3?updated=1684864696" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BadRabbit ransomware and Reaper botnet updates. SATCOM bugs. ICS cybersecurity notes. Moscow's free commercial speech piety. Anonymous is back. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/464/notes</link>
      <description>In today's podcast, we hear that BadRabbit, still quiet, looks like a TeleBots product. Reaper is still locked and loaded, but is also still quiet. Maritime SATCOM system found to be buggy, and the worse news is that it's beyond its end-of-life. A look back at the annual ICS Cybersecurity Summit that wrapped yesterday in Atlanta. Moscow tells Twitter buying ads is a free speech issue. Justin Harvey from Accenture on monitoring cloud infrastructure. Guest is Michael Sulmeyer, Director of the Cyber Security Project at the Harvard Kennedy School’s Belfer Center for Science and International Affairs. Anonymous is back and poking at the Spanish government. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 27 Oct 2017 20:49:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>464</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a0482330-def8-11ea-911f-4bb943d7af4a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>BadRabbit ransomware and Reaper botnet updates. SATCOM bugs. ICS cybersecurity notes. Moscow's free commercial speech piety. Anonymous is back. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that BadRabbit, still quiet, looks like a TeleBots product. Reaper is still locked and loaded, but is also still quiet. Maritime SATCOM system found to be buggy, and the worse news is that it's beyond its end-of-life. A look back at the annual ICS Cybersecurity Summit that wrapped yesterday in Atlanta. Moscow tells Twitter buying ads is a free speech issue. Justin Harvey from Accenture on monitoring cloud infrastructure. Guest is Michael Sulmeyer, Director of the Cyber Security Project at the Harvard Kennedy School’s Belfer Center for Science and International Affairs. Anonymous is back and poking at the Spanish government. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that BadRabbit, still quiet, looks like a TeleBots product. Reaper is still locked and loaded, but is also still quiet. Maritime SATCOM system found to be buggy, and the worse news is that it's beyond its end-of-life. A look back at the annual ICS Cybersecurity Summit that wrapped yesterday in Atlanta. Moscow tells Twitter buying ads is a free speech issue. Justin Harvey from Accenture on monitoring cloud infrastructure. Guest is Michael Sulmeyer, Director of the Cyber Security Project at the Harvard Kennedy School’s Belfer Center for Science and International Affairs. Anonymous is back and poking at the Spanish government. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1367</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b2d5cedbce22323b2daa54cb010179c4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8344994811.mp3?updated=1689817491" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dogs that haven't barked. Surveillance authority reauthorization advances in the US Senate. Notes on ICS cybersecurity. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/463/notes</link>
      <description>In today's podcast, we hear that there's still no sign of the Reaper botnet doing anything. An update on BadRabbit—which for some reason seems to have hopped quietly away from its infrastructure. Other forms of more conventional ransomware, however, remain in circulation, in the wild. It looks as if Kaspersky software might have stumbled across NSA files after all. The US Senate Intelligence Committee has voted to reauthorize Section 702 surveillance authorities through the end of 2025. Ben Yelin from UMD CHHS on states' funding challenges when trying to sure up the security of their voting systems. Bob Ackerman and Dave DeWalt from AllegisCyber, on the occasion of their business announcements, discussing the investment climate for cyber security. And we have notes on ICS from Atlanta. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 26 Oct 2017 20:05:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>463</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a06040d2-def8-11ea-911f-2712080cc4b4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dogs that haven't barked. Surveillance authority reauthorization advances in the US Senate. Notes on ICS cybersecurity. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that there's still no sign of the Reaper botnet doing anything. An update on BadRabbit—which for some reason seems to have hopped quietly away from its infrastructure. Other forms of more conventional ransomware, however, remain in circulation, in the wild. It looks as if Kaspersky software might have stumbled across NSA files after all. The US Senate Intelligence Committee has voted to reauthorize Section 702 surveillance authorities through the end of 2025. Ben Yelin from UMD CHHS on states' funding challenges when trying to sure up the security of their voting systems. Bob Ackerman and Dave DeWalt from AllegisCyber, on the occasion of their business announcements, discussing the investment climate for cyber security. And we have notes on ICS from Atlanta. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that there's still no sign of the Reaper botnet doing anything. An update on BadRabbit—which for some reason seems to have hopped quietly away from its infrastructure. Other forms of more conventional ransomware, however, remain in circulation, in the wild. It looks as if Kaspersky software might have stumbled across NSA files after all. The US Senate Intelligence Committee has voted to reauthorize Section 702 surveillance authorities through the end of 2025. Ben Yelin from UMD CHHS on states' funding challenges when trying to sure up the security of their voting systems. Bob Ackerman and Dave DeWalt from AllegisCyber, on the occasion of their business announcements, discussing the investment climate for cyber security. And we have notes on ICS from Atlanta. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1174</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a5671c4e42366651e29a50e460a07d00]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8237741839.mp3?updated=1689817476" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>BadRabbit hopping though Eastern and Central Europe, and Southwest Asia. DUHK risks. Kaspersky on how a laptop was backdoored. Notes from Atlanta's ICS Cybersecurity Conference. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/462/notes</link>
      <description>In today's podcast, we hear about BadRabbit, a new strain of ransomware that's hopped out of Petya's hutch. The Lazarus Group is said to have taken control of some servers in India. DUHK [duck] warnings. Are industrial control system operators paying sufficient attention to Level 1 and Level 0 threats? Next May will see not only GDPR, but also NIS. Joe Carrigan from JHU reviews a list of security tips suggested by IBM. Guest is Scott Kaine, CEO of Delta Risk on cloud migration security issues.And Kapersky continues to protest its innocence of spying, and offers an explanation of what really happened with NSA leaks. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 25 Oct 2017 19:41:25 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>462</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a07e7638-def8-11ea-911f-67ea2a769320/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>BadRabbit hopping though Eastern and Central Europe, and Southwest Asia. DUHK risks. Kaspersky on how a laptop was backdoored. Notes from Atlanta's ICS Cybersecurity Conference. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about BadRabbit, a new strain of ransomware that's hopped out of Petya's hutch. The Lazarus Group is said to have taken control of some servers in India. DUHK [duck] warnings. Are industrial control system operators paying sufficient attention to Level 1 and Level 0 threats? Next May will see not only GDPR, but also NIS. Joe Carrigan from JHU reviews a list of security tips suggested by IBM. Guest is Scott Kaine, CEO of Delta Risk on cloud migration security issues.And Kapersky continues to protest its innocence of spying, and offers an explanation of what really happened with NSA leaks. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about BadRabbit, a new strain of ransomware that's hopped out of Petya's hutch. The Lazarus Group is said to have taken control of some servers in India. DUHK [duck] warnings. Are industrial control system operators paying sufficient attention to Level 1 and Level 0 threats? Next May will see not only GDPR, but also NIS. Joe Carrigan from JHU reviews a list of security tips suggested by IBM. Guest is Scott Kaine, CEO of Delta Risk on cloud migration security issues.And Kapersky continues to protest its innocence of spying, and offers an explanation of what really happened with NSA leaks. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1167</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[75a771b02044c265dd38b240e9e0661f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7404901712.mp3?updated=1689817463" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Reaper botnet update, Election hacking in Kenya, Czech Republic. M&amp;A notes. APT28's phishing. Kaspersky's offer of code review. FBI shots in the crypto wars. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/461/notes</link>
      <description>In today's podcast, we learn that Hurricane Reaper, the big IoT botnet, remains a digital tropical depression, but plenty of people are warning everyone to stock up on the cyber equivalents of flashlight batteries and bottled water. Czech parliament sites hacked in apparent election-related mischief. Kenya's contentious re-vote approaches. APT28 gets a Bronx cheer for lame CyCon phishing, but don't get cocky, kid. KnowBe4 and Cisco announce acquisitions. Kaspersky seeks to undo reputational damage inflicted by US Government ban. The FBI re-engages in the crypto wars. David DuFour from Webroot on phishing trends. Phil Neray from CyberX reviewing their Global ICS &amp; IIoT Risk Report. If you had a nose job at London Bridge Plastic Surgery, someone's got your before and after pix. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Oct 2017 18:31:53 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>461</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a0a2e702-def8-11ea-911f-7b74e25072f4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Reaper botnet update, Election hacking in Kenya, Czech Republic. M&amp;A notes. APT28's phishing. Kaspersky's offer of code review. FBI shots in the crypto wars. </itunes:subtitle>
      <itunes:summary>In today's podcast, we learn that Hurricane Reaper, the big IoT botnet, remains a digital tropical depression, but plenty of people are warning everyone to stock up on the cyber equivalents of flashlight batteries and bottled water. Czech parliament sites hacked in apparent election-related mischief. Kenya's contentious re-vote approaches. APT28 gets a Bronx cheer for lame CyCon phishing, but don't get cocky, kid. KnowBe4 and Cisco announce acquisitions. Kaspersky seeks to undo reputational damage inflicted by US Government ban. The FBI re-engages in the crypto wars. David DuFour from Webroot on phishing trends. Phil Neray from CyberX reviewing their Global ICS &amp; IIoT Risk Report. If you had a nose job at London Bridge Plastic Surgery, someone's got your before and after pix. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we learn that Hurricane Reaper, the big IoT botnet, remains a digital tropical depression, but plenty of people are warning everyone to stock up on the cyber equivalents of flashlight batteries and bottled water. Czech parliament sites hacked in apparent election-related mischief. Kenya's contentious re-vote approaches. APT28 gets a Bronx cheer for lame CyCon phishing, but don't get cocky, kid. KnowBe4 and Cisco announce acquisitions. Kaspersky seeks to undo reputational damage inflicted by US Government ban. The FBI re-engages in the crypto wars. David DuFour from Webroot on phishing trends. Phil Neray from CyberX reviewing their Global ICS &amp; IIoT Risk Report. If you had a nose job at London Bridge Plastic Surgery, someone's got your before and after pix. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1192</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d42a0a612590ecc8b53c72e24368a430]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3124062431.mp3?updated=1689817451" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Reaper botnet looming, but not yet landed. CyCon phishing. How to troll for influence. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/460/notes</link>
      <description>In today's podcast, we share some notes on active malware campaigns, and a warning to be on the lookout for the Reaper botnet, which hasn't yet realized its disruptive potential. Kaspersky opens its source code to independent review, to show it's got nothing to hide. Fancy Bear is phishing for you if you plan to attend CyCon. The difficulty of recognizing trolls, and the dangers of innocent posts getting badly lost in translation. A quick note about the ICS Security Conference. Dale Drew from Level 3 Communications on managing the security of the supply chain. And looking for lulz in all the wrong places. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 23 Oct 2017 19:02:16 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>460</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a0bfaf36-def8-11ea-911f-9f0bcb741981/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Reaper botnet looming, but not yet landed. CyCon phishing. How to troll for influence. </itunes:subtitle>
      <itunes:summary>In today's podcast, we share some notes on active malware campaigns, and a warning to be on the lookout for the Reaper botnet, which hasn't yet realized its disruptive potential. Kaspersky opens its source code to independent review, to show it's got nothing to hide. Fancy Bear is phishing for you if you plan to attend CyCon. The difficulty of recognizing trolls, and the dangers of innocent posts getting badly lost in translation. A quick note about the ICS Security Conference. Dale Drew from Level 3 Communications on managing the security of the supply chain. And looking for lulz in all the wrong places. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we share some notes on active malware campaigns, and a warning to be on the lookout for the Reaper botnet, which hasn't yet realized its disruptive potential. Kaspersky opens its source code to independent review, to show it's got nothing to hide. Fancy Bear is phishing for you if you plan to attend CyCon. The difficulty of recognizing trolls, and the dangers of innocent posts getting badly lost in translation. A quick note about the ICS Security Conference. Dale Drew from Level 3 Communications on managing the security of the supply chain. And looking for lulz in all the wrong places. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>955</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ef2cffd9d5c23e9b7c935a7e964d1b20]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4256133343.mp3?updated=1689817438" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>WireX BotNet with Justin Paine from Cloudflare. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/6/notes</link>
      <description>In August 2017, multiple Content Delivery Networks (CDNs) and content providers were subject to significant attacks from a botnet dubbed WireX. (The botnet is named for an anagram for one of the delimiter strings in its command and control protocol.) The WireX botnet is primarily made up of Android devices running malicious applications and is designed to create DDoS traffic. The botnet is sometimes associated with ransom notes to targets.
Justin Paine is Head of Trust and Safety at Cloudflare, and he joins us to share the WireX story. 
https://blog.cloudflare.com/the-wirex-botnet/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 21 Oct 2017 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>6</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a7cdee1a-df0b-11ea-87e7-c755d4a72032/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>WireX BotNet with Justin Paine from Cloudflare</itunes:subtitle>
      <itunes:summary>In August 2017, multiple Content Delivery Networks (CDNs) and content providers were subject to significant attacks from a botnet dubbed WireX. (The botnet is named for an anagram for one of the delimiter strings in its command and control protocol.) The WireX botnet is primarily made up of Android devices running malicious applications and is designed to create DDoS traffic. The botnet is sometimes associated with ransom notes to targets.
Justin Paine is Head of Trust and Safety at Cloudflare, and he joins us to share the WireX story. 
https://blog.cloudflare.com/the-wirex-botnet/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In August 2017, multiple Content Delivery Networks (CDNs) and content providers were subject to significant attacks from a botnet dubbed WireX. (The botnet is named for an anagram for one of the delimiter strings in its command and control protocol.) The WireX botnet is primarily made up of Android devices running malicious applications and is designed to create DDoS traffic. The botnet is sometimes associated with ransom notes to targets.</p><p>Justin Paine is Head of Trust and Safety at Cloudflare, and he joins us to share the WireX story. </p><p>https://blog.cloudflare.com/the-wirex-botnet/</p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1577</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ef06defb10e3b452f3daed9762d5a576]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4291280039.mp3?updated=1684864684" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>IoT DDoS hurricane forming? Sofacy exploits patched Flash bug. NotPetya continues to impose costs. Snooping with mobile app ads. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/459/notes</link>
      <description>In today's podcast we hear that an IoT botnet hurricane may be forming among IP cameras. (IP cameras are to DDoS what the West African coast is to Atlantic tropical depressions.) Sofacy rushes to exploit a patched Flash bug in a use-it-or-lose-it espionage race. Want to spy on someone? Go buy an ad. Cisco patches the wi-fi KRACK. NotPetya's still costing manufacturers and their insurers a lot of money. MalwareTech, a.k.a. Emily Wilson from Terbium Labs responding to post-Equifax breach credit agency claims that they can scan the Dark Web. Michael Sutton, CISO at Zscaler on zero-day hoarding. Marcus Hutchins, gets to take off that GPS and stay out late, since the judge decided his pre-trial behavior has been pretty good.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 20 Oct 2017 18:18:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>459</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a0d98172-def8-11ea-911f-2f63ef7d8b09/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>IoT DDoS hurricane forming? Sofacy exploits patched Flash bug. NotPetya continues to impose costs. Snooping with mobile app ads. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that an IoT botnet hurricane may be forming among IP cameras. (IP cameras are to DDoS what the West African coast is to Atlantic tropical depressions.) Sofacy rushes to exploit a patched Flash bug in a use-it-or-lose-it espionage race. Want to spy on someone? Go buy an ad. Cisco patches the wi-fi KRACK. NotPetya's still costing manufacturers and their insurers a lot of money. MalwareTech, a.k.a. Emily Wilson from Terbium Labs responding to post-Equifax breach credit agency claims that they can scan the Dark Web. Michael Sutton, CISO at Zscaler on zero-day hoarding. Marcus Hutchins, gets to take off that GPS and stay out late, since the judge decided his pre-trial behavior has been pretty good.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that an IoT botnet hurricane may be forming among IP cameras. (IP cameras are to DDoS what the West African coast is to Atlantic tropical depressions.) Sofacy rushes to exploit a patched Flash bug in a use-it-or-lose-it espionage race. Want to spy on someone? Go buy an ad. Cisco patches the wi-fi KRACK. NotPetya's still costing manufacturers and their insurers a lot of money. MalwareTech, a.k.a. Emily Wilson from Terbium Labs responding to post-Equifax breach credit agency claims that they can scan the Dark Web. Michael Sutton, CISO at Zscaler on zero-day hoarding. Marcus Hutchins, gets to take off that GPS and stay out late, since the judge decided his pre-trial behavior has been pretty good.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1402</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6bbbf7d1ceae0fee0914c948c84b9e4b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6498607162.mp3?updated=1608753623" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Leviathan group exploits patched .NET flaw. North Korean cyber ops. Russian suspicions. Cutlet Maker ATM malware, Sockbot Minecraft malware. Ransomware and backups. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/458/notes</link>
      <description>In today's podcast, we hear about how a cyber espionage campaign exploits a recently patched .NET vulnerability as Leviathan phishes with torpedo recovery programs. What does Pyongyang want in cyberspace? Apparently a lot of the same things it wants in physical space. Some observers think Putin thinks the Americans started that whole destabilization and delegitimation influence ops struggle. He's probably wrong, but there you go. Cutlet Maker malware jackpots ATMs. BoundHook stealth tool demonstrated. Minecraft malware got into Google Play. Ben Yelin from UMD CHHS with a follow up on President Trump’s executive orders. Guest is Dinah Davis from Code.Likeagirl.io with an update on their activities. Ransomware's still a threat, and a New York judge thinks the NYPD didn't get the memo about the importance of backup.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 We read Recorded Future’s free intel daily, and we think you'll find it valuable, too.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Interested in the latest research in cyber security? Our new Research Saturday podcast highlights research being done in industry, universities, and governments. Hear from people who are discovering threats, uncovering vulnerabilities, and devising the security measures to keep cyberspace as safe as it can be. Check it out.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 19 Oct 2017 18:51:33 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>458</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a1050144-def8-11ea-911f-4793e084eef8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Leviathan group exploits patched .NET flaw. North Korean cyber ops. Russian suspicions. Cutlet Maker ATM malware, Sockbot Minecraft malware. Ransomware and backups. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how a cyber espionage campaign exploits a recently patched .NET vulnerability as Leviathan phishes with torpedo recovery programs. What does Pyongyang want in cyberspace? Apparently a lot of the same things it wants in physical space. Some observers think Putin thinks the Americans started that whole destabilization and delegitimation influence ops struggle. He's probably wrong, but there you go. Cutlet Maker malware jackpots ATMs. BoundHook stealth tool demonstrated. Minecraft malware got into Google Play. Ben Yelin from UMD CHHS with a follow up on President Trump’s executive orders. Guest is Dinah Davis from Code.Likeagirl.io with an update on their activities. Ransomware's still a threat, and a New York judge thinks the NYPD didn't get the memo about the importance of backup.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 We read Recorded Future’s free intel daily, and we think you'll find it valuable, too.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Interested in the latest research in cyber security? Our new Research Saturday podcast highlights research being done in industry, universities, and governments. Hear from people who are discovering threats, uncovering vulnerabilities, and devising the security measures to keep cyberspace as safe as it can be. Check it out.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how a cyber espionage campaign exploits a recently patched .NET vulnerability as Leviathan phishes with torpedo recovery programs. What does Pyongyang want in cyberspace? Apparently a lot of the same things it wants in physical space. Some observers think Putin thinks the Americans started that whole destabilization and delegitimation influence ops struggle. He's probably wrong, but there you go. Cutlet Maker malware jackpots ATMs. BoundHook stealth tool demonstrated. Minecraft malware got into Google Play. Ben Yelin from UMD CHHS with a follow up on President Trump’s executive orders. Guest is Dinah Davis from Code.Likeagirl.io with an update on their activities. Ransomware's still a threat, and a New York judge thinks the NYPD didn't get the memo about the importance of backup.</p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>We read <a href="http://goo.gl/wphZ1z">Recorded Future’s free intel daily</a>, and we think you'll find it valuable, too.</p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/yBBx55">check out E8’s white paper</a>.</p> <p>Interested in the latest research in cyber security? Our new Research Saturday podcast highlights research being done in industry, universities, and governments. Hear from people who are discovering threats, uncovering vulnerabilities, and devising the security measures to keep cyberspace as safe as it can be. <a href="https://goo.gl/Nf1Tc3">Check it out.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1005</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cb32381e29924af970d2be51b788844f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8355616539.mp3?updated=1689817407" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DPRK returns to bank robbery. Ransomware updates. Patches from Oracle, Lenovo, BlackBerry. Criminal coin miners. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/457/notes</link>
      <description>In today's podcast we hear that the Lazarus Group is back at it with SWIFT. Maniber ransomware hits South Korea. Researchers cast the first KRACK-related stone at IEEE. Oracle, BlackBerry, and Lenovo patch. A study finds criminals turning to cryptominers. Awais Rashid from Lancaster University on securing critical infrastructure. Aaron Higbee, CTO of PhishMe, on the human factors in phishing. And one cryptominer seems to be tugging on Superman's cape—OPSEC isn't their strong suit, to say the least.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 We read Recorded Future’s free intel daily, and we think you'll find it valuable, too.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Interested in the latest research in cyber security? Our new Research Saturday podcast highlights research being done in industry, universities, and governments. Hear from people who are discovering threats, uncovering vulnerabilities, and devising the security measures to keep cyberspace as safe as it can be. Check it out.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 18 Oct 2017 19:29:27 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>457</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a11d6ea0-def8-11ea-911f-874ec965d250/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>DPRK returns to bank robbery. Ransomware updates. Patches from Oracle, Lenovo, BlackBerry. Criminal coin miners. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that the Lazarus Group is back at it with SWIFT. Maniber ransomware hits South Korea. Researchers cast the first KRACK-related stone at IEEE. Oracle, BlackBerry, and Lenovo patch. A study finds criminals turning to cryptominers. Awais Rashid from Lancaster University on securing critical infrastructure. Aaron Higbee, CTO of PhishMe, on the human factors in phishing. And one cryptominer seems to be tugging on Superman's cape—OPSEC isn't their strong suit, to say the least.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 We read Recorded Future’s free intel daily, and we think you'll find it valuable, too.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Interested in the latest research in cyber security? Our new Research Saturday podcast highlights research being done in industry, universities, and governments. Hear from people who are discovering threats, uncovering vulnerabilities, and devising the security measures to keep cyberspace as safe as it can be. Check it out.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that the Lazarus Group is back at it with SWIFT. Maniber ransomware hits South Korea. Researchers cast the first KRACK-related stone at IEEE. Oracle, BlackBerry, and Lenovo patch. A study finds criminals turning to cryptominers. Awais Rashid from Lancaster University on securing critical infrastructure. Aaron Higbee, CTO of PhishMe, on the human factors in phishing. And one cryptominer seems to be tugging on Superman's cape—OPSEC isn't their strong suit, to say the least.</p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>We read <a href="http://goo.gl/wphZ1z">Recorded Future’s free intel daily</a>, and we think you'll find it valuable, too.</p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/yBBx55">check out E8’s white paper</a>.</p> <p>Interested in the latest research in cyber security? Our new Research Saturday podcast highlights research being done in industry, universities, and governments. Hear from people who are discovering threats, uncovering vulnerabilities, and devising the security measures to keep cyberspace as safe as it can be. <a href="https://goo.gl/Nf1Tc3">Check it out.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1080</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ff7f0705ffb8a94af21a4de1242435b2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1799680267.mp3?updated=1689817393" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Panama Papers assassination? Black Oasis exploits Flash Player. DPRK hacked TV show. Patching KRACK and ROCA. WikiLeaks prepping something? DHS BOD 18-01. SCOTUS to rule on data warrants. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/456/notes</link>
      <description>In today's podcast, we hear about the assassination of a reporter who covered the Panama Papers. The Black Oasis threat group is found distributing FinFisher by exploitation of a bug in Flash Player. North Korean hacking is said to have been responsible for cancellation of a projected television show. Infineon patches a firmware flaw that could be exploited in a Coppersmith's attack. Vendors work to close the KRACK in their wi-fi products. WikiLeaks appears to be preparing for a large dump. The US Department of Homeland Security mandates improved email and website security across the Federal Government. David DuFour from Webroot discussing Bluetooth vulnerabilities. Neil Murray from Mimecast on cyber resilience. The US Supreme Court will review a significant cloud data decision.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 We read Recorded Future’s free intel daily, and we think you'll find it valuable, too.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Interested in the latest research in cyber security? Our new Research Saturday podcast highlights research being done in industry, universities, and governments. Hear from people who are discovering threats, uncovering vulnerabilities, and devising the security measures to keep cyberspace as safe as it can be. Check it out.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Oct 2017 19:10:42 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>456</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a146403c-def8-11ea-911f-c700148f82f2/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Panama Papers assassination? Black Oasis exploits Flash Player. DPRK hacked TV show. Patching KRACK and ROCA. WikiLeaks prepping something? DHS BOD 18-01. SCOTUS to rule on data warrants. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about the assassination of a reporter who covered the Panama Papers. The Black Oasis threat group is found distributing FinFisher by exploitation of a bug in Flash Player. North Korean hacking is said to have been responsible for cancellation of a projected television show. Infineon patches a firmware flaw that could be exploited in a Coppersmith's attack. Vendors work to close the KRACK in their wi-fi products. WikiLeaks appears to be preparing for a large dump. The US Department of Homeland Security mandates improved email and website security across the Federal Government. David DuFour from Webroot discussing Bluetooth vulnerabilities. Neil Murray from Mimecast on cyber resilience. The US Supreme Court will review a significant cloud data decision.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 We read Recorded Future’s free intel daily, and we think you'll find it valuable, too.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Interested in the latest research in cyber security? Our new Research Saturday podcast highlights research being done in industry, universities, and governments. Hear from people who are discovering threats, uncovering vulnerabilities, and devising the security measures to keep cyberspace as safe as it can be. Check it out.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about the assassination of a reporter who covered the Panama Papers. The Black Oasis threat group is found distributing FinFisher by exploitation of a bug in Flash Player. North Korean hacking is said to have been responsible for cancellation of a projected television show. Infineon patches a firmware flaw that could be exploited in a Coppersmith's attack. Vendors work to close the KRACK in their wi-fi products. WikiLeaks appears to be preparing for a large dump. The US Department of Homeland Security mandates improved email and website security across the Federal Government. David DuFour from Webroot discussing Bluetooth vulnerabilities. Neil Murray from Mimecast on cyber resilience. The US Supreme Court will review a significant cloud data decision.</p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>We read <a href="http://goo.gl/wphZ1z">Recorded Future’s free intel daily</a>, and we think you'll find it valuable, too.</p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/yBBx55">check out E8’s white paper</a>.</p> <p>Interested in the latest research in cyber security? Our new Research Saturday podcast highlights research being done in industry, universities, and governments. Hear from people who are discovering threats, uncovering vulnerabilities, and devising the security measures to keep cyberspace as safe as it can be. <a href="https://goo.gl/Nf1Tc3">Check it out.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1143</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[058e66cdceda485895ebff481debdaee]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7880732957.mp3?updated=1689817390" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>KRACK attacks. Iran's growing capability in cyberspace. Swedish and Polish targets probed by state-directed cyber ops. QR code security issues. Russia to introduce official cryptocurrency. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/455/notes</link>
      <description>In today's podcast, we hear about how KRACK attacks get past secure wi-fi protocols. Probes and distributed denial-of-service incidents in Poland and Sweden have the look of state operations. East Asian threat actors moving on from cyber espionage to supply chain attacks. Iran blamed for June's hack of UK Parliamentary email. QR codes may pose security issues. Do FSB social media trolls really train against US targets by watching House of Cards? Johannes Ullrich from SANS Technology Institute and the ISC Stormcast podcast on scammers taking advantage of disaster. And can the CryptoRuble really complete with VopperCoin? Investors want to know.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 We read Recorded Future’s free intel daily, and we think you'll find it valuable, too.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Interested in the latest research in cyber security? Our new Research Saturday podcast highlights research being done in industry, universities, and governments. Hear from people who are discovering threats, uncovering vulnerabilities, and devising the security measures to keep cyberspace as safe as it can be. Check it out.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 16 Oct 2017 19:14:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>455</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a161b6d2-def8-11ea-911f-d70db33808cf/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>KRACK attacks. Iran's growing capability in cyberspace. Swedish and Polish targets probed by state-directed cyber ops. QR code security issues. Russia to introduce official cryptocurrency. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how KRACK attacks get past secure wi-fi protocols. Probes and distributed denial-of-service incidents in Poland and Sweden have the look of state operations. East Asian threat actors moving on from cyber espionage to supply chain attacks. Iran blamed for June's hack of UK Parliamentary email. QR codes may pose security issues. Do FSB social media trolls really train against US targets by watching House of Cards? Johannes Ullrich from SANS Technology Institute and the ISC Stormcast podcast on scammers taking advantage of disaster. And can the CryptoRuble really complete with VopperCoin? Investors want to know.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 We read Recorded Future’s free intel daily, and we think you'll find it valuable, too.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Interested in the latest research in cyber security? Our new Research Saturday podcast highlights research being done in industry, universities, and governments. Hear from people who are discovering threats, uncovering vulnerabilities, and devising the security measures to keep cyberspace as safe as it can be. Check it out.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how KRACK attacks get past secure wi-fi protocols. Probes and distributed denial-of-service incidents in Poland and Sweden have the look of state operations. East Asian threat actors moving on from cyber espionage to supply chain attacks. Iran blamed for June's hack of UK Parliamentary email. QR codes may pose security issues. Do FSB social media trolls really train against US targets by watching House of Cards? Johannes Ullrich from SANS Technology Institute and the ISC Stormcast podcast on scammers taking advantage of disaster. And can the CryptoRuble really complete with VopperCoin? Investors want to know.</p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>We read <a href="http://goo.gl/wphZ1z">Recorded Future’s free intel daily</a>, and we think you'll find it valuable, too.</p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/yBBx55">check out E8’s white paper</a>.</p> <p>Interested in the latest research in cyber security? Our new Research Saturday podcast highlights research being done in industry, universities, and governments. Hear from people who are discovering threats, uncovering vulnerabilities, and devising the security measures to keep cyberspace as safe as it can be. <a href="https://goo.gl/Nf1Tc3">Check it out.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>967</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[afb0fc2e6b1527597d56bb903accc167]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9631110434.mp3?updated=1689817370" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Synthesized DNA Malware with Peter Ney. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/5/notes</link>
      <description>Peter Ney is a PhD candidate in the Allen School of Computer Science and Engineering at the University of Washington where he is advised by Professor Tadayoshi Kohno. His current research is focused on understanding computer security risks in emerging technologies like DNA synthesis and sequencing and the new threats posed by maliciously crafted, synthetic DNA. He and his team found that security of DNA processing programs is poor and show with a proof-of-concept that it is possible to attack computer systems with adversarial synthetic DNA.

 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 14 Oct 2017 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>5</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a44519e4-df0b-11ea-802a-cb2dab753812/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Synthesized DNA Malware with Peter Ney</itunes:subtitle>
      <itunes:summary>Peter Ney is a PhD candidate in the Allen School of Computer Science and Engineering at the University of Washington where he is advised by Professor Tadayoshi Kohno. His current research is focused on understanding computer security risks in emerging technologies like DNA synthesis and sequencing and the new threats posed by maliciously crafted, synthetic DNA. He and his team found that security of DNA processing programs is poor and show with a proof-of-concept that it is possible to attack computer systems with adversarial synthetic DNA.

 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Peter Ney is a PhD candidate in the Allen School of Computer Science and Engineering at the University of Washington where he is advised by Professor Tadayoshi Kohno. His current research is focused on understanding computer security risks in emerging technologies like DNA synthesis and sequencing and the new threats posed by maliciously crafted, synthetic DNA. He and his team found that security of DNA processing programs is poor and show with a proof-of-concept that it is possible to attack computer systems with adversarial synthetic DNA.</p><p><br></p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1404</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2760d889168d4cc1ab8f70cf7e4a1721]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7996342719.mp3?updated=1684864670" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Germany's BSI sees no problem in Kasperky software. Equifax, TransUnion, suffer from third-party malvertizing code. ISIS expected to change its inspiration. Notes on the dark web. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/454/notes</link>
      <description>In today's podcast, we hear that German authorities say they see nothing bad up with Kaspersky software, but they're in the Western minority on this one. ISIS messaging looks as if it's shifting toward a hejira narrative. Hyatt discloses a significant credit card breach. Equifax and its competitor TransUnion both remove third-party malvertizing code from their websites. Malek Ben Salem from Accenture Labs with a new vulnerability in software defined networks. Guest is Jeff Schilling, CSO of Armor Cloud Security with insights on Russian state actors. And the dark web is in many ways a lot like the regular web, down to seasonal sales, customer reviews, and cat pictures. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 13 Oct 2017 15:32:02 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>454</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a1912ae8-def8-11ea-911f-ef9d84c5ce4c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Germany's BSI sees no problem in Kasperky software. Equifax, TransUnion, suffer from third-party malvertizing code. ISIS expected to change its inspiration. Notes on the dark web. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that German authorities say they see nothing bad up with Kaspersky software, but they're in the Western minority on this one. ISIS messaging looks as if it's shifting toward a hejira narrative. Hyatt discloses a significant credit card breach. Equifax and its competitor TransUnion both remove third-party malvertizing code from their websites. Malek Ben Salem from Accenture Labs with a new vulnerability in software defined networks. Guest is Jeff Schilling, CSO of Armor Cloud Security with insights on Russian state actors. And the dark web is in many ways a lot like the regular web, down to seasonal sales, customer reviews, and cat pictures. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that German authorities say they see nothing bad up with Kaspersky software, but they're in the Western minority on this one. ISIS messaging looks as if it's shifting toward a hejira narrative. Hyatt discloses a significant credit card breach. Equifax and its competitor TransUnion both remove third-party malvertizing code from their websites. Malek Ben Salem from Accenture Labs with a new vulnerability in software defined networks. Guest is Jeff Schilling, CSO of Armor Cloud Security with insights on Russian state actors. And the dark web is in many ways a lot like the regular web, down to seasonal sales, customer reviews, and cat pictures. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1248</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[67224c9e6fefa95e257178260cb4b41d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9158041690.mp3?updated=1689817294" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Panama Papers pinch. North Korean spearphishing against ICS. CyberMaryland notes. Google Home Mini was tale-bearing (but now it's better). </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/453/notes</link>
      <description>In today's podcast, we hear that German police raid a Panama Papers connected slush fund. North Korea spearphishes in the North American power grid. Security tools can be dual-use, too. Notes on CyberMaryland, where we heard about business climates, the Baltimore-to-Birmingham cyber connection, the Red Queen's race, and the curmudgeonly demeanor too many security types cop. Rick Howard from Palo Alto Networks with an update on the Cyber Canon suggested reading list and a call to vote for the nominated books. Guest is John Morello from Twistlock on securing container environments.  And Google Home's Mini speakers were apparently listening and tattling as well as speaking. 
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Cylance uses cutting edge artificial intelligence to help protect your systems.
 If you are a woman in cyber security and want make connections with others in the field, check out our own  Women in Cyber Security event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 12 Oct 2017 16:45:49 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>453</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a1a60bc0-def8-11ea-911f-db88967fa8b1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Panama Papers pinch. North Korean spearphishing against ICS. CyberMaryland notes. Google Home Mini was tale-bearing (but now it's better). </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that German police raid a Panama Papers connected slush fund. North Korea spearphishes in the North American power grid. Security tools can be dual-use, too. Notes on CyberMaryland, where we heard about business climates, the Baltimore-to-Birmingham cyber connection, the Red Queen's race, and the curmudgeonly demeanor too many security types cop. Rick Howard from Palo Alto Networks with an update on the Cyber Canon suggested reading list and a call to vote for the nominated books. Guest is John Morello from Twistlock on securing container environments.  And Google Home's Mini speakers were apparently listening and tattling as well as speaking. 
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Cylance uses cutting edge artificial intelligence to help protect your systems.
 If you are a woman in cyber security and want make connections with others in the field, check out our own  Women in Cyber Security event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that German police raid a Panama Papers connected slush fund. North Korea spearphishes in the North American power grid. Security tools can be dual-use, too. Notes on CyberMaryland, where we heard about business climates, the Baltimore-to-Birmingham cyber connection, the Red Queen's race, and the curmudgeonly demeanor too many security types cop. Rick Howard from Palo Alto Networks with an update on the Cyber Canon suggested reading list and a call to vote for the nominated books. Guest is John Morello from Twistlock on securing container environments.  And Google Home's Mini speakers were apparently listening and tattling as well as speaking. </p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/yBBx55">check out E8’s white paper</a>.</p> <p>Cylance uses <a href="https://goo.gl/S2YD6d">cutting edge artificial intelligence</a> to help protect your systems.</p> <p>If you are a woman in cyber security and want make connections with others in the field, check out our own <a href="https://thecyberwire.com/events/s/4th-annual-women-in-cyber-security-reception.html"> Women in Cyber Security</a> event.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1142</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[421b4df02cca4da98905045c18326776]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6729426792.mp3?updated=1689817281" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Israel said to have tipped the US off concerning Kaspersky risks. Accenture databases exposed. Deloitte breach may be worse than initially thought. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/452/notes</link>
      <description>In today's CyberWire, we discuss why the US Intelligence Community got prickly about Kaspersky: their Israeli colleagues tipped them off that something was fishy in the software's use. UpGuard says Accenture left some AWS data buckets exposed. Accenture says they were associated with decommissioned systems, but exposed they seem to have been. Sources say Deloitte's breach is worse than hitherto disclosed, with more than three-hundred clients exposed. Joe Carrigan from JHU ISI with some follow-up from a listener on password security when using password managers. Brian NeSmith from Arctic Wolf with results from an IoT ransomware survey.  
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Cylance uses cutting edge artificial intelligence to help protect your systems.
 If you are a woman in cyber security and want make connections with others in the field, check out our own  Women in Cyber Security event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 11 Oct 2017 19:47:33 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>452</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a1c18648-def8-11ea-911f-6ff02f0e2101/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Israel said to have tipped the US off concerning Kaspersky risks. Accenture databases exposed. Deloitte breach may be worse than initially thought. </itunes:subtitle>
      <itunes:summary>In today's CyberWire, we discuss why the US Intelligence Community got prickly about Kaspersky: their Israeli colleagues tipped them off that something was fishy in the software's use. UpGuard says Accenture left some AWS data buckets exposed. Accenture says they were associated with decommissioned systems, but exposed they seem to have been. Sources say Deloitte's breach is worse than hitherto disclosed, with more than three-hundred clients exposed. Joe Carrigan from JHU ISI with some follow-up from a listener on password security when using password managers. Brian NeSmith from Arctic Wolf with results from an IoT ransomware survey.  
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Cylance uses cutting edge artificial intelligence to help protect your systems.
 If you are a woman in cyber security and want make connections with others in the field, check out our own  Women in Cyber Security event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's CyberWire, we discuss why the US Intelligence Community got prickly about Kaspersky: their Israeli colleagues tipped them off that something was fishy in the software's use. UpGuard says Accenture left some AWS data buckets exposed. Accenture says they were associated with decommissioned systems, but exposed they seem to have been. Sources say Deloitte's breach is worse than hitherto disclosed, with more than three-hundred clients exposed. Joe Carrigan from JHU ISI with some follow-up from a listener on password security when using password managers. Brian NeSmith from Arctic Wolf with results from an IoT ransomware survey.  </p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/yBBx55">check out E8’s white paper</a>.</p> <p>Cylance uses <a href="https://goo.gl/S2YD6d">cutting edge artificial intelligence</a> to help protect your systems.</p> <p>If you are a woman in cyber security and want make connections with others in the field, check out our own <a href="https://thecyberwire.com/events/s/4th-annual-women-in-cyber-security-reception.html"> Women in Cyber Security</a> event.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1099</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7f36d559d7caf7aeaa065b67826004da]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9098806019.mp3?updated=1689817271" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage in the Korean peninsula. Russian influence operators bought Facebook, Google ads. Forrester hacked. Kovter, OilRig get upgrades. US CYBERCOM CSM notes. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/451/notes</link>
      <description>In today's podcast, we hear that North Korea may have hacked into South Korean defense plans. Facebook and Google receive increasing scrutiny for Russian ad buys during 2016 US election season. A dissident Chinese billionaire, exiled to New York, says he's been under cyberattack from Shanghai. OilRig is back, with new and improved cyberespionage. Forrester market research reports accessed by hackers. Kovter malware gets an upgrade. Chris Poulin from BAH on medical device safety. Yassir Abousselham from Okta on challenges establishing and managing identity.  And we offer some observations from the Cyber Pavilion at the Association of the United States Army meetings. 
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Cylance uses cutting edge artificial intelligence to help protect your systems.
 If you are a woman in cyber security and want make connections with others in the field, check out our own  Women in Cyber Security event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Oct 2017 19:50:38 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>451</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a1da8cb0-def8-11ea-911f-77cfa1bf5c37/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyberespionage in the Korean peninsula. Russian influence operators bought Facebook, Google ads. Forrester hacked. Kovter, OilRig get upgrades. US CYBERCOM CSM notes. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that North Korea may have hacked into South Korean defense plans. Facebook and Google receive increasing scrutiny for Russian ad buys during 2016 US election season. A dissident Chinese billionaire, exiled to New York, says he's been under cyberattack from Shanghai. OilRig is back, with new and improved cyberespionage. Forrester market research reports accessed by hackers. Kovter malware gets an upgrade. Chris Poulin from BAH on medical device safety. Yassir Abousselham from Okta on challenges establishing and managing identity.  And we offer some observations from the Cyber Pavilion at the Association of the United States Army meetings. 
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Cylance uses cutting edge artificial intelligence to help protect your systems.
 If you are a woman in cyber security and want make connections with others in the field, check out our own  Women in Cyber Security event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that North Korea may have hacked into South Korean defense plans. Facebook and Google receive increasing scrutiny for Russian ad buys during 2016 US election season. A dissident Chinese billionaire, exiled to New York, says he's been under cyberattack from Shanghai. OilRig is back, with new and improved cyberespionage. Forrester market research reports accessed by hackers. Kovter malware gets an upgrade. Chris Poulin from BAH on medical device safety. Yassir Abousselham from Okta on challenges establishing and managing identity.  And we offer some observations from the Cyber Pavilion at the Association of the United States Army meetings. </p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/yBBx55">check out E8’s white paper</a>.</p> <p>Cylance uses <a href="https://goo.gl/S2YD6d">cutting edge artificial intelligence</a> to help protect your systems.</p> <p>If you are a woman in cyber security and want make connections with others in the field, check out our own <a href="https://thecyberwire.com/events/s/4th-annual-women-in-cyber-security-reception.html"> Women in Cyber Security</a> event.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1063</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[806bcf82d2a40625712b5d1be11b2820]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3913835302.mp3?updated=1689817256" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>GDPR: Privacy from Across the Pond [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/19/notes</link>
      <description>Following major breach revelations from Equifax, Yahoo!, Deloitte and the US Securities and Exchange commission, there have been many calls in the US for increased legislation and regulation that would force better privacy and identity management practices.
In this CyberWire special edition, we’ll ask some cyber security experts about GDPR, what it means for privacy and data use, the right to be forgotten, the penalties for noncompliance, and what it means for organizations outside the EU.
Joining us are Steve Durbin, Managing Director of the Information Security Forum, a not-for-profit organization providing its members with guidance on cyber, information security and risk management, Brett Hansen, Vice President of data security solutions at Dell, one of the largest suppliers of computer hardware, software and services in the world, and Darron Gibbard, CTSO at Qualys, a global provider of cloud-based security and compliance solutions.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 09 Oct 2017 21:48:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>19</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/983b83de-df03-11ea-83d6-474fd5a2c55b/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>GDPR: Privacy from Across the Pond</itunes:subtitle>
      <itunes:summary>Following major breach revelations from Equifax, Yahoo!, Deloitte and the US Securities and Exchange commission, there have been many calls in the US for increased legislation and regulation that would force better privacy and identity management practices.
In this CyberWire special edition, we’ll ask some cyber security experts about GDPR, what it means for privacy and data use, the right to be forgotten, the penalties for noncompliance, and what it means for organizations outside the EU.
Joining us are Steve Durbin, Managing Director of the Information Security Forum, a not-for-profit organization providing its members with guidance on cyber, information security and risk management, Brett Hansen, Vice President of data security solutions at Dell, one of the largest suppliers of computer hardware, software and services in the world, and Darron Gibbard, CTSO at Qualys, a global provider of cloud-based security and compliance solutions.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Following major breach revelations from Equifax, Yahoo!, Deloitte and the US Securities and Exchange commission, there have been many calls in the US for increased legislation and regulation that would force better privacy and identity management practices.</p><p>In this CyberWire special edition, we’ll ask some cyber security experts about GDPR, what it means for privacy and data use, the right to be forgotten, the penalties for noncompliance, and what it means for organizations outside the EU.</p><p>Joining us are Steve Durbin, Managing Director of the Information Security Forum, a not-for-profit organization providing its members with guidance on cyber, information security and risk management, Brett Hansen, Vice President of data security solutions at Dell, one of the largest suppliers of computer hardware, software and services in the world, and Darron Gibbard, CTSO at Qualys, a global provider of cloud-based security and compliance solutions.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1890</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2312e58c92061e35c53eab4b6f4c1376]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5020431779.mp3?updated=1656712260" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Android Toast Overlay: Ryan Olson from Palo Alto Networks. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/4/notes</link>
      <description>Android Toast Overlay enables attackers to trick Android users into enabling permissions on infected devices by making them think they are clicking on benign buttons superimposed over the user interface.

Ryan Olson is Director of Threat Intelligence at Palo Alto Networks' Unity 42, and he joins us to share their research.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 07 Oct 2017 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a07c7f3c-df0b-11ea-a07d-37b42e796846/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Android Toast Overlay: Ryan Olson from Palo Alto Networks</itunes:subtitle>
      <itunes:summary>Android Toast Overlay enables attackers to trick Android users into enabling permissions on infected devices by making them think they are clicking on benign buttons superimposed over the user interface.

Ryan Olson is Director of Threat Intelligence at Palo Alto Networks' Unity 42, and he joins us to share their research.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Android Toast Overlay enables attackers to trick Android users into enabling permissions on infected devices by making them think they are clicking on benign buttons superimposed over the user interface.</p><p><br></p><p>Ryan Olson is Director of Threat Intelligence at Palo Alto Networks' Unity 42, and he joins us to share their research.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1145</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04830f64d57274fc5503b1e55d921aab]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9935081335.mp3?updated=1684775276" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>FSB got NSA with an assist (witting or unwitting) from Kaspersky? Germany calls off mass surveillance investigation. Reality Winner stays in jail. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/450/notes</link>
      <description>In today's podcast, we hear more on what happened with NSA material at (allegedly) Russian hands. Kaspersky security software alleged to have been exploited for intelligence service reconnaissance of contractor machine. Germany cancels post-Snowden surveillance investigation. Reality Winner will not be released on bail. Awais Rashid from Lancaster University on securing the supply chain. Guest is Timothy H. Edgar, author of “Beyond Snowden: Privacy, Mass Surveillance, and the Struggle to Reform the NSA.” 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 06 Oct 2017 20:57:41 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>450</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a1f1cf74-def8-11ea-911f-07c32c6d8729/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>FSB got NSA with an assist (witting or unwitting) from Kaspersky? Germany calls off mass surveillance investigation. Reality Winner stays in jail. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear more on what happened with NSA material at (allegedly) Russian hands. Kaspersky security software alleged to have been exploited for intelligence service reconnaissance of contractor machine. Germany cancels post-Snowden surveillance investigation. Reality Winner will not be released on bail. Awais Rashid from Lancaster University on securing the supply chain. Guest is Timothy H. Edgar, author of “Beyond Snowden: Privacy, Mass Surveillance, and the Struggle to Reform the NSA.” 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear more on what happened with NSA material at (allegedly) Russian hands. Kaspersky security software alleged to have been exploited for intelligence service reconnaissance of contractor machine. Germany cancels post-Snowden surveillance investigation. Reality Winner will not be released on bail. Awais Rashid from Lancaster University on securing the supply chain. Guest is Timothy H. Edgar, author of “Beyond Snowden: Privacy, Mass Surveillance, and the Struggle to Reform the NSA.” </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1212</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[06ab27aab2202e6e929b37576cd0a650]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8249853113.mp3?updated=1608753504" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>NSA breach announced today (occurred in 2015, discovered in 2016) may be final nail in Kaspersky Lab's coffin. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/449/notes</link>
      <description>In today's podcast we hear that sensitive NSA files appear to have been obtained by Russian intelligence services, and there are claims Kaspersky software was the gateway to compromise. Las Vegas massacre investigation expands to consider possibility of accomplices. A new password stealer is out in the wild. NFL Players Association data exposed. Justin Harvey from Accenture on insider threats. Guest Joe Coleman, cyber threat intelligence analyst from PepsiCo.The FCC was mostly advised by bots on net neutrality (and bots who haven't benefited from DeepMind's ethics class). 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 05 Oct 2017 19:55:54 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>449</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a20326f2-def8-11ea-911f-673bf7fdab97/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>NSA breach announced today (occurred in 2015, discovered in 2016) may be final nail in Kaspersky Lab's coffin. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that sensitive NSA files appear to have been obtained by Russian intelligence services, and there are claims Kaspersky software was the gateway to compromise. Las Vegas massacre investigation expands to consider possibility of accomplices. A new password stealer is out in the wild. NFL Players Association data exposed. Justin Harvey from Accenture on insider threats. Guest Joe Coleman, cyber threat intelligence analyst from PepsiCo.The FCC was mostly advised by bots on net neutrality (and bots who haven't benefited from DeepMind's ethics class). 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that sensitive NSA files appear to have been obtained by Russian intelligence services, and there are claims Kaspersky software was the gateway to compromise. Las Vegas massacre investigation expands to consider possibility of accomplices. A new password stealer is out in the wild. NFL Players Association data exposed. Justin Harvey from Accenture on insider threats. Guest Joe Coleman, cyber threat intelligence analyst from PepsiCo.The FCC was mostly advised by bots on net neutrality (and bots who haven't benefited from DeepMind's ethics class). </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1202</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[29e54b422410a7c4b2a429ddc237fe82]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2520442448.mp3?updated=1689817227" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>No insight yet into Las Vegas gunman's motive as ISIS inspiration generally discounted. Yahoo! breach affected 3, not 1, billion user accounts. Equifax updates. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/448/notes</link>
      <description>In today's podcast, we hear that ISIS claims of responsibility for Las Vegas murders continue to lose plausibility, but the shooter's motives remain a mystery. Yahoo!'s epic breach just got even more epic. Equifax looks little better in the wake of its CEO's Congressional testimony. A major breach seems to be unfolding in India.  Jonathan Katz from UMD on the importance of random numbers for cryptography. Guest is Dave Mahon from Century Link on the importance of diversity and opportunities for women in cyber security. And does Star Fleet still run Windows XP? Who's responsible for information security on that bridge anyway? 
  Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
  If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
  Delta Risk put together an infographic full of tips for Cyber Security Awareness Month. 
  If you are a woman in cyber security and want make connections with others in the field, check out our own Women in Cyber Security event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 04 Oct 2017 18:41:38 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>448</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a21c8ce6-def8-11ea-911f-0b7dc64cd2c3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>No insight yet into Las Vegas gunman's motive as ISIS inspiration generally discounted. Yahoo! breach affected 3, not 1, billion user accounts. Equifax updates. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that ISIS claims of responsibility for Las Vegas murders continue to lose plausibility, but the shooter's motives remain a mystery. Yahoo!'s epic breach just got even more epic. Equifax looks little better in the wake of its CEO's Congressional testimony. A major breach seems to be unfolding in India.  Jonathan Katz from UMD on the importance of random numbers for cryptography. Guest is Dave Mahon from Century Link on the importance of diversity and opportunities for women in cyber security. And does Star Fleet still run Windows XP? Who's responsible for information security on that bridge anyway? 
  Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
  If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
  Delta Risk put together an infographic full of tips for Cyber Security Awareness Month. 
  If you are a woman in cyber security and want make connections with others in the field, check out our own Women in Cyber Security event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that ISIS claims of responsibility for Las Vegas murders continue to lose plausibility, but the shooter's motives remain a mystery. Yahoo!'s epic breach just got even more epic. Equifax looks little better in the wake of its CEO's Congressional testimony. A major breach seems to be unfolding in India.  Jonathan Katz from UMD on the importance of random numbers for cryptography. Guest is Dave Mahon from Century Link on the importance of diversity and opportunities for women in cyber security. And does Star Fleet still run Windows XP? Who's responsible for information security on that bridge anyway? </p> <p> Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p> If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/yBBx55">check out E8’s white paper</a>.</p> <p> Delta Risk put together an <a href="https://goo.gl/34KkbX">infographic full of tips for Cyber Security Awareness Month.</a> </p> <p> If you are a woman in cyber security and want make connections with others in the field, check out our own <a href="https://goo.gl/S2YD6d">Women in Cyber Security event.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1083</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fb91f6e1784b13f4ba12b4bdc8da561c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6114654810.mp3?updated=1689817212" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fake news and information operations with no obvious solution. Equifax update. US Cyber Command vs. DPRK </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/447/notes</link>
      <description> 
 In today's podcast, we consider the bogus rumors and highly questionable claims of responsibility circulating online after the Las Vegas massacre. ISIS is especially keen to make inspirational capital out of senseless killing and suffering. Google and Facebook come under pressure to moderate the content they carry. The UK prepares to pass tougher restrictions on viewing radical content. The Equifax breach gets two-and-a-half-million people bigger. Ben Yelin from UMD CHHS on Yahoo! data breach victims’ right to sue. Tony Gauda, CEO of ThinAir on dealing with insider threats. And US Cyber Command is said to have disrupted North Korean intelligence networks. 
  Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
  If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
  Delta Risk put together an infographic full of tips for Cyber Security Awareness Month. 
  If you are a woman in cyber security and want make connections with others in the field, check out our own Women in Cyber Security event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Oct 2017 17:55:14 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>447</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a233f6ce-def8-11ea-911f-0ba1a72ace46/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fake news and information operations with no obvious solution. Equifax update. US Cyber Command vs. DPRK </itunes:subtitle>
      <itunes:summary> 
 In today's podcast, we consider the bogus rumors and highly questionable claims of responsibility circulating online after the Las Vegas massacre. ISIS is especially keen to make inspirational capital out of senseless killing and suffering. Google and Facebook come under pressure to moderate the content they carry. The UK prepares to pass tougher restrictions on viewing radical content. The Equifax breach gets two-and-a-half-million people bigger. Ben Yelin from UMD CHHS on Yahoo! data breach victims’ right to sue. Tony Gauda, CEO of ThinAir on dealing with insider threats. And US Cyber Command is said to have disrupted North Korean intelligence networks. 
  Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
  If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
  Delta Risk put together an infographic full of tips for Cyber Security Awareness Month. 
  If you are a woman in cyber security and want make connections with others in the field, check out our own Women in Cyber Security event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p> <p>In today's podcast, we consider the bogus rumors and highly questionable claims of responsibility circulating online after the Las Vegas massacre. ISIS is especially keen to make inspirational capital out of senseless killing and suffering. Google and Facebook come under pressure to moderate the content they carry. The UK prepares to pass tougher restrictions on viewing radical content. The Equifax breach gets two-and-a-half-million people bigger. Ben Yelin from UMD CHHS on Yahoo! data breach victims’ right to sue. Tony Gauda, CEO of ThinAir on dealing with insider threats. And US Cyber Command is said to have disrupted North Korean intelligence networks. </p> <p> Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p> If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/yBBx55">check out E8’s white paper</a>.</p> <p> Delta Risk put together an <a href="https://goo.gl/34KkbX">infographic full of tips for Cyber Security Awareness Month.</a> </p> <p> If you are a woman in cyber security and want make connections with others in the field, check out our own <a href="https://goo.gl/S2YD6d">Women in Cyber Security event.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1103</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[36907e11cd853103e48b5dd7bf1e2b56]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6112580974.mp3?updated=1689817199" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bots, sockpuppets, and trolls. Facebook talks to Congress. Some suggest China hacked Equifax. DPRK gets more Internet. ISIS inspiration. Section 702 authority in doubt. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/446/notes</link>
      <description>In today's podcast, it's bots, sockpuppets, and trolls, oh my. Mr. Zuckerberg goes to Washington. Equifax sources suggest China hacked it. Credit bureau phishbait chums the Internet. Pyongyang gets a new Internet connection, and observers bet it's not for checking Mr. Kim's fantasy sports leagues (anyway he could get all that from Mr. Rodman). ISIS posts more inspiration, and warnings. NSA prepares to wind down Section 702 operations. Johannes Ullrich from SANS Technology Institute and the ISC Stormcast podcast on malware using malicious DLL files. US and Russia seem to agree on one thing at least: Bitcoin fraud is bad. 
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 02 Oct 2017 19:26:13 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>446</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a24cc0dc-def8-11ea-911f-5f4229f170b6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Bots, sockpuppets, and trolls. Facebook talks to Congress. Some suggest China hacked Equifax. DPRK gets more Internet. ISIS inspiration. Section 702 authority in doubt. </itunes:subtitle>
      <itunes:summary>In today's podcast, it's bots, sockpuppets, and trolls, oh my. Mr. Zuckerberg goes to Washington. Equifax sources suggest China hacked it. Credit bureau phishbait chums the Internet. Pyongyang gets a new Internet connection, and observers bet it's not for checking Mr. Kim's fantasy sports leagues (anyway he could get all that from Mr. Rodman). ISIS posts more inspiration, and warnings. NSA prepares to wind down Section 702 operations. Johannes Ullrich from SANS Technology Institute and the ISC Stormcast podcast on malware using malicious DLL files. US and Russia seem to agree on one thing at least: Bitcoin fraud is bad. 
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, it's bots, sockpuppets, and trolls, oh my. Mr. Zuckerberg goes to Washington. Equifax sources suggest China hacked it. Credit bureau phishbait chums the Internet. Pyongyang gets a new Internet connection, and observers bet it's not for checking Mr. Kim's fantasy sports leagues (anyway he could get all that from Mr. Rodman). ISIS posts more inspiration, and warnings. NSA prepares to wind down Section 702 operations. Johannes Ullrich from SANS Technology Institute and the ISC Stormcast podcast on malware using malicious DLL files. US and Russia seem to agree on one thing at least: Bitcoin fraud is bad. </p> <p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>827</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9c6e4bd07240a7d8033e56e258b8d614]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7126965477.mp3?updated=1689817188" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>APT 33: FireEye's John Hultquist on an Iranian Cyber Espionage Group. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/3/notes</link>
      <description>APT 33 is an Iranian cyber espionage group that targets aerospace and energy sectors and has ties to destructive malware. John Hultquist is Director of Intelligence Analysis at FireEye, and he takes us through their research.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 30 Sep 2017 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9e4a81d2-df0b-11ea-9a61-0f30676fffee/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>APT 33: FireEye's John Hultquist on an Iranian Cyber Espionage Group</itunes:subtitle>
      <itunes:summary>APT 33 is an Iranian cyber espionage group that targets aerospace and energy sectors and has ties to destructive malware. John Hultquist is Director of Intelligence Analysis at FireEye, and he takes us through their research.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>APT 33 is an Iranian cyber espionage group that targets aerospace and energy sectors and has ties to destructive malware. John Hultquist is Director of Intelligence Analysis at FireEye, and he takes us through their research.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1051</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1ac5e89f1b624e472aa0abfca3aa6bc9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3853835127.mp3?updated=1684774817" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Whole Foods breached. Illusion gap and Windows Defender. Exposed AWS S3 buckets. Equifax incident response. Reality Winner proceedings. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/445/notes</link>
      <description>In today's podcast, we hear that Whole Foods has been breached—if you've been to the taproom, look to your credit cards. An illusion gap could help bypass Windows Defender, says Cyber Ark. Microsoft says don't sweat the small stuff. A Mac firmware issue may be giving users a false sense of security. Equifax is offering a lifetime of free credit freezing, but observers are dubious. A study suggests there are still a lot of improperly secured clouds out there. ISIS and the Taliban resume their inspiration operations online. David DuFour from Webroot on the difference between Artificial Intelligence and Machine Learning. Guest is R.P. Eddy, coauthor with Richard Clarke of the book Warnings: Finding Cassandras to Stop Catastrophes. And alleged NSA leaker Reality Winner remains in custody, at least for now. 
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 Recorded Future's user conference RFUN 2017 comes to Washington, D.C. , October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper
 If you want to execute at machine speed, doesn’t make sense to see what the algorithms a good machine runs on can do for you? Check out sponsor Cylance .
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 29 Sep 2017 19:07:41 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>445</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a25f41f8-def8-11ea-911f-276976d6e0b0/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Whole Foods breached. Illusion gap and Windows Defender. Exposed AWS S3 buckets. Equifax incident response. Reality Winner proceedings. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Whole Foods has been breached—if you've been to the taproom, look to your credit cards. An illusion gap could help bypass Windows Defender, says Cyber Ark. Microsoft says don't sweat the small stuff. A Mac firmware issue may be giving users a false sense of security. Equifax is offering a lifetime of free credit freezing, but observers are dubious. A study suggests there are still a lot of improperly secured clouds out there. ISIS and the Taliban resume their inspiration operations online. David DuFour from Webroot on the difference between Artificial Intelligence and Machine Learning. Guest is R.P. Eddy, coauthor with Richard Clarke of the book Warnings: Finding Cassandras to Stop Catastrophes. And alleged NSA leaker Reality Winner remains in custody, at least for now. 
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 Recorded Future's user conference RFUN 2017 comes to Washington, D.C. , October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper
 If you want to execute at machine speed, doesn’t make sense to see what the algorithms a good machine runs on can do for you? Check out sponsor Cylance .
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Whole Foods has been breached—if you've been to the taproom, look to your credit cards. An illusion gap could help bypass Windows Defender, says Cyber Ark. Microsoft says don't sweat the small stuff. A Mac firmware issue may be giving users a false sense of security. Equifax is offering a lifetime of free credit freezing, but observers are dubious. A study suggests there are still a lot of improperly secured clouds out there. ISIS and the Taliban resume their inspiration operations online. David DuFour from Webroot on the difference between Artificial Intelligence and Machine Learning. Guest is R.P. Eddy, coauthor with Richard Clarke of the book Warnings: Finding Cassandras to Stop Catastrophes. And alleged NSA leaker Reality Winner remains in custody, at least for now. </p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>Recorded Future's user conference RFUN 2017 comes to Washington, D.C. <a href="https://goo.gl/mfFR7h">, October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence.</a></p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/yBBx55">check out E8’s white paper</a></p> <p>If you want to execute at machine speed, doesn’t make sense to see what the algorithms a good machine runs on can do for you? <a href="https://goo.gl/mfFR7h">Check out sponsor Cylance</a> <a href="https://goo.gl/fHR65L">.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1299</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cd7e0cf2f4980122b19642a0ab17509e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6774489238.mp3?updated=1608753648" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Deloitte and Equifax under the microscope. Congress grills the SEC. Credential theft trends. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/444/notes</link>
      <description>Deloitte and Equifax continue to find themselves under scrutiny, but we should all resist the urge to chase Ambulances. The SEC commissioner gets a grilling form congress, and we can't help wonder if his Spidey sense was tingling. Chances are your credentials aren't as secure as you'd like them. Dale Drew from Level 3 Communications on attack patterns and lulls. Trip Nine from Comodo on credential theft trends. And Pyongyang is perched on a pile of coal. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 28 Sep 2017 20:55:25 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>444</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a26fc2c6-def8-11ea-911f-c73f38a8fc44/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Deloitte and Equifax under the microscope. Congress grills the SEC. Credential theft trends. </itunes:subtitle>
      <itunes:summary>Deloitte and Equifax continue to find themselves under scrutiny, but we should all resist the urge to chase Ambulances. The SEC commissioner gets a grilling form congress, and we can't help wonder if his Spidey sense was tingling. Chances are your credentials aren't as secure as you'd like them. Dale Drew from Level 3 Communications on attack patterns and lulls. Trip Nine from Comodo on credential theft trends. And Pyongyang is perched on a pile of coal. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Deloitte and Equifax continue to find themselves under scrutiny, but we should all resist the urge to chase Ambulances. The SEC commissioner gets a grilling form congress, and we can't help wonder if his Spidey sense was tingling. Chances are your credentials aren't as secure as you'd like them. Dale Drew from Level 3 Communications on attack patterns and lulls. Trip Nine from Comodo on credential theft trends. And Pyongyang is perched on a pile of coal. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1116</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ab99a2608b51423ecfd645e067e06358]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3481032048.mp3?updated=1689817164" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Comments on the Deloitte breach. SEC Commissioner talks to the Senate. Sonic breached. Vulnerable stock-trading apps. Russian influence operations shift their focus. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/443/notes</link>
      <description>In today's podcast, we hear more about the Deloitte breach. Deloitte's stil saying little, but other people are talking. The SEC tells the Senate it's "deeply concerned" about its own breach. Popular iOS and Android stock-trading apps are found vulnerable. Sonic drive-ins have sustained what looks like a pretty big breach. Ben Yelin discusses a bipartisan bill to improve IoT security. Isaac Kohen from Teramind on detecting employees involved in radical political activities on company time. Russian influence operations against the US are turning toward local government, religious groups, civic associations and others at the grassroots. 
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 Recorded Future's user conference RFUN 2017 comes to Washington, D.C. , October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper
 If you want to execute at machine speed, doesn’t make sense to see what the algorithms a good machine runs on can do for you? Check out sponsor Cylance .
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 27 Sep 2017 19:49:14 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>443</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a289ee12-def8-11ea-911f-c7463bb1ee14/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Comments on the Deloitte breach. SEC Commissioner talks to the Senate. Sonic breached. Vulnerable stock-trading apps. Russian influence operations shift their focus. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear more about the Deloitte breach. Deloitte's stil saying little, but other people are talking. The SEC tells the Senate it's "deeply concerned" about its own breach. Popular iOS and Android stock-trading apps are found vulnerable. Sonic drive-ins have sustained what looks like a pretty big breach. Ben Yelin discusses a bipartisan bill to improve IoT security. Isaac Kohen from Teramind on detecting employees involved in radical political activities on company time. Russian influence operations against the US are turning toward local government, religious groups, civic associations and others at the grassroots. 
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 Recorded Future's user conference RFUN 2017 comes to Washington, D.C. , October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper
 If you want to execute at machine speed, doesn’t make sense to see what the algorithms a good machine runs on can do for you? Check out sponsor Cylance .
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear more about the Deloitte breach. Deloitte's stil saying little, but other people are talking. The SEC tells the Senate it's "deeply concerned" about its own breach. Popular iOS and Android stock-trading apps are found vulnerable. Sonic drive-ins have sustained what looks like a pretty big breach. Ben Yelin discusses a bipartisan bill to improve IoT security. Isaac Kohen from Teramind on detecting employees involved in radical political activities on company time. Russian influence operations against the US are turning toward local government, religious groups, civic associations and others at the grassroots. </p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>Recorded Future's user conference RFUN 2017 comes to Washington, D.C. <a href="https://goo.gl/mfFR7h">, October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence.</a></p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/yBBx55">check out E8’s white paper</a></p> <p>If you want to execute at machine speed, doesn’t make sense to see what the algorithms a good machine runs on can do for you? <a href="https://goo.gl/mfFR7h">Check out sponsor Cylance</a> <a href="https://goo.gl/fHR65L">.</a></p> <p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1134</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aef7567dca2bb036d1c6889419d12260]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4720647461.mp3?updated=1689817145" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Equifax C-suite retirements continue. Deloitte still has little to say about its breach. Mac OS zero-day goes unpatched. Russian influence operations. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/442/notes</link>
      <description>In today's podcast we hear that Equifax CEO Smith has joined the company's CSO and CIO in retirement, apparent expiation for the credit bureau's breacn. Deloitte remains tight-lipped. Suggestions about how to handle identity and investigate breaches. Mac OS High Sierra suffers from a password exfiltration zero-day. Joe Carrigan discusses Dave's skepticism of password managers. Stephen Moore from Exabeam on post-breach cleanup.  Two days after Germany's elections and the Russian dog hasn't barked (or the Bears growled) but there are plenty of 2016 paw prints over US opinion. 
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 Recorded Future's user conference RFUN 2017 comes to Washington, D.C. , October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper
 If you want to execute at machine speed, doesn’t make sense to see what the algorithms a good machine runs on can do for you? Check out sponsor Cylance .
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Sep 2017 18:31:03 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>442</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a2a03b72-def8-11ea-911f-dbeb2141e25a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Equifax C-suite retirements continue. Deloitte still has little to say about its breach. Mac OS zero-day goes unpatched. Russian influence operations. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Equifax CEO Smith has joined the company's CSO and CIO in retirement, apparent expiation for the credit bureau's breacn. Deloitte remains tight-lipped. Suggestions about how to handle identity and investigate breaches. Mac OS High Sierra suffers from a password exfiltration zero-day. Joe Carrigan discusses Dave's skepticism of password managers. Stephen Moore from Exabeam on post-breach cleanup.  Two days after Germany's elections and the Russian dog hasn't barked (or the Bears growled) but there are plenty of 2016 paw prints over US opinion. 
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 Recorded Future's user conference RFUN 2017 comes to Washington, D.C. , October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper
 If you want to execute at machine speed, doesn’t make sense to see what the algorithms a good machine runs on can do for you? Check out sponsor Cylance .
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Equifax CEO Smith has joined the company's CSO and CIO in retirement, apparent expiation for the credit bureau's breacn. Deloitte remains tight-lipped. Suggestions about how to handle identity and investigate breaches. Mac OS High Sierra suffers from a password exfiltration zero-day. Joe Carrigan discusses Dave's skepticism of password managers. Stephen Moore from Exabeam on post-breach cleanup.  Two days after Germany's elections and the Russian dog hasn't barked (or the Bears growled) but there are plenty of 2016 paw prints over US opinion. </p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>Recorded Future's user conference RFUN 2017 comes to Washington, D.C. <a href="https://goo.gl/mfFR7h">, October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence.</a></p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/yBBx55">check out E8’s white paper</a></p> <p>If you want to execute at machine speed, doesn’t make sense to see what the algorithms a good machine runs on can do for you? <a href="https://goo.gl/mfFR7h">Check out sponsor Cylance</a> <a href="https://goo.gl/fHR65L">.</a></p> <p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1130</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5d933c37cd62aefc1fb445b212c1ed6e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4634015559.mp3?updated=1689817132" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Deloitte hacked. Verizon AWS S3 exposure. Phantom Squad's protection racket. Nuclear tension expected to spawn cyberattacks. Updates on CCleaner backdoor and FinFisher distro. Carlos Danger goes to jail. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/441/notes</link>
      <description>In today's podcast, we review reports saying that Deloitte has been hacked. Details are sparse but the story is developing. A Verizon AWS S3 bucket is found exposed online. Locky is being spammed out in quantity. Phantom Squad hoods run a DDoS protection racket. Kinetic tensions the US, Tehran, and North Korea raise expectations of cyber offensives. Chinese intelligence thought behind CCleaner backdoor. Unnamed ISPs accused of FinFisher spyware campaign complicity. Chris Poulin from BAH on vulnerabilities in connected cars. And Carlos Danger will go to the Big House. 
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 Recorded Future's user conference RFUN 2017 comes to Washington, D.C. , October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper
 If you want to execute at machine speed, doesn’t make sense to see what the algorithms a good machine runs on can do for you? Check out sponsor Cylance .
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 25 Sep 2017 19:57:40 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>441</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a2b78a02-def8-11ea-911f-2ba9ffd0917d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Deloitte hacked. Verizon AWS S3 exposure. Phantom Squad's protection racket. Nuclear tension expected to spawn cyberattacks. Updates on CCleaner backdoor and FinFisher distro. Carlos Danger goes to jail. </itunes:subtitle>
      <itunes:summary>In today's podcast, we review reports saying that Deloitte has been hacked. Details are sparse but the story is developing. A Verizon AWS S3 bucket is found exposed online. Locky is being spammed out in quantity. Phantom Squad hoods run a DDoS protection racket. Kinetic tensions the US, Tehran, and North Korea raise expectations of cyber offensives. Chinese intelligence thought behind CCleaner backdoor. Unnamed ISPs accused of FinFisher spyware campaign complicity. Chris Poulin from BAH on vulnerabilities in connected cars. And Carlos Danger will go to the Big House. 
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 Recorded Future's user conference RFUN 2017 comes to Washington, D.C. , October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper
 If you want to execute at machine speed, doesn’t make sense to see what the algorithms a good machine runs on can do for you? Check out sponsor Cylance .
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we review reports saying that Deloitte has been hacked. Details are sparse but the story is developing. A Verizon AWS S3 bucket is found exposed online. Locky is being spammed out in quantity. Phantom Squad hoods run a DDoS protection racket. Kinetic tensions the US, Tehran, and North Korea raise expectations of cyber offensives. Chinese intelligence thought behind CCleaner backdoor. Unnamed ISPs accused of FinFisher spyware campaign complicity. Chris Poulin from BAH on vulnerabilities in connected cars. And Carlos Danger will go to the Big House. </p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>Recorded Future's user conference RFUN 2017 comes to Washington, D.C. <a href="https://goo.gl/mfFR7h">, October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence.</a></p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/yBBx55">check out E8’s white paper</a></p> <p>If you want to execute at machine speed, doesn’t make sense to see what the algorithms a good machine runs on can do for you? <a href="https://goo.gl/mfFR7h">Check out sponsor Cylance</a> <a href="https://goo.gl/fHR65L">.</a></p> <p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>969</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[95a88d823d4fb7ea35027e40d73dd4b5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9410466313.mp3?updated=1689817121" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pacifier APT : Bitdefender's Liviu Arsene describes a sophisticated, multifaceted malware campaign. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/2/notes</link>
      <description>In 2016 Bitdefender uncovered a new advanced persistent threat dubbed Pacifier, targeting government institutions starting in 2014. Using malicious .doc documents and .zip files distributed via spear phishing e-mails, attackers would lure victims with invitations to social functions or conferences into executing the attachments. It’s capable of dropping multi-stage backdoors.
Liviu Arsene is a senior e-threat analyst at BitDefender, and he's our guide to the complex components of Pacifier APT.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 23 Sep 2017 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9ccd9de4-df0b-11ea-80b8-cbb401c98030/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Pacifier APT : Bitdefender's Liviu Arsene describes a sophisticated, multifaceted malware campaign</itunes:subtitle>
      <itunes:summary>In 2016 Bitdefender uncovered a new advanced persistent threat dubbed Pacifier, targeting government institutions starting in 2014. Using malicious .doc documents and .zip files distributed via spear phishing e-mails, attackers would lure victims with invitations to social functions or conferences into executing the attachments. It’s capable of dropping multi-stage backdoors.
Liviu Arsene is a senior e-threat analyst at BitDefender, and he's our guide to the complex components of Pacifier APT.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In 2016 Bitdefender uncovered a new advanced persistent threat dubbed Pacifier, targeting government institutions starting in 2014. Using malicious .doc documents and .zip files distributed via spear phishing e-mails, attackers would lure victims with invitations to social functions or conferences into executing the attachments. It’s capable of dropping multi-stage backdoors.</p><p>Liviu Arsene is a senior e-threat analyst at BitDefender, and he's our guide to the complex components of Pacifier APT.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1489</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2903b3ad457535dfe3b4cf2d2b036fa5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9820134958.mp3?updated=1684774785" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacks shake confidence in financial system. FinFisher using MitM. CCleaner backdoor had specific targets in mind? US Forces Korea debunks bogus NEO warning. Locky masters like Game of Thrones. nRansomware asks for a different kind of payout. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/440/notes</link>
      <description>In today's podcast, we hear that the EDGAR breach is being seen as a blow to confidence in financial system. Credit bureaus continue to receive heightened scrutiny after the Equifax breach. FinFisher campaign suggests ISPs may have been compromised. The backdoor in CCleaner seems to have targeted specific companies. US Forces Korea personnel receive a bogus noncombatant evacuation order. Someone behind Locky watches a lot of Game of Thrones. Malek Ben Salem from Accenture Labs with a new attack vector that uses power management systems. Guest is Robert Sell sharing his experience participating in a DEFCON capture the flag. And Thomas the Tank Engine would never do what some skids show him doing. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 22 Sep 2017 21:11:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>440</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a2e004be-def8-11ea-911f-dfb015bba1e1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hacks shake confidence in financial system. FinFisher using MitM. CCleaner backdoor had specific targets in mind? US Forces Korea debunks bogus NEO warning. Locky masters like Game of Thrones. nRansomware asks for a different kind of payout. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the EDGAR breach is being seen as a blow to confidence in financial system. Credit bureaus continue to receive heightened scrutiny after the Equifax breach. FinFisher campaign suggests ISPs may have been compromised. The backdoor in CCleaner seems to have targeted specific companies. US Forces Korea personnel receive a bogus noncombatant evacuation order. Someone behind Locky watches a lot of Game of Thrones. Malek Ben Salem from Accenture Labs with a new attack vector that uses power management systems. Guest is Robert Sell sharing his experience participating in a DEFCON capture the flag. And Thomas the Tank Engine would never do what some skids show him doing. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the EDGAR breach is being seen as a blow to confidence in financial system. Credit bureaus continue to receive heightened scrutiny after the Equifax breach. FinFisher campaign suggests ISPs may have been compromised. The backdoor in CCleaner seems to have targeted specific companies. US Forces Korea personnel receive a bogus noncombatant evacuation order. Someone behind Locky watches a lot of Game of Thrones. Malek Ben Salem from Accenture Labs with a new attack vector that uses power management systems. Guest is Robert Sell sharing his experience participating in a DEFCON capture the flag. And Thomas the Tank Engine would never do what some skids show him doing. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1313</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8a743afe4f0f1abb11b47c7cf029eec4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1656295087.mp3?updated=1608753542" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>EDGAR hack enabled illicit stock trades? Equifax tweets phishing url to troubled inquirers. Kaspersky ban clarified. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/439/notes</link>
      <description>In today's podcast, we hear that the SEC was hacked, and someone might have made a lot of money from the incident. Equifax tweets send inquirers to a phishing site. Investigation into the Avast caper suggests a state intelligence service's hand. The Department of Homeland Security clarifies its ban on Kaspersky products. Emily Wilson from Terbium Labs, cautioning us to not be so distracted by big shiny objects like "taking down the power grid" that we forget the basics, like enabling two-factor authentication. Richard Henderson, global security strategist at Absolute, commenting on the Equifax breach and the challenges of keeping up with patching. And chatbots turn spiritual. 
    Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Recorded Future's user conference RFUN 2017 comes to Washington, D.C. , October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 21 Sep 2017 19:27:04 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>439</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a2f3caee-def8-11ea-911f-0f8003f92290/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>EDGAR hack enabled illicit stock trades? Equifax tweets phishing url to troubled inquirers. Kaspersky ban clarified. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the SEC was hacked, and someone might have made a lot of money from the incident. Equifax tweets send inquirers to a phishing site. Investigation into the Avast caper suggests a state intelligence service's hand. The Department of Homeland Security clarifies its ban on Kaspersky products. Emily Wilson from Terbium Labs, cautioning us to not be so distracted by big shiny objects like "taking down the power grid" that we forget the basics, like enabling two-factor authentication. Richard Henderson, global security strategist at Absolute, commenting on the Equifax breach and the challenges of keeping up with patching. And chatbots turn spiritual. 
    Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Recorded Future's user conference RFUN 2017 comes to Washington, D.C. , October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the SEC was hacked, and someone might have made a lot of money from the incident. Equifax tweets send inquirers to a phishing site. Investigation into the Avast caper suggests a state intelligence service's hand. The Department of Homeland Security clarifies its ban on Kaspersky products. Emily Wilson from Terbium Labs, cautioning us to not be so distracted by big shiny objects like "taking down the power grid" that we forget the basics, like enabling two-factor authentication. Richard Henderson, global security strategist at Absolute, commenting on the Equifax breach and the challenges of keeping up with patching. And chatbots turn spiritual. </p> <p>   Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Recorded Future's user conference RFUN 2017 comes to Washington, D.C. <a href="https://goo.gl/mfFR7h">, October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence.</a> If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/yBBx55">check out E8’s white paper</a><a href="https://goo.gl/mfFR7h">.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1111</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[95490a918ac4ce56723e9161f40cde2f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9192360772.mp3?updated=1689817096" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>German election update: nichts neues. Equifax breach. Viacom dodges a bad bucket. Like Sandworm, but from Tehran. Less than fully successful criminals.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/438/notes</link>
      <description>In today's podcast we learn that so far Russian influence seems not to be operating in Germany's election. Iran's APT33 turns from spying to sabotage. Equifax woes continue, but don't appear to include cover-up of an earlier breach. UpGuard helps Viacom dodge a cyber bullet. You may be party to a contract you didn’t know about. Criminal boneheads again more common than criminal geniuses. Ben Yelin from UMD CHHS with a story of the FBI raiding the wrong home based on WiFi router information. Guest is Eddie Habibi from PAS, debunking some ICS myths. And don't be a gazelle. 
   Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Recorded Future's user conference RFUN 2017 comes to Washington, D.C. , October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 20 Sep 2017 19:28:46 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>438</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a30dd0c4-def8-11ea-911f-1bc4a67a3256/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>German election update: nichts neues. Equifax breach. Viacom dodges a bad bucket. Like Sandworm, but from Tehran. Less than fully successful criminals.  </itunes:subtitle>
      <itunes:summary>In today's podcast we learn that so far Russian influence seems not to be operating in Germany's election. Iran's APT33 turns from spying to sabotage. Equifax woes continue, but don't appear to include cover-up of an earlier breach. UpGuard helps Viacom dodge a cyber bullet. You may be party to a contract you didn’t know about. Criminal boneheads again more common than criminal geniuses. Ben Yelin from UMD CHHS with a story of the FBI raiding the wrong home based on WiFi router information. Guest is Eddie Habibi from PAS, debunking some ICS myths. And don't be a gazelle. 
   Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Recorded Future's user conference RFUN 2017 comes to Washington, D.C. , October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we learn that so far Russian influence seems not to be operating in Germany's election. Iran's APT33 turns from spying to sabotage. Equifax woes continue, but don't appear to include cover-up of an earlier breach. UpGuard helps Viacom dodge a cyber bullet. You may be party to a contract you didn’t know about. Criminal boneheads again more common than criminal geniuses. Ben Yelin from UMD CHHS with a story of the FBI raiding the wrong home based on WiFi router information. Guest is Eddie Habibi from PAS, debunking some ICS myths. And don't be a gazelle. </p> <p>  Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Recorded Future's user conference RFUN 2017 comes to Washington, D.C. <a href="https://goo.gl/mfFR7h">, October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence.</a> If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/yBBx55">check out E8’s white paper</a><a href="https://goo.gl/mfFR7h">.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1156</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7684559d81b72772bd3e29c2f70621a3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8529480816.mp3?updated=1689817082" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russia Spy Files from WikiLeaks. Disinformation and  influence operations. Equifax sustained a breach in March. Software supply chain issues. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/437/notes</link>
      <description>In today's podcast, we hear that WikiLeaks is shocked, shocked, to learn that there's gambling…uh, we mean, Russian surveillance going on. Advice from Ukraine about influence operations. The Equifax story may have gotten worse—there may have been an earlier breach in March. Software supply chain issues come up in an Avast backdoor. Awais Rashid from Lancaster University on security being the responsibility of everyone in an organization, not just the IT folks. Mike Kail from Cybric on the DevSecOps trend. Industry notes, and the "Unlucky 13,' presented by Johns Hopkins. 
  Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Recorded Future's user conference RFUN 2017 comes to Washington, D.C. , October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Sep 2017 19:24:14 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>437</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a322862c-def8-11ea-911f-d75784c7f0ee/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Russia Spy Files from WikiLeaks. Disinformation and  influence operations. Equifax sustained a breach in March. Software supply chain issues. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that WikiLeaks is shocked, shocked, to learn that there's gambling…uh, we mean, Russian surveillance going on. Advice from Ukraine about influence operations. The Equifax story may have gotten worse—there may have been an earlier breach in March. Software supply chain issues come up in an Avast backdoor. Awais Rashid from Lancaster University on security being the responsibility of everyone in an organization, not just the IT folks. Mike Kail from Cybric on the DevSecOps trend. Industry notes, and the "Unlucky 13,' presented by Johns Hopkins. 
  Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Recorded Future's user conference RFUN 2017 comes to Washington, D.C. , October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that WikiLeaks is shocked, shocked, to learn that there's gambling…uh, we mean, Russian surveillance going on. Advice from Ukraine about influence operations. The Equifax story may have gotten worse—there may have been an earlier breach in March. Software supply chain issues come up in an Avast backdoor. Awais Rashid from Lancaster University on security being the responsibility of everyone in an organization, not just the IT folks. Mike Kail from Cybric on the DevSecOps trend. Industry notes, and the "Unlucky 13,' presented by Johns Hopkins. </p> <p> Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Recorded Future's user conference RFUN 2017 comes to Washington, D.C. <a href="https://goo.gl/mfFR7h">, October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence.</a> If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/yBBx55">check out E8’s white paper</a><a href="https://goo.gl/mfFR7h">.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1120</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[35272192a33424b02b1e3b6a1b5715e5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7267106246.mp3?updated=1689817064" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russian dogs not yet barking in German elections. ISIS is doing a lot of howling at lone wolves. Equifax updates. CCleaner found unclean. OurMine hacks Vevo to avenge its honor. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/436/notes</link>
      <description>In today's podcast, we note reports that, while Germany will hold elections Sunday, Russian cyber operators seem quiet. Too quiet? Switzerland and Singapore both report sustaining state-sponsored cyber espionage attempts. ISIS howls for its lone wolves to hit soft targets. The Equifax breach news isn't getting any better. Cisco finds a backdoor in an Avast security product. Chris Poulin from Booz Allen Hamilton, our newest industry partner, introduces himself. He leads the Internet of Things security strategy in Booz Allen’s Dark Labs, as well as dabbles in Machine Intelligence. He joins BAH from IBM, where he lead their X-Force research teams and built the first prototype Watson for cybersecurity.OurMine hackers hit Vevo to redress an insult delivered over LinkedIn. 
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Recorded Future's user conference RFUN 2017 comes to Washington, D.C. , October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 18 Sep 2017 20:13:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>436</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a3412866-def8-11ea-911f-9bd418d0f8e8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Russian dogs not yet barking in German elections. ISIS is doing a lot of howling at lone wolves. Equifax updates. CCleaner found unclean. OurMine hacks Vevo to avenge its honor. </itunes:subtitle>
      <itunes:summary>In today's podcast, we note reports that, while Germany will hold elections Sunday, Russian cyber operators seem quiet. Too quiet? Switzerland and Singapore both report sustaining state-sponsored cyber espionage attempts. ISIS howls for its lone wolves to hit soft targets. The Equifax breach news isn't getting any better. Cisco finds a backdoor in an Avast security product. Chris Poulin from Booz Allen Hamilton, our newest industry partner, introduces himself. He leads the Internet of Things security strategy in Booz Allen’s Dark Labs, as well as dabbles in Machine Intelligence. He joins BAH from IBM, where he lead their X-Force research teams and built the first prototype Watson for cybersecurity.OurMine hackers hit Vevo to redress an insult delivered over LinkedIn. 
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Recorded Future's user conference RFUN 2017 comes to Washington, D.C. , October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we note reports that, while Germany will hold elections Sunday, Russian cyber operators seem quiet. Too quiet? Switzerland and Singapore both report sustaining state-sponsored cyber espionage attempts. ISIS howls for its lone wolves to hit soft targets. The Equifax breach news isn't getting any better. Cisco finds a backdoor in an Avast security product. Chris Poulin from Booz Allen Hamilton, our newest industry partner, introduces himself. He leads the Internet of Things security strategy in Booz Allen’s Dark Labs, as well as dabbles in Machine Intelligence. He joins BAH from IBM, where he lead their X-Force research teams and built the first prototype Watson for cybersecurity.OurMine hackers hit Vevo to redress an insult delivered over LinkedIn. </p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Recorded Future's user conference RFUN 2017 comes to Washington, D.C. <a href="https://goo.gl/mfFR7h">, October 4th and 5th, 2017, bringing together the people who put the act in actionable intelligence.</a> If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/yBBx55">check out E8’s white paper</a><a href="https://goo.gl/mfFR7h">.</a></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>998</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e8ba6ca14f752e29167f1895727ab897]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7282218964.mp3?updated=1689817052" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cobian RAT: Zscaler’s Deepen Desai describes some clever malware. [Research Saturday]</title>
      <link>https://thecyberwire.com/podcasts/research-saturday/1/notes</link>
      <description>Deepen Desai, senior director of security research and operations at Zscaler, describes research he and his team have been doing since discovered a clever bit of malware they’ve named Cobian RAT. (RAT stands for Remote Access Trojan.) It’s available for free, but contains a back door that allows the original author to access and control the RAT remotely.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Sat, 16 Sep 2017 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/9b4c6d10-df0b-11ea-80b8-d39b3f5d30a3/image/research-saturday-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cobian RAT: Zscaler’s Deepen Desai describes some clever malware</itunes:subtitle>
      <itunes:summary>Deepen Desai, senior director of security research and operations at Zscaler, describes research he and his team have been doing since discovered a clever bit of malware they’ve named Cobian RAT. (RAT stands for Remote Access Trojan.) It’s available for free, but contains a back door that allows the original author to access and control the RAT remotely.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Deepen Desai, senior director of security research and operations at Zscaler, describes research he and his team have been doing since discovered a clever bit of malware they’ve named Cobian RAT. (RAT stands for Remote Access Trojan.) It’s available for free, but contains a back door that allows the original author to access and control the RAT remotely.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1092</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c2e78f78176fbece3b7d3f105aa35b03]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8085843357.mp3?updated=1684775238" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Equifax agonistes. Kaspersky denies his company's a security risk. Political database for sale found exposed. Trolling the DCI. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/435/notes</link>
      <description>In today's podcast, we hear about how Equifax continues to struggle in the quicksand of wayward patching and clumsy incident response. Congress, the FTC, the CFPB, and DoNotPay are all taking an interest. Another unsecured database—this one for sale to political campaigns—is found (Alaska voters are affected). Kaspersky says his company is a bystander that's been hit in the Russo-American political crossfire. The US Navy continues to investigate the USS McCain collision. Justin Harvey from Accenture on what it’s like to be on an incident response team. Luke Beeson from BT on the challenges such a large organization faces protecting themselves and their clients. And Harvard decides Manning won't be a Kennedy School Fellow after all. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 15 Sep 2017 21:06:12 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>435</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a355d504-def8-11ea-911f-47e497579d04/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Equifax agonistes. Kaspersky denies his company's a security risk. Political database for sale found exposed. Trolling the DCI. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how Equifax continues to struggle in the quicksand of wayward patching and clumsy incident response. Congress, the FTC, the CFPB, and DoNotPay are all taking an interest. Another unsecured database—this one for sale to political campaigns—is found (Alaska voters are affected). Kaspersky says his company is a bystander that's been hit in the Russo-American political crossfire. The US Navy continues to investigate the USS McCain collision. Justin Harvey from Accenture on what it’s like to be on an incident response team. Luke Beeson from BT on the challenges such a large organization faces protecting themselves and their clients. And Harvard decides Manning won't be a Kennedy School Fellow after all. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how Equifax continues to struggle in the quicksand of wayward patching and clumsy incident response. Congress, the FTC, the CFPB, and DoNotPay are all taking an interest. Another unsecured database—this one for sale to political campaigns—is found (Alaska voters are affected). Kaspersky says his company is a bystander that's been hit in the Russo-American political crossfire. The US Navy continues to investigate the USS McCain collision. Justin Harvey from Accenture on what it’s like to be on an incident response team. Luke Beeson from BT on the challenges such a large organization faces protecting themselves and their clients. And Harvard decides Manning won't be a Kennedy School Fellow after all. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1280</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bf08260d1151dd2fcb87a514afb00d91]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5638842653.mp3?updated=1608753494" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Binding Operational Directive 17-01 hits Kaspersky. Point-of-sale malware found in some ElastiSearch servers. BlueBorne proves widespread. Equifax breach updates, industry notes, a look at the Billington Summit. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/434/notes</link>
      <description>In today's podcast, we hear that DHS tells the US Executive Branch to stop using Kaspersky security software. Kromtech finds ElastiSearch servers hosting point-of-sale malware. BlueBorne bugs buzz billions of boxes. Equifax says that its breach was accomplished via the Apache Struts flaw patched in April. Industry notes include both venture funding and acquisition news. We take a quick look back at the Billington CyberSecurity Summit. Johannes Ulrich with an update on the Mirai botnet. Renato Marinho, Chief Research Officer at Morphus Labs, on a bad Chrome browser extension that can steal banking credentials. And robo-lawyers come to small claims court. 
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 We read Recorded Future’s free intel daily, you might find it valuable, too.
 If you’d like to protect your endpoints against advanced threats, check out Cylance.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 14 Sep 2017 19:44:51 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>434</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a36c24a8-def8-11ea-911f-0f6245bf782d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Binding Operational Directive 17-01 hits Kaspersky. Point-of-sale malware found in some ElastiSearch servers. BlueBorne proves widespread. Equifax breach updates, industry notes, a look at the Billington Summit. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that DHS tells the US Executive Branch to stop using Kaspersky security software. Kromtech finds ElastiSearch servers hosting point-of-sale malware. BlueBorne bugs buzz billions of boxes. Equifax says that its breach was accomplished via the Apache Struts flaw patched in April. Industry notes include both venture funding and acquisition news. We take a quick look back at the Billington CyberSecurity Summit. Johannes Ulrich with an update on the Mirai botnet. Renato Marinho, Chief Research Officer at Morphus Labs, on a bad Chrome browser extension that can steal banking credentials. And robo-lawyers come to small claims court. 
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 We read Recorded Future’s free intel daily, you might find it valuable, too.
 If you’d like to protect your endpoints against advanced threats, check out Cylance.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that DHS tells the US Executive Branch to stop using Kaspersky security software. Kromtech finds ElastiSearch servers hosting point-of-sale malware. BlueBorne bugs buzz billions of boxes. Equifax says that its breach was accomplished via the Apache Struts flaw patched in April. Industry notes include both venture funding and acquisition news. We take a quick look back at the Billington CyberSecurity Summit. Johannes Ulrich with an update on the Mirai botnet. Renato Marinho, Chief Research Officer at Morphus Labs, on a bad Chrome browser extension that can steal banking credentials. And robo-lawyers come to small claims court. </p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>We read Recorded Future’s free intel daily, <a href="http://goo.gl/wphZ1z">you might find it valuable, too</a>.</p> <p>If you’d like to protect your endpoints against advanced threats, <a href="https://goo.gl/fHR65L">check out Cylance</a>.</p> <p>JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. <a href="https://goo.gl/xZCVuf">Register for the event</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1139</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7a0c0a4dde5920e29d3936bbfc24a677]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3858907232.mp3?updated=1689817025" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>North Korea turns to cryptocurrency theft. Equifax breach gets worse. Patch Tuesday. Duma says US election hacked</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/433/notes</link>
      <description>In today's podcast, we hear that North Korea's stealing all the Bitcoins it can find. The Equifax breach continues to spread: countries other than the US are increasingly involved. Patch Tuesday notes. The US Director of National Intelligence addresses the Billington CyberSecurity Summit. Joe Carrigan from JHU on VPN companies collecting private user data. Dr. Richard Ford, Chief Scientist, Forcepoint, on the Equifax breach. And did a Russian lawmaker just cop to the influence ops President Putin has so piously denied? 
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 We read Recorded Future’s free intel daily, you might find it valuable, too.
 If you’d like to protect your endpoints against advanced threats, check out Cylance.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 13 Sep 2017 19:07:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>433</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a382df2c-def8-11ea-911f-17eb9544bb02/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>North Korea turns to cryptocurrency theft. Equifax breach gets worse. Patch Tuesday. Duma says US election hacked</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that North Korea's stealing all the Bitcoins it can find. The Equifax breach continues to spread: countries other than the US are increasingly involved. Patch Tuesday notes. The US Director of National Intelligence addresses the Billington CyberSecurity Summit. Joe Carrigan from JHU on VPN companies collecting private user data. Dr. Richard Ford, Chief Scientist, Forcepoint, on the Equifax breach. And did a Russian lawmaker just cop to the influence ops President Putin has so piously denied? 
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 We read Recorded Future’s free intel daily, you might find it valuable, too.
 If you’d like to protect your endpoints against advanced threats, check out Cylance.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that North Korea's stealing all the Bitcoins it can find. The Equifax breach continues to spread: countries other than the US are increasingly involved. Patch Tuesday notes. The US Director of National Intelligence addresses the Billington CyberSecurity Summit. Joe Carrigan from JHU on VPN companies collecting private user data. Dr. Richard Ford, Chief Scientist, Forcepoint, on the Equifax breach. And did a Russian lawmaker just cop to the influence ops President Putin has so piously denied? </p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>We read Recorded Future’s free intel daily, <a href="http://goo.gl/wphZ1z">you might find it valuable, too</a>.</p> <p>If you’d like to protect your endpoints against advanced threats, <a href="https://goo.gl/fHR65L">check out Cylance</a>.</p> <p>JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. <a href="https://goo.gl/xZCVuf">Register for the event</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1064</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ce33e6872430e7a1a4a0e65353dda9d5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5574554871.mp3?updated=1689817010" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Equifax breach news. Unsecured admin accounts. BlueBorne via Bluetooth. Hackable medical devices. Bots convince. A guilty plea draws a long sentence.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/432/notes</link>
      <description>In today's podcast, we hear about how Equifax has attracted more attention from plaintiffs, AGs, and Congress. Everyone else is on heightened alert for fraud and identity theft. MongoDB says users of its database process were not assigning passwords to administrative accounts. A Bluetooth-based attack vector, "BlueBorne," is described. Syringe pumps are found to be hackable. Bots serve more effective social media clickbait than human operators can. Robert M. Lee from Dragos on deterrence.  Myke Cole, cyber security analyst and fantasy writer discussing the importance of empathy when considering your adversaries. And Roman Seleznev gets 27 years after he cops a plea to hacking.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 We read Recorded Future’s free intel daily, you might find it valuable, too.
 If you’d like to protect your endpoints against advanced threats, check out Cylance.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Sep 2017 19:05:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>432</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a395dc58-def8-11ea-911f-ef799141342e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Equifax breach news. Unsecured admin accounts. BlueBorne via Bluetooth. Hackable medical devices. Bots convince. A guilty plea draws a long sentence.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how Equifax has attracted more attention from plaintiffs, AGs, and Congress. Everyone else is on heightened alert for fraud and identity theft. MongoDB says users of its database process were not assigning passwords to administrative accounts. A Bluetooth-based attack vector, "BlueBorne," is described. Syringe pumps are found to be hackable. Bots serve more effective social media clickbait than human operators can. Robert M. Lee from Dragos on deterrence.  Myke Cole, cyber security analyst and fantasy writer discussing the importance of empathy when considering your adversaries. And Roman Seleznev gets 27 years after he cops a plea to hacking.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 We read Recorded Future’s free intel daily, you might find it valuable, too.
 If you’d like to protect your endpoints against advanced threats, check out Cylance.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how Equifax has attracted more attention from plaintiffs, AGs, and Congress. Everyone else is on heightened alert for fraud and identity theft. MongoDB says users of its database process were not assigning passwords to administrative accounts. A Bluetooth-based attack vector, "BlueBorne," is described. Syringe pumps are found to be hackable. Bots serve more effective social media clickbait than human operators can. Robert M. Lee from Dragos on deterrence.  Myke Cole, cyber security analyst and fantasy writer discussing the importance of empathy when considering your adversaries. And Roman Seleznev gets 27 years after he cops a plea to hacking.</p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>We read Recorded Future’s free intel daily, <a href="http://goo.gl/wphZ1z">you might find it valuable, too</a>.</p> <p>If you’d like to protect your endpoints against advanced threats, <a href="https://goo.gl/fHR65L">check out Cylance</a>.</p> <p>JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. <a href="https://goo.gl/xZCVuf">Register for the event</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1045</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d95ee9bb2bbda46b99ebbea568c9de2f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7121632584.mp3?updated=1689816999" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Everything Equifax, with some notes on German election vulnerabilities and an update on the Crackas With Attitude.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/431/notes</link>
      <description>Today's podcast features all things Equifax, as the credit bureau deals with its breach (and the lawyers and Wall Street wind up to deal with the credit bureau). The Chaos Computer Club says it's found major flaws in German election software. Moscow seems to have done a lot of catphishing in social media during the last US campaign season. Best Buy boots Kaspersky security products from its big box stores. Dale Drew from Level 3 Communications with some sobering statistics on attack trends. And a Cracka with Attitude gets five years in Club Fed.
  
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 We read Recorded Future’s free intel daily, you might find it valuable, too.
 If you’d like to protect your endpoints against advanced threats, check out Cylance.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 11 Sep 2017 20:41:38 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>431</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a3b9945e-def8-11ea-911f-b7d42087b9a7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Everything Equifax, with some notes on German election vulnerabilities and an update on the Crackas With Attitude.</itunes:subtitle>
      <itunes:summary>Today's podcast features all things Equifax, as the credit bureau deals with its breach (and the lawyers and Wall Street wind up to deal with the credit bureau). The Chaos Computer Club says it's found major flaws in German election software. Moscow seems to have done a lot of catphishing in social media during the last US campaign season. Best Buy boots Kaspersky security products from its big box stores. Dale Drew from Level 3 Communications with some sobering statistics on attack trends. And a Cracka with Attitude gets five years in Club Fed.
  
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 We read Recorded Future’s free intel daily, you might find it valuable, too.
 If you’d like to protect your endpoints against advanced threats, check out Cylance.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today's podcast features all things Equifax, as the credit bureau deals with its breach (and the lawyers and Wall Street wind up to deal with the credit bureau). The Chaos Computer Club says it's found major flaws in German election software. Moscow seems to have done a lot of catphishing in social media during the last US campaign season. Best Buy boots Kaspersky security products from its big box stores. Dale Drew from Level 3 Communications with some sobering statistics on attack trends. And a Cracka with Attitude gets five years in Club Fed.</p> <p> </p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>We read Recorded Future’s free intel daily, <a href="http://goo.gl/wphZ1z">you might find it valuable, too</a>.</p> <p>If you’d like to protect your endpoints against advanced threats, <a href="https://goo.gl/fHR65L">check out Cylance</a>.</p> <p>JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. <a href="https://goo.gl/xZCVuf">Register for the event</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>896</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[50ba60808da5d7bdf79b8411b2ae4bf7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7382279707.mp3?updated=1689816927" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Equifax decides to tell people it's been breached. Notes from the Intelligence and National Security Summit. WikiLeaks dumps missile guidance documents from Vault7. The ShadowBrokers are back, with a new offer.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/430/notes</link>
      <description>In today's podcast we hear that credit bureau Equifax had disclosed a massive data breach it discovered on July 29th. Does that mean they're about a month delinquent? WikiLeaks weekly Vault7 dump departs from past practice with respect to content. The ShadowBrokers are back, and offering a twice monthly twofer. Emily Wilson from Terbium Labs with her thoughts on the encryption debate. Alexander Klimburg, author of The Darkening Web. And Intelligence Community leaders agree on at least three things: they need a better security clearance process, they need Section 702, and nowadays all intelligence involves cyber intelligence.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 To learn about combining threat intelligence, analytics, and orchestration, check out ThreatConnect’s webinar.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 08 Sep 2017 19:43:47 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>430</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a3d4a88e-def8-11ea-911f-871aae1d4f3e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Equifax decides to tell people it's been breached. Notes from the Intelligence and National Security Summit. WikiLeaks dumps missile guidance documents from Vault7. The ShadowBrokers are back, with a new offer.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that credit bureau Equifax had disclosed a massive data breach it discovered on July 29th. Does that mean they're about a month delinquent? WikiLeaks weekly Vault7 dump departs from past practice with respect to content. The ShadowBrokers are back, and offering a twice monthly twofer. Emily Wilson from Terbium Labs with her thoughts on the encryption debate. Alexander Klimburg, author of The Darkening Web. And Intelligence Community leaders agree on at least three things: they need a better security clearance process, they need Section 702, and nowadays all intelligence involves cyber intelligence.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 To learn about combining threat intelligence, analytics, and orchestration, check out ThreatConnect’s webinar.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that credit bureau Equifax had disclosed a massive data breach it discovered on July 29th. Does that mean they're about a month delinquent? WikiLeaks weekly Vault7 dump departs from past practice with respect to content. The ShadowBrokers are back, and offering a twice monthly twofer. Emily Wilson from Terbium Labs with her thoughts on the encryption debate. Alexander Klimburg, author of The Darkening Web. And Intelligence Community leaders agree on at least three things: they need a better security clearance process, they need Section 702, and nowadays all intelligence involves cyber intelligence.</p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>To learn about combining threat intelligence, analytics, and orchestration, <a href="http://goo.gl/HsMhE7">check out ThreatConnect’s webinar</a>.</p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/jXSsTF">check out E8’s white paper</a>.</p> <p>JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. <a href="https://goo.gl/xZCVuf">Register for the event</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1384</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f5c5e368e645d76ffb3a25bf91562008]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5298951962.mp3?updated=1608753656" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>DragonFly 2.0 in power grids. Cyberespionage in the South China Sea. Russian Facebook ads. "Fake News" survey.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/429/notes</link>
      <description>DragonFly 2.0 is up to some very bad things in several nations' power grids. China ramps up cyberespionage against South China Sea rivals. Facebook finds that a Russian front company bought more than $100,000 in influence-ops ads on its service over the last two years. US info ops stumble over a dog. Jonathan Katz on encryption bit depth. Kyle Wilhoit from Domain Tools with the results of a Black Hat survey on "fake news." And a Japanese 13-year-old is in hot water for trying to sell malware.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 To learn about combining threat intelligence, analytics, and orchestration, check out ThreatConnect’s webinar.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 07 Sep 2017 17:57:16 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>429</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a3ff1de4-def8-11ea-911f-bf38ebe2fd5f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>DragonFly 2.0 in power grids. Cyberespionage in the South China Sea. Russian Facebook ads. "Fake News" survey.</itunes:subtitle>
      <itunes:summary>DragonFly 2.0 is up to some very bad things in several nations' power grids. China ramps up cyberespionage against South China Sea rivals. Facebook finds that a Russian front company bought more than $100,000 in influence-ops ads on its service over the last two years. US info ops stumble over a dog. Jonathan Katz on encryption bit depth. Kyle Wilhoit from Domain Tools with the results of a Black Hat survey on "fake news." And a Japanese 13-year-old is in hot water for trying to sell malware.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 To learn about combining threat intelligence, analytics, and orchestration, check out ThreatConnect’s webinar.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>DragonFly 2.0 is up to some very bad things in several nations' power grids. China ramps up cyberespionage against South China Sea rivals. Facebook finds that a Russian front company bought more than $100,000 in influence-ops ads on its service over the last two years. US info ops stumble over a dog. Jonathan Katz on encryption bit depth. Kyle Wilhoit from Domain Tools with the results of a Black Hat survey on "fake news." And a Japanese 13-year-old is in hot water for trying to sell malware.</p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>To learn about combining threat intelligence, analytics, and orchestration, <a href="http://goo.gl/HsMhE7">check out ThreatConnect’s webinar</a>.</p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/jXSsTF">check out E8’s white paper</a>.</p> <p>JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. <a href="https://goo.gl/xZCVuf">Register for the event</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1028</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fa96637c5d3cd155d8b62fa8a285edfa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2955137117.mp3?updated=1689816891" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Apache Struts patched. Dragonfly is in the power grid. Ransomware notes. Taringa breached. Cryptocurrencies in China and Russia. Signal stealing that's not SIGINT. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/428/notes</link>
      <description>In today's podcast we hear about a critical vulnerability in Apache Struts. It's been patched—enterprises are advised to apply it as soon as possible. Dragonfly poses a clear and present danger to European and US power grids. Ransomware continues rampant. Latin American social media platform Taringa suffers a breach. Notes from the Intelligence and National Security Summit. Cryptocurrencies in China and Russia. Ben Yelin from UMD CHHS on the resignation of many of President Trump’s cyber security advisors. Guest is Tom Billington promoting the upcoming Billington Cybersecurity event. And say it ain't so, Joe—are the Red Sox stealing signals with an Apple Watch?
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 To learn about combining threat intelligence, analytics, and orchestration, check out ThreatConnect’s webinar.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 06 Sep 2017 19:44:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>428</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a427f426-def8-11ea-911f-ef2efea3ea85/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Apache Struts patched. Dragonfly is in the power grid. Ransomware notes. Taringa breached. Cryptocurrencies in China and Russia. Signal stealing that's not SIGINT. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear about a critical vulnerability in Apache Struts. It's been patched—enterprises are advised to apply it as soon as possible. Dragonfly poses a clear and present danger to European and US power grids. Ransomware continues rampant. Latin American social media platform Taringa suffers a breach. Notes from the Intelligence and National Security Summit. Cryptocurrencies in China and Russia. Ben Yelin from UMD CHHS on the resignation of many of President Trump’s cyber security advisors. Guest is Tom Billington promoting the upcoming Billington Cybersecurity event. And say it ain't so, Joe—are the Red Sox stealing signals with an Apple Watch?
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 To learn about combining threat intelligence, analytics, and orchestration, check out ThreatConnect’s webinar.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about a critical vulnerability in Apache Struts. It's been patched—enterprises are advised to apply it as soon as possible. Dragonfly poses a clear and present danger to European and US power grids. Ransomware continues rampant. Latin American social media platform Taringa suffers a breach. Notes from the Intelligence and National Security Summit. Cryptocurrencies in China and Russia. Ben Yelin from UMD CHHS on the resignation of many of President Trump’s cyber security advisors. Guest is Tom Billington promoting the upcoming Billington Cybersecurity event. And say it ain't so, Joe—are the Red Sox stealing signals with an Apple Watch?</p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>To learn about combining threat intelligence, analytics, and orchestration, <a href="http://goo.gl/HsMhE7">check out ThreatConnect’s webinar</a>.</p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/jXSsTF">check out E8’s white paper</a>.</p> <p>JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. <a href="https://goo.gl/xZCVuf">Register for the event</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1140</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[45226db3191b82d903b77d48a170b0c6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2663230447.mp3?updated=1689816872" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Influence operations in Germany. More Turla. KHRAT looks like political spying. Exposed AWS S3 and MongoDB databases hit. Ransomware notes. Cyber gangland rumbles.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/427/notes</link>
      <description>In today's podcast, we hear that election influence operations appear to have begun in Germany. Turla's spoor tracked to the Pacifier APT. Cambodia takes an authoritarian turn, possibly extending to domestic spying via RAT. Rival jihadists remain active online; US Cyber Command working to deny them cyberspace safe havens. More exposed AWS S3 databases. MongoDB databases hit with ransom wiper. PrincessLocker and Locky ransomware continue to romp in the wild. Free RAT backdoors criminals. Johannes Ulrich from SANS Technology Institute and the ISC Stormcast podcast on DDoS extortion emails. Disgruntled customer doxes booter service.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 To learn about combining threat intelligence, analytics, and orchestration, check out ThreatConnect’s webinar.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Sep 2017 20:03:37 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>427</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a4453f4a-def8-11ea-911f-bf84d0d475a7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Influence operations in Germany. More Turla. KHRAT looks like political spying. Exposed AWS S3 and MongoDB databases hit. Ransomware notes. Cyber gangland rumbles.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that election influence operations appear to have begun in Germany. Turla's spoor tracked to the Pacifier APT. Cambodia takes an authoritarian turn, possibly extending to domestic spying via RAT. Rival jihadists remain active online; US Cyber Command working to deny them cyberspace safe havens. More exposed AWS S3 databases. MongoDB databases hit with ransom wiper. PrincessLocker and Locky ransomware continue to romp in the wild. Free RAT backdoors criminals. Johannes Ulrich from SANS Technology Institute and the ISC Stormcast podcast on DDoS extortion emails. Disgruntled customer doxes booter service.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 To learn about combining threat intelligence, analytics, and orchestration, check out ThreatConnect’s webinar.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that election influence operations appear to have begun in Germany. Turla's spoor tracked to the Pacifier APT. Cambodia takes an authoritarian turn, possibly extending to domestic spying via RAT. Rival jihadists remain active online; US Cyber Command working to deny them cyberspace safe havens. More exposed AWS S3 databases. MongoDB databases hit with ransom wiper. PrincessLocker and Locky ransomware continue to romp in the wild. Free RAT backdoors criminals. Johannes Ulrich from SANS Technology Institute and the ISC Stormcast podcast on DDoS extortion emails. Disgruntled customer doxes booter service.</p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>To learn about combining threat intelligence, analytics, and orchestration, <a href="http://goo.gl/HsMhE7">check out ThreatConnect’s webinar</a>.</p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/jXSsTF">check out E8’s white paper</a>.</p> <p>JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. <a href="https://goo.gl/xZCVuf">Register for the event</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>954</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[77aa6079b76ec1a41d73ee550ba7d426]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4218363035.mp3?updated=1689816858" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kenyan election nullified over electronic irregularities. South China Sea cyber espionage. WikiLeaks' Vault7 dumps Angelfire. Accused leaker wants her statements excluded. DPRK raids ROK Bitcoin. WhopperCoin is here.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/426/notes</link>
      <description>In today's podcast, we hear that Kenya's Supreme Court has nullified that country's presidential election results over electronic irregularities in the balloting. Chinese steps up cyber espionage against Vietnam during South China Sea disputes. Ransomware continued to surge this week. WikiLeaks dumps "Angelfire" documents from Vault7. Reality Winner says she wasn't properly Mirandized by the FBI. North Korea raids South Korean Bitcoin exchanges. Joe Carrigan from JHU on security issues with fitness apps. Charles Henderson from IBM’s X-Force Red group on automotive security.  And get ready for WhopperCoin.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Check out &amp; subscribe to Recorded Future’s free intel daily. We read it every day. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper. JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 01 Sep 2017 19:02:25 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>426</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a45524f0-def8-11ea-911f-1f2d1e5359f8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Kenyan election nullified over electronic irregularities. South China Sea cyber espionage. WikiLeaks' Vault7 dumps Angelfire. Accused leaker wants her statements excluded. DPRK raids ROK Bitcoin. WhopperCoin is here.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Kenya's Supreme Court has nullified that country's presidential election results over electronic irregularities in the balloting. Chinese steps up cyber espionage against Vietnam during South China Sea disputes. Ransomware continued to surge this week. WikiLeaks dumps "Angelfire" documents from Vault7. Reality Winner says she wasn't properly Mirandized by the FBI. North Korea raids South Korean Bitcoin exchanges. Joe Carrigan from JHU on security issues with fitness apps. Charles Henderson from IBM’s X-Force Red group on automotive security.  And get ready for WhopperCoin.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Check out &amp; subscribe to Recorded Future’s free intel daily. We read it every day. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper. JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Kenya's Supreme Court has nullified that country's presidential election results over electronic irregularities in the balloting. Chinese steps up cyber espionage against Vietnam during South China Sea disputes. Ransomware continued to surge this week. WikiLeaks dumps "Angelfire" documents from Vault7. Reality Winner says she wasn't properly Mirandized by the FBI. North Korea raids South Korean Bitcoin exchanges. Joe Carrigan from JHU on security issues with fitness apps. Charles Henderson from IBM’s X-Force Red group on automotive security.  And get ready for WhopperCoin.</p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Check out &amp; subscribe to Recorded Future’s free intel daily. <a>We read it every day.</a> If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/jXSsTF">check out E8’s white paper</a>. JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. <a href="https://goo.gl/xZCVuf">Register for the event</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1316</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7f185387c09352bb58cd9f1073e7e293]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9852389884.mp3?updated=1608753488" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Turla's Gazer backdoor. OurMine vs. WikiLeaks; WikiLeaks vs. CIA. Reality Winner trial. House of Cards material leaks. Patching notes. Insecure APIs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/425/notes</link>
      <description>In today's podcast we hear that Turla's using some sophisticated code against diplomatic and defense industry targets. OurMine hackers use DNS poisoning against WikiLeaks, but WikiLeaks opens up Vault7 anyway: this week it's "Angelfire." Accused US Intelligence Community leaker Reality Winner wants her initial statements to investigators suppressed at trial. House of Cards leaks stories and other material related to the TV show. A quick patching update. Insecure APIs take a toll on Instagram and the FCC. Emily Wilson from Terbium Labs with her thoughts on the closure of Alpha Bay. Mike Kearney from Deloitte on predictive reputation protection. And what's up with Rick and Morty?
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Check out &amp; subscribe to Recorded Future’s free intel daily. We read it every day. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper. JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 31 Aug 2017 19:55:52 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>425</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a46e6e24-def8-11ea-911f-635fe508d9df/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Turla's Gazer backdoor. OurMine vs. WikiLeaks; WikiLeaks vs. CIA. Reality Winner trial. House of Cards material leaks. Patching notes. Insecure APIs.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Turla's using some sophisticated code against diplomatic and defense industry targets. OurMine hackers use DNS poisoning against WikiLeaks, but WikiLeaks opens up Vault7 anyway: this week it's "Angelfire." Accused US Intelligence Community leaker Reality Winner wants her initial statements to investigators suppressed at trial. House of Cards leaks stories and other material related to the TV show. A quick patching update. Insecure APIs take a toll on Instagram and the FCC. Emily Wilson from Terbium Labs with her thoughts on the closure of Alpha Bay. Mike Kearney from Deloitte on predictive reputation protection. And what's up with Rick and Morty?
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Check out &amp; subscribe to Recorded Future’s free intel daily. We read it every day. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper. JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Turla's using some sophisticated code against diplomatic and defense industry targets. OurMine hackers use DNS poisoning against WikiLeaks, but WikiLeaks opens up Vault7 anyway: this week it's "Angelfire." Accused US Intelligence Community leaker Reality Winner wants her initial statements to investigators suppressed at trial. House of Cards leaks stories and other material related to the TV show. A quick patching update. Insecure APIs take a toll on Instagram and the FCC. Emily Wilson from Terbium Labs with her thoughts on the closure of Alpha Bay. Mike Kearney from Deloitte on predictive reputation protection. And what's up with Rick and Morty?</p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Check out &amp; subscribe to Recorded Future’s free intel daily. <a>We read it every day.</a> If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/jXSsTF">check out E8’s white paper</a>. JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. <a href="https://goo.gl/xZCVuf">Register for the event</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1114</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[33b63151399a36a21ab5915341b82281]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7083066465.mp3?updated=1689816822" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing and watering hole alerts. Is DPRK stealing Bitcoin? NHS Lanarkshire ransomware identified as Bit Paymer. Onliner spambot has hundreds of millions of email addresses. St. Jude pacemaker patch.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/424/notes</link>
      <description>In today's podcast, we hear warnings against taking the Hurricane Harvey phishbait. The IRS says that email telling you to download a questionnaire and return it to the FBI isn't from them. Why you really don't want that tutorial in tumbling Bitcoin. Sources accuse North Korea of stealing cryptocurrency. Trickbot is back, and it's swiping Bitcoin. The ransomware strain in Scottish hospitals was Bit Paymer. More than 700 million email addresses found in the Onliner spambot. UK retailer suffers breach. St. Jude pacemakers get a firmware patch. Robert M Lee from Dragos on cutting through the hype. Joseph Loomis, promoting the upcoming IR17 event. And some industry notes.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Check out &amp; subscribe to Recorded Future’s free intel daily. We read it every day. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper. JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 30 Aug 2017 19:49:28 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>424</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a49195e8-def8-11ea-911f-e36e5c6a053f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Phishing and watering hole alerts. Is DPRK stealing Bitcoin? NHS Lanarkshire ransomware identified as Bit Paymer. Onliner spambot has hundreds of millions of email addresses. St. Jude pacemaker patch.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear warnings against taking the Hurricane Harvey phishbait. The IRS says that email telling you to download a questionnaire and return it to the FBI isn't from them. Why you really don't want that tutorial in tumbling Bitcoin. Sources accuse North Korea of stealing cryptocurrency. Trickbot is back, and it's swiping Bitcoin. The ransomware strain in Scottish hospitals was Bit Paymer. More than 700 million email addresses found in the Onliner spambot. UK retailer suffers breach. St. Jude pacemakers get a firmware patch. Robert M Lee from Dragos on cutting through the hype. Joseph Loomis, promoting the upcoming IR17 event. And some industry notes.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Check out &amp; subscribe to Recorded Future’s free intel daily. We read it every day. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper. JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear warnings against taking the Hurricane Harvey phishbait. The IRS says that email telling you to download a questionnaire and return it to the FBI isn't from them. Why you really don't want that tutorial in tumbling Bitcoin. Sources accuse North Korea of stealing cryptocurrency. Trickbot is back, and it's swiping Bitcoin. The ransomware strain in Scottish hospitals was Bit Paymer. More than 700 million email addresses found in the Onliner spambot. UK retailer suffers breach. St. Jude pacemakers get a firmware patch. Robert M Lee from Dragos on cutting through the hype. Joseph Loomis, promoting the upcoming IR17 event. And some industry notes.</p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Check out &amp; subscribe to Recorded Future’s free intel daily. <a>We read it every day.</a> If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/jXSsTF">check out E8’s white paper</a>. JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. <a href="https://goo.gl/xZCVuf">Register for the event</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1049</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cf55f6849ed9e15f03336dc38ebf007b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1781082226.mp3?updated=1689816806" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>NIST Cybersecurity Framework [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/18/notes</link>
      <description>Having a set of standards by which to measure your security organization, being able to compare your security posture to other organizations, and being able to justify your choices to investors and insurance firms are all worthwhile goals? It’s beneficial to have widely agreed upon standards of care and measurement in cyber security, to help know where you stand, where there’s room for improvement, and what’s important to you.
That’s where frameworks come in, and the NIST cybersecurity framework is one of the most popular in the cybersecurity industry. In this CyberWire special edition, we’ll examine frameworks in general and the NIST cybersecurity framework specifically, to see if adopting them is worth the time, energy and expense it takes.
Joining us are Rick Tracy, Chief Security Officer for Telos corporation, Rafal Los, Managing Director of the Solutions and Programs insight group at Optiv Security, and Matt Barrett, Program Manager for the Cyber Security Framework at NIST. Stay with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 30 Aug 2017 12:49:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>18</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/96f27c12-df03-11ea-9ebd-abbc0240aafe/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>NIST Cybersecurity Framework</itunes:subtitle>
      <itunes:summary>Having a set of standards by which to measure your security organization, being able to compare your security posture to other organizations, and being able to justify your choices to investors and insurance firms are all worthwhile goals? It’s beneficial to have widely agreed upon standards of care and measurement in cyber security, to help know where you stand, where there’s room for improvement, and what’s important to you.
That’s where frameworks come in, and the NIST cybersecurity framework is one of the most popular in the cybersecurity industry. In this CyberWire special edition, we’ll examine frameworks in general and the NIST cybersecurity framework specifically, to see if adopting them is worth the time, energy and expense it takes.
Joining us are Rick Tracy, Chief Security Officer for Telos corporation, Rafal Los, Managing Director of the Solutions and Programs insight group at Optiv Security, and Matt Barrett, Program Manager for the Cyber Security Framework at NIST. Stay with us.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Having a set of standards by which to measure your security organization, being able to compare your security posture to other organizations, and being able to justify your choices to investors and insurance firms are all worthwhile goals? It’s beneficial to have widely agreed upon standards of care and measurement in cyber security, to help know where you stand, where there’s room for improvement, and what’s important to you.</p><p>That’s where frameworks come in, and the NIST cybersecurity framework is one of the most popular in the cybersecurity industry. In this CyberWire special edition, we’ll examine frameworks in general and the NIST cybersecurity framework specifically, to see if adopting them is worth the time, energy and expense it takes.</p><p>Joining us are Rick Tracy, Chief Security Officer for Telos corporation, Rafal Los, Managing Director of the Solutions and Programs insight group at Optiv Security, and Matt Barrett, Program Manager for the Cyber Security Framework at NIST. Stay with us.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1702</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6a0c803d9a23180c0f41b52149216bd4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6294110316.mp3?updated=1656708127" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberespionage in South Asia. NHS hack confirmed as ransomare. Notes on Hancitor. WireX Android botnet taken down. Fat-fingering BGP. Topical phishbait.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/423/notes</link>
      <description>In today's podcast, we hear reports of cyberespionage against both India and Pakistan—some unknown third nation-state is said to be responsible. NHS Lanarkshire hack confirmed as ransomware. Notes on Hancitor malware, WireX Android DDoS botnet discovered and taken down by an industry consortium. BGP fumble hit Japan's Internet, not hackers. Hurricane Harvey and Game of Thrones phishbait in circulation. Justin Harvey from Accenture on open source threat intelligence. Avi Reichental from XponentialWorks on security issues with implantable data devices. And no, not that GPS.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Check out &amp; subscribe to Recorded Future’s free intel daily. We read it every day. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper. JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Aug 2017 19:59:15 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>423</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a4a76d82-def8-11ea-911f-4ffb3614c55d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyberespionage in South Asia. NHS hack confirmed as ransomare. Notes on Hancitor. WireX Android botnet taken down. Fat-fingering BGP. Topical phishbait.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear reports of cyberespionage against both India and Pakistan—some unknown third nation-state is said to be responsible. NHS Lanarkshire hack confirmed as ransomware. Notes on Hancitor malware, WireX Android DDoS botnet discovered and taken down by an industry consortium. BGP fumble hit Japan's Internet, not hackers. Hurricane Harvey and Game of Thrones phishbait in circulation. Justin Harvey from Accenture on open source threat intelligence. Avi Reichental from XponentialWorks on security issues with implantable data devices. And no, not that GPS.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Check out &amp; subscribe to Recorded Future’s free intel daily. We read it every day. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper. JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear reports of cyberespionage against both India and Pakistan—some unknown third nation-state is said to be responsible. NHS Lanarkshire hack confirmed as ransomware. Notes on Hancitor malware, WireX Android DDoS botnet discovered and taken down by an industry consortium. BGP fumble hit Japan's Internet, not hackers. Hurricane Harvey and Game of Thrones phishbait in circulation. Justin Harvey from Accenture on open source threat intelligence. Avi Reichental from XponentialWorks on security issues with implantable data devices. And no, not that GPS.</p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Check out &amp; subscribe to Recorded Future’s free intel daily. <a>We read it every day.</a> If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/jXSsTF">check out E8’s white paper</a>. JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. <a href="https://goo.gl/xZCVuf">Register for the event</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>979</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[64ff96da54602e9a6779543061dd2a9b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7514921428.mp3?updated=1689816790" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Maritime cybersecurity concerns. ExpressLane dump stirs up international trouble. IoT botnet threat addressed. Defray ransomware. Cyberattack in Scotland. Tehran's info-ops rapper.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/422/notes</link>
      <description>In today's podcast, we hear that the USS McCain collision appears to unrelated to any cyberattack, but observers warn of ICS security issues as maritime cyber concerns rise. WikiLeaks' ExpressLane Vault7 dump raises concerns in India. Telnet credentials for Internet-of-things devices exposed; security experts work to close this DDoS risk. "Defray" ransomware being distributed with unusually precise and plausible spearphishing. A ransomware attack disrupts some healthcare services in Scotland. Acquisition news in the cyber sector. Ben Yelin from UMD CHHS on web sites logging form submissions even before you hit the “submit” button. And Iranian information operations seem to be piping the devil's tune (more or less literally, from Tehran's official point-of-view).
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Check out &amp; subscribe to Recorded Future’s free intel daily. We read it every day. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper. JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 28 Aug 2017 20:32:46 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>422</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a4d2a754-def8-11ea-911f-1b6e2e780263/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Maritime cybersecurity concerns. ExpressLane dump stirs up international trouble. IoT botnet threat addressed. Defray ransomware. Cyberattack in Scotland. Tehran's info-ops rapper.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the USS McCain collision appears to unrelated to any cyberattack, but observers warn of ICS security issues as maritime cyber concerns rise. WikiLeaks' ExpressLane Vault7 dump raises concerns in India. Telnet credentials for Internet-of-things devices exposed; security experts work to close this DDoS risk. "Defray" ransomware being distributed with unusually precise and plausible spearphishing. A ransomware attack disrupts some healthcare services in Scotland. Acquisition news in the cyber sector. Ben Yelin from UMD CHHS on web sites logging form submissions even before you hit the “submit” button. And Iranian information operations seem to be piping the devil's tune (more or less literally, from Tehran's official point-of-view).
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Check out &amp; subscribe to Recorded Future’s free intel daily. We read it every day. If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper. JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the USS McCain collision appears to unrelated to any cyberattack, but observers warn of ICS security issues as maritime cyber concerns rise. WikiLeaks' ExpressLane Vault7 dump raises concerns in India. Telnet credentials for Internet-of-things devices exposed; security experts work to close this DDoS risk. "Defray" ransomware being distributed with unusually precise and plausible spearphishing. A ransomware attack disrupts some healthcare services in Scotland. Acquisition news in the cyber sector. Ben Yelin from UMD CHHS on web sites logging form submissions even before you hit the “submit” button. And Iranian information operations seem to be piping the devil's tune (more or less literally, from Tehran's official point-of-view).</p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors. Check out &amp; subscribe to Recorded Future’s free intel daily. <a>We read it every day.</a> If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/jXSsTF">check out E8’s white paper</a>. JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. <a href="https://goo.gl/xZCVuf">Register for the event</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>939</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e8e0a99f798eba9a9eb7e9ff4002d79f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3760712636.mp3?updated=1689816779" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Clouds, crooks, cheats, and cryptocurrencies. Vault7 leaks liaisonware. Rumors about FSB officers charged with treason. FBI arrests Chinese national in OPM hack. Extremism online flows more than it ebbs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/421/notes</link>
      <description>In today's podcast we hear about how the four C's have come together: clouds, crooks, cheats, and crypotcurrencies. Locky continues to circulate in evolved forms. WikiLeaks dumps some curious alleged liaisonware documents from Vault7. Russian sources report that FSB officers facing treason charges in Moscow may have given up some connected hackers to the Americans. The FBI makes an arrest in the OPM breach. The Daily Stormer is way offline, but ISIS and its parasitic slave-trading gangs are decidedly online. Dale Drew from Level 3 Communications with some threat intelligence on phishing and malware. Guest is Nicole Eagan, CEO of Darktrace. And another consequence of NotPetya seems to be a pet food shortage.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Your patient data depends on incident response plans. Prepare with DeltaRisk's webinar.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 25 Aug 2017 18:09:09 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>421</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a4e1a8bc-def8-11ea-911f-df6627a556bc/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Clouds, crooks, cheats, and cryptocurrencies. Vault7 leaks liaisonware. Rumors about FSB officers charged with treason. FBI arrests Chinese national in OPM hack. Extremism online flows more than it ebbs.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about how the four C's have come together: clouds, crooks, cheats, and crypotcurrencies. Locky continues to circulate in evolved forms. WikiLeaks dumps some curious alleged liaisonware documents from Vault7. Russian sources report that FSB officers facing treason charges in Moscow may have given up some connected hackers to the Americans. The FBI makes an arrest in the OPM breach. The Daily Stormer is way offline, but ISIS and its parasitic slave-trading gangs are decidedly online. Dale Drew from Level 3 Communications with some threat intelligence on phishing and malware. Guest is Nicole Eagan, CEO of Darktrace. And another consequence of NotPetya seems to be a pet food shortage.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Your patient data depends on incident response plans. Prepare with DeltaRisk's webinar.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about how the four C's have come together: clouds, crooks, cheats, and crypotcurrencies. Locky continues to circulate in evolved forms. WikiLeaks dumps some curious alleged liaisonware documents from Vault7. Russian sources report that FSB officers facing treason charges in Moscow may have given up some connected hackers to the Americans. The FBI makes an arrest in the OPM breach. The Daily Stormer is way offline, but ISIS and its parasitic slave-trading gangs are decidedly online. Dale Drew from Level 3 Communications with some threat intelligence on phishing and malware. Guest is Nicole Eagan, CEO of Darktrace. And another consequence of NotPetya seems to be a pet food shortage.</p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/jXSsTF">check out E8’s white paper</a>.</p> <p>Your patient data depends on incident response plans. <a href="https://goo.gl/a3zEca">Prepare with DeltaRisk's webinar.</a></p> <p>JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. <a href="https://goo.gl/xZCVuf">Register for the event</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1416</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6572621f80cba722be50cdb6f6a73cde]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9437955730.mp3?updated=1608753541" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberattacks that may not have been. Ropemaker corrupts email after delivery. Concerns about companies working for intelligence services.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/420/notes</link>
      <description>In today's podcast we consider the way in which two potential state cyberattacks are now looking more like, respectively, an accident and a conventional crime. US Government officials double-down on warnings of Kaspersky connection to the Kremlin, and Australia's Government isn't buying Huawei's protests that it's not working for the PLA, either. Ropemaker attacks could inject malicious code into email after it's been delivered. Joe Carrigan from JHU on medical device security legislation. Christopher Pierson from Viewpost with observations from DEFCON. Some teasers on the Chertoff Group's Security Series.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Your patient data depends on incident response plans. Prepare with DeltaRisk's webinar.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 24 Aug 2017 19:39:47 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>420</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a5004d08-def8-11ea-911f-47cc219ce3c7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyberattacks that may not have been. Ropemaker corrupts email after delivery. Concerns about companies working for intelligence services.</itunes:subtitle>
      <itunes:summary>In today's podcast we consider the way in which two potential state cyberattacks are now looking more like, respectively, an accident and a conventional crime. US Government officials double-down on warnings of Kaspersky connection to the Kremlin, and Australia's Government isn't buying Huawei's protests that it's not working for the PLA, either. Ropemaker attacks could inject malicious code into email after it's been delivered. Joe Carrigan from JHU on medical device security legislation. Christopher Pierson from Viewpost with observations from DEFCON. Some teasers on the Chertoff Group's Security Series.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Your patient data depends on incident response plans. Prepare with DeltaRisk's webinar.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we consider the way in which two potential state cyberattacks are now looking more like, respectively, an accident and a conventional crime. US Government officials double-down on warnings of Kaspersky connection to the Kremlin, and Australia's Government isn't buying Huawei's protests that it's not working for the PLA, either. Ropemaker attacks could inject malicious code into email after it's been delivered. Joe Carrigan from JHU on medical device security legislation. Christopher Pierson from Viewpost with observations from DEFCON. Some teasers on the Chertoff Group's Security Series.</p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/jXSsTF">check out E8’s white paper</a>.</p> <p>Your patient data depends on incident response plans. <a href="https://goo.gl/a3zEca">Prepare with DeltaRisk's webinar.</a></p> <p>JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. <a href="https://goo.gl/xZCVuf">Register for the event</a>.</p> <p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1076</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[be990950475f44155d351f8fd02488e1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8146290009.mp3?updated=1689816758" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Independence day cyberattack worries in Ukraine. US Navy eliminating possibility of cyberattack on USS McCain. More malicious apps in Google Play. US state cyber regs. ISIS still works to inspire online.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/419/notes</link>
      <description>In today's podcast, we hear that Ukraine is worried about cyberattacks in conjunction with tomorrow's independence day holiday. The US Navy investigates the possibility of cyberattack in this week's Malacca Straits collision, but that possibility may be fading. Zscaler finds more malicious apps in Google Play. New York State's Department of Financial Services' cyber regulations begin to take effect Monday. Delaware is also stepping up data security regulations. Johannes Ulrich from the SANS Technology Institute and the ISC Stormcast podcast on hacks to Uber driver accounts. Tony Dahbura from JHU promotes their upcoming Cyber Security Conference for Executives. And ISIS continues its inspiration online as police in many countries scramble to follow the Caliphate's messaging.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Your patient data depends on incident response plans. Prepare with DeltaRisk's webinar.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 23 Aug 2017 19:15:28 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>419</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a516621e-def8-11ea-911f-9389534c70ef/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Independence day cyberattack worries in Ukraine. US Navy eliminating possibility of cyberattack on USS McCain. More malicious apps in Google Play. US state cyber regs. ISIS still works to inspire online.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Ukraine is worried about cyberattacks in conjunction with tomorrow's independence day holiday. The US Navy investigates the possibility of cyberattack in this week's Malacca Straits collision, but that possibility may be fading. Zscaler finds more malicious apps in Google Play. New York State's Department of Financial Services' cyber regulations begin to take effect Monday. Delaware is also stepping up data security regulations. Johannes Ulrich from the SANS Technology Institute and the ISC Stormcast podcast on hacks to Uber driver accounts. Tony Dahbura from JHU promotes their upcoming Cyber Security Conference for Executives. And ISIS continues its inspiration online as police in many countries scramble to follow the Caliphate's messaging.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Your patient data depends on incident response plans. Prepare with DeltaRisk's webinar.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Ukraine is worried about cyberattacks in conjunction with tomorrow's independence day holiday. The US Navy investigates the possibility of cyberattack in this week's Malacca Straits collision, but that possibility may be fading. Zscaler finds more malicious apps in Google Play. New York State's Department of Financial Services' cyber regulations begin to take effect Monday. Delaware is also stepping up data security regulations. Johannes Ulrich from the SANS Technology Institute and the ISC Stormcast podcast on hacks to Uber driver accounts. Tony Dahbura from JHU promotes their upcoming Cyber Security Conference for Executives. And ISIS continues its inspiration online as police in many countries scramble to follow the Caliphate's messaging.</p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/jXSsTF">check out E8’s white paper</a>.</p> <p>Your patient data depends on incident response plans. <a href="https://goo.gl/a3zEca">Prepare with DeltaRisk's webinar.</a></p> <p>JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. <a href="https://goo.gl/xZCVuf">Register for the event</a>.</p> <p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1037</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5a04ed6a3067c0a2a244f0b7fe8b34d9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5124932253.mp3?updated=1689816743" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber concerns about naval and maritime shipping operations. AWS S3 data exposure. Game of Thrones hack. NHS breach? Killer robots. Scareware. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/418/notes</link>
      <description>In today's podcast, we hear about maritime hacking worries, with potential risks to navigation, cargo handling, and manifest data. Another misconfigured AWS S3 bucket exposes business data. "Mr. Smith" says he's going to release the Game of Thrones season finale. The UK's NHS may have been breached. Google pulls 500 backdoored apps from the Play store. Fear of robots. Fileless cryptocurrency miner installed through EternalBlue. Jonathan Katz from UMD on separating science from snake oil. Dan Larson from CrowdStrike on incident response for zero-days. Scareware scares web surfers.
  Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Your patient data depends on incident response plans. Prepare with DeltaRisk's webinar.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Aug 2017 20:33:59 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>418</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a533e708-def8-11ea-911f-0fe8d8078351/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyber concerns about naval and maritime shipping operations. AWS S3 data exposure. Game of Thrones hack. NHS breach? Killer robots. Scareware. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about maritime hacking worries, with potential risks to navigation, cargo handling, and manifest data. Another misconfigured AWS S3 bucket exposes business data. "Mr. Smith" says he's going to release the Game of Thrones season finale. The UK's NHS may have been breached. Google pulls 500 backdoored apps from the Play store. Fear of robots. Fileless cryptocurrency miner installed through EternalBlue. Jonathan Katz from UMD on separating science from snake oil. Dan Larson from CrowdStrike on incident response for zero-days. Scareware scares web surfers.
  Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Your patient data depends on incident response plans. Prepare with DeltaRisk's webinar.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about maritime hacking worries, with potential risks to navigation, cargo handling, and manifest data. Another misconfigured AWS S3 bucket exposes business data. "Mr. Smith" says he's going to release the Game of Thrones season finale. The UK's NHS may have been breached. Google pulls 500 backdoored apps from the Play store. Fear of robots. Fileless cryptocurrency miner installed through EternalBlue. Jonathan Katz from UMD on separating science from snake oil. Dan Larson from CrowdStrike on incident response for zero-days. Scareware scares web surfers.</p> <p> Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/jXSsTF">check out E8’s white paper</a>.</p> <p>Your patient data depends on incident response plans. <a href="https://goo.gl/a3zEca">Prepare with DeltaRisk's webinar.</a></p> <p>JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. <a href="https://goo.gl/xZCVuf">Register for the event</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1073</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[36e296bd9142181575e20c896a795f61]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6719815783.mp3?updated=1689816731" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>GCHQ and MalwareTech's arrest. Chinese oilfield sustains malware infestation. US Cyber Command now a UCC. Ukraine fears another cyber campaign. Turla returns. GPS spoofing. Extremism online. ICO hack.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/417/notes</link>
      <description>In today's podcast, we hear that GCHQ may have known about the FBI's intentions to arrest Marcus Hutchins even before Hutchins departed England for Black Hat. A Chinese oil production field is thought to have sustained some sort of cyber incident similar to those involving NotPetya. US Cyber Command receives elevated status—it's now the tenth Unified Combatant Command. Ukrainian authorities warn that country's financial sector to expect a new wave of cyberattacks. Turla is back, inviting you to the G20 meetings. GPS spoofing fears rise. Dealing with extremism online. Palo Alto Networks' Rick Howard on the fading popularity of the Rig exploit kit. And another initial coin offering is hacked.
  Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Your patient data depends on incident response plans. Prepare with DeltaRisk's webinar.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 21 Aug 2017 18:54:41 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>417</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a5586754-def8-11ea-911f-a75df569b49b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>GCHQ and MalwareTech's arrest. Chinese oilfield sustains malware infestation. US Cyber Command now a UCC. Ukraine fears another cyber campaign. Turla returns. GPS spoofing. Extremism online. ICO hack.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that GCHQ may have known about the FBI's intentions to arrest Marcus Hutchins even before Hutchins departed England for Black Hat. A Chinese oil production field is thought to have sustained some sort of cyber incident similar to those involving NotPetya. US Cyber Command receives elevated status—it's now the tenth Unified Combatant Command. Ukrainian authorities warn that country's financial sector to expect a new wave of cyberattacks. Turla is back, inviting you to the G20 meetings. GPS spoofing fears rise. Dealing with extremism online. Palo Alto Networks' Rick Howard on the fading popularity of the Rig exploit kit. And another initial coin offering is hacked.
  Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Your patient data depends on incident response plans. Prepare with DeltaRisk's webinar.
 JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. Register for the event.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that GCHQ may have known about the FBI's intentions to arrest Marcus Hutchins even before Hutchins departed England for Black Hat. A Chinese oil production field is thought to have sustained some sort of cyber incident similar to those involving NotPetya. US Cyber Command receives elevated status—it's now the tenth Unified Combatant Command. Ukrainian authorities warn that country's financial sector to expect a new wave of cyberattacks. Turla is back, inviting you to the G20 meetings. GPS spoofing fears rise. Dealing with extremism online. Palo Alto Networks' Rick Howard on the fading popularity of the Rig exploit kit. And another initial coin offering is hacked.</p> <p> Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="https://goo.gl/jXSsTF">check out E8’s white paper</a>.</p> <p>Your patient data depends on incident response plans. <a href="https://goo.gl/a3zEca">Prepare with DeltaRisk's webinar.</a></p> <p>JHUISI &amp; partner COMPASS Cyber present Cyber Security Conference for Executives on September 19th in Baltimore. <a href="https://goo.gl/xZCVuf">Register for the event</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>933</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[911b4a8acd9cee52df9bc14d2d85ccac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8860723988.mp3?updated=1689816720" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware updates. ShadowPad backdoor may have got into the supply chain from a Chinese APT group. Apple Secure Enclave decryption key released. Profexor and Fancy Bear. Misconfigured AWS S3 exposes voter data. Countering extremism online. FBI continues </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/416/notes</link>
      <description>In today's podcast, we hear that ransomware strains, old and new, are circulating in the wild. ShadowPad backdoors are tentatively attributed to Chinese espionage operations in the supply chain. A hacker releases the decryption key for Apple's Secure Enclave. Profexor may actually not know much about Fancy Bear's romp through the DNC. Another misconfigured AWS bucket exposes data on voters in Chicago. The difficulties of countering extremism online. Malek Ben Salem from Accenture Labs on the cloud security maturity model. Joseph Carson from Thycotic on the evolution of phishing campaigns. The FBI has a roadshow warning companies of the risks of using Kaspersky security products.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 18 Aug 2017 18:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>416</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a5700288-def8-11ea-911f-675b154396a7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ransomware updates. ShadowPad backdoor may have got into the supply chain from a Chinese APT group. Apple Secure Enclave decryption key released. Profexor and Fancy Bear. Misconfigured AWS S3 exposes voter data. Countering extremism online. FBI continues </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that ransomware strains, old and new, are circulating in the wild. ShadowPad backdoors are tentatively attributed to Chinese espionage operations in the supply chain. A hacker releases the decryption key for Apple's Secure Enclave. Profexor may actually not know much about Fancy Bear's romp through the DNC. Another misconfigured AWS bucket exposes data on voters in Chicago. The difficulties of countering extremism online. Malek Ben Salem from Accenture Labs on the cloud security maturity model. Joseph Carson from Thycotic on the evolution of phishing campaigns. The FBI has a roadshow warning companies of the risks of using Kaspersky security products.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that ransomware strains, old and new, are circulating in the wild. ShadowPad backdoors are tentatively attributed to Chinese espionage operations in the supply chain. A hacker releases the decryption key for Apple's Secure Enclave. Profexor may actually not know much about Fancy Bear's romp through the DNC. Another misconfigured AWS bucket exposes data on voters in Chicago. The difficulties of countering extremism online. Malek Ben Salem from Accenture Labs on the cloud security maturity model. Joseph Carson from Thycotic on the evolution of phishing campaigns. The FBI has a roadshow warning companies of the risks of using Kaspersky security products.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1419</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f4fe0698971ad3eddefce79b1385a4d0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3858050353.mp3?updated=1608753486" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Email brute-forcing. Aadhaar woes. Leaked Equation Group exploits remain a problem. Hijacked Chrome extensions. Pulse wave DDoS. FBI interviews "Profexor." Extremism and vigilantism. OurMine hacks HBO Twitter, Facebook.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/415/notes</link>
      <description>In today's podcast, we hear that Holyrood is defending itself with some success against email brute-forcing. India's national ID system compromised, again. ShadowBroker-leaked exploits continue to do damage. Hijacked Chrome extensions prove difficult to eradicate. New variants of Locky and other ransomware are out. "Pulse wave" DDoS attacks are observed. Researchers find DDoS-as-a-service for sale in Chinese online souks. Governments express suspicion of foreign IT. Extremist site loses hosts, but its content will go on, even as opposing vigilantes mistakenly dox innocent targets. Emily Wilson from Terbium Labs with thoughts from Black Hat and shifting awareness of the dark web.  Brad Stone from Booz Allen on a recently released report on NotPetya. And OurMine hijacks HBO social media accounts.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Your patient data depends on incident response plans. Prepare with DeltaRisk's webinar.
 Domain Tools leverages both human and machine intelligence to expose malicious infrastructure. Learn more in their white paper.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 17 Aug 2017 18:52:38 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>415</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a588028e-def8-11ea-911f-df11cbf47d4f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Email brute-forcing. Aadhaar woes. Leaked Equation Group exploits remain a problem. Hijacked Chrome extensions. Pulse wave DDoS. FBI interviews "Profexor." Extremism and vigilantism. OurMine hacks HBO Twitter, Facebook.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Holyrood is defending itself with some success against email brute-forcing. India's national ID system compromised, again. ShadowBroker-leaked exploits continue to do damage. Hijacked Chrome extensions prove difficult to eradicate. New variants of Locky and other ransomware are out. "Pulse wave" DDoS attacks are observed. Researchers find DDoS-as-a-service for sale in Chinese online souks. Governments express suspicion of foreign IT. Extremist site loses hosts, but its content will go on, even as opposing vigilantes mistakenly dox innocent targets. Emily Wilson from Terbium Labs with thoughts from Black Hat and shifting awareness of the dark web.  Brad Stone from Booz Allen on a recently released report on NotPetya. And OurMine hijacks HBO social media accounts.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Your patient data depends on incident response plans. Prepare with DeltaRisk's webinar.
 Domain Tools leverages both human and machine intelligence to expose malicious infrastructure. Learn more in their white paper.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Holyrood is defending itself with some success against email brute-forcing. India's national ID system compromised, again. ShadowBroker-leaked exploits continue to do damage. Hijacked Chrome extensions prove difficult to eradicate. New variants of Locky and other ransomware are out. "Pulse wave" DDoS attacks are observed. Researchers find DDoS-as-a-service for sale in Chinese online souks. Governments express suspicion of foreign IT. Extremist site loses hosts, but its content will go on, even as opposing vigilantes mistakenly dox innocent targets. Emily Wilson from Terbium Labs with thoughts from Black Hat and shifting awareness of the dark web.  Brad Stone from Booz Allen on a recently released report on NotPetya. And OurMine hijacks HBO social media accounts.</p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="http://bit.ly/PodSponsorE8">check out E8’s white paper</a>.</p> <p>Your patient data depends on incident response plans. <a href="http://bit.ly/PodSponsorDeltaRisk">Prepare with DeltaRisk's webinar.</a></p> <p>Domain Tools leverages both human and machine intelligence to expose malicious infrastructure. <a href="http://bit.ly/PodSponsorDomainTools">Learn more in their white paper</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1059</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4aca6d252c503810af5c9d14d213dbc2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1547394906.mp3?updated=1689816692" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>NIST SP 800-53 updated. Attack on Scotland Parliament's email system. Consequences of Equation Group leaks. "Mr. Smith" and HBO. Attacks of note: Trickbot, OLE exploits, NetSarang backdoor. Extremist inspiration. BEC.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/414/notes</link>
      <description>In today's podcast, we hear about a new draft of NIST SP 800-53. There's been an attempt to brute-force email credentials in Scotland's Parliament. Fancy Bear's romp through high-end hotel Wi-Fi suggests the Equation Group leaks will be with us for some time. "Mr. Smith" remains at large, and still wants to be paid. Trickbot uses unusually convincing counterfeit sites. PowerPoint malware vectors may be part of a criminal test. NetSarang urges swift patching of a backdoor in its software. Extremist inspiration persists.  Ben Yelin from UMD CHHS on privacy concerns with robot vacuum cleaners. Guest is Jeff Pederson from Kroll Ontrack, a data recovery firm, with tips on data recovery.And some guy in Nigeria with more moxie than skills is behind a big business email compromise campaign.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Your patient data depends on incident response plans. Prepare with DeltaRisk's webinar.
 Domain Tools leverages both human and machine intelligence to expose malicious infrastructure. Learn more in their white paper.
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 16 Aug 2017 17:21:02 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>414</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a59eb2cc-def8-11ea-911f-d74ec7ef4167/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>NIST SP 800-53 updated. Attack on Scotland Parliament's email system. Consequences of Equation Group leaks. "Mr. Smith" and HBO. Attacks of note: Trickbot, OLE exploits, NetSarang backdoor. Extremist inspiration. BEC.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about a new draft of NIST SP 800-53. There's been an attempt to brute-force email credentials in Scotland's Parliament. Fancy Bear's romp through high-end hotel Wi-Fi suggests the Equation Group leaks will be with us for some time. "Mr. Smith" remains at large, and still wants to be paid. Trickbot uses unusually convincing counterfeit sites. PowerPoint malware vectors may be part of a criminal test. NetSarang urges swift patching of a backdoor in its software. Extremist inspiration persists.  Ben Yelin from UMD CHHS on privacy concerns with robot vacuum cleaners. Guest is Jeff Pederson from Kroll Ontrack, a data recovery firm, with tips on data recovery.And some guy in Nigeria with more moxie than skills is behind a big business email compromise campaign.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Your patient data depends on incident response plans. Prepare with DeltaRisk's webinar.
 Domain Tools leverages both human and machine intelligence to expose malicious infrastructure. Learn more in their white paper.
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about a new draft of NIST SP 800-53. There's been an attempt to brute-force email credentials in Scotland's Parliament. Fancy Bear's romp through high-end hotel Wi-Fi suggests the Equation Group leaks will be with us for some time. "Mr. Smith" remains at large, and still wants to be paid. Trickbot uses unusually convincing counterfeit sites. PowerPoint malware vectors may be part of a criminal test. NetSarang urges swift patching of a backdoor in its software. Extremist inspiration persists.  Ben Yelin from UMD CHHS on privacy concerns with robot vacuum cleaners. Guest is Jeff Pederson from Kroll Ontrack, a data recovery firm, with tips on data recovery.And some guy in Nigeria with more moxie than skills is behind a big business email compromise campaign.</p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="http://bit.ly/PodSponsorE8">check out E8’s white paper</a>.</p> <p>Your patient data depends on incident response plans. <a href="http://bit.ly/PodSponsorDeltaRisk">Prepare with DeltaRisk's webinar.</a></p> <p>Domain Tools leverages both human and machine intelligence to expose malicious infrastructure. <a href="http://bit.ly/PodSponsorDomainTools">Learn more in their white paper</a>.</p> <p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1080</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[391bbaaeded7c91c15b990649be7d21f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3428795770.mp3?updated=1689816681" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lazarus Group is back, phishing in English. Extremist content online. Google cleans up SonicSpy. Arrests for HBO hacking are unrelated to "Mr. Smith." Marcus Hutchins is out on. DJI drones get a security makeover. Help desk scams.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/413/notes</link>
      <description>In today's podcast, we hear that the Lazarus Group is back, and now they're phishing in English. The Daily Stormer gets the boot, but companies and governments continue to struggle with developing appropriate responses to extremist content. Google has swiftly cleaned up SonicSpy, but the malware is still circulating outside the Play store. Indian police make four arrests for HBO hacking, but none of them are related to "Mr. Smith." Marcus Hutchins is out on bail and preparing for an October trial. DJI drones get a peacemaking makeover. Justin Harvey from Accenture on prepping for destructive attacks. Jeff Schumann CEO of Wiretap on vulnerabilities in messaging technologies like Slack and Yammer. And one weird trick to recognizing that a call is a help desk scam. Ready? It's this: they called you.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Your patient data depends on incident response plans. Prepare with DeltaRisk's webinar.
 Domain Tools leverages both human and machine intelligence to expose malicious infrastructure. Learn more in their white paper.
  
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Aug 2017 19:22:28 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>413</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a5b33f80-def8-11ea-911f-b30d429c18c0/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Lazarus Group is back, phishing in English. Extremist content online. Google cleans up SonicSpy. Arrests for HBO hacking are unrelated to "Mr. Smith." Marcus Hutchins is out on. DJI drones get a security makeover. Help desk scams.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the Lazarus Group is back, and now they're phishing in English. The Daily Stormer gets the boot, but companies and governments continue to struggle with developing appropriate responses to extremist content. Google has swiftly cleaned up SonicSpy, but the malware is still circulating outside the Play store. Indian police make four arrests for HBO hacking, but none of them are related to "Mr. Smith." Marcus Hutchins is out on bail and preparing for an October trial. DJI drones get a peacemaking makeover. Justin Harvey from Accenture on prepping for destructive attacks. Jeff Schumann CEO of Wiretap on vulnerabilities in messaging technologies like Slack and Yammer. And one weird trick to recognizing that a call is a help desk scam. Ready? It's this: they called you.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Your patient data depends on incident response plans. Prepare with DeltaRisk's webinar.
 Domain Tools leverages both human and machine intelligence to expose malicious infrastructure. Learn more in their white paper.
  
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the Lazarus Group is back, and now they're phishing in English. The Daily Stormer gets the boot, but companies and governments continue to struggle with developing appropriate responses to extremist content. Google has swiftly cleaned up SonicSpy, but the malware is still circulating outside the Play store. Indian police make four arrests for HBO hacking, but none of them are related to "Mr. Smith." Marcus Hutchins is out on bail and preparing for an October trial. DJI drones get a peacemaking makeover. Justin Harvey from Accenture on prepping for destructive attacks. Jeff Schumann CEO of Wiretap on vulnerabilities in messaging technologies like Slack and Yammer. And one weird trick to recognizing that a call is a help desk scam. Ready? It's this: they called you.</p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="http://bit.ly/PodSponsorE8">check out E8’s white paper</a>.</p> <p>Your patient data depends on incident response plans. <a href="http://bit.ly/PodSponsorDeltaRisk">Prepare with DeltaRisk's webinar.</a></p> <p>Domain Tools leverages both human and machine intelligence to expose malicious infrastructure. <a href="http://bit.ly/PodSponsorDomainTools">Learn more in their white paper</a>.</p> <p> </p> <p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1148</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f79f369516821d5bb9197dda135bf8b3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1930665121.mp3?updated=1689816670" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Charlottesville hacking. Operation #LeakTheAnalyst. Dissatisfied customer calls ShadowBrokers a "ripoff." More HBO leaks. Google purging SonicSpy. Collusion attacks. Marcus Hutchins in court.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/412/notes</link>
      <description>In today's podcast, we hear about online reactions and hacks in response to the Charlottesville rioting and homicide. Operation #LeakTheAnalyst releases another, smaller, set of documents. The ShadowBrokers get some poor customer reviews for their Exploit-of-the-Month Club. Reputation matters in the dark web souks. More HBO leaks (but no new messages). Google ejects SonicSpy-infected apps from the Playstore. Oxford researchers describe Android library collusion attacks. Robert M. Lee from Dragos on recent incursions into the Irish and UK power grids. And fellow security researchers can't believe Marcus Hutchins would wittingly do what the Feds accuse him of.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Your patient data depends on incident response plans. Prepare with DeltaRisk's webinar.
 Domain Tools leverages both human and machine intelligence to expose malicious infrastructure. Learn more in their white paper.
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 14 Aug 2017 19:33:39 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>412</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a5c7c95a-def8-11ea-911f-eb5616c1dfdd/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Charlottesville hacking. Operation #LeakTheAnalyst. Dissatisfied customer calls ShadowBrokers a "ripoff." More HBO leaks. Google purging SonicSpy. Collusion attacks. Marcus Hutchins in court.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about online reactions and hacks in response to the Charlottesville rioting and homicide. Operation #LeakTheAnalyst releases another, smaller, set of documents. The ShadowBrokers get some poor customer reviews for their Exploit-of-the-Month Club. Reputation matters in the dark web souks. More HBO leaks (but no new messages). Google ejects SonicSpy-infected apps from the Playstore. Oxford researchers describe Android library collusion attacks. Robert M. Lee from Dragos on recent incursions into the Irish and UK power grids. And fellow security researchers can't believe Marcus Hutchins would wittingly do what the Feds accuse him of.
 Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.
 If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, check out E8’s white paper.
 Your patient data depends on incident response plans. Prepare with DeltaRisk's webinar.
 Domain Tools leverages both human and machine intelligence to expose malicious infrastructure. Learn more in their white paper.
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about online reactions and hacks in response to the Charlottesville rioting and homicide. Operation #LeakTheAnalyst releases another, smaller, set of documents. The ShadowBrokers get some poor customer reviews for their Exploit-of-the-Month Club. Reputation matters in the dark web souks. More HBO leaks (but no new messages). Google ejects SonicSpy-infected apps from the Playstore. Oxford researchers describe Android library collusion attacks. Robert M. Lee from Dragos on recent incursions into the Irish and UK power grids. And fellow security researchers can't believe Marcus Hutchins would wittingly do what the Feds accuse him of.</p> <p>Thanks for listening to the CyberWire. One of the ways you can support what we do is by visiting our sponsors.</p> <p>If you’d like to learn more about how small nuances in how artificial intelligence and machine learning are used can make a big difference, <a href="http://bit.ly/PodSponsorE8">check out E8’s white paper</a>.</p> <p>Your patient data depends on incident response plans. <a href="http://bit.ly/PodSponsorDeltaRisk">Prepare with DeltaRisk's webinar.</a></p> <p>Domain Tools leverages both human and machine intelligence to expose malicious infrastructure. <a href="http://bit.ly/PodSponsorDomainTools">Learn more in their white paper</a>.</p> <p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>826</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[62d5070f824485a876d89920881e91fd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9217652899.mp3?updated=1689816656" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>HBO offered Mr. Smith a bug bounty, but no takers. Fancy Bear's in hotel Wi-Fi. DNC leak argument resumes. Locky and Mamba ransomware are back. ISIS on eBay. NotPetya arrest. WikiLeaks dumps more from Vault7.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/411/notes</link>
      <description>In today's podcast, we hear that Mr. Smith turned down HBO's offer of a $250,000 bug bounty. Fancy Bear uses EternalBlue tools against hotel Wi-Fi networks. Argument over who leaked DNC emails last year flares again. New versions of Locky and Mamba ransomware circulate in the wild. The US Department of Defense is ready to use rapid acquisition to buy cyber tools and services. The FBI says a Maryland man used eBay and PayPal to receive ISIS funds for possible terror activity. Ukraine makes an arrest in the NotPetya case. David Dufour from Webroot on basic cyber hygiene. Barmak Meftah, President &amp; CEO at AlienVault, with his thoughts on the state of the industry. And WikiLeaks dumps video intercept tool CouchPotato.
  
 Supported by E8 Security, Johns Hopkins University, and Domain Tools.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 11 Aug 2017 18:34:02 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>411</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a5de333e-def8-11ea-911f-bbbda6666474/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>HBO offered Mr. Smith a bug bounty, but no takers. Fancy Bear's in hotel Wi-Fi. DNC leak argument resumes. Locky and Mamba ransomware are back. ISIS on eBay. NotPetya arrest. WikiLeaks dumps more from Vault7.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Mr. Smith turned down HBO's offer of a $250,000 bug bounty. Fancy Bear uses EternalBlue tools against hotel Wi-Fi networks. Argument over who leaked DNC emails last year flares again. New versions of Locky and Mamba ransomware circulate in the wild. The US Department of Defense is ready to use rapid acquisition to buy cyber tools and services. The FBI says a Maryland man used eBay and PayPal to receive ISIS funds for possible terror activity. Ukraine makes an arrest in the NotPetya case. David Dufour from Webroot on basic cyber hygiene. Barmak Meftah, President &amp; CEO at AlienVault, with his thoughts on the state of the industry. And WikiLeaks dumps video intercept tool CouchPotato.
  
 Supported by E8 Security, Johns Hopkins University, and Domain Tools.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Mr. Smith turned down HBO's offer of a $250,000 bug bounty. Fancy Bear uses EternalBlue tools against hotel Wi-Fi networks. Argument over who leaked DNC emails last year flares again. New versions of Locky and Mamba ransomware circulate in the wild. The US Department of Defense is ready to use rapid acquisition to buy cyber tools and services. The FBI says a Maryland man used eBay and PayPal to receive ISIS funds for possible terror activity. Ukraine makes an arrest in the NotPetya case. David Dufour from Webroot on basic cyber hygiene. Barmak Meftah, President &amp; CEO at AlienVault, with his thoughts on the state of the industry. And WikiLeaks dumps video intercept tool CouchPotato.</p> <p> </p> <p>Supported by <a href="http://bit.ly/CWE8AI">E8 Security</a>, <a href="http://bit.ly/CWjhuisi">Johns Hopkins University</a>, and <a href="http://bit.ly/CWDomainTools">Domain Tools</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1332</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d04b3d24eb9736039654ac60097b7950]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1755320993.mp3?updated=1608753742" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Kenyan elections, not hacked? Someone's poking into DPRK systems. DDoS in Ukraine. Pseudoransomware protection. Spyware in Play Store. HBO hack.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/410/notes</link>
      <description>In today's podcast, we learn that EU election monitors say Kenyan presidential voting went off without hacking (the losing opposition disagrees). Germany looks toward securing September's vote. North Korea receives cyber attention from somewhere in the civilized world. Ukraine's postal service sustains a two-day DDoS attack. WannaCry and NotPetya pseudoransomware fallout. Spyware-infected apps found in the Google Play Store. Jonathan Katz from UMD on a RSA 2048 encryption hack. Markus Jakobsson from Agari on a proposed cyber threat classification system. "Mr. Smith" comes to Midtown, and he wants a raise from Richard.
  
 Supported by E8 Security, Johns Hopkins University, and Domain Tools.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 10 Aug 2017 19:45:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>410</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a5f3ee2c-def8-11ea-911f-ab61ae51a1bb/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Kenyan elections, not hacked? Someone's poking into DPRK systems. DDoS in Ukraine. Pseudoransomware protection. Spyware in Play Store. HBO hack.</itunes:subtitle>
      <itunes:summary>In today's podcast, we learn that EU election monitors say Kenyan presidential voting went off without hacking (the losing opposition disagrees). Germany looks toward securing September's vote. North Korea receives cyber attention from somewhere in the civilized world. Ukraine's postal service sustains a two-day DDoS attack. WannaCry and NotPetya pseudoransomware fallout. Spyware-infected apps found in the Google Play Store. Jonathan Katz from UMD on a RSA 2048 encryption hack. Markus Jakobsson from Agari on a proposed cyber threat classification system. "Mr. Smith" comes to Midtown, and he wants a raise from Richard.
  
 Supported by E8 Security, Johns Hopkins University, and Domain Tools.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we learn that EU election monitors say Kenyan presidential voting went off without hacking (the losing opposition disagrees). Germany looks toward securing September's vote. North Korea receives cyber attention from somewhere in the civilized world. Ukraine's postal service sustains a two-day DDoS attack. WannaCry and NotPetya pseudoransomware fallout. Spyware-infected apps found in the Google Play Store. Jonathan Katz from UMD on a RSA 2048 encryption hack. Markus Jakobsson from Agari on a proposed cyber threat classification system. "Mr. Smith" comes to Midtown, and he wants a raise from Richard.</p> <p> </p> <p>Supported by <a href="http://bit.ly/CWE8AI">E8 Security</a>, <a href="http://bit.ly/CWjhuisi">Johns Hopkins University</a>, and <a href="http://bit.ly/CWDomainTools">Domain Tools</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1072</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bdbbed0377fe47e847b0c3fd7c728cb3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2355745541.mp3?updated=1689816569" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patches, passwords, wipers, and pseudoransomware. New fronts in hybrid war? KONNI, OnionDog, and Israbye.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/409/notes</link>
      <description>In today's podcast, we hear that Patch Tuesday saw Windows and Adobe fixes. Venezuela's civil conflict gets a hacktivist dimension. Anti-Israeli wiper malware is circulating in the wild, unpolished by nasty. Kaspersky Lab expects to see more pseudoransomware, especially when disruption and not profit is the goal. The KONNI RAT, of unknown origin sniffs at sites associated with North Korea. The HBO hack remains under investigation. Putin turns his attentions to Georgia. Johannes Ulrich from the SANS Technology Institute and the ISC Stormcast podcast on weak two-factor authentications systems. Tim Erlin from Tripwire on their Infosecurity Europe 2017 survey. And familiar password advice gets jettisoned.
  
 Supported by E8 Security, Johns Hopkins University, and Domain Tools.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 09 Aug 2017 20:02:20 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>409</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a609604a-def8-11ea-911f-33894e630e51/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Patches, passwords, wipers, and pseudoransomware. New fronts in hybrid war? KONNI, OnionDog, and Israbye.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Patch Tuesday saw Windows and Adobe fixes. Venezuela's civil conflict gets a hacktivist dimension. Anti-Israeli wiper malware is circulating in the wild, unpolished by nasty. Kaspersky Lab expects to see more pseudoransomware, especially when disruption and not profit is the goal. The KONNI RAT, of unknown origin sniffs at sites associated with North Korea. The HBO hack remains under investigation. Putin turns his attentions to Georgia. Johannes Ulrich from the SANS Technology Institute and the ISC Stormcast podcast on weak two-factor authentications systems. Tim Erlin from Tripwire on their Infosecurity Europe 2017 survey. And familiar password advice gets jettisoned.
  
 Supported by E8 Security, Johns Hopkins University, and Domain Tools.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Patch Tuesday saw Windows and Adobe fixes. Venezuela's civil conflict gets a hacktivist dimension. Anti-Israeli wiper malware is circulating in the wild, unpolished by nasty. Kaspersky Lab expects to see more pseudoransomware, especially when disruption and not profit is the goal. The KONNI RAT, of unknown origin sniffs at sites associated with North Korea. The HBO hack remains under investigation. Putin turns his attentions to Georgia. Johannes Ulrich from the SANS Technology Institute and the ISC Stormcast podcast on weak two-factor authentications systems. Tim Erlin from Tripwire on their Infosecurity Europe 2017 survey. And familiar password advice gets jettisoned.</p> <p> </p> <p>Supported by <a href="http://bit.ly/CWE8AI">E8 Security</a>, <a href="http://bit.ly/CWjhuisi">Johns Hopkins University</a>, and <a href="http://bit.ly/CWDomainTools">Domain Tools</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1024</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d53ef9db30f986731e8be0466032facb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4052185496.mp3?updated=1689816557" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Power grid risks. Update on the Mandiant employee hack. "Mr. Smith" holds HBO for ransom. Shipping industry looks for GPS backup. DHL sees a NotPetya windfall. Google patches ten Android remote-code execution vulnerabilities. NIST issues a Cybersecurity W</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/408/notes</link>
      <description>In today's podcast, we hear about a security incident at EirGrid, a misconfigured server in Texas, and a demonstration of photovoltaic system hacking prompt power grid security concerns. Update on the Mandiant employee hack. "Mr. Smith" holds HBO for ransom (but says, no, he's really a good guy). Shipping industry looks for GPS backup capability, and shippers not hit by NotPetya enjoy an increase in business. Google patches ten Android remote-code execution vulnerabilities. Joe Carrigan from JHU on Facebook and Google eavesdropping conspiracy theories.  Juan Perez-Etchegoyen from Onapsis on Oracle business app vulnerabilities . NIST issues a Cybersecurity Workforce Framework.
 Supported by E8 Security, Johns Hopkins University, and Domain Tools.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Aug 2017 19:47:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>408</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a63aa2c2-def8-11ea-911f-ab68651a4ae5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Power grid risks. Update on the Mandiant employee hack. "Mr. Smith" holds HBO for ransom. Shipping industry looks for GPS backup. DHL sees a NotPetya windfall. Google patches ten Android remote-code execution vulnerabilities. NIST issues a Cybersecurity W</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about a security incident at EirGrid, a misconfigured server in Texas, and a demonstration of photovoltaic system hacking prompt power grid security concerns. Update on the Mandiant employee hack. "Mr. Smith" holds HBO for ransom (but says, no, he's really a good guy). Shipping industry looks for GPS backup capability, and shippers not hit by NotPetya enjoy an increase in business. Google patches ten Android remote-code execution vulnerabilities. Joe Carrigan from JHU on Facebook and Google eavesdropping conspiracy theories.  Juan Perez-Etchegoyen from Onapsis on Oracle business app vulnerabilities . NIST issues a Cybersecurity Workforce Framework.
 Supported by E8 Security, Johns Hopkins University, and Domain Tools.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about a security incident at EirGrid, a misconfigured server in Texas, and a demonstration of photovoltaic system hacking prompt power grid security concerns. Update on the Mandiant employee hack. "Mr. Smith" holds HBO for ransom (but says, no, he's really a good guy). Shipping industry looks for GPS backup capability, and shippers not hit by NotPetya enjoy an increase in business. Google patches ten Android remote-code execution vulnerabilities. Joe Carrigan from JHU on Facebook and Google eavesdropping conspiracy theories.  Juan Perez-Etchegoyen from Onapsis on Oracle business app vulnerabilities . NIST issues a Cybersecurity Workforce Framework.</p> <p>Supported by <a href="http://bit.ly/CWE8AI">E8 Security</a>, <a href="http://bit.ly/CWjhuisi">Johns Hopkins University</a>, and <a href="http://bit.ly/CWDomainTools">Domain Tools</a>.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1043</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0d4e4ad39938195de825c23b2743f9d5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9474722524.mp3?updated=1689816545" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US Army bans DJI COTS drones. Amazon will scan AWS customers' S3 buckets for public accessibility. Recommendations for election security. Marcus Huchins pleads not guilty to Kronos-related charges.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/407/notes</link>
      <description>In today's podcast, we hear that the US Army bans, immediately, all use of DJI commercial-off-the-shelf drones. We discuss two known unknowns and offer some background on Defense acquisition practices. Amazon will begin scanning AWS customers' buckets for publicly accessible data. Dale Drew from Level 3 Communications offers his view on hacking back. White hat hackers offer recommendations for election security. And Marcus Huchins, a.k.a. MalwareTech, pleads not guilty to Kronos-related charges and makes bail.
 Supported by E8 Security, Johns Hopkins University, and Domain Tools.
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 07 Aug 2017 19:29:05 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>407</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a65b040e-def8-11ea-911f-bbefa1a0eb41/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>US Army bans DJI COTS drones. Amazon will scan AWS customers' S3 buckets for public accessibility. Recommendations for election security. Marcus Huchins pleads not guilty to Kronos-related charges.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the US Army bans, immediately, all use of DJI commercial-off-the-shelf drones. We discuss two known unknowns and offer some background on Defense acquisition practices. Amazon will begin scanning AWS customers' buckets for publicly accessible data. Dale Drew from Level 3 Communications offers his view on hacking back. White hat hackers offer recommendations for election security. And Marcus Huchins, a.k.a. MalwareTech, pleads not guilty to Kronos-related charges and makes bail.
 Supported by E8 Security, Johns Hopkins University, and Domain Tools.
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the US Army bans, immediately, all use of DJI commercial-off-the-shelf drones. We discuss two known unknowns and offer some background on Defense acquisition practices. Amazon will begin scanning AWS customers' buckets for publicly accessible data. Dale Drew from Level 3 Communications offers his view on hacking back. White hat hackers offer recommendations for election security. And Marcus Huchins, a.k.a. MalwareTech, pleads not guilty to Kronos-related charges and makes bail.</p> <p>Supported by <a href="http://bit.ly/CWE8AI">E8 Security</a>, <a href="http://bit.ly/CWjhuisi">Johns Hopkins University</a>, and <a href="http://bit.ly/CWDomainTools">Domain Tools</a>.</p> <p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>876</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01c0dbba2ba0100e5c1e10db8958a48b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7808084937.mp3?updated=1689816533" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>MalwareTech arrested over Kronos banking Trojan. "Bateleur" in the wild. Long DDoS hits Chinese telco. Russian influence operations no longer novel? FBI investigates HBO hack.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/406/notes</link>
      <description>In today's podcast, we hear that security researcher MalwareTech has been arrested as the alleged author of the Kronos banking Trojan. Carbanak hoods release "Bateleur" into the wild, phishing in chain restaurant waters. A long DDoS attack in China seems aimed at extortion. German elections prepare for Russian influence operations, but the novelty may have worn off Moscow's line. US states and DHS work toward cooperative cybersecurity. Emily Wilson from Terbium Labs on dark web gun sales. William Saito on Japan’s cyber security preparations for the upcoming Olympics. The FBI is investigating the HBO hack.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 04 Aug 2017 19:19:31 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>406</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a6753eb4-def8-11ea-911f-ef755d22cc6b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>MalwareTech arrested over Kronos banking Trojan. "Bateleur" in the wild. Long DDoS hits Chinese telco. Russian influence operations no longer novel? FBI investigates HBO hack.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that security researcher MalwareTech has been arrested as the alleged author of the Kronos banking Trojan. Carbanak hoods release "Bateleur" into the wild, phishing in chain restaurant waters. A long DDoS attack in China seems aimed at extortion. German elections prepare for Russian influence operations, but the novelty may have worn off Moscow's line. US states and DHS work toward cooperative cybersecurity. Emily Wilson from Terbium Labs on dark web gun sales. William Saito on Japan’s cyber security preparations for the upcoming Olympics. The FBI is investigating the HBO hack.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that security researcher MalwareTech has been arrested as the alleged author of the Kronos banking Trojan. Carbanak hoods release "Bateleur" into the wild, phishing in chain restaurant waters. A long DDoS attack in China seems aimed at extortion. German elections prepare for Russian influence operations, but the novelty may have worn off Moscow's line. US states and DHS work toward cooperative cybersecurity. Emily Wilson from Terbium Labs on dark web gun sales. William Saito on Japan’s cyber security preparations for the upcoming Olympics. The FBI is investigating the HBO hack.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1239</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7a65ac64d40a603deaa979c323934fdf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1853063771.mp3?updated=1608753556" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>WikiLeaks dumps Dumbo dox. HBO's hack gets bigger. Group IB outs the United Islamic Cyber Force. Cerber goes after Bitcoin. Lawsuits over NotPetya; more companies warn. Election fraud in Venezuela.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/405/notes</link>
      <description>In today's podcast, we hear that WikiLeaks has dumped "Dumbo" project documents. Separation of agencies as a way of rendering leaks less likely. HBO's hack is getting bigger, apparently. Group IB outs members of the United Islamic Cyber Force to Interpol. Cerber goes after Bitcoin. WannaCry ransom payments are being moved, perhaps laundered. Lawsuits loom over NotPetya as more companies warn the malware had a material effect. The FBI says you can't exercise your right to be forgotten by DDoS. Election fraud in Venezuela. Markus Rauschecker from UMD CHHS on large companies like FaceBook and Google being vulnerable to privacy and antitrust concerns. Jim Pflaging from the Chertoff Group, promoting their upcoming Security in the Boardroom event, speaking to the role of the board director when it comes to cyber security.And your guests can eavesdrop on you through your Amazon Echo. (But why would you have those people over anyway?)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 03 Aug 2017 18:28:37 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>405</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a6878cd6-def8-11ea-911f-0f3e4872bfbd/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>WikiLeaks dumps Dumbo dox. HBO's hack gets bigger. Group IB outs the United Islamic Cyber Force. Cerber goes after Bitcoin. Lawsuits over NotPetya; more companies warn. Election fraud in Venezuela.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that WikiLeaks has dumped "Dumbo" project documents. Separation of agencies as a way of rendering leaks less likely. HBO's hack is getting bigger, apparently. Group IB outs members of the United Islamic Cyber Force to Interpol. Cerber goes after Bitcoin. WannaCry ransom payments are being moved, perhaps laundered. Lawsuits loom over NotPetya as more companies warn the malware had a material effect. The FBI says you can't exercise your right to be forgotten by DDoS. Election fraud in Venezuela. Markus Rauschecker from UMD CHHS on large companies like FaceBook and Google being vulnerable to privacy and antitrust concerns. Jim Pflaging from the Chertoff Group, promoting their upcoming Security in the Boardroom event, speaking to the role of the board director when it comes to cyber security.And your guests can eavesdrop on you through your Amazon Echo. (But why would you have those people over anyway?)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that WikiLeaks has dumped "Dumbo" project documents. Separation of agencies as a way of rendering leaks less likely. HBO's hack is getting bigger, apparently. Group IB outs members of the United Islamic Cyber Force to Interpol. Cerber goes after Bitcoin. WannaCry ransom payments are being moved, perhaps laundered. Lawsuits loom over NotPetya as more companies warn the malware had a material effect. The FBI says you can't exercise your right to be forgotten by DDoS. Election fraud in Venezuela. Markus Rauschecker from UMD CHHS on large companies like FaceBook and Google being vulnerable to privacy and antitrust concerns. Jim Pflaging from the Chertoff Group, promoting their upcoming Security in the Boardroom event, speaking to the role of the board director when it comes to cyber security.And your guests can eavesdrop on you through your Amazon Echo. (But why would you have those people over anyway?)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1070</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0d51c0f7b36c0b855a3dee11cf28d868]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9769958629.mp3?updated=1689816506" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Following up on security scrambles in Sweden and Ukraine. #LeakTheAnalyst. Blu Product phones booted by Amazon. BitCoin's hard fork. The Internet of Things Cybersecurity Improvement Act of 2017.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/404/notes</link>
      <description>In today's podcast we following up on some of the stories we've been tracking: the latest on Operation #LeakTheAnalyst, firmware spyware in down-market phones, Sweden's big breach, and Ukraine's new cyber friends. BrickerBot is back, offering Indian routers and modems unwelcome help. The US Senate considers IoT security legislation, and the US Justice Department issues a framework with guidelines for bug-hunting programs. Bitcoin's hard fork occurred yesterday. Robert M. Lee from Dragos, on ICS attack basics. David Murray from Corvil on security in the financial markets. And why people care about the HBO hack.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 02 Aug 2017 20:06:02 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>404</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a6a87f36-def8-11ea-911f-a345c92140a4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Following up on security scrambles in Sweden and Ukraine. #LeakTheAnalyst. Blu Product phones booted by Amazon. BitCoin's hard fork. The Internet of Things Cybersecurity Improvement Act of 2017.</itunes:subtitle>
      <itunes:summary>In today's podcast we following up on some of the stories we've been tracking: the latest on Operation #LeakTheAnalyst, firmware spyware in down-market phones, Sweden's big breach, and Ukraine's new cyber friends. BrickerBot is back, offering Indian routers and modems unwelcome help. The US Senate considers IoT security legislation, and the US Justice Department issues a framework with guidelines for bug-hunting programs. Bitcoin's hard fork occurred yesterday. Robert M. Lee from Dragos, on ICS attack basics. David Murray from Corvil on security in the financial markets. And why people care about the HBO hack.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we following up on some of the stories we've been tracking: the latest on Operation #LeakTheAnalyst, firmware spyware in down-market phones, Sweden's big breach, and Ukraine's new cyber friends. BrickerBot is back, offering Indian routers and modems unwelcome help. The US Senate considers IoT security legislation, and the US Justice Department issues a framework with guidelines for bug-hunting programs. Bitcoin's hard fork occurred yesterday. Robert M. Lee from Dragos, on ICS attack basics. David Murray from Corvil on security in the financial markets. And why people care about the HBO hack.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1068</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1459c7543eabc8ef91f5d462256bdff4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2424772581.mp3?updated=1689816491" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>HBO hacked. Operation #LeakTheAnalyst targets individual security researchers. Election hacking notes. UK's Home Secretary opposes strong encryption. Russia bans VPNs. Bitcoin, crime, and punishment.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/403/notes</link>
      <description>In today's podcast, we hear about the HBO hack, and the exposure of episodes and scripts Operation #LeakTheAnalyst targets individual security researchers. Election hacking: machines, databases, and public opinion are all targets. The UK's Home Secretary wants Silicon Valley to rethink strong encryption. Russia, like China, is clamping down on virtual private networks. The BTC-e Bitcoin exchange is shut down amid allegations of money laundering. Awais Rashid from Lancaster University on developing a security culture. Michael Janke from Data Tribe on his efforts to stand up the National Institute of Digital Security. And write this 500 times: "I will not mine Bitcoin on my school computer."
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Aug 2017 18:30:54 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>403</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a6bf3b2c-def8-11ea-911f-5f6493851e0a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>HBO hacked. Operation #LeakTheAnalyst targets individual security researchers. Election hacking notes. UK's Home Secretary opposes strong encryption. Russia bans VPNs. Bitcoin, crime, and punishment.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about the HBO hack, and the exposure of episodes and scripts Operation #LeakTheAnalyst targets individual security researchers. Election hacking: machines, databases, and public opinion are all targets. The UK's Home Secretary wants Silicon Valley to rethink strong encryption. Russia, like China, is clamping down on virtual private networks. The BTC-e Bitcoin exchange is shut down amid allegations of money laundering. Awais Rashid from Lancaster University on developing a security culture. Michael Janke from Data Tribe on his efforts to stand up the National Institute of Digital Security. And write this 500 times: "I will not mine Bitcoin on my school computer."
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about the HBO hack, and the exposure of episodes and scripts Operation #LeakTheAnalyst targets individual security researchers. Election hacking: machines, databases, and public opinion are all targets. The UK's Home Secretary wants Silicon Valley to rethink strong encryption. Russia, like China, is clamping down on virtual private networks. The BTC-e Bitcoin exchange is shut down amid allegations of money laundering. Awais Rashid from Lancaster University on developing a security culture. Michael Janke from Data Tribe on his efforts to stand up the National Institute of Digital Security. And write this 500 times: "I will not mine Bitcoin on my school computer."</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1078</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e56bc421a6e7925e96ee6434cd5b3a12]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9152641672.mp3?updated=1689816478" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Black Hat 2017 - Research and Investment [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/17/notes</link>
      <description>Black Hat 2017 has wrapped up, and by all accounts it was another successful conference, with an active trade show floor, exciting keynotes and engaging, informative educational sessions on a variety of topics. There was business being done, with hopeful entrepreneurs and investors alike looking to identify the next big thing in cyber security. In this CyberWire special edition, we’ve rounded up a handful of presenters and one investor for a taste of Black Hat, to help give you a sense of the event. 
 
Patrick Wardle is Chief Security Researcher at Synack, and creator of objective-see, an online site where he publishes the personal tools he’s created to help protect Mac OS computers. He’ll be telling us about his research on the FruitFly malware recently discovered on Mac OS. 
https://objective-see.com/
 
Hyrum Anderson is technical director of data science at Endgame, he will discuss research he released on stage at Black Hat showing the pros and cons of using machine learning from both a defender and attacker perspective. 
https://www.endgame.com/our-experts/hyrum-anderson
 
Zack Allen, Manager of Threat Operations, and Chaim Sanders, Security Lead, of ZeroFOX will be speaking about their Black Hat presentation on finding regressions in web application firewall (WAF) deployments. 
https://www.linkedin.com/in/zack-allen-12749a76
https://www.linkedin.com/in/chaim-sanders-a7a23713/
 
And we’ll wrap it up with some insights from Alberto Yepez, founder and managing director of Trident Cybersecurity, on the investment environment and the changes he’s seen in the market in the last year. 
https://www.linkedin.com/in/albertoyepez/
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Aug 2017 13:35:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>17</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/93eb6dc6-df03-11ea-83fc-2f6bb3d4f25d/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Black Hat 2017 - Research and Investment</itunes:subtitle>
      <itunes:summary>Black Hat 2017 has wrapped up, and by all accounts it was another successful conference, with an active trade show floor, exciting keynotes and engaging, informative educational sessions on a variety of topics. There was business being done, with hopeful entrepreneurs and investors alike looking to identify the next big thing in cyber security. In this CyberWire special edition, we’ve rounded up a handful of presenters and one investor for a taste of Black Hat, to help give you a sense of the event. 
 
Patrick Wardle is Chief Security Researcher at Synack, and creator of objective-see, an online site where he publishes the personal tools he’s created to help protect Mac OS computers. He’ll be telling us about his research on the FruitFly malware recently discovered on Mac OS. 
https://objective-see.com/
 
Hyrum Anderson is technical director of data science at Endgame, he will discuss research he released on stage at Black Hat showing the pros and cons of using machine learning from both a defender and attacker perspective. 
https://www.endgame.com/our-experts/hyrum-anderson
 
Zack Allen, Manager of Threat Operations, and Chaim Sanders, Security Lead, of ZeroFOX will be speaking about their Black Hat presentation on finding regressions in web application firewall (WAF) deployments. 
https://www.linkedin.com/in/zack-allen-12749a76
https://www.linkedin.com/in/chaim-sanders-a7a23713/
 
And we’ll wrap it up with some insights from Alberto Yepez, founder and managing director of Trident Cybersecurity, on the investment environment and the changes he’s seen in the market in the last year. 
https://www.linkedin.com/in/albertoyepez/
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Black Hat 2017 has wrapped up, and by all accounts it was another successful conference, with an active trade show floor, exciting keynotes and engaging, informative educational sessions on a variety of topics. There was business being done, with hopeful entrepreneurs and investors alike looking to identify the next big thing in cyber security. In this CyberWire special edition, we’ve rounded up a handful of presenters and one investor for a taste of Black Hat, to help give you a sense of the event. </p><p> </p><p>Patrick Wardle is Chief Security Researcher at Synack, and creator of objective-see, an online site where he publishes the personal tools he’s created to help protect Mac OS computers. He’ll be telling us about his research on the FruitFly malware recently discovered on Mac OS. </p><p>https://objective-see.com/</p><p> </p><p>Hyrum Anderson is technical director of data science at Endgame, he will discuss research he released on stage at Black Hat showing the pros and cons of using machine learning from both a defender and attacker perspective. </p><p>https://www.endgame.com/our-experts/hyrum-anderson</p><p> </p><p>Zack Allen, Manager of Threat Operations, and Chaim Sanders, Security Lead, of ZeroFOX will be speaking about their Black Hat presentation on finding regressions in web application firewall (WAF) deployments. </p><p><a href="https://www.linkedin.com/in/zack-allen-12749a76">https://www.linkedin.com/in/zack-allen-12749a76</a></p><p>https://www.linkedin.com/in/chaim-sanders-a7a23713/</p><p> </p><p>And we’ll wrap it up with some insights from Alberto Yepez, founder and managing director of Trident Cybersecurity, on the investment environment and the changes he’s seen in the market in the last year. </p><p>https://www.linkedin.com/in/albertoyepez/</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2501</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[658038b1df792d56e663267cb73006d2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8208633950.mp3?updated=1656708143" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Investigation into ShadowBrokers focuses on former insiders. Threat analyst doxed. Trickbot and NotPetya updates. Sweden's big breach. DPRK hacks online gaming for revenue.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/402/notes</link>
      <description>In today's podcast we hear that US investigators are looking for a disgruntled former insider in the ShadowBrokers case. Operation #HackTheAnalyst claims to have doxed a threat intelligence analyst. Electrical utilities look to their defenses. Trickbot gets wormy. NotPetya continues to have material effect on its corporate victims' earnings. Sweden's government shaken by its data breach. ISIS loses brick-and-mortar presence; may be moving online. Ransomware's lethality to small businesses may be exaggerated. And how do you fund a nuclear program? Malek Ben Salem from Accenture Labs, on their work developing a global ID system for refugees. From Pyongyang, Texas Hold 'Em looks like a good bet.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 31 Jul 2017 19:48:03 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>402</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a6d6bd74-def8-11ea-911f-c3469445960f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Investigation into ShadowBrokers focuses on former insiders. Threat analyst doxed. Trickbot and NotPetya updates. Sweden's big breach. DPRK hacks online gaming for revenue.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that US investigators are looking for a disgruntled former insider in the ShadowBrokers case. Operation #HackTheAnalyst claims to have doxed a threat intelligence analyst. Electrical utilities look to their defenses. Trickbot gets wormy. NotPetya continues to have material effect on its corporate victims' earnings. Sweden's government shaken by its data breach. ISIS loses brick-and-mortar presence; may be moving online. Ransomware's lethality to small businesses may be exaggerated. And how do you fund a nuclear program? Malek Ben Salem from Accenture Labs, on their work developing a global ID system for refugees. From Pyongyang, Texas Hold 'Em looks like a good bet.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that US investigators are looking for a disgruntled former insider in the ShadowBrokers case. Operation #HackTheAnalyst claims to have doxed a threat intelligence analyst. Electrical utilities look to their defenses. Trickbot gets wormy. NotPetya continues to have material effect on its corporate victims' earnings. Sweden's government shaken by its data breach. ISIS loses brick-and-mortar presence; may be moving online. Ransomware's lethality to small businesses may be exaggerated. And how do you fund a nuclear program? Malek Ben Salem from Accenture Labs, on their work developing a global ID system for refugees. From Pyongyang, Texas Hold 'Em looks like a good bet.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>894</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8935eaa72325216fcad3584743566261]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5260982122.mp3?updated=1689816462" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>WikiLeaks and the ShadowBrokers are both back. Catphishing the French elections. Pyongyang's Bitcoin miners. Malware notes, industry news, and a rundown of the Pwnie Awards.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/401/notes</link>
      <description>In today's podcast, we learn that WikiLeaks has dumped Vault7 documents attributed to the CIA. Russian catphish are said to have nibbled at French President Macron's campaign. North Korea mines Bitcoin. Malware warnings include a banking Trojan and two malicious Android apps. NotPetya's effect on TNT is said to have hit small businesses hard. MedSec has no regrets, and says it would short St. Jude again. The Pwnie Awards have been given at Black Hat. Justin Harvey from Accenture on recent waves of auto-propagating malware. Edna Conway from Cisco on third party risks. And the ShadowBrokers are back.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 28 Jul 2017 19:09:20 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>401</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a70df6fe-def8-11ea-911f-13b1a8e8dfa7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>WikiLeaks and the ShadowBrokers are both back. Catphishing the French elections. Pyongyang's Bitcoin miners. Malware notes, industry news, and a rundown of the Pwnie Awards.</itunes:subtitle>
      <itunes:summary>In today's podcast, we learn that WikiLeaks has dumped Vault7 documents attributed to the CIA. Russian catphish are said to have nibbled at French President Macron's campaign. North Korea mines Bitcoin. Malware warnings include a banking Trojan and two malicious Android apps. NotPetya's effect on TNT is said to have hit small businesses hard. MedSec has no regrets, and says it would short St. Jude again. The Pwnie Awards have been given at Black Hat. Justin Harvey from Accenture on recent waves of auto-propagating malware. Edna Conway from Cisco on third party risks. And the ShadowBrokers are back.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we learn that WikiLeaks has dumped Vault7 documents attributed to the CIA. Russian catphish are said to have nibbled at French President Macron's campaign. North Korea mines Bitcoin. Malware warnings include a banking Trojan and two malicious Android apps. NotPetya's effect on TNT is said to have hit small businesses hard. MedSec has no regrets, and says it would short St. Jude again. The Pwnie Awards have been given at Black Hat. Justin Harvey from Accenture on recent waves of auto-propagating malware. Edna Conway from Cisco on third party risks. And the ShadowBrokers are back.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1373</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8187995702acbf7f611264e0188ac9ed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1973478716.mp3?updated=1608753525" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>"Mia Ash" is an Iranian catphish. WikiLeaks dumps UMBRAGE from Vault7. Germany braces for hacking by Russia, China, and Iran. Google kicks unwelcome intercept tool Lipizzan out of the PlayStore. WhatsApp scammers phish for banking credentials. Anti-drone </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/400/notes</link>
      <description>In today's podcast we hear there's a new catphish out in the wild: meet Mia Ash. WikiLeaks throws shade by dumping UMBRAGE from Vault7. Germany braces for hacking by Russia, China, and Iran—especially by Russia. Google kicks unwelcome intercept tool Lipizzan out of the PlayStore. WhatsApp scammers phish for banking credentials. Business disruption kills small businesses in ransomware attacks, not the ransom itself. Facebook makes a plea for culture change. Ben Yelin from UMD CHHS on allegations the FBI was paying the Geek Squad to ferret out illegal content on computers brought in for service. Neill Feather from SiteLock dispells the notion that small businesses can rely on security by obscurity. And there are enough anti-drone products out there to make Wyle E. Coyote max out his Acme loyalty card.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 27 Jul 2017 19:28:22 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>400</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a726e268-def8-11ea-911f-b71afc168838/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>"Mia Ash" is an Iranian catphish. WikiLeaks dumps UMBRAGE from Vault7. Germany braces for hacking by Russia, China, and Iran. Google kicks unwelcome intercept tool Lipizzan out of the PlayStore. WhatsApp scammers phish for banking credentials. Anti-drone </itunes:subtitle>
      <itunes:summary>In today's podcast we hear there's a new catphish out in the wild: meet Mia Ash. WikiLeaks throws shade by dumping UMBRAGE from Vault7. Germany braces for hacking by Russia, China, and Iran—especially by Russia. Google kicks unwelcome intercept tool Lipizzan out of the PlayStore. WhatsApp scammers phish for banking credentials. Business disruption kills small businesses in ransomware attacks, not the ransom itself. Facebook makes a plea for culture change. Ben Yelin from UMD CHHS on allegations the FBI was paying the Geek Squad to ferret out illegal content on computers brought in for service. Neill Feather from SiteLock dispells the notion that small businesses can rely on security by obscurity. And there are enough anti-drone products out there to make Wyle E. Coyote max out his Acme loyalty card.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear there's a new catphish out in the wild: meet Mia Ash. WikiLeaks throws shade by dumping UMBRAGE from Vault7. Germany braces for hacking by Russia, China, and Iran—especially by Russia. Google kicks unwelcome intercept tool Lipizzan out of the PlayStore. WhatsApp scammers phish for banking credentials. Business disruption kills small businesses in ransomware attacks, not the ransom itself. Facebook makes a plea for culture change. Ben Yelin from UMD CHHS on allegations the FBI was paying the Geek Squad to ferret out illegal content on computers brought in for service. Neill Feather from SiteLock dispells the notion that small businesses can rely on security by obscurity. And there are enough anti-drone products out there to make Wyle E. Coyote max out his Acme loyalty card.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1056</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[54400495601ce3e8a3fa3b0ae3ee4d7d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3591072213.mp3?updated=1689816432" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Counterattackers' advantage? Juche no competition for cat videos, next-day delivery. CopyKitten crude but effective. FBI investigated Fruitfly Mac malware. Adobe will retire Flash in 2020. BSides notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/399/notes</link>
      <description>In today's podcast we hear about a Symantec study that shows APTs use some pretty buggy tools. Juche may not extend to the Internet, at least for Pyongyang's leaders. Iran's CopyKitten is characterized as unsophisticated but nonetheless effective. Mac users awakened by Fruitfly—the FBI is investigating. Adobe tells us to begin saying our goodbyes to Flash. Jonathan Katz from UMD on recent experiments with quantum cryptography. Stewart Kantor from Full Spectrum on protecting utility companies by using private RF (radio frequency) networks. And some notes from Vegas, because what goes on in Vegas doesn't stay there.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 26 Jul 2017 19:32:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>399</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a73f7f44-def8-11ea-911f-63928fd21124/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Counterattackers' advantage? Juche no competition for cat videos, next-day delivery. CopyKitten crude but effective. FBI investigated Fruitfly Mac malware. Adobe will retire Flash in 2020. BSides notes.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about a Symantec study that shows APTs use some pretty buggy tools. Juche may not extend to the Internet, at least for Pyongyang's leaders. Iran's CopyKitten is characterized as unsophisticated but nonetheless effective. Mac users awakened by Fruitfly—the FBI is investigating. Adobe tells us to begin saying our goodbyes to Flash. Jonathan Katz from UMD on recent experiments with quantum cryptography. Stewart Kantor from Full Spectrum on protecting utility companies by using private RF (radio frequency) networks. And some notes from Vegas, because what goes on in Vegas doesn't stay there.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about a Symantec study that shows APTs use some pretty buggy tools. Juche may not extend to the Internet, at least for Pyongyang's leaders. Iran's CopyKitten is characterized as unsophisticated but nonetheless effective. Mac users awakened by Fruitfly—the FBI is investigating. Adobe tells us to begin saying our goodbyes to Flash. Jonathan Katz from UMD on recent experiments with quantum cryptography. Stewart Kantor from Full Spectrum on protecting utility companies by using private RF (radio frequency) networks. And some notes from Vegas, because what goes on in Vegas doesn't stay there.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>979</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ebeeca549794272b1f1f44879d7dbd06]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4797797374.mp3?updated=1689816420" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Google Groups oversharing. E-discovery don'ts. Energetic Bear may be back. The CopyKittens seem to be Persian cats. Ethereum hacks (and white hats).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/398/notes</link>
      <description>In today's podcast, we hear that hundreds of enterprises may be oversharing on Google Groups. Wells Fargo works to recover from botched e-discovery. Energetic Bear may be back, with some cunning phishbait. Pravda says Russians feel strange new respect in cyberspace. The CopyKittens appear to be Persian cats. Another Ethereum ICO is pilfered, but, contrary to expectations, the White Hat Group looks like a genuine group of white hats. Emily Wilson from Terbium Labs wonder what qualifies at personal information on the Dark Web. FICO's Doug Clare outlines scoring your cyber security posture. And some notes from Vegas.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Jul 2017 19:34:39 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>398</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a76374d0-def8-11ea-911f-8bb0536eaa9e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Google Groups oversharing. E-discovery don'ts. Energetic Bear may be back. The CopyKittens seem to be Persian cats. Ethereum hacks (and white hats).</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that hundreds of enterprises may be oversharing on Google Groups. Wells Fargo works to recover from botched e-discovery. Energetic Bear may be back, with some cunning phishbait. Pravda says Russians feel strange new respect in cyberspace. The CopyKittens appear to be Persian cats. Another Ethereum ICO is pilfered, but, contrary to expectations, the White Hat Group looks like a genuine group of white hats. Emily Wilson from Terbium Labs wonder what qualifies at personal information on the Dark Web. FICO's Doug Clare outlines scoring your cyber security posture. And some notes from Vegas.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that hundreds of enterprises may be oversharing on Google Groups. Wells Fargo works to recover from botched e-discovery. Energetic Bear may be back, with some cunning phishbait. Pravda says Russians feel strange new respect in cyberspace. The CopyKittens appear to be Persian cats. Another Ethereum ICO is pilfered, but, contrary to expectations, the White Hat Group looks like a genuine group of white hats. Emily Wilson from Terbium Labs wonder what qualifies at personal information on the Dark Web. FICO's Doug Clare outlines scoring your cyber security posture. And some notes from Vegas.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1065</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[be6a9b7a60fe7be931c5f9d0f9283bd8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3667303875.mp3?updated=1689816408" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Buckets leak, but so do CDs. NotPetya and Sandworm. Fruitfly versus Macs. ISIS strained in cyberspace. A look at dark web souks. Hacked fish tank.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/397/notes</link>
      <description>In today's podcast, we hear about the wisdom of attending to your AWS Access Control Lists. Wells Fargo data leaked in the course of e-discovery. NotPetya fallout and investigation. The Islamic State's presence in cyberspace is getting a bit threadbare. Fruitfly has been buzzing through Macs, quietly, for a decade. Palo Alto Networks' Rick Howard describes a new security framework. Other dark web souks are poised to take the place of Alpha Bay and Hansa Market. And Ocean's 11 meet the IoT.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 24 Jul 2017 19:56:28 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>397</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a77af952-def8-11ea-911f-73f63165cb6b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Buckets leak, but so do CDs. NotPetya and Sandworm. Fruitfly versus Macs. ISIS strained in cyberspace. A look at dark web souks. Hacked fish tank.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about the wisdom of attending to your AWS Access Control Lists. Wells Fargo data leaked in the course of e-discovery. NotPetya fallout and investigation. The Islamic State's presence in cyberspace is getting a bit threadbare. Fruitfly has been buzzing through Macs, quietly, for a decade. Palo Alto Networks' Rick Howard describes a new security framework. Other dark web souks are poised to take the place of Alpha Bay and Hansa Market. And Ocean's 11 meet the IoT.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about the wisdom of attending to your AWS Access Control Lists. Wells Fargo data leaked in the course of e-discovery. NotPetya fallout and investigation. The Islamic State's presence in cyberspace is getting a bit threadbare. Fruitfly has been buzzing through Macs, quietly, for a decade. Palo Alto Networks' Rick Howard describes a new security framework. Other dark web souks are poised to take the place of Alpha Bay and Hansa Market. And Ocean's 11 meet the IoT.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>975</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4dfd03228c21188d600d4e4a879139de]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2126734398.mp3?updated=1689816396" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hansa Market takedown. Recovery from EternalBlue exploits is a long slog. Banking malware rising. Power grid vulnerabilities. Devil's Ivy and the IoT. A look at criminal markets.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/396/notes</link>
      <description>In today's podcast we hear about an international raid that took down the illicit Hansa Market—which, it turns out, the Dutch National Police had covertly taken over for about a week. Recovery from WannaCry and NotPetya continues its long slog. Banking malware is on the rise in the wild. Studies warn of power grid vulnerabilities. Devil's Ivy infests security cameras in the IoT. Digital Shadows offers a look at hackers' black markets and see similarities to the drug trade. Our newest partner Robert M. Lee from Dragos introduces himself and the ICS work he does. Guests are Leslie P. Francis and John G. Francis, coauthors of the book, “Privacy - What Everyone Needs to Know.”And our congratulations to Dr. Whitfielf Diffie, the newest Fellow of the Royal Society.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 21 Jul 2017 18:51:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>396</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a7940e1a-def8-11ea-911f-33640a1321a6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hansa Market takedown. Recovery from EternalBlue exploits is a long slog. Banking malware rising. Power grid vulnerabilities. Devil's Ivy and the IoT. A look at criminal markets.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about an international raid that took down the illicit Hansa Market—which, it turns out, the Dutch National Police had covertly taken over for about a week. Recovery from WannaCry and NotPetya continues its long slog. Banking malware is on the rise in the wild. Studies warn of power grid vulnerabilities. Devil's Ivy infests security cameras in the IoT. Digital Shadows offers a look at hackers' black markets and see similarities to the drug trade. Our newest partner Robert M. Lee from Dragos introduces himself and the ICS work he does. Guests are Leslie P. Francis and John G. Francis, coauthors of the book, “Privacy - What Everyone Needs to Know.”And our congratulations to Dr. Whitfielf Diffie, the newest Fellow of the Royal Society.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about an international raid that took down the illicit Hansa Market—which, it turns out, the Dutch National Police had covertly taken over for about a week. Recovery from WannaCry and NotPetya continues its long slog. Banking malware is on the rise in the wild. Studies warn of power grid vulnerabilities. Devil's Ivy infests security cameras in the IoT. Digital Shadows offers a look at hackers' black markets and see similarities to the drug trade. Our newest partner Robert M. Lee from Dragos introduces himself and the ICS work he does. Guests are Leslie P. Francis and John G. Francis, coauthors of the book, “Privacy - What Everyone Needs to Know.”And our congratulations to Dr. Whitfielf Diffie, the newest Fellow of the Royal Society.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1381</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[78d4dd6fee8c340bb20a38d0e3e16611]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6894510225.mp3?updated=1608753463" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Configuring AWS buckets. New threats and vulnerabilities.  Apple and Oracle patch.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/395/notes</link>
      <description>In today's podcast, we discuss a reminder from Amazon Web Services is timely: check your cloud's configuration. Hacks now seem to affect revenue for years. A rundown of some new threats and vulnerabilities. Apple issues security patches for iOS, MacOS, and Safari. Oracle fixes more than 300 bugs. Dale Drew from Level 3 Communications on the responsibilities of ISPs. Chris Ensey from Dunbar Cyber Security, on the roles states play in creating an environment for innovation and success in cyber security. And forget Mayweather-Macgregor—the pay per view we'd sign up for is Putin-Wittes.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 20 Jul 2017 19:53:06 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>395</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a7b7506e-def8-11ea-911f-075b7500a8e1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Configuring AWS buckets. New threats and vulnerabilities. Apple and Oracle patch.</itunes:subtitle>
      <itunes:summary>In today's podcast, we discuss a reminder from Amazon Web Services is timely: check your cloud's configuration. Hacks now seem to affect revenue for years. A rundown of some new threats and vulnerabilities. Apple issues security patches for iOS, MacOS, and Safari. Oracle fixes more than 300 bugs. Dale Drew from Level 3 Communications on the responsibilities of ISPs. Chris Ensey from Dunbar Cyber Security, on the roles states play in creating an environment for innovation and success in cyber security. And forget Mayweather-Macgregor—the pay per view we'd sign up for is Putin-Wittes.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we discuss a reminder from Amazon Web Services is timely: check your cloud's configuration. Hacks now seem to affect revenue for years. A rundown of some new threats and vulnerabilities. Apple issues security patches for iOS, MacOS, and Safari. Oracle fixes more than 300 bugs. Dale Drew from Level 3 Communications on the responsibilities of ISPs. Chris Ensey from Dunbar Cyber Security, on the roles states play in creating an environment for innovation and success in cyber security. And forget Mayweather-Macgregor—the pay per view we'd sign up for is Putin-Wittes.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1030</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5822c6a518254d24887e98dce49ec8d9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3545565275.mp3?updated=1689816369" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dow Jones AWS S3 bucket exposed. FedEx 10-K and NotPetya. Game of Thrones torrent virus. Securing voting. Botnet defense research. M&amp;A and VC notes. Initial coin offering hacked.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/394/notes</link>
      <description>In today's podcast, we hear about how another tippy AWS S3 bucket spills its contents over the Web. The FedEx 10-K report indicates it may never fully recover systems and data hit by NotPetya. Virus hides in Game of Thrones torrent. Harvard's Belfer Center wants to secure electronic voting. Departments of Commerce and Homeland Security consider moonshot research to take out botnets. M&amp;A and venture funding notes. Justin Harvey from Accenture on fileless malware. Robert Hamilton from Imperva Incapsula on DDoS attacks on video game servers. And an initial coin offering gets hacked.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 19 Jul 2017 20:08:45 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>394</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a7d1b634-def8-11ea-911f-b7a161acecbe/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dow Jones AWS S3 bucket exposed. FedEx 10-K and NotPetya. Game of Thrones torrent virus. Securing voting. Botnet defense research. M&amp;A and VC notes. Initial coin offering hacked.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how another tippy AWS S3 bucket spills its contents over the Web. The FedEx 10-K report indicates it may never fully recover systems and data hit by NotPetya. Virus hides in Game of Thrones torrent. Harvard's Belfer Center wants to secure electronic voting. Departments of Commerce and Homeland Security consider moonshot research to take out botnets. M&amp;A and venture funding notes. Justin Harvey from Accenture on fileless malware. Robert Hamilton from Imperva Incapsula on DDoS attacks on video game servers. And an initial coin offering gets hacked.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how another tippy AWS S3 bucket spills its contents over the Web. The FedEx 10-K report indicates it may never fully recover systems and data hit by NotPetya. Virus hides in Game of Thrones torrent. Harvard's Belfer Center wants to secure electronic voting. Departments of Commerce and Homeland Security consider moonshot research to take out botnets. M&amp;A and venture funding notes. Justin Harvey from Accenture on fileless malware. Robert Hamilton from Imperva Incapsula on DDoS attacks on video game servers. And an initial coin offering gets hacked.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1018</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[20ae0b5f315455be96a3767e942d1238]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2479658565.mp3?updated=1689816359" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Qatar and the United Arab Emirates at loggerheads over hacking. Commonly used gSOAP IoT code vulnerable to exploitation. A data exposure risk in connected toys. And what could be in that EULA.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/393/notes</link>
      <description>In today's podcast we hear more on how Qatar has accused the UAE of hacking, and vows legal retribution—all on the strength of a Washington Post story. UAE says it didn't do it. Warnings about vulnerabilities in commonly used IoT code. Markus Rauschecker from UMD CHHS on Facebook running afoul of European privacy laws. Tina Ladabouche, NSA GenCyber Program Manager, on the NSA’s GenCyber program, supporting summer camp programs. FBI warns of risks inherent in Internet-connected toys. And people really, really don't read those EULAs.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Jul 2017 19:54:38 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>393</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a7e89340-def8-11ea-911f-0bea7a83f2ad/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Qatar and the United Arab Emirates at loggerheads over hacking. Commonly used gSOAP IoT code vulnerable to exploitation. A data exposure risk in connected toys. And what could be in that EULA.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear more on how Qatar has accused the UAE of hacking, and vows legal retribution—all on the strength of a Washington Post story. UAE says it didn't do it. Warnings about vulnerabilities in commonly used IoT code. Markus Rauschecker from UMD CHHS on Facebook running afoul of European privacy laws. Tina Ladabouche, NSA GenCyber Program Manager, on the NSA’s GenCyber program, supporting summer camp programs. FBI warns of risks inherent in Internet-connected toys. And people really, really don't read those EULAs.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear more on how Qatar has accused the UAE of hacking, and vows legal retribution—all on the strength of a Washington Post story. UAE says it didn't do it. Warnings about vulnerabilities in commonly used IoT code. Markus Rauschecker from UMD CHHS on Facebook running afoul of European privacy laws. Tina Ladabouche, NSA GenCyber Program Manager, on the NSA’s GenCyber program, supporting summer camp programs. FBI warns of risks inherent in Internet-connected toys. And people really, really don't read those EULAs.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1015</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c40d21fd4bc7677c4f87addbb9522ced]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6274250762.mp3?updated=1689816341" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Qatar accuses UAE of disinformation, hacking campaign. Other international cyberconflict. Ransomware and clickfraud in one campaign. Banking credential-stealing malware vs. Macs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/392/notes</link>
      <description>In today's podcast we hear that Qatar has accused the United Arab Emirates of a hacking and disinformation campaign—the UAE deny it. Russia's Foreign Ministry says it was hacked. Russia-experts in the US said to be receiving unwelcome attention from possible state intelligence services. Deterrence and confidence building measures remain works in progress in cyberspace. Ransomware and click-fraud combined in a single criminal campaign. Macs attacked by banking credential stealing malware. Johns Hopkins' Joe Carrigan reviews educational options for aspiring cyber security pros. Twitter bots driving traffic to dodgy adult sites. And Ashley Madison proposes a settlement for its 2015 breach.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 17 Jul 2017 19:47:54 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>392</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a802fe06-def8-11ea-911f-739626a7f850/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Qatar accuses UAE of disinformation, hacking campaign. Other international cyberconflict. Ransomware and clickfraud in one campaign. Banking credential-stealing malware vs. Macs.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Qatar has accused the United Arab Emirates of a hacking and disinformation campaign—the UAE deny it. Russia's Foreign Ministry says it was hacked. Russia-experts in the US said to be receiving unwelcome attention from possible state intelligence services. Deterrence and confidence building measures remain works in progress in cyberspace. Ransomware and click-fraud combined in a single criminal campaign. Macs attacked by banking credential stealing malware. Johns Hopkins' Joe Carrigan reviews educational options for aspiring cyber security pros. Twitter bots driving traffic to dodgy adult sites. And Ashley Madison proposes a settlement for its 2015 breach.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Qatar has accused the United Arab Emirates of a hacking and disinformation campaign—the UAE deny it. Russia's Foreign Ministry says it was hacked. Russia-experts in the US said to be receiving unwelcome attention from possible state intelligence services. Deterrence and confidence building measures remain works in progress in cyberspace. Ransomware and click-fraud combined in a single criminal campaign. Macs attacked by banking credential stealing malware. Johns Hopkins' Joe Carrigan reviews educational options for aspiring cyber security pros. Twitter bots driving traffic to dodgy adult sites. And Ashley Madison proposes a settlement for its 2015 breach.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>883</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[02be401e022b0bc44a926bad8408955f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3223732125.mp3?updated=1689816328" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More from WikiLeaks' Vault7. Cyber ops and national policy. NotPetya's costs. Clouds of misconfiguration. Chasing innovation. AlphaBay takedown. Phishbait.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/391/notes</link>
      <description>In today's podcast, we hear that WikiLeaks dumps another alleged CIA cyber manual from Vault7. Cyberwar is the continuation of war (and therefore policy) by other means. Counting the cost of NotPetya. AWS S3 misconfigurations could happen to the best of us (but need not). Chasing innovation in the UK and the US. AlphaBay taken down in international police operation. Rick Howard from Palo Alto Networks on their new initiative with the Girl Scouts for cyber security merit badges. Raj Samani, chief scientist from McAfee, on NotPetya. And what kind of bait is best for phishing?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 14 Jul 2017 17:10:58 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>391</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a8249d90-def8-11ea-911f-eb1b8d9528be/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>More from WikiLeaks' Vault7. Cyber ops and national policy. NotPetya's costs. Clouds of misconfiguration. Chasing innovation. AlphaBay takedown. Phishbait.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that WikiLeaks dumps another alleged CIA cyber manual from Vault7. Cyberwar is the continuation of war (and therefore policy) by other means. Counting the cost of NotPetya. AWS S3 misconfigurations could happen to the best of us (but need not). Chasing innovation in the UK and the US. AlphaBay taken down in international police operation. Rick Howard from Palo Alto Networks on their new initiative with the Girl Scouts for cyber security merit badges. Raj Samani, chief scientist from McAfee, on NotPetya. And what kind of bait is best for phishing?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that WikiLeaks dumps another alleged CIA cyber manual from Vault7. Cyberwar is the continuation of war (and therefore policy) by other means. Counting the cost of NotPetya. AWS S3 misconfigurations could happen to the best of us (but need not). Chasing innovation in the UK and the US. AlphaBay taken down in international police operation. Rick Howard from Palo Alto Networks on their new initiative with the Girl Scouts for cyber security merit badges. Raj Samani, chief scientist from McAfee, on NotPetya. And what kind of bait is best for phishing?</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1384</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2d348d0a9f11c7991cafeccdc51c21c9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7075762515.mp3?updated=1608753368" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Motives behind NotPetya, other operations. Verizon customer data exposed. Industry notes. Licensing hackers in Singapore.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/390/notes</link>
      <description>In today's podcast, we hear about signs that NotPetya was covering up a broad espionage campaign. State-sponsored hacking seems, when not simple spying, to aim at eroding trust. Verizon suffers a major customer data breach said to derive from a vendor's misconfiguration of an Amazon S3 bucket. Industry notes—venture funding and an acquisition. David Dufour from Webroot on homoglyph attacks. Thomas Jones from Bay Dynamics on federal agencies being required to submit a Framework Implementation Action Plan. Singapore will license white hats. And Russia wants you properly signed into adult sites. Or, at least, one of them, anyway.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 13 Jul 2017 19:47:08 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>390</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a8397c9c-def8-11ea-911f-6b7099f5bd3d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Motives behind NotPetya, other operations. Verizon customer data exposed. Industry notes. Licensing hackers in Singapore.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about signs that NotPetya was covering up a broad espionage campaign. State-sponsored hacking seems, when not simple spying, to aim at eroding trust. Verizon suffers a major customer data breach said to derive from a vendor's misconfiguration of an Amazon S3 bucket. Industry notes—venture funding and an acquisition. David Dufour from Webroot on homoglyph attacks. Thomas Jones from Bay Dynamics on federal agencies being required to submit a Framework Implementation Action Plan. Singapore will license white hats. And Russia wants you properly signed into adult sites. Or, at least, one of them, anyway.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about signs that NotPetya was covering up a broad espionage campaign. State-sponsored hacking seems, when not simple spying, to aim at eroding trust. Verizon suffers a major customer data breach said to derive from a vendor's misconfiguration of an Amazon S3 bucket. Industry notes—venture funding and an acquisition. David Dufour from Webroot on homoglyph attacks. Thomas Jones from Bay Dynamics on federal agencies being required to submit a Framework Implementation Action Plan. Singapore will license white hats. And Russia wants you properly signed into adult sites. Or, at least, one of them, anyway.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1003</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[440c7c9283f10772065ccd1d3d9691f4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8586477052.mp3?updated=1689816250" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patch Tuesday. Infrastructure hacking and hackers. Industry notes. Influence operations. Jamming a radio station.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/389/notes</link>
      <description>In today's podcast we share some Patch Tuesday notes: Microsoft and Adobe both offer updates. Kremlinology goes cyber as infrastructure attacks remain under investigation. A cyber company emerges from stealth. The US General Services Administration removes Kaspersky Lab from Schedule 70. Election influence investigations turn to the question of Russian opposition research. Jonathan Katz from the University of Maryland explains a side-channel attack on 1024-bit encryption. Cisco's Jennie Kay wants to ease your trade show anxiety with a helpful webinar. And, Sheriff of Nottingham, call your office, because Robin Hood was no winker.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 12 Jul 2017 19:13:11 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>389</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a84ea6ee-def8-11ea-911f-3fae399d8c4d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Patch Tuesday. Infrastructure hacking and hackers. Industry notes. Influence operations. Jamming a radio station.</itunes:subtitle>
      <itunes:summary>In today's podcast we share some Patch Tuesday notes: Microsoft and Adobe both offer updates. Kremlinology goes cyber as infrastructure attacks remain under investigation. A cyber company emerges from stealth. The US General Services Administration removes Kaspersky Lab from Schedule 70. Election influence investigations turn to the question of Russian opposition research. Jonathan Katz from the University of Maryland explains a side-channel attack on 1024-bit encryption. Cisco's Jennie Kay wants to ease your trade show anxiety with a helpful webinar. And, Sheriff of Nottingham, call your office, because Robin Hood was no winker.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we share some Patch Tuesday notes: Microsoft and Adobe both offer updates. Kremlinology goes cyber as infrastructure attacks remain under investigation. A cyber company emerges from stealth. The US General Services Administration removes Kaspersky Lab from Schedule 70. Election influence investigations turn to the question of Russian opposition research. Jonathan Katz from the University of Maryland explains a side-channel attack on 1024-bit encryption. Cisco's Jennie Kay wants to ease your trade show anxiety with a helpful webinar. And, Sheriff of Nottingham, call your office, because Robin Hood was no winker.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1182</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fa1fa83ee9de65a4e40311e701125548]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2140768929.mp3?updated=1689816222" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russia's phishing for nuclear power plants. NATO offers aid to Ukraine. Election hacking updates. M&amp;A and venture news. Crime, punishment, and cryptocurrency.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/388/notes</link>
      <description>In today's podcast we hear about how Russia has apparently been phishing in the North American and European power grid. NATO has had about enough of that. There will be no US-Russian joint cybersecurity effort. The Adwin RAT is back, and seeking to socially engineer its way into aerospace company networks. Election hacking investigation updates. Industry notes, including both venture and M&amp;A news. Level 3 Communications' Dale Drew provides an update on botnets. Ntrepid's Lance Cottrell describes online ad tracking technology. And BYOD can pose a threat, especially when the device your rogue employees are bringing is an off-the-books server.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Jul 2017 17:22:37 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>388</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a8634a68-def8-11ea-911f-274753170ad5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Russia's phishing for nuclear power plants. NATO offers aid to Ukraine. Election hacking updates. M&amp;A and venture news. Crime, punishment, and cryptocurrency.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about how Russia has apparently been phishing in the North American and European power grid. NATO has had about enough of that. There will be no US-Russian joint cybersecurity effort. The Adwin RAT is back, and seeking to socially engineer its way into aerospace company networks. Election hacking investigation updates. Industry notes, including both venture and M&amp;A news. Level 3 Communications' Dale Drew provides an update on botnets. Ntrepid's Lance Cottrell describes online ad tracking technology. And BYOD can pose a threat, especially when the device your rogue employees are bringing is an off-the-books server.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about how Russia has apparently been phishing in the North American and European power grid. NATO has had about enough of that. There will be no US-Russian joint cybersecurity effort. The Adwin RAT is back, and seeking to socially engineer its way into aerospace company networks. Election hacking investigation updates. Industry notes, including both venture and M&amp;A news. Level 3 Communications' Dale Drew provides an update on botnets. Ntrepid's Lance Cottrell describes online ad tracking technology. And BYOD can pose a threat, especially when the device your rogue employees are bringing is an off-the-books server.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1306</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4579f2d3a177a4ac62322c505df9854c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4674705587.mp3?updated=1689816237" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Infrastructure hacking. No Russo-American agreement in cyberspace. Android malware infestations. Misspelling as OPSEC</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/387/notes</link>
      <description>In today's podcast we discuss some answers to two Russian claims. No, Russia and America won't be linking up in a cyber alliance. And no, no one at the G20 meetings actually bought the line about election hacking retailed there by President Putin and Foreign Minister Lavrov. NotPetya recovery continues. Android infestations in the wild. US power plants warned to be alert for cyberattack. Criminals compromise self-service food kiosks; others phish with official-looking Australian emails as bait. Ben Yelin from UMD CHHS reviews license plate reader laws. ISIS adopts misspelling as a form of OPSEC.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 10 Jul 2017 19:57:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>387</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a87906b4-def8-11ea-911f-8769bf34b688/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Infrastructure hacking. No Russo-American agreement in cyberspace. Android malware infestations. Misspelling as OPSEC</itunes:subtitle>
      <itunes:summary>In today's podcast we discuss some answers to two Russian claims. No, Russia and America won't be linking up in a cyber alliance. And no, no one at the G20 meetings actually bought the line about election hacking retailed there by President Putin and Foreign Minister Lavrov. NotPetya recovery continues. Android infestations in the wild. US power plants warned to be alert for cyberattack. Criminals compromise self-service food kiosks; others phish with official-looking Australian emails as bait. Ben Yelin from UMD CHHS reviews license plate reader laws. ISIS adopts misspelling as a form of OPSEC.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we discuss some answers to two Russian claims. No, Russia and America won't be linking up in a cyber alliance. And no, no one at the G20 meetings actually bought the line about election hacking retailed there by President Putin and Foreign Minister Lavrov. NotPetya recovery continues. Android infestations in the wild. US power plants warned to be alert for cyberattack. Criminals compromise self-service food kiosks; others phish with official-looking Australian emails as bait. Ben Yelin from UMD CHHS reviews license plate reader laws. ISIS adopts misspelling as a form of OPSEC.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>954</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[640a3e843ff4afb7389230c920ed27ad]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7583950646.mp3?updated=1689816139" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>NotPetya still looks like an act of state; intended result or not, companies warn of possible material effect from the attack. Another S3 database found exposed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/386/notes</link>
      <description>In today's podcast, we hear that NotPetya still looks like a Russian campaign to Ukrainian authorities, and experts remain skeptical that affected data can be recovered. Companies warn that NotPetya may have a material effect on earnings. WikiLeaks dumps Gyrfalcon and BothanSpy documents from Vault7.  Johannes Ulrich from SANS and the ISC Stormcast Podcast on no SQL database security. Andy Greenberg, senior writer at WIRED, on his July 2017 issue cover story on Ukraine cyberwar. And pro wrestling fans now have something in common with registered voters, data.gov.uk, and the National Geospatial Agency.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 07 Jul 2017 19:25:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>386</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a8a44fd6-def8-11ea-911f-2798813ce42a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>NotPetya still looks like an act of state; intended result or not, companies warn of possible material effect from the attack. Another S3 database found exposed.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that NotPetya still looks like a Russian campaign to Ukrainian authorities, and experts remain skeptical that affected data can be recovered. Companies warn that NotPetya may have a material effect on earnings. WikiLeaks dumps Gyrfalcon and BothanSpy documents from Vault7.  Johannes Ulrich from SANS and the ISC Stormcast Podcast on no SQL database security. Andy Greenberg, senior writer at WIRED, on his July 2017 issue cover story on Ukraine cyberwar. And pro wrestling fans now have something in common with registered voters, data.gov.uk, and the National Geospatial Agency.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that NotPetya still looks like a Russian campaign to Ukrainian authorities, and experts remain skeptical that affected data can be recovered. Companies warn that NotPetya may have a material effect on earnings. WikiLeaks dumps Gyrfalcon and BothanSpy documents from Vault7.  Johannes Ulrich from SANS and the ISC Stormcast Podcast on no SQL database security. Andy Greenberg, senior writer at WIRED, on his July 2017 issue cover story on Ukraine cyberwar. And pro wrestling fans now have something in common with registered voters, data.gov.uk, and the National Geospatial Agency.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1332</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[20a80dac37d0f63bfad57a76eb803d5c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3841485955.mp3?updated=1608753365" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ukraine says it blocked a second wave of NotPetya attacks. Notes on hybrid warfare and the challenges of sharing data. Will the EU get a right to repair?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/385/notes</link>
      <description>In today's podcast we hear about the Ukrainian police raid on Intellect Service and their seizure of M.E. Doc servers. Ukraine's Interior Ministry says this stopped a second wave of NotPetya. Affected companies continue to recover from the NotPetya infestation. US Cyber Command prepares to parry hybrid warfare. Spyware campaign hits Chinese-language news services. The EU considers adopting a "right to repair." Joe Carrigan from the Johns Hopkins University ponders always-on cameras.  Dan Larson from CrowdStrike on fileless attacks. Medical information-sharing runs into problems in the UK. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 06 Jul 2017 18:55:05 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>385</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a8b5342c-def8-11ea-911f-371e4d04e17e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ukraine says it blocked a second wave of NotPetya attacks. Notes on hybrid warfare and the challenges of sharing data. Will the EU get a right to repair?</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about the Ukrainian police raid on Intellect Service and their seizure of M.E. Doc servers. Ukraine's Interior Ministry says this stopped a second wave of NotPetya. Affected companies continue to recover from the NotPetya infestation. US Cyber Command prepares to parry hybrid warfare. Spyware campaign hits Chinese-language news services. The EU considers adopting a "right to repair." Joe Carrigan from the Johns Hopkins University ponders always-on cameras.  Dan Larson from CrowdStrike on fileless attacks. Medical information-sharing runs into problems in the UK. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about the Ukrainian police raid on Intellect Service and their seizure of M.E. Doc servers. Ukraine's Interior Ministry says this stopped a second wave of NotPetya. Affected companies continue to recover from the NotPetya infestation. US Cyber Command prepares to parry hybrid warfare. Spyware campaign hits Chinese-language news services. The EU considers adopting a "right to repair." Joe Carrigan from the Johns Hopkins University ponders always-on cameras.  Dan Larson from CrowdStrike on fileless attacks. Medical information-sharing runs into problems in the UK. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1002</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[23c55f382a918d3878f87e250366b08e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5932711047.mp3?updated=1689816113" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Recovering from NotPetya. State-actor seen behind wiper attack. Ukraine mulls criminal negligence charges. Documents behind US Congressional wariness of Kaspersky.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/384/notes</link>
      <description>In today's podcast, we hear how affected enterprises are restoring services after last week's NotPetya pandemic. Maersk's experience prompts some introspection in the logistics sector. Ukraine prepares to charge ME Doc's maker with criminal negligence for allowing the infection to take hold. NotPetya tied to BlackEnergy and thence to a "state actor" (NATO's not saying it's Russia, but Ukraine is). Awais Rashid from Lancaster University looks at the anatomy of recent attacks. Haiyan Song from Splunk on a recent IDC report, “Investigation or Exasperation? The State of Security Operations.” FSB certificates allegedly express links between FSB and Kaspersky.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 05 Jul 2017 19:55:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>384</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a8ce8bf2-def8-11ea-911f-879994cd7d8b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Recovering from NotPetya. State-actor seen behind wiper attack. Ukraine mulls criminal negligence charges. Documents behind US Congressional wariness of Kaspersky.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear how affected enterprises are restoring services after last week's NotPetya pandemic. Maersk's experience prompts some introspection in the logistics sector. Ukraine prepares to charge ME Doc's maker with criminal negligence for allowing the infection to take hold. NotPetya tied to BlackEnergy and thence to a "state actor" (NATO's not saying it's Russia, but Ukraine is). Awais Rashid from Lancaster University looks at the anatomy of recent attacks. Haiyan Song from Splunk on a recent IDC report, “Investigation or Exasperation? The State of Security Operations.” FSB certificates allegedly express links between FSB and Kaspersky.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear how affected enterprises are restoring services after last week's NotPetya pandemic. Maersk's experience prompts some introspection in the logistics sector. Ukraine prepares to charge ME Doc's maker with criminal negligence for allowing the infection to take hold. NotPetya tied to BlackEnergy and thence to a "state actor" (NATO's not saying it's Russia, but Ukraine is). Awais Rashid from Lancaster University looks at the anatomy of recent attacks. Haiyan Song from Splunk on a recent IDC report, “Investigation or Exasperation? The State of Security Operations.” FSB certificates allegedly express links between FSB and Kaspersky.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1064</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a5197ecb38793994ffa4b48f9b919744]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1537314171.mp3?updated=1689816098" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Recovery and attribution: Petya/Nyetya/NotPetya. Cyber conflict and collective defense. Online inspiration and online censorship. The EU's regulatory big stick. Vishing Parliament.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/383/notes</link>
      <description>In today's podcast, we hear that recovery from Petya/Nyetya/NotPetya proceeds—and it's not ransomware. Ukraine says Russia's responsible. US warnings of cyberattacks on nuclear power plants may have been premature. NATO members consider when to invoke Article 5 in cyberspace. Islamist inspiration and other political discontents continue to prompt content screening in Europe. Europe is also in punitive mood with respect to regulation. Kaspersky says it will show the US its source code if that's the cost of doing business. Markus Rauschecker from UMD CHHS describes a novel use of kidnapping insurance. And, hey, Lords and Commons: that's not really Windows support asking for your password.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 03 Jul 2017 18:37:50 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>383</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a8e0d6f4-def8-11ea-911f-bb1a745ae0b5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Recovery and attribution: Petya/Nyetya/NotPetya. Cyber conflict and collective defense. Online inspiration and online censorship. The EU's regulatory big stick. Vishing Parliament.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that recovery from Petya/Nyetya/NotPetya proceeds—and it's not ransomware. Ukraine says Russia's responsible. US warnings of cyberattacks on nuclear power plants may have been premature. NATO members consider when to invoke Article 5 in cyberspace. Islamist inspiration and other political discontents continue to prompt content screening in Europe. Europe is also in punitive mood with respect to regulation. Kaspersky says it will show the US its source code if that's the cost of doing business. Markus Rauschecker from UMD CHHS describes a novel use of kidnapping insurance. And, hey, Lords and Commons: that's not really Windows support asking for your password.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that recovery from Petya/Nyetya/NotPetya proceeds—and it's not ransomware. Ukraine says Russia's responsible. US warnings of cyberattacks on nuclear power plants may have been premature. NATO members consider when to invoke Article 5 in cyberspace. Islamist inspiration and other political discontents continue to prompt content screening in Europe. Europe is also in punitive mood with respect to regulation. Kaspersky says it will show the US its source code if that's the cost of doing business. Markus Rauschecker from UMD CHHS describes a novel use of kidnapping insurance. And, hey, Lords and Commons: that's not really Windows support asking for your password.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>914</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c2ce3c5936badbe99797652aec50a0d3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5976312779.mp3?updated=1689816080" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>What's up with Petya/Nyetya/NotPetya? It's a wiper—the extortion is just misdirection. WikiLeaks dumps "OutlawCountry" from Vault7. The ShadowBrokers raise prices. Russia says boo to cybercrime.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/382/notes</link>
      <description>In today's podcast we hear that Petya/Nyetya/NotPetya is almost certainly a wiper, and not ransomware after all. Ukraine blames Russia, but whoever did it had EternalBlue before the ShadowBrokers leaked it. WikiLeaks Vault7 disgorges OutlawCountry, a Linux attack tool. The ShadowBrokers raise their rates. Emily Wilson from Terbium Labs with research on fraud guides on the dark web. Guests are Drew Gidwani, Director of Analytics at ThreatConnect, and Andy Pendergast, VP of Product &amp; Co-Founder at ThreatConnect, speaking about the findings of a recent SANS Survey on Security Optimization. Russia calls for international cooperation to stamp out cybercrime. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 30 Jun 2017 18:56:31 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>382</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a907a54a-def8-11ea-911f-7324a5da199d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>What's up with Petya/Nyetya/NotPetya? It's a wiper—the extortion is just misdirection. WikiLeaks dumps "OutlawCountry" from Vault7. The ShadowBrokers raise prices. Russia says boo to cybercrime.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Petya/Nyetya/NotPetya is almost certainly a wiper, and not ransomware after all. Ukraine blames Russia, but whoever did it had EternalBlue before the ShadowBrokers leaked it. WikiLeaks Vault7 disgorges OutlawCountry, a Linux attack tool. The ShadowBrokers raise their rates. Emily Wilson from Terbium Labs with research on fraud guides on the dark web. Guests are Drew Gidwani, Director of Analytics at ThreatConnect, and Andy Pendergast, VP of Product &amp; Co-Founder at ThreatConnect, speaking about the findings of a recent SANS Survey on Security Optimization. Russia calls for international cooperation to stamp out cybercrime. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Petya/Nyetya/NotPetya is almost certainly a wiper, and not ransomware after all. Ukraine blames Russia, but whoever did it had EternalBlue before the ShadowBrokers leaked it. WikiLeaks Vault7 disgorges OutlawCountry, a Linux attack tool. The ShadowBrokers raise their rates. Emily Wilson from Terbium Labs with research on fraud guides on the dark web. Guests are Drew Gidwani, Director of Analytics at ThreatConnect, and Andy Pendergast, VP of Product &amp; Co-Founder at ThreatConnect, speaking about the findings of a recent SANS Survey on Security Optimization. Russia calls for international cooperation to stamp out cybercrime. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1348</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4217c5ca9390a1418f15bdf35427742a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9754569371.mp3?updated=1608753470" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware, nyet; wiper, da. Shipping, manufacturing, and Big Law may share some common risks. WikiLeaks and the ShadowBrokers are back again.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/381/notes</link>
      <description>In today's podcast we hear that the current Petya/Nyetya/NotPetya outbreak down deep doesn't look like ransomware, but a wiper, and a nasty one at that—probably a cyber warfare campaign. How are these three things alike: shipping, manufacturing, and Big Law? The ShadowBrokers are back, and WikiLeaks' Vault7 disgorges what looks like a creepy stalking tool. Other non-Petya ransomware attacks. Rick Howard from Palo Alto Networks explains the importance of capture-the-flag competitions. And officialdom seems to cling bitterly to Windows XP.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 29 Jun 2017 19:18:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>381</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a91698ac-def8-11ea-911f-97e3fc21ba1c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ransomware, nyet; wiper, da. Shipping, manufacturing, and Big Law may share some common risks. WikiLeaks and the ShadowBrokers are back again.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that the current Petya/Nyetya/NotPetya outbreak down deep doesn't look like ransomware, but a wiper, and a nasty one at that—probably a cyber warfare campaign. How are these three things alike: shipping, manufacturing, and Big Law? The ShadowBrokers are back, and WikiLeaks' Vault7 disgorges what looks like a creepy stalking tool. Other non-Petya ransomware attacks. Rick Howard from Palo Alto Networks explains the importance of capture-the-flag competitions. And officialdom seems to cling bitterly to Windows XP.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that the current Petya/Nyetya/NotPetya outbreak down deep doesn't look like ransomware, but a wiper, and a nasty one at that—probably a cyber warfare campaign. How are these three things alike: shipping, manufacturing, and Big Law? The ShadowBrokers are back, and WikiLeaks' Vault7 disgorges what looks like a creepy stalking tool. Other non-Petya ransomware attacks. Rick Howard from Palo Alto Networks explains the importance of capture-the-flag competitions. And officialdom seems to cling bitterly to Windows XP.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>899</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b900053ca84767480b44d1e8c283e239]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3342192258.mp3?updated=1689816044" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>IoT 2017 – Securing the Things: A CyberWire Special Edition [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/16/notes</link>
      <description>The IoT, or Internet of Things, broadly defined is the collection of physical objects with IP addresses, connected to the internet. From consumer devices like security cameras, DVRs, and smart thermostats to industrial control systems and autonomous cars, the IoT offers potential for both opportunity and vulnerability. 
In the first half of this CyberWire Special Edition, we speak with IoT experts Katie Curtin, director of IoT cyber security product management for AT&amp;T, and Chris Poulin, Principal at Booz Allen Hamilton, where he leads internet of things security strategy for their strategic innovation group, as well as their industrial control group. 
They provide their take on the current state of the internet of things for consumers, enterprise, industrial control and even self-driving cars.
In the second part of our program, we examine third party risk. Ponemon Institute recently released an independent research report titled, “The Internet of Things - a New Era of Third Party Risk.” Dr. Larry Ponemon is the chairman and founder of Ponemon Institute, and he’s going to take us through some of the report’s findings, but first we’ll hear from Gary Roboff, a senior advisor at Shared Assessments and their Santa Fey group, who were the sponsors of the report.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 29 Jun 2017 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>16</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/908e94a0-df03-11ea-b3fd-7bebaadb57d0/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>IoT 2017 – Securing the Things: A CyberWire Special Edition</itunes:subtitle>
      <itunes:summary>The IoT, or Internet of Things, broadly defined is the collection of physical objects with IP addresses, connected to the internet. From consumer devices like security cameras, DVRs, and smart thermostats to industrial control systems and autonomous cars, the IoT offers potential for both opportunity and vulnerability. 
In the first half of this CyberWire Special Edition, we speak with IoT experts Katie Curtin, director of IoT cyber security product management for AT&amp;T, and Chris Poulin, Principal at Booz Allen Hamilton, where he leads internet of things security strategy for their strategic innovation group, as well as their industrial control group. 
They provide their take on the current state of the internet of things for consumers, enterprise, industrial control and even self-driving cars.
In the second part of our program, we examine third party risk. Ponemon Institute recently released an independent research report titled, “The Internet of Things - a New Era of Third Party Risk.” Dr. Larry Ponemon is the chairman and founder of Ponemon Institute, and he’s going to take us through some of the report’s findings, but first we’ll hear from Gary Roboff, a senior advisor at Shared Assessments and their Santa Fey group, who were the sponsors of the report.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The IoT, or Internet of Things, broadly defined is the collection of physical objects with IP addresses, connected to the internet. From consumer devices like security cameras, DVRs, and smart thermostats to industrial control systems and autonomous cars, the IoT offers potential for both opportunity and vulnerability. </p><p>In the first half of this CyberWire Special Edition, we speak with IoT experts Katie Curtin, director of IoT cyber security product management for AT&amp;T, and Chris Poulin, Principal at Booz Allen Hamilton, where he leads internet of things security strategy for their strategic innovation group, as well as their industrial control group. </p><p>They provide their take on the current state of the internet of things for consumers, enterprise, industrial control and even self-driving cars.</p><p>In the second part of our program, we examine third party risk. Ponemon Institute recently released an independent research report titled, “The Internet of Things - a New Era of Third Party Risk.” Dr. Larry Ponemon is the chairman and founder of Ponemon Institute, and he’s going to take us through some of the report’s findings, but first we’ll hear from Gary Roboff, a senior advisor at Shared Assessments and their Santa Fey group, who were the sponsors of the report.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2149</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b215adfa37aedd8bebd5c83da26a0e72]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6235276028.mp3?updated=1656708084" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Petya/PetrWrap/Goldeneye updates.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/380/notes</link>
      <description>Today we speak at length with Tanium's Chief Security Architect on tracking the Petya ransomware pandemic.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 28 Jun 2017 18:44:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>380</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a928c086-def8-11ea-911f-b70caa9b16e7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Petya/PetrWrap/Goldeneye updates.</itunes:subtitle>
      <itunes:summary>Today we speak at length with Tanium's Chief Security Architect on tracking the Petya ransomware pandemic.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we speak at length with Tanium's Chief Security Architect on tracking the Petya ransomware pandemic.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1072</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[09f9df38ad398e98cddf2190d70b7ceb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7494784926.mp3?updated=1689816031" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Petya goes WannaCry one better. Westminster email hack. ISIS in Maryland and Ohio websites.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/379/notes</link>
      <description>In today's podcast we hear that another ransomware pandemic has broken out—this one looks more sophisticated and dangerous than WannaCry. Ukraine is again the center, but it's moving out fast. Notes on the Parliament email hack in the UK. Accenture's Justin Harvey explains destructive malware. IBM's David Jarvis advocates an adoption of a "new collar" recruiting strategy. And ISIS isn't doing much cyber damage, but its hacktivist sympathizers are really tugging on Superman's cape.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Jun 2017 20:15:42 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>379</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a9406dbc-def8-11ea-911f-df527c47556a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Petya goes WannaCry one better. Westminster email hack. ISIS in Maryland and Ohio websites.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that another ransomware pandemic has broken out—this one looks more sophisticated and dangerous than WannaCry. Ukraine is again the center, but it's moving out fast. Notes on the Parliament email hack in the UK. Accenture's Justin Harvey explains destructive malware. IBM's David Jarvis advocates an adoption of a "new collar" recruiting strategy. And ISIS isn't doing much cyber damage, but its hacktivist sympathizers are really tugging on Superman's cape.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that another ransomware pandemic has broken out—this one looks more sophisticated and dangerous than WannaCry. Ukraine is again the center, but it's moving out fast. Notes on the Parliament email hack in the UK. Accenture's Justin Harvey explains destructive malware. IBM's David Jarvis advocates an adoption of a "new collar" recruiting strategy. And ISIS isn't doing much cyber damage, but its hacktivist sympathizers are really tugging on Superman's cape.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1086</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fe01a30ce89b8f182c40d7c9cbe9bccc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4388019836.mp3?updated=1689816019" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Brute-forcing Parliament. Election hacking retaliation? Cyberspies hunt IP in East Asia. Microsoft security issues. ISIS hacktivists deface Ohio websites. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/378/notes</link>
      <description>In today's podcast, we hear that the UK's Parliament recovers from a brute-force attack. Reports on election hacking in the US suggest there was some American cyber retaliation last year against Russian influence operations. BlackTech goes after intellectual property in East Asia. Windows Defender gets a patch, but Windows 10 source code leaks. Fireball malware's extent is disputed. ISIS hacktivists deface websites associated with the government of the State of Ohio. Webroot's David Dufour offers thoughts on phishing. And how much can we count on common sense?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 26 Jun 2017 19:38:57 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>378</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a94f4d32-def8-11ea-911f-337144f9de51/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Brute-forcing Parliament. Election hacking retaliation? Cyberspies hunt IP in East Asia. Microsoft security issues. ISIS hacktivists deface Ohio websites. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the UK's Parliament recovers from a brute-force attack. Reports on election hacking in the US suggest there was some American cyber retaliation last year against Russian influence operations. BlackTech goes after intellectual property in East Asia. Windows Defender gets a patch, but Windows 10 source code leaks. Fireball malware's extent is disputed. ISIS hacktivists deface websites associated with the government of the State of Ohio. Webroot's David Dufour offers thoughts on phishing. And how much can we count on common sense?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the UK's Parliament recovers from a brute-force attack. Reports on election hacking in the US suggest there was some American cyber retaliation last year against Russian influence operations. BlackTech goes after intellectual property in East Asia. Windows Defender gets a patch, but Windows 10 source code leaks. Fireball malware's extent is disputed. ISIS hacktivists deface websites associated with the government of the State of Ohio. Webroot's David Dufour offers thoughts on phishing. And how much can we count on common sense?</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>879</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4f1365a79f44418cf27002672f7b8ec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5539021249.mp3?updated=1689816004" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Vault7 leak: Brutal Kangaroo toolkit. Data breach and ransomware updates. Notes on code audit requirements.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/377/notes</link>
      <description>In today's podcast we hear about how Brutal Kangaroo has hopped out of Vault 7—don't let it poke your device with a thumb drive. Big data leaks wind up being traded on the black market. The dangers of careless configuration of an S3 bucket. Ransomware remains pricey. It can also serve as misdirection. Dale Drew from Level 3 Communications shares lessons from WannaCry. Darron Gibbard from Qaulys offer his take on the EU's GDPR. Software companies receive and respond to code audit requirements as a condition of doing business in Russia.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 23 Jun 2017 19:19:13 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>377</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a9635958-def8-11ea-911f-bb8382388ac5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Vault7 leak: Brutal Kangaroo toolkit. Data breach and ransomware updates. Notes on code audit requirements.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about how Brutal Kangaroo has hopped out of Vault 7—don't let it poke your device with a thumb drive. Big data leaks wind up being traded on the black market. The dangers of careless configuration of an S3 bucket. Ransomware remains pricey. It can also serve as misdirection. Dale Drew from Level 3 Communications shares lessons from WannaCry. Darron Gibbard from Qaulys offer his take on the EU's GDPR. Software companies receive and respond to code audit requirements as a condition of doing business in Russia.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about how Brutal Kangaroo has hopped out of Vault 7—don't let it poke your device with a thumb drive. Big data leaks wind up being traded on the black market. The dangers of careless configuration of an S3 bucket. Ransomware remains pricey. It can also serve as misdirection. Dale Drew from Level 3 Communications shares lessons from WannaCry. Darron Gibbard from Qaulys offer his take on the EU's GDPR. Software companies receive and respond to code audit requirements as a condition of doing business in Russia.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1300</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c1a2f40b05ee900b2c6097c912438af2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7459058474.mp3?updated=1608753352" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>WannaCry's back and the industrial IoT's got it. Business email scams hit the unwary (and most of would count as unwary). Testimony on Russian election influence operations. Grid security.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/376/notes</link>
      <description>In today's podcast we hear that WannaCry's still here—just ask Honda and the Australian state of Victoria. North America and Europe work to secure their grids against CrashOverride. The US Congress hears testimony about Russian election influence ops: they didn't change the vote, but did they ever shake people up. Business email compromise scams hook sophisticated victims. The Queen's Speech says that, whatever else Brexit may mean, it won't mean a GDPR exit. Johns Hopkins University's Joe Carrigan review the ease of listening in on RF traffic. Asaf Cidon from Barracuda Networks on the increased threat from ransomware. And what's all this about CISOs and root canals? We didn't know that was an alternative to bearing bad news to the Board.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 22 Jun 2017 19:36:50 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>376</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a976c272-def8-11ea-911f-f7b458f2d9c3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>WannaCry's back and the industrial IoT's got it. Business email scams hit the unwary (and most of would count as unwary). Testimony on Russian election influence operations. Grid security.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that WannaCry's still here—just ask Honda and the Australian state of Victoria. North America and Europe work to secure their grids against CrashOverride. The US Congress hears testimony about Russian election influence ops: they didn't change the vote, but did they ever shake people up. Business email compromise scams hook sophisticated victims. The Queen's Speech says that, whatever else Brexit may mean, it won't mean a GDPR exit. Johns Hopkins University's Joe Carrigan review the ease of listening in on RF traffic. Asaf Cidon from Barracuda Networks on the increased threat from ransomware. And what's all this about CISOs and root canals? We didn't know that was an alternative to bearing bad news to the Board.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that WannaCry's still here—just ask Honda and the Australian state of Victoria. North America and Europe work to secure their grids against CrashOverride. The US Congress hears testimony about Russian election influence ops: they didn't change the vote, but did they ever shake people up. Business email compromise scams hook sophisticated victims. The Queen's Speech says that, whatever else Brexit may mean, it won't mean a GDPR exit. Johns Hopkins University's Joe Carrigan review the ease of listening in on RF traffic. Asaf Cidon from Barracuda Networks on the increased threat from ransomware. And what's all this about CISOs and root canals? We didn't know that was an alternative to bearing bad news to the Board.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1043</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[17431e00432861b0b3a9d251b637bbbd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4484666915.mp3?updated=1689815981" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Investigation, introspection, watchdogs, and leakers. The risk of collecting and storing data. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/375/notes</link>
      <description>In today's podcast, we hear that nation-state influence operations against elections prompt investigation, introspection, and policy studies. We also hear about the implications of a major voter database exposure in the US, and about what might be done to mitigate such risks. Lancaster University's Awais Rashid shares research on security stakeholder biases. Arlen Frew from Nominum on small business vulnerabilities. Leaks from intelligence services seem to be inflicting collateral damage on Internet users as they find their way into criminal hands.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 21 Jun 2017 18:25:28 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>375</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a98b008e-def8-11ea-911f-5f95676818f4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Investigation, introspection, watchdogs, and leakers. The risk of collecting and storing data. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that nation-state influence operations against elections prompt investigation, introspection, and policy studies. We also hear about the implications of a major voter database exposure in the US, and about what might be done to mitigate such risks. Lancaster University's Awais Rashid shares research on security stakeholder biases. Arlen Frew from Nominum on small business vulnerabilities. Leaks from intelligence services seem to be inflicting collateral damage on Internet users as they find their way into criminal hands.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that nation-state influence operations against elections prompt investigation, introspection, and policy studies. We also hear about the implications of a major voter database exposure in the US, and about what might be done to mitigate such risks. Lancaster University's Awais Rashid shares research on security stakeholder biases. Arlen Frew from Nominum on small business vulnerabilities. Leaks from intelligence services seem to be inflicting collateral damage on Internet users as they find their way into criminal hands.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1031</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a0917df1ce20c92742d065ba359640a3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5192974403.mp3?updated=1689815964" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Who's behind the Android malware infestations? Mirai and Erbus updates. Industry notes. Brussels takes the pro-crypto side in the crypto wars. CrashOverride as a weapon. IG report on NSA insider threat management.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/374/notes</link>
      <description>In today's podcast, we hear that some believe they've seen the Professor Moriarity behind 2017's Android malware outbreak. Erebus is back, and this time it's in Linux. Mirai may be about to become more resistant to cleaning. Crytpo wars flare in the UK and EU as terror investigations proceed. A quick look at SINET's Innovation Summit. Raytheon's DHS cyber contract survives challenge. CrashOverride looks to a lot of experts like a proven cyber weapon. Ben Yelin from UMD CHHS discusses a "right to know" privacy law. Perspectives on attribution from John Brick of the DNG-ISAC. And did the dog eat the Fort's homework, or did some Bear feed said homework to the dog?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Jun 2017 18:46:40 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>374</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a9aa455c-def8-11ea-911f-afe02c96dbac/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Who's behind the Android malware infestations? Mirai and Erbus updates. Industry notes. Brussels takes the pro-crypto side in the crypto wars. CrashOverride as a weapon. IG report on NSA insider threat management.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that some believe they've seen the Professor Moriarity behind 2017's Android malware outbreak. Erebus is back, and this time it's in Linux. Mirai may be about to become more resistant to cleaning. Crytpo wars flare in the UK and EU as terror investigations proceed. A quick look at SINET's Innovation Summit. Raytheon's DHS cyber contract survives challenge. CrashOverride looks to a lot of experts like a proven cyber weapon. Ben Yelin from UMD CHHS discusses a "right to know" privacy law. Perspectives on attribution from John Brick of the DNG-ISAC. And did the dog eat the Fort's homework, or did some Bear feed said homework to the dog?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that some believe they've seen the Professor Moriarity behind 2017's Android malware outbreak. Erebus is back, and this time it's in Linux. Mirai may be about to become more resistant to cleaning. Crytpo wars flare in the UK and EU as terror investigations proceed. A quick look at SINET's Innovation Summit. Raytheon's DHS cyber contract survives challenge. CrashOverride looks to a lot of experts like a proven cyber weapon. Ben Yelin from UMD CHHS discusses a "right to know" privacy law. Perspectives on attribution from John Brick of the DNG-ISAC. And did the dog eat the Fort's homework, or did some Bear feed said homework to the dog?</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1003</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[22ee02659aba37d334e071054b5dfb3b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2030026926.mp3?updated=1689815949" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bouncing bad adware apps from Google Play. More on WannaCry attribution. Voter data exposed on an Amazon S3 account. Assessment of Russian influence on UK elections: they didn't do it. (Didn't need to?) Hackers sentenced.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/373/notes</link>
      <description>In today's podcast, we hear that Google is in an "uphill battle" against adware infestation of the PlayStore. GCHQ seems to agree with NSA, which seems to think WannaCry was a North Korean caper. Big data firm leaves voter data exposed on an Amazon S3 account. GCHQ says the Russians didn't disrupt the recent UK elections. Dr. Charles Clancy from VA Tech's Hume Center describes methods for preventing another Dyn-style attack. Two hackers sentenced, one in Pennsylvania, the other in East Anglia, one for the vengeance and one for the lulz.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 19 Jun 2017 17:25:17 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>373</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a9bfcf08-def8-11ea-911f-7bc1ddb0084d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Bouncing bad adware apps from Google Play. More on WannaCry attribution. Voter data exposed on an Amazon S3 account. Assessment of Russian influence on UK elections: they didn't do it. (Didn't need to?) Hackers sentenced.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Google is in an "uphill battle" against adware infestation of the PlayStore. GCHQ seems to agree with NSA, which seems to think WannaCry was a North Korean caper. Big data firm leaves voter data exposed on an Amazon S3 account. GCHQ says the Russians didn't disrupt the recent UK elections. Dr. Charles Clancy from VA Tech's Hume Center describes methods for preventing another Dyn-style attack. Two hackers sentenced, one in Pennsylvania, the other in East Anglia, one for the vengeance and one for the lulz.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Google is in an "uphill battle" against adware infestation of the PlayStore. GCHQ seems to agree with NSA, which seems to think WannaCry was a North Korean caper. Big data firm leaves voter data exposed on an Amazon S3 account. GCHQ says the Russians didn't disrupt the recent UK elections. Dr. Charles Clancy from VA Tech's Hume Center describes methods for preventing another Dyn-style attack. Two hackers sentenced, one in Pennsylvania, the other in East Anglia, one for the vengeance and one for the lulz.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>944</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9f4fb8d75f76bc33133d96211ddbc597]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2622431272.mp3?updated=1689815933" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>More from Vault7. How and why the DPRK hacks. FIN10 hits North American businesses with extortion demands. UK unis sustain ransomware infestation. Free decryptors are out, and ISACs seem to be working.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/372/notes</link>
      <description>In today's podcast, we hear that WikiLeaks has dumped more of Vault7. More attribution of WannaCry to North Korea, where Hidden Cobra and the Lazarus Group appear to be one and the same. FIN10 cybercriminals are asking US and Canadian businesses for a big payoff to head off a big doxing. Conventional ransomware hits British universities. Kasperky and Avast release free decryptors for Jaff and EncrypTile. Markus Rauschecker from UMD CHHS reviews China's new cyber laws. Jocelyn Aqua from PwC describes attitudes toward AI. The ISAC process seems to be working. And patch early, patch often.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 16 Jun 2017 18:01:56 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>372</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a9d0c61e-def8-11ea-911f-3773d8d283f2/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>More from Vault7. How and why the DPRK hacks. FIN10 hits North American businesses with extortion demands. UK unis sustain ransomware infestation. Free decryptors are out, and ISACs seem to be working.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that WikiLeaks has dumped more of Vault7. More attribution of WannaCry to North Korea, where Hidden Cobra and the Lazarus Group appear to be one and the same. FIN10 cybercriminals are asking US and Canadian businesses for a big payoff to head off a big doxing. Conventional ransomware hits British universities. Kasperky and Avast release free decryptors for Jaff and EncrypTile. Markus Rauschecker from UMD CHHS reviews China's new cyber laws. Jocelyn Aqua from PwC describes attitudes toward AI. The ISAC process seems to be working. And patch early, patch often.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that WikiLeaks has dumped more of Vault7. More attribution of WannaCry to North Korea, where Hidden Cobra and the Lazarus Group appear to be one and the same. FIN10 cybercriminals are asking US and Canadian businesses for a big payoff to head off a big doxing. Conventional ransomware hits British universities. Kasperky and Avast release free decryptors for Jaff and EncrypTile. Markus Rauschecker from UMD CHHS reviews China's new cyber laws. Jocelyn Aqua from PwC describes attitudes toward AI. The ISAC process seems to be working. And patch early, patch often.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1270</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b211b9789b16c1c9c886c42f0c65f129]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6833655150.mp3?updated=1608753460" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hidden Cobra strikes from Pyongyang. Microsoft patches last of ShadowBrokers' leaked exploits. Sanctions coming over Russian election influence operations. Electrical and natural gas sectors brace for CrashOverride.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/371/notes</link>
      <description>In today's podcast, we hear that the FBI and the Department of Homeland Security have warned that Hidden Cobra actively pursuing DDoS campaigns. Microsoft patches remaining ShadowBrokers' exploits, even in deprecated systems. The US Congress votes to sanction Russia for election influence operations. Those operations have a long, long history, going back to the 1930s at least. Electrical and natural gas sectors work to protect themselves against CrashOverride. Emily Wilson from Terbium Labs reminds us not to forget the basics. Michael Callahan from Firemon shares survey data suggesting that IT pros spend too much time fixing their coworkers personal devices. Mergers and acquisitions seem to be followed by layoffs—Hexadite is said to be the latest case.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 15 Jun 2017 20:04:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>371</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a9e72792-def8-11ea-911f-131dce612f54/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hidden Cobra strikes from Pyongyang. Microsoft patches last of ShadowBrokers' leaked exploits. Sanctions coming over Russian election influence operations. Electrical and natural gas sectors brace for CrashOverride.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the FBI and the Department of Homeland Security have warned that Hidden Cobra actively pursuing DDoS campaigns. Microsoft patches remaining ShadowBrokers' exploits, even in deprecated systems. The US Congress votes to sanction Russia for election influence operations. Those operations have a long, long history, going back to the 1930s at least. Electrical and natural gas sectors work to protect themselves against CrashOverride. Emily Wilson from Terbium Labs reminds us not to forget the basics. Michael Callahan from Firemon shares survey data suggesting that IT pros spend too much time fixing their coworkers personal devices. Mergers and acquisitions seem to be followed by layoffs—Hexadite is said to be the latest case.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the FBI and the Department of Homeland Security have warned that Hidden Cobra actively pursuing DDoS campaigns. Microsoft patches remaining ShadowBrokers' exploits, even in deprecated systems. The US Congress votes to sanction Russia for election influence operations. Those operations have a long, long history, going back to the 1930s at least. Electrical and natural gas sectors work to protect themselves against CrashOverride. Emily Wilson from Terbium Labs reminds us not to forget the basics. Michael Callahan from Firemon shares survey data suggesting that IT pros spend too much time fixing their coworkers personal devices. Mergers and acquisitions seem to be followed by layoffs—Hexadite is said to be the latest case.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1017</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e1975c7b66f40f24666ff1bd247b54f4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3070934049.mp3?updated=1689815905" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A CrashOverride update from Robert M. Lee. Patch news. Terrorist funding goes cyber. Cozy and Fancy Bear were more active than earlier believed. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/370/notes</link>
      <description>Robert M Lee from Dragos provides an overview of CrashOverride. A quick look at yesterday's Patch Tuesday. Some of the fixes even reached back into Windows XP's unquiet grave. Terrorist information operations are increasingly sustained by cryptocurrency funding. Accenture's Justin Harvey reviews automation and orchestration. Russian intelligence may have been more active probing US state election systems than previously thought. Fake-news-as-a-service is now a black-market offering.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 14 Jun 2017 19:30:27 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>370</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/a9ff31c0-def8-11ea-911f-cb2f7c89c22d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A CrashOverride update from Robert M. Lee. Patch news. Terrorist funding goes cyber. Cozy and Fancy Bear were more active than earlier believed. </itunes:subtitle>
      <itunes:summary>Robert M Lee from Dragos provides an overview of CrashOverride. A quick look at yesterday's Patch Tuesday. Some of the fixes even reached back into Windows XP's unquiet grave. Terrorist information operations are increasingly sustained by cryptocurrency funding. Accenture's Justin Harvey reviews automation and orchestration. Russian intelligence may have been more active probing US state election systems than previously thought. Fake-news-as-a-service is now a black-market offering.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Robert M Lee from Dragos provides an overview of CrashOverride. A quick look at yesterday's Patch Tuesday. Some of the fixes even reached back into Windows XP's unquiet grave. Terrorist information operations are increasingly sustained by cryptocurrency funding. Accenture's Justin Harvey reviews automation and orchestration. Russian intelligence may have been more active probing US state election systems than previously thought. Fake-news-as-a-service is now a black-market offering.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1227</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e82d7497b55c761bfa2e7aea97a6231e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5885691005.mp3?updated=1689815891" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CrashOverride update. Influence ops harder to disrupt than infrastructure. Samba exploited for cryptocurrency mining. NSO Group for sale. Botnets and fake news. Airliner laptop bans.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/369/notes</link>
      <description>In today's podcast, we hear that CrashOverride looks like a power grid threat, and industry and government are taking it seriously. Cyber operations against ISIS are proving better at collection than disruption. Criminals are exploiting vulnerable Samba instances to spread cryptocurrency mining software. NSO Group has put itself up for sale, valued at more than a billion dollars. Well-informed observers of a civil libertarian bent think botnets don't have First Amendment rights.  Johannes Ulrich from from SANS and the ISC Stormcast Podcast on IPV6 security. Kirsten Bay from Cyber adAPT on Wannacry and the importance of a detection-led approach. And if you wondered about that airport laptop ban, here's the rest of the story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Jun 2017 18:29:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>369</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/aa1622fe-def8-11ea-911f-3757c7294366/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>CrashOverride update. Influence ops harder to disrupt than infrastructure. Samba exploited for cryptocurrency mining. NSO Group for sale. Botnets and fake news. Airliner laptop bans.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that CrashOverride looks like a power grid threat, and industry and government are taking it seriously. Cyber operations against ISIS are proving better at collection than disruption. Criminals are exploiting vulnerable Samba instances to spread cryptocurrency mining software. NSO Group has put itself up for sale, valued at more than a billion dollars. Well-informed observers of a civil libertarian bent think botnets don't have First Amendment rights.  Johannes Ulrich from from SANS and the ISC Stormcast Podcast on IPV6 security. Kirsten Bay from Cyber adAPT on Wannacry and the importance of a detection-led approach. And if you wondered about that airport laptop ban, here's the rest of the story.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that CrashOverride looks like a power grid threat, and industry and government are taking it seriously. Cyber operations against ISIS are proving better at collection than disruption. Criminals are exploiting vulnerable Samba instances to spread cryptocurrency mining software. NSO Group has put itself up for sale, valued at more than a billion dollars. Well-informed observers of a civil libertarian bent think botnets don't have First Amendment rights.  Johannes Ulrich from from SANS and the ISC Stormcast Podcast on IPV6 security. Kirsten Bay from Cyber adAPT on Wannacry and the importance of a detection-led approach. And if you wondered about that airport laptop ban, here's the rest of the story.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>974</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a7e32c1fdb79f7b0c278eb495dbf79da]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8953579316.mp3?updated=1689815875" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>CrashOverride implicated in Ukraine grid hack—possibly as a proof-of-concept. Hack-induced Gulf diplomatic troubles continue. New malware strains, exploits appear.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/368/notes</link>
      <description>In today's podcast, we hear that Dragos and ESET are bringing some clarity—and some bad news—to investigation of December 2016's Ukrainian power-grid hack. Qatar and its neighbors try to sort out hack-induced diplomatic troubles. DoubleSwitch social media malware hijacks dissidents' accounts. CertLock impedes removal of unwanted programs by security software. MacSpy and MacRansom appear as malware-as-a-service offerings. AMT vulnerability exploited in the wild. David Dufour from Webroot explains why attribution is so difficult. Robert Rodriguez from SINET describes the upcoming Innovation Summit 2017. China arrests twenty-two for trading in stolen iOS user data.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 12 Jun 2017 19:32:37 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>368</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/aa27f84e-def8-11ea-911f-2b46ff9208da/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>CrashOverride implicated in Ukraine grid hack—possibly as a proof-of-concept. Hack-induced Gulf diplomatic troubles continue. New malware strains, exploits appear.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Dragos and ESET are bringing some clarity—and some bad news—to investigation of December 2016's Ukrainian power-grid hack. Qatar and its neighbors try to sort out hack-induced diplomatic troubles. DoubleSwitch social media malware hijacks dissidents' accounts. CertLock impedes removal of unwanted programs by security software. MacSpy and MacRansom appear as malware-as-a-service offerings. AMT vulnerability exploited in the wild. David Dufour from Webroot explains why attribution is so difficult. Robert Rodriguez from SINET describes the upcoming Innovation Summit 2017. China arrests twenty-two for trading in stolen iOS user data.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Dragos and ESET are bringing some clarity—and some bad news—to investigation of December 2016's Ukrainian power-grid hack. Qatar and its neighbors try to sort out hack-induced diplomatic troubles. DoubleSwitch social media malware hijacks dissidents' accounts. CertLock impedes removal of unwanted programs by security software. MacSpy and MacRansom appear as malware-as-a-service offerings. AMT vulnerability exploited in the wild. David Dufour from Webroot explains why attribution is so difficult. Robert Rodriguez from SINET describes the upcoming Innovation Summit 2017. China arrests twenty-two for trading in stolen iOS user data.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>985</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eec5339302207df5b82d091553865637]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9201207697.mp3?updated=1689815823" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Comey's testimony calls Russian election influence operations massive and ongoing. New Android malware. Malicious hyperlinks infect with a mouse-over. Data privacy issues.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/367/notes</link>
      <description>In today's podcast we hear that whatever else former FBI Director Comey told the Senate, one thing is clear: he's convinced the Russian are fully committed to influence operations, and that they'll be back. More on disinformation and hacking in Qatar. Fresh malware surfaces in the Android ecosystem—some but not all has been booted from the PlayStore. Mousing over a malicious hyperlink can now be an infection vector. Cryptocurrencies, money transfer, and money laundering. Ben Yelin explains Florida money laundering legislation aimed at Bitcoin. Will Ackerly from Virtru discusses privacy and the right to be forgotten, online. GDPR and some thoughts on the distinctions among anonymity, privacy, and security.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 09 Jun 2017 17:26:20 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>367</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/aa4212c4-def8-11ea-911f-8f7479b3ccc3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Comey's testimony calls Russian election influence operations massive and ongoing. New Android malware. Malicious hyperlinks infect with a mouse-over. Data privacy issues.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that whatever else former FBI Director Comey told the Senate, one thing is clear: he's convinced the Russian are fully committed to influence operations, and that they'll be back. More on disinformation and hacking in Qatar. Fresh malware surfaces in the Android ecosystem—some but not all has been booted from the PlayStore. Mousing over a malicious hyperlink can now be an infection vector. Cryptocurrencies, money transfer, and money laundering. Ben Yelin explains Florida money laundering legislation aimed at Bitcoin. Will Ackerly from Virtru discusses privacy and the right to be forgotten, online. GDPR and some thoughts on the distinctions among anonymity, privacy, and security.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that whatever else former FBI Director Comey told the Senate, one thing is clear: he's convinced the Russian are fully committed to influence operations, and that they'll be back. More on disinformation and hacking in Qatar. Fresh malware surfaces in the Android ecosystem—some but not all has been booted from the PlayStore. Mousing over a malicious hyperlink can now be an infection vector. Cryptocurrencies, money transfer, and money laundering. Ben Yelin explains Florida money laundering legislation aimed at Bitcoin. Will Ackerly from Virtru discusses privacy and the right to be forgotten, online. GDPR and some thoughts on the distinctions among anonymity, privacy, and security.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1293</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ff284bacd12ddd5b1d50d1dd6dca9840]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1459342085.mp3?updated=1608753469" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Qatar—provocation, and disinformation online. Influence operations move from doxing to disinformation. 2FA still a good idea. Former FBI Director Comey testifies. And assume the boss is watching.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/366/notes</link>
      <description>In today's podcast, we hear that Qatar remains in bad odor with its neighbors over a recent online provocation. (Russia denies any involvement.) Anomali talks about influence operations, especially with respect to elections, where they may be moving from doxing to disinformation. Leaks about election hacking shouldn't turn you off to multifactor authentication—it's not the technology; it's us. Former FBI Director Comey testifies before the Senate Intelligence Committee. Level 3 Communications' Dale Drew review health care security stats. Drew Paik from Authentic8 shares vacation traveling tips. And a lesson from the NSA leak arrest: assume the boss is watching.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 08 Jun 2017 20:06:06 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>366</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/aa554ad8-def8-11ea-911f-a7a81c73619e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Qatar—provocation, and disinformation online. Influence operations move from doxing to disinformation. 2FA still a good idea. Former FBI Director Comey testifies. And assume the boss is watching.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Qatar remains in bad odor with its neighbors over a recent online provocation. (Russia denies any involvement.) Anomali talks about influence operations, especially with respect to elections, where they may be moving from doxing to disinformation. Leaks about election hacking shouldn't turn you off to multifactor authentication—it's not the technology; it's us. Former FBI Director Comey testifies before the Senate Intelligence Committee. Level 3 Communications' Dale Drew review health care security stats. Drew Paik from Authentic8 shares vacation traveling tips. And a lesson from the NSA leak arrest: assume the boss is watching.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Qatar remains in bad odor with its neighbors over a recent online provocation. (Russia denies any involvement.) Anomali talks about influence operations, especially with respect to elections, where they may be moving from doxing to disinformation. Leaks about election hacking shouldn't turn you off to multifactor authentication—it's not the technology; it's us. Former FBI Director Comey testifies before the Senate Intelligence Committee. Level 3 Communications' Dale Drew review health care security stats. Drew Paik from Authentic8 shares vacation traveling tips. And a lesson from the NSA leak arrest: assume the boss is watching.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>978</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ce588820a619b23d860ce377bb57e136]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5822541016.mp3?updated=1689815784" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Farewell to Jean Sammet, co-developer of COBOL. Remembering Midway. NSA leak investigation. Signs of Russian disinformation in the Gulf. Data breaches, script kiddies, EternalBlue, and Turla.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/365/notes</link>
      <description>In today's podcast, we say farewell to a legendary coder, and we also remember the Battle of Midway. Influence operations in the Gulf may have been Russian. Alleged leak of NSA report on election hacking proceeds. Two new data breaches are disclosed. A script kiddy is arrested in Japan for writing and distributing ransomware. EternalBlue remains a risk. Johns Hopkins' Joe Carrigan reviews research on cracking mobile device passwords using accelerometers. Eliana Schwartz describes the Cybertech Fairfax conference. Turla resurfaces, and they've new backdoors and everything. But what's their thing with Britney Spears?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 07 Jun 2017 20:08:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>365</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/aa697e68-def8-11ea-911f-cb2c18f082e3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Farewell to Jean Sammet, co-developer of COBOL. Remembering Midway. NSA leak investigation. Signs of Russian disinformation in the Gulf. Data breaches, script kiddies, EternalBlue, and Turla.</itunes:subtitle>
      <itunes:summary>In today's podcast, we say farewell to a legendary coder, and we also remember the Battle of Midway. Influence operations in the Gulf may have been Russian. Alleged leak of NSA report on election hacking proceeds. Two new data breaches are disclosed. A script kiddy is arrested in Japan for writing and distributing ransomware. EternalBlue remains a risk. Johns Hopkins' Joe Carrigan reviews research on cracking mobile device passwords using accelerometers. Eliana Schwartz describes the Cybertech Fairfax conference. Turla resurfaces, and they've new backdoors and everything. But what's their thing with Britney Spears?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we say farewell to a legendary coder, and we also remember the Battle of Midway. Influence operations in the Gulf may have been Russian. Alleged leak of NSA report on election hacking proceeds. Two new data breaches are disclosed. A script kiddy is arrested in Japan for writing and distributing ransomware. EternalBlue remains a risk. Johns Hopkins' Joe Carrigan reviews research on cracking mobile device passwords using accelerometers. Eliana Schwartz describes the Cybertech Fairfax conference. Turla resurfaces, and they've new backdoors and everything. But what's their thing with Britney Spears?</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>925</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6969e86d7357c042dec475cbd76c96a1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1775484243.mp3?updated=1689815773" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Report leaked on Russian influence operations (alleged leaker in custody). ISIS continues inspiration; anarchist groups said to follow same playbook.  The DarkOverlord is back.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/364/notes</link>
      <description>In today's podcast we hear about a leaked report describing eleventh-hour Russian influence operations during last year's US elections. An alleged leaker is already charged and in custody. The UK's investigation into last weekend's terror attacks continues, online as well as in physical space. Apple hints it's helping out. The attackers seem to have been known to authorities. In its continuing campaign of online inspiration, ISIS claims responsibility for the destruction of a church in the Philippines and a lethal standoff in Australia. Violent anarchist groups seem to be following the ISIS playbook in cyberspace. Some thoughts on wolves.  Rick Howard from Palo Alto Networks on government cloud deployment. Andrea Little Limbago from Endgame has results from a survey on Americans’ perceptions of the US government’s cybersecurity capabilities. And the DarkOverlord is back.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Jun 2017 19:43:13 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>364</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/aa8090da-def8-11ea-911f-4ff6b3610bea/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Report leaked on Russian influence operations (alleged leaker in custody). ISIS continues inspiration; anarchist groups said to follow same playbook.  The DarkOverlord is back.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about a leaked report describing eleventh-hour Russian influence operations during last year's US elections. An alleged leaker is already charged and in custody. The UK's investigation into last weekend's terror attacks continues, online as well as in physical space. Apple hints it's helping out. The attackers seem to have been known to authorities. In its continuing campaign of online inspiration, ISIS claims responsibility for the destruction of a church in the Philippines and a lethal standoff in Australia. Violent anarchist groups seem to be following the ISIS playbook in cyberspace. Some thoughts on wolves.  Rick Howard from Palo Alto Networks on government cloud deployment. Andrea Little Limbago from Endgame has results from a survey on Americans’ perceptions of the US government’s cybersecurity capabilities. And the DarkOverlord is back.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about a leaked report describing eleventh-hour Russian influence operations during last year's US elections. An alleged leaker is already charged and in custody. The UK's investigation into last weekend's terror attacks continues, online as well as in physical space. Apple hints it's helping out. The attackers seem to have been known to authorities. In its continuing campaign of online inspiration, ISIS claims responsibility for the destruction of a church in the Philippines and a lethal standoff in Australia. Violent anarchist groups seem to be following the ISIS playbook in cyberspace. Some thoughts on wolves.  Rick Howard from Palo Alto Networks on government cloud deployment. Andrea Little Limbago from Endgame has results from a survey on Americans’ perceptions of the US government’s cybersecurity capabilities. And the DarkOverlord is back.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>965</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4d739ac488b168cee4ce5ae0bcfbd6c1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6486127324.mp3?updated=1689815761" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ISIS claims responsibility for inspiring attacks in London. More are expected during Ramadan. Hacks roil Middle Eastern diplomatic waters. Ransomware updates. Indian investigates possible aircraft hacking.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/363/notes</link>
      <description>In today's podcast, we hear that ISIS has claimed responsibility for Saturday's terror attacks in London. The UK reacts with strong words against terrorist safe spaces online. The Prime Minister wants restrictions on end-to-end encryption and a very hard line against extremist messaging. Hacking has diplomatic consequences for Bahrain, Qatar, and the United Arab Emirates. India investigates a possible cyberattack against a fighter aircraft. Dr. Charles Clancy from VA Tech's Hume Center on the FCC's approach to consumer privacy. Ransomware purveyors also selling stolen data. EternalBlue exploits remain active.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 05 Jun 2017 19:41:13 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>363</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/aa91182e-def8-11ea-911f-fffd5d3a90d5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>ISIS claims responsibility for inspiring attacks in London. More are expected during Ramadan. Hacks roil Middle Eastern diplomatic waters. Ransomware updates. Indian investigates possible aircraft hacking.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that ISIS has claimed responsibility for Saturday's terror attacks in London. The UK reacts with strong words against terrorist safe spaces online. The Prime Minister wants restrictions on end-to-end encryption and a very hard line against extremist messaging. Hacking has diplomatic consequences for Bahrain, Qatar, and the United Arab Emirates. India investigates a possible cyberattack against a fighter aircraft. Dr. Charles Clancy from VA Tech's Hume Center on the FCC's approach to consumer privacy. Ransomware purveyors also selling stolen data. EternalBlue exploits remain active.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that ISIS has claimed responsibility for Saturday's terror attacks in London. The UK reacts with strong words against terrorist safe spaces online. The Prime Minister wants restrictions on end-to-end encryption and a very hard line against extremist messaging. Hacking has diplomatic consequences for Bahrain, Qatar, and the United Arab Emirates. India investigates a possible cyberattack against a fighter aircraft. Dr. Charles Clancy from VA Tech's Hume Center on the FCC's approach to consumer privacy. Ransomware purveyors also selling stolen data. EternalBlue exploits remain active.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>906</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bba5d43a286252d75cd08b7fdb28159d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1846493479.mp3?updated=1689815747" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patriotic and free-spirited hacking? WikiLeaks has a new Vault7 dump. Cyber conflict over the South China Sea. Fireball malware infests more than 250 million devices. Trident security. Kmart breach. Bikers turn hackers.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/362/notes</link>
      <description>In today's podcast we hear, second-hand but ultimately from Vladimir Vladimirovich himself, that Russian hackers are free-spirited, patriotic artists, and maybe he'd be in a position to know. WikiLeaks dumps more Vault7 documents. White hats reconsider crowdsourcing membership in the exploit-of-the-month club. OceanLotus may be weaponizing a ShadowBrokers' leak. Fireball malware used for ad fraud. A think tank warns of Royal Navy submarine cyber vulnerabilities. Kmart discloses a point-of-sale breach.  Jonathan Katz from UMD on undetectable backdoors. Leo Taddeo from Cyxtera Technologies on what the Comey firing means for encryption and cyber security. And a motorcycle gang is hacking cars. Why? Because that's the way they roll.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 02 Jun 2017 20:04:13 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>362</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/aaaafcee-def8-11ea-911f-1788b063c0de/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Patriotic and free-spirited hacking? WikiLeaks has a new Vault7 dump. Cyber conflict over the South China Sea. Fireball malware infests more than 250 million devices. Trident security. Kmart breach. Bikers turn hackers.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear, second-hand but ultimately from Vladimir Vladimirovich himself, that Russian hackers are free-spirited, patriotic artists, and maybe he'd be in a position to know. WikiLeaks dumps more Vault7 documents. White hats reconsider crowdsourcing membership in the exploit-of-the-month club. OceanLotus may be weaponizing a ShadowBrokers' leak. Fireball malware used for ad fraud. A think tank warns of Royal Navy submarine cyber vulnerabilities. Kmart discloses a point-of-sale breach.  Jonathan Katz from UMD on undetectable backdoors. Leo Taddeo from Cyxtera Technologies on what the Comey firing means for encryption and cyber security. And a motorcycle gang is hacking cars. Why? Because that's the way they roll.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear, second-hand but ultimately from Vladimir Vladimirovich himself, that Russian hackers are free-spirited, patriotic artists, and maybe he'd be in a position to know. WikiLeaks dumps more Vault7 documents. White hats reconsider crowdsourcing membership in the exploit-of-the-month club. OceanLotus may be weaponizing a ShadowBrokers' leak. Fireball malware used for ad fraud. A think tank warns of Royal Navy submarine cyber vulnerabilities. Kmart discloses a point-of-sale breach.  Jonathan Katz from UMD on undetectable backdoors. Leo Taddeo from Cyxtera Technologies on what the Comey firing means for encryption and cyber security. And a motorcycle gang is hacking cars. Why? Because that's the way they roll.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1267</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[67b2e49d2138fd6f5b819905363176fc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2506027689.mp3?updated=1608753356" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>It's the first of June, and the ShadowBrokers' exploit-of-the-month club is open for business (exploits to be delivered to subscribers in July).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/361/notes</link>
      <description>In today's podcast we discuss the ShadowBrokers and their new exploit-of-the-month club, now open for subscription. We get some industry reaction, and it seems unlikely that the ShadowBrokers should be taken at face value. Plus, Webroot's David Dufour give us the dirt on worms. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 01 Jun 2017 18:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>361</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/aacd83c2-def8-11ea-911f-df19a3889fcb/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>It's the first of June, and the ShadowBrokers' exploit-of-the-month club is open for business (exploits to be delivered to subscribers in July).</itunes:subtitle>
      <itunes:summary>In today's podcast we discuss the ShadowBrokers and their new exploit-of-the-month club, now open for subscription. We get some industry reaction, and it seems unlikely that the ShadowBrokers should be taken at face value. Plus, Webroot's David Dufour give us the dirt on worms. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we discuss the ShadowBrokers and their new exploit-of-the-month club, now open for subscription. We get some industry reaction, and it seems unlikely that the ShadowBrokers should be taken at face value. Plus, Webroot's David Dufour give us the dirt on worms. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>892</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8c1fe723313b58b7285c0ce9790e3973]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2253880970.mp3?updated=1689814860" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exploit-of-the-month club open for business. Disinformation technology. Lazarus Group tied to North Korean intelligence (again). Extortion is big, but carding is still with us. Spammy apps in Google Play.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/360/notes</link>
      <description>In today's podcast, we hear that the ShadowBrokers open their exploit-of-the-month club at the low, low price of $22,000 in Zcash. Group-IB finds more evidence that the Lazarus Group is a North Korean intelligence unit. Extortion, both real and bluffing, grows in underworld popularity, but carders are with us still, alas. President Macron tells President Putin everyone's on to his use of Russia Today and Sputnik News for disinformation. Accenture's Justin Harvey explains red-teaming. Ely Kahn from Sqrrl outlines NIST's call for comments on their cybersecurity framework. And if you're a regular Joe or Jane looking for some Android action, take this advice straight from the shoulder: steer clear of Star Hop and Candy Link.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 31 May 2017 19:46:12 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>360</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/aaee6812-def8-11ea-911f-c72e13e3c53a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Exploit-of-the-month club open for business. Disinformation technology. Lazarus Group tied to North Korean intelligence (again). Extortion is big, but carding is still with us. Spammy apps in Google Play.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the ShadowBrokers open their exploit-of-the-month club at the low, low price of $22,000 in Zcash. Group-IB finds more evidence that the Lazarus Group is a North Korean intelligence unit. Extortion, both real and bluffing, grows in underworld popularity, but carders are with us still, alas. President Macron tells President Putin everyone's on to his use of Russia Today and Sputnik News for disinformation. Accenture's Justin Harvey explains red-teaming. Ely Kahn from Sqrrl outlines NIST's call for comments on their cybersecurity framework. And if you're a regular Joe or Jane looking for some Android action, take this advice straight from the shoulder: steer clear of Star Hop and Candy Link.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the ShadowBrokers open their exploit-of-the-month club at the low, low price of $22,000 in Zcash. Group-IB finds more evidence that the Lazarus Group is a North Korean intelligence unit. Extortion, both real and bluffing, grows in underworld popularity, but carders are with us still, alas. President Macron tells President Putin everyone's on to his use of Russia Today and Sputnik News for disinformation. Accenture's Justin Harvey explains red-teaming. Ely Kahn from Sqrrl outlines NIST's call for comments on their cybersecurity framework. And if you're a regular Joe or Jane looking for some Android action, take this advice straight from the shoulder: steer clear of Star Hop and Candy Link.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>983</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c358ff0121ee9e768f5783e44a62e19b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7831862058.mp3?updated=1689814757" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Implications of Manchester bombing investigation on policy, Five Eyes relations. British Airways IT outage. Fancy Bear and Malta? ShadowBrokers prep exploit-of-the-month club. Google deals with Chrome, PlayStore issues. Mall boards and ricrolling.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/359/notes</link>
      <description>In today's podcast, we hear that British Airways suffered a glitch, not a hack, but whichever it was, it amounted to an infrastructure takedown. Fancy Bears may be snuffling at the Government of Malta. The ShadowBrokers may be cashing out. Google kicks Judy adware out of the PlayStore. Researchers find another Android vulnerability, "Cloak-and-Dagger." Anonymous is working on the Houdini RAT. Mall hackers in Liverpool mind their manners. Johannes Ulrich from SANS and the ISC Stormcast podcast on DNS security. And security researchers get rickrolled.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 May 2017 19:57:49 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>359</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ab052a20-def8-11ea-911f-ff64f932da5f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Implications of Manchester bombing investigation on policy, Five Eyes relations. British Airways IT outage. Fancy Bear and Malta? ShadowBrokers prep exploit-of-the-month club. Google deals with Chrome, PlayStore issues. Mall boards and ricrolling.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that British Airways suffered a glitch, not a hack, but whichever it was, it amounted to an infrastructure takedown. Fancy Bears may be snuffling at the Government of Malta. The ShadowBrokers may be cashing out. Google kicks Judy adware out of the PlayStore. Researchers find another Android vulnerability, "Cloak-and-Dagger." Anonymous is working on the Houdini RAT. Mall hackers in Liverpool mind their manners. Johannes Ulrich from SANS and the ISC Stormcast podcast on DNS security. And security researchers get rickrolled.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that British Airways suffered a glitch, not a hack, but whichever it was, it amounted to an infrastructure takedown. Fancy Bears may be snuffling at the Government of Malta. The ShadowBrokers may be cashing out. Google kicks Judy adware out of the PlayStore. Researchers find another Android vulnerability, "Cloak-and-Dagger." Anonymous is working on the Houdini RAT. Mall hackers in Liverpool mind their manners. Johannes Ulrich from SANS and the ISC Stormcast podcast on DNS security. And security researchers get rickrolled.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>794</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[967c5547ca02cc7e0bd6c7f22ecff9e6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6544827386.mp3?updated=1689814736" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>WannaCry aftershocks. Influence ops and data corruption. Samba patched. Biometrics and impersonation. GDPR approaches. US legislation update.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/358/notes</link>
      <description>In today's podcast we hear that bogus WannaCry remediation apps are cumbering the PlayStore—don't be taken in. More on the complexities of WannaCry attribution. An EternalRocks worm may have been withdrawn by its authors. Citizen Lab finds evidence that influence operations against targets in almost forty countries are now corrupting data. Vietnam does some cyber snarling at the Philippines over the South China Sea. Samba gets a patch as observers fear emergence of a worm. Biometrics and impersonation—experts advise complexity. GDPR is just one year away, but preparation still lags. Dinah Davis from Arctic Wolf shares her story of founding Code Like a Girl. Malek Ben Salem from Accenture Labs describes self sustaining enterprises. And two noteworthy pieces of legislation are introduced into the US House and Senate.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 26 May 2017 18:49:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>358</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ab179f8e-def8-11ea-911f-27c3f13a79ec/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>WannaCry aftershocks. Influence ops and data corruption. Samba patched. Biometrics and impersonation. GDPR approaches. US legislation update.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that bogus WannaCry remediation apps are cumbering the PlayStore—don't be taken in. More on the complexities of WannaCry attribution. An EternalRocks worm may have been withdrawn by its authors. Citizen Lab finds evidence that influence operations against targets in almost forty countries are now corrupting data. Vietnam does some cyber snarling at the Philippines over the South China Sea. Samba gets a patch as observers fear emergence of a worm. Biometrics and impersonation—experts advise complexity. GDPR is just one year away, but preparation still lags. Dinah Davis from Arctic Wolf shares her story of founding Code Like a Girl. Malek Ben Salem from Accenture Labs describes self sustaining enterprises. And two noteworthy pieces of legislation are introduced into the US House and Senate.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that bogus WannaCry remediation apps are cumbering the PlayStore—don't be taken in. More on the complexities of WannaCry attribution. An EternalRocks worm may have been withdrawn by its authors. Citizen Lab finds evidence that influence operations against targets in almost forty countries are now corrupting data. Vietnam does some cyber snarling at the Philippines over the South China Sea. Samba gets a patch as observers fear emergence of a worm. Biometrics and impersonation—experts advise complexity. GDPR is just one year away, but preparation still lags. Dinah Davis from Arctic Wolf shares her story of founding Code Like a Girl. Malek Ben Salem from Accenture Labs describes self sustaining enterprises. And two noteworthy pieces of legislation are introduced into the US House and Senate.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1305</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6155aa1a16e61f271d99267c9ca83310]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3604491299.mp3?updated=1608753350" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Worm alert. Stumblebums or masterminds? Widia commodity ransomware in its early stages. Taking the fight to ISIS in cyberspace.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/357/notes</link>
      <description>In today's podcast, we hear about a vulnerability in widely used networking software leaves it open to a worm infestation. Were the WannaCry hackers annoying stumblebums, or are there deeper games afoot? Help desk scammers say they'll rid you of ransomware—they won't. Researchers watch "Widia," commodity ransomware that's still an early stage work-in-progress. The Manchester terrorist looks more like a known wolf than a lone wolf. Ben Yelin reviews the Supreme Court's consideration of a cell site privacy case. Yong-Gon Chon from Focal Point Data Risk discusses their Cyber Balance Sheet Report. And US Cyber Command would like ISIS to know that they're in the Fort's crosshairs.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 25 May 2017 19:37:06 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>357</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ab2e84b0-def8-11ea-911f-9708900b7dd5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Worm alert. Stumblebums or masterminds? Widia commodity ransomware in its early stages. Taking the fight to ISIS in cyberspace.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about a vulnerability in widely used networking software leaves it open to a worm infestation. Were the WannaCry hackers annoying stumblebums, or are there deeper games afoot? Help desk scammers say they'll rid you of ransomware—they won't. Researchers watch "Widia," commodity ransomware that's still an early stage work-in-progress. The Manchester terrorist looks more like a known wolf than a lone wolf. Ben Yelin reviews the Supreme Court's consideration of a cell site privacy case. Yong-Gon Chon from Focal Point Data Risk discusses their Cyber Balance Sheet Report. And US Cyber Command would like ISIS to know that they're in the Fort's crosshairs.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about a vulnerability in widely used networking software leaves it open to a worm infestation. Were the WannaCry hackers annoying stumblebums, or are there deeper games afoot? Help desk scammers say they'll rid you of ransomware—they won't. Researchers watch "Widia," commodity ransomware that's still an early stage work-in-progress. The Manchester terrorist looks more like a known wolf than a lone wolf. Ben Yelin reviews the Supreme Court's consideration of a cell site privacy case. Yong-Gon Chon from Focal Point Data Risk discusses their Cyber Balance Sheet Report. And US Cyber Command would like ISIS to know that they're in the Fort's crosshairs.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>976</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8796f31033802da6a484d04c4ec8cf73]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6594984748.mp3?updated=1689814701" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Manchester bombing investigators look at bomber's network. EnSilo patches ESTEEMAUDIT. Cron cyber gangsters arrested. What we hear at the Cyber Investing Summit.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/356/notes</link>
      <description>In today's podcast we hear that the Manchester bombing investigation is looking closely at the bomber's networks, with international cooperation. NSA says it's waging cyber war against ISIS. EnSilo patches ESTEEMAUDIT, one of the vulnerabilities set up for exploitation by EternalBlue. Russian police arrest members of the Cron cyber gang. Ben Read from FireEye describes recently discovered zero-days. Jonathan Katz outlines some Bitcoin vulnerabilities. And the Cyber Investing Summit opened with some demonstrations of the use and abuse of misdirection in hacking.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 24 May 2017 19:29:59 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>356</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ab483216-def8-11ea-911f-677eaa345b88/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Manchester bombing investigators look at bomber's network. EnSilo patches ESTEEMAUDIT. Cron cyber gangsters arrested. What we hear at the Cyber Investing Summit.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that the Manchester bombing investigation is looking closely at the bomber's networks, with international cooperation. NSA says it's waging cyber war against ISIS. EnSilo patches ESTEEMAUDIT, one of the vulnerabilities set up for exploitation by EternalBlue. Russian police arrest members of the Cron cyber gang. Ben Read from FireEye describes recently discovered zero-days. Jonathan Katz outlines some Bitcoin vulnerabilities. And the Cyber Investing Summit opened with some demonstrations of the use and abuse of misdirection in hacking.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that the Manchester bombing investigation is looking closely at the bomber's networks, with international cooperation. NSA says it's waging cyber war against ISIS. EnSilo patches ESTEEMAUDIT, one of the vulnerabilities set up for exploitation by EternalBlue. Russian police arrest members of the Cron cyber gang. Ben Read from FireEye describes recently discovered zero-days. Jonathan Katz outlines some Bitcoin vulnerabilities. And the Cyber Investing Summit opened with some demonstrations of the use and abuse of misdirection in hacking.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>981</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6569bec5e7bcef811ae28ba91378f92e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3698588640.mp3?updated=1689814689" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ISIS claims Manchester concert bombing. The case for a North Korean Wannacry. US lawmakers consider cyber legislation. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/355/notes</link>
      <description>In today's podcast, ISIS claims responsibility for the Manchester concert bombing. Security companies make their case for pinning Wannacry on North Korea. US legislators consider bills to upgrade equipment and permit limited hacking back. Emily Wilson from Terbium Labs considers coming European privacy regulations. Doug Depeppe from the Cyber Resiliency Project describes a community based approach to cyber resiliency.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 May 2017 19:05:21 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>355</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ab696c6a-def8-11ea-911f-3bb9b2b11f74/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>ISIS claims Manchester concert bombing. The case for a North Korean Wannacry. US lawmakers consider cyber legislation. </itunes:subtitle>
      <itunes:summary>In today's podcast, ISIS claims responsibility for the Manchester concert bombing. Security companies make their case for pinning Wannacry on North Korea. US legislators consider bills to upgrade equipment and permit limited hacking back. Emily Wilson from Terbium Labs considers coming European privacy regulations. Doug Depeppe from the Cyber Resiliency Project describes a community based approach to cyber resiliency.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, ISIS claims responsibility for the Manchester concert bombing. Security companies make their case for pinning Wannacry on North Korea. US legislators consider bills to upgrade equipment and permit limited hacking back. Emily Wilson from Terbium Labs considers coming European privacy regulations. Doug Depeppe from the Cyber Resiliency Project describes a community based approach to cyber resiliency.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>925</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2abf0972190166b1ff1aa8d175e4475a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3013064446.mp3?updated=1689814604" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>How were US agents in China compromised between 2010 and 2012? EternalBlue updates (including notes on WannaCry and EternalRock).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/354/notes</link>
      <description>In today's podcast, the FBI and CIA are reported to be looking for the source of a compromise that shut down CIA agents in China between 2010 and 2012: hackers or moles, no one knows. Or was it just a tradecraft mismatch? WannaCry has been slowed, at least temporarily. Observers speculate the ransomware may have been a probe. Other uses of EternalBlue exploits look more focused and more disciplined, and arguably more serious. WikiLeaks dumps another leaked implant. Johns Hopkins' Joe Carrigan gives us the VPN basics. And the ShadowBrokers are expected to open their Leak-of-the-Month Club in June (subscription only).
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 22 May 2017 19:49:01 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>354</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ab84ed0a-def8-11ea-911f-0f137bfd0945/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>How were US agents in China compromised between 2010 and 2012? EternalBlue updates (including notes on WannaCry and EternalRock).</itunes:subtitle>
      <itunes:summary>In today's podcast, the FBI and CIA are reported to be looking for the source of a compromise that shut down CIA agents in China between 2010 and 2012: hackers or moles, no one knows. Or was it just a tradecraft mismatch? WannaCry has been slowed, at least temporarily. Observers speculate the ransomware may have been a probe. Other uses of EternalBlue exploits look more focused and more disciplined, and arguably more serious. WikiLeaks dumps another leaked implant. Johns Hopkins' Joe Carrigan gives us the VPN basics. And the ShadowBrokers are expected to open their Leak-of-the-Month Club in June (subscription only).
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, the FBI and CIA are reported to be looking for the source of a compromise that shut down CIA agents in China between 2010 and 2012: hackers or moles, no one knows. Or was it just a tradecraft mismatch? WannaCry has been slowed, at least temporarily. Observers speculate the ransomware may have been a probe. Other uses of EternalBlue exploits look more focused and more disciplined, and arguably more serious. WikiLeaks dumps another leaked implant. Johns Hopkins' Joe Carrigan gives us the VPN basics. And the ShadowBrokers are expected to open their Leak-of-the-Month Club in June (subscription only).</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>834</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[38cdff826ee5206dc6ff460dd110d356]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1068651275.mp3?updated=1689814584" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>WannaCry wraps up its first week. No patches for Marshmallow. Women in Cybersecurity survey results. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/353/notes</link>
      <description>In today's podcast we learn that crooks are interested in home IoT. Twitter outages aren't just you. Android Marshmallow won't be getting a patch, just a replacement. WannaCry observers focus on North Korea as a possible source. Palo Alto Networks' Rick Howard has research on Shamoon. Joyce Brocaglia from Alta Associates and the Executive Women's Forum shares results from the 2017 Women in Cyber Security Survey. And no one, yet, knows who the ShadowBrokers are with any certainty. (Or it they do, they're not talking.)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 19 May 2017 17:56:05 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>353</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/abae8c82-def8-11ea-911f-e74b1e216e68/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>WannaCry wraps up its first week. No patches for Marshmallow. Women in Cybersecurity survey results. </itunes:subtitle>
      <itunes:summary>In today's podcast we learn that crooks are interested in home IoT. Twitter outages aren't just you. Android Marshmallow won't be getting a patch, just a replacement. WannaCry observers focus on North Korea as a possible source. Palo Alto Networks' Rick Howard has research on Shamoon. Joyce Brocaglia from Alta Associates and the Executive Women's Forum shares results from the 2017 Women in Cyber Security Survey. And no one, yet, knows who the ShadowBrokers are with any certainty. (Or it they do, they're not talking.)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we learn that crooks are interested in home IoT. Twitter outages aren't just you. Android Marshmallow won't be getting a patch, just a replacement. WannaCry observers focus on North Korea as a possible source. Palo Alto Networks' Rick Howard has research on Shamoon. Joyce Brocaglia from Alta Associates and the Executive Women's Forum shares results from the 2017 Women in Cyber Security Survey. And no one, yet, knows who the ShadowBrokers are with any certainty. (Or it they do, they're not talking.)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1285</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[92a4232fcf81030f1f35f4f1cd9226a5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8812433256.mp3?updated=1608753461" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OilRig hires the Russian cyber-mob. WannaCry updates. Other EternalBlue exploits surface in the wild. Pending legislation in the US Congress. NIST issues guidelines for Executive Order compliance.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/352/notes</link>
      <description>In today's podcast, we hear that Iran's OilRig cyberespionage campaign seems to employing Russian hoods, and BlackEnergy. WannaCry recovery continues, but there may be worse to come. Still talking funny, the ShadowBrokers say you'll be able to subscribe to an Equation Group leak service next month. The US Senate considers putting the Vulnerability Equities Process on a legal foundation. NIST issues draft guidance on cyber Executive Order implementation. Level 3 Communications' Dale Drew predicts there's more ransomware in our futures. Mandeep Khera from Arxan Technologies outines vulnerabilities in mobile apps. And political parties in Western Europe still stink at email security, for all their worries about Fancy Bear.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 18 May 2017 17:51:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>352</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/abcd79b2-def8-11ea-911f-27d11d2e2912/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>OilRig hires the Russian cyber-mob. WannaCry updates. Other EternalBlue exploits surface in the wild. Pending legislation in the US Congress. NIST issues guidelines for Executive Order compliance.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Iran's OilRig cyberespionage campaign seems to employing Russian hoods, and BlackEnergy. WannaCry recovery continues, but there may be worse to come. Still talking funny, the ShadowBrokers say you'll be able to subscribe to an Equation Group leak service next month. The US Senate considers putting the Vulnerability Equities Process on a legal foundation. NIST issues draft guidance on cyber Executive Order implementation. Level 3 Communications' Dale Drew predicts there's more ransomware in our futures. Mandeep Khera from Arxan Technologies outines vulnerabilities in mobile apps. And political parties in Western Europe still stink at email security, for all their worries about Fancy Bear.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Iran's OilRig cyberespionage campaign seems to employing Russian hoods, and BlackEnergy. WannaCry recovery continues, but there may be worse to come. Still talking funny, the ShadowBrokers say you'll be able to subscribe to an Equation Group leak service next month. The US Senate considers putting the Vulnerability Equities Process on a legal foundation. NIST issues draft guidance on cyber Executive Order implementation. Level 3 Communications' Dale Drew predicts there's more ransomware in our futures. Mandeep Khera from Arxan Technologies outines vulnerabilities in mobile apps. And political parties in Western Europe still stink at email security, for all their worries about Fancy Bear.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>944</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a23a99c8af4360a8b62b52776670b929]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3641334181.mp3?updated=1689814559" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Gothic Panda seems to have a government job. Not all extortion is ransomware (ask Disney). WannaCry update. The ShadowBrokers are back. So is WikiLeaks</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/351/notes</link>
      <description>In today's podcast, we hear that APT3, also known as Gothic Panda, has been fingered as an agent of China's Ministry of State Security. An unreleased Disney flick is held for ransom: Disney doesn’t pay, movies goes up on Pirate Bay. WannaCry may be sloppy but it's still dangerous. OT has a harder time patching against WannaCry than IT does. Dr. Charles Clancy from VA Tech's Hume Center contracts the Shadowbrokers vs Vault 7. Area 1's Oren Falkowitz describes innovative ways to prevent phishing. The ShadowBrokers are back and still talking crocodile. And WikiLeaks releases more of Vault7.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 17 May 2017 19:06:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>351</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/abe6cf2a-def8-11ea-911f-0be0d82672d6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Gothic Panda seems to have a government job. Not all extortion is ransomware (ask Disney). WannaCry update. The ShadowBrokers are back. So is WikiLeaks</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that APT3, also known as Gothic Panda, has been fingered as an agent of China's Ministry of State Security. An unreleased Disney flick is held for ransom: Disney doesn’t pay, movies goes up on Pirate Bay. WannaCry may be sloppy but it's still dangerous. OT has a harder time patching against WannaCry than IT does. Dr. Charles Clancy from VA Tech's Hume Center contracts the Shadowbrokers vs Vault 7. Area 1's Oren Falkowitz describes innovative ways to prevent phishing. The ShadowBrokers are back and still talking crocodile. And WikiLeaks releases more of Vault7.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that APT3, also known as Gothic Panda, has been fingered as an agent of China's Ministry of State Security. An unreleased Disney flick is held for ransom: Disney doesn’t pay, movies goes up on Pirate Bay. WannaCry may be sloppy but it's still dangerous. OT has a harder time patching against WannaCry than IT does. Dr. Charles Clancy from VA Tech's Hume Center contracts the Shadowbrokers vs Vault 7. Area 1's Oren Falkowitz describes innovative ways to prevent phishing. The ShadowBrokers are back and still talking crocodile. And WikiLeaks releases more of Vault7.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>974</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e0860975655a7dcd502782080e2ff8a7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9201367608.mp3?updated=1689814548" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>WannaCry, worm wars, ransomware pandemics, and a place for kill switches. And what might a cyber Pearl Harbor look like?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/350/notes</link>
      <description>In today's podcast we follow the developing story of the WannaCry pandemic as it continues to unfold, with speculation about attribution focusing on the Lazarus Group. Why malware would have a kill switch. Throwbacks to the worm wars. The risks of unpatched, superannuated, or pirated software. Litigation exposure in the WannaCry affair. David Dufour from Webroot on the basics of exploits and scripts. Paige Schaffer from Generali Global Assistance reviews the Identity Theft Assessment and Prediction Report published by the University of Texas at Austin Center for Identity. Cyber Pearl Harbors, again—what might one actually look like?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 May 2017 19:48:22 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>350</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/abfd347c-def8-11ea-911f-632e73b408ea/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>WannaCry, worm wars, ransomware pandemics, and a place for kill switches. And what might a cyber Pearl Harbor look like?</itunes:subtitle>
      <itunes:summary>In today's podcast we follow the developing story of the WannaCry pandemic as it continues to unfold, with speculation about attribution focusing on the Lazarus Group. Why malware would have a kill switch. Throwbacks to the worm wars. The risks of unpatched, superannuated, or pirated software. Litigation exposure in the WannaCry affair. David Dufour from Webroot on the basics of exploits and scripts. Paige Schaffer from Generali Global Assistance reviews the Identity Theft Assessment and Prediction Report published by the University of Texas at Austin Center for Identity. Cyber Pearl Harbors, again—what might one actually look like?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we follow the developing story of the WannaCry pandemic as it continues to unfold, with speculation about attribution focusing on the Lazarus Group. Why malware would have a kill switch. Throwbacks to the worm wars. The risks of unpatched, superannuated, or pirated software. Litigation exposure in the WannaCry affair. David Dufour from Webroot on the basics of exploits and scripts. Paige Schaffer from Generali Global Assistance reviews the Identity Theft Assessment and Prediction Report published by the University of Texas at Austin Center for Identity. Cyber Pearl Harbors, again—what might one actually look like?</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>966</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6b85f5029e8bfce6c3487ad912a0e5f7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7894449784.mp3?updated=1689814533" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>WannaCry ransomware—a pandemic. Baijiu spyware in East Asia. APT32 seems to be spying for Vietnam. Al Qaeda calls to lone wolves. Influence operations and tactical operations. The long arm of the law reaches out to tech-support scammers.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/349/notes</link>
      <description>In today's podcast we hear how WannaCry ransomware became a pandemic over the weekend. Johannes Ulrich joins us to help sort it out. A temporary lull is feared likely to be more temporary than most would like. Baijiu espionage malware is spreading through GeoCities. Another APT—APT32—is also devoted to espionage, apparently in alignment with the government of Vietnam. Bin Laden's son is working to inspire lone wolves. National authorities seek to draw influence operations lessons from the concluded French presidential campaign. Armies make tactical use of cyber operations. And there's a dragnet out for tech-support scammers.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 15 May 2017 20:12:15 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>349</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ac1c1d38-def8-11ea-911f-f78d6e684dfe/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>WannaCry ransomware—a pandemic. Baijiu spyware in East Asia. APT32 seems to be spying for Vietnam. Al Qaeda calls to lone wolves. Influence operations and tactical operations. The long arm of the law reaches out to tech-support scammers.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear how WannaCry ransomware became a pandemic over the weekend. Johannes Ulrich joins us to help sort it out. A temporary lull is feared likely to be more temporary than most would like. Baijiu espionage malware is spreading through GeoCities. Another APT—APT32—is also devoted to espionage, apparently in alignment with the government of Vietnam. Bin Laden's son is working to inspire lone wolves. National authorities seek to draw influence operations lessons from the concluded French presidential campaign. Armies make tactical use of cyber operations. And there's a dragnet out for tech-support scammers.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear how WannaCry ransomware became a pandemic over the weekend. Johannes Ulrich joins us to help sort it out. A temporary lull is feared likely to be more temporary than most would like. Baijiu espionage malware is spreading through GeoCities. Another APT—APT32—is also devoted to espionage, apparently in alignment with the government of Vietnam. Bin Laden's son is working to inspire lone wolves. National authorities seek to draw influence operations lessons from the concluded French presidential campaign. Armies make tactical use of cyber operations. And there's a dragnet out for tech-support scammers.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>944</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5c8abf9642d20d6600f5af27631ebe6d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2607772784.mp3?updated=1689814518" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>WannaCry ransomware spreads via ShadowBrokers' dumped exploit. Necurs delivers Jaff ransomware. Fancy Bear spoofs NATO emails. President Trump's Executive Order on cybersecurity.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/348/notes</link>
      <description>In today's podcast, we hear about the long-expected US Executive Order, with commentary from Politico's Eric Geller. It was signed yesterday, and gives prominence to the NIST Framework, DHS,and OMB. Eternal Blue is used to spread WannaCry ransomware, and the UK's NHS is hard hit. Fancy Bear prances in NATO costume. US Intelligence Community leaders warn the Senate that the Russian cyber threat is large, growing, and not going away. The University of Maryland's Jonathan Katz explains some potential browser protocol vulnerabilities. And spamming celebrates its thirty-ninth birthday—no happy returns for you, spammers.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 12 May 2017 19:10:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>348</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ac328672-def8-11ea-911f-a70e260b9eeb/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>WannaCry ransomware spreads via ShadowBrokers' dumped exploit. Necurs delivers Jaff ransomware. Fancy Bear spoofs NATO emails. President Trump's Executive Order on cybersecurity.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about the long-expected US Executive Order, with commentary from Politico's Eric Geller. It was signed yesterday, and gives prominence to the NIST Framework, DHS,and OMB. Eternal Blue is used to spread WannaCry ransomware, and the UK's NHS is hard hit. Fancy Bear prances in NATO costume. US Intelligence Community leaders warn the Senate that the Russian cyber threat is large, growing, and not going away. The University of Maryland's Jonathan Katz explains some potential browser protocol vulnerabilities. And spamming celebrates its thirty-ninth birthday—no happy returns for you, spammers.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about the long-expected US Executive Order, with commentary from Politico's Eric Geller. It was signed yesterday, and gives prominence to the NIST Framework, DHS,and OMB. Eternal Blue is used to spread WannaCry ransomware, and the UK's NHS is hard hit. Fancy Bear prances in NATO costume. US Intelligence Community leaders warn the Senate that the Russian cyber threat is large, growing, and not going away. The University of Maryland's Jonathan Katz explains some potential browser protocol vulnerabilities. And spamming celebrates its thirty-ninth birthday—no happy returns for you, spammers.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1286</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1ec9bf04d7ebb14d1457dc4ee85d822d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9528155451.mp3?updated=1608753348" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>French media recover from DDoS. XaverAd infests Android ecosystem. Zero-days patched, but exploited in the wild. Mother's day giftcard hacking. Telephonic harassment.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/347/notes</link>
      <description>In today's podcast, we hear that French media sites are recovering from a massive, successful DDoS attack whose source is still under investigation. Android adware harvests and reports PII. Microsoft's quick patching of zero-days included three that are being exploited in the wild by state and criminal actors.  Ben Yelin from UMD CHHS reviews the first 100 (cyber) days of President Trump. Ken Spinner from Varonis on their latest data risk report. Advice on Mother's Day gift cards, and some news about skids and harassing phone calls.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 11 May 2017 18:29:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>347</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ac445c08-def8-11ea-911f-c312e9ee09d1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>French media recover from DDoS. XaverAd infests Android ecosystem. Zero-days patched, but exploited in the wild. Mother's day giftcard hacking. Telephonic harassment.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that French media sites are recovering from a massive, successful DDoS attack whose source is still under investigation. Android adware harvests and reports PII. Microsoft's quick patching of zero-days included three that are being exploited in the wild by state and criminal actors.  Ben Yelin from UMD CHHS reviews the first 100 (cyber) days of President Trump. Ken Spinner from Varonis on their latest data risk report. Advice on Mother's Day gift cards, and some news about skids and harassing phone calls.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that French media sites are recovering from a massive, successful DDoS attack whose source is still under investigation. Android adware harvests and reports PII. Microsoft's quick patching of zero-days included three that are being exploited in the wild by state and criminal actors.  Ben Yelin from UMD CHHS reviews the first 100 (cyber) days of President Trump. Ken Spinner from Varonis on their latest data risk report. Advice on Mother's Day gift cards, and some news about skids and harassing phone calls.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>960</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f985392d9c0a4ac7373e4028cd63da62]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1946985108.mp3?updated=1689814466" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>NSA says it warned France of election influence ops. Deterrence and retaliatory capability. SLocky ransomware rising. Patch Tuesday. FBI Director Comey dismissed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/346/notes</link>
      <description>In today's podcast, we hear that NSA says it warned its French counterparts about Russian cyber ops targeting France's elections. Next up for Fancy Bear? Probably German elections, but in the meantime there's also some phishing with zero-days. The NSA Director also advocates calling out Russia for bad behavior in cyberspace, and says that US Cyber Command is ready and able to hold targets at risk, so deterrence and retaliation are available options. Microsoft, Adobe, and Cisco issued significant patches yesterday. Accenture Labs' Malek Ben Salem shares results from their security survey. Rohit Sethi from Security Compass outlines managing application security. And President Trump has told the FBI Director, "you're fired."
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 10 May 2017 19:47:55 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>346</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ac66cb76-def8-11ea-911f-bf5af1237c8e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>NSA says it warned France of election influence ops. Deterrence and retaliatory capability. SLocky ransomware rising. Patch Tuesday. FBI Director Comey dismissed.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that NSA says it warned its French counterparts about Russian cyber ops targeting France's elections. Next up for Fancy Bear? Probably German elections, but in the meantime there's also some phishing with zero-days. The NSA Director also advocates calling out Russia for bad behavior in cyberspace, and says that US Cyber Command is ready and able to hold targets at risk, so deterrence and retaliation are available options. Microsoft, Adobe, and Cisco issued significant patches yesterday. Accenture Labs' Malek Ben Salem shares results from their security survey. Rohit Sethi from Security Compass outlines managing application security. And President Trump has told the FBI Director, "you're fired."
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that NSA says it warned its French counterparts about Russian cyber ops targeting France's elections. Next up for Fancy Bear? Probably German elections, but in the meantime there's also some phishing with zero-days. The NSA Director also advocates calling out Russia for bad behavior in cyberspace, and says that US Cyber Command is ready and able to hold targets at risk, so deterrence and retaliation are available options. Microsoft, Adobe, and Cisco issued significant patches yesterday. Accenture Labs' Malek Ben Salem shares results from their security survey. Rohit Sethi from Security Compass outlines managing application security. And President Trump has told the FBI Director, "you're fired."</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>913</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6e99875c0dde9a6eb70c8f88024e6c1c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1356333411.mp3?updated=1689814451" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Metadata signs point to St. Petersburg in l'affaire Macron. UK, Germany, US expect more Russian election influence ops. New IoT botnet appears. US FCC sustains DDoS. Microsoft fixes MsMpEngine. SS7 weakness and 2FA.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/345/notes</link>
      <description>In today's podcast, we hear that haste may make for, not exactly waste, but at least brazen and ineffectual influence operations. Metadata evidence of Fancy Bears paws in En Marche! emails. Moscow snorts "false flags," but UK, German, and US officials say the Bears are there and up to no good. ISIS posts another bit of depravity as inspiration. North Korea is thought to be paying for its advanced weapons programs with cyber bank heists. Persirai joins Mirai in the IoT botnet world. The US FCC sustains a DDoS attack. Joe Carrigan from JHU explains the benefits of segmenting your home network. Andrew Blaich from Lookout on finding the Pegasus lawful intercept tool on Android devices. Microsoft patches an RCE flaw in its Malware Protection Engine. SS7 protocol weakness permits defeat of two-factor authentication.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 May 2017 19:19:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>345</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ac7a5be6-def8-11ea-911f-23873bf02c02/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Metadata signs point to St. Petersburg in l'affaire Macron. UK, Germany, US expect more Russian election influence ops. New IoT botnet appears. US FCC sustains DDoS. Microsoft fixes MsMpEngine. SS7 weakness and 2FA.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that haste may make for, not exactly waste, but at least brazen and ineffectual influence operations. Metadata evidence of Fancy Bears paws in En Marche! emails. Moscow snorts "false flags," but UK, German, and US officials say the Bears are there and up to no good. ISIS posts another bit of depravity as inspiration. North Korea is thought to be paying for its advanced weapons programs with cyber bank heists. Persirai joins Mirai in the IoT botnet world. The US FCC sustains a DDoS attack. Joe Carrigan from JHU explains the benefits of segmenting your home network. Andrew Blaich from Lookout on finding the Pegasus lawful intercept tool on Android devices. Microsoft patches an RCE flaw in its Malware Protection Engine. SS7 protocol weakness permits defeat of two-factor authentication.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that haste may make for, not exactly waste, but at least brazen and ineffectual influence operations. Metadata evidence of Fancy Bears paws in En Marche! emails. Moscow snorts "false flags," but UK, German, and US officials say the Bears are there and up to no good. ISIS posts another bit of depravity as inspiration. North Korea is thought to be paying for its advanced weapons programs with cyber bank heists. Persirai joins Mirai in the IoT botnet world. The US FCC sustains a DDoS attack. Joe Carrigan from JHU explains the benefits of segmenting your home network. Andrew Blaich from Lookout on finding the Pegasus lawful intercept tool on Android devices. Microsoft patches an RCE flaw in its Malware Protection Engine. SS7 protocol weakness permits defeat of two-factor authentication.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>954</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ccd61ea22ed3d9188a2d7042d86e51f9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6608105566.mp3?updated=1689814434" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Election cyber-influence campaign in France. (Will UK and Germany follow?) AMT bug to be fixed. HandBrake compromised. Kazuar upgrade for Snake. Ransomware black market.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/344/notes</link>
      <description>In today's podcast, we discuss Emmanuel Macron's victory in France's presidential election despite last-minute hacking and leaked emails. (Hacked emails seem not particularly scandalous as the story develops.) Germany and the UK brace for cyberespionage in their own upcoming elections. Intel AMT flaw more serious than expected, will get fixes this week. HandBrake download server proved RAT-infested. Kazuar looks like an Uroburos upgrade. Emily Wilson from Terbium Labs weighs in on Op Israel. Ransomware market features FrozrLock and Fatboy.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 08 May 2017 20:43:15 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>344</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ac97a854-def8-11ea-911f-4f4bada4e06f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Election cyber-influence campaign in France. (Will UK and Germany follow?) AMT bug to be fixed. HandBrake compromised. Kazuar upgrade for Snake. Ransomware black market.</itunes:subtitle>
      <itunes:summary>In today's podcast, we discuss Emmanuel Macron's victory in France's presidential election despite last-minute hacking and leaked emails. (Hacked emails seem not particularly scandalous as the story develops.) Germany and the UK brace for cyberespionage in their own upcoming elections. Intel AMT flaw more serious than expected, will get fixes this week. HandBrake download server proved RAT-infested. Kazuar looks like an Uroburos upgrade. Emily Wilson from Terbium Labs weighs in on Op Israel. Ransomware market features FrozrLock and Fatboy.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we discuss Emmanuel Macron's victory in France's presidential election despite last-minute hacking and leaked emails. (Hacked emails seem not particularly scandalous as the story develops.) Germany and the UK brace for cyberespionage in their own upcoming elections. Intel AMT flaw more serious than expected, will get fixes this week. HandBrake download server proved RAT-infested. Kazuar looks like an Uroburos upgrade. Emily Wilson from Terbium Labs weighs in on Op Israel. Ransomware market features FrozrLock and Fatboy.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>837</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0b7341f108b36fb17aaded926a87de00]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5106035687.mp3?updated=1689814411" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Influence operations and elections, and the difficulty of doing anything about them. Dynamite phishing investigation. Snake hisses at Macs. Fatboy at your (criminal) service.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/343/notes</link>
      <description>In today's podcast we hear about elections and election influence operations in Europe, and the difficulty of taming Fancy Bear. Some weekend reading. The Google Docs worm and dynamite phishing incident takes an odd (but implausible) turn. Snake malware seems poised to strike at Mac users. We welcome Johannes Ulrich from SANS and the Internet Stormcenter Podcast. Allan Liska outlines his book on ransomware. And there's a new product in the crimeware-as-a-service souk: it's called "Fatboy," it speaks Russian, and yes, it's ransomware.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 05 May 2017 18:54:52 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>343</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/acac5056-def8-11ea-911f-a773da295f2e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Influence operations and elections, and the difficulty of doing anything about them. Dynamite phishing investigation. Snake hisses at Macs. Fatboy at your (criminal) service.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about elections and election influence operations in Europe, and the difficulty of taming Fancy Bear. Some weekend reading. The Google Docs worm and dynamite phishing incident takes an odd (but implausible) turn. Snake malware seems poised to strike at Mac users. We welcome Johannes Ulrich from SANS and the Internet Stormcenter Podcast. Allan Liska outlines his book on ransomware. And there's a new product in the crimeware-as-a-service souk: it's called "Fatboy," it speaks Russian, and yes, it's ransomware.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about elections and election influence operations in Europe, and the difficulty of taming Fancy Bear. Some weekend reading. The Google Docs worm and dynamite phishing incident takes an odd (but implausible) turn. Snake malware seems poised to strike at Mac users. We welcome Johannes Ulrich from SANS and the Internet Stormcenter Podcast. Allan Liska outlines his book on ransomware. And there's a new product in the crimeware-as-a-service souk: it's called "Fatboy," it speaks Russian, and yes, it's ransomware.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1253</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[12102ae546ba6734bdc6e37c11d62a80]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6391073954.mp3?updated=1608753341" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Phishing with a big worm (and other lures). Botnet mining cryptocurrency. Blackmoon upgraded. Aadhaar troubles in India. Passwords, security questions, and Grand Moff Tarkin's CISO.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/342/notes</link>
      <description>In today's podcast, we hear about how OAuth abuse rushed a worm around Google Docs, and how the good guys swiftly contained the attack. Bondnet discovered mining cryptocurrency. The Blackmoon financial malware gets an upgrade. Carbanak is still out there, trickier than ever. No-phishing season at Gannett. India's national biometric ID system runs into security and legal trouble. Rick Howard from Palo Alto Networks previews the Cyber Canon awards ceremony. Andrew Chanin describes the upcoming Cyber Investing Summit. And reflections on passwords yesterday, today, and tomorrow, both here on earth and in a galaxy far, far away.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 04 May 2017 19:01:08 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>342</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/accaeb38-def8-11ea-911f-83a645a665dd/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Phishing with a big worm (and other lures). Botnet mining cryptocurrency. Blackmoon upgraded. Aadhaar troubles in India. Passwords, security questions, and Grand Moff Tarkin's CISO.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how OAuth abuse rushed a worm around Google Docs, and how the good guys swiftly contained the attack. Bondnet discovered mining cryptocurrency. The Blackmoon financial malware gets an upgrade. Carbanak is still out there, trickier than ever. No-phishing season at Gannett. India's national biometric ID system runs into security and legal trouble. Rick Howard from Palo Alto Networks previews the Cyber Canon awards ceremony. Andrew Chanin describes the upcoming Cyber Investing Summit. And reflections on passwords yesterday, today, and tomorrow, both here on earth and in a galaxy far, far away.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how OAuth abuse rushed a worm around Google Docs, and how the good guys swiftly contained the attack. Bondnet discovered mining cryptocurrency. The Blackmoon financial malware gets an upgrade. Carbanak is still out there, trickier than ever. No-phishing season at Gannett. India's national biometric ID system runs into security and legal trouble. Rick Howard from Palo Alto Networks previews the Cyber Canon awards ceremony. Andrew Chanin describes the upcoming Cyber Investing Summit. And reflections on passwords yesterday, today, and tomorrow, both here on earth and in a galaxy far, far away.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>964</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c9e5716b1a8068146f8d7005440364d7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1051193522.mp3?updated=1689814383" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shamoon update. Sabre discloses possible breach to SEC. Mobile device and VPN threats and vulnerabilities. Information operations and cyberespionage.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/341/notes</link>
      <description>In today's podcast we hear that Shamoon's Trojan servant seems to have got a new comms channel. Sabre discloses possible breach: hospitality and travel sectors affected. Some more things to worry about: ultrasonic beaconing, SIM card fraud, VPN privilege escalation, and another bad app in the PlayStore. (But you can fix all these.) Governments look to social media restrictions to control hate speech and fake news. (Social media providers look to human curation and the blockchain for help.) Level 3's Dale Drew describes the evolution they're seeing in botnets. Tripwire's Craig Young shares his research on hacking smart TVs. Cyberespionage and influence updates, from Washington to Seoul.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 03 May 2017 19:30:12 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>341</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/acfb0692-def8-11ea-911f-b7f057d63fe2/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Shamoon update. Sabre discloses possible breach to SEC. Mobile device and VPN threats and vulnerabilities. Information operations and cyberespionage.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Shamoon's Trojan servant seems to have got a new comms channel. Sabre discloses possible breach: hospitality and travel sectors affected. Some more things to worry about: ultrasonic beaconing, SIM card fraud, VPN privilege escalation, and another bad app in the PlayStore. (But you can fix all these.) Governments look to social media restrictions to control hate speech and fake news. (Social media providers look to human curation and the blockchain for help.) Level 3's Dale Drew describes the evolution they're seeing in botnets. Tripwire's Craig Young shares his research on hacking smart TVs. Cyberespionage and influence updates, from Washington to Seoul.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Shamoon's Trojan servant seems to have got a new comms channel. Sabre discloses possible breach: hospitality and travel sectors affected. Some more things to worry about: ultrasonic beaconing, SIM card fraud, VPN privilege escalation, and another bad app in the PlayStore. (But you can fix all these.) Governments look to social media restrictions to control hate speech and fake news. (Social media providers look to human curation and the blockchain for help.) Level 3's Dale Drew describes the evolution they're seeing in botnets. Tripwire's Craig Young shares his research on hacking smart TVs. Cyberespionage and influence updates, from Washington to Seoul.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>948</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fbf70f75aebee144c76178ef6ec96873]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2991235691.mp3?updated=1689800200" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>IBM, Apple, and Intel all fix vulnerabilities and block threats. Neustar's DDoS report. Updates on the DarkOverlord and (separately) LizardSquad. Info ops and what they're after.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/340/notes</link>
      <description>In today's podcast we hear that Trojanized USB sticks are out in the wild. So are phishing emails complete with backdoors and spyware payloads. Intel reports (and mitigates) a major firmware vulnerability in Core processors. The DarkOverlord and third-party risk. ShadowWali backdoors afflict Japanese enterprises. The LizardSquad may be back, but you still shouldn't listen to them, still less pay them protection. Neustar looks at DDoS trends. Ben Yelin from the UMD Center for Health and Homeland Security explains tractor hacking. Nehemiah Security's Paul Farrell thinks we need to mind the security basics. And do info ops heighten the contradictions? 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 May 2017 18:58:55 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>340</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ad0c5bd6-def8-11ea-911f-9ba0df461591/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>IBM, Apple, and Intel all fix vulnerabilities and block threats. Neustar's DDoS report. Updates on the DarkOverlord and (separately) LizardSquad. Info ops and what they're after.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Trojanized USB sticks are out in the wild. So are phishing emails complete with backdoors and spyware payloads. Intel reports (and mitigates) a major firmware vulnerability in Core processors. The DarkOverlord and third-party risk. ShadowWali backdoors afflict Japanese enterprises. The LizardSquad may be back, but you still shouldn't listen to them, still less pay them protection. Neustar looks at DDoS trends. Ben Yelin from the UMD Center for Health and Homeland Security explains tractor hacking. Nehemiah Security's Paul Farrell thinks we need to mind the security basics. And do info ops heighten the contradictions? 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Trojanized USB sticks are out in the wild. So are phishing emails complete with backdoors and spyware payloads. Intel reports (and mitigates) a major firmware vulnerability in Core processors. The DarkOverlord and third-party risk. ShadowWali backdoors afflict Japanese enterprises. The LizardSquad may be back, but you still shouldn't listen to them, still less pay them protection. Neustar looks at DDoS trends. Ben Yelin from the UMD Center for Health and Homeland Security explains tractor hacking. Nehemiah Security's Paul Farrell thinks we need to mind the security basics. And do info ops heighten the contradictions? </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>969</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d98f45c429646e90bd9cc64fb6f78bdb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5041248863.mp3?updated=1689800181" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>NSA changes collection policy in a privacy-friendly direction. Latest Vault7 leaks look anodyne. Election influence concerns in Europe and the US. Blocking social media. DarkOverlord returns with extortion caper.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/339/notes</link>
      <description>In today's podcast, we hear how the NSA is revising its interpretation of Section 702 collection, to the general approval of privacy advocates. WikiLeaks drops another alleged tool from Vault7—this one looks like garden-variety data-loss-prevention beaconing. The UK and France are on alert for influence operations, and the US Congress takes testimony on such marketing-in-battledress. South and Southwest Asian governments move to block or censor social media. Prof. Awais Rashid from Lancaster University describes some of the risks of the cloud. The DarkOverlord returns, extorting TV and movie content owners over shows stolen from a third-party post-production company.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 01 May 2017 18:52:42 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>339</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ad22432e-def8-11ea-911f-3f87502bc4a2/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>NSA changes collection policy in a privacy-friendly direction. Latest Vault7 leaks look anodyne. Election influence concerns in Europe and the US. Blocking social media. DarkOverlord returns with extortion caper.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear how the NSA is revising its interpretation of Section 702 collection, to the general approval of privacy advocates. WikiLeaks drops another alleged tool from Vault7—this one looks like garden-variety data-loss-prevention beaconing. The UK and France are on alert for influence operations, and the US Congress takes testimony on such marketing-in-battledress. South and Southwest Asian governments move to block or censor social media. Prof. Awais Rashid from Lancaster University describes some of the risks of the cloud. The DarkOverlord returns, extorting TV and movie content owners over shows stolen from a third-party post-production company.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear how the NSA is revising its interpretation of Section 702 collection, to the general approval of privacy advocates. WikiLeaks drops another alleged tool from Vault7—this one looks like garden-variety data-loss-prevention beaconing. The UK and France are on alert for influence operations, and the US Congress takes testimony on such marketing-in-battledress. South and Southwest Asian governments move to block or censor social media. Prof. Awais Rashid from Lancaster University describes some of the risks of the cloud. The DarkOverlord returns, extorting TV and movie content owners over shows stolen from a third-party post-production company.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>857</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d31173987e2b7dbea11f2b0a92c9879d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3538497404.mp3?updated=1689800178" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>OilRig fingered as Iranian state-sponsored group behind attempted hacks of Israeli targets. Shamoon still under the same management. Botnet wars in the IoT. Countermessaging, hopes of missile hacks, and more. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/338/notes</link>
      <description>In today's podcast, we hear that researchers have named the hitherto unnamed country that attempted to hack Israeli targets. Other researchers conclude Shamoon is still under the same management. Roles and missions dispute among Israeli security organizations. Peter Galvin from Thales takes a look at data security in the US Federal sector. VA Tech's Dr. Charles Clancy explains the pros and cons of 5G mobile technology. Financial malware vector startles phishing victims into clicking. Vigilante botnets are not helping the IoT. Countermessaging is still not as easy as it looks. And there's a lot of thinly sourced hope about hacking North Korean missiles.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 28 Apr 2017 17:27:04 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>338</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ad3854ac-def8-11ea-911f-c301d7a809fb/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>OilRig fingered as Iranian state-sponsored group behind attempted hacks of Israeli targets. Shamoon still under the same management. Botnet wars in the IoT. Countermessaging, hopes of missile hacks, and more. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that researchers have named the hitherto unnamed country that attempted to hack Israeli targets. Other researchers conclude Shamoon is still under the same management. Roles and missions dispute among Israeli security organizations. Peter Galvin from Thales takes a look at data security in the US Federal sector. VA Tech's Dr. Charles Clancy explains the pros and cons of 5G mobile technology. Financial malware vector startles phishing victims into clicking. Vigilante botnets are not helping the IoT. Countermessaging is still not as easy as it looks. And there's a lot of thinly sourced hope about hacking North Korean missiles.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that researchers have named the hitherto unnamed country that attempted to hack Israeli targets. Other researchers conclude Shamoon is still under the same management. Roles and missions dispute among Israeli security organizations. Peter Galvin from Thales takes a look at data security in the US Federal sector. VA Tech's Dr. Charles Clancy explains the pros and cons of 5G mobile technology. Financial malware vector startles phishing victims into clicking. Vigilante botnets are not helping the IoT. Countermessaging is still not as easy as it looks. And there's a lot of thinly sourced hope about hacking North Korean missiles.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1194</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c375225ead314ffb5e39cfbc41289e37]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6790966261.mp3?updated=1608753452" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fancy Bear in France (and in Germany, too). Israel debates Cyber Authority's charter. Sudan says its using Electronic Jihad against ISIS. Verizon, Symantec threat reports out. Adware campaigns.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/337/notes</link>
      <description>In today's podcast, we hear about the bear tracks analysts are seeing  in Macron's campaign for France's presidency. (They're also appearing in German political parties' think tanks.) Cyber gangs continue to pore over ShadowBrokers' leaks. Verizon and Samsung threat reports see ransomware and nation-state espionage as the trending issues. Amid debate over cyber authorities, Israel says it detected and stopped a major attack. Palo Alto Networks' Rick Howard outlines a new white paper on credential theft. Ellison Anne Williams from Enveil describes their innovation in encryption. Adware infests online markets through spam and Trojanized apps.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 27 Apr 2017 18:18:49 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>337</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ad4ee0dc-def8-11ea-911f-1b99cbe4b9c6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fancy Bear in France (and in Germany, too). Israel debates Cyber Authority's charter. Sudan says its using Electronic Jihad against ISIS. Verizon, Symantec threat reports out. Adware campaigns.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about the bear tracks analysts are seeing  in Macron's campaign for France's presidency. (They're also appearing in German political parties' think tanks.) Cyber gangs continue to pore over ShadowBrokers' leaks. Verizon and Samsung threat reports see ransomware and nation-state espionage as the trending issues. Amid debate over cyber authorities, Israel says it detected and stopped a major attack. Palo Alto Networks' Rick Howard outlines a new white paper on credential theft. Ellison Anne Williams from Enveil describes their innovation in encryption. Adware infests online markets through spam and Trojanized apps.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about the bear tracks analysts are seeing  in Macron's campaign for France's presidency. (They're also appearing in German political parties' think tanks.) Cyber gangs continue to pore over ShadowBrokers' leaks. Verizon and Samsung threat reports see ransomware and nation-state espionage as the trending issues. Amid debate over cyber authorities, Israel says it detected and stopped a major attack. Palo Alto Networks' Rick Howard outlines a new white paper on credential theft. Ellison Anne Williams from Enveil describes their innovation in encryption. Adware infests online markets through spam and Trojanized apps.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>929</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7e379250e19ee00182818641425bf76]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2268989560.mp3?updated=1689800116" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Elections, influence operations, and hacking. How clever phishing succeeds. Chipotle's point-of-sale breach. Hacking in Fast and Furious 8.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/336/notes</link>
      <description>In today's podcast, we follow the story of Fancy Bear (a.k.a. Pawn Storm, a.k.a. APT28) and France's elections. Why clever phishing continues to succeed, and what's up with 0Auth abuse. Information operations distinguished from simple "hacking." Another point-of-sale compromise suggests identity management issues. The University of Maryland's Jonathan Katz explains a JSON encryption vulnerability. Stan Black from Citrix explains the pros and cons of the IoT. And can hackers really blow up a submarine by driving their car fast and furiously? You be the judge.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 26 Apr 2017 16:09:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>336</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ad65a3da-def8-11ea-911f-43d76e2dc4eb/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Elections, influence operations, and hacking. How clever phishing succeeds. Chipotle's point-of-sale breach. Hacking in Fast and Furious 8.</itunes:subtitle>
      <itunes:summary>In today's podcast, we follow the story of Fancy Bear (a.k.a. Pawn Storm, a.k.a. APT28) and France's elections. Why clever phishing continues to succeed, and what's up with 0Auth abuse. Information operations distinguished from simple "hacking." Another point-of-sale compromise suggests identity management issues. The University of Maryland's Jonathan Katz explains a JSON encryption vulnerability. Stan Black from Citrix explains the pros and cons of the IoT. And can hackers really blow up a submarine by driving their car fast and furiously? You be the judge.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we follow the story of Fancy Bear (a.k.a. Pawn Storm, a.k.a. APT28) and France's elections. Why clever phishing continues to succeed, and what's up with 0Auth abuse. Information operations distinguished from simple "hacking." Another point-of-sale compromise suggests identity management issues. The University of Maryland's Jonathan Katz explains a JSON encryption vulnerability. Stan Black from Citrix explains the pros and cons of the IoT. And can hackers really blow up a submarine by driving their car fast and furiously? You be the judge.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>933</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[55458c5736cf66b0d9cfe7ef34373847]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9578107144.mp3?updated=1689800102" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fancy Bear spotted in France, Denmark, and maybe Bulgaria. Tensions mount around North Korean weapon programs. Power grid fragility. Milkydoor in the PlayStore. AV misunderstanding. Kelihos indictment. Ashley Madison blackmail.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/335/notes</link>
      <description>In today's podcast, we hear that Fancy Bear has as expected been spotted snuffling around the French Presidential election. Denmark and Bulgaria also report bearish activity. Sino-US pressure on North Korea may foreshadow an uptick in the cyber op-tempo. Power failures prompt worries about the grid's fragility. Milkydoor's Trojanized Android apps pose a BYOD threat to businesses. Webroot is fixing its AV misunderstanding with Windows. Alleged Kelihos botnet master indicted. Webroot's David Dufour discusses IoT supply chain challenges. Eric Burger describes the 2017 Borderless Cyber conference. And another Ashley Madison extortion caper surfaces.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Apr 2017 18:26:47 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>335</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ad75551e-def8-11ea-911f-3fe914e3d4ee/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fancy Bear spotted in France, Denmark, and maybe Bulgaria. Tensions mount around North Korean weapon programs. Power grid fragility. Milkydoor in the PlayStore. AV misunderstanding. Kelihos indictment. Ashley Madison blackmail.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Fancy Bear has as expected been spotted snuffling around the French Presidential election. Denmark and Bulgaria also report bearish activity. Sino-US pressure on North Korea may foreshadow an uptick in the cyber op-tempo. Power failures prompt worries about the grid's fragility. Milkydoor's Trojanized Android apps pose a BYOD threat to businesses. Webroot is fixing its AV misunderstanding with Windows. Alleged Kelihos botnet master indicted. Webroot's David Dufour discusses IoT supply chain challenges. Eric Burger describes the 2017 Borderless Cyber conference. And another Ashley Madison extortion caper surfaces.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Fancy Bear has as expected been spotted snuffling around the French Presidential election. Denmark and Bulgaria also report bearish activity. Sino-US pressure on North Korea may foreshadow an uptick in the cyber op-tempo. Power failures prompt worries about the grid's fragility. Milkydoor's Trojanized Android apps pose a BYOD threat to businesses. Webroot is fixing its AV misunderstanding with Windows. Alleged Kelihos botnet master indicted. Webroot's David Dufour discusses IoT supply chain challenges. Eric Burger describes the 2017 Borderless Cyber conference. And another Ashley Madison extortion caper surfaces.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>965</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5eed66130ad73f93ae9a176d6ff81450]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3172473704.mp3?updated=1689800091" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Nation-state tensions in cyberspace over North Korean threats and presumably Russian cyberespionage. Locky returns. More pharma spam. Seleznev gets 27 years for carding.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/334/notes</link>
      <description>In today's podcast we hear that cyberattack worries mount with international tensions over North Korea. France's first-round presidential elections conclude with two outsiders headed for the finals. WikiLeaks' and ShadowBrokers' leaks find their way into the criminal wild. US shows renewed interest in prosecuting WikiLeaks' Assange. Locky ransomware is back from the dead. SMSVova spyware kicked out of the PlayStore. More Canadian pharma spam. Emily Wilson from Terbium labs describes the unintended consequences of "spectacle" attacks. Seleznev gets 27 years for carding. And notes on some less-than-fully-successful criminals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 24 Apr 2017 16:47:51 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>334</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ad8a2b06-def8-11ea-911f-2f25de10f86c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Nation-state tensions in cyberspace over North Korean threats and presumably Russian cyberespionage. Locky returns. More pharma spam. Seleznev gets 27 years for carding.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that cyberattack worries mount with international tensions over North Korea. France's first-round presidential elections conclude with two outsiders headed for the finals. WikiLeaks' and ShadowBrokers' leaks find their way into the criminal wild. US shows renewed interest in prosecuting WikiLeaks' Assange. Locky ransomware is back from the dead. SMSVova spyware kicked out of the PlayStore. More Canadian pharma spam. Emily Wilson from Terbium labs describes the unintended consequences of "spectacle" attacks. Seleznev gets 27 years for carding. And notes on some less-than-fully-successful criminals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that cyberattack worries mount with international tensions over North Korea. France's first-round presidential elections conclude with two outsiders headed for the finals. WikiLeaks' and ShadowBrokers' leaks find their way into the criminal wild. US shows renewed interest in prosecuting WikiLeaks' Assange. Locky ransomware is back from the dead. SMSVova spyware kicked out of the PlayStore. More Canadian pharma spam. Emily Wilson from Terbium labs describes the unintended consequences of "spectacle" attacks. Seleznev gets 27 years for carding. And notes on some less-than-fully-successful criminals.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>947</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a47b0954f606f5f0ceb49ca2d59b180d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6962179768.mp3?updated=1689800088" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>States and gangs. Insider threats and mole hunts. The misguided vigilante behind BrikerBot. Hollywood hacks. Not a Nigerian prince this time, just the Director General of the National Intelligence Agency.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/333/notes</link>
      <description>In today's podcast we hear that cyber gangs are busily at work reverse-engineering the last ShadowBrokers' document dump. But the Russian ones at least are probably getting some state help. Insider threats and mole hunts. BrickerBot's author plays a dangerous vigilante game—operating technology may be particularly at risk. Hollywood's best depictions of hacking. Ben Yelin describes a weaponized animated GIF. Carson Sweet from CloudPassage on government requests that providers turn over emails and lagging legislation. And there are forty-three million dollars in a Nigerian apartment. No, really—forty-three million in cash.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 21 Apr 2017 16:24:16 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>333</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ada3df88-def8-11ea-911f-6b30f93a8f2b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>States and gangs. Insider threats and mole hunts. The misguided vigilante behind BrikerBot. Hollywood hacks. Not a Nigerian prince this time, just the Director General of the National Intelligence Agency.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that cyber gangs are busily at work reverse-engineering the last ShadowBrokers' document dump. But the Russian ones at least are probably getting some state help. Insider threats and mole hunts. BrickerBot's author plays a dangerous vigilante game—operating technology may be particularly at risk. Hollywood's best depictions of hacking. Ben Yelin describes a weaponized animated GIF. Carson Sweet from CloudPassage on government requests that providers turn over emails and lagging legislation. And there are forty-three million dollars in a Nigerian apartment. No, really—forty-three million in cash.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that cyber gangs are busily at work reverse-engineering the last ShadowBrokers' document dump. But the Russian ones at least are probably getting some state help. Insider threats and mole hunts. BrickerBot's author plays a dangerous vigilante game—operating technology may be particularly at risk. Hollywood's best depictions of hacking. Ben Yelin describes a weaponized animated GIF. Carson Sweet from CloudPassage on government requests that providers turn over emails and lagging legislation. And there are forty-three million dollars in a Nigerian apartment. No, really—forty-three million in cash.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1271</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ade4917f318a2f266ee558bdbdcfe82e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4439604456.mp3?updated=1608753346" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Trojanized apps in the PlayStore. How cybergangs talk, cooperate, and improve their game. More troubles reported for Tanium.  A Chicago lawsuit brings privacy issues to the fore.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/332/notes</link>
      <description>In today's podcast we hear about snakes in the PlayStore's walled garden (one of them with a helpful flashlight, and another one with a plumber's cap and a mustache, which must look pretty odd on a serpent). A look at how cyber gangs communicate—they do it a lot like the rest of us. Source code distribution and the jokers who make annoying use of it. More troubling reports about an IPO-ready unicorn. The Johns Hopkins University’s Joe Carrigan explains limitations of fingerprint scanners. Amit Rahav from Secret Double Octopus describes innovations in authentication. Plus, what information do your products collect about you? And how do you know what the vendors are doing with it?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 20 Apr 2017 20:30:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>332</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/adb98518-def8-11ea-911f-cb1a5457d43f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Trojanized apps in the PlayStore. How cybergangs talk, cooperate, and improve their game. More troubles reported for Tanium.  A Chicago lawsuit brings privacy issues to the fore.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about snakes in the PlayStore's walled garden (one of them with a helpful flashlight, and another one with a plumber's cap and a mustache, which must look pretty odd on a serpent). A look at how cyber gangs communicate—they do it a lot like the rest of us. Source code distribution and the jokers who make annoying use of it. More troubling reports about an IPO-ready unicorn. The Johns Hopkins University’s Joe Carrigan explains limitations of fingerprint scanners. Amit Rahav from Secret Double Octopus describes innovations in authentication. Plus, what information do your products collect about you? And how do you know what the vendors are doing with it?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about snakes in the PlayStore's walled garden (one of them with a helpful flashlight, and another one with a plumber's cap and a mustache, which must look pretty odd on a serpent). A look at how cyber gangs communicate—they do it a lot like the rest of us. Source code distribution and the jokers who make annoying use of it. More troubling reports about an IPO-ready unicorn. The Johns Hopkins University’s Joe Carrigan explains limitations of fingerprint scanners. Amit Rahav from Secret Double Octopus describes innovations in authentication. Plus, what information do your products collect about you? And how do you know what the vendors are doing with it?</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>982</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[82f91cff5bfc6b89f5e8ff3db30c6bd5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1146979184.mp3?updated=1689800033" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Vigilantes in the IoT. Bad actors find a friend in the ShadowBrokers. BankBot is back in the PlayStore. Pixel-tracking for target recon. A very big Oracle patch.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/331/notes</link>
      <description>In today's podcast we hear about a new vigilante in the IoT—Hajime—and learn that the security industry doesn't think much of vigilantes. Observers pore over the most recent ShadowBrokers' files and don't like what they see, even though most of the more dangerous exploits have been patched. Still no word on how the ShadowBrokers got their wares, or where WikiLeaks got the contents of Vault 7. BankBot is back in the PlayStore with Trojanized video apps. Attackers are seen using pixel-tracking for target recon. AsTech’s Greg Reber outlines cyber M&amp;A due diligence. Lancaster University’s Awais Rashid describes their effort to assemble a cyber security body of knowledge. And Oracle issues a very big patch.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 19 Apr 2017 19:01:12 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>331</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/add61796-def8-11ea-911f-fbf3b6b88599/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Vigilantes in the IoT. Bad actors find a friend in the ShadowBrokers. BankBot is back in the PlayStore. Pixel-tracking for target recon. A very big Oracle patch.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about a new vigilante in the IoT—Hajime—and learn that the security industry doesn't think much of vigilantes. Observers pore over the most recent ShadowBrokers' files and don't like what they see, even though most of the more dangerous exploits have been patched. Still no word on how the ShadowBrokers got their wares, or where WikiLeaks got the contents of Vault 7. BankBot is back in the PlayStore with Trojanized video apps. Attackers are seen using pixel-tracking for target recon. AsTech’s Greg Reber outlines cyber M&amp;A due diligence. Lancaster University’s Awais Rashid describes their effort to assemble a cyber security body of knowledge. And Oracle issues a very big patch.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about a new vigilante in the IoT—Hajime—and learn that the security industry doesn't think much of vigilantes. Observers pore over the most recent ShadowBrokers' files and don't like what they see, even though most of the more dangerous exploits have been patched. Still no word on how the ShadowBrokers got their wares, or where WikiLeaks got the contents of Vault 7. BankBot is back in the PlayStore with Trojanized video apps. Attackers are seen using pixel-tracking for target recon. AsTech’s Greg Reber outlines cyber M&amp;A due diligence. Lancaster University’s Awais Rashid describes their effort to assemble a cyber security body of knowledge. And Oracle issues a very big patch.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>970</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6fa76839f0f0be89ea8fdc24d3f478ba]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8337028100.mp3?updated=1689800020" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Karmen in the black market. Homograph vulnerabilities. Vault 7 and ShadowBrokers updates. Hacks and missiles. Competing for botnets.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/330/notes</link>
      <description>In today's podcast, we hear about a newish ransomware strain, Karmen, hitting the low-end ransomware-as-a-service market. Homograph vulnerability proof-of-concept revealed. Jihadist infosec service advises good cyber hygiene for terrorists post-Vault 7. The ShadowBrokers try to drag a red herring—actually a bad frog—across their tracks. Hopeful speculation continues that the US hacked North Korea's missile test last weekend. Hajime malware is competing with MIrai for bots, although to what end is unclear. Dr. Charles Clancy from VA Tech’s Hume Center contrasts Vault-7 vs. the Shadowbrokers. Bill Anderson from OptioLabs outlines battlefield mobile device security. And you're not going to get rich by using security cameras to mine Bitcoin.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Apr 2017 18:58:09 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>330</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ade57f24-def8-11ea-911f-bb222d305ce5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Karmen in the black market. Homograph vulnerabilities. Vault 7 and ShadowBrokers updates. Hacks and missiles. Competing for botnets.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about a newish ransomware strain, Karmen, hitting the low-end ransomware-as-a-service market. Homograph vulnerability proof-of-concept revealed. Jihadist infosec service advises good cyber hygiene for terrorists post-Vault 7. The ShadowBrokers try to drag a red herring—actually a bad frog—across their tracks. Hopeful speculation continues that the US hacked North Korea's missile test last weekend. Hajime malware is competing with MIrai for bots, although to what end is unclear. Dr. Charles Clancy from VA Tech’s Hume Center contrasts Vault-7 vs. the Shadowbrokers. Bill Anderson from OptioLabs outlines battlefield mobile device security. And you're not going to get rich by using security cameras to mine Bitcoin.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about a newish ransomware strain, Karmen, hitting the low-end ransomware-as-a-service market. Homograph vulnerability proof-of-concept revealed. Jihadist infosec service advises good cyber hygiene for terrorists post-Vault 7. The ShadowBrokers try to drag a red herring—actually a bad frog—across their tracks. Hopeful speculation continues that the US hacked North Korea's missile test last weekend. Hajime malware is competing with MIrai for bots, although to what end is unclear. Dr. Charles Clancy from VA Tech’s Hume Center contrasts Vault-7 vs. the Shadowbrokers. Bill Anderson from OptioLabs outlines battlefield mobile device security. And you're not going to get rich by using security cameras to mine Bitcoin.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>979</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c034a322575b26b3f00387e0f7859750]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2868013948.mp3?updated=1689814368" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Missiles and malware? ShadowBrokers' leaks examined. Syrian info ops. ISIS recruits women for martyrdom. Ransomware, medical device vulnerability updates. Troubled unicorn?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/329/notes</link>
      <description>In today's podcast, we hear about a big missile fizzle on Pyongyang's Day of the Sun yesterday—there's hopeful but a priori speculation of a cyber op against North Korea's nuclear strike R&amp;D program. Friday's ShadowBrokers' leaks suggest financial service, industrial IoT vulnerabilities. Syrian regime calls hoax on nerve gas attack claims (informed observers are unconvinced). How ISIS recruits women for martyrdom operations. Ransomware update. Medical device makers might learn from mobile device makers. Rick Howard from Palo Alto Networks ponders the first principle of automotive security. And clouds gather over a security unicorn.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 17 Apr 2017 18:40:14 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>329</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/adffb8a8-def8-11ea-911f-fb932de27b24/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Missiles and malware? ShadowBrokers' leaks examined. Syrian info ops. ISIS recruits women for martyrdom. Ransomware, medical device vulnerability updates. Troubled unicorn?</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about a big missile fizzle on Pyongyang's Day of the Sun yesterday—there's hopeful but a priori speculation of a cyber op against North Korea's nuclear strike R&amp;D program. Friday's ShadowBrokers' leaks suggest financial service, industrial IoT vulnerabilities. Syrian regime calls hoax on nerve gas attack claims (informed observers are unconvinced). How ISIS recruits women for martyrdom operations. Ransomware update. Medical device makers might learn from mobile device makers. Rick Howard from Palo Alto Networks ponders the first principle of automotive security. And clouds gather over a security unicorn.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about a big missile fizzle on Pyongyang's Day of the Sun yesterday—there's hopeful but a priori speculation of a cyber op against North Korea's nuclear strike R&amp;D program. Friday's ShadowBrokers' leaks suggest financial service, industrial IoT vulnerabilities. Syrian regime calls hoax on nerve gas attack claims (informed observers are unconvinced). How ISIS recruits women for martyrdom operations. Ransomware update. Medical device makers might learn from mobile device makers. Rick Howard from Palo Alto Networks ponders the first principle of automotive security. And clouds gather over a security unicorn.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>893</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[07833608057530d944b5a7b89b81d37e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9044328666.mp3?updated=1689799980" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>ShadowBrokers frustrated with the peoples. Callisto Group was active against UK Foreign Office. US DCI denounces WikiLeaks as a hostile intelligence service. Surveillance vendors said willing to deal with pariah regimes. Weaponized memes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/328/notes</link>
      <description>In today's podcast, we hear that the ShadowBrokers are fed up with all of you peoples. The Callisto Group spearphised the UK's Foreign Office last year. The US DCI calls out WikiLeaks as a hostile intelligence service. Lawful intercept shops alleged to be willing to deal with pariah regimes. University of Maryland’s Jonathan Katz discusses Google’s unfulfilled promise of end-to-end encryption in gmail. Ajit Sancheti from Preempt Security explains the tension between security and human nature.  NATO insiders would like to see the Atlantic Alliance weaponized memes.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 14 Apr 2017 18:35:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>328</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ae1492e6-def8-11ea-911f-ff0fe24475d1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>ShadowBrokers frustrated with the peoples. Callisto Group was active against UK Foreign Office. US DCI denounces WikiLeaks as a hostile intelligence service. Surveillance vendors said willing to deal with pariah regimes. Weaponized memes.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that the ShadowBrokers are fed up with all of you peoples. The Callisto Group spearphised the UK's Foreign Office last year. The US DCI calls out WikiLeaks as a hostile intelligence service. Lawful intercept shops alleged to be willing to deal with pariah regimes. University of Maryland’s Jonathan Katz discusses Google’s unfulfilled promise of end-to-end encryption in gmail. Ajit Sancheti from Preempt Security explains the tension between security and human nature.  NATO insiders would like to see the Atlantic Alliance weaponized memes.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that the ShadowBrokers are fed up with all of you peoples. The Callisto Group spearphised the UK's Foreign Office last year. The US DCI calls out WikiLeaks as a hostile intelligence service. Lawful intercept shops alleged to be willing to deal with pariah regimes. University of Maryland’s Jonathan Katz discusses Google’s unfulfilled promise of end-to-end encryption in gmail. Ajit Sancheti from Preempt Security explains the tension between security and human nature.  NATO insiders would like to see the Atlantic Alliance weaponized memes.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1257</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f1c7d751338701660b3b5b2efb4d202e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3477376124.mp3?updated=1608753357" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ewind adware infesting Android third-party app stores. Influence operations. Russian state use of organized crime. Finspy a payload in Word zero-day exploits. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/327/notes</link>
      <description>In today's podcast we hear about how Ewind adware infests cloned apps in the Android ecosystem. Influence operations rise to prominence amid increased Russian and Islamist activity against Western targets. Accused Russian traitor makes jailhouse denunciation of Russia's coziness with cyber organized crime. Finspy found distributed via Word zero-day. And suppose you're doing a nickel in Ossining or San Q (not that you would be). Webroot’s David Dufour warns of tax-season phishing. Fred Wilmot from PacketSled explains the convergence of OT, IT and IoT. And, how do you stay connected in the big house?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 13 Apr 2017 16:54:54 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>327</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ae29b8e2-def8-11ea-911f-ef88e20b766c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ewind adware infesting Android third-party app stores. Influence operations. Russian state use of organized crime. Finspy a payload in Word zero-day exploits. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear about how Ewind adware infests cloned apps in the Android ecosystem. Influence operations rise to prominence amid increased Russian and Islamist activity against Western targets. Accused Russian traitor makes jailhouse denunciation of Russia's coziness with cyber organized crime. Finspy found distributed via Word zero-day. And suppose you're doing a nickel in Ossining or San Q (not that you would be). Webroot’s David Dufour warns of tax-season phishing. Fred Wilmot from PacketSled explains the convergence of OT, IT and IoT. And, how do you stay connected in the big house?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about how Ewind adware infests cloned apps in the Android ecosystem. Influence operations rise to prominence amid increased Russian and Islamist activity against Western targets. Accused Russian traitor makes jailhouse denunciation of Russia's coziness with cyber organized crime. Finspy found distributed via Word zero-day. And suppose you're doing a nickel in Ossining or San Q (not that you would be). Webroot’s David Dufour warns of tax-season phishing. Fred Wilmot from PacketSled explains the convergence of OT, IT and IoT. And, how do you stay connected in the big house?</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>940</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8cda287db0a7eccd466faa2c05d90811]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2651895256.mp3?updated=1689799847" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patch Tuesday notes. Cyber threats to healthcare, New Helsinki information operations center forming. Updates on WikiLeaks and the ShadowBrokers</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/326/notes</link>
      <description>In today's podcast, we discuss April's Patch Tuesday, with news and tasks for Windows, Adobe, and SAP admins. Cyber threats to healthcare include ransomware, breaches, and device hacking. NATO and non-NATO partners establish an information operations center in Helsinki to contest Russian influence in cyberspace. Analysts continue to pick over the latest from the ShadowBrokers. Emily Wilson from Terbium Labs describes the Dark Web ecosystem. And WikiLeaks Vault 7 seems to out cyber operators as fans of Star Trek, anime, and Ape Escape. No surprises there, eh?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 12 Apr 2017 19:26:05 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>326</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ae3dd408-def8-11ea-911f-e3b977510bd2/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Patch Tuesday notes. Cyber threats to healthcare, New Helsinki information operations center forming. Updates on WikiLeaks and the ShadowBrokers</itunes:subtitle>
      <itunes:summary>In today's podcast, we discuss April's Patch Tuesday, with news and tasks for Windows, Adobe, and SAP admins. Cyber threats to healthcare include ransomware, breaches, and device hacking. NATO and non-NATO partners establish an information operations center in Helsinki to contest Russian influence in cyberspace. Analysts continue to pick over the latest from the ShadowBrokers. Emily Wilson from Terbium Labs describes the Dark Web ecosystem. And WikiLeaks Vault 7 seems to out cyber operators as fans of Star Trek, anime, and Ape Escape. No surprises there, eh?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we discuss April's Patch Tuesday, with news and tasks for Windows, Adobe, and SAP admins. Cyber threats to healthcare include ransomware, breaches, and device hacking. NATO and non-NATO partners establish an information operations center in Helsinki to contest Russian influence in cyberspace. Analysts continue to pick over the latest from the ShadowBrokers. Emily Wilson from Terbium Labs describes the Dark Web ecosystem. And WikiLeaks Vault 7 seems to out cyber operators as fans of Star Trek, anime, and Ape Escape. No surprises there, eh?</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>886</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f7f2395513c9d0c600a1266106d73b2c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8571294514.mp3?updated=1689798355" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Women in Cybersecurity 2017: A CyberWire Special Edition [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/15/notes</link>
      <description>The 2017 Women in Cybersecurity conference was held in Tucson Arizona, and the CyberWire was on hand to cover the event. We spoke with a variety of cyber security professionals, at different stages of their careers. We covered some of their career journeys and professional insights on our daily podcast, and in this special edition learn why a women in cybersecurity conference is more important than ever, what they wish they knew when they were starting out, as well as some advice for the men in the industry.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 12 Apr 2017 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>15</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/8e2515c2-df03-11ea-9ebd-8f5492140ac5/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Women in Cybersecurity 2017: A CyberWire Special Edition</itunes:subtitle>
      <itunes:summary>The 2017 Women in Cybersecurity conference was held in Tucson Arizona, and the CyberWire was on hand to cover the event. We spoke with a variety of cyber security professionals, at different stages of their careers. We covered some of their career journeys and professional insights on our daily podcast, and in this special edition learn why a women in cybersecurity conference is more important than ever, what they wish they knew when they were starting out, as well as some advice for the men in the industry.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The 2017 Women in Cybersecurity conference was held in Tucson Arizona, and the CyberWire was on hand to cover the event. We spoke with a variety of cyber security professionals, at different stages of their careers. We covered some of their career journeys and professional insights on our daily podcast, and in this special edition learn why a women in cybersecurity conference is more important than ever, what they wish they knew when they were starting out, as well as some advice for the men in the industry.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1545</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[128fc0a6bdd6c722ae0e9e320e8deba4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1987605592.mp3?updated=1656708014" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Word zero-day spreading Dridex. Password reuse bites Amazon third-party sellers. Mirai now mines Bitcoin. WikiLeaks, the ShadowBrokers, and war in Syria. Cyber first use. Crypto wars in Europe. APT10 in India. Penn State prof takes  Gödel Prize</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/325/notes</link>
      <description>In today's podcast, we hear about how a Word zero-day is spreading the Dridex banking Trojan. Amazon third-party sellers bitten by reused passwords. IBM catches Mirai mining Bitcoins. Symantec discerns Longhorn tools in WikiLeaks' Vault 7. Tensions over Syria's civil war seem to be behind the Shadow Brokers' return. ISIS is now attempting to recruit women to the Caliphate. Germany considers a cyber first-use doctrine. Crypto wars flare in Europe as French Presidential candidate Macron takes a strong anti-encryption line. The University of Maryland Center for Health and Homeland Security’s Ben Yelin weighs in on the FCC’s rollback of ISP privacy rules. Dario Forte from DF Labs cautions against AI hype. A Penn State professor takes the 2017 Gödel Prize for his work on differential privacy.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Apr 2017 19:40:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>325</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ae9e2038-def8-11ea-911f-8b1a09fe406d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Word zero-day spreading Dridex. Password reuse bites Amazon third-party sellers. Mirai now mines Bitcoin. WikiLeaks, the ShadowBrokers, and war in Syria. Cyber first use. Crypto wars in Europe. APT10 in India. Penn State prof takes  Gödel Prize</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how a Word zero-day is spreading the Dridex banking Trojan. Amazon third-party sellers bitten by reused passwords. IBM catches Mirai mining Bitcoins. Symantec discerns Longhorn tools in WikiLeaks' Vault 7. Tensions over Syria's civil war seem to be behind the Shadow Brokers' return. ISIS is now attempting to recruit women to the Caliphate. Germany considers a cyber first-use doctrine. Crypto wars flare in Europe as French Presidential candidate Macron takes a strong anti-encryption line. The University of Maryland Center for Health and Homeland Security’s Ben Yelin weighs in on the FCC’s rollback of ISP privacy rules. Dario Forte from DF Labs cautions against AI hype. A Penn State professor takes the 2017 Gödel Prize for his work on differential privacy.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how a Word zero-day is spreading the Dridex banking Trojan. Amazon third-party sellers bitten by reused passwords. IBM catches Mirai mining Bitcoins. Symantec discerns Longhorn tools in WikiLeaks' Vault 7. Tensions over Syria's civil war seem to be behind the Shadow Brokers' return. ISIS is now attempting to recruit women to the Caliphate. Germany considers a cyber first-use doctrine. Crypto wars flare in Europe as French Presidential candidate Macron takes a strong anti-encryption line. The University of Maryland Center for Health and Homeland Security’s Ben Yelin weighs in on the FCC’s rollback of ISP privacy rules. Dario Forte from DF Labs cautions against AI hype. A Penn State professor takes the 2017 Gödel Prize for his work on differential privacy.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>955</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[383312189e4c9cac38ee07f9cf46ffc2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5857391913.mp3?updated=1689798279" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Information operations respond to kinetic strikes. Dallas emergency sirens hacked. Alleged spam king arrested. Okta files its IPO.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/324/notes</link>
      <description>In today's podcast, we hear that US strikes against Syrian targets and harsh words for Assad are followed by apparent Russian information operations as bilateral tensions mount. Both WikiLeaks and the Shadow Brokers resurfaced late last week. A light Patch Tuesday is foreseen, but observers expect a fix for a Microsoft Office zero-day being actively exploited. Okta files its anticipated IPO. Dallas emergency sirens were hacked early Saturday. The Johns Hopkins University’s Joe Carrigan discusses upcoming updates to the Waze GPS app. Kathleen Smith from cybersecjobs.com and clearedjobs.net joins us from the Women in Cybersecurity Conference. Spanish police collar the alleged "spam king."
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 10 Apr 2017 21:06:01 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>324</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/aeb544d4-def8-11ea-911f-136813d0c7df/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Information operations respond to kinetic strikes. Dallas emergency sirens hacked. Alleged spam king arrested. Okta files its IPO.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that US strikes against Syrian targets and harsh words for Assad are followed by apparent Russian information operations as bilateral tensions mount. Both WikiLeaks and the Shadow Brokers resurfaced late last week. A light Patch Tuesday is foreseen, but observers expect a fix for a Microsoft Office zero-day being actively exploited. Okta files its anticipated IPO. Dallas emergency sirens were hacked early Saturday. The Johns Hopkins University’s Joe Carrigan discusses upcoming updates to the Waze GPS app. Kathleen Smith from cybersecjobs.com and clearedjobs.net joins us from the Women in Cybersecurity Conference. Spanish police collar the alleged "spam king."
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that US strikes against Syrian targets and harsh words for Assad are followed by apparent Russian information operations as bilateral tensions mount. Both WikiLeaks and the Shadow Brokers resurfaced late last week. A light Patch Tuesday is foreseen, but observers expect a fix for a Microsoft Office zero-day being actively exploited. Okta files its anticipated IPO. Dallas emergency sirens were hacked early Saturday. The Johns Hopkins University’s Joe Carrigan discusses upcoming updates to the Waze GPS app. Kathleen Smith from cybersecjobs.com and clearedjobs.net joins us from the Women in Cybersecurity Conference. Spanish police collar the alleged "spam king."</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>976</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bbb15aa3d33cc7301042279af7d8d050]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5913862063.mp3?updated=1689798004" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>APT10's Operation TradeSecret. BrickerBot may be vigilante PDoS. Amnesia and Sathurbot exploit known vulnerabilities in, respectively, DVRs and WordPress. Ransomware, surveillance, and info ops updates.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/323/notes</link>
      <description>In today's podcast, we hear about how Operation TradeSecret collected intelligence on US trade policy during the run-up to the Sino-American summit at Mar a Lago. BrickerBot is out, a PDoS campaign that looks like nasty vigilante work, so close your Telnet ports and change your IoT device default passwords. The Amnesia campaign is after unpatched DVRs. Sathurbot exploits unpatched WordPress instances and infects Torrent users. Lancaster University’s Awais Rashid has concerns over IoT devices limited interfaces. Endgame’s Andrea Little Limbago shares her story from the Women in Cybersecurity Conference. Surveillance and influence operations allegations in the last US Presidential campaign have their counterparts in the current French one.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 07 Apr 2017 19:27:37 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>323</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/aecb922a-def8-11ea-911f-633bfd315ecf/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>APT10's Operation TradeSecret. BrickerBot may be vigilante PDoS. Amnesia and Sathurbot exploit known vulnerabilities in, respectively, DVRs and WordPress. Ransomware, surveillance, and info ops updates.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how Operation TradeSecret collected intelligence on US trade policy during the run-up to the Sino-American summit at Mar a Lago. BrickerBot is out, a PDoS campaign that looks like nasty vigilante work, so close your Telnet ports and change your IoT device default passwords. The Amnesia campaign is after unpatched DVRs. Sathurbot exploits unpatched WordPress instances and infects Torrent users. Lancaster University’s Awais Rashid has concerns over IoT devices limited interfaces. Endgame’s Andrea Little Limbago shares her story from the Women in Cybersecurity Conference. Surveillance and influence operations allegations in the last US Presidential campaign have their counterparts in the current French one.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how Operation TradeSecret collected intelligence on US trade policy during the run-up to the Sino-American summit at Mar a Lago. BrickerBot is out, a PDoS campaign that looks like nasty vigilante work, so close your Telnet ports and change your IoT device default passwords. The Amnesia campaign is after unpatched DVRs. Sathurbot exploits unpatched WordPress instances and infects Torrent users. Lancaster University’s Awais Rashid has concerns over IoT devices limited interfaces. Endgame’s Andrea Little Limbago shares her story from the Women in Cybersecurity Conference. Surveillance and influence operations allegations in the last US Presidential campaign have their counterparts in the current French one.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1271</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[605a3ded4aec6b432e5076ed9f849b4f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8083986808.mp3?updated=1608753347" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Operations TradeSecret and Cloudhopper attributed to APT10. Third party risks. Lazarus Group update. US investigation of Russian influence operations and US surveillance allegations proceeds.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/322/notes</link>
      <description>In today's podcast we hear about Operation TradeSecret, which joins Operation Cloudhopper: both appear to be facets of a Chinese cyberespionage campaign. 20,000 loan applications are exposed by a third-party IT vendor. North Korea's Lazarus Group still has banks in its crosshairs. A study shows that mobile users are in a complicated relationship with their apps. US Congressional hearings into Russian influence operations and allegations of US surveillance continue. IBM’s Wendi Whitmore joins us from the 2017 Women in Cybersecurity Conference. Palo Alto Networks’ Rick Howard describes the cloud paradigm shift. And tomorrow is OpIsrael; Israeli enterprises say they're prepared.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 06 Apr 2017 17:02:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>322</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/aef0b0f0-def8-11ea-911f-e3ead311d940/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Operations TradeSecret and Cloudhopper attributed to APT10. Third party risks. Lazarus Group update. US investigation of Russian influence operations and US surveillance allegations proceeds.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about Operation TradeSecret, which joins Operation Cloudhopper: both appear to be facets of a Chinese cyberespionage campaign. 20,000 loan applications are exposed by a third-party IT vendor. North Korea's Lazarus Group still has banks in its crosshairs. A study shows that mobile users are in a complicated relationship with their apps. US Congressional hearings into Russian influence operations and allegations of US surveillance continue. IBM’s Wendi Whitmore joins us from the 2017 Women in Cybersecurity Conference. Palo Alto Networks’ Rick Howard describes the cloud paradigm shift. And tomorrow is OpIsrael; Israeli enterprises say they're prepared.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about Operation TradeSecret, which joins Operation Cloudhopper: both appear to be facets of a Chinese cyberespionage campaign. 20,000 loan applications are exposed by a third-party IT vendor. North Korea's Lazarus Group still has banks in its crosshairs. A study shows that mobile users are in a complicated relationship with their apps. US Congressional hearings into Russian influence operations and allegations of US surveillance continue. IBM’s Wendi Whitmore joins us from the 2017 Women in Cybersecurity Conference. Palo Alto Networks’ Rick Howard describes the cloud paradigm shift. And tomorrow is OpIsrael; Israeli enterprises say they're prepared.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>962</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cd9a6c26767cac4d3ab454ee030e389e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1072194468.mp3?updated=1689797428" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Operation Cloudhopper. Chrysaor spyware. Microsoft to upgrade Office security. Notes from SeaAirSpace. High school hacking.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/321/notes</link>
      <description>In today's podcast, we hear about how Operation Cloudhopper gets to its espionage targets via their cloud and managed service providers. Details are out on the Android version of the Pegasus spyware. Microsoft will upgrade Office security. Notes on the annual SeaAirSpace expo, including an excursus on cyber Marines. Cisco’s Chief Privacy Officer Michelle Dennedy joins us from the Women in Cybersecurity Conference. Dale Drew from Level 3 describes the security ecosystem disruption. And what is going on in Bedford County, Pennsylvania, a place where the laws of physics may not apply?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 05 Apr 2017 19:25:09 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>321</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/af048846-def8-11ea-911f-c3588787db9d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Operation Cloudhopper. Chrysaor spyware. Microsoft to upgrade Office security. Notes from SeaAirSpace. High school hacking.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how Operation Cloudhopper gets to its espionage targets via their cloud and managed service providers. Details are out on the Android version of the Pegasus spyware. Microsoft will upgrade Office security. Notes on the annual SeaAirSpace expo, including an excursus on cyber Marines. Cisco’s Chief Privacy Officer Michelle Dennedy joins us from the Women in Cybersecurity Conference. Dale Drew from Level 3 describes the security ecosystem disruption. And what is going on in Bedford County, Pennsylvania, a place where the laws of physics may not apply?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how Operation Cloudhopper gets to its espionage targets via their cloud and managed service providers. Details are out on the Android version of the Pegasus spyware. Microsoft will upgrade Office security. Notes on the annual SeaAirSpace expo, including an excursus on cyber Marines. Cisco’s Chief Privacy Officer Michelle Dennedy joins us from the Women in Cybersecurity Conference. Dale Drew from Level 3 describes the security ecosystem disruption. And what is going on in Bedford County, Pennsylvania, a place where the laws of physics may not apply?</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>967</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cc9f51b3dcb20f7c00a6c50bafc35a5d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6189813776.mp3?updated=1689799828" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Pegasus version now affects Android. UK on alert for ISIS infrastructure cyberattack. DPRK tied, again, to Bangladesh Bank heist. Fancy Bear and Turla updates. Samsung Tizen 0-day. Tax season security. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/320/notes</link>
      <description>In today's podcast, we hear that Pegasus is now in the Android ecosystem. British authorities warn of possible ISIS cyberattacks on infrastructure. Russia investigates the St. Petersburg metro bombing. New evidence connects North Korea with the Lazarus group. Fancy Bear continues to romp unabated, and Turla seems to have remained quietly active for about twenty years. Zero-days reported for Samsung's Tizen. Our coverage of the Women in Cybersecurity Conference continues, featuring a conversation with Endgame malware researcher Amanda Rousseau. Virgina Tech’s Hume Center’s Dr. Charles Clancy describes telephony DDOS. Apple issues an emergency iOS patch. Industry notes, and tax season security advice.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Apr 2017 18:55:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>320</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/af20f94a-def8-11ea-911f-b3166004c83b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Pegasus version now affects Android. UK on alert for ISIS infrastructure cyberattack. DPRK tied, again, to Bangladesh Bank heist. Fancy Bear and Turla updates. Samsung Tizen 0-day. Tax season security. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Pegasus is now in the Android ecosystem. British authorities warn of possible ISIS cyberattacks on infrastructure. Russia investigates the St. Petersburg metro bombing. New evidence connects North Korea with the Lazarus group. Fancy Bear continues to romp unabated, and Turla seems to have remained quietly active for about twenty years. Zero-days reported for Samsung's Tizen. Our coverage of the Women in Cybersecurity Conference continues, featuring a conversation with Endgame malware researcher Amanda Rousseau. Virgina Tech’s Hume Center’s Dr. Charles Clancy describes telephony DDOS. Apple issues an emergency iOS patch. Industry notes, and tax season security advice.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Pegasus is now in the Android ecosystem. British authorities warn of possible ISIS cyberattacks on infrastructure. Russia investigates the St. Petersburg metro bombing. New evidence connects North Korea with the Lazarus group. Fancy Bear continues to romp unabated, and Turla seems to have remained quietly active for about twenty years. Zero-days reported for Samsung's Tizen. Our coverage of the Women in Cybersecurity Conference continues, featuring a conversation with Endgame malware researcher Amanda Rousseau. Virgina Tech’s Hume Center’s Dr. Charles Clancy describes telephony DDOS. Apple issues an emergency iOS patch. Industry notes, and tax season security advice.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>969</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7cb4f4ea27420cb956187824ab8bdaaa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1608463230.mp3?updated=1689796313" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>WikiLeaks dumps alleged CIA obfuscation code. Attribution skeptics speculate about Russian ops (or the lack thereof). ISIS information operations manual revealed. RATs in the wild.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/319/notes</link>
      <description>In today's podcast, we hear that WikiLeaks has dumped what it claims are CIA source code files. The leak seems to aim at raising suspicion that attacks attributed to foreign governments are in fact false-flag operations. The International Association of Athletics Federations says it was hacked by Fancy Bear. Two new RATs—remote access Trojans—are discovered in the wild. ISIS takes some cyber hits, and an investigator outlines the group's information operations manual. At the annual Women in Cyber Security Conference we catch up with US Naval Academy Midshipmen Svetla Walsh and Deja Baker. David Dufour from Webroot reviews their latest threat report.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 03 Apr 2017 20:05:13 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>319</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/af340d78-def8-11ea-911f-1311d1307983/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>WikiLeaks dumps alleged CIA obfuscation code. Attribution skeptics speculate about Russian ops (or the lack thereof). ISIS information operations manual revealed. RATs in the wild.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that WikiLeaks has dumped what it claims are CIA source code files. The leak seems to aim at raising suspicion that attacks attributed to foreign governments are in fact false-flag operations. The International Association of Athletics Federations says it was hacked by Fancy Bear. Two new RATs—remote access Trojans—are discovered in the wild. ISIS takes some cyber hits, and an investigator outlines the group's information operations manual. At the annual Women in Cyber Security Conference we catch up with US Naval Academy Midshipmen Svetla Walsh and Deja Baker. David Dufour from Webroot reviews their latest threat report.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that WikiLeaks has dumped what it claims are CIA source code files. The leak seems to aim at raising suspicion that attacks attributed to foreign governments are in fact false-flag operations. The International Association of Athletics Federations says it was hacked by Fancy Bear. Two new RATs—remote access Trojans—are discovered in the wild. ISIS takes some cyber hits, and an investigator outlines the group's information operations manual. At the annual Women in Cyber Security Conference we catch up with US Naval Academy Midshipmen Svetla Walsh and Deja Baker. David Dufour from Webroot reviews their latest threat report.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>976</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a67cb8c45a3651981e3a782cd6156997]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1548606005.mp3?updated=1689796299" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fancy Bear's phishing expeditions. Cryptowars and privacy regs in the EU. Is that really you, Dr. Niebuhr? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/318/notes</link>
      <description>In today's podcast, we hear about how Fancy Bear left tracks in Bitly, and Fancy Bear did an awful lot of phishing going back to March 2015. Experts take a look at Russian espionage and influence operations, and they draw some disturbing conclusions. The EU seems ready to go anti-encryption—how that will work with the EU's regulatory emphasis on privacy is anyone's guess. The University of Maryland's Jonathan Katz explains the recent Z-Coin crypto-currency bug. Bob Ackerman from Allegis Captical and DataTribe offers insights on the investment environment for cyber. And no, that's not a famous theologian tweeting: it's the head G-Man.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 31 Mar 2017 20:18:06 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>318</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/af490426-def8-11ea-911f-5b5ecbbc3f36/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fancy Bear's phishing expeditions. Cryptowars and privacy regs in the EU. Is that really you, Dr. Niebuhr? </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how Fancy Bear left tracks in Bitly, and Fancy Bear did an awful lot of phishing going back to March 2015. Experts take a look at Russian espionage and influence operations, and they draw some disturbing conclusions. The EU seems ready to go anti-encryption—how that will work with the EU's regulatory emphasis on privacy is anyone's guess. The University of Maryland's Jonathan Katz explains the recent Z-Coin crypto-currency bug. Bob Ackerman from Allegis Captical and DataTribe offers insights on the investment environment for cyber. And no, that's not a famous theologian tweeting: it's the head G-Man.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how Fancy Bear left tracks in Bitly, and Fancy Bear did an awful lot of phishing going back to March 2015. Experts take a look at Russian espionage and influence operations, and they draw some disturbing conclusions. The EU seems ready to go anti-encryption—how that will work with the EU's regulatory emphasis on privacy is anyone's guess. The University of Maryland's Jonathan Katz explains the recent Z-Coin crypto-currency bug. Bob Ackerman from Allegis Captical and DataTribe offers insights on the investment environment for cyber. And no, that's not a famous theologian tweeting: it's the head G-Man.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1256</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[19e0860766370326d8fdf7bfe5d7bcf8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6899942929.mp3?updated=1608753344" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Apple patched this week—how are your systems? Lastpass working on a patch for an undescribed bug (said to be complex). What IT staff actually work on. And a long talk about emerging Administration cyber policy.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/317/notes</link>
      <description>In today's podcast, we hear about Apple's patches issued this week—how are your systems? Lastpass is working on a patch for an undescribed bug (said to be a complicated one). What IT staff actually work on. Politico's Eric Geller discusses emerging Trump Administration cyber policy. Emily Wilson from Terbium Labs outlines the data breach timeline. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 30 Mar 2017 18:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>317</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/af5f9e34-def8-11ea-911f-337142cff689/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Apple patched this week—how are your systems? Lastpass working on a patch for an undescribed bug (said to be complex). What IT staff actually work on. And a long talk about emerging Administration cyber policy.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about Apple's patches issued this week—how are your systems? Lastpass is working on a patch for an undescribed bug (said to be a complicated one). What IT staff actually work on. Politico's Eric Geller discusses emerging Trump Administration cyber policy. Emily Wilson from Terbium Labs outlines the data breach timeline. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about Apple's patches issued this week—how are your systems? Lastpass is working on a patch for an undescribed bug (said to be a complicated one). What IT staff actually work on. Politico's Eric Geller discusses emerging Trump Administration cyber policy. Emily Wilson from Terbium Labs outlines the data breach timeline. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>988</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8d95b38aa6a3ea288726ebf707bc4340]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8697339393.mp3?updated=1689796261" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hybrid warfare objectives and tactics. Physical threats, lost and found. Vulnerability and threat recap.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/316/notes</link>
      <description>In today's podcast, we pass on what we've heard at ITSEF about Russian hybrid warfare: it aims, experts say, at redressing the loss of the Cold War. Microsoft Internet Information Services (IIS) 6.0 found vulnerable to a buffer overflow attack. Cerber ransomware evolves to evade detection. Bugs found in Siemens ICS products. VMWare patches vulnerabilities. Laptops with sensitive information lost in Hong Kong and New York. Joe Carrigan from the Johns Hopkins University Information Security Institute reviews a teddy bear who can’t keep a secret. Peak10’s David Kidd outlines compliance advantages of the cloud. Malicious USB sticks strewn around a Canadian university campus.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 29 Mar 2017 19:39:04 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>316</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/af7a153e-def8-11ea-911f-83ac4fa29e8a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hybrid warfare objectives and tactics. Physical threats, lost and found. Vulnerability and threat recap.</itunes:subtitle>
      <itunes:summary>In today's podcast, we pass on what we've heard at ITSEF about Russian hybrid warfare: it aims, experts say, at redressing the loss of the Cold War. Microsoft Internet Information Services (IIS) 6.0 found vulnerable to a buffer overflow attack. Cerber ransomware evolves to evade detection. Bugs found in Siemens ICS products. VMWare patches vulnerabilities. Laptops with sensitive information lost in Hong Kong and New York. Joe Carrigan from the Johns Hopkins University Information Security Institute reviews a teddy bear who can’t keep a secret. Peak10’s David Kidd outlines compliance advantages of the cloud. Malicious USB sticks strewn around a Canadian university campus.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we pass on what we've heard at ITSEF about Russian hybrid warfare: it aims, experts say, at redressing the loss of the Cold War. Microsoft Internet Information Services (IIS) 6.0 found vulnerable to a buffer overflow attack. Cerber ransomware evolves to evade detection. Bugs found in Siemens ICS products. VMWare patches vulnerabilities. Laptops with sensitive information lost in Hong Kong and New York. Joe Carrigan from the Johns Hopkins University Information Security Institute reviews a teddy bear who can’t keep a secret. Peak10’s David Kidd outlines compliance advantages of the cloud. Malicious USB sticks strewn around a Canadian university campus.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>972</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bb3f560721b9ae0f00e7b40e12ac7ed1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5885313483.mp3?updated=1689796242" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Updates on Cozy Bear and Shamoon tradecraft. Crypto wars flare in the UK. FBI warns of attacks against FTP servers. Typosquatting, scareware, and other problems.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/315/notes</link>
      <description>In today's podcast, we hear how Cozy Bear slips through with domain fronting. Shamoon's infection methods are revealed. The crypto wars flare over not-so-lone wolves, but there are some genuine lone wolves out there as well. Medical and dental practices warned against attacks on FTP servers. A networked sterilizer is, well, digitally unhygienic. Docs dot com search functionality temporarily disabled. Remember, if you want to reach the G-men, it's FBI dot GOV, not dot com. The UMD Center for Health and Homeland Security's Ben Yelin examines a case where a defendant's expertise is being held against him. Brian Brunetti from Route1 warns about VPN insecurity. Scareware hits iOS users. And a Brooklyn prosecutor gets bad advice from the old heart.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Mar 2017 20:10:55 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>315</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/af922ee4-def8-11ea-911f-2350a0bb2fe2/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Updates on Cozy Bear and Shamoon tradecraft. Crypto wars flare in the UK. FBI warns of attacks against FTP servers. Typosquatting, scareware, and other problems.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear how Cozy Bear slips through with domain fronting. Shamoon's infection methods are revealed. The crypto wars flare over not-so-lone wolves, but there are some genuine lone wolves out there as well. Medical and dental practices warned against attacks on FTP servers. A networked sterilizer is, well, digitally unhygienic. Docs dot com search functionality temporarily disabled. Remember, if you want to reach the G-men, it's FBI dot GOV, not dot com. The UMD Center for Health and Homeland Security's Ben Yelin examines a case where a defendant's expertise is being held against him. Brian Brunetti from Route1 warns about VPN insecurity. Scareware hits iOS users. And a Brooklyn prosecutor gets bad advice from the old heart.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear how Cozy Bear slips through with domain fronting. Shamoon's infection methods are revealed. The crypto wars flare over not-so-lone wolves, but there are some genuine lone wolves out there as well. Medical and dental practices warned against attacks on FTP servers. A networked sterilizer is, well, digitally unhygienic. Docs dot com search functionality temporarily disabled. Remember, if you want to reach the G-men, it's FBI dot GOV, not dot com. The UMD Center for Health and Homeland Security's Ben Yelin examines a case where a defendant's expertise is being held against him. Brian Brunetti from Route1 warns about VPN insecurity. Scareware hits iOS users. And a Brooklyn prosecutor gets bad advice from the old heart.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>982</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ec3b281fd2ca4aa8262bd701d155ef8e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3090557667.mp3?updated=1689796225" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lone wolves howl to each other over WhatsApp? Industry yawns at WikiLeaks zero-days. How online gamers cheat. America's JobLink breach update. Ukrainian artillery hack notes. April 7 deadlines.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/314/notes</link>
      <description>In today's podcast, we hear that British police think ISIS not-so-lone wolves may have been howling over WhatsApp. WikiLeaks still disgruntled over its disclosure offer's cool reception. March-Madness is also phishing season. How and why online gamers cheat. GiftGhostBot drains gift-card balances. States mull next steps after the America's JobLink breach. CrowdStrike walks back some claims in its Ukrainian artillery hacking report, but insists the hack was real, and that signs point to Fancy Bear. Lancaster University's Awais Rashid warns of the use of open source intel in social engineering. Wall Street Journal tech reporter Sarah Needleman explains the esports cheating arms race. April 7 marks two deadlines for cyber actions; observers hope for two fizzles.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 27 Mar 2017 18:25:31 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>314</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/afa9cdf6-def8-11ea-911f-63f4e4b4c9a1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Lone wolves howl to each other over WhatsApp? Industry yawns at WikiLeaks zero-days. How online gamers cheat. America's JobLink breach update. Ukrainian artillery hack notes. April 7 deadlines.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that British police think ISIS not-so-lone wolves may have been howling over WhatsApp. WikiLeaks still disgruntled over its disclosure offer's cool reception. March-Madness is also phishing season. How and why online gamers cheat. GiftGhostBot drains gift-card balances. States mull next steps after the America's JobLink breach. CrowdStrike walks back some claims in its Ukrainian artillery hacking report, but insists the hack was real, and that signs point to Fancy Bear. Lancaster University's Awais Rashid warns of the use of open source intel in social engineering. Wall Street Journal tech reporter Sarah Needleman explains the esports cheating arms race. April 7 marks two deadlines for cyber actions; observers hope for two fizzles.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that British police think ISIS not-so-lone wolves may have been howling over WhatsApp. WikiLeaks still disgruntled over its disclosure offer's cool reception. March-Madness is also phishing season. How and why online gamers cheat. GiftGhostBot drains gift-card balances. States mull next steps after the America's JobLink breach. CrowdStrike walks back some claims in its Ukrainian artillery hacking report, but insists the hack was real, and that signs point to Fancy Bear. Lancaster University's Awais Rashid warns of the use of open source intel in social engineering. Wall Street Journal tech reporter Sarah Needleman explains the esports cheating arms race. April 7 marks two deadlines for cyber actions; observers hope for two fizzles.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>944</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3a5bf72958a610f247f3141c19964999]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3677875644.mp3?updated=1689796210" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>WikiLeaks' Vault 7 "Dark Matter" docs. Information operations, Russian style and ISIS style. Job database exposed. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/313/notes</link>
      <description>In today's podcast we hear assessments of WikiLeaks' latest Vault 7 files—compromised supply chain or damp squib? NATO worries about Russian information operations. ISIS continues to push jihadist inspiration online, claiming the London killer as one of the Caliphate's soldiers. Facile attribution can mislead, as seen in a surprising arrest. Comments on America's Joblink Alliance breach. Acalvio's Chris Roberts wonders if AI and Machine Learning are all they're cracked up to be. Palo Alto Networks' Rick Howard has an update on the Cyber Threat Alliance. And Estonian experience suggests to the world that President Putin is a proud spirit who cannot endure to be mocked.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 24 Mar 2017 19:09:51 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>313</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/afd1b078-def8-11ea-911f-4bc793a9dcd4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>WikiLeaks' Vault 7 "Dark Matter" docs. Information operations, Russian style and ISIS style. Job database exposed. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear assessments of WikiLeaks' latest Vault 7 files—compromised supply chain or damp squib? NATO worries about Russian information operations. ISIS continues to push jihadist inspiration online, claiming the London killer as one of the Caliphate's soldiers. Facile attribution can mislead, as seen in a surprising arrest. Comments on America's Joblink Alliance breach. Acalvio's Chris Roberts wonders if AI and Machine Learning are all they're cracked up to be. Palo Alto Networks' Rick Howard has an update on the Cyber Threat Alliance. And Estonian experience suggests to the world that President Putin is a proud spirit who cannot endure to be mocked.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear assessments of WikiLeaks' latest Vault 7 files—compromised supply chain or damp squib? NATO worries about Russian information operations. ISIS continues to push jihadist inspiration online, claiming the London killer as one of the Caliphate's soldiers. Facile attribution can mislead, as seen in a surprising arrest. Comments on America's Joblink Alliance breach. Acalvio's Chris Roberts wonders if AI and Machine Learning are all they're cracked up to be. Palo Alto Networks' Rick Howard has an update on the Cyber Threat Alliance. And Estonian experience suggests to the world that President Putin is a proud spirit who cannot endure to be mocked.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1267</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a17be363ff029f30eaa99d14dfb49044]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2113268142.mp3?updated=1608753354" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Newly disclosed threats and vulnerabilities, mostly criminal. Catphishing peer review. The US may indict North Korea for the Bangladesh Bank heist.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/312/notes</link>
      <description>In today's podcast we offer a rundown of recently announced threats and vulnerabilities in stores and documents: Play Store, App Store, and MS Office. Some crooks move to the cloud. GoDaddy buys Sucuri. The US is rumored to be preparing a North Korean indictment for the Bangladesh Bank heist. Social media look for bad bots. Level 3's Dale Drew describes botnet evolution. LookingGlass' Eric Olson explains FaceBook Marketplace security. And some dodgy scientific journals seem to use catphish for peer review.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 23 Mar 2017 21:22:55 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>312</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/afe98568-def8-11ea-911f-c749613c283b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Newly disclosed threats and vulnerabilities, mostly criminal. Catphishing peer review. The US may indict North Korea for the Bangladesh Bank heist.  </itunes:subtitle>
      <itunes:summary>In today's podcast we offer a rundown of recently announced threats and vulnerabilities in stores and documents: Play Store, App Store, and MS Office. Some crooks move to the cloud. GoDaddy buys Sucuri. The US is rumored to be preparing a North Korean indictment for the Bangladesh Bank heist. Social media look for bad bots. Level 3's Dale Drew describes botnet evolution. LookingGlass' Eric Olson explains FaceBook Marketplace security. And some dodgy scientific journals seem to use catphish for peer review.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we offer a rundown of recently announced threats and vulnerabilities in stores and documents: Play Store, App Store, and MS Office. Some crooks move to the cloud. GoDaddy buys Sucuri. The US is rumored to be preparing a North Korean indictment for the Bangladesh Bank heist. Social media look for bad bots. Level 3's Dale Drew describes botnet evolution. LookingGlass' Eric Olson explains FaceBook Marketplace security. And some dodgy scientific journals seem to use catphish for peer review.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>989</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f9d099835f0d957eb2ca6d9071dbc72d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5775047448.mp3?updated=1689796194" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Laptop restrictions are for physical, not cyber reasons. Necurs is back, pumping and dumping. MajikPOS notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/311/notes</link>
      <description>In today's podcast, we hear that laptop flight restrictions spread as security services continue to grapple with ISIS inspiration operations. The Necurs botnet returns, but now it's swapped pump-and-dump scams with penny stocks for its usual ransomware payloads. MajikPOS is active in the North American wild. Joe Carrigan from the Johns Hopkins University Information Security Institute reviews lessons learned from the Cloudbleed event. Philip Susmann describes Norwich University's DECIDE cyber simulation platform. And the Bangladesh Bank hack looks like it may have been a North Korean job. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 22 Mar 2017 19:50:17 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>311</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b006a7ba-def8-11ea-911f-afdc98ceefd2/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Laptop restrictions are for physical, not cyber reasons. Necurs is back, pumping and dumping. MajikPOS notes.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that laptop flight restrictions spread as security services continue to grapple with ISIS inspiration operations. The Necurs botnet returns, but now it's swapped pump-and-dump scams with penny stocks for its usual ransomware payloads. MajikPOS is active in the North American wild. Joe Carrigan from the Johns Hopkins University Information Security Institute reviews lessons learned from the Cloudbleed event. Philip Susmann describes Norwich University's DECIDE cyber simulation platform. And the Bangladesh Bank hack looks like it may have been a North Korean job. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that laptop flight restrictions spread as security services continue to grapple with ISIS inspiration operations. The Necurs botnet returns, but now it's swapped pump-and-dump scams with penny stocks for its usual ransomware payloads. MajikPOS is active in the North American wild. Joe Carrigan from the Johns Hopkins University Information Security Institute reviews lessons learned from the Cloudbleed event. Philip Susmann describes Norwich University's DECIDE cyber simulation platform. And the Bangladesh Bank hack looks like it may have been a North Korean job. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>900</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3b6464ca93b6d8d4a8f391962d14f83a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3834228795.mp3?updated=1689796183" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Extortion claims. Election influence operations seem likely to continue. A Russian bank claims it's being framed by DNS spoofing. "Cyber Pearl Harbor" fears may be a distraction.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/310/notes</link>
      <description>In today's podcast, we hear about the claim that "the Turkish Crime Family" is holding iPhones hostage. WikiLeaks grumbles that it has few takers for its Vault 7 bugs. Germany raises its state of cyber alert, pre-election. The US expects more Russian cyber and influence operations. A Russian bank says it was framed (and maybe it was). UMD's Jonathan Katz provides technical details on the recent SHA-1 collision. Mandiant's Ronald Bushar gives us highlights from their M-Trends report. Fears of a "cyber Pearl Harbor" may distract from real ICS risks. And no, Martians haven't landed in New Jersey.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Mar 2017 19:55:43 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>310</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b01dde12-def8-11ea-911f-0f7943021755/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Extortion claims. Election influence operations seem likely to continue. A Russian bank claims it's being framed by DNS spoofing. "Cyber Pearl Harbor" fears may be a distraction.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about the claim that "the Turkish Crime Family" is holding iPhones hostage. WikiLeaks grumbles that it has few takers for its Vault 7 bugs. Germany raises its state of cyber alert, pre-election. The US expects more Russian cyber and influence operations. A Russian bank says it was framed (and maybe it was). UMD's Jonathan Katz provides technical details on the recent SHA-1 collision. Mandiant's Ronald Bushar gives us highlights from their M-Trends report. Fears of a "cyber Pearl Harbor" may distract from real ICS risks. And no, Martians haven't landed in New Jersey.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about the claim that "the Turkish Crime Family" is holding iPhones hostage. WikiLeaks grumbles that it has few takers for its Vault 7 bugs. Germany raises its state of cyber alert, pre-election. The US expects more Russian cyber and influence operations. A Russian bank says it was framed (and maybe it was). UMD's Jonathan Katz provides technical details on the recent SHA-1 collision. Mandiant's Ronald Bushar gives us highlights from their M-Trends report. Fears of a "cyber Pearl Harbor" may distract from real ICS risks. And no, Martians haven't landed in New Jersey.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>979</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[51ba90b1cc3925a17c13392e5a93f7d6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2772160079.mp3?updated=1689796161" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Careless criminals, Cisco mitigations, and Vault 7 disclosure conditions. A look at the Atlantic Council's Cyber 9/12. Cabin fever and malware infections. Kirk ransomware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/309/notes</link>
      <description>In today's podcast we ask whether careless cyber criminals working for the FSB blew the gaffe on the Yahoo! hack. WikiLeaks offers to share Vault 7 vulnerabilities with vendors, but it wants something in return. A look at the Atlantic Council's recently concluded Cyber 9/12 competition. Does cabin fever increase the risk of being hacked? Enigma Software saw things during last week's unseasonable US weather that suggests it might. We welcome David Dufour from Webroot to the show as our newest industry partner. And Kirk ransomware is ready to beam into your enterprise.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 20 Mar 2017 19:32:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>309</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b02fd342-def8-11ea-911f-13efa84a44a3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Careless criminals, Cisco mitigations, and Vault 7 disclosure conditions. A look at the Atlantic Council's Cyber 9/12. Cabin fever and malware infections. Kirk ransomware.</itunes:subtitle>
      <itunes:summary>In today's podcast we ask whether careless cyber criminals working for the FSB blew the gaffe on the Yahoo! hack. WikiLeaks offers to share Vault 7 vulnerabilities with vendors, but it wants something in return. A look at the Atlantic Council's recently concluded Cyber 9/12 competition. Does cabin fever increase the risk of being hacked? Enigma Software saw things during last week's unseasonable US weather that suggests it might. We welcome David Dufour from Webroot to the show as our newest industry partner. And Kirk ransomware is ready to beam into your enterprise.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we ask whether careless cyber criminals working for the FSB blew the gaffe on the Yahoo! hack. WikiLeaks offers to share Vault 7 vulnerabilities with vendors, but it wants something in return. A look at the Atlantic Council's recently concluded Cyber 9/12 competition. Does cabin fever increase the risk of being hacked? Enigma Software saw things during last week's unseasonable US weather that suggests it might. We welcome David Dufour from Webroot to the show as our newest industry partner. And Kirk ransomware is ready to beam into your enterprise.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>897</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fcbd9a6649bdcdeb092a612e6180efc8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1874462329.mp3?updated=1689796121" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyberspace and "Cold War Two." Who's leaking to WikiLeaks? Wishbone breached—warn the kids. Crimeware-as-a-service. The Active Cyber Defense Certainty Act.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/308/notes</link>
      <description>In today's podcast, we hear about observers who look around and think they may be seeing Cold War Two in cyberspace. (But this is no bipolar conflict.) Investigation into Vault 7 continues as people wonder where WikiLeaks gets its leaks. The quiz app Wishbone has been breached—take it as a teachable moment with the children. Fileless malware gets quieter as researchers get close to the cyber gang. A cloud-based keylogger is getting ready to take black market share. Palo Alto Networks' Rick Howard describes a capture-the-flag collaboration. Futurist Brian David Johnson explains Threatcasting. The proposed Active Cyber Defense Certainty Act. And what we're seeing at a policy competition.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 17 Mar 2017 19:01:27 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>308</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b0468420-def8-11ea-911f-27cb2139963e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyberspace and "Cold War Two." Who's leaking to WikiLeaks? Wishbone breached—warn the kids. Crimeware-as-a-service. The Active Cyber Defense Certainty Act.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about observers who look around and think they may be seeing Cold War Two in cyberspace. (But this is no bipolar conflict.) Investigation into Vault 7 continues as people wonder where WikiLeaks gets its leaks. The quiz app Wishbone has been breached—take it as a teachable moment with the children. Fileless malware gets quieter as researchers get close to the cyber gang. A cloud-based keylogger is getting ready to take black market share. Palo Alto Networks' Rick Howard describes a capture-the-flag collaboration. Futurist Brian David Johnson explains Threatcasting. The proposed Active Cyber Defense Certainty Act. And what we're seeing at a policy competition.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about observers who look around and think they may be seeing Cold War Two in cyberspace. (But this is no bipolar conflict.) Investigation into Vault 7 continues as people wonder where WikiLeaks gets its leaks. The quiz app Wishbone has been breached—take it as a teachable moment with the children. Fileless malware gets quieter as researchers get close to the cyber gang. A cloud-based keylogger is getting ready to take black market share. Palo Alto Networks' Rick Howard describes a capture-the-flag collaboration. Futurist Brian David Johnson explains Threatcasting. The proposed Active Cyber Defense Certainty Act. And what we're seeing at a policy competition.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1250</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eb291857e7845be618190ccc94092284]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9705671169.mp3?updated=1608753359" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Lazarus Group is back. Dun &amp; Bradstreet loses data; so does ABTA. Patriotic cyber rioting or state influence operations. US indicts four in the Yahoo! breach. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/307/notes</link>
      <description>In today's podcast we hear about the return of the the Lazarus Group (or maybe it never really left). A Dun &amp; Bradstreet database is compromised—more than thirty-three million are said to be affected. British travel association ABTA suffers a breach. Notes on identity theft. Netherlands voter information sites hit with DDoS—Turkish hacktivists (or government operators) suspected. The University of Maryland's Center for Health and Homeland Security's Markus Rauschecker describes the increasingly important role of cyber lawyers in M&amp;A activity. Digital Guardian's Tim Bandos has methods for protecting against state sponsored actors and hacktivists. The US indicts four in the Yahoo! breach—two of them have FSB connections.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 16 Mar 2017 19:13:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>307</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b05b8b22-def8-11ea-911f-939d91fe6a7c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Lazarus Group is back. Dun &amp; Bradstreet loses data; so does ABTA. Patriotic cyber rioting or state influence operations. US indicts four in the Yahoo! breach.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about the return of the the Lazarus Group (or maybe it never really left). A Dun &amp; Bradstreet database is compromised—more than thirty-three million are said to be affected. British travel association ABTA suffers a breach. Notes on identity theft. Netherlands voter information sites hit with DDoS—Turkish hacktivists (or government operators) suspected. The University of Maryland's Center for Health and Homeland Security's Markus Rauschecker describes the increasingly important role of cyber lawyers in M&amp;A activity. Digital Guardian's Tim Bandos has methods for protecting against state sponsored actors and hacktivists. The US indicts four in the Yahoo! breach—two of them have FSB connections.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about the return of the the Lazarus Group (or maybe it never really left). A Dun &amp; Bradstreet database is compromised—more than thirty-three million are said to be affected. British travel association ABTA suffers a breach. Notes on identity theft. Netherlands voter information sites hit with DDoS—Turkish hacktivists (or government operators) suspected. The University of Maryland's Center for Health and Homeland Security's Markus Rauschecker describes the increasingly important role of cyber lawyers in M&amp;A activity. Digital Guardian's Tim Bandos has methods for protecting against state sponsored actors and hacktivists. The US indicts four in the Yahoo! breach—two of them have FSB connections.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>971</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ebf6892075214d85519591beec45254a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2546645581.mp3?updated=1689796078" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Influence ops, third-party apps with an appetite for permissions, and criminal competition. Google purges malicious apps from the Play Store. Advice for whistleblowers. Farewell to Becky Bace.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/306/notes</link>
      <description>In today's podcast, we look as influence operations in the UK and in Europe: the former emanate from Russia, the latter from Turkey. Third-party social media apps increase your attack surface. Petya ransomware is stolen and improved by rival crooks. Google purges bad apps from the Play Store. Patch Tuesday notes. A convicted leaker offers some unexpected wisdom for prospective whistleblowers. Lawyers can't figure out the GDPR. US said ready to indict four for the Yahoo! breaches. Emily Wilson from Terbium Labs discusses the effects of high profile breaches on Dark Web markets. Justin Harvey from Accenture Security wonder if private sector attribution is dead. And we bid a respectful farewell to Becky Bace, one of our industry's thought leaders.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 15 Mar 2017 20:17:33 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>306</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b06fd50a-def8-11ea-911f-37ae04ff9ee4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Influence ops, third-party apps with an appetite for permissions, and criminal competition. Google purges malicious apps from the Play Store. Advice for whistleblowers. Farewell to Becky Bace.</itunes:subtitle>
      <itunes:summary>In today's podcast, we look as influence operations in the UK and in Europe: the former emanate from Russia, the latter from Turkey. Third-party social media apps increase your attack surface. Petya ransomware is stolen and improved by rival crooks. Google purges bad apps from the Play Store. Patch Tuesday notes. A convicted leaker offers some unexpected wisdom for prospective whistleblowers. Lawyers can't figure out the GDPR. US said ready to indict four for the Yahoo! breaches. Emily Wilson from Terbium Labs discusses the effects of high profile breaches on Dark Web markets. Justin Harvey from Accenture Security wonder if private sector attribution is dead. And we bid a respectful farewell to Becky Bace, one of our industry's thought leaders.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we look as influence operations in the UK and in Europe: the former emanate from Russia, the latter from Turkey. Third-party social media apps increase your attack surface. Petya ransomware is stolen and improved by rival crooks. Google purges bad apps from the Play Store. Patch Tuesday notes. A convicted leaker offers some unexpected wisdom for prospective whistleblowers. Lawyers can't figure out the GDPR. US said ready to indict four for the Yahoo! breaches. Emily Wilson from Terbium Labs discusses the effects of high profile breaches on Dark Web markets. Justin Harvey from Accenture Security wonder if private sector attribution is dead. And we bid a respectful farewell to Becky Bace, one of our industry's thought leaders.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>912</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[45fc0eb51c4177eab6f1acae027bbf4a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1951672572.mp3?updated=1689796082" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Canadian government sites recover from the Apache Struts vulnerability. FireEye's M-Trends report is out, calling out greater sophistication in financial cybercrime. USAF accidentally exposes SF86s. Vault 7 update.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/305/notes</link>
      <description>In today's podcast, we hear about how the Apache Struts bug has bitten in Canada. FireEye sees financial cybercrime approaching state espionage exploits in sophistication. The US Air Force leaves sensitive personal information exposed in a backup database. Investigation into WikiLeaks' Vault 7 continues. Okta files for its IPO. Ben Yelin from the UMD Center for Health and Homeland Security reviews a mobile device privacy bill. Adam Thomas from Deloitte outlines their latest cyber insurance report.  And today is Patch Tuesday.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Mar 2017 17:34:44 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>305</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b07eb8fe-def8-11ea-911f-6364b73cfca6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Canadian government sites recover from the Apache Struts vulnerability. FireEye's M-Trends report is out, calling out greater sophistication in financial cybercrime. USAF accidentally exposes SF86s. Vault 7 update.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how the Apache Struts bug has bitten in Canada. FireEye sees financial cybercrime approaching state espionage exploits in sophistication. The US Air Force leaves sensitive personal information exposed in a backup database. Investigation into WikiLeaks' Vault 7 continues. Okta files for its IPO. Ben Yelin from the UMD Center for Health and Homeland Security reviews a mobile device privacy bill. Adam Thomas from Deloitte outlines their latest cyber insurance report.  And today is Patch Tuesday.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how the Apache Struts bug has bitten in Canada. FireEye sees financial cybercrime approaching state espionage exploits in sophistication. The US Air Force leaves sensitive personal information exposed in a backup database. Investigation into WikiLeaks' Vault 7 continues. Okta files for its IPO. Ben Yelin from the UMD Center for Health and Homeland Security reviews a mobile device privacy bill. Adam Thomas from Deloitte outlines their latest cyber insurance report.  And today is Patch Tuesday.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>945</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ad7c8170949d5c19800d7399ec057ec7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7121152133.mp3?updated=1689796068" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Vault 7 updates—observers speculate about an inside leaker. Pre-loaded Android malware raises supply chain concerns. Ransomware in Japan. Convincing Chrome-spoofing malware. GCHQ warns UK parties to expect Russian influence operations.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/304/notes</link>
      <description>In today's podcast, we review some speculation about Vault 7 that holds the leaker was an insider. (But there's no specific insider named, yet—the investigation is still in its early stages.) Supply chain security issues are raised by both Vault 7 leaks and discovery of pre-loaded malware in some Android devices. Bitcoin won't get its own ETF, yet. Japanese companies willingness to "pay to make it go away" is seen playing into the hands of ransomware extortionists. Dr. Charles Clancy from Virginia Tech's Hume Center surveys the end-to-end encryption debate. Novetta's Dr. Corey Petty previews his upcoming Etherium smart contracts presentation. GCHQ warns Britain's political parties to expect Russian influence operations in the general election.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 13 Mar 2017 19:29:38 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>304</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b0997f7c-def8-11ea-911f-8362bdc22e70/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Vault 7 updates—observers speculate about an inside leaker. Pre-loaded Android malware raises supply chain concerns. Ransomware in Japan. Convincing Chrome-spoofing malware. GCHQ warns UK parties to expect Russian influence operations.</itunes:subtitle>
      <itunes:summary>In today's podcast, we review some speculation about Vault 7 that holds the leaker was an insider. (But there's no specific insider named, yet—the investigation is still in its early stages.) Supply chain security issues are raised by both Vault 7 leaks and discovery of pre-loaded malware in some Android devices. Bitcoin won't get its own ETF, yet. Japanese companies willingness to "pay to make it go away" is seen playing into the hands of ransomware extortionists. Dr. Charles Clancy from Virginia Tech's Hume Center surveys the end-to-end encryption debate. Novetta's Dr. Corey Petty previews his upcoming Etherium smart contracts presentation. GCHQ warns Britain's political parties to expect Russian influence operations in the general election.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we review some speculation about Vault 7 that holds the leaker was an insider. (But there's no specific insider named, yet—the investigation is still in its early stages.) Supply chain security issues are raised by both Vault 7 leaks and discovery of pre-loaded malware in some Android devices. Bitcoin won't get its own ETF, yet. Japanese companies willingness to "pay to make it go away" is seen playing into the hands of ransomware extortionists. Dr. Charles Clancy from Virginia Tech's Hume Center surveys the end-to-end encryption debate. Novetta's Dr. Corey Petty previews his upcoming Etherium smart contracts presentation. GCHQ warns Britain's political parties to expect Russian influence operations in the general election.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>902</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d9de9a92e9e051d0c6f67c88e013798f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8277970036.mp3?updated=1689796032" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>WikiLeaks, responsible disclosure, and insider threats. Playstation credentials rumored to have been compromised. Apache Struts bug being actively exploited. DPRK missile cyber security. A look at West African cybergangs. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/303/notes</link>
      <description>In today's podcast, WikiLeaks offers to enter the responsible disclosure game, but be warned: there are legal problems should you accept classified information. Some AV companies tout their reviews in Vault 7. Speculation about how CIA hacking notes leaked turns to an insider threat. HackRead warns that Playstation credentials may have been compromised. The Apache Struts vulnerability is being exploited in the wild. Observers cast doubt on reports the US successfully hacked North Korean missile launches. Joe Carrigan from the Johns Hopkins University Information Security Institute weighs in on SHA-1. Comodo's Kenneth Geers share insights from their 2016 Global Report. Trend Micro and Interpol take a look at the West African cybercrime scene.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 10 Mar 2017 19:25:59 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>303</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b0b19314-def8-11ea-911f-7f35ee49faf7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>WikiLeaks, responsible disclosure, and insider threats. Playstation credentials rumored to have been compromised. Apache Struts bug being actively exploited. DPRK missile cyber security. A look at West African cybergangs. </itunes:subtitle>
      <itunes:summary>In today's podcast, WikiLeaks offers to enter the responsible disclosure game, but be warned: there are legal problems should you accept classified information. Some AV companies tout their reviews in Vault 7. Speculation about how CIA hacking notes leaked turns to an insider threat. HackRead warns that Playstation credentials may have been compromised. The Apache Struts vulnerability is being exploited in the wild. Observers cast doubt on reports the US successfully hacked North Korean missile launches. Joe Carrigan from the Johns Hopkins University Information Security Institute weighs in on SHA-1. Comodo's Kenneth Geers share insights from their 2016 Global Report. Trend Micro and Interpol take a look at the West African cybercrime scene.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, WikiLeaks offers to enter the responsible disclosure game, but be warned: there are legal problems should you accept classified information. Some AV companies tout their reviews in Vault 7. Speculation about how CIA hacking notes leaked turns to an insider threat. HackRead warns that Playstation credentials may have been compromised. The Apache Struts vulnerability is being exploited in the wild. Observers cast doubt on reports the US successfully hacked North Korean missile launches. Joe Carrigan from the Johns Hopkins University Information Security Institute weighs in on SHA-1. Comodo's Kenneth Geers share insights from their 2016 Global Report. Trend Micro and Interpol take a look at the West African cybercrime scene.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1229</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[51e2be5d7908c183d84ab4356220cd8d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5583379717.mp3?updated=1608753351" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Vault 7 doesn't show much evidence of false flag operations. The most interesting question the WikiLeaks dump raises is, where did the material come from? RAND studies the zero-day market. The Near Abroad wishes for more US soft power. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/302/notes</link>
      <description>In today's podcast, we follow the Vault 7 story and the false flags that really aren't there. A call for more stress-testing of software. RAND reports on the market for zero-days. The Near Abroad warns the US that it would like to see more American soft power deployed in their part of the world. Jonathan Katz from the University of Maryland praises Google's Project Wycheproof. VMWare's Tom Corn provides his take on the promise of secure cloud environments. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 09 Mar 2017 21:18:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>302</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b0c0c2c6-def8-11ea-911f-dfd2d1637689/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Vault 7 doesn't show much evidence of false flag operations. The most interesting question the WikiLeaks dump raises is, where did the material come from? RAND studies the zero-day market. The Near Abroad wishes for more US soft power. </itunes:subtitle>
      <itunes:summary>In today's podcast, we follow the Vault 7 story and the false flags that really aren't there. A call for more stress-testing of software. RAND reports on the market for zero-days. The Near Abroad warns the US that it would like to see more American soft power deployed in their part of the world. Jonathan Katz from the University of Maryland praises Google's Project Wycheproof. VMWare's Tom Corn provides his take on the promise of secure cloud environments. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we follow the Vault 7 story and the false flags that really aren't there. A call for more stress-testing of software. RAND reports on the market for zero-days. The Near Abroad warns the US that it would like to see more American soft power deployed in their part of the world. Jonathan Katz from the University of Maryland praises Google's Project Wycheproof. VMWare's Tom Corn provides his take on the promise of secure cloud environments. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>929</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[35773bbd167b34218a46c0ff54d5a3b9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9835546496.mp3?updated=1689796113" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>WikiLeaks and Vault 7</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/301/notes</link>
      <description>In today's podcast we talk over the latest news, rumors, gossip, and common sense surrounding WikiLeaks and its Vault 7 dump of hacking tools and other spy stuff. And wait a minute—do angels really weep? After all, they're supposed to be pure intelligence. But you came here for the hacking, not the angelology, and there's a lot of stuff dancing around in Vault 7. Research Scientist Jim Walter from Cylance weighs in with his take. Some people even see dancing Bears, but we think they're seeing things. Dale Drew from Level 3 Communications tracks changes they’re seeing in DDoS attacks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 08 Mar 2017 20:50:50 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>301</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b0d56b0e-def8-11ea-911f-abb4eb88069d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>WikiLeaks and Vault 7</itunes:subtitle>
      <itunes:summary>In today's podcast we talk over the latest news, rumors, gossip, and common sense surrounding WikiLeaks and its Vault 7 dump of hacking tools and other spy stuff. And wait a minute—do angels really weep? After all, they're supposed to be pure intelligence. But you came here for the hacking, not the angelology, and there's a lot of stuff dancing around in Vault 7. Research Scientist Jim Walter from Cylance weighs in with his take. Some people even see dancing Bears, but we think they're seeing things. Dale Drew from Level 3 Communications tracks changes they’re seeing in DDoS attacks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we talk over the latest news, rumors, gossip, and common sense surrounding WikiLeaks and its Vault 7 dump of hacking tools and other spy stuff. And wait a minute—do angels really weep? After all, they're supposed to be pure intelligence. But you came here for the hacking, not the angelology, and there's a lot of stuff dancing around in Vault 7. Research Scientist Jim Walter from Cylance weighs in with his take. Some people even see dancing Bears, but we think they're seeing things. Dale Drew from Level 3 Communications tracks changes they’re seeing in DDoS attacks.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>967</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c572c65896b61789d264aed89e2111e7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7911682612.mp3?updated=1689795988" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>StoneDrill succeeds Shamoon. Trojanized Android Facebook Lite. Progressive groups threatened with doxing, blackmail. WikiLeaks' Vault 7. Hacking back? Wiretapping?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/300/notes</link>
      <description>In today's podcast we hear about how StoneDrill maybe succeeding Shamoon—it's more evasive and at least as destructive. Malwarebytes advises sticking to Google Play to avoid a new Trojan. Russian hackers—apparently mobsters who've copped some of Cozy Bear's MO—are blackmailing US progressive political groups. The University of Maryland Center for Health and Homeland Security's Ben Yelin explains Amazon Alexa's role in a murder case. Neill Feather from SiteLock describes a Wordpress vulnerability.  Congress considers a bill to allow companies to hack back. WikiLeaks' Vault Seven seems mostly unsurprising. Washington wiretapping allegations prompt recriminations.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Mar 2017 19:42:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>300</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b0f3e7e6-def8-11ea-911f-9bf50d96776b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>StoneDrill succeeds Shamoon. Trojanized Android Facebook Lite. Progressive groups threatened with doxing, blackmail. WikiLeaks' Vault 7. Hacking back? Wiretapping?</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about how StoneDrill maybe succeeding Shamoon—it's more evasive and at least as destructive. Malwarebytes advises sticking to Google Play to avoid a new Trojan. Russian hackers—apparently mobsters who've copped some of Cozy Bear's MO—are blackmailing US progressive political groups. The University of Maryland Center for Health and Homeland Security's Ben Yelin explains Amazon Alexa's role in a murder case. Neill Feather from SiteLock describes a Wordpress vulnerability.  Congress considers a bill to allow companies to hack back. WikiLeaks' Vault Seven seems mostly unsurprising. Washington wiretapping allegations prompt recriminations.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about how StoneDrill maybe succeeding Shamoon—it's more evasive and at least as destructive. Malwarebytes advises sticking to Google Play to avoid a new Trojan. Russian hackers—apparently mobsters who've copped some of Cozy Bear's MO—are blackmailing US progressive political groups. The University of Maryland Center for Health and Homeland Security's Ben Yelin explains Amazon Alexa's role in a murder case. Neill Feather from SiteLock describes a Wordpress vulnerability.  Congress considers a bill to allow companies to hack back. WikiLeaks' Vault Seven seems mostly unsurprising. Washington wiretapping allegations prompt recriminations.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>981</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9ff6b6c7941587d6f2c7813239a0957e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1797984424.mp3?updated=1689795952" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>RSA 2017 Roundup – Perspectives, Pitches and Predictions [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/14/notes</link>
      <description>In this CyberWire 2017 RSA Conference special edition, we wrap up our show coverage with insights from experts, about the trends they’re seeing, the products they’re pitching, and where they think we, as an industry, need to go.
Guests include:

Mark Dufresne, Director, Threat Research and Adversary Prevention, Endgame
https://www.linkedin.com/in/mark-dufresne-b3275610a/
 
James Lyne, Global Head of Security Research, Sophos
https://www.linkedin.com/in/jameslyne/
 
Emily Mossburg, Principal, Cyber Risk Services Leadership Team, Deloitte &amp; Touche
https://www.linkedin.com/in/emilymossburg/
 
Mark Nunnikhoven, Vice President, Cloud Research, Trend Micro
https://www.linkedin.com/in/marknca/
 
Levi Gundert, Vice President of Intelligence and Strategy, Recorded Future
https://www.linkedin.com/in/levigundert/
 
Carl Leonard, Principal Security Analyst, Forcepoint
https://www.linkedin.com/in/carl-leonard-5486405/
 
Evan Blair, Founder, ZeroFOX
https://www.linkedin.com/in/evanblair/
 
Gabby Nizri, Founder and CEO, Ayehu Software Technologies
https://www.linkedin.com/in/gabbynizri/
 
Jason Porter, Vice President Security Solutions, AT&amp;T
https://www.linkedin.com/in/jason-porter-4a604757/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Mar 2017 01:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>14</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/88b7d0f2-df03-11ea-b3fd-ffb88444000d/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>RSA 2017 Roundup – Perspectives, Pitches and Predictions</itunes:subtitle>
      <itunes:summary>In this CyberWire 2017 RSA Conference special edition, we wrap up our show coverage with insights from experts, about the trends they’re seeing, the products they’re pitching, and where they think we, as an industry, need to go.
Guests include:

Mark Dufresne, Director, Threat Research and Adversary Prevention, Endgame
https://www.linkedin.com/in/mark-dufresne-b3275610a/
 
James Lyne, Global Head of Security Research, Sophos
https://www.linkedin.com/in/jameslyne/
 
Emily Mossburg, Principal, Cyber Risk Services Leadership Team, Deloitte &amp; Touche
https://www.linkedin.com/in/emilymossburg/
 
Mark Nunnikhoven, Vice President, Cloud Research, Trend Micro
https://www.linkedin.com/in/marknca/
 
Levi Gundert, Vice President of Intelligence and Strategy, Recorded Future
https://www.linkedin.com/in/levigundert/
 
Carl Leonard, Principal Security Analyst, Forcepoint
https://www.linkedin.com/in/carl-leonard-5486405/
 
Evan Blair, Founder, ZeroFOX
https://www.linkedin.com/in/evanblair/
 
Gabby Nizri, Founder and CEO, Ayehu Software Technologies
https://www.linkedin.com/in/gabbynizri/
 
Jason Porter, Vice President Security Solutions, AT&amp;T
https://www.linkedin.com/in/jason-porter-4a604757/
 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this CyberWire 2017 RSA Conference special edition, we wrap up our show coverage with insights from experts, about the trends they’re seeing, the products they’re pitching, and where they think we, as an industry, need to go.</p><p>Guests include:</p><p><br></p><p>Mark Dufresne, Director, Threat Research and Adversary Prevention, Endgame</p><p><a href="https://www.linkedin.com/in/mark-dufresne-b3275610a/">https://www.linkedin.com/in/mark-dufresne-b3275610a/</a></p><p> </p><p>James Lyne, Global Head of Security Research, Sophos</p><p>https://www.linkedin.com/in/jameslyne/</p><p> </p><p>Emily Mossburg, Principal, Cyber Risk Services Leadership Team, Deloitte &amp; Touche</p><p>https://www.linkedin.com/in/emilymossburg/</p><p> </p><p>Mark Nunnikhoven, Vice President, Cloud Research, Trend Micro</p><p><a href="https://www.linkedin.com/in/marknca/">https://www.linkedin.com/in/marknca/</a></p><p> </p><p>Levi Gundert, Vice President of Intelligence and Strategy, Recorded Future</p><p><a href="https://www.linkedin.com/in/levigundert/">https://www.linkedin.com/in/levigundert/</a></p><p> </p><p>Carl Leonard, Principal Security Analyst, Forcepoint</p><p><a href="https://www.linkedin.com/in/carl-leonard-5486405/">https://www.linkedin.com/in/carl-leonard-5486405/</a></p><p> </p><p>Evan Blair, Founder, ZeroFOX</p><p><a href="https://www.linkedin.com/in/evanblair/">https://www.linkedin.com/in/evanblair/</a></p><p> </p><p>Gabby Nizri, Founder and CEO, Ayehu Software Technologies</p><p><a href="https://www.linkedin.com/in/gabbynizri/">https://www.linkedin.com/in/gabbynizri/</a></p><p> </p><p>Jason Porter, Vice President Security Solutions, AT&amp;T</p><p>https://www.linkedin.com/in/jason-porter-4a604757/</p><p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2824</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[edd54ade2b88c2d0a75b0657af9391ce]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8577627950.mp3?updated=1656708097" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Warnings of DNSMessenger. Cyber deterrence, and cyber offensive operations. Notes on DDoS. Election surveillance allegations.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/299/notes</link>
      <description>In today's podcast, we hear about warnings from Cisco's Talos unit and others concerning DNSMessenger, a dangerous and evasive RAT. DDoS hits Luxembourg government sites and remains a threat to businesses. The US is said to be running a cyber campaign against North Korea's ballistic missile program. The US Defense Science Board releases its report on cyber-deterrence. Rick Howard from Palo Alto Networks explores the history of security orchestration. Mutual recriminations over allegations of election-season campaign surveillance swirl in the US.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 06 Mar 2017 19:11:12 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>299</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b1084600-def8-11ea-911f-270c22814d31/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Warnings of DNSMessenger. Cyber deterrence, and cyber offensive operations. Notes on DDoS. Election surveillance allegations.  </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about warnings from Cisco's Talos unit and others concerning DNSMessenger, a dangerous and evasive RAT. DDoS hits Luxembourg government sites and remains a threat to businesses. The US is said to be running a cyber campaign against North Korea's ballistic missile program. The US Defense Science Board releases its report on cyber-deterrence. Rick Howard from Palo Alto Networks explores the history of security orchestration. Mutual recriminations over allegations of election-season campaign surveillance swirl in the US.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about warnings from Cisco's Talos unit and others concerning DNSMessenger, a dangerous and evasive RAT. DDoS hits Luxembourg government sites and remains a threat to businesses. The US is said to be running a cyber campaign against North Korea's ballistic missile program. The US Defense Science Board releases its report on cyber-deterrence. Rick Howard from Palo Alto Networks explores the history of security orchestration. Mutual recriminations over allegations of election-season campaign surveillance swirl in the US.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>957</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[631783511d9673952bb0f1b85065265e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9332291842.mp3?updated=1689795875" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Risk mitigation scores some wins this week. Amazon finds the typo that took out the Internet. Symantec gets into the VC game. Yahoo! agonistes. Wassenaar's prospects. PRC wants cyber peace. And farewell to Howard Schmidt.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/298/notes</link>
      <description>In today's podcast, we review some encouraging news about Android apps, Cloudbleed, and Slack's swift bug patching. Amazon finds a typo at the root of Wednesday's internet outages. Symantec opens a venture arm. Yahoo! breach post mortems continue. Decryption tools for Dharma ransomware are out. Prospects look dim, again, for Wassenaar. China calls for the demilitarization of cyberspace. Terbium's Emily Wilson surveys the Dark Web scene during tax season. MasterCard's Melanie Gluck takes us behind the scenes of credit card security. And the security sector bids farewell to Howard Schmidt—leader, advisor, and mentor. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 03 Mar 2017 17:48:01 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>298</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b11bfa06-def8-11ea-911f-b7a992a14c9b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Risk mitigation scores some wins this week. Amazon finds the typo that took out the Internet. Symantec gets into the VC game. Yahoo! agonistes. Wassenaar's prospects. PRC wants cyber peace. And farewell to Howard Schmidt.</itunes:subtitle>
      <itunes:summary>In today's podcast, we review some encouraging news about Android apps, Cloudbleed, and Slack's swift bug patching. Amazon finds a typo at the root of Wednesday's internet outages. Symantec opens a venture arm. Yahoo! breach post mortems continue. Decryption tools for Dharma ransomware are out. Prospects look dim, again, for Wassenaar. China calls for the demilitarization of cyberspace. Terbium's Emily Wilson surveys the Dark Web scene during tax season. MasterCard's Melanie Gluck takes us behind the scenes of credit card security. And the security sector bids farewell to Howard Schmidt—leader, advisor, and mentor. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we review some encouraging news about Android apps, Cloudbleed, and Slack's swift bug patching. Amazon finds a typo at the root of Wednesday's internet outages. Symantec opens a venture arm. Yahoo! breach post mortems continue. Decryption tools for Dharma ransomware are out. Prospects look dim, again, for Wassenaar. China calls for the demilitarization of cyberspace. Terbium's Emily Wilson surveys the Dark Web scene during tax season. MasterCard's Melanie Gluck takes us behind the scenes of credit card security. And the security sector bids farewell to Howard Schmidt—leader, advisor, and mentor. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1258</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9db9a9584506b4b77777255cb7e61562]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8030243367.mp3?updated=1608753238" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Online banking funds transfer fraud. Telegram and phone scams. FCC regulatory update. Insider threats in the IC. And bad robots.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/297/notes</link>
      <description>In today's podcast we hear about how a criminal gang is deploying sophisticated malware against remote banking system customers. Business email compromise continues to appear in the wild—be good to your proofreaders, CEOs. Telegram being used by phone scammers. FCC privacy and caller-ID blocking regulations debated. Vulnerable WordPress plug-in found. Markus Rauschecker from the University of Maryland Center for Health and Homeland Security reviews the privacy implications of Smart Cities. Tony Guada from ThinAir explains the weaponization of data. And life sure was a lot easier before toys became part of the IoT. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 02 Mar 2017 20:57:46 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>297</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b12cbb02-def8-11ea-911f-df874aa163ca/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Online banking funds transfer fraud. Telegram and phone scams. FCC regulatory update. Insider threats in the IC. And bad robots.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about how a criminal gang is deploying sophisticated malware against remote banking system customers. Business email compromise continues to appear in the wild—be good to your proofreaders, CEOs. Telegram being used by phone scammers. FCC privacy and caller-ID blocking regulations debated. Vulnerable WordPress plug-in found. Markus Rauschecker from the University of Maryland Center for Health and Homeland Security reviews the privacy implications of Smart Cities. Tony Guada from ThinAir explains the weaponization of data. And life sure was a lot easier before toys became part of the IoT. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about how a criminal gang is deploying sophisticated malware against remote banking system customers. Business email compromise continues to appear in the wild—be good to your proofreaders, CEOs. Telegram being used by phone scammers. FCC privacy and caller-ID blocking regulations debated. Vulnerable WordPress plug-in found. Markus Rauschecker from the University of Maryland Center for Health and Homeland Security reviews the privacy implications of Smart Cities. Tony Guada from ThinAir explains the weaponization of data. And life sure was a lot easier before toys became part of the IoT. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>980</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a1ea94c85dc2007837ebcfc691ce85dd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4645666718.mp3?updated=1689795843" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Internet outages were errors, not attacks. Evolving Trojans and botnets. M&amp;A news. Cyber casus belli. Terminators and teddy bears.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/296/notes</link>
      <description>In today's podcast, we hear that yesterday's Internet outages were due to errors in Amazon's S3 servers. Dridex has evolved to become more evasive. The Necurs botnet acquires a DDoS capability. Web cache deception attack technique is described. Austrian authorities think they have a suspect in the attempted cyberattack on Vienna's airport. Palo Alto buys LightCyber. Companies continue to grapple with GDPR compliance. Uncertainty about US policy direction expected to drive an increase in foreign cyber espionage. The University of Maryland's Jonathan Katz reviews encryption types. Jon Gross from Cylance explains Snake Wine. Congress thinks about casus belli in cyberspace. And in the IoT, people are worried about everything from Terminators to Teddy bears.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 01 Mar 2017 19:50:50 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>296</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b143c8ce-def8-11ea-911f-071e594f5659/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Internet outages were errors, not attacks. Evolving Trojans and botnets. M&amp;A news. Cyber casus belli. Terminators and teddy bears.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that yesterday's Internet outages were due to errors in Amazon's S3 servers. Dridex has evolved to become more evasive. The Necurs botnet acquires a DDoS capability. Web cache deception attack technique is described. Austrian authorities think they have a suspect in the attempted cyberattack on Vienna's airport. Palo Alto buys LightCyber. Companies continue to grapple with GDPR compliance. Uncertainty about US policy direction expected to drive an increase in foreign cyber espionage. The University of Maryland's Jonathan Katz reviews encryption types. Jon Gross from Cylance explains Snake Wine. Congress thinks about casus belli in cyberspace. And in the IoT, people are worried about everything from Terminators to Teddy bears.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that yesterday's Internet outages were due to errors in Amazon's S3 servers. Dridex has evolved to become more evasive. The Necurs botnet acquires a DDoS capability. Web cache deception attack technique is described. Austrian authorities think they have a suspect in the attempted cyberattack on Vienna's airport. Palo Alto buys LightCyber. Companies continue to grapple with GDPR compliance. Uncertainty about US policy direction expected to drive an increase in foreign cyber espionage. The University of Maryland's Jonathan Katz reviews encryption types. Jon Gross from Cylance explains Snake Wine. Congress thinks about casus belli in cyberspace. And in the IoT, people are worried about everything from Terminators to Teddy bears.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>967</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[53e4cce5b23135d674bd22c4a70d74dd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9554934952.mp3?updated=1689795827" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Alleged BND surveillance of news organizations. Snake Wine in Japan, for disinformation? Singapore military phished. Google discloses more Microsoft unpatched bugs. Cloudbleed update. CloudPets may have privacy issues.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/295/notes</link>
      <description>In today's podcast, we learn that the BND may have been listening to the BBC, but not in a good way. Cylance reports on Snake Wine, a curiously familiar vintage sniffed in Japanese networks. Singapore's military sustains a phishing campaign without sustaining apparent damage. Google discloses more unpatched Microsoft vulnerabilities, these in IE and Edge browsers. Criminals claim to have exploited Cloudbleed, but the jury's still out. Joe Carrigan from the Johns Hopkins University's Information Security Institute helps us understand Cloudbleed. Steven Grossman from Bay Dynamics reviews New York State's newly enacted cyber regulations. And watch your language around those networked stuffed animals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Feb 2017 20:36:03 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>295</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b1592a98-def8-11ea-911f-e3daf5bef31f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Alleged BND surveillance of news organizations. Snake Wine in Japan, for disinformation? Singapore military phished. Google discloses more Microsoft unpatched bugs. Cloudbleed update. CloudPets may have privacy issues.</itunes:subtitle>
      <itunes:summary>In today's podcast, we learn that the BND may have been listening to the BBC, but not in a good way. Cylance reports on Snake Wine, a curiously familiar vintage sniffed in Japanese networks. Singapore's military sustains a phishing campaign without sustaining apparent damage. Google discloses more unpatched Microsoft vulnerabilities, these in IE and Edge browsers. Criminals claim to have exploited Cloudbleed, but the jury's still out. Joe Carrigan from the Johns Hopkins University's Information Security Institute helps us understand Cloudbleed. Steven Grossman from Bay Dynamics reviews New York State's newly enacted cyber regulations. And watch your language around those networked stuffed animals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we learn that the BND may have been listening to the BBC, but not in a good way. Cylance reports on Snake Wine, a curiously familiar vintage sniffed in Japanese networks. Singapore's military sustains a phishing campaign without sustaining apparent damage. Google discloses more unpatched Microsoft vulnerabilities, these in IE and Edge browsers. Criminals claim to have exploited Cloudbleed, but the jury's still out. Joe Carrigan from the Johns Hopkins University's Information Security Institute helps us understand Cloudbleed. Steven Grossman from Bay Dynamics reviews New York State's newly enacted cyber regulations. And watch your language around those networked stuffed animals.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>905</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9d49b76ebafa9002ab369380b3622381]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3809794164.mp3?updated=1689794853" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>If I Only Had a Brain... Artificial Intelligence Gets Real at RSA 2017 [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/13/notes</link>
      <description>At the 2017 RSA conference, artificial intelligence and machine learning were on just about everyone’s list of hot topics. Countless companies are offering AI and ML solutions, with many of them claiming “game changer” status. In this CyberWire special edition, we gather a group of experts to help sort through the hype, try to agree on some definitions, demystify the technology, and make the business case for artificial intelligence.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Feb 2017 01:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>13</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/82cabdee-df03-11ea-ae99-47bef68f180d/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>If I Only Had a Brain... Artificial Intelligence Gets Real at RSA 2017</itunes:subtitle>
      <itunes:summary>At the 2017 RSA conference, artificial intelligence and machine learning were on just about everyone’s list of hot topics. Countless companies are offering AI and ML solutions, with many of them claiming “game changer” status. In this CyberWire special edition, we gather a group of experts to help sort through the hype, try to agree on some definitions, demystify the technology, and make the business case for artificial intelligence.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>At the 2017 RSA conference, artificial intelligence and machine learning were on just about everyone’s list of hot topics. Countless companies are offering AI and ML solutions, with many of them claiming “game changer” status. In this CyberWire special edition, we gather a group of experts to help sort through the hype, try to agree on some definitions, demystify the technology, and make the business case for artificial intelligence.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2066</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4a2c4e85be638305cd909c836370d8af]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2347719421.mp3?updated=1656708013" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cloudbleed and what it means to you. Ransomware updates. News from the Moscow treason trials. Coachella Festival breached.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/294/notes</link>
      <description>In today's podcast, we hear how Cloudflare suffered from Cloudbleed. The bug's now swatted, but it will take a lot of people some time to clear up their passwords. Spora ransomware's customer service gives lousy service. TrumpLocker ransomware's just VenusLocker poaching some brand equity. Pen testers say they can break into most networks in under twelve hours. FBI asked again how it gained access to the San Bernardino jihadist's iPhone. Update on the Moscow treason trials. The University of Maryland Center for Health and Homeland Security's Ben Yelin describes some unintended consequences from a Trump executive order. Headed to Coachella? Hang onto your passwords.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 27 Feb 2017 20:45:55 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>294</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b16f4bac-def8-11ea-911f-5f57b6820669/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cloudbleed and what it means to you. Ransomware updates. News from the Moscow treason trials. Coachella Festival breached.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear how Cloudflare suffered from Cloudbleed. The bug's now swatted, but it will take a lot of people some time to clear up their passwords. Spora ransomware's customer service gives lousy service. TrumpLocker ransomware's just VenusLocker poaching some brand equity. Pen testers say they can break into most networks in under twelve hours. FBI asked again how it gained access to the San Bernardino jihadist's iPhone. Update on the Moscow treason trials. The University of Maryland Center for Health and Homeland Security's Ben Yelin describes some unintended consequences from a Trump executive order. Headed to Coachella? Hang onto your passwords.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear how Cloudflare suffered from Cloudbleed. The bug's now swatted, but it will take a lot of people some time to clear up their passwords. Spora ransomware's customer service gives lousy service. TrumpLocker ransomware's just VenusLocker poaching some brand equity. Pen testers say they can break into most networks in under twelve hours. FBI asked again how it gained access to the San Bernardino jihadist's iPhone. Update on the Moscow treason trials. The University of Maryland Center for Health and Homeland Security's Ben Yelin describes some unintended consequences from a Trump executive order. Headed to Coachella? Hang onto your passwords.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>876</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dc622cfeff4b0b07bde3629b3ecf6ac9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8912937787.mp3?updated=1689794839" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>SHA-1 is broken. Grizzly Steppe and Carbanak. M&amp;A notes. Linux patched. Arrest in Deutsche Telekom hack. The insecurities of connected cars. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/293/notes</link>
      <description>SHA-1 is broken, for real. Grizzly Steppe threat actors seem to have a lot in common with the Carbanak gang. Bitcoin exchange hit by DDoS. Linux patches an old vulnerability. Reuters says Symantec was in talks to buy FireEye, but the companies backed away from a deal. An arrest in the Deutsche Telekom hack. Dr. Charles Clancy from Virginia Tech's Hume Center explores the designation of election systems as critical infrastructure. Jason Porter from AT&amp;T decribes the newly formed IoT Cybersecurity Alliance. And what the vulnerability researchers found when they looked at connected cars.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 24 Feb 2017 20:22:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>293</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b186c2dc-def8-11ea-911f-4f144d5d330a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>SHA-1 is broken. Grizzly Steppe and Carbanak. M&amp;A notes. Linux patched. Arrest in Deutsche Telekom hack. The insecurities of connected cars. </itunes:subtitle>
      <itunes:summary>SHA-1 is broken, for real. Grizzly Steppe threat actors seem to have a lot in common with the Carbanak gang. Bitcoin exchange hit by DDoS. Linux patches an old vulnerability. Reuters says Symantec was in talks to buy FireEye, but the companies backed away from a deal. An arrest in the Deutsche Telekom hack. Dr. Charles Clancy from Virginia Tech's Hume Center explores the designation of election systems as critical infrastructure. Jason Porter from AT&amp;T decribes the newly formed IoT Cybersecurity Alliance. And what the vulnerability researchers found when they looked at connected cars.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>SHA-1 is broken, for real. Grizzly Steppe threat actors seem to have a lot in common with the Carbanak gang. Bitcoin exchange hit by DDoS. Linux patches an old vulnerability. Reuters says Symantec was in talks to buy FireEye, but the companies backed away from a deal. An arrest in the Deutsche Telekom hack. Dr. Charles Clancy from Virginia Tech's Hume Center explores the designation of election systems as critical infrastructure. Jason Porter from AT&amp;T decribes the newly formed IoT Cybersecurity Alliance. And what the vulnerability researchers found when they looked at connected cars.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1265</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a0776ebe56d957b1aded679e18d25cc5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7712998805.mp3?updated=1608753242" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Patcher ransomware. Locky, Cryptowall, and Cerber are still active; so is old-fashioned blackmail. NSA keeps the VEP. Reactions to New York State's cyber regs for banks. Observations of BugDrop, and thoughts on cyber war and attribution.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/292/notes</link>
      <description>In today's podcast, we hear about how Patcher ransomware is infesting Macs. Locky, Cryptowall, and Cerber are also still out and about in the wild. NSA seems likely to continue its Vulnerabilities Equities Process. Industry reactions to New York State's coming cybersecurity regulations for financial institutions. A look back at RSA discussions of cyber warfare. Further developments in the study of BugDrop malware. Terbium Labs' Emily Wilson examines the way novel exploits becomes part of the standard tool kit. And TruSTAR looks at Grizzly Steppe and has some thoughts on the difficulties of attribution.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 23 Feb 2017 19:59:33 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>292</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b19a4f14-def8-11ea-911f-23fa2f7f8d66/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Patcher ransomware. Locky, Cryptowall, and Cerber are still active; so is old-fashioned blackmail. NSA keeps the VEP. Reactions to New York State's cyber regs for banks. Observations of BugDrop, and thoughts on cyber war and attribution.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how Patcher ransomware is infesting Macs. Locky, Cryptowall, and Cerber are also still out and about in the wild. NSA seems likely to continue its Vulnerabilities Equities Process. Industry reactions to New York State's coming cybersecurity regulations for financial institutions. A look back at RSA discussions of cyber warfare. Further developments in the study of BugDrop malware. Terbium Labs' Emily Wilson examines the way novel exploits becomes part of the standard tool kit. And TruSTAR looks at Grizzly Steppe and has some thoughts on the difficulties of attribution.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how Patcher ransomware is infesting Macs. Locky, Cryptowall, and Cerber are also still out and about in the wild. NSA seems likely to continue its Vulnerabilities Equities Process. Industry reactions to New York State's coming cybersecurity regulations for financial institutions. A look back at RSA discussions of cyber warfare. Further developments in the study of BugDrop malware. Terbium Labs' Emily Wilson examines the way novel exploits becomes part of the standard tool kit. And TruSTAR looks at Grizzly Steppe and has some thoughts on the difficulties of attribution.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>934</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[052635996decfa50c2fdacacb8552a7e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6258328289.mp3?updated=1689794808" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Influence operations. A new Mirai version is potentially more dangerous than the old one. Proofs of concept. New York's cyber security regulations for banks. What Verizon will get from Yahoo!</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/291/notes</link>
      <description>In today's podcast, we hear from Paris that Moscow's not welcome in upcoming French elections. A new version of Mirai is out, spreading through Windows systems. Researchers warn of FTP protocol injection vulnerabilities in Python and Java. A new JavaScript exploit may affect Internet Explorer. New York State's new financial sector cyber regulations take effect next Wednesday. The Johns Hopkins University's Joe Carrigan reviews privacy tools from the EFF. Mark Dufresne from Endgame explains Fileless Attacks.  A quick glance back at RSA, and some analysts' thoughts on why Verizon still wants Yahoo!'s assets. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 22 Feb 2017 20:41:55 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>291</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b1b2a8b6-def8-11ea-911f-fb6c454f1b89/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Influence operations. A new Mirai version is potentially more dangerous than the old one. Proofs of concept. New York's cyber security regulations for banks. What Verizon will get from Yahoo!</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear from Paris that Moscow's not welcome in upcoming French elections. A new version of Mirai is out, spreading through Windows systems. Researchers warn of FTP protocol injection vulnerabilities in Python and Java. A new JavaScript exploit may affect Internet Explorer. New York State's new financial sector cyber regulations take effect next Wednesday. The Johns Hopkins University's Joe Carrigan reviews privacy tools from the EFF. Mark Dufresne from Endgame explains Fileless Attacks.  A quick glance back at RSA, and some analysts' thoughts on why Verizon still wants Yahoo!'s assets. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear from Paris that Moscow's not welcome in upcoming French elections. A new version of Mirai is out, spreading through Windows systems. Researchers warn of FTP protocol injection vulnerabilities in Python and Java. A new JavaScript exploit may affect Internet Explorer. New York State's new financial sector cyber regulations take effect next Wednesday. The Johns Hopkins University's Joe Carrigan reviews privacy tools from the EFF. Mark Dufresne from Endgame explains Fileless Attacks.  A quick glance back at RSA, and some analysts' thoughts on why Verizon still wants Yahoo!'s assets. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>988</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1b9852f7f3b56cc05f1780130a9d8da9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8177147931.mp3?updated=1689794784" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A coming surge in North Korean hacking? Middle Eastern cyber espionage campaigns. Microsoft patch issues. Infowar updates. NIST's draft electrical utility cyber guidance. Problematic toys.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/290/notes</link>
      <description>In today's podcast, we hear that analysts are predicting a surge in North Korean hacking after China embargoes coal. ViperRAT catphishes the IDF. Magic Hound and Shamoon both use malicious macros to infect victim systems. TASS says no one really knows who hacked OSCE. Sputnik teases with a WikiLeaks tease. RSA Security's Zulfikar Ramzan offers insights from the conference. UMD Center for Health and Homeland Security's Markus Rauschecker explains how Airbnb might be affecting some foundational elements of the internet. Google shames Microsoft over patching. NIST has cyber advice for power utilities. Some RSA notes, and My Friend Cayla gets the boot from Berlin.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Feb 2017 19:54:24 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>290</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b1dce950-def8-11ea-911f-1b1e3ea753c8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A coming surge in North Korean hacking? Middle Eastern cyber espionage campaigns. Microsoft patch issues. Infowar updates. NIST's draft electrical utility cyber guidance. Problematic toys.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that analysts are predicting a surge in North Korean hacking after China embargoes coal. ViperRAT catphishes the IDF. Magic Hound and Shamoon both use malicious macros to infect victim systems. TASS says no one really knows who hacked OSCE. Sputnik teases with a WikiLeaks tease. RSA Security's Zulfikar Ramzan offers insights from the conference. UMD Center for Health and Homeland Security's Markus Rauschecker explains how Airbnb might be affecting some foundational elements of the internet. Google shames Microsoft over patching. NIST has cyber advice for power utilities. Some RSA notes, and My Friend Cayla gets the boot from Berlin.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that analysts are predicting a surge in North Korean hacking after China embargoes coal. ViperRAT catphishes the IDF. Magic Hound and Shamoon both use malicious macros to infect victim systems. TASS says no one really knows who hacked OSCE. Sputnik teases with a WikiLeaks tease. RSA Security's Zulfikar Ramzan offers insights from the conference. UMD Center for Health and Homeland Security's Markus Rauschecker explains how Airbnb might be affecting some foundational elements of the internet. Google shames Microsoft over patching. NIST has cyber advice for power utilities. Some RSA notes, and My Friend Cayla gets the boot from Berlin.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>980</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[633d0c522785f8adb7ec06dfbf47f107]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2383733389.mp3?updated=1689794768" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>International norms of cyber conflict. Fancy Bear's tradecraft (with a side of дезинформа́ция). RDPPatcher, Cerber, Ticketbleed, and Hermes. And the vibe around RSA 2017.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/289/notes</link>
      <description>In today's podcast, we talk about hybrid warfare, with disinformation, cyber espionage, and spyware infestations—we also hear calls for norms of cyber conflict. BugDrop is active in Ukraine, and researchers see some cut-and-paste oddness slip from Fancy Bear's paws. A new X-Agent variant is out: this one infects Macs. Ransomware thumbs its nose at security products. A look at RSA trends as the conference closes. A converation with City of San Diego CISO and author Gary Hayslip. Rick Howard from Palo Alto Networks on a new addition to the Cyber Canon that's all about DevOps. And where do we get one of those "Has no purchase authority" T-shirts?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 17 Feb 2017 19:58:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>289</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b1fbe5ee-def8-11ea-911f-179445b53bee/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>International norms of cyber conflict. Fancy Bear's tradecraft (with a side of дезинформа́ция). RDPPatcher, Cerber, Ticketbleed, and Hermes. And the vibe around RSA 2017.</itunes:subtitle>
      <itunes:summary>In today's podcast, we talk about hybrid warfare, with disinformation, cyber espionage, and spyware infestations—we also hear calls for norms of cyber conflict. BugDrop is active in Ukraine, and researchers see some cut-and-paste oddness slip from Fancy Bear's paws. A new X-Agent variant is out: this one infects Macs. Ransomware thumbs its nose at security products. A look at RSA trends as the conference closes. A converation with City of San Diego CISO and author Gary Hayslip. Rick Howard from Palo Alto Networks on a new addition to the Cyber Canon that's all about DevOps. And where do we get one of those "Has no purchase authority" T-shirts?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we talk about hybrid warfare, with disinformation, cyber espionage, and spyware infestations—we also hear calls for norms of cyber conflict. BugDrop is active in Ukraine, and researchers see some cut-and-paste oddness slip from Fancy Bear's paws. A new X-Agent variant is out: this one infects Macs. Ransomware thumbs its nose at security products. A look at RSA trends as the conference closes. A converation with City of San Diego CISO and author Gary Hayslip. Rick Howard from Palo Alto Networks on a new addition to the Cyber Canon that's all about DevOps. And where do we get one of those "Has no purchase authority" T-shirts?</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1276</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5bf2330b562c40230eb2310864eaf2ad]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8015724896.mp3?updated=1608753238" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ukraine accused Russia of renewed hacking by BlackEnergy actors. ASLR bypass proof-of-concept reported.  Notes from RSA, and an update on Android gunnery malware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/288/notes</link>
      <description>In today's podcast, in addition to notes from RSA, we hear some fresh accusations of Russian government hacking from Ukraine. Threat actors adapt. ASLR bypass exploit demonstrated. Yahoo!'s acquisition by Verizon appears likely to be deeply discounted. From RSA, notes on coming industry consolidation. Dale Drew from Level 3 Communications offers a strategy for choosing security vendors. James Lyne from Sophos provides his take of the RSA conference from the show floor. An update on the Popr-D3 Android malware. How they name the bears.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 16 Feb 2017 19:32:08 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>288</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b20c9ccc-def8-11ea-911f-571157984923/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ukraine accused Russia of renewed hacking by BlackEnergy actors. ASLR bypass proof-of-concept reported.  Notes from RSA, and an update on Android gunnery malware.</itunes:subtitle>
      <itunes:summary>In today's podcast, in addition to notes from RSA, we hear some fresh accusations of Russian government hacking from Ukraine. Threat actors adapt. ASLR bypass exploit demonstrated. Yahoo!'s acquisition by Verizon appears likely to be deeply discounted. From RSA, notes on coming industry consolidation. Dale Drew from Level 3 Communications offers a strategy for choosing security vendors. James Lyne from Sophos provides his take of the RSA conference from the show floor. An update on the Popr-D3 Android malware. How they name the bears.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, in addition to notes from RSA, we hear some fresh accusations of Russian government hacking from Ukraine. Threat actors adapt. ASLR bypass exploit demonstrated. Yahoo!'s acquisition by Verizon appears likely to be deeply discounted. From RSA, notes on coming industry consolidation. Dale Drew from Level 3 Communications offers a strategy for choosing security vendors. James Lyne from Sophos provides his take of the RSA conference from the show floor. An update on the Popr-D3 Android malware. How they name the bears.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>936</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[726acdf784b3dbc9eaa03d66c0e62aa4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3786931225.mp3?updated=1689794740" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Nation-states or criminal gangs? Update on Polish banking attacks. And an update on RSA.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/287/notes</link>
      <description>In today's podcast we consider the difficulty of distinguishing nation-state hacks from criminal capers. It's not always clear, and sometimes it's a distinction without a difference. But in any case, many call for international norms of cyber conflict. Waterholes and catphish. Ben Yelin reviews President Obama's security legacy. Steve Grobman from Intel Security on the challenges of changing course. RSA is at its midpoint; we offer some of what we're hearing on the floor about false alarms, where to draw the perimeter, and concerns about the Internet-of-things.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 15 Feb 2017 20:58:53 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>287</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b22fa51e-def8-11ea-911f-bfec92f57f51/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Nation-states or criminal gangs? Update on Polish banking attacks. And an update on RSA.</itunes:subtitle>
      <itunes:summary>In today's podcast we consider the difficulty of distinguishing nation-state hacks from criminal capers. It's not always clear, and sometimes it's a distinction without a difference. But in any case, many call for international norms of cyber conflict. Waterholes and catphish. Ben Yelin reviews President Obama's security legacy. Steve Grobman from Intel Security on the challenges of changing course. RSA is at its midpoint; we offer some of what we're hearing on the floor about false alarms, where to draw the perimeter, and concerns about the Internet-of-things.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we consider the difficulty of distinguishing nation-state hacks from criminal capers. It's not always clear, and sometimes it's a distinction without a difference. But in any case, many call for international norms of cyber conflict. Waterholes and catphish. Ben Yelin reviews President Obama's security legacy. Steve Grobman from Intel Security on the challenges of changing course. RSA is at its midpoint; we offer some of what we're hearing on the floor about false alarms, where to draw the perimeter, and concerns about the Internet-of-things.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>967</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a04b13580b9f33d3d23a6a6853c36cda]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2864844833.mp3?updated=1689794725" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>RSA Updates. Microsoft calls for Geneva Convention for cyber. Phishing.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/286/notes</link>
      <description>Researchers look into a wave of attacks on financial institutions. Microsoft calls for Geneva Convention for cyberspace. We take a look at phishing. The RSA conference is underway, and we’ve got news from the innovation sandbox, and venture capitalists. Trevor Hawthorn from Wombat Security shares insights from their State of the Phish report. Emily Wilson from Terbium Labs outlines nationalism on the dark web.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Feb 2017 23:54:44 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>286</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b2528642-def8-11ea-911f-ff0448541d67/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>RSA Updates. Microsoft calls for Geneva Convention for cyber. Phishing.</itunes:subtitle>
      <itunes:summary>Researchers look into a wave of attacks on financial institutions. Microsoft calls for Geneva Convention for cyberspace. We take a look at phishing. The RSA conference is underway, and we’ve got news from the innovation sandbox, and venture capitalists. Trevor Hawthorn from Wombat Security shares insights from their State of the Phish report. Emily Wilson from Terbium Labs outlines nationalism on the dark web.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Researchers look into a wave of attacks on financial institutions. Microsoft calls for Geneva Convention for cyberspace. We take a look at phishing. The RSA conference is underway, and we’ve got news from the innovation sandbox, and venture capitalists. Trevor Hawthorn from Wombat Security shares insights from their State of the Phish report. Emily Wilson from Terbium Labs outlines nationalism on the dark web.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>907</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2dde0afefd6b7b1ea3f779011c0272a3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7511169016.mp3?updated=1689789066" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cyber attacks reported in the Middle East, from both states and non-state actors. Italy's Foreign Ministry hacked for months in 2016. Cyber and kinetic operations. RSA's Innovation Sandbox.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/285/notes</link>
      <description>In today's podcast, Hamas appears to have improved its cyber attack capabilities. Egypt is believed to be ramping up Internet surveillance. ISIS sympathizers are being targeted with Android malware delivered over Telegram. The US increasingly integrates cyber into kinetic military operations. Russia is suspected of hacking the Italian Foreign Ministry. Malek Ben Salem from Accenture Technology Labs describes privacy techniques for data mining. And, of course, we begin our coverage of RSA in in San Francisco with a look at the annual Innovation Sandbox.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 13 Feb 2017 19:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>285</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b271ff2c-def8-11ea-911f-63c2dca9dc24/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyber attacks reported in the Middle East, from both states and non-state actors. Italy's Foreign Ministry hacked for months in 2016. Cyber and kinetic operations. RSA's Innovation Sandbox.</itunes:subtitle>
      <itunes:summary>In today's podcast, Hamas appears to have improved its cyber attack capabilities. Egypt is believed to be ramping up Internet surveillance. ISIS sympathizers are being targeted with Android malware delivered over Telegram. The US increasingly integrates cyber into kinetic military operations. Russia is suspected of hacking the Italian Foreign Ministry. Malek Ben Salem from Accenture Technology Labs describes privacy techniques for data mining. And, of course, we begin our coverage of RSA in in San Francisco with a look at the annual Innovation Sandbox.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, Hamas appears to have improved its cyber attack capabilities. Egypt is believed to be ramping up Internet surveillance. ISIS sympathizers are being targeted with Android malware delivered over Telegram. The US increasingly integrates cyber into kinetic military operations. Russia is suspected of hacking the Italian Foreign Ministry. Malek Ben Salem from Accenture Technology Labs describes privacy techniques for data mining. And, of course, we begin our coverage of RSA in in San Francisco with a look at the annual Innovation Sandbox.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>964</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4dab028037e32f4a6a2c5385a846adc6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2302202804.mp3?updated=1689789046" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title> Patching: the good, the bad, and the ugly. Script kiddies and disinhibition (with a caution about attribution). Industry notes, RSA, and Valentine's Day.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/284/notes</link>
      <description>In today's podcast we hear about patching: the good, the bad, and the ugly. But mostly the good. Dridex is back. Brussels airport hacker turns out to be a literal script-kiddie, with the emphasis on the "kiddie." Moscow treason trials shut down Russian cooperation with Western law enforcement. Robert Lord from Protenus returns to share their Breach Barometer Report results. Ben Yelin from the University of Maryland Center for Health and Homeland Security revisits the Playpen case. Industry notes, a look ahead to RSA, and some Valentine's Day advice.
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 10 Feb 2017 19:50:34 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>284</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b2884e9e-def8-11ea-911f-5b783901c5f4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle> Patching: the good, the bad, and the ugly. Script kiddies and disinhibition (with a caution about attribution). Industry notes, RSA, and Valentine's Day.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about patching: the good, the bad, and the ugly. But mostly the good. Dridex is back. Brussels airport hacker turns out to be a literal script-kiddie, with the emphasis on the "kiddie." Moscow treason trials shut down Russian cooperation with Western law enforcement. Robert Lord from Protenus returns to share their Breach Barometer Report results. Ben Yelin from the University of Maryland Center for Health and Homeland Security revisits the Playpen case. Industry notes, a look ahead to RSA, and some Valentine's Day advice.
  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about patching: the good, the bad, and the ugly. But mostly the good. Dridex is back. Brussels airport hacker turns out to be a literal script-kiddie, with the emphasis on the "kiddie." Moscow treason trials shut down Russian cooperation with Western law enforcement. Robert Lord from Protenus returns to share their Breach Barometer Report results. Ben Yelin from the University of Maryland Center for Health and Homeland Security revisits the Playpen case. Industry notes, a look ahead to RSA, and some Valentine's Day advice.</p> <p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1281</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8405ce47bfd390d8fd4903ef09ada4c0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7593081859.mp3?updated=1608753242" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The Martin NSA-contractor case. Fileless malware hits banks worldwide. DDoS tools undergo refinement. Ransomware developments. Industry notes. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/283/notes</link>
      <description>In today's podcast we review some updates on the Martin NSA-contractor case. Fileless malware hits banks worldwide. DDoS tools undergo refinement. Researchers take a look at ransomware developments. It's been an active week for the cyber sector in mergers, acquisitions, and venture funding. There's a new industry consortium for IoT security, and an autonomous vehicle consortium issues a manifesto for cooperation. Conga CISO Travis Howe shared his thoughts on privacy. The Johns Hopkins University's Joe Carrigan provides tips on third party DNS. And we suggest some good alternatives to doing random stuff.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 09 Feb 2017 20:44:51 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>283</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b29b91ca-def8-11ea-911f-5bd7598d3949/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The Martin NSA-contractor case. Fileless malware hits banks worldwide. DDoS tools undergo refinement. Ransomware developments. Industry notes. </itunes:subtitle>
      <itunes:summary>In today's podcast we review some updates on the Martin NSA-contractor case. Fileless malware hits banks worldwide. DDoS tools undergo refinement. Researchers take a look at ransomware developments. It's been an active week for the cyber sector in mergers, acquisitions, and venture funding. There's a new industry consortium for IoT security, and an autonomous vehicle consortium issues a manifesto for cooperation. Conga CISO Travis Howe shared his thoughts on privacy. The Johns Hopkins University's Joe Carrigan provides tips on third party DNS. And we suggest some good alternatives to doing random stuff.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we review some updates on the Martin NSA-contractor case. Fileless malware hits banks worldwide. DDoS tools undergo refinement. Researchers take a look at ransomware developments. It's been an active week for the cyber sector in mergers, acquisitions, and venture funding. There's a new industry consortium for IoT security, and an autonomous vehicle consortium issues a manifesto for cooperation. Conga CISO Travis Howe shared his thoughts on privacy. The Johns Hopkins University's Joe Carrigan provides tips on third party DNS. And we suggest some good alternatives to doing random stuff.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>993</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ef99b29f7f99c4ac736d13c085b67342]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1872041780.mp3?updated=1689789010" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Islamist hackers hit websites in Britain and Austria. Mac malware linked to Iran. Criminals follow the money into the cloud. M&amp;A notes. Dendroid RAT author gets probation.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/282/notes</link>
      <description>In today's podcast, we hear that ISIS-affiliated hackers deface UK National Health Service sites with propaganda. Turkish Islamists DDoS Austria's parliament. Poorly crafted, but troubling, Mac malware seems linked to Iran. Criminals follow the money into the cloud. Salient buys Triple I, Malwarebytes picks up Saferbytes, and Sophos buys Invincea. Pala Alto Networks' Rick Howard walks us through the adversary playbok. The author and purveyor of the Dendroid RAT gets probation.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 08 Feb 2017 18:57:02 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>282</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b2b0da62-def8-11ea-911f-f7baa265e828/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Islamist hackers hit websites in Britain and Austria. Mac malware linked to Iran. Criminals follow the money into the cloud. M&amp;A notes. Dendroid RAT author gets probation.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that ISIS-affiliated hackers deface UK National Health Service sites with propaganda. Turkish Islamists DDoS Austria's parliament. Poorly crafted, but troubling, Mac malware seems linked to Iran. Criminals follow the money into the cloud. Salient buys Triple I, Malwarebytes picks up Saferbytes, and Sophos buys Invincea. Pala Alto Networks' Rick Howard walks us through the adversary playbok. The author and purveyor of the Dendroid RAT gets probation.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that ISIS-affiliated hackers deface UK National Health Service sites with propaganda. Turkish Islamists DDoS Austria's parliament. Poorly crafted, but troubling, Mac malware seems linked to Iran. Criminals follow the money into the cloud. Salient buys Triple I, Malwarebytes picks up Saferbytes, and Sophos buys Invincea. Pala Alto Networks' Rick Howard walks us through the adversary playbok. The author and purveyor of the Dendroid RAT gets probation.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>951</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[165156018f2ce81e97397e9a67194878]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9314085755.mp3?updated=1689788989" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Brokerages in Taiwan face DDoS extortion. Polish banks hit in watering hole attack. Cyber vigilantes. Information operations. ShadowBrokers update?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/281/notes</link>
      <description>In today's podcast, we hear about brokerages in Taiwan being extorted with threats of DDoS. Polish banks compromised in watering hole campaign. Criminals turn from JavaScript to less obviously suspicious kinds of files. Cyber vigilantes poke at unsecured printers and dark web hosting. China ratchets up its efforts to control its Internet. The US shares classified intelligence on Russian influence operations with European allies, and works on its own information operations capability. Dale Drew from Level 3 Communications takes note of the increase in ransomware. Rami Essaid from Distil Networks describes efforts to combat ticket scalping bots. And a former NSA contractor will probably face espionage charges related to the ShadowBrokers.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Feb 2017 21:08:42 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>281</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b2cde184-def8-11ea-911f-abad9abc3dc9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Brokerages in Taiwan face DDoS extortion. Polish banks hit in watering hole attack. Cyber vigilantes. Information operations. ShadowBrokers update?</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about brokerages in Taiwan being extorted with threats of DDoS. Polish banks compromised in watering hole campaign. Criminals turn from JavaScript to less obviously suspicious kinds of files. Cyber vigilantes poke at unsecured printers and dark web hosting. China ratchets up its efforts to control its Internet. The US shares classified intelligence on Russian influence operations with European allies, and works on its own information operations capability. Dale Drew from Level 3 Communications takes note of the increase in ransomware. Rami Essaid from Distil Networks describes efforts to combat ticket scalping bots. And a former NSA contractor will probably face espionage charges related to the ShadowBrokers.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about brokerages in Taiwan being extorted with threats of DDoS. Polish banks compromised in watering hole campaign. Criminals turn from JavaScript to less obviously suspicious kinds of files. Cyber vigilantes poke at unsecured printers and dark web hosting. China ratchets up its efforts to control its Internet. The US shares classified intelligence on Russian influence operations with European allies, and works on its own information operations capability. Dale Drew from Level 3 Communications takes note of the increase in ransomware. Rami Essaid from Distil Networks describes efforts to combat ticket scalping bots. And a former NSA contractor will probably face espionage charges related to the ShadowBrokers.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>982</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a8a7154a416f99e1da110ec87563f289]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2129331311.mp3?updated=1689788969" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Crime, not education. Slot machine scams. Ransomware updates. Fancy Bear in Norway? Russian treason charges. GCHQ say no to "witchcraft." </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/280/notes</link>
      <description>In today's podcast, we hear about how criminal markets offer ransomware-as-a-service under the guise of education. The UK's NHS and Licking County Ohio deal with separate ransomware attacks. The Slammer worm tried a comeback after fourteen years—so patch those known vulnerabilities. Crooks scammed slot machines, possibly by defeating their pseudo-random number generation. Norway tracks Fancy Bear. Russia says FSB officers charged with treason gave info to the Americans, but not necessarily the CIA. Markus Rauschecker outlines proposed changes to the email privacy act. GCHQ says security companies are peddling "witchcraft."
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 06 Feb 2017 20:26:01 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>280</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b2df9776-def8-11ea-911f-0f0c987be771/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Crime, not education. Slot machine scams. Ransomware updates. Fancy Bear in Norway? Russian treason charges. GCHQ say no to "witchcraft." </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how criminal markets offer ransomware-as-a-service under the guise of education. The UK's NHS and Licking County Ohio deal with separate ransomware attacks. The Slammer worm tried a comeback after fourteen years—so patch those known vulnerabilities. Crooks scammed slot machines, possibly by defeating their pseudo-random number generation. Norway tracks Fancy Bear. Russia says FSB officers charged with treason gave info to the Americans, but not necessarily the CIA. Markus Rauschecker outlines proposed changes to the email privacy act. GCHQ says security companies are peddling "witchcraft."
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how criminal markets offer ransomware-as-a-service under the guise of education. The UK's NHS and Licking County Ohio deal with separate ransomware attacks. The Slammer worm tried a comeback after fourteen years—so patch those known vulnerabilities. Crooks scammed slot machines, possibly by defeating their pseudo-random number generation. Norway tracks Fancy Bear. Russia says FSB officers charged with treason gave info to the Americans, but not necessarily the CIA. Markus Rauschecker outlines proposed changes to the email privacy act. GCHQ says security companies are peddling "witchcraft."</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>876</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0bd4a6d2d9fffb46e78ffcf08d2cd554]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8259862577.mp3?updated=1689788950" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Jailbreaking or forensics? W-2s and business email compromise. Router vulnerabilities. Windows zero-day. Enterprise security priorities. Iranians cyber ops and Iranian dissent. US-Russian cyber tensions.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/279/notes</link>
      <description>In today's podcast, we hear reports that Cellebrite forensic tools have been dumped online. The IRS warns that W-2 fraud is being combined with business email compromise. Cisco router vulnerabilities are under discussion. A Windows zero-day can produce the blue screen of death. Recent surveys prompt a review of enterprise security spending priorities: the perimeter is down, the endpoint is up, and network visibility is everywhere. Russia's treason trial proceeds. The US sends a good-cop/bad-cop message, or maybe just a mixed message, in cyber. Accenture Technology's Malek Ben Salem discusses embedded device security. Author Frederick Lane on his latest book, Cybertraps for Expecting Moms and Dads. And is Hogwarts in Buckinghamshire, or the Monongahela Valley?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 03 Feb 2017 20:19:46 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>279</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b2f12252-def8-11ea-911f-4f679baf28f3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Jailbreaking or forensics? W-2s and business email compromise. Router vulnerabilities. Windows zero-day. Enterprise security priorities. Iranians cyber ops and Iranian dissent. US-Russian cyber tensions.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear reports that Cellebrite forensic tools have been dumped online. The IRS warns that W-2 fraud is being combined with business email compromise. Cisco router vulnerabilities are under discussion. A Windows zero-day can produce the blue screen of death. Recent surveys prompt a review of enterprise security spending priorities: the perimeter is down, the endpoint is up, and network visibility is everywhere. Russia's treason trial proceeds. The US sends a good-cop/bad-cop message, or maybe just a mixed message, in cyber. Accenture Technology's Malek Ben Salem discusses embedded device security. Author Frederick Lane on his latest book, Cybertraps for Expecting Moms and Dads. And is Hogwarts in Buckinghamshire, or the Monongahela Valley?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear reports that Cellebrite forensic tools have been dumped online. The IRS warns that W-2 fraud is being combined with business email compromise. Cisco router vulnerabilities are under discussion. A Windows zero-day can produce the blue screen of death. Recent surveys prompt a review of enterprise security spending priorities: the perimeter is down, the endpoint is up, and network visibility is everywhere. Russia's treason trial proceeds. The US sends a good-cop/bad-cop message, or maybe just a mixed message, in cyber. Accenture Technology's Malek Ben Salem discusses embedded device security. Author Frederick Lane on his latest book, Cybertraps for Expecting Moms and Dads. And is Hogwarts in Buckinghamshire, or the Monongahela Valley?</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1226</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ecc571c0d2462a0a1a8e35d550d44f5b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7647809884.mp3?updated=1608753218" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>A black market for insider information. Cisco studies data breaches. The Internet as a threat actor's R&amp;D infrastructure.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/278/notes</link>
      <description>In today's podcast, we hear about how criminals are recruiting company insiders, and how the black market trades insider information for illicit speculation. Cisco studies the costs and causes of data breaches, and the security industry offers reactions. Jonathan Katz from the University of Maryland describes searchable encryption. Vadim Vladimirskiy from Nerdio explains IT as a Service. The Internet seems to serve, again, as an R&amp;D resource for threat actors. This time it's ISIS and commercial drones, but there's a lot out there for sale and trade. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 02 Feb 2017 18:50:53 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>278</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b30920c8-def8-11ea-911f-d3d164d2ec4c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A black market for insider information. Cisco studies data breaches. The Internet as a threat actor's R&amp;D infrastructure.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how criminals are recruiting company insiders, and how the black market trades insider information for illicit speculation. Cisco studies the costs and causes of data breaches, and the security industry offers reactions. Jonathan Katz from the University of Maryland describes searchable encryption. Vadim Vladimirskiy from Nerdio explains IT as a Service. The Internet seems to serve, again, as an R&amp;D resource for threat actors. This time it's ISIS and commercial drones, but there's a lot out there for sale and trade. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how criminals are recruiting company insiders, and how the black market trades insider information for illicit speculation. Cisco studies the costs and causes of data breaches, and the security industry offers reactions. Jonathan Katz from the University of Maryland describes searchable encryption. Vadim Vladimirskiy from Nerdio explains IT as a Service. The Internet seems to serve, again, as an R&amp;D resource for threat actors. This time it's ISIS and commercial drones, but there's a lot out there for sale and trade. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>965</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[96ec8987e47297bec2f01552b3df99ca]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9179551095.mp3?updated=1689788898" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Bear prints around the Czech Foreign Ministry. Tinker, tailor, soldier, hacker, Humpty Dumpty. Gamer forum breaches. Where in the world is Phineas Phisher?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/277/notes</link>
      <description>Bear prints in the Czech foreign ministry. Tinker, tailor, soldier, hacker in Moscow, with a side of Humpty Dumpty. Gamer forum data breaches go undetected for seventeen months. Credential reuse (and the limitations of human memory) are seen as a big threat to security. An IBM study throws up its hands over the state of healthcare cyber security. Trustwave's Chris Schueler reviews their latest report on resource limitations. Emily Wilson from Terbium Labs tracks the increased use of doxing. And Phineas Phisher, depending on whom you believe, is either under arrest or still at large.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 01 Feb 2017 20:25:25 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>277</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b32c10d8-def8-11ea-911f-e3e2b7d4eb3b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Bear prints around the Czech Foreign Ministry. Tinker, tailor, soldier, hacker, Humpty Dumpty. Gamer forum breaches. Where in the world is Phineas Phisher?</itunes:subtitle>
      <itunes:summary>Bear prints in the Czech foreign ministry. Tinker, tailor, soldier, hacker in Moscow, with a side of Humpty Dumpty. Gamer forum data breaches go undetected for seventeen months. Credential reuse (and the limitations of human memory) are seen as a big threat to security. An IBM study throws up its hands over the state of healthcare cyber security. Trustwave's Chris Schueler reviews their latest report on resource limitations. Emily Wilson from Terbium Labs tracks the increased use of doxing. And Phineas Phisher, depending on whom you believe, is either under arrest or still at large.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Bear prints in the Czech foreign ministry. Tinker, tailor, soldier, hacker in Moscow, with a side of Humpty Dumpty. Gamer forum data breaches go undetected for seventeen months. Credential reuse (and the limitations of human memory) are seen as a big threat to security. An IBM study throws up its hands over the state of healthcare cyber security. Trustwave's Chris Schueler reviews their latest report on resource limitations. Emily Wilson from Terbium Labs tracks the increased use of doxing. And Phineas Phisher, depending on whom you believe, is either under arrest or still at large.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>990</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[45f62faf3cfdd086aa25266ea43b9490]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8291471770.mp3?updated=1689788879" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Ransomware updates. Netgear vulnerabilities and patches. Breaking Android pattern lock. Delegated Recovery. Information operations.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/276/notes</link>
      <description>In today's podcast, we review some ransomware developments: the good, the bad, and the ugly. Netgear routers and the mom-and-pop dilemma. Breaking Android pattern locks. Facebook has a novel approach to password recovery. Keysight will buy Ixia, and IBM's acquisition of Agile 3 Solutions gets positive analyst reviews. Australia's Data61 innovation shop wants to go all-in for cyber. ISIS makes hay of US immigration policy, but the group shows signs of cracks. Ben Yelin from the University of Maryland Center for Health and Homeland Securty revisits the CoinBase vs IRS case. Ian Cowger from RiskIQ explains malvertising. And remember Shaltai-Boltai.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 31 Jan 2017 20:35:17 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>276</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b342a230-def8-11ea-911f-0351255d1aa5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ransomware updates. Netgear vulnerabilities and patches. Breaking Android pattern lock. Delegated Recovery. Information operations.</itunes:subtitle>
      <itunes:summary>In today's podcast, we review some ransomware developments: the good, the bad, and the ugly. Netgear routers and the mom-and-pop dilemma. Breaking Android pattern locks. Facebook has a novel approach to password recovery. Keysight will buy Ixia, and IBM's acquisition of Agile 3 Solutions gets positive analyst reviews. Australia's Data61 innovation shop wants to go all-in for cyber. ISIS makes hay of US immigration policy, but the group shows signs of cracks. Ben Yelin from the University of Maryland Center for Health and Homeland Securty revisits the CoinBase vs IRS case. Ian Cowger from RiskIQ explains malvertising. And remember Shaltai-Boltai.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we review some ransomware developments: the good, the bad, and the ugly. Netgear routers and the mom-and-pop dilemma. Breaking Android pattern locks. Facebook has a novel approach to password recovery. Keysight will buy Ixia, and IBM's acquisition of Agile 3 Solutions gets positive analyst reviews. Australia's Data61 innovation shop wants to go all-in for cyber. ISIS makes hay of US immigration policy, but the group shows signs of cracks. Ben Yelin from the University of Maryland Center for Health and Homeland Securty revisits the CoinBase vs IRS case. Ian Cowger from RiskIQ explains malvertising. And remember Shaltai-Boltai.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>975</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d8d4e53b2831c661e525ef38c6ca8e15]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9727755276.mp3?updated=1689788423" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>2017 Cyber Security Forecast [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/12/notes</link>
      <description>WWhat are you expecting in 2017 when it comes to cyber security? There are sure to be attacks like we saw last year, ransomware and botnets, IoT vulnerabilities we just didn’t see coming. And what about all of those unfilled jobs? Can automation help fill the gap? Is the board room finally going to give cyber the attention it deserves? How will president Trump affect cyber policy?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 31 Jan 2017 18:43:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>12</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/81454ebc-df03-11ea-9ebd-af576e521155/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>2017 Cyber Security Forecast</itunes:subtitle>
      <itunes:summary>WWhat are you expecting in 2017 when it comes to cyber security? There are sure to be attacks like we saw last year, ransomware and botnets, IoT vulnerabilities we just didn’t see coming. And what about all of those unfilled jobs? Can automation help fill the gap? Is the board room finally going to give cyber the attention it deserves? How will president Trump affect cyber policy?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>WWhat are you expecting in 2017 when it comes to cyber security? There are sure to be attacks like we saw last year, ransomware and botnets, IoT vulnerabilities we just didn’t see coming. And what about all of those unfilled jobs? Can automation help fill the gap? Is the board room finally going to give cyber the attention it deserves? How will president Trump affect cyber policy?</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2317</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[81808689f4ec433eac697abd9252ec72]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9503793751.mp3?updated=1656708026" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Russian treason arrests may be tied to espionage. ANSSI director warns of cyber jihad. Symantec remediates Shamoon 2. U.S. Cellular was not breached.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/275/notes</link>
      <description>In today's podcast we discuss some updates on the Russian treason arrests, with side suspicions being cast in the direction of underworld in-fighting. A principal victim of Shamoon 2 reports its recovery. IoT threats and the risk of always-on, always-listening devices. French security officials warn that cyber jihad could enlist cyber mercenaries. Cisco patches its telepresence software. Joe Carrigan from Johns Hopkins stops by to discuss always-listening IoT devices. And don’t worry: no one really got locked into their room at that posh Alpine resort. (Worry about other stuff.)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 30 Jan 2017 21:01:40 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>275</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b353909a-def8-11ea-911f-0b60cbe8f169/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Russian treason arrests may be tied to espionage. ANSSI director warns of cyber jihad. Symantec remediates Shamoon 2. U.S. Cellular was not breached.</itunes:subtitle>
      <itunes:summary>In today's podcast we discuss some updates on the Russian treason arrests, with side suspicions being cast in the direction of underworld in-fighting. A principal victim of Shamoon 2 reports its recovery. IoT threats and the risk of always-on, always-listening devices. French security officials warn that cyber jihad could enlist cyber mercenaries. Cisco patches its telepresence software. Joe Carrigan from Johns Hopkins stops by to discuss always-listening IoT devices. And don’t worry: no one really got locked into their room at that posh Alpine resort. (Worry about other stuff.)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we discuss some updates on the Russian treason arrests, with side suspicions being cast in the direction of underworld in-fighting. A principal victim of Shamoon 2 reports its recovery. IoT threats and the risk of always-on, always-listening devices. French security officials warn that cyber jihad could enlist cyber mercenaries. Cisco patches its telepresence software. Joe Carrigan from Johns Hopkins stops by to discuss always-listening IoT devices. And don’t worry: no one really got locked into their room at that posh Alpine resort. (Worry about other stuff.)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>833</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ba66f81f87d680b2438839c43695e87b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1954096353.mp3?updated=1689788393" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>LeakedSource is down. DoubleFlag's called out for bogus stolen goods. Fancy Bear is in UK, German networks. Shamoon alert in Saudi Arabia. Scamming tech support scammers.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/274/notes</link>
      <description>In today's podcast, we hear that LeakedSource is down, maybe for good. DoubleFlag seems to be selling bogus data on the black market. (And where, we ask, is the Ripper review? If you can't trust a criminal, who can you trust these days? Sad.) Fancy Bear is back—actually, she never really left—now snuffling at British and German networks. Saudi Arabia remains on Shamoon alert. The Dridex banking Trojan has reappeared, in an improved version. Dale Drew from Level 3 Communications shares findings on the Asia Pacific region. Vince Crisler from Dark Cubed puts Grizzly Steppe in perspective. And tech support scammers get scammed—don't try this at home.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 27 Jan 2017 20:59:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>274</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b3659c18-def8-11ea-911f-33ba136fadab/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>LeakedSource is down. DoubleFlag's called out for bogus stolen goods. Fancy Bear is in UK, German networks. Shamoon alert in Saudi Arabia. Scamming tech support scammers.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that LeakedSource is down, maybe for good. DoubleFlag seems to be selling bogus data on the black market. (And where, we ask, is the Ripper review? If you can't trust a criminal, who can you trust these days? Sad.) Fancy Bear is back—actually, she never really left—now snuffling at British and German networks. Saudi Arabia remains on Shamoon alert. The Dridex banking Trojan has reappeared, in an improved version. Dale Drew from Level 3 Communications shares findings on the Asia Pacific region. Vince Crisler from Dark Cubed puts Grizzly Steppe in perspective. And tech support scammers get scammed—don't try this at home.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that LeakedSource is down, maybe for good. DoubleFlag seems to be selling bogus data on the black market. (And where, we ask, is the Ripper review? If you can't trust a criminal, who can you trust these days? Sad.) Fancy Bear is back—actually, she never really left—now snuffling at British and German networks. Saudi Arabia remains on Shamoon alert. The Dridex banking Trojan has reappeared, in an improved version. Dale Drew from Level 3 Communications shares findings on the Asia Pacific region. Vince Crisler from Dark Cubed puts Grizzly Steppe in perspective. And tech support scammers get scammed—don't try this at home.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1268</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9546773ebc71658073429e17a3b301e4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9592615785.mp3?updated=1608753237" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dark Web trading post compromised. Ransomware updates. Reactions to Risk Based Security's 2016 breach report. International cyber conflict notes, and a treason case in Russia.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/273/notes</link>
      <description>In today's podcast, Dark Web trading post AlphaBay looks buggy, and leaky. Some not-so-bad news on ransomware (and bravo to those Gateway City librarians). Risk Based Security's 2016 breach report says the USA is number one (but not in a good way). Sweden's armed forces recover from a cyberattack by unnamed parties. Saudi Arabia remains on high-alert for fresh infestations of Shamoon. Dan Larson from CrowdStrike weighs in on ransomware evolution. Markus Rauschecker from the University of Maryland Center for Health and Homeland Security highlights a Dept. of Commerce report on the IoT. And the Russian treason case may be closer to what would look like a corruption case under Western eyes.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 26 Jan 2017 20:34:06 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>273</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b3802e20-def8-11ea-911f-0fa57e51f845/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dark Web trading post compromised. Ransomware updates. Reactions to Risk Based Security's 2016 breach report. International cyber conflict notes, and a treason case in Russia.</itunes:subtitle>
      <itunes:summary>In today's podcast, Dark Web trading post AlphaBay looks buggy, and leaky. Some not-so-bad news on ransomware (and bravo to those Gateway City librarians). Risk Based Security's 2016 breach report says the USA is number one (but not in a good way). Sweden's armed forces recover from a cyberattack by unnamed parties. Saudi Arabia remains on high-alert for fresh infestations of Shamoon. Dan Larson from CrowdStrike weighs in on ransomware evolution. Markus Rauschecker from the University of Maryland Center for Health and Homeland Security highlights a Dept. of Commerce report on the IoT. And the Russian treason case may be closer to what would look like a corruption case under Western eyes.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, Dark Web trading post AlphaBay looks buggy, and leaky. Some not-so-bad news on ransomware (and bravo to those Gateway City librarians). Risk Based Security's 2016 breach report says the USA is number one (but not in a good way). Sweden's armed forces recover from a cyberattack by unnamed parties. Saudi Arabia remains on high-alert for fresh infestations of Shamoon. Dan Larson from CrowdStrike weighs in on ransomware evolution. Markus Rauschecker from the University of Maryland Center for Health and Homeland Security highlights a Dept. of Commerce report on the IoT. And the Russian treason case may be closer to what would look like a corruption case under Western eyes.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>979</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[223cda3e00a0efa5b97ac17336e85953]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7226978565.mp3?updated=1689788341" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Cleaning ransomware out of the Play Store (but snakes still get into the walled garden, so watch your apps). Vigilantes, vulnerabilities, and industry news.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/272/notes</link>
      <description>In today's podcast we hear about Russia's arrest of a Kaspersky Lab threat researcher (charges are said to be unrelated to Kaspersky). Charger ransomware is detected and ejected from the Play Store. Mobile users are urged to watch their apps—too many snakes are still getting into the walled gardens. RATs evolve and return to the wild. Shamoon 2 expands its target set. A database vigilante may be out there. Awais Rashid joins us from Lancaster University to share thoughts on IoT devices in healthcare. Michael Lipinski from Securonix wonders if state actors have become a convenient excue. Cyber fraud rises in the United Kingdom—it's safer for the crooks than stickups. M&amp;A and venture funding news. And that Verizon-Yahoo! deal remains up in the air.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 25 Jan 2017 20:11:13 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>272</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b3b23906-def8-11ea-911f-478122411373/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cleaning ransomware out of the Play Store (but snakes still get into the walled garden, so watch your apps). Vigilantes, vulnerabilities, and industry news.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about Russia's arrest of a Kaspersky Lab threat researcher (charges are said to be unrelated to Kaspersky). Charger ransomware is detected and ejected from the Play Store. Mobile users are urged to watch their apps—too many snakes are still getting into the walled gardens. RATs evolve and return to the wild. Shamoon 2 expands its target set. A database vigilante may be out there. Awais Rashid joins us from Lancaster University to share thoughts on IoT devices in healthcare. Michael Lipinski from Securonix wonders if state actors have become a convenient excue. Cyber fraud rises in the United Kingdom—it's safer for the crooks than stickups. M&amp;A and venture funding news. And that Verizon-Yahoo! deal remains up in the air.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about Russia's arrest of a Kaspersky Lab threat researcher (charges are said to be unrelated to Kaspersky). Charger ransomware is detected and ejected from the Play Store. Mobile users are urged to watch their apps—too many snakes are still getting into the walled gardens. RATs evolve and return to the wild. Shamoon 2 expands its target set. A database vigilante may be out there. Awais Rashid joins us from Lancaster University to share thoughts on IoT devices in healthcare. Michael Lipinski from Securonix wonders if state actors have become a convenient excue. Cyber fraud rises in the United Kingdom—it's safer for the crooks than stickups. M&amp;A and venture funding news. And that Verizon-Yahoo! deal remains up in the air.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>980</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8208362f1154c980788c994ca9455de1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6903155878.mp3?updated=1689788322" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shamoon and Greenbug. HummingWhale purged from Play Store. Apple patches across its product line. Leadership changes at CIA, GCHQ. Lloyds Bank incident update. Honor among thieves? Nope.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/271/notes</link>
      <description>In today's podcast, we discuss a report from Symantec that Shamoon may be connected to Greenbug. Google is purging HummingWhale malware from the Play Store. Apple issues a major set of patches across its product line. CIA has a new director; GCHQ's still looking for one. Yahoo!'s deal with Verizon will be delayed until April at least. Other industry M&amp;A and venture funding news is more upbeat. Lloyds Bank is said to have been targeted with cyber extortion. Ben Gurion University's Yisroel Mirsky describes vulnerabilities with 3D printers. And there's no honor among thieves—if you don't believe us, ask the thieves.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 Jan 2017 21:03:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>271</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b3cd35ee-def8-11ea-911f-6301ae621e0d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Shamoon and Greenbug. HummingWhale purged from Play Store. Apple patches across its product line. Leadership changes at CIA, GCHQ. Lloyds Bank incident update. Honor among thieves? Nope.</itunes:subtitle>
      <itunes:summary>In today's podcast, we discuss a report from Symantec that Shamoon may be connected to Greenbug. Google is purging HummingWhale malware from the Play Store. Apple issues a major set of patches across its product line. CIA has a new director; GCHQ's still looking for one. Yahoo!'s deal with Verizon will be delayed until April at least. Other industry M&amp;A and venture funding news is more upbeat. Lloyds Bank is said to have been targeted with cyber extortion. Ben Gurion University's Yisroel Mirsky describes vulnerabilities with 3D printers. And there's no honor among thieves—if you don't believe us, ask the thieves.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we discuss a report from Symantec that Shamoon may be connected to Greenbug. Google is purging HummingWhale malware from the Play Store. Apple issues a major set of patches across its product line. CIA has a new director; GCHQ's still looking for one. Yahoo!'s deal with Verizon will be delayed until April at least. Other industry M&amp;A and venture funding news is more upbeat. Lloyds Bank is said to have been targeted with cyber extortion. Ben Gurion University's Yisroel Mirsky describes vulnerabilities with 3D printers. And there's no honor among thieves—if you don't believe us, ask the thieves.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>803</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8469f6fdec2a7d4ac0f071063ef9b416]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8581192037.mp3?updated=1689788302" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fake news tweets (from hijackers, not opinion-makers). Ransomware. New Android Trojans. Closing in on Mirai's master?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/270/notes</link>
      <description>In today's podcast we discuss some fake tweets from hijacked news accounts around the time of the US Presidential transition—OurMine seems to have some at least tangential involvement. BankBot Android Trojan evolves, and Skyfin will quietly buy stuff you don't want from the Google Play Store. Sage 2.0 ransomware distributed by repurposed spam. Ill-named Dharma ransomware hits Indian pony site. Lloyds Bank disclosed DDoS attacks. Cryptographer Matthew Green describes Google new open source Key Transparency project. Jonathan Katz from the University of Maryland explains multivariate encryption. The SEC looks at Yahoo!'s breach disclosure record. And the FBI is taking an interest in the gentleman Krebs fingered as Mirai's master.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 23 Jan 2017 20:29:52 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>270</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b3e5b3a8-def8-11ea-911f-5755f71cc917/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fake news tweets (from hijackers, not opinion-makers). Ransomware. New Android Trojans. Closing in on Mirai's master?</itunes:subtitle>
      <itunes:summary>In today's podcast we discuss some fake tweets from hijacked news accounts around the time of the US Presidential transition—OurMine seems to have some at least tangential involvement. BankBot Android Trojan evolves, and Skyfin will quietly buy stuff you don't want from the Google Play Store. Sage 2.0 ransomware distributed by repurposed spam. Ill-named Dharma ransomware hits Indian pony site. Lloyds Bank disclosed DDoS attacks. Cryptographer Matthew Green describes Google new open source Key Transparency project. Jonathan Katz from the University of Maryland explains multivariate encryption. The SEC looks at Yahoo!'s breach disclosure record. And the FBI is taking an interest in the gentleman Krebs fingered as Mirai's master.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we discuss some fake tweets from hijacked news accounts around the time of the US Presidential transition—OurMine seems to have some at least tangential involvement. BankBot Android Trojan evolves, and Skyfin will quietly buy stuff you don't want from the Google Play Store. Sage 2.0 ransomware distributed by repurposed spam. Ill-named Dharma ransomware hits Indian pony site. Lloyds Bank disclosed DDoS attacks. Cryptographer Matthew Green describes Google new open source Key Transparency project. Jonathan Katz from the University of Maryland explains multivariate encryption. The SEC looks at Yahoo!'s breach disclosure record. And the FBI is taking an interest in the gentleman Krebs fingered as Mirai's master.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>988</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c2e984d22adeaa53412cbbeca32de65b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6331092170.mp3?updated=1689788133" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Carbanak gets trickier and more ambitious. Ransomware updates. It's beginning to look a lot like 1949 (at least from Moscow). </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/269/notes</link>
      <description>In today's podcast, we hear about how the Carbank cyber gang is getting trickier and more ambitious. In other cybercrime news, ransomware takes off after more databases. There's a new ransomware-as-a-service offering in the black market. Emily Wilson from Terbium Labs addresses perceptions of terrorists on the dark web. Simone Petrella from CyberVista provides her perspective on cyber security workforce issues. A new strain of Android ransomware hits Russian-speaking users. Locky's back, but in a feeble sort of way. Cybercriminals lock files at a cancer service not-for-profit. Russian policy wonks seem to suggest that we're not at the point in history where 2016 yielded to 2017. Instead—calling all Cold Warriors—1948 just ticked over into 1949. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 20 Jan 2017 20:15:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>269</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b3f4db4e-def8-11ea-911f-1b1b01683796/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Carbanak gets trickier and more ambitious. Ransomware updates. It's beginning to look a lot like 1949 (at least from Moscow). </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how the Carbank cyber gang is getting trickier and more ambitious. In other cybercrime news, ransomware takes off after more databases. There's a new ransomware-as-a-service offering in the black market. Emily Wilson from Terbium Labs addresses perceptions of terrorists on the dark web. Simone Petrella from CyberVista provides her perspective on cyber security workforce issues. A new strain of Android ransomware hits Russian-speaking users. Locky's back, but in a feeble sort of way. Cybercriminals lock files at a cancer service not-for-profit. Russian policy wonks seem to suggest that we're not at the point in history where 2016 yielded to 2017. Instead—calling all Cold Warriors—1948 just ticked over into 1949. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how the Carbank cyber gang is getting trickier and more ambitious. In other cybercrime news, ransomware takes off after more databases. There's a new ransomware-as-a-service offering in the black market. Emily Wilson from Terbium Labs addresses perceptions of terrorists on the dark web. Simone Petrella from CyberVista provides her perspective on cyber security workforce issues. A new strain of Android ransomware hits Russian-speaking users. Locky's back, but in a feeble sort of way. Cybercriminals lock files at a cancer service not-for-profit. Russian policy wonks seem to suggest that we're not at the point in history where 2016 yielded to 2017. Instead—calling all Cold Warriors—1948 just ticked over into 1949. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1284</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cb884d5c510c5c194feb90afae331618]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9930020325.mp3?updated=1608753232" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>France braces for election hacking. Ukrainian utility says December blackouts were hacker-induced. Finding "Fruitfly." Tracking Mirai's master.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/268/notes</link>
      <description>France prepares for election hacking. Ukrenergo [yook-REN-air-go] acknowledges its electrical service was hacked. Malwarebytes reports on Fruitfly, malware swarming about biomedical research facilities. Krebs believes he's found the author of Mirai. Anonymous says it's going to dox US President-elect Trump. Ben Yelin reviews your rights to privacy at the border. Nir Giller from CyberX addresses the false sense of security when it comes to ICS. And the RSA Conference announces the finalists in the Innovation Sandbox.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 19 Jan 2017 20:54:15 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>268</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b40de616-def8-11ea-911f-376a84c5be4e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>France braces for election hacking. Ukrainian utility says December blackouts were hacker-induced. Finding "Fruitfly." Tracking Mirai's master.</itunes:subtitle>
      <itunes:summary>France prepares for election hacking. Ukrenergo [yook-REN-air-go] acknowledges its electrical service was hacked. Malwarebytes reports on Fruitfly, malware swarming about biomedical research facilities. Krebs believes he's found the author of Mirai. Anonymous says it's going to dox US President-elect Trump. Ben Yelin reviews your rights to privacy at the border. Nir Giller from CyberX addresses the false sense of security when it comes to ICS. And the RSA Conference announces the finalists in the Innovation Sandbox.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>France prepares for election hacking. Ukrenergo [yook-REN-air-go] acknowledges its electrical service was hacked. Malwarebytes reports on Fruitfly, malware swarming about biomedical research facilities. Krebs believes he's found the author of Mirai. Anonymous says it's going to dox US President-elect Trump. Ben Yelin reviews your rights to privacy at the border. Nir Giller from CyberX addresses the false sense of security when it comes to ICS. And the RSA Conference announces the finalists in the Innovation Sandbox.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>961</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[84f92b50230a4780fd2f624d9ff669de]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7733059718.mp3?updated=1689787944" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Carbanak gang is back. GhostAdmin works on data theft. Trolling security researchers. M&amp;A notes. Pardons, commutations, and extraditions.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/267/notes</link>
      <description>Carbanak is back, and in the cloud. GhostAdmin quietly assembles a few good bots. Malware writers troll security researchers on VirusTotal. Oracle issues a big patch; Apple is said to be preparing a smaller one. M&amp;A activity is in the news. Australia investigates fallout from the Yahoo! breaches. Experts warn European election officials and politicians to be on the lookout for Bears. Rick Howard from Palo Alto Networks seeks a unified theory of security. David Bianco from Sqrrl offers advice on threat hunting. And US President Obama issues some pardons and commutations—General Cartwright and Private Manning are on the list. Not so Mr. Snowden.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 18 Jan 2017 21:11:03 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>267</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b4239fce-def8-11ea-911f-d7f0261d779e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Carbanak gang is back. GhostAdmin works on data theft. Trolling security researchers. M&amp;A notes. Pardons, commutations, and extraditions.</itunes:subtitle>
      <itunes:summary>Carbanak is back, and in the cloud. GhostAdmin quietly assembles a few good bots. Malware writers troll security researchers on VirusTotal. Oracle issues a big patch; Apple is said to be preparing a smaller one. M&amp;A activity is in the news. Australia investigates fallout from the Yahoo! breaches. Experts warn European election officials and politicians to be on the lookout for Bears. Rick Howard from Palo Alto Networks seeks a unified theory of security. David Bianco from Sqrrl offers advice on threat hunting. And US President Obama issues some pardons and commutations—General Cartwright and Private Manning are on the list. Not so Mr. Snowden.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Carbanak is back, and in the cloud. GhostAdmin quietly assembles a few good bots. Malware writers troll security researchers on VirusTotal. Oracle issues a big patch; Apple is said to be preparing a smaller one. M&amp;A activity is in the news. Australia investigates fallout from the Yahoo! breaches. Experts warn European election officials and politicians to be on the lookout for Bears. Rick Howard from Palo Alto Networks seeks a unified theory of security. David Bianco from Sqrrl offers advice on threat hunting. And US President Obama issues some pardons and commutations—General Cartwright and Private Manning are on the list. Not so Mr. Snowden.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>946</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[17c43b40460422ea8defce7b0f7e7a2b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4836435102.mp3?updated=1689787787" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Election influence and election security. Threats to power grids. Ransomware and phishing updates. Loyalty program risks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/266/notes</link>
      <description>In today's podcast we hear warnings that electrical utilities should regard hacks of Ukraine's power grid as a wake-up call (the squirrel threat notwithstanding). Various nations work to shore up their defenses against Russian government hacking and influence operations. Russia protests its innocence, but there are some reliable reports of Fancy Bear sightings in Norway. Cyber criminals are back, except for those behind Locky ransomware, who seem to still be on holiday break. New approaches to ransomware and phishing. Dale Drew from Level 3 Communications tell us about the BGP Flowspec. And a loyalty program at the Golden Arches may be proving problematic. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 Jan 2017 19:49:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>266</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b4376bbc-def8-11ea-911f-630027b4b380/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Election influence and election security. Threats to power grids. Ransomware and phishing updates. Loyalty program risks.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear warnings that electrical utilities should regard hacks of Ukraine's power grid as a wake-up call (the squirrel threat notwithstanding). Various nations work to shore up their defenses against Russian government hacking and influence operations. Russia protests its innocence, but there are some reliable reports of Fancy Bear sightings in Norway. Cyber criminals are back, except for those behind Locky ransomware, who seem to still be on holiday break. New approaches to ransomware and phishing. Dale Drew from Level 3 Communications tell us about the BGP Flowspec. And a loyalty program at the Golden Arches may be proving problematic. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear warnings that electrical utilities should regard hacks of Ukraine's power grid as a wake-up call (the squirrel threat notwithstanding). Various nations work to shore up their defenses against Russian government hacking and influence operations. Russia protests its innocence, but there are some reliable reports of Fancy Bear sightings in Norway. Cyber criminals are back, except for those behind Locky ransomware, who seem to still be on holiday break. New approaches to ransomware and phishing. Dale Drew from Level 3 Communications tell us about the BGP Flowspec. And a loyalty program at the Golden Arches may be proving problematic. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>938</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[caae596413724f12724dd0eb47e51d4b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2243148079.mp3?updated=1689787771" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Grid hacking in Ukraine. Cellebrite breached. WhatsApp encryption issue. EyePyramid notes. Sharing SIGINT. IG looks at FBI. Guccifer 2.0 and the ShadowBrokers take their bows.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/265/notes</link>
      <description>In today's podcast we get updates on grid hacking in Ukraine and the case of the EyePyramid spyware in Italy. Smartphone forensics shop Cellebrite suffers a data breach. WhatsApp appears to have an encryption issue, but most observers think it's not really a backdoor. WordPress gets eight patches. ENISA issues recommended best practices for securing connected cars. A US Justice Department IG will look into the FBI's investigation of classified information handling in the Clinton State Department. President Obama expands NSA's authority to share raw SIGINT with other intelligence agencies. The Johns Hopkins University's Joe Carrigan reminds us to protect our mobile phone numbers. Stanford Cyber Initiative Executive Director Allison Berke shares that organization's mission. Guccifer 2.0 wants to clear a few things up, and the ShadowBrokers say "bye-bye," or maybe "do svidaniya."
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 13 Jan 2017 19:47:40 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>265</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b44bae42-def8-11ea-911f-f3aba11a4788/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Grid hacking in Ukraine. Cellebrite breached. WhatsApp encryption issue. EyePyramid notes. Sharing SIGINT. IG looks at FBI. Guccifer 2.0 and the ShadowBrokers take their bows.</itunes:subtitle>
      <itunes:summary>In today's podcast we get updates on grid hacking in Ukraine and the case of the EyePyramid spyware in Italy. Smartphone forensics shop Cellebrite suffers a data breach. WhatsApp appears to have an encryption issue, but most observers think it's not really a backdoor. WordPress gets eight patches. ENISA issues recommended best practices for securing connected cars. A US Justice Department IG will look into the FBI's investigation of classified information handling in the Clinton State Department. President Obama expands NSA's authority to share raw SIGINT with other intelligence agencies. The Johns Hopkins University's Joe Carrigan reminds us to protect our mobile phone numbers. Stanford Cyber Initiative Executive Director Allison Berke shares that organization's mission. Guccifer 2.0 wants to clear a few things up, and the ShadowBrokers say "bye-bye," or maybe "do svidaniya."
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we get updates on grid hacking in Ukraine and the case of the EyePyramid spyware in Italy. Smartphone forensics shop Cellebrite suffers a data breach. WhatsApp appears to have an encryption issue, but most observers think it's not really a backdoor. WordPress gets eight patches. ENISA issues recommended best practices for securing connected cars. A US Justice Department IG will look into the FBI's investigation of classified information handling in the Clinton State Department. President Obama expands NSA's authority to share raw SIGINT with other intelligence agencies. The Johns Hopkins University's Joe Carrigan reminds us to protect our mobile phone numbers. Stanford Cyber Initiative Executive Director Allison Berke shares that organization's mission. Guccifer 2.0 wants to clear a few things up, and the ShadowBrokers say "bye-bye," or maybe "do svidaniya."</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1233</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b36cbe8bc74c7498d3de4b534876b8f5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7165591481.mp3?updated=1608753235" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Grid hacks and influence operations. Propaganda sauce spread liberally over geese and ganders. Peace sign hacks? Hamas catphishes the IDF.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/264/notes</link>
      <description>In today's podcast, we hear about the arrest of an Italian brother and sister for an EyePyramid spyware crime spree that may have been in progress since 2010. Ukraine confirms that Kiev's power grid was hacked last month, and the Ukrainian government tries to tide over some influence operations of its own. Policy wonks talk information operations and some realize that such ops aren't new. The peace sign hack joins the Gummibear hack as a challenge to biometric authentication. Yisroel Mirsky from Ben Gurion University explains new research using databases of exploits and vulnerabilities. Quick industry notes. And Hamas goes catphishing.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 12 Jan 2017 19:09:40 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>264</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b45fd868-def8-11ea-911f-8317ccbf0c6b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Grid hacks and influence operations. Propaganda sauce spread liberally over geese and ganders. Peace sign hacks? Hamas catphishes the IDF.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about the arrest of an Italian brother and sister for an EyePyramid spyware crime spree that may have been in progress since 2010. Ukraine confirms that Kiev's power grid was hacked last month, and the Ukrainian government tries to tide over some influence operations of its own. Policy wonks talk information operations and some realize that such ops aren't new. The peace sign hack joins the Gummibear hack as a challenge to biometric authentication. Yisroel Mirsky from Ben Gurion University explains new research using databases of exploits and vulnerabilities. Quick industry notes. And Hamas goes catphishing.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about the arrest of an Italian brother and sister for an EyePyramid spyware crime spree that may have been in progress since 2010. Ukraine confirms that Kiev's power grid was hacked last month, and the Ukrainian government tries to tide over some influence operations of its own. Policy wonks talk information operations and some realize that such ops aren't new. The peace sign hack joins the Gummibear hack as a challenge to biometric authentication. Yisroel Mirsky from Ben Gurion University explains new research using databases of exploits and vulnerabilities. Quick industry notes. And Hamas goes catphishing.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>859</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0acdc35bd129613569a42e18615f6229]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8047843037.mp3?updated=1689787529" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Shamoon is back, now with credentials for virtual desktops. Ukraine believes it was hacked again. Ransomware updates. Elections, investigations, and influence operations. The Pokemon threat?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/263/notes</link>
      <description>In today's podcast we learn that Shamoon is back, and still a nasty piece of work. Ukraine's grid was hacked again last month, probably by the same people who did it at the end of 2015. A new strain of ransomware offers a tiered extortion model (and unfortunately pretty solid encryption). France and Britain prepare for Russian election hacking. Awais Rashid from Lancaster University outlines the human factors in cyber security. Limor Kessem from IBM Security discusses their recently released ransomware study.The debate over influence operations flares again in the US. And China still finds Pokemon threatening.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 11 Jan 2017 20:39:52 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>263</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b4824f42-def8-11ea-911f-17ed8bd02185/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Shamoon is back, now with credentials for virtual desktops. Ukraine believes it was hacked again. Ransomware updates. Elections, investigations, and influence operations. The Pokemon threat?</itunes:subtitle>
      <itunes:summary>In today's podcast we learn that Shamoon is back, and still a nasty piece of work. Ukraine's grid was hacked again last month, probably by the same people who did it at the end of 2015. A new strain of ransomware offers a tiered extortion model (and unfortunately pretty solid encryption). France and Britain prepare for Russian election hacking. Awais Rashid from Lancaster University outlines the human factors in cyber security. Limor Kessem from IBM Security discusses their recently released ransomware study.The debate over influence operations flares again in the US. And China still finds Pokemon threatening.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we learn that Shamoon is back, and still a nasty piece of work. Ukraine's grid was hacked again last month, probably by the same people who did it at the end of 2015. A new strain of ransomware offers a tiered extortion model (and unfortunately pretty solid encryption). France and Britain prepare for Russian election hacking. Awais Rashid from Lancaster University outlines the human factors in cyber security. Limor Kessem from IBM Security discusses their recently released ransomware study.The debate over influence operations flares again in the US. And China still finds Pokemon threatening.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>990</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c9ce3e5a0b3fecf1781c41808102f147]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2127438496.mp3?updated=1689787508" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Witch hunts and yard sales. See relationships, not dox. Rebrandings, mergers, acquisitions, and executive moves. Building anti-witch capabilities.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/262/notes</link>
      <description>California says a nation-state was behind the Anthem hack. The ShadowBrokers hold a yard sale (we'd pass on the malware, but if they had a nice blender out we'd consider it). WikiLeaks says it's interested in relationships, not doxing. The US FDA confirms vulnerabilities in cardiac devices. Hello Kitty gets breached. Yahoo! will become Altaba, and get new leadership. Germany and the UK study ways of increasing cyber capability. The University of Maryland's Jonathan Katz reviews emerging encryption types. Uri Sternfeld from Cybereason explains their free ransomware prevention tool, RansomFree. Russia complains it's the subject of a witch hunt. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 Jan 2017 18:52:01 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>262</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b4989860-def8-11ea-911f-ef5140c3aeab/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Witch hunts and yard sales. See relationships, not dox. Rebrandings, mergers, acquisitions, and executive moves. Building anti-witch capabilities.</itunes:subtitle>
      <itunes:summary>California says a nation-state was behind the Anthem hack. The ShadowBrokers hold a yard sale (we'd pass on the malware, but if they had a nice blender out we'd consider it). WikiLeaks says it's interested in relationships, not doxing. The US FDA confirms vulnerabilities in cardiac devices. Hello Kitty gets breached. Yahoo! will become Altaba, and get new leadership. Germany and the UK study ways of increasing cyber capability. The University of Maryland's Jonathan Katz reviews emerging encryption types. Uri Sternfeld from Cybereason explains their free ransomware prevention tool, RansomFree. Russia complains it's the subject of a witch hunt. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>California says a nation-state was behind the Anthem hack. The ShadowBrokers hold a yard sale (we'd pass on the malware, but if they had a nice blender out we'd consider it). WikiLeaks says it's interested in relationships, not doxing. The US FDA confirms vulnerabilities in cardiac devices. Hello Kitty gets breached. Yahoo! will become Altaba, and get new leadership. Germany and the UK study ways of increasing cyber capability. The University of Maryland's Jonathan Katz reviews emerging encryption types. Uri Sternfeld from Cybereason explains their free ransomware prevention tool, RansomFree. Russia complains it's the subject of a witch hunt. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>974</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[60dbfa1bbeafc02a582b854c283c5984]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4455798611.mp3?updated=1689787490" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Election hacking, influence operations, and official reports. EU hacking concerns. Lawsuit over email's invention. Twitter frowns on unrequited love. Billy Bass, meet Alexa.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/261/notes</link>
      <description>In today's podcast we hear about the report on Russian election hacking and influence operations the US Director of National Intelligence released Friday. Election hacking? Not really, but influence operations? You bet. Robert M. Lee from Dragos Security weighs in on the report. European authorities worry about Russia inserting itself into 2017 elections. Law, and order, torts and Twitter. Emily Wilson from Terbium Labs describes the role of law enforcement on the Dark Web. And a note on she-who-must-not-be-named (our listeners in San Diego will know exactly whom we mean—heck, it's Alexa).
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 09 Jan 2017 15:43:50 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>261</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b4bb2cb8-def8-11ea-911f-eb23bfedec16/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Election hacking, influence operations, and official reports. EU hacking concerns. Lawsuit over email's invention. Twitter frowns on unrequited love. Billy Bass, meet Alexa.  </itunes:subtitle>
      <itunes:summary>In today's podcast we hear about the report on Russian election hacking and influence operations the US Director of National Intelligence released Friday. Election hacking? Not really, but influence operations? You bet. Robert M. Lee from Dragos Security weighs in on the report. European authorities worry about Russia inserting itself into 2017 elections. Law, and order, torts and Twitter. Emily Wilson from Terbium Labs describes the role of law enforcement on the Dark Web. And a note on she-who-must-not-be-named (our listeners in San Diego will know exactly whom we mean—heck, it's Alexa).
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about the report on Russian election hacking and influence operations the US Director of National Intelligence released Friday. Election hacking? Not really, but influence operations? You bet. Robert M. Lee from Dragos Security weighs in on the report. European authorities worry about Russia inserting itself into 2017 elections. Law, and order, torts and Twitter. Emily Wilson from Terbium Labs describes the role of law enforcement on the Dark Web. And a note on she-who-must-not-be-named (our listeners in San Diego will know exactly whom we mean—heck, it's Alexa).</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>982</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ede61ade6f3642bf74d52aab631658ab]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2820068498.mp3?updated=1689787185" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Spearphishing in industrial espionage. Ransomware gets more widespread, ruthless, and perfidious. The US Intelligence Community assures the Senate that the Russians hacked the DNC. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/260/notes</link>
      <description>In today's podcast, we hear about a worldwide spearphishing attack against industries in 50 countries. Ransomware is already proving as much of a problem as predicted: exposed data bases are hijacked in a turf-war among extortion gangs, and KillDisk has now appeared in ransomware kits. Investment analysts wonder if Verizon's bid for Yahoo!'s core assets will go through. Ben Yelin from the University of Maryland Center for Health and Homeland Security discusses the IRS demanding info on some bitcoin users. FireEye's Tony Cole reviews their latest report on what to expect in 2017. The US Intelligence Community tells the Senate that, yes indeed, the Russians were hacking during the election. A full report is promised for next week.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 06 Jan 2017 20:51:34 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>260</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b4d6aaba-def8-11ea-911f-07f1e6f43dc3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Spearphishing in industrial espionage. Ransomware gets more widespread, ruthless, and perfidious. The US Intelligence Community assures the Senate that the Russians hacked the DNC. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about a worldwide spearphishing attack against industries in 50 countries. Ransomware is already proving as much of a problem as predicted: exposed data bases are hijacked in a turf-war among extortion gangs, and KillDisk has now appeared in ransomware kits. Investment analysts wonder if Verizon's bid for Yahoo!'s core assets will go through. Ben Yelin from the University of Maryland Center for Health and Homeland Security discusses the IRS demanding info on some bitcoin users. FireEye's Tony Cole reviews their latest report on what to expect in 2017. The US Intelligence Community tells the Senate that, yes indeed, the Russians were hacking during the election. A full report is promised for next week.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about a worldwide spearphishing attack against industries in 50 countries. Ransomware is already proving as much of a problem as predicted: exposed data bases are hijacked in a turf-war among extortion gangs, and KillDisk has now appeared in ransomware kits. Investment analysts wonder if Verizon's bid for Yahoo!'s core assets will go through. Ben Yelin from the University of Maryland Center for Health and Homeland Security discusses the IRS demanding info on some bitcoin users. FireEye's Tony Cole reviews their latest report on what to expect in 2017. The US Intelligence Community tells the Senate that, yes indeed, the Russians were hacking during the election. A full report is promised for next week.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1267</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[27e9cea8b423a8a3773dadb0a579294f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2648389222.mp3?updated=1608753234" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Indiscriminate IOCs erode confidence in attributions. Official leaks erode trust in information sharing. Exploit updates.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/259/notes</link>
      <description>In today's podcast we hear about how indiscriminate indicators of compromise spawn fake news about a Vermont grid hack. Meanwhile, the Mounties cautiously, tentatively, investigate some odd potential IOCs at an Ontario utility. A hacker claims he pwned the FBI, but it looks like a hoax. A quick rundown of exploits currently romping in the wild—many of them involve ransomware. Rick Howard from Palo Alto describes Security Orchestration. Marika Chauvin from Threat Connect shares research on Hacktivists vs Faketivists. And yes, your thumbprint will authenticate you to your phone even if you've dozed off, Mom.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 05 Jan 2017 20:20:16 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>259</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b4ee93aa-def8-11ea-911f-ef7576c84315/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Indiscriminate IOCs erode confidence in attributions. Official leaks erode trust in information sharing. Exploit updates.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about how indiscriminate indicators of compromise spawn fake news about a Vermont grid hack. Meanwhile, the Mounties cautiously, tentatively, investigate some odd potential IOCs at an Ontario utility. A hacker claims he pwned the FBI, but it looks like a hoax. A quick rundown of exploits currently romping in the wild—many of them involve ransomware. Rick Howard from Palo Alto describes Security Orchestration. Marika Chauvin from Threat Connect shares research on Hacktivists vs Faketivists. And yes, your thumbprint will authenticate you to your phone even if you've dozed off, Mom.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about how indiscriminate indicators of compromise spawn fake news about a Vermont grid hack. Meanwhile, the Mounties cautiously, tentatively, investigate some odd potential IOCs at an Ontario utility. A hacker claims he pwned the FBI, but it looks like a hoax. A quick rundown of exploits currently romping in the wild—many of them involve ransomware. Rick Howard from Palo Alto describes Security Orchestration. Marika Chauvin from Threat Connect shares research on Hacktivists vs Faketivists. And yes, your thumbprint will authenticate you to your phone even if you've dozed off, Mom.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>980</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2cf9156e517f6be8e5bc3bf32d57bf11]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7375002339.mp3?updated=1689787134" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Hacktivists claim to perform a public service. Once and Recorded Future ransomware. Attribution controversies. Disturbing toys. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/258/notes</link>
      <description>In today's podcast, we hear about how some hacktivists are again turning to defacement, which they claim to be doing as a public service to raise security awareness. Recorded Future takes a close look at ransomware's likely course in 2017. ISIS exposes itself online. Attribution controversies: the Vermont hack-that-wasn't, tactical hacks in eastern Ukraine, and the FBI-NCCIC Joint Analysis Report. Malek Ben Salem from Accenture Technology Labs describes how Deep Learning may be applied to cyber security.  And would you hug Skynet, if it looked like Teddy Ruxpin?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 04 Jan 2017 18:09:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>258</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b502c83e-def8-11ea-911f-d7d982d0bdf9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Hacktivists claim to perform a public service. Once and Recorded Future ransomware. Attribution controversies. Disturbing toys. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how some hacktivists are again turning to defacement, which they claim to be doing as a public service to raise security awareness. Recorded Future takes a close look at ransomware's likely course in 2017. ISIS exposes itself online. Attribution controversies: the Vermont hack-that-wasn't, tactical hacks in eastern Ukraine, and the FBI-NCCIC Joint Analysis Report. Malek Ben Salem from Accenture Technology Labs describes how Deep Learning may be applied to cyber security.  And would you hug Skynet, if it looked like Teddy Ruxpin?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how some hacktivists are again turning to defacement, which they claim to be doing as a public service to raise security awareness. Recorded Future takes a close look at ransomware's likely course in 2017. ISIS exposes itself online. Attribution controversies: the Vermont hack-that-wasn't, tactical hacks in eastern Ukraine, and the FBI-NCCIC Joint Analysis Report. Malek Ben Salem from Accenture Technology Labs describes how Deep Learning may be applied to cyber security.  And would you hug Skynet, if it looked like Teddy Ruxpin?</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>954</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[11aae0a6002ce0449108db6706fbdff8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8432732453.mp3?updated=1689787115" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Attribution issues: one story fizzles; another looks disappointingly circumstantial. Great powers jostle in cyberspace. Hacktivists resurface online. So, alas, do terrorists.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/257/notes</link>
      <description>In today's podcast, we follow the way in which the Vermont utility hacking story fizzled. We also hear more serious grounds for concern about electrical grid security continue from Joe Weiss of Applied Control Solutions. Observers are disappointed by the Grizzly Steppe Joint Analysis Report—its evidence strikes many as mighty circumstantial. US-Russian cyber strategies and cyber diplomacy. Anonymous greets the Bilderbergers. ISIS claims responsibility for recent massacres as part of its online inspiration. Level 3 Communications' Dale Drew provides his take on the coming year. German police believe they've stopped a Saarland bomb plot.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 Jan 2017 20:56:40 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>2</itunes:season>
      <itunes:episode>257</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b519770a-def8-11ea-911f-d70b5b15d167/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Attribution issues: one story fizzles; another looks disappointingly circumstantial. Great powers jostle in cyberspace. Hacktivists resurface online. So, alas, do terrorists.</itunes:subtitle>
      <itunes:summary>In today's podcast, we follow the way in which the Vermont utility hacking story fizzled. We also hear more serious grounds for concern about electrical grid security continue from Joe Weiss of Applied Control Solutions. Observers are disappointed by the Grizzly Steppe Joint Analysis Report—its evidence strikes many as mighty circumstantial. US-Russian cyber strategies and cyber diplomacy. Anonymous greets the Bilderbergers. ISIS claims responsibility for recent massacres as part of its online inspiration. Level 3 Communications' Dale Drew provides his take on the coming year. German police believe they've stopped a Saarland bomb plot.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we follow the way in which the Vermont utility hacking story fizzled. We also hear more serious grounds for concern about electrical grid security continue from Joe Weiss of Applied Control Solutions. Observers are disappointed by the Grizzly Steppe Joint Analysis Report—its evidence strikes many as mighty circumstantial. US-Russian cyber strategies and cyber diplomacy. Anonymous greets the Bilderbergers. ISIS claims responsibility for recent massacres as part of its online inspiration. Level 3 Communications' Dale Drew provides his take on the coming year. German police believe they've stopped a Saarland bomb plot.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>947</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bb9f4a4e853d84cd2507db2f09130c41]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5300106258.mp3?updated=1689787090" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Best of: Daniel Ennis</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/256/notes</link>
      <description>Our podcast team is taking a break this week for the holidays. We’re revisiting some of our favorite interviews from 2016.   Daniel Ennis is former director of the NSA Threat Operations Center, or NTOC, and is currently executive director of the University of Maryland Global Initiative on Cyber. We spoke with Daniel Ennis back in July. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 30 Dec 2016 15:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>256</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b52eaee0-def8-11ea-911f-7b2fa7ecb8ed/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Best of: Daniel Ennis</itunes:subtitle>
      <itunes:summary>Our podcast team is taking a break this week for the holidays. We’re revisiting some of our favorite interviews from 2016.   Daniel Ennis is former director of the NSA Threat Operations Center, or NTOC, and is currently executive director of the University of Maryland Global Initiative on Cyber. We spoke with Daniel Ennis back in July. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our podcast team is taking a break this week for the holidays. We’re revisiting some of our favorite interviews from 2016.  <br> <br>Daniel Ennis is former director of the NSA Threat Operations Center, or NTOC, and is currently executive director of the University of Maryland Global Initiative on Cyber. We spoke with Daniel Ennis back in July. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1035</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cb6a95d9a37b49f316601b841c52632e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7016627382.mp3?updated=1689786827" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Buying Cyber Security [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/11/notes</link>
      <description>Every day there seems to be a new security product on the market, with many of them claiming they provide something that you simply can’t live without. Companies appear and disappear, and businesses are faced with difficult, confusing, and often expensive choices. In this CyberWire special edition, we explore how businesses are navigating the process of choosing products and technologies in a crowded marketplace. We talk to some key stakeholders to find out what drives their purchasing decisions, and what they wished their vendors knew before they came knocking on their doors.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 30 Dec 2016 11:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>11</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/7fdc18b2-df03-11ea-83d6-9f41b886d7c8/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Buying Cyber Security</itunes:subtitle>
      <itunes:summary>Every day there seems to be a new security product on the market, with many of them claiming they provide something that you simply can’t live without. Companies appear and disappear, and businesses are faced with difficult, confusing, and often expensive choices. In this CyberWire special edition, we explore how businesses are navigating the process of choosing products and technologies in a crowded marketplace. We talk to some key stakeholders to find out what drives their purchasing decisions, and what they wished their vendors knew before they came knocking on their doors.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Every day there seems to be a new security product on the market, with many of them claiming they provide something that you simply can’t live without. Companies appear and disappear, and businesses are faced with difficult, confusing, and often expensive choices. In this CyberWire special edition, we explore how businesses are navigating the process of choosing products and technologies in a crowded marketplace. We talk to some key stakeholders to find out what drives their purchasing decisions, and what they wished their vendors knew before they came knocking on their doors.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1736</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[61b76fdbfc450c00343455040a1b2985]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2781260399.mp3?updated=1656707969" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Best of: Tom Coale</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/255/notes</link>
      <description>Our podcast team is taking a break this week for the holidays. We’re revisiting some of our favorite interviews from 2016.   Tom Coale is an attorney with the law firm Talkin and Oh, in Maryland, where one of his specialties is representing people who have been denied security clearances. Previously, Mr. Coale was Department Counsel for the Department of Defense, representing the government in security clearance due process hearings. We spoke to Tom Coale back in July. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 29 Dec 2016 15:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>255</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b547954a-def8-11ea-911f-db6280e3aa6e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Best of: Tom Coale</itunes:subtitle>
      <itunes:summary>Our podcast team is taking a break this week for the holidays. We’re revisiting some of our favorite interviews from 2016.   Tom Coale is an attorney with the law firm Talkin and Oh, in Maryland, where one of his specialties is representing people who have been denied security clearances. Previously, Mr. Coale was Department Counsel for the Department of Defense, representing the government in security clearance due process hearings. We spoke to Tom Coale back in July. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our podcast team is taking a break this week for the holidays. We’re revisiting some of our favorite interviews from 2016.  <br> <br>Tom Coale is an attorney with the law firm Talkin and Oh, in Maryland, where one of his specialties is representing people who have been denied security clearances. Previously, Mr. Coale was Department Counsel for the Department of Defense, representing the government in security clearance due process hearings. We spoke to Tom Coale back in July. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1034</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a318407655d98a9044adf24b0209b827]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2997478652.mp3?updated=1689786771" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Best of: Tom Wingfield</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/254/notes</link>
      <description>Our podcast team is taking a break this week for the holidays. We’re revisiting some of our favorite interviews from 2016.   Tom Wingfield is Professor of Cyberspace law at the National Defense University, and one of the authors of the Tallin manual, an academic study of how international law applies to cyber conflicts and cyber warfare. We interviewed Tom Wingfield back in October, on location at the 2016 ASUA meeting in Washington DC. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 28 Dec 2016 15:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>254</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b55ea1a4-def8-11ea-911f-2310f8f7fbea/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Best of: Tom Wingfield</itunes:subtitle>
      <itunes:summary>Our podcast team is taking a break this week for the holidays. We’re revisiting some of our favorite interviews from 2016.   Tom Wingfield is Professor of Cyberspace law at the National Defense University, and one of the authors of the Tallin manual, an academic study of how international law applies to cyber conflicts and cyber warfare. We interviewed Tom Wingfield back in October, on location at the 2016 ASUA meeting in Washington DC. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our podcast team is taking a break this week for the holidays. We’re revisiting some of our favorite interviews from 2016.  <br> <br>Tom Wingfield is Professor of Cyberspace law at the National Defense University, and one of the authors of the Tallin manual, an academic study of how international law applies to cyber conflicts and cyber warfare. We interviewed Tom Wingfield back in October, on location at the 2016 ASUA meeting in Washington DC. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1050</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[03e99e12e60bdac7e67737e63826fd0d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3388979553.mp3?updated=1689786715" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Best of: Abby Smith Rumsey</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/253/notes</link>
      <description>Our podcast team is taking a break this week for the holidays. We’re revisiting some of our favorite interviews from 2016.   Back in May, we spoke with author and historian Abby Smith Rumsey about her latest book, “When We Are No More: How digital memory shapes our future.” The book explores human memory from pre-history to the present, from pictures painted on cave walls to the present, with all the world’s knowledge available in an instant on our mobile devices. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Dec 2016 15:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>253</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b576bb90-def8-11ea-911f-331588f33b6e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Best of: Abby Smith Rumsey</itunes:subtitle>
      <itunes:summary>Our podcast team is taking a break this week for the holidays. We’re revisiting some of our favorite interviews from 2016.   Back in May, we spoke with author and historian Abby Smith Rumsey about her latest book, “When We Are No More: How digital memory shapes our future.” The book explores human memory from pre-history to the present, from pictures painted on cave walls to the present, with all the world’s knowledge available in an instant on our mobile devices. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Our podcast team is taking a break this week for the holidays. We’re revisiting some of our favorite interviews from 2016.  <br> <br>Back in May, we spoke with author and historian Abby Smith Rumsey about her latest book, “When We Are No More: How digital memory shapes our future.” The book explores human memory from pre-history to the present, from pictures painted on cave walls to the present, with all the world’s knowledge available in an instant on our mobile devices. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1011</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d6bb10c89b8cca3987b4cfa78f54e8bb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9149167017.mp3?updated=1689786639" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Gunnery hacking. Influence operations and a proportionate response thereto? Yahoo breach post mortems. NIST issues Special Publication 800-184: "Guide for Cybersecurity Event Recovery."</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/252/notes</link>
      <description>In today's podcast we hear more about how Fancy Bear has gone to war. Russia denies meddling with US elections. US retaliation for influence operations is still under consideration—some speculate that when it comes, it may be loud. Siemens patches its widely used HVAC controller. Post mortems on the Yahoo! breach continue (and draw attention to cybersecurity EFTs). FBI Special Agent Keith Mularski describes the takedown of the Avalanche botnet. Awais Rashid from Lancaster University on data exfiltration by APTs. And NIST releases its guide to cyber incident response and recovery.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 23 Dec 2016 18:49:44 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>252</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b591ab62-def8-11ea-911f-bf258f23b218/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Gunnery hacking. Influence operations and a proportionate response thereto? Yahoo breach post mortems. NIST issues Special Publication 800-184: "Guide for Cybersecurity Event Recovery."</itunes:subtitle>
      <itunes:summary>In today's podcast we hear more about how Fancy Bear has gone to war. Russia denies meddling with US elections. US retaliation for influence operations is still under consideration—some speculate that when it comes, it may be loud. Siemens patches its widely used HVAC controller. Post mortems on the Yahoo! breach continue (and draw attention to cybersecurity EFTs). FBI Special Agent Keith Mularski describes the takedown of the Avalanche botnet. Awais Rashid from Lancaster University on data exfiltration by APTs. And NIST releases its guide to cyber incident response and recovery.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear more about how Fancy Bear has gone to war. Russia denies meddling with US elections. US retaliation for influence operations is still under consideration—some speculate that when it comes, it may be loud. Siemens patches its widely used HVAC controller. Post mortems on the Yahoo! breach continue (and draw attention to cybersecurity EFTs). FBI Special Agent Keith Mularski describes the takedown of the Avalanche botnet. Awais Rashid from Lancaster University on data exfiltration by APTs. And NIST releases its guide to cyber incident response and recovery.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1207</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[06e30952c66dbf7a17bdc1d72a6150fb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9926885377.mp3?updated=1689786530" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: ISIS offers Christmas inspiration (and it's got nothing to do with peace or good will). Fancy Bear makes a battlefield appearance. Blogging services under attack.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/251/notes</link>
      <description>In today's podcast, we hear about ISIS attempts to inspire Christmas attacks. Ukraine is on the receiving end of Russian tactical cyber operations, and yes, it's Fancy Bear. Analysts mull the possibility of a Russo-American détente emerging from cyber conflict. Mirai continues to rope maverick devices into its bot-herd.  Virginia Tech's Hume Center's Dr. Charles Clancy explains mobile device encryption. Adnan Amjad from Deloitte describes creative ways of finding IT talent. And WordPress and Tumblr receive criminal attention.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 22 Dec 2016 20:08:43 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>251</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b5d3099a-def8-11ea-911f-0f7239c82706/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: ISIS offers Christmas inspiration (and it's got nothing to do with peace or good will). Fancy Bear makes a battlefield appearance. Blogging services under attack.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about ISIS attempts to inspire Christmas attacks. Ukraine is on the receiving end of Russian tactical cyber operations, and yes, it's Fancy Bear. Analysts mull the possibility of a Russo-American détente emerging from cyber conflict. Mirai continues to rope maverick devices into its bot-herd.  Virginia Tech's Hume Center's Dr. Charles Clancy explains mobile device encryption. Adnan Amjad from Deloitte describes creative ways of finding IT talent. And WordPress and Tumblr receive criminal attention.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about ISIS attempts to inspire Christmas attacks. Ukraine is on the receiving end of Russian tactical cyber operations, and yes, it's Fancy Bear. Analysts mull the possibility of a Russo-American détente emerging from cyber conflict. Mirai continues to rope maverick devices into its bot-herd.  Virginia Tech's Hume Center's Dr. Charles Clancy explains mobile device encryption. Adnan Amjad from Deloitte describes creative ways of finding IT talent. And WordPress and Tumblr receive criminal attention.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>980</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b8366edab149af733af1caf929c7978d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1841192745.mp3?updated=1689786511" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Grid hacking in Ukraine? German terror investigations. Airliner vulnerability dispute. NIST wants post-quantum crypto standards. Project Wycheproof. Wassenaar update. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/250/notes</link>
      <description>In today's podcast, we hear about Ukraine's investigation of Saturday's power outages around Kiev—speculation says it was either a demonstration or misdirection. German police track terrorists' spoor online. Pakistani hackers hit Google's Bangladesh domain, possibly for the lulz. (Speaking of the lulz, OurMine is back and messing with Twitter accounts.) Panasonic and IOActive disagree over reports of airline vulnerabilities. Verizon mulls its Yahoo! acquisition plans, post-breach. NIST is looking for some post-quantum standards. Google's Project Wycheproof gets good early reviews. Joe Carrigan from the Johns Hopkins University Information Security Institute discusses the utility of burner email addresses. Sam McLane from Arctic Wolf reviews your incident response plan. Wassenaar renegotiation goes on hold. And the ShadowBrokers offer a low, low price, for Equation Group code, if you act now. (But we say "pass.")
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 21 Dec 2016 17:47:40 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>250</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b5e530c0-def8-11ea-911f-5f22b92da5fd/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Grid hacking in Ukraine? German terror investigations. Airliner vulnerability dispute. NIST wants post-quantum crypto standards. Project Wycheproof. Wassenaar update. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about Ukraine's investigation of Saturday's power outages around Kiev—speculation says it was either a demonstration or misdirection. German police track terrorists' spoor online. Pakistani hackers hit Google's Bangladesh domain, possibly for the lulz. (Speaking of the lulz, OurMine is back and messing with Twitter accounts.) Panasonic and IOActive disagree over reports of airline vulnerabilities. Verizon mulls its Yahoo! acquisition plans, post-breach. NIST is looking for some post-quantum standards. Google's Project Wycheproof gets good early reviews. Joe Carrigan from the Johns Hopkins University Information Security Institute discusses the utility of burner email addresses. Sam McLane from Arctic Wolf reviews your incident response plan. Wassenaar renegotiation goes on hold. And the ShadowBrokers offer a low, low price, for Equation Group code, if you act now. (But we say "pass.")
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about Ukraine's investigation of Saturday's power outages around Kiev—speculation says it was either a demonstration or misdirection. German police track terrorists' spoor online. Pakistani hackers hit Google's Bangladesh domain, possibly for the lulz. (Speaking of the lulz, OurMine is back and messing with Twitter accounts.) Panasonic and IOActive disagree over reports of airline vulnerabilities. Verizon mulls its Yahoo! acquisition plans, post-breach. NIST is looking for some post-quantum standards. Google's Project Wycheproof gets good early reviews. Joe Carrigan from the Johns Hopkins University Information Security Institute discusses the utility of burner email addresses. Sam McLane from Arctic Wolf reviews your incident response plan. Wassenaar renegotiation goes on hold. And the ShadowBrokers offer a low, low price, for Equation Group code, if you act now. (But we say "pass.")</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>961</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[921ed83af40c779da8cb8cd3ad3b5684]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1041034058.mp3?updated=1689786486" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Another Ukrainian power grid outage may have cyber causes. ShadowBrokers may have got Equation Group code from a rogue insider. WordPress brute-forcing. Evading volumetric detection. Methbot ad fraud. Wassenaar remains controversial. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/249/notes</link>
      <description>In today's podcast, we discuss another possible cyber incident that hit Ukraine's power grid last Saturday. Flashpoint looks at the ShadowBrokers' alleged Equation Group code and sees a rogue insider behind the leak. WordPress sites are receiving a lot of brute-forcing attempts. New spam and other attack techniques are evading volumetric detection. Mirai is sniffing for new IoT bots, and Dave Larson from Corero Network Security tells us what to expect in 2017. Jonathan Katz from the University of Maryland outlines advances in fully homomorphic encryption. Russian crooks skim ad revenue with the Methbot scam. Wassenaar cyber arms control remains controversial. And informed speculation suggests the ShadowBrokers and Bocephus Cleetus are—da—effectively, the same people.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Dec 2016 19:47:47 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>249</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b6020a24-def8-11ea-911f-d394b0fb3da4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Another Ukrainian power grid outage may have cyber causes. ShadowBrokers may have got Equation Group code from a rogue insider. WordPress brute-forcing. Evading volumetric detection. Methbot ad fraud. Wassenaar remains controversial. </itunes:subtitle>
      <itunes:summary>In today's podcast, we discuss another possible cyber incident that hit Ukraine's power grid last Saturday. Flashpoint looks at the ShadowBrokers' alleged Equation Group code and sees a rogue insider behind the leak. WordPress sites are receiving a lot of brute-forcing attempts. New spam and other attack techniques are evading volumetric detection. Mirai is sniffing for new IoT bots, and Dave Larson from Corero Network Security tells us what to expect in 2017. Jonathan Katz from the University of Maryland outlines advances in fully homomorphic encryption. Russian crooks skim ad revenue with the Methbot scam. Wassenaar cyber arms control remains controversial. And informed speculation suggests the ShadowBrokers and Bocephus Cleetus are—da—effectively, the same people.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we discuss another possible cyber incident that hit Ukraine's power grid last Saturday. Flashpoint looks at the ShadowBrokers' alleged Equation Group code and sees a rogue insider behind the leak. WordPress sites are receiving a lot of brute-forcing attempts. New spam and other attack techniques are evading volumetric detection. Mirai is sniffing for new IoT bots, and Dave Larson from Corero Network Security tells us what to expect in 2017. Jonathan Katz from the University of Maryland outlines advances in fully homomorphic encryption. Russian crooks skim ad revenue with the Methbot scam. Wassenaar cyber arms control remains controversial. And informed speculation suggests the ShadowBrokers and Bocephus Cleetus are—da—effectively, the same people.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>973</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ebec9b377a198079af14b090ac2ba157]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9561472424.mp3?updated=1689786469" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: ShadowBrokers update. More consequences of the Yahoo! breach. Other sites suffer data compromises. US investigations of, plans for retaliation against, Russian influence operations proceed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/248/notes</link>
      <description>In today's podcast, we hear about how the ShadowBrokers are stocking their discount rack with Equation Group bargains. Yahoo's data breach attracts regulatory, investor, and due diligence scrutiny. Yahoo's stolen data is also being offered for sale on the dark web. Multiple other data breaches come to light, and skids hit online games with DDoS attacks. Ben-Gurion University's Yisroel Mirsky describes vulnerabilities of the US 911 system. US investigation of Russian election influence operations continues, and the US says it's planning some sort of retaliation.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 19 Dec 2016 20:34:33 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>248</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b61971dc-def8-11ea-911f-97aee8b41a07/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: ShadowBrokers update. More consequences of the Yahoo! breach. Other sites suffer data compromises. US investigations of, plans for retaliation against, Russian influence operations proceed.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how the ShadowBrokers are stocking their discount rack with Equation Group bargains. Yahoo's data breach attracts regulatory, investor, and due diligence scrutiny. Yahoo's stolen data is also being offered for sale on the dark web. Multiple other data breaches come to light, and skids hit online games with DDoS attacks. Ben-Gurion University's Yisroel Mirsky describes vulnerabilities of the US 911 system. US investigation of Russian election influence operations continues, and the US says it's planning some sort of retaliation.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how the ShadowBrokers are stocking their discount rack with Equation Group bargains. Yahoo's data breach attracts regulatory, investor, and due diligence scrutiny. Yahoo's stolen data is also being offered for sale on the dark web. Multiple other data breaches come to light, and skids hit online games with DDoS attacks. Ben-Gurion University's Yisroel Mirsky describes vulnerabilities of the US 911 system. US investigation of Russian election influence operations continues, and the US says it's planning some sort of retaliation.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>988</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b9a4112b7f3182e8921c709c3fde53a3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6833829082.mp3?updated=1689786447" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: US Election Assistance Commission hacked. US, Russia, swap hard words over influence operations. Ransomware updates. More on the effects of the Yahoo! breach. Autonomous vehicles approaching.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/247/notes</link>
      <description>In today's podcast we hear about "Rasputin," a cybercriminal selling US Election Assistance Commission credentials. US investigation of Russian influence operations continues, with promises of eventual retaliation (nose-thumbing from Moscow received in response). UK and EU officials worry about Russian meddling with 2017 elections. The Yahoo! breach sinks in—some call it the "Exxon Valdez" of cyberspace. New ransomware strains and growing ransomware sector, but help in the form of an international public-private partnership. Markus Rauschecker from the University of Maryland Center for Health and Homeland Security  discusses the National Cyber Incident Response Plan (NCIRP). We talk privacy and encryption policy Jacob Ginsberg from EchoWorx. with And we're closer to seeing robot drivers on the streets.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 16 Dec 2016 20:36:24 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>247</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b62c08d8-def8-11ea-911f-f7f6c9882c80/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: US Election Assistance Commission hacked. US, Russia, swap hard words over influence operations. Ransomware updates. More on the effects of the Yahoo! breach. Autonomous vehicles approaching.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about "Rasputin," a cybercriminal selling US Election Assistance Commission credentials. US investigation of Russian influence operations continues, with promises of eventual retaliation (nose-thumbing from Moscow received in response). UK and EU officials worry about Russian meddling with 2017 elections. The Yahoo! breach sinks in—some call it the "Exxon Valdez" of cyberspace. New ransomware strains and growing ransomware sector, but help in the form of an international public-private partnership. Markus Rauschecker from the University of Maryland Center for Health and Homeland Security  discusses the National Cyber Incident Response Plan (NCIRP). We talk privacy and encryption policy Jacob Ginsberg from EchoWorx. with And we're closer to seeing robot drivers on the streets.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about "Rasputin," a cybercriminal selling US Election Assistance Commission credentials. US investigation of Russian influence operations continues, with promises of eventual retaliation (nose-thumbing from Moscow received in response). UK and EU officials worry about Russian meddling with 2017 elections. The Yahoo! breach sinks in—some call it the "Exxon Valdez" of cyberspace. New ransomware strains and growing ransomware sector, but help in the form of an international public-private partnership. Markus Rauschecker from the University of Maryland Center for Health and Homeland Security  discusses the National Cyber Incident Response Plan (NCIRP). We talk privacy and encryption policy Jacob Ginsberg from EchoWorx. with And we're closer to seeing robot drivers on the streets.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1228</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[975008f6c29ba9c3ef961a95812d7416]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6266534922.mp3?updated=1689786428" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Yahoo's big breach—industry reactions. Spyware circulates in the wild. Investigation of election hacking continues. Hacktivism and "faketivism." The ShadowBrokers are back.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/246/notes</link>
      <description>In today's podcast, we hear about Yahoo's disclosure of a record-setting breach—over a billion customer accounts are affected. CyberWire editor John Petrik collects industry comments on the breach. Microsoft reports finding "FinFisher-like" spyware in the wild. US investigation of Russian election hacking continues. The case for and against Fancy Bear is being made by observers, but the Intelligence Community says it will keep its conclusions to itself until the investigation is complete. ThreatConnect describes "faketivism." And the ShadowBrokers are back, and their broken English hasn’t gotten more convincing. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 15 Dec 2016 20:15:27 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>246</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b6454a14-def8-11ea-911f-93d7aaec060d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Yahoo's big breach—industry reactions. Spyware circulates in the wild. Investigation of election hacking continues. Hacktivism and "faketivism." The ShadowBrokers are back.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about Yahoo's disclosure of a record-setting breach—over a billion customer accounts are affected. CyberWire editor John Petrik collects industry comments on the breach. Microsoft reports finding "FinFisher-like" spyware in the wild. US investigation of Russian election hacking continues. The case for and against Fancy Bear is being made by observers, but the Intelligence Community says it will keep its conclusions to itself until the investigation is complete. ThreatConnect describes "faketivism." And the ShadowBrokers are back, and their broken English hasn’t gotten more convincing. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about Yahoo's disclosure of a record-setting breach—over a billion customer accounts are affected. CyberWire editor John Petrik collects industry comments on the breach. Microsoft reports finding "FinFisher-like" spyware in the wild. US investigation of Russian election hacking continues. The case for and against Fancy Bear is being made by observers, but the Intelligence Community says it will keep its conclusions to itself until the investigation is complete. ThreatConnect describes "faketivism." And the ShadowBrokers are back, and their broken English hasn’t gotten more convincing. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>971</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dd8ec012163cd5c3d74f61af608ba686]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7035740073.mp3?updated=1689786402" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Nation-state hacking (and nation-state victims of hacking). Loyalty program breaches, and a new Android Trojan strain.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/245/notes</link>
      <description>In today's podcast, we learn that Ukraine says its Defense Ministry was hacked, probably by Russia. US investigations of apparent Russian influence operations during elections continue. Venezuela talks up cyber threats as contributing to its financial crises. Dr. Web reports a new Loki Trojan variant in the wild. BugSec and Cynet disclose Facebook Messenger flaw (now patched). Level 3's Dale Drew provides insights on nation state hackers. Omri Iluz from PerimeterX warns us about gift card fraud. Colonel's Club breached. And hacktivists go after Russian consular data.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 14 Dec 2016 19:35:56 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>245</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b663ebf4-def8-11ea-911f-838044e8b2a4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Nation-state hacking (and nation-state victims of hacking). Loyalty program breaches, and a new Android Trojan strain.</itunes:subtitle>
      <itunes:summary>In today's podcast, we learn that Ukraine says its Defense Ministry was hacked, probably by Russia. US investigations of apparent Russian influence operations during elections continue. Venezuela talks up cyber threats as contributing to its financial crises. Dr. Web reports a new Loki Trojan variant in the wild. BugSec and Cynet disclose Facebook Messenger flaw (now patched). Level 3's Dale Drew provides insights on nation state hackers. Omri Iluz from PerimeterX warns us about gift card fraud. Colonel's Club breached. And hacktivists go after Russian consular data.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we learn that Ukraine says its Defense Ministry was hacked, probably by Russia. US investigations of apparent Russian influence operations during elections continue. Venezuela talks up cyber threats as contributing to its financial crises. Dr. Web reports a new Loki Trojan variant in the wild. BugSec and Cynet disclose Facebook Messenger flaw (now patched). Level 3's Dale Drew provides insights on nation state hackers. Omri Iluz from PerimeterX warns us about gift card fraud. Colonel's Club breached. And hacktivists go after Russian consular data.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>977</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[72ab8e087c94614a4f8222e7210349d4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9390278760.mp3?updated=1689786381" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: SWIFT issues new fraud warnings. US investigates Russian influence operations. Patch news. Wages of sin are in-game purchases?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/244/notes</link>
      <description>In today's podcast, we learn that SWIFT has warned member banks of ongoing attempts at fraudulent funds transfer. US investigation of Russian influence operations continues, with bipartisan support. German fears of Russian election hacking persist. Apple iOS, McAfee VirusScan Enterprise, and AirDroid get patches. Tor releases a browser with upgraded anonymity. Kevin Bocek from Venafi reminds us of the looming SHA-1 sunsetting. Ben Yelin from the University of Maryland Center for Health and Homeland Security examines a case involving stingray devices and warrantless searches. And some guy steals a million so he can spend it on in-game purchases.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Dec 2016 20:42:31 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>244</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b67c3a38-def8-11ea-911f-6f22e6c9f6ce/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: SWIFT issues new fraud warnings. US investigates Russian influence operations. Patch news. Wages of sin are in-game purchases?</itunes:subtitle>
      <itunes:summary>In today's podcast, we learn that SWIFT has warned member banks of ongoing attempts at fraudulent funds transfer. US investigation of Russian influence operations continues, with bipartisan support. German fears of Russian election hacking persist. Apple iOS, McAfee VirusScan Enterprise, and AirDroid get patches. Tor releases a browser with upgraded anonymity. Kevin Bocek from Venafi reminds us of the looming SHA-1 sunsetting. Ben Yelin from the University of Maryland Center for Health and Homeland Security examines a case involving stingray devices and warrantless searches. And some guy steals a million so he can spend it on in-game purchases.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we learn that SWIFT has warned member banks of ongoing attempts at fraudulent funds transfer. US investigation of Russian influence operations continues, with bipartisan support. German fears of Russian election hacking persist. Apple iOS, McAfee VirusScan Enterprise, and AirDroid get patches. Tor releases a browser with upgraded anonymity. Kevin Bocek from Venafi reminds us of the looming SHA-1 sunsetting. Ben Yelin from the University of Maryland Center for Health and Homeland Security examines a case involving stingray devices and warrantless searches. And some guy steals a million so he can spend it on in-game purchases.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>989</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dab41f860fd279f107dad778abd095a1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2289685787.mp3?updated=1689786361" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Stressor, booter shoppers arrested. Small DDoS against Russian banks. Botnets and home routers. Popcorn Time ransomware. US investigates Russian influence operations.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/243/notes</link>
      <description>In today's podcast, we hear about how an international police action swept up youths shopping for DDoS tools. Russian banks sustain a mild, easily parried DDoS attack. Mirai gets trickier. US-CERT warns against vulnerabilities in home routers. Popcorn Time ransomware says it's doing good by doing bad, but few will be deceived. US opens an investigation after the Intelligence Community concludes that Russian services tried to throw the US election away from Clinton and toward Trump. Emily Wilson from Terbium labs describes the markets for drugs and pharmaceuticals on the dark web. And North Korea says they didn't do it, you tantrum-throwing conservative puppet regime, you.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 12 Dec 2016 20:19:49 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>243</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b6977d16-def8-11ea-911f-d73d02b697d4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Stressor, booter shoppers arrested. Small DDoS against Russian banks. Botnets and home routers. Popcorn Time ransomware. US investigates Russian influence operations.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how an international police action swept up youths shopping for DDoS tools. Russian banks sustain a mild, easily parried DDoS attack. Mirai gets trickier. US-CERT warns against vulnerabilities in home routers. Popcorn Time ransomware says it's doing good by doing bad, but few will be deceived. US opens an investigation after the Intelligence Community concludes that Russian services tried to throw the US election away from Clinton and toward Trump. Emily Wilson from Terbium labs describes the markets for drugs and pharmaceuticals on the dark web. And North Korea says they didn't do it, you tantrum-throwing conservative puppet regime, you.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how an international police action swept up youths shopping for DDoS tools. Russian banks sustain a mild, easily parried DDoS attack. Mirai gets trickier. US-CERT warns against vulnerabilities in home routers. Popcorn Time ransomware says it's doing good by doing bad, but few will be deceived. US opens an investigation after the Intelligence Community concludes that Russian services tried to throw the US election away from Clinton and toward Trump. Emily Wilson from Terbium labs describes the markets for drugs and pharmaceuticals on the dark web. And North Korea says they didn't do it, you tantrum-throwing conservative puppet regime, you.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>881</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a8e91a27d167aea0fd3a7dc0725c6565]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2994460214.mp3?updated=1689786339" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Korean cyber alert amid a presidential impeachment. Germany calls out Fancy Bear for influence ops. Georgia—the Dixie one, not the one in the Caucasus—demands a cyber explanation. Holiday phishing, the enduring DDoS threat, and</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/242/notes</link>
      <description>In today's podcast, South Korea braces for the North to take cyber advantage of a constitutional crisis, but so far all's quiet. (Or most is quiet, anyway.) Germany takes official notice that Fancy Bear is working to disrupt next year's elections. The US state of Georgia thinks DHS may have tried to penetrate its election system post-election, and it wants to know what's up. ISIS is back online, and calling for attacks against Americans and Shiites. A phishing campaign trolls customer service reps with fileless malware. Experts expect more Mirai-driven DDoS. Rick Howard from Palo Alto Networks tells about the Cybersecurity Canon. Caleb Barlow from IBM Security explains the importance of a well practiced resiliency plan.  And the Avalanche criminal kingpin is on the lam after being sprung from a Ukrainian jail.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 09 Dec 2016 18:47:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>242</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b6b379c6-def8-11ea-911f-5b84d69edd86/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Korean cyber alert amid a presidential impeachment. Germany calls out Fancy Bear for influence ops. Georgia—the Dixie one, not the one in the Caucasus—demands a cyber explanation. Holiday phishing, the enduring DDoS threat, and</itunes:subtitle>
      <itunes:summary>In today's podcast, South Korea braces for the North to take cyber advantage of a constitutional crisis, but so far all's quiet. (Or most is quiet, anyway.) Germany takes official notice that Fancy Bear is working to disrupt next year's elections. The US state of Georgia thinks DHS may have tried to penetrate its election system post-election, and it wants to know what's up. ISIS is back online, and calling for attacks against Americans and Shiites. A phishing campaign trolls customer service reps with fileless malware. Experts expect more Mirai-driven DDoS. Rick Howard from Palo Alto Networks tells about the Cybersecurity Canon. Caleb Barlow from IBM Security explains the importance of a well practiced resiliency plan.  And the Avalanche criminal kingpin is on the lam after being sprung from a Ukrainian jail.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, South Korea braces for the North to take cyber advantage of a constitutional crisis, but so far all's quiet. (Or most is quiet, anyway.) Germany takes official notice that Fancy Bear is working to disrupt next year's elections. The US state of Georgia thinks DHS may have tried to penetrate its election system post-election, and it wants to know what's up. ISIS is back online, and calling for attacks against Americans and Shiites. A phishing campaign trolls customer service reps with fileless malware. Experts expect more Mirai-driven DDoS. Rick Howard from Palo Alto Networks tells about the Cybersecurity Canon. Caleb Barlow from IBM Security explains the importance of a well practiced resiliency plan.  And the Avalanche criminal kingpin is on the lam after being sprung from a Ukrainian jail.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1297</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8ebec9b3e6e23b8691f4ba8f6805236f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5743155021.mp3?updated=1689786273" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: IP theft in Germany. "Sledgehammer" looks like DDoS by Turkish patriotic hacktivists. Floki Bot and Dridex in the wild. Competition for cyber talent in a tight labor market.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/241/notes</link>
      <description>In today's podcast, we hear about an industrial espionage campaign against Germany's steel industry. Turkish hacktivists' Sledgehammer gamifies DDoS (and installs backdoors in its gamers). The Floki Bot Trojan is a cheap and evasive addition to the Zeus family. Dridex is back. GPS gets a cybersecurity upgrade. Too many people are still using Windows XP. Joe Carrigan from the Johns Hopkins University Information Security Institute reports back from the Grace Hopper conference. ZScaler's Deepen Desai describes the Stampado strain of ransomware. NSA is said to be struggling to compete with the private sector for cyber talent.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 08 Dec 2016 21:02:45 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>241</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b6c8586e-def8-11ea-911f-dbfd7a88fd6c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: IP theft in Germany. "Sledgehammer" looks like DDoS by Turkish patriotic hacktivists. Floki Bot and Dridex in the wild. Competition for cyber talent in a tight labor market.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about an industrial espionage campaign against Germany's steel industry. Turkish hacktivists' Sledgehammer gamifies DDoS (and installs backdoors in its gamers). The Floki Bot Trojan is a cheap and evasive addition to the Zeus family. Dridex is back. GPS gets a cybersecurity upgrade. Too many people are still using Windows XP. Joe Carrigan from the Johns Hopkins University Information Security Institute reports back from the Grace Hopper conference. ZScaler's Deepen Desai describes the Stampado strain of ransomware. NSA is said to be struggling to compete with the private sector for cyber talent.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about an industrial espionage campaign against Germany's steel industry. Turkish hacktivists' Sledgehammer gamifies DDoS (and installs backdoors in its gamers). The Floki Bot Trojan is a cheap and evasive addition to the Zeus family. Dridex is back. GPS gets a cybersecurity upgrade. Too many people are still using Windows XP. Joe Carrigan from the Johns Hopkins University Information Security Institute reports back from the Grace Hopper conference. ZScaler's Deepen Desai describes the Stampado strain of ransomware. NSA is said to be struggling to compete with the private sector for cyber talent.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>980</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fb8b8e5977c08dafe1f50d9fe33132b3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7106789004.mp3?updated=1689786250" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Ransomware updates. IP camera vulnerabilities. Steganography makes a comeback. Controlling content, with or without Internet autarky. Zo replaces Tay? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/240/notes</link>
      <description>In today's podcast, we hear that more network security cameras have been found vulnerable to bot-herding. Sony's are patched, so patch. Unpatched Flash bugs incorporated into exploit kits. New ransomware strains are out. Russia announces a new national Internet strategy as Canada and the EU grapple with the complexity and ambivalence of controlling extremist content. Steganography is back, alas, and in your banner ads. Dr. Charles Clancy from VA Tech’s Hume Center explains the challenges of developing security solutions that can function in both the federal and commercial realms. Ebba Blitz from Alertsec hasthe results of a survey on what Americans fear most when it comes to cyber security. And Tay's kid sister Zo makes her debut.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 07 Dec 2016 21:30:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>240</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b6dde2f6-def8-11ea-911f-0b7a35e6c619/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Ransomware updates. IP camera vulnerabilities. Steganography makes a comeback. Controlling content, with or without Internet autarky. Zo replaces Tay? </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that more network security cameras have been found vulnerable to bot-herding. Sony's are patched, so patch. Unpatched Flash bugs incorporated into exploit kits. New ransomware strains are out. Russia announces a new national Internet strategy as Canada and the EU grapple with the complexity and ambivalence of controlling extremist content. Steganography is back, alas, and in your banner ads. Dr. Charles Clancy from VA Tech’s Hume Center explains the challenges of developing security solutions that can function in both the federal and commercial realms. Ebba Blitz from Alertsec hasthe results of a survey on what Americans fear most when it comes to cyber security. And Tay's kid sister Zo makes her debut.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that more network security cameras have been found vulnerable to bot-herding. Sony's are patched, so patch. Unpatched Flash bugs incorporated into exploit kits. New ransomware strains are out. Russia announces a new national Internet strategy as Canada and the EU grapple with the complexity and ambivalence of controlling extremist content. Steganography is back, alas, and in your banner ads. Dr. Charles Clancy from VA Tech’s Hume Center explains the challenges of developing security solutions that can function in both the federal and commercial realms. Ebba Blitz from Alertsec hasthe results of a survey on what Americans fear most when it comes to cyber security. And Tay's kid sister Zo makes her debut.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1023</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7939b2b80c93b22f549cf9d0dea2e12]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5727130513.mp3?updated=1689786191" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: State-directed cyberattacks in the 2017 forecast. Tenable's Cybersecurity Assurance Report Card. DDoS and ransomware notes. Content filtering in social media. Connected toys too curious.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/239/notes</link>
      <description>In today's podcast, we hear that more state-directed hacking is in the forecast for 2017 (and Pyongyang seems to have a head start). A new DDoS botnet rivals Mirai. Ransomware notes. Android users are advised to stick with Google Play (and so avoid Gooligan). Content filtering in social media. Cris Thomas from Tenable talks about their cybersecurity report card. Awais Rashid from Lancaster University outlines critical national infrastructure. And more connected toys seems to be far too curious about those who play with them.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Dec 2016 16:32:17 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>239</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b6f57bbe-def8-11ea-911f-1ff999fae1e3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: State-directed cyberattacks in the 2017 forecast. Tenable's Cybersecurity Assurance Report Card. DDoS and ransomware notes. Content filtering in social media. Connected toys too curious.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that more state-directed hacking is in the forecast for 2017 (and Pyongyang seems to have a head start). A new DDoS botnet rivals Mirai. Ransomware notes. Android users are advised to stick with Google Play (and so avoid Gooligan). Content filtering in social media. Cris Thomas from Tenable talks about their cybersecurity report card. Awais Rashid from Lancaster University outlines critical national infrastructure. And more connected toys seems to be far too curious about those who play with them.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that more state-directed hacking is in the forecast for 2017 (and Pyongyang seems to have a head start). A new DDoS botnet rivals Mirai. Ransomware notes. Android users are advised to stick with Google Play (and so avoid Gooligan). Content filtering in social media. Cris Thomas from Tenable talks about their cybersecurity report card. Awais Rashid from Lancaster University outlines critical national infrastructure. And more connected toys seems to be far too curious about those who play with them.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1000</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ed9eebd324115b0d543ee21986a7c66a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3349195920.mp3?updated=1689786171" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Presidential Commission on Cybersecurity offers its recommendations to the next President. Russia says its financial system is under cyber threat. Cybercrime notes, and a scorecard.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/238/notes</link>
      <description>In today's podcast, we hear what the US Presidential Commission on Cybersecurity recommended in its long-anticipated report. Russia's FSB says today's the day foreign intelligence services are going to try to disrupt the Russian financial system. Ransomware author Pornpoker gets collared. Distributed guessing attacks might have been made against Tesco. Gooligan's business model is mostly advertising and garbage apps. Markus Rauschecker from University of MD's Center for Health and Homeland Security ponders IoT liability. Tenable's Global Cybersecurity Assurance Report Card tells the globe it's got room for improvement.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 05 Dec 2016 20:37:16 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>238</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b708e730-def8-11ea-911f-c70171970f29/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Presidential Commission on Cybersecurity offers its recommendations to the next President. Russia says its financial system is under cyber threat. Cybercrime notes, and a scorecard.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear what the US Presidential Commission on Cybersecurity recommended in its long-anticipated report. Russia's FSB says today's the day foreign intelligence services are going to try to disrupt the Russian financial system. Ransomware author Pornpoker gets collared. Distributed guessing attacks might have been made against Tesco. Gooligan's business model is mostly advertising and garbage apps. Markus Rauschecker from University of MD's Center for Health and Homeland Security ponders IoT liability. Tenable's Global Cybersecurity Assurance Report Card tells the globe it's got room for improvement.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear what the US Presidential Commission on Cybersecurity recommended in its long-anticipated report. Russia's FSB says today's the day foreign intelligence services are going to try to disrupt the Russian financial system. Ransomware author Pornpoker gets collared. Distributed guessing attacks might have been made against Tesco. Gooligan's business model is mostly advertising and garbage apps. Markus Rauschecker from University of MD's Center for Health and Homeland Security ponders IoT liability. Tenable's Global Cybersecurity Assurance Report Card tells the globe it's got room for improvement.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>902</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[928098990bd3fa589ff3dbaff59de16e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9990902532.mp3?updated=1689786079" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Europol and its partners say they've got the head of the Avalanche snake. DDoS and IoT botnet updates. Android vulnerability. New rules for warrants and insider threats.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/237/notes</link>
      <description>In today's podcast, we hear about an international take down of the Avalanche cybercrime ring. (Bravo, FBI…and others.) A vulnerability in AirDroid is reported—you can find the app in the Google Play Store. Russia says there's a plot afoot to hack its banks and spread financial panic. US Senators tell the White House they want to know more about Russian attempts to influence US elections. This week has seen more Mirai DDoS, a resurgence of Shamoon, and another round of WikiLeaks doxing. There are also changes to NISPOM and Rule 41 in the US, and Ben Yelin from the University of Maryland Center for Health and Homeland Security fills us in on that. Denim Group's John Dickson helps us understand what we might expect from the coming Trump presidency. In the UK the Snooper's Charter received Royal assent. And what do pacemakers and e-cigarettes have in common? Malware.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 02 Dec 2016 21:02:53 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>237</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b71ec334-def8-11ea-911f-0b21c495b020/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Europol and its partners say they've got the head of the Avalanche snake. DDoS and IoT botnet updates. Android vulnerability. New rules for warrants and insider threats.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about an international take down of the Avalanche cybercrime ring. (Bravo, FBI…and others.) A vulnerability in AirDroid is reported—you can find the app in the Google Play Store. Russia says there's a plot afoot to hack its banks and spread financial panic. US Senators tell the White House they want to know more about Russian attempts to influence US elections. This week has seen more Mirai DDoS, a resurgence of Shamoon, and another round of WikiLeaks doxing. There are also changes to NISPOM and Rule 41 in the US, and Ben Yelin from the University of Maryland Center for Health and Homeland Security fills us in on that. Denim Group's John Dickson helps us understand what we might expect from the coming Trump presidency. In the UK the Snooper's Charter received Royal assent. And what do pacemakers and e-cigarettes have in common? Malware.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about an international take down of the Avalanche cybercrime ring. (Bravo, FBI…and others.) A vulnerability in AirDroid is reported—you can find the app in the Google Play Store. Russia says there's a plot afoot to hack its banks and spread financial panic. US Senators tell the White House they want to know more about Russian attempts to influence US elections. This week has seen more Mirai DDoS, a resurgence of Shamoon, and another round of WikiLeaks doxing. There are also changes to NISPOM and Rule 41 in the US, and Ben Yelin from the University of Maryland Center for Health and Homeland Security fills us in on that. Denim Group's John Dickson helps us understand what we might expect from the coming Trump presidency. In the UK the Snooper's Charter received Royal assent. And what do pacemakers and e-cigarettes have in common? Malware.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1268</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ec84e3e4e2ae5fdd00682a980332ebfa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1924480359.mp3?updated=1689786067" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Shamoon and Fancy Bear are back. Mirai never left. San Francisco Muni saved by good backups. New Android Trojan found. Firefox patches threat to Tor anonymity. Surveillance policy, ISIS investigations in Germany. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/236/notes</link>
      <description>In today's podcast, we learn that Shamoon is back, again probably from Iran, and again hitting Saudi targets. Mirai infestations are turning up in the UK; observers see a criminal race to round up the biggest bot herd. Fancy Bear is also back, and still pawing at WADA. Good backup practices enabled San Francisco's Muni light rail to recover from ransomware. Palo Alto warns of a new Android Trojan. Facebook says there's no way ransomware was hidden in Messenger images. Firefox patches the zero-day that threatens Tor anonymity. Professor Jonathan Katz from the University of Maryland explains why ransomware crypto is hard, and Group iB's Dmitry Volkov describes ATM jacking group Colbalt.  Germany mulls going for more surveillance, less privacy, as investigations of ISIS operations continue.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 01 Dec 2016 20:35:50 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>236</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b73a8bc8-def8-11ea-911f-db4f17990a94/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Shamoon and Fancy Bear are back. Mirai never left. San Francisco Muni saved by good backups. New Android Trojan found. Firefox patches threat to Tor anonymity. Surveillance policy, ISIS investigations in Germany. </itunes:subtitle>
      <itunes:summary>In today's podcast, we learn that Shamoon is back, again probably from Iran, and again hitting Saudi targets. Mirai infestations are turning up in the UK; observers see a criminal race to round up the biggest bot herd. Fancy Bear is also back, and still pawing at WADA. Good backup practices enabled San Francisco's Muni light rail to recover from ransomware. Palo Alto warns of a new Android Trojan. Facebook says there's no way ransomware was hidden in Messenger images. Firefox patches the zero-day that threatens Tor anonymity. Professor Jonathan Katz from the University of Maryland explains why ransomware crypto is hard, and Group iB's Dmitry Volkov describes ATM jacking group Colbalt.  Germany mulls going for more surveillance, less privacy, as investigations of ISIS operations continue.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we learn that Shamoon is back, again probably from Iran, and again hitting Saudi targets. Mirai infestations are turning up in the UK; observers see a criminal race to round up the biggest bot herd. Fancy Bear is also back, and still pawing at WADA. Good backup practices enabled San Francisco's Muni light rail to recover from ransomware. Palo Alto warns of a new Android Trojan. Facebook says there's no way ransomware was hidden in Messenger images. Firefox patches the zero-day that threatens Tor anonymity. Professor Jonathan Katz from the University of Maryland explains why ransomware crypto is hard, and Group iB's Dmitry Volkov describes ATM jacking group Colbalt.  Germany mulls going for more surveillance, less privacy, as investigations of ISIS operations continue.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>987</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[47a6f1d77246c9f99ed6e25af9121abc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8825256045.mp3?updated=1689786042" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Mirai remains a threat; experts expect more IoT-driven DDoS. ISIS, online radicalization, and terror attacks in the US. Snooper's Charter and its alternatives. Gooligan Android malware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/235/notes</link>
      <description>In today's podcast, we hear about Deutsche Telekom's recovery from DDoS, and why there's probably a lot more Mirai where that came from. Omri Iluz from PerimeterX gives us the background on botnets. Germany arrests an alleged mole in the BfV. ISIS claims the Ohio State attacker as its "soldier." The Snooper's Charter becomes law in the UK. San Francisco's Muni hangs tough on ransomware. A new Android malware strain is out in the wild. We welcome Awais Rashid from Lancaster University to the show. And Ross Ulbricht's defense team say they've found a third crooked cop in the Silk Road case.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 30 Nov 2016 19:47:50 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>235</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b74e2ab6-def8-11ea-911f-1baf79bceb67/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Mirai remains a threat; experts expect more IoT-driven DDoS. ISIS, online radicalization, and terror attacks in the US. Snooper's Charter and its alternatives. Gooligan Android malware.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about Deutsche Telekom's recovery from DDoS, and why there's probably a lot more Mirai where that came from. Omri Iluz from PerimeterX gives us the background on botnets. Germany arrests an alleged mole in the BfV. ISIS claims the Ohio State attacker as its "soldier." The Snooper's Charter becomes law in the UK. San Francisco's Muni hangs tough on ransomware. A new Android malware strain is out in the wild. We welcome Awais Rashid from Lancaster University to the show. And Ross Ulbricht's defense team say they've found a third crooked cop in the Silk Road case.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about Deutsche Telekom's recovery from DDoS, and why there's probably a lot more Mirai where that came from. Omri Iluz from PerimeterX gives us the background on botnets. Germany arrests an alleged mole in the BfV. ISIS claims the Ohio State attacker as its "soldier." The Snooper's Charter becomes law in the UK. San Francisco's Muni hangs tough on ransomware. A new Android malware strain is out in the wild. We welcome Awais Rashid from Lancaster University to the show. And Ross Ulbricht's defense team say they've found a third crooked cop in the Silk Road case.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>992</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7b762107ba04f7147bce78251f0bd18c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2326504017.mp3?updated=1689786024" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: ISIS online sympathizers (but not ISIS itself, which is lying a bit low) claim Ohio State attacker. German security agencies warn of possible Russian disruption of elections. Mirai strikes again. San Francisco's Muni shrugs off ransomware. A look a</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/234/notes</link>
      <description>In today's podcast, we hear about how ISIS sympathizers are celebrating the Ohio State slasher rampage in social media. Germany's BND warns of Russian plans to disrupt elections. Deutsche Telekom recovers from a Mirai-driven DDoS attack. San Francisco's light rail recovers from ransomware (and resumes collecting fares). Holiday retail cyber security trends. A look into the dark web. Continuing security troubles for former and prospective US Secretaries of State. Level 3's Dale Drew takes a look at critical infrastructure. The Carter Administration gets doxed, and xHamster is breached.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Nov 2016 19:56:20 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>234</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b773baec-def8-11ea-911f-17e24fae7d15/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: ISIS online sympathizers (but not ISIS itself, which is lying a bit low) claim Ohio State attacker. German security agencies warn of possible Russian disruption of elections. Mirai strikes again. San Francisco's Muni shrugs off ransomware. A look a</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how ISIS sympathizers are celebrating the Ohio State slasher rampage in social media. Germany's BND warns of Russian plans to disrupt elections. Deutsche Telekom recovers from a Mirai-driven DDoS attack. San Francisco's light rail recovers from ransomware (and resumes collecting fares). Holiday retail cyber security trends. A look into the dark web. Continuing security troubles for former and prospective US Secretaries of State. Level 3's Dale Drew takes a look at critical infrastructure. The Carter Administration gets doxed, and xHamster is breached.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how ISIS sympathizers are celebrating the Ohio State slasher rampage in social media. Germany's BND warns of Russian plans to disrupt elections. Deutsche Telekom recovers from a Mirai-driven DDoS attack. San Francisco's light rail recovers from ransomware (and resumes collecting fares). Holiday retail cyber security trends. A look into the dark web. Continuing security troubles for former and prospective US Secretaries of State. Level 3's Dale Drew takes a look at critical infrastructure. The Carter Administration gets doxed, and xHamster is breached.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>999</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[054af708e0b83ce33083201b130c8d61]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1956280327.mp3?updated=1689786002" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Securing a Deal - Cyber Security Venture Capitalists on what they look for. A CyberWire Special Edition. [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/10/notes</link>
      <description>In this CyberWire Podcast Special Edition, we examine the current state of investment in cyber security, speak to experts in the field, and learn from top cyber security-focused venture capitalists what they expect before they invest.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Nov 2016 18:30:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/16834f52-df03-11ea-ae99-079bd7f6781e/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Securing a Deal - Cyber Security Venture Capitalists on what they look for. A CyberWire Special Edition.</itunes:subtitle>
      <itunes:summary>In this CyberWire Podcast Special Edition, we examine the current state of investment in cyber security, speak to experts in the field, and learn from top cyber security-focused venture capitalists what they expect before they invest.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this CyberWire Podcast Special Edition, we examine the current state of investment in cyber security, speak to experts in the field, and learn from top cyber security-focused venture capitalists what they expect before they invest.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1860</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[731fb95dfb903373c790fdf2dafaa80a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3213206236.mp3?updated=1656707884" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Military, law enforcement cooperation take a toll of ISIS operators. DDoS investigations. Mirai botnet can be rented on the black market. Beware ATM skimmers. Ransomware hits San Francisco light rail. Bogus news of cable show hacking.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/233/notes</link>
      <description>In today's podcast, we hear about how military, law enforcement cooperation are taking a toll of ISIS cyber operators. President Obama says the US elections weren't affected by hackers. DDoS in Brussels and Ireland remain under investigation. A Mirai botnet is available for rent on the cyber black market. ATM skimmers threaten holiday users—and the new inset skimmers are tough to detect. Ransomware hits San Francisco light rail (so the Muni lets passengers ride free). Booz Allen's Brad Medairy walks us through the Ukraine grid hack. Emily Wilson from Terbium Labs describes how they celebrate the holidays in the Dark Web. And no, Anthony Bourdain's foodie show wasn't hacked to get banned in Boston
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 28 Nov 2016 19:26:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>233</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b782c730-def8-11ea-911f-47c72a58fd1d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Military, law enforcement cooperation take a toll of ISIS operators. DDoS investigations. Mirai botnet can be rented on the black market. Beware ATM skimmers. Ransomware hits San Francisco light rail. Bogus news of cable show hacking.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how military, law enforcement cooperation are taking a toll of ISIS cyber operators. President Obama says the US elections weren't affected by hackers. DDoS in Brussels and Ireland remain under investigation. A Mirai botnet is available for rent on the cyber black market. ATM skimmers threaten holiday users—and the new inset skimmers are tough to detect. Ransomware hits San Francisco light rail (so the Muni lets passengers ride free). Booz Allen's Brad Medairy walks us through the Ukraine grid hack. Emily Wilson from Terbium Labs describes how they celebrate the holidays in the Dark Web. And no, Anthony Bourdain's foodie show wasn't hacked to get banned in Boston
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how military, law enforcement cooperation are taking a toll of ISIS cyber operators. President Obama says the US elections weren't affected by hackers. DDoS in Brussels and Ireland remain under investigation. A Mirai botnet is available for rent on the cyber black market. ATM skimmers threaten holiday users—and the new inset skimmers are tough to detect. Ransomware hits San Francisco light rail (so the Muni lets passengers ride free). Booz Allen's Brad Medairy walks us through the Ukraine grid hack. Emily Wilson from Terbium Labs describes how they celebrate the holidays in the Dark Web. And no, Anthony Bourdain's foodie show wasn't hacked to get banned in Boston</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>960</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c2c4f58dbd8ea9ff40f172d56e54929e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4621714297.mp3?updated=1689785980" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: ISIS shows a slightly different face in cyberspace. BITAG issues advice to the IoT industry. Jackpotting and carding investigated. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/232/notes</link>
      <description>In  today's podcast, we hear about how ISIS is making its way, quietly, back into the cyber news (and how the Australian Signals Directorate is on the case). The Broadband Internet Technology Advisory Group wants the IoT industry to face some unpleasant facts, and the security industry calls for standards. Europol finishes its second sweep of money mules. ATM jackpotting spreads in Europe and Asia. India suffers a wave of carding. Joe Carrigan from the Johns Hopkins University Information Security Institute reports back from the NICE Conference. BBC Journalist and Author Gordon Corera is our guest, discussing his latest book, "Cyber Spies - The secret history of surveillance, hacking and digital espionage." And security experts warn us all to be cyber savvy on Black Friday.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 23 Nov 2016 20:20:09 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>232</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b79dbb44-def8-11ea-911f-4b3f382d045a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: ISIS shows a slightly different face in cyberspace. BITAG issues advice to the IoT industry. Jackpotting and carding investigated. </itunes:subtitle>
      <itunes:summary>In  today's podcast, we hear about how ISIS is making its way, quietly, back into the cyber news (and how the Australian Signals Directorate is on the case). The Broadband Internet Technology Advisory Group wants the IoT industry to face some unpleasant facts, and the security industry calls for standards. Europol finishes its second sweep of money mules. ATM jackpotting spreads in Europe and Asia. India suffers a wave of carding. Joe Carrigan from the Johns Hopkins University Information Security Institute reports back from the NICE Conference. BBC Journalist and Author Gordon Corera is our guest, discussing his latest book, "Cyber Spies - The secret history of surveillance, hacking and digital espionage." And security experts warn us all to be cyber savvy on Black Friday.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In  today's podcast, we hear about how ISIS is making its way, quietly, back into the cyber news (and how the Australian Signals Directorate is on the case). The Broadband Internet Technology Advisory Group wants the IoT industry to face some unpleasant facts, and the security industry calls for standards. Europol finishes its second sweep of money mules. ATM jackpotting spreads in Europe and Asia. India suffers a wave of carding. Joe Carrigan from the Johns Hopkins University Information Security Institute reports back from the NICE Conference. BBC Journalist and Author Gordon Corera is our guest, discussing his latest book, "Cyber Spies - The secret history of surveillance, hacking and digital espionage." And security experts warn us all to be cyber savvy on Black Friday.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1259</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[990ab495751456ef9e985d2e15e61c23]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9760572350.mp3?updated=1689785977" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Banks are vulnerable to more than carding and transfer fraud. Ransomware updates. Lessons for users from the Three Mobile hack. Biometrics (with hedgehog). Election hacking retrospective.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/231/notes</link>
      <description>In today's podcast we hear about the FBI's warning that cash-spewing ATMs could be coming to a strip mall near you, courtesy of the Russian mob. Bad news and good news about ransomware. Another Android backdoor is reported. Exploitable security cameras get a patch. The Conficker worm's still crazy after all these years. Lessons for users from the Three Mobile hack. Biometrics meets the Wind in the Willows? (Fujitsu Biometrics' Derek Northrope provides a reality check.) Palo Alto's Rick Howard discusses the disconnect between the board room and the tech crew. China's new Internet law. And what have Fancy and Cozy Bear been up to? Hibernating?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Nov 2016 19:00:25 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>231</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b7b49d8c-def8-11ea-911f-a3a8e8328827/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Banks are vulnerable to more than carding and transfer fraud. Ransomware updates. Lessons for users from the Three Mobile hack. Biometrics (with hedgehog). Election hacking retrospective.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about the FBI's warning that cash-spewing ATMs could be coming to a strip mall near you, courtesy of the Russian mob. Bad news and good news about ransomware. Another Android backdoor is reported. Exploitable security cameras get a patch. The Conficker worm's still crazy after all these years. Lessons for users from the Three Mobile hack. Biometrics meets the Wind in the Willows? (Fujitsu Biometrics' Derek Northrope provides a reality check.) Palo Alto's Rick Howard discusses the disconnect between the board room and the tech crew. China's new Internet law. And what have Fancy and Cozy Bear been up to? Hibernating?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about the FBI's warning that cash-spewing ATMs could be coming to a strip mall near you, courtesy of the Russian mob. Bad news and good news about ransomware. Another Android backdoor is reported. Exploitable security cameras get a patch. The Conficker worm's still crazy after all these years. Lessons for users from the Three Mobile hack. Biometrics meets the Wind in the Willows? (Fujitsu Biometrics' Derek Northrope provides a reality check.) Palo Alto's Rick Howard discusses the disconnect between the board room and the tech crew. China's new Internet law. And what have Fancy and Cozy Bear been up to? Hibernating?</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>994</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a4bb2bb717c7664ff3b1dba6a2a0481f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8614837180.mp3?updated=1689785928" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: More of the customary cybercrime, but with additional warnings of new ransomware vectors. Dodgy apps and holiday shopping. Credential abuse. No pardon for Snowden, for now, anyway. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/230/notes</link>
      <description>In today's podcast, we talk about thinking twice before opening pictures received via Facebook Messenger. A recruiting site exposes GitHub profiles. Investigation of credential abuse in the Three Mobile upgrade fraud continues. Fortinet warns German users against an Android banking Trojan. Much advice on how to stay safe online during holiday shopping is out. Symantec plans to buy LifeLock, and Optiv is filing an IPO. President Obama says, while in Berlin, that he won't pardon Snowden. Rumors of DNI and SecDef discontent with Director NSA circulate. Markus Rauschecker from the University of MD Center for Health and Homeland Security reviews new automotive security guidelines from the feds. And no, Chinese cabinet ministers don't have a side gig recruiting for the Canadian Forces.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 21 Nov 2016 19:37:49 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>230</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b7ceecaa-def8-11ea-911f-cbd9037b4e8c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: More of the customary cybercrime, but with additional warnings of new ransomware vectors. Dodgy apps and holiday shopping. Credential abuse. No pardon for Snowden, for now, anyway. </itunes:subtitle>
      <itunes:summary>In today's podcast, we talk about thinking twice before opening pictures received via Facebook Messenger. A recruiting site exposes GitHub profiles. Investigation of credential abuse in the Three Mobile upgrade fraud continues. Fortinet warns German users against an Android banking Trojan. Much advice on how to stay safe online during holiday shopping is out. Symantec plans to buy LifeLock, and Optiv is filing an IPO. President Obama says, while in Berlin, that he won't pardon Snowden. Rumors of DNI and SecDef discontent with Director NSA circulate. Markus Rauschecker from the University of MD Center for Health and Homeland Security reviews new automotive security guidelines from the feds. And no, Chinese cabinet ministers don't have a side gig recruiting for the Canadian Forces.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we talk about thinking twice before opening pictures received via Facebook Messenger. A recruiting site exposes GitHub profiles. Investigation of credential abuse in the Three Mobile upgrade fraud continues. Fortinet warns German users against an Android banking Trojan. Much advice on how to stay safe online during holiday shopping is out. Symantec plans to buy LifeLock, and Optiv is filing an IPO. President Obama says, while in Berlin, that he won't pardon Snowden. Rumors of DNI and SecDef discontent with Director NSA circulate. Markus Rauschecker from the University of MD Center for Health and Homeland Security reviews new automotive security guidelines from the feds. And no, Chinese cabinet ministers don't have a side gig recruiting for the Canadian Forces.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>916</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d29ca3eea3b52c6ae4d269ee77dcb7e2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6082018221.mp3?updated=1689785881" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: US DNI Clapper says Russia "curtailed" election hacking after being named. Three Mobile breached. Android and iOS issues. Good news on ransomware. Start-up rundown. China calls its Internet controls "wisdom."</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/229/notes</link>
      <description>In today's podcast, we hear about US DNI Clapper's long-expected resignation and his contention that attributing election hacking to Russia seems to have induced Moscow to "curtail" such operations. The UK arrests suspects in an upgrade fraud scheme suffered by Three Mobile and its customers. Updates on Android spyware and banking Trojans. Siri might be helping bypass your iPhone's lockscreen. There's good and bad news about ransomware, but, happily, more good than bad. A quick review of the week's industry news, with an emphasis on cyber security start-ups. Dr. Charles Clancy from Virginia Tech's Hume Center outlines Virginia's new Cyber Security Range initiative. Sara Sorcher from the Christian Science Monitor's Passcode provides an overview of what we might expect from the Trump presidency. And, in China, wisdom sees a passing of the Mandate of Heaven in cyberspace. Or that's what wisdom's spokesmen are saying, anyway.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 18 Nov 2016 20:18:51 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>229</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b7e56de0-def8-11ea-911f-bb50c5b1c839/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: US DNI Clapper says Russia "curtailed" election hacking after being named. Three Mobile breached. Android and iOS issues. Good news on ransomware. Start-up rundown. China calls its Internet controls "wisdom."</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about US DNI Clapper's long-expected resignation and his contention that attributing election hacking to Russia seems to have induced Moscow to "curtail" such operations. The UK arrests suspects in an upgrade fraud scheme suffered by Three Mobile and its customers. Updates on Android spyware and banking Trojans. Siri might be helping bypass your iPhone's lockscreen. There's good and bad news about ransomware, but, happily, more good than bad. A quick review of the week's industry news, with an emphasis on cyber security start-ups. Dr. Charles Clancy from Virginia Tech's Hume Center outlines Virginia's new Cyber Security Range initiative. Sara Sorcher from the Christian Science Monitor's Passcode provides an overview of what we might expect from the Trump presidency. And, in China, wisdom sees a passing of the Mandate of Heaven in cyberspace. Or that's what wisdom's spokesmen are saying, anyway.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about US DNI Clapper's long-expected resignation and his contention that attributing election hacking to Russia seems to have induced Moscow to "curtail" such operations. The UK arrests suspects in an upgrade fraud scheme suffered by Three Mobile and its customers. Updates on Android spyware and banking Trojans. Siri might be helping bypass your iPhone's lockscreen. There's good and bad news about ransomware, but, happily, more good than bad. A quick review of the week's industry news, with an emphasis on cyber security start-ups. Dr. Charles Clancy from Virginia Tech's Hume Center outlines Virginia's new Cyber Security Range initiative. Sara Sorcher from the Christian Science Monitor's Passcode provides an overview of what we might expect from the Trump presidency. And, in China, wisdom sees a passing of the Mandate of Heaven in cyberspace. Or that's what wisdom's spokesmen are saying, anyway.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1262</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fce39e3ca7a43663199664eefc3b96bb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6324417326.mp3?updated=1608753239" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Social media aren't automatically on the right side of history, it seems. More on the Adups backdoor. Holiday shopping cyber-safety and security.  </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/228/notes</link>
      <description>In today's podcast, we hear about German concerns over Russian meddling in elections. In the US, the NSA Director says a nation-state made a conscious attempt to influence American elections. Dictators can use social media, too, it seems. Huawei and ZTE reassure customers about the Adups backdoor. Holiday shopping security warnings are out, and they're not just about online purchases, either—watch out for that in-store Wi-Fi. The UK's Snooper's Charter passes the House of Lords. Ran Yahalom from Ben Gurion University describes USB hardware attacks. John LaCour, CEO of Phishlabs provides advice on avoiding (wait for it…) phishing attacks. And a Russian court tells that country's ISPs to shut down LinkedIn—it's a concern about privacy, don't you know.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 17 Nov 2016 19:32:44 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>228</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b7fdb0bc-def8-11ea-911f-eb4211e91772/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Social media aren't automatically on the right side of history, it seems. More on the Adups backdoor. Holiday shopping cyber-safety and security.  </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about German concerns over Russian meddling in elections. In the US, the NSA Director says a nation-state made a conscious attempt to influence American elections. Dictators can use social media, too, it seems. Huawei and ZTE reassure customers about the Adups backdoor. Holiday shopping security warnings are out, and they're not just about online purchases, either—watch out for that in-store Wi-Fi. The UK's Snooper's Charter passes the House of Lords. Ran Yahalom from Ben Gurion University describes USB hardware attacks. John LaCour, CEO of Phishlabs provides advice on avoiding (wait for it…) phishing attacks. And a Russian court tells that country's ISPs to shut down LinkedIn—it's a concern about privacy, don't you know.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about German concerns over Russian meddling in elections. In the US, the NSA Director says a nation-state made a conscious attempt to influence American elections. Dictators can use social media, too, it seems. Huawei and ZTE reassure customers about the Adups backdoor. Holiday shopping security warnings are out, and they're not just about online purchases, either—watch out for that in-store Wi-Fi. The UK's Snooper's Charter passes the House of Lords. Ran Yahalom from Ben Gurion University describes USB hardware attacks. John LaCour, CEO of Phishlabs provides advice on avoiding (wait for it…) phishing attacks. And a Russian court tells that country's ISPs to shut down LinkedIn—it's a concern about privacy, don't you know.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1003</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[70ed9b36e2781e6455cbc27477ae00c8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6614273697.mp3?updated=1689785549" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: An insider threat deadline approaches. Lawful intercept tools from Italy. Carbanak moves to new targets. Security policy in Germany and the US. A guilty plea in the TalkTalk hack.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/227/notes</link>
      <description>In today's podcast, we hear about some lawful intercept tools that have been found prospecting Android. Synack calls shenanigans on Shazam, but maybe no harm, no foul. Carbanak turns from banks to hospitality. Insider threats and how to mitigate them—if you've got a facility clearance, you've got a deadline coming up, and Steven Grossman from Bay Dynamics explains what it means. Arlington Capital merges three of its companies into a new cyber shop, Polaris Alpha. Symantec is rumored to be sniffing at LifeLock. Cyber policy discussions in Germany and the US sound a lot alike. Jonathan Katz from the University of Maryland explains the pros and cons of photonic encryption. A teenager cops to the TalkTalk hack, and, if you're asking for a friend, the tally of accounts affected by the AdultFriendFinder breach hits 412 million.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 16 Nov 2016 20:07:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>227</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b819770c-def8-11ea-911f-5b44d6ec501e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: An insider threat deadline approaches. Lawful intercept tools from Italy. Carbanak moves to new targets. Security policy in Germany and the US. A guilty plea in the TalkTalk hack.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about some lawful intercept tools that have been found prospecting Android. Synack calls shenanigans on Shazam, but maybe no harm, no foul. Carbanak turns from banks to hospitality. Insider threats and how to mitigate them—if you've got a facility clearance, you've got a deadline coming up, and Steven Grossman from Bay Dynamics explains what it means. Arlington Capital merges three of its companies into a new cyber shop, Polaris Alpha. Symantec is rumored to be sniffing at LifeLock. Cyber policy discussions in Germany and the US sound a lot alike. Jonathan Katz from the University of Maryland explains the pros and cons of photonic encryption. A teenager cops to the TalkTalk hack, and, if you're asking for a friend, the tally of accounts affected by the AdultFriendFinder breach hits 412 million.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about some lawful intercept tools that have been found prospecting Android. Synack calls shenanigans on Shazam, but maybe no harm, no foul. Carbanak turns from banks to hospitality. Insider threats and how to mitigate them—if you've got a facility clearance, you've got a deadline coming up, and Steven Grossman from Bay Dynamics explains what it means. Arlington Capital merges three of its companies into a new cyber shop, Polaris Alpha. Symantec is rumored to be sniffing at LifeLock. Cyber policy discussions in Germany and the US sound a lot alike. Jonathan Katz from the University of Maryland explains the pros and cons of photonic encryption. A teenager cops to the TalkTalk hack, and, if you're asking for a friend, the tally of accounts affected by the AdultFriendFinder breach hits 412 million.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1005</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5bc1a96cbf7e5f7cc78fb4dcce50b650]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8972393499.mp3?updated=1689785526" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: It walks, it talks, it reports to Shanghai. Locky takes a run at US Army Cyber Command. CrySis decrypted. SpamTorte 2.0 is out. Adults should be warned off by "adult."</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/226/notes</link>
      <description>In today's podcast we hear about a backdoor Kryptowire has found preinstalled in some Android phones. We speak with Ryan Johnson, the researcher who discovered the vulnerability.  The Locky ransomware takes a run at US Army Cyber Command. CrySis ransomware is decrypted. SpamTorte 2.0 is out, and it's thinking big. A Trojan may be implicated in the Tesco fraud campaign, and it may have more banks in its crosshairs. Emily Wilson from Terbium Labs shares the findings of their latest report on the Dark Web, and Ping Identity's Pamela Dingle explains the Digital Transformation Journey. And watch out for the AdultFriendFinder-themed spam that will follow in the breach's wake.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Nov 2016 18:45:42 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>226</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b8351fac-def8-11ea-911f-8b6682249718/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: It walks, it talks, it reports to Shanghai. Locky takes a run at US Army Cyber Command. CrySis decrypted. SpamTorte 2.0 is out. Adults should be warned off by "adult."</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about a backdoor Kryptowire has found preinstalled in some Android phones. We speak with Ryan Johnson, the researcher who discovered the vulnerability.  The Locky ransomware takes a run at US Army Cyber Command. CrySis ransomware is decrypted. SpamTorte 2.0 is out, and it's thinking big. A Trojan may be implicated in the Tesco fraud campaign, and it may have more banks in its crosshairs. Emily Wilson from Terbium Labs shares the findings of their latest report on the Dark Web, and Ping Identity's Pamela Dingle explains the Digital Transformation Journey. And watch out for the AdultFriendFinder-themed spam that will follow in the breach's wake.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about a backdoor Kryptowire has found preinstalled in some Android phones. We speak with Ryan Johnson, the researcher who discovered the vulnerability.  The Locky ransomware takes a run at US Army Cyber Command. CrySis ransomware is decrypted. SpamTorte 2.0 is out, and it's thinking big. A Trojan may be implicated in the Tesco fraud campaign, and it may have more banks in its crosshairs. Emily Wilson from Terbium Labs shares the findings of their latest report on the Dark Web, and Ping Identity's Pamela Dingle explains the Digital Transformation Journey. And watch out for the AdultFriendFinder-themed spam that will follow in the breach's wake.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1098</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[095fbc5c0b51256d42866099102fa1e1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9695413183.mp3?updated=1689785509" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Russian banks suffer IoT botnet DDoS. Fancy Bear's still phishing. Lessons from Tesco fraud. Third-party risk hits Michael Page. Casino Rama data breach. Adult website loses data for 339 million accounts. FTC litigation. Moscow anti-trust case.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/225/notes</link>
      <description>In today's podcast, we follow up on last week's DDoS against Russian banks. Fancy Bear's been poking at think tanks, and ESET has a rundown of Fancy's fancies over the last couple of years. DDoS can be low and slow as well as high and noisy. Banks consider cyber lessons learned from Tesco heists. International recruiter Michael Page blames a third-party for data loss. Canada's Casino Rama—that's the casino's name—sustains a breach. A family of sites none of you would visit is also breached—we tell you because you're probably asking on behalf of 339 million friends. LabMD wins a stay against the FTC. Level 3's Dale Drew considers the changing nature of the IoT. And Kaspersky takes Microsoft to court in Moscow on an anti-trust beef.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 14 Nov 2016 19:49:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>225</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b84ad6ee-def8-11ea-911f-07041bc380ba/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Russian banks suffer IoT botnet DDoS. Fancy Bear's still phishing. Lessons from Tesco fraud. Third-party risk hits Michael Page. Casino Rama data breach. Adult website loses data for 339 million accounts. FTC litigation. Moscow anti-trust case.</itunes:subtitle>
      <itunes:summary>In today's podcast, we follow up on last week's DDoS against Russian banks. Fancy Bear's been poking at think tanks, and ESET has a rundown of Fancy's fancies over the last couple of years. DDoS can be low and slow as well as high and noisy. Banks consider cyber lessons learned from Tesco heists. International recruiter Michael Page blames a third-party for data loss. Canada's Casino Rama—that's the casino's name—sustains a breach. A family of sites none of you would visit is also breached—we tell you because you're probably asking on behalf of 339 million friends. LabMD wins a stay against the FTC. Level 3's Dale Drew considers the changing nature of the IoT. And Kaspersky takes Microsoft to court in Moscow on an anti-trust beef.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we follow up on last week's DDoS against Russian banks. Fancy Bear's been poking at think tanks, and ESET has a rundown of Fancy's fancies over the last couple of years. DDoS can be low and slow as well as high and noisy. Banks consider cyber lessons learned from Tesco heists. International recruiter Michael Page blames a third-party for data loss. Canada's Casino Rama—that's the casino's name—sustains a breach. A family of sites none of you would visit is also breached—we tell you because you're probably asking on behalf of 339 million friends. LabMD wins a stay against the FTC. Level 3's Dale Drew considers the changing nature of the IoT. And Kaspersky takes Microsoft to court in Moscow on an anti-trust beef.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>987</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c12ca4bbb307719ab5d285d73a4d10ed]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7629305723.mp3?updated=1689785491" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Yahoo! warns Verizon deal may be at risk. More OPM-themed ransomware phishing. Cyber policy advice for, and speculation about, the next US Administration.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/224/notes</link>
      <description>In today's podcast, we look back at election hacking concerns in the US (most of which didn't happen) and we hear from some people who offer advice for the next administration's first 100 days. Fancy Bear is phishing with Adobe and Microsoft zero-days. Investigation of the Tesco fraud continues. It looks as if the Bangladesh Bank might recover some of its losses in the SWIFT heist. There's an OPM-themed phishing campaign afoot. Server database issues point up the importance of digital hygiene. More Yahoo troubles. Markus Rauschecker from the University of Maryland Center for Health and Homeland Security explains new FCC privacy rules. Chuck Ames, Director of Cybersecurity for Maryland, describes new regulations for companies looking to do business with the government. Advice for the next US President. And, Marines, happy birthday and semper fi.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 10 Nov 2016 19:51:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>224</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b8676aac-def8-11ea-911f-63f0e722541f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Yahoo! warns Verizon deal may be at risk. More OPM-themed ransomware phishing. Cyber policy advice for, and speculation about, the next US Administration.</itunes:subtitle>
      <itunes:summary>In today's podcast, we look back at election hacking concerns in the US (most of which didn't happen) and we hear from some people who offer advice for the next administration's first 100 days. Fancy Bear is phishing with Adobe and Microsoft zero-days. Investigation of the Tesco fraud continues. It looks as if the Bangladesh Bank might recover some of its losses in the SWIFT heist. There's an OPM-themed phishing campaign afoot. Server database issues point up the importance of digital hygiene. More Yahoo troubles. Markus Rauschecker from the University of Maryland Center for Health and Homeland Security explains new FCC privacy rules. Chuck Ames, Director of Cybersecurity for Maryland, describes new regulations for companies looking to do business with the government. Advice for the next US President. And, Marines, happy birthday and semper fi.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we look back at election hacking concerns in the US (most of which didn't happen) and we hear from some people who offer advice for the next administration's first 100 days. Fancy Bear is phishing with Adobe and Microsoft zero-days. Investigation of the Tesco fraud continues. It looks as if the Bangladesh Bank might recover some of its losses in the SWIFT heist. There's an OPM-themed phishing campaign afoot. Server database issues point up the importance of digital hygiene. More Yahoo troubles. Markus Rauschecker from the University of Maryland Center for Health and Homeland Security explains new FCC privacy rules. Chuck Ames, Director of Cybersecurity for Maryland, describes new regulations for companies looking to do business with the government. Advice for the next US President. And, Marines, happy birthday and semper fi.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1092</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00bff4ea3db5c07a32675a3ce3ece386]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9245542153.mp3?updated=1689785475" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>US elections proceeded undisrupted by hacking. Patch Tuesday review. Banking Trojans, Android trigger-malware, and thermostats gone wild. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/223/notes</link>
      <description>In today's podcast we look at Patch Tuesday: Microsoft closes thirteen vulnerabilities (five of them "critical"), Adobe fixes Flash Player, and Google addresses Android issues. "Trigger-based" mobile malware, and why it's hard to see. Why usability matters to security. Tesco continues to recover from ATM fraud. Canadian police surveillance is scrutinized. Thermostat trouble in Finland. The Johns Hopkins University's Joe Carrigan discusses privacy of medical records. Professor Gene Tsudik from University of California, Irvine, explains a potential vulnerability with typing while Skyping. And, oh, we also hear there was some election or something in the US.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 09 Nov 2016 17:46:47 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>223</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b8875a56-def8-11ea-911f-f7b372e09b1a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>US elections proceeded undisrupted by hacking. Patch Tuesday review. Banking Trojans, Android trigger-malware, and thermostats gone wild. </itunes:subtitle>
      <itunes:summary>In today's podcast we look at Patch Tuesday: Microsoft closes thirteen vulnerabilities (five of them "critical"), Adobe fixes Flash Player, and Google addresses Android issues. "Trigger-based" mobile malware, and why it's hard to see. Why usability matters to security. Tesco continues to recover from ATM fraud. Canadian police surveillance is scrutinized. Thermostat trouble in Finland. The Johns Hopkins University's Joe Carrigan discusses privacy of medical records. Professor Gene Tsudik from University of California, Irvine, explains a potential vulnerability with typing while Skyping. And, oh, we also hear there was some election or something in the US.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we look at Patch Tuesday: Microsoft closes thirteen vulnerabilities (five of them "critical"), Adobe fixes Flash Player, and Google addresses Android issues. "Trigger-based" mobile malware, and why it's hard to see. Why usability matters to security. Tesco continues to recover from ATM fraud. Canadian police surveillance is scrutinized. Thermostat trouble in Finland. The Johns Hopkins University's Joe Carrigan discusses privacy of medical records. Professor Gene Tsudik from University of California, Irvine, explains a potential vulnerability with typing while Skyping. And, oh, we also hear there was some election or something in the US.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1011</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[35283349090a6443b7cae565ceed9605]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7101889366.mp3?updated=1689785454" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Election Day cyber updates. Mirai goes to pieces. Five Eyes and Europol take down dark web souks. Turkey and clamps down on their Internet.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/222/notes</link>
      <description>In today's podcast we hear that US authorities are ready for election hacking, but assess the risk as low. (The information operations, however, seem to be another matter.) Flashpoint sees Mirai being fragmented in a black-market market correction. Users in Turkey flee censorship into Tor. Operation Hyperion shuts down a lot of dark web nastiness. Tesco fraud investigations continue. Palo Alto's Rick Howard describes a new white paper on the growing sophistication of Nigerian online scammers. CrowdStrike's Dan Larson explains the evolving motivations of threat actors. And an email spoofer tells the court there's no tort, because his email was so implausible.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Nov 2016 19:07:02 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>222</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b89cc846-def8-11ea-911f-5380eb249094/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Election Day cyber updates. Mirai goes to pieces. Five Eyes and Europol take down dark web souks. Turkey and clamps down on their Internet.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that US authorities are ready for election hacking, but assess the risk as low. (The information operations, however, seem to be another matter.) Flashpoint sees Mirai being fragmented in a black-market market correction. Users in Turkey flee censorship into Tor. Operation Hyperion shuts down a lot of dark web nastiness. Tesco fraud investigations continue. Palo Alto's Rick Howard describes a new white paper on the growing sophistication of Nigerian online scammers. CrowdStrike's Dan Larson explains the evolving motivations of threat actors. And an email spoofer tells the court there's no tort, because his email was so implausible.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that US authorities are ready for election hacking, but assess the risk as low. (The information operations, however, seem to be another matter.) Flashpoint sees Mirai being fragmented in a black-market market correction. Users in Turkey flee censorship into Tor. Operation Hyperion shuts down a lot of dark web nastiness. Tesco fraud investigations continue. Palo Alto's Rick Howard describes a new white paper on the growing sophistication of Nigerian online scammers. CrowdStrike's Dan Larson explains the evolving motivations of threat actors. And an email spoofer tells the court there's no tort, because his email was so implausible.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1009</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4795ead06ea529b44aa4ef381fd2a77f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7544159506.mp3?updated=1689785402" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Election Eve cyber threat roundup. Retail bank Tesco stops online banking after wave of fraud.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/221/notes</link>
      <description>In today's podcast, we offer an Election Day Eve round-up of current cyber tensions, especially between the US and Russia: influence operations for sure, disruption possibly, vote manipulation maybe (but probably not). Ukrainian hacktivists continue to dox a major Putin consigliere. UK retail bank Tesco shuts down online operations due to a wave of fraud. Ben Yelin from the University of Maryland Center of Health and Homeland Security provides a final assessment of the US presidential candidates. And Indian police say a rival service seems responsible for a July DDoS attack in Mumbai. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 07 Nov 2016 22:11:54 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>221</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b8ba6bc6-def8-11ea-911f-3b3c7f6adecd/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Election Eve cyber threat roundup. Retail bank Tesco stops online banking after wave of fraud.</itunes:subtitle>
      <itunes:summary>In today's podcast, we offer an Election Day Eve round-up of current cyber tensions, especially between the US and Russia: influence operations for sure, disruption possibly, vote manipulation maybe (but probably not). Ukrainian hacktivists continue to dox a major Putin consigliere. UK retail bank Tesco shuts down online operations due to a wave of fraud. Ben Yelin from the University of Maryland Center of Health and Homeland Security provides a final assessment of the US presidential candidates. And Indian police say a rival service seems responsible for a July DDoS attack in Mumbai. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we offer an Election Day Eve round-up of current cyber tensions, especially between the US and Russia: influence operations for sure, disruption possibly, vote manipulation maybe (but probably not). Ukrainian hacktivists continue to dox a major Putin consigliere. UK retail bank Tesco shuts down online operations due to a wave of fraud. Ben Yelin from the University of Maryland Center of Health and Homeland Security provides a final assessment of the US presidential candidates. And Indian police say a rival service seems responsible for a July DDoS attack in Mumbai. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>897</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6756c0f3ca64b97d654e189e306bb2f5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8858864140.mp3?updated=1689785382" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Mirai, "Botnet #14," hits Liberian networks. Anonymous doesn't much care for either jihad or the Man. A new security company forms with acquisition of Cryptzone, Catbird, Easy Solutions, and Brainspace. Election hacking updates.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/220/notes</link>
      <description>In today's podcast, we hear about how Liberia has sustained a significant DDoS attack (Mirai is behind it). Linux/Moose is also on the IoT loose. Hospitals in the UK continue to recover from ransomware attacks. Anonymous doesn't like ISIS, but it also doesn't like the governments who are fighting the Caliphate. Exaspy malware targets business leaders' Android phones. A new joint venture is poised to become a mid-major in the cyber security sector. Accenture Technology Labs' Malek Ben Salem explains developments in redactable blockchain. AT&amp;T CSO Bill O'Hern provides his perspective on current and coming cyber security challenges. And an update on election hacking—it's more of the same, with more coming.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 04 Nov 2016 19:18:50 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>220</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b8cc3c02-def8-11ea-911f-97970f5e1864/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Mirai, "Botnet #14," hits Liberian networks. Anonymous doesn't much care for either jihad or the Man. A new security company forms with acquisition of Cryptzone, Catbird, Easy Solutions, and Brainspace. Election hacking updates.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how Liberia has sustained a significant DDoS attack (Mirai is behind it). Linux/Moose is also on the IoT loose. Hospitals in the UK continue to recover from ransomware attacks. Anonymous doesn't like ISIS, but it also doesn't like the governments who are fighting the Caliphate. Exaspy malware targets business leaders' Android phones. A new joint venture is poised to become a mid-major in the cyber security sector. Accenture Technology Labs' Malek Ben Salem explains developments in redactable blockchain. AT&amp;T CSO Bill O'Hern provides his perspective on current and coming cyber security challenges. And an update on election hacking—it's more of the same, with more coming.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how Liberia has sustained a significant DDoS attack (Mirai is behind it). Linux/Moose is also on the IoT loose. Hospitals in the UK continue to recover from ransomware attacks. Anonymous doesn't like ISIS, but it also doesn't like the governments who are fighting the Caliphate. Exaspy malware targets business leaders' Android phones. A new joint venture is poised to become a mid-major in the cyber security sector. Accenture Technology Labs' Malek Ben Salem explains developments in redactable blockchain. AT&amp;T CSO Bill O'Hern provides his perspective on current and coming cyber security challenges. And an update on election hacking—it's more of the same, with more coming.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1322</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e69b9c48da71634b76b83b57532d05b9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6559617140.mp3?updated=1689785365" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Sources say FBI is confident foreign intelligence services penetrated former Secretary of State's private email server. WikiLeaks says it's not a Russian tool. Notes on industry; notes on cybercrime.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/219/notes</link>
      <description>In today's podcast we hear about how fallout from the FBI investigation of former Congressman Wiener continues to drop onto the Clinton campaign. WikiLeaks' Assange says he'll continue to dox, but denies he's doing so with Russian help. Iot-driven DDoS fears continue. A new exploit kit is replacing earlier stars in the criminal firmament. Jonathan Katz from the University of Maryland describes an experiment Google ran, pitting several AIs against each other in an encryption challenge.  Edward Fox from MetTel explains the role telecommunications companies play in cyber security. NIST issues a cybersecurity workforce framework, NSA promotes its Day of Cyber, and the SINET 16 are introduced in Washington.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 03 Nov 2016 20:18:51 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>219</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b8e4a472-def8-11ea-911f-d73541d448ea/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Sources say FBI is confident foreign intelligence services penetrated former Secretary of State's private email server. WikiLeaks says it's not a Russian tool. Notes on industry; notes on cybercrime.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about how fallout from the FBI investigation of former Congressman Wiener continues to drop onto the Clinton campaign. WikiLeaks' Assange says he'll continue to dox, but denies he's doing so with Russian help. Iot-driven DDoS fears continue. A new exploit kit is replacing earlier stars in the criminal firmament. Jonathan Katz from the University of Maryland describes an experiment Google ran, pitting several AIs against each other in an encryption challenge.  Edward Fox from MetTel explains the role telecommunications companies play in cyber security. NIST issues a cybersecurity workforce framework, NSA promotes its Day of Cyber, and the SINET 16 are introduced in Washington.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about how fallout from the FBI investigation of former Congressman Wiener continues to drop onto the Clinton campaign. WikiLeaks' Assange says he'll continue to dox, but denies he's doing so with Russian help. Iot-driven DDoS fears continue. A new exploit kit is replacing earlier stars in the criminal firmament. Jonathan Katz from the University of Maryland describes an experiment Google ran, pitting several AIs against each other in an encryption challenge.  Edward Fox from MetTel explains the role telecommunications companies play in cyber security. NIST issues a cybersecurity workforce framework, NSA promotes its Day of Cyber, and the SINET 16 are introduced in Washington.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>996</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d76e5d5a3274500213321263edf9dffb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9379243656.mp3?updated=1689785345" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: To disclose or not to disclose…in public. A look into the dark web. Chrome and Firefox disallow shaky certificates. Anonymous gets an incomplete. The Shadow Brokers are still after the Wealthy Elite.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/218/notes</link>
      <description>In today's podcast, we hear about the Microsoft and Google disagreement over public vulnerability disclosure (with a side of Fancy Bear). We also get some industry reactions to the dispute. Terbium takes a good look at the dark web and finds it's not as uniformly sinister as many believe. Google and Mozilla move to reject dodgy certificates. NIST releases a job map. Anonymous gets a grade of incomplete in its trolling of ISIS. Identity Guard's Jerry Thompson describes new technology for protecting your identity online. Ran Yahalom from Ben-Gurion University explains hiding data in USB devices. And the Shadow Brokers' news seems a bit old.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 02 Nov 2016 17:43:58 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>218</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b8fb5348-def8-11ea-911f-63be3691ff56/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: To disclose or not to disclose…in public. A look into the dark web. Chrome and Firefox disallow shaky certificates. Anonymous gets an incomplete. The Shadow Brokers are still after the Wealthy Elite.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about the Microsoft and Google disagreement over public vulnerability disclosure (with a side of Fancy Bear). We also get some industry reactions to the dispute. Terbium takes a good look at the dark web and finds it's not as uniformly sinister as many believe. Google and Mozilla move to reject dodgy certificates. NIST releases a job map. Anonymous gets a grade of incomplete in its trolling of ISIS. Identity Guard's Jerry Thompson describes new technology for protecting your identity online. Ran Yahalom from Ben-Gurion University explains hiding data in USB devices. And the Shadow Brokers' news seems a bit old.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about the Microsoft and Google disagreement over public vulnerability disclosure (with a side of Fancy Bear). We also get some industry reactions to the dispute. Terbium takes a good look at the dark web and finds it's not as uniformly sinister as many believe. Google and Mozilla move to reject dodgy certificates. NIST releases a job map. Anonymous gets a grade of incomplete in its trolling of ISIS. Identity Guard's Jerry Thompson describes new technology for protecting your identity online. Ran Yahalom from Ben-Gurion University explains hiding data in USB devices. And the Shadow Brokers' news seems a bit old.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1011</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[393516cdc5dc1166617ed96ad3bf7706]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1110990501.mp3?updated=1689785325" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: The Shadow Brokers say trick or treat to the Amerikanski. Are free elections like free beer? Google wants faster patching. The state of Mirai.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/217/notes</link>
      <description>In today's podcast we hear that the Shadow Brokers are back, and again mangling English like a bad scriptwriter doing Ensign Chekhov fan-fiction. Russian leaders continue to scoff at American elections, and WikiLeaks continues to leak. Microsoft doesn't patch fast enough to suit Google. Researchers consider the scope, threat, and mitigation of the Mirai IoT botnet. We welcome Rick Howard from Palo Alto Networks to the show. Ferruh Matvituna explains how Content Security Policy can protect against cross site scripting. And Furby's back, but this time it's connected.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 01 Nov 2016 19:05:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>217</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b934238a-def8-11ea-911f-9393e8afbbfb/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: The Shadow Brokers say trick or treat to the Amerikanski. Are free elections like free beer? Google wants faster patching. The state of Mirai.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that the Shadow Brokers are back, and again mangling English like a bad scriptwriter doing Ensign Chekhov fan-fiction. Russian leaders continue to scoff at American elections, and WikiLeaks continues to leak. Microsoft doesn't patch fast enough to suit Google. Researchers consider the scope, threat, and mitigation of the Mirai IoT botnet. We welcome Rick Howard from Palo Alto Networks to the show. Ferruh Matvituna explains how Content Security Policy can protect against cross site scripting. And Furby's back, but this time it's connected.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that the Shadow Brokers are back, and again mangling English like a bad scriptwriter doing Ensign Chekhov fan-fiction. Russian leaders continue to scoff at American elections, and WikiLeaks continues to leak. Microsoft doesn't patch fast enough to suit Google. Researchers consider the scope, threat, and mitigation of the Mirai IoT botnet. We welcome Rick Howard from Palo Alto Networks to the show. Ferruh Matvituna explains how Content Security Policy can protect against cross site scripting. And Furby's back, but this time it's connected.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>998</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b584f3044156858c23d89d22e5e8c62e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5777270181.mp3?updated=1689785305" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Halloween special: mummies, lycanthropes, vampires, villagers with pitchforks, and virtual stakes through virtual hearts.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/216/notes</link>
      <description>In today's Halloween podcast, we consider post mortems on the October IoT distributed denial-of-service attacks, which suggest there are bigger problems than just factory settings. Recalls of potentially compromised devices continue, and some think about hacking back. (A hint—think twice.) HackForums pulls down its network stressor offerings. South Korea says the North is up to more cyber badness. US election hacking concerns continue. The FBI reopens its email inquiry. Level 3's Dale Drew discusses the growing scale of online attacks. And observers wonder, what do you have to do to lose a clearance?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 31 Oct 2016 19:20:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>216</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b953bb14-def8-11ea-911f-939c34204ce5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Halloween special: mummies, lycanthropes, vampires, villagers with pitchforks, and virtual stakes through virtual hearts.</itunes:subtitle>
      <itunes:summary>In today's Halloween podcast, we consider post mortems on the October IoT distributed denial-of-service attacks, which suggest there are bigger problems than just factory settings. Recalls of potentially compromised devices continue, and some think about hacking back. (A hint—think twice.) HackForums pulls down its network stressor offerings. South Korea says the North is up to more cyber badness. US election hacking concerns continue. The FBI reopens its email inquiry. Level 3's Dale Drew discusses the growing scale of online attacks. And observers wonder, what do you have to do to lose a clearance?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Halloween podcast, we consider post mortems on the October IoT distributed denial-of-service attacks, which suggest there are bigger problems than just factory settings. Recalls of potentially compromised devices continue, and some think about hacking back. (A hint—think twice.) HackForums pulls down its network stressor offerings. South Korea says the North is up to more cyber badness. US election hacking concerns continue. The FBI reopens its email inquiry. Level 3's Dale Drew discusses the growing scale of online attacks. And observers wonder, what do you have to do to lose a clearance?</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>835</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0813e7a74c3215bd3cc61aa88356c508]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9457574100.mp3?updated=1689709145" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Not all experts agree you should resign yourself to being hacked. The state of fraud, 2016. Ransomware and DDoS updates. The Kremlin gets doxed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/215/notes</link>
      <description>On today's podcast, we hear that ransomware is still with us. A new study of online fraud is out, and one lesson is, it's better to take some, any, precaution than to whistle and hope for the best. The Australian Red Cross suffers a data breach affecting more than a million blood donors' records. Windows seems to suffer from an exploitable vulnerability—how serious it may prove remains to be seen. Mirai botnets continue to sputter across the IoT. Signs point to a public-health approach to mitigating DDoS. Ben Yelin reports on a Maryland surveillance hearing. Duo Security's Dug Song thinks it's time to get back to basics. Not everyone believes you need to resign yourself to being hacked. And those doxed Kremlin emails? Apparently real.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 28 Oct 2016 18:58:25 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>215</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b993c006-def8-11ea-911f-df23f0c18614/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Not all experts agree you should resign yourself to being hacked. The state of fraud, 2016. Ransomware and DDoS updates. The Kremlin gets doxed.</itunes:subtitle>
      <itunes:summary>On today's podcast, we hear that ransomware is still with us. A new study of online fraud is out, and one lesson is, it's better to take some, any, precaution than to whistle and hope for the best. The Australian Red Cross suffers a data breach affecting more than a million blood donors' records. Windows seems to suffer from an exploitable vulnerability—how serious it may prove remains to be seen. Mirai botnets continue to sputter across the IoT. Signs point to a public-health approach to mitigating DDoS. Ben Yelin reports on a Maryland surveillance hearing. Duo Security's Dug Song thinks it's time to get back to basics. Not everyone believes you need to resign yourself to being hacked. And those doxed Kremlin emails? Apparently real.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>On today's podcast, we hear that ransomware is still with us. A new study of online fraud is out, and one lesson is, it's better to take some, any, precaution than to whistle and hope for the best. The Australian Red Cross suffers a data breach affecting more than a million blood donors' records. Windows seems to suffer from an exploitable vulnerability—how serious it may prove remains to be seen. Mirai botnets continue to sputter across the IoT. Signs point to a public-health approach to mitigating DDoS. Ben Yelin reports on a Maryland surveillance hearing. Duo Security's Dug Song thinks it's time to get back to basics. Not everyone believes you need to resign yourself to being hacked. And those doxed Kremlin emails? Apparently real.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1324</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2e6a1e51daede08918cf6a4c0e0cacab]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2624339776.mp3?updated=1608753241" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Exploring Cyber Security Education [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/9/notes</link>
      <description>In this CyberWire Podcast Special Edition, we examine the current state of cyber security education, speak to experts in the field, and learn about what it’s going to take to prepare the next generation of cyber security professionals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 28 Oct 2016 16:30:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>9</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/122608d2-df03-11ea-8146-17641972048e/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Exploring Cyber Security Education</itunes:subtitle>
      <itunes:summary>In this CyberWire Podcast Special Edition, we examine the current state of cyber security education, speak to experts in the field, and learn about what it’s going to take to prepare the next generation of cyber security professionals.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this CyberWire Podcast Special Edition, we examine the current state of cyber security education, speak to experts in the field, and learn about what it’s going to take to prepare the next generation of cyber security professionals.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>2020</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cb5058d74ab944621edfae36dc337fe3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7304932145.mp3?updated=1656707871" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: DDoS concerns mount—not just Mirai botnets, but LDAP exploitation. Ukrainian hacktivists release emails they say belong to one of Putin's closest advisors. (Moscow says they're fake. Moscow's on its own.)</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/214/notes</link>
      <description>In today's podcast, we hear more about the IoT worries people are sharing about both industrial systems and consumer-grade products. Iot device recalls continue. Analysts expect there are more, and worse, DDoS attacks to come. Cyber espionage surfaces again in the Middle East. Yisroel Mirsky from Ben-Gurion University on machine learning research. Thomas Pore from Plixer on the Mirai botnet source code. And what's sauce for the goose, is sauce for the gander. Or so we hear, at least with doxing.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 27 Oct 2016 18:04:53 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>214</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b9ac7cfe-def8-11ea-911f-9fe77bc7f931/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: DDoS concerns mount—not just Mirai botnets, but LDAP exploitation. Ukrainian hacktivists release emails they say belong to one of Putin's closest advisors. (Moscow says they're fake. Moscow's on its own.)</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear more about the IoT worries people are sharing about both industrial systems and consumer-grade products. Iot device recalls continue. Analysts expect there are more, and worse, DDoS attacks to come. Cyber espionage surfaces again in the Middle East. Yisroel Mirsky from Ben-Gurion University on machine learning research. Thomas Pore from Plixer on the Mirai botnet source code. And what's sauce for the goose, is sauce for the gander. Or so we hear, at least with doxing.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear more about the IoT worries people are sharing about both industrial systems and consumer-grade products. Iot device recalls continue. Analysts expect there are more, and worse, DDoS attacks to come. Cyber espionage surfaces again in the Middle East. Yisroel Mirsky from Ben-Gurion University on machine learning research. Thomas Pore from Plixer on the Mirai botnet source code. And what's sauce for the goose, is sauce for the gander. Or so we hear, at least with doxing.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>967</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9911e345982be3babed6cca0de7f89a8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8505221726.mp3?updated=1689709112" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Youth and cyber make a bad-news-good-news story (it's complicated). Mirai DDoS may be the work of skids. ISIS adjusts its messaging.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/213/notes</link>
      <description>In today's podcast, we hear that Friday's Dyn DDoS may have been the work of skids and script kiddies, not high-end Russian spies. A recall of vulnerable IoT devices proceeds. Utilities see the DDoS attacks as a warning shot—they should maybe start by getting rid of all those pagers? ISIS tweaks its online messaging to point out that the Caliphate is enduring a divinely ordained period of trial. CloudFanta malware harvests credentials via a cloud storage app. Emily Wilson from Terbium Labs weighs in on credit card fraud in the dark web. Edward Hammersla from Forcepoint reviews their study of Millennials in the federal workplace. And, fellow youths, there's some bad news and some good news about cyber
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 26 Oct 2016 18:51:56 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>213</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b9c0e068-def8-11ea-911f-8fe6ecddb659/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Youth and cyber make a bad-news-good-news story (it's complicated). Mirai DDoS may be the work of skids. ISIS adjusts its messaging.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Friday's Dyn DDoS may have been the work of skids and script kiddies, not high-end Russian spies. A recall of vulnerable IoT devices proceeds. Utilities see the DDoS attacks as a warning shot—they should maybe start by getting rid of all those pagers? ISIS tweaks its online messaging to point out that the Caliphate is enduring a divinely ordained period of trial. CloudFanta malware harvests credentials via a cloud storage app. Emily Wilson from Terbium Labs weighs in on credit card fraud in the dark web. Edward Hammersla from Forcepoint reviews their study of Millennials in the federal workplace. And, fellow youths, there's some bad news and some good news about cyber
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Friday's Dyn DDoS may have been the work of skids and script kiddies, not high-end Russian spies. A recall of vulnerable IoT devices proceeds. Utilities see the DDoS attacks as a warning shot—they should maybe start by getting rid of all those pagers? ISIS tweaks its online messaging to point out that the Caliphate is enduring a divinely ordained period of trial. CloudFanta malware harvests credentials via a cloud storage app. Emily Wilson from Terbium Labs weighs in on credit card fraud in the dark web. Edward Hammersla from Forcepoint reviews their study of Millennials in the federal workplace. And, fellow youths, there's some bad news and some good news about cyber</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>991</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fa93a74abf2ea592d3db416ba3ecaee1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5165057817.mp3?updated=1689709091" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: The Mirai botnet DDoS attack, its consequences and attribution, with commentary from various observers.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/212/notes</link>
      <description>In today's podcast we hear about some who think that IoT botnets may be best considered an instance of a more general problem with poorly secured endpoints. Good digital hygiene can be good digital citizenship. IoT device recalls follow the DDoS against Dyn. Attribution of the attacks remains up in the air—Clapper looks at "multinational hackers, Jester looks at Russia (and Russia looks at Jester and sees Vice President Biden), and yes, John McAfee is looking at North Korea. Joe Carrigan from The Johns Hopkins University's Information Security Institute inventories IoT devices, and Malcolm Harkins from Cylance shares his thoughts on taking risks. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 25 Oct 2016 20:06:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>212</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b9dd6b66-def8-11ea-911f-d767ceb7e8f2/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: The Mirai botnet DDoS attack, its consequences and attribution, with commentary from various observers.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about some who think that IoT botnets may be best considered an instance of a more general problem with poorly secured endpoints. Good digital hygiene can be good digital citizenship. IoT device recalls follow the DDoS against Dyn. Attribution of the attacks remains up in the air—Clapper looks at "multinational hackers, Jester looks at Russia (and Russia looks at Jester and sees Vice President Biden), and yes, John McAfee is looking at North Korea. Joe Carrigan from The Johns Hopkins University's Information Security Institute inventories IoT devices, and Malcolm Harkins from Cylance shares his thoughts on taking risks. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about some who think that IoT botnets may be best considered an instance of a more general problem with poorly secured endpoints. Good digital hygiene can be good digital citizenship. IoT device recalls follow the DDoS against Dyn. Attribution of the attacks remains up in the air—Clapper looks at "multinational hackers, Jester looks at Russia (and Russia looks at Jester and sees Vice President Biden), and yes, John McAfee is looking at North Korea. Joe Carrigan from The Johns Hopkins University's Information Security Institute inventories IoT devices, and Malcolm Harkins from Cylance shares his thoughts on taking risks. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>996</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a652e31a0978adbe91d53e4ba994d9f7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1014206012.mp3?updated=1689709071" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Recovering from Friday's IoT-botnet driven Internet outages. Industry notes and news of cyber conflict in East Asia and the Middle East. And US-Russian tension in cyberspace remains high. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/211/notes</link>
      <description>In today's podcast we hear about how, while the Internet has recovered from Friday's DDoS attacks on DNS provider Dyn, its users are suffering a significant hangover. No attribution, but the Jester thinks he's (she's? they're) on the case. Observers see significant potential for more damaging IoT-based attacks to come. Virginia Tech's Dr. Charles Clancy weighs in on quantum computers and encryption. And Hal Martin's lawyer adumbrates his client's defense in the case of the Top Secret Collector's Collection of Top Secret documents.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 24 Oct 2016 20:41:57 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>211</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/b9f19b04-def8-11ea-911f-1ba0e042f010/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Recovering from Friday's IoT-botnet driven Internet outages. Industry notes and news of cyber conflict in East Asia and the Middle East. And US-Russian tension in cyberspace remains high. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear about how, while the Internet has recovered from Friday's DDoS attacks on DNS provider Dyn, its users are suffering a significant hangover. No attribution, but the Jester thinks he's (she's? they're) on the case. Observers see significant potential for more damaging IoT-based attacks to come. Virginia Tech's Dr. Charles Clancy weighs in on quantum computers and encryption. And Hal Martin's lawyer adumbrates his client's defense in the case of the Top Secret Collector's Collection of Top Secret documents.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about how, while the Internet has recovered from Friday's DDoS attacks on DNS provider Dyn, its users are suffering a significant hangover. No attribution, but the Jester thinks he's (she's? they're) on the case. Observers see significant potential for more damaging IoT-based attacks to come. Virginia Tech's Dr. Charles Clancy weighs in on quantum computers and encryption. And Hal Martin's lawyer adumbrates his client's defense in the case of the Top Secret Collector's Collection of Top Secret documents.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>922</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[42adb9f90e0308825ad3ca009c72ec27]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3287863209.mp3?updated=1689709003" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Bear again, and WikiLeaks (also again). Chinese hackers return, now after infrastructure companies. Debit card hacking epidemic in India.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/210/notes</link>
      <description>In today's podcast we follow the developing story of intermittent DDoS attacks affecting Internet sites throughout the US East Coast. Hotspot vigilantes try to get Julian Assange reconnected inside Ecuador's London embassy. More election documents appear in WikiLeaks. Russia offers to monitor US elections. NSA's Director talks about labor force issues. The University of Maryland's Jonathan Katz explains an update to a key encryption component of the internet. Guest Kevin Green from DHS describes his work on software assurance programs. And some advice from the Cyber Security Hall of Fame: You want security, convenience, and freedom? Pick two.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 21 Oct 2016 19:05:53 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>210</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ba03cf22-def8-11ea-911f-af877d3a81f6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Bear again, and WikiLeaks (also again). Chinese hackers return, now after infrastructure companies. Debit card hacking epidemic in India.</itunes:subtitle>
      <itunes:summary>In today's podcast we follow the developing story of intermittent DDoS attacks affecting Internet sites throughout the US East Coast. Hotspot vigilantes try to get Julian Assange reconnected inside Ecuador's London embassy. More election documents appear in WikiLeaks. Russia offers to monitor US elections. NSA's Director talks about labor force issues. The University of Maryland's Jonathan Katz explains an update to a key encryption component of the internet. Guest Kevin Green from DHS describes his work on software assurance programs. And some advice from the Cyber Security Hall of Fame: You want security, convenience, and freedom? Pick two.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we follow the developing story of intermittent DDoS attacks affecting Internet sites throughout the US East Coast. Hotspot vigilantes try to get Julian Assange reconnected inside Ecuador's London embassy. More election documents appear in WikiLeaks. Russia offers to monitor US elections. NSA's Director talks about labor force issues. The University of Maryland's Jonathan Katz explains an update to a key encryption component of the internet. Guest Kevin Green from DHS describes his work on software assurance programs. And some advice from the Cyber Security Hall of Fame: You want security, convenience, and freedom? Pick two.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1282</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[38a1d68e21e0fb8064afc73b30a21369]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4606221208.mp3?updated=1689708985" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: CyberMaryland updates. Great power cyber conflict (and organized cyber crime on the side). Vote hacking, agents of influence, and information operations. IoT botnets continue to romp. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/209/notes</link>
      <description>In today's podcast we hear about Czech authorities' arrest of a Russian man in connection with 2012's LinkedIn hack. US response to Russian election hacking is still under preparation. IoT botnets proliferate as Mirai source code spreads through the criminal underground. Some 200 strains of ransomware are reported in the wild. Financial regulators push greater security. Muddy Waters and St. Jude continue their dispute over medical device vulnerabilities. Ran Yahalom from Ben-Gurion University discusses a group of vulnerabilities known as Bad USB. Tom Sadowski from the University of Maryland system discusses CyberMaryland and the role of the University System. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 20 Oct 2016 19:53:12 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>209</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ba19ee92-def8-11ea-911f-4f16768d81e1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: CyberMaryland updates. Great power cyber conflict (and organized cyber crime on the side). Vote hacking, agents of influence, and information operations. IoT botnets continue to romp. </itunes:subtitle>
      <itunes:summary>In today's podcast we hear about Czech authorities' arrest of a Russian man in connection with 2012's LinkedIn hack. US response to Russian election hacking is still under preparation. IoT botnets proliferate as Mirai source code spreads through the criminal underground. Some 200 strains of ransomware are reported in the wild. Financial regulators push greater security. Muddy Waters and St. Jude continue their dispute over medical device vulnerabilities. Ran Yahalom from Ben-Gurion University discusses a group of vulnerabilities known as Bad USB. Tom Sadowski from the University of Maryland system discusses CyberMaryland and the role of the University System. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about Czech authorities' arrest of a Russian man in connection with 2012's LinkedIn hack. US response to Russian election hacking is still under preparation. IoT botnets proliferate as Mirai source code spreads through the criminal underground. Some 200 strains of ransomware are reported in the wild. Financial regulators push greater security. Muddy Waters and St. Jude continue their dispute over medical device vulnerabilities. Ran Yahalom from Ben-Gurion University discusses a group of vulnerabilities known as Bad USB. Tom Sadowski from the University of Maryland system discusses CyberMaryland and the role of the University System. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1000</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[158ddaf2af6092d69fd1a61fdabb64c6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4332921846.mp3?updated=1689708966" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Blockchains at a brewery. Ecuador says it cut Assange's Internet connection. US retaliation against Russian cyber ops may aim at embarrassment. Ransomware in London's City. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/208/notes</link>
      <description>In today's podcast, we hear that Ecuador has told the world they cut Assange's Internet connection (but will continue his asylum), and that they did so on their own. Russia Today remains predictably unconvinced. WikiLeaks shows no signs of stopping election doxing. The US may be considering a campaign of counter-embarrassment as its response to Russian information operations. Fallout from the Yahoo! breach continues. London banks are hit with ransomware. More IoT botnets form from Mirai code. Terbium's Emily Wilson explains the weaponization of intel. Venafi's Kevin Bocek describes what their look at Yahoo!'s encryption revealed. And we take a quick look at the blockchain.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 19 Oct 2016 17:50:43 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>208</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ba312c92-def8-11ea-911f-93eb22351bfa/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Blockchains at a brewery. Ecuador says it cut Assange's Internet connection. US retaliation against Russian cyber ops may aim at embarrassment. Ransomware in London's City. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear that Ecuador has told the world they cut Assange's Internet connection (but will continue his asylum), and that they did so on their own. Russia Today remains predictably unconvinced. WikiLeaks shows no signs of stopping election doxing. The US may be considering a campaign of counter-embarrassment as its response to Russian information operations. Fallout from the Yahoo! breach continues. London banks are hit with ransomware. More IoT botnets form from Mirai code. Terbium's Emily Wilson explains the weaponization of intel. Venafi's Kevin Bocek describes what their look at Yahoo!'s encryption revealed. And we take a quick look at the blockchain.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear that Ecuador has told the world they cut Assange's Internet connection (but will continue his asylum), and that they did so on their own. Russia Today remains predictably unconvinced. WikiLeaks shows no signs of stopping election doxing. The US may be considering a campaign of counter-embarrassment as its response to Russian information operations. Fallout from the Yahoo! breach continues. London banks are hit with ransomware. More IoT botnets form from Mirai code. Terbium's Emily Wilson explains the weaponization of intel. Venafi's Kevin Bocek describes what their look at Yahoo!'s encryption revealed. And we take a quick look at the blockchain.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1004</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[18ae0a12df433fee8ad2a3495422fd8b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2466536075.mp3?updated=1689708947" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Assange still has asylum, but not so much connectivity. RT's banking woes. US-Russian cyber relations continue to worsen. General (ret.) Cartwright pleads guilty to lying about Stuxnet leaks. Email server controversy gutters on.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/207/notes</link>
      <description>In today's podcast we hear the current skinny on hacking the US elections. WikiLeaks' Assange lives, but he seems to be offline, and RT gets dumped by its British bank. The US continues to make noises about retaliating against Russian hackers. Russia sheds crocodile tweets over American gasconade. A retired general pleads guilty to lying to the FBI. The Shadow Brokers say, really, they want someone to bid, or else. Markus Rauschecker from the University of MD Center for Health and Homeland Security explains a recent ruling involving kids' privacy online. Netskope's Ravi Balupari describes the latest behaviors of the Virlock ransomware. Level 3 keeps score on the Mirai botnet. And, fellow youths, you may after all be the weakest link.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 18 Oct 2016 18:36:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>207</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ba4c954a-def8-11ea-911f-a7b5f2d8b292/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Assange still has asylum, but not so much connectivity. RT's banking woes. US-Russian cyber relations continue to worsen. General (ret.) Cartwright pleads guilty to lying about Stuxnet leaks. Email server controversy gutters on.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear the current skinny on hacking the US elections. WikiLeaks' Assange lives, but he seems to be offline, and RT gets dumped by its British bank. The US continues to make noises about retaliating against Russian hackers. Russia sheds crocodile tweets over American gasconade. A retired general pleads guilty to lying to the FBI. The Shadow Brokers say, really, they want someone to bid, or else. Markus Rauschecker from the University of MD Center for Health and Homeland Security explains a recent ruling involving kids' privacy online. Netskope's Ravi Balupari describes the latest behaviors of the Virlock ransomware. Level 3 keeps score on the Mirai botnet. And, fellow youths, you may after all be the weakest link.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear the current skinny on hacking the US elections. WikiLeaks' Assange lives, but he seems to be offline, and RT gets dumped by its British bank. The US continues to make noises about retaliating against Russian hackers. Russia sheds crocodile tweets over American gasconade. A retired general pleads guilty to lying to the FBI. The Shadow Brokers say, really, they want someone to bid, or else. Markus Rauschecker from the University of MD Center for Health and Homeland Security explains a recent ruling involving kids' privacy online. Netskope's Ravi Balupari describes the latest behaviors of the Virlock ransomware. Level 3 keeps score on the Mirai botnet. And, fellow youths, you may after all be the weakest link.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1007</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d6a650642362046cb2fb01e02a6012b9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6738940373.mp3?updated=1689708930" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Pakistan phishes Indian Army. US election hacks continue as the US investigates and mulls its response. New ransomware strains. More IoT botnet infestations. ISIS struggles to explain loss of Dabiq.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/206/notes</link>
      <description>In today's podcast we hear about Pakistani phishing in the Indian Army's pond. ISIS loses prophetically important town of Dabiq, and must adjust its messaging accordingly. WikiLeaks continues to poke at the Clinton campaign. Fancy Bear is again in the spotlight as the US preps a response to Russian election hacking. IoT malware—Mirai and LuaBot—affects networking gear. Dyre's masters are back and working on a new banking Trojan. Robert Lee from Dragos Security offers his opinion on recently nuclear power plant breach revelations. Malek Ben Salem from Accenture Technology Labs explains new research on semantic technology for security analytucs. And what, exactly, does EvilTwin think he, she, or they might be up to?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 17 Oct 2016 19:05:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>206</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ba64e0e6-def8-11ea-911f-27507177bea1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Pakistan phishes Indian Army. US election hacks continue as the US investigates and mulls its response. New ransomware strains. More IoT botnet infestations. ISIS struggles to explain loss of Dabiq.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about Pakistani phishing in the Indian Army's pond. ISIS loses prophetically important town of Dabiq, and must adjust its messaging accordingly. WikiLeaks continues to poke at the Clinton campaign. Fancy Bear is again in the spotlight as the US preps a response to Russian election hacking. IoT malware—Mirai and LuaBot—affects networking gear. Dyre's masters are back and working on a new banking Trojan. Robert Lee from Dragos Security offers his opinion on recently nuclear power plant breach revelations. Malek Ben Salem from Accenture Technology Labs explains new research on semantic technology for security analytucs. And what, exactly, does EvilTwin think he, she, or they might be up to?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about Pakistani phishing in the Indian Army's pond. ISIS loses prophetically important town of Dabiq, and must adjust its messaging accordingly. WikiLeaks continues to poke at the Clinton campaign. Fancy Bear is again in the spotlight as the US preps a response to Russian election hacking. IoT malware—Mirai and LuaBot—affects networking gear. Dyre's masters are back and working on a new banking Trojan. Robert Lee from Dragos Security offers his opinion on recently nuclear power plant breach revelations. Malek Ben Salem from Accenture Technology Labs explains new research on semantic technology for security analytucs. And what, exactly, does EvilTwin think he, she, or they might be up to?</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>973</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d15c01e53dffe24bf2de928c2e416fc0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4236554363.mp3?updated=1689708912" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Political hacks: email, Twitter, and iCloud. Calls mount for tough US response to Russian cyber operations. Two Android vulnerabilities and one threat revealed. Verizon calls Yahoo! breach "material." </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/205/notes</link>
      <description>In today's podcast we follow the continuing story of election hacks, and the varying but convergent motives behind them. We get a side helping of good government advice from Mr. Putin. (Thanks, Vlad!) Al Qaeda tries to reach the Millennial jihadist market with ISIS-like information operations. The Internet-of-Things enhances its reputation as an Internet-of-Trouble. Cyber stocks see turbulence as downbeat guidance spooks speculators. Pork Explosion isn't a movie from the Seventies—it's an Android backdoor. The Johns Hopkins University's Joe Carrigan responds to a listener inquiry about Amazon's recent password resets. DDoS expert Dave Larson from Corero Network Security shares his perspective on recent attacks. And please don't use a misspelled app to take selfies.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 14 Oct 2016 19:34:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>205</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ba753a2c-def8-11ea-911f-bbf49fa1d03b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Political hacks: email, Twitter, and iCloud. Calls mount for tough US response to Russian cyber operations. Two Android vulnerabilities and one threat revealed. Verizon calls Yahoo! breach "material." </itunes:subtitle>
      <itunes:summary>In today's podcast we follow the continuing story of election hacks, and the varying but convergent motives behind them. We get a side helping of good government advice from Mr. Putin. (Thanks, Vlad!) Al Qaeda tries to reach the Millennial jihadist market with ISIS-like information operations. The Internet-of-Things enhances its reputation as an Internet-of-Trouble. Cyber stocks see turbulence as downbeat guidance spooks speculators. Pork Explosion isn't a movie from the Seventies—it's an Android backdoor. The Johns Hopkins University's Joe Carrigan responds to a listener inquiry about Amazon's recent password resets. DDoS expert Dave Larson from Corero Network Security shares his perspective on recent attacks. And please don't use a misspelled app to take selfies.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we follow the continuing story of election hacks, and the varying but convergent motives behind them. We get a side helping of good government advice from Mr. Putin. (Thanks, Vlad!) Al Qaeda tries to reach the Millennial jihadist market with ISIS-like information operations. The Internet-of-Things enhances its reputation as an Internet-of-Trouble. Cyber stocks see turbulence as downbeat guidance spooks speculators. Pork Explosion isn't a movie from the Seventies—it's an Android backdoor. The Johns Hopkins University's Joe Carrigan responds to a listener inquiry about Amazon's recent password resets. DDoS expert Dave Larson from Corero Network Security shares his perspective on recent attacks. And please don't use a misspelled app to take selfies.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1299</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7e1d826c5a26fbdd449eeddf823e2472]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3244527865.mp3?updated=1689708891" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Patriotic hacktivism in South Asia? US, Russia cyber stare-down continues. IoT devices exploited as proxies. Cyber sector sees market volatility. Cartels launder money through games.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/204/notes</link>
      <description>In today's podcast, we hear about possible patriotic hacktivism in South Asia. IoT devices are being exploited as proxies, and exploit kits continue to serve up ransomware against poorly managed systems. Market volatility puts cyber stocks on a roller coaster. The US continues to work out its proportional response to Russian election hacking. Russia says it's willing to ride out all that domestic American messiness in the hope of better relations. We welcome our newest Academic and Research Partner, Ran Yahalom, Project Leader at the Malware Lab of the Cyber Security Research Center at Ben-Gurion University. LastPass' Amber Steel shares the results of their recent password security survey. And criminal cartels use in-game currencies for money laundering.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 13 Oct 2016 18:46:03 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>204</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ba8992d8-def8-11ea-911f-4b8cafb3a01f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Patriotic hacktivism in South Asia? US, Russia cyber stare-down continues. IoT devices exploited as proxies. Cyber sector sees market volatility. Cartels launder money through games.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about possible patriotic hacktivism in South Asia. IoT devices are being exploited as proxies, and exploit kits continue to serve up ransomware against poorly managed systems. Market volatility puts cyber stocks on a roller coaster. The US continues to work out its proportional response to Russian election hacking. Russia says it's willing to ride out all that domestic American messiness in the hope of better relations. We welcome our newest Academic and Research Partner, Ran Yahalom, Project Leader at the Malware Lab of the Cyber Security Research Center at Ben-Gurion University. LastPass' Amber Steel shares the results of their recent password security survey. And criminal cartels use in-game currencies for money laundering.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about possible patriotic hacktivism in South Asia. IoT devices are being exploited as proxies, and exploit kits continue to serve up ransomware against poorly managed systems. Market volatility puts cyber stocks on a roller coaster. The US continues to work out its proportional response to Russian election hacking. Russia says it's willing to ride out all that domestic American messiness in the hope of better relations. We welcome our newest Academic and Research Partner, Ran Yahalom, Project Leader at the Malware Lab of the Cyber Security Research Center at Ben-Gurion University. LastPass' Amber Steel shares the results of their recent password security survey. And criminal cartels use in-game currencies for money laundering.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>982</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e8242368fce4fd1d47bfd0472451e55a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4543734396.mp3?updated=1689708856" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Australia confirms foreign intelligence service hacked Bureau of Meteorology. TV5Monde and its false-flag hack. Trojan hitting SWIFT. Patch Tuesday notes. US-Russian cyber showdown.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/203/notes</link>
      <description>In today's podcast we take a quick look back at Patch Tuesday. Amazon gets solid reviews for a password reset campaign. A new Trojan is caught manipulating SWIFT fund transfer logs. IoT botnets worry ecommerce sites, and the EU's proposed stickers seem unlikely to allay those concerns. Australia confirms a foreign intelligence service hacked its Bureau of Meteorology, but it won't say which foreign service that was. TV5Monde offers details on its experience with a false-flag hack. Jonathan Katz from the University of Maryland describes obfuscation techniques he saw at a recent crypto conference. Quortum's Joey Alonzo provides tips on mobile device security. And, says the US to Russia, ready or not, here we come. (Maybe.)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 12 Oct 2016 18:37:40 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>203</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/baa332e2-def8-11ea-911f-d75f4682f661/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Australia confirms foreign intelligence service hacked Bureau of Meteorology. TV5Monde and its false-flag hack. Trojan hitting SWIFT. Patch Tuesday notes. US-Russian cyber showdown.</itunes:subtitle>
      <itunes:summary>In today's podcast we take a quick look back at Patch Tuesday. Amazon gets solid reviews for a password reset campaign. A new Trojan is caught manipulating SWIFT fund transfer logs. IoT botnets worry ecommerce sites, and the EU's proposed stickers seem unlikely to allay those concerns. Australia confirms a foreign intelligence service hacked its Bureau of Meteorology, but it won't say which foreign service that was. TV5Monde offers details on its experience with a false-flag hack. Jonathan Katz from the University of Maryland describes obfuscation techniques he saw at a recent crypto conference. Quortum's Joey Alonzo provides tips on mobile device security. And, says the US to Russia, ready or not, here we come. (Maybe.)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we take a quick look back at Patch Tuesday. Amazon gets solid reviews for a password reset campaign. A new Trojan is caught manipulating SWIFT fund transfer logs. IoT botnets worry ecommerce sites, and the EU's proposed stickers seem unlikely to allay those concerns. Australia confirms a foreign intelligence service hacked its Bureau of Meteorology, but it won't say which foreign service that was. TV5Monde offers details on its experience with a false-flag hack. Jonathan Katz from the University of Maryland describes obfuscation techniques he saw at a recent crypto conference. Quortum's Joey Alonzo provides tips on mobile device security. And, says the US to Russia, ready or not, here we come. (Maybe.)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1015</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7a964e53f4e749bbc19701cd1101cd39]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8216823810.mp3?updated=1689708576" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: US attributes DNC hacking to Russian government, promises to protect itself. Russia dismisses attribution as "rubbish." WikiLeaks posts Clinton campaign emails.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/202/notes</link>
      <description>In today's podcast, we hear about Industrial control system worries in the electrical power sector. IoT botnets spook the EU, and research into Mirai reveals some interesting features of last month's DDoS attacks. The US Intelligence Community says officially that the Russians are trying to influence US elections. The Russians say it's rubbish, and the candidates swap accusations. WikiLeaks doxes the Clinton campaign. Level 3's Dale Drew discusses the security of election systems. Smrithi Konanur from HPE Data Security explains credit card security. The FBI wants another terrorist's iPhone unlocked. Verizon mulls the price at which it might now buy Yahoo! And experts suggest best practices for Cyber Security Awareness Month.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 11 Oct 2016 19:49:45 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>202</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/babfc380-def8-11ea-911f-db450ec9ee4b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: US attributes DNC hacking to Russian government, promises to protect itself. Russia dismisses attribution as "rubbish." WikiLeaks posts Clinton campaign emails.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about Industrial control system worries in the electrical power sector. IoT botnets spook the EU, and research into Mirai reveals some interesting features of last month's DDoS attacks. The US Intelligence Community says officially that the Russians are trying to influence US elections. The Russians say it's rubbish, and the candidates swap accusations. WikiLeaks doxes the Clinton campaign. Level 3's Dale Drew discusses the security of election systems. Smrithi Konanur from HPE Data Security explains credit card security. The FBI wants another terrorist's iPhone unlocked. Verizon mulls the price at which it might now buy Yahoo! And experts suggest best practices for Cyber Security Awareness Month.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about Industrial control system worries in the electrical power sector. IoT botnets spook the EU, and research into Mirai reveals some interesting features of last month's DDoS attacks. The US Intelligence Community says officially that the Russians are trying to influence US elections. The Russians say it's rubbish, and the candidates swap accusations. WikiLeaks doxes the Clinton campaign. Level 3's Dale Drew discusses the security of election systems. Smrithi Konanur from HPE Data Security explains credit card security. The FBI wants another terrorist's iPhone unlocked. Verizon mulls the price at which it might now buy Yahoo! And experts suggest best practices for Cyber Security Awareness Month.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1017</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[52cdae2802665bd88c9b830551c7ef9a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2498078972.mp3?updated=1689706972" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Skepticism concerning Guccifer 2.0's claimed hack of the Clinton Foundation. NSA contractor arrest. Mirai botnet exploits. Security fatigue.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/201/notes</link>
      <description>In today's podcast we discuss the consensus that Guccifer 2.0 didn't actually hack the Clinton Foundation. We hear how information operations might work during an election. The arrested NSA contractor's alleged motives remain unclear. The Mirai botnet got its exploitable vulnerabilities by downstream propagation of default credentials. The US Surgeon General discloses a breach. Dr. Charles Clancy from Virginia Tech's Hume Center considers policy statements from US presidential candidates. Joyce Brocaglia tells us about the Executive Women's Forum. And if you have a hard time listening to us, you may be suffering from "security fatigue." Don't believe us—take it from NIST.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 07 Oct 2016 20:54:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>201</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bad5ea98-def8-11ea-911f-b3a3578bef86/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Skepticism concerning Guccifer 2.0's claimed hack of the Clinton Foundation. NSA contractor arrest. Mirai botnet exploits. Security fatigue.</itunes:subtitle>
      <itunes:summary>In today's podcast we discuss the consensus that Guccifer 2.0 didn't actually hack the Clinton Foundation. We hear how information operations might work during an election. The arrested NSA contractor's alleged motives remain unclear. The Mirai botnet got its exploitable vulnerabilities by downstream propagation of default credentials. The US Surgeon General discloses a breach. Dr. Charles Clancy from Virginia Tech's Hume Center considers policy statements from US presidential candidates. Joyce Brocaglia tells us about the Executive Women's Forum. And if you have a hard time listening to us, you may be suffering from "security fatigue." Don't believe us—take it from NIST.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we discuss the consensus that Guccifer 2.0 didn't actually hack the Clinton Foundation. We hear how information operations might work during an election. The arrested NSA contractor's alleged motives remain unclear. The Mirai botnet got its exploitable vulnerabilities by downstream propagation of default credentials. The US Surgeon General discloses a breach. Dr. Charles Clancy from Virginia Tech's Hume Center considers policy statements from US presidential candidates. Joyce Brocaglia tells us about the Executive Women's Forum. And if you have a hard time listening to us, you may be suffering from "security fatigue." Don't believe us—take it from NIST.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1319</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[49f74b583134c2e4b52ba2bb6c5b4646]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7198130000.mp3?updated=1608753239" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: NSA contract worker arrested with classified material. TalkTalk gets a record data breach fine. Yahoo! surveillance story's still murky. Thoughts from AUSA on cyber innovation and information warfare.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/200/notes</link>
      <description>In today's podcast we learn about the FBIs' arrest of an NSA contract worker—classified material was found in his home and vehicle. TalkTalk gets a record fine—£400,000, which comes to a hundred thousand hackerweight—for its 2015 data breach. Yahoo! email surveillance allegations amount to a story that's still murky and anonymously sourced. The Johns Hopkins University's Joe Carrigan stops by to discuss local vs cloud storage. Peder Muller from Novetta previews his upcoming presentation on Bitcoin and Blockchain. And the AUSA Meeting and Exposition closed yesterday with a look at 2030, warnings of Russian information operations, and considerations of how the US Government can keep pace with industry innovation.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 06 Oct 2016 19:46:33 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>200</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bb08d98a-def8-11ea-911f-ff08419094cf/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: NSA contract worker arrested with classified material. TalkTalk gets a record data breach fine. Yahoo! surveillance story's still murky. Thoughts from AUSA on cyber innovation and information warfare.</itunes:subtitle>
      <itunes:summary>In today's podcast we learn about the FBIs' arrest of an NSA contract worker—classified material was found in his home and vehicle. TalkTalk gets a record fine—£400,000, which comes to a hundred thousand hackerweight—for its 2015 data breach. Yahoo! email surveillance allegations amount to a story that's still murky and anonymously sourced. The Johns Hopkins University's Joe Carrigan stops by to discuss local vs cloud storage. Peder Muller from Novetta previews his upcoming presentation on Bitcoin and Blockchain. And the AUSA Meeting and Exposition closed yesterday with a look at 2030, warnings of Russian information operations, and considerations of how the US Government can keep pace with industry innovation.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we learn about the FBIs' arrest of an NSA contract worker—classified material was found in his home and vehicle. TalkTalk gets a record fine—£400,000, which comes to a hundred thousand hackerweight—for its 2015 data breach. Yahoo! email surveillance allegations amount to a story that's still murky and anonymously sourced. The Johns Hopkins University's Joe Carrigan stops by to discuss local vs cloud storage. Peder Muller from Novetta previews his upcoming presentation on Bitcoin and Blockchain. And the AUSA Meeting and Exposition closed yesterday with a look at 2030, warnings of Russian information operations, and considerations of how the US Government can keep pace with industry innovation.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1007</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4ed0da7e13d99cae8f58166e8ba79b37]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3949213166.mp3?updated=1689706927" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily:  Guccifer 2.0 claims (to general skepticism) a Clinton Foundation hack. Information operations versus voting. Yahoo! and surveillance of customers. Insulin pump vulnerability reported.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/199/notes</link>
      <description>In today's podcast, we learn that Guccifer 2.0 is back, but that few are buying what he, she, or they are selling. Experts continue to warn of Russian information operations directed against the perceived legitimacy of US elections. International norms of cyber conflict. IoT-based DDoS concerns rise with wide distribution of MIrai source code. Flashpoint finds Floki Bot for sale in the underground. Emily Wilson from Terbium Labs explains the difference between the deep and dark webs. Tallinn Manual coauthor Thomas Wingfield discusses developing norms in cyber conflict. More trouble for Yahoo!. M&amp;A news. And a dating site is breached in New Zealand.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 05 Oct 2016 18:04:58 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>199</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bb21c40e-def8-11ea-911f-9f08a832de35/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily:  Guccifer 2.0 claims (to general skepticism) a Clinton Foundation hack. Information operations versus voting. Yahoo! and surveillance of customers. Insulin pump vulnerability reported.</itunes:subtitle>
      <itunes:summary>In today's podcast, we learn that Guccifer 2.0 is back, but that few are buying what he, she, or they are selling. Experts continue to warn of Russian information operations directed against the perceived legitimacy of US elections. International norms of cyber conflict. IoT-based DDoS concerns rise with wide distribution of MIrai source code. Flashpoint finds Floki Bot for sale in the underground. Emily Wilson from Terbium Labs explains the difference between the deep and dark webs. Tallinn Manual coauthor Thomas Wingfield discusses developing norms in cyber conflict. More trouble for Yahoo!. M&amp;A news. And a dating site is breached in New Zealand.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we learn that Guccifer 2.0 is back, but that few are buying what he, she, or they are selling. Experts continue to warn of Russian information operations directed against the perceived legitimacy of US elections. International norms of cyber conflict. IoT-based DDoS concerns rise with wide distribution of MIrai source code. Flashpoint finds Floki Bot for sale in the underground. Emily Wilson from Terbium Labs explains the difference between the deep and dark webs. Tallinn Manual coauthor Thomas Wingfield discusses developing norms in cyber conflict. More trouble for Yahoo!. M&amp;A news. And a dating site is breached in New Zealand.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>991</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f084e6cf1c9edac5e519d056beea9a8f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7710389327.mp3?updated=1689706910" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: AUSA update. Mirai botnet shows risks of default IoT passwords. US-Russian tensions rise over imposition of costs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/198/notes</link>
      <description>In today's podcast we hear about cyber conflict and its place in the international order, including especially its place in Russian-American relations. The implications of the Mirai botnet and the release of its source code. Kaspersky breaks the MarsJoke crypto ransomware. Russia indicates a crackdown on cybercrime (maybe). Ben Yelin from UMD CHHS explains changes the FBI wants to Rule 41. Igor Volovich from ROMAD Cyber Systems thinks is time to think beyond malware signature matching. Industry notes, and, from the black market, the Shadow Brokers still haven't found their ideal buyers.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 04 Oct 2016 20:16:40 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>198</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bb37fcce-def8-11ea-911f-336b3687719e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: AUSA update. Mirai botnet shows risks of default IoT passwords. US-Russian tensions rise over imposition of costs.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about cyber conflict and its place in the international order, including especially its place in Russian-American relations. The implications of the Mirai botnet and the release of its source code. Kaspersky breaks the MarsJoke crypto ransomware. Russia indicates a crackdown on cybercrime (maybe). Ben Yelin from UMD CHHS explains changes the FBI wants to Rule 41. Igor Volovich from ROMAD Cyber Systems thinks is time to think beyond malware signature matching. Industry notes, and, from the black market, the Shadow Brokers still haven't found their ideal buyers.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about cyber conflict and its place in the international order, including especially its place in Russian-American relations. The implications of the Mirai botnet and the release of its source code. Kaspersky breaks the MarsJoke crypto ransomware. Russia indicates a crackdown on cybercrime (maybe). Ben Yelin from UMD CHHS explains changes the FBI wants to Rule 41. Igor Volovich from ROMAD Cyber Systems thinks is time to think beyond malware signature matching. Industry notes, and, from the black market, the Shadow Brokers still haven't found their ideal buyers.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>999</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4ad2ae4ad3a2878491de2e9f4a565d9a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1936680916.mp3?updated=1689706897" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Hackers said to "probe" US voting systems. IoT botnet source code released. "DressCode" malware afflicts Android devices. Industry notes. SEC urged to make an example of Yahoo!</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/197/notes</link>
      <description>In today's podcast, we hear about Homeland Security's warnings that state election systems are being probed by potential attackers. Newsweek speculates that a brief DDoS attack it sustained was election-related (they also suspect the Russians—no bear named yet). Mirai source code used in large KrebsOnSecurity DDoS published in a hacker forum. The University of Maryland's Jonathan Katz explains why asymmetric encryption is so attractive for ransomware. DressCode malware found in 3000 Trojanized apps. SEC may investigate Yahoo! breach.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 03 Oct 2016 18:30:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>197</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bb5d8b9c-def8-11ea-911f-036abd31c63a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Hackers said to "probe" US voting systems. IoT botnet source code released. "DressCode" malware afflicts Android devices. Industry notes. SEC urged to make an example of Yahoo!</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about Homeland Security's warnings that state election systems are being probed by potential attackers. Newsweek speculates that a brief DDoS attack it sustained was election-related (they also suspect the Russians—no bear named yet). Mirai source code used in large KrebsOnSecurity DDoS published in a hacker forum. The University of Maryland's Jonathan Katz explains why asymmetric encryption is so attractive for ransomware. DressCode malware found in 3000 Trojanized apps. SEC may investigate Yahoo! breach.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about Homeland Security's warnings that state election systems are being probed by potential attackers. Newsweek speculates that a brief DDoS attack it sustained was election-related (they also suspect the Russians—no bear named yet). Mirai source code used in large KrebsOnSecurity DDoS published in a hacker forum. The University of Maryland's Jonathan Katz explains why asymmetric encryption is so attractive for ransomware. DressCode malware found in 3000 Trojanized apps. SEC may investigate Yahoo! breach.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>790</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[abfac6d48574d195510b85e679be4e17]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8300263906.mp3?updated=1689706879" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Election hacking, journalist hacking, and the rise of TbpS DDoS. More reflections on the Yahoo! breach. Ransomware and other forms of extortion. </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/196/notes</link>
      <description>In today's podcast, we hear about how IoT botnets bring scunion across the Internet, and why security cameras are attractive to bot rustlers. InfoArmor's explanation of the Yahoo! breach gains traction among observers. Europol warns that ransomware is on the rise. Zerodium raises its iOS 10 remote jailbreak bounty to a cool million and a half. US states continue to grapple with election hacking. Markus Rauschecker outlines some new cyber regulations proposed in New York. Dr. Eli David from Deep Instinct explains deep learning. And the Tofsee botnet is chumming for the lonely—click with caution.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 30 Sep 2016 19:33:06 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>196</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bb7849dc-def8-11ea-911f-2357ee65440b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Election hacking, journalist hacking, and the rise of TbpS DDoS. More reflections on the Yahoo! breach. Ransomware and other forms of extortion. </itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about how IoT botnets bring scunion across the Internet, and why security cameras are attractive to bot rustlers. InfoArmor's explanation of the Yahoo! breach gains traction among observers. Europol warns that ransomware is on the rise. Zerodium raises its iOS 10 remote jailbreak bounty to a cool million and a half. US states continue to grapple with election hacking. Markus Rauschecker outlines some new cyber regulations proposed in New York. Dr. Eli David from Deep Instinct explains deep learning. And the Tofsee botnet is chumming for the lonely—click with caution.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about how IoT botnets bring scunion across the Internet, and why security cameras are attractive to bot rustlers. InfoArmor's explanation of the Yahoo! breach gains traction among observers. Europol warns that ransomware is on the rise. Zerodium raises its iOS 10 remote jailbreak bounty to a cool million and a half. US states continue to grapple with election hacking. Markus Rauschecker outlines some new cyber regulations proposed in New York. Dr. Eli David from Deep Instinct explains deep learning. And the Tofsee botnet is chumming for the lonely—click with caution.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1329</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f59c4f0b4b9adfaa2b758bdf37f56897]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8529451956.mp3?updated=1608753121" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Yahoo! hackers seem to have been crooks (who sold to other crooks, and to government(s)). Toxic data and credential problems. Election hacking.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/195/notes</link>
      <description>In today's podcast we hear predictions that terabit-per-second DDoS attacks may be on their way toward becoming the new normal. We consider the real threat that lies in the IoT. (A hint: security cameras are to the Internet what squirrels are to the power grid.) More concerns about election hacking surface in the US. Dr. Charles Clancy from Virgnia Tech's Hume Center explains software defined networking. Netsparker's Ferruh Mavituna shares advice on securing content delivery networks. InfoArmor looks into the Yahoo! breach and finds more crooks than spies. But the crooks may be fencing data to the spies.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 29 Sep 2016 19:48:11 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>195</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bb9112a0-def8-11ea-911f-532ed8523e08/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Yahoo! hackers seem to have been crooks (who sold to other crooks, and to government(s)). Toxic data and credential problems. Election hacking.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear predictions that terabit-per-second DDoS attacks may be on their way toward becoming the new normal. We consider the real threat that lies in the IoT. (A hint: security cameras are to the Internet what squirrels are to the power grid.) More concerns about election hacking surface in the US. Dr. Charles Clancy from Virgnia Tech's Hume Center explains software defined networking. Netsparker's Ferruh Mavituna shares advice on securing content delivery networks. InfoArmor looks into the Yahoo! breach and finds more crooks than spies. But the crooks may be fencing data to the spies.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear predictions that terabit-per-second DDoS attacks may be on their way toward becoming the new normal. We consider the real threat that lies in the IoT. (A hint: security cameras are to the Internet what squirrels are to the power grid.) More concerns about election hacking surface in the US. Dr. Charles Clancy from Virgnia Tech's Hume Center explains software defined networking. Netsparker's Ferruh Mavituna shares advice on securing content delivery networks. InfoArmor looks into the Yahoo! breach and finds more crooks than spies. But the crooks may be fencing data to the spies.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1001</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[286066347f554ead61d99d548ffadba3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1909300559.mp3?updated=1689706848" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Alleged Russian hacking &amp; info ops, under investigation by US. IoT botnets continue to exact a DDoS toll. Yahoo! security practices.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/194/notes</link>
      <description>In today's podcast, we hear about alleged Russian hacking and information operations, and US investigations of the same. The Russian goal is thought to be the undermining of US elections' credibility.  DDoS has come to the IoT. Yahoo! security receives some harsh scrutiny. TheDarkOverlord is back, and extorting investment bankers. Kathleen Smith from ClearedJobs.net returns for more conversation about retaining employees. Malek Ben Salem from Accenture Labs explains research in semantic technology for analytics. And how much does a bear weigh, anyway? (We're thinking it would be a European Brown Bear, right, Fancy?)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 28 Sep 2016 19:04:14 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>194</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bbaa5e4a-def8-11ea-911f-f3f02e314698/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Alleged Russian hacking &amp; info ops, under investigation by US. IoT botnets continue to exact a DDoS toll. Yahoo! security practices.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about alleged Russian hacking and information operations, and US investigations of the same. The Russian goal is thought to be the undermining of US elections' credibility.  DDoS has come to the IoT. Yahoo! security receives some harsh scrutiny. TheDarkOverlord is back, and extorting investment bankers. Kathleen Smith from ClearedJobs.net returns for more conversation about retaining employees. Malek Ben Salem from Accenture Labs explains research in semantic technology for analytics. And how much does a bear weigh, anyway? (We're thinking it would be a European Brown Bear, right, Fancy?)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about alleged Russian hacking and information operations, and US investigations of the same. The Russian goal is thought to be the undermining of US elections' credibility.  DDoS has come to the IoT. Yahoo! security receives some harsh scrutiny. TheDarkOverlord is back, and extorting investment bankers. Kathleen Smith from ClearedJobs.net returns for more conversation about retaining employees. Malek Ben Salem from Accenture Labs explains research in semantic technology for analytics. And how much does a bear weigh, anyway? (We're thinking it would be a European Brown Bear, right, Fancy?)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>960</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3c97405cd2e7bbd70594ac30d08779e0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3205095073.mp3?updated=1689706830" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Yahoo!'s Verizon deal still on. Mac trojan hits aerospace. Facebook poked by German privacy laws.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/193/notes</link>
      <description>In today's podcast we follow developments in the Yahoo! breach. Fancy Bear is back, and distributing a Mac Trojan to aerospace companies. Investigation of the Shadow Brokers' leak suggests inadvertent exposure, not hackers or moles. A new variant of Virlock ransomware is out in the wild. The US Justice Department warns of IoT threats. A Hamburg magistrate finds Facebook in violation of German privacy law. And we hear from Johns Hopkins' Joe Carrigan on how to be your parents' CISO, and from ClearedJobs Kathleen Smith about the cyber labor market.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 27 Sep 2016 18:03:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>193</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bbbfd004-def8-11ea-911f-df316c62f441/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Yahoo!'s Verizon deal still on. Mac trojan hits aerospace. Facebook poked by German privacy laws.</itunes:subtitle>
      <itunes:summary>In today's podcast we follow developments in the Yahoo! breach. Fancy Bear is back, and distributing a Mac Trojan to aerospace companies. Investigation of the Shadow Brokers' leak suggests inadvertent exposure, not hackers or moles. A new variant of Virlock ransomware is out in the wild. The US Justice Department warns of IoT threats. A Hamburg magistrate finds Facebook in violation of German privacy law. And we hear from Johns Hopkins' Joe Carrigan on how to be your parents' CISO, and from ClearedJobs Kathleen Smith about the cyber labor market.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we follow developments in the Yahoo! breach. Fancy Bear is back, and distributing a Mac Trojan to aerospace companies. Investigation of the Shadow Brokers' leak suggests inadvertent exposure, not hackers or moles. A new variant of Virlock ransomware is out in the wild. The US Justice Department warns of IoT threats. A Hamburg magistrate finds Facebook in violation of German privacy law. And we hear from Johns Hopkins' Joe Carrigan on how to be your parents' CISO, and from ClearedJobs Kathleen Smith about the cyber labor market.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>987</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[35c4b01c0361a3e7ee545894ea809a6d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3475301202.mp3?updated=1689615340" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Yahoo! breach fallout, Krebs back online, election hack concerns.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/192/notes</link>
      <description>In today's podcast, we follow the latest on the Yahoo! breach. British sources say GCHQ stopped a Russian attack on last year's UK general election. A White House staffer's email is hacked. KrebsOnSecurity is back, but many see a lesson in the dangers of IoT botnets and democratized censorship. Researchers describe iOS and Android vulnerabilities. The FBI releases more documents from its State Department email investigation. Yisroel Mirsky from Ben-Gurion University discusses security risks of Android touch loggers. Switzerland votes for more surveillance, and US states reassure voters that the election won't be hacked.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 26 Sep 2016 20:26:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>192</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bbdf7968-def8-11ea-911f-cf09dbd30cd8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Yahoo! breach fallout, Krebs back online, election hack concerns.</itunes:subtitle>
      <itunes:summary>In today's podcast, we follow the latest on the Yahoo! breach. British sources say GCHQ stopped a Russian attack on last year's UK general election. A White House staffer's email is hacked. KrebsOnSecurity is back, but many see a lesson in the dangers of IoT botnets and democratized censorship. Researchers describe iOS and Android vulnerabilities. The FBI releases more documents from its State Department email investigation. Yisroel Mirsky from Ben-Gurion University discusses security risks of Android touch loggers. Switzerland votes for more surveillance, and US states reassure voters that the election won't be hacked.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we follow the latest on the Yahoo! breach. British sources say GCHQ stopped a Russian attack on last year's UK general election. A White House staffer's email is hacked. KrebsOnSecurity is back, but many see a lesson in the dangers of IoT botnets and democratized censorship. Researchers describe iOS and Android vulnerabilities. The FBI releases more documents from its State Department email investigation. Yisroel Mirsky from Ben-Gurion University discusses security risks of Android touch loggers. Switzerland votes for more surveillance, and US states reassure voters that the election won't be hacked.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>839</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8459e5cb4d5a364079623a81a7e2e5b1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8676751565.mp3?updated=1689615327" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Yahoo! breach, infected torrents, insider threats.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/191/notes</link>
      <description>In today's podcast, Yahoo!'s really bad breach. We hear about Raum, a malicious tool the Black Team is offering in select criminal markets on a pay-per-install basis. In industry news, we learn that Vista Equity Partners is taking Infoblox private. Webroot is acquiring CyberFlow Analytics, Oracle has bought Palerra, and Elastic has acquired Prelert. White Ops closes a $20 million Series B round.  Emily Wilson from Terbium Labs explains the importance of reputation on the Dark Web. RedOwl's Brian White outlines insider threats. A new third-party risk management coalition forms. NATO-themed phishbait hooked German politicians.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 23 Sep 2016 18:30:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>191</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bbf600ca-def8-11ea-911f-07f49f590e32/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Yahoo! breach, infected torrents, insider threats.</itunes:subtitle>
      <itunes:summary>In today's podcast, Yahoo!'s really bad breach. We hear about Raum, a malicious tool the Black Team is offering in select criminal markets on a pay-per-install basis. In industry news, we learn that Vista Equity Partners is taking Infoblox private. Webroot is acquiring CyberFlow Analytics, Oracle has bought Palerra, and Elastic has acquired Prelert. White Ops closes a $20 million Series B round.  Emily Wilson from Terbium Labs explains the importance of reputation on the Dark Web. RedOwl's Brian White outlines insider threats. A new third-party risk management coalition forms. NATO-themed phishbait hooked German politicians.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, Yahoo!'s really bad breach. We hear about Raum, a malicious tool the Black Team is offering in select criminal markets on a pay-per-install basis. In industry news, we learn that Vista Equity Partners is taking Infoblox private. Webroot is acquiring CyberFlow Analytics, Oracle has bought Palerra, and Elastic has acquired Prelert. White Ops closes a $20 million Series B round.  Emily Wilson from Terbium Labs explains the importance of reputation on the Dark Web. RedOwl's Brian White outlines insider threats. A new third-party risk management coalition forms. NATO-themed phishbait hooked German politicians.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1279</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0c03732aa07e12f7d55a8383d921aee6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8011632032.mp3?updated=1608753120" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Record breaking DDoS, record breaking account info theft.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/190/notes</link>
      <description>In today's podcast, we hear more on the recent hacking of German political parties. Russia reorganizes its security services—apparently the KGB is back in everything but name.  KrebsOnSecurity sustains a record-breaking DDoS attack. Yahoo! discloses a record breaking data breach. Ben Yelin from the University of Maryland Center for Health and Homeland Security weighs in on a possible Snowden pardon. Steve Durbin tells us what organizations like the ISF have to offer. Ransomware may be meeting data manipulation.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 22 Sep 2016 20:07:08 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>190</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bc0a1150-def8-11ea-911f-17c5e0ee0cc0/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Record breaking DDoS, record breaking account info theft.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear more on the recent hacking of German political parties. Russia reorganizes its security services—apparently the KGB is back in everything but name.  KrebsOnSecurity sustains a record-breaking DDoS attack. Yahoo! discloses a record breaking data breach. Ben Yelin from the University of Maryland Center for Health and Homeland Security weighs in on a possible Snowden pardon. Steve Durbin tells us what organizations like the ISF have to offer. Ransomware may be meeting data manipulation.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear more on the recent hacking of German political parties. Russia reorganizes its security services—apparently the KGB is back in everything but name.  KrebsOnSecurity sustains a record-breaking DDoS attack. Yahoo! discloses a record breaking data breach. Ben Yelin from the University of Maryland Center for Health and Homeland Security weighs in on a possible Snowden pardon. Steve Durbin tells us what organizations like the ISF have to offer. Ransomware may be meeting data manipulation.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>991</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c42a3775550971d90821a055b3f64150]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9021490158.mp3?updated=1689615278" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Russian hackers hit German targets. New ransomware. DPRK domains revealed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/189/notes</link>
      <description>In today's podcast, we hear about Russian hackers turning their attention to German political targets as well as politicians in the US. The son-of-Shadow-Brokers vulnerability Cisco discovered is being exploited in the wild. New strains of ransomware are out—Mamba is as dangerous to networks as its namesake is to human tissue. The Air Force Association is taking up cyber in its annual meetings. The Internet-of-moving things handles disclosures. Matthew Green from Johns Hopkins University's Information Security Institute discuses the downsides of crypto backdoors. University of Maryland's Jonathan Katz talks about new security standards adopted by Google. And North Korea parts the curtain in front of its domains.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 21 Sep 2016 20:26:53 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>189</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bc33c108-def8-11ea-911f-1f320aff3b2f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Russian hackers hit German targets. New ransomware. DPRK domains revealed.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about Russian hackers turning their attention to German political targets as well as politicians in the US. The son-of-Shadow-Brokers vulnerability Cisco discovered is being exploited in the wild. New strains of ransomware are out—Mamba is as dangerous to networks as its namesake is to human tissue. The Air Force Association is taking up cyber in its annual meetings. The Internet-of-moving things handles disclosures. Matthew Green from Johns Hopkins University's Information Security Institute discuses the downsides of crypto backdoors. University of Maryland's Jonathan Katz talks about new security standards adopted by Google. And North Korea parts the curtain in front of its domains.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about Russian hackers turning their attention to German political targets as well as politicians in the US. The son-of-Shadow-Brokers vulnerability Cisco discovered is being exploited in the wild. New strains of ransomware are out—Mamba is as dangerous to networks as its namesake is to human tissue. The Air Force Association is taking up cyber in its annual meetings. The Internet-of-moving things handles disclosures. Matthew Green from Johns Hopkins University's Information Security Institute discuses the downsides of crypto backdoors. University of Maryland's Jonathan Katz talks about new security standards adopted by Google. And North Korea parts the curtain in front of its domains.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>999</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d304a0a0154bb68260e4e2162fa8894c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4386102990.mp3?updated=1689615263" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: FBI hunts Russian bears, election hacking, chat bot warnings.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/188/notes</link>
      <description>In today's podcast we hear about how the FBI is seeking to impose costs on Fancy Bear and Cozy Bear. Election hacking fears remain, despite DHS reassurances, and industry sources warn of privacy risks within campaign databases. Investigation continues into the ISIS-claimed weekend attacks. Cisco patches a firewall vulnerability related to a Shadow Brokers' exploit. Dr. Charles Clancy from Virginia Tech's Hume Center weighs in on the Muddy Waters Capital / St. Jude Medical legal battle. Casey Ellis from Bugcrowd explains how they crowdsource application testing. M&amp;A activity, and another warning to beware of chat bots.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 20 Sep 2016 17:48:20 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>188</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bc55f5b6-def8-11ea-911f-5766e471ed9c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: FBI hunts Russian bears, election hacking, chat bot warnings.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about how the FBI is seeking to impose costs on Fancy Bear and Cozy Bear. Election hacking fears remain, despite DHS reassurances, and industry sources warn of privacy risks within campaign databases. Investigation continues into the ISIS-claimed weekend attacks. Cisco patches a firewall vulnerability related to a Shadow Brokers' exploit. Dr. Charles Clancy from Virginia Tech's Hume Center weighs in on the Muddy Waters Capital / St. Jude Medical legal battle. Casey Ellis from Bugcrowd explains how they crowdsource application testing. M&amp;A activity, and another warning to beware of chat bots.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about how the FBI is seeking to impose costs on Fancy Bear and Cozy Bear. Election hacking fears remain, despite DHS reassurances, and industry sources warn of privacy risks within campaign databases. Investigation continues into the ISIS-claimed weekend attacks. Cisco patches a firewall vulnerability related to a Shadow Brokers' exploit. Dr. Charles Clancy from Virginia Tech's Hume Center weighs in on the Muddy Waters Capital / St. Jude Medical legal battle. Casey Ellis from Bugcrowd explains how they crowdsource application testing. M&amp;A activity, and another warning to beware of chat bots.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1007</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[47280788f1359b99946b412d9c2aece3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8905113890.mp3?updated=1689615247" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: New York area bombings, ISIS defacements, Snowden pardon debate.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/187/notes</link>
      <description>In today's podcast we offer updates on the weekend's attacks against US targets in Minnesota, New York, and New Jersey. So far the cyber dimension is limited to ISIS cheerleading and claiming credit online, but the investigations are still in their early stages. Fancy Bear doxes more athletes from the WADA networks. Fancy's also still interested in US elections, and experts point out that releasing genuine emails could be battlespace preparation for online disinformation operations. In industry news, Oracle buy Palerra, and major tech companies form a Vendor Security Alliance. Malek Ben Salem from Accenture Labs outlines some frameworks they've been developing for the industrial IoT. Reactions to the prospect of a Snowden pardon, and an insider gives his take on Snowden, the movie.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 19 Sep 2016 16:53:08 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>187</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bc679280-def8-11ea-911f-8b8272b0c8f1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: New York area bombings, ISIS defacements, Snowden pardon debate.</itunes:subtitle>
      <itunes:summary>In today's podcast we offer updates on the weekend's attacks against US targets in Minnesota, New York, and New Jersey. So far the cyber dimension is limited to ISIS cheerleading and claiming credit online, but the investigations are still in their early stages. Fancy Bear doxes more athletes from the WADA networks. Fancy's also still interested in US elections, and experts point out that releasing genuine emails could be battlespace preparation for online disinformation operations. In industry news, Oracle buy Palerra, and major tech companies form a Vendor Security Alliance. Malek Ben Salem from Accenture Labs outlines some frameworks they've been developing for the industrial IoT. Reactions to the prospect of a Snowden pardon, and an insider gives his take on Snowden, the movie.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we offer updates on the weekend's attacks against US targets in Minnesota, New York, and New Jersey. So far the cyber dimension is limited to ISIS cheerleading and claiming credit online, but the investigations are still in their early stages. Fancy Bear doxes more athletes from the WADA networks. Fancy's also still interested in US elections, and experts point out that releasing genuine emails could be battlespace preparation for online disinformation operations. In industry news, Oracle buy Palerra, and major tech companies form a Vendor Security Alliance. Malek Ben Salem from Accenture Labs outlines some frameworks they've been developing for the industrial IoT. Reactions to the prospect of a Snowden pardon, and an insider gives his take on Snowden, the movie.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>859</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6321e53eed48a071d9ecd11565f4a9d0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5063160883.mp3?updated=1689614989" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: VIPs scrub email, cyber war vs cold war, industry news and more.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/186/notes</link>
      <description>In today's podcast, we hear about VIPs everywhere rushing to delete their emails before Fancy Bear gets her paws into them. Opinion leaders rumble about the Cyber War having picked up where the Cold War left off. Election security concerns may prompt US Senate hearings. British companies take a look at operations in the Baltimore-Washington area. Other industry notes include VC rounds, M&amp;A activity, a new automotive cyber security venture, and the announcement of 2016's SINET 16. Dale Drew from Level 3 Communications offers tips on protecting medical data. We speak with IBM's Shelley Westman about encouraging more women to join the industry. And the US House doesn't think too much of a Snowden pardon.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 16 Sep 2016 20:24:47 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>186</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bc81993c-def8-11ea-911f-e3db4f790eb6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: VIPs scrub email, cyber war vs cold war, industry news and more.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about VIPs everywhere rushing to delete their emails before Fancy Bear gets her paws into them. Opinion leaders rumble about the Cyber War having picked up where the Cold War left off. Election security concerns may prompt US Senate hearings. British companies take a look at operations in the Baltimore-Washington area. Other industry notes include VC rounds, M&amp;A activity, a new automotive cyber security venture, and the announcement of 2016's SINET 16. Dale Drew from Level 3 Communications offers tips on protecting medical data. We speak with IBM's Shelley Westman about encouraging more women to join the industry. And the US House doesn't think too much of a Snowden pardon.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about VIPs everywhere rushing to delete their emails before Fancy Bear gets her paws into them. Opinion leaders rumble about the Cyber War having picked up where the Cold War left off. Election security concerns may prompt US Senate hearings. British companies take a look at operations in the Baltimore-Washington area. Other industry notes include VC rounds, M&amp;A activity, a new automotive cyber security venture, and the announcement of 2016's SINET 16. Dale Drew from Level 3 Communications offers tips on protecting medical data. We speak with IBM's Shelley Westman about encouraging more women to join the industry. And the US House doesn't think too much of a Snowden pardon.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1287</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8569a5c70db5a031f75e897f017ddef7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1724121878.mp3?updated=1608753120" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Does Fancy Bear  care if it's caught? Retaliation, vulnerabilities, litigation, and more.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/185/notes</link>
      <description>In today's podcast we get an increasingly familiar update: Fancy Bear is dancing and prancing through poorly protected networks, and she doesn't seem to care who knows it. More politically motivated hacking out of Russia prompts US promises of investigation and costs to be imposed. Failures in digital hygiene continue to be exploited. SCADA hacks worry the electrical grid. Joe Carrigan from the Johns Hopkins University Information Security Institute offers tips for safe device sharing. SentinelOne's Tim Strazzere describes an Android vulnerability his research uncovered. And some good news: NIST has released a new cyber self-assessment tool, and they'd like you to give it a spin.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 15 Sep 2016 20:47:19 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>185</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bc9247e6-def8-11ea-911f-4385214e3351/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Does Fancy Bear  care if it's caught? Retaliation, vulnerabilities, litigation, and more.</itunes:subtitle>
      <itunes:summary>In today's podcast we get an increasingly familiar update: Fancy Bear is dancing and prancing through poorly protected networks, and she doesn't seem to care who knows it. More politically motivated hacking out of Russia prompts US promises of investigation and costs to be imposed. Failures in digital hygiene continue to be exploited. SCADA hacks worry the electrical grid. Joe Carrigan from the Johns Hopkins University Information Security Institute offers tips for safe device sharing. SentinelOne's Tim Strazzere describes an Android vulnerability his research uncovered. And some good news: NIST has released a new cyber self-assessment tool, and they'd like you to give it a spin.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we get an increasingly familiar update: Fancy Bear is dancing and prancing through poorly protected networks, and she doesn't seem to care who knows it. More politically motivated hacking out of Russia prompts US promises of investigation and costs to be imposed. Failures in digital hygiene continue to be exploited. SCADA hacks worry the electrical grid. Joe Carrigan from the Johns Hopkins University Information Security Institute offers tips for safe device sharing. SentinelOne's Tim Strazzere describes an Android vulnerability his research uncovered. And some good news: NIST has released a new cyber self-assessment tool, and they'd like you to give it a spin.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1006</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7cbf49ec16171877cf426e5ed7f60b55]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5909324918.mp3?updated=1689614956" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Pentesting meets the gig economy. Stingrays, machine learning, and more.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/184/notes</link>
      <description>In today's podcast we discuss the posting of more documents swiped from the US Democratic Party, which most consider the work of Russia's Fancy Bear. US officials continue to worry about election hacking. "Periscope skimming" is a new ATM hack. The US government mulls the reorganization of its cyber agencies. Raj Gopalakrishna, Chief Software Architect at Acalvio, provides his insights on machine learning. Ben Yelin from UMD CHHS explains some newly released revelations about Stingray surveillance devices. The new Snowden biopic hits movie theaters. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 14 Sep 2016 18:33:01 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>184</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bcb68e9e-def8-11ea-911f-574525e30840/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Pentesting meets the gig economy. Stingrays, machine learning, and more.</itunes:subtitle>
      <itunes:summary>In today's podcast we discuss the posting of more documents swiped from the US Democratic Party, which most consider the work of Russia's Fancy Bear. US officials continue to worry about election hacking. "Periscope skimming" is a new ATM hack. The US government mulls the reorganization of its cyber agencies. Raj Gopalakrishna, Chief Software Architect at Acalvio, provides his insights on machine learning. Ben Yelin from UMD CHHS explains some newly released revelations about Stingray surveillance devices. The new Snowden biopic hits movie theaters. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we discuss the posting of more documents swiped from the US Democratic Party, which most consider the work of Russia's Fancy Bear. US officials continue to worry about election hacking. "Periscope skimming" is a new ATM hack. The US government mulls the reorganization of its cyber agencies. Raj Gopalakrishna, Chief Software Architect at Acalvio, provides his insights on machine learning. Ben Yelin from UMD CHHS explains some newly released revelations about Stingray surveillance devices. The new Snowden biopic hits movie theaters. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>993</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b8ca91df4953106c2cd8a8bb5919aa55]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7270463267.mp3?updated=1689614917" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Lessons from recent incidents. Russia says, it's not us, it's you, and more.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/183/notes</link>
      <description>It's Patch Tuesday, and time to apply the latest fixes from Redmond. Symantec's August Security Report is out. Middlemen make it tough to track exploit sales. GovRAT continues to afflict networks in the wild. Lessons from private key exposure. Russia says the international order isn't the same thing as the American order. The US and the UK conclude a cyber cooperation agreement. More bogus apps for Pokemon-GO. We welcome Emily Wilson from Terbium Labs to the show, and Tony Dabhura from Johns Hopkins University's Information Security Institute tells about their upcoming conference for senior executives. And could people soon be asked to stand and remove their hats for "City Escape?"
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 13 Sep 2016 19:31:44 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>183</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bcc93d78-def8-11ea-911f-d7eec3008a73/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Lessons from recent incidents. Russia says, it's not us, it's you, and more.</itunes:subtitle>
      <itunes:summary>It's Patch Tuesday, and time to apply the latest fixes from Redmond. Symantec's August Security Report is out. Middlemen make it tough to track exploit sales. GovRAT continues to afflict networks in the wild. Lessons from private key exposure. Russia says the international order isn't the same thing as the American order. The US and the UK conclude a cyber cooperation agreement. More bogus apps for Pokemon-GO. We welcome Emily Wilson from Terbium Labs to the show, and Tony Dabhura from Johns Hopkins University's Information Security Institute tells about their upcoming conference for senior executives. And could people soon be asked to stand and remove their hats for "City Escape?"
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>It's Patch Tuesday, and time to apply the latest fixes from Redmond. Symantec's August Security Report is out. Middlemen make it tough to track exploit sales. GovRAT continues to afflict networks in the wild. Lessons from private key exposure. Russia says the international order isn't the same thing as the American order. The US and the UK conclude a cyber cooperation agreement. More bogus apps for Pokemon-GO. We welcome Emily Wilson from Terbium Labs to the show, and Tony Dabhura from Johns Hopkins University's Information Security Institute tells about their upcoming conference for senior executives. And could people soon be asked to stand and remove their hats for "City Escape?"</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>987</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d18f9660f5b67cd0d1e4ec8e843b036b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9462728036.mp3?updated=1689614887" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Zero-days, industry notes, the Intelligence &amp; National Security Summit, and more.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/182/notes</link>
      <description>In today's podcast we wrap up our coverage of last week's Intelligence and National Security Summit, discussing some of the issues surrounding cyber conflict among nation-states and terrorist organizations. Unresolved issues of cyber deterrence and where it should fit into the spectrum of conflict. Goals of election hacking and other influence operations, from propaganda through lobbying through bribery. Ransomware trends and credential breaches. Yisroel Mirsky from Ben Gurion University discusses air gap security. And sometimes your enemies are an even better recommendation than your friends.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 12 Sep 2016 20:46:06 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>182</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bcdfe67c-def8-11ea-911f-735db73500c9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Zero-days, industry notes, the Intelligence &amp; National Security Summit, and more.</itunes:subtitle>
      <itunes:summary>In today's podcast we wrap up our coverage of last week's Intelligence and National Security Summit, discussing some of the issues surrounding cyber conflict among nation-states and terrorist organizations. Unresolved issues of cyber deterrence and where it should fit into the spectrum of conflict. Goals of election hacking and other influence operations, from propaganda through lobbying through bribery. Ransomware trends and credential breaches. Yisroel Mirsky from Ben Gurion University discusses air gap security. And sometimes your enemies are an even better recommendation than your friends.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we wrap up our coverage of last week's Intelligence and National Security Summit, discussing some of the issues surrounding cyber conflict among nation-states and terrorist organizations. Unresolved issues of cyber deterrence and where it should fit into the spectrum of conflict. Goals of election hacking and other influence operations, from propaganda through lobbying through bribery. Ransomware trends and credential breaches. Yisroel Mirsky from Ben Gurion University discusses air gap security. And sometimes your enemies are an even better recommendation than your friends.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>871</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[33e49dcf1f65827a8eaab37f4c7f60fc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7332885509.mp3?updated=1689614887" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Malware mines Monero. That sad OPM breach, Crackas cracked, and more.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/181/notes</link>
      <description>In today's podcast, we look at the ways in which election hacking have driven increased tension between Russia and the US. (And Wikileaks says it plans to release more election-related documents, before the US elections.)  GovRAT 2.0 is out in the wild. Congress reports out its investigation of the OPM hack, and we get insider perspective from Cylance's Malcolm Harkins.  Intel sells its security unit (which will go back to its old McAfee name). Markus Rauschecker from UMD CHHS discusses a proposal to check social media accounts at the border. And the FBI arrests two it says are the Crackas-with-Attitude.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 09 Sep 2016 19:59:40 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>181</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bcfdbada-def8-11ea-911f-9fca6f520342/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Malware mines Monero. That sad OPM breach, Crackas cracked, and more.</itunes:subtitle>
      <itunes:summary>In today's podcast, we look at the ways in which election hacking have driven increased tension between Russia and the US. (And Wikileaks says it plans to release more election-related documents, before the US elections.)  GovRAT 2.0 is out in the wild. Congress reports out its investigation of the OPM hack, and we get insider perspective from Cylance's Malcolm Harkins.  Intel sells its security unit (which will go back to its old McAfee name). Markus Rauschecker from UMD CHHS discusses a proposal to check social media accounts at the border. And the FBI arrests two it says are the Crackas-with-Attitude.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we look at the ways in which election hacking have driven increased tension between Russia and the US. (And Wikileaks says it plans to release more election-related documents, before the US elections.)  GovRAT 2.0 is out in the wild. Congress reports out its investigation of the OPM hack, and we get insider perspective from Cylance's Malcolm Harkins.  Intel sells its security unit (which will go back to its old McAfee name). Markus Rauschecker from UMD CHHS discusses a proposal to check social media accounts at the border. And the FBI arrests two it says are the Crackas-with-Attitude.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1242</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e1742f0783259ae062e8a00a687cfd0d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3083984356.mp3?updated=1608753108" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: US voting security, cyber M&amp;A action, OPM breach post mortem, Pokémon, and more.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/180/notes</link>
      <description>In today's podcast we explore ongoing concerns about Russian attempts to influence US elections. The US Congress has harsh words for OPM in their data breach report. Google has a plan for countering ISIS messaging online. Ransomware may prove self-limiting for criminals, and St. Jude Medical sues Muddy Waters Capital and MedSec. We hear about next-generation SOCs from Siemplify's Amos Stern, and University of Maryland's Jonathan Katz explains a vulnerability in homomorphic encryption.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 08 Sep 2016 18:32:33 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>180</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bd15427c-def8-11ea-911f-a7536842bb32/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: US voting security, cyber M&amp;A action, OPM breach post mortem, Pokémon, and more.</itunes:subtitle>
      <itunes:summary>In today's podcast we explore ongoing concerns about Russian attempts to influence US elections. The US Congress has harsh words for OPM in their data breach report. Google has a plan for countering ISIS messaging online. Ransomware may prove self-limiting for criminals, and St. Jude Medical sues Muddy Waters Capital and MedSec. We hear about next-generation SOCs from Siemplify's Amos Stern, and University of Maryland's Jonathan Katz explains a vulnerability in homomorphic encryption.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we explore ongoing concerns about Russian attempts to influence US elections. The US Congress has harsh words for OPM in their data breach report. Google has a plan for countering ISIS messaging online. Ransomware may prove self-limiting for criminals, and St. Jude Medical sues Muddy Waters Capital and MedSec. We hear about next-generation SOCs from Siemplify's Amos Stern, and University of Maryland's Jonathan Katz explains a vulnerability in homomorphic encryption.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>995</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f3f327c3d4955bb5d7c3229243b119d0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1043842139.mp3?updated=1689614837" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Election hacking (again). Also key sharing risks, and more.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/179/notes</link>
      <description>In today's podcast we hear about cyber risks and cyber talks at the G20 summit. China may be looking to the Russian model in the Near Abroad as it thinks about its next steps in the South China Sea. The current state of Russian-American relations in cyberspace—they're dominated by election hacking and information operations. The risks of shared cryptographic keys. An Android Trojan evolves. Industry notes—contracts, patches, acquisitions, and lawsuits. John Leiseboer from Quintessence Labs outlines cryptographic and key management standards. Gabby Nizry from Ayehu explains the benefits of automation. And EXTRABACON is still a problem.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 07 Sep 2016 20:14:49 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>179</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bd315f20-def8-11ea-911f-87fd73c53f9a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Election hacking (again). Also key sharing risks, and more.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about cyber risks and cyber talks at the G20 summit. China may be looking to the Russian model in the Near Abroad as it thinks about its next steps in the South China Sea. The current state of Russian-American relations in cyberspace—they're dominated by election hacking and information operations. The risks of shared cryptographic keys. An Android Trojan evolves. Industry notes—contracts, patches, acquisitions, and lawsuits. John Leiseboer from Quintessence Labs outlines cryptographic and key management standards. Gabby Nizry from Ayehu explains the benefits of automation. And EXTRABACON is still a problem.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about cyber risks and cyber talks at the G20 summit. China may be looking to the Russian model in the Near Abroad as it thinks about its next steps in the South China Sea. The current state of Russian-American relations in cyberspace—they're dominated by election hacking and information operations. The risks of shared cryptographic keys. An Android Trojan evolves. Industry notes—contracts, patches, acquisitions, and lawsuits. John Leiseboer from Quintessence Labs outlines cryptographic and key management standards. Gabby Nizry from Ayehu explains the benefits of automation. And EXTRABACON is still a problem.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>971</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dff366434af3056811d6b71666a7f05a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9620400938.mp3?updated=1689614886" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Slap leather, Vlad. If cyberspace is the "Wild West," here's the best showdown since Blazing Saddles, and more.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/178/notes</link>
      <description>In today's podcast, we hear about some Pokémon-themed Linux rootkits. An evolved Linux Trojan is herding I0T botnets. Social media monitoring leads to convictions of jihadist plotters in Australia and the UK. Pegasus spyware and NSO Group's pricelist. Election hacking on four continents. Are the Shadow Brokers engaged in intelligence or influence operations? (In any case, no one's really bidding on the Equation Group code the Brokers say they're auctioning.) The FBI releases information on its investigation into former Secretary of State Clinton's email. Accenture Labs' Malek Ben Salem describes frameworks for Industrial IoT. And for a while it looked like cyber high noon at the G20 talks. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 06 Sep 2016 20:20:49 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>178</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bd63f660-def8-11ea-911f-2bb038315e84/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Slap leather, Vlad. If cyberspace is the "Wild West," here's the best showdown since Blazing Saddles, and more.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about some Pokémon-themed Linux rootkits. An evolved Linux Trojan is herding I0T botnets. Social media monitoring leads to convictions of jihadist plotters in Australia and the UK. Pegasus spyware and NSO Group's pricelist. Election hacking on four continents. Are the Shadow Brokers engaged in intelligence or influence operations? (In any case, no one's really bidding on the Equation Group code the Brokers say they're auctioning.) The FBI releases information on its investigation into former Secretary of State Clinton's email. Accenture Labs' Malek Ben Salem describes frameworks for Industrial IoT. And for a while it looked like cyber high noon at the G20 talks. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about some Pokémon-themed Linux rootkits. An evolved Linux Trojan is herding I0T botnets. Social media monitoring leads to convictions of jihadist plotters in Australia and the UK. Pegasus spyware and NSO Group's pricelist. Election hacking on four continents. Are the Shadow Brokers engaged in intelligence or influence operations? (In any case, no one's really bidding on the Equation Group code the Brokers say they're auctioning.) The FBI releases information on its investigation into former Secretary of State Clinton's email. Accenture Labs' Malek Ben Salem describes frameworks for Industrial IoT. And for a while it looked like cyber high noon at the G20 talks. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>933</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8988b30f626e017787365842c1aa9bfb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9737910415.mp3?updated=1689614821" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Election hacking, OS X patched, cyber saber-rattling, finding security talent, and more.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/177/notes</link>
      <description>In today's podcast, we discuss Apple's patches against the Trident zero-days, and review what the press is saying about the cyber arms market. Policy wonks and politicians speak in favor of cyber offense, and militaries speak up for nuance. Election hacks continue, this time in Hong Kong. How companies and governments adjust to a difficult cyber labor market, with insights from Level 3's Dale Drew. Gene Stevens from ProtectWise explains the contribution of interface design to security. Responsible disclosure, stock shorting, and the importance of cooperation between vendors and researchers. A quick look at the week in the security industry. More old breaches show its's a bad idea to reuse passwords. And Guccifer gets four years.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 02 Sep 2016 19:09:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>177</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bd71a40e-def8-11ea-911f-07e659eff351/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Election hacking, OS X patched, cyber saber-rattling, finding security talent, and more.</itunes:subtitle>
      <itunes:summary>In today's podcast, we discuss Apple's patches against the Trident zero-days, and review what the press is saying about the cyber arms market. Policy wonks and politicians speak in favor of cyber offense, and militaries speak up for nuance. Election hacks continue, this time in Hong Kong. How companies and governments adjust to a difficult cyber labor market, with insights from Level 3's Dale Drew. Gene Stevens from ProtectWise explains the contribution of interface design to security. Responsible disclosure, stock shorting, and the importance of cooperation between vendors and researchers. A quick look at the week in the security industry. More old breaches show its's a bad idea to reuse passwords. And Guccifer gets four years.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we discuss Apple's patches against the Trident zero-days, and review what the press is saying about the cyber arms market. Policy wonks and politicians speak in favor of cyber offense, and militaries speak up for nuance. Election hacks continue, this time in Hong Kong. How companies and governments adjust to a difficult cyber labor market, with insights from Level 3's Dale Drew. Gene Stevens from ProtectWise explains the contribution of interface design to security. Responsible disclosure, stock shorting, and the importance of cooperation between vendors and researchers. A quick look at the week in the security industry. More old breaches show its's a bad idea to reuse passwords. And Guccifer gets four years.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1257</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6bff254165f27eb6004cb8ee8ce7aeeb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1060459036.mp3?updated=1608753062" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Russia's cyber long game, SWIFT fraud, hack physics (not metaphors), and more.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/176/notes</link>
      <description>In today's podcast we hear about a successful business email compromise caper, and some more SWIFT fraud. Vanya the RIPPER is on the lam from Thai police. iMessaging issues surface. Cerber ransomware is being spread by Word documents. Adobe's hot fix swats a Cold Fusion bug. Rowhammer attacks are shown to be a real possibility. Election hacking and influence operations. Centrify's Corey Williams weighs in on the Sage Software data breach, and Jonathan Katz from the University of Maryland explains an iMessage vulnerability. And a tip: if you look good for your mugshot, you won't be tempted to Facebook a more flattering one to the authorities.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 01 Sep 2016 18:33:11 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>176</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bd85d532-def8-11ea-911f-0f8ba6a7aa99/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Russia's cyber long game, SWIFT fraud, hack physics (not metaphors), and more.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about a successful business email compromise caper, and some more SWIFT fraud. Vanya the RIPPER is on the lam from Thai police. iMessaging issues surface. Cerber ransomware is being spread by Word documents. Adobe's hot fix swats a Cold Fusion bug. Rowhammer attacks are shown to be a real possibility. Election hacking and influence operations. Centrify's Corey Williams weighs in on the Sage Software data breach, and Jonathan Katz from the University of Maryland explains an iMessage vulnerability. And a tip: if you look good for your mugshot, you won't be tempted to Facebook a more flattering one to the authorities.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about a successful business email compromise caper, and some more SWIFT fraud. Vanya the RIPPER is on the lam from Thai police. iMessaging issues surface. Cerber ransomware is being spread by Word documents. Adobe's hot fix swats a Cold Fusion bug. Rowhammer attacks are shown to be a real possibility. Election hacking and influence operations. Centrify's Corey Williams weighs in on the Sage Software data breach, and Jonathan Katz from the University of Maryland explains an iMessage vulnerability. And a tip: if you look good for your mugshot, you won't be tempted to Facebook a more flattering one to the authorities.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>991</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b36e6411777aa2cf6c1babab88deba95]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6399790189.mp3?updated=1689614446" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: The compleat hacker: wading pool, laptop, MiG 21; no hoodie, no problem, and more.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/175/notes</link>
      <description>In today's podcast we follow the story of alleged Russian hacking of US think tanks and election databases (allegations Russia dismisses as American provocation). US Federal and state officials think about securing November's vote. Mississippi organizes a new public-private cyber security coalition. SWIFT discloses new money transfer fraud attempts. New ransomware strains are out in the wild, and a Trojan is impersonating Google Chrome. Dr. Jim Kent from Nuix shares his thoughts on insider threats, and we welcome Yisroel Mirsky from Ben-Gurion University, our newest Academic and Research Partner. And, producers, rethink your B-roll: we take a look at the best stock picture of a hacker yet.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 31 Aug 2016 18:40:49 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>175</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bd9c5082-def8-11ea-911f-d78c5c9a4374/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: The compleat hacker: wading pool, laptop, MiG 21; no hoodie, no problem, and more.</itunes:subtitle>
      <itunes:summary>In today's podcast we follow the story of alleged Russian hacking of US think tanks and election databases (allegations Russia dismisses as American provocation). US Federal and state officials think about securing November's vote. Mississippi organizes a new public-private cyber security coalition. SWIFT discloses new money transfer fraud attempts. New ransomware strains are out in the wild, and a Trojan is impersonating Google Chrome. Dr. Jim Kent from Nuix shares his thoughts on insider threats, and we welcome Yisroel Mirsky from Ben-Gurion University, our newest Academic and Research Partner. And, producers, rethink your B-roll: we take a look at the best stock picture of a hacker yet.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we follow the story of alleged Russian hacking of US think tanks and election databases (allegations Russia dismisses as American provocation). US Federal and state officials think about securing November's vote. Mississippi organizes a new public-private cyber security coalition. SWIFT discloses new money transfer fraud attempts. New ransomware strains are out in the wild, and a Trojan is impersonating Google Chrome. Dr. Jim Kent from Nuix shares his thoughts on insider threats, and we welcome Yisroel Mirsky from Ben-Gurion University, our newest Academic and Research Partner. And, producers, rethink your B-roll: we take a look at the best stock picture of a hacker yet.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1007</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[99f6a928b94f0c5beb1501cccf41f62b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1039364161.mp3?updated=1689614412" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Fundraising and Cyber Startups [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/8/notes</link>
      <description>Whether your bootstrapping your business on your own, borrowing from friends and family or going for your Series A venture capital round, raising money is something most business owners have to deal with, sooner or later. We spoke with experienced business leaders in cyber security to find out what they did to fund their companies, lessons they learned, and what advice they’d give.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 31 Aug 2016 10:30:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0dc55bb2-df03-11ea-9e12-afa3eee194ae/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Fundraising and Cyber Startups</itunes:subtitle>
      <itunes:summary>Whether your bootstrapping your business on your own, borrowing from friends and family or going for your Series A venture capital round, raising money is something most business owners have to deal with, sooner or later. We spoke with experienced business leaders in cyber security to find out what they did to fund their companies, lessons they learned, and what advice they’d give.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Whether your bootstrapping your business on your own, borrowing from friends and family or going for your Series A venture capital round, raising money is something most business owners have to deal with, sooner or later. We spoke with experienced business leaders in cyber security to find out what they did to fund their companies, lessons they learned, and what advice they’d give.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1807</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b4148300fce92b1def402d3c1aa24b48]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2822541246.mp3?updated=1656707853" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Bug hunters turn shorts. Cyber frame-ups, election fraud, spearphishing, whalephishing, and more.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/174/notes</link>
      <description>In today's podcast we follow concerns about US election hacking brought on by an FBI warning that someone (the Russians, IC and industry sources say) has hacked into Illinois and Arizona voter databases. Lawful intercept vendors receive more scrutiny in the wake of the Trident iPhone zero-day revelations. Analysts raise concerns about data manipulation in both elections and criminal investigations. St. Jude Medical disputes allegations that its pacemakers are hackable, and the security sector does some ethical introspection about disclosure. The IoT is beginning to exploited in DDoS campaigns. Malicious EMV cards are implicated in Thailand's ATM skimming crime wave. University of Maryland CHHS' Ben Yelin weighs in on the legal issues surrounding the Muddy Waters Capital story, and Security Mentor's Dan Lohrmann explains sophisticated attacks on the C-Suite. And Angry Birds join Pokémon on various enterprise blacklists.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 30 Aug 2016 19:49:57 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>174</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bdc9a726-def8-11ea-911f-6b3df9b4d450/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Bug hunters turn shorts. Cyber frame-ups, election fraud, spearphishing, whalephishing, and more.</itunes:subtitle>
      <itunes:summary>In today's podcast we follow concerns about US election hacking brought on by an FBI warning that someone (the Russians, IC and industry sources say) has hacked into Illinois and Arizona voter databases. Lawful intercept vendors receive more scrutiny in the wake of the Trident iPhone zero-day revelations. Analysts raise concerns about data manipulation in both elections and criminal investigations. St. Jude Medical disputes allegations that its pacemakers are hackable, and the security sector does some ethical introspection about disclosure. The IoT is beginning to exploited in DDoS campaigns. Malicious EMV cards are implicated in Thailand's ATM skimming crime wave. University of Maryland CHHS' Ben Yelin weighs in on the legal issues surrounding the Muddy Waters Capital story, and Security Mentor's Dan Lohrmann explains sophisticated attacks on the C-Suite. And Angry Birds join Pokémon on various enterprise blacklists.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we follow concerns about US election hacking brought on by an FBI warning that someone (the Russians, IC and industry sources say) has hacked into Illinois and Arizona voter databases. Lawful intercept vendors receive more scrutiny in the wake of the Trident iPhone zero-day revelations. Analysts raise concerns about data manipulation in both elections and criminal investigations. St. Jude Medical disputes allegations that its pacemakers are hackable, and the security sector does some ethical introspection about disclosure. The IoT is beginning to exploited in DDoS campaigns. Malicious EMV cards are implicated in Thailand's ATM skimming crime wave. University of Maryland CHHS' Ben Yelin weighs in on the legal issues surrounding the Muddy Waters Capital story, and Security Mentor's Dan Lohrmann explains sophisticated attacks on the C-Suite. And Angry Birds join Pokémon on various enterprise blacklists.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>992</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eb27f6396b5f9785a8719dcddc5595d3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1521829756.mp3?updated=1689614137" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Bug bounty? Nah, just short the stock. Pegasus, cyber arms control, and more.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/173/notes</link>
      <description>In today's podcast, we update the story on SCADA malware in Iran—Iran now thinks it didn't cause petrochemical industry fires. France, India, and Australia investigate theft of submarine design data. Citizen Labs' investigation of iOS spyware renews debate over cyber arms control. The Shadow Brokers haven't yet got their half-billion dollars, but their leaks chill US-Russian relations and prompt both election fears and concerns over zero-day disclosure. The US prepares to revise its anti-ISIS social media operations. Security firm MedSec discloses alleged St. Jude medical device vulnerabilities to a hedge fund, seeking to profit from short-selling. Markus Rauschecker from the University of Maryland Center for Health and Homeland Security gives us the details on PPD 41 from the White House. Fishing and hunting license databases exposed.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 29 Aug 2016 19:01:12 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>173</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bde27094-def8-11ea-911f-3744a5f30662/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Bug bounty? Nah, just short the stock. Pegasus, cyber arms control, and more.</itunes:subtitle>
      <itunes:summary>In today's podcast, we update the story on SCADA malware in Iran—Iran now thinks it didn't cause petrochemical industry fires. France, India, and Australia investigate theft of submarine design data. Citizen Labs' investigation of iOS spyware renews debate over cyber arms control. The Shadow Brokers haven't yet got their half-billion dollars, but their leaks chill US-Russian relations and prompt both election fears and concerns over zero-day disclosure. The US prepares to revise its anti-ISIS social media operations. Security firm MedSec discloses alleged St. Jude medical device vulnerabilities to a hedge fund, seeking to profit from short-selling. Markus Rauschecker from the University of Maryland Center for Health and Homeland Security gives us the details on PPD 41 from the White House. Fishing and hunting license databases exposed.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we update the story on SCADA malware in Iran—Iran now thinks it didn't cause petrochemical industry fires. France, India, and Australia investigate theft of submarine design data. Citizen Labs' investigation of iOS spyware renews debate over cyber arms control. The Shadow Brokers haven't yet got their half-billion dollars, but their leaks chill US-Russian relations and prompt both election fears and concerns over zero-day disclosure. The US prepares to revise its anti-ISIS social media operations. Security firm MedSec discloses alleged St. Jude medical device vulnerabilities to a hedge fund, seeking to profit from short-selling. Markus Rauschecker from the University of Maryland Center for Health and Homeland Security gives us the details on PPD 41 from the White House. Fishing and hunting license databases exposed.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>946</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a6c96ccdc275ca64fc7bf05bf7cae69c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4365251893.mp3?updated=1689614123" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Sorry, kids, it's back-to-school. What you should know, fellow youths, and more.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/172/notes</link>
      <description>In today's podcast, we hear about a spyware case connected to Pegasus, a tool that can jailbreak an iPhone (they say) with a single click. Apple issues an out-of-band patch for the three iOS zero-days Pegasus exploits. Shadow Brokers leaks remain under investigation. Phishlabs and TrapX release anti-ransomware tools. Ramnit and Dreambot are after bank accounts (and Dreambot spreads over Tor). NIST has a de-identification standard out for comment. AT&amp;T's Bindu Sundaresan looks at academic networks as students head back to school. Johns Hopkins' Joe Carrigan discusses option for safely backing up your photos. Industry news includes some interesting short-selling. And Russia isn't feeling the love in cyberspace. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 26 Aug 2016 19:45:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>172</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bdff5a92-def8-11ea-911f-47374a25d54a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Sorry, kids, it's back-to-school. What you should know, fellow youths, and more.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about a spyware case connected to Pegasus, a tool that can jailbreak an iPhone (they say) with a single click. Apple issues an out-of-band patch for the three iOS zero-days Pegasus exploits. Shadow Brokers leaks remain under investigation. Phishlabs and TrapX release anti-ransomware tools. Ramnit and Dreambot are after bank accounts (and Dreambot spreads over Tor). NIST has a de-identification standard out for comment. AT&amp;T's Bindu Sundaresan looks at academic networks as students head back to school. Johns Hopkins' Joe Carrigan discusses option for safely backing up your photos. Industry news includes some interesting short-selling. And Russia isn't feeling the love in cyberspace. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about a spyware case connected to Pegasus, a tool that can jailbreak an iPhone (they say) with a single click. Apple issues an out-of-band patch for the three iOS zero-days Pegasus exploits. Shadow Brokers leaks remain under investigation. Phishlabs and TrapX release anti-ransomware tools. Ramnit and Dreambot are after bank accounts (and Dreambot spreads over Tor). NIST has a de-identification standard out for comment. AT&amp;T's Bindu Sundaresan looks at academic networks as students head back to school. Johns Hopkins' Joe Carrigan discusses option for safely backing up your photos. Industry news includes some interesting short-selling. And Russia isn't feeling the love in cyberspace. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1266</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[df78865256d6d495899c7bd452d3efe9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2449351515.mp3?updated=1608753118" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Info ops drive hacks. Cryptowar resurgence in Europe, and more.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/171/notes</link>
      <description>In today's podcast, we look at ways in which terrorist incidents have motivated France and Germany to seek ways of compelling encrypted messaging apps to open traffic to inspection. In the UK such incidents have also prompted a harsh Parliamentary report on social media companies' efforts to combat radicalization. Shadow Brokers leaked exploits continue to appear in the wild. Investigation continues, but observers begin to see the incident as part of a general attack on US official credibility. Assange promises more leaks of Clinton material. Ransomware appears in India and Vietnam. A new Android banking Trojan uses Twitter for command-and-control. Dale Drew from Level 3 Communications shares tips on setting up a SOC, and Ralph Cita explains how they make free training available at Cybrary. And Ashley Madison gets bad reports in three of the Five Eyes.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 25 Aug 2016 20:08:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>171</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/be142440-def8-11ea-911f-03b7fc631fac/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Info ops drive hacks. Cryptowar resurgence in Europe, and more.</itunes:subtitle>
      <itunes:summary>In today's podcast, we look at ways in which terrorist incidents have motivated France and Germany to seek ways of compelling encrypted messaging apps to open traffic to inspection. In the UK such incidents have also prompted a harsh Parliamentary report on social media companies' efforts to combat radicalization. Shadow Brokers leaked exploits continue to appear in the wild. Investigation continues, but observers begin to see the incident as part of a general attack on US official credibility. Assange promises more leaks of Clinton material. Ransomware appears in India and Vietnam. A new Android banking Trojan uses Twitter for command-and-control. Dale Drew from Level 3 Communications shares tips on setting up a SOC, and Ralph Cita explains how they make free training available at Cybrary. And Ashley Madison gets bad reports in three of the Five Eyes.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we look at ways in which terrorist incidents have motivated France and Germany to seek ways of compelling encrypted messaging apps to open traffic to inspection. In the UK such incidents have also prompted a harsh Parliamentary report on social media companies' efforts to combat radicalization. Shadow Brokers leaked exploits continue to appear in the wild. Investigation continues, but observers begin to see the incident as part of a general attack on US official credibility. Assange promises more leaks of Clinton material. Ransomware appears in India and Vietnam. A new Android banking Trojan uses Twitter for command-and-control. Dale Drew from Level 3 Communications shares tips on setting up a SOC, and Ralph Cita explains how they make free training available at Cybrary. And Ashley Madison gets bad reports in three of the Five Eyes.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>998</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[71dffbbaa9a9a61941f9158a0cadf579]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5528290334.mp3?updated=1689614042" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: "It walks, it talks, it reports back to Moscow. (Other news, too, gamers.)</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/170/notes</link>
      <description>In today's podcast we hear about Russian hackers going after New York Times reporters (the FBI is investigating). Exploits in the Shadow Brokers' teaser are "test-driven" in the wild. Some of them may affect Huawei products. The Goznym banking Trojan moves from Poland to Germany. British universities are targeted by ransomware. Researchers give victims of Wildfire ransomware some relief in the form of a decryptor. Gaming sites come under attack. We've all heard of the cloud, but Accenture's Malek Ben Salem tells about the coming fog. There's a new push to restrict encryption in the EU. And a fourth-grade steely-eyed missileman arises in Texas.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 24 Aug 2016 19:14:06 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>170</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/be271960-def8-11ea-911f-07552c94471b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: "It walks, it talks, it reports back to Moscow. (Other news, too, gamers.)</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about Russian hackers going after New York Times reporters (the FBI is investigating). Exploits in the Shadow Brokers' teaser are "test-driven" in the wild. Some of them may affect Huawei products. The Goznym banking Trojan moves from Poland to Germany. British universities are targeted by ransomware. Researchers give victims of Wildfire ransomware some relief in the form of a decryptor. Gaming sites come under attack. We've all heard of the cloud, but Accenture's Malek Ben Salem tells about the coming fog. There's a new push to restrict encryption in the EU. And a fourth-grade steely-eyed missileman arises in Texas.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about Russian hackers going after New York Times reporters (the FBI is investigating). Exploits in the Shadow Brokers' teaser are "test-driven" in the wild. Some of them may affect Huawei products. The Goznym banking Trojan moves from Poland to Germany. British universities are targeted by ransomware. Researchers give victims of Wildfire ransomware some relief in the form of a decryptor. Gaming sites come under attack. We've all heard of the cloud, but Accenture's Malek Ben Salem tells about the coming fog. There's a new push to restrict encryption in the EU. And a fourth-grade steely-eyed missileman arises in Texas.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>903</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[65769ba7dc782993cd82dd82098e5e2f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1352420319.mp3?updated=1689613997" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Shadow Brokers: zero-day hoarding (or not) and firewall exploitation.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/169/notes</link>
      <description>In today's podcast we discuss the Shadow Brokers' leaks, reviewing ongoing speculation and speaking with some experts who offer insight into the matter: Jason Healey, the principal investigator in Columbia University's study of NSA zero-day disclosure policy, and RedSeal's CEO and CTO discuss firewall security and vulnerability. Juniper joins Cisco and Fortinet in confirming that Shadow Brokers' zero-days affect its products. IoT encryption R&amp;D updates. Security start-ups attract more investment. And some thoughts on what not to say to your VC.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Aug 2016 19:18:40 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>169</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/be3d9f8c-def8-11ea-911f-8f6610e6a4a7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Shadow Brokers: zero-day hoarding (or not) and firewall exploitation.</itunes:subtitle>
      <itunes:summary>In today's podcast we discuss the Shadow Brokers' leaks, reviewing ongoing speculation and speaking with some experts who offer insight into the matter: Jason Healey, the principal investigator in Columbia University's study of NSA zero-day disclosure policy, and RedSeal's CEO and CTO discuss firewall security and vulnerability. Juniper joins Cisco and Fortinet in confirming that Shadow Brokers' zero-days affect its products. IoT encryption R&amp;D updates. Security start-ups attract more investment. And some thoughts on what not to say to your VC.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we discuss the Shadow Brokers' leaks, reviewing ongoing speculation and speaking with some experts who offer insight into the matter: Jason Healey, the principal investigator in Columbia University's study of NSA zero-day disclosure policy, and RedSeal's CEO and CTO discuss firewall security and vulnerability. Juniper joins Cisco and Fortinet in confirming that Shadow Brokers' zero-days affect its products. IoT encryption R&amp;D updates. Security start-ups attract more investment. And some thoughts on what not to say to your VC.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1002</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b7ad759706488041644af00b10ca0c45]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9924663534.mp3?updated=1689614045" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Hacking and hybrid warfare. Industry notes (including Wassenaar's next round).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/168/notes</link>
      <description>In today's podcast we continue to follow the Shadow Brokers, and we take a quick look into the shadowy world of hybrid warfare. No fresh leaks in this incident, but someone seems to be using seized Silk Road Bitcoin wallets to bid on leaked files. Election hacking worries persist, and concerns about secret ballots appear. Some users want a general strike against Tor. Point-of-sale malware and what to do about it. Industry notes. A new Wassenaar round will revisit cyber arms control next month. John Leiseboer from QuintessenseLabs addresses data redundancy and replication, and Michael Marriott from Digital Shadows tells us about the shady deer.io online market.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 22 Aug 2016 19:58:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>168</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/be52f080-def8-11ea-911f-cb77466e1eae/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Hacking and hybrid warfare. Industry notes (including Wassenaar's next round).</itunes:subtitle>
      <itunes:summary>In today's podcast we continue to follow the Shadow Brokers, and we take a quick look into the shadowy world of hybrid warfare. No fresh leaks in this incident, but someone seems to be using seized Silk Road Bitcoin wallets to bid on leaked files. Election hacking worries persist, and concerns about secret ballots appear. Some users want a general strike against Tor. Point-of-sale malware and what to do about it. Industry notes. A new Wassenaar round will revisit cyber arms control next month. John Leiseboer from QuintessenseLabs addresses data redundancy and replication, and Michael Marriott from Digital Shadows tells us about the shady deer.io online market.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we continue to follow the Shadow Brokers, and we take a quick look into the shadowy world of hybrid warfare. No fresh leaks in this incident, but someone seems to be using seized Silk Road Bitcoin wallets to bid on leaked files. Election hacking worries persist, and concerns about secret ballots appear. Some users want a general strike against Tor. Point-of-sale malware and what to do about it. Industry notes. A new Wassenaar round will revisit cyber arms control next month. John Leiseboer from QuintessenseLabs addresses data redundancy and replication, and Michael Marriott from Digital Shadows tells us about the shady deer.io online market.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>988</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[99124d88fe3050a96e19ea374a265bc3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9871983591.mp3?updated=1689613943" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Hulk smash. Pokemon smish. And more on the Shadow Brokers.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/167/notes</link>
      <description>In today's podcast, we hear about emails flooding dot gov in-boxes. A re-tooled version of Locky ransomware is out in the wild. As we look back at the week, the big news surrounds the Shadow Brokers' data dump and implausible auction—they seem to have some genuine NSA goods. The brokers themselves are thought to be either Russian spies or rogue insiders, or some mix of both. Worries about US election hacking rise. More companies are concerned about insider threats. The University of Maryland's Jonathan Katz explains how to reverse engineer encryption, and Chris Fogle from Delta Risk tells us how board members can prepare for cyber challenges. And, yes, there's another Pokémon-GO hack.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 19 Aug 2016 19:23:14 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>167</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/be6e31d8-def8-11ea-911f-831b8c5a840d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Hulk smash. Pokemon smish. And more on the Shadow Brokers.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about emails flooding dot gov in-boxes. A re-tooled version of Locky ransomware is out in the wild. As we look back at the week, the big news surrounds the Shadow Brokers' data dump and implausible auction—they seem to have some genuine NSA goods. The brokers themselves are thought to be either Russian spies or rogue insiders, or some mix of both. Worries about US election hacking rise. More companies are concerned about insider threats. The University of Maryland's Jonathan Katz explains how to reverse engineer encryption, and Chris Fogle from Delta Risk tells us how board members can prepare for cyber challenges. And, yes, there's another Pokémon-GO hack.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about emails flooding dot gov in-boxes. A re-tooled version of Locky ransomware is out in the wild. As we look back at the week, the big news surrounds the Shadow Brokers' data dump and implausible auction—they seem to have some genuine NSA goods. The brokers themselves are thought to be either Russian spies or rogue insiders, or some mix of both. Worries about US election hacking rise. More companies are concerned about insider threats. The University of Maryland's Jonathan Katz explains how to reverse engineer encryption, and Chris Fogle from Delta Risk tells us how board members can prepare for cyber challenges. And, yes, there's another Pokémon-GO hack.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1289</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a7cc0f273098a7a708774a5d1bf44774]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1950299250.mp3?updated=1608753102" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Who is Boson Spider? Legit zero-days among Shadow Brokers' leaks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/166/notes</link>
      <description>In today's podcast we hear more about the Shadow Brokers, who are confirmed to have dropped some genuine zero-days. Most observers now think there was a compromise at NSA; some suspect Russian intelligence services. North Korea is again scrutinized for SWIFT fraud. Operation Ghoul targets industrial intellectual property in thirty countries. We see continued industry churn (including some layoffs as well as M&amp;A rumors). CrowdStrike's Adam Meyers tells us about the Boson Spider gang, and Ben Yelin from the University of Maryland Center for Health and Homeland Security weighs in on the Shadow Brokers.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 18 Aug 2016 17:21:51 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>166</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/be862040-def8-11ea-911f-5bed08f197e9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Who is Boson Spider? Legit zero-days among Shadow Brokers' leaks.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear more about the Shadow Brokers, who are confirmed to have dropped some genuine zero-days. Most observers now think there was a compromise at NSA; some suspect Russian intelligence services. North Korea is again scrutinized for SWIFT fraud. Operation Ghoul targets industrial intellectual property in thirty countries. We see continued industry churn (including some layoffs as well as M&amp;A rumors). CrowdStrike's Adam Meyers tells us about the Boson Spider gang, and Ben Yelin from the University of Maryland Center for Health and Homeland Security weighs in on the Shadow Brokers.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear more about the Shadow Brokers, who are confirmed to have dropped some genuine zero-days. Most observers now think there was a compromise at NSA; some suspect Russian intelligence services. North Korea is again scrutinized for SWIFT fraud. Operation Ghoul targets industrial intellectual property in thirty countries. We see continued industry churn (including some layoffs as well as M&amp;A rumors). CrowdStrike's Adam Meyers tells us about the Boson Spider gang, and Ben Yelin from the University of Maryland Center for Health and Homeland Security weighs in on the Shadow Brokers.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>994</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aa674b538125d933f65025f722d7d90f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1919657861.mp3?updated=1689613737" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Shadow Brokers warn 'Wealthy Elite'--new cyber cold war? And cybercrooks are still out there.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/165/notes</link>
      <description>In today's podcast we follow the continuing story of the Shadow Brokers and their claims of having got their hands on Equation Group attack code (as bizarre as their story is, a lot of informed observers think the code they've posted is the real deal). Many see the Shadow Brokers incident as an escalation of a cyber cold war between Russia and the United States. More banking Trojan activity in South America. DNSSEC is exploited in DDoS attacks, and Cerber is still number one in the ransomware-as-a-service market (where Shark is a dodgy upstart). Kensington's Rob Humphrey shares the results of their recently security survey, and Johns Hopkins University's Joe Carrigan weighs in on securing your devices in the real world.  And yes, more Pokémon stuff.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 17 Aug 2016 18:23:46 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>165</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/be9c8c54-def8-11ea-911f-67726fa00c54/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Shadow Brokers warn 'Wealthy Elite'--new cyber cold war? And cybercrooks are still out there.</itunes:subtitle>
      <itunes:summary>In today's podcast we follow the continuing story of the Shadow Brokers and their claims of having got their hands on Equation Group attack code (as bizarre as their story is, a lot of informed observers think the code they've posted is the real deal). Many see the Shadow Brokers incident as an escalation of a cyber cold war between Russia and the United States. More banking Trojan activity in South America. DNSSEC is exploited in DDoS attacks, and Cerber is still number one in the ransomware-as-a-service market (where Shark is a dodgy upstart). Kensington's Rob Humphrey shares the results of their recently security survey, and Johns Hopkins University's Joe Carrigan weighs in on securing your devices in the real world.  And yes, more Pokémon stuff.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we follow the continuing story of the Shadow Brokers and their claims of having got their hands on Equation Group attack code (as bizarre as their story is, a lot of informed observers think the code they've posted is the real deal). Many see the Shadow Brokers incident as an escalation of a cyber cold war between Russia and the United States. More banking Trojan activity in South America. DNSSEC is exploited in DDoS attacks, and Cerber is still number one in the ransomware-as-a-service market (where Shark is a dodgy upstart). Kensington's Rob Humphrey shares the results of their recently security survey, and Johns Hopkins University's Joe Carrigan weighs in on securing your devices in the real world.  And yes, more Pokémon stuff.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>991</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f3b63e31a54f10d4b2027566b9c20fa9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7981908403.mp3?updated=1689613772" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: All your attack code are belong us. Guccifer 2.0 suddenly more fluent.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/164/notes</link>
      <description>In today's podcast we learn about claims made by hackers calling themselves "the Shadow Brokers." They say they've pwned the Equation Group, and obtained NSA attack code which they're now selling for one million Bitcoin. Guccifer 2.0 gets a lot more polished and even leakier. A bogus QuadRooter patch is serving malware in Google's Play Store. Fidelis tells us about Vawtrak's evolution. Someone's watching the Veracrypt audit. Iran looks into possible cyber causes of oil-and-gas facility fires. Fake Pokémon installers have trainers choosing ransomware. No more Pokéstops allowed in Germany's Flughafen. Vikram Sharma from Quintessence Labs outlines the challenges and opportunities of combining cutting edge science with market realities. Hardik Modi from Fidelis Cybersecurity expains changes they're tracking in the Vawtrak banking trojan. And British lawyers get a license to hunt hackers. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Aug 2016 18:55:44 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>164</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/beb5a900-def8-11ea-911f-0feb1c20ed9a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: All your attack code are belong us. Guccifer 2.0 suddenly more fluent.</itunes:subtitle>
      <itunes:summary>In today's podcast we learn about claims made by hackers calling themselves "the Shadow Brokers." They say they've pwned the Equation Group, and obtained NSA attack code which they're now selling for one million Bitcoin. Guccifer 2.0 gets a lot more polished and even leakier. A bogus QuadRooter patch is serving malware in Google's Play Store. Fidelis tells us about Vawtrak's evolution. Someone's watching the Veracrypt audit. Iran looks into possible cyber causes of oil-and-gas facility fires. Fake Pokémon installers have trainers choosing ransomware. No more Pokéstops allowed in Germany's Flughafen. Vikram Sharma from Quintessence Labs outlines the challenges and opportunities of combining cutting edge science with market realities. Hardik Modi from Fidelis Cybersecurity expains changes they're tracking in the Vawtrak banking trojan. And British lawyers get a license to hunt hackers. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we learn about claims made by hackers calling themselves "the Shadow Brokers." They say they've pwned the Equation Group, and obtained NSA attack code which they're now selling for one million Bitcoin. Guccifer 2.0 gets a lot more polished and even leakier. A bogus QuadRooter patch is serving malware in Google's Play Store. Fidelis tells us about Vawtrak's evolution. Someone's watching the Veracrypt audit. Iran looks into possible cyber causes of oil-and-gas facility fires. Fake Pokémon installers have trainers choosing ransomware. No more Pokéstops allowed in Germany's Flughafen. Vikram Sharma from Quintessence Labs outlines the challenges and opportunities of combining cutting edge science with market realities. Hardik Modi from Fidelis Cybersecurity expains changes they're tracking in the Vawtrak banking trojan. And British lawyers get a license to hunt hackers. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>984</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[222a2620243539efa3fe564ce2a32702]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3602911698.mp3?updated=1689613614" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Cryptocoin for DDoS? ISIS info ops more murderous as territory shrinks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/163/notes</link>
      <description>In today's podcast we learn that Russian hackers went after Republicans as well as Democrats. An anti-doping whistleblower's account is illegally compromised. ISIS turns to online inspiration to recover jihadist mindshare. The MICROS point-of-sale system hack appears to underlie widespread credit card compromises. Secure Boot's "golden key" exposure is seen as a warning against backdoors. Security industry M &amp;A and IPO notes. Level 3 Communications' Dale Drew tells us about machine-to-machine learning, and how it may improve security. And for some reason researchers develop a proof-of-concept for a DDoS-based cryptocurrency.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 15 Aug 2016 20:43:43 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>163</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/becbb204-def8-11ea-911f-53af467f9542/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Cryptocoin for DDoS? ISIS info ops more murderous as territory shrinks.</itunes:subtitle>
      <itunes:summary>In today's podcast we learn that Russian hackers went after Republicans as well as Democrats. An anti-doping whistleblower's account is illegally compromised. ISIS turns to online inspiration to recover jihadist mindshare. The MICROS point-of-sale system hack appears to underlie widespread credit card compromises. Secure Boot's "golden key" exposure is seen as a warning against backdoors. Security industry M &amp;A and IPO notes. Level 3 Communications' Dale Drew tells us about machine-to-machine learning, and how it may improve security. And for some reason researchers develop a proof-of-concept for a DDoS-based cryptocurrency.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we learn that Russian hackers went after Republicans as well as Democrats. An anti-doping whistleblower's account is illegally compromised. ISIS turns to online inspiration to recover jihadist mindshare. The MICROS point-of-sale system hack appears to underlie widespread credit card compromises. Secure Boot's "golden key" exposure is seen as a warning against backdoors. Security industry M &amp;A and IPO notes. Level 3 Communications' Dale Drew tells us about machine-to-machine learning, and how it may improve security. And for some reason researchers develop a proof-of-concept for a DDoS-based cryptocurrency.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>850</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e0b761ec290f3b4c7e63d9ad12e4a95d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4810529604.mp3?updated=1689613597" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: FBI has "high confidence" Russians hacked DNC. Olympic hacks, cyber vigilantes, criminal markets.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/162/notes</link>
      <description>In today's podcast we learn that the US Intelligence Community discovered the DNC hack sometime last year—much earlier than its public disclosure this Spring. We hear about threats to critical infrastructure, and we follow developments in the cyber criminal markets—ransomware's getting mighty picky, if you ask us. We hear about ISIS's appeal to disaffected petty criminals. The Olympics see both cybercrime and patriotic hacktivism. Quintessence Labs' John Leiseboer discusses redundancy and replication of data, and we interview Robert M. Lee from Dragos Security about ICS SCADA security, and preparing for cyber security jobs. And, of course, we hear more about how Pokémon-GO is driving security people quite nuts.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 12 Aug 2016 20:44:51 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>162</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/beee1344-def8-11ea-911f-532f8f221307/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: FBI has "high confidence" Russians hacked DNC. Olympic hacks, cyber vigilantes, criminal markets.</itunes:subtitle>
      <itunes:summary>In today's podcast we learn that the US Intelligence Community discovered the DNC hack sometime last year—much earlier than its public disclosure this Spring. We hear about threats to critical infrastructure, and we follow developments in the cyber criminal markets—ransomware's getting mighty picky, if you ask us. We hear about ISIS's appeal to disaffected petty criminals. The Olympics see both cybercrime and patriotic hacktivism. Quintessence Labs' John Leiseboer discusses redundancy and replication of data, and we interview Robert M. Lee from Dragos Security about ICS SCADA security, and preparing for cyber security jobs. And, of course, we hear more about how Pokémon-GO is driving security people quite nuts.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we learn that the US Intelligence Community discovered the DNC hack sometime last year—much earlier than its public disclosure this Spring. We hear about threats to critical infrastructure, and we follow developments in the cyber criminal markets—ransomware's getting mighty picky, if you ask us. We hear about ISIS's appeal to disaffected petty criminals. The Olympics see both cybercrime and patriotic hacktivism. Quintessence Labs' John Leiseboer discusses redundancy and replication of data, and we interview Robert M. Lee from Dragos Security about ICS SCADA security, and preparing for cyber security jobs. And, of course, we hear more about how Pokémon-GO is driving security people quite nuts.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1291</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[adba3e10e218d1b98bdcb720c0a36ce2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4240199758.mp3?updated=1608753103" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Info ops as battlespace prep. It's hard to count Australians.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/161/notes</link>
      <description>In today's podcast, we hear about cyber and information operations in Eastern Europe that look disturbingly like battlespace preparation. The FBI finds that the scope of the Democratic Party hacks is much greater than initially believed. The Bureau seems ready to ask for more authority to unlock devices, but opponents point to Microsoft's inadvertent leak of Secure Boot keys as an object lesson in why that's a bad idea. USENIX proofs-of-concept include Linux and car-hacking exploits. Samsung Pay is criticized as vulnerable to token skimming. Senior Law Analyst Ben Yelin outlines the FBI's request to expand the reach of National Security Letters. Deputy Director Rick Lipsey explains the mission of the ISAO Standards Organization. New ransomware features disappearing extortion emails. And how do you solve a problem like Pokémon-GO?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 11 Aug 2016 20:44:03 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>161</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bf0446b4-def8-11ea-911f-4733f4a2efc0/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Info ops as battlespace prep. It's hard to count Australians.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about cyber and information operations in Eastern Europe that look disturbingly like battlespace preparation. The FBI finds that the scope of the Democratic Party hacks is much greater than initially believed. The Bureau seems ready to ask for more authority to unlock devices, but opponents point to Microsoft's inadvertent leak of Secure Boot keys as an object lesson in why that's a bad idea. USENIX proofs-of-concept include Linux and car-hacking exploits. Samsung Pay is criticized as vulnerable to token skimming. Senior Law Analyst Ben Yelin outlines the FBI's request to expand the reach of National Security Letters. Deputy Director Rick Lipsey explains the mission of the ISAO Standards Organization. New ransomware features disappearing extortion emails. And how do you solve a problem like Pokémon-GO?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about cyber and information operations in Eastern Europe that look disturbingly like battlespace preparation. The FBI finds that the scope of the Democratic Party hacks is much greater than initially believed. The Bureau seems ready to ask for more authority to unlock devices, but opponents point to Microsoft's inadvertent leak of Secure Boot keys as an object lesson in why that's a bad idea. USENIX proofs-of-concept include Linux and car-hacking exploits. Samsung Pay is criticized as vulnerable to token skimming. Senior Law Analyst Ben Yelin outlines the FBI's request to expand the reach of National Security Letters. Deputy Director Rick Lipsey explains the mission of the ISAO Standards Organization. New ransomware features disappearing extortion emails. And how do you solve a problem like Pokémon-GO?</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1000</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[25437fdaa7be5bce866dc2cd84f40198]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5830208348.mp3?updated=1689613437" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Australia's census clogged. Iran ups its offense? Ransomware and file deletion.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/160/notes</link>
      <description>In today’s podcast we follow developments in nation-state hacking, from Hainan to Tehran. Australia’s online census is taken offline—the Bureau of Statistics cries DDoS, but observers aren’t so sure. A new strain of ransomware under development in the underworld skips encryption and goes straight for deletion. Issues with Oracle’s MICROS point-of-sale systems may be the root cause of recent store and hotel breaches. Google says, thanks Check Point, we appreciate it, but most of QuadRooter has already been mitigated (they’re working on the rest of it). Joe Carrigan from Johns Hopkins University warns us about side-loading Android apps, and Leemon Baird from Swirld describes a new trust-based peer to peer software platform. And we note that yesterday was Patch Tuesday.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 10 Aug 2016 19:37:19 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>160</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bf1bf57a-def8-11ea-911f-c729a6ba4247/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Australia's census clogged. Iran ups its offense? Ransomware and file deletion.</itunes:subtitle>
      <itunes:summary>In today’s podcast we follow developments in nation-state hacking, from Hainan to Tehran. Australia’s online census is taken offline—the Bureau of Statistics cries DDoS, but observers aren’t so sure. A new strain of ransomware under development in the underworld skips encryption and goes straight for deletion. Issues with Oracle’s MICROS point-of-sale systems may be the root cause of recent store and hotel breaches. Google says, thanks Check Point, we appreciate it, but most of QuadRooter has already been mitigated (they’re working on the rest of it). Joe Carrigan from Johns Hopkins University warns us about side-loading Android apps, and Leemon Baird from Swirld describes a new trust-based peer to peer software platform. And we note that yesterday was Patch Tuesday.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we follow developments in nation-state hacking, from Hainan to Tehran. Australia’s online census is taken offline—the Bureau of Statistics cries DDoS, but observers aren’t so sure. A new strain of ransomware under development in the underworld skips encryption and goes straight for deletion. Issues with Oracle’s MICROS point-of-sale systems may be the root cause of recent store and hotel breaches. Google says, thanks Check Point, we appreciate it, but most of QuadRooter has already been mitigated (they’re working on the rest of it). Joe Carrigan from Johns Hopkins University warns us about side-loading Android apps, and Leemon Baird from Swirld describes a new trust-based peer to peer software platform. And we note that yesterday was Patch Tuesday.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>982</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dd6f9871de382a990a4575179d94857c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1058319676.mp3?updated=1689613411" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: A look back at Vegas. Rio's rogue Wi-Fi. Cyberwar &amp; actual war.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/159/notes</link>
      <description>In today’s podcast we look at an APT group that’s been active since 2011. We hear about the Quadrooter Android vulnerability. We take a look back at Black Hat, and look for some sensible perspective on cyber risk. We also read some discussion of the differences between espionage, crime, and warfare. The US Marshalls will auction SilkRoad’s forfeited Bitcoin later this month. Dr. Charles Clancy from Virginia Tech's Hume Center tell us what to expect from 5G cellular technology. And yes, there’s more Pokémon-themed malware in the Play Store.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Aug 2016 19:36:58 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>159</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bf35fdc6-def8-11ea-911f-bb0ea1da1b95/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: A look back at Vegas. Rio's rogue Wi-Fi. Cyberwar &amp; actual war.</itunes:subtitle>
      <itunes:summary>In today’s podcast we look at an APT group that’s been active since 2011. We hear about the Quadrooter Android vulnerability. We take a look back at Black Hat, and look for some sensible perspective on cyber risk. We also read some discussion of the differences between espionage, crime, and warfare. The US Marshalls will auction SilkRoad’s forfeited Bitcoin later this month. Dr. Charles Clancy from Virginia Tech's Hume Center tell us what to expect from 5G cellular technology. And yes, there’s more Pokémon-themed malware in the Play Store.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we look at an APT group that’s been active since 2011. We hear about the Quadrooter Android vulnerability. We take a look back at Black Hat, and look for some sensible perspective on cyber risk. We also read some discussion of the differences between espionage, crime, and warfare. The US Marshalls will auction SilkRoad’s forfeited Bitcoin later this month. Dr. Charles Clancy from Virginia Tech's Hume Center tell us what to expect from 5G cellular technology. And yes, there’s more Pokémon-themed malware in the Play Store.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>939</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0bc56cfdeb2af9ff7fb11d17adb263fe]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2640648004.mp3?updated=1689602925" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Black Hat, Part 2 - Trends and Insights from Industry Leaders [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/7/notes</link>
      <description>The 2016 Black Hat conference is in the books, and we wrap up our coverage with more insights from industry leaders on what trends they’re seeing, and where they think the industry is headed.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 09 Aug 2016 17:51:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>7</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0ac2a6d6-df03-11ea-83d6-07414eadcfa7/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Black Hat, Part 2 - Trends and Insights from Industry Leaders</itunes:subtitle>
      <itunes:summary>The 2016 Black Hat conference is in the books, and we wrap up our coverage with more insights from industry leaders on what trends they’re seeing, and where they think the industry is headed.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The 2016 Black Hat conference is in the books, and we wrap up our coverage with more insights from industry leaders on what trends they’re seeing, and where they think the industry is headed.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1090</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4c16a85f4d4c2d24c99bf203298481e3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2946239577.mp3?updated=1656707745" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: DARPA CTF: Mayhem (win), Xandra (place), Mechphish (show). Blame it on Rio.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/158/notes</link>
      <description>In today’s podcast we hear about Bifinex’s recovery from its recent heist and the possibly temporary haircut its depositors got. We also follow the related Ethereum hard fork. News on Olympic hacks and risks of hacking from Booz Allen Hamilton's Brad Medairy and Grey Burkhart. Trustwave reports home smart thermostat bugs. Checkpoint discloses Qualcomm Android Quadrooter firmware vulnerabilities. More signs that Fancy Bear was prancing through the DNC. A look back at Black Hat, and notes on DARPA’s AI capture-the-flag challenge. Jonathan Katz explains the Etherium fork.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 08 Aug 2016 21:05:28 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>158</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bf49c716-def8-11ea-911f-e7ddf3129e2b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: DARPA CTF: Mayhem (win), Xandra (place), Mechphish (show). Blame it on Rio.</itunes:subtitle>
      <itunes:summary>In today’s podcast we hear about Bifinex’s recovery from its recent heist and the possibly temporary haircut its depositors got. We also follow the related Ethereum hard fork. News on Olympic hacks and risks of hacking from Booz Allen Hamilton's Brad Medairy and Grey Burkhart. Trustwave reports home smart thermostat bugs. Checkpoint discloses Qualcomm Android Quadrooter firmware vulnerabilities. More signs that Fancy Bear was prancing through the DNC. A look back at Black Hat, and notes on DARPA’s AI capture-the-flag challenge. Jonathan Katz explains the Etherium fork.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear about Bifinex’s recovery from its recent heist and the possibly temporary haircut its depositors got. We also follow the related Ethereum hard fork. News on Olympic hacks and risks of hacking from Booz Allen Hamilton's Brad Medairy and Grey Burkhart. Trustwave reports home smart thermostat bugs. Checkpoint discloses Qualcomm Android Quadrooter firmware vulnerabilities. More signs that Fancy Bear was prancing through the DNC. A look back at Black Hat, and notes on DARPA’s AI capture-the-flag challenge. Jonathan Katz explains the Etherium fork.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>992</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5479df406bda4c6dff9cc28816a2929f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4379723719.mp3?updated=1689613245" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Election hacking, layoff rumors, the unbearable lightness of Pokemon.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/157/notes</link>
      <description>In today’s podcast we look at Black Hat and draw some consensus advice for start-ups. Cyber espionage rises around the South China Sea. Apparent Russian hacking continues to worry election officials and voters in the US. The HEIST exploit is demonstrated. ISIS jockeys with al Qaeda, Boko Haram factions for jihad leadership. Brazil works on cybercrime as the Olympics open tonight. Apple announces a bug bounty. Cyber companies are said to be preparing layoffs. Accenture Technology Labs' Malek Ben Salem explains software based networking. Galina Datskovsky from Vaporstream outlines the security concerns with voice activated devices.  And companies work to keep Pokemon out of places they shouldn’t go.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 05 Aug 2016 19:09:51 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>157</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bf8f2342-def8-11ea-911f-4bb461473f39/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Election hacking, layoff rumors, the unbearable lightness of Pokemon.</itunes:subtitle>
      <itunes:summary>In today’s podcast we look at Black Hat and draw some consensus advice for start-ups. Cyber espionage rises around the South China Sea. Apparent Russian hacking continues to worry election officials and voters in the US. The HEIST exploit is demonstrated. ISIS jockeys with al Qaeda, Boko Haram factions for jihad leadership. Brazil works on cybercrime as the Olympics open tonight. Apple announces a bug bounty. Cyber companies are said to be preparing layoffs. Accenture Technology Labs' Malek Ben Salem explains software based networking. Galina Datskovsky from Vaporstream outlines the security concerns with voice activated devices.  And companies work to keep Pokemon out of places they shouldn’t go.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we look at Black Hat and draw some consensus advice for start-ups. Cyber espionage rises around the South China Sea. Apparent Russian hacking continues to worry election officials and voters in the US. The HEIST exploit is demonstrated. ISIS jockeys with al Qaeda, Boko Haram factions for jihad leadership. Brazil works on cybercrime as the Olympics open tonight. Apple announces a bug bounty. Cyber companies are said to be preparing layoffs. Accenture Technology Labs' Malek Ben Salem explains software based networking. Galina Datskovsky from Vaporstream outlines the security concerns with voice activated devices.  And companies work to keep Pokemon out of places they shouldn’t go.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1218</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a848cfd680adf97458d76a8d5251ca68]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5444355212.mp3?updated=1608753087" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Black Hat - Cyber Security Trends and Investment [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/6/notes</link>
      <description>The 2016 Black Hat conference is underway in Las Vegas this week, and in this special report from the show floor we’ll hear from industry leaders about industry trends, and from venture capital funders about what they need to see before saying yes, and why it’s harder to get startup funding than it used to be.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 04 Aug 2016 21:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>6</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/0843d948-df03-11ea-83fc-6350713c9e7e/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Black Hat - Cyber Security Trends and Investment </itunes:subtitle>
      <itunes:summary>The 2016 Black Hat conference is underway in Las Vegas this week, and in this special report from the show floor we’ll hear from industry leaders about industry trends, and from venture capital funders about what they need to see before saying yes, and why it’s harder to get startup funding than it used to be.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The 2016 Black Hat conference is underway in Las Vegas this week, and in this special report from the show floor we’ll hear from industry leaders about industry trends, and from venture capital funders about what they need to see before saying yes, and why it’s harder to get startup funding than it used to be.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1800</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[befb11c8b30f9712c3c05dffa2fff42f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7098808054.mp3?updated=1656707804" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Black Hat, of course. US election concerns, and more jihadist info ops.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/156/notes</link>
      <description>In today’s podcast, we get some updates from Black Hat. DNC hacks raise questions about US voting security, and Democratic Senators call for hearings on Donald Trump’s request that Russia find the 30,000 emails deleted from Hillary Clinton’s State-Department-era homebrew server. China seems to be probing Philippine networks in conjunction with the dispute over territorial waters in the South China SeaMore signs that Telegram is leaky. Updates on ISIS and its competitors’ information operations. The Gozi banking Trojan is headed for US targets. Bitfinex is looted of tens of millions in Bitcoin. The Real Deal criminal market’s boss is missing. Vikram Sharma from Quintessence Labs shares lessons learned about entrepreneurial course correction. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 04 Aug 2016 19:42:43 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>156</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bfa93e08-def8-11ea-911f-9f8c606c1a51/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Black Hat, of course. US election concerns, and more jihadist info ops.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we get some updates from Black Hat. DNC hacks raise questions about US voting security, and Democratic Senators call for hearings on Donald Trump’s request that Russia find the 30,000 emails deleted from Hillary Clinton’s State-Department-era homebrew server. China seems to be probing Philippine networks in conjunction with the dispute over territorial waters in the South China SeaMore signs that Telegram is leaky. Updates on ISIS and its competitors’ information operations. The Gozi banking Trojan is headed for US targets. Bitfinex is looted of tens of millions in Bitcoin. The Real Deal criminal market’s boss is missing. Vikram Sharma from Quintessence Labs shares lessons learned about entrepreneurial course correction. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we get some updates from Black Hat. DNC hacks raise questions about US voting security, and Democratic Senators call for hearings on Donald Trump’s request that Russia find the 30,000 emails deleted from Hillary Clinton’s State-Department-era homebrew server. China seems to be probing Philippine networks in conjunction with the dispute over territorial waters in the South China SeaMore signs that Telegram is leaky. Updates on ISIS and its competitors’ information operations. The Gozi banking Trojan is headed for US targets. Bitfinex is looted of tens of millions in Bitcoin. The Real Deal criminal market’s boss is missing. Vikram Sharma from Quintessence Labs shares lessons learned about entrepreneurial course correction. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>917</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[790f68c9a43406d9235f094f9bc90ad1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9438421339.mp3?updated=1689613194" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Black Hat USA, Android upgrades, and mind control (maybe).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/155/notes</link>
      <description>In today’s podcast we follow the latest fallout from the DNC hacks (Russia’s still the prime suspect). Fears of election hacking rise in the US. Government electronic surveillance rises worldwide, driven in part by increasing fear of jihadist terrorism. ISIS unit “Emni” is said to have broad responsibility for recruiting and organizing terror cells. Android security upgrades from Johns Hopkins University expert Joe Carrigan. TripWire's Dwayne Melancon explains spearphishing. A quick look over at Black Hat USA. And some observers think Pokemon-GO is a mind control tool. (We don’t, except insofar as any popular mania amounts to mind-control.)
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 03 Aug 2016 19:33:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>155</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bfc477fe-def8-11ea-911f-27f8644c2a6b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Black Hat USA, Android upgrades, and mind control (maybe).</itunes:subtitle>
      <itunes:summary>In today’s podcast we follow the latest fallout from the DNC hacks (Russia’s still the prime suspect). Fears of election hacking rise in the US. Government electronic surveillance rises worldwide, driven in part by increasing fear of jihadist terrorism. ISIS unit “Emni” is said to have broad responsibility for recruiting and organizing terror cells. Android security upgrades from Johns Hopkins University expert Joe Carrigan. TripWire's Dwayne Melancon explains spearphishing. A quick look over at Black Hat USA. And some observers think Pokemon-GO is a mind control tool. (We don’t, except insofar as any popular mania amounts to mind-control.)
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we follow the latest fallout from the DNC hacks (Russia’s still the prime suspect). Fears of election hacking rise in the US. Government electronic surveillance rises worldwide, driven in part by increasing fear of jihadist terrorism. ISIS unit “Emni” is said to have broad responsibility for recruiting and organizing terror cells. Android security upgrades from Johns Hopkins University expert Joe Carrigan. TripWire's Dwayne Melancon explains spearphishing. A quick look over at Black Hat USA. And some observers think Pokemon-GO is a mind control tool. (We don’t, except insofar as any popular mania amounts to mind-control.)</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1001</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5653a459dffdc5df1ab9ea6b4c45ed80]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7830940356.mp3?updated=1689613179" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: US, Russia trading hacks in cyberspace? Brazilian cybercrime ramps up.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/154/notes</link>
      <description>In today’s podcast we give a short update on Black Hat before turning to developments in Syria and Iran. Tension between the US and Russia mounts over alleged Russian hacks of US political campaign networks and more recently alleged US spyware operations in Russian enterprises. ISIS wishes to disrupt the Olympics, and cybercriminals are seeking to profit from the Rio Games. Adware uses steganography, and INTERPOL takes down a Nigerian online scam. Ben Yelin explains a recent court ruling in Microsoft's favor that deals with offshore data privacy, and Sameer Dixit from Spirent outlines emerging threats patterns. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Aug 2016 18:02:15 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>154</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bfd71526-def8-11ea-911f-bfaa38335a23/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: US, Russia trading hacks in cyberspace? Brazilian cybercrime ramps up.</itunes:subtitle>
      <itunes:summary>In today’s podcast we give a short update on Black Hat before turning to developments in Syria and Iran. Tension between the US and Russia mounts over alleged Russian hacks of US political campaign networks and more recently alleged US spyware operations in Russian enterprises. ISIS wishes to disrupt the Olympics, and cybercriminals are seeking to profit from the Rio Games. Adware uses steganography, and INTERPOL takes down a Nigerian online scam. Ben Yelin explains a recent court ruling in Microsoft's favor that deals with offshore data privacy, and Sameer Dixit from Spirent outlines emerging threats patterns. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we give a short update on Black Hat before turning to developments in Syria and Iran. Tension between the US and Russia mounts over alleged Russian hacks of US political campaign networks and more recently alleged US spyware operations in Russian enterprises. ISIS wishes to disrupt the Olympics, and cybercriminals are seeking to profit from the Rio Games. Adware uses steganography, and INTERPOL takes down a Nigerian online scam. Ben Yelin explains a recent court ruling in Microsoft's favor that deals with offshore data privacy, and Sameer Dixit from Spirent outlines emerging threats patterns. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>990</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d30d6bb875db378427cc54baa71e9504]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7659401214.mp3?updated=1689613165" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Election, infrastructure hacks in US, Russia. Advice on Black Hat.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/153/notes</link>
      <description>In today’s podcast we hear about Russian reports of an APT active against military, scientific, defense, and government networks. US investigations into the hacks of the DNC, DCCC, and Clinton campaign continue, with suspicion still directed at Russia. ISIS calls online for an extension of jihad to Russia. The SpyNote Android Trojan is out in the criminal underground. Researchers report vulnerabilities associated with WhatsApp and SwiftKey. And we share some security advice from Level 3's Dale Drew for those attending Black Hat.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 01 Aug 2016 19:16:09 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>153</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bfec126e-def8-11ea-911f-2bf89b536cf3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Election, infrastructure hacks in US, Russia. Advice on Black Hat.</itunes:subtitle>
      <itunes:summary>In today’s podcast we hear about Russian reports of an APT active against military, scientific, defense, and government networks. US investigations into the hacks of the DNC, DCCC, and Clinton campaign continue, with suspicion still directed at Russia. ISIS calls online for an extension of jihad to Russia. The SpyNote Android Trojan is out in the criminal underground. Researchers report vulnerabilities associated with WhatsApp and SwiftKey. And we share some security advice from Level 3's Dale Drew for those attending Black Hat.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear about Russian reports of an APT active against military, scientific, defense, and government networks. US investigations into the hacks of the DNC, DCCC, and Clinton campaign continue, with suspicion still directed at Russia. ISIS calls online for an extension of jihad to Russia. The SpyNote Android Trojan is out in the criminal underground. Researchers report vulnerabilities associated with WhatsApp and SwiftKey. And we share some security advice from Level 3's Dale Drew for those attending Black Hat.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>883</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[55f9bdedf0f68823f375190c4a5dca2c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7734851692.mp3?updated=1689612806" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: US sifts ISIS recruiting files. Black market economics. Should leakers curate?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/152/notes</link>
      <description>In today’s podcast we hear some preliminary news about ISIS information operations as expressed in captured files. Hacktivists experience remorse and debate doxing ethics. We review the speculation about the DNC hack and note that another Democratic Party campaign organization may also have been compromised. State-sponsored hacking is driving enterprises to seek help from security companies. The University of Maryland's Jonathan Katz tells us about post-quantum encryption, and  Daniel Ennis, former NTOC Director at NSA and currently Executive Director of the University of Maryland Global initiative on Cyber, shares his thoughts on his time with the agency, and the need for cooperation in cybersecurity by government, universities, and industry. Pokémon trainers are still going where they shouldn’t.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 29 Jul 2016 18:25:42 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>152</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/bffbb084-def8-11ea-911f-d3e64e33ac17/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: US sifts ISIS recruiting files. Black market economics. Should leakers curate?</itunes:subtitle>
      <itunes:summary>In today’s podcast we hear some preliminary news about ISIS information operations as expressed in captured files. Hacktivists experience remorse and debate doxing ethics. We review the speculation about the DNC hack and note that another Democratic Party campaign organization may also have been compromised. State-sponsored hacking is driving enterprises to seek help from security companies. The University of Maryland's Jonathan Katz tells us about post-quantum encryption, and  Daniel Ennis, former NTOC Director at NSA and currently Executive Director of the University of Maryland Global initiative on Cyber, shares his thoughts on his time with the agency, and the need for cooperation in cybersecurity by government, universities, and industry. Pokémon trainers are still going where they shouldn’t.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear some preliminary news about ISIS information operations as expressed in captured files. Hacktivists experience remorse and debate doxing ethics. We review the speculation about the DNC hack and note that another Democratic Party campaign organization may also have been compromised. State-sponsored hacking is driving enterprises to seek help from security companies. The University of Maryland's Jonathan Katz tells us about post-quantum encryption, and  Daniel Ennis, former NTOC Director at NSA and currently Executive Director of the University of Maryland Global initiative on Cyber, shares his thoughts on his time with the agency, and the need for cooperation in cybersecurity by government, universities, and industry. Pokémon trainers are still going where they shouldn’t.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1295</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c75d030d999063fc0c1f143b096c5aa7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8006523062.mp3?updated=1608753111" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: ISIS doubles down on info ops. Window shopping in crimeware souks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/151/notes</link>
      <description>In today’s podcast we hear about how ISIS continues to pursue its strategy of using information operations to inspire lone wolves, and what investigators in France, Germany, and the United States are seeing as they look at jihadist social media. We learn about advances in facial recognition software. WikiLeaks releases audio files culled from DNC email hacks. More releases are expected, and evidence continues to point (circumstantially but substantially) toward Russian services as the hackers. Trump suggests Russian intelligence would do everyone a favor if it releases the 30,000 deleted Clinton emails many think the Russians have. Gigamon's Shezad Merchant tells us all about metadata, and Marcus Rauschecker explains the privacy implications of facial recognition software. We take a stroll through the crimeware souk (just looking, thanks).
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 28 Jul 2016 19:14:19 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>151</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c0269c22-def8-11ea-911f-07c13c725274/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: ISIS doubles down on info ops. Window shopping in crimeware souks.</itunes:subtitle>
      <itunes:summary>In today’s podcast we hear about how ISIS continues to pursue its strategy of using information operations to inspire lone wolves, and what investigators in France, Germany, and the United States are seeing as they look at jihadist social media. We learn about advances in facial recognition software. WikiLeaks releases audio files culled from DNC email hacks. More releases are expected, and evidence continues to point (circumstantially but substantially) toward Russian services as the hackers. Trump suggests Russian intelligence would do everyone a favor if it releases the 30,000 deleted Clinton emails many think the Russians have. Gigamon's Shezad Merchant tells us all about metadata, and Marcus Rauschecker explains the privacy implications of facial recognition software. We take a stroll through the crimeware souk (just looking, thanks).
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear about how ISIS continues to pursue its strategy of using information operations to inspire lone wolves, and what investigators in France, Germany, and the United States are seeing as they look at jihadist social media. We learn about advances in facial recognition software. WikiLeaks releases audio files culled from DNC email hacks. More releases are expected, and evidence continues to point (circumstantially but substantially) toward Russian services as the hackers. Trump suggests Russian intelligence would do everyone a favor if it releases the 30,000 deleted Clinton emails many think the Russians have. Gigamon's Shezad Merchant tells us all about metadata, and Marcus Rauschecker explains the privacy implications of facial recognition software. We take a stroll through the crimeware souk (just looking, thanks).</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>995</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[39718056ac5e724bbfdd48d5bffbd9ad]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9734054354.mp3?updated=1689612031" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: DNC hacks, encryption, IoT hacks, and Pokémon.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/150/notes</link>
      <description>In today’s podcast we discuss ISIS terror and online inspiration. We learn that experts are reaching consensus that Russia hacked the US Democratic National Committee, and we hear some steps that might be taken to protect email. We speak with the company that provided cyber security for the Republican National Convention. New vulnerabilities are discovered in wireless keyboards and smart lightbulbs. Ransomware persists, and the numner of DDoS attacks seems to be spiking, recently. The White House issues PPD-41, “Cyber Incident Coordination.” Level 3's Dale Drew speaks to the uptick in DDoS attacks, and Vince Crisler from Dark Cubed shares his experiences protection the RNC national convention from cyber threats.  And people are still catching Pokémon in places they shouldn’t.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 27 Jul 2016 17:44:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>150</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c0389dc8-def8-11ea-911f-d302e2dc2895/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: DNC hacks, encryption, IoT hacks, and Pokémon.</itunes:subtitle>
      <itunes:summary>In today’s podcast we discuss ISIS terror and online inspiration. We learn that experts are reaching consensus that Russia hacked the US Democratic National Committee, and we hear some steps that might be taken to protect email. We speak with the company that provided cyber security for the Republican National Convention. New vulnerabilities are discovered in wireless keyboards and smart lightbulbs. Ransomware persists, and the numner of DDoS attacks seems to be spiking, recently. The White House issues PPD-41, “Cyber Incident Coordination.” Level 3's Dale Drew speaks to the uptick in DDoS attacks, and Vince Crisler from Dark Cubed shares his experiences protection the RNC national convention from cyber threats.  And people are still catching Pokémon in places they shouldn’t.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we discuss ISIS terror and online inspiration. We learn that experts are reaching consensus that Russia hacked the US Democratic National Committee, and we hear some steps that might be taken to protect email. We speak with the company that provided cyber security for the Republican National Convention. New vulnerabilities are discovered in wireless keyboards and smart lightbulbs. Ransomware persists, and the numner of DDoS attacks seems to be spiking, recently. The White House issues PPD-41, “Cyber Incident Coordination.” Level 3's Dale Drew speaks to the uptick in DDoS attacks, and Vince Crisler from Dark Cubed shares his experiences protection the RNC national convention from cyber threats.  And people are still catching Pokémon in places they shouldn’t.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>970</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4a748c9d7278e67cb3bd7d7b3ff9bbd0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4935818200.mp3?updated=1689612061" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Russians interested in US elections? Russia says nyet, but DNC says da.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/149/notes</link>
      <description>In today’s podcast we catch up on the big story in cyberspace—the expanding scope of the Democratic National Committee email hack. Most observers continue to see a Russian hand behind it, but some point out that the evidence remains circumstantial. Experts see the hack as a cautionary tale in the importance of authentication and encryption. Stu Sjouwerman is the founder and CEO of KnowBe4, and he provides his take on the possible Russian hack. ISIS continues its attempts online to inspire lone-wolf jihadists. A young cyber start-up emerges from stealth, and we get an update on cybersecurity in the automobile industry from CyberWire editor John Petrik.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Jul 2016 20:10:31 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>149</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c04e014a-def8-11ea-911f-d70a07844008/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Russians interested in US elections? Russia says nyet, but DNC says da.</itunes:subtitle>
      <itunes:summary>In today’s podcast we catch up on the big story in cyberspace—the expanding scope of the Democratic National Committee email hack. Most observers continue to see a Russian hand behind it, but some point out that the evidence remains circumstantial. Experts see the hack as a cautionary tale in the importance of authentication and encryption. Stu Sjouwerman is the founder and CEO of KnowBe4, and he provides his take on the possible Russian hack. ISIS continues its attempts online to inspire lone-wolf jihadists. A young cyber start-up emerges from stealth, and we get an update on cybersecurity in the automobile industry from CyberWire editor John Petrik.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we catch up on the big story in cyberspace—the expanding scope of the Democratic National Committee email hack. Most observers continue to see a Russian hand behind it, but some point out that the evidence remains circumstantial. Experts see the hack as a cautionary tale in the importance of authentication and encryption. Stu Sjouwerman is the founder and CEO of <a href="http://www.knowbe4.com/">KnowBe4</a>, and he provides his take on the possible Russian hack. ISIS continues its attempts online to inspire lone-wolf jihadists. A young cyber start-up emerges from stealth, and we get an update on cybersecurity in the automobile industry from CyberWire editor John Petrik.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1000</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b9aeed0b61d373b03c20c4a32adeac74]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6938119920.mp3?updated=1689611937" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: ISIS, al Qaeda compete online. WikiLeaks doxes DNC (courtesy FSB, GRU).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/148/notes</link>
      <description>In today’s podcast we take a look at the doxing of the DNC, a story which will have, as they say, “legs,” if only because essentially everyone now sees Russian intelligence behind the hack. ISIS and al Qaeda continue their competition to inspire lone-wolf jihad. Turkey’s crackdown on would-be putschists continues. Anonymous goes after targets in Turkey. Cyber M&amp;A notes. Dr. Charles Clancy from the Hume Center at Virginia Tech tells us about the challenges and opportunities coming with Smart Cities. And a look back at Friday’s inaugural Billington Global Automotive Cybersecurity Summit.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 25 Jul 2016 21:03:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>148</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c068d5ba-def8-11ea-911f-3f0708805aba/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: ISIS, al Qaeda compete online. WikiLeaks doxes DNC (courtesy FSB, GRU).</itunes:subtitle>
      <itunes:summary>In today’s podcast we take a look at the doxing of the DNC, a story which will have, as they say, “legs,” if only because essentially everyone now sees Russian intelligence behind the hack. ISIS and al Qaeda continue their competition to inspire lone-wolf jihad. Turkey’s crackdown on would-be putschists continues. Anonymous goes after targets in Turkey. Cyber M&amp;A notes. Dr. Charles Clancy from the Hume Center at Virginia Tech tells us about the challenges and opportunities coming with Smart Cities. And a look back at Friday’s inaugural Billington Global Automotive Cybersecurity Summit.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we take a look at the doxing of the DNC, a story which will have, as they say, “legs,” if only because essentially everyone now sees Russian intelligence behind the hack. ISIS and al Qaeda continue their competition to inspire lone-wolf jihad. Turkey’s crackdown on would-be putschists continues. Anonymous goes after targets in Turkey. Cyber M&amp;A notes. Dr. Charles Clancy from the Hume Center at Virginia Tech tells us about the challenges and opportunities coming with Smart Cities. And a look back at Friday’s inaugural Billington Global Automotive Cybersecurity Summit.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>832</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9765e511673fa35244d4c96266da0cfd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4124319398.mp3?updated=1689609370" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Hacktivists hit Library of Congress, Stingrays and Security Clearances</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/147/notes</link>
      <description>In today's podcast, Hacktivists return to DDoS—the Library of Congress is hit. AKP emails continue to receive scrutiny. A look at the jihadists' toolbox. Some quick takes on automotive cyber security, as the industry moves toward fully autonomous cars. Wassenaar and the DCMA still aren't getting much industry love. And we talk to attorney Tom Coale about security clearances and Ben Yelin on the constitutionality of Stingrays.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 22 Jul 2016 20:49:43 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>147</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c07fdf6c-def8-11ea-911f-3ba1f022d9ad/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Hacktivists hit Library of Congress, Stingrays and Security Clearances</itunes:subtitle>
      <itunes:summary>In today's podcast, Hacktivists return to DDoS—the Library of Congress is hit. AKP emails continue to receive scrutiny. A look at the jihadists' toolbox. Some quick takes on automotive cyber security, as the industry moves toward fully autonomous cars. Wassenaar and the DCMA still aren't getting much industry love. And we talk to attorney Tom Coale about security clearances and Ben Yelin on the constitutionality of Stingrays.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, Hacktivists return to DDoS—the Library of Congress is hit. AKP emails continue to receive scrutiny. A look at the jihadists' toolbox. Some quick takes on automotive cyber security, as the industry moves toward fully autonomous cars. Wassenaar and the DCMA still aren't getting much industry love. And we talk to attorney Tom Coale about security clearances and Ben Yelin on the constitutionality of Stingrays.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1302</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[14c8fc99df10696ee5933c2320bba996]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9130777405.mp3?updated=1608753111" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: DDoSing ISIS. Political hacks. Inspiration is an info op.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/146/notes</link>
      <description>In today’s podcast, we hear about patched vulnerabilities in widely used products—the consensus among experts is that you should patch without delay. A new ransomware variant—“HolyCrypt”-is discovered in development. OurMine hacks the Playstation boss’s Twitter account. Hackers get ready to go after US Presidential campaigns (and some have already started). ISIS information ops continue to concentrate on recruiting and inspiration. Pokemon-GO is too Darwinian for some. The University of Maryland's Jonathan Katz describes a TOR alternative.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 21 Jul 2016 19:22:56 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>146</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c096b2a0-def8-11ea-911f-dbe36c26bd48/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: DDoSing ISIS. Political hacks. Inspiration is an info op.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear about patched vulnerabilities in widely used products—the consensus among experts is that you should patch without delay. A new ransomware variant—“HolyCrypt”-is discovered in development. OurMine hacks the Playstation boss’s Twitter account. Hackers get ready to go after US Presidential campaigns (and some have already started). ISIS information ops continue to concentrate on recruiting and inspiration. Pokemon-GO is too Darwinian for some. The University of Maryland's Jonathan Katz describes a TOR alternative.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear about patched vulnerabilities in widely used products—the consensus among experts is that you should patch without delay. A new ransomware variant—“HolyCrypt”-is discovered in development. OurMine hacks the Playstation boss’s Twitter account. Hackers get ready to go after US Presidential campaigns (and some have already started). ISIS information ops continue to concentrate on recruiting and inspiration. Pokemon-GO is too Darwinian for some. The University of Maryland's Jonathan Katz describes a TOR alternative.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>865</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3bc05bea21262c0c649c7f20fe364af5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9911033229.mp3?updated=1689601884" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Brazilian, Chinese groups pledge allegiance to ISIS. Turkey's coup aftermath online.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/145/notes</link>
      <description>In today’s podcast we review some of the cyber implications and sequelae of the apparent failed coup d’état in Turkey. Signs in the Shumukh al Islam leaks suggest ISIS is making inroads among China’s Uighur minority. A Brazilian jihadist group pledges allegiance to ISIS online, adding to Brazil’s cybersecurity (and more importantly, physical security) concerns for the Rio Olympics. enSilo reports widespread code-hooking issues in security software. A look at ransomware, and an actual sockpuppet surfaces in Canada. Morphisec's Ronen Yehoshua describes a technique they call moving target defense, and Markus Raushecker shares his take on the sentencing of a swatter who targeted Brian Krebs.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 20 Jul 2016 18:05:11 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>145</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c0e0578e-def8-11ea-911f-4f6d31d33e9c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Brazilian, Chinese groups pledge allegiance to ISIS. Turkey's coup aftermath online.</itunes:subtitle>
      <itunes:summary>In today’s podcast we review some of the cyber implications and sequelae of the apparent failed coup d’état in Turkey. Signs in the Shumukh al Islam leaks suggest ISIS is making inroads among China’s Uighur minority. A Brazilian jihadist group pledges allegiance to ISIS online, adding to Brazil’s cybersecurity (and more importantly, physical security) concerns for the Rio Olympics. enSilo reports widespread code-hooking issues in security software. A look at ransomware, and an actual sockpuppet surfaces in Canada. Morphisec's Ronen Yehoshua describes a technique they call moving target defense, and Markus Raushecker shares his take on the sentencing of a swatter who targeted Brian Krebs.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we review some of the cyber implications and sequelae of the apparent failed coup d’état in Turkey. Signs in the Shumukh al Islam leaks suggest ISIS is making inroads among China’s Uighur minority. A Brazilian jihadist group pledges allegiance to ISIS online, adding to Brazil’s cybersecurity (and more importantly, physical security) concerns for the Rio Olympics. enSilo reports widespread code-hooking issues in security software. A look at ransomware, and an actual sockpuppet surfaces in Canada. Morphisec's Ronen Yehoshua describes a technique they call moving target defense, and Markus Raushecker shares his take on the sentencing of a swatter who targeted Brian Krebs.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>983</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a99e19fe9f4b0069d3f9b13721002f4a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6688643457.mp3?updated=1689602827" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Influence online, from jihad to kawaii. Cybercrime. Industry updates.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/144/notes</link>
      <description>In today’s podcast we hear about the doxing of a major ISIS forum, and we take a look at the state of play with respect to online information operations in the war with ISIS. We ask whether jihad and kawaii offer contrasting case studies of inspiration. In Turkey, did coup plotters (who might have known better) overlook the Internet? DDoS campaigns rise against governments, companies, and games. A researcher shows how 2FA and account recovery capabilities can be subverted for fraud.  Malicious Excel macros are out in the wild. So are the Cknife web shell, as described to us by Recorded Future's Levi Gundert, and the venerable Enfal malware family. Joe Carrigan reminds us why we she be using two-factor authentication. We look at some recent venture investments.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Jul 2016 18:53:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>144</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c0f611aa-def8-11ea-911f-b3af9658a0a3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Influence online, from jihad to kawaii. Cybercrime. Industry updates.</itunes:subtitle>
      <itunes:summary>In today’s podcast we hear about the doxing of a major ISIS forum, and we take a look at the state of play with respect to online information operations in the war with ISIS. We ask whether jihad and kawaii offer contrasting case studies of inspiration. In Turkey, did coup plotters (who might have known better) overlook the Internet? DDoS campaigns rise against governments, companies, and games. A researcher shows how 2FA and account recovery capabilities can be subverted for fraud.  Malicious Excel macros are out in the wild. So are the Cknife web shell, as described to us by Recorded Future's Levi Gundert, and the venerable Enfal malware family. Joe Carrigan reminds us why we she be using two-factor authentication. We look at some recent venture investments.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear about the doxing of a major ISIS forum, and we take a look at the state of play with respect to online information operations in the war with ISIS. We ask whether jihad and kawaii offer contrasting case studies of inspiration. In Turkey, did coup plotters (who might have known better) overlook the Internet? DDoS campaigns rise against governments, companies, and games. A researcher shows how 2FA and account recovery capabilities can be subverted for fraud.  Malicious Excel macros are out in the wild. So are the Cknife web shell, as described to us by Recorded Future's Levi Gundert, and the venerable Enfal malware family. Joe Carrigan reminds us why we she be using two-factor authentication. We look at some recent venture investments.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>955</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[57449ad7ebd2eb22f4b0929d1d5fb55c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5620386074.mp3?updated=1689602813" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Quantifying Cyber Risk [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/5/notes</link>
      <description>Cyber security comes down to risk management, and it’s hard to manage what can’t be measured. How can cyber risk be credibly quantified and communicated? We’ll talk to companies developing technology solutions aimed at quantifying cyber risk and hear from insurance experts and other industry stakeholders grappling with this important new challenge facing businesses today.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Jul 2016 10:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>5</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/05949c32-df03-11ea-9e0c-47462e9ee7dd/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Quantifying Cyber Risk</itunes:subtitle>
      <itunes:summary>Cyber security comes down to risk management, and it’s hard to manage what can’t be measured. How can cyber risk be credibly quantified and communicated? We’ll talk to companies developing technology solutions aimed at quantifying cyber risk and hear from insurance experts and other industry stakeholders grappling with this important new challenge facing businesses today.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Cyber security comes down to risk management, and it’s hard to manage what can’t be measured. How can cyber risk be credibly quantified and communicated? We’ll talk to companies developing technology solutions aimed at quantifying cyber risk and hear from insurance experts and other industry stakeholders grappling with this important new challenge facing businesses today.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1913</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[62f9d6884c9f709804ad2fb037e1b6cc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8814081403.mp3?updated=1656707811" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Dark web observations on coups and lists. Pokémon Go and the madness of crowds.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/143/notes</link>
      <description>In today’s podcast, we hear about social media’s role in the suppression of the coup d’ état in Turkey. The United Cyber Caliphate and the competing “Peace Brigades” release overlapping and competing target lists. Ukrainian nationalist hacktivists hit Poland’s Ministry of Defense. “Delilah” is a backdoor Trojan built for blackmail, and “Wildfire” is a new strain of ransomware. Some databases for sale on the Dark Web look like junk. Deloitte's Emily Mossberg shares insights from their latest  report, and John Leiseboer from Quintessence Labs explains the security benefits of interoperability. Pokémon Go looks like the biggest mania since the 17th Century’s tulip craze.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 18 Jul 2016 20:47:11 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>143</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c119fa52-def8-11ea-911f-4f5b71b4aca4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Dark web observations on coups and lists. Pokémon Go and the madness of crowds.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we hear about social media’s role in the suppression of the coup d’ état in Turkey. The United Cyber Caliphate and the competing “Peace Brigades” release overlapping and competing target lists. Ukrainian nationalist hacktivists hit Poland’s Ministry of Defense. “Delilah” is a backdoor Trojan built for blackmail, and “Wildfire” is a new strain of ransomware. Some databases for sale on the Dark Web look like junk. Deloitte's Emily Mossberg shares insights from their latest  report, and John Leiseboer from Quintessence Labs explains the security benefits of interoperability. Pokémon Go looks like the biggest mania since the 17th Century’s tulip craze.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we hear about social media’s role in the suppression of the coup d’ état in Turkey. The United Cyber Caliphate and the competing “Peace Brigades” release overlapping and competing target lists. Ukrainian nationalist hacktivists hit Poland’s Ministry of Defense. “Delilah” is a backdoor Trojan built for blackmail, and “Wildfire” is a new strain of ransomware. Some databases for sale on the Dark Web look like junk. Deloitte's Emily Mossberg shares insights from their latest  report, and John Leiseboer from Quintessence Labs explains the security benefits of interoperability. Pokémon Go looks like the biggest mania since the 17th Century’s tulip craze.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>961</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6f91e617ef38701eae879d4bf2b2af9a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9916271637.mp3?updated=1689602800" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Pokémon Go's astonishing success. (And attack surface?) Crime, folly, the punishment thereof.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/142/notes</link>
      <description>In today’s podcast we hear about ISIS and its response to pressure from its enemies—the news is decidedly mixed, especially given the tragedy in France. Familiar banking Trojans, exploit kits, and ransomware pick up some new functionality. Someone’s jackpotting ATMs in Taiwan. SAP and Cisco patch. US court rulings have privacy and liability implications. Venture capital investments and M&amp;A news. Ben Yelin tells us about a 4th Amendment case involving privacy on your home computer, and Eli Sugarman from the Hewlett Foundation's Cyber Initiative shares their grant making story. And Pokemon-Go continues its irresistible rise—don’t slip into any augmented reality pitfalls.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 15 Jul 2016 20:08:51 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>142</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c131d190-def8-11ea-911f-fb53b1701b4f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Pokémon Go's astonishing success. (And attack surface?) Crime, folly, the punishment thereof.</itunes:subtitle>
      <itunes:summary>In today’s podcast we hear about ISIS and its response to pressure from its enemies—the news is decidedly mixed, especially given the tragedy in France. Familiar banking Trojans, exploit kits, and ransomware pick up some new functionality. Someone’s jackpotting ATMs in Taiwan. SAP and Cisco patch. US court rulings have privacy and liability implications. Venture capital investments and M&amp;A news. Ben Yelin tells us about a 4th Amendment case involving privacy on your home computer, and Eli Sugarman from the Hewlett Foundation's Cyber Initiative shares their grant making story. And Pokemon-Go continues its irresistible rise—don’t slip into any augmented reality pitfalls.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast we hear about ISIS and its response to pressure from its enemies—the news is decidedly mixed, especially given the tragedy in France. Familiar banking Trojans, exploit kits, and ransomware pick up some new functionality. Someone’s jackpotting ATMs in Taiwan. SAP and Cisco patch. US court rulings have privacy and liability implications. Venture capital investments and M&amp;A news. Ben Yelin tells us about a 4th Amendment case involving privacy on your home computer, and Eli Sugarman from the Hewlett Foundation's Cyber Initiative shares their grant making story. And Pokemon-Go continues its irresistible rise—don’t slip into any augmented reality pitfalls.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1283</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4d358a602ec6065fd9f93943875989c0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5046955250.mp3?updated=1608753104" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Slinging cyber lingo. Bad robots. Pokémon Go's long march.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/141/notes</link>
      <description>In today's podcast we hear about some expansive court decisions that may make you uneasy. Chinese spies get into the FDIC, and the victim may have covered it up. Start-ups attract fresh investment. New exploit kits jockey for position. Securing your Bitcoin wallet. What to make of Pokemon's security issues. Dale Drew from Level 3 Communications gives us the low-down on some cyber security lingo, and Darin Stanchfield from KeepKey explains options for securing your Bitcoin. And, in California, an alleged violation of Asimov's First Law of Robotics.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 14 Jul 2016 19:41:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>141</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c1596ab6-def8-11ea-911f-e3cc40d7fd95/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Slinging cyber lingo. Bad robots. Pokémon Go's long march.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about some expansive court decisions that may make you uneasy. Chinese spies get into the FDIC, and the victim may have covered it up. Start-ups attract fresh investment. New exploit kits jockey for position. Securing your Bitcoin wallet. What to make of Pokemon's security issues. Dale Drew from Level 3 Communications gives us the low-down on some cyber security lingo, and Darin Stanchfield from KeepKey explains options for securing your Bitcoin. And, in California, an alleged violation of Asimov's First Law of Robotics.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about some expansive court decisions that may make you uneasy. Chinese spies get into the FDIC, and the victim may have covered it up. Start-ups attract fresh investment. New exploit kits jockey for position. Securing your Bitcoin wallet. What to make of Pokemon's security issues. Dale Drew from Level 3 Communications gives us the low-down on some cyber security lingo, and Darin Stanchfield from KeepKey explains options for securing your Bitcoin. And, in California, an alleged violation of Asimov's First Law of Robotics.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>954</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9384ca64d6674c1aaf067b262ddf5179]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7062368768.mp3?updated=1689602759" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Patch Tuesday notes. Pokémon Go (of course), ICS security, energy recon, fansmitters.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/140/notes</link>
      <description>In today's podcast we go over some of the highlights of this week's patches, including fixes from Microsoft, Abode, Drupal, and Niantic. We discuss the security of the industrial Internet-of-things and critical infrastructure, especially the power grid. We hear about the current state of ransomware play, and note the return of xDedic, the hacker server hawker, to the dark web souk. Industry news includes coming cyber upgrades to SWIFT, VC updates, and notes on the markets. The University of Maryland's Jonathan Katz tells us about "fansmitters", and Booz Allen's Scott Stables shares threat data from their latest ICS report. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 13 Jul 2016 20:09:54 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>140</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c1715644-def8-11ea-911f-2386aa9f3b48/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Patch Tuesday notes. Pokémon Go (of course), ICS security, energy recon, fansmitters.</itunes:subtitle>
      <itunes:summary>In today's podcast we go over some of the highlights of this week's patches, including fixes from Microsoft, Abode, Drupal, and Niantic. We discuss the security of the industrial Internet-of-things and critical infrastructure, especially the power grid. We hear about the current state of ransomware play, and note the return of xDedic, the hacker server hawker, to the dark web souk. Industry news includes coming cyber upgrades to SWIFT, VC updates, and notes on the markets. The University of Maryland's Jonathan Katz tells us about "fansmitters", and Booz Allen's Scott Stables shares threat data from their latest ICS report. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we go over some of the highlights of this week's patches, including fixes from Microsoft, Abode, Drupal, and Niantic. We discuss the security of the industrial Internet-of-things and critical infrastructure, especially the power grid. We hear about the current state of ransomware play, and note the return of xDedic, the hacker server hawker, to the dark web souk. Industry news includes coming cyber upgrades to SWIFT, VC updates, and notes on the markets. The University of Maryland's Jonathan Katz tells us about "fansmitters", and Booz Allen's Scott Stables shares threat data from their latest ICS report. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>997</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f6cedf8bdaa8e9d7a68ec7bf419e77a4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8217818581.mp3?updated=1689602733" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Medical device, record hacks. (Un)welcome new ransomware: Alfa, Ranscam. ISIS online decline?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/139/notes</link>
      <description>In today's podcast we hear some reports that ISIS may be losing some social media ground. NATO agrees to increase cyber cooperation. A newly described malware dropper is apparently tailored to work against specific European energy companies. 600,000 patient records are breached in the US. There's a decryptor out for Jigsaw ransomware, but not for the newly introduced "Alfa" or "Ranscam" (and Ranscam doesn't even bother to decrypt in the first place). Markus Rauschecker highlights some of the challenges with information sharing. Google and Niantic deal with Pokémon Go security issues. And don't enter some strangers' home, even if you see Reshirom EX on their sofa.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Jul 2016 19:12:09 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>139</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c1882c52-def8-11ea-911f-f7367a03f249/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Medical device, record hacks. (Un)welcome new ransomware: Alfa, Ranscam. ISIS online decline?</itunes:subtitle>
      <itunes:summary>In today's podcast we hear some reports that ISIS may be losing some social media ground. NATO agrees to increase cyber cooperation. A newly described malware dropper is apparently tailored to work against specific European energy companies. 600,000 patient records are breached in the US. There's a decryptor out for Jigsaw ransomware, but not for the newly introduced "Alfa" or "Ranscam" (and Ranscam doesn't even bother to decrypt in the first place). Markus Rauschecker highlights some of the challenges with information sharing. Google and Niantic deal with Pokémon Go security issues. And don't enter some strangers' home, even if you see Reshirom EX on their sofa.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear some reports that ISIS may be losing some social media ground. NATO agrees to increase cyber cooperation. A newly described malware dropper is apparently tailored to work against specific European energy companies. 600,000 patient records are breached in the US. There's a decryptor out for Jigsaw ransomware, but not for the newly introduced "Alfa" or "Ranscam" (and Ranscam doesn't even bother to decrypt in the first place). Markus Rauschecker highlights some of the challenges with information sharing. Google and Niantic deal with Pokémon Go security issues. And don't enter some strangers' home, even if you see Reshirom EX on their sofa.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>832</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b224bf0f5bbfede5df6210eb72634b24]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4783330037.mp3?updated=1689602712" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Pokémon Go is out, with troubles in its popular trail. Cybercrime &amp; hacktivist miscellany.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/138/notes</link>
      <description>In today's podcast we hear about possible hacks of NATO websites during last week's Alliance meetings. South Asia's scissors-and-paste cyber espionage campaign is surprisingly effective. ISIS and al Qaeda vie for jihadist mindshare, and Anonymous hits government sites in Zimbabwe and South Africa. A hacker/hacktivist dumps what he claims to be Kindle credentials, but analysts are dubious about their provenance. Eleanor Mac malware targets webcams. State Department emails remain under investigation. Chris Gerritz from Infocyte tells us about threat hunting, and Charles Clancy from the Hume Center at Virginia Tech shares concerns about data privacy. Plus, Pokémon Go seems to be catching 'em all—Ash Ketcham, call your office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 11 Jul 2016 19:31:58 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>138</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c1a0fdd6-def8-11ea-911f-0fe6c144dcad/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Pokémon Go is out, with troubles in its popular trail. Cybercrime &amp; hacktivist miscellany.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about possible hacks of NATO websites during last week's Alliance meetings. South Asia's scissors-and-paste cyber espionage campaign is surprisingly effective. ISIS and al Qaeda vie for jihadist mindshare, and Anonymous hits government sites in Zimbabwe and South Africa. A hacker/hacktivist dumps what he claims to be Kindle credentials, but analysts are dubious about their provenance. Eleanor Mac malware targets webcams. State Department emails remain under investigation. Chris Gerritz from Infocyte tells us about threat hunting, and Charles Clancy from the Hume Center at Virginia Tech shares concerns about data privacy. Plus, Pokémon Go seems to be catching 'em all—Ash Ketcham, call your office.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about possible hacks of NATO websites during last week's Alliance meetings. South Asia's scissors-and-paste cyber espionage campaign is surprisingly effective. ISIS and al Qaeda vie for jihadist mindshare, and Anonymous hits government sites in Zimbabwe and South Africa. A hacker/hacktivist dumps what he claims to be Kindle credentials, but analysts are dubious about their provenance. Eleanor Mac malware targets webcams. State Department emails remain under investigation. Chris Gerritz from Infocyte tells us about threat hunting, and Charles Clancy from the Hume Center at Virginia Tech shares concerns about data privacy. Plus, Pokémon Go seems to be catching 'em all—Ash Ketcham, call your office.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>997</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[adc69d95ce740543742e070b4e085ce2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1188253192.mp3?updated=1689602166" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Classified info--goose sauce, gander sauce. Security industry buoyed by Avast, AVG.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/137/notes</link>
      <description>In today’s podcast, we talk through the ramifications of Android encryption issues. Experts consider the implications of D-Link vulnerabilities for IoT security. The Wendy’s paycard breach has gotten much bigger. Familiar exploits circulate in the wild, and Mac backdoors make a comeback. CryptXXX is joined by a new ransomware variant, Cryptobit, and DedCryptor continues to play the Grinch. Avast’s purchase of AVG encourages the markets. The EU adopts new data regulations aimed at improving resilience. The FBI explains what it found in its investigation of Hillary Clinton’s emails, and defense attorneys find new lines of defense. Accenture's Malek Ben Salem shares how big data can help wth analytics, and we learn about early-stage startup accelerators from Mach 37's Bob Stratton.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 08 Jul 2016 19:19:16 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>137</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c1b9507a-def8-11ea-911f-13aa71a0956c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Classified info--goose sauce, gander sauce. Security industry buoyed by Avast, AVG.</itunes:subtitle>
      <itunes:summary>In today’s podcast, we talk through the ramifications of Android encryption issues. Experts consider the implications of D-Link vulnerabilities for IoT security. The Wendy’s paycard breach has gotten much bigger. Familiar exploits circulate in the wild, and Mac backdoors make a comeback. CryptXXX is joined by a new ransomware variant, Cryptobit, and DedCryptor continues to play the Grinch. Avast’s purchase of AVG encourages the markets. The EU adopts new data regulations aimed at improving resilience. The FBI explains what it found in its investigation of Hillary Clinton’s emails, and defense attorneys find new lines of defense. Accenture's Malek Ben Salem shares how big data can help wth analytics, and we learn about early-stage startup accelerators from Mach 37's Bob Stratton.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today’s podcast, we talk through the ramifications of Android encryption issues. Experts consider the implications of D-Link vulnerabilities for IoT security. The Wendy’s paycard breach has gotten much bigger. Familiar exploits circulate in the wild, and Mac backdoors make a comeback. CryptXXX is joined by a new ransomware variant, Cryptobit, and DedCryptor continues to play the Grinch. Avast’s purchase of AVG encourages the markets. The EU adopts new data regulations aimed at improving resilience. The FBI explains what it found in its investigation of Hillary Clinton’s emails, and defense attorneys find new lines of defense. Accenture's Malek Ben Salem shares how big data can help wth analytics, and we learn about early-stage startup accelerators from Mach 37's Bob Stratton.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1294</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[238fb057f6d756aec4ff5086c020425a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4561058369.mp3?updated=1608753095" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Blockchains and their uses. Pirrit adware attribution. Avast buys AVG for $1.3B.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/136/notes</link>
      <description>In today's podcast we hear about Cymmetria's discovery of a major threat actor in South Asia, Patchwork, which assembles attack code by cutting and pasting from the Internet. HummingBad adware infests Android, and Pirrit (affecting Macs) is attributed to a marketer. D-Link routers may be vulnerable to remote-code execution. Google patches more than 100 Android issues. Symantec works on AV product problems. Avast buys AVG. Blockchain's potential. Cyber workforce development. FBI offers explanations to the House. Cyber crooks go after freelancers. Jonathan Katz explains the many uses for blockchain crypto technology, and Chris Key from Verodin has some advice for those entering the cybersecurity workforce.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 07 Jul 2016 19:34:09 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>136</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c1e0e388-def8-11ea-911f-07157e4f7a84/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Blockchains and their uses. Pirrit adware attribution. Avast buys AVG for $1.3B.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about Cymmetria's discovery of a major threat actor in South Asia, Patchwork, which assembles attack code by cutting and pasting from the Internet. HummingBad adware infests Android, and Pirrit (affecting Macs) is attributed to a marketer. D-Link routers may be vulnerable to remote-code execution. Google patches more than 100 Android issues. Symantec works on AV product problems. Avast buys AVG. Blockchain's potential. Cyber workforce development. FBI offers explanations to the House. Cyber crooks go after freelancers. Jonathan Katz explains the many uses for blockchain crypto technology, and Chris Key from Verodin has some advice for those entering the cybersecurity workforce.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about Cymmetria's discovery of a major threat actor in South Asia, Patchwork, which assembles attack code by cutting and pasting from the Internet. HummingBad adware infests Android, and Pirrit (affecting Macs) is attributed to a marketer. D-Link routers may be vulnerable to remote-code execution. Google patches more than 100 Android issues. Symantec works on AV product problems. Avast buys AVG. Blockchain's potential. Cyber workforce development. FBI offers explanations to the House. Cyber crooks go after freelancers. Jonathan Katz explains the many uses for blockchain crypto technology, and Chris Key from Verodin has some advice for those entering the cybersecurity workforce.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>999</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b0d9072895a8a678091e8d8dd86d8475]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1380191837.mp3?updated=1689602059" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Cybercrime campaigns. States hope ISIS overplayed its violent hand. No indictment of Clinton over email.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/135/notes</link>
      <description>In today's podcast we hear about Yingmob's HummingBad Android malware, what it's up to and where it might be headed. We also learn about Eleanor, a Mac OS-X backdoor masquerading as a document conversion app, and we hear about the shifting form of the pseudo-DarkLeech ransomware campaign. The ThinkPwn zero-day may have a wider scope than originally thought. Observers wonder whether ISIS may be overplaying its bloody hand, and, of course, we find out what the FBI concluded in its investigation of former Secretary of State Clinton's emails. Joe Carrigan, from the Johns Hopkins University Information Security Institute, reminds us to take care when setting up a new router.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 06 Jul 2016 17:47:12 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>135</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c1f07eb0-def8-11ea-911f-8b95774988e6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Cybercrime campaigns. States hope ISIS overplayed its violent hand. No indictment of Clinton over email.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about Yingmob's HummingBad Android malware, what it's up to and where it might be headed. We also learn about Eleanor, a Mac OS-X backdoor masquerading as a document conversion app, and we hear about the shifting form of the pseudo-DarkLeech ransomware campaign. The ThinkPwn zero-day may have a wider scope than originally thought. Observers wonder whether ISIS may be overplaying its bloody hand, and, of course, we find out what the FBI concluded in its investigation of former Secretary of State Clinton's emails. Joe Carrigan, from the Johns Hopkins University Information Security Institute, reminds us to take care when setting up a new router.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about Yingmob's HummingBad Android malware, what it's up to and where it might be headed. We also learn about Eleanor, a Mac OS-X backdoor masquerading as a document conversion app, and we hear about the shifting form of the pseudo-DarkLeech ransomware campaign. The ThinkPwn zero-day may have a wider scope than originally thought. Observers wonder whether ISIS may be overplaying its bloody hand, and, of course, we find out what the FBI concluded in its investigation of former Secretary of State Clinton's emails. Joe Carrigan, from the Johns Hopkins University Information Security Institute, reminds us to take care when setting up a new router.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>807</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[04374e5e16cd383ef275204e4be06fd2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5982030460.mp3?updated=1689602042" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Statecraft, spycraft, &amp; warcraft: inspiration, cells, &amp; espionage. Cybercrime &amp; punishment.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/134/notes</link>
      <description>In today's podcast we look at ISIS's shifting tactics in cyberspace, and the civilized world's response to them. OurMine continues to market its "services" by compromising celebrity accounts through recycled credentials. Two new ransomware varieties--"Satana" and "Zepto"--make their appearance, and researchers track (without attribution) the spoor of MNKit and SBDH malware. A researcher releases, without prior disclosure, a ThinkPad zero-day. The FBI investigation into State Department email issues warms up. Ben Yelin from the University of Maryland Center for Health and Homeland Security tells us about a Florida man in trouble for hacking an election site, and Michael Jacobs brings us the National Cybersecurity Hall of Fame.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Jul 2016 19:43:46 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>134</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c207054a-def8-11ea-911f-6f55b89eeed9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Statecraft, spycraft, &amp; warcraft: inspiration, cells, &amp; espionage. Cybercrime &amp; punishment.</itunes:subtitle>
      <itunes:summary>In today's podcast we look at ISIS's shifting tactics in cyberspace, and the civilized world's response to them. OurMine continues to market its "services" by compromising celebrity accounts through recycled credentials. Two new ransomware varieties--"Satana" and "Zepto"--make their appearance, and researchers track (without attribution) the spoor of MNKit and SBDH malware. A researcher releases, without prior disclosure, a ThinkPad zero-day. The FBI investigation into State Department email issues warms up. Ben Yelin from the University of Maryland Center for Health and Homeland Security tells us about a Florida man in trouble for hacking an election site, and Michael Jacobs brings us the National Cybersecurity Hall of Fame.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we look at ISIS's shifting tactics in cyberspace, and the civilized world's response to them. OurMine continues to market its "services" by compromising celebrity accounts through recycled credentials. Two new ransomware varieties--"Satana" and "Zepto"--make their appearance, and researchers track (without attribution) the spoor of MNKit and SBDH malware. A researcher releases, without prior disclosure, a ThinkPad zero-day. The FBI investigation into State Department email issues warms up. Ben Yelin from the University of Maryland Center for Health and Homeland Security tells us about a Florida man in trouble for hacking an election site, and Michael Jacobs brings us the National Cybersecurity Hall of Fame.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1029</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7170d456ba0ebb849b5292925d414d2a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6302090612.mp3?updated=1689602032" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Conficker worms into medical IoT. Talking key management, DevOps. NERC standards take effect.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/133/notes</link>
      <description>In today's podcast we discuss Internet-of-things threats, not only botnets assembled from compromised security cameras, but also medical device hacking (with Conficker) as a way of stealing patient information. More insurance sector breaches appear to be in progress, too. The Sprashivai social network is compromised. The Infy espionage infrastructure is taken down (but may return—they often do). NERC standards for power grid cyber security take effect today. John Leisebeor from Quintessence Labs explains key management within a security framework, and we learn about DevOps from Cybric's Mike Kail and eGlobalTech's Branko Primetica.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 01 Jul 2016 19:04:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>133</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c21bf126-def8-11ea-911f-3b2918594854/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Conficker worms into medical IoT. Talking key management, DevOps. NERC standards take effect.</itunes:subtitle>
      <itunes:summary>In today's podcast we discuss Internet-of-things threats, not only botnets assembled from compromised security cameras, but also medical device hacking (with Conficker) as a way of stealing patient information. More insurance sector breaches appear to be in progress, too. The Sprashivai social network is compromised. The Infy espionage infrastructure is taken down (but may return—they often do). NERC standards for power grid cyber security take effect today. John Leisebeor from Quintessence Labs explains key management within a security framework, and we learn about DevOps from Cybric's Mike Kail and eGlobalTech's Branko Primetica.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we discuss Internet-of-things threats, not only botnets assembled from compromised security cameras, but also medical device hacking (with Conficker) as a way of stealing patient information. More insurance sector breaches appear to be in progress, too. The Sprashivai social network is compromised. The Infy espionage infrastructure is taken down (but may return—they often do). NERC standards for power grid cyber security take effect today. John Leisebeor from Quintessence Labs explains key management within a security framework, and we learn about DevOps from Cybric's Mike Kail and eGlobalTech's Branko Primetica.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1239</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0847078609f420872996a7a9bf059d8f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2375491595.mp3?updated=1608753098" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Hacktivism or denial-&amp;-deception? (Smart money's on D&amp;D.) LizardStressor herds CCTV bots.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/132/notes</link>
      <description>In today's podcast we hear about DarkOverlord and the data he's selling online. Guccifer 2.0 returns to blogging, and says he's not working for the Russians, but CrowdStrike, ThreatConnect, and SecureWorks present evidence to suggest otherwise. Thompson-Reuters says it's contained the World-Check database leak. Oculus' Twitter account is briefly hijacked (now restored to company control). Point-of-sale breach disclosures are confirmed. Why hackers hack when they do. Some governments' efforts to control information online seem to be having greater than expected success. Level 3's Dale Drew explains the season nature of cyber attacks, and Cytegic's Dan Pastor offers his view on the recent SWIFT banking attacks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 30 Jun 2016 19:56:59 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>132</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c2351bec-def8-11ea-911f-f73ea56e8eaa/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Hacktivism or denial-&amp;-deception? (Smart money's on D&amp;D.) LizardStressor herds CCTV bots.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about DarkOverlord and the data he's selling online. Guccifer 2.0 returns to blogging, and says he's not working for the Russians, but CrowdStrike, ThreatConnect, and SecureWorks present evidence to suggest otherwise. Thompson-Reuters says it's contained the World-Check database leak. Oculus' Twitter account is briefly hijacked (now restored to company control). Point-of-sale breach disclosures are confirmed. Why hackers hack when they do. Some governments' efforts to control information online seem to be having greater than expected success. Level 3's Dale Drew explains the season nature of cyber attacks, and Cytegic's Dan Pastor offers his view on the recent SWIFT banking attacks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about DarkOverlord and the data he's selling online. Guccifer 2.0 returns to blogging, and says he's not working for the Russians, but CrowdStrike, ThreatConnect, and SecureWorks present evidence to suggest otherwise. Thompson-Reuters says it's contained the World-Check database leak. Oculus' Twitter account is briefly hijacked (now restored to company control). Point-of-sale breach disclosures are confirmed. Why hackers hack when they do. Some governments' efforts to control information online seem to be having greater than expected success. Level 3's Dale Drew explains the season nature of cyber attacks, and Cytegic's Dan Pastor offers his view on the recent SWIFT banking attacks.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>890</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f76f3ac51c5192ee4cf192c062f21bb2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4408319008.mp3?updated=1689602001" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Istanbul bombings prompt global intel collection re-look. Cyber threats to transportation.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/131/notes</link>
      <description>In today's podcast, we note that in the wake of the ISIS bombings in Istanbul, security services around the world are looking for online intelligence that might help prevent future terror attacks. Another wave of SWIFT fraud appears to have hit--this time the victims are banks in Ukraine and Russia. Ransomware updates (including the unwelcome return of Locky), notes on smishing, and a review of some questionable PlayStore apps. Apple's iPhone turns 9 and The University of Maryland's Jonathan Katz explains that company's move toward "differential privacy." Jon Allen from Booze Allen Hamilton talks about the Automotive ISAC and previews the upcoming Billington Cybersecurity Global Automotive Cybersecurity Summit. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 29 Jun 2016 18:47:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>131</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c24dc5a2-def8-11ea-911f-7bd9339ac4dd/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Istanbul bombings prompt global intel collection re-look. Cyber threats to transportation.</itunes:subtitle>
      <itunes:summary>In today's podcast, we note that in the wake of the ISIS bombings in Istanbul, security services around the world are looking for online intelligence that might help prevent future terror attacks. Another wave of SWIFT fraud appears to have hit--this time the victims are banks in Ukraine and Russia. Ransomware updates (including the unwelcome return of Locky), notes on smishing, and a review of some questionable PlayStore apps. Apple's iPhone turns 9 and The University of Maryland's Jonathan Katz explains that company's move toward "differential privacy." Jon Allen from Booze Allen Hamilton talks about the Automotive ISAC and previews the upcoming Billington Cybersecurity Global Automotive Cybersecurity Summit. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we note that in the wake of the ISIS bombings in Istanbul, security services around the world are looking for online intelligence that might help prevent future terror attacks. Another wave of SWIFT fraud appears to have hit--this time the victims are banks in Ukraine and Russia. Ransomware updates (including the unwelcome return of Locky), notes on smishing, and a review of some questionable PlayStore apps. Apple's iPhone turns 9 and The University of Maryland's Jonathan Katz explains that company's move toward "differential privacy." Jon Allen from Booze Allen Hamilton talks about the Automotive ISAC and previews the upcoming Billington Cybersecurity Global Automotive Cybersecurity Summit. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>969</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[82145e952da641135a31671f8a6e8bde]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7807319795.mp3?updated=1689601986" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Not interested in Fancy Bear? Fancy Bear's interested in you. No dark-grey hats, please.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/130/notes</link>
      <description>In today's podcast we get an update on the Russian threat group that hit the DNC. A hacker claims to have nine million health insurance records for sale on the dark web. Too many medical devices are vulnerable to Windows 7 and XP exploits. What scared the Nuclear exploit kit's operators. The IRS takes down its e-filing PIN system, and OPM acknowledges its breach affected tens of millions more than just those seeking clearances. We hear some merger and acquisition news, catch up on some workforce training initiatives, and hear about some black hats who'd like their celebrity victims to think of them as white hats. Law expert Ben Yelin from the Center for Health and Homeland Security tells the tale of a well-intentioned security researcher raider by the FBI. Cisco's Tejas Vashi outlines their $10 million cyber security scholarship program. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 28 Jun 2016 19:29:07 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>130</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c269ba46-def8-11ea-911f-2bfe1b0d0424/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Not interested in Fancy Bear? Fancy Bear's interested in you. No dark-grey hats, please.</itunes:subtitle>
      <itunes:summary>In today's podcast we get an update on the Russian threat group that hit the DNC. A hacker claims to have nine million health insurance records for sale on the dark web. Too many medical devices are vulnerable to Windows 7 and XP exploits. What scared the Nuclear exploit kit's operators. The IRS takes down its e-filing PIN system, and OPM acknowledges its breach affected tens of millions more than just those seeking clearances. We hear some merger and acquisition news, catch up on some workforce training initiatives, and hear about some black hats who'd like their celebrity victims to think of them as white hats. Law expert Ben Yelin from the Center for Health and Homeland Security tells the tale of a well-intentioned security researcher raider by the FBI. Cisco's Tejas Vashi outlines their $10 million cyber security scholarship program. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we get an update on the Russian threat group that hit the DNC. A hacker claims to have nine million health insurance records for sale on the dark web. Too many medical devices are vulnerable to Windows 7 and XP exploits. What scared the Nuclear exploit kit's operators. The IRS takes down its e-filing PIN system, and OPM acknowledges its breach affected tens of millions more than just those seeking clearances. We hear some merger and acquisition news, catch up on some workforce training initiatives, and hear about some black hats who'd like their celebrity victims to think of them as white hats. Law expert Ben Yelin from the Center for Health and Homeland Security tells the tale of a well-intentioned security researcher raider by the FBI. Cisco's Tejas Vashi outlines their $10 million cyber security scholarship program. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>974</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5728b2e0c352fd0bc6fe735a1a8de0c1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9537306509.mp3?updated=1689601973" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Ransomware: MIRCOP, Cerber, CryptXXX, Bart, TeslaCrypt (&amp; the #95 car). Intel selling security unit?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/129/notes</link>
      <description>In today's podcast we offer a quick survey of the vast and spreading Ransomware landscape. (And talk about some other bits of cybercrime as well, but if Willie Sutton were alive today, and had an Internet connection, he'd be into ransomware.) Brexit's implications remain under study and speculation, but many see a shift in the tech startup scene in the general direction of Berlin. Most observers have now concluded that the DNC hack was a Russian job (and not the work of a lone hacktivist). Joe Carrigan from the Johns Hopkins University Information Security Institute reminds us why we shouldn't reuse passwords.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 27 Jun 2016 15:56:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>129</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c2956448-def8-11ea-911f-6351467ae442/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Ransomware: MIRCOP, Cerber, CryptXXX, Bart, TeslaCrypt (&amp; the #95 car). Intel selling security unit?</itunes:subtitle>
      <itunes:summary>In today's podcast we offer a quick survey of the vast and spreading Ransomware landscape. (And talk about some other bits of cybercrime as well, but if Willie Sutton were alive today, and had an Internet connection, he'd be into ransomware.) Brexit's implications remain under study and speculation, but many see a shift in the tech startup scene in the general direction of Berlin. Most observers have now concluded that the DNC hack was a Russian job (and not the work of a lone hacktivist). Joe Carrigan from the Johns Hopkins University Information Security Institute reminds us why we shouldn't reuse passwords.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we offer a quick survey of the vast and spreading Ransomware landscape. (And talk about some other bits of cybercrime as well, but if Willie Sutton were alive today, and had an Internet connection, he'd be into ransomware.) Brexit's implications remain under study and speculation, but many see a shift in the tech startup scene in the general direction of Berlin. Most observers have now concluded that the DNC hack was a Russian job (and not the work of a lone hacktivist). Joe Carrigan from the Johns Hopkins University Information Security Institute reminds us why we shouldn't reuse passwords.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>794</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2e40ebb5a51f2eb07144218673c2e3b9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5353730515.mp3?updated=1689601955" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Brexit beats Bremain. Cyber combat support. The usual ransomware.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/128/notes</link>
      <description>In today's podcast we discuss the implications of Brexit, and we talk with someone whose researchers predicted it from social media analytics. GhostSquad strikes, apparently, for ISIS, and LizardSquad DDoSes Overwatch for the lulz. Some old threats come back (some never really left). US Cyber Command is operational against ISIS. The importance of low-power WAN for the IoT. State Department email investigation continues. Malek Ben Salem from Accenture Technology Labs tells us about Software Defined Security. Daniel Mayer from Expert System explains how they predicted the UK vote, and Matthew Knight from Bastille Networks shares his research into low-power wide area networks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 24 Jun 2016 20:31:32 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>128</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c2abccc4-def8-11ea-911f-bf0b9a1afb69/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Brexit beats Bremain. Cyber combat support. The usual ransomware.</itunes:subtitle>
      <itunes:summary>In today's podcast we discuss the implications of Brexit, and we talk with someone whose researchers predicted it from social media analytics. GhostSquad strikes, apparently, for ISIS, and LizardSquad DDoSes Overwatch for the lulz. Some old threats come back (some never really left). US Cyber Command is operational against ISIS. The importance of low-power WAN for the IoT. State Department email investigation continues. Malek Ben Salem from Accenture Technology Labs tells us about Software Defined Security. Daniel Mayer from Expert System explains how they predicted the UK vote, and Matthew Knight from Bastille Networks shares his research into low-power wide area networks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we discuss the implications of Brexit, and we talk with someone whose researchers predicted it from social media analytics. GhostSquad strikes, apparently, for ISIS, and LizardSquad DDoSes Overwatch for the lulz. Some old threats come back (some never really left). US Cyber Command is operational against ISIS. The importance of low-power WAN for the IoT. State Department email investigation continues. Malek Ben Salem from Accenture Technology Labs tells us about Software Defined Security. Daniel Mayer from Expert System explains how they predicted the UK vote, and Matthew Knight from Bastille Networks shares his research into low-power wide area networks.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1308</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[88d7658ba74f52eff0a941a494fd479a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1676776334.mp3?updated=1608753100" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Insecurity cascades from credential breaches, homebrew servers? Cyber casus belli. Waiting for Brexit (or not).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/127/notes</link>
      <description>In today's podcast we hear that Brexit's trending in Twitter as British voters go to the polls—the results will have interesting implications for security and the security industry. Tech support scammers put down their phones and pick-up their pop-ups. Some mixed news on ransomware. Markus Rauschecker from the Center for Health and Homeland Security mulls laws of war for cyberspace. ZScaler's Deepen Desai reports on new MS Office macro malware. US voter information leaks onto the Internet. More skepticism about Guccifer 2.0. And did we just hear a non-denial denial about the DNC hack?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 23 Jun 2016 20:01:42 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>127</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c2c250fc-def8-11ea-911f-53650984b8bf/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Insecurity cascades from credential breaches, homebrew servers? Cyber casus belli. Waiting for Brexit (or not).</itunes:subtitle>
      <itunes:summary>In today's podcast we hear that Brexit's trending in Twitter as British voters go to the polls—the results will have interesting implications for security and the security industry. Tech support scammers put down their phones and pick-up their pop-ups. Some mixed news on ransomware. Markus Rauschecker from the Center for Health and Homeland Security mulls laws of war for cyberspace. ZScaler's Deepen Desai reports on new MS Office macro malware. US voter information leaks onto the Internet. More skepticism about Guccifer 2.0. And did we just hear a non-denial denial about the DNC hack?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear that Brexit's trending in Twitter as British voters go to the polls—the results will have interesting implications for security and the security industry. Tech support scammers put down their phones and pick-up their pop-ups. Some mixed news on ransomware. Markus Rauschecker from the Center for Health and Homeland Security mulls laws of war for cyberspace. ZScaler's Deepen Desai reports on new MS Office macro malware. US voter information leaks onto the Internet. More skepticism about Guccifer 2.0. And did we just hear a non-denial denial about the DNC hack?</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>127</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3aa1bca58a1d25b38697da51e770c22b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5282950281.mp3?updated=1608753009" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Android malware circulating in the wild. Did bears find Clinton Foundation servers just right? Help me, ObiWan.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/126/notes</link>
      <description>In today's podcast we talk about Android malware loose in the wild, crimeware-as-a-service (both ransomware and banking Trojans). We hear about the growing consensus that Russian intelligence services were responsible for the DNC hack, and we note the latest report: those services also seem to have pwned the Clinton Foundation. Critical infrastructure jitters persist. Analysts look at cyber insurance markets, bellwether security stocks, and a new VC investment. Dr. Charles Clancy from the Hume Center at Virginia Tech discusses the cyber challenges faces the transportation industry, and Ayse Kaya Firat from Cloudlock shares key points from their recent report on the dangers of third party apps. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 22 Jun 2016 18:53:31 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>126</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c2de6e90-def8-11ea-911f-670df30026df/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Android malware circulating in the wild. Did bears find Clinton Foundation servers just right? Help me, ObiWan.</itunes:subtitle>
      <itunes:summary>In today's podcast we talk about Android malware loose in the wild, crimeware-as-a-service (both ransomware and banking Trojans). We hear about the growing consensus that Russian intelligence services were responsible for the DNC hack, and we note the latest report: those services also seem to have pwned the Clinton Foundation. Critical infrastructure jitters persist. Analysts look at cyber insurance markets, bellwether security stocks, and a new VC investment. Dr. Charles Clancy from the Hume Center at Virginia Tech discusses the cyber challenges faces the transportation industry, and Ayse Kaya Firat from Cloudlock shares key points from their recent report on the dangers of third party apps. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we talk about Android malware loose in the wild, crimeware-as-a-service (both ransomware and banking Trojans). We hear about the growing consensus that Russian intelligence services were responsible for the DNC hack, and we note the latest report: those services also seem to have pwned the Clinton Foundation. Critical infrastructure jitters persist. Analysts look at cyber insurance markets, bellwether security stocks, and a new VC investment. Dr. Charles Clancy from the Hume Center at Virginia Tech discusses the cyber challenges faces the transportation industry, and Ayse Kaya Firat from Cloudlock shares key points from their recent report on the dangers of third party apps. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>944</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ca14b551a0c1b89cccfd00f55b41bf09]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7259630316.mp3?updated=1689601907" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: DNC hack looks like Russia's work, but Guccifer 2.0 still says no. (Nyet?)</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/125/notes</link>
      <description>In today's podcast we hear about trends in cyber espionage and ransomware. We also learn more about the DNC hack, which looks more like a Russian operation (and Guccifer 2.0 goes a little bit public and looks a lot less plausible as a lone hacktivist). XDedic looks bigger (but may be out of its stolen server-time business). GSA has a new cyber SIN, and the US Secret Service wants cyber triage tools. Israel relaxes its cyber export controls, and Wassenaar reconvenes to rework its cyber arms export control regime. Fidelis Vice President of Cybersecurity Services Mike Buratowski shares their research into the DNC hack, and CyberWire editor John Petrick explains false flags.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 21 Jun 2016 19:07:31 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>125</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c2ee597c-def8-11ea-911f-73ee5a056ff5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: DNC hack looks like Russia's work, but Guccifer 2.0 still says no. (Nyet?)</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about trends in cyber espionage and ransomware. We also learn more about the DNC hack, which looks more like a Russian operation (and Guccifer 2.0 goes a little bit public and looks a lot less plausible as a lone hacktivist). XDedic looks bigger (but may be out of its stolen server-time business). GSA has a new cyber SIN, and the US Secret Service wants cyber triage tools. Israel relaxes its cyber export controls, and Wassenaar reconvenes to rework its cyber arms export control regime. Fidelis Vice President of Cybersecurity Services Mike Buratowski shares their research into the DNC hack, and CyberWire editor John Petrick explains false flags.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about trends in cyber espionage and ransomware. We also learn more about the DNC hack, which looks more like a Russian operation (and Guccifer 2.0 goes a little bit public and looks a lot less plausible as a lone hacktivist). XDedic looks bigger (but may be out of its stolen server-time business). GSA has a new cyber SIN, and the US Secret Service wants cyber triage tools. Israel relaxes its cyber export controls, and Wassenaar reconvenes to rework its cyber arms export control regime. Fidelis Vice President of Cybersecurity Services Mike Buratowski shares their research into the DNC hack, and CyberWire editor John Petrick explains false flags.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>969</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3345ca17fe4a6ad3d284318192add910]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6651432114.mp3?updated=1689601892" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Assange to DNC: buckle up. False flags and acts of war. Blockchain notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/124/notes</link>
      <description>In today's podcast we review the bidding over responsibility for the DNC hack—most observers still think signs point toward Moscow. Wikileaks promises more DNC documents to come. Suspicions revive that the Cyber Caliphate may be a false-flag operation and other notes on the difficulty of attribution. Dridex may be present in some SWIFT-related bank fraud. Angler seems gone for good (but replaced by other exploit kits). UK MPs suggest holding CEO's responsible for breaches by hitting their pay. Tanium and FireEye and their rejected suitors. DoJ responds to the Silk Road appeal. Jonathan Katz from the University of Maryland explains the Etherium/DAO cryptocurrency heist, and Ryan Stolte from Bay Dynamics share results from a report on board room engagement with cyber. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 20 Jun 2016 18:33:18 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>124</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c2fea0a2-def8-11ea-911f-6b7b1b3680c7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Assange to DNC: buckle up. False flags and acts of war. Blockchain notes.</itunes:subtitle>
      <itunes:summary>In today's podcast we review the bidding over responsibility for the DNC hack—most observers still think signs point toward Moscow. Wikileaks promises more DNC documents to come. Suspicions revive that the Cyber Caliphate may be a false-flag operation and other notes on the difficulty of attribution. Dridex may be present in some SWIFT-related bank fraud. Angler seems gone for good (but replaced by other exploit kits). UK MPs suggest holding CEO's responsible for breaches by hitting their pay. Tanium and FireEye and their rejected suitors. DoJ responds to the Silk Road appeal. Jonathan Katz from the University of Maryland explains the Etherium/DAO cryptocurrency heist, and Ryan Stolte from Bay Dynamics share results from a report on board room engagement with cyber. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we review the bidding over responsibility for the DNC hack—most observers still think signs point toward Moscow. Wikileaks promises more DNC documents to come. Suspicions revive that the Cyber Caliphate may be a false-flag operation and other notes on the difficulty of attribution. Dridex may be present in some SWIFT-related bank fraud. Angler seems gone for good (but replaced by other exploit kits). UK MPs suggest holding CEO's responsible for breaches by hitting their pay. Tanium and FireEye and their rejected suitors. DoJ responds to the Silk Road appeal. Jonathan Katz from the University of Maryland explains the Etherium/DAO cryptocurrency heist, and Ryan Stolte from Bay Dynamics share results from a report on board room engagement with cyber. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>991</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[45623635819ee73ed68be6738446035a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3973481348.mp3?updated=1689601231" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Car hacking. Flash Player Patched. DNC hack updates, fighting terror in cyberspace.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/123/notes</link>
      <description>In today's podcast we continue to follow the developing story of the Democratic National Committee hack (Russia denies responsibility, but CrowdStrike stands by its attribution). DNC chair Wasserman Schultz says no financial information was lost, and on cue Guccifer 2.0 produces some. The FBI continues its probe of possible ISIS connections to the Orlando killings. Researchers describe an approach to developing intelligence from social media. FireEye is said to be uninterested in being acquired. Tanium's not interested, either. Some serious bugs are addressed this week. Dale Drew from Level 3 compares honey pots to live data and Craig Smith from Open Garages takes us on the road to car hacking.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 17 Jun 2016 20:07:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>123</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c315bbb6-def8-11ea-911f-ef25c58221bb/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Car hacking. Flash Player Patched. DNC hack updates, fighting terror in cyberspace.</itunes:subtitle>
      <itunes:summary>In today's podcast we continue to follow the developing story of the Democratic National Committee hack (Russia denies responsibility, but CrowdStrike stands by its attribution). DNC chair Wasserman Schultz says no financial information was lost, and on cue Guccifer 2.0 produces some. The FBI continues its probe of possible ISIS connections to the Orlando killings. Researchers describe an approach to developing intelligence from social media. FireEye is said to be uninterested in being acquired. Tanium's not interested, either. Some serious bugs are addressed this week. Dale Drew from Level 3 compares honey pots to live data and Craig Smith from Open Garages takes us on the road to car hacking.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we continue to follow the developing story of the Democratic National Committee hack (Russia denies responsibility, but CrowdStrike stands by its attribution). DNC chair Wasserman Schultz says no financial information was lost, and on cue Guccifer 2.0 produces some. The FBI continues its probe of possible ISIS connections to the Orlando killings. Researchers describe an approach to developing intelligence from social media. FireEye is said to be uninterested in being acquired. Tanium's not interested, either. Some serious bugs are addressed this week. Dale Drew from Level 3 compares honey pots to live data and Craig Smith from Open Garages takes us on the road to car hacking.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1331</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3002f855d6e3e303b9e7a12111227e3b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6366429874.mp3?updated=1608753126" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: xDedic, Guccifer 2.0...but what really knocks us out is those cheap sunglasses.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/122/notes</link>
      <description>In today's podcast we look at developments in the Panama Papers case. A "lone hacker" going by "Guccifer 2.0" claims the DNC hack, but CrowdStrike stands by its attribution to Russian intelligence. Investigators look at Orlando shooter Mateen's online history. Anonymous hits ISIS in cyberspace, and so does US JTF-Ares. xDedic is the latest black market: it deals in server access. Telegram denies being vulnerable. Admins complain about one of Microsoft's June patches. Quintessence Lab's Vikram Sharma tells us about quantum key encryption. And we hear from Wandera's Michael Covington about the true cost of buying cheap sunglasses online.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 16 Jun 2016 19:29:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>122</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c33222f6-def8-11ea-911f-1fa8b5cc6673/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: xDedic, Guccifer 2.0...but what really knocks us out is those cheap sunglasses.</itunes:subtitle>
      <itunes:summary>In today's podcast we look at developments in the Panama Papers case. A "lone hacker" going by "Guccifer 2.0" claims the DNC hack, but CrowdStrike stands by its attribution to Russian intelligence. Investigators look at Orlando shooter Mateen's online history. Anonymous hits ISIS in cyberspace, and so does US JTF-Ares. xDedic is the latest black market: it deals in server access. Telegram denies being vulnerable. Admins complain about one of Microsoft's June patches. Quintessence Lab's Vikram Sharma tells us about quantum key encryption. And we hear from Wandera's Michael Covington about the true cost of buying cheap sunglasses online.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we look at developments in the Panama Papers case. A "lone hacker" going by "Guccifer 2.0" claims the DNC hack, but CrowdStrike stands by its attribution to Russian intelligence. Investigators look at Orlando shooter Mateen's online history. Anonymous hits ISIS in cyberspace, and so does US JTF-Ares. xDedic is the latest black market: it deals in server access. Telegram denies being vulnerable. Admins complain about one of Microsoft's June patches. Quintessence Lab's Vikram Sharma tells us about quantum key encryption. And we hear from Wandera's Michael Covington about the true cost of buying cheap sunglasses online.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1000</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[490d58bd3ae2d135b17da758d502f1ea]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1519885495.mp3?updated=1689601306" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Run DNC has legs. NFL players get social media savvy. Online jihad. More big breaches.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/121/notes</link>
      <description>In today's podcast, we follow up on Russian intelligence services' hacks of the US Democratic National Committee, and their connection with other cyber espionage campaigns. We hear about more Chinese government industrial spying. ISIS claims to the Orlando shooter as one of its own as the civilized world continues to grope toward an understanding of ISIS information operations. More breaches add more credentials (and server access) to the black market. We take a quick look at Patch Tuesday. Charles Clancy from the Hume Center at Virginia Tech gives us a lesson in information sharing, and Vinny D'Agostino from K2 Intelligence shares how they're helping NFL players stay safe on social media. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 15 Jun 2016 18:32:25 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>121</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c34751d0-def8-11ea-911f-b31681a697d0/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Run DNC has legs. NFL players get social media savvy. Online jihad. More big breaches.</itunes:subtitle>
      <itunes:summary>In today's podcast, we follow up on Russian intelligence services' hacks of the US Democratic National Committee, and their connection with other cyber espionage campaigns. We hear about more Chinese government industrial spying. ISIS claims to the Orlando shooter as one of its own as the civilized world continues to grope toward an understanding of ISIS information operations. More breaches add more credentials (and server access) to the black market. We take a quick look at Patch Tuesday. Charles Clancy from the Hume Center at Virginia Tech gives us a lesson in information sharing, and Vinny D'Agostino from K2 Intelligence shares how they're helping NFL players stay safe on social media. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we follow up on Russian intelligence services' hacks of the US Democratic National Committee, and their connection with other cyber espionage campaigns. We hear about more Chinese government industrial spying. ISIS claims to the Orlando shooter as one of its own as the civilized world continues to grope toward an understanding of ISIS information operations. More breaches add more credentials (and server access) to the black market. We take a quick look at Patch Tuesday. Charles Clancy from the Hume Center at Virginia Tech gives us a lesson in information sharing, and Vinny D'Agostino from K2 Intelligence shares how they're helping NFL players stay safe on social media. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>906</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[76571d616f5ad0ec33a4e110ec0828f2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6618141766.mp3?updated=1689601368" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Run DNC. Online inspiration and the limits of investigation. North Korean cyber ops.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/120/notes</link>
      <description>In today's podcast, we talk about the breaking news concerning Russia's hack of the DNC, with insights from STEALTHbits Technologies' Adam Laub. We discuss the state of the investigation into what, if any, role online inspiration played in the Orlando gunman's massacre. North Korea appears to have engaged in a long-running campaign of cyber espionage against the South. The Molerats' failure to clear document information may have unmasked them. The Vawtrak banking Trojan gets more evasive. Shadow apps place enterprises at risk, and application collusion disturbs mobile users. The Angler exploit kit has practically vanished, replaced for the most part by Neutrino. Symantec's acquisition of Blue Coat fuels M&amp;A speculation. And the price of that Windows LPE zero day keeps dropping. Ben Yelin reviews a judge's ruling that restricts the FBI's use of hacking. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 14 Jun 2016 20:00:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>120</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c35c77ae-def8-11ea-911f-1bd160c8d177/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Run DNC. Online inspiration and the limits of investigation. North Korean cyber ops.</itunes:subtitle>
      <itunes:summary>In today's podcast, we talk about the breaking news concerning Russia's hack of the DNC, with insights from STEALTHbits Technologies' Adam Laub. We discuss the state of the investigation into what, if any, role online inspiration played in the Orlando gunman's massacre. North Korea appears to have engaged in a long-running campaign of cyber espionage against the South. The Molerats' failure to clear document information may have unmasked them. The Vawtrak banking Trojan gets more evasive. Shadow apps place enterprises at risk, and application collusion disturbs mobile users. The Angler exploit kit has practically vanished, replaced for the most part by Neutrino. Symantec's acquisition of Blue Coat fuels M&amp;A speculation. And the price of that Windows LPE zero day keeps dropping. Ben Yelin reviews a judge's ruling that restricts the FBI's use of hacking. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we talk about the breaking news concerning Russia's hack of the DNC, with insights from STEALTHbits Technologies' Adam Laub. We discuss the state of the investigation into what, if any, role online inspiration played in the Orlando gunman's massacre. North Korea appears to have engaged in a long-running campaign of cyber espionage against the South. The Molerats' failure to clear document information may have unmasked them. The Vawtrak banking Trojan gets more evasive. Shadow apps place enterprises at risk, and application collusion disturbs mobile users. The Angler exploit kit has practically vanished, replaced for the most part by Neutrino. Symantec's acquisition of Blue Coat fuels M&amp;A speculation. And the price of that Windows LPE zero day keeps dropping. Ben Yelin reviews a judge's ruling that restricts the FBI's use of hacking. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>986</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9430c96d7993979f2cc302d8ec00a282]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6007209482.mp3?updated=1689601199" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Jihadists continue online inspiration. India worries about China's cyber activity. Symantec buys Blue Coat, Microsoft LinkedIn.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/119/notes</link>
      <description>In today's podcast we recap what's known publicly about ISIS inspiration of the apparent jihadist massacre at an Orlando gay club, and consider speculation about ISIS's and its rivals' information operations as ISIS loses territory on the ground. Social media security concerns persist, ransomware's criminal market sees some ups and downs, and we learn about encryption keys from Quintessence Labs. M&amp;A activity sees Symantec buy Blue Coat, and Microsoft pick up LinkedIn. India worries about China's cyber activities. John Leiseboer from Quintessense Labs outlines the importance of key management in cryptography.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 13 Jun 2016 16:59:17 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>119</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c381f54c-def8-11ea-911f-2f7a2d95699e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Jihadists continue online inspiration. India worries about China's cyber activity. Symantec buys Blue Coat, Microsoft LinkedIn.</itunes:subtitle>
      <itunes:summary>In today's podcast we recap what's known publicly about ISIS inspiration of the apparent jihadist massacre at an Orlando gay club, and consider speculation about ISIS's and its rivals' information operations as ISIS loses territory on the ground. Social media security concerns persist, ransomware's criminal market sees some ups and downs, and we learn about encryption keys from Quintessence Labs. M&amp;A activity sees Symantec buy Blue Coat, and Microsoft pick up LinkedIn. India worries about China's cyber activities. John Leiseboer from Quintessense Labs outlines the importance of key management in cryptography.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we recap what's known publicly about ISIS inspiration of the apparent jihadist massacre at an Orlando gay club, and consider speculation about ISIS's and its rivals' information operations as ISIS loses territory on the ground. Social media security concerns persist, ransomware's criminal market sees some ups and downs, and we learn about encryption keys from Quintessence Labs. M&amp;A activity sees Symantec buy Blue Coat, and Microsoft pick up LinkedIn. India worries about China's cyber activities. John Leiseboer from Quintessense Labs outlines the importance of key management in cryptography.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>813</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3f0156dd1532a85fb5f98596e153fdea]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2207289595.mp3?updated=1689601267" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Breach reactions. Attention grid substations: squirrels, and snakes, and monkeys, oh my...</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/118/notes</link>
      <description>In today's podcast we hear from the experts on how old data breaches can cross-contaminate users' other accounts. Point-of-sale problems seem ready to grow in the recent Wendy's incident. Ransomware's shifting landscape sees Locky's distribution botnet vanish (for unclear reasons), Crysis replace TeslaCrypt, and CryptXXX jump exploit kits. Some startups get some nice VC rounds. We hear about the law surrounding mobile location data, and we're reminded of cyber-physical threats to security systems and critical infrastucture. Markus Rauschecker from the University of Maryland Center for Health and Homeland Security reviews an important circuit court privacy decision, and researcher Wesley Wineberg warns us about embedded security cameras.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 10 Jun 2016 19:53:44 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>118</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c398952c-def8-11ea-911f-af87eb141492/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Breach reactions. Attention grid substations: squirrels, and snakes, and monkeys, oh my...</itunes:subtitle>
      <itunes:summary>In today's podcast we hear from the experts on how old data breaches can cross-contaminate users' other accounts. Point-of-sale problems seem ready to grow in the recent Wendy's incident. Ransomware's shifting landscape sees Locky's distribution botnet vanish (for unclear reasons), Crysis replace TeslaCrypt, and CryptXXX jump exploit kits. Some startups get some nice VC rounds. We hear about the law surrounding mobile location data, and we're reminded of cyber-physical threats to security systems and critical infrastucture. Markus Rauschecker from the University of Maryland Center for Health and Homeland Security reviews an important circuit court privacy decision, and researcher Wesley Wineberg warns us about embedded security cameras.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear from the experts on how old data breaches can cross-contaminate users' other accounts. Point-of-sale problems seem ready to grow in the recent Wendy's incident. Ransomware's shifting landscape sees Locky's distribution botnet vanish (for unclear reasons), Crysis replace TeslaCrypt, and CryptXXX jump exploit kits. Some startups get some nice VC rounds. We hear about the law surrounding mobile location data, and we're reminded of cyber-physical threats to security systems and critical infrastucture. Markus Rauschecker from the University of Maryland Center for Health and Homeland Security reviews an important circuit court privacy decision, and researcher Wesley Wineberg warns us about embedded security cameras.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1315</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[954f979cd5193347f2881da7c801364b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3883790055.mp3?updated=1608753116" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Ransomware spreads (backup or pay up?). Safe travels. FTC, NFL embarrassed.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/117/notes</link>
      <description>In today's podcast we follow the latest news and trends with respect to ransomware, now the hottest commodity on the black market, and still able to fetch between $15,000 and $20,000 an extortion. Twitter credentials join VK's in the criminal souk; both sets may have been harvested via earlier breaches in other social media sites. NATO looks into cyber collaboration, workforce development, innovation (Estonia hints low budgets can drive creativity), and the risk of strategic surprise in hybrid warfare. Cylance becomes the industry's latest unicorn with a big Series D funding round. The Johns Hopkins University's Joe Carrigan help us plan our backup strategy, and Scott Petry from Authentic8 offers suggestions for safe browsing while traveling.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 09 Jun 2016 18:03:17 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>117</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c3c19800-def8-11ea-911f-a78ed5856c00/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Ransomware spreads (backup or pay up?). Safe travels. FTC, NFL embarrassed.</itunes:subtitle>
      <itunes:summary>In today's podcast we follow the latest news and trends with respect to ransomware, now the hottest commodity on the black market, and still able to fetch between $15,000 and $20,000 an extortion. Twitter credentials join VK's in the criminal souk; both sets may have been harvested via earlier breaches in other social media sites. NATO looks into cyber collaboration, workforce development, innovation (Estonia hints low budgets can drive creativity), and the risk of strategic surprise in hybrid warfare. Cylance becomes the industry's latest unicorn with a big Series D funding round. The Johns Hopkins University's Joe Carrigan help us plan our backup strategy, and Scott Petry from Authentic8 offers suggestions for safe browsing while traveling.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we follow the latest news and trends with respect to ransomware, now the hottest commodity on the black market, and still able to fetch between $15,000 and $20,000 an extortion. Twitter credentials join VK's in the criminal souk; both sets may have been harvested via earlier breaches in other social media sites. NATO looks into cyber collaboration, workforce development, innovation (Estonia hints low budgets can drive creativity), and the risk of strategic surprise in hybrid warfare. Cylance becomes the industry's latest unicorn with a big Series D funding round. The Johns Hopkins University's Joe Carrigan help us plan our backup strategy, and Scott Petry from Authentic8 offers suggestions for safe browsing while traveling.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>877</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f525ef72e7a866390445ea01bad6544f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7039369073.mp3?updated=1689601098" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: US banks warned to get their security act together. Security trends.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/116/notes</link>
      <description>In today's podcast we hear about trends in phishing, ransomware, and distributed denial-of-service—and none of those trends are particularly good. We hear why some ransomware may keep coming back after it's been removed. US bank regulators warn financial institutions to mind their security manners in the wake of the SWIFT-related fraudulent transfers, and investigation into the Bangladesh Bank hack still point toward Pyongyang (with a slight nod in the direction of Shanghai. The FBI is actively stinging potential jihadists, and Singapore gets ready to wean its civil servants from the Internet at work. And we welcome our newest research partner, Dr. Charles Clancy from Virginia Tech's Hume Center.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 08 Jun 2016 17:19:43 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>116</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c3d5df36-def8-11ea-911f-2fab41a8ec2b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: US banks warned to get their security act together. Security trends.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about trends in phishing, ransomware, and distributed denial-of-service—and none of those trends are particularly good. We hear why some ransomware may keep coming back after it's been removed. US bank regulators warn financial institutions to mind their security manners in the wake of the SWIFT-related fraudulent transfers, and investigation into the Bangladesh Bank hack still point toward Pyongyang (with a slight nod in the direction of Shanghai. The FBI is actively stinging potential jihadists, and Singapore gets ready to wean its civil servants from the Internet at work. And we welcome our newest research partner, Dr. Charles Clancy from Virginia Tech's Hume Center.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about trends in phishing, ransomware, and distributed denial-of-service—and none of those trends are particularly good. We hear why some ransomware may keep coming back after it's been removed. US bank regulators warn financial institutions to mind their security manners in the wake of the SWIFT-related fraudulent transfers, and investigation into the Bangladesh Bank hack still point toward Pyongyang (with a slight nod in the direction of Shanghai. The FBI is actively stinging potential jihadists, and Singapore gets ready to wean its civil servants from the Internet at work. And we welcome our newest research partner, Dr. Charles Clancy from Virginia Tech's Hume Center.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>732</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[98e9c04acf3c3fa02cccb2e9ebbfc9ea]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4698593521.mp3?updated=1689601085" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Hybrid SUV proof-of-concept hack.  Al Qaeda peeks over Twitter's parapet.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/115/notes</link>
      <description>In today's podcast we discuss another in the long-running series of big social media breaches, this one in VK. Password re-users are advised to change not only their credentials, but their ways. Vulnerabilities are reported in Facebook features, and in Ubee VoIP routers. Dale Drew from Level 3 Communications explains that cyber attack traffic in Latin America is up. Raytheon's Dave Amsler shares the findings of a new survey on how companies interact with MSSPs. Al Qaeda makes its way back to Twitter (from Syria). As the US seeks expanded warrantless electronic search authority in terrorism and espionage investigations, observers find themselves thinking that maybe Snowden actually did the NSA some favors.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 07 Jun 2016 17:29:27 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>115</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c3e612e8-def8-11ea-911f-936c5325d2ea/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Hybrid SUV proof-of-concept hack.  Al Qaeda peeks over Twitter's parapet.</itunes:subtitle>
      <itunes:summary>In today's podcast we discuss another in the long-running series of big social media breaches, this one in VK. Password re-users are advised to change not only their credentials, but their ways. Vulnerabilities are reported in Facebook features, and in Ubee VoIP routers. Dale Drew from Level 3 Communications explains that cyber attack traffic in Latin America is up. Raytheon's Dave Amsler shares the findings of a new survey on how companies interact with MSSPs. Al Qaeda makes its way back to Twitter (from Syria). As the US seeks expanded warrantless electronic search authority in terrorism and espionage investigations, observers find themselves thinking that maybe Snowden actually did the NSA some favors.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we discuss another in the long-running series of big social media breaches, this one in VK. Password re-users are advised to change not only their credentials, but their ways. Vulnerabilities are reported in Facebook features, and in Ubee VoIP routers. Dale Drew from Level 3 Communications explains that cyber attack traffic in Latin America is up. Raytheon's Dave Amsler shares the findings of a new survey on how companies interact with MSSPs. Al Qaeda makes its way back to Twitter (from Syria). As the US seeks expanded warrantless electronic search authority in terrorism and espionage investigations, observers find themselves thinking that maybe Snowden actually did the NSA some favors.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>902</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[177aa1fe252c78c627ef563b99bde493]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6252092092.mp3?updated=1689601070" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Sovereign mafia state? Spearphishing with Pay Commission bait. IoT risks.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/114/notes</link>
      <description>In today's podcast we follow developments in the SWIFT-related Bangladesh Bank fraud case—more observers buy into the view that North Korea was involved. Many see anti-racketeering measures being adapted to cyberspace, with businesses improving their security by reducing their attackers' return-on-investment. Pakistani hackers spearphish Indian civil servants and install espionage backdoors. Anti-ISIS measures seem to have heightened ISIS's internal mistrust. Irongate and other IoT threats are discussed, as is a rise in hacker attention to Android. Malek Ben Salem speaks to the challenges of identity in the IoT. Zack Schuler from Ninjio makes the case for entertaining training. And OurMine tweets dadada...
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 06 Jun 2016 19:43:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>114</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c4413a06-def8-11ea-911f-b397aef04369/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Sovereign mafia state? Spearphishing with Pay Commission bait. IoT risks.</itunes:subtitle>
      <itunes:summary>In today's podcast we follow developments in the SWIFT-related Bangladesh Bank fraud case—more observers buy into the view that North Korea was involved. Many see anti-racketeering measures being adapted to cyberspace, with businesses improving their security by reducing their attackers' return-on-investment. Pakistani hackers spearphish Indian civil servants and install espionage backdoors. Anti-ISIS measures seem to have heightened ISIS's internal mistrust. Irongate and other IoT threats are discussed, as is a rise in hacker attention to Android. Malek Ben Salem speaks to the challenges of identity in the IoT. Zack Schuler from Ninjio makes the case for entertaining training. And OurMine tweets dadada...
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we follow developments in the SWIFT-related Bangladesh Bank fraud case—more observers buy into the view that North Korea was involved. Many see anti-racketeering measures being adapted to cyberspace, with businesses improving their security by reducing their attackers' return-on-investment. Pakistani hackers spearphish Indian civil servants and install espionage backdoors. Anti-ISIS measures seem to have heightened ISIS's internal mistrust. Irongate and other IoT threats are discussed, as is a rise in hacker attention to Android. Malek Ben Salem speaks to the challenges of identity in the IoT. Zack Schuler from Ninjio makes the case for entertaining training. And OurMine tweets dadada...</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>894</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0d4f9cdfa16a2540c21d040c0234617d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7725862986.mp3?updated=1689601052" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Money laundering, cyber fraud, lost laptops, &amp; how cyber criminals get paid.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/113/notes</link>
      <description>In today's podcast we review some notes on alleged North Korean involvement in fraudulent SWIFT transfers, and on new US sanctions. We take a look at various corners of the cyber criminal underground, including commodification of both malware and stolen data. Big claims for artificial intelligence are going to involve some big litigation, too. And we hear, again, about the vulnerability of data-at-rest and the importance of encrypting your devices. Ben Yelin from the University of Maryland Center for Health and Homeland security discusses the potential legal ramifications of a Facebook privacy suit, and Joseph Billingsley tells us about the Military Cyber Professionals Association.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 03 Jun 2016 19:23:38 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>113</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c45e91d2-def8-11ea-911f-ab2c609b0c82/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Money laundering, cyber fraud, lost laptops, &amp; how cyber criminals get paid.</itunes:subtitle>
      <itunes:summary>In today's podcast we review some notes on alleged North Korean involvement in fraudulent SWIFT transfers, and on new US sanctions. We take a look at various corners of the cyber criminal underground, including commodification of both malware and stolen data. Big claims for artificial intelligence are going to involve some big litigation, too. And we hear, again, about the vulnerability of data-at-rest and the importance of encrypting your devices. Ben Yelin from the University of Maryland Center for Health and Homeland security discusses the potential legal ramifications of a Facebook privacy suit, and Joseph Billingsley tells us about the Military Cyber Professionals Association.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we review some notes on alleged North Korean involvement in fraudulent SWIFT transfers, and on new US sanctions. We take a look at various corners of the cyber criminal underground, including commodification of both malware and stolen data. Big claims for artificial intelligence are going to involve some big litigation, too. And we hear, again, about the vulnerability of data-at-rest and the importance of encrypting your devices. Ben Yelin from the University of Maryland Center for Health and Homeland security discusses the potential legal ramifications of a Facebook privacy suit, and Joseph Billingsley tells us about the Military Cyber Professionals Association.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1384</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4dea9f182a88aaf69b80533f3828038b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6288165340.mp3?updated=1608753098" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: A look at markets, legitimate and criminal. ICS proof-of-concept exploit.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/112/notes</link>
      <description>In today's podcast we hear about online censorship in China, and an espionage campaign directed against Taiwan. RiskIQ finds that many large companies are riding for the same fall Mossac Fonseca took with the Panama Papers. We talk to Trustwave about that alleged Windows zero-day being sold by cyber criminals, and we hear about some smaller potatoes in the ransomware market. Industry news highlights US Federal contract wins and recent M&amp;A activity. The University of Maryland's Jonathan Katz highlight some new research in random number generation.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 02 Jun 2016 15:32:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>112</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c4763d3c-def8-11ea-911f-e79c6156f065/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: A look at markets, legitimate and criminal. ICS proof-of-concept exploit.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about online censorship in China, and an espionage campaign directed against Taiwan. RiskIQ finds that many large companies are riding for the same fall Mossac Fonseca took with the Panama Papers. We talk to Trustwave about that alleged Windows zero-day being sold by cyber criminals, and we hear about some smaller potatoes in the ransomware market. Industry news highlights US Federal contract wins and recent M&amp;A activity. The University of Maryland's Jonathan Katz highlight some new research in random number generation.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about online censorship in China, and an espionage campaign directed against Taiwan. RiskIQ finds that many large companies are riding for the same fall Mossac Fonseca took with the Panama Papers. We talk to Trustwave about that alleged Windows zero-day being sold by cyber criminals, and we hear about some smaller potatoes in the ransomware market. Industry news highlights US Federal contract wins and recent M&amp;A activity. The University of Maryland's Jonathan Katz highlight some new research in random number generation.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>886</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c187857969ab8c97b7ee119aabd25bb6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6931538894.mp3?updated=1689601025" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Stealth Falcon, OEM issues, black market trends.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/111/notes</link>
      <description>In today's Podcast, we hear about Citizen Lab's discovery of an apparent cyber espionage campaign operating under journalistic cover (and targeting journalists). We discuss the state of the black market for both zero-days and stolen data, and get some recommendations for identity protection from the experts. Venafi talks about the implications of the coming SHA-1 expiration, Joe Carrigan from Johns Hopkins tells us what's wrong with public photo-printing kiosks, and some University of Michigan researchers have a clever, insidious hardware backdoor proof-of-concept.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 01 Jun 2016 18:45:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>111</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c48f8e72-def8-11ea-911f-cffaabd7c58e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Stealth Falcon, OEM issues, black market trends.</itunes:subtitle>
      <itunes:summary>In today's Podcast, we hear about Citizen Lab's discovery of an apparent cyber espionage campaign operating under journalistic cover (and targeting journalists). We discuss the state of the black market for both zero-days and stolen data, and get some recommendations for identity protection from the experts. Venafi talks about the implications of the coming SHA-1 expiration, Joe Carrigan from Johns Hopkins tells us what's wrong with public photo-printing kiosks, and some University of Michigan researchers have a clever, insidious hardware backdoor proof-of-concept.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Podcast, we hear about Citizen Lab's discovery of an apparent cyber espionage campaign operating under journalistic cover (and targeting journalists). We discuss the state of the black market for both zero-days and stolen data, and get some recommendations for identity protection from the experts. Venafi talks about the implications of the coming SHA-1 expiration, Joe Carrigan from Johns Hopkins tells us what's wrong with public photo-printing kiosks, and some University of Michigan researchers have a clever, insidious hardware backdoor proof-of-concept.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>893</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2ce98528d35469b6d1f2f288b42735c7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8084494699.mp3?updated=1689601016" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Social media breach woes,  sector analysts &amp; investor sentiment.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/110/notes</link>
      <description>In today's podcast we hear about the ways in which some old breaches are resurfacing to trouble major social media platforms. Those old breaches are also looking far larger than initially suspected. We learn about "sandjacking" and "bug poaching" as new additions to the lexicon of cyber crime. Analysts continue to think threats will drive cyber industry growth, and venture capital interest seems high, but more selective. Dr. Vikram Sharma from Quintessence explains One Time Pads, and Threat Quotient's Ryan Trost shares the pros and cons of attribution. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 31 May 2016 20:09:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>110</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c4b6507a-def8-11ea-911f-87eab7cf16ee/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Social media breach woes,  sector analysts &amp; investor sentiment.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about the ways in which some old breaches are resurfacing to trouble major social media platforms. Those old breaches are also looking far larger than initially suspected. We learn about "sandjacking" and "bug poaching" as new additions to the lexicon of cyber crime. Analysts continue to think threats will drive cyber industry growth, and venture capital interest seems high, but more selective. Dr. Vikram Sharma from Quintessence explains One Time Pads, and Threat Quotient's Ryan Trost shares the pros and cons of attribution. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about the ways in which some old breaches are resurfacing to trouble major social media platforms. Those old breaches are also looking far larger than initially suspected. We learn about "sandjacking" and "bug poaching" as new additions to the lexicon of cyber crime. Analysts continue to think threats will drive cyber industry growth, and venture capital interest seems high, but more selective. Dr. Vikram Sharma from Quintessence explains One Time Pads, and Threat Quotient's Ryan Trost shares the pros and cons of attribution. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>860</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[afb9b936b67c86d27731346336e5c159]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4883667977.mp3?updated=1689600993" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Crypto wars update, story stocks, AI, encryption, and the usual crime.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/109/notes</link>
      <description>In today's podcast, we discuss the SWIFT transfer issues now under investigation in a dozen more banks. SWIFT announces a five-point security strategy. Attacks on the private sector are seen as having national security implications. Other cyber threats to business--DDoS and ransomware--place availability of data and networks at risk. We take a look at investor interest in cyber stocks, and we talk with experts on artificial intelligence and encryption. And, as far as nation-state attacks are concerned, again, signs point to Pyongyang. (As they so often do.) Malek Ben Salem from Accenture Labs explains AI and Machine Learning, and Brent Waters, of the University of Texas at Austin, who's recently been honored with an early career award from the Association of Computing Machinery for his contributions to encryption.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 27 May 2016 21:00:33 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>109</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c4d95d2c-def8-11ea-911f-07b3b917a49d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Crypto wars update, story stocks, AI, encryption, and the usual crime.</itunes:subtitle>
      <itunes:summary>In today's podcast, we discuss the SWIFT transfer issues now under investigation in a dozen more banks. SWIFT announces a five-point security strategy. Attacks on the private sector are seen as having national security implications. Other cyber threats to business--DDoS and ransomware--place availability of data and networks at risk. We take a look at investor interest in cyber stocks, and we talk with experts on artificial intelligence and encryption. And, as far as nation-state attacks are concerned, again, signs point to Pyongyang. (As they so often do.) Malek Ben Salem from Accenture Labs explains AI and Machine Learning, and Brent Waters, of the University of Texas at Austin, who's recently been honored with an early career award from the Association of Computing Machinery for his contributions to encryption.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we discuss the SWIFT transfer issues now under investigation in a dozen more banks. SWIFT announces a five-point security strategy. Attacks on the private sector are seen as having national security implications. Other cyber threats to business--DDoS and ransomware--place availability of data and networks at risk. We take a look at investor interest in cyber stocks, and we talk with experts on artificial intelligence and encryption. And, as far as nation-state attacks are concerned, again, signs point to Pyongyang. (As they so often do.) Malek Ben Salem from Accenture Labs explains AI and Machine Learning, and Brent Waters, of the University of Texas at Austin, who's recently been honored with an early career award from the Association of Computing Machinery for his contributions to encryption.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1276</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a48dae5894a706411d2be841db9fdb10]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5914052174.mp3?updated=1608753104" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Ransomware threats. Industry (mostly good) news. US State Department IG reports on email.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/108/notes</link>
      <description>In today's podcast we hear about security in international banking, some developments in the world of malware, and how presidential impersonation and a big loss cost a CEO his job. Analysts like some of the bigger cyber players (and they're waiting for Palo Alto's results tonight). VCs back three security companies with new funding. The State Department IG's report on email retention and security is out. DARPA wants to secure legacy IT systems, and US SOCOM wants innovative cyber tools. Dale Drew from Level 3 Communications walks us through the negotiations of ransomware, and Danny Rogers from Terbium Labs explains how to search for something when you don't know what that something is.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 26 May 2016 19:14:08 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>108</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c4f2d6b2-def8-11ea-911f-9f161a80b948/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Ransomware threats. Industry (mostly good) news. US State Department IG reports on email.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about security in international banking, some developments in the world of malware, and how presidential impersonation and a big loss cost a CEO his job. Analysts like some of the bigger cyber players (and they're waiting for Palo Alto's results tonight). VCs back three security companies with new funding. The State Department IG's report on email retention and security is out. DARPA wants to secure legacy IT systems, and US SOCOM wants innovative cyber tools. Dale Drew from Level 3 Communications walks us through the negotiations of ransomware, and Danny Rogers from Terbium Labs explains how to search for something when you don't know what that something is.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about security in international banking, some developments in the world of malware, and how presidential impersonation and a big loss cost a CEO his job. Analysts like some of the bigger cyber players (and they're waiting for Palo Alto's results tonight). VCs back three security companies with new funding. The State Department IG's report on email retention and security is out. DARPA wants to secure legacy IT systems, and US SOCOM wants innovative cyber tools. Dale Drew from Level 3 Communications walks us through the negotiations of ransomware, and Danny Rogers from Terbium Labs explains how to search for something when you don't know what that something is.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>899</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[02e27164d8c6f2bc2094a9ba94c8286a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7954318790.mp3?updated=1689600964" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Ransomware &amp; DDoS combining. Malicious USB chargers. Cyber ops aren't 'bombs?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/107/notes</link>
      <description>In today's podcast, we hear about the current state of ransomware, why criminals like it, and what can be done about it. Keyloggers are being distributed by malicious USB charging devices. Blue Coat may be headed for an IPO. US cyber operations have been called "cyber bombs," but they may be a lot more like battlespace preparation (and so traditional EW and intelligence). Microsoft Azure Active Directory does something about bad passwords. And Markus Rauschecker from the University of Maryland Center for Health and Homeland Security explains why the FCC and FTC are holding back on IoT regulation.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 25 May 2016 19:20:47 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>107</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c50842e0-def8-11ea-911f-174b1d032f74/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Ransomware &amp; DDoS combining. Malicious USB chargers. Cyber ops aren't 'bombs?</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about the current state of ransomware, why criminals like it, and what can be done about it. Keyloggers are being distributed by malicious USB charging devices. Blue Coat may be headed for an IPO. US cyber operations have been called "cyber bombs," but they may be a lot more like battlespace preparation (and so traditional EW and intelligence). Microsoft Azure Active Directory does something about bad passwords. And Markus Rauschecker from the University of Maryland Center for Health and Homeland Security explains why the FCC and FTC are holding back on IoT regulation.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about the current state of ransomware, why criminals like it, and what can be done about it. Keyloggers are being distributed by malicious USB charging devices. Blue Coat may be headed for an IPO. US cyber operations have been called "cyber bombs," but they may be a lot more like battlespace preparation (and so traditional EW and intelligence). Microsoft Azure Active Directory does something about bad passwords. And Markus Rauschecker from the University of Maryland Center for Health and Homeland Security explains why the FCC and FTC are holding back on IoT regulation.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>765</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1f31c8b344ebc0f85ea24961cc00d504]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4333781749.mp3?updated=1689600948" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Good guy update: SWIFT. Bad guy update: Turla, CryptXXX, DMA Locker, Flash 0-day... Bonus: Scunthorpe Problem.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/106/notes</link>
      <description>In today's podcast, we hear about Turla's return, this time in an espionage campaign against Switzerland's RUAG. The Panama Papers and other hacks prompt reiteration of lots of good, if familiar advice, some of it directed at the US Congress and other small businesses. The TeslaCrypt proprietors seem less remorseful than resourceful, as they shift to CryptXXX. SWIFT plans to announce a security upgrade today. US Cyber Command announces the winners of its $460 million IDIQ. Guccifer prepares to cop a plea, and the Scunthorpe Problem surfaces in Oxfordshire. We also hear about cloud storage security from Quintessence Labs, and Protemus talks to us about medical records' privacy.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 24 May 2016 17:50:52 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>106</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c51fce1a-def8-11ea-911f-ab0b4104531e/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Good guy update: SWIFT. Bad guy update: Turla, CryptXXX, DMA Locker, Flash 0-day... Bonus: Scunthorpe Problem.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about Turla's return, this time in an espionage campaign against Switzerland's RUAG. The Panama Papers and other hacks prompt reiteration of lots of good, if familiar advice, some of it directed at the US Congress and other small businesses. The TeslaCrypt proprietors seem less remorseful than resourceful, as they shift to CryptXXX. SWIFT plans to announce a security upgrade today. US Cyber Command announces the winners of its $460 million IDIQ. Guccifer prepares to cop a plea, and the Scunthorpe Problem surfaces in Oxfordshire. We also hear about cloud storage security from Quintessence Labs, and Protemus talks to us about medical records' privacy.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about Turla's return, this time in an espionage campaign against Switzerland's RUAG. The Panama Papers and other hacks prompt reiteration of lots of good, if familiar advice, some of it directed at the US Congress and other small businesses. The TeslaCrypt proprietors seem less remorseful than resourceful, as they shift to CryptXXX. SWIFT plans to announce a security upgrade today. US Cyber Command announces the winners of its $460 million IDIQ. Guccifer prepares to cop a plea, and the Scunthorpe Problem surfaces in Oxfordshire. We also hear about cloud storage security from Quintessence Labs, and Protemus talks to us about medical records' privacy.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>883</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8bfbbc03170a74e480e51299ed19b0c0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1313325121.mp3?updated=1689600932" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: SWIFT seeks better security, what business wants from (US, UK) government, fast exploits.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/105/notes</link>
      <description>In today's podcast, we hear about attempts by SWIFT to work toward upgraded security with clients. Japan sustains a coordinated looting of ATMs (to the tune of ¥1.44 billion). Operation Ke3chang returns to snoop on Indian diplomatic missions. ISIS returns to inspiration. Business gives advice to government in the UK and the US, and investors see recent cyber stock price corrections as, maybe, a buying opportunity. We learn about monitoring your wireless attack surface from Pwnie Express' Paul Paget. And Joe Carrigan from Johns Hopkins Information Security Institute shares how they keep Mom safe online, Baltimore style.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 23 May 2016 20:11:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>105</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c540a7b6-def8-11ea-911f-5feaaff8cf11/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: SWIFT seeks better security, what business wants from (US, UK) government, fast exploits.</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about attempts by SWIFT to work toward upgraded security with clients. Japan sustains a coordinated looting of ATMs (to the tune of ¥1.44 billion). Operation Ke3chang returns to snoop on Indian diplomatic missions. ISIS returns to inspiration. Business gives advice to government in the UK and the US, and investors see recent cyber stock price corrections as, maybe, a buying opportunity. We learn about monitoring your wireless attack surface from Pwnie Express' Paul Paget. And Joe Carrigan from Johns Hopkins Information Security Institute shares how they keep Mom safe online, Baltimore style.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about attempts by SWIFT to work toward upgraded security with clients. Japan sustains a coordinated looting of ATMs (to the tune of ¥1.44 billion). Operation Ke3chang returns to snoop on Indian diplomatic missions. ISIS returns to inspiration. Business gives advice to government in the UK and the US, and investors see recent cyber stock price corrections as, maybe, a buying opportunity. We learn about monitoring your wireless attack surface from Pwnie Express' Paul Paget. And Joe Carrigan from Johns Hopkins Information Security Institute shares how they keep Mom safe online, Baltimore style.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>883</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3267d5fb95b9209fa5db01ce5a02bf7b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6245913749.mp3?updated=1689600918" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: TeslaCrypt says "sorry, here's the key." 50-cent-ers troll China.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/104/notes</link>
      <description>In today's podcast, we follow moves to upgrade US Cyber Command to a Unified Combatant Command. We follow developments in Operation Groundbait, Phineas Phisher's latest, and the discovery of China's 50-cent-ers. Conficker is still out and active eight years after patching We take a look at industry news, and hear about how TeslaCrypt may be closing up shop. Our expert today is Accenture Labs' Malek Ben Salem who discusses semantic technology for cyber defense. We'll also hear from historian and author Abby Smith Rumsey who'll talk about her book, “When We are No More: How Digital Memory Memory Will Shape Our Future." 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 20 May 2016 20:12:49 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>104</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c555ac42-def8-11ea-911f-a30337b4e1fc/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: TeslaCrypt says "sorry, here's the key." 50-cent-ers troll China.</itunes:subtitle>
      <itunes:summary>In today's podcast, we follow moves to upgrade US Cyber Command to a Unified Combatant Command. We follow developments in Operation Groundbait, Phineas Phisher's latest, and the discovery of China's 50-cent-ers. Conficker is still out and active eight years after patching We take a look at industry news, and hear about how TeslaCrypt may be closing up shop. Our expert today is Accenture Labs' Malek Ben Salem who discusses semantic technology for cyber defense. We'll also hear from historian and author Abby Smith Rumsey who'll talk about her book, “When We are No More: How Digital Memory Memory Will Shape Our Future." 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we follow moves to upgrade US Cyber Command to a Unified Combatant Command. We follow developments in Operation Groundbait, Phineas Phisher's latest, and the discovery of China's 50-cent-ers. Conficker is still out and active eight years after patching We take a look at industry news, and hear about how TeslaCrypt may be closing up shop. Our expert today is Accenture Labs' Malek Ben Salem who discusses semantic technology for cyber defense. We'll also hear from historian and author Abby Smith Rumsey who'll talk about her book, “When We are No More: How Digital Memory Memory Will Shape Our Future." </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1264</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[64c183f5023bdbc0dcf26cade2878994]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8630991152.mp3?updated=1608753070" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Cyber-chumming the Donbas. Cisco surprises (in a good way).</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/103/notes</link>
      <description>In today's podcast, we learn that the LinkedIn breach is the same old one from 2012, only now two orders of magnitude larger than thought. ESET describes a cyber surveillance campaign, Operation Groundbait, in Ukraine's Donbas region. Phineas Phisher hacks on behalf of Kurdish anti-capitalists. The SEC warns of cyber risks to the financial sector. Cisco reports better than expected results (thanks in part to its security business). Ben Yelin from the University of Maryland Center for Health and Homeland Security wonders if a case involving locked hard drive may go to the Supreme Court.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 19 May 2016 17:44:40 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>103</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c56d6850-def8-11ea-911f-cfba6e8e9d99/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Cyber-chumming the Donbas. Cisco surprises (in a good way).</itunes:subtitle>
      <itunes:summary>In today's podcast, we learn that the LinkedIn breach is the same old one from 2012, only now two orders of magnitude larger than thought. ESET describes a cyber surveillance campaign, Operation Groundbait, in Ukraine's Donbas region. Phineas Phisher hacks on behalf of Kurdish anti-capitalists. The SEC warns of cyber risks to the financial sector. Cisco reports better than expected results (thanks in part to its security business). Ben Yelin from the University of Maryland Center for Health and Homeland Security wonders if a case involving locked hard drive may go to the Supreme Court.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we learn that the LinkedIn breach is the same old one from 2012, only now two orders of magnitude larger than thought. ESET describes a cyber surveillance campaign, Operation Groundbait, in Ukraine's Donbas region. Phineas Phisher hacks on behalf of Kurdish anti-capitalists. The SEC warns of cyber risks to the financial sector. Cisco reports better than expected results (thanks in part to its security business). Ben Yelin from the University of Maryland Center for Health and Homeland Security wonders if a case involving locked hard drive may go to the Supreme Court.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>754</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[99aea4bd043c1c437ca6beddda6a3fac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5837552801.mp3?updated=1689600886" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: LinkedIn may have been breached. Malicious apps, a new Skimmer, and honor among thieves.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/102/notes</link>
      <description>In today's podcast we discuss a breaking story about what's potentially a very large breach at LinkedIn. Banks' interactions with SWIFT (not SWIFT itself, necessarily) concern observers. Malware and scareware appear in the Play Store. China interrogates Apple, Cisco, and Microsoft about security. We hear about ways in which participants in black markets evolve to function more like legitimate enterprises. University of Maryland professor Jonathan Katz unlocks the secrets of cracking ransomware, and Zimperium's John Michelsen says it's time to be proactive with the defense of our mobile devices.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 18 May 2016 18:51:24 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>102</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c58d1e5c-def8-11ea-911f-e70761fa1e64/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: LinkedIn may have been breached. Malicious apps, a new Skimmer, and honor among thieves.</itunes:subtitle>
      <itunes:summary>In today's podcast we discuss a breaking story about what's potentially a very large breach at LinkedIn. Banks' interactions with SWIFT (not SWIFT itself, necessarily) concern observers. Malware and scareware appear in the Play Store. China interrogates Apple, Cisco, and Microsoft about security. We hear about ways in which participants in black markets evolve to function more like legitimate enterprises. University of Maryland professor Jonathan Katz unlocks the secrets of cracking ransomware, and Zimperium's John Michelsen says it's time to be proactive with the defense of our mobile devices.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we discuss a breaking story about what's potentially a very large breach at LinkedIn. Banks' interactions with SWIFT (not SWIFT itself, necessarily) concern observers. Malware and scareware appear in the Play Store. China interrogates Apple, Cisco, and Microsoft about security. We hear about ways in which participants in black markets evolve to function more like legitimate enterprises. University of Maryland professor Jonathan Katz unlocks the secrets of cracking ransomware, and Zimperium's John Michelsen says it's time to be proactive with the defense of our mobile devices.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>877</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d0a10ccaffd621ba030c23fafd4af23d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2911870546.mp3?updated=1689600793" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Current exploits and bugs, fraught China-US cyber relations, and industry notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/101/notes</link>
      <description>Today we discuss some exploits running loose in the wild. GSA's 18F unit cleans up its Slack implementation and shares its lessons learned from a potential breach. Older Android devices are susceptible to an Accessibility exploit. A million-device clickfraud botnet drains advertising budgets. A new cyber espionage campaign prefers quality to quantity. SWIFT gets security advices. ISIS shifts recruiting focus to Central Asia. Cyber tensions rise between the US and China. Dale Drew from Level 3 shares the perspective of a backbone provider, and Yong-Gon Chon wonder if company's don't overreact to breaches. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 17 May 2016 21:53:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>101</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c5a5d604-def8-11ea-911f-232afd674b91/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Current exploits and bugs, fraught China-US cyber relations, and industry notes.</itunes:subtitle>
      <itunes:summary>Today we discuss some exploits running loose in the wild. GSA's 18F unit cleans up its Slack implementation and shares its lessons learned from a potential breach. Older Android devices are susceptible to an Accessibility exploit. A million-device clickfraud botnet drains advertising budgets. A new cyber espionage campaign prefers quality to quantity. SWIFT gets security advices. ISIS shifts recruiting focus to Central Asia. Cyber tensions rise between the US and China. Dale Drew from Level 3 shares the perspective of a backbone provider, and Yong-Gon Chon wonder if company's don't overreact to breaches. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we discuss some exploits running loose in the wild. GSA's 18F unit cleans up its Slack implementation and shares its lessons learned from a potential breach. Older Android devices are susceptible to an Accessibility exploit. A million-device clickfraud botnet drains advertising budgets. A new cyber espionage campaign prefers quality to quantity. SWIFT gets security advices. ISIS shifts recruiting focus to Central Asia. Cyber tensions rise between the US and China. Dale Drew from Level 3 shares the perspective of a backbone provider, and Yong-Gon Chon wonder if company's don't overreact to breaches. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>930</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ab0c42589979bce3604b750fc5a5e6bf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5858883376.mp3?updated=1689600773" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Social media collection suggests ISIS in trouble. Russian government cyber activities. US VA wants dark web help.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/100/notes</link>
      <description>In today's podcast we discuss Germany's attribution of an ongoing cyber espionage campaign: it's Russia, says the BfV. Bank attacks continue, both related to, and unrelated to, the SWIFT funds transfer system (and some seem criminal, some hacktivist in motivation). Russia says it plans to close about 4000 sites for trafficking in extremist ideology and drugs. Markets look forward to the next cyber security bellwether stock to report. And John Leiseboer from Quintessence Labs explains random number generation.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 16 May 2016 18:46:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>100</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c5c20bc6-def8-11ea-911f-3f2463e38093/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Social media collection suggests ISIS in trouble. Russian government cyber activities. US VA wants dark web help.</itunes:subtitle>
      <itunes:summary>In today's podcast we discuss Germany's attribution of an ongoing cyber espionage campaign: it's Russia, says the BfV. Bank attacks continue, both related to, and unrelated to, the SWIFT funds transfer system (and some seem criminal, some hacktivist in motivation). Russia says it plans to close about 4000 sites for trafficking in extremist ideology and drugs. Markets look forward to the next cyber security bellwether stock to report. And John Leiseboer from Quintessence Labs explains random number generation.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we discuss Germany's attribution of an ongoing cyber espionage campaign: it's Russia, says the BfV. Bank attacks continue, both related to, and unrelated to, the SWIFT funds transfer system (and some seem criminal, some hacktivist in motivation). Russia says it plans to close about 4000 sites for trafficking in extremist ideology and drugs. Markets look forward to the next cyber security bellwether stock to report. And John Leiseboer from Quintessence Labs explains random number generation.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>812</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f5e1027c6a58e7660dcf1a5b6ac43a80]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9925948864.mp3?updated=1689600757" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Android issues, SWIFT hacks, the cyber security marketplace.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/99/notes</link>
      <description>In today's podcast, we look back at the week just ending and see new attempts on banking systems. Some involve SWIFT; others involve Anonymous, and some have to do with the FDIC. And what about those fingerprints? Markus Rauschecker from the Center for Health and Homeland Security examines the increased scrutiny the FTC and FCC are putting on mobile device providers. And we interview Dr. Emma Garrison-Alexander about her leadership positions with NSA, TSA and UMUC.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 13 May 2016 17:20:54 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>99</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c5dc8abe-def8-11ea-911f-9b16fdf6ba01/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Android issues, SWIFT hacks, the cyber security marketplace.</itunes:subtitle>
      <itunes:summary>In today's podcast, we look back at the week just ending and see new attempts on banking systems. Some involve SWIFT; others involve Anonymous, and some have to do with the FDIC. And what about those fingerprints? Markus Rauschecker from the Center for Health and Homeland Security examines the increased scrutiny the FTC and FCC are putting on mobile device providers. And we interview Dr. Emma Garrison-Alexander about her leadership positions with NSA, TSA and UMUC.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we look back at the week just ending and see new attempts on banking systems. Some involve SWIFT; others involve Anonymous, and some have to do with the FDIC. And what about those fingerprints? Markus Rauschecker from the Center for Health and Homeland Security examines the increased scrutiny the FTC and FCC are putting on mobile device providers. And we interview Dr. Emma Garrison-Alexander about her leadership positions with NSA, TSA and UMUC.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1390</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[03b2e5635f19fd948b0e16df2739599f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7392870047.mp3?updated=1608743923" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: US-CERT warns of SAP issues. Business disruption big criminal business. A talk with IBM about Watson.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/98/notes</link>
      <description>In today's podcast we discuss a warning from US-CERT and Onapsis against some old but active SAP vulnerabilities. Pawn Storm is back, and active against German political targets. DDoS-for-hire is proving lucrative, as is ransomware. Joe Carrigan from Johns Hopkins University Information Security Institute explains what you should do when you get suspicious-looking email. IBM speaks with us about their cyber security plans for their Watson AI.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 12 May 2016 19:38:53 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>98</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c5efd15a-def8-11ea-911f-97fddc8bb1df/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: US-CERT warns of SAP issues. Business disruption big criminal business. A talk with IBM about Watson.</itunes:subtitle>
      <itunes:summary>In today's podcast we discuss a warning from US-CERT and Onapsis against some old but active SAP vulnerabilities. Pawn Storm is back, and active against German political targets. DDoS-for-hire is proving lucrative, as is ransomware. Joe Carrigan from Johns Hopkins University Information Security Institute explains what you should do when you get suspicious-looking email. IBM speaks with us about their cyber security plans for their Watson AI.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we discuss a warning from US-CERT and Onapsis against some old but active SAP vulnerabilities. Pawn Storm is back, and active against German political targets. DDoS-for-hire is proving lucrative, as is ransomware. Joe Carrigan from Johns Hopkins University Information Security Institute explains what you should do when you get suspicious-looking email. IBM speaks with us about their cyber security plans for their Watson AI.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>826</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2a34a949afaff04c9bcef5a88a700154]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6156656117.mp3?updated=1689600729" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Reports of venture capital's death seem much exaggerated. Quantum technology, adapted to the meanest understanding.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/97/notes</link>
      <description>We run through some of the high points of May's Patch Tuesday. We get updates on Viking Horde Android malware and Bucbi ransomware. Venture capital seeks out IoT security investments as Pwnie Express and Bayshore Networks attract funding. Quintessence Labs' Dr. Vikram Sharma explains emerging quantum technologies. And IBM will train Watson to deal with cyber security issues. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 11 May 2016 19:34:17 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>97</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c61ba582-def8-11ea-911f-eb9c92d91a62/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Reports of venture capital's death seem much exaggerated. Quantum technology, adapted to the meanest understanding.</itunes:subtitle>
      <itunes:summary>We run through some of the high points of May's Patch Tuesday. We get updates on Viking Horde Android malware and Bucbi ransomware. Venture capital seeks out IoT security investments as Pwnie Express and Bayshore Networks attract funding. Quintessence Labs' Dr. Vikram Sharma explains emerging quantum technologies. And IBM will train Watson to deal with cyber security issues. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>We run through some of the high points of May's Patch Tuesday. We get updates on Viking Horde Android malware and Bucbi ransomware. Venture capital seeks out IoT security investments as Pwnie Express and Bayshore Networks attract funding. Quintessence Labs' Dr. Vikram Sharma explains emerging quantum technologies. And IBM will train Watson to deal with cyber security issues. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>760</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aa44f08dffdf3b86422d6cebb59f62ea]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9004120733.mp3?updated=1689600715" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Ransomware evolves (and gets brutal). Dataminr blocks IC--bad Gov-industry blood?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/96/notes</link>
      <description>In today's podcast we hear about the Panama Papers database. We also discuss updates concerning the Bangladesh Bank heist investigation. New ad-fraud malware, Viking Horde, shows up in the Google Play Store. In ransomware news, CryptXXX is no longer so easily decrypted, Bucbi exploits RDP vulnerabilities, and Triumfant shares what they've learned about Locky. We also talk to Accenture's Malek Ben Salem about big data security frameworks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 10 May 2016 18:36:36 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>96</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c62e7c52-def8-11ea-911f-974436cb43be/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Ransomware evolves (and gets brutal). Dataminr blocks IC--bad Gov-industry blood?</itunes:subtitle>
      <itunes:summary>In today's podcast we hear about the Panama Papers database. We also discuss updates concerning the Bangladesh Bank heist investigation. New ad-fraud malware, Viking Horde, shows up in the Google Play Store. In ransomware news, CryptXXX is no longer so easily decrypted, Bucbi exploits RDP vulnerabilities, and Triumfant shares what they've learned about Locky. We also talk to Accenture's Malek Ben Salem about big data security frameworks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear about the Panama Papers database. We also discuss updates concerning the Bangladesh Bank heist investigation. New ad-fraud malware, Viking Horde, shows up in the Google Play Store. In ransomware news, CryptXXX is no longer so easily decrypted, Bucbi exploits RDP vulnerabilities, and Triumfant shares what they've learned about Locky. We also talk to Accenture's Malek Ben Salem about big data security frameworks.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>885</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[00cb74e8bae4ea48e4028eb9fa6204ff]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7492233449.mp3?updated=1689600705" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Panama Papers updates, info ops, pro- &amp; anti-ISIS, market jitters.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/95/notes</link>
      <description>In today's podcast we follow the progress of anti-banking DDoS hacktivism Operation Icarus. The Panama Papers are released in the form of a searchable database. Some apparently big compromises look a bit recycled. Victims' willingness to pay keeps the ransomware black market primed. Investor disappointment depresses security company valuations. We talk with the University of Maryland's Ben Yelin about how law lags technological advance, and GCHQ says don't be too quick to change passwords.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 09 May 2016 20:31:45 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>95</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c65a79e2-def8-11ea-911f-67e7d35483c6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Panama Papers updates, info ops, pro- &amp; anti-ISIS, market jitters.</itunes:subtitle>
      <itunes:summary>In today's podcast we follow the progress of anti-banking DDoS hacktivism Operation Icarus. The Panama Papers are released in the form of a searchable database. Some apparently big compromises look a bit recycled. Victims' willingness to pay keeps the ransomware black market primed. Investor disappointment depresses security company valuations. We talk with the University of Maryland's Ben Yelin about how law lags technological advance, and GCHQ says don't be too quick to change passwords.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we follow the progress of anti-banking DDoS hacktivism Operation Icarus. The Panama Papers are released in the form of a searchable database. Some apparently big compromises look a bit recycled. Victims' willingness to pay keeps the ransomware black market primed. Investor disappointment depresses security company valuations. We talk with the University of Maryland's Ben Yelin about how law lags technological advance, and GCHQ says don't be too quick to change passwords.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>742</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1ef93d66ec0e312dc9514e66a1f638d6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5534412145.mp3?updated=1689600689" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Responsible disclosure &amp; why the cool miscreants are on Twitter.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/94/notes</link>
      <description>Today we hear about what's going on with proof-of-concept exploits. Ransomware continued its run this week, but DDoS shouldn't be forgotten, either--it's good for both business interruption and misdirection. Thoughts on those 270 million email credentials. A couple of big security companies post Q1 results, and Adrian Turner, CEO of Australia's Data 61, explains the future of that nation's domestic cyber sector. Dale Drew from Level 3 Communications shares the news of a new DDoS technique. The LAPD succeeds in cracking an iPhone 5s. And where in the world is Satoshi Nakamoto? 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 06 May 2016 19:34:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>94</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c6727c04-def8-11ea-911f-2ba3c4160198/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Responsible disclosure &amp; why the cool miscreants are on Twitter.</itunes:subtitle>
      <itunes:summary>Today we hear about what's going on with proof-of-concept exploits. Ransomware continued its run this week, but DDoS shouldn't be forgotten, either--it's good for both business interruption and misdirection. Thoughts on those 270 million email credentials. A couple of big security companies post Q1 results, and Adrian Turner, CEO of Australia's Data 61, explains the future of that nation's domestic cyber sector. Dale Drew from Level 3 Communications shares the news of a new DDoS technique. The LAPD succeeds in cracking an iPhone 5s. And where in the world is Satoshi Nakamoto? 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we hear about what's going on with proof-of-concept exploits. Ransomware continued its run this week, but DDoS shouldn't be forgotten, either--it's good for both business interruption and misdirection. Thoughts on those 270 million email credentials. A couple of big security companies post Q1 results, and Adrian Turner, CEO of Australia's Data 61, explains the future of that nation's domestic cyber sector. Dale Drew from Level 3 Communications shares the news of a new DDoS technique. The LAPD succeeds in cracking an iPhone 5s. And where in the world is Satoshi Nakamoto? </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1250</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f0c701a50790331af28f3552199a23bc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9592434715.mp3?updated=1608743917" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: World Password Day, OpIcarus</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/93/notes</link>
      <description>Today we consider various ways of hiding attack campaigns: noisily or quietly, what the approaches have in common is highly selective targeting. Anonymous proceeds with Operation Icarus (against "the global banking cartel").  We observe World Password Day with advice from AT&amp;T's Johannes Jaskolski and Johns Hopkins' Joe Carrigan. Plus, we take a quick look at how one script kiddie values his stolen data. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 05 May 2016 18:34:02 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>93</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c68a370e-def8-11ea-911f-1f00fc50a60b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: World Password Day, OpIcarus</itunes:subtitle>
      <itunes:summary>Today we consider various ways of hiding attack campaigns: noisily or quietly, what the approaches have in common is highly selective targeting. Anonymous proceeds with Operation Icarus (against "the global banking cartel").  We observe World Password Day with advice from AT&amp;T's Johannes Jaskolski and Johns Hopkins' Joe Carrigan. Plus, we take a quick look at how one script kiddie values his stolen data. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we consider various ways of hiding attack campaigns: noisily or quietly, what the approaches have in common is highly selective targeting. Anonymous proceeds with Operation Icarus (against "the global banking cartel").  We observe World Password Day with advice from AT&amp;T's Johannes Jaskolski and Johns Hopkins' Joe Carrigan. Plus, we take a quick look at how one script kiddie values his stolen data. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>772</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[efdbbf2a34c2ba8b6a008d5d36d0f7ad]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4486893417.mp3?updated=1689600659" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Hey, padawans: Supreme Leader Snope hints he's got your back!</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/92/notes</link>
      <description>In today's podcast we look at studies of how ISIS actually operates online. Apparently they do so much the way crooks do—by abusing legitimate services. But when it comes to encryption, the jihadists seem to be rolling their own. Ransomware updates and warnings—the FBI reminds victims not to pay. The group that hit the Qatar National Bank may be preparing release of another bank's information. Infrastructure companies invest to shore up cyber defenses. We hear from the University of Maryland's Jonathan Katz on digital signatures, and we talk with the Denim Group's John Dickson about power grid security.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 04 May 2016 18:49:33 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>92</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c69f77ea-def8-11ea-911f-efbe170c301c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Hey, padawans: Supreme Leader Snope hints he's got your back!</itunes:subtitle>
      <itunes:summary>In today's podcast we look at studies of how ISIS actually operates online. Apparently they do so much the way crooks do—by abusing legitimate services. But when it comes to encryption, the jihadists seem to be rolling their own. Ransomware updates and warnings—the FBI reminds victims not to pay. The group that hit the Qatar National Bank may be preparing release of another bank's information. Infrastructure companies invest to shore up cyber defenses. We hear from the University of Maryland's Jonathan Katz on digital signatures, and we talk with the Denim Group's John Dickson about power grid security.  
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we look at studies of how ISIS actually operates online. Apparently they do so much the way crooks do—by abusing legitimate services. But when it comes to encryption, the jihadists seem to be rolling their own. Ransomware updates and warnings—the FBI reminds victims not to pay. The group that hit the Qatar National Bank may be preparing release of another bank's information. Infrastructure companies invest to shore up cyber defenses. We hear from the University of Maryland's Jonathan Katz on digital signatures, and we talk with the Denim Group's John Dickson about power grid security.  </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>772</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5734d41850135d53736fdbddf13cb2d5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7081747801.mp3?updated=1689600644" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Anonymous hits Bank of Greece. I am Satoshi!</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/91/notes</link>
      <description>In today's podcast
we look quickly at the current state of the cyber war between the
US and ISIS. Anonymous is out to punish banks with DDoS for "crimes
against humanity," and criminals continue to hone their ransomware
game. The US
security clearance system seems set to move toward FICO-like
scoring. Joe Carrigan from Johns Hopkins University explains why
medical records are so valuable on the cyber black market. Bob
Hansmann from Forcepoint returns for more findings from their 2016
threat report. And Satoshi Nakamoto seems as airborne as
ever.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 03 May 2016 18:46:16 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>91</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c6b436b2-def8-11ea-911f-43bf3227d408/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Anonymous hits Bank of Greece. I am Satoshi!</itunes:subtitle>
      <itunes:summary>In today's podcast
we look quickly at the current state of the cyber war between the
US and ISIS. Anonymous is out to punish banks with DDoS for "crimes
against humanity," and criminals continue to hone their ransomware
game. The US
security clearance system seems set to move toward FICO-like
scoring. Joe Carrigan from Johns Hopkins University explains why
medical records are so valuable on the cyber black market. Bob
Hansmann from Forcepoint returns for more findings from their 2016
threat report. And Satoshi Nakamoto seems as airborne as
ever.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast
we look quickly at the current state of the cyber war between the
US and ISIS. Anonymous is out to punish banks with DDoS for "crimes
against humanity," and criminals continue to hone their ransomware
game. The US
security clearance system seems set to move toward FICO-like
scoring. Joe Carrigan from Johns Hopkins University explains why
medical records are so valuable on the cyber black market. Bob
Hansmann from Forcepoint returns for more findings from their 2016
threat report. And Satoshi Nakamoto seems as airborne as
ever.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>762</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[313a99fb85ed1f166566d370811a78c6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3955132345.mp3?updated=1689600631" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: DPRK jamming prompts search for GPS alternative. Satoshi, is that you?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/90/notes</link>
      <description>In today's podcastwe hear some encouraging examples of responsible disclosure.Ransomware is still out and about. IBM seems to see a futurein blockchain technology. Bob Hansmann from Forcepoint shares highlights from their threatreport. Ben Yelin tracks the Snowdenremedies. And Craig Wright again claims he's Bitcoin'sSatoshi Nakamoto—the BBC and the Economist seem readyto take him at his word.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 02 May 2016 17:01:06 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>90</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c6cd4b84-def8-11ea-911f-f3dcbf577b16/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: DPRK jamming prompts search for GPS alternative. Satoshi, is that you?</itunes:subtitle>
      <itunes:summary>In today's podcastwe hear some encouraging examples of responsible disclosure.Ransomware is still out and about. IBM seems to see a futurein blockchain technology. Bob Hansmann from Forcepoint shares highlights from their threatreport. Ben Yelin tracks the Snowdenremedies. And Craig Wright again claims he's Bitcoin'sSatoshi Nakamoto—the BBC and the Economist seem readyto take him at his word.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcastwe hear some encouraging examples of responsible disclosure.Ransomware is still out and about. IBM seems to see a futurein blockchain technology. Bob Hansmann from Forcepoint shares highlights from their threatreport. Ben Yelin tracks the Snowdenremedies. And Craig Wright again claims he's Bitcoin'sSatoshi Nakamoto—the BBC and the Economist seem readyto take him at his word.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>796</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[de6da644716c2e9a4cbaf79891d5f7c1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3322341152.mp3?updated=1689600619" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Backdoors or legit apps? Serpents in walled gardens. Verizon's Data Breach Report.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/89/notes</link>
      <description>Today we hear about potential
backdoors (or maybe PUPs). Cash-stealing malware reported in Google
Play. Third-party developers leave their credentials lying around
GitHub. Triumfant watches Locky morph—five times a day. Dale Drew
from Level 3 talks about point-of-sale risks. Verizon tells us all
about their Data Breach Report. The Panama Papers may soon be
released in full. Investors worry about the cyber sector, but some
see healthy adjustment. And US Cyber Command works to make the "L"
in ISIL stand for "loser."
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 29 Apr 2016 19:18:23 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>89</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c6e8ce22-def8-11ea-911f-934d20c7ad45/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Backdoors or legit apps? Serpents in walled gardens. Verizon's Data Breach Report.</itunes:subtitle>
      <itunes:summary>Today we hear about potential
backdoors (or maybe PUPs). Cash-stealing malware reported in Google
Play. Third-party developers leave their credentials lying around
GitHub. Triumfant watches Locky morph—five times a day. Dale Drew
from Level 3 talks about point-of-sale risks. Verizon tells us all
about their Data Breach Report. The Panama Papers may soon be
released in full. Investors worry about the cyber sector, but some
see healthy adjustment. And US Cyber Command works to make the "L"
in ISIL stand for "loser."
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Today we hear about potential
backdoors (or maybe PUPs). Cash-stealing malware reported in Google
Play. Third-party developers leave their credentials lying around
GitHub. Triumfant watches Locky morph—five times a day. Dale Drew
from Level 3 talks about point-of-sale risks. Verizon tells us all
about their Data Breach Report. The Panama Papers may soon be
released in full. Investors worry about the cyber sector, but some
see healthy adjustment. And US Cyber Command works to make the "L"
in ISIL stand for "loser."</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1312</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9031fd2161809067bc9401ebd625bbd7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2385406957.mp3?updated=1608752319" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Malware found in nuclear plant. Threat actors tracked in Asia. And who's Aquaman?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/88/notes</link>
      <description>In today's Podcast, we hear about ISIS attempts at inspiration
online—their technical capabilities are low, but they continue to
hit information ops hard. A Bavarian nuclear plant finds a malware
infestation—spooky, but apparently without effect. Observers expect
more hacks like the one on the Bangladesh Bank, and the Platinum
threat group looks state-sponsored. The security industry may be
showing signs of consolidation. . The University of Maryland's
Markus Rauschecker explains why law firms are attractive hacking
targets, and Todd O'Boyle from Percipient Networks urges us to
listen to our malware. 



 

Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 28 Apr 2016 19:14:26 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>88</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c6ff6cfe-def8-11ea-911f-33cebabbeb1a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Malware found in nuclear plant. Threat actors tracked in Asia. And who's Aquaman?</itunes:subtitle>
      <itunes:summary>In today's Podcast, we hear about ISIS attempts at inspiration
online—their technical capabilities are low, but they continue to
hit information ops hard. A Bavarian nuclear plant finds a malware
infestation—spooky, but apparently without effect. Observers expect
more hacks like the one on the Bangladesh Bank, and the Platinum
threat group looks state-sponsored. The security industry may be
showing signs of consolidation. . The University of Maryland's
Markus Rauschecker explains why law firms are attractive hacking
targets, and Todd O'Boyle from Percipient Networks urges us to
listen to our malware. 



 

Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[
<p>In today's Podcast, we hear about ISIS attempts at inspiration
online—their technical capabilities are low, but they continue to
hit information ops hard. A Bavarian nuclear plant finds a malware
infestation—spooky, but apparently without effect. Observers expect
more hacks like the one on the Bangladesh Bank, and the Platinum
threat group looks state-sponsored. The security industry may be
showing signs of consolidation. . The University of Maryland's
Markus Rauschecker explains why law firms are attractive hacking
targets, and Todd O'Boyle from Percipient Networks urges us to
listen to our malware. </p>


<p> </p>
<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>791</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e14b05eb851b180a3ca303f65065bce3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4440386929.mp3?updated=1689600579" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Paranoia -as-a-service?  Cyber con jobs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/87/notes</link>
      <description>In today's Podcast,
we hear reports of success in the cyber war against ISIS. Inquiry
into the Bangladesh Bank hack continues; the threat actors behind
it may have additional capers in the works. Android malware
flourishes, and so does a vigorous underground extortion market.
The FBI says it doesn't know what vulnerability was exploited to
open the San Bernardino iPhone, and that it doesn't want a hacking
arms race with criminals and terrorists. Ferruh Matvituna from
Netsparker shares some wisdom on app security, and Jonathan Katz
from the University of Maryland explains program
obfuscation.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 27 Apr 2016 19:29:27 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>87</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c713eee0-def8-11ea-911f-b7f153e3828f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Paranoia -as-a-service?  Cyber con jobs.</itunes:subtitle>
      <itunes:summary>In today's Podcast,
we hear reports of success in the cyber war against ISIS. Inquiry
into the Bangladesh Bank hack continues; the threat actors behind
it may have additional capers in the works. Android malware
flourishes, and so does a vigorous underground extortion market.
The FBI says it doesn't know what vulnerability was exploited to
open the San Bernardino iPhone, and that it doesn't want a hacking
arms race with criminals and terrorists. Ferruh Matvituna from
Netsparker shares some wisdom on app security, and Jonathan Katz
from the University of Maryland explains program
obfuscation.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Podcast,
we hear reports of success in the cyber war against ISIS. Inquiry
into the Bangladesh Bank hack continues; the threat actors behind
it may have additional capers in the works. Android malware
flourishes, and so does a vigorous underground extortion market.
The FBI says it doesn't know what vulnerability was exploited to
open the San Bernardino iPhone, and that it doesn't want a hacking
arms race with criminals and terrorists. Ferruh Matvituna from
Netsparker shares some wisdom on app security, and Jonathan Katz
from the University of Maryland explains program
obfuscation.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>790</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a0a6b42ddb7e6098dab638c9504df9b2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7149723255.mp3?updated=1689600566" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Snowden advanced crypto by 7 years." Proofread your way to security.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/86/notes</link>
      <description>In today's podcast we hear more about
possible other instances of fraudulent messaging in the
SWIFT financial transfer network. We
discuss an active Android ransomware campaign that appears to be
using old Hacking Team exploits. US DNI Clapper thinks the
acceleration of encryption, post-Snowden, really hasn't been a very
good thing, and calls for a balance between privacy and security.
The US continues to ramp up its cyber offensive against
ISIS. Joe Carrigan from the Johns Hopkins Information Security Institute
tells the tale of a scammer strung along.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Apr 2016 17:43:38 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>86</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c73811b2-def8-11ea-911f-a7e19f202fb7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Snowden advanced crypto by 7 years." Proofread your way to security.</itunes:subtitle>
      <itunes:summary>In today's podcast we hear more about
possible other instances of fraudulent messaging in the
SWIFT financial transfer network. We
discuss an active Android ransomware campaign that appears to be
using old Hacking Team exploits. US DNI Clapper thinks the
acceleration of encryption, post-Snowden, really hasn't been a very
good thing, and calls for a balance between privacy and security.
The US continues to ramp up its cyber offensive against
ISIS. Joe Carrigan from the Johns Hopkins Information Security Institute
tells the tale of a scammer strung along.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast we hear more about
possible other instances of fraudulent messaging in the
SWIFT financial transfer network. We
discuss an active Android ransomware campaign that appears to be
using old Hacking Team exploits. US DNI Clapper thinks the
acceleration of encryption, post-Snowden, really hasn't been a very
good thing, and calls for a balance between privacy and security.
The US continues to ramp up its cyber offensive against
ISIS. Joe Carrigan from the Johns Hopkins Information Security Institute
tells the tale of a scammer strung along.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>781</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1b2da6d3b265ffe1e3fb9df08a0102c5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2273440315.mp3?updated=1689600556" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: US cyberwar vs. ISIS. IPO fizzle? (Investors want profit.)</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/85/notes</link>
      <description>In today's Daily Podcast we discuss reports that the Bangladesh
Bank hackers succeeded in getting into, and manipulating, some
SWIFT client software. The outlines of the US cyber campaign
against ISIS grow clearer. Updates on how the US Department of
Justice is getting into iPhones. We take a look at the
disappointing—to many analysts—SecureWorks IPO and what it means
for VCs and cyber unicorns. Plus, CyberWire Editor John Petrik
reports on last week's SINET ITSEF conference.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 25 Apr 2016 19:48:17 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>85</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c74fb16e-def8-11ea-911f-4fff0853a169/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: US cyberwar vs. ISIS. IPO fizzle? (Investors want profit.)</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we discuss reports that the Bangladesh
Bank hackers succeeded in getting into, and manipulating, some
SWIFT client software. The outlines of the US cyber campaign
against ISIS grow clearer. Updates on how the US Department of
Justice is getting into iPhones. We take a look at the
disappointing—to many analysts—SecureWorks IPO and what it means
for VCs and cyber unicorns. Plus, CyberWire Editor John Petrik
reports on last week's SINET ITSEF conference.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we discuss reports that the Bangladesh
Bank hackers succeeded in getting into, and manipulating, some
SWIFT client software. The outlines of the US cyber campaign
against ISIS grow clearer. Updates on how the US Department of
Justice is getting into iPhones. We take a look at the
disappointing—to many analysts—SecureWorks IPO and what it means
for VCs and cyber unicorns. Plus, CyberWire Editor John Petrik
reports on last week's SINET ITSEF conference.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>781</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b2ca3bc6d346074c57f5759e74e22f92]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8089338091.mp3?updated=1689600527" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Voter dbase compromises. How not to sell security.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/84/notes</link>
      <description>In today's Daily Podcast we hear about Mexican and Philippine authorities’ investigations into voting database compromises. Ransomware continues to circulate, and we learn something about the increased sophistication of phishing. Point-of-sale crooks race against US EMV adoption. We take a look at the SecureWorks IPO and the long interest in some leading security stocks. Joseph Opacki from PhishLabs explains the growing sophistication of phishing schemes, and Benjamin Yelin from the University of Maryland Center for Health and Homeland Security tells us about mobile security and Stingrays.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 22 Apr 2016 19:06:58 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>84</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c767ae72-def8-11ea-911f-7798f4cbae12/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Voter dbase compromises. How not to sell security.</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we hear about Mexican and Philippine authorities’ investigations into voting database compromises. Ransomware continues to circulate, and we learn something about the increased sophistication of phishing. Point-of-sale crooks race against US EMV adoption. We take a look at the SecureWorks IPO and the long interest in some leading security stocks. Joseph Opacki from PhishLabs explains the growing sophistication of phishing schemes, and Benjamin Yelin from the University of Maryland Center for Health and Homeland Security tells us about mobile security and Stingrays.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we hear about Mexican and Philippine authorities’ investigations into voting database compromises. Ransomware continues to circulate, and we learn something about the increased sophistication of phishing. Point-of-sale crooks race against US EMV adoption. We take a look at the SecureWorks IPO and the long interest in some leading security stocks. Joseph Opacki from PhishLabs explains the growing sophistication of phishing schemes, and Benjamin Yelin from the University of Maryland Center for Health and Homeland Security tells us about mobile security and Stingrays.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1241</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[77a6cbeb59caaaa48d046ddeebd91d21]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8738337897.mp3?updated=1608752289" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Australia's new cyber strategy, Dorkbot's old; CryptXXX is new.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/83/notes</link>
      <description>In today's Daily Podcast we hear about CryptXXX—recently discovered ransomware—and about old, familiar Dorkbot. The US Congress continues to mull legislation that would mandate decryption, and the banking and tech sectors don’t care at all for what they see in those pending bills. Australia announces its cyber security strategy, and says that its national capabilities definitely include offensive ones. Jason Lewis from LookingGlass warns us about third party network access, and Dale Drew from Level 3 Communications emphasizes the importance of collaboration.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 21 Apr 2016 21:42:05 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>83</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c7783fee-def8-11ea-911f-732156c05822/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Australia's new cyber strategy, Dorkbot's old; CryptXXX is new.</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we hear about CryptXXX—recently discovered ransomware—and about old, familiar Dorkbot. The US Congress continues to mull legislation that would mandate decryption, and the banking and tech sectors don’t care at all for what they see in those pending bills. Australia announces its cyber security strategy, and says that its national capabilities definitely include offensive ones. Jason Lewis from LookingGlass warns us about third party network access, and Dale Drew from Level 3 Communications emphasizes the importance of collaboration.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we hear about CryptXXX—recently discovered ransomware—and about old, familiar Dorkbot. The US Congress continues to mull legislation that would mandate decryption, and the banking and tech sectors don’t care at all for what they see in those pending bills. Australia announces its cyber security strategy, and says that its national capabilities definitely include offensive ones. Jason Lewis from LookingGlass warns us about third party network access, and Dale Drew from Level 3 Communications emphasizes the importance of collaboration.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>783</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f4952d3d8f866d326ec7c26105a02df6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3371505827.mp3?updated=1689276903" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Industry news, and some plaintiffs may wish to reconsider.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/82/notes</link>
      <description>In today's Daily Podcast we gain perspective on post-Brussels ISIS-inspired hacktivism. Developers should take care using Xcode command line development tools. The Thanatos Trojan is discovered in, and booted from, a hosting service. Analysts draws some familiar lessons from last year’s Hacking Team breach. And plaintiffs may think twice about suing Ashley Madison for alleged catphishes. Plus, Jonathan Katz from the Maryland Cybersecurity Center shares his team's research into searchable encryption.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 20 Apr 2016 20:29:25 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>82</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c793b0ee-def8-11ea-911f-639ea5d05f02/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Industry news, and some plaintiffs may wish to reconsider.</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we gain perspective on post-Brussels ISIS-inspired hacktivism. Developers should take care using Xcode command line development tools. The Thanatos Trojan is discovered in, and booted from, a hosting service. Analysts draws some familiar lessons from last year’s Hacking Team breach. And plaintiffs may think twice about suing Ashley Madison for alleged catphishes. Plus, Jonathan Katz from the Maryland Cybersecurity Center shares his team's research into searchable encryption.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we gain perspective on post-Brussels ISIS-inspired hacktivism. Developers should take care using Xcode command line development tools. The Thanatos Trojan is discovered in, and booted from, a hosting service. Analysts draws some familiar lessons from last year’s Hacking Team breach. And plaintiffs may think twice about suing Ashley Madison for alleged catphishes. Plus, Jonathan Katz from the Maryland Cybersecurity Center shares his team's research into searchable encryption.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>753</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[dad8cbe36034df1f4cb8acbb039d61ca]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4635934788.mp3?updated=1689276883" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: New ransomware, along with some golden oldies. Quantifying cyber risk.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/81/notes</link>
      <description>In today's Daily Podcast we hear about the latest wave of ISIS-sympathizer cyber attacks—they’re again low-level defacements of poorly defended targets. Chris Morgan from IKANOW provides tips on quantifying cyber risk. A new strain of ransomware is identified, but it seems connected to some long-familiar criminal actors. Microsoft and Apple both continue to resist US Government requests for data and assistance in criminal investigations. Markus Rauschecker reviews the Compliance with Court Orders Act of 2016.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Apr 2016 19:14:53 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>81</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c7adf53a-def8-11ea-911f-a387bdf75e67/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: New ransomware, along with some golden oldies. Quantifying cyber risk.</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we hear about the latest wave of ISIS-sympathizer cyber attacks—they’re again low-level defacements of poorly defended targets. Chris Morgan from IKANOW provides tips on quantifying cyber risk. A new strain of ransomware is identified, but it seems connected to some long-familiar criminal actors. Microsoft and Apple both continue to resist US Government requests for data and assistance in criminal investigations. Markus Rauschecker reviews the Compliance with Court Orders Act of 2016.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we hear about the latest wave of ISIS-sympathizer cyber attacks—they’re again low-level defacements of poorly defended targets. Chris Morgan from IKANOW provides tips on quantifying cyber risk. A new strain of ransomware is identified, but it seems connected to some long-familiar criminal actors. Microsoft and Apple both continue to resist US Government requests for data and assistance in criminal investigations. Markus Rauschecker reviews the Compliance with Court Orders Act of 2016.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>762</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[aca619bd0e55ed103ebe2403e624aa2b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1800129572.mp3?updated=1689276858" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Confidence building. Offensive cyber ops. M&amp;A notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/80/notes</link>
      <description>In today's Daily Podcast we follow up with corrections to last week’s reports of Russian attacks on Sweden’s air traffic control system. The US and Russia hold talks on reducing tensions in cyberspace. The US cyber offensive against ISIS picks up its pace. Older JBoss servers are at risk of ransomware. Some M&amp;A news in the cyber sector. And there are fresh accounts of how the Hacking Team was hacked last year. Plus, Joe Carrigan from the Johns Hopkins University Information Security Institute warns us not to trust that free airport WiFi.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 18 Apr 2016 18:08:54 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>80</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c7c42a08-def8-11ea-911f-c7693bbaf678/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Confidence building. Offensive cyber ops. M&amp;A notes.</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we follow up with corrections to last week’s reports of Russian attacks on Sweden’s air traffic control system. The US and Russia hold talks on reducing tensions in cyberspace. The US cyber offensive against ISIS picks up its pace. Older JBoss servers are at risk of ransomware. Some M&amp;A news in the cyber sector. And there are fresh accounts of how the Hacking Team was hacked last year. Plus, Joe Carrigan from the Johns Hopkins University Information Security Institute warns us not to trust that free airport WiFi.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we follow up with corrections to last week’s reports of Russian attacks on Sweden’s air traffic control system. The US and Russia hold talks on reducing tensions in cyberspace. The US cyber offensive against ISIS picks up its pace. Older JBoss servers are at risk of ransomware. Some M&amp;A news in the cyber sector. And there are fresh accounts of how the Hacking Team was hacked last year. Plus, Joe Carrigan from the Johns Hopkins University Information Security Institute warns us not to trust that free airport WiFi.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>729</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[163b8105585cd3993285e830bceceb4a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7810476769.mp3?updated=1689276688" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Industry notes, including a look at labor markets. Cyber gangland and its neighborhoods.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/79/notes</link>
      <description>In today's Daily Podcast we discuss the international response to ISIS, and the terror group's latest info ops. We cover the news from cyber gangland (and bid Paunch farewell as he enters a Russian prison) including malware developments and the latest criminal approaches to making their infrastructure resilient. We learn some things about competitions as a way of building the rising cyber labor force from Raytheon's Jack Harrington, and we hear about the challenges of cloud data security from University of Maryland's Jonathan Katz. It seems privacy is in tension not only with security, but with transparency as well. And we talk about what the metaphorical hat you wear says about you (you hacker, you).
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 15 Apr 2016 19:19:01 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>79</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c7d9af18-def8-11ea-911f-1771422900c9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Industry notes, including a look at labor markets. Cyber gangland and its neighborhoods.</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we discuss the international response to ISIS, and the terror group's latest info ops. We cover the news from cyber gangland (and bid Paunch farewell as he enters a Russian prison) including malware developments and the latest criminal approaches to making their infrastructure resilient. We learn some things about competitions as a way of building the rising cyber labor force from Raytheon's Jack Harrington, and we hear about the challenges of cloud data security from University of Maryland's Jonathan Katz. It seems privacy is in tension not only with security, but with transparency as well. And we talk about what the metaphorical hat you wear says about you (you hacker, you).
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we discuss the international response to ISIS, and the terror group's latest info ops. We cover the news from cyber gangland (and bid Paunch farewell as he enters a Russian prison) including malware developments and the latest criminal approaches to making their infrastructure resilient. We learn some things about competitions as a way of building the rising cyber labor force from Raytheon's Jack Harrington, and we hear about the challenges of cloud data security from University of Maryland's Jonathan Katz. It seems privacy is in tension not only with security, but with transparency as well. And we talk about what the metaphorical hat you wear says about you (you hacker, you).</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1258</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3d97fec0a7b96fa75c2db7fbaf19a179]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4723289982.mp3?updated=1608752315" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Info ops for and against ISIS. Industry notes.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/78/notes</link>
      <description>In today's Daily Podcast we discuss ISIS info ops and the cyber war the US is waging against the terrorist group. Ransomware phishing now show signs of knowing its targets' physical addresses. Patch Tuesday also saw updates from Cisco and Google. Cyber sector IPO rumors and declarations of intent. A Department of Justice lawyer, speaking for himself, thinks the debate over offshore accounts should inform thinking on the debate over privacy and security. Plus, Dale Drew from Level 3 Communications explains the importance of having a threat research lab.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 14 Apr 2016 18:01:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>78</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c7f25cfc-def8-11ea-911f-73ef2eecddb3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Info ops for and against ISIS. Industry notes.</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we discuss ISIS info ops and the cyber war the US is waging against the terrorist group. Ransomware phishing now show signs of knowing its targets' physical addresses. Patch Tuesday also saw updates from Cisco and Google. Cyber sector IPO rumors and declarations of intent. A Department of Justice lawyer, speaking for himself, thinks the debate over offshore accounts should inform thinking on the debate over privacy and security. Plus, Dale Drew from Level 3 Communications explains the importance of having a threat research lab.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we discuss ISIS info ops and the cyber war the US is waging against the terrorist group. Ransomware phishing now show signs of knowing its targets' physical addresses. Patch Tuesday also saw updates from Cisco and Google. Cyber sector IPO rumors and declarations of intent. A Department of Justice lawyer, speaking for himself, thinks the debate over offshore accounts should inform thinking on the debate over privacy and security. Plus, Dale Drew from Level 3 Communications explains the importance of having a threat research lab.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>777</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7796585e51a62550fe3a8bdf4029cc5d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7634540231.mp3?updated=1689274486" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Dogs still not barking in Panama. (But ransomware bites.)</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/77/notes</link>
      <description>In today's Daily Podcast we continue our follow-up on the Panama Papers' investigation. Ransomware, DDoS, and malvertising continue their win, place, and show finishes in the criminal sweeps. Patch Tuesday addresses Badlock and other vulnerabilities. Some M&amp;A news in the cyber sector. And the FBI may not have used Cellebrite's services to unlock the San Bernardino jihadi's iPhone after all. Plus, Johns Hopkins' Information Security Institute's Joe Carrigan warns us about phony calls claiming to be Microsoft tech support.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 13 Apr 2016 17:48:16 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>77</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c80c9b26-def8-11ea-911f-ab780bb860bd/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Dogs still not barking in Panama. (But ransomware bites.)</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we continue our follow-up on the Panama Papers' investigation. Ransomware, DDoS, and malvertising continue their win, place, and show finishes in the criminal sweeps. Patch Tuesday addresses Badlock and other vulnerabilities. Some M&amp;A news in the cyber sector. And the FBI may not have used Cellebrite's services to unlock the San Bernardino jihadi's iPhone after all. Plus, Johns Hopkins' Information Security Institute's Joe Carrigan warns us about phony calls claiming to be Microsoft tech support.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we continue our follow-up on the Panama Papers' investigation. Ransomware, DDoS, and malvertising continue their win, place, and show finishes in the criminal sweeps. Patch Tuesday addresses Badlock and other vulnerabilities. Some M&amp;A news in the cyber sector. And the FBI may not have used Cellebrite's services to unlock the San Bernardino jihadi's iPhone after all. Plus, Johns Hopkins' Information Security Institute's Joe Carrigan warns us about phony calls claiming to be Microsoft tech support.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>779</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[adb7ab545714d4e83deac40c62253457]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5056268479.mp3?updated=1689274467" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: State hacking, state messaging. Crimeware evolution.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/76/notes</link>
      <description>In today's Daily Podcast we follow up on the Panama Papers' investigation, and, like everyone else, wait for the expected shoes to drop. BAE warns that Qbot has become more aware, more evasive, and harder to block. Cisco's Talos predicts the disturbing rise of "crytpoworms." The US Federal CIO warns of the risks inherent in legacy systems. Guy Guzner from FireGlass helps us sort out the Panama Papers speculation, and Markus Rauschecker wonders if the FBI will have better luck convincing Apple to unlock another iPhone. And we take a trip down memory lane with the unlamented legacy code represented by Clippy.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Apr 2016 18:32:22 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>76</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c82eba30-def8-11ea-911f-2f6baf42a8a4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: State hacking, state messaging. Crimeware evolution.</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we follow up on the Panama Papers' investigation, and, like everyone else, wait for the expected shoes to drop. BAE warns that Qbot has become more aware, more evasive, and harder to block. Cisco's Talos predicts the disturbing rise of "crytpoworms." The US Federal CIO warns of the risks inherent in legacy systems. Guy Guzner from FireGlass helps us sort out the Panama Papers speculation, and Markus Rauschecker wonders if the FBI will have better luck convincing Apple to unlock another iPhone. And we take a trip down memory lane with the unlamented legacy code represented by Clippy.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we follow up on the Panama Papers' investigation, and, like everyone else, wait for the expected shoes to drop. BAE warns that Qbot has become more aware, more evasive, and harder to block. Cisco's Talos predicts the disturbing rise of "crytpoworms." The US Federal CIO warns of the risks inherent in legacy systems. Guy Guzner from FireGlass helps us sort out the Panama Papers speculation, and Markus Rauschecker wonders if the FBI will have better luck convincing Apple to unlock another iPhone. And we take a trip down memory lane with the unlamented legacy code represented by Clippy.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>776</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ad0af89ec7f18b00de505c0e730b6c08]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7732842616.mp3?updated=1689274430" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Ukraine's PM resigns, in part over Panama Papers controversy. Patch news.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/75/notes</link>
      <description>In today's Daily Podcast we follow up on the Panama Papers' fallout. Leaker "John Doe" remains unidentified, and the scandal is roiling politics in Ukraine. Some observers think the Russian Financial Monitoring Service is behind the leaks. Dridex evolves into new lines of cyber crime. Juniper patches a suspect random number generator. GCHQ is said to have helped publishers stop the new Harry Potter book from leaking. And CyberWire editor John Petrik reviews an interesting price list from Dell SecureWorks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 11 Apr 2016 18:55:16 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>75</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c84531de-def8-11ea-911f-0faf02b824e2/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Ukraine's PM resigns, in part over Panama Papers controversy. Patch news.</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we follow up on the Panama Papers' fallout. Leaker "John Doe" remains unidentified, and the scandal is roiling politics in Ukraine. Some observers think the Russian Financial Monitoring Service is behind the leaks. Dridex evolves into new lines of cyber crime. Juniper patches a suspect random number generator. GCHQ is said to have helped publishers stop the new Harry Potter book from leaking. And CyberWire editor John Petrik reviews an interesting price list from Dell SecureWorks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we follow up on the Panama Papers' fallout. Leaker "John Doe" remains unidentified, and the scandal is roiling politics in Ukraine. Some observers think the Russian Financial Monitoring Service is behind the leaks. Dridex evolves into new lines of cyber crime. Juniper patches a suspect random number generator. GCHQ is said to have helped publishers stop the new Harry Potter book from leaking. And CyberWire editor John Petrik reviews an interesting price list from Dell SecureWorks.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>778</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6c029a92f17061eab42c528f6f912cb5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4955084521.mp3?updated=1689274400" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Anonymous vs. Israel. Panama Papers. The view from Japan.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/74/notes</link>
      <description>In today's Daily Podcast we report on the results of yesterday's #OpIsrael—basically a fizzle, but a fizzle with the usual disturbing implications. Pirrit adware moves to OS X. Ransomware remains a low-risk, high-payoff cyber caper. We take a look at some industry news: good, bad, and middling. We talk to the University of Maryland's Jonathan Katz about fully homomorphic encryption, and we discuss Japan's cyber security landscape with William Saito, special advisor to the prime minister of Japan.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 08 Apr 2016 18:50:46 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>74</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c8544ea8-def8-11ea-911f-bf9efb2d12c2/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Anonymous vs. Israel. Panama Papers. The view from Japan.</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we report on the results of yesterday's #OpIsrael—basically a fizzle, but a fizzle with the usual disturbing implications. Pirrit adware moves to OS X. Ransomware remains a low-risk, high-payoff cyber caper. We take a look at some industry news: good, bad, and middling. We talk to the University of Maryland's Jonathan Katz about fully homomorphic encryption, and we discuss Japan's cyber security landscape with William Saito, special advisor to the prime minister of Japan.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we report on the results of yesterday's #OpIsrael—basically a fizzle, but a fizzle with the usual disturbing implications. Pirrit adware moves to OS X. Ransomware remains a low-risk, high-payoff cyber caper. We take a look at some industry news: good, bad, and middling. We talk to the University of Maryland's Jonathan Katz about fully homomorphic encryption, and we discuss Japan's cyber security landscape with William Saito, special advisor to the prime minister of Japan.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1174</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7f1ee31709b2e98f6f6d92565dd302ab]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2278217695.mp3?updated=1608752300" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>In Their Own Words — The 2016 Women in Cybersecurity Conference [Special Edition]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/4/notes</link>
      <description>The people we spoke to at 2016's Women in Cybersecurity Conference had a remarkable diversity of career and academic backgrounds, as well as life experiences. Many themes emerged from our conversations, including the importance of mentorship, willingness to try new things and take risks, and the importance of flexibility and communications skills. They also dispelled some myths, including the notion that you need to have a technical background for a career in cyber security.
We sat down with a range of women, from students to industry leaders, for candid conversations about their personal journeys, their experiences as women in a male dominated field, and their advice to women considering a career in cybersecurity.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 07 Apr 2016 20:38:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/02cd3806-df03-11ea-83fc-ff44401a3004/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In Their Own Words — The 2016 Women in Cybersecurity Conference</itunes:subtitle>
      <itunes:summary>The people we spoke to at 2016's Women in Cybersecurity Conference had a remarkable diversity of career and academic backgrounds, as well as life experiences. Many themes emerged from our conversations, including the importance of mentorship, willingness to try new things and take risks, and the importance of flexibility and communications skills. They also dispelled some myths, including the notion that you need to have a technical background for a career in cyber security.
We sat down with a range of women, from students to industry leaders, for candid conversations about their personal journeys, their experiences as women in a male dominated field, and their advice to women considering a career in cybersecurity.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The people we spoke to at 2016's Women in Cybersecurity Conference had a remarkable diversity of career and academic backgrounds, as well as life experiences. Many themes emerged from our conversations, including the importance of mentorship, willingness to try new things and take risks, and the importance of flexibility and communications skills. They also dispelled some myths, including the notion that you need to have a technical background for a career in cyber security.</p><p>We sat down with a range of women, from students to industry leaders, for candid conversations about their personal journeys, their experiences as women in a male dominated field, and their advice to women considering a career in cybersecurity.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1935</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[26bbc7cebc7c94ce32a15ce2ead11100]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7606707623.mp3?updated=1656707769" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Panama Papers, privacy, &amp; financial transparency. MedStar ransomware incident update. Current scams.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/73/notes</link>
      <description>In today's Daily Podcast we catch up on the latest reports of the recent MedStar ransomware infestation. Mobile security company SkyCure share the results of their recent report on vulnerabilities in the medical field. DDoS also remains a problem. The FTC and IRS warn of socially engineered scams. The Panama Papers continue to name a lot of celebrities, but no new political leaders. Hacking Team loses its export license. We talk to the Johns Hopkins University's Joe Carrigan and get his expert reflections on last week's Women in CyberSecurity conference. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 07 Apr 2016 20:10:58 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>73</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c869a4b0-def8-11ea-911f-33e75c05b3f1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Panama Papers, privacy, &amp; financial transparency. MedStar ransomware incident update. Current scams.</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we catch up on the latest reports of the recent MedStar ransomware infestation. Mobile security company SkyCure share the results of their recent report on vulnerabilities in the medical field. DDoS also remains a problem. The FTC and IRS warn of socially engineered scams. The Panama Papers continue to name a lot of celebrities, but no new political leaders. Hacking Team loses its export license. We talk to the Johns Hopkins University's Joe Carrigan and get his expert reflections on last week's Women in CyberSecurity conference. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we catch up on the latest reports of the recent MedStar ransomware infestation. Mobile security company SkyCure share the results of their recent report on vulnerabilities in the medical field. DDoS also remains a problem. The FTC and IRS warn of socially engineered scams. The Panama Papers continue to name a lot of celebrities, but no new political leaders. Hacking Team loses its export license. We talk to the Johns Hopkins University's Joe Carrigan and get his expert reflections on last week's Women in CyberSecurity conference. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>777</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b412a8505c77d6a9227499ca4d3522f4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9490990483.mp3?updated=1689263430" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Panama Papers count coup. Trojanized Android apps found.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/72/notes</link>
      <description>In today's Daily Podcast we find out more about how the Panama Papers leaked, and what their consequences are likely to be. A malicious SEO campaign hits vulnerable Joomla and WordPress installations. Ransomware gets personal. Dr. Web finds a Trojan in 104 Android apps. We discuss the Billington CyberSecurity International Summit. US policymakers mull the status of Cyber Command. We talk to the University of Maryland's Ben Yelin about ransomware and HIPPA.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 06 Apr 2016 20:29:13 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>72</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c882d372-def8-11ea-911f-2790eed8db56/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Panama Papers count coup. Trojanized Android apps found.</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we find out more about how the Panama Papers leaked, and what their consequences are likely to be. A malicious SEO campaign hits vulnerable Joomla and WordPress installations. Ransomware gets personal. Dr. Web finds a Trojan in 104 Android apps. We discuss the Billington CyberSecurity International Summit. US policymakers mull the status of Cyber Command. We talk to the University of Maryland's Ben Yelin about ransomware and HIPPA.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we find out more about how the Panama Papers leaked, and what their consequences are likely to be. A malicious SEO campaign hits vulnerable Joomla and WordPress installations. Ransomware gets personal. Dr. Web finds a Trojan in 104 Android apps. We discuss the Billington CyberSecurity International Summit. US policymakers mull the status of Cyber Command. We talk to the University of Maryland's Ben Yelin about ransomware and HIPPA.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>719</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fdeaa7db8a311a5ebc5d78f35a38224a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1986672357.mp3?updated=1689263419" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Governments nervously investigate Panama Papers. Industry sees layoffs &amp; an IPO.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/71/notes</link>
      <description>In today's Daily Podcast we hear about the spreading Panama Papers tax evasion (or avoidance, or wealth hiding) scandal. US State Department databases may have unpatched vulnerabilities, and PII of Turkish citizens is posted online. We talk to SCADAFence about securing the manufacturing Internet-of-things, and Markus Rauschecker from the University of Maryland Center for Health and Homeland Security tells us about how legal standards are established in cases involving cyber security.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Apr 2016 18:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>71</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c89c1026-def8-11ea-911f-e3cb9578150d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Governments nervously investigate Panama Papers. Industry sees layoffs &amp; an IPO.</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we hear about the spreading Panama Papers tax evasion (or avoidance, or wealth hiding) scandal. US State Department databases may have unpatched vulnerabilities, and PII of Turkish citizens is posted online. We talk to SCADAFence about securing the manufacturing Internet-of-things, and Markus Rauschecker from the University of Maryland Center for Health and Homeland Security tells us about how legal standards are established in cases involving cyber security.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we hear about the spreading Panama Papers tax evasion (or avoidance, or wealth hiding) scandal. US State Department databases may have unpatched vulnerabilities, and PII of Turkish citizens is posted online. We talk to SCADAFence about securing the manufacturing Internet-of-things, and Markus Rauschecker from the University of Maryland Center for Health and Homeland Security tells us about how legal standards are established in cases involving cyber security.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>788</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8b366ee7eb6df2ce28e5f6fd0d57c9ac]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8594190140.mp3?updated=1689263406" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: MedStar recovers. More on ransomware, and one weird trick to hiding $2B.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/70/notes</link>
      <description>In today's Daily Podcast we hear about MedStar's recovery from ransomware, and a joint US-Canadian warning about the general threat of ransomware. A new strain of ransomware offers victim-friendly QR codes for easy mobile payment of ransom. The "Panama Papers," leaked by a whistle-blower, seem to offer some pretty spectacular stories of international governmental corruption. We talk to Accenture's Malek Ben Salem about securing the Internet-of-things.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 04 Apr 2016 19:14:19 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>70</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c8ae8aa8-def8-11ea-911f-db136373aa0b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: MedStar recovers. More on ransomware, and one weird trick to hiding $2B.</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we hear about MedStar's recovery from ransomware, and a joint US-Canadian warning about the general threat of ransomware. A new strain of ransomware offers victim-friendly QR codes for easy mobile payment of ransom. The "Panama Papers," leaked by a whistle-blower, seem to offer some pretty spectacular stories of international governmental corruption. We talk to Accenture's Malek Ben Salem about securing the Internet-of-things.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we hear about MedStar's recovery from ransomware, and a joint US-Canadian warning about the general threat of ransomware. A new strain of ransomware offers victim-friendly QR codes for easy mobile payment of ransom. The "Panama Papers," leaked by a whistle-blower, seem to offer some pretty spectacular stories of international governmental corruption. We talk to Accenture's Malek Ben Salem about securing the Internet-of-things.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>731</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ecb85f54965a4f5357293817e51bc7f8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8308015102.mp3?updated=1689263396" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily &amp; Week in Review: Ransomware, state actors, the current state of the crypto wars.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/69/notes</link>
      <description>In this podcast, we look back at a week of ransomware. The FBI succeeds in unlocking the San Bernardino jihadist's iPhone without Apple's help (and Apple like the rest of us would like very much to know why). Policymakers consider their alternatives in cyber conflict, and they run from lawfare to warfare. Tay's briefly let out of her room, but quickly sent back (and that's no April Fooling).

Plus Backchannel's Steven Levy on repeating the cryptowars, and Ben Yelin on the challenges of establishing legal standing against the NSA.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 01 Apr 2016 18:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>69</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c8c963fa-def8-11ea-911f-1f7366786539/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily &amp; Week in Review: Ransomware, state actors, the current state of the crypto wars.</itunes:subtitle>
      <itunes:summary>In this podcast, we look back at a week of ransomware. The FBI succeeds in unlocking the San Bernardino jihadist's iPhone without Apple's help (and Apple like the rest of us would like very much to know why). Policymakers consider their alternatives in cyber conflict, and they run from lawfare to warfare. Tay's briefly let out of her room, but quickly sent back (and that's no April Fooling).

Plus Backchannel's Steven Levy on repeating the cryptowars, and Ben Yelin on the challenges of establishing legal standing against the NSA.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In this podcast, we look back at a week of ransomware. The FBI succeeds in unlocking the San Bernardino jihadist's iPhone without Apple's help (and Apple like the rest of us would like very much to know why). Policymakers consider their alternatives in cyber conflict, and they run from lawfare to warfare. Tay's briefly let out of her room, but quickly sent back (and that's no April Fooling).</p>
<p>Plus Backchannel's Steven Levy on repeating the cryptowars, and Ben Yelin on the challenges of establishing legal standing against the NSA.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1360</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[fb31d587b2e73e99cd971627384bfe07]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6072370520.mp3?updated=1608752311" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: DDoS, business email threats remain. How to set up your new machine.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/68/notes</link>
      <description>In today's Daily Podcast we hear about some of the other current threats—while ransomware is very much in the news, we'd do well to remember the problems of denial-of-service and business email compromise. The US continues to work toward "operationalizing" deterrence in the cyber domain. We talk to the Johns Hopkins University's Joe Carrigan about how you can secure your new computer. And CNBC appears to have been too participatory in a story about password hacking.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 31 Mar 2016 18:00:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>68</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c8e1e222-def8-11ea-911f-6fa7437a28f4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: DDoS, business email threats remain. How to set up your new machine.</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we hear about some of the other current threats—while ransomware is very much in the news, we'd do well to remember the problems of denial-of-service and business email compromise. The US continues to work toward "operationalizing" deterrence in the cyber domain. We talk to the Johns Hopkins University's Joe Carrigan about how you can secure your new computer. And CNBC appears to have been too participatory in a story about password hacking.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we hear about some of the other current threats—while ransomware is very much in the news, we'd do well to remember the problems of denial-of-service and business email compromise. The US continues to work toward "operationalizing" deterrence in the cyber domain. We talk to the Johns Hopkins University's Joe Carrigan about how you can secure your new computer. And CNBC appears to have been too participatory in a story about password hacking.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>710</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4f85463031ec48b1806da11bbd9f36d4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8605379048.mp3?updated=1689263345" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Hospital hack, ransomware evolution, the FBI, and Scotland Yard.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/67/notes</link>
      <description>In today's Daily Podcast we hear about the ongoing story of the MedStar Health hack, which anonymous sources say was ransomware. The incident remains under investigation. We hear about ransomware's evolution. Big Law finds itself in the crosshairs of a Russian (or Ukrainian?) cyber gang. The Justice Department hints at more litigation over decryption. We talk to the University of Maryland's Markus Rauschecker about the NIST Framework, and we finish our conversation with Zimperium about their successful experience integrating their mobile security solution with a big telecom's services.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 30 Mar 2016 17:06:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>67</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c8fa4218-def8-11ea-911f-e3f362507f3a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Hospital hack, ransomware evolution, the FBI, and Scotland Yard.</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we hear about the ongoing story of the MedStar Health hack, which anonymous sources say was ransomware. The incident remains under investigation. We hear about ransomware's evolution. Big Law finds itself in the crosshairs of a Russian (or Ukrainian?) cyber gang. The Justice Department hints at more litigation over decryption. We talk to the University of Maryland's Markus Rauschecker about the NIST Framework, and we finish our conversation with Zimperium about their successful experience integrating their mobile security solution with a big telecom's services.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we hear about the ongoing story of the MedStar Health hack, which anonymous sources say was ransomware. The incident remains under investigation. We hear about ransomware's evolution. Big Law finds itself in the crosshairs of a Russian (or Ukrainian?) cyber gang. The Justice Department hints at more litigation over decryption. We talk to the University of Maryland's Markus Rauschecker about the NIST Framework, and we finish our conversation with Zimperium about their successful experience integrating their mobile security solution with a big telecom's services.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>802</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[33da2b79a00924850eb82fd91686b4aa]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6321047190.mp3?updated=1689263332" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Healthcare cyber risks. Jihadi's iPhone accessed. Working with MSSPs.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/66/notes</link>
      <description>In today's Daily Podcast we hear about yesterday's apparent hack of MedStar Health—possibly ransomware, but that's still unconfirmed. FireEye warns that legacy point-of-sale systems are under increasing attack. Kaspersky says Turla spyware is using satellite connections to work around C2 server takedowns. The FBI says its succeeded in cracking that jihadi's iPhone. We talk to Accenture's Malek Ben Salem on healthcare cyber security, and we hear from Zimperium about their successful experience integrating their mobile security solution with a big telecom's services.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Mar 2016 17:18:40 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>66</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c91baf20-def8-11ea-911f-f79cf1c61bff/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Healthcare cyber risks. Jihadi's iPhone accessed. Working with MSSPs.</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we hear about yesterday's apparent hack of MedStar Health—possibly ransomware, but that's still unconfirmed. FireEye warns that legacy point-of-sale systems are under increasing attack. Kaspersky says Turla spyware is using satellite connections to work around C2 server takedowns. The FBI says its succeeded in cracking that jihadi's iPhone. We talk to Accenture's Malek Ben Salem on healthcare cyber security, and we hear from Zimperium about their successful experience integrating their mobile security solution with a big telecom's services.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we hear about yesterday's apparent hack of MedStar Health—possibly ransomware, but that's still unconfirmed. FireEye warns that legacy point-of-sale systems are under increasing attack. Kaspersky says Turla spyware is using satellite connections to work around C2 server takedowns. The FBI says its succeeded in cracking that jihadi's iPhone. We talk to Accenture's Malek Ben Salem on healthcare cyber security, and we hear from Zimperium about their successful experience integrating their mobile security solution with a big telecom's services.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>798</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0e6d0128c0a9e909198c33d24f7133e2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8524090292.mp3?updated=1689263320" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Ransomware and hospitals. Why random numbers matter. Stolen certificates.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/65/notes</link>
      <description>In today's Daily Podcast we talk about how "Google-dorking" may have helped the Rye dam hackers find a vulnerable system. If you're pushing propaganda, why the Dark Web probably isn't for you. Symantec finds stolen SHA-2 certs in malware. Trustwave finds XSS flaw; Zen Cart patches same. Carbon Black identifies PowerWare, a new ransomware variant. We talk to Bufferzone about hospitals and ransomware, and the University of Maryland's Jonathan Katz explains why random numbers matter.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 28 Mar 2016 18:06:20 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>65</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c92cba9a-def8-11ea-911f-6bc75491d6ab/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Ransomware and hospitals. Why random numbers matter. Stolen certificates.</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we talk about how "Google-dorking" may have helped the Rye dam hackers find a vulnerable system. If you're pushing propaganda, why the Dark Web probably isn't for you. Symantec finds stolen SHA-2 certs in malware. Trustwave finds XSS flaw; Zen Cart patches same. Carbon Black identifies PowerWare, a new ransomware variant. We talk to Bufferzone about hospitals and ransomware, and the University of Maryland's Jonathan Katz explains why random numbers matter.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we talk about how "Google-dorking" may have helped the Rye dam hackers find a vulnerable system. If you're pushing propaganda, why the Dark Web probably isn't for you. Symantec finds stolen SHA-2 certs in malware. Trustwave finds XSS flaw; Zen Cart patches same. Carbon Black identifies PowerWare, a new ransomware variant. We talk to Bufferzone about hospitals and ransomware, and the University of Maryland's Jonathan Katz explains why random numbers matter.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>802</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[59a8cc7cfadfb5a71cd97f7e42d5d476]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5191858931.mp3?updated=1689263297" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: ISIS info ops target gangsta demo. Snakes in walled gardens. US indicts Iranians.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/64/notes</link>
      <description>In today's Daily Podcast we talk about ISIS info operations and the difficulties of developing actionable intelligence about the group's cells. The US indicts seven Iranians for the Rye dam hack and DDoS against financial institutions. Walled garden app stores still have security issues. Verizon Enterprise Solutions and the E-Council suffer security issues, respectively a data breach and Angler redirection. More ransomware news, and developments in the Apple-FBI standoff. We talk with MorphoTrust about security in filing state tax returns.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 25 Mar 2016 16:21:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>64</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c941cb38-def8-11ea-911f-43c640b5bd8f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: ISIS info ops target gangsta demo. Snakes in walled gardens. US indicts Iranians.</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we talk about ISIS info operations and the difficulties of developing actionable intelligence about the group's cells. The US indicts seven Iranians for the Rye dam hack and DDoS against financial institutions. Walled garden app stores still have security issues. Verizon Enterprise Solutions and the E-Council suffer security issues, respectively a data breach and Angler redirection. More ransomware news, and developments in the Apple-FBI standoff. We talk with MorphoTrust about security in filing state tax returns.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we talk about ISIS info operations and the difficulties of developing actionable intelligence about the group's cells. The US indicts seven Iranians for the Rye dam hack and DDoS against financial institutions. Walled garden app stores still have security issues. Verizon Enterprise Solutions and the E-Council suffer security issues, respectively a data breach and Angler redirection. More ransomware news, and developments in the Apple-FBI standoff. We talk with MorphoTrust about security in filing state tax returns.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>797</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e62da81b26779b3d67d07ee6a89c6dbd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6116214124.mp3?updated=1689263280" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Collection outstrips analysis &amp; dissemination. When an air-gap...isn't.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/63/notes</link>
      <description>In today's Daily Podcast we discuss why ISIS inspiration seems to obviate the need for command-and-control. The US indicts seven Iranians for the Rye dam hack and DDoS against financial institutions. Concerns about the security of water utilities grow. ESET finds some new malware delivered by USB drive. We talk with the University of Maryland's Ben Yelin about rights to privacy in cyberspace.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 24 Mar 2016 17:44:02 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>63</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c9583cc4-def8-11ea-911f-7fc35dcf9ed4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Collection outstrips analysis &amp; dissemination. When an air-gap...isn't.</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we discuss why ISIS inspiration seems to obviate the need for command-and-control. The US indicts seven Iranians for the Rye dam hack and DDoS against financial institutions. Concerns about the security of water utilities grow. ESET finds some new malware delivered by USB drive. We talk with the University of Maryland's Ben Yelin about rights to privacy in cyberspace.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we discuss why ISIS inspiration seems to obviate the need for command-and-control. The US indicts seven Iranians for the Rye dam hack and DDoS against financial institutions. Concerns about the security of water utilities grow. ESET finds some new malware delivered by USB drive. We talk with the University of Maryland's Ben Yelin about rights to privacy in cyberspace.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>780</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b051721c06d7dabc91ac6c01bc8bcb92]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6618568661.mp3?updated=1689263269" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Inspiration in info ops. Processing unstructured data. Ethics &amp; standards of care.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/62/notes</link>
      <description>In today's Daily Podcast we discuss the developing investigation into ISIS inspiration and control of the Brussels attacks, and what's now know about November's Paris shootings. Ransomware may be developing the ability to spread through networks. The insurance and cyber security sectors are working toward a common understanding of risk, and we talk with Accenture's Malek Ben Salem about processing and protecting unstructured data.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 23 Mar 2016 17:10:31 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>62</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c972d1e2-def8-11ea-911f-df50e658efe7/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Inspiration in info ops. Processing unstructured data. Ethics &amp; standards of care.</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we discuss the developing investigation into ISIS inspiration and control of the Brussels attacks, and what's now know about November's Paris shootings. Ransomware may be developing the ability to spread through networks. The insurance and cyber security sectors are working toward a common understanding of risk, and we talk with Accenture's Malek Ben Salem about processing and protecting unstructured data.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we discuss the developing investigation into ISIS inspiration and control of the Brussels attacks, and what's now know about November's Paris shootings. Ransomware may be developing the ability to spread through networks. The insurance and cyber security sectors are working toward a common understanding of risk, and we talk with Accenture's Malek Ben Salem about processing and protecting unstructured data.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>790</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eff3932c0badfd49c59a2e112eff2b28]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2061503542.mp3?updated=1689263245" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: ISIS inspiration, radicalization. FBI says no help needed to crack iPhone.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/61/notes</link>
      <description>In today's Daily Podcast we discuss what's known so far about ISIS inspiration or control of the Brussels attacks. Some precautions users can take against ransomware are recommended. The US Department of Justice has told the presiding Magistrate the FBI no longer needs Apple's help to open the San Bernardino iPhone, and we talk with the Johns Hopkins University's Joe Carrigan about the technical pros and cons of each side's case. Finally, we say farewell to Andy Grove, long of Intel, who died yesterday at the age of 79.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Mar 2016 16:42:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>61</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c9937050-def8-11ea-911f-7b4bffd416e6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: ISIS inspiration, radicalization. FBI says no help needed to crack iPhone.</itunes:subtitle>
      <itunes:summary>In today's Daily Podcast we discuss what's known so far about ISIS inspiration or control of the Brussels attacks. Some precautions users can take against ransomware are recommended. The US Department of Justice has told the presiding Magistrate the FBI no longer needs Apple's help to open the San Bernardino iPhone, and we talk with the Johns Hopkins University's Joe Carrigan about the technical pros and cons of each side's case. Finally, we say farewell to Andy Grove, long of Intel, who died yesterday at the age of 79.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's Daily Podcast we discuss what's known so far about ISIS inspiration or control of the Brussels attacks. Some precautions users can take against ransomware are recommended. The US Department of Justice has told the presiding Magistrate the FBI no longer needs Apple's help to open the San Bernardino iPhone, and we talk with the Johns Hopkins University's Joe Carrigan about the technical pros and cons of each side's case. Finally, we say farewell to Andy Grove, long of Intel, who died yesterday at the age of 79.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>769</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e9a1873644a2ee5c20f47212e22ecb94]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4332043175.mp3?updated=1689263230" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Elves vs. trolls in the Baltic. Updates on Bangladesh bank heist, DoJ vs. Apple.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/60/notes</link>
      <description>Baltic elves versus Russian trolls. Pakistan considers its cyber strategy. Investigation continues into the Bangladesh Bank hack. More hackers are interested in going after OS kernels. Apple and the Department of Justice are poised for this week's hearings. And the University of Maryland's Markus Rauschecker tells us what it means to "hack the Pentagon."
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 21 Mar 2016 17:46:09 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>60</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c9acc38e-def8-11ea-911f-5bcbcfe9bc99/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Elves vs. trolls in the Baltic. Updates on Bangladesh bank heist, DoJ vs. Apple.</itunes:subtitle>
      <itunes:summary>Baltic elves versus Russian trolls. Pakistan considers its cyber strategy. Investigation continues into the Bangladesh Bank hack. More hackers are interested in going after OS kernels. Apple and the Department of Justice are poised for this week's hearings. And the University of Maryland's Markus Rauschecker tells us what it means to "hack the Pentagon."
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>Baltic elves versus Russian trolls. Pakistan considers its cyber strategy. Investigation continues into the Bangladesh Bank hack. More hackers are interested in going after OS kernels. Apple and the Department of Justice are poised for this week's hearings. And the University of Maryland's Markus Rauschecker tells us what it means to "hack the Pentagon."</strong></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>732</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[078cd5d8c9593ab1f01eb59f836b8fbb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1885715448.mp3?updated=1689263008" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Buhtrap raked in the rubles. Dridex is back. So are Stagefright and Rowhammer.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/59/notes</link>
      <description>More on Buhtrap and its sophisticated spearphishing of Russian banks. There are more reasons (as if they were needed) not to jailbreak your iPhones and iPads. Also, stay away from "adult" apps on your Android. And we hear from the University of Maryland's Ben Yelin, who brings us up to date on the lingering fallout of the Snowden leaks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 18 Mar 2016 17:14:21 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>59</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c9c949b4-def8-11ea-911f-5378a1475a57/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Buhtrap raked in the rubles. Dridex is back. So are Stagefright and Rowhammer.</itunes:subtitle>
      <itunes:summary>More on Buhtrap and its sophisticated spearphishing of Russian banks. There are more reasons (as if they were needed) not to jailbreak your iPhones and iPads. Also, stay away from "adult" apps on your Android. And we hear from the University of Maryland's Ben Yelin, who brings us up to date on the lingering fallout of the Snowden leaks.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>More on Buhtrap and its sophisticated spearphishing of Russian banks. There are more reasons (as if they were needed) not to jailbreak your iPhones and iPads. Also, stay away from "adult" apps on your Android. And we hear from the University of Maryland's Ben Yelin, who brings us up to date on the lingering fallout of the Snowden leaks.</strong></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>737</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f893dcc8fa45c83bcb7b14c9fa18fcfd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5686501546.mp3?updated=1689263018" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Spies &amp; crooks, together again. Artful spearphishers will eventually learn to proofread.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/58/notes</link>
      <description>Daily: Spies &amp; crooks, together again. Artful spearphishers will eventually learn to proofread. Malek Ben Salem from Accenture Labs explains how decoy apps are helping secure mobile devices.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 17 Mar 2016 18:20:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>58</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/c9ebc5a2-def8-11ea-911f-8f2fa634165b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Spies &amp; crooks, together again. Artful spearphishers will eventually learn to proofread.</itunes:subtitle>
      <itunes:summary>Daily: Spies &amp; crooks, together again. Artful spearphishers will eventually learn to proofread. Malek Ben Salem from Accenture Labs explains how decoy apps are helping secure mobile devices.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Daily: Spies &amp; crooks, together again. Artful spearphishers will eventually learn to proofread. Malek Ben Salem from Accenture Labs explains how decoy apps are helping secure mobile devices.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>797</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[641278c35dc5d4a7e0f833cd6583fbd5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9070297718.mp3?updated=1689263031" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Crypto wars updates. Iran vs. US in cyberspace. Big Angler malvertising campaign.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/57/notes</link>
      <description>Crypto wars updates. Iran vs. US in cyberspace. Big Angler malvertising campaign. CyberWire editor John Petrik joins us to discuss the expected indictment of Iranian hackers by the US government. Chris Webber from Centrify shares tips for multi-factor authentication.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 16 Mar 2016 18:37:58 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>57</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ca084fce-def8-11ea-911f-e7154d90e6cd/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Crypto wars updates. Iran vs. US in cyberspace. Big Angler malvertising campaign.</itunes:subtitle>
      <itunes:summary>Crypto wars updates. Iran vs. US in cyberspace. Big Angler malvertising campaign. CyberWire editor John Petrik joins us to discuss the expected indictment of Iranian hackers by the US government. Chris Webber from Centrify shares tips for multi-factor authentication.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Crypto wars updates. Iran vs. US in cyberspace. Big Angler malvertising campaign. CyberWire editor John Petrik joins us to discuss the expected indictment of Iranian hackers by the US government. Chris Webber from Centrify shares tips for multi-factor authentication.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>803</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8c28ce56632f98099214236959ee87d5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9011814825.mp3?updated=1689263052" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Naming &amp; shaming Iran's hackers? Palo Alto spots "Digital Quartermaster." Team Apple bigger than Team DoJ.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/56/notes</link>
      <description>Daily: Naming &amp; shaming Iran's hackers? Palo Alto spots "Digital Quartermaster." Team Apple bigger than Team DoJ. Plus, Jonathan Katz from the Maryland Cyber Security Center responds to Richard Clarke's NPR interview. Are claims of NSA's capabilities grounded in reality?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 15 Mar 2016 17:13:57 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>56</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ca1f2c12-def8-11ea-911f-c7bde989b2ba/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Naming &amp; shaming Iran's hackers? Palo Alto spots "Digital Quartermaster." Team Apple bigger than Team DoJ.</itunes:subtitle>
      <itunes:summary>Daily: Naming &amp; shaming Iran's hackers? Palo Alto spots "Digital Quartermaster." Team Apple bigger than Team DoJ. Plus, Jonathan Katz from the Maryland Cyber Security Center responds to Richard Clarke's NPR interview. Are claims of NSA's capabilities grounded in reality?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Daily: Naming &amp; shaming Iran's hackers? Palo Alto spots "Digital Quartermaster." Team Apple bigger than Team DoJ. Plus, Jonathan Katz from the Maryland Cyber Security Center responds to Richard Clarke's NPR interview. Are claims of NSA's capabilities grounded in reality?</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>757</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8d2205e1d6377d8531aeaac633962d04]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8000006531.mp3?updated=1689263065" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: ISIS security breaches threaten narrative. Cyber industry issues. Updates on the crypto wars.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/55/notes</link>
      <description>Daily: ISIS security breaches threaten narrative. Cyber industry issues. Updates on the crypto wars. Plus, Joe Carrigan from Johns Hopkins University's Information Security Institute shares an overview of Phishing scams.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 14 Mar 2016 18:16:34 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>55</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ca31e1ea-def8-11ea-911f-5f70410bedee/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: ISIS security breaches threaten narrative. Cyber industry issues. Updates on the crypto wars.</itunes:subtitle>
      <itunes:summary>Daily: ISIS security breaches threaten narrative. Cyber industry issues. Updates on the crypto wars. Plus, Joe Carrigan from Johns Hopkins University's Information Security Institute shares an overview of Phishing scams.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Daily: ISIS security breaches threaten narrative. Cyber industry issues. Updates on the crypto wars. Plus, Joe Carrigan from Johns Hopkins University's Information Security Institute shares an overview of Phishing scams.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>790</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[afd9b8ee18239b42ee9969da966daa6c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5786006517.mp3?updated=1689263077" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: US to indict Iranians for Rye hack? ISIS loses HR records. Apple vs. FBI gets nastier.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/54/notes</link>
      <description>The US is said ready to indict Iranian operators for 2013's hack a Rye, NY dam. ISIS has an insider threat problem—disgruntled employees. Adobe and Oracle patch Flash and Java. The FCC and FTC stay busy with cyber regulation. The court fight between Apple and the US Department of Justice gets uglier. Markus Rauschecker from the University of Maryland Center for Health and Homeland Security shares his views on the role of the FTC in cyber enforcement, and Tim Matthews from Imperva gives us some warning about the IoT.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 11 Mar 2016 19:03:13 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>54</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ca4ab3d2-def8-11ea-911f-8f7f30c64553/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: US to indict Iranians for Rye hack? ISIS loses HR records. Apple vs. FBI gets nastier.</itunes:subtitle>
      <itunes:summary>The US is said ready to indict Iranian operators for 2013's hack a Rye, NY dam. ISIS has an insider threat problem—disgruntled employees. Adobe and Oracle patch Flash and Java. The FCC and FTC stay busy with cyber regulation. The court fight between Apple and the US Department of Justice gets uglier. Markus Rauschecker from the University of Maryland Center for Health and Homeland Security shares his views on the role of the FTC in cyber enforcement, and Tim Matthews from Imperva gives us some warning about the IoT.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>The US is said ready to indict Iranian operators for 2013's hack a Rye, NY dam. ISIS has an insider threat problem—disgruntled employees. Adobe and Oracle patch Flash and Java. The FCC and FTC stay busy with cyber regulation. The court fight between Apple and the US Department of Justice gets uglier. Markus Rauschecker from the University of Maryland Center for Health and Homeland Security shares his views on the role of the FTC in cyber enforcement, and Tim Matthews from Imperva gives us some warning about the IoT.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>802</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2748659fea3a3496244bafeae28c4155]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9052883970.mp3?updated=1689194373" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>RSA Special: Trade and Investment [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/3/notes</link>
      <description>RSA in an international conference, with attendees and exhibitors from around the world.
Andy Williams is the UK Cyber Envoy. His mission at RSA was to spread the word about his nation’s significant cyber capabilities, to help facilitate business relationships with companies in the US, and to promote the technologies that UK companies were showing at the conference.
Telesoft Technologies is one of those companies, and Matthew George is their CTO. He’ll tell us about their effort to bring the speed of FPGA’s to the market. 
And finally, we’ll hear from Ezequiel Gutesman, Director of Research at Onapsis Research Labs. He’ll share the findings from a Poneman report on security within German software giants SAP's offerings.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 10 Mar 2016 21:28:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/00365514-df03-11ea-ae99-039f59968ec7/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>RSA Special: Trade and Investment</itunes:subtitle>
      <itunes:summary>RSA in an international conference, with attendees and exhibitors from around the world.
Andy Williams is the UK Cyber Envoy. His mission at RSA was to spread the word about his nation’s significant cyber capabilities, to help facilitate business relationships with companies in the US, and to promote the technologies that UK companies were showing at the conference.
Telesoft Technologies is one of those companies, and Matthew George is their CTO. He’ll tell us about their effort to bring the speed of FPGA’s to the market. 
And finally, we’ll hear from Ezequiel Gutesman, Director of Research at Onapsis Research Labs. He’ll share the findings from a Poneman report on security within German software giants SAP's offerings.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>RSA in an international conference, with attendees and exhibitors from around the world.</p><p>Andy Williams is the UK Cyber Envoy. His mission at RSA was to spread the word about his nation’s significant cyber capabilities, to help facilitate business relationships with companies in the US, and to promote the technologies that UK companies were showing at the conference.</p><p>Telesoft Technologies is one of those companies, and Matthew George is their CTO. He’ll tell us about their effort to bring the speed of FPGA’s to the market. </p><p>And finally, we’ll hear from Ezequiel Gutesman, Director of Research at Onapsis Research Labs. He’ll share the findings from a Poneman report on security within German software giants SAP's offerings.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1096</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[02c06c35247ab4da64fcfd55a886afe0]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9946811593.mp3?updated=1656707645" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: ISIS rival in Syria. OnionDog hits Korea. Ransomware and DDoS. Remorse in Manitoba.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/53/notes</link>
      <description>Daily: ISIS rival in Syria. OnionDog hits Korea. Ransomeware and DDoS. Remorse in Manitoba. Dave Larson, COO at Corero, shares his thoughts on DDoS attacks, and Jonathan Katz from the University of Maryland addresses recent healthcare ransomware attacks.

 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 10 Mar 2016 18:21:38 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>53</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ca632282-def8-11ea-911f-8753f6281427/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: ISIS rival in Syria. OnionDog hits Korea. Ransomware and DDoS. Remorse in Manitoba.</itunes:subtitle>
      <itunes:summary>Daily: ISIS rival in Syria. OnionDog hits Korea. Ransomeware and DDoS. Remorse in Manitoba. Dave Larson, COO at Corero, shares his thoughts on DDoS attacks, and Jonathan Katz from the University of Maryland addresses recent healthcare ransomware attacks.

 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Daily: ISIS rival in Syria. OnionDog hits Korea. Ransomeware and DDoS. Remorse in Manitoba. <br><br>Dave Larson, COO at Corero, shares his thoughts on DDoS attacks, and Jonathan Katz from the University of Maryland addresses recent healthcare ransomware attacks.</p>
<p> </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>793</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cde6c92061ce55e9c040d51dc00890fd]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4335464016.mp3?updated=1689194360" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>RSA Special: Emerging Technologies [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/2/notes</link>
      <description>There was no shortage of new and innovative technology on display at the RSA conference. We sat down with industry innovators to get their perspectives.
In this RSA special edition, we’ll hear from Lance Cotrell, Chief Scientist at Ntrepid about their secure browser technology.
Emily Mossberg is from Deloitte Advisory Cyber Risk Services, and she’ll give us her perspective on emerging trends in cyber risk management.
Oliver Friedrichs is the CEO of Phantom, who were the winners of this year’s RSA Sandbox competition. He stresses the importance of automation.
Richard Moulds from Whitewood Encryption Systems tells us about their true random number generation and delivery system,
And finally, Vikram Sharma from Quintessence Labs, who’s flagship Trusted Security Foundation aims to centralize the management of encrypted keys.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 10 Mar 2016 01:10:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/fe85f562-df02-11ea-b7a3-db8720dd9359/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>RSA Special: Emerging Technologies</itunes:subtitle>
      <itunes:summary>There was no shortage of new and innovative technology on display at the RSA conference. We sat down with industry innovators to get their perspectives.
In this RSA special edition, we’ll hear from Lance Cotrell, Chief Scientist at Ntrepid about their secure browser technology.
Emily Mossberg is from Deloitte Advisory Cyber Risk Services, and she’ll give us her perspective on emerging trends in cyber risk management.
Oliver Friedrichs is the CEO of Phantom, who were the winners of this year’s RSA Sandbox competition. He stresses the importance of automation.
Richard Moulds from Whitewood Encryption Systems tells us about their true random number generation and delivery system,
And finally, Vikram Sharma from Quintessence Labs, who’s flagship Trusted Security Foundation aims to centralize the management of encrypted keys.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>There was no shortage of new and innovative technology on display at the RSA conference. We sat down with industry innovators to get their perspectives.</p><p>In this RSA special edition, we’ll hear from Lance Cotrell, Chief Scientist at Ntrepid about their secure browser technology.</p><p>Emily Mossberg is from Deloitte Advisory Cyber Risk Services, and she’ll give us her perspective on emerging trends in cyber risk management.</p><p>Oliver Friedrichs is the CEO of Phantom, who were the winners of this year’s RSA Sandbox competition. He stresses the importance of automation.</p><p>Richard Moulds from Whitewood Encryption Systems tells us about their true random number generation and delivery system,</p><p>And finally, Vikram Sharma from Quintessence Labs, who’s flagship Trusted Security Foundation aims to centralize the management of encrypted keys.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1336</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b12eb85c005c20b6a47892e5b4814266]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1207317717.mp3?updated=1656707647" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: DPRK attempt on RoK rail ICS? Ransomware updates. US tax season cyber issues.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/52/notes</link>
      <description>Daily: DPRK attempt on RoK rail ICS? Ransomware updates. US tax season cyber issues. Plus, Accenture's Malek Ben Salem on embedded device security.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 09 Mar 2016 21:58:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>52</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ca7d8df2-def8-11ea-911f-6741ed230d56/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: DPRK attempt on RoK rail ICS? Ransomware updates. US tax season cyber issues.</itunes:subtitle>
      <itunes:summary>Daily: DPRK attempt on RoK rail ICS? Ransomware updates. US tax season cyber issues. Plus, Accenture's Malek Ben Salem on embedded device security.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Daily: DPRK attempt on RoK rail ICS? Ransomware updates. US tax season cyber issues. Plus, Accenture's Malek Ben Salem on embedded device security.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>804</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8d0c1ec55bc6cc3595d5104f0b60aaeb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6725680943.mp3?updated=1689194328" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>RSA Special: Threat Intelligence [Special Editions]</title>
      <link>https://thecyberwire.com/podcasts/special-edition/1/notes</link>
      <description>Threat intelligence - it's more than just attribution. In fact, unless you carry a gun and wear a badge, it's probably not much about attribution at all. Instead, it's about reducing risk.
Special thanks to our guests who sat down for interviews at RSA:
Ryan Trost, Cofounder and CTO at ThreatQuotient
Eric Olson, VP of Intelligence Operations at LookingGlass
Rick Howard, Chief Security Officer at Palo Alto Networks
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Mar 2016 23:46:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/fc993a84-df02-11ea-b3fd-db39299e3e2c/image/special-edition-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>RSA Special: Threat Intelligence</itunes:subtitle>
      <itunes:summary>Threat intelligence - it's more than just attribution. In fact, unless you carry a gun and wear a badge, it's probably not much about attribution at all. Instead, it's about reducing risk.
Special thanks to our guests who sat down for interviews at RSA:
Ryan Trost, Cofounder and CTO at ThreatQuotient
Eric Olson, VP of Intelligence Operations at LookingGlass
Rick Howard, Chief Security Officer at Palo Alto Networks
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Threat intelligence - it's more than just attribution. In fact, unless you carry a gun and wear a badge, it's probably not much about attribution at all. Instead, it's about reducing risk.</p><p>Special thanks to our guests who sat down for interviews at RSA:</p><p>Ryan Trost, Cofounder and CTO at ThreatQuotient</p><p>Eric Olson, VP of Intelligence Operations at LookingGlass</p><p>Rick Howard, Chief Security Officer at Palo Alto Networks</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>1241</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cdf116047f5fa5be3a68285053d28cec]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6675899299.mp3?updated=1656707632" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: RSA retrospective. RoK accuses DPRK of hacking. KeRanger updates. Cyberwar investments.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/51/notes</link>
      <description>Daily: RSA retrospective. RoK accuses DPRK of hacking. KeRanger updates. Cyberwar investments. Plus the University of Maryland's Center for Health and Homeland Security's Markus Rauschecker discusses how social media companies are joining the fight against ISIS.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 08 Mar 2016 21:36:35 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>51</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ca903b5a-def8-11ea-911f-afab14cc5227/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: RSA retrospective. RoK accuses DPRK of hacking. KeRanger updates. Cyberwar investments.</itunes:subtitle>
      <itunes:summary>Daily: RSA retrospective. RoK accuses DPRK of hacking. KeRanger updates. Cyberwar investments. Plus the University of Maryland's Center for Health and Homeland Security's Markus Rauschecker discusses how social media companies are joining the fight against ISIS.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Daily: RSA retrospective. RoK accuses DPRK of hacking. KeRanger updates. Cyberwar investments. Plus the University of Maryland's Center for Health and Homeland Security's Markus Rauschecker discusses how social media companies are joining the fight against ISIS.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>798</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cdd34b0445e1fbc1201541342fc854e1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2286912971.mp3?updated=1689193121" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Looking back at RSA. "Transparent Tribe" and "Pawn Storm" expand target sets. Mac ransomware found, blocked. Apple's amici.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/50/notes</link>
      <description>Daily: Looking back at RSA. "Transparent Tribe" and "Pawn Storm" expand target sets. Mac ransomware found, blocked. Apple's amici. Plus, Jonathan Katz from the University of Maryland on SSL browser security and Jay Botelho from Savvius on their Vigil 2.0 packet capture tool. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 07 Mar 2016 20:50:05 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>50</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/caa69c74-def8-11ea-911f-9751e8b83353/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Looking back at RSA. "Transparent Tribe" and "Pawn Storm" expand target sets. Mac ransomware found, blocked. Apple's amici.</itunes:subtitle>
      <itunes:summary>Daily: Looking back at RSA. "Transparent Tribe" and "Pawn Storm" expand target sets. Mac ransomware found, blocked. Apple's amici. Plus, Jonathan Katz from the University of Maryland on SSL browser security and Jay Botelho from Savvius on their Vigil 2.0 packet capture tool. 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Daily: Looking back at RSA. "Transparent Tribe" and "Pawn Storm" expand target sets. Mac ransomware found, blocked. Apple's amici. Plus, Jonathan Katz from the University of Maryland on SSL browser security and Jay Botelho from Savvius on their Vigil 2.0 packet capture tool. </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>811</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[814601b631d6c7bf7d8181c045b8e35a]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5358807994.mp3?updated=1689194314" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: RSA wraps up. Naikon disappears, BlackEnergy is scrutinized, and mobile threats get sophisticated.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/49/notes</link>
      <description>Daily: RSA wraps up. Naikon disappears, BlackEnergy is scrutinized, and mobile threats get sophisticated.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 04 Mar 2016 23:36:43 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>49</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cacf3986-def8-11ea-911f-67d5f81da328/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: RSA wraps up. Naikon disappears, BlackEnergy is scrutinized, and mobile threats get sophisticated.</itunes:subtitle>
      <itunes:summary>Daily: RSA wraps up. Naikon disappears, BlackEnergy is scrutinized, and mobile threats get sophisticated.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Daily: RSA wraps up. Naikon disappears, BlackEnergy is scrutinized, and mobile threats get sophisticated.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>731</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0609448c07af1accd3dae05d5489d0e1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5853293823.mp3?updated=1689194301" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: RSA update - SecDef sounds libertarian? Ashley Madison extortion. DROWN update. More on Ukraine grid hack.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/48/notes</link>
      <description>Daily: RSA update - SecDef sounds libertarian? Ashley Madison extortion. DROWN update. More on Ukraine grid hack.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 03 Mar 2016 21:37:33 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>48</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/caf275a4-def8-11ea-911f-ef6dca9c2492/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: RSA update - SecDef sounds libertarian? Ashley Madison extortion. DROWN update. More on Ukraine grid hack.</itunes:subtitle>
      <itunes:summary>Daily: RSA update - SecDef sounds libertarian? Ashley Madison extortion. DROWN update. More on Ukraine grid hack.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Daily: RSA update - SecDef sounds libertarian? Ashley Madison extortion. DROWN update. More on Ukraine grid hack.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>798</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5553a5c6f8b46e4a4432072822b86b19]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1376457390.mp3?updated=1689194283" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: RSA updates. DROWN SSL vulnerability. Apple vs. DoJ.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/47/notes</link>
      <description>Daily: RSA updates. DROWN SSL vulnerability. Apple vs. DoJ.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 02 Mar 2016 20:37:32 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>47</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cb0b1870-def8-11ea-911f-3ba6df7ba737/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: RSA updates. DROWN SSL vulnerability. Apple vs. DoJ.</itunes:subtitle>
      <itunes:summary>Daily: RSA updates. DROWN SSL vulnerability. Apple vs. DoJ.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Daily: RSA updates. DROWN SSL vulnerability. Apple vs. DoJ.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>794</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[8be467f77033fb964d3759e6db5f34be]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4528882647.mp3?updated=1689194258" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: RSA updates. US opens anti-ISIS cyber offensive. Industry consolidation?</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/46/notes</link>
      <description>Daily: RSA updates. US opens anti-ISIS cyber offensive. Industry consolidation?
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 02 Mar 2016 06:18:32 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>46</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cb25a7f8-def8-11ea-911f-736440fec26c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: RSA updates. US opens anti-ISIS cyber offensive. Industry consolidation?</itunes:subtitle>
      <itunes:summary>Daily: RSA updates. US opens anti-ISIS cyber offensive. Industry consolidation?
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Daily: RSA updates. US opens anti-ISIS cyber offensive. Industry consolidation?</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>788</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[350a2f5db2de4c6f8a8f3e8cb87962e9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7660627290.mp3?updated=1689194215" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Norway reports Chinese cyber espionage. Hospital ransomware. Carding black market. RSA update.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/45/notes</link>
      <description>Daily: Norway reports Chinese cyber espionage. Hospital ransomware. Carding black market. RSA update.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 29 Feb 2016 20:13:56 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>45</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cb415e44-def8-11ea-911f-03514bf2ba6f/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Norway reports Chinese cyber espionage. Hospital ransomware. Carding black market. RSA update.</itunes:subtitle>
      <itunes:summary>Daily: Norway reports Chinese cyber espionage. Hospital ransomware. Carding black market. RSA update.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Daily: Norway reports Chinese cyber espionage. Hospital ransomware. Carding black market. RSA update.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>753</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[b6e885ca1ed8c4ef73693020483bc1e5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7116802036.mp3?updated=1689193079" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: US Govt on Ukraine grid hack. ISIS threatens social media hacks. Ransomware rising. "Government OS."</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/44/notes</link>
      <description>Daily: US Govt on Ukraine grid hack. ISIS threatens social media hacks. Ransomware rising. "Government OS."
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 26 Feb 2016 18:20:53 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>44</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cb67c32c-def8-11ea-911f-9f4c7154ddf9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: US Govt on Ukraine grid hack. ISIS threatens social media hacks. Ransomware rising. "Government OS."</itunes:subtitle>
      <itunes:summary>Daily: US Govt on Ukraine grid hack. ISIS threatens social media hacks. Ransomware rising. "Government OS."
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Daily: US Govt on Ukraine grid hack. ISIS threatens social media hacks. Ransomware rising. "Government OS."</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>804</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[007269f62ef9097350660e4971ff0794]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5569871659.mp3?updated=1689193066" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Hacktivism vs. Italy &amp; the UN. Ransomware update. Report on healthcare's cyber threat model. Apple takes the 5th? </title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/43/notes</link>
      <description>Daily: Hacktivism vs. Italy &amp; the UN. Ransomware update. Report on healthcare's cyber threat model. Apple takes the 5th? 
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 25 Feb 2016 20:09:58 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>43</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cb888472-def8-11ea-911f-1ffcc4128d2d/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Hacktivism vs. Italy &amp; the UN. Ransomware update. Report on healthcare's cyber threat model. Apple takes the 5th? </itunes:subtitle>
      <itunes:summary>Daily: Hacktivism vs. Italy &amp; the UN. Ransomware update. Report on healthcare's cyber threat model. Apple takes the 5th? 
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Daily: Hacktivism vs. Italy &amp; the UN. Ransomware update. Report on healthcare's cyber threat model. Apple takes the 5th? </p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>805</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cfe4d1a31023ac079b821f18adf97d63]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2531081695.mp3?updated=1689192777" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Operation Dust Storm vs Japan. Operation Blockbuster vs. The Lazarus Group. Venture capital gets tight.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/42/notes</link>
      <description>Daily: Operation Dust Storm vs Japan. Operation Blockbuster vs. The Lazarus Group. Apple vs the FBI. Venture capital gets tight. Parents may want to monitor kids' smartphones.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 24 Feb 2016 19:31:28 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>42</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cb9e5dc4-def8-11ea-911f-4faf42aaa8f3/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: Operation Dust Storm vs Japan. Operation Blockbuster vs. The Lazarus Group. Venture capital gets tight.</itunes:subtitle>
      <itunes:summary>Daily: Operation Dust Storm vs Japan. Operation Blockbuster vs. The Lazarus Group. Apple vs the FBI. Venture capital gets tight. Parents may want to monitor kids' smartphones.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Daily: Operation Dust Storm vs Japan. Operation Blockbuster vs. The Lazarus Group. Apple vs the FBI. Venture capital gets tight. Parents may want to monitor kids' smartphones.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>805</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4c053e0fbf3dc37eaea396ab3b37c636]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1154207667.mp3?updated=1689192761" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Anonymous hits Belgium &amp; Cincinnati. Twitter vs. jihad? MouseJack. Apple, FBI dispute updates.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/41/notes</link>
      <description>Anonymous hits Belgium &amp; Cincinnati. Twitter vs. jihad? MouseJack. Apple, FBI dispute updates.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 23 Feb 2016 19:09:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>41</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cbb4841e-def8-11ea-911f-e35fe43b4573/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Anonymous hits Belgium &amp; Cincinnati. Twitter vs. jihad? MouseJack. Apple, FBI dispute updates.</itunes:subtitle>
      <itunes:summary>Anonymous hits Belgium &amp; Cincinnati. Twitter vs. jihad? MouseJack. Apple, FBI dispute updates.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Anonymous hits Belgium &amp; Cincinnati. Twitter vs. jihad? MouseJack. Apple, FBI dispute updates.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>805</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[0701c34ca64c091d0901ba46f46d3d7e]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3420332421.mp3?updated=1689192756" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: Russian cyber ops in Syria. Ransomware evolutions. Apple vs. the US Justice Department.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/40/notes</link>
      <description>Russian cyber ops in Syria. Ransomware evolutions. Apple vs. the US Justice Department. Johns Hopkins' Joe Carrigan talks about SCADA security, Shodan and the Internet-of-things.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 22 Feb 2016 18:18:53 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>40</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cbcc0292-def8-11ea-911f-9bc759989217/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Russian cyber ops in Syria. Ransomware evolutions. Apple vs. the US Justice Department.</itunes:subtitle>
      <itunes:summary>Russian cyber ops in Syria. Ransomware evolutions. Apple vs. the US Justice Department. Johns Hopkins' Joe Carrigan talks about SCADA security, Shodan and the Internet-of-things.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Russian cyber ops in Syria. Ransomware evolutions. Apple vs. the US Justice Department. Johns Hopkins' Joe Carrigan talks about SCADA security, Shodan and the Internet-of-things.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>746</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[edd974b73cff2ab321b7c48b35c2b9c1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7835391855.mp3?updated=1689192730" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Daily: DDoS by pingback. Twitter flaw patched. Security system flaws. Apple vs. FBI, continued.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/39/notes</link>
      <description>Daily: DDoS by pingback. Twitter flaw patched. Security system flaws. Apple vs. FBI, continued.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 19 Feb 2016 18:37:59 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>39</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cbe909a0-def8-11ea-911f-43afc2af2422/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Daily: DDoS by pingback. Twitter flaw patched. Security system flaws. Apple vs. FBI, continued.</itunes:subtitle>
      <itunes:summary>Daily: DDoS by pingback. Twitter flaw patched. Security system flaws. Apple vs. FBI, continued.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Daily: DDoS by pingback. Twitter flaw patched. Security system flaws. Apple vs. FBI, continued.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>774</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[32bb1bf2c781b5e161bd803f0fbdeaf6]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5872873813.mp3?updated=1689192573" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dridex, Locky, PadCrypt, and extortion. Hollywood vs. ISIS? ISIS vs. ISIS? Apple vs. FBI.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/38/notes</link>
      <description>Dridex, Locky, PadCrypt, and extortion. Hollywood vs. ISIS? ISIS vs. ISIS? Apple vs. FBI.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 18 Feb 2016 18:50:14 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>38</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cc0b6fae-def8-11ea-911f-9b064484dc86/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dridex, Locky, PadCrypt, and extortion. Hollywood vs. ISIS? ISIS vs. ISIS? Apple vs. FBI.</itunes:subtitle>
      <itunes:summary>Dridex, Locky, PadCrypt, and extortion. Hollywood vs. ISIS? ISIS vs. ISIS? Apple vs. FBI.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dridex, Locky, PadCrypt, and extortion. Hollywood vs. ISIS? ISIS vs. ISIS? Apple vs. FBI.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>802</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[77f97f84455d4ada05d24d0437c824d2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3177034162.mp3?updated=1689192551" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>Dridex &amp; Locky, macro-spread malware. Apple, FBI, spar in &amp; out of court. Dark Reading watches 20 startups.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/37/notes</link>
      <description>Dridex &amp; Locky, macro-spread malware. Apple, FBI, spar in &amp; out of court. Dark Reading watches 20 startups.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 17 Feb 2016 19:14:42 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>37</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cc277a96-def8-11ea-911f-4381f536fd08/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Dridex &amp; Locky, macro-spread malware. Apple, FBI, spar in &amp; out of court. Dark Reading watches 20 startups.</itunes:subtitle>
      <itunes:summary>Dridex &amp; Locky, macro-spread malware. Apple, FBI, spar in &amp; out of court. Dark Reading watches 20 startups.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Dridex &amp; Locky, macro-spread malware. Apple, FBI, spar in &amp; out of court. Dark Reading watches 20 startups.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>795</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[e729d1937e7c0ed07af24ba198b63610]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6098583204.mp3?updated=1689192537" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire - 2.16.2016 - Daily cyber security news brief.</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/36/notes</link>
      <description>Ukraine grid hack investigation. Malware descriptions: Fysbis, Corkow. Ransomware news. UK police vs. Crackas.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 16 Feb 2016 18:27:20 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>36</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cc4e84a6-def8-11ea-911f-bb12eed3eb5a/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ukraine grid hack investigation. Malware descriptions: Fysbis, Corkow. Ransomware news. UK police vs. Crackas.</itunes:subtitle>
      <itunes:summary>Ukraine grid hack investigation. Malware descriptions: Fysbis, Corkow. Ransomware news. UK police vs. Crackas.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>Ukraine grid hack investigation. Malware descriptions: Fysbis, Corkow. Ransomware news. UK police vs. Crackas.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>797</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bd8047ff030e55ffcbd6b64b48224184]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3148163855.mp3?updated=1689192533" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire Daily Podcast 2.12.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/35/notes</link>
      <description>In today's podcast, we hear about the possibility that Russian hackers prepared for attacks on Ukraine's power grid with earlier incursions into mining and railroad networks. We consider hacktivists' motives, and relay some news on the arrest of an alleged Cracka with Attitude. More countries look to develop an offensive cyber capability. And we hear from the University of Maryland's Jonathan Katz on provable security. http://thecyberwire.com
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 12 Feb 2016 19:15:03 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>35</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cc6685a6-def8-11ea-911f-1363aa7d402c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In today's podcast, we hear about the possibility that Russian hackers prepared for attacks on Ukraine's power grid with earlier incursions into mining and railroad networks. We consider hacktivists' motives, and relay some news on the arrest of an allege</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear about the possibility that Russian hackers prepared for attacks on Ukraine's power grid with earlier incursions into mining and railroad networks. We consider hacktivists' motives, and relay some news on the arrest of an alleged Cracka with Attitude. More countries look to develop an offensive cyber capability. And we hear from the University of Maryland's Jonathan Katz on provable security. http://thecyberwire.com
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear about the possibility that Russian hackers prepared for attacks on Ukraine's power grid with earlier incursions into mining and railroad networks. We consider hacktivists' motives, and relay some news on the arrest of an alleged Cracka with Attitude. More countries look to develop an offensive cyber capability. And we hear from the University of Maryland's Jonathan Katz on provable security. http://thecyberwire.com</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>791</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f1cfe1fc10a046b0e9276235e8e6089b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2987067038.mp3?updated=1689192069" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire Daily Podcast 2.11.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/34/notes</link>
      <description>In today's podcast, we look at a variety of threats to taxpayers during the run-up to April 15. Ransomware continues its spread, now with UmbreCrypt, a CrypBoss variant. Cisco and SAP both issue significant patches. Anonymous refines its target list, and White Team vigilantes go after LizardSquad. VTech revises its terms and conditions (but this may not solve toy privacy issues). And we hear from the Johns Hopkins University's Joe Carrigan, who takes us through the privacy implications of some high-profile data breaches. http://thecyberwire.com
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 11 Feb 2016 17:38:12 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>34</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cc861984-def8-11ea-911f-3bad334015a6/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In today's podcast, we look at a variety of threats to taxpayers during the run-up to April 15. Ransomware continues its spread, now with UmbreCrypt, a CrypBoss variant. Cisco and SAP both issue significant patches. Anonymous refines its target list, and </itunes:subtitle>
      <itunes:summary>In today's podcast, we look at a variety of threats to taxpayers during the run-up to April 15. Ransomware continues its spread, now with UmbreCrypt, a CrypBoss variant. Cisco and SAP both issue significant patches. Anonymous refines its target list, and White Team vigilantes go after LizardSquad. VTech revises its terms and conditions (but this may not solve toy privacy issues). And we hear from the Johns Hopkins University's Joe Carrigan, who takes us through the privacy implications of some high-profile data breaches. http://thecyberwire.com
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we look at a variety of threats to taxpayers during the run-up to April 15. Ransomware continues its spread, now with UmbreCrypt, a CrypBoss variant. Cisco and SAP both issue significant patches. Anonymous refines its target list, and White Team vigilantes go after LizardSquad. VTech revises its terms and conditions (but this may not solve toy privacy issues). And we hear from the Johns Hopkins University's Joe Carrigan, who takes us through the privacy implications of some high-profile data breaches. http://thecyberwire.com</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>793</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[7ff13f3928a1404a113f14d90f7d2b6d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2422747036.mp3?updated=1689192052" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire Daily Podcast 2.10.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/33/notes</link>
      <description>In today's podcast, we consider a possible shift in China's cyber espionage interests. Ransomware continues to spread indiscriminately. Analysts look at cyber company stock prices, and VCs continue to invest in the sector. The US President's budget is out, and analyzed—there's a lot of funding for cyber security. The White House issues a "National Cyber Security Action Plan." And we hear from the Johns Hopkins University’s Joe Carrigan, who takes us through the privacy implications of some high-profile data breaches.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 10 Feb 2016 19:37:30 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>33</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cc9fab9c-def8-11ea-911f-e3fb2b40f312/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In today's podcast, we consider a possible shift in China's cyber espionage interests. Ransomware continues to spread indiscriminately. Analysts look at cyber company stock prices, and VCs continue to invest in the sector. The US President's budget is out</itunes:subtitle>
      <itunes:summary>In today's podcast, we consider a possible shift in China's cyber espionage interests. Ransomware continues to spread indiscriminately. Analysts look at cyber company stock prices, and VCs continue to invest in the sector. The US President's budget is out, and analyzed—there's a lot of funding for cyber security. The White House issues a "National Cyber Security Action Plan." And we hear from the Johns Hopkins University’s Joe Carrigan, who takes us through the privacy implications of some high-profile data breaches.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we consider a possible shift in China's cyber espionage interests. Ransomware continues to spread indiscriminately. Analysts look at cyber company stock prices, and VCs continue to invest in the sector. The US President's budget is out, and analyzed—there's a lot of funding for cyber security. The White House issues a "National Cyber Security Action Plan." And we hear from the Johns Hopkins University’s Joe Carrigan, who takes us through the privacy implications of some high-profile data breaches.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>786</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[19b7cd4c92bfc160e802792eb093521f]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1069456148.mp3?updated=1689191912" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire Daily Podcast 2.9.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/32/notes</link>
      <description>In today's podcast, we continue to follow cyber crime's adoption of espionage tools. ISIS announces its priority targets. The UN and many member governments grapple with the challenge of developing counter-terror intelligence from online sources. Companies prepare for Privacy Shield. NSA supports undergraduate research at Marshall, East Tennessee State Universities. We also hear from the University of Maryland's Markus Rauschecker, who discusses the Department of Homeland Security's cyber mission. http://thecyberwire.com
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 08 Feb 2016 21:24:37 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>32</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ccb6679c-def8-11ea-911f-0fe3cc6bfe83/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In today's podcast, we continue to follow cyber crime's adoption of espionage tools. ISIS announces its priority targets. The UN and many member governments grapple with the challenge of developing counter-terror intelligence from online sources. Companie</itunes:subtitle>
      <itunes:summary>In today's podcast, we continue to follow cyber crime's adoption of espionage tools. ISIS announces its priority targets. The UN and many member governments grapple with the challenge of developing counter-terror intelligence from online sources. Companies prepare for Privacy Shield. NSA supports undergraduate research at Marshall, East Tennessee State Universities. We also hear from the University of Maryland's Markus Rauschecker, who discusses the Department of Homeland Security's cyber mission. http://thecyberwire.com
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we continue to follow cyber crime's adoption of espionage tools. ISIS announces its priority targets. The UN and many member governments grapple with the challenge of developing counter-terror intelligence from online sources. Companies prepare for Privacy Shield. NSA supports undergraduate research at Marshall, East Tennessee State Universities. We also hear from the University of Maryland's Markus Rauschecker, who discusses the Department of Homeland Security's cyber mission. http://thecyberwire.com</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>662</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[5452287a852ac35f16193ee28ed5c81c]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3024950783.mp3?updated=1689191897" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire Daily Podcast 2.8.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/31/notes</link>
      <description>In today's podcast, we discuss reports that hacktivists have released personal information gleaned from Justice Department and Department of Homeland Security databases. Anonymous engages a grab-bag of targets. Cyber stocks experience a sell-off. Governments continue their attempts to balance privacy and security. We also hear from the University of Maryland's Jonathan Katz, who explains key escrow. http://thecyberwire.com
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 08 Feb 2016 19:53:54 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>31</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cccc927e-def8-11ea-911f-9f335be570f5/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In today's podcast, we discuss reports that hacktivists have released personal information gleaned from Justice Department and Department of Homeland Security databases. Anonymous engages a grab-bag of targets. Cyber stocks experience a sell-off. Governme</itunes:subtitle>
      <itunes:summary>In today's podcast, we discuss reports that hacktivists have released personal information gleaned from Justice Department and Department of Homeland Security databases. Anonymous engages a grab-bag of targets. Cyber stocks experience a sell-off. Governments continue their attempts to balance privacy and security. We also hear from the University of Maryland's Jonathan Katz, who explains key escrow. http://thecyberwire.com
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we discuss reports that hacktivists have released personal information gleaned from Justice Department and Department of Homeland Security databases. Anonymous engages a grab-bag of targets. Cyber stocks experience a sell-off. Governments continue their attempts to balance privacy and security. We also hear from the University of Maryland's Jonathan Katz, who explains key escrow. http://thecyberwire.com</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>801</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[59ade71b236f68e2bd2b398ac93c9054]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4180003011.mp3?updated=1689191879" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire Daily Podcast 2.5.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/30/notes</link>
      <description>In today's podcast, we hear some small signals that the ISIS narrative may be faltering. European governments struggle to accommodate privacy while addressing security. Malware gets more evasive, and ransomware retains its popularity among crooks. And finally, are some white hats approaching a line they shouldn't cross? We also hear from the University of Maryland's Markus Rauschecker, who discusses critical infrastructure's cyber risks and responses. http://thecyberwire.com
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 05 Feb 2016 18:06:09 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>30</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cce4a792-def8-11ea-911f-b72464b8b8b1/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>In today's podcast, we hear some small signals that the ISIS narrative may be faltering. European governments struggle to accommodate privacy while addressing security. Malware gets more evasive, and ransomware retains its popularity among crooks. And fin</itunes:subtitle>
      <itunes:summary>In today's podcast, we hear some small signals that the ISIS narrative may be faltering. European governments struggle to accommodate privacy while addressing security. Malware gets more evasive, and ransomware retains its popularity among crooks. And finally, are some white hats approaching a line they shouldn't cross? We also hear from the University of Maryland's Markus Rauschecker, who discusses critical infrastructure's cyber risks and responses. http://thecyberwire.com
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>In today's podcast, we hear some small signals that the ISIS narrative may be faltering. European governments struggle to accommodate privacy while addressing security. Malware gets more evasive, and ransomware retains its popularity among crooks. And finally, are some white hats approaching a line they shouldn't cross? We also hear from the University of Maryland's Markus Rauschecker, who discusses critical infrastructure's cyber risks and responses. <strong></strong>http://thecyberwire.com</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>788</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1e93b828067a5d43217c7a8a7e1296dc]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2700189605.mp3?updated=1689191863" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire Daily Podcast 2.4.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/29/notes</link>
      <description>The Emissary Trojan evolves. An active campaign hits WordPress sites with the Nuclear exploit kit. A patch for Chromodo is coming. A former Norse insider disputes negative accounts of the company's business. Studies of trends in cyber conflict. Google moves against online radicalization. Card skimmers and malware-serving invoices.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 04 Feb 2016 19:03:47 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>29</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cd04628a-def8-11ea-911f-5784f18a7339/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>The Emissary Trojan evolves. An active campaign hits WordPress sites with the Nuclear exploit kit. A patch for Chromodo is coming. A former Norse insider disputes negative accounts of the company's business. Studies of trends in cyber conflict. Google mov</itunes:subtitle>
      <itunes:summary>The Emissary Trojan evolves. An active campaign hits WordPress sites with the Nuclear exploit kit. A patch for Chromodo is coming. A former Norse insider disputes negative accounts of the company's business. Studies of trends in cyber conflict. Google moves against online radicalization. Card skimmers and malware-serving invoices.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><strong>The Emissary Trojan evolves. An active campaign hits WordPress sites with the Nuclear exploit kit. A patch for Chromodo is coming. A former Norse insider disputes negative accounts of the company's business. Studies of trends in cyber conflict. Google moves against online radicalization. Card skimmers and malware-serving invoices.</strong></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>780</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1320d54136990d4255508828c3812e51]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3426292364.mp3?updated=1689191226" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 2.3.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/28/notes</link>
      <description>SCADA security developments. Security company's fixing product flaws. Retail breaches. Safe Harbor's now Privacy Shield.
Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 03 Feb 2016 20:30:16 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>28</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cd1902c6-def8-11ea-911f-b76ad5f13908/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>SCADA security developments. Security company's fixing product flaws. Retail breaches. Safe Harbor's now Privacy Shield.</itunes:subtitle>
      <itunes:summary>SCADA security developments. Security company's fixing product flaws. Retail breaches. Safe Harbor's now Privacy Shield.
Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p>SCADA security developments. Security company's fixing product flaws. Retail breaches. Safe Harbor's now Privacy Shield.</p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>792</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[134489743872c62894810f9af01d62e2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5976779110.mp3?updated=1689105913" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 2.2.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/27/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 02 Feb 2016 17:36:32 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>27</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cd29d51a-def8-11ea-911f-d79f4bf64bef/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Germany looks at Russia in Bundestag hack. Costs of attacks. M&amp;A news. Norse updates. How little crime pays.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>776</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[d59c0874c61447862813391f46d14fca]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8491820745.mp3?updated=1689106551" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 2.1.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/26/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 01 Feb 2016 18:20:43 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>26</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cd3f4cba-def8-11ea-911f-7b16d386c56b/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Farewell to Norse Corp.? Safe Harbor ave atque vale. DDoS rising.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>658</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[64139662c7c8d89b5792fc90a1a23baf]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1345751945.mp3?updated=1689106536" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 1.29.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/25/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 29 Jan 2016 18:17:45 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>25</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cd688e36-def8-11ea-911f-e33536ef4e66/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Surveillance of allies &amp; adversaries. LG fixes phones. Cisco, OpenSSL patch. Einstein troubles. No Safe Harbor?</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>785</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4f20cb9efd5d18af3056f27e5162c1e1]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5314710495.mp3?updated=1689106512" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 1.28.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/24/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 28 Jan 2016 20:15:50 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>24</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cd798ed4-def8-11ea-911f-572caf3df904/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Updates on Israel, Ukraine utility cyber attacks. New ransomware. Holes in Apple's walled garden? Congress looks into ScreenOS backdoor.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>801</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1c83aa04d2c1417b6ea9b8e038c0bac8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2331381800.mp3?updated=1689106500" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 1.27.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/23/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 27 Jan 2016 19:43:44 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>23</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cd92edf2-def8-11ea-911f-bbeb55914403/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Attempt on Israeli grid. Codoso newly active. BEC scam nets millions.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>799</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[f876609158920c364c265097f8f2b765]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4054365655.mp3?updated=1689106488" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 1.26.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/22/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 26 Jan 2016 19:47:09 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>22</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cdaa4362-def8-11ea-911f-a387b3304179/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Bogus ISIS crypto. Patch news. Crackas vs. Miami PD. Peer competitors in cyberspace.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>739</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[6da647066839a6b747aebf83c613165b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2776957037.mp3?updated=1689106472" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 1.25.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/21/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 25 Jan 2016 19:12:38 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>21</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cdc61060-def8-11ea-911f-530f76cffc8c/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Scarlet Mimic surveillance group. Irish DDoS campaign. Developments in cyber insurance, liability.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>791</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[c1e9cd58b54a22083d225802fa9fc629]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6572514360.mp3?updated=1689106141" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 1.22.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/20/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 22 Jan 2016 17:57:14 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>20</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cddaf728-def8-11ea-911f-67eda0d3db21/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Aerospace company cyber-robbed. Trusted partner betrays trust. Backdoor reinstalled in patch. Pro-crypto stance from NSA.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>713</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1d899afcc469f23433ef18ff8d2506d3]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5081873303.mp3?updated=1689106125" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 1.21.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/19/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 21 Jan 2016 19:19:22 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>19</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cdf02c74-def8-11ea-911f-cb86b5636671/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>More grid hacking. Crimeware evolution updates. Cisco, Intel patch. FireEye buys iSIGHT; ForeScout joins the unicorns.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>800</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[53e240cb9046157ef95d3970619ea4e9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW7345405245.mp3?updated=1689106107" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 1.20.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/18/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 20 Jan 2016 18:21:10 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>18</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ce0ca78c-def8-11ea-911f-d3ab8e2e8b36/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Update on Ukraine hacks. Key escrow controversy in UK. Dridex evolves. Apple, Oracle, others patch.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>713</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[eacdcdc1daccfcb23a66a81b43f8d82d]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2356100075.mp3?updated=1689106094" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 1.19.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/17/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 19 Jan 2016 18:03:03 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>17</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ce2b66e0-def8-11ea-911f-8321912261b8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Kiev airport hacked. Liability, litigation, regulation, &amp; standards of care.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>750</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ceafa4b41f5e1d33c82e7fd2eb1130a7]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6390955903.mp3?updated=1689106082" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 1.15.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/16/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 15 Jan 2016 18:21:42 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>16</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ce41b1d4-def8-11ea-911f-b7abffbbca04/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Ukraine grid hack updates. DDos trends. Mac Gatekeeper patch questions. Chaum's PrivaTegrity considered.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>748</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[01548a7efce7092cd576cf767bfb47b4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4187378437.mp3?updated=1689106065" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 1.14.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/15/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 14 Jan 2016 19:29:38 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>15</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ce58881e-def8-11ea-911f-bfff5a3500fe/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Anonymous continues to find easier targets in the civilized world than it has in ISIS: the hacktivist collective protests whaling with an attack on Icelandic government sites.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>658</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[33f6f20788a1eeb8c51f22d1026c078b]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8221328533.mp3?updated=1689105997" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 1.13.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/14/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 13 Jan 2016 19:19:58 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>14</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ce688606-def8-11ea-911f-8392e4caf551/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Anonymous vs. Iceland. Implications of Ukraine grid hack. 2FA defeat. Patch Tuesday. Cyber M&amp;A news.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>741</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a98475330b4d61e32c8a4345ed0fec92]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW2735806269.mp3?updated=1689105972" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 1.12.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/13/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 12 Jan 2016 19:52:29 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>13</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ce88c966-def8-11ea-911f-93632a6ec2a9/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>State attacks on Southeast Asian NGOs? Post mortems on the Ukrainian grid's cyber attack. Technical and messaging responses to ISIS. Wassenaar receives US Congressional scrutiny.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>762</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4b36414e18c2f4893119e1b21b6d4375]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8669241247.mp3?updated=1689105741" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 1.11.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/12/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 11 Jan 2016 20:54:57 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>12</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cea70f66-def8-11ea-911f-5f6cb9152bed/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Consensus emerges on Ukraine power grid hack. Technical fixes for information operations? Patch news.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>873</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[27187a24e677e0a364330d549d7d60e2]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1721966232.mp3?updated=1689105724" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 1.8.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/11/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Fri, 08 Jan 2016 20:05:49 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>11</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cec161d6-def8-11ea-911f-330bb0d1b2df/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Cyberspace as intelligence domain. Exploits kits, IoT issues, and Brain Test's return.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>584</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[cfd89d8363788d0ebe3a775573c372d4]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1940819376.mp3?updated=1689105707" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 1.7.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/10/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Thu, 07 Jan 2016 19:15:48 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>10</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cedf4854-def8-11ea-911f-0765eb1f18fe/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Bracing for infrastructure hacks. Malware distributed with compromised certs. Monetizing identity theft.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>728</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4c10ff02e2b4e20b636dc6cd5c528ec8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW9699065382.mp3?updated=1689105694" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 1.6.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/9/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 06 Jan 2016 18:23:07 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>9</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/ceeed832-def8-11ea-911f-27b30d44cb33/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Intelligence services link Russia to the cyber attack on Ukraine's power grid. Iran, Saudi Arabia, and ISIS ramp up their mutually antagonistic postures in cyberspace. Ransomware-as-a-service tool "Ransom32."  And we talk with the CyberWire's editor about</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>713</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[9e2b1faa9ac161fea154468ffe1eedeb]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8392372520.mp3?updated=1689105674" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 1.5.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/8/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 05 Jan 2016 18:17:50 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>8</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cf099500-def8-11ea-911f-9fdcb31e9b19/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Mounting evidence of a Russian cyber attack on Ukraine's power grid, the hunt for “Jihadi John," hacktivist response to recent Saudi executions, and we talk with the CyberWire's editor about the latest in power-grid hacking.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>631</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[ebd4db6d6be2c7c471b4381f79069249]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3452045259.mp3?updated=1689105647" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 1.4.16</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/7/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 04 Jan 2016 20:32:32 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>7</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cf18cec6-def8-11ea-911f-ab612d23c751/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>ISIS remains undeterred and defiant in cyberspace. Anti-ISIS hacktivists strike BBC and Trump's campaign. Turkish hacktivists vs. Russia. Russian cyber operators vs. Ukraine's power grid. Intelligence services seek to improve cooperation against terrorist</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>763</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[4d93edb7bf960e68f96ff2f6999ef369]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4617903383.mp3?updated=1689105636" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 12.30.15</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/6/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 30 Dec 2015 17:25:04 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>6</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cf2b79f4-def8-11ea-911f-93cecd673961/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>A look at the ISIS online community. Possibilities and limitations of social media as sources of intelligence. Microsoft addresses Flash Player issues in IE and Edge. National cyber laws and policies considered. And industry analysts forecast a very big 2</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>636</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1ada3dd8ab80cdd763797beac9517451]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3067982463.mp3?updated=1689105356" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 12.29.15</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/5/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 29 Dec 2015 18:48:52 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>5</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cf443070-def8-11ea-911f-9f72e93740f4/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>South Asian Islamists announce anti-Indian cyber attack cell. ISIS aspirational cyber offensive capabilities. Flash gets patched. New payment fraud patterns emerging. And Chinese and US cyber laws are reviewed.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>758</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[2a313bdfd4856a4ffd8bc851ca3599c8]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4630561541.mp3?updated=1689105344" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 12.28.15</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/4/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 28 Dec 2015 14:54:08 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>4</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cf546cec-def8-11ea-911f-2707f1af14d8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Anonymous claims Turkish DDoS. Opponents mull responses to ISIS in cyberspace. Governments' involvement in Juniper backdoor? Iranian group claims hack of downstate NY dam.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>640</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[a73da2f59e9ee82c95eb7d33fa74aab9]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW4896765048.mp3?updated=1689105327" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 12.23.15</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/3/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Wed, 23 Dec 2015 19:08:07 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>3</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cf67d2d2-def8-11ea-911f-effa95f70888/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>"Call of Jihad." Rye surprise. Juniper investigation points to RNG. Cyber regulations. Holiday sense.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>512</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[bea8e74ec8f0e2c446d8dd2d99e8f132]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3753066855.mp3?updated=1689105310" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 12.22.15</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/2/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Tue, 22 Dec 2015 16:07:14 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>2</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cf7d0eae-def8-11ea-911f-5f8255cc2389/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Iran vs. US infrastructure. Juniper's backdoor. Surveillance policy proposals and debates.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>616</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[1b1c35491b148a8e1d98f55ea215f408]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW6742679728.mp3?updated=1689105292" length="0" type="audio/mpeg"/>
    </item>
    <item>
      <title>The CyberWire 12.21.15</title>
      <link>https://thecyberwire.com/podcasts/daily-podcast/1/notes</link>
      <description>Learn more about your ad choices. Visit megaphone.fm/adchoices</description>
      <pubDate>Mon, 21 Dec 2015 20:19:00 -0000</pubDate>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:season>1</itunes:season>
      <itunes:episode>1</itunes:episode>
      <itunes:author>N2K Networks</itunes:author>
      <itunes:image href="https://megaphone.imgix.net/podcasts/cf924ecc-def8-11ea-911f-6b9fef31b6d8/image/daily-podcast-cover-art-cw.jpg?ixlib=rails-4.3.1&amp;max-w=3000&amp;max-h=3000&amp;fit=crop&amp;auto=format,compress"/>
      <itunes:subtitle>Anonymous vs. Turkey. Cyber-rioting in the Caucasus. Countering Daesh info ops. Reactions to US cyber law.</itunes:subtitle>
      <itunes:summary>Learn more about your ad choices. Visit megaphone.fm/adchoices</itunes:summary>
      <content:encoded>
        <![CDATA[<p><br></p><p> </p><p>Learn more about your ad choices. Visit <a href="https://megaphone.fm/adchoices">megaphone.fm/adchoices</a></p>]]>
      </content:encoded>
      <itunes:duration>556</itunes:duration>
      <itunes:explicit>no</itunes:explicit>
      <guid isPermaLink="false"><![CDATA[3ffdca58ada210da82cc033a62b422f5]]></guid>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3232433029.mp3?updated=1689085970" length="0" type="audio/mpeg"/>
    </item>
  </channel>
</rss>
